Cover image for Information security policies, procedures, and standards : guidelines for effective information security management
Title:
Information security policies, procedures, and standards : guidelines for effective information security management
Personal Author:
Publication Information:
Boca Raton, FL : Auerbach Publications, 2002
ISBN:
9780849311376

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010133988 QA76.9.A25 P447 2002 Open Access Book Book
Searching...
Searching...
30000010226045 QA76.9.A25 P447 2002 Open Access Book Book
Searching...
Searching...
30000010205939 QA76.9.A25 P447 2002 Open Access Book Book
Searching...

On Order

Summary

Summary

By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals.

Divided into three major sections, the book covers: writing policies, writing procedures, and writing standards. Each section begins with a definition of terminology and concepts and a presentation of document structures. You can apply each section separately as needed, or you can use the entire text as a whole to form a comprehensive set of documents. The book contains checklists, sample policies, procedures, standards, guidelines, and a synopsis of British Standard 7799 and ISO 17799.

Peltier provides you with the tools you need to develop policies, procedures, and standards. He demonstrates the importance of a clear, concise, and well-written security program. His examination of recommended industry best practices illustrates how they can be customized to fit any organization's needs. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management helps you create and implement information security procedures that will improve every aspect of your enterprise's activities.


Table of Contents

Acknowledgmentsp. xi
Introductionp. xiii
1 Overview: Information Protection Fundamentalsp. 1
1.1 Elements of Information Protectionp. 1
1.2 More Than Just Computer Securityp. 3
1.3 Roles and Responsibilitiesp. 4
1.4 Common Threatsp. 8
1.5 Policies and Proceduresp. 9
1.6 Risk Managementp. 9
1.7 Typical Information Protection Programp. 11
1.8 Summaryp. 11
2 Writing Mechanics and the Messagep. 13
2.1 Attention Spansp. 13
2.2 Key Conceptsp. 15
2.3 Topic Sentence and Thesis Statementp. 16
2.4 The Messagep. 17
2.5 Writing Don't'sp. 18
2.6 Summaryp. 18
3 Policy Developmentp. 21
3.1 Policy Definitionsp. 21
3.2 Frequently Asked Questionsp. 22
3.3 Policies Are Not Enough: A Preliminary Look at Standards, Guidelines, and Proceduresp. 25
3.4 Policy, Standards, Guidelines, and Procedures: Definitions and Examplesp. 26
3.5 Policy Key Elementsp. 27
3.6 Policy Format and Basic Policy Componentsp. 28
3.7 Policy Content Considerationsp. 31
3.8 Program Policy Examplesp. 32
3.9 Topic-Specific Policy Examplesp. 38
3.10 Additional Hintsp. 44
3.11 Topic-Specific Policy Subjects to Considerp. 45
3.12 An Approach for Successp. 46
3.13 Additional Examplesp. 47
3.14 Summaryp. 50
4 Mission Statementp. 53
4.1 Background on Your Positionp. 53
4.2 Business Goals versus Security Goalsp. 54
4.3 Computer Security Objectivesp. 55
4.4 Mission Statement Formatp. 56
4.5 Allocation of Information Security Responsibilities (ISO 17799-4.1.3)p. 56
4.6 Mission Statement Examplesp. 57
4.7 Support for the Mission Statementp. 63
4.8 Key Roles in Organizationsp. 64
4.9 Business Objectivesp. 65
4.10 Reviewp. 66
5 Standardsp. 69
5.1 Where Does a Standard Go?p. 70
5.2 What Is a Standard?p. 70
5.3 International Standardsp. 71
5.4 Summaryp. 76
6 Writing Proceduresp. 83
6.1 Definitionsp. 83
6.2 Writing Commandmentsp. 84
6.3 Key Elements in Procedure Writingp. 86
6.4 Procedure Checklistp. 86
6.5 Getting Startedp. 87
6.6 Procedure Stylesp. 88
6.7 Creating a Procedurep. 105
6.8 Summaryp. 105
7 Information Classificationp. 107
7.1 Introductionp. 107
7.2 Why Classify Informationp. 107
7.3 What Is Information Classification?p. 108
7.4 Establish a Teamp. 109
7.5 Developing the Policyp. 110
7.6 Resist the Urge to Add Categoriesp. 110
7.7 What Constitutes Confidential Informationp. 111
7.8 Classification Examplesp. 113
7.9 Declassification or Reclassification of Informationp. 118
7.10 Information Classification Methodologyp. 118
7.11 Authorization for Accessp. 147
7.12 Summaryp. 148
8 Security Awareness Programp. 149
8.1 Key Goals of an Information Security Programp. 149
8.2 Key Elements of a Security Programp. 150
8.3 Security Awareness Program Goalsp. 151
8.4 Identify Current Training Needsp. 153
8.5 Security Awareness Program Developmentp. 154
8.6 Methods Used to Convey the Awareness Messagep. 155
8.7 Presentation Key Elementsp. 157
8.8 Typical Presentation Formatp. 157
8.9 When to Do Awarenessp. 158
8.10 The Information Security Messagep. 158
8.11 Information Security Self-Assessmentp. 158
8.12 Conclusionp. 159
9 Why Manage This Process as a Project?p. 161
9.1 First Things First--Identify the Sponsorp. 161
9.2 Defining the Scope of Workp. 163
9.3 Time Managementp. 164
9.4 Cost Managementp. 170
9.5 Planning for Qualityp. 170
9.6 Managing Human Resourcesp. 171
9.7 Creating a Communications Planp. 171
9.8 Summaryp. 173
10 Information Technology: Code of Practice for Information Security Managementp. 175
10.1 Scopep. 175
10.2 Terms and Definitionsp. 175
10.3 Information Security Policyp. 176
10.4 Organization Securityp. 177
10.5 Asset Classification and Controlp. 178
10.6 Personnel Securityp. 179
10.7 Physical and Environmental Securityp. 180
10.8 Communications and Operations Managementp. 181
10.9 Access Control Policyp. 182
10.10 Systems Development and Maintenancep. 183
10.11 Business Continuity Planningp. 183
10.12 Compliancep. 184
11 Reviewp. 187
Appendices
Appendix A Policy Baseline Checklistp. 195
Policy Baselinep. 195
Appendix B Sample Corporate Policiesp. 205
Conflict of Interestp. 205
Employee Standards of Conductp. 208
External Corporate Communicationsp. 211
Information Protectionp. 213
General Securityp. 214
Appendix C List of Acronymsp. 215
Appendix D Sample Security Policiesp. 225
Network Security Policyp. 225
Business Continuity Planningp. 230
Dial-In Accessp. 231
Access Controlp. 233
Communications Security Policyp. 234
Software Development Policyp. 236
System and Network Security Policyp. 237
Electronic Communication Policyp. 238
Sign-On Bannerp. 242
Standards of Conduct for Electronic Communicationsp. 243
E-Mail Access Policyp. 244
Internet E-Mailp. 246
Software Usagep. 249
Appendix E Job Descriptionsp. 255
Chief Information Officer (CIO)p. 255
Information Security Managerp. 257
Security Administratorp. 258
Firewall Administrator, Information Securityp. 260
Appendix F Security Assessmentp. 261
I. Security Policyp. 261
II. Organizational Suitabilityp. 264
III. Physical Securityp. 269
IV. Business Impact Analysis, Continuity Planning Processesp. 273
V. Technical Safeguardsp. 278
VI. Telecommunications Securityp. 281
Appendix G Referencesp. 285
About the Authorp. 287
Indexp. 289