Jump to ratings and reviews
Rate this book

Writing Information Security Policies

Rate this book
Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people for keeping the network secure, their efforts do not account for all assets and business requirements Finally, someone decides it is time to write a security policy. Management is told of the necessity of the policy document, and they support its development. A manager or administrator is assigned to the task and told to come up with something, and fast! Once security policies are written, they must be treated as living documents. As technology and business requirements change, the policy must be updated to reflect the new environment--at least one review per year. Additionally, policies must include provisions for security awareness and enforcement while not impeding corporate goals. This book serves as a guide to writing and maintaining these all-important security policies.

242 pages, Paperback

First published January 1, 2001

3 people are currently reading
60 people want to read

About the author

Scott Barman

2 books

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
6 (20%)
4 stars
9 (31%)
3 stars
8 (27%)
2 stars
4 (13%)
1 star
2 (6%)
Displaying 1 - 3 of 3 reviews
1 review
Currently reading
November 3, 2014
want to read this book
This entire review has been hidden because of spoilers.
1 review
December 3, 2016
Not for the beginner. Be sure to have been in this field for a few years before reading this book.
This entire review has been hidden because of spoilers.
Displaying 1 - 3 of 3 reviews

Can't find what you're looking for?

Get help and learn more about the design.