This National Institute of Standards and Technology Interagency Report (NISTIR) presents the National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook . The Handbook provides NASA's overall approach to automated information systems security including: program goals and objectives, assignment of responsibilities, risk assessment, foreign national access, contingency planning and disaster recovery, awareness training, procurement, certification, planning, and special considerations for microcomputers.
Note that Chapters seven through nine, which deal exclusively with the protection of classified information, have not been included in this publication. Such requirements are well known and are readily available in other forms.
The National Institute of Standards and Technology (NIST) makes no claim or endorsement of this Handbook. However, as this material may be of use to other organizations, the report is being reprinted by NIST to provide for broad public dissemination of this federally sponsored work. This publication is part of a continuing effort to assist federal agencies in accordance with NIST's mandate under the Computer Security Act of 1987.
This National Institute of Standards and Technology Interagency Report (NISTIR) presents the National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook . The Handbook provides NASA's overall approach to automated information systems security including: program...
See full abstract
This National Institute of Standards and Technology Interagency Report (NISTIR) presents the National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook . The Handbook provides NASA's overall approach to automated information systems security including: program goals and objectives, assignment of responsibilities, risk assessment, foreign national access, contingency planning and disaster recovery, awareness training, procurement, certification, planning, and special considerations for microcomputers.
Note that Chapters seven through nine, which deal exclusively with the protection of classified information, have not been included in this publication. Such requirements are well known and are readily available in other forms.
The National Institute of Standards and Technology (NIST) makes no claim or endorsement of this Handbook. However, as this material may be of use to other organizations, the report is being reprinted by NIST to provide for broad public dissemination of this federally sponsored work. This publication is part of a continuing effort to assist federal agencies in accordance with NIST's mandate under the Computer Security Act of 1987.
Hide full abstract