go to NIST home page go to CSRC home page go to Focus Areas page go to Publications page go to Advisories page go to Events page go to Site Map page go to ITL home page CSRC home page link
header image with links


CSRC Homepage
 
Publications Homepage
 
Special Publications page
Table of Contents for
Special Publication 800-12:


Part I:
Introduction & Overview


Table of Contents
 
Chapter 1
Introduction
 
Chapter 2
Elements of
Computer Security

 
Chapter 3
Roles & Responsibilities
 
Chapter 4
Common Threats:
A Brief Overview

 
Part II:
Management Controls

 
Chapter 5
Computer Security Policy
 
Chapter 6
Computer Security
Program Management

 
Chapter 7
Computer Security
Risk Management

 
Chapter 8
Security & Planning in
the Computer Security
Life Cycle

 
Chapter 9
Assurance
 
Part III:
Operational Controls

 
Chapter 10
Personnel / User Issues
 
Chapter 11
Preparing for Contingencies
and Disasters

 
Chapter 12
Computer Security
Incident Handling

 
Chapter 13
Awareness, Training
and Education

 
Chapter 14
Security Considerations in
Computer Support
and Operations

 
Chapter 15
Physical and
Environmental Security

 
Part IV:
Technical Controls
 

Chapter 16
Identification and
Authentication

 
Chapter 17
Logical Access Control
 
Chapter 18
Audit Trails
 
Chapter 19
Cryptography
 
Part V:
Example

 
Chapter 20
Assessing and Mitigating
the Risks to a Hypothetical
Computer System

 
Interdependencies
Cross Reference

 

  Special Publication 800-12: An Introduction to Computer Security - The NIST Handbook

 

This is the Cover Page and Table of Contents for NIST Special Publication 800-12: An Introduction to Computer Security - The NIST Handbook.

Due to the size of Special Publication 800-12, this document has been broken down into separate web pages. This document contains 20 chapters and each chapter has been placed on its own web page to help decrease the amount of download time. We tried our best to create these web pages to as close to the printed layout copy of this document. We created 2 versions - one for reviewing within your browser and the other is a printable version (minus left menu bar).

Table of Contents:

Part I: INTRODUCTION and OVERVIEW

Chapter 1 - Introduction

Chapter 2 - Elements of Computer Security

Chapter 3 - Roles and Responsibilities

Chapter 4 - Common Threats: A Brief Overview

Part II: MANAGEMENT CONTROLS

Chapter 5 - Computer Security Policy

Chapter 6 - Computer Security Program Management

Chapter 7 - Computer Security Risk Management

Chapter 8 - Security and Planning in the Computer Security Life Cycle

Chapter 9 - Assurance

Part III: OPERATIONAL CONTROLS

Chapter 10 - Personnel / User Issues

Chapter 11 - Preparing for Contingencies and Disasters

Chapter 12 - Computer Security Incident Handling

Chapter 13 - Awareness, Training and Education

Chapter 14 - Security Considerations in Computer Support and Operations

Chapter 15 - Physical and Environmental Security

Part IV: TECHNICAL CONTROLS

Chapter 16 - Identification and Authentication

Chapter 17 - Logical Access Control

Chapter 18 - Audit Trails

Chapter 19 - Cryptography

Part V: EXAMPLE

Chapter 20 - Assessing and Mitigating the Risks to a Hypothetical Computer System
 
 
 

 

Last updated: March 29, 2005
Page created: July 1, 2004