Building A Global Information Assurance ProgramCRC Press, 2017 M07 27 - 424 páginas Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are |
Contenido
Chapter 1 Introduction to Information Assurance | 1 |
Chapter 2 Basic Concepts | 9 |
Chapter 3 Risk Threat and Vulnerability Assessments | 47 |
Chapter 4 Overview of Systems Engineering | 77 |
Chapter 5 Information Assurance Task Force | 107 |
Chapter 6 Requirements | 121 |
Chapter 7 Design | 135 |
Chapter 8 Implementation and Testing | 153 |
Chapter 11 Automated Tools | 243 |
Chapter 12 Summary | 285 |
Acronyms | 303 |
Glossary | 317 |
Links | 353 |
369 | |
About The Authors | 387 |
389 | |
Chapter 9 Information Assurance LifeCycle Support and Operational Considerations | 207 |
Chapter 10 The Information Assurance Center | 221 |
Back cover | 407 |
Otras ediciones - Ver todas
Building A Global Information Assurance Program Raymond J Curts,Douglas E. Campbell Vista previa limitada - 2017 |
Building A Global Information Assurance Program Raymond J Curts,Douglas E. Campbell Vista previa limitada - 2017 |
Building A Global Information Assurance Program Raymond J Curts,Douglas E. Campbell Sin vista previa disponible - 2002 |
Términos y frases comunes
actions activities administrator allows analysis application architecture areas assessment attacks attributes authority bomb building Center Certification changes Chapter collection Command communications complete components computer system concept configuration Continuity database decision Defense defined Department detection determine documentation effective electronic ensure environment equipment established Evaluation example Exhibit existing force functions hardware IATP identify implementation important individual information assurance information systems integrity interface interoperability issues maintain measures mission Naval object Office operational organization password perform personnel physical Port Scanner presented problem procedures production protection reports requirements responsible result risk running Safety Sendmail sensitive specific standards systems engineering terrorist testing threat virus vulnerability warfare