
Information Security Policies, Procedures, and Standards
A Practitioner's Reference
- 240 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Information Security Policies, Procedures, and Standards
A Practitioner's Reference
About this book
Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards.
The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely.
Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Dedication
- Table of Contents
- PREFACE
- AUTHOR
- CHAPTER 1 INTRODUCTION
- CHAPTER 2 INFORMATION SECURITY POLICY BASICS
- CHAPTER 3 INFORMATION SECURITY POLICY FRAMEWORK
- CHAPTER 4 INFORMATION SECURITY POLICY DETAILS
- CHAPTER 5 INFORMATION SECURITY PROCEDURES AND STANDARDS
- CHAPTER 6 INFORMATION SECURITY POLICY PROJECTS
- APPENDIX A: EXAMPLE POLICIES (FISMA FRAMEWORK)
- APPENDIX B: EXAMPLE DEPARTMENTAL POLICY TAILORING GUIDE
- INDEX