Security Controls Evaluation, Testing, and Assessment Handbook

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Security Controls Evaluation, Testing, and Assessment Handbook by Leighton Johnson, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Leighton Johnson ISBN: 9780128025642
Publisher: Elsevier Science Publication: December 7, 2015
Imprint: Syngress Language: English
Author: Leighton Johnson
ISBN: 9780128025642
Publisher: Elsevier Science
Publication: December 7, 2015
Imprint: Syngress
Language: English

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place.

Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems.

Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.

  • Provides direction on how to use SP800-53A, SP800-115, DOD Knowledge Service, and the NIST Families assessment guides to implement thorough evaluation efforts for the security controls in your organization.
  • Learn how to implement proper evaluation, testing, and assessment procedures and methodologies with step-by-step walkthroughs of all key concepts.
  • Shows you how to implement assessment techniques for each type of control, provide evidence of assessment, and proper reporting techniques.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place.

Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems.

Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.

More books from Elsevier Science

Cover of the book Advances in Virus Research by Leighton Johnson
Cover of the book Strategies and Tactics in Organic Synthesis by Leighton Johnson
Cover of the book Detection of Drugs and Their Metabolites in Oral Fluid by Leighton Johnson
Cover of the book PID Control with Intelligent Compensation for Exoskeleton Robots by Leighton Johnson
Cover of the book Profiles of Drug Substances, Excipients, and Related Methodology by Leighton Johnson
Cover of the book Fast Multipole Methods for the Helmholtz Equation in Three Dimensions by Leighton Johnson
Cover of the book Ethical Behaviour in the E-Classroom by Leighton Johnson
Cover of the book Studies in Natural Products Chemistry by Leighton Johnson
Cover of the book Principles of Corrosion Engineering and Corrosion Control by Leighton Johnson
Cover of the book International Review of Cell and Molecular Biology by Leighton Johnson
Cover of the book Small Scale Processes in Geophysical Fluid Flows by Leighton Johnson
Cover of the book Advances in Inorganic Chemistry by Leighton Johnson
Cover of the book Safety and Security Review for the Process Industries by Leighton Johnson
Cover of the book Materials Science for Dentistry by Leighton Johnson
Cover of the book Progress in Hodgkin's Disease by Leighton Johnson
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy