Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
52 Security De-engineering
Most rms these days have a baseline information security stan-
dard that is something like the ISO 27001/2 standards, which specify
at a low level of detail what an organization needs to cover and then
how to implement the standard as a living process. Having developed
their own version of this standard and called it a “baseline standard,”
they will ask senior management to sign o on this document, thereby
making it a binding resolution that a security department can use to
terrorize every other department in the company.
From the baseline standard, other more detailed standards and
guidelines are formulated that link back to the baseline. For example,
the baseline standard will state that all computing devices ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355