Skip to main content

Introduction to Computer Security

  • Chapter
  • First Online:
State of the Art in Applied Cryptography

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1528))

  • 805 Accesses

Abstract

The nineties set off the “information age”. Companies, organisations, the whole society have become utterly dependent on computers for their proper functioning. Since information gathering, processing and distributing have become so important, it should be treasured as a strategic asset, and therefore, properly protected. In this paper, we first focus on the security policy. Then we examine the major threats that may compromise the security of information systems. Finally, we present an overview of security measures is presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. E. Amoroso. Fundamentals of Computer Security Technology. Prentice Hall Inc., 1994.

    Google Scholar 

  2. William R. Cheswick and Steven M. Bellovin. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley professional computing series. Addison-Wesley, Reading, MA, USA, 1994.

    Google Scholar 

  3. D. Curry. Improving the security of your unix system. Technical Report ITSTD-721-FR-90-21, SRI International, Apr 1990.

    Google Scholar 

  4. Bart De Decker. Unix security & kerberos. In B. Preneel, R. Govaerts, and J. Vandewalle, editors, Computer security and industrial cryptography: state of the art and evolution: ESAT course — May 1991, Leuven, Belgium, number 741 in Lecture Notes in Computer Science, pages 257–274, Berlin, Germany / Heidelberg, Germany / London, UK / etc., 1993. Springer-Verlag.

    Google Scholar 

  5. E. Felten, D. Balfans, D. Dean, and D. Wallach. Web spoofing: An internet con game. Technical Report 560-96 (revised Feb. 1997, Dep. of Computer Science, Princeton University, 1996.

    Google Scholar 

  6. R. Focardi and R. Gorrieri. A classification of security properties. Journal of Computer Security, 3(1), 1995.

    Google Scholar 

  7. Simson Garfinkel and Gene Spafford. Practical UNIX and Internet security. Computer security (Sebastopol, Calif.). O’Reilly & Associates, Inc., 981 Chestnut Street, Newton, MA 02164, USA, second (completely rewritten and expanded to include Internet security) edition, 1996.

    Google Scholar 

  8. R. Hauser, P. Jansen, R. Molva, G. Tsudik, and E. van Herreweghen. Robust and Secure Password and Key Change Method. In Dieter Gollmann, editor, Computer Security—ESORICS’ 94, number 875 in Lecture Notes in Computer Science, pages 107–122. Springer, 1994.

    Google Scholar 

  9. J. Kohl and C. Neumann. The kerberos network authentication service. Technical Report RFC #4, MIT, dec 1990.

    Google Scholar 

  10. Peter E. Neumann. Computer Related Risks. Addison-Wesley, Reading MA, California, NY, etc., 1995.

    Google Scholar 

  11. Eugene H. Spafford. The internet worm program: An analysis. Technical Report CSD-TR-823, Purdue University, November 1989.

    Google Scholar 

  12. William Stallings. Mecklermedia’s official Internet world Internet security handbook. IDG Books, San Mateo, CA, USA, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

De Decker, B. (1998). Introduction to Computer Security. In: State of the Art in Applied Cryptography. Lecture Notes in Computer Science, vol 1528. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49248-8_19

Download citation

  • DOI: https://doi.org/10.1007/3-540-49248-8_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65474-2

  • Online ISBN: 978-3-540-49248-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics