Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security Assessment: Case Studies for Implementing the NSA IAM

Buy
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines. This book focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation, etc.). The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during it. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement.

Other security books focus on an application, a methodology, or an act like hacking. This book is the only book that provides security analysis checklists and templates and shows how to prepare to do an audit, do the audit, and do the follow up all based on NSA guidelines.

About the Author
Russ Rogers, CISSP, CISM, IAM , is the President and co-founder of Security Horizon, Inc; a veteran owned small business concentrating on information security and based in Colorado Springs. He has over 12 years of security experience in Federal and commercial sectors, including the US Air Force AIA, National Security Agency, and Defense Information Systems Agency. Russ is also the editor of 'The Security Journal' and currently holds a Masters Degree from the University of Maryland in Computer Systems Management.

Greg Miles, Ph.D., CISSP, CISM, IAM, is the Vice President and co-founder of Security Horizon and has over 16 years of technology and information security experience in Federal and commercial sectors. Greg is a United States Air Force Veteran and has served in military and contract support for the National Security Agency, Defense Information Systems Agency, Air Force Space Command, and NASA. Greg holds a Ph.D. in Engineering Management, a Masters Degree in Business Administration, and a Bachelors Degree in Electrical Engineering.

Ed Fuller, CISSP, GSEC, IAM , has over 26 years of experience in Operations, Tactical, and Computer Information Systems and Security. Ed serves as a Lead Instructor for the National Security Agencies (NSA) Information Assurance Methodology (IAM). Mr. Fuller retired from the United States Navy with over 23 years of distinguished service. Ed possesses a B.S. degree in Information Systems Management, certification in SANS GSEC and CISSP.

Ted Dykstra, CISSP, CCNP, IAM, is a security consultant with Security Horizon with experience in Microsoft Windows and Cisco operating system security. He has 6 years experience in information security for commercial clients and government agencies to include risk assessments, vulnerability analysis, and Certification & Accreditation support.

(HTML tags aren't allowed.)

Python for Kids: A Playful Introduction to Programming
Python for Kids: A Playful Introduction to Programming

For Kids Aged 10+ (And Their Parents)

Python is a powerful, expressive programming language that's easy to learn and fun to use! But books about learning to program in Python can be kind of dull, gray, and boring, and that's no fun for anyone.

Python for Kids brings Python to life and...

Create Great iPhone Photos: Apps, Tips, Tricks, and Effects
Create Great iPhone Photos: Apps, Tips, Tricks, and Effects

You own the world's most versatile, customizable camera: your iPhone. Out of the box, your iPhone camera is no-frills, but you can transform it into a digital darkroom, photo editing suite, and photoblogging tool all rolled into one . . . if you know how to use it.

Create Great iPhone Photos shows you how to...

Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation
Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation

This volume contains a collection of studies in the areas of complexity theory and foundations of cryptography. These studies were conducted at different times during the last couple of decades. Although many of these studies have been referred to by other works, none of them was formally published before.

Indeed, this volume...


Optimizing Stormwater Treatment Practices: A Handbook of Assessment and Maintenance
Optimizing Stormwater Treatment Practices: A Handbook of Assessment and Maintenance

Optimizing Stormwater Treatment Practices: A Handbook of Assessment and Maintenance provides the information necessary for developing and operating an effective maintenance program for stormwater treatment. The book offers instructions on how to measure the level of performance of stormwater treatment practices directly and bases...

From Popular Culture to Everyday Life
From Popular Culture to Everyday Life

From Popular Culture to Everyday Life presents a critical exploration of the development of everyday life as an object of study in cultural analysis, wherein John Storey addresses the way in which everyday life is beginning to replace popular culture as a primary concept in cultural studies.

Storey presents a range of...

Literary Texts and the Greek Historian
Literary Texts and the Greek Historian

This original survey explores the ways in which non-historical texts as well as historical ones can be used to construct Greek historical accounts.

Funding bodies used to be more relaxed, and when I became a graduate student I was admitted to research on ‘Greek literature and/or Roman history’. That capacious definition more...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy