Advertisement

Computer Security

  • Jeffrey L. DuffanyEmail author
Chapter

Abstract

An overview of basic computer security concepts is presented along with a brief history of major computer security events of the late twentieth and early twenty-first centuries. This is followed by a description of the most important computer security vulnerabilities that exist today and countermeasures being used to mitigate them. Future trends in computer security are assessed.

References

  1. 1.
    Pfleeger, C. P., & Pfleeger, S. L. (2015). Security in computing (5th ed.). Upper Saddle River, NJ: Prentice Hall. ISBN:978-0134085043.zbMATHGoogle Scholar
  2. 2.
    Stallings, W. (2016). Cryptography and network security: Principles and practice (7th ed.). London: Pearson. ISBN:978-013444284.Google Scholar
  3. 3.
    Clarke, R. A. (2011). Cyber war: The next threat to national security and what to do about it. Manhattan, NY: Ecco Publishing. ISBN 978-0061962240.Google Scholar
  4. 4.
    Boyer, S. A. (2010). SCADA supervisory control and data acquisition (p. 179). Research Triangle Park, NC: ISA-International Society of Automation. ISBN:978-1-936007-09-7.Google Scholar
  5. 5.
    Cohen, F. (1987). Computer viruses. Computers & Security, 6(1), 22–35. doi: 10.1016/0167-4048(87)90122-2.CrossRefGoogle Scholar
  6. 6.
    Caddy, T., & Bleumer, G. (2005). Security evaluation criteria. In H. C. A. van Tilborg (Ed.), Encyclopedia of cryptography and security (p. 552). New York: Springer.CrossRefGoogle Scholar
  7. 7.
    Stoll, C. (1988). Stalking the wily hacker. Communications of the ACM, 31(5), 484–497.CrossRefGoogle Scholar
  8. 8.
    FIPS 46-3: Data encryption standard. csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
  9. 9.
    Loukides, M., & Gilmore, J. (1998). Cracking DES: Secrets of encryption research, wiretap politics, and chip design (pp. 800–822). San Francisco, CA: Electronic Frontier Foundation.Google Scholar
  10. 10.
    Benton, K. (2010). The evolution of 802.11 wireless security. Las Vegas, NV: University of Nevada.Google Scholar
  11. 11.
    Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES – the advanced encryption standard. Berlin: Springer. ISBN 3-540-42580-2.CrossRefzbMATHGoogle Scholar
  12. 12.
    Singer, P. W., & Friedman, A. (2014). Cybersecurity: What everyone needs to know. Oxford, UK: Oxford University Press. ISBN:978-0199918199.Google Scholar
  13. 13.
    Clarke, R. A. (2011). Cyber war: The next threat to national security and what to do about it. Manhattan, NY: Ecco Publishing. ISBN 978-0061962240.Google Scholar
  14. 14.
    Kennedy, D. (2011). Metasploit: The penetration tester’s guide. San Francisco, CA: No Starch Press. ISBN:978-1-59327-288-3.Google Scholar
  15. 15.
    Conheady, S. (2014). Social engineering in IT security: Tools, tactics and techniques. New York City, NY: McGraw-Hill. ISBN:978-00071818464. (ISO/IEC 15408).Google Scholar
  16. 16.
    Smith, J. (2016). Tor and the dark net: Remain anonymous and evade NSA spying., ISBN:978-00071818464978-0692674444. New Delhi: Pinnacle Publishers.Google Scholar
  17. 17.
    Fruhwirth, C. (2005). New methods in hard disk encryption. Institute for computer languages: Theory and logic group (PDF). Vienna: Vienna University of Technology. ISBN:978-00071818464978-0596002428.Google Scholar
  18. 18.
    England, P., Lampson, B., Manferdelli, J., Peinado, M., & Willman, B. (2003). A trusted open platform (PDF). Computer, 36(7), 55–62.CrossRefGoogle Scholar
  19. 19.
    Nakamoto, S. (2009). Bitcoin: A peer-to-peer electronic cash system (PDF). Retrieved February 20, 2017, from https://bitcoin.org/bitcoin.pdf
  20. 20.
    Hellman, M. E. (1980). A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory, 26(4), 401–406. doi: 10.1109/TIT.1980.1056220
  21. 21.
    Aycock, J. (2006). Computer viruses and malware (p. 14). New York: Springer. ISBN:978-00071818464.Google Scholar
  22. 22.
    Eilam, E. (2005). Reversing: Secrets of reverse engineering. Indianapolis, IN: Wiley Publishing. ISBN:978-0007181846413-978-0-7645-7481-8.Google Scholar
  23. 23.
    Richard E. S. (2001), Authentication: From passwords to public keys., ISBN:978-00071818464978-0201615999.Google Scholar
  24. 24.
    Jain, A., Hong, L., & Pankanti, S. (2000). Biometric identification. Communications of the ACM, 43(2), 91–98. doi: 10.1145/328236.328110
  25. 25.
    Szor, P. (2005). The art of computer virus research and defense. Boston: Addison-Wesley Professional. ASIN 0321304543.Google Scholar
  26. 26.
    National Security Agency shares security enhancements to linux. NSA Press Release. Fort George G. Meade, Maryland: National Security Agency Central Security Service. 2001-01-02.Google Scholar
  27. 27.
    Sommerville, I. (2015), Software engineering., ISBN:978-0133943030.zbMATHGoogle Scholar
  28. 28.
    Graff, M. G., & van Wyk, K. R. (2003). Secure coding: Principles and practices. Sebastopol, CA: O’Reilly Media, Inc.Google Scholar
  29. 29.
  30. 30.
    Li, Z., He, W., Akhawe, D., & Song, D. (2014). The emperor’s new password manager: Security analysis of web-based password managers (PDF). Usenix.Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Universidad del TuraboGuraboPuerto Rico

Personalised recommendations