Computer System Security and Solutions
Overview
This article covers the content of the Certified Information Systems Security Professional ( CISSP) examination content. The article also addresses the IEEE and ACM curriculum of the Computer System Security. The scope of the article is large and as such the article will be divided into various sections as we progress through the article. The following topics will be covered:
- Practical Security Assessments
- Internet Authentication Protocols
- Public Key Cryptography and Message Security
- Legal and Ethical Aspects of Data Center
- Human Resource security
- IT Security Plans, control and procedures
- Trusted Computing and Multilevel Security
- Buffer Overflow
- Intrusion Detection
- Malicious Software
- Access Control
- Cryptographic Tools
- User Authentication
- Database and Cloud Security
- Denial of Service Attacks
- Firewalls and Intrusion Prevention System
- Software Security
- Security Management and Risk Assessment
- Physical and Infrastructure Security
- Security Auditing
- Symmetric Encryption and Message Security
- Internet Security protocol and Standards
- Wireless Network Security
The text book of Stallings and MIT-OCW course cover broad areas and well suited for computer systems security for enterprise and small business. In case you need to implement computer security measures, please contact one of our Engineers.
References:
1.0 Computer Security- Principals and Practice- Stallings
2.0 Computer Systems security- MIT OCW Weblink