Skip to Main Content
Cyber Power
book

Cyber Power

by Solange Ghernaouti-Helie
April 2016
Intermediate to advanced content levelIntermediate to advanced
220 pages
15h 17m
English
EPFL Press
Content preview from Cyber Power
A Global Approach to Cybersecurity 339
In order to meet the need for monitoring and reaction, auditing mechanisms
should be designed and implemented in and around critical systems. These
mechanisms should report violations of a de ned policy or report actions that
are considered to be security threats.
The use of strong identi cation and authentication solutions, operational
cryptographic mechanisms, and one-time passwords are strongly recom-
mended to enforce network security. Automated or semiautomatic techniques
for guiding the selection of mechanisms for enforcing security policies and
rules previously de ned must also be envisaged.
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cyber Warfare

Cyber Warfare

Jason Andress, Steve Winterfeld
Cyber Minds

Cyber Minds

Shira Rubinoff
Cybercrime

Cybercrime

Todd Wade

Publisher Resources

ISBN: 9781466573048