This National Institute of Standards and Technology Interagency Report (NISTIR) presents a risk assessment methodology developed by the U.S. Department of Energy. This NISTIR contains Volume I: DOE Risk Assessment Guideline Instructions. Resource Table, and Completed Sample and Volume II: DOE Risk Assessment Worksheets . The glossary and bibliography which are referenced in the text follow Volume II. Although there are references to a diskette in the text, no diskette has been reproduced for distribution with this NISTIR.
The National Institute of Standards and Technology (NIST) makes no claim or endorsement of this methodology. However, as this material may be of use to other organizations, the report is being reprinted by NIST to make it publicly available and to provide for broad dissemination of this federally sponsored work. This publication is part of a continuing NIST effort to assist federal agencies in accordance with NIST’s mandate under the Computer Security Act of 1987.
This National Institute of Standards and Technology Interagency Report (NISTIR) presents a risk assessment methodology developed by the U.S. Department of Energy. This NISTIR contains Volume I: DOE Risk Assessment Guideline Instructions. Resource Table, and Completed Sample and Volume II: DOE Risk...
See full abstract
This National Institute of Standards and Technology Interagency Report (NISTIR) presents a risk assessment methodology developed by the U.S. Department of Energy. This NISTIR contains Volume I: DOE Risk Assessment Guideline Instructions. Resource Table, and Completed Sample and Volume II: DOE Risk Assessment Worksheets . The glossary and bibliography which are referenced in the text follow Volume II. Although there are references to a diskette in the text, no diskette has been reproduced for distribution with this NISTIR.
The National Institute of Standards and Technology (NIST) makes no claim or endorsement of this methodology. However, as this material may be of use to other organizations, the report is being reprinted by NIST to make it publicly available and to provide for broad dissemination of this federally sponsored work. This publication is part of a continuing NIST effort to assist federal agencies in accordance with NIST’s mandate under the Computer Security Act of 1987.
Hide full abstract