gptkbp:instance_of
|
gptkb:Publications
|
gptkbp:aims_to
|
Improve risk management practices
|
gptkbp:amended_by
|
gptkb:2012
|
gptkbp:audience
|
Information security professionals
|
gptkbp:available_at
|
NIST website
|
gptkbp:contains
|
Risk assessment scenarios
Risk assessment methodology
|
gptkbp:content_type
|
Technical report
|
gptkbp:discusses
|
Vulnerability assessment
Impact analysis
Threat identification
|
gptkbp:focuses_on
|
Risk assessment
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST Special Publication 800-30
|
gptkbp:includes
|
Templates for risk assessment
|
gptkbp:is_adopted_by
|
gptkb:State_governments
Private sector organizations
|
gptkbp:is_cited_in
|
gptkb:NIST_SP_800-115
gptkb:NIST_SP_800-171_A
gptkb:NIST_SP_800-53_A
gptkb:NIST_SP_800-53
gptkb:NIST_SP_800-160
gptkb:NIST_SP_800-60
Risk management literature
NIST SP 800-30 A
NIST SP 800-30 B
|
gptkbp:is_influenced_by
|
gptkb:ISO_31000
|
gptkbp:is_part_of
|
gptkb:Federal_Information_Security_Modernization_Act
gptkb:NIST_Risk_Management_Framework
gptkb:Cybersecurity
|
gptkbp:is_referenced_in
|
gptkb:NIST_SP_800-171
gptkb:FISMA
|
gptkbp:is_related_to
|
NIST SP 800-30 A
NIST SP 800-30 B
|
gptkbp:is_updated_by
|
gptkb:NIST_Special_Publication_800-39
|
gptkbp:is_used_by
|
gptkb:Federal_agencies
|
gptkbp:is_used_for
|
Security assessments
|
gptkbp:is_used_in
|
Compliance assessments
|
gptkbp:is_utilized_for
|
Risk mitigation strategies
|
gptkbp:part_of
|
gptkb:NIST_Special_Publication_series
|
gptkbp:provides
|
Risk assessment process steps
|
gptkbp:provides_guidance_on
|
gptkb:Risk_Management
|
gptkbp:publication_year
|
July 2002
|
gptkbp:published_by
|
gptkb:National_Academy_of_Sciences
|
gptkbp:related_to
|
gptkb:NIST_SP_800-37
|
gptkbp:supports
|
Continuous monitoring
|
gptkbp:title
|
Guide for Conducting Risk Assessments
|
gptkbp:bfsParent
|
gptkb:NIST_Risk_Management_Framework
|
gptkbp:bfsLayer
|
5
|