Principles of Secure Network Systems Design

Author:   Sumit Ghosh ,  H. Lawson
Publisher:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of the original 1st ed. 2002
ISBN:  

9781461265382


Pages:   209
Publication Date:   08 September 2012
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Principles of Secure Network Systems Design


Add your own review!

Overview

As e-commerce becomes the norm of business transactions and information be­ comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be useful and become widespread, contain significant unnecessary complexity. This complexity provides many loopholes that make systems and practices vulnerable to malicious attacks by hackers as well as by individual and organized criminals. FUrther, there are enormous risks due to malfunction of the systems. The holes in the network system cannot simply be plugged up by the use of cryptography and firewalls. While many changes need to be made in operating systems and system software with respect to security, this alone does not solve the problem. The problems cannot be solved by addressing only a single key aspect of network security. A holistic approach is required. Sumit Ghosh has provided in this book such a holistic view of the area of network security. Thus, it is a most welcome contribution.

Full Product Details

Author:   Sumit Ghosh ,  H. Lawson
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of the original 1st ed. 2002
Dimensions:   Width: 15.50cm , Height: 1.20cm , Length: 23.50cm
Weight:   0.373kg
ISBN:  

9781461265382


ISBN 10:   146126538
Pages:   209
Publication Date:   08 September 2012
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

1 Evolution of Network Security and Lessons Learned from History.- 1.1 Introduction.- 1.2 History of Security and Its Influence on Information Networks.- 1.3 Lessons Learned from History.- 1.4 Growing Interest in Network Security.- 1.5 Origin and Nature of Security in Networks.- 1.6 Principal Characteristics of Network Security.- 1.7 Secure Network Designs Through Modeling and Simulation.- 1.8 Problems and Exercises.- 2 A Fundamental Framework for Network Security.- 2.1 Introduction.- 2.2 The Changing Paradigm of Network Security.- 2.3 Review of the Literature on Network Security.- 2.4 The National Security Agency’s Network Rating Model (NRM).- 2.5 A Fundamental Framework for Network Security.- 2.6 Uses of the Fundamental Framework for Network Security.- 2.7 Problems and Exercises.- 3 User-Level Security on Demand in ATM Networks: A New Paradigm.- 3.1 Review of the Literature on Security in ATM Networks.- 3.2 The Need for User-Level Security on Demand.- 3.3 Security on Demand in ATM Networks.- 3.4 Problems and Exercises.- 4 The Concept of Node Status Indicator (NSI) and Performance Analysis.- 4.1 Introduction.- 4.2 The Concept of Node Status Indicator (NSI): Refinind Distributed Resource Allocation.- 4.3 Modeling Security on Demand for a Representative ATM Network and Implementation Issues.- 4.4 Synthesis of the Input Traffic for Network Performance Analysis Under Security on Demand.- 4.5 The Design of Experiments, Simulation Results, and Performance Analysis.- 4.6 Problems and Exercises.- 5 “Mixed-Use” Network.- 5.1 Introduction.- 5.2 Mixed-use Networks: Integrating the Military’s Secure ATM Networks with the Public ATM Infrastructure.- 5.3 Modeling and Distributed Simulation of the Representative ATM Networks.- 5.4 Call Setup in a Mixed-Use ATM Network.- 5.5Modeling the Represent ative ATM Networks.- 5.6 Simulation Experiments and Performance Analysis.- 5.7 Problems and Exercises.- 6 Synthesis of Security Attack Models for ATM Networks.- 6.1 Brief Review of the Current Literature on Attack Models.- 6.2 Fundamental Characteristics of ATM Networks.- 6.3 Synthesis of Security Attack Models for ATM Networks.- 6.4 Modeling, Simulation, and Behavior Analysis of Security Attack Models.- 6.5 Problems and Exercises.- 7 Complex Vulnerabilities and Highly Sophisticated Attacks.- 7.1 Influence of Source Traffic Distribution on Quality of Service.- 7.2 Susceptability of the Traditional ATM Output Buffer Architecture to UNI-Compliant Traffic.- 7.3 Problems and Exercises.- 8 Future Issues in Information Systems Security.- References.

Reviews

From the reviews: ¿Network desingers, engineers, practitioners, and managers will find in this book a systematica and practical approach to hardening networks against attacks. The book is aimed at a wide audience that also includes graduate and senior undergraduate students, policy makers, and consultants in various sectors, including industry, miltary and government....this interesting and information-packed book fulfils its purpose and will be very useful for students, network security professionals, and decision makers. ¿¿ACM COMPUTER REVIEWS ""Teaching or studying asynchronous transfer mode (ATM) networks? Want a reference book on the security aspects? Then this book could be for you! … this book, with its very thorough modelling of potential attacks on ATM networks, should be required reading for those professional systems engineers responsible for the security of such systems. The book covers its chosen topic very well … ."" (Keith Wain, www.ics.heacademy.ac.uk, February, 2003)


From the reviews: 'Network desingers, engineers, practitioners, and managers will find in this book a systematica and practical approach to hardening networks against attacks. The book is aimed at a wide audience that also includes graduate and senior undergraduate students, policy makers, and consultants in various sectors, including industry, miltary and government...this interesting and information-packed book fulfils its purpose and will be very useful for students, network security professionals, and decision makers. ACM COMPUTER REVIEWS Teaching or studying asynchronous transfer mode (ATM) networks? Want a reference book on the security aspects? Then this book could be for you! ... this book, with its very thorough modelling of potential attacks on ATM networks, should be required reading for those professional systems engineers responsible for the security of such systems. The book covers its chosen topic very well ... . (Keith Wain, www.ics.heacademy.ac.uk, February, 2003)


From the reviews: ?Network desingers, engineers, practitioners, and managers will find in this book a systematica and practical approach to hardening networks against attacks. The book is aimed at a wide audience that also includes graduate and senior undergraduate students, policy makers, and consultants in various sectors, including industry, miltary and government....this interesting and information-packed book fulfils its purpose and will be very useful for students, network security professionals, and decision makers. ??ACM COMPUTER REVIEWS Teaching or studying asynchronous transfer mode (ATM) networks? Want a reference book on the security aspects? Then this book could be for you! ... this book, with its very thorough modelling of potential attacks on ATM networks, should be required reading for those professional systems engineers responsible for the security of such systems. The book covers its chosen topic very well ... . (Keith Wain, www.ics.heacademy.ac.uk, February, 2003)


Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List