Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Computer Security -  John M. Carroll

Computer Security (eBook)

eBook Download: PDF
2014 | 2. Auflage
462 Seiten
Elsevier Science (Verlag)
978-1-4831-0301-3 (ISBN)
Systemvoraussetzungen
53,86 inkl. MwSt
(CHF 52,60)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Computer Security, Second Edition aims to present different ideas and practices that promote the prevention of attacks on computer systems and data being compromised. The book is divided into five parts. Part I covers the important elements of computer security and case histories of computer-related crimes. Part II discusses the organizations and models for the protection of information. Part III talks about the physical security involved and access control involved in data protection. Part IV deals with the different measures employed to promote security in the communication between computers. Part V explains systems security, its access control, and integrity. The text is recommended for people involved in the promotion of computer security, especially programmers and IT practitioners, in institutions where computer-processed information is crucial and must be protected.
Computer Security, Second Edition aims to present different ideas and practices that promote the prevention of attacks on computer systems and data being compromised. The book is divided into five parts. Part I covers the important elements of computer security and case histories of computer-related crimes. Part II discusses the organizations and models for the protection of information. Part III talks about the physical security involved and access control involved in data protection. Part IV deals with the different measures employed to promote security in the communication between computers. Part V explains systems security, its access control, and integrity. The text is recommended for people involved in the promotion of computer security, especially programmers and IT practitioners, in institutions where computer-processed information is crucial and must be protected.

Front Cover 1
Computer Security 4
Copyright Page 5
Table of Contents 8
Dedication 6
Acknowledgments 14
Introduction 16
PART I: The Threat to Computer Security 18
Chapter 1. Essentials of Computer Security 20
UNIQUE EDP SECURITY PROBLEMS 20
EDP SECURITY IN A NUTSHELL 24
Chapter 2. A Casebook of Computer Crime 32
CASE HISTORIES 32
CONCLUSION 53
PART II: Security Management Considerations 56
Chapter 3. Organizing for EDP Security 58
EDP SECURITY IN THE PUBLIC SECTOR 58
EDP SECURITY IN THE PRIVATE SECTOR 59
CORPORATE EDP SECURITY 62
DUTIES OF THE SECURITY COORDINATOR 64
PRINCIPLES OF SECURITY MANAGEMENT 67
Chapter 4. Protection of Information 70
CLASSIFICATION–THE GOVERNMENT MODEL 70
CLASSIFICATION–THE CORPORATE MODEL 74
SPECIAL PROBLEMS WITH EDP 75
MARKING CLASSIFIED MATTER 77
STORING CLASSIFIED MATTER 79
DESTROYING CLASSIFIED MATTER 80
RESIDUAL MEMORY IN MAGNETIC MEDIA 81
PROCEDURAL SAFEGUARDS FOR CLASSIFIED MATTER 83
CONCLUSION 86
Chapter 5. Screening and Management of Personnel 90
MANAGEMENT RESPONSIBILITY 92
RELATIONS WITH VENDORS 93
CATEGORIES OF SECURITY CLEARANCE 93
SECURITY SCREENING OF EMPLOYEES 94
PERSONNEL SECURITY POLICIES 98
CONCLUSION 101
PART III: Physical Security 104
Chapter 6. Physical Access Control 106
BASICS OF ACCESS CONTROL 106
AUTOMATIC ACCESS CONTROL 107
KEY ACCESS CONTROL 111
CONCENTRIC CONTROLLED PERIMETERS 111
OUTER PERIMETER ACCESS 112
BUILDING ACCESS CONTROL 113
CONTROL OF ACCESS TO RESTRICTED AREAS 114
MATERIAL CONTROL IN RESTRICTED AREAS 117
COMPUTER ROOM ACCESS CONTROL 118
Chapter 7. Physical Security 120
THE FORTRESS CONCEPT 120
OUTER PERIMETER DEFENSE 122
BUILDING PERIMETERS 123
RESTRICTED AREA PERIMETER 128
COMPUTER ROOM SECURITY 130
Chapter 8. Environmental Security 134
ELECTRICAL POWER 134
GROUNDING 137
INTERFERENCE SUPPRESSION 139
DUST CONTROL 140
ENVIRONMENTAL CONTROLS 141
Chapter 9. Disaster Control 146
LOCATING THE COMPUTER CENTER 146
PROTECTING THE COMPUTER CENTER 148
AUTOMATIC FIRE DETECTION 153
GENERAL FIRE-SAFETY PLANNING 155
DISASTER RECOVERY 158
PART IV: Communications Security 162
Chapter 10. Line Security 164
COMMUNICATIONS SECURITY SUBFIELDS 164
DEFINITION OF TERMINAL 165
SECURITY OF COMMUNICATIONS CABLES 165
INTERIOR COMMUNICATIONS LINES 169
TELEPHONE INSTRUMENT SECURITY 170
ADDITIONAL LINE SECURITY CONSIDERATIONS 175
LOCAL AREA NETWORKS 176
SPACE RADIO INTERCEPTION 182
Chapter 11. Transmission Security 184
GENERAL CONSIDERATIONS 184
OPERATING PROCEDURES 185
SPEECH PRIVACY 190
ERROR-PROOF CODES 193
TRAFFIC ANALYSIS 196
Chapter 12. Cryptographic Security 198
INTRODUCTION TO CRYPTOLOGY 198
OVERVIEW OF CYPHERS 199
HOW CYPHERS WORK 201
HOW DES WORKS 205
NETWORK COMMUNICATIONS SECURITY 218
WEAKNESSES OF DES 218
WAYS TO USE DES 220
ASYMMETRICAL CYPHERS 223
CRYPTO PROCEDURES 225
CRYPTANALYSIS 227
SUMMARY 229
Chapter 13. Emission Security 230
EMISSION PROBLEMS 230
PROBABILITY OF INTERCEPTION 231
DEFENSE MECHANISMS 233
MEASURING ELECTROMAGNETIC EMANATION LEVELS 234
ADDITIONAL DEFENSES 238
DEFENSE AGAINST ACOUSTICAL EMANATIONS 243
Chapter 14. Technical Security 244
VICTIMIZATION OF EDP CENTERS 244
CATEGORIES OF TECHNICAL SURVEILLANCE 245
DEFENSES AGAINST TECHNICAL SURVEILLANCE 245
TYPES OF INTRUSION DEVICES 250
PART V: Systems Security 254
Chapter 15. Systems Identification 256
INTRODUCTION TO SYSTEMS SECURITY 256
GUIDELINES FOR A TRUSTED COMPUTING BASE 261
PERSONAL IDENTIFICATION 266
OTHER USER IDENTIFICATION SYSTEMS 273
IDENTIFYING SPECIFIED ASSETS 273
SYSTEM RELATIONSHIPS 275
PRIVACY CONSIDERATIONS 276
Chapter 16. Isolation in Computer Systems 278
DEFENSE STRATEGIES 278
PROCESSING MODES 279
TEMPORAL ISOLATION 281
SPATIAL ISOLATION 283
SYSTEM ARCHITECTURE 283
CRYPTOGRAPHIC ISOLATION 295
RESTRICTION OF PRIVILEGE 296
Chapter 17. Systems Access Control 298
BASIC PRINCIPLES OF ACCESS 298
AUTHENTICATION 301
SYSTEMS ACCESS 304
INTERNAL ACCESS 305
ACCESS PRIVILEGES 307
KEEPING HACKERS OUT 310
SYSTEM SECURITY ADD-ON PACKAGES 317
Chapter 18. Detection and Surveillance 322
THREAT MONITORING 322
TREND ANALYSIS 324
INVESTIGATION 330
AUDITING 332
COMPENSATORY ACTION 334
THE HUMAN FACTOR IN COMPUTER CRIME 335
Chapter 19. Systems Integrity 338
PROGRAM SECURITY 338
ERROR CONTROL 341
PRIVACY IN STATISTICAL DATA BASES 345
PROTECTION OF SECURITY FUNCTIONS 349
Chapter 20. Record Keeping and Security 352
LOGS 352
BACKUP FILES 354
RESTART AND RECOVERY 355
RECORD RETENTION 356
INVENTORIES AND LISTS 357
Chapter 21. Systems Reliability and Security 362
HARDWARE 362
SOFTWARE 364
CHANGES 365
SYSTEMS BACKUP 365
PART VI: Threat Evaluation 370
Chapter 22. Threat Evaluation 372
COST OF LOSS 374
TYPES OF LOSS 379
COMPUTER-PROGRAMMED THREAT EVALUATION SURVEY 387
CONCLUSION 394
Appendix: Sample Log Forms 396
Glossary 400
Selected Bibliography 448
Index 454

PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Technische und organisatorische Schutzmaßnahmen gegen Datenverlust …

von Thomas H. Lenhard

eBook Download (2025)
Springer Vieweg (Verlag)
CHF 34,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 45,90
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 38,95