Note: Page numbers followed by “f”, “t” and “b” indicates figures, tables and boxes respectively.
access control systems,
189Access violations analyses,
217Advanced persistent threat (APT),
304Advanced Research Project Agency (ARPA),
75–76“Aggressive defensive” operations,
90Air Force’s 53rd Wing,
97Alleged monopoly actions,
97American Electronics Association (AEA),
70Annual reevaluation
cyber security program strategic, tactical, and annual plans,
228linking cyber security program,
228–230Awareness
Business
Business managers
corporate management’s knowledge,
42cyber security program,
42cyber security officer as,
40–41Changing criminal justice systems,
21–24Chinese hacking group,
99Classified networks security,
60Coherent knowledge-based operations (CKO),
270Cold calling potential customers,
296Command and control warfare (C2W),
263Commercial off-the-shelf software (COTS software),
258–259Communications technology,
12Comprehensive National Cybersecurity Initiative (CNCI),
55–57Contingency and emergency planning and disaster recovery (CEP-DR),
194Contingency planning,
217Corporate cyber security program,
132–152cyber security program policy,
149–150information assets protection policies,
139–150requirements; also Cyber security officer,
139, 148–149Corporate executive officer (CEO),
237Corporate information, determining value,
179–180Corporate strategic business plan,
123, 127Corporation, customers, and competition (three C’s),
32Corporation overall policy document,
142Cost-effective cyber security program,
Cost-effective method,
120Counterintelligence (CI),
60Critical infrastructure and key resources (CIKR),
61–62Cumbersome processes,
153Cyber education expansion,
60Cyber operations connection,
59evolution of laws, standards, policies, and procedures,
50–51strategic, tactical, and annual plans,
228program level of effort drivers,
207charting level of effort through number of system users,
208–209granting users access to systems,
210–211significance of system users chart,
209–210cyber security officer,
204, 207security-associated risks,
35mapping to corporate strategic business plan,
123planning considerations,
123strategic business plan,
121
team concepts, communication, and coordination,
122Cyber security function,
29, 176mapping to corporate annual business plan,
127cyber security managers and technicians,
293cyber security officer,
185continuing awareness material,
187job
family functional descriptions,
161–168requirements identification function,
184–185corporate information value,
179–180valued information types; also Access control,
182awareness
as business manager,
40–41career development program,
284–286continuing awareness material,
187cyber security job descriptions,
160–161cyber security job family functional descriptions,
161–168in global corporation,
106management blank check,
108need for cyber security subordinate organizations,
154–156organization structure development,
156and organizational responsibilities,
115formal duties and responsibilities,
116–117recruiting cyber security professionals,
168–171in-house cyber security candidates identification,
170outside cyber security candidates identification,
171subordinate organizations development,
156–160cyber security program access control and compliance,
157–158cyber security program policy and risk management,
158–159off-site cyber security program organizations,
159–160Cyber security program and organization establishment,
132corporate cyber security program,
132–152cyber security program policy,
149–150information assets protection policies,
139–150cyber security officer thought process,
152–171cyber security job descriptions,
160–161cyber security job family functional descriptions,
161–168need for cyber security subordinate organizations,
154–156organization structure development,
156recruiting cyber security professionals,
168–171subordinate organizations development,
156–160Cyber-information world environment,
changing criminal justice systems,
21–24information-driven environment,
computer systems,
computers,
cyber security and mitigating risks,
cyber security officer,
6–8, 10cyber security program,
protection of information systems,
8–9Cyberspace Policy Review,
57Defense Advanced Research Project Agency leaders,
95National Cybersecurity Center,
59–60Deterrence strategies and programs,
61Digital battlefield attacks,
90alleged monopoly actions,
97America’s military secrets,
98Australian defense officials,
93Chinese hacking group,
99Defense Advanced Research Project Agency leaders,
95FBI’s Cyber’s Most Wanted,
93flood of hacks and data breaches,
94General Zhu’s comments,
95Israeli’s secret service,
97mission data packages,
97security attacks/breaches,
100U.K. Cyber Security Strategy,
98U.S. Department of Homeland Security,
95Distributed denial-of-service (DDoS),
252engagement
interviewing for cyber security officer position,
288–292market yourself as cyber security officer,
287–288security implementation,
299EINSTEIN 2 approach,
57–58EINSTEIN 3 approach,
58–59Engagement
Environment, changing,
305“Errors and omissions”,
293standards of behavior,
276Federal Enterprise Network management,
57Federal role in extending cyber security,
61–62First-generation warfare,
250Formal project management techniques,
136Global business and management environment,
28business managers and cyber security,
42corporate management’s knowledge,
42cyber security program,
42company
competitive advantage through cyber security program,
39cyber security officer as business manager,
40–41cyber security
management responsibilities and communicating with management,
33–34company’s culture and policies,
34cyber security-associated risks,
35problem and decision to management,
35“touchy-feely don’t-hold-me-responsible” management,
39“oldies but goodies” programs,
30service, support, and business orientation,
41–42telecommunications businesses,
29Global corporation, cyber security officer in,
106management blank check,
108Global information infrastructure (GII),
10, 28, 72, 77Global information warfare (GIW),
89, 251Global nervous system,
13, 75impact of globalization,
307new challenges to governance,
308pervasive insecurity,
309transmuting international terrorism,
309Globalization impact,
307Government-wide cyber CI plan,
60electronic inventions,
68, 68tindustry classifications,
70industry-based definitions,
69revolutions and evolutions in,
65–66sharing of information,
66technologically driven inventions,
67–68technology-driven transition,
67tools in cyber security,
82–84twentieth century high-technology developments and events,
74–75twentieth-century technological developments and events,
68–69High-technology crime prevention program (HTCPP),
237High-technology crimes
duties and responsibilities,
236–237High-technology-driven communications,
79–80High-technology-driven phenomenon,
78–79Human Resources (HR),
141Information
information-based processes,
263business information types and examples,
183–184Information Assets Protection Policy Document 500–1 (IAPPD 500–1),
142, 145–146Information operations (IO),
266Information system (IS),
264, 268for attaining and maintaining competitive advantage,
268–269levels and functions,
257local power companies,
249“Locust Swarm” program,
248water pumping stations,
250information superiority,
267IW-related environment,
263military psychological operations,
265Instant messages (IMs),
79Internal use only information types,
183International Security in Cyberspace,
53annihilation of time and space,
77–78communication technologies,
76global nervous system,
75Internet-enabled communications,
15organizational impacts,
19–20to share information,
20–21Internet, Birth of,
13–15Internet Governance Developments,
53Internet service providers (ISPs),
29, 78
Interviewing for cyber security officer position,
288Intrusion detection system deployment,
57–58Intrusion prevention systems deployment,
58–59“Keep it simple, stupid” principle (“KISS” principle),
147, 206Leadership
need for enlightened and dedicated,
305–306providing cyber security service and support,
110–111“Leap-ahead” technology,
60–61Link-analysis methodology,
228Linking cyber security program,
228–230Local area networks (LANs),
188“Locust Swarm” program,
248Management blank check,
108cyber security program level of effort drivers,
207charting level of effort through number of system users,
208–209granting users access to systems,
210–211significance of system users chart,
209–210cost-avoidance metrics,
215cyber security program
management and downsizing,
215information and information systems,
217Mission
Multipronged approach,
61National Cybersecurity Center,
59–60National information infrastructure (NII),
11, 28National Information Systems Security (INFOSEC),
267National Security Agency (NSA),
58–59, 97National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD-54/HSPD-23),
56Network-centric business (NCB),
270–271Noncompliance inquiries (NCIs),
194, 217, 236Observe–orient–decide–act loop (OODA loop),
32Off-site cyber security program organizations,
159–160Offensive–defensive cyber attacks,
310Operations security (OPSEC),
267–268Organizational responsibilities,
115cyber security officer’s formal duties and responsibilities,
116cyber security officer position,
116cyber security program,
115People’s Liberation Army (PLA),
93People’s Republic of China (PRC),
93Personal digital assistants (PDAs),
132Personal information,
181Pervasive insecurity,
309Plans, processes, policies, and procedures (P
4),
133Private information types,
184Processor serial number (PSN),
83Programmable logic controllers (PLCs),
90cyber security officer,
221Radio frequency spectrum (RF spectrum),
256–257Recruiting cyber security professionals,
168–171in-house cyber security candidates identification,
170outside cyber security candidates identification,
171Regional Financial Associates (RFA),
70Requirements identification function,
184–185Research and development (R&D),
59Return on investment (ROI),
269recommendations to management,
192Road Map for Internet,
16–17Second-generation warfare,
251Security implementation,
299Security tests and evaluations (ST&E),
193, 212–213Security—defensive approach,
304–305Senior corporate and government leadership,
303Sensitive information,
132, 184Stand-alone microcomputers,
208Strategic business plan (SBP),
135, 151Subordinate organizations development,
156–160cyber security program
access control and compliance,
157–158policy and risk management,
158–159off-site cyber security program organizations,
159–160Tactical business plan (TBP),
135, 151from cave man to cyber security professional and information warrior,
64–65Terms of reference (TOR),
261information superiority,
267IW-related environment,
263military psychological operations,
265Tofflers’ model of technological evolution,
11Topic-oriented information assets protection policy documents,
147“Touchy-feely don’t-hold-me-responsible” management,
39Transmuting international terrorism,
309Trusted Internet Connections initiative (TIC initiative),
57Twenty-first century technology,
84–86U.K. Cyber Security Strategy,
98U.S. Bureau of Labor Statistics (BLS),
70–71U.S. Department of Defense (DoD),
251U.S. Department of Homeland Security,
95U.S. federal government computer security standards,
302U.S. National Intelligence Council (NIC),
306
U.S. National Security Telecommunications and Information Systems Security Committee (NSTISSC),
267U.S. Standard Industrial Classifications (SIC),
69U.S.–EU Cyber Security-Related Cooperation,
53corporate information value determination,
179–180importance of determination,
180–181Water pumping stations,
250Webster’s Dictionary,
239