Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
Security and forensic computing: introduction to computer security.
Buchanan, William J
Authors
Abstract
1 INTRODUCTION 14
1.1 The Industrial and the Information Age 14
1.2 CIA and AAA 15
1.3 Protecting against intruders 16
1.4 Users, systems and data 17
1.5 Security and Forensic Computing 19
1.6 ISO 27002 21
1.7 Risks 22
Annual Loss Expectancy 22
1.8 Risk management 24
1.9 Security policies 25
1.10 Defining the policy 26
1.11 Example risks 28
1.12 Defence-in-depth 29
1.13 Gateways and DMZ (Demilitarized Zones) 30
1.14 Layered model and security 31
1.15 Encryption and a layered approach to defence 33
Publication Date | 2011 |
---|---|
Deposit Date | Jan 6, 2011 |
Publicly Available Date | Dec 31, 2011 |
Peer Reviewed | Not Peer Reviewed |
Keywords | Data security; authentication; authorization; confidentiality; assurance; integrity; network infrastructure; trojans; worms; data mining; industrial espionage; forensic computing investigation; ISO 27002; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/4043 |
Contract Date | Jan 6, 2011 |
Files
sfc_unit01.html
(526 bytes)
Other
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
You might also like
Password Pattern and Vulnerability Analysis for Web and Mobile Applications
(2016)
Journal Article
Approaches to the classification of high entropy file fragments.
(2013)
Journal Article
Plugging the Gaps
(2012)
Journal Article
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search