登陆注册
27082000000071

第71章 Computer Security(1)

9.1 Internet Security

Anyone responsible for the security of a trusted network will be concerned when connecting it to a distrusted network. In the case of connections to the Internet this concern may be based largely on anecdotal evidence gleaned from widespread media coverage of security breaches. A closer inspection of the facts and statistics behind some of the media coverage will, however, only serve to deepen that concern. For example, the US National Computer Security Agency (NCSA) asserts that most attacks to computer systems go undetected and unreported, citing attacks made against 9000 Department of Defense computers by the US Defense Information Systems Agency (DISA). These attacks had an 88 percent success rate and went undetected by more than 95 percent of the target organizations. Only 5 percent of the 5 percent that detected an attack, a mere 22 sites, reacted to it.

Despite fears about security, organizations are increasingly coming to regard a presence on the Internet as an important part of their strategic planning. Security concerns will not be allowed to prevent organizations from exploiting the commercial opportunities the Internet is perceived to offer. As a result organizations have to find ways to manage tile security issue. This ties growth in the Internet security market directly to growth in the Internet. The compound annual growth rate (CAGR) of the Internet firewall market between 1995 and 2000 is projected to be 174% driven by rapid growth of both the Internet and Intranets. The most significant trend driving this growth is the rapid and aggressive deployment of World Wide Web servers for both Internet and Intranet use. Unit shipments of web server software are expected to grow from 127,000 units in 1995 to just more than 5 million units in 2000. Although the IT industry has traditionally enjoyed rapid development this level of growth is unprecedented.

Encryption Techniques

Encryption is tile way to solve tile data security problem. There are two kinds of encryption techniques-symmetric key encryption and asymmetric key encryption.

For symmetric key encryption, both parties should have a consensus about a secret encryption key. When A wants to send a message to B, A uses the secret key to encrypt tile message. After receiving the encrypted message, B uses the same (or derived) secret key to decrypt the message. The advantage of using symmetric key encryption lies in its fast encryption and decryption processes (when compared with asymmetric key encryption at the same security level). The disadvantages are, first, the encryption key must be exchanged between two parties in a secure way before sending secret messages. Secondly, we must use different keys with different parties. For example, if A communicates with B, C, D and E, A should use 4 different keys. Otherwise, B will know what A and C as well as A and D has been talking about. The drawbacks of symmetric key encryption make it unsuitable to be used in the Internet, because it’s difficult to find a secure way to exchange the encryption key.

For asymmetric key encryption, there is a pair of keys for each party: a public key and a private key. The public key is freely available to the public, but only the key owner gets hold of the private key. Messages encrypted by a public key can only be decrypted by its corresponding private key, and vice versa. When A sends message to B, A first gets B’s public key to encrypt the message and sends it to B. After receiving the message, B uses his private key to decrypt the message. The advantage comes in the public key freely available to the public, hence free from any key exchange problem.

The disadvantage is the slow encryption and decryption process. Almost all encryption schemes used in the Internet uses asymmetric key encryption for exchanging the symmetric encryption key, and symmetric encryption for better performance. Asymmetric key cryptography seems to attain secrecy in data transmission, but the authentication problem still exists. Consider the following scenario: when A sends a message to B, A gets B’s public key from the internet--but how can A know the public key obtained actually belongs to B? Digital certificate emerges to solve this problem.

Authentication

Digital certificate is an identity card counterpart in the computer society. When a person wants to get a digital certificate, he generates his own key pair, gives the public key as well as some proof of his identification to the Certificate Authority (CA). CA will check the person’s identification to assure the identity of the applicant. If the applicant is really the one “who claims to be”, CA will issue a digital certificate, with the applicant’s name, e-mail address and the applicant’s public key, which is also signed digitally with the CA’s private key. When A wants to send B a message, instead of getting B’s public key, A now has to get B’s digital certificate. A first checks the certificate authority’s signature with the CA’s public key to make sure it’s a trustworthy certificate. Then A obtains B’s public key from the certificate, and uses it to encrypt message and sends to B.

Authentication is an important part of everyday life. The lack of strong authentication has inhibited the development of electronic commerce. It is still necessary for contracts, legal documents and official letters to be produced on paper Strong authentication is then, a key requirement if the Internet is to be used for electronic commerce. Strong authentication is generally based on modem equivalents of the one time pad. For example, tokens are used in place of one time pads and are stored on smart cards or disks.

Firewall

同类推荐
  • 魅力英文ⅰ:我的世界我做主

    魅力英文ⅰ:我的世界我做主

    《魅力英文:我的世界我做主》为英汉对照典藏版。非常适合中学生、大学生及对英语学习充满热情、抱有热望的人们来了解英文欣赏英文。该书收录了百于则经典哲理美文,其内容涉及青春、爱情、理想等方面,从不同的视角阐释了人生的种种道理。在面临挑战、遭受挫折之时,《魅力英文:我的世界我做主》会给您以力量……
  • Nineteen Eighty-Four(1984)(英文版)

    Nineteen Eighty-Four(1984)(英文版)

    《1984》是英国作家乔治奥威尔创作的一部政治讽刺小说,小说创作于1948年,出版于1949年。书中讲述了一个令人感到窒息和恐怖的,以追逐权力为最终目标的假想的未来极权主义社会,通过对这个社会中一个普通人温斯顿史密斯的生活描写,投射出了现实生活中极权主义的本质。
  • Le Mort d'Arthur

    Le Mort d'Arthur

    本书为公版书,为不受著作权法限制的作家、艺术家及其它人士发布的作品,供广大读者阅读交流。
  • 双语学习丛书-浓情挚爱

    双语学习丛书-浓情挚爱

    流淌心灵的隽语,记忆的箴言,在双语的世界里,感受英语学习的乐趣,体会英语学习的奥妙,提高英语学习的能力!丛书包括:爱的交融、财富精英、成长课堂、醇香母爱、父爱如山、故乡情怀、节日趣闻、快乐心语、浪漫往昔等故事。
  • 双语学习丛书-校园趣话

    双语学习丛书-校园趣话

    流淌心灵的隽语,记忆的箴言,在双语的世界里,感受英语学习的乐趣,体会英语学习的奥妙,提高英语学习的能力!丛书包括:爱的交融、财富精英、成长课堂、醇香母爱、父爱如山、故乡情怀、节日趣闻、快乐心语、浪漫往昔等故事。
热门推荐
  • 妖抱苏大腿

    妖抱苏大腿

    胡月,一个二十一世纪废材女,因为一杯水她魂穿进网剧里,成了一个废材妖,她的任务杀幽月国皇帝,皇帝没有杀死,她莫名又是黑灵国女皇,再来又收养了两只小兽……然后她掉下了妖界深渊……更扯的是三个男人都来追她,这开挂的人生简直让她无法置信……
  • 异界凌风传

    异界凌风传

    蓝凌风是牛头山下牛头村一个普通的少年,不过十二岁的那一年却在牛头上上遇到了一个神秘的老头。经过三年的相处之后,老者离开了。却是留下了一刻神秘的珠子给蓝凌风,并且让他好好保管。这一切便由那颗神秘的石珠开始发生了变化。
  • 长夜孤灯

    长夜孤灯

    天下人族书九字纵横妖兽铸四文不死亡灵通七印神留世间止一曲我们掌灯,走过漫漫长夜,此刻严正以待,静等黎明到来。
  • 天行

    天行

    号称“北辰骑神”的天才玩家以自创的“牧马冲锋流”战术击败了国服第一弓手北冥雪,被誉为天纵战榜第一骑士的他,却受到小人排挤,最终离开了效力已久的银狐俱乐部。是沉沦,还是再次崛起?恰逢其时,月恒集团第四款游戏“天行”正式上线,虚拟世界再起风云!
  • 竹马他超爱吃醋

    竹马他超爱吃醋

    两年前的不辞而别,现在回来了,他却是最后一个才知道,“呵,我在你心里就这么没地位吗?”顾时:“你错了没?”东方辰:“宝贝,别生气了,我错了,榴莲键盘搓衣板,选一个”
  • 仙门遍地是奇葩

    仙门遍地是奇葩

    原来仙门竟是这般不以为耻,当真是脸皮厚到极致。师傅喜欢徒弟,徒弟却为魔界鬼祭哭得死去活来。好一个郎艳独绝,遗世独立的灵澈仙人。又好一个不知羞耻,仙门之辱的徒弟。不愧是仙门之境,遍地奇葩,魔为仙成仙,仙为魔堕魔;不疯不魔,不魔不仙(ps:纯属瞎七八扯,毫无逻辑。)
  • 天行

    天行

    号称“北辰骑神”的天才玩家以自创的“牧马冲锋流”战术击败了国服第一弓手北冥雪,被誉为天纵战榜第一骑士的他,却受到小人排挤,最终离开了效力已久的银狐俱乐部。是沉沦,还是再次崛起?恰逢其时,月恒集团第四款游戏“天行”正式上线,虚拟世界再起风云!
  • 王俊凯只愿遇一人白首

    王俊凯只愿遇一人白首

    她,父母在世,可她却感觉不到一点儿父母对她的关心,直到那天,父母对她突如其来的关心,就在她认为幸福将要开始的时候,却又让她亲眼看见他们的死亡,在他们留下的一封信中,却隐藏着一个惊天秘密……他,表面冷酷腹黑却只对她一人温柔,从与她第一次见面后,就注定他会陷入情网,无可自拔,就当他认为他们会一直在一起时,却遭到父母的反对……
  • 诸天最强万道钓皇

    诸天最强万道钓皇

    我有一钓,可钓诸天万物,名将美人、功法武技、神兵体质…诸天万界,万事万物,无物不可钓! 钓只黑狗,封为神兽,祸害四方!钓个猴子,封个先锋官,征伐西游!钓个女帝,封个……我靠,钓到一个宇宙,是什么鬼? 垂钓诸天,穿梭万界! 帝朝威震八荒,圣朝俯瞰天地,神朝永恒不朽! 叶东皇扬鞭东指,“朕有无数世界,谁与争锋?”武侠、动漫、小说、西游、洪荒,诸天万界,一切皆有可能!!!
  • 万灵镇魂碑

    万灵镇魂碑

    步虚声断一回首,十二楼台何处寻?自古至今昆仑便神秘无比,就算此时仍有十大禁地之传说。来自地球的一个青年在绝境中选择进入禁地,当青年步入禁地的那一刻,便成为了万界开启的钥匙。且看这位青年如何在这浩浩万千世界中逐步走向巅峰!书友群:979-309-426