2011 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

筛选
英文 中文
The community cyber security maturity model 社区网络安全成熟度模型
2011 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2007-01-03 DOI: 10.1109/HICSS.2007.522
G. White
{"title":"The community cyber security maturity model","authors":"G. White","doi":"10.1109/HICSS.2007.522","DOIUrl":"https://doi.org/10.1109/HICSS.2007.522","url":null,"abstract":"Reports of cyber security breaches are common in the media and security events have affected millions. Even with a greater awareness of cyber security, the problem has not decreased as sectors increase their dependence on critical cyber infrastructures. States and communities have joined the growing list of organizations trying to establish viable and sustainable cyber security programs to prepare for cyber events when they inevitably occur. The Community Cyber Security Maturity Model (CCSMM)1 was developed to assist in the development of programs by providing three important mechanisms: a “yardstick” to determine current cyber security posture and maturity, a “roadmap” to help improve security posture, and a common point of reference for individuals to share experiences and lessons learned. This paper discusses the development of the model and describes initial results in states and communities adopting it. The paper also discusses what remains to be accomplished and areas for further research.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126104608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Westin hotel room layout 威斯汀酒店房间布局
2011 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 1900-01-01 DOI: 10.1109/ths.2010.5655227
Mark S. Borkowski, D. Cotter
{"title":"Westin hotel room layout","authors":"Mark S. Borkowski, D. Cotter","doi":"10.1109/ths.2010.5655227","DOIUrl":"https://doi.org/10.1109/ths.2010.5655227","url":null,"abstract":"Anonymization—the process of removing or otherwise transforming information so as to reduce the ability to associate it with an identifiable individual— has been much criticized of late, yet interest in it remains high in many quarters. Potential use cases, including those found in the homeland security domain, vary much more widely than those represented by the incidents that have cast doubt on anonymization’s utility. Dealing with this variety effectively and efficiently, though, poses challenges. This paper will present a generic anonymization methodology for tabular textual data being developed by the Science and Technology Directorate of the Department of Homeland Security. This methodology views anonymization as a single, non-exclusive privacy risk control to be considered along with other potential controls. The anonymization process it describes is as much a programmatic risk management process as a technical one. It aims to make anonymization more of a systems engineering activity.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127085878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信