Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
E-Book/E-Doc

Title Security assessment : case studies for implementing the NSA IAM / Russ Rogers [and others].

Imprint Rockland, Mass. : Syngress, 2004.

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Description 1 online resource (xxxiv, 429 pages) : illustrations
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Note Includes index.
Print version record.
Contents Laying the foundation for your assessment; The pre-assessment visit; Determining the organizations information criticality -- system information criticality; The system security environment; Understanding the technical assessment plan; Customer activities; Managing the findings; Leaving no surprises; Final reporting; Tying up loose ends.
Summary The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines. This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc). The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement. Everything You Need to Know to Conduct a Security Audit of Your Organization Step-by-Step Instructions for Implementing the National Security Agency's Guidelines Special Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more.
Subject Computer security -- Evaluation.
Sécurité informatique -- Évaluation.
Computer security -- Evaluation
Genre/Form Electronic books.
Fictional Work
Fiction
Fiction.
Romans.
Added Author Rogers, Russ.
Syngress Media, Inc.
Other Form: Print version: Security assessment. Rockland, Mass. : Syngress, 2004 1932266968 (OCoLC)53709726
ISBN 1597490105 (electronic bk.)
9781597490108 (electronic bk.)
9781932266962
1932266968
0080480829
9780080480824
Standard No. AU@ 000050982147
AU@ 000051559071
AU@ 000051860325
CHBIS 005831745
CHNEW 001004755
CHVBK 168651327
DEBBG BV042307370
DEBBG BV043068708
DEBBG BV044124223
DEBSZ 405314442
DEBSZ 422350192
GBVCP 801214602
NZ1 12435694

 
    
Available items only