Official (ISC)2® Guide to the CAP® CBK®, Second Edition

Official (ISC)2® Guide to the CAP® CBK®, Second Edition

4.11 - 1251 ratings - Source

Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization Professional (CAPAr) Common Body of Knowledge (CBKAr) and NIST SP 800-37, the Official (ISC)2Ar Guide to the CAPAr CBKAr, Second Edition provides readers with the tools to effectively secure their IT systems via standard, repeatable processes. Derived from the authora€™s decades of experience, including time as the CISO for the Nuclear Regulatory Commission, the Department of Housing and Urban Development, and the National Science Foundationa€™s Antarctic Support Contract, the book describes what it takes to build a system security authorization program at the organizational level in both public and private organizations. It analyzes the full range of system security authorization (formerly CaA) processes and explains how they interrelate. Outlining a user-friendly approach for top-down implementation of IT security, the book: Details an approach that simplifies the authorization process, yet still satisfies current federal government criteria Explains how to combine disparate processes into a unified risk management methodology Covers all the topics included in the Certified Authorization Professional (CAPAr) Common Body of Knowledge (CBKAr) Examines U.S. federal polices, including DITSCAP, NIACAP, CNSS, NIAP, DoD 8500.1 and 8500.2, and NIST FIPS Reviews the tasks involved in certifying and accrediting U.S. government information systems Chapters 1 through 7 describe each of the domains of the (ISC)2Ar CAPAr CBKAr. This is followed by a case study on the establishment of a successful system authorization program in a major U.S. government department. The final chapter considers the future of system authorization. The booka€™s appendices include a collection of helpful samples and additional information to provide you with the tools to effectively secure your IT systems.In fact, it had been established as a formal information technology security methodology with the publication of Federal Information ... in 1983, and it was elevated in significance with the enactment of the Computer Security Act of 1987 and with the publication of Office ... Guideline NCSC-TG-029, Introduction to Certification and Accreditation, by the National Security Agency (NSA) in January 1994, whichanbsp;...

Title:Official (ISC)2® Guide to the CAP® CBK®, Second Edition
Author: Patrick D. Howard
Publisher:CRC Press - 2012-07-18

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.

Click button below to register and download Ebook
Privacy Policy | Contact | DMCA