EQR Q2 2009, vol. 5, no. 2

Information Sharing, Business Risks, Privacy, Wireless Security


Table of Contents

A Letter from the Executive Director

A Word from the Editor

Infrastructure Protection and Information Sharing

    • Information Sharing Exchanges
    • FISHA: a Framework for Information Sharing and Alerting
    • Information Infrastructure Protection
    • Establishing a National CSIRT in South Africa

Strategy and Business Risks

    • The Finnish National NIS Strategy and Information Risk Management and Process Reliability
    • The Convergence of Risk
    • Countering Insider Threats
    • Flemish SMEs Leave their IT Security in the Hands of Badly Informed Manager


    • Revocable Privacy
    • Privacy in Cloud Computing

Security of Wireless Networks

    • Improving the Security of Wireless Communications
    • Can you be Traced by your Bluetooth Device?

Food for Thought

    • Rule-breakers – the Ones to Watch?
PDF document icon eqr2009Q2.pdf — PDF document, 2.05 MB (2154551 bytes)

We use cookies to ensure we give you the best browsing experience on our website. Find out more on how we use cookies and how you can change your settings.

Ok, I understand No, tell me more