What is the purpose of SP 800 12?

The intent of this special publication is to provide a high-level overview of information security principles, introduce related concepts, and also to broadly discuss the security control families defined in NIST SP 800-53, Security and Privacy Controls for Systems and Organizations.

What is nist sp 800 12?

NIST Releases Special Publication 800-12 Revision 1, An Introduction to Information Security. June 23, 2017. This publication serves as a starting-point for those new to information security as well as those unfamiliar with NIST information security publications and guidelines.

What is the CIA triad NIST?

CIA Triad: The Key to Improving your information security. Confidentiality Integrity Availability NIST Framework.

What is the most practical and generally accepted system of personnel identification?

l Pass and Badge System. For access to large areas or where the number of personnel exceeds that allowed for personal recognition, a pass and badge system should be used. This system is considered the most practical means of identification to be used by large activities.

How do you become NIST 800-171 compliant?

6 Steps to Implement NIST 800-171 Requirements

  1. Locate and Identify CUI.
  2. Categorize CUI.
  3. Implement Required Controls.
  4. Train Your Employees.
  5. Monitor Your Data.
  6. Assess Your Systems and Processes.

What are the NIST 800-171 requirements?

The 14 requirement families of NIST 800-171 are:

  • Access Control. This family of requirements deals with access to networks, systems, and information.
  • Awareness and Training.
  • Audit and Accountability.
  • Configuration Management.
  • Identification and Authentication.
  • Incident Response.
  • Maintenance.
  • Media Protection.

How can the CIA triad be applied in risk management?

During risk assessments, organizations measure the risks, threats and vulnerabilities that could compromise the confidentiality, integrity and availability of their systems and data. By implementing security controls to mitigate those risks, they satisfy one or more of the CIA triad’s core principles.

What is confidentiality in CIA triad?

Confidentiality means that data, objects and resources are protected from unauthorized viewing and other access. Integrity means that data is protected from unauthorized changes to ensure that it is reliable and correct.

What are the best practice about Internet security?

Top 10 Security Practices

  • Log off public computers.
  • Back up important information and verify that you can restore it.
  • Keep personal information safe.
  • Limit social network information.
  • Download files legally.
  • Ctrl-ALt-Delete before you leave your seat!
  • Secure your laptop, smart phone or other mobile devices.