CHAPTER 10 |
IT Infrastructure Security Policies |
INFORMATION TECHNOLOGY (IT) infrascruture security policies are represented in many types of policy documents, depending on the organization’s network and infrastructure needs. For example, a national telecommunications company’s network policies will look very different from those of a regional retailer. These differences stem from different cybersecurity risks. They also present organizations with different choices to define and make in their security policies.
However, as much as organizations differ in size and mission, all networks must provide layers of security—from the perimeter through the network layers to, ultimately, the data being accessed. Information security professionals ...
Get Security Policies and Implementation Issues, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.