Information Assurance

Peng Liu, Pennsylvania State University

Meng Yu, Monmouth University

Jiwu Jing, Chinese Academy of Sciences Beijing, China

Introduction

Overview of Information Assurance Technologies

Three Generations of IA Technologies

Third Generation IA Technologies

Classification of Survivability Technologies

Survivability versus Fault Tolerance

Intrusion Masking Technologies

Survivable Information Storage Systems

Intrusion Masking Distributed Computing

Attack Resistant Certification Authority

Survivable Network Systems

Defense in Depth Technologies

Phases of Defense in Depth

Survivable Database Systems

Conclusion

Acknowledgment

Glossary

Cross References

References

INTRODUCTION

As society increasingly relies on digitally stored and accessed information, traditional information security technologies, policies, management, and practices are found more and more limited in satisfying the security and assurance needs of modern information systems and applications, for several reasons. In general, addressing only the protection of information against unauthorized disclosure, transfer, modification, or destruction, traditional information security cannot deliver the level of information assurance that modern applications require. In particular, first, as applications increasingly rely on digitally stored and accessed information, they increasingly rely on the availability of this information and the reliability of the corresponding information system. However, availability and ...

Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.