Computer Security: Principles and Practice, Global Edition

Höfundur William Stallings; Lawrie Brown

Útgefandi Pearson International Content

Snið ePub

Print ISBN 9781292729015

Útgáfa 5

Höfundarréttur 2025

4.890 kr.

Description

Efnisyfirlit

  • Welcome
  • Cover
  • Title Page
  • Copyright
  • Dedication
  • Preface
  • Notation
  • About the Authors
  • 1: Overview
  • Introduction: Overview
  • 1.1: Computer Security Concepts
  • A Definition of Computer Security
  • Examples
  • The Challenges of Computer Security
  • A Model for Computer Security
  • 1.2: Threats, Attacks, and Assets
  • 1.2: Threats, Attacks, and Assets
  • Threats and Attacks
  • Threats and Assets
  • 1.3: Security Functional Requirements
  • 1.3: Security Functional Requirements
  • 1.4: Fundamental Security Design Principles
  • 1.4: Fundamental Security Design Principles
  • 1.5: Attack Surfaces and Attack Trees
  • 1.5: Attack Surfaces and Attack Trees
  • Attack Surfaces
  • Attack Trees
  • 1.6: Computer Security Strategy
  • 1.6: Computer Security Strategy
  • Security Policy
  • Security Implementation
  • Assurance and Evaluation
  • 1.7: Standards
  • 1.7: Standards
  • 1.8: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • Part One: Computer Security Technology and Principles
  • Part One: Computer Security Technology and Principles
  • 2: Cryptographic Tools
  • Introduction: Cryptographic Tools
  • 2.1: Confidentiality with Symmetric Encryption
  • 2.1: Confidentiality with Symmetric Encryption
  • Symmetric Encryption
  • Symmetric Block Encryption Algorithms
  • Stream Ciphers
  • 2.2: Message Authentication and Hash Functions
  • 2.2: Message Authentication and Hash Functions
  • Authentication Using Symmetric Encryption
  • Message Authentication without Message Encryption
  • Secure Hash Functions
  • Other Applications of Hash Functions
  • 2.3: Public-Key Encryption
  • 2.3: Public-Key Encryption
  • Public-Key Encryption Structure
  • Applications for Public-Key Cryptosystems
  • Requirements for Public-Key Cryptography
  • Asymmetric Encryption Algorithms
  • 2.4: Digital Signatures and Key Management
  • 2.4: Digital Signatures and Key Management
  • Digital Signature
  • Public-Key Certificates
  • Symmetric Key Exchange Using Public-Key Encryption
  • Digital Envelopes
  • 2.5: Random and Pseudorandom Numbers
  • 2.5: Random and Pseudorandom Numbers
  • The Use of Random Numbers
  • Random versus Pseudorandom
  • 2.6: Practical Application: Encryption of Stored Data
  • 2.6: Practical Application: Encryption of Stored Data
  • 2.7: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • 3: User Authentication
  • Introduction: User Authentication
  • 3.1: Digital User Authentication Principles
  • 3.1: Digital User Authentication Principles
  • A Model for Digital User Authentication
  • Means of Authentication
  • Multifactor Authentication
  • Assurance Levels for User Authentication
  • 3.2: Password-Based Authentication
  • 3.2: Password-Based Authentication
  • The Vulnerability of Passwords
  • The Use of Hashed Passwords
  • Password Cracking of User-Chosen Passwords
  • Password File Access Control
  • Password Selection Strategies
  • 3.3: Token-Based Authentication
  • 3.3: Token-Based Authentication
  • Memory Cards
  • Smart Cards
  • Electronic Identity Cards
  • Hardware Authentication Tokens
  • Authentication Using a Mobile Phone
  • 3.4: Biometric Authentication
  • 3.4: Biometric Authentication
  • Physical Characteristics Used in Biometric Applications
  • Operation of a Biometric Authentication System
  • Biometric Accuracy
  • 3.5: Remote User Authentication
  • 3.5: Remote User Authentication
  • Password Protocol
  • Token Protocol
  • Static Biometric Protocol
  • Dynamic Biometric Protocol
  • 3.6: Security Issues for User Authentication
  • 3.6: Security Issues for User Authentication
  • 3.7: Practical Application: An Iris Biometric System
  • 3.7: Practical Application: An Iris Biometric System
  • 3.8: Case Study: Security Problems for ATM Systems
  • 3.8: Case Study: Security Problems for ATM Systems
  • 3.9: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • 4: Access Control
  • Introduction: Access Control
  • 4.1: Access Control Principles
  • 4.1: Access Control Principles
  • Access Control Context
  • Access Control Policies
  • 4.2: Subjects, Objects, and Access Rights
  • 4.2: Subjects, Objects, and Access Rights
  • 4.3: Discretionary Access Control
  • 4.3: Discretionary Access Control
  • An Access Control Model
  • Protection Domains
  • 4.4: Example: UNIX File Access Control
  • 4.4: Example: UNIX File Access Control
  • Traditional UNIX File Access Control
  • Access Control Lists in UNIX
  • 4.5: Mandatory Access Control
  • 4.5: Mandatory Access Control
  • Bell-LaPadula (BLP) Model
  • 4.6: Role-Based Access Control
  • 4.6: Role-Based Access Control
  • RBAC Reference Models
  • 4.7: Attribute-Based Access Control
  • 4.7: Attribute-Based Access Control
  • Attributes
  • ABAC Logical Architecture
  • ABAC Policies
  • 4.8: Identity, Credential, and Access Management
  • 4.8: Identity, Credential, and Access Management
  • Identity Management
  • Credential Management
  • Access Management
  • Identity Federation
  • 4.9: Trust Frameworks
  • 4.9: Trust Frameworks
  • Traditional Identity Exchange Approach
  • Open Identity Trust Framework
  • 4.10: Case Study: RBAC System for a Bank
  • 4.10: Case Study: RBAC System for a Bank
  • 4.11: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • 5: Database and Data Center Security
  • Introduction: Database and Data Center Security
  • 5.1: The Need for Database Security
  • 5.1: The Need for Database Security
  • 5.2: Database Management Systems
  • 5.2: Database Management Systems
  • 5.3: Relational Databases
  • 5.3: Relational Databases
  • Elements of a Relational Database System
  • Structured Query Language
  • 5.4: SQL Injection Attacks
  • 5.4: SQL Injection Attacks
  • A Typical SQLi Attack
  • The Injection Technique
  • SQLi Attack Avenues and Types
  • SQLi Countermeasures
  • 5.5: Database Access Control
  • 5.5: Database Access Control
  • SQL-Based Access Definition
  • Cascading Authorizations
  • Role-Based Access Control
  • 5.6: Inference
  • 5.6: Inference
  • 5.7: Database Encryption
  • 5.7: Database Encryption
  • 5.8: Data Center Security
  • 5.8: Data Center Security
  • Data Center Elements
  • Data Center Security Considerations
  • TIA-492
  • 5.9: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • 6: Malicious Software
  • Introduction: Malicious Software
  • 6.1: Types of Malicious Software (Malware)
  • 6.1: Types of Malicious Software (Malware)
  • A Broad Classification of Malware
  • Attack Kits
  • Attack Sources
  • 6.2: Advanced Persistent Threat
  • 6.2: Advanced Persistent Threat
  • 6.3: Propagation—Infected Content—Viruses
  • 6.3: Propagation—Infected Content—Viruses
  • The Nature of Viruses
  • Macro and Scripting Viruses
  • Viruses Classification
  • 6.4: Propagation—Vulnerability Exploit—Worms
  • 6.4: Propagation—Vulnerability Exploit—Worms
  • Target Discovery
  • Worm Propagation Model
  • The Morris Worm
  • A Brief History of Worm Attacks
  • State of Worm Technology
  • Mobile Code
  • Mobile Phone Worms
  • Client-Side Vulnerabilities and Drive-by-Downloads
  • Clickjacking
  • 6.5: Propagation—Social Engineering—Spam E-Mail, Trojans
  • 6.5: Propagation—Social Engineering—Spam E-Mail, Trojans
  • Spam (Unsolicited Bulk) E-Mail
  • Trojan Horses
  • Mobile Phone Trojans
  • 6.6: Payload—System Corruption
  • 6.6: Payload—System Corruption
  • Data Destruction and Ransomware
  • Real-World Damage
  • Logic Bomb
  • 6.7: Payload—Attack Agent—Zombie, Bots
  • 6.7: Payload—Attack Agent—Zombie, Bots
  • Uses of Bots
  • Remote Control Facility
  • 6.8: Payload—Information Theft—Keyloggers, Phishing, Spyware
  • 6.8: Payload—Information Theft—Keyloggers, Phishing, Spyware
  • Credential Theft, Keyloggers, and Spyware
  • Phishing and Identity Theft
  • Reconnaissance, Espionage, and Data Exfiltration
  • 6.9: Payload—Stealthing—Backdoors, Rootkits
  • 6.9: Payload—Stealthing—Backdoors, Rootkits
  • Backdoor
  • Rootkit
  • Kernel Mode Rootkits
  • Virtual Machine and Other External Rootkits
  • 6.10: Countermeasures
  • 6.10: Countermeasures
  • Malware Countermeasure Approaches
  • Host-Based Scanners and Signature-Based Anti-Virus
  • Perimeter Scanning Approaches
  • Distributed Intelligence Gathering Approaches
  • 6.11: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • 7: Denial-of-Service Attacks
  • Introduction: Denial-of-Service Attacks
  • 7.1: Denial-of-Service Attacks
  • 7.1: Denial-of-Service Attacks
  • The Nature of Denial-of-Service Attacks
  • Classic Denial-of-Service Attacks
  • Source Address Spoofing
  • SYN Spoofing
  • 7.2: Flooding Attacks
  • 7.2: Flooding Attacks
  • ICMP Flood
  • UDP Flood
  • TCP SYN Flood
  • 7.3: Distributed Denial-of-Service Attacks
  • 7.3: Distributed Denial-of-Service Attacks
  • 7.4: Application-Based Bandwidth Attacks
  • 7.4: Application-Based Bandwidth Attacks
  • SIP Flood
  • HTTP-Based Attacks
  • 7.5: Reflector and Amplifier Attacks
  • 7.5: Reflector and Amplifier Attacks
  • Reflection Attacks
  • Amplification Attacks
  • DNS Amplification Attacks
  • 7.6: Defenses Against Denial-of-Service Attacks
  • 7.6: Defenses Against Denial-of-Service Attacks
  • 7.7: Responding to a Denial-of-Service Attack
  • 7.7: Responding to a Denial-of-Service Attack
  • 7.8: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • 8: Intrusion Detection
  • Introduction: Intrusion Detection
  • 8.1: Intruders
  • 8.1: Intruders
  • Intruder Behavior
  • 8.2: Intrusion Detection
  • 8.2: Intrusion Detection
  • Basic Principles
  • The Base-Rate Fallacy
  • Requirements
  • 8.3: Analysis Approaches
  • 8.3: Analysis Approaches
  • Anomaly Detection
  • Signature or Heuristic Detection
  • 8.4: Host-Based Intrusion Detection
  • 8.4: Host-Based Intrusion Detection
  • Data Sources and Sensors
  • Anomaly HIDSs
  • Signature or Heuristic HIDSs
  • Distributed HIDSs
  • 8.5: Network-Based Intrusion Detection
  • 8.5: Network-Based Intrusion Detection
  • Types of Network Sensors
  • NIDS Sensor Deployment
  • Intrusion Detection Techniques
  • Logging of Alerts
  • 8.6: Distributed or Hybrid Intrusion Detection
  • 8.6: Distributed or Hybrid Intrusion Detection
  • 8.7: Intrusion Detection Exchange Format
  • 8.7: Intrusion Detection Exchange Format
  • 8.8: Honeypots
  • 8.8: Honeypots
  • 8.9: Example System: Snort
  • 8.9: Example System: Snort
  • Snort Architecture
  • Snort Rules
  • 8.10: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • 9: Firewalls and Intrusion Prevention Systems
  • Introduction: Firewalls and Intrusion Prevention Systems
  • 9.1: The Need for Firewalls
  • 9.1: The Need for Firewalls
  • 9.2: Firewall Characteristics and Access Policy
  • 9.2: Firewall Characteristics and Access Policy
  • 9.3: Types of Firewalls
  • 9.3: Types of Firewalls
  • Packet Filtering Firewall
  • Stateful Inspection Firewalls
  • Application-Level Gateway
  • Circuit-Level Gateway
  • 9.4: Firewall Basing
  • 9.4: Firewall Basing
  • Bastion Host
  • Host-Based Firewalls
  • Network Device Firewall
  • Virtual Firewall
  • Personal Firewall
  • 9.5: Firewall Location and Configurations
  • 9.5: Firewall Location and Configurations
  • DMZ Networks
  • Virtual Private Networks
  • Distributed Firewalls
  • Summary of Firewall Locations and Topologies
  • 9.6: Intrusion Prevention Systems
  • 9.6: Intrusion Prevention Systems
  • Host-Based IPS
  • Network-Based IPS
  • Distributed or Hybrid IPS
  • Snort Inline
  • 9.7: Example: Unified Threat Management Products
  • 9.7: Example: Unified Threat Management Products
  • 9.8: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • Part Two: Software and System Security
  • Part Two: Software and System Security
  • 10: Buffer Overflow
  • Introduction: Buffer Overflow
  • 10.1: Stack Overflows
  • Buffer Overflow Basics
  • Stack Buffer Overflows
  • Shellcode
  • 10.2: Defending Against Buffer Overflows
  • 10.2: Defending Against Buffer Overflows
  • Compile-Time Defenses
  • Run-Time Defenses
  • 10.3: Other Forms of Overflow Attacks
  • 10.3: Other Forms of Overflow Attacks
  • Replacement Stack Frame
  • Return to System Call
  • Heap Overflows
  • Global Data Area Overflows
  • Other Types of Overflows
  • 10.4: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • 11: Software Security
  • Introduction: Software Security
  • 11.1: Software Security Issues
  • 11.1 Software Security Issues
  • 11.2: Handling Program Input
  • 11.2: Handling Program Input
  • Input Size and Buffer Overflow
  • Interpretation of Program Input
  • Validating Input Syntax
  • Input Fuzzing
  • 11.3: Writing Safe Program Code
  • 11.3: Writing Safe Program Code
  • Correct Algorithm Implementation
  • Ensuring that Machine Language Corresponds to Algorithm
  • Correct Interpretation of Data Values
  • Correct Use of Memory
  • Preventing Race Conditions with Shared Memory
  • 11.4: Interacting with the Operating System and Other Programs
  • 11.4: Interacting with the Operating System and Other Programs
  • Environment Variables
  • Using Appropriate, Least Privileges
  • Systems Calls and Standard Library Functions
  • Preventing Race Conditions with Shared System Resources
  • Safe Temporary File Use
  • Interacting with Other Programs
  • 11.5: Handling Program Output
  • 11.5: Handling Program Output
  • 11.6: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • 12: Operating System Security
  • Introduction: Operating System Security
  • 12.1: Introduction to Operating System Security
  • 12.1: Introduction to Operating System Security
  • 12.2: System Security Planning
  • 12.2: System Security Planning
  • 12.3: Operating Systems Hardening
  • 12.3: Operating Systems Hardening
  • Operating System Installation: Initial Setup and Patching
  • Remove Unnecessary Services, Applications, and Protocols
  • Configure Users, Groups, and Authentication
  • Configure Resource Controls
  • Install Additional Security Controls
  • Test the System Security
  • 12.4: Application Security
  • 12.4: Application Security
  • Application Configuration
  • Encryption Technology
  • 12.5: Security Maintenance
  • 12.5: Security Maintenance
  • Logging
  • Data Backup and Archive
  • 12.6: Linux/Unix Security
  • 12.6: Linux/Unix Security
  • Patch Management
  • Application and Service Configuration
  • Users, Groups, and Permissions
  • Remote Access Controls
  • Logging and Log Rotation
  • Application Security Using a Chroot Jail
  • Security Testing
  • 12.7: Windows Security
  • 12.7: Windows Security
  • Patch Management
  • Users Administration and Access Controls
  • Application and Service Configuration
  • Other Security Controls
  • Security Testing
  • 12.8: Virtualization Security
  • 12.8: Virtualization Security
  • Virtualization Alternatives
  • Virtualization Security Issues
  • Securing Virtualization Systems
  • Virtualized Infrastructure Security
  • Virtual Firewall
  • 12.9: Trusted Computer Systems
  • 12.9: Trusted Computer Systems
  • Reference Monitors
  • TCSEC and Common Criteria
  • 12.10: Trusted Platform Module
  • 12.10: Trusted Platform Module
  • Authenticated Boot Service
  • Certification Service
  • Encryption Service
  • TPM Functions
  • Protected Storage
  • 12.11: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • 13: Cloud and IoT Security
  • Introduction: Cloud and IoT Security
  • 13.1: Cloud Computing
  • 13.1: Cloud Computing
  • Cloud Computing Elements
  • Cloud Service Models
  • Cloud Deployment Models
  • Cloud Computing Reference Architecture
  • 13.2: Cloud Security Concepts
  • 13.2: Cloud Security Concepts
  • Security Issues for Cloud Computing
  • Addressing Cloud Computing Security Concerns
  • 13.3: Cloud Security Approaches
  • Risks and Countermeasures
  • Data Protection in the Cloud
  • Security Approaches for Cloud Computing Assets
  • Cloud Security as a Service
  • An Open-source Cloud Security Module
  • 13.4: The Internet of Things
  • 13.4: The Internet of Things
  • Things on the Internet of Things
  • Evolution
  • Components of IoT-enabled Things
  • IoT and Cloud Context
  • 13.5: IoT Security
  • 13.5: IoT Security
  • The Patching Vulnerability
  • IoT Security and Privacy Requirements Defined by ITU-T
  • An IoT Security Framework
  • An Open-source IoT Security Module
  • 13.6: Key Terms and Review Questions
  • Key Terms
  • Review Questions
  • Part Three: Management Issues
  • Part Three: Management Issues
  • 14: IT Security Management and Risk Assessment
  • Introduction: IT Security Management and Risk Assessment
  • 14.1: IT Security Management
  • 14.1: IT Security Management
  • 14.2: Organizational Context and Security Policy
  • 14.2: Organizational Context and Security Policy
  • 14.3: Security Risk Assessment
  • 14.3: Security Risk Assessment
  • Baseline Approach
  • Informal Approach
  • Detailed Risk Analysis
  • Combined Approach
  • 14.4: Detailed Security Risk Analysis
  • 14.4: Detailed Security Risk Analysis
  • Context and System Characterization
  • Identification of Threats/Risks/Vulnerabilities
  • Analyze Risks
  • Evaluate Risks
  • Risk Treatment
  • 14.5: Case Study: Silver Star Mines
  • 14.5: Case Study: Silver Star Mines
  • 14.6: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • 15: IT Security Controls, Plans, and Procedures
  • Introduction: IT Security Controls, Plans, and Procedures
  • 15.1: IT Security Management Implementation
  • 15.1: IT Security Management Implementation
  • 15.2: Security Controls or Safeguards
  • 15.2: Security Controls or Safeguards
  • 15.3: IT Security Plan
  • 15.3: IT Security Plan
  • 15.4: Implementation of Controls
  • 15.4: Implementation of Controls
  • Implementation of Security Plan
  • Security Awareness and Training
  • 15.5: Monitoring Risks
  • 15.5: Monitoring Risks
  • Maintenance
  • Security Compliance
  • Change and Configuration Management
  • Incident Handling
  • 15.6: Case Study: Silver Star Mines
  • 15.6: Case Study: Silver Star Mines
  • 15.7: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • 16: Physical and Infrastructure Security
  • Introduction: Physical and Infrastructure Security
  • 16.1: Overview
  • 16.1: Overview
  • 16.2: Physical Security Threats
  • 16.2: Physical Security Threats
  • Natural Disasters
  • Environmental Threats
  • Technical Threats
  • Human-Caused Physical Threats
  • 16.3: Physical Security Prevention and Mitigation Measures
  • 16.3: Physical Security Prevention and Mitigation Measures
  • Environmental Threats
  • Technical Threats
  • Human-Caused Physical Threats
  • 16.4: Recovery from Physical Security Breaches
  • 16.4: Recovery from Physical Security Breaches
  • 16.5: Example: A Corporate Physical Security Policy
  • 16.5: Example: A Corporate Physical Security Policy
  • 16.6: Integration of Physical and Logical Security
  • 16.6: Integration of Physical and Logical Security
  • Personal Identity Verification
  • Use of PIV Credentials in Physical Access Control Systems
  • 16.7: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • 17: Human Resources Security
  • Introduction: Human Resources Security
  • 17.1: Security Awareness, Training, and Education
  • 17.1: Security Awareness, Training, and Education
  • Motivation
  • A Learning Continuum
  • Security Awareness
  • Cybersecurity Basics and Literacy
  • Role-Based Training
  • Education and Certification
  • 17.2: Employment Practices and Policies
  • 17.2: Employment Practices and Policies
  • Security in the Hiring Process
  • During Employment
  • Termination of Employment
  • 17.3: Acceptable Use Policy
  • 17.3: Acceptable Use Policy
  • 17.4: Computer Security Incident Response Teams
  • 17.4: Computer Security Incident Response Teams
  • Detecting Incidents
  • Triage Function
  • Responding to Incidents
  • Documenting Incidents
  • Information Flow for Incident Handling
  • 17.5: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • 18: Security Auditing
  • Introduction: Security Auditing
  • 18.1: Security Auditing Architecture
  • 18.1: Security Auditing Architecture
  • Security Audit and Alarms Model
  • Security Auditing Functions
  • Requirements
  • Implementation Guidelines
  • 18.2: Security Audit Trail
  • 18.2: Security Audit Trail
  • What to Collect
  • Protecting Audit Trail Data
  • 18.3: Implementing the Logging Function
  • 18.3: Implementing the Logging Function
  • Logging at the System Level
  • Logging at the Application Level
  • Interposable Libraries
  • Dynamic Binary Rewriting
  • 18.4: Audit Trail Analysis
  • 18.4: Audit Trail Analysis
  • Preparation
  • Timing
  • Audit Review
  • Approaches to Data Analysis
  • 18.5: Security Information and Event Management
  • 18.5: Security Information and Event Management
  • SIEM Systems
  • 18.6: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • 19: Legal and Ethical Aspects
  • Introduction: Legal and Ethical Aspects
  • 19.1: Cybercrime and Computer Crime
  • 19.1: Cybercrime and Computer Crime
  • Types of Computer Crime
  • Law Enforcement Challenges
  • Working with Law Enforcement
  • 19.2: Intellectual Property
  • 19.2: Intellectual Property
  • Types of Intellectual Property
  • Intellectual Property Relevant to Network and Computer Security
  • Digital Millennium Copyright Act
  • Digital Rights Management
  • 19.3: Privacy
  • 19.3: Privacy
  • Privacy Law and Regulation
  • Organizational Response
  • Computer Usage Privacy
  • Privacy, Data Surveillance, Big Data, and Social Media
  • 19.4: Ethical Issues
  • 19.4: Ethical Issues
  • Ethics and the Information Technology Professions
  • Ethical Issues Related to Computers and Information Systems
  • Codes of Conduct
  • The Rules
  • 19.5: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • Part Four: Cryptographic Algorithms
  • Part Four: Cryptographic Algorithms
  • 20: Symmetric Encryption and Message Confidentiality
  • Introduction: Symmetric Encryption and Message Confidentiality
  • 20.1: Symmetric Encryption Principles
  • 20.1: Symmetric Encryption Principles
  • Cryptography
  • Cryptanalysis
  • Feistel Cipher Structure
  • 20.2: Data Encryption Standard
  • 20.2: Data Encryption Standard
  • Data Encryption Standard
  • Triple DES
  • 20.3: Advanced Encryption Standard
  • 20.3: Advanced Encryption Standard
  • Overview of the Algorithm
  • Algorithm Details
  • 20.4: Stream Ciphers and RC4
  • 20.4: Stream Ciphers and RC4
  • Stream Cipher Structure
  • The RC4 Stream Cipher
  • The ChaCha20 Stream Cipher
  • 20.5: Cipher Block Modes of Operation
  • 20.5: Cipher Block Modes of Operation
  • Electronic Codebook Mode
  • Cipher Block Chaining Mode
  • Cipher Feedback Mode
  • Counter Mode
  • 20.6: Key Distribution
  • 20.6: Key Distribution
  • 20.7: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • 21: Public-Key Cryptography and Message Authentication
  • Introduction: Public-Key Cryptography and Message Authentication
  • 21.1: Secure Hash Functions
  • 21.1: Secure Hash Functions
  • Simple Hash Functions
  • The SHA Secure Hash Function
  • SHA-3
  • 21.2: HMAC
  • 21.2: HMAC
  • HMAC Design Objectives
  • HMAC Algorithm
  • Security of HMAC
  • 21.3: Authenticated Encryption
  • 21.3: Authenticated Encryption
  • 21.4: The RSA Public-Key Encryption Algorithm
  • 21.4: The RSA Public-Key Encryption Algorithm
  • Description of the Algorithm
  • The Security of RSA
  • 21.5: Diffie-Hellman and Other Asymmetric Algorithms
  • Diffie-Hellman Key Exchange
  • Other Public-Key Cryptography Algorithms
  • 21.6: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • Part Five: Network Security
  • Part Five: Network Security
  • 22: Internet Security Protocols and Standards
  • Introduction: Internet Security Protocols and Standards
  • 22.1: Secure E-mail and S/MIME
  • 22.1: Secure E-mail and S/MIME
  • MIME
  • S/MIME
  • 22.2: DomainKeys Identified Mail
  • 22.2: DomainKeys Identified Mail
  • Internet Mail Architecture
  • DKIM Strategy
  • 22.3: Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
  • 22.3: Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
  • TLS Architecture
  • TLS Protocols
  • SSL/TLS Attacks
  • 22.4: HTTPS
  • 22.4: HTTPS
  • Connection Initiation
  • Connection Closure
  • 22.5: IPv4 and IPv6 Security
  • IP Security Overview
  • The Scope of IPsec
  • Security Associations
  • Encapsulating Security Payload
  • Transport and Tunnel Modes
  • 22.6: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • 23: Internet Authentication Applications
  • Introduction: Internet Authentication Applications
  • 23.1: Kerberos
  • 23.1: Kerberos
  • The Kerberos Protocol
  • Kerberos Realms and Multiple Kerberi
  • Version 4 and Version 5
  • Performance Issues
  • 23.2: X.509
  • 23.2: X.509
  • 23.3: Public-Key Infrastructure
  • 23.3: Public-Key Infrastructure
  • Public Key Infrastructure X.509 (PKIX)
  • 23.4: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • 24: Wireless Network Security
  • Introduction: Wireless Network Security
  • 24.1: Wireless Security
  • 24.1: Wireless Security
  • Wireless Network Threats
  • Wireless Security Measures
  • 24.2: Mobile Device Security
  • 24.2: Mobile Device Security
  • Security Threats
  • Mobile Device Security Strategy
  • 24.3: IEEE 802.11 Wireless LAN Overview
  • 24.3: IEEE 802.11 Wireless LAN Overview
  • The Wi-Fi Alliance
  • IEEE 802 Protocol Architecture
  • IEEE 802.11 Network Components and Architectural Model
  • IEEE 802.11 Services
  • 24.4: IEEE 802.11i Wireless LAN Security
  • 24.4: IEEE 802.11i Wireless LAN Security
  • IEEE 802.11i Services
  • IEEE 802.11i Phases of Operation
  • Discovery Phase
  • Authentication Phase
  • Key Management Phase
  • Protected Data Transfer Phase
  • The IEEE 802.11i Pseudorandom Function
  • 24.5: Key Terms, Review Questions, and Problems
  • Key Terms
  • Review Questions
  • Problems
  • Appendix A: Projects and Other Student Exercises for Teaching Computer Security
  • Appendix A: Projects and Other Student Exercises for Teaching Computer Security
  • A.1: Hacking Project
  • A.1: Hacking Project
  • A.2: Laboratory Exercises
  • A.2: Laboratory Exercises
  • A.3: Security Education (Seed) Projects
  • A.3: Security Education (Seed) Projects
  • A.4: Research Projects
  • A.4: Research Projects
  • A.5: Programming Projects
  • A.5: Programming Projects
  • A.6: Practical Security Assessments
  • A.6: Practical Security Assessments
  • A.7: Firewall Projects
  • A.7: Firewall Projects
  • A.8: Case Studies
  • A.8: Case Studies
  • A.9: Reading/report Assignments
  • A.9: Reading/report Assignments
  • A.10: Writing Assignments
  • A.10: Writing Assignments
  • Appendix B: Some Aspects of Number Theory
  • Appendix B: Some Aspects of Number Theory
  • B.1: Prime and Relatively Prime Numbers
  • B.1: Prime and Relatively Prime Numbers
  • Divisors
  • Prime Numbers
  • Relatively Prime Numbers
  • B.2: Modular Arithmetic
  • B.2: Modular Arithmetic
  • Modular Arithmetic Operations
  • Inverses
  • B.3: Fermat’s and Euler’s Theorems
  • B.3: Fermat’s and Euler’s Theorems
  • Fermat’s Theorem
  • Euler’s Totient Function
  • Euler’s Theorem
  • Appendix C: Standards and Standard-Setting Organizations
  • Appendix C: Standards and Standard-Setting Organizations
  • C.1: The Importance of Standards
  • C.1: The Importance of Standards
  • C.2: Internet Standards and the Internet Society
  • C.2: Internet Standards and the Internet Society
  • The Internet Organizations and RFC Publication
  • The Standardization Process
  • Internet Standards Categories
  • Other RFC Types
  • C.3: The National Institute of Standards and Technology
  • C.3: The National Institute of Standards and Technology
  • C.4: The International Telecommunication Union
  • C.4: The International Telecommunication Union
  • ITU Telecommunication Standardization Sector
  • Schedule
  • C.5: The International Organization for Standardization
  • C.5: The International Organization for Standardization
  • C.6: Significant Security Standards and Documents
  • C.6: Significant Security Standards and Documents
  • International Organization for Standardization (ISO)
  • National Institute of Standards and Technology (NIST)
  • International Telecommunication Union Telecommunication Standardization Sector (ITU-T)
  • Common Criteria for Information Technology Security Evaluation
  • Internet Standards and the Internet Society
  • Appendix D: Random and Pseudorandom Number Generation
  • Appendix D: Random and Pseudorandom Number Generation
  • D.1: The Use of Random Numbers
  • D.1: The Use of Random Numbers
  • Randomness
  • Unpredictability
  • D.2: Pseudorandom Number Generators (PRNGS)
  • D.2: Pseudorandom Number Generators (PRNGS)
  • Linear Congruential Generators
  • Cryptographically Generated Random Numbers
  • Blum Blum Shub Generator
  • D.3: True Random Number Generators
  • D.3: True Random Number Generators
  • Skew
  • Appendix E: Message Authentication Codes Based on Block Ciphers
  • Appendix E: Message Authentication Codes Based on Block Ciphers
  • E.1: Cipher-Based Message Authentication Code
  • E.1: Cipher-Based Message Authentication Code
  • E.2: Counter With Cipher Block Chaining Message Authentication Code
  • E.2: Counter With Cipher Block Chaining Message Authentication Code
  • E.3: Galois Counter Mode
  • E.3: Galois Counter Mode
  • Appendix F: The TCP/IP Protocol Architecture
  • Appendix F: The TCP/IP Protocol Architecture
  • F.1: TCP/IP Layers
  • F.1: TCP/IP Layers
  • F.2: TCP and UDP
  • F.2: TCP and UDP
  • F.3: Operation of TCP/IP
  • F.3: Operation of TCP/IP
  • F.4: TCP/IP Applications
  • F.4: TCP/IP Applications
  • Appendix G: Radix-64 Conversion
  • Appendix G: Radix-64 Conversion
  • Appendix H: The Domain Name System
  • Appendix H: The Domain Name System
  • H.1: Domain Names
  • H.1: Domain Names
  • H.2: The DNS Database
  • H.2: The DNS Database
  • H.3: DNS Operation
  • H.3: DNS Operation
  • The Server Hierarchy
  • Name Resolution
  • DNS Messages
  • Appendix I: The Base Rate Fallacy
  • Appendix I: The Base Rate Fallacy
  • I.1: Conditional Probability and Independence
  • I.1: Conditional Probability and Independence
  • I.2: Bayes’ Theorem
  • I.2: Bayes’ Theorem
  • I.3: The Base Rate Fallacy Demonstrated
  • I.3: The Base Rate Fallacy Demonstrated
  • Appendix J: SHA-3
  • Appendix J: SHA-3
  • J.1: The Origins Of SHA-3
  • J.1: The Origins Of SHA-3
  • J.2: Evaluation Criteria For SHA-3
  • J.2: Evaluation Criteria For SHA-3
  • J.3: The Sponge Construction
  • J.3: The Sponge Construction
  • J.4: The SHA-3 Iteration Function f
  • J.4: The SHA-3 Iteration Function f
  • Structure of f
  • Theta Step Function
  • Rho Step Function
  • Pi Step Function
  • Chi Step Function
  • Iota Step Function
  • J.5: Recommended Reading
  • J.5: Recommended Reading
  • Acronyms
  • Acronyms
  • Acronyms
  • List of NIST and ISO Documents
  • List of NIST and ISO Documents
  • List of NIST and ISO Documents
  • References
  • References
  • References
  • Credits
  • Credits
  • Credits
  • Index
  • Index
  • Index
  • Digital Resources for Students
  • Digital Resources for Students
  • Digital Resources for Students
  • The William Stallings Books on Computer and Data Communications Technology
  • The William Stallings Books on Computer and Data Communications Technology
  • The William Stallings Books on Computer and Data Communications Technology
  • Footnotes
  • Glossary

Additional information

Veldu vöru

Rafbók til eignar, Leiga á rafbók í 365 daga, Leiga á rafbók í 180 daga, Leiga á rafbók í 90 daga

Aðrar vörur

0
    0
    Karfan þín
    Karfan þín er tómAftur í búð