My Account Log in

3 options

Computers at risk : safe computing in the information age / System Security Study Committee, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council.

EBSCOhost Academic eBook Collection (North America) Available online

View online

Ebook Central Academic Complete Available online

View online

National Academies Press Available online

View online
Format:
Book
Contributor:
National Research Council (U.S.). Computer Science and Telecommunications Board. System Security Study Committee.
Language:
English
Subjects (All):
Computer security.
Physical Description:
1 online resource (319 p.)
Edition:
1st ed.
Place of Publication:
Washington, D.C. : National Academy Press, 1991.
Language Note:
English
Summary:
Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.
Contents:
Computers at Risk
Copyright
Preface
Acknowledgments
Contents
Executive Summary
1 Overview and Recommendations
COMPUTER SYSTEM SECURITY CONCERNS
TRENDS-THE GROWING POTENTIAL FOR SYSTEM ABUSE
THE NEED TO RESPOND
TOWARD A PLANNED APPROACH
Achieving Understanding
The Nature of Security: Vulnerability, Threat, and Countermeasure
Special Security Concerns Associated with Computers
Security Must Be Holistic-Technology, Management, and Social Elements
Commercial and Military Needs are Different
Putting the Need for Secrecy into Perspective
Building on Existing Foundations
SCOPE, PURPOSE, CONTENTS, AND AUDIENCE
RECOMMENDATIONS
Recommendation 1 Promulgate Comprehensive Generally Accepted System Security Principles (GSSP)
Recommendation 2 Take Specific Short-term Actions that Build on Readily Available Capabilities
Recommendation 3 Gather Information and Provide Education
Recommendation 4 Clarify Export Control Criteria, and Set Up a Forum for Arbitration
Recommendation 5 Fund and Pursue Needed Research
Recommendation 6 Establish an Information Security Foundation
CONCLUSION
NOTES
2 Concepts of Information Security
SECURITY POLICIES-RESPONDING TO REQUIREMENTS FOR CONFIDENTIALITY,INTEGRITY, AND AVAILABILITY
Confidentiality
Integrity
Availability
Examples of Security Requirements for Different Applications
MANAGEMENT CONTROLS-CHOOSING THE MEANS TO SECURE INFORMATION AND OPERATIONS
Preventing Breaches of Security-Basic Principles
Responding to Breaches of Security
DEVELOPING POLICIES AND APPROPRIATE CONTROLS
RISKS AND VULNERABILITIES
SECURING THE WHOLE SYSTEM
APPENDIX 2.1-PRIVACY
Protection of Information About Individuals
Employee Privacy in the Workplace
APPENDIX 2.2-INFORMAL SURVEY TO ASSESS SECURITY REQUIREMENTS.
User Identification
User Verification or Authentication
File Access Control
Terminal Controls
Telecommunications and Networking
Detection Measures
General Comments and Summary
3 Technology to Achieve Secure Computer Systems
SPECIFICATION VS. IMPLEMENTATION
SPECIFICATION: POLICIES, MODELS, AND SERVICES
Policies
Models
Flow Model
Access Control Model
Services
Authentication
Authorization
Auditing
IMPLEMENTATION: THE TRUSTED COMPUTING BASE
Computing
Hardware
Operating System
Applications and the Problem of Malicious Code
Communications
Secure Channels
Authenticating Channels
Security Perimeters
Methodology
4 Programming Methodology
SOFTWARE IS MORE THAN CODE
SIMPLER IS BETTER
THE ROLE OF PROGRAMMING LANGUAGES
THE ROLE OF SPECIFICATIONS
RELATING SPECIFICATIONS TO PROGRAMS
FORMAL SPECIFICATION AND VERIFICATION
HAZARD ANALYSIS
STRUCTURING THE DEVELOPMENT PROCESS
MANAGING SOFTWARE PROCUREMENT
SCHEDULING SOFTWARE DEVELOPMENT
EDUCATION AND TRAINING
MANAGEMENT CONCERNS IN PRODUCING SECURE SOFTWARE
WHAT MAKES SECURE SOFTWARE DIFFERENT
RECOMMENDED APPROACHES TO SOUND DEVELOPMENT METHODOLOGY
5 Criteria to Evaluate Computer and Network Security
SECURITY EVALUATION CRITERIA IN GENERAL
Security Characteristics
Assurance Evaluation
Trade-offs in Grouping of Criteria
Comparing National Criteria Sets
Reciprocity Among Criteria Sets
SYSTEM CERTIFICATION VS. PRODUCT EVALUATION
RECOMMENDATIONS FOR PRODUCT EVALUATION AND SYSTEM CERTIFICATION CRITERIA
6 Why the Security Market Has Not Worked Well
THE MARKET FOR TRUSTWORTHY SYSTEMS
A SOFT MARKET: CONCERNS OF VENDORS
FEDERAL GOVERNMENT INFLUENCE ON THE MARKET
Procurement.
Strategic Federal Investments in Research and Development
Export Controls as a Market Inhibitor
Technology Transfer: Rationale for Controlling Security Exports
Export Control of Cryptographic Systems and Components
Export Control of Trusted Systems
The Commercial Imperative
CONSUMER AWARENESS
Insurance as a Market Lever
Education and Incident Tracking for Security Awareness
Education
Incident Reporting and Tracking
Technical Tools to Compensate for Limited Consumer Awareness
REGULATION AS A MARKET INFLUENCE: PRODUCT QUALITY AND LIABILITY
Product Quality Regulations
Product Liability as a Market Influence
Software and Systems Present Special Problems
Toward Equitable Allocation of Liability
APPENDIX 6.1-EXPORT CONTROL PROCESS
APPENDIX 6.2-INSURANCE
7 The Need to Establish an Information Security Foundation
ACTIONS NEEDED TO IMPROVE COMPUTER SECURITY
ATTRIBUTES AND FUNCTIONS OF THE PROPOSED NEW INSTITUTION
OTHER ORGANIZATIONS CANNOT FULFILL ISF'S MISSION
Government Organizations
Private Organizations
WHY ISF'S MISSION SHOULD BE PURSUED OUTSIDE OF THE GOVERNMENT
A NEW NOT-FOR-PROFIT ORGANIZATION
Critical Aspects of an ISF Charter
Start-up Considerations
Funding the ISF
ALTERNATIVES TO THE ISF
APPENDIX 7.1-A HISTORY OF GOVERNMENT INVOLVEMENT
The National Security Agency and the DOD Perspective
The National Institute of Standards and Technology
Other Government Agency Involvement
APPENDIX 7.2-SECURITY PRACTITIONERS
8 Research Topics and Funding
A PROPOSED AGENDA FOR RESEARCH TO ENHANCE COMPUTER SECURITY
DIRECTIONS FOR FUNDING SECURITY RESEARCH
Funding by the Defense Advanced Research Projects Agency
Funding by the National Science Foundation
Promoting Needed Collaboration
Bibliography
Appendixes.
Appendix A The Orange Book
Appendix B Selected Topics in Computer Security Technology
ORANGE BOOK SECURITY
Library Example
Orange Book Security Models
HARDWARE ENFORCEMENT OF SECURITY AND INTEGRITY
VIPER Microprocessor
Lock Project
CRYPTOGRAPHY
Fundamental Concepts of Encryption
Private vs. Public Crypto-Systems
Digital Signatures
Cryptographic Checksums
Public-Key Crypto-systems and Digital Signatures
Key Management
Algorithms
One-Time Pads
Data Encryption Standard
RSA
PROTECTION OF PROPRIETARY SOFTWARE AND DATABASES
USE OF PASSWORDS FOR AUTHENTICATION
NETWORKS AND DISTRIBUTED SYSTEMS
Viruses
Keeping a Virus Out
Preventing Damage
Providing and Using Vaccines
Application Gateways
What a Gateway Is
Gateways as Access Control Devices
Application Gateways as PAC Devices
Routers as PAC Devices
Conclusions About Gateways
Appendix C Emergency Response Teams
Appendix D Models for GSSP
SETTING STANDARDS-PRECEDENTS
Building Codes
Underwriters Laboratories, Inc
Financial Accounting Standards Board
LESSONS RELEVANT TO ESTABLISHING GSSP
Appendix E High-grade Threats
Appendix F Glossary
Appendix G List of Members of the Former Commission on Physical Sciences, Mathematics, and Resources.
Notes:
Bibliographic Level Mode of Issuance: Monograph
Includes bibliographical references (p. 216-240).
ISBN:
9786610212125
9781280212123
1280212128
9780309574600
0309574609
9780585020099
0585020094
OCLC:
614639486

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account