INSPIRING FUTURES

Security and forensic computing: introduction to computer security.

Buchanan, William J (2011) Security and forensic computing: introduction to computer security. [Video]

This is the latest version of this item.

[img] HTML
sfc_unit01.html
Available under License Creative Commons Attribution Non-commercial.

Download (526B)

Abstract/Description

1 INTRODUCTION 14
1.1 The Industrial and the Information Age 14
1.2 CIA and AAA 15
1.3 Protecting against intruders 16
1.4 Users, systems and data 17
1.5 Security and Forensic Computing 19
1.6 ISO 27002 21
1.7 Risks 22
Annual Loss Expectancy 22
1.8 Risk management 24
1.9 Security policies 25
1.10 Defining the policy 26
1.11 Example risks 28
1.12 Defence-in-depth 29
1.13 Gateways and DMZ (Demilitarized Zones) 30
1.14 Layered model and security 31
1.15 Encryption and a layered approach to defence 33

Item Type: Video
Uncontrolled Keywords: Data security; authentication; authorization; confidentiality; assurance; integrity; network infrastructure; trojans; worms; data mining; industrial espionage; forensic computing investigation; ISO 27002;
University Divisions/Research Centres: Faculty of Engineering, Computing and Creative Industries > School of Computing
Dewey Decimal Subjects: 000 Computer science, information & general works > 000 Computer science, knowledge & systems > 005 Computer programming, programs & data > 005.8 Data security
Library of Congress Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Item ID: 4043
Depositing User: Professor Bill Buchanan
Date Deposited: 06 Jan 2011 14:54
Last Modified: 21 Mar 2012 16:47
URI: http://researchrepository.napier.ac.uk/id/eprint/4043

Available Versions of this Item

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

Edinburgh Napier University is a registered Scottish charity. Registration number SC018373