| Contents | 6 |
---|
| Preface | 12 |
---|
| About this Book | 14 |
---|
| Welcome | 16 |
---|
| Microsoft: A Trustworthy Vision for Computing | 18 |
---|
| Legal, Technical and Social Aspects of Security | 20 |
| Regulating Information Security: A Matter of Principle? | 22 |
| Abstract | 22 |
| 1 Introduction | 22 |
| 2 Working with rules | 22 |
| 3 Making rules | 25 |
| 4 Information security: to serve and protect? | 27 |
| 5 What’s law got to do with it? | 28 |
| 6 A Working Group | 29 |
| 7 Regulatory Principles | 30 |
| 8 Conclusions | 35 |
| References | 35 |
| ISTPA Operational Analysis of International Privacy Requirements | 37 |
| 1 Introduction and Background | 37 |
| 1.1 The ISTPA Privacy Framework | 37 |
| 1.2 Drivers for Framework Analysis and Revision | 40 |
| 2 The Analysis of Privacy Principles | 40 |
| 2.1 Overview | 40 |
| 2.2 Selected International Laws and Directives | 41 |
| 2.3 Study Methodology and Key Findings | 42 |
| 2.4 Illustration of Sub-Components | 42 |
| 2.5 Additional Findings and Observations | 43 |
| 3 Conclusion and Next Steps for Using the Analysis | 44 |
| The Legal Conflict between Security and Privacy in Addressing Crime and Terrorism on the Internet | 45 |
| 1 Introduction | 45 |
| 2 A brief summary of the evolution of Internet laws in addressing crime and terrorism | 46 |
| 2.1 Introduction | 46 |
| 2.2 The origin of the Internet and the impact and consequences of the commercialization of the Internet | 47 |
| 2.3 The phases of evolution of Internet legal regulation | 47 |
| 2.4 The ‘driving force’ behind the evolution of Internet legal regulation | 49 |
| 3 Privacy and security on the Internet | 50 |
| 3.1 Introduction | 50 |
| 3.2 The European Union and United States of America’s approach to Internet privacy and security | 52 |
| 3.3 Effect of Internet state control of information on Internet 3.3 privacy and security | 54 |
| 4 Conclusion | 54 |
| References | 55 |
| Data Encryption on File Servers | 57 |
| 1 Introduction | 57 |
| 2 Why Encrypt Files on Central File Servers? | 57 |
| 3 Possible Solutions | 59 |
| 4 Microsoft Encrypting File System | 59 |
| 4.1 EFS Principles | 59 |
| 4.1.1 EFS Certificates | 60 |
| 4.1.2 User Profiles | 60 |
| 4.1.3 File Sharing | 60 |
| 4.2 General EFS Recommendations | 61 |
| 5 Decru DataFort | 61 |
| 5.1 Storage Encryption Processor | 61 |
| 5.2 Cryptainer™ Storage Vaults | 62 |
| 5.3 Levels of Virtualization | 62 |
| 5.4 Clustering | 63 |
| 6 Utimaco SafeGuard LAN Crypt | 63 |
| 6.1 SafeGuard LAN Crypt Main Features | 63 |
| 6.2 Keys and Algorithms | 64 |
| 6.3 Encryption Rules | 65 |
| 6.4 Transparent encryption | 66 |
| 6.5 Encryption Profiles | 66 |
| 7 Different Solution Approaches | 66 |
| 7.1 Database encryption | 66 |
| 7.2 Enterprise Rights Management | 66 |
| 7.3 SAN encryption | 67 |
| 8 Conclusion | 67 |
| Setting up an Effective Information Security Awareness Programme | 68 |
| 1 Introduction | 68 |
| 2 Organising an effective security awareness programme | 69 |
| 3 Organising an awareness programme in practice | 72 |
| 3.1 Defining objective and scope | 72 |
| 3.2 Setting up the project plan | 73 |
| 3.3 Obtaining senior management commitment | 73 |
| 3.4 Preparing the deliverables | 74 |
| 3.5 Program roll-out | 74 |
| 3.6 Tracking the programme and its effectiveness | 76 |
| 3.7 Results | 76 |
| 4 Conclusion | 77 |
| References | 77 |
| Saferinternet.pl Project – Educational Activities for Internet Safety in Poland | 78 |
| 1 I
|