[go: up one dir, main page]

Toth, 2017 - Google Patents

Self-Assessment Handbook For Assessing NIST SP 800-171 Security Requirements in Response to DFARS Cybersecurity Requirements

Toth, 2017

View PDF
Document ID
12414560088869893754
Author
Toth P
Publication year

External Links

Snippet

The Handbook is intended to be a guide to assist US manufacturers who supply products within supply chains for the DOD and who must ensure adequate security by implementing NIST SP 800-171 as part of the process for ensuring compliance with DFARS clause …
Continue reading at www.giaspace.com (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Ross et al. Protecting controlled unclassified information in nonfederal systems and organizations
Nieles et al. An introduction to information security
Kouns et al. Information technology risk management in enterprise environments: A review of industry practices and a practical guide to risk management teams
US20050132225A1 (en) Method and system for cyber-security vulnerability detection and compliance measurement (CDCM)
Ross et al. Protecting controlled unclassified information in nonfederal information systems and organizations
Ross et al. Assessing enhanced security requirements for controlled unclassified information
Subramaniyan et al. Information security and privacy in e-HRM
Beissel Cybersecurity investments: Decision support under economic aspects
Toth et al. NIST MEP cybersecurity self-assessment handbook for assessing NIST SP 800-171 security requirements in response to DFARS cybersecurity requirements
Kizza Security assessment, analysis, and assurance
Gamble The Cybersecurity Maturity Model Certification (CMMC)–A pocket guide
Tarimo ICT security readiness checklist for developing countries: A social-technical approach
Toth Self-Assessment Handbook For Assessing NIST SP 800-171 Security Requirements in Response to DFARS Cybersecurity Requirements
Ross et al. Assessing security requirements for controlled unclassified information
Unterwandling Optimization of IT security in healthcare facilities
Kaestner et al. The cybersecurity challenge in acquisition
Gandini Development of Incident Response Playbooks and Runbooks for Amazon Web Services Ransomware Scenarios
بدران et al. Proposed Of Cybersecurity Framework for Reducing The Security Risks on The Egyptian Petroleum Sector
Udayakumar Design and Deploy a Respond Solution
Board Criminal Justice Information Services (CJIS) Security Policy
Kane et al. Information protection playbook
Miller Security Assessment of Cloud-Based Healthcare Applications
Chopra et al. Execution
Möller Network and Information Security (NIS2)
Pourzolfaghar et al. Adapted Cybersecurity Risk Analysis, Assessment, and Mitigation Framework for Smart Buildings