Description |
1 online resource |
Contents |
Introduction -- Federal information security fundamentals -- Thinking about risk -- Thinking about systems -- Success factors -- Risk management framework planning and initiation -- Risk management framework steps 1 & 2 -- Risk management framework steps 3 & 4 -- Risk management framework steps 5 & 6 -- System security plan -- Security assessment report -- Plan of action and milestones -- Risk management -- Continuous monitoring -- Contingency planning -- Privacy -- Federal initiatives |
Summary |
If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense, Office of the Directory of National Intelligence, Committee for National Security Systems and the National Institute of Standards and Technology. Based on the new FISMA requirements for 2011 and beyond, this book catalogs the processes, procedures and specific security recommendations underlying the new Risk Management Framework. Written by an experienced FISMA practitioner, this book presents an effective system of information assurance, real-time risk monitoring and secure configurations for common operating systems. Learn how to build a robust, near real-time risk management system and comply with FISMADiscover the changes to FISMA compliance and beyondGain your systems the authorization they need |
Bibliography |
Includes bibliographical references and index |
Notes |
Publisher supplied information; title not viewed |
Subject |
United States. Federal Information Security Management Act of 2002.
|
SUBJECT |
United States / Federal Information Security Management Act of 2002. blmlsh |
|
Federal Information Security Management Act of 2002 (United States) fast |
Subject |
Computer security -- United States
|
|
Computer security -- Law and legislation -- United States
|
|
Information technology -- Security measures -- United States
|
|
Electronic government information -- Security measures -- United States
|
|
Administrative agencies -- Information resources management -- Security measures -- United States
|
|
Computer networks -- Security measures -- United States
|
|
COMPUTERS -- Internet -- Security.
|
|
COMPUTERS -- Networking -- Security.
|
|
COMPUTERS -- Security -- General.
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Computer security -- Law and legislation
|
|
Information technology -- Security measures
|
|
United States
|
Form |
Electronic book
|
Author |
Gantz, Stephen D.
|
|
Philpott, Daniel R.
|
LC no. |
2012039363 |
ISBN |
9781597496421 |
|
1597496421 |
|