. "C Comprehensive Training of Specialists to Counter Information Security Threats." Terrorism: Reducing Vulnerabilities and Improving Responses: U.S - Russian Workshop Proceedings. Washington, DC: The National Academies Press, 2004.
The following HTML text is provided to enhance online
readability. Many aspects of typography translate only awkwardly to HTML.
Please use the page image
as the authoritative form to ensure accuracy.
Terrorism: Reducing Vulnerabilities and Improving Responses - U.S.-Russian Workshop Proceedings
unauthorized outsiders; means of managing access; classification and characterization of intrusion, fire/intrusion, and fire alarm systems; video-monitoring and video-alarm systems; means of threat neutralization; means of notification management and transmission; automated integrated security systems
7.5 Means of preventing data leakage through technical channels. Means of masking and disinformation in the optical and radio frequency ranges; means of sound isolation and absorption; means of detecting, localizing, and suppressing signals of auxiliary devices; means of suppressing signals from acoustoelectrical transformers and power supply and grounding lines; linear and spatial noise generators
The special disciplines presented above include lectures, practical training and laboratory-based exercises, and internships working with real information security equipment and software. In receiving this training, the specialist acquires practical skills in countering cyberterrorism and is capable of independently developing an enterprise-wide information security policy involving the application of a range of integrated features.