|
Part I Introduction to Traditional Computer Network Security |
|
|
|
1 Computer Network Fundamentals |
|
|
3 | (38) |
|
|
3 | (1) |
|
1.2 Computer Network Models |
|
|
4 | (1) |
|
1.3 Computer Network Types |
|
|
5 | (1) |
|
1.3.1 Local Area Networks (LANs) |
|
|
5 | (1) |
|
1.3.2 Wide Area Networks (WANs) |
|
|
6 | (1) |
|
1.3.3 Metropolitan Area Networks (MANs) |
|
|
6 | (1) |
|
1.4 Data Communication Media Technology |
|
|
6 | (7) |
|
1.4.1 Transmission Technology |
|
|
7 | (3) |
|
|
10 | (3) |
|
|
13 | (3) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
1.6 Network Connectivity and Protocols |
|
|
16 | (6) |
|
1.6.1 Open System Interconnection (OSI) Protocol Suite |
|
|
18 | (1) |
|
1.6.2 Transmission Control Protocol/Internet Protocol (TCP/IP) Model |
|
|
19 | (3) |
|
|
22 | (4) |
|
1.7.1 Connection Services |
|
|
22 | (2) |
|
1.7.2 Network Switching Services |
|
|
24 | (2) |
|
1.8 Network Connecting Devices |
|
|
26 | (8) |
|
1.8.1 LAN Connecting Devices |
|
|
26 | (2) |
|
1.8.2 Internetworking Devices |
|
|
28 | (6) |
|
|
34 | (5) |
|
|
34 | (2) |
|
|
36 | (3) |
|
|
39 | (1) |
|
|
39 | (2) |
|
|
40 | (1) |
|
2 Computer Network Security Fundamentals |
|
|
41 | (20) |
|
|
41 | (3) |
|
|
43 | (1) |
|
|
43 | (1) |
|
2.1.3 Information Security |
|
|
43 | (1) |
|
2.2 Securing the Computer Network |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
44 | (4) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (13) |
|
2.4.1 Security Standards Based on Type of Service/Industry |
|
|
49 | (3) |
|
2.4.2 Security Standards Based on Size/Implementation |
|
|
52 | (1) |
|
2.4.3 Security Standards Based on Interests |
|
|
53 | (1) |
|
2.4.4 Security Best Practices |
|
|
53 | (4) |
|
|
57 | (4) |
|
Part II Security Issues and Challenges in the Traditional Computer Network |
|
|
|
3 Security Threats and Threat Motives to Computer Networks |
|
|
61 | (26) |
|
|
61 | (1) |
|
3.2 Sources of Security Threats |
|
|
62 | (17) |
|
|
63 | (1) |
|
3.2.2 Weaknesses in Network Infrastructure and Communication Protocols |
|
|
63 | (3) |
|
3.2.3 Rapid Growth of Cyberspace |
|
|
66 | (1) |
|
3.2.4 The Growth of the Hacker Community |
|
|
67 | (11) |
|
3.2.5 Vulnerability in Operating System Protocol |
|
|
78 | (1) |
|
3.2.6 The Invisible Security Threat: The Insider Effect |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
3.3 Security Threat Motives |
|
|
79 | (3) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
3.3.4 Targeting the National Information Infrastructure |
|
|
81 | (1) |
|
|
81 | (1) |
|
3.3.6 Hate (National Origin, Gender, and Race) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
82 | (1) |
|
3.4 Security Threat Management |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
3.5 Security Threat Correlation |
|
|
83 | (1) |
|
3.5.1 Threat Information Quality |
|
|
84 | (1) |
|
3.6 Security Threat Awareness |
|
|
84 | (3) |
|
|
86 | (1) |
|
4 Introduction to Computer Network Vulnerabilities |
|
|
87 | (18) |
|
|
87 | (1) |
|
4.2 Sources of Vulnerabilities |
|
|
87 | (13) |
|
|
88 | (3) |
|
4.2.2 Poor Security Management |
|
|
91 | (1) |
|
4.2.3 Incorrect Implementation |
|
|
92 | (1) |
|
4.2.4 Internet Technology Vulnerability |
|
|
93 | (2) |
|
4.2.5 Changing Nature of Hacker Technologies and Activities |
|
|
95 | (1) |
|
4.2.6 Difficulty of Fixing Vulnerable Systems |
|
|
96 | (1) |
|
4.2.7 Limits of Effectiveness of Reactive Solutions |
|
|
97 | (1) |
|
|
98 | (2) |
|
4.3 Vulnerability Assessment |
|
|
100 | (5) |
|
4.3.1 Vulnerability Assessment Services |
|
|
100 | (1) |
|
4.3.2 Advantages of Vulnerability Assessment Services |
|
|
101 | (2) |
|
|
103 | (2) |
|
5 Cyber Crimes and Hackers |
|
|
105 | (28) |
|
|
105 | (1) |
|
|
106 | (4) |
|
5.2.1 Ways of Executing Cybercrimes |
|
|
107 | (2) |
|
|
109 | (1) |
|
|
110 | (18) |
|
|
110 | (3) |
|
|
113 | (4) |
|
|
117 | (3) |
|
|
120 | (4) |
|
5.3.5 Hackers' Tools of System Exploitation |
|
|
124 | (3) |
|
|
127 | (1) |
|
5.4 Dealing with the Rising Tide of Cybercrimes |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
129 | (4) |
|
|
130 | (3) |
|
6 Scripting and Security in Computer Networks and Web Browsers |
|
|
133 | (14) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
134 | (3) |
|
6.3.1 Server-Side Scripting Languages |
|
|
135 | (1) |
|
6.3.2 Client-Side Scripting Languages |
|
|
135 | (2) |
|
6.4 Scripting in Computer Network |
|
|
137 | (3) |
|
6.4.1 Introduction to the Common Gateway Interface (CGI) |
|
|
138 | (2) |
|
6.4.2 Server-Side Scripting: The CGI Interface |
|
|
140 | (1) |
|
6.5 Computer Networks Scripts and Security |
|
|
140 | (4) |
|
6.5.1 CGI Script Security |
|
|
141 | (2) |
|
6.5.2 JavaScript and VBScript Security |
|
|
143 | (1) |
|
6.5.3 Web Script Security |
|
|
144 | (1) |
|
6.6 Dealing with the Script Security Problems |
|
|
144 | (3) |
|
|
145 | (2) |
|
7 Security Assessment, Analysis, and Assurance |
|
|
147 | (28) |
|
|
147 | (1) |
|
7.2 System Security Policy |
|
|
148 | (3) |
|
7.3 Building a Security Policy |
|
|
151 | (6) |
|
7.3.1 Security Policy Access Rights Matrix |
|
|
151 | (2) |
|
7.3.2 Policy and Procedures |
|
|
153 | (4) |
|
7.4 Security Requirements Specification |
|
|
157 | (1) |
|
7.5 Threat Identification |
|
|
158 | (3) |
|
|
158 | (1) |
|
|
159 | (1) |
|
7.5.3 Infrastructure Failures |
|
|
159 | (2) |
|
|
161 | (2) |
|
7.6.1 Approaches to Security Threat Analysis |
|
|
162 | (1) |
|
7.7 Vulnerability Identification and Assessment |
|
|
163 | (3) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
7.7.4 Policies, Procedures, and Practices |
|
|
165 | (1) |
|
7.8 Security Certification |
|
|
166 | (2) |
|
7.8.1 Phases of a Certification Process |
|
|
167 | (1) |
|
7.8.2 Benefits of Security Certification |
|
|
167 | (1) |
|
7.9 Security Monitoring and Auditing |
|
|
168 | (2) |
|
|
168 | (1) |
|
7.9.2 Type of Data Gathered |
|
|
169 | (1) |
|
7.9.3 Analyzed Information |
|
|
169 | (1) |
|
|
170 | (1) |
|
7.10 Products and Services |
|
|
170 | (5) |
|
|
171 | (4) |
|
Part III Dealing with Computer Network Security Challenges |
|
|
|
|
175 | (12) |
|
|
175 | (2) |
|
8.1.1 Categories of Disasters |
|
|
176 | (1) |
|
|
177 | (2) |
|
|
179 | (1) |
|
|
179 | (4) |
|
8.4.1 Planning for a Disaster Recovery |
|
|
180 | (1) |
|
8.4.2 Procedures of Recovery |
|
|
181 | (2) |
|
8.5 Make Your Business Disaster Ready |
|
|
183 | (1) |
|
8.5.1 Always Be Ready for a Disaster |
|
|
183 | (1) |
|
8.5.2 Always Back Up Media |
|
|
184 | (1) |
|
|
184 | (1) |
|
8.6 Resources for Disaster Planning and Recovery |
|
|
184 | (3) |
|
8.6.1 Local Disaster Resources |
|
|
184 | (2) |
|
|
186 | (1) |
|
9 Access Control and Authorization |
|
|
187 | (20) |
|
|
187 | (1) |
|
|
188 | (6) |
|
9.2.1 Access Control Techniques and Technologies |
|
|
189 | (5) |
|
9.3 Access Control Systems |
|
|
194 | (5) |
|
9.3.1 Physical Access Control |
|
|
194 | (1) |
|
|
194 | (1) |
|
9.3.3 Electronic Surveillance |
|
|
195 | (1) |
|
|
196 | (3) |
|
|
199 | (1) |
|
|
199 | (2) |
|
9.4.1 Authorization Mechanisms |
|
|
200 | (1) |
|
9.5 Types of Authorization Systems |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
202 | (1) |
|
9.6 Authorization Principles |
|
|
202 | (1) |
|
|
203 | (1) |
|
9.6.2 Separation of Duties |
|
|
203 | (1) |
|
9.7 Authorization Granularity |
|
|
203 | (1) |
|
9.7.1 Fine-Grained Authorization |
|
|
204 | (1) |
|
9.7.2 Coarse-Grained Authorization |
|
|
204 | (1) |
|
9.8 Web Access and Authorization |
|
|
204 | (3) |
|
|
206 | (1) |
|
|
207 | (20) |
|
|
207 | (1) |
|
10.2 Multiple Factors and Effectiveness of Authentication |
|
|
208 | (2) |
|
10.3 Authentication Elements |
|
|
210 | (2) |
|
10.3.1 Person or Group Seeking Authentication |
|
|
210 | (1) |
|
10.3.2 Distinguishing Characteristics for Authentication |
|
|
211 | (1) |
|
|
211 | (1) |
|
10.3.4 The Authentication Mechanism |
|
|
211 | (1) |
|
10.3.5 Access Control Mechanism |
|
|
212 | (1) |
|
10.4 Types of Authentication |
|
|
212 | (2) |
|
10.4.1 Nonrepudiable Authentication |
|
|
213 | (1) |
|
10.4.2 Repudiable Authentication |
|
|
213 | (1) |
|
10.5 Authentication Methods |
|
|
214 | (9) |
|
10.5.1 Password Authentication |
|
|
214 | (3) |
|
10.5.2 Public Key Authentication |
|
|
217 | (3) |
|
10.5.3 Remote Authentication |
|
|
220 | (2) |
|
10.5.4 Anonymous Authentication |
|
|
222 | (1) |
|
10.5.5 Digital Signature-Based Authentication |
|
|
222 | (1) |
|
10.5.6 Wireless Authentication |
|
|
223 | (1) |
|
10.6 Developing an Authentication Policy |
|
|
223 | (4) |
|
|
225 | (2) |
|
|
227 | (24) |
|
|
227 | (3) |
|
|
229 | (1) |
|
11.2 Symmetric Encryption |
|
|
230 | (4) |
|
11.2.1 Symmetric Encryption Algorithms |
|
|
232 | (1) |
|
11.2.2 Problems with Symmetric Encryption |
|
|
233 | (1) |
|
11.3 Public Key Encryption |
|
|
234 | (4) |
|
11.3.1 Public Key Encryption Algorithms |
|
|
236 | (1) |
|
11.3.2 Problems with Public Key Encryption |
|
|
237 | (1) |
|
11.3.3 Public Key Encryption Services |
|
|
237 | (1) |
|
11.4 Enhancing Security: Combining Symmetric and Public Key Encryptions |
|
|
238 | (1) |
|
11.5 Key Management: Generation, Transportation, and Distribution |
|
|
238 | (7) |
|
11.5.1 The Key Exchange Problem |
|
|
238 | (1) |
|
11.5.2 Key Distribution Centers (KDCs) |
|
|
239 | (2) |
|
11.5.3 Public Key Management |
|
|
241 | (2) |
|
|
243 | (2) |
|
11.6 Public Key Infrastructure (PKI) |
|
|
245 | (1) |
|
|
245 | (1) |
|
11.6.2 Certificate Authority |
|
|
246 | (1) |
|
11.6.3 Registration Authority (RA) |
|
|
246 | (1) |
|
11.6.4 Lightweight Directory Access Protocols (LDAP) |
|
|
246 | (1) |
|
11.6.5 Role of Cryptography in Communication |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
247 | (4) |
|
|
250 | (1) |
|
|
251 | (24) |
|
|
251 | (3) |
|
|
254 | (10) |
|
12.2.1 Packet Inspection Firewalls |
|
|
255 | (5) |
|
12.2.2 Application Proxy Server: Filtering Based on Known Services |
|
|
260 | (3) |
|
12.2.3 Virtual Private Network (VPN) Firewalls |
|
|
263 | (1) |
|
12.2.4 Small Office or Home (SOHO) Firewalls |
|
|
263 | (1) |
|
12.3 Configuration and Implementation of a Firewall |
|
|
264 | (3) |
|
12.4 The Demilitarized Zone (DMZ) |
|
|
267 | (2) |
|
12.4.1 Scalability and Increasing Security in a DMZ |
|
|
269 | (1) |
|
12.5 Improving Security Through the Firewall |
|
|
269 | (1) |
|
|
270 | (2) |
|
12.7 Firewall Services and Limitations |
|
|
272 | (3) |
|
|
272 | (1) |
|
12.7.2 Limitations of Firewalls |
|
|
272 | (2) |
|
|
274 | (1) |
|
13 System Intrusion Detection and Prevention |
|
|
275 | (28) |
|
|
275 | (1) |
|
|
275 | (3) |
|
13.2.1 The System Intrusion Process |
|
|
276 | (1) |
|
13.2.2 The Dangers of System Intrusions |
|
|
277 | (1) |
|
13.3 Intrusion Detection Systems (IDSs) |
|
|
278 | (4) |
|
|
279 | (2) |
|
|
281 | (1) |
|
13.4 Types of Intrusion Detection Systems |
|
|
282 | (8) |
|
13.4.1 Network-Based Intrusion Detection Systems (NIDSs) |
|
|
282 | (5) |
|
13.4.2 Host-Based Intrusion Detection Systems (HIDS) |
|
|
287 | (2) |
|
13.4.3 The Hybrid Intrusion Detection System |
|
|
289 | (1) |
|
13.5 The Changing Nature of IDS Tools |
|
|
290 | (1) |
|
13.6 Other Types of Intrusion Detection Systems |
|
|
290 | (2) |
|
13.6.1 System Integrity Verifiers (SIVs) |
|
|
290 | (1) |
|
13.6.2 Log File Monitors (LFM) |
|
|
290 | (1) |
|
|
291 | (1) |
|
13.7 Response to System Intrusion |
|
|
292 | (2) |
|
13.7.1 Incident Response Team |
|
|
293 | (1) |
|
13.7.2 IDS Logs as Evidence |
|
|
293 | (1) |
|
13.8 Challenges to Intrusion Detection Systems |
|
|
294 | (1) |
|
13.8.1 Deploying IDS in Switched Environments |
|
|
294 | (1) |
|
13.9 Implementing an Intrusion Detection System |
|
|
295 | (1) |
|
13.10 Intrusion Prevention Systems (IPSs) |
|
|
295 | (4) |
|
13.10.1 Network-Based Intrusion Prevention Systems (NIPSs) |
|
|
295 | (2) |
|
13.10.2 Host-Based Intrusion Prevention Systems (HIPSs) |
|
|
297 | (2) |
|
13.11 Intrusion Detection Tools |
|
|
299 | (4) |
|
|
300 | (3) |
|
14 Computer and Network Forensics |
|
|
303 | (28) |
|
|
303 | (1) |
|
|
304 | (15) |
|
14.2.1 History of Computer Forensics |
|
|
305 | (1) |
|
14.2.2 Elements of Computer Forensics |
|
|
306 | (1) |
|
14.2.3 Investigative Procedures |
|
|
307 | (6) |
|
14.2.4 Analysis of Evidence |
|
|
313 | (6) |
|
|
319 | (6) |
|
14.3.1 Intrusion Analysis |
|
|
320 | (4) |
|
|
324 | (1) |
|
|
325 | (6) |
|
14.4.1 Computer Forensic Tools |
|
|
325 | (2) |
|
14.4.2 Network Forensic Tools |
|
|
327 | (1) |
|
|
328 | (3) |
|
15 Virus and Content Filtering |
|
|
331 | (20) |
|
|
331 | (1) |
|
15.2 Scanning, Filtering, and Blocking |
|
|
331 | (5) |
|
|
332 | (1) |
|
15.2.2 Inclusion Filtering |
|
|
332 | (1) |
|
15.2.3 Exclusion Filtering |
|
|
333 | (1) |
|
15.2.4 Other Types of Content Filtering |
|
|
333 | (2) |
|
15.2.5 Location of Content Filters |
|
|
335 | (1) |
|
|
336 | (7) |
|
|
336 | (7) |
|
|
343 | (4) |
|
15.4.1 Application-Level Filtering |
|
|
344 | (1) |
|
15.4.2 Packet-Level Filtering and Blocking |
|
|
345 | (1) |
|
|
346 | (1) |
|
|
347 | (4) |
|
|
350 | (1) |
|
16 Standardization and Security Criteria: Security Evaluation of Computer Products |
|
|
351 | (14) |
|
|
351 | (1) |
|
16.2 Product Standardization |
|
|
352 | (1) |
|
16.2.1 Need for Standardization of (Security) Products |
|
|
352 | (1) |
|
16.2.2 Common Computer Product Standards |
|
|
353 | (1) |
|
16.3 Security Evaluations |
|
|
353 | (5) |
|
16.3.1 Purpose of Security Evaluation |
|
|
354 | (1) |
|
16.3.2 Security Evaluation Criteria |
|
|
355 | (1) |
|
16.3.3 Basic Elements of an Evaluation |
|
|
356 | (1) |
|
|
356 | (2) |
|
16.4 Major Security Evaluation Criteria |
|
|
358 | (5) |
|
16.4.1 Common Criteria (CC) |
|
|
358 | (1) |
|
|
359 | (1) |
|
16.4.3 The Orange Book/TCSEC |
|
|
359 | (3) |
|
16.4.4 Information Technology Security Evaluation Criteria (ITSEC) |
|
|
362 | (1) |
|
16.4.5 The Trusted Network Interpretation (TNI): The Red Book |
|
|
362 | (1) |
|
16.5 Does Evaluation Mean Security? |
|
|
363 | (2) |
|
|
364 | (1) |
|
17 Computer Network Security Protocols |
|
|
365 | (32) |
|
|
365 | (1) |
|
17.2 Application-Level Security |
|
|
366 | (14) |
|
17.2.1 Remote Authentication Dial-In User Service (RADIUS) |
|
|
367 | (1) |
|
17.2.2 Terminal Access Controller Access Control System (TACACS+) |
|
|
368 | (1) |
|
17.2.3 Pretty Good Privacy (PGP) |
|
|
369 | (2) |
|
17.2.4 Secure/Multipurpose Internet Mail Extension (S/MIME) |
|
|
371 | (1) |
|
17.2.5 Secure HTTP (S-HTTP) |
|
|
372 | (3) |
|
17.2.6 Hypertext Transfer Protocol over Secure Socket Layer (HTTPS) |
|
|
375 | (1) |
|
17.2.7 Secure Electronic Transactions (SET) |
|
|
375 | (2) |
|
|
377 | (3) |
|
17.3 Security in the Transport Layer |
|
|
380 | (5) |
|
17.3.1 Secure Socket Layer (SSL) |
|
|
380 | (4) |
|
17.3.2 Transport Layer Security (TLS) |
|
|
384 | (1) |
|
17.4 Security in the Network Layer |
|
|
385 | (8) |
|
17.4.1 Internet Protocol Security (IPsec) |
|
|
385 | (4) |
|
17.4.2 Virtual Private Networks (VPN) |
|
|
389 | (3) |
|
17.4.3 VPN Tunneling Technology, PPTP, and L2TP |
|
|
392 | (1) |
|
17.5 Security in the Physical Layer |
|
|
393 | (4) |
|
17.5.1 Point-to-Point Protocol (PPP) |
|
|
393 | (2) |
|
17.5.2 Other Network Physical Layer Security Protocols Include |
|
|
395 | (1) |
|
|
396 | (1) |
|
18 Security in Wireless Networks and Devices |
|
|
397 | (32) |
|
|
397 | (1) |
|
18.2 Types of Wireless Broadband Networks |
|
|
398 | (14) |
|
18.2.1 Wireless Personal Area Networks (WPANs) |
|
|
398 | (3) |
|
18.2.2 Wireless Local Area Networks (WLANs) (Wi-Fi) |
|
|
401 | (1) |
|
|
401 | (7) |
|
18.2.4 4G (LTE) and 5G: Enhancing Mobile Broadband |
|
|
408 | (1) |
|
18.2.5 Mobile Cellular Network |
|
|
408 | (4) |
|
18.3 Development of Cellular Technology |
|
|
412 | (2) |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
413 | (1) |
|
18.3.4 Fourth Generation (4G/LTE) |
|
|
414 | (1) |
|
18.4 Other Features of Mobile Cellular Technology |
|
|
414 | (2) |
|
|
414 | (1) |
|
|
415 | (1) |
|
18.4.3 Quality of Service (QoS) |
|
|
415 | (1) |
|
|
415 | (1) |
|
18.4.5 Mobile Cellular Security Protocol Stack |
|
|
415 | (1) |
|
18.5 Security Vulnerabilities in Cellular Wireless Networks |
|
|
416 | (13) |
|
18.5.1 WLAN Security Concerns |
|
|
418 | (6) |
|
18.5.2 Best Practices for Wi-Fi Security |
|
|
424 | (2) |
|
|
426 | (3) |
|
19 Security in Sensor Networks |
|
|
429 | (16) |
|
|
429 | (1) |
|
19.2 The Growth of Sensor Networks |
|
|
430 | (1) |
|
19.3 Design Factors in Sensor Networks |
|
|
431 | (4) |
|
|
431 | (3) |
|
|
434 | (1) |
|
|
434 | (1) |
|
|
434 | (1) |
|
|
434 | (1) |
|
19.3.6 Nature of Hardware Deployed |
|
|
434 | (1) |
|
19.3.7 Topology of Sensor Networks |
|
|
435 | (1) |
|
19.3.8 Transmission Media |
|
|
435 | (1) |
|
19.4 Security in Sensor Networks |
|
|
435 | (4) |
|
19.4.1 Security Challenges |
|
|
435 | (1) |
|
19.4.2 Sensor Network Vulnerabilities and Attacks |
|
|
436 | (2) |
|
19.4.3 Securing Sensor Networks |
|
|
438 | (1) |
|
19.5 Security Mechanisms and Best Practices for Sensor Networks |
|
|
439 | (1) |
|
19.6 Trends in Sensor Network Security Research |
|
|
440 | (5) |
|
|
440 | (1) |
|
|
441 | (1) |
|
19.6.3 Confidentiality, Authentication, and Freshness |
|
|
442 | (1) |
|
19.6.4 Resilience to Capture |
|
|
442 | (1) |
|
|
443 | (2) |
|
20 Other Efforts to Secure Data in Computer Networks and Beyond |
|
|
445 | (12) |
|
|
445 | (1) |
|
|
445 | (1) |
|
|
446 | (1) |
|
|
447 | (1) |
|
20.4.1 Hardware-Based Self-Regulation |
|
|
447 | (1) |
|
20.4.2 Software-Based Self-Regulation |
|
|
448 | (1) |
|
|
448 | (2) |
|
|
449 | (1) |
|
|
450 | (1) |
|
|
450 | (1) |
|
|
451 | (1) |
|
|
451 | (6) |
|
|
451 | (1) |
|
|
452 | (1) |
|
|
453 | (4) |
|
Part IV The Emergence of the Digital and Social Network Ecosystem |
|
|
|
21 Virtualization Technology and Security |
|
|
457 | (20) |
|
|
457 | (1) |
|
21.2 History of Virtualization |
|
|
458 | (1) |
|
21.3 Virtualization Terminologies |
|
|
459 | (1) |
|
21.3.1 Host CPU/Guest CPU |
|
|
459 | (1) |
|
|
459 | (1) |
|
|
460 | (1) |
|
|
460 | (1) |
|
21.4 Types of Computing System Virtualization |
|
|
460 | (10) |
|
21.4.1 Platform Virtualization |
|
|
460 | (8) |
|
21.4.2 Network Virtualization |
|
|
468 | (1) |
|
21.4.3 Storage Virtualization |
|
|
469 | (1) |
|
21.4.4 Application Virtualization |
|
|
469 | (1) |
|
21.5 The Benefits of Virtualization |
|
|
470 | (3) |
|
21.5.1 Reduction of Server Sprawl |
|
|
470 | (1) |
|
21.5.2 Conservation of Energy |
|
|
470 | (1) |
|
21.5.3 Reduced IT Management Costs |
|
|
470 | (1) |
|
21.5.4 Better Disaster Recovery Management |
|
|
470 | (1) |
|
21.5.5 Software Development Testing and Verification |
|
|
471 | (1) |
|
21.5.6 Isolation of Legacy Applications |
|
|
471 | (1) |
|
21.5.7 Cross-Platform Support |
|
|
471 | (1) |
|
21.5.8 Minimizing Hardware Costs |
|
|
471 | (1) |
|
21.5.9 Faster Server Provisioning |
|
|
471 | (1) |
|
21.5.10 Better Load Balancing |
|
|
472 | (1) |
|
21.5.11 Reduce the Data Center Footprint |
|
|
472 | (1) |
|
|
472 | (1) |
|
21.5.13 Isolate Applications |
|
|
472 | (1) |
|
21.5.14 Extend the Life of Older Applications |
|
|
472 | (1) |
|
21.6 Virtualization Infrastructure Security |
|
|
473 | (4) |
|
21.6.1 Hypervisor Security |
|
|
473 | (1) |
|
21.6.2 Securing Communications Between Desktop and Virtual Infrastructure |
|
|
474 | (1) |
|
21.6.3 Security of Communication Between Virtual Machines |
|
|
474 | (1) |
|
21.6.4 Threats and Vulnerabilities Originating from a VM |
|
|
474 | (1) |
|
|
475 | (2) |
|
22 Cloud Computing Technology and Security |
|
|
477 | (26) |
|
|
477 | (1) |
|
22.2 Cloud Computing Infrastructure Characteristics |
|
|
478 | (2) |
|
22.3 Cloud Computing Service Models |
|
|
480 | (2) |
|
22.4 Cloud Computing Deployment Models |
|
|
482 | (1) |
|
22.5 Virtualization and Cloud Computing |
|
|
482 | (1) |
|
22.6 Benefits of Cloud Computing |
|
|
483 | (3) |
|
22.7 Cloud Computing, Power Consumption and Environmental Issues |
|
|
486 | (1) |
|
22.8 Cloud Computing Security, Reliability, Availability, and Compliance Issues |
|
|
487 | (16) |
|
22.8.1 Cloud Computing Actors, Their Roles, and Responsibilities |
|
|
488 | (2) |
|
22.8.2 Security of Data and Applications in the Cloud |
|
|
490 | (6) |
|
22.8.3 Security of Data in Transition: Cloud Security Best Practices |
|
|
496 | (1) |
|
22.8.4 Service-Level Agreements (SLAs) |
|
|
496 | (1) |
|
|
497 | (1) |
|
22.8.6 Web Access Point Security |
|
|
497 | (1) |
|
|
497 | (3) |
|
|
500 | (3) |
|
23 Mobile Systems and Corresponding Intractable Security Issues |
|
|
503 | (14) |
|
|
503 | (1) |
|
23.2 Current Major Mobile Operating Systems |
|
|
504 | (1) |
|
23.3 Security in the Mobile Ecosystems |
|
|
504 | (5) |
|
23.3.1 Application-Based Threats |
|
|
506 | (1) |
|
|
507 | (1) |
|
|
507 | (1) |
|
|
508 | (1) |
|
23.3.5 Operating System-Based Threats |
|
|
508 | (1) |
|
23.4 General Mobile Devices Attack Types |
|
|
509 | (2) |
|
23.5 Mitigation of Mobile Devices Attacks |
|
|
511 | (3) |
|
23.5.1 Mobile Device Encryption |
|
|
513 | (1) |
|
23.5.2 Mobile Remote Wiping |
|
|
513 | (1) |
|
23.5.3 Mobile Passcode Policy |
|
|
514 | (1) |
|
23.6 Users Role in Securing Mobile Devices |
|
|
514 | (3) |
|
|
515 | (2) |
|
24 Internet of Things (IoT): Growth, Challenges, and Security |
|
|
517 | (18) |
|
|
517 | (2) |
|
24.2 Overview and Growth of Internet of Things |
|
|
519 | (1) |
|
24.3 Architecture and Networking of IoT |
|
|
520 | (5) |
|
24.3.1 Architecture and Protocol Stack of IoTs |
|
|
520 | (3) |
|
24.3.2 Challenges of Using TCP/IP Architecture over the IoT |
|
|
523 | (2) |
|
24.4 IoT Governance, Privacy, and Security Challenges |
|
|
525 | (10) |
|
24.4.1 Governance and Privacy Concerns |
|
|
526 | (1) |
|
24.4.2 Security Challenges |
|
|
527 | (1) |
|
|
527 | (1) |
|
24.4.4 Computational Constraints |
|
|
528 | (1) |
|
|
528 | (1) |
|
24.4.6 Trust Relationships |
|
|
529 | (1) |
|
|
530 | (5) |
|
Part V Securing the Last Frontiers --- The Home Front |
|
|
|
25 Conquering the Last Frontier in the Digital Invasion: The Home Front |
|
|
535 | (16) |
|
|
535 | (1) |
|
25.2 The Changing Home Network and Hotspots |
|
|
536 | (5) |
|
|
536 | (1) |
|
25.2.2 Wireless Home Networks |
|
|
537 | (3) |
|
25.2.3 Types of Broadband Internet Connections |
|
|
540 | (1) |
|
25.2.4 Smart Home Devices |
|
|
541 | (1) |
|
25.3 Data and Activities in the Home LAN |
|
|
541 | (2) |
|
|
541 | (1) |
|
|
542 | (1) |
|
25.3.3 Banking and Investment Data |
|
|
542 | (1) |
|
|
542 | (1) |
|
25.3.5 Home Monitoring and Security Devices |
|
|
542 | (1) |
|
25.4 Threats to the Home and Home LAN |
|
|
543 | (8) |
|
25.4.1 Most Common Threats to Homes and Home LANs |
|
|
544 | (1) |
|
25.4.2 Actions to Safeguard the Family LAN |
|
|
544 | (1) |
|
25.4.3 Using Encryption to Protect the Family LAN |
|
|
545 | (1) |
|
25.4.4 Protecting the Family LAN with Known Protocols |
|
|
546 | (2) |
|
|
548 | (3) |
|
Part VI Hands-On Projects |
|
|
|
|
551 | (12) |
|
|
551 | (1) |
|
26.2 Part 1: Case Studies |
|
|
551 | (1) |
|
26.3 Part 2: Weekly/Biweekly Laboratory Assignments |
|
|
552 | (3) |
|
26.4 Part 3: Semester Projects |
|
|
555 | (3) |
|
26.4.1 Intrusion Detection Systems |
|
|
555 | (3) |
|
26.4.2 Scanning Tools for System Vulnerabilities |
|
|
558 | (1) |
|
26.5 The Following Tools Are Used to Enhance Security in Web Applications |
|
|
558 | (1) |
|
26.5.1 Public Key Infrastructure |
|
|
558 | (1) |
|
26.6 Part 4: Research Projects |
|
|
559 | (4) |
|
|
559 | (1) |
|
26.6.2 Specialized Security |
|
|
559 | (1) |
|
26.6.3 Protecting an Extended Network |
|
|
559 | (1) |
|
26.6.4 Automated Vulnerability Reporting |
|
|
560 | (1) |
|
26.6.5 Turn-Key Product for Network Security Testing |
|
|
560 | (1) |
|
26.6.6 The Role of Local Networks in the Defense of the National Critical Infrastructure |
|
|
560 | (1) |
|
26.6.7 Enterprise VPN Security |
|
|
560 | (1) |
|
26.6.8 Perimeter Security |
|
|
561 | (1) |
|
26.6.9 Enterprise Security |
|
|
561 | (1) |
|
26.6.10 Password Security: Investigating the Weaknesses |
|
|
561 | (2) |
Index |
|
563 | |