Strategies for Computer Networks Security

Main Article Content

Andrzej Gapiński

Abstrakt

IT security of computer networks plays an increasingly important role in business operations; but at the same time the importance of its systematic improvement not always is perceived, nor are implemented ameliorations due to incorrectly accepted models or strategies. Some models of the global computer network comprehensive protection, called trust framework, are discussed by the author of this article.

Downloads

Download data is not yet available.

Article Details

Jak cytować
Gapiński, A. (2020). Strategies for Computer Networks Security. Kwartalnik Nauk O Przedsiębiorstwie, 32(3). Pobrano z https://econjournals.sgh.waw.pl/KNoP/article/view/1939
Dział
Dział główny

Bibliografia

1. Azzedin F., Maheswaran M., Evolving and Managing Trust in Grid Computing Systems, “Proceedingsof IEEE Canadian Conference on Electrical & Computer Engineering”, 2002, pp. 1424-1429.
2. Balakrishnan V. et al., Subjective Logic Based Trust Model for mobile Ad HocNetworks,“Securecomm”, 2008, Sept. 22-25, Istanbul, Turkey. ISBN 978-1-60558-241-1.
3. Balakrishnan V. et al., “Securecomm”, 2008,, Trust Enhanced Security Framework For Mobile AdHoc Wireless Networks, Ph.D. Thesis, Dept. of Computing, Macquarie University, Sydney 2010.
4. Gapinski A., Algebraic Framework for Computer Network Security. In preparation.
5. Josang A., A Logic for Uncertain Probabilities, “International Journal of Uncertainty. Fuzziness andKnowledge-Based Systems”, 2001, No. 9(3), pp. 279-311.
6. Kenyon H.S., Changing Strategy for Computer Network Defense, 2000, http://www.afcea.org/signal/articles/templates/Signal_Article_Template.asp?articleid=1872&zoneid=254.
7. National Information Assurance Glossary, CNSS Instruction, No 4009, 2010, http://www.cnss.gov/Assets/pdf/cnssi_4009.pdf.
8. Schou C., Shoemaker D., Information Assurance for the Enterprise. A Roadmap to Information Security.”McGraw-Hill, New York 2007.
9. Solomon M.G., Chapple M., Information Security Illuminated, Jones &Bartlett Publishers, Sudbary,Massachusetts 2005.
10. Soo Hoo K.J., How Much Is Enough? A Risk-Management Approach to Computer Security, Consortiumfor Research on Information Security and Policy (CRISP), Stanford University 2000.
11. http://csrc.nist.gov/publications/PubsFIPS.html.
12. http://en.wikipedia.org/wiki/Risk.
13. http://tools.ietf.org/html/rfc2196.
14. www.britannica.com/EBchecked/topic/538577/Claude-Shannon.
15. www.cisco.com/en/US/docs/ios/11_0/router/configuration/gde/ciproute.htm.
16. www.ibm.com/federal/security.
17. www.merriam-webster.com/dictionary/trust.
18. www.oxforddictionaries.com.
19. www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-201_en_xg.pdf.