Book description
In today’s fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA).- The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting
- Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance
- Additional focus on security and survivability issues in wireless networks
Table of contents
- Copyright
- The Morgan Kaufmann Series in Networking, Series Editor, David Clark, M.I.T.
- The Morgan Kaufmann Series in Computer Security
- Preface
- Contributors
- Information Assurance
- Foundational Background on Security and Dependability Techniques
- Modeling the Interaction between Dependability and Security
-
Design and Architectural Issues for Secure and Dependable Systems
-
Monitoring and Detecting Attacks in All-Optical Networks
- Introduction
- Crosstalk Attack Features and Monitoring Techniques
- Node, Attack, and Monitor Models
- Necessary and Sufficient Conditions for Crosstalk Attack Detection
- One-Crosstalk Attack Diagnosable Conditions
- k-Crosstalk Attacks in the Network
- Sparse Monitoring and Routing Algorithms
- Sparse Monitoring, Test Connection, and Routing for More than One Original Attack Flow
- Conclusion
-
References
- Robustness Evaluation of Operating Systems
- Intrusion Response Systems: A Survey
- Secure and Resilient Routing: Building Blocks for Resilient Network Architectures
- Security and Survivability of Wireless Systems
- Integrated Fault and Security Management
-
Monitoring and Detecting Attacks in All-Optical Networks
Product information
- Title: Information Assurance
- Author(s):
- Release date: July 2010
- Publisher(s): Morgan Kaufmann
- ISBN: 9780080555881
You might also like
book
Business Rules and Information Systems: Aligning IT with Business Goals
Information systems often fail because their requirements are poorly defined. This book shows IT professionals how …
book
Operational Risk Management
The Authoritative Guide to the Best Practices in Operational Risk Management Operational Risk Management offers a …
book
Enterprise Risk Management, 2nd Edition
Unlock the incredible potential of enterprise risk management There has been much evolution in terms of …
book
Building A Global Information Assurance Program
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information …