B

B2B (business-to-business) transactions, business exposure and, 11

best practices keeping informed, 297 scope and, 329

bluejacking, 461 bluesnarfing, 461 Bluetooth attacks, 459-463 boundaries, 265 break-even analysis, cost of security and, 14 Briney, Andrew, 88 budget spending, 6, 27 as constraint, 42, 48 corporate security plans and,

228, 248-253, 257, 259 developing details of, 337 executives' views on, 88 finalizing, 330 infrastructure security plans and, 414, 431, 439 making a case for, 7, 11, 28 operational security plans and,

569, 586, 595 planning for, 12 risk assessment and, 274,

288-293 security project planning and,

130, 132, 138, 146 staffing and, 105 wireless security plans and, 480, 494, 508, 515 business exposure, 11 business information, 268 business operations, auditing, 278 business plans, examining, 5 business-to-business (B2B) transactions, business exposure and, 11

CFAA (Computer Fraud and

Abuse Act), 199 change management, 63, 158-161, 166 procedures for, 84, 91 change requests, closing out, 172, 187

CIA (confidentiality, integrity and availability), 33-35 CISP (Corporate IT Security

Project), 59 close-out process, 169-188, 186 corporate security plans and, 252, 259 communication, 65, 102, 114, 141

four C's of, 140, 146 tools for, 112 communications team, 108 competencies, 100-105, 114 completion criteria, 86, 92, 128, 145

compliance, 134, 150 challenges and, 199 fallacies and, 560 infrastructure security plans and, 354, 412 operational security plans and,

559-565, 574, 585 reporting and, 181-184, 188,

309 users and, 141

wireless security plans and, 490

See also entries at legal

Computer Economics data on security spending, 6, 9 Computer Fraud and Abuse Act

(CFAA), 199 Computer Security Incident

Response Teams (CSIRTs), 85

Computer Security Institute, 141 confidential data, 33, 282 confidentiality, integrity and availability (CIA), 33-35 configuration issues, 218 constraints, 40-44, 56, 131, 247, 258, 336 infrastructure security plans and, 429-430, 439 operational security plans and,

586, 594 setting priorities according to, 43, 48

wireless security plans and, 507, 514

consultants. See experts contact information, 267 contracts, mitigating legal liabilities and, 208 corporate culture, 24, 30 Corporate IT Security Project

(CISP), 59 corporate policies, 24, 56 corporate security plans, 189-259 closing out, 252 key success factors for, 191, 255 legal standards relevant to,

192-212, 255 managing, 252

overview, 212β€”214, 256 parameters of, 224β€”239, 257 strategy for, defining, 190β€”192,

213,255 technology list for, 242-244 top-down/bottom-up approaches and, 248, 259 corporate strategy, 23, 29 cost of security, 4-15, 21

See also budget spending credit card fraud, 282 criteria for project completion, 86,92,128 See also acceptance criteria critical path, 135, 145 cross-boundary testing, 162 CSIRTs (Computer Security Incident Response Teams), 85

customer information federal guidelines for safeguarding, 194 HIPAA and, 195

Business Brains

Business Brains

To Build Your Business It Is Crucial That You Have The Correct Info And Tools And Learn How To Build A Correct Business Plan! This is one area you must pay attention to… There are many areas of a business plan that you may not know about but need to know about. For instance... you may have no idea about an executive summary.

Get My Free Ebook


Post a comment