World Library  

Add to Book Shelf
Flag as Inappropriate
Email this Book

Rapid Risk Analysis for Information Security

By Hosmer, Hilary H.

Click here to view

Book Id: WPLBN0000692701
Format Type: PDF eBook
File Size: 30.84 KB.
Reproduction Date: 2005
Full Text

Title: Rapid Risk Analysis for Information Security  
Author: Hosmer, Hilary H.
Language: English
Subject: Technology., Reference materials, Technology and literature
Collections: Techonology eBook Collection
Publication Date:


APA MLA Chicago

Hosmer, H. H. (n.d.). Rapid Risk Analysis for Information Security. Retrieved from

Technical Reference Publication

Introduction: Information warfare threatens our national information infrastructure, the Year 2000 bug puts legacy systems in jeopardy, and cookies and data warehousing threaten our privacy. Unfortunately, the traditional guidelines for INFOSEC risk analysis emphasize time-consuming quantitative measurements that produce misleadingly precise results. Oftentimes, we don't have the time or the resources to do a traditional risk analysis. This panel presents rapid risk analysis alternatives ranging from 15 minutes to two weeks.

Table of Contents
Table of Contents 22nd National Information Systems Security Conference Conference Committee 1999 National Computer Systems Security Award Papers Find and Fix Y2K Embedded Equipment Risks Dick Lefkon, New York University Are Organizations Ready for the Electronic Renaissance in Communications? Email Monitoring & Privacy Issues Jim Kates, Phillip Whited, IntraSec Corporation Making Netscape Compatible with Fortezza? ? Lessons Learned George Ryan, Pulse Engineering, Inc. Active Networks and Security Vijay Varadharajan, Rajan Shankaran, Michael Hitchens, University of W. Sydney Security of High-Performance Messaging Layers on Programmable Network Interface Architectures Srigurunath Chakravarthi, Mississippi State University Attitude Adjustment: Trojans and Malware on the Internet: an Update Sarah Gordon, David Chess, IBM Thomas J. Watson Research Center The Network Vulnerability Tool (NVT) ? A System Vulnerability Visualization Architecture. Ronda Henning, Ph.D., Kevin L. Fox, Ph.D., Harris Corporation Implementation of Mulitple Access Control Policies within a CORBASEC Framework Ramaswamy Chandramouli, National Institute for Standards and Technology A Trace-Based Model of the Chinese Wall Security Policy Ann E. Kelley Sobel, Miami University (Ohio) Jim Alves-Foss, University of Idaho Digital Watermark Mobile Agents Jian Zhao, Chenghui Luo, Fraunhofer Center for Research in Computer Graphics, Inc. Immunity-Based Intrusion Detection System: A General Framework Dipankar Dasgupta, University of Memphis From AntiVirus to AntiMalware Software and Beyond: Another Approach to the Protection of Customers from Dysfunctional System Behaviour Dr. Klaus Brunnstein, University of Hamburg, Germany P3I - Protection Profile Process Improvement Jeffrey R. Williams, Karen M. Ferraiolo, Arca Systems, Inc. Protection Profiles for Certificate Issuing & Management Systems A. Arsenault, National Security Agency R. Housley, Spyrus Common Criteria Evaulations in the US: What a Developer Should Know Kimberly S. Caplan, Douglas Stuart, CISSP, Computer Sciences Corporation


Click To View

Additional Books

  • Evaluated Kinetic and Photochemical Data... (by )
  • Toward Next-Generation Construction Mach... (by )
  • Reporting 
  • Secure Cyberspace 
  • Thermodynamic Properties of Dioxygen Dif... (by )
  • Thermodynamic Functions and Properties o... (by )
  • Cross Sections and Related Data for Elec... (by )
  • Cross Sections and Swarm Coefficients fo... (by )
  • Administrative Modifications 
  • Indefinite Delivery Indefinite Quantity ... 
  • Credit Card Purchases 
  • Awards 
Scroll Left
Scroll Right


Copyright © World Library Foundation. All rights reserved. eBooks from Sony eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.