Six terminal safety

xiaoxiao2021-03-06  125

2.6 terminal safety

At present, the mainstream information security products fundamentally, there are three major defects:

1 is mainly protected from external protection, but the source of the visitor lacks corresponding control means.

2 Operating system itself lacks security, waiting to use a higher level of operating system to meet systematic security

Demand.

3 The implementation of the security is based on the subparal test detection of existing knowledge, causing the system to do more and more complex, the system has problems

The energy is not reduced, but it increases.

It should be seen that the root of many security issues is the limitations of traditional Fengnoiman architecture for system security implementation

Sex and current mainstream application operating systems' uneasity. If you don't control the root causes of unsafe problems,

Blocking, various safety measures, it is only a small small, repair, and to achieve the relative safety of the information system.

It is difficult.

If these unsafe factors are controlled from the terminal source, then the problem solving is fundamental changes.

To eliminate most of the problems currently plaguing information security, reduce the expected risks of the information system to the water that can withstand

Flat or even lower.

2.6.1 Trustful calculation

In a large information system, the security of the host (server) is often attached to it, but sometimes

It is also imposed another aspect of the problem, which is the safety of many terminal equipment. In terms of terminal safety

Aspect, several major computer hardware software giants such as Intel, IBM, Microsoft are working together, they have achieved

Big results are the concept of trustworthy computing.

Trustful computing is a security technology that combines software and hardware, which makes data stored on the computer hard drive more

Safe and reliable. Currently, trusted Computing Group has been established, it is committed to

Create an open-style software and hardware standard for trusted computing technology services, these standards will apply to PCs, servers

And PDA and other platforms. Although this technology just starts, it is foreseen that due to revolutionary reforms in terms of terminal safety.

In, this technology is very bright.

2.6.2 Design Goals

Traditional information security measures are mainly three-wheeled, do high walls, anti-processes, etc., but the final result is to prevent

Win. The main reason for producing this situation is that it is not to control the root cause of unsafe problems, while blocking in the periphery.

All invasion attacks are initiated from the PC terminal, and hackers use vulnerabilities that are attacked to steal superuser privileges.

It is destroyed; the injection of the virus is also initiated from the terminal, and the virus program uses the PC operating system to do not check the execution code.

The weakness of the consistency, embed the virus code into the execution code program, to achieve viral communication; more serious is legal

The user does not have strict access control, and the accessibility can be performed, causing an unsafe accident.

In fact, most of the current insecurity issues are caused by PC structure and operating system insecurity. If you are from the terminal

The operation platform implements high level prevention, which will be controlled from the end source. This situation is in the workflow phase

It is more important and feasible to a fixed production system.

In order to solve the unsafe of the PC architecture, fundamentally improve its security, and implement trusted worldwide

Calculation technology, 1999 by Compaq, HP, IBM, Intel and Microsoft Terminal TCPA (Trusted Compu

Ting Platform Alliance, currently developed 190 members, all over the world's mains manufacturers. TCPA Focus

The standard specification (V1.1) was released from the computing platform architecture, and the standard specification was released in January 2001. March 2003

The group is a TCG (Trusted Computing Group), its purpose is to use hardware based on calculation and communication systems

The trusted computing platform supported by the security module to improve the overall security. The trusted calculation terminal is based on the trusted platform module (TPM), which is supported by password technology, and the secure operating system is the core (shown below).

2.6.3 function

The trusted computing platform has the following functions:

Ensure the unique identity, permissions, workspace integrity / availability;

Ensure the confidentiality / integrity of storage, processing, and transmission;

Ensure hardware environment configuration, operating system kernel, service, and application integrity;

Ensure the security of key operations and storage;

Make sure the system has immunized ability, fundamentally prevents viruses and hackers.

2.6.4 composition

The safety operating system is the core and foundation of the trusted calculation terminal platform. There is no safe operating system.

Applications. Any tiny leak in the operating system will cause the disaster of the entire information system.

Production systems that are relatively fixed for workflows, information systems are mainly applied, shared services and network communications

A link consists. If each user in the information system is authenticated and authorized, its operation is in line with the regulations.

The network will not be eavesdropped and invaded, so it will not generate an aggressive accident, so that the entire information system can be guaranteed

Safety.

The trusted terminal ensures the consistency of the user's legitimacy and resources, and the user can only follow the prescribed permissions and access control.

The rules can be operated, and those who can do the right level can only do access to their identity, as long as the control rules

It is reasonable, then the entire information system resource access process is safe. The trusted terminal has laid the basis of system security

.

Safety boundary devices (such as VPN security gateways, etc.) have identity authentication and security audit capabilities, will share the server (such as

Database Server, Web Server, Mail Server, etc.) to isolate illegal visits to prevent accidental unauthorized users

Access (such as an illegal accessible non-trusted terminal). Such shared server is mainly enhanced, such as two-machine backup,

Fault tolerance, disaster recovery, etc., without having to be heavy access control, thereby reducing the pressure of the server to prevent the service attack

hit.

Network communication is fully securely secured by IPSec. IPSec works in the operating system kernel, fast, almost

To achieve the line speed processing, you can realize the full communication security protection of the destination, ensuring the authenticity and number of transport connections.

According to the confidentiality, consistency, prevent illegal eavesdropping and intrusion.

In summary, trusted application operation platform, secure shared service resource boundary protection and full-service security

Communication constitutes information security framework for workflow relatively fixed production systems.

To achieve the above-mentioned terminal, boundary, and communication effective full protection, also requires authorized management management centers and faithful

The support of the password management center.

转载请注明原文地址:https://www.9cbs.com/read-102256.html

New Post(0)