Information Security Management Handbook, 6th ed.最新文献

筛选
英文 中文
Wireless Penetration Testing 无线渗透测试
Information Security Management Handbook, 6th ed. Pub Date : 2007-05-14 DOI: 10.1201/9781439833032.ch164
Christopher A. Pilewski
{"title":"Wireless Penetration Testing","authors":"Christopher A. Pilewski","doi":"10.1201/9781439833032.ch164","DOIUrl":"https://doi.org/10.1201/9781439833032.ch164","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114227050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
End Node Security and Network Access Management 结束节点安全与网络接入管理
Information Security Management Handbook, 6th ed. Pub Date : 2007-05-14 DOI: 10.1201/9781439833032.ch65
Franjo Majstor
{"title":"End Node Security and Network Access Management","authors":"Franjo Majstor","doi":"10.1201/9781439833032.ch65","DOIUrl":"https://doi.org/10.1201/9781439833032.ch65","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124855540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application Service Provider Security 应用程序服务提供商安全性
Information Security Management Handbook, 6th ed. Pub Date : 2007-05-14 DOI: 10.1201/9781439833032.ch170
S. Fried
{"title":"Application Service Provider Security","authors":"S. Fried","doi":"10.1201/9781439833032.ch170","DOIUrl":"https://doi.org/10.1201/9781439833032.ch170","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133961608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Types of Information Security Controls 信息安全控制的类型
Information Security Management Handbook, 6th ed. Pub Date : 2007-05-14 DOI: 10.1201/9781439833032.ch102
Harold F. Tipton
{"title":"Types of Information Security Controls","authors":"Harold F. Tipton","doi":"10.1201/9781439833032.ch102","DOIUrl":"https://doi.org/10.1201/9781439833032.ch102","url":null,"abstract":"edom from danger or as the condition of safety. Computer security, a in a system against unauthorized disclosure, modification, or e specifically, is the protection of dat destruction and protection of the computer system itself against unauthorized use, modification, or denial of service. Because certain computer security controls inhibit productivity, security is typically a compromise toward which security practitioners, system users, and system operations and administrative personnel work to achieve a satisfactory balance between security and productivity. Controls for providing information security can be physical, technical, or administrative. These three categories of controls can be further classified as either preventive or detective. Preventive controls attempt to avoid the occurrence of unwanted events, whereas detective controls attempt to identify unwanted events after they have occurred. Preventive controls inhibit the free use of computing resources and therefore can be applied only to the degree that the users are willing to accept. Effective security awareness programs can help increase users’ level of tolerance for preventive controls by helping them understand how such controls enable them to trust their computing systems. Common detective controls include audit trails, intrusion detection methods, and checksums. Three other types of controls supplement preventive and detective controls. They are usually described as deterrent, corrective, and recovery. Deterrent controls are intended to discourage individuals from intentionally violating information security policies or procedures. These usually take the form of constraints that make it difficult or undesirable to perform unauthorized activities or threats of consequences that influence a potential intruder to not violate security (e.g., threats ranging from embarrassment to severe punishment). Corrective controls either remedy the circumstances that allowed the unauthorized activity or return conditions to what they were before the violation. Execution of corrective controls could result in changes to existing physical, technical, and administrative controls. Recovery controls restore lost computing resources or capabilities and help the organization recover monetary losses caused by a security violation. Deterrent, corrective, and recovery controls are considered to be special cases within the major categories of physical, technical, and administrative controls; they do not clearly belong in either","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131164265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security Considerations in Distributed Computing 分布式计算中的安全考虑
Information Security Management Handbook, 6th ed. Pub Date : 2007-05-14 DOI: 10.1201/9781439833032.ch194
S. Hamidi
{"title":"Security Considerations in Distributed Computing","authors":"S. Hamidi","doi":"10.1201/9781439833032.ch194","DOIUrl":"https://doi.org/10.1201/9781439833032.ch194","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131067953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Engineering 社会工程
Information Security Management Handbook, 6th ed. Pub Date : 2007-05-14 DOI: 10.1201/9781439833032.ch219
M. Rogers
{"title":"Social Engineering","authors":"M. Rogers","doi":"10.1201/9781439833032.ch219","DOIUrl":"https://doi.org/10.1201/9781439833032.ch219","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122537661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Patch Management 101 补丁管理101
Information Security Management Handbook, 6th ed. Pub Date : 2007-05-14 DOI: 10.1201/9781439833032.ch16
Lynda L. McGhie
{"title":"Patch Management 101","authors":"Lynda L. McGhie","doi":"10.1201/9781439833032.ch16","DOIUrl":"https://doi.org/10.1201/9781439833032.ch16","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131618756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application Layer 应用程序层
Information Security Management Handbook, 6th ed. Pub Date : 2007-05-14 DOI: 10.1201/9781439833032.ch153
Keith Pasley
{"title":"Application Layer","authors":"Keith Pasley","doi":"10.1201/9781439833032.ch153","DOIUrl":"https://doi.org/10.1201/9781439833032.ch153","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115470420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Enforcing Security Policy 实施安全策略
Information Security Management Handbook, 6th ed. Pub Date : 2007-05-14 DOI: 10.1201/9781439833032.ch32
J. Wylder
{"title":"Toward Enforcing Security Policy","authors":"J. Wylder","doi":"10.1201/9781439833032.ch32","DOIUrl":"https://doi.org/10.1201/9781439833032.ch32","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133135780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
When Trust Goes Beyond the Border 当信任超越国界
Information Security Management Handbook, 6th ed. Pub Date : 2007-05-14 DOI: 10.1201/9781439833032.ch50
S. Fried
{"title":"When Trust Goes Beyond the Border","authors":"S. Fried","doi":"10.1201/9781439833032.ch50","DOIUrl":"https://doi.org/10.1201/9781439833032.ch50","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"48 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114131932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信