Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security Assessment: Case Studies for Implementing the NSA IAM

Buy
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines. This book focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation, etc.). The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during it. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement.

Other security books focus on an application, a methodology, or an act like hacking. This book is the only book that provides security analysis checklists and templates and shows how to prepare to do an audit, do the audit, and do the follow up all based on NSA guidelines.

About the Author
Russ Rogers, CISSP, CISM, IAM , is the President and co-founder of Security Horizon, Inc; a veteran owned small business concentrating on information security and based in Colorado Springs. He has over 12 years of security experience in Federal and commercial sectors, including the US Air Force AIA, National Security Agency, and Defense Information Systems Agency. Russ is also the editor of 'The Security Journal' and currently holds a Masters Degree from the University of Maryland in Computer Systems Management.

Greg Miles, Ph.D., CISSP, CISM, IAM, is the Vice President and co-founder of Security Horizon and has over 16 years of technology and information security experience in Federal and commercial sectors. Greg is a United States Air Force Veteran and has served in military and contract support for the National Security Agency, Defense Information Systems Agency, Air Force Space Command, and NASA. Greg holds a Ph.D. in Engineering Management, a Masters Degree in Business Administration, and a Bachelors Degree in Electrical Engineering.

Ed Fuller, CISSP, GSEC, IAM , has over 26 years of experience in Operations, Tactical, and Computer Information Systems and Security. Ed serves as a Lead Instructor for the National Security Agencies (NSA) Information Assurance Methodology (IAM). Mr. Fuller retired from the United States Navy with over 23 years of distinguished service. Ed possesses a B.S. degree in Information Systems Management, certification in SANS GSEC and CISSP.

Ted Dykstra, CISSP, CCNP, IAM, is a security consultant with Security Horizon with experience in Microsoft Windows and Cisco operating system security. He has 6 years experience in information security for commercial clients and government agencies to include risk assessments, vulnerability analysis, and Certification & Accreditation support.

(HTML tags aren't allowed.)

Must We All Die?: Alaska's Enduring Struggle with Tuberculosis
Must We All Die?: Alaska's Enduring Struggle with Tuberculosis
Alaska Natives have struggled with the 'white plague' of tuberculosis for centuries. At last, physician and historian Robert Fortuine brings their story to light. He provides a comprehensive account of tuberculosis from its earliest occurrence in prehistory through the latest outbreaks, made more threatening by HIV/AIDS.

Fortuine...

A Business Guide to Information Security
A Business Guide to Information Security
This book was designed, and is intended to be used, as both a digital and an analogue (that is, dual online and hardcopy) resource. The speed of evolution in computing and of the internet means that any book on information security starts going out of date fairly quickly. On top of that, there is a six- to eight-month gap between completing the...
Molecular Targeting in Oncology (Cancer Drug Discovery and Development)
Molecular Targeting in Oncology (Cancer Drug Discovery and Development)

This book presents an overview of the development of targeted therapies for the treatment of cancer with an emphasis on clinical application. The volume covers the complexity of the rapidly developing area of targeted therapies for the treatment of patients with cancer. It is structured in a way so readers may begin with chapters that most...


Broadband Communications via High-Altitude Platforms
Broadband Communications via High-Altitude Platforms

A unique book with systematic and thorough coverage of HAP related issues, problems and solutions. Handbook of Broadband Communications from High Altitude Platforms provides a thorough overview and state of the art of the HAP enabling technologies, as well as describing recent research activities with most promising results. It...

Oracle Data Integrator 11g Cookbook
Oracle Data Integrator 11g Cookbook

This book is all you need to take your understanding of Oracle Data Integrator to the next level. From initial deployment right through to esoteric techniques, the task-based approach will enhance your expertise effortlessly.

Overview

  • Clear, step-by-step recipes to walk you through some of the most...
SolidWorks 2009 Bible
SolidWorks 2009 Bible
Revise and reinvent 3D prototypes as much as you wish

Whether you're designing parts or assemblies, SolidWorks is what you need to tranform virtual 3D models into production design data. And whether you're new to this powerful CAD software or want to take your current skills to new levels, you'll find all the in-depth coverage you need in...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy