Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Computer security fundamentals (5th ed.)
Easttom C., Pearson, Hoboken, NJ, 2023. 512 pp. Type: Book (0137984756)
Date Reviewed: Jun 7 2023

Computer security fundamentals, by Chuck Easttom, is a compilation of concepts and tools used in computer security. The book is composed of 15 chapters that can be gathered into four distinct parts.

Chapters 1 through 5 expose the main computer security attacks and the different ways they may occur. A thorough introduction to computer security, it first justifies the need to understand the field and covers the main concepts a beginner needs to know. It then identifies the different types of security threats and lists the major online security resources for more information.

To understand how to face networks security attacks, it is important to have a good understanding of network protocols, different network devices, and the OSI model of network communication. This is the purpose of chapter 2, “Networks and the Internet.” Chapter 3, “Cyber Stalking, Fraud, and Abuse,” discusses the main Internet scams and frauds and teaches the different techniques to face them. Chapter 4, “Denial of Service Attacks,” details denial-of-service (DoS) attacks and the different measures to protect against these kinds of security attacks. Chapter 5, “Malware,” explains the difference between viruses and trojan horses. It also explains how ransomware and spyware operate and informs about the best defensive practices.

Chapters 6 and 7 expose the different techniques used by hackers (chapter 6) and how industrial espionage in cyberspace is carried out (chapter 7).

Chapters 8 through 13 focus on techniques and countermeasures to prevent the security attacks discussed earlier. This includes encryption (chapter 8), computer security technology (chapter 9), and security policies (chapter 10). Techniques to check networks for vulnerabilities for the purpose of reducing them is the topic of chapter 11. Chapter 12 is “Cyber Terrorism and Information Warfare.” Finally, human factors and how to reduce the related risks to security are detailed in chapter 13.

The final part instructs the reader on best practices for building a secure system. Chapter 14 is an introduction to forensics, and chapter 15 explains different techniques for cybersecurity engineering.

Aware of the fast-paced nature of the security field, the author includes pointers to the most up-to-date information. Each chapter clearly states a list of learning outcomes at the beginning of the text. Also, every chapter is followed by a multiple choice test, a couple of mini-projects, and, in some chapters, a practical case study that the reader is advised to investigate. Computer security fundamentals is an excellent introduction to the field of computer security. It is a good mix between theory and practice. The book is well written, comprehensive, and self-contained. I would highly recommend it as a main reference for introductory courses in computer security.

Reviewer:  Ghita Kouadri Review #: CR147598 (2308-0107)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy