|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_on1162217403 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
160915s2016 nyua o 001 0 eng |
010 |
|
|
|a 2020679053
|
040 |
|
|
|a DLC
|b eng
|e rda
|e pn
|c DLC
|d VLY
|d OCLCO
|d N$T
|d OCLCF
|d YDX
|d OSU
|d UPM
|d SNK
|d DKU
|d IGB
|d D6H
|d VTS
|d AGLDB
|d AU@
|d G3B
|d S8J
|d S9I
|d STF
|d M8D
|d SSC
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 952336622
|a 964290514
|
020 |
|
|
|a 9781634849531
|q (ebook)
|
020 |
|
|
|a 1634849531
|
020 |
|
|
|z 1634849485
|
020 |
|
|
|z 9781634849487
|
029 |
1 |
|
|a AU@
|b 000058756211
|
029 |
1 |
|
|a AU@
|b 000059646431
|
035 |
|
|
|a (OCoLC)1162217403
|z (OCoLC)952336622
|z (OCoLC)964290514
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a KF27
|b .I546 2016
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 352.380973
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Information security across federal agencies :
|b analysis of adequacy and effectiveness /
|c Shane Palmer, editor.
|
264 |
|
1 |
|a New York :
|b Novinka,
|c [2016]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
490 |
1 |
|
|a American Political, Economic, and Security Issues
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a INFORMATION SECURITY ACROSS FEDERAL AGENCIES ANALYSIS OF ADEQUACY AND EFFECTIVENESS ; INFORMATION SECURITY ACROSS FEDERAL AGENCIES ANALYSIS OF ADEQUACY AND EFFECTIVENESS ; CONTENTS ; PREFACE ; Chapter 1 FEDERAL INFORMATION SECURITY: AGENCIES NEED TO CORRECT WEAKNESSES AND FULLY IMPLEMENT SECURITY PROGRAMS* ; WHY GAO DID THIS STUDY ; WHAT GAO RECOMMENDS ; WHAT GAO FOUND ; ABBREVIATIONS ; BACKGROUND; New FISMA Requirements Clarify Roles and Responsibilities ; CONTINUED WEAKNESSES PLACE FEDERAL AGENCIES' INFORMATION AND INFORMATION SYSTEMS AT RISK
|
505 |
8 |
|
|a Number of Incidents Reported by Federal Agencies Continues to Increase Cybersecurity Deficiencies Continue to Place Systems at Risk ; Agencies Exhibited Weaknesses in All Major Categories of Controls; Most Agencies Had Weaknesses in Access Controls ; Agencies Did Not Fully Implement Controls for Configuration Management ; More Than Half of the Agencies Did Not Segregate Incompatible Duties ; Agencies Had Weaknesses in Continuity of Operations; Agencies Did Not Effectively Manage Security ; We and Inspectors General Recommended Actions to Strengthen Information Security
|
505 |
8 |
|
|a Federal Efforts Are Underway to Improve Security Cybersecurity Cross-Agency Priority Goals ; The National Cybersecurity Protection System (NCPS) ; The Continuous Diagnostics and Mitigation (CDM) Program ; The National Initiative for Cybersecurity Education (NICE) ; The Federal Risk and Authorization Management Program (FedRAMP) ; The Cyber and National Security Team (E-Gov Cyber) ; The 30-Day Cybersecurity Sprint ; AGENCIES' IMPLEMENTATION OF FISMA 2002 REQUIREMENTS WAS MIXED ; More Agencies Implemented Risk Management Activities ; Most Agencies Had Documented Policies and Procedures
|
505 |
8 |
|
|a Number of Agencies with Sufficient Security Planning Decreased Number of Agencies Providing Sufficient Security Awareness Decreased and the Percentage of Personnel Receiving Specialized Training Decreased ; Fewer Agencies Are Periodically Testing and Continuously Monitoring Controls; Increasing Number of Agencies are Generally Implementing Elements of a Remediation Program, but Weaknesses Remain ; Agencies' Efforts to Implement Incident Response and Reporting Varied ; Fewer Agencies Had Adequate Contingency Plans
|
505 |
8 |
|
|a Agencies Reported Operating Fewer Systems and Relying More on Contractor-Operated SystemsMore Agencies Implemented Privacy Requirements ; Amount of Spending on Information Security Varied Among Agencies ; NIST Continues to Provide FISMA-Related Guidance to Agencies ; Inspectors General Report on Agency Implementation of FISMA ; OMB and DHS Continue Actions, but Opportunities Remain for Improving Annual Reporting of Agency Information Security Programs ; Guidance for Reporting Agency Evaluations Was Not always Complete ; CONCLUSION ; RECOMMENDATION FOR EXECUTIVE ACTION
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Cyber intelligence (Computer security)
|z United States.
|
650 |
|
6 |
|a Surveillance des menaces informatiques
|z États-Unis.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Cyber intelligence (Computer security)
|2 fast
|0 (OCoLC)fst01893401
|
651 |
|
7 |
|a United States.
|2 fast
|0 (OCoLC)fst01204155
|
700 |
1 |
|
|a Palmer, Shane,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|t Information security across federal agencies.
|d New York : Novinka, [2016]
|z 1634849485
|w (DLC) 2016448638
|
830 |
|
0 |
|a American political, economic, and security issues series.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1258698
|z Texto completo
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1258698
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12882189
|
994 |
|
|
|a 92
|b IZTAP
|