Fundamentals of Information Security

Affiliates: 0,5 $how to earn
Pay with:
i agree with "Terms for Customers"
Sold: 0
Uploaded: 16.12.2007
Content: 71216165032757.exe 219,69 kB
Loyalty discount! If the total amount of your purchases from the seller DeKor more than:
10 $the discount is5%
If you want to know your discount rate, please provide your email:


Under the information security (IS) should be understood protect the interests of subjects of information relations. The following are its main components - the confidentiality, integrity and availability. Provides statistics of violations of information security, describes the most typical cases.

Additional information

The concept of information security 3
The main components of information security 4
The importance and complexity of the problem of information security 5
The need for object-oriented approach to information security 8
The basic concepts of object-oriented approach 8
The use of object-oriented approach to the protected systems 10
Disadvantages of the traditional approach to information security with the object point of view 12
Basic definitions and criteria for classification of threats 14
The most common threat of affordability 15
Some examples of threats to the availability of 16
Malicious software 17
The main threats to the integrity of 19
The main threats to privacy 20
What is the legislative level of information security and why it is important 22
Overview of the Russian legislation in the field of information security 22
Legal acts of general purpose, affecting information security 22
The law "On information, informatization and information protection" 23
Other laws and regulations 26
Review of foreign legislation in the field of information security 30
On the current state of Russian legislation in the field of information security 32
Evaluation standards and technical specifications. "Orange Book" as an evaluation standard 35
Basic Concepts 35
Security features 36
Safety classes 38
Information security of distributed systems. Recommendation X.800 40
Network security services 40
Network security mechanisms 41
Administer security features 42
Standard ISO / IEC 15408 "Criteria for Information Technology Security Evaluation" 43
Basic Concepts 43
Functional requirements 45
Security assurance requirements 47
Harmonised criteria for European countries 48
Interpretation of the "Orange Book" for network configurations 49
Guidance documents Gostekhkomissiya Russia 50
Basic Concepts 53
Security Policy 53
Security Program 56
Synchronization software security lifecycle systems 56
Basic Concepts 59
The preparatory stages of risk management 60
The main stages of risk management 61
The main classes of action procedural level 64
Human Resource Management 64
Physical protection 65
Maintenance of 67
Responding to security breaches 69
Recovery planning 69
Basic concepts of software and hardware information security 72
Features of modern information systems, significant from the point of view of safety 73
Architectural safety 74
Identification and authentication 77
Basic Concepts 77
Password authentication 78
One-time passwords 79
Kerberos authentication server 79
Identification / authentication using biometric data 80
Access Control 81
Basic Concepts 81
Role-based access control 83
Access control in Java-environment 86
A possible approach to access control in a distributed object environment 88
Logging and Auditing 90
Basic Concepts 90
Active audit 91
Basic Concepts 91
Functional components and architecture 93
Encryption 93
Integrity Control 96
Digital certificates 98
Screening 99
Basic Concepts 99
Architectural Aspects 100
Classification firewalls 102
Security analysis 104
Availability 106
Concepts 106
Through measures to ensure high availability 108
Fault tolerance and risk zone 108
Failover 109
Software middleware 111
Ensuring supportability 111
Tunneling 113
Office 114
Concepts 114
Features typical systems 115
What is information security. The main components of information security. The importance and complexity of the problem of information security 118
Legislative, administrative and procedural levels 119
Software measures 121


No feedback yet.
In order to counter copyright infringement and property rights, we ask you to immediately inform us at the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)