Home > Store

Security In Distributed Computing: Did You Lock the Door?

Register your product to gain access to bonus material or receive a coupon.

Security In Distributed Computing: Did You Lock the Door?

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

  • describes the new security problems that architects, builders, and managers will face in distributed computing environments.
  • reveals the latest technologies that can be employed to counter security threats to a distributed system.
  • shows how intruders can be detected in a remote system.

Description

  • Copyright 1997
  • Dimensions: 7" x 9-1/4"
  • Pages: 480
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-182908-4
  • ISBN-13: 978-0-13-182908-4


18290-7

Practical techniques for securing distributed computing systems.

Computing security is, at its core, more than a technical issue: It's a fundamental business challenge. Managers have plenty of security alternatives, but little real guidance on making intelligent decisions about them. And today's distributed, multivendor, Internet-connected environments encompass more insecure systems and networks than ever before.

Security in Distributed Computing offers the manager of distributed systems a thorough, common-sense framework for cost-effective computer security. Learn how to:

  • Develop distributed systems architectures and methodologies that are inherently more secure
  • Build trusted, Open-Systems-based distributed transaction processing systems
  • Evaluate cost vs. risk: What is worth securing, and at what price?
  • Consider human and organizational factors, so you can enhance security with minimum disruption to people and processes.

This book reviews critical risk areas in distributed systems, including networks, operating systems, applications, middleware, and the Internet. It considers the unique challenges of security in UNIX and Windows NT environments. And it presents detailed information about technologies that can help you respond, including:

  • Cryptography
  • The Kerberos authentication model
  • DCE security

Security in Distributed Computing also presents valuable, in-depth recommendations of how to design and implement a security strategy.

The more your organization comes to rely on distributed systems, the more important security will become. When you need to make important business decisions about security, you'll appreciate the practical advice and insight this book delivers.

Sample Content

Table of Contents



Foreword.


Preface.


Acknowledgments.


Introduction.

I. UNDERSTANDING THE PROBLEM.

 1. “Computing Security” A Business Issue.

Business Drivers. Business Issues. Summary.

 2. Distributed Security Challenges.

Stories. Security Issues. The Top Ten List. Conclusions.

II. FOUNDATIONS.

 3. Computing Security Basics.

What is Security? Trust—What Is It? Trust—Why Do We Need It? Summary.

 4. Security Architecture.

Foundation. Trust. Control. Summary.

 5. Foundations.

Principles. Security Policy Framework. Security Criteria. Summary.

 6. Security Policy.

Security Policy Framework. Example of a Policy. The Process of Creating Policies. Summary.

III. TECHNOLOGIES.

 7. The Network.

A Tale of Two Networks. Systems Network Architecture. Introducing TCP/IP. SNA versus TCP/IP Security. Conclusions.

 8. Network Operating Systems.

About Network Operating Systems? Issues Surrounding NOS Implementations. Conclusions.

 9. Client/Server and Middleware.

Client/Server. Middleware. Enabling Technology. Distributed Objects. Things to Watch Out For. Summary.

10. UNIX Security.

Why has UNIX Such a Bad Reputation for Security? UNIX Security. Typical Abuses. Conclusions.

11. More UNIX Security.

UNIX Network Services. A Burglar's Tools. Conclusions.

12. UNIX Solutions.

Control Monitors. Conclusions.

13. Windows NT Security.

Security Controls. Networking. Conclusions.

14. The Internet.

What is the Internet? Internet Firewall. Conclusions.

15. Cryptography.

Private Key Encryption. Public Key Encryption. Encryption Issues. Digital Signature. Summary.

16. The DCE Environment.

What is DCE? Concerns about DCE. Conclusions.

17. DCE Security Concepts.

DCE Authentication. Authorization. Is DCE Bulletproof? Conclusions.

18. Distributed Database.

What is a RDBMS? Different Models to Enable Applications. Issues Surrounding RDBMS. What is a Data Warehouse? Conclusions.

19. On-Line Transaction Processing.

What Is a Transaction? Components of a Transaction Processing System. The Top Five List. Summary.

IV. SOLVING THE PROBLEM.

20. Secure Applications.

Concepts. System Development Life Cycle. Summary.

21. Implementation Examples.

Electronic Mail. Lotus Notes. What's Next. Summary.

22. Security Management.

System Management. Network Management. Conclusions.

23. Developing a Security Strategy.

A Security Strategy. The Security Strategy Roadmap. Conclusions.

24. Auditing.

What Is an Audit? What Role Should Audit Play? Sample Criteria for a UNIX Audit. The Basics of Computer Auditing. Expanding the Focus. Other Types of Audits. Conclusions.

25. The Future.
Appendix A. Strong Authentication.
Appendix B. Smart Cards.
Appendix C. Personal Computer Security.

Viruses. Personal Computer Access Controls. How Far Should Security Be Extended? Conclusions.

Appendix D. Remote Access.
Glossary.
References.
Index.

Preface



The problem of safeguarding corporate computing from misuse is a perplexing one for many organizations. From the smallest personal business to the world's largest financial corporations, organizations have experienced assaults or security problems with their computing systems.

Computer security incidents, which have been widely reported by the press, have increased the general publicös awareness of the existence of the problem. Management appreciation of the problem, and their commitment to address it, has never been higher. New commercial security solutions, offspring from the advanced technologies used in the defense industry, are available in the marketplace. Corporate expenditures on these technologies have been rapidly rising.

Most organizations have recognized that the problem exists, and have taken active measures to address it. But incidents and attacks continue to be reported, almost on a daily basis. Unfortunately, there is a strong feeling in the computing community that the problem is going to get a lot worse. Why, then, isn't the problem of computing security being solved?

The answer lies in the fact that computing security is a business problem with many complex aspects. It cannot be solved by technical solutions alone. In fact, uncoordinated expenditures on diverse technical solutions actually contribute to the problem. The purpose of this book is to make the reader aware of all aspects of the problem. It will guide you through the issues and the somewhat confusing array of potential solutions.

When you stop and think about it, there are a number of analogies one can draw between computer and home security. We lock our doors at home as a basic preventive measure. This action by itself does not make a break-in to our home impossible, but it certainly makes it more difficult. As with home security, locking the doors to computing assets is simply common sense.

There also needs to be balance in our approach to security. There is no point in spending money on a superb lock on the front door if the back door doesn't have a lock—neither does it make much sense to only lock one door!

Balance is likewise required in expenditures on security solutions. No one would spend $100,000 on home security to protect $5,000 worth of contents. This is especially true if the neighborhood hasn't experienced a break-in in the past five years. The cost of security must be appropriate to the expected loss and associated risk.

It is also common sense that we should focus on the most likely security exposures. Thieves do not usually carry ladders. Money should therefore be first spent on barring the lower level windows.

Unfortunately, you cannot simply buy total security. The best technology will be of little use if people are unaware of their responsibilities. If your children leave the door unlocked when you are away, whether or not you've used the strongest lock in the world is immaterial. Security cannot be viewed in isolation from the environment. The safety of our homes is directly related to the security of our neighborhoods. You cannot fully address one without addressing the other.

The movement to distributed, client-server technologies has dramatically changed the computing environment of many organizations. The complex systems that are present in mainframe environments have assured trust in their operation. Mainframe security solutions, such as those available from IBM and Computer Associates, have allowed strong, centralized controls to be enforced. The security of a distributed, client-server world, however, is much more complex. Unlike the mainframe, the controls and security functions are distributed across several platforms and are not usually under the control of any single processor. The challenge is to ensure that distributed controls are all working together for a common goal.

We will identify and explain the key issues in computer security today. These are issues that must be addressed if the overall business problem of computing security is to be solved. The key issues in computing security include the need to securely authenticate users and to authorize their actions. Networking has allowed the global computing community to communicate and interact as never before, but it has also exposed corporate networks and computing systems to access by outsiders. Employing technology in an effective manner to address computing security is another key issue.

Explaining the technology involved in computing security is a key focus of this book. The ins and outs of various security technologies will be explained. Our intent is not simply to discuss technology, but to provide an understanding of how technology can be used to solve key security issues.

One example of a key issue is how to trust the integrity of an authentication process when it is communicated over a network. Most network traffic, including the user identification and authentication password, is currently transmitted in clear text. By monitoring network traffic, it is possible to discover passwords and use them to compromise security.

The Kerberos model of trusted-third party authentication can be utilized to address the problem of maintaining the integrity of the authentication process. Named after Cerberus, the mythical three-headed dog that guarded that gates of Hades, the Kerberos model provides a method for authentication within heterogeneous technologies. It presupposes that the network is untrusted, and that any traffic sent over the network may be intercepted. Kerberos has been designed to counter this threat. We will examine the authentication model through its implementation in the Distributed Computing Environment (DCE) of the Open Software Foundation (OSF). Armed with an understanding of its strengths and weaknesses, the reader will be able to judge how effectively OSF/DCE solves distributed computing security problems.

On-line transaction processing (OLTP) has traditionally been delivered from large mainframe-based systems or specialized transaction processing systems. The “Big Iron” was needed to supply the networking capabilities, the central control with the raw horsepower required to push through transactions and maintain control over the shared database. The OLTP system processes transactions to collect or review the information of the business systems and post changes to the shared databases of the organization. The migration of these transactions to distributed servers and the desktop has made the provision of security, with the same protection and utility as the host-centric OLTP systems, difficult. The challenges of system management and security must also be addressed for the promise of effective distributed OLTP systems to be realized.

There are two driving requirements to provide transaction processing systems on “open system” platforms. The first requirement is to provide a robust transaction processing environment on the nonmainframe platform while maintaining the same function and capabilities as the mainframe. The second is to provide a distributed processing capability to allow transactions to execute functions and access data across more than one operating platform. The Encina technology from Transarc was developed to address the transaction processing environment on a UNIX platform. The IBM transaction monitor, CICS, has been ported to the UNIX environment by both IBM and Hewlett-Packard. These transaction monitors, when coupled with the DCE components of OSF and enabled with Encina, provide distributed transaction processing capabilities. The implementation of these technologies to provide a trusted transaction environment, through DCE, will be explored.

We will also study the centralized management of the controls on distributed systems. Using advanced network and system management technologies, confirmation can be obtained that security controls have been established and remain in place. Network alerts may also be used to provide early indications of illicit activity. We will examine the use of dynamic alert techniques and provide suggestions for implementing various detection mechanisms.

The problem of computing security cannot be addressed by technology alone. We will spend a good deal of time discussing the people and organizational aspects. This will include a comprehensive review of the formulation of computing security policy, the areas it should cover, and how best to communicate the policy to users. The security policy outlines the decisions of the organization on security and provides the foundation upon which a security program can be based. Commitment by management to security awareness programs is required to realize the benefits of these important activities.

An architecture is a structured way of describing the functionality of the various components. It presents the relationship of complex components in a manner that makes it easy to understand. Computing security can also benefit from an architecture as a way to describe the components and how they interrelate. A security architecture includes elements which attempt to guarantee the confidentiality of information and ensure that all access to the computing resources is authorized and authenticated. The overall objective of the architecture is to allow trust to be placed in the distributed environment. We need to be able to trust all of the points, or have compensating controls, where users access the various systems rather than have the trust placed only where the information and tools are resident. The security architecture is comprised of a number of building blocks which together define the framework or a comprehensive solution. We will review an approach to a security architecture and outline how it can be used as a basis for the enterprise security solution.

Another nontechnical area that will be explored is the role of audit. An explanation of the purpose of a computing audit, why it is important, and how to best prepare for an audit review is covered. The interrelationship of the Audit Department with other corporate departments is examined, and suggestions are provided to make this relationship more effective.

One of the most important areas when dealing with the problem of computing security is the use of a structured methodology. A security strategy is a series of specific steps that an organization can take to raise the existing level of security within the organization from a base level to a more secure one. The strategy methodology will take an organization through an organized process of assessing where they are currently positioned with their computing environment, defining where they want to be, and planning the steps required to get them there. Using a defined methodology ensures that all the windows and doors have been locked. That planned new addition to the house will also include secure doors and windows while it is being built. The methodology has been successfully used to address the problem in a number of diverse organizations.

This book is for anyone interested in the area of computing security. System administrators and analysts will be able to understand how core technologies such as Kerberos and public and private key encryption work. Application developers and architects will benefit by understanding how the security components fit together and should be integrated into the system design. Security must be designed in and not added on.

For those given the responsibility for security management or audit of distributed computing applications, this book will provide insight into the core security issues in client-server computing. Senior managers, concerned with the safety of computing security, will be guided through a methodology to address the problem.

Computing security is a business issue as well as a technical one. It is a complex problem which will require a number of issues to be addressed. Sophisticated technologies are available to address various security problems; however, they must be used in a planned and coordinated manner to be effective. The development of a security strategy and architecture is required. This book will make you more aware of both the problems of computing security and their potential solutions. Hopefully, you will be able to avoid that “I wish I'd remembered to lock the door!” feeling before travelling too far on the road to distributed, client-server computing.

Introduction
This book is intended to provide the reader with an appreciation for the challenge of obtaining security in distributed computing. It is intended to describe the overall problem and present some ideas about how it may be solved. We have purposefully focused on areas that will give the reader an appreciation of what it will take to meet the challenge, rather than providing an encyclopedia of computing security. For this reason, we have limited our examination to selected technology topics.

For example, the role of personal computers in the distributed systems has not been extensively examined. This is because personal computers running DOS and perhaps Windows have very few security mechanisms. The solution to this problem is to add third-party security software or hardware products to the personal computer. A discussion of the various vendor offerings would add little to our overall objective of describing the business challenge of security in distributed computing. We have focused our discussion on the problem facing distributed client systems, which include personal computers, instead of focusing on the personal computer itself.

For the same reason, we have spent little effort in describing solutions for remote access to networks and systems. While remote access adds to the challenge of security, there are a number of solutions available to address this particular problem in the marketplace. The discussion of these solutions will not significantly add to our examination of the key problem; How do I authenticate an individual over an untrusted network?

We expect that while many people may read the book cover to cover, quite a few may only be interested in selected sections of the book. We have used a roadmap diagram, shown below, to demonstrate where a particular chapter or section is located in the general flow of the book:

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020