BuyFindarrow_forward

Management Of Information Security

6th Edition
WHITMAN + 1 other
Publisher: Cengage Learning,
ISBN: 9781337405713

Solutions

Chapter
Section
BuyFindarrow_forward

Management Of Information Security

6th Edition
WHITMAN + 1 other
Publisher: Cengage Learning,
ISBN: 9781337405713
Chapter 8, Problem 1DQ
Textbook Problem
87 views

Based on your understanding of the chapter, from which NIST Special Publication did Iris draw her initial checklist?

Program Plan Intro

NIST:

  • National Institute of Standards and Technology (NIST) is the National Security Telecommunications and Information system Security Committee document. This document offerings a complete model for information security.
  • It mentions the documentation of performance measurements in a regular format to guarantee the repeatability of the measurement collection, development, customization and reporting activities.

Explanation of Solution

Justification:

  • Iris used data classification model for drawing her checklist. The company thinks that it is authoritative about the data that should be classified for giving much needed security.
  • The general data classification model will include three types namely, confidential, internal and external.
    • These are very simple system. So, specific company is able to secure the necessary details relating to the customer data, personnel data and even the general internal communications.

The simple system has been used as follows:

  • Public
    • Used for the public propagation such as advertisement or even the release of the press...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Chapter 8 Solutions

Management Of Information Security
Show all chapter solutions
add

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Show solutions add
What is a honeypot? How is it different from a honeynet?

Principles of Information Security (MindTap Course List)

What is a common problem in calculating start and finish times? Provide an example.

Systems Analysis and Design (Shelly Cashman Series) (MindTap Course List)

Investigate and discuss some of the characteristics of the materials that used in bridge construction.

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

Solve Problem 7.7-13 by using Mohr’s circle for plane strain.

Mechanics of Materials (MindTap Course List)

What is a journeyperson?

Precision Machining Technology (MindTap Course List)

List types of mobile devices. Describe features of a smartphone.

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

If your motherboard supports ECC DDR3 memory, can you substitute non-ECC DDR3 memory?

A+ Guide to Hardware (Standalone Book) (MindTap Course List)