Solved

Need books or online materials to plan a security strategy.

Posted on 2003-11-02
2
240 Views
Last Modified: 2010-04-11
I'm looking for books, online materials whatever that will help define a security strategy for more company. Information must be somewhat broad and easy to read but aid me in creating an overall plan. My company is separated geographically with in a small area and several public use labs. We have close to 1200 pcs. Like a small college.
0
Comment
Question by:Fubyou
2 Comments
 
LVL 21

Accepted Solution

by:
jvuz earned 125 total points
Comment Utility
http://www.amazon.com/exec/obidos/tg/detail/-/0072224630/qid=1067845858/sr=8-1/ref=sr_8_1/103-2517120-6504666?v=glance&n=507846

Create and implement a successful security and disaster recovery program. Recognize potential vulnerabilities in your current system.
This guide provides you with a roadmap for developing an end-to-end security program. You'll discover methods for proactively protecting your network before a security breach occurs. Covering the earliest phases of plan development, team organization and training, to technology deployment and incident recovery strategies, this book combines conceptual explanations with checklists at the end of every chapter. Understand the laws and regulations affecting information security programs; Deploy new projects and technologies in a cost-effective manner; Define requirements and establish policies and procedures for your organization; Respond to incidents and disasters in a systematic fashion to minimize loss or damage to valuable data; Learn to identify, hire - and keep - security professionals and establish the reporting structure for the information security department; Introduce human controls, including staff awareness, to help improve security; Discover how audits and penetration tests can help in assessing risk; Assemble an incident response team and set priorities and goals for each member.

0
 

Author Comment

by:Fubyou
Comment Utility
good and I can download it in adobe acrobat also!!!
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Android Security Model 3 68
Virus Kronos 4 62
Login to computer through Admin Priviligies 9 46
Set cookies HttpOnly and Secure 4 50
Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now