메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1-825

COMPLETE GUIDE TO SECURITY AND PRIVACY METRICS: Measuring Regulatory Compliance, Operational Resilience, and ROI

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85179193377     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1201/9781420013283     Document Type: Book
Times cited : (86)

References (337)
  • 1
    • 85179286135 scopus 로고    scopus 로고
    • IEC 61508-1(1998-12), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 1: General Requirements
    • IEC 61508-1(1998-12), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 1: General Requirements.
  • 2
    • 85179195931 scopus 로고    scopus 로고
    • IEC 61508-2(2000-5), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 2: Requirements for Electrical/Electronic/ Programmable Electronic Safety-Related Systems
    • IEC 61508-2(2000-5), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 2: Requirements for Electrical/Electronic/ Programmable Electronic Safety-Related Systems.
  • 3
    • 85179263406 scopus 로고    scopus 로고
    • IEC 61508-3(1998-12), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 3: Software Requirements
    • IEC 61508-3(1998-12), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 3: Software Requirements.
  • 4
    • 85179254101 scopus 로고    scopus 로고
    • IEC 61508-4(1998-12), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 4: Definitions and Abbreviations of Terms
    • IEC 61508-4(1998-12), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 4: Definitions and Abbreviations of Terms.
  • 5
    • 85179252049 scopus 로고    scopus 로고
    • IEC 61508-5(1998-12), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 5: Examples of Methods for the Determination of Safety Integrity Levels
    • IEC 61508-5(1998-12), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 5: Examples of Methods for the Determination of Safety Integrity Levels.
  • 6
    • 85179255280 scopus 로고    scopus 로고
    • IEC 61508-6(2000-4), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 6: Guidelines on the Application of Parts 2 and 3
    • IEC 61508-6(2000-4), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 6: Guidelines on the Application of Parts 2 and 3.
  • 7
    • 85179293992 scopus 로고    scopus 로고
    • IEC 61508-7(2000-3), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 7: Overview of Techniques and Measures
    • IEC 61508-7(2000-3), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 7: Overview of Techniques and Measures.
  • 8
    • 85179201597 scopus 로고    scopus 로고
    • IEEE Std. 982.1-1988, Standard Dictionary of Measures to Produce Reliable Software
    • IEEE Std. 982.1-1988, Standard Dictionary of Measures to Produce Reliable Software.
  • 9
    • 85179250116 scopus 로고    scopus 로고
    • IEEE Std. 982.2-1988, Guide for the Use of the Standard Dictionary of Measures to Produce Reliable Software
    • IEEE Std. 982.2-1988, Guide for the Use of the Standard Dictionary of Measures to Produce Reliable Software.
  • 10
    • 85179286344 scopus 로고    scopus 로고
    • IEEE Std. 1028-1997, Standard for Reviews and Audits
    • IEEE Std. 1028-1997, Standard for Reviews and Audits.
  • 11
    • 85179280442 scopus 로고    scopus 로고
    • IEEE Std. 1045-1992, Standard for Software Productivity Metrics
    • IEEE Std. 1045-1992, Standard for Software Productivity Metrics.
  • 12
    • 85179286289 scopus 로고    scopus 로고
    • IEEE Std. 1061-1998, Software Quality Metrics Methodology
    • IEEE Std. 1061-1998, Software Quality Metrics Methodology.
  • 13
    • 85179207217 scopus 로고    scopus 로고
    • ISO 9000 Compendium — International Standards for Quality Management, 10th edition, 2000
    • ISO 9000 Compendium — International Standards for Quality Management, 10th edition, 2000.
  • 14
    • 85179250796 scopus 로고    scopus 로고
    • ISO/IEC TR 13335-1(1996-12-15) — Information Technology — Guidelines for the Management of IT Security — Part 1: Concepts and Models for IT Security
    • ISO/IEC TR 13335-1(1996-12-15) — Information Technology — Guidelines for the Management of IT Security — Part 1: Concepts and Models for IT Security.
  • 15
    • 85179186187 scopus 로고    scopus 로고
    • ISO/IEC TR 13335-2(1997-12-15) — Information Technology — Guidelines for the Management of IT Security — Part 2: Managing and Planning IT Security
    • ISO/IEC TR 13335-2(1997-12-15) — Information Technology — Guidelines for the Management of IT Security — Part 2: Managing and Planning IT Security.
  • 16
    • 85179297895 scopus 로고    scopus 로고
    • ISO/IEC TR 13335-3(1998-06-15) — Information Technology — Guidelines for the Management of IT Security — Part 3: Techniques for the Management of IT security
    • ISO/IEC TR 13335-3(1998-06-15) — Information Technology — Guidelines for the Management of IT Security — Part 3: Techniques for the Management of IT security.
  • 17
    • 85179253123 scopus 로고    scopus 로고
    • ISO/IEC TR 13335-4(2000-03-01) — Information Technology — Guidelines for the Management of IT Security — Part 4: Selection of Safeguards
    • ISO/IEC TR 13335-4(2000-03-01) — Information Technology — Guidelines for the Management of IT Security — Part 4: Selection of Safeguards.
  • 18
    • 85179211991 scopus 로고    scopus 로고
    • ISO/IEC TR 13335-5(2001-11-01) — Information Technology — Guidelines for the Management of IT Security — Part 5: Management Guidance on Network Security
    • ISO/IEC TR 13335-5(2001-11-01) — Information Technology — Guidelines for the Management of IT Security — Part 5: Management Guidance on Network Security.
  • 19
    • 85179262890 scopus 로고    scopus 로고
    • ISO/IEC 15408-1(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 1: Introduction and General Model
    • ISO/IEC 15408-1(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 1: Introduction and General Model.
  • 20
    • 85179202461 scopus 로고    scopus 로고
    • ISO/IEC 15408-2(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 2: Security Functional Requirements
    • ISO/IEC 15408-2(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 2: Security Functional Requirements.
  • 21
    • 85179230191 scopus 로고    scopus 로고
    • ISO/IEC 15408-3(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 3: Security Assurance Requirements
    • ISO/IEC 15408-3(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 3: Security Assurance Requirements.
  • 22
    • 85179238072 scopus 로고    scopus 로고
    • ISO/IEC PDTR 15446(2001-04), Information Technology — Security Techniques — Guide for the Production of Protection Profiles and Security Targets
    • ISO/IEC PDTR 15446(2001-04), Information Technology — Security Techniques — Guide for the Production of Protection Profiles and Security Targets.
  • 23
    • 85179216982 scopus 로고    scopus 로고
    • ISO/IEC 15504-1(2004) — Information Technology — Process Assessment — Part 1: Concepts and Vocabulary
    • ISO/IEC 15504-1(2004) — Information Technology — Process Assessment — Part 1: Concepts and Vocabulary.
  • 24
    • 85179257810 scopus 로고    scopus 로고
    • ISO/IEC 15504-2(2004) — Information Technology — Process Assessment — Part 2: Performing an Assessment
    • ISO/IEC 15504-2(2004) — Information Technology — Process Assessment — Part 2: Performing an Assessment.
  • 25
    • 85179199329 scopus 로고    scopus 로고
    • ISO/IEC 15504-3(2004) — Information Technology — Process Assessment — Part 3: Guidance on Performing an Assessment
    • ISO/IEC 15504-3(2004) — Information Technology — Process Assessment — Part 3: Guidance on Performing an Assessment.
  • 26
    • 85179295449 scopus 로고    scopus 로고
    • ISO/IEC 15504-4(2004) — Information Technology — Process Assessment — Part 4: Guidance on Use for Process Improvement and Process Capability Determination
    • ISO/IEC 15504-4(2004) — Information Technology — Process Assessment — Part 4: Guidance on Use for Process Improvement and Process Capability Determination.
  • 27
    • 85179231608 scopus 로고    scopus 로고
    • ISO/IEC 15504-5(2005) — Information Technology — Process Assessment — Part 5: An Exemplar Process Assessment Model
    • ISO/IEC 15504-5(2005) — Information Technology — Process Assessment — Part 5: An Exemplar Process Assessment Model.
  • 28
    • 85179226260 scopus 로고    scopus 로고
    • ISO/IEC 17799(2000-12-01) — Information Technology — Code of Practice for Information Security Management
    • ISO/IEC 17799(2000-12-01) — Information Technology — Code of Practice for Information Security Management.
  • 29
    • 85179298523 scopus 로고    scopus 로고
    • ISO/IEC 21827(2002-10-17), Information Technology — Systems Security Engineering — Capability Maturity Model (SSE-CMM ®)
    • ISO/IEC 21827(2002-10-17), Information Technology — Systems Security Engineering — Capability Maturity Model (SSE-CMM ®).
  • 31
    • 85179215669 scopus 로고    scopus 로고
    • Standard CIP-002-1 — Cyber Security — Critical Cyber Assets, North America Electric Reliability Council (NERC), April
    • Standard CIP-002-1 — Cyber Security — Critical Cyber Assets, North America Electric Reliability Council (NERC), April 2006.
    • (2006)
  • 32
    • 85179262964 scopus 로고    scopus 로고
    • Standard CIP-003-1 — Cyber Security — Security Management Controls, North America Electric Reliability Council (NERC), April
    • Standard CIP-003-1 — Cyber Security — Security Management Controls, North America Electric Reliability Council (NERC), April 2006.
    • (2006)
  • 33
    • 85179221168 scopus 로고    scopus 로고
    • Standard CIP-004-1 — Cyber Security — Personnel and Training, North America Electric Reliability Council (NERC), April 2006
    • Standard CIP-004-1 — Cyber Security — Personnel and Training, North America Electric Reliability Council (NERC), April 2006.
  • 34
    • 85179265221 scopus 로고    scopus 로고
    • Standard CIP-005-1 — Cyber Security — Electronic Security, North America Electric Reliability Council (NERC), April 2006
    • Standard CIP-005-1 — Cyber Security — Electronic Security, North America Electric Reliability Council (NERC), April 2006.
  • 35
    • 85179297631 scopus 로고    scopus 로고
    • Standard CIP-006-1 — Cyber Security — Physical Security, North America Electric Reliability Council (NERC), April 2006
    • Standard CIP-006-1 — Cyber Security — Physical Security, North America Electric Reliability Council (NERC), April 2006.
  • 36
    • 85179265193 scopus 로고    scopus 로고
    • Standard CIP-007-1 — Cyber Security — System Security Management, North America Electric Reliability Council (NERC), April 2006
    • Standard CIP-007-1 — Cyber Security — System Security Management, North America Electric Reliability Council (NERC), April 2006.
  • 37
    • 85179260106 scopus 로고    scopus 로고
    • Standard CIP-008-1 — Cyber Security — Incident Reporting and Response Planning, North America Electric Reliability Council (NERC), April 2006
    • Standard CIP-008-1 — Cyber Security — Incident Reporting and Response Planning, North America Electric Reliability Council (NERC), April 2006.
  • 38
    • 85179239921 scopus 로고    scopus 로고
    • Standard CIP-009-1 — Cyber Security — Recovery Plans, North America Electric Reliability Council (NERC), April 2006
    • Standard CIP-009-1 — Cyber Security — Recovery Plans, North America Electric Reliability Council (NERC), April 2006.
  • 43
    • 85179198617 scopus 로고    scopus 로고
    • FAA Order 1370.89, Information Operation Conditions, 25 August 2003
    • FAA Order 1370.89, Information Operation Conditions, 25 August 2003.
  • 44
    • 85179197291 scopus 로고    scopus 로고
    • FAA Order 1600.1E, FAA Personnel Security Program, 25 July 2005
    • FAA Order 1600.1E, FAA Personnel Security Program, 25 July 2005.
  • 45
    • 85179289869 scopus 로고    scopus 로고
    • FEMA 452, Risk Assessment: A How-To Guide to Mitigate Potential Terrorist Attacks against Buildings, January 2005
    • FEMA 452, Risk Assessment: A How-To Guide to Mitigate Potential Terrorist Attacks against Buildings, January 2005.
  • 46
    • 85179196520 scopus 로고    scopus 로고
    • FIPS PUB 199 — Standards for Security Categorization of Federal Information and Information Systems, National Institute of Standards and Technology, December 2003
    • FIPS PUB 199 — Standards for Security Categorization of Federal Information and Information Systems, National Institute of Standards and Technology, December 2003.
  • 47
    • 85179249059 scopus 로고    scopus 로고
    • FIPS PUB 200 — Security Controls for Federal Information Systems, National Institute of Standards and Technology, scheduled for December 2005; replaces SP 800-53, including Annexes 1 through 3
    • FIPS PUB 200 — Security Controls for Federal Information Systems, National Institute of Standards and Technology, scheduled for December 2005; replaces SP 800-53, including Annexes 1 through 3.
  • 48
    • 85179190143 scopus 로고    scopus 로고
    • FIPS PUB 201 — Personal Identity Verification (PIV) of Federal Employees and Contractors, National Institute of Standards and Technology, 25 February 2005. 48a
    • FIPS PUB 201 — Personal Identity Verification (PIV) of Federal Employees and Contractors, National Institute of Standards and Technology, 25 February 2005. 48a
  • 49
    • 85179214248 scopus 로고    scopus 로고
    • SP 800-79 — Guidelines for the Certification and Accreditation of PIV Card Issuing Organizations, draft 1.1, National Institute of Standards and Technology, June 2005. 48b
    • SP 800-79 — Guidelines for the Certification and Accreditation of PIV Card Issuing Organizations, draft 1.1, National Institute of Standards and Technology, June 2005. 48b
  • 50
    • 85179227026 scopus 로고    scopus 로고
    • public draft, U.S. General Services Administration, March, . 48c
    • Federal Identity Management Handbook, public draft, U.S. General Services Administration, March 2005. 48c
    • (2005) Federal Identity Management Handbook
  • 51
    • 85179273737 scopus 로고    scopus 로고
    • SP 800-76 — Biometric Data Specification for Personal Identity Verification (draft), National Institute of Standards and Technology, 24 January 2005. 48d
    • SP 800-76 — Biometric Data Specification for Personal Identity Verification (draft), National Institute of Standards and Technology, 24 January 2005. 48d
  • 52
    • 85179292341 scopus 로고    scopus 로고
    • SP 800-73 — Interfaces for Personal Identity Verification, National Institute of Standards and Technology, April 2005
    • SP 800-73 — Interfaces for Personal Identity Verification, National Institute of Standards and Technology, April 2005.
  • 53
    • 85179242532 scopus 로고    scopus 로고
    • SP 800-18 — Guide for Developing Security Plans for Information Technology Systems, National Institute of Standards and Technology, December 1998
    • SP 800-18 — Guide for Developing Security Plans for Information Technology Systems, National Institute of Standards and Technology, December 1998.
  • 54
    • 85179192346 scopus 로고    scopus 로고
    • SP 800-30 — Risk Management Guide for Information Technology Systems, National Institute of Standards and Technology, July 2002
    • SP 800-30 — Risk Management Guide for Information Technology Systems, National Institute of Standards and Technology, July 2002.
  • 55
    • 85179222627 scopus 로고    scopus 로고
    • SP 800-37 — Guide for the Security Certification and Accreditation of Federal Information Systems, National Institute of Standards and Technology, May 2004
    • SP 800-37 — Guide for the Security Certification and Accreditation of Federal Information Systems, National Institute of Standards and Technology, May 2004.
  • 56
    • 85179280311 scopus 로고    scopus 로고
    • SP 800-53 — Recommended Security Controls for Federal Information Systems, February 2005
    • SP 800-53 — Recommended Security Controls for Federal Information Systems, February 2005.
  • 57
    • 85179299263 scopus 로고    scopus 로고
    • Annex 1 to SP 800-53 — Recommended Security Controls for Federal Information Systems: Minimum Security Controls, Low Baseline, February 2005
    • Annex 1 to SP 800-53 — Recommended Security Controls for Federal Information Systems: Minimum Security Controls, Low Baseline, February 2005.
  • 58
    • 85179273791 scopus 로고    scopus 로고
    • Annex 2 to SP 800-53 — Recommended Security Controls for Federal Information Systems: Minimum Security Controls, Moderate Baseline, February 2005
    • Annex 2 to SP 800-53 — Recommended Security Controls for Federal Information Systems: Minimum Security Controls, Moderate Baseline, February 2005.
  • 59
    • 85179233534 scopus 로고    scopus 로고
    • Annex 3 to SP 800-53 — Recommended Security Controls for Federal Information Systems: Minimum Security Controls, High Baseline, February 2005
    • Annex 3 to SP 800-53 — Recommended Security Controls for Federal Information Systems: Minimum Security Controls, High Baseline, February 2005.
  • 60
    • 85179238887 scopus 로고    scopus 로고
    • SP 800-53A — Guide for Assessing the Security Controls in Federal Information Systems, National Institute of Standards and Technology, Spring 2005
    • SP 800-53A — Guide for Assessing the Security Controls in Federal Information Systems, National Institute of Standards and Technology, Spring 2005.
  • 61
    • 85179192382 scopus 로고    scopus 로고
    • SP 800-55 — Security Metrics Guide for Information Technology Systems, National Institute of Standards and Technology, July 2003. 57a
    • SP 800-55 — Security Metrics Guide for Information Technology Systems, National Institute of Standards and Technology, July 2003. 57a.
  • 62
    • 85179187505 scopus 로고    scopus 로고
    • SP 800-80 — Guide for Developing Performance Metrics for Information Security (draft), National Institute of Standards and Technology, May 2006
    • SP 800-80 — Guide for Developing Performance Metrics for Information Security (draft), National Institute of Standards and Technology, May 2006.
  • 63
    • 85179195885 scopus 로고    scopus 로고
    • SP 800-60 — Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories, National Institute of Standards and Technology, July 2004
    • SP 800-60 — Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories, National Institute of Standards and Technology, July 2004.
  • 64
    • 85179263337 scopus 로고    scopus 로고
    • SP 800-60 — Volume II: Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories, National Institute of Standards and Technology, July 2004
    • SP 800-60 — Volume II: Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories, National Institute of Standards and Technology, July 2004.
  • 65
    • 85179268023 scopus 로고    scopus 로고
    • SP 800-66 — An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, National Institute of Standards and Technology (draft), May 2004
    • SP 800-66 — An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, National Institute of Standards and Technology (draft), May 2004.
  • 69
    • 85179254800 scopus 로고    scopus 로고
    • Data Protection Act, 1998, Chapter 29, United Kingdom
    • Data Protection Act, 1998, Chapter 29, United Kingdom.
  • 70
    • 85179260550 scopus 로고    scopus 로고
    • Directive 95/46/EC, The Data Protection Directive, European Parliament and of the Council, 24 October 1995
    • Directive 95/46/EC, The Data Protection Directive, European Parliament and of the Council, 24 October 1995.
  • 80
    • 85179192362 scopus 로고    scopus 로고
    • OECD Guidelines for Cryptography Policy, Organization for Economic Co-operation and Development, 1997. 71a
    • OECD Guidelines for Cryptography Policy, Organization for Economic Co-operation and Development, 1997. 71a.
  • 81
    • 85179253523 scopus 로고    scopus 로고
    • 1997 OECD Cryptography Guidelines: Recommendation of the Council, Organization for Economic Co-operation and Development, 27 March 1997. 71b
    • OECD Cryptography Guidelines: Recommendation of the Council, Organization for Economic Co-operation and Development, 27 March 1997. 71b.
  • 82
    • 85179191752 scopus 로고    scopus 로고
    • Report on Background and Issues of Cryptography Policy, Organization for Economic Co-operation and Development, 1997
    • Report on Background and Issues of Cryptography Policy, Organization for Economic Co-operation and Development, 1997.
  • 83
    • 85179227229 scopus 로고    scopus 로고
    • E-Government Act, Public Law 107-347 — Title III — Federal Information Security Management Act, U.S. Congress, 17 December, . 72a
    • E-Government Act, Public Law 107-347 — Title III — Federal Information Security Management Act, U.S. Congress, 17 December 2002. 72a.
    • (2002)
  • 84
    • 85179187122 scopus 로고    scopus 로고
    • OMB Memo M-04-25, FY2004 Reporting Instructions for the Federal Information Security Management Act, 23 August, . 72b
    • OMB Memo M-04-25, FY2004 Reporting Instructions for the Federal Information Security Management Act, 23 August 2004. 72b.
    • (2004)
  • 85
    • 85179279012 scopus 로고    scopus 로고
    • OMB Memo from M. Forman, Certification and Accreditation — What an Agency Can Do Now, 3 July, . 72c
    • OMB Memo from M. Forman, Certification and Accreditation — What an Agency Can Do Now, 3 July 2003. 72c.
    • (2003)
  • 86
    • 85179264450 scopus 로고    scopus 로고
    • OMB Memo M-05-15, FY2005 Reporting Instructions for the Federal Information Security Management Act and Privacy Officer, 13 June, . 72d
    • OMB Memo M-05-15, FY2005 Reporting Instructions for the Federal Information Security Management Act and Privacy Officer, 13 June 2005. 72d.
    • (2005)
  • 87
    • 85179253311 scopus 로고    scopus 로고
    • OMB Memo M-06-20, FY2006 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management, 17 July, . 72e
    • OMB Memo M-06-20, FY2006 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management, 17 July 2006. 72e.
    • (2006)
  • 88
    • 85179232185 scopus 로고    scopus 로고
    • OMB Memo M-06-16, Protection of Sensitive Agency Information, 23 June 2006. 72f
    • OMB Memo M-06-16, Protection of Sensitive Agency Information, 23 June 2006. 72f.
  • 89
    • 85179215169 scopus 로고    scopus 로고
    • OMB Memo M-06-19. Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost of Security in Agency Information Technology Investments, 12 July
    • OMB Memo M-06-19. Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost of Security in Agency Information Technology Investments, 12 July 2006.
    • (2006)
  • 90
    • 85179278577 scopus 로고    scopus 로고
    • GAO-04-354, Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems, Report to Congress, U.S. General Accounting Office, March
    • GAO-04-354, Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems, Report to Congress, U.S. General Accounting Office, March 2004.
    • (2004)
  • 91
    • 85179228917 scopus 로고    scopus 로고
    • GAO-05-551, Information Security: Radio Frequency Identification Technology in the Federal Government, May
    • GAO-05-551, Information Security: Radio Frequency Identification Technology in the Federal Government, May 2005.
    • (2005)
  • 92
    • 85179205758 scopus 로고    scopus 로고
    • Gramm-Leach-Bliley Act, Public Law 106-102, Title V — Privacy, U.S. Congress, 12 November, . 75a
    • Gramm-Leach-Bliley Act, Public Law 106-102, Title V — Privacy, U.S. Congress, 12 November 1999. 75a.
    • (1999)
  • 93
    • 85179215046 scopus 로고    scopus 로고
    • Gramm-Leach-Bliley Act, Department of the Treasury — Privacy of Consumer Financial Information; Final Rule, 12 CFR Parts 40, 216, 332, and 573, 1 June 2000
    • Gramm-Leach-Bliley Act, Department of the Treasury — Privacy of Consumer Financial Information; Final Rule, 12 CFR Parts 40, 216, 332, and 573, 1 June 2000. 75b.
  • 94
    • 85179186181 scopus 로고    scopus 로고
    • Gramm-Leach-Bliley Act, Federal Trade Commission — Privacy of Consumer Financial Information; Final Rule, 16 CFR Part 313, 24 May 2000. 75c
    • Gramm-Leach-Bliley Act, Federal Trade Commission — Privacy of Consumer Financial Information; Final Rule, 16 CFR Part 313, 24 May 2000. 75c.
  • 95
    • 85179212710 scopus 로고    scopus 로고
    • Gramm-Leach-Bliley Act, Securities and Exchange Commission — Privacy of Consumer Financial Information (Regulation S-P); Rules, 17 CFR Part 248, 29 July 2000. 75d
    • Gramm-Leach-Bliley Act, Securities and Exchange Commission — Privacy of Consumer Financial Information (Regulation S-P); Rules, 17 CFR Part 248, 29 July 2000. 75d.
  • 96
    • 85179224172 scopus 로고    scopus 로고
    • Gramm-Leach-Bliley Act, National Credit Union Administration — Privacy of Consumer Financial Information; Requirements for Insurance; Final Rule, 12 CFR Parts 716 and 741, 18 May 2000. 75e
    • Gramm-Leach-Bliley Act, National Credit Union Administration — Privacy of Consumer Financial Information; Requirements for Insurance; Final Rule, 12 CFR Parts 716 and 741, 18 May 2000. 75e.
  • 97
    • 85179245634 scopus 로고    scopus 로고
    • Gramm-Leach-Bliley Act, Federal Trade Commission — Standards for Safeguarding Customer Information; Final Rule, 16 CFR Part 314, 23 May 2002. 75f
    • Gramm-Leach-Bliley Act, Federal Trade Commission — Standards for Safeguarding Customer Information; Final Rule, 16 CFR Part 314, 23 May 2002. 75f.
  • 98
    • 85179204264 scopus 로고    scopus 로고
    • How to Comply with the Privacy of Consumer Information Rule of the Gramm-Leach-Bliley Act: A Guide for Small Business, Federal Trade Commission, July 2002
    • How to Comply with the Privacy of Consumer Information Rule of the Gramm-Leach-Bliley Act: A Guide for Small Business, Federal Trade Commission, July 2002.
  • 99
    • 85179189893 scopus 로고
    • Public Law 95-630
    • Right to Financial Privacy Act of, Chapter 35
    • Right to Financial Privacy Act of 1978, Public Law 95-630, as codified at 12 U.S.C. Chapter 35.
    • (1978) As Codified at 12 U.S.C
  • 100
    • 85179229280 scopus 로고
    • Public Law 96-440, as codified at 42 U.S.C
    • Privacy Protection Act of
    • Privacy Protection Act of 1980, Public Law 96-440, as codified at 42 U.S.C. § 2000aa.
    • (1980) § 2000Aa
  • 101
    • 85179210548 scopus 로고
    • Public Law 99-508
    • Electronic Communication Privacy Act of, Chapter 121
    • Electronic Communication Privacy Act of 1986, Public Law 99-508, as codified at 18 U.S.C. Chapter 121.
    • (1986) As Codified at 18 U.S.C
  • 102
    • 85179199197 scopus 로고    scopus 로고
    • Computer Matching and Privacy Act of 1988, Public Law 100-503, as codified at 5 U.S.C. § 552a
    • Computer Matching and Privacy Act of 1988, Public Law 100-503, as codified at 5 U.S.C. § 552a.
  • 119
    • 85179293055 scopus 로고    scopus 로고
    • Video Privacy Protection Act of 1988, Public Law 100-618, as codified at 18 U.S.C. § 2710
    • Video Privacy Protection Act of 1988, Public Law 100-618, as codified at 18 U.S.C. § 2710.
  • 134
    • 84867021334 scopus 로고    scopus 로고
    • Defined Security Creates Efficiencies
    • Fourth Quarter
    • @stake Labs, “Defined Security Creates Efficiencies,” Secure Business Quarterly, Fourth Quarter 2001.
    • (2001) Secure Business Quarterly
  • 138
    • 85179194154 scopus 로고    scopus 로고
    • Budgeting for Infosecurity: Are Funds Growing?
    • April
    • Armstrong, I., “Budgeting for Infosecurity: Are Funds Growing?” SC Magazine, April 2002.
    • (2002) SC Magazine
    • Armstrong, I.1
  • 139
    • 85179245018 scopus 로고    scopus 로고
    • Failure Must Be Part of the Plan
    • May 2005. 115
    • Armstrong, I., “Failure Must Be Part of the Plan,” SC Magazine, pp. 24–28, May 2005. 115.
    • SC Magazine , pp. 24-28
    • Armstrong, I.1
  • 142
    • 0035553293 scopus 로고    scopus 로고
    • Security Metrics
    • Computer Security Institute, January
    • Bayuk, J.L., “Security Metrics,” Computer Security Journal, Computer Security Institute, January 2001.
    • (2001) Computer Security Journal
    • Bayuk, J.L.1
  • 146
    • 38349012988 scopus 로고    scopus 로고
    • An Imprecise but Necessary Calculation
    • Fourth Quarter
    • Blakely, B., “An Imprecise but Necessary Calculation,” Secure Business Quarterly, Fourth Quarter 2001.
    • (2001) Secure Business Quarterly
    • Blakely, B.1
  • 148
    • 85179233460 scopus 로고    scopus 로고
    • Doom or Boom? Fearing the Worst, Companies Are Diversifying Their Security Spending
    • April
    • Briney, A., “Doom or Boom? Fearing the Worst, Companies Are Diversifying Their Security Spending,” Information Security, April 2004.
    • (2004) Information Security
    • Briney, A.1
  • 149
    • 85179282413 scopus 로고    scopus 로고
    • HIPAA Security Compliance Not Just an IT Problem
    • Brenner, B., “HIPAA Security Compliance Not Just an IT Problem,” Search Security. com, 30 September 2004.
    • (2004) Search Security. Com
    • Brenner, B.1
  • 153
    • 85179228545 scopus 로고    scopus 로고
    • Information Risk Management at 3Com
    • Fourth Quarter
    • Clafin, B., “Information Risk Management at 3Com,” Security Business Quarterly, Fourth Quarter 2001.
    • (2001) Security Business Quarterly
    • Clafin, B.1
  • 154
    • 85179197477 scopus 로고    scopus 로고
    • Compliance: Changing Our Approach to Data
    • Hewlett-Packard e-newsletter, July
    • “Compliance: Changing Our Approach to Data,” Connected, Hewlett-Packard e-newsletter, July 2004.
    • (2004) Connected
  • 155
    • 85179289650 scopus 로고    scopus 로고
    • HIPAA Compliance: One Organization’s Tale
    • May
    • DeBrino, R., “HIPAA Compliance: One Organization’s Tale,” CIO Decisions, p. 29, May 2005.
    • (2005) CIO Decisions , pp. 29
    • Debrino, R.1
  • 157
    • 85179298184 scopus 로고    scopus 로고
    • Earthlink: Security from the Inside: A Dialogue with Lisa Ekman and Lisa Hoyt
    • Fourth Quarter
    • Earthlink: Security from the Inside: A Dialogue with Lisa Ekman and Lisa Hoyt, Secure Business Quarterly, Fourth Quarter 2001.
    • (2001) Secure Business Quarterly
  • 165
    • 85179277104 scopus 로고    scopus 로고
    • FTC Enforces Gramm-Leach-Bliley Act’s Safeguards Rule against Mortgage Companies
    • “FTC Enforces Gramm-Leach-Bliley Act’s Safeguards Rule against Mortgage Companies,” Federal Trade Commission Press Release, 16 November 2004.
    • (2004) Federal Trade Commission Press Release
  • 166
    • 85179254341 scopus 로고    scopus 로고
    • Sensitive Information in Financial Services, for CS 457a course
    • November
    • Fuldner, G., Sensitive Information in Financial Services, for CS 457a course, Yale, 14 November 2003.
    • (2003) Yale , pp. 14
    • Fuldner, G.1
  • 168
    • 67650962431 scopus 로고    scopus 로고
    • Information Security Governance Reporting
    • Auerbach Publications, October
    • Garigue, R. and Stefaniu, M., “Information Security Governance Reporting,” EDP Audit, 76-15-11, Auerbach Publications, October 2003.
    • (2003) EDP Audit, 76-15-11
    • Garigue, R.1    Stefaniu, M.2
  • 169
    • 24944590864 scopus 로고    scopus 로고
    • Making Choices to Show ROI
    • Fourth Quarter
    • Geer, D.E., “Making Choices to Show ROI,” Secure Business Quarterly, Fourth Quarter 2001.
    • (2001) Secure Business Quarterly
    • Geer, D.E.1
  • 176
    • 33748680808 scopus 로고    scopus 로고
    • The Sarbanes-Oxley Environment, The Institute of Internal Auditors Research Foundation
    • Gray, G.L., Changing Internal Audit Practices in the New Paradigm: The Sarbanes-Oxley Environment, The Institute of Internal Auditors Research Foundation, 2004.
    • (2004) Changing Internal Audit Practices in the New Paradigm
    • Gray, G.L.1
  • 179
    • 85179240040 scopus 로고    scopus 로고
    • Common Criteria Cleared for Take Off at the U.S. Federal Aviation Administration
    • Herrmann, D., “Common Criteria Cleared for Take Off at the U.S. Federal Aviation Administration,” Information Security Bulletin, December 2004, pp. 379–388.
    • (2004) Information Security Bulletin , pp. 379-388
    • Herrmann, D.1
  • 182
    • 0035265773 scopus 로고    scopus 로고
    • Application of Common Criteria to Telecom Services
    • Herrmann, D. and Keith, S., “Application of Common Criteria to Telecom Services,” Computer Security Journal, 17(2), 21–28, 2001.
    • (2001) Computer Security Journal , vol.17 , Issue.2 , pp. 21-28
    • Herrmann, D.1    Keith, S.2
  • 186
    • 85179196268 scopus 로고    scopus 로고
    • A Comparison of Electrical Sector Cyber Security Standards and Guideline
    • INEEL/EXT-04-02428, rev., 2 November
    • INEEL/EXT-04-02428, rev., “A Comparison of Electrical Sector Cyber Security Standards and Guidelines,” Idaho National Engineering and Environmental Lab, 2 November 2004.
    • (2004) Idaho National Engineering and Environmental Lab
  • 191
    • 85179235398 scopus 로고    scopus 로고
    • New Federal ID Standard Approved
    • February
    • Jackson, W., “New Federal ID Standard Approved,” Government Computer News, 25 February 2005.
    • (2005) Government Computer News , pp. 25
    • Jackson, W.1
  • 192
    • 85179275245 scopus 로고    scopus 로고
    • Threat of the Auditors: The Sarbanes-Oxley Act Is a Danger to Growth
    • Novak, R., Threat of the Auditors: The Sarbanes-Oxley Act Is a Danger to Growth, The Washington Post, p. A31, 7 April 2005.
    • (2005) The Washington Post , pp. A31
    • Novak, R.1
  • 195
    • 85179290139 scopus 로고    scopus 로고
    • Cyber Security for the Bulk Electric System
    • January and March
    • Johnson, A., “Cyber Security for the Bulk Electric System,” NERC Cyber Security Workshops, January and March 2005.
    • (2005) NERC Cyber Security Workshops
    • Johnson, A.1
  • 196
    • 85179255590 scopus 로고    scopus 로고
    • Passing the Audit
    • Johnson, M., Passing the Audit, CIO Decisions, pp. 48–51, April 2005.
    • (2005) CIO Decisions , pp. 48-51
    • Johnson, M.1
  • 200
    • 17844395374 scopus 로고    scopus 로고
    • Executive Summary: Insight into Return on Security Investment
    • Fourth Quarter
    • Karofsky, E., “Executive Summary: Insight into Return on Security Investment,” Security Business Quarterly, Fourth Quarter 2001.
    • (2001) Security Business Quarterly
    • Karofsky, E.1
  • 206
    • 85179239905 scopus 로고    scopus 로고
    • Security: Measuring Up
    • Lindstrom, P. “Security: Measuring Up,” Information Security, February 2005, pp. 48–55.
    • (2005) Information Security , pp. 48-55
    • Lindstrom, P.1
  • 207
    • 85179235327 scopus 로고    scopus 로고
    • Know Your Customers Inside & Out: The Best Way to Work with the Patriot Act
    • May
    • Lovejoy, K., “Know Your Customers Inside & Out: The Best Way to Work with the Patriot Act,” SC Magazine, p. 78, May 2005.
    • (2005) SC Magazine , pp. 78
    • Lovejoy, K.1
  • 209
    • 0003533985 scopus 로고    scopus 로고
    • Handbook of Software Reliability Engineering
    • Lyu, M. (Ed.), Handbook of Software Reliability Engineering, IEEE Computer Society Press, 1996.
    • (1996) IEEE Computer Society Press
    • Lyu, M.1
  • 210
    • 85179196774 scopus 로고    scopus 로고
    • Bill C-13: An Act to Amend the Criminal Code, Capital Markets Fraud and Evidence Gathering
    • Parliamentary Information and Research Service
    • MacKay, R. and Smith M., “Bill C-13: An Act to Amend the Criminal Code, Capital Markets Fraud and Evidence Gathering,” LS-469E, Legislative Summaries, Library of Parliament, Parliamentary Information and Research Service, 2004. 186.
    • (2004) LS-469E, Legislative Summaries, Library of Parliament , pp. 186
    • Mackay, R.1    Smith, M.2
  • 212
    • 85179197881 scopus 로고    scopus 로고
    • U.S. Working Group Reports on Security Metrics
    • McCollum, T., “U.S. Working Group Reports on Security Metrics,” IT Audit, Institute of Internal Auditors, Vol. 8, 1 February 2005.
    • (2005) IT Audit, Institute of Internal Auditors , vol.8 , pp. 1
    • McCollum, T.1
  • 213
    • 85179213141 scopus 로고    scopus 로고
    • U.S. Working Group Issues Security Proposals, IT Audit
    • McCollum, T., U.S. Working Group Issues Security Proposals, IT Audit, Institute of Internal Auditors, Vol. 7, 1 June 2004.
    • (2004) Institute of Internal Auditors , vol.7 , pp. 1
    • McCollum, T.1
  • 214
    • 84994873283 scopus 로고    scopus 로고
    • ‘Standards-Based’ Approach to Operational Risk Management under Basel II
    • McConnel, P.,A ‘Standards-Based’ Approach to Operational Risk Management under Basel II, ContinuityCentral.com, 14 January 2005.
    • (2005) Continuitycentral.Com , pp. 14
    • McConnel, P.1
  • 216
    • 70549084398 scopus 로고    scopus 로고
    • Infosec Research Council (IRC), November
    • Hard Problem List, Infosec Research Council (IRC), November 2005.
    • (2005) Hard Problem List
  • 217
    • 85179246895 scopus 로고    scopus 로고
    • Keeping the Data and Oil Flowing
    • May
    • Mimoso, M., Keeping the Data and Oil Flowing, Information Security, pp. 44–48, May 2005.
    • (2005) Information Security , pp. 44-48
    • Mimoso, M.1
  • 218
    • 85179217515 scopus 로고    scopus 로고
    • Whose in Charge of Privacy Issues? Agencies Have until March 11 to Figure It Out
    • 17 February
    • Miller, J., “Whose in Charge of Privacy Issues? Agencies Have until March 11 to Figure It Out,” Government Computer News, GCN.com, 17 February 2005. 193a.
    • (2005) Government Computer News , pp. 193
    • Miller, J.1
  • 219
    • 85179285971 scopus 로고    scopus 로고
    • Is Your Agency Required to Have a Privacy Officer?
    • Miller, J., “Is Your Agency Required to Have a Privacy Officer?,” Government Computer News, GCN.com, 13 December 2004.
    • (2004) Government Computer News
    • Miller, J.1
  • 220
    • 85179257774 scopus 로고    scopus 로고
    • Return on Information Security Investment: Are You Spending Enough?
    • Mizzi, A., Return on Information Security Investment: Are You Spending Enough? Are You Spending Too Much?, Geocities.com/amz, January 2005.
    • Are You Spending Too Much?
    • Mizzi, A.1
  • 222
    • 85179242240 scopus 로고    scopus 로고
    • Secure Hardware Design
    • July
    • Oblivion, B., “Secure Hardware Design,” Black Hat Briefings, 26–27 July 2000.
    • (2000) Black Hat Briefings , pp. 26-27
    • Oblivion, B.1
  • 223
    • 0003754396 scopus 로고    scopus 로고
    • 3rd edition, John Wiley & Sons, Ltd., 1991. 198. Out-Think Shrink — What Every Retailer Should Know about Loss Prevention, IntelliQ Ltd
    • O’Connor, P., Practical Reliability Engineering, 3rd edition, John Wiley & Sons, Ltd., 1991. 198. Out-Think Shrink — What Every Retailer Should Know about Loss Prevention, IntelliQ Ltd., 2004.
    • (2004) Practical Reliability Engineering
    • O’Connor, P.1
  • 225
    • 85179271303 scopus 로고    scopus 로고
    • “Utilities Face Deadline from NERC to Meet FERC Security Mandate,” Energy Beat
    • 10 January
    • Perin, M., “Utilities Face Deadline from NERC to Meet FERC Security Mandate,” Energy Beat, Houston Business Journal, 10 January 2005.
    • (2005) Houston Business Journal
    • Perin, M.1
  • 230
    • 85179218934 scopus 로고    scopus 로고
    • We Must Learn to Love Compliance
    • Quainton, D., “We Must Learn to Love Compliance,” SC Magazine, February 2005, pp. 28–31.
    • (2005) SC Magazine , pp. 28-31
    • Quainton, D.1
  • 231
    • 85179265949 scopus 로고    scopus 로고
    • Meeting the Challenges of Security Mandates
    • May
    • Radding, A., “Meeting the Challenges of Security Mandates,” CIO Decisions, pp. 26–28, May 2005.
    • (2005) CIO Decisions , pp. 26-28
    • Radding, A.1
  • 232
    • 85179276777 scopus 로고    scopus 로고
    • Sticking Plaster that Won’t Stick: Why HIPAA Has Failed to Achieve the Same Level of Success as SOX
    • May
    • Rothke, B., “Sticking Plaster that Won’t Stick: Why HIPAA Has Failed to Achieve the Same Level of Success as SOX,” SC Magazine, pp. 45–46, May 2005.
    • (2005) SC Magazine , pp. 45-46
    • Rothke, B.1
  • 233
    • 85179258306 scopus 로고    scopus 로고
    • Will HIPAA Bite?
    • May
    • Savage, M., “Will HIPAA Bite?,” SC Magazine, pp. 40–42, May 2005.
    • (2005) SC Magazine , pp. 40-42
    • Savage, M.1
  • 236
    • 85179210322 scopus 로고    scopus 로고
    • SABSA® Security Architecture
    • Sherwood, J., “SABSA® Security Architecture,” Netigy Corporation, 2000
    • (2000) Netigy Corporation
    • Sherwood, J.1
  • 240
  • 241
    • 85179225759 scopus 로고    scopus 로고
    • STRAIS: A Method for Security Requirements Engineering Using a Standards-Based Network Security Reference Model
    • Stephenson, P., “STRAIS: A Method for Security Requirements Engineering Using a Standards-Based Network Security Reference Model,” Netigy Corporation, 2001.
    • (2001) Netigy Corporation
    • Stephenson, P.1
  • 244
    • 85179215767 scopus 로고    scopus 로고
    • Security Metrics Consortium Founded by Top CSOs/ CISOs
    • Summers, C. and Weers, K., Security Metrics Consortium Founded by Top CSOs/ CISOs, Shift Communications, 24 February 2004.
    • (2004) Shift Communications
    • Summers, C.1    Weers, K.2
  • 245
    • 70449362889 scopus 로고    scopus 로고
    • What Insurance Can — and Can’t — Do for Security Risks
    • Fourth Quarter
    • Thieme, R., “What Insurance Can — and Can’t — Do for Security Risks,” Secure Business Quarterly, Fourth Quarter 2001.
    • (2001) Secure Business Quarterly
    • Thieme, R.1
  • 250
    • 85179264050 scopus 로고    scopus 로고
    • Big Brother’s Watchful Eyes
    • Walsh, L. and Taylor, D., “Big Brother’s Watchful Eyes,” Information Security, pp. 34–42, May 2005.
    • (2005) Information Security , pp. 34-42
    • Walsh, L.1    Taylor, D.2
  • 254
    • 85179240649 scopus 로고    scopus 로고
    • House Endorses Altering Security Alerts
    • May
    • Kehaulani-Goo, S., “House Endorses Altering Security Alerts,” The Washington Post, pp. A9, 19 May 2005.
    • (2005) The Washington Post , vol.19 , pp. A9
    • Kehaulani-Goo, S.1
  • 255
    • 85179296165 scopus 로고    scopus 로고
    • Expanded Patriot Act to Be Proposed
    • May
    • Associated Press, “Expanded Patriot Act to Be Proposed,” The Washington Post, pp. A8, 19 May 2005.
    • (2005) The Washington Post , vol.19 , pp. A8
    • Press, A.1
  • 263
    • 85179278697 scopus 로고    scopus 로고
    • Rapiscan Systems Product Brochure #9150068-1, undated
    • Rapiscan Secure 1000, Rapiscan Systems Product Brochure #9150068-1, undated.
    • Rapiscan Secure 1000
  • 266
    • 33646535133 scopus 로고    scopus 로고
    • Extreme Availability: NYSE’s New IT Infrastructure Puts Hand-Held Wireless Terminals in Brokers’ Hands
    • “Extreme Availability: NYSE’s New IT Infrastructure Puts Hand-Held Wireless Terminals in Brokers’ Hands,” Communications News, June 2005, pp. 12–17.
    • (2005) Communications News, June , pp. 12-17
  • 267
    • 33646517976 scopus 로고    scopus 로고
    • Ensure Data Center Resiliency: Intelligent networks can lower costs and improve security and business continuity
    • Allard, Pierre-Paul, “Ensure Data Center Resiliency: Intelligent networks can lower costs and improve security and business continuity,” Communications News, June 2005, pp. 40–43.
    • (2005) Communications News , pp. 40-43
    • Allard, P.-P.1
  • 268
    • 85179279727 scopus 로고    scopus 로고
    • Patriot Second Act
    • Patriot Second Act,” The Washington Post, 13 June 2005, pp. A18.
    • (2005) The Washington Post , pp. A18
  • 269
    • 85179195116 scopus 로고    scopus 로고
    • Reining in Risk Turns into Big Business: Sarbanes-Oxley Creates Winners
    • Silverman, E., Reining in Risk Turns into Big Business: Sarbanes-Oxley Creates Winners, The Washington Post, 13 June 2005, pp. D1 and D9.
    • (2005) The Washington Post
    • Silverman, E.1
  • 270
    • 85179197077 scopus 로고    scopus 로고
    • Senate Panel Approves New FBI Powers for Patriot Act
    • “Senate Panel Approves New FBI Powers for Patriot Act,” The Washington Post Express, 8 June 2005, p. 3.
    • The Washington Post Express , vol.8 , pp. 3
  • 271
    • 85179211928 scopus 로고    scopus 로고
    • OMB Releases FIMSA Guidance with Focus on Privacy
    • June
    • Miller, J., “OMB Releases FIMSA Guidance with Focus on Privacy,” Government Computer News, gcn.com, 15 June 2005.
    • (2005) Government Computer News, Gcn.Com , pp. 15
    • Miller, J.1
  • 272
    • 77957056012 scopus 로고    scopus 로고
    • 40 Million Credit Card Numbers Hacked: Data Breached at Processing Center
    • Krim, J. and Barbaro, M., “40 Million Credit Card Numbers Hacked: Data Breached at Processing Center,” The Washington Post, 18 June 2005, pp. A1 and A10.
    • (2005) The Washington Post , pp. A1 and A10
    • Krim, J.1    Barbaro, M.2
  • 274
    • 85179249479 scopus 로고    scopus 로고
    • State Tells Lawmakers Biometrics Will Ensure Identity
    • Mosquera, M., “State Tells Lawmakers Biometrics Will Ensure Identity,” Government Computer News, gcn.com, 23 June 2005.
    • (2005) Government Computer News, Gcn.Com
    • Mosquera, M.1
  • 275
    • 85179200935 scopus 로고    scopus 로고
    • Outsourcing in India in Crisis over Scam: British Paper Alleges Security Breach
    • Lancaster, J., “Outsourcing in India in Crisis over Scam: British Paper Alleges Security Breach,” The Washington Post, 25 June 2005, p. A18.
    • (2005) The Washington Post , pp. A18
    • Lancaster, J.1
  • 277
    • 85179258372 scopus 로고    scopus 로고
    • Draft Guidelines Released for Certifying PIV Card Issuers
    • Jackson, W., “Draft Guidelines Released for Certifying PIV Card Issuers,” Government Computer News, gcn.com, 20 June 2005.
    • (2005) Government Computer News, Gcn.Com
    • Jackson, W.1
  • 278
    • 85179236574 scopus 로고    scopus 로고
    • W.P., “GAO Study of RFID Technology, Policy Seen Flawed
    • Dizard III, W.P., “GAO Study of RFID Technology, Policy Seen Flawed,” Government Computer News, gcn.com, 31 May 2005
    • (2005) Government Computer News, Gcn.Com
    • Dizard, I.I.I.1
  • 279
    • 77949710211 scopus 로고    scopus 로고
    • Biometric Identification
    • Lerner, E., “Biometric Identification,” The Industrial Physicist, 6(1), 20–23, 2000.
    • (2000) The Industrial Physicist , vol.6 , Issue.1 , pp. 20-23
    • Lerner, E.1
  • 280
    • 85179282809 scopus 로고    scopus 로고
    • Security, Privacy, and Fraud Research
    • Rendell, A., “Security, Privacy, and Fraud Research,” Safety Systems, 9(2), 13–15, 2000.
    • (2000) Safety Systems , vol.9 , Issue.2 , pp. 13-15
    • Rendell, A.1
  • 281
    • 85179281114 scopus 로고    scopus 로고
    • Between Friends: Don’t Extend Trust Too Far
    • Jones, B. and Deane, D., “Between Friends: Don’t Extend Trust Too Far,” SC Magazine, February 2005, pp. 39–40.
    • (2005) SC Magazine , pp. 39-40
    • Jones, B.1    Deane, D.2
  • 282
    • 85179199335 scopus 로고    scopus 로고
    • Stop That Fraud: Fingerprints Will Secure Texas Systems
    • February
    • Sterlicchi, J., “Stop That Fraud: Fingerprints Will Secure Texas Systems,” SC Magazine, February 2005, p. 42.
    • (2005) SC Magazine , pp. 42
    • Sterlicchi, J.1
  • 283
    • 85179185882 scopus 로고    scopus 로고
    • Would You Show This Card to Mom
    • Armstrong, I., “Would You Show This Card to Mom,” SC Magazine, March 2005, p. 15.
    • (2005) SC Magazine , pp. 15
    • Armstrong, I.1
  • 284
    • 85179293152 scopus 로고    scopus 로고
    • www.soxonline.com.
  • 285
    • 85179279165 scopus 로고    scopus 로고
    • Sarbanes-Oxley for IT Security
    • Rasch, M., “Sarbanes-Oxley for IT Security,” securityfocus.com, 3 May 2005.
    • (2005) Securityfocus.Com
    • Rasch, M.1
  • 287
    • 85179222237 scopus 로고    scopus 로고
    • New FISMA Standard Advances toward Finalization
    • Jackson, W., “New FISMA Standard Advances toward Finalization,” Government Computer News, gcn.com, 19 July 2005.
    • (2005) Government Computer News, Gcn.Com
    • Jackson, W.1
  • 288
    • 84991563616 scopus 로고    scopus 로고
    • Enron Fraud Pacts Set Records: CIBC Deal Brings Total to $7 Billion
    • Starkman, D., “Enron Fraud Pacts Set Records: CIBC Deal Brings Total to $7 Billion,” The Washington Post, 3 August 2005, pp. D1–D2.
    • (2005) The Washington Post , pp. D1-D2
    • Starkman, D.1
  • 289
    • 85179282270 scopus 로고    scopus 로고
    • Law is Nothing without Enforcement
    • Cullinane, D., “Law is Nothing without Enforcement,” SC Magazine, August 2005, p. 20.
    • (2005) SC Magazine , pp. 20
    • Cullinane, D.1
  • 292
    • 85179266078 scopus 로고    scopus 로고
    • Management and Enforcement of Privacy Obligations in Enterprises
    • September
    • Mont, M.C., Bramhall, P., and Chan, K.N., “Management and Enforcement of Privacy Obligations in Enterprises,” Information Security Bulletin, September 2005, pp. 245–258.
    • (2005) Information Security Bulletin , pp. 245-258
    • Mont, M.C.1    Bramhall, P.2    Chan, K.N.3
  • 298
    • 0032164210 scopus 로고    scopus 로고
    • A Survey of Web Security
    • Rubin, A. and Geer, Jr., D., “A Survey of Web Security,” Computer, 31(9), pp. 34–43, 1998.
    • (1998) Computer , vol.31 , Issue.9 , pp. 34-43
    • Rubin, A.1    Geer, D.2
  • 303
    • 0033879165 scopus 로고    scopus 로고
    • Biometrics: The Futur e of Identification
    • Pankanti, S., Bolle, R., and Jain, A., “Biometrics: the Futur e of Identification,” Computer, 33(2), 46–49, 2000.
    • (2000) Computer , vol.33 , Issue.2 , pp. 46-49
    • Pankanti, S.1    Bolle, R.2    Jain, A.3
  • 304
    • 85008032336 scopus 로고    scopus 로고
    • Smart Cards Aren’t Always the Smart Choice
    • Chadwick, D., “Smart Cards Aren’t Always the Smart Choice,” Computer, 32(12), 142–143, 1999.
    • (1999) Computer , vol.32 , Issue.12 , pp. 142-143
    • Chadwick, D.1
  • 305
    • 85179291551 scopus 로고    scopus 로고
    • News Briefs: Companies Join Forces for Smart Card Standard
    • Garber, L., “News Briefs: Companies Join Forces for Smart Card Standard,” Computer, 31(11), 19–20, 1998.
    • (1998) Computer , vol.31 , Issue.11 , pp. 19-20
    • Garber, L.1
  • 306
    • 0033895852 scopus 로고    scopus 로고
    • An Emerging Biometric API Standard
    • Tilton, C., “An Emerging Biometric API Standard,” Computer, 33(2), 130–132, 2000.
    • (2000) Computer , vol.33 , Issue.2 , pp. 130-132
    • Tilton, C.1
  • 307
    • 0033899298 scopus 로고    scopus 로고
    • Bio ID: A Multimodal Biometric Identification System
    • Frischoltz, T. and Dickmann, U., “Bio ID: A Multimodal Biometric Identification System,” Computer, 33(2), 64–69, 2000.
    • (2000) Computer , vol.33 , Issue.2 , pp. 64-69
    • Frischoltz, T.1    Dickmann, U.2
  • 308
    • 77949710211 scopus 로고    scopus 로고
    • Biometric Identification
    • Lerner, E., “Biometric Identification,” The Industrial Physicist, 6(1), 20–23, 2000.
    • (2000) The Industrial Physicist , vol.6 , Issue.1 , pp. 20-23
    • Lerner, E.1
  • 309
    • 85179206006 scopus 로고    scopus 로고
    • Trusted Gate Closes on Thin-Client Computer Network Security Holes
    • Hankins, M., “Trusted Gate Closes on Thin-Client Computer Network Security Holes,” SIGNAL, December 1999, pp. 67–69.
    • (1999) SIGNAL , pp. 67-69
    • Hankins, M.1
  • 312
    • 0344614689 scopus 로고    scopus 로고
    • Surviving Information Warfare Attacks
    • Jajoda, S., Ammann, P., and McCollum, C., “Surviving Information Warfare Attacks,” Computer, 32(4), pp. 57–63, 1999.
    • (1999) Computer , vol.32 , Issue.4 , pp. 57-63
    • Jajoda, S.1    Ammann, P.2    McCollum, C.3
  • 314
    • 0032097883 scopus 로고    scopus 로고
    • A Map of Security Risks Associated with using COTS
    • Lindquist, U. and Jonssen, E., “A Map of Security Risks Associated with using COTS,” Computer, 31(6), 60–66, 1998.
    • (1998) Computer , vol.31 , Issue.6 , pp. 60-66
    • Lindquist, U.1    Jonssen, E.2
  • 315
    • 84937027961 scopus 로고    scopus 로고
    • Cryptography: Is Staying with the Herd Really Best?
    • Ritter, T., “Cryptography: Is Staying with the Herd Really Best?,” Computer, 32(8), 94–95, 1999.
    • (1999) Computer , vol.32 , Issue.8 , pp. 94-95
    • Ritter, T.1
  • 318
    • 85008010113 scopus 로고    scopus 로고
    • Melissa Virus Creates a New Type of Threat
    • Garber, L., “Melissa Virus Creates a New Type of Threat,” Computer, 32(6), 16–19, 1999.
    • (1999) Computer , vol.32 , Issue.6 , pp. 16-19
    • Garber, L.1
  • 320
    • 0032010369 scopus 로고    scopus 로고
    • Consumer Privacy Concerns about Internet Marketing
    • Wang, H., Lee, M., and Wang, C., “Consumer Privacy Concerns about Internet Marketing,” Communications of the ACM, 41(3), 63–70, 1998.
    • (1998) Communications of the ACM , vol.41 , Issue.3 , pp. 63-70
    • Wang, H.1    Lee, M.2    Wang, C.3
  • 321
    • 85179233050 scopus 로고    scopus 로고
    • Can You Keep a Secret?
    • September 10
    • Blackburn, N., “Can You Keep a Secret?,” The Jerusalem Post, September 10, 1999, pp. 28–29.
    • (1999) The Jerusalem Post , pp. 28-29
    • Blackburn, N.1
  • 322
    • 0002779304 scopus 로고    scopus 로고
    • Privacy, Information Technology and Health Care
    • Rindfleisch, T., “Privacy, Information Technology and Health Care,” Communications of the ACM, 40(8), 92–100, 1997.
    • (1997) Communications of the ACM , vol.40 , Issue.8 , pp. 92-100
    • Rindfleisch, T.1
  • 326
    • 85179219849 scopus 로고    scopus 로고
    • Resurging Business Challenges Hotel IT
    • Ybarra, M., “Resurging Business Challenges Hotel IT,” CIO Decisions, January 2006, pp. 26–28.
    • (2006) CIO Decisions , pp. 26-28
    • Ybarra, M.1
  • 327
    • 0032164492 scopus 로고    scopus 로고
    • Security for Virtual Private Intranets
    • Arbaugh, W., Davin, J., Farber, D., and Smith, J., “Security for Virtual Private Intranets,” Computer, 31(9), 48–56, 1998.
    • (1998) Computer , vol.31 , Issue.9 , pp. 48-56
    • Arbaugh, W.1    Davin, J.2    Farber, D.3    Smith, J.4
  • 330
    • 85179284551 scopus 로고    scopus 로고
    • Maryland Unclear on New Driver’s License Law: Real ID Act Will Mean Extra Time when Trying to Renew, Obtain Card
    • Coe, E., “Maryland Unclear on New Driver’s License Law: Real ID Act Will Mean Extra Time when Trying to Renew, Obtain Card,” Cumberland Times-News, 5 December 2005, pp. 1A, 9A.
    • (2005) Cumberland Times-News , vol.9A , pp. 1A
    • Coe, E.1
  • 331
    • 35948952259 scopus 로고    scopus 로고
    • Secret Court Modified Wiretap Requests: Intervention May Have Led Bush to Bypass Panel
    • Powell, S.M., “Secret Court Modified Wiretap Requests: Intervention May Have Led Bush to Bypass Panel,” Seattle Post-Intelligencer, 24 December 2005.
    • (2005) Seattle Post-Intelligencer
    • Powell, S.M.1
  • 332
    • 0003615188 scopus 로고    scopus 로고
    • 2nd edition, System Safety Society, July
    • System Safety Analysis Handbook, 2nd edition, System Safety Society, July 1997.
    • (1997) System Safety Analysis Handbook
  • 334
    • 85179199495 scopus 로고    scopus 로고
    • House Renews USA Patriot Act; Bush to Sign
    • 8 March
    • Kellman, L., House Renews USA Patriot Act; Bush to Sign, ABCnews.go.com, 8 March 2006.
    • (2006) Abcnews.Go.Com
    • Kellman, L.1
  • 335
    • 84898143771 scopus 로고    scopus 로고
    • Congress Votes to Renew Patriot Act, With Changes
    • Babington, C., Congress Votes to Renew Patriot Act, With Changes, The Washington Post, pp. A3, 8 March 2006
    • (2006) The Washington Post , pp. A3
    • Babington, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.