Tuesday, 8 May 2018

Information Management - Lecture Notes, Study Materials and Important questions answers



Information Management
- Lecture Notes, Study Materials and Important questions answers




Subject : Information Management

DATABASE MODELLING and MANAGEMENT AND DEVELOPMENT

DATA SECURITY AND PRIVACY

INFORMATION GOVERNANCE

INFORMATION ARCHITECTURE

INFORMATION LIFECYCLE MANAGEMENT

Security in Computing By Charles P Pfleeger

Chapter 1 Is There a Security Problem in Computing

  1. What Does "Secure" Mean? - Answer (click here)
  2. Protecting Software in Automobile Control Systems - Answer (click here)
  3. Attacks - Answer (click here)
  4. Why Universities Are Prime Targets - Answer (click here)
  5. The Meaning of Computer Security - Answer (click here)
  6. Record Record Loss - Answer (click here)
  7. Top Methods of Attack - Answer (click here)
  8. Computer Criminals - Answer (click here)
  9. The Terrorists, Inc., IT Department - Answer (click here)
  10. Methods of Defense - Answer (click here)

Chapter 2 Elementary Cryptography

  1. Elementary Cryptography - Answer (click here)
  2. Elementary Cryptography - Terminology and Background - Answer (click here)
  3. Substitution Ciphers - Answer (click here)
  4. Transpositions (Permutations) - Answer (click here)
  5. Making "Good" Encryption Algorithms - Answer (click here)
  6. The Data Encryption Standard(DES) - Answer (click here)
  7. The AES Encryption Algorithm - Answer (click here)
  8. Public Key Encryption - Answer (click here)
  9. The Uses of Encryption - Answer (click here)

Chapter 3 Program Security

  1. Program Security - Answer (click here)
  2. Secure Programs - Answer (click here)
  3. Nonmalicious Program Errors - Answer (click here)
  4. Viruses and Other Malicious Code - Answer (click here)
  5. Nonmalicious Flaws Cause Failures - Answer (click here)
  6. Why Worry About Malicious Code? - Answer (click here)
  7. Kinds of Malicious Code - Answer (click here)
  8. Rapidly Approaching Zero - Answer (click here)
  9. How Viruses Attach - Answer (click here)
  10. How Viruses Gain Control - Answer (click here)
  11. Homes for Viruses - Answer (click here)
  12. Virus Signatures - Answer (click here)
  13. The Source of Viruses - Answer (click here)
  14. Prevention of Virus Infection - Answer (click here)
  15. Truths and Misconceptions About Viruses - Answer (click here)
  16. First Example of Malicious Code: The Brain Virus - Answer (click here)
  17. Example: The Internet Worm - Answer (click here)
  18. More Malicious Code: Code Red - Answer (click here)
  19. Malicious Code on the Web: Web Bugs - Answer (click here)
  20. Is the Cure Worse Than the Disease? - Answer (click here)
  21. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click here)
  22. Salami Attack - Answer (click here)
  23. Rootkits and the Sony XCP - Answer (click here)
  24. Privilege Escalation - Answer (click here)
  25. Interface Illusions - Answer (click here)
  26. Keystroke Logging - Answer (click here)
  27. Man-in-the-Middle Attacks - Answer (click here)
  28. Timing Attacks - Answer (click here)
  29. Covert Channels: Programs That Leak Information - Answer (click here)
  30. Controls Against Program Threats - Answer (click here)
  31. The Nature of Software Development - Answer (click here)
  32. Modularity, Encapsulation, and Information Hiding - Answer (click here)
  33. Peer Reviews - Answer (click here)
  34. Hazard Analysis - Answer (click here)
  35. Testing - Answer (click here)
  36. Good Design and Prediction - Answer (click here)
  37. Static Analysis - Answer (click here)
  38. Configuration Management - Answer (click here)
  39. Lessons from Mistakes - Answer (click here)
  40. There's More Than One Way to Crack a System - Answer (click here)
  41. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here)
  42. Programming Practice Conclusions - Answer (click here)
  43. Standards of Program Development - Answer (click here)
  44. Process Standards - Answer (click here)
  45. Program Controls in General - Answer (click here)

Chapter 4 Protection in General Purpose Operating Systems

  1. Protection in General-Purpose Operating Systems - Answer (click here)
  2. Protected Objects and Methods of Protection - Answer (click here)
  3. Memory and Address Protection - Answer (click here)
  4. Control of Access to General Objects - Answer (click here)
  5. File Protection Mechanisms - Answer (click here)
  6. User Authentication - Answer (click here)
  7. Biometrics: Ready for Prime Time? - Answer (click here)
  8. Passwords as Authenticators - Answer (click here)
  9. Additional Authentication Information - Answer (click here)
  10. Attacks on Passwords - Answer (click here)
  11. Password Selection Criteria - Answer (click here)
  12. The Authentication Process - Answer (click here)
  13. Biometrics: Authentication Not Using Passwords - Answer (click here)

Chapter 5 Designing Trusted Operating Systems

  1. Designing Trusted Operating Systems - Answer (click here)
  2. What Is a Trusted System? - Answer (click here)
  3. Security Policies - Answer (click here)
  4. Models of Security - Answer (click here)
  5. Trusted Operating System Design - Answer (click here)
  6. The Importance of Good Design Principles - Answer (click here)
  7. Trusted System Design Elements - Answer (click here)
  8. Security Features of Ordinary Operating Systems - Answer (click here)
  9. Security Features of Trusted Operating Systems - Answer (click here)
  10. Kernelized Design - Answer (click here)
  11. Separation/Isolation - Answer (click here)
  12. Virtualization - Answer (click here)
  13. Layered Design - Answer (click here)
  14. Assurance in Trusted Operating Systems - Answer (click here)
  15. Typical Operating System Flaws - Answer (click here)
  16. Assurance Methods - Answer (click here)
  17. Open Source - Answer (click here)
  18. Evaluation - Answer (click here)
  19. Security as an Add-On - Answer (click here)

Chapter 6 Database and Data Mining Security

  1. Database and Data Mining Security - Answer (click here)
  2. Introduction to Databases - Answer (click here)
  3. Security Requirements - Answer (click here)
  4. Reliability and Integrity - Answer (click here)
  5. Sensitive Data - Answer (click here)
  6. Inference - Answer (click here)
  7. Multilevel Databases - Answer (click here)
  8. Proposals for Multilevel Security - Answer (click here)
  9. Data Mining - Answer (click here)

Chapter 7 Security in Networks

  1. Security in Networks - Answer (click here)
  2. Network Concepts - Answer (click here)
  3. Network Media - Answer (click here)
  4. Network Protocols - Answer (click here)
  5. Types of Networks - Answer (click here)
  6. Threats in Networks - Answer (click here)
  7. Who Attacks Networks? - Answer (click here)
  8. Threats in Transit: Eavesdropping and Wiretapping - Answer (click here)
  9. Protocol Flaws - Answer (click here)
  10. Impersonation - Answer (click here)
  11. Message Confidentiality Threats - Answer (click here)
  12. Message Integrity Threats - Answer (click here)
  13. Format Failures - Answer (click here)
  14. Web Site Vulnerabilities - Answer (click here)
  15. Denial of Service - Answer (click here)
  16. Distributed Denial of Service - Answer (click here)
  17. Threats in Active or Mobile Code - Answer (click here)
  18. Threats in Active or Mobile Code - Answer (click here)
  19. Networks Complex Attacks - Answer (click here)
  20. Network Security Controls - Security Threat Analysis - Answer (click here)
  21. Architecture - Security in Networks - Answer (click here)
  22. Encryption - Security in Networks - Answer (click here)
  23. Content Integrity - Security in Networks - Answer (click here)
  24. Strong Authentication and Kerberos - Security in Networks - Answer (click here)
  25. Access Controls - Security in Networks - Answer (click here)
  26. Wireless Networks Security - Answer (click here)
  27. Honeypots, Alarms and Alerts - Security in Networks - Answer (click here)
  28. Traffic Flow Security - Answer (click here)
  29. Firewalls - Answer (click here)
  30. Types of Firewalls - Answer (click here)
  31. Example Firewall Configurations - Answer (click here)
  32. Intrusion Detection Systems - Answer (click here)
  33. Types of IDSs(Intrusion Detection Systems) - Answer (click here)
  34. Goals for Intrusion Detection Systems - Answer (click here)
  35. Intrusion Detection Systems(IDS) Strengths and Limitations - Answer (click here)
  36. Secure E-Mail - Answer (click here)

Chapter 8 Administering Security

  1. Administering Security - Answer (click here)
  2. Security Planning - Answer (click here)
  3. Contents of a Security Plan - Answer (click here)
  4. Security Planning Team Members - Answer (click here)
  5. Assuring Commitment to a Security Plan - Answer (click here)
  6. Business Continuity Plans - Answer (click here)
  7. Incident Response Plans - Answer (click here)
  8. Risk Analysis - Answer (click here)
  9. The Nature of Risk - Answer (click here)
  10. Steps of a Risk Analysis - Answer (click here)
  11. Arguments For and Against Risk Analysis - Answer (click here)
  12. Organizational Security Policies - Answer (click here)
  13. Characteristics of a Good Security Policy - Answer (click here)
  14. Policy Issue Example: Government E-mail - Answer (click here)
  15. Physical Security - Answer (click here)
  16. Interception of Sensitive Information - Answer (click here)
  17. Contingency Planning - Answer (click here)
  18. Physical Security Recap - Answer (click here)

Chapter 9 The Economics of Cybersecurity

  1. The Economics of Cybersecurity - Answer (click here)
  2. Making a Business Case - Answer (click here)
  3. Quantifying Security - Answer (click here)
  4. The Economic Impact of Cybersecurity - Answer (click here)
  5. Data to Justify Security Action - Answer (click here)
  6. A Summary of Recent Security Surveys - Answer (click here)
  7. Are the Data Representative? - Answer (click here)
  8. Sources of Attack and Financial Impact - Answer (click here)
  9. Modeling Cybersecurity - Answer (click here)
  10. Current Research and Future Directions - Answer (click here)

Chapter 10 Privacy in Computing

  1. Privacy in Computing - Answer (click here)
  2. Privacy Concepts - Answer (click here)
  3. Computer-Related Privacy Problems - Answer (click here)
  4. Privacy Principles and Policies - Answer (click here)
  5. Authentication and Privacy - Answer (click here)
  6. What Authentication Means - Answer (click here)
  7. Data Mining - Answer (click here)
  8. Privacy on the Web - Answer (click here)
  9. Spyware - Answer (click here)
  10. Shopping on the Internet - Answer (click here)
  11. E-Mail Security - Answer (click here)
  12. Impacts on Emerging Technologies - Answer (click here)

Chapter 11 Legal and Ethical Issues in Computer Security

  1. Legal and Ethical Issues in Computer Security - Answer (click here)
  2. Protecting Programs and Data - Answer (click here)
  3. Copyrights - Protecting Programs and Data - Answer (click here)
  4. Patents - Protecting Programs and Data - Answer (click here)
  5. Trade Secrets - Answer (click here)
  6. Protection for Computer Objects - Answer (click here)
  7. Information and the Law - Answer (click here)
  8. Rights of Employees and Employers - Answer (click here)
  9. Redress for Software Failures - Answer (click here)
  10. Computer Crime - Answer (click here)
  11. Why Computer Crime Is Hard to Define and Prosecute - Answer (click here)
  12. Examples of Statutes - Answer (click here)
  13. International Dimensions - Answer (click here)
  14. Why Computer Criminals Are Hard to Catch - Answer (click here)
  15. What Computer Crime Does Not Address - Answer (click here)
  16. Cryptography and the Law - Answer (click here)
  17. Ethical Issues in Computer Security - Answer (click here)
  18. Case Studies of Ethics: Use of Computer Services - Answer (click here)
  19. Case Studies of Ethics: Privacy Rights - Answer (click here)
  20. Case Studies of Ethics: Denial of Service - Answer (click here)
  21. Case Studies of Ethics: Ownership of Programs - Answer (click here)
  22. Case Studies of Ethics: Proprietary Resources - Answer (click here)
  23. Case Studies of Ethics: Fraud - Answer (click here)
  24. Case Studies of Ethics: Accuracy of Information - Answer (click here)
  25. Case Studies of Ethics: Ethics of Hacking or Cracking - Answer (click here)
  26. Codes of Computer Ethics - Answer (click here)

Chapter 12 Cryptography Explained

  1. Cryptography Explained - Answer (click here)
  2. Mathematics for Cryptography - Answer (click here)
  3. Symmetric Encryption - Answer (click here)
  4. Data Encryption Standard - Answer (click here)
  5. Advanced Encryption Standard - Answer (click here)
  6. Public Key Encryption Systems - Answer (click here)
  7. MerkleHellman Knapsacks - Answer (click here)
  8. RivestShamirAdelman (RSA) Encryption - Answer (click here)
  9. The El Gamal and Digital Signature Algorithms - Answer (click here)
  10. Quantum Cryptography - Answer (click here)

Information Architecture on the World Wide Web by Peter Morville

Chapter 1 What Makes a Web Site Work

  1. What Makes a Web Site Work - Answer (click here)
  2. Consumer Sensitivity Boot Camp - Answer (click here)
  3. Web Site Work - If You Don't Like to Exercise - Answer (click here)
  4. The Role of the Information Architect - Answer (click here)

Chapter 2 Introduction to Information Architecture

  1. Who Should Be the Information Architect? - Answer (click here)
  2. Collaboration and Communication - Answer (click here)
  3. Organizing Information - Answer (click here)

Chapter 3 Organizing Information

  1. Organizing Information - Answer (click here)
  2. Organizational Challenges - Answer (click here)
  3. Organizing Web Sites and Intranets - Answer (click here)
  4. Creating Cohesive Organization Systems - Answer (click here)
  5. Designing Navigation Systems - Answer (click here)

Chapter 4 Designing Navigation Systems

  1. Designing Navigation Systems - Answer (click here)
  2. Browser Navigation Features - Answer (click here)
  3. Building Context - Answer (click here)
  4. Improving Flexibility - Answer (click here)
  5. Types of Navigation Systems - Answer (click here)
  6. Integrated Navigation Elements - Answer (click here)
  7. Remote Navigation Elements - Answer (click here)
  8. Designing Elegant Navigation Systems - Answer (click here)
  9. Labeling Systems - Answer (click here)

Chapter 5 Labeling Systems

  1. Labeling Systems - Answer (click here)
  2. Why You Should Care About Labeling - Answer (click here)
  3. Labeling Systems, Not Labels - Answer (click here)
  4. Types of Labeling Systems - Answer (click here)
  5. Creating Effective Labeling Systems - Answer (click here)
  6. Fine-Tuning the Labeling System - Answer (click here)
  7. Non-Representational Labeling Systems - Answer (click here)
  8. A Double Challenge - Labeling Systems - Answer (click here)
  9. Searching and Your Web Site - Answer (click here)

Chapter 6 Searching Systems

  1. Searching and Your Web Site - Answer (click here)
  2. Understanding How Users Search - Answer (click here)
  3. Designing the Search Interface - Answer (click here)
  4. In an Ideal World: The Reference Interview - Answer (click here)
  5. Indexing the Right Stuff - Answer (click here)
  6. To Search or Not To Search? - Answer (click here)
  7. Research - Answer (click here)

Chapter 7 Research

  1. Research - Answer (click here)
  2. Research: Defining Goals - Answer (click here)
  3. Learning About the Intended Audiences - Answer (click here)
  4. Identifying Content and Function Requirements - Answer (click here)
  5. Grouping Content - Answer (click here)
  6. Conceptual Design - Answer (click here)

Chapter 8 Conceptual Design

  1. Conceptual Design - Answer (click here)
  2. Brainstorming with White Boards and Flip Charts - Answer (click here)
  3. Metaphor Exploration - Answer (click here)
  4. High-Level Architecture Blueprints - Answer (click here)
  5. Architectural Page Mockups - Answer (click here)
  6. Design Sketches - Answer (click here)
  7. Web-Based Prototypes - Answer (click here)
  8. Production and Operations - Answer (click here)

Chapter 9 Production and Operations

  1. Production and Operations - Answer (click here)
  2. Detailed Architecture Blueprints - Answer (click here)
  3. Content Mapping - Answer (click here)
  4. Web Page Inventory - Answer (click here)
  5. Point-of-Production Architecture - Answer (click here)
  6. Architecture Style Guides - Answer (click here)
  7. Learning from Users - Answer (click here)
  8. Information Architecture in Action - Answer (click here)

Chapter 10 Information Architecture in Action

  1. Information Architecture in Action - Answer (click here)
  2. Archipelagoes of Information - Answer (click here)
  3. A Case Study: Henry Ford Health System - Answer (click here)

No comments:

Post a Comment