FISMA certification & accreditation handbook:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
c2007
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements. This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three leading types of C & A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a C & A project. The next section to the book illustrates addressing security awareness, end-user rules of behavior, and incident response requirements. Once this phase of the C & A project is complete, the reader will learn to perform the security tests and evaluations, business impact assessments system risk assessments, business risk assessments, contingency plans, business impact assessments, and system security plans. Finally the reader will learn to audit their entire C & A project and correct any failures. * Focuses on federally mandated certification and accreditation requirements * Author Laura Taylor's research on Certification and Accreditation has been used by the FDIC, the FBI, and the Whitehouse * Full of vital information on compliance for both corporate and government IT Managers Includes bibliographical references Cover; Contents; Foreword; Preface; Chapter 1: What Is Certification and Accreditation?; Chapter 2: Types of Certification and Accreditation; Chapter 3: Understanding the Certification and Accreditation Process; Chapter 4: Establishing a C & A Program; Chapter 5: Developing a Certification Package; Chapter 6: Preparing the Hardware and Software Inventory; Chapter 7: Determining the Certification Level; Chapter 8: Performing and Preparing the Self-Assessment; Chapter 9: Addressing Security Awareness and Training Requirements; Chapter 10: Addressing End- User Rules of Behavior |
Beschreibung: | 1 Online-Ressource (xxx, 498 p.) |
ISBN: | 0080506534 142945492X 1597491160 9780080506531 9781429454926 9781597491167 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043044474 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151123s2007 |||| o||u| ||||||eng d | ||
020 | |a 0080506534 |9 0-08-050653-4 | ||
020 | |a 142945492X |c electronic bk. |9 1-4294-5492-X | ||
020 | |a 1597491160 |9 1-59749-116-0 | ||
020 | |a 9780080506531 |9 978-0-08-050653-1 | ||
020 | |a 9781429454926 |c electronic bk. |9 978-1-4294-5492-6 | ||
020 | |a 9781597491167 |9 978-1-59749-116-7 | ||
035 | |a (OCoLC)162597589 | ||
035 | |a (DE-599)BVBBV043044474 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Taylor, Laura |e Verfasser |4 aut | |
245 | 1 | 0 | |a FISMA certification & accreditation handbook |c Laura Taylor ; Matthew Shepherd, technical editor |
264 | 1 | |a Rockland, MA |b Syngress |c c2007 | |
300 | |a 1 Online-Ressource (xxx, 498 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements. This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three leading types of C & A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a C & A project. The next section to the book illustrates addressing security awareness, end-user rules of behavior, and incident response requirements. Once this phase of the C & A project is complete, the reader will learn to perform the security tests and evaluations, business impact assessments system risk assessments, business risk assessments, contingency plans, business impact assessments, and system security plans. Finally the reader will learn to audit their entire C & A project and correct any failures. * Focuses on federally mandated certification and accreditation requirements * Author Laura Taylor's research on Certification and Accreditation has been used by the FDIC, the FBI, and the Whitehouse * Full of vital information on compliance for both corporate and government IT Managers | ||
500 | |a Includes bibliographical references | ||
500 | |a Cover; Contents; Foreword; Preface; Chapter 1: What Is Certification and Accreditation?; Chapter 2: Types of Certification and Accreditation; Chapter 3: Understanding the Certification and Accreditation Process; Chapter 4: Establishing a C & A Program; Chapter 5: Developing a Certification Package; Chapter 6: Preparing the Hardware and Software Inventory; Chapter 7: Determining the Certification Level; Chapter 8: Performing and Preparing the Self-Assessment; Chapter 9: Addressing Security Awareness and Training Requirements; Chapter 10: Addressing End- User Rules of Behavior | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 local | |
650 | 7 | |a Data protection |2 local | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
700 | 1 | |a Shepherd, Matthew |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028469011 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175410315919360 |
---|---|
any_adam_object | |
author | Taylor, Laura |
author_facet | Taylor, Laura |
author_role | aut |
author_sort | Taylor, Laura |
author_variant | l t lt |
building | Verbundindex |
bvnumber | BV043044474 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)162597589 (DE-599)BVBBV043044474 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03861nmm a2200517zc 4500</leader><controlfield tag="001">BV043044474</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151123s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080506534</subfield><subfield code="9">0-08-050653-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">142945492X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4294-5492-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491160</subfield><subfield code="9">1-59749-116-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080506531</subfield><subfield code="9">978-0-08-050653-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429454926</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4294-5492-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491167</subfield><subfield code="9">978-1-59749-116-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162597589</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043044474</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Taylor, Laura</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">FISMA certification & accreditation handbook</subfield><subfield code="c">Laura Taylor ; Matthew Shepherd, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxx, 498 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements. This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three leading types of C & A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a C & A project. The next section to the book illustrates addressing security awareness, end-user rules of behavior, and incident response requirements. Once this phase of the C & A project is complete, the reader will learn to perform the security tests and evaluations, business impact assessments system risk assessments, business risk assessments, contingency plans, business impact assessments, and system security plans. Finally the reader will learn to audit their entire C & A project and correct any failures. * Focuses on federally mandated certification and accreditation requirements * Author Laura Taylor's research on Certification and Accreditation has been used by the FDIC, the FBI, and the Whitehouse * Full of vital information on compliance for both corporate and government IT Managers</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Contents; Foreword; Preface; Chapter 1: What Is Certification and Accreditation?; Chapter 2: Types of Certification and Accreditation; Chapter 3: Understanding the Certification and Accreditation Process; Chapter 4: Establishing a C & A Program; Chapter 5: Developing a Certification Package; Chapter 6: Preparing the Hardware and Software Inventory; Chapter 7: Determining the Certification Level; Chapter 8: Performing and Preparing the Self-Assessment; Chapter 9: Addressing Security Awareness and Training Requirements; Chapter 10: Addressing End- User Rules of Behavior</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shepherd, Matthew</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028469011</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043044474 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:51Z |
institution | BVB |
isbn | 0080506534 142945492X 1597491160 9780080506531 9781429454926 9781597491167 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028469011 |
oclc_num | 162597589 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxx, 498 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress |
record_format | marc |
spelling | Taylor, Laura Verfasser aut FISMA certification & accreditation handbook Laura Taylor ; Matthew Shepherd, technical editor Rockland, MA Syngress c2007 1 Online-Ressource (xxx, 498 p.) txt rdacontent c rdamedia cr rdacarrier Includes index The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements. This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three leading types of C & A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a C & A project. The next section to the book illustrates addressing security awareness, end-user rules of behavior, and incident response requirements. Once this phase of the C & A project is complete, the reader will learn to perform the security tests and evaluations, business impact assessments system risk assessments, business risk assessments, contingency plans, business impact assessments, and system security plans. Finally the reader will learn to audit their entire C & A project and correct any failures. * Focuses on federally mandated certification and accreditation requirements * Author Laura Taylor's research on Certification and Accreditation has been used by the FDIC, the FBI, and the Whitehouse * Full of vital information on compliance for both corporate and government IT Managers Includes bibliographical references Cover; Contents; Foreword; Preface; Chapter 1: What Is Certification and Accreditation?; Chapter 2: Types of Certification and Accreditation; Chapter 3: Understanding the Certification and Accreditation Process; Chapter 4: Establishing a C & A Program; Chapter 5: Developing a Certification Package; Chapter 6: Preparing the Hardware and Software Inventory; Chapter 7: Determining the Certification Level; Chapter 8: Performing and Preparing the Self-Assessment; Chapter 9: Addressing Security Awareness and Training Requirements; Chapter 10: Addressing End- User Rules of Behavior COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security local Data protection local Computer security Data protection Shepherd, Matthew Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012 Aggregator Volltext |
spellingShingle | Taylor, Laura FISMA certification & accreditation handbook COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security local Data protection local Computer security Data protection |
title | FISMA certification & accreditation handbook |
title_auth | FISMA certification & accreditation handbook |
title_exact_search | FISMA certification & accreditation handbook |
title_full | FISMA certification & accreditation handbook Laura Taylor ; Matthew Shepherd, technical editor |
title_fullStr | FISMA certification & accreditation handbook Laura Taylor ; Matthew Shepherd, technical editor |
title_full_unstemmed | FISMA certification & accreditation handbook Laura Taylor ; Matthew Shepherd, technical editor |
title_short | FISMA certification & accreditation handbook |
title_sort | fisma certification accreditation handbook |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security local Data protection local Computer security Data protection |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Data protection |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012 |
work_keys_str_mv | AT taylorlaura fismacertificationaccreditationhandbook AT shepherdmatthew fismacertificationaccreditationhandbook |