메뉴 건너뛰기




Volumn , Issue , 2005, Pages 1-475

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85179250879     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1201/9781003090441     Document Type: Book
Times cited : (57)

References (106)
  • 2
    • 85179212996 scopus 로고    scopus 로고
    • The Free Dictionary, www.thefreedictionary.com
  • 4
    • 85179294403 scopus 로고    scopus 로고
    • July
    • CobiT Steering Committee, IT Governance Institute, COBIT Control Objectives, 3rd ed., July 2000.
    • (2000) COBIT Control Objectives
  • 5
    • 33751339650 scopus 로고    scopus 로고
    • July
    • CobiT Steering Committee, IT Governance Institute, COBIT Executive Summary, 3rd ed., July 2000.
    • (2000) COBIT Executive Summary
  • 6
    • 21244436836 scopus 로고    scopus 로고
    • CobiT Steering Committee, IT Governance Institute, COBIT Framework, 3rd ed., July 2000.
    • (2000) COBIT Framework
  • 7
    • 33749657001 scopus 로고    scopus 로고
    • CobiT Steering Committee, IT Governance Institute, COBIT Management Guidelines, 3rd ed., July 2000.
    • (2000) COBIT Management Guidelines
  • 8
    • 85179208432 scopus 로고    scopus 로고
    • CSOs Prioritize Security Spending for 2003
    • Cosgrove, Lorraine, ‘‘CSOs Prioritize Security Spending for 2003,’’ CSO Online, CSO Research Reports, January 7, 2003.
    • (2003) CSO Online, CSO Research Reports
    • Cosgrove, L.1
  • 9
    • 85179280984 scopus 로고    scopus 로고
    • Security Spending on the Rise
    • Martin, James A., ‘‘Security Spending on the Rise,’’ iQMagazine, September/ October 2003.
    • Iqmagazine
    • Martin, J.A.1
  • 11
    • 85179232994 scopus 로고    scopus 로고
    • Accounting and Information Management Division, Information Security Risk Assessment: Practices of Leading Organizations
    • November
    • United States General Accounting Office, Accounting and Information Management Division, Information Security Risk Assessment: Practices of Leading Organizations, A Supplement to GAO’s May 1998 Executive Guide on Information Security Management, GAO/IAM-00-33, November 1999.
    • (1999) A Supplement to GAO’s May 1998 Executive Guide on Information Security Management
  • 12
    • 85179247001 scopus 로고    scopus 로고
    • Federal Trade Commission, Standards for Safeguarding Customer Information; Final Rule, 16 CFR Part 314, Federal Register, Vol. 67, No. 100, May 23, 2002. www.ftc.gov/os/2002/05/67fr36585.pdf
    • (2002) Standards for Safeguarding Customer Information , vol.67 , Issue.100
  • 15
    • 85179287318 scopus 로고
    • A NIST Handbook
    • October
    • An Introduction to Computer Security: A NIST Handbook, NIST Special Publication 800–12, October 1995. http://csrc.nist.gov/publications/nistpubs/800-12/800-12-html
    • (1995) NIST Special Publication , pp. 800-812
  • 16
    • 85179291128 scopus 로고    scopus 로고
    • American Institute of Certified Public Accountants, Service Organizations: Applying SAS No. 70, as Amended: AICPA Guide, 2004.
    • (2004) Service Organizations: Applying SAS , Issue.70
  • 18
    • 1842829828 scopus 로고    scopus 로고
    • Recommendations of the National Institute of Standards and Technology
    • July
    • Risk Management Guide: Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-30, July 2002. http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf
    • (2002) NIST Special Publication , pp. 800-830
  • 19
    • 85179259650 scopus 로고    scopus 로고
    • August
    • Common Criteria for Information Technology Security Evaluation, Version 2.1, CCIMB-99-031, August 1999.
    • (1999) Version 2.1, CCIMB
  • 21
    • 85179236958 scopus 로고    scopus 로고
    • Guide for Developing Security Plans for Information Technology Systems, NIST Special Publication 800-18, December 1998. http://csrc.nist.gov/publications/nistpubs/800-18/Planguide.PDF
    • (1998) NIST Special Publication 800-18
  • 22
    • 85179264829 scopus 로고    scopus 로고
    • Security Self-Assessment Guide for Information Technology Systems, NIST Special Publication 800-26, November 2001. http://csrc.nist.gov/publications/nistpubs/800-26/sp800-26.pdf
    • (2001) NIST Special Publication 800-26
  • 23
    • 85179242032 scopus 로고    scopus 로고
    • Guide for the Security Certification and Accreditation of Federal Information Systems, NIST Special Publication 800-37, May 2004. http://csrc.nist.gov/publications/nistpubs/800-37/SP800-37-final.pdf
    • (2004) NIST Special Publication 800-37
  • 25
    • 85179248506 scopus 로고    scopus 로고
    • The NIST Security Configuration Checklists Program, NIST Special Publication 800-70, August 12, 2004. http://csrc.nist.gov/checklists/index.html
    • (2004) NIST Special Publication 800-70
  • 26
    • 85179236958 scopus 로고    scopus 로고
    • Guide for Developing Security Plans for Information Technology Systems, NIST Special Publication 800-18, December 1998. http://csrc.nist.gov/publications/nistpubs/800-18/Planguide.PDF
    • (1998) NIST Special Publication 800-18
  • 28
    • 85179289860 scopus 로고
    • Guide for Selecting Automated Risk Analysis Tools, NIST Special Publication 500-174, October 1989. http://csrc.nist.gov/publications/nistpubs/500-174/sp174.txt
    • (1989) NIST Special Publication , pp. 174-500
  • 30
    • 85179296626 scopus 로고    scopus 로고
    • General Support Systems and Major Applications Inventory Guide, NIST Publications, July 2002. http://csrc.nist.gov/fasp/FASPDocs/risk-mgmt/GSSMAInventory-Guide.doc
    • (2002) NIST Publications
  • 31
    • 85179272383 scopus 로고    scopus 로고
    • Guide for Mapping Types of Information and Information Systems to security categories, NIST special Publications 800-60, June 2004.
    • (2004) NIST Special Publications 800-60
  • 39
    • 85179245262 scopus 로고    scopus 로고
    • A Guide to Interview Guides
    • Digital Advisor for Research Projects
    • Kennedy, Mary, ‘‘A Guide to Interview Guides,’’ Teacher Education Doctoral Students, Digital Advisor for Research Projects. http://ed-web3/educ.msu.edu/digiatladvisor/ResearchFiles/InterviewGuide.htm
    • Teacher Education Doctoral Students
    • Kennedy, M.1
  • 44
    • 85179285841 scopus 로고    scopus 로고
    • Art, IT Needs to do better at planning for the worst
    • Pfenning, Art, IT Needs to do better at planning for the worst, InternetWeek, October 8, 2001.
    • (2001) Internetweek
  • 46
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the Stack for Fun and Profit
    • Aleph One, Smashing the Stack for Fun and Profit, Phrack Magazine, issue 49, article 14, November 8, 1996.
    • (1996) Phrack Magazine , Issue.49
  • 47
    • 85179209507 scopus 로고
    • National Industrial Security Program Operating Manual (NISPOM), DoD 5220.22-M, January 1995. http://www.dss.mil/isec/nispom_0195.htm
    • (1995)
  • 49
    • 24944551836 scopus 로고    scopus 로고
    • NIST Special Publication 800-53, Final Draft, January
    • National Institute of Standards and Technology, Recommended Security Controls for Federal Information Systems, NIST Special Publication 800-53, Final Draft, January 2005. http://csrc.nist.gov/publications/drafts/SP-800-53-FinalDraft.pdf
    • (2005) Recommended Security Controls for Federal Information Systems
  • 54
    • 85179295604 scopus 로고    scopus 로고
    • If you fail to prepare, be prepared to fail
    • Hills, Roy, ‘‘If you fail to prepare, be prepared to fail’’, SC Magazine, November 2004, p. 48.
    • (2004) SC Magazine , pp. 48
    • Hills, R.1
  • 56
    • 85179284307 scopus 로고    scopus 로고
    • August
    • Common Criteria Evaluation Methodology, Version 1.0, CEM-99/045, August 1999.
    • (1999) Version 1.0, CEM-99/045
  • 57
    • 85179255003 scopus 로고    scopus 로고
    • Finding Holes in Your PBX Before Someone Else Does
    • August
    • PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does, NIST Special Publication 800-24, August 2000. http://csrc.nist.gov/publications/nistpubs/800-24/sp800-24pbx.pdf
    • (2000) NIST Special Publication , pp. 800-824
  • 58
    • 85179200537 scopus 로고    scopus 로고
    • NIST Special Publication 800-27
    • Engineering Principles for Information Technology Security (A Baseline for Achieving Security), NIST Special Publication 800-27, June 2001. http://csrc.nist.gov/publications/nistpubs/800-27A/SP800-27-RevA.pdf
    • (2001) A Baseline for Achieving Security
  • 59
    • 85179299144 scopus 로고    scopus 로고
    • NIST Special Publication 800-70
    • The NIST Security Configuration Checklists Program, NIST Special Publication 800-70, August 12, 2004. http://csrc.nist.gov/checklists/index.html
    • (2004) Security Configuration Checklists Program , pp. 12
  • 60
    • 85179262532 scopus 로고    scopus 로고
    • Wright State University, College of Engineering and Computer Science, Dayton, OH
    • Mateti, Prabhaker, Port Scanning Lecture. Wright State University, College of Engineering and Computer Science, Dayton, OH. www.cs.wright.edu/_pmateti/InternetSecurity/Lectures/Probing
    • Port Scanning Lecture
    • Mateti, P.1
  • 68
    • 85129190759 scopus 로고    scopus 로고
    • Glossary of Security Terms, ASIS International. www.asisonline.org/library/glossary/index.xml
    • Glossary of Security Terms
  • 71
    • 85179271769 scopus 로고    scopus 로고
    • Conversion Guide for Heating, Ventilation
    • Shore Facilities Ozone-Depleting Substances (ODS) Conversion Guide for Heating, Ventilation, Air-Conditioning and Refrigeration (HVAC&R) and Fire Protection Systems, January 2002. http://enviro.nfesc.navy.mil/ps/FacilityODSCOnv/halon.htm
    • (2002) Air-Conditioning and Refrigeration (HVAC&R) and Fire Protection Systems
  • 72
    • 85179293436 scopus 로고    scopus 로고
    • National Fire Alarm Code
    • National Fire Alarm Code, NFPA 72(02), National Fire Protection Association, 2002.
    • (2002) NFPA , vol.72 , Issue.2
  • 73
  • 74
    • 79957937978 scopus 로고    scopus 로고
    • Early Detection, Data Center Journal, June 14, 2004.
    • (2004) Early Detection
  • 75
    • 85179257717 scopus 로고    scopus 로고
    • Non-residential structure fires in 2000
    • U.S. Fire Administration/National Fire Data Center, Non-residential structure fires in 2000, Topical Fire Research Series, Vol. 3, issue 10, June 2004. www.usfa.fema.gov
    • (2004) Topical Fire Research Series , vol.3 , Issue.10
  • 76
    • 85179274282 scopus 로고    scopus 로고
    • Fire Protection Design Criteria
    • July
    • Fire Protection Design Criteria, DOE Standard, DoE-STD-1066-99, U.S. Department of Energy, Washington, DC 20585, July 1999.
    • (1999) DOE Standard, Doe-Std-1066-99
  • 77
    • 85179257413 scopus 로고
    • National Industrial Security Program Operating Manual (NISPOM), DoD 5220.22-M, January 1995. http://www.dss.mil/isec/nispom_0195.htm
    • (1995)
  • 81
    • 85179205792 scopus 로고    scopus 로고
    • Approach to Risk: Position Paper on the Approach to Risk, Methodologies Dealing with This and the Technical and Community Information Required for Implementation
    • Approach to Risk: Position Paper on the Approach to Risk, Methodologies Dealing with This and the Technical and Community Information Required for Implementation, Environmental Risk Management Authority, New Zealand, December 2002, ER-OP-03-02 12/02.
    • (2002) Environmental Risk Management Authority
  • 82
    • 85179287208 scopus 로고    scopus 로고
    • Preparing Information on Risks, Costs and Benefits for Applications Under the Hazardous Substances and New Organisms Act 1996
    • Preparing Information on Risks, Costs and Benefits for Applications Under the Hazardous Substances and New Organisms Act 1996, Environmental Risk Management Authority, New Zealand, July 2000, ISBN 0-478-21507-1, ERTG-03-01 07/00.
    • (2000) Environmental Risk Management Authority
  • 84
    • 85179242744 scopus 로고
    • Guidelines for Automatic Data Processing Physical Security and Risk Management
    • Guidelines for Automatic Data Processing Physical Security and Risk Management, Federal Information Processing Standards Publication 31 (FIPS Pub. 31), National Bureau of Standards, June 1974.
    • (1974) Federal Information Processing Standards Publication , vol.31
  • 87
    • 85179278611 scopus 로고    scopus 로고
    • Information Security Risk Assessment: Practices of Leading Organizations, A Supplement to GAO’s May 1998 Executive Guide on Information Security Management
    • Information Security Risk Assessment: Practices of Leading Organizations, A Supplement to GAO’s May 1998 Executive Guide on Information Security Management. United States General Accounting Office, Accounting and Information Management Division, November 1999. GAO/AMID-00-33. http://www.gao.gov/special.pubs/ai00033.pdf
    • (1999) United States General Accounting Office
  • 89
    • 85179285026 scopus 로고    scopus 로고
    • Generally Accepted Information Security Principles
    • ‘‘Generally Accepted Information Security Principles’’ GAISP v3.0, Information Systems Security Association. http://www.issa.org/gaisp/_pdfs/v30.pdf
    • GAISP V3.0
  • 93
    • 85179253990 scopus 로고    scopus 로고
    • Benefits of IT Certifications
    • March
    • Landoll, Douglas J. ‘‘Benefits of IT Certifications’’ Certification Magazine, March 2004.
    • (2004) Certification Magazine
    • Landoll, D.J.1
  • 94
    • 42649104807 scopus 로고    scopus 로고
    • Selecting the Risk Assessment Method of Choice
    • Passori, AI, ‘‘Selecting the Risk Assessment Method of Choice,’’ META Group, July 21, 2004. http://searchcio.techtarget.com/originalContent/0,289142,sid19_gci994851,00.html
    • (2004) META Group
    • Passori, A.I.1
  • 97
    • 85179220620 scopus 로고    scopus 로고
    • Decision Making: A Technical Guide to Identifying, Assessing and Evaluating Risks, Costs and Benefits
    • Decision Making: A Technical Guide to Identifying, Assessing and Evaluating Risks, Costs and Benefits. Environmental Risk Management Authority, New Zealand, ER-TG-05-1 03/04, March 2004, ISBN 0-478-21523-1.
    • (2004) Environmental Risk Management Authority
  • 99
    • 84887421143 scopus 로고    scopus 로고
    • INFOSEC Assessment Methodology, ‘‘National Security Agency.’’ http://www.iatrp.com/iam.cfm
    • National Security Agency
  • 103
    • 85179242744 scopus 로고
    • Guidelines for Automatic Data Processing Physical Security and Risk Management
    • June
    • Guidelines for Automatic Data Processing Physical Security and Risk Management, Federal Information Processing Standards Publication 31 (FIPS Pub. 31), National Bureau of Standards, June 1974.
    • (1974) Federal Information Processing Standards Publication , vol.31
  • 105
    • 85179220603 scopus 로고    scopus 로고
    • ‘‘Acquisition Management Policy,’’ Federal Aviation Administration, February 2005. http://fast.faa.gov
    • (2005) Acquisition Management Policy


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.