Internal Security Policy and Data Integrity Verification

dc.AffiliationOctober University for modern sciences and Arts (MSA)
dc.contributor.authorA. EL-LICY, FATMA
dc.contributor.authorHUSSEIN, OMAR
dc.contributor.authorHEGAZY, OSMAN
dc.date.accessioned2020-02-13T11:21:00Z
dc.date.available2020-02-13T11:21:00Z
dc.date.issued2010
dc.descriptionMSA Google Scholaren_US
dc.description.abstractThis paper presents a method to safeguard stored data integrity from attacks committed by insiders. This method forms an additional data security layer to detect and prevent unauthorized modification to critical configuration and data files. It integrates Biba strict integrity mandatory access control security policy with the verification by comparison data integrity assurance method. This proposed layer focuses on monitoring critical files in order to limits the scope of potential damage resulting from unattended sessions, and prevents usage of ill-gotten access rights. The paper discusses consequences of such integration.en_US
dc.description.sponsorshipInstitute of Statistical Studies and Research, Cairo Universityen_US
dc.description.urihttps://www.scimagojr.com/journalsearch.php?q=19700182731&tip=sid&clean=0
dc.identifier.citation[1] CSI, 2007. Computer Crime and Security Survey, Computer Security Institute Web page at URL: “http://www.computer-corner.com/pdf/CSISurvey2007.pdf”. Last Accessed July 18 2010. [2] CSI and FBI, 2006. Computer Crime and Security Survey, Computer Security Institute and Federal Bureau of Investigation, Web page at URL: “http://www.computer-corner.com/pdf/CSISurvey2007.pdf”. Accessed July 18, 2010. [3] Howlett, T. 2005. Open Source Security Tools: Practical Applications for Security, Pearson Education. [4] Peltier, T., et al. 2005. Information Security Fundamentals, CRC Press. [5] Gordon, S., & Gordon, J. 2004. Information Systems: A Management Approach, 3 rd edition, Leyh Publishing. [6] Hussien, Omar, et. al. 2008. A Security Policy Based on Data Integrity Verification, Master Thesis, Cairo University, Institute of Statistical Studies and Research Department of Computer and Information Sciences. [7] Stallings, W. 2003. Cryptography and Network Security: Principles and Practice, 3rd edition, Pearson Education. [8] Park, Jaehong and Sandhu, Ravi. 2002. Towards Usage Control Models: Beyond Traditional Access Control. Web page at URL: “http://filebox.vt.edu/users/sshah/p57- park.pdf”. Accessed 13 October 2008 [9] Peltier, T. 2005. Information Security Risk Analysis, 2nd edition, CRC Press Taylor & Francis Group. [10] Conklin, W., et al. 2004. Principles of Computer Security, McGraw-Hill Technology Education. FATMA A. EL-LICY, OMAR HUSSEIN & OSMAN HEGAZY The Egyptian Computer Journal, Vol. 37, No. 1, 2010 89 [11] Kolman, B., et al. 1996. Discrete Mathematical Structures, 3rd edition, Prentice- Hall International. [12] Pfleeger, C. 1987. Security in Computing, Prentice-Hall International. [13] Pipkin, D. 2000. Information Security: Protecting the Global Enterprise, Prentice- Hall International. [14] CSI Computer Security Institute, 2009, “CSI Computer Crime and Security Survey 2009,” web page at URL: ”http://gocsi.com/node/577”. [15] “Safeguarding against insider threats: a problem analysis and solution overview to securing enterprise data”, 2006. Web page at URL: “http://wp.bitpipe.com /resource/org _1136846669_454/ON_Whitepaper_1_30_06_In-Network.pdf”.en_US
dc.identifier.urihttps://t.ly/P3qbx
dc.language.isoenen_US
dc.publisherInstitute of Statistical Studies and Research, Cairo Universityen_US
dc.relation.ispartofseriesEgyptian Computer Journal;Volume: 37 Issue: 1 Pages: 75-89
dc.subjectOctober University for University of Security Policy, Multilevel Security, Data Integrity Verification, Access Control, ACL, DAC, MACen_US
dc.titleInternal Security Policy and Data Integrity Verificationen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
avatar_scholar_256.png
Size:
6.31 KB
Format:
Portable Network Graphics
Description:
Faculty Of Computer Science Research Paper

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
51 B
Format:
Item-specific license agreed upon to submission
Description: