Security Mechanisms

Security Deployment… What to consider

Before Deploying an effective security mechanism, consider the following:

1. What resources are you trying to protect?

2. Determine the host-specific security measures needed. Password protection, file encryption, firewall, etc…

3. Consider the corporate budget when planning for Internet Security.

4. Design a Security Policy that describes your organization's network security concerns. This policy should take into account the following:

Risk analysis involves determining the following:

5. Consider the following factors to determine who will grant access to services on your networks:

6. Design and Implement Packet Filter Rules

7. Ensure your Firewall has the following properties:

8. Educate users about password protection:

9. Security-related organizations play an integral role in the development and deployment of Internet technologies. Keep abreast of the latest in security-related activities by visiting their Web sites. Here are some key security-rated organizations which aid corporations such as yours in keeping the Internet a safer place to compute:

ACM/SIGSAC at gopher://gopher.acm.org/.

CERT (a 24-hour Computer Emergency Response Team) at: ftp://info.cert.org/pub/cert_faq and http://www.sei.cmu.edu/SEI/programs/cert.html.

CIAC (U.S. Department of Energy's Computer Incident Advisory Capability) at: http://ciac.llnl.gov/

CPSR (Computer Professionals for Social Responsibility) at: http://cpsr.org.home

EFF (Electronic Frontier Foundation) at: http://www.eff.org/

EPIC (Electronic Privacy Information Center) at: http:/epic.org/

FIRST (Forum of Incident Reponse and Security Teams) at: http://first.org/first/

Internet Society at http://www.isoc.org/


Important Internet Security Issues

Authentication:
There are two types of authentication:

1) TCP/IP (such as Telnet and FTP.TCP/IP and

2) Messages, transactions and E-mail that require authentication of source.

Confidentiality:
Encryption provides security for private or secret information included in E-mail, FTP and electronic commerce.

Data Integrity:
Assures that data has not been altered during transmission over the Internet and protects FTP or E-mail files for transmission over the Internet.

Proof of Origin:
Protects against the sender falsely denying sending the data or the recipient from falsely denying receiving the data.

Internet Access:
A gateway may be required to intercept and examine messages from and to the Internet.


Recommended Reading About Internet Security

Actually Useful Internet Security Techniques By Larry J. Hughes, Jr.
New Riders Publishing

Building Internet Firewalls By D. Brent Chapman and Elizabeth D. Zwicky
O'Reilly & Associates, Inc.

Firewalls and Internet Security By William R. Cheswick and Steven M. Bellovin
Addison-Wesley Publishing Company

Internet Firewalls and Network Security By Karanjit Siyan, Ph.D., and Chris Hare
New Riders Publishing

Microsoft® Windows NT™ Resource Kit, Version 3.51 Update
Microsoft® Press

Network & Internet Security By Vijay Ahuja, Manager, Network Securities Products, IBM Corporation
Academic Press, Inc.

Practical UNIX® Security by Garfinkel and Spafford

Windows NT™ Security Guide By Stephen A. Sutton
Trusted Systems Services, Inc.

Practical Unix & Internet Security
O'Reilly & Associates