Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2

Book description

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.

Table of contents

  1. Volume II: Information Warfare; Social, Legal, and International Issues; and Security Foundations
    1. Cover Page
    2. Title Page
    3. Copyright
    4. Dedication
    5. About the Editor-in-Chief
    6. Editorial Board
    7. Contents
    8. Contributors
    9. Preface
      1. TOPIC CATEGORIES
    10. Guide to The Handbook of Information Security
    11. PART 1: Information Warfare
      1. Cybercrime and the U.S. Criminal Justice System
        1. INTRODUCTION
        2. DIFFERENCES FROM CIVIL JUSTICE SYSTEM
        3. BASIC INSTITUTIONAL STRUCTURE
        4. RELATIONSHIP BETWEEN STATE AND FEDERAL CRIMINAL JUSTICE SYSTEMS
        5. CRIMINAL JUSTICE SYSTEM AND CYBERCRIME
        6. CONCLUSION
        7. GLOSSARY
        8. CROSS REFERENCES
        9. REFERENCES
      2. Cyberterrorism and Information Security
        1. INTRODUCTION
        2. DEFINING CYBERTERRORISM
        3. HOW CYBERTERRORISM OCCURS
        4. SPONSORS AND SUPPORT
        5. CONTROLLING CYBERTERRORISM
        6. WHO WILL WIN THE BATTLE OF CYBERTERRORISM?
        7. GLOSSARY
        8. CROSS REFERENCES
        9. REFERENCES
      3. Online Stalking
        1. WHAT IS ONLINE STALKING?
        2. HOW MUCH OF A PROBLEM IS ONLINE STALKING?
        3. WHAT CAN YOU DO IF YOU ARE A VICTIM?
        4. CONCLUSION
        5. GLOSSARY
        6. CROSS REFERENCES
        7. REFERENCES
        8. FURTHER READING
      4. Electronic Attacks
        1. INTRODUCTION
        2. RECONNAISSANCE PHASE
        3. ATTACK PHASE
        4. DETECTION AVOIDANCE PHASE
        5. CONCLUSION
        6. GLOSSARY
        7. CROSS REFERENCES
        8. REFERENCES
        9. FURTHER READING
      5. Wireless Information Warfare
        1. INTRODUCTION
        2. DEFINITION OF WIRELESS INFORMATION WARFARE
        3. TAXONOMIES OF INFORMATION WARFARE
        4. TAXONOMIES OF WIRELESS NETWORKS
        5. UNIQUE ASPECTS OF WIRELESS INFORMATION WARFARE
        6. SECURE COMMUNICATIONS SYSTEM DESIGN
        7. OFFENSIVE INFORMATION OPERATIONS
        8. DEFENSIVE INFORMATION OPERATIONS
        9. WIW IN PRACTICE: VULNERABILITIES OF A SUBURBAN HOSPITAL
        10. EXAMPLE ATTACK: REMOTE ATTACK ON A WIRELESS NETWORK (VLAN HOPPING)
        11. EXAMPLE DEFENSE: METHODS OF DEFENSE
        12. CONCLUSIONS
        13. GLOSSARY
        14. CROSS REFERENCES
        15. REFERENCES
        16. FURTHER READING
      6. Computer Network Operations (CNO)
        1. INTRODUCTION
        2. NETWORK DEFENSE AND NETWORK ATTACK
        3. A MODEL OF COMPUTER NETWORK ATTACK
        4. TECHNOLOGIES FOR COMPUTER NETWORK DEFENSE
        5. SURVIVABILITY
        6. DECEPTION
        7. DECEPTION TAXONOMY
        8. STRATEGIES AND POLICIES FOR COMPUTER NETWORK OPERATIONS
        9. IMPLEMENTING COMPUTER NETWORK OPERATIONS
        10. GLOSSARY
        11. CROSS REFERENCES
        12. REFERENCES
      7. Electronic Protection
        1. INTRODUCTION
        2. ELECTRONIC EMANATIONS FROM COMPUTER TECHNOLOGY
        3. REDUCING THE THREAT OF ELECTRONIC EMANATIONS
        4. PROTECTING AGAINST OFFENSIVE SIGNALS
        5. CONCLUSION
        6. GLOSSARY
        7. CROSS REFERENCES
        8. REFERENCES
      8. Information Assurance
        1. INTRODUCTION
        2. OVERVIEW OF INFORMATION ASSURANCE TECHNOLOGIES
        3. INTRUSION MASKING TECHNOLOGIES
        4. DEFENSE IN DEPTH TECHNOLOGIES
        5. CONCLUSION
        6. ACKNOWLEDGMENT
        7. GLOSSARY
        8. CROSS REFERENCES
        9. REFERENCES
    12. PART 2: Social and Legal Issues
      1. The Legal Implications of Information Security: Regulatory Compliance and Liability
        1. INTRODUCTION
        2. WHAT IS AT RISK?
        3. STATUTORY AND REGULATORY COMPLIANCE
        4. CONTRACTUAL LIABILITY
        5. TORT LIABILITY
        6. CONCLUSION
        7. GLOSSARY
        8. CROSS REFERENCES
        9. REFERENCES
      2. Hackers, Crackers, and Computer Criminals
        1. INTRODUCTION
        2. DEFINITIONS AND EXAMPLES
        3. TACTICS, TECHNOLOGIES, AND TECHNIQUES
        4. THE COMMON MORALITY ON HACKING AND CRACKING
        5. THE LEGALITY OF HACKING
        6. CONCLUSIONS
        7. GLOSSARY
        8. CROSS REFERENCES
        9. REFERENCES
      3. Hacktivism
        1. INTRODUCTION
        2. THE CULTURE AND FOUNDING ETHICS OF HACKING
        3. FROM HACKING TO MICROSERFDOM
        4. HACKTIVISM, TACTICAL MEDIA, AND THE VIRTUAL SIT-IN
        5. FURTHER EXAMPLES OF HACKTIVIST ACTIONS
        6. OPEN SOURCE AND FREE SOFTWARE: THE REBIRTH OF THE HACKING ETHIC?
        7. ALL THAT IS SOLID MELTS INTO AIR
        8. CONCLUSION
        9. GLOSSARY
        10. CROSS REFERENCES
        11. REFERENCES
      4. Corporate Spying: The Legal Aspects
        1. INTRODUCTION
        2. A SERIES OF QUESTIONS AND A HYPOTHETICAL
        3. THE COMMON LAW REMEDIES AND APPROACHES
        4. THE WIRETAP ACT
        5. THE STORED COMMUNICATIONS ACT
        6. THE COMPUTER FRAUD AND ABUSE ACT
        7. ECONOMIC ESPIONAGE ACT OF 1996
        8. THE DIGITAL MILLENNIUM COPYRIGHT ACT
        9. CORPORATE SPYING ON THE INDIVIDUAL
        10. GOVERNMENT SPYING AND BUSINESSES: THE USA PATRIOT ACT
        11. CONCLUSION
        12. GLOSSARY
        13. CROSS REFERENCES
        14. REFERENCES
      5. Law Enforcement and Computer Security Threats and Measures
        1. INTRODUCTION
        2. COMPUTER SECURITY, THE INTERNET, AND CYBERCRIMES
        3. ESTABLISHING COMPUTER SECURITY THROUGH NATIONAL LAWS
        4. THE ENFORCEMENT OF NATIONAL LAWS CONCERNING COMPUTER SECURITY
        5. BUILDING A GLOBAL LEGAL ORDER TO PROTECT COMPUTER SECURITY
        6. COMPUTER SECURITY AND INTERNATIONAL POLICING
        7. COMPUTER SECURITY, LAW ENFORCEMENT, AND THE BALANCE OF ORDER AND LIBERTY
        8. CONCLUSION
        9. GLOSSARY
        10. CROSS REFERENCES
        11. REFERENCES
      6. Combating the Cybercrime Threat: Developments in Global Law Enforcement
        1. INTRODUCTION
        2. CRIMINALITY AND COMPUTER CRIME
        3. TRANSNATIONAL POLICING AND CYBERCRIME
        4. THE COUNCIL OF EUROPE CYBERCRIME CONVENTION
        5. GLOBAL AND REGIONAL COOPERATION
        6. GLOSSARY
        7. CROSS REFERENCES
        8. REFERENCES
      7. Digital Identity
        1. WHAT IS DIGITAL IDENTITY?
        2. DIGITAL IDENTITY AND PRIVACY
        3. DIGITAL IDENTITY AND IDENTITY THEFT
        4. DIGITAL IDENTITY AND WEB SERVICES
        5. DIGITAL IDENTITY ILLUSTRATED
        6. DIGITAL IDENTITY AND THE CONSUMER
        7. THE IDENTITY WEB
        8. IDENTITY DOCUMENTS AND ADDRESSING
        9. IDENTITY LINKING
        10. DATA SHARING PERMISSIONS AND CONTRACTS
        11. OTHER DIGITAL IDENTITY SERVICES
        12. DIGITAL IDENTITY AND ENTERPRISE APPLICATION INTEGRATION
        13. THE IDENTITY PLAYERS
        14. THE FUTURE OF DIGITAL IDENTITY
        15. GLOSSARY
        16. CROSS REFERENCES
        17. FURTHER READING
      8. Digital Divide
        1. INTRODUCTION
        2. THE ORIGINAL DEFINITION
        3. “PROBLEM SOLVED”
        4. NEW DEFINITIONS
        5. A LOOK AT RECENT DATA
        6. THE INTERNATIONAL DIVIDE
        7. THE IMPORTANCE OF CLOSING THE DIGITAL DIVIDE
        8. COMPLEX SOLUTIONS FOR A COMPLEX PROBLEM
        9. CONCLUSION
        10. GLOSSARY
        11. CROSS REFERENCES
        12. REFERENCES
      9. Legal, Social, and Ethical Issues of the Internet
        1. INTRODUCTION
        2. FREE SPEECH ON THE INTERNET
        3. INTELLECTUAL PROPERTY
        4. INFORMATION PRIVACY
        5. COMPUTER SECURITY
        6. E-VOTING
        7. CONCLUSION
        8. GLOSSARY
        9. CROSS REFERENCES
        10. REFERENCES
        11. FURTHER READING
      10. Anonymity and Identity on the Internet
        1. INTRODUCTION
        2. MECHANICS OF ANONYMITY AND IDENTITY ON THE NET
        3. HOW DO WE KNOW WHO ANYONE IS ON THE NET?
        4. TECHNICAL SOLUTIONS TO IDENTITY AND ANONYMITY
        5. THE SUPREME COURT SPEAKS
        6. INTERNET ANONYMITY AND THE LAW
        7. ANONYMITY DURING WARTIME
        8. SUBPOENAS SEEKING THE IDENTITY OF ANONYMOUS SPEAKERS
        9. AN ANONYMOUS DOMAIN REGISTRANT
        10. CONCLUSION
        11. GLOSSARY
        12. CROSS REFERENCES
        13. ACKNOWLEDGEMENTS
        14. REFERENCES
      11. Spam and the Legal Counter Attacks
        1. INTRODUCTION
        2. “SPAM” AND “SPAM”
        3. A SMALL SHADOWY GROUP OF PROS
        4. SPAM AND CRIME
        5. ENFORCEMENT AND PROSECUTION
        6. EFFECT OF THE LEGISLATIVE COUNTERATTACK
        7. THE GLOBAL PERSPECTIVE
        8. CONCLUSION
        9. GLOSSARY
        10. CROSS REFERENCES
        11. REFERENCES
        12. CITED CASES
        13. FURTHER READING
      12. Cyberlaw: The Major Areas, Development, and Information Security Aspects
        1. INTRODUCTION
        2. INTELLECTUAL PROPERTY
        3. DEFAMATION
        4. PRIVACY CONCERNS
        5. CENSORSHIP
        6. CYBERFRAUD
        7. E-COMMERCE LAW
        8. INFORMATION SECURITY LEGAL LIABILITIES
        9. INSURANCE LAW
        10. THE CLASH OF LAWS
        11. CYBERLAW DISPUTE RESOLUTION
        12. THE LAW OF LINKING
        13. CYBERCRIME
        14. CONCLUSION
        15. GLOSSARY
        16. CROSS REFERENCES
        17. REFERENCES
        18. FURTHER READING
      13. Global Aspects of Cyberlaw
        1. INTRODUCTION
        2. JURISDICTION
        3. PRIVACY
        4. ENCRYPTION AND ELECTRONIC SIGNATURES
        5. INTELLECTUAL PROPERTY
        6. CONCLUSION
        7. GLOSSARY
        8. CROSS REFERENCES
        9. REFERENCES
        10. FURTHER READING
      14. Privacy Law and the Internet
        1. INTRODUCTION
        2. PRIVACY LAW BASICS
        3. PRIVACY LAWS IN THE UNITED STATES AND ABROAD
        4. BALANCING PRIVACY AND LAW ENFORCEMENT
        5. PRIVACY ISSUES FOR BUSINESSES
        6. CONSUMER INTERNET PRIVACY
        7. PRIVACY POLICY FUNDAMENTALS
        8. CONCLUSION
        9. GLOSSARY
        10. CROSS REFERENCES
        11. REFERENCES
      15. Internet Censorship
        1. INTRODUCTION
        2. WHAT IS CENSORSHIP?
        3. THE FIRST AMENDMENT
        4. HARMFUL FORMS OF SPEECH
        5. TOOLS OF THE CENSORS
        6. SECURITY, CENSORSHIP, AND “POINTS OF CONTROL”
        7. GOVERNMENT CENSORSHIP
        8. PRIVATE CENSORSHIP
        9. CONCLUSIONS
        10. GLOSSARY
        11. CROSS REFERENCES
        12. REFERENCES
      16. Copyright Law
        1. COPYRIGHT FUNDAMENTALS
        2. COPYRIGHT REQUIREMENTS
        3. TERM OF COPYRIGHT
        4. FORMALITIES
        5. OWNERSHIP
        6. RIGHTS GRANTED
        7. TYPE OF WORK
        8. COPYRIGHT INFRINGEMENT
        9. LIMITATIONS ON EXCLUSIVE RIGHTS
        10. CONCLUSION
        11. GLOSSARY
        12. CROSS REFERENCES
        13. REFERENCES
        14. FURTHER READING
      17. Patent Law
        1. INTRODUCTION
        2. GENERAL CONSIDERATIONS
        3. PATENT LAW IN THE UNITED STATES
        4. NON-U.S. PATENTS
        5. CONCLUSION
        6. GLOSSARY
        7. CROSS REFERENCES
        8. REFERENCES
        9. FURTHER READING
      18. Trademark Law and the Internet
        1. INTRODUCTION
        2. TRADEMARK DEFINED
        3. FEDERAL TRADEMARK LAW
        4. STATE STATUTES AND COMMON LAW
        5. INFRINGEMENT AND DILUTION
        6. POLICING TRADEMARK ON THE INTERNET
        7. DOMAIN NAMES
        8. CONCLUSION
        9. GLOSSARY
        10. CROSS REFERENCES
        11. REFERENCES
      19. Online Contracts
        1. INTRODUCTION
        2. MAINTAINING THE SECURITY OF ELECTRONIC TRANSACTIONS
        3. THE LEGAL FRAMEWORK FOR ELECTRONIC CONTRACTING
        4. ENFORCEABILITY OF ONLINE CONTRACTS
        5. CONTRACTUAL RESTRICTIONS ON THE USE OF SOFTWARE
        6. SALE OF GOODS LAW AND DIGITAL INFORMATION TRANSACTIONS
        7. CONSUMER PROTECTION ONLINE
        8. BEST PRACTICE FOR ONLINE CONTRACTS
        9. CONCLUSION
        10. GLOSSARY
        11. CROSS REFERENCES
        12. REFERENCES
      20. Electronic Speech
        1. INTRODUCTION
        2. SOCIAL SIGNAL PROCESSING
        3. INEQUALITY AND PUBLIC POLICY
        4. SPEECH-RESTRICTING ARCHITECTURES
        5. SPEECH-RESTRICTION THEORIES: CONTROL RIGHTS VERSUS TOXIC MATERIAL
        6. UNINTENDED CONSEQUENCES
        7. CONCLUSION
        8. GLOSSARY
        9. CROSS REFERENCES
        10. REFERENCES
      21. Software Piracy
        1. INTRODUCTION
        2. MODES OF SOFTWARE PIRACY
        3. MOTIVATIONS FOR SOFTWARE PIRACY
        4. SCOPE AND IMPACT OF PIRACY
        5. MECHANISMS FOR PROTECTION OF SOFTWARE
        6. CONCLUSION
        7. GLOSSARY
        8. CROSS REFERENCES
        9. REFERENCES
      22. Internet Gambling
        1. INTRODUCTION: SECURITY RISKS AND OTHER CHALLENGES OF INTERNET GAMBLING
        2. PHENOMENAL GROWTH OF INTERNET GAMBLING
        3. SECURITY AND PRIVACY ISSUES FOR INTERNET GAMBLING
        4. DEBATE OVER PROHIBITION OR REGULATION
        5. CURRENT REGULATION OF INTERNET GAMBLING
        6. CONCLUSION: THE FUTURE OF INTERNET GAMBLING
        7. ACKNOWLEDGMENTS
        8. GLOSSARY
        9. CROSS REFERENCES
        10. REFERENCES
      23. The Digital Millennium Copyright Act
        1. INTRODUCTION
        2. BASICS AND CRITICAL PROVISIONS
        3. MAJOR EXEMPTIONS
        4. CRIMINAL PROVISIONS
        5. EXEMPTION PROCESS—ANTICIRCUMVENTION RULEMAKING
        6. MAJOR CASES
        7. EXAMPLE CONTROVERSY—MEDIAMAX CD3
        8. CODE AS SPEECH
        9. HOW NOT TO GET SUED UNDER THE DMCA
        10. CONCLUSION
        11. GLOSSARY
        12. CROSS REFERENCES
        13. REFERENCES
      24. Digital Courts, the Law and Evidence
        1. INTRODUCTION
        2. LEGAL SYSTEMS
        3. EVIDENCE
        4. ETHICS
        5. CONCLUSION
        6. GLOSSARY
        7. CROSS REFERENCES
        8. FURTHER READING
    13. PART 3: Foundations of Information, Computer, and Network Security
      1. Encryption Basics
        1. INTRODUCTION
        2. SYMMETRIC-KEY ENCRYPTION: INTRODUCTION
        3. PUBLIC-KEY CRYPTOGRAPHY
        4. CONCLUSION: FURTHER READING
        5. GLOSSARY
        6. CROSS REFERENCES
        7. REFERENCES
      2. Symmetric Key Encryption
        1. INTRODUCTION
        2. SOME “CLASSICAL” ENCRYPTION SCHEMES AND THEIR WEAKNESSES
        3. “PERFECT” SECRECY AND ITS LIMITATIONS
        4. COMPUTATIONAL NOTIONS OF SECURITY
        5. SYMMETRIC KEY ENCRYPTION IN PRACTICE
        6. FURTHER INFORMATION
        7. GLOSSARY
        8. CROSS REFERENCES
        9. REFERENCES
      3. Data Encryption Standard (DES)
        1. INTRODUCTION
        2. HISTORY
        3. OVERVIEW
        4. PERMUTATIONS
        5. KEY DISTRIBUTION/PER-ROUND KEYS
        6. A ROUND
        7. THE MANGLER FUNCTION
        8. WEAK AND SEMI-WEAK KEYS
        9. TRIPLE DES (3DES OR TDEA)
        10. MODES OF OPERATION: ENCRYPTING LONG SEQUENCES OF DATA
        11. CRYPTANALYSIS
        12. SUMMARY
        13. GLOSSARY
        14. CROSS REFERENCES
        15. REFERENCES
        16. FURTHER READING
      4. The Advanced Encryption Standard
        1. HISTORY OF THE ADVANCED ENCRYPTION STANDARD PROCESS
        2. BACKGROUND MATHEMATICAL CONCEPTS
        3. THE ADVANCED ENCRYPTION STANDARD ALGORITHM
        4. IMPLEMENTATION ISSUES
        5. SECURITY—THE FUTURE OF THE ADVANCED ENCRYPTION STANDARD
        6. CROSS REFERENCES
        7. REFERENCES
      5. Hashes and Message Digests
        1. INTRODUCTION
        2. DESIGNING HASH FUNCTIONS
        3. COMPRESSION IN MD4-LIKE HASH FUNCTIONS
        4. ATTACKS ON MD4-LIKE HASH FUNCTIONS
        5. BUILDING HASH FUNCTIONS FROM BLOCK CIPHERS
        6. MESSAGE AUTHENTICATION CODES
        7. CONCLUSION
        8. GLOSSARY
        9. CROSS REFERENCES
        10. REFERENCES
      6. Number Theory for Information Security
        1. INTRODUCTION
        2. REFERENCES
        3. DIVISIBILITY
        4. PRIME NUMBERS AND FACTORING
        5. CONGRUENCES
        6. GROUPS AND FIELDS DEFINED MOD PRIMES
        7. THE CHINESE REMAINDER THEOREM
        8. POLYNOMIAL ARITHMETIC
        9. BIT COMPLEXITY
        10. BIT COMPLEXITY FOR MULTIPRECISE ARITHMETIC
        11. CROSS REFERENCES
        12. REFERENCES
      7. Public Key Algorithms
        1. INTRODUCTION
        2. MERKLE's PUZZLES
        3. ONE-WAY FUNCTIONS
        4. KNAPSACK ALGORITHM
        5. KEY ESTABLISHMENT TECHNIQUES
        6. DIFFIE–HELLMAN KEY EXCHANGE
        7. ELGAMAL
        8. RSA
        9. PROTECTING PUBLIC AND PRIVATE KEYS
        10. CONCLUSION
        11. GLOSSARY
        12. CROSS REFERENCES
        13. REFERENCES
      8. Elliptic Curve Cryptography
        1. INTRODUCTION
        2. GROUP LAW
        3. THE ELLIPTIC CURVE DISCRETE LOGARITHM PROBLEM
        4. PROTOCOLS
        5. DEFENCES AGAINST SIDE CHANNEL ATTACKS
        6. CONCLUSION
        7. ACKNOWLEDGMENTS
        8. CROSS REFERENCES
        9. REFERENCES
      9. IBE (Identity-Based Encryption)
        1. INTRODUCTION
        2. IBC VERSUS PUBLIC KEY CRYPTOGRAPHY
        3. ALTERNATIVES TO IBE
        4. THE GUILLOU–QUISQUATER IBS SCHEME
        5. COCKS's IDENTITY-BASED ENCRYPTION SCHEME
        6. IDENTIFY-BASED ENCRYPTION USING PAIRINGS
        7. HIERARCHICAL IDENTITY-BASED ENCRYPTION
        8. MORE THAN JUST IDENTITIES: EXTENDING IDENTITY-BASED CRYPTOGRAPHY
        9. CONCLUSIONS AND FURTHER READING
        10. GLOSSARY
        11. CROSS REFERENCES
        12. REFERENCES
      10. Cryptographic Protocols
        1. INTRODUCTION: WHAT IS A PROTOCOL?
        2. CLASSIFYING PROTOCOLS WITH RESPECT TO THE ADVERSARY
        3. UNDERSTANDING THE ADVERSARY
        4. WHAT SHOULD A PROTOCOL DO—AND NOT DO?
        5. COMMON BUILDING BLOCKS
        6. SOME CRYPTOGRAPHIC PROTOCOLS
        7. GLOSSARY
        8. CROSS REFERENCES
        9. REFERENCES
        10. FURTHER READING
      11. Quantum Cryptography
        1. INTRODUCTION
        2. PUBLIC VERSUS PRIVATE KEY CRYPTOSYSTEMS
        3. THE PHOTON POLARIZATION AND THE RULES OF QUANTUM MECHANICS
        4. NONORTHOGONAL STATES QUANTUM KEY DISTRIBUTION PROTOCOLS
        5. QUANTUM EAVESDROPPING
        6. ENTANGLEMENT-BASED QUANTUM KEY DISTRIBUTION PROTOCOL
        7. SUGGESTIONS FOR FURTHER READING
        8. GLOSSARY
        9. CROSS REFERENCES
        10. REFERENCES
      12. Key Lengths
        1. INTRODUCTION
        2. SECURITY LEVEL
        3. SYMMETRIC CRYPTOSYSTEMS
        4. CRYPTOGRAPHIC HASH FUNCTIONS
        5. ASYMMETRIC METHODS
        6. FACTORING-BASED CRYPTOSYSTEMS
        7. DISCRETE LOGARITHM-BASED CRYPTOSYSTEMS
        8. CONCLUSION
        9. ACKNOWLEDGMENT
        10. GLOSSARY
        11. CROSS REFERENCES
        12. REFERENCES
      13. Key Management
        1. INTRODUCTION
        2. SECRET KEY MANAGEMENT FOR TWO-PARTY COMMUNICATION
        3. PUBLIC KEY MANAGEMENT
        4. GROUP KEY MANAGEMENT FOR SECURE GROUP COMMUNICATION
        5. AUTHENTICATED KEY MANAGEMENT
        6. KEY UTILIZATION
        7. KEY STORAGE, RECOVERY, AND ESCROW
        8. CONCLUSION
        9. ACKNOWLEDGMENT
        10. GLOSSARY
        11. CROSS REFERENCES
        12. REFERENCES
      14. Secure Electronic Voting Protocols
        1. INTRODUCTION
        2. VOTING: GENERAL OVERVIEW
        3. E-VOTING: GENERAL SETTING
        4. CRYPTOGRAPHIC PRELIMINARIES
        5. HOMOMORPHIC E-VOTING SCHEMES
        6. VERIFIABLE SHUFFLE-BASED E-VOTING SCHEMES
        7. COMPARISON AND PRACTICAL CONSIDERATION
        8. FURTHER RESEARCH TOPICS
        9. ACKNOWLEDGMENTS
        10. GLOSSARY
        11. CROSS REFERENCES
        12. REFERENCES
      15. Digital Evidence
        1. DEFINITION
        2. ADMISSIBILITY
        3. PRESERVATION OF EVIDENCE
        4. PRESENTATION
        5. RETENTION/DESTRUCTION
        6. CONCLUSION
        7. GLOSSARY
        8. CROSS REFERENCES
        9. REFERENCES
      16. Digital Watermarking and Steganography
        1. INTRODUCTION: DIGITAL INTELLECTUAL PROPERTY
        2. DIGITAL WATERMARKING
        3. STEGANOGRAPHY
        4. CONCLUDING REMARKS
        5. GLOSSARY
        6. CROSS REFERENCES
        7. REFERENCES
      17. Law Enforcement and Digital Evidence
        1. DIGITAL EVIDENCE AND DIGITAL FORENSICS
        2. DIGITAL FORENSIC TOOL VALIDATION
        3. FORENSIC COUNTERMEASURES
        4. DIGITAL EVIDENCE: GROWING IN VOLUME AND DIVERSITY
        5. A LAW ENFORCEMENT VIEW OF THE FUTURE OF DIGITAL EVIDENCE
        6. GLOSSARY
        7. CROSS REFERENCES
        8. REFERENCES
        9. FURTHER READING
      18. Forensic Computing
        1. INTRODUCTION AND FOUNDATIONS OF COMPUTER FORENSICS
        2. DISK FORENSICS
        3. IDENTIFYING THE SOURCE OF NETWORK ATTACKS
        4. DISCOVERING ATTACK STEPS
        5. LEGAL ISSUES
        6. ENHANCING THE EXISTING INFRASTRUCTURE
        7. CONCLUDING REMARKS
        8. CROSS REFERENCES
        9. REFERENCES
      19. Computer Forensics Procedures and Methods
        1. INTRODUCTION
        2. SOUND COMPUTER FORENSIC PRACTICE
        3. ARRIVING AT THE SCENE: INITIAL RESPONSE
        4. ANALYSIS OF A FORENSIC IMAGE
        5. COLLECTING EVIDENCE FROM LIVE SYSTEMS
        6. COMMERCIAL TOOLS
        7. CONCLUSION
        8. GLOSSARY
        9. CROSS REFERENCES
        10. REFERENCES
        11. FURTHER READING
      20. Computer Forensics—Computer Media Reviews in Classified Government Agencies
        1. INTRODUCTION
        2. PERSONAL COMPUTER SECURITY WEAKNESSES: HISTORICAL PERSPECTIVE
        3. SECURITY RISKS: WINDOWS XP AND NOTEBOOK COMPUTERS
        4. RISKS ASSOCIATED WITH AMBIENT DATA STORAGE AREAS
        5. RISKS ASSOCIATED WITH COMPUTER-RELATED STORAGE DEVICES
        6. CONCERNS SPECIFIC TO CLASSIFIED GOVERNMENT AGENCIES
        7. FORENSIC SEARCH PRACTICES IN CLASSIFIED SECURITY REVIEWS
        8. RISKS ASSOCIATED WITH NONTEXT (BINARY) FILES
        9. CONCLUSIONS
        10. GLOSSARY
        11. CROSS REFERENCES
        12. FURTHER READING
      21. Forensic Analysis of UNIX Systems
        1. INTRODUCTION
        2. TOOLS AND TECHNIQUES FOR FORENSIC INVESTIGATIONS
        3. UNIX AND NETWORK FORENSICS
        4. CONDUCTING INTERNATIONAL FORENSIC OPERATIONS IN INCIDENT RESPONSE: SOME OBSERVATIONS
        5. GLOSSARY
        6. CROSS REFERENCES
        7. REFERENCES
        8. FURTHER READING
      22. Forensic Analysis of Windows Systems
        1. INTRODUCTION
        2. OVERVIEW OF THE WINDOWS REGISTRY
        3. WINDOWS NTFS FILE SYSTEM AND STORAGE
        4. LOGGING AND AUDITING IN WINDOWS
        5. PREPARING THE ANALYSIS TOOLKIT
        6. CONDUCTING THE INVESTIGATION
        7. CONCLUSION
        8. GLOSSARY
        9. CROSS REFERENCES
        10. REFERENCES
        11. FURTHER READING
      23. Operating System Security
        1. INFORMATION PROTECTION AND SECURITY
        2. REQUIREMENTS FOR OPERATING SYSTEM SECURITY
        3. PROTECTION MECHANISMS
        4. FILE SHARING
        5. TRUSTED SYSTEMS
        6. GLOSSARY
        7. CROSS REFERENCES
        8. REFERENCES
        9. FURTHER READING
      24. UNIX Security
        1. WHAT IS SECURITY?
        2. IMPORTANCE OF A SECURITY POLICY
        3. UNIX SECURITY
        4. SECURITY STRATEGIES
        5. CONCLUSION
        6. GLOSSARY
        7. CROSS REFERENCES
        8. REFERENCES
        9. FURTHER READING
      25. Linux Security
        1. INTRODUCTION
        2. THE BASICS
        3. SYSTEM INITIALIZATION
        4. KERNEL SECURITY
        5. NETWORK SECURITY
        6. FILE SYSTEM SECURITY
        7. APPLICATIONS AND SERVICE DAEMONS
        8. PATCH AND PACKAGE MANAGEMENT
        9. ROOT, USER, AND GROUP ACCOUNTS
        10. SYSTEM AUDITING
        11. BACKUPS
        12. LEGAL PROTECTIONS
        13. CONCLUSION
        14. GLOSSARY
        15. CROSS REFERENCES
        16. REFERENCES
        17. FURTHER READING
      26. OpenVMS Security
        1. INTRODUCTION
        2. BASIS IN ARCHITECTURE
        3. SECURITY-SPECIFIC ARCHITECTURE
        4. IMPLEMENTING SECURE USER ENVIRONMENTS
        5. APPLICATION PROGRAMMING INTERFACES
        6. OPEN SOURCE SOFTWARE
        7. SUMMARY
        8. ACKNOWLEDGMENTS
        9. GLOSSARY
        10. CROSS REFERENCES
        11. REFERENCES
        12. FURTHER READING
      27. Windows 2000 Security
        1. ABOUT W2K
        2. HOW W2K WORKS
        3. HOW SECURE IS W2K?
        4. BASELINE SECURITY MEASURES
        5. CONCLUSION
        6. GLOSSARY
        7. CROSS REFERENCES
        8. REFERENCES
      28. Software Development and Quality Assurance
        1. INTRODUCTION
        2. METAISSUES IN SOFTWARE DEVELOPMENT
        3. REQUIREMENTS AND DESIGN
        4. QUALITY ASSURANCE IN CODING AND TESTING
        5. CONCLUSION
        6. GLOSSARY
        7. CROSS REFERENCES
        8. REFERENCES
      29. The Common Criteria
        1. INTRODUCTION
        2. STRUCTURE
        3. EVALUATIONS, CERTIFICATIONS, AND ACCREDITATIONS
        4. PROTECTION PROFILES
        5. SECURITY TARGETS
        6. SECURITY FUNCTIONAL REQUIREMENTS
        7. ASSURANCE REQUIREMENTS
        8. CLASS ACM: CONFIGURATION MANAGEMENT
        9. CLASS ADO: DELIVERY AND OPERATION
        10. CLASS ADV: DEVELOPMENT
        11. CLASS ADG: GUIDANCE DOCUMENTS
        12. CLASS ALC: LIFE-CYCLE SUPPORT
        13. CLASS ATE: TESTING
        14. CLASS AVA: VULNERABILITY ASSESSMENT
        15. EVALUATION ASSURANCE LEVELS
        16. CONCLUSIONS
        17. GLOSSARY
        18. CROSS REFERENCES
        19. REFERENCES
        20. FURTHER READING
    14. Reviewers List
    15. Index

Product information

  • Title: Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2
  • Author(s):
  • Release date: January 2006
  • Publisher(s): Wiley
  • ISBN: 9780471648314