O'Reilly logo

Defend I.T.: Security by Example by Scott Laliberte, Ajay Gupta

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Security Is the Best Policy

Chances are you thought a security professional wouldn’t need to bother with any of those pesky writing skills, huh? Well, unfortunately (or fortunately, depending on your perspective), that’s not necessarily true. Sometimes helping a client develop a security policy involves at least as much understanding of current regulations, business practices, and writing skills as it does technology.

This case study details the effort to develop a security policy document for an organization that felt it needed to have and follow such a document in order to be able to enforce standards with regard to employee use of the firm’s IT resources. The firm had started to restrict certain types of activities and network usage ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required