Security Controls Evaluation, Testing, and Assessment Handbook

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Security Controls Evaluation, Testing, and Assessment Handbook by Leighton Johnson, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Leighton Johnson ISBN: 9780128025642
Publisher: Elsevier Science Publication: December 7, 2015
Imprint: Syngress Language: English
Author: Leighton Johnson
ISBN: 9780128025642
Publisher: Elsevier Science
Publication: December 7, 2015
Imprint: Syngress
Language: English

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place.

Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems.

Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.

  • Provides direction on how to use SP800-53A, SP800-115, DOD Knowledge Service, and the NIST Families assessment guides to implement thorough evaluation efforts for the security controls in your organization.
  • Learn how to implement proper evaluation, testing, and assessment procedures and methodologies with step-by-step walkthroughs of all key concepts.
  • Shows you how to implement assessment techniques for each type of control, provide evidence of assessment, and proper reporting techniques.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place.

Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems.

Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.

More books from Elsevier Science

Cover of the book Practical Guide to Comparative Advertising by Leighton Johnson
Cover of the book Advances in Agronomy by Leighton Johnson
Cover of the book Recent Progress in Hormone Research by Leighton Johnson
Cover of the book Keeping Found Things Found: The Study and Practice of Personal Information Management by Leighton Johnson
Cover of the book Parallel Computational Fluid Dynamics 2001, Practice and Theory by Leighton Johnson
Cover of the book Network Functions and Plasticity by Leighton Johnson
Cover of the book Advanced Textiles for Wound Care by Leighton Johnson
Cover of the book Lessons in Immunity by Leighton Johnson
Cover of the book Solid Oxide Fuel Cell Lifetime and Reliability by Leighton Johnson
Cover of the book Neurotherapy by Leighton Johnson
Cover of the book Geological Sequestration of Carbon Dioxide by Leighton Johnson
Cover of the book Bottles, Preforms and Closures by Leighton Johnson
Cover of the book Phthalonitrile Resins and Composites by Leighton Johnson
Cover of the book Casing and Liners for Drilling and Completion by Leighton Johnson
Cover of the book Usability Engineering by Leighton Johnson
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy