Abstract
The Defence Manual of Security (Joint Services Publication 440 (JSP 440)) defined an asset as being
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Henderson, G., Malcolm, N. and Roberts, F., 1933. The Science Of War. London: Longmans, Green.
- 2.
- 3.
- 4.
- 5.
- 6.
Assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the information (NIST Glossary).
- 7.
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
ISACA, 2014. Vendor Management Using COBIT 5. ISACA.
- 14.
- 15.
- 16.
- 17.
assistance@cyberrescue.co.uk
- 18.
assistance@cyberrescue.co.uk
- 19.
- 20.
- 21.
- 22.
- 23.
- 24.
- 25.
- 26.
- 27.
- 28.
- 29.
- 30.
- 31.
- 32.
- 33.
- 34.
- 35.
- 36.
- 37.
- 38.
- 39.
- 40.
- 41.
- 42.
- 43.
- 44.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature
About this chapter
Cite this chapter
Seaman, J. (2021). Securing Your Supply Chain. In: Protective Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-6908-4_11
Download citation
DOI: https://doi.org/10.1007/978-1-4842-6908-4_11
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-6907-7
Online ISBN: 978-1-4842-6908-4
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books