ipl-logo

Comm 510 Chapter 4

614 Words3 Pages

Aleea Summers - COM 510 19 September 2015 Chapter #6: Exercise (p.243) 1. Visit the U.S. Postal Service Web site at https://about.usps.com/handbooks/as805.pdf. Review the content page for this extensive manual. Compare this program to the NIST documents outlined in this chapter. Which areas are similar to those covered in the NIST documents? Which areas are different? One of the main reasons the documents are similar is because they’re available to everyone. The documents go in depth on computer and information security, roles and responsibilities etc. but the USPS document seems to be a bit more thorough and include everything. The NIST documents in the chapter are more topic specific but all have relatable topics within the USPS manual such as security risk management, physical and environmental security, development and operations security, information security services, hardware and software security, network security, business continuity management, security incident management and security compliance and monitoring. …show more content…

It is one of the most widely referred security models. Afterwards, that document had been revised in 2005 and had been named again as ISO 27002 to align it with the document ISO 27001. ISO/IES 17799 aims at providing commendations for the utilization of information security in the firm. This is beneficial in making available a common foundation for the formulation of values and practices for the firm. The ISO/IEC 27001 makes available information on the operation of ISO/IEC 27021 and the manner in which to establish and information security system management system. The ISO/IEC 27002 concentrates on providing and overview on the different aspects of security and it includes information on 10 parts and 127 controls (Whitman & Mattord, 2004, p.

More about Comm 510 Chapter 4

Open Document