Information security policies, procedures, and standards : guidelines for effective information security management /: guidelines for effective information security management. (©2002)
- Record Type:
- Book
- Title:
- Information security policies, procedures, and standards : guidelines for effective information security management /: guidelines for effective information security management. (©2002)
- Main Title:
- Information security policies, procedures, and standards : guidelines for effective information security management
- Further Information:
- Note: Thomas R. Peltier.
- Other Names:
- Peltier, Thomas R
- Contents:
- Introduction; Writing Mechanics and the Message; Attention Spans; Key Concepts; Topic Sentence and Thesis Statement; The Message; Writing Don'ts; Summary; Policy Development; Introduction; Policy Definitions; Frequently Asked Questions; Polices are Not Enough; What is a Policy; Policy Format; Policy Content; Program Policy Examples; Topic-Specific Policy Statements; Additional Hints; Topic-Specific Subjects; Things to Remember; Additional Examples; Standards; Introduction; Where Does a Standard Go?; Policies are not Enough; What is a Standard; Security Organization; Assets Classification and Control; Personnel Security; Physical and Environmental Security; Computer and Network Management; Systems Access Control; Business Continuity Planning; Compliance; Writing Procedures; Introduction; Definitions; Writing Commandants; Key Elements in Procedure Writing; Procedure Checklist; Getting Started; Procedure Styles; Creating a Procedure; Summary; Security Awareness Program; Introduction; Key Goals of an Information Security Program; Key Elements of a Security Program; Security Awareness Program Goals; Identify Current Training Needs; Security Awareness Program Development; Methods Used to Convey the Awareness Message; Presentation Key Elements; Typical Presentation Format; When to do Awareness; The Information Security Message; Information Security Self-Assessment; Video Sources; Why Manage the Process as a Project; Introduction; First Things First - Identify the Sponsor; DefiningIntroduction; Writing Mechanics and the Message; Attention Spans; Key Concepts; Topic Sentence and Thesis Statement; The Message; Writing Don'ts; Summary; Policy Development; Introduction; Policy Definitions; Frequently Asked Questions; Polices are Not Enough; What is a Policy; Policy Format; Policy Content; Program Policy Examples; Topic-Specific Policy Statements; Additional Hints; Topic-Specific Subjects; Things to Remember; Additional Examples; Standards; Introduction; Where Does a Standard Go?; Policies are not Enough; What is a Standard; Security Organization; Assets Classification and Control; Personnel Security; Physical and Environmental Security; Computer and Network Management; Systems Access Control; Business Continuity Planning; Compliance; Writing Procedures; Introduction; Definitions; Writing Commandants; Key Elements in Procedure Writing; Procedure Checklist; Getting Started; Procedure Styles; Creating a Procedure; Summary; Security Awareness Program; Introduction; Key Goals of an Information Security Program; Key Elements of a Security Program; Security Awareness Program Goals; Identify Current Training Needs; Security Awareness Program Development; Methods Used to Convey the Awareness Message; Presentation Key Elements; Typical Presentation Format; When to do Awareness; The Information Security Message; Information Security Self-Assessment; Video Sources; Why Manage the Process as a Project; Introduction; First Things First - Identify the Sponsor; Defining the Scope of Work; Time Management; Policies and Procedures Project Sample WBS; Cost Management; Planning for Quality; Managing Human Resources; Creating a Communications Plan; Summary; Mission Statement; Setting the Scope; Background on your Position; Business Goals Versus Security Goals; Computer Security Objectives; Mission Statement Format; Allocation of Information Security Responsibilities; Mission Statement Examples; Support for the Mission Statement; Key Roles in Organizations; Business Objectives; Review; Information Technology - Code of Practice for Information Security Management; Scope; Terms and Definitions; Information Security Policy; Organization Security; Asset Classification and Control; Personnel Security; Physical and Environmental Security; Systems Development and Maintenance; Business Continuity Planning; Compliance; Review; References … (more)
- Publisher Details:
- Boca Raton : Auerbach Publications
- Publication Date:
- 2002
- Copyright Date:
- 2002
- Extent:
- 1 online resource (xiv, 297 pages), illustrations
- Subjects:
- 005.8
Computer security
Data protection
Sécurité informatique
Protection de l'information (Informatique)
COMPUTERS -- Internet -- Security
COMPUTERS -- Networking -- Security
COMPUTERS -- Security -- General
Computer security
Data protection
Datenschutz
Computersicherheit
Electronic books - Languages:
- English
- ISBNs:
- 9780203972977
9780849390326
9780849311376
0849311373 - Related ISBNs:
- 020397297X
084939032X
0849311373 - Notes:
- Note: Includes bibliographical references and index.
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.155648
- Ingest File:
- 01_023.xml