Implementing Internet security:
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Indianapolis, Ind.
New Riders Publ.
1995
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XV, 378 S. |
ISBN: | 1562054716 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV011041396 | ||
003 | DE-604 | ||
005 | 19970513 | ||
007 | t | ||
008 | 961106s1995 xxu |||| 00||| engod | ||
020 | |a 1562054716 |9 1-56205-471-6 | ||
035 | |a (OCoLC)32828769 | ||
035 | |a (DE-599)BVBBV011041396 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-91G |a DE-521 | ||
050 | 0 | |a TK5105.59.I44 1995 | |
082 | 0 | |a 005.8 20 | |
082 | 0 | |a 005.8 |2 20 | |
084 | |a ST 201 |0 (DE-625)143612: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 040f |2 stub | ||
084 | |a ELT 623f |2 stub | ||
245 | 1 | 0 | |a Implementing Internet security |c Frederic J. Cooper ... |
264 | 1 | |a Indianapolis, Ind. |b New Riders Publ. |c 1995 | |
300 | |a XV, 378 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 7 | |a Beveiliging |2 gtt | |
650 | 4 | |a Internet - Sécurité - Mesures | |
650 | 7 | |a Internet |2 gtt | |
650 | 4 | |a Réseaux d'ordinateurs - Sécurité - Mesures | |
650 | 4 | |a Computer networks -- Security measures | |
650 | 4 | |a Internet | |
700 | 1 | |a Cooper, Frederic J. |e Sonstige |4 oth | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007393047&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-007393047 |
Datensatz im Suchindex
_version_ | 1804125530491977728 |
---|---|
adam_text | IMPLEMENTING INTERNET SECURITY FREDERIC J. COOPER CHRIS GOGGANS JOHN K.
HALVEY , LARRY HUGHES / * LISA MORGAN KARANJIT SIYAN WILLIAM STALLINGS
PETER STEPHENSON 8UB QATTLNGEN 7 204437989 NEW RIDERS PUBLISHING LULKALA
INDIANAPOLIS, INDIANA NEW RIDERS PUBLISHING IMPLEMENTING INTERNET
SECURITY TABLE OF CONTENTS 1 DEFINITION OF SECURITY 1 THE TIMES, AND
SECURITY REQUIREMENTS, CHANGE 2 WHAT IS SECURITY, ANYWAY? 3 IMPLEMENTING
SECURITY 7 LAYERING SECURITY 8 SOME APPROACHES 9 2 APPLICABLE STANDARDS
AND PRINCIPLES 13 DEPARTMENT OF DEFENSE C2 PRINCIPLES 14 SECURITY POLICY
15 ACCOUNTABILITY 18 ASSURANCE 19 DESIGN DOCUMENTATION 22 PUTTING C2 IN
CONTEXT WITH YOUR REQUIREMENTS 22 USING THE RED BOOK TO INTERPRET C2 FOR
NETWORKS 24 SECURITY POLICY 24 ACCOUNTABILITY 26 ASSURANCE 27
DOCUMENTATION 29 THE GENERALLY ACCEPTED SYSTEM SECURITY PRINCIPLES
(GSSP) 30 THE ROLE OF STANDARDS 35 3 AUTHENTICATION AND AUTHORIZATION 37
ACCESS CONTROL 38 THE AUTHENTICATION DILEMMA 40 MONITORING AND CONTROL
46 ACCESS CONTROL SUBSYSTEMS AND SECURE SINGLE SIGN-ON 49 VLLL TABLE OF
CONTENTS 4 LOCAL WORKSTATION AND NETWORKING HOLES 55 PREVENTION 56
PROTECT THE ROOT ACCOUNT 56 SECURE TERMINALS 56 USER ACCOUNT AND
PASSWORD MANAGEMENT 58 LIMIT ACCOUNT LIFETIME 58 CHOOSE SECURE PASSWORDS
58 CRACK YOUR OWN PASSWORDS 59 IMPLEMENT SHADOW PASSWORDS 59 IMPLEMENT
PASSWORD AGING 60 SERVER FILTERS 60 TCP WRAPPER 61 XINETD 63 NETWORK
APPLICATIONS AND SERVICES 64 TRUSTED HOSTS 64 SENDMAIL 65 FINGER 68 TAPE
BACKUP AND RESTORE 69 FILE TRANSFER PROTOCOL (FTP) 70 TFTPD 72
THEXWINDOW SYSTEM 72 NFS 74 DETECTION 75 OBSERVE SYSTEM FILES 75 MONITOR
USER LOGIN HABITS 76 DETECTION TOOLS 76 CURE *. 77 CHANGE THE ACCOUNT
SHELL 78 DISABLE LOCAL FTP ACCESS 79 CHANGE THE ACCOUNT PASSWORD 79
EXPIRE THE ACCOUNT 79 DISABLE OR RESTRICT TRUSTED HOST ACCESS 79 CHANGE
FILE OWNERSHIPS AND PROTECTIONS .....80 REMOVE FILES OWNED BY THE
ACCOUNT 80 IX IMPLEMENTING INTERNET SECURITY 5 FIREWALLS 81 FIREWALL
COMPONENTS 82 SCREENING ROUTERS 83 IDENTIFYING ZONES OF RISK 83
SCREENING ROUTERS AND FIREWALLS IN RELATION TO THE OS1MODEL 85 PACKET
FILTERING 86 PACKET FILTERING AND NETWORK POLICY 86 A SIMPLE MODEL FOR
PACKET FILTERING 87 PACKET FILTER OPERATIONS 88 DESIGNING A PACKET
FILTER 90 PACKET FILTER RULES AND FULL ASSOCIATIONS 95 DUAL-HOMED HOST
97 COMPROMISING THE SECURITY OF A DUAL-HOMED FIREWALL 100 SERVICES ON A
DUAL-HOMED FIREWALL 101 BASTION HOST 101 SIMPLEST DEPLOYMENT OF A
BASTION HOST 102 SCREENED HOST GATEWAY 102 APPLICATION LEVEL GATEWAYS
103 6 SECURE TRANSACTIONS: PGP AND KERBEROS 107 PRETTY GOOD PRIVACY 108
PUBLIC KEYS 110 PRIVATE KEYS ILL DIGITAL SIGNATURES ILL COMPRESSION 113
MESSAGE ENCRYPTION 114 RADIX-64CONVERSION 115 THE ORDER OF OPERATIONS IN
PGP 116 PUBLIC KEY MANAGEMENT 117 PGP VERSIONS 118 WHERE TO GET PGP 119
X TABLE OF CONTENTS KERBEROS 119 THE KERBEROS PROTOCOL 120 KERBEROS
REALMS AND MULTIPLE KERBERI 124 VERSION 4 AND VERSION 5 126 PERFORMANCE
ISSUES 126 KERBEROS NOW 127 7 AUDIT TRAILS 129 AUDIT TRAILS UNDER UNIX
130 COMMON UNIX LOGS 130 PROCESS ACCOUNTING 138 USEFUL UTILITIES IN
AUDITING 140 OTHER REPORTING TOOLS AVAILABLE ONLINE 142 AUDIT TRAILS
UNDER WINDOWS NT 144 USING THE EVENT VIEWER 145 LOGGING THE FTP SERVER
SERVICE 147 LOGGING HTTPD TRANSACTIONS 148 LOGGING BY OTHER TCP/IP
APPLICATIONS UNDER NT 148 AUDIT TRAILS UNDER DOS 149 PC/DACS 149
WATCHDOG 150 LOCK 150 USING SYSTEM LOGS TO DISCOVER INTRUDERS 150 COMMON
BREAK-IN INDICATIONS 151 POTENTIAL PROBLEMS 151 8 LEGAL CONSIDERATIONS
155 ELECTRONIC RIGHTS: COPYRIGHTS ONLINE 156 AN OVERVIEW OF COPYRIGHT
LAW 156 THE NATIONAL INFRASTRUCTURE TASK FORCE * PROPOSED CHANGES TO THE
COPYRIGHT ACT 160 COPYRIGHTS ON THE INTERNET 161 XI IMPLEMENTING
INTERNET SECURITY FREEDOM OF EXPRESSION 163 THE FIRST AMENDMENT AND ITS
PROTECTION 163 DEFAMATION 166 PRIVACY 168 FEDERAL AND STATE LAW 170 THE
ELECTRONIC COMMUNICATIONS PRIVACY ACT 170 THE COMPUTER FRAUD AND ABUSE
ACT 172 STATE COMPUTER CRIME LAW 172 TRADEMARK LAW AND THE INTERNET 173
9 INTERNET COMMERCE 189 INTERNET COMMERCE ISN T NEW 190 CREDIT CARDS 191
MODERN INTERNET COMMERCE 192 INTERNET COMMERCE: WHAT S THE BIG DEAL? 193
MANAGEMENT ISSUES 194 THREATS FROM EMPLOYEES AND CRIMINAL HACKERS 194
VANS AND INTERNET COMMERCE 195 HOW REAL IS INTERNET COMMERCE? 195 HOW
DOES INTERNET COMMERCE RELATE TO EXISTING FINANCIAL SYSTEMS? 196 HOW
FINANCIAL SYSTEMS ARE AFFECTED BY ONLINE CAPABILITIES 196 INTERNET
COMMERCE COMPANIES AND ORGANIZATIONS 196 COMMERCENET 197 CYBERCASH, INC.
198 DIGICASH 199 FIRST VIRTUAL HOLDINGS, INC. 200 INTERNET SHOPPING
NETWORK 202 NETSCAPE COMMUNICATIONS CORPORATION 203 OPEN MARKET 203
PROPRIETARY SYSTEMS 205 TABLE OF CONTENTS DIGITAL CASH 206 THE
IMPORTANCE OF DIGITAL CASH ANONYMITY 207 HOW DIGITAL CASH IS GENERATED
207 THE INTERNET: THE FIRST NATION IN CYBERSPACE 208 DIGITAL CHECKS 209
BLIND SIGNATURES*AN ADDED MEASURE OF PRIVACY 209 DIGITAL SIGNATURES 209
SALES, MARKETING, AND IS 210 KEEPING AN EYE ON IMPLEMENTATION 210 THE
ROLE OF THE NETWORK MANAGER 211 10 IMPROVING THE SECURITY OF YOUR SITE
BY BREAKING INTO IT 213 OVERVIEW 215 GAINING INFORMATION 217 TRUST 227
PROTECTING THE SYSTEM 229 CONCLUSIONS 230 APPENDIX A 231 APPENDIX B 231
APPENDIX C 232 APPENDIX D 233 BIBLIOGRAPHY 234 SUGGESTED READING 234 A
RFC INDEX LIST 235 B RFC 1244 - THE SITE SECURITY HANDBOOK 273
CONTRIBUTING AUTHORS 274 1. INTRODUCTION 274 1.1 PURPOSE OF THISWORK 274
1.2 AUDIENCE 275 1.3 DEFINITIONS 275 1.4 RELATED WORK 275 1.5 SCOPE 276
IMPLEMENTING INTERNET SECURITY 1.6 WHY DO WE NEED SECURITY POLICIES AND
PROCEDURES? 276 1.7 BASIC APPROACH 278 1.8 ORGANIZATION OF THIS DOCUMENT
278 2. ESTABLISHING OFFICIAL SITE POLICY ON COMPUTER SECURITY 279 2.1
BRIEF OVERVIEW 279 2.2 RISK ASSESSMENT 281 2.3 POLICY ISSUES 283 2.4
WHAT HAPPENS WHEN THE POLICY IS VIOLATED 289 2.5 LOCKING IN OR OUT 291
2.6INTERPRETING THE POLICY 292 2.7PUBLICIZING THE POLICY 293 3.
ESTABLISHING PROCEDURES TO PREVENT SECURITY PROBLEMS 293 3.1 SECURITY
POLICY DEFINES WHAT NEEDS TO BE PROTECTED 293 3.2 IDENTIFING POSSIBLE
PROBLEMS 294 3.3 CHOOSE CONTROB TO PROTECT ASSETS IN A COST-EFFECTIVE
WAY 295 3.4 USE MULTIPLE STRATEGIES TO PROTECT ASSETS 296 3.5 PHYSICAL
SECURITY 296 3.6 PROCEDURES TO RECOGNIZE UNAUTHORIZED ACTIVITY 297 3.7
DEFINE ACTIONS TO TAKE WHEN UNAUTHORIZED ACTIVITY IS SUSPECTED 299 3.8
COMMUNICATING SECURITY POLICY 299 3.9 RESOURCES TO PREVENT SECURITY
BREACHES 303 4. TYPES OF SECURITY PROCEDURES 321 4.1 SYSTEM SECURITY
AUDITS 321 4.2 ACCOUNT MANAGEMENT PROCEDURES 322 4.3 PASSWORD MANAGEMENT
PROCEDURES 323 4.4 CONFIGURATION MANAGEMENT PROCEDURES 325 XIV 5.
INCIDENT HANDLING 326 5.1 OVERVIEW 326 5.2 EVALUATION 330 5.3 POSSIBLE
TYPES OF NOTIFICATION 332 5.4 RESPONSE 335 5.5 LEGAL!INVESTIGATIVE 338
5.6DOCUMENTATION LOGS 341 6. ESTABLISHING POST-INCIDENT PROCEDURES 342
6.1 OVERVIEW 342 6.2 REMOVING VULNERABILITIES 342 6.3 CAPTURING LESSONS
LEARNED 344 6.4 UPGRADING POLICIES AND PROCEDURES 345 7. REFERENCES 345
8. ANNOTATED BIBLIOGRAPHY 347 8.1 COMPUTER LAW 347 8.2 COMPUTER SECURITY
349 8.3 ETHICS 354 8.4 THE INTERNET WORM 356 8.5 NATIONAL COMPUTER
SECURITY CENTER (NCSC) 358 8.6SECURITY CHECKLISTS 361 8.7 ADDITIONAL
PUBLICATIONS 361 9. ACKNOWLEDGMENTS 363 10. SECURITY CONSIDERATIONS
363 11. AUTHORS ADDRESSES 363 INDEX 365 XV
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV011041396 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59.I44 1995 |
callnumber-search | TK5105.59.I44 1995 |
callnumber-sort | TK 45105.59 I44 41995 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 201 ST 276 |
classification_tum | DAT 460f DAT 040f ELT 623f |
ctrlnum | (OCoLC)32828769 (DE-599)BVBBV011041396 |
dewey-full | 005.820 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 20 005.8 |
dewey-search | 005.8 20 005.8 |
dewey-sort | 15.8 220 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Elektrotechnik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01511nam a2200445 c 4500</leader><controlfield tag="001">BV011041396</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">19970513 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">961106s1995 xxu |||| 00||| engod</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1562054716</subfield><subfield code="9">1-56205-471-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)32828769</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV011041396</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-521</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59.I44 1995</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8 20</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">20</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 201</subfield><subfield code="0">(DE-625)143612:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 040f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ELT 623f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Implementing Internet security</subfield><subfield code="c">Frederic J. Cooper ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">New Riders Publ.</subfield><subfield code="c">1995</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 378 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Beveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet - Sécurité - Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs - Sécurité - Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks -- Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cooper, Frederic J.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007393047&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-007393047</subfield></datafield></record></collection> |
id | DE-604.BV011041396 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T18:03:01Z |
institution | BVB |
isbn | 1562054716 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-007393047 |
oclc_num | 32828769 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-521 |
owner_facet | DE-91G DE-BY-TUM DE-521 |
physical | XV, 378 S. |
publishDate | 1995 |
publishDateSearch | 1995 |
publishDateSort | 1995 |
publisher | New Riders Publ. |
record_format | marc |
spelling | Implementing Internet security Frederic J. Cooper ... Indianapolis, Ind. New Riders Publ. 1995 XV, 378 S. txt rdacontent n rdamedia nc rdacarrier Beveiliging gtt Internet - Sécurité - Mesures Internet gtt Réseaux d'ordinateurs - Sécurité - Mesures Computer networks -- Security measures Internet Cooper, Frederic J. Sonstige oth GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007393047&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Implementing Internet security Beveiliging gtt Internet - Sécurité - Mesures Internet gtt Réseaux d'ordinateurs - Sécurité - Mesures Computer networks -- Security measures Internet |
title | Implementing Internet security |
title_auth | Implementing Internet security |
title_exact_search | Implementing Internet security |
title_full | Implementing Internet security Frederic J. Cooper ... |
title_fullStr | Implementing Internet security Frederic J. Cooper ... |
title_full_unstemmed | Implementing Internet security Frederic J. Cooper ... |
title_short | Implementing Internet security |
title_sort | implementing internet security |
topic | Beveiliging gtt Internet - Sécurité - Mesures Internet gtt Réseaux d'ordinateurs - Sécurité - Mesures Computer networks -- Security measures Internet |
topic_facet | Beveiliging Internet - Sécurité - Mesures Internet Réseaux d'ordinateurs - Sécurité - Mesures Computer networks -- Security measures |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007393047&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT cooperfredericj implementinginternetsecurity |