Abstract
Computer security has been studied as a discipline since the early 1970s. It refers tomeasures and controls that protect an information system against denial of service and unauthorized (accidental or intentional) disclosure modification or destruction of information systems and data [Abrams et al., 1997]. Researchers have commonly summarized computer security asconfidentiality integrity andavailability [ITSE, 1991]. Confidentiality refers to prevention/determent/detection of unauthorized disclosure of information; integrity refers to prevention/determent/detection of unauthorized modification of inĀformation; and availability refers to prevention/determent/detection of unauthorized withholding of information or resource.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
Ā© 2004 Springer Science+Business Media New York
About this chapter
Cite this chapter
Ning, P., Jajodia, S., Wang, X.S. (2004). Introduction. In: Intrusion Detection in Distributed Systems. Advances in Information Security, vol 9. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-0467-2_1
Download citation
DOI: https://doi.org/10.1007/978-1-4615-0467-2_1
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-5091-0
Online ISBN: 978-1-4615-0467-2
eBook Packages: Springer Book Archive