APPENDIX A
Suggestions for Critical Thinking Exercises
APPENDIX C
Common Vulnerabilities
APPENDIX D
Sample Information Assurance Policy for Passwords
APPENDIX E
Sample Risk Analysis Table
APPENDIX F
Select Privacy Laws and Regulations by Country/Economy or State
APPENDIX G
Information System Security Checklist
APPENDIX H
References and Sources of Information
In many cases, appendixes are just that, something that is extra. In this book, they contain examples of threats, vulnerabilities, and risks. They provide you with an international compendium of privacy laws and regulations. In addition, they provide sample policies and a sample security checklist.
Using these appendixes combined with what you have learned from the book, you will be able to transition your career from being a juggler or a one person band.
During your career, you will lead a small group effectively. Each of your employees will have other jobs; however, this handbook can help them focus on their information assurance roles.
With more experience you will understand all the basic sounds, notes, combinations, and types of music best performed by specific instruments. It is essential that all of this is done in perfect harmony.
No matter where you are in your career, this handbook will support you.