Enterprise level security 1 & 2
This set comprises of Enterprise Level Security and Enterprise Level Security 2. ELS provides a modern alternative to the fortress approach to security. ELS 2 follows on from the first book, which covered the basic concepts of ELS, to give a discussion of advanced topics and solutions
Main Authors: | , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Boca Raton
CRC Press
2020
|
Edition: | 1st |
Subjects: | |
Online Access: | |
Collection: | O'Reilly - Collection details see MPG.ReNa |
Summary: | This set comprises of Enterprise Level Security and Enterprise Level Security 2. ELS provides a modern alternative to the fortress approach to security. ELS 2 follows on from the first book, which covered the basic concepts of ELS, to give a discussion of advanced topics and solutions |
---|---|
Item Description: | <p></p><p><strong>Enterprise Level Security (1)</strong></p><p><strong></strong></p><p><strong>1 Introduction</strong></p><p><strong> </strong></p><p>1.1 Problem Description</p><p>1.1.1 Success beyond Anticipation</p><p>1.1.2 But, . - It Started Long before at</p><p>1.1.2.1 A Brief History of the Development of the WWW</p><p>1 1.1.3 Fast-Forward to Today</p><p>1.2 What Is Enterprise Level Security?</p><p>1.3 Distributed versus Centralized Security</p><p>1.3.1 Case Study: Boat Design</p><p>1.3.2 Case Study Enterprise Information Technology Environment</p><p>1.3.3 Security Aspects</p><p>1.3.3.1 Confidentiality</p><p>1.3.3.2 Integrity</p><p>1.3.3.3 Availability</p><p>1.3.3.4 Authenticity</p><p>1.3.3.5 Nonrepudiation</p><p>1.4 Crafting a Security Model</p><p>1.4.1 e Assumptions</p><p>1.4.2 Tenets: Digging beneath the Security Aspects</p><p>1.5 Entities and Claims</p><p>1.5.1 Credentialing</p><p>1.6 Robust Assured Information Sharing</p><p>1.6.1 Security Requirements</p><p>1.6.2 Security Mechanisms</p><p>1.6.3 Goals and Assumptions of IA Architecture</p><p>1.6.4 Assumptions</p><p>1.6.5 A Framework for Entities in Distributed Systems</p><p>1.7 Key Concepts</p><p>1.7.1 ELS-Specific Concepts</p><p>1.7.2 Mapping between . - Tenets and Key Concepts</p><p>1.7.3 Enterprise-Level Derived Requirements</p><p>1.7.4 Mapping between Key Concepts and Derived Requirements</p><p>1.8 Two Steps Forward and One Step Back</p><p>1.9 e Approximate Time-Based Crafting</p><p>1.10 Summary</p><p> </p><p><strong>SECTION I BASICS AND PHILOSOPHY</strong></p><p><strong> </strong></p><p><strong>2 Identity</strong></p><p><strong> </strong></p><p>2.1 Who Are You?</p><p>2.2 Naming</p><p>2.3 Identity and Naming: Case Study</p><p>2.4 Implications for Information Security</p><p>2.5 Personas</p><p>2.6 Identity Summary</p><p> </p><p><strong>3 Attributes</strong></p><p><strong> </strong></p><p>3.1 Facts and Descriptors</p><p>3.2 An Attribute Ecosystem</p><p>3.3 Data Sanitization</p><p>3.3.1 Guarded an |
Physical Description: | 1 online resource illustrations (black and white) |
ISBN: | 9781000165173 1000165213 1000165175 1000165256 9781003082118 9781000165258 1003082114 9781000165210 |