Abstract
Recent widely-known hacking exploits have increased the focus on computer and network security. System users need systems to provide confidentiality, integrity, availability and authenticity for their data. Access control, firewalls, and antivirus software are three ways to provide system security. They address different aspects of computer security with complementary advantages and disadvantages.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
M. Goodrich, R. Tamassia, Introduction to Computer Security (Addison-Wesley Publishing Company, Boston, 2010)
E. McCallister, T. Grance, K.A. Scarfone, Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) (Special Publication (NIST SP)-800-122, Gaithersburg, 2010)
J.R. Vacca, Computer and Information Security Handbook (Newnes, Oxford, 2012)
P.W. Singer, A. Friedman, Cybersecurity: What Everyone Needs to Know (Oxford University Press, Oxford, 2014)
N. Li, Discretionary access control, in Encyclopedia of Cryptography and Security, (Springer, Boston, 2011), pp. 353–356
R. Ramakrishnan, J. Gehrke, Just the Facts 101 (9c), Facts101 Textbook Key Facts, Database Management Systems, 3rd edn. (Content Technologies, Inc., California, 2014). 9781467297936
C. Susan Hansche, C. John Berti, C. Hare, Official (ISC) 2 Guide to the CISSP Exam (CRC Press, Boca Raton, 2003)
N. Golgowski, The Most Common Passwords in 2016 are Truly Terrible (2017). https://www.huffingtonpost.com/entry/2016-most-common-passwords_us_587f9663e4b0c147f0bc299d. Accessed 1 Jan 2018
G. Notoatmodjo, Exploring the ‘Weakest Link’: A Study of Personal Password Security (Citeseer, New York, 2007)
A. Joux, Multicollisions in iterated hash functions. Application to cascaded constructions, in Annual International Cryptology Conference, (Springer, Berlin, 2004), pp. 306–316
S. Marechal, Advances in password cracking. J. Comput. Virol. 4, 73–81 (2008)
K. Scarfone, M. Souppaya, Guide to Enterprise Password Management (Draft): Recommendations of the National Institute of Standards and Technology (US Dept of Commerce, Technology Administration, National Institute of Standards and Technology, Gaithersburg, MD, 2009)
UMUC, Enterprise Network Intrusion Prevention Systems, CSEC 630 Module 1, Document posted in University of Maryland University College Prevention and Protection Strategies in Cybersecurity-CSE630 Online Classroom (2016). https://leoprdws.umuc.edu/CSEC630/1306/csec630_01/assets/csec630_01.pdf
J. Valacich, C. Schneider, Information Systems Today: Managing in the Digital World with MyITLab. Policy Statement (2014)
E.E. Schultz, Types of Firewalls. Previous Screen (2014). http://www.ittoday.info/AIMS/DSM/83-10-41.pdf. Accessed 2 Jun 2016
E.E. Schultz, 83-10-41 Types of Firewalls (2014). http://www.ittodayinfo/AIMS/DSM/83-10-41.pdf. https://pdfssemanticscholarorg/94f3/b35cc7a47241d8e7677478e01 e6c9029fa7dpdf. Accessed 4 Jan 2018
J. Brendel, World-Wide-Web Server that Finds Optimal Path by Sending Multiple syn+ ack Packets to a Single Client. Google Patents, 2003
D. Kuipers, M. Fabro, Control Systems Cyber Security: Defense in Depth Strategies (Idaho National Laboratory (INL), 2006). https://pdfs.semanticscholar.org/8876/4aa74474ed67f327c30517f6c91b284d0eac.pdf. Accessed 21 Oct 2017
C. Cobb, A. Myers, Antivirus technology. Computer Security Handbook, 6th Edn. (2009), pp. 41.1–41.14
R.J. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems (John Wiley & Sons, Hoboken, 2010)
F. Mamaghani, Evaluation and selection of an antivirus and content filtering software. Inform. Manag. Comput. Secur. 10, 28–32 (2002)
D. Hadziosmanovic, D. Bolzoni, P.H. Hartel, MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. RAID (Springer, Berlin, 2010), pp. 500–501
L.A. Kadel, Designing and Implementing as Effective Information Security Program: Protecting the Data the Data Assets of Individual, Small and Large Business (SANS Institute Reading Room, 2004). https://www.sans.org/reading-room/whitepapers/hsoffice/designing-implementing-effective-information-security-program-protecting-data-assets-of-1398. Accessed 27 Jul 2016
Y. Xu, M. Bailey, E. Vander Weele, F. Jahanian, CANVuS: context-aware network vulnerability scanning. International Workshop on Recent Advances in Intrusion Detection (Springer, 2010). pp. 138-57
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Zare, H., Olsen, P., Zare, M.J., Azadi, M. (2018). Operating System Security Management and Ease of Implementation (Passwords, Firewalls and Antivirus). In: Latifi, S. (eds) Information Technology - New Generations. Advances in Intelligent Systems and Computing, vol 738. Springer, Cham. https://doi.org/10.1007/978-3-319-77028-4_98
Download citation
DOI: https://doi.org/10.1007/978-3-319-77028-4_98
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-77027-7
Online ISBN: 978-3-319-77028-4
eBook Packages: EngineeringEngineering (R0)