Information Security Policies and Procedures

Regular price €167.40
Quantity:
Ships in 10-20 days
Delivery/Collection within 10-20 working days
Shipping & Delivery
A01=Thomas R. Peltier
access
advanced security documentation practices
assets
Author_Thomas R. Peltier
business
Business Continuity Plan
Business Impact Analysis
Business Process
Category=UTN
CIO
Conduct Company Business
confidential
continuity
control
corporate
Critical Business Functions
data governance frameworks
EEA
Electronic Messaging
Employee Awareness Program
enterprise risk management
eq_bestseller
eq_computing
eq_isMigrated=1
eq_isMigrated=2
eq_nobargain
eq_non-fiction
Information Classification Policy
INFORMATION CONFIDENTIALITY
Information Custodian
Information Security
Information Security Awareness
Information Security Coordinator
Information Security Issues
Information Security Policies
Information Security Program
Interoffice Mail
Organization Information Security
ORGANIZATION INFORMATION SECURITY PROGRAM
organizational resilience planning
owner
planning
program
Records Management Policy
regulatory compliance strategies
security standards implementation
Sensitive Information
tiered policy development
Topic Specific Policies
USA Patriot Act

Product details

  • ISBN 9780849319587
  • Weight: 910g
  • Dimensions: 156 x 234mm
  • Publication Date: 11 Jun 2004
  • Publisher: Taylor & Francis Ltd
  • Publication City/Country: GB
  • Product Form: Hardback
Secure checkout Fast Shipping Easy returns

Information Security Policies and Procedures: A Practitioner’s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies.

The book emphasizes how information security must be integrated into all aspects of the business process. It examines the 12 enterprise-wide (Tier 1) policies, and maps information security requirements to each. The text also discusses the need for top-specific (Tier 2) policies and application-specific (Tier 3) policies and details how they map with standards and procedures.

It may be tempting to download some organization’s policies from the Internet, but Peltier cautions against that approach. Instead, he investigates how best to use examples of policies, standards, and procedures toward the achievement of goals. He analyzes the influx of national and international standards, and outlines how to effectively use them to meet the needs of your business.

More from this author