Elementary Information Security is certified to comply fully with the NSTISSI 4011: the federal training standard for information security professionals.
See a detailed topic matching spreadsheet under the Additional Resources tab below.
Comprehensive and accessible, Elementary Information Security covers the entire range of topics required for US government courseware certification NSTISSI 4011 and urges students to analyze a variety of security problems while gaining experience with basic tools of the trade. Written for the one-term undergraduate course, the text emphasizes both the technical and non-technical aspects of information security and uses practical examples and real-world assessment tools.
Early chapters in the text discuss individual computers and small LANS, while later chapters deal with distributed site security and the Internet. Cryptographic topics follow the same progression, starting on a single computer and evolving to Internet-level connectivity. Mathematical concepts throughout the text are defined and tutorials with mathematical tools are provided to ensure students grasp the information at hand. Rather than emphasizing memorization, this text challenges students to learn how to analyze a variety of security problems and gain experience with the basic tools of this growing trade.
Unlike other texts on the topic, the author goes beyond defining the math concepts and provides students with tutorials and practice with mathematical tools, making the text appropriate for a more broad range of readers.
Covers all topics required by the US government curriculum standard NSTISSI 4011.
Problem Definitions describe a practical situation that includes a security dilemma.
Technology Introductions provide a practical explanation of security technology to be used in the specific chapters
Implementation Examples show the technology being used to enforce the security policy at hand
Residual Risks describe the limitations to the technology and illustrate various tasks against it.
Each chapter includes worked examples of techniques students will need to be successful in the course. For instance, there will be numerous examples of how to calculate the number of attempts needed to crack secret information in particular formats; PINs, passwords and encryption keys.
Preview Content Now! Look to the Samples tab below to preview chapters 3 and 9.
Ideal for the second-year undergraduate college or university course in Information Security. This course can be found in various departments including Computer Science, Information Technology, Criminology, and Forensics.
Chapter 1 Security From the Ground Up
Chapter 2 Controlling a Computer
Chapter 3 Controlling Files
Chapter 4 Sharing Files
Chapter 5 Storing Files
Chapter 6 Authenticating People
Chapter 7 Encrypting Files
Chapter 8 Secret and Public Keys
Chapter 9 Encrypting Volumes
Chapter 10 Connecting Computers
Chapter 11 Networks of Networks
Chapter 12 End-to-End Networking
Chapter 13 Enterprise Computing
Chapter 14 Network Encryption
Chapter 15 Internet Services and Email
Chapter 16 The World Wide Web
Chapter 17 Governments and Secrecy
Richard E. Smith, PhD
Dr. Rick Smith, Ph.D., CISSP, is a writer, educator, and consultant who operates the Cryptosmith consulting practice. Dr. Smith has over 30 years of experience with computing systems, half of which has focused on information security. Dr. Smith also teaches at the University of St. Thomas (Minnesota) and has taught at the University of Minnesota and Boston University.
Additional Titles by this Author
- ISBN-13: 9781449648213