Monitoring and Intrusion Detection
Ideally, an application of the techniques of control and monitoring is perfectly established: a security policy specifies exactly the wanted permissions and prohibitions; administrators correctly and completely declare the policy, which subsequently is fu
- PDF / 4,459,732 Bytes
- 706 Pages / 439.37 x 666.142 pts Page_size
- 55 Downloads / 229 Views
Joachim Biskup
Security in Computing Systems Challenges, Approaches and Solutions
Prof. Dr. Joachim Biskup Fakultät für Informatik Technische Universität Dortmund August-Schmidt-Str. 12 44227 Dortmund Germany [email protected]
ISBN 978-3-540-78441-8
e-ISBN 978-3-540-78442-5
Library of Congress Control Number: 2008937819 ACM Computing Classification (1998): H.1.1, E.4, E.3, D.4.6, K.6.5 © 2009 Springer-Verlag Berlin Heidelberg This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permissions for use must always be obtained from Springer-Verlag. Violations are liable for prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Cover design: KünkelLopka GmbH, Heidelberg, Germany Printed on acid-free paper 9 8 7 6 5 4 3 2 1 springer.com
Preface
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of security with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing systems, i.e., by means of computers and networks of them built on telecommunication. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ‘‘information society’’, we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously designing a ‘‘global information infrastructure’’ on a large scale as well as by appropriately configuring our personal computers on a small scale. As a result, we hope to achieve secure computing: Roughly speaking, computer-assisted activities of individuals and computer-mediated cooperation between individuals should happen as required by each party involved, and nothing else which might be harmful to any party should occur. The notion of security circumscribes many aspects, ranging from human qualities to technical enforcement. First of all, in considering the explicit security requirements of users, administrators and other persons concerned, we hope that usually all persons will follow the stated rules, but we also have to face the possibility that some persons might deviate from the wanted behavior, whether accidently or maliciously. So, in order to achieve security, we have to protect our activities and cooperations against threatening ‘‘attackers’’. Surely, however, as in everyday
Data Loading...