E-policy is a corporate statement and set-of-rules to protect the organization from casual or intentional abuse that could result in the release of sensitive information, IT system failures or litigation against the organization by employees or other parties.
Security does not come from automated applications, rather it is compromised of security applications or systems, processes and procedures and the personnel to implement both the systems and processes. In order to properly address security, the most fundamental item necessary is a security policy.
[Word Document] This paper represents the security issues related to the use of wireless (vs wired) LAN technology and recommends a number of key implementation guidelines to ensure the secure deployment of wireless LAN services in the company.
[Word Document] Invest the time up front to carefully develop sound policies and then identify ways to gauge their effectiveness and assess the level of compliance within your organization. Commit to spending the time and resources required to ensure that the policies are kept current and accurately reflect your company's security posture.
This paper is intended to address the importance of having a written and enforceable Information Technology (IT) security policy, and to provide an overview of the necessary components of an effective policy.
Generally Accepted System Security Principles, developed by The International Information Security Foundation.
This whitepaper describes the steps needed to develop an organization-wide information security strategy.
A report on Acceptable Usage Policy: what corporations expect of it, a case study, and a framework for creating your own policy.
White paper providing the reader with new and innovative aspects on the process of building a Security Policy, as well as managing a Security Awareness Program.
Non-profit, international research initiative dedicated to defining standards in security testing and business integrity testing.
|