Flylib.com
Implementing Homeland Security for Enterprise IT
Implementing Homeland Security for Enterprise IT
ISBN: 1555583121
EAN: 2147483647
Year: 2003
Pages: 248
Authors:
Michael Erbschloe
BUY ON AMAZON
Table of Contents
BackCover
Implementing Homeland Security for Enterprise IT
Foreword
Preface
Introduction
Cybersecurity in the age of terrorism
Chapter 1: Organizing Homeland Security Efforts
1.1 Agreeing that the threat is real
1.2 Establishing a legal basis to pursue security
1.3 Coordinating efforts to improve security
1.4 International cooperation to improve security
1.5 Improvement of security skills and efforts
1.6 Creation of a threat condition system
1.7 Establishing an incident- and tip-reporting system
1.8 Funding for homeland security
1.9 Preparing for the impact of change
Chapter 2: Cross-Sector Security Priorities and Issues
2.1 Terrorist attacks changed IT management practices
2.2 Staffing IT remains a challenge in most organizations
2.3 DRPs are in place, but training lags
2.4 IS security plans are in place, but training lags
2.5 Privacy plans are in place, and training keeps pace
2.6 End-user training remains a weak spot
2.7 Professional concerns about IT and society
2.8 Background of survey respondents
2.9 Blending government change with reality
Chapter 3: Security and Critical Infrastructures
3.1 Identifying critical national-infrastructure components
3.2 Treating security improvement as a process
3.3 Leveraging technology for security at the national level
3.4 Applying the national strategy at the organizational level
3.5 The security-improvement process in the organization
3.6 Integrating organizational and national strategies
Chapter 4: Information Sharing for Protecting National Assets
4.1 The information-sharing mission
4.2 Information-Sharing Mechanisms
4.3 What information to share and how to report incidents
4.4 Deciding how to participate in information sharing
Chapter 5: Homeland Security Initiatives by Sector
5.2 Water
5.3 Public health
5.4 Emergency services
5.5 Defense industrial base
5.6 Telecommunications
5.7 Energy
5.8 Transportation
5.9 Banking and finance
5.10 Chemical industry and hazardous materials
5.11 Postal and shipping
5.12 Protection of key assets
5.13 Leveraging IT in security initiatives
Chapter 6: Why a National Strategy to Secure Cyberspace Is Important
6.1 The DHS cybersecurity organization
6.2 The nature of information warfare
6.3 The emergence of the blended threat
6.4 Redefining cyberattacks in the age of terrorism
6.5 Measuring the impact of cyberattacks
6.6 Evaluating the cybervulnerability of an organization
Chapter 7: Participating in a National Cyberspace Security Response System
7.1 The architecture for responding to national-level cyberincidents
7.2 Tactical and strategic analysis of cyberattacks and vulnerability assessments
7.3 A shared view of the health of cyberspace
7.4 The CWIN
7.5 Continuity and contingency planning efforts
7.6 Mobilizing organization resources for priority I
Chapter 8: Participating in a National Threat and Vulnerability Reduction Program
8.1 Law-enforcement capabilities
8.2 National vulnerability assessments
8.3 Deploying more secure technology and trusted systems
8.4 Upgrading software to remediate vulnerabilities
8.5 Physically Securing Technology Facilities
8.6 Prioritizing cybersecurity research
8.7 Mobilizing organizational resources for priority II
Chapter 9: Launching a National Cyberspace Security Awareness and Training Program
9.1 Raising national awareness
9.2 Launching an internal awareness campaign
9.3 Launching an in-house training program on cybersecurity
9.4 Professional cybersecurity certifications
9.5 Mobilizing organizational resources for priority III
Chapter 10: Working to Secure Governments Cyberspace
10.1 Continuously assessing threats and vulnerabilities
10.2 Trusted individuals
10.3 Wireless security
10.4 Security for outsourcing and procurement
10.5 Working with local government
10.6 Mobilizing organization resources for priority IV
Chapter 11: Global Cyberspace Security Cooperation
11.1 Strengthen cyber-related counterintelligence efforts
11.2 Improve attack attribution and response
11.3 Partnerships among international public and private sectors
11.4 Watch-and-warning networks
11.5 CoE Convention on Cybercrime
11.6 Mobilizing organization resources for priority V
Chapter 12: Moving into the Future
12.1 The perspective of law enforcement
12.2 The homeland security road map for IT
Appendix A: Homeland Security Acronyms
Appendix B: Homeland Security Resources
Alaska
Arizona
Arkansas
California
Colorado
Connecticut
Delaware
District of Columbia
Florida
Georgia
Hawaii
Idaho
Illinois
Indiana
Iowa
Kansas
Kentucky
Louisiana
Maine
Maryland
Massachusetts
Michigan
Minnesota
Mississippi
Missouri
Montana
Nebraska
Nevada
New Hampshire
New Jersey
New Mexico
New York
North Carolina
North Dakota
Ohio
Oklahoma
Oregon
Pennsylvania
Puerto Rico
Rhode Island
South Carolina
South Dakota
Tennessee
Texas
Utah
Vermont
Virginia
Washington
West Virginia
Wisconsin
Wyoming
Guam
Northern Mariana Islands
Virgin Islands
American Samoa
American Biological Safety Association (ABSA)
American College for Preventative Medicine (ACPM)
American Institute of Homeland Defense
American Public University System (APUS)
American Radio Relay League (ARRL)-The National Association for Amateur Radio
Association of Former Intelligence Officers (AFIO)
Association of Schools of Public Health
ATF Online-Training
Bioterrorism Learning Center
BombSecurity.com Consulting and Training Resources
Bureau of Explosives
Casualty Care Research Center (CCRC)
The Center for National Response
The Center for Counterterrorism Studies (CT Studies)
Center for Public Safety, Northwestern University
Center for Terrorism Preparedness, University of Findlay
Centers for the Study of Bioterrorism and Emerging Infections
CERT Coordination Center (CERTCC)
Children,Terrorism, and Disasters-American Academy of Pediatrics
Computer-Aided Management of Emergency Operations (CAMEO)
Defense Security Service (DSS) Academy
Energetic Materials Research and Testing Center (EMRTC)
Explosive Ordnance Technologies, Inc. (EOTI)
Extension Disaster Education Network (EDEN)
Federal Emergency Management Agency (FEMA)
Federal Learning Exchange (FLX)
Fort Sherman Institute:An Institute for Human Protection
The Humane Society of the United States (HSUS)
InfraGard
Interagency Operations Security Support Staff (IOSS)
International Association of Bomb Technicians and Investigators (IABTI)
International Association of Chiefs of Police (IACP)
International Association of Fire Fighters (IAFF) Virtual Academy
International Money Laundering Information Network (IMoLIN)
International Tactical EMS Association (TEMS)
Law Enforcement Agency Resource Network (LEARN)
Law Enforcement, Emergency Management, and Corrections Training Resources (LECTR)
Management Development Centers
Multistate Anti-Terrorism Information Exchange (MATRIX)
National Cybercrime Training Partnership
National Environmental Health Association (NEHA)
National Fire Academy (NFA) Training Resources
National Fire Protection Association (NFPA)
National Institute for Occupational Training and Health (NIOSH)
National Interagency Civil-Military Institute (NICI)
National Law Enforcement and Corrections Technology Centers (NLECTC), National Institute of Justice
National Law Enforcement Trainers Association (NLETA)
National Ocean Service, Office of Response and Restoration
National Personal Protective Technology Laboratory (NPPTL)
National Sheriffs Association (NSA)
National Tactical Officers Association (NTOA)
National Terrorism Preparedness Institute (NTPI), Southeastern Public Safety Institute, St. Petersburg College
Office for Domestic Preparedness (ODP)
Office of Community-Oriented Policing Services (COPS)
Public Health Emergency Preparedness and Response Centers for Disease Control and Prevention (CDC)
Radiation Emergency Assistance CenterTraining Site (REACTS)
RAND Center for Domestic and International Health Security
SEARCH, the National Consortium for Justice Information and Statistics
State and Local Anti-Terrorism Training (SLATT) Program, Bureau of Justice Assistance
State Domestic Preparedness, National Emergency Management Association (NEMA)
Substance Abuse and Mental Health Services Administration s National Mental Health Information Center-U.S. Department of Health and Human Services
Transportation Emergency Preparedness Program
Transportation Technology Center, Inc.
United States Army Medical Research Institute of Chemical Defense, Chemical Casualty Care Division (USAMRICD-CCCD)
United States Army Medical Research Institute of Infectious Diseases (USAMRIID)
U.S. Department of Homeland Security (DHS)
U.S. Food and Drug Administration s Bioterrorism Home Page
U.S. Geological Survey (USGS)
U.S. National Response Center (NRC), U.S. National Response Team (NRT)
U.S. Northern Command-Defending the Homeland
Weapons of Mass Destruction Civil Support Teams (WMD-CST)
World Health Organization (WHO)
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J-K
Index_L
Index_M-N
Index_O
Index_P
Index_R-S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
Implementing Homeland Security for Enterprise IT
ISBN: 1555583121
EAN: 2147483647
Year: 2003
Pages: 248
Authors:
Michael Erbschloe
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Simplify
Principles and Practices
Phase: Explore
Explore Summary
Phase: Adapt
VBScript Programmers Reference
Variables and Procedures
Error Handling and Debugging
Regular Expressions
HTML Applications
Appendix D Visual Basic Constants Supported in VBScript
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
UPDATE
Summary
PostgreSQL Administration
Securing the PostgreSQL Data Files
Starting the Replication Daemons
An Introduction to Design Patterns in C++ with Qt 4
Example Project: Using QApplication and QLabel
Style Guidelines and Naming Conventions
Composite Pattern: Parents and Children
Creational Patterns
Preference: An Enumerated Type
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Connector Types and Uses
Infrastructure Wiring Basics
Computer Network Hardware
Home Security Surveillance Systems
Defining Users Needs and Desires
Extending and Embedding PHP
Compiling on Win32
Returning Values
PHP4 Objects
Advanced Embedding
Parameter Retrieval
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies