Index_C


C

Capability

man-made threat agents and, 56

man-made threats and, 54

Career development

See also Consultant, becoming a

associations, 310–311

certifications, 303, 309–310

educational requirements, 304–305

establishing and managing, 300–304

experience, getting, 308–309

Internet, use of, 307–308

networking, 306–307

professionals, help from, 312–314

program, description of, 297–300

trade journals/magazines, use of, 308

training and conferences, 305, 308

Carnivore, 30

Catalysts

man-made threat agents and, 58

man-made threats and, 54

threat factors, 70

Certifications, 303, 309–310

Certified Fraud Examiner (CFE), 303

Certified Information Systems Auditor (CISA), 303

Certified Information Systems Security Professional (CISSP), 303

Certified Protection Professional (CPP), 303

Codes of ethics, 286–291

Commercial groups, 62

Communicating with management, 33–39

Communications technology, historical development of, 12–13

Competition, global, 348–350

Competitive advantage

creating, 39

information warfare and, 278–281

Computer Crime and Security Survey, 23

Computer crimes, statistics on, 23

Computer forensics support, 244–245

Computers, biological, 345

Computer Security Institute, 23

Consultant, becoming a

advisory services, 334–335

assessment services, 334

augmentation services, 335

engagement process, 333–334

engagement setup, 331–333

international issues, 335–336

legal issues, 335

planning for, 329–331

security implementation, 335

what is necessary, 327–329

Contingency and emergency planning and disaster recovery program (CEP-DR), 187–191

Copyright violations, 346

Corporate ethics, 291–292

Corporate Information Assets Protection Program (CIAPP), 48, 53

access control and compliance, 148–149

basic principles of, 107–108, 126–132

directives, 140–141

ethics and, 292

future management of, 350–351

off-site, 151–152

organization structure, 147

physical security, 141

policies, 133–141

procedures, 142–143

requirements, 132

risk management, 149–151

subordinate organizations, 145–152

Cost avoidance metrics, 217–218

CourtTV, 31

Crimes, high-technology

computer forensics support, 244–245

law enforcement, dealing with, 245–247

responsibilities of ISSO, 242–244

Criminal justice systems, changes to, 21–24

Criminals, 62–64

Curiosity, motive and, 72




The Information Systems Security Officer's Guide. Establishing and Managing an Information Protection Program
The Information Systems Security Officers Guide: Establishing and Managing an Information Protection Program
ISBN: 0750698969
EAN: 2147483647
Year: 2002
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net