Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of pr
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
โ Scribed by Jacobs, Stuart
- Publisher
- Wiley-IEEE Press
- Year
- 2015
- Tongue
- English
- Leaves
- 771
- Series
- IEEE Press series on information & communication networks security
- Edition
- 2nd ed
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Content: Series Page
Title Page
Copyright
Dedication
Preface and Acknowledgments
About the Companion Website
Chapter 1: What is Security?
1.1 Introduction
1.2 The Subject of Security
1.3 A Twenty-First Century Tale
1.4 Why are You Important to Computer Security?
1.5 End of the Beginning
1.6 Chapter Summary
1.7 Further Reading and Resources
Chapter 2: Systems Engineering
2.1 So What is Systems Engineering?
2.2 Process Management
2.3 Organization Environments
2.4 Chapter Summary
2.5 Further Reading and Resources
Chapter 3: Foundation Concepts
3.1 Security Concepts and Goals 3.2 Role Of Cryptography In Information Security3.3 Key Management Revisited
3.4 Chapter Summary
3.5 Further Reading and Resources
Chapter 4: Authentication of Subjects
4.1 Authentication Systems
4.2 Human Authentication
4.3 Chapter Summary
4.4 Further Reading and Resources
Chapter 5: Security Systems Engineering
5.1 Security Policy Development
5.2 Senior Management Oversight and Involvement
5.3 Security Process Management and Standards
5.4 Information Security Systems Engineering Methodology
5.5 Requirements Analysis and Decomposition
5.6 Access Control Concepts 5.7 Security Modeling and Security-Related Standards5.8 Chapter Summary
Chapter 6: Traditional Network Concepts
6.1 Networking Architectures
6.2 Types of Networks
6.3 Network Protocols
6.4 Chapter Summary
6.5 Further Reading and Resources
Chapter 7: Next-Generation Networks
7.1 Framework and Topology of the Ngn
7.2 The Ngn Functional Reference Model
7.3 Relationship Between Ngn Transport and Service Domains
7.4 Enterprise Role Model
7.5 Security Allocation Within the Ngn Transport Stratum Example
7.6 Converged Network Management (TMN and eTOM) 7.7 General Network Security Architectures7.8 Chapter Summary
7.9 Further Reading and Resources
Chapter 8: General Computer Security Architecture
8.1 The Hardware Protects the Software
8.2 The Software Protects Information
8.3 Element Security Architecture Description
8.4 Operating System (OS) Structure
8.5 Security Mechanisms for Deployed Operating Systems (OSs)
8.6 Chapter Summary
8.7 Further Reading and Resources
Chapter 9: Computer Software Security
9.1 Specific Operating Systems (OSs)
9.2 Applications
9.3 Chapter Summary
9.4 Further Reading and Resources Chapter 10: Security Systems Design-Designing Network Security10.1 Introduction
10.2 Security Design for Protocol Layer 1
10.3 Layer 2-Data Link Security Mechanisms
10.4 Security Design for Protocol Layer 3
10.5 IP Packet Authorization and Access Control
10.6 Chapter Summary
10.7 Further Reading and Resources
Chapter 11: Transport and Application Security Design and Use
11.1 Layer 4-Transport Security Protocols
11.2 Layer 5-User Service Application Protocols
11.3 Chapter Summary
11.4 Further Reading and Resources
Chapter 12: Securing Management and Managing Security
๐ SIMILAR VOLUMES
Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of pr
โข Examines the impact of both accidental and malicious, intentional action and inaction โข Defines the five major components of a comprehensive and effective program โข Introduces the concept of IA integrity levels and provides a complete methodology for information security/IA throughout the life o
There are increasing opportunities to consider the application of semantic technologies for business information systems. Semantic technologies are expected to improve business processes and information systems, and lead to savings in cost and time as well as improved efficiency.Semantic Technologie