Description |
1 online resource (xxx, 498 pages) : illustrations |
|
text txt rdacontent |
|
computer c rdamedia |
|
online resource cr rdacarrier |
Summary |
The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements. This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three leading types of C & A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a C & A project. The next section to the book illustrates addressing security awareness, end-user rules of behavior, and incident response requirements. Once this phase of the C & A project is complete, the reader will learn to perform the security tests and evaluations, business impact assessments system risk assessments, business risk assessments, contingency plans, business impact assessments, and system security plans. Finally the reader will learn to audit their entire C & A project and correct any failures. * Focuses on federally mandated certification and accreditation requirements * Author Laura Taylor's research on Certification and Accreditation has been used by the FDIC, the FBI, and the Whitehouse * Full of vital information on compliance for both corporate and government IT Managers. |
Note |
Print version record. |
Bibliography |
Includes bibliographical references and index. |
Contents |
Cover; Contents; Foreword; Preface; Chapter 1: What Is Certification and Accreditation?; Chapter 2: Types of Certification and Accreditation; Chapter 3: Understanding the Certification and Accreditation Process; Chapter 4: Establishing a C & A Program; Chapter 5: Developing a Certification Package; Chapter 6: Preparing the Hardware and Software Inventory; Chapter 7: Determining the Certification Level; Chapter 8: Performing and Preparing the Self-Assessment; Chapter 9: Addressing Security Awareness and Training Requirements; Chapter 10: Addressing End- User Rules of Behavior. |
Subject |
Computer security.
|
|
Data protection.
|
|
Sécurité informatique.
|
|
Protection de l'information (Informatique)
|
|
COMPUTERS -- Internet -- Security.
|
|
COMPUTERS -- Networking -- Security.
|
|
COMPUTERS -- Security -- General.
|
|
Computer security
|
|
Data protection
|
Added Author |
Shepherd, Matthew.
|
Other Form: |
Print version: Taylor, Laura. FISMA certification & accreditation handbook. Rockland, MA : Syngress, ©2007 1597491160 9781597491167 (OCoLC)77006368 |
ISBN |
9781597491167 |
|
1597491160 |
|
9781429454926 (electronic bk.) |
|
142945492X (electronic bk.) |
|
0080506534 |
|
9780080506531 (electronic bk.) |
|
1282552473 |
|
9781282552470 |
Standard No. |
AU@ 000048763722 |
|
AU@ 000050492682 |
|
AU@ 000051561979 |
|
AU@ 000051860635 |
|
AU@ 000053044904 |
|
AU@ 000054162641 |
|
CHBIS 005829135 |
|
CHNEW 001006970 |
|
CHVBK 168519674 |
|
DEBBG BV041119974 |
|
DEBBG BV042314233 |
|
DEBBG BV043044474 |
|
DEBSZ 396678629 |
|
DEBSZ 405313411 |
|
DEBSZ 422233153 |
|
DEBSZ 430366825 |
|
NZ1 11778604 |
|
NZ1 15189274 |
|
AU@ 000069007658 |
|