Cargando…

Risk Management Framework : a Lab-Based Approach to Securing Information Systems /

The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance re...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Broad, James, CISSP
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, 2013.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_ocn853240118
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 130719s2013 mau ob 001 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d EBLCP  |d MHW  |d MEAUC  |d OCLCQ  |d TSC  |d DEBSZ  |d UMI  |d B24X7  |d COO  |d OCLCQ  |d OCLCO  |d MERUC  |d OCLCQ  |d OCLCA  |d OCLCF  |d AU@  |d OCLCQ  |d WYU  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 858036843  |a 1058138530 
020 |a 1299730426  |q (ebk) 
020 |a 9781299730427  |q (ebk) 
020 |a 9780124047235 
020 |a 0124047238 
020 |z 9781597499958 
029 1 |a AU@  |b 000053295488 
029 1 |a AU@  |b 000055903018 
029 1 |a CHNEW  |b 001051254 
029 1 |a CHVBK  |b 567700747 
029 1 |a DEBSZ  |b 431307865 
029 1 |a DKDLA  |b 820120-katalog:9910110073305765 
035 |a (OCoLC)853240118  |z (OCoLC)858036843  |z (OCoLC)1058138530 
037 |a 504293  |b MIL 
043 |a n-us--- 
050 4 |a QA76.9.A25 B72 2013 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Broad, James,  |c CISSP. 
245 1 0 |a Risk Management Framework :  |b a Lab-Based Approach to Securing Information Systems /  |c James Broad ; Aaron (AJ) Mitchneck, Technical Editor. 
260 |a Waltham, MA :  |b Syngress,  |c 2013. 
300 |a 1 online resource (xv, 298 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references (page 289) and index. 
520 |a The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly implement this process. No other publication covers this topic in the detail provided in this book or provides hands-on exercises that will enforce the topics. Examples in the book follow a fictitious organization through the RMF, allowing the reader to follow the development of proper compliance measures. Templates provided in the book allow readers to quickly implement the RMF in their organization. The need for this book continues to expand as government and non-governmental organizations build their security programs around the RMF. The companion website provides access to all of the documents, templates and examples needed to not only understand the RMF but also implement this process in the reader's own organization. 
505 0 |a Laws, Regulations, and Guidance -- Integrated Organization-Wide Risk Management -- The Joint Task Force Transformation Initiative -- System Development Life Cycle (SDLC) -- Transitioning from the C & A Process to RMF -- Key Positions and Roles -- Lab Organization -- RMF Phase 1 : Categorize the information System -- RMF Phase 2 : Selecting Security Controls -- RMF Phase 3 : Implementing Security Controls -- RMF Phase 4 : Assess Security Controls -- RMF Phase 5 : Authorizing the Information System -- RMF Phase 6 : Monitoring Security Controls -- The Expansion of the RMF. 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Government policy  |z United States. 
650 0 |a Information technology  |x Security measures  |z United States. 
650 0 |a Electronic government information  |x Security measures  |z United States. 
650 0 |a Risk management  |x Government policy  |z United States. 
650 0 |a Information technology  |z United States  |x Management. 
650 6 |a Sécurité informatique  |x Politique gouvernementale  |z États-Unis. 
650 6 |a Technologie de l'information  |z États-Unis  |x Sécurité  |x Mesures. 
650 6 |a Gestion du risque  |x Politique gouvernementale  |z États-Unis. 
650 6 |a Technologie de l'information  |z États-Unis  |x Gestion. 
650 7 |a Computer security  |x Government policy  |2 fast 
650 7 |a Information technology  |x Management  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
650 7 |a Risk management  |x Government policy  |2 fast 
651 7 |a United States  |2 fast 
776 0 8 |i Print version:  |z 9781299730427 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597499958/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00056570 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1115181 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis25835864 
994 |a 92  |b IZTAP