Security Program and Policies

Principles and Practices

Nonfiction, Computers, Networking & Communications
Cover of the book Security Program and Policies by Sari Greene, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Sari Greene ISBN: 9780133481174
Publisher: Pearson Education Publication: March 20, 2014
Imprint: Pearson IT Certification Language: English
Author: Sari Greene
ISBN: 9780133481174
Publisher: Pearson Education
Publication: March 20, 2014
Imprint: Pearson IT Certification
Language: English

Everything you need to know about information security programs and policies, in one book

  • Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management
  • Thoroughly updated for today’s challenges, laws, regulations, and best practices
  • The perfect resource for anyone pursuing an information security management career

¿

In today’s dangerous world, failures in information security can be catastrophic. Organizations must protect themselves. Protection begins with comprehensive, realistic policies. This up-to-date guide will help you create, deploy, and manage them.

Complete and easy to understand, it explains key concepts and techniques through real-life examples. You’ll master modern information security regulations and frameworks, and learn specific best-practice policies for key industry sectors, including finance, healthcare, online commerce, and small business.

¿

If you understand basic information security, you’re ready to succeed with this book. You’ll find projects, questions, exercises, examples, links to valuable easy-to-adapt information security policies...everything you need to implement a successful information security program.

¿

Learn how to

·¿¿¿¿¿¿¿¿ Establish program objectives, elements, domains, and governance

·¿¿¿¿¿¿¿¿ Understand policies, standards, procedures, guidelines, and plans—and the differences among them

·¿¿¿¿¿¿¿¿ Write policies in “plain language,” with the right level of detail

·¿¿¿¿¿¿¿¿ Apply the Confidentiality, Integrity & Availability (CIA) security model

·¿¿¿¿¿¿¿¿ Use NIST resources and ISO/IEC 27000-series standards

·¿¿¿¿¿¿¿¿ Align security with business strategy

·¿¿¿¿¿¿¿¿ Define, inventory, and classify your information and systems

·¿¿¿¿¿¿¿¿ Systematically identify, prioritize, and manage InfoSec risks

·¿¿¿¿¿¿¿¿ Reduce “people-related” risks with role-based Security Education, Awareness, and Training (SETA)

·¿¿¿¿¿¿¿¿ Implement effective physical, environmental, communications, and operational security

·¿¿¿¿¿¿¿¿ Effectively manage access control

·¿¿¿¿¿¿¿¿ Secure the entire system development lifecycle

·¿¿¿¿¿¿¿¿ Respond to incidents and ensure continuity of operations

·¿¿¿¿¿¿¿¿ Comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS

¿

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Everything you need to know about information security programs and policies, in one book

¿

In today’s dangerous world, failures in information security can be catastrophic. Organizations must protect themselves. Protection begins with comprehensive, realistic policies. This up-to-date guide will help you create, deploy, and manage them.

Complete and easy to understand, it explains key concepts and techniques through real-life examples. You’ll master modern information security regulations and frameworks, and learn specific best-practice policies for key industry sectors, including finance, healthcare, online commerce, and small business.

¿

If you understand basic information security, you’re ready to succeed with this book. You’ll find projects, questions, exercises, examples, links to valuable easy-to-adapt information security policies...everything you need to implement a successful information security program.

¿

Learn how to

·¿¿¿¿¿¿¿¿ Establish program objectives, elements, domains, and governance

·¿¿¿¿¿¿¿¿ Understand policies, standards, procedures, guidelines, and plans—and the differences among them

·¿¿¿¿¿¿¿¿ Write policies in “plain language,” with the right level of detail

·¿¿¿¿¿¿¿¿ Apply the Confidentiality, Integrity & Availability (CIA) security model

·¿¿¿¿¿¿¿¿ Use NIST resources and ISO/IEC 27000-series standards

·¿¿¿¿¿¿¿¿ Align security with business strategy

·¿¿¿¿¿¿¿¿ Define, inventory, and classify your information and systems

·¿¿¿¿¿¿¿¿ Systematically identify, prioritize, and manage InfoSec risks

·¿¿¿¿¿¿¿¿ Reduce “people-related” risks with role-based Security Education, Awareness, and Training (SETA)

·¿¿¿¿¿¿¿¿ Implement effective physical, environmental, communications, and operational security

·¿¿¿¿¿¿¿¿ Effectively manage access control

·¿¿¿¿¿¿¿¿ Secure the entire system development lifecycle

·¿¿¿¿¿¿¿¿ Respond to incidents and ensure continuity of operations

·¿¿¿¿¿¿¿¿ Comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS

¿

More books from Pearson Education

Cover of the book Cheating Online Games (Digital Short Cut) by Sari Greene
Cover of the book Unlocking Opportunities for Growth by Sari Greene
Cover of the book Clojure Recipes by Sari Greene
Cover of the book Nikon D5000: From Snapshots to Great Shots by Sari Greene
Cover of the book MySQL Administrator's Guide by Sari Greene
Cover of the book Microsoft SQL Server 2008 Management and Administration by Sari Greene
Cover of the book Sams Teach Yourself Twitter in 10 Minutes by Sari Greene
Cover of the book CompTIA Security+ SY0-401 Cert Guide, Academic Edition by Sari Greene
Cover of the book Twitter 101: Everything You Need to Know about Twitter Marketing by Sari Greene
Cover of the book The Truth About Your Emotions When Making Decisions by Sari Greene
Cover of the book Law Express: Commercial and Consumer Law by Sari Greene
Cover of the book Scaling Lean & Agile Development by Sari Greene
Cover of the book Cisco ISE for BYOD and Secure Unified Access by Sari Greene
Cover of the book Responsive Mobile Design by Sari Greene
Cover of the book Cisco Firepower Threat Defense (FTD) by Sari Greene
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy