๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Risk Management Framework. A Lab-Based Approach to Securing Information Systems

โœ Scribed by James Broad (Auth.)


Publisher
Syngress
Year
2013
Tongue
English
Leaves
292
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Table of Contents


Content:
Front Matter, Pages i-ii
Copyright, Page iv
Dedication, Page v
Acknowledgments, Page vii
About the Author, Page viii
Technical Editor, Page ix
Companion Website, Page xv
Chapter 1 - Introduction, Pages 1-7
Introduction, Page 9
Chapter 2 - Laws, Regulations, and Guidance, Pages 11-22
Chapter 3 - Integrated Organization-Wide Risk Management, Pages 23-32
Chapter 4 - The Joint Task Force Transformation Initiative, Pages 33-38
Chapter 5 - System Development Life Cycle (SDLC), Pages 39-45
Chapter 6 - Transitioning from the C&A Process to RMF, Pages 47-57
Chapter 7 - Key Positions and Roles, Pages 59-68
Introduction, Page 69
Chapter 8 - Lab Organization, Pages 71-73
Chapter 9 - RMF Phase 1: Categorize the Information System, Pages 75-102
Chapter 10 - RMF Phase 2: Selecting Security Controls, Pages 103-122
Chapter 11 - RMF Phase 3: Implementing Security Controls, Pages 123-132
Chapter 12 - RMF Phase 4: Assess Security Controls, Pages 133-145
Chapter 13 - RMF Phase 5: Authorizing the Information System, Pages 147-155
Chapter 14 - RMF Phase 6: Monitoring Security Controls, Pages 157-167
Chapter 15 - The Expansion of the RMF, Pages 169-174
Appendix A: Answers to Exercises in Chapters 9 through 14, Pages 175-185
Appendix B: Control Families and Classes, Page 187
Appendix C: Security Control Assessment Requirements, Pages 189-272
Appendix D: Assessment Method Definitions, Applicable Objects, and Attributes, Pages 273-277
Glossary, Pages 279-286
Common Acronyms in this Book, Page 287
References, Page 289
Index, Pages 291-298


๐Ÿ“œ SIMILAR VOLUMES


Risk Management Framework: A Lab-Based A
โœ James Broad ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Syngress ๐ŸŒ English

<p>The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance

Risk Management Framework: A Lab-Based A
โœ James Broad ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Syngress ๐ŸŒ English

<p>The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance

Digital Age--How to approach Cyber Secur
โœ Andreas Von Grebmer ๐Ÿ“‚ Library ๐Ÿ“… 2017 ๐Ÿ› Books on Demand ๐ŸŒ English

In the Digital Age you need to find new approaches for Information and Cyber Security. This book describes the risk-based approach to transform information security considering the influences of the human factor. It is intended for people who want to protect the information of an organization in a h

Good Governance - A Risk-Based Managemen
โœ Smith, David; Politowski, Robert ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› BSI Standards Ltd. ๐ŸŒ English

This guide shows how organizations can identify and manage their risks for good governance. Since the publication of PD 6668:2000, Managing Risk for Corporate Governance, upon which this book is based, there is a greater appreciation of the importance of risk management in organizations and society

Introduction to Information Security. A
โœ Timothy Shimeall and Jonathan Spring (Auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2014 ๐Ÿ› Syngress

<p>Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provid

Managing information security risks: the
โœ Christopher Alberts, Audrey Dorofee ๐Ÿ“‚ Library ๐Ÿ“… 2002 ๐Ÿ› Addison-Wesley Professional ๐ŸŒ English

Information security requires far more than the latest tool or technology. Organizations must understand exactly what they are trying to protect - and why - before selecting specific solutions. Security issues are complex and often are rooted in organizational and business concerns. A careful evalua