Security engineering: a guide to building dependable distributed systems
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Indianapolis
Wiley
[2020]
|
Ausgabe: | Third edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xlix, 1182 Seiten Diagramme, Illustrationen |
ISBN: | 1119642787 9781119642787 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047104623 | ||
003 | DE-604 | ||
005 | 20240718 | ||
007 | t | ||
008 | 210125s2020 a||| |||| 00||| eng d | ||
020 | |a 1119642787 |9 1-119-64278-7 | ||
020 | |a 9781119642787 |9 978-1-119-64278-7 | ||
035 | |a (OCoLC)1238190070 | ||
035 | |a (DE-599)KXP1735590916 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-384 |a DE-11 |a DE-Aug4 |a DE-20 |a DE-523 |a DE-1051 |a DE-739 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Anderson, Ross |d 1956-2024 |e Verfasser |0 (DE-588)135652715 |4 aut | |
245 | 1 | 0 | |a Security engineering |b a guide to building dependable distributed systems |c Ross Anderson |
250 | |a Third edition | ||
264 | 1 | |a Indianapolis |b Wiley |c [2020] | |
264 | 4 | |c © 2020 | |
300 | |a xlix, 1182 Seiten |b Diagramme, Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Verteiltes System |0 (DE-588)4238872-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Verteiltes System |0 (DE-588)4238872-7 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-119-64283-1 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-119-64281-7 |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032510927&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032510927 |
Datensatz im Suchindex
_version_ | 1806232437361999872 |
---|---|
adam_text |
Contents Preface to the Third Edition Preface to the Second Edition Preface to the First Edition For my daughter, and other lawyers. xxxvii xli xliii xlvii xlix Foreword Part) Chapter 1 What Is Security Engineering? 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 Chapter 2 Introduction A framework Example 1 - a bank Example 2 - a military base Example 3 - a hospital Example 4 - the home Definitions Summary 3 3 4 6 7 8 10 11 16 Who Is the Opponent? 17 2.1 2.2 17 19 19 19 20 21 22 Introduction Spies 2.2.1 The Five Eyes 2.2.1.1 Prism 2.2.1.2 Tempora 2.2.1.3 Muscular 2.2.1.4 Special collection XV
xvi Contents Contents Chapter 3 2.2.1.5 Bullrun and Edgehill 2.2.1.6 Xkeyscore 2.2.1.7 Longhaul 2.2.1.8 Quantum 2.2.1.9 CNE 2.2.1.10 The analyst's viewpoint 2.2.1.11 Offensive operations 2.2.1.12 Attack scaling 2.2.2 China 2.2.3 Russia 2.2.4 The rest 2.2.5 Attribution 2.3 Crooks 2.3.1 Criminal infrastructure 2.3.1.1 Botnet herders 2.3.1.2 Malware devs 2.3.1.3 Spam senders 2.3.1.4 Bulk account compromise 2.3.1.5 Targeted attackers 2.3.1.6 Cashout gangs 2.3.1.7 Ransomware 2.3.2 Attacks on banking and payment systems 2.3.3 Sectoral cybercrime ecosystems 2.3.4 Internal attacks 2.3.5 CEO crimes 2.3.6 Whistleblowers 2.4 Geeks 2.5 The swamp 2.5.1 Hacktivism and hate campaigns 2.5.2 Child sex abuse material 2.5.3 School and workplace bullying 2.5.4 Intimate relationship abuse 2.6 Summary Research problems Further reading 22 23 24 25 25 27 28 29 30 35 38 40 41 42 42 44 45 45 46 46 47 47 49 49 49 50 52 53 54 55 57 57 59 60 61 Psychology and Usability 63 3.1 3.2 63 64 65 68 Introduction Insights from psychology research 3.2.1 Cognitive psychology 3.2.2 Gender, diversity and interpersonal variation Social psychology 3.2.3.1 Authority and its abuse 3.2.3.2 The bystander effect 3.2.4 The social-brain theory of deception 3.2.5 Heuristics, biases and behavioural economics 3.2.5.1 Prospect theory and risk misperception 3.2.5.2 Present bias and hyperbolic discounting 3.2.5.3 Defaults and nudges 3.2.5.4 The default to intentionality 3.2.5.5 The affect heuristic 3.2.5.6 Cognitive dissonance 3.2.5.7 The risk thermostat Deception in practice 3.3.1 The salesman and the scamster 3.3.2 Social
engineering 3.3.3 Phishing 3.3.4 Opsec 3.3.5 Deception research Passwords 3.4.1 Password recovery 3.4.2 Password choice 3.4.3 Difficulties with reliable password entry 3.4.4 Difficulties with remembering the password 3.4.4.1 Naïve choice 3.4.4.2 User abilities and training 3.4.4.3 Design errors 3.4.4.4 Operational failures 3.4.4.5 Social-engineering attacks 3.4.4.6 Customer education 3.4.4.7 Phishing warnings 3.4.5 System issues 3.4.6 Can you deny service? 3.4.7 Protecting oneself or others? 3.4.8 Attacks on password entry 3.4.8.1 Interface design 3.4.8.2 Trusted path, and bogus terminals 3.4.8.3 Technical defeats of password retry counters 3.4.9 Attacks on password storage 3.4.9.1 One-way encryption 3.4.9.2 Password cracking 3.4.9.3 Remote password checking 3.2.3 3.3 3.4 70 71 72 73 76 77 78 79 79 80 81 81 81 82 84 86 88 89 90 92 94 94 95 96 96 98 100 101 102 103 104 105 105 106 106 107 i10/ HQ 108 10? 109 109 xvii
xviii Contents Contents 3.5 3.6 Chapter 4 110 111 113 115 116 117 118 Protocols 119 4.1 4.2 4.3 119 120 122 124 128 129 132 133 134 135 136 137 137 138 139 141 141 143 143 144 4.4 4.5 4.6 4.7 4.8 4.9 Chapter 5 3.4.10 Absolute limits 3.4.11 Using a password manager 3.4.12 Will we ever get rid of passwords? CAPTCHAs Summary Research problems Further reading Introduction Password eavesdropping risks Who goes there? - simple authentication 4.3.1 Challenge and response 4.3.2 Two-factor authentication 4.3.3 The MIG-in-the-middle attack 4.3.4 Reflection attacks Manipulating the message Changing the environment Chosen protocol attacks Managing encryption keys 4.7.1 The resurrecting duckling 4.7.2 Remote key management 4.7.3 The Needham-Schroeder protocol 4.7.4 Kerberos 4.7.5 Practical key management Design assurance Summary Research problems Further reading Cryptography 145 5.1 5.2 145 146 147 148 150 152 154 155 157 157 158 159 161 5.3 Introduction Historical background 5.2.1 An early stream cipher - the Vigenère 5.2.2 The one-time pad 5.2.3 An early block cipher - Playfair 5.2.4 Hash functions 5.2.5 Asymmetric primitives Security models 5.3.1 Random functions - hash functions 5.3.1.1 Properties 5.3.1.2 The birthday theorem 5.3.2 Random generators - stream ciphers 5.3.3 Random permutations - block ciphers ?! 1 Public key encryption and trapdoor one-way permutations 5.3.5 Digital signatures 5.4 Symmetric crypto algorithms 5.4.1 SP-networks 5.4.1.1 Block size 5.4.1.2 Number of rounds 5.4.1.3 Choice of S-boxes 5.4.1.4 Linear cryptanalysis 5.4.1.5 Differential cryptanalysis 5.4.2 The
Advanced Encryption Standard (AES) 5.4.3 Feistel ciphers 5.4.3.1 The Luby-Rackoff result 5.4.3.2 DES 5.5 Modes of operation 5.5.1 How not to use a block cipher 5.5.2 Cipher block chaining 5.5.3 Counter encryption 5.5.4 Legacy stream cipher modes 5.5.5 Message authentication code 5.5.6 Galois counter mode 5.5.7 XTS 5.6 Hash functions 5.6.1 Common hash functions 5.6.2 Hash function applications - HMAC, commitments and updating 5.7 Asymmetric crypto primitives 5.7.1 Cryptography based on factoring 5.7.2 Cryptography based on discrete logarithms 5.7.2.1 One-way commutative encryption 5.7.2.2 Diffie-Hellman key establishment 5.7.2.3 ElGamal digital signature and DSA 5.7.3 Elliptic curve cryptography 5.7.4 Certification authorities 5.7.5 TLS 5.7.5.1 TLS uses 5.7.5.2 TLS security 5.7.5.3 TLS 1.3 5.7.6 Other public-key protocols 5.7.6.1 Code signing 5.7.6.2 PGP/GPG 5.7.6.3 QUIC 5.7.7 Special-purpose primitives 5.3.4 163 164 165 165 166 166 167 167 168 169 171 173 173 175 176 177 178 178 179 180 180 181 181 183 185 185 188 189 190 192 193 194 195 196 196 197 197 197 198 199 199 xix
XX Contents Contents How strong are asymmetric cryptographic primitives? 5.7.9 What else goes wrong Summary Research problems Further reading 5.7.8 5.8 Chapter 6 Access Control 207 6.1 6.2 207 209 210 211 212 214 215 217 217 218 219 222 222 223 224 225 227 228 230 231 232 234 236 237 238 239 240 240 6.3 6.4 6.5 Chapter 7 200 202 203 204 204 Introduction Operating system access controls 6.2.1 Groups and roles 6.2.2 Access control lists 6.2.3 Unix operating system security 6.2.4 Capabilities 6.2.5 DAC and MAC 6.2.6 Apple's macOS 6.2.7 iOS 6.2.8 Android 6.2.9 Windows 6.2.10 Middleware 6.2.10.1 Database access controls 6.2.10.2 Browsers 6.2.11 Sandboxing 6.2.12 Virtualisation Hardware protection 6.3.1 Intel processors 6.3.2 Arm processors What goes wrong 6.4.1 Smashing the stack 6.4.2 Other technical attacks 6.4.3 User interface failures 6.4.4 Remedies 6.4.5 Environmental creep Summary Research problems Further reading Distributed Systems 243 7.1 7.2 243 244 245 246 247 248 Introduction Concurrency 7.2.1 Using old data versus paying to propagate state 7.2.2 Locking to prevent inconsistent updates 7.2.3 The order of updates 7.2.4 Deadlock Chapter 8 7.2.5 Non-convergent state 7.2.6 Secure time 7.3 Fault tolerance and failure recovery 7.3.1 Failure models 7.3.1.1 Byzantine failure 7.3.1.2 Interaction with fault tolerance 7.3.2 What is resilience for? 7.3.3 At what level is the redundancy? 7.3.4 Service-denial attacks 7.4 Naming 7.4.1 The Needham naming principles 7.4.2 What else goes wrong 7.4.2.1 Naming and identity 7.4.2.2 Cultural assumptions 7.4.2.3 Semantic content of names
7.4.2.4 Uniqueness of names 7.4.2.5 Stability of names and addresses 7.4.2.6 Restrictions on the use of names 7.4.3 Types of name 7.5 Summary Research problems Further reading 249 250 251 252 252 253 254 255 257 259 260 263 264 265 267 268 269 269 270 271 272 273 Economics 275 8.1 Introduction 8.2 Classical economics 8.2.1 Monopoly 8.3 Information economics 8.3.1 Why information markets are different 8.3.2 The value of lock-in 8.3.3 Asymmetric information 8.3.4 Public goods 8.4 Game theory 8.4.1 The prisoners' dilemma 8.4.2 Repeated and evolutionary games 8.5 Auction theory 8.6 The economics of security and dependability 8.6.1 Why is Windows so insecure? 8.6.2 Managing the patching cycle 8.6.3 Structural models of attack and defence 8.6.4 The economics of lock-in, tying and DRM 8.6.5 Antitrust law and competition policy 8.6.6 Perversely motivated guards 275 276 278 281 281 282 284 285 286 287 288 291 293 294 296 298 300 302 304 xxi
xxii Contents Contents 8.7 8.6.7 Economics of privacy 8.6.8 Organisations and human behaviour 8.6.9 Economics of cybercrime Summary Research problems Further reading 305 307 308 310 [ 311 311 Part II Chapter 9 Multilevel Security 9.1 9.2 9.3 Chapter 10 315 Introduction What is a security policy model? Multilevel security policy 9.3.1 The Anderson report 9.3.2 The Bell-LaPadula model 9.3.3 The standard criticisms of Bell-LaPadula 9.3.4 The evolution of MLS policies 9.3.5 The Biba model 9.4 Historical examples of MLS systems 9.4.1 SCOMP 9.4.2 Data diodes 9.5 MAC: from MLS to IFC and integrity 9.5.1 Windows 9.5.2 SELinux 9.5.3 Embedded systems 9.6 What goes wrong 9.6.1 Composability 9.6.2 The cascade problem 9.6.3 Covert channels 9.6.4 The threat from malware 9.6.5 Polyinstantiation 9.6.6 Practical problems with MLS 9.7 Summary Research problems Further reading 315 316 318 319 320 321 323 325 326 326 327 329 329 330 330 331 331 332 333 333 334 335 337 338 339 Boundaries 341 10.1 10.2 10.3 10.4 341 344 346 349 351 353 356 Introduction Compartmentation and the lattice model Privacy for tigers Health record privacy 10.4.1 The threat model 10.4.2 The BMA security policy 10.4.3 First practical steps Chapter 11 Chapter 12 10.4.4 What actually goes wrong 10.4.4.1 Emergency care 10.4.4.2 Resilience 10.4.4.3 Secondary uses 10.4.5 Confidentiality - the future 10.4.6 Ethics 10.4.7 Social care and education 10.4.8 The Chinese Wall 10.5 Summary Research problems Further reading 357 358 359 359 362 365 367 369 371 372 373 Inference Control 375 11.1 Introduction 11.2 The early history of
inference control 11.2.1 The basic theory of inference control 11.2.1.1 Query set size control 11.2.1.2 Trackers 11.2.1.3 Cell suppression 11.2.1.4 Other statistical disclosure control mechanisms 11.2.1.5 More sophisticated query controls 11.2.1.6 Randomization 11.2.2 Limits of classical statistical security 11.2.3 Active attacks 11.2.4 Inference control in rich medical data 11.2.5 The third wave: preferences and search 11.2.6 The fourth wave: location and social 11.3 Differential privacy 11.4 Mind the gap? 11.4.1 Tactical anonymity and its problems 11.4.2 Incentives 11.4.3 Alternatives 11.4.4 The dark side 11.5 Summary Research problems Further reading 375 377 378 378 379 379 Banking and Bookkeeping 405 12.1 Introduction 12.2 Bookkeeping systems 12.2.1 Double-entry bookkeeping 12.2.2 Bookkeeping in banks 12.2.3 The Clark-Wilson security policy model 405 406 408 408 410 380 381 382 383 384 385 388 389 392 394 395 398 399 400 401 402 402 xxiii
xxvi Contents xxvii Contents Chapter 15 Chapter 16 14.6 Summary Research problems Further reading 526 527 527 Nuclear Command and Control 15.1 Introduction 15.2 The evolution of command and control 15.2.1 The Kennedy memorandum 15.2.2 Authorization, environment, intent 15.3 Unconditionally secure authentication 15.4 Shared control schemes 15.5 Tamper resistance and PALs 15.6 Treaty verification 15.7 What goes wrong 15.7.1 Nuclear accidents 15.7.2 Interaction with cyberwar 15.7.3 Technical failures 15.8 Secrecy or openness? 15.9 Summary Research problems Further reading 529 Security Printing and Seals 16.1 Introduction 16.2 History 16.3 Security printing 16.3.1 Threat model 16.3.2 Security printing techniques 16.4 Packaging and seals 16.4.1 Substrate properties 16.4.2 The problems of glue 16.4.3 PIN mailers 16.5 Systemic vulnerabilities 16.5.1 Peculiarities of the threat model 16.5.2 Anti-gundecking measures 16.5.3 The effect of random failure 16.5.4 Materials control 16.5.5 Not protecting the right things 16.5.6 The cost and nature of inspection 16.6 Evaluation methodology 16.7 Summary Research problems Further reading 529 532 532 534 534 536 538 540 541 541 542 543 544 545 546 546 Chapter 17 17.1 17.2 17.3 17.4 17.5 17.6 17.7 17.8 17.9 Chapter 18 Introduction Handwritten signatures Face recognition Fingerprints 17.4.1 Verifying positive or negative identity claims 17.4.2 Crime scene forensics Iris codes Voice recognition and morphing Other systems What goes wrong Summary Research problems Further reading 571 572 575 579 581 584 588 590 591 593 596 597 597 599 18.1
Tntroduction 599 601 601 607 609 609 610 611 621 624 628 630 History Hardware security modules Evaluation Smartcards and other security chips 18.5.1 History 18.5.2 Architecture 18.5.3 Security evolution 18.5.4 Random number generators and PUFs 18.5.5 Larger chips 18.5.6 The state of the art 18.6 The residual risk 18.6.1 The trusted interface problem 18.6.2 Conflicts 18.6.3 The lemons market, risk dumping and evaluation games 18.6.4 Security-by-obscurity 18.6.5 Changing environments 18.7 So what should one protect? 18.8 Summary Research problems Further reading Chapter 19 571 Tamper Resistance 18.2 18.3 18.4 18.5 549 549 550 551 552 553 557 558 558 559 560 562 563 564 564 565 566 567 569 569 570 Biometrics Side Channels 19.1 Introduction 19.2 Emission security 19.2.1 History 19.2.2 Technical surveillance and countermeasures 63U 631 632 632 633 634 636 636 636 639 639 640 641 642
Contents xxviii Contents Chapter 20 19.3 Passive attacks 19.3.1 Leakage through power and signal cables 19.3.2 Leakage through RF signals 19.3.3 What goes wrong 19.4 Attacks between and within computers 19.4.1 Timing analysis 19.4.2 Power analysis 19.4.3 Glitching and differential fault analysis 19.4.4 Rowhammer, CLKscrew and Plundervolt 19.4.5 Meltdown, Spectre and other enclave side channels 19.5 Environmental side channels 19.5.1 Acoustic side channels 19.5.2 Optical side channels 19.5.3 Other side-channels 19.6 Social side channels 19.7 Summary Research problems Further reading 645 645 645 649 650 651 652 655 656 657 659 659 661 661 663 663 664 664 Advanced Cryptographic Engineering 667 20.1 20.2 20.3 20.4 20.5 20.6 20.7 20.8 20.9 Introduction Full-disk encryption Signal Tor HSMs 20.5.1 The xor-to-null-key attack 20.5.2 Attacks using backwards compatibility and time-memory tradeoffs 20.5.3 Differential protocol attacks 20.5.4 The EMV attack 20.5.5 Hacking the HSMs in CAs and clouds 20.5.6 Managing HSM risks Enclaves Blockchains 20.7.1 Wallets 20.7.2 Miners 20.7.3 Smart contracts 20.7.4 Off-chain payment mechanisms 20.7.5 Exchanges, cryptocrime and regulation 20.7.6 Permissioned blockchains Crypto dreams that failed Summary Research problems Further reading Chapter 21 1 667 668 670 674 677 677 678 679 681 681 681 682 685 688 689 689 691 692 695 695 696 698 698 Chapter 22 Network Attack and Defence 699 21.1 Introduction 21.2 Network protocols and service denial 21.2.1 BGP security 21.2.2 DNS security 21.2.3 UDP, TCP, SYN floods and SYN reflection 21.2.4 Other amplifiers
21.2.5 Other denial-of-service attacks 21.2.6 Email - from spies to spammers 21.3 The malware menagerie - Trojans, worms and RATs 21.3.1 Early history of malware 21.3.2 The Internet worm 21.3.3 Further malware evolution 21.3.4 How malware works 21.3.5 Countermeasures 21.4 Defense against network attack 21.4.1 Filtering: firewalls, censorware and wiretaps 21.4.1.1 Packet filtering 21.4.1.2 Circuit gateways 21.4.1.3 Application proxies 21.4.1.4 Ingress versus egress filtering 21.4.1.5 Architecture 21.4.2 Intrusion detection 21.4.2.1 Types of intrusion detection 21.4.2.2 General limitations of intrusion detection 21.4.2.3 Specific problems detecting network attacks 21.5 Cryptography: the ragged boundary 21.5.1 SSH 21.5.2 Wireless networking at the periphery 21.5.2.1 WiFi 21.5.2.2 Bluetooth 21.5.2.3 HomePlug 21.5.2.4 VPNs 21.6 CAs and PKI 21.7 Topology 21.8 Summary Research problems Further reading 699 701 701 703 704 705 706 706 708 709 710 711 713 714 715 717 718 718 719 719 720 722 722 724 Phones 737 22.1 Introduction 22.2 Attacks on phone networks 737 738 724 725 726 727 727 728 729 729 730 733 734 734 735 xxix
XXX _ Contents Contents _ _ _ _ Chapter 23 22.2.1 Attacks on phone-call metering 22.2.2 Attacks on signaling 22.2.3 Attacks on switching and configuration 22.2.4 Insecure end systems 22.2.5 Feature interaction 22.2.6 VOIP 22.2.7 Frauds by phone companies 22.2.8 Security economics of telecomms 22.3 Going mobile 22.3.1 GSM 22.3.2 3G 22.3.3 4G 22.3.4 5G and beyond 22.3.5 General MNO failings 22.4 Platform security 22.4.1 The Android app ecosystem 22.4.1.1 App markets and developers 22.4.1.2 Bad Android implementations 22.4.1.3 Permissions 22.4.1.4 Android malware 22.4.1.5 Ads and third-party services 22.4.1.6 Pre-installed apps 22.4.2 Apple's app ecosystem 22.4.3 Cross-cutting issues 22.5 Summary Research problems Further reading 739 742 743 745 746 747 748 749 750 751 755 757 758 760 761 763 764 764 766 767 768 770 770 774 775 776 776 Electronic and Information Warfare 777 23.1 Introduction 23.2 Basics 23.3 Communications systems 23.3.1 Signals intelligence techniques 23.3.2 Attacks on communications 23.3.3 Protection techniques 23.3.3.1 Frequency hopping 23.3.3.2 DSSS 23.3.3.3 Burst communications 23.3.3.4 Combining covertness and jam resistance 23.3.4 Interaction between civil and military uses 23.4 Surveillance and target acquisition 23.4.1 Types of radar 777 778 779 781 784 785 786 787 788 789 790 791 792 23.5 23.6 23.7 23.8 I 1 23.9 ! ; Chapter 24 23.4.2 Jamming techniques 23.4.3 Advanced radars and countermeasures 23.4.4 Other sensors and multisensor issues IFF
systems Improvised explosive devices Directed energy weapons Information warfare 23.8.1 Attacks on control systems 23.8.2 Attacks on other infrastructure 23.8.3 Attacks on elections and political stability 23.8.4 Doctrine Summary Research problems Further reading 793 795 796 797 800 802 803 805 808 809 811 812 813 813 Copyright and DRM 815 24.1 Introduction 24.2 Copyright 24.2.1 Software 24.2.2 Free software, free culture? 24.2.3 Books and music 24.2.4 Video and pay-TV 24.2.4.1 Typical system architecture 24.2.4.2 Video scrambling techniques 24.2.4.3 Attacks on hybrid scrambling systems 24.2.4.4 DVB 24.2.5 DVD 24.3 DRM on general-purpose computers 24.3.1 Windows media rights management 24.3.2 FairPlay, HTML5 and other DRM systems 24.3.3 Software obfuscation 24.3.4 Gaming, cheating, and DRM 24.3.5 Peer-to-peer systems 24.3.6 Managing hardware design rights 24.4 Information hiding 24.4.1 Watermarks and copy generation management 24.4.2 General information hiding techniques 24.4.3 Attacks on copyright marking schemes 24.5 Policy 24.5.1 The IP lobby 24.5.2 Who benefits? 24.6 Accessory control 815 817 817 823 827 828 829 830 832 836 837 838 839 840 841 843 845 847 848 849 849 851 854 857 859 860 xxxi
xxxii Contents xxxiii Contents Chapter 25 24.7 Summary Research problems Further reading 862 862 863 New Directions? 865 25.1 Introduction 25.2 Autonomous and remotely-piloted vehicles 25.2.1 Drones 25.2.2 Self-driving cars 25.2.3 The levels and limits of automation 25.2.4 How to hack a self-driving car 25.3 AI / ML 25.3.1 ML and security 25.3.2 Attacks on ML systems 25.3.3 ML and society 25.4 PETS and operational security 25.4.1 Anonymous messaging devices 25.4.2 Social support 25.4.3 Living off the land 25.4.4 Putting it all together 25.4.5 The name's Bond. James Bond 25.5 Elections 25.5.1 The history of voting machines 25.5.2 Hanging chads 25.5.3 Optical scan 25.5.4 Software independence 25.5.5 Why electronic elections are hard 25.6 Summary Research problems Further reading 865 866 866 867 869 872 874 875 876 879 882 885 887 890 891 893 895 896 896 898 899 900 904 904 905 Surveillance or Privacy? 909 26.1 Introduction 26.2 Surveillance 26.2.1 The history of government wiretapping 26.2.2 Call data records (CDRs) 26.2.3 Search terms and location data 26.2.4 Algorithmic processing 26.2.5 ISPs and CSPs 26.2.6 The Five Eyes' system of systems 26.2.7 The crypto wars 26.2.7.1 The back story to crypto policy 26.2.7.2 DES and crypto research 909 912 912 916 919 920 921 922 925 926 927 Part III Chapter 26 26.3 26.4 26.5 26.6 26.7 26.8 Chapter 27 26.2.7.3 Crypto War 1 - the Clipper chip 26.2.7.4 Crypto War 2 - going spotty 26.2.8 Export control Terrorism 26.3.1 Causes of political violence 26.3.2 The psychology of political violence 26.3.3 The role of institutions 26.3.4 The
democratic response Censorship 26.4.1 Censorship by authoritarian regimes 26.4.2 Filtering, hate speech and radicalisation Forensics and rules of evidence 26.5.1 Forensics 26.5.2 Admissibility of evidence 26.5.3 What goes wrong Privacy and data protection 26.6.1 European data protection 26.6.2 Privacy regulation in the USA 26.6.3 Fragmentation? Freedom of information Summary Research problems Further reading 928 931 934 936 936 937 938 940 941 942 944 948 948 950 951 953 953 956 958 960 961 962 962 Secure Systems Development 965 27.1 Introduction 27.2 Risk management 27.3 Lessons from safety-critical systems 27.3.1 Safety engineering methodologies 27.3.2 Hazard analysis 27.3.3 Fault trees and threat trees 27.3.4 Failure modes and effects analysis 27.3.5 Threat modelling 27.3.6 Quantifying risks 27.4 Prioritising protection goals 27.5 Methodology 27.5.1 Top-down design 27.5.2 Iterative design: from spiral to agile 27.5.3 The secure development lifecycle 27.5.4 Gated development 27.5.5 Software as a Service 27.5.6 From DevOps to DevSecOps 27.5.6.1 The Azure ecosystem 965 966 969 970 971 971 972 973 975 978 980 981 983 985 987 988 991 991
xxxiv Contents Chapter 28 Contents 27.5.6.2 The Google ecosystem 27.5.6.3 Creating a learning system 27.5.7 The vulnerability cycle 27.5.7.1 The CVE system 27.5.7.2 Coordinated disclosure 27.5.7.3 Security incident and event management 27.5.8 Organizational mismanagement of risk 27.6 Managing the team 27.6.1 Elite engineers 27.6.2 Diversity 27.6.3 Nurturing skills and attitudes 27.6.4 Emergent properties 27.6.5 Evolving your workflow 27.6.6 And finally. 27.7 Summary Research problems Further reading 992 994 995 997 998 999 1000 1004 1004 1005 1007 1008 1008 1010 1010 1011 1012 Assurance and Sustainability 1015 ’ 28.1 Introduction 28.2 Evaluation 28.2.1 Alarms and locks 28.2.2 Safety evaluation regimes 28.2.3 Medical device safety 28.2.4 Aviation safety 28.2.5 The Orange book 28.2.6 FIPS 140 and HSMs 28.2.7 The common criteria 28.2.7.1 The gory details 28.2.7.2 What goes wrong with the Common Criteria 28.2.7.3 Collaborative protection profiles 28.2.8 The 'Principle of Maximum Complacency' 28.2.9 Next steps 28.3 Metrics and dynamics of dependability 28.3.1 Reliability growth models 28.3.2 Hostile review 28.3.3 Free and open-source software 28.3.4 Process assurance 28.4 The entanglement of safety and security 28.4.1 The electronic safety and security of cars 28.4.2 Modernising safety and security regulation 28.4.3 The Cybersecurity Act 2019 1015 1018 1019 1019 1020 1023 1025 ! 1026 1026 1027 1029 1031 1032 1034 1036 1036 1039 1040 1042 1044 1046 1049 1050 Chapter 29 1 1 § 0 28.5 Sustainability 28.5.1 The Sales of goods directive 28.5.2 New research directions 28.6 Summary
Research problems Further reading 1051 1052 1053 1056 1057 1058 Beyond "Computer Says No" 1059 Bibliography 1061 Index 1143 XXXV |
adam_txt | |
any_adam_object | 1 |
any_adam_object_boolean | |
author | Anderson, Ross 1956-2024 |
author_GND | (DE-588)135652715 |
author_facet | Anderson, Ross 1956-2024 |
author_role | aut |
author_sort | Anderson, Ross 1956-2024 |
author_variant | r a ra |
building | Verbundindex |
bvnumber | BV047104623 |
classification_rvk | ST 276 ST 277 |
ctrlnum | (OCoLC)1238190070 (DE-599)KXP1735590916 |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | Third edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV047104623</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240718</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">210125s2020 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119642787</subfield><subfield code="9">1-119-64278-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119642787</subfield><subfield code="9">978-1-119-64278-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1238190070</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1735590916</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Anderson, Ross</subfield><subfield code="d">1956-2024</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)135652715</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security engineering</subfield><subfield code="b">a guide to building dependable distributed systems</subfield><subfield code="c">Ross Anderson</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Third edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xlix, 1182 Seiten</subfield><subfield code="b">Diagramme, Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-119-64283-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-119-64281-7</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032510927&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032510927</subfield></datafield></record></collection> |
id | DE-604.BV047104623 |
illustrated | Illustrated |
index_date | 2024-07-03T16:24:09Z |
indexdate | 2024-08-02T00:11:24Z |
institution | BVB |
isbn | 1119642787 9781119642787 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032510927 |
oclc_num | 1238190070 |
open_access_boolean | |
owner | DE-384 DE-11 DE-Aug4 DE-20 DE-523 DE-1051 DE-739 |
owner_facet | DE-384 DE-11 DE-Aug4 DE-20 DE-523 DE-1051 DE-739 |
physical | xlix, 1182 Seiten Diagramme, Illustrationen |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Wiley |
record_format | marc |
spelling | Anderson, Ross 1956-2024 Verfasser (DE-588)135652715 aut Security engineering a guide to building dependable distributed systems Ross Anderson Third edition Indianapolis Wiley [2020] © 2020 xlix, 1182 Seiten Diagramme, Illustrationen txt rdacontent n rdamedia nc rdacarrier Verteiltes System (DE-588)4238872-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Verteiltes System (DE-588)4238872-7 s DE-604 Erscheint auch als Online-Ausgabe 978-1-119-64283-1 Erscheint auch als Online-Ausgabe 978-1-119-64281-7 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032510927&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Anderson, Ross 1956-2024 Security engineering a guide to building dependable distributed systems Verteiltes System (DE-588)4238872-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4238872-7 (DE-588)4274324-2 |
title | Security engineering a guide to building dependable distributed systems |
title_auth | Security engineering a guide to building dependable distributed systems |
title_exact_search | Security engineering a guide to building dependable distributed systems |
title_exact_search_txtP | Security engineering a guide to building dependable distributed systems |
title_full | Security engineering a guide to building dependable distributed systems Ross Anderson |
title_fullStr | Security engineering a guide to building dependable distributed systems Ross Anderson |
title_full_unstemmed | Security engineering a guide to building dependable distributed systems Ross Anderson |
title_short | Security engineering |
title_sort | security engineering a guide to building dependable distributed systems |
title_sub | a guide to building dependable distributed systems |
topic | Verteiltes System (DE-588)4238872-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Verteiltes System Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032510927&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT andersonross securityengineeringaguidetobuildingdependabledistributedsystems |