0% found this document useful (0 votes)
103 views14 pages

Computer and Information Security Handbook - (Contents)

Computer and Information Security Contents
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views14 pages

Computer and Information Security Handbook - (Contents)

Computer and Information Security Contents
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Contents

Foreword xix Chapter Review Questions/Exercises 45


Preface xx Exercise 46
Acknowledgments xxv
About the Editor xxvi
Contributors xxvii 3. Detecting System Intrusions 47
Almantas Kakareka
1. Introduction 47
2. Monitoring Key Files in the System 47
Part 1 3. Security Objectives 48
Overview of System and Network 4. 0day Attacks 51
5. Good Known State 52
Security: A Comprehensive 6. Rootkits 53
Introduction 1 7. Low Hanging Fruit 54
8. Antivirus Software 55
1. Building a Secure Organization 3 9. Homegrown Intrusion Detection 55
10. Full-Packet Capture Devices 55
John Mallery
11. Out-of-Band Attack Vectors 57
1. Obstacles to Security 3 12. Security Awareness Training 58
2. Computers are Powerful and Complex 3 13. Data Correlation 58
3. Current Trend is to Share, Not Protect 4 14. SIEM 59
4. Security isn’t about Hardware and 15. Other Weird Stuff on the System 59
Software 6 16. Detection 60
5. Ten Steps to Building a Secure 17. Network-Based Detection of
Organization 8 System Intrusions (DSIs) 60
6. Preparing for the Building of Security 18. Summary 61
Control Assessments 21 Chapter Review Questions/Exercises 62
7. Summary 22 Exercise 62
Chapter Review Questions/Exercises 23 References 62
Exercise 24
Copyright © 2013. Elsevier Science & Technology. All rights reserved.

4. Preventing System Intrusions 63


2. A Cryptography Primer 25
Michael West
Scott R. Ellis
1. So, What is an Intrusion? 64
1. What is Cryptography? What is 2. Sobering Numbers 64
Encryption? 26 3. Know Your Enemy: Hackers versus
2. Famous Cryptographic Devices 26 Crackers 65
3. Ciphers 27 4. Motives 66
4. Modern Cryptography 33 5. The Crackers’ Tools of the Trade 66
5. The Computer Age 38 6. Bots 67
6. How AES Works 41 7. Symptoms of Intrusions 68
7. Selecting Cryptography: the Process 44 8. What Can You Do? 69
8. Summary 45 9. Security Policies 71

Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
vi Contents

10. Risk Analysis


. 72 3. Basic Concepts on Fault Tolerance 128
11. Tools of Your Trade 73 4. Different Levels of Fault Tolerance in
12. Controlling User Access 75 Cloud Computing 130
13. Intrusion Prevention Capabilities 77 5. Fault Tolerance against Crash Failures
14. Summary 77 in Cloud Computing 131
Chapter Review Questions/Exercises 78 6. Fault Tolerance against Byzantine
Exercise 78 Failures in Cloud Computing 132
7. Fault Tolerance as a Service in
Cloud Computing 134
5. Guarding Against Network 8. Summary 139
Intrusions 81 Chapter Review Questions/Exercises 139
Thomas M. Chen and Patrick J. Walsh Exercise 140
Acknowledgments 140
1. Traditional Reconnaissance and Attacks 81 References 140
2. Malicious Software 84
3. Defense in Depth 86
4. Preventive Measures 87 8. Securing Web Applications,
5. Intrusion Monitoring and Detection 91
Services, and Servers 143
6. Reactive Measures 93
7. Network-Based Intrusion Protection 94 Gerald Beuchelt
8. Summary 94
1. Setting the Stage 143
Chapter Review Questions/Exercises 94
2. Basic Security for HTTP Applications
Exercise 95
and Services 144
3. Basic Security for SOAP Services 146
6. Securing Cloud Computing 4. Identity Management and Web
Systems 97 Services 149
5. Authorization Patterns 154
Cem Gurkok 6. Security Considerations 155
1. Cloud Computing Essentials: 7. Challenges 160
Examining the Cloud Layers 97 8. Summary 160
2. Software as a Service (SaaS): Chapter Review Questions/Exercises 162
Managing Risks in the Cloud 103 Exercise 162
3. Platform as a Service (PaaS):
Securing the Platform 104
4. Infrastructure as a Service (IaaS) 107 9. Unix and Linux Security 165
5. Leveraging Provider-Specific Security
Gerald Beuchelt
Options 112
6. Achieving Security in a Private Cloud 113 1. Unix and Security 165
7. Meeting Compliance Requirements 117 2. Basic Unix Security Overview 166
Copyright © 2013. Elsevier Science & Technology. All rights reserved.

8. Preparing for Disaster Recovery 120 3. Achieving Unix Security 169


9. Summary 122 4. Protecting User Accounts and
Chapter Review Questions/Exercises 122 Strengthening Authentication 170
Exercise 122 5. Limiting Superuser Privileges 173
References 123 6. Securing Local and Network File
Systems 174
7. Network Configuration 176
7. Fault Tolerance and Resilience in 8. Improving the Security of Linux and
Cloud Computing Environments 125 Unix Systems 178
9. Additional Resources 178
Ravi Jhawar and Vincenzo Piuri
10. Summary 180
1. Introduction 125 Chapter Review Questions/Exercises 180
2. Cloud Computing Fault Model 126 Exercise 181

Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
Contents vii

10. Eliminating the Security Weakness 7. Shielding the Wire: Network Protection 251
of Linux and Unix Operating 8. Weakest Link in Security: User Training 253
Systems 183 9. Documenting the Network: Change
Management 253
Mario Santana 10. Rehearse the Inevitable: Disaster
1. Introduction to Linux and Unix 183 Recovery 254
2. Hardening Linux and Unix 187 11. Controlling Hazards: Physical and
3. Proactive Defense for Linux and Unix 194 Environmental Protection 256
4. Summary 196 12. Know Your Users: Personnel Security 257
Chapter Review Questions/Exercises 196 13. Protecting Data Flow: Information and
Exercise 196 System Integrity 258
14. Security Assessments 258
15. Risk Assessments 259
11. Internet Security 197 16. Intranet Security Implementation
Process Checklist 260
Jesse Walker 17. Summary 260
1. Internet Protocol Architecture 197 Chapter Review Questions/Exercises 260
2. An Internet Threat Model 204 Exercise 261
3. Defending against Attacks on the
internet 209
4. Internet Security Checklist 221
14. Local Area Network Security 263
5. Summary 221 Dr. Pramod Pandya
Chapter Review Questions/Exercises 222
Exercise 222 1. Identify Network Threats 264
2. Establish Network Access Controls 264
3. Risk Assessment 265
12. The Botnet Problem 223 4. Listing Network Resources 265
5. Threats 265
Daniel Ramsbrock and Xinyuan Wang 6. Security Policies 265
1. Introduction 223 7. The Incident-Handling Process 266
2. Botnet Overview 224 8. Secure Design Through Network
3. Typical Bot Life Cycle 226 Access Controls 266
4. The Botnet Business Model 227 9. IDS Defined 267
5. Botnet Defense 228 10. NIDs: Scope and Limitations 267
6. Botmaster Traceback 232 11. A Practical Illustration of NIDS 268
7. Preventing Botnets 235 12. Firewalls 270
8. Summary 236 13. Dynamic NAT Configuration 274
Chapter Review Questions/Exercises 236 14. The Perimeter 274
Exercise 238 15. Access List Details 275
16. Types of Firewalls 276
Copyright © 2013. Elsevier Science & Technology. All rights reserved.

17. Packet Filtering: IP Filtering Routers 276


13. Intranet Security 239 18. Application-Layer Firewalls: Proxy
Servers 276
Bill Mansoor
19. Stateful Inspection Firewalls 277
1. Smartphones and Tablets in the 20. NIDs Complements Firewalls 277
Intranet 242 21. Monitor and Analyze System Activities 277
2. Security Considerations 245 22. Signature Analysis 278
3. Plugging the Gaps: NAC and Access 23. Statistical Analysis 278
Control 247 24. Signature Algorithms 278
4. Measuring Risk: Audits 248 25. Local Area Network Security
5. Guardian at the Gate: Authentication Countermeasures Implementation
and Encryption 250 Checklist 281
6. Wireless Network Security 250 26. Summary 281

Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
viii Contents

Chapter Review Questions/Exercises 282 18. RFID Security 345


Exercise 282
Chunming Rong, Gansen Zhao, Liang Yan,
Erdal Cayirci and Hongbing Cheng
15. Wireless Network Security 285
1. RFID Introduction 345
Chunming Rong, Gansen Zhao, Liang Yan, 2. RFID Challenges 349
Erdal Cayirci and Hongbing Cheng 3. RFID Protections 353
1. Cellular Networks 286 4. Summary 359
2. Wireless Ad hoc Networks 287 Chapter Review Questions/Exercises 359
3. Security Protocols 288 Exercise 359
4. WEP 288 References 360
5. Secure Routing 291
6. ARAN 293
7. SLSP 293
19. Optical Network Security 363
8. Key Establishment 294 Lauren Collins
9. ING 295
10. Management Countermeasures 297 1. Optical Networks 363
11. Summary 298 2. Securing Optical Networks 366
Chapter Review Questions/Exercises 298 3. Identifying Vulnerabilities 367
Exercise 299 4. Corrective Actions 368
References 299 5. Summary 369
Chapter Review Questions/Exercises 369
Exercise 370
16. Wireless Sensor Network Security 301 References 370

Harsh Kupwade Patil and Thomas M. Chen


1. Introduction to the Wireless Sensor
20. Optical Wireless Security 371
Network (WSN) 301 Scott R. Ellis
2. Threats to Privacy 304
3. Security Measures for WSN 308 1. Optical Wireless Systems Overview 371
4. Secure Routing in WSN 314 2. Deployment Architectures 372
5. Routing Classifications in WSN 314 3. High Bandwidth 373
6. WSN Security Framework and 4. Low Cost 373
Standards 320 5. Implementation 373
7. Summary 320 6. Surface Area 373
Chapter Review Questions/Exercises 320 7. Summary 375
Exercise 321 Chapter Review Questions/Exercises 375
References 321 Exercise 376

Part II
Copyright © 2013. Elsevier Science & Technology. All rights reserved.

17. Cellular Network Security 323


Peng Liu, Thomas F. La Porta and Managing Information Security 377
Kameswari Kotapati
1. Introduction 323
21. Information Security Essentials
2. Overview of Cellular Networks 323 for IT Managers: Protecting
3. The State of the Art of Cellular Mission-Critical Systems 379
Network Security 326 Albert Caballero
4. Cellular Network Attack Taxonomy 328
5. Cellular Network Vulnerability Analysis 334 1. Information Security Essentials for
6. Summary 341 IT Managers, Overview 379
Chapter Review Questions/Exercises 342 2. Protecting Mission-Critical Systems 385
Exercise 342 3. Information Security from the
References 343 Ground Up 389

Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
Contents ix

4. Security Monitoring and Effectiveness 402 Chapter Review Questions/Exercises 458


5. Summary 405 Exercise 458
Chapter Review Questions/Exercises 406
Exercise 407
25. Online Identity and User
Management Services 459
22. Security Management Systems 409 Tewfiq El Maliki and Jean-Marc Seigneur
James T. Harmening 1. Introduction 459
1. Security Management System 2. Evolution of Identity Management
Standards 409 Requirements 459
2. Training Requirements 409 3. The Requirements Fulfilled by Identity
3. Principles of Information Security 410 Management Technologies 463
4. Roles and Responsibilities of Personnel 410 4. Identity Management 1.0 463
5. Security Policies 410 5. Social Login and User Management 475
6. Security Controls 411 6. Identity 2.0 for Mobile Users 477
7. Network Access 411 7. Summary 482
8. Risk Assessment 411 Chapter Review Questions/Exercises 482
9. Incident Response 411 Exercise 483
10. Summary 413 References 483
Chapter Review Questions/Exercises 413
Exercise 413
26. Intrusion Prevention and
Detection Systems 485
23. Policy-driven System Management 415 Christopher Day

Henrik Plate, Cataldo Basile and 1. What is an ‘Intrusion’ Anyway? 485


Stefano Paraboschi 2. Physical Theft 485
3. Abuse of Privileges (The Insider
1. Introduction 415 Threat) 485
2. Security and Policy-based Management 415 4. Unauthorized Access by Outsider 486
3. Classification and Languages 421 5. Malware Infection 486
4. Controls for Enforcing Security 6. The Role of the ‘0-Day’ 487
Policies in Distributed Systems 430 7. The Rogue’s Gallery: Attackers
5. Products and Technologies 435 and Motives 487
6. Research Projects 439 8. A Brief Introduction to TCP/IP 488
7. Summary 445 9. The TCP/IP Data Architecture and
Chapter Review Questions/Exercises 446 Data Encapsulation 489
Exercise 446 10. Survey of Intrusion Detection and
Acknowledgments 446 Prevention Technologies 491
References 447
Copyright © 2013. Elsevier Science & Technology. All rights reserved.

11. Anti-Malware Software 492


12. Network-Based Intrusion Detection
Systems 493
24. Information Technology Security 13. Network-Based Intrusion Prevention
Management 449 Systems 494
14. Host-Based Intrusion Prevention
Rahul Bhaskar and Bhushan Kapoor
Systems 494
1. Information Security Management 15. Security Information Management
Standards 449 Systems 495
2. Other Organizations Involved in 16. Network Session Analysis 495
Standards 450 17. Digital Forensics 496
3. Information Technology Security 18. System Integrity Validation 496
Aspects 450 19. Summary 497
4. Summary 454 Chapter Review Questions/Exercises 497

Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
x Contents

Exercise 498 18. Why Should a Company Hire You? 539


References 498 19. Summary 539
Chapter Review Questions/Exercises 540
Exercise 540
27. TCP/IP Packet Analysis 499
Pramod Pandya
1. The Internet Model 499 31. What is Vulnerability Assessment? 541
2. Summary 511 Almantas Kakareka
Chapter Review Questions/Exercises 511
Exercise 512 1. Introduction 541
2. Reporting 541
3. The “It Won’t Happen to US” Factor 542
28. The Enemy (The Intruder’s 4. Why Vulnerability Assessment? 542
Genesis) 513 5. Penetration Testing Versus Vulnerability
Assessment 542
Dr. Pramod Pandya
6. Vulnerability Assessment Goal 543
1. Introduction 513 7. Mapping the Network 543
2. Active Reconnaissance 514 8. Selecting the Right Scanners 544
3. Enumeration 518 9. Central Scans Versus Local Scans 545
4. Penetration and Gain Access 518 10. Defense in Depth Strategy 546
5. Maintain Access 521 11. Vulnerability Assessment Tools 546
6. Defend Network Against 12. SARA 547
Unauthorized Access 522 13. SAINT 547
7. Summary 522 14. MBSA 547
Chapter Review Questions/Exercises 523 15. Scanner Performance 547
Exercise 524 16. Scan Verification 547
17. Scanning Cornerstones 547
18. Network Scanning Countermeasures 547
29. Firewalls (online chapter) 525 19. Vulnerability Disclosure Date 548
20. Proactive Security Versus Reactive
Dr. Errin W. Fulp
Security 549
21. Vulnerability Causes 550
30. Penetration Testing 527 22. DIY Vulnerability Assessment 551
23. Summary 551
Sanjay Bavisi Chapter Review Questions/Exercises 551
1. Introduction 527 Exercise 552
2. What is Penetration Testing? 527
3. How Does Penetration Testing Differ
from an Actual “Hack?” 528 32. Security Metrics: An Introduction
Copyright © 2013. Elsevier Science & Technology. All rights reserved.

4. Types of Penetration Testing 529 and Literature Review 553


5. Phases of Penetration Testing 530
George O.M. Yee
6. Defining What’s Expected 532
7. The Need for a Methodology 532 1. Introduction 553
8. Penetration Testing Methodologies 533 2. Why Security Metrics? 554
9. Methodology in Action 533 3. The Nature of Security Metrics 555
10. Penetration Testing Risks 536 4. Getting Started with Security Metrics 558
11. Liability Issues 536 5. Metrics in Action—Towards an Intelligent
12. Legal Consequences 536 Security Dashboard 559
13. “Get Out of Jail Free” Card 537 6. Security Metrics in the Literature 559
14. Penetration Testing Consultants 537 7. Summary 564
15. Required Skill Sets 538 Chapter Review Questions/Exercises 565
16. Accomplishments 538 Exercise 565
17. Hiring a Penetration Tester 538 References 566

Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
Contents xi

Part III 36. Network Forensics 649


Cyber, Network, and Systems Yong Guan
Forensics Security and Assurance 567 1. Scientific Overview 649
2. The Principles of Network Forensics 649
33. Cyber Forensics 569 3. Attack Traceback and Attribution 651
Scott R. Ellis 4. Critical Needs Analysis 656
5. Research Directions 657
1. What is Cyber Forensics? 569 6. Summary 658
2. Analysis of Data 570 Chapter Review Questions/Exercises 660
3. Cyber Forensics in the Court System 572 Exercise 660
4. Understanding Internet History 573
5. Temporary Restraining Orders and
Labor Disputes 574 Part IV
6. First Principles 586 Encryption Technology 661
7. Hacking a Windows XP Password 586
8. Network Analysis 588 37. Data Encryption 663
9. Cyber Forensics Applied 590
10. Tracking, Inventory, Location of Files, Dr. Bhushan Kapoor and Dr. Pramod Pandya
Paperwork, Backups, and so on 590
1. Need for Cryptography 663
11. Testifying as an Expert 592
2. Mathematical Prelude to Cryptography 664
12. Beginning to End in Court 595
3. Classical Cryptography 664
13. Summary 598
4. Modern Symmetric Ciphers 667
Chapter Review Questions/Exercises 598
5. Algebraic Structure 669
Exercise 599
6. The Internal Functions of Rijndael in
AES Implementation 672
34. Cyber Forensics and Incident 7. Use of Modern Block Ciphers 676
Response 601 8. Public-Key Cryptography 677
9. Cryptanalysis of RSA 680
Cem Gurkok
10. Diffie-Hellman Algorithm 681
1. Introduction to Cyber Forensics 601 11. Elliptic Curve Cryptosystems 682
2. Handling Preliminary Investigations 602 12. Message Integrity and Authentication 683
3. Controlling an Investigation 604 13. Triple Data Encryption Algorithm
4. Conducting Disk-Based Analysis 605 (TDEA) Block Cipher 685
5. Investigating Information-Hiding 14. Summary 686
Techniques 608 Chapter Review Questions/Exercises 686
6. Scrutinizing Email 611 Exercise 686
7. Validating Email Header Information 612 References 687
8. Tracing Internet Access 613
9. Searching Memory in Real Time 615
Copyright © 2013. Elsevier Science & Technology. All rights reserved.

38. Satellite Encryption 689


10. Summary 620
Chapter Review Questions/Exercises 620 Daniel S. Soper
Exercise 621
1. Introduction 689
References 621
2. The Need for Satellite Encryption 690
3. Implementing Satellite Encryption 691
35. Securing e-Discovery 623 4. Pirate Decryption of Satellite
Transmissions 695
Scott R. Ellis
5. Satellite Encryption Policy 697
1. Information Management 625 6. Satellite Encryption Service 698
2. Legal and Regulatory Obligation 626 7. The Future of Satellite Encryption 699
3. Summary 647 8. Summary 699
Chapter Review Questions/Exercises 648 Chapter Review Questions/Exercises 700
Exercise 648 Exercise 701

Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
xii Contents

39. Public Key Infrastructure Exercise 751


(online chapter) 703 References 751

Terence Spies
43. Privacy-Enhancing Technologies 755
Simone Fischer-Hbner and Stefan Berthold
40. Password-based Authenticated
Key Establishment Protocols 705 1. The Concept of Privacy 755
2. Legal Privacy Principles 756
Jean Lancrenon, Dalia Khader, Peter Y.A. Ryan 3. Classification of PETs 757
and Feng Hao 4. Traditional Privacy Goals of PETs 758
1. Introduction to Key Exchange 705 5. Privacy Metrics 758
2. Password-Authenticated Key Exchange 709 6. Data Minimization Technologies 760
3. Concrete Protocols 711 7. Transparency-Enhancing Tools 767
4. Summary 718 8. Summary 770
Chapter Review Questions/Exercises 718 Chapter Review Questions/Exercises 770
Exercise 719 Exercise 771
References 719 References 771

44. Personal Privacy Policies 773


41. Instant-Messaging Security 721
George O.M. Yee and Larry Korba
Samuel J.J. Curry
1. Introduction 773
1. Why Should I Care about Instant
2. Content of Personal Privacy Policies 774
Messaging? 721
3. Semiautomated Derivation of Personal
2. What is Instant Messaging? 721
Privacy Policies 776
3. The Evolution of Networking
4. Specifying Well-Formed Personal
Technologies 722
Privacy Policies 779
4. Game Theory and Instant Messaging 723
5. Preventing Unexpected Negative
5. The Nature of the Threat 725
Outcomes 782
6. Common IM Applications 729
6. The Privacy Management Model 784
7. Defensive Strategies 730
7. Discussion and Related Work 788
8. Instant-Messaging Security Maturity
8. Summary 791
and Solutions 730
Chapter Review Questions/Exercises 791
9. Processes 732
Exercise 792
10. Summary 732
Chapter Review Questions/Exercises 734
Exercise 735 45. Detection of Conflicts in
Security Policies 793
Cataldo Basile, Matteo Maria Casalino,
Copyright © 2013. Elsevier Science & Technology. All rights reserved.

Part V Simone Mutti and Stefano Paraboschi


Privacy and Access Management 737 1. Introduction 793
2. Conflicts in Security Policies 793
42. Privacy on the Internet 739 3. Conflicts in Executable Security Policies 797
4. Conflicts in Network Security Policies 800
Marco Cremonini, Chiara Braghin and
5. Query-Based Conflict Detection 801
Claudio Agostino Ardagna
6. Semantic Web Technology for Conflict
1. Privacy in the Digital Society 739 Detection 807
2. The Economics of Privacy 742 7. Summary 810
3. Privacy-Enhancing Technologies 744 Chapter Review Questions/Exercises 810
4. Network Anonymity 747 Exercise 811
5. Summary 750 Acknowledgments 811
Chapter Review Questions/Exercises 750 References 811

Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
Contents xiii

46. Supporting User Privacy Preferences 10. Mobile VPN 865


in Digital Interactions 813 11. VPN Deployments 865
12. Summary 866
Sara Foresti and Pierangela Samarati Chapter Review Questions/Exercises 866
1. Introduction 813 Exercise 867
2. Basic Concepts and Desiderata 814 Resources 867
3. Cost-Sensitive Trust Negotiation 818
4. Point-Based Trust Management 820
49. Identity Theft (online chapter) 869
5. Logical-Based Minimal Credential
Disclosure 822 Markus Jakobsson and Alex Tsow
6. Privacy Preferences in Credential-
Based Interactions 825
7. Fine-Grained Disclosure of Sensitive 50. VoIP Security 871
Access Policies 829 Harsh Kupwade Patil, Dan Wing and
8. Open Issues 832 Thomas M. Chen
9. Summary 832
Chapter Review Questions/Exercises 832 1. Introduction 871
Exercise 833 2. Overview of Threats 873
Acknowledgments 833 3. Security in VoIP 878
References 833 4. Future Trends 880
5. Summary 884
Chapter Review Questions/Exercises 885
47. Privacy and Security in Environmental Exercise 886
Monitoring Systems: Issues and
Solutions 835
Sabrina De Capitani di Vimercati, Angelo Part VI
Genovese, Giovanni Livraga, Vincenzo Piuri Storage Security 887
and Fabio Scotti
1. Introduction 835 51. SAN Security (online chapter) 889
2. System Architectures 836 John McGowan, Jeffrey Bardin and
3. Environmental Data 838 John McDonald
4. Security and Privacy Issues in
Environmental Monitoring 839
5. Countermeasures 841 52. Storage Area Networking Security
6. Summary 850 Devices 891
Chapter Review Questions/Exercises 850
Robert Rounsavall
Exercise 851
Acknowledgments 851 1. What is a SAN? 891
References 851 2. San Deployment Justifications 891
Copyright © 2013. Elsevier Science & Technology. All rights reserved.

3. The Critical Reasons for SAN Security 892


4. SAN Architecture and Components 893
48. Virtual Private Networks 855 5. SAN General Threats and Issues 894
James T. Harmening 6. Summary 903
Chapter Review Questions/Exercises 903
1. History 856
Exercise 904
2. Who is in Charge? 859
3. VPN Types 860
4. Authentication Methods 863 53. Risk Management 905
5. Symmetric Encryption 863
Sokratis K. Katsikas
6. Asymmetric Cryptography 864
7. Edge Devices 864 1. The Concept of Risk 906
8. Passwords 864 2. Expressing and Measuring Risk 906
9. Hackers and Crackers 865 3. The Risk Management Methodology 909

Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
xiv Contents

4. Risk Management Laws and 57. Homeland Security


Regulations 921 (online chapter) 973
5. Risk Management Standards 924
6. Summary 926 Rahul Bhaskar and Bhushan Kapoor
Chapter Review Questions/Exercises 926
Exercise 927
58. Cyber Warfare 975
Anna Granova and Marco Slaviero
Part VII 1. Cyber Warfare Model 975
Physical Security 929 2. Cyber Warfare Defined 976
3. CW: Myth or Reality? 977
54. Physical Security Essentials 931 4. Cyber Warfare: Making CW Possible 979
5. Legal Aspects of CW 985
William Stallings 6. Holistic View of Cyber Warfare 989
1. Overview 931 7. Summary 989
2. Physical Security Threats 932 Chapter Review Questions/Exercises 989
3. Physical Security Prevention and Exercise 990
Mitigation Measures 936
4. Recovery from Physical Security
Breaches 938 Part VIII
5. Threat Assessment, Planning, and Practical Security 991
Plan Implementation 938
6. Example: A Corporate Physical
59. System Security 993
Security Policy 939
7. Integration of Physical and Lauren Collins
Logical Security 939
1. Foundations of Security 993
8. Physical Security Checklist 945
2. Basic Countermeasures 997
9. Summary 945
3. Summary 999
Chapter Review Questions/Exercises 945
Chapter Review Questions/Exercises 1000
Exercise 945
Exercise 1000

55. Disaster Recovery 947 60. Securing the Infrastructure 1001


Scott R. Ellis and Lauren Collins Lauren Collins
1. Introduction 947 1. Communication Security Goals 1001
2. Measuring Risk and Avoiding Disaster 947 2. Attacks and Countermeasures 1008
3. The Business Impact Assessment (BIA) 949 3. Summary 1011
4. Summary 954 Chapter Review Questions/Exercises 1012
Copyright © 2013. Elsevier Science & Technology. All rights reserved.

Chapter Review Questions/Exercises 954 Exercise 1013


Exercise 955

56. Biometrics 957 61. Access Controls 1015


Luther Martin Lauren Collins
1. Relevant Standards 958 1. Infrastructure Weaknesses:
2. Biometric System Architecture 958 DAC, MAC, and RBAC 1015
3. Using Biometric Systems 965 2. Strengthening the Infrastructure:
4. Security Considerations 967 Authentication Systems 1018
5. Summary 971 3. Summary 1020
Chapter Review Questions/Exercises 971 Chapter Review Questions/Exercises 1021
Exercise 971 Exercise 1021

Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
Contents xv

62. Assessments and Audits 1023 5. Overview of Current Online


Reputation Service 1063
Lauren Collins 6. Summary 1070
1. Assessing Vulnerabilities and Risk: Chapter Review Questions/Exercises 1071
Penetration Testing and Vulnerability Exercise 1071
Assessments 1023 Bibliography 1072
2. Risk Management: Quantitative Risk
Measurements 1027
3. Summary 1028 66. Content Filtering (online chapter) 1073
Chapter Review Questions/Exercises 1030
Pete Nicoletti
Exercise 1030

63. Fundamentals of Cryptography 1031 67. Data Loss Protection 1075


Scott R. Ellis Ken Perkins
1. Assuring Privacy with Encryption 1031 1. Precursors of DLP 1076
2. Summary 1037 2. What is DLP? 1077
Chapter Review Questions/Exercises 1037 3. Where to Begin? 1082
Exercise 1038 4. Data is Like Water 1082
5. You Don’t Know What You Don’t
Know 1084
Part IX 6. How Do DLP Applications Work? 1085
Advanced Security 1039 7. Eat Your Vegetables 1086
8. IT’s a Family Affair, Not Just IT
64. Security Through Diversity 1041 Security’s Problem 1089
9. Vendors, Vendors Everywhere!
Kevin Noble Who do you Believe? 1089
1. Ubiquity 1042 10. Summary 1090
2. Example Attacks Against Uniformity 1043 Chapter Review Questions/Exercises 1091
3. Attacking Ubiquity with Antivirus Exercise 1091
Tools 1044
4. The Threat of Worms 1044
5. Automated Network Defense 1046 68. Satellite Cyber Attack Search
6. Diversity and the Browser 1047 and Destroy 1093
7. Sandboxing and Virtualization 1048 Jeffrey Bardin
8. DNS Example of Diversity Through
Security 1048 1. Hacks, Interference, and Jamming 1093
9. Recovery from Disaster is Survival 1049 2. Summary 1100
10. Summary 1049 Chapter Review Questions/Exercises 1100
Copyright © 2013. Elsevier Science & Technology. All rights reserved.

Chapter Review Questions/Exercises 1050 Exercise 1101


Exercise 1051 References 1101

65. Online e-Reputation Management 69. Verifiable Voting Systems 1103


Services 1053
Thea Peacock, Peter Y.A. Ryan,
Jean-Marc Seigneur Steve Schneider and Zhe Xia
1. Introduction 1053 1. Introduction 1103
2. The Human Notion of Reputation 1054 2. Security Requirements 1103
3. Reputation Applied to the 3. Verifiable Voting Schemes 1105
Computing World 1056 4. Building Blocks 1106
4. State of the Art of Attack—Resistant 5. Survey of Noteworthy Schemes 1113
Reputation Computation 1059 6. Threats to Verifiable Voting Systems 1121

Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
xvi Contents

7. Summary 1121 3. Summary 1136


Chapter Review Questions/Exercises 1122 Chapter Review Questions/Exercises 1136
Exercise 1123 Exercise 1138
References 1123 References 1138

70. Advanced Data Encryption 1127 Index 1139


Pramod Pandya
1. Mathematical Concepts Reviewed 1127
2. The RSA Cryptosystem 1131

Online Chapters and Appendices 21. Firewall Management e18


22. Summary e19
29. Firewalls e1 Chapter Review Questions/Exercises e19
Exercise e20
Dr. Errin W. Fulp
1. Introduction e1 39. Public Key Infrastructure e21
2. Network Firewalls e1
3. Firewall Security Policies e2 Terence Spies
4. A Simple Mathematical Model for
1. Cryptographic Background e21
Policies, Rules, and Packets e3
2. Overview of PKI e23
5. First-Match Firewall Policy Anomalies e4
3. The X.509 Model e24
6. Policy Optimization e5
4. X.509 Implementation Architectures e25
7. Firewall Types e6
5. X.509 Certificate Validation e26
8. Host and Network Firewalls e7
6. X.509 Certificate Revocation e28
9. Software and Hardware Firewall
7. Server-Based Certificate Validity
Implementations e7
Protocol e29
10. Choosing the Correct Firewall e8
8. X.509 Bridge Certification Systems e30
11. Firewall Placement and Network
9. X.509 Certificate Format e31
Topology e8
10. PKI Policy Description e34
12. Firewall Installation and Configuration e10
11. PKI Standards Organizations e34
13. Supporting Outgoing Services Through
12. PGP Certificate Formats e35
Firewall Configuration e11
13. PGP PKI Implementations e36
14. Secure External Services Provisioning e12
14. W3C e36
Copyright © 2013. Elsevier Science & Technology. All rights reserved.

15. Network Firewalls for Voice and Video


15. Is PKI Secure? e36
Applications e12
16. Alternative PKI Architectures e37
16. Firewalls and Important Administrative
17. Modified X.509 Architectures e37
Service Protocols e13
18. Alternative Key Management Models e38
17. Internal IP Services Protection e15
19. Summary e38
18. Firewall Remote Access Configuration e16
Chapter Review Questions/Exercises e39
19. Load Balancing and Firewall Arrays e16
Exercise e40
20. Highly Available Firewalls e18
References e40

Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
Contents xvii

49. Identity Theft e41 66. Content Filtering e101


Markus Jakobsson and Alex Tsow Pete Nicoletti, CISSP, CISA, CCSK
1. Experimental Design e42 1. Defining the Problem e101
2. Results and Analysis e48 2. Why Content Filtering is Important e102
3. Implications for Crimeware e57 3. Content Categorization Technologies e104
Summary e58 4. Perimeter Hardware and Software
Chapter Review Questions/Exercises e59 Solutions e106
Exercise e60 5. Categories e110
6. Legal Issues e110
7. Circumventing Content Filtering e114
51. SAN Security e61 8. Additional Items to Consider:
Overblocking and Underblocking e117
John McGowan, Jeffrey Bardin and John 9. Related Products e119
McDonald 10. Summary e120
1. Organizational Structure e61 Chapter Review Questions/Exercises e121
2. Access Control Lists (ACl) and policies e63 Exercise e121
3. Physical Access e64
4. Change Management e64
5. Password Policies e65 Appendix A Configuring
6. Defense in Depth e65 Authentication Service
7. Vendor Security Review e65 on Microsoft Windows 7 e125
8. Data Classification e65
9. Security Management e65
10. Auditing e66 Appendix B Security Management
11. Security Maintenance e66 and Resiliency e129
12. Host Access: Partitioning e67
13. Data Protection: Replicas e68
14. Encryption in Storage e71 Appendix C List of Top Security
15. Application of Encryption e73 Implementation
16. Summary e81
and Deployment
Chapter Review Questions/Exercises e82
Exercise e83
Companies e131
References e83

Appendix D List of Security


57. Homeland Security e85 Products e135
Rahul Bhaskar, Ph.D. and Bhushan Kapoor
1. Statutory Authorities e85 Appendix E List of Security
Copyright © 2013. Elsevier Science & Technology. All rights reserved.

2. Homeland Security Presidential Standards e139


Directives e91
3. Organizational Actions e92
4. Summary e94 Appendix F List of Miscellaneous
Chapter Review Questions/Exercises e98 Security Resources e141
Exercise e99

Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
xviii Contents

Appendix G Ensuring Built-in Appendix J Case Studies e157


Frequency Hopping
Spread Spectrum
Appendix K Answers To Review
Wireless Network
Security e149 Questions/Exercises,
Hands-On Projects,
Case Projects And
Appendix H Configuring Wireless Optional Team Case
Internet Security Project By Chapter e173
Remote Access e151
Appendix L Glossary e245
Appendix I Frequently Asked
Questions e155
Copyright © 2013. Elsevier Science & Technology. All rights reserved.

Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.

You might also like