| < Day Day Up > |
|
ICAT Metabase, 142, 143
Incidents
damage amounts, 91
evidence compilation, 89-91
reporting, 16-19, 88-92
Individuals
cyberattacks on, 123-124
trusted, 168-170
Information access
as Internet benefit, 40
as Internet fear, 45
Information Analysis and Infrastructure Protection Directorate, 9
Information Assurance Courseware Evaluation (IACE), 139
submission, 140
Working Group (IACEWG), 139
Information assurance (IA), 138
education/training requirements, 139
training, 138
Information sharing, 79-93
mechanisms, 81-88
mission, 79-80
participation in, 92-93
selection, 88-92
See also InfraGard
Information-Sharing and Analysis Centers, 81
Information Systems Security Association (ISSA), 163
Information warfare, 111-114
corporations as targets, 113-114
expense, 113
large-scale offensive, 113
strategies, 112-113
Information Warfare: How to Survive Cyber Attacks, 111
InfraGard, 82
Article I, 84
Article II, 84
Article III, 85
Article IV, 85
Article V, 85-86
Article VI, 86-87
Article VII, 87
Article VIII, 87
Article IX, 87
bylaws, 84-87
chapters, 82-83
code of ethics, 87-88
members, becoming, 92
Preamble, 84
reporting, 83
services, 82
See also Information sharing
Institute of Electrical and Electronics Engineers (IEEE), 65
Intellectual property management, 33
Interconnection security agreements (ISAs), 169-170
covered areas, 169
defined, 169
illustrated, 170
Internal awareness campaigns
elements, 155
FTC, 155-157
launching, 155-157
list of, 152-153
See also Awareness
International cooperation, 10
International Hi-Tech Crime and Forensics Conference (IHCFC), 193
International Organization on Computer Evidence (IOCE), 188
defined, 193
establishment, 193
further debate items, 194
international principles, 193
principles approval, 194
Internet
global nature of, 133
government regulations of, 52-53
greatest benefits, 40-45
information access, 40
monitoring use of, 53
regulation, 134
worst things enabled by, 45-51
Internet Engineering Task Force (IETF), 172
Internet Service Providers (ISPs), 98
IS security training status, 30
IT
management practices, 26-27
professional concerns, 34-39
salary levels, 28-29
staffing challenge, 28-29
staffing levels, 28
IT Management Action Checklist, 230-231, 234-235
defined, 230-231
illustrated, 234-235
IT security
evaluation criteria, 144
plans, 29-31
road map, 230-237
state, 25
training status, 30
IT Security Action Checklist, 231, 235-237
defined, 231
illustrated, 235-237
| < Day Day Up > |
|