Security controls evaluation, testing, and assessment handbook / Leighton Johnson.
Material type:
TextPublisher: London : Academic Press, an imprint of Elsevier, 2020Edition: Second editionDescription: ix, 778 pages : illustrations ; 28 cmContent type: - text
- unmediated
- volume
- 9780128184271
- 005.8 J630s 23
- QA76.9.A25 J64 2020
| Item type | Current library | Shelving location | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|
Books
|
Main Library | Circulation Section | CIR 005.8 J630s 2020 (Browse shelf(Opens below)) | 1-3 | Available | 026201 | ||
Books
|
Main Library | Circulation Section | CIR 005.8 J630s 2020 (Browse shelf(Opens below)) | 2-3 | Available | 028140 | ||
Books
|
Main Library | Circulation Section | CIR 005.8 J630s 2020 (Browse shelf(Opens below)) | 3-3 | Available | 028597 |
Browsing Main Library shelves, Shelving location: Circulation Section Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| CIR 005.8 In34 2020 Information security. | CIR 005.8 In34 2020 Information security. | CIR 005.8 In34i 2017 Information security principles and practices | CIR 005.8 J630s 2020 Security controls evaluation, testing, and assessment handbook / | CIR 005.8 J630s 2020 Security controls evaluation, testing, and assessment handbook / | CIR 005.8 J630s 2020 Security controls evaluation, testing, and assessment handbook / | CIR 005.8 K162n 2023 Network security : private communications in a public world / |
Includes bibliographical references and index.
Introduction to assessments -- Risk, security, and assurance -- Statutory and regulatory GRC -- Federal risk management framework requirements -- Risk management framework -- Roles and responsibilities -- Assessment process -- Assessment methods -- Assessment techniques for each kind of control -- System and network assessments -- Security component fundamentals for assessment -- Cybersecurity framework -- Controlled unclassified information assessment -- Evidence of assessment -- Reporting -- Conclusion.
"Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews"-- Provided by publisher.
There are no comments on this title.