登陆注册
23770800000071

第71章 Computer Security(1)

9.1 Internet Security

Anyone responsible for the security of a trusted network will be concerned when connecting it to a distrusted network. In the case of connections to the Internet this concern may be based largely on anecdotal evidence gleaned from widespread media coverage of security breaches. A closer inspection of the facts and statistics behind some of the media coverage will, however, only serve to deepen that concern. For example, the US National Computer Security Agency (NCSA) asserts that most attacks to computer systems go undetected and unreported, citing attacks made against 9000 Department of Defense computers by the US Defense Information Systems Agency (DISA). These attacks had an 88 percent success rate and went undetected by more than 95 percent of the target organizations. Only 5 percent of the 5 percent that detected an attack, a mere 22 sites, reacted to it.

Despite fears about security, organizations are increasingly coming to regard a presence on the Internet as an important part of their strategic planning. Security concerns will not be allowed to prevent organizations from exploiting the commercial opportunities the Internet is perceived to offer. As a result organizations have to find ways to manage tile security issue. This ties growth in the Internet security market directly to growth in the Internet. The compound annual growth rate (CAGR) of the Internet firewall market between 1995 and 2000 is projected to be 174% driven by rapid growth of both the Internet and Intranets. The most significant trend driving this growth is the rapid and aggressive deployment of World Wide Web servers for both Internet and Intranet use. Unit shipments of web server software are expected to grow from 127,000 units in 1995 to just more than 5 million units in 2000. Although the IT industry has traditionally enjoyed rapid development this level of growth is unprecedented.

Encryption Techniques

Encryption is tile way to solve tile data security problem. There are two kinds of encryption techniques-symmetric key encryption and asymmetric key encryption.

For symmetric key encryption, both parties should have a consensus about a secret encryption key. When A wants to send a message to B, A uses the secret key to encrypt tile message. After receiving the encrypted message, B uses the same (or derived) secret key to decrypt the message. The advantage of using symmetric key encryption lies in its fast encryption and decryption processes (when compared with asymmetric key encryption at the same security level). The disadvantages are, first, the encryption key must be exchanged between two parties in a secure way before sending secret messages. Secondly, we must use different keys with different parties. For example, if A communicates with B, C, D and E, A should use 4 different keys. Otherwise, B will know what A and C as well as A and D has been talking about. The drawbacks of symmetric key encryption make it unsuitable to be used in the Internet, because it’s difficult to find a secure way to exchange the encryption key.

For asymmetric key encryption, there is a pair of keys for each party: a public key and a private key. The public key is freely available to the public, but only the key owner gets hold of the private key. Messages encrypted by a public key can only be decrypted by its corresponding private key, and vice versa. When A sends message to B, A first gets B’s public key to encrypt the message and sends it to B. After receiving the message, B uses his private key to decrypt the message. The advantage comes in the public key freely available to the public, hence free from any key exchange problem.

The disadvantage is the slow encryption and decryption process. Almost all encryption schemes used in the Internet uses asymmetric key encryption for exchanging the symmetric encryption key, and symmetric encryption for better performance. Asymmetric key cryptography seems to attain secrecy in data transmission, but the authentication problem still exists. Consider the following scenario: when A sends a message to B, A gets B’s public key from the internet--but how can A know the public key obtained actually belongs to B? Digital certificate emerges to solve this problem.

Authentication

Digital certificate is an identity card counterpart in the computer society. When a person wants to get a digital certificate, he generates his own key pair, gives the public key as well as some proof of his identification to the Certificate Authority (CA). CA will check the person’s identification to assure the identity of the applicant. If the applicant is really the one “who claims to be”, CA will issue a digital certificate, with the applicant’s name, e-mail address and the applicant’s public key, which is also signed digitally with the CA’s private key. When A wants to send B a message, instead of getting B’s public key, A now has to get B’s digital certificate. A first checks the certificate authority’s signature with the CA’s public key to make sure it’s a trustworthy certificate. Then A obtains B’s public key from the certificate, and uses it to encrypt message and sends to B.

Authentication is an important part of everyday life. The lack of strong authentication has inhibited the development of electronic commerce. It is still necessary for contracts, legal documents and official letters to be produced on paper Strong authentication is then, a key requirement if the Internet is to be used for electronic commerce. Strong authentication is generally based on modem equivalents of the one time pad. For example, tokens are used in place of one time pads and are stored on smart cards or disks.

Firewall

同类推荐
  • 课外英语-七彩音符时不我待(双语版)

    课外英语-七彩音符时不我待(双语版)

    本书收录了世界经典英文歌曲,其中包括常青的爱、昔日恋情、无心快语、克莱门泰等多首脍炙人口的歌曲,每首歌曲都有中英文歌词、语言点解析及注释赏析。
  • 双语学习丛书-爱的交融

    双语学习丛书-爱的交融

    流淌心灵的隽语,记忆的箴言,在双语的世界里,感受英语学习的乐趣,体会英语学习的奥妙,提高英语学习的能力!丛书包括:爱的交融、财富精英、成长课堂、醇香母爱、父爱如山、故乡情怀、节日趣闻、快乐心语、浪漫往昔等故事。
  • 人性的弱点全集(英文朗读版)

    人性的弱点全集(英文朗读版)

    HowtoWinFriends&InfluencePeopleisthegrandfatherofallpeople-skillsbooks,whichwasfirstpublishedin1937.Itwasanovernighthit,eventuallyselling15millioncopies.DalecarnegiehadanunderstandingofhumannaturethatwillneverbeoutdatedFormorethansixtyyearsthero……
  • 英语PARTY——爱的港湾

    英语PARTY——爱的港湾

    本套书籍带你领略英语世界风景,感悟英语学习氛围,有助于英语学习。
  • 有一种智慧叫包容

    有一种智慧叫包容

    非凡的人生不是无根之木,更不是无源之水。它需要你永不满足,永不懈怠,永不疲倦,永不怯懦,执着地向人生的更高处攀登。你若是一道清渠,生活便是泉眼,把智慧的活水注入了你的血脉;你若是一棵绿树,生活便是土壤,把智慧的矿藏送进你的根系;你若是一弯虹桥,生活便是阳光,把智慧的颜料涂上你的躯体。
热门推荐
  • 汉城攻略

    汉城攻略

    时间与空间的相隔,他是否能回到她们的身边?身份与世界的距离,又是否能斩断他与她之间的羁绊?他,英俊潇洒。她,娇小可人。一座喧嚣的城,两颗寂寞的心,上演了怎样一曲爱恨情仇,尽在《汉城攻略》——以上这段引援于芒果台8点档的电视剧预告,连我也不知道在说什么的简介你就当真的看。一个赏金猎人在汉城(现首尔)的故事。
  • 恋上你的唇

    恋上你的唇

    冰冷的他只会对她温柔,孤傲的她只会对他微笑。这一切是否事出有因?他凭什么对她情有独钟?害怕与惶恐令她畏惧,可当她真正敞开心扉后,他却变得若即若离,是爱还是放开,她迷茫抉择,而他又为何如此反复无常?原来一切都是有理由的!
  • 青春,永不散场

    青春,永不散场

    谁的青春不迷茫,其实我们都一样。六月我们将分道扬镳,那么,五月就让我们在一起嗨翻青春!「我只是一个记录者,一切都是事实」
  • 国土苍穹

    国土苍穹

    国土虽大,但不容一分他有。万里海疆,没有一寸多余,不容一分他囊。生而为国死,死而为国魂,驱除四方鞑虏,荣耀华夏九州。……………………………………………………不是军事YY,也不种马,主角虽然牛叉,但不逆天,只想以此文向那些最可爱的人致敬,爱你伟大的祖国。
  • 异术狂少

    异术狂少

    一个高中的学生,得不到心目中女神的芳心,一次偶然的机会,他从一位老人那里得到一本古书,从此大逆转,波霸的开放少女,冷艳的大小姐,心目中的女神蜂拥而来,一人闯荡层层难关,重振雄风....更多精彩,尽在异术狂少
  • 盏青灯

    盏青灯

    如果说没有接触到深深的恐惧,就不会对生命如此的热衷。重生了一次的秦澈,对自己的生命便非常的热爱。(不喜勿喷,谢谢合作)
  • 媚世妖娆

    媚世妖娆

    一个美女杀手穿越到了紫罗大陆明轩国丞相府的废物、丑陋、懦弱的七小姐叶璃,看她如何过关斩将,越挫越勇,最终踏上强者之路!只是,叶璃瞳内心无事就喜欢挑逗男子的习惯,就这么赤裸裸地展现出来,这可让让邪帝黑了脸啊!
  • 9号杀手

    9号杀手

    小九,如果哪一天我失踪了,你不要去找我,好吗?不,雯雯姐,我一定会找到你。如果有人阻挡我,我会杀了他;如果有组织阻挡我,我会瓦解他;如果有国家阻挡我,我会颠覆他;我一定会找到你,和你幸福的生活在一起。
  • 仙末时代

    仙末时代

    始源之地,一株通天古树强夺天地造化,生生截断了所有后来者的修炼之路,就此拉开了仙末时代的序幕。若干年后,一枚古蛋因缘际会横空出世,在这武道衰落的时代悄然孵化……
  • 泪断重逢

    泪断重逢

    虽然我知道可能不会有人看我这稚嫩的文笔,但我仅为了纪念一段感情。一段咎由自取的感情,一段平凡的感情。