|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Gregory B. White (SecureLogix, San Antonio, Texas, USA) , Eric A. Fisch (KPMG LLP, Plano, Texas, USA) , Udo W. Pooch (Texas A & M University, College Station, Texas, USA) , Eric A. Fisch (KPMG LLP, Plano, Texas, USA)Publisher: Taylor & Francis Inc Imprint: CRC Press Inc Volume: 7 Dimensions: Width: 17.10cm , Height: 2.20cm , Length: 24.10cm Weight: 0.730kg ISBN: 9780849371790ISBN 10: 0849371791 Pages: 310 Publication Date: 10 August 1995 Audience: College/higher education , Professional and scholarly , Postgraduate, Research & Scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsComputer Security Fundamentals Objectives of Computer Security Issues Involved in Computer Security Privacy and Ethics Risk Analysis Theory Possible Loss (L) Probability of Loss Occurrence (P) Burden of Preventing Loss (B) Applying the Risk Analysis Equation Risk Analysis in Computer Security Terminology Application Developing Secure Computer Systems External Security Measures Structure of a Computer System Secure Computer System Issues Security Models Specification and Verification Security Models Bell and LaPadula Clark-Wilson Goguen-Meseguer TCSEC Discretionary Access Requirements Mandatory Access Requirements User Authentication Authentication Objectives Authentication Methods Informational Keys Physical Keys Biometric Keys Access and Information Flow Controls File Passwords Capabilities Based Access Control Lists Protection Bits Controls for Mandatory Access Trojan Horses AUDITING and INTRUSION DETECTION Audit Trail Features Intrusion Detection Systems User Profiling Intruder Profiling Signature Analysis Action Based IDES MIDAS Haystack Network Intrusion Detection Network Attack Characteristics NSM DIDS NADIR CSM Monitoring and the Law Damage Control and Assessment Damage Control Inform the Authorities Backup System Data Remove the Intruder Contain and Monitor the Intruder Lock Stolen Accounts Require Additional Authentication Damage Assessment Attack Recovery Damage Prevention Network Security Network Fundamentals Network Security Issues Basic Network Security Objectives and Threats Security Services The Trusted Network Interpretation TNI Security Service AIS Interconnection Issues Distributed Systems Security Firewalls Simple Damage Limiting Approaches Network Firewalls Packet Filtering Gateways Circuit Level Gateways Application Level Gateways Firewall Costs and Effectiveness Database Security Database Management System Primer DBMS Vulnerabilities and Responses Inference Aggregation Data Integrity Trojan Horses Cryptography Substitution Ciphers Caesar Cipher ROT13 Substitution Cipher Variations Vigenere Ciphers One Time Pads Transposition Ciphers Encrypting Digital Communication DES IDEA Key Escrow Public Key Cryptography Digital Signatures Malicious Software Viruses Worms Trojan Horses Time Bombs Security Standards The Federal Criteria The Common Criteria The Trusted Computer System Evaluation Criteria The Information Technology Security Evaluation Criteria Case Study The Hannover Hackers An Evening With Berferd The Internet Worm Appendix: Information WarfareReviewsAuthor InformationGregory B. White (SecureLogix, San Antonio, Texas, USA) (Author) , Eric A. Fisch (KPMG LLP, Plano, Texas, USA) (Author) , Udo W. Pooch (Texas A & M University, College Station, Texas, USA) (Author) Tab Content 6Author Website:Countries AvailableAll regions |