Security in Computing - Lecture Notes, Study Material and Important Questions, Answers
All Topics with neat figure(Diagram) and Explanation. Important Questions and answers. Study Online / Download as PDF format.
Security in Computing - Lecture Notes, Study Material and Important Questions, Answers.
Security in Computing - Lecture Notes, Study Material and Important Questions, Answers
All Topics with neat figure(Diagram) and Explanation. Important Questions and answers. Study Online / Download as PDF format.
Security in Computing - Lecture Notes, Study Material and Important Questions, Answers.
Chapter 1 Is There a Security Problem in Computing 1. What Does "Secure" Mean? - Answer (click here) 2. Protecting Software in Automobile Control Systems - Answer (click here) 3. Attacks - Answer (click here) 4. Why Universities Are Prime Targets - Answer (click here) 5. The Meaning of Computer Security - Answer (click here) 6. Record Record Loss - Answer (click here) 7. Top Methods of Attack - Answer (click here) 8. Computer Criminals - Answer (click here) 9. The Terrorists, Inc., IT Department - Answer (click here) 10. Methods of Defense - Answer (click here)
Chapter 2 Elementary Cryptography
1. What Does "Secure" Mean? - Answer (click here) 2. Protecting Software in Automobile Control Systems - Answer (click here) 3. Attacks - Answer (click here) 4. Why Universities Are Prime Targets - Answer (click here) 5. The Meaning of Computer Security - Answer (click here) 6. Record Record Loss - Answer (click here) 7. Top Methods of Attack - Answer (click here) 8. Computer Criminals - Answer (click here) 9. The Terrorists, Inc., IT Department - Answer (click here) 10. Methods of Defense - Answer (click here) 11. Elementary Cryptography - Answer (click here) 12. Elementary Cryptography - Terminology and Background - Answer (click here) 13. Substitution Ciphers - Answer (click here) 14. Transpositions (Permutations) - Answer (click here) 15. Making "Good" Encryption Algorithms - Answer (click here) 16. The Data Encryption Standard(DES) - Answer (click here) 17. The AES Encryption Algorithm - Answer (click here) 18. Public Key Encryption - Answer (click here) 19. The Uses of Encryption - Answer (click here) Chapter 3 Program Security 1. What Does "Secure" Mean? - Answer (click here) 2. Protecting Software in Automobile Control Systems - Answer (click here) 3. Attacks - Answer (click here) 4. Why Universities Are Prime Targets - Answer (click here) 5. The Meaning of Computer Security - Answer (click here) 6. Record Record Loss - Answer (click here) 7. Top Methods of Attack - Answer (click here) 8. Computer Criminals - Answer (click here) 9. The Terrorists, Inc., IT Department - Answer (click here) 10. Methods of Defense - Answer (click here) 11. Elementary Cryptography - Answer (click here) 12. Elementary Cryptography - Terminology and Background - Answer (click here) 13. Substitution Ciphers - Answer (click here) 14. Transpositions (Permutations) - Answer (click here) 15. Making "Good" Encryption Algorithms - Answer (click here) 16. The Data Encryption Standard(DES) - Answer (click here) 17. The AES Encryption Algorithm - Answer (click here) 18. Public Key Encryption - Answer (click here) 19. The Uses of Encryption - Answer (click here) 20. Program Security - Answer (click here) 21. Secure Programs - Answer (click here) 22. Nonmalicious Program Errors - Answer (click here) 23. Viruses and Other Malicious Code - Answer (click here) 24. Nonmalicious Flaws Cause Failures - Answer (click here) 25. Why Worry About Malicious Code? - Answer (click here) 26. Kinds of Malicious Code - Answer (click here) 27. Rapidly Approaching Zero - Answer (click here) 28. How Viruses Attach - Answer (click here) 29. How Viruses Gain Control - Answer (click here) 30. Homes for Viruses - Answer (click here) 31. Virus Signatures - Answer (click here) 32. The Source of Viruses - Answer (click here) 33. Prevention of Virus Infection - Answer (click here) 34. Truths and Misconceptions About Viruses - Answer (click here) 35. First Example of Malicious Code: The Brain Virus - Answer (click here) 36. Example: The Internet Worm - Answer (click here) 37. More Malicious Code: Code Red - Answer (click here) 38. Malicious Code on the Web: Web Bugs - Answer (click here) 39. Is the Cure Worse Than the Disease? - Answer (click here) 40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click here) 41. Salami Attack - Answer (click here) 42. Rootkits and the Sony XCP - Answer (click here) 43. Privilege Escalation - Answer (click here) 44. Interface Illusions - Answer (click here) 45. Keystroke Logging - Answer (click here) 46. Man-in-the-Middle Attacks - Answer (click here) 47. Timing Attacks - Answer (click here) 48. Covert Channels: Programs That Leak Information - Answer (click here) 49. Controls Against Program Threats - Answer (click here) 50. The Nature of Software Development - Answer (click here) 51. Modularity, Encapsulation, and Information Hiding - Answer (click here) 52. Peer Reviews - Answer (click here) 53. Hazard Analysis - Answer (click here) 54. Testing - Answer (click here) 55. Good Design and Prediction - Answer (click here) 56. Static Analysis - Answer (click here) 57. Configuration Management - Answer (click here) 58. Lessons from Mistakes - Answer (click here) 59. There's More Than One Way to Crack a System - Answer (click here) 60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here) 61. Programming Practice Conclusions - Answer (click here) 62. Standards of Program Development - Answer (click here) 63. Process Standards - Answer (click here) 64. Program Controls in General - Answer (click here)
Chapter 4 Protection in General Purpose Operating Systems
1. What Does "Secure" Mean? - Answer (click here) 2. Protecting Software in Automobile Control Systems - Answer (click here) 3. Attacks - Answer (click here) 4. Why Universities Are Prime Targets - Answer (click here) 5. The Meaning of Computer Security - Answer (click here) 6. Record Record Loss - Answer (click here) 7. Top Methods of Attack - Answer (click here) 8. Computer Criminals - Answer (click here) 9. The Terrorists, Inc., IT Department - Answer (click here) 10. Methods of Defense - Answer (click here) 11. Elementary Cryptography - Answer (click here) 12. Elementary Cryptography - Terminology and Background - Answer (click here) 13. Substitution Ciphers - Answer (click here) 14. Transpositions (Permutations) - Answer (click here) 15. Making "Good" Encryption Algorithms - Answer (click here) 16. The Data Encryption Standard(DES) - Answer (click here) 17. The AES Encryption Algorithm - Answer (click here) 18. Public Key Encryption - Answer (click here) 19. The Uses of Encryption - Answer (click here) 20. Program Security - Answer (click here) 21. Secure Programs - Answer (click here) 22. Nonmalicious Program Errors - Answer (click here) 23. Viruses and Other Malicious Code - Answer (click here) 24. Nonmalicious Flaws Cause Failures - Answer (click here) 25. Why Worry About Malicious Code? - Answer (click here) 26. Kinds of Malicious Code - Answer (click here) 27. Rapidly Approaching Zero - Answer (click here) 28. How Viruses Attach - Answer (click here) 29. How Viruses Gain Control - Answer (click here) 30. Homes for Viruses - Answer (click here) 31. Virus Signatures - Answer (click here) 32. The Source of Viruses - Answer (click here) 33. Prevention of Virus Infection - Answer (click here) 34. Truths and Misconceptions About Viruses - Answer (click here) 35. First Example of Malicious Code: The Brain Virus - Answer (click here) 36. Example: The Internet Worm - Answer (click here) 37. More Malicious Code: Code Red - Answer (click here) 38. Malicious Code on the Web: Web Bugs - Answer (click here) 39. Is the Cure Worse Than the Disease? - Answer (click here) 40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click here) 41. Salami Attack - Answer (click here) 42. Rootkits and the Sony XCP - Answer (click here) 43. Privilege Escalation - Answer (click here) 44. Interface Illusions - Answer (click here) 45. Keystroke Logging - Answer (click here) 46. Man-in-the-Middle Attacks - Answer (click here) 47. Timing Attacks - Answer (click here) 48. Covert Channels: Programs That Leak Information - Answer (click here) 49. Controls Against Program Threats - Answer (click here) 50. The Nature of Software Development - Answer (click here) 51. Modularity, Encapsulation, and Information Hiding - Answer (click here) 52. Peer Reviews - Answer (click here) 53. Hazard Analysis - Answer (click here) 54. Testing - Answer (click here) 55. Good Design and Prediction - Answer (click here) 56. Static Analysis - Answer (click here) 57. Configuration Management - Answer (click here) 58. Lessons from Mistakes - Answer (click here) 59. There's More Than One Way to Crack a System - Answer (click here) 60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here) 61. Programming Practice Conclusions - Answer (click here) 62. Standards of Program Development - Answer (click here) 63. Process Standards - Answer (click here) 64. Program Controls in General - Answer (click here) 65. Protection in General-Purpose Operating Systems - Answer (click here) 66. Protected Objects and Methods of Protection - Answer (click here) 67. Memory and Address Protection - Answer (click here) 68. Control of Access to General Objects - Answer (click here) 69. File Protection Mechanisms - Answer (click here) 70. User Authentication - Answer (click here) 71. Biometrics: Ready for Prime Time? - Answer (click here) 72. Passwords as Authenticators - Answer (click here) 73. Additional Authentication Information - Answer (click here) 74. Attacks on Passwords - Answer (click here) 75. Password Selection Criteria - Answer (click here) 76. The Authentication Process - Answer (click here) 77. Biometrics: Authentication Not Using Passwords - Answer (click here)
Chapter 5 Designing Trusted Operating Systems
1. What Does "Secure" Mean? - Answer (click here) 2. Protecting Software in Automobile Control Systems - Answer (click here) 3. Attacks - Answer (click here) 4. Why Universities Are Prime Targets - Answer (click here) 5. The Meaning of Computer Security - Answer (click here) 6. Record Record Loss - Answer (click here) 7. Top Methods of Attack - Answer (click here) 8. Computer Criminals - Answer (click here) 9. The Terrorists, Inc., IT Department - Answer (click here) 10. Methods of Defense - Answer (click here) 11. Elementary Cryptography - Answer (click here) 12. Elementary Cryptography - Terminology and Background - Answer (click here) 13. Substitution Ciphers - Answer (click here) 14. Transpositions (Permutations) - Answer (click here) 15. Making "Good" Encryption Algorithms - Answer (click here) 16. The Data Encryption Standard(DES) - Answer (click here) 17. The AES Encryption Algorithm - Answer (click here) 18. Public Key Encryption - Answer (click here) 19. The Uses of Encryption - Answer (click here) 20. Program Security - Answer (click here) 21. Secure Programs - Answer (click here) 22. Nonmalicious Program Errors - Answer (click here) 23. Viruses and Other Malicious Code - Answer (click here) 24. Nonmalicious Flaws Cause Failures - Answer (click here) 25. Why Worry About Malicious Code? - Answer (click here) 26. Kinds of Malicious Code - Answer (click here) 27. Rapidly Approaching Zero - Answer (click here) 28. How Viruses Attach - Answer (click here) 29. How Viruses Gain Control - Answer (click here) 30. Homes for Viruses - Answer (click here) 31. Virus Signatures - Answer (click here) 32. The Source of Viruses - Answer (click here) 33. Prevention of Virus Infection - Answer (click here) 34. Truths and Misconceptions About Viruses - Answer (click here) 35. First Example of Malicious Code: The Brain Virus - Answer (click here) 36. Example: The Internet Worm - Answer (click here) 37. More Malicious Code: Code Red - Answer (click here) 38. Malicious Code on the Web: Web Bugs - Answer (click here) 39. Is the Cure Worse Than the Disease? - Answer (click here) 40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click here) 41. Salami Attack - Answer (click here) 42. Rootkits and the Sony XCP - Answer (click here) 43. Privilege Escalation - Answer (click here) 44. Interface Illusions - Answer (click here) 45. Keystroke Logging - Answer (click here) 46. Man-in-the-Middle Attacks - Answer (click here) 47. Timing Attacks - Answer (click here) 48. Covert Channels: Programs That Leak Information - Answer (click here) 49. Controls Against Program Threats - Answer (click here) 50. The Nature of Software Development - Answer (click here) 51. Modularity, Encapsulation, and Information Hiding - Answer (click here) 52. Peer Reviews - Answer (click here) 53. Hazard Analysis - Answer (click here) 54. Testing - Answer (click here) 55. Good Design and Prediction - Answer (click here) 56. Static Analysis - Answer (click here) 57. Configuration Management - Answer (click here) 58. Lessons from Mistakes - Answer (click here) 59. There's More Than One Way to Crack a System - Answer (click here) 60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here) 61. Programming Practice Conclusions - Answer (click here) 62. Standards of Program Development - Answer (click here) 63. Process Standards - Answer (click here) 64. Program Controls in General - Answer (click here) 65. Protection in General-Purpose Operating Systems - Answer (click here) 66. Protected Objects and Methods of Protection - Answer (click here) 67. Memory and Address Protection - Answer (click here) 68. Control of Access to General Objects - Answer (click here) 69. File Protection Mechanisms - Answer (click here) 70. User Authentication - Answer (click here) 71. Biometrics: Ready for Prime Time? - Answer (click here) 72. Passwords as Authenticators - Answer (click here) 73. Additional Authentication Information - Answer (click here) 74. Attacks on Passwords - Answer (click here) 75. Password Selection Criteria - Answer (click here) 76. The Authentication Process - Answer (click here) 77. Biometrics: Authentication Not Using Passwords - Answer (click here) 78. Designing Trusted Operating Systems - Answer (click here) 79. What Is a Trusted System? - Answer (click here) 80. Security Policies - Answer (click here) 81. Models of Security - Answer (click here) 82. Trusted Operating System Design - Answer (click here) 83. The Importance of Good Design Principles - Answer (click here) 84. Trusted System Design Elements - Answer (click here) 85. Security Features of Ordinary Operating Systems - Answer (click here) 86. Security Features of Trusted Operating Systems - Answer (click here) 87. Kernelized Design - Answer (click here) 88. Separation/Isolation - Answer (click here) 89. Virtualization - Answer (click here) 90. Layered Design - Answer (click here) 91. Assurance in Trusted Operating Systems - Answer (click here) 92. Typical Operating System Flaws - Answer (click here) 93. Assurance Methods - Answer (click here) 94. Open Source - Answer (click here) 95. Evaluation - Answer (click here) 96. Security as an Add-On - Answer (click here)
Chapter 6 Database and Data Mining Security
1. What Does "Secure" Mean? - Answer (click here) 2. Protecting Software in Automobile Control Systems - Answer (click here) 3. Attacks - Answer (click here) 4. Why Universities Are Prime Targets - Answer (click here) 5. The Meaning of Computer Security - Answer (click here) 6. Record Record Loss - Answer (click here) 7. Top Methods of Attack - Answer (click here) 8. Computer Criminals - Answer (click here) 9. The Terrorists, Inc., IT Department - Answer (click here) 10. Methods of Defense - Answer (click here) 11. Elementary Cryptography - Answer (click here) 12. Elementary Cryptography - Terminology and Background - Answer (click here) 13. Substitution Ciphers - Answer (click here) 14. Transpositions (Permutations) - Answer (click here) 15. Making "Good" Encryption Algorithms - Answer (click here) 16. The Data Encryption Standard(DES) - Answer (click here) 17. The AES Encryption Algorithm - Answer (click here) 18. Public Key Encryption - Answer (click here) 19. The Uses of Encryption - Answer (click here) 20. Program Security - Answer (click here) 21. Secure Programs - Answer (click here) 22. Nonmalicious Program Errors - Answer (click here) 23. Viruses and Other Malicious Code - Answer (click here) 24. Nonmalicious Flaws Cause Failures - Answer (click here) 25. Why Worry About Malicious Code? - Answer (click here) 26. Kinds of Malicious Code - Answer (click here) 27. Rapidly Approaching Zero - Answer (click here) 28. How Viruses Attach - Answer (click here) 29. How Viruses Gain Control - Answer (click here) 30. Homes for Viruses - Answer (click here) 31. Virus Signatures - Answer (click here) 32. The Source of Viruses - Answer (click here) 33. Prevention of Virus Infection - Answer (click here) 34. Truths and Misconceptions About Viruses - Answer (click here) 35. First Example of Malicious Code: The Brain Virus - Answer (click here) 36. Example: The Internet Worm - Answer (click here) 37. More Malicious Code: Code Red - Answer (click here) 38. Malicious Code on the Web: Web Bugs - Answer (click here) 39. Is the Cure Worse Than the Disease? - Answer (click here) 40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click here) 41. Salami Attack - Answer (click here) 42. Rootkits and the Sony XCP - Answer (click here) 43. Privilege Escalation - Answer (click here) 44. Interface Illusions - Answer (click here) 45. Keystroke Logging - Answer (click here) 46. Man-in-the-Middle Attacks - Answer (click here) 47. Timing Attacks - Answer (click here) 48. Covert Channels: Programs That Leak Information - Answer (click here) 49. Controls Against Program Threats - Answer (click here) 50. The Nature of Software Development - Answer (click here) 51. Modularity, Encapsulation, and Information Hiding - Answer (click here) 52. Peer Reviews - Answer (click here) 53. Hazard Analysis - Answer (click here) 54. Testing - Answer (click here) 55. Good Design and Prediction - Answer (click here) 56. Static Analysis - Answer (click here) 57. Configuration Management - Answer (click here) 58. Lessons from Mistakes - Answer (click here) 59. There's More Than One Way to Crack a System - Answer (click here) 60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here) 61. Programming Practice Conclusions - Answer (click here) 62. Standards of Program Development - Answer (click here) 63. Process Standards - Answer (click here) 64. Program Controls in General - Answer (click here) 65. Protection in General-Purpose Operating Systems - Answer (click here) 66. Protected Objects and Methods of Protection - Answer (click here) 67. Memory and Address Protection - Answer (click here) 68. Control of Access to General Objects - Answer (click here) 69. File Protection Mechanisms - Answer (click here) 70. User Authentication - Answer (click here) 71. Biometrics: Ready for Prime Time? - Answer (click here) 72. Passwords as Authenticators - Answer (click here) 73. Additional Authentication Information - Answer (click here) 74. Attacks on Passwords - Answer (click here) 75. Password Selection Criteria - Answer (click here) 76. The Authentication Process - Answer (click here) 77. Biometrics: Authentication Not Using Passwords - Answer (click here) 78. Designing Trusted Operating Systems - Answer (click here) 79. What Is a Trusted System? - Answer (click here) 80. Security Policies - Answer (click here) 81. Models of Security - Answer (click here) 82. Trusted Operating System Design - Answer (click here) 83. The Importance of Good Design Principles - Answer (click here) 84. Trusted System Design Elements - Answer (click here) 85. Security Features of Ordinary Operating Systems - Answer (click here) 86. Security Features of Trusted Operating Systems - Answer (click here) 87. Kernelized Design - Answer (click here) 88. Separation/Isolation - Answer (click here) 89. Virtualization - Answer (click here) 90. Layered Design - Answer (click here) 91. Assurance in Trusted Operating Systems - Answer (click here) 92. Typical Operating System Flaws - Answer (click here) 93. Assurance Methods - Answer (click here) 94. Open Source - Answer (click here) 95. Evaluation - Answer (click here) 96. Security as an Add-On - Answer (click here) 97. Database and Data Mining Security - Answer (click here) 98. Introduction to Databases - Answer (click here) 99. Security Requirements - Answer (click here) 100. Reliability and Integrity - Answer (click here) 101. Sensitive Data - Answer (click here) 102. Inference - Answer (click here) 103. Multilevel Databases - Answer (click here) 104. Proposals for Multilevel Security - Answer (click here) 105. Data Mining - Answer (click here)
Chapter 7 Security in Networks
1. What Does "Secure" Mean? - Answer (click here) 2. Protecting Software in Automobile Control Systems - Answer (click here) 3. Attacks - Answer (click here) 4. Why Universities Are Prime Targets - Answer (click here) 5. The Meaning of Computer Security - Answer (click here) 6. Record Record Loss - Answer (click here) 7. Top Methods of Attack - Answer (click here) 8. Computer Criminals - Answer (click here) 9. The Terrorists, Inc., IT Department - Answer (click here) 10. Methods of Defense - Answer (click here) 11. Elementary Cryptography - Answer (click here) 12. Elementary Cryptography - Terminology and Background - Answer (click here) 13. Substitution Ciphers - Answer (click here) 14. Transpositions (Permutations) - Answer (click here) 15. Making "Good" Encryption Algorithms - Answer (click here) 16. The Data Encryption Standard(DES) - Answer (click here) 17. The AES Encryption Algorithm - Answer (click here) 18. Public Key Encryption - Answer (click here) 19. The Uses of Encryption - Answer (click here) 20. Program Security - Answer (click here) 21. Secure Programs - Answer (click here) 22. Nonmalicious Program Errors - Answer (click here) 23. Viruses and Other Malicious Code - Answer (click here) 24. Nonmalicious Flaws Cause Failures - Answer (click here) 25. Why Worry About Malicious Code? - Answer (click here) 26. Kinds of Malicious Code - Answer (click here) 27. Rapidly Approaching Zero - Answer (click here) 28. How Viruses Attach - Answer (click here) 29. How Viruses Gain Control - Answer (click here) 30. Homes for Viruses - Answer (click here) 31. Virus Signatures - Answer (click here) 32. The Source of Viruses - Answer (click here) 33. Prevention of Virus Infection - Answer (click here) 34. Truths and Misconceptions About Viruses - Answer (click here) 35. First Example of Malicious Code: The Brain Virus - Answer (click here) 36. Example: The Internet Worm - Answer (click here) 37. More Malicious Code: Code Red - Answer (click here) 38. Malicious Code on the Web: Web Bugs - Answer (click here) 39. Is the Cure Worse Than the Disease? - Answer (click here) 40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click here) 41. Salami Attack - Answer (click here) 42. Rootkits and the Sony XCP - Answer (click here) 43. Privilege Escalation - Answer (click here) 44. Interface Illusions - Answer (click here) 45. Keystroke Logging - Answer (click here) 46. Man-in-the-Middle Attacks - Answer (click here) 47. Timing Attacks - Answer (click here) 48. Covert Channels: Programs That Leak Information - Answer (click here) 49. Controls Against Program Threats - Answer (click here) 50. The Nature of Software Development - Answer (click here) 51. Modularity, Encapsulation, and Information Hiding - Answer (click here) 52. Peer Reviews - Answer (click here) 53. Hazard Analysis - Answer (click here) 54. Testing - Answer (click here) 55. Good Design and Prediction - Answer (click here) 56. Static Analysis - Answer (click here) 57. Configuration Management - Answer (click here) 58. Lessons from Mistakes - Answer (click here) 59. There's More Than One Way to Crack a System - Answer (click here) 60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here) 61. Programming Practice Conclusions - Answer (click here) 62. Standards of Program Development - Answer (click here) 63. Process Standards - Answer (click here) 64. Program Controls in General - Answer (click here) 65. Protection in General-Purpose Operating Systems - Answer (click here) 66. Protected Objects and Methods of Protection - Answer (click here) 67. Memory and Address Protection - Answer (click here) 68. Control of Access to General Objects - Answer (click here) 69. File Protection Mechanisms - Answer (click here) 70. User Authentication - Answer (click here) 71. Biometrics: Ready for Prime Time? - Answer (click here) 72. Passwords as Authenticators - Answer (click here) 73. Additional Authentication Information - Answer (click here) 74. Attacks on Passwords - Answer (click here) 75. Password Selection Criteria - Answer (click here) 76. The Authentication Process - Answer (click here) 77. Biometrics: Authentication Not Using Passwords - Answer (click here) 78. Designing Trusted Operating Systems - Answer (click here) 79. What Is a Trusted System? - Answer (click here) 80. Security Policies - Answer (click here) 81. Models of Security - Answer (click here) 82. Trusted Operating System Design - Answer (click here) 83. The Importance of Good Design Principles - Answer (click here) 84. Trusted System Design Elements - Answer (click here) 85. Security Features of Ordinary Operating Systems - Answer (click here) 86. Security Features of Trusted Operating Systems - Answer (click here) 87. Kernelized Design - Answer (click here) 88. Separation/Isolation - Answer (click here) 89. Virtualization - Answer (click here) 90. Layered Design - Answer (click here) 91. Assurance in Trusted Operating Systems - Answer (click here) 92. Typical Operating System Flaws - Answer (click here) 93. Assurance Methods - Answer (click here) 94. Open Source - Answer (click here) 95. Evaluation - Answer (click here) 96. Security as an Add-On - Answer (click here) 97. Database and Data Mining Security - Answer (click here) 98. Introduction to Databases - Answer (click here) 99. Security Requirements - Answer (click here) 100. Reliability and Integrity - Answer (click here) 101. Sensitive Data - Answer (click here) 102. Inference - Answer (click here) 103. Multilevel Databases - Answer (click here) 104. Proposals for Multilevel Security - Answer (click here) 105. Data Mining - Answer (click here) 106. Security in Networks - Answer (click here) 107. Network Concepts - Answer (click here) 108. Network Media - Answer (click here) 109. Network Protocols - Answer (click here) 110. Types of Networks - Answer (click here) 111. Threats in Networks - Answer (click here) 112. Who Attacks Networks? - Answer (click here) 113. Threats in Transit: Eavesdropping and Wiretapping - Answer (click here) 114. Protocol Flaws - Answer (click here) 115. Impersonation - Answer (click here) 116. Message Confidentiality Threats - Answer (click here) 117. Message Integrity Threats - Answer (click here) 118. Format Failures - Answer (click here) 119. Web Site Vulnerabilities - Answer (click here) 120. Denial of Service - Answer (click here) 121. Distributed Denial of Service - Answer (click here) 122. Threats in Active or Mobile Code - Answer (click here) 123. Threats in Active or Mobile Code - Answer (click here) 124. Networks Complex Attacks - Answer (click here) 125. Network Security Controls - Security Threat Analysis - Answer (click here) 126. Architecture - Security in Networks - Answer (click here) 127. Encryption - Security in Networks - Answer (click here) 128. Content Integrity - Security in Networks - Answer (click here) 129. Strong Authentication and Kerberos - Security in Networks - Answer (click here) 130. Access Controls - Security in Networks - Answer (click here) 131. Wireless Networks Security - Answer (click here) 132. Honeypots, Alarms and Alerts - Security in Networks - Answer (click here) 133. Traffic Flow Security - Answer (click here) 134. Firewalls - Answer (click here) 135. Types of Firewalls - Answer (click here) 136. Example Firewall Configurations - Answer (click here) 137. Intrusion Detection Systems - Answer (click here) 138. Types of IDSs(Intrusion Detection Systems) - Answer (click here) 139. Goals for Intrusion Detection Systems - Answer (click here) 140. Intrusion Detection Systems(IDS) Strengths and Limitations - Answer (click here) 141. Secure E-Mail - Answer (click here)
Chapter 8 Administering Security
1. What Does "Secure" Mean? - Answer (click here) 2. Protecting Software in Automobile Control Systems - Answer (click here) 3. Attacks - Answer (click here) 4. Why Universities Are Prime Targets - Answer (click here) 5. The Meaning of Computer Security - Answer (click here) 6. Record Record Loss - Answer (click here) 7. Top Methods of Attack - Answer (click here) 8. Computer Criminals - Answer (click here) 9. The Terrorists, Inc., IT Department - Answer (click here) 10. Methods of Defense - Answer (click here) 11. Elementary Cryptography - Answer (click here) 12. Elementary Cryptography - Terminology and Background - Answer (click here) 13. Substitution Ciphers - Answer (click here) 14. Transpositions (Permutations) - Answer (click here) 15. Making "Good" Encryption Algorithms - Answer (click here) 16. The Data Encryption Standard(DES) - Answer (click here) 17. The AES Encryption Algorithm - Answer (click here) 18. Public Key Encryption - Answer (click here) 19. The Uses of Encryption - Answer (click here) 20. Program Security - Answer (click here) 21. Secure Programs - Answer (click here) 22. Nonmalicious Program Errors - Answer (click here) 23. Viruses and Other Malicious Code - Answer (click here) 24. Nonmalicious Flaws Cause Failures - Answer (click here) 25. Why Worry About Malicious Code? - Answer (click here) 26. Kinds of Malicious Code - Answer (click here) 27. Rapidly Approaching Zero - Answer (click here) 28. How Viruses Attach - Answer (click here) 29. How Viruses Gain Control - Answer (click here) 30. Homes for Viruses - Answer (click here) 31. Virus Signatures - Answer (click here) 32. The Source of Viruses - Answer (click here) 33. Prevention of Virus Infection - Answer (click here) 34. Truths and Misconceptions About Viruses - Answer (click here) 35. First Example of Malicious Code: The Brain Virus - Answer (click here) 36. Example: The Internet Worm - Answer (click here) 37. More Malicious Code: Code Red - Answer (click here) 38. Malicious Code on the Web: Web Bugs - Answer (click here) 39. Is the Cure Worse Than the Disease? - Answer (click here) 40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click here) 41. Salami Attack - Answer (click here) 42. Rootkits and the Sony XCP - Answer (click here) 43. Privilege Escalation - Answer (click here) 44. Interface Illusions - Answer (click here) 45. Keystroke Logging - Answer (click here) 46. Man-in-the-Middle Attacks - Answer (click here) 47. Timing Attacks - Answer (click here) 48. Covert Channels: Programs That Leak Information - Answer (click here) 49. Controls Against Program Threats - Answer (click here) 50. The Nature of Software Development - Answer (click here) 51. Modularity, Encapsulation, and Information Hiding - Answer (click here) 52. Peer Reviews - Answer (click here) 53. Hazard Analysis - Answer (click here) 54. Testing - Answer (click here) 55. Good Design and Prediction - Answer (click here) 56. Static Analysis - Answer (click here) 57. Configuration Management - Answer (click here) 58. Lessons from Mistakes - Answer (click here) 59. There's More Than One Way to Crack a System - Answer (click here) 60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here) 61. Programming Practice Conclusions - Answer (click here) 62. Standards of Program Development - Answer (click here) 63. Process Standards - Answer (click here) 64. Program Controls in General - Answer (click here) 65. Protection in General-Purpose Operating Systems - Answer (click here) 66. Protected Objects and Methods of Protection - Answer (click here) 67. Memory and Address Protection - Answer (click here) 68. Control of Access to General Objects - Answer (click here) 69. File Protection Mechanisms - Answer (click here) 70. User Authentication - Answer (click here) 71. Biometrics: Ready for Prime Time? - Answer (click here) 72. Passwords as Authenticators - Answer (click here) 73. Additional Authentication Information - Answer (click here) 74. Attacks on Passwords - Answer (click here) 75. Password Selection Criteria - Answer (click here) 76. The Authentication Process - Answer (click here) 77. Biometrics: Authentication Not Using Passwords - Answer (click here) 78. Designing Trusted Operating Systems - Answer (click here) 79. What Is a Trusted System? - Answer (click here) 80. Security Policies - Answer (click here) 81. Models of Security - Answer (click here) 82. Trusted Operating System Design - Answer (click here) 83. The Importance of Good Design Principles - Answer (click here) 84. Trusted System Design Elements - Answer (click here) 85. Security Features of Ordinary Operating Systems - Answer (click here) 86. Security Features of Trusted Operating Systems - Answer (click here) 87. Kernelized Design - Answer (click here) 88. Separation/Isolation - Answer (click here) 89. Virtualization - Answer (click here) 90. Layered Design - Answer (click here) 91. Assurance in Trusted Operating Systems - Answer (click here) 92. Typical Operating System Flaws - Answer (click here) 93. Assurance Methods - Answer (click here) 94. Open Source - Answer (click here) 95. Evaluation - Answer (click here) 96. Security as an Add-On - Answer (click here) 97. Database and Data Mining Security - Answer (click here) 98. Introduction to Databases - Answer (click here) 99. Security Requirements - Answer (click here) 100. Reliability and Integrity - Answer (click here) 101. Sensitive Data - Answer (click here) 102. Inference - Answer (click here) 103. Multilevel Databases - Answer (click here) 104. Proposals for Multilevel Security - Answer (click here) 105. Data Mining - Answer (click here) 106. Security in Networks - Answer (click here) 107. Network Concepts - Answer (click here) 108. Network Media - Answer (click here) 109. Network Protocols - Answer (click here) 110. Types of Networks - Answer (click here) 111. Threats in Networks - Answer (click here) 112. Who Attacks Networks? - Answer (click here) 113. Threats in Transit: Eavesdropping and Wiretapping - Answer (click here) 114. Protocol Flaws - Answer (click here) 115. Impersonation - Answer (click here) 116. Message Confidentiality Threats - Answer (click here) 117. Message Integrity Threats - Answer (click here) 118. Format Failures - Answer (click here) 119. Web Site Vulnerabilities - Answer (click here) 120. Denial of Service - Answer (click here) 121. Distributed Denial of Service - Answer (click here) 122. Threats in Active or Mobile Code - Answer (click here) 123. Threats in Active or Mobile Code - Answer (click here) 124. Networks Complex Attacks - Answer (click here) 125. Network Security Controls - Security Threat Analysis - Answer (click here) 126. Architecture - Security in Networks - Answer (click here) 127. Encryption - Security in Networks - Answer (click here) 128. Content Integrity - Security in Networks - Answer (click here) 129. Strong Authentication and Kerberos - Security in Networks - Answer (click here) 130. Access Controls - Security in Networks - Answer (click here) 131. Wireless Networks Security - Answer (click here) 132. Honeypots, Alarms and Alerts - Security in Networks - Answer (click here) 133. Traffic Flow Security - Answer (click here) 134. Firewalls - Answer (click here) 135. Types of Firewalls - Answer (click here) 136. Example Firewall Configurations - Answer (click here) 137. Intrusion Detection Systems - Answer (click here) 138. Types of IDSs(Intrusion Detection Systems) - Answer (click here) 139. Goals for Intrusion Detection Systems - Answer (click here) 140. Intrusion Detection Systems(IDS) Strengths and Limitations - Answer (click here) 141. Secure E-Mail - Answer (click here) 142. Administering Security - Answer (click here) 143. Security Planning - Answer (click here) 144. Contents of a Security Plan - Answer (click here) 145. Security Planning Team Members - Answer (click here) 146. Assuring Commitment to a Security Plan - Answer (click here) 147. Business Continuity Plans - Answer (click here) 148. Incident Response Plans - Answer (click here) 149. Risk Analysis - Answer (click here) 150. The Nature of Risk - Answer (click here) 151. Steps of a Risk Analysis - Answer (click here) 152. Arguments For and Against Risk Analysis - Answer (click here) 153. Organizational Security Policies - Answer (click here) 154. Characteristics of a Good Security Policy - Answer (click here) 155. Policy Issue Example: Government E-mail - Answer (click here) 156. Physical Security - Answer (click here) 157. Interception of Sensitive Information - Answer (click here) 158. Contingency Planning - Answer (click here) 159. Physical Security Recap - Answer (click here)
Chapter 9 The Economics of Cybersecurity
1. What Does "Secure" Mean? - Answer (click here) 2. Protecting Software in Automobile Control Systems - Answer (click here) 3. Attacks - Answer (click here) 4. Why Universities Are Prime Targets - Answer (click here) 5. The Meaning of Computer Security - Answer (click here) 6. Record Record Loss - Answer (click here) 7. Top Methods of Attack - Answer (click here) 8. Computer Criminals - Answer (click here) 9. The Terrorists, Inc., IT Department - Answer (click here) 10. Methods of Defense - Answer (click here) 11. Elementary Cryptography - Answer (click here) 12. Elementary Cryptography - Terminology and Background - Answer (click here) 13. Substitution Ciphers - Answer (click here) 14. Transpositions (Permutations) - Answer (click here) 15. Making "Good" Encryption Algorithms - Answer (click here) 16. The Data Encryption Standard(DES) - Answer (click here) 17. The AES Encryption Algorithm - Answer (click here) 18. Public Key Encryption - Answer (click here) 19. The Uses of Encryption - Answer (click here) 20. Program Security - Answer (click here) 21. Secure Programs - Answer (click here) 22. Nonmalicious Program Errors - Answer (click here) 23. Viruses and Other Malicious Code - Answer (click here) 24. Nonmalicious Flaws Cause Failures - Answer (click here) 25. Why Worry About Malicious Code? - Answer (click here) 26. Kinds of Malicious Code - Answer (click here) 27. Rapidly Approaching Zero - Answer (click here) 28. How Viruses Attach - Answer (click here) 29. How Viruses Gain Control - Answer (click here) 30. Homes for Viruses - Answer (click here) 31. Virus Signatures - Answer (click here) 32. The Source of Viruses - Answer (click here) 33. Prevention of Virus Infection - Answer (click here) 34. Truths and Misconceptions About Viruses - Answer (click here) 35. First Example of Malicious Code: The Brain Virus - Answer (click here) 36. Example: The Internet Worm - Answer (click here) 37. More Malicious Code: Code Red - Answer (click here) 38. Malicious Code on the Web: Web Bugs - Answer (click here) 39. Is the Cure Worse Than the Disease? - Answer (click here) 40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click here) 41. Salami Attack - Answer (click here) 42. Rootkits and the Sony XCP - Answer (click here) 43. Privilege Escalation - Answer (click here) 44. Interface Illusions - Answer (click here) 45. Keystroke Logging - Answer (click here) 46. Man-in-the-Middle Attacks - Answer (click here) 47. Timing Attacks - Answer (click here) 48. Covert Channels: Programs That Leak Information - Answer (click here) 49. Controls Against Program Threats - Answer (click here) 50. The Nature of Software Development - Answer (click here) 51. Modularity, Encapsulation, and Information Hiding - Answer (click here) 52. Peer Reviews - Answer (click here) 53. Hazard Analysis - Answer (click here) 54. Testing - Answer (click here) 55. Good Design and Prediction - Answer (click here) 56. Static Analysis - Answer (click here) 57. Configuration Management - Answer (click here) 58. Lessons from Mistakes - Answer (click here) 59. There's More Than One Way to Crack a System - Answer (click here) 60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here) 61. Programming Practice Conclusions - Answer (click here) 62. Standards of Program Development - Answer (click here) 63. Process Standards - Answer (click here) 64. Program Controls in General - Answer (click here) 65. Protection in General-Purpose Operating Systems - Answer (click here) 66. Protected Objects and Methods of Protection - Answer (click here) 67. Memory and Address Protection - Answer (click here) 68. Control of Access to General Objects - Answer (click here) 69. File Protection Mechanisms - Answer (click here) 70. User Authentication - Answer (click here) 71. Biometrics: Ready for Prime Time? - Answer (click here) 72. Passwords as Authenticators - Answer (click here) 73. Additional Authentication Information - Answer (click here) 74. Attacks on Passwords - Answer (click here) 75. Password Selection Criteria - Answer (click here) 76. The Authentication Process - Answer (click here) 77. Biometrics: Authentication Not Using Passwords - Answer (click here) 78. Designing Trusted Operating Systems - Answer (click here) 79. What Is a Trusted System? - Answer (click here) 80. Security Policies - Answer (click here) 81. Models of Security - Answer (click here) 82. Trusted Operating System Design - Answer (click here) 83. The Importance of Good Design Principles - Answer (click here) 84. Trusted System Design Elements - Answer (click here) 85. Security Features of Ordinary Operating Systems - Answer (click here) 86. Security Features of Trusted Operating Systems - Answer (click here) 87. Kernelized Design - Answer (click here) 88. Separation/Isolation - Answer (click here) 89. Virtualization - Answer (click here) 90. Layered Design - Answer (click here) 91. Assurance in Trusted Operating Systems - Answer (click here) 92. Typical Operating System Flaws - Answer (click here) 93. Assurance Methods - Answer (click here) 94. Open Source - Answer (click here) 95. Evaluation - Answer (click here) 96. Security as an Add-On - Answer (click here) 97. Database and Data Mining Security - Answer (click here) 98. Introduction to Databases - Answer (click here) 99. Security Requirements - Answer (click here) 100. Reliability and Integrity - Answer (click here) 101. Sensitive Data - Answer (click here) 102. Inference - Answer (click here) 103. Multilevel Databases - Answer (click here) 104. Proposals for Multilevel Security - Answer (click here) 105. Data Mining - Answer (click here) 106. Security in Networks - Answer (click here) 107. Network Concepts - Answer (click here) 108. Network Media - Answer (click here) 109. Network Protocols - Answer (click here) 110. Types of Networks - Answer (click here) 111. Threats in Networks - Answer (click here) 112. Who Attacks Networks? - Answer (click here) 113. Threats in Transit: Eavesdropping and Wiretapping - Answer (click here) 114. Protocol Flaws - Answer (click here) 115. Impersonation - Answer (click here) 116. Message Confidentiality Threats - Answer (click here) 117. Message Integrity Threats - Answer (click here) 118. Format Failures - Answer (click here) 119. Web Site Vulnerabilities - Answer (click here) 120. Denial of Service - Answer (click here) 121. Distributed Denial of Service - Answer (click here) 122. Threats in Active or Mobile Code - Answer (click here) 123. Threats in Active or Mobile Code - Answer (click here) 124. Networks Complex Attacks - Answer (click here) 125. Network Security Controls - Security Threat Analysis - Answer (click here) 126. Architecture - Security in Networks - Answer (click here) 127. Encryption - Security in Networks - Answer (click here) 128. Content Integrity - Security in Networks - Answer (click here) 129. Strong Authentication and Kerberos - Security in Networks - Answer (click here) 130. Access Controls - Security in Networks - Answer (click here) 131. Wireless Networks Security - Answer (click here) 132. Honeypots, Alarms and Alerts - Security in Networks - Answer (click here) 133. Traffic Flow Security - Answer (click here) 134. Firewalls - Answer (click here) 135. Types of Firewalls - Answer (click here) 136. Example Firewall Configurations - Answer (click here) 137. Intrusion Detection Systems - Answer (click here) 138. Types of IDSs(Intrusion Detection Systems) - Answer (click here) 139. Goals for Intrusion Detection Systems - Answer (click here) 140. Intrusion Detection Systems(IDS) Strengths and Limitations - Answer (click here) 141. Secure E-Mail - Answer (click here) 142. Administering Security - Answer (click here) 143. Security Planning - Answer (click here) 144. Contents of a Security Plan - Answer (click here) 145. Security Planning Team Members - Answer (click here) 146. Assuring Commitment to a Security Plan - Answer (click here) 147. Business Continuity Plans - Answer (click here) 148. Incident Response Plans - Answer (click here) 149. Risk Analysis - Answer (click here) 150. The Nature of Risk - Answer (click here) 151. Steps of a Risk Analysis - Answer (click here) 152. Arguments For and Against Risk Analysis - Answer (click here) 153. Organizational Security Policies - Answer (click here) 154. Characteristics of a Good Security Policy - Answer (click here) 155. Policy Issue Example: Government E-mail - Answer (click here) 156. Physical Security - Answer (click here) 157. Interception of Sensitive Information - Answer (click here) 158. Contingency Planning - Answer (click here) 159. Physical Security Recap - Answer (click here) 160. The Economics of Cybersecurity - Answer (click here) 161. Making a Business Case - Answer (click here) 162. Quantifying Security - Answer (click here) 163. The Economic Impact of Cybersecurity - Answer (click here) 164. Data to Justify Security Action - Answer (click here) 165. A Summary of Recent Security Surveys - Answer (click here) 166. Are the Data Representative? - Answer (click here) 167. Sources of Attack and Financial Impact - Answer (click here) 168. Modeling Cybersecurity - Answer (click here) 169. Current Research and Future Directions - Answer (click here)
Chapter 10 Privacy in Computing
1. What Does "Secure" Mean? - Answer (click here) 2. Protecting Software in Automobile Control Systems - Answer (click here) 3. Attacks - Answer (click here) 4. Why Universities Are Prime Targets - Answer (click here) 5. The Meaning of Computer Security - Answer (click here) 6. Record Record Loss - Answer (click here) 7. Top Methods of Attack - Answer (click here) 8. Computer Criminals - Answer (click here) 9. The Terrorists, Inc., IT Department - Answer (click here) 10. Methods of Defense - Answer (click here) 11. Elementary Cryptography - Answer (click here) 12. Elementary Cryptography - Terminology and Background - Answer (click here) 13. Substitution Ciphers - Answer (click here) 14. Transpositions (Permutations) - Answer (click here) 15. Making "Good" Encryption Algorithms - Answer (click here) 16. The Data Encryption Standard(DES) - Answer (click here) 17. The AES Encryption Algorithm - Answer (click here) 18. Public Key Encryption - Answer (click here) 19. The Uses of Encryption - Answer (click here) 20. Program Security - Answer (click here) 21. Secure Programs - Answer (click here) 22. Nonmalicious Program Errors - Answer (click here) 23. Viruses and Other Malicious Code - Answer (click here) 24. Nonmalicious Flaws Cause Failures - Answer (click here) 25. Why Worry About Malicious Code? - Answer (click here) 26. Kinds of Malicious Code - Answer (click here) 27. Rapidly Approaching Zero - Answer (click here) 28. How Viruses Attach - Answer (click here) 29. How Viruses Gain Control - Answer (click here) 30. Homes for Viruses - Answer (click here) 31. Virus Signatures - Answer (click here) 32. The Source of Viruses - Answer (click here) 33. Prevention of Virus Infection - Answer (click here) 34. Truths and Misconceptions About Viruses - Answer (click here) 35. First Example of Malicious Code: The Brain Virus - Answer (click here) 36. Example: The Internet Worm - Answer (click here) 37. More Malicious Code: Code Red - Answer (click here) 38. Malicious Code on the Web: Web Bugs - Answer (click here) 39. Is the Cure Worse Than the Disease? - Answer (click here) 40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click here) 41. Salami Attack - Answer (click here) 42. Rootkits and the Sony XCP - Answer (click here) 43. Privilege Escalation - Answer (click here) 44. Interface Illusions - Answer (click here) 45. Keystroke Logging - Answer (click here) 46. Man-in-the-Middle Attacks - Answer (click here) 47. Timing Attacks - Answer (click here) 48. Covert Channels: Programs That Leak Information - Answer (click here) 49. Controls Against Program Threats - Answer (click here) 50. The Nature of Software Development - Answer (click here) 51. Modularity, Encapsulation, and Information Hiding - Answer (click here) 52. Peer Reviews - Answer (click here) 53. Hazard Analysis - Answer (click here) 54. Testing - Answer (click here) 55. Good Design and Prediction - Answer (click here) 56. Static Analysis - Answer (click here) 57. Configuration Management - Answer (click here) 58. Lessons from Mistakes - Answer (click here) 59. There's More Than One Way to Crack a System - Answer (click here) 60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here) 61. Programming Practice Conclusions - Answer (click here) 62. Standards of Program Development - Answer (click here) 63. Process Standards - Answer (click here) 64. Program Controls in General - Answer (click here) 65. Protection in General-Purpose Operating Systems - Answer (click here) 66. Protected Objects and Methods of Protection - Answer (click here) 67. Memory and Address Protection - Answer (click here) 68. Control of Access to General Objects - Answer (click here) 69. File Protection Mechanisms - Answer (click here) 70. User Authentication - Answer (click here) 71. Biometrics: Ready for Prime Time? - Answer (click here) 72. Passwords as Authenticators - Answer (click here) 73. Additional Authentication Information - Answer (click here) 74. Attacks on Passwords - Answer (click here) 75. Password Selection Criteria - Answer (click here) 76. The Authentication Process - Answer (click here) 77. Biometrics: Authentication Not Using Passwords - Answer (click here) 78. Designing Trusted Operating Systems - Answer (click here) 79. What Is a Trusted System? - Answer (click here) 80. Security Policies - Answer (click here) 81. Models of Security - Answer (click here) 82. Trusted Operating System Design - Answer (click here) 83. The Importance of Good Design Principles - Answer (click here) 84. Trusted System Design Elements - Answer (click here) 85. Security Features of Ordinary Operating Systems - Answer (click here) 86. Security Features of Trusted Operating Systems - Answer (click here) 87. Kernelized Design - Answer (click here) 88. Separation/Isolation - Answer (click here) 89. Virtualization - Answer (click here) 90. Layered Design - Answer (click here) 91. Assurance in Trusted Operating Systems - Answer (click here) 92. Typical Operating System Flaws - Answer (click here) 93. Assurance Methods - Answer (click here) 94. Open Source - Answer (click here) 95. Evaluation - Answer (click here) 96. Security as an Add-On - Answer (click here) 97. Database and Data Mining Security - Answer (click here) 98. Introduction to Databases - Answer (click here) 99. Security Requirements - Answer (click here) 100. Reliability and Integrity - Answer (click here) 101. Sensitive Data - Answer (click here) 102. Inference - Answer (click here) 103. Multilevel Databases - Answer (click here) 104. Proposals for Multilevel Security - Answer (click here) 105. Data Mining - Answer (click here) 106. Security in Networks - Answer (click here) 107. Network Concepts - Answer (click here) 108. Network Media - Answer (click here) 109. Network Protocols - Answer (click here) 110. Types of Networks - Answer (click here) 111. Threats in Networks - Answer (click here) 112. Who Attacks Networks? - Answer (click here) 113. Threats in Transit: Eavesdropping and Wiretapping - Answer (click here) 114. Protocol Flaws - Answer (click here) 115. Impersonation - Answer (click here) 116. Message Confidentiality Threats - Answer (click here) 117. Message Integrity Threats - Answer (click here) 118. Format Failures - Answer (click here) 119. Web Site Vulnerabilities - Answer (click here) 120. Denial of Service - Answer (click here) 121. Distributed Denial of Service - Answer (click here) 122. Threats in Active or Mobile Code - Answer (click here) 123. Threats in Active or Mobile Code - Answer (click here) 124. Networks Complex Attacks - Answer (click here) 125. Network Security Controls - Security Threat Analysis - Answer (click here) 126. Architecture - Security in Networks - Answer (click here) 127. Encryption - Security in Networks - Answer (click here) 128. Content Integrity - Security in Networks - Answer (click here) 129. Strong Authentication and Kerberos - Security in Networks - Answer (click here) 130. Access Controls - Security in Networks - Answer (click here) 131. Wireless Networks Security - Answer (click here) 132. Honeypots, Alarms and Alerts - Security in Networks - Answer (click here) 133. Traffic Flow Security - Answer (click here) 134. Firewalls - Answer (click here) 135. Types of Firewalls - Answer (click here) 136. Example Firewall Configurations - Answer (click here) 137. Intrusion Detection Systems - Answer (click here) 138. Types of IDSs(Intrusion Detection Systems) - Answer (click here) 139. Goals for Intrusion Detection Systems - Answer (click here) 140. Intrusion Detection Systems(IDS) Strengths and Limitations - Answer (click here) 141. Secure E-Mail - Answer (click here) 142. Administering Security - Answer (click here) 143. Security Planning - Answer (click here) 144. Contents of a Security Plan - Answer (click here) 145. Security Planning Team Members - Answer (click here) 146. Assuring Commitment to a Security Plan - Answer (click here) 147. Business Continuity Plans - Answer (click here) 148. Incident Response Plans - Answer (click here) 149. Risk Analysis - Answer (click here) 150. The Nature of Risk - Answer (click here) 151. Steps of a Risk Analysis - Answer (click here) 152. Arguments For and Against Risk Analysis - Answer (click here) 153. Organizational Security Policies - Answer (click here) 154. Characteristics of a Good Security Policy - Answer (click here) 155. Policy Issue Example: Government E-mail - Answer (click here) 156. Physical Security - Answer (click here) 157. Interception of Sensitive Information - Answer (click here) 158. Contingency Planning - Answer (click here) 159. Physical Security Recap - Answer (click here) 160. The Economics of Cybersecurity - Answer (click here) 161. Making a Business Case - Answer (click here) 162. Quantifying Security - Answer (click here) 163. The Economic Impact of Cybersecurity - Answer (click here) 164. Data to Justify Security Action - Answer (click here) 165. A Summary of Recent Security Surveys - Answer (click here) 166. Are the Data Representative? - Answer (click here) 167. Sources of Attack and Financial Impact - Answer (click here) 168. Modeling Cybersecurity - Answer (click here) 169. Current Research and Future Directions - Answer (click here) 170. Privacy in Computing - Answer (click here) 171. Privacy Concepts - Answer (click here) 172. Computer-Related Privacy Problems - Answer (click here) 173. Privacy Principles and Policies - Answer (click here) 174. Authentication and Privacy - Answer (click here) 175. What Authentication Means - Answer (click here) 176. Data Mining - Answer (click here) 177. Privacy on the Web - Answer (click here) 178. Spyware - Answer (click here) 179. Shopping on the Internet - Answer (click here) 180. E-Mail Security - Answer (click here) 181. Impacts on Emerging Technologies - Answer (click here)
Chapter 11 Legal and Ethical Issues in Computer Security
1. What Does "Secure" Mean? - Answer (click here) 2. Protecting Software in Automobile Control Systems - Answer (click here) 3. Attacks - Answer (click here) 4. Why Universities Are Prime Targets - Answer (click here) 5. The Meaning of Computer Security - Answer (click here) 6. Record Record Loss - Answer (click here) 7. Top Methods of Attack - Answer (click here) 8. Computer Criminals - Answer (click here) 9. The Terrorists, Inc., IT Department - Answer (click here) 10. Methods of Defense - Answer (click here) 11. Elementary Cryptography - Answer (click here) 12. Elementary Cryptography - Terminology and Background - Answer (click here) 13. Substitution Ciphers - Answer (click here) 14. Transpositions (Permutations) - Answer (click here) 15. Making "Good" Encryption Algorithms - Answer (click here) 16. The Data Encryption Standard(DES) - Answer (click here) 17. The AES Encryption Algorithm - Answer (click here) 18. Public Key Encryption - Answer (click here) 19. The Uses of Encryption - Answer (click here) 20. Program Security - Answer (click here) 21. Secure Programs - Answer (click here) 22. Nonmalicious Program Errors - Answer (click here) 23. Viruses and Other Malicious Code - Answer (click here) 24. Nonmalicious Flaws Cause Failures - Answer (click here) 25. Why Worry About Malicious Code? - Answer (click here) 26. Kinds of Malicious Code - Answer (click here) 27. Rapidly Approaching Zero - Answer (click here) 28. How Viruses Attach - Answer (click here) 29. How Viruses Gain Control - Answer (click here) 30. Homes for Viruses - Answer (click here) 31. Virus Signatures - Answer (click here) 32. The Source of Viruses - Answer (click here) 33. Prevention of Virus Infection - Answer (click here) 34. Truths and Misconceptions About Viruses - Answer (click here) 35. First Example of Malicious Code: The Brain Virus - Answer (click here) 36. Example: The Internet Worm - Answer (click here) 37. More Malicious Code: Code Red - Answer (click here) 38. Malicious Code on the Web: Web Bugs - Answer (click here) 39. Is the Cure Worse Than the Disease? - Answer (click here) 40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click here) 41. Salami Attack - Answer (click here) 42. Rootkits and the Sony XCP - Answer (click here) 43. Privilege Escalation - Answer (click here) 44. Interface Illusions - Answer (click here) 45. Keystroke Logging - Answer (click here) 46. Man-in-the-Middle Attacks - Answer (click here) 47. Timing Attacks - Answer (click here) 48. Covert Channels: Programs That Leak Information - Answer (click here) 49. Controls Against Program Threats - Answer (click here) 50. The Nature of Software Development - Answer (click here) 51. Modularity, Encapsulation, and Information Hiding - Answer (click here) 52. Peer Reviews - Answer (click here) 53. Hazard Analysis - Answer (click here) 54. Testing - Answer (click here) 55. Good Design and Prediction - Answer (click here) 56. Static Analysis - Answer (click here) 57. Configuration Management - Answer (click here) 58. Lessons from Mistakes - Answer (click here) 59. There's More Than One Way to Crack a System - Answer (click here) 60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here) 61. Programming Practice Conclusions - Answer (click here) 62. Standards of Program Development - Answer (click here) 63. Process Standards - Answer (click here) 64. Program Controls in General - Answer (click here) 65. Protection in General-Purpose Operating Systems - Answer (click here) 66. Protected Objects and Methods of Protection - Answer (click here) 67. Memory and Address Protection - Answer (click here) 68. Control of Access to General Objects - Answer (click here) 69. File Protection Mechanisms - Answer (click here) 70. User Authentication - Answer (click here) 71. Biometrics: Ready for Prime Time? - Answer (click here) 72. Passwords as Authenticators - Answer (click here) 73. Additional Authentication Information - Answer (click here) 74. Attacks on Passwords - Answer (click here) 75. Password Selection Criteria - Answer (click here) 76. The Authentication Process - Answer (click here) 77. Biometrics: Authentication Not Using Passwords - Answer (click here) 78. Designing Trusted Operating Systems - Answer (click here) 79. What Is a Trusted System? - Answer (click here) 80. Security Policies - Answer (click here) 81. Models of Security - Answer (click here) 82. Trusted Operating System Design - Answer (click here) 83. The Importance of Good Design Principles - Answer (click here) 84. Trusted System Design Elements - Answer (click here) 85. Security Features of Ordinary Operating Systems - Answer (click here) 86. Security Features of Trusted Operating Systems - Answer (click here) 87. Kernelized Design - Answer (click here) 88. Separation/Isolation - Answer (click here) 89. Virtualization - Answer (click here) 90. Layered Design - Answer (click here) 91. Assurance in Trusted Operating Systems - Answer (click here) 92. Typical Operating System Flaws - Answer (click here) 93. Assurance Methods - Answer (click here) 94. Open Source - Answer (click here) 95. Evaluation - Answer (click here) 96. Security as an Add-On - Answer (click here) 97. Database and Data Mining Security - Answer (click here) 98. Introduction to Databases - Answer (click here) 99. Security Requirements - Answer (click here) 100. Reliability and Integrity - Answer (click here) 101. Sensitive Data - Answer (click here) 102. Inference - Answer (click here) 103. Multilevel Databases - Answer (click here) 104. Proposals for Multilevel Security - Answer (click here) 105. Data Mining - Answer (click here) 106. Security in Networks - Answer (click here) 107. Network Concepts - Answer (click here) 108. Network Media - Answer (click here) 109. Network Protocols - Answer (click here) 110. Types of Networks - Answer (click here) 111. Threats in Networks - Answer (click here) 112. Who Attacks Networks? - Answer (click here) 113. Threats in Transit: Eavesdropping and Wiretapping - Answer (click here) 114. Protocol Flaws - Answer (click here) 115. Impersonation - Answer (click here) 116. Message Confidentiality Threats - Answer (click here) 117. Message Integrity Threats - Answer (click here) 118. Format Failures - Answer (click here) 119. Web Site Vulnerabilities - Answer (click here) 120. Denial of Service - Answer (click here) 121. Distributed Denial of Service - Answer (click here) 122. Threats in Active or Mobile Code - Answer (click here) 123. Threats in Active or Mobile Code - Answer (click here) 124. Networks Complex Attacks - Answer (click here) 125. Network Security Controls - Security Threat Analysis - Answer (click here) 126. Architecture - Security in Networks - Answer (click here) 127. Encryption - Security in Networks - Answer (click here) 128. Content Integrity - Security in Networks - Answer (click here) 129. Strong Authentication and Kerberos - Security in Networks - Answer (click here) 130. Access Controls - Security in Networks - Answer (click here) 131. Wireless Networks Security - Answer (click here) 132. Honeypots, Alarms and Alerts - Security in Networks - Answer (click here) 133. Traffic Flow Security - Answer (click here) 134. Firewalls - Answer (click here) 135. Types of Firewalls - Answer (click here) 136. Example Firewall Configurations - Answer (click here) 137. Intrusion Detection Systems - Answer (click here) 138. Types of IDSs(Intrusion Detection Systems) - Answer (click here) 139. Goals for Intrusion Detection Systems - Answer (click here) 140. Intrusion Detection Systems(IDS) Strengths and Limitations - Answer (click here) 141. Secure E-Mail - Answer (click here) 142. Administering Security - Answer (click here) 143. Security Planning - Answer (click here) 144. Contents of a Security Plan - Answer (click here) 145. Security Planning Team Members - Answer (click here) 146. Assuring Commitment to a Security Plan - Answer (click here) 147. Business Continuity Plans - Answer (click here) 148. Incident Response Plans - Answer (click here) 149. Risk Analysis - Answer (click here) 150. The Nature of Risk - Answer (click here) 151. Steps of a Risk Analysis - Answer (click here) 152. Arguments For and Against Risk Analysis - Answer (click here) 153. Organizational Security Policies - Answer (click here) 154. Characteristics of a Good Security Policy - Answer (click here) 155. Policy Issue Example: Government E-mail - Answer (click here) 156. Physical Security - Answer (click here) 157. Interception of Sensitive Information - Answer (click here) 158. Contingency Planning - Answer (click here) 159. Physical Security Recap - Answer (click here) 160. The Economics of Cybersecurity - Answer (click here) 161. Making a Business Case - Answer (click here) 162. Quantifying Security - Answer (click here) 163. The Economic Impact of Cybersecurity - Answer (click here) 164. Data to Justify Security Action - Answer (click here) 165. A Summary of Recent Security Surveys - Answer (click here) 166. Are the Data Representative? - Answer (click here) 167. Sources of Attack and Financial Impact - Answer (click here) 168. Modeling Cybersecurity - Answer (click here) 169. Current Research and Future Directions - Answer (click here) 170. Privacy in Computing - Answer (click here) 171. Privacy Concepts - Answer (click here) 172. Computer-Related Privacy Problems - Answer (click here) 173. Privacy Principles and Policies - Answer (click here) 174. Authentication and Privacy - Answer (click here) 175. What Authentication Means - Answer (click here) 176. Data Mining - Answer (click here) 177. Privacy on the Web - Answer (click here) 178. Spyware - Answer (click here) 179. Shopping on the Internet - Answer (click here) 180. E-Mail Security - Answer (click here) 181. Impacts on Emerging Technologies - Answer (click here) 182. Legal and Ethical Issues in Computer Security - Answer (click here) 183. Protecting Programs and Data - Answer (click here) 184. Copyrights - Protecting Programs and Data - Answer (click here) 185. Patents - Protecting Programs and Data - Answer (click here) 186. Trade Secrets - Answer (click here) 187. Protection for Computer Objects - Answer (click here) 188. Information and the Law - Answer (click here) 189. Rights of Employees and Employers - Answer (click here) 190. Redress for Software Failures - Answer (click here) 191. Computer Crime - Answer (click here) 192. Why Computer Crime Is Hard to Define and Prosecute - Answer (click here) 193. Examples of Statutes - Answer (click here) 194. International Dimensions - Answer (click here) 195. Why Computer Criminals Are Hard to Catch - Answer (click here) 196. What Computer Crime Does Not Address - Answer (click here) 197. Cryptography and the Law - Answer (click here) 198. Ethical Issues in Computer Security - Answer (click here) 199. Case Studies of Ethics: Use of Computer Services - Answer (click here) 200. Case Studies of Ethics: Privacy Rights - Answer (click here) 201. Case Studies of Ethics: Denial of Service - Answer (click here) 202. Case Studies of Ethics: Ownership of Programs - Answer (click here) 203. Case Studies of Ethics: Proprietary Resources - Answer (click here) 204. Case Studies of Ethics: Fraud - Answer (click here) 205. Case Studies of Ethics: Accuracy of Information - Answer (click here) 206. Case Studies of Ethics: Ethics of Hacking or Cracking - Answer (click here) 207. Codes of Computer Ethics - Answer (click here)
Chapter 12 Cryptography Explained
1. What Does "Secure" Mean? - Answer (click here) 2. Protecting Software in Automobile Control Systems - Answer (click here) 3. Attacks - Answer (click here) 4. Why Universities Are Prime Targets - Answer (click here) 5. The Meaning of Computer Security - Answer (click here) 6. Record Record Loss - Answer (click here) 7. Top Methods of Attack - Answer (click here) 8. Computer Criminals - Answer (click here) 9. The Terrorists, Inc., IT Department - Answer (click here) 10. Methods of Defense - Answer (click here) 11. Elementary Cryptography - Answer (click here) 12. Elementary Cryptography - Terminology and Background - Answer (click here) 13. Substitution Ciphers - Answer (click here) 14. Transpositions (Permutations) - Answer (click here) 15. Making "Good" Encryption Algorithms - Answer (click here) 16. The Data Encryption Standard(DES) - Answer (click here) 17. The AES Encryption Algorithm - Answer (click here) 18. Public Key Encryption - Answer (click here) 19. The Uses of Encryption - Answer (click here) 20. Program Security - Answer (click here) 21. Secure Programs - Answer (click here) 22. Nonmalicious Program Errors - Answer (click here) 23. Viruses and Other Malicious Code - Answer (click here) 24. Nonmalicious Flaws Cause Failures - Answer (click here) 25. Why Worry About Malicious Code? - Answer (click here) 26. Kinds of Malicious Code - Answer (click here) 27. Rapidly Approaching Zero - Answer (click here) 28. How Viruses Attach - Answer (click here) 29. How Viruses Gain Control - Answer (click here) 30. Homes for Viruses - Answer (click here) 31. Virus Signatures - Answer (click here) 32. The Source of Viruses - Answer (click here) 33. Prevention of Virus Infection - Answer (click here) 34. Truths and Misconceptions About Viruses - Answer (click here) 35. First Example of Malicious Code: The Brain Virus - Answer (click here) 36. Example: The Internet Worm - Answer (click here) 37. More Malicious Code: Code Red - Answer (click here) 38. Malicious Code on the Web: Web Bugs - Answer (click here) 39. Is the Cure Worse Than the Disease? - Answer (click here) 40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click here) 41. Salami Attack - Answer (click here) 42. Rootkits and the Sony XCP - Answer (click here) 43. Privilege Escalation - Answer (click here) 44. Interface Illusions - Answer (click here) 45. Keystroke Logging - Answer (click here) 46. Man-in-the-Middle Attacks - Answer (click here) 47. Timing Attacks - Answer (click here) 48. Covert Channels: Programs That Leak Information - Answer (click here) 49. Controls Against Program Threats - Answer (click here) 50. The Nature of Software Development - Answer (click here) 51. Modularity, Encapsulation, and Information Hiding - Answer (click here) 52. Peer Reviews - Answer (click here) 53. Hazard Analysis - Answer (click here) 54. Testing - Answer (click here) 55. Good Design and Prediction - Answer (click here) 56. Static Analysis - Answer (click here) 57. Configuration Management - Answer (click here) 58. Lessons from Mistakes - Answer (click here) 59. There's More Than One Way to Crack a System - Answer (click here) 60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here) 61. Programming Practice Conclusions - Answer (click here) 62. Standards of Program Development - Answer (click here) 63. Process Standards - Answer (click here) 64. Program Controls in General - Answer (click here) 65. Protection in General-Purpose Operating Systems - Answer (click here) 66. Protected Objects and Methods of Protection - Answer (click here) 67. Memory and Address Protection - Answer (click here) 68. Control of Access to General Objects - Answer (click here) 69. File Protection Mechanisms - Answer (click here) 70. User Authentication - Answer (click here) 71. Biometrics: Ready for Prime Time? - Answer (click here) 72. Passwords as Authenticators - Answer (click here) 73. Additional Authentication Information - Answer (click here) 74. Attacks on Passwords - Answer (click here) 75. Password Selection Criteria - Answer (click here) 76. The Authentication Process - Answer (click here) 77. Biometrics: Authentication Not Using Passwords - Answer (click here) 78. Designing Trusted Operating Systems - Answer (click here) 79. What Is a Trusted System? - Answer (click here) 80. Security Policies - Answer (click here) 81. Models of Security - Answer (click here) 82. Trusted Operating System Design - Answer (click here) 83. The Importance of Good Design Principles - Answer (click here) 84. Trusted System Design Elements - Answer (click here) 85. Security Features of Ordinary Operating Systems - Answer (click here) 86. Security Features of Trusted Operating Systems - Answer (click here) 87. Kernelized Design - Answer (click here) 88. Separation/Isolation - Answer (click here) 89. Virtualization - Answer (click here) 90. Layered Design - Answer (click here) 91. Assurance in Trusted Operating Systems - Answer (click here) 92. Typical Operating System Flaws - Answer (click here) 93. Assurance Methods - Answer (click here) 94. Open Source - Answer (click here) 95. Evaluation - Answer (click here) 96. Security as an Add-On - Answer (click here) 97. Database and Data Mining Security - Answer (click here) 98. Introduction to Databases - Answer (click here) 99. Security Requirements - Answer (click here) 100. Reliability and Integrity - Answer (click here) 101. Sensitive Data - Answer (click here) 102. Inference - Answer (click here) 103. Multilevel Databases - Answer (click here) 104. Proposals for Multilevel Security - Answer (click here) 105. Data Mining - Answer (click here) 106. Security in Networks - Answer (click here) 107. Network Concepts - Answer (click here) 108. Network Media - Answer (click here) 109. Network Protocols - Answer (click here) 110. Types of Networks - Answer (click here) 111. Threats in Networks - Answer (click here) 112. Who Attacks Networks? - Answer (click here) 113. Threats in Transit: Eavesdropping and Wiretapping - Answer (click here) 114. Protocol Flaws - Answer (click here) 115. Impersonation - Answer (click here) 116. Message Confidentiality Threats - Answer (click here) 117. Message Integrity Threats - Answer (click here) 118. Format Failures - Answer (click here) 119. Web Site Vulnerabilities - Answer (click here) 120. Denial of Service - Answer (click here) 121. Distributed Denial of Service - Answer (click here) 122. Threats in Active or Mobile Code - Answer (click here) 123. Threats in Active or Mobile Code - Answer (click here) 124. Networks Complex Attacks - Answer (click here) 125. Network Security Controls - Security Threat Analysis - Answer (click here) 126. Architecture - Security in Networks - Answer (click here) 127. Encryption - Security in Networks - Answer (click here) 128. Content Integrity - Security in Networks - Answer (click here) 129. Strong Authentication and Kerberos - Security in Networks - Answer (click here) 130. Access Controls - Security in Networks - Answer (click here) 131. Wireless Networks Security - Answer (click here) 132. Honeypots, Alarms and Alerts - Security in Networks - Answer (click here) 133. Traffic Flow Security - Answer (click here) 134. Firewalls - Answer (click here) 135. Types of Firewalls - Answer (click here) 136. Example Firewall Configurations - Answer (click here) 137. Intrusion Detection Systems - Answer (click here) 138. Types of IDSs(Intrusion Detection Systems) - Answer (click here) 139. Goals for Intrusion Detection Systems - Answer (click here) 140. Intrusion Detection Systems(IDS) Strengths and Limitations - Answer (click here) 141. Secure E-Mail - Answer (click here) 142. Administering Security - Answer (click here) 143. Security Planning - Answer (click here) 144. Contents of a Security Plan - Answer (click here) 145. Security Planning Team Members - Answer (click here) 146. Assuring Commitment to a Security Plan - Answer (click here) 147. Business Continuity Plans - Answer (click here) 148. Incident Response Plans - Answer (click here) 149. Risk Analysis - Answer (click here) 150. The Nature of Risk - Answer (click here) 151. Steps of a Risk Analysis - Answer (click here) 152. Arguments For and Against Risk Analysis - Answer (click here) 153. Organizational Security Policies - Answer (click here) 154. Characteristics of a Good Security Policy - Answer (click here) 155. Policy Issue Example: Government E-mail - Answer (click here) 156. Physical Security - Answer (click here) 157. Interception of Sensitive Information - Answer (click here) 158. Contingency Planning - Answer (click here) 159. Physical Security Recap - Answer (click here) 160. The Economics of Cybersecurity - Answer (click here) 161. Making a Business Case - Answer (click here) 162. Quantifying Security - Answer (click here) 163. The Economic Impact of Cybersecurity - Answer (click here) 164. Data to Justify Security Action - Answer (click here) 165. A Summary of Recent Security Surveys - Answer (click here) 166. Are the Data Representative? - Answer (click here) 167. Sources of Attack and Financial Impact - Answer (click here) 168. Modeling Cybersecurity - Answer (click here) 169. Current Research and Future Directions - Answer (click here) 170. Privacy in Computing - Answer (click here) 171. Privacy Concepts - Answer (click here) 172. Computer-Related Privacy Problems - Answer (click here) 173. Privacy Principles and Policies - Answer (click here) 174. Authentication and Privacy - Answer (click here) 175. What Authentication Means - Answer (click here) 176. Data Mining - Answer (click here) 177. Privacy on the Web - Answer (click here) 178. Spyware - Answer (click here) 179. Shopping on the Internet - Answer (click here) 180. E-Mail Security - Answer (click here) 181. Impacts on Emerging Technologies - Answer (click here) 182. Legal and Ethical Issues in Computer Security - Answer (click here) 183. Protecting Programs and Data - Answer (click here) 184. Copyrights - Protecting Programs and Data - Answer (click here) 185. Patents - Protecting Programs and Data - Answer (click here) 186. Trade Secrets - Answer (click here) 187. Protection for Computer Objects - Answer (click here) 188. Information and the Law - Answer (click here) 189. Rights of Employees and Employers - Answer (click here) 190. Redress for Software Failures - Answer (click here) 191. Computer Crime - Answer (click here) 192. Why Computer Crime Is Hard to Define and Prosecute - Answer (click here) 193. Examples of Statutes - Answer (click here) 194. International Dimensions - Answer (click here) 195. Why Computer Criminals Are Hard to Catch - Answer (click here) 196. What Computer Crime Does Not Address - Answer (click here) 197. Cryptography and the Law - Answer (click here) 198. Ethical Issues in Computer Security - Answer (click here) 199. Case Studies of Ethics: Use of Computer Services - Answer (click here) 200. Case Studies of Ethics: Privacy Rights - Answer (click here) 201. Case Studies of Ethics: Denial of Service - Answer (click here) 202. Case Studies of Ethics: Ownership of Programs - Answer (click here) 203. Case Studies of Ethics: Proprietary Resources - Answer (click here) 204. Case Studies of Ethics: Fraud - Answer (click here) 205. Case Studies of Ethics: Accuracy of Information - Answer (click here) 206. Case Studies of Ethics: Ethics of Hacking or Cracking - Answer (click here) 207. Codes of Computer Ethics - Answer (click here) 208. Cryptography Explained - Answer (click here) 209. Mathematics for Cryptography - Answer (click here) 210. Symmetric Encryption - Answer (click here) 211. Data Encryption Standard - Answer (click here) 212. Advanced Encryption Standard - Answer (click here) 213. Public Key Encryption Systems - Answer (click here) 214. MerkleHellman Knapsacks - Answer (click here) 215. RivestShamirAdelman (RSA) Encryption - Answer (click here) 216. The El Gamal and Digital Signature Algorithms - Answer (click here) 217. Quantum Cryptography - Answer (click here)