How JustAnswer Works:
  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site.
    Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.
Ask Jess M. Your Own Question
Jess M.
Jess M., Computer Support Specialist
Category: Software
Satisfied Customers: 561
Experience:  Computer Software Support specialist for more that 10 years
49766785
Type Your Software Question Here...
Jess M. is online now
A new question is answered every 9 seconds

1. Visit the InfoSec Reading Room at SANS.org

Customer Question

1. Visit the InfoSec Reading Room at SANS.org (www.sans.org/rr).
2. Search for documented best practices in information security.
3. What types of best practices are commonly documented?
4. How could you incorporate these best practices into the development of a security manual?
5. How would you distribute these to personnel requiring the information?
Submitted: 5 months ago.
Category: Software
Expert:  George Sibiya replied 5 months ago.

Hi,

Welcome to JustAnswer and thank you for utilising our services.

I am reviewing your question and will be posting back answers.

Regards,

George

Customer: replied 5 months ago.
Thanks George!
Customer: replied 5 months ago.
George, when do you think you will be done?
Expert:  George Sibiya replied 5 months ago.

I think it will take me hours. However, I'll opt out while working on it to allow an opportunity for exerts who can do it quicker

Expert:  amit.gzp786 replied 5 months ago.

Hi,

Welcome to JustAnswer and thank you for utilising our services.What is deadline for this ? Amit
Expert:  Bruce Wilner replied 5 months ago.

Hello. "Best practices" run for pages and pages and, what's more, are so ultra-general that they range from somewhat applicable to utterly inapplicable to the situation at hand.

Please tell me a bit more about what you're trying to protect. One has difficulty believing that this homework was assigned entirely out of context. While policies can be general, mechanisms and practices are specific, tailored to the particular needs of the situation.

By the way, I am the co-author of three of the National Computer Security Center's "Rainbow Books" and personally responsible for ~35% of the DITSCAP standard, which gave rise to NIACAP. The tool I wrote for the Defense Information Systems Agency for automatically generating System Security Accreditation Agreements became a desktop standard with 12K installed copies: disturbing, since it was the first Java program I ever wrote.

Customer: replied 5 months ago.
Yea I finished it on my own, the questions were super general and vague so hopefully they accept it, close and refund please.Thank you.
Customer: replied 5 months ago.
Bruce, this was the assignment if you want to take a look at it.
Customer: replied 5 months ago.
close and refund please.

Related Software Questions