๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Security Planning and Disaster Recovery

โœ Scribed by Maiwald, Eric; Sieglein, William


Publisher
McGraw-Hill Professional Publishing
Year
2002
Tongue
English
Leaves
237
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Table of Contents


Content: COPYRIGHT
CONTENTS
ACKNOWLEDGMENTS
INTRODUCTION
PART I Guiding Principles in Plan Development
CHAPTER 1 The Role of the Information Security Program
GETTING OFF ON THE RIGHT FOOT
ESTABLISHING THE ROLE OF SECURITY
RELATIONSHIPS
CHECKLIST: KEY ROLES OF THE PROGRAM
CHAPTER 2 Laws and Regulations
WORKING WITH THE LEGAL AND COMPLIANCE DEPARTMENTS
LEGAL BACKGROUND
RESOURCES
CHECKLIST: KEY POINTS IN INFORMATION SECURITY LEGAL ISSUES
CHAPTER 3 Assessments
INTERNAL AUDITS
EXTERNAL AUDITS
ASSESSMENTS
CHECKLIST: KEY POINTS IN ASSESSMENTS
PART II Plan Implementation. CHAPTER 4 Establishing Policies and ProceduresPURPOSE OF POLICIES
POLICIES TO CREATE
DEALING WITH EXISTING DOCUMENTS
GETTING BUY-IN
POLICY REVIEW
CHECKLIST: KEY POINTS IN ESTABLISHING POLICIES AND PROCEDURES
CHAPTER 5 Implementing the Security Plan
WHERE TO START
WORKING WITH SYSTEM ADMINISTRATORS
WORKING WITH MANAGEMENT
EDUCATING USERS
CHECKLIST: KEY POINTS IN IMPLEMENTING THE SECURITY PLAN
CHAPTER 6 Deploying New Projects and Technologies
NEW BUSINESS PROJECTS
CHECKLIST: KEY POINTS IN DEPLOYING BUSINESS PROJECTS
CHAPTER 7 Security Training and Awareness
USER AWARENESS. MANAGEMENT AWARENESSSECURITY TEAM TRAINING AND AWARENESS
TRAINING METHODS
CHECKLIST: KEY POINTS FOR SECURITY TRAINING AND AWARENESS
CHAPTER 8 Monitoring Security
POLICY MONITORING
NETWORK MONITORING
AUDIT LOG MONITORING
VULNERABILITY MONITORING
CHECKLIST: KEY POINTS IN MONITORING SECURITY
PART III Plan Administration
CHAPTER 9 Budgeting for Security
ESTABLISHING THE NEED
BUILDING THE BUDGET
OTHER CONSIDERATIONS
STICK TO YOUR BUDGET
CHECKLIST: KEY POINTS IN SECURITY PROGRAM BUDGETING
CHAPTER 10 The Security Staff
SKILL AREAS
HIRING GOOD PEOPLE
SMALL ORGANIZATIONS. LARGE ORGANIZATIONSCHECKLIST: KEY POINTS IN HIRING STAFF
CHAPTER 11 Reporting
PROGRESS ON PROJECT PLANS
STATE OF SECURITY
RETURN ON INVESTMENT
INCIDENTS
AUDITS
CHECKLIST: KEY POINTS IN SECURITY REPORTING
PART IV How to Respond to Incidents
CHAPTER 12 Incident Response
THE TEAM
IDENTIFYING THE INCIDENT
ESCALATION
CONTAINMENT
ERADICATION
DOCUMENTATION
LEGAL ISSUES
CHECKLIST: KEY POINTS IN INCIDENT RESPONSE
CHAPTER 13 Developing Contingency Plans
DEFINING DISASTERS
IDENTIFYING CRITICAL SYSTEMS AND DATA
PREPAREDNESS
PUTTING THE RECOVERY TEAM AND STEERING COMMITTEE TOGETHER. GENERAL PROCEDURESRESOURCES
CHECKLIST: KEY POINTS FOR CONTINGENCY PLANS
CHAPTER 14 Responding to Disasters
REALITY CHECK
DEFINING AUTHORITY AND THE TEAM
FOLLOWING OR NOT FOLLOWING THE PLAN
PHASES OF A DISASTER
CHECKLIST: KEY POINTS IN DISASTER RESPONSE
PART V Appendixes
APPENDIX A Handling Audits
BEING PART OF THE TEAM
INTERNAL AUDITS
EXTERNAL AUDITS
SECURITY'S RESPONSE TO THE AUDIT
CHECKLIST: KEY POINTS IN HANDLING AUDITS
APPENDIX B Outsourcing Security
SERVICES TO OUTSOURCE
CHOOSING WHAT TO OUTSOURCE
CHOOSING A VENDOR
WORKING WITH THE VENDOR.

โœฆ Subjects


Computer security;Management;Data protection;Emergency management


๐Ÿ“œ SIMILAR VOLUMES


Security planning & disaster recovery
โœ Eric Maiwald, William Sieglein ๐Ÿ“‚ Library ๐Ÿ“… 2002 ๐Ÿ› McGraw-Hill/Osborne ๐ŸŒ English

Proactively implement a successful security and disaster recovery plan-before a security breach occurs. Including hands-on security checklists,design maps,and sample plans,this expert resource is crucial for keeping your network safe from any outside intrusions.

Security planning & disaster recovery
โœ Eric Maiwald, William Sieglein ๐Ÿ“‚ Library ๐Ÿ“… 2002 ๐Ÿ› McGraw-Hill/Osborne ๐ŸŒ English

Proactively implement a successful security and disaster recovery plan--before a security breach occurs. Including hands-on security checklists, design maps, and sample plans, this expert resource is crucial for keeping your network safe from any outside intrusions.

Business Continuity and Disaster Recover
โœ Vyshnavi Devi Jorrigala ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› St. Cloud State University ๐ŸŒ English

Business continuity planning and Disaster recovery planning are the most crucial elements of a business but are often ignored. Businesses must make a well-structured plan and document for disaster recovery and business continuation, even before a catastrophe occurs. Disasters can be short or may las

Auditing and Security: AS 400, NT, UNIX,
โœ Yusufali F. Musaji ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐ŸŒ English

A complete and definitive guide to auditing the security of IT systems for managers, CIOs, controllers, and auditorsThis up-to-date resource provides all the tools you need to perform practical security audits on the entire spectrum of a company's IT platforms-from the mainframe to the individual PC

Auditing and Security: AS/400, NT, UNIX,
โœ Yusufali F. Musaji ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› Wiley ๐ŸŒ English

As an experienced Technology Auditor, I picked up this book to brush up on some of the considerations involved in auditing UNIX systems. After reading through most of the section on UNIX, I couldnt help but think that this book was written without considering the intended audience. Generally speak