Computer Security Basics, 2nd Edition


book cover
Computer Security Basics, 2nd Edition
By Rick Lehtinen
...............................................
Publisher: O'Reilly
Pub Date: June 2006
Print ISBN-10: 0-596-00669-1
Print ISBN-13: 978-0-59-600669-3
Pages: 310
 

Table of Contents  | Index
overview

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.



The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards.



This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing.



Topics include:

  • Computer security concepts

  • Security breaches, such as viruses and other malicious programs

  • Access controls

  • Security policy

  • Web attacks

  • Communications and network security

  • Encryption

  • Physical security and biometrics

  • Wireless network security

  • Computer security and requirements of the Orange Book

  • OSI Model and TEMPEST



book cover
Computer Security Basics, 2nd Edition
By Rick Lehtinen
...............................................
Publisher: O'Reilly
Pub Date: June 2006
Print ISBN-10: 0-596-00669-1
Print ISBN-13: 978-0-59-600669-3
Pages: 310
 

Table of Contents  | Index

   Copyright
   Preface
    Part PART I:  Security for Today
        Chapter 1.  Introduction
      Section 1.1.  The New Insecurity
      Section 1.2.  What Is Computer Security?
      Section 1.3.  Threats to Security
      Section 1.4.  Why Buy Security?
      Section 1.5.  What's a User to Do?
      Section 1.6.  Summary
        Chapter 2.  Some Security History
      Section 2.1.  Information and Its Controls
      Section 2.2.  Computer Security: Then and Now
      Section 2.3.  Early Computer Security Efforts
      Section 2.4.  Building Toward Standardization
      Section 2.5.  Computer Security Mandates and Legislation
      Section 2.6.  Summary
    Part PART II:  Computer Security
        Chapter 3.  Computer System Security and Access Controls
      Section 3.1.  What Makes a System Secure?
      Section 3.2.  System Access: Logging into Your System
      Section 3.3.  Summary
        Chapter 4.  Viruses and Other Wildlife
      Section 4.1.  Financial Effects of Malicious Programs
      Section 4.2.  Viruses and Public Health
      Section 4.3.  Viruses, Worms, and Trojans (Oh, My!)
      Section 4.4.  Who Writes Viruses?
      Section 4.5.  Remedies
      Section 4.6.  The Virus Hype
      Section 4.7.  An Ounce of Prevention
      Section 4.8.  Summary
        Chapter 5.  Establishing and Maintaining a Security Policy
      Section 5.1.  Administrative Security
      Section 5.2.  Overall Planning and Administration
      Section 5.3.  Day-to-Day Administration
      Section 5.4.  Separation of Duties
      Section 5.5.  Summary
        Chapter 6.  Web Attacks and Internet Vulnerabilities
      Section 6.1.  About the Internet
      Section 6.2.  What Are the Network Protocols?
      Section 6.3.  The Fragile Web
      Section 6.4.  Summary
    Part PART III:  Communications Security
        Chapter 7.  Encryption
      Section 7.1.  Some History
      Section 7.2.  What Is Encryption?
      Section 7.3.  The Data Encryption Standard
      Section 7.4.  Other Cryptographic Algorithms
      Section 7.5.  Message Authentication
      Section 7.6.  Government Cryptographic Programs
      Section 7.7.  Cryptographic Export Restrictions
      Section 7.8.  Summary
        Chapter 8.  Communications and Network Security
      Section 8.1.  What Makes Communication Secure?
      Section 8.2.  Modems
      Section 8.3.  Networks
      Section 8.4.  Network Security
      Section 8.5.  Summary
    Part PART IV:  Other Types of Security
        Chapter 9.  Physical Security and Biometrics
      Section 9.1.  Physical Security
      Section 9.2.  Locks and Keys: Old and New
      Section 9.3.  Biometrics
      Section 9.4.  Gentle Reminder
      Section 9.5.  Summary
        Chapter 10.  Wireless Network Security
      Section 10.1.  How We Got Here
      Section 10.2.  Today's Wireless Infrastructure
      Section 10.3.  How Wireless Works
      Section 10.4.  Playing the Fields
      Section 10.5.  What Is This dB Stuff?
      Section 10.6.  Why Does All This Matter?
      Section 10.7.  Encouraging Diversity
      Section 10.8.  Physical Layer Wireless Attacks
      Section 10.9.  Summary
    Part PART V:  Appendixes
        OSI Model
        TEMPEST
      Section B.1.  The Problem of Emanations
      Section B.2.  The TEMPEST Program
      Section B.3.  TEMPEST Standards
      Section B.4.  Hard As You Try
        The Orange Book, FIPS PUBS, and the Common Criteria
      Section C.1.  About the Orange Book
      Section C.2.  Rating by the Book
      Section C.3.  Summary of Orange Book Classes
      Section C.4.  FIPS by the Numbers
      Section C.5.  I Don't Want You Smelling My Fish
   About the Author
   Colophon
   Index