Information Assurance
Peng Liu, Pennsylvania State University
Meng Yu, Monmouth University
Jiwu Jing, Chinese Academy of Sciences Beijing, China
Overview of Information Assurance Technologies
Three Generations of IA Technologies
Third Generation IA Technologies
Classification of Survivability Technologies
Survivability versus Fault Tolerance
Intrusion Masking Technologies
Survivable Information Storage Systems
Intrusion Masking Distributed Computing
Attack Resistant Certification Authority
INTRODUCTION
As society increasingly relies on digitally stored and accessed information, traditional information security technologies, policies, management, and practices are found more and more limited in satisfying the security and assurance needs of modern information systems and applications, for several reasons. In general, addressing only the protection of information against unauthorized disclosure, transfer, modification, or destruction, traditional information security cannot deliver the level of information assurance that modern applications require. In particular, first, as applications increasingly rely on digitally stored and accessed information, they increasingly rely on the availability of this information and the reliability of the corresponding information system. However, availability and ...
Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.