• Complain

James Broad - Risk Management Framework: A Lab-Based Approach to Securing Information Systems

Here you can read online James Broad - Risk Management Framework: A Lab-Based Approach to Securing Information Systems full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2013, publisher: Syngress, genre: Business. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Risk Management Framework: A Lab-Based Approach to Securing Information Systems
  • Author:
  • Publisher:
    Syngress
  • Genre:
  • Year:
    2013
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Risk Management Framework: A Lab-Based Approach to Securing Information Systems: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Risk Management Framework: A Lab-Based Approach to Securing Information Systems" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly implement this process. No other publication covers this topic in the detail provided in this book or provides hands-on exercises that will enforce the topics. Examples in the book follow a fictitious organization through the RMF, allowing the reader to follow the development of proper compliance measures. Templates provided in the book allow readers to quickly implement the RMF in their organization. The need for this book continues to expand as government and non-governmental organizations build their security programs around the RMF. The companion website provides access to all of the documents, templates and examples needed to not only understand the RMF but also implement this process in the readers own organization.

. A comprehensive case study from initiation to decommission and disposal

. Detailed explanations of the complete RMF process and its linkage to the SDLC

. Hands on exercises to reinforce topics

. Complete linkage of the RMF to all applicable laws, regulations and publications as never seen before

James Broad: author's other books


Who wrote Risk Management Framework: A Lab-Based Approach to Securing Information Systems? Find out the surname, the name of the author of the book and a list of all author's works by series.

Risk Management Framework: A Lab-Based Approach to Securing Information Systems — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Risk Management Framework: A Lab-Based Approach to Securing Information Systems" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Risk Management Framework A Lab-Based Approach to Securing Information Systems - photo 1
Risk Management Framework
A Lab-Based Approach to Securing Information Systems

James Broad

Aaron (AJ) Mitchneck, Technical Editor

Copyright Acquiring Editor Chris Katsaropoulos Development Editor Heather - photo 2

Copyright

Acquiring Editor: Chris Katsaropoulos

Development Editor: Heather Scherer

Project Manager: Malathi Samayan

Designer: Matthew Limbert

Syngress is an imprint of Elsevier

225 Wyman Street, Waltham, MA 02451, USA

Copyright 2013 Elsevier, Inc. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publishers permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions

This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

Notices

Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods or professional practices, may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information or methods described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

Library of Congress Cataloging-in-Publication Data

Broad, James.

Risk management framework : a lab-based approach to securing information systems / James Broad.

pages cm

Includes bibliographical references and index.

ISBN 978-1-59749-995-8 (alkaline paper) 1. Computer securityGovernment policyUnited States. 2. Information technologySecurity measuresUnited States. 3. Electronic government informationSecurity measuresUnited States. 4. Risk managementGovernment policyUnited States. 5. Information technologyUnited StatesManagement. I. Title.

QA76.9.A25B72 2013

005.8dc23

2013016641

British Library Cataloguing-in-Publication Data

A catalogue record for this book is available from the British Library.

ISBN: 978-1-59749-995-8

Printed in the United States of America

13 14 15 12 11 10 9 8 7 6 5 4 3 2 1

For information on all Syngress publications, visit our website at www.syngress.com

Dedication This book is dedicated to my family To my wife Dee and my - photo 3

Dedication

This book is dedicated to my family.

To my wife, Dee, and my children, Mike and Temara, thank you for your endless support while I spent too many sunny days in front of a computer.

To my sisters, Mary, Teresa, and Lisa, thank you for helping me become the person I am today.

To my father, thank you for showing me anything is possible.

Loaded logging trucks always have the right of way.

Ed Broad

Acknowledgments

I would like to thank many people who contributed to the writing and publishing of this book.

To Heather and all of the staff at Syngress, thank you for your patience as this first-time author shifted the delivery dates of his book all over the calendar. Your help and guidance have been truly monumental. I have learned so much from all of you throughout this process.

To Dr. Ron Ross and the staff of the National Institute of Standards and Technology (NIST), the Joint Transformation Task Force, and the Committee on National Security Systems (CNSS), thank you for providing such extensive documentation on this subject. Your publications provided the foundation for this book, and in many instances I have quoted from them. Your devotion to information security and information assurance is remarkable.

To Steven Rodrigo, thank you for all the knowledge you have shared with me. Short conversations over coffee and in the hallways have enlightened and informed me more than you will ever know. Your insights on the topics in this book are remarkable. Keep up the good fight.

To those in my past who set me on the path I am on today, thank you all. Of special note are Charles Parker, an Army executive officer who took a young combat arms NCO off the line and put him in front of a computer, and Derrol Trippet, Deputy Director for Information Management, who set me on a full-time information assurance/security career. Thank you both for giving me a chance.

Thank you to the CAT team. You know who you are, and I could not think of a better group to work with.

About the Author

James Broad (CISSP, C|EH, CPTS, Security +, MBA) is the President and owner of Cyber-Recon, LLC, where he and his team of consultants specialize in Information Security, Information Assurance, Certification and Accreditation and offer other security consultancy services to corporate and government clients. As a security professional with over 20 years of real-world IT experience, James is an expert in many areas of IT security, specializing in security engineering, penetration testing, vulnerability analysis and research. He has provided security services in the nations most critical sectors including defense, law enforcement, intelligence, finance and healthcare.

Technical Editor

Aaron (AJ) Mitchneck (Security +, C|EH, MCT, MCP, CSM), works as a Structured Query Language database administrator (SQL DBA) and Internet technology (IT) security engineer. He is currently contracted in Sierra Vista, Arizona, helping to develop and maintain security policies and standards and ensuring compliance throughout the organization.

As an IT and security professional for more than fifteen years, AJ has experience in security engineering and penetration testing, as well as standards and compliance for the Health Insurance Portability and Accountability Act of 1996 (HIPAA), the Payment Card Industry Data Security Standard (PCI DSS), and the Risk Management Framework (RMF).

Companion Website

This book has companion material including all of the referenced materials, extended exercises for each chapter, templates and examples of the RMF documents, as well as updates to the book. Please visit, www.cyber-recon.com to register and dowload the files.

Chapter 1
Introduction

Table of Contents

Information in this Chapter:

Book overview and key learning points

Book audience

Introduction to the risk management framework (RMF)

How this book is organized

Book Overview and Key Learning Points

This books goal is to provide a basic understanding of the Risk Management Framework (RMF) as it pertains to the systems development life cycle (SDLC) of federal IT systems and to provide guidance on how to use this understanding during the development, assessment, and continuous monitoring of those systems. The book discusses the RMF process in terms of its six phases, which allows the reader to develop a full understanding of how each phase influences and leads to the next. This framework provides a structured process that allows organizations to comply with a number of laws, regulations, and policies, including the Federal Information Security Management Act (FISMA).

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Risk Management Framework: A Lab-Based Approach to Securing Information Systems»

Look at similar books to Risk Management Framework: A Lab-Based Approach to Securing Information Systems. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Risk Management Framework: A Lab-Based Approach to Securing Information Systems»

Discussion, reviews of the book Risk Management Framework: A Lab-Based Approach to Securing Information Systems and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.