首页 > 最新文献

Journal of Information Systems Security最新文献

英文 中文
Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks 演示Wi-Fi网络固有的有线等效隐私(WEP)弱点
Q4 Social Sciences Pub Date : 2006-09-01 DOI: 10.1201/1086.1065898X/46353.15.4.20060901/95121.3
K. Curran, Elaine Smyth
Abstract On the surface, wireless networks act the same as their wired counterparts, transporting data between network devices. However, there is one fundamental, and quite significant, difference: WLANs are based on radio communications technology, as an alternative to structured wiring and cables. Data is transmitted between devices through the air via the radio waves. Devices that participate in a WLAN must have a network interface card (NIC) with wireless capabilities. This essentially means that the card contains a small radio device that allows it to communicate with other wireless devices within the defined range for that card; for example, the 2.4—2.4853 GHz range. For a device to participate in a wireless network it must, first, be permitted to communicate with the devices in that network and, second, be within the transmission range of the devices in that network.
从表面上看,无线网络的作用与有线网络相同,在网络设备之间传输数据。然而,两者有一个基本且相当重要的区别:无线局域网基于无线电通信技术,作为结构化布线和电缆的替代方案。数据通过无线电波在设备之间传输。参与WLAN的设备必须具有具有无线功能的网卡。这本质上意味着所述卡包含允许其与所述卡的定义范围内的其他无线设备通信的小型无线电设备;例如2.4-2.4853 GHz。对于参与无线网络的设备,首先,它必须被允许与该网络中的设备通信,其次,在该网络中设备的传输范围内。
{"title":"Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks","authors":"K. Curran, Elaine Smyth","doi":"10.1201/1086.1065898X/46353.15.4.20060901/95121.3","DOIUrl":"https://doi.org/10.1201/1086.1065898X/46353.15.4.20060901/95121.3","url":null,"abstract":"Abstract On the surface, wireless networks act the same as their wired counterparts, transporting data between network devices. However, there is one fundamental, and quite significant, difference: WLANs are based on radio communications technology, as an alternative to structured wiring and cables. Data is transmitted between devices through the air via the radio waves. Devices that participate in a WLAN must have a network interface card (NIC) with wireless capabilities. This essentially means that the card contains a small radio device that allows it to communicate with other wireless devices within the defined range for that card; for example, the 2.4—2.4853 GHz range. For a device to participate in a wireless network it must, first, be permitted to communicate with the devices in that network and, second, be within the transmission range of the devices in that network.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75661534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Improving Bluetooth Security: What IT Managers and Mobile Device Users Can Do 提高蓝牙安全性:IT经理和移动设备用户可以做些什么
Q4 Social Sciences Pub Date : 2006-09-01 DOI: 10.1201/1086.1065898X/46353.15.4.20060901/95122.4
B. Hernacki
Abstract Bluetooth wireless technology is becoming ubiquitous. According to the Bluetooth Special Interest Group (SIG), Bluetooth weekly shipments passed the 5 million unit mark in the second quarter of 2005, up from 3 million in the third quarter of 2004. Most of this growth has been in the mobile phone and PDA markets; in fact, 20 percent of mobile phones now ship with Bluetooth. In high-end business phones, the penetration rate is even higher, and many business-class phones include Bluetooth.
蓝牙无线技术正变得无处不在。根据蓝牙特别兴趣小组(Bluetooth Special Interest Group, SIG)的数据,蓝牙的周出货量在2005年第二季度突破了500万台大关,高于2004年第三季度的300万台。这种增长主要发生在手机和PDA市场;事实上,现在20%的手机都带有蓝牙。在高端商务手机中,渗透率更高,很多商务级手机都有蓝牙功能。
{"title":"Improving Bluetooth Security: What IT Managers and Mobile Device Users Can Do","authors":"B. Hernacki","doi":"10.1201/1086.1065898X/46353.15.4.20060901/95122.4","DOIUrl":"https://doi.org/10.1201/1086.1065898X/46353.15.4.20060901/95122.4","url":null,"abstract":"Abstract Bluetooth wireless technology is becoming ubiquitous. According to the Bluetooth Special Interest Group (SIG), Bluetooth weekly shipments passed the 5 million unit mark in the second quarter of 2005, up from 3 million in the third quarter of 2004. Most of this growth has been in the mobile phone and PDA markets; in fact, 20 percent of mobile phones now ship with Bluetooth. In high-end business phones, the penetration rate is even higher, and many business-class phones include Bluetooth.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74660727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Five Myths of Wireless Security 无线安全的五大迷思
Q4 Social Sciences Pub Date : 2006-09-01 DOI: 10.1201/1086.1065898X/46353.15.4.20060901/95120.2
John Kindervag
Abstract Those who have ever watched the television show MythBusters know that many of the popular beliefs most people hold to be true crumble under investigation. The same holds true in the information technology world. Most myths investigated by the mythbusters are harmless and fun, but in information security, the unexamined myth can be both dangerous and costly. It is imperative that the InfoSec professional not take security trends and myths at face value, but instead thoroughly investigate every statement to make an informed decision about the veracity of individual security ideas. This is especially true in the area of wireless networking, which is the newest, most immature, and potentially insecure of all of the currently existing networking methods.
看过电视节目《流言终结者》的人都知道,大多数人认为是正确的许多流行观念在调查中崩溃了。在信息技术领域也是如此。流言终结者调查的大多数流言都是无害的,有趣的,但在信息安全领域,未经检验的流言可能既危险又昂贵。重要的是,信息安全专业人员不能只从表面上看安全趋势和神话,而是要彻底调查每一个陈述,以对个人安全思想的真实性做出明智的决定。在无线网络领域尤其如此,无线网络是目前所有现有网络方法中最新、最不成熟、最不安全的。
{"title":"The Five Myths of Wireless Security","authors":"John Kindervag","doi":"10.1201/1086.1065898X/46353.15.4.20060901/95120.2","DOIUrl":"https://doi.org/10.1201/1086.1065898X/46353.15.4.20060901/95120.2","url":null,"abstract":"Abstract Those who have ever watched the television show MythBusters know that many of the popular beliefs most people hold to be true crumble under investigation. The same holds true in the information technology world. Most myths investigated by the mythbusters are harmless and fun, but in information security, the unexamined myth can be both dangerous and costly. It is imperative that the InfoSec professional not take security trends and myths at face value, but instead thoroughly investigate every statement to make an informed decision about the veracity of individual security ideas. This is especially true in the area of wireless networking, which is the newest, most immature, and potentially insecure of all of the currently existing networking methods.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90105637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Top Information Security Issues Facing Organizations: What Can Government Do to Help? 组织面临的主要信息安全问题:政府能做些什么来帮助?
Q4 Social Sciences Pub Date : 2006-09-01 DOI: 10.1201/1086.1065898X/46353.15.4.20060901/95124.6
Kenneth J. Knapp, T. Marshall, R. K. Rainer, Dorsey W. Morrow
Abstract Considering that many organizations today are fully dependent on information technology for survival,1 information security is one of the most important concerns facing the modern organization. The increasing variety of threats and ferociousness of attacks has made protecting information a complex challenge.2 Improved knowledge of the critical issues underlying information security can help practitioners, researchers, and government employees alike to understand and solve the biggest problems. To this end, the International Information Systems Security Certification Consortium [(ISC)2]® teamed up with Auburn University researchers to identify and rank the top information security issues in two sequential, but related surveys. The first survey involved a worldwide sample of 874 certified information system security professionals (CISSPs)®, who ranked a list of 25 information security issues based on which ones were the most critical facing organizations today. In a follow-on survey, 623 U.S.-based CISSPs then re-ranked the same 25 issues based on which ones they felt the U.S. federal government could help the most in solving.
考虑到当今许多组织完全依赖信息技术生存,信息安全是现代组织面临的最重要问题之一。威胁的种类和攻击的凶猛程度日益增加,使得保护信息成为一项复杂的挑战提高对信息安全底层关键问题的认识可以帮助从业人员、研究人员和政府雇员理解并解决最大的问题。为此,国际信息系统安全认证联盟[(ISC)2]®与奥本大学的研究人员合作,在两个连续但相关的调查中确定了最重要的信息安全问题并对其进行了排名。第一项调查涉及全球874名认证信息系统安全专业人员(cissp)®的样本,他们根据当今组织面临的最关键的信息安全问题对25个信息安全问题进行了排名。在一项后续调查中,623家美国cissp根据他们认为美国联邦政府最能帮助解决的问题对同样的25个问题进行了重新排名。
{"title":"The Top Information Security Issues Facing Organizations: What Can Government Do to Help?","authors":"Kenneth J. Knapp, T. Marshall, R. K. Rainer, Dorsey W. Morrow","doi":"10.1201/1086.1065898X/46353.15.4.20060901/95124.6","DOIUrl":"https://doi.org/10.1201/1086.1065898X/46353.15.4.20060901/95124.6","url":null,"abstract":"Abstract Considering that many organizations today are fully dependent on information technology for survival,1 information security is one of the most important concerns facing the modern organization. The increasing variety of threats and ferociousness of attacks has made protecting information a complex challenge.2 Improved knowledge of the critical issues underlying information security can help practitioners, researchers, and government employees alike to understand and solve the biggest problems. To this end, the International Information Systems Security Certification Consortium [(ISC)2]® teamed up with Auburn University researchers to identify and rank the top information security issues in two sequential, but related surveys. The first survey involved a worldwide sample of 874 certified information system security professionals (CISSPs)®, who ranked a list of 25 information security issues based on which ones were the most critical facing organizations today. In a follow-on survey, 623 U.S.-based CISSPs then re-ranked the same 25 issues based on which ones they felt the U.S. federal government could help the most in solving.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77274377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Gmail and Privacy Issues Gmail和隐私问题
Q4 Social Sciences Pub Date : 2006-09-01 DOI: 10.1201/1086.1065898X/46353.15.4.20060901/95119.1
Edward H. Freeman
Abstract The Google search engine is a major presence in the online world. It has become a household word and has changed the way people do research and conduct business. The American Dialect Society, a scholarly association dedicated to the study of the English language in North America, chose “google” as the “most useful” word of 2002.1 The Oxford American Dictionary included “google” as a verb in its latest edition. Google accounted for almost half of the 5.1 billion search engine inquiries performed in the United States in December 2005.2
b谷歌搜索引擎是网络世界的主要存在。它已经成为一个家喻户晓的词,并改变了人们进行研究和开展业务的方式。美国方言协会是一个致力于研究北美英语的学术协会,该协会将“谷歌”选为2002年“最有用”的词汇。《牛津美国词典》在其最新版本中将“谷歌”作为动词收录。在2005年12月美国51亿次搜索引擎查询中,谷歌几乎占了一半
{"title":"Gmail and Privacy Issues","authors":"Edward H. Freeman","doi":"10.1201/1086.1065898X/46353.15.4.20060901/95119.1","DOIUrl":"https://doi.org/10.1201/1086.1065898X/46353.15.4.20060901/95119.1","url":null,"abstract":"Abstract The Google search engine is a major presence in the online world. It has become a household word and has changed the way people do research and conduct business. The American Dialect Society, a scholarly association dedicated to the study of the English language in North America, chose “google” as the “most useful” word of 2002.1 The Oxford American Dictionary included “google” as a verb in its latest edition. Google accounted for almost half of the 5.1 billion search engine inquiries performed in the United States in December 2005.2","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85849637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Content Analysis of Web Privacy Policies in the GCC Countries 海湾合作委员会国家网络隐私政策的内容分析
Q4 Social Sciences Pub Date : 2006-07-01 DOI: 10.1201/1086.1065898X/46183.15.3.20060701/94186.6
Z. Shalhoub
Abstract Privacy has long been defined as the right of a person to be left alone and to be able to have control over the flow and disclosure of information about him- or herself (Warren and Brandeis, 1890). Worries about privacy are not new, although businesses have gathered information about their customers for years. However, privacy issues often come about because of new information technologies that have improved the collection, storage, use, and sharing of personal information.
长期以来,隐私一直被定义为一个人独处的权利,以及能够控制有关他或她自己的信息的流动和披露的权利(Warren and Brandeis, 1890)。尽管企业多年来一直在收集客户信息,但对隐私的担忧并不新鲜。然而,由于新的信息技术改进了个人信息的收集、存储、使用和共享,隐私问题经常出现。
{"title":"Content Analysis of Web Privacy Policies in the GCC Countries","authors":"Z. Shalhoub","doi":"10.1201/1086.1065898X/46183.15.3.20060701/94186.6","DOIUrl":"https://doi.org/10.1201/1086.1065898X/46183.15.3.20060701/94186.6","url":null,"abstract":"Abstract Privacy has long been defined as the right of a person to be left alone and to be able to have control over the flow and disclosure of information about him- or herself (Warren and Brandeis, 1890). Worries about privacy are not new, although businesses have gathered information about their customers for years. However, privacy issues often come about because of new information technologies that have improved the collection, storage, use, and sharing of personal information.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79706980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Virtual Security: The New Security Tool? 虚拟安全:新的安全工具?
Q4 Social Sciences Pub Date : 2006-07-01 DOI: 10.1201/1086.1065898X/46183.15.3.20060701/94181.1
J. Tiller
n 1996, I found a tiny package floating around the Internet called VMware. I booted up my Linux laptop and proceeded to install this little animal. Within minutes I started the application and booted my first virtual PC. Compelled to investigate further, I decided to load Windows 95, completely convinced that it would fail miserably — Win95 on Linux, are you kidding me? To my surprise, I was browsing the Web using IE, in Windows 95 from a virtual PC running on Linux in just a few hours. Little did I know at the time that virtualization would make the huge rebirth that it has today. Rebirth seems like the appropriate word. Anyone familiar with IBM and Tandem, to name a couple, are familiar with virtualized computing. But these solutions fell victim to the distributed computer resource model emerging in the late 1980s and in full bloom in the mid-1990s. By the time I was introduced to VMware it seemed almost out of place and time, an oxymoron with seemingly little value when piles of servers were the answer and technology was the key business enabler. But today it's not about the technology — it's about services — IT and security services mapped to business drivers, making technology transparent to the mission. It is within this framework and IT business management evolution that vir-tualization was reincarnated. My first Internet page hadn't finished loading in my Win95/Linux system when the thought of security chilled my spine. At that time I was enamored by trusted operating systems (TOS). The thought of compart-m e n t a l i z a t i o n f r o m t h e N I C t o t h e applications, and everything in between, was, for me, security nirvana. I was an Argus PitBull, Solaris TOS, and HP Virtual Vault bigot; I was convinced TOS was the future. Now with virtualization, compart-mentalization was holistic, fully encompassing my environment, an environment I could manipulate, adjust, specialize, and distribute seamlessly. My TOS convictions began to waver. Today, virtualization has many solutions. VMware, now part of EMC, is locking horns with Microsoft. With virtualization part of Longhorn, it is clear that giants are making big bets, and so are some of their customers. Virtualization appears to many executives as the ultimate money press, squeezing every last cycle from the pools of vast underutilized resources. All …
1996年,我在互联网上发现了一个名为VMware的小软件包。我启动了我的Linux笔记本电脑,开始安装这个小动物。几分钟后,我启动了应用程序,启动了我的第一台虚拟电脑。迫于进一步调查的压力,我决定加载Windows 95,完全相信它会悲惨地失败——Linux上的Win95,你在开玩笑吗?令我吃惊的是,我在一台运行Linux的虚拟电脑上用IE和Windows 95浏览了网页,只用了几个小时。当时我并不知道虚拟化会像今天这样获得巨大的重生。重生似乎是一个恰当的词。任何熟悉IBM和Tandem的人都熟悉虚拟化计算。但是这些解决方案在20世纪80年代末出现并在20世纪90年代中期全面发展的分布式计算机资源模型面前成为了牺牲品。当我被介绍给VMware时,它似乎已经不合时宜了。当成堆的服务器是解决问题的答案,而技术是关键的业务推动者时,这似乎是一种没有什么价值的矛盾。但今天的重点不是技术,而是服务——it和安全服务映射到业务驱动程序,使技术对任务透明。正是在这个框架和It业务管理的演变中,虚拟化得到了重生。在Win95/Linux系统中,我的第一个网页还没加载完,一想到安全问题,我就不寒而栗。那时我迷恋于可信赖的操作系统(TOS)。对我来说,将系统划分为两个部分的想法对我来说简直就是安全天堂。我是Argus PitBull、Solaris TOS和HP Virtual Vault的忠实粉丝;我确信TOS是未来。现在有了虚拟化,分区化是整体的,完全包含了我的环境,一个我可以无缝地操纵、调整、专门化和分发的环境。我的TOS信念开始动摇。今天,虚拟化有许多解决方案。VMware现在是EMC的一部分,正在与微软争得不可开交。有了Longhorn的虚拟化部分,很明显,巨头们正在下大赌注,他们的一些客户也是如此。对许多高管来说,虚拟化似乎是最终的金钱压力,从大量未充分利用的资源池中挤出最后一个周期。所有……
{"title":"Virtual Security: The New Security Tool?","authors":"J. Tiller","doi":"10.1201/1086.1065898X/46183.15.3.20060701/94181.1","DOIUrl":"https://doi.org/10.1201/1086.1065898X/46183.15.3.20060701/94181.1","url":null,"abstract":"n 1996, I found a tiny package floating around the Internet called VMware. I booted up my Linux laptop and proceeded to install this little animal. Within minutes I started the application and booted my first virtual PC. Compelled to investigate further, I decided to load Windows 95, completely convinced that it would fail miserably — Win95 on Linux, are you kidding me? To my surprise, I was browsing the Web using IE, in Windows 95 from a virtual PC running on Linux in just a few hours. Little did I know at the time that virtualization would make the huge rebirth that it has today. Rebirth seems like the appropriate word. Anyone familiar with IBM and Tandem, to name a couple, are familiar with virtualized computing. But these solutions fell victim to the distributed computer resource model emerging in the late 1980s and in full bloom in the mid-1990s. By the time I was introduced to VMware it seemed almost out of place and time, an oxymoron with seemingly little value when piles of servers were the answer and technology was the key business enabler. But today it's not about the technology — it's about services — IT and security services mapped to business drivers, making technology transparent to the mission. It is within this framework and IT business management evolution that vir-tualization was reincarnated. My first Internet page hadn't finished loading in my Win95/Linux system when the thought of security chilled my spine. At that time I was enamored by trusted operating systems (TOS). The thought of compart-m e n t a l i z a t i o n f r o m t h e N I C t o t h e applications, and everything in between, was, for me, security nirvana. I was an Argus PitBull, Solaris TOS, and HP Virtual Vault bigot; I was convinced TOS was the future. Now with virtualization, compart-mentalization was holistic, fully encompassing my environment, an environment I could manipulate, adjust, specialize, and distribute seamlessly. My TOS convictions began to waver. Today, virtualization has many solutions. VMware, now part of EMC, is locking horns with Microsoft. With virtualization part of Longhorn, it is clear that giants are making big bets, and so are some of their customers. Virtualization appears to many executives as the ultimate money press, squeezing every last cycle from the pools of vast underutilized resources. All …","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75503122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effective Operational Security Metrics 有效的操作安全指标
Q4 Social Sciences Pub Date : 2006-07-01 DOI: 10.1201/1086.1065898X/46183.15.3.20060701/94183.3
J. Ravenel
Abstract Security professionals are constantly being asked to justify every security project. Security risks and projects can often be difficult to measure and even more difficult to understand by people outside the department. The key to demonstrating improvement and value is to translate security information into business terms. This being the case, the ability to identify the type, quantity, frequency, audience, and presentation of appropriate security metrics can increase the value of a CISO or security professional from the perspective of the management team.
安全专业人员经常被要求证明每个安全项目的合理性。安全风险和项目通常很难度量,部门以外的人甚至更难以理解。展示改进和价值的关键是将安全信息转换为业务术语。在这种情况下,识别适当安全度量的类型、数量、频率、受众和表示的能力可以从管理团队的角度增加CISO或安全专业人员的价值。
{"title":"Effective Operational Security Metrics","authors":"J. Ravenel","doi":"10.1201/1086.1065898X/46183.15.3.20060701/94183.3","DOIUrl":"https://doi.org/10.1201/1086.1065898X/46183.15.3.20060701/94183.3","url":null,"abstract":"Abstract Security professionals are constantly being asked to justify every security project. Security risks and projects can often be difficult to measure and even more difficult to understand by people outside the department. The key to demonstrating improvement and value is to translate security information into business terms. This being the case, the ability to identify the type, quantity, frequency, audience, and presentation of appropriate security metrics can increase the value of a CISO or security professional from the perspective of the management team.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83081734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Building an Effective Privacy Program 建立有效的隐私保护程序
Q4 Social Sciences Pub Date : 2006-07-01 DOI: 10.1201/1086.1065898X/46183.15.3.20060701/94185.5
R. Herold
Abstract Privacy and trust are essential to maintaining good relationships with customers, employees, and business partners. It is also necessary to address privacy issues to comply with a growing number of privacy regulations worldwide. Privacy encompasses how business must be conducted, the communications made with customers and consumers, and the technology that enables business processes. Addressing privacy touches all facets of an organization, including business operations, Web sites and services, back-end systems and databases, communications with third parties, customers, and service providers, and legacy systems. An effective privacy governance program will not only make your customers happier, but it will also mitigate your exposure to regulatory noncompliance, lawsuits, bad publicity, and government investigations. This article discusses the issues to address when building a privacy governance program.
隐私和信任对于维持与客户、员工和商业伙伴的良好关系至关重要。为了遵守世界范围内越来越多的隐私法规,解决隐私问题也是必要的。隐私包括必须如何开展业务、与客户和消费者进行的通信以及支持业务流程的技术。处理隐私涉及组织的所有方面,包括业务操作、Web站点和服务、后端系统和数据库、与第三方、客户和服务提供者以及遗留系统的通信。一个有效的隐私治理程序不仅会让您的客户更满意,而且还会减少您面临法规违规、诉讼、不良宣传和政府调查的风险。本文讨论了在构建隐私治理程序时需要解决的问题。
{"title":"Building an Effective Privacy Program","authors":"R. Herold","doi":"10.1201/1086.1065898X/46183.15.3.20060701/94185.5","DOIUrl":"https://doi.org/10.1201/1086.1065898X/46183.15.3.20060701/94185.5","url":null,"abstract":"Abstract Privacy and trust are essential to maintaining good relationships with customers, employees, and business partners. It is also necessary to address privacy issues to comply with a growing number of privacy regulations worldwide. Privacy encompasses how business must be conducted, the communications made with customers and consumers, and the technology that enables business processes. Addressing privacy touches all facets of an organization, including business operations, Web sites and services, back-end systems and databases, communications with third parties, customers, and service providers, and legacy systems. An effective privacy governance program will not only make your customers happier, but it will also mitigate your exposure to regulatory noncompliance, lawsuits, bad publicity, and government investigations. This article discusses the issues to address when building a privacy governance program.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90279272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Open Source Software and the SCO Litigation 开源软件与SCO诉讼
Q4 Social Sciences Pub Date : 2006-07-01 DOI: 10.1201/1086.1065898X/46183.15.3.20060701/94182.2
Edward H. Freeman
Abstract In 1980, Congress amended the federal copyright statutes to cover computer programs. The courts interpreted these statutes to protect the creator of software from copying, as well as translating into another programming language. Translations into foreign languages (i.e., French or Spanish) are also prohibited. Commercial software developers use licenses and the threat of legal action to protect their investment against unauthorized copying.
1980年,美国国会修改了联邦版权法,将计算机程序也包括在内。法院解释这些法规是为了保护软件的创造者不被复制,也不被翻译成另一种编程语言。也禁止翻译成外国语言(即法语或西班牙语)。商业软件开发人员使用许可证和法律行动的威胁来保护他们的投资免受未经授权的复制。
{"title":"Open Source Software and the SCO Litigation","authors":"Edward H. Freeman","doi":"10.1201/1086.1065898X/46183.15.3.20060701/94182.2","DOIUrl":"https://doi.org/10.1201/1086.1065898X/46183.15.3.20060701/94182.2","url":null,"abstract":"Abstract In 1980, Congress amended the federal copyright statutes to cover computer programs. The courts interpreted these statutes to protect the creator of software from copying, as well as translating into another programming language. Translations into foreign languages (i.e., French or Spanish) are also prohibited. Commercial software developers use licenses and the threat of legal action to protect their investment against unauthorized copying.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84903848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information Systems Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1