An Information Security Handbook: Computer Communications and Networks
Autor John M. Hunteren Limba Engleză Paperback – 16 mar 2001
What is security? What are the security problems particular to an IT system? What can be done to reduce the security risks associated with such a system? In a given situation, what are the appropriate security countermeasures? How should one set about procuring an information system with security implications?
It looks at the different goals organisations might have in employing security techniques (availability, integrity, confidentiality, exclusivity) and which technique is best suited to achieving each goal. With guidelines appropriate for the protection of both conventional commercial and military systems, An Information Security Handbook will be of interest to computer system managers and administrators in any commercial or government organisation.
Din seria Computer Communications and Networks
- 20% Preț: 378.18 lei
- 20% Preț: 670.89 lei
- 20% Preț: 218.21 lei
- 20% Preț: 992.85 lei
- 20% Preț: 361.35 lei
- 20% Preț: 505.48 lei
- 20% Preț: 633.72 lei
- 20% Preț: 609.08 lei
- 20% Preț: 750.10 lei
- 20% Preț: 332.64 lei
- 20% Preț: 585.81 lei
- 20% Preț: 642.59 lei
- 20% Preț: 976.85 lei
- 20% Preț: 344.80 lei
- 20% Preț: 902.00 lei
- 20% Preț: 976.02 lei
- 20% Preț: 631.75 lei
- 15% Preț: 637.54 lei
- 20% Preț: 637.57 lei
- 20% Preț: 366.38 lei
- 20% Preț: 633.86 lei
- 20% Preț: 984.62 lei
- 20% Preț: 633.72 lei
- 20% Preț: 334.93 lei
- 20% Preț: 642.92 lei
- 20% Preț: 638.56 lei
- 20% Preț: 324.42 lei
- 20% Preț: 637.25 lei
- 20% Preț: 968.61 lei
- 20% Preț: 630.95 lei
- 20% Preț: 746.04 lei
- 20% Preț: 326.03 lei
- 20% Preț: 338.63 lei
- 20% Preț: 325.38 lei
- 20% Preț: 976.02 lei
- 20% Preț: 631.11 lei
- 20% Preț: 320.06 lei
- 20% Preț: 320.19 lei
- 20% Preț: 992.52 lei
- 20% Preț: 629.52 lei
- 20% Preț: 628.05 lei
- 20% Preț: 704.01 lei
- 20% Preț: 1022.26 lei
Preț: 378.08 lei
Nou
Puncte Express: 567
Preț estimativ în valută:
72.38€ • 75.24$ • 60.01£
72.38€ • 75.24$ • 60.01£
Carte tipărită la comandă
Livrare economică 05-19 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781852331801
ISBN-10: 1852331801
Pagini: 244
Ilustrații: XIV, 226 p. 3 illus.
Dimensiuni: 155 x 235 x 13 mm
Greutate: 0.36 kg
Ediția:2001
Editura: SPRINGER LONDON
Colecția Springer
Seria Computer Communications and Networks
Locul publicării:London, United Kingdom
ISBN-10: 1852331801
Pagini: 244
Ilustrații: XIV, 226 p. 3 illus.
Dimensiuni: 155 x 235 x 13 mm
Greutate: 0.36 kg
Ediția:2001
Editura: SPRINGER LONDON
Colecția Springer
Seria Computer Communications and Networks
Locul publicării:London, United Kingdom
Public țintă
GraduateCuprins
1. Introduction.- 1.1 Why a Book about Information Security?.- 1.2 Some Conventions.- 1.3 Risks.- 1.4 Information Sensitivity.- 1.5 Information Importance.- 1.6 Countermeasures.- 1.7 Information Warfare.- 1.8 Management.- 1.9 Summary.- 2. Technology and Security.- 2.1 Privilege and Machine Modes.- 2.2 System Configuration.- 2.3 Physical Aspects of Discs and Tapes.- 2.4 Files and Access Control.- 2.5 RAID Storage.- 2.6 Summary.- 3. Physical Security.- 3.1 The Security Domains.- 3.2 Security Aspects of Layout.- 3.3 Summary.- 4. Personnel Security.- 4.1 Assessing Personnel Trustworthiness.- 4.2 Example and Leadership.- 4.3 Awareness.- 4.4 IT Staff.- 4.5 New Recruits and Leavers.- 4.6 General.- 4.6 Summary.- 5. Communications Security.- 5.1 Encryption and Cryptanalysis.- 5.2 Authentication Dialogues.- 5.3 The Kerberos Authentication Dialogue.- 5.4 Hacking.- 5.5 Unix and the TCP/IP Family of Protocols.- 5.6 Firewalls and Gateways.- 6. Unix Security.- 6.1 The Security Problems of Unix.- 6.2 Unix File Permissions.- 6.3 Executing as the Superuser.- 6.4 Password Security.- 6.5 Improving Unix Network Security.- 7. Internet Security.- 7.1 External Hazards.- 7.2 ISP Services.- 7.3 After an Attack.- 7.4 Summary.- 8. Radiation Security.- 8.1 Equipment Layout.- 8.2 Maintenance.- 8.3 Summary.- 9. Procedural Security.- 9.1 System Integrity.- 9.2 Magnetic Media.- 9.3 Denial of System Benefits to a Competitor.- 9.4 Disposal of Documents.- 9.5 Weeding and Downgrading.- 9.6 When It Starts to Go Wrong.- 9.7 Summary.- 10. Software Security.- 10.1 Secure Computer Systems.- 10.2 Software Evaluation.- 10.3 Software Security Models.- 10.4 Other Software Security Issues.- 11. Some Notes on Static Analysis.- 11.1 Introduction.- 11.2 Control Flow Analysis.- 11.3 Data Flow Analysis.- 11.4 InformationFlow Analysis.- 11.5 Semantic Analysis.- 11.6 The Use of Static Analysis.- 11.7 Summary.- 12. Computer Viruses.- 12.1 Introduction.- 12.2 Viruses.- 12.3 Virus Examples.- 12.4 Dealing with Viruses.- 12.5 Java & Active-X.- 12.6 The “Millennium Bug”.- 12.7 Summary.- 13. The UK Data Protection Acts.- 13.1 Definitions.- 13.2 The Data Protection Principles.- 13.3 Summary.- 14. System Administration and Security.- 14.1 The Procurement of Secure Information Systems.- 14.2 System and Data Backups.- 14.3 Resource Tracking and Management.- 14.4 System Testing and Probing.- 14.5 Configuration Management.- 14.6 Database Maintenance.- 14.7 User Account Management.- 14.8 Audit Trail Management.- 14.9 Summary.- 15. The Management of Security.- 15.1 The Security Management Problem.- 15.2 A Security Management Methodology.- 15.3 System Security Policies.- 15.4 Summary.- 16. Conclusions.- 16.1 A Definition of Information System Security.- 16.2 The Security Problems of an Information System.- 16.3 Tailpiece.- A. Unix Security Resources.- A.1 Configuration Checkers.- A.2 Network Activity Monitors.- A.3 Intrusion Checkers.- A.4 Change Detectors.- A.5 Password Checkers.- A.6 Firewall Packages.- A.7 Security Documentation.- A.8 Other Secure Software.- B. DoD Computer System Evaluation Criteria.- C. IT Security Evaluation Criteria (ITSEC).- D. An Example System Security Policy.- E. System Threats and Countermeasures.- E.1 Introduction.- E.2 Threats to the Level of Service.- E.2.1 Power Supplies.- E.2.2 Hardware Faults.- E.2.3 Software Crashes.- E.2.4 Operator Errors.- E.2.5 Computer Viruses.- E.2.6 Environmental Disasters.- E.3 Threats to the Information Base.- E.4 Threats Leading to Information Leakage.- E.5 Choice of Countermeasures.- E.6 Summary.- F. Example List of SecurityCountermeasures.- F.1 Access Control.- F.1.1 Communications.- F.1.2 Covert Channel Control.- F.1.3 Discretionary Access Control.- F.1.4 Mandatory Access Control.- F.1.5 Physical Access Control.- F.2 Accountability.- F.2.1 Transactions.- F.2.2 Configuration.- F.3 Accuracy.- F.3.1 Communications.- F.3.2 Storage.- F.4 Availability.- F.4.1 Communications.- F.4.2 Logical Denial.- F.4.3 Personnel.- F.4.4 Physical Denial.- F.4.5 Environmental Damage.- F.5 Data Exchange.- F.5.1 Communications Security.- F.5.2 Covert Channel.- F.5.3 Radiation Security.- F.5.4 Transmission Security.- F.5.5 Traffic Flow Security.- F.6 Authentication.- F.7 Audit.- F.8 Personnel.- G. Glossary of Information Security Terms.- H. References & Bibliography.
Caracteristici
Covers a more comprehensive range of subjects than other available texts (including management of security and personnel security) More up-to-date than other books, including implications which arose from the Y2K date change