Security Review Program Requirements for Intrusion Management Systems

Подробная информация о книге «Security Review Program Requirements for Intrusion Management Systems ». Сайт не предоставляет возможности читать онлайн или скачать бесплатно книгу «Security Review Program Requirements for Intrusion Management Systems »

 - «Security Review Program Requirements for Intrusion Management Systems»

О книге

Intrusion Management Systems are being used to prevent the information systems from successful intrusions and their consequences. They try to detect the intrusions as they occur and recover the information system after successful attacks. The investigation process of the intrusion is also one of the important tasks of Intrusion Management Systems. These systems have a model consisting of avoidance, assurance, detection and recovery layers. Intrusion Management Systems are used by organizations, which are aiming to protect their assets from intrusions. After the implementation of the system, continuous reviews must also be conducted in order to ensure the effectiveness of the measures taken. Such a review can achieve its goal by using principles and standards. In this book, the principles necessary to implement a successful review program for Intrusion Management Systems have been developed in the guidance of Generally Accepted System Security Principles (GASSP). Это и многое другое вы найдете в книге Security Review Program Requirements for Intrusion Management Systems

Полное название книги Security Review Program Requirements for Intrusion Management Systems
Автор
Ключевые слова компьютерная безопасность, хакерство, безопасность серверов сетей и информации
Категории Компьютеры и Internet, Компьютерная безопасность
ISBN 9783838351957
Издательство
Год 2010
Название транслитом security-review-program-requirements-for-intrusion-management-systems
Название с ошибочной раскладкой security review program requirements for intrusion management systems