Chapter 14 - M14_STAL6329_06_SE_C14.QXD 8:42 PM Page 634...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
P ART S EVEN I n this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security has become a central issue. Two trends have come together to make the topic of this part of vital interest. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the informa- tion stored and communicated using these systems.This, in turn, has led to a height- ened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Second, the disciplines of cryptography and computer secu- rity have matured, leading to the development of practical, readily available appli- cations to enforce security. ROAD MAP FOR PART SEVEN Chapter 14 Computer Security Threats Chapter 14 begins with an overview of computer security concept.Then the chapter provides a survey of the threats to computer security. The bulk of the chapter is de- voted to four major threats: viruses, worms, bots, and rootkits. Chapter 15 Computer Security Techniques Chapter 15 surveys important techniques used to counter computer security threats. These include access control, intrusion detection, defenses against malicious soft- ware, and techniques for countering buffer overflow attacks. Security 634 M14_STAL6329_06_SE_C14.QXD 2/22/08 8:42 PM Page 634
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CHAPTER C OMPUTER S ECURITY T HREATS 14.1 Computer Security Concepts 14.2 Threats, Attacks, and Assets Threats and Attacks Threats and Assets 14.3 Intruders Intruder Behavior Patterns Intrusion Techniques 14.4 Malicious Software Overview Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat Malware 14.5 Viruses, Worms, and Bots Viruses Worms Bots 14.6 Rootkits Rootkit Installation System-Level Call Attacks 14.6 Recommended Reading and Web Sites 14.7 Key Terms, Review Questions, and Problems 635 M14_STAL6329_06_SE_C14.QXD 2/22/08 8:42 PM Page 635
Background image of page 2
636 CHAPTER 14 / COMPUTER SECURITY THREATS The area of computer security is a broad one and encompasses physical and ad- ministrative controls as well as automated controls. In this chapter, we confine ourselves to consideration of automated security tools. Following an overview of computer security concepts and computer security threats, the remainder of the chapter deals with the two broad categories of threat: intruders and malicious software. Encryption plays a role both in computer security threats and computer security techniques.Appendix F provides an overview of encryption. 14.1 COMPUTER SECURITY CONCEPTS The NIST Computer Security Handbook [NIST95] defining the term computer secu- rity as follows: 1 RFC 2828 ( Internet Security Glossary ) defines information as “facts and ideas, which can be represented (encoded) as various forms of data ,” and data as “information in a specific physical representation, usu-
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/10/2010 for the course EXTC 56 taught by Professor Stalling during the Spring '10 term at Abu Dhabi University.

Page1 / 33

Chapter 14 - M14_STAL6329_06_SE_C14.QXD 8:42 PM Page 634...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online