Information systems security
-
Security is about managing risk. Without an understanding of the security risks to an organization’s information assets, too many or not enough resources might be used or used in the wrong way. Risk management also provides a basis for valuing of information assets. By identifying risk, you learn the value of particular types of information and the value of the systems that contain that information.
50p ptitd04_vt 09-05-2012 220 88 Download
-
Các máy chủ Web (Webserver) luôn là những vùng đất màu mỡ cho các hacker tìm kiếm các thông tin giá trị hay gây rối vì một mục đích nào đó. Hiểm hoạ có thể là bất cứ cái gì từ kiểu tấn công từ chối dịch vụ, quảng cáo các website có nội dung không lành mạnh, xoá, thay đổi nội dung các file hay phần mềm chứa mã nguy hiểm. Bài viết dưới đây được trình bày như những lời khuyên cho việc đảm bảo an toàn cho các máy chủ Web....
42p muathu_102 28-01-2013 145 50 Download
-
Overview Access Control Matrix model Discretionary Access Control (DAC) Mandatory Access Control (MAC) and an example model Role Based Access Control (RBAC) Access Control in Unix Sep 2009 Information Security by Van K Nguyen Hanoi University of Technology 2 .What is AC Quote from Ross Anderson (text “Security Engineering”) Its function is to control which principals (persons, processes, machines, …) have access to which resources in the system -- which files they can read, which programs they can execute, and how they share data with other principals, and so on....
58p trinhvietnambk 29-05-2013 75 9 Download
-
Malware: software designed to infiltrate or damage a computer system without the owner's informed consent Spyware: software designed to intercept or take partial control over the user's interaction with the computer, without the user's informed consent secretly monitors the user's behavior collect various types of personal information
33p trinhvietnambk 29-05-2013 65 4 Download
-
Chapter 7 - Quản trị bảo mật cho hệ thống (Security management system). After studying this chapter you will be able to: Understand the purpose of a network firewall and the kinds of firewall technology available on the market; understand the role of routers, switches, and other networking hardware in security; determine when VPN or RAS technology works to provide a secure network connection.
76p nhanmotchut_3 20-10-2016 69 5 Download
-
Lecture Security+ Certification: Chapter 9 - System hardening. The main contents of this chapter include all of the following: Disable nonessential systems, harden operating systems, harden applications, harden networks.
39p nhanmotchut_3 20-10-2016 73 5 Download
-
Chapter 2 - Authentication. After studying this chapter you will be able to: Understand AAA (3A),create strong passwords and store them securely, understand the Kerberos authentication process, understand how CHAP works, understand what mutual authentication is and why it is necessary, understand how digital certificates are created and why they are used,...
55p nhanmotchut_3 20-10-2016 64 4 Download
-
Chapter 6 - Email and web security. The main contents of this chapter include all of the following: Protect e-mail systems, list World Wide Web vulnerabilities, secure web communications, secure instant messaging.
48p nhanmotchut_3 20-10-2016 56 4 Download
-
Lecture "On safety and security of information systems: Malicious attacks" provide students with knowledge about: Malicious attack; The common types of malicious attacks; Attack tools; Malicious software;... Please refer to the detailed content of the lecture!
39p hoabingan205 12-12-2022 22 6 Download
-
Lecture "On safety and security of information systems: Introduction to information systems security" provide students with knowledge about: History of information security; Information systems security; Risks, threats, and vulnerabilities;... Please refer to the detailed content of the lecture!
59p hoabingan205 12-12-2022 15 5 Download
-
Lecture "On safety and security of information systems: Cryptography" provide students with knowledge about: Basic terminology of cryptography; History of cryptography; Symmetric cipher;... Please refer to the detailed content of the lecture!
56p hoabingan205 12-12-2022 12 5 Download
-
Lecture "On safety and security of information systems: Symmetric ciphers" provide students with knowledge about: Block cipher principles; Data encryption standard; Feistel cipher;... Please refer to the detailed content of the lecture!
41p hoabingan205 12-12-2022 13 5 Download
-
Lecture "On safety and security of information systems: Symmetric ciphers advanced encryption standard" provide students with knowledge about: AES Origins; AES Structure; AES Key Expansion; An AES Example;... Please refer to the detailed content of the lecture!
38p hoabingan205 12-12-2022 16 5 Download
-
Lecture "On safety and security of information systems: Asymmetric ciphers" provide students with knowledge about: principles of public-Key cryptosystems; RSA algorithm;... Please refer to the detailed content of the lecture!
23p hoabingan205 12-12-2022 13 5 Download
-
Lecture "On safety and security of information systems: Cryptographic hash funtionns" provide students with knowledge about: Hash function; Applications of cryptographic hash functions; Simple hash functions; Requirements and security;... Please refer to the detailed content of the lecture!
22p hoabingan205 12-12-2022 15 5 Download
-
Lecture "On safety and security of information systems: Firewall" provide students with knowledge about: Firewall concept; Commercial firewalls; Selecting a firewall system;... Please refer to the detailed content of the lecture!
26p hoabingan205 12-12-2022 22 5 Download
-
Lecture "On safety and security of information systems: Access control" provide students with knowledge about: Four parts of access control; Types of access control; Formal models of access control;... Please refer to the detailed content of the lecture!
18p hoabingan205 12-12-2022 12 5 Download
-
Report "Accounting information system: E-Commerce business and accounting problems in E-commerce" has present the content: overview E-commerce and Accounting Information System (AIS); problems with accounting information systems at enterprises; information security; ensure that electronic systems for transmitting, receiving, and processing customer order information operate efficiently and provide accurate information;...
16p minhlong26052001 08-08-2022 18 8 Download
-
The overall research objective of the thesis is to find solutions to perfect the organization of AIS at Vietnamese securities companies. Identify a theoretical framework for the organization of AIS at securities companies as a basis for the research process. Survey, analyze and assess the status of the organization of AIS at Vietnamese securities companies.
36p kequaidan6 15-07-2020 16 1 Download
-
In this article the work of the components of information of protection tools on the occurring violations, their types and the elimination of these violations and the possible trajectory of a change over time of the functioning states of information of protection tools with a discrete time are researched.
10p lucastanguyen 01-06-2020 22 3 Download