Building a global information assurance program. (2003)
- Record Type:
- Book
- Title:
- Building a global information assurance program. (2003)
- Main Title:
- Building a global information assurance program
- Further Information:
- Note: Raymond J. Curts, Douglas E. Campbell.
- Other Names:
- Curts, Raymond J
Campbell, Douglas E, 1954- - Contents:
- INTRODUCTION TO INFORMATION ASSURANCE (IA); Authentication; Confidentiality; Non-repudiation; ; BASIC CONCEPTS; Attributes; Information Attributes; Pure Information Attributes; Attributes Influenced by the System; System Attributes; Security Attributes; Information System Support Planning Principles; The Bottom Line, Revisited; Information Assurance (IA); Commercial Capabilities; Security; Network Views; Risk Management; Cognitive Hierarchy; Types of Logic; Summary; ; RISK, THREAT AND VULNERABILITY; ; OVERVIEW OF SYSTEMS ENGINEERING; A Systems Engineering Case Study; Case Study Background; The Mission; The Goal; An Approach Toward A Solution; Case Tools: A Means of Managing Architectural Information; The Current Process; Maritime Strategy; The Threat; Top Level Warfare Requirements (TLWRs); Architecture: A System Description; Assessment: How Well Does It Fulfill Requirements?; Shortfalls and Overlaps: Identifying Strengths and Weaknesses; Architectural Options: Making the Right Choices; The Proposed Process; Architecture Development; Architectural Principles; Mission Requirements Analysis; Functional Analysis; Operational Functions; System Functions; Requirements Allocation; Assessment of the Current Architecture; Identification of Shortfalls and Overlaps; Development of Architectural Options; Assessment of Options; Proposed New (Notional) Architecture; System Synthesis; The Need for Maintaining Up-to-Date Documentation; Summary; ; IA TASK FORCE; Requirements Analysis;INTRODUCTION TO INFORMATION ASSURANCE (IA); Authentication; Confidentiality; Non-repudiation; ; BASIC CONCEPTS; Attributes; Information Attributes; Pure Information Attributes; Attributes Influenced by the System; System Attributes; Security Attributes; Information System Support Planning Principles; The Bottom Line, Revisited; Information Assurance (IA); Commercial Capabilities; Security; Network Views; Risk Management; Cognitive Hierarchy; Types of Logic; Summary; ; RISK, THREAT AND VULNERABILITY; ; OVERVIEW OF SYSTEMS ENGINEERING; A Systems Engineering Case Study; Case Study Background; The Mission; The Goal; An Approach Toward A Solution; Case Tools: A Means of Managing Architectural Information; The Current Process; Maritime Strategy; The Threat; Top Level Warfare Requirements (TLWRs); Architecture: A System Description; Assessment: How Well Does It Fulfill Requirements?; Shortfalls and Overlaps: Identifying Strengths and Weaknesses; Architectural Options: Making the Right Choices; The Proposed Process; Architecture Development; Architectural Principles; Mission Requirements Analysis; Functional Analysis; Operational Functions; System Functions; Requirements Allocation; Assessment of the Current Architecture; Identification of Shortfalls and Overlaps; Development of Architectural Options; Assessment of Options; Proposed New (Notional) Architecture; System Synthesis; The Need for Maintaining Up-to-Date Documentation; Summary; ; IA TASK FORCE; Requirements Analysis; Functional Analysis; Evaluation and Decision; System Synthesis; Documentation; Concluding Chapter Remarks; ; REQUIREMENTS; Beginnings; The Object-Oriented Paradigm; Summary; ; DESIGN; Operational Design Considerations; Technology Design Considerations; Business Continuity Design Considerations; Concluding Remarks for this Chapter; ; IMPLEMENTATION AND TESTING; IATP Defined; Requirement for an IATP; Management's Role; Disruption of Service Caused by IATP Implementation; IATP Development; Critical Elements of the IATP; Preliminary Planning: Test Requirements; Test Team; Preparatory Actions: Test Methodology; Chapter Concluding Remarks; ; IA LIFE CYCLE SUPPORT AND OPERATIONAL CONSIDERATIONS; The Information Assurance Life Cycle Methodology; Concluding Remarks for This Section; ; THE INFORMATION ASSURANCE CENTER; Introduction; Overview of the Naval Aviation Safety Program; Findings; Recommendations; The National Defense Industrial Association (NDIA) IAC Concept: A Closing Note; ; AUTOMATED TOOLS; Internal Vulnerability Scanning/Auditing Tools; Patches and Replacements; Password Enhancing Tools/Authentication and System Security Tools; Password Breaking Tools; Access Control Tools; Logging Tools; Logging Utilities; Intrusion Detection Tools/Network Monitoring Tools; System Status Reporting Tools; Mail Security Tools; Packet Filtering Tools; Firewall Tools; Real-Time Attack Response Tools; Encryption Tools; Host Configuration Tools; Anti-Virus Tools; Cryptographic Checksum Tools; Miscellaneous Tools; Visualization Tools; I'm Going to Break in and Compromise Your Information; A Sampling of Software Tools that Attackers Use; ; SUMMARY; Conclusions and Recommendations; Future Work; ; ABOUT THE AUTHORS; APPENDIXES; Acronyms; Glossary; Links; References; Index … (more)
- Publisher Details:
- Boca Raton, FL : Auerbach Publications
- Publication Date:
- 2003
- Extent:
- 1 online resource (xv, 406 pages), illustrations
- Subjects:
- 005.8
Computer security
Data protection
COMPUTERS -- Internet -- Security
COMPUTERS -- Networking -- Security
COMPUTERS -- Security -- General
Computer security
Data protection
Electronic books - Languages:
- English
- ISBNs:
- 0203997557
9780203997550 - Related ISBNs:
- 0849313686
9780849313684 - Notes:
- Note: Includes bibliographical references (pages 369-385) and index.
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.167719
- Ingest File:
- 01_078.xml