Security Controls Evaluation, Testing, and Assessment Handbook

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Security Controls Evaluation, Testing, and Assessment Handbook by Leighton Johnson, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Leighton Johnson ISBN: 9780128025642
Publisher: Elsevier Science Publication: December 7, 2015
Imprint: Syngress Language: English
Author: Leighton Johnson
ISBN: 9780128025642
Publisher: Elsevier Science
Publication: December 7, 2015
Imprint: Syngress
Language: English

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place.

Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems.

Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.

  • Provides direction on how to use SP800-53A, SP800-115, DOD Knowledge Service, and the NIST Families assessment guides to implement thorough evaluation efforts for the security controls in your organization.
  • Learn how to implement proper evaluation, testing, and assessment procedures and methodologies with step-by-step walkthroughs of all key concepts.
  • Shows you how to implement assessment techniques for each type of control, provide evidence of assessment, and proper reporting techniques.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place.

Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems.

Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.

More books from Elsevier Science

Cover of the book Smart Textile Coatings and Laminates by Leighton Johnson
Cover of the book Fundamentals of Ocean Renewable Energy by Leighton Johnson
Cover of the book Nanotechnology for Microelectronics and Optoelectronics by Leighton Johnson
Cover of the book Effective Interviewing and Interrogation Techniques by Leighton Johnson
Cover of the book An Appraisal of the Status of Chagas Disease in the United States by Leighton Johnson
Cover of the book Biochemistry of Characterised Neurons by Leighton Johnson
Cover of the book Fractal and Trans-scale Nature of Entropy by Leighton Johnson
Cover of the book Entrepreneurship in the Gulf Cooperation Council by Leighton Johnson
Cover of the book Crystallography Made Crystal Clear by Leighton Johnson
Cover of the book A Librarian's Guide to Graphs, Data and the Semantic Web by Leighton Johnson
Cover of the book Materials Ageing and Degradation in Light Water Reactors by Leighton Johnson
Cover of the book Advances in Imaging and Electron Physics by Leighton Johnson
Cover of the book High-Temperature Solid Oxide Fuel Cells for the 21st Century by Leighton Johnson
Cover of the book Solvent Extraction by Leighton Johnson
Cover of the book Annual Reports on NMR Spectroscopy by Leighton Johnson
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy