Skip to main content
Log in

The Shifting Sands of Security Management

  • Guest Editorial
  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. J. Hale and P. Brusil, Special Issue on security and management, Journal of Network and Systems Management, Vol. 12, No. 1, March 2004.

  2. A. Sipress, An Indonesian’s prison memoir takes holy war into cyberspace, Washington Post Foreign Service, 12/14/2004.

  3. Associated Press, Taipei, China boosting cyberwar ability, Taipei Times, 11/17/2004.

  4. North Korea ready to launch cyber war: Report, ChannelNewsAsia, 10/4/2004.

  5. M. Ward, Cyber crime booms in 2004, BBC News UK Edition, 12/29/2004.

  6. S. Pruitt, Industry group formed to track and thwart IM threats, NetworkWorldFusion, IDG News Service, 12/7/2004.

  7. M. Savage, Vulnerability-to-worm cycle shortens to 10 days, SC Magazine, 5/20/2004.

  8. S. Menke, Worm attacks surge, IBM says, Government Computer News, 11/1/2004.

  9. P. Roberts, Reports of phishing attacks up again in December, Network World Fusion, 1/20/2005.

  10. J. Leyden, Phishing morphs into pharming, The Register, 1/31/2005, http://www.theregister.co.uk/2005/01/31/pharming/

  11. Mobile Pipeline Staff, 80% have received mobile spam, survey finds, InformationWeek, 2/9/2005.

  12. J. Soat, IT Confidential: the FCC, VoIP, and spyware, InformationWeek, 1/10/2005.

  13. M. Wagner, Special report: putting spyware in front of the firing squad, SecurityPipeline, Network Computing, 1/10/2005.

  14. Sarbanes-Oxley Act of 2002, 107th Congress of the USA, 2nd Session, HR 3763, 1/23/2002.

  15. Health Insurance Portability and Accountability Act of 1996, Public Law, pp. 104–191, 104th Congress, 8/21/1996.

  16. Financial Services Modernization Act of 1999, 11/4/1999

  17. Federal Information Security Management Act of 2002, Public Law, pp. 107–347 (H.R. 2458-48), 12/2002.

Download references

Authors

Additional information

Paul J. Brusil is a security and management consultant working to improve specification, implementation and use of trustworthy, secure products and systems. He helped form the National Information Assurance Partnership, the ISINM (now the Integrated Management symposium) and other industry forums. He spearheaded industry’s development of secure, standard network management solutions. At MITRE Corp., he led research leading to the first LAN solutions. At Harvard he pioneered various non-invasive diagnostic technology. He is now focused on online graduate school information assurance education and healthcare management, holding a patent for new healthcare record and claims technology. He is a Senior Member of the IEEE, has held various JNSM editor positions, and has authored over 100 papers and book chapters since graduating from Harvard University with a joint doctorate spanning Engineering and Medicine.

John Hale is an Associate Professor of Computer Science and Director of the Center for Information Security at the University of Tulsa. He has published over 50 refereed articles and one book in the area of computer security. His research includes projects in attack modeling, secure operating systems and critical infrastructure protection, and is sponsored by the National Science Foundation, the Department of Justice and the Department of Defense. He is also a faculty mentor in the University of Tulsa’s Cyber Corps Program and leads the Center’s federal INFOSEC certification initiative.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Brusil, P., Hale, J. The Shifting Sands of Security Management. J Netw Syst Manage 13, 241–245 (2005). https://doi.org/10.1007/s10922-005-6261-5

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10922-005-6261-5

Navigation