You are previewing Information Assurance and Security Technologies for Risk Assessment and Threat Management.
O'Reilly logo
Information Assurance and Security Technologies for Risk Assessment and Threat Management

Book Description

Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances details current trends and advances in information assurance and security, as well as explores emerging applications. The book aims to provides the readers with an opportunity to build a strong, fundamental understanding of theory and methods and thus to find solutions for many of today’s most interesting and challenging problems regarding information assurance and security.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  5. Foreword
  6. Preface
  7. Acknowledgment
  8. Section 1: Attacks and Vulnerabilities
    1. Chapter 1: Attacks on IT Systems
      1. AbStract
      2. INTRODUCTION
      3. Outlook
    2. Chapter 2: Wireless Security
      1. Abstract
      2. INTRODUCTION
      3. A BRIEF HISTORY OF WIRELESS TECHNOLOGIES
      4. WIRELESS THREAT ANALYSIS
      5. WIRELESS LOCAL AREA NETWORK (WLAN)
      6. WIRELESS PERSONAL AREA NETWORK (WPAN)
      7. Security Countermeasures Against Bluetooth Threats
      8. CONCLUSION
  9. Section 2: Security Technologies
    1. Chapter 3: Analysis, Development and Deployment of Statistical Anomaly Detection Techniques for Real E-Mail Traffic
      1. Abstract
      2. INTRODUCTION
      3. RELATED WORK
      4. MOnitoring of E-mail traffic
      5. The Baseline Analysis Method
      6. CONCLUSION AND FUTURE WORK
    2. Chapter 4: Forensics Challenges for Mobile Phone Security
      1. Abstract
      2. INTRODUCTION
      3. Background
      4. FuTURE rESEARCH dIRECTIONS
      5. Conclusion
    3. Chapter 5: Applying Continuous Authentication to Protect Electronic Transactions
      1. Abstract
      2. INTRODUCTION
      3. trust in electronic communications systems
      4. brief revision about conventional authentication models
      5. continuous authentication (CA) concepts
      6. biometrics
      7. other forms of continuous authentication
      8. conclusion
    4. Chapter 6: Identity-Based Cryptography
      1. Abstract
      2. Introduction: context and goals
      3. background
      4. Identity-Based crytography (IBC)
      5. Existing solutions for IBC security vulnerabilities
      6. IBC Applications and future trends
      7. Conclusion
    5. Chapter 7: Audio Visual System for Large Scale People Authentication and Recognition over Internet Protocol (IP)
      1. ABSTRACT
      2. INTRODUCTION
      3. Background
      4. Front-end Processing for Audio Visual Recognition
      5. Training Architecture for Large-scale People Recognition
      6. Simulation results and discussion
      7. conclusion
    6. Chapter 8: Firewall
      1. Abstract
      2. Introduction
      3. Type of Firewalls
      4. Firewall Architecture
      5. Firewall Implementation Considerations
      6. Conclusion
  10. Section 3: Risk Assessment and Management
    1. Chapter 9: Risk Assessment and Real Time Vulnerability Identification in IT Environments
      1. Abstract
      2. INTRODUCTION
      3. Related works
      4. Main FOCUS OF the CHAPTER
      5. Risk structures, attacks and vulnerabilities
      6. Risk analysis methods and frameworks
      7. Management of resources
      8. FuTURE rESEARCH dIRECTIONS
      9. Conclusion
    2. Chapter 10: Challenges to Managing Privacy Impact Assessment of Personally Identifiable Data
      1. Abstract
      2. INTRODUCTION
      3. PRIVACY IMPACT ASSESSMENT
      4. PRIVACY IMPACT SUITABILITY ASSESSMENT (PISA) FRAMEWORK
      5. PRIVACY SCREENING FRAMEWORK (PSF)
      6. FuTURE rESEARCH dIRECTIONS
      7. Conclusion
    3. Chapter 11: Combining Security and Privacy in Requirements Engineering
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SQUARE FOR PRIVACY
      5. COMBINING SECURITY AND PRIVACY RISK ASSESSMENT TECHNIQUES
      6. PRIVACY REQUIREMENTS ELICITATION TECHNIQUES
      7. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
  11. Section 4: Strategic Planning of Information Security
    1. Chapter 12: Regulatory and Policy Compliance with Regard to Identity Theft Prevention, Detection, and Response
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. REGULATORY COMPLIANCE
      5. POLICIES FOR PREVENTING IDENTITY THEFT
      6. POLICIES FOR RESPONDING TO IDENTITY THEFT
      7. POLICY COMPLIANCE
      8. AUDITING
      9. DISCUSSIONS & FUTURE RESEARCH DIRECTIONS
      10. CONCLUSION
  12. Compilation of References
  13. About the Contributors
  14. Index