Description |
1 online resource (xxxi, 417 pages) : illustrations |
|
data file rda |
Series |
(ISC)2 Press series |
|
(ISC)2 Press series.
|
Note |
"An Auerbach book." |
Summary |
"There are many elements that make system authorization complex. This book focuses on the processes that must be employed by an organization to establish a system authorization program based on current federal government criteria. Although the roots of this book address various federal requirements, the process developed and presented can be used by nongovernment organizations to address compliance and the myriad laws, regulations, and standards currently driving information technology security. The key to reaching system authorization nirvana is understanding what is required and then implementing a methodology that will achieve those requirements. The top-down methodology presented in this book provides the reader with a practical approach for completion of such an undertaking. By demystifying government requirements, this book presents a simplified, practical approach to system authorization"-- Provided by publisher. |
Bibliography |
Includes bibliographical references and index. |
Contents |
Ch. 1. Security authorization of information systems -- ch. 2. Information system categorization -- ch. 3. Establishment of the security control baseline -- ch. 4. Application of security controls -- ch. 5. Assessment of security controls -- ch. 6. Information system authorization -- ch. 7. Security controls monitoring -- ch. 8. System authorization case study -- ch. 9. The future of information system authorization. |
Subject |
Computer networks -- Security measures -- Examinations -- Study guides.
|
|
Computers -- Access control -- Examinations -- Study guides.
|
|
Administrative agencies -- Information resources management -- Security measures -- United States -- Examinations -- Study guides.
|
|
Telecommunications engineers -- Certification -- United States.
|
|
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Examens -- Guides de l'étudiant. |
|
Ordinateurs -- Accès -- Contrôle -- Examens -- Guides de l'étudiant. |
|
Administration publique -- Gestion de l'information -- États-Unis -- Sécurité -- Mesures -- Examens -- Guides de l'étudiant. |
|
Computer networks -- Security measures -- Examinations |
|
Telecommunications engineers -- Certification |
|
United States |
Genre |
Study guides
|
Added Title |
Official ISC2 guide to the CAP CBK |
|
Official (ISC)2 to the Certified authorization professional CBK |
Other Form: |
9781439820759 |
|
9781439820766 |
ISBN |
9781439820766 (e-book) |
|
1439820767 |
|
9781439820766 |
|
9781466576032 |
|
1466576030 |
|
9781466576018 |
|
1466576014 |
|
1439820759 |
|
9781439820759 |
|