John Leach

Results: 58



#Item
41United States federal banking legislation / Federal Trade Commission / Government / Computer law / Privacy policy / Gramm–Leach–Bliley Act / Internet privacy / FTC regulation of behavioral advertising / In re Gateway Learning Corp. / Ethics / Privacy / Law

State of Michigan John Engler, Governor Department of Consumer & Industry Services Kathleen M. Wilbur, Director Office of Financial and Insurance Services

Add to Reading List

Source URL: www.michigan.gov

Language: English - Date: 2012-12-07 11:02:30
42Office of the Comptroller of the Currency / Bank / Economy of the United States / Federal Reserve System / Gramm–Leach–Bliley Act / John G. Walsh / Community Reinvestment Act / United States federal banking legislation / Law / Financial regulation

O NEWS RELEASE Comptroller of the Currency Administrator of National Banks

Add to Reading List

Source URL: www.occ.gov

Language: English - Date: 2010-01-13 11:25:42
43Behavior / Crime prevention / Information security / National security / Attachment theory / Vulnerability / Role / Security / Computer security / Data security

John Leach Information Security Ltd Improving User Security Behaviour 3rd September 2003

Add to Reading List

Source URL: www.jlis.co.uk

Language: English - Date: 2013-12-20 04:34:08
44Cyberwarfare / National security / Computer network security / Computer security / Security guard / Information security / Corporate security / Vulnerability / Port security / Security / Public safety / Crime prevention

John Leach Information Security Limited INFORMATION SECURITY The Information Security Breaches Survey 2004 was released in April 2004 by Stephen Timms MP, the Minister of State for Energy, e-Commerce and Postal Services.

Add to Reading List

Source URL: www.jlis.co.uk

Language: English - Date: 2013-12-20 04:34:42
45Computer network security / Crime prevention / National security / Data security / Threat / Information security / Information assurance / Attack / Computer virus / Computer security / Security / Cyberwarfare

UNCOVERING THE VALUE WITHIN SECURITY INCIDENT DATA By Dr John Leach This is the first in a series of three articles exploring a common theme, that auditors often have access to security data which can be extremely valuab

Add to Reading List

Source URL: www.jlis.co.uk

Language: English - Date: 2013-12-20 04:33:05
46Computer network security / Data security / National security / Vulnerability / Threat / Computer virus / Information security / Antivirus software / Zero-day attack / Computer security / Security / Cyberwarfare

Threat-Based Security Engineering (TBSE) John Leach John Leach Information Security Ltd; Innisfree, Stoke Road, Smannell, Andover Hants SP11 6JL England Abstract: TBSE is a risk modelling technique which models the dyna

Add to Reading List

Source URL: www.jlis.co.uk

Language: English - Date: 2013-12-20 04:35:15
47Computer network security / Data security / Information Risk Management / Information security / Vulnerability / Threat / Information assurance / Security controls / Attack / Computer security / Security / Cyberwarfare

RESULTS THAT DO ALL THE TALKING By Dr John Leach The overall theme with which I introduced this series of three articles is that most people would be able to make more use of the security data available to them with a li

Add to Reading List

Source URL: www.jlis.co.uk

Language: English - Date: 2013-12-20 04:32:56
48Computer network security / Data security / Information Risk Management / Threat / Countermeasure / Vulnerability / Asset / Information security / Information assurance / Computer security / Security / Cyberwarfare

DEVELOPING THE THREAT MEASUREMENT HABIT By Dr John Leach This is the second in a series of three articles exploring a common theme, that simple security data can often be remarkably valuable from a risk management perspe

Add to Reading List

Source URL: www.jlis.co.uk

Language: English - Date: 2013-12-20 04:33:00
49Information privacy / Privacy / Information security / Data Protection Act / Telecommunications data retention / Ethics / Security / Data protection

John Leach Information Security THE RIGHT TO BE FORGOTTEN ABSTRACT The European Court of Justice’s (ECoJ’s) ruling on what is now known as the ‘Right to be Forgotten’ sets a clear direction of travel and brings

Add to Reading List

Source URL: www.jlis.co.uk

Language: English - Date: 2014-06-28 07:33:45
50Cyberwarfare / Crime prevention / National security / Antivirus software / Information security / Computer virus / Threat / Security / Computer security / Computer network security

John Leach Information Security Ltd TBSE An Engineering Approach to the Design of Accurate and Reliable Security Systems 11th November 2003

Add to Reading List

Source URL: www.jlis.co.uk

Language: English - Date: 2013-12-20 04:35:12
UPDATE