資源描述:
《management of computing and information systems--- security and protectionnew》由會員上傳分享,免費在線閱讀,更多相關(guān)內(nèi)容在教育資源-天天文庫。
1、SECURITYCONCEPTSFORCORPORATENETWORKSRolfOppligerDieterHogrefeUniversityofBerneInstituteforComputerScienceandAppliedMathematicsLanggassstrasse51CH-3012Berne,SwitzerlandTel.+41316314903Fax.+41316313965Internet:foppliger,hogrefeg@iam.unibe.chCRCategoryandSubjectDescriptor:C.2.0[ComputerSystemsOrga
2、niza-tion]:Computer-CommunicationNetworks
3、general;K.6.5[ComputingMilieux]ManagementofComputingandInformationSystems
4、securityandprotectionGeneralTerms:Management,Security,StandardizationAdditionalKeyWords:CorporateNetwork,OSI,SecurityArchitectureAbstractThecurrent,widespreaduseofcomputernetworks
5、hasledtoincreasedconcernsaboutsecurity.Thispaperdealswithnetworksecurityingeneral,andconcentratesoncorporatenetworksinparticular.Amethodtodevelopsecurityconceptsforcorporatenetworksisintroduced,andstepwiserened.11IntroductionItisassumedthatthereaderofthispaperisfamiliarwiththefundamentalsofcom
6、puternetworks,opensystems,andOSInetworks.Acomputernetworkconsistsofinterconnectedcomputersystemsthatcaneitherbeclosedoropen.Closedsy-stemsareproprietary,usuallybeingabletocommunicateonlywithsystemsofthesamemanufacturer.Inusingstandardizedprotocolstoprovidestandardizedservi-ces,opensystemsarefre
7、etocommunicatewithotheropensystems,forminganOSInetwork(OpenSystemsInterconnection).OSIstandardsarebeingdevelopedbytheJointTechnicalCommittee1(JTC1)oftheInternationalStandardsOrganization(ISO),andtheInternationalElectrotechnicalCommission(IEC).Corporatenetworksusepublicservicestointerconnectgeog
8、raphicallydistributedlocalareanetworksandprivatebranchexchanges.Publicservicesareoeredinwideareanetworks;examplesareleasedlines,circuitswitchedlines,andservicesthatareprovidedinpacketswitcheddatanetworks[OS94].Asecurityconceptisneededtomakeacorporatenetworkcomparablysecure[Opp92,OH92,OH93].Ame
9、thodtodevelopsecurityconceptsforcorporatenetworksisintroducedinthispaper.Itisorganizedasfollows:Possibleattacksareoutlinedinsectiontwo.Themethodisshortlydescribedinsectionthree,andstepwiserenedinsectionsfourandve.Conclusionsared