Management of Information Security (MindTap Course List)
5th Edition
ISBN: 9781305501256
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 9, Problem 4RQ
Explanation of Solution
Gold standard in Infosec practices:
- In InfoSec, two categories of terms describing security practices are commonly used:
- Standards of due care and due intelligence
- Recommended practices or best security practices
- The very best recommended practices are normally referred to as the Gold Standard.
- The gold standard demonstrates the industrial leadership, quality, and concern for the information protection.
Justification:
- csrc.nist.gov/groups/SMA/fasp/index.html, are used to publish the criteria for gold standard in InfoSec practices.
- But this site was archived in August 2015 and is now considered historical information.
- There are no published criteria for the gold standard now.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
What is the stated purpose of the SANS organization? In what ways is it involved inprofessional certification for InfoSec professionals?
What exactly is JAD? When compared to standard information-gathering procedures, what makes it superior? What are some of its shortcomings?
Chapter 9 Solutions
Management of Information Security (MindTap Course List)
Ch. 9 - Prob. 4RQCh. 9 - Prob. 8RQCh. 9 - Prob. 9RQCh. 9 - Prob. 10RQCh. 9 - Prob. 11RQCh. 9 - Prob. 12RQCh. 9 - Prob. 13RQCh. 9 - List and describe the fields found in a properly...Ch. 9 - Prob. 15RQCh. 9 - Prob. 16RQ
Ch. 9 - Prob. 1RQCh. 9 - Prob. 2RQCh. 9 - Prob. 3RQCh. 9 - Prob. 5RQCh. 9 - Prob. 6RQCh. 9 - Prob. 7RQCh. 9 - Prob. 17RQCh. 9 - Prob. 18RQCh. 9 - Prob. 19RQCh. 9 - Prob. 20RQCh. 9 - Prob. 1ECh. 9 - Prob. 3ECh. 9 - Prob. 4ECh. 9 - Prob. 1DQCh. 9 - Prob. 2DQCh. 9 - Prob. 1EDMCh. 9 - Prob. 2EDMCh. 9 - Prob. 3EDM
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,