TITLE

Changing Security Theory to Security Practice

AUTHOR(S)
Payne, Lynne
PUB. DATE
January 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;Jan2010, Vol. 47 Issue 1, p60
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports that Information Security (IS) professionals must be committed to professional development that incorporates the best practices. It states that IS professionals must be able to manage security functions which include access control and site security, transmission control protocol/information processing (TCP/IP), and cryptography and cryptographic systems. It also says that IS professionals must be experts in Cyber Forensics.
ACCESSION #
50800558

 

Related Articles

  • TCP-aware bidirectional bandwidth allocation in IEEE 802.16 networks. Park, Eun-Chan; Kim, Hwangnam // Wireless Networks (10220038);Nov2010, Vol. 16 Issue 8, p2123 

    In this paper, we propose a bidirectional bandwidth-allocation mechanism to improve TCP performance in the IEEE 802.16 broadband wireless access networks. By coupling the bandwidth allocation for uplink and downlink connections, the proposed mechanism increases the throughput of the downlink TCP...

  • ARP Cache Poisoning Attack and Detection. Al-Qarni, Fatimah mohammed // International Journal of Computer Science & Information Security;Jul2012, Vol. 10 Issue 7, p69 

    The article offers information on the address resolution protocol (ARP) cache poisoning. ARP refers to transmission control protocol/Internet protocol (TCP/IP) used by computers to map IP to physical addresses. It describes how, ARP cache poisoning attack can be conducted, how password stealing...

  • Improving Performance of Remote TCP in Cognitive Radio Networks. Hyun Yang; Sungrae Cho; Chang Yun Park // KSII Transactions on Internet & Information Systems;Sep2012, Vol. 6 Issue 9, p2323 

    Recent advances in cognitive radio technology have drawn immense attention to higher layer protocols above medium access control, such as transmission control protocol (TCP). Most proposals to improve the TCP performance in cognitive radio (CR) networks have assumed that either all nodes are in...

  • The Design of A Campus Access Control System Based on ARM. Pengwei Fei; Gaowei Zhan; Jiecong Nie; Yingzhong Tian // Advanced Materials Research;2014, Issue 1039, p433 

    Nowadays, with the in-depth development of networking, informatization and integration the access control system has become more and more popular and important in campus. Most access control systems were developed based on MCU with the characteristics of fixed functions and hardly to extend. A...

  • A GROUP KEY MANAGEMENT APPROACH FOR MULTICAST CRYPTOSYSTEMS. SARADHI, M.V. VIJAYA; KRISHNA, BH. RAVI // Journal of Theoretical & Applied Information Technology;2/1/2010, Vol. 12 Issue 1/2, p104 

    The security in the multicast communication in the large groups is the major obstacles for effectively controlling access to the transmitting data. The IP Multicast itself does not provide any specific mechanisms to control the intruders in the group communication. Group key management is mainly...

  • Are Your Doors Locked? Engebretson, David // SDM: Security Distributing & Marketing;Feb2007, Vol. 37 Issue 2, p56 

    The author reflects on how security systems can best utilize the power of networking and the Internet. He says that the doors of networks are the TCP/IP or the transmission control protocol software ports which provide device-to-device session connections. Tips on how to find open ports on...

  • Demystifying Data Transport.  // Security: Solutions for Enterprise Security Leaders;Feb2006, Vol. 43 Issue 2, p46 

    The article reports focuses on Transmission Control Protocol/Internet Protocol (TCP/IP), the most common protocol for transmitting all types of data on computer networks in the U.S. It acts as a carrier for many other protocols. Its use in network security video is the basis for enabling images...

  • Network-based Steganography using Encryption in TCP/IP Header. Rana, Joshi; Amanpreetkaur; Malik, Nitin // International Journal of Computer Applications;Jul2013, Vol. 74 Issue 1-21, p12 

    Steganography, introduced in 2003, is a techniques used for hidden communication between two covert parties. It is an art of hidden communication. It also relates to the areas like network protocols and security for practical data hiding in communication networks using Transmission Control...

  • Bonk Attack.  // Network Dictionary;2007, p72 

    A definition of the term "Bonk Attack" is presented. It refers to a type of denial of service (DoS) attack. The Bonk attack manipulates a field in TCP/IP packets, called a fragment offset. It is noted that the field tells a computer how to reconstruct a packet that was broken up because it was...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics