Covers: elements of computer security; roles and responsibilities; common threats; computer security policy; computer security program and risk management; security and planning in the computer system life cycle; assurance; personnel/user issues; preparing for contingencies and disasters; computer security incident handling; awareness, training, and education; physical and environmental security; identification and authentication; logical access control; audit trails; cryptography; and assessing and mitigating the risks to a hypothetical computer system.
The Nist Handbook
Author: Barbara Guttman,Edward A. Roback
Publisher: DIANE Publishing
Introduction to Computer Security is appropriateforuse in computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence. It is also suitable for anyone interested in a very accessible introduction to computer security. A Computer Security textbook for a new generation of IT professionals Unlike most other computer security textbooks available today, Introduction to Computer Security, does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the systems, technology, management, and policy side of security, and offers students fundamental security concepts and a working knowledge of threats and countermeasures with "just-enough" background in computer science. The result is a presentation of the material that is accessible to students of all levels. Teaching and Learning Experience This program will provide a better teaching and learning experience-for you and your students. It will help: Provide an Accessible Introduction to the General-knowledge Reader: Only basic prerequisite knowledge in computing is required to use this book. Teach General Principles of Computer Security from an Applied Viewpoint: As specific computer security topics are covered, the material on computing fundamentals needed to understand these topics is supplied. Prepare Students for Careers in a Variety of Fields: A practical introduction encourages students to think about security of software applications early. Engage Students with Creative, Hands-on Projects: An excellent collection of programming projects stimulate the student's creativity by challenging them to either break security or protect a system against attacks. Enhance Learning with Instructor and Student Supplements: Resources are available to expand on the topics presented in the text.
Author: Michael Goodrich,Roberto Tamassia
An excellent, beautifully written introduction to the subject of computer security - by a master teacher and practitioner.
Author: Matt Bishop
Publisher: Addison-Wesley Professional
For computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence (e.g., CS 1/CS 2). A new Computer Security textbook for a new generation of IT professionals. Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the systems, technology, management, and policy side of security, and offers students fundamental security concepts and a working knowledge of threats and countermeasures with “just-enough” background in computer science. The result is a presentation of the material that is accessible to students of all levels.
Author: Michael Goodrich,Roberto Tamassia
Publisher: Pearson Higher Ed
Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security. Unlike most computer security books, which concentrate on software design and implementation, cryptographic tools, or networking issues, this text also explores how the interactions between hardware, software, and users affect system security. The book presents basic principles and concepts, along with examples of current threats to illustrate how the principles can either enable or neutralize exploits. Students see the importance of these concepts in existing and future technologies. In a challenging yet enjoyable way, they learn about a variety of technical topics, including current security exploits, technical factors that enable attacks, and economic and social factors that determine the security of future systems. Extensively classroom-tested, the material is structured around a set of challenging projects. Through staging exploits and choosing countermeasures to neutralize the attacks in the projects, students learn: How computer systems and networks operate How to reverse-engineer processes How to use systems in ways that were never foreseen (or supported) by the original developers Combining hands-on work with technical overviews, this text helps you integrate security analysis into your technical computing curriculum. It will educate your students on security issues, such as side-channel attacks, and deepen their understanding of how computers and networks work.
Navigating Shades of Gray
Author: Richard R. Brooks
Publisher: CRC Press
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues. Get the Fundamentals of Internet Architecture and the Protocol Layers Organized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networks—through the Internet architecture. Part 1 covers the most important Internet applications and the methods used to develop them. Part 2 discusses the network edge, consisting of hosts, access networks, LANs, and the physical media used with the physical and link layers. Part 3 explores the network core, including packet/circuit switches, routers, and the Internet backbone, and Part 4 examines reliable transport and the management of network congestion. Learn about Malware and Security Systems Building on the concepts and principles, the book then delves into state-of-the-art cybersecurity mechanisms in Part 5. It reviews the types of malware and the various security systems, made up of firewalls, intrusion detection systems, and other components. Crucially, it provides a seamless view of an information infrastructure in which security capabilities are built in rather than treated as an add-on feature. The book closes with a look at emerging technologies, including virtualization and data center and cloud computing unified communication. Understand Cyber Attacks—and What You Can Do to Defend against Them This comprehensive text supplies a carefully designed introduction to both the fundamentals of networks and the latest advances in Internet security. Addressing cybersecurity from an Internet perspective, it prepares you to better understand the motivation and methods of cyber attacks and what you can do to protect the networks and the applications that run on them. Pedagogical Features The book’s modular design offers exceptional flexibility, whether you want to use it for quick reference, self-study, or a wide variety of one- or two-semester courses in computer networks, cybersecurity, or a hybrid of both. Learning goals in each chapter show you what you can expect to learn, and end-of-chapter problems and questions test your understanding. Throughout, the book uses real-world examples and extensive illustrations and screen captures to explain complicated concepts simply and clearly. Ancillary materials, including PowerPoint® animations, are available to instructors with qualifying course adoption.
Author: Chwan-Hwa (John) Wu,J. David Irwin
Publisher: CRC Press
The importance of computer security has increased dramatically during the past few years. Bishop provides a monumental reference for the theory and practice of computer security. Comprehensive in scope, this book covers applied and practical elements, theory, and the reasons for the design of applications and security techniques.
Art and Science
Author: Matt Bishop
Publisher: Addison-Wesley Professional
Publisher: Rex Bookstore, Inc.
This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment.
Author: Dieter Gollmann
Publisher: John Wiley & Sons
A fresh new approach to computer security by the authors of the 20-year best-selling classic Security in Computing. • •Introduces computer security the way today's practitioners want to learn it: by identifying threats, explaining the vulnerabilities that cause them, and presenting effective countermeasures. •Contains up-to-date coverage of security management, risk analysis, privacy, controls, forensics, insider attacks, human factors, trust, and more. •Includes 273 problems and 192 illustrations. In this book, the authors of the 20-year best-selling classic Security in Computing take a fresh, contemporary, and powerfully relevant new approach to introducing computer security. Organized around attacks and mitigations, the Pfleegers' new Analyzing Computer Security will attract readers' attention by building on the high-profile security failures they may have already encountered in the popular media. Each section starts with an attack description. Next, the authors explain the vulnerabilities that have allowed this attack to occur. With this foundation in place, they systematically present today's most effective countermeasures for blocking or weakening the attack. One step at a time, readers progress from attack/problem/harm to solution/protection/mitigation, building the powerful real-world problem solving skills they need to succeed as information security professionals. Analyzing Computer Security themes throughout, including effective security management and risk analysis; economics and quantitative study; privacy, ethics, and laws; and the use of overlapping controls. The authors also present significant new material on computer forensics, insiders, human factors, and trust. addresses crucial contemporary computer security
A Threat/vulnerability/countermeasure Approach
Author: Charles P. Pfleeger,Shari Lawrence Pfleeger
Publisher: Prentice Hall Professional
Computer Security Management provides a broad overview of computer security and offers guidance for improving business systems, procedures, and the skills of personnel. Here are some highlights: . State-of-the-art coverage with an emphasis on future trends. Promotes the concept that an effective manager must always stay current on security matters. A comprehensive chapter on viruses and other forms of malicious code provides descriptive background and offers popular prevention and remedial options. Discusses legal aspects of computer security with an eye toward effective management. Stresses the principle that planning ahead of time is better than after-the-fact punishment or reorganization after the damage has been done. A chapter on computer ethics introduces this preventative aspect of computer security. Thorough coverage of planning for natural disasters. Details contingency plans to minimize effects of natural disasters and outlines rapid recovery techniques. Each chapter opens with a contemporary vignette that focuses on real business situations relevant to the material covered within the chapter. Problem-solving exercises and in-depth case studies are also offered.
Author: Karen Anne Forcht
Publisher: Boyd & Fraser Publishing Company
Category: Business & Economics
As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future. Developed from the author's successful Springer guide to Foundations of Computer Security, this accessible textbook/reference is fully updated and enhanced with resources for students and tutors. Topics and features: examines the physical security of computer hardware, networks, and digital data; introduces the different forms of rogue software (or malware), discusses methods for preventing and defending against malware, and describes a selection of viruses, worms and Trojans in detail; investigates the important threats to network security, and explores the subjects of authentication, spyware, and identity theft; discusses issues of privacy and trust in the online world, including children's privacy and safety; includes appendices which discuss the definition, meaning, and history of the term hacker, introduce the language of "l33t Speak", and provide a detailed virus timeline; provides numerous exercises and examples throughout the text, in addition to a Glossary of terms used in the book; supplies additional resources at the associated website, http://www.DavidSalomon.name/, including an introduction to cryptography, and answers to the exercises. Clearly and engagingly written, this concise textbook is an ideal resource for undergraduate classes on computer security. The book is mostly non-mathematical, and is suitable for anyone familiar with the basic concepts of computers and computations.
Author: David Salomon
Publisher: Springer Science & Business Media
There's a lot more consciousness of security today, but not a lot of understanding of what it means and how far it should go. No one loves security, but most people---managers, system administrators and users alike---are starting to feel that they'd better accept it, or at least try to understand it. For example, most U.S. Government equipment acquisitions now require "Orange Book" (Trusted Computer System Evaluation Criteria) certification. A lot of people have a vague feeling that they ought to know about the Orange Book, but few make the effort to track it down and read it. Computer Security Basics contains a more readable introduction to the Orange Book---why it exists, what it contains, and what the different security levels are all about---than any other book or government publication. This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing. Contents include: Introduction (basic computer security concepts, security breaches such as the Internet worm). Computer security and requirements of the Orange Book. Communications and network security. Peripheral types of security (including biometric devices, physical controls, and TEMPEST). Appendices: terms, sources, user groups, and other reference material.
Author: Deborah Russell,G. T. Gangemi
Publisher: "O'Reilly Media, Inc."
Computer Security, Third Edition presents the best ideas that high technology, classical security practice, and common sense have to offer to help reduce insecurity to the lowest possible level. This completley updated book contains new information on advances in computer equipment and the spread of technology. It is an essential text for everyone involved with the operation and security of the computer complexes that are the heart of today's businesses. An updated of the classic book by Butterworth-Heinemann with new material on recent advances in computer hardware and the spread of personal computer technology A complete and comprehensive introduction to computer security Includes coverage on computer crime, physical security, communications, systems security, and risk management
Author: John M. Carroll
This 24-hour free course introduced online security: how to recognise threats and take steps to reduce the chances that they will occur.
Author: The Open University
Publisher: The Open University