Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Computer security basics
Russell D., G. T. S., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175712)
Date Reviewed: Jul 1 1992

At last, here is a fine, eminently readable (almost chatty), practical, and broad book on computer security for auditors, administrators, managers, and even those who teach introductory business courses in the subject. Although such readers may find little of value in the 100+ pages that the authors devote to matters (such as TEMPEST and the “Orange Book”) that are of concern only to those who must abide by United States Department of Defense (DoD) regulations, the remainder of the book is well worth its price. While it contains almost no material on specific systems and software products, the book does contain a great deal of generally useful, fundamental guidance on

  • justifying security measures,

  • the history of computer security,

  • access control and identification and authentication,

  • viruses, worms, and other “wildlife,”

  • administration,

  • cryptography, and

  • network security.

The substantive discussions are preceded by a helpful chapter that expounds critical definitions and are followed by appendices on initialisms (which the authors miscall “acronyms”) and sources for further study. The latter are especially appropriate because the book always avoids painful detail.

Most of the book’s flaws occur in its DoD-related sections. Trying to keep up with fast-paced changes as they occurred no doubt led to use of the present tense to refer on page 40 to the applicability of a directive whose rescission is chronicled on page 42; similarly, page 36 gives one impression of the National Security Agency’s endorsement of the Data Encryption Standard, but page 187 gives a different impression that takes more recent events into account. The introduction of the “star property” on page 77 can make no sense without its justification, for which the authors merely refer the reader to an appendix listing other publications. Also inadequate is the book’s treatment on page 66 of cracking passwords by making trial encryptions and comparing them to available ciphertext; page 166 is written as though such cracking were of concern only in exceptional cases. Also, the book’s history could leave the reader with the incorrect impression that all advances in computer security stemmed from governmental agencies’ activities.

DoD-related flaws and emphasis notwithstanding, Russell and Gangemi have produced a fine and sorely needed text that is well designed and well edited. One must hope that it will edify those to whom the subject of computer security has heretofore seemed all too arcane.

Reviewer:  S. A. Kurzban Review #: CR115709
Bookmark and Share
 
Security and Protection (K.6.5 )
 
 
General (C.2.0 )
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy