{"title":"The community cyber security maturity model","authors":"G. White","doi":"10.1109/HICSS.2007.522","DOIUrl":"https://doi.org/10.1109/HICSS.2007.522","url":null,"abstract":"Reports of cyber security breaches are common in the media and security events have affected millions. Even with a greater awareness of cyber security, the problem has not decreased as sectors increase their dependence on critical cyber infrastructures. States and communities have joined the growing list of organizations trying to establish viable and sustainable cyber security programs to prepare for cyber events when they inevitably occur. The Community Cyber Security Maturity Model (CCSMM)1 was developed to assist in the development of programs by providing three important mechanisms: a “yardstick” to determine current cyber security posture and maturity, a “roadmap” to help improve security posture, and a common point of reference for individuals to share experiences and lessons learned. This paper discusses the development of the model and describes initial results in states and communities adopting it. The paper also discusses what remains to be accomplished and areas for further research.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126104608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Westin hotel room layout","authors":"Mark S. Borkowski, D. Cotter","doi":"10.1109/ths.2010.5655227","DOIUrl":"https://doi.org/10.1109/ths.2010.5655227","url":null,"abstract":"Anonymization—the process of removing or otherwise transforming information so as to reduce the ability to associate it with an identifiable individual— has been much criticized of late, yet interest in it remains high in many quarters. Potential use cases, including those found in the homeland security domain, vary much more widely than those represented by the incidents that have cast doubt on anonymization’s utility. Dealing with this variety effectively and efficiently, though, poses challenges. This paper will present a generic anonymization methodology for tabular textual data being developed by the Science and Technology Directorate of the Department of Homeland Security. This methodology views anonymization as a single, non-exclusive privacy risk control to be considered along with other potential controls. The anonymization process it describes is as much a programmatic risk management process as a technical one. It aims to make anonymization more of a systems engineering activity.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127085878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}