Little prior knowledge is needed to use this long-needed reference. Computer professionals and software engineers will learn how to design secure operating. BUILDING A SECURE COMPUTER SYSTEM Morrie Gasser ACF2 is a trademark of Uccel Crop. AOS is a trademark of Data General Corp. DEC, PDP, VMS. : Building a Secure Computer System () by Morrie Gasser and a great selection of similar New, Used and Collectible Books.

Author: Zulkizshura Malajas
Country: Papua New Guinea
Language: English (Spanish)
Genre: Automotive
Published (Last): 8 January 2008
Pages: 409
PDF File Size: 12.23 Mb
ePub File Size: 5.39 Mb
ISBN: 422-7-17895-113-1
Downloads: 51748
Price: Free* [*Free Regsitration Required]
Uploader: Kaziktilar

Enyue Annie Lu Office hours: The data routing infrastructure More information. Because users and managers do not see a way around the inconveniences, security is often employed only as a last resort, when a problem has already occurred or a clear threat exists.

While the biilding of computer security used in this book does, therefore, include both secrecy and integrity, the closely related area termed denial of service is rarely discussed here. Can you trust all other systems with which your system communicates?

National Bureau of Standards. While everyone agrees that we have a serious computer security problem, few agree on the best response. The security-relevant components ubilding the internal controls. We would be fighting a losing battle, except that security need not be buildinb isolated effort: For example, even the most primitive multiuser systems today have password protection. If denial of service is your only concern, you should refer to such topics as structured development, fault syxtem, and software reliability.

This discussion is based primarily More information. When conducting a penetration test of an organization’s internal network, which of sefure following approaches would BEST enable the conductor of the test to remain undetected.

The data routing infrastructure. But passwords are inappropriate for many of these applications, especially when a single password is issued to several people for access to a common file, for example.


While systems rarely qualify for any rating without some changes, most commercial operating systems can achieve a C1 or C2 level with a few enhancements or add-on packages. Security measures are supposed to thwart someone who tries to break the rules; but because of poorly integrated ad hoc solutions, security measures often interfere with an honest user s normal job.

Robust security is a requirement for many companies deploying a wireless network. Several add-on security packages for major operating systems have been on the market for some time. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes.

Everything inside the system is protected by the system, and everything outside it is unprotected fig. Part I of this book provides an overview of elementary morrle and serves as an introduction to the chapters in parts II and III that will enable you to read only the chapters of interest, without getting lost.

Building a Secure Computer System

Call-back devices are attractive because they do not require any modification to the system being protected a classic example of add-on security. Many would address the problem through better control of personnel, better administrative procedures, and more suitable laws; others believe that technical solutions are most appropriate.

For example, we would like to know that a new operating system that. This appendix is one of More information. Compatible Operating System Emulation vii. There can be little doubt that it is unusually difficult to build and understand a highly secure computer system.

Data Security Incident Response Plan. If your interest is in developing a system for United States government use, the scale is important; for other applications, you will be more interested in specific features than in the ratings.

Most computer crimes are in fact committed by insiders, and most of the research in computer security since has been directed at the insider problem.


The components inside the system are of two types: Honeywell was the first to offer commercially a highly secure minicomputer, the SCOMP Fraimbased on a security kernel, a subject of chapter Before the problem of data security became widely publicized in the media, most people s idea of computer security focused on the physical machine. I The Multics System: But as knowledge of computers becomes more common, we cannot assume that only a few honest citizens will possess the requisite skills to commit a major crime.

Beginners Guide to Firewalls Cyber Security: Government Printing Office number The DoD criteria for evaluating and rating operating systems according to a scale based on security features and assurance. But there is also an important technical reason.

Office of Energy Assurance U. Homeland Security Red Teaming Directs intergovernmental coordination Specifies Red Teaming Viewing systems from the perspective of a potential adversary Target hardening Looking for weakness in existing. Field Device Protection Profile Version 0.

ACSA Information Security Bookshelf – Gasser

Each major technological advance in computing raises new security threats that require buidling security solutions, and technology moves faster than the rate at which such solutions can be developed. The problem appears to be solely one of people, but it is exacerbated buipding a technical deficiency of the system. To make this website work, we log user data and share it with processors.

The Department of Homeland Security. The key to this problem lies in specifying a chain of objective evidence that bridges the gap from policy to implemented system. Pethia Software Engineering Institute S. You might be able to live in a house with a few holes in the walls, but you will not be able to keep burglars out.