Vai al contenuto principale della pagina

Corporate computer security [[electronic resource] /] / Randall J. Boyle, Raymond R. Panko



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Boyle Randall Visualizza persona
Titolo: Corporate computer security [[electronic resource] /] / Randall J. Boyle, Raymond R. Panko Visualizza cluster
Pubblicazione: Boston : , : Pearson, , [2015]
©2015
Edizione: Fourth, Global edition.
Descrizione fisica: 1 online resource (672 pages) : illustrations, graphs
Disciplina: 005.8
Soggetto topico: Computer security
Persona (resp. second.): PankoRaymond R.
Note generali: Includes index.
Nota di contenuto: Cover -- Contents -- Preface -- About the Authors -- Chapter 1: The Threat Environment -- 1.1 Introduction -- Basic Security Terminology -- The Threat Environment -- Security Goals -- Compromises -- CounterMeasures -- 1.2 Employee and Ex-Employee Threats -- Why Employees are Dangerous -- Employee Sabotage -- Employee Hacking -- Employee Financial Theft and Theft of Intellectual Property -- Employee Extortion -- Employee Sexual or Racial Harassment -- Employee Computer and Internet Abuse -- Internet Abuse -- Non-Internet Computer Abuse -- Data Loss -- Other "Internal" Attackers -- 1.3 Malware -- Malware Writers -- Viruses -- Worms -- Blended Threats -- Payloads -- Trojan Horses and Rootkits -- Nonmobile Malware -- Trojan Horses -- Remote Access Trojans -- Downloaders -- Spyware -- Rootkits -- Mobile Code -- Social Engineering in Malware -- Spam -- Phishing -- Spear Phishing -- Hoaxes -- 1.4 Hackers and Attacks -- Traditional Motives -- Anatomy of a Hack -- Target Selection -- Reconnaissance Probes -- The Exploit -- Spoofing -- Social Engineering in an Attack -- Denial-of-Service Attacks -- Skill Levels -- 1.5 The Criminal Era -- Dominance by Career Criminals -- Cybercrime -- International Gangs -- Black Markets and Market Specialization -- Fraud, Theft, and Extortion -- Fraud -- Financial and Intellectual Property Theft -- Extortion Against Corporations -- Stealing Sensitive Data about Customers and Employees -- Carding -- Bank Account Theft -- Online Stock Account Theft -- Identity Theft -- The Corporate Connection -- Corporate Identity Theft -- 1.6 Competitor Threats -- Commercial Espionage -- Denial-of-Service Attacks -- 1.7 Cyberwar and Cyberterror -- Cyberwar -- Cyberterror -- 1.8 Conclusion -- Thought Questions -- Hands-on Projects -- Project Thought Questions -- Case Study -- Case Discussion Questions -- Perspective Questions.
Chapter 2: Planning and Policy -- 2.1 Introduction -- Defense -- Management Processes -- Management is the Hard Part -- Comprehensive Security -- Weakest-Links Failures -- The Need to Protect Many Resources -- The Need for a Disciplined Security Management Process -- The Plan-Protect-Respond Cycle -- Planning -- Protection -- Response -- Vision in Planning -- Viewing Security as an Enabler -- Developing Positive Visions of Users -- Strategic IT Security Planning -- 2.2 Compliance Laws and Regulations -- Driving Forces -- Sarbanes-Oxley -- Privacy Protection Laws -- Data Breach Notification Laws -- The Federal Trade Commission -- Industry Accreditation -- PCI-DSS -- FISMA -- 2.3 Organization -- Chief Security Officers -- Should You Place Security within IT? -- Locating Security Within It -- Placing Security Outside It -- A Hybrid Solution -- Top Management Support -- Relationships with Other Departments -- Special Relationships -- All Corporate Departments -- Business Partners -- Outsourcing IT Security -- E-mail Outsourcing -- Managed Security Service Provider -- 2.4 Risk Analysis -- Reasonable Risk -- Classic Risk Analysis Calculations -- Asset Value -- Exposure Factor -- Single Loss Expectancy -- Annualized Probability (or Rate) of Occurrence -- Annualized Loss Expectancy -- Countermeasure Impact -- Annualized Countermeasure Cost and Net Value -- Problems with Classic Risk Analysis Calculations -- Uneven Multiyear Cash Flows -- Total Cost of Incident -- Many-To-Many Relationships Between Countermeasures and Resources -- The Impossibility of Computing Annualized Rates of Occurrence -- The Problem With "Hard-Headed Thinking" -- Perspective -- Responding to Risk -- Risk Reduction -- Risk Acceptance -- Risk Transference (Insurance) -- Risk Avoidance -- 2.5 Technical Security Architecture -- Technical Security Architectures -- Architectural Decisions.
Dealing With Legacy Security Technology -- Principles -- Defense in Depth -- Defense in Depth Versus Weakest Links -- Single Points of Vulnerability -- Minimizing Security Burdens -- Realistic Goals -- Elements of a Technical Security Architecture -- Border Management -- Internal Site Security Management -- Management of Remote Connections -- Interorganizational Systems -- Centralized Security Management -- 2.6 Policy-Driven Implementation -- Policies -- What are Policies? -- What, Not How -- Clarity -- Categories of Security Policies -- Corporate Security Policy -- Major Policies -- Acceptable Use Policy -- Policies for Specific Countermeasures or Resources -- Policy-Writing Teams -- Implementation Guidance -- No Guidance -- Standards and Guidelines -- Types of Implementation Guidance -- Procedures -- Processes -- Baselines -- Best Practices and Recommended Practices -- Accountability -- Ethics -- Exception Handling -- Oversight -- Policies and Oversight -- Promulgation -- Electronic Monitoring -- Security Metrics -- Auditing -- Anonymous Protected Hotline -- Behavioral Awareness -- Fraud -- Sanctions -- 2.7 Governance Frameworks -- Coso -- The Coso Framework -- Objectives -- Reasonable Assurance -- Coso Framework Components -- CobiT -- The Cobit Framework -- Dominance in the United States -- The ISO/IEC 27000 Family -- ISO/IEC 27002 -- ISO/IEC 27001 -- Other 27000 Standards -- 2.8 Conclusion -- Thought Questions -- Hands-on Projects -- Project Thought Questions -- Case Study -- Case Discussion Questions -- Perspective Questions -- Chapter 3: Cryptography -- 3.1 What is Cryptography? -- Encryption for Confidentiality -- Terminology -- Plaintext -- Encryption and Ciphertext -- Cipher -- Key -- Keeping the Key Secret -- The Simple Cipher -- Cryptanalysis -- Substitution and Transposition Ciphers -- Substitution Ciphers -- Transposition Ciphers.
Real-world Encryption -- Ciphers and Codes -- Symmetric Key Encryption -- Key Length -- Human Issues in Cryptography -- 3.2 Symmetric Key Encryption Ciphers -- RC4 -- The Data Encryption Standard (DES) -- 56-Bit Key Size -- Block Encryption -- Triple DES (3DES) -- 168-Bit 3DES Operation -- 112-Bit 3DES -- Perspective on 3DES -- Advanced Encryption Standard (AES) -- Other Symmetric Key Encryption Ciphers -- 3.3 Cryptographic System Standards -- Cryptographic Systems -- Initial Handshaking Stages -- Negotiation -- Initial Authentication -- Keying -- Ongoing Communication -- 3.4 The Negotiation Stage -- Cipher Suite Options -- Cipher Suite Policies -- 3.5 Initial Authentication Stage -- Authentication Terminology -- Hashing -- Initial Authentication with MS-CHAP -- On The Supplicant's Machine: Hashing -- On The Verifier Server -- 3.6 The Keying Stage -- Session Keys -- Public Key Encryption for Confidentiality -- Two Keys -- Process -- Padlock and Key Analogy -- High Cost and Short Message Lengths -- RSA and ECC -- Key Length -- Symmetric Key Keying Using Public Key Encryption -- Symmetric Key Keying Using Diffie-Hellman Key Agreement -- 3.7 Message-By-Message Authentication -- Electronic Signatures -- Public Key Encryption for Authentication -- Message-by-Message Authentication with Digital Signatures -- Digital Signatures -- Hashing to Produce the Message Digest -- Signing the Message Digest to Produce the Digital Signature -- Sending the Message with Confidentiality -- Verifying the Supplicant -- Message Integrity -- Public Key Encryption for Confidentiality and Authentication -- Digital Certificates -- Certificate Authorities -- Digital Certificate -- Verifying the Digital Certificate -- The Roles of the Digital Certificate and Digital Signature -- Key-Hashed Message Authentication Codes -- The Problem with Digital Signatures.
Creating and Testing the HMAC -- Nonrepudiation -- 3.8 Quantum Security -- 3.9 Cryptographic Systems -- Virtual Private Networks (VPNs) -- Why VPNs? -- Host-to-Host VPNs -- Remote Access VPNs -- Site-to-Site VPNs -- 3.10 SSL/TLS -- Nontransparent Protection -- Inexpensive Operation -- SSL/TLS Gateways and Remote Access VPNs -- VPN Gateway Standards -- Authentication -- Connecting the Client PC to Authorized Resources -- Security for Services -- Browser on the Client -- Advanced Services Require Administrator Privileges on PCs -- Perspective -- 3.11 IPsec -- Attractions of IPsec -- SSL/TLS Gives Nontransparent Transport Layer Security -- IPsec: Transparent Internet Layer Security -- IPsec in Both IPv4 and IPv6 -- IPsec Transport Mode -- Host-To-Host Security -- End-To-End Protection -- Cost of Setup -- IPsec in Transport Mode and Firewalls -- IPsec Tunnel Mode -- Protection is Provided by IPsec Gateways -- Less Expensive than Transport Mode -- Firewall-Friendly Protection -- No Protection within the Two Sites -- IPsec Security Associations (SAs) -- Separate SAs in the Two Directions -- Policy-Based SA -- 3.12 Conclusion -- Thought Questions -- Hands-on Projects -- Project Thought Questions -- Case Study -- Case Discussion Questions -- Perspective Questions -- Chapter 4: Secure Networks -- 4.1 Introduction -- Creating Secure Networks -- Availability -- Confidentiality -- Functionality -- Access Control -- Future of Secure Networks -- Death of the Perimeter -- Rise of the City -- 4.2 DoS Attacks -- Denial of Service. . . But Not an Attack -- Faulty Coding -- Referrals from Large Sites -- Goal of DoS Attacks -- Stop Critical Services -- Degrade Services -- Methods of DoS Attacks -- Direct and Indirect Attacks -- Intermediary -- Reflected Attack -- Sending Malformed Packets -- Defending Against Denial-of-Service Attacks -- Black Holing.
Validating the Handshake.
Sommario/riassunto: For introductory courses in IT Security.   A strong business focus through a solid technical presentation of security tools.   Corporate Computer Security provides a strong business focus along with a solid technical understanding of security tools. This text gives students the IT security skills they need for the workplace.   This edition is more business focused and contains additional hands-on projects, coverage of wireless and data security, and case studies.   This program will provide a better teaching and learning experience-for you and your students. Here's how:   Encourage Student's to Apply Concepts: Each chapter now contains new hands-on projects that use contemporary software. Business Environment Focus: This edition includes more of a focus on the business applications of the concepts. Emphasis has been placed on securing corporate information systems, rather than just hosts in general. Keep Your Course Current and Relevant: New examples, exercises, and research findings appear throughout the text.
Titolo autorizzato: Corporate computer security  Visualizza cluster
ISBN: 1-292-06659-8
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910154775303321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Always learning.