|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910780114003321 |
|
|
Autore |
Rogers Russ |
|
|
Titolo |
Security assessment [[electronic resource] ] : case studies for implementing the NSA lAM / / Russ Rogers |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Rockland, MA, : Syngress Publishing, c2004 |
|
|
|
|
|
|
|
ISBN |
|
1-281-05637-5 |
9786611056377 |
0-08-048082-9 |
|
|
|
|
|
|
|
|
Edizione |
[3rd ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (465 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computers - Access control |
Information technology - Management |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Contents; Introduction; Chapter 1 Laying the Foundation for Your Assessment; Chapter 2 The Pre-Assessment Visit; Chapter 3 Determining the Organization's Information Criticality; Chapter 4 System Information Criticality; Chapter 5 The System Security Environment; Chapter 6 Understanding the Technical Assessment Plan; Chapter 7 Customer Activities; Chapter 8 Managing the Findings; Chapter 9 Leaving No Surprises; Chapter 10 Final Reporting; Chapter 11 Tying Up Loose Ends; Appendix A Forms, Worksheets, and Templates; Index; Related Titles |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines.This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for th |
|
|
|
|
|
|
|