LEADER 03608nam 2200517 450 001 9910698431903321 005 20230902162212.0 035 $a(CKB)2430000000036169 035 $a(NjHacI)992430000000036169 035 $a(OCoLC)83029474 035 $a(EXLCZ)992430000000036169 100 $a20230306d2006 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation security handbook $ea guide for managers (NIST special publication 800-100) : recommendations of the National Institute of Standards and Technology /$fP. Bowen, J. Hash, M. Wilson 210 1$aGaithersburg, Md. :$cU.S. Dept. of Commerce,$d2006. 215 $a1 online resource (178 pages) $cillustrations 225 1 $aNIST special publication 300 $aTitle from title screen (NIST, viewed Feb. 12, 2007). 300 $a"October 2006." 320 $aIncludes bibliographical references (page 136). 327 $aIntroduction -- Information security governance -- System development life cycle -- Awareness and training -- Capital planning and investment control -- Interconnecting systems -- Performance measures -- Security planning -- Information technology contingency planning -- Risk management -- Certification, accreditation, and security assessments -- Security services and products acquisition -- Incident response -- Configuration management. 330 $aThis Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to establish and implement an information security program. Typically, the organization looks to the program for overall responsibility to ensure the selection and implementation of appropriate security controls and to demonstrate the effectiveness of satisfying their stated security requirements. The topics within this document were selected based on the laws and regulations relevant to information security, including the Clinger-Cohen Act of 1996, the Federal Information Security Management Act (FISMA) of 2002, and Office of Management and Budget (OMB) Circular A-130. The material in this handbook can be referenced for general information on a particular topic or can be used in the decision making process for developing an information security program. National Institute of Standards and Technology (NIST) Interagency Report (IR) 7298, Glossary of Key Information Security Terms, provides a summary glossary for the basic security terms used throughout this document. While reading this handbook, please consider that the guidance is not specific to a particular agency. Agencies should tailor this guidance according to their security posture and business requirements. 410 0$aNIST special publication. 531 $aINFORMATION SECURITY HANDBOOK 606 $aComputer networks$xSecurity measures$zUnited States 606 $aComputer security$xStandards 606 $aInformation technology$xSecurity measures 608 $aHandbooks and manuals.$2lcgft 615 0$aComputer networks$xSecurity measures 615 0$aComputer security$xStandards. 615 0$aInformation technology$xSecurity measures. 676 $a005.8 700 $aBowen$b Pauline$01351624 702 $aHash$b Joan 702 $aWilson$b Mark 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910698431903321 996 $aInformation security handbook$93124828 997 $aUNINA