Yahoo Canada Web Search

Search results

  1. Oct 2, 1995 · This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.

    • Barbara Guttman, Edward Roback
    • 2018
  2. The handbook provides a broad overview of computer security to help readers understand their computer security needs and develop a sound approach to the selection of appropriate security controls.

  3. Mar 7, 2007 · This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to establish and implement an information security program.

  4. Jun 1, 2004 · for the cost-effective security and privacy of nonnational-security-related information in federal information systems. This Special Publication 800 series reports on ITL's research, guidelines,

    • 7MB
    • 178
    • Purpose
    • Intended Audience
    • Organization
    • Important Terminology
    • Legal Foundation For Federal Computer Security Programs
    • References

    This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls. It illustrates the benefits of security controls, the major techniques or approaches for each control, and important related consid...

    The handbook was written primarily for those who have computer security responsibilities and need assistance understanding basic concepts and techniques. Within the federal government,3 this includes those who have computer security responsibilities for sensitivesystems. For the most part, the concepts presented in the handbook are also applicable ...

    The first section of the handbook contains background and overview material, briefly discusses of threats, and explains the roles and responsibilities of individuals and organizations involved in computer security. It explains the executive principles of computer security that are used throughout the handbook. For example, one important principle t...

    To understand the rest of the handbook, the reader must be familiar with the following key terms and definitions as used in this handbook. In the handbook, the terms computers and computer systemsare used to refer to the entire spectrum of information technology, including application and support systems. Other key terms include: Computer Security:...

    The executive principles discussed in the next chapter explain the need for computer security. In addition, within the federal government, a number of laws and regulations mandate that agencies protect their computers, the information they process, and related technology resources (e.g., telecommunications).9The most important are listed below. 1. ...

    Auerbach Publishers (a division of Warren Gorham & Lamont). Data Security Management. Boston, MA. 1995. British Standards Institute. A Code of Practice for Information Security Management, 1993. Caelli, William, Dennis Longley, and Michael Shain. Information Security Handbook. New York, NY: Stockton Press, 1991. Fites, P., and M. Kratz. Information...

  5. Jun 22, 2017 · This publication introduces the information security principles that organizations may leverage to understand the information security needs of their respective systems. Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities.

  6. People also ask

  7. Jan 1, 1995 · An official website of the United States government. Here’s how you know

  1. People also search for