Advertisement

Security Management

  • Dinesh Chandra Verma
Chapter

The goal of systems management is to try to keep computer systems and network running properly and flawlessly. In order to do so, computer systems must be accessible to the people who are authorized to use them, and not be accessible to anyone who are not authorized to use them. An unauthorized person can cause several problems in the operation of a system, including denying access to legitimate users, disrupting the operation of the system, or cause the system to behave in ways that could be detrimental to the users. As a result, security management is a key aspect of any type of computer systems management.

Keywords

Security Policy Intrusion Detection System Certificate Authority Security Management Service Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    W. Maconachy, C. Schou, D. Ragsdale, and D. Welch, A model for information assurance: An integrated approach, Proceedings IEEE Workshop on Information Assurance and Security, West Point, NY, June 2001.Google Scholar
  2. 2.
    W. Stallings, Cryptography and Network Security, Prentice Hall, Saddle River, NJ, 2005.Google Scholar
  3. 3.
    B. Schneier, Applied Cryptography, Wiley, New York, 1996.Google Scholar
  4. 4.
    J. Hoffstein, J. Pipher, and J. Silverman, An Introduction to Mathematical Cryptography, Springer Verlag, New York, 2008.MATHGoogle Scholar
  5. 5.
    Data Encryption Standard. Federal Information Processing Standards Publication 46. National Bureau of Standards, U.S. Department of Commerce, 1977Google Scholar
  6. 6.
    C. Adams and S. Lloyd, Understanding PKI: Concepts, Standards and Deployment Considerations, Addision Wesley, Boston, 2002.Google Scholar
  7. 7.
    P. Zimmerman, The Official PGP User’s Guide, MIT Press, Cambridge, MA, 1995.Google Scholar
  8. 8.
    L. Lamport, Password Authentication with insecure communication, Communications of the ACM, 24(11): 770–772, November 1981.MathSciNetCrossRefGoogle Scholar
  9. 9.
    A. Pashalidis and C. Mitchell, A Taxonomy of Single Sign-on Systems, Lecture notes in Computer Science, Springer Verlaf, volume 2727, January, 2003.Google Scholar
  10. 10.
    J. Steiner, C. Neuman, and J. Schiller. Kerberos: An authentication service for open network systems. In: USENIX Winter Conference, February 1988.Google Scholar
  11. 11.
    S. Thomas, SSL & TLS Essentials, Wiley, New York, February 2000.Google Scholar
  12. 12.
    N. Doraswamy and D. Harkins, IPSec, Prentice Hall, Saddle River, NJ, 2003.Google Scholar
  13. 13.
    D. Barrett, R. Silverman, and R. Byrnes, SSH, the secure shell, o’reilly media, California, CA, May 2005.Google Scholar
  14. 14.
    W. Cheswick, S. Bellovin, and A. Rubin, Firewalls and Internet Security, Addison-Wesley, Boston, 2003.Google Scholar
  15. 15.
    R. Barnard, Intrusion Detection Systems, Butterworth-Heinemann, Boston, 1988.Google Scholar
  16. 16.
    L. Spitzner, Honeypots: Tracking Hacker, Addison Wesley, Saddle River, NJ 2002.Google Scholar
  17. 17.
    L. Spitzner, Honeypots: Catching the Insider threat, Computer Security Applications Conference, Las Vegas, December 2003.Google Scholar
  18. 18.
    M. Swanson and B. Guttman, Generally accepted principles and practices for securing information technology systems, NIST Publication 800-14, September 1996.Google Scholar
  19. 19.
    S. Weingart, Physical security devices for computer subsystems: A survey of attacks and defenses, Lecture Notes in Computer Science Volume 1965, Springer, January 2000.Google Scholar
  20. 20.
    M. Hughes and R. Stanton, Winning security policy acceptance, Computer Fraud & Security, 2006(5): 17–19, May 2006.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  1. 1.IBM T.J. Watson Research CenterYorktown HeightsUSA

Personalised recommendations