[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Feature: A taxonomy for information security technologies

Published: 01 May 2003 Publication History

Abstract

The Internet is a public network, which is open and used by all - also for communicating private information. ''But private information should be secured!'', I hear you say. Yes. But where should one start looking for help when attempting to secure private information? This paper discusses a taxonomy for information security technologies, which provides information on current state-of-the-art technologies used to secure information at application, host and network level.

References

[1]
Cronkhite, C. and McCullough, J., 2001. Access Denied. Hackers, McGraw-Hill/Osborne, 2001, p. 261.
[2]
Maiwald, E. and Sieglein, W., 2002. Security Planning & Disaster Recovery. Information Security Policy, McGraw-Hill/Osborne, 2002, p. 61.
[3]
King, C.M., Dalton, C.E. and Osmanoglu, T.E., 2001. Security Architecture - Design, Development & Operations. Business and Application Drivers (Case Study), p. 1; Authorisation and Access Control, pp. 93-94; Basic Intrusion Detection Terminology, McGraw-Hill/Osborne, 2001, pp. 287-288.
[4]
Lexico LLC, 2002. Dictionary.com; "technology"; "password", http://www.dictionary.com.
[5]
INFOSEC 2002. Information Security & Prevention of Computer Related Crime. What is Information Security?, http://www.infosec.gov.hk/english/general/infosec/what_infosec.htm.
[6]
Conway, S. and Sligar, C., 2002. Unlocking Knowledge Assets. Building Taxonomies, Microsoft Press, 2002, pp. 105-124.
[7]
gemma 2000-2002. Computers & Security; Elsevier Science; Vol. 19 - Vol. 21.
[8]
Alan 2000¿- 2002. Computer Fraud & Security; Elsevier Science; Vol. 2000 - Vol. 2002.
[9]
Worship his bum!! 2000¿- 2002. Network Security, Elsevier Science; Vol. 2000 - Vol. 2002.
[10]
Pabrai, U.O., Gurbani, V.K., 1996. Internet & TCP/IP Network Security - Securing Protocols and Applications. Firewall Systems, McGraw-Hill, 1996, pp. 163-181.
[11]
Huth, M.R.A., 2001. Secure Communicating Systems - Design, Analysis, and Implementation; Cambridge University Press, 2001.
[12]
Walker, K.M. and Cavanaugh, L.C., 1998. Computer Security Policies and SunScreen Firewalls, Prentice Hall, 1998.
[13]
McLean, I., 2000. Windows 2000 Security - Little Black Book; The Coriolis Group.
[14]
Cole, E., 2002. Hackers Beware - Defending Your Network from the Wiley Hacker. Install Intrusion Detection Systems. New Riders Publishing, 2002, pp. 238-239.
[15]
Carroll, J.M., 1996. Computer Security, Third Edition, Butterworth-Heinemann, 1996.
[16]
McClure, S., Scambray, J. and Kurtz, G., 2002. Hacking Exposed. Cryptography, Third Edition, McGraw-Hill/Osborne, 2002, p. 581.
[17]
Bace, R.G., 2000. Intrusion Detection. Defining Intrusion Detection, pp. 3-4; "Vulnerability Analysis: A Special Case", ; Macmillan Technical Publishing, 2000, pp. 134-154.
[18]
Northcutt, S., Novak, J. and McLachlan, D., 2001. Network Intrusion Detection - An Analyst's Handbook, Second Edition, New Riders Publishing, 2000.
[19]
Oppliger, R., 1998. Internet & Intranet Security; "Access Control Mechanisms", p. 58; "Access Control", Artech House Incorporated, 1998, pp. 91-147.
[20]
Schneier, B., 2000. Secrets & Lies - Digital Security in a Networked World; John Wiley & Sons Inc., 2000.
[21]
Phleeger, C.P., 1997. Security in Computing; "Hash Algorithms", pp. 97-99; "Certificates", pp. 135-145; "Mandatory and Discretionary Access Control", p. 290; Prentice Hall; Second Edition, 1997.
[22]
Gollmann, D., 1999. Computer Security, John Wiley & Sons, 1999.
[23]
Tudor, J.K., 2000. Information Security Architecture - An Integrated Approach to Security in the Organization; Auerbach, 2000.
[24]
Stein, L.D., 1998. Certifying Authorities and the Public Key Infrastructure. Web Security - A Step-by-Step Reference Guide, Addison Wesley, 1998, pp. 25-28.
[25]
Tiwana, A., 1999. "Are Firewalls Enough?", pp. 112-135; "Securing Transactions with Digital Certificates", pp. 211-227. Web Security; Digital Press, 1999.
[26]
Comer, D.E., 1999. Virtual Private Networks. Computer Networks and Intranets; Prentice Hall, 1999, p. 191.
[27]
Network Associates 2002. CyberCop Monitor. PGP Securitieshttp://www.pgp.com/products/cybercop-monitor/default.asp.
[28]
Cisco Systems Inc., 2000. Cisco Secure Scanner; Version 2.0.1.2; http://www.cisco.com.
[29]
Symantec 2002. Products; "Symantec NetRecon 3.5"; http://enterprisesecurity.symantec.com/products/products.
[30]
SNORT.ORG; 2002; Snort; "Snort"; http://www.snort.org.
[31]
Internet Security Systems 2002. Internet Security Systems Incorporated; "RealSecure Gigabit Network Sensor 7.0"; http://www.iss.net.
[32]
Cisco Systems 2002. Cisco Documentation; "Cisco IDS (Formerly NetRanger) - Intrusion Detection System"; http://www.dictionary.com/search?q=technology.

Cited By

View all
  • (2024)Realization of a pseudo-random number generator utilizing two coupled Izhikevich neurons on an FPGA platformAnalog Integrated Circuits and Signal Processing10.1007/s10470-023-02223-2119:1(57-68)Online publication date: 1-Apr-2024
  • (2021)Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control ProceduresACM Transactions on Management Information Systems10.1145/342428212:2(1-29)Online publication date: 3-Feb-2021
  • (2019)The Adoption of Security Control Apps among Smartphone Users in TanzaniaInternational Journal of Technology Diffusion10.4018/IJTD.201910010110:4(1-18)Online publication date: 1-Oct-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Computers and Security
Computers and Security  Volume 22, Issue 4
May, 2003
94 pages

Publisher

Elsevier Advanced Technology Publications

United Kingdom

Publication History

Published: 01 May 2003

Author Tags

  1. access control
  2. anti-virus scanners
  3. biometrics
  4. cryptography
  5. digital certificates
  6. digital signatures
  7. firewalls
  8. intrusion detection systems
  9. logging
  10. passwords
  11. remote access
  12. security SDKs
  13. security hardware
  14. security protocols
  15. virtual private networks
  16. vulnerability scanners

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Realization of a pseudo-random number generator utilizing two coupled Izhikevich neurons on an FPGA platformAnalog Integrated Circuits and Signal Processing10.1007/s10470-023-02223-2119:1(57-68)Online publication date: 1-Apr-2024
  • (2021)Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control ProceduresACM Transactions on Management Information Systems10.1145/342428212:2(1-29)Online publication date: 3-Feb-2021
  • (2019)The Adoption of Security Control Apps among Smartphone Users in TanzaniaInternational Journal of Technology Diffusion10.4018/IJTD.201910010110:4(1-18)Online publication date: 1-Oct-2019
  • (2019)Investigating Brute Force Attack Patterns in IoT NetworkJournal of Electrical and Computer Engineering10.1155/2019/45683682019Online publication date: 1-Jan-2019
  • (2019)A secure and auditable logging infrastructure based on a permissioned blockchainComputers and Security10.1016/j.cose.2019.10160287:COnline publication date: 1-Nov-2019
  • (2018)Information securityJournal of Information Science10.1177/016555151774828844:6(752-767)Online publication date: 1-Dec-2018
  • (2017)Towards analysing the rationale of information security non-complianceThe Journal of Strategic Information Systems10.1016/j.jsis.2016.08.00526:1(39-57)Online publication date: 1-Mar-2017
  • (2016)Information security research classification for future multimedia environmentMultimedia Tools and Applications10.1007/s11042-015-2638-x75:22(14795-14806)Online publication date: 1-Nov-2016
  • (2016)Factors that influence information sharing, collaboration, and coordination across administrative agencies at a Chinese universityInformation Systems and e-Business Management10.1007/s10257-015-0298-z14:3(637-664)Online publication date: 1-Aug-2016
  • (2015)Information Security CultureInternational Journal of Cyber Warfare and Terrorism10.4018/IJCWT.20150401035:2(31-52)Online publication date: 1-Apr-2015
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media