Skip to Content
Information Security Management Handbook, Volume 5, 6th Edition
book

Information Security Management Handbook, Volume 5, 6th Edition

by Micki Krause Nozaki, Harold F. Tipton
April 2016
Intermediate to advanced
558 pages
19h 52m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 5, 6th Edition
288 ◾  Information Security Management Handbook
f. Permitted methods of access and the management and use of user identification (IDs)
and passwords.
g. Security outsourcer’s obligation to keep a list of authorized persons and a corresponding
authorization procedure for user access rights.
2. An outline of the training to be provided for enterprise personnel, including the type and
number of personnel to be trained and the related costs, if training is needed or requested.
3. Established time schedule for receipt and delivery of work products or services.
4. e availability of on-line communications, security related to access controls, transmis-
sions, and alternate data entry considerations.
5. A detailed description of liability ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 7, 6th Edition

Information Security Management Handbook, Volume 7, 6th Edition

Richard O'Hanley, James S. Tiller
Physical Security and Safety

Physical Security and Safety

Truett A. Ricks, Bobby E. Ricks, Jeffrey Dingle

Publisher Resources

ISBN: 9781439853467