The Information Systems Security Officers Guide: Establishing and Managing an Information Protection Program

T

Tactical plan, 84–85, 118–120

Team concepts, 105

Techno-criminals, 23

Technology

See also Crimes, high-technology

defined, 9

definition of high, 10

future for, 344–347

good and bad uses of, 47–48

historical development of, 12–13

impact of high, 9–10

threats and changing, 67

Terrorism/terrorists, 60–61, 71

Threat(s)

accidents, 53

amplifiers, 66–68

catalysts, 70

components and their relationships, 55

defined, 48

human error, 53

inhibitors, 68–69

man-made, 48, 53, 54–55

motivators/motivation, 70–72

natural, 48, 50–53

profile, 68, 69

Threat agents

examples of, 50

man-made/malicious, 55–66

motives of, 66–74

natural, 52

opportunity and, 73

rationalization and, 73

Toffler, Alvin, 12, 13, 15, 22, 25

Toffler, Heidi, 12, 13, 15, 22, 25

Trade journals/magazines, use of, 308

Training and conferences, 305, 308

Twain, Mark, 5

Категории