computer security读书札记

英文原版书读起来一直比较吃力,之前看了几页中途便放弃,如今重拾起来,希望通过记录笔记的方式督促自己坚持下去。毕竟贵在坚持。

第一章 an overview of computer security(8.24)

每一章的开头都会有一个引语,通常都言简意赅,因为是英文的,对于我来说有时会不知所言。先记录一下,可能当前的理解是错误的,以后如果有不同的理解,再来修改。

Shakespeare quoted in Tempest, whereof what‘s past is prologue, what to come, in yours and my discharge.

过去是开端,未来在你我掌握中。

安全三要素都会提到机密性,完整性和可用性。

  1. 机密性是隐藏数据或者资源。实现的方式有访问控制,密码,system-dependent mechanism(不知道指的是什么),数据本身的存在。(有时候数据是否存在本身比数据的内容更值得保密,例如竞选结果被操纵这件事本身比具体操纵了多少选票更重要。)resource hiding(前文讲的数据的机密性,这部分讲的资源)
  2. 完整性是指数据或者资源不被非法篡改。分为两方面,数据本身的机密性和来源的机密性,通常叫做认证。实现机制分为两类:预防和检测。
  3. 可用性是指能够使用需要的信息或者资源。针对此方面的攻击通常为拒绝服务攻击。

威胁(threats)

列举了几种常见的威胁。

  • snooping                                   监听  (被动攻击)     --->机密性
  • modification or alteration                                              --->完整性
  • masquerading or spoofing    冒充或者欺骗                --->完整性
  • repudiation of origin   原发抵赖 (例如:买家网上下了订单,卖家要求先付款,但是买家不承认自己下单了) --->完整性
  • denial of receipt      拒绝签收  (例如:买家买了东西,不承认收到货了)  --->完整性和可用性
  • delay                        --->可用性
  • denial of service          拒绝服务          --->可用性

policy and mechanism
定义1:A security policyis a statement of what is, and what is not, allowed.
定义2:A security mechanism is a method ,tool or procedure for enforcing a security policy.

一条安全策略可以由多种安全机制来实现。

Goals of security : 预防,检测和恢复(prevention ,detection, recovery)

安全策略是否准备是基于对当前环境的假设Assumption上。得假设可信的角色。

threats--policy--specification--design--implementation--operation and maintainance





  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
本书详尽地介绍了计算机安全的理论与实践,阐释了该领域最基本和最普遍的知识,包括计算机安全的本质和面临的挑战,策略与安全的关系,密码学的角色与应用,策略实现机制,保障技术和方法学,脆弱性分析和入侵检测等。同时把计算机系统、网络、人为因素和密码学等概念融为一体,本书可作为信息安全、计算机等相关专业本科生、研究生的教科书和学习参考书,也可作为维护网络和计算机系统安全的管理人员、信息安全技术开发人员的工具书和参考书。 The importance of computer security has increased dramatically during the past few years. Bishop provides a monumental reference for the theory and practice of computer security. This is a textbook intended for use at the advanced undergraduate and introductory graduate levels, non-University training courses, as well as reference and self-study for security professionals. Comprehensive in scope, this covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. Bishop treats the management and engineering issues of computer. Excellent examples of ideas and mechanisms show how disparate techniques and principles are combined (or not) in widely-used systems. Features a distillation of a vast number of conference papers, dissertations and books that have appeared over the years, providing a valuable synthesis. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies. Preface Goals Philosophy Organization Roadmap Dependencies Background UndergraduateLevel GraduateLevel Practitioners SpecialAcknowledgment Acknowledgments PART1:INTRODUCTION ChapterIAnOverviewofComputerSecurity 1.1TheBasicComponents 1.2Threats 1.3PolicyandMechanism 1.4AssumptionsandTrust 1.5Assurance 1.6OperationalIssues 1.7HumanIssues 1.8TyingItAllTogether 1.9Summary 1.10ResearchIssues 1.11FurtherReading 1.12Exercises PART2:FOUNDATIONS Chapter2AccessControlMatrix 2.1ProtectionState 2.2AccessControlMatrixModel 2.3ProtectionStateTransitions 2.4Copying,Owning,andtheAttenuationofPrivilege 2.5Summary 2.6ResearchIssues 2.7FurtherReading 2.8Exercises Chapter3FoundationalResults 3.1TheGeneralQuestion 3.2BasicResults 3.3TheTake-GrantProtectionModel 3.4ClosingtheGap 3.5ExpressivePowerandtheModels 3.6Summary 3.7ResearchIssues 3.8FurtherReading 3.9Exercises PART3:POLICY Chapter4SecurityPolicies 4.1SecurityPolicies 4.2TypesofSecurityPolicies 4.3TheRoleofTrust 4.4TypesofAccessControl 4.5PolicyLanguages 4.6Example:AcademicComputerSecurityPolicy 4.7SecurityandPrecision 4.8Summary 4.9ResearchIssues 4.10FurtherReading 4.11Exercises Chapter5ConfidentialityPolicies 5.1GoalsofConfidentialityPolicies 5.2TheBell-LaPadulaModel 5.3Tranquility 5.4TheControversyovertheBell-LaPadulaModel 5.5Summary 5.6ResearchIssues 5.7FurtherReading 5.8Exercises Chapter6IntegrityPolicies 6.1Goals 6.2BibaIntegrityModel 6.3Lipner'sIntegrityMatrixModel 6.4Clark-WilsonIntegrityModel 6.5Summary 6.6ResearchIssues 6.7FurtherReading 6.8Exercises Chapter7HybridPolicies 7.1ChineseWallModel 7.2ClinicalInformationSystemsSecurityPolicy 7.3OriginatorControlledAccessControl 7.4Role-BasedAccessControl 7.5Summary 7.6ResearchIssues 7.7FurtherReading 7.8Exercises Chapter8NoninterferenceandPolicyComposition 8.1TheProblem 8.2DeterministicNoninterference 8.3Nondeducibility 8.4GeneralizedNoninterference 8.5Restrictiveness 8.6Summary 8.7ResearchIssues 8.8FurtherReading 8.9Exercises PART4:IMPLEMENTATIONI:CRYPTOGRAPHY Chapter9BasicCryptography 9.1WhatIsCryptography? 9.2ClassicalCryptosystems 9.3PublicKeyCryptography 9.4CryptographicChecksums 9.5Summary 9.6ResearchIssues 9.7FurtherReading 9.8Exercises Chapter10KeyManagement 10.1SessionandInterchangeKeys 10.2KeyExchange 10.3KeyGeneration 10.4CryptographicKeyInfrastructures 10.5StoringandRevokingKeys 10.6DigitalSignatures 10.7Summary 10.8ResearchIssues 10.9FurtherReading 10.10Exercises Chapter11CipherTechniques 11.1Problems 11.2StreamandBlockCiphers 11.3NetworksandCryptography 11.4ExampleProtocols 11.5Summary 11.6ResearchIssues 11.7FurtherReading 11.8Exercises Chapter12Authentication 12.1AuthenticationBasics 12.2Passwords 12.3Challenge-Response 12.4Biometrics 12.5Location 12.6MultipleMethods 12.7Summary 12.8ResearchIssues 12.9FurtherReading 12.10Exercises PART5:IMPLEMENTATIONII:SYSTEMS Chapter13DesignPrinciples 13.1Overview 13.2DesignPrinciples 13.3Summary 13.4ResearchIssues 13.5FurtherReading 13.6Exercises Chapter14RepresentingIdentity 14.1WhatIsIdentity? 14.2FilesandObjects 14.3Users 14.4GroupsandRoles 14.5NamingandCertificates 14.6IdentityontheWeb 14.7Summary 14.8ResearchIssues 14.9FurtherReading 14.10Exercises Chapter15AccessControlMechanisms 15.1AccessControlLists 15.2Capabilities 15.3LocksandKeys 15.4Ring-BasedAccessControl 15.5PropagatedAccessControlLists 15.6Summary 15.7ResearchIssues 15.8FurtherReading 15.9Exercises Chapter16InformationFlow 16.1BasicsandBackground 16.2NonlatticeInformationFlowPolicies 16.3Compiler-BasedMechanisms 16.4Execution-BasedMechanisms 16.5ExampleInformationFlowControls 16.6Summary 16.7ResearchIssues 16.8FurtherReading 16.9Exercises Chapter17ConfinementProblem 17.1TheConfinementProblem 17.2Isolation 17.3CovertChannels 17.4Summary 17.5ResearchIssues 17.6FurtherReading 17.7Exercises PART6:ASSURANCEContributedbyElisabethSullivan Chapter18IntroductiontoAssurance 18.1AssuranceandTrust 18.2BuildingSecureandTrustedSystems 18.3Summary 18.4ResearchIssues 18.5FurtherReading 18.6Exercises Chapter19BuildingSystemswithAssurance 19.1AssuranceinRequirementsDefinitionandAnalysis 19.2AssuranceDuringSystemandSoftwareDesign 19.3AssuranceinImplementationandIntegration 19.4AssuranceDuringOperationandMaintenance 19.5Summary 19.6ResearchIssues 19.7FurtherReading 19.8Exercises Chapter20FormalMethods 20.1FormalVerificationTechniques 20.2FormalSpecification 20.3EarlyFormalVerificationTechniques 20.4CurrentVerificationSystems 20.5Summary 20.6ResearchIssues 20.7FurtherReading 20.8Exercises Chapter21EvaluatingSystems 21.1GoalsofFormalEvaluation 21.2TCSEC:1983-1999 21.3InternationalEffortsandtheITSEC:1991-2001 21.4CommercialInternationalSecurityRequirements:1991 21.5OtherCommercialEfforts:Early1990s 21.6TheFederalCriteria:1992 21.7FIPS140:1994-Present 21.8TheCommonCriteria:1998-Present 21.9SSE-CMM:1997-Present 21.10Summary 21.11ResearchIssues 21.12FurtherReading 21.13Exercises PART7:SPECIALTOPICS Chapter22MaliciousLogic 22.1Introduction 22.2TrojanHorses 22.3ComputerViruses 22.4ComputerWorms 22.5OtherFormsofMaliciousLogic 22.6TheoryofMaliciousLogic 22.7Defenses 22.8Summary 22.9ResearchIssues 22.10FurtherReading 22.11Exercises Chapter23VulnerabilityAnalysis 23.1Introduction 23.2PenetrationStudies 23.3VulnerabilityClassification 23.4Frameworks 23.5GuptaandGligor'sTheoryofPenetrationAnalysis 23.6Summary 23.7ResearchIssues 23.8FurtherReading 23.9Exercises Chapter24Auditing 24.1Definitions 24.2AnatomyofanAuditingSystem 24.3DesigninganAuditingSystem 24.4APosterioriDesign 24.5AuditingMechanisms 24.6Examples:AuditingFileSystems 24.7AuditBrowsing 24.8Summary 24.9ResearchIssues 24.10FurtherReading 24.11Exercises Chapter25IntrusionDetection 25.1Principles 25.2BasicIntrusionDetection 25.3Models 25.4Architecture 25.5OrganizationofIntrusionDetectionSystems 25.6IntrusionResponse 25.7Summary 25.8ResearchIssues 25.9FurtherReading 25.10Exercises PART8:PRACTICUM Chapter26NetworkSecurity 26.1Introduction 26.2PolicyDevelopment 26.3NetworkOrganization 26.4AvailabilityandNetworkFlooding 26.5AnticipatingAttacks 26.6Summary 26.7ResearchIssues 26.8FurtherReading 26.9Exercises Chapter27SystemSecurity 27.1Introduction 27.2Policy 27.3Networks 27.4Users 27.5Authentication 27.6Processes 27.7Files 27.8Retrospective 27.9Summary 27.10ResearchIssues 27.11FurtherReading 27.12Exercises Chapter28UserSecurity 28.1Policy 28.2Access 28.3FilesandDevices 28.4Processes 28.5ElectronicCommunications 28.6Summary 28.7ResearchIssues 28.8FurtherReading 28.9Exercises Chapter29ProgramSecurity 29.1Introduction 29.2RequirementsandPolicy 29.3Design 29.4RefinementandImplementation 29.5CommonSecurity-RelatedProgrammingProblems 29.6Testing,Maintenance,andOperation 29.7Distribution 29.8Conclusion 29.9Summary 29.10ResearchIssues 29.11FurtherReading 29.12Exercises PART9:ENDMATTER Chapter30Lattices 30.1Basics 30.2Lattices 30.3Exercises Chapter31TheExtendedEuclideanAlgorithm 31.1TheEuclideanAlgorithm 31.2TheExtendedEuclideanAlgorithm 31.3Solvingaxmodn=1 31.4Solvingaxmodn=b 31.5Exercises Chapter32EntropyandUncertainty 32.1ConditionalandJointProbability 32.2EntropyandUncertainty 32.3JointandConditionalEntropy 32.4Exercises Chapter33VirtualMachines 33.1VirtualMachineStructure 33.2VirtualMachineMonitor 33.3Exercises Chapter34SymbolicLogic 34.1PropositionalLogic 34.2PredicateLogic 34.3TemporalLogicSystems 34.4Exercises Chapter35ExampleAcademicSecurityPolicy 35.1UniversityofCaliforniaE-mailPolicy 35.2TheAcceptableUsePolicyfortheUniversityofCalifomia,Davis Bibliography Index

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值