http://csrc.nist.gov/publications/nistpubs/800-100/sp800-100.pdf
This guide is specifically written for top level security/info
management (CSOs, CIOs etc). It addresses the requirements of various
security policies and laws, such as Clinger-Cohen Act (CCA) and FISMA.
--
Saqib Ali, CISSP, ISSAP
Here's another one... United Airlines send out email to UA flyers directing
them to 2006elitechoice.com for frequent flyer benefits.
2006elitechoice.com is registered to Srirangapatna Chandrashekar of Grey
Direct, Chicago. There are no indications on united.com of any connection to
2006elitechoic
"James A. Donald" <[EMAIL PROTECTED]> writes:
> Before computers, people had a lot of procedures that they routinely
> and ritualistically followed to prevent fraud, faithfully following
> the required procedures without ever thinking much about why things
> were done that way. It seems that some
> I think "Citibank aims at foot and lets loose with both barrels, then reloads
> and shoots a second time" would be a better title. This is a really scary
> example of what Perry once referred to as banks actively training users to
> become future victims of phishing attacks. What's even worse