Risk Management Framework: A Lab-Based Approach to Securing Information Systems

· Newnes
4,0
3 κριτικές
ebook
316
Σελίδες
Κατάλληλο

Σχετικά με το ebook

The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly implement this process. No other publication covers this topic in the detail provided in this book or provides hands-on exercises that will enforce the topics. Examples in the book follow a fictitious organization through the RMF, allowing the reader to follow the development of proper compliance measures. Templates provided in the book allow readers to quickly implement the RMF in their organization. The need for this book continues to expand as government and non-governmental organizations build their security programs around the RMF. The companion website provides access to all of the documents, templates and examples needed to not only understand the RMF but also implement this process in the reader’s own organization.
  • A comprehensive case study from initiation to decommission and disposal
  • Detailed explanations of the complete RMF process and its linkage to the SDLC
  • Hands on exercises to reinforce topics
  • Complete linkage of the RMF to all applicable laws, regulations and publications as never seen before

Βαθμολογίες και αξιολογήσεις

4,0
3 αξιολογήσεις

Σχετικά με τον συγγραφέα

James Broad (CISSP, C|EH, CPTS, Security+, MBA) is the President and owner of Cyber-Recon, LLC, where he and his team of consultants specialize in Information Security, Information Assurance, Certification and Accreditation and offer other security consultancy services to corporate and government clients. As a security professional with over 20 years of real-world IT experience, James is an expert in many areas of IT security, specializing in security engineering, penetration testing, vulnerability analysis and research. He has provided security services in the nation’s most critical sectors including defense, law enforcement, intelligence, finance and healthcare.

Αξιολογήστε αυτό το ebook

Πείτε μας τη γνώμη σας.

Πληροφορίες ανάγνωσης

Smartphone και tablet
Εγκαταστήστε την εφαρμογή Βιβλία Google Play για Android και iPad/iPhone. Συγχρονίζεται αυτόματα με τον λογαριασμό σας και σας επιτρέπει να διαβάζετε στο διαδίκτυο ή εκτός σύνδεσης, όπου κι αν βρίσκεστε.
Φορητοί και επιτραπέζιοι υπολογιστές
Μπορείτε να ακούσετε ηχητικά βιβλία τα οποία αγοράσατε στο Google Play, χρησιμοποιώντας το πρόγραμμα περιήγησης στον ιστό του υπολογιστή σας.
eReader και άλλες συσκευές
Για να διαβάσετε περιεχόμενο σε συσκευές e-ink, όπως είναι οι συσκευές Kobo eReader, θα χρειαστεί να κατεβάσετε ένα αρχείο και να το μεταφέρετε στη συσκευή σας. Ακολουθήστε τις αναλυτικές οδηγίες του Κέντρου βοήθειας για να μεταφέρετε αρχεία σε υποστηριζόμενα eReader.