Security Assessment: Case Studies for Implementing the NSA IAM
By Syngress
3/5
()
About this ebook
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. Security Assessment shows how to do a complete security assessment based on the NSA's guidelines.
Security Assessment also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc).
Security Assessment is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement.
- Everything You Need to Know to Conduct a Security Audit of Your Organization
- Step-by-Step Instructions for Implementing the National Security Agency's Guidelines
- Special Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more
Read more from Syngress
IP Addressing and Subnetting INC IPV6: Including IPv6 Rating: 0 out of 5 stars0 ratingsManaging Cisco Network Security Rating: 3 out of 5 stars3/5Designing A Wireless Network Rating: 5 out of 5 stars5/5Hack Proofing Your Identity In The Information Age Rating: 4 out of 5 stars4/5Configuring Cisco Voice Over IP Rating: 4 out of 5 stars4/5Bluetooth Application Developer's Guide Rating: 4 out of 5 stars4/5The Best Damn Firewall Book Period Rating: 5 out of 5 stars5/5Building a Cisco Wireless Lan Rating: 5 out of 5 stars5/5SSCP Systems Security Certified Practitioner Study Guide and DVD Training System Rating: 0 out of 5 stars0 ratingsRick Gallahers MPLS Training Guide: Building Multi Protocol Label Switching Networks Rating: 4 out of 5 stars4/5ASP.Net Web Developer's Guide Rating: 0 out of 5 stars0 ratingsBuilding DMZs For Enterprise Networks Rating: 4 out of 5 stars4/5Special Ops: Host and Network Security for Microsoft Unix and Oracle Rating: 4 out of 5 stars4/5Configuring Symantec AntiVirus Enterprise Edition Rating: 0 out of 5 stars0 ratingsAdministering Cisco QoS in IP Networks: Including CallManager 3.0, QoS, and uOne Rating: 0 out of 5 stars0 ratingsDBAs Guide to Databases Under Linux Rating: 0 out of 5 stars0 ratingsFirewall Policies and VPN Configurations Rating: 0 out of 5 stars0 ratingsCisco Security Professional's Guide to Secure Intrusion Detection Systems Rating: 0 out of 5 stars0 ratingsSecurity + Study Guide and DVD Training System Rating: 4 out of 5 stars4/5Developing Web Services with Java APIs for XML Using WSDP Rating: 0 out of 5 stars0 ratingsStealing The Network: How to Own the Box Rating: 3 out of 5 stars3/5Ruby Developers Guide Rating: 3 out of 5 stars3/5Hack Proofing Linux: A Guide to Open Source Security Rating: 0 out of 5 stars0 ratingsSnort Intrusion Detection 2.0 Rating: 4 out of 5 stars4/5Scene of the Cybercrime: Computer Forensics Handbook Rating: 4 out of 5 stars4/5The Best Damn Cisco Internetworking Book Period Rating: 0 out of 5 stars0 ratingsHack Proofing XML Rating: 0 out of 5 stars0 ratings
Related to Security Assessment
Related ebooks
Security Sage's Guide to Hardening the Network Infrastructure Rating: 0 out of 5 stars0 ratingsIntrusion Prevention and Active Response: Deploying Network and Host IPS Rating: 3 out of 5 stars3/5Network Security Assessment: From Vulnerability to Patch Rating: 0 out of 5 stars0 ratingsSSCP Systems Security Certified Practitioner Study Guide and DVD Training System Rating: 0 out of 5 stars0 ratingsPhysical and Logical Security Convergence: Powered By Enterprise Security Management Rating: 0 out of 5 stars0 ratingsCyber Adversary Characterization: Auditing the Hacker Mind Rating: 5 out of 5 stars5/5Information Security A Practical Guide: Bridging the gap between IT and management Rating: 5 out of 5 stars5/5Designing and Building Security Operations Center Rating: 3 out of 5 stars3/5The Official (ISC)2 Guide to the CCSP CBK Rating: 0 out of 5 stars0 ratingsInfosec Management Fundamentals Rating: 5 out of 5 stars5/5Security Operations Center Guidebook: A Practical Guide for a Successful SOC Rating: 3 out of 5 stars3/5Intrusion Detection Systems A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsInformation Protection Playbook Rating: 0 out of 5 stars0 ratingsCybersecurity Operations Handbook Rating: 5 out of 5 stars5/5Information Security Auditor: Careers in information security Rating: 0 out of 5 stars0 ratingsCyber-security regulation Third Edition Rating: 0 out of 5 stars0 ratingsCybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents Rating: 0 out of 5 stars0 ratingsCyber Security Risk Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsHands-on Incident Response and Digital Forensics Rating: 0 out of 5 stars0 ratingsEC-Council Certified Security Analyst Standard Requirements Rating: 0 out of 5 stars0 ratingsInformation Security Architect A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsManaging Information Security Breaches: Studies from real life Rating: 0 out of 5 stars0 ratingsThreat Intelligence Capabilities A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsSecure Your Network for Free Rating: 5 out of 5 stars5/5How to Define and Build an Effective Cyber Threat Intelligence Capability Rating: 4 out of 5 stars4/5Applied Incident Response Rating: 0 out of 5 stars0 ratingsManaging Information Security Rating: 5 out of 5 stars5/5Security Controls Evaluation, Testing, and Assessment Handbook Rating: 5 out of 5 stars5/5Dictionary of Information Security Rating: 1 out of 5 stars1/5
Business For You
Crucial Conversations Tools for Talking When Stakes Are High, Second Edition Rating: 4 out of 5 stars4/5Crucial Conversations: Tools for Talking When Stakes are High, Third Edition Rating: 4 out of 5 stars4/5Becoming Bulletproof: Protect Yourself, Read People, Influence Situations, and Live Fearlessly Rating: 4 out of 5 stars4/5Nickel and Dimed: On (Not) Getting By in America Rating: 4 out of 5 stars4/5Law of Connection: Lesson 10 from The 21 Irrefutable Laws of Leadership Rating: 4 out of 5 stars4/5The Richest Man in Babylon: The most inspiring book on wealth ever written Rating: 5 out of 5 stars5/5Just Listen: Discover the Secret to Getting Through to Absolutely Anyone Rating: 4 out of 5 stars4/5Leadership and Self-Deception: Getting out of the Box Rating: 4 out of 5 stars4/5Set for Life: An All-Out Approach to Early Financial Freedom Rating: 4 out of 5 stars4/5Collaborating with the Enemy: How to Work with People You Don’t Agree with or Like or Trust Rating: 4 out of 5 stars4/5The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers Rating: 4 out of 5 stars4/5Your Next Five Moves: Master the Art of Business Strategy Rating: 5 out of 5 stars5/5Confessions of an Economic Hit Man, 3rd Edition Rating: 5 out of 5 stars5/5Capitalism and Freedom Rating: 4 out of 5 stars4/5Summary of J.L. Collins's The Simple Path to Wealth Rating: 5 out of 5 stars5/5Robert's Rules Of Order Rating: 5 out of 5 stars5/5The Intelligent Investor, Rev. Ed: The Definitive Book on Value Investing Rating: 4 out of 5 stars4/5Lying Rating: 4 out of 5 stars4/5Buy, Rehab, Rent, Refinance, Repeat: The BRRRR Rental Property Investment Strategy Made Simple Rating: 5 out of 5 stars5/5Tools Of Titans: The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers Rating: 4 out of 5 stars4/5The Five Dysfunctions of a Team: A Leadership Fable, 20th Anniversary Edition Rating: 4 out of 5 stars4/5Summary of Eve Rodsky's Fair Play Rating: 2 out of 5 stars2/5Emotional Intelligence: Exploring the Most Powerful Intelligence Ever Discovered Rating: 5 out of 5 stars5/5Financial Words You Should Know: Over 1,000 Essential Investment, Accounting, Real Estate, and Tax Words Rating: 4 out of 5 stars4/5The Catalyst: How to Change Anyone's Mind Rating: 4 out of 5 stars4/5Soundtracks: The Surprising Solution to Overthinking Rating: 5 out of 5 stars5/5Robert's Rules of Order: The Original Manual for Assembly Rules, Business Etiquette, and Conduct Rating: 4 out of 5 stars4/5
Reviews for Security Assessment
1 rating0 reviews