Limit search to available items
Book Cover
Author Curts, Raymond J

Title Building a global information assurance program / Raymond J. Curts, Douglas E. Campbell
Published Boca Raton, FL : Auerbach Publications, 2003
Online access available from:
Safari O'Reilly books online    View Resource Record  


Description 1 online resource (xv, 406 pages) : illustrations
Contents AUTHORS; APPENDIXES; Acronyms; Glossary; Links; References; Index
CENTER; Introduction; Overview of the Naval Aviation Safety Program; Findings; Recommendations; The National Defense Industrial Association (NDIA) IAC Concept: A Closing Note; ; AUTOMATED TOOLS; Internal Vulnerability Scanning/Auditing Tools; Patches and Replacements; Password Enhancing Tools/Authentication and System Security Tools; Password Breaking Tools; Access Control Tools; Logging Tools; Logging Utilities; Intrusion Detection Tools/Network Monitoring Tools; System Status Reporting Tools; Mail Security Tools; Packet Filtering Tools; Firewall Tools; Real-Time Attack Response Tools; Encryption Tools; Host Configuration Tools; Anti-Virus Tools; Cryptographic Checksum Tools; Miscellaneous Tools; Visualization Tools; I'm Going to Break in and Compromise Your Information; A Sampling of Software Tools that Attackers Use; ; SUMMARY; Conclusions and Recommendations; Future Work; ; ABOUT THE
INTRODUCTION TO INFORMATION ASSURANCE (IA); Authentication; Confidentiality; Non-repudiation; ; BASIC CONCEPTS; Attributes; Information Attributes; Pure Information Attributes; Attributes Influenced by the System; System Attributes; Security Attributes; Information System Support Planning Principles; The Bottom Line, Revisited; Information Assurance (IA); Commercial Capabilities; Security; Network Views; Risk Management; Cognitive Hierarchy; Types of Logic; Summary; ; RISK,
Maintaining Up-to-Date Documentation; Summary; ; IA TASK FORCE; Requirements Analysis; Functional Analysis; Evaluation and Decision; System Synthesis; Documentation; Concluding Chapter Remarks; ; REQUIREMENTS; Beginnings; The Object-Oriented Paradigm; Summary; ; DESIGN; Operational Design Considerations; Technology Design Considerations; Business Continuity Design Considerations; Concluding Remarks for this Chapter; ; IMPLEMENTATION AND TESTING; IATP Defined; Requirement for an IATP; Management's Role; Disruption of Service Caused by IATP Implementation; IATP Development; Critical Elements of the IATP; Preliminary Planning: Test Requirements; Test Team; Preparatory Actions: Test Methodology; Chapter Concluding Remarks; ; IA LIFE CYCLE SUPPORT AND OPERATIONAL CONSIDERATIONS; The Information Assurance Life Cycle Methodology; Concluding Remarks for This Section; ; THE INFORMATION ASSURANCE
THREAT AND VULNERABILITY; ; OVERVIEW OF SYSTEMS ENGINEERING; A Systems Engineering Case Study; Case Study Background; The Mission; The Goal; An Approach Toward A Solution; Case Tools: A Means of Managing Architectural Information; The Current Process; Maritime Strategy; The Threat; Top Level Warfare Requirements (TLWRs); Architecture: A System Description; Assessment: How Well Does It Fulfill Requirements?; Shortfalls and Overlaps: Identifying Strengths and Weaknesses; Architectural Options: Making the Right Choices; The Proposed Process; Architecture Development; Architectural Principles; Mission Requirements Analysis; Functional Analysis; Operational Functions; System Functions; Requirements Allocation; Assessment of the Current Architecture; Identification of Shortfalls and Overlaps; Development of Architectural Options; Assessment of Options; Proposed New (Notional) Architecture; System Synthesis; The Need for
Bibliography Includes bibliographical references (pages 369-385) and index
Notes Print version record
Subject Computer security
Data protection
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Computer security.
Data protection.
Form Electronic book
Author Campbell, Douglas E., 1954-
ISBN 0203997557