Biskup - Security in Computing Systems (Springer, 2009).pdf

(4790 KB) Pobierz
654383203 UNPDF
Security in Computing Systems
Joachim Biskup
Security in
Computing Systems
Challenges, Approaches and Solutions
654383203.001.png
Po. D. JoachmBskup
AugusSchmdS. 12
44227Domund
Gemany
oachmbskup@csundomundde
Fakut t f r nomak
TechnscheUnvest t Domund
SBN9783540784418
eSBN9783540784425
Lbayof Conges Conol Numbe: 2008937819
ACMCompungCacaon1998: H11, E4, E3, D46, K65
2009SpngeVeagBenHedebeg
Ths woks ubect ocopygh. Al ghs aeeeved, wheher hewhoeor pat of hemaeal s
concened, peccayheghs of anaon, epnng, eueof uaon, ecaon, boadcang,
or pas heeof s pemedonyunder hepovons of heGemanCopyght Lawof Sepember 9, 1965,
epoducononmcomor nanyoher way, andoagendaabank. Dupcaonof hs pubcaon
aeabeor poecuonunder heGemanCopyght Law.
ns cuent veon, andpemons or uemut aways beobanedomSpngeVeag. Voaons
Theueof geneal decpvename, egeedname, ademak, ec. nhs pubcaondoes not
mpy, vennheabenceof apeccaemen, hat uchnames aeexempt omheevant poecve
aws andeguaons andheeoeeeor geneal ue.
Pnedonacdeepaper
pngecom
Cover degn: KnkeLopkaGmbH, Hedebeg, Gemany
987654321
Preface
Thsmonogaphon SecurynCompungSysems:Chaenges, Approachesand
Souons amsat noducng, suveyngandassessngheundamenasof secu
y wh espect o compung. Hee, “compung” ees o al acves whch
ndvduas or goups decy or ndecy peom by means of compung sys
ems, e, bymeansof compuesandneworksofhembut oneecommunca
on. We al ae such ndvduas, wheher enhusasc or ust bowed o he
nevabe. So, aspat of henformaonsocey’, weaechaengedomanan
ourvaues, opursueourgoasandoenoceour neess, byconscousydesgn
ngagobal nformaonnfrasrucure’ onaagescaeaswel asbyappropri
aeycongungour pesonal compuesonasmal scae. Asaesu, wehopeo
achevesecurecompung: Roughyspeakng, compuer asssedacvesofndi
vduasandcompuer medaedcoopeaonbeweenndvduasshoudhappenas
equedbyeachpaynvoved, andnohngesewhchmght behamul oany
payshoudoccu.
Thenoonof secuyccumscbesmanyaspecs, angngromhumanquai
es o echncal enforcemen. Frst of a, n consderng he expct secury
requremens of users, admnsraors and oher persons concerned, we hope hat
usuayal pesonswl oowhesaedues, but weasohaveoacehepossi
by hat some persons mght devae from he waned behavo, wheher acci
deny or macousy. So, n oder o acheve secuy, we have o poect our
acvesandcooperaonsaganst hreaenngaackers’. Surey, howeve, asn
everydayfe, weasohaveoreyonust nsomeparners. Oherwse, wewoud
end up wh sayng n compee soaon and dong nohng. Second, snce we
havedeegaedanumber of aconssl ncreasngocompues, hecomponens
of a compung sysem hemseves appear as subecs: we have o decde whch
componens ae o be used and whch ones ae o be consdeed as poenal
aackers. Addonay, wheaacksareperformedbyechncal componens, usu
ayunder ousdecono, secuyenocement asohasobeachevedbyuseof
echncal componens, peeaby under our own conol or under he conol of
rusworhy persons. Fnay, we are eft wh a cenral probem of compuer sci
ence: howodesgn, mpement andveyusedcomponenswhchwl enoce
our secury requremens echncay when unnng n a poenay hose envi
onmen?
Sofa, wedonot haveeasyandfnal answes, andpobabyweshal never get
hem. Socal communcaonsarenprncpeopenoal kndsof bohpeasant and
ghenngevens, andsoaehecoespondngechncal neaconswhncom
vi Peace
pungsysems. Thus, nbohdomans, achevngsecuyappeasobeanever
endngask. Neveheess, peopehaveobanedgeat nsght nosocal communi
caonandoganzaonover cenuesandevenmennums, resungnhecon
ceps of undamenal human ghs and ndvdual sef deemnaon whn he
amewok of a baance of power n democac socees. Ceay, nsght s not
enough: t asohasobeeazed. Coespondngy, over onyheast ewdecades,
compuerscencehascoecedbascknowedgeabout compungsysems, esut
ngnaageyaccepedbodyofessenasofsecurecompungandanmpressve
coeconof appcabesecuymechansms. Agan, knowedgehasobemaei
azedwhnacual compungsysems.
Inhsbook, weconcenraeonheessenasofsecurecompungandacoec
on of he most pomsng secuy mechansms. We have a reader n mnd who
knows about compuer scence and engneeng, and who s abe and wng o
sudydeaswhchaebeyondhescopeof hsnoduconandsuveynmoe
specazedexs. Wepesent our vewof hefundamenal knowedgeabout secu
y n compung sysems, eavng moe paccal nsucons or specc sua
onsopeneheroheexperenceofhereadero, agan, ooherexs.
The maeal of hs book s oganzed no our cosseeencng pas: chal
engesandbascappoaches; undamenasof nomaonowandneencecon
o; secuymechansms, whanemphassonconol andmonongonheone
sdeandoncrypographyonheohersde; andmpemenaons. Thoughwehave
madeeveyeot omakeheext eadabensequenal orde, heeader shoud
beawarehat gengadeeperundersandngprobabyrequresoneofoowhe
crossreferencesbackandforh.
Part One, onChaengesandBascApproaches, sarswhamoredeaed
eaboaon of he noon of secuy n compung sysems, emphaszng, among
oherhngs, heagersocoechncal conext of secuy. Then, wedenynor
maonowbeweensendesandecevesasaundamenal absaconof com
pung. Thsabsaconaowsusoexpesssecuyequemensnheomof
neress of parcpans afeced by nformaon fows, and o face he nevabe
adeosnhseam. Fnay, weouneavewof compungsysemsandher
vuneabeshat shoudhepheeader oseevaoussecuyequemensand
mechansmswhnabroaderechncal conex.
Pat Two, on ‘Fundamenas of nomaon Fow and neence Cono,
examneshebascabsaconnmoedeph. West cayhempact of andhe
reevant reaonshps beween he foowng noons: messages ransmed
beweenpaes, neencesmadebysomepay, andheesungnomaongan
andknowedge. ndongso, weasoouneappopaeomazaonsnoder o
ayheoundaonsor agohmcreamens. Wearehenpreparedoundersand
nference conrol as a basc goal of engneeng secuy n compung sysems.
Sequenal pogams, paael pogams, ogcorened) nfomaon sysems n
geneal and sascal daabases n pacuar ae nspeced n un o deemne
wheher and how we can agohmcay enoce secuy by neence cono.
Fnay, weexhbt hecoseconneconbeweenheoowngevens: onheone
Zgłoś jeśli naruszono regulamin