𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Computer Architecture and Security: Fundamentals of Designing Secure Computer Systems

✍ Scribed by Wang, Shuangbao(Contributor);Ledley, Robert S


Publisher
Wiley
Year
2013
Tongue
English
Leaves
343
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The first book to introduce computer architecture for security and provide the tools to implement secure computer systemsThis book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace.

Examination of memory, CPU architecture and system implementation Discussion of computer buses and a dual-port bus interface Examples cover a board spectrum of hardware and software systems Design and implementation of a patent-pending secure computer system Includes the latest patent-pending technologies in architecture security Placement of computers in a security fulfilled network environment Co-authored by the inventor of the modern Computed Tomography (CT) scanner Provides website for lecture notes, security tools and latest updates

✦ Table of Contents


Computer Architecture and Security: Fundamentals of Designing Secure Computer Systems......Page 2
Contents......Page 8
About the Authors......Page 16
Preface......Page 18
Acknowledgements......Page 20
1 Introduction to Computer Architecture and Security......Page 22
1.1 History of Computer Systems......Page 24
1.1.1 Timeline of Computer History......Page 26
1.1.2 Timeline of Internet History......Page 36
1.1.3 Timeline of Computer Security History......Page 49
1.2 John von Neumann Computer Architecture......Page 55
1.3 Memory and Storage......Page 57
1.4 Input/Output and Network Interface......Page 58
1.5 Single CPU and Multiple CPU Systems......Page 59
1.6.1 Confidentiality......Page 62
1.6.3 Availability......Page 63
1.6.5 Firewalls......Page 64
1.6.6 Hacking and Attacks......Page 65
1.7 Security Problems in Neumann Architecture......Page 67
Exercises......Page 69
References......Page 71
2.1 Concept of Logic Unit......Page 72
2.2 Logic Functions and Truth Tables......Page 73
2.3 Boolean Algebra......Page 75
2.4 Logic Circuit Design Process......Page 76
2.5 Gates and Flip-Flops......Page 77
2.7 FPGA and VLSI......Page 79
2.7.2 A RIFD Student Attendance System......Page 80
2.8 Summary......Page 86
References......Page 88
3.1 A One Bit Memory Circuit......Page 89
3.2 Register, MAR, MDR and Main Memory......Page 91
3.3 Cache Memory......Page 93
3.4 Virtual Memory......Page 95
3.4.2 Segmented Virtual Memory......Page 96
3.5 Non-Volatile Memory......Page 97
3.6 External Memory......Page 98
3.6.2 Tertiary Storage and Off-Line Storage......Page 99
3.6.3 Serial Advanced Technology Attachment SATA......Page 100
3.6.4 Small Computer System Interface SCSI......Page 101
3.6.5 Serial Attached SCSI SAS......Page 102
3.6.6 Network-Attached Storage NAS......Page 103
3.6.7 Storage Area Network SAN......Page 104
3.6.8 Cloud Storage......Page 106
3.7 Memory Access Security......Page 107
3.8 Summary......Page 109
References......Page 110
4.1 System Bus......Page 111
4.1.1 Address Bus......Page 112
4.1.3 Control Bus......Page 114
4.2.1 Parallel Buses and Parallel Communication......Page 116
4.2.2 Serial Bus and Serial Communication......Page 117
4.2.2.1 Morse Code......Page 118
4.2.2.2 RS-232......Page 120
4.2.2.3 Ethernet......Page 121
4.2.2.4 MIDI......Page 124
4.3 Synchronous Bus and Asynchronous Bus......Page 128
4.4 Single Bus and Multiple Buses......Page 130
4.5 Interconnection Buses......Page 131
4.6 Security Considerations for Computer Buses......Page 132
4.7 A Dual-Bus Interface Design......Page 133
4.7.1 Dual-Channel Architecture......Page 134
4.7.2 Triple-Channel Architecture......Page 135
4.8 Summary......Page 136
References......Page 138
5.1 Direct Memory Access......Page 139
5.2 Interrupts......Page 141
5.3 Programmed I/O......Page 142
5.4 USB and IEEE 1394......Page 143
5.4.2 USB Architecture......Page 144
5.4.3 USB Version History......Page 145
5.4.4 USB Design and Architecture......Page 146
5.4.5 USB Mass Storage......Page 148
5.4.6 USB Interface Connectors......Page 149
5.4.7 USB Connector Types......Page 151
5.4.8 USB Power and Charging......Page 154
5.5 Network Interface Card......Page 157
5.5.1 Basic NIC Architecture......Page 158
5.5.2.1 Send......Page 159
5.6 Keyboard, Video and Mouse KVM Interfaces......Page 160
5.7 Input/Output Security......Page 161
5.8 Summary......Page 162
Exercises......Page 163
References......Page 164
6.1.1 Instruction Classifications......Page 165
6.1.3 Arithmetic Instructions......Page 166
6.1.4.2 Stack Manipulation Instructions......Page 168
6.1.4.4 Rotate Instructions......Page 169
6.1.4.5 Control Transfer Instructions......Page 170
6.1.4.7 Loop Instructions......Page 171
6.1.4.8 Random Number Generator Instruction......Page 172
6.1.4.9 Program Environment Instructions......Page 173
6.2.1 General-Purpose Registers......Page 174
6.2.2 Segment Registers......Page 176
6.2.3 EFLAGS Register......Page 177
6.3.1 Intel Instruction Pointer......Page 179
6.3.2 Interrupt and Exception......Page 180
6.3.2.1 Source of Interrupts......Page 181
6.4 RISC Processors......Page 182
6.4.2 Architecture and Programming......Page 183
6.4.4 Advantages and Disadvantages......Page 184
6.5.1 Different Types of Pipelines......Page 185
6.5.2 Pipeline Performance Analysis......Page 186
6.6 CPU Security......Page 187
6.7 Virtual CPU......Page 189
6.8 Summary......Page 190
References......Page 191
7.1.1 Multiprocessing......Page 193
7.1.2 Cache......Page 194
7.1.3 Hyper-Threading......Page 195
7.1.5 Multiprocessing Operating Systems......Page 196
7.1.6 The Future of Multiprocessing......Page 197
7.2.1 History of Parallel Processing......Page 198
7.2.3 Bit-Level Parallelism......Page 199
7.2.6 Task-Level Parallelism......Page 200
7.2.7 Memory in Parallel Processing......Page 201
7.2.8 Specialized Parallel Computers......Page 202
7.3 Ubiquitous Computing......Page 203
7.3.1 Ubiquitous Computing Development......Page 204
7.3.2 Basic forms of Ubiquitous Computing......Page 205
7.3.3 Augmented Reality......Page 206
7.3.4 Mobile Computing......Page 207
7.4.1 Characteristics of Grid Computing......Page 208
7.4.2 The Advantages and Disadvantages of Grid Computing......Page 209
7.4.4 Distributed Systems......Page 210
7.4.6 Distributed Computing Architectures......Page 211
7.4.7 Cloud Computing......Page 213
7.4.8 Technical Aspects of Cloud Computing......Page 214
7.4.9 Security Aspects of Cloud Computing......Page 215
7.4.10 Ongoing and Future Elements in Cloud Computing......Page 216
7.4.11 Adoption of Cloud Computing Industry Drivers......Page 217
7.5 Internet Computing......Page 218
7.5.1 Internet Computing Concept and Model......Page 219
7.5.2 Benefit of Internet Computing for Businesses......Page 220
7.5.3 Examples of Internet Computing......Page 222
7.5.4 Migrating Internet Computing......Page 223
7.6.1 Types of Virtualization......Page 224
7.6.3 Virtualization Architecture......Page 226
7.6.5 Examples of Virtual Machines......Page 228
7.7.2 Biomechanical Computers......Page 230
7.7.3 Bioelectronic Computers......Page 231
7.8 Summary......Page 232
Exercises......Page 233
References......Page 235
8 Assembly Language and Operating Systems......Page 237
8.1.1 Numbering Systems......Page 238
8.1.2 The Binary Numbering System and Base Conversions......Page 240
8.1.3 The Hexadecimal Numbering System......Page 241
8.1.4 Signed and Unsigned Numbers......Page 242
8.2 Operation Code and Operands......Page 244
8.4 Indirect Addressing......Page 246
8.5 Stack and Buffer Overflow......Page 247
8.5.1 Calling Procedures Using CALL and RET Return......Page 249
8.5.2 Exploiting Stack Buffer Overflows......Page 250
8.5.3 Stack Protection......Page 252
8.6.1 FIFO Data Structure......Page 253
8.6.2 M/M/1 Model......Page 254
8.7.1 Kernel......Page 255
8.7.2 BIOS......Page 256
8.7.3 Boot Loader......Page 257
8.7.4 Device Drivers......Page 258
8.8 Summary......Page 259
Exercises......Page 260
References......Page 261
9.1 Data Communications......Page 262
9.1.1 Signal, Data, and Channels......Page 263
9.1.2 Signal Encoding and Modulation......Page 264
9.2 TCP/IP Protocol......Page 265
9.2.1 Network Topology......Page 266
9.2.2 Transmission Control Protocol TCP......Page 267
9.2.4 Internet Protocol IP......Page 268
9.3.1 Layer 1 Hubs......Page 269
9.3.2 Ethernet Switch......Page 270
9.4 Routers......Page 271
9.4.2 Architecture......Page 272
9.4.3 Internet Protocol Version 4 IPv4......Page 274
9.4.5 Open Shortest Path First......Page 275
9.4.6 Throughput and Delay......Page 277
9.5 Gateways......Page 278
9.6.1 Wireless Networks......Page 279
9.6.2 Wireless Protocols......Page 281
9.6.3 WLAN Handshaking, War Driving, and WLAN Security......Page 282
9.6.5 The Future of Wireless Network......Page 284
9.6.6 Network Address Translation......Page 285
9.6.7 Environmental and Health Concerns Using Cellular and Wireless Devices......Page 286
9.7 Network Security......Page 288
9.7.1.1 Network Security Basics......Page 289
9.7.1.2 Information Hacking......Page 290
9.7.1.4 Firewall and Firewall Technologies......Page 291
9.7.2.1 Packet Filtering Routers......Page 292
9.7.2.3 Circuit Level Gateways......Page 293
9.7.3 Constraint and Limitations of Firewall......Page 294
9.7.4 Enterprise Firewalls......Page 295
9.8 Summary......Page 296
Exercises......Page 297
9.9 Virtual Cyber-Security Laboratory......Page 298
References......Page 299
10.1 Data Security in Computer Systems......Page 301
10.1.1 Computer Security......Page 302
10.1.2 Data Security and Data Bleaches......Page 303
10.1.3 Researches in Architecture Security......Page 304
10.2.1 John von Neumann Computer Architecture......Page 305
10.2.2 Modified Neumann Computer Architecture......Page 306
10.3 A Dual-Bus Solution......Page 307
10.4.1 Working Mechanism of the Bus Controller......Page 309
10.4.2 Co-processor Board......Page 310
10.6 Micro-Operating System......Page 313
10.7 Summary......Page 314
Exercises......Page 315
References......Page 316
A.1 CEDAR Logic Simulator......Page 318
A.3 Digital Logic Simulator v0.4......Page 319
A.4 Logicly......Page 320
B.2 Metasploit......Page 321
B.5 Snort......Page 322
B.9 Tcpdump......Page 323
B.10 John the Ripper......Page 324
C.1 Background of the Invention......Page 325
C.1.2 Modified Neumann Computer Architecture......Page 326
C.1.4 The Goal of the Invention......Page 328
C.3 Detailed Description of the Invention......Page 329
C.4 Claim......Page 331
Index......Page 334


πŸ“œ SIMILAR VOLUMES


Computer architecture and security: fund
✍ Shuangbao (Paul) Wang, Robert S. Ledley πŸ“‚ Library πŸ“… 2013 πŸ› Higher Education Press 🌐 English

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security persp

Computer Architecture and Organization:
✍ Shuangbao Paul Wang πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<p>In today’s workplace, computer and cybersecurity professionals must understand both hardware and software to deploy effective security solutions. This book introduces readers to the fundamentals of computer architecture and organization for security, and provides them with both theoretical and pr

Computer Architecture and Organization:
✍ Shuangbao Paul Wang πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<p>In today’s workplace, computer and cybersecurity professionals must understand both hardware and software to deploy effective security solutions. This book introduces readers to the fundamentals of computer architecture and organization for security, and provides them with both theoretical and pr

Computer Architecture and Organization:
✍ Shuangbao Paul Wang πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<p><span>In today’s workplace, computer and cybersecurity professionals must understand both hardware and software to deploy effective security solutions. This book introduces readers to the fundamentals of computer architecture and organization for security, and provides them with both theoretical

Computer Architecture and Organization:
✍ Shuangbao Paul Wang πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<p><span>In today’s workplace, computer and cybersecurity professionals must understand both hardware and software to deploy effective security solutions. This book introduces readers to the fundamentals of computer architecture and organization for security, and provides them with both theoretical