{"id":3045,"date":"2017-01-10T09:56:12","date_gmt":"2017-01-10T14:56:12","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5214sec001sp2017\/?page_id=3045"},"modified":"2020-01-06T15:32:11","modified_gmt":"2020-01-06T20:32:11","slug":"week-04","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis5214sec702spring2021\/week-04\/","title":{"rendered":"Unit 03 &#8211; Planning and Policy"},"content":{"rendered":"<p><strong>Readings:<\/strong><\/p>\n<ul>\n<li>Boyle and Panko, Chapter 2 Planning and Policy<\/li>\n<li><a href=\"http:\/\/community.mis.temple.edu\/mis5214sec001sp2018\/files\/2018\/01\/nistspecialpublication800-100.pdf\">NIST SP 800-100 &#8220;Information Security Handbook: A Guide for Managers&#8221;, Chapter 8 &#8211; Security Planning<\/a>, pp.67-77<\/li>\n<li><a href=\"http:\/\/community.mis.temple.edu\/mis5214sec001sp2017\/files\/2017\/02\/nistspecialpublication800-60v1r1.pdf\">NIST SP800-60V1R1: &#8220;Guide for Mapping Types of Information and Information Systems to Security Categories&#8221;<\/a>, pp.1-34<\/li>\n<li><a href=\"http:\/\/community.mis.temple.edu\/mis5214sec001sp2018\/files\/2018\/01\/FIPS-Pub-200.pdf\">FIPS 200 &#8220;Minimum Security Requirements for Federal Information and Information Systems\u201d<\/a>, pp.1-9<\/li>\n<\/ul>\n<p><strong>References:<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/community.mis.temple.edu\/mis5214sp2017online\/files\/2017\/01\/FIPS-PUB-199-final.pdf\">FIPS Publication 199 &#8220;Standards for Security Categorization of Federal Information and Information Systems&#8221;<\/a><\/li>\n<li><a href=\"http:\/\/community.mis.temple.edu\/mis5214sec001sp2017\/files\/2017\/02\/nistspecialpublication800-60v2r1.pdf\">NIST SP800-60V2R1: &#8220;Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories&#8221;<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Readings: Boyle and Panko, Chapter 2 Planning and Policy NIST SP 800-100 &#8220;Information Security Handbook: A Guide for Managers&#8221;, Chapter 8 &#8211; Security Planning, pp.67-77 NIST SP800-60V1R1: &#8220;Guide for Mapping Types of Information and Information Systems to Security Categories&#8221;, pp.1-34 FIPS 200 &#8220;Minimum Security Requirements for Federal Information and Information Systems\u201d, pp.1-9 References: FIPS Publication [&hellip;]<\/p>\n","protected":false},"author":8584,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-3045","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5214sec702spring2021\/wp-json\/wp\/v2\/pages\/3045","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5214sec702spring2021\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5214sec702spring2021\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5214sec702spring2021\/wp-json\/wp\/v2\/users\/8584"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5214sec702spring2021\/wp-json\/wp\/v2\/comments?post=3045"}],"version-history":[{"count":4,"href":"https:\/\/community.mis.temple.edu\/mis5214sec702spring2021\/wp-json\/wp\/v2\/pages\/3045\/revisions"}],"predecessor-version":[{"id":4267,"href":"https:\/\/community.mis.temple.edu\/mis5214sec702spring2021\/wp-json\/wp\/v2\/pages\/3045\/revisions\/4267"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5214sec702spring2021\/wp-json\/wp\/v2\/media?parent=3045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}