Outline of computer security

Last updated

The following outline is provided as an overview of and topical guide to computer security:

Contents

Computer security (also cybersecurity, digital security, or information technology (IT) security) is the protection of computer software, systems and networks from threats that can lead to unauthorized information disclosure, theft or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

The significance of the field stems from the expanded reliance on computer systems, the Internet, and wireless network standards. Its importance is further amplified by the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity has emerged as one of the most significant new challenges facing the contemporary world, due to both the complexity of information systems and the societies they support. Security is particularly crucial for systems that govern large-scale systems with far-reaching physical effects, such as power distribution, elections, and finance.

Essence of computer security

Computer security can be described as all of the following:

Areas of computer security

Authentication

Computer security threats

Methods of Computer Network Attack and Computer Network Exploitation

Social engineering is a frequent method of attack, and can take the form of phishing, or spear phishing in the corporate or government world, as well as counterfeit websites.

Computer defenses and security measures

Access control

Access control selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.

Application security

Application security

Data security

Data security protecting data, such as a database, from destructive forces and the unwanted actions of unauthorized users. [1]

Information privacy

Mobile security

Network security

World Wide Web Security

History of computer security

Computer security industry

Computer security software

Testing labs

Computer security companies

Computer security publications

Journals and magazines

  • 2600: The Hacker Quarterly technical and political articles of interest to the internet security community
  • Virus Bulletin magazine about the prevention, detection and removal of malware and spam. It regularly features analyses of the latest virus threats, articles exploring new developments in the fight against viruses, interviews with anti-virus experts, and evaluations of current anti-malware products.

Books on computer security

Books on cryptography

Cyber security community

Cyber security communities

Computer security organizations

Academic

  • CERIAS a center for research and education of information security for computing and communication infrastructures located at Purdue University. [15]
  • CERT Coordination Center A program of Carnegie-Mellon University that develops advanced methods and technologies to counter large-scale, sophisticated cyber threats in partnership with other academic programs and with government and law enforcement agencies. The Cert Knowledgebase compiles information on information security incidents. [16]
  • Georgia Tech Information Security Center department of Georgia Tech that deals with information security issues such as cryptography, network security, trusted computing, software reliability, privacy, and internet governance. [17]
  • Oulu University Secure Programming Group studies, evaluates and develops methods of implementing and testing application and system software in order to prevent, discover and eliminate implementation level security vulnerabilities in a pro-active fashion. The focus is on implementation level security issues and software security testing.

Commercial

Government agencies

  • ARNES Academic and Research Network of Slovenia, which is responsible for development, operation and management of the communication and information network for education and research. It includes the SI-CERT, the Slovenian Computer Emergency Response Team.
  • Canadian Cyber Incident Response Centre also known as CCIRC, a Canadian government program under the Ministry of Public Safety. The program monitors threats, coordinates national responses, and protects national critical infrastructure against cyber incidents. [20]
  • Norwegian Cyber Defence Force the branch of the Norwegian Armed Forces responsible for military communications and offensive and defensive cyberwarfare in Norway. [21]
  • The US Department of Defense (DoD) issued DoD Directive 8570 in 2004, supplemented by DoD Directive 8140, requiring all DoD employees and all DoD contract personnel involved in information assurance roles and activities to earn and maintain various industry Information Technology (IT) certifications in an effort to ensure that all DoD personnel involved in network infrastructure defense have minimum levels of IT industry recognized knowledge, skills and abilities (KSA). Andersson and Reimers (2019) report these certifications range from CompTIA's A+ and Security+ through the ICS2.org's CISSP, etc. [22]
Law enforcement agencies

Internet police police and secret police departments and other law enforcement agencies in charge of policing the Internet. The major purposes of Internet police, depending on the state, are fighting cybercrime, as well as censorship, propaganda, and monitoring and manipulating the online public opinion.

  • Air Force Cyber Command (Provisional) a proposed U.S. Air Force command that existed in provisional status. On 6 October 2008, the Air Force's cyberspace mission was transferred to USCYBERCOM. [23]
  • Department of Defense Cyber Crime Center also known as DC3, is a United States Department of Defense agency that provides digital forensics support to the DoD and to other law enforcement agencies. DC3's main focus is in criminal, counterintelligence, counterterrorism, and fraud investigations. [24]
  • FBI Criminal, Cyber, Response, and Services Branch also known as CCRSB, is a service within the Federal Bureau of Investigation responsible for investigating certain crimes including all computer-based crime related to counterterrorism, counterintelligence, and criminal threats against the United States. [25]
  • FBI Cyber Division Federal Bureau of Investigation division that heads the national effort to investigate and prosecute internet crimes, including "cyber based terrorism, espionage, computer intrusions, and major cyber fraud." This division of the FBI uses the information it gathers during investigation to inform the public of current trends in cyber crime. [26] It focuses around three main priorities: computer intrusion, identity theft, and cyber fraud. It was created in 2002. [27]
  • National Security Agency The United States Bureau responsible for national cybersecurity and military communications protection. [28]
  • US-CERT also known as the United States Computer Emergency Readiness Team, organization within the Department of Homeland Security's (DHS) National Protection and Programs Directorate (NPPD); a branch of the Office of Cybersecurity and Communications' (CS&C) National Cybersecurity and Communications Integration Center (NCCIC). [29] US-CERT is responsible for analyzing and reducing cyber threats, vulnerabilities, disseminating cyber threat warning information, and coordinating incident response activities. [30]
  • USCYBERCOM is an armed forces sub-unified command subordinate to United States Strategic Command. The unit centralizes command of cyberspace operations, organizes existing cyber resources and synchronizes defense of U.S. military networks. [31]

Independent non-profits

Independent web-sites
  • Attrition information security-related website, updated at least weekly by an all-volunteer staff. The "Errata" section is devoted to pointing out inaccuracies, omissions, and other problems with mainstream media related to computer security and hacking. Additionally, staff members publish opinion pieces such as "Security Rants" pointing out problems with the computer security industry.


Persons influential in computer security

See also

Rubber-hose cryptanalysis

References

  1. 1 2 Summers, G. (2004). Data and databases. In: Koehne, H Developing Databases with Access: Nelson Australia Pty Limited. p4-5.
  2. "Keylogger". Oxford dictionaries. Archived from the original on 2013-09-11.
  3. "Rootkits, Part 1 of 3: The Growing Threat" (PDF). McAfee. 2006-04-17. Archived from the original (PDF) on 2006-08-23.
  4. Microsoft Technet (9 December 2009). "Virtual Private Networking: An Overview". Archived from the original on 2017-09-25.
  5. Harley, David (2011). AVIEN Malware Defense Guide for the Enterprise. Elsevier. p. 487. ISBN   9780080558660. Archived from the original on 2014-01-03. Retrieved 2013-06-10.
  6. Rosenblatt, Seth (2013-03-15). "Android antivirus apps improve their grades". cnet . CBS Interactive. Archived from the original on 2013-04-13. Retrieved 2013-06-10.
  7. 1 2 Owano, Nancy (2013-01-18). "Microsoft Security Essentials misses AV-Test Certified status". PhysOrg . Douglas, Isle of Man: Omicron Technology Ltd. Archived from the original on 2013-03-10. Retrieved 2013-06-10.
  8. Rosenblatt, Seth (2013-04-08). "Windows 8's rising security tide raises all antivirus boats". cnet . CBS Interactive. Archived from the original on 2013-06-10. Retrieved 2013-06-10.
  9. 1 2 Rubenking, Neil J. (2013-01-16). "Microsoft and Others Fail Antivirus Test". PC Magazine . Ziff Davis. Archived from the original on 2013-05-11. Retrieved 2013-06-10.
  10. Dawson, Jessica; Thomson, Robert (2018-06-12). "The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance". Frontiers in Psychology. 9: 744. doi: 10.3389/fpsyg.2018.00744 . ISSN   1664-1078. PMC   6005833 . PMID   29946276.
  11. "About McAfee" (PDF). 20 September 2012. Archived (PDF) from the original on 27 January 2013.
  12. "Intel Completes Acquisition of McAfee". McAfee News. 28 February 2011. Archived from the original on 27 August 2011. Retrieved 19 November 2014.
  13. "Intel in $7.68bn McAfee takeover". BBC News. 19 August 2010. Archived from the original on 19 August 2010.
  14. Article Archived 2017-10-13 at the Wayback Machine on VentureBeat
  15. CERIAS home page Archived 2005-03-08 at the Wayback Machine
  16. "CERT Coordination Center". Archived from the original on 2015-02-27. Retrieved 2015-03-03.
  17. "Georgia Tech Information Security Center History". Archived from the original on 2007-08-11. Retrieved 2007-08-01.
  18. "About AISA". Archived from the original on 29 November 2014. Retrieved 19 November 2014.
  19. "Microsoft Digital Crimes Unit". Redmond, WA: Microsoft. Archived from the original on 2013-12-10. Retrieved 2013-11-15.
  20. "Canadian Cyber Incident Response Centre". Archived from the original on 2009-02-08. Retrieved 2009-04-25.
  21. CCIS, Center for Cyber and Information Security -. "Norwegian Cyber Defence | Center for Cyber and Information Security". Center for Cyber and Information Security. Archived from the original on 2016-08-28. Retrieved 2017-02-13.
  22. Andersson and Reimers, 2019, CYBER SECURITY EMPLOYMENT POLICY AND WORKPLACE DEMAND IN THE U.S. GOVERNMENT, EDULEARN19 Proceedings, Publication year: 2019 Pages: 7858-7866 https://library.iated.org/view/ANDERSON2019CYB
  23. "Air Force senior leaders take up key decisions". Air Force Link. United States Air Force. 7 October 2008. Archived from the original on 17 October 2008. Retrieved 22 October 2008.
  24. "DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3)" (PDF). DoDD 5505.13E. Archived from the original (PDF) on 26 October 2011. Retrieved 18 May 2011.
  25. "Ten Years After: The FBI Since 9/11". FBI.gov. Federal Bureau of Investigation. Archived from the original on 29 November 2014. Retrieved 20 November 2014.
  26. Cyber Crime, p. 2 ( "Cyber Crime". Archived from the original on 2016-04-25. Retrieved 2016-06-20.)
  27. FBI's Ability to Address the National Security Cyber Intrusion Threat, p. 2 (PDF Archived 2013-03-11 at the Wayback Machine )
  28. "Mission & Strategy". www.nsa.gov. Archived from the original on 2017-02-14. Retrieved 2017-02-13.
  29. "About the National Cybersecurity and Communications Integration Center". Archived from the original on September 4, 2013. Retrieved September 4, 2013.
  30. "US-CERT Infosheet Version 2" (PDF). Archived (PDF) from the original on May 12, 2013. Retrieved September 4, 2013.
  31. U.S. Department of Defense, Cyber Command Fact Sheet, 21 May 2010 "U.S. Cyber Command - U.S. Strategic Command". Archived from the original on 2014-04-16. Retrieved 2014-04-16.
  32. Danny Yadron, John McAfee at Def Con: Don’t Use Smartphones Archived 2017-07-12 at the Wayback Machine , The Wall Street Journal , August 08, 2014
Windows 7 security
Windows 8 security
Mac security
Linux security
Threat alerts and vulnerability tracking lists