O'Reilly logo

Information Technology Security Fundamentals by Bryan Hosack, Glen Sagers

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 9

Integrating Your Security Plan across the Enterprise

Every organization needs a written security policy. Every organization has a stance on information assurance, but if it’s not recorded and formalized, it might as well not exist. The organization will eventually encounter situations that require taking action about a security matter. If no written policy exists, many actions they would wish to take become legally impossible. As a simple example, consider the case of an employee who wastes work time surfing the Internet for sports scores. This is not illegal (illegal actions have clear legal penalties, giving built-in consequences and procedures for the organization to pursue), but most firms would frown on this waste of company time ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required