出版時間:2005-6 出版社:第1版 (2005年6月1日) 作者:康克林 (Conk lin.W.A.) 頁數(shù):651 字數(shù):950000
內(nèi)容概要
通過本書,既可以學習到計算機和網(wǎng)絡(luò)安全的基礎(chǔ)知識,又可以為參加 CompTIA的Security+認證考試做好準備;本書也涵蓋了(ISC)2 SSCP認證考試的內(nèi)容——該認證考試側(cè)重于最佳實踐、安全專家的角色以及責任。本書由IT安全領(lǐng)域的專家編寫,從信息安全的三個層面——技術(shù)、實踐和意識— —較為全面地闡述了通信、基礎(chǔ)設(shè)施和操作安全的基本原理;還詳細介紹了計算機系統(tǒng)和網(wǎng)絡(luò)如何防御各種攻擊?! ”緯舶?4章,分別講述了以下主題:計算機安全概論與趨勢,一般的安全概念,運營/組織安全,人員在安全中的作用,加密,公鑰基礎(chǔ)結(jié)構(gòu),標準和協(xié)議,物理安全對網(wǎng)絡(luò)安全的影響,網(wǎng)絡(luò)基礎(chǔ),基礎(chǔ)結(jié)構(gòu)安全,遠程訪問,無線通信與及時消息,安全基線,攻擊和惡意代碼,Email,Web組件,軟件開發(fā),災(zāi)難恢復(fù)、業(yè)務(wù)連續(xù)性與組織策略,風險管理,變更管理,有關(guān)計算機的爭論,安全與法律?! ”緯m合作為計算機專業(yè)、信息系統(tǒng)與管理專業(yè)、電子信息科學專業(yè)的本科生教材。
書籍目錄
Acknowledgments Foreword Preface IntroductionChapter 1 Introduction and Security Trends The Security Problem Security Incidents Threats to Security Security Trends Avenues of Attack The Steps in an Attack Minimizing Possible Avenues of Attack Types of Attacks Ghapter ReviewChapter 2 General Security Concepts Basic Security Terminology Security Basics Access Control Authentication Security Models Confidentiality Models Integrity Models Chapter ReviewChapter 3 Operational/Organizational Security Security Operations in Your Organization Policies, Procedures, Standards, and Guidelines The Security Perimeter Physical Security Access Controls Physical Barriers Social Engineering Environment Fire Suppression Wireless Electromagnetic Eavesdropping Shielding Location ChapterChapter 4 The Role of People in Security People--A Security Problem Poor Security Practices Social Engineering People as a Security Tool Security Awareness Chapter ReviewChapter 5 Cryptography Algorithms Hashing SHA Message Digest (MD) Hashing Summary Symmetric Encryption DES 3DES AES CAST RC Blowfish IDEA Symmetric Encryption Summary Asymmetric Encryption RSA Diffie-Hellman EIGamal ECC Asymmetric Encryption Summary Usage Confidentiality Integrity Nonrepudiation Authentication Digital Signatures Key Escrow Chapter ReviewChapter 6 Public Key Infrastructure The Basics of Public Key Infrastructures Certificate Authorities Registration Authorities Local Registration Authorities Certificate Repositories Trust and Certificate Verification Digital Certificates Certificate Attributes Certificate Extensions Certificate Lifecycles Centralized or Decentralized Infrastructures Hardware Storage Devices Private Key Protection Key Recovery Key Escrow Public Certificate Authorities In-House Certificate Authorities Outsourced Certificate Authorities Tying Different PI(Is Together Trust Models Certificate Usage Chapter ReviewChapter 7 Standards and Protocols PKIX/PKCS PKIX Standards PKCS Why You Need to Know X.509 SSL/TLS ISAKMP CMP XKMS S/MIME IETFS/MIME v3 Specifications PGP How It Works Where Can You Use PCP? HTFPS IPSec CEP FIPS Common Criteria (CC) WTLS WEP WEP Security Issues ISO 17799 Chapter ReviewChapter 8 The Impact of Physical Security on Network Security The Problem Physical Security Safeguards Policies and Procedures Access Controls Authentication Chapter ReviewChapter 9 Network Fundamentals Network Architectures Network Topology Network Protocols Packets TCP vs. UDP ICMP Packet Delivery Local Packet Delivery Remote Packet Delivery Subnetting Network Address Translation Chapter ReviewChapter 10 Infrastructure Security Devices Workstations Savers Network Interface Cards (NICs) Hubs Bridges Switches Routers Firewalls Wireless Modems RAS Telecom/PBX VPN IDS Network Monitoring/Diagnostic Mobile Devices Media Coax UTP/STP Fiber Unguided Media Security Concerns for Transmission Media Physical Security Removable Media Magnetic Media Optical Media Electronic Media Security Topologies Security Zones VLANs NAT Tunneling Ghapter ReviewChapter 11 Remote Access The Remote Access Process Identification Authentication Authorization Telnet SSH L2TP and PPIp PPIP L2TP IEEE 802.11 VPN IPSec IPSec Configurations IPSec Security IEEE 802. Ix RADIUS RADIUS Authentication RADIUS Authorization RADIUS Accounting DIAMETER TACACS+ TACACS+ Authentication TAGACS+ Authorization TAGAGS+ Accounting Vulnerabilities Connection Summary Ghapter ReviewChapter 12 Wireless and Instant Hessaging Wireless WAP and WTLS 802.11 Instant Messaging Chapter Review Chapter 13 Intrusion Detection Systems History of Intrusion Detectiion Systems IDS Overview Host-Based Intrusion Detection Systems Advantages of Host-Based IDSs Disadvantages of Host-Based IDSs Active vs. Passive Host-Based IDSs Network-Based Intrusion Detection Systems Advantages of a Network-Based IDS Disadvantages of a Network-Based 1DS Active vs. Passive Network-Based IDSs Signatures False Positives and Negatives IDS Models Preventative Intrusion Detection Systems IDS Products and Vendors Honeypots Incident Response Ghapter ReviewChapter 14 Security Baselines Oven, Jew Baselines Password Selection Password Polio/Guidelines Selecting a Password Components of a Good Password Password Aging Operating System and Network Operating System Hardening Hardening Microsoft Operating Systems Hardening UNIX-or Linux-BaSed Operating Systems Network Hardening Software Updates Device Configuration Ports and Services Traffic Filtering Application Hardening Application Patches Web Servers Mall Servers FIP Servers DNS Servers File and Print Services Active Directory Chapter ReviewChapter 15 Attacks and Malware Attacking Computer Systems and Networks DeniM-of-Service Attacks Backdoors and Trapdoors Sniffing Spoofing Man-in-the-Middle Attacks Replay Attacks TCP/IP Hijacking Attacks on Encryption Password Guessing Software Exploitation Wardialing and WarDriving Social Engineering Malware Auditing Chapter ReviewChapter 16 E-mail Security of E-mail Transmissions Malidous Code Hoax E-mails Unsolicited Commercial E-mail (Spare) Mail Encrypfon Chapter ReviewChapter 17 Web Components Current Web Components and Concerns Protocols Encryption (SSL and TLS) The Web (HTTP and HTIPS) Web Services Directory Services (DAP and LDAP) File Transfer (FIT and SFTP) Vulnerabilities Code-Based Vulnerabilities Buffer Overflows Java and IavaScript ActiveX CGI Server-Side Scripts Cookies Signed Applets Browser Plug-Ins Chapter ReviewChapter 18 Software Development The Software EngineeeingProcess Process Models ROI and Error Correction Secure Code Techniques Good Practices Requirements Testing Chapter ReviewChapter 19 Disaster Recovery, Business Continuity, and Organizational Policies Disaster Recovery Disaster Recovery Plans/Process Backups Utilities Secure Recovery High Availability and Fault Tolerance Computer Incident Response Teams Test, Exercise, and Rehearse Policies and Procedures Security Policies Privacy Service Level Agreements Human Resources Policies Code of Ethics Incident Response Policies Chapter Review Chapter 20 Risk Management An Overview of Risk Management Macro-Level Example of Risk Management International Banking Key Terms Essential to Understanding Risk Management What Is Risk Management? Business Risks Examples of Business Risks Examples of Technology Risks Risk Management Models General Risk Management Model Software Engineering Institute Model Qualitatively Assessing Risk Quantitatively Assessing Risk Qualitative vs. Quantitative Risk Assessmem Tools Chapter ReviewChapter 21 Change Management Why Change Management? The Key Concept: Segregation of Duties Elements of Change Management Implementing Change Management The Purpose of a Change Control Board Code Integrity The Capability Maturity Model Chapter ReviewChapter 22 Privilege Management User, Group, and Role Management User. Groups Role Single Sign-On Centralized vs. Decentralized Management Centralized Management Decentralized Management The Decentralized, Gentralized Model Auditing (Privilege, Usage, and Escalation) Privilege Auditing Usage Auditing Escalation Auditing Handling Access Control (MAC, DAC, and RBAC) Mandatory Access Control (MAC) Discretionary Access Control (DAC) Role-Based Access Control (RBAC) Chapter Review Chapter 23 Computer Forensics Evidence Standards for Evidence Types of Evidence Three Rules Regarding Evidence Collecting Evidence Acquiring Evidence Identifying Evidence Protecting Evidence Transporting Evidence Storing Evidence Conducting the Investigation Chain of Custody Free Space vs. Slack Space Free Space Slack Space What's This Message Digest and Hash? Analysis Chapter ReviewChapter 24 Security and Law Import/Export Encryption Restrictions United States Law Non-U.S. Laws Digital Signature Laws Non-U.S. Laws Digital Rights Management Privacy Laws United States Laws European Laws Computer Trespass Convention on Cybercrime Ethics Chapter Review GlossaryIndex
圖書封面
評論、評分、閱讀與下載