Cover image for Securing the information infrastructure
Title:
Securing the information infrastructure
Personal Author:
Publication Information:
Hershey PA : Cybertech Pub., c2008
Physical Description:
xiv, 368 p. : ill. ; 27 cm.
ISBN:
9781599043791

9781599043814
Abstract:
"This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial"--Provided by publisher.
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010252349 HV6773 K59 2008 Open Access Book Book
Searching...

On Order

Summary

Summary

Explores the full range of issues - moral, ethical, social, legal, and technological - involved in developing firm controls and best practices to secure the ever growing information infrastructure upon which societies and individuals depend.


Reviews 1

Choice Review

Joseph Kizza (Univ. of Tennessee at Chattanooga) and Florence Kizza (writer) observe that online crimes are increasingly common, as the Internet has become ingrained in our lives and computer use has grown. They assert that this leads to a fear of using this infrastructure when there is ever more need to trust it. The Kizzas strive to offer a rationale for establishing trust. The first of four parts focuses on security through moral and ethical education. The second and longest section consists of ten chapters describing various hardware and software security threats and countermeasures. The third part discusses legal issues including computer crime and forensics. The final part is a single chapter about security best practices and possible future technology developments. This book's 17 chapters have a consistent style: an introduction describing what will be presented, often followed by relevant definitions, then the body of the chapter, a summary conclusion, and references. Neither a prior understanding of the Internet nor computer technology is needed to appreciate this book. Glossary of terms. Summing Up: Recommended. General readers. E. M. Aupperle emeritus, University of Michigan


Table of Contents

Prefacep. ix
Acknowledgmentp. xiv
Section I Security Through Moral and Ethical Education
Chapter I Building Trust in the Information Infrastructurep. 1
Introductionp. 1
Problems with Building Trustp. 2
Steps to Building Trustp. 7
Conclustionp. 8
Referencesp. 9
Chapter II Need for Morality and Ethicsp. 10
Introductionp. 10
Moralityp. 11
Ethicsp. 11
Codes of Professional Responsibilityp. 18
The Relevancy of Ethics in Modern Lifep. 20
Conclusionp. 21
Referencesp. 21
Chapter III Building an Ethical Framework for Decision Makingp. 22
Introductionp. 22
Principle of Duty of Carep. 23
Work and Decision Makingp. 23
Pillars of a Working Lifep. 25
Need for an Ethical Educationp. 28
Decision Making and the Ethical Frameworkp. 35
Conclusionp. 39
Referencesp. 40
Chapter IV Security, Anonymity, and Privacyp. 41
Introductionp. 41
Securityp. 42
The Importance of Information Securityp. 49
Government and International Security Standardsp. 50
Information Security Evaluation Criteriap. 53
Privacyp. 56
Privacy and Security in Cyberspacep. 59
Conclusionp. 63
Referencesp. 64
Section II Security Through Innovative Hardware and Software Systems
Chapter V Software Standards, Reliability, Safety, and Riskp. 66
Introductionp. 66
The Role of Software in the Security of Computing Systemsp. 67
Software Standardsp. 70
Reliabilityp. 76
Software Securityp. 79
Causes of Software Failuresp. 82
Conclusionp. 86
Referencesp. 87
Chapter VI Network Basics and Securing the Network Infrastructurep. 88
Introductionp. 88
Computer Network Basicsp. 89
Network Protocols and Layeringp. 97
Network Servicesp. 104
Network Connecting Devicesp. 108
Securing the Network Infrastructure: Best Practicesp. 114
Conclusionp. 118
Referencesp. 118
Chapter VII Security Threats and Vulnerabilitiesp. 119
Introductionp. 119
Types of Threats and Vulnerabilitiesp. 120
Sources of Information Security Threatsp. 122
Best Practices of Online Securityp. 133
Conclusionp. 134
Referencesp. 134
Appendix Additional Readingp. 135
Chapter VIII Security Policies and Risk Analysisp. 137
Introductionp. 137
Information Security Policyp. 138
Aspects of Security Policiesp. 139
Building a Security Policyp. 142
Types of Security Policiesp. 157
Conclusionp. 160
Referencesp. 160
Chapter IX Security Analysis, Assessment, and Assurancep. 161
Introductionp. 161
Threat Identificationp. 162
Security by Analysisp. 168
Security Assessment and Assurancep. 171
Conclusionp. 179
Referencesp. 179
Chapter X Access Control, Authentication, and Authorizationp. 180
Introductionp. 180
Definitionsp. 181
Access Controlp. 181
Authenticationp. 191
Authorizationp. 203
Conclusionp. 207
Referencesp. 207
Chapter XI Perimeter Defense: The Firewallp. 209
Introductionp. 209
Types of Firewallsp. 212
Other Firewallsp. 227
Virtual Private Networkp. 230
Firewall Issues Before Installationp. 231
Configuration and Implementation of a Firewallp. 232
Advantages of Firewallsp. 234
Disadvantages of Firewallsp. 235
Securing a Network by a Firewallp. 236
Conclusionp. 237
Referencesp. 238
Chapter XII Intrusion Detection and Prevention Systemsp. 239
Introductionp. 239
Definitionsp. 240
Background of Intrusion Detectionp. 242
Basic Modules of an Intrusion Detection Systemp. 243
Intrusion Detection Modelsp. 244
Responses to Intrusion Detection Reportsp. 247
Types of Intrusion Detection Systemsp. 248
Challenges for Intrusion Detectionp. 254
Intrusion Prevention Systems (IPSs)p. 255
Conclusionp. 258
Referencesp. 258
Chapter XIII Security in Wireless Systemsp. 259
Introductionp. 259
Types of Wireless Technologyp. 260
The Wireless Communication Infrastructurep. 260
Wireless Local Area Network (WLAN): Wireless Fidelity (Wi-Fi)p. 265
Security Issues in Wireless Systemsp. 270
Best Practices for Wi-Fi Securityp. 276
Conclusionp. 278
Referencesp. 278
Chapter XIV Biometrics for Access Controlp. 280
Introductionp. 280
History of Biometricsp. 281
Biometric Authentication Systemp. 282
Biometric Identifiersp. 284
Advantages of Biometricsp. 292
Disadvantages of Biometricsp. 293
Why Biometrics are Not Truly Acceptedp. 294
The Future of Biometricsp. 295
Conclusionp. 296
Referencesp. 296
Section III Security Through the Legal System
Chapter XV Digital Evidence and Computer Crimep. 298
Introductionp. 298
Definitionsp. 299
Nature of Digital Evidencep. 299
Importance of Digital Evidencep. 300
Reliability of Digital Evidencep. 301
The Need for Standardizationp. 302
Proposed Standards for the Exchange of Digital Evidencep. 303
The Process of Digital Evidence Acquisitionp. 305
Investigative Proceduresp. 306
Conclusionp. 316
Referencesp. 316
Chapter XVI Digital Crime Investigation and Forensicsp. 318
Definitionp. 318
Computer Forensicsp. 319
History of Computer Forensicsp. 319
Network Forensicsp. 320
Forensics Analysisp. 321
Forensics Toolsp. 324
Conclusionp. 334
Referencesp. 334
Section IV What Next?
Chapter XVII Trends in Information Assurancep. 336
Introductionp. 336
Global Information Assurance Initiatives and Trendsp. 337
National and International Information Security Initiativesp. 342
Certification Programsp. 350
Conclusionp. 352
Referencesp. 353
Appendix Additional Readingp. 354
Glossary of Termsp. 355
About the Authorsp. 362
Indexp. 363