Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 728 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
728
Dung lượng
11,85 MB
Nội dung
[...]... changing our information dependent society, along with exploring theconceptsofsystemsengineering and the value these concepts provide tothe development of new products and services along with the maintenance and evolution to existing products and services Chapter 3 reviews fundamental securityconceptsof subjects, objects, security services, and the role of cryptography in informationsecurity Chapter... increased security makes the system clumsier and less fun to use; just think of the current airport security checks and contrast them tothe happy (and now so distant) pre–September 11, 2001 memories of buying your ticket right before boarding the plane Nonetheless, systems must work, and they must be secure; thus there is a fine balance to maintain between the level ofsecurity on one side and the efficiency... and the efficiency and usability of the system on the other One can argue that there are three key attributes ofinformation systems: 1 Processing capacity—speed 2 Convenience—user friendliness 3 Secure—reliable operation The process of securing these systems is finding an acceptable balance of these attributes 1.2 THE SUBJECT OFSECURITYSecurity is a word used to refer to many things, so its use has... needs to remember that the term informationsecurity is generally used to refer to concepts, mechanisms, activities, and objectives that span all of the security areas mentioned above Regardless of what security area/branch is under discussion, the following three views ofsecurity measures can be applied to any situation: defense, deterrence, and detection These are known as the three Ds of security. .. limited to, computer /information sciences /engineering systems engineering, technology management, and public safety The book also is written for professionals in the sciences, engineering, communications, and other fields that rely on reliable and trustable information processing and communications systems and infrastructures The subject ofinformationsecurity (information assurance, computer security, ... systemsengineering xxiii PREFACE AND ACKNOWLEDGMENTS xxiv approach toinformation security, this book will assist security practitioners to cope with these rapid changes Achieving informationsecurity is not a matter of dealing with specific technologies, rather informationsecurity is a process of managing technologies to ensure that information is only accessible to valid users ORGANIZATION The coverage... nonprofit organization with the purpose of educating and certifying informationsecurity professionals (ISC)2 certifications are based on a compendium ofinformationsecurity topics called the “common body of knowledge” (CBK) The CBK is the critical body of knowledge that serves as a common framework ofsecurity concepts, definitions, and principles that foster understanding of best practices among those... Physical securitySecurity architecture and models Telecommunications and network security Confidentiality, integrity, and availability (CIA) are the core tenets ofinformationsecurity and are widespread over all the domains of the Common Body of Knowledge Confidentiality is the measure of the secrecy ofinformation An organization determines how data are to be used and assigns a confidentiality level to that... place tothe other, it ensures that the data were not observed by those who are not entitled to know about those contents Integrity ensures that theinformation is accurate and reliable If transmitted from one place tothe other, it ensures that the data were not tampered with Availability deals with the ability of users to access theinformation It is commonly achieved through access control systems, ... PREFACE AND ACKNOWLEDGMENTS APPROACH This book focuses on informationsecurity (information assurance) from the viewpoint of how to control access toinformation in a systematic manner Many books on security primarily cover specific security mechanisms such as authentication protocols, encryption algorithms, and security related protocols Other books on security are use case oriented, providing specific contexts . Kartalopoulos Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance Stuart Jacobs ENGINEERING INFORMATION SECURITY The Application of Systems Engineering. 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright. of systems engineering concepts to achieve information assurance / Stuart Jacobs. p. cm. ISBN 978-0-470-56512-4 (hardback) 1. Computer security. 2. Computer networks Security measures. 3. Information