Skip to Main Content
Information Security: Contemporary Cases
book

Information Security: Contemporary Cases

by Marie A. Wright, John S. Kakalik
August 2010
Intermediate to advanced content levelIntermediate to advanced
214 pages
9h 49m
English
Jones & Bartlett Learning
Content preview from Information Security: Contemporary Cases
Facilitating Information Security Compliance 135
T
ABLE 5-5 Minimum Security Control Requirements
(continued)
C
LASS FAMILY S
PECIFIC SECURITY CONTROLS
13. Supervision and Review—
Access Control
14. Permitted Actions Without
Identification or Authentication
15. Automated Marking
16. Automated Labeling
17. Remote Access
18. Wireless Access Restrictions
19. Access Control for Portable and
Mobile Systems
20. Personally Owned Information
Systems
Audit and 1. Audit and Accountability
Accountability Policy and Procedures
2. Auditable Events
3. Content of Audit Records
4. Audit Storage Capacity
5. Audit Processing
6. Audit Monitoring, Analysis,
and Reporting
7. Audit ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Executive Guide to Information Security, The: Threats, Challenges, and Solutions

Executive Guide to Information Security, The: Threats, Challenges, and Solutions

Mark Egan
Breaking into Information Security

Breaking into Information Security

Josh More, Anthony J. Stieber, Chris Liu

Publisher Resources

ISBN: 9780763738198