Abstract
Information Systems exist these days in all business domains. They form core business IT infrastructures. Security and vulnerability issues in information systems can come from the systems themselves, applications developed on those systems, how those systems are configured or administered or users of those systems. In this chapter, we will survey information systems in different business domains focusing on security issues and standards.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
DHS, Privacy Impact Assessments. https://www.dhs.gov/privacy-impact-assessments. Accessed August 2019.
Privacy Office, Office of Information Technology, Privacy impact assessment guide. https://www.sec.gov/about/privacy/piaguide.pdf. Revised January 2007.
Zhai, G., Niu, H., Yang, N., Tian, M., Liu, C., & Yang, H. (2009, December 10–12). Security testing for operating system and its system calls, from book Security technology. In International Conference, SecTech 2009, held as part of the Future Generation Information Technology Conference, FGIT 2009 (pp. 116–123). Jeju Island, Korea.
MITRE. (2017). Deborah Bodeau and Richard Graubart (p. 2017). MITRE January: Cyber Resiliency Design Principles.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Alsmadi, I. (2020). System Administration. In: The NICE Cyber Security Framework. Springer, Cham. https://doi.org/10.1007/978-3-030-41987-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-41987-5_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-41986-8
Online ISBN: 978-3-030-41987-5
eBook Packages: EngineeringEngineering (R0)