Skip to main content
Top
Published in:
Cover of the book

2018 | OriginalPaper | Chapter

1. Computer Security

Author : Jeffrey L. Duffany

Published in: Computer and Network Security Essentials

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

An overview of basic computer security concepts is presented along with a brief history of major computer security events of the late twentieth and early twenty-first centuries. This is followed by a description of the most important computer security vulnerabilities that exist today and countermeasures being used to mitigate them. Future trends in computer security are assessed.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Pfleeger, C. P., & Pfleeger, S. L. (2015). Security in computing (5th ed.). Upper Saddle River, NJ: Prentice Hall. ISBN:978-0134085043.MATH Pfleeger, C. P., & Pfleeger, S. L. (2015). Security in computing (5th ed.). Upper Saddle River, NJ: Prentice Hall. ISBN:978-0134085043.MATH
2.
go back to reference Stallings, W. (2016). Cryptography and network security: Principles and practice (7th ed.). London: Pearson. ISBN:978-013444284. Stallings, W. (2016). Cryptography and network security: Principles and practice (7th ed.). London: Pearson. ISBN:978-013444284.
3.
go back to reference Clarke, R. A. (2011). Cyber war: The next threat to national security and what to do about it. Manhattan, NY: Ecco Publishing. ISBN 978-0061962240. Clarke, R. A. (2011). Cyber war: The next threat to national security and what to do about it. Manhattan, NY: Ecco Publishing. ISBN 978-0061962240.
4.
go back to reference Boyer, S. A. (2010). SCADA supervisory control and data acquisition (p. 179). Research Triangle Park, NC: ISA-International Society of Automation. ISBN:978-1-936007-09-7. Boyer, S. A. (2010). SCADA supervisory control and data acquisition (p. 179). Research Triangle Park, NC: ISA-International Society of Automation. ISBN:978-1-936007-09-7.
6.
go back to reference Caddy, T., & Bleumer, G. (2005). Security evaluation criteria. In H. C. A. van Tilborg (Ed.), Encyclopedia of cryptography and security (p. 552). New York: Springer.CrossRef Caddy, T., & Bleumer, G. (2005). Security evaluation criteria. In H. C. A. van Tilborg (Ed.), Encyclopedia of cryptography and security (p. 552). New York: Springer.CrossRef
7.
go back to reference Stoll, C. (1988). Stalking the wily hacker. Communications of the ACM, 31(5), 484–497.CrossRef Stoll, C. (1988). Stalking the wily hacker. Communications of the ACM, 31(5), 484–497.CrossRef
9.
go back to reference Loukides, M., & Gilmore, J. (1998). Cracking DES: Secrets of encryption research, wiretap politics, and chip design (pp. 800–822). San Francisco, CA: Electronic Frontier Foundation. Loukides, M., & Gilmore, J. (1998). Cracking DES: Secrets of encryption research, wiretap politics, and chip design (pp. 800–822). San Francisco, CA: Electronic Frontier Foundation.
10.
go back to reference Benton, K. (2010). The evolution of 802.11 wireless security. Las Vegas, NV: University of Nevada. Benton, K. (2010). The evolution of 802.11 wireless security. Las Vegas, NV: University of Nevada.
11.
go back to reference Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES – the advanced encryption standard. Berlin: Springer. ISBN 3-540-42580-2.CrossRefMATH Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES – the advanced encryption standard. Berlin: Springer. ISBN 3-540-42580-2.CrossRefMATH
12.
go back to reference Singer, P. W., & Friedman, A. (2014). Cybersecurity: What everyone needs to know. Oxford, UK: Oxford University Press. ISBN:978-0199918199. Singer, P. W., & Friedman, A. (2014). Cybersecurity: What everyone needs to know. Oxford, UK: Oxford University Press. ISBN:978-0199918199.
13.
go back to reference Clarke, R. A. (2011). Cyber war: The next threat to national security and what to do about it. Manhattan, NY: Ecco Publishing. ISBN 978-0061962240. Clarke, R. A. (2011). Cyber war: The next threat to national security and what to do about it. Manhattan, NY: Ecco Publishing. ISBN 978-0061962240.
14.
go back to reference Kennedy, D. (2011). Metasploit: The penetration tester’s guide. San Francisco, CA: No Starch Press. ISBN:978-1-59327-288-3. Kennedy, D. (2011). Metasploit: The penetration tester’s guide. San Francisco, CA: No Starch Press. ISBN:978-1-59327-288-3.
15.
go back to reference Conheady, S. (2014). Social engineering in IT security: Tools, tactics and techniques. New York City, NY: McGraw-Hill. ISBN:978-00071818464. (ISO/IEC 15408). Conheady, S. (2014). Social engineering in IT security: Tools, tactics and techniques. New York City, NY: McGraw-Hill. ISBN:978-00071818464. (ISO/IEC 15408).
16.
go back to reference Smith, J. (2016). Tor and the dark net: Remain anonymous and evade NSA spying., ISBN:978-00071818464978-0692674444. New Delhi: Pinnacle Publishers. Smith, J. (2016). Tor and the dark net: Remain anonymous and evade NSA spying., ISBN:978-00071818464978-0692674444. New Delhi: Pinnacle Publishers.
17.
go back to reference Fruhwirth, C. (2005). New methods in hard disk encryption. Institute for computer languages: Theory and logic group (PDF). Vienna: Vienna University of Technology. ISBN:978-00071818464978-0596002428. Fruhwirth, C. (2005). New methods in hard disk encryption. Institute for computer languages: Theory and logic group (PDF). Vienna: Vienna University of Technology. ISBN:978-00071818464978-0596002428.
18.
go back to reference England, P., Lampson, B., Manferdelli, J., Peinado, M., & Willman, B. (2003). A trusted open platform (PDF). Computer, 36(7), 55–62.CrossRef England, P., Lampson, B., Manferdelli, J., Peinado, M., & Willman, B. (2003). A trusted open platform (PDF). Computer, 36(7), 55–62.CrossRef
21.
go back to reference Aycock, J. (2006). Computer viruses and malware (p. 14). New York: Springer. ISBN:978-00071818464. Aycock, J. (2006). Computer viruses and malware (p. 14). New York: Springer. ISBN:978-00071818464.
22.
go back to reference Eilam, E. (2005). Reversing: Secrets of reverse engineering. Indianapolis, IN: Wiley Publishing. ISBN:978-0007181846413-978-0-7645-7481-8. Eilam, E. (2005). Reversing: Secrets of reverse engineering. Indianapolis, IN: Wiley Publishing. ISBN:978-0007181846413-978-0-7645-7481-8.
23.
go back to reference Richard E. S. (2001), Authentication: From passwords to public keys., ISBN:978-00071818464978-0201615999. Richard E. S. (2001), Authentication: From passwords to public keys., ISBN:978-00071818464978-0201615999.
25.
go back to reference Szor, P. (2005). The art of computer virus research and defense. Boston: Addison-Wesley Professional. ASIN 0321304543. Szor, P. (2005). The art of computer virus research and defense. Boston: Addison-Wesley Professional. ASIN 0321304543.
26.
go back to reference National Security Agency shares security enhancements to linux. NSA Press Release. Fort George G. Meade, Maryland: National Security Agency Central Security Service. 2001-01-02. National Security Agency shares security enhancements to linux. NSA Press Release. Fort George G. Meade, Maryland: National Security Agency Central Security Service. 2001-01-02.
27.
go back to reference Sommerville, I. (2015), Software engineering., ISBN:978-0133943030.MATH Sommerville, I. (2015), Software engineering., ISBN:978-0133943030.MATH
28.
go back to reference Graff, M. G., & van Wyk, K. R. (2003). Secure coding: Principles and practices. Sebastopol, CA: O’Reilly Media, Inc. Graff, M. G., & van Wyk, K. R. (2003). Secure coding: Principles and practices. Sebastopol, CA: O’Reilly Media, Inc.
30.
go back to reference Li, Z., He, W., Akhawe, D., & Song, D. (2014). The emperor’s new password manager: Security analysis of web-based password managers (PDF). Usenix. Li, Z., He, W., Akhawe, D., & Song, D. (2014). The emperor’s new password manager: Security analysis of web-based password managers (PDF). Usenix.
Metadata
Title
Computer Security
Author
Jeffrey L. Duffany
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-58424-9_1