O'Reilly logo

Writing Information Security Policies by Scott Barman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Identify What Is to Be Protected

In the first few pages of this book, I have repeated that the information security policies must protect the company’s mission or business process. I did this because it is a common mistake to try to look at the computers and software from a technical point of view instead of why they were purchased. If you remember that computers are the tools for processing the company’s intellectual property, the disks are for storing that property, and the networks are for allowing that information to flow through the various business processes, then you are well on your way to writing coherent, enforceable security policies.

Hardware and Software

Supporting those business processes are the hardware and software components ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required