- Introduction
- Basic Security Principles
- Data Management: Determine and Maintain Ownership
- Data Standards
- Data Security, Protection, Sharing, and Dissemination
- Classifying Information and Supporting Assets
- Asset Management and Governance
- Determine Data Security Controls
- Laws, Standards, Mandates and Resources
- Exam Prep Questions
- Answers to Exam Prep Questions
- Need to Know More?
Need to Know More?
Data valuation: www.cio.com/article/2375569/cio-role/why-cios-must-own-data-valuation.html
Understanding FIPS guidelines: www.sans.org/reading-room/whitepapers/standards/securing-sensitive-data-understanding-federal-information-processing-standards-fips-549
ISO27002 overview: en.wikipedia.org/wiki/ISO/IEC_27002
Site security: www.faqs.org/rfcs/rfc2196.html
IT asset management: searchcio.techtarget.com/definition/IT-asset-management-information-technology-asset-management
Building effective security policies: www.sans.org/security-resources/policies/
IT security baselines: www.securestate.com/services/minimum-security-baselines
Building effective policy: csrc.nist.gov/nissc/1997/panels/isptg/pescatore/html/
Hard drive disposal: www.semshred.com/contentmgr/showdetails.php/id/2480