Introduction to Computer Security
, by Bishop, Matt- ISBN: 9780321247445 | 0321247442
- Cover: Hardcover
- Copyright: 10/26/2004
An excellent, beautifully written introduction to the subject of computer security - by a master teacher and practitioner.
Matt Bishop is a professor in the Department of Computer Science at the University of California at Davis
Preface | xxv | ||||
Goals | xxvi | ||||
Philosophy | xxvii | ||||
Organization | xxix | ||||
Differences Between this Book and Computer Security: Art and Science | xxx | ||||
Special Acknowledgment | xxxi | ||||
Acknowledgments | xxxi | ||||
|
1 | (26) | |||
|
1 | (3) | |||
|
2 | (1) | |||
|
3 | (1) | |||
|
4 | (1) | |||
|
4 | (3) | |||
|
7 | (2) | |||
|
8 | (1) | |||
|
9 | (1) | |||
|
10 | (4) | |||
|
11 | (1) | |||
|
12 | (1) | |||
|
12 | (2) | |||
|
14 | (3) | |||
|
14 | (1) | |||
|
15 | (1) | |||
|
16 | (1) | |||
|
17 | (3) | |||
|
18 | (1) | |||
|
19 | (1) | |||
|
20 | (1) | |||
|
21 | (1) | |||
|
22 | (1) | |||
|
22 | (5) | |||
|
27 | (10) | |||
|
27 | (1) | |||
|
28 | (3) | |||
|
31 | (3) | |||
|
33 | (1) | |||
|
34 | (1) | |||
|
35 | (1) | |||
|
35 | (2) | |||
|
37 | (8) | |||
|
37 | (1) | |||
|
38 | (5) | |||
|
43 | (1) | |||
|
43 | (1) | |||
|
44 | (1) | |||
|
45 | (16) | |||
|
45 | (4) | |||
|
49 | (2) | |||
|
51 | (2) | |||
|
53 | (1) | |||
|
54 | (4) | |||
|
55 | (1) | |||
|
55 | (1) | |||
|
56 | (1) | |||
|
56 | (1) | |||
|
57 | (1) | |||
|
58 | (1) | |||
|
58 | (1) | |||
|
59 | (2) | |||
|
61 | (12) | |||
|
61 | (1) | |||
|
62 | (8) | |||
|
62 | (4) | |||
|
66 | (1) | |||
|
66 | (3) | |||
|
69 | (1) | |||
|
70 | (1) | |||
|
70 | (1) | |||
|
71 | (2) | |||
|
73 | (10) | |||
|
73 | (2) | |||
|
75 | (1) | |||
|
75 | (6) | |||
|
77 | (2) | |||
|
79 | (1) | |||
|
80 | (1) | |||
|
81 | (1) | |||
|
81 | (1) | |||
|
82 | (1) | |||
|
83 | (14) | |||
|
83 | (5) | |||
|
86 | (1) | |||
|
87 | (1) | |||
|
88 | (3) | |||
|
90 | (1) | |||
|
91 | (1) | |||
|
92 | (2) | |||
|
94 | (1) | |||
|
95 | (1) | |||
|
95 | (2) | |||
|
97 | (26) | |||
|
97 | (1) | |||
|
98 | (15) | |||
|
99 | (1) | |||
|
100 | (1) | |||
|
101 | (6) | |||
|
107 | (1) | |||
|
108 | (4) | |||
|
112 | (1) | |||
|
113 | (3) | |||
|
114 | (2) | |||
|
116 | (3) | |||
|
118 | (1) | |||
|
119 | (1) | |||
|
119 | (1) | |||
|
120 | (3) | |||
|
123 | (22) | |||
|
124 | (1) | |||
|
124 | (6) | |||
|
125 | (3) | |||
|
128 | (1) | |||
|
129 | (1) | |||
|
130 | (6) | |||
|
131 | (1) | |||
|
132 | (2) | |||
|
134 | (2) | |||
|
136 | (1) | |||
|
136 | (1) | |||
|
136 | (1) | |||
|
137 | (1) | |||
|
137 | (3) | |||
|
138 | (1) | |||
|
139 | (1) | |||
|
140 | (1) | |||
|
141 | (1) | |||
|
142 | (3) | |||
|
145 | (26) | |||
|
145 | (2) | |||
|
145 | (1) | |||
|
146 | (1) | |||
|
146 | (1) | |||
|
147 | (1) | |||
|
147 | (6) | |||
|
148 | (1) | |||
|
148 | (2) | |||
|
150 | (1) | |||
|
151 | (1) | |||
|
152 | (1) | |||
|
153 | (3) | |||
|
156 | (12) | |||
|
156 | (1) | |||
|
157 | (1) | |||
|
158 | (1) | |||
|
159 | (1) | |||
|
160 | (1) | |||
|
161 | (1) | |||
|
162 | (3) | |||
|
165 | (1) | |||
|
166 | (1) | |||
|
167 | (1) | |||
|
168 | (1) | |||
|
168 | (1) | |||
|
169 | (2) | |||
|
171 | (28) | |||
|
171 | (1) | |||
|
172 | (14) | |||
|
174 | (1) | |||
|
175 | (1) | |||
|
176 | (1) | |||
|
177 | (1) | |||
|
178 | (4) | |||
|
182 | (1) | |||
|
183 | (1) | |||
|
184 | (2) | |||
|
186 | (4) | |||
|
186 | (1) | |||
|
187 | (1) | |||
|
188 | (1) | |||
|
189 | (1) | |||
|
190 | (3) | |||
|
190 | (1) | |||
|
191 | (1) | |||
|
191 | (1) | |||
|
191 | (1) | |||
|
192 | (1) | |||
|
192 | (1) | |||
|
192 | (1) | |||
|
193 | (1) | |||
|
193 | (2) | |||
|
195 | (1) | |||
|
196 | (1) | |||
|
196 | (3) | |||
|
199 | (12) | |||
|
199 | (2) | |||
|
201 | (6) | |||
|
201 | (1) | |||
|
202 | (1) | |||
|
202 | (1) | |||
|
203 | (1) | |||
|
204 | (1) | |||
|
205 | (1) | |||
|
206 | (1) | |||
|
206 | (1) | |||
|
207 | (1) | |||
|
208 | (1) | |||
|
208 | (3) | |||
|
211 | (26) | |||
|
211 | (1) | |||
|
212 | (1) | |||
|
213 | (1) | |||
|
214 | (1) | |||
|
215 | (6) | |||
|
218 | (2) | |||
|
220 | (1) | |||
|
221 | (12) | |||
|
221 | (1) | |||
|
222 | (2) | |||
|
224 | (1) | |||
|
225 | (1) | |||
|
226 | (4) | |||
|
230 | (3) | |||
|
233 | (1) | |||
|
233 | (1) | |||
|
234 | (3) | |||
|
237 | (24) | |||
|
237 | (9) | |||
|
238 | (2) | |||
|
240 | (1) | |||
|
241 | (1) | |||
|
241 | (1) | |||
|
242 | (1) | |||
|
242 | (1) | |||
|
243 | (1) | |||
|
243 | (1) | |||
|
244 | (2) | |||
|
246 | (6) | |||
|
247 | (1) | |||
|
248 | (1) | |||
|
249 | (1) | |||
|
250 | (1) | |||
|
251 | (1) | |||
|
252 | (3) | |||
|
253 | (2) | |||
|
255 | (2) | |||
|
257 | (1) | |||
|
258 | (1) | |||
|
258 | (1) | |||
|
259 | (2) | |||
|
261 | (26) | |||
|
261 | (2) | |||
|
263 | (1) | |||
|
263 | (14) | |||
|
264 | (2) | |||
|
266 | (1) | |||
|
266 | (1) | |||
|
267 | (1) | |||
|
267 | (1) | |||
|
268 | (1) | |||
|
269 | (3) | |||
|
272 | (1) | |||
|
272 | (2) | |||
|
274 | (2) | |||
|
276 | (1) | |||
|
277 | (4) | |||
|
278 | (2) | |||
|
280 | (1) | |||
|
281 | (3) | |||
|
282 | (1) | |||
|
282 | (2) | |||
|
284 | (1) | |||
|
284 | (1) | |||
|
285 | (2) | |||
|
287 | (22) | |||
|
287 | (3) | |||
|
290 | (4) | |||
|
290 | (2) | |||
|
292 | (2) | |||
|
294 | (12) | |||
|
296 | (7) | |||
|
303 | (3) | |||
|
306 | (1) | |||
|
306 | (1) | |||
|
307 | (2) | |||
|
309 | (22) | |||
|
309 | (7) | |||
|
311 | (2) | |||
|
313 | (1) | |||
|
314 | (2) | |||
|
316 | (8) | |||
|
316 | (1) | |||
|
317 | (1) | |||
|
318 | (1) | |||
|
319 | (1) | |||
|
320 | (1) | |||
|
320 | (1) | |||
|
320 | (1) | |||
|
321 | (1) | |||
|
321 | (1) | |||
|
322 | (1) | |||
|
322 | (1) | |||
|
322 | (1) | |||
|
323 | (1) | |||
|
323 | (1) | |||
|
323 | (1) | |||
|
323 | (1) | |||
|
324 | (1) | |||
|
324 | (1) | |||
|
324 | (4) | |||
|
328 | (1) | |||
|
328 | (1) | |||
|
329 | (2) | |||
|
331 | (32) | |||
|
331 | (3) | |||
|
332 | (1) | |||
|
333 | (1) | |||
|
334 | (7) | |||
|
335 | (1) | |||
|
335 | (1) | |||
|
336 | (1) | |||
|
337 | (1) | |||
|
338 | (1) | |||
|
338 | (1) | |||
|
339 | (1) | |||
|
339 | (1) | |||
|
340 | (1) | |||
|
341 | (2) | |||
|
341 | (1) | |||
|
342 | (1) | |||
|
342 | (1) | |||
|
343 | (13) | |||
|
344 | (4) | |||
|
348 | (1) | |||
|
349 | (2) | |||
|
351 | (1) | |||
|
351 | (2) | |||
|
353 | (1) | |||
|
354 | (1) | |||
|
354 | (1) | |||
|
355 | (1) | |||
|
355 | (1) | |||
|
355 | (1) | |||
|
355 | (1) | |||
|
356 | (1) | |||
|
356 | (1) | |||
|
356 | (3) | |||
|
357 | (1) | |||
|
358 | (1) | |||
|
359 | (1) | |||
|
360 | (1) | |||
|
361 | (2) | |||
|
363 | (26) | |||
|
363 | (1) | |||
|
364 | (1) | |||
|
365 | (8) | |||
|
367 | (1) | |||
|
368 | (1) | |||
|
369 | (1) | |||
|
370 | (1) | |||
|
370 | (1) | |||
|
370 | (1) | |||
|
371 | (1) | |||
|
372 | (1) | |||
|
373 | (1) | |||
|
374 | (2) | |||
|
374 | (1) | |||
|
375 | (1) | |||
|
376 | (9) | |||
|
376 | (1) | |||
|
377 | (1) | |||
|
377 | (1) | |||
|
378 | (3) | |||
|
381 | (1) | |||
|
381 | (1) | |||
|
382 | (1) | |||
|
383 | (1) | |||
|
384 | (1) | |||
|
384 | (1) | |||
|
385 | (1) | |||
|
385 | (1) | |||
|
386 | (1) | |||
|
386 | (3) | |||
|
389 | (34) | |||
|
389 | (2) | |||
|
391 | (13) | |||
|
391 | (1) | |||
|
392 | (1) | |||
|
393 | (1) | |||
|
393 | (1) | |||
|
394 | (1) | |||
|
395 | (1) | |||
|
395 | (1) | |||
|
396 | (1) | |||
|
396 | (2) | |||
|
398 | (1) | |||
|
399 | (1) | |||
|
400 | (2) | |||
|
402 | (1) | |||
|
403 | (1) | |||
|
404 | (1) | |||
|
404 | (2) | |||
|
405 | (1) | |||
|
406 | (14) | |||
|
406 | (2) | |||
|
408 | (1) | |||
|
409 | (1) | |||
|
409 | (1) | |||
|
410 | (2) | |||
|
412 | (1) | |||
|
412 | (1) | |||
|
412 | (2) | |||
|
414 | (1) | |||
|
414 | (1) | |||
|
415 | (1) | |||
|
415 | (1) | |||
|
415 | (1) | |||
|
416 | (2) | |||
|
418 | (1) | |||
|
419 | (1) | |||
|
420 | (1) | |||
|
421 | (2) | |||
|
423 | (32) | |||
|
423 | (1) | |||
|
424 | (4) | |||
|
424 | (2) | |||
|
426 | (1) | |||
|
427 | (1) | |||
|
428 | (6) | |||
|
429 | (1) | |||
|
429 | (2) | |||
|
431 | (2) | |||
|
433 | (1) | |||
|
434 | (4) | |||
|
435 | (1) | |||
|
435 | (1) | |||
|
436 | (1) | |||
|
437 | (1) | |||
|
438 | (3) | |||
|
438 | (2) | |||
|
440 | (1) | |||
|
441 | (7) | |||
|
441 | (4) | |||
|
445 | (2) | |||
|
447 | (1) | |||
|
448 | (2) | |||
|
450 | (1) | |||
|
451 | (1) | |||
|
451 | (4) | |||
|
455 | (32) | |||
|
455 | (1) | |||
|
456 | (2) | |||
|
458 | (7) | |||
|
459 | (2) | |||
|
461 | (2) | |||
|
463 | (1) | |||
|
464 | (1) | |||
|
465 | (6) | |||
|
465 | (1) | |||
|
466 | (1) | |||
|
467 | (1) | |||
|
467 | (2) | |||
|
469 | (1) | |||
|
469 | (2) | |||
|
471 | (5) | |||
|
471 | (1) | |||
|
472 | (3) | |||
|
475 | (1) | |||
|
476 | (9) | |||
|
476 | (1) | |||
|
477 | (1) | |||
|
478 | (1) | |||
|
479 | (3) | |||
|
482 | (3) | |||
|
485 | (2) | |||
|
487 | (30) | |||
|
487 | (1) | |||
|
488 | (5) | |||
|
489 | (1) | |||
|
490 | (2) | |||
|
492 | (1) | |||
|
492 | (1) | |||
|
493 | (14) | |||
|
494 | (2) | |||
|
496 | (1) | |||
|
497 | (2) | |||
|
499 | (1) | |||
|
500 | (1) | |||
|
500 | (1) | |||
|
501 | (2) | |||
|
503 | (1) | |||
|
503 | (1) | |||
|
504 | (1) | |||
|
504 | (2) | |||
|
506 | (1) | |||
|
507 | (3) | |||
|
507 | (1) | |||
|
508 | (2) | |||
|
510 | (2) | |||
|
512 | (1) | |||
|
512 | (1) | |||
|
513 | (4) | |||
|
517 | (38) | |||
|
517 | (1) | |||
|
518 | (5) | |||
|
518 | (1) | |||
|
519 | (3) | |||
|
522 | (1) | |||
|
523 | (1) | |||
|
523 | (6) | |||
|
524 | (2) | |||
|
526 | (2) | |||
|
528 | (1) | |||
|
529 | (5) | |||
|
529 | (2) | |||
|
531 | (3) | |||
|
534 | (1) | |||
|
534 | (3) | |||
|
535 | (1) | |||
|
535 | (2) | |||
|
537 | (1) | |||
|
537 | (6) | |||
|
537 | (4) | |||
|
541 | (1) | |||
|
542 | (1) | |||
|
543 | (6) | |||
|
543 | (2) | |||
|
545 | (2) | |||
|
547 | (2) | |||
|
549 | (1) | |||
|
549 | (1) | |||
|
550 | (1) | |||
|
550 | (1) | |||
|
551 | (1) | |||
|
551 | (4) | |||
|
555 | (24) | |||
|
555 | (1) | |||
|
556 | (6) | |||
|
556 | (2) | |||
|
558 | (2) | |||
|
560 | (1) | |||
|
560 | (2) | |||
|
562 | (8) | |||
|
562 | (1) | |||
|
563 | (1) | |||
|
564 | (1) | |||
|
565 | (2) | |||
|
567 | (1) | |||
|
567 | (1) | |||
|
567 | (2) | |||
|
569 | (1) | |||
|
570 | (5) | |||
|
570 | (1) | |||
|
571 | (1) | |||
|
571 | (2) | |||
|
573 | (1) | |||
|
573 | (1) | |||
|
574 | (1) | |||
|
575 | (1) | |||
|
575 | (1) | |||
|
575 | (1) | |||
|
576 | (1) | |||
|
576 | (1) | |||
|
577 | (1) | |||
|
577 | (2) | |||
|
579 | (54) | |||
|
579 | (1) | |||
|
580 | (3) | |||
|
580 | (1) | |||
|
581 | (1) | |||
|
581 | (1) | |||
|
582 | (1) | |||
|
583 | (1) | |||
|
583 | (7) | |||
|
584 | (1) | |||
|
584 | (1) | |||
|
584 | (1) | |||
|
585 | (1) | |||
|
586 | (1) | |||
|
586 | (1) | |||
|
587 | (3) | |||
|
590 | (7) | |||
|
590 | (1) | |||
|
591 | (3) | |||
|
594 | (1) | |||
|
594 | (1) | |||
|
595 | (1) | |||
|
596 | (1) | |||
|
597 | (1) | |||
|
597 | (26) | |||
|
598 | (1) | |||
|
598 | (2) | |||
|
600 | (1) | |||
|
601 | (1) | |||
|
602 | (1) | |||
|
603 | (1) | |||
|
603 | (1) | |||
|
604 | (1) | |||
|
604 | (1) | |||
|
605 | (1) | |||
|
605 | (3) | |||
|
608 | (1) | |||
|
608 | (1) | |||
|
609 | (2) | |||
|
611 | (1) | |||
|
612 | (1) | |||
|
612 | (1) | |||
|
613 | (1) | |||
|
614 | (1) | |||
|
614 | (1) | |||
|
615 | (2) | |||
|
617 | (1) | |||
|
617 | (1) | |||
|
618 | (1) | |||
|
619 | (2) | |||
|
621 | (2) | |||
|
623 | (4) | |||
|
624 | (1) | |||
|
625 | (1) | |||
|
626 | (1) | |||
|
627 | (1) | |||
|
627 | (2) | |||
|
629 | (1) | |||
|
629 | (1) | |||
|
629 | (1) | |||
|
630 | (3) | |||
|
633 | (4) | |||
|
633 | (2) | |||
|
635 | (1) | |||
|
635 | (2) | |||
|
637 | (6) | |||
|
637 | (1) | |||
|
638 | (2) | |||
|
640 | (1) | |||
|
640 | (1) | |||
|
641 | (2) | |||
|
643 | (6) | |||
|
643 | (1) | |||
|
644 | (4) | |||
|
645 | (1) | |||
|
646 | (1) | |||
|
647 | (1) | |||
|
648 | (1) | |||
Bibliography | 649 | (64) | |||
Index | 713 |
Hortensio: Madam, before you touch the instrument To learn the order of my fingering, I must begin with rudiments of art To teach you gamouth in a briefer sort, More pleasant, pithy and effectual, Than hath been taught by any of my trade; And there it is in writing, fairly drawn. The Taming of the Shrew,III, i, 62-68. On September 11, 2001, terrorists seized control of four airplanes. Three were flown into buildings, and a fourth crashed, with catastrophic loss of life. In the aftermath, the security and reliability of many aspects of society drew renewed scrutiny. One of these aspects was the widespread use of computers and their interconnecting networks. The issue is not new. In 1988, approximately 5,000 computers throughout the Internet were rendered unusable within 4 hours by a program called a worm. While the spread, and the effects, of this program alarmed computer scientists, most people were not worried because the worm did not affect their lives or their ability to do their jobs. In 1993, more users of computer systems were alerted to such dangers when a set of programs called sniffers were placed on many computers run by network service providers and recorded login names and passwords. After an attack on Tsutomu Shimomura's computer system, and the fascinating way Shimomura followed the attacker's trail, which led to his arrest, the public's interest and apprehension were finally aroused. Computers were now vulnerable. Their once reassuring protections were now viewed as flimsy. Several films explored these concerns. Movies such asWar GamesandHackersprovided images of people who can, at will, wander throughout computers and networks, maliciously or frivolously corrupting or destroying information it may have taken millions of dollars to amass. (Reality intruded on Hackers when the World Wide Web page set up by MGM/United Artists was quickly altered to present an irreverent commentary on the movie and to suggest that viewers seeThe Netinstead. Paramount Pictures denied doing this.) Another film,Sneakers,presented a picture of those who test the security of computer (and other) systems for their owners and for the government. Goals This book has three goals. The first is to show the importance of theory to practice and of practice to theory. All too often, practitioners regard theory as irrelevant and theoreticians think of practice as trivial. In reality, theory and practice are symbiotic. For example, the theory of covert channels, in which the goal is to limit the ability of processes to communicate through shared resources, provides a mechanism for evaluating the effectiveness of mechanisms that confine processes, such as sandboxes and firewalls. Similarly, business practices in the commercial world led to the development of several security policy models such as the Clark-Wilson model and the Chinese Wall model. These models in turn help the designers of security policies better understand and evaluate the mechanisms and procedures needed to secure their sites. The second goal is to emphasize that computer security and cryptography are different. Although cryptography is an essential component of computer security, it is by no means the only component. Cryptography provides a mechanism for performing specific functions, such as preventing unauthorized people from reading and altering messages on a network. However, unless developers understand the context in which they are using cryptography, and unless the assumptions underlying the protocol and the cryptographic mechanisms apply to the context, the cryptography may not add to the security of the system. The canonical example is the use of cryptography to secure communications between two low-security systems. If only trusted users can access the two systems, cryptography protects messages in transit. But if untrusted users can access either system