Information Management
- Lecture Notes, Study Materials and Important questions answers
Subject : Information Management
DATABASE MODELLING and MANAGEMENT AND DEVELOPMENT
DATA SECURITY AND PRIVACY
INFORMATION GOVERNANCE
INFORMATION ARCHITECTURE
INFORMATION LIFECYCLE MANAGEMENT
Security in Computing By Charles P Pfleeger
Chapter 1 Is There a Security Problem in Computing
- What Does "Secure" Mean? - Answer (click here)
- Protecting Software in Automobile Control Systems - Answer (click here)
- Attacks - Answer (click here)
- Why Universities Are Prime Targets - Answer (click here)
- The Meaning of Computer Security - Answer (click here)
- Record Record Loss - Answer (click here)
- Top Methods of Attack - Answer (click here)
- Computer Criminals - Answer (click here)
- The Terrorists, Inc., IT Department - Answer (click here)
- Methods of Defense - Answer (click here)
Chapter 2 Elementary Cryptography
- Elementary Cryptography - Answer (click here)
- Elementary Cryptography - Terminology and Background - Answer (click here)
- Substitution Ciphers - Answer (click here)
- Transpositions (Permutations) - Answer (click here)
- Making "Good" Encryption Algorithms - Answer (click here)
- The Data Encryption Standard(DES) - Answer (click here)
- The AES Encryption Algorithm - Answer (click here)
- Public Key Encryption - Answer (click here)
- The Uses of Encryption - Answer (click here)
Chapter 3 Program Security
- Program Security - Answer (click here)
- Secure Programs - Answer (click here)
- Nonmalicious Program Errors - Answer (click here)
- Viruses and Other Malicious Code - Answer (click here)
- Nonmalicious Flaws Cause Failures - Answer (click here)
- Why Worry About Malicious Code? - Answer (click here)
- Kinds of Malicious Code - Answer (click here)
- Rapidly Approaching Zero - Answer (click here)
- How Viruses Attach - Answer (click here)
- How Viruses Gain Control - Answer (click here)
- Homes for Viruses - Answer (click here)
- Virus Signatures - Answer (click here)
- The Source of Viruses - Answer (click here)
- Prevention of Virus Infection - Answer (click here)
- Truths and Misconceptions About Viruses - Answer (click here)
- First Example of Malicious Code: The Brain Virus - Answer (click here)
- Example: The Internet Worm - Answer (click here)
- More Malicious Code: Code Red - Answer (click here)
- Malicious Code on the Web: Web Bugs - Answer (click here)
- Is the Cure Worse Than the Disease? - Answer (click here)
- Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click here)
- Salami Attack - Answer (click here)
- Rootkits and the Sony XCP - Answer (click here)
- Privilege Escalation - Answer (click here)
- Interface Illusions - Answer (click here)
- Keystroke Logging - Answer (click here)
- Man-in-the-Middle Attacks - Answer (click here)
- Timing Attacks - Answer (click here)
- Covert Channels: Programs That Leak Information - Answer (click here)
- Controls Against Program Threats - Answer (click here)
- The Nature of Software Development - Answer (click here)
- Modularity, Encapsulation, and Information Hiding - Answer (click here)
- Peer Reviews - Answer (click here)
- Hazard Analysis - Answer (click here)
- Testing - Answer (click here)
- Good Design and Prediction - Answer (click here)
- Static Analysis - Answer (click here)
- Configuration Management - Answer (click here)
- Lessons from Mistakes - Answer (click here)
- There's More Than One Way to Crack a System - Answer (click here)
- Formal Methods Can Catch Difficult-to-See Problems - Answer (click here)
- Programming Practice Conclusions - Answer (click here)
- Standards of Program Development - Answer (click here)
- Process Standards - Answer (click here)
- Program Controls in General - Answer (click here)
Chapter 4 Protection in General Purpose Operating Systems
- Protection in General-Purpose Operating Systems - Answer (click here)
- Protected Objects and Methods of Protection - Answer (click here)
- Memory and Address Protection - Answer (click here)
- Control of Access to General Objects - Answer (click here)
- File Protection Mechanisms - Answer (click here)
- User Authentication - Answer (click here)
- Biometrics: Ready for Prime Time? - Answer (click here)
- Passwords as Authenticators - Answer (click here)
- Additional Authentication Information - Answer (click here)
- Attacks on Passwords - Answer (click here)
- Password Selection Criteria - Answer (click here)
- The Authentication Process - Answer (click here)
- Biometrics: Authentication Not Using Passwords - Answer (click here)
Chapter 5 Designing Trusted Operating Systems
- Designing Trusted Operating Systems - Answer (click here)
- What Is a Trusted System? - Answer (click here)
- Security Policies - Answer (click here)
- Models of Security - Answer (click here)
- Trusted Operating System Design - Answer (click here)
- The Importance of Good Design Principles - Answer (click here)
- Trusted System Design Elements - Answer (click here)
- Security Features of Ordinary Operating Systems - Answer (click here)
- Security Features of Trusted Operating Systems - Answer (click here)
- Kernelized Design - Answer (click here)
- Separation/Isolation - Answer (click here)
- Virtualization - Answer (click here)
- Layered Design - Answer (click here)
- Assurance in Trusted Operating Systems - Answer (click here)
- Typical Operating System Flaws - Answer (click here)
- Assurance Methods - Answer (click here)
- Open Source - Answer (click here)
- Evaluation - Answer (click here)
- Security as an Add-On - Answer (click here)
Chapter 6 Database and Data Mining Security
- Database and Data Mining Security - Answer (click here)
- Introduction to Databases - Answer (click here)
- Security Requirements - Answer (click here)
- Reliability and Integrity - Answer (click here)
- Sensitive Data - Answer (click here)
- Inference - Answer (click here)
- Multilevel Databases - Answer (click here)
- Proposals for Multilevel Security - Answer (click here)
- Data Mining - Answer (click here)
Chapter 7 Security in Networks
- Security in Networks - Answer (click here)
- Network Concepts - Answer (click here)
- Network Media - Answer (click here)
- Network Protocols - Answer (click here)
- Types of Networks - Answer (click here)
- Threats in Networks - Answer (click here)
- Who Attacks Networks? - Answer (click here)
- Threats in Transit: Eavesdropping and Wiretapping - Answer (click here)
- Protocol Flaws - Answer (click here)
- Impersonation - Answer (click here)
- Message Confidentiality Threats - Answer (click here)
- Message Integrity Threats - Answer (click here)
- Format Failures - Answer (click here)
- Web Site Vulnerabilities - Answer (click here)
- Denial of Service - Answer (click here)
- Distributed Denial of Service - Answer (click here)
- Threats in Active or Mobile Code - Answer (click here)
- Threats in Active or Mobile Code - Answer (click here)
- Networks Complex Attacks - Answer (click here)
- Network Security Controls - Security Threat Analysis - Answer (click here)
- Architecture - Security in Networks - Answer (click here)
- Encryption - Security in Networks - Answer (click here)
- Content Integrity - Security in Networks - Answer (click here)
- Strong Authentication and Kerberos - Security in Networks - Answer (click here)
- Access Controls - Security in Networks - Answer (click here)
- Wireless Networks Security - Answer (click here)
- Honeypots, Alarms and Alerts - Security in Networks - Answer (click here)
- Traffic Flow Security - Answer (click here)
- Firewalls - Answer (click here)
- Types of Firewalls - Answer (click here)
- Example Firewall Configurations - Answer (click here)
- Intrusion Detection Systems - Answer (click here)
- Types of IDSs(Intrusion Detection Systems) - Answer (click here)
- Goals for Intrusion Detection Systems - Answer (click here)
- Intrusion Detection Systems(IDS) Strengths and Limitations - Answer (click here)
- Secure E-Mail - Answer (click here)
Chapter 8 Administering Security
- Administering Security - Answer (click here)
- Security Planning - Answer (click here)
- Contents of a Security Plan - Answer (click here)
- Security Planning Team Members - Answer (click here)
- Assuring Commitment to a Security Plan - Answer (click here)
- Business Continuity Plans - Answer (click here)
- Incident Response Plans - Answer (click here)
- Risk Analysis - Answer (click here)
- The Nature of Risk - Answer (click here)
- Steps of a Risk Analysis - Answer (click here)
- Arguments For and Against Risk Analysis - Answer (click here)
- Organizational Security Policies - Answer (click here)
- Characteristics of a Good Security Policy - Answer (click here)
- Policy Issue Example: Government E-mail - Answer (click here)
- Physical Security - Answer (click here)
- Interception of Sensitive Information - Answer (click here)
- Contingency Planning - Answer (click here)
- Physical Security Recap - Answer (click here)
Chapter 9 The Economics of Cybersecurity
- The Economics of Cybersecurity - Answer (click here)
- Making a Business Case - Answer (click here)
- Quantifying Security - Answer (click here)
- The Economic Impact of Cybersecurity - Answer (click here)
- Data to Justify Security Action - Answer (click here)
- A Summary of Recent Security Surveys - Answer (click here)
- Are the Data Representative? - Answer (click here)
- Sources of Attack and Financial Impact - Answer (click here)
- Modeling Cybersecurity - Answer (click here)
- Current Research and Future Directions - Answer (click here)
Chapter 10 Privacy in Computing
- Privacy in Computing - Answer (click here)
- Privacy Concepts - Answer (click here)
- Computer-Related Privacy Problems - Answer (click here)
- Privacy Principles and Policies - Answer (click here)
- Authentication and Privacy - Answer (click here)
- What Authentication Means - Answer (click here)
- Data Mining - Answer (click here)
- Privacy on the Web - Answer (click here)
- Spyware - Answer (click here)
- Shopping on the Internet - Answer (click here)
- E-Mail Security - Answer (click here)
- Impacts on Emerging Technologies - Answer (click here)
Chapter 11 Legal and Ethical Issues in Computer Security
- Legal and Ethical Issues in Computer Security - Answer (click here)
- Protecting Programs and Data - Answer (click here)
- Copyrights - Protecting Programs and Data - Answer (click here)
- Patents - Protecting Programs and Data - Answer (click here)
- Trade Secrets - Answer (click here)
- Protection for Computer Objects - Answer (click here)
- Information and the Law - Answer (click here)
- Rights of Employees and Employers - Answer (click here)
- Redress for Software Failures - Answer (click here)
- Computer Crime - Answer (click here)
- Why Computer Crime Is Hard to Define and Prosecute - Answer (click here)
- Examples of Statutes - Answer (click here)
- International Dimensions - Answer (click here)
- Why Computer Criminals Are Hard to Catch - Answer (click here)
- What Computer Crime Does Not Address - Answer (click here)
- Cryptography and the Law - Answer (click here)
- Ethical Issues in Computer Security - Answer (click here)
- Case Studies of Ethics: Use of Computer Services - Answer (click here)
- Case Studies of Ethics: Privacy Rights - Answer (click here)
- Case Studies of Ethics: Denial of Service - Answer (click here)
- Case Studies of Ethics: Ownership of Programs - Answer (click here)
- Case Studies of Ethics: Proprietary Resources - Answer (click here)
- Case Studies of Ethics: Fraud - Answer (click here)
- Case Studies of Ethics: Accuracy of Information - Answer (click here)
- Case Studies of Ethics: Ethics of Hacking or Cracking - Answer (click here)
- Codes of Computer Ethics - Answer (click here)
Chapter 12 Cryptography Explained
- Cryptography Explained - Answer (click here)
- Mathematics for Cryptography - Answer (click here)
- Symmetric Encryption - Answer (click here)
- Data Encryption Standard - Answer (click here)
- Advanced Encryption Standard - Answer (click here)
- Public Key Encryption Systems - Answer (click here)
- MerkleHellman Knapsacks - Answer (click here)
- RivestShamirAdelman (RSA) Encryption - Answer (click here)
- The El Gamal and Digital Signature Algorithms - Answer (click here)
- Quantum Cryptography - Answer (click here)
Information Architecture on the World Wide Web by Peter Morville
Chapter 1 What Makes a Web Site Work
- What Makes a Web Site Work - Answer (click here)
- Consumer Sensitivity Boot Camp - Answer (click here)
- Web Site Work - If You Don't Like to Exercise - Answer (click here)
- The Role of the Information Architect - Answer (click here)
Chapter 2 Introduction to Information Architecture
- Who Should Be the Information Architect? - Answer (click here)
- Collaboration and Communication - Answer (click here)
- Organizing Information - Answer (click here)
Chapter 3 Organizing Information
- Organizing Information - Answer (click here)
- Organizational Challenges - Answer (click here)
- Organizing Web Sites and Intranets - Answer (click here)
- Creating Cohesive Organization Systems - Answer (click here)
- Designing Navigation Systems - Answer (click here)
Chapter 4 Designing Navigation Systems
- Designing Navigation Systems - Answer (click here)
- Browser Navigation Features - Answer (click here)
- Building Context - Answer (click here)
- Improving Flexibility - Answer (click here)
- Types of Navigation Systems - Answer (click here)
- Integrated Navigation Elements - Answer (click here)
- Remote Navigation Elements - Answer (click here)
- Designing Elegant Navigation Systems - Answer (click here)
- Labeling Systems - Answer (click here)
Chapter 5 Labeling Systems
- Labeling Systems - Answer (click here)
- Why You Should Care About Labeling - Answer (click here)
- Labeling Systems, Not Labels - Answer (click here)
- Types of Labeling Systems - Answer (click here)
- Creating Effective Labeling Systems - Answer (click here)
- Fine-Tuning the Labeling System - Answer (click here)
- Non-Representational Labeling Systems - Answer (click here)
- A Double Challenge - Labeling Systems - Answer (click here)
- Searching and Your Web Site - Answer (click here)
Chapter 6 Searching Systems
- Searching and Your Web Site - Answer (click here)
- Understanding How Users Search - Answer (click here)
- Designing the Search Interface - Answer (click here)
- In an Ideal World: The Reference Interview - Answer (click here)
- Indexing the Right Stuff - Answer (click here)
- To Search or Not To Search? - Answer (click here)
- Research - Answer (click here)
Chapter 7 Research
- Research - Answer (click here)
- Research: Defining Goals - Answer (click here)
- Learning About the Intended Audiences - Answer (click here)
- Identifying Content and Function Requirements - Answer (click here)
- Grouping Content - Answer (click here)
- Conceptual Design - Answer (click here)
Chapter 8 Conceptual Design
- Conceptual Design - Answer (click here)
- Brainstorming with White Boards and Flip Charts - Answer (click here)
- Metaphor Exploration - Answer (click here)
- High-Level Architecture Blueprints - Answer (click here)
- Architectural Page Mockups - Answer (click here)
- Design Sketches - Answer (click here)
- Web-Based Prototypes - Answer (click here)
- Production and Operations - Answer (click here)
Chapter 9 Production and Operations
- Production and Operations - Answer (click here)
- Detailed Architecture Blueprints - Answer (click here)
- Content Mapping - Answer (click here)
- Web Page Inventory - Answer (click here)
- Point-of-Production Architecture - Answer (click here)
- Architecture Style Guides - Answer (click here)
- Learning from Users - Answer (click here)
- Information Architecture in Action - Answer (click here)
No comments:
Post a Comment