ISBN 9781731203199 is currently unpriced. Please contact us for pricing.
Available options are listed below:
Available options are listed below:
Nist 800-137: An Introduction to Information Security Continuous Monitoring (ISCM)
| AUTHOR | Russo Cissp-Issap Ciso, Mark a. |
| PUBLISHER | Independently Published (11/12/2018) |
| PRODUCT TYPE | Paperback (Paperback) |
Description
THE "HOLY GRAIL" OF CYBERSECURITY IS "CONTINUOUS MONITORING"This book is written as a beginner's guide to the challenges and solutions of CCM as proscribed by the National Institute of Standards and Technology (NIST). CCM is to be that final step in the Risk Management Framework (RMF) process. Once you have completed all the five preceding steps, you will enter Step, Continuous Monitoring. Some of this can be done manually, but the objective is to automate the process to alert System Owner's of critical changes in the architecture that afford vulnerabilities and avenues of approach for threats; threats that may include Insider Threats and nation-state actors such as Russia, China, and Iran. CCM is on the horizon, yet we are years from attaining true CCM as described in this book.
Show More
Product Format
Product Details
ISBN-13:
9781731203199
ISBN-10:
1731203195
Binding:
Paperback or Softback (Trade Paperback (Us))
Content Language:
English
More Product Details
Page Count:
48
Carton Quantity:
170
Product Dimensions:
5.00 x 0.10 x 8.00 inches
Weight:
0.13 pound(s)
Country of Origin:
US
Subject Information
BISAC Categories
Computers | Information Technology
Descriptions, Reviews, Etc.
publisher marketing
THE "HOLY GRAIL" OF CYBERSECURITY IS "CONTINUOUS MONITORING"This book is written as a beginner's guide to the challenges and solutions of CCM as proscribed by the National Institute of Standards and Technology (NIST). CCM is to be that final step in the Risk Management Framework (RMF) process. Once you have completed all the five preceding steps, you will enter Step, Continuous Monitoring. Some of this can be done manually, but the objective is to automate the process to alert System Owner's of critical changes in the architecture that afford vulnerabilities and avenues of approach for threats; threats that may include Insider Threats and nation-state actors such as Russia, China, and Iran. CCM is on the horizon, yet we are years from attaining true CCM as described in this book.
Show More
