Image from Google Jackets

Information Security Policies and Procedures : a Practitioner's Reference

By: Material type: TextTextPublication details: Taylor & Francis Ltd, 2004Edition: 2. edISBN:
  • 9780849319587
Subject(s): DDC classification:
  • 005.8
Summary: Information Security Policies and Procedures: A Practitioner's Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies. The book emphasizes how information security must be integrated into all aspects of the business process. It examines the 12 enterprise-wide (Tier 1) policies, and maps information security requirements to each. The text also discusses the need for top-specific (Tier 2) policies and application-specific (Tier 3) policies and details how they map with standards and procedures. I t may be tempting to download some organization's policies from the Internet, but Peltier cautions against that approach.Summary: Instead, he investigates how best to use examples of policies, standards, and procedures toward the achievement of goals. He analyzes the influx of national and international standards, and outlines how to effectively use them to meet the needs of your business.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books Botho University Botswana Open Shelves Information Technology 005.8 PEL (Browse shelf(Opens below)) Available BU-LIB24999
Books Books Botho University Botswana Open Shelves Information Technology 005.8 PEL (Browse shelf(Opens below)) Available BULIB24998
Books Books Botho University eSwatini Open Shelves Information Technology 005.8 PEL (Browse shelf(Opens below)) Available BU-LIB25000
Books Books Botho University eSwatini Open Shelves Information Technology 005.8 PEL (Browse shelf(Opens below)) Available BU-LIB25001

Information Security Policies and Procedures: A Practitioner's Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies. The book emphasizes how information security must be integrated into all aspects of the business process. It examines the 12 enterprise-wide (Tier 1) policies, and maps information security requirements to each. The text also discusses the need for top-specific (Tier 2) policies and application-specific (Tier 3) policies and details how they map with standards and procedures. I t may be tempting to download some organization's policies from the Internet, but Peltier cautions against that approach.

Instead, he investigates how best to use examples of policies, standards, and procedures toward the achievement of goals. He analyzes the influx of national and international standards, and outlines how to effectively use them to meet the needs of your business.

There are no comments on this title.

to post a comment.

Powered by Koha