Computer Security Handbook 2012
DOI: 10.1002/9781118820650.ch66
|View full text |Cite
|
Sign up to set email alerts
|

Developing Security Policies

Abstract: CHAPTER 46DEVELOPING SECURITY POLICIES M. E. Kabay 46.1 INTRODUCTION. This chapter reviews methods for developing security policies. Some of the other chapters of this Handbook that bear on policy content, development, and implementation are as follows:Chapter 15 provides an extensive overview of physical security policies.Chapter 18 discusses local area network security issues and policies.Chapter 25 reviews software development policies and quality assurance policies.Chapter 28 presents principles, topics, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…Access controls, for example, can be considered as an effective measure that is enforced by certain security policies. These controls restrict users from series of actions such as downloading files from the internet, installing programs and accessing certain parts of a computer network (Barman, 2002;Kabay, 2002). With respect to enforcing security policies, these restrictions may be problematic in high power distance cultures because adoption of power reducing technologies would be limited in such cultures (Straub et al, 1997).…”
Section: Ics 262mentioning
confidence: 99%
“…Access controls, for example, can be considered as an effective measure that is enforced by certain security policies. These controls restrict users from series of actions such as downloading files from the internet, installing programs and accessing certain parts of a computer network (Barman, 2002;Kabay, 2002). With respect to enforcing security policies, these restrictions may be problematic in high power distance cultures because adoption of power reducing technologies would be limited in such cultures (Straub et al, 1997).…”
Section: Ics 262mentioning
confidence: 99%