Skip to main content

Operating System Security Management and Ease of Implementation (Passwords, Firewalls and Antivirus)

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 738))

Abstract

Recent widely-known hacking exploits have increased the focus on computer and network security. System users need systems to provide confidentiality, integrity, availability and authenticity for their data. Access control, firewalls, and antivirus software are three ways to provide system security. They address different aspects of computer security with complementary advantages and disadvantages.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. M. Goodrich, R. Tamassia, Introduction to Computer Security (Addison-Wesley Publishing Company, Boston, 2010)

    Google Scholar 

  2. E. McCallister, T. Grance, K.A. Scarfone, Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) (Special Publication (NIST SP)-800-122, Gaithersburg, 2010)

    Book  Google Scholar 

  3. J.R. Vacca, Computer and Information Security Handbook (Newnes, Oxford, 2012)

    Google Scholar 

  4. P.W. Singer, A. Friedman, Cybersecurity: What Everyone Needs to Know (Oxford University Press, Oxford, 2014)

    Google Scholar 

  5. N. Li, Discretionary access control, in Encyclopedia of Cryptography and Security, (Springer, Boston, 2011), pp. 353–356

    Google Scholar 

  6. R. Ramakrishnan, J. Gehrke, Just the Facts 101 (9c), Facts101 Textbook Key Facts, Database Management Systems, 3rd edn. (Content Technologies, Inc., California, 2014). 9781467297936

    Google Scholar 

  7. C. Susan Hansche, C. John Berti, C. Hare, Official (ISC) 2 Guide to the CISSP Exam (CRC Press, Boca Raton, 2003)

    Book  Google Scholar 

  8. N. Golgowski, The Most Common Passwords in 2016 are Truly Terrible (2017). https://www.huffingtonpost.com/entry/2016-most-common-passwords_us_587f9663e4b0c147f0bc299d. Accessed 1 Jan 2018

  9. G. Notoatmodjo, Exploring the ‘Weakest Link’: A Study of Personal Password Security (Citeseer, New York, 2007)

    Google Scholar 

  10. A. Joux, Multicollisions in iterated hash functions. Application to cascaded constructions, in Annual International Cryptology Conference, (Springer, Berlin, 2004), pp. 306–316

    Google Scholar 

  11. S. Marechal, Advances in password cracking. J. Comput. Virol. 4, 73–81 (2008)

    Article  Google Scholar 

  12. K. Scarfone, M. Souppaya, Guide to Enterprise Password Management (Draft): Recommendations of the National Institute of Standards and Technology (US Dept of Commerce, Technology Administration, National Institute of Standards and Technology, Gaithersburg, MD, 2009)

    Google Scholar 

  13. UMUC, Enterprise Network Intrusion Prevention Systems, CSEC 630 Module 1, Document posted in University of Maryland University College Prevention and Protection Strategies in Cybersecurity-CSE630 Online Classroom (2016). https://leoprdws.umuc.edu/CSEC630/1306/csec630_01/assets/csec630_01.pdf

  14. J. Valacich, C. Schneider, Information Systems Today: Managing in the Digital World with MyITLab. Policy Statement (2014)

    Google Scholar 

  15. E.E. Schultz, Types of Firewalls. Previous Screen (2014). http://www.ittoday.info/AIMS/DSM/83-10-41.pdf. Accessed 2 Jun 2016

  16. E.E. Schultz, 83-10-41 Types of Firewalls (2014). http://www.ittodayinfo/AIMS/DSM/83-10-41.pdf. https://pdfssemanticscholarorg/94f3/b35cc7a47241d8e7677478e01 e6c9029fa7dpdf. Accessed 4 Jan 2018

  17. J. Brendel, World-Wide-Web Server that Finds Optimal Path by Sending Multiple syn+ ack Packets to a Single Client. Google Patents, 2003

    Google Scholar 

  18. D. Kuipers, M. Fabro, Control Systems Cyber Security: Defense in Depth Strategies (Idaho National Laboratory (INL), 2006). https://pdfs.semanticscholar.org/8876/4aa74474ed67f327c30517f6c91b284d0eac.pdf. Accessed 21 Oct 2017

  19. C. Cobb, A. Myers, Antivirus technology. Computer Security Handbook, 6th Edn. (2009), pp. 41.1–41.14

    Google Scholar 

  20. R.J. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems (John Wiley & Sons, Hoboken, 2010)

    Google Scholar 

  21. F. Mamaghani, Evaluation and selection of an antivirus and content filtering software. Inform. Manag. Comput. Secur. 10, 28–32 (2002)

    Article  Google Scholar 

  22. D. Hadziosmanovic, D. Bolzoni, P.H. Hartel, MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. RAID (Springer, Berlin, 2010), pp. 500–501

    Google Scholar 

  23. L.A. Kadel, Designing and Implementing as Effective Information Security Program: Protecting the Data the Data Assets of Individual, Small and Large Business (SANS Institute Reading Room, 2004). https://www.sans.org/reading-room/whitepapers/hsoffice/designing-implementing-effective-information-security-program-protecting-data-assets-of-1398. Accessed 27 Jul 2016

  24. Y. Xu, M. Bailey, E. Vander Weele, F. Jahanian, CANVuS: context-aware network vulnerability scanning. International Workshop on Recent Advances in Intrusion Detection (Springer, 2010). pp. 138-57

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hossein Zare .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zare, H., Olsen, P., Zare, M.J., Azadi, M. (2018). Operating System Security Management and Ease of Implementation (Passwords, Firewalls and Antivirus). In: Latifi, S. (eds) Information Technology - New Generations. Advances in Intelligent Systems and Computing, vol 738. Springer, Cham. https://doi.org/10.1007/978-3-319-77028-4_98

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-77028-4_98

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-77027-7

  • Online ISBN: 978-3-319-77028-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics