Skip to main content

Computer Security

  • Chapter
  • First Online:
Computer and Network Security Essentials

Abstract

An overview of basic computer security concepts is presented along with a brief history of major computer security events of the late twentieth and early twenty-first centuries. This is followed by a description of the most important computer security vulnerabilities that exist today and countermeasures being used to mitigate them. Future trends in computer security are assessed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pfleeger, C. P., & Pfleeger, S. L. (2015). Security in computing (5th ed.). Upper Saddle River, NJ: Prentice Hall. ISBN:978-0134085043.

    MATH  Google Scholar 

  2. Stallings, W. (2016). Cryptography and network security: Principles and practice (7th ed.). London: Pearson. ISBN:978-013444284.

    Google Scholar 

  3. Clarke, R. A. (2011). Cyber war: The next threat to national security and what to do about it. Manhattan, NY: Ecco Publishing. ISBN 978-0061962240.

    Google Scholar 

  4. Boyer, S. A. (2010). SCADA supervisory control and data acquisition (p. 179). Research Triangle Park, NC: ISA-International Society of Automation. ISBN:978-1-936007-09-7.

    Google Scholar 

  5. Cohen, F. (1987). Computer viruses. Computers & Security, 6(1), 22–35. doi:10.1016/0167-4048(87)90122-2.

    Article  Google Scholar 

  6. Caddy, T., & Bleumer, G. (2005). Security evaluation criteria. In H. C. A. van Tilborg (Ed.), Encyclopedia of cryptography and security (p. 552). New York: Springer.

    Chapter  Google Scholar 

  7. Stoll, C. (1988). Stalking the wily hacker. Communications of the ACM, 31(5), 484–497.

    Article  Google Scholar 

  8. FIPS 46-3: Data encryption standard. csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf

  9. Loukides, M., & Gilmore, J. (1998). Cracking DES: Secrets of encryption research, wiretap politics, and chip design (pp. 800–822). San Francisco, CA: Electronic Frontier Foundation.

    Google Scholar 

  10. Benton, K. (2010). The evolution of 802.11 wireless security. Las Vegas, NV: University of Nevada.

    Google Scholar 

  11. Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES – the advanced encryption standard. Berlin: Springer. ISBN 3-540-42580-2.

    Book  MATH  Google Scholar 

  12. Singer, P. W., & Friedman, A. (2014). Cybersecurity: What everyone needs to know. Oxford, UK: Oxford University Press. ISBN:978-0199918199.

    Google Scholar 

  13. Clarke, R. A. (2011). Cyber war: The next threat to national security and what to do about it. Manhattan, NY: Ecco Publishing. ISBN 978-0061962240.

    Google Scholar 

  14. Kennedy, D. (2011). Metasploit: The penetration tester’s guide. San Francisco, CA: No Starch Press. ISBN:978-1-59327-288-3.

    Google Scholar 

  15. Conheady, S. (2014). Social engineering in IT security: Tools, tactics and techniques. New York City, NY: McGraw-Hill. ISBN:978-00071818464. (ISO/IEC 15408).

    Google Scholar 

  16. Smith, J. (2016). Tor and the dark net: Remain anonymous and evade NSA spying., ISBN:978-00071818464978-0692674444. New Delhi: Pinnacle Publishers.

    Google Scholar 

  17. Fruhwirth, C. (2005). New methods in hard disk encryption. Institute for computer languages: Theory and logic group (PDF). Vienna: Vienna University of Technology. ISBN:978-00071818464978-0596002428.

    Google Scholar 

  18. England, P., Lampson, B., Manferdelli, J., Peinado, M., & Willman, B. (2003). A trusted open platform (PDF). Computer, 36(7), 55–62.

    Article  Google Scholar 

  19. Nakamoto, S. (2009). Bitcoin: A peer-to-peer electronic cash system (PDF). Retrieved February 20, 2017, from https://bitcoin.org/bitcoin.pdf

  20. Hellman, M. E. (1980). A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory, 26(4), 401–406. doi:10.1109/TIT.1980.1056220

  21. Aycock, J. (2006). Computer viruses and malware (p. 14). New York: Springer. ISBN:978-00071818464.

    Google Scholar 

  22. Eilam, E. (2005). Reversing: Secrets of reverse engineering. Indianapolis, IN: Wiley Publishing. ISBN:978-0007181846413-978-0-7645-7481-8.

    Google Scholar 

  23. Richard E. S. (2001), Authentication: From passwords to public keys., ISBN:978-00071818464978-0201615999.

    Google Scholar 

  24. Jain, A., Hong, L., & Pankanti, S. (2000). Biometric identification. Communications of the ACM, 43(2), 91–98. doi:10.1145/328236.328110

  25. Szor, P. (2005). The art of computer virus research and defense. Boston: Addison-Wesley Professional. ASIN 0321304543.

    Google Scholar 

  26. National Security Agency shares security enhancements to linux. NSA Press Release. Fort George G. Meade, Maryland: National Security Agency Central Security Service. 2001-01-02.

    Google Scholar 

  27. Sommerville, I. (2015), Software engineering., ISBN:978-0133943030.

    MATH  Google Scholar 

  28. Graff, M. G., & van Wyk, K. R. (2003). Secure coding: Principles and practices. Sebastopol, CA: O’Reilly Media, Inc.

    Google Scholar 

  29. List of computer criminals. https://en.wikipedia.org/wiki/List_of_computer_criminals

  30. Li, Z., He, W., Akhawe, D., & Song, D. (2014). The emperor’s new password manager: Security analysis of web-based password managers (PDF). Usenix.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jeffrey L. Duffany .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Duffany, J.L. (2018). Computer Security. In: Daimi, K. (eds) Computer and Network Security Essentials. Springer, Cham. https://doi.org/10.1007/978-3-319-58424-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-58424-9_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-58423-2

  • Online ISBN: 978-3-319-58424-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics