CHAPTER 23
PROTECTING THE INFORMATION INFRASTRUCTURE
Franklin Platt
23.2 SECURITY PLANNING AND MANAGEMENT
23.2.1 National Incident Management System Compliance
23.2.3 National Infrastructure Protection Plan
23.2.4 Other Presidential Directives
23.2.5 Security-Related Laws and Regulations
23.2.6 Some Other Regulatory Requirements
23.2.7 Security Auditing Standards
23.3 STRATEGIC PLANNING PROCESS
23.3.4 One Process, One Language
23.4 ELEMENTS OF GOOD PROTECTION
23.4.2 Confidential Design Details
23.4.3 Difficulties in Protecting the Infrastructure
23.4.4 Appearance of Good Security
23.4.6 Reliability and Redundancy
23.4.7 Proper Installation and Maintenance
23.5.1 Threats from Smoke and Fire
23.5.3 Good Housekeeping Practices
23.5.4 Overt, Covert, and Deceptive Protections
23.6.3 Proximity and Touch Cards
23.6.5 Integrated Card Access Systems
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.