LEADER 02214aam 2200433I 450 001 9910711179903321 005 20151105023937.0 024 8 $aGOVPUB-C13-c4cc276cdc061a4da1e954bb4c2b0866 035 $a(CKB)5470000002480209 035 $a(OCoLC)927737034 035 $a(EXLCZ)995470000002480209 100 $a20151105d1998 ua 0 101 0 $aeng 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aGuide for developing security plans for information technology systems /$fMarianne Swanson 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d1998. 215 $a1 online resource 225 1 $aNIST special publication ;$v800-18 300 $a1998. 300 $aContributed record: Metadata reviewed, not verified. Some fields updated by batch processes. 300 $aSuperseded by NIST Special Publication 800-18r1. 300 $aTitle from PDF title page. 320 $aIncludes bibliographical references. 330 3 $aToday??s rapidly changing technical environment requires federal agencies to adopt a minimum set of management controls to protect their information technology (IT) resources. These management controls are directed at individual information technology users in order to reflect the distributed nature of today??s technology. Technical and operational controls support management controls. To be effective, these controls all must interrelate. This document provides a guideline for federal agencies to follow when developing the security plans that document the management, technical, and operational controls for federal automated information systems. 610 $aComputer security 610 $aSecurity management controls 610 $aSecurity plans 700 $aSwanson$b Marianne$01352963 701 $aSwanson$b Marianne$01352963 712 02$aNational Institute of Standards and Technology (U.S.).$bComputer Security Division. 801 0$bNBS 801 1$bNBS 801 2$bGPO 906 $aBOOK 912 $a9910711179903321 996 $aGuide for developing security plans for information technology systems$93498620 997 $aUNINA