Information Security Policy

Information Security Policy

Lech J. Janczewski (University of Auckland, New Zealand) and Andrew M. Colarik (University of Auckland, New Zealand)
DOI: 10.4018/978-1-59140-583-2.ch013
OnDemand PDF Download:
$37.50

Abstract

In Chapter 12, we discussed most of the information security issues that are important to IT managers, especially in the current situation of increased attacks. Perhaps the most visible and important document that relates to the attitude of management towards security issues is the Information Security Policy (ISP). (Please note that the most common understanding of the abbreviation ISP is Internet Services Provider. For clarity within this chapter only, ISP means Information Security Policy.) This document reflects all the decisions and activities required to set up a clear set of rules and procedures for company employees in terms of protecting information assets. The ISP is also used to:

Complete Chapter List

Search this Book:
Reset
Dedication
Lech Janczewski, Andrew Colarik
Table of Contents
Acknowledgments
Lech Janczewski, Andrew Colarik
Chapter 1
Lech J. Janczewski, Andrew M. Colarik
The current state of the information security domain in the United States and much of the rest of the industrialized world can best be characterized... Sample PDF
Information and Computer Security
$37.50
Chapter 2
Lech J. Janczewski, Andrew M. Colarik
The events surrounding the attacks against the World Trade Center (February 26, 1993 and September 11, 2001) and the Pentagon (September 11, 2001)... Sample PDF
The Nature of Terrorism
$37.50
Chapter 3
Cyber-Terrorism  (pages 40-60)
Lech J. Janczewski, Andrew M. Colarik
In this time of increased threats of terrorist attacks, are IT professionals really facing a new type of danger resulting from these activities? In... Sample PDF
Cyber-Terrorism
$37.50
Chapter 4
Physical Security  (pages 61-84)
Lech J. Janczewski, Andrew M. Colarik
The final stage in the execution of the majority of the current waves of terrorist attacks is in the form of an intruder positioning a bomb in the... Sample PDF
Physical Security
$37.50
Chapter 5
Lech J. Janczewski, Andrew M. Colarik
n the early 1960s, programmers used to play memory games on a computer. The objective of the game was to disable as much of the operating system... Sample PDF
Denial of Service Threat
$37.50
Chapter 6
Lech J. Janczewski, Andrew M. Colarik
The mass use of the Internet as a trade and distribution tool has become the source of a new type of attack—the defacement of Web page content. Due... Sample PDF
Web Defacements and Semantic Attacks
$37.50
Chapter 7
DNS Attacks  (pages 106-109)
Lech J. Janczewski, Andrew M. Colarik
The Domain Name Service (DNS) is a mechanism for recognizing and translating domain name addresses. These operations are carried out by devices... Sample PDF
DNS Attacks
$37.50
Chapter 8
Routing Vulnerabilities  (pages 110-118)
Lech J. Janczewski, Andrew M. Colarik
The graphic visualization of the Internet is usually presented as a mesh of connections among millions of nodes engaged in the transmission of... Sample PDF
Routing Vulnerabilities
$37.50
Chapter 9
Identity Stealing Attacks  (pages 119-128)
Lech J. Janczewski, Andrew M. Colarik
In recent years, several feature films have been produced based on the concept of stealing an identity. As a result of deliberate or accidental... Sample PDF
Identity Stealing Attacks
$37.50
Chapter 10
Lech J. Janczewski, Andrew M. Colarik
It is a known fact that terrorists are developing a keen set of technology skills to further their agendas. As previously stated, they use IT for... Sample PDF
Identification, Authentication, and Access Control
$37.50
Chapter 11
Personnel Security  (pages 163-174)
Lech J. Janczewski, Andrew M. Colarik
The importance of security issues relating to personnel policies has and continues to be a factor in the overall protection of organizational... Sample PDF
Personnel Security
$37.50
Chapter 12
Operations Management  (pages 175-198)
Lech J. Janczewski, Andrew M. Colarik
A major focus of this book is guiding IT managers on how to secure the operations of their facilities due to increased threats from terrorist... Sample PDF
Operations Management
$37.50
Chapter 13
Lech J. Janczewski, Andrew M. Colarik
In Chapter 12, we discussed most of the information security issues that are important to IT managers, especially in the current situation of... Sample PDF
Information Security Policy
$37.50
Chapter 14
Lech J. Janczewski, Andrew M. Colarik
Business continuity management is a process aimed at reducing disruptions caused by disasters and security failures that could be the results of... Sample PDF
Business Continuity Management
$37.50
Epilogue: Thoughts for the Future
About the Authors