Home > Articles

  • Print
  • + Share This
This chapter is from the book

This chapter is from the book

Creating Security Policies

In addition to the technical methods used to secure networks and computers, via electronic rules, it's important to create rules for the people that will be using those computers and networks. Many times, you cannot engineer away the cause of the problem: the user. Having a clearly defined security policy is critical to the success of any risk management plan.

  • + Share This
  • 🔖 Save To Your Account