unauthorized outsiders; means of managing access; classification and characterization of intrusion, fire/intrusion, and fire alarm systems; video-monitoring and video-alarm systems; means of threat neutralization; means of notification management and transmission; automated integrated security systems
7.5 Means of preventing data leakage through technical channels. Means of masking and disinformation in the optical and radio frequency ranges; means of sound isolation and absorption; means of detecting, localizing, and suppressing signals of auxiliary devices; means of suppressing signals from acoustoelectrical transformers and power supply and grounding lines; linear and spatial noise generators
The special disciplines presented above include lectures, practical training and laboratory-based exercises, and internships working with real information security equipment and software. In receiving this training, the specialist acquires practical skills in countering cyberterrorism and is capable of independently developing an enterprise-wide information security policy involving the application of a range of integrated features.
The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
C Comprehensive Training of Specialists to Counter Information Security Threats ."
Terrorism: Reducing Vulnerabilities and Improving Responses: U.S - Russian Workshop Proceedings . Washington, DC: The National Academies Press,
Please select a format: