Management Of Information Security, Loose-leaf Version
Management Of Information Security, Loose-leaf Version
5th Edition
ISBN: 9781337685696
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
bartleby

Concept explainers

Expert Solution & Answer
Book Icon
Chapter 9, Problem 4RQ

Explanation of Solution

Gold standard in Infosec practices:

  • In InfoSec, two categories of terms describing security practices are commonly used:
    • Standards of due care and due intelligence
    • Recommended practices or best security practices
  • The very best recommended practices are normally referred to as the Gold Standard.
  • The gold standard demonstrates the industrial leadership, quality, and concern for the information protection.

Justification:

  • csrc.nist.gov/groups/SMA/fasp/index.html, are used to publish the criteria for gold standard in InfoSec practices.
  • But this site was archived in August 2015 and is now considered historical information.
  • There are no published criteria for the gold standard now.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
What is InfoSec governance? What are the five basic outcomes that should be achieved through InfoSec governance?
Assume that you are asked to recommend the professional credit credentials for certain roles in infosec at a large organization. What is your recommendation for the credentials to be held by the CISO? How about for an infosec manager? What would be your recommended certifications for the senior technical staff? For the last question, pick 3 technical roles and know the job title and recommended credentials for each.
What exactly is JAD? When compared to standard information-gathering procedures, what makes it superior? What are some of its shortcomings?
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,