Chapter 8 - Information Technology (it) Security
Browse Chapter 8 - Information Technology (it) Security
in: Chapter 8 - Information Technology (it) Security
Section 1 - Security PolicySection 11 - Application Security PolicySection 12 - Container Platform Security PolicySection 13 - Business Impact Analysis (bia) Security PolicySection 15 - General Platform Operating System Security PolicySection 2 - It Security Roles and ResponsibilitiesSection 21 - Database Security PolicySection 22 - Web Server Security PolicySection 23 - Application Server Security PolicySection 24 - Cloud Computing Security PolicySection 26 - Wireless and Mobile Device Security PolicySection 27 - Personal Use of Government Furnished Information Technology Equipment and ResourcesSection 33 - Mainframe System Security PolicySection 34 - Idrs Security ControlsSection 5 - Domain Name System (dns) Security PolicySection 50 - Enterprise Incident, Vulnerability, and Security Patch ManagementSection 52 - Irs Public Key Infrastructure (pki) X.509 Certificate PolicySection 54 - Minimum Firewall Administration RequirementsSection 55 - Network Security PolicySection 6 - Application Security and DevelopmentSection 60 - It Service Continuity Management (itscm) Policy and GuidanceSection 62 - Information System Contingency Plan (iscp) and Disaster Recovery (dr) Test, Training, and Exercise (tt&e) ProcessSection 63 - Central Log Server Security Policy