Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security Assessment: Case Studies for Implementing the NSA IAM

Buy
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines. This book focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation, etc.). The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during it. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement.

Other security books focus on an application, a methodology, or an act like hacking. This book is the only book that provides security analysis checklists and templates and shows how to prepare to do an audit, do the audit, and do the follow up all based on NSA guidelines.

About the Author
Russ Rogers, CISSP, CISM, IAM , is the President and co-founder of Security Horizon, Inc; a veteran owned small business concentrating on information security and based in Colorado Springs. He has over 12 years of security experience in Federal and commercial sectors, including the US Air Force AIA, National Security Agency, and Defense Information Systems Agency. Russ is also the editor of 'The Security Journal' and currently holds a Masters Degree from the University of Maryland in Computer Systems Management.

Greg Miles, Ph.D., CISSP, CISM, IAM, is the Vice President and co-founder of Security Horizon and has over 16 years of technology and information security experience in Federal and commercial sectors. Greg is a United States Air Force Veteran and has served in military and contract support for the National Security Agency, Defense Information Systems Agency, Air Force Space Command, and NASA. Greg holds a Ph.D. in Engineering Management, a Masters Degree in Business Administration, and a Bachelors Degree in Electrical Engineering.

Ed Fuller, CISSP, GSEC, IAM , has over 26 years of experience in Operations, Tactical, and Computer Information Systems and Security. Ed serves as a Lead Instructor for the National Security Agencies (NSA) Information Assurance Methodology (IAM). Mr. Fuller retired from the United States Navy with over 23 years of distinguished service. Ed possesses a B.S. degree in Information Systems Management, certification in SANS GSEC and CISSP.

Ted Dykstra, CISSP, CCNP, IAM, is a security consultant with Security Horizon with experience in Microsoft Windows and Cisco operating system security. He has 6 years experience in information security for commercial clients and government agencies to include risk assessments, vulnerability analysis, and Certification & Accreditation support.

(HTML tags aren't allowed.)

Applied Multivariate Statistical Analysis (6th Edition)
Applied Multivariate Statistical Analysis (6th Edition)

  This market leader offers a readable introduction to the statistical analysis of multivariate observations. Gives readers the knowledge necessary to make proper interpretations and select appropriate techniques for analyzing multivariate data. Starts...

Maritime Security: International Law and Policy Perspectives from Australia and New Zealand
Maritime Security: International Law and Policy Perspectives from Australia and New Zealand

Maritime security is of vital importance to Australia and New Zealand as both countries depend on maritime transport for their economic survival. Since the events of September 11th 2001, significant questions have been raised as to whether Australia and New Zealand are adequately prepared for the consequences of a major disruption to...

Data Structures for Game Programmers (Premier Press Game Development)
Data Structures for Game Programmers (Premier Press Game Development)
"Data Structures for Game Programmers" replaces endless pages of boring text with exciting gaming technology and eye-catching graphics. The complex subject of data structures is made easy to understand and fun to learn. Start with an explanation of how the most popular data structures and algorithms work. Then you're on your way as you...

Raspberry Pi User Guide
Raspberry Pi User Guide

The essential guide to getting started with the Raspberry Pi ®

The Raspberry Pi has been a success beyond the dream of its creators. Their goal, to encourage a new generation of computer programmers who understand how computers work, is well under way.

Raspberry Pi User Guide 2e is the newest edition of the runaway...

Microsoft Windows Internals, Fourth Edition: Microsoft Windows Server(TM) 2003, Windows XP, and Windows 2000 (Pro-Developer)
Microsoft Windows Internals, Fourth Edition: Microsoft Windows Server(TM) 2003, Windows XP, and Windows 2000 (Pro-Developer)
The premier guide to the Windows kernel now covers Windows Server 2003, Windows XP, and Windows 2000, including 64-bit extensions. Get the architectural perspectives and insider insights needed to unlock the power of Windows.

The classic, in-depth developer's guide to the Windows kernel now covers Windows .NET Server 2003, Windows XP,
...
Energy Medicine
Energy Medicine

The illustrated, practical guide to using energy medicine.

...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy