- Additional Authors
- National Institute of Standards and Technology (U.S.). Computer Security Division
- Series Statement
- NIST special publication ; 800-4
- Uniform Title
- NIST special publication ; 800-4.
- Subject
- Note
- 1992.
- Contributed record: Metadata reviewed, not verified. Some fields updated by batch processes.
- Superseded by NIST Special Publication 800-64.
- Title from PDF title page.
- Bibliography (note)
- Includes bibliographical references.
- Call Number
- GPO Internet C 13.10:800-4
- LCCN
- GOVPUB-C13-e1a8f04b2799939a3c918087ba430db4
- OCLC
- 927737176
- Author
Guttman, Barbara.
- Title
Computer security considerations in federal procurements : a guide for procurement initiators, contracting officers, and computer security officials / Barbara Guttman.
- Publisher
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1992.
- Description
1 online resource.
- Type of Content
text
- Type of Medium
computer
- Type of Carrier
online resource
- Series
NIST special publication ; 800-4
NIST special publication ; 800-4.
- Bibliography
Includes bibliographical references.
- Summary
This NIST Special Publication provides guidance for federal procurement initiators, contracting officers, and computer security officials on including computer security in acquisitions. To accomplish this goal, computer security and federal information processing (FIP) procurement must be integrated. Computer security is the protection of the integrity, availability and confidentiality of automated information and the resources used to enter, store, process, and communicate the information. Computer security shares properties with systems/software engineering including trustworthiness, system safety, and reliability. FIP procurement is the process of acquiring hardware, software, firmware, computer-related services and telecommunications. FIP procurement begins with the process of determining needs and ends with contract completion.
- Connect to:
- Indexed Term
Acquisition
Assurance
Computer security
Procurement
Requirements analysis
Risk analysis
Specifications
- Added Author
Guttman, Barbara.
National Institute of Standards and Technology (U.S.). Computer Security Division.
- Other Standard Identifier
GOVPUB-C13-e1a8f04b2799939a3c918087ba430db4
- Gpo Item No.
0247 (online)
- Sudoc No.
C 13.10:800-4