Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 2. Security Policies

Chapter 2. Security Policies

“...Being defeated is often a temporary condition. Giving up is what makes it permanent....”

—Marlene vos Savant

By the end of this chapter, you should know and be able to explain the following:

• What role does a security policy play in my network?

• How do I create a security policy?

• How do I deal with any security policy violations?

• What security policies are appropriate for my organization?

• What are the Security Standards and do they apply to my organization?

Being able to answer these key questions will enable you to understand the overall characteristics and importance of a network security policy.

Having clear, definable, enforceable, and up-to-date security policies is the most essential first step in protecting and securing your people, property, network, and data. Policies provide the foundation for defining acceptable and appropriate behavior within your organization and network. At the most fundamental level, policies form the “rule of law,” which is the legal maxim stating that no one is immune to the law, or in this particular circumstance, no one is immune to the policy. Short- and long-term contractors and consultants can be tied to policy via service-level agreements (SLA) with similar verbiage.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint