Information systems security in an airport environment

被引:1
|
作者
Wilson, DL [1 ]
机构
[1] Atlantic City Int Airport, Transportat Secur Res & Dev Lab, FAA William J Hughes Tech Ctr, Atlantic City, NJ 08401 USA
关键词
D O I
10.1109/CCST.2002.1049241
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Information Technology Management Reform Act of 1995 (ITMRA), also known as the Clinger-Cohen Act, requires the Chief Information Officers (CIO) of the Executive agencies of the government to develop, maintain and facilitate the implementation of a sound and integrated information technology architecture. The CIOs are responsible to ensure that information security policies, procedures and practices are adequate to effectively protect information systems. The National Airspace System (NAS) is made up of hundreds of facilities across the country, that provide the services required to operate and maintain the air transportation system. Airports are unique in this network as no two airports are designed the same and, while each one is a single facility, each is occupied by many different tenants who provide many different services. Each service may include one or more information systems, both automated and manual, running independently from all the others.
引用
收藏
页码:154 / 157
页数:4
相关论文
共 50 条
  • [21] Modeling and Optimization of Discrete Evolutionary Systems of Information Security Management in a Random Environment
    Lakhno, V. A.
    Kasatkin, D. Y.
    Skliarenko, O., V
    Kolodinska, Y. O.
    MACHINE LEARNING AND AUTONOMOUS SYSTEMS, 2022, 269 : 9 - 22
  • [22] Information systems resources and information security
    Chang, Kuo-chung
    Wang, Chih-ping
    INFORMATION SYSTEMS FRONTIERS, 2011, 13 (04) : 579 - 593
  • [23] Information systems resources and information security
    Kuo-chung Chang
    Chih-ping Wang
    Information Systems Frontiers, 2011, 13 : 579 - 593
  • [24] Redefining Information Systems Security: Viable Information Systems
    Karyda, M
    Kokolakis, S
    Kiountouzis, E
    TRUSTED INFORMATION: THE NEW DECADE CHALLENGE, 2001, 65 : 453 - 467
  • [25] ISEE: AN INFORMATION SECURITY ENGINEERING ENVIRONMENT
    Cheng, Jingde
    Goto, Yuichi
    Horie, Daisuke
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 395 - 400
  • [26] Security implications of the personal information environment
    Valasek, Pavel
    22ND INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATIONS AND COMPUTERS (CSCC 2018), 2018, 210
  • [27] Information Terrorism in the new security environment
    Webb, Ken
    ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 249 - 255
  • [29] Airport Security Imaging Systems: Design, Dose, Risks, and Quality
    Moulder, J.
    Kassiday, D.
    Segraves, J.
    Gray, J.
    MEDICAL PHYSICS, 2011, 38 (06)
  • [30] Analysis of the requirements of the information security of reputation systems and scenario of using reputation systems in the cloud computing environment
    Abdullaeva F.D.
    Journal of Automation and Information Sciences, 2016, 48 (07) : 77 - 87