Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay -- figuratively and literally -- when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machin…
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference, SecureComm 2009, held in September 2009 in Athens, Greece. The 19 revised full papers and 7 revised short papers were carefully reviewed and selected from 76 submissions. The papers cover various topics such as wireless network security, network intrusion detection, security and p…
Contents Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Structure of this document 5 Background 6 Overview of the information security risk management process 7 Context establishment 8 Information security risk management 9 Information security risk treatment 10 Information security risk acceptance 11 Information security risk communication and consultati…
Contents Page Foreword Introduction 1 Scope 2 Normative references 3 Terms anda definitions 4 Information security management systems 4.1 General 4.2 What is an ISMS? 4.3 Process approach 4.4 Why an ISMS is important 4.5 Establishing, monitoring, maintaining and improving an ISMS 4.6 ISMS critical success factors 4.7 benefits of the ISMS family of standards 5. ISMS family of …
Contents: Foreword Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms 5 Structure 6 Overview 7 Security threats 7.1 General 7.2 Unauthorized access 7.3 Packet sniffing 7.4 Rogue wireless access point 7.5 Denial of service attack 7.6 Bluejacking 7.7 Bluesnarfing 7.8 Adhoc networks 7.9 Other threats 8 Security requirements 8…
Contents Page Foreword 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms 5 Structure 6 Overview 7 Internet access services for employees 7.1 Background 7.2 Security threats 7.3 Security design techniques and controls 8 Business to business services 8.1 Background 8.2 Security threats 8.3 Security design techniques and controls 9 Business to customer s…
Contents Foreword Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms 5 Structure 6 Overview 7 Security threats 9 Security controls 9.1 Overview 9.2 Stateless packet filtering 9.3 Stateful packet inspection 9.4 Application firewall 9.5 Content filtering 9.6 Intrusion prevention system and intrusion detection system 9.7 Security m…
Contents : Foreword 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Document structure 6 Overview 6.1 Introduction 6.2 Types of VPNs 7 Security Threats 8 Security Requirements 8.1 Overview 8.2 Confidentiality 8.3 Integrity 8.4 Authenticity 8.5 Authorization 8.6 Availability 8.7 Tunnel Endpoint Security 9 Security Controls 9.1 Securit…
Contents Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Structure and overview 5 Rationale 6 Characteristics 7 Types of measures 8 Processes Annex A (informative) an information security measurement model Annex B (informative) measurement construct examples Annex C (informative) an example of free-text form measurement construction Bibliography
Contents Foreword 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Document structure 6 Preparing for design of network security 6.1 Introduction 6.2 Asset identification 6.3 Requirements collection 6.3.1 Legal and regulatory requirements 6.3.2 Business requirements 6.3.3 Performance requirements 6.4 Review requirements 6.5 Review of existing designs and i…