Security Assessment P1
Số trang: 30
Loại file: pdf
Dung lượng: 991.91 KB
Lượt xem: 24
Lượt tải: 0
Xem trước 3 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Welcome to the National Security Agency (NSA) Information AssuranceMethodology (IAM). In 1998, the NSA IAM was developed to meet thedemand for information security (INFOSEC) assessments—a demand that wasincreasing due to Presidential Decision Directive 63 (PDD-63) while at thesame time NSA was downsizing. NSA sought a way to maximize its resourcesto assist as many customers as possible. Due to Public Law 100-235, NSA wasresponsible for providing security guidance to all federal government classifiedcomputer systems. PDD-63 expanded this requirement to include direct supportfor all federal agency classified systems....
Nội dung trích xuất từ tài liệu:
Security Assessment P1solutions@syngress.comWith more than 1,500,000 copies of our MCSE, MCSD, CompTIA, andCisco study guides in print, we continue to look for ways we can betterserve the information needs of our readers. One way we do that is bylistening.Readers like yourself have been telling us they want an Internet-basedservice that would extend and enhance the value of our books. Basedon reader feedback and our own strategic plan, we have created aWeb site that we hope will exceed your expectations.Solutions@syngress.com is an interactive treasure trove of usefulinformation focusing on our book topics and related technologies.The site offers the following features: I One-year warranty against content obsolescence due to vendor product upgrades. You can access online updates for any affected chapters. I “Ask the Author” customer query forms that enable you to post questions to our authors and editors. I Exclusive monthly mailings in which our experts provide answers to reader queries and clear explanations of complex material. I Regularly updated links to sites specially selected by our editors for readers desiring additional reliable information on key topics.Best of all, the book you’re now holding is your key to this amazingsite. Just go to www.syngress.com/solutions, and keep this bookhandy when you register to verify your purchase.Thank you for giving us the opportunity to serve your needs. And besure to let us know if there’s anything else we can do to help you getthe maximum value from your investment. We’re listening.www.syngress.com/solutions Security Assessment Case Studies for Implementing the NSA IAMRuss RogersGreg MilesEd FullerTed DykstraMatthew HoagbergSyngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc-tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to beobtained from the Work.There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work issold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state tostate.In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or otherincidental or consequential damages arising out from the Work or its contents. Because some states do notallow the exclusion or limitation of liability for consequential or incidental damages, the above limitationmay not apply to you.You should always use reasonable care, including backup and other appropriate precautions, when workingwith computers, networks, data, and files.Syngress Media®, Syngress®, “Career Advancement Through Skill Enhancement®,” “Ask the AuthorUPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc. “Syngress:TheDefinition of a Serious Security Library”™, “Mission Critical™,” and “The Only Way to Stop a Hacker isto Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentionedin this book are trademarks or service marks of their respective companies.KEY SERIAL NUMBER001 FGH73IP1LM002 59MVZC6H9Q003 4XFQIP4MCX004 GLEQ71P9NC005 7JHJ8FWEX2006 VBP9EFC6K9007 TYN8MF3TYH008 64YTFXSQ9P009 H8K3BN4GTV010 IYGTE37V6NPUBLISHED BYSyngress Publishing, Inc.800 Hingham StreetRockland, MA 02370Security Assessment: Case Studies for Implementing the NSA IAMCopyright © 2004 by Syngress Publishing, Inc. All rights reserved. Printed in the United States ofAmerica. Except as permitted under the Copyright Act of 1976, no part of this publication may be repro-duced or distributed in any form or by any means, or stored in a database or retrieval system, without theprior written permission of the publisher, with the exception that the program listings may be entered,stored, and executed in a computer system, but they may not be reproduced for publication.Printed in the United States of America1 2 3 4 5 6 7 8 9 0ISBN: 1-932266-96-8Acquisitions Editor: Catherine B. Nolan Cover Designer: Michael KavishPage Layout and Art: Patricia Lupien Copy Editor: Darlene Bordwell Indexer: Nara WoodDistributed by O’Reilly & Associates in the United States and Jaguar Book Group in Canada. AcknowledgmentsWe would like to acknowledge the following people for their kindness and support inmaking this book possible.Syngress books are now distributed in the United States by O’Reilly & Associates, Inc.The enthusiasm and work ethic at ORA is incredible and we would like to thankeveryone there for their time and efforts to bring Syngress books to market:TimO’Reilly, Laura Baldwin, Mark Brokering, Mike Leonard, Donna Selenko, BonnieSheehan, Cin ...
Nội dung trích xuất từ tài liệu:
Security Assessment P1solutions@syngress.comWith more than 1,500,000 copies of our MCSE, MCSD, CompTIA, andCisco study guides in print, we continue to look for ways we can betterserve the information needs of our readers. One way we do that is bylistening.Readers like yourself have been telling us they want an Internet-basedservice that would extend and enhance the value of our books. Basedon reader feedback and our own strategic plan, we have created aWeb site that we hope will exceed your expectations.Solutions@syngress.com is an interactive treasure trove of usefulinformation focusing on our book topics and related technologies.The site offers the following features: I One-year warranty against content obsolescence due to vendor product upgrades. You can access online updates for any affected chapters. I “Ask the Author” customer query forms that enable you to post questions to our authors and editors. I Exclusive monthly mailings in which our experts provide answers to reader queries and clear explanations of complex material. I Regularly updated links to sites specially selected by our editors for readers desiring additional reliable information on key topics.Best of all, the book you’re now holding is your key to this amazingsite. Just go to www.syngress.com/solutions, and keep this bookhandy when you register to verify your purchase.Thank you for giving us the opportunity to serve your needs. And besure to let us know if there’s anything else we can do to help you getthe maximum value from your investment. We’re listening.www.syngress.com/solutions Security Assessment Case Studies for Implementing the NSA IAMRuss RogersGreg MilesEd FullerTed DykstraMatthew HoagbergSyngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc-tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to beobtained from the Work.There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work issold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state tostate.In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or otherincidental or consequential damages arising out from the Work or its contents. Because some states do notallow the exclusion or limitation of liability for consequential or incidental damages, the above limitationmay not apply to you.You should always use reasonable care, including backup and other appropriate precautions, when workingwith computers, networks, data, and files.Syngress Media®, Syngress®, “Career Advancement Through Skill Enhancement®,” “Ask the AuthorUPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc. “Syngress:TheDefinition of a Serious Security Library”™, “Mission Critical™,” and “The Only Way to Stop a Hacker isto Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentionedin this book are trademarks or service marks of their respective companies.KEY SERIAL NUMBER001 FGH73IP1LM002 59MVZC6H9Q003 4XFQIP4MCX004 GLEQ71P9NC005 7JHJ8FWEX2006 VBP9EFC6K9007 TYN8MF3TYH008 64YTFXSQ9P009 H8K3BN4GTV010 IYGTE37V6NPUBLISHED BYSyngress Publishing, Inc.800 Hingham StreetRockland, MA 02370Security Assessment: Case Studies for Implementing the NSA IAMCopyright © 2004 by Syngress Publishing, Inc. All rights reserved. Printed in the United States ofAmerica. Except as permitted under the Copyright Act of 1976, no part of this publication may be repro-duced or distributed in any form or by any means, or stored in a database or retrieval system, without theprior written permission of the publisher, with the exception that the program listings may be entered,stored, and executed in a computer system, but they may not be reproduced for publication.Printed in the United States of America1 2 3 4 5 6 7 8 9 0ISBN: 1-932266-96-8Acquisitions Editor: Catherine B. Nolan Cover Designer: Michael KavishPage Layout and Art: Patricia Lupien Copy Editor: Darlene Bordwell Indexer: Nara WoodDistributed by O’Reilly & Associates in the United States and Jaguar Book Group in Canada. AcknowledgmentsWe would like to acknowledge the following people for their kindness and support inmaking this book possible.Syngress books are now distributed in the United States by O’Reilly & Associates, Inc.The enthusiasm and work ethic at ORA is incredible and we would like to thankeveryone there for their time and efforts to bring Syngress books to market:TimO’Reilly, Laura Baldwin, Mark Brokering, Mike Leonard, Donna Selenko, BonnieSheehan, Cin ...
Tìm kiếm theo từ khóa liên quan:
An ninh – Bảo mật Tin học văn phòng Tin học Quản trị mạng Đồ họa – Thiết kế - FlashGợi ý tài liệu liên quan:
-
73 trang 427 2 0
-
24 trang 354 1 0
-
Nhập môn Tin học căn bản: Phần 1
106 trang 327 0 0 -
Giáo trình Tin học văn phòng: Phần 2 - Bùi Thế Tâm
65 trang 314 0 0 -
Giáo trình Tin học MOS 1: Phần 1
58 trang 275 0 0 -
Giáo trình Xử lý sự cố Windows & phần mềm ứng dụng
190 trang 263 1 0 -
Tài liệu học tập Tin học văn phòng: Phần 2 - Vũ Thu Uyên
85 trang 255 1 0 -
70 trang 249 1 0
-
20 trang 245 0 0
-
Giáo trình Hệ thống mạng máy tính CCNA (Tập 4): Phần 2
102 trang 245 0 0