Foundations of Computer Security
內容描述
Description
Anyone with a computer has heard of viruses, had
to deal with several, and has been struggling with spam, spyware, and disk
crashes. This book is intended as a starting point for those familiar with
basic concepts of computers and computations and who would like to extend
their knowledge into the realm of computer and network security. Its
comprehensive treatment of all the major areas of computer security aims to
give readers a complete foundation in the field of Computer Security.
Exercises are given throughout the book and are intended to strengthening the
reader’s knowledge - answers are also provided.
Written in a clear, easy to understand style,
aimed towards advanced undergraduates and non-experts who want to know about
the security problems confronting them everyday. The technical level of the
book is low and requires no mathematics, and only a basic concept of computers
and computations. Foundations of Computer Security will be an invaluable tool
for students and professionals alike.
Table of
contents
ContentsPreface viiIntroduction 11
Physical Security 151.1 Side-Channel Attacks 151.2 Physical Threats
201.3 Laptop Security 261.4 Disaster Recovery Planning 281.5
Privacy Protection 292 Viruses 332.1 Operating Systems 342.2
Computer Viruses 362.3 Virus Writers 402.4 Virus Propagation 432.5
Virus Classification 462.6 Boot Sector Viruses 482.7 File Infector
Viruses 512.8 Companion Viruses 552.9 Multipartite Viruses 562.10
Macro and Script Viruses 572.11 Infected Images 592.12 Virus Life
Cycle 622.13 Viruses and UNIX 652.14 Viruses and the Macintosh
652.15 Viruses and the Amiga 662.16 Virus Replication 662.17 Virus
Payload 662.18 Virus Organization 742.19 Virus Naming 75xx
Contents2.20 Virus Hiding Methods 762.21 Polymorphism 802.22 Virus
Stealth Techniques 832.23 Interrupts and Viruses 842.24 Trapdoors
883 Worms 913.1 Code Red I 933.2 Worming Techniques 953.3
Proposing a CCDC 1053.4 The Internet Worm 1084 Trojan Horses
1134.1 Applications of Trojans 1144.2 Installing a Trojan 1164.3
Rigging a Compiler 1185 ExamplesofMalware 1255.1 The Lehigh Virus
1255.2 The Brain Virus 1265.3 The Michaelangelo Virus 1275.4 The
SirCAM Virus 1285.5 The Melissa Virus 1295.6 Scores Virus 1305.7
Swiss Amiga Virus 1315.8 Christmas Card Virus 1315.9 VBS.KAK Worm
1325.10 The Cruncher Virus 1335.11 Opener Virus 1345.12 MTX
Worm/Virus 1356 Prevention and Defenses 1396.1 Understanding
Vulnerabilities 1396.2 Defenses Against Malware 1446.3 Anti-Virus
Software 1456.4 Backups and Such 1556.5 Hoaxes 1607 Network
Security 1637.1 Internet Vulnerabilities 1637.2 Port Scanning
1647.3 Spoofs 1657.4 Spam 1697.5 Denial of Service 1817.6
Firewall Basics 1848 Authentication 1898.1 Local Authentication
1908.2 Biometric Techniques 1908.3 Passwords 196Contents xxi9
Spyware 2119.1 Introduction and Definition 2129.2 RIAA and Spyware
2159.3 Terrorism and Spyware 2179.4 Political Contributions 2189.5
Distribution of Spyware 2199.6 Remote Reporting 2229.7 Adware
2259.8 Spyware? 22610 Identity Theft 23110.1 Introduction
23210.2 Shredding 23610.3 Internet Cookies 23810.4 Phishing
23910.5 The Homograph Threat 24511 Privacy and Trust 24711.1
Privacy Issues 24811.2 Online Privacy 25111.3 Children’s Privacy
25311.4 Trust 25812 Elements Of Cryptography 26312.1 Principles of
Cryptography 26412.2 Kerckhoffs’s Principle 26512.3 Polybius’s
Monoalphabetic Cipher 26612.4 Polybius’s Polyalphabetic Cipher 26812.5
The One-Time Pad 26912.6 The Key Distribution Problem 27112.7
Diffie–Hellman–Merkle Keys 27212.8 Public-Key Cryptography 27312.9 RSA
Cryptography 27412.10 SSL: Secure Socket Layer 278A l33t Speak
285B Virus Timeline 289Concluding Remarks 305Answers to Exercises
311Glossary 327Bibliography 343Index
357