Index_I

 < Day Day Up > 



I

ICAT Metabase, 142, 143

Incidents

damage amounts, 91

evidence compilation, 89-91

reporting, 16-19, 88-92

Individuals

cyberattacks on, 123-124

trusted, 168-170

Information access

as Internet benefit, 40

as Internet fear, 45

Information Analysis and Infrastructure Protection Directorate, 9

Information Assurance Courseware Evaluation (IACE), 139

submission, 140

Working Group (IACEWG), 139

Information assurance (IA), 138

education/training requirements, 139

training, 138

Information sharing, 79-93

mechanisms, 81-88

mission, 79-80

participation in, 92-93

selection, 88-92

See also InfraGard

Information-Sharing and Analysis Centers, 81

Information Systems Security Association (ISSA), 163

Information warfare, 111-114

corporations as targets, 113-114

expense, 113

large-scale offensive, 113

strategies, 112-113

Information Warfare: How to Survive Cyber Attacks, 111

InfraGard, 82

Article I, 84

Article II, 84

Article III, 85

Article IV, 85

Article V, 85-86

Article VI, 86-87

Article VII, 87

Article VIII, 87

Article IX, 87

bylaws, 84-87

chapters, 82-83

code of ethics, 87-88

members, becoming, 92

Preamble, 84

reporting, 83

services, 82

See also Information sharing

Institute of Electrical and Electronics Engineers (IEEE), 65

Intellectual property management, 33

Interconnection security agreements (ISAs), 169-170

covered areas, 169

defined, 169

illustrated, 170

Internal awareness campaigns

elements, 155

FTC, 155-157

launching, 155-157

list of, 152-153

See also Awareness

International cooperation, 10

International Hi-Tech Crime and Forensics Conference (IHCFC), 193

International Organization on Computer Evidence (IOCE), 188

defined, 193

establishment, 193

further debate items, 194

international principles, 193

principles approval, 194

Internet

global nature of, 133

government regulations of, 52-53

greatest benefits, 40-45

information access, 40

monitoring use of, 53

regulation, 134

worst things enabled by, 45-51

Internet Engineering Task Force (IETF), 172

Internet Service Providers (ISPs), 98

IS security training status, 30

IT

management practices, 26-27

professional concerns, 34-39

salary levels, 28-29

staffing challenge, 28-29

staffing levels, 28

IT Management Action Checklist, 230-231, 234-235

defined, 230-231

illustrated, 234-235

IT security

evaluation criteria, 144

plans, 29-31

road map, 230-237

state, 25

training status, 30

IT Security Action Checklist, 231, 235-237

defined, 231

illustrated, 235-237



 < Day Day Up > 



Implementing Homeland Security for Enterprise IT
Implementing Homeland Security for Enterprise IT
ISBN: 1555583121
EAN: 2147483647
Year: 2003
Pages: 248

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net