Cargando…

Security assessment : case studies for implementing the NSA IAM /

The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: Syngress Media, Inc
Otros Autores: Rogers, Russ
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, Mass. : Syngress, 2004.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocm56978955
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 041116s2004 maua o 001 1 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCF  |d NLGGC  |d NTG  |d EBLCP  |d OPELS  |d YDXCP  |d IDEBK  |d MHW  |d MERUC  |d NLE  |d UKDOC  |d ZCU  |d DEBSZ  |d OCLCQ  |d MUX  |d OCLCQ  |d AGLDB  |d PIFBR  |d X#7  |d OCLCQ  |d WY@  |d OCLCA  |d LUE  |d D6H  |d VTS  |d ICG  |d TOF  |d OCLCQ  |d WYU  |d STF  |d G3B  |d LEAUB  |d DKC  |d OCLCQ  |d OL$  |d COM  |d OCLCO  |d OCL  |d OCLCQ  |d IOY  |d OCLCQ  |d OCLCO 
019 |a 60743533  |a 85836282  |a 162599394  |a 181842158  |a 191035009  |a 507525105  |a 991946628 
020 |a 1597490105  |q (electronic bk.) 
020 |a 9781597490108  |q (electronic bk.) 
020 |a 9781932266962 
020 |a 1932266968 
020 |a 0080480829 
020 |a 9780080480824 
029 1 |a AU@  |b 000050982147 
029 1 |a AU@  |b 000051559071 
029 1 |a AU@  |b 000051860325 
029 1 |a CHBIS  |b 005831745 
029 1 |a CHNEW  |b 001004755 
029 1 |a CHVBK  |b 168651327 
029 1 |a DEBBG  |b BV042307370 
029 1 |a DEBBG  |b BV043068708 
029 1 |a DEBBG  |b BV044124223 
029 1 |a DEBSZ  |b 405314442 
029 1 |a DEBSZ  |b 422350192 
029 1 |a GBVCP  |b 801214602 
029 1 |a NZ1  |b 12435694 
035 |a (OCoLC)56978955  |z (OCoLC)60743533  |z (OCoLC)85836282  |z (OCoLC)162599394  |z (OCoLC)181842158  |z (OCoLC)191035009  |z (OCoLC)507525105  |z (OCoLC)991946628 
050 4 |a QA76.9.A25  |b S38 2004eb 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Security assessment :  |b case studies for implementing the NSA IAM /  |c Russ Rogers [and others]. 
260 |a Rockland, Mass. :  |b Syngress,  |c 2004. 
300 |a 1 online resource (xxxiv, 429 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Print version record. 
505 0 |a Laying the foundation for your assessment; The pre-assessment visit; Determining the organizations information criticality -- system information criticality; The system security environment; Understanding the technical assessment plan; Customer activities; Managing the findings; Leaving no surprises; Final reporting; Tying up loose ends. 
520 |a The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines. This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc). The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement. Everything You Need to Know to Conduct a Security Audit of Your Organization Step-by-Step Instructions for Implementing the National Security Agency's Guidelines Special Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security  |x Evaluation. 
650 6 |a Sécurité informatique  |x Évaluation. 
650 7 |a Computer security  |x Evaluation  |2 fast 
655 0 |a Electronic books. 
655 2 |a Fictional Work 
655 7 |a Fiction  |2 fast 
655 7 |a Fiction.  |2 lcgft 
655 7 |a Romans.  |2 rvmgf 
700 1 |a Rogers, Russ. 
710 2 |a Syngress Media, Inc. 
776 0 8 |i Print version:  |t Security assessment.  |d Rockland, Mass. : Syngress, 2004  |z 1932266968  |w (OCoLC)53709726 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=122028  |z Texto completo 
938 |a 123Library  |b 123L  |n 36347 
938 |a EBL - Ebook Library  |b EBLB  |n EBL175469 
938 |a EBSCOhost  |b EBSC  |n 122028 
938 |a YBP Library Services  |b YANK  |n 2613362 
938 |a YBP Library Services  |b YANK  |n 2360388 
994 |a 92  |b IZTAP