{"id":101737,"date":"2019-09-09T05:00:21","date_gmt":"2019-09-09T12:00:21","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=101737"},"modified":"2020-04-21T14:18:15","modified_gmt":"2020-04-21T21:18:15","slug":"cyber-canon-book-review-security-engineering","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/09\/cyber-canon-book-review-security-engineering\/","title":{"rendered":"Cyber Canon Book Review: Security Engineering"},"content":{"rendered":"<p><em>We modeled the\u00a0<a href=\"https:\/\/cybercanon.paloaltonetworks.com\/\">Cybersecurity Canon<\/a>\u00a0after the Baseball Hall of Fame and the Rock &amp; Roll Hall of Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number.\u00a0Please write a review and nominate your favorite.\u00a0<\/em><em>\u00a0<\/em><\/p>\n<p><em>The Cybersecurity Canon is a real thing for our community. We have designed it so that you can\u00a0<a href=\"https:\/\/cybercanon.paloaltonetworks.com\/nominate-a-book\/\">directly participate in the process<\/a>. Please do so!<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Cyber Canon Book Review:<\/strong>\u00a0 <span style=\"font-weight: 400;\">\u201cSecurity Engineering, A Guide to Building Dependable Distributed Systems,\u201d (2<\/span><span style=\"font-weight: 400;\">nd<\/span><span style=\"font-weight: 400;\"> edition, 2008), by Ross Anderson<\/span><\/p>\n<p><strong>Book Reviewed by:\u00a0\u00a0<span style=\"font-weight: 400;\">Cybersecurity Canon Committee Member Ron Woerner, RWX Security Solutions<\/span><\/strong><\/p>\n<p><strong>Bottom Line:\u00a0\u00a0<span style=\"font-weight: 400;\">I recommend this book for the Cybersecurity Canon Hall of Fame.<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Review:<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">If you could have only one cybersecurity book, it should be Ross Anderson\u2019s<\/span><a href=\"https:\/\/www.cl.cam.ac.uk\/~rja14\/book.html\" rel=\"nofollow,noopener\" > <i><span style=\"font-weight: 400;\">Security Engineering:<\/span><\/i> <i><span style=\"font-weight: 400;\">A Guide to Building Dependable Distributed Systems, second edition<\/span><\/i><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This book is <\/span><b>the <\/b><span style=\"font-weight: 400;\">encyclopedia of everything about security. While the subtitle insinuates it\u2019s only about distributed systems, it covers every topic associated with systems security, both technical and non-technical. It provides in-depth explanations of cryptography, multilevel security, biometrics, telecom system security and API attacks. It is more than a textbook or manual in that it includes other topics such as \u201cUsability and Psychology,\u201d \u201cEconomics,\u201d \u201cPhysical Security,\u201d \u201cElectronic Warfare,\u201d \u201cTerror, Justice, and Freedom,\u201d and \u201cThe Bleeding Edge.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This review is of the second edition, which Dr. Anderson updated in 2008 due to the many changes that occurred between those years. Don\u2019t let the date of the book fool you into thinking it\u2019s out of date. While technologies and terms may have changed, the concepts have not. For example, in the Preface (p. xxix) Dr. Anderson states, \u201c<\/span><i><span style=\"font-weight: 400;\">How good is all this new security technology? Unfortunately, the honest answer is \u201cnowhere near as good as it should be. New systems are often rapidly broken, and the same elementary mistakes are repeated in one application after another<\/span><\/i><span style=\"font-weight: 400;\">.\u201d This is still true over ten years later.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dr. Anderson is the perfect person to have written this book. He has computer engineering experience since the 1970s, has worked in industry and academia for over 30 years and this book shows this mix. His industry experience includes aviation, banking, and technology development. Today, Dr. Anderson is a Professor of Security Engineering at University of Cambridge and still writes on his<\/span><a href=\"https:\/\/www.cl.cam.ac.uk\/~rja14\/\" rel=\"nofollow,noopener\" > <span style=\"font-weight: 400;\">website<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/www.lightbluetouchpaper.org\/\" rel=\"nofollow,noopener\" > <span style=\"font-weight: 400;\">blog<\/span><\/a><span style=\"font-weight: 400;\">, both of which are also recommended reading. The writing style is conversational and easy to understand. He takes from experience and uses case studies as examples.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Security Engineering<\/span><\/i><span style=\"font-weight: 400;\"> accomplishes multiple goals. It was written to help working engineers better secure systems. Its purpose, which it achieves, is to give a solid introduction to security engineering at four levels:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><i><span style=\"font-weight: 400;\">As a textbook read cover-to-cover as an introduction to security<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\"><i><span style=\"font-weight: 400;\">As a reference book that provides an overview of the security workings of specific systems<\/span><\/i><span style=\"font-weight: 400;\"> including ATMs, industrial systems, communications and medical records databases.<\/span><\/li>\n<li style=\"font-weight: 400;\"><i><span style=\"font-weight: 400;\">As an introduction to underlying security technologies<\/span><\/i><span style=\"font-weight: 400;\">, such as cryptography, access controls, tamper resistance (both physical and cyber), biometrics, emission control, etc. This is a basic roadmap for each subject, plus a reading list.<\/span><\/li>\n<li style=\"font-weight: 400;\"><i><span style=\"font-weight: 400;\">As an original, scientific contribution providing common principles that underlie security engineering and the lessons that people building systems should learn<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">As he says in the forward, his audience is Dilbert: the working programmer, systems administrator, business analyst or engineer who is \u201cwho is trying to design real systems that will keep on working despite the best efforts of customers, managers, and everybody else.\u201d It is useful to the established professional security manager or consultant as a first-line reference; to the computer science professor doing research in or teaching cryptology; to the working police detective trying to figure out the latest phishing scams; and to policy wonks struggling with the conflicts involved in regulating security, privacy, systems and anonymity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dr. Anderson divided <\/span><i><span style=\"font-weight: 400;\">Security Engineering<\/span><\/i><span style=\"font-weight: 400;\"> into three parts:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">A review of basic concepts of computing systems, such as usability and psychology, protocols, access controls, cryptography, updates, and economics. Yes, economics and psychology! Security is fundamentally both a financial and human problem solved through people, process and technology.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Details of specific computing applications, which are used to introduce more advanced technologies and concepts. Topic areas include military communications, medical record systems, financial machines, mobile phones, and pay-tv. It also considers information security from the viewpoint of a number of different interest groups, such as companies, consumers, criminals, police, and spies.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">A review of organizational and policy issues: How computer security interacts with law, evidence and corporate politics; how we can gain confidence that a system will perform as intended and how the whole business of security engineering can best be managed.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">It\u2019s impossible to do justice to all of the content and context contained within the nearly 1,000-page <\/span><i><span style=\"font-weight: 400;\">Security Engineering<\/span><\/i><span style=\"font-weight: 400;\">. Below are some highlights:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Chapter 1 describes the fundamentals of security: How security is much more than technology and requires cross-disciplinary expertise in areas like computer science, mathematics, physical and logical protection as well as knowledge of economics, applied psychology, organizations and the law. Security professionals need to figure out what needs protecting, and how to do it. They also need to ensure that the people who will guard the system and maintain it are properly motivated. This chapter provides a high-level framework required in every security program. It leverages four case studies as examples of this framework, which will resonate with any reader.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Security Engineering goes into detail on cryptography, algorithms and managing encryption keys. Chapter 5 provides significant background on encryption modes of operation, symmetric and asymmetric cryptography, and hashing algorithms. These are the tools that underlie most modern security protocols. Any security professional studying for a certification exam should read this chapter for an in-depth, yet highly readable explanation of these potentially challenging topics.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Ross Anderson prognosticated much of the future of security. For example, in sections 2.4.8, <\/span><i><span style=\"font-weight: 400;\">The Future of Phishing<\/span><\/i><span style=\"font-weight: 400;\">, he explains how phishing will morph into spear phishing and whaling. \u201cResearch has shown that the bad guys can greatly improve their yields if they match the context of their phish to the targets; so phish will get smarter and harder to tell from real emails, just as spam has.\u201d (p. 50) He wasn\u2019t entirely correct with this prediction: \u201cI would not be surprised to see exclusive private banks issuing their customers with dedicated payment devices.\u201d Although, he wasn\u2019t so far off with some providing multi-factor authentication devices.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Not only does <\/span><i><span style=\"font-weight: 400;\">Security Engineering<\/span><\/i><span style=\"font-weight: 400;\"> go into the aspects of security associated with all industries and systems such as crypto, access control and authentication, and network attacks and defenses, but also into the verticals with chapters on Banking and Bookkeeping, Electronic Warfare, and Telecommunications. These areas affect us all, no matter where you work.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Dr. Anderson takes information from the experts at the time of writing. The bibliography itself is massive; 1379 references over 100 pages. If there\u2019s anything you need to learn about computing, it\u2019s in here. In today\u2019s Internet age, it\u2019s not as much what you know, but if you know where to find it. <\/span><i><span style=\"font-weight: 400;\">Security Engineering<\/span><\/i><span style=\"font-weight: 400;\">\u2019s prose and bibliography provide the reference needed on every security professional\u2019s bookshelf.\u00a0\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">No book is perfect. The challenge with this one is that some of the information is dated and have been overcome by new technology. For example, Windows Vista and Passport are no longer used. Cloud computing, virtualization, mobile, and IoT were in its infancy when the second edition was written. Dr. Anderson addresses the concepts underlying these ideas but was unable to provide details needed to securely engineer today\u2019s environments.\u00a0 Don\u2019t let this dissuade you from reading <\/span><i><span style=\"font-weight: 400;\">Security Engineering<\/span><\/i><span style=\"font-weight: 400;\">. The concepts haven\u2019t changed and apply to all new technologies.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We modeled the\u00a0Cybersecurity Canon\u00a0after the Baseball Hall of Fame and the Rock &amp; Roll Hall of Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, &hellip;<\/p>\n","protected":false},"author":397,"featured_media":32398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4521,6724],"tags":[4270],"coauthors":[4267],"class_list":["post-101737","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-canon","category-points-of-view","tag-cybersecurity-canon-review"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/101737","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=101737"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/101737\/revisions"}],"predecessor-version":[{"id":101739,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/101737\/revisions\/101739"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/32398"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=101737"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=101737"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=101737"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=101737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}