Index_C

 < Day Day Up > 



C

Centers of Academic Excellence in Information Assurance Education (CAEIAE), 139-140

recognition, 140

universities, 140-142

Certifications, 160-163

CISSP, 160-161

GIAC, 162

SSCP, 161

Certified Information Systems Security Professional (CISSP), 160-161

examination, 160

security test domains, 161

Chain of custody, 190

Change

government, blending with reality, 55-56

impact, preparing for, 22-23

IT management practices, 26-27

Chemical sector, 103

Chemical threats, 66-69

CoE Convention on Cybercrime, 195-222

Article 1: Definitions, 197

Article 2: Illegal Access, 197

Article 3: Illegal interception, 197-198

Article 4: Data interference, 198

Article 5: System interference, 198

Article 6: Misuse of devices, 198-199

Article 7: Computer-related forgery, 199

Article 8: Computer-related fraud, 199

Article 9: Offenses related to child pornography, 199-200

Article 10: Offenses related to infringements of copyright, 200-201

Article 11: Attempt and aiding or abetting, 201

Article 12: Corporate liability, 201-202

Article 13: Sanctions and measures, 202

Article 14: Scope of procedural provisions, 202-203

Article 15: Conditions and safeguards, 203

Article 16: Expedited preservation of stored computer data, 203-204

Article 17: Expedited preservation and partial disclosure of traffic data, 204

Article 18: Production order, 204-205

Article 19: Search and seizure of stored computer data, 205-206

Article 20: Real-time collection of traffic data, 206-207

Article 21: Interception of content data, 207

Article 22: Jurisdiction, 207-208

Article 23: General principles relating to international cooperation, 208

Article 24: Extradition, 208-210

Article 25: General principles relating to mutual assistance, 210

Article 26: Spontaneous information, 210-211

Article 27: Procedures pertaining to mutual assistance requests, 211-213

Article 28: Confidentiality and limitation on use, 213

Article 29: Expedited preservation of stored computer data, 213-215

Article 30: Expedited disclosure of preserved traffic data, 215

Article 31: Mutual assistance regarding accessing of stored computer data, 215

Article 32: Transborder access to stored computer data, 215-216

Article 33: Mutual assistance regarding real-time collection of traffic data, 216

Article 34: Mutual assistance regarding interception of content data, 216

Article 35: 24/7 network, 216-217

Article 36: Signature and entry into force, 217

Article 37: Accession to the Convention, 217-218

Article 38: Territorial application, 218

Article 39: Effects of the Convention, 218-219

Article 40: Declarations, 219

Article 41: Federal clause, 219

Article 42: Reservations, 220

Article 43: Status and withdrawal of reservations, 220

Article 44: Amendments, 220-221

Article 45: Settlement of disputes, 221

Article 46: Consultations of the Parties, 221-222

Article 47: Denunciation, 222

Article 48: Notification, 222

defined, 196

member states, 196

See also Global cyberspace security

Commercial centers protection, 106

Common Criteria

Evaluation and Validation Scheme (CCEVS), 144

information about, 145

tested product categories, 145-146

Testing Laboratories (CCTL), 145

Communications Analysis Section, 11

Communications Decency Act (CDA), 133-134

Computer Emergency Response Team Coordination Center (CERT/CC), 17

Computer emergency response teams (CERTs), 181

Computer Forensic Tool Testing (CFTT), 72

Computer-incident training status, 30

Contingency planning, 135

Continuity planning, 135

Contract administration practices, 176

Costs

information warfare, 113

low productivity, 126

system restoration, 125-126

Counterintelligence, strengthening, 186-190

Counterterrorism Division, 13

Counter-Terrorism Training Coordination Working Group, 226

Counterterrorism units, 11-12

Critical Infrastructure Protection in the Information Age, 166

Critical infrastructures, 57-77

component identification, 57-59

protection, 80

Cross-sector security, 25-56

Action Checklist, 55-56

high-priority initiatives, 60

survey, 25-55

CT Watch, 11

CWIN, 81, 134-135

Cyberattacks

impact, measuring, 121-127

impact data requirement, 125

on individuals, 123-124

on organizations, 121-122

redefining, 120-121

on societies, 124

system restoration costs, 125-126

tactical and strategic analysis, 131-132

See also Attacks

Cybersecurity

electric power/industrial control systems, 64-65

FTC article, 156-157

in-house training programs, launching, 157-160

professional certifications, 160-163

research, prioritizing, 149

standards/technologies, 64

Cyberspace

global security cooperation, 185-223

government security, 165-183

health of, 133-134

Cyberterrorism, 110

Cybervulnerability, 127-128



 < Day Day Up > 



Implementing Homeland Security for Enterprise IT
Implementing Homeland Security for Enterprise IT
ISBN: 1555583121
EAN: 2147483647
Year: 2003
Pages: 248

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net