計算機安全原理

出版時間:2005-6  出版社:第1版 (2005年6月1日)  作者:康克林 (Conk lin.W.A.)  頁數(shù):651  字數(shù):950000  

內(nèi)容概要

通過本書,既可以學習到計算機和網(wǎng)絡(luò)安全的基礎(chǔ)知識,又可以為參加 CompTIA的Security+認證考試做好準備;本書也涵蓋了(ISC)2 SSCP認證考試的內(nèi)容——該認證考試側(cè)重于最佳實踐、安全專家的角色以及責任。本書由IT安全領(lǐng)域的專家編寫,從信息安全的三個層面——技術(shù)、實踐和意識— —較為全面地闡述了通信、基礎(chǔ)設(shè)施和操作安全的基本原理;還詳細介紹了計算機系統(tǒng)和網(wǎng)絡(luò)如何防御各種攻擊?! ”緯舶?4章,分別講述了以下主題:計算機安全概論與趨勢,一般的安全概念,運營/組織安全,人員在安全中的作用,加密,公鑰基礎(chǔ)結(jié)構(gòu),標準和協(xié)議,物理安全對網(wǎng)絡(luò)安全的影響,網(wǎng)絡(luò)基礎(chǔ),基礎(chǔ)結(jié)構(gòu)安全,遠程訪問,無線通信與及時消息,安全基線,攻擊和惡意代碼,Email,Web組件,軟件開發(fā),災(zāi)難恢復(fù)、業(yè)務(wù)連續(xù)性與組織策略,風險管理,變更管理,有關(guān)計算機的爭論,安全與法律?! ”緯m合作為計算機專業(yè)、信息系統(tǒng)與管理專業(yè)、電子信息科學專業(yè)的本科生教材。

書籍目錄

 Acknowledgments Foreword Preface IntroductionChapter 1 Introduction and Security Trends The Security Problem Security Incidents Threats to Security Security Trends Avenues of Attack The Steps in an Attack Minimizing Possible Avenues of Attack Types of Attacks Ghapter ReviewChapter 2 General Security Concepts Basic Security Terminology Security Basics Access Control Authentication Security Models Confidentiality Models Integrity Models Chapter ReviewChapter 3 Operational/Organizational Security Security Operations in Your Organization Policies, Procedures, Standards, and Guidelines The Security Perimeter Physical Security Access Controls Physical Barriers Social Engineering Environment Fire Suppression Wireless Electromagnetic Eavesdropping Shielding Location ChapterChapter 4 The Role of People in Security People--A Security Problem Poor Security Practices Social Engineering People as a Security Tool Security Awareness Chapter ReviewChapter 5 Cryptography Algorithms Hashing SHA Message Digest (MD) Hashing Summary Symmetric Encryption DES 3DES AES CAST RC Blowfish IDEA Symmetric Encryption Summary Asymmetric Encryption RSA Diffie-Hellman EIGamal ECC Asymmetric Encryption Summary Usage Confidentiality Integrity Nonrepudiation Authentication Digital Signatures Key Escrow Chapter ReviewChapter 6 Public Key Infrastructure The Basics of Public Key Infrastructures Certificate Authorities Registration Authorities Local Registration Authorities Certificate Repositories Trust and Certificate Verification Digital Certificates Certificate Attributes Certificate Extensions Certificate Lifecycles Centralized or Decentralized Infrastructures Hardware Storage Devices Private Key Protection Key Recovery Key Escrow Public Certificate Authorities In-House Certificate Authorities Outsourced Certificate Authorities Tying Different PI(Is Together Trust Models Certificate Usage Chapter ReviewChapter 7 Standards and Protocols PKIX/PKCS PKIX Standards PKCS Why You Need to Know X.509 SSL/TLS ISAKMP CMP XKMS S/MIME IETFS/MIME v3 Specifications PGP How It Works Where Can You Use PCP? HTFPS IPSec CEP FIPS Common Criteria (CC) WTLS WEP WEP Security Issues ISO 17799 Chapter ReviewChapter 8 The Impact of Physical Security on Network Security The Problem Physical Security Safeguards Policies and Procedures Access Controls Authentication Chapter ReviewChapter 9 Network Fundamentals Network Architectures Network Topology Network Protocols Packets TCP vs. UDP ICMP Packet Delivery Local Packet Delivery Remote Packet Delivery Subnetting Network Address Translation Chapter ReviewChapter 10 Infrastructure Security Devices Workstations Savers Network Interface Cards (NICs) Hubs Bridges Switches Routers Firewalls Wireless Modems RAS Telecom/PBX VPN IDS Network Monitoring/Diagnostic Mobile Devices Media Coax UTP/STP Fiber Unguided Media Security Concerns for Transmission Media Physical Security Removable Media Magnetic Media  Optical Media Electronic Media Security Topologies Security Zones VLANs NAT Tunneling Ghapter ReviewChapter 11 Remote Access  The Remote Access Process Identification Authentication Authorization Telnet SSH L2TP and PPIp PPIP L2TP IEEE 802.11 VPN IPSec IPSec Configurations IPSec Security IEEE 802. Ix RADIUS RADIUS Authentication RADIUS Authorization RADIUS Accounting DIAMETER TACACS+ TACACS+ Authentication TAGACS+ Authorization TAGAGS+ Accounting Vulnerabilities Connection Summary Ghapter ReviewChapter 12 Wireless and Instant Hessaging Wireless WAP and WTLS 802.11 Instant Messaging  Chapter Review Chapter 13 Intrusion Detection Systems History of Intrusion Detectiion Systems IDS Overview Host-Based Intrusion Detection Systems Advantages of Host-Based IDSs Disadvantages of Host-Based IDSs Active vs. Passive Host-Based IDSs Network-Based Intrusion Detection Systems Advantages of a Network-Based IDS Disadvantages of a Network-Based 1DS Active vs. Passive Network-Based IDSs Signatures False Positives and Negatives IDS Models Preventative Intrusion Detection Systems IDS Products and Vendors Honeypots Incident Response Ghapter ReviewChapter 14 Security Baselines Oven, Jew Baselines Password Selection Password Polio/Guidelines Selecting a Password Components of a Good Password Password Aging  Operating System and Network Operating System Hardening Hardening Microsoft Operating Systems Hardening UNIX-or Linux-BaSed Operating Systems Network Hardening Software Updates Device Configuration Ports and Services Traffic Filtering Application Hardening Application Patches Web Servers  Mall Servers FIP Servers DNS Servers File and Print Services Active Directory Chapter ReviewChapter 15 Attacks and Malware Attacking Computer Systems and Networks DeniM-of-Service Attacks Backdoors and Trapdoors Sniffing Spoofing Man-in-the-Middle Attacks Replay Attacks TCP/IP Hijacking Attacks on Encryption Password Guessing Software Exploitation Wardialing and WarDriving Social Engineering Malware Auditing Chapter ReviewChapter 16 E-mail Security of E-mail Transmissions Malidous Code Hoax E-mails Unsolicited Commercial E-mail (Spare) Mail Encrypfon Chapter ReviewChapter 17 Web Components Current Web Components and Concerns Protocols Encryption (SSL and TLS) The Web (HTTP and HTIPS) Web Services Directory Services (DAP and LDAP) File Transfer (FIT and SFTP) Vulnerabilities Code-Based Vulnerabilities Buffer Overflows Java and IavaScript ActiveX CGI  Server-Side Scripts  Cookies Signed Applets  Browser Plug-Ins Chapter ReviewChapter 18 Software Development The Software EngineeeingProcess Process Models ROI and Error Correction Secure Code Techniques Good Practices Requirements  Testing  Chapter ReviewChapter 19 Disaster Recovery, Business Continuity, and Organizational Policies Disaster Recovery Disaster Recovery Plans/Process  Backups Utilities Secure Recovery  High Availability and Fault Tolerance Computer Incident Response Teams  Test, Exercise, and Rehearse Policies and Procedures Security Policies  Privacy  Service Level Agreements Human Resources Policies  Code of Ethics  Incident Response Policies  Chapter Review Chapter 20 Risk Management An Overview of Risk Management Macro-Level Example of Risk Management International Banking Key Terms Essential to Understanding Risk Management What Is Risk Management? Business Risks Examples of Business Risks Examples of Technology Risks  Risk Management Models General Risk Management Model  Software Engineering Institute Model Qualitatively Assessing Risk  Quantitatively Assessing Risk  Qualitative vs. Quantitative Risk Assessmem  Tools Chapter ReviewChapter 21 Change Management Why Change Management?  The Key Concept: Segregation of Duties  Elements of Change Management Implementing Change Management The Purpose of a Change Control Board Code Integrity  The Capability Maturity Model Chapter ReviewChapter 22 Privilege Management User, Group, and Role Management User. Groups  Role  Single Sign-On Centralized vs. Decentralized Management Centralized Management Decentralized Management The Decentralized, Gentralized Model Auditing (Privilege, Usage, and Escalation)  Privilege Auditing  Usage Auditing  Escalation Auditing Handling Access Control (MAC, DAC, and RBAC) Mandatory Access Control (MAC) Discretionary Access Control (DAC) Role-Based Access Control (RBAC)  Chapter Review Chapter 23 Computer Forensics Evidence Standards for Evidence  Types of Evidence  Three Rules Regarding Evidence  Collecting Evidence  Acquiring Evidence Identifying Evidence  Protecting Evidence  Transporting Evidence  Storing Evidence Conducting the Investigation Chain of Custody  Free Space vs. Slack Space  Free Space Slack Space  What's This Message Digest and Hash? Analysis Chapter ReviewChapter 24 Security and Law  Import/Export Encryption Restrictions United States Law  Non-U.S. Laws Digital Signature Laws Non-U.S. Laws Digital Rights Management Privacy Laws  United States Laws European Laws  Computer Trespass  Convention on Cybercrime  Ethics Chapter Review  GlossaryIndex

圖書封面

評論、評分、閱讀與下載


    計算機安全原理 PDF格式下載


用戶評論 (總計0條)

 
 

 

250萬本中文圖書簡介、評論、評分,PDF格式免費下載。 第一圖書網(wǎng) 手機版

京ICP備13047387號-7