CHAPTER 66
DEVELOPING SECURITY POLICIES
M. E. Kabay and Sean Kelley
66.2 COLLABORATING IN BUILDING SECURITY POLICIES
66.3 PHASE 1: PRELIMINARY EVALUATION
66.3.1 Introduction to the Study
66.3.2 State of Current Policy
66.3.8 Human Resources, Management, and Employee Security Awareness
66.3.10 Software Development Security
66.3.11 Computer Operations Security
66.3.13 Network and Communications Security
66.3.15 Backups, Archives, and Data Destruction
66.3.17 Business Resumption Planning and Disaster Recovery
66.4 PHASE 2: MANAGEMENT SENSITIZATION
66.6 PHASE 4: POLICIES AND PROCEDURES
66.1 INTRODUCTION.
This chapter reviews methods for developing security policies in specific organizations. Some of the other chapters of this Handbook that bear on policy content, development, and implementation are listed next:
- Chapter 23 provides an extensive overview of physical security policies.
- Chapter 25 discusses local area network security issues and policies.
- Chapter 39 reviews software development policies and quality assurance policies. ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.