| < Day Day Up > |
|
Centers of Academic Excellence in Information Assurance Education (CAEIAE), 139-140
recognition, 140
universities, 140-142
Certifications, 160-163
CISSP, 160-161
GIAC, 162
SSCP, 161
Certified Information Systems Security Professional (CISSP), 160-161
examination, 160
security test domains, 161
Chain of custody, 190
Change
government, blending with reality, 55-56
impact, preparing for, 22-23
IT management practices, 26-27
Chemical sector, 103
Chemical threats, 66-69
CoE Convention on Cybercrime, 195-222
Article 1: Definitions, 197
Article 2: Illegal Access, 197
Article 3: Illegal interception, 197-198
Article 4: Data interference, 198
Article 5: System interference, 198
Article 6: Misuse of devices, 198-199
Article 7: Computer-related forgery, 199
Article 8: Computer-related fraud, 199
Article 9: Offenses related to child pornography, 199-200
Article 10: Offenses related to infringements of copyright, 200-201
Article 11: Attempt and aiding or abetting, 201
Article 12: Corporate liability, 201-202
Article 13: Sanctions and measures, 202
Article 14: Scope of procedural provisions, 202-203
Article 15: Conditions and safeguards, 203
Article 16: Expedited preservation of stored computer data, 203-204
Article 17: Expedited preservation and partial disclosure of traffic data, 204
Article 18: Production order, 204-205
Article 19: Search and seizure of stored computer data, 205-206
Article 20: Real-time collection of traffic data, 206-207
Article 21: Interception of content data, 207
Article 22: Jurisdiction, 207-208
Article 23: General principles relating to international cooperation, 208
Article 24: Extradition, 208-210
Article 25: General principles relating to mutual assistance, 210
Article 26: Spontaneous information, 210-211
Article 27: Procedures pertaining to mutual assistance requests, 211-213
Article 28: Confidentiality and limitation on use, 213
Article 29: Expedited preservation of stored computer data, 213-215
Article 30: Expedited disclosure of preserved traffic data, 215
Article 31: Mutual assistance regarding accessing of stored computer data, 215
Article 32: Transborder access to stored computer data, 215-216
Article 33: Mutual assistance regarding real-time collection of traffic data, 216
Article 34: Mutual assistance regarding interception of content data, 216
Article 35: 24/7 network, 216-217
Article 36: Signature and entry into force, 217
Article 37: Accession to the Convention, 217-218
Article 38: Territorial application, 218
Article 39: Effects of the Convention, 218-219
Article 40: Declarations, 219
Article 41: Federal clause, 219
Article 42: Reservations, 220
Article 43: Status and withdrawal of reservations, 220
Article 44: Amendments, 220-221
Article 45: Settlement of disputes, 221
Article 46: Consultations of the Parties, 221-222
Article 47: Denunciation, 222
Article 48: Notification, 222
defined, 196
member states, 196
See also Global cyberspace security
Commercial centers protection, 106
Common Criteria
Evaluation and Validation Scheme (CCEVS), 144
information about, 145
tested product categories, 145-146
Testing Laboratories (CCTL), 145
Communications Analysis Section, 11
Communications Decency Act (CDA), 133-134
Computer Emergency Response Team Coordination Center (CERT/CC), 17
Computer emergency response teams (CERTs), 181
Computer Forensic Tool Testing (CFTT), 72
Computer-incident training status, 30
Contingency planning, 135
Continuity planning, 135
Contract administration practices, 176
Costs
information warfare, 113
low productivity, 126
system restoration, 125-126
Counterintelligence, strengthening, 186-190
Counterterrorism Division, 13
Counter-Terrorism Training Coordination Working Group, 226
Counterterrorism units, 11-12
Critical Infrastructure Protection in the Information Age, 166
Critical infrastructures, 57-77
component identification, 57-59
protection, 80
Cross-sector security, 25-56
Action Checklist, 55-56
high-priority initiatives, 60
survey, 25-55
CT Watch, 11
CWIN, 81, 134-135
Cyberattacks
impact, measuring, 121-127
impact data requirement, 125
on individuals, 123-124
on organizations, 121-122
redefining, 120-121
on societies, 124
system restoration costs, 125-126
tactical and strategic analysis, 131-132
See also Attacks
Cybersecurity
electric power/industrial control systems, 64-65
FTC article, 156-157
in-house training programs, launching, 157-160
professional certifications, 160-163
research, prioritizing, 149
standards/technologies, 64
Cyberspace
global security cooperation, 185-223
government security, 165-183
health of, 133-134
Cyberterrorism, 110
Cybervulnerability, 127-128
| < Day Day Up > |
|