Research Catalog

Computer security considerations in federal procurements : a guide for procurement initiators, contracting officers, and computer security officials

Title
Computer security considerations in federal procurements : a guide for procurement initiators, contracting officers, and computer security officials / Barbara Guttman.
Author
Guttman, Barbara
Publication
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1992.

Available Online

https://purl.fdlp.gov/GPO/gpo104187

Details

Additional Authors
National Institute of Standards and Technology (U.S.). Computer Security Division
Series Statement
NIST special publication ; 800-4
Uniform Title
NIST special publication ; 800-4.
Subject
  • Acquisition
  • Assurance
  • Computer security
  • Procurement
  • Requirements analysis
  • Risk analysis
  • Specifications
Note
  • 1992.
  • Contributed record: Metadata reviewed, not verified. Some fields updated by batch processes.
  • Superseded by NIST Special Publication 800-64.
  • Title from PDF title page.
Bibliography (note)
  • Includes bibliographical references.
Call Number
GPO Internet C 13.10:800-4
LCCN
GOVPUB-C13-e1a8f04b2799939a3c918087ba430db4
OCLC
927737176
Author
Guttman, Barbara.
Title
Computer security considerations in federal procurements : a guide for procurement initiators, contracting officers, and computer security officials / Barbara Guttman.
Publisher
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1992.
Description
1 online resource.
Type of Content
text
Type of Medium
computer
Type of Carrier
online resource
Series
NIST special publication ; 800-4
NIST special publication ; 800-4.
Bibliography
Includes bibliographical references.
Summary
This NIST Special Publication provides guidance for federal procurement initiators, contracting officers, and computer security officials on including computer security in acquisitions. To accomplish this goal, computer security and federal information processing (FIP) procurement must be integrated. Computer security is the protection of the integrity, availability and confidentiality of automated information and the resources used to enter, store, process, and communicate the information. Computer security shares properties with systems/software engineering including trustworthiness, system safety, and reliability. FIP procurement is the process of acquiring hardware, software, firmware, computer-related services and telecommunications. FIP procurement begins with the process of determining needs and ends with contract completion.
Connect to:
https://purl.fdlp.gov/GPO/gpo104187
Indexed Term
Acquisition
Assurance
Computer security
Procurement
Requirements analysis
Risk analysis
Specifications
Added Author
Guttman, Barbara.
National Institute of Standards and Technology (U.S.). Computer Security Division.
Other Standard Identifier
GOVPUB-C13-e1a8f04b2799939a3c918087ba430db4
Gpo Item No.
0247 (online)
Sudoc No.
C 13.10:800-4
View in Legacy Catalog