LEADER 05732nam 2200745 a 450 001 9910451334903321 005 20200520144314.0 010 $a1-281-09617-2 010 $a9786611096175 010 $a0-08-055588-8 035 $a(CKB)1000000000404869 035 $a(EBL)328312 035 $a(OCoLC)476125519 035 $a(SSID)ssj0000075411 035 $a(PQKBManifestationID)11118724 035 $a(PQKBTitleCode)TC0000075411 035 $a(PQKBWorkID)10128674 035 $a(PQKB)11401232 035 $a(MiAaPQ)EBC328312 035 $a(CaSebORM)9780123735669 035 $a(Au-PeEL)EBL328312 035 $a(CaPaEBR)ebr10204358 035 $a(CaONFJC)MIL109617 035 $a(OCoLC)319430952 035 $a(EXLCZ)991000000000404869 100 $a20070814d2008 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aInformation assurance$b[electronic resource] $edependability and security in networked systems /$f[edited by] Yi Qian ... [et al.] 205 $a1st edition 210 $aAmsterdam ;$aBoston $cElsevier/Morgan Kaufmann$dc2008 215 $a1 online resource (577 p.) 225 1 $aThe Morgan Kaufmann series in networking 225 1 $aThe Morgan Kaufmann series in computer security 300 $aDescription based upon print version of record. 311 $a0-12-373566-1 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Information Assurance; Copyright Page; Table of Contents; Preface; Contributors; Chapter 1. Information Assurance; 1.1 Introduction; 1.2 Information Assurance: Dependability and Security of Networked Information Systems; 1.3 Book Organization; 1.4 Conclusion; References; Part I: Foundational Background on Security and Dependability Techniques; Chapter 2. Network Security; 2.1 Introduction; 2.2 Network Attacks and Security Issues; 2.3 Protection and Prevention; 2.4 Detection; 2.5 Assessment and Response; 2.6 Conclusion; References 327 $aChapter 3. Security for Distributed Systems: Foundations of Access Control 3.1 Introduction; 3.2 Identification and Authentication; 3.3 Access Control; 3.4 Access Control in Distributed Systems; 3.5 Digital Identity Management; 3.6 Conclusion; References; Chapter 4. Network Survivability; 4.1 Introduction; 4.2 Prevention Techniques; 4.3 Survivable Network Design and Traffic Restoration Concepts; 4.4 Transport Network Recovery Techniques; 4.5 Survivable Network Design Techniques; 4.6 Multilayer Issues; 4.7 Conclusion and Future Research Areas; References; Chapter 5. System Survivability 327 $a5.1 Introduction and Background 5.2 Survivability and the Impact of Fault Models; 5.3 Design for Survivability; 5.4 Decentralized Storage; 5.5 Survivability of Large Distributed Systems; 5.6 Borrowing from Well-established Fields; 5.7 Conclusion; References; Part II: Modeling the Interaction Between Dependability and Security; Chapter 6. Taxonomy and Framework for Integrating Dependability and Security; 6.1 Introduction; 6.2 Basic Concepts and Related Work; 6.3 Proposed Taxonomy and Framework; 6.4 Dependability, Security, and their Attributes; 6.5 The Means to Attain Dependability and Security 327 $a6.6 Conclusion References; Chapter 7. Stochastic Modeling Techniques for Secure and Survivable Systems; 7.1 Introduction; 7.2 Analytical Modeling Techniques; 7.3 Security Modeling; 7.4 Survivability Modeling; 7.5 Conclusion; Acknowledgment; References; Chapter 8. Integrated Dependability and Security Evaluation Using Game Theory and Markov Models; 8.1 Introduction; 8.2 Stochastic Modeling; 8.3 Predicting Attacker Behavior; 8.4 Defining and Solving the Game; 8.5 Tuning the Game Parameters; 8.6 Case Study: DNS Service; 8.7 Conclusion; References 327 $aChapter 9. Scenario Graphs Applied to Network Security 9.1 Introduction; 9.2 Algorithms for Generating Scenario Graphs; 9.3 Attack Graphs are Scenario Graphs; 9.4 Network Attack Graphs; 9.5 Example Network; 9.6 Attack Graph Analysis; 9.7 Practical Experience; 9.8 Related Work; 9.9 Future Work and Conclusion; Acknowledgments; References; Chapter 10. Vulnerability-Centric Alert Correlation; 10.1 Introduction; 10.2 Review of Alert Correlation and Related Techniques; 10.3 Attack Graph; 10.4 Alert Correlation, Hypothesis, Prediction, and Aggregation; 10.5 Conclusion; 10.6 Acknowledgments 327 $aReferences 330 $aIn today's fast paced, info centric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under 410 0$aMorgan Kaufmann series in networking. 410 0$aMorgan Kaufmann series in computer security. 606 $aComputer networks$xSecurity measures 606 $aComputer networks$xReliability 606 $aComputer security 608 $aElectronic books. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer networks$xReliability. 615 0$aComputer security. 676 $a005.8 701 $aQian$b Yi$f1962-$01056950 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910451334903321 996 $aInformation assurance$92491694 997 $aUNINA