nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Appendix 6 - bibliography
|
|
|
|
9 |
S1 |
p. 21 |
artikel |
2 |
Appendix 2 - definition of terms
|
|
|
|
9 |
S1 |
p. 15 |
artikel |
3 |
Appendix 5 - itsec and itsem
|
|
|
|
9 |
S1 |
p. 20 |
artikel |
4 |
Appendix 1 - list of members
|
|
|
|
9 |
S1 |
p. 15 |
artikel |
5 |
Appendix 3 - list of standards and guidelines
|
|
|
|
9 |
S1 |
p. 16-18 |
artikel |
6 |
Appendix 4 - list of typical threats
|
|
|
|
9 |
S1 |
p. 19 |
artikel |
7 |
Audit - conventional and security specific
|
|
|
|
9 |
S1 |
p. 11-12 |
artikel |
8 |
Common subject matter
|
|
|
|
9 |
S1 |
p. 1 |
artikel |
9 |
Conclusion
|
|
|
|
9 |
S1 |
p. 14 |
artikel |
10 |
Contingency plans and insurance
|
|
|
|
9 |
S1 |
p. 12 |
artikel |
11 |
Data
|
|
|
|
9 |
S1 |
p. 7-8 |
artikel |
12 |
Documentation and procedures
|
|
|
|
9 |
S1 |
p. 6 |
artikel |
13 |
Editorial
|
Sizer, Richard |
|
|
9 |
S1 |
p. i-ii |
artikel |
14 |
Legislation and fallibility issues
|
|
|
|
9 |
S1 |
p. 13-14 |
artikel |
15 |
Networking
|
|
|
|
9 |
S1 |
p. 8-10 |
artikel |
16 |
Operational aspects
|
|
|
|
9 |
S1 |
p. 13 |
artikel |
17 |
Personal computers (PCS) and related issues
|
|
|
|
9 |
S1 |
p. 10-11 |
artikel |
18 |
Personal issues
|
|
|
|
9 |
S1 |
p. 6-7 |
artikel |
19 |
Purpose and scope
|
|
|
|
9 |
S1 |
p. 1 |
artikel |
20 |
References
|
|
|
|
9 |
S1 |
p. 14 |
artikel |
21 |
Responsibility for security
|
|
|
|
9 |
S1 |
p. 1 |
artikel |
22 |
Risk analysis and risk management
|
|
|
|
9 |
S1 |
p. 1-2 |
artikel |
23 |
Security aims in protecting it assests
|
|
|
|
9 |
S1 |
p. 1 |
artikel |
24 |
Security plan
|
|
|
|
9 |
S1 |
p. 2 |
artikel |
25 |
Security policy
|
|
|
|
9 |
S1 |
p. 2 |
artikel |
26 |
Structure of the guidelines
|
|
|
|
9 |
S1 |
p. 1 |
artikel |
27 |
Threats
|
|
|
|
9 |
S1 |
p. 3 |
artikel |
28 |
Vulnerabilities
|
|
|
|
9 |
S1 |
p. 3-6 |
artikel |