๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Computer System and Network Security

โœ Scribed by Gregory B. White, Eric A. Fisch, Udo W. Pooch


Publisher
CRC Press
Year
1996
Tongue
English
Leaves
311
Series
Computer Science & Engineering
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks. Introductory in nature, this important new book covers all aspects related to the growing field of computer security. Such complete coverage in a single text has previously been unavailable, and college professors and students, as well as professionals responsible for system security, will find this unique book a valuable source of information, either as a textbook or as a general reference.
Computer System and Network Security discusses existing and potential threats to computer systems and networks and outlines the basic actions that are generally taken to protect them. The first two chapters of the text introduce the reader to the field of computer security, covering fundamental issues and objectives. The next several chapters describe security models, authentication issues, access control, intrusion detection, and damage control. Later chapters address network and database security and systems/networks connected to wide-area networks and internetworks. Other topics include firewalls, cryptography, malicious software, and security standards. The book includes case studies with information about incidents involving computer security, illustrating the problems and potential damage that can be caused when security fails.
This unique reference/textbook covers all aspects of computer and network security, filling an obvious gap in the existing literature

โœฆ Table of Contents


Content: (Note: Most chapters include a summary, exercises, references, and an extended bibliography)Computer Security FundamentalsObjectives of Computer SecurityIssues Involved in Computer SecurityPrivacy and EthicsRisk AnalysisTheoryPossible Loss (L)Probability of Loss Occurrence (P) Burden of Preventing Loss (B)Applying the Risk Analysis EquationRisk Analysis in Computer SecurityTerminologyApplicationDeveloping Secure Computer SystemsExternal Security MeasuresStructure of a Computer SystemSecure Computer System IssuesSecurity ModelsSpecification and VerificationSecurity ModelsBell and LaPadulaClark-WilsonGoguen-MeseguerTCSECDiscretionary Access RequirementsMandatory Access RequirementsUser AuthenticationAuthentication ObjectivesAuthentication MethodsInformational KeysPhysical KeysBiometric KeysAccess and Information Flow ControlsFile PasswordsCapabilities BasedAccess Control ListsProtection BitsControls for Mandatory Access Trojan HorsesAUDITING and INTRUSION DETECTIONAudit Trail FeaturesIntrusion Detection SystemsUser ProfilingIntruder ProfilingSignature AnalysisAction BasedIDESMIDASHaystackNetwork Intrusion DetectionNetwork Attack CharacteristicsNSMDIDSNADIRCSMMonitoring and the LawDamage Control and AssessmentDamage ControlInform the AuthoritiesBackup System DataRemove the IntruderContain and Monitor the IntruderLock Stolen AccountsRequire Additional AuthenticationDamage AssessmentAttack RecoveryDamage PreventionNetwork SecurityNetwork FundamentalsNetwork Security IssuesBasic Network Security Objectives and ThreatsSecurity ServicesThe Trusted Network InterpretationTNI Security ServiceAIS Interconnection IssuesDistributed Systems SecurityFirewallsSimple Damage Limiting ApproachesNetwork FirewallsPacket Filtering GatewaysCircuit Level GatewaysApplication Level GatewaysFirewall Costs and EffectivenessDatabase SecurityDatabase Management System PrimerDBMS Vulnerabilities and ResponsesInferenceAggregationData IntegrityTrojan HorsesCryptographySubstitution CiphersCaesar CipherROT13Substitution Cipher VariationsVigenere CiphersOne Time PadsTransposition CiphersEncrypting Digital CommunicationDESIDEAKey EscrowPublic Key CryptographyDigital SignaturesMalicious SoftwareVirusesWorms Trojan HorsesTime BombsSecurity StandardsThe Federal CriteriaThe Common Criteria The Trusted Computer System Evaluation CriteriaThe Information Technology Security Evaluation CriteriaCase StudyThe Hannover HackersAn Evening With BerferdThe Internet WormAppendix: Information Warfare

โœฆ Subjects


Co


๐Ÿ“œ SIMILAR VOLUMES


Secure Computer and Network Systems Mode
โœ Ye, Nong ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Wiley ๐ŸŒ English

Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, whic

Secure Computer and Network Systems: Mod
โœ Nong Ye ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Wiley ๐ŸŒ English

Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, whic