gptkbp:instance_of
|
gptkb:Publications
|
gptkbp:amended_by
|
gptkb:2014
|
gptkbp:audience
|
gptkb:Federal_agencies
|
gptkbp:contains
|
gptkb:accordion
|
gptkbp:first_published
|
gptkb:2008
|
gptkbp:focuses_on
|
Guide for Mapping Types of Information and Information Systems to Security Categories
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST SP 800-60
|
gptkbp:includes
|
Information system types
Examples of information types
|
gptkbp:is_adopted_by
|
gptkb:State_governments
Local governments
Private sector organizations
|
gptkbp:is_cited_in
|
gptkb:NIST_SP_800-37
gptkb:NIST_SP_800-53
NIST SP 800-18
|
gptkbp:is_part_of
|
gptkb:NIST_Risk_Management_Framework
gptkb:Risk_Management
gptkb:NIST_Computer_Security_Division
NIST Information Security Program
NIST Cybersecurity Program
Federal Information Security Management Act (FISMA) compliance
NIST Information Assurance
|
gptkbp:is_referenced_in
|
gptkb:NIST_SP_800-30
gptkb:NIST_SP_800-53_A
gptkb:NIST_SP_800-171
gptkb:Cybersecurity
|
gptkbp:is_related_to
|
NIST SP 800-53 B
NIST SP 800-60 A
NIST SP 800-60 B
NIST SP 800-60 C
|
gptkbp:is_updated_by
|
NIST SP 800-60 Revision 1
|
gptkbp:is_used_by
|
Government organizations
|
gptkbp:is_used_for
|
Risk assessment
Compliance assessment
Information system security
Security planning
System categorization
|
gptkbp:part_of
|
gptkb:NIST_Special_Publication_series
|
gptkbp:provides
|
Security categorization process
|
gptkbp:provides_guidance_on
|
Security categorization
|
gptkbp:published_by
|
gptkb:NIST
|
gptkbp:related_to
|
FIPS 199
FIPS 200
|
gptkbp:supports
|
Information security management
|
gptkbp:bfsParent
|
gptkb:NIST_SP_800-30
gptkb:NIST_800_series
gptkb:NIST_Special_Publication_800-30
gptkb:NIST_SP_800-39
|
gptkbp:bfsLayer
|
6
|