Guidelines for a Comprehensive Security System

Hossein Bidgoli, California State University, Bakersfield

Introduction

Formation of the Security Task Force

Identification of Basic Security Safeguards

Identification of General Security Threats

Identification of Intentional Threats

Identification of Security Measures and Enforcements

Identification of Computer Emergency Response Team Services

The Formation of a Comprehensive Security Plan

Preparing for a Disaster

Conclusion

Glossary

Cross References

References

Further Reading

INTRODUCTION

As has been discussed throughout this Handbook, security issues and threats in a network environment are varied and can be caused intentionally and unintentionally by both insiders and outsiders. Security issues and threats related to a network environment can be categorized as controllable, partially controllable, and uncontrollable. This final chapter presents a series of guidelines that identify various security issues and threats in a network environment and then offers a comprehensive security plan and guidelines for recovery if disaster strikes.

FORMATION OF THE SECURITY TASK FORCE

For the continued success of a security system and to provide a “buy-in” environment, different users of the network and computer systems must have input in the design and implementation of the security system. Users' views must be highly regarded and nobody should feel left out. This issue is of considerable significance, because computer and network systems are ...

Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.