Computer Security Principles and Practice 5th edition pdf

Page 1


An example of a low-integrity requirement is an anonymous online poll. Many websites, such as news organizations, offer these polls to their users with very few safeguards. However, the inaccuracy and unscientific nature of such polls is well

Figure 4.3 Extended Access Control

Figure 4.4 An Organization of the Access Control

Table 4.3 Access Control System

The ability of one subject to create another subject and to have ‘owner’ access right to that subject can be used to define a hierarchy of subjects. For example, in Figure 4.3, owns and so and are subordinate to By the rules of Table 4.3, can grant and delete to access rights that already has. Thus, a subject can create another subject with a subset of its own access rights. This might be useful, for example, if a subject is invoking an application that is not fully trusted and does not want that application to be able to

Bell-LaPadula (BLP)

4.6

Table 5.2 Fixed Roles in

Table 16.1 Characteristics of Natural

Table 16.3 Saffir/Simpson Hurricane Scale................................................................873

Table 16.4 Temperature Thresholds for Damage to Computing Resources...............875

Figure 16.1 Standard Fire Temperature–Time Relations Used for Testing of Building

Table 16.6 Degrees of Security and Control for Protected Areas

Table 17.1 Comparative Framework ................................................................ ..........908

Table 17.3 Examples of Possible Information Flow to and from the Incident-Handling Service...................................................................... ...................................................935

Table 18.1 Security Audit Terminology (RFC 4949).................................................943

Figure 18.1 Security Audit and Alarms Model (X.816).............................................946

Figure 18.2 Distributed Audit Trail Model (X.816) ...................................................947

Figure 18.3 Common Criteria Security Audit Class Decomposition .........................949

Table 18.2 Auditable Items Suggested in X.816 ........................................................954

Page 30 of 1641

Monitoring Areas Suggested in ISO 27002 ................................................................955

Figure 18.4 Examples of Audit Trails......................................................................... 956

Table 18.4 Windows Event Schema

Elements ...........................................................961

Figure 18.5 Windows System Log Entry

Example ....................................................963

Figure 18.6 .......................................................................... ........................................967

Examples of Syslog Messages.................................................................. ..................967

Table 18.5 UNIX Syslog Facilities and Severity

Levels............................................968

Figure 18.9 Run-Time Environment for Application

Auditing ..................................976

Table 19.1 .......................................................................... .........................................996

Cybercrimes Cited in the Convention on Cybercrime ................................................996

Table 19.2 CERT 2007 E-Crime Watch Survey Results............................................999

Figure 19.2 DRM

Figure 19.4 Common Criteria Privacy Class

Figure 19.6 ACM Code of Ethics and Professional Conduct ...................................1030

Figure 19.8 AITP Standard of

Table 20.1 Types of Attacks on Encrypted

Figure 22.2 Function Modules and Standardized Protocols

Figure 22.3 Simple Example of DKIM

24.4 IEEE 802.11i Wireless LAN

Security .................................................................... .....1255

Figure 24.6 Elements of IEEE

802.11i ..................................................................... 1257

IEEE 802.11i Phases of Operation.................................................................. .................1259

Figure 24.7 IEEE 802.11i Phases of Operation ........................................................1261

Page 34 of 1641

Discovery

Phase ....................................................................... ........................................1263

Figure 24.8 IEEE 802.11i Phases of Operation:

Capability Discovery, Authentication,

A.3 Security Education (Seed)

B.3 Fermat’s and Euler’s

Figure D.1 Pseudorandom Number Generation from a Counter ..............................1360

Figure D.2 ANSI X9.17 Pseudorandom Number

Appendix E: Message Authentication Codes Based on Block Ciphers...............................1369

E.1 Cipher-Based Message Authentication Code (CMAC) ................................................1370

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.