gptkbp:instanceOf
|
gptkb:publishing_company
|
gptkbp:aimsTo
|
Improve security posture
|
gptkbp:appliesTo
|
Federal_Information_Systems
|
gptkbp:citedBy
|
gptkb:ISO/IEC_27005
|
gptkbp:description
|
Risk assessment techniques
|
gptkbp:documentType
|
Guideline
|
gptkbp:focus
|
Risk management
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST SP 800-30
|
gptkbp:includes
|
Risk assessment process
|
gptkbp:isAvailableIn
|
NIST website
|
gptkbp:isCitedBy
|
gptkb:Federal_Information_Security_Modernization_Act
gptkb:NIST_SP_800-171
gptkb:NIST_SP_800-53A
gptkb:NIST_SP_800-160
gptkb:NIST_SP_800-30B
gptkb:NIST_SP_800-53C
gptkb:NIST_SP_800-53B
gptkb:NIST_SP_800-37_Rev._2
gptkb:OMB_Circular_A-130
NIST Cybersecurity Framework
FISMA
NIST SP 800-30A
|
gptkbp:isPartOf
|
Cybersecurity Framework
Information Security Risk Management
|
gptkbp:isReferencedIn
|
gptkb:NIST_SP_800-37
gptkb:NIST_SP_800-53
gptkb:NIST_SP_800-39
|
gptkbp:isUpdatedBy
|
gptkb:NIST_SP_800-30_Rev._1
|
gptkbp:isUsedBy
|
Government agencies
Private sector organizations
|
gptkbp:partOf
|
NIST Special Publication series
|
gptkbp:provides
|
Risk assessment methodology
|
gptkbp:providesGuidanceOn
|
Identifying vulnerabilities
Risk response strategies
Identifying threats
Assessing impact
Determining likelihood
Risk determination
|
gptkbp:publicationDate
|
2012
|
gptkbp:publishedBy
|
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:relatedTo
|
gptkb:NIST_Risk_Management_Framework
|
gptkbp:replacedBy
|
gptkb:NIST_SP_800-30_Rev._1
|
gptkbp:supports
|
Continuous monitoring
|
gptkbp:targetAudience
|
Information security professionals
|
gptkbp:title
|
Guide for Conducting Risk Assessments
|