Description
Efnisyfirlit
- Contents
- Introduction to the Paperback Edition
- Preface
- Chapter 1: Introduction
- SYSTEMS
- SYSTEMS AND SECURITY
- Part 1: The Landscape
- Chapter 2: Digital Threats
- THE UNCHANGING NATURE OF ATTACKS
- THE CHANGING NATURE OF ATTACKS
- PROACTION VS. REACTION
- Chapter 3: Attacks
- CRIMINAL ATTACKS
- PRIVACY VIOLATIONS
- PUBLICITY ATTACKS
- LEGAL ATTACKS
- Chapter 4: Adversaries
- HACKERS
- LONE CRIMINALS
- MALICIOUS INSIDERS
- INDUSTRIAL ESPIONAGE
- PRESS
- ORGANIZED CRIME
- POLICE
- TERRORISTS
- NATIONAL INTELLIGENCE ORGANIZATIONS
- INFOWARRIORS
- Chapter 5: Security Needs
- PRIVACY
- MULTILEVEL SECURITY
- ANONYMITY
- PRIVACY AND THE GOVERNMENT
- AUTHENTICATION
- INTEGRITY
- AUDIT
- ELECTRONIC CURRENCY
- PROACTIVE SOLUTIONS
- Part 2: Technologies
- Chapter 6: Cryptography
- SYMMETRIC ENCRYPTION
- TYPES OF CRYPTOGRAPHIC ATTACKS
- RECOGNIZING PLAINTEXT
- MESSAGE AUTHENTICATION CODES
- ONE-WAY HASH FUNCTIONS
- PUBLIC-KEY ENCRYPTION
- DIGITAL SIGNATURE SCHEMES
- RANDOM NUMBER GENERATORS
- KEY LENGTH
- Chapter 7: Cryptography in Context
- KEY LENGTH AND SECURITY
- ONE-TIME PADS
- PROTOCOLS
- INTERNET CRYPTOGRAPHIC PROTOCOLS
- TYPES OF PROTOCOL ATTACKS
- CHOOSING AN ALGORITHM OR PROTOCOL
- Chapter 8: Computer Security
- DEFINITIONS
- ACCESS CONTROL
- SECURITY MODELS
- SECURITY KERNELS AND TRUSTED COMPUTING BASES
- COVERT CHANNELS
- EVALUATION CRITERIA
- FUTURE OF SECURE COMPUTERS
- Chapter 9: Identification and Authentication
- PASSWORDS
- BIOMETRICS
- ACCESS TOKENS
- AUTHENTICATION PROTOCOLS
- SINGLE SIGN-ON
- Chapter 10: Networked-Computer Security
- MALICIOUS SOFTWARE
- MODULAR CODE
- MOBILE CODE
- WEB SECURITY
- Chapter 11: Network Security
- HOW NETWORKS WORK
- IP SECURITY
- DNS SECURITY
- DENIAL-OF-SERVICE ATTACKS
- DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
- THE FUTURE OF NETWORK SECURITY
- Chapter 12: Network Defenses
- FIREWALLS
- DEMILITARIZED ZONES
- VIRTUAL PRIVATE NETWORKS
- INTRUSION DETECTION SYSTEMS
- HONEY POTS AND BURGLAR ALARMS
- VULNERABILITY SCANNERS
- E-MAIL SECURITY
- ENCRYPTION AND NETWORK DEFENSES
- Chapter 13: Software Reliability
- FAULTY CODE
- ATTACKS ON FAULTY CODE
- BUFFER OVERFLOWS
- THE UBIQUITY OF FAULTY CODE
- Chapter 14: Secure Hardware
- TAMPER RESISTANCE
- SIDE-CHANNEL ATTACKS
- ATTACKS AGAINST SMART CARDS
- Chapter 15: Certificates and Credentials
- TRUSTED THIRD PARTIES
- CREDENTIALS
- CERTIFICATES
- PROBLEMS WITH TRADITIONAL PKIs
- PKIS ON THE INTERNET
- Chapter 16: Security Tricks
- GOVERNMENT ACCESS TO KEYS
- DATABASE SECURITY
- STEGANOGRAPHY
- SUBLIMINAL CHANNELS
- DIGITAL WATERMARKING
- COPY PROTECTION
- ERASING DIGITAL INFORMATION
- Chapter 17: The Human Factor
- RISK
- EXCEPTION HANDLING
- HUMAN–COMPUTER INTERFACE
- HUMAN–COMPUTER TRANSFERENCE
- MALICIOUS INSIDERS
- SOCIAL ENGINEERING
- Part 3: Strategies
- Chapter 18: Vulnerabilities and the Vulnerability Landscape
- ATTACK METHODOLOGY
- COUNTERMEASURES
- THE VULNERABILITY LANDSCAPE
- RATIONALLY APPLYING COUNTERMEASURES
- Chapter 19: Threat Modeling and Risk Assessment
- FAIR ELECTIONS
- SECURE TELEPHONES
- SECURE E-MAIL
- STORED-VALUE SMART CARDS
- RISK ASSESSMENT
- THE POINT OF THREAT MODELING
- GETTING THE THREAT WRONG
- Chapter 20: Security Policies and Countermeasures
- SECURITY POLICIES
- TRUSTED CLIENT SOFTWARE
- AUTOMATIC TELLER MACHINES
- COMPUTERIZED LOTTERY TERMINALS
- SMART CARDS VS. MEMORY CARDS
- RATIONAL COUNTERMEASURES
- Chapter 21: Attack Trees
- BASIC ATTACK TREES
- PGP ATTACK TREE
- CREATING AND USING ATTACK TREES
- Chapter 22: Product Testing and Verification
- THE FAILURE OF TESTING
- DISCOVERING SECURITY FLAWS AFTER THE FACT
- OPEN STANDARDS AND OPEN SOURCE SOLUTIONS
- REVERSE ENGINEERING AND THE LAW
- CRACKING AND HACKING CONTESTS
- EVALUATING AND CHOOSING SECURITY PRODUCTS
- Chapter 23: The Future of Products
- SOFTWARE COMPLEXITY AND SECURITY
- TECHNOLOGIES TO WATCH
- WILL WE EVER LEARN?
- Chapter 24: Security Processes
- PRINCIPLES
- DETECTION AND RESPONSE
- COUNTERATTACK
- MANAGE RISK
- OUTSOURCING SECURITY PROCESSES
- Chapter 25: Conclusion
- Afterword
- Resources
- Acknowledgments
- Index
Reviews
There are no reviews yet.