WARNING:
JavaScript is turned OFF. None of the links on this concept map will
work until it is reactivated.
If you need help turning JavaScript On, click here.
This Concept Map, created with IHMC CmapTools, has information related to: Hershman-InformationAssurance_v2, Information Assurance: How can CA Technologies deliver secure cloud based products and services need to create Secure Services and Products, Risk Management includes Prioritize Mitigations, Secure Services and Products must achieve and/or have Compliance, Secure Internal Network must achieve and/or have Risk Management, Security Countermeasures grouped by Human-oriented, Security Policies that are Enforceable, Secure Services and Products must achieve and/or have Integrity, Secure Services and Products must achieve and/or have Privacy, Information Assurance: How can CA Technologies deliver secure cloud based products and services need to create Secure Internal Network, Risk Management includes Determine Risk, Secure Internal Network must achieve and/or have Authenticity and Trustworthiness, Secure Internal Network must achieve and/or have Availability, Risk Management includes Identify Threats, Risk Management includes Mitigation Identification, Secure Internal Network must achieve and/or have Security Policies, Secure Internal Network must achieve and/or have Accountability, Secure Internal Network must achieve and/or have Compliance, Compliance with Laws, Security Countermeasures grouped by Organizational, Secure Internal Network must achieve and/or have Security Countermeasures