Hidden fields
Books Books
" Fites et al. [4], who recommend that one take the following steps: 1 . Identify what you are trying to protect. 2. Determine what you are trying to protect it from. 3. Determine how likely the threats are. 4. Implement measures that will protect your... "
A Practical Guide to Security Assessments - Page 241
by Sudhanshu Kairab - 2004 - 520 pages
Limited preview - About this book

The Practice of Network Security: Deployment Strategies for Production ...

Allan Liska - Computers - 2003 - 498 pages
...security policy through a five-step process: 1. Identify what you are trying to protect. 2. Determme what you are trying to protect it from. 3. Determine...how likely the threats are. 4. Implement measures which will protect your assets in a cost-effective manner. 5. Review the process continuously and make...
Limited preview - About this book

Critical Incident Management

Alan B. Sterneckert - Business & Economics - 2003 - 552 pages
...generally accepted approach to follow is suggested by Fites et al. [1989] and includes the following steps: 1. Identify what you are trying to protect. 2. Determine...and make improvements each time a weakness is found. Most of this document is focused on item 4 but the other steps cannot be avoided if an effective plan...
Limited preview - About this book

Cybersecurity Operations Handbook

John Rittinghouse, PhD, CISM, William M. Hancock, PhD, CISSP, CISM - Computers - 2003 - 1287 pages
...the development of site policy is that suggested by Fites' which recommends the following steps: 4 1. Identify what you are trying to protect. 2. Determine...cost-effective manner. 5. Review the process continuously; make improvements each time a weakness is found. Most organizations will concentrate their efforts...
Limited preview - About this book

A Practical Guide to Security Assessments

Sudhanshu Kairab - Business & Economics - 2004 - 520 pages
...security measures. The basic approach as defined in RFC 2196 (Section 1.5) includes the following steps: 8 1. Identify what you are trying to protect. 2. Determine...and make improvements each time a weakness is found. • Security Policies — eg, value of security policies • Architecture — eg, network, firewalls...
Limited preview - About this book

Business Continuity and Disaster Recovery for InfoSec Managers

John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP - Computers - 2011 - 408 pages
...site policy is that suggested by Fites et al. [4], who recommend that one take the following steps: 1 . Identify what you are trying to protect. 2. Determine...and make improvements each time a weakness is found. Most organizations will concentrate their efforts on item four above, but if an effective security...
Limited preview - About this book

IM Instant Messaging Security

John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP - Computers - 2005 - 432 pages
...site security policy is that suggested by Fites [6] which recommends one take the following steps: 1 . Identify what you are trying to protect. 2. Determine...how likely the threats are. 4. Implement measures to protect your assets in a cost-effective manner. 5. Review continuously, make improvements each time...
Limited preview - About this book

Handbook of Information Security, Threats, Vulnerabilities, Prevention ...

Hossein Bidgoli - Business & Economics - 2006 - 1154 pages
...topic, please consult Chapter 81, Hackers, Crackers, and Computer Criminals, and Chapter 82, Hacktivism. 4. Implement measures that will protect your assets in a cost-effective manner. A balance must be found between the cost of protecting information assets and the value of those assets...
Limited preview - About this book




  1. My library
  2. Help
  3. Advanced Book Search