Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title Page
Copyright
Dedication
Credits
Preface to the Second Edition
Foreword
Preface
About the Author
Acknowledgments
Further Acknowledgments for the Second Edition
Legal Notice
Part I
Chapter 1 What Is Security Engineering?
Introduction
A Framework
Example 1 – A Bank
Example 2 – A Military Base
Example 3 – A Hospital
Example 4 – The Home
Definitions
Summary
Chapter 2 Usability and Psychology
Introduction
Attacks Based on Psychology
Insights from Psychology Research
Passwords
System Issues
CAPTCHAs
Summary
Research Problems
Further Reading
Chapter 3 Protocols
Introduction
Password Eavesdropping Risks
Who Goes There? – Simple Authentication
Manipulating the Message
Changing the Environment
Chosen Protocol Attacks
Managing Encryption Keys
Getting Formal
Summary
Research Problems
Further reading
Chapter 4 Access Control
Introduction
Operating System Access Controls
Hardware Protection
What Goes Wrong
Summary
Research Problems
Further Reading
Chapter 5 Crytography
Introduction
Historical Background
The Random Oracle Model
Symmetric Crypto Primitives
Modes of Operation
Hash Functions
Asymmetric Crypto Primitives
Summary
Research Problems
Further Reading
Chapter 6 Distributed Systems
Introduction
Concurrency
Fault Tolerance and Failure Recovery
Naming
Summary
Research Problems
Further reading
Chapter 7 Economics
Introduction
Classical Economics
Information Economics
Game Theory
The Economics of Security and Dependability
Summary
Research Problems
Further Reading
Part II
Chapter 8 Multilevel Security
Introduction
What Is a Security Policy Model?
The Bell-LaPadula Security Policy Model
Historical Examples of MLS Systems
Future MLS Systems
What Goes Wrong
Broader Implications of MLS
Summary
Research Problems
Further reading
Chapter 9 Multilateral Security
Introduction
Compartmentation, the Chinese Wall and the BMA Model
Inference Control
The Residual Problem
Summary
Research Problems
Further reading
Chapter 10 Banking and Bookkeeping
Introduction
How Bank Computer Systems Work
Wholesale Payment Systems
Automatic Teller Machines
Credit Cards
Smartcard-Based Banking
Home Banking and Money Laundering
Summary
Research Problems
Further reading
Chapter 11 Physical Protection
Introduction
Threats and Barriers
Alarms
Summary
Research Problems
Further reading
Chapter 12 Monitoring and Metering
Introduction
Prepayment Meters
Taxi Meters, Tachographs and Truck Speed Limiters
Postage Meters
Summary
Research Problems
Further reading
Chapter 13 Nuclear Command and Control
Introduction
The Evolution of Command and Control
Unconditionally Secure Authentication
Shared Control Schemes
Tamper Resistance and PALs
Treaty Verification
What Goes Wrong
Secrecy or Openness?
Summary
Research Problems
Further reading
Chapter 14 Security Printing and Seals
Introduction
History
Security Printing
Packaging and Seals
Systemic Vulnerabilities
Evaluation Methodology
Summary
Research Problems
Further Reading
Chapter 15 Biometrics
Introduction
Handwritten Signatures
Face Recognition
Bertillonage
Fingerprints
Iris Codes
Voice Recognition
Other Systems
What Goes Wrong
Summary
Research Problems
Further reading
Chapter 16 Physical Tamper Resistance
Introduction
History
High-End Physically Secure Processors
Evaluation
Medium Security Processors
Smartcards and Microcontrollers
What Goes Wrong
So What Should One Protect?
Summary
Research Problems
Further reading
Chapter 17 Emission Security
Introduction
History
Technical Surveillance and Countermeasures
Passive Attacks
Active Attacks
Optical, Acoustic and Thermal Side Channels
How Serious are Emsec Attacks?
Summary
Research Problems
Further reading
Chapter 18 API Attacks
Introduction
API Attacks on Security Modules
API Attacks on Operating Systems
Summary
Research Problems
Further Reading
Chapter 19 Electronic and Information Warfare
Introduction
Basics
Communications Systems
Surveillance and Target Acquisition
IFF Systems
Improvised Explosive Devices
Directed Energy Weapons
Information Warfare
Summary
Research Problems
Further reading
Chapter 20 Telecom System Security
Introduction
Phone Phreaking
Mobile Phones
Security Economics of Telecomms
Summary
Research Problems
Further reading
Chapter 21 Network Attack and Defense
Introduction
Vulnerabilities in Network Protocols
Trojans, Viruses, Worms and Rootkits
Defense Against Network Attack
Topology
Summary
Research Problems
Further reading
Chapter 22 Copyright and DRM
Introduction
Copyright
General Platforms
Information Hiding
Policy
Accessory Control
Summary
Research Problems
Further reading
Chapter 23 The Bleeding Edge
Introduction
Computer Games
Web Applications
Privacy Technology
Elections
Summary
Research Problems
Further Reading
Part III
Chapter 24 Terror, Justice and Freedom
Introduction
Terrorism
Surveillance
Censorship
Forensics and Rules of Evidence
Privacy and Data Protection
Summary
Research Problems
Further Reading
Chapter 25 Managing the Development of Secure Systems
Introduction
Managing a Security Project
Methodology
Security Requirements Engineering
Risk Management
Managing the Team
Summary
Research Problems
Further Reading
Chapter 26 System Evaluation and Assurance
Introduction
Assurance
Evaluation
Ways Forward
Summary
Research Problems
Further reading
Chapter 27 Conclusions
Bibliography
Index
← Prev
Back
Next →
← Prev
Back
Next →