Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Marianne Swanson is active.

Publication


Featured researches published by Marianne Swanson.


Archive | 2006

Guide for Developing Security Plans for Federal Information Systems

Marianne Swanson; Joan Hash; Pauline Bowen

The objective of system security planning is to improve protection of information system resources. All federal systems have some level of sensitivity and require protection as part of good management practice. The protection of a system must be documented in a system security plan. The completion of system security plans is a requirement of the Office of Management and Budget (OMB) Circular A-130, Management of Federal Information Resources, Appendix III, Security of Federal Automated Information Resources, and Title III of the E-Government Act, entitled the Federal Information Security Management Act (FISMA), The purpose of the system security plan is to provide an overview of the security requirements of the system and describe the controls in place or planned for meeting those requirements. The system security plan also delineates responsibilities and expected behavior of all individuals who access the system. The system security plan should be viewed as documentation of the structured process of planning adequate, cost-effective security protection for a system. It should reflect input from various managers with responsibilities concerning the system, including information owners, the system owner, and the senior agency information security officer (SAISO). Additional information may be included in the basic plan and the structure and format organized according to agency needs, so long as the major sections described in this document are adequately covered and readily identifiable.


Archive | 2002

Contingency Planning Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology

Marianne Swanson; Amy Wohl; Lucinda Pope; Timothy Grance; Joan Hash; Ray Thomas

Abstract : NIST Special Publication 800-34, Contingency Planning Guide for Information Technology (IT) Systems provides instructions, recommendations, and considerations for government IT contingency planning. Contingency planning refers to interim measures to recover IT services following an emergency of System disruption. Interim measures may include the relocation of IT systems sod operators to an alternate site, the recovery of IT functions using alternate equipment, or the performance of IT functions using manual methods.


Special Publication (NIST SP) - 800-55 | 2003

Security Metrics Guide for Information Technology Systems

Marianne Swanson; Nadya Bartol; John Sabato; Joan Hash; Laurie Graffo


Special Publication (NIST SP) - 800-55 Rev 1 | 2008

Performance Measurement Guide for Information Security

Elizabeth Chew; Marianne Swanson; Kevin M. Stine; Nadya Bartol; Anthony Brown; Will Robinson


Generally Accepted Principles and Practices for Securing Information Technology Systems / AHIMA, American Health Information Management Association | 1996

Generally Accepted Principles and Practices for Securing Information Technology Systems

Marianne Swanson; Barbara Guttman


Special Publication (NIST SP) - 800-34 | 2002

Contingency Planning Guide for Information Technology Systems

Marianne Swanson; Amy Wohl; Lucinda Pope; Timothy Grance; Joan Hash; Ray Thomas


Archive | 2010

Contingency planning guide for federal information systems

Marianne Swanson; Pauline Bowen; Amy Wohl Phillips; Dean Gallup; David Lynes


Archive | 1996

NIST Special Publication 800-14

Marianne Swanson; Barbara Guttman


Archive | 2008

SP 800-55 Rev. 1. Performance Measurement Guide for Information Security

Elizabeth Chew; Marianne Swanson; Kevin M. Stine; Nadya Bartol; Anthony Brown; Will Robinson


Special Publication (NIST SP) - 800-14 | 1996

Generally Accepted Principles and Practices for Securing Information Technology Systems | NIST

Marianne Swanson; Barbara Guttman

Collaboration


Dive into the Marianne Swanson's collaboration.

Top Co-Authors

Avatar

Joan Hash

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Pauline Bowen

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Barbara Guttman

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Elizabeth Chew

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Kevin M. Stine

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Timothy Grance

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Mark Wilson

National Institute of Standards and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge