Operating System Security Management and Ease of Implementation (Passwords, Firewalls and Antivirus)

  • Hossein Zare
  • Peter Olsen
  • Mohammad Jalal Zare
  • Mojgan Azadi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 738)

Abstract

Recent widely-known hacking exploits have increased the focus on computer and network security. System users need systems to provide confidentiality, integrity, availability and authenticity for their data. Access control, firewalls, and antivirus software are three ways to provide system security. They address different aspects of computer security with complementary advantages and disadvantages.

Keywords

RABC MD4 Antivirus Cyber-attack Packet-filters 

References

  1. 1.
    M. Goodrich, R. Tamassia, Introduction to Computer Security (Addison-Wesley Publishing Company, Boston, 2010)Google Scholar
  2. 2.
    E. McCallister, T. Grance, K.A. Scarfone, Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) (Special Publication (NIST SP)-800-122, Gaithersburg, 2010)CrossRefGoogle Scholar
  3. 3.
    J.R. Vacca, Computer and Information Security Handbook (Newnes, Oxford, 2012)Google Scholar
  4. 4.
    P.W. Singer, A. Friedman, Cybersecurity: What Everyone Needs to Know (Oxford University Press, Oxford, 2014)Google Scholar
  5. 5.
    N. Li, Discretionary access control, in Encyclopedia of Cryptography and Security, (Springer, Boston, 2011), pp. 353–356Google Scholar
  6. 6.
    R. Ramakrishnan, J. Gehrke, Just the Facts 101 (9c), Facts101 Textbook Key Facts, Database Management Systems, 3rd edn. (Content Technologies, Inc., California, 2014). 9781467297936Google Scholar
  7. 7.
    C. Susan Hansche, C. John Berti, C. Hare, Official (ISC) 2 Guide to the CISSP Exam (CRC Press, Boca Raton, 2003)CrossRefGoogle Scholar
  8. 8.
    N. Golgowski, The Most Common Passwords in 2016 are Truly Terrible (2017). https://www.huffingtonpost.com/entry/2016-most-common-passwords_us_587f9663e4b0c147f0bc299d. Accessed 1 Jan 2018
  9. 9.
    G. Notoatmodjo, Exploring the ‘Weakest Link’: A Study of Personal Password Security (Citeseer, New York, 2007)Google Scholar
  10. 10.
    A. Joux, Multicollisions in iterated hash functions. Application to cascaded constructions, in Annual International Cryptology Conference, (Springer, Berlin, 2004), pp. 306–316Google Scholar
  11. 11.
    S. Marechal, Advances in password cracking. J. Comput. Virol. 4, 73–81 (2008)CrossRefGoogle Scholar
  12. 12.
    K. Scarfone, M. Souppaya, Guide to Enterprise Password Management (Draft): Recommendations of the National Institute of Standards and Technology (US Dept of Commerce, Technology Administration, National Institute of Standards and Technology, Gaithersburg, MD, 2009)Google Scholar
  13. 13.
    UMUC, Enterprise Network Intrusion Prevention Systems, CSEC 630 Module 1, Document posted in University of Maryland University College Prevention and Protection Strategies in Cybersecurity-CSE630 Online Classroom (2016). https://leoprdws.umuc.edu/CSEC630/1306/csec630_01/assets/csec630_01.pdf
  14. 14.
    J. Valacich, C. Schneider, Information Systems Today: Managing in the Digital World with MyITLab. Policy Statement (2014)Google Scholar
  15. 15.
    E.E. Schultz, Types of Firewalls. Previous Screen (2014). http://www.ittoday.info/AIMS/DSM/83-10-41.pdf. Accessed 2 Jun 2016
  16. 16.
    E.E. Schultz, 83-10-41 Types of Firewalls (2014). http://www.ittodayinfo/AIMS/DSM/83-10-41.pdf. https://pdfssemanticscholarorg/94f3/b35cc7a47241d8e7677478e01 e6c9029fa7dpdf. Accessed 4 Jan 2018
  17. 17.
    J. Brendel, World-Wide-Web Server that Finds Optimal Path by Sending Multiple syn+ ack Packets to a Single Client. Google Patents, 2003Google Scholar
  18. 18.
    D. Kuipers, M. Fabro, Control Systems Cyber Security: Defense in Depth Strategies (Idaho National Laboratory (INL), 2006). https://pdfs.semanticscholar.org/8876/4aa74474ed67f327c30517f6c91b284d0eac.pdf. Accessed 21 Oct 2017
  19. 19.
    C. Cobb, A. Myers, Antivirus technology. Computer Security Handbook, 6th Edn. (2009), pp. 41.1–41.14Google Scholar
  20. 20.
    R.J. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems (John Wiley & Sons, Hoboken, 2010)Google Scholar
  21. 21.
    F. Mamaghani, Evaluation and selection of an antivirus and content filtering software. Inform. Manag. Comput. Secur. 10, 28–32 (2002)CrossRefGoogle Scholar
  22. 22.
    D. Hadziosmanovic, D. Bolzoni, P.H. Hartel, MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. RAID (Springer, Berlin, 2010), pp. 500–501Google Scholar
  23. 23.
    L.A. Kadel, Designing and Implementing as Effective Information Security Program: Protecting the Data the Data Assets of Individual, Small and Large Business (SANS Institute Reading Room, 2004). https://www.sans.org/reading-room/whitepapers/hsoffice/designing-implementing-effective-information-security-program-protecting-data-assets-of-1398. Accessed 27 Jul 2016
  24. 24.
    Y. Xu, M. Bailey, E. Vander Weele, F. Jahanian, CANVuS: context-aware network vulnerability scanning. International Workshop on Recent Advances in Intrusion Detection (Springer, 2010). pp. 138-57Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Hossein Zare
    • 1
    • 2
  • Peter Olsen
    • 3
  • Mohammad Jalal Zare
    • 4
  • Mojgan Azadi
    • 1
    • 5
  1. 1.University of Maryland University CollegeUpper MarlboroUSA
  2. 2.Department of Health Policy and ManagementThe Johns Hopkins Center for Disparities Solution, The Johns Hopkins Bloomberg School of Public HealthBaltimoreUSA
  3. 3.Department of Computer Science and Electrical EngineeringUniversity of Maryland Baltimore County, CatonsvilleBaltimoreUSA
  4. 4.Department of Computer Science and EngineeringAzad UniversityYazdIran
  5. 5.The Johns Hopkins UniversityBaltimoreUSA

Personalised recommendations