FISMA and the Risk Management Framework

FISMA and the Risk Management Framework
Author :
Publisher : Newnes
Total Pages : 585
Release :
ISBN-10 : 9781597496421
ISBN-13 : 1597496421
Rating : 4/5 (421 Downloads)

Book Synopsis FISMA and the Risk Management Framework by : Daniel R. Philpott

Download or read book FISMA and the Risk Management Framework written by Daniel R. Philpott and published by Newnes. This book was released on 2012-12-31 with total page 585 pages. Available in PDF, EPUB and Kindle. Book excerpt: FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information resources in federal government agencies. Comprised of 17 chapters, the book explains the FISMA legislation and its provisions, strengths and limitations, as well as the expectations and obligations of federal agencies subject to FISMA. It also discusses the processes and activities necessary to implement effective information security management following the passage of FISMA, and it describes the National Institute of Standards and Technology's Risk Management Framework. The book looks at how information assurance, risk management, and information systems security is practiced in federal government agencies; the three primary documents that make up the security authorization package: system security plan, security assessment report, and plan of action and milestones; and federal information security-management requirements and initiatives not explicitly covered by FISMA. This book will be helpful to security officers, risk managers, system owners, IT managers, contractors, consultants, service providers, and others involved in securing, managing, or overseeing federal information systems, as well as the mission functions and business processes supported by those systems. - Learn how to build a robust, near real-time risk management system and comply with FISMA - Discover the changes to FISMA compliance and beyond - Gain your systems the authorization they need


FISMA and the Risk Management Framework Related Books

FISMA and the Risk Management Framework
Language: en
Pages: 585
Authors: Daniel R. Philpott
Categories: Computers
Type: BOOK - Published: 2012-12-31 - Publisher: Newnes

DOWNLOAD EBOOK

FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law th
ISC Security Design Criteria for New Federal Office Buildings and Major Modernization Projects
Language: en
Pages: 126
Authors: National Research Council
Categories: Technology & Engineering
Type: BOOK - Published: 2003-05-16 - Publisher: National Academies Press

DOWNLOAD EBOOK

In November 1999, GSA and the U.S. Department of State convened a symposium to discuss the apparently conflicting objectives of security from terrorist attack a
Standards for Internal Control in the Federal Government
Language: en
Pages: 88
Authors: United States Government Accountability Office
Categories: Reference
Type: BOOK - Published: 2019-03-24 - Publisher: Lulu.com

DOWNLOAD EBOOK

Policymakers and program managers are continually seeking ways to improve accountability in achieving an entity's mission. A key factor in improving accountabil
America's Security Agencies
Language: en
Pages: 136
Authors: Thomas Streissguth
Categories: Juvenile Nonfiction
Type: BOOK - Published: 2008 - Publisher: Enslow Publishing

DOWNLOAD EBOOK

The Federal Bureau of Investigation (FBI), Central Intelligence Agency (CIA), and National Security Agency (NSA) have been protecting Americans for decades. The
Guide for Developing Security Plans for Federal Information Systems
Language: en
Pages: 50
Authors: U.s. Department of Commerce
Categories: Computers
Type: BOOK - Published: 2006-02-28 - Publisher: Createspace Independent Publishing Platform

DOWNLOAD EBOOK

The purpose of the system security plan is to provide an overview of the security requirements of the system and describe the controls in place or planned for m