Security Engineering. Ross AndersonЧитать онлайн книгу.
reading Notes CHAPTER 8: Economics 8.1 Introduction 8.2 Classical economics 8.3 Information economics 8.4 Game theory 8.5 Auction theory 8.6 The economics of security and dependability 8.7 Summary Research problems Further reading Notes
9
PART II
CHAPTER 9: Multilevel Security
9.1 Introduction
9.2 What is a security policy model?
9.3 Multilevel security policy
9.4 Historical examples of MLS systems
9.5 MAC: from MLS to IFC and integrity
9.6 What goes wrong
9.7 Summary
Research problems
Further reading
Notes
CHAPTER 10: Boundaries
10.1 Introduction
10.2 Compartmentation and the lattice model
10.3 Privacy for tigers
10.4 Health record privacy
10.5 Summary
Research problems
Further reading
Notes
CHAPTER 11: Inference Control
11.1 Introduction
11.2 The early history of inference control
11.3 Differential privacy
11.4 Mind the gap?
11.5 Summary
Research problems
Further reading
Notes
CHAPTER 12: Banking and Bookkeeping
12.1 Introduction
12.2 Bookkeeping systems
12.3 Interbank payment systems
12.4 Automatic teller machines
12.5 Credit cards
12.6 EMV payment cards
12.7 Online banking
12.8 Nonbank payments
12.9 Summary
Research problems
Further reading
Notes
CHAPTER 13: Locks and Alarms
13.1 Introduction
13.2 Threats and barriers
13.3 Alarms
13.4 Summary
Research problems
Further reading
Notes
CHAPTER 14: Monitoring and Metering
14.1 Introduction
14.2 Prepayment tokens
14.3 Taxi meters, tachographs and truck speed limiters
14.4 Curfew tags: GPS as policeman
14.5 Postage meters
14.6 Summary
Research problems
Further reading
Notes
CHAPTER 15: Nuclear Command and Control
15.1 Introduction
15.2 The evolution of command and control
15.3 Unconditionally secure authentication
15.4 Shared control schemes
15.5 Tamper resistance and PALs
15.6 Treaty verification
15.7 What goes wrong
15.8 Secrecy or openness?