ebook img

The information security dictionary : defining the terms that define security for E-business, Internet, information, and wireless technology PDF

444 Pages·2004·4.608 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview The information security dictionary : defining the terms that define security for E-business, Internet, information, and wireless technology

THE INFORMATION SECURITY DICTIONARY Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE THE INFORMATION SECURITY DICTIONARY Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology by Urs E. Gattiker Information Security this Week – Denmark CASEScontact.org EICAR.org and International School of New Media (ISNM) University of Lübeck, Germany KLUWER ACADEMIC PUBLISHERS NEW YORK,BOSTON, DORDRECHT, LONDON, MOSCOW eBookISBN: 1-4020-7927-3 Print ISBN: 1-4020-7889-7 ©2004 Springer Science + Business Media, Inc. Print ©2004 Kluwer Academic Publishers Boston All rights reserved No part of this eBook maybe reproducedor transmitted inanyform or byanymeans,electronic, mechanical, recording, or otherwise, without written consent from the Publisher Created in the United States of America Visit Springer's eBookstore at: http://www.ebooks.kluweronline.com and the Springer Global Website Online at: http://www.springeronline.com This book is dedicated to the memory of: George Lermer The dean who hired me for my first tenure-track job at the University of Lethbridge, Alberta, Canada, who became my mentor and dear friend. He died March 15, 2003 while skiing at CastleMountain (Canadian Rockies). This page intentionally left blank Contents List of Figures ix List of Tables xi Preface xv Acknowledgements xix Why is IT Security Important xxiii About This Dictionary xxvii About The Author xxix How to Use This Dictionary xxxi A 1-31 B 32-44 C 45-76 D 77-105 E 106-127 F 128-136 G 137-138 H 139-149 I 150-182 J 183-189 K 190-192 L 193-198 M 199-218 N 219-222 O 223-226 P 227-260 Q 261-262 R 263-281 S 282-318 T 319-339 U 340-345 V 346-359 W 360-373 X 374 Z 375 Epilogue: Critical Infrastructure Protection(CIP) 376 Appendices 381 Suggestions for AdditionalResources 383 Appendix 1 On-LineDatabases for Vulnerabilities and Security 384 Appendix 2 Dictionaries & Encyclopedias 386 Appendix 3 Miscellaneous Resources 388 vii viii Contents Appendix 4 Legislation and Regulation – European Union 392 Appendix 5 Legislation and Regulation 396 Appendix 6 Standards and Best Practice 398 Section A 398 Section B 400 Security and Utility Tools 403 Appendix 7 ‘Nearly’ or Outright Free Security Tools for System Administrators 403 Appendix 8 ‘Nearly’ or Outright Free Security Tools for Home Users 405 Awareness Raising – SkillDevelopment 407 Appendix 9 Newsletters 407 Appendix 10 Alerts and Advisories 410 If you would like to see a new word added to the IT Security Dictionary, pleasewrite to: Dictionary @ WebUrb. com List of Figures Figures Description Page Figure 1 Basic model about vulnerabilities resulting in unauthorized access or use of processes. 4 Figure 2 Prevention mechanisms for reducing the risk of unauthorized access while protecting against physical, syntactic and/or semantic attacks. 24 Figure 3 Attackresulting in unauthorized access and use of processes with various results as outcome thereoff – prevention mechanisms to increase security. 25 Figure 4 A taxonomy for risk management. 166 Figure 5 Taxonomy of maliciouscode or malware. 201 ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.