Catálogo de publicaciones - libros

Compartir en
redes sociales


Título de Acceso Abierto

The InfoSec Handbook: An Introduction to Information Security

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Computer science

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere 2014 Directory of Open access Books acceso abierto
No requiere 2014 SpringerLink acceso abierto

Información

Tipo de recurso:

libros

ISBN impreso

978-1-4302-6382-1

ISBN electrónico

978-1-4302-6383-8

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Tabla de contenidos

Intrusion Detection and Prevention Systems

Umesh Hodeghatta Rao; Umesha Nayak

Intrusion in lay terms is unwanted or unauthorized interference and as it is unwanted or unauthorized, it is normally and mostly with bad intentions. The intention of the intrusion is to collect information related to the organization such as the structure of the internal networks or software systems like operating systems, tools / utilities, or software applications used by the organization and then initiate connections to the internal network and carry out attacks. Intrusions are normally carried out by people outside the organization. Sometimes, intrusions can be caused by internal authorized persons carrying out these attacks by misusing their authorization or by internal authorized persons who go beyond their area of authorization and such attacks also need to be protected against.

Part IV - Network Security | Pp. 225-243

Virtual Private Networks

Umesh Hodeghatta Rao; Umesha Nayak

Business has changed in the last couple of decades. Companies now have to think about having a global presence, global marketing, and logistics. Most of the organizations have branches spread across different geographies of the world. Wherever you are located, all these branches need to be connected with their headquarters data center for information. With the changing culture and environment, the demand of the sales force to be able to connect to the headquarters data center from either their homes or hotels, employees who are working from home connecting to headquarters data center is increasing and seamless connectivity to the main data center has become a necessity. Hence, there is one demand that the companies are asking from their network team: a network that is fast, safe and secure, and trustworthy that helps in communicating with all their offices wherever they are located.

Part IV - Network Security | Pp. 245-262

Data Backups and Cloud Computing

Umesh Hodeghatta Rao; Umesha Nayak

Data Backups and Cloud Computing can be treated as two separate subjects in one context and can be considered as complementary in another context. Data backups have been common since the inception of computers. Cloud computing, on the other hand, is a relatively recent phenomenon. The cloud infrastructure helps with effective data backups and low-cost disaster recovery option. Data backups help in ensuring restoration of data in case of data loss, data corruption, and data integrity issues.

Part IV - Network Security | Pp. 263-288

Physical Security and Biometrics

Umesh Hodeghatta Rao; Umesha Nayak

Physical security refers to the measures taken to protect the physical environment and infrastructure that is housing the information system resources, including hardware, software, and other networking devices against physical threats such as theft, fire, water, floods, and so on.

Part V - Physical Security | Pp. 293-306

Social Engineering

Umesh Hodeghatta Rao; Umesha Nayak

Social Engineering attacks are increasing in our well-connected world. One of the main reasons for the attacks is the availability of personal information on the Internet. For example, social media websites such as Facebook are used by attackers to collect information about people, which in turn can be used in their attacks, or can be used to initiate attacks. Through Google search / other Internet searches, through social media searches like on Facebook, and Linked In you can find significant information about the target people or target companies. Many of the images posted on the social media, like family photos, and photos of the company picnic can reveal lots of information which otherwise may not be available to the outside world. Using the information collected about the individuals, further information can be collected from their relatives and friends. The bits and pieces of the information collected from all such means can become substantial information about people and companies, which can be effectively used by attackers to initiate the attacks. Unlike in other attacks, the targets here are not primarily computers but human beings.

Part V - Physical Security | Pp. 307-323

Current Trends in Information Security

Umesh Hodeghatta Rao; Umesha Nayak

There are several trends in information security that are gaining in relevance. Three of these trends are:

Part V - Physical Security | Pp. 325-330

Bibliography

Umesh Hodeghatta Rao; Umesha Nayak

■■■

Part V - Physical Security | Pp. 331-347