Have a personal or library account? Click to login
The Principles of Classified Information Protection Handled in Communication and Information Systems Within the Realisation of European Defence Agency Research Projects Cover

The Principles of Classified Information Protection Handled in Communication and Information Systems Within the Realisation of European Defence Agency Research Projects

Open Access
|Dec 2016

References

  1. [1] Buszman K., Listewnik K., Sobczynski T., Sensitive and Classified Data Exchange and Handling in the EU. A Case Study, ‘Journal of Information System Security’, 2015, Vol. 11, No. 2, pp. 149-168, Information Institute Publishing, Washington DC, USA.
  2. [2] Council Decision of 31 March 2011 on the security rules for protecting EU classified information (2011/292/EU).
  3. [3] Directive 2009/81/EC of the European Parliament and of the Council of 13 July 2009 on the coordination of procedures for the award of certain works contracts, supply contracts and service contracts by contracting authorities or entities in the fields of defence and security, and amending Directives 2004/17/EC and 2004/18/EC.
  4. [4] Elsea J. K., The Protection of Classified Information. The Legal Framework, Congressional Research Service 7-5700, Washington, 10 January 2013.
  5. [5] Information Security Risk Assessment. Practices of Leading Organizations, Accounting and Information Management Division Executive, GAO Guide on Information Security Management, 1999.
  6. [6] ISO/IEC 13335-1:2004, Information technology. Security techniques. Management of information and communications technology security, Part 1, Concepts and models for information and communications technology security management.
  7. [7] ISO/IEC 27001:2013, Information technology. Security techniques. Information security management systems. Requirements.
  8. [8] ISO/IEC 27002:2013, Information technology. Security techniques. Code of practice for information security controls.
  9. [9] ISO/IEC 27005:2011, Information technology. Security techniques. Information security risk management.
  10. [10] ISO/IEC 27005:2011, Information technology. Security techniques. Information security management system implementation guidance.
  11. [11] Monahan G., Enterprise Risk Management. A Methodology for Achieving Strategic Objectives, John Wiley & Sons, 2008.
  12. [12] NIST SP 800-30, Risk Management Guide for Information Technology System, Recommendations of the National Institute of Standards and Technology.
  13. [13] Taylor A., Alexander D., Finch A., Sutton D., Information Security Management Principles, The British Computer Society, 2008.
  14. [14] The Treaty of Rome, 25 March 1957.
  15. [15] http://www.eda.europa.eu/info-hub/data-protection [access 27.08.2016]
  16. [16] https://www.enisa.europa.eu/activities/risk-management [access 27.08.2016].
Language: English
Page range: 87 - 100
Published on: Dec 30, 2016
Published by: Polish Naval Academy
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2016 Tomasz Sobczyński, published by Polish Naval Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.