Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 59
- Security measures 49
- Computer networks 32
- Data protection 16
- Cloud computing 13
- Risk management 11
- Information technology 10
- Examinations 7
- Computer crimes 6
- Management 6
- Prevention 6
- Cyberterrorism 5
- National Institute of Standards and Technology (U.S.) 5
- Business enterprises 4
- Certification 4
- Data processing 4
- Internet of things 4
- Law and legislation 4
- Security 4
- Artificial intelligence 3
- Cyber intelligence (Computer security) 3
- Data and Information Security 3
- Data encryption (Computer science) 3
- Electronic data processing 3
- Electronic government information 3
- Government policy 3
- Information storage and retrieval systems 3
- Microsoft Azure (Computing platform) 3
- Standards 3
- Technological innovations 3
-
21Publicado 1972“…IUPAC-NIST solubility data series…”
Revista digital -
22
-
23
-
24Publicado 2002“…NIST special publication ; 990…”
Libro -
25Publicado 2002“…NIST special publication ; 991…”
Libro -
26
-
27
-
28
-
29Publicado 2024Tabla de Contenidos: “…Chapter 7 Risk Management -- Risk Management in the Business -- Understanding the Risk Management Life Cycle -- FFIEC Handbooks and Risk Management Guidance -- Governance and Risk Management Framework -- Risk Approvals and the Role of Committees -- Risk Identification and Analysis -- Third-Party Risk Management -- Regulatory Expectations For third-party Risk Management -- Compliance and Legal Risk Management -- Monitoring and Reporting -- Chapter Conclusion -- Case Study: Navigating Risk Management at Phoenix Innovations -- Chapter 8 The NIST Risk Management Framework -- The NIST Risk Management Framework -- Understanding RMF's Authorization Process -- NIST RMF in Practice: Step-by-Step Analysis -- Applicability to Regulatory Expectations -- Integrating NIST RMF into an Organization -- Using NIST RMF for Risk Assessment and Management -- NIST RMF and Technology Implementation -- Challenges and Solutions in Implementing NIST RMF -- NIST RMF and Third-Party Risk Management -- Chapter Conclusion -- Case Study: OmniTech Corporation and NIST RMF Implementation -- Sample RMF Authorization Document Package -- Chapter 9 Cybersecurity Metrics -- Understanding Cybersecurity Metrics -- The Importance of Metrics in cybersecurity -- The Role of Metrics in Decision-making and Resource Allocation -- Differentiating Between KPIs and KRIs -- The Role of Metrics in Compliance -- Challenges and Considerations -- Key Performance Indicators (KPIs) -- Key Risk Indicators (KRIs) -- Integrating KPIs and KRIs into Cybersecurity Strategy -- Chapter Conclusion -- Case Study: Transforming TechNova's Defense Landscape -- Chapter 10 Risk Assessments -- The Importance of Risk Assessments -- The FFIEC's Perspective on Risk Assessments -- NIST's Approach to Risk Assessments -- Risk Assessment Frameworks -- Conducting a Cybersecurity Risk Assessment -- Managing Third-Party Risks…”
Libro electrónico -
30
-
31por Thompson, Eric C. authorTabla de Contenidos: “…Chapter 1: The Significance of Incident Response -- Chapter 2: Necessary Prerequisites -- Chapter 3: Incident Response Frameworks -- Chapter 4: Leadership, Teams, and Culture -- Chapter 5: The Incident Response Strategy -- Chapter 6: Cyber Risks and the Attack Lifecycle -- Chapter 7: Detection and Identification of Events -- Chapter 8: Containment -- Chapter 9: Eradication, Recovery, and Post-Incident Review -- Chapter 10: Continuous Monitoring of Incident Response Program -- Chapter 11: Incident Response Story -- Chapter 12: This Is a Full-Time Job -- Appendix A: NIST CSF…”
Publicado 2018
Libro electrónico -
32A CISO Guide to Cyber Resilience A How-To Guide for Every CISO to Build a Resilient Security ProgramPublicado 2024Tabla de Contenidos: “…-- What is PII? It depends... -- NIST's definition of PII -- Third-party risk management -- SolarWinds attack -- Vendor management policy -- Vendor management contract clauses -- Critical vendors -- Train your staff -- Vendor risk rating -- Data loss protection…”
Libro electrónico -
33Publicado 2017Tabla de Contenidos: “…Introduction to the federal cloud computing strategy -- Cloud computing standards -- A case for open source -- Security and privacy in public cloud computing -- Applying the NIST risk management framework -- Risk management -- Comparison of FISMA with other security compliance standards -- FedRAMP primer -- The FedRAMP cloud computing security requirements -- Assessment and authorization (A & A): governance, preparation, and execution -- Strategies for continuous monitoring -- Cost-effective compliance using security automation appendix -- Federal-focused case study for cloud service providers using the CSA GRC stack…”
Libro electrónico -
34por Broad, JamesTabla de Contenidos: “…March, 2012); National Institute of Standards and Technology (NIST) Publications; Federal Information Processing Standards (FIPS) and Special Publications (SP); FIPS 199; FIPS 200; NIST SP 300-39; SP 300-37; SP 800-60; SP 800-53; SP 800-53A; SP 800-18; SP 800-70; SP 800-59…”
Publicado 2013
Libro electrónico -
35por Knapp, EricTabla de Contenidos: “…Machine generated contents note: Chapter 1: Introduction Chapter 2: About Industrial Networks Chapter 3: Introduction to Industrial Network Security Chapter 4: Industrial Network Protocols Chapter 5: How Industrial Networks Operate Chapter 6: Vulnerability and Risk Assessment Chapter 7: Establishing Secure Enclaves Chapter 8: Exception, Anomaly and Threat Detection Chapter 9: Monitoring Enclaves Chapter 10: Standards and Regulations Chapter 11: Common Pitfalls and Mistakes Appendix A: Protocol Resources Appendix B: Standards Organizations Appendix C: NIST Security Guidelines Glossary…”
Publicado 2011
Libro electrónico -
36Publicado 2022Tabla de Contenidos: “…-- 3 Cybersecurity 101 for Local Governments -- 4 What the Literature Says About Local Government Cybersecurity -- 5 Cyberattacks: Targetting Local Government -- 6 Managing Local Government Cybersecurity -- 7 Cybersecurity Policies for Local Government -- 8 People: The Root of The Problem -- 9 The NIST Cybersecurity Framework Demystified -- 10 Cybersecurity Law and Regulation for Local Government -- 11 Important Questions to Ask -- 12 The Future of Local Government Cybersecurity -- 13 Summary and Recommendations -- Index -- EULA…”
Libro electrónico -
37por Brown, JasonTabla de Contenidos: “…-- Exploring IT risks -- Human -- Technology -- Environmental -- The NIST RMF -- Tier 1 - organizational risk -- Tier 2 - mission/business process -- Tier 3 - information systems -- Applying risk management to IT resources -- Categorize -- Select -- Implement -- Assess -- Authorize -- Monitor -- Documenting in the SSP -- What is a risk register? …”
Publicado 2023
Libro electrónico -
38Publicado 2020“…This importance is highlighted by emergent requirements such as NIST SP800-193 for firmware resilience and NIST SP800-155 for firmware measurement. …”
Libro electrónico -
39Publicado 2013Tabla de Contenidos: “…SummaryReferences; 2 Federal Information Security Fundamentals; Information Security in the Federal Government; Brief History of Information Security; Civilian, Defense, and Intelligence Sector Practices; Sources of Guidance; Information Classification and Security Categorization; Security Controls; Certification and Accreditation Process; Legislative History of Information Security Management; Certification and Accreditation; FIPS 102; DITSCAP; NIACAP; NIST Special Publication 800-37; DIACAP; NIST Risk Management Framework; Joint Task Force Transformation Initiative…”
Libro electrónico -
40por Metheny, MatthewTabla de Contenidos: “…Machine generated contents note: Chapter 1 - Introduction to the Federal Cloud Computing Strategy Chapter 2 - Cloud Computing Standards Chapter 3 - A Case for Open Source Chapter 4 - Security and Privacy in Public Cloud Computing Chapter 5 - Applying the NIST Risk Management Framework Chapter 6 - Risk Management Chapter 7 - Comparison of FISMA with Other Security Compliance Standards Chapter 8 - FedRAMP Primer Chapter 9 - The FedRAMP Cloud Computing Security Requirements Chapter 10 - Assessment and Authorization (A&A): Governance, Preparation, and Execution Chapter 11 - Strategies for Continuous Monitoring Chapter 12 - Cost-Effective Compliance using Security Automation Appendix - Federal-focused Case Study for Cloud Service Providers using the CSA GRC Stack…”
Publicado 2012
Libro electrónico