Internet Besieged: Countering Cyberspace ScofflawsAssaults on privacy! Theft of information! Break-ins, assaults, and thefts are prohibited. Yet they happen. How is this so? Just how clever are the invaders? What are the holes in supposedly secure systems? Internet Besieged explains the ingenious strategies employed by intruders. It shows how security experts must be both defensive and proactive to protect information, privacy, and electronic commerce. Internet Besieged consists of over thirty original and recently published chapters written by leading figures in security. They range from technical explanations of encryption and intrusion-detection systems to popular accounts of hacker attacks. Internet Besieged is organized for the general reader as well as the practicing professional. It covers: The emergence of the Internet-the evolution of security problems and required countermeasures Major patterns of weakness in Internet-connected computer systems and methods for preventing and detecting attacks The use of cryptography to secure computers and data on the Internet Electronic commerce and secure transactions-authentication and integrity-checking technologies; foiling identity theft Ethics, laws, practices, and policies that g |
Contents
PARTI THE WORLDWIDE NETWORK | 11 |
Cyberspace Attacks and Countermeasures | 29 |
Prepared Testimony | 57 |
Copyright | |
21 other sections not shown
Common terms and phrases
algorithm allow applet application ARPANET atomicity attack audit authentication protocol Berferd browser bytecode certificate Chapter checking communication computer crime computer science Computer Security computer systems computer virus configuration connection cryptographic cryptosystems cypherpunks database decryption digital cash digital signatures disk e-mail Ecash electronic commerce example executed export file system firewall hacker host HotJava identity implementation integrity interface Internet intruder issues Java Kerberos Key Escrow key recovery LAN monitor login machine methods Netscape Netscape Navigator one-time passwords operating system packet password file problem protect public-key recovery agents reported request Research Rome Labs SATAN sequence number server session key signature smart cards smartcard sniffer Spafford specific spoofing standard system administrators transaction Tripwire trusted UNIX Usenix user's virus viruses vulnerabilities