Information systems security in an airport environment

被引:1
|
作者
Wilson, DL [1 ]
机构
[1] Atlantic City Int Airport, Transportat Secur Res & Dev Lab, FAA William J Hughes Tech Ctr, Atlantic City, NJ 08401 USA
关键词
D O I
10.1109/CCST.2002.1049241
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Information Technology Management Reform Act of 1995 (ITMRA), also known as the Clinger-Cohen Act, requires the Chief Information Officers (CIO) of the Executive agencies of the government to develop, maintain and facilitate the implementation of a sound and integrated information technology architecture. The CIOs are responsible to ensure that information security policies, procedures and practices are adequate to effectively protect information systems. The National Airspace System (NAS) is made up of hundreds of facilities across the country, that provide the services required to operate and maintain the air transportation system. Airports are unique in this network as no two airports are designed the same and, while each one is a single facility, each is occupied by many different tenants who provide many different services. Each service may include one or more information systems, both automated and manual, running independently from all the others.
引用
收藏
页码:154 / 157
页数:4
相关论文
共 50 条
  • [1] Airport information systems security
    Wilson, DL
    [J]. IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2003, 18 (04) : 25 - 27
  • [2] SECURITY TECHNOLOGIES AND TECHNIQUES - AIRPORT SECURITY SYSTEMS
    BOUISSET, JF
    [J]. JOURNAL OF TESTING AND EVALUATION, 1994, 22 (03) : 247 - 250
  • [3] Security Risk Assessment of Information Systems in an Indeterminate Environment
    Basumatary, Basundhara
    Kumar, Chandan
    Yadav, Dilip Kumar
    [J]. 2021 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2021), 2021, : 82 - 87
  • [4] An Engineering Environment for Supporting Information Security Management Systems
    Suhaimi, Ahmad Iqbal Hakim
    Goto, Yuichi
    Cheng, Jingde
    [J]. COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 30 - 37
  • [5] SECURITY SYSTEMS AT THE AIRPORT WITH ACCENT ON DATA LAYER SECURITY
    Jasari, Amila
    [J]. INTERNATIONAL CONFERENCE ON ECONOMIC AND SOCIAL STUDIES (ICESOS'16): REGIONAL ECONOMIC DEVELOPMENT: ENTREPNEURSHIP AND INNOVATION, 2016, : 243 - 248
  • [6] Accessibility vs Security: The Challenge to Airport Security Systems
    Manoj S Patankar
    Louis Holscher
    [J]. Security Journal, 2000, 13 (2) : 7 - 19
  • [7] AIRPORT SECURITY SYSTEMS AND FOURTH AMENDMENT
    MANG, HJ
    [J]. LOUISIANA LAW REVIEW, 1974, 34 (04): : 860 - 867
  • [8] Information Environment Security
    Waltzman, Rand
    [J]. PROCEEDINGS OF THE 20TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'14), 2014, : 1521 - 1521
  • [9] Certifying airport security regulations using the Focal environment
    Delahaye, David
    Etienne, Jean-Frederic
    Donzeau-Gouge, Veronique Viguie
    [J]. FM 2006: FORMAL METHODS, PROCEEDINGS, 2006, 4085 : 48 - 63
  • [10] A systems approach to John Wayne airport security
    Donovan, S
    Mahoney, T
    Pelletier, N
    Schmidt, M
    Kwinn, M
    [J]. 2003 IEEE SYSTEMS & INFORMATION ENGINEERING DESIGN SYMPOSIUM, 2003, : 221 - 224