Computer and Information Security Handbook - eBook PDF download
Computer and Information Security Handbook - eBook PDF download
https://ebooksecure.com/download/computer-and-information-
security-handbook-ebook-pdf/
http://ebooksecure.com/product/ebook-pdf-computer-security-and-
penetration-testing-2nd-edition/
http://ebooksecure.com/product/computer-security-principles-and-
practice-4th-edition-ebook-pdf/
http://ebooksecure.com/product/ebook-pdf-computer-security-
principles-and-practice-4th-edition/
http://ebooksecure.com/product/ebook-pdf-computer-security-
fundamentals-4th-edition/
(eBook PDF) Information Security: Principles and
Practices 2nd Edition
http://ebooksecure.com/product/ebook-pdf-information-security-
principles-and-practices-2nd-edition/
https://ebooksecure.com/download/principles-of-computer-security-
ebook-pdf/
http://ebooksecure.com/product/elementary-information-
security-3rd-edition-ebook-pdf/
https://ebooksecure.com/download/principles-of-computer-security-
comptia-security-and-beyond-exam-sy0-601-6th-edition-ebook-pdf/
https://ebooksecure.com/download/principles-of-computer-security-
comptia-security-and-beyond-lab-manual-exam-sy0-601-ebook-pdf/
Computer and Information Security Handbook
This page intentionally left blank
Computer and Information
Security Handbook
Third Edition
Edited by
John R. Vacca
Morgan Kaufmann is an imprint of Elsevier
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
vii
viii Contents
13. Protecting Data Flow: Information and Chapter Review Questions/Exercises 334
System Integrity 293 Exercise 335
14. Security Assessments 294 References 335
15. Risk Assessments 294
16. Intranet Security Implementation 19. Security for the Internet of
Process Checklist 295 Things 339
17. Summary 295
Chapter Review Questions/Exercises 296 William Stallings
Exercise 296 1. Introduction 339
2. ITU-T Internet of Things (IoT) Reference
Model 340
16. Local Area Network Security
3. Internet of Things (IoT) Security 344
(online chapter) 299 4. Summary 347
Pramod Pandya Chapter Review Questions/Exercises 347
Exercise 348
17. Wireless Network Security 301 References 348
3. The Critical Reasons for Storage Area 65. Private Cloud Security 931
Networking (SAN) Security 880
4. Storage Area Networking (SAN) Keith Lewis
Architecture and Components 880 1. Introduction: Private Cloud System
5. Storage Area Networking (SAN) General Management 931
Threats and Issues 882 2. From Physical to Network Security Base
6. Summary 893 Focus 931
Chapter Review Questions/Exercises 893 3. Benefits of Private Cloud Security
Exercise 894 Infrastructures 933
4. Private Cloud Security Standards and
Best Practices 933
Part IX 5. “As-a-Service” Universe: Service
Cloud Security 895 Models 934
6. Private Cloud Service Model: Layer
Considerations 935
63. Securing Cloud Computing
7. Privacy or Public: The Cloud Security
Systems 897 Challenges 935
Cem Gurkok 8. Summary 935
Chapter Review Questions/Exercises 936
1. Cloud Computing Essentials: Examining
Exercise 936
the Cloud Layers 897
References 936
2. Software as a Service: Managing Risks in
the Cloud 903
3. Platform as a Service: Securing the
66. Virtual Private Cloud Security 937
Platform 904 Keith Lewis
4. Infrastructure as a Service 907
1. Introduction: Virtual Networking in a
5. Leveraging Provider-Specific Security
Private Cloud 937
Options 911
2. Security Console: Centralized Control
6. Achieving Security in a Private
Dashboard Management 937
Cloud 912
3. Security Designs: Virtual Private Cloud
7. Meeting Compliance
Setups 938
Requirements 916
4. Security Object Group Allocations:
8. Preparing for Disaster Recovery 919
Functional Control Management
9. Summary 921
Practices 939
Chapter Review Questions/Exercises 921
5. Virtual Private Cloud Performance
Exercise 922
Versus Security 940
References 922
6. Summary 941
Chapter Review Questions/Exercises 941
64. Cloud Security 923 Exercise 942
Edward G. Amoroso References 942
1. Cloud Overview: Public, Private,
Hybrid 923
2. Cloud Security Threats 924 Part X
3. Internet Service Provider Cloud Virtual Virtual Security 943
Private Network Peering Services 924
4. Cloud Access Security Brokers 925 67. Protecting Virtual
5. Cloud Encryption 925 Infrastructure 945
6. Cloud Security Microsegmentation 926
7. Cloud Security Compliance 927 Edward G. Amoroso
8. Summary 929 1. Virtualization in Computing 945
Chapter Review Questions/Exercises 929 2. Virtual Data Center Security 946
Exercise 929 3. Hypervisor Security 947
References 930 4. Enterprise Segmentation 947
xviii Contents
10. Choosing the Correct Firewall e225 87. Content Filtering e271
11. Firewall Placement and Network
Topology e226 Pete F. Nicoletti
12. Firewall Installation and 1. Defining the Problem e271
Configuration e228 2. Why Content Filtering Is
13. Supporting Outgoing Services Through Important e272
Firewall Configuration e228 3. Content Categorization
14. Secure External Services Technologies e274
Provisioning e230 4. Perimeter Hardware and Software
15. Network Firewalls for Voice and Video Solutions e276
Applications e230 5. Categories e279
16. Firewalls and Important Administrative 6. Legal Issues e280
Service Protocols e231 7. Circumventing Content Filtering e284
17. Internal IP Services Protection e232 8. Additional Items to Consider:
18. Firewall Remote Access Overblocking and
Configuration e233 Underblocking e286
19. Load Balancing and Firewall 9. Related Products e289
Arrays e234 10. Summary e289
20. Highly Available Firewalls e235 Chapter Review Questions/Exercises e291
21. Firewall Management e236 Exercise e291
22. Summary e236
Chapter Review Questions/Exercises e237 90. Verifiable Voting Systems e293
Exercise e237
Thea Peacock, Peter Y.A. Ryan,
76. System Security e239 Steve Schneider, Zhe Xia
Edward G. Amoroso (Chapters 64, 67, 68), Senior Vice Samuel J.J. Curry (Chapter 51), Chief Technology and
President, Chief Security Officer, TAG Cyber LLC Security Officer, Arbor Networks, 76 Blanchard Road,
Jeffrey S. Bardin (Chapters 61, 89), Chief Intelligence Burlington MA 01803
Strategist, Treadstone 71 LLC, 515 Oakham Road, Rozita Dara (Chapter 6), Professor, University of Guelph,
Barre, MA 01005 School of Computer Science Guelph, ON, Canada
Cataldo Basile (Chapters 26, 55), Professor, Universita Christopher Day, CISSP, NSA:IEM (Chapter 72), Senior
degli studi di Bergamo, Via Salvecchio 19, 24129 Vice President, Secure Information Systems, Terremark
Bergamo Italy Worldwide, Inc., One Biscayne Tower 2 South Biscayne
Stefan Berthold (Chapter 53), Tek. Lic., Karlstad Univer- Blvd, Suite 2900, Miami, Florida 33131
sity, Universitetsgatan 2 S-65469, Karlstad/Sweden Sabrina De Capitani di Vimercati (Chapter 57), Pro-
Gerald Beuchelt (Chapters 10, 11), Principal Software fessor, Università degli Studi di Milano, DTI -
Systems Engineer, Demandware, Inc., Burlington, MA Dipartimento di Tecnologie dell’Informazione, S207,
Università degli Studi di Milano, Via Bramante 65,
Rahul Bhaskar (Chapters 27, 82), Professor, Depart- 26013 Crema e Italy
ment of Information Systems and Decision Sciences,
California State University, LH 564, Fullerton, California Tewfiq El Maliki (Chapter 71), Professor, University of
92834 Geneva, Switzerland, 2850 route nationale, 74120
Megève, France; Telecommunications labs, University
Chiara Braghin (Chapter 52), Professor, Dept. of Infor- of Applied Sciences of Geneva, Geneva, Switzerland
mation Technology, University of Milan, via Bramante
65 e 26013, Crema, Italy Scott R. Ellis (Chapters 3, 5, 23, 29, 30, 36, 40, 42, 75,
80), Manager, Infrastructure Engineering Team, kCura,
Albert Caballero (Chapters 24, 33), Chief Technology 175 West Jackson Blvd., Suite 1000, Chicago, IL 60604
Officer - CTO, Digital Era Group, LLC, 9357 Abbot
Ave., Surfside, Fl. 33154 Michael Erbschloe (Foreword), Teaches Information Se-
curity courses at Webster University, St. Louis, Missouri
Matteo Maria Casalino (Chapter 55), Professor, Universita 63119
degli studi di Bergamo, Via Salvecchio 19, 24129
Bergamo Italy Simone Fischer-Hbner (Chapter 53), Professor, Karlstad
University, Department of Computer Science, Room
Erdal Cayirci (Chapters 17, 21), Professor, University of no: 5A 435, Universitetsgatan 1, S 651 88, Karlstad/
Stavanger, N-4036 Stavanger, Norway Sweden
Thomas M. Chen (Chapters 8, 18, 60), Professor, Swansea Sara Foresti (Chapter 56), Professor, Università degli
University, Singleton Park, SA2 8PP, Wales, United Studi di Milano, Information Technology Department,
Kingdom Università degli Studi di Milano, via Bramante,
Hongbing Cheng (Chapters 17, 21), Professor, University 6526013 Crema (CR) Italy
of Stavanger, N-4036, Stavanger, Norway Errin W. Fulp (Chapter 74), Professor, Department of
Lauren Collins (Chapters 22, 36, 76, 77, 79, 81), Founder Computer Science, 239, Manchester Hall, P.O.
and Chief Strategy Officer, Managing Director, Win- Box 7311, Wake Forest University, Winston-Salem,
ning Edge Communications, 8151 West Eagle Lake North Carolina 27109
Road, Peotone, IL 60468 Angelo Genovese (Chapter 57), Professor, Università
Marco Cremonini (Chapter 52), Professor, Dept. of In- degli Studi di Milano, DTI - Dipartimento di Tecnolo-
formation Technology, University of Milan, via Bra- gie dell’Informazione, S207, Università degli Studi di
mante 65 e 26013, Crema, Italy Milano, Via Bramante 65, 26013 Crema e Italy
xxvii
xxviii Contributors
Anna Granova (Chapter 83), Advocate of the High Court Dalia Khader (Chapter 49), Collaborateur scientifique,
of South Africa, University of Pretoria, Computer University of Luxemburg, Campus Kirchberg,
Science Department, Information Technology Building, F 006, 6, rue Richard Coudenhove-Kalergi, L-1359
49 Algernon Road, Norwood, Johannesburg, 2192, Luxembourg
Republic of South Africa John Benjamin Khan (Chapter 45), Former UNIX Oper-
William F. Gross (Chapters 35, 37), Private Investigator, ator, University of Massachusetts, Infragard Member 6
Gross Security, LLC, 146 Main Street, Spencer, WV Stella Rd, Boston, MA 02131
25276 Larry Korba (Chapter 54), Ottawa, Ontario, Canada K1G
Yong Guan (Chapter 43), Litton Assistant Professor, 5N7
Department of Electrical and Computer Engineering, Kameswari Kotapati (Chapter 20), Department of
Iowa State University, 3216 Coover Hall, Ames, Iowa Computer Science and Engineering, The Pennsylvania
50011 State University, University Park, Pennsylvania 16802
Cem Gurkok (Chapters 41, 63), Threat Intelligence Stefan C. Kremer (Chapter 6), Professor, University of
Development Manager, Terremark Worldwide, Inc., Guelph, School of Computer Science, Guelph, ON,
One Biscayne Tower, 2S. Biscayne Blvd., Suite 2800, Canada
Miami, Florida 33131
Thomas F. LaPorta (Chapter 20), Professor, Department
Feng Hao (Chapter 49), Professor, Newcastle University, of Computer Science and Engineering, The Pennsylvania
School of Computing Science, Newcastle University, State University, University Park, Pennsylvania 16802
Newcastle Upon Tyne NE1 7RU
Jean Lencrenon (Chapter 49), Professor, Interdisciplinary
Tarfa Hamed (Chapter 6), Professor, University of Guelph, Centre for Security, Reliability and Trust, 6 rue Richard
School of Computer Science Guelph, ON, Canada Coudenhove-Kalergi, L-1359 Luxembourg-Kirchberg,
James T. Harmening (Chapters 25, 58), President, Computer Luxembourg
Bits, Inc., 123 W. Madison St. Suite 1005, Chicago, Keith Lewis (Chapters 4, 38, 39, 65, 66, 78), IT Security
Illinois 60602 Infrastructure Specialist, Keller Graduate School of
Rich Hoffman (Chapter 44), Assistant Vice President of Management, Naperville, Illinois
Forensics and the Lead Examiner, UnitedLex, 6130 Peng Liu (Chapter 20), Director, Cyber Security Lab,
Sprint 5 Parkway, Suite 300, Overland Park, Kansas College of Information Sciences and Technology,
66211 Pennsylvania State University, University Park,
Emin Huseynov (Chapter 50), Professor, University of Pennsylvania 16802
Geneva, Switzerland, CUI, Bureau, Battelle batiment A 7 Giovanni Livraga (Chapter 57), Professor, Università
route de Drize, c11-1227, 74120 Carouge, Switzerland degli Studi di Milano, DTI - Dipartimento di Tecnolo-
Markus Jakobsson (Chapter 59), Associate Professor of gie dell’Informazione, S207, Università degli Studi di
Informatics at IUB and Associate Director of CACR, Milano, Via Bramante 65, 26013 Crema e Italy
Indiana University, 5631 E Kerr Creek Rd., Bloo- John R. Mallery (Chapter 2), President, Mallery Tech-
mington, IN 47408 nical Training and Consulting, Inc., 9393 West 110th
Ravi Jhawar (Chapter 9), Professor, Universita’ degli St., Suite 500, Overland Park, Kansas, 66210
Studi di Milano, Department of Information Technol- Bill Mansoor (Chapter 15), Information Security Analyst
ogy, Universita’ degli Studi di Milano, via Bramante III, Information Security Office County of Riverside,
65, 26013 Crema (CR) ITALY 24711 Via Alvorado Mission Viejo, California 92692
Almantas Kakareka CISSP, GSNA, GSEC, CEH Luther Martin (Chapter 70), Chief Security Architect,
(Chapter 31), CTO, Demyo, Inc., 351 189th street, Voltage Security, 20400 Stevens Creek, Blvd STE 500
Sunny Isles Beach, FL 33160 Cupertino, CA 95014
Bhushan Kapoor (Chapters 27, 46, 82), Chair, Depart- John McDonald (Chapter 61), EMC Corporation, Hop-
ment of Information Systems and Decision Sciences, kinton, Massachusetts 01748
California State University, LH 564, Fullerton, California
92834 John McGowan (Chapter 61), EMC Corporation, Hop-
kinton, Massachusetts 01748
Sokratis K. Katsikas (Chapter 34), Department of
Technology Education & Digital Systems, University of Nailah Mims (Chapters 14, 84), Information Systems Se-
Piraeus, Piraeus 18532, Greece curity Analyst, Bright Horizons, 2 Seven Springs Lane
H, Burlington, MA 01803
Contributors xxix
Simone Mutti (Chapter 55), Professor, Universita degli Pierangela Samarati (Chapter 56), Professor, Università
studi di Bergamo, Via Salvecchio 19, 24129 Bergamo degli Studi di Milano, Information Technology
Italy Department, Università degli Studi di Milano, via Bra-
Peter F. Nicoletti (Chapter 87), Consultant, 110 Gumbo mante, 6526013 Crema (CR), Italy
Limbo Lane Po Box 448Miami, Florida, Tavernier, FL Marco Santambrogio (Chapter 7), Professor, Politecnico
33070 di Milano, Milano, ITALY
Kevin Noble, CISSP GSEC (Chapter 85), Director, Secure Mario Santana (Chapter 12), Consultant, Terremark
Information Services, Terremark Worldwide Inc., 50 Worldwide, Inc., One Biscayne Tower, 2S., Biscayne
N.E. 9 Street, Miami, Florida 33132 Blvd., Suite 2800, Miami, Florida 33131
Pramod Pandya (Chapters 16, 28, 46, 73, 91), Professor, Steve Schneider (Chapter 90), Professor, University of
Department of Information Systems and Decision Sci- Surrey, Department of Computing, Guildford, Surrey,
ences, California State University, Fullerton, California GU2 7XH
92834 Fabio Scotti (Chapter 57), Professor, Universita’ degli
Harsh Kupwade Patil (Chapters 18, 60), Professor, Studi di Milano, Department of Information Technol-
Southern Methodist University, Department of Com- ogy, Universita’ degli Studi di Milano, via Bramante
puter Science and Engineering, Lyle School of Engi- 65, 26013 Crema (CR), ITALY
neering, Caruth Hall 3145 Dyer Street, Suite 445 Jean-Marc Seigneur (Chapters 50, 71, 86), Professor,
Dallas, Texas Advanced Systems Group, University of Geneva,
Stefano Paraboschi (Chapters 26, 55), Professor, Uni- Switzerland, Centre Universitaire d’Informatique, Office
versita degli studi di Bergamo, Via Salvecchio 19, 234, Battelle batiment A 7 route de Drize, c11-1227,
24129 Bergamo Italy 74120 Carouge, Switzerland
Thea Peacock (Chapter 90), Professor, University of Marco Slaviero (Chapter 83), Security Analyst, Sense-
Luxemburg, Faculte des Sciences, De la Technologie et Post Pty Ltd, Lakeview 2, 138 Middel street, Nieuw
de la Communication 6, Rue Richard Coudenhove- Muckleneuk, Pretoria, South Africa
Kalergi L-1359 Luxembourg Daniel S. Soper (Chapter 47), Professor, Information and
Ken Perkins (Chapter 88), CIPP (Certified Information Decision Sciences Department, Mihaylo College of
Privacy Professional), Sr. Systems Engineer, Blazent Business and Economics, California State University,
Incorporated, 3650 E. 1st Ave., Denver, Colorado Fullerton, California 92834-6848
80206 Terence Spies (Chapter 48), Chief Technology Officer/
Vincenzo Piuri (Chapters 9, 57), Professor, Universita’ Vice President of Engineering, Hewlett Packard Enter-
degli Studi di Milano, Department of Information prise, 20400 Stevens Creek Blvd, Suite 500, Cupertino,
Technology, Universita’ degli Studi di Milano, via CA 95014
Bramante 65 26013 Crema (CR), ITALY William Stallings (Chapters 19, 69), Consultant and Writer,
Henrik Plate (Chapter 26), Senior Researcher, CISSP, No affiliation, 845 Satucket Road P. O. Box 2405,
SAP Research Security & Trust, 805, avenue du docteur Brewster, MA 02631
Maurice Donat 06250 Mougins, France Alex Tsow (Chapter 59), Professor, Indiana University,
James Pooley (Chapter 1), Attorney, Orrick, Herrington 7514 Ambergate Pl., Mclean, Virginia 22102
& Sutcliffe LLP, 1000 Marsh Road, Menlo Park, CA Jesse Walker (Chapter 13), Principal Engineer, Intel
94025-1015 Corporation, JF2-55 2111 N.E. 25th Avenue, Hillsboro,
Chunming Rong (Chapters 17, 21), Professor, Ph.D., OR 97124
Chair of Computer Science Section, Faculty of Science Michael A. West (Chapter 7), Senior Technical Writer,
and Technology, University of Stavanger, N-4036 Sta- Truestone Maritime Operations Martinez, California
vanger, Norway 94553
Robert Rounsavall (Chapter 62), Co-founder, Trapezoid, Dan Wing (Chapter 60), Distinguished Engineer, Cisco
Inc., 4931 SW 75th Ave., Miami, Florida 33155 Systems, Inc., 222 Coffeeberry Drive, San Jose, CA
Peter Y.A. Ryan (Chapters 49, 90), Professor of Informa- 95123
tion Security and Head of Applied Security and Infor- George O.M. Yee (Chapters 32, 54), Adjunct Research
mation Assurance (APSIA) Group, GCWN, University Professor, Carleton University, 17 Sai Crescent,
of Luxemburg, Campus Kirchberg 6, rue Richard, Ottawa, ON, Canada K1G 5N7
Coudenhove-Kalergi, L-1359 Luxembourg
xxx Contributors
xxxi
This page intentionally left blank
Foreword
We have all been there as an IT staffer. Suddenly, you have information technology and security have contributed their
a new project which is not in your immediate area of time, effort, and knowledge to this new edition so that you,
expertise. You need to get moving and get moving quickly; as an IT professional, can save valuable time getting up to
and, of course, security issues must be addressed from speed on a myriad of security topics.
inception through implementation. The third edition of the The third edition of the Computer and Information
Computer and Information Security Handbook is a tool that Security Handbook provides you with a professional
will help you to hit the ground running. competitive advantage, thus enabling you to stay on top of
With more than 30 new chapters, the newest edition of current topics and to outperform your peers and your
the Computer and Information Security Handbook covers competitors. I highly recommend this new edition of the
security issues from A to Z. You will not need to mine the handbook.
Internet and sort through a barrage of new material to
determine what is valid, valuable, and usable. The vetting Michael Erbschloe
work has been done for you in this new edition of the Information Security Consultant
handbook. Michael Erbschloe teaches information security
We all know that the new protocol is to effectively build courses at Webster University in St. Louis, Missouri.
security in from the start, so that you do not have to inef-
fectively add it on later. Many of the best minds in
xxxiii
This page intentionally left blank
Preface
This comprehensive third-edition handbook serves as a wireless sensor network security of the Internet of Things
professional reference and as a practitioner’s guide to (IoT); security for IoT; cellular network security, radio-
today’s most complete and concise view of computer and frequency identification (RFID) security; optical network
cyber-security and privacy available in two volumes. It security; and, optical wireless security.
offers in-depth coverage of computer and cyber-security Chapter 1, “Information Security in the Modern
theory, technology, and practice as they relate to estab- Enterprise,” provides a set of procedures and controls for
lished technologies as well as recent advancements. It conducting assessments of information security in the
explores practical solutions to a wide range of security modern enterprise.
issues. Individual chapters are authored by leading experts Chapter 2, “Building a Secure Organization,” sets the
in the field and address the immediate and long-term stage for the rest of the book by presenting insight into
challenges in the authors’ respective areas of expertise. where to start building a secure organization.
The primary audience for this handbook consists of Chapter 3, “A Cryptography Primer,” provides an
researchers and practitioners in industry and academia as overview of cryptography. It shows how communications
well as security technologists, engineers, federal and state may be encrypted and transmitted.
governments, and law enforcement, working with or Chapter 4, “Verifying User and Host Identity,” goes
interested in computer and cyber-security. This compre- over general identity management concepts and how
hensive reference and practitioner’s guide will also be of computer technology is used to validate a person’s
value to students in upper-division undergraduate and authenticity of gaining access to authorized systems.
graduate-level courses in computer and cyber-security. Chapter 5, “Detecting System Intrusions,” describes the
characteristics of the intrusion detection system (IDS)
technologies and provides recommendations for designing,
1. ORGANIZATION OF THIS BOOK implementing, configuring, securing, monitoring, and
maintaining them.
The book is organized into 15 parts composed of 91 Chapter 6, “Intrusion Detection in Contemporary
contributed chapters by leading experts in their fields, as Environments,” discusses intrusion detection applications
well as 12 appendices, including an extensive glossary of for two contemporary environments: mobile devices and
cyber-security terms and acronyms. cloud computing.
Chapter 7, “Preventing System Intrusions,” discusses
Part 1: Overview of System and Network how to prevent system intrusions and where an unautho-
rized penetration of a computer in your enterprise or an
Security: A Comprehensive Introduction
address in your assigned domain can occur.
Part 1 discusses how to build a secure organization; Chapter 8, “Guarding Against Network Intrusions,”
information security in the modern enterprise; how to shows how to guard against network intrusions by under-
generate cryptography; how to verify user and host identity; standing the variety of attacks, from exploits to malware
how to detect system intrusions; how to detect intrusions in and social engineering.
contemporary environments, how to prevent system Chapter 9, “Fault Tolerance and Resilience in Cloud
intrusions; how to guard against network intrusions, fault Computing Environments,” focuses on characterizing the
tolerance, and resilience in cloud computing environments; recurrent failures in a typical Cloud computing environ-
how to secure web applications, services, and servers; ment, analyzing the effects of failures on user’s applica-
UNIX and Linux security; how to eliminate the security tions, and surveying fault tolerance solutions corresponding
weakness of Linux and UNIX Operating systems; Internet to each class of failures.
and intranet security; the botnet problem; local area Chapter 10, “Securing Web Applications, Services, and
network (LAN) security; wireless network security; Servers,” provides a general overview of the breadth of web
xxxv
xxxvi Preface
service security, an introduction to the subject area, and modeling attack problems and protection schemes for op-
guides the reader to sources with deeper information. tical networks.
Chapter 11, “UNIX and Linux Security,” discusses how Chapter 23, “Optical Wireless Security,” focuses on
to scan for vulnerabilities; reduce denial-of-service (DoS) free space optics (FSO) and the security that has been
attacks; deploy firewalls to control network traffic; and developed to protect its transmissions, as well as an over-
build network firewalls. view of the basic technology.
Chapter 12, “Eliminating the Security Weakness of
Linux and UNIX Operating Systems,” presents an intro-
duction to securing UNIX in general and Linux in partic-
ular, providing some historical context and describing some
Part 2: Managing Information Security
fundamental aspects of the secure operating system Part 2 discusses how to protect mission-critical systems;
architecture. deploying security management systems; policy-driven
Chapter 13, “Internet Security,” shows you how cryp- system management; IT security management; how
tography can be used to address some of the security issues intruders gain unlawful access to networks; social
besetting communications protocols. engineering deceptions and defenses; ethical hacking; how
Chapter 14, “The Botnet Problem,” describes the botnet to conduct vulnerability assessments and security metrics;
threat and the countermeasures available to network secu- security education, training, and awareness; risk manage-
rity professionals. ment; and insider threats.
Chapter 15, “Intranet Security,” covers internal security Chapter 24, “Information Security Essentials for Infor-
strategies and tactics; external security strategies and mation Technology Managers: Protecting Mission-Critical
tactics; network access security; and Kerberos. Systems,” discusses how security goes beyond technical
Chapter 16, “Local Area Network Security,” discusses controls and encompasses people, technology, policy, and
network design and security deployment as well as ongoing operations in a way that few other business objectives do.
management and auditing. Chapter 25, “Security Management Systems,” examines
Chapter 17, “Wireless Network Security,” presents an documentation requirements and maintaining an effective
overview of wireless network security technology; how to security system as well as conducting assessments.
design wireless network security and plan for wireless Chapter 26, “Policy-Driven System Management,”
network security; how to install, deploy, and maintain focuses particularly on PBM’s use for securing computing
wireless network security; information warfare counter- systems according to high-level security goals.
measures: the wireless network security solution; and Chapter 27, “Information Technology Security Man-
wireless network security solutions and future directions. agement,” discusses the processes that are supported with
Chapter 18, “Wireless Sensor Network Security: The enabling organizational structure and technology to protect
Internet of Things,” helps organizations design, implement, an organization’s information technology operations and IT
and evaluate wireless sensor intrusion detection systems, assets against internal and external threats, intentional or
which aim at transferring the computational load of the otherwise.
operation from the sensors to the base station. Chapter 28, “The Enemy (The Intruder’s Genesis),”
Chapter 19, “Security for the Internet of Things,” is an discusses process of creating a formal set of governance to
overview of the IoT architecture developed by ITU-T, and define cyber-security, and course of actions to be taken to
defined in Y.2060. defend against the cyber-attacks.
Chapter 20, “Cellular Network Security,” addresses the Chapter 29, “Social Engineering Deceptions and
security of the cellular network; educates readers on the Defenses,” illustrates a cross-section of socially engineered
current state of security of the network and its vulnerabil- attacks.
ities; outlines the cellular network specific attack taxon- Chapter 30, “Ethical Hacking,” provides the foundation
omy, also called three-dimensional attack taxonomy; needed to become skilled at ethical hacking.
discusses the vulnerability assessment tools for cellular Chapter 31, “What Is Vulnerability Assessment?”
networks; and provides insights into why the network is so covers the fundamentals: defining vulnerability, exploit,
vulnerable and why securing it can prevent communication threat, and risk; analyzing vulnerabilities and exploits; and
outages during emergencies. configuring scanners. It also shows you how to generate
Chapter 21, “Radio Frequency Identification Security,” reports, assess risks in a changing environment, and
describes the RFID tags and RFID reader and back-end manage vulnerabilities.
database in detail. Chapter 32, “Security Metrics: An Introduction and
Chapter 22, “Optical Network Security,” presents an Literature Review” describes the need for security metrics,
analysis of attack and protection problems in optical followed by a discussion of the nature of security metrics,
networks. It also proposes a conceptual framework for including what makes a good security metric, what security
Preface xxxvii
metrics have been used in the past, and how security Chapter 41, “Cyber Forensics and Incidence Response,”
metrics can be scientifically based. discusses the steps and methods to respond to incidents and
Chapter 33, “Security Education, Training, and conduct cyber forensics investigations.
Awareness” is designed to facilitate the implementation of Chapter 42, “Securing e-Discovery,” explains electronic
SETA program requirements and standards, within the full discovery reference model (EDRM) from an industry
range of security disciplines that comprise physical- and insider perspective; collates issues of performance, urgency,
cyber-security. accuracy, risk, and security to a zoned model that underpins
Chapter 34, “Risk Management,” discusses physical the EDRM; explains the very real need for organizations to
security threats, environmental threats, and incident secure certain operations internally; provides examples
response. through real-world experiences of flawed discovery, and
Chapter 35, “Insider Threats,” discusses how the insider what should have been done differently; and discusses how
threat is real; and, the damage done by insiders is increasing security from the information as well as security of it plays a
exponentially with more dependence on data and tele- critical role throughout much of the EDRM.
communication systems. Chapter 43, “Network Forensics,” helps you determine
the path from a victimized network or system through any
intermediate systems and communication pathways, back
Part 3: Disaster Recovery Security to the point of attack origination or the person who should
be held accountable.
Part 3 discusses disaster recovery and disaster recovery Chapter 44, “Microsoft Office and Metadata Forensics:
plans for small and medium business (SMB). A Deeper Dive,” focuses on defining some of the specific
Chapter 36, “Disaster Recovery,” provides insight to the issues encountered when analyzing Microsoft Office met-
job of Disaster Recovery (DR), and provides a framework adata, the most common file types forensic investigators
of what is necessary to achieve a successful DR plan. encounter.
Chapter 37, “Disaster Recovery Plans for Small and Chapter 45, “Hard Drive Imaging,” aims to jumpstart
Medium Business (SMBs),” looks at disaster recovery individuals interested in computer forensics and/or data
planning, business continuity, and business impact analysis recovery.
in the scope of available resources to the average SMB.
between different parties and provides a short overview on a Chapter 57, “Privacy and Security in Environmental
specific variant of authenticated key exchange protocols in Monitoring Systems: Issues and Solutions,” identifies the
which authentication between parties is established through main security and privacy issues characterizing the envi-
knowledge of a simple, human-memorable password. ronmental data as well as the environmental monitoring
Chapter 50, “Context-Aware Multifactor Authentication infrastructures.
Survey,” reviews a wide variety of modern and classic Chapter 58, “Virtual Private Networks,” covers VPN
multifactor authentication systems and methods. scenarios, VPN comparisons, and information assurance
Chapter 51, “Instant-Messaging Security,” helps you requirements. It also covers building VPN tunnels;
develop an IM security plan, keep it current, and make sure applying cryptographic protection; implementing IP secu-
it makes a difference. rity; and deploying virtual private networks.
Chapter 59, “Identity Theft,” describes the importance
of understanding the human factor of ID theft security and
details the findings from a study on deceit.
Part 7: Privacy and Access Management Chapter 60, “VoIP Security,” deals with the attacks
Part 7 discusses online privacy, privacy-enhancing tech- targeted toward a specific host and issues related to social
nologies, personal privacy policies, detection of conflicts in engineering.
security policies, detection of conflicts in security policies,
supporting user privacy preferences in digital interactions,
privacy and security in environmental monitoring systems: Part 8: Storage Security
issues and solutions, virtual private networks, identity theft,
and voice-over Internet protocol (VoIP) security. Part eight covers storage area network (SAN) security and
Chapter 52, “Online Privacy,” addresses the privacy storage area networking devices security.
issues in the digital society from various points of view, Chapter 61, “SAN Security,” describes the following
investigating the different aspects related to the notion of components: protection rings; security and protection;
privacy and the debate that the intricate essence of privacy restricting access to storage; access control lists (ACLs) and
has stimulated; the most common privacy threats and the policies; port blocks and port prohibits; and zoning and
possible economic aspects that may influence the way isolating resources.
privacy is (and especially is not currently) managed in most Chapter 62, “Storage Area Networking Security
firms; the efforts in the computer science community to Devices,” covers all the issues and security concerns
face privacy threats, especially in the context of mobile and related to SAN security.
database systems; and the network-based technologies
available to date to provide anonymity when communi-
cating over a private network. Part 9: Cloud Security
Chapter 53, “Privacy-Enhancing Technologies,”
provides an overview to the area of Privacy-enhancing Part 9 discusses securing cloud computing systems, cloud
technologies (PETs), which help to protect privacy by security and private cloud security.
technically enforcing legal privacy principles. Chapter 63, “Securing Cloud Computing Systems,”
Chapter 54, “Personal Privacy Policies,” begins with the aims to discuss various cloud computing environments and
derivation of policy content based on privacy legislation, methods to make them more secure for hosting companies
followed by a description of how a personal privacy policy and their customers.
may be constructed semiautomatically. It then shows how to Chapter 64, “Cloud Security,” outlines trends in cloud
additionally specify policies so that negative unexpected security.
outcomes can be avoided. Finally, it describes the author’s Chapter 65, “Private Cloud Security,” covers the
Privacy Management Model, which explains how to use importance of private cloud security.
personal privacy policies to protect privacy, including what is Chapter 66, “Virtual Private Cloud Security,” covers the
meant by a “match” of consumer and service provider policies overall concepts of virtual private cloud security.
and how nonmatches can be resolved through negotiation.
Chapter 55, “Detection of Conflicts in Security Policies,”
identifies the common approaches to the identification of Part 10: Virtual Security
security conflicts considering three relevant scenarios: access
control policies, policy execution, and network protection. Part 10 discusses protecting the virtual infrastructure and
The chapter focuses on the detection of the conflicts. software defined networking (SDN) and netword function
Chapter 56, “Supporting User Privacy Preferences in virtualization (NFV) security.
Digital Interactions,” describes solutions supporting both Chapter 67, “Protecting Virtual Infrastructure,” outlines
client privacy preferences and server disclosure policies. trends in security virtualization.
Preface xxxix
Chapter 68, “Software-Defined Networking and ways penetration tests are conducted, how they’re controlled,
Network Function Virtualization Security,” outlines soft- and what organizations might look for when choosing a
ware defined networking (SDN) and network function company to conduct a penetration test for them.
virtualization (NFV) technologies and gives attention to Chapter 76, “System Security,” shows you how to
cascading threats as well as controller protections. protect your information from harm, and also ways to make
your data readily available for access to an intended audi-
ence of users.
Chapter 77, “Access Controls,” endeavors to inform the
Part 11: Cyber Physical Security reader about the different types of access controls that are
Part 11 discusses physical security essentials and being used, and describes the pros and cons they might
biometrics. have.
Chapter 69, “Physical Security Essentials,” is concerned Chapter 78, “Endpoint Security,” covers the importance
with physical security and some overlapping areas of pre- of endpoint security designing and the architectural func-
mises security. It also looks at physical security threats and tions and philosophy behind it.
then considers physical security prevention measures. Chapter 79, “Assessments and Audits,” presents the
Chapter 70, “Biometrics,” discusses the different types basic technical aspects of conducting information security
of biometrics technology and verification systems and how assessments and audits. It presents technical testing and
the following work: biometrics eye analysis technology; examination methods and techniques that an organization
biometrics facial recognition technology; facial thermal might use as part of an assessment and audit, and offers
imaging; biometrics finger-scanning analysis technology; insights to assessors on their execution and the potential
biometrics geometry analysis technology; biometrics veri- impact they may have on systems and networks.
fication technology; and privacy-enhanced, biometrics- Chapter 80, “Fundamentals of Cryptography,”
based verification/authentication as well as biometrics discusses how information security is the discipline that
solutions and future directions. provides protection of information from intrusion and
accidental or incidental loss. It also provides a framework
for the protection of information from unauthorized use,
copying, distribution, or destruction of data.
Part 12: Practical Security
Part 12 discusses online identity and user management
services, Intrusion Prevention and Detection Systems, TCP/
Part 13: Critical Infrastructure Security
IP Packet Analysis, firewalls, penetration testing, system
security, access controls, endpoint security, assessments Part 13 discusses securing the infrastructure, homeland
and audits, and fundamentals of cryptography. security, cyber warfare, and cyber-attack process.
Chapter 71, “Online Identity and User Management Chapter 81, “Securing the Infrastructure,” focuses on
Services,” presents the evolution of identity management how security is presented to protect the infrastructure.
requirements. It also surveys how the most advanced Smart grid cyber-security in this chapter also addresses
identity management technologies fulfill present-day not only deliberate attacks, such as from disgruntled
requirements. It discusses how mobility can be achieved employees, industrial espionage, and terrorists, but also
in the field of identity management in an ambient intelli- inadvertent compromises of the information infrastructure
gent/ubiquitous computing world. due to user errors, equipment failures, and natural
Chapter 72, “Intrusion Prevention and Detection Sys- disasters.
tems,” discusses the nature of computer system intrusions, Chapter 82, “Homeland Security,” describes some
the people who commit these attacks, and the various principle provisions of US homeland security-related laws
technologies that can be utilized to detect and prevent them. and Presidential directives. It gives the organizational
Chapter 73, “Transmission Control Protocol/Internet changes that were initiated to support homeland security in
Protocol Packet Analysis,” discusses how TCP/IP packets the United States. The chapter highlights the 9/11
are constructed and analyzed to interpret the applications Commission that Congress charted to provide a full account
that use the TCP/IP stack. of the circumstances surrounding the 2001 terrorist attacks
Chapter 74, “Firewalls,” provides an overview of fire- and to develop recommendations for corrective measures
walls: policies, designs, features, and configurations. Of that could be taken to prevent future acts of terrorism. It
course, technology is always changing, and network fire- also details the Intelligence Reform and Terrorism
walls are no exception. However, the intent of this chapter Prevention Act of 2004 and the Implementation of the 9/11
is to describe aspects of network firewalls that tend to Commission Recommendations Act of 2007.
endure over time. Chapter 83, “Cyber Warfare,” defines cyber warfare
Chapter 75, “Penetration Testing,” describes how testing (CW) and discusses its most common tactics, weapons, and
differs from an actual “hacker attack” as well as some of the tools as well as comparing CW terrorism with conventional
xl Preface
warfare and addressing the issues of liability and the such as legal liability risk reduction, productivity gains, and
available legal remedies under international law. bandwidth usage. It also explores the downside and unin-
Chapter 84, “Cyber-Attack Process,” covers the cyber- tended consequences and risks that improperly deployed or
attack process, to include the technical and nontechnical misconfigured systems create. The chapter also looks into
steps an attacker uses in order to exploit their targeted methods to subvert and bypass these systems and the
entity. reasons behind them.
Chapter 88, “Data Loss Protection,” introduces the
reader to a baseline understanding of how to investigate and
evaluate DLP applications in the market today.
Part 14: Advanced Security Chapter 89, “Satellite Cyber-Attack Search and
Part 14 discusses security through diversity, online repu- Destroy,” discusses satellite cyber-attacks with regards to
tation, content filtering, data loss protection, satellite cyber- hacking, interference, and jamming.
attack search and destroy, verifiable voting systems and Chapter 90, “Verifiable Voting Systems,” emphasizes
advanced data encryption. For instance: the challenge to reconcile the secrecy of the ballot, with
Chapter 85, “Security Through Diversity,” covers some demonstrable correctness of the result.
of the industry trends in adopting diversity in hardware, Chapter 91, “Advanced Data Encryption,” explores
software, and application deployments. This chapter also advanced data encryption algorithms.
covers the risks of uniformity, conformity, and the ubiq-
uitous impact of adopting standard organizational princi-
pals without the consideration of security.
2. SUPPLEMENTAL MATERIALS
Chapter 86, “e-Reputation and Online Reputation
Management Survey,” discusses the general understanding Instructor materials, including appendices and glossary,
of the human notion of reputation. It explains how this lecture slides, figures from the text, exercise solutions, and
concept of reputation fits into computer security. The sample syllabi are available at: store.elsevier.com/product.
chapter presents the state of the art of attack-resistant jsp?isbn59780123943972 (click the “Resources” tab at
reputation computation. It also gives an overview of the the bottom of the page).
current market of online reputation services. The chapter John R. Vacca
concludes by underlining the need to standardize online Editor-in-Chief
reputation for increased adoption and robustness. [email protected]
Chapter 87, “Content Filtering,” examines the many www.johnvacca.com
benefits and justifications of web-based content filtering
Acknowledgments
There are many people who have contributed to this book’s Maria Casalino, Erdal Cayirci, Tom Chen, Hongbing
successful completion. I owe each a debt of gratitude and Cheng, Lauren Collins, Marco Cremonini, Sam Curry,
want to take this opportunity to offer my sincere thanks. Rozita Dara, Christopher Day, Sabrina De Capitani Di
A very special thanks to my Senior Acquisitions Editor, Vimercati, Scott R. Ellis, Tewfiq El Maliki, Michael
Brian Romer, without whose continued interest and support Erbschloe, Simone Fischer-Hbner, Sara Foresti, Errin W.
would not have made this book possible. And, a very special Fulp, Angelo Genovese, Anna Granova, William F. Gross,
thanks to Senior Editorial Project Manager, Charlie Kent, Yong Guan, Cem Gurkok, Feng Hao, Tarfa Hamed, James
who provided staunch support and encouragement when it T. Harmening, Rich Hoffman, Emin Huseynov, Markus
was most needed. Thanks to my Senior Project Managers Jakobsson, Ravi Jhawar, Almantas Kakareka, Bhushan
Priya Kumaraguruparan and Udayakumar Raghavan; Kapoor, Sokratis K. Katsikas, Dalia Khader, John B. Khan,
Copyeditors, whose fine editorial work has been invaluable. Larry Korba, Kameswari Kotapati, Stefan C. Kremer,
Thanks also to my Marketing Manager, whose efforts on Thomas F. LaPorta, Jean Lencrenon, Keith Lewis, Peng
this book have been greatly appreciated. Finally, thanks to Liu, Giovanni Livraga, Tewfiq El Maliki, John R. Mallery,
all of the other people at Computer Networking and Computer Bill Mansoor, Luther Martin, John McDonald, John
and Information Systems Security, and Morgan Kaufmann McGowan, Nailah Mims, Simone Mutti, Peter Nicoletti,
Publishers/Elsevier Science & Technology Books, whose Kevin Noble, Pramod Pandya, Harsh Kupwade Patil,
many talents and skills are essential to a finished book. Stefano Paraboschi, Thea Peacock, Ken Perkins, Vincenzo
Thanks to my wife, Bee Vacca, for her love, her help, Piuri, Henrik Plate, James Pooley, Daniel Ramsbrock,
and her understanding of my long work hours. Also, special Chunming Rong, Robert Rounsavall, Peter Ryan,
thanks to Michael Erbschloe for writing the foreword. Pierangela Samarati, Marco Santambrogio, Mario Santana,
Finally, I wish to thank all the following authors who Steve Schneider, Fabio Scotti, Jean-Marc Seigneur, Marco
contributed chapters that were necessary for the completion Slaviero, Daniel S. Soper, Terence Spies, William
of this book: Edward Amoroso, Jeffrey S. Bardin, Cataldo Stallings, Alex Tsow, Jesse Walker, Patrick J. Walsh,
Basile, Sanjay Bavisi, Stefan Berthold, Gerald Beuchelt, Michael A. West, Dan Wing, Zhe Xia, George O.M. Yee,
Rahul Bhaskar, Chiara Braghin, Albert Caballero, Matteo Liang Yan, Roman Zabicki, and Gansen Zhao.
xli
This page intentionally left blank
Part I
Pues á los catorce años del Reinado de Motezuma, que fué en los
mil y quinientos y diez y siete de nuestro Salvador, aparecieron en la
mar de el Norte unos navíos con gente, de que los moradores de la
costa, que eran vasallos de Motezuma, recibieron grande
admiracion, y queriendo satisfacerse mas quien eran, fueron en unas
canoas los Indios á las naves, llevando mucho refresco de comida y
ropa rica, como que iban á vender. Los Españoles les acogieron en
sus naves, y en pago de las comidas y vestidos que les contentaron,
les dieron unos sartales de piedras falsas, coloradas, azules, verdes y
amarillas, las cuales creyeron los Indios ser piedras preciosas. Y
habiéndose informado los Españoles de quien era su Rey, y de su
gran potencia, les despidieron diciéndoles, que llevasen aquellas
piedras á su Señor, y dijesen, que de presente no podian ir á verle,
pero que presto volverian, y se verian con él. Con este recado fueron
á Méjico los de la costa, llevando pintado en unos paños todo cuanto
habian visto, y los navios y hombres, y su figura, y juntamente las
piedras que les habian dado. Quedó con este mensage el Rey
Motezuma muy pensativo, y mandó no dijesen nada á nadie. Otro
dia juntó su Consejo, y mostrando los paños y los sartales, consultó
qué se haria. Y resolvióse en dar órden á todas las costas de la mar,
que estuviesen en vela, y que cualquiera cosa que hubiese le
avisasen. Al año siguiente, que fué á la entrada del diez y ocho,
vieron asomar por la mar la flota, en que vino el Marqués del Valle
Don Fernando Cortés, con sus compañeros, de cuya nueva se turbó
mucho Motezuma, y consultando con los suyos, dijeron todos, que
sin falta era venido su antiguo y gran Señor Quetzaálcoatl, que él
habia dicho volvería, y que así venia de la parte de oriente, adonde
se habia ido. Hubo entre aquellos Indios una opinion, que un gran
Príncipe les habia en tiempos pasados dejado, y prometido que
volveria, de cuyo fundamento se dirá en otra parte. En fin, enviaron
cinco Embajadores principales con presentes ricos á darles la bien
venida, diciéndoles, que ellos sabian que su gran Señor
Quetzaálcoatl venia allí, y que su siervo Motezuma le enviaba á
visitar, teniéndose por siervo suyo. Entendieron los Españoles este
mensage por medio de Marina, India, que traían consigo, que sabia
la lengua Mejicana. Y pareciéndole á Hernando Cortés que era
buena ocasion aquella para su entrada en Méjico, hizo que le
aderezasen muy bien su aposento, y puesto él con gran autoridad y
ornato, mandó entrar los Embajadores, á los cuales no les faltó sino
adorarle por su Dios. Diéronle su embajada diciendo, que su siervo
Motezuma le enviaba á visitar, y que como Teniente suyo le tenia la
tierra en su nombre, y que ya sabía que él era el Topilcin, que les
habia prometido muchos años habia volver á verlos, y que allí le
traian de aquellas ropas, que él solia vestirse cuando andaba entre
ellos, que le pedian las tomase, ofreciéndole muchos y muy buenos
presentes. Respondió Cortés aceptando las ofertas, y dando á
entender, que él era el que decian, de que quedaron muy contentos,
viéndose tratar por él con gran amor y benevolencia (que en esto,
como en otras cosas, fué digno de alabanza este valeroso Capitan),
y si su traza fuera adelante, que era por bien ganar aquella gente,
parece que se habia ofrecido la mejor coyuntura que se podia
pensar, para sugetar al Evangelio con paz y amor toda aquella tierra.
Pero los pecados de aquellos crueles homicidas y esclavos de
Satanás pedian ser castigados del Cielo, y los de muchos Españoles
no eran pocos; y así los juicios altos de Dios dispusieron la salud de
las gentes, cortando primero las raíces dañadas. Y como dice el
Apóstol[57]: la maldad y ceguera de los unos fué la salvacion de los
otros. En efecto, el dia siguiente, despues de la embajada dicha,
vinieron á la Capitana los Capitanes y gente principal de la flota, y
entendiendo el negocio, y cuan poderoso y rico era el Reino de
Motezuma, parecióles que importaba cobrar reputacion de bravos y
valientes con aquella gente; y que así, aunque eran pocos, serian
temidos y recibidos en Méjico. Para esto hicieron soltar toda la
artillería de las naves, y como era cosa jamás vista por los Indios,
quedaron tan atemorizados, como si se cayera el Cielo sobre ellos.
Despues los soldados dieron en desafiarlos á que peleasen con ellos,
y no atreviéndose los Indios, los denostaron, y trataron mal,
mostrándoles sus espadas, lanzas, gorgujes, partesanas, y otras
armas, con que mucho les espantaron. Salieron tan escandalizados y
atemorizados los pobres Indios, que mudaron del todo opinion,
diciendo, que allí no venia su Rey y Señor Topilcin, sino Dioses
enemigos suyos para destruirlos. Cuando llegaron á Méjico, estaba
Motezuma en la casa de Audiencia, y antes que le diesen la
embajada, mandó el desventurado sacrificar en su presencia número
de hombres, y con la sangre de los sacrificados rociar á los
Embajadores, pensando con esta ceremonia (que usaban en
solemnísimas embajadas) tenerla buena. Mas oída toda la relacion é
informacion de la forma de navíos, gente y armas, quedó del todo
confuso y perplejo, y habido su Consejo no halló otro mejor medio,
que procurar estorbar la llegada de aquellos extranjeros por artes
mágicas y conjuros. Solíanse valer de estos medios muchas veces,
porque era grande el trato que tenian con el Diablo, con cuya ayuda
conseguian muchas veces efectos extraños. Juntáronse, pues, los
hechiceros, magos, y encantadores, y persuadidos de Motezuma
tomaron á su cargo el hacer volver aquella gente á su tierra, y para
esto fueron hasta ciertos puestos, que para invocar los Demonios, y
usar su arte les pareció cosa digna de consideracion. Hicieron cuanto
pudieron y supieron: viendo que ninguna cosa les empecia á los
Cristianos, volvieron á su Rey diciendo, que aquellos eran mas que
hombres, porque nada les dañaba de todos sus conjuros y encantos.
Aquí ya le pareció á Motezuma echar por otro camino, y fingiendo
contento de su venida, envió á mandar en todos sus Reinos, que
sirviesen á aquellos Dioses celestiales, que habian venido á su tierra:
todo el pueblo estaba en grandísima tristeza y sobresalto. Venian
nuevas á menudo, que los Españoles preguntaban mucho por el Rey,
y por su modo de proceder, y por su casa y hacienda. De ésto él se
congojaba en demasía; y aconsejándole los suyos, y otros
nigrománticos que se escondiese, y ofreciéndole que ellos le
pondrian donde criatura no pudiese hallarle, parecióle bajeza, y
determinó aguardar, aunque fuese muriendo. Y en fin, se pasó de
sus casas Reales á otras, por dejar su palacio para aposentar en él á
aquellos Dioses, como ellos decían.
CAPÍTULO XXV
ebooksecure.com