The Information Security Dictionary: Defining the Terms That Define Security for E-Business, Internet, Information, and Wireless TechnologySomething for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an essential addition to an information security library. As such it should also serve the purpose of being a quick refresher for terms the reader has not seen since the days when one attended a computing science program, information security course or workshop. As a reference work, THE INFORMATION SECURITY DICTIONARY provides a relatively complete and easy-to-read explanation of common se- rity, malware, vulnerability and infrastructure protection terms, without causing much damage to the usually slim student pocketbook. This dictionary can help non-specialistreaders better understand the infor- tion security issues encountered in their work or studying for their certification examination or whilst doing a practical assignment as part of a workshop. This book is also essential to a reference collection for an organization’s system personnel. Special attention is paid to terms which most often prevent educated readers from understanding journal articles and books in cryptology, computing science, and information systems, in addition to applied fields that build on those disciplines, such as system design, security auditing, vulnera- lity testing, and role-based access management. The dictionary provides defi- tions that enable readers to get through a difficult article or passage. We do not, for the most part, directly explain how to conduct research or how to implement the terms briefly described. |
Contents
viii | 46 |
Appendix 4 | 79 |
Q 261262 R 263281 | 128 |
137138 | 150 |
K 190192 | 190 |
S 282318 | 282 |
W 360373 | 360 |
Critical Infrastructure Protection CIP | 376 |
Appendix 5 | 396 |
Security and Utility Tools | 403 |
Other editions - View all
The Information Security Dictionary: Defining the Terms That Define Security ... Urs E. Gattiker No preview available - 2004 |
Common terms and phrases
activities algorithm and/or anti-virus software applications attack Audit Authentication behavior Blaster worm broadband communication computer virus Confidentiality cont costs cryptographic CSIRT damage Darknet database defined Denial of Service Description Digital Signature Digital Subscriber Line disk document domain EICAR Electronic employees encryption exploit files Filtering firewall firm Forensics hacker hardware Hence home users host Incident individual infected Information Security information system installed instance Integrity Intrusion Detection issues machine malicious code Malware means Microsoft operating system organization outlines packets password Patch port Privacy problem Protocol requires result Risk scanning Security Engineer Security Policy server Spam specific standard Table 16A target term testing Threat traffic Trojan Trojan Horse unauthorized Unix update VDSL vendor virus viruses Vulnerability web server whereby Wi-Fi Windows Wireless Worm