Student Resources
Computer Security: Principles and Practice

Last updated: Tuesday, May 17, 2011

Appendices

Appendix D through Appendix F, in PDF format, are available for download here.

Documents

Supporting documents referenced in the book are available for download here.
Glossary in format required for loading into Blackboard's Glossary manager. This file was developed by Prof. Stanley Wine of Baruch College.

Useful Forums

Security and Cryptography Forum: Sponsered by DevShed. Discusses issues related to coding, server applications, network protection, data protection, firewalls, ciphers and the like.
Cryptography Forum: On Topix. Fairly good focus on technical issues.
Security Forums: On WindowsSecurity.com. Broad range of forums, including cryptographic theory, cryptographic software, firewalls, and malware.

 

Useful Links

Computer Science Student Resource Site: Help and advice for the long-suffering, overworked student.
Errata sheet: Latest list of errors, updated at most monthly. File name is Errata-CompSec1e-mmyy. If you spot any errors, please report them to .

Chapter 1 - Overview

IETF Security Area: Provides up-to-date information on Internet security standardization efforts.
Computer and Network Security Reference Index: A good index to vendor and commercial products, FAQs, newsgroup archives, papers, and other Web sites.
IEEE Technical Committee on Security and Privacy: Home of the electronic newsletter Cipher, which provides book reviews, new crypto and security links, and links to reports and papers available online.
Computer Security Resource Center: Maintained by NIST; contains a broad range of information on security threats, technology, and standards.
European Network and Information Security Agency A source of expertise on security issues for the EU. Includes an excellent set of technical reports, plus numerous other documents and links.
Security Focus: A wide variety of security information, with an emphasis on vendor products and end-user concerns. Maintains the Bugtraq, a mailing list for the detailed discussion and announcement of computer security vulnerabilities.
SANS Institute: Similar to Security Focus. Extensive collection of white papers. Maintains Internet Storm Center, which provides a warning service to Internet users and organizations concerning security threats.
Risks Digest: Forum on risks to the public in computers and related systems.
CERT Coordination Center: The organization that grew from the computer emergency response team formed by the Defense Advanced Research Projects Agency. Site provides good information on Internet security threats, vulnerabilities, and attack statistics.
Packet Storm: Resource of up-to-date and historical security tools, exploits, and advisories.
Institute for Security and Open Methodologies: An open, collaborative security research community. Lots of interesting information.
Security Cartoon: A cartoon-based approach aimed at improving the understanding of security risk among typical Internet users.
Center for Internet Security: Provides freeware benchmark and scoring tools for evaluating security of operating systems, network devices, and applications. Includes case studies and technical papers.

Chapter 2 - Cryptographic Tools

The Cryptography FAQ: Lengthy and worthwhile FAQ covering all aspects of cryptography.
Bouncy Castle Crypto Package: Java implementation of cryptographic algorithms. The package is organized so that it contains a light-weight API suitable for use in any environment. The package is distributed at no charge for commercial or non-commercial use.
Cryptography Code: Another useful collection of software.
American Cryptogram Association: An association of amateur cryptographers. The Web site includes information and links to sites concerned with classical cryptography.
Crypto Corner: Simon Singh's Website. Lots of good information, plus interactive tools for learning about cryptography.

Chapter 3 - User Authentication7

Password Usage and Generation: NIST documents on this topic
Biometrics Consortium: Government-sponsored site for the research, testing, and evaluation of biometric technology

Chapter 4 - Access Control

NIST RBAC site: Includes numerous documents, standards, and software on RBAC

Chapter 6 - Instrusion Detection

STAT Project: A research and open-source project at the U. of California, Santa Barbara that focuses on signature-based intrusion detection tools for hosts, applications, and networks
Honeynet Project: A research project studying the techniques of predatory hackers and developing honeypot products
Honeypots: A good collection of research papers and technical articles.
Snort: Web site for Snort, an open source network intrusion prevention and detection system.

Chapter 7 - Malicious Software

Anti-Virus Online: IBM's site on virus information; one of the best.
Vmyths: Dedicated to exposing virus hoaxes and dispelling misconceptions about real viruses.
SecureList: Information about viruses, hackers, and spam.

Chapter 8 - Denial-of-Service Attacks

David Dittrich’s Distributed Denial Of Service Site: Contains lists of books, papers, and other information on DDoS attacks and tools.
Denial of Service (DoS) Attack Resources: Provides a useful set of links to relevant law enforcement agencies, technical information on, and mailing lists about denial of service.

Chapter 9 - Firewalls

Firewall.com: Numerous links to firewall references and software resources.

Chapter 10 - Trusted Computing

Trusted Computing Group: Vendor group involved in developing and promoting trusted computer standards. Site includes white papers, specifications, and vendor links.
Common Criteria Portal: Official Web site of the common criteria project.

Chapter 11 - Buffer Overflow

CWE/SANS Top 25 Most Dangerous Software Errors: A list of the most common types of programming errors that were exploited in many major cyber attacks, with details on how they occur and how to avoid them.
Metasploit: The Metasploit Project provides useful information on shellcode exploits to people who perform penetration testing, IDS signature development, and exploit research
OpenBSD Security: The OpenBSD project produces a free, multiplatform 4.4BSD-based UNIX-like operating system.

Chapter 12 - Software Security

CERT Secure Coding: Resource on CERT site of links to information on common coding vulnerabilities and secure programming practices
David Wheeler - Secure Programming: Provides links to his book and other articles on secure programming
Fuzz Testing of Application Reliability: Provides details of the security analysis of applications using random input performed by the University of Wisconsin Madison
Open Web Application Security Project (OWASP): Dedicated to finding and fighting the causes of insecure software and providing open source tools to assist this process

Chapter 13 - Physical Security

InfraGuard: An FBI program to support infrastructure security efforts. Contains a number of useful documents and links
The Infrastructure Security Partnership: A public-private partnership dealing with infrastructure security issues. Contains a number of useful documents and links.
Federal Emergency Management Administration (FEMA): Contains a number of useful documents related to physical security for businesses and individuals.
NIST PIV program: Contains working documents, specifications, and links related to PIV.

Chapter 14 - Human Factors

Federal Agency Security Practices: A voluminous set of documents covering all aspects of organizational security policy
ISO 17799 Community Portal: Documents, links, and other resources related to ISO 17799

Chapter 15 - Security Auditing

Security Issues in Network Event Logging: This IETF working group is developing standards for system logging.

Chapter 16 - IT Security Management and Risk Assessment

AusCERT - Australian Computer Crime and Security Surveys: Details of the annual surveys of computer network attacks and computer misuse trends in Australia each year.
ISO 27000 Directory: An overview of the ISO 27000 series of standards reserved by ISO for information security matters
ISO 27001 Security: Dedicated to providing information on the latest international standards for information security

Chapter 17 - IT Security Controls, Plans, and Procedures

Computer Security Incident Response Team: Provide security professionals with the means to report, discuss, and disseminate computer security related information to others around the world. This site provides information for reporting security incidents and information on technical resources.

Chapter 18 - Legal and Ethical Aspects

International Cyber Threat Task Force: An online security community of cyber security professionals collaborating to deal with all related cyber threats including all aspects of cyber crime and cyber warfare. Useful documents and other information.
Criminal Justice Resources: CyberCrime: Excellent collection of links maintained by Michigan State University.
International High Technology Crime Investigation Association: A collaborative effort of law enforcement and the private sector. Contains useful set of links and other resources.
Computer Ethics Institute: Includes documents, case studies, and links.

Chapter 19 - Symmetric Encryption and Message Confidentiality

AES Home Page: NIST's page on AES. Contains the standard plus a number of other relevant documents
AES Lounge: Contains a comprehensive bibliography of documents and papers on AES, with access to electronic copies.
Block Cipher Modes of Operation: NIST page with full information on NIST-approved modes of operation.

Chapter 20 - Public-Key Cryptography and Message Authentication

NIST Secure Hashing Page: SHA FIPS and related documents.
Whirlpool: Range of information on Whirlpool..
RSA Laboratories:: The research center of RSA Security, Inc., it offers an extensive collection of technical material on RSA and other topics in cryptography

Chapter 21 - Internet Security Protocols and Standards

TLS Charter: Latest RFCs and internet drafts for TLS.
OpenSSL Project: Project to develop open-source SSL and TLS software. Site includes documents and links
NIST IPSec Project: Contains papers, presentations, and reference implementations.
IPsec Maintenance and Extensions Charter: Latest RFCs and internet drafts for IPsec.
S/MIME Charter: Latest RFCs and internet drafts for S/MIME.

Chapter 22 - Internet Authentication Applications

MIT Kerberos Site: Information about Kerberos, including the FAQ, papers and documents, and pointers to commercial product sites.
MIT Kerberos Consortium: Created to establish Kerberos as the universal authentication platform for the world's computer networks.
USC/ISI Kerberos Page: Another good source of Kerberos material.
Kerberos Working Group: IETF group developing standards for Kerberos.
Public-Key Infrastructure Working Group: IETF group developing standards based on X.509v3.
NIST PKI Program: Good source of information.

Chapter 23 - Linux Security

NSA SELinux Web site: Contains useful documentation on SELinux.

Chapter 24 - Windows Security

Microsoft Security Central: Good collection of information about Windows and Windows Vista security

Appendix D - RFCs

RFCs: IETF RFC repository. Includes a complete list of all RFCs, constantly updated.