Skip to main content

The Integration of Compliance with Protective Security (PS)

  • Chapter
  • First Online:
Protective Security
  • 588 Accesses

Abstract

US Army General

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    www.moaa.org/content/publications-and-media/features-and-columns/moaa-features/Colin-Powell-Remembers-Desert-Storm-25-years-later/

  2. 2.

    www.etymonline.com/search?q=compliance

  3. 3.

    https://securityscorecard.com/

  4. 4.

    www.tcdi.com/information-security-compliance-which-regulations/

  5. 5.

    https://arcticwolf.com/resources/guides/the-financial-industry-cybersecurity-checklist

  6. 6.

    www.gov.uk/transport/aviation

  7. 7.

    www.caa.co.uk/Commercial-industry/Security/Security-Regulation/

  8. 8.

    www.yorkpress.co.uk/news/7863082.raf-base-becomes-makeshift-airport/

  9. 9.

    https://dictionary.cambridge.org/dictionary/english/standardization

  10. 10.

    www.fbi.gov/services/cjis/cjis-security-policy-resource-center

  11. 11.

    www.energy.gov/ceser/activities/cybersecurity-critical-energy-infrastructure/energy-sector-cybersecurity-0

  12. 12.

    https://us-cert.cisa.gov/sites/default/files/documents/CatalogofRecommendationsVer7.pdf

  13. 13.

    https://csrc.nist.gov/publications/detail/sp/800-171/rev-1/final

  14. 14.

    https://public.cyber.mil/stigs/cci/

  15. 15.

    www.cisa.gov/rbps-8-cyber

  16. 16.

    www.aga.org/sites/default/files/legacy-assets/membercenter/gotocommitteepages/NGS/Documents/INGAAControlSystemsCyberSecurityGuidelines.pdf

  17. 17.

    www.cisecurity.org/controls/cis-controls-list/

  18. 18.

    www.iso.org/standard/54534.html

  19. 19.

    https://cyber.gc.ca/en/guidance/baseline-cyber-security-controls-small-and-medium-organizations

  20. 20.

    www.dodea.edu/Offices/PolicyAndLegislation/upload/DoDEA-AI-8510-01-Risk-Management-Framework.pdf

  21. 21.

    www.dcsa.mil/portals/91/documents/ctp/nao/CNSSI_No1253.pdf

  22. 22.

    https://fas.org/sgp/crs/homesec/R45135.pdf

  23. 23.

    https://csrc.nist.gov/publications/detail/nistir/7628/rev-1/final

  24. 24.

    www.ncua.gov/newsroom/ncua-report/2018/new-tool-will-enhance-ncuas-cybersecurity-assessments-credit-unions

  25. 25.

    www.pcisecuritystandards.org/document_library

  26. 26.

    www.hhs.gov/hipaa/for-professionals/security/laws-regulations/index.html

  27. 27.

    https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/draft

  28. 28.

    https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf

  29. 29.

    www.nrc.gov/docs/ML1011/ML101180437.pdf

  30. 30.

    www.nrc.gov/docs/ML0903/ML090340159.pdf

  31. 31.

    https://csrc.nist.gov/publications/detail/sp/800-82/rev-2/final

  32. 32.

    https://webstore.ansi.org/standards/isa/ansiisa624432018

  33. 33.

    https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-161.pdf

  34. 34.

    www.hsdl.org/?view&did=809453

  35. 35.

    https://www.apta.com/research-technical-resources/standards/security/apta-ss-ccs-rp-002-13/

  36. 36.

    www.infrastructure.gov.au/rail/history.aspx

  37. 37.

    https://insights.sei.cmu.edu/insider-threat/2017/10/define-your-organizations-risk-tolerance-part-2-of-7-mitigating-risks-of-unsupported-operating-syste.html#:~:text=One%20framework%20is%20CERT%20OCTAVE,if%20the%20threats%20are%20realized.&text=The%20RMF%20enables%20you%20to%20continually%20manage%20your%20operational%20risk

  38. 38.

    “The amount and type of risk that an organization is prepared to pursue, retain or take.” – ISO 31000.

  39. 39.

    http://wla.1-s.es/uk-mod-jsp-440-2001.pdf

  40. 40.

    https://britishlivertrust.org.uk/information-and-support/liver-health-2/symptoms-of-liver-disease/

  41. 41.

    https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-161.pdf

  42. 42.

    https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-161.pdf

  43. 43.

    assistance@cyberrescue.co.uk

  44. 44.

    https://us-cert.cisa.gov/sites/default/files/FactSheets/NCCIC%20ICS_FactSheet_CSET_S508C.pdf

  45. 45.

    assistance@cyberrescue.co.uk

  46. 46.

    www.fairinstitute.org/fair-u

  47. 47.

    www.riskiq.com/blog/external-threat-management/inter-skimmer/

  48. 48.

    https://threatpost.com/claires-customers-magecart-payment-card-skimmer/156552/

  49. 49.

    https://msutoday.msu.edu/news/2020/msu-confirms-unauthorized-access-to-online-shopping-site/

  50. 50.

    www.riskiq.com/blog/labs/magecart-nutribullet/

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Seaman, J. (2021). The Integration of Compliance with Protective Security (PS). In: Protective Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-6908-4_4

Download citation

Publish with us

Policies and ethics