Guide For Mapping Types Of Information And Information Systems To Security Categories

Guide For Mapping Types Of Information And Information Systems To Security Categories
Title Guide For Mapping Types Of Information And Information Systems To Security Categories PDF eBook
Author William C. Barker
Publisher
Pages 44
Release 2004-05-04
Genre Computers
ISBN 9780756741723

Download Guide For Mapping Types Of Information And Information Systems To Security Categories Book in PDF, Epub and Kindle

This NIST guide is Vol. I of 2 vol. It contains the basic guidelines for mapping types of info. and info. systems to security categories. The guideline's objective is to facilitate provision of appropriate levels of info. security according to a range of levels of impact or consequences that might result from the unauthorized disclosure, modification, or loss of availability of the info. or info. system. The appendices, including security categorization recommendations for mission-based info. types and rationale for security categorization recommendations, are published as a separate vol. This guideline assumes that the user has read and is familiar with "Standards for Security Categorization of Federal Info. and Info. Systems" (FIPS 199).

Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories and Volume II: Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories

Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories and Volume II: Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories
Title Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories and Volume II: Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories PDF eBook
Author nist
Publisher
Pages 368
Release 2014-01-02
Genre
ISBN 9781494878283

Download Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories and Volume II: Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories Book in PDF, Epub and Kindle

Title III of the E-Government Act, titled the Federal Information Security Management Act (FISMA) of 2002, tasked NIST to develop (1) standards to be used by all Federal agencies to categorize information and informationsystems collected or maintained by or on behalf of each agency based on the objectives of providing appropriate levels of information security according to a range of risk levels; and (2) guidelines recommending the types of information and information systems to be included in each such category. Special Publication 800-60 was issued in response to the second of these tasks. The revision toVolume I contains the basic guidelines for mapping types of information and information systems to security categories. The appendices contained in Volume I include security categorization recommendations and rationale for mission-based and management and support information types.

Volume II

Volume II
Title Volume II PDF eBook
Author Kevin Stine
Publisher
Pages
Release 2008
Genre
ISBN

Download Volume II Book in PDF, Epub and Kindle

Nist Special Publication 800-60

Nist Special Publication 800-60
Title Nist Special Publication 800-60 PDF eBook
Author U.s. Department of Commerce
Publisher CreateSpace
Pages 360
Release 2014-01-31
Genre Reference
ISBN 9781495294440

Download Nist Special Publication 800-60 Book in PDF, Epub and Kindle

Title III of the E-Government Act, titled the Federal Information Security Management Act, tasked the National Institute of Standards and Technology to develop standards to be used by all Federal agencies to categorize all information and information systems collected or maintained by or on behalf of each agency based on the objectives of providing appropriate levels of information security according to a range of risk levels; guidelines recommending the types of information and information systems to be included in each category; and minimum information security requirements.

Guide for Mapping Types of Information and Information Systems to Security Categories

Guide for Mapping Types of Information and Information Systems to Security Categories
Title Guide for Mapping Types of Information and Information Systems to Security Categories PDF eBook
Author
Publisher
Pages
Release 2004
Genre Digital mapping
ISBN

Download Guide for Mapping Types of Information and Information Systems to Security Categories Book in PDF, Epub and Kindle

Guide for Mapping Types of Information and Information Systems to Security Categories

Guide for Mapping Types of Information and Information Systems to Security Categories
Title Guide for Mapping Types of Information and Information Systems to Security Categories PDF eBook
Author Kevin Stine
Publisher
Pages
Release 2008
Genre Digital mapping
ISBN

Download Guide for Mapping Types of Information and Information Systems to Security Categories Book in PDF, Epub and Kindle

Guide for Mapping Types of Information and Information Systems to Security Categories

Guide for Mapping Types of Information and Information Systems to Security Categories
Title Guide for Mapping Types of Information and Information Systems to Security Categories PDF eBook
Author National Institute National Institute of Standards and Technology
Publisher
Pages 312
Release 2008-08-31
Genre
ISBN 9781977782618

Download Guide for Mapping Types of Information and Information Systems to Security Categories Book in PDF, Epub and Kindle

NIST SP 800-60 August 2008 This is Volume II of two volumes. Volume I contains the basic guidelines for mapping types of information and information systems to security categories. The appendices contained in Volume II include security categorization recommendations and rationale for mission-based and management and support information types. Why buy a book you can download for free? First you gotta find a good clean (legible) copy and make sure it's the latest version (not always easy). Some documents found on the web are missing some pages or the image quality is so poor, they are difficult to read. We look over each document carefully and replace poor quality images by going back to the original source document. We proof each document to make sure it's all there - including all changes. If you find a good copy, you could print it using a network printer you share with 100 other people (typically its either out of paper or toner). If it's just a 10-page document, no problem, but if it's 250-pages, you will need to punch 3 holes in all those pages and put it in a 3-ring binder. Takes at least an hour. It's much more cost-effective to just order the latest version from Amazon.com This book is published by 4th Watch Books and includes copyright material. We publish compact, tightly-bound, full-size books (8 � by 11 inches), with glossy covers. 4th Watch Books is a Service Disabled Veteran-Owned Small Business (SDVOSB). If you like the service we provide, please leave positive review on Amazon.com. NIST SP 800-12 An Introduction to Information Security NIST SP 800-18 Developing Security Plans for Federal Information Systems NIST SP 800-31 Intrusion Detection Systems NIST SP 800-34 Contingency Planning Guide for Federal Information Systems NIST SP 800-35 Guide to Information Technology Security Services NIST SP 800-39 Managing Information Security Risk NIST SP 800-40 Guide to Enterprise Patch Management Technologies NIST SP 800-41 Guidelines on Firewalls and Firewall Policy NIST SP 800-44 Guidelines on Securing Public Web Servers NIST SP 800-47 Security Guide for Interconnecting Information Technology Systems NIST SP 800-48 Guide to Securing Legacy IEEE 802.11 Wireless Networks NIST SP 800-53A Assessing Security and Privacy Controls NIST SP 800-61 Computer Security Incident Handling Guide NIST SP 800-77 Guide to IPsec VPNs NIST SP 800-83 Guide to Malware Incident Prevention and Handling for Desktops and Laptops NIST SP 800-92 Guide to Computer Security Log Management NIST SP 800-94 Guide to Intrusion Detection and Prevention Systems (IDPS) NIST SP 800-97 Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i NIST SP 800-137 Information Security Continuous Monitoring (ISCM) NIST SP 800-160 Systems Security Engineering NIST SP 800-171 Protecting Controlled Unclassified Information in Nonfederal Systems NIST SP 1800-7 Situational Awareness for Electric Utilities NISTIR 7628 Guidelines for Smart Grid Cybersecurity DoD Energy Manager's Handbook FEMP Operations & Maintenance Best Practices UFC 4-020-01 DoD Security Engineering Facilities Planning Manual UFC 4-021-02 Electronic Security Systems GSA GSA Courtroom Technology Manual Draft NISTIR 8179 Criticality Analysis Process Model NISTIR 8144 Assessing Threats to Mobile Devices & Infrastructure NISTIR 8151 Dramatically Reducing Software Vulnerabilities NIST SP 800-183 Networks of 'Things' NIST SP 800-184 Guide for Cybersecurity Event Recovery