====== Management de la sécurité des technologies de l'information ====== {{is:securite.pdf|Examen 2007}} {{si:resume_livre.pdf|Résumé livre}} ===== Documents ===== Résumés articles ([[http://www.doodle.ch/participation.html?pollId=kv956zki87qezp48|lien doodle]]) - {{resume_the_psychology_of_security.pdf|The Psychology of Security}} - {{si:clarifying_the_roles_of_information_security.pdf|Clarifying the Roles of Information Security: 13 Questions the CEO, CIO, and CISO}} - {{is:information_security_management.pdf|Information Security Management – A New Paradigm}} - {{TheCommonCriteria.pdf|The Common Criteria ISO/IEC 15408}} - Business and technical motivation for identity management - {{is:identity.digital.pdf|“ Digital Life”, Chapitre 4}} - {{resume_adopting_itc.pdf| Adopting an ICT code of conduct}} - Laws and regulations affecting Information Management - {{si:cyberslacking.pdf|CYBERSLACKING – LEGAL AND ETHICAL ISSUES}} - {{si:Information Security is Information Risk Management.pdf|Information Security is Information Risk Management}} - {{si:analyse_des_risques_et_managenement_des_risques.pdf|Risk Analysis and Risk Management}} - Efficient Security Measurements and Metrics for Risk Assessment - {{si:developing_a_framework_for_understanding_security_governance.pdf|Developing a framework for understanding security governance}} - Measurement Model for Information System Management - {{si:formulating_is_risk_mangement_through_cultural_theory.pdf|formulating is risk management through cultural theory}} - {{si:resume_fivedimensionsofinformationsecurityawereness.pdf|Five Dimensions of Information Security Awareness}} - The Evolution of Information Assurance - {{si:business_impact_analysis_and_testing.pdf|The role of Business Impact Analysis and Testing in Disaster Recovery Planning by Helth Maintenance Organizations}} - {{si:business_continuity_planning_as_a_facilities_management_tool.pdf|Business Continuity Planning as a facilities management tool }} - {{cyclicapproach2bcp.pdf | A cyclic approach to business continuity planning}} - {{si:resume_the_conceptofsecurityandtrustinelectronicpayments.pdf|The concept of security and trust in electronic payments}} - Unconditionally secure cryptosystems based on Quantum Cryptography - {{is:reflexes_intrusions_syst_info.pdf|Les bons réflexes en cas d’intrusion sur un système d’information}} - {{is:mots_de_passe.pdf|Les mots de passe}} - {{si:formulating_is_risk_mangement_through_cultural_theory.pdf|formulating_is_risk_mangement_through_cultural_theory}}