Skip to main content

Currently Skimming:

C Comprehensive Training of Specialists to Counter Information Security Threats
Pages 196-205

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 196...
... However, comprehensive efforts to prevent the realization of threats of unauthorized access will be successful only through the development of an optimal information security policy involving the integration of the theoretical foundations of information protection with the best possible selection of protection mechanisms to be put in place. Only a major leading university with the appropriate methodological base is in a position to provide training for highly qualified specialists in this field.
From page 197...
... APPENDIX C 197 · devices and operating principles involved in automated systems · methodology for the design, construction, and operation of secure automated systems · criteria and methods for assessing the security of automated systems · means and methods of unauthorized access to information in automated systems · architecture of secure computer networks · software, devices, and hardware for creating secure networks · principles of building and managing secure networks · rule for the organizational, technical, and legal protection of information · the use of software and device technologies for protecting information · building and operating secure databases · systems approach to the problem of protecting information in database management systems · mechanisms for protecting information in databases and database management systems and opportunities for circumventing them · concepts of engineering- and technology-related means of information protection · organizational foundations for the use of engineering- and technologyrelated means of information protection After receiving training in this discipline, specialists must have an understanding of the following: · promising areas for the development of computer security theory · methods for information security threat analysis · architecture of secure automated systems · principles for the construction of secure systems · typical attacks on secure systems · promising areas for the development of network security technologies · current problems of information security science and the role and place of network information security in overall efforts to ensure comprehensive information security Specialists must know the following: · methodological and technological foundations for comprehensive automated systems security · threats and methods of violating systems security · formal models providing a foundation for security systems · standards for assessing systems security and their theoretical foundations · methods and means of building secure systems · methods and means of verifying and analyzing the reliability of secure systems
From page 198...
... 198 APPENDIX C · methodological and technological foundations of ensuring the information security of networked automated systems · threats and methods of violating the information security of networked automated systems · physical processes related to technical means and systems facilitating the leakage of secure information · typical models of attacks aimed at overcoming the security of networked automated systems, conditions under which such attacks could occur, potential consequences, and means of preventing them · the role of the human factor in ensuring network security · opportunities, means, and rules for applying basic software- and devicebased means of protecting information in networks · principles of the operation of basic secure network protocols · fundamentals of using firewalls for network security · rules for setting network security policy · standards for evaluating secure network systems and their theoretical foundations · methods and means of designing, building, and evaluating secure network systems · concepts of engineering- and technology-related means of information security · fundamental principles and methods of information security · fundamental regulatory and reference documents regarding engineeringand technology-related means of information security · procedures for the organization of engineering- and technology-related means of information security They must be able to · analyze automated systems from the standpoint of ensuring computer security · develop security models and policies using known approaches, methods, means, and the corresponding theoretical foundations · apply standards to evaluate the security of automated systems while analyzing and designing information security systems for them · put in place information security systems in accordance with security assessment standards · analyze networked automated systems from the standpoint of ensuring information security · develop network security models and policies using known approaches, methods, means, and theoretical foundations
From page 199...
... Theoretical aspects of computer security are included in Sections 1 and 2.
From page 200...
... Distributed data processing, classification of networks by data distribution methods, comparative characteristics of various types of networks 1.5 Network organization and operation. Network standards and protocols; network operating systems; means of coordinating processing in networks; client-server systems; local, corporate, and global networks; unique computer networks; fundamentals for classifying network threats and attacks; examples of types of attacks and recommendations for building security systems; impact of the human factor on network security SECTION 2: METHODOLOGY FOR CONSTRUCTING SECURE AUTOMATED SYSTEMS 2.1 Security models.
From page 201...
... Concept of security policy, typical elements of security policy, recommendations on creating security policy, basic steps to implement security policy, maintaining and modifying security policy 3.3 Criteria for evaluating the security of network operating systems. Fundamental criteria for analyzing network security, general analytical procedures, methods for preparing expert recommendations SECTION 4: COMPUTER NETWORK SECURITY 4.1 Internet standards and protocols.
From page 202...
... Types of security control -- flow control, deletion control, access control SECTION 6: THEORETICAL FOUNDATIONS OF SECURITY IN DATABASE MANAGEMENT SYSTEMS 6.1 Criteria for database protection. Criteria for evaluating the reliability of computer systems, the concept of security policy, joint application of various security policies as part of a single model, interpretation of TCSEC for reliable database management systems (TDI)
From page 203...
... Defining a mechanism for events, event signals, types of event notifications, components of event mechanisms 6.10 Classification of threats to the confidentiality of database management systems. Causes, types, and basic methods of confidentiality violation, types of leaks of confidential information from database management systems, partial revelation of information, relation between data security and data access, use of logical conclusions to obtain unauthorized access to confidential information, methods of prevention, special aspects involved in using cryptographic methods 6.11 Means of identification and authentication.
From page 204...
... Distribution of acoustic signals in the atmosphere, water, and solid environments; special characteristics of the distribution of acoustic signals in buildings; distribution of optical signals in the atmosphere and in optical fibers; distribution of radio signals in various frequencies in space and over communications lines; fundamental indicators of the signal distribution environment that affect the distance of technical channels of leakage and the quality of information received in this manner 7.3 Physical processes for suppressing harmful interference. Suppression of harmful interference from acoustoelectrical transformers; screening of electrical, magnetic, and electromagnetic fields; requirements of firewalls; field compensation; suppression of harmful interference in power supply and grounding lines; use of barriers to suppress harmful interference 7.4 Engineering-based means of security and technical protection.
From page 205...
... In receiving this training, the specialist acquires practical skills in countering cyberterrorism and is capable of independently developing an enterprise-wide information security policy involving the application of a range of integrated features.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.