02759nam 2200577Ia 450 991045572490332120200520144314.01-281-05637-597866110563770-08-048082-9(CKB)111086906344944(EBL)294358(OCoLC)191035009(SSID)ssj0000243222(PQKBManifestationID)11218905(PQKBTitleCode)TC0000243222(PQKBWorkID)10321785(PQKB)11486914(MiAaPQ)EBC294358(Au-PeEL)EBL294358(CaPaEBR)ebr10048151(CaONFJC)MIL105637(EXLCZ)9911108690634494420020213d2004 uy 0engur|n|---|||||txtccrSecurity assessment[electronic resource] case studies for implementing the NSA lAM /Russ Rogers3rd ed.Rockland, MA Syngress Publishingc20041 online resource (465 p.)Includes index.1-932266-96-8 Cover; Contents; Introduction; Chapter 1 Laying the Foundation for Your Assessment; Chapter 2 The Pre-Assessment Visit; Chapter 3 Determining the Organization's Information Criticality; Chapter 4 System Information Criticality; Chapter 5 The System Security Environment; Chapter 6 Understanding the Technical Assessment Plan; Chapter 7 Customer Activities; Chapter 8 Managing the Findings; Chapter 9 Leaving No Surprises; Chapter 10 Final Reporting; Chapter 11 Tying Up Loose Ends; Appendix A Forms, Worksheets, and Templates; Index; Related TitlesThe National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines.This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for thComputersAccess controlInformation technologyManagementElectronic books.ComputersAccess control.Information technologyManagement.005.8Rogers Russ627573MiAaPQMiAaPQMiAaPQBOOK9910455724903321Security assessment1464052UNINA