1 / 290
文档名称:

(CISSP)An Introduction puter Security (The NIST Handbook).pdf

格式:pdf   页数:290
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

(CISSP)An Introduction puter Security (The NIST Handbook).pdf

上传人:bolee65 2014/7/17 文件大小:0 KB

下载得到文件列表

(CISSP)An Introduction puter Security (The NIST Handbook).pdf

文档介绍

文档介绍:National Institute of Standards and Technology
Technology Administration
. Department merce
An Introduction puter Security:
The NIST Handbook
Special Publication 800-12
User Contingency
Assurance I & A
Issues Planning
Personnel Training
Access Risk Crypto
Controls Audit Planning Management
Support
Physical Program Threats
Policy & Management
Security Operations
Table of Contents
I. INTRODUCTION AND OVERVIEW
Chapter 1
INTRODUCTION
Purpose .................................................... 3
Intended Audience .......................................... 3
............................................... 4
Important Terminology ..................................... 5
Legal Foundation for puter Security Programs . 7
Chapter 2
ELEMENTS PUTER SECURITY
Security Supports the Mission of anization. 9
Security is an Integral Element of Sound
Management. .............................................. 10
Security Should Be Cost-Effective. ............... 11
Security Responsibilities and Accountability Should
Be Made Explicit. .......................................... 12
Systems Owners Have Security Responsibilities Outside Their
anizations. ........................................ 12
Security Requires prehensive and Integrated
Approach. ................................................. 13
Security Should Be Periodically Reassessed. ...... 13
Security is Constrained by Societal Factors. ...... 14
Chapter 3
ROLES AND RESPONSIBILITIES
iii
Senior Management ........................................ 16
Security Management ........................... 16
Program and Functional Managers/Application Owners .... 16
Technology Providers ...................................... 16
Supporting Functions ...................................... 18
Users ......................................................