go to NIST home page go to CSRC home page go to Focus Areas page go to Publications page go to Advisories page go to Events page go to Site Map page go to ITL home page CSRC home page link
header image with links


CSRC Homepage
 
Publications Homepage
 
Special Publications page
Table of Contents for
Special Publication 800-12:


Part I:
Introduction & Overview


Table of Contents
 
Chapter 1
Introduction
 
Chapter 2
Elements of
Computer Security

 
Chapter 3
Roles & Responsibilities
 
Chapter 4
Common Threats:
A Brief Overview

 
Part II:
Management Controls

 
Chapter 5
Computer Security Policy
 
Chapter 6
Computer Security
Program Management

 
Chapter 7
Computer Security
Risk Management

 
Chapter 8
Security & Planning in
the Computer Security
Life Cycle

 
Chapter 9
Assurance
 
Part III:
Operational Controls

 
Chapter 10
Personnel / User Issues
 
Chapter 11
Preparing for Contingencies
and Disasters

 
Chapter 12
Computer Security
Incident Handling

 
Chapter 13
Awareness, Training
and Education

 
Chapter 14
Security Considerations in
Computer Support
and Operations

 
Chapter 15
Physical and
Environmental Security

 
Part IV:
Technical Controls
 

Chapter 16
Identification and
Authentication

 
Chapter 17
Logical Access Control
 
Chapter 18
Audit Trails
 
Chapter 19
Cryptography
 
Part V:
Example

 
Chapter 20
Assessing and Mitigating
the Risks to a Hypothetical
Computer System

 
Interdependencies
Cross Reference

 
For a printable copy of Interdependencies Cross Reference.
 

  Special Publication 800-12: An Introduction to Computer Security - The NIST Handbook

 

INTERDEPENDENCIES CROSS REFERENCE

The following is a cross reference of the interdependencies sections. Note that the references only include specific controls. Some controls were referenced in groups, such as technical controls and occasionally interdependencies were noted for all controls.

Control
 
Chapters Where It Is Cited
 
Policy Program Management
Life Cycle
Personnel/User
Contingency
Awareness and Training
Logical Access
Audit
 
Program Management Policy
Awareness and Training
 
Risk Management Life Cycle
Contingency
Incident
 
Life Cycle Program Management
Assurance
 
Assurance Life Cycle
Support and Operations
Audit
Cryptography
 
Personnel Training and Awareness 
Support and Operations
Access
 
Training and Awareness Personnel/User
Incident
Support and Operations
 
Contingency Incident
Support and Operations
Physical and Environmental
Audit
 
Incident Contingency
Support and Operations
Audit
 
Physical and Environment Contingency
Support and Operations
Logical Access
Cryptography
 
Support and Operations Contingency
Incident
 
Identification and Authentication Personnel/User
Physical and Environmental
Logical Access
Audit
Cryptography
 
Access Controls Policy
Personnel/User
Physical and Environmental
Identification and Authentication
Audit
Cryptography
 
Audit Identification and Authentication
Logical Access
Cryptography
 
Cryptography
 
Identification and Authentication
 

 

 

Last updated: March 29, 2005
Page created:November 29, 2003

Disclaimer Notice & Privacy Policy
Comments and suggestions should go to: webmaster-csrc@nist.gov
NIST is an Agency of the U.S. Commerce Department's
Technology Administration