Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Signature
Jessica Romio
Chief Information Officer Company – HIC, Inc.
5
HIC ASSET ID AND CLASSIFICATION POLICY
References
Bosworth, S., Kabay, M. E., & Whyne, E. (2014). Computer Security Handbook (6th ed., Vol. 1).
Information Asset and Security Classification Procedure. (2017, October 20). Retrieved from
https://policy.usq.edu.au/documents/13931PL
Palmer, M., Robinson, C., Patilla, J., & Moser, E. (2000). META Security Group Information
http://horseproject.wiki/images/1/18/Information-Security-Policy-Framework-Research-
Report.pdf.
What is role-based access control (RBAC)? - Definition from WhatIs.com. (n.d.). Retrieved from
https://searchsecurity.techtarget.com/definition/role-based-access-control-RBAC