22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 2. Security methodologies<br />

2<br />

In this chapter we look at the processes and procedures for implementing an<br />

overall security infrastructure, from beginning to end. This is a complex<br />

undertaking since it generally involves many people and many functional areas of<br />

the IT infrastructure, and it must also address many security needs and<br />

concerns.<br />

We first look at exactly what is important when considering the implementation of<br />

security measures in an organization, in general areas of concern.<br />

We then look at what exists to help security practitioners: there are a number of<br />

different approaches that can be used to achieve the objective of enterprise-wide<br />

security. These are generally referred to as methodologies. Some are<br />

vendor-specific, some are considered standards. In this chapter we explain their<br />

contents and their scope.<br />

With all this done, we complete the chapter by reviewing a sample methodology<br />

that will put this information into a practical context. We do this to provide the<br />

perspective needed to understand the ramifications of implementing<br />

enterprise-wide security.<br />

© Copyright <strong>IBM</strong> Corp. 2004. All rights reserved. 43

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!