Security evaluation of Unix networks
Brown, Thomas L.
Jones, Carl R.
MetadataShow full item record
In recent years, computer networks have significantly increased in both complexity and number, and these networks are attractive targets for attack and intrusion. Unix networks being managed by the government and providing access to unclassified sensitive information are particularly vulnerable to attack. Ensuring the security of sensitive information will be one of the single most important management issues in computer/information security in the foreseeable future. Unfortunately, the number of automated security tools for Unix, as well as the number of computer security experts within DOD, has not increased sufficiently to keep up with the improvements in technology. The author proposes the concept of a security toolbox, containing a proposed standard set of automated security tools, to support Unix networks. The toolbox can be used to enhance system security, automating many of the security related tasks required of the network administrator. Additionally, organizational changes will be necessary to improve the availability of computer security advice and assistance. It is recommended that a study of the function and organization of computer security expertise be conducted, so that access to and validation of security tools, along with consistent guidance for network administrators and security officers, can be accomplished effectively. The combination of a security toolbox and expert advice can then help bridge the gap in the development of computer security expertise.Security evaluation of Unix networks.
Approved for public release, distribution is unlimited.
Showing items related by title, author, creator and subject.
Falby, Naomi; Thompson, Michael F.; Irvine, Cynthia E. (IEEE, 2004-06-00);The Center for the Information Systems Studies and Research (CISR) at the Naval Postgraduate School has established a broad program in computer and network security education. The program, founded on a core in traditional ...
Irvine, Cynthia E.; Thompson, Michael (Informing Science and Information Technology Joint Conference, 2003-06-24);This paper describes a computer simulation game being developed to teach computer security principles. The player of the game constructs computer networks and makes choices affecting the ability of these networks and the ...
Computer wireless networks : a design plan for building wireless networks using IEEE 802.11 standard Almantheri, Hamed (Monterey, California. Naval Postgraduate School, 2003-03);In spite of the fact that wireless network technology has been available for long period of time, there has been very limited wireless networks deployments around the world before 1997 due to the lack of widely recognized ...