LEADER 03521nam a2200397Ii 4500 001 991003260989707536 006 m d 007 cr cn||||||||| 008 070806s2004 maua s 001 1 eng d 020 $a9781932266962 020 $a1932266968 035 $ab13656831-39ule_inst 037 $a103611:103631$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS 049 $aTEFA 082 04$a005.8$222 245 00$aSecurity assessment$h[electronic resource] :$bcase studies for implementing the NSA IAM /$cRuss Rogers ... [et al.]. 260 $aRockland, MA :$bSyngress,$cc2004. 300 $axxxiv, 429 p. :$bill. ;$c24 cm. 500 $aIncludes index. 505 0 $aLaying the foundation for your assessment; The pre-assessment visit; Determining the organizations information criticality -- system information criticality; The system security environment; Understanding the technical assessment plan; Customer activities; Managing the findings; Leaving no surprises; Final reporting; Tying up loose ends. 520 $aThe National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines. This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc). The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement. Everything You Need to Know to Conduct a Security Audit of Your Organization Step-by-Step Instructions for Implementing the National Security Agency's Guidelines Special Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aComputer security. 650 0$aComputers$xAccess control. 650 0$aInformation technology$xSecurity measures. 655 7$aElectronic books.$2local 700 1 $aRogers, Russ.$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0627573 776 1 $cOriginal$z1932266968$z9781932266962$w(OCoLC)53709726 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781932266962$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b13656831$b24-02-22$c24-01-08 912 $a991003260989707536 994 $aC0$bTEF 996 $aSecurity assessment$91464052 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gmau$h0$i0