[Home]History of Computer security

HomePage | Recent Changes | Preferences

Revision 5 . . (edit) December 11, 2001 7:45 am by Taw [spell fix]
Revision 4 . . (edit) December 11, 2001 6:23 am by Cpt
Revision 3 . . December 11, 2001 6:22 am by Cpt [introduce prevention/detection/response]
Revision 2 . . December 11, 2001 6:05 am by Taw [massive copyedit, unfortunatelly i removed lot of useful content (all is in /Talk)]
Revision 1 . . December 10, 2001 4:24 am by Dmerrill [redirecting Computer Security -> Computer security]
  

Difference (from prior major revision) (minor diff, author diff)

Changed: 1c1
Computer Security refers to the measures taken to assure that only the allowed persons can control
Computer Security refers to the measures taken to assure that only the allowed persons or processes can control

Changed: 3c3
fulfil ever more important functions and hold more valuable data and, the importance of computer security grows. Systems are constantly becoming more complex, but as it's possible to separate security-related
serve increasingly important functions and hold more valuable data and, the importance of computer security grows. Systems are constantly becoming more complex, but as its possible to separate security-related

Changed: 6c6
There are many similarities yet some fundamental differences between computer and real world security.
There are many similarities (yet many fundamental differences) between computer and real world security.

Changed: 8c8
It's also possible to protect communication by means of cryptography. One method of encryption - one-time pad is proved to be unbreakable. Unfortunatelly it's very inconvenient to use. Other methods of encryption, while breakable in theory, are often virtually impossible to break by means we have today.
It's also possible to protect communication by means of cryptography. One method of encryption - one-time pad is proved to be unbreakable. Unfortunately it's very inconvenient to use. Other methods of encryption, while breakable in theory, are often virtually impossible to break by means we have today.

Changed: 17c17
or at least goes through extensive [security audit]?, so it's usually possiible
or at least goes through extensive [security audit]?, so it's usually possible

Changed: 23c23,25
Today, computer security is composed mainly from "preventive" measures, like firewalls. We could liken a firewall to the building of a good fence around your warehouse. A good first step. But not enough if you keep the fence unguarded (no monitoring?), or if you hand a copy of the key to everybody that asks for it by phone (social engineering). If, to add insult to injury, it's widely known that you won't prosecute any trespasser, we could consider the firewall installation as almost an exercise in futility. However, many computer systems are not monitored, and the number of computer crackers to be really brought to justice is abysmally low. In that situation, it's no wonder you have no insurance; the policy would be enormous.
'Computer security' may be generally accomplished by three distinct processes: 1) Prevention, 2) Detection, and 3) Response. Firewalls are by far the most common prevention systems from a network security perspective, while [access controls]? and cryptography can protect systems and data, respectively. IDS? or [Intrustion Detection Systems]? are designed to detect network attacks in progress and/or assist in post-attack forensics, while [audit trails]? and logs? serve a similar function for individual systems. "Response" is necessarily defined by the security requirements of an individual system and may cover the range from complete destruction of the system to notification of legal authorities, counter-attacks, and the like.

Today, computer security is composed mainly from "preventative" measures, like firewalls. We could liken a firewall to the building of a good fence around your warehouse. But not enough if you keep the fence unguarded (no monitoring?), or if you hand a copy of the key to everybody that asks for it by phone (social engineering). If, to add insult to injury, it's widely known that you won't prosecute any trespasser, we could consider the firewall installation as almost an exercise in futility. However, many computer systems are not monitored, and the number of computer crackers to be really brought to justice is abysmally low. In that situation, it's no wonder you have no insurance; the policy would be enormous.

HomePage | Recent Changes | Preferences
Search: