Beautiful Security pdf

302 473 0
Beautiful Security pdf

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... together PREFACE xiii Chapter 1, Psychological Security Traps, by Peiter “Mudge” Zatko Chapter 2, Wireless Networking: Fertile Ground for Social Engineering, by Jim Stickley Chapter 3, Beautiful Security Metrics, by Elizabeth A Nichols Chapter 4, The Underground Economy of Security Breaches, by Chenxi Wang Chapter 5, Beautiful Trade: Rethinking E-Commerce Security, by Ed Bellis Chapter 6, Securing Online... I’ve edited over the years offer a chapter on security These chapters are certainly useful, because they allow the author to teach some general principles along with good habits, but I’ve been bothered by the convention because it draws a line around the topic of security It feeds the all-too-common view of security as an add-on and an afterthought Beautiful Security demolishes that conceit John chose... Francisco 247 Growing Attacks, Defenses in Retreat The Illusion Revealed Better Practices for Desktop Security Conclusion 248 252 257 258 CONTRIBUTORS 259 INDEX 269 CONTENTS ix Preface I F ONE BELIEVES THAT NEWS HEADLINES REVEAL TRENDS , THESE ARE INTERESTING times for computer security buffs As Beautiful Security went to press, I read that a piece of software capable of turning on microphones and cameras... business as usual in the security field Yes, they are part of trends that should worry all of us, but we also need to look at newer and less dramatic vulnerabilities The contributors to this book have, for decades, been on the forefront of discovering weaknesses in our working habits and suggesting unconventional ways to deal with them xi Why Security Is Beautiful I asked security expert John Viega... Detection of Client-Side Exploits, by Kathy Wang Chapter 9, Tomorrow’s Security Cogs and Levers, by Mark Curphey Chapter 10, Security by Design, by John McManus Chapter 11, Forcing Firms to Focus: Is Secure Software in Your Future?, by James Routh Chapter 12, Oh No, Here Come the Infosecurity Lawyers!, by Randy V Sabett Chapter 13, Beautiful Log Handling, by Anton Chuvakin Chapter 14, Incident Detection:... they operate At this point, the security game becomes what I consider beautiful The mindsets I’ll cover fall into the categories of learned helplessness and naïveté, confirmation traps, and functional fixation This is not an exhaustive list of influencing factors in security design and implementation, but a starting point to encourage further awareness of the potential security dangers in systems that... for Microsoft to really show strong and modern security practices in an initial OS offering Vista has had its own issues, but less on the security front than other factors So, when NT 4.0 was novel, Microsoft picked on Unix, citing their long list of security issues at the time The shoe went on the other foot, and people now cite the litany of Microsoft security issues to date Now that Microsoft actually... a quarter to a young child 14 CHAPTER ONE Vulnerability in Place of Security Now that you have a general understanding of functional fixation, you might be wondering how it relates to computer and network security Many people think of security products such as vulnerability scanners and anti-virus software as tools that increase the security of a system or organization But if this is the only view you... possible by the security software” they used Functional fixation might cause one to forget to check the security of the security- checking software itself Modern anti-virus software, unfortunately, has been found to include all sorts of common programming vulnerabilities, such as local buffer overflows, unchecked execution capabilities, and lack of authentication in auto-update activities This security software,... associated with security posturing I learned from this that I—along with the vast majority of practitioners in my field—suffered from the functional fixation that security was its own entity and could not be viewed as a byproduct of a different goal As so often proves to be the case, architecting for efficiency and well-defined requirements can result in enhanced security as well PSYCHOLOGICAL SECURITY TRAPS . alt="" Beautiful Security Beautiful Security Edited by Andy Oram and John Viega Beijing • Cambridge • Farnham • Köln • Sebastopol • Taipei • Tokyo Beautiful. 28 Still, Wireless Is the Future 31 3 BEAUTIFUL SECURITY METRICS 33 by Elizabeth A. Nichols Security Metrics by Analogy: Health 34 Security Metrics by Example 38 Summary

Ngày đăng: 06/03/2014, 10:20

Từ khóa liên quan

Mục lục

  • Table of Contents

  • Preface

    • Why Security Is Beautiful

    • Audience for This Book

    • Donation

    • Organization of the Material

    • Conventions Used in This Book

    • Using Code Examples

    • Safari® Books Online

    • How to Contact Us

    • Chapter 1. Psychological Security Traps

      • Learned Helplessness and Naïveté

        • A Real-Life Example: How Microsoft Enabled L0phtCrack

        • Password and Authentication Security Could Have Been Better from the Start

        • Naïveté As the Client Counterpart to Learned Helplessness

        • Confirmation Traps

          • An Introduction to the Concept

          • The Analyst Confirmation Trap

          • Stale Threat Modeling

          • Rationalizing Away Capabilities

          • Functional Fixation

            • Vulnerability in Place of Security

            • Sunk Costs Versus Future Profits: An ISP Example

            • Sunk Costs Versus Future Profits: An Energy Example

            • Summary

Tài liệu cùng người dùng

Tài liệu liên quan