Secure Computers and Networks: Analysis, Design, and Implementation (Electronics Handbook Series)
β Scribed by Eric A. Fisch, Gregory B. White
- Publisher
- CRC Press
- Year
- 1999
- Tongue
- English
- Leaves
- 365
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This updated guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the authors' earlier work, Computer System and Network Security, this new book addresses important concerns regarding network security. It contains new chapters on World Wide Web security issues, secure electronic commerce, incident response, as well as two new appendices on PGP and UNIX security fundamentals.
β¦ Table of Contents
CONTENTS......Page 4
PREFACE......Page 11
FUNDAMENTALS OF COMPUTER SECURITY......Page 15
1.1 Objectives of Computer Security......Page 16
1.2 Issues Involved in Computer Security......Page 17
1.3 Privacy and Ethics......Page 19
1.4 Computer Crime......Page 20
1.5 Projects......Page 21
1.7 Extended Bibliography......Page 22
RISK ASSESSMENT AND MITIGATION......Page 24
2.1 Assessment Theory......Page 25
2.1.1 Information Asset Value (A)......Page 26
2.1.2 Vulnerability Evaluation (V)......Page 27
2.1.3 Threat Measurement (T)......Page 28
2.2 Applying the Risk Analysis Equation......Page 31
2.3 Decision Support and Risk Mitigation......Page 33
2.6 References......Page 34
2.7 Extended Bibliography......Page 35
3.1 External Security Measures......Page 36
3.2 Structure of a Computer System......Page 38
3.3 Secure Computer System Issues......Page 41
3.4 Summary......Page 45
3.6 References......Page 46
3.7 Extended Bibliography......Page 47
4.1 Specification and Verification......Page 48
4.2 Security Models......Page 49
4.2.1 Biba......Page 50
4.2.2 Bell and LaPadula......Page 52
4.2.3 Clark- Wilson......Page 55
4.2.4 Goguen- Meseguer......Page 58
Criteria......Page 59
4.3.1 Discretionary Access Requirements......Page 60
4.3.2 Mandatory Access Requirements......Page 61
4.4 Summary......Page 62
4.6 References......Page 63
4.7 Extended Bibliography......Page 64
5.1 Authentication Objectives......Page 66
5.2.1.1 Passwords......Page 67
5.2.2.1 Magnetic Cards......Page 69
5.2.2.2 Smartcards......Page 71
5.2.2.3 Calculators......Page 72
5.2.3.1 Voice Prints......Page 73
5.2.3.2 Fingerprint......Page 74
5.2.3.3 Retinal Prints......Page 77
5.2.3.4 Hand Geometry......Page 78
5.2.3.5 Signature Analysis......Page 79
5.3 Summary......Page 80
5.5 References......Page 81
5.6 Extended Bibliography......Page 83
ACCESS AND INFORMATION FLOW CONTROLS......Page 85
6.1 File Passwords......Page 87
6.2 Capabilities Based......Page 88
6.3 Access Control Lists......Page 90
6.4 Protection Bits......Page 92
6.5 Controls for Mandatory Access......Page 93
6.6 Trojan Horses......Page 95
6.7 Summary......Page 96
6.8 Projects......Page 97
6.10 Extended Bibliography......Page 98
7.1 Audit Trail Features......Page 100
7.2 Intrusion Detection Systems......Page 103
7.2.1 User Profiling......Page 104
7.2.2 Intruder Profiling......Page 105
7.2.4 Action Based......Page 106
7.2.5 IDES......Page 107
7.2.6 MIDAS......Page 109
7.2.7 Haystack......Page 111
7.3 Network Intrusion Detection......Page 112
7.3.2 NSM......Page 113
7.3.3 DIDS......Page 115
7.3.4 NADIR......Page 116
7.3.5 CSM......Page 117
7.4 Monitoring and the Law......Page 118
7.5 Summary......Page 119
7.6 Projects......Page 120
7.7 References......Page 121
7.8 Extended Bibliography......Page 122
DAMAGE CONTROL AND ASSESSMENT......Page 126
8.1.1 Inform the Authorities......Page 127
8.1.2 Backup System Data......Page 128
8.1.3 Remove the Intruder......Page 129
8.1.4 Contain and Monitor the Intruder......Page 130
8.1.6 Require Additional Authentication......Page 131
8.2 Damage Assessment......Page 132
8.2.1.1 Examine Audit Trails......Page 133
8.2.1.2 Identify Stolen Accounts and Data......Page 135
8.2.1.3 Locate System Modifications......Page 136
8.2.2.1 Patch Security Vulnerabilities......Page 138
8.2.2.2 Lock Stolen User Accounts......Page 139
8.2.2.3 Change Passwords......Page 140
8.2.2.4 Employ Shadow Password Files......Page 141
8.2.2.5 Backup Information......Page 142
8.2.2.6 Reduce Network Services......Page 143
8.3 Summary......Page 144
8.5 References......Page 145
8.6 Extended Bibliography......Page 146
9.1 Database Management System Primer......Page 148
9.2.1 Inference......Page 150
9.2.2.1 Inference Aggregation......Page 151
9.2.2.2 Cardinal Aggregation......Page 152
9.2.3 Data Integrity......Page 154
9.2.4 Trojan Horses......Page 155
9.3 Summary......Page 156
9.5 References......Page 157
9.6 Extended Bibliography......Page 159
NETWORK SECURITY......Page 161
10.1 Network Fundamentals......Page 162
10.2 Network Security Issues......Page 166
10.2.1 Basic Network Security Objectives and Threats......Page 167
10.2.2 Security Services......Page 168
10.3.1 TNI Security Service......Page 173
10.3.2 AIS Interconnection Issues......Page 177
10.4 Distributed Systems Security......Page 179
10.5 Modem Access to the Network......Page 181
10.6 Summary......Page 182
10.7 Projects......Page 183
10.9 Extended Bibliography......Page 184
SECURE ELECTRONIC COMMERCE......Page 187
11.1 Certificate Authorities......Page 188
11.2 Smart Cards......Page 190
Commerce......Page 191
11.3.2 Stock Brokerages......Page 192
11.3.4 The Shopping Mall......Page 193
11.4 Digital Cash......Page 194
11.5 Trusting the Web......Page 195
11.7 Projects......Page 197
11.9 Extended Bibliography......Page 198
WORLD WIDE WEB (WWW) SECURITY......Page 200
12.1.1 User Certification......Page 201
12.1.2.1 Cookie Privacy......Page 202
12.1.2.2 Cookies and System Security......Page 203
12.1.3 User Privacy......Page 204
12.2.1 ActiveX......Page 206
12.2.2.1 Java Security Weaknesses......Page 207
12.2.2.2 JavaScript Security Weaknesses......Page 209
12.3 Protocols......Page 210
12.3.2 SHTTP......Page 211
12.3.3 SSL......Page 212
12.5 Projects......Page 213
12.7 Extended Bibliography......Page 214
13.1 Simple Damage Limiting Approaches......Page 216
13.2 Network Firewalls......Page 217
13.2.1 Packet Filtering Gateways......Page 219
13.2.2 Circuit Level Gateways......Page 223
13.2.3 Application Level Gateways......Page 224
13.3 Firewall Costs and Effectiveness......Page 225
13.4 Sample Security Packages......Page 226
13.6 Projects......Page 229
13.7 References......Page 230
13.8 Extended Bibliography......Page 231
CRYPTOGRAPHY......Page 233
14.1.1 Caesar Cipher......Page 234
14.1.3 Substitution Cipher Variations......Page 235
14.1.4 Vigenere Ciphers......Page 237
14.1.5 One- Time Pads......Page 240
14.2 Transposition Ciphers......Page 241
14.3 Encrypting Digital Communication......Page 242
14.3.1 DES......Page 243
14.3.2 IDEA......Page 247
14.3.3 Key Escrow and Key Recovery......Page 249
14.3.4.1 Diffie- Hellman Algorithm......Page 252
14.3.4.2 Knapsack Algorithms......Page 253
14.3.4.3 RSA......Page 255
14.3.5 Digital Signatures......Page 257
14.3.5.2 ESIGN......Page 258
14.4 PGPβ Pretty Good Privacy......Page 259
14.5 Public Key Infrastructure......Page 260
14.6 Steganography......Page 261
14.8 Projects......Page 264
14.9 References......Page 266
14.10 Extended Bibliography......Page 267
15.1 Viruses......Page 271
15.1.1 Infection......Page 272
15.1.2 Theory behind Viruses......Page 273
15.1.3 Prevention, Detection, and Removal......Page 277
15.1.3.1 Prevention and Detection......Page 278
15.1.4 Special Viruses......Page 280
15.1.4.1 The βGood Timesβ Virus......Page 281
15.1.4.2 The Macro Virus......Page 282
15.2 Worms......Page 284
15.2.2 Theory of Worms......Page 285
15.2.3.1 Preventing Worm Attacks......Page 289
15.2.3.2 Worm Removal and System Recovery......Page 290
15.3.1 Receiving Trojan Horses......Page 291
15.3.2 Theory of Trojan Horses......Page 292
15.3.3.1 Trojan Horse Prevention and Detection......Page 294
15.4 Summary......Page 295
15.6 References......Page 296
15.7 Extended Bibliography......Page 297
SECURITY STANDARDS......Page 298
16.1 The History of Security Standards......Page 299
16.2 The Trusted Computer System Evaluation Criteria......Page 300
Criteria......Page 303
Evaluation Criteria......Page 304
16.5 The Federal Criteria......Page 306
16.6 The Common Criteria......Page 308
16.7 British Standard 7799......Page 312
16.9 Projects......Page 315
16.10 References......Page 316
16.11 Extended Bibliography......Page 317
17.1 The Hanover Hackers......Page 318
17.2 An Evening With Berferd......Page 321
17.3 The Internet Worm......Page 325
17.4 Adventures on the World Wide Web......Page 327
17.5 Summary......Page 331
17.7 References......Page 332
17.8 Extended Bibliography......Page 333
A - INFORMATION WARFARE......Page 335
A. 1 Levels of Information Warfare......Page 337
A. 2 Weapons of Information Warfare......Page 341
A. 3 Perception Management......Page 343
A. 4 Summary......Page 345
A. 6 References......Page 346
A. 7 Extended Bibliography......Page 348
B. 1 History......Page 351
B. 2 System Boot......Page 352
B. 3 Audit Features......Page 353
B. 4 Passwords and Accounts......Page 355
B. 5 The UNIX File System......Page 357
B. 7 UNIX and Network Security......Page 361
B. 8 Sources of Help......Page 364
B. 9 References......Page 365
π SIMILAR VOLUMES
This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-pron
This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textboo
Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, whic
Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, whic