Αποτελέσματα Αναζήτησης
22 Ιουν 2017 · This publication explains the information security principles and practices that organizations can use to protect their IT products and services. It covers topics such as assurance, risk management, security controls, and security requirements.
- SP 800-12, An Introduction to Computer Security: the NIST Handbook | CSRC
This handbook provides assistance in securing computer-based...
- An Introduction to Information Security - NIST Computer Security ...
The Special Publication 800-series reports on ITL’s...
- Michael Nieles Kelley Dempsey Victoria Yan Pillitteri - NIST
NIST Special Publication 800-12 . Revision 1 . An...
- SP 800-12, An Introduction to Computer Security: the NIST Handbook | CSRC
2 Οκτ 1995 · This handbook explains important concepts, cost considerations, and interrelationships of security controls for computer-based resources. It was withdrawn in 2017 and superseded by SP 800-12 Rev. 1.
This is a draft publication by NIST that provides an overview of information security principles and practices for federal systems. It covers topics such as risk management, security controls, assurance, and compliance with FISMA and OMB Circular A-130.
This handbook provides assistance in securing computer-based resources by explaining important concepts, cost considerations, and interrelationships of security controls. It covers management, operational, and technical controls, and gives references for further guidance and implementation.
Learn about the types and components of computer security policy, such as program policy, issue-specific policy, and system-specific policy. This chapter is part of the NIST Handbook, a comprehensive guide to computer security management.
This publication provides an overview of information security principles and practices for federal systems and organizations. It covers topics such as information security elements, risk management, security controls, and legal foundation for federal information security programs.
Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities. Ensuring the security of these products and services is of the utmost importance for the success of the organization.