Limit search to available items
Book Cover
E-book
Author Zaidoun, Ameur Salem

Title Computer Science Security Concepts and Tools
Published Newark : John Wiley & Sons, Incorporated, 2022

Copies

Description 1 online resource (202 p.)
Contents Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- List of Acronyms -- Introduction -- 1. General Concepts in Security -- 1.1. Introduction -- 1.2. Reasons for security -- 1.2.1. Technical issues -- 1.2.2. Social factors -- 1.3. Security attacks -- 1.3.1. Passive/active classification of attacks -- 1.3.2. Direct/indirect classification of attacks -- 1.3.3. Examples of attacks -- 1.3.4. Some statistics -- 1.4. Security objectives -- 1.4.1. Establishing a culture -- 1.4.2. Establishing technical solutions -- 1.5. Security fields -- 1.5.1. Energy security
1.5.2. Organizational and physical security -- 1.5.3. Software security -- 1.6. Normalization of security -- 1.6.1. Fundamental issues and general presentation -- 1.6.2. ISO 7498-2 norm -- 1.7. Security services -- 1.7.1. Authentication -- 1.7.2. Confidentiality -- 1.7.3. Integrity -- 1.7.4. Non-repudiation -- 1.7.5. Traceability and access control -- 1.7.6. Service availability -- 1.8. Security mechanisms -- 1.8.1. Encryption -- 1.8.2. Integrity check -- 1.8.3. Access check -- 1.8.4. Electronic signature -- 1.8.5. Notarization -- 1.9. Good practices -- 1.10. Conclusion -- 2. Security Weaknesses
2.1. Introduction -- 2.2. Weakness in the TCP/IP -- 2.2.1. ARPANet, the ancestor of the Internet -- 2.2.2. The Internet and security problems -- 2.2.3. The Internet and the ability to analyze -- 2.3. Weaknesses due to malware and intrusion tools -- 2.3.1. Viruses -- 2.3.2. Worms -- 2.3.3. Spam -- 2.3.4. Software bomb -- 2.3.5. Trojan horse -- 2.3.6. Spyware -- 2.3.7. Keylogger -- 2.3.8. Adware -- 2.3.9. Other malware -- 2.3.10. Comparison of intrusion tools -- 2.4. Conclusion -- 3. Authentication Techniques and Tools -- 3.1. Introduction -- 3.2. Theoretical concepts of authentication
3.2.1. Identification -- 3.2.2. Authentication -- 3.3. Different types of authentications -- 3.3.1. Local service authentication -- 3.3.2. Network authentication -- 3.4. AAA service -- 3.4.1. Local AAA -- 3.4.2. Server AAA -- 3.5. Conclusion -- 4. Techniques and Tools for Controlling Access, ACL and Firewalls -- 4.1. Introduction -- 4.2. Access control list -- 4.2.1. ACL classification -- 4.2.2. ACL configuration in Cisco -- 4.2.3. ACL configuration for Huawei -- 4.3. Firewall -- 4.3.1. Filtering function -- 4.3.2. Functionalities of tracing and NAT -- 4.3.3. Firewall architecture
4.3.4. How a firewall works -- 4.3.5. Firewall classifications -- 4.3.6. Stateful firewall -- 4.3.7. Zone-based firewall -- 4.3.8. Firewall examples -- 4.4. The concept of a DMZ -- 4.4.1. Implementation of topologies -- 4.5. Conclusion -- 5. Techniques and Tools for Detecting Intrusions -- 5.1. Introduction -- 5.2. Antivirus -- 5.2.1. Functions of an antivirus -- 5.2.2. Methods for detecting a virus -- 5.2.3. Actions taken by an antivirus -- 5.2.4. Antivirus components -- 5.2.5. Antivirus and firewall comparison -- 5.3. Intrusion detection systems -- 5.3.1. IDS purposes
Notes Description based upon print version of record
5.3.2. IDS components and functions
Form Electronic book
ISBN 9781394163823
1394163827