Toth, 2017 - Google Patents
Self-Assessment Handbook For Assessing NIST SP 800-171 Security Requirements in Response to DFARS Cybersecurity RequirementsToth, 2017
View PDF- Document ID
- 12414560088869893754
- Author
- Toth P
- Publication year
External Links
Snippet
The Handbook is intended to be a guide to assist US manufacturers who supply products within supply chains for the DOD and who must ensure adequate security by implementing NIST SP 800-171 as part of the process for ensuring compliance with DFARS clause …
- 230000004044 response 0 title description 23
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ross et al. | Protecting controlled unclassified information in nonfederal systems and organizations | |
| Nieles et al. | An introduction to information security | |
| Kouns et al. | Information technology risk management in enterprise environments: A review of industry practices and a practical guide to risk management teams | |
| US20050132225A1 (en) | Method and system for cyber-security vulnerability detection and compliance measurement (CDCM) | |
| Ross et al. | Protecting controlled unclassified information in nonfederal information systems and organizations | |
| Ross et al. | Assessing enhanced security requirements for controlled unclassified information | |
| Subramaniyan et al. | Information security and privacy in e-HRM | |
| Beissel | Cybersecurity investments: Decision support under economic aspects | |
| Toth et al. | NIST MEP cybersecurity self-assessment handbook for assessing NIST SP 800-171 security requirements in response to DFARS cybersecurity requirements | |
| Kizza | Security assessment, analysis, and assurance | |
| Gamble | The Cybersecurity Maturity Model Certification (CMMC)–A pocket guide | |
| Tarimo | ICT security readiness checklist for developing countries: A social-technical approach | |
| Toth | Self-Assessment Handbook For Assessing NIST SP 800-171 Security Requirements in Response to DFARS Cybersecurity Requirements | |
| Ross et al. | Assessing security requirements for controlled unclassified information | |
| Unterwandling | Optimization of IT security in healthcare facilities | |
| Kaestner et al. | The cybersecurity challenge in acquisition | |
| Gandini | Development of Incident Response Playbooks and Runbooks for Amazon Web Services Ransomware Scenarios | |
| بدران et al. | Proposed Of Cybersecurity Framework for Reducing The Security Risks on The Egyptian Petroleum Sector | |
| Udayakumar | Design and Deploy a Respond Solution | |
| Board | Criminal Justice Information Services (CJIS) Security Policy | |
| Kane et al. | Information protection playbook | |
| Miller | Security Assessment of Cloud-Based Healthcare Applications | |
| Chopra et al. | Execution | |
| Möller | Network and Information Security (NIS2) | |
| Pourzolfaghar et al. | Adapted Cybersecurity Risk Analysis, Assessment, and Mitigation Framework for Smart Buildings |