Tải bản đầy đủ (.pdf) (877 trang)

computer and information security handbook

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (17.6 MB, 877 trang )


Computer and Information
Security Handbook


The Morgan Kaufmann Series in Computer Security
Computer and Information Security Handbook
John Vacca
Disappearing Cryptography: Information Hiding: Steganography & Watermarking, Third Edition
Peter Wayner
Network Security: Know It All
James Joshi, et al.
Digital Watermarking and Steganography, Second Edition
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, and Ton Kalker
Information Assurance: Dependability and Security in Networked Systems
Yi Qian, David Tipper, Prashant Krishnamurthy, and James Joshi
Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS
Jean-Philippe Vasseur, Mario Pickavet, and Piet Demeester
For further information on these books and for a list of forthcoming titles,
please visit our Web site at


Computer and Information
Security Handbook

Edited by
John R. Vacca

AMSTERDAM • BOSTON • HEIDELBERG • LONDON • NEW YORK
OXFORD • PARIS • SAN DIEGO • SAN FRANCISCO
SINGAPORE • SYDNEY • TOKYO



Morgan Kaufmann Publishers is an imprint of Elsevier


Morgan Kaufmann Publishers is an imprint of Elsevier.
30 Corporate Drive, Suite 400, Burlington, MA 01803, USA
This book is printed on acid-free paper.
Copyright © 2009 by Elsevier Inc. All rights reserved.
Exception to the above text:
Chapter 29: © 2009, The Crown in right of Canada.
Designations used by companies to distinguish their products are often claimed as trademarks or registered trademarks.
In all instances in which Morgan Kaufmann Publishers is aware of a claim, the product names appear in initial capital
or all capital letters. All trademarks that appear or are otherwise referred to in this work belong to their respective
owners. Neither Morgan Kaufmann Publishers nor the authors and other contributors of this work have any
relationship or affiliation with such trademark owners nor do such trademark owners confirm, endorse or approve the
contents of this work. Readers, however, should contact the appropriate companies for more information regarding
trademarks and any related registrations.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
any means—electronic, mechanical, photocopying, scanning, or otherwise—without prior written
permission of the publisher.
Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford,
UK: phone: (ϩ44) 1865 843830, fax: (ϩ44) 1865 853333, E-mail: You may also
complete your request online via the Elsevier homepage (), by selecting
“Support & Contact” then “Copyright and Permission” and then “Obtaining Permissions.”
Library of Congress Cataloging-in-Publication Data
Application submitted
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.
ISBN: 978-0-12-374354-1
For information on all Morgan Kaufmann publications,

visit our Web site at www.mkp.com or www.elsevierdirect.com

Printed in the United States of America
09 10 11 12 13 5 4 3 2 1


This book is dedicated to my wife, Bee.


This page intentionally left blank


Contents

Foreword
Preface
Acknowledgments
About the Editor
Contributors

xxi
xxiii
xxvii
xxix
xxxi

2.

Famous Cryptographic Devices
The Lorenz Cipher

Enigma
3. Ciphers
The Substitution Cipher
The Shift Cipher
The Polyalphabetic Cipher
The Kasiski/Kerckhoff Method
4. Modern Cryptography
The Vernam Cipher (Stream Cipher)
The One-Time Pad
Cracking Ciphers
The XOR Cipher and Logical Operands
Block Ciphers
5. The Computer Age
Data Encryption Standard
Theory of Operation
Implementation
Rivest, Shamir, and Adleman (RSA)
Advanced Encryption Standard
(AES or Rijndael)

Part I
Overview of System and Network
Security: A Comprehensive
Introduction
1.

Building a Secure Organization

3


John Mallery
1.

Obstacles to Security
3
Security Is Inconvenient
3
Computers Are Powerful and Complex
3
Computer Users Are Unsophisticated
4
Computers Created Without a Thought
to Security
4
Current Trend Is to Share, Not Protect
4
Data Accessible from Anywhere
4
Security Isn’t About Hardware
and Software
5
The Bad Guys Are Very Sophisticated
5
Management Sees Security as a Drain
on the Bottom Line
5
2. Ten Steps to Building a Secure Organization 6
A. Evaluate the Risks and Threats
6
B. Beware of Common Misconceptions

8
C. Provide Security Training for
IT Staff—Now and Forever
9
D. Think “Outside the Box”
10
E. Train Employees: Develop a Culture
of Security
12
F. Identify and Utilize Built-In Security
Features of the Operating System and
Applications
14
G. Monitor Systems
16
H. Hire a Third Party to Audit Security
17
I. Don’t Forget the Basics
19
J. Patch, Patch, Patch
20

2.

A Cryptography Primer

23

Scott R. Ellis
1. What is Cryptography?

What is Encryption?
How Is Cryptography Done?

23
24

3

Preventing System Intrusions

24
24
24
25
25
26
29
30
31
31
32
33
34
35
36
36
37
38
38
38


39

Michael West
1. So, What is an Intrusion?
2. Sobering Numbers
3. Know Your Enemy: Hackers Versus
Crackers
4. Motives
5. Tools of the Trade
6. Bots
7. Symptoms of Intrusions
8. What Can You Do?
Know Today’s Network Needs
Network Security Best Practices
9. Security Policies
10. Risk Analysis
Vulnerability Testing
Audits
Recovery
11. Tools of Your Trade
Firewalls
Intrusion Prevention Systems
Application Firewalls
Access Control Systems
Unified Threat Management
12. Controlling User Access
Authentication, Authorization,
and Accounting
What the User Knows


39
40
40
41
41
42
43
43
44
45
45
46
46
47
47
47
47
47
48
48
49
49
49
49


viii

Contents


13.

4.

What the User Has
The User Is Authenticated,
But Is She Authorized?
Accounting
Keeping Current
Conclusion

Guarding Against Network
Intrusions

50
50
51
51
51

53

6.

6. Eliminating the Security Weakness
of Linux and Unix Operating
Systems

1. Traditional Reconnaissance and Attacks

2. Malicious Software
Lures and “Pull” Attacks
3. Defense in Depth
4. Preventive Measures
Access Control
Vulnerability Testing and Patching
Closing Ports
Firewalls
Antivirus and Antispyware Tools
Spam Filtering
Honeypots
Network Access Control
5. Intrusion Monitoring and Detection
Host-Based Monitoring
Traffic Monitoring
Signature-Based Detection
Behavior Anomalies
Intrusion Prevention Systems
6. Reactive Measures
Quarantine
Traceback
7. Conclusions

53
56
57
58
59
59
59

60
60
61
62
62
63
63
64
64
64
65
65
65
65
66
66

Unix and Linux Security

67

Gerald Beuchelt
1.
2.

4.

5.

Unix and Security

The Aims of System Security
Achieving Unix Security
Basic Unix Security
Traditional Unix Systems
Standard File and Device Access
Semantics
Protecting User Accounts
and Strengthening Authentication
Establishing Secure Account Use
The Unix Login Process
Controlling Account Access
Noninteractive Access
Other Network Authentication
Mechanisms
Risks of Trusted Hosts and Networks
Replacing Telnet, rlogin, and FTP
Servers and Clients with SSH
Reducing Exposure to Threats by
Limiting Superuser Privileges
Controlling Root Access

76
76

79

Mario Santana

Tom Chen and Patrick J. Walsh


5.

Safeguarding Vital Data by Securing
Local and Network File Systems
Directory Structure and Partitioning
for Security

67
67
67
68
68
69
71
71
71
71
72

7.

1.

Introduction to Linux and Unix
What Is Unix?
What Is Linux?
System Architecture
2. Hardening Linux and Unix
Network Hardening
Host Hardening

Systems Management Security
3. Proactive Defense for Linux and Unix
Vulnerability Assessment
Incident Response Preparation
Organizational Considerations

79
79
80
82
84
84
88
90
90
90
91
92

Internet Security

93

Jesse Walker
1.

Internet Protocol Architecture
Communications Architecture Basics
Getting More Specific
2. An Internet Threat Model

The Dolev-Yao Adversary Model
Layer Threats
3. Defending Against Attacks on
the Internet
Layer Session Defenses
Session Startup Defenses
4. Conclusion

8. The Botnet Problem

105
106
113
117

119

Xinyuan Wang and Daniel Ramsbrock
1.
2.
3.
4.
5.

73
73
73
74
74


93
94
95
100
101
101

6.

Introduction
Botnet Overview
Origins of Botnets
Botnet Topologies and Protocols
Typical Bot Life Cycle
The Botnet Business Model
Botnet Defense
Detecting and Removing
Individual Bots
Detecting C&C Traffic
Detecting and Neutralizing
the C&C Servers
Attacking Encrypted C&C Channels
Locating and Identifying the Botmaster
Botmaster Traceback
Traceback Challenges

119
120
120
120

122
123
124
124
125
125
126
128
128
129


ix

Contents

7.

9.

Traceback Beyond the Internet
Summary

Intranet Security

130
132

18. Application-layer Firewalls:
Proxy Servers

19. Stateful Inspection Firewalls
20. NIDS Complements Firewalls
21. Monitor and Analyze
System Activities
Analysis Levels
22. Signature Analysis
23. Statistical Analysis
24. Signature Algorithms
Pattern Matching
Stateful Pattern Matching
Protocol Decode-based Analysis
Heuristic-Based Analysis
Anomaly-Based Analysis

133

Bill Mansoor
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.

14.

10.

Plugging the Gaps: NAC
and Access Control
Measuring Risk: Audits
Guardian at the Gate: Authentication
and Encryption
Wireless Network Security
Shielding the Wire: Network
Protection
Weakest Link in Security:
User Training
Documenting the Network:
Change Management
Rehearse the Inevitable:
Disaster Recovery
Controlling Hazards: Physical
and Environmental Protection
Know Your Users:
Personnel Security
Protecting Data Flow:
Information and System Integrity
Security Assessments
Risk Assessments
Conclusion

Local Area Network Security


136
137
138
139
141
142

11. Wireless Network Security

142

Chunming Rong and Erdal Cayirci

143

1.

145
146
146
147
148
148

149

Dr. Pramod Pandya
1.
2.
3.

4.
5.
6.
7.
8.
9.
10.
11.

12.
13.
14.
15.
16.
17.

Identify network threats
Disruptive
Unauthorized Access
Establish Network Access Controls
Risk Assessment
Listing Network Resources
Threats
Security Policies
The Incident-handling Process
Secure Design Through Network
Access Controls
Ids Defined
NIDS: Scope and Limitations
A Practical Illustration of NIDS

UDP Attacks
TCP SYN (Half-Open) Scanning
Some Not-So-Robust Features
of NIDS
Firewalls
Firewall Security Policy
Configuration Script for sf Router
Dynamic Nat Configuration
The Perimeter
Access List Details
Types of Firewalls
Packet Filtering: IP Filtering Routers

150
150
150
150
151
151
151
151
152
152
153
154
154
154
155
156
158

159
160
160
160
162
162
162

12.

163
163
163
163
164
164
164
164
164
165
165
166
166

169

Cellular Networks
Cellular Telephone Networks
802.11 Wireless LANs
2. Wireless Ad Hoc Networks

Wireless Sensor Networks
Mesh Networks
3. Security Protocols
WEP
WPA and WPA2
SPINS: Security Protocols for
Sensor Networks
4. Secure Routing
SEAD
Ariadne
ARAN
SLSP
5. Key Establishment
Bootstrapping
Key Management
References

169
170
170
171
171
171
172
172
173
173
175
175
176

176
177
177
177
178
181

Cellular Network Security

183

Peng Liu, Thomas F. LaPorta and
Kameswari Kotapati
1. Introduction
2. Overview of Cellular Networks
Overall Cellular Network
Architecture
Core Network Organization
Call Delivery Service
3. The State of the Art of Cellular
Network Security
Security in the Radio Access
Network
Security in Core Network
Security Implications of Internet
Connectivity
Security Implications of PSTN
Connectivity

183

184
184
185
185
186
186
187
188
188


x

Contents

4.

Cellular Network Attack Taxonomy
Abstract Model
Abstract Model Findings
Three-Dimensional Attack
Taxonomy
5. Cellular Network Vulnerability
Analysis
Cellular Network Vulnerability
Assessment Toolkit (CAT)
Advanced Cellular Network
Vulnerability Assessment
Toolkit (aCAT)
Cellular Network Vulnerability

Assessment Toolkit for evaluation
(eCAT)
6. Discussion
References

13.

RFID Security

189
189
189
192
193
195
198
199
201
202

205

Chunming Rong and Erdal Cayirci
1.

RFID Introduction
RFID System Architecture
RFID Standards
RFID Applications
2. RFID Challenges

Counterfeiting
Sniffing
Tracking
Denial of Service
Other Issues
Comparison of All Challenges
3. RFID Protections
Basic RFID System
RFID System Using Symmetric-Key
Cryptography
RFID System Using Public-key
Cryptography
References

205
205
207
208
209
209
209
209
210
210
212
212
212
215
217
219


Part II
Managing Information Security
14.

Information Security Essentials
for IT Managers, Protecting
Mission-Critical Systems

Impact of Security Breaches
Protecting Mission-critical Systems
Information Assurance
Information Risk Management
Defense in Depth
Contingency Planning
3. Information Security from
the Ground Up
Physical Security
Data Security
Systems and Network Security
Business Communications Security
Wireless Security
Web and Application Security
Security Policies and Procedures
Security Employee Training
and Awareness
4. Security Monitoring
and Effectiveness
Security Monitoring Mechanisms
Incidence Response and Forensic

Investigations
Validating Security Effectiveness
References

251
251
252

Security Management Systems

255

2.

15.

Information Security Essentials
for IT Managers, Overview
Scope of Information Security
Management
CISSP Ten Domains of Information
Security
What is a Threat?
Common Attacks

236
236
237
239
241

242
246
247
248
249
250

Joe Wright and Jim Harmening
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.

Security Management
System Standards
Training Requirements
Principles of Information Security
Roles and Responsibilities
of Personnel
Security Policies
Security Controls
Network Access
Risk Assessment
Incident Response

Summary

255
256
256
256
256
257
257
257
258
258

16. Information Technology Security
Management
259
Rahul Bhasker and Bhushan Kapoor

225

1.

Albert Caballero
1.

231
231
231
231
233

233

225
225

2.

225
227
228

3.

Information Security Management
Standards
Federal Information Security
Management Act
International Standards Organization
Other Organizations Involved
in Standards
Information Technology
security aspects
Security Policies and Procedures
IT Security Processes
Conclusion

259
259
260
260

260
261
263
267


xi

Contents

17.

Identity Management

269

Dr. Jean-Marc Seigneur and Dr. Tewfiq El
Malika
1.
2.

Introduction
Evolution of Identity Management
Requirements
Digital Identity Definition
Identity Management Overview
Privacy Requirement
User-Centricity
Usability Requirement
3. The Requirements Fulfilled

by Current Identity Management
Technologies
Evolution of Identity Management
Identity 2.0
4. Identity 2.0 for Mobile Users
Mobile Web 2.0
Mobility
Evolution of Mobile Identity
The Future of Mobile User-Centric
Identity Management in an Ambient
Intelligence World
Research Directions
5. Conclusion

18.

Intrusion Prevention and
Detection Systems

Computer Forensics

307

Scott R. Ellis
269
269
270
270
272
272

273
274
274
278
286
286
287
287
290
292
292

293

Christopher Day
1. What is an “Intrusion,” Anyway?
Physical Theft
Abuse of Privileges (The Insider Threat)
2. Unauthorized Access by an
Outsider
3. Malware Infection
4. The Role of the “0-day”
5. The Rogue’s Gallery:
Attackers and Motives
6. A Brief Introduction to TCP/IP
7. The TCP/IP data Architecture and
Data Encapsulation
8. Survey of Intrusion Detection
and Prevention Technologies
9. Anti-Malware Software

10. Network-based Intrusion
Detection Systems
11. Network-based Intrusion
Prevention Systems
12. Host-based Intrusion
Prevention Systems
13. Security Information
Management Systems
14. Network Session Analysis
15. Digital Forensics
16. System Integrity Validation
17. Putting it all Together

19.

293
293
293
294
294
295
296
297
298
300
301
302
303
304
304

304
305
306
306

1. What is Computer Forensics?
2. Analysis of Data
Computer Forensics and Ethics,
Green Home Plate Gallery View
Database Reconstruction
3. Computer Forensics in the Court
System
4. Understanding Internet History
5. Temporary Restraining Orders
and Labor Disputes
Divorce
Patent Infringement
When to Acquire, When to
Capture Acquisition
Creating Forensic Images Using
Software and Hardware
Write Blockers
Live Capture of Relevant Files
Redundant Array of Independent
(or Inexpensive) Disks (RAID)
File System Analyses
NTFS
The Role of the Forensic Examiner
in Investigations and File
Recovery

Password Recovery
File Carving
Things to Know: How Time stamps
Work
Experimental Evidence
Email Headers and Time stamps,
Email Receipts, and Bounced
Messages
Steganography “Covered Writing”
5. First Principles
6. Hacking a Windows XP Password
Net User Password Hack
Lanman Hashes and Rainbow
Tables
Password Reset Disk
Memory Analysis and the Trojan
Defense
User Artifact Analysis
Recovering Lost and Deleted Files
Email
Internet History
7. Network Analysis
Protocols
Analysis
8. Computer Forensics Applied
Tracking. Inventory, Location
of Files, Paperwork, Backups,
and So On
Testimonial
Experience Needed

Job Description, Technologist

307
308
309
310
310
312
312
313
313
313
313
314
314
314
315
315
317
318
320
321
322
324
325
325
325
325
326
326

326
327
327
327
328
328
328
329
329
329
329
329


xii

Contents

Job Description Management
Commercial Uses
Solid Background
Education/Certification
Programming and Experience
Publications
9. Testifying as an Expert
Degrees of Certainty
Certainty Without Doubt
10. Beginning to End in Court
Defendants, Plaintiffs,
and Prosecutors

Pretrial Motions
Trial: Direct and Cross-Examination
Rebuttal
Surrebuttal
Testifying: Rule 702. Testimony
by Experts
Correcting Mistakes: Putting Your
Head in the Sand

20.

Network Forensics

330
330
330
330
331
331
332
332
334
334

11.
12.

13.

334

335
335
335
335

14.
15.

335
336

339

Yong Guan
1. Scientific Overview
2. The Principles of Network Forensics
3. Attack Traceback and Attribution
IP Traceback
Stepping-Stone Attack Attribution
4. Critical Needs Analysis
5. Research Directions
VoIP Attribution

21.

Firewalls

16.
17.


339
340
341
341
344
346
346
346

18.

19.

349

Dr. Errin W. Fulp
1.
2.
3.
4.
5.

6.

7.
8.
9.
10.

Network Firewalls

Firewall Security Policies
Rule-Match Policies
A Simple Mathematical Model
for Policies, Rules, and Packets
First-match Firewall Policy
Anomalies
Policy Optimization
Policy Reordering
Combining Rules
Default Accept or Deny?
Firewall Types
Packet Filter
Stateful Packet Firewalls
Application Layer Firewalls
Host and Network Firewalls
Software and Hardware Firewall
Implementations
Choosing the Correct Firewall
Firewall Placement and
Network Topology
Demilitarized Zones
Perimeter Networks

349
350
351

20.
21.


22.

Two-Router Configuration
Dual-Homed Host
Network Configuration Summary
Firewall Installation and
Configuration
Supporting Outgoing Services
Through Firewall Configuration
Forms of State
Payload Inspection
Secure External Services
Provisioning
Network Firewalls for Voice and
Video Applications
Packet Filtering H.323
Firewalls and Important
Administrative Service Protocols
Routing Protocols
Internet Control Message
Protocol
Network Time Protocol
Central Log File Management
Dynamic Host Configuration
Protocol
Internal IP Services Protection
Firewall Remote Access
Configuration
Load Balancing and
Firewall Arrays

Load Balancing in Real Life
How to Balance the Load
Advantages and Disadvantages
of Load Balancing
Highly Available Firewalls
Load Balancer Operation
Interconnection of Load Balancers
and Firewalls
Firewall Management
Conclusion

Penetration Testing

351

Sanjay Bavisi

352
352
352
353
353
353
354
354
354
355

1. What is Penetration Testing?
2. How does Penetration Testing

Differ from an Actual “Hack?”
3. Types of Penetration Testing
4. Phases of Penetration Testing
The Pre-Attack Phase
The Attack Phase
The Post-Attack Phase
5. Defining What’s Expected
6. The Need for a Methodology
7. Penetration Testing
Methodologies
8. Methodology in Action
EC-Council LPT Methodology
9. Penetration Testing Risks
10. Liability Issues
11. Legal Consequences

355
355
356
357
357

357
358
358
358
359
359
360
360

360
361
361
361
362
362
362
363
363
364
365
365
365
366
366
366
366
367
367

369
369
370
371
373
373
373
373
374
375

375
376
376
378
378
379


xiii

Contents

12. “Get out of jail free” Card
13. Penetration Testing Consultants
14. Required Skill Sets
15. Accomplishments
16. Hiring a Penetration Tester
17. Why Should a Company
Hire You?
Qualifications
Work Experience
Cutting-Edge Technical Skills
Communication Skills
Attitude
Team Skills
Company Concerns
18. All’s Well that Ends Well

23. What Is Vulnerability
Assessment?


379
379
380
380
380
381
381
381
381
381
381
381
381
382

383

Part III
Encryption Technology
24.

Data Encryption
Dr. Bhushan Kapoor and Dr. Pramod
Pandya
1.

2.

3.


Almantas Kakareka
1. Reporting
2. The “It Won’t Happen to Us” Factor
3. Why Vulnerability Assessment?
4. Penetration Testing Versus
Vulnerability Assessment
5. Vulnerability Assessment Goal
6. Mapping the Network
7. Selecting the Right Scanners
8. Central Scans Versus Local Scans
9. Defense in Depth Strategy
10. Vulnerability Assessment Tools
Nessus
GFI LANguard
Retina
Core Impact
ISS Internet Scanner
X-Scan
Sara
QualysGuard
SAINT
MBSA
11. Scanner Performance
12. Scan Verification
13. Scanning Cornerstones
14. Network Scanning
Countermeasures
15. Vulnerability Disclosure Date
Find Security Holes Before

They Become Problems
16. Proactive Security Versus Reactive
Security
17. Vulnerability Causes
Password Management Flaws
Fundamental Operating
System Design Flaws
Software Bugs
Unchecked User Input
18. DIY Vulnerability Assessment
19. Conclusion

383
383
384
384
385
385
386
387
388
388
388
389
389
389
389
389
389
389

389
389
390
390
390

4.

5.

390
391
391
392
392
392
392
392
392
393
393

397

6.

7.
8.
9.


Need for Cryptography
Authentication
Confidentiality
Integrity
Nonrepudiation
Mathematical Prelude to Cryptography
Mapping or Function
Probability
Complexity
Classical Cryptography
The Euclidean Algorithm
The Extended Euclidean Algorithm
Modular Arithmetic
Congruence
Residue Class
Inverses
Fundamental Theorem
of Arithmetic
Congruence Relation Defined
Substitution Cipher
Transposition Cipher
Modern Symmetric Ciphers
S-Box
P-Boxes
Product Ciphers
Algebraic Structure
Definition Group
Definitions of Finite and Infinite
Groups (Order of a Group)
Definition Abelian Group

Examples of a Group
Definition: Subgroup
Definition: Cyclic Group
Rings
Definition: Field
Finite Fields GF(2n)
Modular Polynomial Arithmetic
Over GF(2)
Using a Generator to Represent
the Elements of GF(2n)
GF(23) Is a Finite Field
The Internal Functions of Rijndael
in AES Implementation
Mathematical Preliminaries
State
Use of Modern Block Ciphers
The Electronic Code Book (ECB)
Cipher-Block Chaining (CBC)
Public-key Cryptography
Review: Number Theory
Cryptanalysis of RSA
Factorization Attack

398
398
398
398
398
398
398

398
398
399
399
399
399
400
400
400
400
401
401
402
402
403
403
404
404
404
404
404
404
405
405
405
405
405
406
406
407

407
408
408
412
412
412
412
412
416
416


xiv

Contents

10.
11.

Diffie-Hellman Algorithm
Elliptic Curve Cryptosystems
An Example
Example of Elliptic Curve Addition
EC Security
12. Message Integrity and
Authentication
Cryptographic Hash Functions
Message Authentication
Digital Signature
Message Integrity Uses a Hash

Function in Signing the Message
RSA Digital Signature Scheme
RSA Digital Signature and
the Message Digest
13. Summary
References

25.

Satellite Encryption

417
417
418
418
419
419
419
420
420

26.

420
421
421

27.
423


2.

Satellite Encryption Policy

425

3.

Implementing Satellite Encryption
General Satellite Encryption Issues
Uplink Encryption
Extraplanetary Link Encryption
Downlink Encryption

426
426
428
428
429
430

433

Terence Spies
1.
2.
3.
4.
5.


6.
7.
8.
9.

Cryptographic Background
Digital Signatures
Public Key Encryption
Overview of PKI
The X.509 Model
The History of X.509
The X.509 Certificate Model
X.509 Implementation Architectures
X.509 Certificate Validation
Validation Step 1: Construct the
Chain and Validate Signatures
Validation Step 2: Check Validity
Dates, Policy and Key Usage
Validation Step 3: Consult
Revocation Authorities
X.509 Certificate Revocation
Online Certificate Status Protocol
Server-based Certificate
Validity Protocol
X.509 Bridge Certification
Systems
Mesh PKIs and Bridge CAs
X.509 Certificate Format
X.509 V1 and V2 Format


17.

423

1. The Need for Satellite Encryption

Public Key Infrastructure

12.
13.
14.
15.
16.

420
420

Daniel S. Soper

4. The Future of Satellite Encryption

10.
11.

433
433
434
435
436
436

436
437
439
439
439
440
440
441
442
443
443
444
445

X.509 V3 Format
X.509 Certificate Extensions
Policy Extensions
Certificate Policy
PKI Policy Description
PKI Standards Organizations
IETF PKIX
SDSI/SPKI
IETF OpenPGP
PGP Certificate Formats
PGP PKI Implementations
W3C
Alternative PKI Architectures
Modified X.509 Architectures
Perlman and Kaufman’s User-Centric
PKI

Gutmann’s Plug and Play PKI
Callas’s Self-Assembling PKI
Alternative Key Management Models

Instant-Messaging Security

445
445
446
446
447
448
448
448
448
449
449
449
450
450
450
450
450
450

453

Samuel J. J. Curry
1. Why Should I Care About
Instant Messaging?

2. What is Instant Messaging?
3. The Evolution of Networking
Technologies
4. Game Theory and Instant Messaging
Your Workforce
Generational Gaps
Transactions
5. The Nature of the Threat
Malicious Threat
Vulnerabilities
Man-in-the-Middle Attacks
Phishing and Social Engineering
Knowledge Is the Commodity
Data and Traffic Analysis
Unintentional Threats
Regulatory Concerns
6. Common IM Applications
Consumer Instant Messaging
Enterprise Instant Messaging
Instant-Messaging Aggregators
Backdoors: Instant Messaging
Via Other Means (HTML)
Mobile Dimension
7. Defensive Strategies
8. Instant-messaging Security Maturity
and Solutions
Asset Management
Built-In Security
Content Filtering
Classic Security

Compliance
Data Loss Prevention
Logging
Archival

453
453
454
455
455
456
457
457
458
459
459
459
459
460
460
461
461
461
461
462
462
462
462
463
463

463
463
463
464
464
464
464


xv

Contents

9.

Processes
Instant-Messaging Activation
and Provisioning
Application Review
People
Revise
Audit
10. Conclusion
Example Answers to Key Factors

464

Approach for Obtaining Near
Well-Formed Privacy Policies
6. The Privacy Management Model

How Privacy Policies Are Used
Personal Privacy Policy Negotiation
Personal Privacy Policy Compliance
7. Discussion and Related Work
8. Conclusions and Future Work

464
464
464
464
464
465
466

30. Virtual Private Networks

NET Privacy

1. History
2. Who is in Charge?
3. VPN Types
IPsec
L2TP
L2TPv3
L2F
PPTP VPN
MPLS
MPVPN™
SSH
SSL-VPN

TLS
4. Authentication Methods
Hashing
HMAC
MD5
SHA-1
5. Symmetric Encryption
6. Asymmetric Cryptography
7. Edge Devices
8. Passwords
9. Hackers and Crackers

469

Marco Cremonini , Chiara Braghin and Claudio
Agostino Ardagna
1.
2.
3.

4.
5.

29.

Privacy in the Digital Society
The Origins, The Debate
Privacy Threats
The Economics of Privacy
The Value of Privacy

Privacy and Business
Privacy-Enhancing Technologies
Languages for Access Control
and Privacy Preferences
Data Privacy Protection
Privacy for Mobile Environments
Network Anonymity
Onion Routing
Anonymity Services
Conclusion

Personal Privacy Policies

469
469
471
474
474
475
476
476
478
480
482
483
484
485

487


Dr. George Yee and Larry Korba
1.
2.

3.

4.

5.

Introduction
Content of Personal Privacy Policies
Privacy Legislation and Directives
Requirements from Privacy Principles
Privacy Policy Specification
Semiautomated Derivation
of Personal Privacy Policies
An Example
Retrieval from a Community of Peers
Specifying Well-formed Personal
Privacy Policies
Unexpected Outcomes
Outcomes From the Way the
Matching Policy Was Obtained
Preventing Unexpected Negative
Outcomes
Definition 1
Definition 2
Rules for Specifying Near
Well-Formed Privacy Policies


507

Jim Harmening and Joe Wright

Part IV
Privacy and Access Management
28.

497
497
497
499
502
502
505

487
488
488
488
490
490
492
493
494
494
494
496
496

496
496

31.

Identity Theft

508
511
512
512
512
513
513
513
514
514
514
514
514
515
515
515
515
515
516
516
516
516
517


519

Markus Jacobsson and Alex Tsow
1.

Experimental Design
Authentic Payment Notification:
Plain Versus Fancy Layout
Strong Phishing Message: Plain
Versus Fancy Layout
Authentic Promotion: Effect of
Small Footers
Weak Phishing Message
Authentic Message
Login Page
Login Page: Strong and Weak
Content Alignment
Login Page: Authentic and Bogus
(But Plausible) URLs
Login Page: Hard and Soft
Emphasis on Security
Bad URL, with and without SSL
and Endorsement Logo
High-Profile Recall Notice

520
522
525
525

527
528
528
529
532
532
535
535


xvi

Contents

Low-Profile Class-Action Lawsuit
2. Results and Analysis
3. Implications for Crimeware
Example: Vulnerability of Web-Based
Update Mechanisms
Example: The Unsubscribe
Spam Attack
The Strong Narrative Attack
4. Conclusion

32. VoIP Security

535
535
546


11.

Management Access: Separation of
Functions
Limit Tool Access
Secure Management Interfaces
12. Host Access: Partitioning
S_ID Checking
13. Data Protection: Replicas
Erasure
Potential Vulnerabilities and Threats
Physical Attacks
Management Control Attacks
Host Attacks
World Wide Name Spoofing
Man-in-the-Middle Attacks
E-Port Replication Attack
Denial-of-Service Attacks
Session Hijacking Attacks
15. Encryption in Storage
The Process
Encryption Algorithms
Key Management
Configuration Management
16. Application of Encryption
Risk Assessment and Management
Modeling Threats
Use Cases for Protecting Data
at Rest
Use Considerations

Deployment Options
17. Conclusion
References

547
547
548
548

551

Dan Wing and Harsh Kupwade Patil
1.

Introduction
VoIP Basics
2. Overview of Threats
Taxonomy of Threats
Reconnaissance of VoIP Networks
Denial of Service
Loss of Privacy
Exploits
3. Security in VoIP
Preventative Measures
Reactive
4. Future Trends
Forking Problem in SIP
Security in Peer-to-Peer SIP
End-to-End Identity with SBCs
5. Conclusion


551
551
553
553
553
554
555
557
558
558
559
560
560
561
563
564

Part V
Storage Security
33.

SAN Security

34. Storage Area Networking
Devices Security
567

2.
3.

4.
5.
6.
7.
8.
9.
10.

Organizational Structure
AAA
Restricting Access to Storage
Access Control Lists (ACL)
and Policies
Data Integrity Field (DIF)
Physical Access
Change Management
Password Policies
Defense in Depth
Vendor Security Review
Data Classification
Security Management
Security Setup
Unused Capabilities
Auditing
Updates
Monitoring
Security Maintenance

1. What is a SAN?
2. SAN Deployment Justifications

3. The Critical Reasons for SAN Security
Why Is SAN Security Important?
4. SAN Architecture and Components
SAN Switches
5. SAN General Threats and Issues
SAN Cost: A Deterrent to Attackers
Physical Level Threats, Issues,
and Risk Mitigation
Logical Level Threats, Vulnerabilities,
and Risk Mitigation
6. Conclusion

567
568
569
570
570
571
571
571
571
571
571
572
572
572
572
572
572
572


581
582
582
588
589

591

Robert Rounsavall

John McGowan, Jeffrey Bardin and
John McDonald
1.

573
573
573
573
574
574
574
575
575
575
575
576
576
576
577

577
577
577
578
579
580
580
580
580

35.

Risk Management

591
591
592
592
593
593
594
594
594
596
603

605

Sokratis K. Katsikas
1. The Concept of Risk

2. Expressing and Measuring Risk
3. The Risk Management Methodology
Context Establishment

606
606
609
609


xvii

Contents

Risk Assessment
Risk Treatment
Risk Communication
Risk Monitoring and Review
Integrating Risk Management into the
System Development Life Cycle
Critique of Risk Management
as a Methodology
Risk Management Methods
4. Risk Management Laws and
Regulations
5. Risk Management Standards
6. Summary

610
612

614
614

4.

614
615
616
620
623
625

5.

38.

Physical Security Essentials

Homeland Security
1.

629

William Stallings
1.
2.

Overview
Physical Security Threats
Natural Disasters

Environmental Threats
Technical Threats
Human-Caused Physical Threats
3. Physical Security Prevention
and Mitigation Measures
Environmental Threats
Technical Threats
Human-Caused Physical Threats
4. Recovery from Physical Security
Breaches
5. Threat Assessment, Planning,
and Plan Implementation
Threat Assessment
Planning and Implementation
6. Example: A Corporate Physical
Security Policy
7. Integration of Physical and
Logical Security
References

37.

Biometrics

629
630
630
631
633
634


3.

Relevant Standards
Biometric System Architecture
Data Capture
Signal Processing
Matching
Data Storage
Decision
Adaptation
Using Biometric Systems
Enrollment

3.

636
636
636
637
637

645

Luther Martin
1.
2.

2.


634
634
635
635

639
643

646
647
648
648
649
649
649
652
652
652

653
654
655
655
656
656
657
658
659

661


Rahul Bhaskar Ph.D. and Bhushan Kapoor

Part VI
Physical Security
36.

Authentication
Identification
Security Considerations
Error Rates
Doddington’s Zoo
Birthday Attacks
Comparing Technologies
Storage of Templates
Conclusion

4.

39.

Statutory Authorities
The USA PATRIOT Act of 2001
(PL 107-56)
The Aviation and Transporation
Security Act of 2001 (PL 107-71)
Enhanced Border Security and
Visa Entry Reform Act of 2002
(PL 107-173)
Public Health Security, Bioterrorism

Preparedness & Response Act
of 2002 (PL 107-188)
Homeland Security Act of 2002
(PL 107-296)
E-Government Act of 2002
(PL 107-347)
Homeland Security Presidential
Directives
Organizational Actions
Department of Homeland
Security Subcomponents
State and Federal Organizations
The Governor’s Office of Homeland
Security
California Office of Information
Security and Privacy Protection
Private Sector Organizations
for Information Sharing
Conclusion

Information Warfare

661
661
663
663
664
665
666
667

669
669
669
670
670
670
674

677

Jan Eloff and Anna Granova
1.
2.
3.
4.
5.
6.

Information Warfare Model
Information Warfare Defined
IW: Myth or Reality?
Information Warfare: Making
IW Possible
Offensive Strategies
Preventative Strategies
Legal Aspects of IW
Terrorism and Sovereignty
Liability Under International Law
Remedies Under International Law
Developing Countries Response


677
678
678
680
680
685
686
686
686
687
689


xviii

Contents

7.
8.

Holistic View of Information
Warfare
Conclusion

689
690
3.

Part VII

Advanced Security
40.

Security Through Diversity

693

Kevin Noble
1. Ubiquity
2. Example Attacks Against Uniformity
3. Attacking Ubiquity With Antivirus Tools
4. The Threat of Worms
5. Automated Network Defense
6. Diversity and the Browser
7. Sandboxing and Virtualization
8. DNS Example of Diversity
through Security
9. Recovery from Disaster is Survival
10. Conclusion

41.

Reputation Management

693
694
694
695
697
698

698

42.

Content Filtering

701
7.
702
704
708
711
711
713
714
715
716
717
719
720
720
720

723

Peter Nicoletti
1. The Problem with Content
Filtering
2. User Categories, Motivations,
and Justifications

Schools
Commercial Business
Financial Organizations
Healthcare Organizations
Internet Service Providers

5.
6.

699
699
700

Dr. Jean-Marc Seigneur
1. The Human Notion of Reputation
2. Reputation Applied to the
Computing World
3. State of the Art of Attack-resistant
Reputation Computation
4. Overview of Current Online
Reputation Service
eBay
Opinity
Rapleaf
Venyo
TrustPlus ؉ Xing ؉ ZoomInfo ؉
SageFire
Naymz ϩ Trufina
The GORB
ReputationDefender

Summarizing Table
5. Conclusion

4.

723
724
725
725
725
725
725

U.S. Government
Other Governments
Libraries
Parents
Content Blocking Methods
Banned Word Lists
URL Block
Category Block
Bayesian Filters
Safe Search Integration to Search
Engines with Content Labeling
Content-Based Image Filtering
(CBIF)
Technology and Techniques for
Content-Filtering Control
Internet Gateway-Based Products/
Unified Threat Appliances

Categories
Legal Issues
Federal Law: ECPA
CIPA: The Children’s Internet
Protection Act
The Trump Card of Content
Filtering: The “National Security
Letter”
ISP Content Filtering Might Be
a “Five-Year Felony”
Issues and Problems with Content
Filtering
Bypass and Circumvention
Client-Based Proxies
Open Proxies
HTTP Web-Based Proxies
(Public and Private)
Secure Public Web-Based Proxies
Process Killing
Remote PC Control Applications
Overblocking and Underblocking
Blacklist and Whitelist
Determination
Casual Surfing Mistake
Getting the List Updated
Time-of-Day Policy Changing
Override Authorization Methods
Hide Content in “Noise” or Use
Steganography
Nonrepudiation: Smart Cards,

ID Cards for Access
Warn and Allow Methods
Integration with Spam Filtering tools
Detect Spyware and Malware
in the HTTP Payload
Integration with Directory Servers
Language Support
Financial Considerations Are
Important
Scalability and Usability
Performance Issues
Reporting Is a Critical Requirement
Bandwidth Usage

725
725
725
726
726
726
726
726
727
727
727
728
728
732
735
735

735
736
736
737
737
737
739
739
739
739
739
740
740
740
740
740
740
740
740
740
740
740
740
741
741
741
742
742
742



xix

Contents

Precision Percentage and Recall
9. Related Products
10. Conclusion

43.

Data Loss Protection

742
743
743

745

Ken Perkins
1. Precursors of DLP
2. What is DLP?
3. Where to Begin?
4. Data is Like Water
5. You Don’t Know What You
Don’t Know
Precision versus Recall
6. How Do DLP Applications Work?
7. Eat Your Vegetables
Data in Motion

Data at Rest
Data in Use
8. It’s a Family Affair, Not Just
it Security’s Problem
9. Vendors, Vendors Everywhere!
Who Do You Believe?
10. Conclusion

6.

Previous Logon Information
Configuration
Security Considerations

Appendix B

755
756
756
757
757
758
758
760
762
762

Appendix C

Configuring Authentication

Service on Microsoft
Windows Vista
765

John R. Vacca

2.

3.

4.

5.

Backup and Restore of Stored
Usernames and Passwords
Automation and Scripting
Security Considerations
Credential Security Service Provider
and SSO for Terminal Services Logon
Requirements
Configuration
Security Considerations
TLS/SSL Cryptographic
Enhancements
AES Cipher Suites
ECC Cipher Suites
Schannel CNG Provider Model
Default Cipher Suite Preference
Previous Cipher Suites

Kerberos Enhancements
AES
Read-Only Domain Controller
and Kerberos Authentication
Smart Card Authentication Changes
Additional Changes to Common
Smart Card Logon Scenarios

765
765
765
765
766
766
766
766
766
767
768
769
769
769
769
770
770
771

List of Top Security
Implementation and
Deployment Companies 777


List of SAN Implementation
and Deployment Companies
SAN Security Implementation
and Deployment Companies:

Appendix D

List of Security
Products

Security Software

Appendix E
Appendix F

1.

775

John R. Vacca
747
748
753
754

Part VIII
Appendices
Appendix A


Security Management
and Resiliency

773
774
774

778

781
781

List of Security
Standards

783

List of Miscellaneous
Security Resources

785

Conferences
Consumer Information
Directories
Help and Tutorials
Mailing Lists
News and Media
Organizations
Products and Tools

Research
Content Filtering Links
Other Logging Resources

Appendix G

778

Ensuring Built-in
Frequency Hopping
Spread Spectrum
Wireless Network
Security

Accomplishment
Background
Additional Information

Appendix H Configuring Wireless
Internet Security
Remote Access
Adding the Access Points as RADIUS
Clients to IAS
Adding Access Points to the first
IAS Server

785
785
786
786

786
787
787
788
790
791
791

793
793
793
793

795
795
795


xx

Contents

Scripting the Addition of Access Points to
IAS Server (Alternative Procedure)
Configuring the Wireless Access Points
Enabling Secure WLAN Authentication
on Access Points
Additional Settings to Secure
Wireless Access Points
Replicating RADIUS Client Configuration

to Other IAS Servers

Appendix I Frequently Asked
Questions

799

796

Appendix J

801

797

Index

795
796

798

Glossary

817


Foreword

The Computer and Information Security Handbook is an

essential reference guide for professionals in all realms
of computer security. Researchers in academia, industry,
and government as well as students of security will find
the Handbook helpful in expediting security research
efforts. The Handbook should become a part of every
corporate, government, and university library around the
world.
Dozens of experts from virtually every industry have
contributed to this book. The contributors are the leading
experts in computer security, privacy protection and management, and information assurance. They are individuals who will help others in their communities to address
the immediate as well as long-term challenges faced in
their respective computer security realms.
These important contributions make the Handbook
stand out among all other security reference guides. I
know and have worked with many of the contributors
and can testify to their experience, accomplishments, and
dedication to their fields of work.
John Vacca, the lead security consultant and managing
editor of the Handbook, has worked diligently to see that
this book is as comprehensive as possible. His knowledge, experience, and dedication have combined to create
a book of more than 1400 pages covering every important

aspect of computer security and the assurance of the confidentiality, integrity, and availability of information.
The depth of knowledge brought to the project by all
the contributors assures that this comprehensive handbook will serve as a professional reference and provide a
complete and concise view of computer security and privacy. The Handbook provides in-depth coverage of computer security theory, technology, and practice as it relates
to established technologies as well as recent advancements in technology. Above all, the Handbook explores
practical solutions to a wide range of security issues.
Another important characteristic of the Handbook is
that it is a vendor-edited volume with chapters written by

leading experts in industry and academia who do not support any specific vendor’s products or services. Although
there are many excellent computer security product and
service companies, these companies often focus on promoting their offerings as one-and-only, best-on-themarket solutions. Such bias can lead to narrow decision
making and product selection and thus was excluded
from the Handbook.
Michael Erbschloe
Michael Erbschloe teaches information security courses
at Webster University in St. Louis, Missouri.


This page intentionally left blank


Preface

This comprehensive handbook serves as a professional
reference to provide today’s most complete and concise
view of computer security and privacy available in one
volume. It offers in-depth coverage of computer security
theory, technology, and practice as they relate to established technologies as well as recent advancements. It
explores practical solutions to a wide range of security
issues. Individual chapters are authored by leading experts
in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.
The primary audience for this handbook consists of
researchers and practitioners in industry and academia as
well as security technologists and engineers working with
or interested in computer security. This comprehensive
reference will also be of value to students in upper-division undergraduate and graduate-level courses in computer security.

ORGANIZATION OF THIS BOOK

The book is organized into eight parts composed of 43
contributed chapters by leading experts in their fields, as
well as 10 appendices, including an extensive glossary
of computer security terms and acronyms.

Part 1: Overview of System and Network
Security: A Comprehensive Introduction
Part 1 discusses how to build a secure organization; generating cryptography; how to prevent system intrusions;
UNIX and Linux security; Internet and intranet security;
LAN security; wireless network security; cellular network security, and RFID security. For instance:
Chapter 1, “Building a Secure Organization,” sets the
stage for the rest of the book by presenting insight
into where to start building a secure organization.
Chapter 2, “A Cryptography Primer,” provides an overview of cryptography. It shows how communications
may be encrypted and transmitted.
Chapter 3, “Preventing System Intrusions,” discusses how
to prevent system intrusions and where an

unauthorized penetration of a computer in your enterprise or an address in your assigned domain can occur.
Chapter 4, “Guarding Against Network Intrusions,”
shows how to guard against network intrusions by
understanding the variety of attacks, from exploits to
malware and social engineering.
Chapter 5, “UNIX and Linux Security,” discusses how
to scan for vulnerabilities; reduce denial-of-service
(DoS) attacks; deploy firewalls to control network
traffic; and build network firewalls.
Chapter 6, “Eliminating the Security Weakness of Linux
and UNIX Operating Systems,” presents an introduction to securing UNIX in general and Linux in
particular, providing some historical context and

describing some fundamental aspects of the secure
operating system architecture.
Chapter 7, “Internet Security,” shows you how cryptography can be used to address some of the security
issues besetting communications protocols.
Chapter 8, “The Botnet Problem,” describes the botnet
threat and the countermeasures available to network
security professionals.
Chapter 9, “Intranet Security,” covers internal security
strategies and tactics; external security strategies and
tactics; network access security; and Kerberos.
Chapter 10, “Local Area Network Security,” discusses
network design and security deployment as well as
ongoing management and auditing.
Chapter 11, “Wireless Network Security,” presents an
overview of wireless network security technology;
how to design wireless network security and plan for
wireless network security; how to install, deploy, and
maintain wireless network security; information warfare countermeasures: the wireless network security
solution; and wireless network security solutions and
future directions.
Chapter 12, “Cellular Network Security,” addresses
the security of the cellular network; educates readers on the current state of security of the network
and its vulnerabilities; outlines the cellular network
specific attack taxonomy, also called three-dimensional attack taxonomy; discusses the vulnerability
assessment tools for cellular networks; and provides


xxiv

insights into why the network is so vulnerable and

why securing it can prevent communication outages
during emergencies.
Chapter 13, “RFID Security,” describes the RFID tags
and RFID reader and back-end database in detail.

Part 2: Managing Information Security
Part 2 discusses how to protect mission-critical systems;
deploy security management systems, IT security, ID
management, intrusion detection and prevention systems,
computer forensics, network forensics, firewalls, and penetration testing; and conduct vulnerability assessments.
For instance:
Chapter 14, “Information Security Essentials for IT
Managers: Protecting Mission-Critical Systems,”
discusses how security goes beyond technical
controls and encompasses people, technology, policy,
and operations in a way that few other business
objectives do.
Chapter 15, “Security Management Systems,” examines documentation requirements and maintaining
an effective security system as well as conducting
assessments.
Chapter 16, “Information Technology Security
Management,” discusses the processes that are supported with enabling organizational structure and
technology to protect an organization’s information
technology operations and IT assets against internal
and external threats, intentional or otherwise.
Chapter 17, “Identity Management,” presents the evolution of identity management requirements. It also
surveys how the most advanced identity management
technologies fulfill present-day requirements. It discusses how mobility can be achieved in the field of
identity management in an ambient intelligent/
ubiquitous computing world.

Chapter 18, “Intrusion Prevention and Detection
Systems,” discusses the nature of computer system
intrusions, the people who commit these attacks, and
the various technologies that can be utilized to detect
and prevent them.
Chapter 19, “Computer Forensics,” is intended to provide an in-depth familiarization with computer forensics as a career, a job, and a science. It will help you
avoid mistakes and find your way through the many
aspects of this diverse and rewarding field.
Chapter 20, “Network Forensics,” helps you
determine the path from a victimized network or

Preface

system through any intermediate systems and
communication pathways, back to the point of
attack origination or the person who should be
held accountable.
Chapter 21, “Firewalls,” provides an overview of
firewalls: policies, designs, features, and configurations. Of course, technology is always changing, and
network firewalls are no exception. However, the
intent of this chapter is to describe aspects of
network firewalls that tend to endure over time.
Chapter 22, “Penetration Testing,” describes how
testing differs from an actual “hacker attack” as well
as some of the ways penetration tests are conducted,
how they’re controlled, and what organizations might
look for when choosing a company to conduct a
penetration test for them.
Chapter 23, “What Is Vulnerability Assessment?”
covers the fundamentals: defining vulnerability,

exploit, threat, and risk; analyzing vulnerabilities and
exploits; and configuring scanners. It also shows you
how to generate reports, assess risks in a changing
environment, and manage vulnerabilities.

Part 3: Encryption Technology
Part 3 discusses how to implement data encryption, satellite encryption, public key infrastructure, and instantmessaging security. For instance:
Chapter 24, “Data Encryption,” is about the role played
by cryptographic technology in data security.
Chapter 25, “Satellite Encryption,” proposes a method
that enhances and complements satellite encryption’s role in securing the information society. It
also covers satellite encryption policy instruments;
implementing satellite encryption; misuse of satellite encryption technology; and results and future
directions.
Chapter 26, “Public Key Infrastructure,” explains the
cryptographic background that forms the foundation
of PKI systems; the mechanics of the X.509 PKI
system (as elaborated by the Internet Engineering
Task Force); the practical issues surrounding the
implementation of PKI systems; a number of alternative PKI standards; and alternative cryptographic
strategies for solving the problem of secure public
key distribution.
Chapter 27, “Instant-Messaging Security,” helps you
develop an IM security plan, keep it current, and
make sure it makes a difference.


×