Pub Date : 2021-09-12DOI: 10.1002/9781119505877.ch8
Stephen Northcutt
There are exactly two keys to information security or information assurance: first, configure the system and network correctly and keep it that way. Because this is impossible to do perfectly, the second key to information assurance is to know the traffic coming into and out of your network.[1] That way, if something terrible is happening you can detect it. Therefore, all the tasks that have to be done in network security break down into three phases or classes:
{"title":"Network Security Basics","authors":"Stephen Northcutt","doi":"10.1002/9781119505877.ch8","DOIUrl":"https://doi.org/10.1002/9781119505877.ch8","url":null,"abstract":"There are exactly two keys to information security or information assurance: first, configure the system and network correctly and keep it that way. Because this is impossible to do perfectly, the second key to information assurance is to know the traffic coming into and out of your network.[1] That way, if something terrible is happening you can detect it. Therefore, all the tasks that have to be done in network security break down into three phases or classes:","PeriodicalId":51851,"journal":{"name":"Information Security Journal","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73437413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.1007/978-3-030-62974-8
W. Susilo, R. Deng, F. Guo, Yannan Li, R. Intan
{"title":"Information Security: 23rd International Conference, ISC 2020, Bali, Indonesia, December 16–18, 2020, Proceedings","authors":"W. Susilo, R. Deng, F. Guo, Yannan Li, R. Intan","doi":"10.1007/978-3-030-62974-8","DOIUrl":"https://doi.org/10.1007/978-3-030-62974-8","url":null,"abstract":"","PeriodicalId":51851,"journal":{"name":"Information Security Journal","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85638182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1007/978-3-030-30215-3
Zhiqiang Lin, Charalampos Papamanthou, M. Polychronakis
{"title":"Information Security: 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings","authors":"Zhiqiang Lin, Charalampos Papamanthou, M. Polychronakis","doi":"10.1007/978-3-030-30215-3","DOIUrl":"https://doi.org/10.1007/978-3-030-30215-3","url":null,"abstract":"","PeriodicalId":51851,"journal":{"name":"Information Security Journal","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78097286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Security: Second InternationalWorkshop, ISW’99 Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings","authors":"M. Mambo, Yuliang Zheng","doi":"10.1007/3-540-47790-X","DOIUrl":"https://doi.org/10.1007/3-540-47790-X","url":null,"abstract":"","PeriodicalId":51851,"journal":{"name":"Information Security Journal","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"1999-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85593580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Security: 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 – October 2, 2002 Proceedings","authors":"A. Chan, V. Gligor","doi":"10.1007/3-540-45811-5","DOIUrl":"https://doi.org/10.1007/3-540-45811-5","url":null,"abstract":"","PeriodicalId":51851,"journal":{"name":"Information Security Journal","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74024803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}