Abstract
In recent years there has been an increasing number of legislated regulatory mandates with which organizations must comply with to prove the confidentiality, integrity, and availability of information stored in their systems and provided through external parties. After reading various white papers, websites, and other articles that loosely use the terms “PCI, HIPAA, SOX, CIS, NIST, ISO, CIS, COBiT, FISMA, and FDCC,” heads can start spinning. Like many security professionals, I am not an auditor or a lawyer but am constantly bombarded with these acronyms on a weekly basis. Feeling dizzy?
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Morey J. Haber, Brad Hibbert
About this chapter
Cite this chapter
Haber, M.J., Hibbert, B. (2018). Configuration Assessment. In: Asset Attack Vectors. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3627-7_6
Download citation
DOI: https://doi.org/10.1007/978-1-4842-3627-7_6
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-3626-0
Online ISBN: 978-1-4842-3627-7
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books