Security Controls Evaluation, Testing, and Assessment Handbook

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Security Controls Evaluation, Testing, and Assessment Handbook by Leighton Johnson, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Leighton Johnson ISBN: 9780128025642
Publisher: Elsevier Science Publication: December 7, 2015
Imprint: Syngress Language: English
Author: Leighton Johnson
ISBN: 9780128025642
Publisher: Elsevier Science
Publication: December 7, 2015
Imprint: Syngress
Language: English

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place.

Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems.

Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.

  • Provides direction on how to use SP800-53A, SP800-115, DOD Knowledge Service, and the NIST Families assessment guides to implement thorough evaluation efforts for the security controls in your organization.
  • Learn how to implement proper evaluation, testing, and assessment procedures and methodologies with step-by-step walkthroughs of all key concepts.
  • Shows you how to implement assessment techniques for each type of control, provide evidence of assessment, and proper reporting techniques.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place.

Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems.

Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.

More books from Elsevier Science

Cover of the book Coherent Systems by Leighton Johnson
Cover of the book Techniques for Corrosion Monitoring by Leighton Johnson
Cover of the book Social and Administrative Aspects of Pharmacy in Low- and Middle-Income Countries by Leighton Johnson
Cover of the book Advances in Radiation Biology by Leighton Johnson
Cover of the book Health of HIV Infected People by Leighton Johnson
Cover of the book Advances in Transition-Metal Mediated Heterocyclic Synthesis by Leighton Johnson
Cover of the book Pollution Control and Resource Recovery by Leighton Johnson
Cover of the book Nonmammalian Genomic Analysis by Leighton Johnson
Cover of the book Ecological Networks in an Agricultural World by Leighton Johnson
Cover of the book Structural and Stress Analysis by Leighton Johnson
Cover of the book Advances in Carbohydrate Chemistry and Biochemistry by Leighton Johnson
Cover of the book Quantum Optics with Semiconductor Nanostructures by Leighton Johnson
Cover of the book Annual Reports in Medicinal Chemistry by Leighton Johnson
Cover of the book Practical Design and Application of Model Predictive Control by Leighton Johnson
Cover of the book Studies in Natural Products Chemistry by Leighton Johnson
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy