| 000 | 00838camuuu200289 a 4500 | |
| 001 | 000000425078 | |
| 003 | OCoLC | |
| 005 | 19960801143837.0 | |
| 008 | 940503s1994 maua b 001 0 eng d | |
| 010 | ▼a 93077966 | |
| 015 | ▼a GB95-24675 | |
| 019 | ▼a 32349609 | |
| 020 | ▼a 0126380104 | |
| 040 | ▼a MiDW ▼c DLC ▼d UKM | |
| 042 | ▼a lccopycat | |
| 049 | ▼a ACSL ▼l 121001033 | |
| 050 | 0 4 | ▼a TK5105.5 ▼b .S4257 1994 |
| 082 | 0 0 | ▼a 005.8 ▼2 20 |
| 090 | ▼a 005.8 ▼b S525n | |
| 110 | 1 | ▼a Shaffer, Steven L. |
| 245 | 1 0 | ▼a Network security / ▼c Steven L. Shaffer, Alan R. Simon. |
| 260 | ▼a Boston : ▼b AP Professional, ▼c c1994. | |
| 300 | ▼a xviii, 318 p. : ▼b ill. ; ▼c 24 cm. | |
| 504 | ▼a Includes bibliographical references (p. 303-307) and index. | |
| 650 | 0 | ▼a Computer networks ▼x Security measures. |
| 653 | 0 | ▼a Computers ▼a Security |
| 700 | 1 | ▼a Simon, Alan R. |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/단행본실(2층)/ | 청구기호 005.8 S525n | 등록번호 121001033 (5회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. 2 | 소장처 세종학술정보원/사회과학실(4층)/ | 청구기호 658.478 S525n | 등록번호 151003368 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/단행본실(2층)/ | 청구기호 005.8 S525n | 등록번호 121001033 (5회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 세종학술정보원/사회과학실(4층)/ | 청구기호 658.478 S525n | 등록번호 151003368 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
A comprehensive approach to guarding against undesired infiltration and damaging viruses in corporate, government, and private computer networks. Discusses the principles of distributed networks, the need for security, security services, personal-computer workstations, covert channels, standards, and other aspects. Annotation copyright Book News, Inc. Portland, Or.
정보제공 :
목차
CONTENTS Preface = vii Acknowledgments = ix 1 Principles of Distributed Computing and Networks = 1 1.1 Introduction = 1 1.2 The Network Computing Revolution = 3 1.3 Focus and Objective = 4 1.4 Secure Distributed Processing = 5 Many Existing Views of Distributed Processing = 6 Notions of a Distributed System = 7 1.5 Distributed Systems Elements Structure for this Book = 11 Elements of Distribution = 11 Distributed Users = 12 Distributed Communications = 13 Distributed Processes = 15 Distributed Data = 15 Distributed Control = 16 Distributed Security = 17 1.6 Distribution = 18 Proximity = 18 Number of Nodes = 18 Cooperation within and among Elements = 19 1.7 Summary = 19 End Notes = 19 2 The Need for Network Security = 21 2.1 Introduction = 21 2.2 Information Services and Value = 24 2.3 Clasified Information = 24 2.4 Proprietary and Sensitive Information = 25 2.5 Total Dependence = 26 2.6 Economics = 26 2.7 Summary = 27 End Notes = 28 3 The Network Security Challenge = 29 3.1 Introduction = 29 3.2 The Fundamental Paradox = 29 Tradeoffs = 30 Principal Issues = 30 3.3 Reclusive and Tightly Held Science = 32 3.4 Inadequate Funding and Management Commitment = 33 3.5 Organizational Opposition = 33 3.6 Operational Opposition and Costs = 34 3.7 Technical Complexity and Rapid Change = 34 3.8 A Moving Target = 35 3.9 The Lack of Network Security Standards = 37 3.10 Legal Inadequacies = 42 3.11 Summary = 43 End Notes = 44 4 Network Security Services = 45 4.1 Introduction = 45 4.2 Security Control Objectives = 46 Policy = 46 Accountability = 47 Assurance = 47 4.3 Continuity of Operations Services = 47 Network Security Mechanisms-Continuity of Operations = 48 4.4 Integrity Services = 48 4.5 Authentication Services = 49 Identification and Authentication = 50 Distributed Identification and Authentication Services = 50 Cascading Authentication = 51 Goals = 52 Trusted Path Propagation = 54 Privilege Passing = 54 Network Security Mechanisms-Authentication = 54 4.6 Access Control Services = 55 Mandatory Access Controls = 56 Distributed MAC = 56 Discretionary Access Controls = 56 Distributed DAC = 57 Access Control Lists = 57 ACL Issues = 57 Information / Data Labels = 59 Capabilities / Functions-Based Access Control = 60 Logical Networking Controls = 61 4.7 Confidentiality Services = 61 Network Security Mechanisms-Confidentiality = 61 4.8 Nonrepudiation Services = 70 Network Security Mechanisms-Nonrepudiation = 71 4.9 Assurance = 71 4.10 Summary = 72 End Notes = 72 5 Network Security Disciplines = 75 5.1 Introduction-Security Engineering Disciplines = 75 5.2 Physical Security = 75 5.3 Personnel Security = 76 5.4 Informatin Security = 77 5.5 TEMPEST = 78 5.6 Network and Computer Security = 79 5.7 Communictions Security = 80 5.8 Industrial Security = 80 5.9 Operations Security = 81 5.10 Life-Cycle Security Engineering = 81 5.11 Summary = 82 6 Network Security Approaches and Mechanisms = 83 6.1 Introduction = 83 6.2 The ISO / OSI Reference Model = 83 Physical Layer-Layer 1 = 84 Data Link Layer-Layer 2 = 85 Network Layer-Layer 3 = 86 Transport Layer-Layer 4 = 86 Session Layer-Layer 5 = 87 Presentation Layer-Layer 6 = 88 Application Layer-Layer 7 = 88 6.3 Network Security Services Revisited = 88 6.4 Network Security Mechanisms = 89 Specific Security Mechanisms = 90 Pervasive Security Mechanisms = 91 6.5 Layering and Placement of Network Security Services and Mechanisms = 92 Physical Layer = 93 Data Link Layer = 94 Network Layer = 95 Transport Layer = 95 Session Layer = 96 Presentation Layer = 96 Application Layer = 97 6.6 An Example of a Network Security Implementation = 98 6.7 Summary = 101 End Notes = 101 7 Personal Computer Networking-Security Issues and Approaches = 103 7.1 Introduction-The PC Networking Revolution = 103 7.2 Paractical Guidance for PC Networking = 106 7.3 PC Physical Security Concerns = 106 7.4 Identification and Authentication-Network Operating Systems = 107 Passwords = 108 Mandatory Access Controls = 111 Discretionary Access Controls = 111 Novell NetWare File and Directory Security = 112 Banyan VINES File and Directory Security = 113 Simultaneous Log-ons = 114 Encryption = 115 7.5 Application Protection in a PC Networking Environment = 116 Security for Network Applications = 117 7.6 Summary = 119 End Notes = 119 8 Controlling Viruses and Trojan Horses = 121 8.1 Introduction = 121 8.2 Viruses = 122 Virus Advancement = 123 Virus Protection = 125 Software Acquistion = 126 Secure Systems = 126 Network Performance Alarms = 126 Preventative Program Utility = 127 Gateways and Filters = 127 Detective Software = 127 Computer Emergency Response Teams = 128 NOS Virus Protection = 128 Practical Virus Advice = 129 Practical Virus Prevention = 129 Specific and Practical Actions = 131 Ongoing Activites = 132 Government = 132 Commercial = 132 Summary-The Virus Threat = 133 8.3 Trojan Horses = 133 Introduction = 133 Types of Trojan Horses = 134 8.4 Techniques for Introducing a Trojan Horse into Systems = 136 Introducing a Trojan Horse in Hardware = 136 Introducing a Trojan Horse in Software = 137 Introducing a Viritic Trojan Horse = 138 Introducing a Trojan Horse through the Use of a Trap Door = 139 8.5 Exploitation = 139 System Vulnerabilities Exploited by Trojan Horses = 140 Absence of Security Policy = 140 Inadequate Security Policy or Countermeasures = 141 Lack of Support for Security Features = 141 Discretionary Access Controls = 142 Mandatory Access Controls = 142 Programming Environment = 143 The Insider Threat = 144 8.6 Examples of Trojan Horses = 145 Case 1-Space Physics Analysis Network = 146 Case 2-A Money Order Trojan Horse = 147 Case 3-A Trojan Horse in a Pharmaceutical Company = 148 8.7 Identification of Trojan Horses = 149 Observation = 149 Automated Comparison Assessment = 150 Audit Control = 152 Centralized Control = 152 8.8 Prevention = 153 Mandatory Access Controls = 153 Integrity Controls = 155 Discretionary Access Controls = 155 Management of Software Development = 156 Logic Flow Diagrams = 156 Documentation = 157 Techniques to Eliminate Trojan Horses in User Code = 158 Restricted User Sofware Development or Isolation = 158 Manual Review of Logic / Source = 158 Behavioral Observation = 159 Risk Management Scheme = 159 8.9 Maintaining "Trojan Horse-Free"Code = 160 Training = 160 Encryption = 160 Read-Only Memory = 161 Configuration Management and Control = 161 8.10 Summary = 162 End Notes = 163 9 Covert Channels = 165 9.1 The Covert Channel Threat = 165 Causes for Covert Channels = 166 9.2 General Concepts = 166 Storage and Timing Channels = 167 Definition of Covert Channels = 169 9.3 Covert Channel Taxonomy = 169 Defined Covert Channels = 169 Undefined Covert Channels = 170 9.4 Exploitation of Covert Channels = 170 Identification of a Covert Channel Candidate = 170 Channel Exploitation after Identification = 171 Channel Access = 172 Channel Modulation = 173 Covert Protocols = 173 Information Reception = 174 Information Usage and Benefit = 174 9.5 System Vulnerabilities Exploited by Covert Channels = 174 Covert Storage Channels-Examples = 175 Covert Timing Channels = 177 9.6 Covert Channel Analysis and Measurement Techniques = 177 The Access Control Method = 178 Informal Methodologies = 178 The Information Flow Method = 178 The Shared resource Matrix Method = 179 Formal Methodologies = 180 Formal Verification = 180 9.7 Practice and Examples = 180 NCSC Certified Systems = 181 NCSC Practices = 181 9.8 Guidance to Developers and Evaluators = 181 Measurement by Analysis and Engineering Estimate = 182 Measurement by Experiment = 184 Bursty Channels = 185 Considerations in Design = 186 Considerations during Implementation = 187 Identification of Covert Channels = 187 9.9 Countermeasures = 188 9.10 Elimination of Covert Channels = 188 Bandwidth Reduction Techniques = 189 Limited Access = 189 Channel Sterilization = 190 Noise Introduction = 190 Encryption = 191 9.11 Damage Confinement = 191 Monitoring Techniques for Remaining Covert Channels = 191 Configuration Management and Control = 193 9.12 Summary = 194 End Notes = 194 10 Practical Approach to Network Security = 197 10.1 Introduction = 197 10.2 Practical Network Security Objectives = 198 10.3 Senior Management Commitment = 198 10.4 Network Risk Analysis = 200 Benefits = 202 Security Perimeter = 202 System Decomposition = 202 Risk Analysis Team = 205 Sensitivity Assessment = 206 Technically, Logically, and Organizationally = 207 Valuation of Information Assets = 207 Identification of Threats = 209 Threat Environment = 210 Threat Categories = 213 Threats-LAN Communications = 215 Threats-Long-Haul Communications = 215 Threat Logic Tree = 215 Threat Rejection Logic = 216 Determining Vulnerability to Threats = 216 Degree of Risk = 217 Countermeasure Application = 218 Residual Risk = 219 Process Iteration = 219 Certification Process = 221 Network Accreditation = 222 Continuance = 222 10.5 Network Security Policy = 222 Discretionary Access Controls = 224 User ID and Passwords = 225 Host Discretionary Access Controls = 225 Biometric-Discretionary Access Control = 225 Mandatory Access Controls = 226 MAC-Physical Separation = 226 MAC-Segmentation = 227 MAC-Resource Isolation = 227 Marking Policy = 227 Physical Security = 227 Accountability = 228 Assurance = 228 10.6 Security Management Personnel = 229 Network Security Manager = 229 Network Security Officers) = 230 Network Security Administrators = 230 10.7 Network Security-Policies and Procedures = 231 Training and Awareness = 231 Software Development and Introduction = 233 System Backups = 233 Reporting of Security Incidents = 234 10.8 Maximize Inherent Security Capailities in Design = 234 Common Sense = 235 Principle of Least Privilege = 235 Physical Separation = 235 Segmentation = 236 Heterogeneous Inplementations = 236 Filtering Bridges and Routers = 237 Dedicated Network Resources = 237 Selective Service / Access Menus = 238 Security Overhead and Transparency = 238 10.9 Summary = 239 11 Advanced Network Security Strategies = 241 11.1 Introduction = 241 11.2 Integrity-The New Network Security Frontier = 242 11.3 Denial of Service-Dependence on Reliability, Maintainability, and Availability = 242 11.4 Accountability = 243 11.5 Netwprl Security Integration = 244 11.6 Network Security Standards = 244 11.7 Security Overhead and Transparency = 246 11.8 High-Performance Systems = 246 11.9 Public Disclosure of Security-Relevant Information = 246 11.10 Intrusion Detection Systems(IDS) = 247 11.11 Security Mechanism Communality = 248 11.12 Uniform Use of Encryption Mechanisms = 248 11.13 Uniform Labeling = 249 11.14 Covert Channels = 249 11.15 Upward Compatibility of Security Services = 250 11.16 Composability of Security Properties = 250 11.17 Capability-Based Protection = 250 11.18 Modeling Distributed Systems = 251 11.19 Summary = 251 12 Network Security Standards = 253 12.1 Introduction = 253 12.2 SNMP V2.0 = 253 12.3 IEEE 802.10 = 255 802.10 Parts = 255 Secure Data Exchange(SDE) = 256 Layer 2 Security Services versus those of OSI = 258 Key Management = 258 12.4 Summary = 259 End Notes = 259 APPENDIX : Representative Network Security Programs = 261 Bibliography = 303 Index = 309
