Front | Back |
SP 800-12
|
Computer Security Handbook
|
SP 800-14
|
Generally Accepted Security Principles and Practices
|
SP 800-18
|
Guide for Developing Security Plans
|
SP 800-30
|
Risk Management for Information Technology Systems
|
Security Framework:
|
Outline of the more thorough blueprint,
which is the basis for the design, selection, and implementation of all subsequent security controls |
Security blueprint
|
Describing existing controls and identifying other necessary security controls
|
Data Classification Model private
|
–Public
–For official –Sensitive –Classified |
Data Classification Model U.S. military
|
–Unclassified data
–Sensitive but unclassified (SBU) data –Confidential data –Secret data –Top Secret data |
Vulnerabilities
|
are specific avenues that threat agents can
exploit to attack an information asset |