Security for Dial Up Lines
Describes a set of solutions to the problem of intrusion into government and private computers via dial-up telephone lines, the so-called "hacker problem". Includes: adequate controls, common communications weaknesses, software approaches, hardware protection, "one-end" protection, "two-end" protection, and recommended courses of action. Appendices list devices presently available.
What people are saying - Write a review
We haven't found any reviews in the usual places.
_ l _ access attempts Access Control Matrix algorithm approach attack call-back canputer challenge circuitry communications link communications port communications security computer system computer's cost Datacom described determmined DEVICES PRODUCT VENDOR dial-up access dial-up circuit dial-up intruders dial-up ports dial-up security dial—up communications dial—up lines disclosure encryption key external files FIPSllZ gain access hackers hand-held Hardware Communications Protection hardware protection hardware security devices host computer host end identify Inmac install large number legitimate user line encryption message authentication minicomputers needed North Haven one-end operating system perform permit personal computers port protection devices potential problem require the user security capability security features security modems security weakness sign-on attempts specific standard system access control system logging system manager system security administrator Table techniques terminal authentication devices two-end typical unauthorized user authentication user connection user or terminal user terminal user's
Page 7-29 - Security of Personal Computer Systems: A Management Guide, (NBS Special Publication 500-120, US Dept.
Page 7-27 - FIPS PUB 31, Guidelines for Automatic Data Processing Physical Security and Risk Management; (2) FIPS PUB 39, Glossary for Computers Systems Security; (3) FIPS PUB 41, Computer Security Guidelines for Implementing the Privacy Act of 1974; (4) FIPS PUB 46, Data Encryption Standard; (5) FIPS PUB 48.
Page 7-27 - FIPS PUB 31 (Guidelines for Automatic Data Processing Physical Security and Risk Management) and FIPS PUB 41 (Computer Security Guidelines for Implementing the Privacy Act of 1974) provide guidance for making such an analysis.
Page 7-27 - FIPS PUB 48. Guidelines on Evaluation of Techniques for Automated Personnel Identification; (6) FIPS PUB 65, Guideline for Automatic Data Processing Risk Analyses; (7) FIPS PUB 73. Guidelines for Security of Computer Applications...
Page 7-27 - FIPS PUB 48 GUIDELINES ON EVALUATION OF TECHNIQUES FOR AUTOMATED PERSONAL IDENTIFICATION...
Page 7-28 - Good Security Practices for Personal Computers." Computer Security Journal Fall/Winter (1983): 77-83. Murray, William H. "Good Security Practices for Dial-Up Systems.
Page iii - ... Integrity and Efficiency (PCIE), and contains bibliographies, and a description of pertinent laws and regulations. NBS SPEC PUB SECURITY FOR DIAL-UP LINES 500-137 By Eugene F. Troy May 1986 Ways to protect computers from intruders via dialup telephone lines are discussed in this guide. Highlighted are hardware devices which can be fitted to computers or used with their dial-up terminals to provide communications protection for non-classified computer systems. Six different types of hardware devices...
Page 7-29 - Call-Back Security System Prevents Unauthorized Computer Access," Mini-Micro Systems, July, l984, pp.
Page 7-28 - SN 003-003-01891-1 $3.00 Includes papers and summaries of presentations made at a 1977 conference on computer security. Subject areas are physical security, risk assessment, software security, computer network security, applications and implementation of the Data Encryption Standard. Considerations in the Selection of Security Measures of Automatic Data Processing Systems By Michel J.Orceyre and Robert H.