Strategies for Computer Networks Security
Main Article Content
Abstract
IT security of computer networks plays an increasingly important role in business operations; but at the same time the importance of its systematic improvement not always is perceived, nor are implemented ameliorations due to incorrectly accepted models or strategies. Some models of the global computer network comprehensive protection, called trust framework, are discussed by the author of this article.
Downloads
Article Details
The author of the article declares that the submitted article does not infringe the copyrights of third parties. The author agrees to subject the article to the review procedure and to make editorial changes. The author transfers, free of charge, to SGH Publishing House the author's economic rights to the work in the fields of exploitation listed in the Article 50 of the Act of 4 February 1994 on Copyright and Related Rights – provided that the work has been accepted for publication and published.
SGH Publishing House holds economic copyrights to all content of the journal. Placing the text of the article in a repository, on the author's home page or on any other page is allowed as long as it does not involve obtaining economic benefits, and the text will be provided with source information (including the title, year, number and internet address of the journal).
References
2. Balakrishnan V. et al., Subjective Logic Based Trust Model for mobile Ad HocNetworks,“Securecomm”, 2008, Sept. 22-25, Istanbul, Turkey. ISBN 978-1-60558-241-1.
3. Balakrishnan V. et al., “Securecomm”, 2008,, Trust Enhanced Security Framework For Mobile AdHoc Wireless Networks, Ph.D. Thesis, Dept. of Computing, Macquarie University, Sydney 2010.
4. Gapinski A., Algebraic Framework for Computer Network Security. In preparation.
5. Josang A., A Logic for Uncertain Probabilities, “International Journal of Uncertainty. Fuzziness andKnowledge-Based Systems”, 2001, No. 9(3), pp. 279-311.
6. Kenyon H.S., Changing Strategy for Computer Network Defense, 2000, http://www.afcea.org/signal/articles/templates/Signal_Article_Template.asp?articleid=1872&zoneid=254.
7. National Information Assurance Glossary, CNSS Instruction, No 4009, 2010, http://www.cnss.gov/Assets/pdf/cnssi_4009.pdf.
8. Schou C., Shoemaker D., Information Assurance for the Enterprise. A Roadmap to Information Security.”McGraw-Hill, New York 2007.
9. Solomon M.G., Chapple M., Information Security Illuminated, Jones &Bartlett Publishers, Sudbary,Massachusetts 2005.
10. Soo Hoo K.J., How Much Is Enough? A Risk-Management Approach to Computer Security, Consortiumfor Research on Information Security and Policy (CRISP), Stanford University 2000.
11. http://csrc.nist.gov/publications/PubsFIPS.html.
12. http://en.wikipedia.org/wiki/Risk.
13. http://tools.ietf.org/html/rfc2196.
14. www.britannica.com/EBchecked/topic/538577/Claude-Shannon.
15. www.cisco.com/en/US/docs/ios/11_0/router/configuration/gde/ciproute.htm.
16. www.ibm.com/federal/security.
17. www.merriam-webster.com/dictionary/trust.
18. www.oxforddictionaries.com.
19. www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-201_en_xg.pdf.