Security Policies and Risk Analysis

Security Policies and Risk Analysis

Joseph Kizza (The University of Tennessee-Chattanooga, USA) and Florence Migga Kizza (The University of Tennessee-Chattanooga, USA)
Copyright: © 2008 |Pages: 24
DOI: 10.4018/978-1-59904-379-1.ch008
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

In the last chapter, we discussed the basics of network security. Among the issues that we briefly touched on are the techniques and best practices that are currently being used by many security personnel in a variety of networks that make up the communication infrastructure. In this chapter, we are going to start with what is considered to be the most basic of all security techniques—security.policy. We will discuss several issues about security policy, like what constitutes a good policy and how to formulate, develop, write implement, and maintain a security policy.

Complete Chapter List

Search this Book:
Reset