ABSTRACT

Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance. Establishing this understanding and keeping it up to date requires a resource with coverage as diverse as the field it covers.

Filling this need, the Encyclopedia of Information Assurance presents an up-to-date collection of peer-reviewed articles and references written by authorities in their fields. From risk management and privacy to auditing and compliance, the encyclopedia’s four volumes provide comprehensive coverage of the key topics related to information assurance. This complete IA resource:

  • Supplies the understanding needed to help prevent the misuse of sensitive information
  • Explains how to maintain the integrity of critical systems
  • Details effective tools, techniques, and methods for protecting personal and corporate data against the latest threats
  • Provides valuable examples, case studies, and discussions on how to address common and emerging IA challenges

Placing the wisdom of leading researchers and practitioners at your fingertips, this authoritative reference provides the knowledge and insight needed to avoid common pitfalls and stay one step ahead of evolving threats.

Also Available Online
This Taylor & Francis encyclopedia is also available through online subscription, offering a variety of extra benefits for researchers, students, and librarians, including:

 Citation tracking and alerts

 Active reference linking

 Saved searches and marked lists

 HTML and PDF format options

Contact Taylor and Francis for more information or to inquire about subscription options and print/online combination packages.
US: (Tel) 1.888.318.2367; (E-mail) e-reference@taylorandfrancis.com
International: (Tel) +44 (0) 20 7017 6062; (E-mail) online.sales@tandf.co.uk

chapter |8 pages

Access Controls: Implementation

chapter |10 pages

Access Controls: PKI-Based

chapter |7 pages

Accountability

chapter |7 pages

Adaptable Protocol Framework

chapter |6 pages

Advanced Encryption Standard (AES)

chapter |4 pages

Applets: Network Security

chapter |7 pages

Application Layer Security

chapter |5 pages

Application Security

chapter |11 pages

Application Security: World Wide Web

chapter |13 pages

Application Systems Development

chapter |7 pages

Applications: Auditing

chapter |5 pages

Architecture: Biological Cells

chapter |10 pages

Architecture: Firewalls

chapter |12 pages

Architecture: Models

chapter |8 pages

Architecture: Secure

chapter |5 pages

Auditing: Self-Hacking

chapter |10 pages

Awareness and Training

chapter |9 pages

Awareness and Training: Appendices

chapter |10 pages

Awareness and Training: Effective Methods

chapter |8 pages

Awareness and Training: Framework

chapter |3 pages

Bally v. Faber

chapter |12 pages

Biometrics: Identification

chapter |4 pages

Biometrics: New Methods

chapter |5 pages

Bluesnarfing

chapter |6 pages

Broadband Internet Access

chapter |9 pages

Buffer Overflows: Attacks

chapter |9 pages

Buffer Overflows: Stack-Based

chapter |11 pages

Business Continuity Management: Metrics

chapter |11 pages

Business Continuity Management: Testing

chapter |6 pages

Business Continuity Planning

chapter |12 pages

Business Impact Analysis: Process

chapter |7 pages

Business Partnerships: Validation

chapter |10 pages

Capability Maturity Model

chapter |4 pages

Career Management

chapter |10 pages

Centralized Authentication Services

chapter |16 pages

Certification Testing

chapter |7 pages

Common Criteria

chapter |11 pages

Common Criteria: IT Security Evaluation

chapter |7 pages

Communication Protocols and Services

chapter |8 pages

Compliance Assurance

chapter |13 pages

Computer Abuse

chapter |6 pages

Computer Crime

chapter |12 pages

Computer Crime: Investigations

chapter |8 pages

Configuration Management

chapter |13 pages

Configuration Management: Process Stages

chapter |7 pages

Cookies and Web Bugs

chapter |7 pages

Corporate Governance

chapter |8 pages

Corporate Security: IT Organization

chapter |6 pages

Covert Channels

chapter |7 pages

Crime Prevention: Environmental Design

chapter |5 pages

Critical Business Functions

chapter |8 pages

Cross-Site Scripting (XSS)

chapter |13 pages

Cryptography

chapter |3 pages

Cryptography: Auditing

chapter |10 pages

Cryptography: Cryptosystems

chapter |6 pages

Cryptography: Elliptic Curve

chapter |14 pages

Cryptography: Encryption and

chapter |10 pages

Cryptography: Quantum

chapter |7 pages

Cryptography: Transitions

chapter |8 pages

Customer Relationship Management (CRM)

chapter |13 pages

Cybercrime: Council of Europe

part |2 pages

Volume II

chapter |10 pages

Data at Rest

chapter |9 pages

Data Centers: Security

chapter |8 pages

Data Sanitization: SQL Injection

chapter |16 pages

Data Warehouses: Datamarts and

chapter |15 pages

Data Warehouses: Security and Privacy

chapter |5 pages

Database Integrity

chapter |6 pages

Denial-of-Service Attacks

chapter |11 pages

Digital Crime Scene Analysis (DCSA)

chapter |4 pages

Digital Forensics and E-Discovery

chapter |7 pages

Directory Security

chapter |4 pages

Distributed Computing: Grid Environment

chapter |4 pages

Domain Name Service (DNS) Attacks

chapter |14 pages

Due Care: Minimum Security Standards

chapter |13 pages

Electronic Commerce: Auditing

chapter |9 pages

E-Mail: Pretty Good Privacy

chapter |15 pages

E-Mail: Security

chapter |5 pages

E-Mail: Spam

chapter |8 pages

Enclaves: Enterprise as Extranet

chapter |5 pages

Encryption Key Management

chapter |13 pages

Enterprise Security Information

chapter |11 pages

Espionage: Counter-Economic

chapter |7 pages

Ethics

chapter |8 pages

Ethics: Internet

chapter |10 pages

Event Management

chapter |11 pages

External Networks: Secured Connections

chapter |8 pages

Extranet Access Control

chapter |7 pages

Fax Machines

chapter |20 pages

Firewall Architectures

chapter |6 pages

Firewall Architectures: Other Issues

chapter |12 pages

Firewall Architectures: Platforms

chapter |8 pages

Firewall Technologies: Comparison

chapter |13 pages

Firewalls: Checkpoint Security Review

chapter |5 pages

Firewalls: Internet Security

chapter |4 pages

Forensics

chapter |7 pages

Forensics and Legal Proceedings

chapter |11 pages

Forensics: Computer Crime Investigation

chapter |16 pages

Forensics: Non-Liturgical Examinations

chapter |5 pages

Forensics: Operational

chapter |7 pages

Forensics: Rules of Evidence

chapter |4 pages

Format String Vulnerabilities

chapter |16 pages

Fraud: Employee Identification

chapter |10 pages

FTP: Secured Data Transfers

chapter |8 pages

Hackers: Attacks and Defenses

chapter |9 pages

Hackers: Hiring Ex-Criminal

chapter |11 pages

Hackers: Tools and Techniques

chapter |5 pages

Halon Fire Suppression Systems

chapter |6 pages

Hash Algorithms

chapter |9 pages

Healthcare Industry

chapter |8 pages

High-Tech Trade Secrets

chapter |5 pages

Honeypots and Honeynets

chapter |6 pages

Host-Based Firewalls: Case Study

chapter |10 pages

Human Resources: Issues

chapter |14 pages

Identity Management

chapter |7 pages

Identity Management Systems: Components

chapter |12 pages

Identity Theft

chapter |8 pages

Incident Response: Evidence Handling

chapter |8 pages

Incident Response: Exercises

chapter |9 pages

Incident Response: Management

chapter |8 pages

Incident Response: Managing

chapter |12 pages

Incident Response: Privacy Breaches

chapter |9 pages

Information Classification

part |2 pages

Volume III

chapter |10 pages

Information Flow

chapter |13 pages

Information Protection

chapter |7 pages

Information Security Controls: Types

chapter |7 pages

Information Security Policies

chapter |7 pages

Information Warfare

chapter |17 pages

Information Warfare: Tactics

chapter |6 pages

Insider Threats

chapter |6 pages

Inspection Technologies: Deep Packets

chapter |12 pages

Instant Messaging

chapter |7 pages

Integrated Threat Management

chapter |6 pages

Intelligent Agents: Network Security

chapter |11 pages

International Issues

chapter |8 pages

Internet Mobile Code

chapter |7 pages

Internet Security

chapter |4 pages

Intranets: Risk

chapter |8 pages

Intrusion Detection Systems (IDSs)

chapter |10 pages

Intrusion Prevention Systems

chapter |5 pages

IPv6: Expanding Internet Support

chapter |5 pages

ISO Standards and Certification

chapter |4 pages

IT Governance Institute (ITGI)

chapter |4 pages

Java

chapter |9 pages

Kerberos

chapter |12 pages

Kerberos: Management

chapter |8 pages

Kerberos: Ongoing Development

chapter |17 pages

Kerberos: Services and Functions

chapter |15 pages

LAN/WAN Security

chapter |9 pages

Laws and Regulations: e-Discovery

chapter |12 pages

Malicious Code

chapter |3 pages

Malicious Code: Fast-Scanning Worms

chapter |9 pages

Malicious Code: Organized Crime

chapter |15 pages

Malicious Code: Quasi-Intelligence

chapter |8 pages

Malicious Code: Rootkits

chapter |7 pages

Management Commitment

chapter |13 pages

Management Commitment: Security Councils

chapter |7 pages

Management Support of IT: Survey

chapter |5 pages

Mashups and Composite Applications

chapter |16 pages

Mergers and Acquisitions

chapter |6 pages

Message Digests

chapter |7 pages

Mobile Data Security

chapter |12 pages

NERC Corporation: Compliance

chapter |11 pages

Network and Telecommunications: Media

chapter |5 pages

Network Layer Security

chapter |8 pages

Network Router Security

chapter |7 pages

Network Security

chapter |4 pages

Network Security: Trapping Intruders

chapter |14 pages

Network Technologies

chapter |5 pages

Object-Based Applications: Testing

chapter |5 pages

Object-Oriented Programming

chapter |9 pages

Offshore Development

chapter |14 pages

Open Source

chapter |8 pages

Open Standards

chapter |9 pages

Operations Security: Abuses

chapter |9 pages

Operations Security: Controls

chapter |16 pages

Organization Culture

chapter |11 pages

Outsourcing

chapter |6 pages

Ownership and Custody of Data

chapter |7 pages

Packet Sniffers

chapter |18 pages

Passwords and Policy Threat Analysis

chapter |4 pages

Patch Management

chapter |12 pages

Patch Management: Process

chapter |5 pages

PBX Firewalls

chapter |5 pages

Penetration Testing

chapter |10 pages

Penetration Testing: Policies

chapter |9 pages

PeopleSoft Security

chapter |9 pages

Perimeter Security

chapter |4 pages

Personnel: Practices

chapter |12 pages

Personnel: Security Roles

chapter |12 pages

Personnel: Security Screening

chapter |6 pages

Phishing

chapter |13 pages

Physical Access Control

chapter |6 pages

Physical Layer Security: Networks

chapter |7 pages

Physical Security

chapter |7 pages

Physical Security: Facilities

chapter |5 pages

Planning for the Future: Challenges

part |2 pages

Volume IV

chapter |4 pages

Pod Slurping: Concepts

chapter |2 pages

Pod-Slurping: Other Vulnerabilities

chapter |16 pages

Policy Development: Needs

chapter |5 pages

Portable Computing Environments

chapter |9 pages

Privacy Governance: Effective Methods

chapter |8 pages

Privacy: Healthcare Industry

chapter |3 pages

Privacy: Legal Issues

chapter |4 pages

Privacy: Policy Formation

chapter |4 pages

Proxy Servers

chapter |5 pages

Public Key Hierarchy

chapter |8 pages

Public Key Infrastructure (PKI)

chapter |5 pages

Quantum Computing

chapter |4 pages

Radio Frequency Identification (RFID)

chapter |8 pages

RADIUS: Access Control

chapter |12 pages

Reduced Sign-On

chapter |10 pages

Relational Database Security

chapter |9 pages

Remote Access: Secure

chapter |3 pages

Return on Investment (ROI)

chapter |6 pages

Risk Assessment

chapter |6 pages

Risk Management

chapter |6 pages

Risk Management and Analysis

chapter |10 pages

Risk Management: Enterprise

chapter |5 pages

Risk Management: Trends

chapter |9 pages

Role-Based Access Control

chapter |8 pages

Sarbanes–Oxley Act of 2002 (SOX)

chapter |9 pages

Secure Socket Layer (SSL)

chapter |7 pages

Security Breaches: Reporting

chapter |6 pages

Security Controls: Dial-Up

chapter |6 pages

Security Development Lifecycle

chapter |7 pages

Security Incident Response

chapter |6 pages

Security Management Team Organization

chapter |12 pages

Security Risk: Goals Assessment

chapter |6 pages

Server Security Policies / Jon David

chapter |4 pages

Service Level Agreements / Gilbert Held

chapter |5 pages

Software Piracy / Roxanne E. Burkey

chapter |10 pages

Sploits / Ed Skoudis, CISSP

chapter |10 pages

Spyware: Ethical and Legal Concerns

chapter |4 pages

Tape Backups: Validation / Sandy Bacik

chapter |8 pages

Tokens: Evaluation / Joseph T. Hootman

chapter |7 pages

Voice over WLAN

chapter |8 pages

Voice Security

chapter |2 pages

Web Applications: Firewalls

chapter |8 pages

Web Applications: Security

chapter |8 pages

Web Services

chapter |7 pages

Wireless Local Area Networks (WLANs)

chapter |6 pages

Wireless Penetration Testing

chapter |4 pages

Workplace Violence

chapter |13 pages

World Wide Web

chapter |6 pages

XML

chapter |6 pages

XML and Other Metadata Languages