0%

Book Description

The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures

Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today’s key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security–so you can prevent serious problems and mitigate those that still occur.

In this new book, renowned security and software engineering experts Charles Pfleeger and Shari Lawrence Pfleeger—authors of the classic Security in Computing, Fourth Edition—teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and showing how to choose and apply the right protections.

Attacks and solutions are presented through nearly 200 illustrations. More than 250 up-to-date problems allow you to practice the skills you learn. The book covers “hot button” issues, such as cloud computing, electronic voting, and cyber warfare. You also gain new insight into broader themes, including risk analysis, human factors, overlapping controls, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to safeguard any information infrastructure.

Coverage includes

  • Understanding the linkages between threats, vulnerabilities, and countermeasures

  • Knowing when security is useful, and when it’s useless “security theater”

  • Implementing effective identification and authentication systems

  • Using modern cryptography and overcoming weaknesses in cryptographic systems

  • Protecting against malicious code: virii, Trojans, worms, buffer overflows, rootkits, keyloggers, and more

  • Understanding, preventing, and mitigating DOS and DDOS attacks

  • Architecting more secure wired and wireless networks

  • Successfully implementing firewalls and intrusion detection systems

  • Protecting against physical data loss or theft

  • Building more secure application software and operating systems

  • Improving security through simpler designs and layered protection

  • Protecting identities and enforcing privacy

  • Understanding new security issues associated with social media

  • Table of Contents

    1. Title Page
    2. Copyright Page
    3. Contents
    4. Foreword
    5. Preface
    6. About the Authors
    7. 1. Security Blanket or Security Theater?
    8. 2. Knock, Knock. Who’s There?
    9. 3. 2 + 2 = 5
    10. 4. A Horse of a Different Color
    11. 5. The Keys to the Kingdom
    12. Interlude A: Cloud Computing
    13. 6. My Cup Runneth Over
    14. 7. He Who Steals My Purse ...
    15. 8. The Root of All Evil
    16. 9. Scanning the Horizon
    17. 10. Do You Hear What I Hear?
    18. 11. I Hear You Loud and Clear
    19. Interlude B: Electronic Voting
    20. 12. Disregard That Man behind the Curtain
    21. 13. Not All Is as It Seems
    22. 14. Play It [Again] Sam, or, Let’s Look at the Instant Replay
    23. 15. I Can’t Get No Satisfaction
    24. Interlude C: Cyber Warfare
    25. 16. ‘Twas Brillig, and the Slithy Toves ...
    26. 17. Peering through the Window
    27. 18. My 100,000 Nearest and Dearest Friends
    28. Afterword
    29. Bibliography
    30. Index
    31. Footnotes
      1. Chapter 3
      2. Chapter 5
      3. Chapter 6
      4. Chapter 7
      5. Chapter 11
    3.12.71.237