Elements of Computer Security

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile

  • PDF / 7,263,690 Bytes
  • 380 Pages / 439.37 x 666.142 pts Page_size
  • 29 Downloads / 210 Views

DOWNLOAD

REPORT


Undergraduate Topics in Computer Science (UTiCS) delivers high-quality instructional content for undergraduates studying in all areas of computing and information science. From core foundational and theoretical material to final-year topics and applications, UTiCS books take a fresh, concise, and modern approach and are ideal for self-study or for a one- or two-semester course. The texts are all authored by established experts in their fields, reviewed by an international advisory board, and contain numerous examples and problems. Many include fully worked solutions.

For further volumes: http://www.springer.com/series/7592

David Salomon

Elements of Computer Security

123

Prof. David Salomon (emeritus) Computer Science Dept. California State University, Northridge Northridge, CA 91330-8281 USA [email protected] Series editor Ian Mackie Advisory board Samson Abramsky, University of Oxford, UK Chris Hankin, Imperial College London, UK Dexter Kozen, Cornell University, USA Andrew Pitts, University of Cambridge, UK Hanne Riis Nielson, Technical University of Denmark, Denmark Steven Skiena, Stony Brook University, USA Iain Stewart, University of Durham, UK David Zhang, The Hong Kong Polytechnic University, Hong Kong

ISBN 978-0-85729-005-2 e-ISBN 978-0-85729-006-9 DOI 10.1007/978-0-85729-006-9 Springer London Dordrecht Heidelberg New York British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Library of Congress Control Number: 2010933120 c Springer-Verlag London Limited 2010  Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms of licenses issued by the Copyright Licensing Agency. Enquiries concerning reproduction outside those terms should be sent to the publishers. The use of registered names, trademarks, etc., in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant laws and regulations and therefore free for general use. The publisher makes no representation, express or implied, with regard to the accuracy of the information contained in this book and cannot accept any legal responsibility or liability for any errors or omissions that may be made. Printed on acid-free paper. Springer is part of Springer Science+Business Media (www.springer.com)

To the many anonymous cybercriminals and hackers, without whom this book would not have been necessary.

Now you have given me a security worth having; and I shall proceed with courage.

—Jane Austen, Northanger Abbey (1803)

Preface The Security Challenge: A Global Context On 21 November 2008, the conficker worm, one of the worst examples of malware in recent years, was first detected. As these words are bei