Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Security Policy

Design Innovation and Network Architecture for the Future Internet
A set of measures (e.g., traffic encryption, traffic filtering, traffic redirection) defined by a security Policy Decision Point (e.g., an SDN controller) and enforced by a set of components (e.g., routers, firewalls) to protect a networking infrastructure and the devices (e.g., Customer Premises Equipment, mobile terminal) connected to it against attacks.
Published in Chapter:
From Protected Networks to Protective and Collaborative Networking: An Approach to a Globally Anticipative Attack Mitigation Framework for the Future Internet
Mohamed Boucadair (Orange S.A., France) and Christian Jacquenet (Orange S.A., France)
Copyright: © 2021 |Pages: 23
DOI: 10.4018/978-1-7998-7646-5.ch012
Abstract
Security has always been a major concern of network operators. Despite a pretty rich security toolbox that never ceased to improve over the years (filters, traffic wells, encryption techniques, and intrusion detection systems to name a few), attacks keep on increasing from both a numerical and amplitude standpoints. Such protean attacks demand an adapted security toolkit that should include techniques capable of not only detecting these attacks but also anticipating them even before they reach their target. Strengthening future networking infrastructures so that they become protective, instead of being “just” protected must thus become one of the key strategic objectives of network operators and service providers who ambition to rely upon robust, dynamic, security policy enforcement schemes to develop their business while retaining their existing customers. This chapter discusses the various security challenges that may be further exacerbated by future networking infrastructures. It also presents some of the techniques that are very likely to become cornerstones of protective networking.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Developing a Web Service Security Framework
A security policy is a generic document that outlines rules for computer network access. It determines how policies are laid out and some of the basic architecture of the company security environment.
Full Text Chapter Download: US $37.50 Add to Cart
Management and Cost Estimation of Security Projects
is a document that lays the framework for information system security of the enterprise. Through this framework, a security project team can draw intelligible objectives, plans, rules and formal procedures required to manage and protect the sensitive enterprise information system from different attacks.
Full Text Chapter Download: US $37.50 Add to Cart
National Security Policy and Strategy and Cyber Security Risks
Set of rules, guidelines and procedures represented in official security documents that define way in which state will protect its own national security interests.
Full Text Chapter Download: US $37.50 Add to Cart
E-Collaboration Enhanced Host Security
A set of rules to act, in which the expectations and provisions of accessibility of the computer for the users and the administrators are also included. It is worth it to be made up before initiating medium- or large-sized computer networking systems.
Full Text Chapter Download: US $37.50 Add to Cart
Network-Based Intrusion Detection
It means a set of rules to act, in which the expectations and provisions of accessibility of the computer for the users and the administrators also included. It is worth to be made up before initiating medium or large sized computer networking systems.
Full Text Chapter Download: US $37.50 Add to Cart
ICT Security Policy: Challenges and Potential Remedies
A written documents defining how a given enterprise approaches the security of its IT resources.
Full Text Chapter Download: US $37.50 Add to Cart
Access Control Framework for Cloud Computing
A definition of what it means to be secure for a system, organization or other entity.
Full Text Chapter Download: US $37.50 Add to Cart
Application of the P2P Model for Adaptive Host Protection
It means a set of rules to act, in which the expectations and provisions of accessibility of the computer for the users and the administrators are also included. It is worth it to be made up before initiating medium or large sized computer networking systems.
Full Text Chapter Download: US $37.50 Add to Cart
Information Availability
A documented high-level plan for organization-wide computer and information security.
Full Text Chapter Download: US $37.50 Add to Cart
Application Security for Mobile Devices
Formal description of the security requirements of a system.
Full Text Chapter Download: US $37.50 Add to Cart
Intrusion Detection Based on P2P Software
It means a set of rules in which the expectations and provisions of usage for the users, and the administrators also, is made up. It is worth making up before initiating medium or large sized systems.
Full Text Chapter Download: US $37.50 Add to Cart
Cost Estimation and Security Investment of Security Projects
Is a document that lays the framework for information system security of the enterprise. Through this framework, a security project team can draw intelligible objectives, plans, rules and formal procedures required to manage and protect the sensitive enterprise information system from different attacks.
Full Text Chapter Download: US $37.50 Add to Cart
Peer-to-Peer Methods for Operating System Security
A set of rules, which are used to manage expectations and provisions of how a system should be used. These rules should be obeyed by users as well as administrators of the system.
Full Text Chapter Download: US $37.50 Add to Cart
E-Business Systems Security in Intelligent Organizations
Documented procedures that focus on the organization’s management of security; it is about information confidentiality, integrity, and availability of resources.
Full Text Chapter Download: US $37.50 Add to Cart
Security Issues in Cloud Computing
Security policy is a definition of what it means to be secure for a system, organization or other entity. A computer security policy defines the goals and elements of an organization's computer systems. The definition can be highly formal or informal. Security policies are enforced by organizational policies or security mechanisms. A technical implementation defines whether a computer system is secure or insecure . These formal policy models can be categorized into the core security principles of: Confidentiality, Integrity and Availability.
Full Text Chapter Download: US $37.50 Add to Cart
PolyOrBAC: An Access Control Model for Inter-Organizational Web Services
is the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. Basically, a security policy is specified through: the security objectives that must be satisfied (expressed in terms of confidentiality, integrity and availability) and the security rules expressing how the system may evolve in a secure way (who has access to what and in which conditions).
Full Text Chapter Download: US $37.50 Add to Cart
Security, Trust, and Privacy on Mobile Devices and Multimedia Applications
A security policy is the ruleset which defines the security constraints under which a certain system is allowed to operate and interact. In other words, all restrictions and permissions for persons, objects, information-flows, and data storage are defined there.
Full Text Chapter Download: US $37.50 Add to Cart
Security Policies and Procedures
A written document specifying how all assets of an organization will be protected through the use of individual procedures.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR