Guide to Computer Network Security pp 147-171 | Cite as
Security Assessment, Analysis, and Assurance
Abstract
The rapid development in both computer and telecommunication technologies has resulted in massive interconnectivity and interoperability of systems. The world is getting more and more interconnected every day. Most major organization systems are interconnected to other systems through networks. The bigger the networks, the bigger the security problems involving the system resources on these networks. Many companies, businesses, and institutions whose systems work in coordination and collaboration with other systems as they share each other’s resources and communicate with each other face a constant security threat to these systems, yet the collaboration must go on.
Keywords
System Resource Security Policy Security Requirement Security Threat Social EngineeringReferences
- 1.Jamsa K (2002) Hacker proof: the ultimate guide to network security, 2nd edn. Onword Press, AlbanyGoogle Scholar
- 2.Holden G (2004) Guide to firewalls and network security: intrusion detection and VPNs. Delmar Thomson Learning, BostonGoogle Scholar
- 3.Kaeo M (1999) Designing network security: a practical guide to creating secure network infrastructure. Macmillan Technical Publishing, IndianapolisGoogle Scholar
- 4.Guidelines for the development of security plans for classified computer systems. http://cio.doe.gov/ITReform/sqse/download/secplngd.doc
- 5.Ross R. The development of standardized certification and accreditation guidelines and provider organizations. http://csrc.nist.gov/sec-cert/CA-workshop-fiac2002-bw.pdf
- 6.Kizza JM (2002) Ethical and social issues in the information age, 2nd edn. Springer, New YorkGoogle Scholar
- 7.Bauer M (2003) Paranoid penguin: practical threat analysis and risk management. Linux J 93:9Google Scholar
Additional References
- 1.Security architecture and patterns, KPMG. http://www.issa-oc.org/html/1
- 2.Threat analysis and vulnerability assessments. http://www.primatech.com/consulting/services/threat_analysis_and_vulnerability_assessments.htm