Computer Security Principles and Practice 5th Edition PDF
Computer Security Principles and Practice 5th Edition PDF
CLICK HERE
Pearson’s Commitment to Diversity, Equity, and
Inclusion......................................................8
Preface......................................................................
................................................................10
What’s New in the Fifth
Edition ......................................................................
....................10
Background ...............................................................
...........................................................11
Objectives.................................................................
............................................................11
Support of ACM/IEEE Cybersecurity Curricula
2017 ........................................................11
Table
P.1 ............................................................................
...........................................12
Coverage of CSEC2017 Cybersecurity
Curricula ........................................................12
Coverage of CISSP Subject
Areas ........................................................................
...............13
Support for NCAE-C
Certification ..............................................................
........................15
Plan of the
Text ...........................................................................
.........................................15
Student
Resources .................................................................
...............................................16
Instructor Support
Materials...................................................................
..............................16
Projects and Other Student
Exercises...................................................................
................17
Acknowledgments.....................................................
...........................................................18
Learning
Objectives .................................................................
............................................37
1.1 Computer Security
Concepts ..................................................................
...........................39
A Definition of Computer
Security.....................................................................
.................39
Figure 1.1 Essential Network and Computer Security
Requirements ..........................40
Examples...................................................................
...........................................................41
Confidentiality ...........................................................
.......................................................41
Integrity ....................................................................
........................................................41
An example of a low-integrity requirement is an
anonymous online poll. Many websites,
such as news organizations, offer these polls to their
users with very few safeguards.
However, the inaccuracy and unscientific nature of
such polls is well
understoodAvailability ...............................................
......................................................42
The Challenges of Computer
Security ....................................................................
.............43
Table
1.1 ............................................................................
...........................................44
Computer Security
Terminology ..............................................................
....................44
1.2 Threats, Attacks, and
Assets.......................................................................
.......................47
Threats and
Attacks......................................................................
........................................47
Confidentiality ...........................................................
.......................................................50
Integrity ....................................................................
........................................................50
Availability ................................................................
.......................................................51
Threats and
Attacks......................................................................
........................................52
Table 1.2 Threat Consequences and the Types of
Threat Actions that Cause Each
Consequence ............................................................
.....................................................52
Threats and
Assets.......................................................................
.........................................55
Figure 1.3 Scope of Computer
Security.....................................................................
...55
Page 24 of 1641
Page 25 of 1641
Page 26 of 1641
Rule
Enforcement..............................................................
.............................................149
Password
Checker.....................................................................
......................................149
Bloom
Filter..........................................................................
..........................................150
3.3 Token-Based
Authentication ..........................................................
.................................150
Memory
Cards........................................................................
............................................151
Smart
Cards........................................................................
................................................152
Electronic Identity
Cards........................................................................
............................154
Eid
Functions..................................................................
................................................155
Password Authenticated Connection Establishment
(PACE) ........................................157
Hardware Authentication
Tokens.......................................................................
................158
Authentication Using a Mobile
Phone .......................................................................
........161
3.4 Biometric
Authentication...........................................................
......................................163
Physical Characteristics Used in Biometric
Applications..................................................164
Operation of a Biometric Authentication
System ..............................................................166
Figure 3.8 A Generic Biometric
System.....................................................................
167
Biometric
Accuracy...................................................................
.........................................167
3.5 Remote User
Authentication...........................................................
.................................171
Password
Protocol.....................................................................
.........................................172
Figure 3.12 Basic Challenge-Response Protocols for
Remote User Authentication..172
Token
Protocol ....................................................................
...............................................173
Static Biometric
Protocol ....................................................................
...............................174
Dynamic Biometric
Protocol.....................................................................
.........................175
3.6 Security Issues for User
Authentication ..........................................................
................176
3.7 Practical Application: An Iris Biometric
System.............................................................179
3.8 Case Study: Security Problems for ATM
Systems..........................................................182
3.9 Key Terms, Review Questions, and
Problems.................................................................1
84
Key
Terms........................................................................
..................................................184
Review
Questions..................................................................
.............................................185
Problems...................................................................
..........................................................186
Learning
Objectives .................................................................
..........................................189
4.1 Access Control
Principles..................................................................
..............................191
Access Control
Context.....................................................................
.................................192
Figure 4.1 Relationship among Access Control and
Other Security Functions .........192
Access Control
Policies......................................................................
................................194
4.2 Subjects, Objects, and Access
Rights .......................................................................
.......195
4.3 Discretionary Access
Control .....................................................................
.....................196
Figure 4.2 Example of Access Control
Structures......................................................196
Table 4.2 Authorization Table for Files in Figure
4.2 ................................................198
Page 27 of 1641
An Access Control
Model........................................................................
..........................199
Figure 4.3 Extended Access Control
Matrix...............................................................199
Figure 4.4 An Organization of the Access Control
Function .....................................200
Table 4.3 Access Control System
Commands............................................................20
1
The ability of one subject to create another subject
and to have ‘owner’ access right to
that subject can be used to define a hierarchy of
subjects. For example, in Figure 4.3,
owns and so and are subordinate to By the rules of
Table 4.3, can grant and delete to
access rights that already has. Thus, a subject can
create another subject with a subset
of its own access rights. This might be useful, for
example, if a subject is invoking an
application that is not fully trusted and does not want
that application to be able to
transfer access rights to other
subjects....................................................................
....202
Protection
Domains....................................................................
........................................203
4.4 Example: UNIX File Access
Control .....................................................................
.........204
Traditional UNIX File Access
Control .....................................................................
.........205
Figure 4.5 UNIX File Access
Control .....................................................................
...205
Access Control Lists in
UNIX .........................................................................
..................207
4.5 Mandatory Access
Control .....................................................................
.........................208
Bell-LaPadula (BLP)
Model .......................................................................
.......................209
4.6 Role-Based Access
Control .....................................................................
........................210
Figure 4.7 Access Control Matrix Representation of
RBAC .....................................212
4.6 Role Base Access
Control......................................................................
......................212
RBAC Reference
Models......................................................................
.............................212
Figure 4.8 A Family of Role-Based Access Control
Models .....................................213
Base
Model—.....................................................................
............................................213
Role
Hierarchies— ............................................................
.............................................214
Figure 4.9 Example of Role
Hierarchy ..................................................................
.....214
Constraints—............................................................
......................................................215
4.7 Attribute-Based Access
Control .....................................................................
.................217
Attributes..................................................................
..........................................................218
ABAC Logical
Architecture...............................................................
................................219
Figure 4.10 ABAC
Scenario ...................................................................
....................219
ABAC
Policies......................................................................
.............................................222
4.8 Identity, Credential, and Access
Management .............................................................
...225
Figure 4.12 Identity, Credential, and Access
Management (ICAM)..........................225
Identity
Management..............................................................
............................................226
Credential
Management .............................................................
........................................227
Access
Management..............................................................
.............................................228
Identity
Federation ................................................................
.............................................229
4.9 Trust
Frameworks...............................................................
.............................................230
Traditional Identity Exchange
Approach ..................................................................
.........231
Page 28 of 1641
Page 29 of 1641
Page 30 of 1641
Page 31 of 1641
Digital Signature
Standard....................................................................
........................1034
Elliptic-Curve
Cryptography ............................................................
............................1034
Post-Quantum
Cryptography.............................................................
...........................1034
21.6 Key Terms, Review Questions, and
Problems.............................................................114
1
Key
Terms........................................................................
................................................1141
Problems...................................................................
........................................................1143
MIME.........................................................................
......................................................1150
S/MIME......................................................................
......................................................1151
Table 22.1 S/MIME Content
Types.........................................................................
.1152
Figure 22.1 Simplified S/MIME Functional
Flow....................................................1153
Signed and Clear-Signed
Data..........................................................................
............1154
Enveloped
Data..........................................................................
...................................1155
Public-Key
Certificates................................................................
.................................1155
22.2 Domainkeys Identified
Mail ..........................................................................
..............1156
Internet Mail
Architecture...............................................................
.................................1157
Figure 22.2 Function Modules and Standardized
Protocols Used Between Them in the
Internet Mail
Architecture...............................................................
..........................1159
DKIM
Strategy.....................................................................
............................................1161
Figure 22.3 Simple Example of DKIM
Deployment................................................1162
22.3 Secure Sockets Layer (SSL) and Transport Layer
Security (TLS)..............................1164
TLS
Architecture...............................................................
...............................................1165
Figure 22.4 SSL/TLS Protocol
Stack........................................................................
1165
TLS
Protocols...................................................................
................................................1167
Record
Protocol ....................................................................
........................................1167
Figure 22.5 TLS Record Protocol
Operation............................................................116
7
Change Cipher Spec
Protocol.....................................................................
..................1168
Alert
Protocol ....................................................................
...........................................1168
Handshake
Protocol.....................................................................
.................................1169
Figure 22.6 Handshake Protocol
Action...................................................................11
70
Heartbeat
Protocol ....................................................................
....................................1172
SSL/TLS
Attacks......................................................................
........................................1174
Attack
Categories ................................................................
.........................................1174
Heartbleed................................................................
.....................................................1176
Figure 22.7 The Heartbleed
Exploit.......................................................................
...1177
22.4
HTTPS .......................................................................
..................................................1179
Connection
Initiation....................................................................
....................................1180
Connection
Closure .....................................................................
.....................................1181
22.5 IPv4 and IPv6
Security ....................................................................
............................1182
Page 32 of 1641
IP Security
Overview ...................................................................
....................................1182
Applications of
IPsec.........................................................................
...........................1183
Benefits of
IPsec.........................................................................
..................................1184
Routing
Applications..............................................................
......................................1184
The Scope of
IPsec.........................................................................
..................................1186
Security
Associations..............................................................
.........................................1187
Encapsulating Security
Payload .....................................................................
..................1189
Figure 22.8 IPsec ESP
Format.......................................................................
...........1190
Transport and Tunnel
Modes .......................................................................
....................1191
Transport
Mode ........................................................................
....................................1191
Tunnel
Mode.........................................................................
........................................1191
22.6 Key Terms, Review Questions, and
Problems.............................................................119
3
Key
Terms........................................................................
................................................1193
Review
Questions..................................................................
...........................................1194
Figure 22.9 Antireplay
Mechanism ...............................................................
...........1196
Chapter 23Internet Authentication AChapter 23
Internet Authentication Applicationsications
.................................................................................
.............................................................1198
Learning
Objectives .................................................................
........................................1198
23.1
Kerberos....................................................................
...................................................1199
The Kerberos
Protocol ....................................................................
.................................1200
Figure 23.1 Overview of
Kerberos ...................................................................
........1201
Kerberos Realms and Multiple
Kerberi ......................................................................
.....1207
Figure 23.2 Request for Service in Another
Realm..................................................1208
Version 4 and Version
5................................................................................
...................1210
Performance
Issues........................................................................
...................................1211
23.2
X.509.........................................................................
...................................................1212
Figure 23.3 X.509
Formats.....................................................................
..................1213
Public Key Infrastructure X.509
(PKIX) ........................................................................
.1217
Figure 23.4 PKIX Architectural
Model ....................................................................12
18
23.4 Key Terms, Review Questions, and
Problems.............................................................122
0
Key
Terms........................................................................
................................................1220
Review
Questions..................................................................
...........................................1221
Problems...................................................................
.......................................................1222
ChapterChapter
24 .............................................................................
..................................1225
Wireless Network Securityeless Network
Security .............................................................1225
Learning
Objectives .................................................................
........................................1226
24.1 Wireless
Security ....................................................................
.....................................1227
Figure 24.1 Wireless Networking
Components........................................................122
8
Page 33 of 1641
Wireless Network
Threats......................................................................
..........................1229
Wireless Security
Measures ..................................................................
...........................1231
Securing Wireless
Transmissions...........................................................
......................1231
Securing Wireless Access
Points........................................................................
..........1232
Securing Wireless
Networks ..................................................................
......................1232
24.2 Mobile Device
Security ....................................................................
...........................1233
Security
Threats......................................................................
..........................................1235
Lack of Physical Security
Controls ....................................................................
..........1235
Use of Untrusted Mobile
Devices .....................................................................
...........1235
Use of Untrusted
Networks ..................................................................
........................1236
Use of Untrusted
Applications ..............................................................
.......................1236
Interaction with Other
Systems ....................................................................
................1236
Use of Untrusted
Content ....................................................................
.........................1236
Use of Location
Services.....................................................................
.........................1237
Mobile Device Security
Strategy ....................................................................
.................1238
Figure 24.2 Mobile Device Security
Elements.........................................................1238
Device
Security.....................................................................
........................................1239
Traffic
Security.....................................................................
........................................1240
Barrier
Security.....................................................................
........................................1241
24.3 IEEE 802.11 Wireless LAN
Overview...................................................................
.....1242
Table 24.1 IEEE 802.11
Terminology...............................................................
.......1242
The Wi-Fi
Alliance.....................................................................
......................................1243
IEEE 802 Protocol
Architecture...............................................................
........................1244
Figure 24.3 IEEE 802.11 Protocol
Stack ..................................................................124
4
Physical
Layer .........................................................................
.....................................1245
Medium Access
Control .....................................................................
..........................1245
Figure 24.4 General IEEE 802 MPDU
Format.........................................................1246
Logical Link
Control .....................................................................
...............................1246
IEEE 802.11 Network Components and Architectural
Model.........................................1247
Figure 24.5 IEEE 802.11 Extended Service
Set .......................................................1248
IEEE 802.11
Services.....................................................................
..................................1251
Table 24.2 IEEE 802.11
Services ....................................................................
.........1251
Distribution of Messages Within a
DS .........................................................................12
52
Association-Related
Services ....................................................................
...................1252
24.4 IEEE 802.11i Wireless LAN
Security ....................................................................
.....1255
Figure 24.6 Elements of IEEE
802.11i .....................................................................
1257
IEEE 802.11i Phases of
Operation..................................................................
.................1259
Figure 24.7 IEEE 802.11i Phases of
Operation ........................................................1261
Page 34 of 1641
Discovery
Phase .......................................................................
........................................1263
Figure 24.8 IEEE 802.11i Phases of Operation:
Capability Discovery, Authentication,
and
Association................................................................
.........................................1263
Security
Capabilities...............................................................
......................................1264
MPDU
Exchange...................................................................
.......................................1265
Authentication
Phase........................................................................
................................1268
IEEE 802.1X Access Control
Approach ..................................................................
....1268
Figure 24.9 802.1X Access
Control......................................................................
....1269
MPDU
Exchange...................................................................
.......................................1269
EAP
Exchange...................................................................
...........................................1270
Key Management
Phase .......................................................................
............................1272
Figure 24.10 IEEE 802.11i Key
Hierarchies ............................................................1
272
Table 24.3 IEEE 802.11i Keys for Data Confidentiality
and Integrity Protocols ....1273
Pairwise
Keys..........................................................................
.....................................1275
Group
Keys..........................................................................
.........................................1276
Pairwise Key
Distribution ...............................................................
.............................1276
Figure 24.11 IEEE 802.11i Phases of Operation: 4-Way
Handshake and Group Key
Handshake................................................................
.................................................1278
Protected Data Transfer
Phase .......................................................................
..................1280
TKIP ..........................................................................
...................................................1280
CCMP........................................................................
...................................................1281
The IEEE 802.11i Pseudorandom
Function....................................................................
.1282
Figure 24.12 IEEE 802.11i Pseudorandom
Function ...............................................1283
24.5 Key Terms, Review Questions, and
Problems.............................................................128
4
Key
Terms........................................................................
................................................1284
Review
Questions..................................................................
...........................................1286
Problems...................................................................
........................................................1287
Figure 24.13 WEP
Authentication...........................................................
.................1288
Appendix A: Projects and Other Student Exercises for
Teaching Computer Security........1290
A.1 Hacking
Project.......................................................................
......................................1292
A.2 Laboratory
Exercises...................................................................
..................................1294
A.3 Security Education (Seed)
Projects.....................................................................
..........1295
Table A.1 Mapping of SEED Labs to Textbook
Chapters .......................................1296
A.4 Research
Projects.....................................................................
.....................................1299
A.5 Programming
Projects.....................................................................
..............................1300
A.6 Practical Security
Assessments.............................................................
........................1301
A.7 Firewall
Projects ....................................................................
.......................................1302
A.8 Case
Studies......................................................................
............................................1303
Page 35 of 1641
A.9 Reading/Report
Assignments..............................................................
..........................1304
A.10 Writing
Assignments..............................................................
.....................................1305
Appendix B: Some Aspects of Number
Theory ..................................................................13
06
B.1 Prime and Relatively Prime
Numbers...................................................................
........1307
Divisors .....................................................................
.......................................................1308
Prime
Numbers...................................................................
..............................................1309
Relatively Prime
Numbers ...................................................................
............................1310
B.2 Modular
Arithmetic..................................................................
.....................................1311
Figure B.1 The
Relationship ..............................................................
......................1311
Modular Arithmetic
Operations ................................................................
.......................1313
Inverses.....................................................................
........................................................1314
(B.1)..........................................................................
................................................1314
(B.2)..........................................................................
................................................1314
B.3 Fermat’s and Euler’s
Theorems ..................................................................
..................1315
Fermat’s
Theorem ...................................................................
.........................................1316
(B.3)..........................................................................
................................................1316
Euler’s Totient
Function....................................................................
...............................1318
Appendix C: Standards and Standard-Setting
Organizations..............................................1323
C.1 The Importance of
Standards .................................................................
.......................1324
C.2 Internet Standards and the Internet
Society...................................................................13
26
The Internet Organizations and RFC
Publication ............................................................13
27
Table C.1 IETF
Areas.........................................................................
......................1328
The Standardization
Process .....................................................................
.......................1330
Figure C.1 Internet RFC Publication
Process...........................................................1331
Internet Standards
Categories.................................................................
..........................1333
Other RFC
Types ........................................................................
.....................................1334
C.3 The National Institute of Standards and
Technology....................................................1336
C.4 The International Telecommunication
Union ...............................................................1338
ITU Telecommunication Standardization
Sector.............................................................1339
Schedule ..................................................................
.........................................................1340
C.5 The International Organization for
Standardization......................................................13
41
C.6 Significant Security Standards and
Documents ............................................................1
344
International Organization for Standardization
(ISO)......................................................1345
National Institute of Standards and Technology
(NIST) .................................................1346
Page 36 of 1641
CLICK HERE