International Guide to Cyber SecurityBy combining the legal, managerial, organizational, and technical considerations associated into one resource, this comprehensive manual explains the areas of overlap and where considerations must fit together. This guide discusses national laws, initiatives by multinational organizations, and initiatives in international cooperation; moreover, the available best practices (including return on investment), step-by-step guidance in setting up and developing an enterprise security program, and how to effectively and efficiently implement the security program all of which are applicable to users in all countries. |
Contents
Infrastructure Categories and Responsibilities | 11 |
B Categories of Infrastructure | 16 |
C Responsibilities | 19 |
D Conclusion | 33 |
International Legal Landscape | 35 |
C Multinational Organizations | 76 |
D Conclusion | 100 |
PublicPrivate Sector Cooperation | 103 |
Best Practices and Resources | 153 |
B Best Practices | 154 |
C Standards | 159 |
D Educational Institutions Organizations | 181 |
E Conclusion | 186 |
Security Program Plans Policies and Procedures | 187 |
B Development of a Security Plan | 188 |
C Conclusion | 219 |
B Issues Related to PublicPrivate Cooperation | 105 |
C The US Model of PublicPrivate Cooperation | 120 |
D Multinational PublicPrivate Cooperation | 127 |
E Role of NonGovernmental Organizations | 135 |
F Assistance Centers | 139 |
G Law Enforcement and Prosecutorial Assistance | 143 |
H Other PublicPrivate Activities | 148 |
I Conclusion | 150 |
Common terms and phrases
agencies APEC Association attacks audit best practices CERT CERT Coordination Center certification Commission Committee communications compliance Computer Crime Computer Security Convention on Cybercrime Coordinating Center corporate Council of Europe countries criminal Critical Infrastructure Protection cyber security Cyberspace developing Digital Signature disclosure Economic Electronic Emergency employees encryption ensure entities established FISMA framework GLBA global Guidelines hereinafter HIPAA Homeland Security implementation industry Information Assurance information infrastructures Information Security information sharing Information Technology Internet ISAC issues law enforcement Michael Rasmussen monitoring National Security Network and Information NIST NS/EP OECD operations organizations personal information personnel policies and procedures privacy and security private sector regulations requirements SANS Institute security breaches Security Law Report Security of Information security plan security policies security program Standards and Technology steganography technical Telecommunications threats U.S. Department U.S.C. Section users vulnerabilities Westby wireless