Branch topics LASER World of PHOTONICS World of Photonics Congress LASER World of PHOTONICS CHINA LASER World of PHOTONICS INDIA
Search in...
full text search
 only Highlights
from - to
Search by topics
Search by conferences
Password forgotten? 
Register now!
i All about

Mercateo - der Megahändler für Geschäftskunden im Internet

print page recommend page  |   Deutsch
Computer Guide May Boost Security Testing Efficiency

Providing strong security for complex federal information systems is a challenging job. But now there’s a new version of a draft guide* for assessing the effectiveness of security of controls in federal information systems from the National Institute of Standards and Technology (NIST) that aims to make the job easier. The content of the new guide is expected to be incorporated into automated tools that support the information security programs of federal agencies.
The 387-page guide is designed to help information system owners and security managers ensure that appropriate computer security controls work as intended to protect information systems from being improperly accessed or compromised. NIST will accept comments on the draft document through July 31, 2007. Comments should be emailed to or mailed to NIST at 100 Bureau Dr., M.S. 8930, Gaithersburg, Md. 20899-8930.
The guide is a companion document to NIST Special Publication 800-53, Minimum Security Controls for Federal Information Systems, which spells out the types of security controls such as user authentication, spam protection, cryptography and transmission confidentiality that must be used to protect federal information systems. The Federal Information Security Management Act (FISMA) of 2002 instructs NIST to prepare minimum computer security requirements for all federal information systems other than national security systems.
“The assessment requirements presented in this latest draft are intended to make compliance with FISMA easier, more efficient and ultimately to produce better computer and information security for the federal government,” noted NIST’s FISMA Implementation Project Leader Ron Ross.
Key changes to the document since the previous draft include:

  • assessment procedures that focus on meeting stated objectives;
  • tailoring assessments to whether a security breach would produce low, moderate or high impacts;
  • elimination of redundancies in previous procedures; and
  • new guidelines for establishing policies and procedures, identifying roles and responsibilities of security managers and assessors, conducting penetration testing, and several other areas.

The report includes a comprehensive catalog of assessment procedures matched to specific types of security controls. To download a copy, go to  (pdf 3,415 KB, 387 pages)

more articles ( 17 )  more articles ( 17 ) 
Internet Marketing Myth #7
People who don't buy from you just want something for nothing go
Xero - online accounting software
New businesses can reduce risk with web-based accounting systems go
Analytics made simple:
How to measure, rate, and improve customer acquisition & retention go
more articles ( 7 )  more articles ( 7 ) 
Stock Market - Trading Tips
Great ideas and tips for stock market beginners go
EU - CONTEXT project
A vest to measure stress go
Greyfirst - free public availability
World's first pre-production software go
more articles ( 33 )  more articles ( 33 ) 
CHD Expert Group - European Study
Lowest prices for dining in Germany go
EU-wide household survey
Internet phone calls getting popular in European homes go
Vereon - New trends and market development
Rising demand for E-Invoicing go

 News - 23.04.2014
 back    top