Guide to Industrial Control Systems (ICS) Security
Title | Guide to Industrial Control Systems (ICS) Security PDF eBook |
Author | Keith Stouffer |
Publisher | |
Pages | 0 |
Release | 2015 |
Genre | Computer networks |
ISBN |
Creating a Patch and Vulnerability Management Program
Title | Creating a Patch and Vulnerability Management Program PDF eBook |
Author | Peter Mell |
Publisher | Createspace Independent Publishing Platform |
Pages | 74 |
Release | 2005-11-30 |
Genre | Computers |
ISBN | 9781494952259 |
This publication is designed to assist organizations in implementing security patch and vulnerability remediation programs. It focuses on how to create an organizational process and test the effectiveness of the process. It also seeks to inform the reader about the technical solutions that are available for vulnerability remediation.
Technical Guide to Information Security Testing and Assessment
Title | Technical Guide to Information Security Testing and Assessment PDF eBook |
Author | Karen Scarfone |
Publisher | DIANE Publishing |
Pages | 80 |
Release | 2009-05 |
Genre | Computers |
ISBN | 1437913482 |
An info. security assessment (ISA) is the process of determining how effectively an entity being assessed (e.g., host, system, network, procedure, person) meets specific security objectives. This is a guide to the basic tech. aspects of conducting ISA. It presents tech. testing and examination methods and techniques that an org. might use as part of an ISA, and offers insights to assessors on their execution and the potential impact they may have on systems and networks. For an ISA to be successful, elements beyond the execution of testing and examination must support the tech. process. Suggestions for these activities ¿ including a robust planning process, root cause analysis, and tailored reporting ¿ are also presented in this guide. Illus.
Glossary of Key Information Security Terms
Title | Glossary of Key Information Security Terms PDF eBook |
Author | Richard Kissel |
Publisher | DIANE Publishing |
Pages | 211 |
Release | 2011-05 |
Genre | Computers |
ISBN | 1437980090 |
This glossary provides a central resource of definitions most commonly used in Nat. Institute of Standards and Technology (NIST) information security publications and in the Committee for National Security Systems (CNSS) information assurance publications. Each entry in the glossary points to one or more source NIST publications, and/or CNSSI-4009, and/or supplemental sources where appropriate. This is a print on demand edition of an important, hard-to-find publication.
Guide to Computer Security Log Management
Title | Guide to Computer Security Log Management PDF eBook |
Author | Karen Kent |
Publisher | |
Pages | 72 |
Release | 2007-08-01 |
Genre | |
ISBN | 9781422312919 |
A log is a record of the events occurring within an org¿s. systems & networks. Many logs within an org. contain records related to computer security (CS). These CS logs are generated by many sources, incl. CS software, such as antivirus software, firewalls, & intrusion detection & prevention systems; operating systems on servers, workstations, & networking equip.; & applications. The no., vol., & variety of CS logs have increased greatly, which has created the need for CS log mgmt. -- the process for generating, transmitting, storing, analyzing, & disposing of CS data. This report assists org¿s. in understanding the need for sound CS log mgmt. It provides practical, real-world guidance on developing, implementing, & maintaining effective log mgmt. practices. Illus.
Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
Title | Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist PDF eBook |
Author | Karen Scarfone |
Publisher | DIANE Publishing |
Pages | 127 |
Release | 2009-08 |
Genre | Computers |
ISBN | 1437914926 |
When an IT security configuration checklist (e.g., hardening or lockdown guide) is applied to a system in combination with trained system administrators and a sound and effective security program, a substantial reduction in vulnerability exposure can be achieved. This guide will assist personnel responsible for the administration and security of Windows XP systems. It contains information that can be used to secure local Windows XP workstations, mobile computers, and telecommuter systems more effectively in a variety of environments, including small office, home office and managed enterprise environments. The guidance should only be applied throughout an enterprise by trained and experienced system administrators. Illustrations.
Official (ISC)2® Guide to the CAP® CBK®
Title | Official (ISC)2® Guide to the CAP® CBK® PDF eBook |
Author | Patrick D. Howard |
Publisher | CRC Press |
Pages | 465 |
Release | 2016-04-19 |
Genre | Computers |
ISBN | 1466576030 |
Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization Professional (CAP) Common Body of Knowledge (CBK) and NIST SP 800-37, the Official