文档介绍:National Institute of Standards and Technology
Technology Administration
. Department merce
An Introduction puter Security:
The NIST Handbook
Special Publication 800-12
User Contingency
Assurance I & A
Issues Planning
Personnel Training
Access Risk Crypto
Controls Audit Planning Management
Support
Physical Program Threats
Policy & Management
Security Operations
Table of Contents
I. INTRODUCTION AND OVERVIEW
Chapter 1
INTRODUCTION
Purpose .................................................... 3
Intended Audience .......................................... 3
............................................... 4
Important Terminology ..................................... 5
Legal Foundation for puter Security Programs . 7
Chapter 2
ELEMENTS PUTER SECURITY
Security Supports the Mission of anization. 9
Security is an Integral Element of Sound
Management. .............................................. 10
Security Should Be Cost-Effective. ............... 11
Security Responsibilities and Accountability Should
Be Made Explicit. .......................................... 12
Systems Owners Have Security Responsibilities Outside Their
anizations. ........................................ 12
Security Requires prehensive and Integrated
Approach. ................................................. 13
Security Should Be Periodically Reassessed. ...... 13
Security is Constrained by Societal Factors. ...... 14
Chapter 3
ROLES AND RESPONSIBILITIES
iii
Senior Management ........................................ 16
Security Management ........................... 16
Program and Functional Managers/Application Owners .... 16
Technology Providers ...................................... 16
Supporting Functions ...................................... 18
Users ......................................................