Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information AssuranceEngineering Information Security covers all aspects of information security using a systematic engineering approach and focuses on the viewpoint of how to control access to information.
|
Contents
WHAT IS SECURITY? | 1 |
SYSTEMS ENGINEERING | 31 |
FOUNDATION CONCEPTS | 61 |
AUTHENTICATION OF SUBJECTS | 123 |
SECURITY SYSTEMS ENGINEERING | 169 |
TRADITIONAL NETWORK CONCEPTS | 269 |
NEXTGENERATION NETWORKS | 371 |
GENERAL COMPUTER SECURITY ARCHITECTURE | 409 |
Other editions - View all
Common terms and phrases
access control activities administration algorithm Alice allowed application approach architecture areas assets attack audit authentication authorization bits called certificate changes client communications components confidentiality configuration connection considered contained context created defined designed devices digest discussed documents domain element encryption engineering example field Figure functions hardware header identified identity implementation infrastructure integrity Internet IPsec layer mechanisms memory object operating system organization packet password perform physical prevent procedures protection protocol received referred rely request requirements responsible result risk role router rules secret key security policy server shared shown signaling signature specific standards symmetric Table testing threat traffic transport trust types valid vulnerabilities Yes Yes Yes