Official (ISC)² guide to the CAP CBK. (2012)
- Record Type:
- Book
- Title:
- Official (ISC)² guide to the CAP CBK. (2012)
- Main Title:
- Official (ISC)² guide to the CAP CBK
- Other Titles:
- Official ISC2 guide to the CAP CBK
Official (ISC)² to the Certified authorization professional CBK - Further Information:
- Note: Patrick D. Howard.
- Other Names:
- Howard, Patrick D
- Contents:
- Security Authorization of Information Systems; Introduction; Legal and Regulatory Framework for System Authorization; External Program Drivers; System-Level Security; Defining System Authorization; Resistance to System Authorization; Benefits of System Authorization; Key Elements of an Enterprise System Authorization Program; The Business Case; Goal Setting; Tasks and Milestones; Program Oversight; Visibility; Resources; Program Guidance; Special Issues; Program Integration; System Authorization Points of Contact; Measuring Progress; Managing Program Activities; Monitoring Compliance; Providing Advice and Assistance; Responding to Changes; Program Awareness, Training, and Education; Using Expert Systems; Waivers and Exceptions; NIST Special Publication 800-37, Revision 1, and the Application of the Risk Management Framework to Systems; Overview; Authority and Scope; Purpose and Applicability; Target Audience; Fundamentals of Information System Risk Management According to NIST SP 800-37, Revision 1; Guidance on Organization-Wide Risk Management; Organization Level (Tier 1); Mission/Business Process Level (Tier 2); Information System Level (Tier 3); Guidance on Risk Management in the System Development Life Cycle; NIST’s Risk Management Framework; Guidance on System Boundary Definition; Guidance on Software Application Boundaries; Guidance on Complex Systems; Guidance on the Impact of Technological Changes on System Boundaries; Guidance on Dynamic Subsystems; Guidance onSecurity Authorization of Information Systems; Introduction; Legal and Regulatory Framework for System Authorization; External Program Drivers; System-Level Security; Defining System Authorization; Resistance to System Authorization; Benefits of System Authorization; Key Elements of an Enterprise System Authorization Program; The Business Case; Goal Setting; Tasks and Milestones; Program Oversight; Visibility; Resources; Program Guidance; Special Issues; Program Integration; System Authorization Points of Contact; Measuring Progress; Managing Program Activities; Monitoring Compliance; Providing Advice and Assistance; Responding to Changes; Program Awareness, Training, and Education; Using Expert Systems; Waivers and Exceptions; NIST Special Publication 800-37, Revision 1, and the Application of the Risk Management Framework to Systems; Overview; Authority and Scope; Purpose and Applicability; Target Audience; Fundamentals of Information System Risk Management According to NIST SP 800-37, Revision 1; Guidance on Organization-Wide Risk Management; Organization Level (Tier 1); Mission/Business Process Level (Tier 2); Information System Level (Tier 3); Guidance on Risk Management in the System Development Life Cycle; NIST’s Risk Management Framework; Guidance on System Boundary Definition; Guidance on Software Application Boundaries; Guidance on Complex Systems; Guidance on the Impact of Technological Changes on System Boundaries; Guidance on Dynamic Subsystems; Guidance on External Subsystems; Guidance on Security Control Allocation; Guidance on Applying the Risk Management Framework; Summary of NIST Guidance; System Authorization Roles and Responsibilities; Primary Roles and Responsibilities; Other Roles and Responsibilities; Additional Roles and Responsibilities from NIST SP 800-37, Revision 1; Documenting Roles and Responsibilities; Job Descriptions; Position Sensitivity Designations; Personnel Transition; Time Requirements; Expertise Requirements; Using Contractors; Routine Duties; Organizational Skills; Organizational Placement of the System Authorization Function; The System Authorization Life Cycle; Initiation Phase; Acquisition/Development Phase; Implementation Phase; Operations/Maintenance Phase; Disposition Phase; Challenges to Implementation; Why System Authorization Programs Fail; Program Scope; Assessment Focus; Short-Term Thinking; Long-Term Thinking; Poor Planning; Lack of Responsibility; Excessive Paperwork; Lack of Enforcement; Lack of Foresight; Poor Timing; Lack of Support; System Authorization Project Planning; Planning Factors; Dealing with People; Team Member Selection; Scope Definition; Assumptions; Risks; Project Agreements; Project Team Guidelines; Administrative Requirements; Reporting; Other Tasks; Project Kickoff; Wrap-Up; Observations; The System Inventory Process; Responsibility; System Identification; Small Systems; Complex Systems; Combining Systems; Accreditation Boundaries; The Process; Validation; Inventory Information; Inventory Tools; Using the Inventory; Maintenance; Observations; Interconnected Systems; The Solution; Agreements in the System Authorization Process; Trust Relationships; Initiation; Time Issues; Exceptions; Maintaining Agreements; Security Authorization of Information Systems: Review Questions; ; Information System Categorization; Introduction; Defining Sensitivity; Data Sensitivity and System Sensitivity; Sensitivity Assessment Process; Data Classification Approaches; Responsibility for Data Sensitivity Assessment; Ranking Data Sensitivity; National Security Information; Criticality; Criticality Assessment; Criticality in the View of the System Owner; Ranking Criticality; Changes in Criticality and Sensitivity; NIST Guidance on System Categorization; Task 1-1: Categorize and Document the Information System; &am … (more)
- Edition:
- 2nd ed
- Publisher Details:
- Boca Raton : Auerbach Publications
- Publication Date:
- 2012
- Extent:
- 1 online resource
- Subjects:
- 658.4/78076
Computer networks -- Security measures -- Examinations -- Study guides
Computers -- Access control -- Examinations -- Study guides
Administrative agencies -- Information resources management -- Security measures -- United States -- Examinations -- Study guides
Telecommunications engineers -- Certification -- United States
COMPUTERS -- Security -- General
BUSINESS & ECONOMICS -- Commerce
BUSINESS & ECONOMICS -- Corporate Governance
BUSINESS & ECONOMICS -- Leadership
BUSINESS & ECONOMICS -- Organizational Development
BUSINESS & ECONOMICS -- Workplace Culture
Computer security -- Examinations
Electronic data processing personnel -- Certification
Electronic books
Study guides - Languages:
- English
- ISBNs:
- 9781439820766
1439820767 - Related ISBNs:
- 9781439820759
1439820759 - Notes:
- Note: Print version record.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.143289
- Ingest File:
- 01_002.xml