Management Of Information Security
Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
bartleby

Concept explainers

Question
Book Icon
Chapter 4, Problem 19RQ
Program Plan Intro

System-specific security policy (SysSP):

  • SysSP is used to concentrate on a particular type of systems for example firewalls.
  • It will provide a guideline for implementation.
  • The standards or procedures are used for systems when configured and maintained.

Blurred answer
Students have asked these similar questions
List some Security Rule-excluded information.
How is the SRS document being used? The purpose of each user's usage of SRS should also be made clear.
List the various security subfields, explain what they do, and provide an example of how they may be used.
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,