A practical guide to security engineering and information assurance:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | Undetermined |
Veröffentlicht: |
Boca Raton, Fla. [u.a.]
CRC Press
2002
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XIII, 393 S. Ill. 26 cm |
ISBN: | 0849311632 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV023694850 | ||
003 | DE-604 | ||
005 | 20040213000000.0 | ||
007 | t | ||
008 | 030310s2002 xxua||| |||| 00||| und d | ||
020 | |a 0849311632 |c pbk. : EUR 78.26 |9 0-8493-1163-2 | ||
035 | |a (OCoLC)834349501 | ||
035 | |a (DE-599)BVBBV023694850 | ||
040 | |a DE-604 |b ger | ||
041 | |a und | ||
044 | |a xxu |c US | ||
049 | |a DE-522 | ||
050 | 0 | |a QA76.9.A25H47 2002 | |
082 | 0 | |a 005.8 21 | |
100 | 1 | |a Herrmann, Debra S. |e Verfasser |4 aut | |
245 | 1 | 0 | |a A practical guide to security engineering and information assurance |c Debra S. Herrmann |
246 | 1 | 3 | |a Security engineering and information assurance |
264 | 1 | |a Boca Raton, Fla. [u.a.] |b CRC Press |c 2002 | |
300 | |a XIII, 393 S. |b Ill. |c 26 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
600 | 1 | 4 | |a Computer security |
600 | 1 | 4 | |a Data protection |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 2 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017195414&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017195414 |
Datensatz im Suchindex
_version_ | 1804138720601833472 |
---|---|
adam_text | Titel: A practical guide to security engineering and information assurance
Autor: Herrmann, Debra S
Jahr: 2002
Contents
1 Introduction..............................................................................................................1
1.1 Background...........................................................................................................1
1.2 Purpose.................................................................................................................2
1.3 Scope....................................................................................................................3
1.4 Intended Audience................................................................................................3
1.5 Organization.........................................................................................................5
2 What Is Information Assurance, How Does It Relate To
Information Security, and Why Are Both Needed?....................................7
2.1 Definition..............................................................................................................7
2.2 Application Domains..........................................................................................10
2.3 Technology Domains..........................................................................................11
2.4 Importance.........................................................................................................13
2.5 Stakeholders........................................................................................................15
2.6 Summary.............................................................................................................26
2.7 Discussion Problems...........................................................................................26
3 Historical Approaches To Information Security and
Information Assurance........................................................................................27
3-1 Physical Security.................................................................................................28
3.2 Communications Security (COMSEC)................................................................31
3.3 Computer Security (COMPUSEC).......................................................................37
3.4 Information Security (INFOSEC)........................................................................45
3.5 Operations Security (OPSEC).............................................................................53
3.6 System Safety ....................................................................................................
3.7 System Reliability...............................................................................................
3-8 Summary..........................................................................................................................................................................................^2
3 9 Discussion Problems........................................................................................................................................................55
4 Define the System Boundaries ..................................................................... 67
4.1 Determine What is Being Protected and Why...................................................68
4.2 Identify the System............................................................................................^
4.3 Characterize System Operation........................................................................................................72
4.4 Ascertain What One Does and Does Not Have Control Over...........................78
4.5 Summary..................................................................................................................................
viii
Contents ix
4.6 Discussion Problems...........................................................................................82
5 Perform Vulnerability and Threat Analyses................................................83
5.1 Definitions...........................................................................................................83
5.2 Select/Use IA Analysis Techniques......................................................................86
5.3 Identify Vulnerabilities,Their Type, Source, and Severity...................................93
5.4 Identity Threats, Their Type, Source, and Likelihood........................................102
5.5 Evaluate Transaction Paths, Critical Threat Zones, and Risk Exposure............107
5.6 Summary...........................................................................................................123
5.7 Discussion Problems.........................................................................................125
6 Implement Threat Control Measures...........................................................127
6.1 Determine How Much Protection Is Needed..................................................129
6.2 Evaluate Controllability, Operational Procedures, and In-Service Considerations.... 136
6.3 Contingency Planning and Disaster Recovery.................................................140
6.4 Perception Management...................................................................................144
6.5 Select/Implement IA Design Features and Techniques....................................145
6.6 Summary...........................................................................................................199
6.7 Discussion Problems.........................................................................................205
7 Verify Effectiveness of Threat Control Measures....................................207
7.1 Select/Employ LA Verification Techniques........................................................208
7.2 Determine Residual Risk Exposure..................................................................214
7.3 Monitor Ongoing Risk Exposure, Responses, and Survivability.......................225
7.4 Summary...........................................................................................................226
7.5 Discussion Problems.........................................................................................228
8 Conduct Accident/Incident Investigations.................................................229
8.1 Analyze Cause, Extent, and Consequences of Failure/Compromise................231
8.2 Initiate Short-Term Recovery Mechanisms.......................................................254
8.3 Report Accident/Incident.................................................................................257
8.4 Deploy Long-Term Remedial Measures............................................................260
8.5 Evaluate Legal Issues........................................................................................264
8.6 Summary...........................................................................................................268
8.7 Discussion Problems.........................................................................................272
Annex A Glossary of Terms......................................................................................275
Annex B Glossary of Techniques............................................................................295
B. 1 IA Analysis Techniques......................................................................................296
B.2 IA Design Techniques/Features........................................................................313
B.3 IA Verification Techniques................................................................................333
B.4 IA Accident/Incident Investigation Techniques................................................348
Annex C Additional Resources................................................................................353
C.l Standards...........................................................................................................353
C.2 Publications.......................................................................................................362
C.3 Online Resources..............................................................................................371
Annex D Summary of Components, Activities, and Tasks
of an Effective Information Security/IA Program........................373
Index....................................................................................................................................379
|
any_adam_object | 1 |
author | Herrmann, Debra S. |
author_facet | Herrmann, Debra S. |
author_role | aut |
author_sort | Herrmann, Debra S. |
author_variant | d s h ds dsh |
building | Verbundindex |
bvnumber | BV023694850 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25H47 2002 |
callnumber-search | QA76.9.A25H47 2002 |
callnumber-sort | QA 276.9 A25 H47 42002 |
callnumber-subject | QA - Mathematics |
ctrlnum | (OCoLC)834349501 (DE-599)BVBBV023694850 |
dewey-full | 005.821 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 21 |
dewey-search | 005.8 21 |
dewey-sort | 15.8 221 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01652nam a2200445zc 4500</leader><controlfield tag="001">BV023694850</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20040213000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">030310s2002 xxua||| |||| 00||| und d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0849311632</subfield><subfield code="c">pbk. : EUR 78.26</subfield><subfield code="9">0-8493-1163-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)834349501</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023694850</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">und</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-522</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25H47 2002</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8 21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Herrmann, Debra S.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A practical guide to security engineering and information assurance</subfield><subfield code="c">Debra S. Herrmann</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Security engineering and information assurance</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, Fla. [u.a.]</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 393 S.</subfield><subfield code="b">Ill.</subfield><subfield code="c">26 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="600" ind1="1" ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="600" ind1="1" ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017195414&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017195414</subfield></datafield></record></collection> |
id | DE-604.BV023694850 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:32:41Z |
institution | BVB |
isbn | 0849311632 |
language | Undetermined |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017195414 |
oclc_num | 834349501 |
open_access_boolean | |
owner | DE-522 |
owner_facet | DE-522 |
physical | XIII, 393 S. Ill. 26 cm |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | CRC Press |
record_format | marc |
spelling | Herrmann, Debra S. Verfasser aut A practical guide to security engineering and information assurance Debra S. Herrmann Security engineering and information assurance Boca Raton, Fla. [u.a.] CRC Press 2002 XIII, 393 S. Ill. 26 cm txt rdacontent n rdamedia nc rdacarrier Computer security Data protection Datensicherung (DE-588)4011144-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s DE-604 Datensicherung (DE-588)4011144-1 s Datenschutz (DE-588)4011134-9 s HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017195414&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Herrmann, Debra S. A practical guide to security engineering and information assurance Computer security Data protection Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd Datenschutz (DE-588)4011134-9 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4274324-2 (DE-588)4011134-9 |
title | A practical guide to security engineering and information assurance |
title_alt | Security engineering and information assurance |
title_auth | A practical guide to security engineering and information assurance |
title_exact_search | A practical guide to security engineering and information assurance |
title_full | A practical guide to security engineering and information assurance Debra S. Herrmann |
title_fullStr | A practical guide to security engineering and information assurance Debra S. Herrmann |
title_full_unstemmed | A practical guide to security engineering and information assurance Debra S. Herrmann |
title_short | A practical guide to security engineering and information assurance |
title_sort | a practical guide to security engineering and information assurance |
topic | Computer security Data protection Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd Datenschutz (DE-588)4011134-9 gnd |
topic_facet | Computer security Data protection Datensicherung Computersicherheit Datenschutz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017195414&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT herrmanndebras apracticalguidetosecurityengineeringandinformationassurance AT herrmanndebras securityengineeringandinformationassurance |