Computer and Information Security Handbook 2nd ed. H 1200 p. 13
目次
Part I Overview of System and Network Security: A Comprehensive Introduction Chapter 1 Building a Secure Organization 1.1 OBSTACLES TO SECURITY1.2 TEN STEPS TO BUILDING A SECURE ORGANIZATION 1.3 DON'T FORGET THE BASICS1.4 PREPARING FOR THE BUILDING OF SECURITY CONTROL ASSESSMENTS1.5 SUMMARY1.6 CHAPTER REVIEW QUESTIONS/EXERCISES1.7 OPTIONAL TEAM CASE PROJECT Chapter 2 A Cryptography Primer 2.1 WHAT IS CRYPTOGRAPHY? WHAT IS ENCRYPTION?2.2 FAMOUS CRYPTOGRAPHIC DEVICES2.3 CIPHERS2.4 MODERN CRYPTOGRAPHY2.5 THE COMPUTER AGE2.6 HOW AES WORKS2.7 SELECTING CRYPTOGRAPHY: THE PROCESS2.8 SUMMARY2.9 CHAPTER REVIEW QUESTIONS/EXERCISES2.9 OPTIONAL TEAM CASE PROJECT Chapter 3 Detecting System Intrusions 3.1 INTRODUCTION3.2 MONITORING KEY FILES IN THE SYSTEM 3.3 SECURITY OBJECTIVES3.4 0DAY ATTACKS3.5 GOOD KNOWN STATE3.6 ROOTKITS3.7 LOW HANGING FRUIT3.8 ANTIVIRUS SOFTWARE3.9 HOMEGROWN INTRUSION DETECTION3.10 FULL PACKET CAPTURE DEVICES3.11 OUT OF BAND ATTACK VECTORS3.12 SECURITY AWARENESS TRAINING3.13 DATA CORRELATION3.14 SIEM3.15 OTHER WEIRD STUFF ON THE SYSTEM 3.16 DETECTION3.17 NETWORK-BASED DETECTION OF SYSTEM INTRUSIONS (DSIS)3.18 SUMMARY3.19 CHAPTER REVIEW QUESTIONS/EXERCISES3.20 OPTIONAL TEAM CASE PROJECT Chapter 4 Preventing System Intrusions 4.1 SO, WHAT IS AN INTRUSION?4.2 SOBERING NUMBERS4.3 KNOW YOUR ENEMY: HACKERS VERSUS CRACKERS4.4 MOTIVES4.5 THE CRACKERS' TOOLS OF THE TRADE4.6 BOTS4.7 SYMPTOMS OF INTRUSIONS 4.8 WHAT CAN YOU DO?4.9 SECURITY POLICIES4.10 RISK ANALYSIS4.11 TOOLS OF YOUR TRADE4.12 CONTROLLING USER ACCESS4.13 INTRUSION PREVENTION CAPABILITIES4.14 SUMMARY4.15 CHAPTER REVIEW QUESTIONS/EXERCISES4.16 OPTIONAL TEAM CASE PROJECT CHAPTER 5 Guarding Against Network Intrusions 5.1 TRADITIONAL RECONNAISSANCE AND ATTACKS5.2 MALICIOUS SOFTWARE5.3 DEFENSE IN DEPTH5.4 PREVENTIVE MEASURES5.5 INTRUSION MONITORING AND DETECTION5.6 REACTIVE MEASURES5.7 NETWORK-BASED INTRUSION PROTECTION5.6 SUMMARY5.7 CHAPTER REVIEW QUESTIONS/EXERCISES5.8 OPTIONAL TEAM CASE PROJECT CHAPTER 6 Securing Cloud Computing Systems 6.1 CLOUD COMPUTING ESSENTIALS: EXAMINING THE CLOUD LAYERS6.2 SOFTWARE AS A SERVICE (SAAS): MANAGING RISKS IN THE CLOUD 6.3 PLATFORM AS A SERVICE (PAAS): SECURING THE PLATFORM 6.4 INFRASTRUCTURE AS A SERVICE (IAAS)6.5 LEVERAGING PROVIDER-SPECIFIC SECURITY OPTIONS 6.6 ACHIEVING SECURITY IN A PRIVATE CLOUD 6.7 MEETING COMPLIANCE REQUIREMENTS6.8 PREPARING FOR DISASTER RECOVERY 6.9 SUMMARY6.10 CHAPTER REVIEW QUESTIONS/EXERCISES6.11 OPTIONAL TEAM CASE PROJECT CHAPTER 7 Fault Tolerance and Resilience in Cloud Computing Environments 7.1 INTRODUCTION7.2 CLOUD COMPUTING FAULT MODEL 7.3 BASIC CONCEPTS ON FAULT TOLERANCE 7.4 DIFFERENT LEVELS OF FAULT TOLERANCE IN CLOUD COMPUTING 7.5 FAULT TOLERANCE AGAINST CRASH FAILURES IN CLOUD COMPUTING7.6 FAULT TOLERANCE AGAINST BYZANTINE FAILURES IN CLOUD COMPUTING7.7 FAULT TOLERANCE AS A SERVICE IN CLOUD COMPUTING 7.8 SUMMARY7.9 CHAPTER REVIEW QUESTIONS/EXERCISES 7.10 OPTIONAL TEAM CASE PROJECT CHAPTER 8 Securing Web Applications, Services and Servers 8.1 SETTING THE STAGE8.2 BASIC SECURITY FOR HTTP APPLICATIONS AND SERVICES 8.3 BASIC SECURITY FOR SOAP SERVICES8.4 IDENTITY MANAGEMENT AND WEB SERVICES8.5 AUTHORIZATION PATTERNS8.6 SECURITY CONSIDERATIONS8.7 CHALLENGES8.8 SUMMARY8.9 CHAPTER REVIEW QUESTIONS/EXERCISES 8.10 OPTIONAL TEAM CASE PROJECT CHAPTER 9 Unix and Linux Security 9.1 UNIX AND SECURITY9.2 BASIC UNIX SECURITY OVERVIEW9.3 ACHIEVING UNIX SECURITY9.4 PROTECTING USER ACCOUNTS AND STRENGTHENING AUTHENTICATION9.5 LIMITING SUPERUSER PRIVILEGES9.6 SECURING LOCAL AND NETWORK FILE SYSTEMS9.7 NETWORK CONFIGURATION9.8 ADDITIONAL RESOURCES9.9 IMPROVING THE SECURITY OF LINUX AND UNIX SYSTEMS9.10 SUMMARY9.11 CHAPTER REVIEW QUESTIONS/EXERCISES9.12 OPTIONAL TEAM CASE PROJECT CHAPTER 10 Eliminating the Security Weakness of Linux and UNIX Operating Systems 10.1 INTRODUCTION10.2 HARDENING LINUX AND UNIX10.3 PROACTIVE DEFENSE FOR LINUX AND UNIX10.4 SUMMARY10.5 CHAPTER REVIEW QUESTIONS/EXERCISES10.6 OPTIONAL TEAM CASE PROJECT CHAPTER 11 Internet Security 11.1 INTERNET PROTOCOL ARCHITECTURE11.2 AN INTERNET THREAT MODEL11.3 DEFENDING AGAINST ATTACKS ON THE INTERNET11.4 INTERNET SECURITY CHECKLIST11.5 SUMMARY11.6 CHAPTER REVIEW QUESTIONS/EXERCISES11.7 OPTIONAL TEAM CASE PROJECT CHAPTER 12 The Botnet Problem 12.1 INTRODUCTION12.2 BOTNET OVERVIEW12.3 TYPICAL BOT LIFE CYCLE12.4 THE BOTNET BUSINESS MODEL12.5 BOTNET DEFENSE12.6 BOTMASTER TRACEBACK12.7 PREVENTING BOTNETS12.8 SUMMARY12.9 CHAPTER REVIEW QUESTIONS/EXERCISES12.10 OPTIONAL TEAM CASE PROJECT CHAPTER 13 Intranet Security 13.1 SMARTPHONES & TABLETS IN THE INTRANET13.2 SECURITY CONSIDERATIONS13.3 PLUGGING THE GAPS: NAC AND ACCESS CONTROL 13.4 MEASURING RISK: AUDITS13.5 GUARDIAN AT THE GATE: AUTHENTICATION AND ENCRYPTION13.6 WIRELESS NETWORK SECURITY13.7 SHIELDING THE WIRE: NETWORK PROTECTION 13.8 WEAKEST LINK IN SECURITY: USER TRAINING 13.9 DOCUMENTING THE NETWORK: CHANGE MANAGEMENT 13.10 REHEARSE THE INEVITABLE: DISASTER RECOVERY 13.11 CONTROLLING HAZARDS: PHYSICAL AND ENVIRONMENTAL PROTECTION 13.12 KNOW YOUR USERS: PERSONNEL SECURITY 13.13 PROTECTING DATA FLOW: INFORMATION AND SYSTEM INTEGRITY 13.14 SECURITY ASSESSMENTS13.15 RISK ASSESSMENTS13.16 INTRANET SECURITY CHECKLIST13.17 SUMMARY13.18 CHAPTER REVIEW QUESTIONS/EXERCISES13.19 OPTIONAL TEAM CASE PROJECT CHAPTER 14 Local Area Network Security 14.1 IDENTIFY NETWORK THREATS14.2 ESTABLISH NETWORK ACCESS CONTROLS14.3 RISK ASSESSMENT14.4 LISTING NETWORK RESOURCES14.5 THREATS14.6 SECURITY POLICIES14.7 THE INCIDENT-HANDLING PROCESS14.8 SECURE DESIGN THROUGH NETWORK ACCESS CONTROLS14.9 IDS DEFINED14.10 NIDS: SCOPE AND LIMITATIONS14.11 A PRACTICAL ILLUSTRATION OF NIDS14.12 FIREWALLS14.13 DYNAMIC NAT CONFIGURATION14.14 THE PERIMETER14.15 ACCESS LIST DETAILS14.16 TYPES OF FIREWALLS14.17 PACKET FILTERING: IP FILTERING ROUTERS14.18 APPLICATION-LAYER FIREWALLS: PROXY SERVERS14.19 STATEFUL INSPECTIO FIREWALLS14.20 NIDS COMPLEMENTS FIREWALLS14.21 MONITOR AND ANALYZE SYSTEM ACTIVITIES14.22 SIGNATURE ANALYSIS14.23 STATISTICAL ANALYSIS14.24 SIGNATURE ALGORITHMS14.25 SUMMARY14.26 CHAPTER REVIEW QUESTIONS/EXERCISES14.27 OPTIONAL TEAM CASE PROJECT CHAPTER 15 Wireless Network Security 15.1 CELLULAR NETWORKS15.2 WIRELESS AD HOC NETWORKS 15.3 SECURITY PROTOCOLS 15.4 WEP15.5 WPA and WPA215.6 SPINS: Security Protocols for Sensor Networks15.7 SECURE ROUTING15.8 SEAD15.9 ARAN15.10 SLSP15.11 KEY ESTABLISHMENT15.12 ING15.13 MANAGEMENT COUNTERMEASURES 15.14 SUMMARY15.15 CHAPTER REVIEW QUESTIONS/EXERCISES15.16 OPTIONAL TEAM CASE PROJECT CHAPTER 16 Wireless Sensor Network Security 16.1 INTRODUCTION TO WIRELESS SENSOR NETWORK (WSN)16.2 SUMMARY16.3 CHAPTER REVIEW QUESTIONS/EXERCISES16.4 OPTIONAL TEAM CASE PROJECT CHAPTER 17 Cellular Network Security 17.1 INTRODUCTION TO WIRELESS SENSOR NETWORK (WSN)17.2 OVERVIEW OF CELLULAR NETWORKS 17.3 THE STATE OF THE ART OF CELLULAR NETWORK SECURITY 17.4 CELLULAR NETWORK ATTACK TAXONOMY 17.5 CELLULAR NETWORK VULNERABILITY ANALYSIS17.6 (aCAT) 17.7 (eCAT)17.8 SUMMARY17.9 CHAPTER REVIEW QUESTIONS/EXERCISES17.10 OPTIONAL TEAM CASE PROJECT CHAPTER 18 RFID Security 18.1 RFID INTRODUCTION 18.2 RFID CHALLENGES 18.3 RFID PROTECTIONS 18.4 SUMMARY18.5 CHAPTER REVIEW QUESTIONS/EXERCISES18.6 OPTIONAL TEAM CASE PROJECT CHAPTER 19 Optical Network Security 19.1 OPTICAL NETWORKS19.2 SECURING OPTICAL NETWORKS19.3 IDENTIFY VULNERABILITIES 19.4 CORRECTIVE ACTIONS19.5 SUMMARY19.6 CHAPTER REVIEW QUESTIONS/EXERCISES19.7 OPTIONAL TEAM CASE PROJECT CHAPTER 20 Optical Wireless Security 20.1 OPTICAL WIRELESS SYSTEMS OVERVIEW 20.2 DEPLOYMENT ARCHITECTURES20.3 HIGH BANDWIDTH 20.4 LOW COST20.5 IMPLEMENTATION20.6 SURFACE AREA20.7 SUMMARY20.8 CHAPTER REVIEW QUESTIONS/EXERCISES20.9 OPTIONAL TEAM CASE PROJECT Part II Managing Information Security CHAPTER 21 Information Security Essentials for IT Managers: Protecting Mission-Critical Systems 21.1 INFORMATION SECURITY ESSENTIALS FOR IT MANAGERS21.2 OVERVIEW21.3 PROTECTING MISSION-CRITICAL SYSTEMS21.4 INFORMATION SECURITY FROM THE GROUND UP21.5 SECURITY MONITORING AND EFFECTIVENESS 21.6 SUMMARY21.7 CHAPTER REVIEW QUESTIONS/EXERCISES21.8 OPTIONAL TEAM CASE PROJECT CHAPTER 22 Security Management Systems 22.1 SECURITY MANAGEMENT SYSTEM STANDARDS22.2 TRAINING REQUIREMENTS22.3 PRINCIPLES OF INFORMATION SECURITY22.4 ROLES AND RESPONSIBILITIES OF PERSONNEL 22.5 SECURITY POLICIES22.6 SECURITY CONTROLS22.7 NETWORK ACCESS22.8 RISK ASSESSMENT22.9 INCIDENT RESPONSE22.10 SUMMARY22.11 CHAPTER REVIEW QUESTIONS/EXERCISES22.12 OPTIONAL TEAM CASE PROJECT CHAPTER 23 Policy-driven System Management 23.1 INTRODUCTION23.2 SECURITY AND POLICY-BASED MANAGEMENT23.3 CLASSIFICAION AND LANGUAGES23.4 CONTROLS FOR ENFORCING SECURITY POLICIES IN DISTRIBUTED SYSTEMS23.5 PRODUCTS AND TECHNOLOGIES23.6 RESEARCH PROJECTS23.7 SUMMARY23.8 CHAPTER REVIEW QUESTIONS/EXERCISES23.9 OPTIONAL TEAM CASE PROJECT CHAPTER 24 Information Technology Security Management 24.1 INFORMATION SECURITY MANAGEMENT STANDARDS 24.2 OTHER ORGANIZATIONS INVOLVED IN STANDARDS 24.3 INFORMATION TECHNOLOGY SECURITY ASPECTS24.4 SUMMARY24.5 CHAPTER REVIEW QUESTIONS/EXERCISES24.6 OPTIONAL TEAM CASE PROJECT CHAPTER 25 Online Identity and User Management Services 25.1 INTRODUCTION25.2 EVOLUTION OF IDENTITY MANAGEMENT REQUIREMENTS 25.3 THE REQUIREMENTS FULFILLED BY IDENTITY MANAGEMENT TECHNOLOGIES25.4 IDENTITY MANAGEMENT 1.025.5 SOCIAL LOGIN AND USER MANAGEMENT25.6 IDENTITY 2.0 FOR MOBILE USERS25.7 SUMMARY25.8 CHAPTER REVIEW QUESTIONS/EXERCISES25.9 OPTIONAL TEAM CASE PROJECT CHAPTER 26 Intrusion Prevention and Detection Systems 26.1 WHAT IS AN 'INTRUSION' ANYWAY?26.2 PHYSICAL THEFT 26.3 ABUSE OF PRIVILEGES (THE INSIDER THREAT)26.4 UNAUTHORIZED ACCESS BY OUTSIDER 26.5 MALWARE INFECTION 26.6 THE ROLE OF THE '0-DAY'26.7 THE ROGUE'S GALLERY: ATTACKERS AND MOTIVES 26.8 A BRIEF INTRODUCTION TO TCP/IP26.9 THE TCP/IP DATA ARCHITECTURE AND DATA ENCAPSULATION26.10 SURVEY OF INTRUSION DETECTION AND PREVENTION26.11 TECHNOLOGIES26.12 ANTI-MALWARE SOFTWARE 26.13 NETWORK-BASED INTRUSION DETECTION SYSTEMS26.14 NETWORK-BASED INTRUSION PREVENTION SYSTEMS26.15 HOST-BASED INTRUSION PREVENTION SYSTEMS26.16 SECURITY INFORMATION MANAGEMENT SYSTEMS26.17 NETWORK SESSION ANALYSIS26.18 DIGITAL FORENSICS26.19 SYSTEM INTEGRITY VALIDATION26.20 SUMMARY26.21 CHAPTER REVIEW QUESTIONS/EXERCISES26.22 OPTIONAL TEAM CASE PROJECT CHAPTER 27 TCP/IP Packet Analysis 27.1 THE INTERNET MODEL27.2 SUMMARY27.3 CHAPTER REVIEW QUESTIONS/EXERCISES27.4 OPTIONAL TEAM CASE PROJECT CHAPTER 28 The Enemy (The Intruder's Genesis) 28.1 INTRODUCTION28.2 ACTIVE RECONNAISSANCE 28.3 ENUMERATION 28.4 PENETRATION & GAIN ACCESS 28.5 MAINTAIN ACCESS28.6 DEFEND NETWORK AGAINST UNAUTHORIZED ACCESS 28.7 SUMMARY28.8 CHAPTER REVIEW QUESTIONS/EXERCISES28.9 OPTIONAL TEAM CASE PROJECT CHAPTER 29 Firewalls 29.1 INTRODUCTION 29.2 NETWORK FIREWALLS 29.3 FIREWALL SECURITY POLICIES 29.4 A SIMPLE MATHEMATICAL MODEL FOR POLICIES, RULES, AND PACKETS 29.5 FIRST-MATCH FIREWALL POLICY ANOMALIES 29.6 POLICY OPTIMIZATION 29.7 FIREWALL TYPES 29.8 HOST AND NETWORK FIREWALLS 29.9 SOFTWARE AND HARDWARE FIREWALL IMPLEMENTATIONS29.10 CHOOSING THE CORRECT FIREWALL 29.11 FIREWALL PLACEMENT AND NETWORK TOPOLOGY 29.12 FIREWALL INSTALLATION AND CONFIGURATION 29.13 SUPPORTING OUTGOING SERVICES THROUGH FIREWALL CONFIGURATION 29.14 SECURE EXTERNAL SERVICES PROVISIONING 29.15 NETWORK FIREWALLS FOR VOICE AND VIDEO APPLICATIONS 29.16 FIREWALLS AND IMPORTANT ADMINISTRATIVE SERVICE PROTOCOLS29.17 INTERNAL IP SERVICES PROTECTION 29.18 FIREWALL REMOTE ACCESS CONFIGURATION 29.19 LOAD BALANCING AND FIREWALL ARRAYS29.20 HIGHLY AVAILABLE FIREWALLS29.21 FIREWALL MANAGEMENT29.22 SUMMARY29.23 CHAPTER REVIEW QUESTIONS/EXERCISES29.24 OPTIONAL TEAM CASE PROJECT CHAPTER 30 Penetration Testing 30.1 INTRODUCTION 30.2 WHAT IS PENETRATION TESTING?30.3 HOW DOES PENETRATION TESTING DIFFER FROM AN ACTUAL "HACK?30.4 TYPES OF PENETRATION TESTING30.5 PHASES OF PENETRATION TESTING 30.6 DEFINING WHAT'S EXPECTED 30.7 THE NEED FOR A METHODOLOGY 30.8 PENETRATION TESTING METHODOLOGIES 30.9 METHODOLOGY IN ACTION 30.10 PENETRATION TESTING RISKS 30.11 LIABILITY ISSUES30.12 LEGAL CONSEQUENCES 30.13 "GET OUT OF JAIL FREE CARD 30.14 PENETRATION TESTING CONSULTANTS 30.15 REQUIRED SKILL SETS 30.16 ACCOMPLISHMENTS30.17 HIRING A PENETRATION TESTER 30.18 WHY SHOULD A COMPANY HI RE YOU?30.19 SUMMARY30.20 CHAPTER REVIEW QUESTIONS/EXERCISES30.21 OPTIONAL TEAM CASE PROJECT CHAPTER 31 What Is Vulnerability Assessment? 31.1 INTRODUCTION 31.2 REPORTING31.3 THE "IT WON'T HAPPEN TO US FACTOR 31.4 WHY VULNERABILITY ASSESSMENT?31.5 PENETRATION TESTING VERSUS VULNERABILITY ASSESSMENT 31.6 VULNERABILITY ASSESSMENT GOAL 31.7 MAPPING THE NETWORK 31.8 SELECTING THE RIGHT SCANNERS 31.9 CENTRAL SCANS VERSUS LOCAL SCANS 31.10 DEFENSE IN DEPTH STRATEGY 31.11 VULNERABILITY ASSESSMENT TOOLS 31.12 SARA31.13 SAINT31.14 MBSA 31.15 SCANNER PERFORMANCE 31.16 SCAN VERIFICATION 31.17 SCANNING CORNERSTONES 31.18 NETWORK SCANNING COUNTERMEASURES 31.19 VULNERABILITY DISCLOSURE DATE31.20 PROACTIVE SECURITY VERSUS REACTIVE SECURITY31.21 VULNERABILITY CAUSES31.22 DIY VULNERABILITY ASSESSMENT31.23 SUMMARY31.24 CHAPTER REVIEW QUESTIONS/EXERCISES31.25 OPTIONAL TEAM CASE PROJECT CHAPTER 32 Security Metrics: An Introduction and Literature Review 32.1 INTRODUCTION 32.2 WHY SECURITY METRICS?32.3 THE NATURE OF SECURITY METRICS 32.4 GETTING STARTED WITH SECURITY METRICS 32.5 METRICS IN ACTION-TOWARDS AN INTELLIGENT SECURITY DASHBOARD32.6 SECURITY METRICS IN THE LITERATURE 32.7 SUMMARY32.8 CHAPTER REVIEW QUESTIONS/EXERCISES32.9 OPTIONAL TEAM CASE PROJECT Part III Cyber, Network, and Systems Forensics Security and Assurance CHAPTER 33 Cyber Forensics 33.1 WHAT IS CYBER FORENSICS?33.2 ANALYSIS OF DATA 33.3 CYBER FORENSICS IN THE COURT SYSTEM 33.4 UNDERSTANDING INTERNET HISTORY33.5 TEMPORARY RESTRAINING ORDERS AND LABOR DISPUTES 33.6 NTFS33.7 FIRST PRINCIPLES33.8 HACKING A WINDOWS XP PASSWORD33.9 NETWORK ANALYSIS33.10 CYBER FORENSICS APPLIED33.11 TESTIFYING AS AN EXPERT33.12 BEGINNING TO END IN COURT33.13 SUMMARY33.14 CHAPTER REVIEW QUESTIONS/EXERCISES 33.15 OPTIONAL TEAM CASE PROJECT CHAPTER 34 Cyber Forensics and Incidence Response 34.1 INTRODUCTION TO CYBER FORENSICS34.2 HANDLING PRELIMINARY INVESTIGATIONS 34.3 CONTROLLING AN INVESTIGATION 34.4 CONDUCTING DISK-BASED ANALYSIS34.5 INVESTIGATING INFORMATION-HIDING TECHNIQUES34.6 SCRUTINIZING E-MAIL34.7 VALIDATING E-MAIL HEADER INFORMATION34.8 TRACING INTERNET ACCESS34.9 SEARCHING MEMORY IN REAL TIME34.10 SUMMARY34.11 CHAPTER REVIEW QUESTIONS/EXERCISES 34.12 OPTIONAL TEAM CASE PROJECT CHAPTER 35 Securing e-Discovery 35.1 INFORMATION MANAGEMENT35.2 SUMMARY35.3 CHAPTER REVIEW QUESTIONS/EXERCISES 35.4 OPTIONAL TEAM CASE PROJECT CHAPTER 36 Network Forensics 36.1 SCIENTIFIC OVERVIEW36.2 THE PRINCIPLES OF NETWORK FORENSICS36.3 ATTACK TRACEBACK AND ATTRIBUTION36.4 CRITICAL NEEDS ANALYSIS36.5 RESEARCH DIRECTIONS36.6 SUMMARY36.7 CHAPTER REVIEW QUESTIONS/EXERCISES 36.8 OPTIONAL TEAM CASE PROJECT Part IV Encryption Technology CHAPTER 37 Data Encryption 37.1 NEED FOR CRYPTOGRAPHY37.2 MATHEMATICAL PRELUDE TO CRYPTOGRAPHY 37.3 CLASSICAL CRYPTOGRAPHY 37.4 MODERN SYMMETRIC CIPHERS 37.5 ALGEBRAIC STRUCTURE 37.6 THE INTERNAL FUNCTIONS OF RIJNDAEL IN AES IMPLEMENTATION37.7 USE OF MODERN BLOCK CIPHERS 37.8 PUBLIC-KEY CRYPTOGRAPHY37.9 CRYPTANALYSIS OF RSA37.10 DIFFIE-HELLMAN ALGORITHM37.11 ELLIPTIC CURVE CRYPTOSYSTEMS37.12 MESSAGE INTEGRITY AND AUTHENTICATION37.13 TRIPLE DATA ENCRYPTION ALGORITHM (TDEA) BLOCK CIPHER37.14 SUMMARY37.15 CHAPTER REVIEW QUESTIONS/EXERCISES 37.16 OPTIONAL TEAM CASE PROJECT CHAPTER 38 Satellite Encryption 38.1 INTRODUCTION38.2 THE NEED FOR SATELLITE ENCRYPTION 38.3 IMPLEMENTING SATELLITE ENCRYPTION 38.4 PIRATE DECRYPTION OF SATELLITE TRANSMISSIONS 38.5 SUMMARY38.6 CHAPTER REVIEW QUESTIONS/EXERCISES38.7 OPTIONAL TEAM CASE PROJECT CHAPTER 39 Public Key Infrastructure 39.1 CRYPTOGRAPHIC BACKGROUND 39.2 OVERVIEW OF PKI 39.3 THE X.509 MODEL 39.4 X.509 IMPLEMENTATION ARCHITECTURES 39.5 X.509 CERTIFICATE VALIDATION 39.6 X.509 CERTIFICATE REVOCATION 39.7 SERVER-BASED CERTIFICATE VALIDITY PROTOCOL 39.8 X.509 BRIDGE CERTIFICATION SYSTEMS 39.9 X.509 CERTIFICATE FORMAT 39.10 PKI POLICY DESCRIPTION 39.11 PKI STANDARDS ORGANIZATIONS 39.12 PGP CERTIFICATE FORMATS 39.13 PGP PKI IMPLEMENTATIONS 39.14 W3C39.15 IS PKI SECURE39.16 ALTERNATIVE PKI ARCHITECTURES39.17 MODIFIED X.509 ARCHITECTURES39.18 ALTERNATIVE KEY MANAGEMENT MODELS39.19 SUMMARY39.20 CHAPTER REVIEW QUESTIONS/EXERCISES 39.21 OPTIONAL TEAM CASE PROJECT CHAPTER 40 Password-based Authenticated Key Establishment Protocol [TOC TBD] CHAPTER 41 Instant-Messaging Security 41.1 WHY SHOULD I CARE ABOUT INSTANT MESSAGING?41.2 WHAT IS INSTANT MESSAGING?41.3 THE EVOLUTION OF NETWORKING TECHNOLOGIES 41.3 GAME THEORY AND INSTANT MESSAGING41.4 THE NATURE OF THE THREAT 41.5 COMMON IM APPLICATIONS 41.6 DEFENSIVE STRATEGIES 41.7 INSTANT-MESSAGING SECURITY MATURITY AND SOLUTIONS 41.8 PROCESSES 41.9 SUMMARY41.10 EXAMPLE ANSWERS TO KEY FACTORS41.11 CHAPTER REVIEW QUESTIONS/EXERCISES 41.12 OPTIONAL TEAM CASE PROJECT Part V Privacy and Access Management CHAPTER 42 Privacy on the Internet 42.1 PRIVACY IN THE DIGITAL SOCIETY 42.2 THE ECONOMICS OF PRIVACY 42.3 PRIVACY-ENHANCING TECHNOLOGIES42.4 NETWORK ANONYMITY 42.5 SUMMARY42.6 CHAPTER REVIEW QUESTIONS/EXERCISES 42.7 OPTIONAL TEAM CASE PROJECT CHAPTER 43 Privacy-enhancing Technologies 43.1 THE CONCEPT OF PRIVACY 43.2 LEGAL PRIVACY PRINCIPLES 43.3 CLASSIFICATION OF PETS 43.4 TRADITIONAL PRIVACY GOALS OF PETS 43.5 PRIVACY METRICS43.6 DATA MINIMIZATION TECHNOLOGIES43.7 TRANSPARENCY-ENHANCING TOOLS43.8 SUMMARY43.9 CHAPTER REVIEW QUESTIONS/EXERCISES 43.10 OPTIONAL TEAM CASE PROJECT CHAPTER 44 Personal Privacy Policies 44.1 INTRODUCTION 44.2 CONTENT OF PERSONAL PRIVACY POLICIES44.3 SEMIAUTOMATED DERIVATION OF PERSONAL PRIVACY POLICIES44.4 SPECIFYING WELL-FORMED PERSONAL PRIVACY POLICIES44.5 PREVENTING UNEXPECTED NEGATIVE OUTCOMES44.6 THE PRIVACY MANAGEMENT MODEL 44.7 DISCUSSION AND RELATED WORK 44.8 SUMMARY44.9 CHAPTER REVIEW QUESTIONS/EXERCISES 44.10 OPTIONAL TEAM CASE PROJECT CHAPTER 45 Detection Of Conflicts In Security Policies 45.1 INTRODUCTION 45.2 CONFLICTS IN SECURITY POLICIES 45.3 CONFLICTS IN EXECUTABLE SECURITY POLICIES 45.4 CONFLICTS IN NETWORK SECURITY POLICIES 45.5 SEMANTIC WEB TECHNOLOGY FOR CONFLICT DETECTION45.6 SUMMARY45.7 CHAPTER REVIEW QUESTIONS/EXERCISES 45.8 OPTIONAL TEAM CASE PROJECT CHAPTER 46 Supporting User Privacy Preferences in Digital Interactions 46.1 INTRODUCTION 46.2 BASIC CONCEPTS AND DESIDERATA 46.3 COST-SENSITIVE TRUST NEGOTIATION 46.4 POINT-BASED TRUST MANAGEMENT 46.5 LOGICAL-BASED MINIMAL CREDENTIAL DISCLOSURE 46.6 PRIVACY PREFERENCES IN CREDENTIAL-BASED INTERACTIONS46.7 FINE-GRAINED DISCLOSURE OF SENSITIVE ACCESS POLICIES46.8 OPEN ISSUES46.9 SUMMARY46.10 CHAPTER REVIEW QUESTIONS/EXERCISES 46.11 OPTIONAL TEAM CASE PROJECT CHAPTER 47 Privacy and Security in Environmental Monitoring Systems: Issues and Solutions 47.1 INTRODUCTION 47.2 SYSTEM ARCHITECTURES 47.3 ENVIRONMENTAL DATA47.4 SECURITY AND PRIVACY ISSUES IN ENVIRONMENTAL MONITORING 47.5 COUNTERMEASURES47.6 SUMMARY47.7 CHAPTER REVIEW QUESTIONS/EXERCISES 47.8 OPTIONAL TEAM CASE PROJECT CHAPTER 48 Virtual Private Networks 48.1 HISTORY48.2 WHO IS IN CHARGE?48.3 VPN TYPES48.4 AUTHENTICATION METHODS48.5 SYMMETRIC ENCRYPTION48.6 ASYMMETRIC CRYPTOGRAPHY48.7 EDGE DEVICES48.8 PASSWORDS48.9 HACKERS AND CRACKERS48.10 MOBILE VPN48.11 SSL VPN DEPLOYMENTS48.12 SUMMARY48.13 CHAPTER REVIEW QUESTIONS/EXERCISES48.14 OPTIONAL TEAM CASE PROJECT CHAPTER 49 Identity Theft 49.1 EXPERIMENTAL DESIGN 49.2 RESULTS AND ANALYSIS 49.3 IMPLICATIONS FOR CRIMEWARE 49.4 SUMMARY49.5 CHAPTER REVIEW QUESTIONS/EXERCISES 49.6 OPTIONAL TEAM CASE PROJECT CHAPTER 50 VoIP Security 50.1 INTRODUCTION 50.2 OVERVIEW OF THREATS 50.3 SECURITY IN VoIP 50.4 FUTURE TRENDS50.5 SUMMARY50.6 CHAPTER REVIEW QUESTIONS/EXERCISES50.7 OPTIONAL TEAM CASE PROJECT Part VI Storage Security CHAPTER 51 SAN Security 51.1 ORGANIZATIONAL STRUCTURE 51.2 ACCESS CONTROL LISTS (ACL) AND POLICIES51.3 PHYSICAL ACCESS 51.4 CHANGE MANAGEMENT 51.5 PASSWORD POLICIES51.6 DEFENSE IN DEPTH51.7 VENDOR SECURITY REVIEW51.8 DATA CLASSIFICATION51.9 SECURITY MANAGEMENT51.10 AUDITING51.11 SECURITY MAINTENANCE51.12 HOST ACCESS: PARTITIONING51.13 DATA PROTECTION: REPLICAS51.14 ENCRYPTION IN STORAGE51.15 APPLICATION OF ENCRYPTION51.16 SUMMARY51.17 CHAPTER REVIEW QUESTIONS/EXERCISES51.18 OPTIONAL TEAM CASE PROJECT CHAPTER 52 Storage Area Networking Security Devices 52.1 WHAT IS A SAN?52.2 SAN DEPLOYMENT JUSTIFICATIONS52.3 THE CRITICAL REASONS FOR SAN SECURITY 52.4 SAN ARCHITECTURE AND COMPONENTS 52.5 SAN GENERAL THREATS AND ISSUES 52.6 OWASP52.7 OSSTMM52.8 ISSA52.9 ISACA52.10 SUMMARY52.11 CHAPTER REVIEW QUESTIONS/EXERCISES 52.12 OPTIONAL TEAM CASE PROJECT CHAPTER 53 Risk Management 53.1 THE CONCEPT OF RISK53.2 EXPRESSING AND MEASURING RISK 53.3 THE RISK MANAGEMENT METHODOLOGY53.4 RISK MANAGEMENT LAWS AND REGULATIONS 53.5 RISK MANAGEMENT STANDARDS 53.6 SUMMARY53.7 CHAPTER REVIEW QUESTIONS/EXERCISES 53.8 OPTIONAL TEAM CASE PROJECT Part VII Physical Security CHAPTER 54 Physical Security Essentials 54.1 OVERVIEW54.2 PHYSICAL SECURITY THREATS54.3 PHYSICAL SECURITY PREVENTION AND MITIGATION MEASURES 54.4 RECOVERY FROM PHYSICAL SECURITY BREACHES54.5 THREAT ASSESSMENT, PLANNING, AND PLAN IMPLEMENTATION54.6 EXAMPLE: A CORPORATE PHYSICAL SECURITY POLICY54.7 INTEGRATION OF PHYSICAL AND LOGICAL SECURITY54.8 PHYSICAL SECURITY CHECKLIST54.9 SUMMARY54.10 CHAPTER REVIEW QUESTIONS/EXERCISES54.11 OPTIONAL TEAM CASE PROJECT CHAPTER 55 Disaster Recovery 55.1 INTRODUCTION 55.2 MEASURING RISK AND AVOIDING DISASTER55.3 THE BUSINESS IMPACT ASSESSMENT (BIA)55.4 SUMMARY55.5 CHAPTER REVIEW QUESTIONS/EXERCISES 55.6 OPTIONAL TEAM CASE PROJECT CHAPTER 56 Biometrics 56.1 RELEVANT STANDARDS 56.2 BIOMETRIC SYSTEM ARCHITECTURE 56.3 USING BIOMETRIC SYSTEMS 56.4 SECURITY CONSIDERATIONS56.5 SUMMARY56.6 CHAPTER REVIEW QUESTIONS/EXERCISES 56.7 OPTIONAL TEAM CASE PROJECT CHAPTER 57 Homeland Security 57.1 STATUTORY AUTHORITIES 57.2 HOMELAND SECURITY PRESIDENTIAL DIRECTIVES 57.3 ORGANIZATIONAL ACTIONS 57.4 SUMMARY57.5 CHAPTER REVIEW QUESTIONS/EXERCISES 57.6 OPTIONAL TEAM CASE PROJECT CHAPTER 58 Cyber Warfare 58.1 CYBER WARFARE MODEL 58.2 CYBER WARFARE DEFINED 58.3 CW: MYTH OR REALITY?58.4 CYBER WARFARE: MAKING CW POSSIBLE58.5 LEGAL ASPECTS OF CW58.6 HOLISTIC VIEW OF CYBER WARFARE58.7 SUMMARY58.8 CHAPTER REVIEW QUESTIONS/EXERCISES 58.9 OPTIONAL TEAM CASE PROJECT CHAPTER 59 System Security 59.1 FOUNDATIONS OF SECURITY59.2 BASIC COUNTERMEASURES 59.3 SUMMARY59.4 CHAPTER REVIEW QUESTIONS/EXERCISES 59.5 OPTIONAL TEAM CASE PROJECT CHAPTER 60 Securing the Infrastructure 60.1 COMMUNICATION SECURITY GOALS 60.2 ATTACKS AND COUNTERMEASURES 60.3 SUMMARY 60.4 CHAPTER REVIEW QUESTIONS/EXERCISES 60.5 OPTIONAL TEAM CASE PROJECT CHAPTER 61 Access Controls 61.1 INFRASTRUCTURE WEAKNESSES: DAC, MAC, AND RBAC 61.2 STRENGTHENING THE INFRASTRUCTURE: AUTHENTICATION SYSTEMS 61.3 SUMMARY61.4 CHAPTER REVIEW QUESTIONS/EXERCISES 61.5 OPTIONAL TEAM CASE PROJECT CHAPTER 62 Assessments and Audits 62.1 ASSESSING VULNERABILITIES AND RISK: PENETRATION TESTING AND VULNERABILITY ASSESSMENTS62.2 RISK MANAGEMENT: QUANTITATIVE RISK MEASUREMENTS62.3 SUMMARY62.4 CHAPTER REVIEW QUESTIONS/EXERCISES 62.5 OPTIONAL TEAM CASE PROJECT CHAPTER 63 Fundamentals of Cryptography 63.1 ASSURING PRIVACY WITH ENCRYPTION 63.2 SUMMARY63.3 CHAPTER REVIEW QUESTIONS/EXERCISES 63.4 OPTIONAL TEAM CASE PROJECT Part IX Advanced Security CHAPTER 64 Security Through Diversity 64.1 UBIQUITY 64.2 EXAMPLE ATTACKS AGAINST UNIFORMITY64.3 ATTACKING UBIQUITY WITH ANTIVIRUS TOOLS64.4 THE THREAT OF WORMS64.5 AUTOMATED NETWORK DEFENSE64.6 DIVERSITY AND THE BROWSER64.7 SANDBOXING AND VIRTUALIZATION64.8 DNS EXAMPLE OF DIVERSITY THROUGH SECURITY64.9 RECOVERY FROM DISASTER IS SURVIVAL 64.10 SUMMARY64.11 CHAPTER REVIEW QUESTIONS/EXERCISES 64.12 OPTIONAL TEAM CASE PROJECT CHAPTER 65 Online e-Reputation Management Services 65.1 INTRODUCTION 65.2 THE HUMAN NOTION OF REPUTATION 65.3 REPUTATION APPLIED TO THE COMPUTING WORLD 65.4 STATE OF THE ART OF ATTACK--RESISTANT REPUTATION COMPUTATION 65.5 OVERVIEW OF CURRENT ONLINE REPUTATION SERVICE 65.6 SUMMARY65.7 CHAPTER REVIEW QUESTIONS/EXERCISES 65.8 OPTIONAL TEAM CASE PROJECT CHAPTER 66 Content Filtering 66.1 DEFINING THE PROBLEM66.2 WHY CONTENT FILTERING IS IMPORTANT 66.3 CONTENT CATEGORIZATION TECHNOLOGIES66.4 PERIMETER HARDWARE AND SOFTWARE SOLUTIONS66.5 CATEGORIES66.6 LEGAL ISSUES66.7 CIRCUMVENTING CONTENT FILTERING66.8 ADDITIONAL ITEMS TO CONSIDER: OVERBLOCKING AND UNDERBLOCKING66.9 RELATED PRODUCTS66.10 SUMMARY66.11 CHAPTER REVIEW QUESTIONS/EXERCISES 66.12 OPTIONAL TEAM CASE PROJECT CHAPTER 67 Data Loss Protection 67.1 PRECURSORS OF DLP 67.2 WHAT IS DLP?67.3 WHERE TO BEGIN 67.4 DATA IS LIKE WATER 67.5 YOU DON'T KNOW WHAT YOU DON'T KNOW 67.6 HOW DO DLP APPLICATIONS WORK?67.7 EAT YOUR VEGETABLES67.8 IT'S A FAMILY AFFAIR, NOT JUST IT SECURITY'S PROBLEM 67.9 VENDORS, VENDORS EVERYWHERE! WHO DO YOU BELIEVE?67.10 SUMMARY67.11 CHAPTER REVIEW QUESTIONS/EXERCISES 67.12 OPTIONAL TEAM CASE PROJECT CHAPTER 68 Satellite Cyber Attack Search and Destroy 68.1 HACKS, INTERFERENCE AND JAMMING68.2 SUMMARY68.3 CHAPTER REVIEW QUESTIONS/EXERCISES 68.4 OPTIONAL TEAM CASE PROJECT CHAPTER 69 Verifiable Voting Systems 69.1 SECURITY REQUIREMENTS69.2 VERIFIABLE VOTING SCHEMES69.3 BUILDING BLOCKS69.4 SURVEY OF NOTEWORTHY SCHEMES69.5 PRÊT À VOTER69.6 THREATS TO VERIFIABLE VOTING SYSTEMS69.7 SUMMARY69.8 CHAPTER REVIEW QUESTIONS/EXERCISES 69.9 OPTIONAL TEAM CASE PROJECT CHAPTER 70 Advanced Data Encryption 70.1 MATHEMATICAL CONCEPTS REVIEWED70.2 THE RSA CRYPTOSYSTEM70.3 SUMMARY70.4 CHAPTER REVIEW QUESTIONS/EXERCISES70.5 OPTIONAL TEAM CASE PROJECT Part X Appendices Appendix A Configuring Authentication Service On Microsoft Windows 7 Appendix B Security Management and Resiliency Appendix C List of Top Information and Network Security Implementation and Deployment Companies Appendix D List of Security Products Appendix E List of Security Standards Appendix F List of Miscellaneous Security Resources Appendix G Ensuring Built-in Frequency Hopping Spread Spectrum Wireless Network Security Appendix H Configuring Wireless Internet Security Remote Access Appendix I Frequently Asked Questions Appendix J Case Studies