Skip to main content

System Administration

  • Chapter
  • First Online:
The NICE Cyber Security Framework
  • 1087 Accesses

Abstract

Information Systems exist these days in all business domains. They form core business IT infrastructures. Security and vulnerability issues in information systems can come from the systems themselves, applications developed on those systems, how those systems are configured or administered or users of those systems. In this chapter, we will survey information systems in different business domains focusing on security issues and standards.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. DHS, Privacy Impact Assessments. https://www.dhs.gov/privacy-impact-assessments. Accessed August 2019.

  2. Privacy Office, Office of Information Technology, Privacy impact assessment guide. https://www.sec.gov/about/privacy/piaguide.pdf. Revised January 2007.

  3. Zhai, G., Niu, H., Yang, N., Tian, M., Liu, C., & Yang, H. (2009, December 10–12). Security testing for operating system and its system calls, from book Security technology. In International Conference, SecTech 2009, held as part of the Future Generation Information Technology Conference, FGIT 2009 (pp. 116–123). Jeju Island, Korea.

    Google Scholar 

  4. MITRE. (2017). Deborah Bodeau and Richard Graubart (p. 2017). MITRE January: Cyber Resiliency Design Principles.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Izzat Alsmadi .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Alsmadi, I. (2020). System Administration. In: The NICE Cyber Security Framework. Springer, Cham. https://doi.org/10.1007/978-3-030-41987-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-41987-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-41986-8

  • Online ISBN: 978-3-030-41987-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics