Security in Distributed Computing

Did You Lock the Door?

Glen Bruce, Rob Dempsey

Publisher: Prentice Hall, 1997, 456 pages

ISBN: 0-13-182908-4

Keywords: IT Security

Last modified: May 13, 2021, 9:47 a.m.

Practical techniques for securing distributed computing systems.

Computing security is, at its core, more than a technical issue: It's a fundamental business challenge. Managers have plenty of security alternatives, but little real guidance on making intelligent decisions about them. And today's distributed, multivendor, Internet-connected environments encompass more insecure systems and networks than ever before.

Security in Distributed Computing offers the manager of distributed systems a thorough common-sense framework for cost-effective computer security. Learn how to:

  • Develop distributed systems architectures and methodologies that are inherently more secure.
  • Build trusted, Open-System based distributed transaction processing systems
  • Evaluate cost vs. risk. What is worth securing, and at what price?
  • Consider human and organizational factors, so you can enhance security with minimum disruption to people and processes

This book reviews critical risk areas in distributed systems, including networks, operating systems, applications, middleware, and the Internet. It considers the unique challenges of security in UNIX and Windows NT environments. And it presents detailed information about technologies that can help you respond, including:

  • Cryptography
  • The Kerberos authentication model
  • DCE security

Security in Distributed Computing also presents valuable, in-depth recommendations of how to design and implement a security strategy.

The more your organization comes to rely on distributed systems, the more important security will become. When you need to make important business decisions about security, you'll appreciate the practical advice and insight this book delivers.

  • Part I: Understanding the Problem
    1. Computing Security — A Business Issue
      • Business Drivers
      • Business Issues
      • Summary
    2. Distributed Security Challenges
      • Stories
      • Security Issues
      • The Top Ten List
      • Conclusions
  • Part II: Foundations
    1. Computing Security Basics
      • What is Security?
      • Trust — What Is It?
      • Trust — Why Do We Need IT?
      • Summary
    2. Security Architecture
      • Foundation
      • Trust
      • Control
      • Summary
    3. Foundations
      • Principles
      • Security Policy Framework
      • Security Criteria
      • Summary
    4. Security Policy
      • Security Policy Framework
      • Example of a Policy
      • The Process of Creating Policies
      • Summary
  • Part III: Technologies
    1. The Networks
      • A Tale of Two Networks
      • Systems Network Architecture
      • Introducing TCP/IP
      • SNA versus TCP/IP Security
      • Conclusions
    2. Network Operating Systems
      • About Network Operating Systems?
      • Issues Surrounding NOS Implementations
      • Conclusions
    3. Client/Server and Middleware
      • Client/Server
      • Middleware
      • Enabling Technology
      • Distributed Objects
      • Things to Watch Out For
      • Summary
    4. UNIX Security
      • Why has UNIX Such a Bad Reputation for Security?
      • UNIX Security
      • Typical Abuses
      • Conclusions
    5. More UNIX Security
      • UNIX Network Services
      • A Burglar's Tools
      • Conclusions
    6. UNIX Solutions
      • Control Monitors
      • Conclusions
    7. Windows NT Security
      • Security Controls
      • Networking
      • Conclusions
    8. The Internet
      • What is the Internet?
      • Internet Firewall
      • Conclusions
    9. Cryptography
      • Private Key Encryption
      • Public Key Encryption
      • Encryption Issues
      • Digital Signature
      • Summary
    10. The DCE Environment
      • What is DCE?
      • Concerns about DCE
      • Conclusions
    11. DCE Security Concepts
      • DCE Authentication
      • Authorization
      • Is DCE Bulletproof?
      • Conclusions
    12. Distributed Database
      • What Is a RDBMS?
      • Different Models to Enable Applications
      • Issues Surrounding RDBMS
      • What Is a Data Warehouse?
      • Conclusions
    13. On-Line Transaction Processing
      • What Is a Transaction?
      • Component of a Transaction Processing System
      • The Top Five List
      • Summary
  • Part IV: Solving the Problem
    1. Secure Applications
      • Concepts
      • System Development Life Cycle
      • Summary
    2. Implementation Examples
      • Electronic Mail
      • Lotus Notes
      • What's Next
      • Summary
    3. Security Management
      • Systems Management
      • Network Management
      • Conclusions
    4. Developing a Security Strategy
      • A Security Strategy
      • The Security Strategy Roadmap
      • Conclusions
    5. Auditing
      • What Is an Audit?
      • What Role Should Audit Play?
      • Sample Criteria for UNIX Audit
      • The Basics of Computer Auditing
      • Expanding the Focus
      • Other Types of Audits
      • Conclusions
    6. The Future
  1. Strong AUthentication
  2. Smart Cards
  3. Personal Computer Security
  4. Remote Access
    • Viruses
    • Personal Computer Access Controls
    • How Far Should Security Be Extended?
    • Conclusions

Reviews

Security in Distributed Computing

Reviewed by Roland Buresund

Mediocre **** (4 out of 10)

Last modified: May 21, 2007, 3:23 a.m.

I've mixed feelings about this book. It has the right structure, tells you about approx. the right stuff, but has very little real content.

Comments

There are currently no comments

New Comment

required

required (not published)

optional

required

captcha

required