The Information Systems Security Officers Guide: Establishing and Managing an Information Protection Program

S

Schmidt, Howard, 99

Search engines, 31

Secular motives, 71

Security

national, 170, 251–262

tests, 185–186, 211–214

Sensitive information, 173

Skull and Bones Society, 66

Societies, future for, 343–344

Software, evaluation of, 180–183

SORM, 29

State sponsored man-made threat agents, 59–60

Strategic plan, 83–84, 114–115, 117–118

Subordinate organizations, 145–152

Subversive organizations, 65–66

System security administrator, 153

System security analyst, 154–156

System security analyst associate, 153–154

System security analyst senior, 156–157

System security analyst specialist, 157–158

System security engineer, 158–160

Категории