Book description
In today’s fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA).- The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting
- Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance
- Additional focus on security and survivability issues in wireless networks
Table of contents
- Copyright
- The Morgan Kaufmann Series in Networking, Series Editor, David Clark, M.I.T.
- The Morgan Kaufmann Series in Computer Security
- Preface
- Contributors
- Information Assurance
- Foundational Background on Security and Dependability Techniques
- Modeling the Interaction between Dependability and Security
-
Design and Architectural Issues for Secure and Dependable Systems
-
Monitoring and Detecting Attacks in All-Optical Networks
- Introduction
- Crosstalk Attack Features and Monitoring Techniques
- Node, Attack, and Monitor Models
- Necessary and Sufficient Conditions for Crosstalk Attack Detection
- One-Crosstalk Attack Diagnosable Conditions
- k-Crosstalk Attacks in the Network
- Sparse Monitoring and Routing Algorithms
- Sparse Monitoring, Test Connection, and Routing for More than One Original Attack Flow
- Conclusion
-
References
- Robustness Evaluation of Operating Systems
- Intrusion Response Systems: A Survey
- Secure and Resilient Routing: Building Blocks for Resilient Network Architectures
- Security and Survivability of Wireless Systems
- Integrated Fault and Security Management
-
Monitoring and Detecting Attacks in All-Optical Networks
Product information
- Title: Information Assurance
- Author(s):
- Release date: July 2010
- Publisher(s): Morgan Kaufmann
- ISBN: 9780080555881
You might also like
book
Building an Information Security Awareness Program
The best defense against the increasing threat of social engineering attacks is Security Awareness Training to …
book
Operational Risk Management
The Authoritative Guide to the Best Practices in Operational Risk Management Operational Risk Management offers a …
book
Threat Assessment and Risk Analysis
Threat Assessment and Risk Analysis: An Applied Approach details the entire risk analysis process in accessible …
article
Communicate with Teams More Effectively
This selection of shortcuts will enable you to improve your communication, critical thinking, documentation, and networking …