Distributed Systems Security: Issues, Processes and SolutionsISBN: 978-0-470-51988-2
Hardcover
334 pages
March 2009
|
1.1 Background
1.2 Distributed Systems.
1.3 Distributed Systems Security.
1.4 About the Book.
Chapter 2: Security Engineering.
2.1 Introduction.
2.2 Secure Development Life Cycle Processes – An Overview.
2.3 A Typical Security Engineering Process.
2.4 Important Security Engineering Guidelines and Resources.
2.5 Conclusion.
Chapter 3. Common Security Issues and Technologies.
3.1 Security Issues.
3.2 Common Security Techniques.
3.3 Summary.
Chapter 4 – Host level Threats and Vulnerabilities.
4.1 Background.
4.2 Malware.
4.3 Eavesdropping.
4.4 Job faults.
4.5 Resource starvation.
4.6 Overflow.
4.7 Privilege escalation.
4.8 Injection attacks.
4.9 Conclusion.
Chapter 5 – Infrastructure Level Threats & Vulnerabilities.
5.1 Introduction.
5.2 Network Level Threats and Vulnerabilities.
5.3 Grid Computing Threats and Vulnerabilities.
5.4 Storage Threats and Vulnerabilities.
Chapter 6: Application Level Vulnerabilities and Attacks.
6.1 Introduction.
6.2 Application Layer Vulnerabilities.
6.3 Conclusion.
Chapter 7 – Service Level Issues, Threats and Vulnerabilities.
7.1 Introduction.
7.2 SOA and Role of Standards.
7.3 Service Level Security Requirements.
7.4 Service Level Threats and Vulnerabilities.
7.5 Service Level Attacks.
7.6 Services Threat Profile.
7.7 Conclusions.
Chapter 8: Host level Solutions.
8.1 Background.
8.2 Sandboxing.
8.3 Virtualization.
8.4 Resource Management
8.5 Proof carrying code.
8.6 Memory firewall
8.7 Anti malware.
8.8 Conclusions.
Chapter 9 – Infrastructure Level Solutions
9.1 Introduction.
9.2 Network Level Solutions.
9.3 Grid Level Solutions.
9.4 Storage Level Solutions.
Chapter 10: Application Level Solutions.
10.1 Introduction.
10.2 Application Level Security Solutions.
10.3 Conclusion.
Chapter 11 – Service Level Solutions.
11.1 Introduction.
11.2 Services Security Policy.
11.3 SOA Security standards stack.
11.4 Standards in Depth.
11.5 Deployment Architectures for SOA Security.
11.6 Managing Service Level Threats.
11.7 Service Threat Solution Mapping.
11.8 XML Firewall Configuration-Threat Mapping.
11.9 Conclusions.
Chapter 12 - Case Study – Compliance in Financial Services.
12.1 Introduction.
12.2 SOX compliance.
12.3 SOX Security Solutions.
12.4 Multi-level policy driven solution architecture.
12.5 Conclusions.
Chapter 13 – Case Study of Grid.
13.1 Background.
13.2 Financial Application.
13.3 Security Requirements Analysis.
13.4 Final Security Architecture.
Chapter 14: Future directions and Conclusions.
14.1 Future directions.
14.2 Conclusions.