Elements of Computer Security (Undergraduate Topics in Computer Science)

Elements of Computer Security (Undergraduate Topics in Computer Science)

Language: English

Pages: 375

ISBN: 0857290053

Format: PDF / Kindle (mobi) / ePub


As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.

Developed from the author's successful Springer guide to Foundations of Computer Security, this accessible textbook/reference is fully updated and enhanced with resources for students and tutors.

Topics and features: examines the physical security of computer hardware, networks, and digital data; introduces the different forms of rogue software (or malware), discusses methods for preventing and defending against malware, and describes a selection of viruses, worms and Trojans in detail; investigates the important threats to network security, and explores the subjects of authentication, spyware, and identity theft; discusses issues of privacy and trust in the online world, including children's privacy and safety; includes appendices which discuss the definition, meaning, and history of the term hacker, introduce the language of "l33t Speak", and provide a detailed virus timeline; provides numerous exercises and examples throughout the text, in addition to a Glossary of terms used in the book; supplies additional resources at the associated website, http://www.DavidSalomon.name/, including an introduction to cryptography, and answers to the exercises.

Clearly and engagingly written, this concise textbook is an ideal resource for undergraduate classes on computer security. The book is mostly non-mathematical, and is suitable for anyone familiar with the basic concepts of computers and computations.

Kernel Learning Algorithms for Face Recognition

Understanding Operating Systems (6th Edition)

Introduction to Theoretical Computer Science (Series in Computer Science, Volume 23)

Computational Intelligence in Image Processing

Network Warrior (2nd Edition)

Computer Science Illuminated

 

 

 

 

 

 

 

 

 

 

 

 

unsolicited email don’t trust any links in it, even if they seem familiar and legitimate. If you want to take advantage of offers from an organization, find its URL, type it manually, and send a message (instead of responding to the offer) to verify the offer. Back up my hard drive? How do I put it in reverse? —Anonymous 7 Network Security 7.1 Internet Vulnerabilities A network vulnerability is an inherent weakness in the design, implementation, or use of a hardware component or a software

country, can propagate quickly, infect a vast number of computers within hours, and cause economic damage in the billions (of Dollars, Euros, or whatever currency is affected). Today, computers are responsible for the distribution of electrical power and for routing telephone conversations. They store information on passenger and cargo flights, on large cash transfers between banks, and on military plans, to name just a few crucial applications. It is generally agreed that a well-organized attack

may get bored with it and a bored security worker is a potentially 1.3 Laptop Security 29 dangerous worker. The third security management principle is to have every security-related task performed by an employee and then checked by another person. This way, no task becomes the sole responsibility of one person. This principle allows one person to find mistakes (and also sabotage) made by another. It slows down the overall work, but improves security. Duty is what one expects from others.

virus starts looking for applications called ERIC and VULT. These were two programs written by EDS (electronic data systems) for in-house use. If a user launches one of those programs, the virus stops it after 25 minutes. Seven days after infection, the virus crashes any of the two applications when they execute and try to write to disk. Apparently this virus was written by a disgruntled employee. It also first appeared in EDS’ Dallas, Texas o⌅ce, causing users there to experience slow execution,

stack. If this item is an address inside the memory area of F , the activity monitor is satisfied and it returns to the break routine which in turn returns to F . ⌅ Exercise 6.4: Why does the activity monitor check the second item in the stack and not the item at the top of the stack? An activity monitor also wants to make sure that any sensitive operation in the computer is being carried out by the operating system and not by a virus mimicking operating system routines. Again, special hardware

Download sample

Download