Book description
Today, society is faced with numerous internet schemes, fraudulent scams, and means of identity theft that threaten our safety and our peace of mind. Computer Security: Protecting Digital Resources provides a broad approach to computer-related crime, electronic commerce, corporate networking, and Internet security, topics that have become increasingly important as more and more threats are made on our internet environment. This book is oriented toward the average computer user, business professional, government worker, and those within the education community, with the expectation that readers can learn to use the network with some degree of safety and security. The author places emphasis on the numerous vulnerabilities and threats that are inherent in the Internet environment. Efforts are made to present techniques and suggestions to avoid identity theft and fraud.
Readers will gain a clear insight into the many security issues facing the e-commerce, networking, web, and internet environments, as well as what can be done to keep personal and business information secure.
Table of contents
- Book Cover
- Title
- Copyright
- Contents (1/4)
- Contents (2/4)
- Contents (3/4)
- Contents (4/4)
- Preface
-
Part One: Basics and General Understanding
-
Chapter 1 Cyber Environment and Security Issues
- Chapter Contents
- Introduction
- An Historical Perspective
- Computer and Internet Environment Issues
- Trusted Systems
- The Cyber Environment
- Cybercrimes
- Cyber-Terrorism
- Resource and Asset Protection
- Content Management
- Electronic Threats
- Cyber Security Goals and Objectives
- Ethics
- Intellectual Property Protections
- Internet Access for Children
- Chapter Summary
- Key Terms
- Security Review Questions
- Research Activities
-
Chapter 2 Attacks, Threats, and Vulnerabilities
- Chapter Contents
- Introduction
- Threats
- Threat Targets
- Attacks
- Virus Threats
- Countering the Virus Threat
- Vulnerabilities
- Malicious Attacks
- Other Security Breaches
- Additional Security Challenges
- Responding to Internet and Network Attacks
- Network Intruders
- Malicious Tools
- Chapter Summary
- Key Terms
- Security Review Questions
- Research Activities
- Chapter 3 Scams, Identity Theft, and Fraud
- Chapter 4 Computer and Digital Assets Security
-
Chapter 1 Cyber Environment and Security Issues
-
Part Two: Computer Systems and Networks
-
Chapter 5 The Internet and Web Network Environment
- Chapter Contents
- Introduction
- The Internet
- Network Access Communication Devices
- World Wide Web (WWW), aka the Web
- Intranet and Extranet Networks
- Virtual Private Networks
- Security Issues in Virtual Networks
- Network, Hardware, and Software Components
- Network Resource Access
- Internet Search Tools
- Software
- Security in the Network
- Chapter Summary
- Key Terms
- Security Review Questions
- Research Activities
-
Chapter 6 Wired and Wireless Local Area Networks
- Chapter Contents
- introduction
- Local Area Network
- Wired LAN Connectivity
- Wireless LAN
- LAN Network Components (1/2)
- LAN Network Components (2/2)
- Extranet and Intranet LAN Issues
- Secure Protocols
- Biometric Systems
- Wired LAN Security
- LAN Network Management
- Chapter Summary
- Key Terms
- Security Review Questions
- Research Activities
-
Chapter 7 Computer, Server, and Database Security Issues
- Chapter Contents
- Introduction
- Computer Systems
- Client/Server Systems
- Portable Computer and Electronic Devices
- Database Management System
- Data and Database Attacks
- Protecting the Data and Database Asset
- Voice Communication Systems
- Physical Asset Protection
- Chapter Summary
- Key Terms
- Security Review Questions
- Research Activities
-
Chapter 8 ECommerce Security Mechanisms
- Chapter Contents
- Introduction
- ECommerce Environment
- Electronic Commerce and Transactions
- Securing Network Transactions
- Data Security and Encryption
- ECommerce Security and Distributed Computing
- Financial Transactions
- Wireless LAN
- Wireless LAN Security
- Security Protocols
- ECommerce System Design Concerns
- Distributed Security and Privacy Issues
- Implementation Issues
- Chapter Summary
- Key Terms
- Security Review Questions
- Research Activities
-
Chapter 5 The Internet and Web Network Environment
-
Part Three: Security and Operations Administration
-
Chapter 9 Business Continuity and Disaster Recovery Planning
- Chapter Contents
- Introduction
- Security Goals and Objectives
- Protecting Assets and Resources
- Infrastructure Security and Control
- Physical Security
- Access Security of Computer and Network Resources
- Theft Prevention Techniques
- Security Cost Justification
- Security Systems Design
- Security Evaluation
- Administration
- Corporate Planning
- Security Requirements Assessment
- Maintaining Network Integrity
- Authentication Techniques
- Data Management
- Protection Against Intruders
- Documentation
- Threat Assessment
- Gap Analysis
- Auditing
- Security Policy
- Contingency Planing/Disaster Recovery
- Disaster Recovery
- Chapter Summary
- Key Terms
- Security Review Questions
- Research Activities
-
Chapter 10 Intrusion Detection and Prevention
- Chapter Contents
- Introduction
- Computing Security Issues
- Intrusion Detection
- Intrusion Detection System
- Intrusion Detection System Configurations
- NetworkBased Intrusion Detection System
- HostBased Intrusion Detection System
- Benefits of an Intrusion Detection System
- Intrusion Detection Systems and Vendors
- Intrusion Detection Decisions
- Intrusion Prevention
- Intrusion Prevention Systems
- System Processes
- Intrusion Prevention System Types
- Implementation Challenges
- Requirements for Efective Prevention
- Management and Administration Considerations
- Organizations and Standards
- Chapter Summary
- Key Terms
- Security Review Questions
- Research Activities
-
Chapter 11 Problem Solving and Security Administration
- Chapter Contents
- Introduction
- The Need for Problem Solving
- The Security Audit
- Baseline
- Security Investigations
- Network Problem Solving
- Network Testing Support and Resources
- Security Tools
- Managing the Network
- Network Management and Control
- Common Management Information Protocol
- Network Management Standards Organizations
- Chapter Summary
- Key Terms
- Security Review Questions
- Research Activities
-
Chapter 9 Business Continuity and Disaster Recovery Planning
-
Part Four: Security Resources, Education, and Standards
-
Chapter 12 Security Solutions for Digital Resources
- Chapter Contents
- Introduction
- Understanding the Issues
- Security Solution Categories
- Companies Providing Security Solutions
- Security System Procurement
- Procurement Checklist for Security Systems
- Security System Project Management
- Software Security Solutions
- Security Products and Vendors
- Quality Control Issues
- System Evaluation Criteria
- Develop In-House or Outsource
- Chapter Summary
- Key Terms
- Security Review Questions
- Research Activities
-
Chapter 13 Standards, Specifications, and Protocols
- Chapter Contents
- Introduction
- Standards (1/2)
- Standards (2/2)
- Protocols
-
Specifications
- International Data Encryption Algorithm
- Rivest, Shamir, and Adleman Algorithm
- Message Digest Algorithm 5
- Secure Hash Algorithm
- Cyclic Redundancy Check
- Secure Electronic Transaction
- SOCKS
- PublicKey Infrastructure
- Pretty Good Privacy
- Rainbow Series
- Trusted Computer System Evaluation Criteria/Orange Book
- Trusted Network Interpretation/Red Book
- ITU Standards
- Physical Interface Standards
- Laws and Regulations
- Chapter Summary
- Key Terms
- Security Review Questions
- Research Activities
-
Chapter 14 Training, Certifications, and Careers
- Chapter Contents
- Introduction
- Security Certifications
- Training
- Security Organizations
- Certificates
- Computer Security Careers
-
Career and Certification Tips
- American Society for Industrial Security
- ASIS International
- Association of Certified Fraud Examiners
- Brainbench
- CERT®
- CompTIA
- Cyber Enforcement Resources, Inc.
- CyberSecurity Institute
- eBusiness Process Solutions
- ECCouncil
- Espionage Research Institute
- Field Certified Professional Association
- Global Information Assurance Certification
- High-Tech Crime Network Certifications
- Information Systems Audit and Control Association
- Institute of Internal Auditors
- International Association of Computer Investigative Specialists
- International Information Systems Forensics Association
- International Webmasters’ Association (IWA)
- ISC
- Key Computer Service
- Learning Tree International
- Prosoft Training, Inc.
- SANS
- Security Certified Program
- Security University
- TruSecure ICSA Practitioner Certification
- Top 10 Benefits of a Security Certification
- Chapter Summary
- Key Terms
- Security Review Questions
- Research Activities
-
Chapter 12 Security Solutions for Digital Resources
-
Appendices
-
Appendix A: Computer and Information Systems Security Review
- Computer System Security Review (1/2)
-
Computer System Security Review (2/2)
- Policies and Procedures
- Training
- Personnel
- Data Integrity and Security
- Computer and Network Access
- Building Equipment Rooms, Raised Floors, and Closets
- Computer and Networking Equipment
- Wiring and Cable Plant
- Trouble Reporting and Maintenance
- System Administration
- Operational Performance
- Contingency Planning and Disaster Recovery
- Intrusion Detection and Prevention
- Identity Theft and Fraud Prevention
- Voice Systems
- Miscellaneous
- Appendix B: Information Security (InfoSec) Acceptable Use Policy
- Appendix C: Answers to Chapter Security Review Questions
- Appendix D: Computer Security Acronyms
- Appendix E: Internet Protocol Addresses
-
Appendix F: Security Applications and Solutions
- Snort
- Nessus
- Honeyd
- Samhain
- Network Attacks Protection
- Comprehensive Security Systems
- Configuration Audit and Control Systems
- Data Leak Prevention or Content Monitoring and Filtering
- EMail Encryption
- Database Activity Detection and Monitoring
- Intrusion Detection and Prevention Systems (IDS/IPS) Systems
- Unified Network Management
- Network Taps
-
Appendix A: Computer and Information Systems Security Review
- Glossary (1/3)
- Glossary (2/3)
- Glossary (3/3)
- Selected Bibliography
- Index (1/2)
- Index (2/2)
Product information
- Title: Computer Security: Protecting Digital Resources
- Author(s):
- Release date: February 2009
- Publisher(s): Jones & Bartlett Learning
- ISBN: 9780763783051
You might also like
book
Securing the Internet of Things
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment …
book
Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established …