Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
1 INTRODUCTION 14
1.1 The Industrial and the Information Age 14
1.2 CIA and AAA 15
1.3 Protecting against intruders 16
1.4 Users, systems and data 17
1.5 Security and Forensic Computing 19
1.6 ISO 27002 21
1.7 Risks 22
Annual Loss Expectancy 22
1.8 Risk management 24
1.9 Security policies 25
1.10 Defining the policy 26
1.11 Example risks 28
1.12 Defence-in-depth 29
1.13 Gateways and DMZ (Demilitarized Zones) 30
1.14 Layered model and security 31
1.15 Encryption and a layered approach to defence 33
Buchanan, W. J. (2011). Security and forensic computing: introduction to computer security
Publication Date | 2011 |
---|---|
Deposit Date | Jan 6, 2011 |
Publicly Available Date | Dec 31, 2011 |
Peer Reviewed | Not Peer Reviewed |
Keywords | Data security; authentication; authorization; confidentiality; assurance; integrity; network infrastructure; trojans; worms; data mining; industrial espionage; forensic computing investigation; ISO 27002; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/4043 |
Contract Date | Jan 6, 2011 |
sfc_unit01.html
(526 bytes)
Other
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
An omnidirectional approach to touch-based continuous authentication
(2023)
Journal Article
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search