Information Assurance: Dependability and Security in Networked SystemsIn today’s fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA).
|
Other editions - View all
Information Assurance: Dependability and Security in Networked Systems Yi Qian No preview available - 2008 |
Common terms and phrases
access control access control list action alert correlation algorithm analysis applications approach architecture attack graph authentication behavior buffer overflow channels chapter communication components Computer Security computer system confidentiality consider crosstalk crosstalk attack cryptographic defined denote dependability and security domain encryption environment error evaluation example exploit failure fault reasoning fault tolerance firewall framework function goal Hamiltonian cycles HiFIND host IEEE implementation infrastructure integrity interaction Internet intrusion detection layer LICQ link-state link-state routing protocol malicious mechanisms model checking monitor node monitor-segment multiple p-cycle packet path performance probability problem Proceedings protection protocols redundancy Reliability resilience response result router routing scenario graphs scheme Section security and dependability security attacks sensor nodes server specific stochastic stochastic game strategies symptoms SYN flooding techniques Technology tion traffic transition types vulnerabilities wireless networks XACML