LEADER 02720nam 2200577Ia 450 001 9910816735503321 005 20230120003818.0 010 $a1-281-05637-5 010 $a9786611056377 010 $a0-08-048082-9 035 $a(CKB)111086906344944 035 $a(EBL)294358 035 $a(OCoLC)191035009 035 $a(SSID)ssj0000243222 035 $a(PQKBManifestationID)11218905 035 $a(PQKBTitleCode)TC0000243222 035 $a(PQKBWorkID)10321785 035 $a(PQKB)11486914 035 $a(MiAaPQ)EBC294358 035 $a(Au-PeEL)EBL294358 035 $a(CaPaEBR)ebr10048151 035 $a(CaONFJC)MIL105637 035 $a(EXLCZ)99111086906344944 100 $a20020213d2004 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity assessment $ecase studies for implementing the NSA lAM /$fRuss Rogers 205 $a3rd ed. 210 $aRockland, MA $cSyngress Publishing$dc2004 215 $a1 online resource (465 p.) 300 $aIncludes index. 311 $a1-932266-96-8 327 $aCover; Contents; Introduction; Chapter 1 Laying the Foundation for Your Assessment; Chapter 2 The Pre-Assessment Visit; Chapter 3 Determining the Organization's Information Criticality; Chapter 4 System Information Criticality; Chapter 5 The System Security Environment; Chapter 6 Understanding the Technical Assessment Plan; Chapter 7 Customer Activities; Chapter 8 Managing the Findings; Chapter 9 Leaving No Surprises; Chapter 10 Final Reporting; Chapter 11 Tying Up Loose Ends; Appendix A Forms, Worksheets, and Templates; Index; Related Titles 330 $aThe National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines.This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for th 606 $aComputers$xAccess control 606 $aInformation technology$xManagement 615 0$aComputers$xAccess control. 615 0$aInformation technology$xManagement. 676 $a005.8 676 $a005.8 700 $aRogers$b Russ$0627573 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910816735503321 996 $aSecurity assessment$91464052 997 $aUNINA