資源描述:
《computer security》由會員上傳分享,免費在線閱讀,更多相關(guān)內(nèi)容在教育資源-天天文庫。
1、ComputerSecurityMuchofthismaterialappearsin[NRC1991]inarevisedform.Section1isjointworkwithDougMcIlroy.Anumberofpeoplecontributedtosection3.ButlerW.LampsonDigitalEquipmentCorporationJuly1990Thisdocumentisadraftofchapters2and3oftheNationalAcademyofScience’sreportoncomputersecurity[NRC1991],alongw
2、iththetechnicalappendix,references,andglossary.Section1describesrequirementsforsecurity,andsection2thetechnologyavailableformeetingthem.Section3containsmoretechnicaldetailonanumberofspecifictopics.Thereisalistofreferencesandaglossaryattheend.1RequirementsOrganizationsandpeoplethatusecomputersca
3、ndescribetheirneedsforinformationsecurityunderfourmajorheadings:secrecyOftencalled'confidentiality',asevensyllablejawbreaker.:controllingwhogetstoreadinformation;integrity:controllinghowinformationchangesorresourcesareused;accountability:knowingwhohashadaccesstoinformationorresources;availabili
4、ty:providingpromptaccesstoinformationandresources.Eachuserofcomputersmustdecidewhatsecuritymeanstohim.Forexample,adefenseagencyislikelytocaremoreaboutsecrecy,acommercialfirmmoreaboutintegrityofassets.Adescriptionoftheuser’sneedsforsecurityiscalledasecuritypolicy.Asystemthatmeetsthoseneedsiscall
5、edasecuresystem.Sincetherearemanydifferentsetsofneeds,therecan’tbeanyabsolutenotionofasecuresystem.Anexamplefromarelatedfieldmayclarifythispoint.Wecallanactionlegalifitmeetstherequirementsofthelaw.Sincethelawisdifferentindifferentjurisdictions,therecan’tbeanyabsolutenotionofalegalaction;whatisl
6、egalunderthelawsofBritainmaybeillegalintheUS.Havingestablishedasecuritypolicy,ausermightwonderwhetheritisactuallybeingcarriedoutbythecomplexcollectionofpeople,hardware,andsoftwarethatmakeuptheinformationprocessingsystem.Thequestionis:canthesystembetrustedtomeettheneedsforsecuritythatareexpresse
7、dbythepolicy?Ifso,wesaythatthesystemistrustedPerhapsweoughttosaythatitistrustworthy,butwedon't..Atrustedsystemmustbetrustedforsomething;inthiscontextitistrustedtomeettheuser’sneedsforsecurity.Insomeothercontextitmightbetrustedtoco