CISSP For Dummies

There are several conceptual best practices for protecting the integrity of the business and of the information that makes it go. These best practices all have to do with how people - not technology - work to support the business.

An organization needs to put together its policies and procedures in order to facilitate the use and protection of information. This is collectively known as administrative management and control. For starters, before an employer hires a new security-related person, the hiring manager should document the job requirements and specifications to ensure that the hiring manager knows exactly what skills this position requires. Of course, this is only the tip of the iceberg. The essential activities to achieve this end are

 Instant Answer   Configuration management is the process (or processes) of actively managing the configuration of every system, device, and application, so that the details of every configuration change are recorded someplace.

 Tip   ISO 27001: The code of practice for data security

Putting together a comprehensive data security plan can take considerable effort for any organization, regardless of the size of the organization. But you need not start from scratch; instead, get yourself a copy of ISO 27001 (previously known also as ISO 17799). This code contains guidance for every facet of organizational activity concerned with the protection of information assets. The only disadvantage of ISO 27001 is that it’s not free. You must purchase it online from www.iso.org.

Категории