Search ID

www.giac.org

This paper is intended to address the importance of having a written and enforceable Information Technology (IT) security policy, and to provide an overview of the necessary components of an effective policy.

URLs from www.giac.org:

URL: http://www.giac.org/ URL: http://www.giac.org/paper/gsec/1863/basics-security-policy/103278 URL: http://www.giac.org/paper/gsec/1691/good-security-policy-necessary/103074 URL: http://www.giac.org/paper/gsec/1811/develop-good-security-policies-tips-assessment-enforcement/102142 URL: http://www.giac.org