CSOL 540-Cyber Security Operational Policy is an essential class for cyber security professionals because it reinforces all key elements when developing organizational policies. During this class, students were introduced to how to generate policies, implement, manage and update them according to industry guidelines.
Valuable Resources
Aguiar, J. (2018). Data Classification and Protecting Information | Journal Of AHIMA. Journal
Of AHIMA. Retrieved 2 April 2021, from https://journal.ahima.org/data-classification-and-protecting-information/.
Bosworth., S., Kabay, M., & Whyne, E. (2014). Computer Security Handbook, Sixth Edition,
Volume 1 & 2 (6th ed.). Wiley.
Burde, H. (2021). THE HITECH ACT: An Overview. Journal of Ethics | American Medical
Association. Retrieved 17 March 2021, from https://journalofethics.ama-assn.org/article/hitech-act-overview/2011-03.
Cornelius, B. (2021). On Policies, Control Objectives, Standards, Guidelines & Procedures. The
State of Security. Retrieved 6 March 2021, from https://www.tripwire.com/state-of-security/regulatory-compliance/understanding-policies-control-objectives-standards-guidelines-procedures/
Harvey, S. (2020). Kirkpatrickprice.com. Retrieved 3 April 2021, from
https://kirkpatrickprice.com/blog/classifying-data/.
IBM. (2021). IBM Knowledge Center. Ibm.com. Retrieved 29 March 2021, from
https://www.ibm.com/support/knowledgecenter/SSPREK_9.0.7/com.ibm.isam.doc/admin/cpt/rbaAdminPolicyManagement.html.
Valuable Resources
Aguiar, J. (2018). Data Classification and Protecting Information | Journal Of AHIMA. Journal
Of AHIMA. Retrieved 2 April 2021, from https://journal.ahima.org/data-classification-and-protecting-information/.
Bosworth., S., Kabay, M., & Whyne, E. (2014). Computer Security Handbook, Sixth Edition,
Volume 1 & 2 (6th ed.). Wiley.
Burde, H. (2021). THE HITECH ACT: An Overview. Journal of Ethics | American Medical
Association. Retrieved 17 March 2021, from https://journalofethics.ama-assn.org/article/hitech-act-overview/2011-03.
Cornelius, B. (2021). On Policies, Control Objectives, Standards, Guidelines & Procedures. The
State of Security. Retrieved 6 March 2021, from https://www.tripwire.com/state-of-security/regulatory-compliance/understanding-policies-control-objectives-standards-guidelines-procedures/
Harvey, S. (2020). Kirkpatrickprice.com. Retrieved 3 April 2021, from
https://kirkpatrickprice.com/blog/classifying-data/.
IBM. (2021). IBM Knowledge Center. Ibm.com. Retrieved 29 March 2021, from
https://www.ibm.com/support/knowledgecenter/SSPREK_9.0.7/com.ibm.isam.doc/admin/cpt/rbaAdminPolicyManagement.html.