INSPIRING FUTURES

Security and forensic computing: introduction to computer security.

Buchanan, William J (2011) Security and forensic computing: introduction to computer security. [Video]

This is the latest version of this item.

[img] HTML
Available under License Creative Commons Attribution Non-commercial.

Download (526B)

    Abstract/Description

    1 INTRODUCTION 14
    1.1 The Industrial and the Information Age 14
    1.2 CIA and AAA 15
    1.3 Protecting against intruders 16
    1.4 Users, systems and data 17
    1.5 Security and Forensic Computing 19
    1.6 ISO 27002 21
    1.7 Risks 22
    Annual Loss Expectancy 22
    1.8 Risk management 24
    1.9 Security policies 25
    1.10 Defining the policy 26
    1.11 Example risks 28
    1.12 Defence-in-depth 29
    1.13 Gateways and DMZ (Demilitarized Zones) 30
    1.14 Layered model and security 31
    1.15 Encryption and a layered approach to defence 33

    Item Type: Video
    Uncontrolled Keywords: Data security; authentication; authorization; confidentiality; assurance; integrity; network infrastructure; trojans; worms; data mining; industrial espionage; forensic computing investigation; ISO 27002;
    University Divisions/Research Centres: Faculty of Engineering, Computing and Creative Industries > School of Computing
    Dewey Decimal Subjects: 000 Computer science, information & general works > 000 Computer science, knowledge & systems > 005 Computer programming, programs & data > 005.8 Data security
    Library of Congress Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
    Item ID: 4043
    Depositing User: Professor Bill Buchanan
    Date Deposited: 06 Jan 2011 14:54
    Last Modified: 21 Mar 2012 16:47
    URI: http://researchrepository.napier.ac.uk/id/eprint/4043

    Available Versions of this Item

    Actions (login required)

    View Item

    Document Downloads

    More statistics for this item...

    Edinburgh Napier University is a registered Scottish charity. Registration number SC018373