Muutke küpsiste eelistusi

E-raamat: Trust in Computer Systems and the Cloud [Wiley Online]

(Profian)
  • Formaat: 352 pages
  • Ilmumisaeg: 14-Dec-2021
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1119695155
  • ISBN-13: 9781119695158
Teised raamatud teemal:
  • Wiley Online
  • Hind: 52,87 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Formaat: 352 pages
  • Ilmumisaeg: 14-Dec-2021
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1119695155
  • ISBN-13: 9781119695158
Teised raamatud teemal:

Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecurity

Trust in Computer Systems and the Cloud delivers an insightful and practical new take on what it means to trust in the context of computer and network security and the impact on the emerging field of Confidential Computing. Author Mike Bursell’s experience, ranging from Chief Security Architect at Red Hat to CEO at a Confidential Computing start-up grounds the reader in fundamental concepts of trust and related ideas before discussing the more sophisticated applications of these concepts to various areas in computing.

The book demonstrates in the importance of understanding and quantifying risk and draws on the social and computer sciences to explain hardware and software security, complex systems, and open source communities. It takes a detailed look at the impact of Confidential Computing on security, trust and risk and also describes the emerging concept of trust domains, which provide an alternative to standard layered security.

  • Foundational definitions of trust from sociology and other social sciences, how they evolved, and what modern concepts of trust mean to computer professionals
  • A comprehensive examination of the importance of systems, from open-source communities to HSMs, TPMs, and Confidential Computing with TEEs.
  • A thorough exploration of trust domains, including explorations of communities of practice, the centralization of control and policies, and monitoring

Perfect for security architects at the CISSP level or higher, Trust in Computer Systems and the Cloud is also an indispensable addition to the libraries of system architects, security system engineers, and master’s students in software architecture and security.

Introduction xv
Chapter 1 Why Trust?
1(18)
Analysing Our Trust Statements
4(1)
What Is Trust?
5(3)
What Is Agency?
8(2)
Trust and Security
10(3)
Trust as a Way for Humans to Manage Risk
13(2)
Risk, Trust, and Computing
15(4)
Defining Trust in Systems
15(2)
Defining Correctness in System Behaviour
17(2)
Chapter 2 Humans and Trust
19(34)
The Role of Monitoring and Reporting in Creating Trust
21(3)
Game Theory
24(4)
The Prisoner's Dilemma
24(3)
Reputation and Generalised Trust
27(1)
Institutional Trust
28(5)
Theories of Institutional Trust
29(2)
Who Is Actually Being Trusted?
31(2)
Trust Based on Authority
33(4)
Trusting Individuals
37(8)
Trusting Ourselves
37(4)
Trusting Others
41(2)
Trust, But Verify
43(1)
Attacks from Within
43(2)
The Dangers of Anthropomorphism
45(2)
Identifying the Real Trustee
47(6)
Chapter 3 Trust Operations and Alternatives
53(26)
Trust Actors, Operations, and Components
53(14)
Reputation, Transitive Trust, and Distributed Trust
59(3)
Agency and Intentionality
62(3)
Alternatives to Trust
65(1)
Legal Contracts
65(1)
Enforcement
66(1)
Verification
67(1)
Assurance and Accountability
67(12)
Trust of Non-Human or Non-Adult Actors
68(1)
Expressions of Trust
69(6)
Relating Trust and Security
75(1)
Misplaced Trust
75(4)
Chapter 4 Denning Trust in Computing
79(14)
A Survey of Trust Definitions in Computer Systems
79(7)
Other Definitions of Trust within Computing
84(2)
Applying Socio-Philosophical Definitions of Trust to Systems
86(7)
Mathematics and Trust
87(1)
Mathematics and Cryptography
87(2)
Mathematics and Formal Verification
89(4)
Chapter 5 The Importance of Systems
93(58)
System Design
93(6)
The Network Stack
94(2)
Linux Layers
96(1)
Virtualisation and Containers: Cloud Stacks
97(2)
Other Axes of System Design
99(1)
"Trusted" Systems
99(11)
Trust Within the Network Stack
101(1)
Trust in Linux Layers
102(1)
Trust in Cloud Stacks
103(3)
Hardware Root of Trust
106(4)
Cryptographic Hash Functions
110(15)
Measured Boot and Trusted Boot
112(2)
Certificate Authorities
114(1)
Internet Certificate Authorities
115(1)
Local Certificate Authorities
116(3)
Root Certificates as Trust Pivots
119(3)
The Temptations of "Zero Trust"
122(3)
The Importance of Systems
125(3)
Isolation
125(2)
Contexts
127(1)
Worked Example: Purchasing Whisky
128(17)
Actors, Organisations, and Systems
129(1)
Stepping Through the Transaction
130(4)
Attacks and Vulnerabilities
134(2)
Trust Relationships and Agency
136(1)
Agency
136(1)
Trust Relationships
137(8)
The Importance of Being Explicit
145(6)
Explicit Actions
145(4)
Explicit Actors
149(2)
Chapter 6 Blockchain and Trust
151(10)
Bitcoin and Other Blockchains
151(1)
Permissioned Blockchains
152(4)
Trust without Blockchains
153(1)
Blockchain Promoting Trust
154(2)
Permissionless Blockchains and Cryptocurrencies
156(5)
Chapter 7 The Importance of Time
161(24)
Decay of Trust
161(16)
Decay of Trust and Lifecycle
163(5)
Software Lifecycle
168(1)
Trust Anchors, Trust Pivots, and the Supply Chain
169(1)
Types of Trust Anchors
170(1)
Monitoring and Time
171(2)
Attestation
173(1)
The Problem of Measurement
174(2)
The Problem of Run Time
176(1)
Trusted Computing Base
177(8)
Component Choice and Trust
178(3)
Reputation Systems and Trust
181(4)
Chapter 8 Systems and Trust
185(26)
System Components
185(3)
Explicit Behaviour
188(6)
Defining Explicit Trust
189(3)
Dangers of Automated Trust Relationships
192(2)
Time and Systems
194(4)
Defining System Boundaries
198(13)
Trust and a Complex System
199(3)
Isolation and Virtualisation
202(3)
The Stack and Time
205(1)
Beyond Virtual Machines
205(2)
Hardware-Based Type 3 Isolation
207(4)
Chapter 9 Open Source and Trust
211(22)
Distributed Trust
211(3)
How Open Source Relates to Trust
214(19)
Community and Projects
215(2)
Projects and the Personal
217(2)
Open Source Process
219(1)
Trusting the Project
220(2)
Trusting the Software
222(4)
Supply Chain and Products
226(3)
Open Source and Security
229(4)
Chapter 10 Trust, the Cloud, and the Edge
233(14)
Deployment Model Differences
235(5)
What Host Systems Offer
237(1)
What Tenants Need
237(3)
Mutually Adversarial Computing
240(3)
Mitigations and Their Efficacy
243(4)
Commercial Mitigations
243(1)
Architectural Mitigations
244(2)
Technical Mitigations
246(1)
Chapter 11 Hardware, Trust, and Confidential Computing
247(34)
Properties of Hardware and Trust
248(5)
Isolation
248(1)
Roots of Trust
249(4)
Physical Compromise
253(3)
Confidential Computing
256(25)
TEE TCBs in detail
261(5)
Trust Relationships and TEEs
266(3)
How Execution Can Go Wrong--and Mitigations
269(7)
Minimum Numbers of Trustees
276(2)
Explicit Trust Models for TEE Deployments
278(3)
Chapter 12 Trust Domains
281(20)
The Composition of Trust Domains
284(8)
Trust Domains in a Bank
284(4)
Trust Domains in a Distributed Architecture
288(4)
Trust Domain Primitives and Boundaries
292(9)
Trust Domain Primitives
292(1)
Trust Domains and Policy
293(3)
Other Trust Domain Primitives
296(1)
Boundaries
297(1)
Centralisation of Control and Policies
298(3)
Chapter 13 A World of Explicit Trust
301(8)
Tools for Trust
301(2)
The Role of the Architect
303(4)
Architecting the System
304(1)
The Architect and the Trustee
305(2)
Coda
307(2)
References 309(12)
Index 321
MIKE BURSELL is CEO and co-founder of Profian, a Confidential Computing company. He holds multiple security patents, is a sought-after speaker at global technology conferences, and has contributed to major reports and security specifications for the European Telecommunications Standards Institute.