
Implementing Homeland Security for Enterprise IT
- 1st Edition - November 26, 2003
- Imprint: Digital Press
- Author: Michael Erbschloe
- Language: English
- Paperback ISBN:9 7 8 - 1 - 5 5 5 5 8 - 3 1 2 - 5
- eBook ISBN:9 7 8 - 0 - 0 8 - 0 5 0 8 5 0 - 4
This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quoteThis book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001.
The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice.
The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice.
*A one-minute manager approach to issuesp provides background and explanations in all areas
*Step-by-step instructions on how to accomplish objectives guide readers through processes
*Easy to implement advice allows readers to take quick action
*Step-by-step instructions on how to accomplish objectives guide readers through processes
*Easy to implement advice allows readers to take quick action
IT Managers, supervisors, corporate security staff
Guiding Principles for Homeland Security; Multi-Sector Partnering and Security Priorities; Security and Critical Infrastructures; Information Sharing for Protecting National Assets; Corporate Actions Required for Homeland Security by Sector; Why a National Strategy to Secure Cyberspace is Important; Participating in a National Cyberspace Security Response System; Participating in a National Threat and Vulnerability Reduction Programs; Launching a National Cyberspace Security Awareness and Training Programs; Working to Secure Governments' Cyberspace; Global Cyberspace Security Cooperation; A look into the future; Appendices: Acronyms; Homeland Security Resources
- Edition: 1
- Published: November 26, 2003
- Imprint: Digital Press
- No. of pages: 299
- Language: English
- Paperback ISBN: 9781555583125
- eBook ISBN: 9780080508504
ME
Michael Erbschloe
Michael Erbschloe an information technology consultant, educator, and author. Michael has also taught and developed technology related curriculum for several universities including the University of Denver, and speaks at conferences and industry events around the world. He has authored hundreds of articles on technology and several books including Information Warfare: How to Survive Cyber Attacks.
Affiliations and expertise
Author, educator and security advisor, Washington, DCRead Implementing Homeland Security for Enterprise IT on ScienceDirect