02635aam 2200493I 450 991071118070332120151105023937.0GOVPUB-C13-e1a8f04b2799939a3c918087ba430db4(CKB)5470000002480201(OCoLC)927737176(EXLCZ)99547000000248020120151105d1992 ua 0engrdacontentrdamediardacarrierComputer security considerations in federal procurements a guide for procurement initiators, contracting officers, and computer security officials /Barbara GuttmanGaithersburg, MD :U.S. Dept. of Commerce, National Institute of Standards and Technology,1992.1 online resourceNIST special publication ;800-41992.Contributed record: Metadata reviewed, not verified. Some fields updated by batch processes.Superseded by NIST Special Publication 800-64.Title from PDF title page.Includes bibliographical references.This NIST Special Publication provides guidance for federal procurement initiators, contracting officers, and computer security officials on including computer security in acquisitions. To accomplish this goal, computer security and federal information processing (FIP) procurement must be integrated. Computer security is the protection of the integrity, availability and confidentiality of automated information and the resources used to enter, store, process, and communicate the information. Computer security shares properties with systems/software engineering including trustworthiness, system safety, and reliability. FIP procurement is the process of acquiring hardware, software, firmware, computer-related services and telecommunications. FIP procurement begins with the process of determining needs and ends with contract completion.Computer security considerations in federal procurements AcquisitionAssuranceComputer securityProcurementRequirements analysisRisk analysisSpecificationsGuttman Barbara1382130Guttman Barbara1382130National Institute of Standards and Technology (U.S.).Computer Security Division.NBSNBSGPOBOOK9910711180703321Computer security considerations in federal procurements3498942UNINA