Security Controls Evaluation, Testing, and Assessment Handbook

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Security Controls Evaluation, Testing, and Assessment Handbook by Leighton Johnson, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Leighton Johnson ISBN: 9780128025642
Publisher: Elsevier Science Publication: December 7, 2015
Imprint: Syngress Language: English
Author: Leighton Johnson
ISBN: 9780128025642
Publisher: Elsevier Science
Publication: December 7, 2015
Imprint: Syngress
Language: English

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place.

Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems.

Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.

  • Provides direction on how to use SP800-53A, SP800-115, DOD Knowledge Service, and the NIST Families assessment guides to implement thorough evaluation efforts for the security controls in your organization.
  • Learn how to implement proper evaluation, testing, and assessment procedures and methodologies with step-by-step walkthroughs of all key concepts.
  • Shows you how to implement assessment techniques for each type of control, provide evidence of assessment, and proper reporting techniques.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place.

Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems.

Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.

More books from Elsevier Science

Cover of the book Molecular Pathology of Pituitary Adenomas by Leighton Johnson
Cover of the book Culinary Nutrition by Leighton Johnson
Cover of the book Joe Celko's Trees and Hierarchies in SQL for Smarties by Leighton Johnson
Cover of the book Spinal Muscular Atrophy by Leighton Johnson
Cover of the book Epidemiology and Medical Statistics by Leighton Johnson
Cover of the book Structural Health Monitoring (SHM) in Aerospace Structures by Leighton Johnson
Cover of the book Central Actions of Angiotensin and Related Hormones by Leighton Johnson
Cover of the book Nonlinear Partial Differential Equations and Their Applications by Leighton Johnson
Cover of the book Nanoparticulate Drug Delivery by Leighton Johnson
Cover of the book Functional Neurobiology of Aging by Leighton Johnson
Cover of the book Uncommon Paths in Quantum Physics by Leighton Johnson
Cover of the book Sea Otter Conservation by Leighton Johnson
Cover of the book PIC32 Microcontrollers and the Digilent Chipkit by Leighton Johnson
Cover of the book The Arts and The Brain by Leighton Johnson
Cover of the book Neurobiology of Cytokines, Part B by Leighton Johnson
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy