Security Assessment : Case Studies for Implementing the NSA IAM
Syngress
Sold by Better World Books: West, Reno, NV, U.S.A.
AbeBooks Seller since March 14, 2016
Used - Soft cover
Condition: Used - Good
Quantity: 1 available
Add to basketSold by Better World Books: West, Reno, NV, U.S.A.
AbeBooks Seller since March 14, 2016
Condition: Used - Good
Quantity: 1 available
Add to basketUsed book that is in clean, average condition without any missing pages.
Seller Inventory # 1648243-6
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. Security Assessment shows how to do a complete security assessment based on the NSA's guidelines.
Security Assessment also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc).
Security Assessment is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement.
Greg Miles, Ph.D., CISSP, CISM, IAM, is the Vice President and co-founder of Security Horizon and has over 16 years of technology and information security experience in Federal and commercial sectors. Greg is a United States Air Force Veteran and has served in military and contract support for the National Security Agency, Defense Information Systems Agency, Air Force Space Command, and NASA. Greg holds a Ph.D. in Engineering Management, a Masters Degree in Business Administration, and a Bachelors Degree in Electrical Engineering.
Ed Fuller, CISSP, GSEC, IAM , has over 26 years of experience in Operations, Tactical, and Computer Information Systems and Security. Ed serves as a Lead Instructor for the National Security Agencies (NSA) Information Assurance Methodology (IAM). Mr. Fuller retired from the United States Navy with over 23 years of distinguished service. Ed possesses a B.S. degree in Information Systems Management, certification in SANS GSEC and CISSP.
Ted Dykstra, CISSP, CCNP, IAM, is a security consultant with Security Horizon with experience in Microsoft Windows and Cisco operating system security. He has 6 years experience in information security for commercial clients and government agencies to include risk assessments, vulnerability analysis, and Certification & Accreditation support.
"About this title" may belong to another edition of this title.
Better World Books (BWB) values your satisfaction and offers you returns within thirty (30) days after the estimated delivery date on most items. All returned items must be in the original condition; used items should include the SKU sticker located on the spine or back of the product.
If you have an incomplete, incorrect, or damaged shipment, please contact our Customer Care team via Abebooks contact seller options before proceeding with the return.Please keep in mind that because we deal mostl...
Please allow 1-2 business days for order fulfillment.
| Order quantity | 4 to 8 business days | 3 to 5 business days |
|---|---|---|
| First item | US$ 0.00 | US$ 10.00 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.