Key Points for This Chapter

  • Information security processes are similar to other company rules, such as normal working hours or personal time off, and you should outline acceptable behavior for members of your organization.

  • Security processes must be clear and accessible so that everyone understands his responsibilities in areas such as acceptable use of computers for business purposes and implications of inappropriate behavior, such as downloading pornography.

  • Security risk analysis should be performed to inventory your organization's assets and to determine those that should be provided the highest level of protection, such as your critical business systems.

  • Security processes should anticipate changes and should be broad in scope, such as covering ...

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.