We have developed webpages for Special Publication 800-12. This document contains 20 chapters and each chapter has
been placed on its own web page. We tried our best to create these web pages to resemble the printed copy of this document. We created 2 versions
- one for reviewing within your web browser, and the other is a printable
version. Links to the printable version will be found at the top of each chapter's webpage.
PUBLICATION RELEASE DATE: OCTOBER 1995
Table
of Contents:
Part I: INTRODUCTION
and OVERVIEW
Chapter
1 - Introduction
Chapter
2 - Elements of Computer Security
Chapter
3 - Roles and Responsibilities
Chapter
4 - Common Threats: A Brief Overview
Part II: MANAGEMENT
CONTROLS
Chapter
5 - Computer Security Policy
Chapter
6 - Computer Security Program Management
Chapter
7 - Computer Security Risk Management
Chapter
8 - Security and Planning in the Computer Security Life Cycle
Chapter
9 - Assurance
Part III: OPERATIONAL
CONTROLS
Chapter
10 - Personnel / User Issues
Chapter
11 - Preparing for Contingencies and Disasters
Chapter
12 - Computer Security Incident Handling
Chapter
13 - Awareness, Training and Education
Chapter
14 - Security Considerations in Computer Support and Operations
Chapter
15 - Physical and Environmental Security
Part IV: TECHNICAL
CONTROLS
Chapter
16 - Identification and Authentication
Chapter
17 - Logical Access Control
Chapter
18 - Audit Trails
Chapter
19 - Cryptography
Part V: EXAMPLE
Chapter
20 - Assessing and Mitigating the Risks to a Hypothetical Computer
System
|