Management Of Information Security
Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
bartleby

Concept explainers

Question
Book Icon
Chapter 4, Problem 19RQ
Program Plan Intro

System-specific security policy (SysSP):

  • SysSP is used to concentrate on a particular type of systems for example firewalls.
  • It will provide a guideline for implementation.
  • The standards or procedures are used for systems when configured and maintained.

Blurred answer
Students have asked these similar questions
All of the following are a part of the CIA triangle except:   a. Integrity     b. Confidentiality     c. Consistency     d. Availability
Provide a list of the many security subfields, explain what each one does, and provide an example of how it may be used.
Create a list of the many subfields that may be found under the umbrella of security, and then provide an explanation for each of these subfields along with an example of how they are used.