66361-CompSecSol_ch1-12

66361-CompSecSol_ch1-12 - S OLUTIONS M ANUAL C OMPUTER S...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: S OLUTIONS M ANUAL C OMPUTER S ECURITY P RINCIPLES AND P RACTICE F IRST E DITION C HAPTERS 1 - 12 W ILLIAM S TALLINGS L AWRIE B ROWN Copyright 2008: William Stallings-2- 2008 by William Stallings All rights reserved. No part of this document may be reproduced, in any form or by any means, or posted on the Internet, without permission in writing from the author. Selected solutions may be shared with students, provided that they are not available, unsecured, on the Web.-3- N OTICE This manual contains solutions to the review questions and homework problems in Computer Security: Principles and Practice . If you spot an error in a solution or in the wording of a problem, I would greatly appreciate it if you would forward the information via email to ws@shore.net. An errata sheet for this manual, if needed, is available at http://www.box.net/public/ig0eifhfxu . File name is S-CompSec-mmyy W.S.-4- TABLE OF CONTENTS Chapter 1: Overview.......................................................................................................5 Chapter 2: Cryptographic Tools....................................................................................9 Chapter 3: User Authentication...................................................................................17 Chapter 4: Access Control............................................................................................22 Chapter 5: Database Security.......................................................................................27 Chapter 6: Intrusion Detection....................................................................................32 Chapter 7: Malicious Software.....................................................................................38 Chapter 8: Denial of Service.........................................................................................42 Chapter 9: Firewalls and Intrusion Prevention Systems .........................................46 Chapter 10: Trusted Computing and Multilevel Security.........................................53 Chapter 11: Buffer Overflow..........................................................................................58 Chapter 12: Software Security .......................................................................................64-5- A A NSWERS TO NSWERS TO Q Q UESTIONS UESTIONS 1.1 The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications). 1.2 The OSI Security Architecture is a framework that provides a systematic way of defining the requirements for security and characterizing the approaches to satisfying those requirements. The document defines security attacks, mechanisms, and services, and the relationships among these categories....
View Full Document

Page1 / 69

66361-CompSecSol_ch1-12 - S OLUTIONS M ANUAL C OMPUTER S...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online