Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
5Activity
0 of .
Results for:
No results containing your search query
P. 1
An Introduction to Computer Security: The NIST Handbook

An Introduction to Computer Security: The NIST Handbook

Ratings: (0)|Views: 35 |Likes:
Published by Daniel Checchia

More info:

Published by: Daniel Checchia on Jul 28, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/25/2012

pdf

text

original

 
Assurance
 
UserIssuesContingencyPlanningI & APersonnelTrainingAccessControlsAuditPlanningRiskManagementCryptoPhysicalSecuritySupport&OperationsPolicy
 
ProgramManagementThreats
National Institute of Standards and TechnologyTechnology AdministrationU.S. Department of Commerce
An Introduction to Computer Security:The NIST Handbook
Special Publication 800-12
 
iii
Table of ContentsI. INTRODUCTION AND OVERVIEW
Chapter 1INTRODUCTION1.1Purpose
.................................................... 3
1.2Intended Audience
.......................................... 3
1.3Organization
............................................... 4
1.4Important Terminology
..................................... 5
1.5Legal Foundation for Federal Computer Security Programs
. 7
Chapter 2ELEMENTS OF COMPUTER SECURITY2.1Computer Security Supports the Mission of the Organization.
9
2.2Computer Security is an Integral Element of SoundManagement.
.............................................. 10
2.3Computer Security Should Be Cost-Effective.
............... 11
2.4Computer Security Responsibilities and Accountability ShouldBe Made Explicit.
.......................................... 12
2.5Systems Owners Have Security Responsibilities Outside TheirOwn Organizations.
........................................ 12
2.6Computer Security Requires a Comprehensive and IntegratedApproach.
................................................. 13
2.7Computer Security Should Be Periodically Reassessed.
...... 13
2.8Computer Security is Constrained by Societal Factors.
...... 14
Chapter 3ROLES AND RESPONSIBILITIES

Activity (5)

You've already reviewed this. Edit your review.
1 hundred reads
kccasey liked this
leoncioflores liked this
Vapor Eyes liked this
kani_suguna liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->