Add to Book Shelf
Flag as Inappropriate
Email this Book

Security Guide for Interconnecting Information Technology Systems

By Grance, Timothy

Click here to view

Book Id: WPLBN0000696148
Format Type: PDF eBook:
File Size: 0.7 MB
Reproduction Date: 2005

Title: Security Guide for Interconnecting Information Technology Systems  
Author: Grance, Timothy
Volume:
Language: English
Subject: Technology., Reference materials, Technology and literature
Collections: Techonology eBook Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

Grance, B. T. (n.d.). Security Guide for Interconnecting Information Technology Systems. Retrieved from http://gutenberg.cc/


Description
Technical Reference Publication

Excerpt
Executive Summary: The Security Guide for Interconnecting Information Technology Systems provides guidance for planning, establishing, maintaining, and terminating interconnections between information technology (IT) systems that are owned and operated by different organizations. The guidelines are consistent with the requirements specified in the Office of Management and Budget (OMB) Circular A-130, Appendix III, for system interconnection and information sharing.

Table of Contents
Table of Contents EXECUTIVE SUMMARY........................................................................................................ES-1 1. INTRODUCTION................................................................................................................1-1 1.1 Authority...................................................................................................................1-1 1.2 Purpose....................................................................................................................1-1 1.3 Scope.......................................................................................................................1-1 1.4 Audience..................................................................................................................1-1 1.5 Other Approaches to System Interconnectivity........................................................1-2 1.6 Document Structure.................................................................................................1-2 2. BACKGROUND.................................................................................................................2-1 3. PLANNING A SYSTEM INTERCONNECTION.................................................................3-1 3.1 Step 1: Establish a Joint Planning Team.................................................................3-1 3.2 Step 2: Define the Business Case...........................................................................3-1 3.3 Step 3: Perform Certification and Accreditation.......................................................3-2 3.4 Step 4: Determine Interconnection Requirements...................................................3-2 3.5 Step 5: Document Interconnection Agreement........................................................3-5 3.6 Step 6: Approve or Reject System Interconnection.................................................3-6 4. ESTABLISHING A SYSTEM INTERCONNECTION.........................................................4-1 4.1 Step 1: Develop an Implementation Plan.................................................................4-1 4.2 Step 2: Execute the Implementation Plan................................................................4-1 4.3 Step 3: Activate the Interconnection........................................................................4-6 5. MAINTAINING A SYSTEM INTERCONNECTION............................................................5-1 5.1 Maintain Clear Lines of Communication..................................................................5-1 5.2 Maintain Equipment.................................................................................................5-2 5.3 Manage User Profiles..............................................................................................5-2 5.4 Conduct Security Reviews.......................................................................................5-2 5.5 Analyze Audit Logs..................................................................................................5-2 5.6 Report and Respond to Security Incidents..............................................................5-3 5.7 Coordinate Contingency Planning Activities............................................................5-3 5.8 Perform Change Management.................................................................................5-3 5.9 Maintain System Security Plans..............................................................................5-4 6. DISCONNECTING A SYSTEM INTERCONNECTION......................................................6-1 6.1 Planned Disconnection............................................................................................6-1 6.2 Emergency Disconnection.......................................................................................6-1 6.3 Restoration of Interconnection.................................................................................6-2

 
 



Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.