000 05201cam a2200565Ii 4500
001 ocn932016626
003 OCoLC
005 20190328114813.0
006 m o d
007 cr cnu|||unuuu
008 151210t20152016mau o 001 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dYDXCP
_dOPELS
_dN$T
_dOCLCF
_dCDX
_dEBLCP
_dIDEBK
_dMERUC
_dDEBSZ
_dIDB
_dOCLCQ
_dWRM
_dU3W
_dD6H
_dOCLCQ
_dCUY
_dZCU
_dICG
_dDKC
019 _a932049488
_a935249504
020 _a9780128025642
_q(electronic bk.)
020 _a0128025646
_q(electronic bk.)
020 _z9780128023242
020 _z0128023244
035 _a(OCoLC)932016626
_z(OCoLC)932049488
_z(OCoLC)935249504
050 4 _aHD61
072 7 _aBUS
_x082000
_2bisacsh
072 7 _aBUS
_x041000
_2bisacsh
072 7 _aBUS
_x042000
_2bisacsh
072 7 _aBUS
_x085000
_2bisacsh
082 0 4 _a658.15/5
_223
100 1 _aJohnson, Leighton,
_eauthor.
245 1 0 _aSecurity controls evaluation, testing, and assessment handbook /
_h[electronic resource]
_cLeighton Johnson.
264 1 _aWaltham, MA :
_bSyngress is an imprint of Elsevier,
_c2015.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _aIncludes index.
588 0 _aOnline resource; title from PDF title page (ScienceDirect, viewed December 16, 2015).
505 0 _aCover; Title Page; Copyright Page; Dedication; Contents; Introduction; Section I; Chapter 1 -- Introduction to Assessments; Chapter 2 -- Risk, Security, and Assurance; Risk management; Risk assessments; Security controls; Chapter 3 -- Statutory and Regulatory GRC; Statutory requirements; Privacy Act -- 1974; CFAA -- 1986; ECPA -- 1986; CSA -- 1987; CCA -- 1996; HIPAA -- 1996; EEA -- 1996; GISRA -- 1998; USA PATRIOT Act -- 2001; FISMA -- 2002; Sarbanes-Oxley -- 2002; Health Information Technology for Economic and Clinical Health Act -- 2009; Executive Orders/Presidential Directives.
505 8 _aFederal processing standardsFIPS-140 -- Security Requirements for Cryptographic Modules; FIPS-186 -- Digital Signature Standard (DSS); FIPS-190 -- Guideline for the Use of Advanced Authentication Technology Alternatives; FIPS-191 -- Guideline for the Analysis Local Area Network Security; FIPS-199 -- Standards for Security Categorization of Federal Information and Information Systems; FIPS-200 -- Minimum Security Requirements for Federal Information and Information Systems; FIPS-201 -- Personal Identity Verification of Federal Employees and Contractors; Regulatory requirements; DOD; CNSS; HHS.
505 8 _aHIPAA Security RuleHIPAA Privacy Rule; HITECH Breach Reporting; OMB requirements for each agency; References; Chapter 4 -- Federal RMF Requirements; Federal civilian agencies; DOD -- DIACAP -- RMF for DOD IT; IC -- ICD 503; FedRAMP; NIST Cybersecurity Framework; References; Chapter 5 -- Risk Management Framework; Step 1 -- categorization; Step 2 -- selection; Step 3 -- implementation; Step 4 -- assessment; Step 5 -- authorization; Step 6 -- monitoring; Continuous Monitoring for Current Systems; Chapter 6 -- Roles and Responsibilities; Organizational roles; White House; Congress; OMB; NIST; CNSS; NSA.
505 8 _aNIAPDHS; DOD; Individual roles; System Owner; Authorizing Official; Information System Security Officer; Information System Security Engineer; Security Architect; Common Control Provider; Authorizing Official Designated Representative; Information Owner/Steward; Risk Executive (Function); User Representative; Agency Head; Security Control Assessor; Senior Information Security Officer; Chief Information Officer; DOD roles; Section II ; Introduction; Chapter -- 7 -- Assessment Process; Focus; Guidance; SP 800-53A; RMF Step 4 -- Assess Security Controls; SP 800-115; RMF Knowledge Service.
505 8 _aISO 27001/27002Chapter -- 8 -- Assessment Methods; Evaluation methods and their attributes; Processes; Interviews; Examinations; Observations; Document Reviews; Testing; Automated; Manual; Chapter -- 9 -- Assessment Techniques for Each Kind of Control; Security assessment plan developmental process; Security assessment actions; Security controls by family; Chapter -- 10 -- System and Network Assessments; 800-115 introduction; Assessment techniques; Network testing purpose and scope; ACL Reviews; System-Defined Reviews; Testing roles and responsibilities; Security testing techniques.
504 _aIncludes bibliographical references and index.
650 0 _aRisk management.
650 7 _aBUSINESS & ECONOMICS
_xIndustrial Management.
_2bisacsh
650 7 _aBUSINESS & ECONOMICS
_xManagement.
_2bisacsh
650 7 _aBUSINESS & ECONOMICS
_xManagement Science.
_2bisacsh
650 7 _aBUSINESS & ECONOMICS
_xOrganizational Behavior.
_2bisacsh
650 7 _aRisk management.
_2fast
_0(OCoLC)fst01098164
655 4 _aElectronic books.
655 7 _aElectronic books.
_2lcgft
776 0 8 _iPrint version:
_aJohnson, Leighton.
_tSecurity Controls Evaluation, Testing, and Assessment Handbook.
_dSaint Louis, MO : Elsevier Science, �2015
_z9780128023242
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128023242
999 _c247248
_d247248