How JustAnswer Works:
  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site. Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.
Ask Jess M. Your Own Question
Jess M.
Jess M., Computer Support Specialist
Category: Software
Satisfied Customers: 637
Experience:  Computer Software Support specialist for more that 10 years
Type Your Software Question Here...
Jess M. is online now
A new question is answered every 9 seconds

1. Visit the InfoSec Reading Room at

Customer Question

1. Visit the InfoSec Reading Room at (
2. Search for documented best practices in information security.
3. What types of best practices are commonly documented?
4. How could you incorporate these best practices into the development of a security manual?
5. How would you distribute these to personnel requiring the information?
Submitted: 11 months ago.
Category: Software
Expert:  George Sibiya replied 11 months ago.


Welcome to JustAnswer and thank you for utilising our services.

I am reviewing your question and will be posting back answers.



Customer: replied 11 months ago.
Thanks George!
Customer: replied 11 months ago.
George, when do you think you will be done?
Expert:  George Sibiya replied 11 months ago.

I think it will take me hours. However, I'll opt out while working on it to allow an opportunity for exerts who can do it quicker

Expert:  amit.gzp786 replied 11 months ago.


Welcome to JustAnswer and thank you for utilising our services.What is deadline for this ? Amit
Expert:  Bruce Wilner replied 11 months ago.

Hello. "Best practices" run for pages and pages and, what's more, are so ultra-general that they range from somewhat applicable to utterly inapplicable to the situation at hand.

Please tell me a bit more about what you're trying to protect. One has difficulty believing that this homework was assigned entirely out of context. While policies can be general, mechanisms and practices are specific, tailored to the particular needs of the situation.

By the way, I am the co-author of three of the National Computer Security Center's "Rainbow Books" and personally responsible for ~35% of the DITSCAP standard, which gave rise to NIACAP. The tool I wrote for the Defense Information Systems Agency for automatically generating System Security Accreditation Agreements became a desktop standard with 12K installed copies: disturbing, since it was the first Java program I ever wrote.

Customer: replied 11 months ago.
Yea I finished it on my own, the questions were super general and vague so hopefully they accept it, close and refund please.Thank you.
Customer: replied 11 months ago.
Bruce, this was the assignment if you want to take a look at it.
Customer: replied 11 months ago.
close and refund please.