Systems Security Management
The information security arena contains a broad array of multi-level models for assessing, planning, implementing and monitoring the mitigation of security risks. At the very core of this information security spectrum are the actual system and network devices which store, manage, transmit and secure information. Areas to be covered include: risk assessment; operational issues, planning, and design.
Proper safeguarding of operating systems and related components: issues and techniques, Other areas are covered around Information Assurance topics such as Security policy, international conflict, and cyber warfare, Security and privacy in online social networks, mobile and web security, security applications of program analysis, botnets and malware analysis, Hardware and software system vulnerabilities. This course offers a solid base for system administrators and technical managers.
- Matt B. (2003). Computer Security: Art and Science. Addison-Wesley (ISBN: 0-201-44099-7),
- McGraw, Gary. (2006). Software Security: Building Security In. IEEE Security & Privacy. 2. 6. 10.1109/ISSRE.2006.43.
- Prislan, Kaja & Lobnikar, Branko & Bernik, Igor. (2017). Information Security Management Practices: Expectations and Reality. 10.18690/978-961-286-114-8.1.
- Pistoia M., Logozzo F. (2007) Program Analysis for Security and Privacy. In: Südholt M., Consel C. (eds) Object-Oriented Technology. ECOOP 2006 Workshop Reader. ECOOP 2006. Lecture Notes in Computer Science, vol 4379. Springer, Berlin, Heidelberg
- Chakraborti, Subhamoy & Acharjya, Debi & Sanyal, Sugata. (2015). Application Security framework for Mobile App Development in Enterprise Setup. International Journal of Advanced Networking and Applications. 06.
- Kata Rebeka Szűcs & Regina Zsuzsánna Reicher, 2017."Mobile Application Security," Volume of Management, Enterprise and Benchmarking in the 21st century IV,