Risk Management Framework: A Lab-Based Approach to Securing Information Systems
Autor James Broaden Limba Engleză Paperback – 28 aug 2013
- A comprehensive case study from initiation to decommission and disposal
- Detailed explanations of the complete RMF process and its linkage to the SDLC
- Hands on exercises to reinforce topics
- Complete linkage of the RMF to all applicable laws, regulations and publications as never seen before
Preț: 263.61 lei
Preț vechi: 390.17 lei
-32% Nou
Puncte Express: 395
Preț estimativ în valută:
50.45€ • 52.59$ • 42.00£
50.45€ • 52.59$ • 42.00£
Carte indisponibilă temporar
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597499958
ISBN-10: 1597499951
Pagini: 316
Ilustrații: 30 illustrations
Dimensiuni: 191 x 235 x 15 mm
Greutate: 0.58 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 1597499951
Pagini: 316
Ilustrații: 30 illustrations
Dimensiuni: 191 x 235 x 15 mm
Greutate: 0.58 kg
Editura: ELSEVIER SCIENCE
Public țintă
Information Security professionals of all levels, systems administrators, information technology leaders, network administrators, information auditors, security managers, and an academic audience among information assurance majors.Cuprins
Introduction
Laws, Regulation and Guidance
The Joint Task Force Transformation Initiative
Key Positions and Roles
Transition from the Four-Phase Certification and Accreditation Cycle
The RMF
Integrated Organization-Wide Risk Management
Lab Organization
Phase 1: System Categorization
Phase 2: Control Selection
Phase 3: Control Implementation
Phase 4: Control Assessment
Phase 5: System Authorization
Phase 6: Continuous Monitoring
Use of RMF in Other Environments
Future Planned Changes
Use with Other Compliance Requirements
Appendices
Laws, Regulation and Guidance
The Joint Task Force Transformation Initiative
Key Positions and Roles
Transition from the Four-Phase Certification and Accreditation Cycle
The RMF
Integrated Organization-Wide Risk Management
Lab Organization
Phase 1: System Categorization
Phase 2: Control Selection
Phase 3: Control Implementation
Phase 4: Control Assessment
Phase 5: System Authorization
Phase 6: Continuous Monitoring
Use of RMF in Other Environments
Future Planned Changes
Use with Other Compliance Requirements
Appendices
Recenzii
"Writing for technical, administrative, and management professionals within the US government, information security consultant Broad explains the basics of the risk management framework as it pertains to the systems development life cycle of federal information technology systems, and suggests how to use this information during the development, assessment, and continuous monitoring of those systems." --Reference & Research Book News, December 2013