Chapter 1 Is There a Security Problem in Computing?
1.1 What Does "Secure" Mean?
Protecting Valuables
Characteristics of Computer Intrusion
1.2 Attacks
Vulnerabilities, Threats, Attacks, and Controls
Method, Opportunity, and Motive
1.3 The Meaning of Computer Security
Security Goals
Vulnerabilities
1.4 Computer Criminals
Amateurs
Crackers or Malicious Hackers
Career Criminals
Terrorists
1.5 Methods of Defense
Controls
Effectiveness of Controls
1.6 What's Next
Encryption Overview
Hardware and Software Security
Human Controls in Security
Encryption In-Depth
1.7 Summary
1.8 Terms and Concepts
1.9 Where the Field Is Headed
1.10 To Learn More
1.11 Exercises
Chapter 2 Elementary Cryptography
2.1 Terminology and Background
Terminology
Representing Characters
2.2 Substitution Ciphers
The Caesar Cipher
Other Substitutions
One-Time Pads
Summary of Substitutions
2.3 Transpositions (Permutations)
Columnar Transpositions
Combinations of Approaches
2.4 Making "Good" Encryption Algorithms
What Makes a "Secure" Encryption Algorithm?
Symmetric and Asymmetric Encryption Systems
Stream and Block Ciphers
Confusion and Diffusion
Cryptanaly$is--Breaking Encryption Schemes
2.5 The Data Encryption Standard
Background and History
Overview of the DES Algorithm
Double and Triple DES
Security of the DES
2.6 The AES Encryption Algorithm
The AES Contest
Overview of Rijndael
Strength of the Algorithm
Comparison of DES and AES
2.7 Public Key Encryption
Motivation
Characteristics
Rivest-Shamir-Adelman (RSA) Encryption
……
Chapter 3 Program Security
Chapter 4 Protection in General-Purpose Operating Systems
Chapter 5 Designing Trusted Operating Systems
Chapter 6 Database and Data Mining Security
Chapter 7 Security in Networks
Chapter 8 Administering Security
Chapter 9 The Economics of Cybersecurity
Chapter 10 Privacy in Computing
Chapter 11 Legal and Ethical Issues in Computer Security
Chapter 12 Cryptography Explained