Security Controls Evaluation, Testing, and Assessment Handbook

Author:   Leighton Johnson (CTO and Senior Security Engineer for Information Security and Forensics Management Team (ISFMT))
Publisher:   Elsevier Science Publishing Co Inc
Edition:   2nd edition
ISBN:  

9780128184271


Pages:   788
Publication Date:   21 November 2019
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $263.87 Quantity:  
Add to Cart

Share |

Security Controls Evaluation, Testing, and Assessment Handbook


Add your own review!

Overview

Security Controls Evaluation, Testing, and Assessment Handbook, Second Edition, provides a current and well-developed approach to evaluate and test IT security controls to prove they are functioning correctly. This handbook discusses the world of threats and potential breach actions surrounding all industries and systems. Sections cover how to take FISMA, NIST Guidance, and DOD actions, while also providing a detailed, hands-on guide to performing assessment events for information security professionals in US federal agencies. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements and evaluation efforts.

Full Product Details

Author:   Leighton Johnson (CTO and Senior Security Engineer for Information Security and Forensics Management Team (ISFMT))
Publisher:   Elsevier Science Publishing Co Inc
Imprint:   Academic Press Inc
Edition:   2nd edition
Weight:   1.720kg
ISBN:  

9780128184271


ISBN 10:   0128184272
Pages:   788
Publication Date:   21 November 2019
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

1. Introduction to Assessments 2. Risk and Security 3. Statutory & Regulatory GRC 4. Federal RMF Requirements 5. Risk Management Framework – SP 800-37, rev.1 6. Roles and Responsibilities 7. Assessment Process 8. Assessment Methods 9. Assessment Techniques for each kind of control 10. System and Network Assessments 11. Security Components Fundamentals 12. Cybersecurity Controls 13. CUI Controls 14. Evidence of Assessment 15. Reporting 16. Conclusion Appendix A. Templates for RMF documents and artifacts commonly required or requested B. Templates for RMF Policies and Procedures by Control Family C. Assessment and Testing Tools

Reviews

Author Information

Leighton Johnson, the CTO of ISFMT (Information Security Forensics Management Team), a provider of cybersecurity & forensics consulting and certification training, has presented computer security, cyber security and forensics lectures, conference presentations, training events and seminars all across the United States, Asia and Europe. He has over 40 years’ experience in Computer Security, Cyber Security, Software Development and Communications Equipment Operations & Maintenance; Primary focus areas include computer security, information operations & assurance, incident response & forensics investigations, software system development life cycle focused on testing of systems, systems engineering and integration activities, database administration and cyber defense activities.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List