-
1
-
-
85179286135
-
-
IEC 61508-1(1998-12), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 1: General Requirements
-
IEC 61508-1(1998-12), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 1: General Requirements.
-
-
-
-
2
-
-
85179195931
-
-
IEC 61508-2(2000-5), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 2: Requirements for Electrical/Electronic/ Programmable Electronic Safety-Related Systems
-
IEC 61508-2(2000-5), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 2: Requirements for Electrical/Electronic/ Programmable Electronic Safety-Related Systems.
-
-
-
-
3
-
-
85179263406
-
-
IEC 61508-3(1998-12), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 3: Software Requirements
-
IEC 61508-3(1998-12), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 3: Software Requirements.
-
-
-
-
4
-
-
85179254101
-
-
IEC 61508-4(1998-12), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 4: Definitions and Abbreviations of Terms
-
IEC 61508-4(1998-12), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 4: Definitions and Abbreviations of Terms.
-
-
-
-
5
-
-
85179252049
-
-
IEC 61508-5(1998-12), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 5: Examples of Methods for the Determination of Safety Integrity Levels
-
IEC 61508-5(1998-12), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 5: Examples of Methods for the Determination of Safety Integrity Levels.
-
-
-
-
6
-
-
85179255280
-
-
IEC 61508-6(2000-4), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 6: Guidelines on the Application of Parts 2 and 3
-
IEC 61508-6(2000-4), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 6: Guidelines on the Application of Parts 2 and 3.
-
-
-
-
7
-
-
85179293992
-
-
IEC 61508-7(2000-3), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 7: Overview of Techniques and Measures
-
IEC 61508-7(2000-3), Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems — Part 7: Overview of Techniques and Measures.
-
-
-
-
8
-
-
85179201597
-
-
IEEE Std. 982.1-1988, Standard Dictionary of Measures to Produce Reliable Software
-
IEEE Std. 982.1-1988, Standard Dictionary of Measures to Produce Reliable Software.
-
-
-
-
9
-
-
85179250116
-
-
IEEE Std. 982.2-1988, Guide for the Use of the Standard Dictionary of Measures to Produce Reliable Software
-
IEEE Std. 982.2-1988, Guide for the Use of the Standard Dictionary of Measures to Produce Reliable Software.
-
-
-
-
10
-
-
85179286344
-
-
IEEE Std. 1028-1997, Standard for Reviews and Audits
-
IEEE Std. 1028-1997, Standard for Reviews and Audits.
-
-
-
-
11
-
-
85179280442
-
-
IEEE Std. 1045-1992, Standard for Software Productivity Metrics
-
IEEE Std. 1045-1992, Standard for Software Productivity Metrics.
-
-
-
-
12
-
-
85179286289
-
-
IEEE Std. 1061-1998, Software Quality Metrics Methodology
-
IEEE Std. 1061-1998, Software Quality Metrics Methodology.
-
-
-
-
13
-
-
85179207217
-
-
ISO 9000 Compendium — International Standards for Quality Management, 10th edition, 2000
-
ISO 9000 Compendium — International Standards for Quality Management, 10th edition, 2000.
-
-
-
-
14
-
-
85179250796
-
-
ISO/IEC TR 13335-1(1996-12-15) — Information Technology — Guidelines for the Management of IT Security — Part 1: Concepts and Models for IT Security
-
ISO/IEC TR 13335-1(1996-12-15) — Information Technology — Guidelines for the Management of IT Security — Part 1: Concepts and Models for IT Security.
-
-
-
-
15
-
-
85179186187
-
-
ISO/IEC TR 13335-2(1997-12-15) — Information Technology — Guidelines for the Management of IT Security — Part 2: Managing and Planning IT Security
-
ISO/IEC TR 13335-2(1997-12-15) — Information Technology — Guidelines for the Management of IT Security — Part 2: Managing and Planning IT Security.
-
-
-
-
16
-
-
85179297895
-
-
ISO/IEC TR 13335-3(1998-06-15) — Information Technology — Guidelines for the Management of IT Security — Part 3: Techniques for the Management of IT security
-
ISO/IEC TR 13335-3(1998-06-15) — Information Technology — Guidelines for the Management of IT Security — Part 3: Techniques for the Management of IT security.
-
-
-
-
17
-
-
85179253123
-
-
ISO/IEC TR 13335-4(2000-03-01) — Information Technology — Guidelines for the Management of IT Security — Part 4: Selection of Safeguards
-
ISO/IEC TR 13335-4(2000-03-01) — Information Technology — Guidelines for the Management of IT Security — Part 4: Selection of Safeguards.
-
-
-
-
18
-
-
85179211991
-
-
ISO/IEC TR 13335-5(2001-11-01) — Information Technology — Guidelines for the Management of IT Security — Part 5: Management Guidance on Network Security
-
ISO/IEC TR 13335-5(2001-11-01) — Information Technology — Guidelines for the Management of IT Security — Part 5: Management Guidance on Network Security.
-
-
-
-
19
-
-
85179262890
-
-
ISO/IEC 15408-1(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 1: Introduction and General Model
-
ISO/IEC 15408-1(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 1: Introduction and General Model.
-
-
-
-
20
-
-
85179202461
-
-
ISO/IEC 15408-2(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 2: Security Functional Requirements
-
ISO/IEC 15408-2(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 2: Security Functional Requirements.
-
-
-
-
21
-
-
85179230191
-
-
ISO/IEC 15408-3(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 3: Security Assurance Requirements
-
ISO/IEC 15408-3(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 3: Security Assurance Requirements.
-
-
-
-
22
-
-
85179238072
-
-
ISO/IEC PDTR 15446(2001-04), Information Technology — Security Techniques — Guide for the Production of Protection Profiles and Security Targets
-
ISO/IEC PDTR 15446(2001-04), Information Technology — Security Techniques — Guide for the Production of Protection Profiles and Security Targets.
-
-
-
-
23
-
-
85179216982
-
-
ISO/IEC 15504-1(2004) — Information Technology — Process Assessment — Part 1: Concepts and Vocabulary
-
ISO/IEC 15504-1(2004) — Information Technology — Process Assessment — Part 1: Concepts and Vocabulary.
-
-
-
-
24
-
-
85179257810
-
-
ISO/IEC 15504-2(2004) — Information Technology — Process Assessment — Part 2: Performing an Assessment
-
ISO/IEC 15504-2(2004) — Information Technology — Process Assessment — Part 2: Performing an Assessment.
-
-
-
-
25
-
-
85179199329
-
-
ISO/IEC 15504-3(2004) — Information Technology — Process Assessment — Part 3: Guidance on Performing an Assessment
-
ISO/IEC 15504-3(2004) — Information Technology — Process Assessment — Part 3: Guidance on Performing an Assessment.
-
-
-
-
26
-
-
85179295449
-
-
ISO/IEC 15504-4(2004) — Information Technology — Process Assessment — Part 4: Guidance on Use for Process Improvement and Process Capability Determination
-
ISO/IEC 15504-4(2004) — Information Technology — Process Assessment — Part 4: Guidance on Use for Process Improvement and Process Capability Determination.
-
-
-
-
27
-
-
85179231608
-
-
ISO/IEC 15504-5(2005) — Information Technology — Process Assessment — Part 5: An Exemplar Process Assessment Model
-
ISO/IEC 15504-5(2005) — Information Technology — Process Assessment — Part 5: An Exemplar Process Assessment Model.
-
-
-
-
28
-
-
85179226260
-
-
ISO/IEC 17799(2000-12-01) — Information Technology — Code of Practice for Information Security Management
-
ISO/IEC 17799(2000-12-01) — Information Technology — Code of Practice for Information Security Management.
-
-
-
-
29
-
-
85179298523
-
-
ISO/IEC 21827(2002-10-17), Information Technology — Systems Security Engineering — Capability Maturity Model (SSE-CMM ®)
-
ISO/IEC 21827(2002-10-17), Information Technology — Systems Security Engineering — Capability Maturity Model (SSE-CMM ®).
-
-
-
-
31
-
-
85179215669
-
-
Standard CIP-002-1 — Cyber Security — Critical Cyber Assets, North America Electric Reliability Council (NERC), April
-
Standard CIP-002-1 — Cyber Security — Critical Cyber Assets, North America Electric Reliability Council (NERC), April 2006.
-
(2006)
-
-
-
32
-
-
85179262964
-
-
Standard CIP-003-1 — Cyber Security — Security Management Controls, North America Electric Reliability Council (NERC), April
-
Standard CIP-003-1 — Cyber Security — Security Management Controls, North America Electric Reliability Council (NERC), April 2006.
-
(2006)
-
-
-
33
-
-
85179221168
-
-
Standard CIP-004-1 — Cyber Security — Personnel and Training, North America Electric Reliability Council (NERC), April 2006
-
Standard CIP-004-1 — Cyber Security — Personnel and Training, North America Electric Reliability Council (NERC), April 2006.
-
-
-
-
34
-
-
85179265221
-
-
Standard CIP-005-1 — Cyber Security — Electronic Security, North America Electric Reliability Council (NERC), April 2006
-
Standard CIP-005-1 — Cyber Security — Electronic Security, North America Electric Reliability Council (NERC), April 2006.
-
-
-
-
35
-
-
85179297631
-
-
Standard CIP-006-1 — Cyber Security — Physical Security, North America Electric Reliability Council (NERC), April 2006
-
Standard CIP-006-1 — Cyber Security — Physical Security, North America Electric Reliability Council (NERC), April 2006.
-
-
-
-
36
-
-
85179265193
-
-
Standard CIP-007-1 — Cyber Security — System Security Management, North America Electric Reliability Council (NERC), April 2006
-
Standard CIP-007-1 — Cyber Security — System Security Management, North America Electric Reliability Council (NERC), April 2006.
-
-
-
-
37
-
-
85179260106
-
-
Standard CIP-008-1 — Cyber Security — Incident Reporting and Response Planning, North America Electric Reliability Council (NERC), April 2006
-
Standard CIP-008-1 — Cyber Security — Incident Reporting and Response Planning, North America Electric Reliability Council (NERC), April 2006.
-
-
-
-
38
-
-
85179239921
-
-
Standard CIP-009-1 — Cyber Security — Recovery Plans, North America Electric Reliability Council (NERC), April 2006
-
Standard CIP-009-1 — Cyber Security — Recovery Plans, North America Electric Reliability Council (NERC), April 2006.
-
-
-
-
43
-
-
85179198617
-
-
FAA Order 1370.89, Information Operation Conditions, 25 August 2003
-
FAA Order 1370.89, Information Operation Conditions, 25 August 2003.
-
-
-
-
44
-
-
85179197291
-
-
FAA Order 1600.1E, FAA Personnel Security Program, 25 July 2005
-
FAA Order 1600.1E, FAA Personnel Security Program, 25 July 2005.
-
-
-
-
45
-
-
85179289869
-
-
FEMA 452, Risk Assessment: A How-To Guide to Mitigate Potential Terrorist Attacks against Buildings, January 2005
-
FEMA 452, Risk Assessment: A How-To Guide to Mitigate Potential Terrorist Attacks against Buildings, January 2005.
-
-
-
-
46
-
-
85179196520
-
-
FIPS PUB 199 — Standards for Security Categorization of Federal Information and Information Systems, National Institute of Standards and Technology, December 2003
-
FIPS PUB 199 — Standards for Security Categorization of Federal Information and Information Systems, National Institute of Standards and Technology, December 2003.
-
-
-
-
47
-
-
85179249059
-
-
FIPS PUB 200 — Security Controls for Federal Information Systems, National Institute of Standards and Technology, scheduled for December 2005; replaces SP 800-53, including Annexes 1 through 3
-
FIPS PUB 200 — Security Controls for Federal Information Systems, National Institute of Standards and Technology, scheduled for December 2005; replaces SP 800-53, including Annexes 1 through 3.
-
-
-
-
48
-
-
85179190143
-
-
FIPS PUB 201 — Personal Identity Verification (PIV) of Federal Employees and Contractors, National Institute of Standards and Technology, 25 February 2005. 48a
-
FIPS PUB 201 — Personal Identity Verification (PIV) of Federal Employees and Contractors, National Institute of Standards and Technology, 25 February 2005. 48a
-
-
-
-
49
-
-
85179214248
-
-
SP 800-79 — Guidelines for the Certification and Accreditation of PIV Card Issuing Organizations, draft 1.1, National Institute of Standards and Technology, June 2005. 48b
-
SP 800-79 — Guidelines for the Certification and Accreditation of PIV Card Issuing Organizations, draft 1.1, National Institute of Standards and Technology, June 2005. 48b
-
-
-
-
50
-
-
85179227026
-
-
public draft, U.S. General Services Administration, March, . 48c
-
Federal Identity Management Handbook, public draft, U.S. General Services Administration, March 2005. 48c
-
(2005)
Federal Identity Management Handbook
-
-
-
51
-
-
85179273737
-
-
SP 800-76 — Biometric Data Specification for Personal Identity Verification (draft), National Institute of Standards and Technology, 24 January 2005. 48d
-
SP 800-76 — Biometric Data Specification for Personal Identity Verification (draft), National Institute of Standards and Technology, 24 January 2005. 48d
-
-
-
-
52
-
-
85179292341
-
-
SP 800-73 — Interfaces for Personal Identity Verification, National Institute of Standards and Technology, April 2005
-
SP 800-73 — Interfaces for Personal Identity Verification, National Institute of Standards and Technology, April 2005.
-
-
-
-
53
-
-
85179242532
-
-
SP 800-18 — Guide for Developing Security Plans for Information Technology Systems, National Institute of Standards and Technology, December 1998
-
SP 800-18 — Guide for Developing Security Plans for Information Technology Systems, National Institute of Standards and Technology, December 1998.
-
-
-
-
54
-
-
85179192346
-
-
SP 800-30 — Risk Management Guide for Information Technology Systems, National Institute of Standards and Technology, July 2002
-
SP 800-30 — Risk Management Guide for Information Technology Systems, National Institute of Standards and Technology, July 2002.
-
-
-
-
55
-
-
85179222627
-
-
SP 800-37 — Guide for the Security Certification and Accreditation of Federal Information Systems, National Institute of Standards and Technology, May 2004
-
SP 800-37 — Guide for the Security Certification and Accreditation of Federal Information Systems, National Institute of Standards and Technology, May 2004.
-
-
-
-
56
-
-
85179280311
-
-
SP 800-53 — Recommended Security Controls for Federal Information Systems, February 2005
-
SP 800-53 — Recommended Security Controls for Federal Information Systems, February 2005.
-
-
-
-
57
-
-
85179299263
-
-
Annex 1 to SP 800-53 — Recommended Security Controls for Federal Information Systems: Minimum Security Controls, Low Baseline, February 2005
-
Annex 1 to SP 800-53 — Recommended Security Controls for Federal Information Systems: Minimum Security Controls, Low Baseline, February 2005.
-
-
-
-
58
-
-
85179273791
-
-
Annex 2 to SP 800-53 — Recommended Security Controls for Federal Information Systems: Minimum Security Controls, Moderate Baseline, February 2005
-
Annex 2 to SP 800-53 — Recommended Security Controls for Federal Information Systems: Minimum Security Controls, Moderate Baseline, February 2005.
-
-
-
-
59
-
-
85179233534
-
-
Annex 3 to SP 800-53 — Recommended Security Controls for Federal Information Systems: Minimum Security Controls, High Baseline, February 2005
-
Annex 3 to SP 800-53 — Recommended Security Controls for Federal Information Systems: Minimum Security Controls, High Baseline, February 2005.
-
-
-
-
60
-
-
85179238887
-
-
SP 800-53A — Guide for Assessing the Security Controls in Federal Information Systems, National Institute of Standards and Technology, Spring 2005
-
SP 800-53A — Guide for Assessing the Security Controls in Federal Information Systems, National Institute of Standards and Technology, Spring 2005.
-
-
-
-
61
-
-
85179192382
-
-
SP 800-55 — Security Metrics Guide for Information Technology Systems, National Institute of Standards and Technology, July 2003. 57a
-
SP 800-55 — Security Metrics Guide for Information Technology Systems, National Institute of Standards and Technology, July 2003. 57a.
-
-
-
-
62
-
-
85179187505
-
-
SP 800-80 — Guide for Developing Performance Metrics for Information Security (draft), National Institute of Standards and Technology, May 2006
-
SP 800-80 — Guide for Developing Performance Metrics for Information Security (draft), National Institute of Standards and Technology, May 2006.
-
-
-
-
63
-
-
85179195885
-
-
SP 800-60 — Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories, National Institute of Standards and Technology, July 2004
-
SP 800-60 — Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories, National Institute of Standards and Technology, July 2004.
-
-
-
-
64
-
-
85179263337
-
-
SP 800-60 — Volume II: Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories, National Institute of Standards and Technology, July 2004
-
SP 800-60 — Volume II: Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories, National Institute of Standards and Technology, July 2004.
-
-
-
-
65
-
-
85179268023
-
-
SP 800-66 — An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, National Institute of Standards and Technology (draft), May 2004
-
SP 800-66 — An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, National Institute of Standards and Technology (draft), May 2004.
-
-
-
-
69
-
-
85179254800
-
-
Data Protection Act, 1998, Chapter 29, United Kingdom
-
Data Protection Act, 1998, Chapter 29, United Kingdom.
-
-
-
-
70
-
-
85179260550
-
-
Directive 95/46/EC, The Data Protection Directive, European Parliament and of the Council, 24 October 1995
-
Directive 95/46/EC, The Data Protection Directive, European Parliament and of the Council, 24 October 1995.
-
-
-
-
80
-
-
85179192362
-
-
OECD Guidelines for Cryptography Policy, Organization for Economic Co-operation and Development, 1997. 71a
-
OECD Guidelines for Cryptography Policy, Organization for Economic Co-operation and Development, 1997. 71a.
-
-
-
-
81
-
-
85179253523
-
-
1997 OECD Cryptography Guidelines: Recommendation of the Council, Organization for Economic Co-operation and Development, 27 March 1997. 71b
-
OECD Cryptography Guidelines: Recommendation of the Council, Organization for Economic Co-operation and Development, 27 March 1997. 71b.
-
-
-
-
82
-
-
85179191752
-
-
Report on Background and Issues of Cryptography Policy, Organization for Economic Co-operation and Development, 1997
-
Report on Background and Issues of Cryptography Policy, Organization for Economic Co-operation and Development, 1997.
-
-
-
-
83
-
-
85179227229
-
-
E-Government Act, Public Law 107-347 — Title III — Federal Information Security Management Act, U.S. Congress, 17 December, . 72a
-
E-Government Act, Public Law 107-347 — Title III — Federal Information Security Management Act, U.S. Congress, 17 December 2002. 72a.
-
(2002)
-
-
-
84
-
-
85179187122
-
-
OMB Memo M-04-25, FY2004 Reporting Instructions for the Federal Information Security Management Act, 23 August, . 72b
-
OMB Memo M-04-25, FY2004 Reporting Instructions for the Federal Information Security Management Act, 23 August 2004. 72b.
-
(2004)
-
-
-
85
-
-
85179279012
-
-
OMB Memo from M. Forman, Certification and Accreditation — What an Agency Can Do Now, 3 July, . 72c
-
OMB Memo from M. Forman, Certification and Accreditation — What an Agency Can Do Now, 3 July 2003. 72c.
-
(2003)
-
-
-
86
-
-
85179264450
-
-
OMB Memo M-05-15, FY2005 Reporting Instructions for the Federal Information Security Management Act and Privacy Officer, 13 June, . 72d
-
OMB Memo M-05-15, FY2005 Reporting Instructions for the Federal Information Security Management Act and Privacy Officer, 13 June 2005. 72d.
-
(2005)
-
-
-
87
-
-
85179253311
-
-
OMB Memo M-06-20, FY2006 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management, 17 July, . 72e
-
OMB Memo M-06-20, FY2006 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management, 17 July 2006. 72e.
-
(2006)
-
-
-
88
-
-
85179232185
-
-
OMB Memo M-06-16, Protection of Sensitive Agency Information, 23 June 2006. 72f
-
OMB Memo M-06-16, Protection of Sensitive Agency Information, 23 June 2006. 72f.
-
-
-
-
89
-
-
85179215169
-
-
OMB Memo M-06-19. Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost of Security in Agency Information Technology Investments, 12 July
-
OMB Memo M-06-19. Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost of Security in Agency Information Technology Investments, 12 July 2006.
-
(2006)
-
-
-
90
-
-
85179278577
-
-
GAO-04-354, Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems, Report to Congress, U.S. General Accounting Office, March
-
GAO-04-354, Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems, Report to Congress, U.S. General Accounting Office, March 2004.
-
(2004)
-
-
-
91
-
-
85179228917
-
-
GAO-05-551, Information Security: Radio Frequency Identification Technology in the Federal Government, May
-
GAO-05-551, Information Security: Radio Frequency Identification Technology in the Federal Government, May 2005.
-
(2005)
-
-
-
92
-
-
85179205758
-
-
Gramm-Leach-Bliley Act, Public Law 106-102, Title V — Privacy, U.S. Congress, 12 November, . 75a
-
Gramm-Leach-Bliley Act, Public Law 106-102, Title V — Privacy, U.S. Congress, 12 November 1999. 75a.
-
(1999)
-
-
-
93
-
-
85179215046
-
-
Gramm-Leach-Bliley Act, Department of the Treasury — Privacy of Consumer Financial Information; Final Rule, 12 CFR Parts 40, 216, 332, and 573, 1 June 2000
-
Gramm-Leach-Bliley Act, Department of the Treasury — Privacy of Consumer Financial Information; Final Rule, 12 CFR Parts 40, 216, 332, and 573, 1 June 2000. 75b.
-
-
-
-
94
-
-
85179186181
-
-
Gramm-Leach-Bliley Act, Federal Trade Commission — Privacy of Consumer Financial Information; Final Rule, 16 CFR Part 313, 24 May 2000. 75c
-
Gramm-Leach-Bliley Act, Federal Trade Commission — Privacy of Consumer Financial Information; Final Rule, 16 CFR Part 313, 24 May 2000. 75c.
-
-
-
-
95
-
-
85179212710
-
-
Gramm-Leach-Bliley Act, Securities and Exchange Commission — Privacy of Consumer Financial Information (Regulation S-P); Rules, 17 CFR Part 248, 29 July 2000. 75d
-
Gramm-Leach-Bliley Act, Securities and Exchange Commission — Privacy of Consumer Financial Information (Regulation S-P); Rules, 17 CFR Part 248, 29 July 2000. 75d.
-
-
-
-
96
-
-
85179224172
-
-
Gramm-Leach-Bliley Act, National Credit Union Administration — Privacy of Consumer Financial Information; Requirements for Insurance; Final Rule, 12 CFR Parts 716 and 741, 18 May 2000. 75e
-
Gramm-Leach-Bliley Act, National Credit Union Administration — Privacy of Consumer Financial Information; Requirements for Insurance; Final Rule, 12 CFR Parts 716 and 741, 18 May 2000. 75e.
-
-
-
-
97
-
-
85179245634
-
-
Gramm-Leach-Bliley Act, Federal Trade Commission — Standards for Safeguarding Customer Information; Final Rule, 16 CFR Part 314, 23 May 2002. 75f
-
Gramm-Leach-Bliley Act, Federal Trade Commission — Standards for Safeguarding Customer Information; Final Rule, 16 CFR Part 314, 23 May 2002. 75f.
-
-
-
-
98
-
-
85179204264
-
-
How to Comply with the Privacy of Consumer Information Rule of the Gramm-Leach-Bliley Act: A Guide for Small Business, Federal Trade Commission, July 2002
-
How to Comply with the Privacy of Consumer Information Rule of the Gramm-Leach-Bliley Act: A Guide for Small Business, Federal Trade Commission, July 2002.
-
-
-
-
99
-
-
85179189893
-
Public Law 95-630
-
Right to Financial Privacy Act of, Chapter 35
-
Right to Financial Privacy Act of 1978, Public Law 95-630, as codified at 12 U.S.C. Chapter 35.
-
(1978)
As Codified at 12 U.S.C
-
-
-
100
-
-
85179229280
-
Public Law 96-440, as codified at 42 U.S.C
-
Privacy Protection Act of
-
Privacy Protection Act of 1980, Public Law 96-440, as codified at 42 U.S.C. § 2000aa.
-
(1980)
§ 2000Aa
-
-
-
101
-
-
85179210548
-
Public Law 99-508
-
Electronic Communication Privacy Act of, Chapter 121
-
Electronic Communication Privacy Act of 1986, Public Law 99-508, as codified at 18 U.S.C. Chapter 121.
-
(1986)
As Codified at 18 U.S.C
-
-
-
102
-
-
85179199197
-
-
Computer Matching and Privacy Act of 1988, Public Law 100-503, as codified at 5 U.S.C. § 552a
-
Computer Matching and Privacy Act of 1988, Public Law 100-503, as codified at 5 U.S.C. § 552a.
-
-
-
-
119
-
-
85179293055
-
-
Video Privacy Protection Act of 1988, Public Law 100-618, as codified at 18 U.S.C. § 2710
-
Video Privacy Protection Act of 1988, Public Law 100-618, as codified at 18 U.S.C. § 2710.
-
-
-
-
129
-
-
85179250866
-
-
Government Reform Committee, U.S. House of Representatives, 10 January
-
Report of the Best Practices and Metrics Teams, Corporate Information Security Working Group, Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, Government Reform Committee, U.S. House of Representatives, 10 January 2005.
-
(2005)
Report of the Best Practices and Metrics Teams, Corporate Information Security Working Group, Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census
-
-
-
134
-
-
84867021334
-
Defined Security Creates Efficiencies
-
Fourth Quarter
-
@stake Labs, “Defined Security Creates Efficiencies,” Secure Business Quarterly, Fourth Quarter 2001.
-
(2001)
Secure Business Quarterly
-
-
-
137
-
-
84951282140
-
-
IEEE Computer Society Press
-
Ammann, P., Barnes, B., Jajodia, S., and Sibley, E. (Eds.), Proceedings, Computer Security, Dependability, and Assurance: From Needs to Solutions, IEEE Computer Society Press, 1998.
-
(1998)
Proceedings, Computer Security, Dependability, and Assurance: from Needs to Solutions
-
-
Ammann, P.1
Barnes, B.2
Jajodia, S.3
Sibley, E.4
-
138
-
-
85179194154
-
Budgeting for Infosecurity: Are Funds Growing?
-
April
-
Armstrong, I., “Budgeting for Infosecurity: Are Funds Growing?” SC Magazine, April 2002.
-
(2002)
SC Magazine
-
-
Armstrong, I.1
-
139
-
-
85179245018
-
Failure Must Be Part of the Plan
-
May 2005. 115
-
Armstrong, I., “Failure Must Be Part of the Plan,” SC Magazine, pp. 24–28, May 2005. 115.
-
SC Magazine
, pp. 24-28
-
-
Armstrong, I.1
-
142
-
-
0035553293
-
Security Metrics
-
Computer Security Institute, January
-
Bayuk, J.L., “Security Metrics,” Computer Security Journal, Computer Security Institute, January 2001.
-
(2001)
Computer Security Journal
-
-
Bayuk, J.L.1
-
146
-
-
38349012988
-
An Imprecise but Necessary Calculation
-
Fourth Quarter
-
Blakely, B., “An Imprecise but Necessary Calculation,” Secure Business Quarterly, Fourth Quarter 2001.
-
(2001)
Secure Business Quarterly
-
-
Blakely, B.1
-
147
-
-
0013025146
-
-
2nd edition, CRC Press
-
Bolz, F., Dodonis, K.J., and Schultz, D.P., The Counterterrorism Handbook: Tactics, Procedures, and Techniques, 2nd edition, CRC Press, 2002.
-
(2002)
The Counterterrorism Handbook: Tactics, Procedures, and Techniques
-
-
Bolz, F.1
Dodonis, K.J.2
Schultz, D.P.3
-
148
-
-
85179233460
-
Doom or Boom? Fearing the Worst, Companies Are Diversifying Their Security Spending
-
April
-
Briney, A., “Doom or Boom? Fearing the Worst, Companies Are Diversifying Their Security Spending,” Information Security, April 2004.
-
(2004)
Information Security
-
-
Briney, A.1
-
149
-
-
85179282413
-
HIPAA Security Compliance Not Just an IT Problem
-
Brenner, B., “HIPAA Security Compliance Not Just an IT Problem,” Search Security. com, 30 September 2004.
-
(2004)
Search Security. Com
-
-
Brenner, B.1
-
150
-
-
85179205732
-
-
McLean, VA
-
Buskin, A. and Schaen, S., The Privacy Act of 1974: A Reference Manual for Compliance, System Development Corporation, McLean, VA, 1975.
-
(1975)
The Privacy Act of 1974: A Reference Manual for Compliance, System Development Corporation
-
-
Buskin, A.1
Schaen, S.2
-
152
-
-
85179273734
-
-
Stockholm University and Royal Institute of Technology, 12 December
-
Chaula, J.A., Security Metrics and Public Key Infrastructure Interoperability Testing, Licentiate thesis, Department Computer and Systems Sciences, Stockholm University and Royal Institute of Technology, 12 December 2003.
-
(2003)
Security Metrics and Public Key Infrastructure Interoperability Testing, Licentiate Thesis, Department Computer and Systems Sciences
-
-
Chaula, J.A.1
-
153
-
-
85179228545
-
Information Risk Management at 3Com
-
Fourth Quarter
-
Clafin, B., “Information Risk Management at 3Com,” Security Business Quarterly, Fourth Quarter 2001.
-
(2001)
Security Business Quarterly
-
-
Clafin, B.1
-
154
-
-
85179197477
-
Compliance: Changing Our Approach to Data
-
Hewlett-Packard e-newsletter, July
-
“Compliance: Changing Our Approach to Data,” Connected, Hewlett-Packard e-newsletter, July 2004.
-
(2004)
Connected
-
-
-
155
-
-
85179289650
-
HIPAA Compliance: One Organization’s Tale
-
May
-
DeBrino, R., “HIPAA Compliance: One Organization’s Tale,” CIO Decisions, p. 29, May 2005.
-
(2005)
CIO Decisions
, pp. 29
-
-
Debrino, R.1
-
157
-
-
85179298184
-
Earthlink: Security from the Inside: A Dialogue with Lisa Ekman and Lisa Hoyt
-
Fourth Quarter
-
Earthlink: Security from the Inside: A Dialogue with Lisa Ekman and Lisa Hoyt, Secure Business Quarterly, Fourth Quarter 2001.
-
(2001)
Secure Business Quarterly
-
-
-
158
-
-
0004111414
-
-
EEE Computer Society Press
-
Emam, K., Drouin, J., and Melo, W., SPICE: The Theory and Practice of Software Process Improvement and Capability Determination, IEEE Computer Society Press, 1998. 134.
-
(1998)
SPICE: The Theory and Practice of Software Process Improvement and Capability Determination
, pp. 134
-
-
Emam, K.1
Drouin, J.2
Melo, W.3
-
161
-
-
85179230219
-
-
Evans, N., High Risk, High Rewards, Optimize, TechWeb Business Technology Network, March 2002, Issue 5.
-
(2002)
High Risk, High Rewards, Optimize, Techweb Business Technology Network
, Issue.5
-
-
Evans, N.1
-
163
-
-
0037501895
-
-
International Thomson Computer Press
-
Fenton, N., Whitty, R., and Iizuka, Y. (Eds .), Software Quality Assurance and Measurement: A Worldwide Perspective, International Thomson Computer Press, 1995.
-
(1995)
Software Quality Assurance and Measurement: A Worldwide Perspective
-
-
Fenton, N.1
Whitty, R.2
Iizuka, Y.3
-
165
-
-
85179277104
-
FTC Enforces Gramm-Leach-Bliley Act’s Safeguards Rule against Mortgage Companies
-
“FTC Enforces Gramm-Leach-Bliley Act’s Safeguards Rule against Mortgage Companies,” Federal Trade Commission Press Release, 16 November 2004.
-
(2004)
Federal Trade Commission Press Release
-
-
-
166
-
-
85179254341
-
Sensitive Information in Financial Services, for CS 457a course
-
November
-
Fuldner, G., Sensitive Information in Financial Services, for CS 457a course, Yale, 14 November 2003.
-
(2003)
Yale
, pp. 14
-
-
Fuldner, G.1
-
168
-
-
67650962431
-
Information Security Governance Reporting
-
Auerbach Publications, October
-
Garigue, R. and Stefaniu, M., “Information Security Governance Reporting,” EDP Audit, 76-15-11, Auerbach Publications, October 2003.
-
(2003)
EDP Audit, 76-15-11
-
-
Garigue, R.1
Stefaniu, M.2
-
169
-
-
24944590864
-
Making Choices to Show ROI
-
Fourth Quarter
-
Geer, D.E., “Making Choices to Show ROI,” Secure Business Quarterly, Fourth Quarter 2001.
-
(2001)
Secure Business Quarterly
-
-
Geer, D.E.1
-
170
-
-
85179296847
-
Why the Future Belongs to the Quants
-
Geer, D.E., Soo Hoo, K., and Jaquith, A., “Why the Future Belongs to the Quants,” Security and Privacy Magazine, IEEE, July 2003, pp. 24–32.
-
(2003)
Security and Privacy Magazine
, pp. 24-32
-
-
Geer, D.E.1
Soo Hoo, K.2
Jaquith, A.3
-
174
-
-
84944391018
-
Software Security Checklist for the Software Life Cycle
-
Gilliam, D., Wolfe, T., Sherif, J., and Bishop, M., “Software Security Checklist for the Software Life Cycle,” Proceedings 12th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003.
-
(2003)
Proceedings 12Th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
-
-
Gilliam, D.1
Wolfe, T.2
Sherif, J.3
Bishop, M.4
-
176
-
-
33748680808
-
-
The Sarbanes-Oxley Environment, The Institute of Internal Auditors Research Foundation
-
Gray, G.L., Changing Internal Audit Practices in the New Paradigm: The Sarbanes-Oxley Environment, The Institute of Internal Auditors Research Foundation, 2004.
-
(2004)
Changing Internal Audit Practices in the New Paradigm
-
-
Gray, G.L.1
-
179
-
-
85179240040
-
Common Criteria Cleared for Take Off at the U.S. Federal Aviation Administration
-
Herrmann, D., “Common Criteria Cleared for Take Off at the U.S. Federal Aviation Administration,” Information Security Bulletin, December 2004, pp. 379–388.
-
(2004)
Information Security Bulletin
, pp. 379-388
-
-
Herrmann, D.1
-
182
-
-
0035265773
-
Application of Common Criteria to Telecom Services
-
Herrmann, D. and Keith, S., “Application of Common Criteria to Telecom Services,” Computer Security Journal, 17(2), 21–28, 2001.
-
(2001)
Computer Security Journal
, vol.17
, Issue.2
, pp. 21-28
-
-
Herrmann, D.1
Keith, S.2
-
185
-
-
85179297080
-
-
Hollingworth, D, Towards Threat, Attack, and Vulnerability Taxonomies, Network Associates Laboratories, 2002.
-
(2002)
Towards Threat, Attack, and Vulnerability Taxonomies, Network Associates Laboratories
-
-
Hollingworth, D.1
-
186
-
-
85179196268
-
A Comparison of Electrical Sector Cyber Security Standards and Guideline
-
INEEL/EXT-04-02428, rev., 2 November
-
INEEL/EXT-04-02428, rev., “A Comparison of Electrical Sector Cyber Security Standards and Guidelines,” Idaho National Engineering and Environmental Lab, 2 November 2004.
-
(2004)
Idaho National Engineering and Environmental Lab
-
-
-
191
-
-
85179235398
-
New Federal ID Standard Approved
-
February
-
Jackson, W., “New Federal ID Standard Approved,” Government Computer News, 25 February 2005.
-
(2005)
Government Computer News
, pp. 25
-
-
Jackson, W.1
-
192
-
-
85179275245
-
Threat of the Auditors: The Sarbanes-Oxley Act Is a Danger to Growth
-
Novak, R., Threat of the Auditors: The Sarbanes-Oxley Act Is a Danger to Growth, The Washington Post, p. A31, 7 April 2005.
-
(2005)
The Washington Post
, pp. A31
-
-
Novak, R.1
-
194
-
-
33846674467
-
SSE-CMM® Security Metrics
-
Washington, D.C., June
-
Jelen, G., “SSE-CMM® Security Metrics,” Profiles, Assurance and Metrics Committee, International Systems Security Engineering Association, presented at NIST Workshop, Washington, D.C., June 2000.
-
(2000)
Profiles, Assurance and Metrics Committee, International Systems Security Engineering Association, Presented at NIST Workshop
-
-
Jelen, G.1
-
195
-
-
85179290139
-
Cyber Security for the Bulk Electric System
-
January and March
-
Johnson, A., “Cyber Security for the Bulk Electric System,” NERC Cyber Security Workshops, January and March 2005.
-
(2005)
NERC Cyber Security Workshops
-
-
Johnson, A.1
-
196
-
-
85179255590
-
Passing the Audit
-
Johnson, M., Passing the Audit, CIO Decisions, pp. 48–51, April 2005.
-
(2005)
CIO Decisions
, pp. 48-51
-
-
Johnson, M.1
-
200
-
-
17844395374
-
Executive Summary: Insight into Return on Security Investment
-
Fourth Quarter
-
Karofsky, E., “Executive Summary: Insight into Return on Security Investment,” Security Business Quarterly, Fourth Quarter 2001.
-
(2001)
Security Business Quarterly
-
-
Karofsky, E.1
-
206
-
-
85179239905
-
Security: Measuring Up
-
Lindstrom, P. “Security: Measuring Up,” Information Security, February 2005, pp. 48–55.
-
(2005)
Information Security
, pp. 48-55
-
-
Lindstrom, P.1
-
207
-
-
85179235327
-
Know Your Customers Inside & Out: The Best Way to Work with the Patriot Act
-
May
-
Lovejoy, K., “Know Your Customers Inside & Out: The Best Way to Work with the Patriot Act,” SC Magazine, p. 78, May 2005.
-
(2005)
SC Magazine
, pp. 78
-
-
Lovejoy, K.1
-
209
-
-
0003533985
-
Handbook of Software Reliability Engineering
-
Lyu, M. (Ed.), Handbook of Software Reliability Engineering, IEEE Computer Society Press, 1996.
-
(1996)
IEEE Computer Society Press
-
-
Lyu, M.1
-
210
-
-
85179196774
-
Bill C-13: An Act to Amend the Criminal Code, Capital Markets Fraud and Evidence Gathering
-
Parliamentary Information and Research Service
-
MacKay, R. and Smith M., “Bill C-13: An Act to Amend the Criminal Code, Capital Markets Fraud and Evidence Gathering,” LS-469E, Legislative Summaries, Library of Parliament, Parliamentary Information and Research Service, 2004. 186.
-
(2004)
LS-469E, Legislative Summaries, Library of Parliament
, pp. 186
-
-
Mackay, R.1
Smith, M.2
-
212
-
-
85179197881
-
U.S. Working Group Reports on Security Metrics
-
McCollum, T., “U.S. Working Group Reports on Security Metrics,” IT Audit, Institute of Internal Auditors, Vol. 8, 1 February 2005.
-
(2005)
IT Audit, Institute of Internal Auditors
, vol.8
, pp. 1
-
-
McCollum, T.1
-
213
-
-
85179213141
-
U.S. Working Group Issues Security Proposals, IT Audit
-
McCollum, T., U.S. Working Group Issues Security Proposals, IT Audit, Institute of Internal Auditors, Vol. 7, 1 June 2004.
-
(2004)
Institute of Internal Auditors
, vol.7
, pp. 1
-
-
McCollum, T.1
-
214
-
-
84994873283
-
‘Standards-Based’ Approach to Operational Risk Management under Basel II
-
McConnel, P.,A ‘Standards-Based’ Approach to Operational Risk Management under Basel II, ContinuityCentral.com, 14 January 2005.
-
(2005)
Continuitycentral.Com
, pp. 14
-
-
McConnel, P.1
-
216
-
-
70549084398
-
-
Infosec Research Council (IRC), November
-
Hard Problem List, Infosec Research Council (IRC), November 2005.
-
(2005)
Hard Problem List
-
-
-
217
-
-
85179246895
-
Keeping the Data and Oil Flowing
-
May
-
Mimoso, M., Keeping the Data and Oil Flowing, Information Security, pp. 44–48, May 2005.
-
(2005)
Information Security
, pp. 44-48
-
-
Mimoso, M.1
-
218
-
-
85179217515
-
Whose in Charge of Privacy Issues? Agencies Have until March 11 to Figure It Out
-
17 February
-
Miller, J., “Whose in Charge of Privacy Issues? Agencies Have until March 11 to Figure It Out,” Government Computer News, GCN.com, 17 February 2005. 193a.
-
(2005)
Government Computer News
, pp. 193
-
-
Miller, J.1
-
219
-
-
85179285971
-
Is Your Agency Required to Have a Privacy Officer?
-
Miller, J., “Is Your Agency Required to Have a Privacy Officer?,” Government Computer News, GCN.com, 13 December 2004.
-
(2004)
Government Computer News
-
-
Miller, J.1
-
220
-
-
85179257774
-
Return on Information Security Investment: Are You Spending Enough?
-
Mizzi, A., Return on Information Security Investment: Are You Spending Enough? Are You Spending Too Much?, Geocities.com/amz, January 2005.
-
Are You Spending Too Much?
-
-
Mizzi, A.1
-
221
-
-
0003960126
-
-
McGraw-Hill, Inc
-
Musa, J., Iannino, A., and Okumoto, K., Software Reliability: Measurement, Prediction, Application, McGraw-Hill, Inc., 1987.
-
(1987)
Software Reliability: Measurement, Prediction, Application
-
-
Musa, J.1
Iannino, A.2
Okumoto, K.3
-
222
-
-
85179242240
-
Secure Hardware Design
-
July
-
Oblivion, B., “Secure Hardware Design,” Black Hat Briefings, 26–27 July 2000.
-
(2000)
Black Hat Briefings
, pp. 26-27
-
-
Oblivion, B.1
-
223
-
-
0003754396
-
-
3rd edition, John Wiley & Sons, Ltd., 1991. 198. Out-Think Shrink — What Every Retailer Should Know about Loss Prevention, IntelliQ Ltd
-
O’Connor, P., Practical Reliability Engineering, 3rd edition, John Wiley & Sons, Ltd., 1991. 198. Out-Think Shrink — What Every Retailer Should Know about Loss Prevention, IntelliQ Ltd., 2004.
-
(2004)
Practical Reliability Engineering
-
-
O’Connor, P.1
-
225
-
-
85179271303
-
“Utilities Face Deadline from NERC to Meet FERC Security Mandate,” Energy Beat
-
10 January
-
Perin, M., “Utilities Face Deadline from NERC to Meet FERC Security Mandate,” Energy Beat, Houston Business Journal, 10 January 2005.
-
(2005)
Houston Business Journal
-
-
Perin, M.1
-
230
-
-
85179218934
-
We Must Learn to Love Compliance
-
Quainton, D., “We Must Learn to Love Compliance,” SC Magazine, February 2005, pp. 28–31.
-
(2005)
SC Magazine
, pp. 28-31
-
-
Quainton, D.1
-
231
-
-
85179265949
-
Meeting the Challenges of Security Mandates
-
May
-
Radding, A., “Meeting the Challenges of Security Mandates,” CIO Decisions, pp. 26–28, May 2005.
-
(2005)
CIO Decisions
, pp. 26-28
-
-
Radding, A.1
-
232
-
-
85179276777
-
Sticking Plaster that Won’t Stick: Why HIPAA Has Failed to Achieve the Same Level of Success as SOX
-
May
-
Rothke, B., “Sticking Plaster that Won’t Stick: Why HIPAA Has Failed to Achieve the Same Level of Success as SOX,” SC Magazine, pp. 45–46, May 2005.
-
(2005)
SC Magazine
, pp. 45-46
-
-
Rothke, B.1
-
233
-
-
85179258306
-
Will HIPAA Bite?
-
May
-
Savage, M., “Will HIPAA Bite?,” SC Magazine, pp. 40–42, May 2005.
-
(2005)
SC Magazine
, pp. 40-42
-
-
Savage, M.1
-
240
-
-
3042809894
-
Tangible ROI through Secure Software Engineering
-
Fourth Quarter
-
Soo Hoo, K., Sudbury, A., and Jaquith, A., “Tangible ROI through Secure Software Engineering,” Secure Business Quarterly, Fourth Quarter 2001.
-
(2001)
Secure Business Quarterly
-
-
Soo Hoo, K.1
Sudbury, A.2
Jaquith, A.3
-
241
-
-
85179225759
-
STRAIS: A Method for Security Requirements Engineering Using a Standards-Based Network Security Reference Model
-
Stephenson, P., “STRAIS: A Method for Security Requirements Engineering Using a Standards-Based Network Security Reference Model,” Netigy Corporation, 2001.
-
(2001)
Netigy Corporation
-
-
Stephenson, P.1
-
244
-
-
85179215767
-
Security Metrics Consortium Founded by Top CSOs/ CISOs
-
Summers, C. and Weers, K., Security Metrics Consortium Founded by Top CSOs/ CISOs, Shift Communications, 24 February 2004.
-
(2004)
Shift Communications
-
-
Summers, C.1
Weers, K.2
-
245
-
-
70449362889
-
What Insurance Can — and Can’t — Do for Security Risks
-
Fourth Quarter
-
Thieme, R., “What Insurance Can — and Can’t — Do for Security Risks,” Secure Business Quarterly, Fourth Quarter 2001.
-
(2001)
Secure Business Quarterly
-
-
Thieme, R.1
-
248
-
-
84969544889
-
Information Assurance Measures and Metrics — State of Practice and Proposed Taxonomy
-
Vaugn, R., Henning, R., and Siraj, A., “Information Assurance Measures and Metrics — State of Practice and Proposed Taxonomy,” Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-03), IEEE Computer Society, 2003.
-
(2003)
Proceedings of the 36Th Hawaii International Conference on System Sciences (HICSS-03), IEEE Computer Society
-
-
Vaugn, R.1
Henning, R.2
Siraj, A.3
-
254
-
-
85179240649
-
House Endorses Altering Security Alerts
-
May
-
Kehaulani-Goo, S., “House Endorses Altering Security Alerts,” The Washington Post, pp. A9, 19 May 2005.
-
(2005)
The Washington Post
, vol.19
, pp. A9
-
-
Kehaulani-Goo, S.1
-
255
-
-
85179296165
-
Expanded Patriot Act to Be Proposed
-
May
-
Associated Press, “Expanded Patriot Act to Be Proposed,” The Washington Post, pp. A8, 19 May 2005.
-
(2005)
The Washington Post
, vol.19
, pp. A8
-
-
Press, A.1
-
263
-
-
85179278697
-
-
Rapiscan Systems Product Brochure #9150068-1, undated
-
Rapiscan Secure 1000, Rapiscan Systems Product Brochure #9150068-1, undated.
-
Rapiscan Secure 1000
-
-
-
266
-
-
33646535133
-
Extreme Availability: NYSE’s New IT Infrastructure Puts Hand-Held Wireless Terminals in Brokers’ Hands
-
“Extreme Availability: NYSE’s New IT Infrastructure Puts Hand-Held Wireless Terminals in Brokers’ Hands,” Communications News, June 2005, pp. 12–17.
-
(2005)
Communications News, June
, pp. 12-17
-
-
-
267
-
-
33646517976
-
Ensure Data Center Resiliency: Intelligent networks can lower costs and improve security and business continuity
-
Allard, Pierre-Paul, “Ensure Data Center Resiliency: Intelligent networks can lower costs and improve security and business continuity,” Communications News, June 2005, pp. 40–43.
-
(2005)
Communications News
, pp. 40-43
-
-
Allard, P.-P.1
-
268
-
-
85179279727
-
-
Patriot Second Act
-
Patriot Second Act,” The Washington Post, 13 June 2005, pp. A18.
-
(2005)
The Washington Post
, pp. A18
-
-
-
269
-
-
85179195116
-
Reining in Risk Turns into Big Business: Sarbanes-Oxley Creates Winners
-
Silverman, E., Reining in Risk Turns into Big Business: Sarbanes-Oxley Creates Winners, The Washington Post, 13 June 2005, pp. D1 and D9.
-
(2005)
The Washington Post
-
-
Silverman, E.1
-
270
-
-
85179197077
-
Senate Panel Approves New FBI Powers for Patriot Act
-
“Senate Panel Approves New FBI Powers for Patriot Act,” The Washington Post Express, 8 June 2005, p. 3.
-
The Washington Post Express
, vol.8
, pp. 3
-
-
-
271
-
-
85179211928
-
OMB Releases FIMSA Guidance with Focus on Privacy
-
June
-
Miller, J., “OMB Releases FIMSA Guidance with Focus on Privacy,” Government Computer News, gcn.com, 15 June 2005.
-
(2005)
Government Computer News, Gcn.Com
, pp. 15
-
-
Miller, J.1
-
272
-
-
77957056012
-
40 Million Credit Card Numbers Hacked: Data Breached at Processing Center
-
Krim, J. and Barbaro, M., “40 Million Credit Card Numbers Hacked: Data Breached at Processing Center,” The Washington Post, 18 June 2005, pp. A1 and A10.
-
(2005)
The Washington Post
, pp. A1 and A10
-
-
Krim, J.1
Barbaro, M.2
-
274
-
-
85179249479
-
State Tells Lawmakers Biometrics Will Ensure Identity
-
Mosquera, M., “State Tells Lawmakers Biometrics Will Ensure Identity,” Government Computer News, gcn.com, 23 June 2005.
-
(2005)
Government Computer News, Gcn.Com
-
-
Mosquera, M.1
-
275
-
-
85179200935
-
Outsourcing in India in Crisis over Scam: British Paper Alleges Security Breach
-
Lancaster, J., “Outsourcing in India in Crisis over Scam: British Paper Alleges Security Breach,” The Washington Post, 25 June 2005, p. A18.
-
(2005)
The Washington Post
, pp. A18
-
-
Lancaster, J.1
-
277
-
-
85179258372
-
Draft Guidelines Released for Certifying PIV Card Issuers
-
Jackson, W., “Draft Guidelines Released for Certifying PIV Card Issuers,” Government Computer News, gcn.com, 20 June 2005.
-
(2005)
Government Computer News, Gcn.Com
-
-
Jackson, W.1
-
278
-
-
85179236574
-
W.P., “GAO Study of RFID Technology, Policy Seen Flawed
-
Dizard III, W.P., “GAO Study of RFID Technology, Policy Seen Flawed,” Government Computer News, gcn.com, 31 May 2005
-
(2005)
Government Computer News, Gcn.Com
-
-
Dizard, I.I.I.1
-
279
-
-
77949710211
-
Biometric Identification
-
Lerner, E., “Biometric Identification,” The Industrial Physicist, 6(1), 20–23, 2000.
-
(2000)
The Industrial Physicist
, vol.6
, Issue.1
, pp. 20-23
-
-
Lerner, E.1
-
280
-
-
85179282809
-
Security, Privacy, and Fraud Research
-
Rendell, A., “Security, Privacy, and Fraud Research,” Safety Systems, 9(2), 13–15, 2000.
-
(2000)
Safety Systems
, vol.9
, Issue.2
, pp. 13-15
-
-
Rendell, A.1
-
281
-
-
85179281114
-
Between Friends: Don’t Extend Trust Too Far
-
Jones, B. and Deane, D., “Between Friends: Don’t Extend Trust Too Far,” SC Magazine, February 2005, pp. 39–40.
-
(2005)
SC Magazine
, pp. 39-40
-
-
Jones, B.1
Deane, D.2
-
282
-
-
85179199335
-
Stop That Fraud: Fingerprints Will Secure Texas Systems
-
February
-
Sterlicchi, J., “Stop That Fraud: Fingerprints Will Secure Texas Systems,” SC Magazine, February 2005, p. 42.
-
(2005)
SC Magazine
, pp. 42
-
-
Sterlicchi, J.1
-
283
-
-
85179185882
-
Would You Show This Card to Mom
-
Armstrong, I., “Would You Show This Card to Mom,” SC Magazine, March 2005, p. 15.
-
(2005)
SC Magazine
, pp. 15
-
-
Armstrong, I.1
-
284
-
-
85179293152
-
-
www.soxonline.com.
-
-
-
-
285
-
-
85179279165
-
Sarbanes-Oxley for IT Security
-
Rasch, M., “Sarbanes-Oxley for IT Security,” securityfocus.com, 3 May 2005.
-
(2005)
Securityfocus.Com
-
-
Rasch, M.1
-
287
-
-
85179222237
-
New FISMA Standard Advances toward Finalization
-
Jackson, W., “New FISMA Standard Advances toward Finalization,” Government Computer News, gcn.com, 19 July 2005.
-
(2005)
Government Computer News, Gcn.Com
-
-
Jackson, W.1
-
288
-
-
84991563616
-
Enron Fraud Pacts Set Records: CIBC Deal Brings Total to $7 Billion
-
Starkman, D., “Enron Fraud Pacts Set Records: CIBC Deal Brings Total to $7 Billion,” The Washington Post, 3 August 2005, pp. D1–D2.
-
(2005)
The Washington Post
, pp. D1-D2
-
-
Starkman, D.1
-
289
-
-
85179282270
-
Law is Nothing without Enforcement
-
Cullinane, D., “Law is Nothing without Enforcement,” SC Magazine, August 2005, p. 20.
-
(2005)
SC Magazine
, pp. 20
-
-
Cullinane, D.1
-
290
-
-
85179207547
-
-
Infragard 2005 National Conference, 8–11 August, Washington, D.C
-
Mix, S., Securing the Electric Grid — NERC CIP Standards, Infragard 2005 National Conference, 8–11 August 2005, Washington, D.C.
-
(2005)
Mix, S., Securing the Electric Grid — NERC CIP Standards
-
-
-
292
-
-
85179266078
-
Management and Enforcement of Privacy Obligations in Enterprises
-
September
-
Mont, M.C., Bramhall, P., and Chan, K.N., “Management and Enforcement of Privacy Obligations in Enterprises,” Information Security Bulletin, September 2005, pp. 245–258.
-
(2005)
Information Security Bulletin
, pp. 245-258
-
-
Mont, M.C.1
Bramhall, P.2
Chan, K.N.3
-
294
-
-
85179200192
-
-
Lotem, A. and Moiseles, M., Using Attack Simulation and Risk Models for Automated Vulnerability Management, Information Security Bulletin, March 2005, pp. 45–54.
-
(2005)
Using Attack Simulation and Risk Models for Automated Vulnerability Management, Information Security Bulletin
, pp. 45-54
-
-
Lotem, A.1
Moiseles, M.2
-
298
-
-
0032164210
-
A Survey of Web Security
-
Rubin, A. and Geer, Jr., D., “A Survey of Web Security,” Computer, 31(9), pp. 34–43, 1998.
-
(1998)
Computer
, vol.31
, Issue.9
, pp. 34-43
-
-
Rubin, A.1
Geer, D.2
-
299
-
-
0004300838
-
-
Applied Internet Security, Addison-Wesley
-
Feghi, J., Feghi, J., and Williams, P., Digital Certificates: Applied Internet Security, Addison-Wesley, 1998.
-
(1998)
Digital Certificates
-
-
Feghi, J.1
Feghi, J.2
Williams, P.3
-
301
-
-
0003855464
-
-
2nd edition, John Wiley & Sons
-
Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition, John Wiley & Sons, 1995.
-
(1995)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
303
-
-
0033879165
-
Biometrics: The Futur e of Identification
-
Pankanti, S., Bolle, R., and Jain, A., “Biometrics: the Futur e of Identification,” Computer, 33(2), 46–49, 2000.
-
(2000)
Computer
, vol.33
, Issue.2
, pp. 46-49
-
-
Pankanti, S.1
Bolle, R.2
Jain, A.3
-
304
-
-
85008032336
-
Smart Cards Aren’t Always the Smart Choice
-
Chadwick, D., “Smart Cards Aren’t Always the Smart Choice,” Computer, 32(12), 142–143, 1999.
-
(1999)
Computer
, vol.32
, Issue.12
, pp. 142-143
-
-
Chadwick, D.1
-
305
-
-
85179291551
-
News Briefs: Companies Join Forces for Smart Card Standard
-
Garber, L., “News Briefs: Companies Join Forces for Smart Card Standard,” Computer, 31(11), 19–20, 1998.
-
(1998)
Computer
, vol.31
, Issue.11
, pp. 19-20
-
-
Garber, L.1
-
306
-
-
0033895852
-
An Emerging Biometric API Standard
-
Tilton, C., “An Emerging Biometric API Standard,” Computer, 33(2), 130–132, 2000.
-
(2000)
Computer
, vol.33
, Issue.2
, pp. 130-132
-
-
Tilton, C.1
-
307
-
-
0033899298
-
Bio ID: A Multimodal Biometric Identification System
-
Frischoltz, T. and Dickmann, U., “Bio ID: A Multimodal Biometric Identification System,” Computer, 33(2), 64–69, 2000.
-
(2000)
Computer
, vol.33
, Issue.2
, pp. 64-69
-
-
Frischoltz, T.1
Dickmann, U.2
-
308
-
-
77949710211
-
Biometric Identification
-
Lerner, E., “Biometric Identification,” The Industrial Physicist, 6(1), 20–23, 2000.
-
(2000)
The Industrial Physicist
, vol.6
, Issue.1
, pp. 20-23
-
-
Lerner, E.1
-
309
-
-
85179206006
-
Trusted Gate Closes on Thin-Client Computer Network Security Holes
-
Hankins, M., “Trusted Gate Closes on Thin-Client Computer Network Security Holes,” SIGNAL, December 1999, pp. 67–69.
-
(1999)
SIGNAL
, pp. 67-69
-
-
Hankins, M.1
-
312
-
-
0344614689
-
Surviving Information Warfare Attacks
-
Jajoda, S., Ammann, P., and McCollum, C., “Surviving Information Warfare Attacks,” Computer, 32(4), pp. 57–63, 1999.
-
(1999)
Computer
, vol.32
, Issue.4
, pp. 57-63
-
-
Jajoda, S.1
Ammann, P.2
McCollum, C.3
-
313
-
-
0031681561
-
-
Sander, T. and Tschudin, C., Toward Mobile Cryptography, IEEE Symposium on Security and Privacy, 1998, pp. 215–224.
-
(1998)
Toward Mobile Cryptography, IEEE Symposium on Security and Privacy
, pp. 215-224
-
-
Sander, T.1
Tschudin, C.2
-
314
-
-
0032097883
-
A Map of Security Risks Associated with using COTS
-
Lindquist, U. and Jonssen, E., “A Map of Security Risks Associated with using COTS,” Computer, 31(6), 60–66, 1998.
-
(1998)
Computer
, vol.31
, Issue.6
, pp. 60-66
-
-
Lindquist, U.1
Jonssen, E.2
-
315
-
-
84937027961
-
Cryptography: Is Staying with the Herd Really Best?
-
Ritter, T., “Cryptography: Is Staying with the Herd Really Best?,” Computer, 32(8), 94–95, 1999.
-
(1999)
Computer
, vol.32
, Issue.8
, pp. 94-95
-
-
Ritter, T.1
-
317
-
-
0032164876
-
Algorithm-Agile Encryption in ATM Networks
-
Tarman, T., Hutchinson, R., Pierson, L., Sholander, P., and Witzke, E., “Algorithm-Agile Encryption in ATM Networks,” Computer, 31(9), 57–64, 1998.
-
(1998)
Computer
, vol.31
, Issue.9
, pp. 57-64
-
-
Tarman, T.1
Hutchinson, R.2
Pierson, L.3
Sholander, P.4
Witzke, E.5
-
318
-
-
85008010113
-
Melissa Virus Creates a New Type of Threat
-
Garber, L., “Melissa Virus Creates a New Type of Threat,” Computer, 32(6), 16–19, 1999.
-
(1999)
Computer
, vol.32
, Issue.6
, pp. 16-19
-
-
Garber, L.1
-
320
-
-
0032010369
-
Consumer Privacy Concerns about Internet Marketing
-
Wang, H., Lee, M., and Wang, C., “Consumer Privacy Concerns about Internet Marketing,” Communications of the ACM, 41(3), 63–70, 1998.
-
(1998)
Communications of the ACM
, vol.41
, Issue.3
, pp. 63-70
-
-
Wang, H.1
Lee, M.2
Wang, C.3
-
321
-
-
85179233050
-
Can You Keep a Secret?
-
September 10
-
Blackburn, N., “Can You Keep a Secret?,” The Jerusalem Post, September 10, 1999, pp. 28–29.
-
(1999)
The Jerusalem Post
, pp. 28-29
-
-
Blackburn, N.1
-
322
-
-
0002779304
-
Privacy, Information Technology and Health Care
-
Rindfleisch, T., “Privacy, Information Technology and Health Care,” Communications of the ACM, 40(8), 92–100, 1997.
-
(1997)
Communications of the ACM
, vol.40
, Issue.8
, pp. 92-100
-
-
Rindfleisch, T.1
-
324
-
-
84969851569
-
-
Weinstock, C. and Rushby, J. (Eds.), Dependable Computing for Critical Applications 7, IEEE, pp
-
Deutertre, B. and Stavridou, V., A Model of Noninterference for Integrating Mixed Criticality Software Components, Weinstock, C. and Rushby, J. (Eds.), Dependable Computing for Critical Applications 7, IEEE, pp. 301–316, 1999.
-
(1999)
A Model of Noninterference for Integrating Mixed Criticality Software Components
, pp. 301-316
-
-
Deutertre, B.1
Stavridou, V.2
-
325
-
-
85179188394
-
-
IEEE Symposium on Security and Privacy
-
Fraser, T., Badger, L., and Feldman, M., Hardening COTS Software with Generic Software Wrappers, IEEE Symposium on Security and Privacy, 1999.
-
(1999)
Hardening COTS Software with Generic Software Wrappers
-
-
Fraser, T.1
Badger, L.2
Feldman, M.3
-
326
-
-
85179219849
-
Resurging Business Challenges Hotel IT
-
Ybarra, M., “Resurging Business Challenges Hotel IT,” CIO Decisions, January 2006, pp. 26–28.
-
(2006)
CIO Decisions
, pp. 26-28
-
-
Ybarra, M.1
-
327
-
-
0032164492
-
Security for Virtual Private Intranets
-
Arbaugh, W., Davin, J., Farber, D., and Smith, J., “Security for Virtual Private Intranets,” Computer, 31(9), 48–56, 1998.
-
(1998)
Computer
, vol.31
, Issue.9
, pp. 48-56
-
-
Arbaugh, W.1
Davin, J.2
Farber, D.3
Smith, J.4
-
329
-
-
84869492037
-
-
Brewer, D., Applying Security Techniques to Achieving Safety, Directions in Safety-Critical Systems, Springer-Verlag, 1993, pp. 246–256.
-
(1993)
Applying Security Techniques to Achieving Safety, Directions in Safety-Critical Systems, Springer-Verlag
, pp. 246-256
-
-
Brewer, D.1
-
330
-
-
85179284551
-
Maryland Unclear on New Driver’s License Law: Real ID Act Will Mean Extra Time when Trying to Renew, Obtain Card
-
Coe, E., “Maryland Unclear on New Driver’s License Law: Real ID Act Will Mean Extra Time when Trying to Renew, Obtain Card,” Cumberland Times-News, 5 December 2005, pp. 1A, 9A.
-
(2005)
Cumberland Times-News
, vol.9A
, pp. 1A
-
-
Coe, E.1
-
331
-
-
35948952259
-
Secret Court Modified Wiretap Requests: Intervention May Have Led Bush to Bypass Panel
-
Powell, S.M., “Secret Court Modified Wiretap Requests: Intervention May Have Led Bush to Bypass Panel,” Seattle Post-Intelligencer, 24 December 2005.
-
(2005)
Seattle Post-Intelligencer
-
-
Powell, S.M.1
-
332
-
-
0003615188
-
-
2nd edition, System Safety Society, July
-
System Safety Analysis Handbook, 2nd edition, System Safety Society, July 1997.
-
(1997)
System Safety Analysis Handbook
-
-
-
334
-
-
85179199495
-
House Renews USA Patriot Act; Bush to Sign
-
8 March
-
Kellman, L., House Renews USA Patriot Act; Bush to Sign, ABCnews.go.com, 8 March 2006.
-
(2006)
Abcnews.Go.Com
-
-
Kellman, L.1
-
335
-
-
84898143771
-
Congress Votes to Renew Patriot Act, With Changes
-
Babington, C., Congress Votes to Renew Patriot Act, With Changes, The Washington Post, pp. A3, 8 March 2006
-
(2006)
The Washington Post
, pp. A3
-
-
Babington, C.1
-
336
-
-
0003525664
-
-
7th edition, Macmillan Publishing Company
-
DeGarmo, E.P., Sullivan, W.G., and Canada, J.R., Engineering Economy, 7th edition, Macmillan Publishing Company, 1984.
-
(1984)
Engineering Economy
-
-
Degarmo, E.P.1
Sullivan, W.G.2
Canada, J.R.3
-
337
-
-
85179237160
-
-
Washington, D.C., October
-
Herrmann, D., Security and Privacy Metrics, invited presentation to Federal Information Assurance Conference (FIAC), Washington, D.C., October 2005.
-
(2005)
Security and Privacy Metrics, Invited Presentation to Federal Information Assurance Conference (FIAC)
-
-
Herrmann, D.1
|