📄 005-007.html
字号:
<option value="/reference/dir.funandgames1.html">Fun/Games
<option value="/reference/dir.groupwareandcollaboration1.html">Groupware
<option value="/reference/dir.hardware1.html">Hardware
<option value="/reference/dir.intranetandextranetdevelopment1.html">Intranet Dev
<option value="/reference/dir.middleware.html">Middleware
<option value="/reference/dir.multimediaandgraphicdesign1.html">Multimedia
<option value="/reference/dir.networkservices1.html">Networks
<option value="/reference/dir.operatingsystems.html">OS
<option value="/reference/dir.productivityapplications1.html">Prod Apps
<option value="/reference/dir.programminglanguages.html">Programming
<option value="/reference/dir.security1.html">Security
<!-- <option value="/reference/dir.ewtraining1.html">Training Guides -->
<option value="/reference/dir.userinterfaces.html">UI
<option value="/reference/dir.webservices.html">Web Services
<option value="/reference/dir.webmasterskills1.html">Webmaster
<option value="/reference/dir.y2k1.html">Y2K
<option value="">-----------
<option value="/reference/whatsnew.html">New Titles
<option value="">-----------
<option value="/reference/dir.archive1.html">Free Archive
</SELECT>
</font></td>
</tr>
</table>
</form>
<!-- LEFT NAV SEARCH END -->
</td>
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->
<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->
<!-- begin main content -->
<td width="100%" valign="top" align="left">
<!-- END SUB HEADER -->
<!--Begin Content Column -->
<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">
<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">
<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE=""> <input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">
</form>
<!-- Empty Reference Subhead -->
<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=1//-->
<!--PAGES=005-007//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="001-005.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="007-009.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>When people are asked why they think computer security is important, their responses usually show concern for <I>confidentiality</I>. Most of us do not want our medical records made easily available to anyone curious enough to ask for them. Credit histories and other financial data hopefully are treated with confidence, too. Academic records, performance evaluations, and personnel files are other sources of information that we generally assume must be handled confidentially. Likewise, numerous manual procedures for the confidential care of banking transactions have been developed over hundreds of years. Therefore, a clear history of how to accomplish confidentiality has been established even if a computer is not in the loop.</P>
<P><I>Integrity</I> of information is also of concern in everyday life. Unauthorized changes to your credit history represent a weakness in the capability of a system to maintain integrity of the data under its control. In network communications, if an adversary manages to alter the data packets before the destination is reached, the integrity of the information has been compromised. If you are browsing a Web site and a malicious person can gather information from your personal computer and then use this information to steal funds from your bank account, you have become a victim of both integrity and confidentiality violations.</P>
<P>Lack of data <I>availability</I> caused by security problems is a major concern. If the primary trading database for a securities brokerage firm is inaccessible, millions of dollars could be lost with every passing minute. If the database suddenly became unreachable because of a software bug, few people would be shocked. Neither would it be a surprise if the disk drives failed and crashed the database. However, if the database becomes unavailable as a result of industrial espionage, watch for front-page coverage in the newspapers! Despite this potential reaction, money more likely will be budgeted for redundant power supplies, redundant network adapters, redundant servers, and redundant disks but not allocated for the purchase of a security monitoring product.</P>
<P>How can we show that a security product provides confidentiality, integrity, and availability? Using techniques from theoretical computer science, we can formally define confidentiality and integrity within the context of a particular computer system. As a consequence, one can say that confidentiality and integrity are <I>computable</I>. This notion is very profound because it enables security researchers to know without doubt that a particular system enforces confidentiality and integrity (Brinkley and Schell, 1995). In commercial products, these formal methods are rarely used. However, it is comforting to know that, in principle, we can rigorously defend a product’s claims about integrity and confidentiality.</P>
<P>Proving availability is more complicated. Statements regarding availability cannot be made with as much confidence as those for integrity and confidentiality. The main reason for this is that identifying all of the factors influencing availability in a particular computer system is almost impossible. That is, these influences cannot be exhaustively listed in mathematical expressions, and thus, a formal proof for availability is more elusive. Formal proofs and notations are not used in this book, but if you would like to learn more about formal models of computer security, many good references are available (Bell, 1990; LaPadula, 1990; Williams and Abrams, 1995), so check the references at the back of the book for these resources.</P>
<P>To summarize in computer security jargon, we can make statements about confidentiality and integrity with a high level of <I>assurance</I>, but we cannot make statements about the availability of a particular system with the same level of assurance. At least you can feel confident that products built to protect the confidentiality and integrity of your system can be provably secure assuming that the vendor has followed some sound design and development processes.</P>
<P>In computer security literature, you sometimes will find other goals of computer security including <I>authentication</I> and <I>nonrepudiation</I>. Authentication is the process of verifying the identity of someone or something, such as a when a user enters a password. Nonrepudiation is the process of proving that a message came from a particular sender and that the message could not have come from anyone else. As you see in this chapter, authentication is defined as a required supporting function of the basic security model, rather than as an explicit goal. Nonrepudiation might be needed at your site, but because it is not always required, nonrepudiation is omitted from the three primary goals listed previously.</P>
<P>Now that you know the security goals for your network, it’s time to take a look at how the goals can be met—by implementing a security model.</P>
<H3><A NAME="Heading4"></A><FONT COLOR="#000077">Learn to Ask Tough Questions</FONT></H3>
<P>A security model is an abstraction used to define entities and how these entities are allowed to interact. A security model begins as a set of definitions on paper, but eventually the model is implemented in software, hardware, or both. Hopefully, the implementation is accurate and adheres to the model specification. If the implementation is flawed, the system will lack the capability to provide confidentiality, integrity, and availability.
</P>
<P>A security model is found in every operating system. As part of the security model in most operating systems, access to each file can be limited in specific ways. In traditional UNIX systems, one rule controlling access might state that only Joe is allowed to read the file named JoeMail. The entities in this case are Joe and JoeMail, and both must be uniquely identifiable within the context of the operating system. Any ambiguity weakens the capability of the model to meet its three goals. The access control rule, or <I>authorization</I>, which is used to specify this particular part of the security policy consists of the triple <I>{Joe,JoeMail,read}</I>. Naturally, these few entities and this one rule represent only a fraction of the complete operating system security policy and underlying security model. Other operating system entities are files, processes, threads, queues, messages, processors, and the kernel itself.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="001-005.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="007-009.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->
<!-- BEGIN SUB FOOTER -->
<br><br>
</TD>
</TR>
</TABLE>
<table width="640" border=0 cellpadding=0 cellspacing=0>
<tr>
<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
<!-- END SUB FOOTER -->
<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->
<!-- FOOTER -->
<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a> | <a href="/contactus.html"><font color="#006666">Contact Us</font></a> | <a href="/aboutus.html"><font color="#006666">About Us</font></a> | <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> | <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> | <a href="/"><font color="#006666">Home</font></a></b>
<br><br>
Use of this site is subject to certain <a href="/agreement.html">Terms & Conditions</a>, <a href="/copyright.html">Copyright © 1996-1999 EarthWeb Inc.</a><br>
All rights reserved. Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
</tr>
</table>
</BODY>
</HTML>
<!-- END FOOTER -->
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -