Information Security Policies and Procedures, A Practitioner's Reference, Second Edition

Course

Distance

£ 59 + VAT

Description

  • Type

    Course

  • Methodology

    Distance Learning

The book illustrates how policies and procedures support the efficient running of an organization. This volume points out how security documents and standards are key elements in the business process, but should never be undertaken to satisfy a perceived audit or security requirement.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

Course programme

Description
The book illustrates how policies and procedures support the efficient running of an organization. This volume points out how security documents and standards are key elements in the business process, but should never be undertaken to satisfy a perceived audit or security requirement.

Program

Information Security Policies and Procedures: A Practitioner's Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide.

This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies.


The book emphasizes how information security must be integrated into all aspects of the business process. It examines the 12 enterprise-wide (Tier 1) policies, and maps information security requirements to each. The text also discusses the need for top-specific (Tier 2) policies and application-specific (Tier 3) policies and details how they map with standards and procedures.

It may be tempting to download some organization's policies from the Internet, but Peltier cautions against that approach. Instead, he investigates how best to use examples of policies, standards, and procedures toward the achievement of goals. He analyzes the influx of national and international standards, and outlines how to effectively use them to meet the needs of your business.

Overview of the Book:
  • Explains how to integrate information security policies, standards, and procedures towards the achievement of organizational goals
  • Explores how security policies support management initiatives
  • Details the methods of an asset classification policy
  • Covers the components of typical Tier 1 and Tier 2 policies, including employment practices, records management, Internet security, business continuity planning, information protection, and much more
  • Offers sample standards and information security manuals
  • Provides an Information Security Reference Guide which addresses infosec fundamentals, employee responsibilities, information handling and processing, security tools, program administration, and other elements needed to allow safe execution of business tasks


Author: Thomas R. Peltier
Publisher: Auerbach Publications
ISBN 10: 0849319587
ISBN 13: 9780849319587
Pages: 408
Format: Hard Cover
Published Date: 11/06/2004
Availability: Ex Stock

Information Security Policies and Procedures, A Practitioner's Reference, Second Edition

£ 59 + VAT