Information systems security in an airport environment

被引:1
|
作者
Wilson, DL [1 ]
机构
[1] Atlantic City Int Airport, Transportat Secur Res & Dev Lab, FAA William J Hughes Tech Ctr, Atlantic City, NJ 08401 USA
关键词
D O I
10.1109/CCST.2002.1049241
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Information Technology Management Reform Act of 1995 (ITMRA), also known as the Clinger-Cohen Act, requires the Chief Information Officers (CIO) of the Executive agencies of the government to develop, maintain and facilitate the implementation of a sound and integrated information technology architecture. The CIOs are responsible to ensure that information security policies, procedures and practices are adequate to effectively protect information systems. The National Airspace System (NAS) is made up of hundreds of facilities across the country, that provide the services required to operate and maintain the air transportation system. Airports are unique in this network as no two airports are designed the same and, while each one is a single facility, each is occupied by many different tenants who provide many different services. Each service may include one or more information systems, both automated and manual, running independently from all the others.
引用
收藏
页码:154 / 157
页数:4
相关论文
共 50 条
  • [41] Analysis of Information Security of Distributed Information Systems
    Grusho, Alexander
    Grusho, Nick
    Levykin, Michael
    Timonina, Elena
    [J]. 2017 9TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2017, : 96 - 100
  • [42] PERSONALIZED INFORMATION SECURITY IN HEALTH INFORMATION SYSTEMS
    Kablukov, A. A.
    Ivankova, I. A.
    [J]. ZAPOROZHYE MEDICAL JOURNAL, 2012, (06) : 91 - 93
  • [43] Radioisotopes and airport security
    Iqbal, MB
    Sharma, R
    Underwood, SR
    Kaddoura, S
    [J]. LANCET, 2005, 366 (9482): : 342 - 342
  • [44] Biometrics and airport security
    Elliott, John
    [J]. Biometric Technology Today, 2009, 2009 (10) : 7 - 8
  • [45] Airport Security Analysis
    Liang, Tianbao
    [J]. PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON EDUCATION AND MANAGEMENT (ICEM 2017), 2017, 53 : 136 - 140
  • [46] Comparison of Information Security Systems for Asymptotic Information Security Management Critical Information Infrastructures
    Erokhin, Sergey
    Petukhov, Andrey
    Pilyugin, Pavel
    [J]. PROCEEDINGS OF THE 28TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION FRUCT, 2021, : 89 - 95
  • [47] Airport security in a flash
    不详
    [J]. INDUSTRIAL ENGINEER, 2003, 35 (07): : 10 - 10
  • [48] Airport perimeter security
    Anon
    [J]. Airport Forum, 1990, 20 (03):
  • [49] Information Security Model to Military Organizations in Environment of Information Warfare
    Martins, Jose
    Santos, Henrique
    Nunes, Paulo
    Silva, Rui
    [J]. PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 172 - 179
  • [50] Development of ISEE: An Information Security Engineering Environment
    Horie, Daisuke
    Goto, Yuichi
    Cheng, Jingde
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 338 - 342