Item description for Security Assessment: Case Studies for Implementing the NSA IAM by Russ Rogers...
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines. This book focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation, etc.). The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during it. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement.
Promise Angels is dedicated to bringing you great books at great prices. Whether you read for entertainment, to learn, or for literacy - you will find what you want at promiseangels.com!
Est. Packaging Dimensions: Length: 9.3" Width: 6.8" Height: 0.9" Weight: 1.9 lbs.
Release Date Jan 1, 2004
ISBN 1932266968 ISBN13 9781932266962
Availability 147 units. Availability accurate as of Oct 26, 2016 12:30.
Usually ships within one to two business days from La Vergne, TN.
Orders shipping to an address other than a confirmed Credit Card / Paypal Billing address may incur and additional processing delay.
More About Russ Rogers
Rogers is the President of Security Horizons, Inc. Russ holds a master's degree in Computer Systems Management from the University of Maryland.
Reviews - What do customers think about Security Assessment: Case Studies for Implementing the NSA IAM?
How To Manage The Security Assessment Process Apr 27, 2005
There are two things that are extremely frustrating in working on audits and risk and security assessments. One is that too many people in online discussion fora and ListServs want templates handed to them free so they can resell them or tell their boss about the great work that they did. The second has been the absence of, in the technical book arena, any reference book that focuses more on the business process side of conducting security assessments. Security Assessment - Case Studies for Implementing The NSA IAM (Greg Miles, Russ Rogers et al, Syngress Press, 2004, 429 Pages, US$69.95 List/US$44.07 this site) fills both of these holes, but not without incurring a penalty stroke for "grounding the club" in a hazard.
IAM stands for Information Security (INFOSEC) Assessment Methodology and NSA stands for the National Security Agency. These are two things you learn right up front from the authors as the explain how this methodology came to be a the result of the need to do more in a time of budget cuts and its evolution into a broad methodology that can be used by any group in the public or private sector. From this start and background, the authors successfully walk the reader through the "soft skill" side of the security assessment process. What makes this book different than others is that there is little to no discussion of tools used in the assessment. What it does focus on is how to identify assessment needs (for the customer) and opportunities (for the consulting firm). The authors approach security assessments from a holistic project approach, taking the reader through issues and steps with contract preparation/execution, skills identification, team makeup, preplanning, identification of high risk areas, conducting the assessment, delivering the end product, and closing the project out.
For the most part, the authors excel in laying this out in simple terms and provide a number of case studies from their experience. However, as I mentioned at the beginning, I am assessing a penalty stroke in my rating because their discussion of performing security assessment work under government contracts is far too simplistic, is not wholly accurate in their discussion of contract types, and does not even address the issue of all of the additional reporting and cost accounting standards that a vendor will have to accept when doing government work. They also fail to mention how large the universe is of competitors for this work and how difficult it can be to crack this marketplace. They also fail to address legal issues associated with the scope creep in government work, with no discussion of important terms such as "constructive changes", "unauthorized commitments", "change orders", etc. They talk about "colors of money" in the government without even explaining what the term means. Granted, the book could have easily quadrupled in size to address all of this information, but they should have at least included references to sources to provide further insight into these important areas. Oh, and incidentally, the color of money under government contracts is, for the most part, transparent to contractors.
Aside from this penalty stroke, and I am harder on it because I was a Contracting Officer in the Federal Government for a number of years, the book provides an excellent roadmap to groups and/or individuals seeking a security assessment roadmap.
Who Should Read This Book?
Aside from the people who post on the internet looking for solutions to be handed to them, this book would satisfy the needs of a wide variety of users. Practitioners will gain information and insight not provided in typical training classes. Customers would gain a good overview of the process and what to expect as the process goes on. Managers need to read this book so that they do not, as the authors point out often happens, try to turn this methodology into a business process. And finally, Sales staff need to read this book so that they understand what they are trying to sell and that it is not a one size fits all commodity (kudos to the authors for putting this in writing, but it is not enough to recover the penalty stroke).
Birdie on an short par 5 playing downwind (penalty stroke can be a killer).
Good Resource For Implementing NSA IAM Nov 8, 2004
The authors' have a wealth of experience in information security and with the IAM framework. They convey this experience through case studies derived from real-world scenarios to provide examples that illustrate the IAM in action.
Security Assessment demonstrates how to apply the NSA IAM to commercial and government organizations alike to determine the relative security of their network. The authors' provide tips and advise readers of pitfalls to watch out for as they guide you through performing an IAM security assessment.
The book is both informative and at times entertaining as it walks through sample scenarios. It also provides some templates and sample deliverables that readers can use.
The authors' knowledge and experience is evident throughout, however parts of the book are slightly confusing or hard to follow. Sometimes it seemed as if extra words were added in just to stretch the chapter out without providing any benefit in terms of relaying information. But, overall I think that network or security administrators and particularly those tasked with actually following the NSA IAM will benefit greatly from reading this book.
The IAM from a real world perspective Apr 29, 2004
Whether you are currently performing IAM assessments, or if you or your organization wants to begin using the IAM, this book is an excellent reference.
As any assessor knows, there is no such thing as two identical assessments. That said, the authors provide a cross section of examples that illustrate many different situations that you will see on site.
The authors of this book are THE authorities on the IAM and the information they present will help new assessors build a foundation for using the IAM while at the same time providing information that is essential for a practicing assessor to add to his arsenal.
Overall an outstanding book.
Disappointed... Feb 12, 2004
This book disappointed me with it's lack of content and diffused focus. Pages of boorish, made up examples with irrelevant details did not provide the necessary information needed to understand and implement the very abstract IA-CMM v 3.0.
I would wish that I had spent this amount of money on something with more real world examples that was written in a more concise and pregnant style. I would have appreciated software templates sold with the book as well. Some parts of the book are incomprehensible. I find this on P.197:
"Warning: It would be a very good idea to define the term system in this section. May people reading this document for the first time may not comphrehend the deifference between calling a server a system and calling a collection of servers or networks a system. This lack of comprehension can sometimes lead to seriuos confusion and misunderstanding. A brief heading at the beginning of this section can go a long way to alleviating any issues before they arise."
I have no idea what this paragraph meant to say. Unfortunately, this was not the only time I experienced a lack of clarity and concision while reading this book. As a personal note, I found that having the URL www.syngress.com listed at the bottom of every chapter page was an unprofessional and distractive advertising technique. Are even books now to be invaded by SPAM?
I hope to see more concise and focused material with less abstract examples published on implementing the IA CMM v. 3.0.
Security Assessment a MUST have Feb 11, 2004
Whether you are an experienced security professional or just starting out in security, this book is a MUST for anyone serious about security. Although I have taken the NSA IAM training in the past, this book is a great compliment to the training.
The authors have combined their professional experience using the IAM with feedback and experiences from class participants and customers, and applied them to real world, practical, case studies. It demonstrates how the IAM, a thorough hands-off security assessment methodology, can be applied to both government and commercial entities. The book guides you through the entire IAM process, with highlighted tips and caveats that you will not get from any other source.
After you complete this insightful book, you will be armed with information that will be valuable to you, your company, and your customers in performing a thorough hands-off security assessment. This book will be a great reference for the IEM.