Cargando…

Cyberspace and cybersecurity

Vulnerabilities in Information SystemsIntroductionMeasuring VulnerabilityAvoiding Vulnerabilities through Secure CodingMistakes Can Be GoodThreats ClassificationThreat Modeling ProcessSecurity Starts at HomeSecurity in ApplicationsInternational AwarenessExercisesVulnerabilities in the OrganizationIn...

Descripción completa

Detalles Bibliográficos
Autor principal: Kostopoulos, George
Lenguaje:eng
Publicado: CRC Press 2012
Materias:
Acceso en línea:http://cds.cern.ch/record/2018845
Descripción
Sumario:Vulnerabilities in Information SystemsIntroductionMeasuring VulnerabilityAvoiding Vulnerabilities through Secure CodingMistakes Can Be GoodThreats ClassificationThreat Modeling ProcessSecurity Starts at HomeSecurity in ApplicationsInternational AwarenessExercisesVulnerabilities in the OrganizationIntroductionCommon Organizational VulnerabilitiesAccess Authorization and AuthenticationHuman FactorsSecurity ServicesExternal TechnologiesWireless NetworksBluetooth     Passive Vulnerabilities     Active Vulnerabilities     PrecautionsWireless Fidelity     Wi-Fi Precautions at Home     Wi-Fi Precauti