• Chapter II. THREATS, ATTACKS AND VULNERABILITIES OF INFORMATION SECURITY
  • Chapter III. INTERNATIONAL AND RATIONAL REGULATORY FRAMEWORK IN SPHERE INFORMATION SECURITY
  • Chapter IV. SECURITY MODELS
  • FOREWORD............................................................................. 3
  • S. K. Ganiyev




    Download 7,8 Mb.
    Pdf ko'rish
    bet247/249
    Sana20.05.2024
    Hajmi7,8 Mb.
    #246687
    1   ...   241   242   243   244   245   246   247   248   249
    AND ITS OBJECTIVES
    1.1. Concept of national security..................................................
    6
    1.2. Main objectives and levels of information security..............
    9
    1.3. Information policy............................................................. .... 14
    1.4. Architecture and strategy o f information security........... .....18
    Chapter II. THREATS, ATTACKS AND
    VULNERABILITIES OF INFORMATION SECURITY
    2.1. Threats of information security and their analysis........... .... 22
    2.2. Information security vulnerabilities................................ ......26
    2.3. Methods for violation of confidentiality, integrity and 
    availability information............................................................ .... 31
    Chapter III. INTERNATIONAL AND RATIONAL
    REGULATORY FRAMEWORK IN SPHERE
    INFORMATION SECURITY
    3.1. International standards in sphere information security... 
    36
    3.2. National standards in sphere information security........... 
    48
    3.3. Regulatory documents in sphere information security.... 
    51
    Chapter IV. SECURITY MODELS
    4.1. Harrison-Ruzzo-Ulman discretionary m odel.................
    56
    4.2. Bell-La-Padula mandatory m odel.................................... 
    63
    4.3. Role model security..........................................................
    65
    366
    FOREWORD............................................................................. 
    3


    Chapter V. CRYPTOGRAPHIC PROTECTION OF
    INFORMATION
    5.1. Encryption methods..........................................................
    70
    5.2. Symmetric encryption.....................................................
    83
    5.3. Asymmetric encryption....................................................
    99
    5.4. Hash function..................................................................... 
    106
    5.5. Digital signature...............................................................
    114
    5.6. Steganography................................................................... 
    124
    5.7. Cryptanalysis methods....................................................
    128

    Download 7,8 Mb.
    1   ...   241   242   243   244   245   246   247   248   249




    Download 7,8 Mb.
    Pdf ko'rish