Search results

Jump to: navigation, search

Page title matches

Page text matches

  • ...dification, or destruction in order to provide confidentiality, integrity, and [[availability]]. :[[Agency]] operations include such things as mission, functions, image, and reputation.
    14 KB (1,760 words) - 04:15, 21 March 2008
  • THE NEED FOR SECURITY [[CERTIFICATION]] AND [[ACCREDITATION]] ...managed by another agency, contractor, or other source. The [[information security]] program must include:
    14 KB (1,915 words) - 03:44, 13 March 2008
  • BASIC CONCEPTS ASSOCIATED WITH SECURITY [[CERTIFICATION]] AND [[ACCREDITATION]] ...nd (vii) ongoing [[activities]] employed to monitor the effectiveness of [[security controls]].
    54 KB (7,179 words) - 03:44, 13 March 2008
  • PHASES AND TASKS ASSOCIATED WITH SECURITY [[CERTIFICATION]] AND ACCREDITATION ...subtasks and the [[individuals]] responsible for accomplishing those tasks and subtasks is provided in Appendix D.
    80 KB (10,519 words) - 03:44, 13 March 2008
  • ...lication is to provide guidelines for the security [[certification]] and [[accreditation]] of information systems supporting the executive agencies of the federal g * Enabling more consistent, comparable, and repeatable assessments of [[security controls]] in federal [[information systems]];
    7 KB (931 words) - 03:44, 13 March 2008
  • ..., tasked [[NIST]] with the responsibility of developing security standards and guidelines for the federal government including the development of: ...y]] based on the objectives of providing appropriate levels of information security according to a range of [[risk]] levels;
    16 KB (2,032 words) - 03:36, 13 March 2008
  • ..., tasked [[NIST]] with the responsibility of developing security standards and guidelines for the federal government including the development of: ...y]] based on the objectives of providing appropriate levels of information security according to a range of [[risk]] levels;
    16 KB (2,032 words) - 03:36, 13 March 2008
  • ...on, while others come from Presidential Directives or the Office of Budget and Management (OMB) Circulars. Here is a list of the major sources of these re == FEDERAL INFORMATION SECURITY MANAGEMENT ACT OF 2002 (FISMA) ==
    13 KB (1,626 words) - 00:52, 18 March 2008
  • ...gories are identical to the control families found in FIPS 200, SP 800-53, and other related documents. These Family lists mirror the document crosswalk f | Personal Identity Verification for Federal Employees and Contractors
    44 KB (5,798 words) - 00:55, 18 March 2008
  • <big><center>Information Security</center></big> ...opic_Clusters#CERTIFICATION_.26_ACCREDITATION_.28C.26A.29| Certification & Accreditation (C&A)]]
    6 KB (706 words) - 00:53, 18 March 2008
  • ...on, while others come from Presidential Directives or the Office of Budget and Management (OMB) Circulars. Here is a list of the major sources of these re == Federal Information Security Management Act ==
    13 KB (1,710 words) - 02:29, 18 March 2008
  • ...gories are identical to the control families found in FIPS 200, SP 800-53, and other related documents. These Family lists mirror the document crosswalk f | Personal Identity Verification for Federal Employees and Contractors
    46 KB (6,152 words) - 02:29, 18 March 2008
  • '''Certification, Accreditation and Security Assessments''' | Security Controls for Federal Information Systems
    3 KB (454 words) - 04:01, 18 March 2008
  • ...ontext of its specific mission responsibilities, operational environments, and unique organizational conditions. ...ate for revisions to [[NIST]] Special Publications applies only to the new and/or updated material in the publications resulting from the periodic revisio
    28 KB (3,658 words) - 14:20, 20 July 2009
  • SECURITY CONTROL STRUCTURE, ORGANIZATION, BASELINES, AND ASSURANCE ...d (vi) future revisions to the [[security controls]], the control catalog, and baseline [[controls]].
    30 KB (4,138 words) - 14:20, 20 July 2009
  • <big>'''MINIMUM SECURITY CONTROLS - SUMMARY'''</big> LOW-IMPACT, MODERATE-IMPACT, AND HIGH-IMPACT INFORMATION SYSTEMS
    17 KB (2,047 words) - 14:18, 20 July 2009
  • <big>'''SECURITY CONTROL MAPPINGS'''</big> RELATIONSHIP OF [[SECURITY CONTROLS]] TO OTHER STANDARDS AND CONTROL SETS
    33 KB (3,911 words) - 14:19, 20 July 2009
  • <big>'''SECURITY CONTROL CATALOG'''</big> SECURITY [[CONTROLS]], SUPPLEMENTAL GUIDANCE, AND CONTROL ENHANCEMENTS
    249 KB (31,794 words) - 14:19, 20 July 2009
  • <big>'''STANDARDS AND GUIDANCE MAPPINGS'''</big> CROSSWALK BETWEEN [[NIST]] STANDARDS AND GUIDELINES AND SECURITY CONTROLS
    44 KB (5,649 words) - 14:19, 20 July 2009
  • [[SECURITY CONTROLS]], ENHANCEMENTS, AND SUPPLEMENTAL GUIDANCE ...ing the critical infrastructure from cyber attacks and common human error; and (v) safeguarding against the [[compromise]] of [[proprietary information]].
    50 KB (6,686 words) - 14:19, 20 July 2009

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)