Security Policy Guidelines
Mohamed Hamdi, National Digital Certification Agency, Tunisia
Noureddine Boudriga, National Digital Certification Agency, Tunisia
Mohammad S. Obaidat, Monmouth University, NJ, USA
Cost-Effectiveness: The Risk Analysis Process
Integrating Risk Analysis Process into the SP Life Cycle
Writing Efficiency: The Development Process
SP and the Documentation Hierarchy
Security Awareness Program: The Publication Process
Cost-Effectiveness of the Awareness Process
Security Policy Reassessment: The Auditing Process
INTRODUCTION
Because computer system technologies are rapidly spreading from academic research to industrial applications, many security issues have been raised. This need for security is driven by the increasingly large proportion of losses caused to the enterprises by various security incidents. Security attacks may disturb the operation of the system, entail loss of secrets and privacy, and become a risk to the national security and economy. Several studies, such as the CSI/FBI survey ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.