Home > Articles

  • Print
  • + Share This
This chapter is from the book

This chapter is from the book

Need to Know More?

Data valuation: www.cio.com/article/2375569/cio-role/why-cios-must-own-data-valuation.html

Understanding FIPS guidelines: www.sans.org/reading-room/whitepapers/standards/securing-sensitive-data-understanding-federal-information-processing-standards-fips-549

ISO27002 overview: en.wikipedia.org/wiki/ISO/IEC_27002

Site security: www.faqs.org/rfcs/rfc2196.html

IT asset management: searchcio.techtarget.com/definition/IT-asset-management-information-technology-asset-management

Building effective security policies: www.sans.org/security-resources/policies/

IT security baselines: www.securestate.com/services/minimum-security-baselines

Building effective policy: csrc.nist.gov/nissc/1997/panels/isptg/pescatore/html/

Hard drive disposal: www.semshred.com/contentmgr/showdetails.php/id/2480

  • + Share This
  • 🔖 Save To Your Account