Research Output

Security and forensic computing: introduction to computer security.

  1 INTRODUCTION 14
1.1 The Industrial and the Information Age 14
1.2 CIA and AAA 15
1.3 Protecting against intruders 16
1.4 Users, systems and data 17
1.5 Security and Forensic Computing 19
1.6 ISO 27002 21
1.7 Risks 22
Annual Loss Expectancy 22
1.8 Risk management 24
1.9 Security policies 25
1.10 Defining the policy 26
1.11 Example risks 28
1.12 Defence-in-depth 29
1.13 Gateways and DMZ (Demilitarized Zones) 30
1.14 Layered model and security 31
1.15 Encryption and a layered approach to defence 33

  • Date:

    30 November 2010

  • Publication Status:

    Published

  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    005.8 Data security

Citation

Buchanan, W. J. (2010). Security and forensic computing: introduction to computer security.

Authors

Keywords

Data security; authentication; authorization; confidentiality; assurance; integrity; network infrastructure; trojans; worms; data mining; industrial espionage; forensic computing investigation; ISO 27002;

Available Documents