<P>Company network administrators are compelled today to aggressively pursue a robust network security regime. <STRONG>Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal.</P> <P>This professional volume introduces the tec
Network Security Policies and Procedures
β Scribed by Douglas W. Frye (auth.)
- Publisher
- Springer US
- Year
- 2007
- Tongue
- English
- Leaves
- 235
- Series
- Advances in Information Security 32
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures aims to give the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security, as well as how security policies are formulated at the executive level and communicated throughout the organization.
Network Security Policies and Procedures offers an unique mix of technical information and organizational communication concepts. Each chapter includes objectives, introduction, summary and review questions. Readers will gain a better understanding of how their colleagues on the other side of the fence view the companyβs security, and will thus be better equipped to act in a way that forwards an organization's goals.
Network Security Policies and Procedures is designed for practitioners and researchers in industry. This book is also suitable for upper under graduate and graduate-level students in computer science.
β¦ Table of Contents
Front Matter....Pages i-xi
Information Technology and Its Role in the Modern Organization....Pages 1-9
The Extent of an Organizationβs Connectivity....Pages 11-25
Network Physical Components....Pages 27-33
Legitimate Network Access....Pages 35-37
Illegitimate Network Access....Pages 39-43
Encryption....Pages 45-48
Balanced Scorecard....Pages 49-55
Sarbanes-Oxley....Pages 57-67
Physical Security....Pages 69-87
Disaster Recovery....Pages 89-101
Initial Employee Communication....Pages 103-116
The Human Element....Pages 117-130
Email, Instant Messaging and Phishing....Pages 131-152
Network Administration....Pages 153-157
Network Monitoring....Pages 159-162
Executive Communication....Pages 163-178
Information Security Awareness....Pages 179-193
Synthesis and Conclusion....Pages 195-207
Draft Policies....Pages 209-223
Back Matter....Pages 225-244
β¦ Subjects
Computer Communication Networks; Data Encryption; Data Structures, Cryptology and Information Theory; Computer Systems Organization and Communication Networks; Multimedia Information Systems; Information Systems and Communication Service
π SIMILAR VOLUMES
Company network administrators are compelled today to aggressively pursue a robust network security regime. This book aims to give the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security as well a
<p>Hereβs your how-to manual for developing policies and procedures that maintain the security of information systems and networks in the workplace. It provides numerous checklists and examples of existing programs that you can use as guidelines for creating your own documents.</p><br/><br/><p>Youβl
Libraries have long been viewed as safe refuge from the stresses of work, school, even home. But as times have changed, so have the realities of library security. Today, libraries of all types and sizes have fallen victim to the threat of serious crime. Because the risk to both staff and patron alik
It explains how why and how to integrate security policies and procedures across all tiers of software engineering organization. I had limited understanding f and this book helped me to get deep in to details and understand at an organization level. I recommend this for all engineers and managers i
It explains how why and how to integrate security policies and procedures across all tiers of software engineering organization. I had limited understanding f and this book helped me to get deep in to details and understand at an organization level. I recommend this for all engineers and managers in