FIPS 140-2 is a requirements document that sets the minimum strength level for data encryption used in Sensitive But Unclassified (SBU) federal operating environments. But its influence goes far beyond this significant but delimited area.
Network Security has multiple concepts. One such model is the Before-During-After concept, which I will break out into different phases. Specific to incident and problem management in IT, this methodology plays an important role for IT teams.