Cover image for Computer system security : basic concepts and solved exercises
Title:
Computer system security : basic concepts and solved exercises
Personal Author:
Series:
Computer and communication sciences
Publication Information:
Lausanne, Switzerland : EFPL Press, 2007
Physical Description:
xii, 260 p. : ill. ; 25 cm.
ISBN:
9781420046205

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010203289 QA76.9.A25 A96 2004 Open Access Book Book
Searching...

On Order

Summary

Summary

Computer System Security: Basic Concepts and Solved Exercises is designed to expose students and others to the basic aspects of computer security. Written by leading experts and instructors, it covers e-mail security; viruses and antivirus programs; program and network vulnerabilities; firewalls, address translation and filtering; cryptography; secure communications; secure applications; and security management. Written as an accompanying text for courses on network protocols, it also provides a basic tutorial for those whose livelihood is dependent upon secure systems. The solved exercises included have been taken from courses taught in the Communication Systems department at the EPFL.
.


Author Notes

Gildas Avoine is postdoctoral researcher at the Massachusetts Institute of Technology
Philippe Oechslin has worked in research at Bell Labs and at the University College of London


Table of Contents

Forewordp. xi
Chapter 1 Forged E-Mail and Spamp. 1
1.1 Forging E-Mail Headersp. 1
1.2 Spammingp. 3
1.3 Notesp. 7
Exercisesp. 8
1 Forged E-Mailp. 8
2 Web Mail Services and Anonymityp. 8
3 Information Disclosurep. 8
4 Spam and Open Relaysp. 8
5 SMTP Servers that Allow Relayingp. 9
6 Anonymous Mailsp. 9
7 Rules to Avoid Open Relayp. 10
8 Anti-Spam Softwarep. 10
9 Prevention against Spamp. 10
Solutionsp. 11
Chapter 2 Malwaresp. 19
2.1 Description and Classificationp. 19
2.2 Protectionp. 28
2.3 Notesp. 31
Exercisesp. 32
10 Viruses and Wormsp. 32
11 Backdoors and Trojan Horsesp. 32
12 Undetectable Virusesp. 33
13 Virus with an Encrypted Attached Filep. 33
14 BIOS Virusp. 33
15 Analysis of a Malwarep. 34
16 Virus Detectionp. 35
17 Antivirus Softwarep. 35
18 Filtering Attached Filesp. 36
19 Restoring the System after Infectionp. 36
Solutionsp. 37
Chapter 3 Network and Application Vulnerabilitiesp. 43
3.1 TCP/IP Basicsp. 43
3.2 Denial of Servicep. 46
3.3 IP Spoofingp. 51
3.4 Session Hijackingp. 53
3.5 Sniffingp. 55
3.6 Exploitsp. 56
3.7 Notesp. 60
Exercisesp. 61
20 Denial of Service Attackp. 61
21 Kevin Mitnick's Attackp. 61
22 IP Spoofingp. 63
23 TCP Hijackingp. 64
24 Network Traffic Analysisp. 65
25 ARP/DNS Spoofingp. 66
26 DHCP Vulnerabilitiesp. 68
27 Reminder on C Pointersp. 69
28 Address Modification in the Stackp. 69
29 Exploit on a Program in Cp. 70
30 Vulnerabilities of CGI Scriptsp. 71
31 SQL Injectionp. 72
Solutionsp. 73
Chapter 4 Firewalls and Proxiesp. 85
4.1 Firewallsp. 85
4.2 Proxiesp. 103
4.3 Notesp. 111
Exercisesp. 112
32 Basic Principles for Configuring a Firewallp. 112
33 Filtering Rules for a Stateless Firewallp. 112
34 Filtering Rules for a Stateless Firewall (2)p. 112
35 Filtering Rules for a Stateful Firewallp. 113
36 Vulnerabilities of a Stateless Firewallp. 113
37 Network Address Translationp. 114
38 E-mail Headersp. 114
39 Maximum Number of TCP Connectionsp. 115
40 Peer-to-Peerp. 115
41 FTP Client using NATp. 115
42 FTP Server using NATp. 115
43 Fool of Addressesp. 115
44 Connection Authenticationp. 116
45 HTTPS Proxies' Securityp. 116
46 FTP Proxyp. 116
47 Transparent Proxyp. 117
48 Proxy Circumventionp. 117
49 Intrusion Detectionp. 118
50 Intrusion Detection System and Proxyp. 119
51 Wild Modemsp. 119
52 Network Security Assessmentp. 119
53 Startup SAs Network Securityp. 127
Solutionsp. 129
Chapter 5 Cryptographyp. 147
5.1 Main Goals of Cryptographyp. 147
5.2 Symmetric-Key Cryptographyp. 148
5.3 Asymmetric Cryptographyp. 150
5.4 Cryptanalysisp. 153
5.5 Notesp. 154
Exercisesp. 156
54 Kerckhoffs' Principlesp. 156
55 Security Objectivesp. 156
56 RSA Algorithmp. 156
57 Decryption of an Encrypted Message Using RSAp. 157
58 RSA Vulnerabilitiesp. 157
59 Exhaustive Search for Symmetric Keysp. 157
60 Exhaustive Search for Asymmetric Keysp. 158
61 Hash Functions and the Birthday Paradoxp. 158
62 Symmetric Encryption Modesp. 158
63 Symmetric and Asymmetric Encryptionp. 160
64 Loss of a Private Keyp. 160
65 Certificatesp. 161
Solutionsp. 162
Chapter 6 Secure Communicationsp. 169
6.1 Virtual Private Networksp. 169
6.2 Transport Layer Securityp. 175
6.3 Secure Shellp. 177
6.4 Notesp. 178
Exercisesp. 179
66 L2TPp. 179
67 IPSecp. 180
68 L2TP and IPSecp. 180
69 IPSec Between Intermediate Routersp. 180
70 IPSec and NATp. 181
71 IKEp. 181
72 IKE's Main Mode and Aggressive Modep. 181
73 SSH and VPNp. 182
74 Use of SSHp. 183
75 Authentication Without Passwords Using SSHp. 183
76 SSL/TLSp. 184
77 HTTPSp. 184
78 Remote Access to a Mail Serverp. 184
Solutionsp. 186
Chapter 7 Security at the User Levelp. 195
7.1 Password-Based Authenticationp. 195
7.2 Challenge-Response Protocolsp. 202
7.3 Kerberos: A Network Authentication Protocolp. 203
7.4 PGP: Pretty Good Privacyp. 206
7.5 Notesp. 211
Exercisesp. 212
79 Authentication Using Passwordsp. 212
80 Types of Authenticationp. 212
81 Password Hashesp. 212
82 Password Cracking Using an Exhaustive Searchp. 213
83 Password Cracking Using a Dictionaryp. 213
84 Stolen Hashesp. 213
85 Authentication on a Web Sitep. 214
86 Physical Access Controlp. 214
87 Wireless Local Area Networkp. 217
88 Kerberos Authentication Systemp. 218
89 Kerberos Key Serverp. 218
90 Stealing Kerberos Keysp. 218
91 Kerberos Ticketsp. 219
92 Third-Party-Based Authentication Protocolp. 219
93 Authentication with a Centralized Serverp. 220
94 PGP Certificates and S/MIMEp. 222
95 Generating PGP Keysp. 222
96 Distinguishing the Keys in PGPp. 223
97 PGP Web of Trustp. 223
98 PGP Deploymentp. 223
99 Approaches to Secure E-Mailsp. 224
100 Choosing a Layer to Secure Communicationsp. 225
Solutionsp. 226
Chapter 8 Management of Information Securityp. 243
8.1 Risk Analysisp. 243
8.2 Key Documentsp. 244
8.3 ISO 27001: the Information Security Management Systemp. 245
8.4 ISO 17799: Code of Practice for Information Security Managementp. 246
8.5 The German IT Baseline Protection Manualp. 247
8.6 The Common Criteriap. 248
8.7 Notesp. 250
Exercisesp. 251
101 Your Position as a Security Officerp. 251
102 Documentationp. 251
103 Security Standardsp. 251
104 The Security Gapp. 252
105 Risk Analysisp. 252
106 Auditp. 253
Solutionsp. 254
Acronymsp. 257
Referencesp. 259