Federal Information System Controls Audit Manual (FISCAM)

Federal Information System Controls Audit Manual (FISCAM) PDF Author: Robert F. Dacey
Publisher: DIANE Publishing
ISBN: 1437914063
Category : Business & Economics
Languages : en
Pages : 601

Get Book Here

Book Description
FISCAM presents a methodology for performing info. system (IS) control audits of governmental entities in accordance with professional standards. FISCAM is designed to be used on financial and performance audits and attestation engagements. The methodology in the FISCAM incorp. the following: (1) A top-down, risk-based approach that considers materiality and significance in determining audit procedures; (2) Evaluation of entitywide controls and their effect on audit risk; (3) Evaluation of general controls and their pervasive impact on bus. process controls; (4) Evaluation of security mgmt. at all levels; (5) Control hierarchy to evaluate IS control weaknesses; (6) Groupings of control categories consistent with the nature of the risk. Illus.

Federal Information System Controls Audit Manual (FISCAM)

Federal Information System Controls Audit Manual (FISCAM) PDF Author: Robert F. Dacey
Publisher: DIANE Publishing
ISBN: 1437914063
Category : Business & Economics
Languages : en
Pages : 601

Get Book Here

Book Description
FISCAM presents a methodology for performing info. system (IS) control audits of governmental entities in accordance with professional standards. FISCAM is designed to be used on financial and performance audits and attestation engagements. The methodology in the FISCAM incorp. the following: (1) A top-down, risk-based approach that considers materiality and significance in determining audit procedures; (2) Evaluation of entitywide controls and their effect on audit risk; (3) Evaluation of general controls and their pervasive impact on bus. process controls; (4) Evaluation of security mgmt. at all levels; (5) Control hierarchy to evaluate IS control weaknesses; (6) Groupings of control categories consistent with the nature of the risk. Illus.

Computer Security Guidelines for Implementing the Privacy Act of 1974

Computer Security Guidelines for Implementing the Privacy Act of 1974 PDF Author: United States. National Bureau of Standards
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 28

Get Book Here

Book Description


Nist Special Publication 800-37 (REV 1)

Nist Special Publication 800-37 (REV 1) PDF Author: National Institute National Institute of Standards and Technology
Publisher: Createspace Independent Publishing Platform
ISBN: 9781982026271
Category :
Languages : en
Pages : 102

Get Book Here

Book Description
This publication provides guidelines for applying the Risk Management Framework (RMF) to federal information systems. The six-step RMF includes security categorization, security control selection, security control implementation, security control assessment, information system authorization, and security control monitoring.

Guide to Protecting the Confidentiality of Personally Identifiable Information

Guide to Protecting the Confidentiality of Personally Identifiable Information PDF Author: Erika McCallister
Publisher: DIANE Publishing
ISBN: 1437934889
Category : Computers
Languages : en
Pages : 59

Get Book Here

Book Description
The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few years. Breaches involving PII are hazardous to both individuals and org. Individual harms may include identity theft, embarrassment, or blackmail. Organ. harms may include a loss of public trust, legal liability, or remediation costs. To protect the confidentiality of PII, org. should use a risk-based approach. This report provides guidelines for a risk-based approach to protecting the confidentiality of PII. The recommend. here are intended primarily for U.S. Fed. gov¿t. agencies and those who conduct business on behalf of the agencies, but other org. may find portions of the publication useful.

FISMA Compliance Handbook

FISMA Compliance Handbook PDF Author: Laura P. Taylor
Publisher: Newnes
ISBN: 0124059155
Category : Computers
Languages : en
Pages : 380

Get Book Here

Book Description
This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment. Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. FISMA Compliance Handbook Second Edition, also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government's technical lead for FedRAMP, the government program used to assess and authorize cloud products and services. - Includes new information on cloud computing compliance from Laura Taylor, the federal government's technical lead for FedRAMP - Includes coverage for both corporate and government IT managers - Learn how to prepare for, perform, and document FISMA compliance projects - This book is used by various colleges and universities in information security and MBA curriculums

Principles and Practices for a Federal Statistical Agency

Principles and Practices for a Federal Statistical Agency PDF Author: National Academies of Sciences Engineering and Medicine
Publisher:
ISBN: 9780309725439
Category : Political Science
Languages : en
Pages : 0

Get Book Here

Book Description
The 8th Edition of Principles and Practices for a Federal Statistical Agency supports the essential role of relevant, credible, trusted, independent, and innovative government statistics. Since 1992, this report has described the characteristics of effective federal statistical agencies. Government statistics are widely used to inform decisions by policymakers, program administrators, businesses and other organizations, as well as households and the general public. Principles and Practices is a concise tool to communicate the unique responsibilities of federal statistical agencies. It underscores the invaluable role that relevant, timely, accurate, and trustworthy government statistics play to inform the public and policymakers. Since 2001, an updated edition is released at the beginning of each presidential term. This eighth edition retains the five principles and ten practices established in prior editions, including updated examples and extensive appendices to reflect the many and varied changes across the national statistical system that have occurred since the passage of the Foundations for Evidence-Based Policymaking Act of 2018 ("Evidence Act"), the CHIPS and Science Act, and implementing regulations.

Federal Property and Administrative Services Act of 1949, as Amended

Federal Property and Administrative Services Act of 1949, as Amended PDF Author: United States
Publisher:
ISBN:
Category : Archives
Languages : en
Pages : 90

Get Book Here

Book Description


Federal Information Processing Standards Publication

Federal Information Processing Standards Publication PDF Author:
Publisher:
ISBN:
Category : Public administration
Languages : en
Pages : 12

Get Book Here

Book Description


Report on the Development of the Advanced Encryption Standard (AES)

Report on the Development of the Advanced Encryption Standard (AES) PDF Author: James Nechvatal
Publisher:
ISBN: 9780756715984
Category :
Languages : en
Pages : 65

Get Book Here

Book Description
In 1997, NIST initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclass.) Fed. info. In 1998, NIST announced the acceptance of 15 candidate algorithms and requested the assistance of the cryptographic research community in analyzing the candidates. This analysis included an initial exam. of the security and efficiency characteristics for each algorithm. NIST reviewed the results of this research and selected MARS, RC, Rijndael, Serpent and Twofish as finalists. After further public analysis of the finalists, NIST has decided to propose Rijndael as the AES. The research results and rationale for this selection are documented here.

Catalog of National Bureau of Standards Publications, 1966-1976

Catalog of National Bureau of Standards Publications, 1966-1976 PDF Author: United States. National Bureau of Standards. Technical Information and Publications Division
Publisher:
ISBN:
Category : Government publications
Languages : en
Pages : 854

Get Book Here

Book Description