Skip to main content

Research Repository

Advanced Search

Security and forensic computing: introduction to computer security.

Buchanan, William J

Authors



Abstract

1 INTRODUCTION 14
1.1 The Industrial and the Information Age 14
1.2 CIA and AAA 15
1.3 Protecting against intruders 16
1.4 Users, systems and data 17
1.5 Security and Forensic Computing 19
1.6 ISO 27002 21
1.7 Risks 22
Annual Loss Expectancy 22
1.8 Risk management 24
1.9 Security policies 25
1.10 Defining the policy 26
1.11 Example risks 28
1.12 Defence-in-depth 29
1.13 Gateways and DMZ (Demilitarized Zones) 30
1.14 Layered model and security 31
1.15 Encryption and a layered approach to defence 33

Publication Date 2011
Deposit Date Jan 6, 2011
Publicly Available Date Dec 31, 2011
Peer Reviewed Not Peer Reviewed
Keywords Data security; authentication; authorization; confidentiality; assurance; integrity; network infrastructure; trojans; worms; data mining; industrial espionage; forensic computing investigation; ISO 27002;
Public URL http://researchrepository.napier.ac.uk/id/eprint/4043
Contract Date Jan 6, 2011