logo资料库

Introduction to Computer Security pdf DONE.pdf

第1页 / 共785页
第2页 / 共785页
第3页 / 共785页
第4页 / 共785页
第5页 / 共785页
第6页 / 共785页
第7页 / 共785页
第8页 / 共785页
资料共785页,剩余部分请下载后查看
Contents
Preface
Chapter 1: An Overview of Computer Security
Chapter 2: Access Control Matrix
Chapter 3: Foundational Results
Chapter 4: Security Policies
Chapter 5: Confidentiality Policies
Chapter 6: Integrity Policies
Chapter 7: Hybrid Policies
Chapter 8: Basic Cryptography
Chapter 9: Key Management
Chapter 10: Cipher Techniques
Chapter 11: Authentication
Chapter 12: Design Princples
Chapter 13: Representing Identity
Chapter 14: Access Control Mechanisms
Chapter 15: Information Flow
Chapter 16: Confinement Problem
Chapter 17: Introduction to Assurance
Chapter 18: Evaluating Systems
Chapter 19: Malicious Logic
Chapter 20: Vulnerability Analysis
Chapter 21: Auditing
Chapter 22: Intrusion Detection
Chapter 23: Network Security
Chapter 24: System Security
Chapter 25: User Security
Chapter 26: Program Security
Chapter 27: Lattices
Chapter 28: The Extended Euclidean Algorithm
Chapter 29: Virtual Machines
Bibliography
Index
Bishop.book Page i Tuesday, September 28, 2004 1:46 PM Introduction to Computer Security
Bishop.book Page ii Tuesday, September 28, 2004 1:46 PM
Bishop.book Page iii Tuesday, September 28, 2004 1:46 PM Introduction to Computer Security Matt Bishop Boston • San Francisco • New York • Toronto • Montreal London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City
Bishop.book Page iv Tuesday, September 28, 2004 2:34 PM Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trade- marks. Where those designations appear in this book, and Addison-Wesley was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for inciden- tal or consequential damages in connection with or arising out of the use of the information or programs con- tained herein. The publisher offers discounts on this book when ordered in quantity for bulk purchases and special sales. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside of the U.S., please contact: International Sales international@pearsoned.com Visit Addison-Wesley on the Web: www.awprofessional.com Library of Congress Cataloging-in-Publication Data Bishop, Matt (Matthew A.) Introduction to computer security / Matt Bishop. p. cm. Includes bibliographical references and index. ISBN 0-321-24744-2 (hardcover : alk. paper) 1. Computer security. I. Title. QA76.9.A25B563 2004 005.8—dc22 2004019195 Copyright © 2005 by Pearson Education, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form, or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior consent of the publisher. Printed in the United States of America. Published simultaneously in Canada. Chapters 17 and 18 Copyright 2005 by Elisabeth C. Sullivan. Published by Pearson Education, Inc. with permission. For information on obtaining permission for use of material from this work, please submit a written request to: Pearson Education, Inc. Rights and Contracts Department 75 Arlington Street, Suite 300 Boston, MA 02116 Fax: (617) 848-7047 ISBN: 0-321-24744-2 Text printed on recycled paper 1 2 3 4 5 6 7 8 9 10—CRS—0807060504 First printing, October 2004
Bishop.book Page v Tuesday, September 28, 2004 1:46 PM
Bishop.book Page vi Tuesday, September 28, 2004 1:46 PM To my dear Holly; our children Heidi, Steven, David, and Caroline; our grandson Skyler; our son-in-law Mike; and our friends Seaview, Tinker Belle, Stripe, Baby Windsor, Fuzzy, Scout, Fur, Puff, and the rest of the menagerie.
Bishop.book Page vii Tuesday, September 28, 2004 1:46 PM Contents Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxv Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi Philosophy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxvii Organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxix Differences Between this Book and Computer Security: Art and Science . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxx Special Acknowledgment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxi Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxi Chapter 1 An Overview of Computer Security. . . . . . . . . . . . . . . . . . . . . . . . . . .1 1.1 The Basic Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 1.1.1 Confidentiality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 1.1.2 Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 1.1.3 Availability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 1.2 Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 1.3 Policy and Mechanism. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7 1.3.1 Goals of Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8 1.4 Assumptions and Trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9 1.5 Assurance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 1.5.1 Specification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11 1.5.2 Design. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 1.5.3 Implementation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 1.6 Operational Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14 1.6.1 Cost-Benefit Analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14 1.6.2 Risk Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 1.6.3 Laws and Customs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 1.7 Human Issues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 1.7.1 Organizational Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 1.7.2 People Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19 1.8 Tying It All Together. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20 1.9 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 1.10 Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 1.11 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 vii
分享到:
收藏