Вы находитесь на странице: 1из 38

Security in Computing

Subject : Security in Computing


Chapter 1 Is There a Security Problem in Computing
1. What Does "Secure" Mean? - Answer (click here)
2. Protecting Software in Automobile Control Systems - Answer (click here)
3. Attacks - Answer (click here)
4. Why Universities Are Prime Targets - Answer (click here)
5. The Meaning of Computer Security - Answer (click here)
6. Record Record Loss - Answer (click here)
7. Top Methods of Attack - Answer (click here)
8. Computer Criminals - Answer (click here)
9. The Terrorists, Inc., IT Department - Answer (click here)
10. Methods of Defense - Answer (click here)

Chapter 2 Elementary Cryptography


1. What Does "Secure" Mean? - Answer (click here)
2. Protecting Software in Automobile Control Systems - Answer (click here)
3. Attacks - Answer (click here)
4. Why Universities Are Prime Targets - Answer (click here)
5. The Meaning of Computer Security - Answer (click here)
6. Record Record Loss - Answer (click here)
7. Top Methods of Attack - Answer (click here)
8. Computer Criminals - Answer (click here)
9. The Terrorists, Inc., IT Department - Answer (click here)
10. Methods of Defense - Answer (click here)
11. Elementary Cryptography - Answer (click here)
12. Elementary Cryptography - Terminology and Background - Answer (click
here)
13. Substitution Ciphers - Answer (click here)
14. Transpositions (Permutations) - Answer (click here)
15. Making "Good" Encryption Algorithms - Answer (click here)
16. The Data Encryption Standard(DES) - Answer (click here)
17. The AES Encryption Algorithm - Answer (click here)
18. Public Key Encryption - Answer (click here)
19. The Uses of Encryption - Answer (click here)
Chapter 3 Program Security
1. What Does "Secure" Mean? - Answer (click here)
2. Protecting Software in Automobile Control Systems - Answer (click here)
3. Attacks - Answer (click here)
4. Why Universities Are Prime Targets - Answer (click here)
5. The Meaning of Computer Security - Answer (click here)
6. Record Record Loss - Answer (click here)
7. Top Methods of Attack - Answer (click here)
8. Computer Criminals - Answer (click here)
9. The Terrorists, Inc., IT Department - Answer (click here)
10. Methods of Defense - Answer (click here)
11. Elementary Cryptography - Answer (click here)
12. Elementary Cryptography - Terminology and Background - Answer (click
here)
13. Substitution Ciphers - Answer (click here)
14. Transpositions (Permutations) - Answer (click here)
15. Making "Good" Encryption Algorithms - Answer (click here)
16. The Data Encryption Standard(DES) - Answer (click here)
17. The AES Encryption Algorithm - Answer (click here)
18. Public Key Encryption - Answer (click here)
19. The Uses of Encryption - Answer (click here)
20. Program Security - Answer (click here)
21. Secure Programs - Answer (click here)
22. Nonmalicious Program Errors - Answer (click here)
23. Viruses and Other Malicious Code - Answer (click here)
24. Nonmalicious Flaws Cause Failures - Answer (click here)
25. Why Worry About Malicious Code? - Answer (click here)
26. Kinds of Malicious Code - Answer (click here)
27. Rapidly Approaching Zero - Answer (click here)
28. How Viruses Attach - Answer (click here)
29. How Viruses Gain Control - Answer (click here)
30. Homes for Viruses - Answer (click here)
31. Virus Signatures - Answer (click here)
32. The Source of Viruses - Answer (click here)
33. Prevention of Virus Infection - Answer (click here)
34. Truths and Misconceptions About Viruses - Answer (click here)
35. First Example of Malicious Code: The Brain Virus - Answer (click here)
36. Example: The Internet Worm - Answer (click here)
37. More Malicious Code: Code Red - Answer (click here)
38. Malicious Code on the Web: Web Bugs - Answer (click here)
39. Is the Cure Worse Than the Disease? - Answer (click here)
40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click
here)
41. Salami Attack - Answer (click here)
42. Rootkits and the Sony XCP - Answer (click here)
43. Privilege Escalation - Answer (click here)
44. Interface Illusions - Answer (click here)
45. Keystroke Logging - Answer (click here)
46. Man-in-the-Middle Attacks - Answer (click here)
47. Timing Attacks - Answer (click here)
48. Covert Channels: Programs That Leak Information - Answer (click here)
49. Controls Against Program Threats - Answer (click here)
50. The Nature of Software Development - Answer (click here)
51. Modularity, Encapsulation, and Information Hiding - Answer (click here)
52. Peer Reviews - Answer (click here)
53. Hazard Analysis - Answer (click here)
54. Testing - Answer (click here)
55. Good Design and Prediction - Answer (click here)
56. Static Analysis - Answer (click here)
57. Configuration Management - Answer (click here)
58. Lessons from Mistakes - Answer (click here)
59. There's More Than One Way to Crack a System - Answer (click here)
60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here)
61. Programming Practice Conclusions - Answer (click here)
62. Standards of Program Development - Answer (click here)
63. Process Standards - Answer (click here)
64. Program Controls in General - Answer (click here)

Chapter 4 Protection in General Purpose Operating Systems


1. What Does "Secure" Mean? - Answer (click here)
2. Protecting Software in Automobile Control Systems - Answer (click here)
3. Attacks - Answer (click here)
4. Why Universities Are Prime Targets - Answer (click here)
5. The Meaning of Computer Security - Answer (click here)
6. Record Record Loss - Answer (click here)
7. Top Methods of Attack - Answer (click here)
8. Computer Criminals - Answer (click here)
9. The Terrorists, Inc., IT Department - Answer (click here)
10. Methods of Defense - Answer (click here)
11. Elementary Cryptography - Answer (click here)
12. Elementary Cryptography - Terminology and Background - Answer (click
here)
13. Substitution Ciphers - Answer (click here)
14. Transpositions (Permutations) - Answer (click here)
15. Making "Good" Encryption Algorithms - Answer (click here)
16. The Data Encryption Standard(DES) - Answer (click here)
17. The AES Encryption Algorithm - Answer (click here)
18. Public Key Encryption - Answer (click here)
19. The Uses of Encryption - Answer (click here)
20. Program Security - Answer (click here)
21. Secure Programs - Answer (click here)
22. Nonmalicious Program Errors - Answer (click here)
23. Viruses and Other Malicious Code - Answer (click here)
24. Nonmalicious Flaws Cause Failures - Answer (click here)
25. Why Worry About Malicious Code? - Answer (click here)
26. Kinds of Malicious Code - Answer (click here)
27. Rapidly Approaching Zero - Answer (click here)
28. How Viruses Attach - Answer (click here)
29. How Viruses Gain Control - Answer (click here)
30. Homes for Viruses - Answer (click here)
31. Virus Signatures - Answer (click here)
32. The Source of Viruses - Answer (click here)
33. Prevention of Virus Infection - Answer (click here)
34. Truths and Misconceptions About Viruses - Answer (click here)
35. First Example of Malicious Code: The Brain Virus - Answer (click here)
36. Example: The Internet Worm - Answer (click here)
37. More Malicious Code: Code Red - Answer (click here)
38. Malicious Code on the Web: Web Bugs - Answer (click here)
39. Is the Cure Worse Than the Disease? - Answer (click here)
40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click
here)
41. Salami Attack - Answer (click here)
42. Rootkits and the Sony XCP - Answer (click here)
43. Privilege Escalation - Answer (click here)
44. Interface Illusions - Answer (click here)
45. Keystroke Logging - Answer (click here)
46. Man-in-the-Middle Attacks - Answer (click here)
47. Timing Attacks - Answer (click here)
48. Covert Channels: Programs That Leak Information - Answer (click here)
49. Controls Against Program Threats - Answer (click here)
50. The Nature of Software Development - Answer (click here)
51. Modularity, Encapsulation, and Information Hiding - Answer (click here)
52. Peer Reviews - Answer (click here)
53. Hazard Analysis - Answer (click here)
54. Testing - Answer (click here)
55. Good Design and Prediction - Answer (click here)
56. Static Analysis - Answer (click here)
57. Configuration Management - Answer (click here)
58. Lessons from Mistakes - Answer (click here)
59. There's More Than One Way to Crack a System - Answer (click here)
60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here)
61. Programming Practice Conclusions - Answer (click here)
62. Standards of Program Development - Answer (click here)
63. Process Standards - Answer (click here)
64. Program Controls in General - Answer (click here)
65. Protection in General-Purpose Operating Systems - Answer (click here)
66. Protected Objects and Methods of Protection - Answer (click here)
67. Memory and Address Protection - Answer (click here)
68. Control of Access to General Objects - Answer (click here)
69. File Protection Mechanisms - Answer (click here)
70. User Authentication - Answer (click here)
71. Biometrics: Ready for Prime Time? - Answer (click here)
72. Passwords as Authenticators - Answer (click here)
73. Additional Authentication Information - Answer (click here)
74. Attacks on Passwords - Answer (click here)
75. Password Selection Criteria - Answer (click here)
76. The Authentication Process - Answer (click here)
77. Biometrics: Authentication Not Using Passwords - Answer (click here)

Chapter 5 Designing Trusted Operating Systems


1. What Does "Secure" Mean? - Answer (click here)
2. Protecting Software in Automobile Control Systems - Answer (click here)
3. Attacks - Answer (click here)
4. Why Universities Are Prime Targets - Answer (click here)
5. The Meaning of Computer Security - Answer (click here)
6. Record Record Loss - Answer (click here)
7. Top Methods of Attack - Answer (click here)
8. Computer Criminals - Answer (click here)
9. The Terrorists, Inc., IT Department - Answer (click here)
10. Methods of Defense - Answer (click here)
11. Elementary Cryptography - Answer (click here)
12. Elementary Cryptography - Terminology and Background - Answer (click
here)
13. Substitution Ciphers - Answer (click here)
14. Transpositions (Permutations) - Answer (click here)
15. Making "Good" Encryption Algorithms - Answer (click here)
16. The Data Encryption Standard(DES) - Answer (click here)
17. The AES Encryption Algorithm - Answer (click here)
18. Public Key Encryption - Answer (click here)
19. The Uses of Encryption - Answer (click here)
20. Program Security - Answer (click here)
21. Secure Programs - Answer (click here)
22. Nonmalicious Program Errors - Answer (click here)
23. Viruses and Other Malicious Code - Answer (click here)
24. Nonmalicious Flaws Cause Failures - Answer (click here)
25. Why Worry About Malicious Code? - Answer (click here)
26. Kinds of Malicious Code - Answer (click here)
27. Rapidly Approaching Zero - Answer (click here)
28. How Viruses Attach - Answer (click here)
29. How Viruses Gain Control - Answer (click here)
30. Homes for Viruses - Answer (click here)
31. Virus Signatures - Answer (click here)
32. The Source of Viruses - Answer (click here)
33. Prevention of Virus Infection - Answer (click here)
34. Truths and Misconceptions About Viruses - Answer (click here)
35. First Example of Malicious Code: The Brain Virus - Answer (click here)
36. Example: The Internet Worm - Answer (click here)
37. More Malicious Code: Code Red - Answer (click here)
38. Malicious Code on the Web: Web Bugs - Answer (click here)
39. Is the Cure Worse Than the Disease? - Answer (click here)
40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click
here)
41. Salami Attack - Answer (click here)
42. Rootkits and the Sony XCP - Answer (click here)
43. Privilege Escalation - Answer (click here)
44. Interface Illusions - Answer (click here)
45. Keystroke Logging - Answer (click here)
46. Man-in-the-Middle Attacks - Answer (click here)
47. Timing Attacks - Answer (click here)
48. Covert Channels: Programs That Leak Information - Answer (click here)
49. Controls Against Program Threats - Answer (click here)
50. The Nature of Software Development - Answer (click here)
51. Modularity, Encapsulation, and Information Hiding - Answer (click here)
52. Peer Reviews - Answer (click here)
53. Hazard Analysis - Answer (click here)
54. Testing - Answer (click here)
55. Good Design and Prediction - Answer (click here)
56. Static Analysis - Answer (click here)
57. Configuration Management - Answer (click here)
58. Lessons from Mistakes - Answer (click here)
59. There's More Than One Way to Crack a System - Answer (click here)
60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here)
61. Programming Practice Conclusions - Answer (click here)
62. Standards of Program Development - Answer (click here)
63. Process Standards - Answer (click here)
64. Program Controls in General - Answer (click here)
65. Protection in General-Purpose Operating Systems - Answer (click here)
66. Protected Objects and Methods of Protection - Answer (click here)
67. Memory and Address Protection - Answer (click here)
68. Control of Access to General Objects - Answer (click here)
69. File Protection Mechanisms - Answer (click here)
70. User Authentication - Answer (click here)
71. Biometrics: Ready for Prime Time? - Answer (click here)
72. Passwords as Authenticators - Answer (click here)
73. Additional Authentication Information - Answer (click here)
74. Attacks on Passwords - Answer (click here)
75. Password Selection Criteria - Answer (click here)
76. The Authentication Process - Answer (click here)
77. Biometrics: Authentication Not Using Passwords - Answer (click here)
78. Designing Trusted Operating Systems - Answer (click here)
79. What Is a Trusted System? - Answer (click here)
80. Security Policies - Answer (click here)
81. Models of Security - Answer (click here)
82. Trusted Operating System Design - Answer (click here)
83. The Importance of Good Design Principles - Answer (click here)
84. Trusted System Design Elements - Answer (click here)
85. Security Features of Ordinary Operating Systems - Answer (click here)
86. Security Features of Trusted Operating Systems - Answer (click here)
87. Kernelized Design - Answer (click here)
88. Separation/Isolation - Answer (click here)
89. Virtualization - Answer (click here)
90. Layered Design - Answer (click here)
91. Assurance in Trusted Operating Systems - Answer (click here)
92. Typical Operating System Flaws - Answer (click here)
93. Assurance Methods - Answer (click here)
94. Open Source - Answer (click here)
95. Evaluation - Answer (click here)
96. Security as an Add-On - Answer (click here)

Chapter 6 Database and Data Mining Security


1. What Does "Secure" Mean? - Answer (click here)
2. Protecting Software in Automobile Control Systems - Answer (click here)
3. Attacks - Answer (click here)
4. Why Universities Are Prime Targets - Answer (click here)
5. The Meaning of Computer Security - Answer (click here)
6. Record Record Loss - Answer (click here)
7. Top Methods of Attack - Answer (click here)
8. Computer Criminals - Answer (click here)
9. The Terrorists, Inc., IT Department - Answer (click here)
10. Methods of Defense - Answer (click here)
11. Elementary Cryptography - Answer (click here)
12. Elementary Cryptography - Terminology and Background - Answer (click
here)
13. Substitution Ciphers - Answer (click here)
14. Transpositions (Permutations) - Answer (click here)
15. Making "Good" Encryption Algorithms - Answer (click here)
16. The Data Encryption Standard(DES) - Answer (click here)
17. The AES Encryption Algorithm - Answer (click here)
18. Public Key Encryption - Answer (click here)
19. The Uses of Encryption - Answer (click here)
20. Program Security - Answer (click here)
21. Secure Programs - Answer (click here)
22. Nonmalicious Program Errors - Answer (click here)
23. Viruses and Other Malicious Code - Answer (click here)
24. Nonmalicious Flaws Cause Failures - Answer (click here)
25. Why Worry About Malicious Code? - Answer (click here)
26. Kinds of Malicious Code - Answer (click here)
27. Rapidly Approaching Zero - Answer (click here)
28. How Viruses Attach - Answer (click here)
29. How Viruses Gain Control - Answer (click here)
30. Homes for Viruses - Answer (click here)
31. Virus Signatures - Answer (click here)
32. The Source of Viruses - Answer (click here)
33. Prevention of Virus Infection - Answer (click here)
34. Truths and Misconceptions About Viruses - Answer (click here)
35. First Example of Malicious Code: The Brain Virus - Answer (click here)
36. Example: The Internet Worm - Answer (click here)
37. More Malicious Code: Code Red - Answer (click here)
38. Malicious Code on the Web: Web Bugs - Answer (click here)
39. Is the Cure Worse Than the Disease? - Answer (click here)
40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click
here)
41. Salami Attack - Answer (click here)
42. Rootkits and the Sony XCP - Answer (click here)
43. Privilege Escalation - Answer (click here)
44. Interface Illusions - Answer (click here)
45. Keystroke Logging - Answer (click here)
46. Man-in-the-Middle Attacks - Answer (click here)
47. Timing Attacks - Answer (click here)
48. Covert Channels: Programs That Leak Information - Answer (click here)
49. Controls Against Program Threats - Answer (click here)
50. The Nature of Software Development - Answer (click here)
51. Modularity, Encapsulation, and Information Hiding - Answer (click here)
52. Peer Reviews - Answer (click here)
53. Hazard Analysis - Answer (click here)
54. Testing - Answer (click here)
55. Good Design and Prediction - Answer (click here)
56. Static Analysis - Answer (click here)
57. Configuration Management - Answer (click here)
58. Lessons from Mistakes - Answer (click here)
59. There's More Than One Way to Crack a System - Answer (click here)
60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here)
61. Programming Practice Conclusions - Answer (click here)
62. Standards of Program Development - Answer (click here)
63. Process Standards - Answer (click here)
64. Program Controls in General - Answer (click here)
65. Protection in General-Purpose Operating Systems - Answer (click here)
66. Protected Objects and Methods of Protection - Answer (click here)
67. Memory and Address Protection - Answer (click here)
68. Control of Access to General Objects - Answer (click here)
69. File Protection Mechanisms - Answer (click here)
70. User Authentication - Answer (click here)
71. Biometrics: Ready for Prime Time? - Answer (click here)
72. Passwords as Authenticators - Answer (click here)
73. Additional Authentication Information - Answer (click here)
74. Attacks on Passwords - Answer (click here)
75. Password Selection Criteria - Answer (click here)
76. The Authentication Process - Answer (click here)
77. Biometrics: Authentication Not Using Passwords - Answer (click here)
78. Designing Trusted Operating Systems - Answer (click here)
79. What Is a Trusted System? - Answer (click here)
80. Security Policies - Answer (click here)
81. Models of Security - Answer (click here)
82. Trusted Operating System Design - Answer (click here)
83. The Importance of Good Design Principles - Answer (click here)
84. Trusted System Design Elements - Answer (click here)
85. Security Features of Ordinary Operating Systems - Answer (click here)
86. Security Features of Trusted Operating Systems - Answer (click here)
87. Kernelized Design - Answer (click here)
88. Separation/Isolation - Answer (click here)
89. Virtualization - Answer (click here)
90. Layered Design - Answer (click here)
91. Assurance in Trusted Operating Systems - Answer (click here)
92. Typical Operating System Flaws - Answer (click here)
93. Assurance Methods - Answer (click here)
94. Open Source - Answer (click here)
95. Evaluation - Answer (click here)
96. Security as an Add-On - Answer (click here)
97. Database and Data Mining Security - Answer (click here)
98. Introduction to Databases - Answer (click here)
99. Security Requirements - Answer (click here)
100. Reliability and Integrity - Answer (click here)
101. Sensitive Data - Answer (click here)
102. Inference - Answer (click here)
103. Multilevel Databases - Answer (click here)
104. Proposals for Multilevel Security - Answer (click here)
105. Data Mining - Answer (click here)

Chapter 7 Security in Networks


1. What Does "Secure" Mean? - Answer (click here)
2. Protecting Software in Automobile Control Systems - Answer (click here)
3. Attacks - Answer (click here)
4. Why Universities Are Prime Targets - Answer (click here)
5. The Meaning of Computer Security - Answer (click here)
6. Record Record Loss - Answer (click here)
7. Top Methods of Attack - Answer (click here)
8. Computer Criminals - Answer (click here)
9. The Terrorists, Inc., IT Department - Answer (click here)
10. Methods of Defense - Answer (click here)
11. Elementary Cryptography - Answer (click here)
12. Elementary Cryptography - Terminology and Background - Answer (click
here)
13. Substitution Ciphers - Answer (click here)
14. Transpositions (Permutations) - Answer (click here)
15. Making "Good" Encryption Algorithms - Answer (click here)
16. The Data Encryption Standard(DES) - Answer (click here)
17. The AES Encryption Algorithm - Answer (click here)
18. Public Key Encryption - Answer (click here)
19. The Uses of Encryption - Answer (click here)
20. Program Security - Answer (click here)
21. Secure Programs - Answer (click here)
22. Nonmalicious Program Errors - Answer (click here)
23. Viruses and Other Malicious Code - Answer (click here)
24. Nonmalicious Flaws Cause Failures - Answer (click here)
25. Why Worry About Malicious Code? - Answer (click here)
26. Kinds of Malicious Code - Answer (click here)
27. Rapidly Approaching Zero - Answer (click here)
28. How Viruses Attach - Answer (click here)
29. How Viruses Gain Control - Answer (click here)
30. Homes for Viruses - Answer (click here)
31. Virus Signatures - Answer (click here)
32. The Source of Viruses - Answer (click here)
33. Prevention of Virus Infection - Answer (click here)
34. Truths and Misconceptions About Viruses - Answer (click here)
35. First Example of Malicious Code: The Brain Virus - Answer (click here)
36. Example: The Internet Worm - Answer (click here)
37. More Malicious Code: Code Red - Answer (click here)
38. Malicious Code on the Web: Web Bugs - Answer (click here)
39. Is the Cure Worse Than the Disease? - Answer (click here)
40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click
here)
41. Salami Attack - Answer (click here)
42. Rootkits and the Sony XCP - Answer (click here)
43. Privilege Escalation - Answer (click here)
44. Interface Illusions - Answer (click here)
45. Keystroke Logging - Answer (click here)
46. Man-in-the-Middle Attacks - Answer (click here)
47. Timing Attacks - Answer (click here)
48. Covert Channels: Programs That Leak Information - Answer (click here)
49. Controls Against Program Threats - Answer (click here)
50. The Nature of Software Development - Answer (click here)
51. Modularity, Encapsulation, and Information Hiding - Answer (click here)
52. Peer Reviews - Answer (click here)
53. Hazard Analysis - Answer (click here)
54. Testing - Answer (click here)
55. Good Design and Prediction - Answer (click here)
56. Static Analysis - Answer (click here)
57. Configuration Management - Answer (click here)
58. Lessons from Mistakes - Answer (click here)
59. There's More Than One Way to Crack a System - Answer (click here)
60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here)
61. Programming Practice Conclusions - Answer (click here)
62. Standards of Program Development - Answer (click here)
63. Process Standards - Answer (click here)
64. Program Controls in General - Answer (click here)
65. Protection in General-Purpose Operating Systems - Answer (click here)
66. Protected Objects and Methods of Protection - Answer (click here)
67. Memory and Address Protection - Answer (click here)
68. Control of Access to General Objects - Answer (click here)
69. File Protection Mechanisms - Answer (click here)
70. User Authentication - Answer (click here)
71. Biometrics: Ready for Prime Time? - Answer (click here)
72. Passwords as Authenticators - Answer (click here)
73. Additional Authentication Information - Answer (click here)
74. Attacks on Passwords - Answer (click here)
75. Password Selection Criteria - Answer (click here)
76. The Authentication Process - Answer (click here)
77. Biometrics: Authentication Not Using Passwords - Answer (click here)
78. Designing Trusted Operating Systems - Answer (click here)
79. What Is a Trusted System? - Answer (click here)
80. Security Policies - Answer (click here)
81. Models of Security - Answer (click here)
82. Trusted Operating System Design - Answer (click here)
83. The Importance of Good Design Principles - Answer (click here)
84. Trusted System Design Elements - Answer (click here)
85. Security Features of Ordinary Operating Systems - Answer (click here)
86. Security Features of Trusted Operating Systems - Answer (click here)
87. Kernelized Design - Answer (click here)
88. Separation/Isolation - Answer (click here)
89. Virtualization - Answer (click here)
90. Layered Design - Answer (click here)
91. Assurance in Trusted Operating Systems - Answer (click here)
92. Typical Operating System Flaws - Answer (click here)
93. Assurance Methods - Answer (click here)
94. Open Source - Answer (click here)
95. Evaluation - Answer (click here)
96. Security as an Add-On - Answer (click here)
97. Database and Data Mining Security - Answer (click here)
98. Introduction to Databases - Answer (click here)
99. Security Requirements - Answer (click here)
100. Reliability and Integrity - Answer (click here)
101. Sensitive Data - Answer (click here)
102. Inference - Answer (click here)
103. Multilevel Databases - Answer (click here)
104. Proposals for Multilevel Security - Answer (click here)
105. Data Mining - Answer (click here)
106. Security in Networks - Answer (click here)
107. Network Concepts - Answer (click here)
108. Network Media - Answer (click here)
109. Network Protocols - Answer (click here)
110. Types of Networks - Answer (click here)
111. Threats in Networks - Answer (click here)
112. Who Attacks Networks? - Answer (click here)
113. Threats in Transit: Eavesdropping and Wiretapping - Answer (click here)
114. Protocol Flaws - Answer (click here)
115. Impersonation - Answer (click here)
116. Message Confidentiality Threats - Answer (click here)
117. Message Integrity Threats - Answer (click here)
118. Format Failures - Answer (click here)
119. Web Site Vulnerabilities - Answer (click here)
120. Denial of Service - Answer (click here)
121. Distributed Denial of Service - Answer (click here)
122. Threats in Active or Mobile Code - Answer (click here)
123. Threats in Active or Mobile Code - Answer (click here)
124. Networks Complex Attacks - Answer (click here)
125. Network Security Controls - Security Threat Analysis - Answer (click here)
126. Architecture - Security in Networks - Answer (click here)
127. Encryption - Security in Networks - Answer (click here)
128. Content Integrity - Security in Networks - Answer (click here)
129. Strong Authentication and Kerberos - Security in Networks - Answer (click
here)
130. Access Controls - Security in Networks - Answer (click here)
131. Wireless Networks Security - Answer (click here)
132. Honeypots, Alarms and Alerts - Security in Networks - Answer (click here)
133. Traffic Flow Security - Answer (click here)
134. Firewalls - Answer (click here)
135. Types of Firewalls - Answer (click here)
136. Example Firewall Configurations - Answer (click here)
137. Intrusion Detection Systems - Answer (click here)
138. Types of IDSs(Intrusion Detection Systems) - Answer (click here)
139. Goals for Intrusion Detection Systems - Answer (click here)
140. Intrusion Detection Systems(IDS) Strengths and Limitations - Answer
(click here)
141. Secure E-Mail - Answer (click here)

Chapter 8 Administering Security


1. What Does "Secure" Mean? - Answer (click here)
2. Protecting Software in Automobile Control Systems - Answer (click here)
3. Attacks - Answer (click here)
4. Why Universities Are Prime Targets - Answer (click here)
5. The Meaning of Computer Security - Answer (click here)
6. Record Record Loss - Answer (click here)
7. Top Methods of Attack - Answer (click here)
8. Computer Criminals - Answer (click here)
9. The Terrorists, Inc., IT Department - Answer (click here)
10. Methods of Defense - Answer (click here)
11. Elementary Cryptography - Answer (click here)
12. Elementary Cryptography - Terminology and Background - Answer (click
here)
13. Substitution Ciphers - Answer (click here)
14. Transpositions (Permutations) - Answer (click here)
15. Making "Good" Encryption Algorithms - Answer (click here)
16. The Data Encryption Standard(DES) - Answer (click here)
17. The AES Encryption Algorithm - Answer (click here)
18. Public Key Encryption - Answer (click here)
19. The Uses of Encryption - Answer (click here)
20. Program Security - Answer (click here)
21. Secure Programs - Answer (click here)
22. Nonmalicious Program Errors - Answer (click here)
23. Viruses and Other Malicious Code - Answer (click here)
24. Nonmalicious Flaws Cause Failures - Answer (click here)
25. Why Worry About Malicious Code? - Answer (click here)
26. Kinds of Malicious Code - Answer (click here)
27. Rapidly Approaching Zero - Answer (click here)
28. How Viruses Attach - Answer (click here)
29. How Viruses Gain Control - Answer (click here)
30. Homes for Viruses - Answer (click here)
31. Virus Signatures - Answer (click here)
32. The Source of Viruses - Answer (click here)
33. Prevention of Virus Infection - Answer (click here)
34. Truths and Misconceptions About Viruses - Answer (click here)
35. First Example of Malicious Code: The Brain Virus - Answer (click here)
36. Example: The Internet Worm - Answer (click here)
37. More Malicious Code: Code Red - Answer (click here)
38. Malicious Code on the Web: Web Bugs - Answer (click here)
39. Is the Cure Worse Than the Disease? - Answer (click here)
40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click
here)
41. Salami Attack - Answer (click here)
42. Rootkits and the Sony XCP - Answer (click here)
43. Privilege Escalation - Answer (click here)
44. Interface Illusions - Answer (click here)
45. Keystroke Logging - Answer (click here)
46. Man-in-the-Middle Attacks - Answer (click here)
47. Timing Attacks - Answer (click here)
48. Covert Channels: Programs That Leak Information - Answer (click here)
49. Controls Against Program Threats - Answer (click here)
50. The Nature of Software Development - Answer (click here)
51. Modularity, Encapsulation, and Information Hiding - Answer (click here)
52. Peer Reviews - Answer (click here)
53. Hazard Analysis - Answer (click here)
54. Testing - Answer (click here)
55. Good Design and Prediction - Answer (click here)
56. Static Analysis - Answer (click here)
57. Configuration Management - Answer (click here)
58. Lessons from Mistakes - Answer (click here)
59. There's More Than One Way to Crack a System - Answer (click here)
60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here)
61. Programming Practice Conclusions - Answer (click here)
62. Standards of Program Development - Answer (click here)
63. Process Standards - Answer (click here)
64. Program Controls in General - Answer (click here)
65. Protection in General-Purpose Operating Systems - Answer (click here)
66. Protected Objects and Methods of Protection - Answer (click here)
67. Memory and Address Protection - Answer (click here)
68. Control of Access to General Objects - Answer (click here)
69. File Protection Mechanisms - Answer (click here)
70. User Authentication - Answer (click here)
71. Biometrics: Ready for Prime Time? - Answer (click here)
72. Passwords as Authenticators - Answer (click here)
73. Additional Authentication Information - Answer (click here)
74. Attacks on Passwords - Answer (click here)
75. Password Selection Criteria - Answer (click here)
76. The Authentication Process - Answer (click here)
77. Biometrics: Authentication Not Using Passwords - Answer (click here)
78. Designing Trusted Operating Systems - Answer (click here)
79. What Is a Trusted System? - Answer (click here)
80. Security Policies - Answer (click here)
81. Models of Security - Answer (click here)
82. Trusted Operating System Design - Answer (click here)
83. The Importance of Good Design Principles - Answer (click here)
84. Trusted System Design Elements - Answer (click here)
85. Security Features of Ordinary Operating Systems - Answer (click here)
86. Security Features of Trusted Operating Systems - Answer (click here)
87. Kernelized Design - Answer (click here)
88. Separation/Isolation - Answer (click here)
89. Virtualization - Answer (click here)
90. Layered Design - Answer (click here)
91. Assurance in Trusted Operating Systems - Answer (click here)
92. Typical Operating System Flaws - Answer (click here)
93. Assurance Methods - Answer (click here)
94. Open Source - Answer (click here)
95. Evaluation - Answer (click here)
96. Security as an Add-On - Answer (click here)
97. Database and Data Mining Security - Answer (click here)
98. Introduction to Databases - Answer (click here)
99. Security Requirements - Answer (click here)
100. Reliability and Integrity - Answer (click here)
101. Sensitive Data - Answer (click here)
102. Inference - Answer (click here)
103. Multilevel Databases - Answer (click here)
104. Proposals for Multilevel Security - Answer (click here)
105. Data Mining - Answer (click here)
106. Security in Networks - Answer (click here)
107. Network Concepts - Answer (click here)
108. Network Media - Answer (click here)
109. Network Protocols - Answer (click here)
110. Types of Networks - Answer (click here)
111. Threats in Networks - Answer (click here)
112. Who Attacks Networks? - Answer (click here)
113. Threats in Transit: Eavesdropping and Wiretapping - Answer (click here)
114. Protocol Flaws - Answer (click here)
115. Impersonation - Answer (click here)
116. Message Confidentiality Threats - Answer (click here)
117. Message Integrity Threats - Answer (click here)
118. Format Failures - Answer (click here)
119. Web Site Vulnerabilities - Answer (click here)
120. Denial of Service - Answer (click here)
121. Distributed Denial of Service - Answer (click here)
122. Threats in Active or Mobile Code - Answer (click here)
123. Threats in Active or Mobile Code - Answer (click here)
124. Networks Complex Attacks - Answer (click here)
125. Network Security Controls - Security Threat Analysis - Answer (click here)
126. Architecture - Security in Networks - Answer (click here)
127. Encryption - Security in Networks - Answer (click here)
128. Content Integrity - Security in Networks - Answer (click here)
129. Strong Authentication and Kerberos - Security in Networks - Answer (click
here)
130. Access Controls - Security in Networks - Answer (click here)
131. Wireless Networks Security - Answer (click here)
132. Honeypots, Alarms and Alerts - Security in Networks - Answer (click here)
133. Traffic Flow Security - Answer (click here)
134. Firewalls - Answer (click here)
135. Types of Firewalls - Answer (click here)
136. Example Firewall Configurations - Answer (click here)
137. Intrusion Detection Systems - Answer (click here)
138. Types of IDSs(Intrusion Detection Systems) - Answer (click here)
139. Goals for Intrusion Detection Systems - Answer (click here)
140. Intrusion Detection Systems(IDS) Strengths and Limitations - Answer
(click here)
141. Secure E-Mail - Answer (click here)
142. Administering Security - Answer (click here)
143. Security Planning - Answer (click here)
144. Contents of a Security Plan - Answer (click here)
145. Security Planning Team Members - Answer (click here)
146. Assuring Commitment to a Security Plan - Answer (click here)
147. Business Continuity Plans - Answer (click here)
148. Incident Response Plans - Answer (click here)
149. Risk Analysis - Answer (click here)
150. The Nature of Risk - Answer (click here)
151. Steps of a Risk Analysis - Answer (click here)
152. Arguments For and Against Risk Analysis - Answer (click here)
153. Organizational Security Policies - Answer (click here)
154. Characteristics of a Good Security Policy - Answer (click here)
155. Policy Issue Example: Government E-mail - Answer (click here)
156. Physical Security - Answer (click here)
157. Interception of Sensitive Information - Answer (click here)
158. Contingency Planning - Answer (click here)
159. Physical Security Recap - Answer (click here)

Chapter 9 The Economics of Cybersecurity


1. What Does "Secure" Mean? - Answer (click here)
2. Protecting Software in Automobile Control Systems - Answer (click here)
3. Attacks - Answer (click here)
4. Why Universities Are Prime Targets - Answer (click here)
5. The Meaning of Computer Security - Answer (click here)
6. Record Record Loss - Answer (click here)
7. Top Methods of Attack - Answer (click here)
8. Computer Criminals - Answer (click here)
9. The Terrorists, Inc., IT Department - Answer (click here)
10. Methods of Defense - Answer (click here)
11. Elementary Cryptography - Answer (click here)
12. Elementary Cryptography - Terminology and Background - Answer (click
here)
13. Substitution Ciphers - Answer (click here)
14. Transpositions (Permutations) - Answer (click here)
15. Making "Good" Encryption Algorithms - Answer (click here)
16. The Data Encryption Standard(DES) - Answer (click here)
17. The AES Encryption Algorithm - Answer (click here)
18. Public Key Encryption - Answer (click here)
19. The Uses of Encryption - Answer (click here)
20. Program Security - Answer (click here)
21. Secure Programs - Answer (click here)
22. Nonmalicious Program Errors - Answer (click here)
23. Viruses and Other Malicious Code - Answer (click here)
24. Nonmalicious Flaws Cause Failures - Answer (click here)
25. Why Worry About Malicious Code? - Answer (click here)
26. Kinds of Malicious Code - Answer (click here)
27. Rapidly Approaching Zero - Answer (click here)
28. How Viruses Attach - Answer (click here)
29. How Viruses Gain Control - Answer (click here)
30. Homes for Viruses - Answer (click here)
31. Virus Signatures - Answer (click here)
32. The Source of Viruses - Answer (click here)
33. Prevention of Virus Infection - Answer (click here)
34. Truths and Misconceptions About Viruses - Answer (click here)
35. First Example of Malicious Code: The Brain Virus - Answer (click here)
36. Example: The Internet Worm - Answer (click here)
37. More Malicious Code: Code Red - Answer (click here)
38. Malicious Code on the Web: Web Bugs - Answer (click here)
39. Is the Cure Worse Than the Disease? - Answer (click here)
40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click
here)
41. Salami Attack - Answer (click here)
42. Rootkits and the Sony XCP - Answer (click here)
43. Privilege Escalation - Answer (click here)
44. Interface Illusions - Answer (click here)
45. Keystroke Logging - Answer (click here)
46. Man-in-the-Middle Attacks - Answer (click here)
47. Timing Attacks - Answer (click here)
48. Covert Channels: Programs That Leak Information - Answer (click here)
49. Controls Against Program Threats - Answer (click here)
50. The Nature of Software Development - Answer (click here)
51. Modularity, Encapsulation, and Information Hiding - Answer (click here)
52. Peer Reviews - Answer (click here)
53. Hazard Analysis - Answer (click here)
54. Testing - Answer (click here)
55. Good Design and Prediction - Answer (click here)
56. Static Analysis - Answer (click here)
57. Configuration Management - Answer (click here)
58. Lessons from Mistakes - Answer (click here)
59. There's More Than One Way to Crack a System - Answer (click here)
60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here)
61. Programming Practice Conclusions - Answer (click here)
62. Standards of Program Development - Answer (click here)
63. Process Standards - Answer (click here)
64. Program Controls in General - Answer (click here)
65. Protection in General-Purpose Operating Systems - Answer (click here)
66. Protected Objects and Methods of Protection - Answer (click here)
67. Memory and Address Protection - Answer (click here)
68. Control of Access to General Objects - Answer (click here)
69. File Protection Mechanisms - Answer (click here)
70. User Authentication - Answer (click here)
71. Biometrics: Ready for Prime Time? - Answer (click here)
72. Passwords as Authenticators - Answer (click here)
73. Additional Authentication Information - Answer (click here)
74. Attacks on Passwords - Answer (click here)
75. Password Selection Criteria - Answer (click here)
76. The Authentication Process - Answer (click here)
77. Biometrics: Authentication Not Using Passwords - Answer (click here)
78. Designing Trusted Operating Systems - Answer (click here)
79. What Is a Trusted System? - Answer (click here)
80. Security Policies - Answer (click here)
81. Models of Security - Answer (click here)
82. Trusted Operating System Design - Answer (click here)
83. The Importance of Good Design Principles - Answer (click here)
84. Trusted System Design Elements - Answer (click here)
85. Security Features of Ordinary Operating Systems - Answer (click here)
86. Security Features of Trusted Operating Systems - Answer (click here)
87. Kernelized Design - Answer (click here)
88. Separation/Isolation - Answer (click here)
89. Virtualization - Answer (click here)
90. Layered Design - Answer (click here)
91. Assurance in Trusted Operating Systems - Answer (click here)
92. Typical Operating System Flaws - Answer (click here)
93. Assurance Methods - Answer (click here)
94. Open Source - Answer (click here)
95. Evaluation - Answer (click here)
96. Security as an Add-On - Answer (click here)
97. Database and Data Mining Security - Answer (click here)
98. Introduction to Databases - Answer (click here)
99. Security Requirements - Answer (click here)
100. Reliability and Integrity - Answer (click here)
101. Sensitive Data - Answer (click here)
102. Inference - Answer (click here)
103. Multilevel Databases - Answer (click here)
104. Proposals for Multilevel Security - Answer (click here)
105. Data Mining - Answer (click here)
106. Security in Networks - Answer (click here)
107. Network Concepts - Answer (click here)
108. Network Media - Answer (click here)
109. Network Protocols - Answer (click here)
110. Types of Networks - Answer (click here)
111. Threats in Networks - Answer (click here)
112. Who Attacks Networks? - Answer (click here)
113. Threats in Transit: Eavesdropping and Wiretapping - Answer (click here)
114. Protocol Flaws - Answer (click here)
115. Impersonation - Answer (click here)
116. Message Confidentiality Threats - Answer (click here)
117. Message Integrity Threats - Answer (click here)
118. Format Failures - Answer (click here)
119. Web Site Vulnerabilities - Answer (click here)
120. Denial of Service - Answer (click here)
121. Distributed Denial of Service - Answer (click here)
122. Threats in Active or Mobile Code - Answer (click here)
123. Threats in Active or Mobile Code - Answer (click here)
124. Networks Complex Attacks - Answer (click here)
125. Network Security Controls - Security Threat Analysis - Answer (click here)
126. Architecture - Security in Networks - Answer (click here)
127. Encryption - Security in Networks - Answer (click here)
128. Content Integrity - Security in Networks - Answer (click here)
129. Strong Authentication and Kerberos - Security in Networks - Answer (click
here)
130. Access Controls - Security in Networks - Answer (click here)
131. Wireless Networks Security - Answer (click here)
132. Honeypots, Alarms and Alerts - Security in Networks - Answer (click here)
133. Traffic Flow Security - Answer (click here)
134. Firewalls - Answer (click here)
135. Types of Firewalls - Answer (click here)
136. Example Firewall Configurations - Answer (click here)
137. Intrusion Detection Systems - Answer (click here)
138. Types of IDSs(Intrusion Detection Systems) - Answer (click here)
139. Goals for Intrusion Detection Systems - Answer (click here)
140. Intrusion Detection Systems(IDS) Strengths and Limitations - Answer
(click here)
141. Secure E-Mail - Answer (click here)
142. Administering Security - Answer (click here)
143. Security Planning - Answer (click here)
144. Contents of a Security Plan - Answer (click here)
145. Security Planning Team Members - Answer (click here)
146. Assuring Commitment to a Security Plan - Answer (click here)
147. Business Continuity Plans - Answer (click here)
148. Incident Response Plans - Answer (click here)
149. Risk Analysis - Answer (click here)
150. The Nature of Risk - Answer (click here)
151. Steps of a Risk Analysis - Answer (click here)
152. Arguments For and Against Risk Analysis - Answer (click here)
153. Organizational Security Policies - Answer (click here)
154. Characteristics of a Good Security Policy - Answer (click here)
155. Policy Issue Example: Government E-mail - Answer (click here)
156. Physical Security - Answer (click here)
157. Interception of Sensitive Information - Answer (click here)
158. Contingency Planning - Answer (click here)
159. Physical Security Recap - Answer (click here)
160. The Economics of Cybersecurity - Answer (click here)
161. Making a Business Case - Answer (click here)
162. Quantifying Security - Answer (click here)
163. The Economic Impact of Cybersecurity - Answer (click here)
164. Data to Justify Security Action - Answer (click here)
165. A Summary of Recent Security Surveys - Answer (click here)
166. Are the Data Representative? - Answer (click here)
167. Sources of Attack and Financial Impact - Answer (click here)
168. Modeling Cybersecurity - Answer (click here)
169. Current Research and Future Directions - Answer (click here)

Chapter 10 Privacy in Computing


1. What Does "Secure" Mean? - Answer (click here)
2. Protecting Software in Automobile Control Systems - Answer (click here)
3. Attacks - Answer (click here)
4. Why Universities Are Prime Targets - Answer (click here)
5. The Meaning of Computer Security - Answer (click here)
6. Record Record Loss - Answer (click here)
7. Top Methods of Attack - Answer (click here)
8. Computer Criminals - Answer (click here)
9. The Terrorists, Inc., IT Department - Answer (click here)
10. Methods of Defense - Answer (click here)
11. Elementary Cryptography - Answer (click here)
12. Elementary Cryptography - Terminology and Background - Answer (click
here)
13. Substitution Ciphers - Answer (click here)
14. Transpositions (Permutations) - Answer (click here)
15. Making "Good" Encryption Algorithms - Answer (click here)
16. The Data Encryption Standard(DES) - Answer (click here)
17. The AES Encryption Algorithm - Answer (click here)
18. Public Key Encryption - Answer (click here)
19. The Uses of Encryption - Answer (click here)
20. Program Security - Answer (click here)
21. Secure Programs - Answer (click here)
22. Nonmalicious Program Errors - Answer (click here)
23. Viruses and Other Malicious Code - Answer (click here)
24. Nonmalicious Flaws Cause Failures - Answer (click here)
25. Why Worry About Malicious Code? - Answer (click here)
26. Kinds of Malicious Code - Answer (click here)
27. Rapidly Approaching Zero - Answer (click here)
28. How Viruses Attach - Answer (click here)
29. How Viruses Gain Control - Answer (click here)
30. Homes for Viruses - Answer (click here)
31. Virus Signatures - Answer (click here)
32. The Source of Viruses - Answer (click here)
33. Prevention of Virus Infection - Answer (click here)
34. Truths and Misconceptions About Viruses - Answer (click here)
35. First Example of Malicious Code: The Brain Virus - Answer (click here)
36. Example: The Internet Worm - Answer (click here)
37. More Malicious Code: Code Red - Answer (click here)
38. Malicious Code on the Web: Web Bugs - Answer (click here)
39. Is the Cure Worse Than the Disease? - Answer (click here)
40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click
here)
41. Salami Attack - Answer (click here)
42. Rootkits and the Sony XCP - Answer (click here)
43. Privilege Escalation - Answer (click here)
44. Interface Illusions - Answer (click here)
45. Keystroke Logging - Answer (click here)
46. Man-in-the-Middle Attacks - Answer (click here)
47. Timing Attacks - Answer (click here)
48. Covert Channels: Programs That Leak Information - Answer (click here)
49. Controls Against Program Threats - Answer (click here)
50. The Nature of Software Development - Answer (click here)
51. Modularity, Encapsulation, and Information Hiding - Answer (click here)
52. Peer Reviews - Answer (click here)
53. Hazard Analysis - Answer (click here)
54. Testing - Answer (click here)
55. Good Design and Prediction - Answer (click here)
56. Static Analysis - Answer (click here)
57. Configuration Management - Answer (click here)
58. Lessons from Mistakes - Answer (click here)
59. There's More Than One Way to Crack a System - Answer (click here)
60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here)
61. Programming Practice Conclusions - Answer (click here)
62. Standards of Program Development - Answer (click here)
63. Process Standards - Answer (click here)
64. Program Controls in General - Answer (click here)
65. Protection in General-Purpose Operating Systems - Answer (click here)
66. Protected Objects and Methods of Protection - Answer (click here)
67. Memory and Address Protection - Answer (click here)
68. Control of Access to General Objects - Answer (click here)
69. File Protection Mechanisms - Answer (click here)
70. User Authentication - Answer (click here)
71. Biometrics: Ready for Prime Time? - Answer (click here)
72. Passwords as Authenticators - Answer (click here)
73. Additional Authentication Information - Answer (click here)
74. Attacks on Passwords - Answer (click here)
75. Password Selection Criteria - Answer (click here)
76. The Authentication Process - Answer (click here)
77. Biometrics: Authentication Not Using Passwords - Answer (click here)
78. Designing Trusted Operating Systems - Answer (click here)
79. What Is a Trusted System? - Answer (click here)
80. Security Policies - Answer (click here)
81. Models of Security - Answer (click here)
82. Trusted Operating System Design - Answer (click here)
83. The Importance of Good Design Principles - Answer (click here)
84. Trusted System Design Elements - Answer (click here)
85. Security Features of Ordinary Operating Systems - Answer (click here)
86. Security Features of Trusted Operating Systems - Answer (click here)
87. Kernelized Design - Answer (click here)
88. Separation/Isolation - Answer (click here)
89. Virtualization - Answer (click here)
90. Layered Design - Answer (click here)
91. Assurance in Trusted Operating Systems - Answer (click here)
92. Typical Operating System Flaws - Answer (click here)
93. Assurance Methods - Answer (click here)
94. Open Source - Answer (click here)
95. Evaluation - Answer (click here)
96. Security as an Add-On - Answer (click here)
97. Database and Data Mining Security - Answer (click here)
98. Introduction to Databases - Answer (click here)
99. Security Requirements - Answer (click here)
100. Reliability and Integrity - Answer (click here)
101. Sensitive Data - Answer (click here)
102. Inference - Answer (click here)
103. Multilevel Databases - Answer (click here)
104. Proposals for Multilevel Security - Answer (click here)
105. Data Mining - Answer (click here)
106. Security in Networks - Answer (click here)
107. Network Concepts - Answer (click here)
108. Network Media - Answer (click here)
109. Network Protocols - Answer (click here)
110. Types of Networks - Answer (click here)
111. Threats in Networks - Answer (click here)
112. Who Attacks Networks? - Answer (click here)
113. Threats in Transit: Eavesdropping and Wiretapping - Answer (click here)
114. Protocol Flaws - Answer (click here)
115. Impersonation - Answer (click here)
116. Message Confidentiality Threats - Answer (click here)
117. Message Integrity Threats - Answer (click here)
118. Format Failures - Answer (click here)
119. Web Site Vulnerabilities - Answer (click here)
120. Denial of Service - Answer (click here)
121. Distributed Denial of Service - Answer (click here)
122. Threats in Active or Mobile Code - Answer (click here)
123. Threats in Active or Mobile Code - Answer (click here)
124. Networks Complex Attacks - Answer (click here)
125. Network Security Controls - Security Threat Analysis - Answer (click here)
126. Architecture - Security in Networks - Answer (click here)
127. Encryption - Security in Networks - Answer (click here)
128. Content Integrity - Security in Networks - Answer (click here)
129. Strong Authentication and Kerberos - Security in Networks - Answer (click
here)
130. Access Controls - Security in Networks - Answer (click here)
131. Wireless Networks Security - Answer (click here)
132. Honeypots, Alarms and Alerts - Security in Networks - Answer (click here)
133. Traffic Flow Security - Answer (click here)
134. Firewalls - Answer (click here)
135. Types of Firewalls - Answer (click here)
136. Example Firewall Configurations - Answer (click here)
137. Intrusion Detection Systems - Answer (click here)
138. Types of IDSs(Intrusion Detection Systems) - Answer (click here)
139. Goals for Intrusion Detection Systems - Answer (click here)
140. Intrusion Detection Systems(IDS) Strengths and Limitations - Answer
(click here)
141. Secure E-Mail - Answer (click here)
142. Administering Security - Answer (click here)
143. Security Planning - Answer (click here)
144. Contents of a Security Plan - Answer (click here)
145. Security Planning Team Members - Answer (click here)
146. Assuring Commitment to a Security Plan - Answer (click here)
147. Business Continuity Plans - Answer (click here)
148. Incident Response Plans - Answer (click here)
149. Risk Analysis - Answer (click here)
150. The Nature of Risk - Answer (click here)
151. Steps of a Risk Analysis - Answer (click here)
152. Arguments For and Against Risk Analysis - Answer (click here)
153. Organizational Security Policies - Answer (click here)
154. Characteristics of a Good Security Policy - Answer (click here)
155. Policy Issue Example: Government E-mail - Answer (click here)
156. Physical Security - Answer (click here)
157. Interception of Sensitive Information - Answer (click here)
158. Contingency Planning - Answer (click here)
159. Physical Security Recap - Answer (click here)
160. The Economics of Cybersecurity - Answer (click here)
161. Making a Business Case - Answer (click here)
162. Quantifying Security - Answer (click here)
163. The Economic Impact of Cybersecurity - Answer (click here)
164. Data to Justify Security Action - Answer (click here)
165. A Summary of Recent Security Surveys - Answer (click here)
166. Are the Data Representative? - Answer (click here)
167. Sources of Attack and Financial Impact - Answer (click here)
168. Modeling Cybersecurity - Answer (click here)
169. Current Research and Future Directions - Answer (click here)
170. Privacy in Computing - Answer (click here)
171. Privacy Concepts - Answer (click here)
172. Computer-Related Privacy Problems - Answer (click here)
173. Privacy Principles and Policies - Answer (click here)
174. Authentication and Privacy - Answer (click here)
175. What Authentication Means - Answer (click here)
176. Data Mining - Answer (click here)
177. Privacy on the Web - Answer (click here)
178. Spyware - Answer (click here)
179. Shopping on the Internet - Answer (click here)
180. E-Mail Security - Answer (click here)
181. Impacts on Emerging Technologies - Answer (click here)

Chapter 11 Legal and Ethical Issues in Computer Security


1. What Does "Secure" Mean? - Answer (click here)
2. Protecting Software in Automobile Control Systems - Answer (click here)
3. Attacks - Answer (click here)
4. Why Universities Are Prime Targets - Answer (click here)
5. The Meaning of Computer Security - Answer (click here)
6. Record Record Loss - Answer (click here)
7. Top Methods of Attack - Answer (click here)
8. Computer Criminals - Answer (click here)
9. The Terrorists, Inc., IT Department - Answer (click here)
10. Methods of Defense - Answer (click here)
11. Elementary Cryptography - Answer (click here)
12. Elementary Cryptography - Terminology and Background - Answer (click
here)
13. Substitution Ciphers - Answer (click here)
14. Transpositions (Permutations) - Answer (click here)
15. Making "Good" Encryption Algorithms - Answer (click here)
16. The Data Encryption Standard(DES) - Answer (click here)
17. The AES Encryption Algorithm - Answer (click here)
18. Public Key Encryption - Answer (click here)
19. The Uses of Encryption - Answer (click here)
20. Program Security - Answer (click here)
21. Secure Programs - Answer (click here)
22. Nonmalicious Program Errors - Answer (click here)
23. Viruses and Other Malicious Code - Answer (click here)
24. Nonmalicious Flaws Cause Failures - Answer (click here)
25. Why Worry About Malicious Code? - Answer (click here)
26. Kinds of Malicious Code - Answer (click here)
27. Rapidly Approaching Zero - Answer (click here)
28. How Viruses Attach - Answer (click here)
29. How Viruses Gain Control - Answer (click here)
30. Homes for Viruses - Answer (click here)
31. Virus Signatures - Answer (click here)
32. The Source of Viruses - Answer (click here)
33. Prevention of Virus Infection - Answer (click here)
34. Truths and Misconceptions About Viruses - Answer (click here)
35. First Example of Malicious Code: The Brain Virus - Answer (click here)
36. Example: The Internet Worm - Answer (click here)
37. More Malicious Code: Code Red - Answer (click here)
38. Malicious Code on the Web: Web Bugs - Answer (click here)
39. Is the Cure Worse Than the Disease? - Answer (click here)
40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click
here)
41. Salami Attack - Answer (click here)
42. Rootkits and the Sony XCP - Answer (click here)
43. Privilege Escalation - Answer (click here)
44. Interface Illusions - Answer (click here)
45. Keystroke Logging - Answer (click here)
46. Man-in-the-Middle Attacks - Answer (click here)
47. Timing Attacks - Answer (click here)
48. Covert Channels: Programs That Leak Information - Answer (click here)
49. Controls Against Program Threats - Answer (click here)
50. The Nature of Software Development - Answer (click here)
51. Modularity, Encapsulation, and Information Hiding - Answer (click here)
52. Peer Reviews - Answer (click here)
53. Hazard Analysis - Answer (click here)
54. Testing - Answer (click here)
55. Good Design and Prediction - Answer (click here)
56. Static Analysis - Answer (click here)
57. Configuration Management - Answer (click here)
58. Lessons from Mistakes - Answer (click here)
59. There's More Than One Way to Crack a System - Answer (click here)
60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here)
61. Programming Practice Conclusions - Answer (click here)
62. Standards of Program Development - Answer (click here)
63. Process Standards - Answer (click here)
64. Program Controls in General - Answer (click here)
65. Protection in General-Purpose Operating Systems - Answer (click here)
66. Protected Objects and Methods of Protection - Answer (click here)
67. Memory and Address Protection - Answer (click here)
68. Control of Access to General Objects - Answer (click here)
69. File Protection Mechanisms - Answer (click here)
70. User Authentication - Answer (click here)
71. Biometrics: Ready for Prime Time? - Answer (click here)
72. Passwords as Authenticators - Answer (click here)
73. Additional Authentication Information - Answer (click here)
74. Attacks on Passwords - Answer (click here)
75. Password Selection Criteria - Answer (click here)
76. The Authentication Process - Answer (click here)
77. Biometrics: Authentication Not Using Passwords - Answer (click here)
78. Designing Trusted Operating Systems - Answer (click here)
79. What Is a Trusted System? - Answer (click here)
80. Security Policies - Answer (click here)
81. Models of Security - Answer (click here)
82. Trusted Operating System Design - Answer (click here)
83. The Importance of Good Design Principles - Answer (click here)
84. Trusted System Design Elements - Answer (click here)
85. Security Features of Ordinary Operating Systems - Answer (click here)
86. Security Features of Trusted Operating Systems - Answer (click here)
87. Kernelized Design - Answer (click here)
88. Separation/Isolation - Answer (click here)
89. Virtualization - Answer (click here)
90. Layered Design - Answer (click here)
91. Assurance in Trusted Operating Systems - Answer (click here)
92. Typical Operating System Flaws - Answer (click here)
93. Assurance Methods - Answer (click here)
94. Open Source - Answer (click here)
95. Evaluation - Answer (click here)
96. Security as an Add-On - Answer (click here)
97. Database and Data Mining Security - Answer (click here)
98. Introduction to Databases - Answer (click here)
99. Security Requirements - Answer (click here)
100. Reliability and Integrity - Answer (click here)
101. Sensitive Data - Answer (click here)
102. Inference - Answer (click here)
103. Multilevel Databases - Answer (click here)
104. Proposals for Multilevel Security - Answer (click here)
105. Data Mining - Answer (click here)
106. Security in Networks - Answer (click here)
107. Network Concepts - Answer (click here)
108. Network Media - Answer (click here)
109. Network Protocols - Answer (click here)
110. Types of Networks - Answer (click here)
111. Threats in Networks - Answer (click here)
112. Who Attacks Networks? - Answer (click here)
113. Threats in Transit: Eavesdropping and Wiretapping - Answer (click here)
114. Protocol Flaws - Answer (click here)
115. Impersonation - Answer (click here)
116. Message Confidentiality Threats - Answer (click here)
117. Message Integrity Threats - Answer (click here)
118. Format Failures - Answer (click here)
119. Web Site Vulnerabilities - Answer (click here)
120. Denial of Service - Answer (click here)
121. Distributed Denial of Service - Answer (click here)
122. Threats in Active or Mobile Code - Answer (click here)
123. Threats in Active or Mobile Code - Answer (click here)
124. Networks Complex Attacks - Answer (click here)
125. Network Security Controls - Security Threat Analysis - Answer (click here)
126. Architecture - Security in Networks - Answer (click here)
127. Encryption - Security in Networks - Answer (click here)
128. Content Integrity - Security in Networks - Answer (click here)
129. Strong Authentication and Kerberos - Security in Networks - Answer (click
here)
130. Access Controls - Security in Networks - Answer (click here)
131. Wireless Networks Security - Answer (click here)
132. Honeypots, Alarms and Alerts - Security in Networks - Answer (click here)
133. Traffic Flow Security - Answer (click here)
134. Firewalls - Answer (click here)
135. Types of Firewalls - Answer (click here)
136. Example Firewall Configurations - Answer (click here)
137. Intrusion Detection Systems - Answer (click here)
138. Types of IDSs(Intrusion Detection Systems) - Answer (click here)
139. Goals for Intrusion Detection Systems - Answer (click here)
140. Intrusion Detection Systems(IDS) Strengths and Limitations - Answer
(click here)
141. Secure E-Mail - Answer (click here)
142. Administering Security - Answer (click here)
143. Security Planning - Answer (click here)
144. Contents of a Security Plan - Answer (click here)
145. Security Planning Team Members - Answer (click here)
146. Assuring Commitment to a Security Plan - Answer (click here)
147. Business Continuity Plans - Answer (click here)
148. Incident Response Plans - Answer (click here)
149. Risk Analysis - Answer (click here)
150. The Nature of Risk - Answer (click here)
151. Steps of a Risk Analysis - Answer (click here)
152. Arguments For and Against Risk Analysis - Answer (click here)
153. Organizational Security Policies - Answer (click here)
154. Characteristics of a Good Security Policy - Answer (click here)
155. Policy Issue Example: Government E-mail - Answer (click here)
156. Physical Security - Answer (click here)
157. Interception of Sensitive Information - Answer (click here)
158. Contingency Planning - Answer (click here)
159. Physical Security Recap - Answer (click here)
160. The Economics of Cybersecurity - Answer (click here)
161. Making a Business Case - Answer (click here)
162. Quantifying Security - Answer (click here)
163. The Economic Impact of Cybersecurity - Answer (click here)
164. Data to Justify Security Action - Answer (click here)
165. A Summary of Recent Security Surveys - Answer (click here)
166. Are the Data Representative? - Answer (click here)
167. Sources of Attack and Financial Impact - Answer (click here)
168. Modeling Cybersecurity - Answer (click here)
169. Current Research and Future Directions - Answer (click here)
170. Privacy in Computing - Answer (click here)
171. Privacy Concepts - Answer (click here)
172. Computer-Related Privacy Problems - Answer (click here)
173. Privacy Principles and Policies - Answer (click here)
174. Authentication and Privacy - Answer (click here)
175. What Authentication Means - Answer (click here)
176. Data Mining - Answer (click here)
177. Privacy on the Web - Answer (click here)
178. Spyware - Answer (click here)
179. Shopping on the Internet - Answer (click here)
180. E-Mail Security - Answer (click here)
181. Impacts on Emerging Technologies - Answer (click here)
182. Legal and Ethical Issues in Computer Security - Answer (click here)
183. Protecting Programs and Data - Answer (click here)
184. Copyrights - Protecting Programs and Data - Answer (click here)
185. Patents - Protecting Programs and Data - Answer (click here)
186. Trade Secrets - Answer (click here)
187. Protection for Computer Objects - Answer (click here)
188. Information and the Law - Answer (click here)
189. Rights of Employees and Employers - Answer (click here)
190. Redress for Software Failures - Answer (click here)
191. Computer Crime - Answer (click here)
192. Why Computer Crime Is Hard to Define and Prosecute - Answer (click here)
193. Examples of Statutes - Answer (click here)
194. International Dimensions - Answer (click here)
195. Why Computer Criminals Are Hard to Catch - Answer (click here)
196. What Computer Crime Does Not Address - Answer (click here)
197. Cryptography and the Law - Answer (click here)
198. Ethical Issues in Computer Security - Answer (click here)
199. Case Studies of Ethics: Use of Computer Services - Answer (click here)
200. Case Studies of Ethics: Privacy Rights - Answer (click here)
201. Case Studies of Ethics: Denial of Service - Answer (click here)
202. Case Studies of Ethics: Ownership of Programs - Answer (click here)
203. Case Studies of Ethics: Proprietary Resources - Answer (click here)
204. Case Studies of Ethics: Fraud - Answer (click here)
205. Case Studies of Ethics: Accuracy of Information - Answer (click here)
206. Case Studies of Ethics: Ethics of Hacking or Cracking - Answer (click here)
207. Codes of Computer Ethics - Answer (click here)

Chapter 12 Cryptography Explained


1. What Does "Secure" Mean? - Answer (click here)
2. Protecting Software in Automobile Control Systems - Answer (click here)
3. Attacks - Answer (click here)
4. Why Universities Are Prime Targets - Answer (click here)
5. The Meaning of Computer Security - Answer (click here)
6. Record Record Loss - Answer (click here)
7. Top Methods of Attack - Answer (click here)
8. Computer Criminals - Answer (click here)
9. The Terrorists, Inc., IT Department - Answer (click here)
10. Methods of Defense - Answer (click here)
11. Elementary Cryptography - Answer (click here)
12. Elementary Cryptography - Terminology and Background - Answer (click
here)
13. Substitution Ciphers - Answer (click here)
14. Transpositions (Permutations) - Answer (click here)
15. Making "Good" Encryption Algorithms - Answer (click here)
16. The Data Encryption Standard(DES) - Answer (click here)
17. The AES Encryption Algorithm - Answer (click here)
18. Public Key Encryption - Answer (click here)
19. The Uses of Encryption - Answer (click here)
20. Program Security - Answer (click here)
21. Secure Programs - Answer (click here)
22. Nonmalicious Program Errors - Answer (click here)
23. Viruses and Other Malicious Code - Answer (click here)
24. Nonmalicious Flaws Cause Failures - Answer (click here)
25. Why Worry About Malicious Code? - Answer (click here)
26. Kinds of Malicious Code - Answer (click here)
27. Rapidly Approaching Zero - Answer (click here)
28. How Viruses Attach - Answer (click here)
29. How Viruses Gain Control - Answer (click here)
30. Homes for Viruses - Answer (click here)
31. Virus Signatures - Answer (click here)
32. The Source of Viruses - Answer (click here)
33. Prevention of Virus Infection - Answer (click here)
34. Truths and Misconceptions About Viruses - Answer (click here)
35. First Example of Malicious Code: The Brain Virus - Answer (click here)
36. Example: The Internet Worm - Answer (click here)
37. More Malicious Code: Code Red - Answer (click here)
38. Malicious Code on the Web: Web Bugs - Answer (click here)
39. Is the Cure Worse Than the Disease? - Answer (click here)
40. Trapdoors - Targeted Malicious Code: Examples, Causes - Answer (click
here)
41. Salami Attack - Answer (click here)
42. Rootkits and the Sony XCP - Answer (click here)
43. Privilege Escalation - Answer (click here)
44. Interface Illusions - Answer (click here)
45. Keystroke Logging - Answer (click here)
46. Man-in-the-Middle Attacks - Answer (click here)
47. Timing Attacks - Answer (click here)
48. Covert Channels: Programs That Leak Information - Answer (click here)
49. Controls Against Program Threats - Answer (click here)
50. The Nature of Software Development - Answer (click here)
51. Modularity, Encapsulation, and Information Hiding - Answer (click here)
52. Peer Reviews - Answer (click here)
53. Hazard Analysis - Answer (click here)
54. Testing - Answer (click here)
55. Good Design and Prediction - Answer (click here)
56. Static Analysis - Answer (click here)
57. Configuration Management - Answer (click here)
58. Lessons from Mistakes - Answer (click here)
59. There's More Than One Way to Crack a System - Answer (click here)
60. Formal Methods Can Catch Difficult-to-See Problems - Answer (click here)
61. Programming Practice Conclusions - Answer (click here)
62. Standards of Program Development - Answer (click here)
63. Process Standards - Answer (click here)
64. Program Controls in General - Answer (click here)
65. Protection in General-Purpose Operating Systems - Answer (click here)
66. Protected Objects and Methods of Protection - Answer (click here)
67. Memory and Address Protection - Answer (click here)
68. Control of Access to General Objects - Answer (click here)
69. File Protection Mechanisms - Answer (click here)
70. User Authentication - Answer (click here)
71. Biometrics: Ready for Prime Time? - Answer (click here)
72. Passwords as Authenticators - Answer (click here)
73. Additional Authentication Information - Answer (click here)
74. Attacks on Passwords - Answer (click here)
75. Password Selection Criteria - Answer (click here)
76. The Authentication Process - Answer (click here)
77. Biometrics: Authentication Not Using Passwords - Answer (click here)
78. Designing Trusted Operating Systems - Answer (click here)
79. What Is a Trusted System? - Answer (click here)
80. Security Policies - Answer (click here)
81. Models of Security - Answer (click here)
82. Trusted Operating System Design - Answer (click here)
83. The Importance of Good Design Principles - Answer (click here)
84. Trusted System Design Elements - Answer (click here)
85. Security Features of Ordinary Operating Systems - Answer (click here)
86. Security Features of Trusted Operating Systems - Answer (click here)
87. Kernelized Design - Answer (click here)
88. Separation/Isolation - Answer (click here)
89. Virtualization - Answer (click here)
90. Layered Design - Answer (click here)
91. Assurance in Trusted Operating Systems - Answer (click here)
92. Typical Operating System Flaws - Answer (click here)
93. Assurance Methods - Answer (click here)
94. Open Source - Answer (click here)
95. Evaluation - Answer (click here)
96. Security as an Add-On - Answer (click here)
97. Database and Data Mining Security - Answer (click here)
98. Introduction to Databases - Answer (click here)
99. Security Requirements - Answer (click here)
100. Reliability and Integrity - Answer (click here)
101. Sensitive Data - Answer (click here)
102. Inference - Answer (click here)
103. Multilevel Databases - Answer (click here)
104. Proposals for Multilevel Security - Answer (click here)
105. Data Mining - Answer (click here)
106. Security in Networks - Answer (click here)
107. Network Concepts - Answer (click here)
108. Network Media - Answer (click here)
109. Network Protocols - Answer (click here)
110. Types of Networks - Answer (click here)
111. Threats in Networks - Answer (click here)
112. Who Attacks Networks? - Answer (click here)
113. Threats in Transit: Eavesdropping and Wiretapping - Answer (click here)
114. Protocol Flaws - Answer (click here)
115. Impersonation - Answer (click here)
116. Message Confidentiality Threats - Answer (click here)
117. Message Integrity Threats - Answer (click here)
118. Format Failures - Answer (click here)
119. Web Site Vulnerabilities - Answer (click here)
120. Denial of Service - Answer (click here)
121. Distributed Denial of Service - Answer (click here)
122. Threats in Active or Mobile Code - Answer (click here)
123. Threats in Active or Mobile Code - Answer (click here)
124. Networks Complex Attacks - Answer (click here)
125. Network Security Controls - Security Threat Analysis - Answer (click here)
126. Architecture - Security in Networks - Answer (click here)
127. Encryption - Security in Networks - Answer (click here)
128. Content Integrity - Security in Networks - Answer (click here)
129. Strong Authentication and Kerberos - Security in Networks - Answer (click
here)
130. Access Controls - Security in Networks - Answer (click here)
131. Wireless Networks Security - Answer (click here)
132. Honeypots, Alarms and Alerts - Security in Networks - Answer (click here)
133. Traffic Flow Security - Answer (click here)
134. Firewalls - Answer (click here)
135. Types of Firewalls - Answer (click here)
136. Example Firewall Configurations - Answer (click here)
137. Intrusion Detection Systems - Answer (click here)
138. Types of IDSs(Intrusion Detection Systems) - Answer (click here)
139. Goals for Intrusion Detection Systems - Answer (click here)
140. Intrusion Detection Systems(IDS) Strengths and Limitations - Answer
(click here)
141. Secure E-Mail - Answer (click here)
142. Administering Security - Answer (click here)
143. Security Planning - Answer (click here)
144. Contents of a Security Plan - Answer (click here)
145. Security Planning Team Members - Answer (click here)
146. Assuring Commitment to a Security Plan - Answer (click here)
147. Business Continuity Plans - Answer (click here)
148. Incident Response Plans - Answer (click here)
149. Risk Analysis - Answer (click here)
150. The Nature of Risk - Answer (click here)
151. Steps of a Risk Analysis - Answer (click here)
152. Arguments For and Against Risk Analysis - Answer (click here)
153. Organizational Security Policies - Answer (click here)
154. Characteristics of a Good Security Policy - Answer (click here)
155. Policy Issue Example: Government E-mail - Answer (click here)
156. Physical Security - Answer (click here)
157. Interception of Sensitive Information - Answer (click here)
158. Contingency Planning - Answer (click here)
159. Physical Security Recap - Answer (click here)
160. The Economics of Cybersecurity - Answer (click here)
161. Making a Business Case - Answer (click here)
162. Quantifying Security - Answer (click here)
163. The Economic Impact of Cybersecurity - Answer (click here)
164. Data to Justify Security Action - Answer (click here)
165. A Summary of Recent Security Surveys - Answer (click here)
166. Are the Data Representative? - Answer (click here)
167. Sources of Attack and Financial Impact - Answer (click here)
168. Modeling Cybersecurity - Answer (click here)
169. Current Research and Future Directions - Answer (click here)
170. Privacy in Computing - Answer (click here)
171. Privacy Concepts - Answer (click here)
172. Computer-Related Privacy Problems - Answer (click here)
173. Privacy Principles and Policies - Answer (click here)
174. Authentication and Privacy - Answer (click here)
175. What Authentication Means - Answer (click here)
176. Data Mining - Answer (click here)
177. Privacy on the Web - Answer (click here)
178. Spyware - Answer (click here)
179. Shopping on the Internet - Answer (click here)
180. E-Mail Security - Answer (click here)
181. Impacts on Emerging Technologies - Answer (click here)
182. Legal and Ethical Issues in Computer Security - Answer (click here)
183. Protecting Programs and Data - Answer (click here)
184. Copyrights - Protecting Programs and Data - Answer (click here)
185. Patents - Protecting Programs and Data - Answer (click here)
186. Trade Secrets - Answer (click here)
187. Protection for Computer Objects - Answer (click here)
188. Information and the Law - Answer (click here)
189. Rights of Employees and Employers - Answer (click here)
190. Redress for Software Failures - Answer (click here)
191. Computer Crime - Answer (click here)
192. Why Computer Crime Is Hard to Define and Prosecute - Answer (click here)
193. Examples of Statutes - Answer (click here)
194. International Dimensions - Answer (click here)
195. Why Computer Criminals Are Hard to Catch - Answer (click here)
196. What Computer Crime Does Not Address - Answer (click here)
197. Cryptography and the Law - Answer (click here)
198. Ethical Issues in Computer Security - Answer (click here)
199. Case Studies of Ethics: Use of Computer Services - Answer (click here)
200. Case Studies of Ethics: Privacy Rights - Answer (click here)
201. Case Studies of Ethics: Denial of Service - Answer (click here)
202. Case Studies of Ethics: Ownership of Programs - Answer (click here)
203. Case Studies of Ethics: Proprietary Resources - Answer (click here)
204. Case Studies of Ethics: Fraud - Answer (click here)
205. Case Studies of Ethics: Accuracy of Information - Answer (click here)
206. Case Studies of Ethics: Ethics of Hacking or Cracking - Answer (click here)
207. Codes of Computer Ethics - Answer (click here)
208. Cryptography Explained - Answer (click here)
209. Mathematics for Cryptography - Answer (click here)
210. Symmetric Encryption - Answer (click here)
211. Data Encryption Standard - Answer (click here)
212. Advanced Encryption Standard - Answer (click here)
213. Public Key Encryption Systems - Answer (click here)
214. MerkleHellman Knapsacks - Answer (click here)
215. RivestShamirAdelman (RSA) Encryption - Answer (click here)
216. The El Gamal and Digital Signature Algorithms - Answer (click here)
217. Quantum Cryptography - Answer (click here)

Вам также может понравиться