Home Page Icon
Home Page
Table of Contents for
Security Program and Policies: Principles and Practices, Second Edition
Close
Security Program and Policies: Principles and Practices, Second Edition
by Sari Greene
Security Program and Policies: Principles and Practices, Second Edition
About This eBook
Title Page
Copyright Page
Contents at a Glance
Table of Contents
About the Author
Dedication
Acknowledgments
We Want to Hear from You!
Reader Services
Chapter 1. Understanding Policy
Looking at Policy Through the Ages
Information Security Policy
Information Security Policy Lifecycle
Summary
References
Chapter 2. Policy Elements and Style
Policy Hierarchy
Policy Format
Writing Style and Technique
Summary
References
Chapter 3. Information Security Framework
CIA
Information Security Framework
Summary
References
Chapter 4. Governance and Risk Management
Understanding Information Security Policies
Information Security Governance
Information Security Risk
Summary
References
Chapter 5. Asset Management
Information Assets and Systems
Information Classification
Labeling and Handling Standards
Information Systems Inventory
Summary
References
Chapter 6. Human Resources Security
The Employee Lifecycle
The Importance of Employee Agreements
The Importance of Security Education and Training
Summary
References
Chapter 7. Physical and Environmental Security
Understanding the Secure Facility Layered Defense Model
Protecting Equipment
Summary
References
Chapter 8. Communications and Operations Security
Standard Operating Procedures (SOPs)
Operational Change Control
Malware Protection
Data Replication
Secure Messaging
Activity Monitoring and Log Analysis
Service Provider Oversight
Summary
References
Chapter 9. Access Control Management
Access Control Fundamentals
Infrastructure Access Controls
User Access Controls
Summary
References
Chapter 10. Information Systems Acquisition, Development, and Maintenance
System Security Requirements
Secure Code
Cryptography
Summary
References
Chapter 11. Information Security Incident Management
Organizational Incident Response
Data Breach Notification Requirements
Summary
References
Chapter 12. Business Continuity Management
Emergency Preparedness
Business Continuity Risk Management
The Business Continuity Plan
Plan Testing and Maintenance
Summary
References
Chapter 13. Regulatory Compliance for Financial Institutions
The Gramm-Leach-Bliley Act (GLBA)
Personal and Corporate Identity Theft
Summary
References
Chapter 14. Regulatory Compliance for the Healthcare Sector
The HIPAA Security Rule
The HITECH Act and the Omnibus Rule
Summary
References
Chapter 15. PCI Compliance for Merchants
Protecting Cardholder Data
PCI Compliance
Summary
References
Appendix A. Information Security Program Resources
National Institute of Standards and Technology (NIST) Special Publications
Federal Financial Institutions Examination Council (FFIEC) IT Handbooks
Department of Health and Human Services HIPAA Security Series
Payment Security Standards Council Documents Library
Information Security Professional Development and Certification Organizations
Appendix B. Sample Information Security Policy
Introduction
Section 1: Governance and Risk Management
Section 2: Asset Management
Section 3: Human Resources Security
Section 4: Physical and Environmental Security
Section 5: Communications and Operations Security
Section 6: Access Control Management
Section 7: Information Systems Acquisition, Development, and Maintenance
Section 8: Incident Management
Section 9: Business Continuity
Appendix C. Information Systems Acceptable Use Agreement and Policy
Information Systems Acceptable Use Agreement
Acceptable Use of Information Systems Policy
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Index
Next
Next Chapter
Images
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset