Table of Contents
Security for Today
Chapter 1 Introduction
- The New Insecurity
- What Is Computer Security?
- Threats to Security
- Why Buy Security?
- What’s a User to Do?
Chapter 2 Some Security History
- Information and Its Controls
- Computer Security: Then and Now
- Early Computer Security Efforts
- Building Toward Standardization
- Computer Security Mandates and Legislation
Chapter 3 Computer System Security and Access Controls
- What Makes a System Secure?
- System Access: Logging into Your System
Chapter 4 Viruses and Other Wildlife
- Financial Effects of Malicious Programs
- Viruses and Public Health
- Viruses, Worms, and Trojans (Oh, My!)
- Who Writes Viruses?
- The Virus Hype
- An Ounce of Prevention
Chapter 5 Establishing and Maintaining a Security Policy
- Administrative Security
- Overall Planning and Administration
- Day-to-Day Administration
- Separation of Duties
Chapter 6 Web Attacks and Internet Vulnerabilities
- About the Internet
- What Are the Network Protocols?
- The Fragile Web
Chapter 7 Encryption
- Some History
- What Is Encryption?
- The Data Encryption Standard
- Other Cryptographic Algorithms
- Message Authentication
- Government Cryptographic Programs
- Cryptographic Export Restrictions
Chapter 8 Communications and Network Security
- What Makes Communication Secure?
- Network Security
Other Types of Security
Chapter 9 Physical Security and Biometrics
- Physical Security
- Locks and Keys: Old and New
- Gentle Reminder
Chapter 10 Wireless Network Security
- How We Got Here
- Today’s Wireless Infrastructure
- How Wireless Works
- Playing the Fields
- What Is This dB Stuff?
- Why Does All This Matter?
- Encouraging Diversity
- Physical Layer Wireless Attacks
Appendix OSI Model
- The Problem of Emanations
- The TEMPEST Program
- TEMPEST Standards
- Hard As You Try
Appendix The Orange Book, FIPS PUBS, and the Common Criteria
- About the Orange Book
- Rating by the Book
- Summary of Orange Book Classes
- FIPS by the Numbers
- I Don’t Want You Smelling My Fish