|
Chapter 1 History of Computer Security |
|
|
1 | (12) |
|
1.1 The Dawn of Computer Security |
|
|
2 | (1) |
|
|
3 | (1) |
|
1.3 1980s-Personal Computers |
|
|
4 | (2) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (2) |
|
|
8 | (2) |
|
1.6 Conclusions-The Benefits of Hindsight |
|
|
10 | (1) |
|
|
11 | (2) |
|
Chapter 2 Managing Security |
|
|
13 | (18) |
|
2.1 Attacks and Attackers |
|
|
14 | (1) |
|
|
15 | (6) |
|
|
16 | (1) |
|
|
17 | (2) |
|
|
19 | (2) |
|
2.3 Risk and Threat Analysis |
|
|
21 | (8) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (2) |
|
2.3.5 Common Vulnerability Scoring System |
|
|
26 | (1) |
|
2.3.6 Quantitative and Qualitative Risk Analysis |
|
|
26 | (2) |
|
2.3.7 Countermeasures-Risk Mitigation |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (2) |
|
Chapter 3 Foundations of Computer Security |
|
|
31 | (18) |
|
|
32 | (8) |
|
|
32 | (2) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
3.2 The Fundamental Dilemma of Computer Security |
|
|
40 | (1) |
|
|
40 | (1) |
|
3.4 Principles of Computer Security |
|
|
41 | (4) |
|
|
42 | (1) |
|
3.4.2 The Man-Machine Scale |
|
|
42 | (2) |
|
3.4.3 Complexity vs Assurance |
|
|
44 | (1) |
|
3.4.4 Centralized or Decentralized Controls |
|
|
44 | (1) |
|
|
45 | (2) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
Chapter 4 Identification and Authentication |
|
|
49 | (16) |
|
4.1 Username and Password |
|
|
50 | (1) |
|
4.2 Bootstrapping Password Protection |
|
|
51 | (1) |
|
|
52 | (2) |
|
4.4 Phishing, Spoofing, and Social Engineering |
|
|
54 | (2) |
|
|
55 | (1) |
|
4.5 Protecting the Password File |
|
|
56 | (2) |
|
|
58 | (1) |
|
4.7 Alternative Approaches |
|
|
59 | (4) |
|
|
63 | (1) |
|
|
63 | (2) |
|
|
65 | (22) |
|
|
66 | (1) |
|
5.2 Authentication and Authorization |
|
|
66 | (2) |
|
|
68 | (3) |
|
|
68 | (1) |
|
5.3.2 Access Rights of the Bell-LaPadula Model |
|
|
68 | (2) |
|
5.3.3 Administrative Access Rights |
|
|
70 | (1) |
|
5.4 Access Control Structures |
|
|
71 | (2) |
|
5.4.1 Access Control Matrix |
|
|
71 | (1) |
|
|
72 | (1) |
|
5.4.3 Access Control Lists |
|
|
72 | (1) |
|
|
73 | (1) |
|
5.6 Intermediate Controls |
|
|
74 | (5) |
|
5.6.1 Groups and Negative Permissions |
|
|
74 | (1) |
|
|
75 | (1) |
|
5.6.3 Role-Based Access Control |
|
|
76 | (2) |
|
|
78 | (1) |
|
|
79 | (1) |
|
5.8 Comparing Security Attributes |
|
|
79 | (5) |
|
|
79 | (1) |
|
5.8.2 Abilities in the VSTa Microkernel |
|
|
80 | (1) |
|
5.8.3 Lattice of Security Levels |
|
|
81 | (1) |
|
5.8.4 Multi-level Security |
|
|
82 | (2) |
|
|
84 | (1) |
|
|
84 | (3) |
|
Chapter 6 Reference Monitors |
|
|
87 | (20) |
|
|
88 | (2) |
|
6.1.1 Placing the Reference Monitor |
|
|
89 | (1) |
|
|
90 | (1) |
|
6.2 Operating System Integrity |
|
|
90 | (1) |
|
|
91 | (1) |
|
6.2.2 Controlled Invocation |
|
|
91 | (1) |
|
6.3 Hardware Security Features |
|
|
91 | (8) |
|
|
92 | (1) |
|
6.3.2 A Brief Overview of Computer Architecture |
|
|
92 | (3) |
|
6.3.3 Processes and Threads |
|
|
95 | (1) |
|
6.3.4 Controlled Invocation-Interrupts |
|
|
95 | (1) |
|
6.3.5 Protection on the Intel 80386/80486 |
|
|
96 | (2) |
|
6.3.6 The Confused Deputy Problem |
|
|
98 | (1) |
|
|
99 | (4) |
|
|
100 | (3) |
|
|
103 | (1) |
|
|
104 | (3) |
|
|
107 | (24) |
|
|
108 | (1) |
|
7.1.1 Unix Security Architecture |
|
|
109 | (1) |
|
|
109 | (2) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
111 | (2) |
|
7.3.1 Login and Passwords |
|
|
112 | (1) |
|
7.3.2 Shadow Password File |
|
|
113 | (1) |
|
|
113 | (3) |
|
|
113 | (1) |
|
7.4.2 Default Permissions |
|
|
114 | (1) |
|
7.4.3 Permissions for Directories |
|
|
115 | (1) |
|
|
116 | (3) |
|
7.5.1 Set UserID and Set GroupID |
|
|
117 | (1) |
|
7.5.2 Changing Permissions |
|
|
118 | (1) |
|
7.5.3 Limitations of Unix Access Control |
|
|
119 | (1) |
|
7.6 Instances of General Security Principles |
|
|
119 | (6) |
|
7.6.1 Applying Controlled Invocation |
|
|
119 | (1) |
|
|
120 | (1) |
|
7.6.3 Protection of Devices |
|
|
120 | (1) |
|
7.6.4 Changing the Root of the Filesystem |
|
|
121 | (1) |
|
7.6.5 Mounting Filesystems |
|
|
122 | (1) |
|
7.6.6 Environment Variables |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
125 | (3) |
|
7.7.1 Managing the Superuser |
|
|
125 | (1) |
|
|
126 | (1) |
|
7.7.3 Audit Logs and Intrusion Detection |
|
|
126 | (1) |
|
7.7.4 Installation and Configuration |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (3) |
|
Chapter 8 Windows Security |
|
|
131 | (24) |
|
|
132 | (3) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
8.2 Components of Access Control |
|
|
135 | (7) |
|
|
135 | (2) |
|
|
137 | (2) |
|
|
139 | (2) |
|
|
141 | (1) |
|
|
142 | (3) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (2) |
|
|
145 | (1) |
|
|
145 | (2) |
|
8.5 Task-Dependent Access Rights |
|
|
147 | (3) |
|
|
148 | (1) |
|
8.5.2 User Account Control |
|
|
149 | (1) |
|
|
150 | (3) |
|
|
150 | (1) |
|
8.6.2 Default User Accounts |
|
|
150 | (2) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (2) |
|
Chapter 9 Database Security |
|
|
155 | (22) |
|
|
156 | (2) |
|
|
158 | (4) |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
162 | (5) |
|
9.3.1 The SQL Security Model |
|
|
163 | (1) |
|
9.3.2 Granting and Revocation of Privileges |
|
|
163 | (1) |
|
9.3.3 Access Control through Views |
|
|
164 | (3) |
|
9.4 Statistical Database Security |
|
|
167 | (5) |
|
9.4.1 Aggregation and Inference |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (2) |
|
9.5 Integration with the Operating System |
|
|
172 | (1) |
|
|
173 | (2) |
|
|
175 | (1) |
|
|
175 | (2) |
|
Chapter 10 Software Security |
|
|
177 | (28) |
|
|
178 | (1) |
|
10.1.1 Security and Reliability |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
10.1.4 Change in Environment |
|
|
179 | (1) |
|
10.1.5 Dangers of Abstraction |
|
|
179 | (1) |
|
10.2 Characters and Numbers |
|
|
179 | (4) |
|
10.2.1 Characters (UTF-8 Encoding) |
|
|
179 | (2) |
|
|
181 | (1) |
|
|
181 | (2) |
|
10.3 Canonical Representations |
|
|
183 | (1) |
|
|
184 | (7) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
10.4.4 Double-Free Vulnerabilities |
|
|
187 | (2) |
|
|
189 | (2) |
|
|
191 | (2) |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
194 | (7) |
|
10.7.1 Prevention: Hardware |
|
|
194 | (1) |
|
10.7.2 Prevention: Modus Operandi |
|
|
195 | (1) |
|
10.7.3 Prevention: Safer Functions |
|
|
195 | (1) |
|
10.7.4 Prevention: Filtering |
|
|
195 | (2) |
|
10.7.5 Prevention: Type Safety |
|
|
197 | (1) |
|
10.7.6 Detection: Canaries |
|
|
197 | (1) |
|
10.7.7 Detection: Code Inspection |
|
|
197 | (2) |
|
10.7.8 Detection: Testing |
|
|
199 | (1) |
|
10.7.9 Mitigation: Least Privilege |
|
|
200 | (1) |
|
10.7.10 Reaction: Keeping Up to Date |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
202 | (3) |
|
Chapter 11 Bell-LaPadula Model |
|
|
205 | (14) |
|
11.1 State Machine Models |
|
|
206 | (1) |
|
11.2 The Bell-LaPadula Model |
|
|
206 | (6) |
|
|
207 | (1) |
|
|
208 | (2) |
|
11.2.3 The Basic Security Theorem |
|
|
210 | (1) |
|
|
210 | (1) |
|
11.2.5 Aspects and Limitations of BLP |
|
|
211 | (1) |
|
11.3 The Multics Interpretation of BLP |
|
|
212 | (4) |
|
11.3.1 Subjects and Objects in Multics |
|
|
213 | (1) |
|
11.3.2 Translating the BLP Policies |
|
|
214 | (1) |
|
11.3.3 Checking the Kernel Primitives |
|
|
214 | (2) |
|
|
216 | (1) |
|
|
216 | (3) |
|
Chapter 12 Security Models |
|
|
219 | (16) |
|
|
220 | (1) |
|
12.1.1 Static Integrity Levels |
|
|
220 | (1) |
|
12.1.2 Dynamic Integrity Levels |
|
|
220 | (1) |
|
12.1.3 Policies for Invocation |
|
|
221 | (1) |
|
|
221 | (2) |
|
12.3 The Clark-Wilson Model |
|
|
223 | (2) |
|
12.4 The Harrison-Ruzzo-Ullman Model |
|
|
225 | (3) |
|
12.5 Information-Flow Models |
|
|
228 | (2) |
|
12.5.1 Entropy and Equivocation |
|
|
228 | (1) |
|
12.5.2 A Lattice-Based Model |
|
|
229 | (1) |
|
|
230 | (2) |
|
12.6.1 Properties of Executions |
|
|
231 | (1) |
|
12.6.2 Safety and Liveness |
|
|
232 | (1) |
|
|
232 | (1) |
|
|
233 | (2) |
|
Chapter 13 Security Evaluation |
|
|
235 | (16) |
|
|
236 | (3) |
|
|
239 | (2) |
|
|
241 | (1) |
|
13.4 Information Technology Security Evaluation Criteria |
|
|
242 | (1) |
|
13.5 The Federal Criteria |
|
|
243 | (1) |
|
|
243 | (3) |
|
13.6.1 Protection Profiles |
|
|
244 | (1) |
|
13.6.2 Evaluation Assurance Levels |
|
|
245 | (1) |
|
13.6.3 Evaluation Methodology |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
246 | (1) |
|
13.8 An Effort Well Spent? |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
248 | (1) |
|
|
249 | (2) |
|
|
251 | (24) |
|
|
252 | (4) |
|
|
252 | (1) |
|
|
253 | (1) |
|
14.1.3 Cryptographic Keys |
|
|
254 | (1) |
|
14.1.4 Cryptography in Computer Security |
|
|
255 | (1) |
|
|
256 | (1) |
|
14.3 Integrity Check Functions |
|
|
257 | (3) |
|
14.3.1 Collisions and the Birthday Paradox |
|
|
257 | (1) |
|
14.3.2 Manipulation Detection Codes |
|
|
257 | (2) |
|
14.3.3 Message Authentication Codes |
|
|
259 | (1) |
|
14.3.4 Cryptographic Hash Functions |
|
|
259 | (1) |
|
|
260 | (4) |
|
14.4.1 One-Time Signatures |
|
|
261 | (1) |
|
14.4.2 ElGamal Signatures and DSA |
|
|
261 | (2) |
|
|
263 | (1) |
|
|
264 | (6) |
|
14.5.1 Data Encryption Standard |
|
|
265 | (1) |
|
14.5.2 Block Cipher Modes |
|
|
266 | (2) |
|
|
268 | (1) |
|
14.5.4 ElGamal Encryption |
|
|
269 | (1) |
|
14.6 Strength of Mechanisms |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
273 | (2) |
|
Chapter 15 Key Establishment |
|
|
275 | (22) |
|
|
276 | (1) |
|
15.2 Key Establishment and Authentication |
|
|
276 | (3) |
|
15.2.1 Remote Authentication |
|
|
277 | (1) |
|
|
278 | (1) |
|
15.3 Key Establishment Protocols |
|
|
279 | (4) |
|
15.3.1 Authenticated Key Exchange Protocol |
|
|
279 | (1) |
|
15.3.2 The Diffie-Hellman Protocol |
|
|
280 | (1) |
|
15.3.3 Needham-Schroeder Protocol |
|
|
281 | (1) |
|
15.3.4 Password-Based Protocols |
|
|
282 | (1) |
|
|
283 | (5) |
|
|
285 | (1) |
|
15.4.2 Kerberos and Windows |
|
|
286 | (1) |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
287 | (1) |
|
15.5 Public-Key Infrastructures |
|
|
288 | (5) |
|
|
288 | (1) |
|
15.5.2 Certificates Authorities |
|
|
289 | (1) |
|
15.5.3 X.509/PKIX Certificates |
|
|
289 | (2) |
|
15.5.4 Certificate Chains |
|
|
291 | (1) |
|
|
292 | (1) |
|
15.5.6 Electronic Signatures |
|
|
292 | (1) |
|
15.6 Trusted Computing-Attestation |
|
|
293 | (2) |
|
|
295 | (1) |
|
|
295 | (2) |
|
Chapter 16 Communications Security |
|
|
297 | (22) |
|
|
298 | (1) |
|
|
298 | (1) |
|
|
299 | (1) |
|
16.2 Protocol Design Principles |
|
|
299 | (2) |
|
|
301 | (7) |
|
16.3.1 Authentication Header |
|
|
302 | (1) |
|
16.3.2 Encapsulating Security Payloads |
|
|
302 | (2) |
|
16.3.3 Security Associations |
|
|
304 | (1) |
|
16.3.4 Internet Key Exchange Protocol |
|
|
304 | (2) |
|
|
306 | (1) |
|
|
307 | (1) |
|
|
308 | (1) |
|
16.4 IPsec and Network Address Translation |
|
|
308 | (2) |
|
|
310 | (4) |
|
16.5.1 Implementation Issues |
|
|
312 | (1) |
|
|
313 | (1) |
|
16.6 Extensible Authentication Protocol |
|
|
314 | (2) |
|
|
316 | (1) |
|
|
316 | (3) |
|
Chapter 17 Network Security |
|
|
319 | (20) |
|
|
320 | (2) |
|
|
320 | (1) |
|
17.1.2 TCP Session Hijacking |
|
|
321 | (1) |
|
17.1.3 TCP SYN Flooding Attacks |
|
|
322 | (1) |
|
|
322 | (6) |
|
17.2.1 Lightweight Authentication |
|
|
324 | (1) |
|
17.2.2 Cache Poisoning Attack |
|
|
324 | (1) |
|
17.2.3 Additional Resource Records |
|
|
324 | (1) |
|
17.2.4 Dan Kaminsky's Attack |
|
|
325 | (1) |
|
|
326 | (1) |
|
17.2.6 DNS Rebinding Attack |
|
|
327 | (1) |
|
|
328 | (4) |
|
|
329 | (1) |
|
17.3.2 Stateful Packet Filters |
|
|
330 | (1) |
|
17.3.3 Circuit-Level Proxies |
|
|
330 | (1) |
|
17.3.4 Application-Level Proxies |
|
|
330 | (1) |
|
|
331 | (1) |
|
17.3.6 Perimeter Networks |
|
|
331 | (1) |
|
17.3.7 Limitations and Problems |
|
|
331 | (1) |
|
|
332 | (3) |
|
17.4.1 Vulnerability Assessment |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
336 | (3) |
|
|
339 | (24) |
|
|
340 | (2) |
|
18.1.1 Transport Protocol and Data Formats |
|
|
340 | (1) |
|
|
341 | (1) |
|
|
342 | (1) |
|
18.2 Authenticated Sessions |
|
|
342 | (4) |
|
|
343 | (1) |
|
18.2.2 Cookies and Privacy |
|
|
343 | (1) |
|
|
344 | (2) |
|
18.3 Code Origin Policies |
|
|
346 | (1) |
|
|
347 | (1) |
|
18.4 Cross-Site Scripting |
|
|
347 | (3) |
|
|
349 | (1) |
|
18.4.2 Defending against XSS |
|
|
349 | (1) |
|
18.5 Cross-Site Request Forgery |
|
|
350 | (2) |
|
18.5.1 Authentication for Credit |
|
|
351 | (1) |
|
18.6 JavaScript Hijacking |
|
|
352 | (2) |
|
|
354 | (1) |
|
18.7 Web Services Security |
|
|
354 | (6) |
|
18.7.1 XML Digital Signatures |
|
|
355 | (2) |
|
18.7.2 Federated Identity Management |
|
|
357 | (2) |
|
|
359 | (1) |
|
|
360 | (1) |
|
|
361 | (2) |
|
|
363 | (22) |
|
|
364 | (1) |
|
|
364 | (5) |
|
|
365 | (1) |
|
19.2.2 Temporary Mobile Subscriber Identity |
|
|
365 | (1) |
|
19.2.3 Cryptographic Algorithms |
|
|
366 | (1) |
|
19.2.4 Subscriber Identity Authentication |
|
|
366 | (1) |
|
|
367 | (1) |
|
19.2.6 Location-Based Services |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
369 | (3) |
|
19.3.1 False Base Station Attacks |
|
|
369 | (1) |
|
19.3.2 Cryptographic Algorithms |
|
|
370 | (1) |
|
19.3.3 UMTS Authentication and Key Agreement |
|
|
370 | (2) |
|
19.4 Mobile IPv6 Security |
|
|
372 | (5) |
|
|
373 | (1) |
|
19.4.2 Secure Binding Updates |
|
|
373 | (2) |
|
19.4.3 Ownership of Addresses |
|
|
375 | (2) |
|
|
377 | (4) |
|
|
378 | (1) |
|
|
379 | (2) |
|
|
381 | (1) |
|
|
381 | (2) |
|
|
383 | (1) |
|
|
383 | (2) |
|
Chapter 20 New Access Control paradigms |
|
|
385 | (24) |
|
|
386 | (2) |
|
20.1.1 Paradigm Shifts in Access Control |
|
|
386 | (1) |
|
20.1.2 Revised Terminology for Access Control |
|
|
387 | (1) |
|
|
388 | (2) |
|
|
390 | (1) |
|
20.4 Code-Based Access Control |
|
|
391 | (4) |
|
|
393 | (1) |
|
20.4.2 History-Based Access Control |
|
|
394 | (1) |
|
|
395 | (5) |
|
20.5.1 The Execution Model |
|
|
396 | (1) |
|
20.5.2 The Java 1 Security Model |
|
|
396 | (1) |
|
20.5.3 The Java 2 Security Model |
|
|
397 | (1) |
|
20.5.4 Byte Code Verifier |
|
|
397 | (1) |
|
|
398 | (1) |
|
|
399 | (1) |
|
|
399 | (1) |
|
|
400 | (1) |
|
20.6 .NET Security Framework |
|
|
400 | (5) |
|
20.6.1 Common Language Runtime |
|
|
400 | (1) |
|
20.6.2 Code-Identity-Based Security |
|
|
401 | (1) |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
403 | (1) |
|
|
403 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
20.7 Digital Rights Management |
|
|
405 | (1) |
|
|
406 | (1) |
|
|
406 | (3) |
Bibliography |
|
409 | (14) |
Index |
|
423 | |