Professional Documents
Culture Documents
Ebffiledoc 6734
Ebffiledoc 6734
Ebffiledoc 6734
https://textbookfull.com/product/network-and-system-security-
john-r-vacca/
https://textbookfull.com/product/nanoscale-networking-and-
communications-handbook-1st-edition-john-r-vacca-editor/
https://textbookfull.com/product/security-in-computer-and-
information-sciences-erol-gelenbe/
Fundamentals of information systems security 3rd
Edition Kim
https://textbookfull.com/product/fundamentals-of-information-
systems-security-3rd-edition-kim/
https://textbookfull.com/product/new-oxford-textbook-of-
psychiatry-3rd-ed-3rd-edition-john-r-geddes/
https://textbookfull.com/product/handbook-of-multimedia-
information-security-techniques-and-applications-amit-kumar-
singh/
https://textbookfull.com/product/handbook-of-fod-engineering-3rd-
edition-dennis-r-heldman/
https://textbookfull.com/product/the-handbook-of-groundwater-
engineering-3rd-edition-john-h-cushman/
Computer and Information Security Handbook
Computer and Information
Security Handbook
Third Edition
Edited by
John R. Vacca
Morgan Kaufmann is an imprint of Elsevier
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
vii
viii Contents
13. Protecting Data Flow: Information and Chapter Review Questions/Exercises 334
System Integrity 293 Exercise 335
14. Security Assessments 294 References 335
15. Risk Assessments 294
16. Intranet Security Implementation 19. Security for the Internet of
Process Checklist 295 Things 339
17. Summary 295
Chapter Review Questions/Exercises 296 William Stallings
Exercise 296 1. Introduction 339
2. ITU-T Internet of Things (IoT) Reference
Model 340
16. Local Area Network Security
3. Internet of Things (IoT) Security 344
(online chapter) 299 4. Summary 347
Pramod Pandya Chapter Review Questions/Exercises 347
Exercise 348
17. Wireless Network Security 301 References 348
3. The Critical Reasons for Storage Area 65. Private Cloud Security 931
Networking (SAN) Security 880
4. Storage Area Networking (SAN) Keith Lewis
Architecture and Components 880 1. Introduction: Private Cloud System
5. Storage Area Networking (SAN) General Management 931
Threats and Issues 882 2. From Physical to Network Security Base
6. Summary 893 Focus 931
Chapter Review Questions/Exercises 893 3. Benefits of Private Cloud Security
Exercise 894 Infrastructures 933
4. Private Cloud Security Standards and
Best Practices 933
Part IX 5. “As-a-Service” Universe: Service
Cloud Security 895 Models 934
6. Private Cloud Service Model: Layer
Considerations 935
63. Securing Cloud Computing
7. Privacy or Public: The Cloud Security
Systems 897 Challenges 935
Cem Gurkok 8. Summary 935
Chapter Review Questions/Exercises 936
1. Cloud Computing Essentials: Examining
Exercise 936
the Cloud Layers 897
References 936
2. Software as a Service: Managing Risks in
the Cloud 903
3. Platform as a Service: Securing the
66. Virtual Private Cloud Security 937
Platform 904 Keith Lewis
4. Infrastructure as a Service 907
1. Introduction: Virtual Networking in a
5. Leveraging Provider-Specific Security
Private Cloud 937
Options 911
2. Security Console: Centralized Control
6. Achieving Security in a Private
Dashboard Management 937
Cloud 912
3. Security Designs: Virtual Private Cloud
7. Meeting Compliance
Setups 938
Requirements 916
4. Security Object Group Allocations:
8. Preparing for Disaster Recovery 919
Functional Control Management
9. Summary 921
Practices 939
Chapter Review Questions/Exercises 921
5. Virtual Private Cloud Performance
Exercise 922
Versus Security 940
References 922
6. Summary 941
Chapter Review Questions/Exercises 941
64. Cloud Security 923 Exercise 942
Edward G. Amoroso References 942
1. Cloud Overview: Public, Private,
Hybrid 923
2. Cloud Security Threats 924 Part X
3. Internet Service Provider Cloud Virtual Virtual Security 943
Private Network Peering Services 924
4. Cloud Access Security Brokers 925 67. Protecting Virtual
5. Cloud Encryption 925 Infrastructure 945
6. Cloud Security Microsegmentation 926
7. Cloud Security Compliance 927 Edward G. Amoroso
8. Summary 929 1. Virtualization in Computing 945
Chapter Review Questions/Exercises 929 2. Virtual Data Center Security 946
Exercise 929 3. Hypervisor Security 947
References 930 4. Enterprise Segmentation 947
xviii Contents
10. Choosing the Correct Firewall e225 87. Content Filtering e271
11. Firewall Placement and Network
Topology e226 Pete F. Nicoletti
12. Firewall Installation and 1. Defining the Problem e271
Configuration e228 2. Why Content Filtering Is
13. Supporting Outgoing Services Through Important e272
Firewall Configuration e228 3. Content Categorization
14. Secure External Services Technologies e274
Provisioning e230 4. Perimeter Hardware and Software
15. Network Firewalls for Voice and Video Solutions e276
Applications e230 5. Categories e279
16. Firewalls and Important Administrative 6. Legal Issues e280
Service Protocols e231 7. Circumventing Content Filtering e284
17. Internal IP Services Protection e232 8. Additional Items to Consider:
18. Firewall Remote Access Overblocking and
Configuration e233 Underblocking e286
19. Load Balancing and Firewall 9. Related Products e289
Arrays e234 10. Summary e289
20. Highly Available Firewalls e235 Chapter Review Questions/Exercises e291
21. Firewall Management e236 Exercise e291
22. Summary e236
Chapter Review Questions/Exercises e237 90. Verifiable Voting Systems e293
Exercise e237
Thea Peacock, Peter Y.A. Ryan,
76. System Security e239 Steve Schneider, Zhe Xia
Edward G. Amoroso (Chapters 64, 67, 68), Senior Vice Samuel J.J. Curry (Chapter 51), Chief Technology and
President, Chief Security Officer, TAG Cyber LLC Security Officer, Arbor Networks, 76 Blanchard Road,
Jeffrey S. Bardin (Chapters 61, 89), Chief Intelligence Burlington MA 01803
Strategist, Treadstone 71 LLC, 515 Oakham Road, Rozita Dara (Chapter 6), Professor, University of Guelph,
Barre, MA 01005 School of Computer Science Guelph, ON, Canada
Cataldo Basile (Chapters 26, 55), Professor, Universita Christopher Day, CISSP, NSA:IEM (Chapter 72), Senior
degli studi di Bergamo, Via Salvecchio 19, 24129 Vice President, Secure Information Systems, Terremark
Bergamo Italy Worldwide, Inc., One Biscayne Tower 2 South Biscayne
Stefan Berthold (Chapter 53), Tek. Lic., Karlstad Univer- Blvd, Suite 2900, Miami, Florida 33131
sity, Universitetsgatan 2 S-65469, Karlstad/Sweden Sabrina De Capitani di Vimercati (Chapter 57), Pro-
Gerald Beuchelt (Chapters 10, 11), Principal Software fessor, Università degli Studi di Milano, DTI -
Systems Engineer, Demandware, Inc., Burlington, MA Dipartimento di Tecnologie dell’Informazione, S207,
Università degli Studi di Milano, Via Bramante 65,
Rahul Bhaskar (Chapters 27, 82), Professor, Depart- 26013 Crema e Italy
ment of Information Systems and Decision Sciences,
California State University, LH 564, Fullerton, California Tewfiq El Maliki (Chapter 71), Professor, University of
92834 Geneva, Switzerland, 2850 route nationale, 74120
Megève, France; Telecommunications labs, University
Chiara Braghin (Chapter 52), Professor, Dept. of Infor- of Applied Sciences of Geneva, Geneva, Switzerland
mation Technology, University of Milan, via Bramante
65 e 26013, Crema, Italy Scott R. Ellis (Chapters 3, 5, 23, 29, 30, 36, 40, 42, 75,
80), Manager, Infrastructure Engineering Team, kCura,
Albert Caballero (Chapters 24, 33), Chief Technology 175 West Jackson Blvd., Suite 1000, Chicago, IL 60604
Officer - CTO, Digital Era Group, LLC, 9357 Abbot
Ave., Surfside, Fl. 33154 Michael Erbschloe (Foreword), Teaches Information Se-
curity courses at Webster University, St. Louis, Missouri
Matteo Maria Casalino (Chapter 55), Professor, Universita 63119
degli studi di Bergamo, Via Salvecchio 19, 24129
Bergamo Italy Simone Fischer-Hbner (Chapter 53), Professor, Karlstad
University, Department of Computer Science, Room
Erdal Cayirci (Chapters 17, 21), Professor, University of no: 5A 435, Universitetsgatan 1, S 651 88, Karlstad/
Stavanger, N-4036 Stavanger, Norway Sweden
Thomas M. Chen (Chapters 8, 18, 60), Professor, Swansea Sara Foresti (Chapter 56), Professor, Università degli
University, Singleton Park, SA2 8PP, Wales, United Studi di Milano, Information Technology Department,
Kingdom Università degli Studi di Milano, via Bramante,
Hongbing Cheng (Chapters 17, 21), Professor, University 6526013 Crema (CR) Italy
of Stavanger, N-4036, Stavanger, Norway Errin W. Fulp (Chapter 74), Professor, Department of
Lauren Collins (Chapters 22, 36, 76, 77, 79, 81), Founder Computer Science, 239, Manchester Hall, P.O.
and Chief Strategy Officer, Managing Director, Win- Box 7311, Wake Forest University, Winston-Salem,
ning Edge Communications, 8151 West Eagle Lake North Carolina 27109
Road, Peotone, IL 60468 Angelo Genovese (Chapter 57), Professor, Università
Marco Cremonini (Chapter 52), Professor, Dept. of In- degli Studi di Milano, DTI - Dipartimento di Tecnolo-
formation Technology, University of Milan, via Bra- gie dell’Informazione, S207, Università degli Studi di
mante 65 e 26013, Crema, Italy Milano, Via Bramante 65, 26013 Crema e Italy
xxvii
xxviii Contributors
Anna Granova (Chapter 83), Advocate of the High Court Dalia Khader (Chapter 49), Collaborateur scientifique,
of South Africa, University of Pretoria, Computer University of Luxemburg, Campus Kirchberg,
Science Department, Information Technology Building, F 006, 6, rue Richard Coudenhove-Kalergi, L-1359
49 Algernon Road, Norwood, Johannesburg, 2192, Luxembourg
Republic of South Africa John Benjamin Khan (Chapter 45), Former UNIX Oper-
William F. Gross (Chapters 35, 37), Private Investigator, ator, University of Massachusetts, Infragard Member 6
Gross Security, LLC, 146 Main Street, Spencer, WV Stella Rd, Boston, MA 02131
25276 Larry Korba (Chapter 54), Ottawa, Ontario, Canada K1G
Yong Guan (Chapter 43), Litton Assistant Professor, 5N7
Department of Electrical and Computer Engineering, Kameswari Kotapati (Chapter 20), Department of
Iowa State University, 3216 Coover Hall, Ames, Iowa Computer Science and Engineering, The Pennsylvania
50011 State University, University Park, Pennsylvania 16802
Cem Gurkok (Chapters 41, 63), Threat Intelligence Stefan C. Kremer (Chapter 6), Professor, University of
Development Manager, Terremark Worldwide, Inc., Guelph, School of Computer Science, Guelph, ON,
One Biscayne Tower, 2S. Biscayne Blvd., Suite 2800, Canada
Miami, Florida 33131
Thomas F. LaPorta (Chapter 20), Professor, Department
Feng Hao (Chapter 49), Professor, Newcastle University, of Computer Science and Engineering, The Pennsylvania
School of Computing Science, Newcastle University, State University, University Park, Pennsylvania 16802
Newcastle Upon Tyne NE1 7RU
Jean Lencrenon (Chapter 49), Professor, Interdisciplinary
Tarfa Hamed (Chapter 6), Professor, University of Guelph, Centre for Security, Reliability and Trust, 6 rue Richard
School of Computer Science Guelph, ON, Canada Coudenhove-Kalergi, L-1359 Luxembourg-Kirchberg,
James T. Harmening (Chapters 25, 58), President, Computer Luxembourg
Bits, Inc., 123 W. Madison St. Suite 1005, Chicago, Keith Lewis (Chapters 4, 38, 39, 65, 66, 78), IT Security
Illinois 60602 Infrastructure Specialist, Keller Graduate School of
Rich Hoffman (Chapter 44), Assistant Vice President of Management, Naperville, Illinois
Forensics and the Lead Examiner, UnitedLex, 6130 Peng Liu (Chapter 20), Director, Cyber Security Lab,
Sprint 5 Parkway, Suite 300, Overland Park, Kansas College of Information Sciences and Technology,
66211 Pennsylvania State University, University Park,
Emin Huseynov (Chapter 50), Professor, University of Pennsylvania 16802
Geneva, Switzerland, CUI, Bureau, Battelle batiment A 7 Giovanni Livraga (Chapter 57), Professor, Università
route de Drize, c11-1227, 74120 Carouge, Switzerland degli Studi di Milano, DTI - Dipartimento di Tecnolo-
Markus Jakobsson (Chapter 59), Associate Professor of gie dell’Informazione, S207, Università degli Studi di
Informatics at IUB and Associate Director of CACR, Milano, Via Bramante 65, 26013 Crema e Italy
Indiana University, 5631 E Kerr Creek Rd., Bloo- John R. Mallery (Chapter 2), President, Mallery Tech-
mington, IN 47408 nical Training and Consulting, Inc., 9393 West 110th
Ravi Jhawar (Chapter 9), Professor, Universita’ degli St., Suite 500, Overland Park, Kansas, 66210
Studi di Milano, Department of Information Technol- Bill Mansoor (Chapter 15), Information Security Analyst
ogy, Universita’ degli Studi di Milano, via Bramante III, Information Security Office County of Riverside,
65, 26013 Crema (CR) ITALY 24711 Via Alvorado Mission Viejo, California 92692
Almantas Kakareka CISSP, GSNA, GSEC, CEH Luther Martin (Chapter 70), Chief Security Architect,
(Chapter 31), CTO, Demyo, Inc., 351 189th street, Voltage Security, 20400 Stevens Creek, Blvd STE 500
Sunny Isles Beach, FL 33160 Cupertino, CA 95014
Bhushan Kapoor (Chapters 27, 46, 82), Chair, Depart- John McDonald (Chapter 61), EMC Corporation, Hop-
ment of Information Systems and Decision Sciences, kinton, Massachusetts 01748
California State University, LH 564, Fullerton, California
92834 John McGowan (Chapter 61), EMC Corporation, Hop-
kinton, Massachusetts 01748
Sokratis K. Katsikas (Chapter 34), Department of
Technology Education & Digital Systems, University of Nailah Mims (Chapters 14, 84), Information Systems Se-
Piraeus, Piraeus 18532, Greece curity Analyst, Bright Horizons, 2 Seven Springs Lane
H, Burlington, MA 01803
Contributors xxix
Simone Mutti (Chapter 55), Professor, Universita degli Pierangela Samarati (Chapter 56), Professor, Università
studi di Bergamo, Via Salvecchio 19, 24129 Bergamo degli Studi di Milano, Information Technology
Italy Department, Università degli Studi di Milano, via Bra-
Peter F. Nicoletti (Chapter 87), Consultant, 110 Gumbo mante, 6526013 Crema (CR), Italy
Limbo Lane Po Box 448Miami, Florida, Tavernier, FL Marco Santambrogio (Chapter 7), Professor, Politecnico
33070 di Milano, Milano, ITALY
Kevin Noble, CISSP GSEC (Chapter 85), Director, Secure Mario Santana (Chapter 12), Consultant, Terremark
Information Services, Terremark Worldwide Inc., 50 Worldwide, Inc., One Biscayne Tower, 2S., Biscayne
N.E. 9 Street, Miami, Florida 33132 Blvd., Suite 2800, Miami, Florida 33131
Pramod Pandya (Chapters 16, 28, 46, 73, 91), Professor, Steve Schneider (Chapter 90), Professor, University of
Department of Information Systems and Decision Sci- Surrey, Department of Computing, Guildford, Surrey,
ences, California State University, Fullerton, California GU2 7XH
92834 Fabio Scotti (Chapter 57), Professor, Universita’ degli
Harsh Kupwade Patil (Chapters 18, 60), Professor, Studi di Milano, Department of Information Technol-
Southern Methodist University, Department of Com- ogy, Universita’ degli Studi di Milano, via Bramante
puter Science and Engineering, Lyle School of Engi- 65, 26013 Crema (CR), ITALY
neering, Caruth Hall 3145 Dyer Street, Suite 445 Jean-Marc Seigneur (Chapters 50, 71, 86), Professor,
Dallas, Texas Advanced Systems Group, University of Geneva,
Stefano Paraboschi (Chapters 26, 55), Professor, Uni- Switzerland, Centre Universitaire d’Informatique, Office
versita degli studi di Bergamo, Via Salvecchio 19, 234, Battelle batiment A 7 route de Drize, c11-1227,
24129 Bergamo Italy 74120 Carouge, Switzerland
Thea Peacock (Chapter 90), Professor, University of Marco Slaviero (Chapter 83), Security Analyst, Sense-
Luxemburg, Faculte des Sciences, De la Technologie et Post Pty Ltd, Lakeview 2, 138 Middel street, Nieuw
de la Communication 6, Rue Richard Coudenhove- Muckleneuk, Pretoria, South Africa
Kalergi L-1359 Luxembourg Daniel S. Soper (Chapter 47), Professor, Information and
Ken Perkins (Chapter 88), CIPP (Certified Information Decision Sciences Department, Mihaylo College of
Privacy Professional), Sr. Systems Engineer, Blazent Business and Economics, California State University,
Incorporated, 3650 E. 1st Ave., Denver, Colorado Fullerton, California 92834-6848
80206 Terence Spies (Chapter 48), Chief Technology Officer/
Vincenzo Piuri (Chapters 9, 57), Professor, Universita’ Vice President of Engineering, Hewlett Packard Enter-
degli Studi di Milano, Department of Information prise, 20400 Stevens Creek Blvd, Suite 500, Cupertino,
Technology, Universita’ degli Studi di Milano, via CA 95014
Bramante 65 26013 Crema (CR), ITALY William Stallings (Chapters 19, 69), Consultant and Writer,
Henrik Plate (Chapter 26), Senior Researcher, CISSP, No affiliation, 845 Satucket Road P. O. Box 2405,
SAP Research Security & Trust, 805, avenue du docteur Brewster, MA 02631
Maurice Donat 06250 Mougins, France Alex Tsow (Chapter 59), Professor, Indiana University,
James Pooley (Chapter 1), Attorney, Orrick, Herrington 7514 Ambergate Pl., Mclean, Virginia 22102
& Sutcliffe LLP, 1000 Marsh Road, Menlo Park, CA Jesse Walker (Chapter 13), Principal Engineer, Intel
94025-1015 Corporation, JF2-55 2111 N.E. 25th Avenue, Hillsboro,
Chunming Rong (Chapters 17, 21), Professor, Ph.D., OR 97124
Chair of Computer Science Section, Faculty of Science Michael A. West (Chapter 7), Senior Technical Writer,
and Technology, University of Stavanger, N-4036 Sta- Truestone Maritime Operations Martinez, California
vanger, Norway 94553
Robert Rounsavall (Chapter 62), Co-founder, Trapezoid, Dan Wing (Chapter 60), Distinguished Engineer, Cisco
Inc., 4931 SW 75th Ave., Miami, Florida 33155 Systems, Inc., 222 Coffeeberry Drive, San Jose, CA
Peter Y.A. Ryan (Chapters 49, 90), Professor of Informa- 95123
tion Security and Head of Applied Security and Infor- George O.M. Yee (Chapters 32, 54), Adjunct Research
mation Assurance (APSIA) Group, GCWN, University Professor, Carleton University, 17 Sai Crescent,
of Luxemburg, Campus Kirchberg 6, rue Richard, Ottawa, ON, Canada K1G 5N7
Coudenhove-Kalergi, L-1359 Luxembourg
Another random document with
no related content on Scribd:
Susan felt inclined to say, “And were you?” but her courage failed
her. Bella could never see a joke! She had no recollection of Bella’s
beauty—Bella’s complexion, as long as she could remember it, had
been the colour of mutton fat—but Bella was twenty-five years her
senior—and no doubt her bloom had withered early.
“The girl looks to me—as if—as if——”
“Bertie Woolcock had proposed!” supplemented Bella. “Yes, I
shouldn’t wonder.”
“No—not that.”
“Then what?” snapped her sister. “As if—and you stop; it’s a dreadful
habit not to be able to finish a sentence—it shows a weak intellect.”
“Well, since you must have it, Bella—as if she were in love.”
“So she is—with young Woolcock.”
“Nonsense,” repeated Susan, with unusual decision.
“Susan, don’t you dare to say ‘nonsense’ when I say a thing is so;
you forget yourself. Aurea will be married to Herbert Woolcock
before Christmas—that is pretty well settled. And now you may lock
up the silver; I am going to bed.”