Home > Computing and Information Technology > Computer networking and communications > Networking packages > Security Program and Policies: Principles and Practices
Security Program and Policies: Principles and Practices

Security Program and Policies: Principles and Practices

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Everything you need to know about information security programs and policies, in one book Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management Thoroughly updated for today’s challenges, laws, regulations, and best practices The perfect resource for anyone pursuing an information security management career ¿ In today’s dangerous world, failures in information security can be catastrophic. Organizations must protect themselves. Protection begins with comprehensive, realistic policies. This up-to-date guide will help you create, deploy, and manage them. Complete and easy to understand, it explains key concepts and techniques through real-life examples. You’ll master modern information security regulations and frameworks, and learn specific best-practice policies for key industry sectors, including finance, healthcare, online commerce, and small business. ¿ If you understand basic information security, you’re ready to succeed with this book. You’ll find projects, questions, exercises, examples, links to valuable easy-to-adapt information security policies...everything you need to implement a successful information security program. ¿ Learn how to ·¿¿¿¿¿¿¿¿ Establish program objectives, elements, domains, and governance ·¿¿¿¿¿¿¿¿ Understand policies, standards, procedures, guidelines, and plans—and the differences among them ·¿¿¿¿¿¿¿¿ Write policies in “plain language,” with the right level of detail ·¿¿¿¿¿¿¿¿ Apply the Confidentiality, Integrity & Availability (CIA) security model ·¿¿¿¿¿¿¿¿ Use NIST resources and ISO/IEC 27000-series standards ·¿¿¿¿¿¿¿¿ Align security with business strategy ·¿¿¿¿¿¿¿¿ Define, inventory, and classify your information and systems ·¿¿¿¿¿¿¿¿ Systematically identify, prioritize, and manage InfoSec risks ·¿¿¿¿¿¿¿¿ Reduce “people-related” risks with role-based Security Education, Awareness, and Training (SETA) ·¿¿¿¿¿¿¿¿ Implement effective physical, environmental, communications, and operational security ·¿¿¿¿¿¿¿¿ Effectively manage access control ·¿¿¿¿¿¿¿¿ Secure the entire system development lifecycle ·¿¿¿¿¿¿¿¿ Respond to incidents and ensure continuity of operations ·¿¿¿¿¿¿¿¿ Comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS ¿

Table of Contents:
Chapter 1: Understanding Policy 2 Looking at Policy Through the Ages....................................................................3     The Bible as Ancient Policy ........................................................................4     The United States Constitution as a Policy Revolution ..............................5     Policy Today ...............................................................................................5 Information Security Policy ..................................................................................7     Successful Policy Characteristics ...............................................................8     The Role of Government ...........................................................................13 Information Security Policy Lifecycle ................................................................16     Policy Development ..................................................................................17     Policy Publication .....................................................................................18     Policy Adoption .........................................................................................19     Policy Review ............................................................................................20 Test Your Skills ..................................................................................................22   Chapter 2: Policy Elements and Style 32 Policy Hierarchy .................................................................................................32     Standards..................................................................................................33     Baselines ...................................................................................................34     Guidelines .................................................................................................34     Procedures ................................................................................................35     Plans and Programs..................................................................................36 Policy Format .....................................................................................................36     Policy Audience ........................................................................................36     Policy Format Types .................................................................................37     Policy Components ...................................................................................38 Writing Style and Technique ..............................................................................48     Using Plain Language ...............................................................................48     The Plain Language Movement ................................................................49     Plain Language Techniques for Policy Writing .........................................50 Test Your Skills ..................................................................................................54   Chapter 3: Information Security Framework 64 CIA .....................................................................................................................65     What Is Confidentiality? ............................................................................66     What Is Integrity? ......................................................................................68     What Is Availability? ..................................................................................69     Who Is Responsible for CIA? ....................................................................72 Information Security Framework .......................................................................72     What Is NIST’s Function? .........................................................................72     What Does the ISO Do? ............................................................................74     Can the ISO Standards and NIST Publications Be Used to Build a Framework? ......75 Test Your Skills ..................................................................................................82   Chapter 4: Governance and Risk Management 92 Understanding Information Security Policies ....................................................93     What Is Meant by Strategic Alignment? ...................................................94     Regulatory Requirements .........................................................................94     User Versions of Information Security Policies .........................................94     Vendor Versions of Information Security Policies .....................................95     Client Synopsis of Information Security Policies ......................................95     Who Authorizes Information Security Policy? ...........................................96     Revising Information Security Policies: Change Drivers ...........................97     Evaluating Information Security Polices ...................................................97 Information Security Governance ....................................................................100     What Is a Distributed Governance Model? .............................................101     Regulatory Requirements .......................................................................104 Information Security Risk ................................................................................105     Is Risk Bad? ............................................................................................105     Risk Appetite and Tolerance ...................................................................106     What Is a Risk Assessment? ...................................................................106     Risk Assessment Methodologies ............................................................108     What Is Risk Management? ....................................................................109 Test Your Skills ................................................................................................113   Chapter 5: Asset Management 124 Information Assets and Systems .....................................................................125     Who Is Responsible for Information Assets? ..........................................126 Information Classification ................................................................................128     How Does the Federal Government Classify Data? ...............................129     Why Is National Security Information Classified Differently? ..................131     Who Decides How National Security Data Is Classified? .......................133     How Does the Private Sector Classify Data?..........................................134     Can Information Be Reclassified or Even Declassified? .........................135 Labeling and Handling Standards ...................................................................136     Why Label? .............................................................................................136     Why Handling Standards? ......................................................................136 Information Systems Inventory ........................................................................139     What Should Be Inventoried? .................................................................139 Test Your Skills ................................................................................................145   Chapter 6: Human Resources Security 156 The Employee Lifecycle ...................................................................................157     What Does Recruitment Have to Do with Security? ...............................158     What Happens in the Onboarding Phase? .............................................165     What Is User Provisioning? .....................................................................166     What Should an Employee Learn During Orientation? ...........................167     Why Is Termination Considered the Most Dangerous Phase? ...............168 The Importance of Employee Agreements ......................................................170     What Are Confidentiality or Non-disclosure Agreements? .....................170     What Is an Acceptable Use Agreement? ................................................170 The Importance of Security Education and Training .......................................172     What Is the SETA Model? .......................................................................173 Test Your Skills ................................................................................................177   Chapter 7: Physical and Environmental Security 188 Understanding the Secure Facility Layered Defense Model .....................190     How Do We Secure the Site? .................................................................190     How Is Physical Access Controlled? ......................................................192 Protecting Equipment ......................................................................................196     No Power, No Processing? .....................................................................196     How Dangerous Is Fire? .........................................................................198     What About Disposal? ............................................................................200     Stop, Thief! ..............................................................................................203 Test Your Skills ................................................................................................207   Chapter 8: Communications and Operations Security 218 Standard Operating Procedures (SOPs) .........................................................219     Why Document SOPs? ...........................................................................220     Developing SOPs ....................................................................................220 Operational Change Control ............................................................................225     Why Manage Change? ...........................................................................225     Why Is Patching Handled Differently? ....................................................228 Malware Protection..........................................................................................230     Are There Different Types of Malware? ..................................................231     How Is Malware Controlled? ...................................................................233     What Is Antivirus Software? ....................................................................234 Data Replication ..............................................................................................235     Is There a Recommended Backup or Replication Strategy? ..................235 Secure Messaging ...........................................................................................237     What Makes Email a Security Risk? .......................................................237     Are Email Servers at Risk? ......................................................................240 Activity Monitoring and Log Analysis ..............................................................242     What Is Log Management? .....................................................................242 Service Provider Oversight ..............................................................................245     What Is Due Diligence? ...........................................................................245     What Should Be Included in Service Provider Contracts? .....................247 Test Your Skills ................................................................................................252   Chapter 9: Access Control Management 264 Access Control Fundamentals ........................................................................265     What Is a Security Posture? ...................................................................266     How Is Identity Verified? .........................................................................266     What Is Authorization? ............................................................................270 Infrastructure Access Controls ........................................................................272     Why Segment a Network? ......................................................................272     What Is Layered Border Security? ..........................................................273     Remote Access Security .........................................................................277 User Access Controls ......................................................................................282     Why Manage User Access? ....................................................................282     What Types of Access Should Be Monitored? .......................................284 Test Your Skills ................................................................................................289   Chapter 10: Information Systems Acquisition, Development, and Maintenance 300 System Security Requirements .......................................................................301 Secure Code ....................................................................................................306 Cryptography ...................................................................................................310 Test Your Skills ................................................................................................318   Chapter 11: Information Security Incident Management 328 Organizational Incident Response ...................................................................329     What Is an Incident? ...............................................................................330     How Are Incidents Reported? .................................................................334     What Is an Incident Response Program? ...............................................335     What Happened? Investigation and Evidence Handling ........................340 Data Breach Notification Requirements ..........................................................345     Is There a Federal Breach Notification Law? ..........................................347     Does Notification Work? .........................................................................351 Test Your Skills ................................................................................................355   Chapter 12: Business Continuity Management 370 Emergency Preparedness ...............................................................................371     What Is a Resilient Organization? ...........................................................372 Business Continuity Risk Management ...........................................................374     What Is a Business Continuity Threat Assessment? ..............................375     What Is a Business Continuity Risk Assessment? ..................................376     What Is a Business Impact Assessment? ...............................................378 The Business Continuity Plan ..........................................................................380     Roles and Responsibilities ......................................................................381     Disaster Response Plans ........................................................................384     Operational Contingency Plans ..............................................................387     The Disaster Recovery Phase .................................................................388     The Resumption Phase ...........................................................................391 Plan Testing and Maintenance ........................................................................392     Why Is Testing Important? ......................................................................392     Plan Maintenance ...................................................................................393 Test Your Skills ................................................................................................397   Chapter 13: Regulatory Compliance for Financial Institutions 408 The Gramm-Leach-Bliley Act (GLBA) ..............................................................409     What Is a Financial Institution? ...............................................................410     What Are the Interagency Guidelines? ...................................................412     What Is a Regulatory Examination? ........................................................423 Personal and Corporate Identity Theft ............................................................424     What Is Required by the Interagency Guidelines Supplement A? ..........425     What Is Required by the Supplement to the Authentication in an Internet Banking Environment Guidance? ...427 Test Your Skills ................................................................................................431   Chapter 14: Regulatory Compliance for the Healthcare Sector 442 The HIPAA Security Rule .................................................................................444     What Is the Objective of the HIPAA Security Rule? ................................444     Enforcement and Compliance ................................................................445     How Is the HIPAA Security Rule Organized? ..........................................445     What Are the Physical Safeguards? .......................................................455     What Are the Technical Safeguards? .....................................................458     What Are the Organizational Requirements? ..........................................461     What Are the Policies and Procedures Standards? ................................463 The HITECH Act and the Omnibus Rule..........................................................464     What Changed for Business Associates? ...............................................465     What Are the Breach Notification Requirements? ..................................468 Test Your Skills ................................................................................................471   Chapter 15: PCI Compliance for Merchants 482 Protecting Cardholder Data .............................................................................483     What Is the PCI DDS Framework? ..........................................................486     Business-as-Usual Approach .................................................................487     What Are the PCI Requirements? ...........................................................487 PCI Compliance ...............................................................................................499     Who Is Required to Comply with PCI DSS? ...........................................499     What Is a Data Security Compliance Assessment? ................................500     What Is the SAQ?....................................................................................502     Are There Penalties for Noncompliance? ...............................................503 Test Your Skills ................................................................................................505   Appendix A: Information Security Program Resources 516 National Institute of Standards and Technology (NIST) Special Publications ..........516 Federal Financial Institutions Examination Council (FFIEC) IT Handbooks .....518 Department of Health and Human Services HIPAA Security Series ...............518 Payment Security Standards Council Documents Library ..............................518 Information Security Professional Development and Certification Organizations ......519   Appendix B: Sample Information Security Policy 520   Appendix C: Sample Information Systems Acceptable Use Agreement and Policy 568   Index  


Best Sellers


Product Details
  • ISBN-13: 9780133481174
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson It Certification
  • Language: English
  • Sub Title: Principles and Practices
  • ISBN-10: 0133481174
  • Publisher Date: 20 Mar 2014
  • Binding: Digital download
  • No of Pages: 648
  • Weight: 1 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Security Program and Policies: Principles and Practices
Pearson Education (US) -
Security Program and Policies: Principles and Practices
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Security Program and Policies: Principles and Practices

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA