TAILIEUCHUNG - GIAC Basic Security Policy

I have never ceased to be amazed by the fact that you can’t take a class in information security without being told to do this or the other thing in accordance with “your security policy”. But nobody ever explains what policy is, or how to write or evaluate it. This is why we have begun this research and educational project into security policy. | 1 NiVIM GIAC Basic Security Policy Version February 27 2001 I keep six honest serving men They taught me all I knew Their names are What and Why and When And How and Where and Who. --Rudyard Kipling CONTRIBUTING AUTHORS Doug Austin Alexander Bryce Rob Dinehart Stephen Joyce Carol Kramer Randy Marchany Stephen Northcutt John Ritter Matt Scarborough Arrigo Triulzi Dyncorp Information Systems LLC Alexander Ltd. IBJ Whitelhall Financial Group bitLab LLC SANS Institute Virginia Tech Computing Center Global Incident Analysis Center Intecs International Inc. IC Albourne Parners Ltd. EDITED BY Carol Kramer Stephen Northcutt Fred Kerby If you have corrections or additions or would like to be involved in enhancing this project please send email to giactc@ 2 A note from the director of GIAC Training and Certification I have never ceased to be amazed by the fact that you can t take a class in information security without being told to do this or the other thing in accordance with your security policy . But nobody ever explains what policy is or how to write or evaluate it. This is why we have begun this research and educational project into security policy. We hope you find this booklet useful and even more that you will get involved and help. Consensus is a powerful tool and we need the ideas and criticisms of the information security community to make this the roadmap for usable effective policy. Thank you Stephen Northcutt CONTENTS 1. PREFACE 2. USING SECURITY POLICY TO MANAGE RISK 3. DEFINING SECURITY POLICY 4. IDENTIFYING SECURITY POLICY 5. SECURITY POLICY WORKSHEET 6. EVALUATING SECURITY POLICY 7. ISSUE-SPECIFIC SECURITY POLICY Anti-Virus Password Assessment Backups Incident Handling Proprietary Information 8. WRITING A PERSONAL SECURITY POLICY 9. EXERCISES APPENDIX A - Policy Templates APPENDIX B - Sample Non-Disclosure Agreement 3 1. PREFACE Security policy protects both people and information. Safeguarding information is challenging .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.