23.10.2014 Views

BIS Self-Study Appendices - University of Nebraska Omaha

BIS Self-Study Appendices - University of Nebraska Omaha

BIS Self-Study Appendices - University of Nebraska Omaha

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.4.5 Authorization<br />

3.4.6 Availability<br />

3.4.7 Accuracy<br />

3.4.8 Confidentiality<br />

3.4.9 Accountability<br />

3.4.10 Administration<br />

3.5 Detection 1.5<br />

3.5.1 Intruder Types<br />

3.5.2 Intrusion Methods<br />

3.5.3 Intrusion Process<br />

3.5.4 Detection Methods<br />

3.6 Reaction 1.5<br />

3.6.1 Incident Determination<br />

3.6.2 Incident Notification<br />

3.6.3 Incident Containment<br />

3.6.4 Assessing Damage<br />

3.6.5 Incident Recovery<br />

3.6.6 Automated Response<br />

3.7 Reflection 1.5<br />

3.7.1 Incident Documentation<br />

3.7.2 Incident Evaluation<br />

3.7.3 Legal Prosecution<br />

3.7.4 The Future <strong>of</strong> Information Security<br />

3.8 What is Security Engineering 1.5<br />

3.9 Protocols 1.5<br />

3.10 Passwords 1.5<br />

3.11 Access Controls 1.5<br />

3.12 Cryptography 1.5<br />

3.13 Distributed Systems 1.5<br />

3.14 Multilevel Security 1.5<br />

3.15 Multilateral Security 1.5<br />

3.16 Banking and Bookkeeping 1.5<br />

3.17 Monitoring Systems 1.5<br />

3.18 Nuclear Command and Control 1.5<br />

3.19 Security Printing and Seals 1.5<br />

3.20 Biometrics 1.5<br />

3.21 Physical Tamper Resistance 1.5<br />

3.22 Emission Security 1.5<br />

3.23 Electronic and Information Warfare 1.5<br />

3.24 Telecom System Security 1.5<br />

3.25 Network Attack and Defense 1.5<br />

3.26 Protecting E-Commerce Systems 1.5<br />

-103-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!