没有合适的资源?快使用搜索试试~ 我知道了~
NIST.SP.800-12r1.pdf
需积分: 12 2 下载量 32 浏览量
2020-12-29
14:39:45
上传
评论
收藏 1.28MB PDF 举报
温馨提示
试读
101页
An Introduction to Information Security
资源推荐
资源详情
资源评论
NIST Special Publication 800-12
Revision 1
An Introduction to Information Security
Michael Nieles
Kelley Dempsey
Victoria Yan Pillitteri
This publication is available free of charge from:
https://doi.org/10.6028/NIST.SP.800-12r1
C O M P U T E R S E C U R I T Y
NIST Special Publication 800-12
Revision 1
An Introduction to Information Security
Michael Nieles
Kelley Dempsey
Victoria Yan Pillitteri
Computer Security Division
Information Technology Laboratory
This publication is available free of charge from:
https://doi.org/10.6028/NIST.SP.800-12r1
June 2017
U.S. Department of Commerce
Wilbur L. Ross, Jr., Secretary
National Institute of Standards and Technology
Kent Rochford, Acting NIST Director and Under Secretary of Commerce for Standards and Technology
Authority
This publication has been developed by NIST in accordance with its statutory responsibilities under the
Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law
(P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including
minimum requirements for federal systems, but such standards and guidelines shall not apply to national
security systems without the express approval of appropriate federal officials exercising policy authority
over such systems. This guideline is consistent with the requirements of the Office of Management and
Budget (OMB) Circular A-130.
Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and
binding on federal agencies by the Secretary of Commerce under statutory authority. Nor should these
guidelines be interpreted as altering or superseding the existing authorities of the Secretary of Commerce,
Director of the OMB, or any other federal official. This publication may be used by nongovernmental
organizations on a voluntary basis and is not subject to copyright in the United States. Attribution would,
however, be appreciated by NIST.
National Institute of Standards and Technology Special Publication 800-12 Revision 1
Natl. Inst. Stand. Technol. Spec. Publ. 800-12 Rev. 1, 101 pages (June 2017)
CODEN: NSPUE2
This publication is available free of charge from:
https://doi.org/10.6028/NIST.SP.800-12r1
Certain commercial entities, equipment, or materials may be identified in this document in order to describe an
experimental procedure or concept adequately. Such identification is not intended to imply recommendation or
endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best
available for the purpose.
There may be references in this publication to other publications currently under development by NIST in accordance
with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies,
may be used by federal agencies even before the completion of such companion publications. Thus, until each
publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For
planning and transition purposes, federal agencies may wish to closely follow the development of these new
publications by NIST.
Organizations are encouraged to review all draft publications during public comment periods and provide feedback to
NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at
http://csrc.nist.gov/publications.
Comments on this publication may be submitted to:
National Institute of Standards and Technology
Attn: Computer Security Division, Information Technology Laboratory
100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899-8930
Email: sec-cert@nist.gov
All comments are subject to release under the Freedom of Information Act (FOIA).
NIST SP 800-12 REV. 1 AN INTRODUCTION TO INFORMATION SECURITY
ii
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-12r1
Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the National Institute of Standards and
Technology (NIST) promotes the U.S. economy and public welfare by providing technical
leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test
methods, reference data, proof of concept implementations, and technical analyses to advance the
development and productive use of information technology. ITL’s responsibilities include the
development of management, administrative, technical, and physical standards and guidelines for
the cost-effective security and privacy of other than national security-related information in federal
systems. The Special Publication 800-series reports on ITL’s research, guidelines, and outreach
efforts in systems security as well as its collaborative activities with industry, government, and
academic organizations.
Abstract
Organizations rely heavily on the use of information technology (IT) products and services to run
their day-to-day activities. Ensuring the security of these products and services is of the utmost
importance for the success of the organization. This publication introduces the information
security principles that organizations may leverage to understand the information security needs
of their respective systems.
Keywords
assurance; computer security; information security; introduction; risk management; security
controls; security requirements
NIST SP 800-12 REV. 1 AN INTRODUCTION TO INFORMATION SECURITY
iii
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-12r1
Acknowledgements
The authors would like to thank everyone who took the time to review and make comments on
the draft of this publication, specifically Celia Paulsen, Ned Goren, Isabel Van Wyk, and Rathini
Vijayaverl of the National Institute of Standards and Technology (NIST). The authors would also
like to acknowledge the original authors, Barbara Guttman and Edward A. Roback, as well as all
those individuals who contributed to the original version of this publication.
剩余100页未读,继续阅读
资源评论
haohao
- 粉丝: 5
- 资源: 38
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- # 微信小程序-健康菜谱 基于微信小程序的一个查找检索菜谱的应用 ### 效果 !动态图(./res/gif/demo
- zabbix-get命令包资源
- 毕业设计,基于PyQt5实现的可视化界面的Python车牌自动识别系统源码
- 26-朴素贝叶斯分类.rar
- 没有安Matlab 也可以 生成FIR抽头系数工具.py
- python烟花代码.rar
- 实验目的: 1.构建基于verilog语言的组合逻辑电路和时序逻辑电路; 2.掌握verilog语言的电路设计技巧 3.完成如
- 扩展卡尔曼滤波matlab仿真
- 3_base.apk.1
- 躺赢者PRO飞控常见典型问题合集(续一)无名小哥 余义 20240501待修
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功