Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Half Title page
Title page
Copyright page
Dedication
Foreword
About this Book
The Book’s Intended Audiences
Structure of the Book
Guidelines for the Reader
About the Authors
Acknowledgements
Chapter 1: The Pattern Approach
1.1 Patterns at a Glance
1.2 No Pattern is an Island
1.3 Patterns Everywhere
1.4 Humans are the Target
1.5 Patterns Resolve Problems and Shape Environments
1.6 Towards Pattern Languages
1.7 Documenting Patterns
1.8 A Brief Note on The History of Patterns
1.9 The Pattern Community and its Culture
Chapter 2: Security Foundations
2.1 Overview
2.2 Security Taxonomy
2.3 General Security Resources
Chapter 3: Security Patterns
3.1 The History of Security Patterns
3.2 Characteristics of Security Patterns
3.3 Why Security Patterns?
3.4 Sources for Security Pattern Mining
Chapter 4: Patterns Scope and Enterprise Security
4.1 The Scope of Patterns in the Book
4.2 Organization Factors
4.3 Resulting Organization
4.4 Mapping to the Taxonomy
4.5 Organization in the Context of an Enterprise Framework
Chapter 5: The Security Pattern Landscape
5.1 Enterprise Security and Risk Management Patterns
5.2 Identification & Authentication (I&A) Patterns
5.3 Access Control Model Patterns
5.4 System Access Control Architecture Patterns
5.5 Operating System Access Control Patterns
5.6 Accounting Patterns
5.7 Firewall Architecture Patterns
5.8 Secure Internet Applications Patterns
5.9 Cryptographic Key Management Patterns
5.10 Related Security Pattern Repositories Patterns
Chapter 6: Enterprise Security and Risk Management
6.1 Security Needs Identification for Enterprise Assets
6.2 Asset Valuation
6.3 Threat Assessment
6.4 Vulnerability Assessment
6.5 Risk Determination
6.6 Enterprise Security Approaches
6.7 Enterprise Security Services
6.8 Enterprise Partner Communication
Chapter 7: Identification and Authentication (I&A)
7.1 I&A Requirements
7.2 Automated I&A Design Alternatives
7.3 Password Design and Use
7.4 Biometrics Design Alternatives
Chapter 8: Access Control Models
8.1 Authorization
8.2 Role-Based Access Control
8.3 Multilevel Security
8.4 Reference Monitor
8.5 Role Rights Definition
Chapter 9: System Access Control Architecture
9.1 Access Control Requirements
9.2 Single Access Point
9.3 Check Point
9.4 Security Session
9.5 Full Access with Errors
9.6 Limited Access
Chapter 10: Operating System Access Control
10.1 Authenticator
10.2 Controlled Process Creator
10.3 Controlled Object Factory
10.4 Controlled Object Monitor
10.5 Controlled Virtual Address Space
10.6 Execution Domain
10.7 Controlled Execution Environment
10.8 File Authorization
Chapter 11: Accounting
11.1 Security Accounting Requirements
11.2 Audit Requirements
11.3 Audit Trails and Logging Requirements
11.4 Intrusion Detection Requirements
11.5 Non-Repudiation Requirements
Chapter 12: Firewall Architectures
12.1 Packet Filter Firewall
12.2 Proxy-Based Firewall
12.3 Stateful Firewall
Chapter 13: Secure Internet Applications
13.1 Information Obscurity
13.2 Secure Channels
13.3 Known Partners
13.4 Demilitarized Zone
13.5 Protection Reverse Proxy
13.6 Integration Reverse Proxy
13.7 Front Door
Chapter 14: Case Study: IP Telephony
14.1 IP Telephony at a Glance
14.2 The Fundamentals of IP Telephony
14.3 Vulnerabilities of IP Telephony Components
14.4 IP Telephony Use Cases
14.5 Securing IP telephony with patterns
14.6 Applying Individual Security Patterns
14.7 Conclusion
Chapter 15: Supplementary Concepts
15.1 Security Principles and Security Patterns
15.2 Enhancing Security Patterns with Misuse Cases
Chapter 16: Closing Remarks
References
Index
← Prev
Back
Next →
← Prev
Back
Next →