Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security Assessment: Case Studies for Implementing the NSA IAM

Buy
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines. This book focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation, etc.). The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during it. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement.

Other security books focus on an application, a methodology, or an act like hacking. This book is the only book that provides security analysis checklists and templates and shows how to prepare to do an audit, do the audit, and do the follow up all based on NSA guidelines.

About the Author
Russ Rogers, CISSP, CISM, IAM , is the President and co-founder of Security Horizon, Inc; a veteran owned small business concentrating on information security and based in Colorado Springs. He has over 12 years of security experience in Federal and commercial sectors, including the US Air Force AIA, National Security Agency, and Defense Information Systems Agency. Russ is also the editor of 'The Security Journal' and currently holds a Masters Degree from the University of Maryland in Computer Systems Management.

Greg Miles, Ph.D., CISSP, CISM, IAM, is the Vice President and co-founder of Security Horizon and has over 16 years of technology and information security experience in Federal and commercial sectors. Greg is a United States Air Force Veteran and has served in military and contract support for the National Security Agency, Defense Information Systems Agency, Air Force Space Command, and NASA. Greg holds a Ph.D. in Engineering Management, a Masters Degree in Business Administration, and a Bachelors Degree in Electrical Engineering.

Ed Fuller, CISSP, GSEC, IAM , has over 26 years of experience in Operations, Tactical, and Computer Information Systems and Security. Ed serves as a Lead Instructor for the National Security Agencies (NSA) Information Assurance Methodology (IAM). Mr. Fuller retired from the United States Navy with over 23 years of distinguished service. Ed possesses a B.S. degree in Information Systems Management, certification in SANS GSEC and CISSP.

Ted Dykstra, CISSP, CCNP, IAM, is a security consultant with Security Horizon with experience in Microsoft Windows and Cisco operating system security. He has 6 years experience in information security for commercial clients and government agencies to include risk assessments, vulnerability analysis, and Certification & Accreditation support.

(HTML tags aren't allowed.)

HTML5 and JavaScript Projects: Build on your Basic Knowledge of HTML5 and JavaScript to Create Substantial HTML5 Applications
HTML5 and JavaScript Projects: Build on your Basic Knowledge of HTML5 and JavaScript to Create Substantial HTML5 Applications
Build on your basic knowledge of HTML5 and JavaScript to create substantial HTML5 applications. Through the many interesting projects you can create in this book, you'll develop HTML5 skills for future projects, and extend the core skills you may have learned with its companion book, The Essential Guide to HTML5.

...

Play for Scala: Covers Play 2
Play for Scala: Covers Play 2

Summary

Play for Scala shows you how to build Scala-based web applications using the Play 2 framework. This book starts by introducing Play through a comprehensive overview example. Then, you'll look at each facet of a typical Play application both by exploring simple code snippets and by adding to a...

Beginning jQuery
Beginning jQuery

Beginning jQuery is your step-by-step guide to learning the jQuery library. jQuery is the most popular JavaScript library in the web developer’s toolkit. Jack Franklin takes you from the basics of getting you started with jQuery, right through to extending jQuery by writing your own plug-ins. You'll...


Curves and Singularities
Curves and Singularities
The object of this book is to introduce to a new generation of students an area of mathematics that has received a tremendous impetus during the last twenty years or so from developments in singularity theory.

The differential geometry of curves, families of curves and surfaces in Euclidean space has fascinated mathematicians and users
...
Herding Chickens: Innovative Techniques for Project Management
Herding Chickens: Innovative Techniques for Project Management
Get The Straight Scoop On Project Management—Ingenious Strategies That Work!

Have you studied the traditional processes of project management, only to discover that in reality they fall short? Are you done with the idealistic theories of how things should function and eager to apply
...
The Unofficial Guide to Microsoft Office Excel 2007
The Unofficial Guide to Microsoft Office Excel 2007
The inside scoop...for when you want more than the official line!

Microsoft Office Excel 2007 may be just what you need to crunch numbers, but to use it with confidence, you'll need to know its quirks and shortcuts. Find out what the manual doesn't always tell you in this insider's guide to using Excel in the real world....

©2019 LearnIT (support@pdfchm.net) - Privacy Policy