Guidelines On Active Content And Mobile Code

Download Guidelines On Active Content And Mobile Code PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Guidelines On Active Content And Mobile Code book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.
Guidelines on Active Content and Mobile Code

The private and public sectors depend heavily upon info. tech. systems to perform essential, mission-critical functions. As existing technology evolves and new technologies are introduced to provide improved capabilities and advanced features in systems, new technology-related vulnerabilities often arise. Organizations implementing and using advanced technologies must be on guard. One such category of technologies is active content, which refers to electronic documents that can carry out or trigger actions automatically without an individual directly or knowingly invoking the actions. Exploits based on vulnerabilities in active content technologies can be insidious. This report recommends key guidelines for dealing with active content. Illus.
Guidelines on Active Content and Mobile Code: Recommendations of the National Institute of Standards and Technology

The private and public sectors depend heavily upon (IT) systems to perform essential, mission-critical functions. As existing technology evolves and new technologies are introduced to provide improved capabilities and advanced features in systems, new technology-related vulnerabilities often arise. Organizations implementing and using advanced technologies, therefore, must be increasingly on guard. One such category of technologies is active content. Broadly speaking, active content refers to electronic documents that, unlike past character documents based on the American Standard Code for Information Interchange (ASCII) and related character sets, can carry out or trigger actions automatically without an individual directly or knowingly invoking the actions. Therefore, exploits based on vulnerabilities in active content technologies by their very nature can be particularly insidious. The following key guidelines are recommended to Federal departments and agencies for dealing with active content.
Federal Cloud Computing

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. - Provides a common understanding of the federal requirements as they apply to cloud computing - Provides a targeted and cost-effective approach for applying the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) - Provides both technical and non-technical perspectives of the Federal Assessment and Authorization (A&A) process that speaks across the organization