Contents Page Foreword 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms 5 Structure 6 Overview 7 Internet access services for employees 7.1 Background 7.2 Security threats 7.3 Security design techniques and controls 8 Business to business services 8.1 Background 8.2 Security threats 8.3 Security design techniques and controls 9 Business to customer s…
Contents Foreword Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms 5 Structure 6 Overview 7 Security threats 9 Security controls 9.1 Overview 9.2 Stateless packet filtering 9.3 Stateful packet inspection 9.4 Application firewall 9.5 Content filtering 9.6 Intrusion prevention system and intrusion detection system 9.7 Security m…
Contents : Foreword 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Document structure 6 Overview 6.1 Introduction 6.2 Types of VPNs 7 Security Threats 8 Security Requirements 8.1 Overview 8.2 Confidentiality 8.3 Integrity 8.4 Authenticity 8.5 Authorization 8.6 Availability 8.7 Tunnel Endpoint Security 9 Security Controls 9.1 Securit…
Contents Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Structure and overview 5 Rationale 6 Characteristics 7 Types of measures 8 Processes Annex A (informative) an information security measurement model Annex B (informative) measurement construct examples Annex C (informative) an example of free-text form measurement construction Bibliography
Contents Foreword 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Document structure 6 Preparing for design of network security 6.1 Introduction 6.2 Asset identification 6.3 Requirements collection 6.3.1 Legal and regulatory requirements 6.3.2 Business requirements 6.3.3 Performance requirements 6.4 Review requirements 6.5 Review of existing designs and i…
Contents : Foreword 0 Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Context of the organization 4.1 Understanding the organization and its context 4.2 Understanding the needs and expectations of interested parties 4.3 Determining the scope of the information security management system 4.4 Information security management system 5 Leadership 5.1 Leadership…
Contents Foreword Introduction 1. Scope 2. Normative reference 3. Terms and definitions 4. Symbols and abbreviated terms 5. Structure 6. Overview 6.1 Background 6.2 Networks security planning 7. Identifying risk and preparing to identify security controls 7.1 Introduction 7.2 Information on current and/or planned networking 7.2.1 Security requirements in corporate information secu…
Brief Contents Chapter 1 Introduction to the management of information security Chapter 2 Compliance: law and ethics Chapter 3 Governance and strategic planning for security Chapter 4 Information security policy Chapter 5 Developing the security program Chapter 6 Risk management: identifying and assessing risk Chapter 7 Risk management: controlling risk Chapter 8 Security management m…
This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. Table of contents Part I Wireless Technology and Communications—Explorat…
Table of Contents Chapter 1. Introduction Chapter 2. Basic Techniques for Data Security Chapter 3. Cloud Storage Reliability Chapter 4. Secure Deduplication Chapter 5. Secure Keyword Search Chapter 6. Secure Data Provenance Chapter 7. Secure Data Time-Stamping Chapter 8. Summary and Future Research D