Skip to main content

Network/IT Security in Protective Security (PS)

  • Chapter
  • First Online:
Protective Security
  • 617 Accesses

Abstract

The German occupation of Crete in May 1941, after a rain of destruction from the air, provoked British Prime Minister Sir Winston Churchill to shoot a hotly worded memo to his secretary of state for air and to the chief of the air staff.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    www.bbc.co.uk/history/worldwars/wwtwo/churchill_defender_01.shtml

  2. 2.

    Hoover, K., 1991. Air Base Ground Defense. [Randolph Air Force Base, Tex.]: Headquarters Air Training Command, History and Research Office.

  3. 3.

    www.hsdl.org/?abstract&did=3755

  4. 4.

    https://foreignpolicy.com/2015/12/09/at-least-37-dead-in-taliban-attack-on-kandahar-airfield-indian-opposition-stalls-parliament-over-court-case-pakistan-china-hold-joint-military-exercise/

  5. 5.

    www.secret-bases.co.uk/wiki/Gordon_Moulds

  6. 6.

    www.gov.uk/government/news/two-raf-squadrons-work-together-to-protect-kandahar

  7. 7.

    https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/311572/20110830_jdp2_00_ed3_with_change1.pdf

  8. 8.

    http://news.bbc.co.uk/1/hi/uk/6972896.stm

  9. 9.

    www.forces.net/forces-tv/warzone-behind-scenes-kandahar

  10. 10.

    www.forces.net/forces-tv/warzone-behind-scenes-kandahar

  11. 11.

    https://jimgarrityonline.com/2011/07/25/employers-scouring-internet-for-employee-information/

  12. 12.

    https://csrc.nist.gov/publications/detail/sp/1800-5/final

  13. 13.

    www.youtube.com/watch?v=0uzBMKOoEtA

  14. 14.

    https://vimeo.com/214559373

  15. 15.

    www.open-audit.org/

  16. 16.

    https://nmap.org/

  17. 17.

    www.cs.utexas.edu/~byoung/cs361/slides2-policy-4up.pdf

  18. 18.

    https://computerms.net/what-is-bell-lapadula-security-model/#:~:text=The%20Bell%2DLapadula%20(BLP),a%20discretionary%20access%20control%20policy.&text=A%20set%20of%20subjects%2C%20a,and%20an%20access%20control%20matrix.

  19. 19.

    www.chegg.com/homework-help/questions-and-answers/bell-lapadula-multilevel-security-model-please-use-example-shown-re-draw-figure-demonstrat-q43015320

  20. 20.

    www.coursehero.com/file/p65b232t/The-goal-of-the-model-is-to-prevent-the-contamination-of-clean-high-level/

  21. 21.

    https://pdfs.semanticscholar.org/9416/81c9210b334b9b4abe011f260179ddb82401.pdf?_ga=2.167036734.1000684186.1600353495-142072036.1600353495

  22. 22.

    www.studynotesandtheory.com/single-post/The-Clark-Wilson-Model

  23. 23.

    https://devage.tistory.com/68

  24. 24.

    https://oracle-patches.com/en/security/4147-security-models-review-cisco-safe-bell%E2%80%93lapadula-biba#:~:text=Lattice%2DBased%20Model%3A%20This%20mandatory,than%20its%20own%20security%20level

  25. 25.

    www.semanticscholar.org/paper/Design-of-a-lattice-based-access-control-scheme-Chiang-Bayrak/f4f7a5d1e38abf4f49229be0fd2ecf917eba689b#extracted

  26. 26.

    www.cisco.com/c/en/us/solutions/enterprise/design-zone-security/landing_safe.html

  27. 27.

    www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/safe-secure-branch-architecture-guide.pdf

  28. 28.

    www.microsoft.com/en-gb/security/business/zero-trust

  29. 29.

    https://www.zdnet.com/article/identity-management-101-how-digital-identity-works/

  30. 30.

    www.beyondtrust.com/blog/entry/cybersecurity-strategies-to-stop-lateral-movement-attacks-leave-your-adversaries-marooned

  31. 31.

    https://earth.google.com/web/search/RAF+Honington/@52.34384053,0.75586775,53.74621347a,420.55267309d,35y,21.72928771h,60.0003454t,0r/data=CigiJgokCZkls98GiD9AEXpEZjS0dz9AGUfQ4ChrfFBAIZOZ_ScRclBA

  32. 32.

    www.kvm-switches-online.com/secure-kvm-guide.html

  33. 33.

    www.techstreet.com/standards/ieee-802-11-2016?product_id=1867583#full

  34. 34.

    www.giac.org/paper/gsec/4214/wireless-security-ieee-80211-standards/106760

  35. 35.

    www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mobility/emob41dg/emob41dg-wrapper/ch4_Secu.html

  36. 36.

    www.digitalairwireless.com/articles/blog/wi-fi-zero-trust-architecture

  37. 37.

    https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/882775/dwp-ss019-security-standard-wireless-network-v1.1.pdf

  38. 38.

    https://ukdefencejournal.org.uk/typhoon-jets-scrambled-in-response-to-unresponsive-aircraft/

  39. 39.

    https://security-demo.extrahop.com/

  40. 40.

    www.autoblog.com/2019/03/07/2020-porsche-911-deep-dive-internals-technology/#slide-1290672

  41. 41.

    www.autoblog.com/2019/03/07/2020-porsche-911-deep-dive-internals-technology/#slide-1290662

  42. 42.

    www.dvidshub.net/news/98810/usaces-military-construction-program-southern-afghanistan-winds-down

  43. 43.

    www.datto.com/library/what-is-endpoint-protection#:~:text=Endpoint%20protection%20(also%20referred%20to,a%20threat%20path%20becomes%20possible.

  44. 44.

    www.techradar.com/uk/best/best-mdm-solutions

  45. 45.

    www.comparitech.com/net-admin/best-email-protection-solutions/

  46. 46.

    www.tomsguide.com/uk/us/best-antivirus,review-2588.html

  47. 47.

    www.titania.com/products/nipper/

  48. 48.

    www.titania.com/products/paws/

  49. 49.

    https://learn.cisecurity.org/cis-cat-lite

  50. 50.

    www.atlassian.com/itsm/it-asset-management/cmdb

  51. 51.

    www.pcwdld.com/host-based-intrusion-detection-systems-hids-tools-and-software#:~:text=A%20Host%2Dbased%20Intrusion%20Detection,possible%20break%2Dins%20and%20thieves

  52. 52.

    https://support.eset.com/en/enable-host-based-intrusion-prevention-system-hips-in-eset-windows-home-products#:~:text=The%20Host%2Dbased%20Intrusion%20Prevention,to%20negatively%20affect%20your%20computer.&text=HIPS%20is%20separate%20from%20Real,running%20within%20the%20operating%20system

  53. 53.

    www.raymond.cc/blog/7-tools-verify-file-integrity-using-md5-sha1-hashes/

  54. 54.

    www.juniper.net/documentation/en_US/contrail20/topics/topic-map/host-based-firewalls.html

  55. 55.

    www.zonealarm.com/software/web-secure-free

  56. 56.

    www.ibm.com/support/knowledgecenter/SSLTBW_2.4.0/com.ibm.zos.v2r4.ieae100/aslr.htm

  57. 57.

    www.systemconf.com/2020/05/21/what-is-depdata-execution-prevention-and-how-is-it-used/

  58. 58.

    https://systemadminspro.com/overview-of-container-sandbox-technologies/

  59. 59.

    www.globalsign.com/en/lp/certificate-inventory-tool-sign-up

  60. 60.

    www.gartner.com/reviews/market/network-firewalls

  61. 61.

    www.gartner.com/reviews/market/web-application-firewalls

  62. 62.

    www.oracle.com/uk/database/technologies/security/audit-vault-firewall.html

  63. 63.

    www.vmware.com/topics/glossary/content/intrusion-prevention-system

  64. 64.

    www.fireeye.com/products/endpoint-security.html?utm_source=google&utm_medium=cpc&utm_content=paid-search&gclid=CjwKCAjw2Jb7BRBHEiwAXTR4jY0TQURr4TuqsICpVbzeoxL-pOiz7sf5HovG51UcMEVuIusjvrIYAxoCNogQAvD_BwE&gclsrc=aw.ds

  65. 65.

    www.gartner.com/reviews/market/email-security

  66. 66.

    www.techradar.com/best/proxies

  67. 67.

    https://securityboulevard.com/2020/02/privileged-access-workstation-vs-jump-server/

  68. 68.

    https://searchenterprisedesktop.techtarget.com/definition/patch-management

  69. 69.

    www.dnsstuff.com/patch-management-software

  70. 70.

    www.defense.gov/observe/photo-gallery/igphoto/2001337036/

  71. 71.

    www.dnsstuff.com/dns-monitoring-software

  72. 72.

    https://geekflare.com/data-loss-prevention-solutions/

  73. 73.

    www.dnsstuff.com/free-network-monitoring-software

  74. 74.

    https://securitytrails.com/blog/top-20-honeypots

  75. 75.

    www.sans.org/reading-room/whitepapers/threats/paper/34180

  76. 76.

    https://qualysguard.qualys.com/qwebhelp/fo_portal/reports/patch_reports/win_patch_report_template.htm

  77. 77.

    https://docs.tenable.com/tenableio/vulnerabilitymanagement/Content/Reports/ReportTemplates.htm#OutstandingPatchTracking

  78. 78.

    www.trendmicro.com/vinfo/gb/security/news/cybercrime-and-digital-threats/foreseeing-a-new-era-cybercriminals-using-machine-learning-to-create-highly-advanced-threats

  79. 79.

    https://knogin.com/products/#Pricing

  80. 80.

    www.extrahop.com/

  81. 81.

    https://faradaysec.com/vulnerability-management/

  82. 82.

    https://blog.usecure.io/the-role-of-human-error-in-successful-cyber-security-breaches#:~:text=According%20to%20a%20study%20by,have%20taken%20place%20at%20all!

  83. 83.

    www.northramp.com/contact

  84. 84.

    www.onsecurity.co.uk/our-services/

  85. 85.

    www.pentestpartners.com/penetration-testing-services/

  86. 86.

    www.crest-approved.org/knowledge-sharing/maturity-assessment-tools/index.html

  87. 87.

    https://resources.infosecinstitute.com/what-are-black-box-grey-box-and-white-box-penetration-testing/

  88. 88.

    www.youtube.com/watch?v=_8WuMnJ1X5k

  89. 89.

    www.caa.com/caaspeakers/will-smith

  90. 90.

    www.ons.gov.uk/employmentandlabourmarket/peopleinwork/employmentandemployeetypes/bulletins/coronavirusandhomeworkingintheuk/april2020

  91. 91.

    www.businessleader.co.uk/uk-firms-among-the-worlds-least-prepared-for-home-working-amid-coronavirus-shutdown/80778/

  92. 92.

    www.express.co.uk/travel/articles/1257717/china-lockdown-how-long-was-china-lockdown-timeframe-wuhan

  93. 93.

    www.axios.com/italy-coronavirus-timeline-lockdown-deaths-cases-2adb0fc7-6ab5-4b7c-9a55-bc6897494dc6.html

  94. 94.

    www.theguardian.com/world/2020/may/02/australias-coronavirus-lockdown-the-first-50-days

  95. 95.

    https://fullfact.org/health/coronavirus-lockdown-hancock-claim/

  96. 96.

    www.manitoulin.com/updated-canada-goes-on-covid-19-lockdown/

  97. 97.

    www.bbc.co.uk/news/world-us-canada-52757150

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Seaman, J. (2021). Network/IT Security in Protective Security (PS). In: Protective Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-6908-4_7

Download citation

Publish with us

Policies and ethics