Литмир - Электронная Библиотека
Security Program and Policies
Добавить похожую книгу
Living With Angels
Похожа
Непохожа
Writing up the Research
Автор: Remenyi Dan (EN)
Похожа
Непохожа
Security Program and Policies
Author:Greene Sari (EN)
Language of a book: Английский
Language of an original book: Английский
Publisher: Gardners Books

    Everything you need to know about information security programs and policies, in one book Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management Thoroughly updated for today's challenges, laws, regulations, and best practices The perfect resource for anyone pursuing an information security management career In today's dangerous world, failures in information security can be catastrophic. Organizations must protect themselves. Protection begins with comprehensive, realistic policies. This up-to-date guide will help you create, deploy, and manage them. Complete and easy to understand, it explains key concepts and techniques through real-life examples. You'll master modern information security regulations and frameworks, and learn specific best-practice policies for key industry sectors, including finance, healthcare, online commerce, and small business. If you understand basic information security, you're ready to succeed with this book. You'll find projects, questions, exercises, examples, links to valuable easy-to-adapt information security policies...everything you need to implement a successful information security program. Learn how to Establish program objectives, elements, domains, and governance Understand policies, standards, procedures, guidelines, and plansand the differences among them Write policies in ';plain language,' with the right level of detail Apply the Confidentiality, Integrity & Availability (CIA) security model Use NIST resources and ISO/IEC 27000-series standards Align security with business strategy Define, inventory, and classify your information and systems Systematically identify, prioritize, and manage InfoSec risks Reduce ';people-related' risks with role-based Security Education, Awareness, and Training (SETA) Implement effective physical, environmental, communications, and operational security Effectively manage access control Secure the entire system development lifecycle Respond to incidents and ensure continuity of operations Comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS

    Поделиться:
    ]]>Facebook :0]]>  ]]>Twitter :0]]>  ]]>В контакте :0]]>  ]]>Livejournal :0]]>  ]]>Мой мир :0]]>  ]]>Gmail :0]]>  Email :0  ]]>Скачать :0]]>  
    Мой статус книги:
    Чтобы оставить свою оценку и комментарий вам нужно зайти на сайт или зарегистрироваться

    {"b":"309202","o":30}