Guidelines for a Comprehensive Security System
Hossein Bidgoli, California State University, Bakersfield
Formation of the Security Task Force
Identification of Basic Security Safeguards
Identification of General Security Threats
Identification of Intentional Threats
Identification of Security Measures and Enforcements
Identification of Computer Emergency Response Team Services
The Formation of a Comprehensive Security Plan
INTRODUCTION
As has been discussed throughout this Handbook, security issues and threats in a network environment are varied and can be caused intentionally and unintentionally by both insiders and outsiders. Security issues and threats related to a network environment can be categorized as controllable, partially controllable, and uncontrollable. This final chapter presents a series of guidelines that identify various security issues and threats in a network environment and then offers a comprehensive security plan and guidelines for recovery if disaster strikes.
FORMATION OF THE SECURITY TASK FORCE
For the continued success of a security system and to provide a “buy-in” environment, different users of the network and computer systems must have input in the design and implementation of the security system. Users' views must be highly regarded and nobody should feel left out. This issue is of considerable significance, because computer and network systems are ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.