Title Details: | |
Information and Security Systems Laboratory |
|
Authors: |
Mavridis, Ioannis |
Reviewer: |
Fouliras, Panagiotis |
Subject: | MATHEMATICS AND COMPUTER SCIENCE > MATHEMATICS AND COMPUTER SCIENCE > > MATHEMATICS AND COMPUTER SCIENCE > > MATHEMATICS AND COMPUTER SCIENCE > > > MATHEMATICS AND COMPUTER SCIENCE > > |
Keywords: |
Information Security
Security Models Operating Systems Database Security Security Policies Audit Policy Authentication Passwords Access Control Malware Risk Analysis |
Description: | |
Abstract: |
Interactive (hands-on or demonstration type) laboratory exercises designed to enable the reader to apply the knowledge acquired during the study of the main text for the Information and Systems Security course. The student will be able to: (a) be assisted in the practical application of the fundamental concepts and issues of information and systems security; (b) see in practice the application of what he/she has assimilated by studying the relevant theoretical background, such as security policies and models; (c) gain knowledge and experience on the basic protection techniques and new directions in the development of secure information systems. In addition to the first chapter, which deals with the appropriate preparation for the workshop, twelve (12) chapters are listed, one for each laboratory course.
|
Technical Editors: |
Salonikias, Stavros Tsinganos, Nikolaos |
Type: |
Laboratory Guide |
Creation Date: | 2015 |
Item Details: | |
ISBN |
978-960-603-192-2 |
License: |
Attribution – NonCommercial – NoDerivatives 4.0 International (CC BY-NC-ND 4.0) |
DOI | http://dx.doi.org/10.57713/kallipos-910 |
Handle | http://hdl.handle.net/11419/525 |
Bibliographic Reference: | Mavridis, I. (2015). Information and Security Systems Laboratory [Laboratory Guide]. Kallipos, Open Academic Editions. https://dx.doi.org/10.57713/kallipos-910 |
Language: |
Greek |
Consists of: |
1. Laboratory Prpeparation 2. Authentication and Indetification 3. Password Management and Attacks 4. Recording and Monitoring User Actions 5. Access Control to Operating Systems 6. Database Integrity Constraints 7. Access Control in Database Management Systems 8. Role - based access control 9. Static malware analysis 10. Dynamic malware analysis 11. Risk Analysis and Management 12. Common Criteria Security Assessment 13. Access Control with Firewall |
Number of pages |
213 |
Publication Origin: |
Kallipos, Open Academic Editions |
You can also view | |
User comments | |
There are no published comments available! | |