O'Reilly logo

The Business Case For Network Security: Advocacy, Governance, And Roi by Warren Saxe, Catherine Paquet

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Essential Elements of Security Policy Development

Security policies ensure that effective security measures are implemented correctly and consistently across an organization. Security policies determine which hard, soft, tangible, and intangible assets need to be protected—and how to protect them.

They further ensure that monies invested in equipment and training personnel are properly used and aptly deployed.

Effective security policy formulation provides a comprehensive framework that employees can use to reduce inadvertent errors that could compromise a system. The establishment of rules can aid organizations in their attempt to protect against poor software configuration, weak password formation, careless users, inadequate system ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required