University of Nairobi IT Security Risk Assessment Discussion
Topic: IT Security Risk AssessmentNeed to focus on while working on this topic:ReferencesRoss, R.(2014). Security and privacy controls for federal information systems and organizations.NIST Special Publication 800-53. Retrieved from Swanson, M., Wohl, A., Pope, L., Grance, T., Hash, J. & Thomas, R. (2002).Contingency planning guide for information technology systems.NIST Special Publication 800-34. Retrieved from Wilson, M. & Hash, J. (2003).Building an information technology security awareness and training program.NIST Special Publication 800-50. Retrieved from Instructions:
