O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Security Policy and Procedures

OBJECTIVES

Understand the basic security concepts and use of security policy and procedures.

  • Much of what information system security deals with is avoiding security incidents and recovering fully when incidents do occur. These activities are only possible as a result of the required planning for developing and implementing a comprehensive security policy. This objective covers the areas a security policy addresses and the procedures necessary for implementation.

OUTLINE

Introduction

Policies

Standard

Guidelines

Procedures

Security Policy

Acceptable Use

Business Liability

Due Care

Privacy

Separation of Duties

Need to Know

Password Management

Password Rules

Securing Removable Media with Disposal and Destruction ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required