Security Assessment

  • ID: 1763196
  • January 2004
  • 448 Pages
  • Elsevier Science and Technology
1 of 4

The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines.

This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc).

The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement.

Everything You Need to Know to Conduct a Security Audit of Your Organization
Step-by-Step Instructions for Implementing the National Security Agency's Guidelines
Special Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more

Note: Product cover images may vary from those shown
2 of 4

Laying the foundation for your assessment
The pre-assessment visit
Determining the organization's information criticality
system information criticality
The system security environment
Understanding the technical assessment plan
Customer activities
Managing the findings
Leaving no surprises
Final reporting
Tying up loose ends

Note: Product cover images may vary from those shown
3 of 4


Note: Product cover images may vary from those shown
4 of 4
Note: Product cover images may vary from those shown


  • Quick Help: The book will be shipped to you. The cover has a paper back.


If you have a more general question about our products please try our



Our Clients

  • Visonic Group
  • Symantec Corporation
  • Raytheon Company
  • EMC Corporation
  • Nagra Kudelski Group
  • Cisco Systems, Inc.