Index
A
- Access cards
- dumb, 684
- PCMCIA, 452, 461, 580
- problems with, 46
- smart, 11, 106, 168, 684
- Access control list (ACL), 614616, 706
- Access controls
- administration of, 1217, 9293, 175, 319, 371
- architecture of, 367, 609610
- biometric. See Biometric access controls
- cards. See Access cards
- changes in, 670672
- channel control, 457458
- confidentiality and, 1922, 101, 158, 170, 251
- for data bases, 621630
- desktop computing and, 162163
- discretionary (DACs), 6973, 77, 8487, 622623, 626627
- hardware and, 450, 672
- implementation of, 8398
- integrity and, 2429
- Kerberos and, 102
- keys. See Keys
- legislation and, 535538, 541543
- levels of, 663665
- list-based, 9697
- logical, 253255, 577
- malicious software and, 442444
- mandatory (MACs), 7374, 77, 79, 8487, 622623, 627628
- matrix, 9495
- models of, 2122, 8790, 626
- on networks, 156157, 168169
- for object-oriented data bases, 621623, 625628
- overview of, 12
- passwords. See Passwords
- point of control for, 370
- portable computers and, 459461, 702, 705708
- privileged-entity, 665670
- problem management in, 672674
- role-based (RBAC), 7779, 605619
- rules-based, 371372
- at the server, 614616
- software for, 10, 30, 376
- testing of, 686687
- users view of, 610611, 623624, 663
- Accountability, 482489, 607609, 660661
- Accuracy of identification systems, 3940, 4853
- Ace Server, 376
- ACF2, 319
- ACL (access control list), 614616, 706
- Air traffic control systems, 31
- AIS (automated information systems), 491492
- American National Standards Institute (ANSI), 66, 639
- Annualized loss expectancy (ALE), 229, 234, 261262
- Annualized rate of occurrence (ARO), 229
- Antivirus software, 10, 443444
- Appletalk, 452
- Application-gateway firewalls, 215217
- Appropriate use policy, 189190
- ARES, 263
- ARO (annualized rate of occurrence), 229
- Asset values
- of intangible information, 246, 250252, 660
- of networks, 159
- in risk management, 240, 244, 246247, 250255
- tangible, 250
- Assured pipelines, 139140
- Asymmetric systems, 375, 650654
- Asynchronous attacks, 527529
- ATMs (automated teller machines), 514, 684
- AT&T 3600 Telephone Security Device, 641, 644
- Attacks, types of, 405408, 527529. See also Malicious software
- Audit trails
- access control and, 608
- integrity and, 24, 28
- Internet use and, 190, 199202
- networks and, 156, 169170
- overview of, 12
- in prosecution, 558, 562, 580
- Audits, 123130, 352, 576
- Authentication of users. See also Access controls
- accuracy of, 3940, 4853
- biometric. See Biometric access controls
- costs of, 685686
- definition of, 375
- Kerberos and, 99117
- labor unions and, 41, 45
- masquerading and, 514
- in networks, 167168
- Personal Identification Number (PIN), 3637, 4754, 376
- portable computers and, 705707
- products for, 376
- servers and, 103105, 194196, 369, 372
- strong, 370
- Authentication Server (AS), 103105
- Authorization. See Access controls; Authentication of users
- Automated information systems (AIS), 491492
- Automated teller machines (ATMs), 514, 684
- Automaton theory, 25
- Availability of computer systems, 2931, 102, 158, 251253, 504. See also Denial of service
B
- Background investigations, 16. See also Personnel
- Backup of files
- for desktop data, 430439
- forensics and, 578
- need for, 7, 171, 428, 480
- remote, 438439
- storage of, 436438
- timing of, 435436
- types of, 433435
- Badge systems. See Access controls; Authentication of users
- Banking, 491492, 524525, 536, 618
- Banyan Vines, 156
- Base relations, 6871
- Bayesian Decision Support System (BDSS), 263
- BBBOnline, 191
- Bell-LaPadula integrity model, 21, 24, 2627, 88
- Best Demonstrated Practices, 381
- BIA. See Business impact analysis
- Biba integrity model, 24, 2628, 8889
- Binding, 404
- Biometric access controls
- background of, 3639
- benefits of, 46
- characteristics of, 3943
- data collection for, 4143, 4647
- historical problems with, 4346
- need for, 8, 3536
- in networks, 168
- portable computers and, 706
- types of, 4754, 685686
- Body odor, 38
- Boebert and Kain integrity implementation, 2728
- Boot sector viruses, 444445
- Branscomb, Anne W., 539
- Brewer-Nash integrity model, 26
- Browsing, 192195, 406
- The Buddy System Risk Assessment and Management System for Microcomputers, 263
- Buffer storage, 413
- Burdeau v. McDowell, 567
- Bus networks, 153
- Business continuity, 269281
- business impact analysis process and, 285287
- departmental planning for, 271274
- desktop computing and, 459
- disaster recovery planning and, 1415, 171, 255, 260, 269271, 294
- the distributed environment and, 275279
- risk assessment and, 269270
- testing of, 271, 279280
- Business impact analysis (BIA), 285301. See also Business continuity; Risk management
- business values and, 503506
- data classification and, 311313, 317
- integrity failures and, 501503
- interviews for, 287289, 291296, 301
- overview of, 285287, 299301
- physical security requirements and, 680681
- presentation of, 297299
- questionnaires for, 287292
- risk management and, 244245, 483484, 489
- Business recovery planning. See Business continuity; Business impact analysis
C
- Cables for networks, 151152
- Cache storage, 413
- California, computer legislation in, 545546, 573
- Call-forwarding, 11
- Callback systems, 11, 168, 461
- Capabilities architecture, 28
- Capstone, 654. See also Clipper chips
- Carbon Copy, 152
- CD-ROMs (compact-disk read-only memory), 411
- CER (crossover error rate), 40
- CERT (Computer Emergency Response Team), 202204, 207, 348, 353
- CERTs (computer emergency response teams), 129130, 561, 570
- Chain of Evidence, 558559
- Challenge-response tokens, 683684
- Change control analysts, 319
- Checksums, 5, 29, 101, 129, 169
- Chlorofluorocarbons, 89
- CIAC (Computer Incident Advisory Capability), 202203
- Ciphertext, 11, 635. See also Encryption
- Circuit-gateway firewalls, 217218
- Clark-Wilson integrity model, 2528, 8990
- Cleartext, 635
- Clipper chips, 57, 61, 635, 640645. See also Encryption
- Clipping levels, 662663
- Closed-circuit television monitors, 9
- CM (Configuration Management) Plan, 475, 477478, 486, 492494
- Code bombs (logic bombs), 440, 442, 527, 579
- Code of Fair Information Practices, 597
- Commerce Server, 193194, 197
- Common Authentication Technology Working Group, 106
- Common Criteria, 390392
- Compact-disk read-only memory (CD-ROM), 411
- Computer, definition of, 543
- Computer abuse, 511533, 537, 543544. See also Hackers; Malicious software; Trojan horses; Viruses; Worms
- Computer crime, 535547, 551584. See also Computer abuse
- civil law and, 554555
- criminal law and, 552554
- definition of, 551552
- disclosure and, 563564
- evidence of, 555561, 572573
- federal laws on, 535538, 542, 547
- forensics and, 574581
- information abuse, 543544
- investigation of, 561581
- legal proceedings and, 581583
- recovery of damages for, 582583
- state laws on, 538547
- Computer Emergency Response Team (CERT), 202204, 207, 348, 353
- Computer emergency response teams (CERTs), 129130, 561, 570
- Computer ethics, 587600
- Computer Ethics Institute, 595, 598599
- Computer Fraud and Abuse Act of 1986, 535538, 547, 554
- Computer games, ethics and, 589591
- Computer Incident Advisory Capability (CIAC), 202203
- Computer security. See also Access controls; Firewalls; Information security; Risk management; Safeguards
- architectural elements of, 408417
- business impact analysis and, 680681
- Computer Systems Security Plans (CSSP), 177178
- for data bases, 621629
- default measures, 362363
- in distributed systems, 468482, 486489
- enterprise-scale, 361376
- Information Protection Services (IPS), 343360
- overview of, 5, 403405
- theft and, 428430, 438, 531, 540, 675, 682
- Confidentiality, 1922, 101, 158, 170, 251
- Configuration Control Authority, 475, 477
- Connectivity, 479480, 482, 488
- Constrained data items, 89
- Construction companies, 617
- Consultants, external, 344, 352, 358, 360
- Contact persons, security, 388389
- Contingency and emergency plans, 1415, 30, 171, 255, 294, 480. See also Computer emergency response teams
- Control Matrix Methodology for Microcomputers, 263
- Cookies, 203204
- Cooperative systems, 470471, 473474, 476, 480489
- COPS, 130
- Corley, Eric, 590
- Corrective controls, 56
- COSSAC, 263
- Costs
- of biometric identification, 685686
- Kerberos and, 113114
- replacement, 251
- risk mitigation and, 235236
- Counterfeiting, 42, 4952, 516517
- Court orders, 646647
- Covert channels, 405
- Crack, 126
- CRAMM, 263
- Crawler programs, 204
- CREATE statements, 66, 70
- Credit card fraud, 513, 536
- Credit reports, 536, 538
- Crimes. See Computer crime
- CRITI-CALC, 263
- Crossover error rate (CER), 40
- Cryptography. See also Encryption
- definition of, 375
- digital signature systems, 486, 650654
- locks and, 683
- overview of, 631, 635637
- public-key cryptosystems, 375, 650654
- single-key cryptosystems, 637645
- CSSP (Computer Systems Security Plans), 177178
- Cycle testing, 279280
D
- DACL (distributed access control list), 615
- DACs (discretionary access controls), 6973, 77, 8487, 622623, 626 627
- Daemon dialers, 125, 513
- Data base administrator (DBA), 72
- Data base management systems (DBMSs), 6566, 71, 7476, 94, 621629
- Data bases
- access controls for, 621629
- attributes of, 6365
- denial of service in, 622
- multilevel, 7477
- object-oriented (OO), 621623, 625629
- relational, 6379, 622625
- search engines for, 184
- security for, 621629
- tuples of, 6368, 7374
- Data classification, 307323
- access control and, 627628
- analysts and, 319320
- corporate policy on, 310312
- downgrading, 86, 88
- federal law and, 535536
- the Internet and, 188189
- labeling, 8687
- minimum controls on, 314316
- networks and, 478479
- overview of, 307308, 323
- process of, 308309, 313323
- Data disclosure, 528530, 701708
- Data encryption standard (DES)
- Kerberos and, 102, 111, 115116
- overview of, 6062, 372, 638639, 642
- portable computers and, 707
- Data entry, false, 516518
- Data modification, 22, 23, 161, 622, 702, 705
- Data objects, 415416
- Data ransoming, 450
- Data recovery, 578
- Data theft, 708709
- Data transfer, 479481, 488
- DBA (data base administrator), 72
- DB2 data base, 7172
- DBMS (data base management system), 6566, 71, 7476, 94, 621629
- DCE (Distributed Computing Environment), 116
- DDT (domain definition table), 136137
- Debugging, computer abuse and, 526
- Decentralized systems, 470472, 476
- DECnet, 112
- Decryption, 636, 646647. See also Cryptography; Encryption
- Default security measures, 362363
- Delphi approach, 246, 252
- Demon programs, 125, 513
- Denial of service, 30, 134, 209, 622. See also Availability of computer systems
- Department of Defense (DoD), 86, 135, 139140, 328, 330, 405
- Department of Defense Trusted Computer System Evaluation Criteria (Orange Book), 22, 392393
- DES. See Data encryption standard
- Desktop computing
- access controls and, 162163
- architecture of, 424425
- backup of files in, 430439
- local area networks and, 421423
- personal computers (PCs), 162164, 421462
- security for, 425427
- vulnerability of, 421425
- Detective controls, 5, 9, 12, 1517
- Deterrent controls, 56
- Diabetes, 45
- Dial-back, 11, 168, 461
- Dial-up access, 11, 125, 152153, 164165, 702
- Dictionary attacks, 407408
- Diffle-Hellman key exchange, 641, 644
- Diffles key solution, 60
- Digital envelopes, 479
- Digital Signature Standard (DSS), 652
- Digital signatures, 486, 650654
- Disaster recovery, contingency, and emergency plans, 1415, 30, 171, 255, 294, 480. See also Computer emergency response teams
- Disaster Recovery Plan (DRP), 260, 269281. See also Business continuity; Business impact analysis
- Discovery crawler programs, 204
- Discretionary access controls (DACs), 6973, 77, 8487, 622623, 626 627
- Disk drives, 162163
- Disk failure, 170
- Diskettes, 422423, 431432, 463, 523, 560
- Dispersed systems, 470471, 473, 476, 480
- Distributed access control list (DACL), 615
- Distributed Computing Environment (DCE), 116
- Distributed Management Environment (DME), 116
- Distributed systems
- business continuity in, 269281
- computer security in, 468482, 486489
- Configuration Management (CM) Plan, 475, 477478, 486, 492494
- engineering integrity, 489503
- integrity in, 475482
- Kerberos in, 99117
- processing and security in, 468482, 486489
- risk accountability in, 482489
- types of, 469474
- DIT (domain interaction table), 137
- DME (Distributed Management Environment), 116
- DNS (domain name service), 110, 208
- Documentation, 173, 430
- DoD (Department of Defense), 86, 135, 139140, 328, 330, 405
- Doe v. United States, 581
- Domain definition table (DDT), 136137
- Domain interaction table (DIT), 137
- Domain name service (DNS), 110, 208
- Domains in computer systems, 408410, 488
- Double door systems, 7
- Downloaded files, 20
- Downsizing, information protection and, 343345, 350
- Downtime, 158, 285, 295. See also Business impact analysis (BIA)
- DRP (Disaster Recovery Plan), 260, 269281
- DSS (Digital Signature Standard), 652
- Due care concept, 484485, 555
- Dumb cards, 684
E
- Ear shape, 38
- Earthquake damage, 681682
- Eavesdropping, 101, 406, 511513
- Economic espionage, 333336, 347. See also Information warfare
- ECPA (Electronic Communications Privacy Act) of 1986, 512, 538, 554, 557, 574
- Education. See Training
- Educational organizations, 617
- Eight little green men (8lgm), 348
- Electrical power failures, 8, 162, 171172, 273, 275, 682
- Electron vaulting, 30
- Electronic Communications Privacy Act (ECPA) of 1986, 512, 538, 554, 557, 574
- Electronic shielding, 512
- Electronic warfare, 329. See also Information warfare
- E-mail, 155, 165
- Emergency shutdown procedures, 275276
- Employment procedures. See Personnel
- Encryption. See also Cryptography
- computer theft and, 430, 450
- data classification and, 188189, 314315
- data encryption standard (DES). See Data encryption standard
- decryption, 636, 646647
- digital signature systems, 486, 650654
- end-to-end, 170
- escrowed, 640647, 649650, 654
- fair public-key, 649650
- hackers and, 408
- information warfare and, 332
- the Internet and, 209210
- networks and, 29, 156, 170
- overview of, 11, 5758
- personal computers and, 450452
- portable computers and, 707708
- secret messages and, 5758
- session keys for, 637640, 644649
- End Users Basic Tenets of Responsible Computing, 596
- Enforcement of security, 90, 136143, 389, 404405
- Enterprise security, 361376
- Entrust, 452
- Environmental failures, 250, 681682. See also Power failures
- Equal error rate, 40
- Escrowed encryption, 61, 640647, 649650, 654
- Escrowed Encryption Standard, 61
- Espionage Act, 512
- Ethernet, 154, 168
- Exception logs, 169170
- Exclusionary Rule, 557
- Exposure factor (EF), 229
- External sources (consultants), 279, 344, 352, 358, 360
F
- Facial recognition, 38, 5556, 686
- Facial thermography, 38
- Fair Credit Reporting Act of 1970, 59
- Fault tolerance, 30, 277278
- Federal Bureau of Investigation (FBI), 352353
- Federal Communications Act of 1934, 5960
- Federal-interest computers, 536
- Federal laws on computer crime, 535538, 542, 547
- Federal Rules of Evidence, 558
- Federal Sentencing Guidelines, 564
- Fences, 7
- Fiber optic cables, 151152
- File allocation table (FAT), viruses and, 441
- File copying, 430431
- File security on networks, 157
- File transfer protocol (FTP), 111, 193, 216
- Financial institutions, 491492, 524525, 536, 618
- Fingerprint systems, 3738, 42, 4748, 55, 685
- Finite-state machines, 409
- Fire and smoke detectors, 9
- Fire damage, 161162, 171, 250, 275, 437, 681
- Fire suppression systems, 89, 276
- Firewalls
- gateway-based, 210211, 215218
- hybrid, 218
- Internet and, 141146, 191, 196198, 200, 207222
- Kerberos and, 109110
- packet filtering, 213215, 219, 221
- portable computers and, 706
- screened subnets, 212213
- security for, 133
- Sidewinder, 141146
- types of, 210219
- use of, 219220, 372373
- First Amendment rights, 591
- Fisher v. United States, 581
- Florida, computer legislation in, 546
- Flow models, 21
- FOIA (Freedom of Information Act), 566
- Foreign keys, 6466, 70
- Forensics of computer crime, 574581
- Forgery, 516517
- Four Primary Values for Computing, 596
- Fourth Amendment rights, 557, 566, 570
- Fragmented data architecture, 7677
- Fraud, federal law and, 513514, 535538, 547, 554
- Freedom of Information Act (FOIA), 566
- FTP (file transfer protocol), 111, 193, 216
G
- Generic security services applications programming interface (GSSAPI), 106, 109, 112, 372, 615
- Globalization of technology, 346347
- Goguen-Meseguer integrity model, 25, 27
- Gong integrity implementation, 29
- Gopher, 184
- GRANT statement, 7072, 624, 626
- Granularity of labeling, 7374, 85
- GRA/SYS, 263
- Grouping mechanisms, 9293
- Group name service, 368369, 371
- GSSAPI (generic security services applications programming interface), 106, 109, 112, 372, 615
H
- Hackers. See also Computer abuse
- computer ethics and, 590594
- confidentiality and, 20
- dial-in access and, 164
- information warfare and, 328329, 339340
- legislation against, 537547. See also Computer crime
- networks and, 454457
- profiles of, 124, 190, 463, 513521, 525, 527532
- Sidewinder and, 141146
- techniques of, 124130, 348, 405408
- temporary staff as, 344
- war dialing by, 460, 579
- Halon systems, 89
- Hand geometry systems, 38, 4849, 685686
- Harding, Tonya, 594
- Hardware failure, 170
- Hash functions, 650653
- Health maladies and security systems, 45, 51
- Hearsay Rule, 557558
- Hold-harmless agreements, 692693
- Honey Pots, 574
- Hospitals, 616617
- Hypertext, security policies in, 397398
- HyperText Markup Language (HTML), 202
- Hypertext transfer protocol (HTTP), 193, 195198, 200, 203204, 216
I
- Identification systems. See Authentication of users
- IFIA (integrity failure impact assessments), 501503
- Illinois, computer legislation in, 545
- Impoundment orders, 555
- Inference, 622
- Information abuse, 543544
- Information age warfare, 328330. See also Information warfare
- Information assets, 229230
- Information bucket principle, 134140
- Information classification. See Data classification
- Information custodians, 317318
- Information Management Policy, 311
- Information owners, 317318, 321322
- Information Protection Services (IPS)
- development of technology and, 343348
- organizational model for, 349360
- responses of, 349350
- sources for, 351354
- Virtual Protection Team (VPT) and, 351, 357359
- Information risk management (IRM) policy. See Risk management
- Information security. See also Access controls; Computer security
- Information Protection Services (IPS), 343360
- management, 517, 1931, 483484, 499501
- policy, 310312. See also Data classification
- professionals, 308312, 319320, 327340, 349
- Information technology (IT)
- architecture of, 366367
- business continuity planning and, 272274, 276
- business impact assessment and, 292
- data classification and, 309
- traditional and modern environments of, 364366
- Information Technology Security Evaluation Criteria (ITSEC), 390392
- Information warfare (IW), 327340
- defense against, 338339
- economic espionage, 333336, 347
- hardening, 328
- menu-driven, 332333
- military, 328333
- overview of, 327330
- techno-terrorism and, 329, 336340
- Informix, 79
- Infrared light transmission, 151
- Initial program loads (IPL), 673674
- Initialization vector (IV), 644
- INSERT and DELETE statements, 6667, 70
- Insurance policies, 430, 555
- Integrated data architecture, 7475
- Integrity. See also Systems integrity engineering
- access controls and, 2429
- audit trails and, 24, 28
- business impact analysis and, 501503
- business values and, 503506
- certification rules, 90
- confidentiality and, 2229
- disaster planning and, 274, 277
- in distributed systems, 475482
- engineering for, 489503
- entity, 65
- failure impact assessments (IFIA), 501503
- Kerberos and, 101
- models, 21, 2329, 8890
- for networks, 158, 169
- portable computers and, 702705
- referential, 65, 67
- security of, 134, 485489
- during systems change, 489491, 505506. See also Life cycle analysis
- valuation of, 251252
- Internal Revenue Service (IRS), 593
- International security, 390393
- International Standards Organization (ISO), 66, 153
- Internet
- audit trails and, 190, 199202
- browser security in, 192195
- client authentication in, 193194
- data classification and, 188189
- denial of service and, 209
- disabling servers, 134, 138139, 144146
- encryption in the, 209210
- ethics and, 592, 596
- firewalls in, 141146, 191, 196198, 200, 207222
- growth of, 183185
- hacker tools on, 125130
- Kerberos and, 100, 102, 106, 112
- security policies and, 185190, 195198, 397
- Sidewinder challenge on the, 146147
- Internet Activities Board, 596
- Internet protocol (IP) spoofing, 128, 208
- Internet service providers (ISPs), 208. See also Servers
- Internetworking, 165
- Interoperable systems, 470471, 473474, 476, 480489
- Interstate crimes, 536
- Intranet
- audit trails and, 199202
- growth of, 183, 345, 348
- security for, 185188, 195198, 397
- Intrusion analysis, 662
- Intrusion detection systems, 5, 12
- I/P accounting, 201
- IP (internet protocol) spoofing, 128, 208
- IPL (initial program loads), 673674
- IPS. See Information Protection Services
- Iris recognition systems, 38, 42, 5153, 5556
- IriScan system, 52, 56
- IRM (information risk management) policy. See Risk management
- IRS (Internal Revenue Service), 593
- ISO (information security officer), 308312
- ISO (International Standards Organization), 66, 153
- ISP (internet service provider), 208. See also Servers
- ISS, 130
- IST/RAMP, 263
- IT. See Information technology
- ITSEC (Information Technology Security Evaluation Criteria), 390392
- IV (initialization vector), 644
- IW. See Information warfare
J
- JAD (joint analysis development), 497
- JANBER, 263
- JAVA scripts, 198, 202204
- Joins, 68
- Joint analysis development (JAD), 497
- Jueneman integrity implementation, 29
- Jukebox storage, 431, 463
K
- Kansas, computer legislation in, 541
- Karger integrity implementation, 28
- Kerberos, 99117, 369, 605
- Key distribution center (KDC), 103105, 107, 110112, 114115
- Key exchange, 639, 641, 644
- Keys. See also Locks and keys
- encryption, 116, 375, 452, 637640, 644654
- foreign, 6466, 70
- primary, 6466
- public, 116, 193, 639640, 647651, 653654
- session, 639640, 644649
- single, 637645
- storage protection, 412
- Keystroke dynamics, 38, 47
- Keystroke logging, 126127
- Kinit, 103, 105106
L
- Labor unions, identification procedures and, 41, 45
- LANs. See Local area networks
- Laptop (portable) computers, 459461, 701710
- Larceny, 428430, 438, 531, 540, 675, 682
- Lattice models, 8788
- Lattice principle, 21, 28
- LAVA, 263
- Law enforcement access field (LEAF), 61, 641, 644647
- Least privilege, 136
- Lee and Shockley integrity implementation, 28
- Legal proceedings, 581583, 646647. See also Computer crime
- Legal requirements. See Regulatory requirements
- 8lgm (eight little green men), 348
- Library control systems, 10
- Life cycle analysis, 495501, 559561
- Lightning, 682
- Linux, 425, 489
- Lip shape, 38
- Lipner integrity implementation, 2627
- List-based control, 9697
- Local area networks (LANs)
- access to, 152153, 164165, 167168, 458
- audit trails and, 156, 169170
- channel factor and, 456458
- confidentiality and, 20, 158, 170
- desktop security and, 421423
- disaster planning and, 275279
- fire damage to, 161162, 171, 275
- multiplication factor in, 455456
- overview of, 149158, 416
- risk management in, 150, 158159, 174, 178
- safeguards for, 166173, 452459
- security implementation for, 174178, 195198
- server-based, 452454
- threats to, 158162
- value of, 159
- vulnerabilities in, 161165, 173, 454455
- wireless, 702
- LOCK system, 136, 141
- Locks and keys
- development of, 36
- employee termination and, 14
- location of, 372
- need for, 78, 683
- in networks, 168
- types of, 683
- Logic bombs, 440, 442, 527, 579
- Logical controls, 912, 17
- Log-ons, 124125, 362363, 376
- Logs, 145, 169170, 200. See also Audit trails
- Louisiana, computer legislation in, 546
- LRAM, 263
- Ludwig, Mark, 591
M
- Macintosh, Kerberos and, 108
- Macro viruses, 448450
- MACs (mandatory access controls), 7374, 77, 79, 8487, 622623, 627628
- MACs (message authorization codes), 169, 637638
- Magnetic cards. See Access cards
- Magnetic tapes, 437
- Maine, computer legislation in, 545
- Maintenance requirements, 4445, 172173
- Malicious software. See also Computer abuse; Trojan horses; Viruses; Worms
- defense against, 442444
- ethics and, 591593
- in the future, 533
- in information warfare, 332, 338
- legislation against, 544546. See also Computer crime
- in networks, 161
- in personal computers, 164
- types of, 405408, 439442, 527529
- Management, security and, 362, 366367, 368, 562563. See also Security policies
- Mandatory access controls (MACs), 7374, 77, 79, 8487, 622623, 627628
- MARION, 263
- Masquerading, 20, 514
- Maximum tolerable downtime (MTD), 158, 285, 295. See also Business impact analysis
- Message authorization codes (MACs), 169, 637638
- Michelangelo, 445
- Micro Secure Self Assessment, 263
- Microcomputers. See Personal computers
- Microsoft Windows, Kerberos and, 108
- Microsoft Word viruses, 448450
- Military needs, 31
- Minnesota, computer legislation in, 545
- Mississippi, computer legislation in, 546
- Missouri, computer legislation in, 546
- Mitnik, Kevin, 463
- Modified Delphi approach, 246, 252
- Monkey.B, 445
- Morris Worm, 339, 442
- Motion detectors, 9
- MTD (maximum tolerable downtime), 158, 285, 295
- Multics System, 409
- Mutation Engine, 447448
- MYK78 chip, 644
N
- Naming, 92
- NAPM (New Alliance Partnership Model), 491501
- National Bureau of Standards Data Encryption Standard. See Data Encryption Standard (DES)
- National Computer Ethics and Responsibilities Campaign (NCERC), 598599
- National Computer Security Association (NCSA), 191, 599
- National Computer Security Center (NCSC), 22, 88, 393
- National Conference on Computing and Values, 596
- National Institute of Standards and Technology (NIST), 66, 393, 619, 638
- National Security Agency (NSA), 116, 639
- NC (network computers), 424425, 453454. See also Desktop computing; Local area networks
- NCERC (National Computer Ethics and Responsibilities Campaign), 598599
- NCSA (National Computer Security Association), 191, 599
- NCSC (National Computer Security Center), 22, 88, 393
- Nebraska, computer legislation in, 545
- Need-to-know access, 23, 84
- NetSP, 369, 376
- NetView Access Services, 376
- NetWare, 156, 452
- Network computers (NC), 424425, 453454. See also Desktop computing; Local area networks
- Network File System (NFS), 209
- Network Information Service (NIS), 209
- Network operating systems (NOS), 454
- Network routers, 156, 201, 211, 215
- Network snooping, 208
- Network topology, 108109, 111113, 153
- Networks. See Internet; Local area networks; Wide area networks
- New Alliance Partnership Model (NAPM), 491501
- NextStep, 108
- NFS (Network File System), 209
- NIS (Network Information Service), 209
- NIST (National Institute of Standards and Technology), 66, 393, 619, 638
- Noncompetition clauses, 696
- Nonrepudiation services, 102
- Norton Utilities, 578
- NOS (network operating systems), 454
- Novell NetWare, 156
- Novell servers, 363
- Npasswd, 126
- NSA (National Security Agency), 116, 639
- NSClean, 204
O
- Object code viruses, 447
- Object creation, 86
- Object-oriented data base management system (OODBMS), 621623, 625629
- Ohio, computer legislation in, 546
- Omniguard Enterprise Security Manager, 376
- On-line documents, 394395, 397398. See also Security policies
- On-line storage, 431
- One-time pad, 636637
- OODBMS (object-oriented data base management system), 621623, 625629
- Open Software Foundation Distributed Computed Environment (OSF/DCE), 369, 375, 605606, 614
- Open System Foundation (OSF), 116
- Open Systems Interconnection (OSI) model, 153155
- Operations security, 659674
- Oracle, 7172, 7879, 201
- Orange Book, 22, 392393
- ORION authorization model, 625, 627
- OSF (Open System Foundation), 116
- OSF/DCE (Open Software Foundation Distributed Computed Environment), 369, 375, 605606, 614
- OSI (Open Systems Interconnection) model, 153155
- Outside/In, 579
- Outsourcing, emergency, 279. See also External sources
P
- PAC (Privilege Attribute Certificate), 608, 616
- Packet filtering firewalls, 213215, 219, 221
- Packet sniffing, 127
- Palm scans, 685686
- PANIX, 462
- Parasitic viruses, 445446
- Passwd+, 126
- Passwords. See also Access controls; Authentication of users
- forensics and, 577578
- hackers and, 125128, 406408
- in the Internet, 210
- in networks, 164, 167168, 458
- on personal computers, 451
- on portable computers, 705
- types of, 1011, 706
- for Windows 95 screen-saver, 451
- PC Anywhere, 152
- PCMCIA cards, 452, 461, 580
- PCs (personal computers), 162164, 421462. See also Desktop computing
- PDR (prevention, detection, recovery) strategy, 499502
- People, threats from, 159160. See also Hackers
- People v. Sanchez, 581
- Performance evaluations, 1516
- Personal computers (PCs), 162164, 421462. See also Desktop computing
- Personal Identification Number (PIN), 3637, 4754, 376
- Personal NetWare, 452
- Personnel
- in disaster planning, 279
- hiring practices, 13, 166, 691693
- noncompetition clauses and, 279, 696
- policy, 16, 380, 691692, 697
- for security, 7, 166, 376
- termination of, 1314, 695, 697
- trade secrets and, 354, 693696
- PGP (Pretty Good Privacy), 707
- Physical security, 69, 17, 428430, 679680
- Piggybacking, 515516
- PIN (Personal Identification Number), 3637, 4754, 376
- Ping packets, 209
- Pipelines, assured, 139140
- PKCS (Public Key Cryptography Standards), 116
- PKZIP 3.0, 441
- Plaintext, 635. See also Encryption
- Playback, fraud and, 514
- Point of control, 370
- Police departments, 568
- Policy manuals, 393394. See also Security policies
- Polyinstantiation, 628
- Polymorphic viruses, 447448
- Portable computers, 459461, 701710
- Power failures, 8, 162, 171172, 273, 275, 682
- Predictor, 263
- Pretty Good Privacy (PGP), 707
- Prevention, detection, recovery (PDR) strategy, 499502
- Preventive controls, 57, 1013, 1617
- Preventive maintenance, 170
- Primary keys, 6466
- PRISM, 263
- Privacy, 19, 5860, 639
- Privacy Act of 1974, 58
- Privacy Enhanced Mail, 639
- Privilege Attribute Certificate (PAC), 608, 616
- Privilege Attribute Service, 606607
- Privileged-entity access controls, 665670
- Product line managers, 320321
- Productivity, security and, 5
- Professional behavior policy, 380
- Program development, access control during, 85
- Program status word, 410
- Project Athena, 99100, 114, 117
- Proxy servers, 215
- Public Key Cryptography Standards (PKCS), 116
- Public Key/Private Key architecture, 193
Q
- Quality assurance (QA), 491494
- Query modification, 624
- Questionnaires for security assessment, 174, 177, 287291
- QuikRisk, 263
R
- RACF, 319
- Radio frequency transmission, 151
- Radius, 376
- RAD (rapid application development), 497
- RAID (redundant array of inexpensive disks), 431432, 463
- Rainbow Series, 393
- Random access memory (RAM), 172, 411, 424
- RANK-IT, 263
- Rapid application development (RAD), 497
- RAS, 376
- RA/SYS, 263
- RBAC (role-based access controls), 7779, 605619
- RDBMS (relational data base management system), 622625
- Read-only memory (ROM), 411
- Recovery controls, 56
- Recovery planning, 260, 269281. See also Business continuity; Business impact analysis
- Recruitment procedures. See Personnel
- Red Book, 22
- Red Box, 573
- Redundant array of inexpensive disks (RAID), 431432, 463
- Reference monitors, 94
- REFERENCES statement, 70
- Register storage, 410
- Regulatory requirements
- data classification and, 309
- for data protection, 660
- federal laws, 535538, 542, 547
- security policies and, 379, 381383
- state laws, 538547
- Relational data bases, 6379, 622625
- Repairs of equipment, 163164
- Replicated data architecture, 7778
- Resource owners, 606607
- Resource protection, 659665
- RESOURCE statement, 71
- Retina scans, 38, 4243, 45, 5051, 685
- REVOKE statement, 71, 624, 626
- Revolution in Military Affairs (RMA), 339. See also Information warfare
- Rightsizing, information protection during, 343345, 350
- Rimage Corporation, 439
- @RISK, 263
- Risk analysis and assessment, 227264
- Risk management
- acceptance criteria and, 235
- accountability and, 482489, 607609, 660661
- assessment of risk, 234235, 505
- automated tools for, 263
- business continuity and, 244248, 269270
- department planning in, 271274
- in distributed systems, 481489
- for networks, 150, 158159, 174, 178, 198199
- overview of, 227232
- performance monitoring of, 236237
- policy for, 232235, 368
- portable computers and, 703704
- probability and, 231
- qualitative/quantitative, 230, 234, 239247, 255258
- resistance to, 237239, 245248
- risk mitigation, 235236, 258262, 270
- tasks of, 232237, 248258
- threat analysis, 249250, 253255, 309, 354357
- uncertainty and, 232, 504505
- RISKCALC, 263
- RISKPAC, 263
- RISKWATCH, 263
- RMA (Revolution in Military Affairs), 339
- Robustness of security systems, 44
- Role-based access controls (RBAC), 7779, 605619
- Roles
- defining, 611612
- engineering, 613617
- examples of, 617618
- hierarchies of, 612613
- mapping, 614616
- overview of, 605611
- ROM (read-only memory), 411
- Rosenberg v. Collins, 556
- Rotation of duties, 16, 23
- Routers, 156, 201, 211, 215
- RSA system, 647649, 651652
- RYO, 376
S
- Sabotage of systems, 45
- Safeguards
- analysis and costing of, 258262
- business continuity planning and, 274
- engineering of, 499
- for networks, 166173
- overview of, 231232
- resource protection, 659665
- SafeNet, 438
- Salami techniques, 524525
- SAM (Security Administration Manager), 376
- SATAN, 130, 348
- Scanning, 513
- Scavenging, 518520
- Schwartau, Winn, 329330
- Scoped access control, 665. See also Access controls
- Screened subnets, 212213
- Search warrants, 555, 566567, 574
- Secret-key systems, 637645
- Secure channels, 101
- Secure European System for Applications in a Multivendor Environment (SESAME), 116, 369, 375, 605606, 608, 614615
- Secure hash algorithm (SHA), 650, 652653
- Secure Hypertext Transfer Protocol (S-HTTP), 195198, 200, 203
- Secure Object-Oriented Data Base (SODA) model, 628
- Secure Sockets Layer (SSL) trust model, 193195
- SecurID, 461, 683
- Security architecture, 195198, 363364, 375
- Security assessments, 8384, 92, 173174
- Security associations, 181
- Security awareness, 5, 13, 166, 427. See also Training
- Security clearances, 73
- Security domains, 409410
- Security levels, 175176
- Security personnel, 7, 166, 319, 376, 483484
- Security policies
- for desktop computing, 425427
- examples of, 389393, 426
- implementation of, 174177
- integrity and, 485489
- procedures in, 14
- publication of, 393397
- purposes of, 379381, 398
- types of, 381384
- writing techniques for, 387389
- Security systems. See Kerberos
- SELECT statement, 6768, 7072
- Self-hack audits (SHA), 123130
- Sendmail servers, 144146, 209
- Sensor signal parasites, 332
- Sensors and alarms, 9
- Separation of duties, 13, 23, 25, 28, 167, 607609
- Servers
- Ace, 376
- authentication and, 103105, 194196, 369, 372
- logs of, 200
- Novell, 363
- overview of, 425
- proxy, 215
- security for, 192195, 614616
- Sendmail, 144146, 209
- SESAME (Secure European System for Applications in a Multivendor Environment), 116, 369, 375, 605606, 608, 614615
- Session hijacking, 208
- Set user ID (SUID) files, 129
- Seven-layer communications model, 153155
- SHA (secure hash algorithm), 650, 652653
- SHA (self-hack audits), 123130
- Shifting_Objectives, 447
- Shoulder surfing, 512, 701
- S-HTTP (Secure Hypertext Transfer Protocol), 195198, 200, 203
- Sidewinder, 141147
- Sign-ons, 124125, 362363, 376
- Signature recognition, 38, 47
- Single loss expectancy (SLE), 229, 232, 244
- Site selection, security and, 8
- SKIPJACK, 61, 640, 642645, 654. See also Clipper chips
- Skytale, 57
- SLE (single loss expectancy), 229, 232, 244
- Smart cards, 11, 106, 168, 684
- Smoke detectors, 9
- SNA, Kerberos and, 112
- Snooping, 208
- Social engineering, 209
- SOCKS, 217
- SODA (Secure Object-Oriented Data Base) model, 628
- Software
- access control, 10, 30, 376
- antivirus, 10, 443444
- cleanroom for, 497
- forensic, 585
- life cycle of, 495501
- malicious. See Malicious software
- piracy of, 529531, 538, 592593
- theft of, 708709
- SORION, 627
- South Dakota, computer legislation in, 541
- Spoofing, 128, 208, 406
- Sprinkler systems, 8, 276
- Spying (eavesdropping), 101, 406, 511513
- SQL language, 63, 6573, 619, 624
- SSL (Secure Sockets Layer) trust model, 193195
- SSO DACS, 376
- Star networks, 153
- Star property, 73, 75, 88
- State laws on computer crime, 538547
- State vectors, 410
- States in computer systems, 409
- Stealth viruses, 447448
- Steganography, 578, 581
- Sting operations, 574
- Stoned and Form, 445
- Storage
- of backup files, 436438
- of identification data, 42
- objects, 414415
- protection for, 412
- types of, 410414, 431
- Storm damage, 250
- Stream ciphers (one-time pads), 636637
- Strokes, 45
- SUID (set user ID) files, 129
- Sun JAVA language, 198, 202204
- Superusers, 165
- Supervision, 14
- Superzapping, 517519
- Surge protection, 171172, 682
- Surveillance, 573574
- Suspend programs, 91
- Sutherland integrity model, 25
- Symmetric systems, 637645
- SYN packets, 209
- System administrators, 351
- System logs, 145, 169
- Systems integrity engineering, 467506. See also Integrity
T
- TACACS, 376
- Tailgating, 515516
- Take-Grant model, 89
- Tax returns, 593
- Tcpdump, 127
- TCP/IP, 109110, 112, 116, 193
- TCSEC (Trusted Computer Security Evaluation Criteria), 390392
- Technical controls, 912, 17
- Techno-terrorism, 329, 336340
- Telecommunications Act, 190
- Telecommuting, 459461
- Telephone taps, 574
- Telephones, encryption and, 6162, 641, 644
- Telnet, 138, 193, 216
- Temporary staff, security and, 344
- Ten Commandments of Computer Ethics, 595
- Tequila, 446
- Terminals (network computers), 424425, 453454. See also Desktop computing; Local area networks
- Termination of personnel, 1314, 695, 697
- Texas, computer legislation in, 545
- TFTP (Trivial File Transfer Protocol), 111
- Threat Research Center, 247, 250
- Ticket granting service (TGS), 103107
- Ticket granting ticket (TGT), 104107, 111
- Time stamps, 99, 110
- Toffler, Alvin and Heidi, 327, 329
- Token-Ring network, 153154, 168
- Tokens, 153154, 168, 683684
- Tool list for audits, 576
- Top Secret, 319
- Tort law, 554555
- TouchSafe, 55
- TP (transaction processing) systems, 605
- Trade secret protection, 354, 693696
- Training programs
- data classification and, 321
- for desktop policies, 427
- malicious software and, 443
- need for, 13, 355356
- for networks, 166, 178
- portable computers and, 709710
- for security awareness, 5, 13, 166, 427
- Transaction processing (TP) systems, 605
- Transborder data security, 390393
- Trapdoors, 525527
- Triples, 8990
- Trivial File Transfer Protocol (TFTP), 111
- Trojan horses. See also Malicious software; Viruses
- access control and, 7273, 88
- confidentiality and, 20
- detection and prevention of, 520522, 579
- in networks, 161
- overview of, 407, 439, 441, 519520
- passwords and, 126
- salami techniques and, 524525
- systems availability and, 30
- trapdoors and, 525
- viruses in, 445
- TrueFace, 55
- Trust, 114115, 504
- Trusted Computer Security Evaluation Criteria (TCSEC), 390392
- Trusted Computer System Evaluation Criteria (Orange Book), 22, 392393
- Trusted computing, 392
- Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria (Red Book), 22
- Trustworthiness, 31, 501
- Tuples of data bases, 6368, 7374
- Type enforcement, 133, 136143
U
- UDP protocol, 214
- UIDs (user identities), 614617, 642645
- Unattended terminals, 9092, 128129
- Unauthorized user activity, 20
- Uninterruptible power supplies (UPS), 171172, 273, 275, 682
- Unions, identification procedures and, 41, 45
- United States v. David, 567
- United States v. Doe, 581
- UNIX
- on desktop machines, 424425
- hackers and, 125127, 142, 165
- Kerberos and, 106, 108, 111, 115
- Sidewinder and, 141144
- structure of, 141
- unenforced restrictions in, 405
- UPDATE statement, 68, 70
- UPS (uninterruptible power supplies), 171172, 273, 275, 682
- User identities (UIDs), 614617, 642645. See also Authentication of users
- User managers, 318320
- User name, definition of, 375
- User name service, 368
- User registration, 15
V
- Vacation requirements, 16
- Variance detection, 172
- Verification procedures, 25
- Vermont, computer crime in, 553
- Vietnam War, computer abuse during, 529
- Views, 6869, 94
- Violation tracking and processing, 12, 661663
- Virginia, computer legislation in, 543
- Virtual comporations, 348
- Virtual Private Networks (VPNs), 218219, 221
- Virtual Protection Team (VPT), 351, 357359
- Virtual storage, 413
- Viruses. See also Trojan horses
- antivirus certification, 450
- availability and, 30
- boot sector, 444445
- control of, 6, 439450
- data classification and, 316
- detection and prevention of, 522524
- ethics and, 592593
- legislation against, 544546
- macro, 448450
- in Microsoft Word, 448450
- in networks, 161, 173, 356
- overview of, 407, 439441, 521522
- personal computers and, 164
- portable computers and, 702703, 708
- software against, 10, 443444
- types of, 444450, 463
- VMS, Kerberos and, 108
- Voice pattern systems, 38, 4950, 686
- Von Neumann architecture, 414
- VPN (Virtual Private Network), 218219, 221
- VPT (Virtual Protection Team), 351, 357359
- Vulnerability analysis, 230, 232, 246, 252255, 354357
W
- WAIS (Wide Area Information System), 184
- WANs. See Wide area networks
- Water damage, 161162, 250, 682
- Web browsers, security for, 192195
- Web servers. See Servers
- Well-formed transactions, 25
- Whale virus, 448
- Wide Area Information System (WAIS), 184
- Wide area networks (WANs). See also Local area networks
- confidentiality for, 158, 170
- fire damage to, 161162, 171, 275
- overview of, 149158
- safeguards for, 166173
- security implementation for, 174178
- threats to, 158162
- values of, 159
- vulnerabilities in, 162165
- Windows for Workgroups, 452
- Windows NT, 200
- Winword.Concept virus, 449
- WinWord.Nuclear virus, 450
- Wire-tapping (eavesdropping), 101, 406, 511513, 538
- Working Group on Computer Ethics, 596
- World Wide Web (WWW)
- audit trails and, 199202
- growth and applications of, 183185
- security for, 181205
- type enforcement and, 136138
- vulnerabilities in, 202204
- Worms. See also Malicious software
- Morris, 339
- in networks, 161
- overview of, 407, 439, 442
- Trojan horses and, 521522
- Write-once/read-many (WORM) storage, 411
- WWW. See World Wide Web
- Wyoming, computer legislation in, 546
X
- XOR operation, 636, 641, 643645
- X-Windows, 214
|