Computer Security

  • Jeffrey L. DuffanyEmail author


An overview of basic computer security concepts is presented along with a brief history of major computer security events of the late twentieth and early twenty-first centuries. This is followed by a description of the most important computer security vulnerabilities that exist today and countermeasures being used to mitigate them. Future trends in computer security are assessed.


  1. 1.
    Pfleeger, C. P., & Pfleeger, S. L. (2015). Security in computing (5th ed.). Upper Saddle River, NJ: Prentice Hall. ISBN:978-0134085043.zbMATHGoogle Scholar
  2. 2.
    Stallings, W. (2016). Cryptography and network security: Principles and practice (7th ed.). London: Pearson. ISBN:978-013444284.Google Scholar
  3. 3.
    Clarke, R. A. (2011). Cyber war: The next threat to national security and what to do about it. Manhattan, NY: Ecco Publishing. ISBN 978-0061962240.Google Scholar
  4. 4.
    Boyer, S. A. (2010). SCADA supervisory control and data acquisition (p. 179). Research Triangle Park, NC: ISA-International Society of Automation. ISBN:978-1-936007-09-7.Google Scholar
  5. 5.
    Cohen, F. (1987). Computer viruses. Computers & Security, 6(1), 22–35. doi: 10.1016/0167-4048(87)90122-2.CrossRefGoogle Scholar
  6. 6.
    Caddy, T., & Bleumer, G. (2005). Security evaluation criteria. In H. C. A. van Tilborg (Ed.), Encyclopedia of cryptography and security (p. 552). New York: Springer.CrossRefGoogle Scholar
  7. 7.
    Stoll, C. (1988). Stalking the wily hacker. Communications of the ACM, 31(5), 484–497.CrossRefGoogle Scholar
  8. 8.
    FIPS 46-3: Data encryption standard.
  9. 9.
    Loukides, M., & Gilmore, J. (1998). Cracking DES: Secrets of encryption research, wiretap politics, and chip design (pp. 800–822). San Francisco, CA: Electronic Frontier Foundation.Google Scholar
  10. 10.
    Benton, K. (2010). The evolution of 802.11 wireless security. Las Vegas, NV: University of Nevada.Google Scholar
  11. 11.
    Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES – the advanced encryption standard. Berlin: Springer. ISBN 3-540-42580-2.CrossRefzbMATHGoogle Scholar
  12. 12.
    Singer, P. W., & Friedman, A. (2014). Cybersecurity: What everyone needs to know. Oxford, UK: Oxford University Press. ISBN:978-0199918199.Google Scholar
  13. 13.
    Clarke, R. A. (2011). Cyber war: The next threat to national security and what to do about it. Manhattan, NY: Ecco Publishing. ISBN 978-0061962240.Google Scholar
  14. 14.
    Kennedy, D. (2011). Metasploit: The penetration tester’s guide. San Francisco, CA: No Starch Press. ISBN:978-1-59327-288-3.Google Scholar
  15. 15.
    Conheady, S. (2014). Social engineering in IT security: Tools, tactics and techniques. New York City, NY: McGraw-Hill. ISBN:978-00071818464. (ISO/IEC 15408).Google Scholar
  16. 16.
    Smith, J. (2016). Tor and the dark net: Remain anonymous and evade NSA spying., ISBN:978-00071818464978-0692674444. New Delhi: Pinnacle Publishers.Google Scholar
  17. 17.
    Fruhwirth, C. (2005). New methods in hard disk encryption. Institute for computer languages: Theory and logic group (PDF). Vienna: Vienna University of Technology. ISBN:978-00071818464978-0596002428.Google Scholar
  18. 18.
    England, P., Lampson, B., Manferdelli, J., Peinado, M., & Willman, B. (2003). A trusted open platform (PDF). Computer, 36(7), 55–62.CrossRefGoogle Scholar
  19. 19.
    Nakamoto, S. (2009). Bitcoin: A peer-to-peer electronic cash system (PDF). Retrieved February 20, 2017, from
  20. 20.
    Hellman, M. E. (1980). A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory, 26(4), 401–406. doi: 10.1109/TIT.1980.1056220
  21. 21.
    Aycock, J. (2006). Computer viruses and malware (p. 14). New York: Springer. ISBN:978-00071818464.Google Scholar
  22. 22.
    Eilam, E. (2005). Reversing: Secrets of reverse engineering. Indianapolis, IN: Wiley Publishing. ISBN:978-0007181846413-978-0-7645-7481-8.Google Scholar
  23. 23.
    Richard E. S. (2001), Authentication: From passwords to public keys., ISBN:978-00071818464978-0201615999.Google Scholar
  24. 24.
    Jain, A., Hong, L., & Pankanti, S. (2000). Biometric identification. Communications of the ACM, 43(2), 91–98. doi: 10.1145/328236.328110
  25. 25.
    Szor, P. (2005). The art of computer virus research and defense. Boston: Addison-Wesley Professional. ASIN 0321304543.Google Scholar
  26. 26.
    National Security Agency shares security enhancements to linux. NSA Press Release. Fort George G. Meade, Maryland: National Security Agency Central Security Service. 2001-01-02.Google Scholar
  27. 27.
    Sommerville, I. (2015), Software engineering., ISBN:978-0133943030.zbMATHGoogle Scholar
  28. 28.
    Graff, M. G., & van Wyk, K. R. (2003). Secure coding: Principles and practices. Sebastopol, CA: O’Reilly Media, Inc.Google Scholar
  29. 29.
  30. 30.
    Li, Z., He, W., Akhawe, D., & Song, D. (2014). The emperor’s new password manager: Security analysis of web-based password managers (PDF). Usenix.Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Universidad del TuraboGuraboPuerto Rico

Personalised recommendations