NIST SP 800-36 Guide to Selecting Information Technology Security Products

NIST SP 800-36 Guide to Selecting Information Technology Security Products
Author :
Publisher :
Total Pages : 74
Release :
ISBN-10 : 1548225142
ISBN-13 : 9781548225148
Rating : 4/5 (42 Downloads)

Book Synopsis NIST SP 800-36 Guide to Selecting Information Technology Security Products by : National Institute National Institute of Standards and Technology

Download or read book NIST SP 800-36 Guide to Selecting Information Technology Security Products written by National Institute National Institute of Standards and Technology and published by . This book was released on 2003-10-31 with total page 74 pages. Available in PDF, EPUB and Kindle. Book excerpt: NIST SP 800-36 October 2003 If you like this book, please leave positive review. The selection of IT security products is an integral part of the design, development and maintenance of an IT security infrastructure that ensures confidentiality, integrity, and availability of mission critical information. This guide, NIST SP 800-36, Guide to Selecting Information Technology (IT) Security Products, first defines broad security product categories and specifies product types within those categories. It then provides a list of characteristics and pertinent questions an organization should ask when selecting a product from within these categories. The selection of IT security products, and the implementation of the security program within which these products are used, follows the risk management process of identifying the most effective mix of management, operational, and technical controls. The specific blend of security controls an organization employs is tied to the mission of the organization and the role of the system within the organization as it supports that mission. Risk management is the process used to identify an effective mixture of controls. Once the necessary controls are identified, IT security products can then be identified to provide for these controls using the considerations and questions discussed in this document. The guide seeks to assist in choosing IT security products that meet an organization''s requirements. It should be used with other NIST publications to develop a comprehensive approach to managing, satisfying, and verifying an organization''s IT security and information assurance requirements. Why buy a book you can download for free? First you gotta find it and make sure it''s the latest version (not always easy). Then you gotta print it using a network printer you share with 100 other people - and its outta paper - and the toner is low (take out the toner cartridge, shake it, then put it back). If it''s just 10 pages, no problem, but if it''s a 250-page book, you will need to punch 3 holes in all those pages and put it in a 3-ring binder. Takes at least an hour. An engineer that''s paid $75 an hour has to do this himself (who has assistant''s anymore?). If you are paid more than $10 an hour and use an ink jet printer, buying this book will save you money. It''s much more cost-effective to just order the latest version from Amazon.com This public domain material is published by 4th Watch Books. We publish tightly-bound, full-size books at 8 � by 11 inches, with glossy covers. 4th Watch Books is a Service Disabled Veteran Owned Small Business (SDVOSB) and is not affiliated with the National Institute of Standards and Technology. For more titles published by 4th Watch, please visit: cybah.webplus.net GSA P-100 Facilities Standards for the Public Buildings Service GSA P-120 Cost and Schedule Management Policy Requirements GSA P-140 Child Care Center Design Guide GSA Standard Level Features and Finishes for U.S. Courts Facilities GSA Courtroom Technology Manual NIST SP 500-299 NIST Cloud Computing Security Reference Architecture NIST SP 500-291 NIST Cloud Computing Standards Roadmap Version 2 NIST SP 500-293 US Government Cloud Computing Technology Roadmap Volume 1 & 2 NIST SP 500-293 US Government Cloud Computing Technology Roadmap Volume 3 DRAFT NIST SP 1800-8 Securing Wireless Infusion Pumps NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) NIST SP 800-66 Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule NIST SP 1800-1 Securing Electronic Health Records on Mobile Devices NIST SP 800-177 Trustworthy Email


NIST SP 800-36 Guide to Selecting Information Technology Security Products Related Books

NIST SP 800-36 Guide to Selecting Information Technology Security Products
Language: en
Pages: 74
Authors: National Institute National Institute of Standards and Technology
Categories:
Type: BOOK - Published: 2003-10-31 - Publisher:

DOWNLOAD EBOOK

NIST SP 800-36 October 2003 If you like this book, please leave positive review. The selection of IT security products is an integral part of the design, develo
Guide to Bluetooth Security
Language: en
Pages: 43
Authors: Karen Scarfone
Categories: Computers
Type: BOOK - Published: 2009-05 - Publisher: DIANE Publishing

DOWNLOAD EBOOK

This document provides info. to organizations on the security capabilities of Bluetooth and provide recommendations to organizations employing Bluetooth technol
Guide to Protecting the Confidentiality of Personally Identifiable Information
Language: en
Pages: 59
Authors: Erika McCallister
Categories: Computers
Type: BOOK - Published: 2010-09 - Publisher: DIANE Publishing

DOWNLOAD EBOOK

The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few yea
Attribute-Based Access Control
Language: en
Pages: 285
Authors: Vincent C. Hu
Categories: Computers
Type: BOOK - Published: 2017-10-31 - Publisher: Artech House

DOWNLOAD EBOOK

This comprehensive new resource provides an introduction to fundamental Attribute Based Access Control (ABAC) models. This book provides valuable information fo
Technical Guide to Information Security Testing and Assessment
Language: en
Pages: 80
Authors: Karen Scarfone
Categories: Computers
Type: BOOK - Published: 2009-05 - Publisher: DIANE Publishing

DOWNLOAD EBOOK

An info. security assessment (ISA) is the process of determining how effectively an entity being assessed (e.g., host, system, network, procedure, person) meets