Computer Security: Principles and Practice, Global Edition
4.690 kr.

Lýsing:
Computer Security, 5th Edition features a balanced presentation of both principles and practice. It incorporates broad and comprehensive coverage of computer and network security with current developments and topics in the field. Principles, design approaches, standards, and real-world examples give you an understanding of both the theory and application of important concepts. Hands-on security education, research, programming and firewall projects give you practice applying the material.
Annað
- Höfundar: William Stallings, Lawrie Brown
- Útgáfa:5
- Útgáfudagur: 2024-10-15
- Hægt að prenta út 2 bls.
- Hægt að afrita 2 bls.
- Format:ePub
- ISBN 13: 9781292460796
- Print ISBN: 9781292729015
- ISBN 10: 1292460792
Efnisyfirlit
- Welcome
- Cover
- Title Page
- Copyright
- Dedication
- Preface
- Notation
- About the Authors
- 1: Overview
- Introduction: Overview
- 1.1: Computer Security Concepts
- A Definition of Computer Security
- Examples
- The Challenges of Computer Security
- A Model for Computer Security
- 1.2: Threats, Attacks, and Assets
- 1.2: Threats, Attacks, and Assets
- Threats and Attacks
- Threats and Assets
- 1.3: Security Functional Requirements
- 1.3: Security Functional Requirements
- 1.4: Fundamental Security Design Principles
- 1.4: Fundamental Security Design Principles
- 1.5: Attack Surfaces and Attack Trees
- 1.5: Attack Surfaces and Attack Trees
- Attack Surfaces
- Attack Trees
- 1.6: Computer Security Strategy
- 1.6: Computer Security Strategy
- Security Policy
- Security Implementation
- Assurance and Evaluation
- 1.7: Standards
- 1.7: Standards
- 1.8: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Part One: Computer Security Technology and Principles
- Introduction: Cryptographic Tools
- 2.1: Confidentiality with Symmetric Encryption
- 2.1: Confidentiality with Symmetric Encryption
- Symmetric Encryption
- Symmetric Block Encryption Algorithms
- Stream Ciphers
- 2.2: Message Authentication and Hash Functions
- 2.2: Message Authentication and Hash Functions
- Authentication Using Symmetric Encryption
- Message Authentication without Message Encryption
- Secure Hash Functions
- Other Applications of Hash Functions
- 2.3: Public-Key Encryption
- 2.3: Public-Key Encryption
- Public-Key Encryption Structure
- Applications for Public-Key Cryptosystems
- Requirements for Public-Key Cryptography
- Asymmetric Encryption Algorithms
- 2.4: Digital Signatures and Key Management
- 2.4: Digital Signatures and Key Management
- Digital Signature
- Public-Key Certificates
- Symmetric Key Exchange Using Public-Key Encryption
- Digital Envelopes
- 2.5: Random and Pseudorandom Numbers
- 2.5: Random and Pseudorandom Numbers
- The Use of Random Numbers
- Random versus Pseudorandom
- 2.6: Practical Application: Encryption of Stored Data
- 2.6: Practical Application: Encryption of Stored Data
- 2.7: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Introduction: User Authentication
- 3.1: Digital User Authentication Principles
- 3.1: Digital User Authentication Principles
- A Model for Digital User Authentication
- Means of Authentication
- Multifactor Authentication
- Assurance Levels for User Authentication
- 3.2: Password-Based Authentication
- 3.2: Password-Based Authentication
- The Vulnerability of Passwords
- The Use of Hashed Passwords
- Password Cracking of User-Chosen Passwords
- Password File Access Control
- Password Selection Strategies
- 3.3: Token-Based Authentication
- 3.3: Token-Based Authentication
- Memory Cards
- Smart Cards
- Electronic Identity Cards
- Hardware Authentication Tokens
- Authentication Using a Mobile Phone
- 3.4: Biometric Authentication
- 3.4: Biometric Authentication
- Physical Characteristics Used in Biometric Applications
- Operation of a Biometric Authentication System
- Biometric Accuracy
- 3.5: Remote User Authentication
- 3.5: Remote User Authentication
- Password Protocol
- Token Protocol
- Static Biometric Protocol
- Dynamic Biometric Protocol
- 3.6: Security Issues for User Authentication
- 3.6: Security Issues for User Authentication
- 3.7: Practical Application: An Iris Biometric System
- 3.7: Practical Application: An Iris Biometric System
- 3.8: Case Study: Security Problems for ATM Systems
- 3.8: Case Study: Security Problems for ATM Systems
- 3.9: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Introduction: Access Control
- 4.1: Access Control Principles
- 4.1: Access Control Principles
- Access Control Context
- Access Control Policies
- 4.2: Subjects, Objects, and Access Rights
- 4.2: Subjects, Objects, and Access Rights
- 4.3: Discretionary Access Control
- 4.3: Discretionary Access Control
- An Access Control Model
- Protection Domains
- 4.4: Example: UNIX File Access Control
- 4.4: Example: UNIX File Access Control
- Traditional UNIX File Access Control
- Access Control Lists in UNIX
- 4.5: Mandatory Access Control
- 4.5: Mandatory Access Control
- Bell-LaPadula (BLP) Model
- 4.6: Role-Based Access Control
- 4.6: Role-Based Access Control
- RBAC Reference Models
- 4.7: Attribute-Based Access Control
- 4.7: Attribute-Based Access Control
- Attributes
- ABAC Logical Architecture
- ABAC Policies
- 4.8: Identity, Credential, and Access Management
- 4.8: Identity, Credential, and Access Management
- Identity Management
- Credential Management
- Access Management
- Identity Federation
- 4.9: Trust Frameworks
- 4.9: Trust Frameworks
- Traditional Identity Exchange Approach
- Open Identity Trust Framework
- 4.10: Case Study: RBAC System for a Bank
- 4.10: Case Study: RBAC System for a Bank
- 4.11: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Introduction: Database and Data Center Security
- 5.1: The Need for Database Security
- 5.1: The Need for Database Security
- 5.2: Database Management Systems
- 5.2: Database Management Systems
- 5.3: Relational Databases
- 5.3: Relational Databases
- Elements of a Relational Database System
- Structured Query Language
- 5.4: SQL Injection Attacks
- 5.4: SQL Injection Attacks
- A Typical SQLi Attack
- The Injection Technique
- SQLi Attack Avenues and Types
- SQLi Countermeasures
- 5.5: Database Access Control
- 5.5: Database Access Control
- SQL-Based Access Definition
- Cascading Authorizations
- Role-Based Access Control
- 5.6: Inference
- 5.6: Inference
- 5.7: Database Encryption
- 5.7: Database Encryption
- 5.8: Data Center Security
- 5.8: Data Center Security
- Data Center Elements
- Data Center Security Considerations
- TIA-492
- 5.9: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Introduction: Malicious Software
- 6.1: Types of Malicious Software (Malware)
- 6.1: Types of Malicious Software (Malware)
- A Broad Classification of Malware
- Attack Kits
- Attack Sources
- 6.2: Advanced Persistent Threat
- 6.2: Advanced Persistent Threat
- 6.3: Propagation—Infected Content—Viruses
- 6.3: Propagation—Infected Content—Viruses
- The Nature of Viruses
- Macro and Scripting Viruses
- Viruses Classification
- 6.4: Propagation—Vulnerability Exploit—Worms
- 6.4: Propagation—Vulnerability Exploit—Worms
- Target Discovery
- Worm Propagation Model
- The Morris Worm
- A Brief History of Worm Attacks
- State of Worm Technology
- Mobile Code
- Mobile Phone Worms
- Client-Side Vulnerabilities and Drive-by-Downloads
- Clickjacking
- 6.5: Propagation—Social Engineering—Spam E-Mail, Trojans
- 6.5: Propagation—Social Engineering—Spam E-Mail, Trojans
- Spam (Unsolicited Bulk) E-Mail
- Trojan Horses
- Mobile Phone Trojans
- 6.6: Payload—System Corruption
- 6.6: Payload—System Corruption
- Data Destruction and Ransomware
- Real-World Damage
- Logic Bomb
- 6.7: Payload—Attack Agent—Zombie, Bots
- 6.7: Payload—Attack Agent—Zombie, Bots
- Uses of Bots
- Remote Control Facility
- 6.8: Payload—Information Theft—Keyloggers, Phishing, Spyware
- 6.8: Payload—Information Theft—Keyloggers, Phishing, Spyware
- Credential Theft, Keyloggers, and Spyware
- Phishing and Identity Theft
- Reconnaissance, Espionage, and Data Exfiltration
- 6.9: Payload—Stealthing—Backdoors, Rootkits
- 6.9: Payload—Stealthing—Backdoors, Rootkits
- Backdoor
- Rootkit
- Kernel Mode Rootkits
- Virtual Machine and Other External Rootkits
- 6.10: Countermeasures
- 6.10: Countermeasures
- Malware Countermeasure Approaches
- Host-Based Scanners and Signature-Based Anti-Virus
- Perimeter Scanning Approaches
- Distributed Intelligence Gathering Approaches
- 6.11: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Introduction: Denial-of-Service Attacks
- 7.1: Denial-of-Service Attacks
- 7.1: Denial-of-Service Attacks
- The Nature of Denial-of-Service Attacks
- Classic Denial-of-Service Attacks
- Source Address Spoofing
- SYN Spoofing
- 7.2: Flooding Attacks
- 7.2: Flooding Attacks
- ICMP Flood
- UDP Flood
- TCP SYN Flood
- 7.3: Distributed Denial-of-Service Attacks
- 7.3: Distributed Denial-of-Service Attacks
- 7.4: Application-Based Bandwidth Attacks
- 7.4: Application-Based Bandwidth Attacks
- SIP Flood
- HTTP-Based Attacks
- 7.5: Reflector and Amplifier Attacks
- 7.5: Reflector and Amplifier Attacks
- Reflection Attacks
- Amplification Attacks
- DNS Amplification Attacks
- 7.6: Defenses Against Denial-of-Service Attacks
- 7.6: Defenses Against Denial-of-Service Attacks
- 7.7: Responding to a Denial-of-Service Attack
- 7.7: Responding to a Denial-of-Service Attack
- 7.8: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Introduction: Intrusion Detection
- 8.1: Intruders
- 8.1: Intruders
- Intruder Behavior
- 8.2: Intrusion Detection
- 8.2: Intrusion Detection
- Basic Principles
- The Base-Rate Fallacy
- Requirements
- 8.3: Analysis Approaches
- 8.3: Analysis Approaches
- Anomaly Detection
- Signature or Heuristic Detection
- 8.4: Host-Based Intrusion Detection
- 8.4: Host-Based Intrusion Detection
- Data Sources and Sensors
- Anomaly HIDSs
- Signature or Heuristic HIDSs
- Distributed HIDSs
- 8.5: Network-Based Intrusion Detection
- 8.5: Network-Based Intrusion Detection
- Types of Network Sensors
- NIDS Sensor Deployment
- Intrusion Detection Techniques
- Logging of Alerts
- 8.6: Distributed or Hybrid Intrusion Detection
- 8.6: Distributed or Hybrid Intrusion Detection
- 8.7: Intrusion Detection Exchange Format
- 8.7: Intrusion Detection Exchange Format
- 8.8: Honeypots
- 8.8: Honeypots
- 8.9: Example System: Snort
- 8.9: Example System: Snort
- Snort Architecture
- Snort Rules
- 8.10: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Introduction: Firewalls and Intrusion Prevention Systems
- 9.1: The Need for Firewalls
- 9.1: The Need for Firewalls
- 9.2: Firewall Characteristics and Access Policy
- 9.2: Firewall Characteristics and Access Policy
- 9.3: Types of Firewalls
- 9.3: Types of Firewalls
- Packet Filtering Firewall
- Stateful Inspection Firewalls
- Application-Level Gateway
- Circuit-Level Gateway
- 9.4: Firewall Basing
- 9.4: Firewall Basing
- Bastion Host
- Host-Based Firewalls
- Network Device Firewall
- Virtual Firewall
- Personal Firewall
- 9.5: Firewall Location and Configurations
- 9.5: Firewall Location and Configurations
- DMZ Networks
- Virtual Private Networks
- Distributed Firewalls
- Summary of Firewall Locations and Topologies
- 9.6: Intrusion Prevention Systems
- 9.6: Intrusion Prevention Systems
- Host-Based IPS
- Network-Based IPS
- Distributed or Hybrid IPS
- Snort Inline
- 9.7: Example: Unified Threat Management Products
- 9.7: Example: Unified Threat Management Products
- 9.8: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Part Two: Software and System Security
- Introduction: Buffer Overflow
- 10.1: Stack Overflows
- Buffer Overflow Basics
- Stack Buffer Overflows
- Shellcode
- 10.2: Defending Against Buffer Overflows
- 10.2: Defending Against Buffer Overflows
- Compile-Time Defenses
- Run-Time Defenses
- 10.3: Other Forms of Overflow Attacks
- 10.3: Other Forms of Overflow Attacks
- Replacement Stack Frame
- Return to System Call
- Heap Overflows
- Global Data Area Overflows
- Other Types of Overflows
- 10.4: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Introduction: Software Security
- 11.1: Software Security Issues
- 11.1 Software Security Issues
- 11.2: Handling Program Input
- 11.2: Handling Program Input
- Input Size and Buffer Overflow
- Interpretation of Program Input
- Validating Input Syntax
- Input Fuzzing
- 11.3: Writing Safe Program Code
- 11.3: Writing Safe Program Code
- Correct Algorithm Implementation
- Ensuring that Machine Language Corresponds to Algorithm
- Correct Interpretation of Data Values
- Correct Use of Memory
- Preventing Race Conditions with Shared Memory
- 11.4: Interacting with the Operating System and Other Programs
- 11.4: Interacting with the Operating System and Other Programs
- Environment Variables
- Using Appropriate, Least Privileges
- Systems Calls and Standard Library Functions
- Preventing Race Conditions with Shared System Resources
- Safe Temporary File Use
- Interacting with Other Programs
- 11.5: Handling Program Output
- 11.5: Handling Program Output
- 11.6: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Introduction: Operating System Security
- 12.1: Introduction to Operating System Security
- 12.1: Introduction to Operating System Security
- 12.2: System Security Planning
- 12.2: System Security Planning
- 12.3: Operating Systems Hardening
- 12.3: Operating Systems Hardening
- Operating System Installation: Initial Setup and Patching
- Remove Unnecessary Services, Applications, and Protocols
- Configure Users, Groups, and Authentication
- Configure Resource Controls
- Install Additional Security Controls
- Test the System Security
- 12.4: Application Security
- 12.4: Application Security
- Application Configuration
- Encryption Technology
- 12.5: Security Maintenance
- 12.5: Security Maintenance
- Logging
- Data Backup and Archive
- 12.6: Linux/Unix Security
- 12.6: Linux/Unix Security
- Patch Management
- Application and Service Configuration
- Users, Groups, and Permissions
- Remote Access Controls
- Logging and Log Rotation
- Application Security Using a Chroot Jail
- Security Testing
- 12.7: Windows Security
- 12.7: Windows Security
- Patch Management
- Users Administration and Access Controls
- Application and Service Configuration
- Other Security Controls
- Security Testing
- 12.8: Virtualization Security
- 12.8: Virtualization Security
- Virtualization Alternatives
- Virtualization Security Issues
- Securing Virtualization Systems
- Virtualized Infrastructure Security
- Virtual Firewall
- 12.9: Trusted Computer Systems
- 12.9: Trusted Computer Systems
- Reference Monitors
- TCSEC and Common Criteria
- 12.10: Trusted Platform Module
- 12.10: Trusted Platform Module
- Authenticated Boot Service
- Certification Service
- Encryption Service
- TPM Functions
- Protected Storage
- 12.11: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Introduction: Cloud and IoT Security
- 13.1: Cloud Computing
- 13.1: Cloud Computing
- Cloud Computing Elements
- Cloud Service Models
- Cloud Deployment Models
- Cloud Computing Reference Architecture
- 13.2: Cloud Security Concepts
- 13.2: Cloud Security Concepts
- Security Issues for Cloud Computing
- Addressing Cloud Computing Security Concerns
- 13.3: Cloud Security Approaches
- Risks and Countermeasures
- Data Protection in the Cloud
- Security Approaches for Cloud Computing Assets
- Cloud Security as a Service
- An Open-source Cloud Security Module
- 13.4: The Internet of Things
- 13.4: The Internet of Things
- Things on the Internet of Things
- Evolution
- Components of IoT-enabled Things
- IoT and Cloud Context
- 13.5: IoT Security
- 13.5: IoT Security
- The Patching Vulnerability
- IoT Security and Privacy Requirements Defined by ITU-T
- An IoT Security Framework
- An Open-source IoT Security Module
- 13.6: Key Terms and Review Questions
- Key Terms
- Review Questions
- Part Three: Management Issues
- Introduction: IT Security Management and Risk Assessment
- 14.1: IT Security Management
- 14.1: IT Security Management
- 14.2: Organizational Context and Security Policy
- 14.2: Organizational Context and Security Policy
- 14.3: Security Risk Assessment
- 14.3: Security Risk Assessment
- Baseline Approach
- Informal Approach
- Detailed Risk Analysis
- Combined Approach
- 14.4: Detailed Security Risk Analysis
- 14.4: Detailed Security Risk Analysis
- Context and System Characterization
- Identification of Threats/Risks/Vulnerabilities
- Analyze Risks
- Evaluate Risks
- Risk Treatment
- 14.5: Case Study: Silver Star Mines
- 14.5: Case Study: Silver Star Mines
- 14.6: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Introduction: IT Security Controls, Plans, and Procedures
- 15.1: IT Security Management Implementation
- 15.1: IT Security Management Implementation
- 15.2: Security Controls or Safeguards
- 15.2: Security Controls or Safeguards
- 15.3: IT Security Plan
- 15.3: IT Security Plan
- 15.4: Implementation of Controls
- 15.4: Implementation of Controls
- Implementation of Security Plan
- Security Awareness and Training
- 15.5: Monitoring Risks
- 15.5: Monitoring Risks
- Maintenance
- Security Compliance
- Change and Configuration Management
- Incident Handling
- 15.6: Case Study: Silver Star Mines
- 15.6: Case Study: Silver Star Mines
- 15.7: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Introduction: Physical and Infrastructure Security
- 16.1: Overview
- 16.1: Overview
- 16.2: Physical Security Threats
- 16.2: Physical Security Threats
- Natural Disasters
- Environmental Threats
- Technical Threats
- Human-Caused Physical Threats
- 16.3: Physical Security Prevention and Mitigation Measures
- 16.3: Physical Security Prevention and Mitigation Measures
- Environmental Threats
- Technical Threats
- Human-Caused Physical Threats
- 16.4: Recovery from Physical Security Breaches
- 16.4: Recovery from Physical Security Breaches
- 16.5: Example: A Corporate Physical Security Policy
- 16.5: Example: A Corporate Physical Security Policy
- 16.6: Integration of Physical and Logical Security
- 16.6: Integration of Physical and Logical Security
- Personal Identity Verification
- Use of PIV Credentials in Physical Access Control Systems
- 16.7: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Introduction: Human Resources Security
- 17.1: Security Awareness, Training, and Education
- 17.1: Security Awareness, Training, and Education
- Motivation
- A Learning Continuum
- Security Awareness
- Cybersecurity Basics and Literacy
- Role-Based Training
- Education and Certification
- 17.2: Employment Practices and Policies
- 17.2: Employment Practices and Policies
- Security in the Hiring Process
- During Employment
- Termination of Employment
- 17.3: Acceptable Use Policy
- 17.3: Acceptable Use Policy
- 17.4: Computer Security Incident Response Teams
- 17.4: Computer Security Incident Response Teams
- Detecting Incidents
- Triage Function
- Responding to Incidents
- Documenting Incidents
- Information Flow for Incident Handling
- 17.5: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Introduction: Security Auditing
- 18.1: Security Auditing Architecture
- 18.1: Security Auditing Architecture
- Security Audit and Alarms Model
- Security Auditing Functions
- Requirements
- Implementation Guidelines
- 18.2: Security Audit Trail
- 18.2: Security Audit Trail
- What to Collect
- Protecting Audit Trail Data
- 18.3: Implementing the Logging Function
- 18.3: Implementing the Logging Function
- Logging at the System Level
- Logging at the Application Level
- Interposable Libraries
- Dynamic Binary Rewriting
- 18.4: Audit Trail Analysis
- 18.4: Audit Trail Analysis
- Preparation
- Timing
- Audit Review
- Approaches to Data Analysis
- 18.5: Security Information and Event Management
- 18.5: Security Information and Event Management
- SIEM Systems
- 18.6: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Introduction: Legal and Ethical Aspects
- 19.1: Cybercrime and Computer Crime
- 19.1: Cybercrime and Computer Crime
- Types of Computer Crime
- Law Enforcement Challenges
- Working with Law Enforcement
- 19.2: Intellectual Property
- 19.2: Intellectual Property
- Types of Intellectual Property
- Intellectual Property Relevant to Network and Computer Security
- Digital Millennium Copyright Act
- Digital Rights Management
- 19.3: Privacy
- 19.3: Privacy
- Privacy Law and Regulation
- Organizational Response
- Computer Usage Privacy
- Privacy, Data Surveillance, Big Data, and Social Media
- 19.4: Ethical Issues
- 19.4: Ethical Issues
- Ethics and the Information Technology Professions
- Ethical Issues Related to Computers and Information Systems
- Codes of Conduct
- The Rules
- 19.5: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Part Four: Cryptographic Algorithms
- Introduction: Symmetric Encryption and Message Confidentiality
- 20.1: Symmetric Encryption Principles
- 20.1: Symmetric Encryption Principles
- Cryptography
- Cryptanalysis
- Feistel Cipher Structure
- 20.2: Data Encryption Standard
- 20.2: Data Encryption Standard
- Data Encryption Standard
- Triple DES
- 20.3: Advanced Encryption Standard
- 20.3: Advanced Encryption Standard
- Overview of the Algorithm
- Algorithm Details
- 20.4: Stream Ciphers and RC4
- 20.4: Stream Ciphers and RC4
- Stream Cipher Structure
- The RC4 Stream Cipher
- The ChaCha20 Stream Cipher
- 20.5: Cipher Block Modes of Operation
- 20.5: Cipher Block Modes of Operation
- Electronic Codebook Mode
- Cipher Block Chaining Mode
- Cipher Feedback Mode
- Counter Mode
- 20.6: Key Distribution
- 20.6: Key Distribution
- 20.7: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Introduction: Public-Key Cryptography and Message Authentication
- 21.1: Secure Hash Functions
- 21.1: Secure Hash Functions
- Simple Hash Functions
- The SHA Secure Hash Function
- SHA-3
- 21.2: HMAC
- 21.2: HMAC
- HMAC Design Objectives
- HMAC Algorithm
- Security of HMAC
- 21.3: Authenticated Encryption
- 21.3: Authenticated Encryption
- 21.4: The RSA Public-Key Encryption Algorithm
- 21.4: The RSA Public-Key Encryption Algorithm
- Description of the Algorithm
- The Security of RSA
- 21.5: Diffie-Hellman and Other Asymmetric Algorithms
- Diffie-Hellman Key Exchange
- Other Public-Key Cryptography Algorithms
- 21.6: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Part Five: Network Security
- Introduction: Internet Security Protocols and Standards
- 22.1: Secure E-mail and S/MIME
- 22.1: Secure E-mail and S/MIME
- MIME
- S/MIME
- 22.2: DomainKeys Identified Mail
- 22.2: DomainKeys Identified Mail
- Internet Mail Architecture
- DKIM Strategy
- 22.3: Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
- 22.3: Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
- TLS Architecture
- TLS Protocols
- SSL/TLS Attacks
- 22.4: HTTPS
- 22.4: HTTPS
- Connection Initiation
- Connection Closure
- 22.5: IPv4 and IPv6 Security
- IP Security Overview
- The Scope of IPsec
- Security Associations
- Encapsulating Security Payload
- Transport and Tunnel Modes
- 22.6: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Introduction: Internet Authentication Applications
- 23.1: Kerberos
- 23.1: Kerberos
- The Kerberos Protocol
- Kerberos Realms and Multiple Kerberi
- Version 4 and Version 5
- Performance Issues
- 23.2: X.509
- 23.2: X.509
- 23.3: Public-Key Infrastructure
- 23.3: Public-Key Infrastructure
- Public Key Infrastructure X.509 (PKIX)
- 23.4: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Introduction: Wireless Network Security
- 24.1: Wireless Security
- 24.1: Wireless Security
- Wireless Network Threats
- Wireless Security Measures
- 24.2: Mobile Device Security
- 24.2: Mobile Device Security
- Security Threats
- Mobile Device Security Strategy
- 24.3: IEEE 802.11 Wireless LAN Overview
- 24.3: IEEE 802.11 Wireless LAN Overview
- The Wi-Fi Alliance
- IEEE 802 Protocol Architecture
- IEEE 802.11 Network Components and Architectural Model
- IEEE 802.11 Services
- 24.4: IEEE 802.11i Wireless LAN Security
- 24.4: IEEE 802.11i Wireless LAN Security
- IEEE 802.11i Services
- IEEE 802.11i Phases of Operation
- Discovery Phase
- Authentication Phase
- Key Management Phase
- Protected Data Transfer Phase
- The IEEE 802.11i Pseudorandom Function
- 24.5: Key Terms, Review Questions, and Problems
- Key Terms
- Review Questions
- Problems
- Appendix A: Projects and Other Student Exercises for Teaching Computer Security
- A.1: Hacking Project
- A.1: Hacking Project
- A.2: Laboratory Exercises
- A.2: Laboratory Exercises
- A.3: Security Education (Seed) Projects
- A.3: Security Education (Seed) Projects
- A.4: Research Projects
- A.4: Research Projects
- A.5: Programming Projects
- A.5: Programming Projects
- A.6: Practical Security Assessments
- A.6: Practical Security Assessments
- A.7: Firewall Projects
- A.7: Firewall Projects
- A.8: Case Studies
- A.8: Case Studies
- A.9: Reading/report Assignments
- A.9: Reading/report Assignments
- A.10: Writing Assignments
- A.10: Writing Assignments
- Appendix B: Some Aspects of Number Theory
- B.1: Prime and Relatively Prime Numbers
- B.1: Prime and Relatively Prime Numbers
- Divisors
- Prime Numbers
- Relatively Prime Numbers
- B.2: Modular Arithmetic
- B.2: Modular Arithmetic
- Modular Arithmetic Operations
- Inverses
- B.3: Fermat’s and Euler’s Theorems
- B.3: Fermat’s and Euler’s Theorems
- Fermat’s Theorem
- Euler’s Totient Function
- Euler’s Theorem
- Appendix C: Standards and Standard-Setting Organizations
- C.1: The Importance of Standards
- C.1: The Importance of Standards
- C.2: Internet Standards and the Internet Society
- C.2: Internet Standards and the Internet Society
- The Internet Organizations and RFC Publication
- The Standardization Process
- Internet Standards Categories
- Other RFC Types
- C.3: The National Institute of Standards and Technology
- C.3: The National Institute of Standards and Technology
- C.4: The International Telecommunication Union
- C.4: The International Telecommunication Union
- ITU Telecommunication Standardization Sector
- Schedule
- C.5: The International Organization for Standardization
- C.5: The International Organization for Standardization
- C.6: Significant Security Standards and Documents
- C.6: Significant Security Standards and Documents
- International Organization for Standardization (ISO)
- National Institute of Standards and Technology (NIST)
- International Telecommunication Union Telecommunication Standardization Sector (ITU-T)
- Common Criteria for Information Technology Security Evaluation
- Internet Standards and the Internet Society
- Appendix D: Random and Pseudorandom Number Generation
- D.1: The Use of Random Numbers
- D.1: The Use of Random Numbers
- Randomness
- Unpredictability
- D.2: Pseudorandom Number Generators (PRNGS)
- D.2: Pseudorandom Number Generators (PRNGS)
- Linear Congruential Generators
- Cryptographically Generated Random Numbers
- Blum Blum Shub Generator
- D.3: True Random Number Generators
- D.3: True Random Number Generators
- Skew
- Appendix E: Message Authentication Codes Based on Block Ciphers
- E.1: Cipher-Based Message Authentication Code
- E.1: Cipher-Based Message Authentication Code
- E.2: Counter With Cipher Block Chaining Message Authentication Code
- E.2: Counter With Cipher Block Chaining Message Authentication Code
- E.3: Galois Counter Mode
- E.3: Galois Counter Mode
- Appendix F: The TCP/IP Protocol Architecture
- F.1: TCP/IP Layers
- F.1: TCP/IP Layers
- F.2: TCP and UDP
- F.2: TCP and UDP
- F.3: Operation of TCP/IP
- F.3: Operation of TCP/IP
- F.4: TCP/IP Applications
- F.4: TCP/IP Applications
- Appendix G: Radix-64 Conversion
- Appendix H: The Domain Name System
- H.1: Domain Names
- H.1: Domain Names
- H.2: The DNS Database
- H.2: The DNS Database
- H.3: DNS Operation
- H.3: DNS Operation
- The Server Hierarchy
- Name Resolution
- DNS Messages
- Appendix I: The Base Rate Fallacy
- I.1: Conditional Probability and Independence
- I.1: Conditional Probability and Independence
- I.2: Bayes’ Theorem
- I.2: Bayes’ Theorem
- I.3: The Base Rate Fallacy Demonstrated
- I.3: The Base Rate Fallacy Demonstrated
- Appendix J: SHA-3
- J.1: The Origins Of SHA-3
- J.1: The Origins Of SHA-3
- J.2: Evaluation Criteria For SHA-3
- J.2: Evaluation Criteria For SHA-3
- J.3: The Sponge Construction
- J.3: The Sponge Construction
- J.4: The SHA-3 Iteration Function f
- J.4: The SHA-3 Iteration Function f
- Structure of f
- Theta Step Function
- Rho Step Function
- Pi Step Function
- Chi Step Function
- Iota Step Function
- J.5: Recommended Reading
- J.5: Recommended Reading
- Acronyms
- Acronyms
- List of NIST and ISO Documents
- List of NIST and ISO Documents
- References
- References
- Credits
- Credits
- Index
- Index
- Digital Resources for Students
- Digital Resources for Students
- The William Stallings Books on Computer and Data Communications Technology
- The William Stallings Books on Computer and Data Communications Technology
UM RAFBÆKUR Á HEIMKAUP.IS
Bókahillan þín er þitt svæði og þar eru bækurnar þínar geymdar. Þú kemst í bókahilluna þína hvar og hvenær sem er í tölvu eða snjalltæki. Einfalt og þægilegt!Rafbók til eignar
Rafbók til eignar þarf að hlaða niður á þau tæki sem þú vilt nota innan eins árs frá því bókin er keypt.
Þú kemst í bækurnar hvar sem er
Þú getur nálgast allar raf(skóla)bækurnar þínar á einu augabragði, hvar og hvenær sem er í bókahillunni þinni. Engin taska, enginn kyndill og ekkert vesen (hvað þá yfirvigt).
Auðvelt að fletta og leita
Þú getur flakkað milli síðna og kafla eins og þér hentar best og farið beint í ákveðna kafla úr efnisyfirlitinu. Í leitinni finnur þú orð, kafla eða síður í einum smelli.
Glósur og yfirstrikanir
Þú getur auðkennt textabrot með mismunandi litum og skrifað glósur að vild í rafbókina. Þú getur jafnvel séð glósur og yfirstrikanir hjá bekkjarsystkinum og kennara ef þeir leyfa það. Allt á einum stað.
Hvað viltu sjá? / Þú ræður hvernig síðan lítur út
Þú lagar síðuna að þínum þörfum. Stækkaðu eða minnkaðu myndir og texta með multi-level zoom til að sjá síðuna eins og þér hentar best í þínu námi.
Fleiri góðir kostir
- Þú getur prentað síður úr bókinni (innan þeirra marka sem útgefandinn setur)
- Möguleiki á tengingu við annað stafrænt og gagnvirkt efni, svo sem myndbönd eða spurningar úr efninu
- Auðvelt að afrita og líma efni/texta fyrir t.d. heimaverkefni eða ritgerðir
- Styður tækni sem hjálpar nemendum með sjón- eða heyrnarskerðingu
- Gerð : 208
- Höfundur : 6170
- Útgáfuár : 2024
- Leyfi : 380