skip to content
Supply Chain Risk Management : Applying Secure Acquisition Principles to Ensure a Trusted Technology Product Preview this item
ClosePreview this item
Checking...

Supply Chain Risk Management : Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

Author: Ken Sigler; Dan Shoemaker; Anne Kohnke
Publisher: Boca Raton, FL : CRC Press, 2017.
Series: Internal Audit and IT Audit
Edition/Format:   eBook : Document : English : First editionView all editions and formats
Summary:
"The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Ken Sigler; Dan Shoemaker; Anne Kohnke
ISBN: 9781315279572 1315279576 9781315279565 1315279568 9781315279541 1315279541
OCLC Number: 1007500112
Description: 1 online resource : text file, PDF.
Contents: ""Cover""; ""Half Title""; ""Title Page""; ""Copyright Page""; ""Table of Contents""; ""Foreword""; ""Preface""; ""Authors""; ""Contributions""; ""Chapter Structure and Summary""; ""1 Why Secure Information and Communication Technology Product Acquisition Matters""; ""Introduction to the Book""; ""Underwriting Trust and Competence""; ""Justification and Objectives of the Book""; ""The Five-Part Problem""; ""Putting Product Assurance into Practice""; ""The Supply Chain and the Weakest Link""; ""Visibility and Control""; ""Building Visibility into the Acquisition Process"" ""The Seven Phases of ICT Acquisition Practice""""Practice Area One: Procurement Program Initiation and Planning""; ""Practice Area Two: Product Requirements Communication and Bidding""; ""Practice Area Three: Source Selection and Contracting""; ""Practice Area Four: Supplier Considerations""; ""Practice Area Five: Customer Agreement Monitoring""; ""Practice Area Six: Product Acceptance""; ""Practice Area Seven: Project Closure""; ""Building the Foundation: The Role of Governance in Securing the ICT Supply Chain""; ""The Use of Standard Models of Best Practice""; ""Chapter Summary"" ""Key Concepts""""Key Terms""; ""References""; ""2 Building a Standard Acquisition Infrastructure""; ""ISO/IEC 12207""; ""Agreement Processes: Overview""; ""Acquisition Process""; ""Acquisition Activity: Acquisition Preparation""; ""Concept of Need""; ""Define, Analyze, and Document System Requirements""; ""Consideration for Acquiring System Requirements""; ""Preparation and Execution of the Acquisition Plan""; ""Acceptance Strategy Definition and Documentation""; ""Prepare Acquisition Requirements""; ""Acquisition Activity: Acquisition Advertisement"" ""Acquisition Activity: Supplier Selection""""Acquisition Activity: Contract Agreement""; ""Acquisition Activity: Agreement Monitoring""; ""Acquisition Activity: Closure""; ""Supply Process""; ""Supply Activity: Opportunity Identification""; ""Supply Activity: Supplier Tendering""; ""Supply Activity: Contract Agreement""; ""Supply Activity: Contract Execution""; ""Supply Activity: Product/Service Delivery and Support""; ""Supply Activity: Closure""; ""Chapter Summary""; ""Key Terms""; ""References""; ""3 The Three Building Blocks for Creating Communities of Trust"" ""Introduction to Product Trust""""Building a Basis for Trust""; ""The Hierarchy of Sourced Products""; ""The Problem with Sourced Products""; ""Promoting Trust through Best Practice""; ""Moving the Product up the Supply Chain""; ""The Standard Approach to Identifying and Controlling Risk""; ""The Three Standard Supply Chain Roles""; ""The Acquirer Role""; ""The Supplier Role""; ""The Integrator Role""; ""Information and Communication Technology Product Assurance""; ""Adopting a Proactive Approach to Risk""; ""People, the Weakest Link""; ""Chapter Summary""; ""Key Concepts""; ""Key Terms""
Series Title: Internal Audit and IT Audit
Responsibility: editors, Dan Shoemaker, Anne Kohnke.

Abstract:

"The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems."--Provided by publisher.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1007500112> # Supply Chain Risk Management : Applying Secure Acquisition Principles to Ensure a Trusted Technology Product
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "1007500112" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/flu> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4496015682#Topic/infosecuritynetbase> ; # InfoSECURITYnetBASE
    schema:about <http://experiment.worldcat.org/entity/work/data/4496015682#Topic/it_security> ; # IT Security
    schema:about <http://experiment.worldcat.org/entity/work/data/4496015682#Topic/supply_chain_management> ; # Supply Chain Management
    schema:about <http://experiment.worldcat.org/entity/work/data/4496015682#Topic/informationsciencenetbase> ; # INFORMATIONSCIENCEnetBASE
    schema:about <http://dewey.info/class/658.7/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4496015682#Topic/industrialengineeringnetbase> ; # INDUSTRIALENGINEERINGnetBASE
    schema:about <http://experiment.worldcat.org/entity/work/data/4496015682#Topic/quality_control_&_reliability> ; # Quality Control & Reliability
    schema:about <http://experiment.worldcat.org/entity/work/data/4496015682#Topic/engnetbase> ; # ENGnetBASE
    schema:about <http://experiment.worldcat.org/entity/work/data/4496015682#Topic/stmnetbase> ; # STMnetBASE
    schema:about <http://experiment.worldcat.org/entity/work/data/4496015682#Topic/itechnetbase> ; # ITECHnetBASE
    schema:about <http://experiment.worldcat.org/entity/work/data/4496015682#Topic/businessnetbase_managementnetbase> ; # BUSINESSnetBASE/MANAGEMENTnetBASE
    schema:about <http://experiment.worldcat.org/entity/work/data/4496015682#Topic/computing_&_it_security> ; # Computing & IT Security
    schema:about <http://experiment.worldcat.org/entity/work/data/4496015682#Topic/sci_technetbase> ; # SCI-TECHnetBASE
    schema:about <http://experiment.worldcat.org/entity/work/data/4496015682#Topic/projectmanagementnetbase> ; # PROJECTMANAGEMENTnetBASE
    schema:author <http://experiment.worldcat.org/entity/work/data/4496015682#Person/shoemaker_dan> ; # Dan Shoemaker
    schema:author <http://experiment.worldcat.org/entity/work/data/4496015682#Person/kohnke_anne> ; # Anne Kohnke
    schema:author <http://experiment.worldcat.org/entity/work/data/4496015682#Person/sigler_ken> ; # Ken Sigler
    schema:bookEdition "First edition." ;
    schema:bookFormat schema:EBook ;
    schema:datePublished "2017" ;
    schema:description ""The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems."--Provided by publisher."@en ;
    schema:description """Cover""; ""Half Title""; ""Title Page""; ""Copyright Page""; ""Table of Contents""; ""Foreword""; ""Preface""; ""Authors""; ""Contributions""; ""Chapter Structure and Summary""; ""1 Why Secure Information and Communication Technology Product Acquisition Matters""; ""Introduction to the Book""; ""Underwriting Trust and Competence""; ""Justification and Objectives of the Book""; ""The Five-Part Problem""; ""Putting Product Assurance into Practice""; ""The Supply Chain and the Weakest Link""; ""Visibility and Control""; ""Building Visibility into the Acquisition Process"""@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/4496015682> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/4496015682#Series/internal_audit_and_it_audit> ; # Internal Audit and IT Audit
    schema:isSimilarTo <http://worldcat.org/entity/work/data/4496015682#CreativeWork/> ;
    schema:name "Supply Chain Risk Management : Applying Secure Acquisition Principles to Ensure a Trusted Technology Product"@en ;
    schema:productID "1007500112" ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=5292112> ;
    schema:url <http://www.crcnetbase.com/isbn/9781315279572> ;
    schema:url <http://uproxy.library.dc-uoit.ca/login?url=https://www.taylorfrancis.com/books/9781315279565> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=5124580> ;
    schema:url <https://0-www-taylorfrancis-com.pugwash.lib.warwick.ac.uk/books/9781315279565> ;
    schema:url <http://ezaccess.libraries.psu.edu/login?url=https://www.taylorfrancis.com/books/9781315279565> ;
    schema:url <https://www.taylorfrancis.com/books/9781315279565> ;
    schema:url <http://www.myilibrary.com?id=1047647> ;
    schema:workExample <http://worldcat.org/isbn/9781315279541> ;
    schema:workExample <http://worldcat.org/isbn/9781315279572> ;
    schema:workExample <http://worldcat.org/isbn/9781315279565> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1007500112> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/4496015682#Person/kohnke_anne> # Anne Kohnke
    a schema:Person ;
    schema:familyName "Kohnke" ;
    schema:givenName "Anne" ;
    schema:name "Anne Kohnke" ;
    .

<http://experiment.worldcat.org/entity/work/data/4496015682#Person/shoemaker_dan> # Dan Shoemaker
    a schema:Person ;
    schema:familyName "Shoemaker" ;
    schema:givenName "Dan" ;
    schema:name "Dan Shoemaker" ;
    .

<http://experiment.worldcat.org/entity/work/data/4496015682#Person/sigler_ken> # Ken Sigler
    a schema:Person ;
    schema:familyName "Sigler" ;
    schema:givenName "Ken" ;
    schema:name "Ken Sigler" ;
    .

<http://experiment.worldcat.org/entity/work/data/4496015682#Series/internal_audit_and_it_audit> # Internal Audit and IT Audit
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1007500112> ; # Supply Chain Risk Management : Applying Secure Acquisition Principles to Ensure a Trusted Technology Product
    schema:name "Internal Audit and IT Audit" ;
    .

<http://experiment.worldcat.org/entity/work/data/4496015682#Topic/businessnetbase_managementnetbase> # BUSINESSnetBASE/MANAGEMENTnetBASE
    a schema:Intangible ;
    schema:name "BUSINESSnetBASE/MANAGEMENTnetBASE"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4496015682#Topic/computing_&_it_security> # Computing & IT Security
    a schema:Intangible ;
    schema:name "Computing & IT Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4496015682#Topic/industrialengineeringnetbase> # INDUSTRIALENGINEERINGnetBASE
    a schema:Intangible ;
    schema:name "INDUSTRIALENGINEERINGnetBASE"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4496015682#Topic/informationsciencenetbase> # INFORMATIONSCIENCEnetBASE
    a schema:Intangible ;
    schema:name "INFORMATIONSCIENCEnetBASE"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4496015682#Topic/infosecuritynetbase> # InfoSECURITYnetBASE
    a schema:Intangible ;
    schema:name "InfoSECURITYnetBASE"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4496015682#Topic/projectmanagementnetbase> # PROJECTMANAGEMENTnetBASE
    a schema:Intangible ;
    schema:name "PROJECTMANAGEMENTnetBASE"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4496015682#Topic/quality_control_&_reliability> # Quality Control & Reliability
    a schema:Intangible ;
    schema:name "Quality Control & Reliability"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4496015682#Topic/supply_chain_management> # Supply Chain Management
    a schema:Intangible ;
    schema:name "Supply Chain Management"@en ;
    .

<http://uproxy.library.dc-uoit.ca/login?url=https://www.taylorfrancis.com/books/9781315279565>
    rdfs:comment "eBook available for UOIT via Taylor & Francis. Click link to access" ;
    .

<http://worldcat.org/entity/work/data/4496015682#CreativeWork/>
    a schema:CreativeWork ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1007500112> ; # Supply Chain Risk Management : Applying Secure Acquisition Principles to Ensure a Trusted Technology Product
    .

<http://worldcat.org/isbn/9781315279541>
    a schema:ProductModel ;
    schema:isbn "1315279541" ;
    schema:isbn "9781315279541" ;
    .

<http://worldcat.org/isbn/9781315279565>
    a schema:ProductModel ;
    schema:isbn "1315279568" ;
    schema:isbn "9781315279565" ;
    .

<http://worldcat.org/isbn/9781315279572>
    a schema:ProductModel ;
    schema:isbn "1315279576" ;
    schema:isbn "9781315279572" ;
    .

<http://www.worldcat.org/title/-/oclc/1007500112>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/1007500112> ; # Supply Chain Risk Management : Applying Secure Acquisition Principles to Ensure a Trusted Technology Product
    schema:dateModified "2018-10-19" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .

<https://0-www-taylorfrancis-com.pugwash.lib.warwick.ac.uk/books/9781315279565>
    rdfs:comment "Connect to Taylor and Francis e-book" ;
    .

<https://www.taylorfrancis.com/books/9781315279565>
    rdfs:comment "Distributed by publisher. Purchase or institutional license may be required for access." ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.