Computer Security Handbook, Set -  - E-Book

Computer Security Handbook, Set E-Book

0,0
173,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded reference maintains timeless lessons and is fully revised and updated with current information on security issues for social networks, cloud computing, virtualization, and more.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 5034

Veröffentlichungsjahr: 2014

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



COMPUTER SECURITY HANDBOOK

Sixth Edition Volume 1

Edited by

SEYMOUR BOSWORTH

MICHEL E. KABAY

ERIC WHYNE

Cover image: ©iStockphoto.com/Jimmy Anderson Cover design: Wiley

Copyright © 2014 by John Wiley & Sons, Inc. All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.

Previous Edition: Computer Security Handbook, Fifth Edition. Copyright © 2009 by John Wiley & Sons, Inc. All Rights Reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey.

Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.

Library of Congress Cataloging-in-Publication Data

Computer security handbook / [edited by] Seymour Bosworth, Michel E. Kabay,     Eric Whyne. – Sixth edition.         volumes cm     Includes index.     ISBN 978-1-118-13410-8 (vol. 1 : pbk.) – ISBN 978-1-118-13411-5 (vol. 2 : pbk.) – ISBN 978-1-118-12706-3 (2 volume set : pbk.); ISBN 978-1-118-85174-6 (ebk); ISBN 978-1-118-85179-1 (ebk) 1. Electronic data processing departments–Security measures. I. Bosworth, Seymour. II. Kabay, Michel E. III. Whyne, Eric, 1981–     HF5548.37.C64 2014     658.4′78–dc23

2013041083

CONTENTS

PREFACE

ACKNOWLEDGMENTS

ABOUT THE EDITORS

ABOUT THE CONTRIBUTORS

A NOTE TO THE INSTRUCTOR

PART I FOUNDATIONS OF COMPUTER SECURITY

Chapter 1 Brief History and Mission of Information System Security

1.1 Introduction to Information System Security

1.2 Evolution of Information Systems

1.3 Government Recognition of Information Assurance

1.4 Recent Developments

1.5 Ongoing Mission for Information System Security

1.6 Notes

Chapter 2 History of Computer Crime

2.1 Why Study Historical Records?

2.2 Overview

2.3 1960s and 1970s: Sabotage

2.4 Impersonation

2.5 Phone Phreaking

2.6 Data Diddling

2.7 Salami Fraud

2.8 Logic Bombs

2.9 Extortion

2.10 Trojan Horses

2.11 Notorious Worms and Viruses

2.12 Spam

2.13 Denial of Service

2.14 Hacker Underground

2.15 Industrial Espionage

2.16 Concluding Remarks

2.17 Further Reading

2.18 Notes

Chapter 3 Toward a New Framework for Information Security

1.

3.1 Proposal for a New Information Security Framework

3.2 Six Essential Security Elements

3.3 What the Dictionaries Say about the Words We Use

3.4 Comprehensive Lists of Sources and Acts Causing Information Losses

3.5 Functions of Information Security

3.6 Selecting Safeguards Using a Standard of Due Diligence

3.7 Threats, Assets, Vulnerabilities Model

3.8 Conclusion

3.9 Further Reading

Chapter 4 Hardware Elements of Security

4.1 Introduction

4.2 Binary Design

4.3 Parity

4.4 Hardware Operations

4.5 Interrupts

4.6 Memory and Data Storage

4.7 Time

4.8 Natural Dangers

4.9 Data Communications

4.10 Cryptography

4.11 Backup

4.12 Recovery Procedures

4.13 Microcomputer Considerations

4.14 Conclusion

4.15 Hardware Security Checklist

4.16 Further Reading

Chapter 5 Data Communications and Information Security

5.1 Introduction

5.2 Sampling of Networks

5.3 Network Protocols and Vulnerabilities

5.4 Standards

5.5 Internet Protocol (IP)

5.6 Transmission Control Protocol (TCP)

5.7 User Datagram Protocol

5.8 TCP/IP Supervisory Standards

5.9 Application Standards

5.10 Concluding Remarks

5.11 Further Reading

5.12 Notes

Chapter 6 Local Area Network Topologies, Protocols, and Design

6.1 Overview

6.2 LAN Topology

6.3 Media

6.4 Media Access Control

6.5 LAN Protocols and Standards

6.6 Interconnection Devices

6.7 Network Operating Systems

6.8 Summary

6.9 Further Reading

6.10 Notes

Chapter 7 Encryption

7.1 Introduction to Cryptography

7.2 Basic Cryptography

7.3 DES and Modern Encryption

7.4 Public Key Encryption

7.5 Practical Encryption

7.6 Beyond RSA and DES

7.7 Steganography

7.8 Further Reading

7.9 Notes

Chapter 8 Using a Common Language for Computer Security Incident Information

8.1 Introduction

8.2 Why a Common Language Is Needed

8.3 Development of the Common Language

8.4 Computer Security Incident Information Taxonomy

8.5 Additional Incident Information Terms

8.6 How to Use the Common Language

8.7 Notes

Chapter 9 Mathematical Models of Computer Security

9.1 Why Models Are Important

9.2 Models and Security

9.3 Models and Controls

9.4 Classic Models

9.5 Other Models

9.6 Conclusion

9.7 Further Reading

9.8 Notes

Chapter 10 Understanding Studies and Surveys of Computer Crime

10.1 Introduction

10.2 Basic Research Methodology

10.3 Summary

10.4 Further Reading

10.5 Notes

Chapter 11 Fundamentals of Intellectual Property Law

11.1 Introduction

11.2 The Most Fundamental Business Tool for Protection of Technology Is the Contract

11.3 Proprietary Rights and Trade Secrets

11.4 Copyright Law and Software

11.5 Digital Millennium Copyright Act

11.6 Circumventing Technology Measures

11.7 Patent Protection

11.8 Piracy and Other Intrusions

11.9 Other Tools to Prevent Unauthorized Intrusions

11.10 Open Source

11.11 Application Internationally

11.12 Recent Developments in Intellectual Property Law

218

11.13 Concluding Remarks

11.14 Further Reading

11.15 Notes

PART II THREATS AND VULNERABILITIES

Chapter 12 The Psychology of Computer Criminals

12.1 Introduction

12.2 Self-Reported Motivations

12.3 Psychological Perspectives on Computer Crime

12.4 Social Distance, Anonymity, Aggression, and Computer Crime

12.5 Individual Differences and Computer Criminals

12.6 Ethics and Computer Crime

12.7 Classifications of Computer Criminals

12.8 Recommendations

12.9 Further Reading

12.10 Notes

Chapter 13 The Insider Threat

13.1 Introduction

13.2 Threats from Insiders

13.3 Mitigating the Insider Threat

13.4 Concluding Remarks

13.5 Further Reading

13.6 Notes

Chapter 14 Information Warfare

14.1 Introduction

14.2 Vulnerabilities

14.3 Goals and Objectives

14.4 Sources of Threats and Attacks

14.5 Weapons of Cyberwar

14.6 Defenses

14.7 Summary

14.8 Further Reading

14.9 Notes

Chapter 15 Penetrating Computer Systems and Networks

15.1 Multiple Factors Involved in System Penetration

15.2 Nontechnical Penetration Techniques

15.3 Technical Penetration Techniques

15.4 Political and Legal Issues

15.5 Summary

15.6 Further Reading

15.7 Notes

Chapter 16 Malicious Code

16.1 Introduction

16.2 Malicious Code Threat Model

16.3 Survey of Malicious Code

16.4 Detection of Malicious Code

16.5 Prevention of Malicious Code Attacks

16.6 Conclusion

16.7 Further Reading

16.8 Notes

Chapter 17 Mobile Code

17.1 Introduction

17.2 Signed Code

17.3 Restricted Operating Environments

17.4 Discussion

17.5 Summary

17.6 Further Reading

17.7 Notes

Chapter 18 Denial-of-Service Attacks

18.1 Introduction

18.2 History of Denial-of-Service Attacks

18.3 Costs of Denial-of-Service Attacks

18.4 Types of Denial-of-Service Attacks

18.5 Specific Denial-of-Service Attacks

18.6 Preventing and Responding to Denial-of-Service Attacks

18.7 Distributed Denial-of-Service Attacks

18.8 Denial-of-Service Using Exploitable Software

18.9 Defenses against Distributed Denial-of-Service Attacks

18.10 Management Issues

18.11 Further Reading

18.12 Notes

Chapter 19 Social-Engineering and Low-Tech Attacks

19.1 Introduction

19.2 Background and History

19.3 Social-Engineering Methods

19.4 The Psychology of Social Engineering

19.5 Dangers of Social Engineering and its Impact on Businesses

19.6 Detection

19.7 Response

19.8 Defense and Mitigation

19.9 Concluding Remarks

19.10 Notes

Chapter 20 Spam, Phishing, and Trojans: Attacks Meant To Fool

20.1 Unwanted Email and Other Pests: A Security Issue

20.2 Email: An Anatomy Lesson

20.3 3 Spam Defined

20.4 Fighting Spam

20.5 Phishing

20.6 Trojan Code

20.7 Concluding Remarks

20.8 Further Reading

20.9 Notes

Chapter 21 Web-Based Vulnerabilities

21.1 Introduction

21.2 Breaking E-Commerce Systems

21.3 Case Study of Breaking an E-Business

21.4 Web Application System Security

21.5 Protecting Web Applications

21.6 Components and Vulnerabilities in E-Commerce Systems

21.7 Summary

21.8 Further Reading

21.9 Notes

Chapter 22 Physical Threats to the Information Infrastructure

22.1 Introduction

22.2 Background and Perspective

22.3 Threat Assessment Process

22.4 General Threats

22.5 Workplace Violence and Terrorism

22.6 Other Threat Situations

22.7 Confidential Threat Information

22.8 Summary

22.9 Further Reading

22.10 Notes

PART III PREVENTION: TECHNICAL DEFENSES

Chapter 23 Protecting the Physical Information Infrastructure

23.1 Introduction

23.2 Security Planning and Management

23.3 Strategic Planning Process

23.4 Elements of Good Protection

23.5 Other Considerations

23.6 Access Control

23.7 Surveillance Systems

23.8 Facilities Design

23.9 Mitigating Specific Threats

23.10 Completing the Security Planning Process

23.11 Further Reading

23.12 Notes

Chapter 24 Operating System Security

24.1 Information Protection and Security

24.2 Requirements for Operating System Security

24.3 Protection Mechanisms

24.4 File Sharing

24.5 Trusted Systems

24.6 Windows 2000 Security

24.7 Further Reading

24.8 Notes

Chapter 25 Local Area Networks

25.1 Introduction

25.2 Policy and Procedure Issues

25.3 Physical Site Security

25.4 Physical Layer Issues

25.5 Network Operating System Issues

25.6 Conclusion

25.7 Further Reading

25.8 Notes

Chapter 26 Gateway Security Devices

26.1 Introduction

26.2 Basic Concepts and Terminology

26.3 Network-Security Mechanisms

26.4 Deployment

26.5 Management and Monitoring Strategies

26.6 Maintenance

26.7 Disaster Recovery

26.8 Network-Security Device Evaluation

26.9 Concluding Remarks

26.10 Further Reading

Chapter 27 Intrusion Detection and Intrusion Prevention Devices

27.1 Security behind the Firewall

27.2 Main Concepts

27.3 Intrusion Prevention

27.4 Information Sources

27.5 Analysis Schemes

27.6 Response

27.7 Needs Assessment and Product Selection

27.8 Conclusion

27.9 Further Reading

27.10 Notes

Chapter 28 Identification and Authentication

28.1 Introduction

28.2 Four Principles of Authentication

28.3 Password-Based Authentication

28.4 Token-Based Authentication

28.5 Biometric Authentication

28.6 Cross-Domain Authentication

28.7 Relative Costs of Authentication Technologies

28.8 Conclusions

28.9 Summary

28.10 Further Reading

28.11 Notes

Chapter 29 Biometric Authentication

29.1 Introduction

29.2 Importance of Identification and Verification

29.3 Fundamentals and Applications

29.4 Types of Biometric Technologies

29.5 Types of Errors and System Metrics

29.6 Disadvantages and Problems

29.7 Recent Trends in Biometric Authentication

29.8 Summary and Recommendations

29.9 Further Reading

29.10 Notes

Chapter 30 E-Commerce and Web Server Safeguards

30.1 Introduction

30.2 Business Policies and Strategies

30.3 Rules of Engagement

30.4 Risk Analysis

30.5 Operational Requirements

30.6 Technical Issues

30.7 Ethical and Legal Issues

30.8 Summary

30.9 Further Reading

30.10 Notes

Chapter 31 Web Monitoring and Content Filtering

31.1 Introduction

31.2 Some Terminology

31.3 Motivation

31.4 General Techniques

31.5 Implementation

31.6 Enforcement

31.7 Vulnerabilities

31.8 The Future

31.9 Summary

31.10 Further Reading

31.11 Notes

Chapter 32 Virtual Private Networks and Secure Remote Access

32.1 Introduction

32.2 Remote Access VPNs

32.3 Site-to-Site VPN*

32.4 Extranets

32.5 Concluding Remarks

32.6 Further Reading

32.7 Notes

Chapter 33 802.11 Wireless LAN Security

33.1 Introduction

33.2 802.11 Security Fundamentals

33.3 IEEE 802.11 Robust Security Network

33.4 Fundamental Wireless Threats

33.5 Specific Wireless Security Attacks

33.6 Mitigating Controls

33.7 Secure Enterprise Design

33.8 Security Auditing Tools.

41

33.9 Concluding Remarks

33.10 Abbreviations and Definitions

33.11 Further Reading

33.12 Notes

Chapter 34 Securing VoIP

34.1 Introduction

34.2 Regulatory Compliance

34.3 Technical Aspects of VoIP Security

34.4 Protecting the Infrastructure

34.5 Encryption

34.6 Concluding Remarks

34.7 Further Reading

34.8 Notes

Chapter 35 Securing P2P, IM, SMS, and Collaboration Tools

35.1 Introduction

35.2 General Concepts and Definitions

35.3 Peer-to-Peer Networks

35.4 Securing Instant Messaging

35.5 Securing SMS

35.6 Securing Collaboration Tools

35.7 Conclusions

35.8 Further Reading

35.9 Notes

Chapter 36 Securing Stored Data

36.1 Introduction to Securing Stored Data

36.2 Fibre Channel Weakness and Exploits

36.3 NFS Weaknesses and Exploits

36.4 CIFS Exploits

36.5 Encryption

36.6 Data Disposal

36.7 Concluding Remarks

36.8 Further Reading

36.9 Notes

Chapter 37 PKI and Certificate Authorities

37.1 Introduction

37.2 Need for Public Key Infrastructure

37.3 Public Key Certificate

37.4 Enterprise Public Key Infrastructure

37.5 Certificate Policy

37.6 Global Public Key Infrastructure

37.7 Forms of Revocation

37.8 Rekey

37.9 Key Recovery

37.10 Privilege Management

37.11 Trusted Archival Services and Trusted Time Stamps

37.12 Cost of Public Key Infrastructure

37.13 Further Reading

37.14 Notes

Chapter 38 Writing Secure Code

38.1 Introduction

38.2 Policy and Management Issues

38.3 Technical and Procedural Issues

38.4 Types of Software Errors

38.5 Assurance Tools and Techniques

38.6 Concluding Remarks

38.7 Further Reading

38.8 Notes

Chapter 39 Software Development and Quality Assurance

39.1 Introduction

39.2 Goals of Software Quality Assurance

39.3 Software Development Life Cycle

39.4 Types of Software Errors

39.5 Designing Software Test Cases

39.6 Before Going into Production

39.7 Managing Change

39.8 Sources of Bugs and Problems

39.9 Conclusion

39.10 Further Reading

Chapter 40 Managing Software Patches and Vulnerabilities

40.1 Introduction

40.2 The Importance of Patch Management

40.3 The Challenges of Patch Management

40.4 Enterprise Patch Management Technologies

40.5 Metrics and Measures

40.6 Further Reading

40.7 Notes

Chapter 41 Antivirus Technology

41.1 Introduction

41.2 Antivirus Basics

41.3 Scanning Methodologies

41.4 Content Filtering

41.5 Antivirus Deployment

41.6 Policies and Strategies

41.7 Concluding Remarks

41.8 Further Reading

Chapter 42 Protecting Digital Rights: Technical Approaches

42.1 Introduction

42.2 Software-Based Antipiracy Techniques

42.3 Hardware-Based Antipiracy Techniques

42.4 Digital Rights Management

42.5 Privacy-Enhancing Technologies

42.6 Political and Technical Opposition to DRM

42.7 Fundamental Problems

42.8 Summary

42.9 Glossary

42.10 Further Reading

42.11 Notes

PREFACE

ACKNOWLEDGMENTS

A NOTE TO THE INSTRUCTOR

PART IV PREVENTION: HUMAN FACTORS

Chapter 43 Ethical Decision Making and High Technology

43.1 Introduction: The ABCs of Computer Ethics

43.2 Awareness

43.3 Basics

43.4 Considerations

43.5 Concluding Remarks

43.6 Further Reading

Chapter 44 Security Policy Guidelines

44.1 Introduction

44.2 Terminology

44.3 Resources for Policy Writers

44.4 Writing the Policies

44.5 Organizing the Policies

44.6 Presenting the Policies

44.7 Maintaining Policies

44.8 Summary

44.9 Further Reading

44.10 Notes

Chapter 45 Employment Practices and Policies

45.1 Introduction

45.2 Hiring

45.3 Management

45.4 Termination of Employment

45.5 Summary

45.6 Further Reading

45.7 Notes

Chapter 46 Vulnerability Assessment

46.1 The Scorekeeper of Security Management

46.2 A Taxonomy of Vulnerability Assessment Technologies

46.3 Penetration Testing

46.4 Future Reading

46.5 Notes

Chapter 47 Operations Security and Production Controls

47.1 Introduction

47.2 Operations Management

47.3 Providing a Trusted Operating System

47.4 Protection of Data

47.5 Data Validation

47.6 Cloud Computing and Production Systems

47.7 Concluding Remarks

47.8 Further Reading

47.9 Notes

Chapter 48 Email and Internet Use Policies

48.1 Introduction.

1

48.2 Damaging the Reputation of the Enterprise

48.3 Threats to People and Systems

48.4 Threats to Productivity

48.5 Legal Liability

48.6 Recommendations

48.7 Concluding Remarks

48.8 Further Reading

48.9 Notes

Chapter 49 Implementing a Security-Awareness Program

49.1 Introduction

49.2 Key Concepts

49.3 Critical Success Factors

49.4 Topics

49.5 Techniques for Getting and Holding Attention

49.6 Tools

49.7 Evaluation and Metrics

49.8 Concluding Remarks

49.9 Glossary

49.10 Notes

Chapter 50 Using Social Psychology to Implement Security Policies

50.1 Introduction.1

50.2 Rationality Is Not Enough

50.3 Beliefs and Attitudes

50.4 Encouraging Initiative

50.5 Group Behavior

50.6 Technological Generation Gaps

50.7 Summary of Recommendations

50.8 Further Reading

50.9 Notes

Chapter 51 Security Standards for Products

51.1 Introduction

51.2 Importance of Standards

51.3 Types, Sources, and Examples of Standards

51.4 Product Development and Assessment Approaches

51.5 Standard Product and Services Assessment Approaches

51.6 Notes

PART V DETECTING SECURITY BREACHES

Chapter 52 Application Controls

52.1 Introduction

52.2 Systems Architecture and Design

52.3 Input and Entitlements

52.4 Databases and Underlying Data Controls

52.5 Batch Files

52.6 Data Integrity and Validation

52.7 Concluding Remarks

52.8 Further Reading

Chapter 53 Monitoring and Control Systems

53.1 Introduction

53.2 System Models

53.3 Log Management

53.4 General Logging Classes

53.5 Data Aggregation and Reduction

53.6 Notifications and Reporting

53.7 Change and Security Implications

53.8 Monitoring and Control Challenges

53.9 Summary

53.10 Further Reading

53.11 Notes

Chapter 54 Security Audits

54.1 Introduction

54.2 Addressing Multiple Regulations for Information Security

54.3 Auditing Standards

54.4 Sarbanes-Oxley Act

54.5 Technical Frameworks for IT Audits

54.6 Further Reading

54.7 Notes

Chapter 55 Cyber Investigation

1

55.1 Introduction

55.2 End-to-End Digital Investigation

55.3 Applying the Framework and EEDI

55.4 Using EEDI and the Framework

55.5 Motive, Means, and Opportunity: Profiling Attackers

55.6 Some Useful Tools

55.7 Concluding Remarks

55.8 Further Reading

55.9 Notes

PART VI RESPONSE AND REMEDIATION

Chapter 56 Computer Security Incident Response Teams1

56.1 Overview

56.2 Planning the Team

56.3 Selecting and Building the Team

56.4 Principles Underlying Effective Response to Computer Security Incidents

56.5 Responding to Computer Emergencies

56.6 Managing the CSIRT

56.7 PostIncident Activities

56.8 Concluding Remarks

56.9 Further Reading

56.10 Notes

Chapter 57 Data Backups and Archives

57.1 Introduction

57.2 Making Backups

57.3 Backup Strategies

57.4 Data Life Cycle Management

57.5 Safeguarding Backups

57.6 Disposal

57.7 Costs

57.8 Optimizing Frequency of Backups

57.9 Concluding Remarks

57.10 Further Reading

57.11 Notes

Chapter 58 Business Continuity Planning

58.1 Introduction

58.2 Defining the Goals

58.3 Performing a Business Impact Analysis

58.4 Business Impact Analysis Matrix Analysis

58.5 Justifying the Costs

58.6 Plan Presentation

58.7 Concluding Remarks

58.8 Further Reading

Chapter 59 Disaster Recovery

59.1 Introduction

59.2 Identifying Threats and Disaster Scenarios

59.3 Developing Recovery Strategies

59.4 Designing Recovery Tasks

59.5 Implementation and Readiness

59.6 Concluding Remarks

59.7 Further Reading

Chapter 60 Insurance Relief

60.1 Introduction

60.2 Intellectual Property Coverage

60.3 Property Coverage

60.4 Crime/Fidelity Coverage

60.5 E-Commerce Policies

60.6 Privacy and Identity Theft Exposures

60.7 Damages to Brand Image, Consumer Confidence

60.8 Concluding Remarks

60.9 Further Reading

60.10 Notes

Chapter 61 Working with Law Enforcement

61.1 Introduction

61.2 Guidelines

61.3 Law Enforcement Resources

61.4 Memorandum of Agreement

61.5 Handling Evidence and the Chain of Custody

61.6 Information Sharing

61.7 Conclusion

61.8 Further Reading

61.9 Notes

PART VII MANAGEMENT’S ROLE IN SECURITY

Chapter 62 Quantitative Risk Assessment and Risk Management

62.1 An Introduction to Risk Management

62.2 Objective of a Risk Assessment

62.3 Limitations of Questionnaires in Assessing Risks

62.4 A Model of Risk

62.5 Risk Mitigation

62.6 Risk-Assessment Techniques

62.7 Summary

62.8 Further Reading

62.9 Notes

Chapter 63 Management Responsibilities and Liabilities

63.1 Introduction

63.2 Responsibilities

63.3 Liabilities

63.4 Computer Management Functions

63.5 Security Administration

63.6 Concluding Remarks

63.7 Further Reading

63.8 Notes

Chapter 64 U.S. Legal and Regulatory Security Issues

64.1 Introduction

64.2 Sarbanes-Oxley Act of 2002

64.3 Gramm-Leach-Bliley Act

64.4 Examination Procedures to Evaluate Compliance with Guidelines for Safeguarding Customer Information

64.5 Concluding Remarks

64.6 Further Reading

64.7 Notes

Chapter 65 The Role of the CISO

65.1 CISO as Change Agent

65.2 CISO as Strategist

65.3 Strategy, Governance, and the Standard of Care

65.4 Summary of Actions

65.5 Recommendations for Success for CISOs

65.6 Concluding Remarks

65.7 Further Reading

65.8 Notes

Chapter 66 Developing Security Policies

66.1 Introduction

66.2 Collaborating in Building Security Policies

66.3 Phase 1: Preliminary Evaluation

66.4 Phase 2: Management Sensitization

66.5 Phase 3: Needs Analysis

66.6 Phase 4: Policies and Procedures

66.7 Phase 5: Implementation

66.8 Phase 6: Maintenance

66.9 Concluding Remarks

66.10 Further Reading

66.11 Notes

Chapter 67 Developing Classification Policies for Data

67.1 Introduction

67.2 Why Perform Data Classification?

67.3 Data Classification's Role in Information Security

67.4 Legal Requirements, Compliance Standards, and Data Classification

67.5 Designing and Implementing DC

67.6 Data Classification Solutions

67.7 Examples of Data Classification Schemas

67.8 Concluding Remarks

67.9 Further Reading

67.10 Notes

Chapter 68 Outsourcing and Security

68.1 Introduction

68.2 Why Outsource?

68.3 Can Outsourcing Fail?

68.4 Controlling the Risks

68.5 Outsourcing Security Functions

68.6 Concluding Remarks

68.7 Further Reading

68.8 Notes

PART VIII PUBLIC POLICY AND OTHER CONSIDERATIONS

Chapter 69 Privacy in Cyberspace: U.S. and European Perspectives

69.1 Introduction: Worldwide Trends

69.2 European Approaches to Privacy

69.3 United States

69.4 Compliance Models

69.5 Further Reading

69.6 Notes

Chapter 70 Anonymity and Identity in Cyberspace

70.1 Introduction

70.2 Definitions

70.3 Social Psychology of Anonymity

70.4 Balancing Rights and Duties

70.5 Systems Analysis of Anonymity

70.6 Implications and Discussion

70.7 Concluding Remarks

70.8 Summary

70.9 Further Reading

70.10 Notes

Chapter 71 Healthcare Security and Privacy

71.1 Overview/Synopsis

71.2 Motivation for Healthcare Information Privacy and Security

71.3 Healthcare Sector Threats and Vulnerabilities Landscape

71.4 Healthcare Information Protection Requirements in U.S. Laws

71.5 The HIPAA and HITECH Healthcare Information Protection Regulations

71.6 Other Public Sector Healthcare Privacy and Security Initiatives

71.7 Private Sector Healthcare Privacy and Security Initiatives

71.8 Security and Privacy Impacts of Technology Trends

71.9 Summary

71.10 Further Reading

71.11 Notes

Chapter 72 Legal and Policy Issues of Censorship and Content Filtering

72.1 Introduction

72.2 U.S. Context: First Amendment Rights

72.3 Parental Involvement/Responsibility

72.4 Summary

72.5 Further Reading

72.6 Notes

Chapter 73 Expert Witnesses and the DAUBERT Challenge

73.1 Introduction

73.2 Daubert

73.3 Whether the Daubert Challenge Is Applicable: Refining Daubert

73.4 Divided We Fall?

73.5 Being the Best You Can Be

73.6 Summary

73.7 Further Reading

73.8 Notes

Chapter 74 Professional Certification and Training in Information Assurance

74.1 Increasing Competence and Confidence in Cybersecurity Professionals

74.2 Accreditation

74.3 IA Certifications

74.4 Preparing for Security-Certification Exams

74.5 Concluding Remarks

74.6 Further Reading

74.7 Notes

Chapter 75 The Future of Information Assurance

75.1 Introduction

75.2 Complexity

75.3 Changing Posture

75.4 Some Specific Slices of the Future

75.5 New Directions

75.6 Notes

INDEX

END USER LICENSE AGREEMENT

List of Tables

Chapter 2

Exhibit 2.1 Rise and Fall in Macro Viruses in the WildList, 1996–2008

Chapter 3

Exhibit 3.1 Threats, Assets, and Vulnerabilities Model

Chapter 4

Exhibit 4.1 Common Codes for Numeral 5

Chapter 5

Exhibit 5.8 Three Standards Core Layers

Exhibit 5.9 Layered Standards Architectures

Chapter 6

Table 6.1 LAN Characteristics

Chapter 7

Exhibit 7.6 Frequency Lists for English

Exhibit 7.19 X.509 Certificate Format

Exhibit 7.22 NIST Recommended Key Sizes

Exhibit 7.23 Relative Computation Costs of Diffie-Hellman and Elliptic Curves

Chapter 20

Exhibit 20.5 Table of Prices Paid for Data Traded in the Underground Economy

47

Chapter 24

Exhibit 24.3 Typical Kernel Mode Operating System Functions

Chapter 29

Exhibit 29.1 Comparative Market Share of Biometric Technologies by 2015

Exhibit 29.2 Accuracy/Error Rates of Leading Biometric Technologies

Exhibit 29.3 Comparison of Leading Biometric Technologies

Chapter 33

Exhibit 33.1 802.11 Standards

Exhibit 33.6 TKIP Temporal Keys

Exhibit 33.7 CCMP Temporal Keys

Exhibit 33.11 802.11 Security-Auditing Software

Chapter 37

Exhibit 37.3 Symmetric versus Asymmetric Encryption

Exhibit 37.6 Trust Level Determination

Exhibit 37.7 Trust Levels and Proofing

Exhibit 37.14 Privilege Management

Chapter 54

Exhibit 54.1 Organization's Goals and Responsibilities

Exhibit 54.2 Types of SSAE 16 Audits

Exhibit 54.3 Pros and Cons for Service and User Organizations

Exhibit 54.4 Typical Annual SOX Schedule

Chapter 55

Exhibit 55.2 DFRWS Digital Investigation Framework

Exhibit 55.6 Adversarial Matrix Behavioral Characteristics

Exhibit 55.7 FBI Adversarial Matrix of Operational Characteristics

Exhibit 55.8 FBI Adversarial Matrix Resource Characteristics

Chapter 59

Exhibit 59.1 List of Threats

Exhibit 59.3 Sample Classifications of Damage

Exhibit 59.7 Strategy Overview

Chapter 61

Exhibit 61.3 Information-Sharing Example

Chapter 64

Exhibit 64.1 Eleven Titles of SOX with Descriptions

Exhibit 64.2 Recommended Evaluation Procedures

Chapter 65

Exhibit 65.1 International Standards for Information-Security Governance

Chapter 71

Exhibit 71.1 Healthcare-Related Breaches

Exhibit 71.2 Comparison of Requirements in Various Breach Notification Laws

Exhibit 71.3 Comparison of Requirements in Various Privacy Laws

Chapter 74

Exhibit 74.1 Comparison of Certification and Certificates

Chapter 75

Exhibit 75.1 Potential Adverse Events in Various Implantable Medical Devices

a

List of Illustrations

Chapter 4

Exhibit 4.2 Vertical and Longitudinal Parity, Seven-Track Magnetic Tape

Chapter 5

Exhibit 5.1 Simple Home Network

Exhibit 5.2 Unshielded Twisted Pair (UTP) Wiring Cord

Exhibit 5.3 Building LAN

Exhibit 5.4 Wide Area Networks (WANs)

Exhibit 5.5 Internet

Exhibit 5.6 Frames and Packets

Exhibit 5.7 Internet Service Providers (ISPs)

Exhibit 5.10 Physical and Data Link Layers

Exhibit 5.11 Internet- and Transport-Layer Standards

Exhibit 5.12 Internet Protocol (IP) Packet

Exhibit 5.13 IP Version 6 Packet

Exhibit 5.14 Transmission Control Protocol (TCP) Segment

Exhibit 5.15 Messages in a TCP Session

Exhibit 5.16 Multitasking Server Host and Port Numbers

Exhibit 5.17 Sockets

Exhibit 5.18 User Datagram Protocol (UDP)

Exhibit 5.19 Internet Control Message Protocol (ICMP)

Exhibit 5.20 Domain Name System (DNS) Server

Exhibit 5.21 Simple Network Management Protocol (SNMP)

Chapter 6

Exhibit 6.1 Star Topology

Exhibit 6.2 Ring Topology

Exhibit 6.3 Bus Topology

Exhibit 6.4 Star-Wired Bus

Exhibit 6.5 Star-Wired Ring

Exhibit 6.6 Bus-Wired Ring (The station identifier is shown above the station ID of the predecessor and successor stations in the logical ring.)

Exhibit 6.7 Coaxial Cable

Exhibit 6.8 Unshielded Twisted Pair

Exhibit 6.9 Optical Fiber Cable

Exhibit 6.10 IEEE versus LAN Protocol Models

Exhibit 6.11 IEEE 802.3 Frame Format

Exhibit 6.12 Ethernet II Frame Format

Exhibit 6.13 IEEE 802.5 Token and Frame Formats

Exhibit 6.14 IEEE 802.2 LLC Frame Transporting SNAP Header (which in turn indicates IEEE organization and EtherType protocol identifiers)

Exhibit 6.15 Two LANs Interconnected via a Bridge

Exhibit 6.16 Two LANs Interconnected via a Router

Exhibit 6.17 LAN Scenario

Chapter 7

Exhibit 7.1 Diagram of Cryptographic Terms

Exhibit 7.2 Message Authentication Code Using Public Key Cryptosystem

Source

: Copyright © 2008 M. E. Kabay. Used with permission.

Exhibit 7.3 Scytale in Use

Source

: Copyright © 2008 M. E. Kabay. Used with permission.

Exhibit 7.4 Code Wheels and the NSA Seal

Exhibit 7.5 Brute Force Attack on the Caesar Cipher

Exhibit 7.7 Vigenère Table

Exhibit 7.8 Diagram of XOR

Exhibit 7.9 One-Time Pad

Exhibit 7.10 Diagram of DES

Exhibit 7.11 Comparison of Private and Public Key Encryption

Exhibit 7.12 Public Key Diagram

Exhibit 7.13 Authentication with RSA

Exhibit 7.14 Combining Public and Private Key Encryption

Exhibit 7.15 SSL 3.0 in Action

Exhibit 7.16 Creating a TLS Session

Exhibit 7.17 Using a Hardware Token for Digital Signatures

Exhibit 7.18 Digital Certificate

Exhibit 7.20 X.509v3 Certificate

Exhibit 7.21 Certificate Authorities and the Root Key

Exhibit 7.24 Relationship among Time, Technology, and Protection

Exhibit 7.25 Three-Qubit System

Source:

Simon Bone and Matias Castro, “A Brief History of Quantum Computing,” Imperial College, London, www.doc.ic.ac.uk/∼nd/surprise 97/journal/vol4/spb3/.

Chapter 8

Exhibit 8.1 Computer and Network Events

Exhibit 8.2 Probe Compared to Scan

Exhibit 8.3 Computer and Network Attacks

Exhibit 8.4 Simplified Computer and Network Incident

Exhibit 8.5 Computer and Network Incident Information Taxonomy

Chapter 9

Exhibit 9.1 Example Access-Control Matrix with Two Processes and Two Files

Chapter 15

Exhibit 15.1 Poorly Configured Hotel Room Internet Connectivity

Chapter 18

Exhibit 18.1 smurf DoS Attack

Exhibit 18.2 Normal TCP 3-Way Handshake

Exhibit 18.3 TCP SYN DoS Attack

Exhibit 18.4 DDoS Phase 1

Exhibit 18.5 DDoS Phase 2

Exhibit 18.6 DDoS Phase 3

Exhibit 18.7 NIMDA Propagation Vectors

Chapter 20

Exhibit 20.1 Basic Email Protocol

Exhibit 20.2 Viewing Message Header Details in Outlook Express

Exhibit 20.3 Junk Mail Filter Controls

Exhibit 20.4 Screensaver Trojan

Chapter 21

Exhibit 21.1 Online Investing Application

Exhibit 21.2 Breaking an E-Business

Exhibit 21.3 Layered View of an E-Business Application

Exhibit 21.4 Multitier Architecture of an E-Business

Chapter 24

Exhibit 24.1 Protection Relationships between Segments

Exhibit 24.2 Example of Access-Control Structures

Exhibit 24.4 Reference Monitor Concept

Exhibit 24.5 Trojan Horse and Secure Operating Systems

Exhibit 24.6 Windows 2000 Security Structures

Exhibit 24.7 Windows 2000 Access Mask

Chapter 30

Exhibit 30.1 Trust Levels for B2C Security Services

Exhibit 30.2 Continuum of Options

Exhibit 30.3 Sibling and Nested Security Domains

Exhibit 30.4 Omega and Gamma Servers in Separate DMZs from Hypothetical's Server

Chapter 33

Exhibit 33.2 802.1X Architecture

Exhibit 33.3 RSN Security Association Management

Exhibit 33.4 802.1X Authentication to Authentication Server

Exhibit 33.5 The 4-Way Handshake To Authenticate and Establish PTK

Exhibit 33.8 TKIP Key Hierarchy

Exhibit 33.9 TKIP Algorithm in the Transmitting Client

Exhibit 33.10 TKIP Algorithm in the Receiving Client

Chapter 34

Exhibit 34.1 Packet Capture Showing RTP Packets

Chapter 37

Exhibit 37.1 Symmetric (Secret) Key Encryption

Exhibit 37.2 Asymmetric or Public Key Encryption

Exhibit 37.4 Certificate Issuance Cycle

Exhibit 37.5 Elements of a Comprehensive Certification Practice Statement

Exhibit 37.8 Trust Path through Multiple Trusting Certificate Authorities

Exhibit 37.9 Strict Hierarchical Trust Chain

Exhibit 37.10 Bridge CA

Exhibit 37.11 Trust Chain Mapping with Dissimilar Policies

Exhibit 37.12 Policy Mapping with a Bridge

Exhibit 37.13 Elements of a Key Recovery Policy

Chapter 38

Exhibit 38.1 Common Lifecycle Process

Chapter 45

Exhibit 45.1 Capabilities Matrix For Untelecom Corporation

Chapter 49

Exhibit 49.1 Awareness Metrics, continued as Exhibit 49.2

Exhibit 49.2 Awareness Metrics, continued from Exhibit 49.1

Exhibit 49.3

Exhibit 49.4 “How Valuable Is Your Data?”

Chapter 55

Exhibit 55.1 Rogers Cyber Forensics Taxonomy

Exhibit 55.3 Jones's Threat Delivery Model

Exhibit 55.4 Jones's Model Showing Motive, Means, and Opportunity

Exhibit 55.5 Types of Threat Agents and Their Motivations

Exhibit 55.9 Link Analyzer Relationship Map of Source and Destination IP Addresses

Exhibit 55.10 Map in Exhibit 55.9 Reduced through Cluster Analysis

Chapter 57

Exhibit 57.1 RAID Levels

Source

: Used with kind permission of Alan Freedman, Computer Desktop Encyclopedia (Computer Language Company, 2013), www.computerlanguage.com

Exhibit 57.2 Calculating Costs of Backup

Chapter 58

Exhibit 58.1 Corporate Preparedness

Source

: BC Management, “2003 Benchmark Study Results.”

Exhibit 58.2 Fiscal Losses Caused by Disasters

Exhibit 58.3 Disaster Threats

Exhibit 58.4 Levels of Impact and Durations

Exhibit 58.5 Phases of Recovery

Exhibit 58.6 Building and Filtering the List of Functions

Exhibit 58.7 Service Levels Mapped to Recovery Activities

Exhibit 58.8 Three Steps of Interviewing

Exhibit 58.9 Examples of High-Level Functions

Exhibit 58.10 Blank, Sample BIA Matrix

Exhibit 58.11 Departments and Functions

Exhibit 58.12 Criticality Ratings and Descriptions

Exhibit 58.13 Transformation of Criticality to Operational Impact

Exhibit 58.14 Category Assignment Curve

Exhibit 58.15 Sample BIA Matrix

Exhibit 58.16 Emphasizing Cross Departmental Functions

Exhibit 58.17 Ranking Factor View

Exhibit 58.18 Graphing the Three Measures

Exhibit 58.19 Summary of Loss Contribution

Exhibit 58.20 Cumulative Loss Summary

Exhibit 58.21 Cumulative Loss Summary With and Without Planning

Exhibit 58.22 Recovery Flow

Exhibit 58.23 Cases and Categories

Chapter 59

Exhibit 59.2 Escalation Timeline

Exhibit 59.4 Recovery Phases

Exhibit 59.5 Spread of Functions across Categories

Exhibit 59.6 Number versus Impact of Functions

Exhibit 59.8 Recovery Task Flow

Exhibit 59.9 Beginning Sequence

Exhibit 59.10 Middle Sequence, “Building Scenario”

Exhibit 59.11 End Sequence

Chapter 61

Exhibit 61.1 Activities That Should Be Reported

Exhibit 61.2 Activities That Should Not Be Reported

Chapter 62

Exhibit 62.1 The Four IT Risk-Management Activities

Exhibit 62.2 Evaluating an IT System Security Strategy

Exhibit 62.3 Jacobson's Window, A Simple Risk Model

Exhibit 62.4 The Two Inconsequential Risk Classes

Exhibit 62.5 The Spectrum of Real-World Risks

Exhibit 62.6 A Plot of Actual Threat Frequencies and Consequences © Copyright 2005 International Security Technology, Inc.

Exhibit 62.7 A Typical Risk Matrix

Exhibit 62.8 The Three Risk Zones © Copyright 2002 International Security Technology, Inc.

Exhibit 62.9 Threat Effect Factors Connect Threats and Processes, Functions, and Assets

Guide

Cover

Table of Contents

Preface

Part

Chapter

Pages

xi

xii

xiii

xiv

xv

xvi

xvii

xviii

xix

xx

xxi

xxii

xxiii

xxiv

xxv

xxvi

xxvii

xxviii

xxix

xxx

xxxi

xxxii

xxxiii

xxxiv

xxxv

xxxvi

xxxvii

xxxviii

xxxix

xxxx

I.1

I.2

1.1

1.2

1.3

1.4

1.5

1.6

1.7

1.8

1.9

1.10

1.11

1.12

1.13

1.14

1.15

1.16

1.17

1.18

1.19

1.20

1.21

1.22

2.1

2.2

2.3

2.4

2.5

2.6

2.7

2.8

2.9

2.10

2.11

2.12

2.13

2.14

2.15

2.16

2.17

2.18

2.19

2.20

2.21

2.22

2.23

2.24

2.25

2.26

2.27

2.28

2.29

2.30

2.31

2.32

2.33

2.42

2.34

2.35

2.36

2.37

2.38

2.39

2.40

2.41

3.1

3.2

3.3

3.4

3.5

3.6

3.7

3.8

3.9

3.10

3.11

3.12

3.13

3.14

3.15

3.16

3.17

3.18

3.19

3.20

3.21

3.22

3.23

3.24

4.1

4.2

4.3

4.4

4.5

4.6

4.7

4.8

4.9

4.10

4.11

4.12

4.13

4.14

4.15

4.16

4.17

4.18

4.19

4.20

4.21

4.22

4.23

4.24

4.25

4.26

4.27

4.28

5.1

5.2

5.3

5.4

5.5

5.6

5.7

5.8

5.9

5.10

5.11

5.12

5.13

5.14

5.15

5.16

5.17

5.18

5.19

5.20

5.21

5.22

5.23

5.24

5.25

5.26

5.27

5.28

5.29

5.30

6.1

6.2

6.3

6.4

6.5

6.6

6.7

6.8

6.9

6.10

6.11

6.12

6.13

6.14

6.15

6.16

6.17

6.18

6.19

6.20

6.21

6.22

6.23

6.24

6.25

6.26

6.27

6.28

6.29

6.30

6.31

6.32

7.1

7.2

7.3

7.4

7.5

7.6

7.7

7.8

7.9

7.10

7.11

7.12

7.13

7.14

7.15

7.16

7.17

7.18

7.19

7.20

7.21

7.22

7.23

7.24

7.25

7.26

7.27

7.28

7.29

7.30

7.31

7.32

7.33

7.34

7.35

7.36

7.37

7.38

7.39

7.40

7.41

7.42

7.43

7.44

7.45

7.46

7.47

7.48

7.49

7.50

8.1

8.2

8.3

8.4

8.5

8.6

8.7

8.8

8.9

8.10

8.11

8.12

8.13

8.14

8.15

8.16

8.17

8.18

8.19

8.20

8.21

8.22

9.1

9.2

9.3

9.4

9.5

9.6

9.7

9.8

9.9

9.10

9.11

9.12

9.13

9.14

9.15

9.16

9.17

9.18

9.19

9.20

9.21

9.22

10.1

10.2

10.3

10.4

10.5

10.6

10.7

10.8

10.9

10.10

10.11

10.12

11.1

11.2

11.3

11.4

11.5

11.6

11.7

11.8

11.9

11.10

11.11

11.12

11.13

11.14

11.15

11.16

11.17

11.18

11.19

11.20

11.21

11.22

11.23

11.24

11.25

11.26

11.27

11.28

11.29

11.30

11.31

11.32

11.33

11.34

11.35

11.36

11.37

11.38

11.39

11.40

11.41

11.42

11.43

11.44

11.45

11.46

11.47

11.48

11.49

11.50

11.51

11.52

11.53

11.54

11.55

11.56

II.1

II.2

12.1

12.2

12.3

12.4

12.5

12.6

12.7

12.8

12.9

12.10

12.11

12.12

12.13

12.14

12.15

12.16

12.17

12.18

12.19

12.20

12.21

12.22

12.23

12.24

12.25

12.26

12.27

12.28

12.29

12.30

12.31

12.32

12.33

12.34

13.1

13.2

13.3

13.4

13.5

13.6

13.7

13.8

13.9

13.10

13.11

13.12

14.1

14.2

14.3

14.4

14.5

14.6

14.7

14.8

14.9

14.10

14.11

14.12

14.13

14.14

14.15

14.16

14.17

14.18

14.19

14.20

14.21

14.22

14.23

14.24

14.25

14.26

14.27

14.28

14.29

14.30

14.34

14.31

14.32

14.33

15.1

15.2

15.3

15.4

15.5

15.6

15.7

15.8

15.9

15.10

15.11

15.12

15.13

15.14

15.15

15.16

15.17

15.18

15.19

15.20

15.21

15.22

15.23

15.24

15.25

15.26

15.27

15.28

15.29

15.30

15.31

15.32

15.33

15.34

15.35

15.36

15.37

15.38

15.39

15.40

15.41

15.42

15.43

15.44

16.1

16.2

16.3

16.4

16.5

16.6

16.7

16.8

16.9

16.10

16.11

16.12

16.13

16.14

16.15

16.16

16.17

16.18

17.1

17.2

17.3

17.4

17.5

17.6

17.7

17.8

17.9

17.10

17.11

17.12

17.13

17.14

17.15

17.16

17.17

17.18

17.19

17.20

18.1

18.2

18.3

18.4

18.5

18.6

18.7

18.8

18.9

18.10

18.11

18.12

18.13

18.14

18.15

18.16

18.17

18.18

18.19

18.20

18.21

18.22

18.23

18.24

18.25

18.26

18.27

18.28

18.29

18.30

18.31

18.32

19.1

19.2

19.3

19.4

19.5

19.6

19.7

19.8

19.9

19.10

19.11

19.12

19.13

19.14

19.15

19.16

19.17

19.18

19.19

19.20

19.21

19.22

19.23

19.24

19.25

19.26

20.1

20.2

20.3

20.4

20.5

20.6

20.7

20.8

20.9

20.10

20.11

20.12

20.13

20.14

20.15

20.16

20.17

20.18

20.19

20.20

20.21

20.22

20.23

20.24

20.25

20.26

20.27

20.28

20.29

20.30

20.31

20.32

20.33

20.34

20.35

20.36

20.37

20.38

20.39

20.40

21.1

21.2

21.3

21.4

21.5

21.6

21.7

21.8

21.9

21.10

21.11

21.12

21.13

21.14

21.15

21.16

21.17

21.18

21.19

21.20

21.21

21.22

21.23

21.24

22.1

22.2

22.3

22.4

22.5

22.6

22.7

22.8

22.9

22.10

22.11

22.12

22.13

22.14

22.15

22.16

22.17

22.18

22.19

22.20

22.21

22.22

22.23

22.24

22.25

22.26

22.27

22.28

III.1

III.2

23.1

23.2

23.3

23.4

23.5

23.6

23.7

23.8

23.9

23.10

23.11

23.12

23.13

23.14

23.15

23.16

23.17

23.18

23.19

23.20

23.21

23.22

23.23

23.24

23.25

23.26

23.27

23.28

23.29

23.30

23.31

23.32

23.33

23.34

23.35

23.36

23.37

23.38

23.39

23.40

23.41

23.42

23.43

23.44

23.45

23.46

23.47

23.48

24.1

24.2

24.3

24.4

24.5

24.6

24.7

24.8

24.9

24.10

24.11

24.12

24.13

24.14

24.15

24.16

24.17

24.18

24.19

24.20

24.21

24.22

25.1

25.2

25.3

25.4

25.5

25.6

25.7

25.8

25.9

25.10

25.11

25.12

25.13

25.14

25.15

25.16

25.17

25.18

26.1

26.2

26.3

26.4

26.5

26.6

26.7

26.8

26.9

26.10

26.11

26.12

26.13

26.14

26.15

26.16

26.17

26.18

26.19

26.20

26.21

26.22

26.23

26.24

26.25

26.26

26.27

26.28

26.29

26.30

26.30

26.32

26.33

26.34

26.35

26.36

27.1

27.2

27.3

27.4

27.5

27.6

27.7

27.8

27.9

27.10

27.11

27.12

27.13

27.14

27.15

27.16

27.17

27.18

28.1

28.2

28.3

28.4

28.5

28.6

28.7

28.8

28.9

28.10

28.11

28.12

28.13

28.14

28.15

28.16

28.17

28.18

28.19

28.20

28.21

28.22

29.1

29.2

29.3

29.4

29.5

29.6

29.7

29.8

29.9

29.10

29.11

29.12

29.13

29.14

29.15

29.16

29.17

29.18

29.19

29.20

29.21

29.22

29.23

29.24

29.25

29.26

29.27

29.28

30.1

30.2

30.3

30.4

30.5

30.6

30.7

30.8

30.9

30.10

30.11

30.12

30.13

30.14

30.15

30.16

30.17

30.18

30.19

30.20

30.21

30.22

30.23

30.24

30.25

30.26

30.27

30.28

30.29

30.30

30.31

30.32

30.33

30.34

30.35

30.36

30.37

30.38

30.39

30.40

30.41

30.42

30.43

30.44

30.45

30.46

30.47

30.48

30.49

30.50

31.1

31.2

31.3

31.4

31.5

31.6

31.7

31.8

31.9

31.10

31.11

31.12

31.13

31.14

31.15

31.16

32.1

32.2

32.3

32.4

32.5

32.6

32.7

32.8

32.9

32.10

32.11

32.12

32.13

32.14

32.15

32.16

32.17

32.18

32.19

32.20

32.21

32.22

33.1

33.2

33.3

33.4

33.5

33.6

33.7

33.8

33.9

33.10

33.11

33.12

33.13

33.14

33.15

33.16

33.17

33.18

33.19

33.20

33.21

33.22

33.23

33.24

33.25

33.26

33.27

33.28

33.29

33.30

33.31

33.32

33.33

33.34

33.35

33.36

33.37

33.38

33.39

33.40

33.41

33.42

33.43

33.44

33.45

33.46

33.47

33.48

33.49

33.50

33.54

33.51

33.52

33.53

34.1

34.2

34.3

34.4

34.5

34.6

34.7

34.8

34.9

34.10

34.11

34.12

35.1

35.2

35.3

35.4

35.5

35.6

35.7

35.8

35.9

35.10

35.11

35.12

35.13

35.14

35.15

35.16

35.17

35.18

35.19

35.20

35.21

35.22

35.23

35.24

36.1

36.2

36.3

36.4

36.5

36.6

36.7

36.8

36.9

36.10

36.11

36.12

36.13

36.14

36.15

36.16

36.17

36.18

37.1

37.2

37.3

37.4

37.5

37.6

37.7

37.8

37.9

37.10

37.11

37.12

37.13

37.14

37.15

37.16

37.17

37.18

37.19

37.20

37.21

37.22

37.23

37.24

37.25

37.26

37.27

37.28

37.29

37.30

38.1

38.2

38.3

38.4

38.5

38.6

38.7

38.8

38.9

38.10

38.11

38.12

38.13

38.14

38.15

38.16

38.17

38.18

38.19

38.20

38.21

38.22

39.1

39.2

39.3

39.4

39.5

39.6

39.7

39.8

39.9

39.10

39.11

39.12

39.13

39.14

39.15

39.16

39.17

39.18

39.19

39.20

39.21

39.22

40.1

40.2

40.3

40.4

40.5

40.6

40.7

40.8

40.9

40.10

40.11

40.12

41.1

41.2

41.3

41.4

41.5

41.6

41.7

41.8

41.9

41.10

41.11

41.12

41.13

41.14

42.1

42.2

42.3

42.4

42.5

42.6

42.7

42.8

42.9

42.10

42.11

42.12

42.13

42.14

42.15

42.16

42.17

42.18

42.19

42.20

42.21

42.22

42.23

42.24

xi

xii

xiii

xiv

xv

xvi

IV.1

IV.2

43.1

43.2

43.3

43.4

43.5

43.6

43.7

43.8

43.9

43.10

44.1

44.2

44.3

44.4

44.5

44.6

44.7

44.8

44.9

44.10

44.11

44.12

44.13

44.14

44.15

44.16

44.17

44.18

45.1

45.2

45.3

45.4

45.5

45.6

45.7

45.8

45.9

45.10

45.11

45.12

45.13

45.14

45.15

45.16

45.17

45.18

46.1

46.2

46.3

46.4

46.5

46.6

46.7

46.8

46.9

46.10

46.11

46.12

46.13

46.14

47.1

47.2

47.3

47.4

47.5

47.6

47.7

47.8

47.9

47.10

47.11

47.12

47.13

47.14

47.15

47.16

47.17

47.18

47.19

47.20

47.21

47.22

48.1

48.2

48.3

48.4

48.5

48.6

48.7

48.8

48.9

48.10

48.11

48.12

48.13

48.14

48.15

48.16

48.17

48.18

48.19

48.20

48.21

48.22

48.23

48.24

48.25

48.26

48.27

48.28

48.29

48.30

48.31

48.32

48.33

48.34

48.35

48.36

48.37

48.38

48.39

48.40

48.41

48.42

48.43

48.44

48.45

48.46

48.47

48.48

49.1

49.2

49.3

49.4

49.5

49.6

49.7

49.8

49.9

49.10

49.11

49.12

49.13

49.14

49.15

49.16

49.17

49.18

49.19

49.20

49.21

49.22

49.23

49.24

49.25

49.26

49.27

49.28

49.29

49.30

49.31

49.32

49.33

49.34

49.35

49.36

49.37

49.38

49.39

49.40

49.41

49.42

49.43

49.44

49.45

49.46

49.47

49.48

50.1

50.2

50.3

50.4

50.5

50.6

50.7

50.8

50.9

50.10

50.11

50.12

50.13

50.14

50.15

50.16

50.17

50.18

50.19

50.20

50.21

50.22

50.23

50.24

50.25

50.26

51.1

51.2

51.3

51.4

51.5

51.6

51.7

51.8

51.9

51.10

51.11

51.12

51.13

51.14

51.15

51.16

51.17

51.18

51.19

51.20

51.21

51.22

51.23

51.24

51.25

51.26

51.27

51.28

51.29

51.30

51.31

51.32

51.33

51.34

51.35

51.36

51.37

51.38

V.1

V.2

52.1

52.2

52.3

52.4

52.5

52.6

52.7

52.8

52.9

52.10

52.11

52.12

52.13

52.14

52.15

52.16

52.17

52.18

53.1

53.2

53.3

53.4

53.5

53.6

53.7

53.8

53.9

53.10

53.11

53.12

53.13

53.14

53.15

53.16

53.17

53.18

53.19

53.20

53.21

53.22

53.23

53.24

53.25

53.26

53.27

53.28

53.29

53.30

53.31

53.32

54.1

54.2

54.3

54.4

54.6

54.7

54.8

54.9

54.10

54.5

54.11

54.12

54.13

54.14

54.15

54.16

54.17

54.18

54.19

54.20

54.21

54.22

54.23

54.24

54.25

54.26

54.27

54.28

54.29

54.30

54.31

54.32

55.1

55.2

55.3

55.4

55.5

55.6

55.7

55.8

55.9

55.10

55.11

55.12

55.13

55.14

55.15

55.16

55.17

55.18

55.19

55.20

55.21

55.22

55.23

55.24

55.25

55.26

55.27

55.28

VI.1

VI.2

56.1

56.2

56.3

56.4

56.5

56.6

56.7

56.8

56.9

56.10

56.11

56.12

56.13

56.14

56.15

56.16

56.17

56.18

56.19

56.20

56.21

56.22

56.23

56.24

56.25

56.26

56.27

56.28

56.29

56.30

56.31

56.32

56.33

56.34

56.35

56.36

56.37

56.38

56.39

56.40

57.1

57.2

57.3

57.4

57.5

57.6

57.7

57.8

57.9

57.10

57.11

57.12

57.13

57.14

57.15

57.16

57.17

57.18

57.19

57.20

57.21

57.22

57.23

57.24

57.25

57.26

57.27

57.28

57.29

57.30

57.31

57.32

57.33

57.34

57.35

57.36

57.37

57.38

58.1

58.2

58.3

58.4

58.5

58.6

58.7

58.8

58.9

58.10

58.11

58.12

58.13

58.14

58.15

58.16

58.17

58.18

58.19

58.20

58.21

58.22

58.23

58.24

58.25

58.26

58.27

58.28

58.29

58.30

58.31

58.32

58.33

58.34

58.35

58.36

59.1

59.2

59.3

59.4

59.5

59.6

59.7

59.8

59.9

59.10

59.11

59.12

59.13

59.14

59.15

59.16

59.17

59.18

59.19

59.20

59.21

59.22

60.1

60.2

60.3

60.4

60.5

60.6

60.7

60.8

60.9

60.10

60.11

60.12

60.13

60.14

60.15

60.16

60.17

60.18

60.19

60.20

60.21

60.22

60.23

60.24

60.25

60.26

60.27

60.28

60.29

61.1

61.2

61.3

61.4

61.6

61.5

61.7

61.8

61.9

61.10

61.11

61.12

61.13

61.14

61.15

61.16

61.17

61.18

VII.1

VII.2

62.1

62.2

62.3

62.4

62.5

62.6

62.7

62.8

62.9

62.10

62.11

62.12

62.13

62.14

62.15

62.16

62.17

62.18

62.19

62.20

62.21

62.22

62.23

62.24

62.25

62.26

63.1

63.2

63.3

63.4

63.5

63.6

63.7

63.8

63.9

63.10

63.11

63.12

63.13

63.14

63.15

63.16

63.17

63.18

63.19

63.20

63.21

63.22

63.23

63.24

63.25

63.26

63.27

63.28

63.29

63.30

63.31

63.32

63.33

63.34

64.1

64.2

64.3

64.4

64.5

64.6

64.7

64.8

64.9

64.10

64.11

64.12

64.13

64.14

64.15

64.16

65.1

65.2

65.3

65.4

65.5

65.6

65.7

65.8

65.9

65.10

65.11

65.12

65.13

65.14

65.15

65.16

65.17

65.18

65.19

65.20

66.1

66.2

66.3

66.4

66.5

66.6

66.7

66.8

66.9

66.10

66.11

66.12

66.13

66.14

66.15

66.16

67.1

67.2

67.3

67.4

67.5

67.6

67.7

67.8

67.9

67.10

67.11

67.12

67.13

67.14

67.15

67.16

67.17

67.20

67.18

67.19

68.1

68.2

68.3

68.4

68.5

68.6

68.7

68.8

68.9

68.10

68.11

68.12

68.13

68.14

68.15

68.16

68.17

68.18

68.19

68.20

68.21

68.22

68.23

68.24

68.25

68.26

68.27

68.28

68.29

68.30

68.31

68.32

68.33

68.34

VIII.1

VIII.2

69.1

69.2

69.3

69.4

69.5

69.6

69.7

69.8

69.9

69.10

69.11

69.12

69.13

69.14

69.15

69.16

69.17

69.18

69.19

69.20

69.21

69.22

69.23

69.24

69.25

69.26

69.27

69.28

69.29

69.30

69.31

69.32

69.33

69.34

69.35

69.36

69.37

69.38

70.1

70.2

70.3

70.4

70.5

70.6

70.7

70.8

70.9

70.10

70.11

70.12

70.13

70.14

70.15

70.16

70.17

70.18

70.19

70.20

70.21

70.22

70.23

70.24

70.25

70.26

70.27

70.28

70.29

70.30

70.38

70.31

70.32

70.33

70.34

70.35

70.36

70.37

71.1

71.2

71.3

71.4

71.5

71.6

71.7

71.8

71.9

71.10

71.11

71.12

71.13

71.14

71.15

71.16

71.17

71.18

71.19

71.20

71.21

71.22

71.23

71.24

71.25

71.26

71.27

71.28

71.29

71.30

71.31

71.32

71.33

71.34

71.35

71.36

71.37

71.38

71.39

71.40

71.41

71.42

71.43

71.44

71.45

71.46

71.47

71.48

71.49

71.50

71.51

71.52

71.53

71.54

71.55

71.56

71.57

71.58

71.59

71.60

71.61

71.62

71.63

71.64

71.65

71.66

72.1

72.2

72.3

72.4

72.5

72.6

72.7

72.8

72.9

72.10

72.11

72.12

72.13

72.14

72.15

72.16

72.17

72.18

72.19

72.20

72.21

72.22

72.23

72.32

72.24

72.25

72.26

72.27

72.28

72.29

72.30

72.31

73.1

73.2

73.3

73.4

73.5

73.6

73.7

73.8

74.1

74.2

74.3

74.4

74.5

74.6

74.7

74.8

74.9

74.10

74.11

74.12

74.13

74.14

74.15

74.16

74.17

74.18

74.19

74.20

74.21

74.22

74.23

74.24

74.25

74.26

74.27

74.28

74.29

74.30

75.1

75.2

75.3

75.4

75.5

75.6

75.7

75.8

75.9

75.10

I.1

I.2

I.3

I.4

I.5

I.6

I.7

I.8

I.9

I.10

I.11

I.12

I.13

I.14

I.15

I.16

I.17

I.18

I.19

I.20

I.21

I.22

I.23

I.24

I.25

I.26

I.27

I.28

I.29

I.30

I.31

I.32

I.33

I.34

I.35

I.36

I.37

I.38

I.39

I.40

I.41

I.42

I.43

I.44

I.45