登陆注册
3765300000071

第71章 Computer Security(1)

9.1 Internet Security

Anyone responsible for the security of a trusted network will be concerned when connecting it to a distrusted network. In the case of connections to the Internet this concern may be based largely on anecdotal evidence gleaned from widespread media coverage of security breaches. A closer inspection of the facts and statistics behind some of the media coverage will, however, only serve to deepen that concern. For example, the US National Computer Security Agency (NCSA) asserts that most attacks to computer systems go undetected and unreported, citing attacks made against 9000 Department of Defense computers by the US Defense Information Systems Agency (DISA). These attacks had an 88 percent success rate and went undetected by more than 95 percent of the target organizations. Only 5 percent of the 5 percent that detected an attack, a mere 22 sites, reacted to it.

Despite fears about security, organizations are increasingly coming to regard a presence on the Internet as an important part of their strategic planning. Security concerns will not be allowed to prevent organizations from exploiting the commercial opportunities the Internet is perceived to offer. As a result organizations have to find ways to manage tile security issue. This ties growth in the Internet security market directly to growth in the Internet. The compound annual growth rate (CAGR) of the Internet firewall market between 1995 and 2000 is projected to be 174% driven by rapid growth of both the Internet and Intranets. The most significant trend driving this growth is the rapid and aggressive deployment of World Wide Web servers for both Internet and Intranet use. Unit shipments of web server software are expected to grow from 127,000 units in 1995 to just more than 5 million units in 2000. Although the IT industry has traditionally enjoyed rapid development this level of growth is unprecedented.

Encryption Techniques

Encryption is tile way to solve tile data security problem. There are two kinds of encryption techniques-symmetric key encryption and asymmetric key encryption.

For symmetric key encryption, both parties should have a consensus about a secret encryption key. When A wants to send a message to B, A uses the secret key to encrypt tile message. After receiving the encrypted message, B uses the same (or derived) secret key to decrypt the message. The advantage of using symmetric key encryption lies in its fast encryption and decryption processes (when compared with asymmetric key encryption at the same security level). The disadvantages are, first, the encryption key must be exchanged between two parties in a secure way before sending secret messages. Secondly, we must use different keys with different parties. For example, if A communicates with B, C, D and E, A should use 4 different keys. Otherwise, B will know what A and C as well as A and D has been talking about. The drawbacks of symmetric key encryption make it unsuitable to be used in the Internet, because it’s difficult to find a secure way to exchange the encryption key.

For asymmetric key encryption, there is a pair of keys for each party: a public key and a private key. The public key is freely available to the public, but only the key owner gets hold of the private key. Messages encrypted by a public key can only be decrypted by its corresponding private key, and vice versa. When A sends message to B, A first gets B’s public key to encrypt the message and sends it to B. After receiving the message, B uses his private key to decrypt the message. The advantage comes in the public key freely available to the public, hence free from any key exchange problem.

The disadvantage is the slow encryption and decryption process. Almost all encryption schemes used in the Internet uses asymmetric key encryption for exchanging the symmetric encryption key, and symmetric encryption for better performance. Asymmetric key cryptography seems to attain secrecy in data transmission, but the authentication problem still exists. Consider the following scenario: when A sends a message to B, A gets B’s public key from the internet--but how can A know the public key obtained actually belongs to B? Digital certificate emerges to solve this problem.

Authentication

Digital certificate is an identity card counterpart in the computer society. When a person wants to get a digital certificate, he generates his own key pair, gives the public key as well as some proof of his identification to the Certificate Authority (CA). CA will check the person’s identification to assure the identity of the applicant. If the applicant is really the one “who claims to be”, CA will issue a digital certificate, with the applicant’s name, e-mail address and the applicant’s public key, which is also signed digitally with the CA’s private key. When A wants to send B a message, instead of getting B’s public key, A now has to get B’s digital certificate. A first checks the certificate authority’s signature with the CA’s public key to make sure it’s a trustworthy certificate. Then A obtains B’s public key from the certificate, and uses it to encrypt message and sends to B.

Authentication is an important part of everyday life. The lack of strong authentication has inhibited the development of electronic commerce. It is still necessary for contracts, legal documents and official letters to be produced on paper Strong authentication is then, a key requirement if the Internet is to be used for electronic commerce. Strong authentication is generally based on modem equivalents of the one time pad. For example, tokens are used in place of one time pads and are stored on smart cards or disks.

Firewall

同类推荐
  • 说出日本人的每一天:日语会话4000句

    说出日本人的每一天:日语会话4000句

    本书共分13个单元,涵盖工作、学习和生活中的方方面面,根据不同主题中的关键词衍生出4000句日语会话,内容丰富实用且新颖,语言生动形象且地道。因为每句会话都有其关键词,所以读者可以通过关键词快速方便地检索到所需要的词句,并通过关键词进行记忆,在阅读本书的过程中同时提升词汇量和会话能力,日语能力也得以短时间内突飞猛进。
  • 我在美国教汉语

    我在美国教汉语

    本书生动展示了安徽农业大学在美国罕布什尔学院开展对外汉语教学的20年间13位赴美教师的亲身经历和异域文化体验,他们将对外汉语教学总结为课堂教学、中国文化实践活动与异域文化浸入式体验三大部分,并在多元化的实践探索中寻求切实有效的对外汉语教学方法。
  • 黎明踏浪号(纳尼亚传奇:中英双语)

    黎明踏浪号(纳尼亚传奇:中英双语)

    《黎明踏浪号》讲述了暑假里,爱德蒙和露西住在哈罗德舅舅家,和表弟尤斯塔斯住在一起。尤斯塔斯是个令人讨厌的家伙。有一天,墙上的一幅画有帆船的油画忽然将他们拉进了画中,他们在船上遇到了凯斯宾国王,他正出航寻找被叔叔驱逐的骑士们。航行的另一个目的是希望找到雄狮阿斯兰的王国。一路上他们经过了各种神奇的岛屿,如孤独岛、声音岛、黑暗岛等等,历尽种种艰险。他们解除了魔法,唤醒了三位沉睡着的爵爷,最后又都回到纳尼亚。爱德蒙、露西也回到剑桥舅妈家。
  • 纳尼亚传奇:狮子、女巫与魔衣柜(双语译林)

    纳尼亚传奇:狮子、女巫与魔衣柜(双语译林)

    《纳尼亚传奇》是英国著名作家刘易斯于1951年至1956年间创作的系列魔幻故事,被公认为20世纪最佳儿童图书之一。在半个世纪里,《纳尼亚传奇》的销售达到8500万册,至今已被翻译成30多种语言文字。在老教授的房子里有许多间屋子,屋子里有许多扇门,但是只有一扇通向另一个世界……纳尼亚。那里流传着一个预言:两个亚当的儿子和两个夏娃的女儿将会现身,击败邪恶的白女巫,结束永恒的寒冬。狮王阿斯兰说:纳尼亚的未来系于他们的勇气。在这里,一种命运即将应验,一段传奇拉开序幕。
  • 人生要耐得住寂寞

    人生要耐得住寂寞

    成功非一蹴而就,高尔基曾说过“凡事皆有终结,因此,耐心是赢得成功的一种手段。”爱情亦如此,宁缺毋滥。我选择用一生独自等待,我的成功……我的爱……
热门推荐
  • 红楼梦断:曹雪芹家的故事(全10册)

    红楼梦断:曹雪芹家的故事(全10册)

    红学经典!讲述《红楼梦》中贾母、贾政、贾宝玉、王熙凤、袭人等人物原型的真实命运。历史小说大师高阳30年心血力作!了解《红楼梦》,必读《红楼梦断》。曹雪芹的祖父曹寅是康熙的亲信,祖孙三代担任江宁织造达60年之久,曹府盛况一如《红楼梦》中的贾府。雍正五年末,曹雪芹13岁,其家人因罪革职,家产抄没,曹雪芹随母迁回北京居住,曹府从此败落。曹雪芹以家族兴衰为线索创作的《红楼梦》,大量故事及人物原型来自从小耳濡目染的家族生活,除了以他自己为原型的贾宝玉,精明泼辣的王熙凤,风流灵巧的袭人,口齿伶俐的晴雯,都是现实生活中存在,并为作者所热爱的人。虚构角色的命运,多与人物原型相重合,也有被刻意隐去的现实悲欢。
  • 倾城雪:梦里繁花

    倾城雪:梦里繁花

    她是北唐百无一用的公主,文不行武不能。是众人眼中的废物,却是当朝天子的掌中宝。一眼一生,她将那个男子爱入骨髓,却最终以血浸染这份爱情。风云流转,她再度出现在众人面前,激起千层浪。夕阳西下,沙尘滚滚,她一身铠甲屹立前方。万箭齐发间,她抬头,嘴角挑了笑意。纯古典文~没有天马行空,只有动人心肠……
  • 普林斯顿的智慧

    普林斯顿的智慧

    “走进常春藤”系列丛书,茅于轼作序。选取了四所著名高校,与其有关的故事,从人生智慧、品性修养、风骨气质、励志精神等多方面给人们以启示,特别是对青少年的成长有很可贵的激励作用。抓住每所大学的特点,因此在选择上,侧重于领导力、管理能力、还有创造财富的能力。侧重人文方面的素养、心灵的诉求;侧重于领导力、创新、科学精神等。
  • 精神光芒

    精神光芒

    歌德说:“名言集和格言集是社会上最大的财宝——只要懂得在适当的场合把前者带进会话里,在适当的时间唤起对后者的记忆。我们人类社会那些出类拔萃的名家巨人,在推动人类社会向前不断发展的同时,也给我们留下了宝贵的物质财富。他们通过自身的体验和观察研究,还给我们留下了许多有益的经验和感悟,他们将其付诸语言表达出来,被称之为名言或格言,其中蕴含并闪耀着智慧的光芒,成为世人宝贵的精神财富。人们将之作为座右铭,产生着无限的灵感、启发、智慧和力量,从而成为人生的航灯。作为人生的追求者,茫茫人海,关键在于找到属于自己的名家导师,关键在于找到鼓舞自己的名言警句,当然,最关键的是在这些金玉良言的指导下付诸切实的行动。
  • 末誓2

    末誓2

    一不小心败北大冒险、原来伤心是句号。我心爱亲爱的真心话、妄想开心逗你笑。摸摸头,擦擦眼,我看不见。重要的,事情的,要说三遍。时光飞逝,转眼十年。她走了,去往了那妄想异世界,抛下我独自在人间,“我恨,我哭,我……爱你”。
  • 明末之伟大舵手

    明末之伟大舵手

    现代人米柱,穿越到平行世界的1620年,因机缘巧合,成为阉党中的一员,进入皇宫,陪皇太孙读书,成为天子近臣,天启登基后,得到了重用,朝廷之上,驯服了党争,朝廷之外,制造武器,训练军队,成为一代权臣。凡有明二百多年,天子守国门、君王死社稷。不和亲、不割地、不赔款,这样的血性王朝不保,难道让满清入关,“量中华之物力,结与国之欢心?”万历47年,24年后就是大明灭亡之时,米柱穿越至此,不想子孙拖着辫子跪着做人,就必须有所作为。本书是发生是平行世界的故事,如有雷同,实属巧合,故事而己,仅供读者们茶余饭后消遣。
  • 行政管理制度表格流程规范大全

    行政管理制度表格流程规范大全

    《行政管理制度表格流程规范大全(成功金版)》内容包括办公用品管理,办公设备管理、办公费用管理,印章、证照、文件资料、档案管理,会议、提案、行政事务、法务管理,员工考勤、出入、假务管理,员工出差管理,车辆管理,招待与接待管理,宿舍食堂管理,环境与安全管理等的日常管理工作,涉及多个行业的企业制度范例以及大量“拿来即用”的模板、量表。它将告诉你如何让繁杂的行政工作变得更有条理,让行政管理变得更有效率。
  • 华夏第一猎人

    华夏第一猎人

    一名没有身世的少年,一次反常的猎人考核,一场渐渐失控的骚乱,引出一场死灰复燃的灾难。且看少年陆海,在任务的磨练下,在朋友在爱人的陪伴下,如何一步步走上华夏猎人的巅峰....
  • 被召唤的皇帝

    被召唤的皇帝

    初代皇帝秦始皇在fate被召喚出來,記憶中甚至融入了投胎在現世的自己,知道投胎的自己是動漫宅,本人表示……。
  • 追妻无门:女boss不好惹

    追妻无门:女boss不好惹

    青涩蜕变,如今她是能独当一面的女boss,爱了冷泽聿七年,也同样花了七年时间去忘记他。以为是陌路,他突然向他表白,扬言要娶她,她只当他是脑子抽风,他的殷勤她也全都无视。他帮她查她父母的死因,赶走身边情敌,解释当初拒绝她的告别,和故意对她冷漠都是无奈之举。突然爆出她父母的死居然和冷家有丝毫联系,还莫名跳出个公爵未婚夫,扬言要与她履行婚约。峰回路转,破镜还能重圆吗? PS:我又开新文了,每逢假期必书荒,新文《有你的世界遇到爱》,喜欢我的文的朋友可以来看看,这是重生类现言,对这个题材感兴趣的一定要收藏起来。