User contributions
From LIMSWiki
Jump to navigationJump to search- 21:23, 22 March 2023 diff hist +551 File:Tab1 Gonzales PLOSComBio22 18-8.png Added summary. current
- 21:22, 22 March 2023 diff hist +30 N File:Tab1 Gonzales PLOSComBio22 18-8.png
- 21:14, 22 March 2023 diff hist +11,029 Journal:Ten simple rules for maximizing the recommendations of the NIH data management and sharing plan Saving and adding more.
- 20:48, 22 March 2023 diff hist +959 File:Fig1 Gonzales PLOSComBio22 18-8.png Added summary. current
- 20:42, 22 March 2023 diff hist +30 N File:Fig1 Gonzales PLOSComBio22 18-8.png
- 20:19, 22 March 2023 diff hist +2,882 N Journal:Ten simple rules for maximizing the recommendations of the NIH data management and sharing plan Created stub. Saving and adding more.
- 19:53, 22 March 2023 diff hist +409 User:Shawndouglas/sandbox/sublevel12
- 19:03, 22 March 2023 diff hist +6,915 User:Shawndouglas/sandbox/sublevel12
- 18:50, 22 March 2023 diff hist +28,130 User:Shawndouglas/sandbox/sublevel13
- 18:29, 22 March 2023 diff hist +17,302 User:Shawndouglas/sandbox/sublevel15 Tag: Reverted
- 21:44, 21 March 2023 diff hist −1 User:Shawndouglas/sandbox/sublevel8 Tag: Reverted
- 21:43, 21 March 2023 diff hist +703 User:Shawndouglas/sandbox/sublevel8 Tag: Reverted
- 20:20, 21 March 2023 diff hist +3,873 User:Shawndouglas/sandbox/sublevel8 Tag: Reverted
- 19:31, 21 March 2023 diff hist −2 Book:The Complete Guide to LIMS and Laboratory Informatics Fix
- 19:14, 21 March 2023 diff hist +2 Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Closing remarks/Recap and closing →Citation information for this chapter: Second ed current
- 19:13, 21 March 2023 diff hist +2 Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Review progress →Citation information for this chapter: Second ed current
- 19:13, 21 March 2023 diff hist +2 Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework/NIST Cybersecurity Framework →Citation information for this chapter: Second ed current
- 19:12, 21 March 2023 diff hist +2 Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Fitting a cybersecurity standards framework into a cybersecurity plan/How do cybersecurity controls and frameworks guide plan development? Second ed current
- 19:11, 21 March 2023 diff hist +35 Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What is a cybersecurity plan and why do you need it?/Cybersecurity planning and its value Fix current
- 19:11, 21 March 2023 diff hist +2 Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What are the major regulations and standards dictating cybersecurity action?/Cybersecurity standards frameworks →Citation information for this chapter: Second ed current
- 19:09, 21 March 2023 diff hist +2 m Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What is a cybersecurity plan and why do you need it?/Cybersecurity planning and its value Fix
- 19:03, 21 March 2023 diff hist +2 Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What is a cybersecurity plan and why do you need it?/Cybersecurity planning and its value →Citation information for this chapter: Second ed
- 19:02, 21 March 2023 diff hist +1,069 Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan Updated for 2023. current
- 19:01, 21 March 2023 diff hist +780 N Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Supply chain risk management Created as needed. current
- 19:00, 21 March 2023 diff hist −527 Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/System and information integrity Updated for 2023. current Tag: Manual revert
- 19:00, 21 March 2023 diff hist +287 N Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Personally identifiable information processing and transparency Created as needed. current
- 18:59, 21 March 2023 diff hist +242 N Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Program management Created as needed. current
- 18:57, 21 March 2023 diff hist +434 Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Introduction Updated for 2023. current
- 18:55, 21 March 2023 diff hist +200 N Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 4 and the NIST Cybersecurity Framework/NIST Cybersecurity Framework Shawndouglas moved page Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 4 and the NIST Cybersecurity Framework/NIST Cybersecurity Framework to Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework/NIST Cybersecurity Framework: From version 4 to 5 current Tag: New redirect
- 18:55, 21 March 2023 diff hist 0 m Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework/NIST Cybersecurity Framework Shawndouglas moved page Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 4 and the NIST Cybersecurity Framework/NIST Cybersecurity Framework to Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework/NIST Cybersecurity Framework: From version 4 to 5
- 18:50, 21 March 2023 diff hist +223 N Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Security assessment and authorization Shawndouglas moved page Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Security assessment and authorization to Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Assessment, authorization, and monitoring: Changes from Rev 4 to 5 current Tag: New redirect
- 18:50, 21 March 2023 diff hist 0 m Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Assessment, authorization, and monitoring Shawndouglas moved page Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Security assessment and authorization to Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Assessment, authorization, and monitoring: Changes from Rev 4 to 5 current
- 18:46, 21 March 2023 diff hist +2 LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec →Citation information for this chapter: Second ed current
- 18:45, 21 March 2023 diff hist +2 LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Closing remarks →Citation information for this chapter: Second ed current
- 18:45, 21 March 2023 diff hist +2 LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan →Citation information for this chapter: Second ed current
- 18:45, 21 March 2023 diff hist +2 LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Fitting a cybersecurity standards framework into a cybersecurity plan →Citation information for this chapter: Second ed current
- 18:44, 21 March 2023 diff hist +2 LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What are the major regulations and standards dictating cybersecurity action? →Citation information for this chapter: Second ed current
- 18:43, 21 March 2023 diff hist +2 LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What is a cybersecurity plan and why do you need it? →Citation information for this chapter: Second ed current
- 18:43, 21 March 2023 diff hist +2 LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework →Citation information for this chapter: Second ed current
- 18:42, 21 March 2023 diff hist 0 m LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Fitting a cybersecurity standards framework into a cybersecurity plan From 4 to 5
- 18:41, 21 March 2023 diff hist 0 m LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework From 4 to 5
- 18:41, 21 March 2023 diff hist +175 N Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 4 and the NIST Cybersecurity Framework Shawndouglas moved page Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 4 and the NIST Cybersecurity Framework to Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework: From 4 to 5 current Tag: New redirect
- 18:41, 21 March 2023 diff hist 0 m Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework Shawndouglas moved page Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 4 and the NIST Cybersecurity Framework to Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework: From 4 to 5 current
- 18:40, 21 March 2023 diff hist 0 m LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan Fix current
- 18:40, 21 March 2023 diff hist 0 m LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan Rev 4 to 5
- 18:39, 21 March 2023 diff hist +170 N LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 4 and the NIST Cybersecurity Framework Shawndouglas moved page LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 4 and the NIST Cybersecurity Framework to LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework: Updated from 4 to 5 current Tag: New redirect
- 18:39, 21 March 2023 diff hist 0 m LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework Shawndouglas moved page LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 4 and the NIST Cybersecurity Framework to LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework: Updated from 4 to 5
- 18:36, 21 March 2023 diff hist +433 LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan Updated for second edition
- 18:21, 21 March 2023 diff hist +6 m Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Develop strategic cybersecurity goals and define success →5. Develop and create the cybersecurity plan: Example Cybersecurity Plan current
- 18:19, 21 March 2023 diff hist +6 File:An Example Cybersecurity Plan - Shawn Douglas - v1.0.pdf →Summary current