Skip to main content
Erschienen in:
Buchtitelbild

2018 | OriginalPaper | Buchkapitel

1. Computer Security

verfasst von : Jeffrey L. Duffany

Erschienen in: Computer and Network Security Essentials

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An overview of basic computer security concepts is presented along with a brief history of major computer security events of the late twentieth and early twenty-first centuries. This is followed by a description of the most important computer security vulnerabilities that exist today and countermeasures being used to mitigate them. Future trends in computer security are assessed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Pfleeger, C. P., & Pfleeger, S. L. (2015). Security in computing (5th ed.). Upper Saddle River, NJ: Prentice Hall. ISBN:978-0134085043.MATH Pfleeger, C. P., & Pfleeger, S. L. (2015). Security in computing (5th ed.). Upper Saddle River, NJ: Prentice Hall. ISBN:978-0134085043.MATH
2.
Zurück zum Zitat Stallings, W. (2016). Cryptography and network security: Principles and practice (7th ed.). London: Pearson. ISBN:978-013444284. Stallings, W. (2016). Cryptography and network security: Principles and practice (7th ed.). London: Pearson. ISBN:978-013444284.
3.
Zurück zum Zitat Clarke, R. A. (2011). Cyber war: The next threat to national security and what to do about it. Manhattan, NY: Ecco Publishing. ISBN 978-0061962240. Clarke, R. A. (2011). Cyber war: The next threat to national security and what to do about it. Manhattan, NY: Ecco Publishing. ISBN 978-0061962240.
4.
Zurück zum Zitat Boyer, S. A. (2010). SCADA supervisory control and data acquisition (p. 179). Research Triangle Park, NC: ISA-International Society of Automation. ISBN:978-1-936007-09-7. Boyer, S. A. (2010). SCADA supervisory control and data acquisition (p. 179). Research Triangle Park, NC: ISA-International Society of Automation. ISBN:978-1-936007-09-7.
6.
Zurück zum Zitat Caddy, T., & Bleumer, G. (2005). Security evaluation criteria. In H. C. A. van Tilborg (Ed.), Encyclopedia of cryptography and security (p. 552). New York: Springer.CrossRef Caddy, T., & Bleumer, G. (2005). Security evaluation criteria. In H. C. A. van Tilborg (Ed.), Encyclopedia of cryptography and security (p. 552). New York: Springer.CrossRef
7.
Zurück zum Zitat Stoll, C. (1988). Stalking the wily hacker. Communications of the ACM, 31(5), 484–497.CrossRef Stoll, C. (1988). Stalking the wily hacker. Communications of the ACM, 31(5), 484–497.CrossRef
9.
Zurück zum Zitat Loukides, M., & Gilmore, J. (1998). Cracking DES: Secrets of encryption research, wiretap politics, and chip design (pp. 800–822). San Francisco, CA: Electronic Frontier Foundation. Loukides, M., & Gilmore, J. (1998). Cracking DES: Secrets of encryption research, wiretap politics, and chip design (pp. 800–822). San Francisco, CA: Electronic Frontier Foundation.
10.
Zurück zum Zitat Benton, K. (2010). The evolution of 802.11 wireless security. Las Vegas, NV: University of Nevada. Benton, K. (2010). The evolution of 802.11 wireless security. Las Vegas, NV: University of Nevada.
11.
Zurück zum Zitat Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES – the advanced encryption standard. Berlin: Springer. ISBN 3-540-42580-2.CrossRefMATH Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES – the advanced encryption standard. Berlin: Springer. ISBN 3-540-42580-2.CrossRefMATH
12.
Zurück zum Zitat Singer, P. W., & Friedman, A. (2014). Cybersecurity: What everyone needs to know. Oxford, UK: Oxford University Press. ISBN:978-0199918199. Singer, P. W., & Friedman, A. (2014). Cybersecurity: What everyone needs to know. Oxford, UK: Oxford University Press. ISBN:978-0199918199.
13.
Zurück zum Zitat Clarke, R. A. (2011). Cyber war: The next threat to national security and what to do about it. Manhattan, NY: Ecco Publishing. ISBN 978-0061962240. Clarke, R. A. (2011). Cyber war: The next threat to national security and what to do about it. Manhattan, NY: Ecco Publishing. ISBN 978-0061962240.
14.
Zurück zum Zitat Kennedy, D. (2011). Metasploit: The penetration tester’s guide. San Francisco, CA: No Starch Press. ISBN:978-1-59327-288-3. Kennedy, D. (2011). Metasploit: The penetration tester’s guide. San Francisco, CA: No Starch Press. ISBN:978-1-59327-288-3.
15.
Zurück zum Zitat Conheady, S. (2014). Social engineering in IT security: Tools, tactics and techniques. New York City, NY: McGraw-Hill. ISBN:978-00071818464. (ISO/IEC 15408). Conheady, S. (2014). Social engineering in IT security: Tools, tactics and techniques. New York City, NY: McGraw-Hill. ISBN:978-00071818464. (ISO/IEC 15408).
16.
Zurück zum Zitat Smith, J. (2016). Tor and the dark net: Remain anonymous and evade NSA spying., ISBN:978-00071818464978-0692674444. New Delhi: Pinnacle Publishers. Smith, J. (2016). Tor and the dark net: Remain anonymous and evade NSA spying., ISBN:978-00071818464978-0692674444. New Delhi: Pinnacle Publishers.
17.
Zurück zum Zitat Fruhwirth, C. (2005). New methods in hard disk encryption. Institute for computer languages: Theory and logic group (PDF). Vienna: Vienna University of Technology. ISBN:978-00071818464978-0596002428. Fruhwirth, C. (2005). New methods in hard disk encryption. Institute for computer languages: Theory and logic group (PDF). Vienna: Vienna University of Technology. ISBN:978-00071818464978-0596002428.
18.
Zurück zum Zitat England, P., Lampson, B., Manferdelli, J., Peinado, M., & Willman, B. (2003). A trusted open platform (PDF). Computer, 36(7), 55–62.CrossRef England, P., Lampson, B., Manferdelli, J., Peinado, M., & Willman, B. (2003). A trusted open platform (PDF). Computer, 36(7), 55–62.CrossRef
21.
Zurück zum Zitat Aycock, J. (2006). Computer viruses and malware (p. 14). New York: Springer. ISBN:978-00071818464. Aycock, J. (2006). Computer viruses and malware (p. 14). New York: Springer. ISBN:978-00071818464.
22.
Zurück zum Zitat Eilam, E. (2005). Reversing: Secrets of reverse engineering. Indianapolis, IN: Wiley Publishing. ISBN:978-0007181846413-978-0-7645-7481-8. Eilam, E. (2005). Reversing: Secrets of reverse engineering. Indianapolis, IN: Wiley Publishing. ISBN:978-0007181846413-978-0-7645-7481-8.
23.
Zurück zum Zitat Richard E. S. (2001), Authentication: From passwords to public keys., ISBN:978-00071818464978-0201615999. Richard E. S. (2001), Authentication: From passwords to public keys., ISBN:978-00071818464978-0201615999.
25.
Zurück zum Zitat Szor, P. (2005). The art of computer virus research and defense. Boston: Addison-Wesley Professional. ASIN 0321304543. Szor, P. (2005). The art of computer virus research and defense. Boston: Addison-Wesley Professional. ASIN 0321304543.
26.
Zurück zum Zitat National Security Agency shares security enhancements to linux. NSA Press Release. Fort George G. Meade, Maryland: National Security Agency Central Security Service. 2001-01-02. National Security Agency shares security enhancements to linux. NSA Press Release. Fort George G. Meade, Maryland: National Security Agency Central Security Service. 2001-01-02.
27.
Zurück zum Zitat Sommerville, I. (2015), Software engineering., ISBN:978-0133943030.MATH Sommerville, I. (2015), Software engineering., ISBN:978-0133943030.MATH
28.
Zurück zum Zitat Graff, M. G., & van Wyk, K. R. (2003). Secure coding: Principles and practices. Sebastopol, CA: O’Reilly Media, Inc. Graff, M. G., & van Wyk, K. R. (2003). Secure coding: Principles and practices. Sebastopol, CA: O’Reilly Media, Inc.
30.
Zurück zum Zitat Li, Z., He, W., Akhawe, D., & Song, D. (2014). The emperor’s new password manager: Security analysis of web-based password managers (PDF). Usenix. Li, Z., He, W., Akhawe, D., & Song, D. (2014). The emperor’s new password manager: Security analysis of web-based password managers (PDF). Usenix.
Metadaten
Titel
Computer Security
verfasst von
Jeffrey L. Duffany
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-58424-9_1

Neuer Inhalt