Official (ISC)[superscript 2] guide to the CAP CBK

There are many elements that make system authorization complex. This book focuses on the processes that must be employed by an organization to establish a system authorization program based on current federal government criteria. Although the roots of this book address various federal requirements,...

Descripción completa

Detalles Bibliográficos
Otros Autores: Howard, Patrick D., author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton : CRC Press 2012.
Boca Raton : 2013.
Edición:2nd ed
Colección:(ISC)2 Press series.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627703906719
Tabla de Contenidos:
  • ch. 1. Security authorization of information systems
  • ch. 2. Information system categorization
  • ch. 3. Establishment of the security control baseline
  • ch. 4. Application of security controls
  • ch. 5. Assessment of security controls
  • ch. 6. Information system authorization
  • ch. 7. Security controls monitoring
  • ch. 8. System authorization case study
  • ch. 9. The future of information system authorization.