Ebook: An Information Security Handbook
- Tags: Information Systems and Communication Service, Computer Communication Networks, Procurement
- Series: Computer Communications and Networks
- Year: 2001
- Publisher: Springer-Verlag London
- Edition: 1
- Language: English
- pdf
Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions;
What is security? What are the security problems particular to an IT system? What can be done to reduce the security risks associated with such a system? In a given situation, what are the appropriate security countermeasures? How should one set about procuring an information system with security implications?
It looks at the different goals organisations might have in employing security techniques (availability, integrity, confidentiality, exclusivity) and which technique is best suited to achieving each goal. With guidelines appropriate for the protection of both conventional commercial and military systems, An Information Security Handbook will be of interest to computer system managers and administrators in any commercial or government organisation.
Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions;
What is security? What are the security problems particular to an IT system? What can be done to reduce the security risks associated with such a system? In a given situation, what are the appropriate security countermeasures? How should one set about procuring an information system with security implications?
It looks at the different goals organisations might have in employing security techniques (availability, integrity, confidentiality, exclusivity) and which technique is best suited to achieving each goal. With guidelines appropriate for the protection of both conventional commercial and military systems, An Information Security Handbook will be of interest to computer system managers and administrators in any commercial or government organisation.
Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions;
What is security? What are the security problems particular to an IT system? What can be done to reduce the security risks associated with such a system? In a given situation, what are the appropriate security countermeasures? How should one set about procuring an information system with security implications?
It looks at the different goals organisations might have in employing security techniques (availability, integrity, confidentiality, exclusivity) and which technique is best suited to achieving each goal. With guidelines appropriate for the protection of both conventional commercial and military systems, An Information Security Handbook will be of interest to computer system managers and administrators in any commercial or government organisation.
Content:
Front Matter....Pages i-xiv
Introduction....Pages 1-10
Technology and Security....Pages 11-28
Physical Security....Pages 29-34
Personnel Security....Pages 35-40
Communications Security....Pages 41-62
Unix Security....Pages 63-75
Internet Security....Pages 77-81
Radiation Security....Pages 83-86
Procedural Security....Pages 87-96
Software Security....Pages 97-104
Some Notes on Static Analysis....Pages 105-114
Computer Viruses....Pages 115-133
The UK Data Protection Acts....Pages 135-139
System Administration and Security....Pages 141-152
The Management of Security....Pages 153-157
Conclusions....Pages 159-161
Back Matter....Pages 163-226
Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions;
What is security? What are the security problems particular to an IT system? What can be done to reduce the security risks associated with such a system? In a given situation, what are the appropriate security countermeasures? How should one set about procuring an information system with security implications?
It looks at the different goals organisations might have in employing security techniques (availability, integrity, confidentiality, exclusivity) and which technique is best suited to achieving each goal. With guidelines appropriate for the protection of both conventional commercial and military systems, An Information Security Handbook will be of interest to computer system managers and administrators in any commercial or government organisation.
Content:
Front Matter....Pages i-xiv
Introduction....Pages 1-10
Technology and Security....Pages 11-28
Physical Security....Pages 29-34
Personnel Security....Pages 35-40
Communications Security....Pages 41-62
Unix Security....Pages 63-75
Internet Security....Pages 77-81
Radiation Security....Pages 83-86
Procedural Security....Pages 87-96
Software Security....Pages 97-104
Some Notes on Static Analysis....Pages 105-114
Computer Viruses....Pages 115-133
The UK Data Protection Acts....Pages 135-139
System Administration and Security....Pages 141-152
The Management of Security....Pages 153-157
Conclusions....Pages 159-161
Back Matter....Pages 163-226
....