Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security Assessment: Case Studies for Implementing the NSA IAM

Buy
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines. This book focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation, etc.). The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during it. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement.

Other security books focus on an application, a methodology, or an act like hacking. This book is the only book that provides security analysis checklists and templates and shows how to prepare to do an audit, do the audit, and do the follow up all based on NSA guidelines.

About the Author
Russ Rogers, CISSP, CISM, IAM , is the President and co-founder of Security Horizon, Inc; a veteran owned small business concentrating on information security and based in Colorado Springs. He has over 12 years of security experience in Federal and commercial sectors, including the US Air Force AIA, National Security Agency, and Defense Information Systems Agency. Russ is also the editor of 'The Security Journal' and currently holds a Masters Degree from the University of Maryland in Computer Systems Management.

Greg Miles, Ph.D., CISSP, CISM, IAM, is the Vice President and co-founder of Security Horizon and has over 16 years of technology and information security experience in Federal and commercial sectors. Greg is a United States Air Force Veteran and has served in military and contract support for the National Security Agency, Defense Information Systems Agency, Air Force Space Command, and NASA. Greg holds a Ph.D. in Engineering Management, a Masters Degree in Business Administration, and a Bachelors Degree in Electrical Engineering.

Ed Fuller, CISSP, GSEC, IAM , has over 26 years of experience in Operations, Tactical, and Computer Information Systems and Security. Ed serves as a Lead Instructor for the National Security Agencies (NSA) Information Assurance Methodology (IAM). Mr. Fuller retired from the United States Navy with over 23 years of distinguished service. Ed possesses a B.S. degree in Information Systems Management, certification in SANS GSEC and CISSP.

Ted Dykstra, CISSP, CCNP, IAM, is a security consultant with Security Horizon with experience in Microsoft Windows and Cisco operating system security. He has 6 years experience in information security for commercial clients and government agencies to include risk assessments, vulnerability analysis, and Certification & Accreditation support.

(HTML tags aren't allowed.)

Clojure in Action
Clojure in Action

I can tell you how much I enjoy being a geek. I can tell you how fascinated I was with the punch-cards my dad showed me back in 1985. I can tell you how I got my first computer when I was seven. And I can tell you that I’ve loved programming since 1989. I can tell you a great many things about all that, but I’m not sure how...

High-Speed Circuit Board Signal Integrity (Artech House Microwave Library)
High-Speed Circuit Board Signal Integrity (Artech House Microwave Library)
This is a book for engineers designing high-speed circuit boards. To the signal integrity
engineer, this book will be a handbook of formulas and terminology as well as a
refresher of basic electrostatic and electromagnetic principals. The high-speed circuit
designer will find this book an easy entry into the electromagnetics and
...
Broadband Telecommunications Handbook
Broadband Telecommunications Handbook
THE BLOCKBUSTER OVERVIEW OF BROADBAND
Updated and Expanded to Reflect the Latest Technologies!

Whether you’re a “techie” or a business executive, getting a top-to-bottom understanding of broadband – the kind that will pay “real world” dividends at work -- has never been easier! In this...


Open Source SOA
Open Source SOA
You can build a world-class SOA infrastructure entirely using popular, and mature, open-source applications. Unfortunately, the technical documentation for most open-source projects focuses on a specific product, the big SOA picture. You're left to your own devices to figure out how to cobble together a full solution from the various bits. In...
A Primer on Scientific Programming with Python (Texts in Computational Science and Engineering)
A Primer on Scientific Programming with Python (Texts in Computational Science and Engineering)

The book serves as a first introduction to computer programming of scientific applications, using the high-level Python language. The exposition is example and problem-oriented, where the applications are taken from mathematics, numerical calculus, statistics, physics, biology and finance. The book teaches "Matlab-style" and...

Despeckle Filtering Algorithims and Software for Ultrasound Imaging
Despeckle Filtering Algorithims and Software for Ultrasound Imaging

It is well-known that speckle is a multiplicative noise that degrades image quality and the visual evaluation in ultrasound imaging. This necessitates the need for robust despeckling techniques for both routine clinical practice and teleconsultation. The goal for this book is to introduce the theoretical background (equations), the...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy