Information Systems Vulnerabilities
Downloads
The world has become increasingly dependent on information technology (IT) and the remarkable services that it offers - particularly with regards to the Internet and modern computer systems. As a result, there is an ever-increasing need to secure these resources and the assets that are in contact with them from attack. It is imperative that users be aware of the potential security risks that face them so that they can allocate sufficient resources to minimize the dangers that these threats pose to their organization(s). This essay addresses various facets of IT security and offers insight into the different areas that should be considered when attempting to adequately protect a system. The paper begins by discussing the various Internet security problems facing networks today, such as software vulnerabilities, etc. Next, this document discusses factors that have contributed to successful attacks on various organizations within the IT community. It concludes with a discussion of pertinent security objectives and an outline featuring a variety of topics that will help facilitate the development of a successful security model.
Downloads
Internet Engineering Task Force RFC 2828 Internet Security Glossary.
ISO/IEC, "Information technology -- Security techniques - Information security risk management" ISO/IEC FIDIS 27005:2008.
Kakareka, Almantas (2009). "23". In Vacca, John. Computer and Information Security Handbook. Morgan Kaufmann Publications. Elsevier Inc. p. 393. ISBN 978-0-12-374354-1.
Krsul, Ivan (April 15, 1997). "Technical Report CSD-TR-97-026". The COAST Laboratory Department of Computer Sciences, Purdue University. CiteSeerX: 10.1.1.26.5435.
Ross Anderson. Why Cryptosystems Fail. Technical report, University Computer Laboratory, Cam- bridge, January 1994.
Neil Schlager. When Technology Fails: Significant Technological Disasters, Accidents, and Failures of the Twentieth Century. Gale Research Inc., 1994.
Hacking: The Art of Exploitation Second Edition.
Kiountouzis, E. A.; Kokolakis, S. A. Information systems security: facing the information society of the 21st century. London: Chapman & Hall, Ltd. ISBN 0-412-78120-4.
Bavisi, Sanjay (2009). "22". In Vacca, John. Computer and Information Security Handbook. Morgan Kaufmann Publications. Elsevier Inc. p. 375. ISBN 978-0-12-374354-1.




