We have developed webpages for Special Publication 800-12. This document contains 20 chapters and each chapter has
been placed on its own web page. We tried our best to create these web pages to resemble close to
the printed layout copy of this document. We created 2 versions
- one for reviewing within your web browser, and the other is a printable
version (minus left menu bar).
PUBLICATION RELEASE DATE: OCTOBER 1995
Table
of Contents:
Part I: INTRODUCTION
and OVERVIEW
Chapter
1 - Introduction (printable copy)
Chapter
2 - Elements of Computer Security (printable copy)
Chapter
3 - Roles and Responsibilities (printable copy)
Chapter
4 - Common Threats: A Brief Overview (printable copy)
Part II: MANAGEMENT
CONTROLS
Chapter
5 - Computer Security Policy
Chapter
6 - Computer Security Program Management
Chapter
7 - Computer Security Risk Management
Chapter
8 - Security and Planning in the Computer Security Life Cycle
Chapter
9 - Assurance
Part III: OPERATIONAL
CONTROLS
Chapter
10 - Personnel / User Issues
Chapter
11 - Preparing for Contingencies and Disasters
Chapter
12 - Computer Security Incident Handling
Chapter
13 - Awareness, Training and Education
Chapter
14 - Security Considerations in Computer Support and Operations
Chapter
15 - Physical and Environmental Security
Part IV: TECHNICAL
CONTROLS
Chapter
16 - Identification and Authentication
Chapter
17 - Logical Access Control
Chapter
18 - Audit Trails
Chapter
19 - Cryptography
Part V: EXAMPLE
Chapter
20 - Assessing and Mitigating the Risks to a Hypothetical Computer
System
|