Why manage this process as a project? -- Planning and preparation -- Developing policies -- Asset classification policy -- Developing standards -- Developing procedures -- Creating a table of contents -- Understanding how to sell policies, standards, and procedures.
بدون عنوان
0
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
"Information Security Policies and Procedures: A Practitioner's Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts: an overview of security policies and procedures and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies."--Jacket.
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Computer security.
موضوع مستند نشده
Data protection.
موضوع مستند نشده
Computer security.
موضوع مستند نشده
Data protection.
موضوع مستند نشده
IT-säkerhet.
رده بندی ديویی
شماره
005
.
8
شماره
658
.
478
ويراست
22
ويراست
21
رده بندی کنگره
شماره رده
QA76
.
9
.
A25
نشانه اثر
P428
2004
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )