AnAlyzing Computer SeCurity
嚜澤nalyzing
?C omputer
?S e cu r i t y
This page intentionally left blank
Analyzing
Computer
S e cu r i t y
A Threat / Vulnerability / Countermeasure Approach
Charles P. Pfleeger???? Shari Lawrence Pfleeger
Pfleeger Consulting Group
Dartmouth College
Upper Saddle River, NJ ? Boston ? Indianapolis ? San Francisco
New York ? Toronto ? Montreal ? London ? Munich ? Paris ? Madrid
Capetown ? Sydney ? Tokyo ? Singapore ? Mexico City
Many of the designations used by manufacturers and sellers to distinguish their products are
claimed as trademarks. Where those designations appear in this book, and the publisher was
aware of a trademark claim, the designations have been printed with initial capital letters or
in all capitals.
Publisher
Paul Boger
The authors and publisher have taken care in the preparation of this book, but make no
?expressed or implied warranty of any kind and assume no responsibility for errors or
?omissions. No liability is assumed for incidental or consequential damages in connection
with or arising out of the use of the information or programs contained herein.
Managing Editor
John Fuller
The publisher offers excellent discounts on this book when ordered in quantity for bulk
?purchases or special sales, which may include electronic versions and/or custom covers and
content particular to your business, training goals, marketing focus, and branding interests.
For more information, please contact:
U.S. Corporate and Government Sales
(800) 382-3419
corpsales@
For sales outside the United States, please contact:
International Sales
international@
Visit us on the Web:
Library of Congress Cataloging-in-Publication Data
Pfleeger, Charles P., 1948每
Analyzing computer security : a threat/vulnerability/countermeasure
approach / Charles P. Pfleeger, Shari Lawrence Pfleeger.
p. cm.
Includes bibliographical references and index.
ISBN 978-0-13-278946-2 (hardcover : alk. paper)
1. Computer security. 2. Data protection. I. Pfleeger, Shari
Lawrence. II. Title.
QA76.9.A25P4485 2011
005.8〞dc23
2011013943
Copyright ? 2012 Pearson Education, Inc.
All rights reserved. Printed in the United States of America. This publication is protected by
copyright, and permission must be obtained from the publisher prior to any prohibited
?reproduction, storage in a retrieval system, or transmission in any form or by any means,
electronic, mechanical, photocopying, recording, or likewise. To obtain permission to use
material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may fax
your request to (201) 236-3290.
ISBN-13: 978-0-13-278946-2
ISBN-10:??? 0-13-278946-9
Text printed in the United States on recycled paper at Courier in Westford, Massachusetts.
Second printing, December 2011
Acquisitions Editor
Bernard Goodwin
Full-Service Production
Manager
Julie B. Nahil
Project Manager
LaurelTech
Copy Editor
Mary Lou Nohr
Proofreader
LaurelTech
Editorial Assistant
Michelle Housley
Cover Designer
Chuti Prasertsith
Compositor
LaurelTech
Contents
1
Foreword
xxiii
Preface
xxvii
About the Authors
xxxv
Security Blanket or Security Theater?
How Dependent Are We on Computers?
What is Computer Security?
The Vulnerability每Threat每Control Paradigm
Threats
Confidentiality
Integrity
Availability
Types of Threats
Types of Attackers
Harm
Risk and Common Sense
Method每Opportunity每Motive
Vulnerabilities
Controls
Analyzing Security with Examples
Conclusion
Exercises
2
6
8
10
11
13
15
16
17
19
24
25
28
30
30
33
34
35
v
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- detailed list of common protocols traditional ip port
- analyzing computer security
- configuring hardware and communication connections step 7
- 7750 sr os system management guide r12 0 nokia
- digi wr routers user guide digi international
- ts3300 series online manual
- aruba instant 8 3 0 x user guide
- second midtermfor ece374 04 08 15 solution
- rt n12 series asus
- 2020 ford explorer owners manual
Related searches
- analyzing arguments worksheet pdf
- analyzing arguments example
- analyzing essay examples
- analyzing data in quantitative research
- analyzing financial statements for dummies
- analyzing qualitative data pdf
- analyzing questions examples
- methods for analyzing qualitative data
- analyzing quantitative data methods
- steps to analyzing data
- analyzing and interpreting data worksheet
- analyzing scientific data worksheets