Skip to Content
How to Complete a Risk Assessment in 5 Days or Less
book

How to Complete a Risk Assessment in 5 Days or Less

by Thomas R. Peltier
November 2008
Intermediate to advanced content levelIntermediate to advanced
444 pages
13h 38m
English
Auerbach Publications
Content preview from How to Complete a Risk Assessment in 5 Days or Less
Appendix L: Gap Analysis Examples  379
11.4.4 Remote
Diagnostic and
Configuration
Port Protection
Physical and logical access to
diagnostic and configuration ports
should be controlled.
11.4.5
Segregation in
Networks
Groups of information services, users,
and information systems should be
segregated on networks.
1.1.4
Description of the groups,
roles, and responsibilities
standards must be
implemented.
11.4.6
Network
Connection
Control
For shared networks, especially those
extending across the organization’s
boundaries, the capability of users to
connect to the network should be
restricted, in line with the access
control policy and requirements ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

How to Become a Game-Changing Leader

How to Become a Game-Changing Leader

Douglas A. Ready, Alan Mulally
Risk Assessment for Asset Owners

Risk Assessment for Asset Owners

Alan Calder, Steve Watkins
What Successful Project Managers Do

What Successful Project Managers Do

W. Scott Cameron, Jeffrey S. Russell, Edward J. Hoffman, Alexander Laufer

Publisher Resources

ISBN: 9781420062762