Nist Special Publication 800-37 (REV 1)

Nist Special Publication 800-37 (REV 1)
Author: National Institute National Institute of Standards and Technology
Publisher: Createspace Independent Publishing Platform
Total Pages: 102
Release: 2018-06-19
Genre:
ISBN: 9781982026271

This publication provides guidelines for applying the Risk Management Framework (RMF) to federal information systems. The six-step RMF includes security categorization, security control selection, security control implementation, security control assessment, information system authorization, and security control monitoring.

Guide to Protecting the Confidentiality of Personally Identifiable Information

Guide to Protecting the Confidentiality of Personally Identifiable Information
Author: Erika McCallister
Publisher: DIANE Publishing
Total Pages: 59
Release: 2010-09
Genre: Computers
ISBN: 1437934889

The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few years. Breaches involving PII are hazardous to both individuals and org. Individual harms may include identity theft, embarrassment, or blackmail. Organ. harms may include a loss of public trust, legal liability, or remediation costs. To protect the confidentiality of PII, org. should use a risk-based approach. This report provides guidelines for a risk-based approach to protecting the confidentiality of PII. The recommend. here are intended primarily for U.S. Fed. gov¿t. agencies and those who conduct business on behalf of the agencies, but other org. may find portions of the publication useful.

Strengthening Post-Hurricane Supply Chain Resilience

Strengthening Post-Hurricane Supply Chain Resilience
Author: National Academies of Sciences, Engineering, and Medicine
Publisher: National Academies Press
Total Pages: 137
Release: 2020-04-02
Genre: Social Science
ISBN: 0309494583

Resilient supply chains are crucial to maintaining the consistent delivery of goods and services to the American people. The modern economy has made supply chains more interconnected than ever, while also expanding both their range and fragility. In the third quarter of 2017, Hurricanes Harvey, Irma and Maria revealed some significant vulnerabilities in the national and regional supply chains of Texas, Florida, the U.S. Virgin Islands, and Puerto Rico. The broad impacts and quick succession of these three hurricanes also shed light on the effectiveness of the nation's disaster logistics efforts during response through recovery. Drawing on lessons learned during the 2017 hurricanes, this report explores future strategies to improve supply chain management in disaster situations. This report makes recommendations to strengthen the roles of continuity planning, partnerships between civic leaders with small businesses, and infrastructure investment to ensure that essential supply chains will remain operational in the next major disaster. Focusing on the supply chains food, fuel, water, pharmaceutical, and medical supplies, the recommendations of this report will assist the Federal Emergency Management Agency as well as state and local officials, private sector decision makers, civic leaders, and others who can help ensure that supply chains remain robust and resilient in the face of natural disasters.

Supply Chain Risk Management

Supply Chain Risk Management
Author: Ken Sigler
Publisher: CRC Press
Total Pages: 329
Release: 2017-11-07
Genre: Business & Economics
ISBN: 131527955X

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.

Supply Chain Risk

Supply Chain Risk
Author: George A. Zsidisin
Publisher: Springer Science & Business Media
Total Pages: 351
Release: 2008-09-08
Genre: Business & Economics
ISBN: 0387799346

Risk is of fundamental importance in this era of the global economy. Supply chains must into account the uncertainty of demand. Moreover, the risk of uncertain demand can cut two ways: (1) there is the risk that unexpected demand will not be met on time, and the reverse problem (2) the risk that demand is over estimated and excessive inventory costs are incurred. There are other risks in unreliable vendors, delayed shipments, natural disasters, etc. In short, there are a host of strategic, tactical and operational risks to business supply chains. Supply Chain Risk: A Handbook of Assessment, Management, and Performance will focus on how to assess, evaluate, and control these various risks.

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity
Author:
Publisher:
Total Pages: 48
Release: 2018
Genre: Computer networks
ISBN:

The Framework focuses on using business drivers to guide cybersecurity activities and considering cybersecurity risks as part of the organization’s risk management processes. The Framework consists of three parts: the Framework Core, the Implementation Tiers, and the Framework Profiles. The Framework Core is a set of cybersecurity activities, outcomes, and informative references that are common across sectors and critical infrastructure. Elements of the Core provide detailed guidance for developing individual organizational Profiles. Through use of Profiles, the Framework will help an organization to align and prioritize its cybersecurity activities with its business/mission requirements, risk tolerances, and resources. The Tiers provide a mechanism for organizations to view and understand the characteristics of their approach to managing cybersecurity risk, which will help in prioritizing and achieving cybersecurity objectives.

Federal Information System Controls Audit Manual (FISCAM)

Federal Information System Controls Audit Manual (FISCAM)
Author: Robert F. Dacey
Publisher: DIANE Publishing
Total Pages: 601
Release: 2010-11
Genre: Business & Economics
ISBN: 1437914063

FISCAM presents a methodology for performing info. system (IS) control audits of governmental entities in accordance with professional standards. FISCAM is designed to be used on financial and performance audits and attestation engagements. The methodology in the FISCAM incorp. the following: (1) A top-down, risk-based approach that considers materiality and significance in determining audit procedures; (2) Evaluation of entitywide controls and their effect on audit risk; (3) Evaluation of general controls and their pervasive impact on bus. process controls; (4) Evaluation of security mgmt. at all levels; (5) Control hierarchy to evaluate IS control weaknesses; (6) Groupings of control categories consistent with the nature of the risk. Illus.

Management Information Systems

Management Information Systems
Author: Kenneth C. Laudon
Publisher: Pearson Educación
Total Pages: 618
Release: 2004
Genre: Business & Economics
ISBN: 9789702605287

Management Information Systems provides comprehensive and integrative coverage of essential new technologies, information system applications, and their impact on business models and managerial decision-making in an exciting and interactive manner. The twelfth edition focuses on the major changes that have been made in information technology over the past two years, and includes new opening, closing, and Interactive Session cases.

Surviving Supply Chain Integration

Surviving Supply Chain Integration
Author: National Research Council
Publisher: National Academies Press
Total Pages: 162
Release: 2000-03-23
Genre: Technology & Engineering
ISBN: 0309173418

The managed flow of goods and information from raw material to final sale also known as a "supply chain" affects everythingâ€"from the U.S. gross domestic product to where you can buy your jeans. The nature of a company's supply chain has a significant effect on its success or failureâ€"as in the success of Dell Computer's make-to-order system and the failure of General Motor's vertical integration during the 1998 United Auto Workers strike. Supply Chain Integration looks at this crucial component of business at a time when product design, manufacture, and delivery are changing radically and globally. This book explores the benefits of continuously improving the relationship between the firm, its suppliers, and its customers to ensure the highest added value. This book identifies the state-of-the-art developments that contribute to the success of vertical tiers of suppliers and relates these developments to the capabilities that small and medium-sized manufacturers must have to be viable participants in this system. Strategies for attaining these capabilities through manufacturing extension centers and other technical assistance providers at the national, state, and local level are suggested. This book identifies action steps for small and medium-sized manufacturersâ€"the "seed corn" of business start-up and developmentâ€"to improve supply chain management. The book examines supply chain models from consultant firms, universities, manufacturers, and associations. Topics include the roles of suppliers and other supply chain participants, the rise of outsourcing, the importance of information management, the natural tension between buyer and seller, sources of assistance to small and medium-sized firms, and a host of other issues. Supply Chain Integration will be of interest to industry policymakers, economists, researchers, business leaders, and forward-thinking executives.

Guide to Computer Security Log Management

Guide to Computer Security Log Management
Author: Karen Kent
Publisher:
Total Pages: 72
Release: 2007-08-01
Genre:
ISBN: 9781422312919

A log is a record of the events occurring within an org¿s. systems & networks. Many logs within an org. contain records related to computer security (CS). These CS logs are generated by many sources, incl. CS software, such as antivirus software, firewalls, & intrusion detection & prevention systems; operating systems on servers, workstations, & networking equip.; & applications. The no., vol., & variety of CS logs have increased greatly, which has created the need for CS log mgmt. -- the process for generating, transmitting, storing, analyzing, & disposing of CS data. This report assists org¿s. in understanding the need for sound CS log mgmt. It provides practical, real-world guidance on developing, implementing, & maintaining effective log mgmt. practices. Illus.