Describe how benchmarking and best practices are used and where more information on best practices may be found.

What will be an ideal response?


Benchmarking and best practices are methods used by some organizations to assess security practices. They don't provide a complete methodology for the design and implementation of all the practices needed by an organization; however, it is possible to formulate the desired outcome of the security process and work backwards toward an effective design. The Federal Agency Security Practices (FASP) Web site (fasp.nist.gov) is a popular place to look up best practices. FASP provides best practices for public agencies, but these practices can be adapted easily to private institutions. The documents found at this site include specific examples of key policies and planning documents, implementation strategies for key technologies, and position descriptions for key security personnel.

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. When a program is executed, array element indices are checked for validity—all indices must be greater than or equal to 0 and less than or equal to the length of the array. 2. ComboBox property ItemSource specifies the source of the items displayed in the ComboBox. 3. String method Replace receives two arguments—the substring that should be replaced throughout the original String and the replacement substring. 4. To pass an array argument to a method, specify the name of the array followed by empty parentheses. 5. An individual element of an integer array is passed to a method by value.

Computer Science & Information Technology

Form information is secure when sent via e-mail

Indicate whether the statement is true or false

Computer Science & Information Technology

Copyright law is designed to protect:

a. Words, names, symbols, or devices used to indicate the origin, quality, and ownership of a product or service. b. Rights to exclude others from making, using, selling, or importing an invention or discovery. c. The rights of authors of original works of authorship, fixed in a tangible form. d. Any valuable business information that if known by a competitor would afford the competitor some advantage.

Computer Science & Information Technology

Images need to be scanned at a lower resolution if the image will be enlarged significantly.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology