Sunteți pe pagina 1din 10

Information Management

Lecture Notes, Study Materials and Important questions answers

Subject : Information Management


DATABASE MODELLING and MANAGEMENT AND
DEVELOPMENT
DATA SECURITY AND PRIVACY
INFORMATION GOVERNANCE
INFORMATION ARCHITECTURE
INFORMATION LIFECYCLE MANAGEMENT
Security in Computing By Charles P Pfleeger
Chapter 1 Is There a Security Problem in Computing
1. What Does "Secure" Mean? - Answer (click here)
2. Protecting Software in Automobile Control Systems - Answer (click here)
3. Attacks - Answer (click here)
4. Why Universities Are Prime Targets - Answer (click here)
5. The Meaning of Computer Security - Answer (click here)
6. Record Record Loss - Answer (click here)
7. Top Methods of Attack - Answer (click here)
8. Computer Criminals - Answer (click here)
9. The Terrorists, Inc., IT Department - Answer (click here)
10. Methods of Defense - Answer (click here)

Chapter 2 Elementary Cryptography


1. Elementary Cryptography - Answer (click here)
2. Elementary Cryptography - Terminology and Background - Answer (click
here)
3. Substitution Ciphers - Answer (click here)
4. Transpositions (Permutations) - Answer (click here)
5. Making "Good" Encryption Algorithms - Answer (click here)
6. The Data Encryption Standard(DES) - Answer (click here)
7. The AES Encryption Algorithm - Answer (click here)
8. Public Key Encryption - Answer (click here)
9. The Uses of Encryption - Answer (click here)

Chapter 3 Program Security


1. Program Security - Answer (click here)
2. Secure Programs - Answer (click here)
3. Nonmalicious Program Errors - Answer (click here)
4. Viruses and Other Malicious Code - Answer (click here)
5. Nonmalicious Flaws Cause Failures - Answer (click here)
6. Why Worry About Malicious Code? - Answer (click here)
7. Kinds of Malicious Code - Answer (click here)
8. Rapidly Approaching Zero - Answer (click here)
9. How Viruses Attach - Answer (click here)
10. How Viruses Gain Control - Answer (click here)
11. Homes for Viruses - Answer (click here)
12. Virus Signatures - Answer (click here)
13. The Source of Viruses - Answer (click here)
14. Prevention of Virus Infection - Answer (click here)
15. Truths and Misconceptions About Viruses - Answer (click here)
16. First Example of Malicious Code: The Brain Virus - Answer (click here)
17. Example: The Internet Worm - Answer (click here)
18. More Malicious Code: Code Red - Answer (click here)
19. Malicious Code on the Web: Web Bugs - Answer (click here)
20. Is the Cure Worse Than the Disease? - Answer (click here)
21. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click
here)
22. Salami Attack - Answer (click here)
23. Rootkits and the Sony XCP - Answer (click here)
24. Privilege Escalation - Answer (click here)
25. Interface Illusions - Answer (click here)
26. Keystroke Logging - Answer (click here)
27. Man-in-the-Middle Attacks - Answer (click here)
28. Timing Attacks - Answer (click here)
29. Covert Channels: Programs That Leak Information - Answer (click here)
30. Controls Against Program Threats - Answer (click here)
31. The Nature of Software Development - Answer (click here)
32. Modularity, Encapsulation, and Information Hiding - Answer (click here)
33. Peer Reviews - Answer (click here)
34. Hazard Analysis - Answer (click here)
35. Testing - Answer (click here)
36. Good Design and Prediction - Answer (click here)
37. Static Analysis - Answer (click here)
38. Configuration Management - Answer (click here)
39. Lessons from Mistakes - Answer (click here)
40. There's More Than One Way to Crack a System - Answer (click here)
41. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here)
42. Programming Practice Conclusions - Answer (click here)
43. Standards of Program Development - Answer (click here)
44. Process Standards - Answer (click here)
45. Program Controls in General - Answer (click here)

Chapter 4 Protection in General Purpose Operating Systems


1. Protection in General-Purpose Operating Systems - Answer (click here)
2. Protected Objects and Methods of Protection - Answer (click here)
3. Memory and Address Protection - Answer (click here)
4. Control of Access to General Objects - Answer (click here)
5. File Protection Mechanisms - Answer (click here)
6. User Authentication - Answer (click here)
7. Biometrics: Ready for Prime Time? - Answer (click here)
8. Passwords as Authenticators - Answer (click here)
9. Additional Authentication Information - Answer (click here)
10. Attacks on Passwords - Answer (click here)
11. Password Selection Criteria - Answer (click here)
12. The Authentication Process - Answer (click here)
13. Biometrics: Authentication Not Using Passwords - Answer (click here)

Chapter 5 Designing Trusted Operating Systems


1. Designing Trusted Operating Systems - Answer (click here)
2. What Is a Trusted System? - Answer (click here)
3. Security Policies - Answer (click here)
4. Models of Security - Answer (click here)
5. Trusted Operating System Design - Answer (click here)
6. The Importance of Good Design Principles - Answer (click here)
7. Trusted System Design Elements - Answer (click here)
8. Security Features of Ordinary Operating Systems - Answer (click here)
9. Security Features of Trusted Operating Systems - Answer (click here)
10. Kernelized Design - Answer (click here)
11. Separation/Isolation - Answer (click here)
12. Virtualization - Answer (click here)
13. Layered Design - Answer (click here)
14. Assurance in Trusted Operating Systems - Answer (click here)
15. Typical Operating System Flaws - Answer (click here)
16. Assurance Methods - Answer (click here)
17. Open Source - Answer (click here)
18. Evaluation - Answer (click here)
19. Security as an Add-On - Answer (click here)

Chapter 6 Database and Data Mining Security


1. Database and Data Mining Security - Answer (click here)
2. Introduction to Databases - Answer (click here)
3. Security Requirements - Answer (click here)
4. Reliability and Integrity - Answer (click here)
5. Sensitive Data - Answer (click here)
6. Inference - Answer (click here)
7. Multilevel Databases - Answer (click here)
8. Proposals for Multilevel Security - Answer (click here)
9. Data Mining - Answer (click here)

Chapter 7 Security in Networks


1. Security in Networks - Answer (click here)
2. Network Concepts - Answer (click here)
3. Network Media - Answer (click here)
4. Network Protocols - Answer (click here)
5. Types of Networks - Answer (click here)
6. Threats in Networks - Answer (click here)
7. Who Attacks Networks? - Answer (click here)
8. Threats in Transit: Eavesdropping and Wiretapping - Answer (click here)
9. Protocol Flaws - Answer (click here)
10. Impersonation - Answer (click here)
11. Message Confidentiality Threats - Answer (click here)
12. Message Integrity Threats - Answer (click here)
13. Format Failures - Answer (click here)
14. Web Site Vulnerabilities - Answer (click here)
15. Denial of Service - Answer (click here)
16. Distributed Denial of Service - Answer (click here)
17. Threats in Active or Mobile Code - Answer (click here)
18. Threats in Active or Mobile Code - Answer (click here)
19. Networks Complex Attacks - Answer (click here)
20. Network Security Controls - Security Threat Analysis - Answer (click here)
21. Architecture - Security in Networks - Answer (click here)
22. Encryption - Security in Networks - Answer (click here)
23. Content Integrity - Security in Networks - Answer (click here)
24. Strong Authentication and Kerberos - Security in Networks - Answer (click
here)
25. Access Controls - Security in Networks - Answer (click here)
26. Wireless Networks Security - Answer (click here)
27. Honeypots, Alarms and Alerts - Security in Networks - Answer (click here)
28. Traffic Flow Security - Answer (click here)
29. Firewalls - Answer (click here)
30. Types of Firewalls - Answer (click here)
31. Example Firewall Configurations - Answer (click here)
32. Intrusion Detection Systems - Answer (click here)
33. Types of IDSs(Intrusion Detection Systems) - Answer (click here)
34. Goals for Intrusion Detection Systems - Answer (click here)
35. Intrusion Detection Systems(IDS) Strengths and Limitations - Answer
(click here)
36. Secure E-Mail - Answer (click here)

Chapter 8 Administering Security


1. Administering Security - Answer (click here)
2. Security Planning - Answer (click here)
3. Contents of a Security Plan - Answer (click here)
4. Security Planning Team Members - Answer (click here)
5. Assuring Commitment to a Security Plan - Answer (click here)
6. Business Continuity Plans - Answer (click here)
7. Incident Response Plans - Answer (click here)
8. Risk Analysis - Answer (click here)
9. The Nature of Risk - Answer (click here)
10. Steps of a Risk Analysis - Answer (click here)
11. Arguments For and Against Risk Analysis - Answer (click here)
12. Organizational Security Policies - Answer (click here)
13. Characteristics of a Good Security Policy - Answer (click here)
14. Policy Issue Example: Government E-mail - Answer (click here)
15. Physical Security - Answer (click here)
16. Interception of Sensitive Information - Answer (click here)
17. Contingency Planning - Answer (click here)
18. Physical Security Recap - Answer (click here)

Chapter 9 The Economics of Cybersecurity


1. The Economics of Cybersecurity - Answer (click here)
2. Making a Business Case - Answer (click here)
3. Quantifying Security - Answer (click here)
4. The Economic Impact of Cybersecurity - Answer (click here)
5. Data to Justify Security Action - Answer (click here)
6. A Summary of Recent Security Surveys - Answer (click here)
7. Are the Data Representative? - Answer (click here)
8. Sources of Attack and Financial Impact - Answer (click here)
9. Modeling Cybersecurity - Answer (click here)
10. Current Research and Future Directions - Answer (click here)

Chapter 10 Privacy in Computing


1. Privacy in Computing - Answer (click here)
2. Privacy Concepts - Answer (click here)
3. Computer-Related Privacy Problems - Answer (click here)
4. Privacy Principles and Policies - Answer (click here)
5. Authentication and Privacy - Answer (click here)
6. What Authentication Means - Answer (click here)
7. Data Mining - Answer (click here)
8. Privacy on the Web - Answer (click here)
9. Spyware - Answer (click here)
10. Shopping on the Internet - Answer (click here)
11. E-Mail Security - Answer (click here)
12. Impacts on Emerging Technologies - Answer (click here)

Chapter 11 Legal and Ethical Issues in Computer Security


1. Legal and Ethical Issues in Computer Security - Answer (click here)
2. Protecting Programs and Data - Answer (click here)
3. Copyrights - Protecting Programs and Data - Answer (click here)
4. Patents - Protecting Programs and Data - Answer (click here)
5. Trade Secrets - Answer (click here)
6. Protection for Computer Objects - Answer (click here)
7. Information and the Law - Answer (click here)
8. Rights of Employees and Employers - Answer (click here)
9. Redress for Software Failures - Answer (click here)
10. Computer Crime - Answer (click here)
11. Why Computer Crime Is Hard to Define and Prosecute - Answer (click here)
12. Examples of Statutes - Answer (click here)
13. International Dimensions - Answer (click here)
14. Why Computer Criminals Are Hard to Catch - Answer (click here)
15. What Computer Crime Does Not Address - Answer (click here)
16. Cryptography and the Law - Answer (click here)
17. Ethical Issues in Computer Security - Answer (click here)
18. Case Studies of Ethics: Use of Computer Services - Answer (click here)
19. Case Studies of Ethics: Privacy Rights - Answer (click here)
20. Case Studies of Ethics: Denial of Service - Answer (click here)
21. Case Studies of Ethics: Ownership of Programs - Answer (click here)
22. Case Studies of Ethics: Proprietary Resources - Answer (click here)
23. Case Studies of Ethics: Fraud - Answer (click here)
24. Case Studies of Ethics: Accuracy of Information - Answer (click here)
25. Case Studies of Ethics: Ethics of Hacking or Cracking - Answer (click here)
26. Codes of Computer Ethics - Answer (click here)

Chapter 12 Cryptography Explained


1. Cryptography Explained - Answer (click here)
2. Mathematics for Cryptography - Answer (click here)
3. Symmetric Encryption - Answer (click here)
4. Data Encryption Standard - Answer (click here)
5. Advanced Encryption Standard - Answer (click here)
6. Public Key Encryption Systems - Answer (click here)
7. MerkleHellman Knapsacks - Answer (click here)
8. RivestShamirAdelman (RSA) Encryption - Answer (click here)
9. The El Gamal and Digital Signature Algorithms - Answer (click here)
10. Quantum Cryptography - Answer (click here)

Information Architecture on the World Wide Web by Peter


Morville
Chapter 1 What Makes a Web Site Work
1. What Makes a Web Site Work - Answer (click here)
2. Consumer Sensitivity Boot Camp - Answer (click here)
3. Web Site Work - If You Don't Like to Exercise - Answer (click here)
4. The Role of the Information Architect - Answer (click here)

Chapter 2 Introduction to Information Architecture


1. Who Should Be the Information Architect? - Answer (click here)
2. Collaboration and Communication - Answer (click here)
3. Organizing Information - Answer (click here)

Chapter 3 Organizing Information


1. Organizing Information - Answer (click here)
2. Organizational Challenges - Answer (click here)
3. Organizing Web Sites and Intranets - Answer (click here)
4. Creating Cohesive Organization Systems - Answer (click here)
5. Designing Navigation Systems - Answer (click here)

Chapter 4 Designing Navigation Systems


1. Designing Navigation Systems - Answer (click here)
2. Browser Navigation Features - Answer (click here)
3. Building Context - Answer (click here)
4. Improving Flexibility - Answer (click here)
5. Types of Navigation Systems - Answer (click here)
6. Integrated Navigation Elements - Answer (click here)
7. Remote Navigation Elements - Answer (click here)
8. Designing Elegant Navigation Systems - Answer (click here)
9. Labeling Systems - Answer (click here)

Chapter 5 Labeling Systems


1. Labeling Systems - Answer (click here)
2. Why You Should Care About Labeling - Answer (click here)
3. Labeling Systems, Not Labels - Answer (click here)
4. Types of Labeling Systems - Answer (click here)
5. Creating Effective Labeling Systems - Answer (click here)
6. Fine-Tuning the Labeling System - Answer (click here)
7. Non-Representational Labeling Systems - Answer (click here)
8. A Double Challenge - Labeling Systems - Answer (click here)
9. Searching and Your Web Site - Answer (click here)

Chapter 6 Searching Systems


1. Searching and Your Web Site - Answer (click here)
2. Understanding How Users Search - Answer (click here)
3. Designing the Search Interface - Answer (click here)
4. In an Ideal World: The Reference Interview - Answer (click here)
5. Indexing the Right Stuff - Answer (click here)
6. To Search or Not To Search? - Answer (click here)
7. Research - Answer (click here)

Chapter 7 Research
1. Research - Answer (click here)
2. Research: Defining Goals - Answer (click here)
3. Learning About the Intended Audiences - Answer (click here)
4. Identifying Content and Function Requirements - Answer (click here)
5. Grouping Content - Answer (click here)
6. Conceptual Design - Answer (click here)

Chapter 8 Conceptual Design


1. Conceptual Design - Answer (click here)
2. Brainstorming with White Boards and Flip Charts - Answer (click here)
3. Metaphor Exploration - Answer (click here)
4. High-Level Architecture Blueprints - Answer (click here)
5. Architectural Page Mockups - Answer (click here)
6. Design Sketches - Answer (click here)
7. Web-Based Prototypes - Answer (click here)
8. Production and Operations - Answer (click here)

Chapter 9 Production and Operations


1. Production and Operations - Answer (click here)
2. Detailed Architecture Blueprints - Answer (click here)
3. Content Mapping - Answer (click here)
4. Web Page Inventory - Answer (click here)
5. Point-of-Production Architecture - Answer (click here)
6. Architecture Style Guides - Answer (click here)
7. Learning from Users - Answer (click here)
8. Information Architecture in Action - Answer (click here)

Chapter 10 Information Architecture in Action


1. Information Architecture in Action - Answer (click here)
2. Archipelagoes of Information - Answer (click here)
3. A Case Study: Henry Ford Health System - Answer (click here)

S-ar putea să vă placă și