亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? an architectural overview of unix network security.htm

?? 黑客培訓教程
?? HTM
?? 第 1 頁 / 共 4 頁
字號:
you think you have protected and may be monitoring access to thislayer within the previous layers, does not mean that use ofcomputers and other resources within your local-area networkshould become a free for all.  Again, this depends on what youidentify in your own particular security policy but, at thislayer you should do some routine checking for possible breachesof your firewall that would leave its mark at this layer and payclose attention to effective password handling, etc.  This isalso the layer of this model at which you want to concernyourself with training your users, after all this is where theycan potentially make their mistakes (and harm your network).<P><H4>3.4.1  Computer Oracle and Password System (COPS)</H4><P>     COPS is a UNIX security status checker.  Essentially what itdoes is check various files and software configurations to see ifthey have been compromised (edited to plant a trojan horse orback door), and checks to see that files have the appropriatemodes and permissions set to maintain the integrity of yoursecurity level (make sure that your file permissions don't leavethemselves wide open to attack/access).<P>     Many vendors of UNIX are now bundling a security statuschecker with the OS, usually under the nomenclature of a "C2" or"trusted system."  You may still find that this package has morefeatures than your canned package.  Compare them.<P>     Additional Comments:  The current version of COPS (1.04)makes a limited attempt to detect bugs that are posted in CERTadvisories.  Also, it has an option to generate a limited scriptthat can correct various security problems that are discovered.   Dan also offers a quick hint that should easily get you startedusing COPS.  After you have unarchived the COPS package, performthe following steps:  './reconfig', 'make', and './cops -v -s . -b bit_bucket'. -- There is a lot of README documentation includedif you need more help.<P>     Availability:  COPS can be retrieved via anonymous FTP fromcert.org in ~/pub/tools/cops.<P>   <H4>3.4.2  Chkacct</H4><P>     Chkacct [11] is a COPS for the ordinary user.  This tool ismade available to the users to run, or it is run for them onceper day.  It will do an integrity check on the status of files intheir own account and then mail them the results (such as "Dearuser:  Your .rhosts file is unsafe").  This package can help makeyour users more aware of security controls and raise their levelof participation in the program.<P>     Availability:  Chkacct is distributed with the COPS package(>= COPS 1.04), for additional information contactshabby@mentor.cs.purdue.edu.<P><H4>3.4.3  Crack</H4><P>     Crack helps the security administrator identify weakpasswords by checking for various weaknesses and attempting todecrypt them.  If Crack can figure out your password, then youmust choose a better password.  It is very likely that adetermined intruder will be able to get the password too (usingsimilar techniques, or the Crack program itself, since it ispublicly available).<P>     Availability:  Crack is available via anonymous FTP fromcert.org in ~/pub/tools/crack/crack_4.1-tar.Z.<P><H4>3.4.4  Shadow</H4><P>     The shadow password suite of programs [12] replaces thenormal password control mechanisms on your system to remove theencrypted password from the publicly readable file /etc/passwdand hides them in a place that only this program has permissionto read.  It consists of optional, configurable components,provides password aging to force users to change their passwordsonce in awhile, adds enhanced syslog logging, and can allow usersto set passwords up to a length of sixteen characters.<P>     Many vendors of UNIX are now bundling a shadow passwordsuite with the OS, usually under the nomenclature of a "C2" or"trusted system."  You may still find that this package has morefeatures than your canned package.  Compare them.<P>     Availability:  Shadow is available from USENET archiveswhich store the comp.sources.misc newsgroup.  Distribution ispermitted for all non-commercial purposes.  For more informationcontact the author, John F. Haugh III (jfh@rpp386.cactus.org).<P><H4>3.4.5  Passwd+</H4><P>     Passwd+ is a proactive password checker [13] that replaces/bin/passwd on your system.  It is rule-based and easilyconfigurable.  It prevents users from selecting a weak password   so that programs like "CRACK" can't guess it, and it providesenhanced syslog logging.<P>     Many vendors of UNIX are now bundling a proactive passwordchecker with the OS, usually under the nomenclature of a "C2" or"trusted system."  You may still find that this package has morefeatures than your canned package.  Compare them.<P>     Availability:  Passwd+ (developed by Matt Bishop) isavailable via anonymous FTP from dartmouth.edu in~/pub/passwd+tar.Z.<P><H4>3.4.6  Audit</H4><P>     Audit is a policy-driven security checker for aheterogeneous environment [14].  It is fully configurable so thatyou can set up Audit to exactly match your site's securitypolicy.  This program functionally does what COPS is intended todo, but does not hard-code your policy decisions for you the waythat COPS does.<P>     Many vendors of UNIX are now bundling an auditing subsystemwith the OS, usually under the nomenclature of a "C2" or "trustedsystem."  You may still find that this package has more featuresthan your canned package.  Compare them.  One particular subjectto note is that most (IMHO) vendors auditing subsystems onlycollect and regurgitate tons of raw data, with no guidance andassistance for using that information.  They leave that up toyou.  The Audit and/or Swatch tools are probably better.<P>     Availability:  The final version of Audit will eventually beposted to USENET.  However, the beta release will only be madeavailable on a limited basis, to larger, heterogeneous sites. Ifyour interested in participating in the beta test, send e-mail tothe auther, Bjorn Satdeva (bjorn@sysadmin.com).<P><H4>3.4.7  Miro</H4><P>     Miro [14] is a suite of tools for specifying and checkingsecurity contraints (like COPS and Audit), including a coupleprogramming languages.  It is general because it is not tied toany particular OS, and it is flexible because securityadministrators express site policies via a formal specificationlanguage.  It is easy to extend or modify a policy by simplyaugmenting or changing the specification of the current policy.<P>     Availability:  Miro is the product of a large researchproject, and to understand it you need more than the paragraphI've written above.  For more information about the Miro projectsend e-mail to (miro@cs.cmu.edu), there is even a videoavailable.  The authors Ph.D thesis, as well as the sources forthe Miro tools, are available via anonymous FTP fromftp.cs.cmu.edu.  When you connect there, type "cd/afs/cs/project/miro/ftp" and "get ftp-instructions"; this willexplain how to get the thesis and/or software.<P>   <H3>3.5  ADDITIONAL SECURITY ENHANCEMENTS</H3><p>     The tools described in firewall layers {1...4} (sections 3.1to 3.4) above, are what I consider part of a "base" set of toolsand functional requirements for general security administration.   The tools and methods described in this section are additionalmeasures that can be combined with or added to your overallsecurity program at any of the other levels.<P><H4>3.5.1  One-time Password Key-Card</H4><P>     Since reusable passwords can be captured and used/reused byintruders, consider a "one-time password" scheme.  One-timepasswords can be implemented using software-only solutions orsoftware/hardware solutions, and there are several commercialproducts available.  The following is an example of what CERTuses.  Each user is assigned a "Digital Pathways" key-card(approximately $60 per user).  When you enter your PIN code, itsupplies a password that is good only one time.  The only otherpiece to this, is software that replace the login shell on your"firewall" server.<P>     Availability:  The source-code for this shell is based oncode from the key card vendor and is currently not available tothe public domain via anonymous FTP.  For additional informationabout this, send e-mail to (cert@cert.org).<P><H4>3.5.2  Privacy Enhanced Mail (PEM)</H4><P>     PEM is a RSA-based encryption scheme that encrypts sensitiveinformation, but more than that it checks for message integrityand non-repudiation of origin, so that the originator cannot denyhaving sent the message. PEM is actually a protocol that isdesigned to allow use of symmetric (private-key) and asymmetric(public-key) cryptography methods.  In this example, TrustedInformation Systems, Inc. (TIS) has implemented a PEM packageusing the public-key technique together with the Rand MH MessageHandling System (version 6.7.2).  TIS/PEM libraries [16] can beadapted for implementation of non-mail applications as well.<P>     Availability:  TIS/PEM is a commercially available product,for additional information send e-mail to (pem-info@tis.com).<P><H4>3.5.3  Kerberos</H4><P>     Kerberos is a DES-based encryption scheme that encryptssensitive information, such as passwords, sent via the networkfrom client software to the server daemon process. The networkservices will automatically make requests to the Kerberos serverfor permission "tickets."  You will need to have the source toyour client/server programs so that you can use the Kerberoslibraries to build new applications.  Since Kerberos tickets arecached locally in /tmp, if there is more than one user on a givenworkstation, then a possibility for a collision exists.  Kerberosalso relies upon the system time to operate, therefore it shouldbe enhanced in the future to include a secure time server (timedis not appropriate). There are two versions of Kerberos, one forOSF ported by HP, and one BSD-based developed by the author.<P>     Availability:  Kerberos is distributed via anonymous FTPfrom athena-dist.mit.edu in ~/pub/kerberos or ~/pub/kerberos5.<P><H4>3.5.4  Private-Key Certificates</H4><P>     This is not really a product, but rather a design proposal[17] that is an alternative method to PEM for adding networksecurity to applications such as mail. Simply put, it uses thepublic-key style of implementation with private-key cryptography.   It can be adapted to different types of applications and it isboilerplate so that you can essentially plug-in any encryptionalgorithm.  This is designed so that public-key protocols nolonger have to rely on public-key encryption.<P>     Availability:  Unknown.  For more information, contact DonDavis, at Geer Zolot Assoc., Boston, MA (formerly of ProjectAthena at MIT).  His paper "Network Security via Private-KeyCertificates" better describes this techique.<P><H4>3.5.5  Multilevel Security (MLS)</H4><P>     After you've done everything else (above) to make your   network secure, then MLS will probably be one of your nextlogical steps.  That doesn't mean you have to wait until you'vedone everything else before implementing MLS, it's just (IMHO)that you would be wasting your time to go to the n'th degreebefore covering the fundamentals.  However, if you are just nowdeciding to which variant of the UNIX operating system to buy,consider buying an MLS variant now.  After you configure it tomanage your security policy, go back through layers {1...4} tosee what you might add to make it more secure in a networkedenvironment.  Many UNIX vendors are now shipping or preparing toship a MLS version.  A couple examples that immediately come tomind is SecureWare CMW+ 2.2 (based on A/UX or SCO ODT 1.1) andAT&T USL System V-Release 4-Version 2-Enhanced Security(SVR4.2ES).<P>     For additional information regarding MLS implementationswithin the Department of Defense (DoD), contact Charles West at(703) 696-1891, Multilevel Security Technology Insertion Program(MLS TIP), Defense Information Systems Agency (DISA).<P>     For additional information regarding SecureWare CMW+, sende-mail to info@sware.com.  For additional information regardingAT&T USL SVR4.2ES, send e-mail to fate@usl.com.<P><H4>3.5.6  File Encryption</H4><P>     Users should get into the habit of encrypting sensitivefiles whenever they are stored in a public place or transmittedvia public communication circuits. File encryption isn'tbulletproof, but it is better than clear text for sensitiveinformation.  The UNIX crypt utility is the least secure of thesetools, since it can be broken using well-known decryptiontechniques.  The UNIX des utility (US export restriction apply)is more secure.  It has not been known to be broken, however DoDdoes not sanction its use for transmitting classified material.   A new UNIX tool PGP 2.2 is available (uses RSA encryption),however there may be licensing issues to be concerned with.<P><H4>3.5.7  Secure Programming Methods</H4><P>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
精品对白一区国产伦| 欧美午夜理伦三级在线观看| 久久综合色播五月| 国产专区综合网| 久久久久久久久久久黄色| 国产精品一区二区在线播放| 国产精品婷婷午夜在线观看| 色婷婷国产精品| 日本一不卡视频| 国产欧美一区二区三区在线看蜜臀| 成人av在线影院| 亚洲一二三区不卡| 欧美一级xxx| 国产成人午夜电影网| 亚洲欧美另类图片小说| 欧美高清www午色夜在线视频| 美腿丝袜亚洲综合| 国产精品国产自产拍高清av| 欧美写真视频网站| 国内精品国产成人国产三级粉色| 国产精品高潮久久久久无| 欧美在线观看视频在线| 精品无人区卡一卡二卡三乱码免费卡| 久久久久久免费网| 色综合激情久久| 激情五月播播久久久精品| 亚洲欧美精品午睡沙发| 日韩欧美在线影院| av亚洲精华国产精华精华| 日韩精品亚洲一区| 亚洲欧洲99久久| 日韩一级视频免费观看在线| 99视频热这里只有精品免费| 毛片av一区二区三区| 亚洲三级久久久| 欧美一激情一区二区三区| 91亚洲精品乱码久久久久久蜜桃 | 欧美性受xxxx| 国产一区不卡在线| 丝袜诱惑亚洲看片| 亚洲美女视频一区| 久久精子c满五个校花| 欧美日韩视频一区二区| 成人黄动漫网站免费app| 美女视频免费一区| 香蕉乱码成人久久天堂爱免费| 国产日韩欧美综合在线| 日韩三级.com| 欧美久久久久久久久久| 日本乱码高清不卡字幕| 成人晚上爱看视频| 九九**精品视频免费播放| 亚洲电影第三页| 亚洲最新在线观看| 国产精品短视频| 中文成人av在线| 国产欧美精品国产国产专区| 日韩西西人体444www| 欧美日本不卡视频| 欧美自拍偷拍午夜视频| 91丨porny丨户外露出| 国产成人精品aa毛片| 极品少妇xxxx精品少妇偷拍| 日本最新不卡在线| 亚洲国产日韩综合久久精品| 亚洲专区一二三| 一区二区在线免费观看| 亚洲美女在线一区| 日韩伦理av电影| 亚洲欧美日韩系列| 亚洲乱码一区二区三区在线观看| 亚洲视频一区在线| 亚洲三级在线看| 夜夜嗨av一区二区三区网页| 亚洲精品精品亚洲| 亚洲成人免费看| 日日夜夜免费精品| 美国欧美日韩国产在线播放| 久久超碰97人人做人人爱| 日本vs亚洲vs韩国一区三区二区 | 久久日韩粉嫩一区二区三区 | 欧美激情一区二区在线| 欧美激情综合五月色丁香小说| 久久精品一区二区| 亚洲国产成人在线| 最新成人av在线| 亚洲一区二区三区中文字幕 | 国产一区二区久久| 国产精品一级片| 床上的激情91.| 91丨porny丨最新| 欧美日本一区二区三区| 日韩欧美一区中文| 久久精品亚洲精品国产欧美| 欧美国产日韩a欧美在线观看 | 精品国产乱码久久久久久1区2区| 欧美精品一区二区高清在线观看| 久久久99精品久久| 亚洲视频在线一区观看| 亚洲成人7777| 寂寞少妇一区二区三区| 99精品国产视频| 欧美伦理视频网站| 国产日韩高清在线| 一区二区三区在线观看动漫| 国产盗摄一区二区三区| 成人91在线观看| 欧美区视频在线观看| 国产性天天综合网| 一区二区成人在线| 狠狠色丁香婷综合久久| 91影院在线免费观看| 日韩欧美一级在线播放| 中文字幕 久热精品 视频在线 | 日韩欧美黄色影院| 国产精品国产自产拍高清av| 五月天一区二区| 成人黄动漫网站免费app| 欧美麻豆精品久久久久久| 欧美国产禁国产网站cc| 午夜视频久久久久久| 丁香啪啪综合成人亚洲小说| 欧美男生操女生| 国产精品成人免费| 久久国产日韩欧美精品| 99re亚洲国产精品| 精品不卡在线视频| 亚洲一区二区三区在线播放| 懂色av一区二区三区免费看| 欧美电影影音先锋| 亚洲乱码中文字幕| 国产成人h网站| 欧美一级日韩一级| 亚洲影院理伦片| av不卡一区二区三区| 26uuu久久综合| 天天操天天干天天综合网| 成人午夜私人影院| 欧美精品一区二区三区蜜桃| 亚洲成人av电影在线| 91看片淫黄大片一级在线观看| 久久伊人蜜桃av一区二区| 亚洲福利一区二区| 日本道色综合久久| 中文字幕制服丝袜一区二区三区| 免费视频一区二区| 欧美日韩激情一区二区三区| 亚洲天天做日日做天天谢日日欢| 国内精品久久久久影院薰衣草| 欧美一区二区三区在线看| 亚洲一区二区三区四区在线 | 成人黄色av网站在线| 精品国产自在久精品国产| 五月天丁香久久| 欧美影院一区二区| 一区二区三区不卡视频在线观看| av电影天堂一区二区在线 | 91精品午夜视频| 亚洲a一区二区| 精品视频1区2区3区| 一区二区三区小说| 91久久免费观看| 亚洲精品写真福利| 91成人在线观看喷潮| 一区二区免费看| 欧美亚洲国产一区二区三区| 亚洲精品一二三四区| 91麻豆swag| 亚洲高清免费一级二级三级| 欧美三级韩国三级日本三斤| 亚洲一区二区欧美激情| 欧美日韩国产乱码电影| 日韩国产精品大片| 日韩视频永久免费| 狠狠v欧美v日韩v亚洲ⅴ| 国产婷婷色一区二区三区四区 | 精品福利二区三区| 国产精品99久久久久久宅男| 欧美激情资源网| 99国产欧美另类久久久精品| 亚洲欧美日韩一区二区 | 日韩av不卡一区二区| 欧美成人精品3d动漫h| 国产在线看一区| 国产精品女主播在线观看| 色婷婷精品久久二区二区蜜臀av| 亚洲不卡一区二区三区| 欧美一区二区三区不卡| 国产一区亚洲一区| 亚洲欧美偷拍另类a∨色屁股| 欧美自拍丝袜亚洲| 久久99国产精品麻豆| 国产精品久久久久天堂| 欧美日韩一区二区三区高清| 日韩av中文字幕一区二区| 久久九九国产精品| 色欧美日韩亚洲| 免费成人深夜小野草| 国产精品久线观看视频| 欧美另类videos死尸|