Online Resources xiii
Notation xiv
About the Authors xv
Preface xvii
Chapter 0 Reader’s and Instructor’s Guide 1
0.1 Outline of This Book 2
0.2 A Roadmap for Readers and Instructors 2
0.3 Support for CISSP Certification 3
0.4 Internet and Web Resources 5
0.5 Standards 7
Chapter 1 Overview 9
1.1 Computer Security Concepts 10
1.2 Threats, Attacks, and Assets 18
1.3 Security Functional Requirements 23
1.4 A Security Architecture for Open Systems 26
1.5 Computer Security Trends 31
1.6 Computer Security Strategy 33
1.7 Recommended Reading and Web Sites 35
1.8 Key Terms, Review Questions, and Problems 36
PART ONE: COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES 38
Chapter 2 Cryptographic Tools 38
2.1 Confidentiality with Symmetric Encryption 39
2.2 Message Authentication and Hash Functions 46
2.3 Public-Key Encryption 54
2.4 Digital Signatures and Key Management 59
2.5 Random and Pseudorandom Numbers 62
2.6 Practical Application: Encryption of Stored Data 64
2.7 Recommended Reading and Web Sites 66
2.8 Key Terms, Review Questions, and Problems 67
Chapter 3 User Authentication 71
3.1 Means of Authentication 73
3.2 Password-Based Authentication 73
3.3 Token-Based Authentication 84
3.4 Biometric Authentication 88
3.5 Remote User Authentication 93
3.6 Security Issues for User Authentication 95
3.7 Practical Application: An Iris Biometric System 97
Sedang diterjemahkan, harap tunggu..