{"title":"Asset Management","authors":"W. Williams","doi":"10.1201/9781003093688-3","DOIUrl":"https://doi.org/10.1201/9781003093688-3","url":null,"abstract":"","PeriodicalId":422949,"journal":{"name":"Creating an Information Security Program from Scratch","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114366066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Access Control","authors":"W. Williams","doi":"10.1201/9781003093688-11","DOIUrl":"https://doi.org/10.1201/9781003093688-11","url":null,"abstract":"","PeriodicalId":422949,"journal":{"name":"Creating an Information Security Program from Scratch","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126387040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Endpoint","authors":"W. Williams","doi":"10.1201/9781003093688-6","DOIUrl":"https://doi.org/10.1201/9781003093688-6","url":null,"abstract":"","PeriodicalId":422949,"journal":{"name":"Creating an Information Security Program from Scratch","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122285916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Network","authors":"W. Williams","doi":"10.1201/9781003093688-8","DOIUrl":"https://doi.org/10.1201/9781003093688-8","url":null,"abstract":"","PeriodicalId":422949,"journal":{"name":"Creating an Information Security Program from Scratch","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125123439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maturity","authors":"W. Williams","doi":"10.1201/9781003093688-13","DOIUrl":"https://doi.org/10.1201/9781003093688-13","url":null,"abstract":"","PeriodicalId":422949,"journal":{"name":"Creating an Information Security Program from Scratch","volume":"3 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122591656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating Security into Software Development","authors":"W. Williams","doi":"10.1201/9781003093688-9","DOIUrl":"https://doi.org/10.1201/9781003093688-9","url":null,"abstract":"","PeriodicalId":422949,"journal":{"name":"Creating an Information Security Program from Scratch","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122138483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Things You Must Do","authors":"Walter Williams","doi":"10.1201/9781003093688-2","DOIUrl":"https://doi.org/10.1201/9781003093688-2","url":null,"abstract":"Welcome to the Neurobiology & Anatomy Department. Below you will find helpful information and some forms we need filled out to make joining our department as smooth as possible. If you are new to the University of Utah some additional information has been included to assist you in getting the things you need. Payroll: The following two items must be downloaded and filled out by your first day and given to Liz Woolsey in room 320 BPRB: 1. Download the Check-In Form: it and fill it out and then email it or print it out. This form is to help the main office get payroll, contact information, keys, and a department email alias (username@neuro.utah.edu) set up as quickly as possible. 2. On your first day we will verify completion of your new hire forms. You will be required to present identification establishing your eligibility to work / study in the U.S as described below: Signing up for insurance and other benefits: Benefits and insurance plan comparisons can be found at the University of Utah Human Resources web site: www.hr.utah.edu/benefits/. Your new hire orientation will be accessed and completed online. For instructions go to: If you enroll during your Initial Enrollment Period (the first 90 days following the date you are hired into a benefit-eligible position), coverage will begin retroactive to your date of hire. If you do not enroll during your Initial Enrollment Period, you may enroll during Open Enrollment held each year during April or if you experience a Status Change Event.","PeriodicalId":422949,"journal":{"name":"Creating an Information Security Program from Scratch","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131792012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Getting Started","authors":"W. Williams","doi":"10.1201/9781003093688-1","DOIUrl":"https://doi.org/10.1201/9781003093688-1","url":null,"abstract":"","PeriodicalId":422949,"journal":{"name":"Creating an Information Security Program from Scratch","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116652909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human Issues","authors":"W. Williams","doi":"10.1201/9781003093688-12","DOIUrl":"https://doi.org/10.1201/9781003093688-12","url":null,"abstract":"","PeriodicalId":422949,"journal":{"name":"Creating an Information Security Program from Scratch","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130811323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerability Management","authors":"W. Williams","doi":"10.1201/9781003093688-4","DOIUrl":"https://doi.org/10.1201/9781003093688-4","url":null,"abstract":"","PeriodicalId":422949,"journal":{"name":"Creating an Information Security Program from Scratch","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127157237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}