Article Announcement: U.S. Information Security Law, Part 3

From: Marc Fossi (mfossi_at_securityfocus.com)
Date: 05/14/03

  • Next message: Marc Fossi: "Article Announcement: Security Tools: From Mermaids to Suckling Pigs"
    Date: Wed, 14 May 2003 08:58:02 -0600 (MDT)
    To: Focus-MS <focus-ms@securityfocus.com>
    
    

    U.S. Information Security Law, Part 3

    By Steven Robinson

    This is the third part of a four-part series looking at U.S. information
    security laws and the way those laws affect security professionals. In
    this installment, we will look at the basics of the criminal information
    security law.

    http://www.securityfocus.com/infocus/1693

    Marc Fossi
    Symantec Corp.
    www.symantec.com

    -----------------------------------------------------------------------------
    *** Wireless LAN Policies for Security & Management - NEW White Paper ***
    Just like wired networks, wireless LANs require network security policies
    that are enforced to protect WLANs from known vulnerabilities and threats.
    Learn to design, implement and enforce WLAN security policies to lockdown enterprise WLANs.

    To get your FREE white paper visit us at:
    http://www.securityfocus.com/AirDefense-focus-ms
    ------------------------------------------------------------------------------


  • Next message: Marc Fossi: "Article Announcement: Security Tools: From Mermaids to Suckling Pigs"

    Relevant Pages

    • New SecurityFocus articles
      ... U.S. Information Security Law, Part 3 ... implement and enforce WLAN security policies to lockdown enterprise WLANs. ...
      (Pen-Test)
    • New SecurityFocus Article: U.S. Information Security Law, Part 3
      ... U.S. Information Security Law, Part 3 ... implement and enforce WLAN security policies to lockdown enterprise WLANs. ...
      (Incidents)
    • RE: A question for the list...
      ... >> evolution of the network ... implement and enforce WLAN security policies ... >> enterprise WLANs. ... implement and enforce WLAN security policies to ...
      (Incidents)
    • Re: [ANNOUNCE] protocol watcher
      ... attack, which is known to be a SYN attack! ... wireless LANs require network security policies ... > that are enforced to protect WLANs from known vulnerabilities and threats. ... implement and enforce WLAN security policies to lockdown enterprise WLANs. ...
      (Incidents)
    • RE: HTTPS Web site testing
      ... Subject: HTTPS Web site testing ... wireless LANs require network security policies ... that are enforced to protect WLANs from known vulnerabilities and threats. ... implement and enforce WLAN security policies to lockdown ...
      (Pen-Test)