O'Reilly logo

CyberWar, CyberTerror, CyberCrime: A Guide to the Role of Standards in an Environment of Change and Danger by Mehan E. Julie

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix 1. Gap Analysis Areas of Interest

Area of Interest

Sample documentation

Cybersecurity Planning

Information security policies

 

Organization mission statement

 

Organization roles and responsibilities

 

IT and security organization chart

 

Most current risk assessment

 

Most recent cybersecurity assessments

Incident Response

Incident response plan, processes, and procedures

 

Procedures for incident monitoring and reporting

Risk Management

Cybersecurity risk management plan

 

Vulnerability management plan

Vendor Management

Polices regarding vendor selection, monitoring, cybersecurity responsibilities

 

Service level agreements (SLA)

Network Operations

System security engineering standards and policies

 

Configuration specifications for information systems

 

Secure application ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required