全部版块 我的主页
论坛 新商科论坛 四区(原工商管理论坛) 商学院 管理信息系统
2813 3
2013-04-24
2006
Managing Information Systems Security and PrivacyAuthors:
ISBN: 978-3-540-28103-0 (Print) 978-3-540-28104-7  (Online)

Managing Information Systems Security and Privacy

Trcek, Denis

2006, XIV, 236 p.

ISBN 978-3-540-28104-7

  Immediately available per PDF-download (no DRM, watermarked)


About this book
The book deals with the management of information systems security and privacy, based on a model that covers technological, organizational and legal views. This is the basis for a focused and methodologically structured approach that presents "the big picture" of information systems security and privacy, while targeting managers and technical profiles. The book addresses principles in the background, regardless of a particular technology or organization. It enables a reader to suit these principles to an organization's needs and to implement them accordingly by using explicit procedures from the book. Additionally, the content is aligned with relevant standards and the latest trends. Scientists from social and technical sciences are supposed to find a framework for further research in this broad area, characterized by a complex interplay between human factors and technical issues.

ISBN: 3540281037
TITLE: Managing Information
AUTHOR: Trcek
TOC:

1 Introduction - The Scope of the Work and its Methodology 1
1.1 Defining Security and Privacy 2
1.2 The Importance of Standards 4
1.3 Technological Issues 7
1.4 Organization and the Human Factor 8
1.5 Legal Frameworks 9
1.6 Before Proceeding Further 10
2 Organization, Security and Privacy 13
2.1 Recent History of the Field 13
2.2 Frameworks Level 15
2.2.1 Assets 17
2.2.2 Threats 17
2.2.3 Vulnerabilities 18
2.2.4 Risks and Impacts 18
2.2.5 Safeguards and Residual Risk 18
2.2.6 The Concept of Security Management Processes 19
2.3 Techniques for ISs Security Management 19
2.3.1 Security Objectives and Strategies 20
2.3.2 Security Related Organizational Issues 21
2.3.3 Risk Analysis 21
2.3.4 Safeguards Selection, Security Policy Definition and its Realization 26
2.3.5 Supervision and Incident Handling 27
2.4 Particular Implementations Level 27
2.4.1 General Hints for Selection of Safeguards 28
2.4.2 Organizational Safeguards 29
2.4.3 Personnel Security 29
2.4.4 Physical and Environmental Security 30
2.4.5 Access Control, Communications and Operations Security 31
2.4.6 ISs Development, Maintenance, and Monitoring 33
2.4.7 Incident Handling 36
2.4.8 Business Continuity Planning 36
2.4.9 Compliance and Auditing 37
2.4.10 Security Awareness 38
2.5 Standardized Safeguard Templates 39
2.5.1 Organizational Safeguard Templates 39
2.5.2 Technology Compliance Safeguards 39
3 Security Technology: Concepts and Models 43
3.1 Security Mechanisms 44
3.1.1 Pseudorandom Number Generators 44
3.1.2 One-way Hash Functions 45
3.1.3 Symmetric Algorithms 47
3.1.4 Asymmetric Algorithms 51
3.1.5 Steganography and Watermarking 54
3.2 Cryptographic Protocols 56
3.2.1 A Brief Overview of Computer Communications 57
3.2.2 Security Services 59
3.2.3 Models of Security Services 59
3.2.4 The Relationships Between Security Services 64
3.3 Key Management 66
3.3.1 Key Generation 66
3.3.2 Key Distribution 66
3.3.3 Complementary Key Management Activities 68
3.4 Security Infrastructure 69
3.4.1 Public Key Infrastructure 69
3.4.2 Authentication and Authorization Infrastructure 75
3.4.3 Network Layer Security - IPSec 78
3.4.4 Secure Sockets Layer and Transport Layer Security 91
3.4.5 Secure/Multipurpose Internet Mail Extensions 95
3.4.6 One-time Password Systems .100
3.4.7 Firewalls 101
3.4.8 Intrusion Detection Systems 105
3.4.9 Extensible Markup Language Security 107
3.4.10 Smart cards .115
3.4.11 Biometrics Based Technology 117
3.5 Security Services as the Basis for e-Business Processes 120
3.5.1 Electronic Payment Systems 120
3.5.2 Web Services .122
3.6 Privacy Enabling Technologies 131
3.7 A Different Paradigm - Wireless Networking 133
4 Legal Aspects of ISs Security and Privacy 137
4.1 Cryptography in General 137
4.2 Digital Signatures .140
4.3 Privacy Issues 141
4.3.1 Privacy and Electronic Communications 143
4.3.2 Workplace Privacy 144
4.3.3 Spamming 145
4.3.4 Electronic Tracking Technologies 146
4.3.5 Identity Theft 146
4.4 ISs and Software Liability 146
4.5 Intellectual Property Rights 148
4.6 Computer Forensics 149
5 Where Are We Headed? 151
6 Appendix 155
6.1 Brief Mathematical Preliminaries 156
6.1.1 Information Theory 156
6.1.2 Complexity Theory 161
6.1.3 Abstract Algebra. 162
6.1.4 Number Theory. 163
6.1.5 Computing Inverses and Exponentiation in Z_n 167
6.1.6 Computational Complexities in Z_n 168
6.2 Cryptographic Primitives 169
6.2.1 One-way Hash Functions 169
6.2.2 Pseudorandom Number Generators 174
6.2.3 Triple DES 175
6.2.4 RSA Algorithm 183
6.2.5 Diffie-Hellman Key Agreement 184
6.3 Formal Methods 185
6.3.1 Overview of Formal Methods 185
6.3.2 Introduction to Logic BAN 186
6.3.3 Language Z Overview 193
6.3.4 Emerging Formal Methods 198
6.4 Socio-Technical Systems Modeling and Simulation 198
6.4.1 Business Dynamics 199
6.4.2 Agent Technologies 205
Further Reading 209
Listing of the Simulation Model 211
References 213
END


Managing Information Systems Security and Privacy.pdf
大小:(8.33 MB)

只需: 4 个论坛币  马上下载







二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

全部回复
2013-9-19 08:20:07
管理信息系统的安全与保密
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

2013-9-19 08:20:48
这本书论述的管理信息系统的安全性和隐私,基于一个模型,它包括技术,组织和法律意见。这是一个重点的结构和方法论的方法,提出了“大画面”的信息系统的安全和隐私,而针对管理人员和技术配置的基础。本书涉及原则的背景下,无论某一特定技术或组织。它使读者能够满足这些原则的组织的需求,并实施相应的使用明确的程序从书中。此外,内容的对齐与相关标准的最新发展趋势。在这个广阔的区域,人为因素和技术问题之间复杂的相互作用特点,从社会科学和技术科学的科学家们都应该找到一个框架,为进一步研究。
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

2014-1-29 14:41:25
Thank you very much
downloaded
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

相关推荐
栏目导航
热门文章
推荐文章

说点什么

分享

扫码加好友,拉您进群
各岗位、行业、专业交流群