Corporate Computer Security 4th Edition by Boyle Panko Solution Manual

Page 1

NOT FOR DISTRIBUTION TO STUDENTS

Instructor’s Manual

Chapter 2

Planning and Policy Learning Objectives By the end of this chapter, the student should be able to:  Justify the need for formal management processes.  Explain the plan-protect-respond security management cycle.  Describe compliance laws and regulations.  Describe organizational security issues.  Describe risk analysis.  Describe technical security infrastructure.  Explain policy-driven implementation.  Know governance frameworks.

Teaching Suggestions Special Issues This is a longer chapter than the others and may require additional time to cover it adequately.

Role in the Book Chapter 1 surveyed the security threats that corporations face today. Chapter 2 and the remaining chapters deal with the management of defenses against these and future threats.

Copyright © 2015 Pearson Education, Inc.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.