Secure CheckoutPersonal information is secured with SSL technology.
Free ShippingFree global shipping
No minimum order.
The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements.
This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three leading types of C&A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a C&A project. The next section to the book illustrates addressing security awareness, end-user rules of behavior, and incident response requirements. Once this phase of the C&A project is complete, the reader will learn to perform the security tests and evaluations, business impact assessments system risk assessments, business risk assessments, contingency plans, business impact assessments, and system security plans. Finally the reader will learn to audit their entire C&A project and correct any failures.
- Focuses on federally mandated certification and accreditation requirements
* Author Laura Taylor's research on Certification and Accreditation has been used by the FDIC, the FBI, and the Whitehouse
* Full of vital information on compliance for both corporate and government IT Managers
Chapter 1: What Is Certification and Accreditation?
Chapter 2: Types of Certification and Accreditation
Chapter 3: Understanding the Certification and Accreditation Process
Chapter 4: Establishing a C&A Program
Chapter 5: Developing a Certification Package
Chapter 6: Preparing the Hardware and Software Inventory
Chapter 7: Determining the Certification Level
Chapter 8: Performing and Preparing the Self-Assessment
Chapter 9: Addressing Security Awareness and Training Requirements
Chapter 10: Addressing End-User Rules of Behavior
Chapter 11: Addressing Incident Response
Chapter 12: Performing the Security Tests and Evaluation
Chapter 13: Conducting a Privacy Impact Assessment
Chapter 14: Performing the Business Risk Assessment
Chapter 15: Preparing the Business Impact Assessment
Chapter 16: Developing the Contingency Plan
Chapter 17: Performing a System Risk Assessment
Chapter 18: Developing a Configuration Management Plan
Chapter 19: Preparing the System Security Plan
Chapter 20: Submitting the C&A Package
Chapter 21: Evaluating the Certification Package for Accreditation
Chapter 22: Addressing C&A Findings
Chapter 23: Improving Your Federal Computer Security Report Card Scores
Chapter 24: Resources
OMB Circular A-130: Appendix III
- No. of pages:
- © Syngress 2006
- 28th November 2006
- eBook ISBN:
- Paperback ISBN:
Laura Taylor leads the technical development of FedRAMP, the U.S. government's initiative to apply the Federal Information Security Management Act to cloud computing. In 2006, Taylor's FISMA Certification and Accreditation Handbook was the first book published on FISMA. Taylor has contributed to four other books on information security and has authored hundreds of articles and white papers on infosec topics for a variety of web publications and magazines. Specializing in assisting federal agencies and private industry comply with computer security laws, Taylor is a thought leader on cyber security compliance. Taylor has led large technology migrations, developed enterprise wide information security programs, and has performed risk assessments and security audits for numerous financial institutions.
Elsevier.com visitor survey
We are always looking for ways to improve customer experience on Elsevier.com.
We would like to ask you for a moment of your time to fill in a short questionnaire, at the end of your visit.
If you decide to participate, a new browser tab will open so you can complete the survey after you have completed your visit to this website.
Thanks in advance for your time.