Question;Chapter 6;Exercises 1: Visit the U.S. Postal Service web site;at www.usps.com/cpim/ftp/hand/as805/.;Review the content page for this extensive manual. Compare this program to the;NIST documents outlined in this chapter. Which areas are similar to those;covered in the NIST documents? Which areas are different?Exercises 2;Compare the ISO/IEC 27001 outline with;the NIST documents discussed in this chapter. Which areas, if any, are missing;from the NIST documents? Identify the strengths and weaknesses of the NIST;programs compared to the ISO standard.Chapter 7;Exercises 1: Search the web for the term security;best practices. Compare your findings to the recommended practices outlined in;the NIST documents.Exercise 2: Visit the NSIT FASP security practices;website at http://csrc.nist.gov/groups/SMA/fasp/index.html.;Review some of the listed FASPs and identify five drawbacks to adopting the;recommended practices for a typical business.
Paper#36507 | Written in 18-Jul-2015Price : $27