Syngress | Security Assessment | E-Book | www.sack.de
E-Book

E-Book, Englisch, 448 Seiten, Web PDF

Syngress Security Assessment

Case Studies for Implementing the NSA IAM
1. Auflage 2004
ISBN: 978-0-08-048082-4
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark

Case Studies for Implementing the NSA IAM

E-Book, Englisch, 448 Seiten, Web PDF

ISBN: 978-0-08-048082-4
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark



The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines.

This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc).

The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement.

? Everything You Need to Know to Conduct a Security Audit of Your Organization

? Step-by-Step Instructions for Implementing the National Security Agency's Guidelines

? Special Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more

Syngress Security Assessment jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1.1.1;Cover;1
1.1.2;Contents;12
1.1.3;Introduction;26
1.1.4;Chapter 1 Laying the Foundation for Your Assessment;36
1.1.5;Chapter 2 The Pre-Assessment Visit;80
1.1.6;Chapter 3 Determining the Organization’s Information Criticality;116
1.1.7;Chapter 4 System Information Criticality;154
1.1.8;Chapter 5 The System Security Environment;186
1.1.9;Chapter 6 Understanding the Technical Assessment Plan;218
1.1.10;Chapter 7 Customer Activities;254
1.1.11;Chapter 8 Managing the Findings;304
1.1.12;Chapter 9 Leaving No Surprises;344
1.1.13;Chapter 10 Final Reporting;368
1.1.14;Chapter 11 Tying Up Loose Ends;402
1.1.15;Appendix A Forms, Worksheets, and Templates;436
1.1.16;Index;452
1.1.17;Related Titles;465



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.