Security Assessment, Analysis, and Assurance

  • Joseph Migga Kizza
Chapter
Part of the Computer Communications and Networks book series (CCN)

Abstract

The rapid development in both computer and telecommunication technologies has resulted in massive interconnectivity and interoperability of systems. The world is getting more and more interconnected every day. Most major organization systems are interconnected to other systems through networks. The bigger the networks, the bigger the security problems involving the system resources on these networks. Many companies, businesses, and institutions whose systems work in coordination and collaboration with other systems as they share each other’s resources and communicate with each other face a constant security threat to these systems, yet the collaboration must go on.

Keywords

System Resource Security Policy Security Requirement Security Threat Social Engineering 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Jamsa K (2002) Hacker proof: the ultimate guide to network security, 2nd edn. Onword Press, AlbanyGoogle Scholar
  2. 2.
    Holden G (2004) Guide to firewalls and network security: intrusion detection and VPNs. Delmar Thomson Learning, BostonGoogle Scholar
  3. 3.
    Kaeo M (1999) Designing network security: a practical guide to creating secure network infrastructure. Macmillan Technical Publishing, IndianapolisGoogle Scholar
  4. 4.
    Guidelines for the development of security plans for classified computer systems. http://cio.doe.gov/ITReform/sqse/download/secplngd.doc
  5. 5.
    Ross R. The development of standardized certification and accreditation guidelines and provider organizations. http://csrc.nist.gov/sec-cert/CA-workshop-fiac2002-bw.pdf
  6. 6.
    Kizza JM (2002) Ethical and social issues in the information age, 2nd edn. Springer, New YorkGoogle Scholar
  7. 7.
    Bauer M (2003) Paranoid penguin: practical threat analysis and risk management. Linux J 93:9Google Scholar

Additional References

  1. 1.
    Security architecture and patterns, KPMG. http://www.issa-oc.org/html/1
  2. 2.
    Threat analysis and vulnerability assessments. http://www.primatech.com/consulting/services/threat_analysis_and_vulnerability_assessments.htm

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Joseph Migga Kizza
    • 1
  1. 1.University of TennesseeChattanoogaUSA

Personalised recommendations