Bacik | Building an Effective Information Security Policy Architecture | E-Book | www.sack.de
E-Book

E-Book, Englisch, 368 Seiten

Bacik Building an Effective Information Security Policy Architecture


Erscheinungsjahr 2008
ISBN: 978-1-4200-5906-9
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 368 Seiten

ISBN: 978-1-4200-5906-9
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book demonstrates how to evaluate an organization’s culture and its ability to meet various security standards and requirements. Because the effectiveness of a policy is dependent on cooperation and compliance, the author also provides tips on how to communicate the policy and gain support for it. Suitable for any level of technical aptitude, this book serves a guide for evaluating the business needs and risks of an enterprise and incorporating this information into an effective security policy architecture.

Bacik Building an Effective Information Security Policy Architecture jetzt bestellen!

Zielgruppe


Information security management and administrators, business continuity planners, systems administrators, network managers, and administrators.


Autoren/Hrsg.


Weitere Infos & Material


Introduction

History of Policy Documents

Why Do We Really Need Policies?

What Follows

The Enterprise

Policy Architecture Design Process

Setting the Reporting Structure

Determining the Mission

Strategic Plans

Summary

What is a Policy Architecture?

Basic Document Definitions

Effective Policy Architecture

Scope of the Architecture

Top-Level Topics

Getting Ready to Start

Reviewing What Is in Place

Basic Assessment

Policy Writing Skills

A Framework or Set of Standards?

Manual of Style

Do I Need to Create a Committee?

Initial Approvals for Information Security

Writing the Documents

Policy

Guideline

Standard

Work Instruction

Memos

Forms

Cautions

Additional Key Policy Topics

Miscellaneous Items

Physical Security

Personnel Security

Privacy

Third Parties

Application Requirements

Putting It Together

Topics to Start With

Reviews

Project Approval

Document Approval

Support

Publishing

Updates—Effective Versioning

Acknowledgment of Understanding

Exceptions to the Information Security Policy Architecture Documentation

Crafting Communication for Maximum Effectiveness

Barriers to Effective Communication

Listening

Know Your Audience

What Is the Enterprise Standard Method of Communication?

Attention Spans

Constructive Feedback (AKA Do Not Take It Personally)

Security Monitoring and Metrics

Monitoring for Enforcement

Baselines

Routine Metrics

Reporting

Continuing to Mold Your Style through Experience

Building for Longevity

Basic Leadership

Find a Mentor

Find Opportunities to Expand Experience

Appendices

Index



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.