100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

Test Bank for Computer Security: Principles and Practice, 4th edition by William Stallings

Puntuación
-
Vendido
-
Páginas
144
Grado
A+
Subido en
17-11-2025
Escrito en
2025/2026

Test Bank for Computer Security: Principles and Practice, 4th edition by William Stallings, All Chapters 1-24. Full Chapters Include;.....Chapter 1 Overview 1.1 Computer Security Concepts 1.2 Threats, Attacks, and Assets 1.3 Security Functional Requirements 1.4 Fundamental Security Design Principles 1.5 Attack Surfaces and Attack Trees 1.6 Computer Security Strategy 1.7 Standards 1.8 Key Terms, Review Questions, and Problems PART ONE COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES Chapter 2 Cryptographic Tools 2.1 Confidentiality with Symmetric Encryption 2.2 Message Authentication and Hash Functions 2.3 Public-Key Encryption 2.4 Digital Signatures and Key Management 2.5 Random and Pseudorandom Numbers 2.6 Practical Application: Encryption of Stored Data 2.7 Key Terms, Review Questions, and Problems Chapter 3 User Authentication 3.1 Digital User Authentication Principles 3.2 Password-Based Authentication 3.3 Token-Based Authentication 3.4 Biometric Authentication 3.5 Remote User Authentication 3.6 Security Issues for User Authentication 3.7 Practical Application: An Iris Biometric System 3.8 Case Study: Security Problems for ATM Systems 3.9 Key Terms, Review Questions, and Problems Chapter 4 Access Control 4.1 Access Control Principles 4.2 Subjects, Objects, and Access Rights 4.3 Discretionary Access Control 4.4 Example: UNIX File Access Control 4.5 Role-Based Access Control 4.6 Attribute-Based Access Control 4.7 Identity, Credential, and Access Management 4.8 Trust Frameworks 4.9 Case Study: RBAC System for a Bank 4.10 Key Terms, Review Questions, and Problems Chapter 5 Database and Data Center Security 5.1 The Need for Database Security 5.2 Database Management Systems 5.3 Relational Databases 5.4 SQL Injection Attacks 5.5 Database Access Control 5.6 Inference 5.7 Database Encryption 5.8 Data Center Security 5.9 Key Terms, Review Questions, and Problems Chapter 6 Malicious Software 6.1 Types of Malicious Software 6.2 Advanced Persistent Threat 6.2 Propagation — Infected Content - Viruses 6.3 Propagation — Vulnerability Exploit - Worms 6.4 Propagation — Social Engineering — SPAM E-Mail, Trojans 6.5 Payload — System Corruption 6.6 Payload — Attack Agent — Zombie, Bots 6.7 Payload — Information Theft — Keyloggers, Phishing, Spyware 6.8 Payload — Stealthing — Backdoors, Rootkits 6.9 Countermeasures 6.10 Key Terms, Review Questions, and Problems Chapter 7 Denial-of-Service Attacks 7.1 Denial-of-Service Attacks 7.2 Flooding Attacks 7.3 Distributed Denial-of-Service Attacks 7.4 Application-Based Bandwidth Attacks 7.5 Reflector and Amplifier Attacks 7.6 Defenses Against Denial-of-Service Attacks 7.7 Responding to a Denial-of-Service Attack 7.8 Key Terms, Review Questions, and Problems Chapter 8 Intrusion Detection 8.1 Intruders 8.2 Intrusion Detection 8.3 Analysis Approaches 8.4 Host-Based Intrusion Detection 8.5 Network-Based Intrusion Detection 8.6 Distributed or Hybrid Intrusion Detection 8.7 Intrusion Detection Exchange Format 8.8 Honeypots 8.9 Example System: Snort 8.10 Key Terms, Review Questions, and Problems Chapter 9 Firewalls and Intrusion Prevention Systems 9.1 The Need for Firewalls 9.2 Firewall Characteristics and Access Policy 9.3 Types of Firewalls 9.4 Firewall Basing 9.5 Firewall Location and Configurations 9.6 Intrusion Prevention Systems 9.7 Example: Unified Threat Management Products 9.8 Key Terms, Review Questions, and Problems PART TWO SOFTWARE SECURITY AND TRUSTED SYSTEMS Chapter 10 Buffer Overflow 10.1 Stack Overflows 10.2 Defending Against Buffer Overflows 10.3 Other Forms of Overflow Attacks 10.4 Key Terms, Review Questions, and Problems Chapter 11 Software Security 11.1 Software Security Issues 11.2 Handling Program Input 11.3 Writing Safe Program Code 11.4 Interacting with the Operating System and Other Programs 11.5 Handling Program Input 11.6 Key Terms, Review Questions, and Problems Chapter 12 Operating System Security 12.1 Introduction to Operating System Security 12.3 System Security Planning 12.3 Operating Systems Hardening 12.4 Application Security 12.5 Security Maintenance 12.6 Linux/UNIX Security 12.7 Windows Security 12.8 Virtualization Security 12.9 Key Terms, Review Questions, and Problems Chapter 13 Cloud and IoT Security 13.1 Cloud Computing 13.2 Cloud Security Concepts 13.3 Cloud Security Approaches 13.4 The Internet of Things 13.5 IoT Security 13.6 Key Terms, Review Questions, and Problems PART THREE MANAGEMENT ISSUES Chapter 14 IT Security Management and Risk Assessment 14.1 IT Security Management 14.2 Organizational Context and Security Policy 14.3 Security Risk Assessment 14.4 Detailed Security Risk Analysis 14.5 Case Study: Silver Star Mines 14.6 Recommended Reading 14.7 Key Terms, Review Questions, and Problems Chapter 15 IT Security Controls, Plans and Procedures 15.1 IT Security Management Implementation 15.2 Security Controls or Safeguards 15.3 IT Security Plan 15.4 Implementation of Controls 15.5 Monitoring Risks 15.6 Case Study: Silver Star Mines 15.7 Key Terms, Review Questions, and Problems Chapter 16 Physical and Infrastructure Security 16.1 Overview 16.2 Physical Security Threats 16.3 Physical Security Prevention and Mitigation Measures 16.4 Recovery from Physical Security Breaches 16.5 Example: A Corporate Physical Security Policy 16.6 Integration of Physical and Logical Security 16.7 Key Terms, Review Questions, and Problems Chapter 17 Human Resources Security 17.1 Security Awareness, Training, and Education 17.2 Employment Practices and Policies 17.3 E-Mail and Internet Use Policies 17.4 Computer Security Incident Response Teams 17.5 Key Terms, Review Questions, and Problems Chapter 18 Security Auditing 18.1 Security Auditing Architecture 18.2 The Security Audit Trail 18.3 Implementing the Logging Function 18.4 Audit Trail Analysis 18.5 Security Information and Event Management 18.6 Key Terms, Review Questions, and Problems Chapter 19 Legal and Ethical Aspects 19.1 Cybercrime and Computer Crime 19.2 Intellectual Property 19.3 Privacy 19.4 Ethical Issues 19.5 Key Terms, Review Questions, and Problems Appendix 19A: Information Privacy Standard of Good Practice PART FOUR CRYPTOGRAPHIC ALGORITHMS Chapter 20 Symmetric Encryption and Message Confidentiality 20.1 Symmetric Encryption and Message Confidentiality 20.2 Data Encryption Standard 20.3 Advanced Encryption Standard 20.4 Stream Ciphers and RC4 20.5 Cipher Block Modes of Operation 20.6 Key Distribution 20.8 Key Terms, Review Questions, and Problems Chapter 21 Public-Key Cryptography and Message Authentication 21.1 Secure Hash Functions 21.2 HMAC 21.3 Authenticated Encryption 21.4 The RSA Public-Key Encryption Algorithm 21.5Diffie-Hellman and Other Asymmetric Algorithms 21.6 Key Terms, Review Questions, and Problems PART FIVE NETWORK SECURITY Chapter 22 Internet Security Protocols and Standards 22.1 Secure Email and S/MIME 22.2 DomainKeys Identified Mail 22.3 Secure Sockets Layer (SSL) and Transport Layer Security (TLS) 22.4 HTTPS 22.5 IPv4 and IPv6 Security 22.6 Key Terms, Review Questions, and Problems Chapter 23 Internet Authentication Applications 23.1 Kerberos 23.2 X.509 23.3 Public-Key Infrastructure 23.4 Federated Identity Management 23.5 Key Terms, Review Questions, and Problems Chapter 24 Wireless Network Security 24.1 Wireless Security Overview 24.2 Mobile Device Security 24.3 IEEE 802.11 Wireless LAN Overview 24.4 IEEE 802.11i Wireless LAN Security 24.5 Key Terms, Review Questions, and Problems

Mostrar más Leer menos
Institución
Computer Security
Grado
Computer security











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Computer security
Grado
Computer security

Información del documento

Subido en
17 de noviembre de 2025
Número de páginas
144
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

1234567897 586 8 478 6 76
62






!"#
!$%
&'()'*&!

,
0123456796475 7 367565 03567
51






!"!#!$%
&
!'()
%)!*++,-!
!
!
!
./012345'1!601'.7*8'9!
: ; <=:>?@ABCA?@ABBADECDA??F@GHIB=
: ; J=KHLMIB@?C@DI?FBNFCM?HB@DBFHOHPB>@FOB@Q?FBNRASAFTAUFTFBNRAOG
DHOPFG@OBFATFBNHPFOPH?LABFHOCNCB@L?@CHI?D@C=
: ; V=WABAFOB@Q?FBNACCI?@CB>ABFOPH?LABFHOAOGM?HQ?ALCA?@D>AOQ@GHOTN
FOACM@DFPF@GAOGAIB>H?FX@GLAOO@?=
: ; Y=ZSAFTAUFTFBNACCI?@CB>ABCNCB@LC[H?ECM?HLMBTNAOGC@?SFD@FCOHB
G@OF@GBHAIB>H?FX@GIC@?C=
: ; \=:>@]^_FOB>@KZ̀B?FAGCBAOGCPH?]abcdefcghgci_j
: ; k=:>@LH?@D?FBFDATADHLMHO@OBH?C@?SFD@RB>@>FQ>@?B>@T@S@THP
ASAFTAUFTFBN?@lIF?@G=
: ; m=KHLMIB@?C@DI?FBNFC@CC@OBFATTNAUABBT@HP[FBCU@B[@@OAM@?M@B?ABH?
[>HB?F@CBHPFOG>HT@CAOGB>@AGLFOFCB?ABH?[>HB?F@CBHDTHC@B>@L=
: ; n=o@DI?FBNL@D>AOFCLCBNMFDATTNGHOHBFOSHTS@LH?@B>AOHO@MA?BFDITA?
ATQH?FB>LH?M?HBHDHT=
: ; p=qAONC@DI?FBNAGLFOFCB?ABH?CSF@[CB?HOQC@DI?FBNACAOFLM@GFL@OBBH
@PPFDF@OBAOGIC@?rP?F@OGTNHM@?ABFHOHPAOFOPH?LABFHOCNCB@L=
: ; <s=ÒB>@DHOB@tBHPC@DI?FBNHI?DHOD@?OFC[FB>B>@SITO@?AUFTFBF@CHP
CNCB@L?@CHI?D@C=
: ; <<=uA?G[A?@FCB>@LHCBSITO@?AUT@BHABBADEAOGB>@T@ACBCICD@MBFUT@BH
AIBHLAB@GDHOB?HTC=
: ; <J=KHOBFOQ@ODNMTAOOFOQFCAPIODBFHOATA?@AB>ABM?FLA?FTN?@lIF?@C
DHLMIB@?C@DI?FBNB@D>OFDATL@ACI?@C=
: ; <V=v=nssA?D>FB@DBI?@[ACG@S@THM@GACAOFOB@?OABFHOATCBAOGA?GAOG
PHDIC@CHOC@DI?FBNFOB>@DHOB@tBHPO@B[H?ECAOGDHLLIOFDABFHOC=
: ; <Y=:>@PF?CBCB@MFOG@SFCFOQC@DI?FBNC@?SFD@CAOGL@D>AOFCLCFCBH
G@S@THMAC@DI?FBNMHTFDN=

,
0123456796475 7 367565 03567
51
 


 !"#$%&'()&*"+%& +,&-#.'$'$/#%+.*!(&"*"+0!%(+"1(&.
2'()"&*&%((+%&"(#'$%"'(&"'#

34567859:;<=7;9:>49?67=@?A:


B: # !"&()#('$0'C'0!#D%+$("+D+"'$,D!&$%&2)#('$,+".#('+$"&D#(&0
(+()&..#1E&%+DD&%(&0#$0(+"&0#$0E12)+.#$0(+2)+.()#('$,+".#('+$
.#1E&0'%D+&0


BC#'D#E'D'(1 F
G1(&.H$(&/"'(1
I
J"'C#%1 K
K#(#H$(&/"'(1
L
B # !"&()#(#1(&.*&",+". '('$(&$0&0,!$%('+$'$#$!$'.*#'"&0
.#$$&"M,"&&,"+.0&D'E&"#(&+"'$#0C&"(&$(!$#!()+"'N&0.#$'*!D#('+$+,()&
1(&.


BG1(&.H$(&/"'(1 F
K#(#H$(&/"'(1
I
C#'D#E'D'(1 K
I+$,'0&$('#D'(1
O
BD+ +, '()&!$#!()+"'N&00'%D+!"&+,'$,+".#('+$


B%+$,'0&$('#D'(1 F
'$(&/"'(1
I
#!()&$('%'(1 K
#C#'D#E'D'(1
P
B: D&C&DE"&#%)+,&%!"'(1%+!D0E&&-*&%(&0(+)#C&#&C&"&+"
%#(#("+*)'%#0C&"&&,,&%(+$+"/#$'N#('+$#D+*&"#('+$M+"/#$'N#('+$#D# &(M+"
'$0'C'0!#D


BD+2 F
$+".#D
I
.+0&"#(& K
)'/)


BQRSTUVRWXRVYUZ[Y\\R][RUR\^\_Y`a\RbY\]c[dR]`eTY`Y[_U_]W[dRWXRWeYXU_]W[RU[bR
.#$#/&.&$(()#(%+!D0E&&-*D+'(&0(+C'+D#(&()&\^\_Y`a\&%!"'(1*+D'%1'
#f$g:


B%+!$(&".&#!"& F
C!D$&"#E'D'(1
I
#0C&"#"1 K
"'h
i
B$# #!D(+$1(&.&%!"'(1()#(0&"'C&,"+.#$'$(&DD'/&$(#%(()#('#
0&D'E&"#(&#((&.*((+&C#0&&%!"'(1&"C'%&#$0C'+D#(&()&&%!"'(1*+D'%1+,#
1(&.'#f$g:


B"'h F
# &(
I
#((#%h K
C!D$&"#E'D'(1

, 
0123456796475 7 367565 03567
51






! "#$$%&"'()*+"%*(,-'%*).-*('-&*%/"0.*&/$&-*).%*#$
&/-*$&($+.1*-$2"1"&3('-$$&&$%423*1"5"$&"6'-,-*+*&"6"&(235""5"7"6
&/*/$-5"&%$%$.#*('-23)"#%'+*-"6$)-*,'-&"6"&#'&/$&%'--*%&$%&"'%$
2*&$4*


$&&$%4 8%'.&*-5*$#.-*
9$)+*-#$-3 :,-'&'%'1
;


! "#$$&&*5,&&'1*$-'-5$4*.#*'<"<'-5$&"'<-'5&/*#3#&*5
&/$&)'*#'&$<<*%&#3#&*5-*#'.-%*#


,$##"+*$&&$%4 8"#")*$&&$%4
9'.&#")*$&&$%4 :$%&"+*$&&$%4
=
>$#0.*-$)*(<$1#"<"%$&"'($)-*,.)"$&"'$-*&/-*$&$%&"'#&/$&%$.#*
! &/-*$&%'#*0.*%*#


.$.&/'-"7*))"#%1'#.-* 8)*%*,&"'
9)"#-.,&"' :.#.-,$&"'
?@

&/-*$&$%&"'"A/"%/#*#"&"+*)$&$$-*)"-*%&13-*1*$#*)&'$.$.&/'-"7*)
*&"&3"#! 


%'--.,&"' 8)"#-.,&"'
9"&-.#"' :*B,'#.-*
??

*B$5,1*'<! "#$$&&*5,&23$.$.&/'-"7*).#*-&'6$"$%%*##
&'$#3#&*523,'#"6$#$$.&/'-"7*).#*-


5$#0.*-$)* 8"&*-%*,&"'
9-*,.)"$&"' :"<*-*%*
?C
D/*! ,-*+*&#'-"/"2"&#&/*'-5$1.#*'-5$$6*5*&'<
%'55."%$&"'#<$%"1"&"*#


,$##"+*$&&$%4 8&-$<<"%*%-3,&"'
9)*"$1'<#*-+"%* :5$#0.*-$)*
?E

! "#$3$%&"'&/$&%'5,-'5"#*#&/*#*%.-"&3'<"<'-5$&"''A*)
23$'-6$"7$&"'
$10.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
HighScorersHub
5.0
(1)

Conoce al vendedor

Seller avatar
HighScorersHub Chamberlain College Of Nursng
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2
Miembro desde
6 meses
Número de seguidores
0
Documentos
176
Última venta
2 semanas hace
HighScorers Hub

Welcome to High Scorer Hub, your go-to source for high-quality test banks and study materials designed to help you excel academically. We offer a comprehensive range of resources including test banks, study guides, solution manuals, and other study materials, all meticulously curated to ensure accuracy and effectiveness. Our affordable, instantly accessible materials are complemented by excellent customer support, making your learning experience seamless and efficient. Trust High Scorers Hub to be your partner in academic success, providing the tools you need to achieve your educational goals.

Lee mas Leer menos
5.0

1 reseñas

5
1
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes