Page 34 - DCAP516_COMPUTER_SECURITY
P. 34

Computer Security




                    Notes
                                                          Figure 3.1: Example of File Checksum


































                                   5.   Intrusion detectors analyze the system audit trail, especially log-ons, connections, operating
                                        system calls, and various command parameters, for activity that could represent
                                        unauthorized activity.

                                   6.   System performance monitoring analyzes system performance logs in real time to look for
                                        availability problems, including active attacks (such as the 1988 Internet worm) and system
                                        and network slowdowns and crashes.
                                   Configuration Management


                                   From a security point of view, configuration management provides assurance that the system in
                                   operation is the correct version (configuration) of the system and that any changes to be made
                                   are reviewed for security implications. Configuration management can be used to help ensure
                                   that changes take place in an identifiable and controlled environment and that they do not
                                   unintentionally harm any of the system’s properties, including its security. Some organizations,
                                   particularly those with very large systems (such as the federal government), use a configuration
                                   control board for configuration management. When such a board exists, it is helpful to have a
                                   computer security expert participate. In any case, it is useful to have computer security officers
                                   participate in system management decision making.
                                   Changes to the system can have security implications because they may introduce or remove
                                   vulnerabilities and because significant changes may require updating the contingency plan, risk
                                   analysis, or accreditation.

                                   Trade Literature/Publications/Electronic News

                                   In addition to monitoring the system, it is useful to monitor external sources for information.
                                   Such sources as trade literature, both printed and electronic, have information about security




          28                                LOVELY PROFESSIONAL UNIVERSITY
   29   30   31   32   33   34   35   36   37   38   39