close menu
Bookswagon-24x7 online bookstore
close menu
My Account
13%
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance(IEEE Press Series on Information and Communication Networks Security)

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance(IEEE Press Series on Information and Communication Networks Security)

          
5
4
3
2
1

Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

Engineering Information Security covers all aspects of information security using a systematic engineering approach and focuses on the viewpoint of how to control access to information.

  • Includes a discussion about protecting storage of private keys, SCADA, Cloud, Sensor, and Ad Hoc networks
  • Covers internal operations security processes of monitors, review exceptions, and plan remediation
  • Over 15 new sections
  • Instructor resources such as lecture slides, assignments, quizzes, and a set of questions organized as a final exam
If you are an instructor and adopted this book for your course, please email ieeeproposals@wiley.com to get access to the additional instructor materials for this book.

Table of Contents:

Preface and Acknowledgments xxiii

About the Companion Website xxvii

1 What Is Security? 1

1.1 Introduction 1

1.2 The Subject of Security 2

1.2.1 Branches of Security 2

1.2.2 Defining Security by Function 5

1.2.3 The Common Body of Knowledge (CBK) Security Domains 8

1.3 A Twenty-First Century Tale 15

1.3.1 The Actors 15

1.3.2 What Actually Occurred 17

1.3.3 How Could All This Have Been Prevented? 19

1.3.4 They Did Not Live Happily Ever After 20

1.4 Why Are You Important to Computer Security? 21

1.4.1 What Are the Threats to Your Computer? 22

1.4.2 As a User, What to Do? 23

1.4.3 The Reality of Cybercrime and Cyberwarfare 23

1.5 End of the Beginning 25

1.6 Chapter Summary 29

1.7 Further Reading and Resources 30

2 Systems Engineering 31

2.1 So What Is Systems Engineering? 31

2.1.1 Similar Systems Engineering Process 32

2.1.2 Another Systems Engineering View 38

2.1.3 Process Variations 41

2.2 Process Management 41

2.2.1 ISO 9000 Processes and Procedures 41

2.2.2 Capability Maturity Model (CMM) 43

2.3 Organization Environments 46

2.3.1 Economic, Legal, and Political Contexts 47

2.3.2 Business/Organizational Types 52

2.3.3 National Critical Infrastructure 56

2.4 Chapter Summary 59

2.5 Further Reading and Resources 59

3 Foundation Concepts 61

3.1 Security Concepts and Goals 62

3.1.1 Subjects and Objects 63

3.1.2 What Is Trust? 63

3.1.3 Domains, Security, and Trust 64

3.1.4 Security Goals/Objectives 65

3.1.5 X.800 Security Services 66

3.1.6 A Modern Definition of Security Services 69

3.2 Role of Cryptography in Information Security 77

3.2.1 Cryptographic Hash Algorithms 81

3.2.2 Encryption Algorithms 86

3.2.3 Cryptanalysis and Other Key Issues 101

3.2.4 Key Management 108

3.2.5 Cryptographic Authentication 112

3.3 Key Management Revisited 120

3.4 Chapter Summary 121

3.5 Further Reading and Resources 122

4 Authentication of Subjects 123

4.1 Authentication Systems 123

4.1.1 Kerberos-Based Authentication 124

4.1.2 Public-Key Infrastructure 128

4.1.3 Remote Authentication Dial-in User Service and EAP 144

4.1.4 Diameter 149

4.1.5 Secure Electronic Transactions (SET) 150

4.1.6 Authentication Systems Summary 154

4.2 Human Authentication 154

4.2.1 What the Subject Has Factor 155

4.2.2 What the Subject Knows Factor 155

4.2.3 What the Subject Is Factor 156

4.2.4 Where the Subject Is Factor 157

4.2.5 Combinations of Factors 157

4.2.6 Rainbow Tables 158

4.2.7 Proxies for Humans 159

4.3 Chapter Summary 167

4.4 Further Reading and Resources 168

5 Security Systems Engineering 169

5.1 Security Policy Development 170

5.2 Senior Management Oversight and Involvement 170

5.3 Security Process Management and Standards 170

5.3.1 ISO 27002 172

5.3.2 ISO 27001 185

5.3.3 Policy Hierarchy 186

5.3.4 An Enterprise Security Policy Example 189

5.3.5 COBIT 189

5.3.6 Information Technology Infrastructure Library 194

5.3.7 Federal Information Security Management Act (FISMA) 196

5.4 Information Security Systems Engineering Methodology 199

5.4.1 Existing Asset Inventory and Classification 201

5.4.2 Vulnerabilities, Threats, and Risk 203

5.4.3 Dealing with Risk 224

5.4.4 Risk Management Framework 232

5.4.5 Risk Assignment 240

5.5 Requirements Analysis and Decomposition 240

5.6 Access Control Concepts 244

5.6.1 Subjects, Objects, and Access Operations 245

5.6.2 Mandatory Access Control using a Matrix or Lattice Approach 246

5.6.3 Discretionary Access Control using an Access Control List Approach 246

5.6.4 Mandatory Access Control using a Capability List Approach 247

5.6.5 Administrative Tasks in Access Control Methods 248

5.6.6 Role-Based Access Control (RBAC) 249

5.7 Security Modeling and Security-Related Standards 251

5.7.1 Confidentiality Policies and Integrity Policies 252

5.7.2 Bell–LaPadula Model 253

5.7.3 Graham–Denning Confidentiality Model 254

5.7.4 Chinese Wall Multilateral Confidentiality Model 255

5.7.5 Biba Integrity Model 256

5.7.6 Clark–Wilson Model 256

5.7.7 Security Model Summary 258

5.7.8 Security Standards 259

5.8 Chapter Summary 265

5.8.1 Things to Remember 266

6 Traditional Network Concepts 269

6.1 Networking Architectures 269

6.1.1 OSI Network Model 270

6.1.2 Internet Network Model 272

6.2 Types of Networks 274

6.2.1 Local Area Network (LAN) 274

6.2.2 Wireless LAN (WLAN) 277

6.2.3 Metropolitan Area Networks (MAN) 277

6.2.4 Wide Area Networks (WAN) 278

6.2.5 The Internet 279

6.2.6 Circuit Switched Networks 279

6.2.7 Supervisory Control and Data Acquisition (SCADA) Systems 284

6.2.8 Sensor Networks 288

6.2.9 Clouds 289

6.2.10 Cellular Networks 294

6.2.11 IEEE 802.16 Networks 295

6.2.12 Long-Term Evolution Networks 295

6.3 Network Protocols 295

6.3.1 Layer 1—Physical 296

6.3.2 Layer 2—Data Link Protocols 296

6.3.3 Layer 3—Internetworking Layer Protocols 310

6.3.4 Layer 4—Transport 332

6.3.5 Layer 5—User Application Protocols 342

6.3.6 Layer 5—Signaling and Control Application Protocols 349

6.3.7 Layer 5—Management Application Protocols 363

6.4 Chapter Summary 368

6.5 Further Reading and Resources 370

7 Next-Generation Networks 371

7.1 Framework and Topology of the NGN 372

7.1.1 Functional Entities and Groups 372

7.1.2 Domains 373

7.1.3 Interfaces 374

7.1.4 Protocol Layers, Functional Planes, and Interfaces 376

7.2 The NGN Functional Reference Model 380

7.2.1 Strata 380

7.2.2 Management Functional Group 381

7.2.3 Application Functional Group 381

7.2.4 The Transport Stratum 381

7.2.5 The Service Stratum 385

7.2.6 The Service Stratum and the IP Multimedia Subsystem (IMS) 385

7.3 Relationship Between NGN Transport and Service Domains 389

7.4 Enterprise Role Model 390

7.5 Security Allocation within the NGN Transport Stratum Example 393

7.6 Converged Network Management (TMN and eTOM) 393

7.7 General Network Security Architectures 401

7.7.1 The ITU-T X.800 Generic Architecture 402

7.7.2 The Security Frameworks (X.810–X.816) 402

7.7.3 The ITU-T X.805 Approach to Security 403

7.8 Chapter Summary 405

7.9 Further Reading and Resources 405

8 General Computer Security Architecture 409

8.1 The Hardware Protects the Software 410

8.1.1 Processor States and Status 411

8.1.2 Memory Management 412

8.1.3 Interruption of Processor Activity 420

8.1.4 Hardware Encryption 421

8.2 The Software Protects Information 424

8.3 Element Security Architecture Description 426

8.3.1 The Kernel 429

8.3.2 Security Contexts 430

8.3.3 Security-Critical Functions 432

8.3.4 Security-Related Functions 435

8.4 Operating System (OS) Structure 435

8.4.1 Security Management Function 437

8.4.2 Networking Subsystem Function 437

8.5 Security Mechanisms for Deployed Operating Systems (OSs) 437

8.5.1 General Purpose (GP) OSs 438

8.5.2 Minimized General Purpose Operating Systems 438

8.5.3 Embedded (“Real-Time”) Operating Systems 449

8.5.4 Basic Input–Output Systems (BIOS) 451

8.6 Chapter Summary 456

8.7 Further Reading and Resources 460

9 Computer Software Security 461

9.1 Specific Operating Systems (OSs) 461

9.1.1 Unix and Linux Security 462

9.1.2 Solaris Operating System and Role-Based Access Controls 473

9.1.3 Windows OSs 476

9.1.4 Embedded OSs 496

9.2 Applications 498

9.2.1 Application Security Issues 498

9.2.2 Malicious Software (Malware) 503

9.2.3 Anti-malware Applications 512

9.3 Chapter Summary 515

9.4 Further Reading and Resources 516

10 Security Systems Design—Designing Network Security 517

10.1 Introduction 517

10.2 Security Design for Protocol Layer 1 520

10.2.1 Wired and Optical Media 520

10.2.2 Wireless Media 522

10.3 Layer 2—Data Link Security Mechanisms 524

10.3.1 IEEE 802.1x 524

10.3.2 IEEE 802.1ae 525

10.3.3 IEEE 802.11 WPA and 802.11i 528

10.4 Security Design for Protocol Layer 3 530

10.4.1 IP Security (IPsec) 530

10.5 IP Packet Authorization and Access Control 558

10.5.1 Network and Host Packet Filtering 559

10.5.2 The Demilitarized Zone 563

10.5.3 Application-Level Gateways 564

10.5.4 Deep-Packet Inspection (DPI) 567

10.6 Chapter Summary 571

10.7 Further Reading and Resources 571

11 Transport and Application Security Design and Use 573

11.1 Layer 4—Transport Security Protocols 573

11.1.1 TLS, DTLS, and SSL 574

11.1.2 Secure Shell (SSH) 581

11.1.3 Comparison of SSL, TLS, DTLS, and IPsec 581

11.2 Layer 5—User Service Application Protocols 582

11.2.1 Email 583

11.2.2 World Wide Web (Web) and Identity Management 589

11.2.3 Voice over Internet Protocol (VoIP) 596

11.2.4 DNS Security Extensions 605

11.2.5 Instant Messaging and Chat 608

11.2.6 Peer-to-Peer Applications 615

11.2.7 Ad hoc Networks 616

11.2.8 Java 618

11.2.9 .NET 622

11.2.10 Common Object Request Broker Architecture (CORBA) 624

11.2.11 Distributed Computing Environment 626

11.2.12 Dynamic Host Configuration Protocol Security 630

11.3 Chapter Summary 632

11.4 Further Reading and Resources 632

12 Securing Management and Managing Security 633

12.1 Securing Management Applications 633

12.1.1 Management Roots 633

12.1.2 The Telecommunications Management Network 634

12.1.3 TMN Security 640

12.1.4 Management of Security Mechanisms 642

12.1.5 A Security Management Framework 645

12.2 Operation, Administration, Maintenance, and Decommissioning 648

12.2.1 Operational Security Mechanisms 649

12.2.2 Operations Security 654

12.2.3 Operations Compliance 664

12.3 Systems Implementation or Procurement 671

12.3.1 Development 672

12.3.2 Procurement 673

12.3.3 Forensic Tools 681

12.4 Chapter Summary 681

12.5 Further Reading and Resources 681

About the Author 683

Glossary 685

Index 725


Best Seller

| | See All

Product Details
  • ISBN-13: 9781119101604
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-IEEE Press
  • Depth: 25
  • Height: 234 mm
  • No of Pages: 784
  • Series Title: IEEE Press Series on Information and Communication Networks Security
  • Sub Title: The Application of Systems Engineering Concepts to Achieve Information Assurance
  • Width: 158 mm
  • ISBN-10: 1119101603
  • Publisher Date: 09 Feb 2016
  • Binding: Hardback
  • Edition: 2 HAR/PSC
  • Language: English
  • Returnable: N
  • Spine Width: 36 mm
  • Weight: 1259 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Be The First to Review
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance(IEEE Press Series on Information and Communication Networks Security)
John Wiley & Sons Inc -
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance(IEEE Press Series on Information and Communication Networks Security)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance(IEEE Press Series on Information and Communication Networks Security)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    | | See All


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA