FISMA and the Risk Management Framework 2013
DOI: 10.1016/b978-1-59-749641-4.00002-3
|View full text |Cite
|
Sign up to set email alerts
|

Federal Information Security Fundamentals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 3 publications
(3 reference statements)
0
3
0
Order By: Relevance
“…The appropriate monitoring frequency varies across VTS centers and is determined by various criteria. For example, the higher-risk section necessitates more frequent monitoring [ 32 ].…”
Section: Proposed Optimal Vts Operators Staffing Methodsmentioning
confidence: 99%
“…The appropriate monitoring frequency varies across VTS centers and is determined by various criteria. For example, the higher-risk section necessitates more frequent monitoring [ 32 ].…”
Section: Proposed Optimal Vts Operators Staffing Methodsmentioning
confidence: 99%
“…Hence, the military tradition of information classification has led to a focus on the confidentiality aspect. Consequently, confidentiality has been prioritised over integrity and availability when it comes to information classification (Gantz and Philpott, 2013). Moreover, information classification stems from a practice where paper files were classified manually by few users, compared to today's situation where most information is digitalised and it all needs to be classified (Bunker, 2012).…”
Section: Information Classification Methods 209mentioning
confidence: 99%
“…Hence, this type of organizations may fail to put forensics tools in place against unknown attacks. It is important that they are able to study those attacks which could help them forestall feature occurrence and possibly identify source of attacks whether internal to the organization or external [7]. ARP cache spoofing is the commonest attack that can be launched from within a network and could have a very high destruction profile to an organization.…”
Section: Introductionmentioning
confidence: 99%