Computer security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston [u.a.]
Butterworth-Heinemann
1996
|
Ausgabe: | 3. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XVIII, 648 S. graph. Darst. |
ISBN: | 0750696001 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV011268753 | ||
003 | DE-604 | ||
005 | 20050914 | ||
007 | t | ||
008 | 970325s1996 d||| |||| 00||| engod | ||
020 | |a 0750696001 |9 0-7506-9600-1 | ||
035 | |a (OCoLC)32589138 | ||
035 | |a (DE-599)BVBBV011268753 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-91 | ||
050 | 0 | |a HF5548.37 | |
082 | 0 | |a 658.4/78 |2 20 | |
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 460f |2 stub | ||
100 | 1 | |a Carroll, John Millar |d 1925- |e Verfasser |0 (DE-588)105097268 |4 aut | |
245 | 1 | 0 | |a Computer security |c John M. Carroll |
250 | |a 3. ed. | ||
264 | 1 | |a Boston [u.a.] |b Butterworth-Heinemann |c 1996 | |
300 | |a XVIII, 648 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer security | |
650 | 4 | |a Electronic data processing departments |x Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007566607&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-007566607 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804125772314574848 |
---|---|
adam_text | Contents
Preface to the Third Edition xiii
Preface to the Second Edition xv
Acknowledgments xvii
PARTI THE THREAT TO COMPUTER SECURITY
Chapter 1 Essentials of Computer Security 3
Unique EDP Security Problems 3
EDP Security in a Nutshell 8
Computers and Crime; Know Your
Enemyf 13
The Anatomy of Computer Crime 20
Chapter 2 Computer Crime and the Law 29
United States 29
Australia 32
Canada 35
United Kingdom 42
New Zealand 44
Continental Europe 44
Conclusions 46
Classic Case Histories 47
References for Part I 59
PART H SECURITY MANAGEMENT CONSIDERATIONS
Chapter 3 Organizing for EDP Security 6 $
EDP Security in the Public Sector 65
EDP Security in the Private Sector 66
Corporate EDP Security €9
Duties of the Security Coordinator ¦ ¦ ¦ 72
Principles of Security Management 74
New Challenges for IT Security
Management 76
V
vi Contents
Chapter 4 Protection of Information 79
Classification—The Government Model 79
Classification—The Corporate Model 83
Special Problems with EDP 85
Marking Classified Matter 86
Storing Classified Matter 88
Destroying Classified Matter 89
Residual,Memory in Magnetic Media 90
Procedural Safeguards for Classified
Matter 92
Conclusion 95
Chapter 5 Screening and Management of Personnel 99
Management Responsibility 102
Relations with Vendors 102
Categories of Security Clearance 103
Security Screening of Employees 104
Personnel Security Policies 108
Conclusion 111
PART m PHYSICAL SECURITY
Chapter 6 Physical Access Control 115
Basics of Access Control 115
Automatic Access Control 116
Key Access Control 120
Concentric Controlled Perimeters 120
Outer Perimeter Access 121
Building Access Control 122
Control of Access to Restricted Areas 123
Material Control in Restricted Areas 126
Computer Room Access Control 127
Chapter 7 Physical Security 131
The Fortress Concept 131
Outer Perimeter Defense 133
Building Perimeters 134
Guarded Areas 136
Restricted Area Perimeter 139
Computer Room Security 142
Chapter 8 Environmental Security 145
Electrical Power 145
Grounding 149
Interference Suppression 150
Contents vii
Dust Control 152
Environmental Controls 153
Chapter 9 Disaster Control 157
Locating the Computer Center 157
Protecting the Computer Center 160
Automatic Fire Detection 165
General Fire Safety Planning 167
Disaster Recovery 169
PART IV COMMUNICATIONS SECURITY
Chapter 10 Line Security 177
Communications Security Subfields 177
Security of Communications Cables 178
Interior Communications Lines 182
Telephone Instrument Security 183
Additional Line Security Considerations 188
Local Area Networks 189
Space Radio Interception 195
Chapter 11 Transmission Security 199
General Considerations 199
Operating Procedures 200
Speech Privacy 206
Error Proof Codes 210
Traffic Analysis 213
Chapter 12 Cryptographic Security 215
Introduction to Cryptology 215
Overview of Ciphers 216
How Ciphers Work 219
How DES Works 224
Network Communications Security 235
Weaknesses of DES 236
Ways to Use DES 238
Asymmetrical Ciphers 241
El Gamel 243
Crypto Procedures 244
Cryptanalysis 246
Summary 249
Chapter 13 Emanations Security 251
Emanation Problems 251
Probability of Interception 253
Defense Mechanisms 254
viii Contents
Measuring Electromagnetic Emanation
Levels 256
Additional Defenses 260
Defense Against Acoustical Emanations 265
Chapter 14 Technical Security 267
Victimization of EDP Centers 267
Categories of Technical Surveillance 268
Defenses Against Technical Surveillance 269
Types of Intrusion Devices 273
PART V SYSTEMS SECURITY
Chapter 15 Systems Identification 281
Introduction to Systems Security 281
Guidelines for a Trusted Computing
Base 286
Personal Identification 291
Other User Identification Systems 298
Identifying Specified Assets 298
System Relationships 302
Privacy Considerations 302
Freedom of Information 304
Chapter 16 Isolation in Computer Systems 307
Defense Strategies 307
Processing Modes 308
Temporal Isolation 310
Spatial Isolation 312
System Architecture 312
Cryptographic Isolation 325
Restriction of Privilege 326
Virtual Machine Isolation 327
Trends in User Isolation 327
Chapter 17 Systems Access Control 329
Basic Principles of Access 329
Authentication 332
Systems Access 336
Internal Access 337
Access Privileges 340
Keeping Hackers Out 344
System Security Add on Packages 349
Chapter 18 Detection and Surveillance 353
Threat Monitoring 353
: ¦ Trend Analysis , ¦ : ¦ 355
Contents ix
Investigation 361
Auditing 363
Compensatory Action 365
The Human Factor in Computer Crime 367
Chapter 19 Systems Integrity 369
Program Security 369
Error Control 372
Privacy in Statistical Data Bases 375
Protection of Security Functions 379
Commercial Security Model 381
Object Oriented Model 383
Conclusion 386
Bibliography 387
Chapter 20 Systems Reliability and Security 389
Hardware 389
Software 391
Changes 392
System Backup 392
Record Keeping and Security 395
Logs 395
Backup Files 397
Restart and Recovery 398
Record Retention 399
Inventories and Lists 400
Chapter 21 Security and Personal Computers 403
Introduction 403
Physical Security 405
Environmental Protection 407
Protection of Removable Media 409
Electromagnetic Emanations 412
Security Attributes of Microprocessors 412
PC Operating Systems 417
Local Area Network (LAN) Security 428
Security in Remote Support Programs 431
Database Security 434
Security in Application Programs 438
Backup 439
Anti Virus Defenses 443
Security Add ons for PC Operating
Systems—Trusted Computer Systems
Evaluation 447
New Thinking in PC Security 453
X Contents •
Conclusion 456
Bibliography 456
PART VI INFORMATION SECURITY RISK ANALYSIS
Chapter 22 Systems Approach to Risk Management 459
Introduction 459
Applications of Risk Analysis 459
IT Security Management 460
Information and Risk Analysis 462
Information Security by Consensus 462 ¦
State of Infosec Risk Analysis 464 !
General Systems Approach 464
Cybernetic Control Cycle 466
Problems in Risk Analysis 466
Cybernetic Model of Activity 467
Representative Risk Analysis Packages 471
Specific Recommendations 473
Chapter 23 Threat Assessment 477
Introduction 477
Properties of Threats 479
Estimating Likelihood 482
Trend Analysis 487
Chapter 24 Assets and Safeguards 491
Assets 491
Vulnerabilities 492
Assets and Impacts 493
Risk Analysis Modeling 493
Cost of Loss Model 497
Safeguards 500
Constraints 502 i
Chapter 25 Keeping Secrets in Computers 505
Threats and Legal Remedies 506
Self Help Measures 509
National Security Models 511
Threat Risk Assessment 539
Chapter 26 Modes of Risk Analysis 547 ;
Compliance Auditing 547
Requirements Analysis 548
Security Inspection and Evaluation 551
Cost Benefit Analysis 553
Life Cycle Software Development 556
Contents xi
Development of Security Software 557
The Workshop Model 558
Transaction Model 562
References for Part VI 569
Appendix: Sample Log Forms 575
Glossary 579
Selected Bibliography 629
Index 635
|
any_adam_object | 1 |
author | Carroll, John Millar 1925- |
author_GND | (DE-588)105097268 |
author_facet | Carroll, John Millar 1925- |
author_role | aut |
author_sort | Carroll, John Millar 1925- |
author_variant | j m c jm jmc |
building | Verbundindex |
bvnumber | BV011268753 |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.37 |
callnumber-search | HF5548.37 |
callnumber-sort | HF 45548.37 |
callnumber-subject | HF - Commerce |
classification_tum | DAT 050f DAT 460f |
ctrlnum | (OCoLC)32589138 (DE-599)BVBBV011268753 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
edition | 3. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01886nam a2200493 c 4500</leader><controlfield tag="001">BV011268753</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20050914 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">970325s1996 d||| |||| 00||| engod</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0750696001</subfield><subfield code="9">0-7506-9600-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)32589138</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV011268753</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HF5548.37</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">20</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Carroll, John Millar</subfield><subfield code="d">1925-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)105097268</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer security</subfield><subfield code="c">John M. Carroll</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">3. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston [u.a.]</subfield><subfield code="b">Butterworth-Heinemann</subfield><subfield code="c">1996</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 648 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing departments</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007566607&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-007566607</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV011268753 |
illustrated | Illustrated |
indexdate | 2024-07-09T18:06:52Z |
institution | BVB |
isbn | 0750696001 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-007566607 |
oclc_num | 32589138 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | XVIII, 648 S. graph. Darst. |
publishDate | 1996 |
publishDateSearch | 1996 |
publishDateSort | 1996 |
publisher | Butterworth-Heinemann |
record_format | marc |
spelling | Carroll, John Millar 1925- Verfasser (DE-588)105097268 aut Computer security John M. Carroll 3. ed. Boston [u.a.] Butterworth-Heinemann 1996 XVIII, 648 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computer crimes Computer security Electronic data processing departments Security measures Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 s DE-604 Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Computerkriminalität (DE-588)4010452-7 s 2\p DE-604 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007566607&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Carroll, John Millar 1925- Computer security Computer crimes Computer security Electronic data processing departments Security measures Computersicherheit (DE-588)4274324-2 gnd Computerkriminalität (DE-588)4010452-7 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4010452-7 (DE-588)4011144-1 |
title | Computer security |
title_auth | Computer security |
title_exact_search | Computer security |
title_full | Computer security John M. Carroll |
title_fullStr | Computer security John M. Carroll |
title_full_unstemmed | Computer security John M. Carroll |
title_short | Computer security |
title_sort | computer security |
topic | Computer crimes Computer security Electronic data processing departments Security measures Computersicherheit (DE-588)4274324-2 gnd Computerkriminalität (DE-588)4010452-7 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Computer crimes Computer security Electronic data processing departments Security measures Computersicherheit Computerkriminalität Datensicherung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007566607&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT carrolljohnmillar computersecurity |