|
Capability
man-made threat agents and, 56
man-made threats and, 54
Career development
See also Consultant, becoming a
associations, 310–311
certifications, 303, 309–310
educational requirements, 304–305
establishing and managing, 300–304
experience, getting, 308–309
Internet, use of, 307–308
networking, 306–307
professionals, help from, 312–314
program, description of, 297–300
trade journals/magazines, use of, 308
training and conferences, 305, 308
Carnivore, 30
Catalysts
man-made threat agents and, 58
man-made threats and, 54
threat factors, 70
Certifications, 303, 309–310
Certified Fraud Examiner (CFE), 303
Certified Information Systems Auditor (CISA), 303
Certified Information Systems Security Professional (CISSP), 303
Certified Protection Professional (CPP), 303
Codes of ethics, 286–291
Commercial groups, 62
Communicating with management, 33–39
Communications technology, historical development of, 12–13
Competition, global, 348–350
Competitive advantage
creating, 39
information warfare and, 278–281
Computer Crime and Security Survey, 23
Computer crimes, statistics on, 23
Computer forensics support, 244–245
Computers, biological, 345
Computer Security Institute, 23
Consultant, becoming a
advisory services, 334–335
assessment services, 334
augmentation services, 335
engagement process, 333–334
engagement setup, 331–333
international issues, 335–336
legal issues, 335
planning for, 329–331
security implementation, 335
what is necessary, 327–329
Contingency and emergency planning and disaster recovery program (CEP-DR), 187–191
Copyright violations, 346
Corporate ethics, 291–292
Corporate Information Assets Protection Program (CIAPP), 48, 53
access control and compliance, 148–149
basic principles of, 107–108, 126–132
directives, 140–141
ethics and, 292
future management of, 350–351
off-site, 151–152
organization structure, 147
physical security, 141
policies, 133–141
procedures, 142–143
requirements, 132
risk management, 149–151
subordinate organizations, 145–152
Cost avoidance metrics, 217–218
CourtTV, 31
Crimes, high-technology
computer forensics support, 244–245
law enforcement, dealing with, 245–247
responsibilities of ISSO, 242–244
Criminal justice systems, changes to, 21–24
Criminals, 62–64
Curiosity, motive and, 72
|