Chapter 1 Is Thera a Security Problem in Computing?
1.1 What Does"Secure"Mean?
protecting Valuables
Characteristics of Computer lntrusion
1.2 Attacks
Vulnerabilities,Threats,Attacks,and Controls
Method,Opportunity,and Motive
1.3 The Meaning of Computer Security
Security Goals
Vulnerabilities
1.4 Computer Criminals
Amateurs
Crackers or Malicious Hackers
Career Criminals
Terrorists
1.5 Methods of Defense
Controls
Effectiveness of Controls
1.6 Whats Next
Encryption Overview
Hardware and Software Security
Human Controls in Security
Encryption ln-Depth
1.7 Summary
1.8 Terms and Concepts
1.9 Where the Field ls Headed
1.10 To Learn More
1.11 Exercises
Chapter 2 Elementary Cryptography
Chapter 3 Program Security
Chapter 4 Protection in General-Purpose Operating Systems
Chapter 5 Designing Trusted Operating Systems
Chapter 6 Database and Data Mining Security
Chapter 7 Security in Networks
Chapter 8 Administering Security
Chapter 9 The Economics of Cybersecurity
Chapter 10 Privacy in Computing
Chapter 11 Legal and Ethical lssues in Computer Security
Chapter 12 Cryptography Explained
Bibliography