From the Book: PREFACE: When the first edition of this book was published in 1989, viruses and other forms of malicious code were fairly uncommon, the Internet was used largely by just computing professionals, a Clipper was a sailing ship, and computer crime was seldom a headline topic in daily newspapers. In that era most people were unconcerned about--even unaware of--how serious is the threat to security in the use of computers. The use of computers has spread at a rate completely unexpected back then. Now you can bank by computer, order and pay for merchandise, and even commit to contracts by computer. And the uses of computers in business have similarly increased both in volume and in richness. Alas, the security threats to computing have also increased significantly. Why Read This Book Are your data and programs at risk If you answer "yes" to any of the following questions, you have a potential security risk. Have you acquired any new programs within the last year Do you use your computer to communicate electronically with other computers Do you ever receive programs or data from other people Is there any significant program or data item of which you do not have a second copy Relax; you are not alone. Most computer users have a security risk. Being at risk does not mean you should stop using computers. It does mean you should learn more about the risk you face, and how to control that risk. Users and managers of large mainframe computing systems of the 1960s and l970s developed computer security techniques that were reasonably effective against thethreatsof that era. However, two factors have made those security procedures outdated: Personal computer use. Vast numbers of people have become dedicated users of personal computing systems, both for business and pleasure. We try to make applications "user friendly" so that computers can be used by people who know nothing of hardware or programming, just as people who can drive a car do not need to know how to design an engine. Users may not be especially conscious of the security threats involved in computer use; even users who are aware may not know what to do to reduce their risk. Networked remote-access systems. Machines are being linked in large numbers. The Internet and its cousin, the World-Wide Web, seem to double every year in number of users. A user of a mainframe computer may not realize that access to the same machine is allowed to people throughout the world from an almost uncountable number of computing systems. Every computing professional must understand the threats and the countermeasures currently available in computing. This book addresses that need. This book is designed for the student or professional in computing. Beginning at a level appropriate for an experienced computer user, this book describes the security pitfalls inherent in many important computing tasks today. Then, the book explores the controls that can check these weaknesses. The book also points out where existing controls are inadequate and serious consideration must be given to the risk present in the computing situation. Uses of This Book The chapters of this book progress in an orderly manner. After an introduction, the topic of encryption, the process of disguising something written to conceal its meaning, is presented as the first tool in computer security. The book continues through the different kinds of computing applications, their weaknesses, and their controls. The applications areas include: general programs operating systems data base management systems remote access computing multicomputer networks These sections begin with a definition of the topic, continue with a description of the relationship of security to the topic, and conclude with a statement of the current state of the art of computer security research related to the topic. The book concludes with an examination of risk analysis and planning for computer security, and a study of the relationship of law and ethics to computer security. Background required to appreciate the book is an understanding of programming and computer systems. Someone who is a senior or graduate student in computer science or a professional who has been in the field for a few years would have the appropriate level of understanding. Although some facility with mathematics is useful, all necessary mathematical background is developed in the book. Similarly, the necessary material on design of software systems, operating systems, data bases, or networks is given in the relevant chapters. One need not have a detailed knowledge of these areas before reading this book. The book is designed to be a textbook for a one- or two-semester course in computer security. The book functions equally well as a reference for a computer professional. The introduction and the chapters on encryption are fundamental to the understanding of the rest of the book. After studying those pieces, however, the reader can study any of the later chapters in any order. Furthermore, many chapters follow the format of introduction, then security aspects of the topic, then current work in the area. Someone who is interested more in background than in current work can stop in the middle of one chapter and go on to the next. This book has been used in classes throughout the world. Roughly half of the book can be covered in a semester. Therefore, an instructor can design a one-semester course that considers some of the topics of greater interest. What Does This Book Contain This is the revised edition of Security in Computing. It is based largely on the previous version, with many updates to cover newer topics in computer security. Among the salient additions to the new edition are these items: Viruses, worms, Trojan horses, and other malicious code. Complete new section (first half of Chapter 5) including sources of these kinds of code, how they are written, how they can be detected and/or prevented, and several actual examples. Firewalls. Complete new section (end of Chapter 9) describing what they do, how they work, how they are constructed, and what degree of protection they provide. Private e-mail. Complete new section (middle of Chapter 9) explaining exposures in e-mail, kind of protection available, PEM and PGP, key management, and certificates. Clipper, Capstone, Tessera, Mosaic, and key escrow. Several sections, in Chapter 3 as an encryption technology, and Chapter 4 as a key management protocol, and in Chapter 11 as a privacy and ethics issue. Trusted system evaluation. Extensive addition (in Chapter 7) including criteria from the United States, Europe, Canada, and the soon-to-be-released Common Criteria. Program development processes, including ISO 9000 and the SEI CMM. A major section in Chapter 5 gives comparisons between these methodologies. Guidance for administering PC, Unix, and networked environments. In addition to these major changes, there are numerous small changes, ranging from wording changes to subtle notational changes for pedagogic reasons, to replacement, deletion, rearrangement, and expansion of sections. The focus of the book remains the same, however. This is still a book covering the complete subject of computer security. The target audience is college students (advanced undergraduates or graduate students) and professionals. A reader is expected to bring a background in general computing technology; some knowledge of programming, operating systems, and networking is expected, although advanced knowledge in those areas is not necessary. Mathematics is used as appropriate, although a student can ignore most of the mathematical foundation if he or she chooses. Acknowledgments Many people have contributed to the content and structure of this book. The following friends and colleagues have supplied thoughts, advice, challenges, criticism, and suggestions that have influenced my writing of this book: Lance Hoffman, Marv Schaefer, Dave Balenson, Terry Benzel, Curt Barker, Debbie Cooper, and Staffan Persson. Two people from outside the computer security community were very encouraging: Gene Davenport and Bruce Barnes. I apologize if I have forgotten to mention someone else; the oversight is accidental. Lance Hoffman deserves special mention. He used a preliminary copy of the book in a course at George Washington University. Not only did he provide me with suggestions of his own, but his students also supplied invaluable comments from the student perspective on sections that did and did not communicate effectively. I want to thank them for their constructive criticisms. Finally, if someone alleges to have written a book alone, distrust the person immediately. While an author is working 16-hour days on the writing of the book, someone else needs to see to all the other aspects of life, from simple things like food, clothing, and shelter, to complex things like social and family responsibilities. My wife, Shari Lawrence Pfleeger, took the time from her professional schedule so that I could devote my full energies to writing. Furthermore, she soothed me when the schedule inexplicably slipped, when the computer went down, when I had writerÕs block, or when some other crisis beset this project. On top of that, she reviewed the entire manuscript, giving the most thorough and constructive review this book has had. Her suggestions have improved the content, organization, readability, and overall quality of this book immeasurably. Therefore, it is with great pleasure that I dedicate this book to Shari, the other half of the team that caused this book to be written. Charles P. Pfleeger Washington DC
Cited By
- Zhu Y and Yu L (2023). Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology, International Journal of Digital Crime and Forensics, 15:1, (1-16), Online publication date: 29-Aug-2023.
- Canedo E, Bandeira I, Calazans A, Costa P, Cançado E and Bonifácio R (2023). Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners, Requirements Engineering, 28:2, (177-194), Online publication date: 1-Jun-2023.
- Xue T, Wen Y, Luo B, Li G, Li Y, Zhang B, Zheng Y, Hu Y and Meng D (2023). SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics, IEEE Transactions on Dependable and Secure Computing, 20:2, (1104-1123), Online publication date: 1-Mar-2023.
- Sarhan A, Jemmali M and Ben Hmida A Two routers network architecture and scheduling algorithms under packet category classification constraint Proceedings of the 5th International Conference on Future Networks and Distributed Systems, (119-127)
- Kenner A, May R, Krüger J, Saake G and Leich T Safety, security, and configurable software systems Proceedings of the 25th ACM International Systems and Software Product Line Conference - Volume A, (148-159)
- Cotroneo D, De Simone L and Natella R (2021). Timing covert channel analysis of the VxWorks MILS embedded hypervisor under the common criteria security certification, Computers and Security, 106:C, Online publication date: 1-Jul-2021.
- Xue T, Wen Y, Luo B, Zhang B, Zheng Y, Hu Y, Li Y, Li G and Meng D GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark Proceedings of the 36th Annual Computer Security Applications Conference, (582-596)
- Kenner A, Dassow S, Lausberger C, Krüger J and Leich T Using variability modeling to support security evaluations Proceedings of the 14th International Working Conference on Variability Modelling of Software-Intensive Systems, (1-9)
- Corallo A, Lazoi M and Lezzi M (2020). Cybersecurity in the context of industry 4.0, Computers in Industry, 114:C, Online publication date: 1-Jan-2020.
- Chen H, Ciborowska A and Damevski K Using Automated Prompts for Student Reflection on Computer Security Concepts Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education, (506-512)
- Sharma M and Thind S (2019). A Quantum Key Distribution Technique Using Quantum Cryptography, International Journal of Distributed Artificial Intelligence, 11:2, (1-10), Online publication date: 1-Jul-2019.
- Coles-Kemp L and Jensen R Accessing a New Land Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, (1-12)
- Ibrahim M, Kumari S, Das A and Odelu V (2018). Attribute-based authentication on the cloud for thin clients, The Journal of Supercomputing, 74:11, (5813-5845), Online publication date: 1-Nov-2018.
- Wang Y, Zhu Z, Yang B, Guo F and Yu H (2018). Using reliability risk analysis to prioritize test cases, Journal of Systems and Software, 139:C, (14-31), Online publication date: 1-May-2018.
- Tsitsiklis J and Xu K (2018). Delay-Predictability Trade-offs in Reaching a Secret Goal, Operations Research, 66:2, (587-596), Online publication date: 1-Apr-2018.
- Muniz R, Braz L, Gheyi R, Andrade W, Fonseca B and Ribeiro M A Qualitative Analysis of Variability Weaknesses in Configurable Systems with #ifdefs Proceedings of the 12th International Workshop on Variability Modelling of Software-Intensive Systems, (51-58)
- Chen Y, Su L and Xu J (2017). Distributed Statistical Machine Learning in Adversarial Settings, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 1:2, (1-25), Online publication date: 19-Dec-2017.
- Joh H and Malaiya Y (2017). Periodicity in software vulnerability discovery, patching and exploitation, International Journal of Information Security, 16:6, (673-690), Online publication date: 1-Nov-2017.
- Liao R, Balasinorwala S and Raghav Rao H (2017). Computer assisted frauds, Information Systems Frontiers, 19:3, (443-455), Online publication date: 1-Jun-2017.
- Pasquale L, Spoletini P, Salehie M, Cavallaro L and Nuseibeh B (2016). Automating trade-off analysis of security requirements, Requirements Engineering, 21:4, (481-504), Online publication date: 1-Nov-2016.
- Maria R, Rodrigues L and Pinto N ScrumS Proceedings of the 7th International Conference on Management of computational and collective intElligence in Digital EcoSystems, (43-47)
- Matheus R and Janssen M Transparency Dimensions of Big and Open Linked Data Open and Big Data Management and Innovation , (236-246)
- Herley C and Pieters W "If you were attacked, you'd be sorry" Proceedings of the 2015 New Security Paradigms Workshop, (112-123)
- Sion L, Yskout K, van den Berghe A, Scandariato R and Joosen W MASC Proceedings of the Seventh International Workshop on Modeling in Software Engineering, (36-41)
- Herley C (2014). Security, cybercrime, and scale, Communications of the ACM, 57:9, (64-71), Online publication date: 1-Sep-2014.
- Aycock J, Somayaji A and Sullins J The ethics of coexistence Proceedings of the IEEE 2014 International Symposium on Ethics in Engineering, Science, and Technology, (1-4)
- Bodei C, Degano P, Ferrari G, Galletta L and Mezzetti G Formalising security in ubiquitous and cloud scenarios Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management, (1-29)
- Temizkan O, Kumar R, Park S and Subramaniam C (2012). Patch Release Behaviors of Software Vendors in Response to Vulnerabilities, Journal of Management Information Systems, 28:4, (305-338), Online publication date: 1-Apr-2012.
- Gandhi R and Lee S (2011). Discovering Multidimensional Correlations among Regulatory Requirements to Understand Risk, ACM Transactions on Software Engineering and Methodology, 20:4, (1-37), Online publication date: 1-Sep-2011.
- Schmidt H and Jürjens J Connecting security requirements analysis and secure design using patterns and UMLsec Proceedings of the 23rd international conference on Advanced information systems engineering, (367-382)
- Diaz J, Arroyo D and Rodriguez F An approach for adapting moodle into a secure infrastructure Proceedings of the 4th international conference on Computational intelligence in security for information systems, (214-221)
- Corney M, Mohay G and Clark A Detection of anomalies from user profiles generated from system logs Proceedings of the Ninth Australasian Information Security Conference - Volume 116, (23-32)
- Goel S and Lauría E (2010). Quantification, Optimization and Uncertainty Modeling in Information Security Risks, Information Resources Management Journal, 23:2, (33-52), Online publication date: 1-Apr-2010.
- Collins M, Dobson S and Nixon P (2010). A lightweight secure architecture for wireless sensor networks, International Journal of Internet Technology and Secured Transactions, 2:1/2, (122-136), Online publication date: 1-Feb-2010.
- Khatri V and Brown C (2010). Designing data governance, Communications of the ACM, 53:1, (148-152), Online publication date: 1-Jan-2010.
- Omari A, Al-Kasasbeh B and Omari A Dynamic cryptography algorithm for real-time applications DCA-RTA Proceedings of the 3rd International Conference on Applied Mathematics, Simulation, Modelling, Circuits, Systems and Signals, (61-67)
- Eminağaoğlu M, Uçar E and Eren Ş (2009). The positive outcomes of information security awareness training in companies – A case study, Information Security Tech. Report, 14:4, (223-229), Online publication date: 1-Nov-2009.
- Zargayouna M, Balbo F and Haddad S Data driven language for agents secure interaction Proceedings of the Second international conference on Languages, Methodologies, and Development Tools for Multi-Agent Systems, (72-91)
- Fagiolini A, Babboni F and Bicchi A Dynamic distributed intrusion detection for secure multi-robot systems Proceedings of the 2009 IEEE international conference on Robotics and Automation, (2705-2710)
- Wolter C, Menzel M, Schaad A, Miseldine P and Meinel C (2009). Model-driven business process security requirement specification, Journal of Systems Architecture: the EUROMICRO Journal, 55:4, (211-223), Online publication date: 1-Apr-2009.
- Omari A, Al-Kasasbeh B, Al-Qutaish R and Muhairat M A new cryptographic algorithm for the real time applications Proceedings of the 7th WSEAS international conference on Information security and privacy, (33-38)
- Canfora G and Visaggio C Does enforcing anonymity mean decreasing data usefulness? Proceedings of the 4th ACM workshop on Quality of protection, (15-22)
- Pang H and Mouratidis K (2008). Authenticating the query results of text search engines, Proceedings of the VLDB Endowment, 1:1, (126-137), Online publication date: 1-Aug-2008.
- Amer S and Hamilton J Understanding security architecture Proceedings of the 2008 Spring simulation multiconference, (335-342)
- Elahi G and Yu E A goal oriented approach for modeling and analyzing security trade-offs Proceedings of the 26th international conference on Conceptual modeling, (375-390)
- Aciiçmez O, Koç Ç and Seifert J On the power of simple branch prediction analysis Proceedings of the 2nd ACM symposium on Information, computer and communications security, (312-320)
- Yee W and Trockman B Bridging a gap in the proposed personal health record Proceedings of the international workshop on Healthcare information and knowledge management, (49-56)
- Matson M and Ulieru M The 'how' and 'why' of persistent information security Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, (1-4)
- Guimaraes M New challenges in teaching database security Proceedings of the 3rd annual conference on Information security curriculum development, (64-67)
- DeWitt J and Cicalese C Contextual integration Proceedings of the 3rd annual conference on Information security curriculum development, (30-40)
- Schläger C and Nowey T Towards a risk management perspective on AAIs Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business, (41-50)
- Hatebur D, Heisel M and Schmidt H Security engineering using problem frames Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security, (238-253)
- Grediaga Á, Ibarra F, García F, Ledesma B and Brotóns F Application of neural networks in network control and information security Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III, (208-213)
- Haley C, Moffett J, Laney R and Nuseibeh B A framework for security requirements engineering Proceedings of the 2006 international workshop on Software engineering for secure systems, (35-42)
- Kim J, Lee S, Kim M, Seo J and Noh B A security architecture for adapting multiple access control models to operating systems Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V, (922-931)
- North M, George R and North S Computer security and ethics awareness in university environments Proceedings of the 44th annual ACM Southeast Conference, (434-439)
- Cook D, Hartnett J, Manderson K and Scanlan J Catching spam before it arrives Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54, (193-202)
- Robila S and Bredlau C Writing requirements in computer security Proceedings of the 6th conference on Information technology education, (385-386)
- Robila S Distributed computing and computer security education Proceedings of the 6th conference on Information technology education, (383-384)
- Reid R, Platt R and Wei J A teaching module to introduce encryption for web users Proceedings of the 2nd annual conference on Information security curriculum development, (60-65)
- Sharma D, Ma W and Tran D On an IT security framework Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I, (226-232)
- Ma W and Sharma D A multiple agents based intrusion detection system Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I, (205-211)
- Joshi D, Namuduri K and Pendse R (2005). Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks, EURASIP Journal on Wireless Communications and Networking, 2005:4, (579-589), Online publication date: 1-Sep-2005.
- Trappe W, Zhang Y and Nath B MIAMI Proceedings of the 2nd international workshop on Data management for sensor networks, (11-17)
- Kim D, Jung Y and Chung T (2005). PRISM, The Journal of Supercomputing, 33:1, (103-121), Online publication date: 1-Jul-2005.
- Lindskog S, Grinnemo K and Brunstrom A Data protection based on physical separation Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV, (1331-1340)
- Null L (2004). Integrating security across the computer science curriculum, Journal of Computing Sciences in Colleges, 19:5, (170-178), Online publication date: 1-May-2004.
- Haley C, Laney R and Nuseibeh B Deriving security requirements from crosscutting threat descriptions Proceedings of the 3rd international conference on Aspect-oriented software development, (112-121)
- Anderson J (2003). Feature, Computers and Security, 22:4, (308-313), Online publication date: 1-May-2003.
Recommendations
Security for ubiquitous computing
ICISC'04: Proceedings of the 7th international conference on Information Security and CryptologyUbiquitous computing, over a decade in the making, has finally graduated from whacky buzzword through fashionable research topic to something that is definitely and inevitably happening. This will mean revolutionary changes in the way computing affects ...
Composing Security Metrics
Security ProtocolsI have to apologise that, having been asked to set the pace, I have done something inadvertently terrible: I have prepared a presentation and a paper that's approximately in keeping with the theme of the workshop; that is entirely an accident, I have ...
From security protocols to systems security
Proceedings of the 11th international conference on Security ProtocolsPekka Nikander: Do you have any feeling for how much of this system you can model?
Reply: It's a moveable feast: you can choose the boundary. But if you don't have any boundary at all then I don't think you've got enough context...you need to talk about ...