De Leeuw / Bergstra | The History of Information Security | E-Book | sack.de
E-Book

E-Book, Englisch, 900 Seiten, Web PDF

De Leeuw / Bergstra The History of Information Security

A Comprehensive Handbook
1. Auflage 2007
ISBN: 978-0-08-055058-9
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark

A Comprehensive Handbook

E-Book, Englisch, 900 Seiten, Web PDF

ISBN: 978-0-08-055058-9
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark



Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.
The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered.
There has never been any effort to write a comprehensive history. This is most unfortunate, because Information Security should be perceived as a set of communicating vessels, where technical innovations can make existing legal or organisational frame-works obsolete and a breakdown of political authority may cause an exclusive reliance on technical means.
This book is intended as a first field-survey. It consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field.
These include: the emergence of cryptology as a discipline during the Renaissance, the Black Chambers in 18th century Europe, the breaking of German military codes during World War II, the histories of the NSA and its Soviet counterparts and contemporary cryptology. Other subjects are: computer security standards, viruses and worms on the Internet, computer transparency and free software, computer crime, export regulations for encryption software and the privacy debate.
- Interdisciplinary coverage of the history Information Security
- Written by top experts in law, history, computer and information science
- First comprehensive work in Information Security

De Leeuw / Bergstra The History of Information Security jetzt bestellen!

Weitere Infos & Material


1;Front cover;1
2;The History of Information Security;4
3;Copyright page;5
4;Preface;6
5;Advisory Board;8
6;Contents;10
7;Chapter 1. Introduction;14
7.1;1.1 An example from Dutch history;14
7.2;1.2 Definitions, topics, aim;15
7.3;1.3 Historiography;16
7.4;1.4 Limitations;17
7.5;1.5 Intellectual ownership;18
7.6;1.6 Identity management;21
7.7;1.7 Cryptology and communication security;24
7.8;1.8 Computer security;30
7.9;1.9 Privacy and export regulations;34
7.10;1.10 Information warfare;36
7.11;1.11 Concluding remarks;37
7.12;References;37
8;Part 1. Intellectual Ownership;40
8.1;Chapter 2. Limitations on the publishing of scientific research;42
8.1.1;2.1 Introduction;42
8.1.2;2.2 Authors and publishing;45
8.1.3;2.3 Editorial activities;48
8.1.4;2.4 Other forms of publication;53
8.1.5;2.5 Grey literature and restrictions on availability;59
8.1.6;2.6 Conclusion;62
8.1.7;References;63
8.2;Chapter 3. Industrialists, Inventors and the German Patent System, 1877-1957: A Comparative Perspectivet1;66
8.2.1;3.1 The case for patents: Origins and theories;67
8.2.2;3.2 Inventor rights in the United States and Germany;68
8.2.3;3.3 Werner Siemens and the peculiarities of the German patent code;72
8.2.4;3.4 Technological culture and the inventor's reward;78
8.2.5;3.5 The inventor debate in Germany and national socialist inventor policy;83
8.2.6;References;90
8.3;Chapter 4. Reflecting media: A cultural history of copyright and the media;96
8.3.1;4.1 Introduction;97
8.3.2;4.2 Text;98
8.3.3;4.3 Visual;109
8.3.4;4.4 Audio;113
8.3.5;4.5 Audio-visual;118
8.3.6;4.6 Multimedia;124
8.3.7;4.7 Conclusions;127
8.3.8;References;129
8.4;Chapter 5. The History of Copyright Protection of Computer Software The Emancipation of a Work of Technology Toward a Work of Authorship;134
8.4.1;5.1 Introduction;135
8.4.2;5.2 Framework: technological evolution;135
8.4.3;5.3 The United States of America;136
8.4.4;5.4 Germany;140
8.4.5;5.5 The Netherlands;143
8.4.6;5.6 Developments in the international arena;146
8.4.7;5.7 Summary and conclusions;149
8.4.8;References;151
8.5;Chapter 6. A History of Software Patents;154
8.5.1;6.1 Introduction;154
8.5.2;6.2 Patent law primer;155
8.5.3;6.3 A pre-history of software patents;160
8.5.4;6.4 Early software patents;163
8.5.5;6.5 Recent software patents;170
8.5.6;6.6 The present;173
8.5.7;6.7 Conclusions;174
8.5.8;Acknowledgement;176
8.5.9;References;176
9;Part2. Identity-Management;178
9.1;Chapter 7. Semiotics of identity management;180
9.1.1;7.1 Identifying assumptions;181
9.1.2;7.2 Identity in enneadic dynamics;187
9.1.3;7.3 Social practices in identity management;198
9.1.4;References;206
9.2;Chapter 8. History of document security;210
9.2.1;8.1 Introduction;211
9.2.2;8.2 The first period until 1800, block printing, the invention of typography and the genes of paper currency;213
9.2.3;8.3 From 1800 until 1940, security printing matures;217
9.2.4;8.4 The evolutionary years from 1940-1980. Classifying counterfeiters and the arrival of matured security features;222
9.2.5;8.5 From 1980 until the beginning of the 21st century. The influence of the digital revolution;228
9.2.6;8.6 The history of substrate-based security features;237
9.2.7;8.7 The history of security features added to the substrate;244
9.2.8;8.8 A few comments on the role of printing ink within the history of document security;248
9.2.9;8.9 Retrospection;250
9.2.10;8.10 Epilogue;253
9.2.11;References;253
9.3;Chapter 9. From Frankpledge to Chip and Pin: Identification and Identity in England, 1475-2005;256
9.3.1;9.1 Introduction;257
9.3.2;9.2 Identifying the Great and the Good, and the Insignificant and the Bad, in early-modern England;258
9.3.3;9.3 Creating the modern citizen and anti-citizen, 1830-1920;262
9.3.4;9.4 Twentieth-century identification in total war, total welfare and total shopping;268
9.3.5;9.5 Conclusion;272
9.3.6;References;273
9.4;Chapter 10. The scientific development of biometricsover the last 40 years;276
9.4.1;10.1 Introduction;276
9.4.2;10.2 The technology pioneers of the 1960s;277
9.4.3;10.3 Automatic personal identification of the 1970s;279
9.4.4;10.4 `Biometrics' of the 1980s;281
9.4.5;10.5 Organized activities of the 1990s;282
9.4.6;10.6 The 21st century;284
9.4.7;10.7 Conclusions;284
9.4.8;Acknowledgements;285
9.4.9;References;285
10;Part 3. Communication Security;288
10.1;Chapter 11. The Rise of Cryptology in the European Renaissance;290
10.1.1;11.1 The Ancestry;290
10.1.2;11.2 Early inventions - 14th and 15th centuries;293
10.1.3;11.3 The 17th century;310
10.1.4;11.4 European cryptology in the Renaissance - Conclusion and outlook;334
10.1.5;Acknowledgements;335
10.1.6;References;335
10.2;Chapter 12. Cryptology in the Dutch Republic: A Case-Study;340
10.2.1;12.1 Introduction;340
10.2.2;12.2 The case of the Dutch Republic: general background;345
10.2.3;12.3 The war with Spain;346
10.2.4;12.4 The introduction of code-books for regular use by the States-General;351
10.2.5;12.5 Lyonet's contribution;358
10.2.6;12.6 The rise of the patriot movement;365
10.2.7;12.7 The use of ciphers during the latter part of the 18th century;368
10.2.8;12.8 Conclusion;373
10.2.9;References;376
10.3;Chapter 13. Intelligence and the emergence of the information society in eighteenth-century Britain;382
10.3.1;13.1 Introduction;382
10.3.2;13.2 Postal interception;383
10.3.3;13.3 News management;388
10.3.4;13.4 News and analysis;390
10.3.5;13.5 Changing information needs;391
10.3.6;References;391
10.4;Chapter 14. Rotor machines and bombes;394
10.4.1;14.1 The origin of the rotor idea;395
10.4.2;14.2 The Scherbius line of commercial rotor machines;403
10.4.3;14.3 Rotor machines for the German armed forces;409
10.4.4;14.4 Polish Cryptanalysis of the Wehrmacht ENIGMA;426
10.4.5;14.5 British and US cryptanalysis of the Wehrmacht ENIGMA;435
10.4.6;14.6 Conclusions;458
10.4.7;References;458
10.5;Chapter 15. Tunny and Colossus: Breaking the Lorenz Schlüsselzusatz traffic;460
10.5.1;15.1 Introduction;460
10.5.2;15.2 The Tunny machine;461
10.5.3;15.3 A sample decrypt;464
10.5.4;15.4 Central figures in the attack on Tunny;467
10.5.5;15.5 Breaking the Tunny machine;468
10.5.6;15.6 Turingery;469
10.5.7;15.7 Tutte's statistical method;471
10.5.8;15.8 Heath Robinson;474
10.5.9;15.9 Flowers, the neglected pioneer of computing;475
10.5.10;15.10 Colossus;478
10.5.11;15.11 Misconceptions about Colossus;481
10.5.12;15.12 Postwar;482
10.5.13;15.13 Colossus and the modern computer;484
10.5.14;References;487
10.5.15;Appendix 1. The teleprinter alphabet;488
10.5.16;Appendix 2. The Tunny encipherment equation and Tutte's 1 + 2 break in;489
10.6;Chapter 16. Boris Hagelin and Crypto AG: Pioneers of Encryption;492
10.6.1;16.1 Via the Nobel family to A.B. Cryptograph;492
10.6.2;16.2 Hagelin's life's work begins …;493
10.6.3;16.3 The crucial journey;497
10.6.4;16.4 The long stay in America;498
10.6.5;16.5 The new start in Switzerland;500
10.6.6;16.6 The advent of new technology at crypto AG;507
10.6.7;References;509
10.7;Chapter 17. Eavesdroppers of the Kremlin: KGB SIGINT during the cold war;510
10.7.1;17.1 Introduction;510
10.7.2;17.2 The genesis of KGB SIGINT;511
10.7.3;17.3 World War II and the rebirth of Soviet SIGINT;515
10.7.4;17.4 Soviet comint reorganizes in post-World War II era;516
10.7.5;17.5 The MGB radio counterintelligence service;518
10.7.6;17.6 The failed Soviet experiment with cryptologic unification;518
10.7.7;17.7 The KGB and GRU go their own separate ways;520
10.7.8;17.8 Radio counterintelligence in the 1950s;523
10.7.9;17.9 Soviet SIGINT in the 1960s;523
10.7.10;17.10 Soviet SIGINT during the 1970s;525
10.7.11;17.11 Soviet SIGINT during the 1980s;530
10.7.12;17.12 The strengths and weaknesses of Soviet SIGINT;531
10.7.13;References;533
10.8;Chapter 18. National Security Agency: The Historiography of Concealment;536
10.8.1;18.1 Introduction;537
10.8.2;18.2 NSA's institutional lineage;538
10.8.3;18.3 NSA's genesis in context;543
10.8.4;18.4 1952-1960: attaining an institutional identity;544
10.8.5;18.5 1961-1973: acceleration and continuity;549
10.8.6;18.6 1974-1990: from Watergate to INFOSEC;555
10.8.7;18.7 1991-2001: breakdown;560
10.8.8;18.8 2001 and after: reorganizing uncertainty;563
10.8.9;18.9 Epilogue: the intrigue of limitations;566
10.8.10;References;567
10.9;Chapter 19. An Introduction to Modern Cryptology;578
10.9.1;19.1 Introduction;578
10.9.2;19.2 Encryption for secrecy protection;580
10.9.3;19.3 Hashing and signatures for authentication;591
10.9.4;19.4 Analysis and design of cryptographic algorithms;596
10.9.5;19.5 Concluding remarks;602
10.9.6;References;603
11;Part4. Computer Security;606
11.1;Cahpter 20. A history of computer security standards;608
11.1.1;20.1 Setting technical standards: A brief overview;609
11.1.2;20.2 Digital beginnings, physical security and electronic radiation;610
11.1.3;20.3 The early leadership of Willis Ware in computer security research;613
11.1.4;20.4 Continuing challenges with computer security at the DoD;616
11.1.5;20.5 James P. Anderson and the air force's focus on computer security;617
11.1.6;20.6 Bell and LaPadula: modeling of computer security and the foundation for standards;618
11.1.7;20.7 Moving toward a computer security organizational infrastructure;618
11.1.8;20.8 The Orange Book (TCSEC);619
11.1.9;20.9 Common criteria and the globalization of computer system security standards;621
11.1.10;20.10 The origin and early developments of cryptographic research in the academic community;623
11.1.11;20.11 Early attention to and investing in computer security systems development in the private sector;625
11.1.12;20.12 Cryptographic research and the early digital computer industry;625
11.1.13;20.13 RSA Data Security: pioneering a security software industry;626
11.1.14;20.14 Computer security and society;629
11.1.15;20.15 Conclusion;632
11.1.16;References;633
11.2;Chapter 21. Security models;636
11.2.1;21.1 Introduction;636
11.2.2;21.2 Policy models;637
11.2.3;21.3 Security models and the theory of access control;644
11.2.4;21.4 Current work;647
11.2.5;References;647
11.3;Chapter 22. Computer security through correctness and transparency;650
11.3.1;22.1 Introduction and problem statement;651
11.3.2;22.2 Computer security;652
11.3.3;22.3 Program correctness;656
11.3.4;22.4 Programming transparency;660
11.3.5;22.5 Conclusion;663
11.3.6;Acknowledgements;664
11.3.7;References;664
11.4;Chapter 23. IT Security and IT Auditing between 1960 and 2000;668
11.4.1;23.1 Introduction;669
11.4.2;23.2 The electronic data processing period (the sixties);671
11.4.3;23.3 Automation period (the seventies);676
11.4.4;23.4 Integration and diversification period (the eighties);682
11.4.5;23.5 Contagion period (the nineties);688
11.4.6;23.6 Conclusions;692
11.4.7;References;693
11.5;Chapter 24. A History of Internet Security;694
11.5.1;24.1 Prologue;694
11.5.2;24.2 Closed world origins;695
11.5.3;24.3 Black thursday;696
11.5.4;24.4 Into the public consciousness;697
11.5.5;24.5 The birth of CERT;698
11.5.6;24.6 The commercialization of security;699
11.5.7;24.7 Encryption as munitions;701
11.5.8;24.8 The era of cyberterrorism;703
11.5.9;24.9 Ongoing public plagues: worms and viruses;705
11.5.10;24.10 DDoS wars;707
11.5.11;24.11 Growth of wireless Internet access;710
11.5.12;24.12 Spyware infestation;712
11.5.13;24.13 Securing the Internet: is it possible?;714
11.5.14;References;715
11.6;Chapter 25. History of computer crime;718
11.6.1;25.1 What is cybercrime?;718
11.6.2;25.2 Emergence of cybercrime (1960s-1990);719
11.6.3;25.3 Cybercrime increases in incidence and complexity (1990-2004);721
11.6.4;25.4 Cybercrime: the reaction;727
11.6.5;25.5 Dealing with cybercrime: past efforts;727
11.6.6;25.6 Dealing with cybercrime: future efforts?;730
11.6.7;25.7 Cybercrime: the future;731
11.6.8;References;732
12;Part 5. Privacy- and Export Regulations;736
12.1;Chapter 26. The export of cryptography in the 20th and the 21st Centuries;738
12.1.1;26.1 Introduction;738
12.1.2;26.2 Background;739
12.1.3;26.3 Export control;739
12.1.4;26.4 Export status of cryptography;741
12.1.5;26.5 The impact of export control on cryptography;742
12.1.6;26.6 Events after the cold war;742
12.1.7;26.7 America's international strategy;745
12.1.8;26.8 The rules change;745
12.1.9;26.9 European decontrol;746
12.1.10;26.10 Why did it happen?;746
12.1.11;26.11 The aftermath of September 11th;748
12.1.12;26.12 Conclusion;748
12.1.13;26.13 Recommendations;748
12.1.14;References;749
12.2;Chapter 27. History of privacy;750
12.2.1;27.1 Introduction;751
12.2.2;27.2 Privacy;752
12.2.3;27.3 Privacy under attack;755
12.2.4;27.4 The protection of privacy;763
12.2.5;27.5 Analysis;771
12.2.6;27.6 Conclusions;779
12.2.7;References;780
12.3;Chapter 28. Munitions, wiretaps and MP3s: The changing interface between privacy and encryption policy in the Information Society;784
12.3.1;Acronyms;784
12.3.2;28.1 Introduction;786
12.3.3;28.2 Corking the Genie: restricting non-governmental encryption research, development and use;789
12.3.4;28.3 Now the Genie's out - governments' first wish: limited civilian cryptography and export controls;793
12.3.5;28.4 Now the Genie's out - governments' second wish: cryptographic key escrow/key recovery;807
12.3.6;28.5 Now the Genie's out - governments' third wish: mandatory key surrender and encryption avoidance;810
12.3.7;28.6 Rebottling the Genie: commercial attacks on encryption research, public use and personal privacy;817
12.3.8;28.7 Conclusions;822
12.3.9;References;823
13;Part 6. Information Warfare;832
13.1;Chapter 29. The Information Revolution and the transformation of warfare[*]t1;834
13.1.1;29.1 Introduction;834
13.1.2;29.2 Cyberspace;834
13.1.3;29.3 Critical infrastructure protection;836
13.1.4;29.4 Information operations;839
13.1.5;29.5 Struggle for global influence;842
13.1.6;29.6 Conclusion;843
13.1.7;References;844
14;Biographies;846
15;Author Index;854
16;Subject Index;874



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.