<h2>Table of Contents</h2> <div class="c-un-numbered-list_container"> <ul> <li>Online Resources</li> <li>Preface</li> <li>Notation</li> <li>About the Authors</li> </ul> <ul> <li><strong>Chapter 1 Overview</strong> <ul> <li>1.1 Computer Security Concepts</li> <li>1.2 Threats, Attacks, and Assets</li> <li>1.3 Security Functional Requirements</li> <li>1.4 Fundamental Security Design Principles</li> <li>1.5 Attack Surfaces and Attack Trees</li> <li>1.6 Computer Security Strategy</li> <li>1.7 Standards</li> <li>1.8 Key Terms, Review Questions, and Problems</li> </ul></li> </ul> <h3>PART ONE COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES</h3> <ul> <li><strong>Chapter 2 Cryptographic Tools</strong> <ul> <li>2.1 Confidentiality with Symmetric Encryption</li> <li>2.2 Message Authentication and Hash Functions</li> <li>2.3 Public-Key Encryption</li> <li>2.4 Digital Signatures and Key Management</li> <li>2.5 Random and Pseudorandom Numbers</li> <li>2.6 Practical Application: Encryption of Stored Data</li> <li>2.7 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 3 User Authentication</strong> <ul> <li>3.1 Digital User Authentication Principles</li> <li>3.2 Password-Based Authentication</li> <li>3.3 Token-Based Authentication</li> <li>3.4 Biometric Authentication</li> <li>3.5 Remote User Authentication</li> <li>3.6 Security Issues for User Authentication</li> <li>3.7 Practical Application: An Iris Biometric System</li> <li>3.8 Case Study: Security Problems for ATM Systems</li> <li>3.9 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 4 Access Control</strong> <ul> <li>4.1 Access Control Principles</li> <li>4.2 Subjects, Objects, and Access Rights</li> <li>4.3 Discretionary Access Control</li> <li>4.4 Example: UNIX File Access Control</li> <li>4.5 Role-Based Access Control</li> <li>4.6 Attribute-Based Access Control</li> <li>4.7 Identity, Credential, and Access Management</li> <li>4.8 Trust Frameworks</li> <li>4.9 Case Study: RBAC System for a Bank</li> <li>4.10 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 5 Database and Data Center Security</strong> <ul> <li>5.1 The Need for Database Security</li> <li>5.2 Database Management Systems</li> <li>5.3 Relational Databases</li> <li>5.4 SQL Injection Attacks</li> <li>5.5 Database Access Control</li> <li>5.6 Inference</li> <li>5.7 Database Encryption</li> <li>5.8 Data Center Security</li> <li>5.9 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 6 Malicious Software</strong> <ul> <li>6.1 Types of Malicious Software</li> <li>6.2 Advanced Persistent Threat</li> <li>6.2 Propagation — Infected Content - Viruses</li> <li>6.3 Propagation — Vulnerability Exploit - Worms</li> <li>6.4 Propagation — Social Engineering — SPAM E-Mail, Trojans</li> <li>6.5 Payload — System Corruption</li> <li>6.6 Payload — Attack Agent — Zombie, Bots</li> <li>6.7 Payload — Information Theft — Keyloggers, Phishing, Spyware</li> <li>6.8 Payload — Stealthing — Backdoors, Rootkits</li> <li>6.9 Countermeasures</li> <li>6.10 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 7 Denial-of-Service Attacks</strong> <ul> <li>7.1 Denial-of-Service Attacks</li> <li>7.2 Flooding Attacks</li> <li>7.3 Distributed Denial-of-Service Attacks</li> <li>7.4 Application-Based Bandwidth Attacks</li> <li>7.5 Reflector and Amplifier Attacks</li> <li>7.6 Defenses Against Denial-of-Service Attacks</li> <li>7.7 Responding to a Denial-of-Service Attack</li> <li>7.8 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 8 Intrusion Detection</strong> <ul> <li>8.1 Intruders</li> <li>8.2 Intrusion Detection</li> <li>8.3 Analysis Approaches</li> <li>8.4 Host-Based Intrusion Detection</li> <li>8.5 Network-Based Intrusion Detection</li> <li>8.6 Distributed or Hybrid Intrusion Detection</li> <li>8.7 Intrusion Detection Exchange Format</li> <li>8.8 Honeypots</li> <li>8.9 Example System: Snort</li> <li>8.10 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 9 Firewalls and Intrusion Prevention Systems</strong> <ul> <li>9.1 The Need for Firewalls</li> <li>9.2 Firewall Characteristics and Access Policy</li> <li>9.3 Types of Firewalls</li> <li>9.4 Firewall Basing</li> <li>9.5 Firewall Location and Configurations</li> <li>9.6 Intrusion Prevention Systems</li> <li>9.7 Example: Unified Threat Management Products</li> <li>9.8 Key Terms, Review Questions, and Problems</li> </ul></li> </ul> <h3>PART TWO SOFTWARE SECURITY AND TRUSTED SYSTEMS</h3> <ul> <li><strong>Chapter 10 Buffer Overflow</strong> <ul> <li>10.1 Stack Overflows</li> <li>10.2 Defending Against Buffer Overflows</li> <li>10.3 Other Forms of Overflow Attacks</li> <li>10.4 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 11 Software Security</strong> <ul> <li>11.1 Software Security Issues</li> <li>11.2 Handling Program Input</li> <li>11.3 Writing Safe Program Code</li> <li>11.4 Interacting with the Operating System and Other Programs</li> <li>11.5 Handling Program Input</li> <li>11.6 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 12 Operating System Security</strong> <ul> <li>12.1 Introduction to Operating System Security</li> <li>12.3 System Security Planning</li> <li>12.3 Operating Systems Hardening</li> <li>12.4 Application Security</li> <li>12.5 Security Maintenance</li> <li>12.6 Linux/UNIX Security</li> <li>12.7 Windows Security</li> <li>12.8 Virtualization Security</li> <li>12.9 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 13 Cloud and IoT Security</strong> <ul> <li>13.1 Cloud Computing</li> <li>13.2 Cloud Security Concepts</li> <li>13.3 Cloud Security Approaches</li> <li>13.4 The Internet of Things</li> <li>13.5 IoT Security</li> <li>13.6 Key Terms, Review Questions, and Problems</li> </ul></li> </ul> <h3>PART THREE MANAGEMENT ISSUES</h3> <ul> <li><strong>Chapter 14 IT Security Management and Risk Assessment</strong> <ul> <li>14.1 IT Security Management</li> <li>14.2 Organizational Context and Security Policy</li> <li>14.3 Security Risk Assessment</li> <li>14.4 Detailed Security Risk Analysis</li> <li>14.5 Case Study: Silver Star Mines</li> <li>14.6 Recommended Reading</li> <li>14.7 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 15 IT Security Controls, Plans and Procedures</strong> <ul> <li>15.1 IT Security Management Implementation</li> <li>15.2 Security Controls or Safeguards</li> <li>15.3 IT Security Plan</li> <li>15.4 Implementation of Controls</li> <li>15.5 Monitoring Risks</li> <li>15.6 Case Study: Silver Star Mines</li> <li>15.7 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 16 Physical and Infrastructure Security</strong> <ul> <li>16.1 Overview</li> <li>16.2 Physical Security Threats</li> <li>16.3 Physical Security Prevention and Mitigation Measures</li> <li>16.4 Recovery from Physical Security Breaches</li> <li>16.5 Example: A Corporate Physical Security Policy</li> <li>16.6 Integration of Physical and Logical Security</li> <li>16.7 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 17 Human Resources Security</strong> <ul> <li>17.1 Security Awareness, Training, and Education</li> <li>17.2 Employment Practices and Policies</li> <li>17.3 E-Mail and Internet Use Policies</li> <li>17.4 Computer Security Incident Response Teams</li> <li>17.5 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 18 Security Auditing</strong> <ul> <li>18.1 Security Auditing Architecture</li> <li>18.2 The Security Audit Trail</li> <li>18.3 Implementing the Logging Function</li> <li>18.4 Audit Trail Analysis</li> <li>18.5 Security Information and Event Management</li> <li>18.6 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 19 Legal and Ethical Aspects</strong> <ul> <li>19.1 Cybercrime and Computer Crime</li> <li>19.2 Intellectual Property</li> <li>19.3 Privacy</li> <li>19.4 Ethical Issues</li> <li>19.5 Key Terms, Review Questions, and Problems</li> </ul> <ul> <li>Appendix 19A: Information Privacy Standard of Good Practice</li> </ul></li> </ul> <h3>PART FOUR CRYPTOGRAPHIC ALGORITHMS</h3> <ul> <li><strong>Chapter 20 Symmetric Encryption and Message Confidentiality</strong> <ul> <li>20.1 Symmetric Encryption and Message Confidentiality</li> <li>20.2 Data Encryption Standard</li> <li>20.3 Advanced Encryption Standard</li> <li>20.4 Stream Ciphers and RC4</li> <li>20.5 Cipher Block Modes of Operation</li> <li>20.6 Key Distribution</li> <li>20.8 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 21 Public-Key Cryptography and Message Authentication</strong> <ul> <li>21.1 Secure Hash Functions</li> <li>21.2 HMAC</li> <li>21.3 Authenticated Encryption</li> <li>21.4 The RSA Public-Key Encryption Algorithm</li> <li>21.5Diffie-Hellman and Other Asymmetric Algorithms</li> <li>21.6 Key Terms, Review Questions, and Problems</li> </ul></li> </ul> <h3>PART FIVE NETWORK SECURITY</h3> <ul> <li><strong>Chapter 22 Internet Security Protocols and Standards</strong> <ul> <li>22.1 Secure Email and S/MIME</li> <li>22.2 DomainKeys Identified Mail</li> <li>22.3 Secure Sockets Layer (SSL) and Transport Layer Security (TLS)</li> <li>22.4 HTTPS</li> <li>22.5 IPv4 and IPv6 Security</li> <li>22.6 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 23 Internet Authentication Applications</strong> <ul> <li>23.1 Kerberos</li> <li>23.2 X.509</li> <li>23.3 Public-Key Infrastructure</li> <li>23.4 Federated Identity Management</li> <li>23.5 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 24 Wireless Network Security</strong> <ul> <li>24.1 Wireless Security Overview</li> <li>24.2 Mobile Device Security</li> <li>24.3 IEEE 802.11 Wireless LAN Overview</li> <li>24.4 IEEE 802.11i Wireless LAN Security</li> <li>24.5 Key Terms, Review Questions, and Problems</li> </ul></li> </ul> <h3>APPENDICES</h3> <ul> <li>Appendix A Projects and Other Student Exercises for Teaching Computer Security <ul> <li>A.1 Hacking Project</li> <li>A.2 Laboratory Exercises</li> <li>A.3 Security Education (SEED) Projects</li> <li>A.4 Research Projects</li> <li>A.5 Programming Projects</li> <li>A.6 Practical Security Assessments</li> <li>A.7 Firewall Projects</li> <li>A.8 Case Studies</li> <li>A.9 Reading/Report Assignments</li> <li>A.10 Writing Assignments</li> <li>A.11 Webcasts for Teaching Computer Security</li> </ul></li> </ul> <h4 class="h5">ACRONYMS</h4> <h4 class="h5">LIST OF NIST DOCUMENTS</h4> <h4 class="h5">REFERENCES</h4> <h4 class="h5">INDEX</h4> <h3>ONLINE CHAPTERS AND APPENDICES</h3> <ul> <li>Online chapters, appendices, and other documents are Premium Content, available via the access card printed in the front of the book.</li> </ul> <ul> <li><strong>Chapter 25 Linux Security</strong> <ul> <li>25.1 Introduction</li> <li>25.2 Linux's Security Model</li> <li>25.3 The Linux DAC in Depth: Filesystem Security</li> <li>25.4 Linux Vulnerabilities</li> <li>25.5 Linux System Hardening</li> <li>25.6 Application Security</li> <li>25.7 Mandatory Access Controls</li> <li>25.8 Key Terms, Review Questions, and Problems</li> </ul></li> <li><strong>Chapter 26 Windows and Windows Vista Security</strong> <ul> <li>26.1 Windows Security Architecture</li> <li>26.2 Windows Vulnerabilities</li> <li>26.3 Windows Security Defenses</li> <li>26.4 Browser Defenses</li> <li>26.5 Cryptographic Services</li> <li>26.6 Common Criteria</li> <li>26.7 Key Terms, Review Questions, Problems, and Projects</li> </ul></li> </ul> <h3>Appendix B Some Aspects of Number Theory</h3> <h3>Appendix C Standards and Standard-Setting Organizations</h3> <h3>Appendix D Random and Pseudorandom Number Generation</h3> <h3>Appendix E Message Authentication Codes Based on Block Ciphers</h3> <h3>Appendix F TCP/IP Protocol Architecture</h3> <h3>Appendix G Radix-64 Conversion</h3> <h3>Appendix H The Domain Name System</h3> <h3>Appendix I The Base-Rate Fallacy</h3> <h3>Appendix J SHA-3</h3> <h3>Appendix K Glossary</h3> </div>