Computer System Security and Solutions

Computer  System Security and Solutions 

Overview

 This article covers the content of the   Certified Information Systems Security Professional ( CISSP)   examination content. The article also addresses the IEEE and ACM curriculum of the Computer System Security. The scope of the article  is large and as such the article will be divided into  various sections as we  progress through the article. The following topics will be covered:

 

  1.  Practical Security Assessments
  2.  Internet Authentication Protocols
  3.  Public Key Cryptography and Message Security
  4.  Legal and Ethical Aspects of Data Center
  5.  Human Resource security
  6. IT Security Plans, control and procedures
  7. Trusted Computing and Multilevel Security
  8.  Buffer Overflow
  9. Intrusion Detection
  10.  Malicious Software
  11. Access Control
  12.  Cryptographic Tools
  13.  User Authentication
  14.  Database and Cloud  Security
  15.  Denial of Service Attacks
  16. Firewalls and Intrusion  Prevention System
  17.  Software Security
  18.  Security Management and Risk Assessment
  19.  Physical  and Infrastructure Security
  20.  Security Auditing
  21.  Symmetric Encryption and Message Security
  22.  Internet Security protocol and Standards
  23.  Wireless Network Security

     

 

The  text book of Stallings and MIT-OCW course  cover broad areas and well suited for computer systems security for enterprise and small business. In case you need to implement computer security measures, please contact one of our Engineers.

 

 References:

 1.0 Computer Security- Principals and Practice-  Stallings

2.0 Computer Systems security- MIT OCW Weblink

 

 

 

 

 

Last modified on Wednesday, 10 May 2017 21:21

Login to post comments

Media

Cyber Security
Go to top