engineering information security the application of systems engineering concepts to achieve information assurance

728 2K 0
engineering information security the application of systems engineering concepts to achieve information assurance

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... changing our information dependent society, along with exploring the concepts of systems engineering and the value these concepts provide to the development of new products and services along with the maintenance and evolution to existing products and services Chapter 3 reviews fundamental security concepts of subjects, objects, security services, and the role of cryptography in information security Chapter... increased security makes the system clumsier and less fun to use; just think of the current airport security checks and contrast them to the happy (and now so distant) pre–September 11, 2001 memories of buying your ticket right before boarding the plane Nonetheless, systems must work, and they must be secure; thus there is a fine balance to maintain between the level of security on one side and the efficiency... and the efficiency and usability of the system on the other One can argue that there are three key attributes of information systems: 1 Processing capacity—speed 2 Convenience—user friendliness 3 Secure—reliable operation The process of securing these systems is finding an acceptable balance of these attributes 1.2 THE SUBJECT OF SECURITY Security is a word used to refer to many things, so its use has... needs to remember that the term information security is generally used to refer to concepts, mechanisms, activities, and objectives that span all of the security areas mentioned above Regardless of what security area/branch is under discussion, the following three views of security measures can be applied to any situation: defense, deterrence, and detection These are known as the three Ds of security. .. limited to, computer /information sciences /engineering systems engineering, technology management, and public safety The book also is written for professionals in the sciences, engineering, communications, and other fields that rely on reliable and trustable information processing and communications systems and infrastructures The subject of information security (information assurance, computer security, ... systems engineering xxiii PREFACE AND ACKNOWLEDGMENTS xxiv approach to information security, this book will assist security practitioners to cope with these rapid changes Achieving information security is not a matter of dealing with specific technologies, rather information security is a process of managing technologies to ensure that information is only accessible to valid users ORGANIZATION The coverage... nonprofit organization with the purpose of educating and certifying information security professionals (ISC)2 certifications are based on a compendium of information security topics called the “common body of knowledge” (CBK) The CBK is the critical body of knowledge that serves as a common framework of security concepts, definitions, and principles that foster understanding of best practices among those... Physical security Security architecture and models Telecommunications and network security Confidentiality, integrity, and availability (CIA) are the core tenets of information security and are widespread over all the domains of the Common Body of Knowledge Confidentiality is the measure of the secrecy of information An organization determines how data are to be used and assigns a confidentiality level to that... place to the other, it ensures that the data were not observed by those who are not entitled to know about those contents Integrity ensures that the information is accurate and reliable If transmitted from one place to the other, it ensures that the data were not tampered with Availability deals with the ability of users to access the information It is commonly achieved through access control systems, ... PREFACE AND ACKNOWLEDGMENTS APPROACH This book focuses on information security (information assurance) from the viewpoint of how to control access to information in a systematic manner Many books on security primarily cover specific security mechanisms such as authentication protocols, encryption algorithms, and security related protocols Other books on security are use case oriented, providing specific contexts . Kartalopoulos Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance Stuart Jacobs ENGINEERING INFORMATION SECURITY The Application of Systems Engineering. 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright. of systems engineering concepts to achieve information assurance / Stuart Jacobs. p. cm. ISBN 978-0-470-56512-4 (hardback) 1. Computer security. 2. Computer networks Security measures. 3. Information

Ngày đăng: 30/05/2014, 23:49

Từ khóa liên quan

Mục lục

  • ENGINEERING INFORMATION SECURITY: The Application of Systems Engineering Concepts to Achieve Information Assurance

    • CONTENTS

    • PREFACE AND ACKNOWLEDGMENTS

    • 1 WHAT IS SECURITY?

      • 1.1 INTRODUCTION

      • 1.2 THE SUBJECT OF SECURITY

        • 1.2.1 Branches of Security

        • 1.2.2 Defining Security by Function

          • 1.2.2.1 Risk Avoidance

          • 1.2.2.2 Deterrence

          • 1.2.2.3 Prevention

          • 1.2.2.4 Detection

          • 1.2.2.5 Recovery

          • 1.2.3 The Common Body of Knowledge (CBK) Security Domains

            • 1.2.3.1 Access Control Systems and Methodology

            • 1.2.3.2 Application and Systems Development Security

            • 1.2.3.3 Business Continuity Planning and Disaster Recovery Planning

            • 1.2.3.4 Cryptography

            • 1.2.3.5 Information Security and Risk Management

            • 1.2.3.6 Legal, Regulations, Compliance, and Investigations

            • 1.2.3.7 Operations Security

            • 1.2.3.8 Physical Security

            • 1.2.3.9 Security Architecture and Models

            • 1.2.3.10 Telecommunications and Network Security

            • 1.2.3.11 CBK Summary

Tài liệu cùng người dùng

Tài liệu liên quan