英文原文.docx

上传人:b****2 文档编号:921050 上传时间:2023-04-30 格式:DOCX 页数:13 大小:25.15KB
下载 相关 举报
英文原文.docx_第1页
第1页 / 共13页
英文原文.docx_第2页
第2页 / 共13页
英文原文.docx_第3页
第3页 / 共13页
英文原文.docx_第4页
第4页 / 共13页
英文原文.docx_第5页
第5页 / 共13页
英文原文.docx_第6页
第6页 / 共13页
英文原文.docx_第7页
第7页 / 共13页
英文原文.docx_第8页
第8页 / 共13页
英文原文.docx_第9页
第9页 / 共13页
英文原文.docx_第10页
第10页 / 共13页
英文原文.docx_第11页
第11页 / 共13页
英文原文.docx_第12页
第12页 / 共13页
英文原文.docx_第13页
第13页 / 共13页
亲,该文档总共13页,全部预览完了,如果喜欢就下载吧!
下载资源
资源描述

英文原文.docx

《英文原文.docx》由会员分享,可在线阅读,更多相关《英文原文.docx(13页珍藏版)》请在冰点文库上搜索。

英文原文.docx

英文原文

WebSecurityPrivacy&Commerce

Therunningbattlebetweenhackersandnetworksecurityprofessionalshasmovedbeyondtheperimeterfirewalltohand-to-handcombatatindividualWebandcorporateservers.

AndnewsecurityweaponshaveemergedthatuseingeniousmethodstoprotectWebsitesandcorporatenetworksfromexternalandinternalsecuritythreats.Herearesomeofthelatesttoolsatyourdisposal.

Noexit

GillianG-Serverdoesn’tcarehowthehackergotinorwhatchangestheymayhavemadetoyourWebsite.GillianExitControltechnologypreventstheworldfromseeingtheconsequencesofasecuritybreach.

GillianG-ServersitsbetweentheWebserverandtherouterorfirewallthatconnectstheWebservertotheInternet,inspectingeverypieceofcontentthatgoesout.TheExitControlG-ServercontainsacollectionofdigitalsignaturesmadefromauthorizedWebcontentduringthepublicationprocess.

Eachtimethesitecontentproducerspublishaneworrevisedobject,theG-Serversavesadigitalbackupoftheobjectalongwithadigitalsignature.

SignaturesthatdonmatchsenduparedflagwhichtriggerstheG-Servertoimmediatelyreplaceaboguspagewithasecurearchivedcopyoftheoriginal,whilesimultaneouslyalertingappropriatepersonnel.

Tripwire,Inc.TripwireforServersisasimilardataandnetworkintegrityproduct.However,TripwireforServerstakesadifferentapproach——itssoftwareisloadedontotheserverthatyouwanttoprotect.Itmonitorsallfilechanges,whethertheyoriginatefrominsideoroutsidethecompany,andreportsbackifachangeviolatespredeterminedpolicies.

Honeypotsordecoys

Honeypotsaredesignedtolureandcontainanintruderonthenetwork.Honeypotsaredecoydevicesthatcandivertattacksfromproductionsystemsandletsecurityadministratorsstudyorunderstandwhathappeningonthenetwork.

ManTrap,fromRecourse,isapowerfulhoneypotthatdeployednexttodataservers,ifitbeingusedtodeflectinternalattacks,andlocatedoffthefirewallinthedemilitarizedzone(DMZ)ifitbeingusedagainstexternalthreats.Themajorityofusersdeployitinternallytogetsuspiciousactivityundercontrol.

Inthatscenario,aManTrapserverwouldbesetuptolooklikeafileserverthatstoresintellectualpropertyorbusinessplans.AsuccessfuldeploymentofManTrapdependsonavarietyoffactorsincludingquality,namingscheme,placementandsecuritypolicy.Forexample,deceptivedefensesaremosteffectivewhendeployedinquantitiesequaltoorgreaterthanthatoftheproductionsystem.Honeypotscangetexpensivewhichiswhycompaniesmustpickandchoosethecriticalserverstheywanttoprotect.

WhatattractsanattackertoManTrapisconfiguringittomakeitlookmorevulnerablethanotherservers.Oncethehackerisonthedecoyserver,securitymanagerscanlogthehackeractivityandgaininsightintowhattheintruderistryingtoaccomplish.

Fallintothegap

Airgaptechnologyprovidesaphysicalgapbetweentrustedanduntrustednetworks,creatinganisolatedpathformovingfilesbetweenanexternalserverandacompanyinternalnetworkandsystems.VendorsincludeRVTTechnologies,SpearheadTechnologyandWhaleCommunications.

Whalee-GapWebShuttleisanonprogrammabledevicethatswitchesamemorybankbetweentwocomputerhosts.Thee-GapWebShuttlecreatesanairgapbetweentheInternetandacompanyback-officesystems.Companiesmightusee-GapWebShuttlebetweenanexternalservicerunninge-commerceapplications,suchasonlinebanking,andinternaldatabasesthatmightbequeriedbyexternalusers.

Thee-Gapsystemconsistsofthee-GapappliancethatisattachedtotwoPChosts,oneinternalandoneexternal.TheinternalhostconnectstothecompanyinternalnetworkandtheexternalhostsitsintheDMZinfrontofthefirewall.

AllURLstoWebpagesaredirectedtoamocklocationontheexternalhost.Pagesdonotactuallyresideonthishost.Theexternalhoststripsofftheprotocolheaders,extractsonlythecontentoftheSecureSocketsLayer(SSL)trafficandpassesittothee-GapWebShuttle.Thee-GapWebShuttletransportstheencrypteddatatotheinternalhostusingatogglinge-disk.Thee-GapinternalhostdecryptsSSLtraffic,authenticatestheuserandfilterstheURLcontent.ItthenpassestheURLrequesttothecompanyproductionWebserverthatresidesontheback-officenetwork.

Thefixisin

Securityandvulnerabilityassessmenttools,designedtobeusedin-house,candetectweaknessesinanorganizationsystemsbeforeproblemsoccurandcanfixthoseproblems.

Retina3.0,fromeEye,scans,monitors,alertsandautomaticallyfixesnetworksecurityvulnerabilities.TheproductworksonWindowsNT4.0SP3orhigherandWindows2000.

Thesoftwareisinstalledonanymachinewithinthenetwork.ThenetworkadministratortypesinarangeofIPaddressestoscanandpushesabutton.Theproductscansthenetworkforvulnerabilities,softwareflawsandpolicyproblemsandreportsanyvulnerabilities.

Theproduct“fixit”featureprovidesnetworkadministratorwithadescriptionofanyfoundvulnerabilities,informationonhowtofixit,oraccesstoafixitbuttonthatcanrepairthevulnerabilitylocallyorremotely.

DemolishingDoSattacks

Perhapsoneofthenewestcategoriesofsecurityisproductsthattargetdenial-of-service(DoS)attacksandmore.Bydefinition,DoSattacksmakecomputersystemsinaccessiblebyexploitingsoftwarebugsoroverloadingserversornetworkssothatlegitimateuserscannolongeraccessthoseresources.Theproductcategoryissonewthatsomeproductsarestillinbetatestoronthecuspofenteringthemarketplace.

Goingafteroneofthemostmalicioustypesofcomputervandalism,theDoSattack,areArborNetworks,ofWaltham,Mass.;MazuNetworks,ofCambridge,Mass.;andAstaNetworksinSeattle.

Mazu’ssolutiontodistributedDoSattacksworksviaintelligenttrafficanalysisandfilteringacrossthenetwork.Amonitoringdevice,suchasapacketsnifferorpacketanalyzer,evaluatespacketsonthenetworkatspeedsupto1Gbit/sec.Amonitoringdevicethendetermineswhichtrafficneedstobefilteredout.

Thegood,thebadandtheugly

Thegoodnewsaboutallofthesenewsecuritytechniquesisthattheytheoreticallyoffercompaniesadditionallayersofsecurityprotection,providingbetteroverallsecurity.Whatthisultimatelymeanstobusinessesisthatadditionalsecuritymechanismscansucceedwhereothershavefailed.Anotherplusaboutsomeofthenewproductsisthattheyareoptimizedforaparticularapplication,suchasintegrityoftheWebservers.

However,aswithanytechnology,thereareprosandconstoconsider.Infact,therearesomedownsidestoimplementingthesenewsecurityproducts.Forexample:

Theyareallincrementalsolutions,notreplacements.

Theyrequireacertainamountofexpertise.

Manyvendorsarestart-upsandthereariskastohowlongtheylbearound.

Thereaconcern,inmanyITshops,aboutaddingpreventivecontrolsbecauseofassociatedoverhead——aconcernthatcanbeeasilyremediedbyinvestinginadditionalhorsepower.

Whattoomuch?

Whendoesacompanyruntheriskbecauseofhavingtoomanyproductstomanage?

Thebottomlineisthatsecurityisneveradonedeal.Itacontinuingprocessthatanewcropofinnovativevendorsaremakingmoreinteresting.

BenevolentWorms

Althoughtheprospectofusingvirustechnologytosimplifythetaskofdeliveringpatchesandsoftwareupdatesistempting,thedangerscanoutweighthebenefitswhentheprocessistooautomated.Forexample,theimprovedWindowsUpdatefeatureinWindowsXPnowallowspatchesandupdatestobedownloadedautomatically,althoughinstallationisstillattheuser’sdiscretion.

Trojanhorses,worms,andothermaliciouscodeformshaveproventobeincrediblysuccessfulatparalyzinge-mailsystemsandInternetproviders.Itisthereforeonlylogicaltoconceiveofwaystousethemforproductivepurposes,muchastheBibleexhortsitsreaderstobeattheirswordsintoplowsharesandtheirspearsintopruninghooks.

Granted,itwouldbewonderfulifITadministratorscoulddistributepatchesandsoftwareupdatestodesktopsandserversasquicklyasane-mailviruscanspreadfromonemachinetothenext.Butissuchamagicwandreallyagoodidea?

Well,maybenotexactly.Afterall,unlikethehumanimmunesystem,whichproducesdefenses,orantibodies,automatically,thecomputermustwaitforahumantoanalyzesamplesofacomputervirus,prepareantidotesandvaccinesforthatspecificsituation,andonlythenapplythecure.

Thisobservationalonewouldseemtodiscredittheideaofa“digitalimmunesystem”thatthesecuritycommunityhastossedaroundduringthepastfewyears,butthere’sanevenmoreimportantpointtoconsider.Similartothewaythatautoimmunediseasesturnthebody’sowndefensesagainstitself,socouldoneturnaviruslikesoftwaredeliverysystemagainstitsowncomputers.Althoughitwouldbedifficulttomonkeywiththedigitalcertificatesthatwouldconceivablybeusedtoidentifytrustedpatches,it’snotimpossibletosubvertthecertificateissuingsystem,asMicrosoftandVeriSignfoundtotheirdismaylastMarch.

Ultimately,aviruslikesoftwaredeliverysystemwouldrequiresoftwarepublisherstodeliberatelyputabackdoorintotheirsystems,andfewcustomerswilltoleratethatpractice,evenundershrinkwraplicensingterms.Becausethere’snoguaranteethatsuchatemptingtargetwouldn’tbeexploitedbyhackers,anyITmanagerdeployingsuchasystemwouldbefoolhardyintheextreme.

Virusbehaviorthatstandpointgotoseefromtheoperatesystem,issomenormalbehaviors,andsayfortheoperatesystemthat

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 临时分类 > 批量上传

copyright@ 2008-2023 冰点文库 网站版权所有

经营许可证编号:鄂ICP备19020893号-2