Biohealthmatics.com Public Health Informatics Graduate Program at University of Maryland
advertisement
Biohealthmatics Centers
Home
Jobs Search
Career Center
Networking Center
Company Profiles
Knowledge Center
Industry News
Web Directory
Industry Books
Featured Articles

Biohealthmatics.com....linking professionals
advertisement

Join Us

Link To Us





Writing Information Security Policies

by Scott Barman

Publisher: Sams
Publication Date: Friday, November 09, 2001
Number of Pages: 214
ISBN: 157870264X


Book Summary:
Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people for keeping the network secure, their efforts do not account for all assets and business requirementsFinally, someone decides it is time to write a security policy. Management is told of the necessity of the policy document, and they support its development. A manager or administrator is assigned to the task and told to come up with something, and fast!Once security policies are written, they must be treated as living documents. As technology and business requirements change, the policy must be updated to reflect the new environment--at least one review per year. Additionally, policies must include provisions for security awareness and enforcement while not impeding corporate goals. This book serves as a guide to writing and maintaining these all-important security policies.

Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people for keeping the network secure, their efforts do not account for all assets and business requirements Finally, someone decides it is time to write a security policy. Management is told of the necessity of the policy document, and they support its development. A manager or administrator is assigned to the task and told to come up with something, and fast! Once security policies are written, they must be treated as living documents. As technology and business requirements change, the policy must be updated to reflect the new environment--at least one review per year. Additionally, policies must include provisions for security awareness and enforcement while not impeding corporate goals. This book serves as a guide to writing and maintaining these all-important security policies.


advertisement

Book Reviews

Post a book review for this title

No reviews for this title. Be the first to post a review.

 

More Security and Privacy BooksMore Security and Privacy Books ...

 
 

 

 

 

   
Copyright © 2010 Biohealthmatics.com. All Rights Reserved. Contact Us - About Us - Privacy Policy - Terms & Conditions - Resources
Can't find what you are looking for? View our Site Map

Also try visiting PaidEmployment.com for more career resources



Proudly supports TDS Platform- An Online e-Health Platform

Last Updated: 24 November 2007.