PREFACE

War is always a product of its age. And information systems are one of the primary drivers of war in the age of information. The tools and tactics used to fight the information war have evolved with advances in technology. So, it is no wonder that the tools and tactics needed to defend critical information systems must also evolve.

One of the tools in the defense toolkit is the process known as Certification and Accreditation (C&A) or authorization. At its best, C&A can be extremely effective in ensuring the implementation of the measures necessary to protect the information network. At its worst, it can be cumbersome, laborious, and costly without providing any real security value.

The challenges of effectively executing C&A – or ...

Get The Definitive Guide to the C Transformation Process now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.