NIST IR 8179
Criticality Analysis Process Model
Prioritizing Systems and Components
Celia Paulsen
Jon Boyens
Nadya Bartol
Kris Winkler
This publication is available free of charge from:
https://doi.org/10.6028 /NIST.IR.8179
NISTIR 8179
Criticality Analysis Process Model
Prioritizing Systems and Components
Celia Paulsen
John Boyens
Computer Security Division
Information Technology Laboratory
Nadya Bartol
Boston Consulting Group
Bethesda, MD
Kris Winkler
Boston Consulting Group
Denver, CO
This publication is available free of charge from:
https://doi.org/10.6028 /NIST.IR.8179
April 2018
U.S. Department of Commerce
Wilbur L. Ross , Jr., Secretary
National Institute of Standards and Technology
Walter Copan, NIST Director and Under Secretary of Commerce for Standards and Technology NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL :
PRIORITIZING SYSTEMS AND COMPONENTS
i
This publication is available free of charge from: https://doi.org /10.6028/NIST.IR. 8179
National Institute of Standards and Technology Internal Report 8179
94 pages ( April 2018)
This publication is available free of charge from:
https://doi.org/10.6028/ NIST.IR.8179
Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental
procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST,
nor is it inte nded to imply that the entities, materials, or equipment are necessarily the best available for the purpose.
There may be references in this publication to other publications currently under development by NIST in accordance with
its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be
used by f ederal agencies even before the completion of such companion publications. Thus, until each publication is
completed, current requirements, guideline s, and procedures, where they exist, remain operative. For planning and transition
purposes, f ederal agencies may wish to closely follow the development of these new publications by NIST.
Organizations are encouraged to review all draft publications du ring public comment periods and provide feedback to NIST.
Many NIST cybersecurity publications , other than the ones noted above, are available at https ://csrc.nist.gov/publications .
Comments on this publication may be submitted to:
National Institute of Standards and Technology
Attn: Computer Security Division, Information Technology Laboratory
100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899- 8930
Email: scrm -nist@nist.gov
All comments are subject to release under the Freedom of Information Act (FOIA).
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL :
PRIORITIZING SYSTEMS AND COMPONENTS
ii
This publication is available free of charge from: https://doi.org /10.6028/NIST.IR. 8179
Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the Nati onal Institute of Standards and Technology
(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the
Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data,
proof of concept i mplementations, and technical analyses to advance the development and productive
use of information technology. ITL’s responsibilities include the development of management,
administrative, technical, and physical standards and guidelines for the cost -effective security and
privacy of other than national s ecurity -related information in f ederal information systems.
Abstract
In the modern world, where complex systems and systems -of-systems are integral to the functioning
of society and businesses, it is increasingly important to be able to understand and manage risks that
these systems and c
NIST.IR.8179
安全标准 >
NIST >
文档预览
中文文档
94 页
50 下载
1000 浏览
0 评论
0 收藏
3.0分
温馨提示:本文档共94页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
本文档由 思安 于 2022-12-05 09:19:12上传分享