Security Assessment: Case Studies for Implementing the NSA IAM
By Syngress
3/5
()
About this ebook
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. Security Assessment shows how to do a complete security assessment based on the NSA's guidelines.
Security Assessment also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc).
Security Assessment is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement.
- Everything You Need to Know to Conduct a Security Audit of Your Organization
- Step-by-Step Instructions for Implementing the National Security Agency's Guidelines
- Special Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more
Read more from Syngress
IP Addressing and Subnetting INC IPV6: Including IPv6 Rating: 0 out of 5 stars0 ratingsDesigning A Wireless Network Rating: 5 out of 5 stars5/5Security + Study Guide and DVD Training System Rating: 4 out of 5 stars4/5ASP.Net Web Developer's Guide Rating: 0 out of 5 stars0 ratingsDBAs Guide to Databases Under Linux Rating: 0 out of 5 stars0 ratingsConfiguring Cisco Voice Over IP Rating: 4 out of 5 stars4/5Rick Gallahers MPLS Training Guide: Building Multi Protocol Label Switching Networks Rating: 4 out of 5 stars4/5Hack Proofing Your Identity In The Information Age Rating: 4 out of 5 stars4/5Managing Cisco Network Security Rating: 3 out of 5 stars3/5SSCP Systems Security Certified Practitioner Study Guide and DVD Training System Rating: 0 out of 5 stars0 ratingsBuilding a Cisco Wireless Lan Rating: 5 out of 5 stars5/5Bluetooth Application Developer's Guide Rating: 4 out of 5 stars4/5Configuring Symantec AntiVirus Enterprise Edition Rating: 0 out of 5 stars0 ratingsBuilding DMZs For Enterprise Networks Rating: 4 out of 5 stars4/5Administering Cisco QoS in IP Networks: Including CallManager 3.0, QoS, and uOne Rating: 0 out of 5 stars0 ratingsCisco Security Specialists Guide to PIX Firewall Rating: 5 out of 5 stars5/5The Best Damn Cisco Internetworking Book Period Rating: 0 out of 5 stars0 ratingsCisco Security Professional's Guide to Secure Intrusion Detection Systems Rating: 0 out of 5 stars0 ratingsStealing The Network: How to Own the Box Rating: 3 out of 5 stars3/5Firewall Policies and VPN Configurations Rating: 0 out of 5 stars0 ratingsRuby Developers Guide Rating: 3 out of 5 stars3/5Hack Proofing XML Rating: 0 out of 5 stars0 ratingsSpecial Ops: Host and Network Security for Microsoft Unix and Oracle Rating: 4 out of 5 stars4/5Designing SQL Server 2000 Databases Rating: 0 out of 5 stars0 ratingsScene of the Cybercrime: Computer Forensics Handbook Rating: 4 out of 5 stars4/5Windows 2000 Configuration Wizards Rating: 0 out of 5 stars0 ratingsTroubleshooting Windows 2000 TCP/IP Rating: 0 out of 5 stars0 ratings
Related to Security Assessment
Related ebooks
Security Sage's Guide to Hardening the Network Infrastructure Rating: 0 out of 5 stars0 ratingsPhysical and Logical Security Convergence: Powered By Enterprise Security Management Rating: 0 out of 5 stars0 ratingsIntrusion Prevention and Active Response: Deploying Network and Host IPS Rating: 3 out of 5 stars3/5Network Security Assessment: From Vulnerability to Patch Rating: 0 out of 5 stars0 ratingsSSCP Systems Security Certified Practitioner Study Guide and DVD Training System Rating: 0 out of 5 stars0 ratingsSnort Intrusion Detection 2.0 Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 0 out of 5 stars0 ratingsCCSP (ISC)2 Certified Cloud Security Professional Official Study Guide Rating: 0 out of 5 stars0 ratingsHack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network Rating: 0 out of 5 stars0 ratingsInformation Security A Practical Guide: Bridging the gap between IT and management Rating: 5 out of 5 stars5/5Applied Incident Response Rating: 0 out of 5 stars0 ratingsCybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents Rating: 0 out of 5 stars0 ratingsThe Official (ISC)2 Guide to the CCSP CBK Rating: 0 out of 5 stars0 ratingsInfosec Management Fundamentals Rating: 5 out of 5 stars5/5Cybersecurity Policy A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsCyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk Rating: 0 out of 5 stars0 ratingsEC-Council Certified Security Analyst Standard Requirements Rating: 0 out of 5 stars0 ratingsThreat Intelligence Capabilities A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsEasy Steps to Managing Cybersecurity Rating: 0 out of 5 stars0 ratingsInformation Protection Playbook Rating: 0 out of 5 stars0 ratingsDictionary of Information Security Rating: 1 out of 5 stars1/5Qualified Security Assessor Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsCybersecurity Risk Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsSecurity Management Program A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsThe Insider Threat: Combatting the Enemy Within Rating: 0 out of 5 stars0 ratingsCyber Security Risk Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsImplementing Insider Threat Prevention Cyber Security: The Psychology of Insider Threat Prevention, #3 Rating: 0 out of 5 stars0 ratingsCybersecurity Operations Handbook Rating: 5 out of 5 stars5/5Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats Rating: 0 out of 5 stars0 ratingsThe Certified Ethical Hacker Exam - version 8 (The concise study guide) Rating: 3 out of 5 stars3/5
Business For You
The Intelligent Investor, Rev. Ed: The Definitive Book on Value Investing Rating: 4 out of 5 stars4/5Financial Words You Should Know: Over 1,000 Essential Investment, Accounting, Real Estate, and Tax Words Rating: 4 out of 5 stars4/5Your Next Five Moves: Master the Art of Business Strategy Rating: 5 out of 5 stars5/5Robert's Rules Of Order Rating: 5 out of 5 stars5/5The Richest Man in Babylon: The most inspiring book on wealth ever written Rating: 5 out of 5 stars5/5Becoming Bulletproof: Protect Yourself, Read People, Influence Situations, and Live Fearlessly Rating: 4 out of 5 stars4/5Emotional Intelligence: Exploring the Most Powerful Intelligence Ever Discovered Rating: 5 out of 5 stars5/5How To Pay Off Your Mortgage in 5 Years Rating: 5 out of 5 stars5/5Tools Of Titans: The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers Rating: 4 out of 5 stars4/5Crucial Conversations: Tools for Talking When Stakes are High, Third Edition Rating: 4 out of 5 stars4/5Just Listen: Discover the Secret to Getting Through to Absolutely Anyone Rating: 4 out of 5 stars4/5Carol Dweck's Mindset The New Psychology of Success: Summary and Analysis Rating: 4 out of 5 stars4/5Crucial Conversations Tools for Talking When Stakes Are High, Second Edition Rating: 4 out of 5 stars4/5The Everything Guide To Being A Paralegal: Winning Secrets to a Successful Career! Rating: 5 out of 5 stars5/5Leadership and Self-Deception: Getting out of the Box Rating: 4 out of 5 stars4/5The Five Dysfunctions of a Team: A Leadership Fable, 20th Anniversary Edition Rating: 4 out of 5 stars4/5Collaborating with the Enemy: How to Work with People You Don’t Agree with or Like or Trust Rating: 4 out of 5 stars4/5Company Rules: Or Everything I Know About Business I Learned from the CIA Rating: 4 out of 5 stars4/5Buy, Rehab, Rent, Refinance, Repeat: The BRRRR Rental Property Investment Strategy Made Simple Rating: 5 out of 5 stars5/5Set for Life: An All-Out Approach to Early Financial Freedom Rating: 4 out of 5 stars4/5Confessions of an Economic Hit Man, 3rd Edition Rating: 5 out of 5 stars5/5Law of Connection: Lesson 10 from The 21 Irrefutable Laws of Leadership Rating: 4 out of 5 stars4/5Capitalism and Freedom Rating: 4 out of 5 stars4/5Nickel and Dimed: On (Not) Getting By in America Rating: 4 out of 5 stars4/5
Reviews for Security Assessment
1 rating0 reviews