Fites et al. [4], who recommend that one take the following steps: 1 . Identify what you are trying to protect. 2. Determine what you are trying to protect it from. 3. Determine how likely the threats are. 4. Implement measures that will protect your... A Practical Guide to Security Assessments - Page 241by Sudhanshu Kairab - 2004 - 520 pagesLimited preview - About this book
| Allan Liska - Computers - 2003 - 498 pages
...security policy through a five-step process: 1. Identify what you are trying to protect. 2. Determme what you are trying to protect it from. 3. Determine...how likely the threats are. 4. Implement measures which will protect your assets in a cost-effective manner. 5. Review the process continuously and make... | |
| Alan B. Sterneckert - Business & Economics - 2003 - 552 pages
...generally accepted approach to follow is suggested by Fites et al. [1989] and includes the following steps: 1. Identify what you are trying to protect. 2. Determine...and make improvements each time a weakness is found. Most of this document is focused on item 4 but the other steps cannot be avoided if an effective plan... | |
| John Rittinghouse, PhD, CISM, William M. Hancock, PhD, CISSP, CISM - Computers - 2003 - 1287 pages
...the development of site policy is that suggested by Fites' which recommends the following steps: 4 1. Identify what you are trying to protect. 2. Determine...cost-effective manner. 5. Review the process continuously; make improvements each time a weakness is found. Most organizations will concentrate their efforts... | |
| Sudhanshu Kairab - Business & Economics - 2004 - 520 pages
...security measures. The basic approach as defined in RFC 2196 (Section 1.5) includes the following steps: 8 1. Identify what you are trying to protect. 2. Determine...and make improvements each time a weakness is found. • Security Policies — eg, value of security policies • Architecture — eg, network, firewalls... | |
| John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP - Computers - 2011 - 408 pages
...site policy is that suggested by Fites et al. [4], who recommend that one take the following steps: 1 . Identify what you are trying to protect. 2. Determine...and make improvements each time a weakness is found. Most organizations will concentrate their efforts on item four above, but if an effective security... | |
| John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP - Computers - 2005 - 432 pages
...site security policy is that suggested by Fites [6] which recommends one take the following steps: 1 . Identify what you are trying to protect. 2. Determine...how likely the threats are. 4. Implement measures to protect your assets in a cost-effective manner. 5. Review continuously, make improvements each time... | |
| Hossein Bidgoli - Business & Economics - 2006 - 1154 pages
...topic, please consult Chapter 81, Hackers, Crackers, and Computer Criminals, and Chapter 82, Hacktivism. 4. Implement measures that will protect your assets in a cost-effective manner. A balance must be found between the cost of protecting information assets and the value of those assets... | |
| |