Security Assessment: Case Studies for Implementing the NSA IAM

Security Assessment: Case Studies for Implementing the NSA IAM

by Syngress
ISBN-10:
1932266968
ISBN-13:
9781932266962
Pub. Date:
01/29/2004
Publisher:
Elsevier Science
ISBN-10:
1932266968
ISBN-13:
9781932266962
Pub. Date:
01/29/2004
Publisher:
Elsevier Science
Security Assessment: Case Studies for Implementing the NSA IAM

Security Assessment: Case Studies for Implementing the NSA IAM

by Syngress

Paperback

$76.95 Current price is , Original price is $76.95. You
$76.95 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.


Overview

The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. Security Assessment shows how to do a complete security assessment based on the NSA's guidelines.

Security Assessment also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc).

Security Assessment is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement.


Product Details

ISBN-13: 9781932266962
Publisher: Elsevier Science
Publication date: 01/29/2004
Pages: 464
Product dimensions: 7.00(w) x 9.10(h) x 1.10(d)

Table of Contents

Laying the foundation for your assessment; The pre-assessment visit; Determining the organization’s information criticality system information criticality; The system security environment; Understanding the technical assessment plan; Customer activities; Managing the findings; Leaving no surprises; Final reporting; Tying up loose ends

What People are Saying About This

From the Publisher

Everything you need to know to conduct a security audit of your organisation

From the B&N Reads Blog

Customer Reviews