Information SecurityJoe E. Ettinger |
Contents
Key issues in information security | 1 |
An overview of leading security issues | 11 |
Computer security policies personnel security | 21 |
Copyright | |
12 other sections not shown
Other editions - View all
Common terms and phrases
access control algorithm Alice anti-virus software application architecture assets assurance attack audit authentication Basic Key block cypher bootstrap sector CESG checksumming communications computer security computer systems computer viruses confidentiality CRAMM cypher text damage decrypted distributed systems DSS TDP ECMA electronic encryption end systems equipment evaluation example executed floppy disk hacking identified implementation infected information security initialisation vector installation integrity Issue Point Issue-Id key distribution key management key stream Layer methodology offence one-way function Open Systems Interconnection operating system organisation password personnel security physical plain text procedures protection protocol public key requirements Risk Analysis secret key Secure System security certificate security countermeasures security management security measures security policy security services server SESAME specific staff Stage standards stream cypher system security target TNIU Trusted Functions unauthorised virus workstation