The IT Law Wiki
No edit summary
No edit summary
Line 1: Line 1:
 
== Citation ==
 
== Citation ==
   
[[NIST]], Generally Accepted Principles and Practices for Securing Information Technology Systems ('''NIST Special Publication 800-14''') ([http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf full-text]).
+
[[NIST]], Generally Accepted Principles and Practices for Securing Information Technology Systems ('''NIST Special Publication 800-14''') (1996) ([http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf full-text]).
   
 
== Overview ==
 
== Overview ==
   
This publication provides a foundation upon which organizations can establish and review [[information technology]] [[security]] programs. The eight [[Generally Accepted System Security Principles]] ([[GSSP]]) are designed to provide the public or private sector audience with an organization-level perspective when creating new systems, practices, or policies.
+
This publication provides a foundation upon which organizations can establish and review [[information technology]] [[security]] programs. The eight [[Generally Accepted System Security Principles]] ([[GSSP]]) are designed to provide the [[public sector|public]] or [[private sector]] audience with an organization-level perspective when creating new [[system]]s, practices, or [[policies]].
 
[[Category:Publication]]
 
[[Category:Publication]]
 
[[Category:Security]]
 
[[Category:Security]]

Revision as of 05:14, 31 May 2014

Citation

NIST, Generally Accepted Principles and Practices for Securing Information Technology Systems (NIST Special Publication 800-14) (1996) (full-text).

Overview

This publication provides a foundation upon which organizations can establish and review information technology security programs. The eight Generally Accepted System Security Principles (GSSP) are designed to provide the public or private sector audience with an organization-level perspective when creating new systems, practices, or policies.