Flylib.com
Implementing Homeland Security for Enterprise IT
Implementing Homeland Security for Enterprise IT
ISBN: 1555583121
EAN: 2147483647
Year: 2003
Pages: 248
Authors:
Michael Erbschloe
BUY ON AMAZON
Table of Contents
BackCover
Implementing Homeland Security for Enterprise IT
Foreword
Preface
Introduction
Cybersecurity in the age of terrorism
Chapter 1: Organizing Homeland Security Efforts
1.1 Agreeing that the threat is real
1.2 Establishing a legal basis to pursue security
1.3 Coordinating efforts to improve security
1.4 International cooperation to improve security
1.5 Improvement of security skills and efforts
1.6 Creation of a threat condition system
1.7 Establishing an incident- and tip-reporting system
1.8 Funding for homeland security
1.9 Preparing for the impact of change
Chapter 2: Cross-Sector Security Priorities and Issues
2.1 Terrorist attacks changed IT management practices
2.2 Staffing IT remains a challenge in most organizations
2.3 DRPs are in place, but training lags
2.4 IS security plans are in place, but training lags
2.5 Privacy plans are in place, and training keeps pace
2.6 End-user training remains a weak spot
2.7 Professional concerns about IT and society
2.8 Background of survey respondents
2.9 Blending government change with reality
Chapter 3: Security and Critical Infrastructures
3.1 Identifying critical national-infrastructure components
3.2 Treating security improvement as a process
3.3 Leveraging technology for security at the national level
3.4 Applying the national strategy at the organizational level
3.5 The security-improvement process in the organization
3.6 Integrating organizational and national strategies
Chapter 4: Information Sharing for Protecting National Assets
4.1 The information-sharing mission
4.2 Information-Sharing Mechanisms
4.3 What information to share and how to report incidents
4.4 Deciding how to participate in information sharing
Chapter 5: Homeland Security Initiatives by Sector
5.2 Water
5.3 Public health
5.4 Emergency services
5.5 Defense industrial base
5.6 Telecommunications
5.7 Energy
5.8 Transportation
5.9 Banking and finance
5.10 Chemical industry and hazardous materials
5.11 Postal and shipping
5.12 Protection of key assets
5.13 Leveraging IT in security initiatives
Chapter 6: Why a National Strategy to Secure Cyberspace Is Important
6.1 The DHS cybersecurity organization
6.2 The nature of information warfare
6.3 The emergence of the blended threat
6.4 Redefining cyberattacks in the age of terrorism
6.5 Measuring the impact of cyberattacks
6.6 Evaluating the cybervulnerability of an organization
Chapter 7: Participating in a National Cyberspace Security Response System
7.1 The architecture for responding to national-level cyberincidents
7.2 Tactical and strategic analysis of cyberattacks and vulnerability assessments
7.3 A shared view of the health of cyberspace
7.4 The CWIN
7.5 Continuity and contingency planning efforts
7.6 Mobilizing organization resources for priority I
Chapter 8: Participating in a National Threat and Vulnerability Reduction Program
8.1 Law-enforcement capabilities
8.2 National vulnerability assessments
8.3 Deploying more secure technology and trusted systems
8.4 Upgrading software to remediate vulnerabilities
8.5 Physically Securing Technology Facilities
8.6 Prioritizing cybersecurity research
8.7 Mobilizing organizational resources for priority II
Chapter 9: Launching a National Cyberspace Security Awareness and Training Program
9.1 Raising national awareness
9.2 Launching an internal awareness campaign
9.3 Launching an in-house training program on cybersecurity
9.4 Professional cybersecurity certifications
9.5 Mobilizing organizational resources for priority III
Chapter 10: Working to Secure Governments Cyberspace
10.1 Continuously assessing threats and vulnerabilities
10.2 Trusted individuals
10.3 Wireless security
10.4 Security for outsourcing and procurement
10.5 Working with local government
10.6 Mobilizing organization resources for priority IV
Chapter 11: Global Cyberspace Security Cooperation
11.1 Strengthen cyber-related counterintelligence efforts
11.2 Improve attack attribution and response
11.3 Partnerships among international public and private sectors
11.4 Watch-and-warning networks
11.5 CoE Convention on Cybercrime
11.6 Mobilizing organization resources for priority V
Chapter 12: Moving into the Future
12.1 The perspective of law enforcement
12.2 The homeland security road map for IT
Appendix A: Homeland Security Acronyms
Appendix B: Homeland Security Resources
Alaska
Arizona
Arkansas
California
Colorado
Connecticut
Delaware
District of Columbia
Florida
Georgia
Hawaii
Idaho
Illinois
Indiana
Iowa
Kansas
Kentucky
Louisiana
Maine
Maryland
Massachusetts
Michigan
Minnesota
Mississippi
Missouri
Montana
Nebraska
Nevada
New Hampshire
New Jersey
New Mexico
New York
North Carolina
North Dakota
Ohio
Oklahoma
Oregon
Pennsylvania
Puerto Rico
Rhode Island
South Carolina
South Dakota
Tennessee
Texas
Utah
Vermont
Virginia
Washington
West Virginia
Wisconsin
Wyoming
Guam
Northern Mariana Islands
Virgin Islands
American Samoa
American Biological Safety Association (ABSA)
American College for Preventative Medicine (ACPM)
American Institute of Homeland Defense
American Public University System (APUS)
American Radio Relay League (ARRL)-The National Association for Amateur Radio
Association of Former Intelligence Officers (AFIO)
Association of Schools of Public Health
ATF Online-Training
Bioterrorism Learning Center
BombSecurity.com Consulting and Training Resources
Bureau of Explosives
Casualty Care Research Center (CCRC)
The Center for National Response
The Center for Counterterrorism Studies (CT Studies)
Center for Public Safety, Northwestern University
Center for Terrorism Preparedness, University of Findlay
Centers for the Study of Bioterrorism and Emerging Infections
CERT Coordination Center (CERTCC)
Children,Terrorism, and Disasters-American Academy of Pediatrics
Computer-Aided Management of Emergency Operations (CAMEO)
Defense Security Service (DSS) Academy
Energetic Materials Research and Testing Center (EMRTC)
Explosive Ordnance Technologies, Inc. (EOTI)
Extension Disaster Education Network (EDEN)
Federal Emergency Management Agency (FEMA)
Federal Learning Exchange (FLX)
Fort Sherman Institute:An Institute for Human Protection
The Humane Society of the United States (HSUS)
InfraGard
Interagency Operations Security Support Staff (IOSS)
International Association of Bomb Technicians and Investigators (IABTI)
International Association of Chiefs of Police (IACP)
International Association of Fire Fighters (IAFF) Virtual Academy
International Money Laundering Information Network (IMoLIN)
International Tactical EMS Association (TEMS)
Law Enforcement Agency Resource Network (LEARN)
Law Enforcement, Emergency Management, and Corrections Training Resources (LECTR)
Management Development Centers
Multistate Anti-Terrorism Information Exchange (MATRIX)
National Cybercrime Training Partnership
National Environmental Health Association (NEHA)
National Fire Academy (NFA) Training Resources
National Fire Protection Association (NFPA)
National Institute for Occupational Training and Health (NIOSH)
National Interagency Civil-Military Institute (NICI)
National Law Enforcement and Corrections Technology Centers (NLECTC), National Institute of Justice
National Law Enforcement Trainers Association (NLETA)
National Ocean Service, Office of Response and Restoration
National Personal Protective Technology Laboratory (NPPTL)
National Sheriffs Association (NSA)
National Tactical Officers Association (NTOA)
National Terrorism Preparedness Institute (NTPI), Southeastern Public Safety Institute, St. Petersburg College
Office for Domestic Preparedness (ODP)
Office of Community-Oriented Policing Services (COPS)
Public Health Emergency Preparedness and Response Centers for Disease Control and Prevention (CDC)
Radiation Emergency Assistance CenterTraining Site (REACTS)
RAND Center for Domestic and International Health Security
SEARCH, the National Consortium for Justice Information and Statistics
State and Local Anti-Terrorism Training (SLATT) Program, Bureau of Justice Assistance
State Domestic Preparedness, National Emergency Management Association (NEMA)
Substance Abuse and Mental Health Services Administration s National Mental Health Information Center-U.S. Department of Health and Human Services
Transportation Emergency Preparedness Program
Transportation Technology Center, Inc.
United States Army Medical Research Institute of Chemical Defense, Chemical Casualty Care Division (USAMRICD-CCCD)
United States Army Medical Research Institute of Infectious Diseases (USAMRIID)
U.S. Department of Homeland Security (DHS)
U.S. Food and Drug Administration s Bioterrorism Home Page
U.S. Geological Survey (USGS)
U.S. National Response Center (NRC), U.S. National Response Team (NRT)
U.S. Northern Command-Defending the Homeland
Weapons of Mass Destruction Civil Support Teams (WMD-CST)
World Health Organization (WHO)
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J-K
Index_L
Index_M-N
Index_O
Index_P
Index_R-S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
Implementing Homeland Security for Enterprise IT
ISBN: 1555583121
EAN: 2147483647
Year: 2003
Pages: 248
Authors:
Michael Erbschloe
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
ERP Systems Impact on Organizations
Enterprise Application Integration: New Solutions for a Solved Problem or a Challenging Research Field?
A Hybrid Clustering Technique to Improve Patient Data Quality
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
Development of Interactive Web Sites to Enhance Police/Community Relations
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Asymmetric Key Cryptography
Object Description in Cryptography Using ASN.1
Appendix A Solutions to Exercises
Appendix B Algorithms Provided by the Bouncy Castle Provider
Cisco CallManager Fundamentals (2nd Edition)
Cisco CallManager Architecture
Circuit-Switched Systems
H.323 Gateways
Ad Hoc Conferencing
Manageability and Monitoring
Programming Microsoft ASP.NET 3.5
Creating Bindable Grids of Data
Configuration and Deployment
Working with the File System
Creating New ASP.NET Controls
Working with Images in ASP.NET
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Using DMAIC to Improve Speed, Quality, and Cost
Descriptive Statistics and Data Displays
Identifying and Verifying Causes
Reducing Lead Time and Non-Value-Add Cost
Selecting and Testing Solutions
Comparing, Designing, and Deploying VPNs
The Carriers Carrier Architecture
Summary
Deploying SSL VPNs (WebVPN) on the ASA 5500
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies