2 pages matching action and milestones in this book
Results 1-2 of 2
What people are saying - Write a review
We haven't found any reviews in the usual places.
Applied cryptography: protocols, algorithms, and source code in C
No preview available - 2007
Accreditation Criteria accreditation decision accreditation documentation accreditation guidance accreditation statement accrediting officials action and milestones agency systems application audits authorization to operate authorizing official certification agent certification and accreditation chief information officer Commerce computer security Congress contingency plan continue control testing current risk assessment Department designated approving authority develop distributed computing environment DITSCAP ensure federal guidance federal information systems fiscal year 2003 FISMA requirements four agencies implementation independent evaluations information security policies information security program information system security Information Technology Institute of Standards interim authorization National Security Agency national security systems NIST guidance Nuclear Regulatory Commission number of systems OMB's percent percentage of systems performance data performance measurement data procedures Publication 102 recommendations requires agencies residual risk security accreditation security category security certification security requirements Special Publication 800-37 Standards and Technology status system security plan systems authorized systems certified Systems Special Publication