A fresh new approach to computer security by the authors of the 20-year best-selling classic Security in Computing. ac acIntroduces computer security the way today's practitioners want to learn it: by identifying threats, explaining the vulnerabilities that cause them, and presenting effective countermeasures. acContains up-to-date coverage of security management, risk analysis, privacy, controls, forensics, insider attacks, human factors, trust, and more. acIncludes 273 problems and 192 illustrations. In this book, the authors of the 20-year best-selling classic Security in Computing take a fresh, contemporary, and powerfully relevant new approach to introducing computer security. Organized around attacks and mitigations, the Pfleegers' new Analyzing Computer Security will attract readers' attention by building on the high-profile security failures they may have already encountered in the popular media. Each section starts with an attack description. Next, the authors explain the vulnerabilities that have allowed this attack to occur. With this foundation in place, they systematically present today's most effective countermeasures for blocking or weakening the attack. One step at a time, readers progress from attack/problem/harm to solution/protection/mitigation, building the powerful real-world problem solving skills they need to succeed as information security professionals. Analyzing Computer Security themes throughout, including effective security management and risk analysis; economics and quantitative study; privacy, ethics, and laws; and the use of overlapping controls. The authors also present significant new material on computer forensics, insiders, human factors, and trust. addresses crucial contemporary computer securitygreek Cell Phone interception Sidebar 12-2 Vodafone Greece is that countrya#39;s largest cell phone provider. ... In 2003, Ericsson upgraded the software in its switches and inadvertently included the intercept code in the upgrade delivered to Vodafone ... This hidden feature is a perfect example of a trapdoor, introduced in Chapter 3, and it demonstrates why obscurity is not an ... To reduce the risk of card theft or loss, these smartcards use a PIN to authenticate the carda#39;s holder to the card.
|Title||:||Analyzing Computer Security|
|Author||:||Charles P. Pfleeger, Shari Lawrence Pfleeger|
|Publisher||:||Prentice Hall Professional - 2012|