O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Computer and Information Security Handbook, 3rd Edition

Book Description

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements.

With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries.

Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more.

Online chapters can also be found on the book companion website:

https://www.elsevier.com/books-and-journals/book-companion/9780128038437

  • Written by leaders in the field
  • Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices
  • Presents methods for analysis, along with problem-solving techniques for implementing practical solutions

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. Contributors
  7. About the Editor
  8. Foreword
  9. Preface
  10. Acknowledgments
  11. Part I. Overview of System and Network Security: A Comprehensive Introduction
    1. Chapter 1. Information Security in the Modern Enterprise
      1. 1. Introduction
      2. 2. Challenges Facing Information Security
      3. 3. Assessment and Planning
      4. 4. Policies and Procedures
      5. 5. Training
      6. 6. Summary
      7. Chapter Review Questions/Exercises
      8. Exercise
    2. Chapter 2. Building a Secure Organization
      1. 1. Obstacles to Security
      2. 2. Computers Are Powerful and Complex
      3. 3. Current Trend Is to Share, Not Protect
      4. 4. Security Is Not About Hardware and Software
      5. 5. Ten Steps to Building a Secure Organization
      6. 6. Preparing for the Building of Security Control Assessments
      7. 7. Summary
      8. Chapter Review Questions/Exercises
      9. Exercise
    3. Chapter 3. A Cryptography Primer
      1. 1. What Is Cryptography? What Is Encryption?
      2. 2. Famous Cryptographic Devices
      3. 3. Ciphers
      4. 4. Modern Cryptography
      5. 5. The Computer Age
      6. 6. How Advanced Encryption Standard Works
      7. 7. Selecting Cryptography: the Process
      8. 8. Summary
      9. Chapter Review Questions/Exercises
      10. Exercise
    4. Chapter 4. Verifying User and Host Identity
      1. 1. Introduction: Verifying the User
      2. 2. Identity Access Management: Authentication and Authorization
      3. 3. Synthetic or Real User Logging
      4. 4. Verifying a User in Cloud Environments
      5. 5. Verifying Hosts
      6. 6. Verifying Host Domain Name System and Internet Protocol Information
      7. 7. Summary
      8. Chapter Review Questions/Exercises
      9. Exercise
    5. Chapter 5. Detecting System Intrusions
      1. 1. Introduction
      2. 2. Developing Threat Models
      3. 3. Securing Communications
      4. 4. Network Security Monitoring and Intrusion Detection Systems
      5. 5. Installing Security Onion to a Bare-Metal Server
      6. 6. Putting It All Together
      7. 7. Securing Your Installation
      8. 8. Managing an Intrusion Detection System in a Network Security Monitoring Framework
      9. 9. Setting the Stage
      10. 10. Alerts and Events
      11. 11. Sguil: Tuning Graphics Processing Unit Rules, Alerts, and Responses
      12. 12. Developing Process
      13. 13. Understanding, Exploring, and Managing Alerts
      14. 14. Summary
      15. Chapter Review Questions/Exercises
      16. Exercise
    6. Chapter 6. Intrusion Detection in Contemporary Environments
      1. 1. Introduction
      2. 2. Mobile Operating Systems
      3. 3. Mobile Device Malware Risks
      4. 4. Cloud Computing Models
      5. 5. Cloud Computing Attack Risks
      6. 6. Source of Attacks on Mobile Devices
      7. 7. Source or Origin of Intrusions in Cloud Computing
      8. 8. Classes of Mobile Malware
      9. 9. Types of Cloud Computing Attacks
      10. 10. Malware Techniques in Android
      11. 11. Cloud Computing Intrusions Techniques
      12. 12. Examples of Smartphone Malware
      13. 13. Examples of Cloud Attacks
      14. 14. Types of Intrusion Detection Systems for Mobile Devices
      15. 15. Types of Intrusion Detection Systems for Cloud Computing
      16. 16. Intrusion Detection System Performance Metrics
      17. 17. Summary
      18. Chapter Review Questions/Exercises
      19. Exercise
    7. Chapter 7. Preventing System Intrusions
      1. 1. So, What Is an Intrusion?
      2. 2. Sobering Numbers
      3. 3. Know Your Enemy: Hackers Versus Crackers
      4. 4. Motives
      5. 5. The Crackers' Tools of the Trade
      6. 6. Bots
      7. 7. Symptoms of Intrusions
      8. 8. What Can You Do?
      9. 9. Security Policies
      10. 10. Risk Analysis
      11. 11. Tools of Your Trade
      12. 12. Controlling User Access
      13. 13. Intrusion Prevention Capabilities
      14. 14. Summary
      15. Chapter Review Questions/Exercises
      16. Exercise
    8. Chapter 8. Guarding Against Network Intrusions
      1. 1. Introduction
      2. 2. Traditional Reconnaissance and Attacks
      3. 3. Malicious Software
      4. 4. Defense in Depth
      5. 5. Preventive Measures
      6. 6. Intrusion Monitoring and Detection
      7. 7. Reactive Measures
      8. 8. Network-Based Intrusion Protection
      9. 9. Summary
      10. Chapter Review Questions/Exercises
      11. Exercise
    9. Chapter 9. Fault Tolerance and Resilience in Cloud Computing Environments
      1. 1. Introduction
      2. 2. Cloud Computing Fault Model
      3. 3. Basic Concepts of Fault Tolerance
      4. 4. Different Levels of Fault Tolerance in Cloud Computing
      5. 5. Fault Tolerance Against Crash Failures in Cloud Computing
      6. 6. Fault Tolerance Against Byzantine Failures in Cloud Computing
      7. 7. Fault Tolerance as a Service in Cloud Computing
      8. 8. Summary
      9. Chapter Review Questions/Exercises
      10. Exercise
    10. Chapter 10. Securing Web Applications, Services, and Servers
      1. 1. Setting the Stage
      2. 2. Basic Security for HTTP Applications and Services
      3. 3. Basic Security for SOAP Services
      4. 4. Identity Management and Web Services
      5. 5. Authorization Patterns
      6. 6. Security Considerations
      7. 7. Challenges
      8. 8. Summary
      9. Chapter Review Questions/Exercises
      10. Exercise
    11. Chapter 11. UNIX and Linux Security
      1. 1. Introduction
      2. 2. UNIX and Security
      3. 3. Basic UNIX Security Overview
      4. 4. Achieving UNIX Security
      5. 5. Protecting User Accounts and Strengthening Authentication
      6. 6. Limiting Superuser Privileges
      7. 7. Securing Local and Network File Systems
      8. 8. Network Configuration
      9. 9. Improving the Security of Linux and UNIX Systems
      10. 10. Additional Resources
      11. 11. Summary
      12. Chapter Review Questions/Exercises
      13. Exercise
    12. Chapter 12. Eliminating the Security Weakness of Linux and UNIX Operating Systems
      1. 1. Introduction to Linux and UNIX
      2. 2. Hardening Linux and UNIX
      3. 3. Proactive Defense for Linux and UNIX
      4. 4. Summary
      5. Chapter Review Questions/Exercises
      6. Exercise
    13. Chapter 13. Internet Security
      1. 1. Internet Protocol Architecture
      2. 2. An Internet Threat Model
      3. 3. Defending Against Attacks on the Internet
      4. 4. Internet Security Checklist
      5. 5. Summary
      6. Chapter Review Questions/Exercises
      7. Exercise
    14. Chapter 14. The Botnet Problem
      1. 1. Introduction
      2. 2. What Is a Botnet?
      3. 3. Building a Botnet
      4. 4. The Problem With Botnets
      5. 5. Botnet Case Studies and Known Botnets
      6. 6. Summary
      7. Chapter Review Questions/Exercises
      8. Exercise
    15. Chapter 15. Intranet Security
      1. 1. Smartphones and Tablets in the Intranet
      2. 2. Security Considerations
      3. 3. Plugging the Gaps: Network Access Control and Access Control
      4. 4. Measuring Risk: Audits
      5. 5. Guardian at the Gate: Authentication and Encryption
      6. 6. Wireless Network Security
      7. 7. Shielding the Wire: Network Protection
      8. 8. Weakest Link in Security: User Training
      9. 9. Documenting the Network: Change Management
      10. 10. Rehearse the Inevitable: Disaster Recovery
      11. 11. Controlling Hazards: Physical and Environmental Protection
      12. 12. Know Your Users: Personnel Security
      13. 13. Protecting Data Flow: Information and System Integrity
      14. 14. Security Assessments
      15. 15. Risk Assessments
      16. 16. Intranet Security Implementation Process Checklist
      17. 17. Summary
      18. Chapter Review Questions/Exercises
      19. Exercise
    16. Chapter e16. Local Area Network Security
      1. 1. Identify Network Threats
      2. 2. Establish Network Access Controls
      3. 3. Risk Assessment
      4. 4. Listing Network Resources
      5. 5. Threats
      6. 6. Security Policies
      7. 7. The Incident-Handling Process
      8. 8. Secure Design Through Network Access Controls
      9. 9. Intrusion Detection System Defined
      10. 10. Network Intrusion Detection System: Scope and Limitations
      11. 11. A Practical Illustration of Network Intrusion Detection System
      12. 12. Firewalls
      13. 13. Dynamic Network Address Translation Configuration
      14. 14. The Perimeter
      15. 15. Access List Details
      16. 16. Types of Firewalls
      17. 17. Packet Filtering: Internet Protocol Filtering Routers
      18. 18. Application-Layer Firewalls: Proxy Servers
      19. 19. Stateful Inspection Firewalls
      20. 20. Network Intrusion Detection System Complements Firewalls
      21. 21. Monitor and Analyze System Activities
      22. 22. Signature Analysis
      23. 23. Statistical Analysis
      24. 24. Signature Algorithms
      25. 25. Local Area Network Security Countermeasures Implementation Checklist
      26. 26. Summary
      27. Chapter Review Questions/Exercises
      28. Exercise
    17. Chapter 17. Wireless Network Security
      1. 1. Cellular Networks
      2. 2. Wireless Ad Hoc Networks
      3. 3. Security Protocols
      4. 4. Wired Equivalent Privacy
      5. 5. Secure Routing
      6. 6. Authenticated Routing for Ad Hoc Networks
      7. 7. Secure Link State Routing Protocol
      8. 8. Key Establishment
      9. 9. Ingemarsson, Tang, and Wong
      10. 10. Management Countermeasures
      11. 11. Summary
      12. Chapter Review Questions/Exercises
      13. Exercise
    18. Chapter 18. Wireless Sensor Network Security: The Internet of Things
      1. 1. Introduction to Wireless Sensor Networks
      2. 2. Threats to Privacy
      3. 3. Cryptographic Security in Wireless Sensor Networks
      4. 4. Secure Routing in Wireless Sensor Networks
      5. 5. Routing Protocols in Wireless Sensor Networks
      6. 6. Wireless Sensor Networks and Internet of Things
      7. 7. Summary
      8. Chapter Review Questions/Exercises
      9. Exercise
    19. Chapter 19. Security for the Internet of Things
      1. 1. Introduction
      2. 2. ITU-T Internet of Things (IoT) Reference Model
      3. 3. Internet of Things (IoT) Security
      4. 4. Summary
      5. Chapter Review Questions/Exercises
      6. Exercise
    20. Chapter 20. Cellular Network Security
      1. 1. Introduction
      2. 2. Overview of Cellular Networks
      3. 3. The State of the Art of Cellular Network Security
      4. 4. Cellular Network Attack Taxonomy
      5. 5. Cellular Network Vulnerability Analysis
      6. 6. Summary
      7. Chapter Review Questions/Exercises
      8. Exercise
    21. Chapter 21. Radio Frequency Identification Security
      1. 1. Radio Frequency Identification Introduction
      2. 2. Radio Frequency Identification Challenges
      3. 3. Radio Frequency Identification Protections
      4. 4. Summary
      5. Chapter Review Questions/Exercises
      6. Exercise
    22. Chapter e22. Optical Network Security
      1. 1. Optical Networks
      2. 2. Securing Optical Networks
      3. 3. Identifying Vulnerabilities
      4. 4. Corrective Actions
      5. 5. Summary
      6. Chapter Review Questions/Exercises
      7. Exercise
    23. Chapter e23. Optical Wireless Security
      1. 1. Optical Wireless Systems Overview
      2. 2. Deployment Architectures
      3. 3. High Bandwidth
      4. 4. Low Cost
      5. 5. Implementation
      6. 6. Surface Area
      7. 7. Summary
      8. Chapter Review Questions/Exercises
      9. Exercise
  12. Part II. Managing Information Security
    1. Chapter 24. Information Security Essentials for Information Technology Managers: Protecting Mission-Critical Systems
      1. 1. Introduction
      2. 2. Protecting Mission-Critical Systems
      3. 3. Information Security Essentials for Information Technology Managers
      4. 4. Systems and Network Security
      5. 5. Application Security
      6. 6. Cloud Security
      7. 7. Data Protection
      8. 8. Wireless and Mobile Security
      9. 9. Identity and Access Management
      10. 10. Security Operations
      11. 11. Policies, Plans, and Programs
      12. 12. Summary
      13. Chapter Review Questions/Exercises
      14. Exercise
    2. Chapter 25. Security Management Systems
      1. 1. Security Management System Standards
      2. 2. Training Requirements
      3. 3. Principles of Information Security
      4. 4. Roles and Responsibilities of Personnel
      5. 5. Security Policies
      6. 6. Security Controls
      7. 7. Network Access
      8. 8. Risk Assessment
      9. 9. Incident Response
      10. 10. Summary
      11. Chapter Review Questions/Exercises
      12. Exercise
    3. Chapter 26. Policy-Driven System Management
      1. 1. Introduction
      2. 2. Security and Policy-Based Management
      3. 3. Classification and Languages
      4. 4. Controls for Enforcing Security Policies in Distributed Systems
      5. 5. Products and Technologies
      6. 6. Research Projects
      7. 7. Summary
      8. Chapter Review Questions/Exercises
      9. Exercise
    4. Chapter e27. Information Technology Security Management
      1. 1. Information Security Management Standards
      2. 2. Other Organizations Involved in Standards
      3. 3. Information Technology Security Aspects
      4. 4. Summary
      5. Chapter Review Questions/Exercises
      6. Exercise
    5. Chapter e28. The Enemy (The Intruder's Genesis)
      1. 1. Introduction
      2. 2. Active Reconnaissance
      3. 3. Enumeration
      4. 4. Penetration and Gain Access
      5. 5. Maintain Access
      6. 6. Defend Network Against Unauthorized Access
      7. 7. Summary
      8. Chapter Review Questions/Exercises
      9. Exercise
    6. Chapter 29. Social Engineering Deceptions and Defenses
      1. 1. Introduction
      2. 2. Counter-Social Engineering
      3. 3. Vulnerabilities
      4. 4. Using a Layered Defense Approach
      5. 5. Attack Scenarios
      6. 6. Suspect Everyone: Network Vector
      7. 7. Policy and Training
      8. 8. Physical Access
      9. 9. Summary
      10. Chapter Review Questions/Exercises
      11. Exercise
    7. Chapter 30. Ethical Hacking
      1. 1. Introduction
      2. 2. Hacker's Toolbox
      3. 3. Attack Vectors
      4. 4. Physical Penetrations
      5. 5. Summary
      6. Chapter Review Questions/Exercises
      7. Exercise
    8. Chapter 31. What Is Vulnerability Assessment?
      1. 1. Introduction
      2. 2. Reporting
      3. 3. The “It Will Not Happen to Us” Factor
      4. 4. Why Vulnerability Assessment?
      5. 5. Penetration Testing Versus Vulnerability Assessment
      6. 6. Vulnerability Assessment Goal
      7. 7. Mapping the Network
      8. 8. Selecting the Right Scanners
      9. 9. Central Scans Versus Local Scans
      10. 10. Defense in Depth Strategy
      11. 11. Vulnerability Assessment Tools
      12. 12. Security Auditor's Research Assistant
      13. 13. Security Administrator's Integrated Network Tool
      14. 14. Microsoft Baseline Security Analyzer
      15. 15. Scanner Performance
      16. 16. Scan Verification
      17. 17. Scanning Cornerstones
      18. 18. Network Scanning Countermeasures
      19. 19. Vulnerability Disclosure Date
      20. 20. Proactive Security Versus Reactive Security
      21. 21. Vulnerability Causes
      22. 22. Do It Yourself Vulnerability Assessment
      23. 23. Summary
      24. Chapter Review Questions/Exercises
      25. Exercise
    9. Chapter e32. Security Metrics: An Introduction and Literature Review
      1. 1. Introduction
      2. 2. Why Security Metrics?
      3. 3. The Nature of Security Metrics
      4. 4. Getting Started With Security Metrics
      5. 5. Metrics in Action: Toward an Intelligent Security Dashboard
      6. 6. Security Metrics in the Literature
      7. 7. Summary
      8. Chapter Review Questions/Exercises
      9. Exercise
    10. Chapter 33. Security Education, Training, and Awareness
      1. 1. Security Education, Training, and Awareness (SETA) Programs
      2. 2. Users, Behavior, and Roles
      3. 3. Security Education, Training, and Awareness (SETA) Program Design
      4. 4. Security Education, Training, and Awareness (SETA) Program Development
      5. 5. Implementation and Delivery
      6. 6. Technologies and Platforms
      7. 7. Summary
      8. Chapter Review Questions/Exercises
      9. Exercise
    11. Chapter 34. Risk Management
      1. 1. The Concept of Risk
      2. 2. Expressing and Measuring Risk
      3. 3. The Risk Management Methodology
      4. 4. Risk Management Laws and Regulations
      5. 5. Risk Management Standards
      6. 6. Summary
      7. Chapter Review Questions/Exercises
      8. Exercise
    12. Chapter 35. Insider Threat
      1. 1. Introduction
      2. 2. Defining Insider Threat
      3. 3. Motivations of the Insider Threat Actors
      4. 4. Insider Threat Indicators
      5. 5. Examples of Insider Threats
      6. 6. Impacts
      7. 7. Analysis: Relevance
      8. 8. Manage and Mitigate the Insider Threat
      9. 9. Summary
      10. Chapter Review Questions/Exercises
      11. Exercise
  13. Part III. Disaster Recovery Security
    1. Chapter 36. Disaster Recovery
      1. 1. Introduction
      2. 2. Measuring Risk and Avoiding Disaster
      3. 3. The Business Impact Assessment
      4. 4. Summary
      5. Chapter Review Questions/Exercises
      6. Exercise
    2. Chapter 37. Disaster Recovery Plans for Small and Medium Businesses (SMBs)
      1. 1. Introduction
      2. 2. Identifying the Need for a Disaster Recovery Plan
      3. 3. Recovery
      4. 4. Threat Analysis
      5. 5. Methodology
      6. 6. Train and Test the Plan
      7. 7. Communication
      8. 8. Recovery
      9. 9. Summary
      10. Chapter Review Questions/Exercises
      11. Exercise
  14. Part IV. Security Standards and Policies
    1. Chapter 38. Security Certification and Standards Implementation
      1. 1. Introduction: The Security Compliance Puzzle
      2. 2. The Age of Digital Regulations
      3. 3. Security Regulations and Laws: Technology Challenges
      4. 4. Implementation: The Compliance Foundation
      5. 5. Summary
      6. Chapter Review Questions/Exercises
      7. Exercise
    2. Chapter 39. Security Policies and Plans Development
      1. 1. Introduction: Policies and Planning: Security Framework Foundation
      2. 2. CIA: Not the Central Intelligence Agency
      3. 3. Security Policy Structure
      4. 4. Security Policy: Sign Off Approval
      5. 5. Summary
      6. Chapter Review Questions/Exercises
      7. Exercise
  15. Part V. Cyber, Network, and Systems Forensics Security and Assurance
    1. Chapter 40. Cyber Forensics
      1. 1. What Is Cyber Forensics?
      2. 2. Analysis of Data
      3. 3. Cyber Forensics in the Court System
      4. 4. Understanding Internet History
      5. 5. Temporary Restraining Orders and Labor Disputes
      6. 6. First Principles
      7. 7. Hacking a Windows XP Password
      8. 8. Network Analysis
      9. 9. Cyber Forensics Applied
      10. 10. Tracking, Inventory, Location of Files, Paperwork, Backups, and So on
      11. 11. Testifying as an Expert
      12. 12. Beginning to End in Court
      13. 13. Summary
      14. Chapter Review Questions/Exercises
      15. Exercise
    2. Chapter 41. Cyber Forensics and Incidence Response
      1. 1. Introduction to Cyber Forensics
      2. 2. Handling Preliminary Investigations
      3. 3. Controlling an Investigation
      4. 4. Conducting Disc-Based Analysis
      5. 5. Investigating Information-Hiding Techniques
      6. 6. Scrutinizing Email
      7. 7. Validating Email Header Information
      8. 8. Tracing Internet Access
      9. 9. Searching Memory in Real Time
      10. 10. Summary
      11. Chapter Review Questions/Exercises
      12. Exercise
    3. Chapter 42. Securing e-Discovery
      1. 1. Information Management
      2. 2. Legal and Regulatory Obligation
      3. 3. Summary
      4. Chapter Review Questions/Exercises
      5. Exercise
    4. Chapter e43. Network Forensics
      1. 1. Scientific Overview
      2. 2. The Principles of Network Forensics
      3. 3. Attack Trace-Back and Attribution
      4. 4. Critical Needs Analysis
      5. 5. Research Directions
      6. 6. Summary
      7. Chapter Review Questions/Exercises
      8. Exercise
    5. Chapter 44. Microsoft Office and Metadata Forensics: A Deeper Dive
      1. 1. Introduction
      2. 2. In a Perfect World
      3. 3. Microsoft Excel
      4. 4. Exams!
      5. 5. Items Outside of Office Metadata
      6. 6. Summary
      7. Chapter Review Questions/Exercises
      8. Exercise
    6. Chapter 45. Hard Drive Imaging
      1. 1. Introduction
      2. 2. Hard Disc Drives
      3. 3. Solid State Drives
      4. 4. Hardware Tools
      5. 5. Software Tools
      6. 6. Techniques
      7. 7. Summary
      8. Chapter Review Questions/Exercises
      9. Exercise
  16. Part VI. Encryption Technology
    1. Chapter e46. Data Encryption
      1. 1. Need for Cryptography
      2. 2. Mathematical Prelude to Cryptography
      3. 3. Classical Cryptography
      4. 4. Modern Symmetric Ciphers
      5. 5. Algebraic Structure
      6. 6. The Internal Functions of Rijndael in Advanced Encryption Standard Implementation
      7. 7. Use of Modern Block Ciphers
      8. 8. Public-Key Cryptography
      9. 9. Cryptanalysis of Rivest–Shamir–Adleman
      10. 10. Diffie–Hellman Algorithm
      11. 11. Elliptic Curve Cryptosystems
      12. 12. Message Integrity and Authentication
      13. 13. Triple Data Encryption Algorithm Block Cipher
      14. 14. Summary
      15. Chapter Review Questions/Exercises
      16. Exercise
    2. Chapter 47. Satellite Encryption
      1. 1. Introduction
      2. 2. The Need for Satellite Encryption
      3. 3. Implementing Satellite Encryption
      4. 4. Pirate Decryption of Satellite Transmissions
      5. 5. Satellite Encryption Policy
      6. 6. Satellite Encryption Service (SES)
      7. 7. The Future of Satellite Encryption
      8. 8. Summary
      9. Chapter Review Questions/Exercises
      10. Exercise
    3. Chapter 48. Public Key Infrastructure
      1. 1. Cryptographic Background
      2. 2. Overview of Public Key Infrastructure
      3. 3. The X.509 Model
      4. 4. X.509 Implementation Architectures
      5. 5. X.509 Certificate Validation
      6. 6. X.509 Certificate Revocation
      7. 7. Server-Based Certificate Validity Protocol
      8. 8. X.509 Bridge Certification Systems
      9. 9. X.509 Certificate Format
      10. 10. Public Key Infrastructure Policy Description
      11. 11. Public Key Infrastructure Standards Organizations
      12. 12. Pretty Good Privacy Certificate Formats
      13. 13. Pretty Good Privacy Public Key Infrastructure Implementations
      14. 14. World Wide Web Consortium
      15. 15. Is Public Key Infrastructure Secure?
      16. 16. Alternative Public Key Infrastructure Architectures
      17. 17. Modified X.509 Architectures
      18. 18. Alternative Key Management Models
      19. 19. Summary
      20. Chapter Review Questions/Exercises
      21. Exercise
    4. Chapter e49. Password-Based Authenticated Key Establishment Protocols
      1. 1. Introduction to Key Exchange
      2. 2. Password-Authenticated Key Exchange
      3. 3. Concrete Protocols
      4. 4. Summary
      5. Chapter Review Questions/Exercises
      6. Exercise
    5. Chapter 50. Context-Aware Multifactor Authentication Survey
      1. 1. Introduction
      2. 2. Classic Approach to Multifactor Authentication
      3. 3. Modern Approaches to Multifactor Authentication
      4. 4. Comparative Summary
      5. 5. Summary
      6. Chapter Review Questions/Exercises
      7. Exercise
    6. Chapter 51. Instant-Messaging Security
      1. 1. Why Should I Care About Instant Messaging?
      2. 2. What Is Instant Messaging?
      3. 3. The Evolution of Networking Technologies
      4. 4. Game Theory and Instant Messaging
      5. 5. The Nature of the Threat
      6. 6. Common Instant Messaging Applications
      7. 7. Defensive Strategies
      8. 8. Instant-Messaging Security Maturity and Solutions
      9. 9. Processes
      10. 10. Summary
      11. Chapter Review Questions/Exercises
      12. Exercise
  17. Part VII. Privacy and Access Management
    1. Chapter 52. Online Privacy
      1. 1. The Quest for Privacy
      2. 2. Trading Personal Data
      3. 3. Control of Personal Data
      4. 4. Privacy and Technologies
      5. 5. Summary
      6. Chapter Review Questions/Exercises
      7. Exercise
    2. Chapter 53. Privacy-Enhancing Technologies
      1. 1. The Concept of Privacy
      2. 2. Legal Privacy Principles
      3. 3. Classification of Privacy-Enhancing Technologies (PETs)
      4. 4. Traditional Privacy Goals of Privacy-Enhancing Technologies (PETs)
      5. 5. Privacy Metrics
      6. 6. Data Minimization Technologies
      7. 7. Transparency-Enhancing Tools
      8. 8. Summary
      9. Chapter Review Questions/Exercises
      10. Exercise
    3. Chapter e54. Personal Privacy Policies
      1. 1. Introduction
      2. 2. Content of Personal Privacy Policies
      3. 3. Semiautomated Derivation of Personal Privacy Policies
      4. 4. Specifying Well-Formed Personal Privacy Policies
      5. 5. Preventing Unexpected Negative Outcomes
      6. 6. The Privacy Management Model
      7. 7. Discussion and Related Work
      8. 8. Summary
      9. Chapter Review Questions/Exercises
      10. Exercise
    4. Chapter 55. Detection of Conflicts in Security Policies
      1. 1. Introduction
      2. 2. Conflicts in Security Policies
      3. 3. Conflicts in Executable Security Policies
      4. 4. Conflicts in Network Security Policies
      5. 5. Query-Based Conflict Detection
      6. 6. Semantic Web Technology for Conflict Detection
      7. 7. Summary
      8. Chapter Review Questions/Exercises
      9. Exercise
    5. Chapter 56. Supporting User Privacy Preferences in Digital Interactions
      1. 1. Introduction
      2. 2. Basic Concepts and Desiderata
      3. 3. Cost-Sensitive Trust Negotiation
      4. 4. Point-Based Trust Management
      5. 5. Logical-Based Minimal Credential Disclosure
      6. 6. Privacy Preferences in Credential-Based Interactions
      7. 7. Fine-Grained Disclosure of Sensitive Access Policies
      8. 8. Open Issues
      9. 9. Summary
      10. Chapter Review Questions/Exercises
      11. Exercise
    6. Chapter 57. Privacy and Security in Environmental Monitoring Systems: Issues and Solutions
      1. 1. Introduction
      2. 2. System Architectures
      3. 3. Environmental Data
      4. 4. Security and Privacy Issues in Environmental Monitoring
      5. 5. Countermeasures
      6. 6. Summary
      7. Chapter Review Questions/Exercises
      8. Exercise
    7. Chapter 58. Virtual Private Networks
      1. 1. History
      2. 2. Who Is in Charge?
      3. 3. Virtual Private Network Types
      4. 4. Authentication Methods
      5. 5. Symmetric Encryption
      6. 6. Asymmetric Cryptography
      7. 7. Edge Devices
      8. 8. Passwords
      9. 9. Hackers and Crackers
      10. 10. Mobile Virtual Private Network
      11. 11. Virtual Private Network Deployments
      12. 12. Summary
      13. Chapter Review Questions/Exercises
      14. Exercise
    8. Chapter e59. Identity Theft
      1. 1. Experimental Design
      2. 2. Results and Analysis
      3. 3. Implications for Crimeware
      4. Chapter Review Questions/Exercises
      5. Exercise
    9. Chapter 60. VoIP Security
      1. 1. Introduction
      2. 2. Overview of Threats
      3. 3. Security in Voice Over Internet Protocol
      4. 4. Future Trends
      5. 5. Summary
      6. Chapter Review Questions/Exercises
      7. Exercise
  18. Part VIII. Storage Security
    1. Chapter e61. SAN Security
      1. 1. Organizational Structure
      2. 2. Access Control Lists and Policies
      3. 3. Physical Access
      4. 4. Change Management
      5. 5. Password Policies
      6. 6. Defense-in-Depth
      7. 7. Vendor Security Review
      8. 8. Data Classification
      9. 9. Security Management
      10. 10. Auditing
      11. 11. Security Maintenance
      12. 12. Host Access: Partitioning
      13. 13. Data Protection: Replicas
      14. 14. Encryption in Storage
      15. 15. Application of Encryption
      16. 16. Summary
      17. Chapter Review Questions/Exercises
      18. Exercise
    2. Chapter 62. Storage Area Networking Security Devices
      1. 1. What Is Storage Area Networking (SAN)?
      2. 2. Storage Area Networking (SAN) Deployment Justifications
      3. 3. The Critical Reasons for Storage Area Networking (SAN) Security
      4. 4. Storage Area Networking (SAN) Architecture and Components
      5. 5. Storage Area Networking (SAN) General Threats and Issues
      6. 6. Summary
      7. Chapter Review Questions/Exercises
      8. Exercise
  19. Part IX. Cloud Security
    1. Chapter 63. Securing Cloud Computing Systems
      1. 1. Cloud Computing Essentials: Examining the Cloud Layers
      2. 2. Software as a Service: Managing Risks in the Cloud
      3. 3. Platform as a Service: Securing the Platform
      4. 4. Infrastructure as a Service
      5. 5. Leveraging Provider-Specific Security Options
      6. 6. Achieving Security in a Private Cloud
      7. 7. Meeting Compliance Requirements
      8. 8. Preparing for Disaster Recovery
      9. 9. Summary
      10. Chapter Review Questions/Exercises
      11. Exercise
    2. Chapter 64. Cloud Security
      1. 1. Cloud Overview: Public, Private, Hybrid
      2. 2. Cloud Security Threats
      3. 3. Internet Service Provider Cloud Virtual Private Network Peering Services
      4. 4. Cloud Access Security Brokers
      5. 5. Cloud Encryption
      6. 6. Cloud Security Microsegmentation
      7. 7. Cloud Security Compliance
      8. 8. Summary
      9. Chapter Review Questions/Exercises
      10. Exercise
    3. Chapter 65. Private Cloud Security
      1. 1. Introduction: Private Cloud System Management
      2. 2. From Physical to Network Security Base Focus
      3. 3. Benefits of Private Cloud Security Infrastructures
      4. 4. Private Cloud Security Standards and Best Practices
      5. 5. “As-a-Service” Universe: Service Models
      6. 6. Private Cloud Service Model: Layer Considerations
      7. 7. Privacy or Public: The Cloud Security Challenges
      8. 8. Summary
      9. Chapter Review Questions/Exercises
      10. Exercise
    4. Chapter 66. Virtual Private Cloud Security
      1. 1. Introduction: Virtual Networking in a Private Cloud
      2. 2. Security Console: Centralized Control Dashboard Management
      3. 3. Security Designs: Virtual Private Cloud Setups
      4. 4. Security Object Group Allocations: Functional Control Management Practices
      5. 5. Virtual Private Cloud Performance Versus Security
      6. 6. Summary
      7. Chapter Review Questions/Exercises
      8. Exercise
  20. Part X. Virtual Security
    1. Chapter 67. Protecting Virtual Infrastructure
      1. 1. Virtualization in Computing
      2. 2. Virtual Data Center Security
      3. 3. Hypervisor Security
      4. 4. Enterprise Segmentation
      5. 5. Active Containerized Security
      6. 6. Virtual Absorption of Volume Attacks
      7. 7. Open Source Versus Proprietary Security Capabilities
      8. 8. Summary
      9. Chapter Review Questions/Exercises
      10. Exercise
    2. Chapter 68. Software-Defined Networking and Network Function Virtualization Security
      1. 1. Introduction to Software-Defined Networking
      2. 2. Software-Defined Networking and Network Function Virtualization Overview
      3. 3. Software-Defined Networking and Network Function Virtualization for Internet Service Providers
      4. 4. Software-Defined Networking Controller Security
      5. 5. Improved Patching With Software-Defined Networking
      6. 6. Dynamic Security Service Chaining in Software-Defined Networking
      7. 7. Future Virtualized Management Security Support in Software-Defined Networking
      8. 8. Summary
      9. Chapter Review Questions/Exercises
      10. Exercise
  21. Part XI. Cyber Physical Security
    1. Chapter 69. Physical Security Essentials
      1. 1. Overview
      2. 2. Physical Security Threats
      3. 3. Physical Security Prevention and Mitigation Measures
      4. 4. Recovery From Physical Security Breaches
      5. 5. Threat Assessment, Planning, and Plan Implementation
      6. 6. Example: A Corporate Physical Security Policy
      7. 7. Integration of Physical and Logical Security
      8. 8. Physical Security Checklist
      9. 9. Summary
      10. Chapter Review Questions/Exercises
      11. Exercise
    2. Chapter e70. Biometrics
      1. 1. Relevant Standards
      2. 2. Biometric System Architecture
      3. 3. Using Biometric Systems
      4. 4. Security Considerations
      5. 5. Summary
      6. Chapter Review Questions/Exercises
      7. Exercise
  22. Part XII. Practical Security
    1. Chapter 71. Online Identity and User Management Services
      1. 1. Introduction
      2. 2. Evolution of Identity Management Requirements
      3. 3. The Requirements Fulfilled by Identity Management Technologies
      4. 4. Identity Management 1.0
      5. 5. Social Login and User Management
      6. 6. Identity 2.0 for Mobile Users
      7. 7. Summary
      8. Chapter Review Questions/Exercises
      9. Exercise
    2. Chapter 72. Intrusion Prevention and Detection Systems
      1. 1. What Is an “Intrusion” Anyway?
      2. 2. Physical Theft
      3. 3. Abuse of Privileges (the Insider Threat)
      4. 4. Unauthorized Access by Outsider
      5. 5. Malicious Software Infection
      6. 6. Role of the “Zero-Day”
      7. 7. The Rogue's Gallery: Attackers and Motives
      8. 8. A Brief Introduction to Transmission Control Protocol/Internet Protocol
      9. 9. Transmission Control Protocol/Internet Protocol Data Architecture and Data Encapsulation
      10. 10. Survey of Intrusion Detection and Prevention Technologies
      11. 11. Antimalicious Software
      12. 12. Network-Based Intrusion Detection Systems
      13. 13. Network-Based Intrusion Prevention Systems
      14. 14. Host-Based Intrusion Prevention Systems
      15. 15. Security Information Management Systems
      16. 16. Network Session Analysis
      17. 17. Digital Forensics
      18. 18. System Integrity Validation
      19. 19. Summary
      20. Chapter Review Questions/Exercises
      21. Exercise
    3. Chapter e73. Transmission Control Protocol/Internet Protocol Packet Analysis
      1. 1. The Internet Model
      2. 2. Summary
      3. Chapter Review Questions/Exercises
      4. Exercise
    4. Chapter e74. Firewalls
      1. 1. Introduction
      2. 2. Network Firewalls
      3. 3. Firewall Security Policies
      4. 4. A Simple Mathematical Model for Policies, Rules, and Packets
      5. 5. First-Match Firewall Policy Anomalies
      6. 6. Policy Optimization
      7. 7. Firewall Types
      8. 8. Host and Network Firewalls
      9. 9. Software and Hardware Firewall Implementations
      10. 10. Choosing the Correct Firewall
      11. 11. Firewall Placement and Network Topology
      12. 12. Firewall Installation and Configuration
      13. 13. Supporting Outgoing Services Through Firewall Configuration
      14. 14. Secure External Services Provisioning
      15. 15. Network Firewalls for Voice and Video Applications
      16. 16. Firewalls and Important Administrative Service Protocols
      17. 17. Internal IP Services Protection
      18. 18. Firewall Remote Access Configuration
      19. 19. Load Balancing and Firewall Arrays
      20. 20. Highly Available Firewalls
      21. 21. Firewall Management
      22. 22. Summary
      23. Chapter Review Questions/Exercises
      24. Exercise
    5. Chapter 75. Penetration Testing
      1. 1. What Is Penetration Testing?
      2. 2. Why Would You Do It?
      3. 3. How Do You Do It?
      4. 4. Examples of Penetration Test Scenarios
      5. 5. Summary
      6. Chapter Review Questions/Exercises
      7. Exercise
    6. Chapter e76. System Security
      1. 1. Foundations of Security
      2. 2. Basic Countermeasures
      3. 3. Summary
      4. Chapter Review Questions/Exercises
      5. Exercise
    7. Chapter 77. Access Controls
      1. 1. Infrastructure Weaknesses: Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Role-Based Access Control (RBAC)
      2. 2. Strengthening the Infrastructure: Authentication Systems
      3. 3. Summary
      4. Chapter Review Questions/Exercises
      5. Exercise
    8. Chapter 78. Endpoint Security
      1. 1. Introduction: Endpoint Security Defined
      2. 2. Endpoint Solution: Options
      3. 3. Standard Requirements: Security Decisions
      4. 4. Endpoint Architecture: Functional Challenges
      5. 5. Endpoint Intrusion Security: Management Systems
      6. 6. Intrusion Prevention System (IPS) Network Logging Tools: Seek and Target (the Offender)
      7. 7. Endpoint Unification: Network Access Control (NAC) Design Approach (From the Ground-Up)
      8. 8. Software-as-a-Service (SaaS) Endpoint Security
      9. 9. Summary
      10. Chapter Review Questions/Exercises
      11. Exercise
    9. Chapter e79. Assessments and Audits
      1. 1. Assessing Vulnerabilities and Risk: Penetration Testing and Vulnerability Assessments
      2. 2. Risk Management: Quantitative Risk Measurements
      3. 3. Summary
      4. Chapter Review Questions/Exercises
      5. Exercise
    10. Chapter 80. Fundamentals of Cryptography
      1. 1. Assuring Privacy With Encryption
      2. 2. Summary
      3. Chapter Review Questions/Exercises
      4. Exercise
  23. Part XIII. Critical Infrastructure Security
    1. Chapter 81. Securing the Infrastructure
      1. 1. Communication Security Goals
      2. 2. Attacks and Countermeasures
      3. 3. Summary
      4. Chapter Review Questions/Exercises
      5. Exercise
    2. Chapter e82. Homeland Security
      1. 1. Statutory Authorities
      2. 2. Homeland Security Presidential Directives
      3. 3. Organizational Actions
      4. 4. Summary
      5. Chapter Review Questions/Exercises
      6. Exercise
    3. Chapter 83. Cyber Warfare
      1. 1. Cyber Warfare Model
      2. 2. Cyber Warfare Defined
      3. 3. Cyber Warfare: Myth or Reality?
      4. 4. Participants, Roles, Attribution, and Asymmetry
      5. 5. Making Cyber Warfare Possible
      6. 6. Legal Aspects of Cyber Warfare
      7. 7. Holistic View of Cyber Warfare
      8. 8. Summary
      9. Chapter Review Questions/Exercises
      10. Exercise
    4. Chapter 84. Cyber-Attack Process
      1. 1. What Is a Cyber-Attack?
      2. 2. Cyber-Attack Adversaries
      3. 3. Cyber-Attack Targets
      4. 4. Cyber-Attack Process
      5. 5. Tools and Tactics of a Cyber-Attack
      6. 6. Cyber-Attack Case Studies
      7. 7. Advanced Persistent Threat
      8. 8. Additional Considerations
      9. 9. Summary
      10. Chapter Review Questions/Exercises
      11. Exercise
  24. Part XIV. Advanced Security
    1. Chapter 85. Security Through Diversity
      1. 1. Ubiquity
      2. 2. Example Attacks Against Uniformity
      3. 3. Attacking Ubiquity With Antivirus Tools
      4. 4. The Threat of Worms
      5. 5. Automated Network Defense
      6. 6. Diversity and the Browser
      7. 7. Sandboxing and Virtualization
      8. 8. Domain Name Server Example of Diversity Through Security
      9. 9. Recovery From Disaster Is Survival
      10. 10. Summary
      11. Chapter Review Questions/Exercises
      12. Exercise
    2. Chapter 86. e-Reputation and Online Reputation Management Survey
      1. 1. Introduction
      2. 2. The Human Notion of Reputation
      3. 3. Reputation Applied to the Computing World
      4. 4. State of the Art of Attack-Resistant Reputation Computation
      5. 5. Overview of Past and Current Online Reputation Services
      6. 6. Summary
      7. Chapter Review Questions/Exercises
      8. Exercise
    3. Chapter e87. Content Filtering
      1. 1. Defining the Problem
      2. 2. Why Content Filtering Is Important
      3. 3. Content Categorization Technologies
      4. 4. Perimeter Hardware and Software Solutions
      5. 5. Categories
      6. 6. Legal Issues
      7. 7. Circumventing Content Filtering
      8. 8. Additional Items to Consider: Overblocking and Underblocking
      9. 9. Related Products
      10. 10. Summary
      11. Chapter Review Questions/Exercises
      12. Exercise
    4. Chapter 88. Data Loss Protection
      1. 1. Precursors of DLP
      2. 2. What Is Data Loss Protection (DLP)?
      3. 3. Where to Begin?
      4. 4. Data Is Like Water
      5. 5. You Don't Know What You Don't Know
      6. 6. How Do Data Loss Protection (DLP) Applications Work?
      7. 7. Eat Your Vegetables
      8. 8. IT's a Family Affair, Not Just IT Security's Problem
      9. 9. Vendors, Vendors Everywhere! Who Do You Believe?
      10. 10. Summary
      11. Chapter Review Questions/Exercises
      12. Exercise
    5. Chapter 89. Satellite Cyber Attack Search and Destroy
      1. 1. Hacks, Interference, and Jamming
      2. 2. Summary
      3. Chapter Review Questions/Exercises
      4. Exercise
    6. Chapter e90. Verifiable Voting Systems
      1. 1. Introduction
      2. 2. Security Requirements
      3. 3. Verifiable Voting Schemes
      4. 4. Building Blocks
      5. 5. Survey of Noteworthy Schemes
      6. 6. Threats to Verifiable Voting Systems
      7. 7. Summary
      8. Chapter Review Questions/Exercises
      9. Exercise
    7. Chapter 91. Advanced Data Encryption
      1. 1. Mathematical Concepts Reviewed
      2. 2. The RIVEST, SHAMIR, AND ADELMAN Cryptosystem
      3. 3. Summary
      4. Chapter Review Questions/Exercises
      5. Exercise
  25. Part XV. Appendices
    1. Appendix eA. Configuring Authentication Service On Microsoft Windows 10
    2. Appendix eB. Security Management and Resiliency
    3. Appendix eC. List of Top Information and Network Security Implementation and Deployment Companies
    4. Appendix eD. List of Security Products
    5. Appendix eE. List of Security Standards
    6. Appendix eF. List of Miscellaneous Security Resources
    7. Appendix eG. Ensuring Built-in, Frequency-Hopping Spread-Spectrum, Wireless Network Security
    8. Appendix eH. Configuring Wireless Security Remote Access
    9. Appendix eI. Frequently Asked Questions
    10. Appendix eJ. Case Studies
    11. Appendix eK. Answers to Review Questions/Exercises, Hands-on Projects, Case Projects and Optional Team Case Project by Chapter
    12. Appendix eL. Glossary
  26. Index