Firewall Wizards mailing list archives
Recommened readings for Developing Security Policy / Audit Proced ures
From: "Eissa, Mohamed" <mohamed.eissa () intel com>
Date: Wed, 16 Jul 2003 13:11:21 -0700
Hi, I am looking for a recommended readings about how-to: - developing an I.T. security policy. It would be nice if it includes some case studies. - attack prevention procedures - attack response procedures - post-attack audit - audit procedures to monitor whether security policies are in place I truly appreciate it if anyone can help me out. Best regards, Eissa, M. intel of Canada, Ltd. _______________________________________________ firewall-wizards mailing list firewall-wizards () honor icsalabs com http://honor.icsalabs.com/mailman/listinfo/firewall-wizards
Current thread:
- Recommened readings for Developing Security Policy / Audit Proced ures Eissa, Mohamed (Jul 18)
- Re: Recommened readings for Developing Security Policy / Audit Proced ures Paul Ammann (Jul 19)
- Re: Recommened readings for Developing Security Policy / Audit Proced ures Gwendolynn ferch Elydyr (Jul 20)
- <Possible follow-ups>
- Re: Recommened readings for Developing Security Policy / Audit Proced ures Mitchell Rowton (Jul 19)