Search Results - "NIST"

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Developing textbook thinking strategies for success in college by Nist

    Published 2002
    Book
  2. 2
  3. 3

    Information security policies, procedures, and standards a practitioner's reference by Landoll, Douglas J.

    Published 2016
    Book
  4. 4

    Guide to standards and specifications for designing Web software by Magee, Stan

    Published 1998
    Book
  5. 5

    Information security and IT risk management by Agrawal, Manish

    Published 2014
    Table of Contents: “…-- Design case -- ch. 9 Hardware and Software Controls -- Overview -- Password management -- Access control -- Firewalls -- Intrusion detection/prevention systems -- Patch management for operating systems and applications -- End-point protection -- Example case -- AirTight networks -- Chapter review questions -- Example case questions -- Hands-on activity -- host-based IDS (OSSEC) -- Critical thinking exercise -- extra-human security controls -- Design case -- ch. 10 Shell Scripting -- Overview -- Introduction -- Output redirection -- Text manipulation -- Variables -- Conditionals -- User input -- Loops -- Putting it all together -- Example case -- Max Butler -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- basic scripting -- Critical thinking exercise -- script security -- Design case -- ch. 11 Incident Handling -- Introduction -- Incidents overview -- Incident handling -- The disaster -- Example case -- on-campus piracy -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- incident timeline using OSSEC -- Critical thinking exercise -- destruction at the EDA -- Design case -- ch. 12 Incident Analysis -- Introduction -- Log analysis -- Event criticality -- General log configuration and maintenance -- Live incident response -- Timelines -- Other forensics topics -- Example case -- backup server compromise -- Chapter review questions -- Example case questions -- Hands-on activity -- server log analysis -- Critical thinking exercise -- destruction at the EDA -- Design case -- ch. 13 Policies, Standards, and Guidelines -- Introduction -- Guiding principles -- Writing a policy -- Impact assessment and vetting -- Policy review -- Compliance -- Key policy issues -- Example case -- HB Gary -- Summary -- Reference -- Chapter review questions -- Example case questions -- Hands-on activity -- create an AUP -- Critical thinking exercise -- Aaron Swartz -- Design case -- ch. 14 IT Risk Analysis and Risk Management -- Overview -- Introduction -- Risk management as a component of organizational management -- Risk-management framework -- The NIST 800-39 framework -- Risk assessment -- Other risk-management frameworks -- IT general controls for Sarbanes--Oxley compliance -- Compliance versus risk management -- Selling security -- Example case -- online marketplace purchases -- Summary -- Chapter review questions -- Hands-on activity -- risk assessment using LSOF -- Critical thinking exercise -- risk estimation biases -- Design case.…”
    Book