White-Hat Security Arsenal: Tackling the Threats
暫譯: 白帽子安全武器庫:應對威脅

Aviel D. Rubin

  • 出版商: Addison Wesley
  • 出版日期: 2001-07-01
  • 定價: $1,650
  • 售價: 5.0$825
  • 語言: 英文
  • 頁數: 368
  • 裝訂: Paperback
  • ISBN: 0201711141
  • ISBN-13: 9780201711141
  • 相關分類: 資訊安全
  • 立即出貨(限量)

買這商品的人也買了...

相關主題

商品描述

 

Description

 

A leading security authority provides a fresh problem-solving approach to security. This arsenal of security techniques provides an explanation of what the real threats are. Aviel Rubin covers every day security issues that every student should know as they move onto the real world - eg. storing data securely, secure data transfer, protecting a network perimeter, online interaction and commerce...each of these are broken down into specific problems and their solutions.

Back to Top


Appropriate Courses



Back to Top

 

Features

  •  

Back to Top

 

Table Of Contents

 

Foreword.
Preface.

 

 

I: IS THERE REALLY A THREAT?

 

 

 

1. Shrouded in Secrecy.
2. Computer Security Risks.

 

What Is at Risk.
Data, Time, and Money.
Confidentiality.
Privacy.
Resource Availability.

Why Risks Exist.
Buggy Code.
The User.
Poor Administration.

Exploiting Risks.
Moving On.


3. The Morris Worm Meets the Love Bug: Computer Viruses and Worms.

 

Terminology.
A Touch of History.
The Morris Worm.
When It Hit and What It Did.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.

Melissa.
When It Hit and What It Did.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.

CIH Chernobyl.
When It Hit and What It Did.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.

Happy.
When It Hit and What It Did.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.

Worm.ExploreZip.
When It Hit and What It Did.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.

Bubbleboy.
When It Hit and What It Did.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.

Babylonia.
When It Hit and What It Did.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.

The Love Bug.
When It Hit and What It Did.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.

Summary.
 

II: STORING DATA SECURELY.

 

 


4. Local Storage.

 

 

Physical Security.
Cryptographic Security.
What Can Be Achieved with Cryptography.
Cryptography Is Not Enough.
Basic Encryption and Data Integrity.

Protecting Data with Passwords.
Graphical Passwords.

Cryptographic File Systems.
Case Studies.
CFS.
PGPDisk.
EFS in Windows 2000.

Further Reading.


5. Remote Storage.

 

 

Remote Storage.
NFS Security.
Adding Security.
User Authentication.
Strengthening Passwords.
Access Control Lists and Capabilities.

AFS.
Case Study.
Pathnames.

Further Reading.


6. Secure Backup.

 

 

Secure Backups.
Physical Security.
Backup over a Network.
Key Granularity.
Backup Products.
@backup.
BitSTOR.
Secure Backup Systems.
BackJack.
Datalock.
NetMass SystemSafe.
Saf-T-Net.
Safeguard Interactive.
Veritas Telebackup.

Deleting Backups.
Case Study.
The Client Software.
Incremental Backups.

Further Reading.
 

III: SECURE DATA TRANSFER.

 

 


7. Setting up a Long-Term Association.

 

 

What Is Identity?
Identity in Cyberspace.
Exchanging Public Keys in Person.
Certification Authorities.
Public Key Certificates.

Certificate Hierarchies.
Long-Term Relationships within an Organization.
Global Trust Register.
Revocation.
Long-Term Relationships in the Wild.
Managing Private Keys.
Symmetric Keys.
Case Study.
Summary.
Further Reading.


8. Deriving Session Keys.

 

 

Long-Term Keys Are Not Enough.
What Are Session Keys?
Key Exposure.
Perfect Forward Secrecy.
Security Associations.

Picking a Random Key.
Session Keys from Symmetric Long-Term Keys.
Kerberos.
Another Approach.

Session Keys from Long-Term Public Keys.
Diffie-Hellman Key Exchange.
Session Keys in SSL.

Protocol Design and Analysis.
Case Study.
Clogging Attacks.
ISAKMP Exchanges.
Key Refreshment.
Primes in OAKLEY.

Further Reading.


9. Communicating Securely After Key Setup.

 

 

Protecting Information.
Encryption.
Authentication.

Which Layer Is Best for Security?
Encapsulation.
The Link Layer.
The Network Layer.
The Transport Layer.
The Application Layer.

Replay Prevention.
Case Study.
ESP.
AH.

Further Reading.
 

IV: PROTECTING AGAINST NETWORK THREATS.

 

 


10. Protecting a Network Perimeter.

 

 

Insiders and Outsiders.
Network Perimeter.
Benefits of Firewalls.
Types of Firewalls.
Packet Filters.
Application-Level Gateways.

Using the Firewall.
Configuring Rules.
Web Server Placement.

Exit Control.
Remote Access8.
Logging in Directly.
Dial-up Access.
VPN Access.
Web-Only Access.

Case Study.
Further Reading.


11. Defending against Attacks.

 

 

Bad Guys.
Mapping.
Attacks.
Denial of Service.

Defense.
Defending against Mapping.
Monitoring the Traffic.
Intrusion Detection.
Defense against DDOS.
Other Tools.

Case Study.
Further Reading.
 

V: COMMERCE AND PRIVACY.

 

 


12. Protecting E-Commerce Transactions.

 

 

Credit Cards on the Web.
The SSL Protocol.
Protocol Overview.
Configuring a Browser.
Configuring a Server.
Security.
Performance.
Caching.

Case Study.
How Passport Works.
Risks of Passport.

Further Reading.


13. Protecting Privacy.

 

 

Online Privacy.
What Is at Risk?
E-Mail Privacy.
Protecting E-Mail with Cryptography.
Anonymous E-Mail.

How Is Personal Privacy Compromised?
Direct Methods.
Indirect Methods.

Defense Mechanisms and Countermeasures.
Protecting Data on Your Machine.
Protecting Credit Card Information.
Safeguarding Your Browsing History.
Hiding Your Surfing.
Posting Anonymously to the Web.

Case Study.
Summary.
Further Reading.


Glossary.
Bibliography.
Index. 0201711141T01 001.


Back to Top

 

 

商品描述(中文翻譯)

描述

一位領先的安全專家提供了一種全新的問題解決方法來應對安全問題。這一系列的安全技術解釋了真正的威脅是什麼。Aviel Rubin 涵蓋了每位學生在進入現實世界時應該了解的日常安全問題,例如:安全地存儲數據、安全數據傳輸、保護網絡邊界、在線互動和商務……每一個問題都被細分為具體的問題及其解決方案。

適合的課程

特點

目錄

前言
序言

I: 真的有威脅嗎?

1. 笼罩在秘密之中。
2. 計算機安全風險。

風險所在。
數據、時間和金錢。
保密性。
隱私。
資源可用性。

風險存在的原因。
有缺陷的代碼。
用戶。
管理不善。

利用風險。
繼續前進。

3. 莫里斯蠕蟲與愛情病毒:計算機病毒和蠕蟲。

術語。
歷史簡介。
莫里斯蠕蟲。

何時發生及其影響。
如何及為何運作。
後果。
我們如何恢復。
所學到的教訓。

梅莉莎。

何時發生及其影響。
如何及為何運作。
後果。
我們如何恢復。
所學到的教訓。

CIH 切爾諾貝利。

何時發生及其影響。
如何及為何運作。
後果。
我們如何恢復。
所學到的教訓。

快樂病毒。

何時發生及其影響。
如何及為何運作。
後果。
我們如何恢復。
所學到的教訓。

Worm.ExploreZip。

何時發生及其影響。
如何及為何運作。
後果。
我們如何恢復。
所學到的教訓。

Bubbleboy。

何時發生及其影響。
如何及為何運作。
後果。
我們如何恢復。
所學到的教訓。

Babylonia。

何時發生及其影響。
如何及為何運作。
後果。
我們如何恢復。
所學到的教訓。

愛情病毒。

何時發生及其影響。
如何及為何運作。
後果。
我們如何恢復。
所學到的教訓。

摘要。

II: 安全地存儲數據。

4. 本地存儲。

物理安全。
加密安全。

加密可以實現的目標。
僅有加密是不夠的。
基本加密和數據完整性。

用密碼保護數據。

圖形密碼。

加密文件系統。
案例研究。

CFS。
PGPDisk。
Windows 2000 中的 EFS。

進一步閱讀。

5. 遠程存儲。

遠程存儲。
NFS 安全。
增加安全性。

用戶身份驗證。
加強密碼。
訪問控制列表和能力。

AFS。
案例研究。

路徑名。

進一步閱讀。

6. 安全備份。

安全備份。
物理安全。
通過網絡備份。
密鑰粒度。
備份產品。

@backup。
BitSTOR。
安全備份系統。
BackJack。
Datalock。
NetMass SystemSafe。
Saf-T-Net。
Safeguard Interactive。
Veritas Telebackup。

刪除備份。
案例研究。

客戶端軟件。
增量備份。

進一步閱讀。

III: 安全數據傳輸。

7. 建立長期關聯。

什麼是身份?
網絡空間中的身份。
親自交換公鑰。
認證機構。

公鑰證書。

證書層級。
組織內的長期關係。
全球信任註冊。
撤銷。
野外的長期關係。
管理私鑰。
對稱密鑰。
案例研究。
摘要。
進一步閱讀。

8. 派生會話密鑰。

長期密鑰不足。

什麼是會話密鑰?
密鑰暴露。
完美前向保密。
安全關聯。

隨機選擇密鑰。
從對稱長期密鑰生成會話密鑰。

Kerberos。
另一種方法。

從長期公鑰生成會話密鑰。

Diffie-Hellman 密鑰交換。
SSL 中的會話密鑰。

協議設計與分析。
案例研究。

阻塞攻擊。
ISAKMP 交換。
密鑰刷新。
OAKLEY 中的質數。

進一步閱讀。