-----------------------------------------------------------

New Message on BDOTNET

-----------------------------------------------------------
From: spark
Message 2 in Discussion


I 
think this is rather good must read on security too, its excerpts from this that 
I had posted in the previous mail :
 
    
http://www.develop.com/kbrown/book/html/book.html
 
 
 
<snip>
Part 1: The Big Picture
Item 
1: What is a non privileged user?
Item 2: 
How to develop code as a non-admin
Item 
3: What is the principal of defense in depth?
Item 4: What 
is a luring attack?

Part 2: Security Context
Item 
5: What is security context?
Item 6: What 
is a token?
Item 7: 
What is a logon session?
Item 
8: What is a window station?
Item 9: 
What is a privilege?
Item 
10: What is Thread.CurrentPrincipal?
Item 
11: How to track client identity using Thread.CurrentPrincipal
Item 12: 
How to use a privilege
Item 13: What 
is a daemon?
Item 
14: How to choose an identity for a daemon
Item 15: 
How to display a user interface from a daemon
Item 16: What 
is a service principal name (SPN)?
Item 17: How to 
use service principal names

Part 3: Misc
Item 
18: What is Kerberos?

</snip>
 
 
<snip>


  
  
    
      Item 3: What is the principal of defense in depth?
    A .NET Developer's Guide 
      to Windows Security, by Keith 
      Brown

During the Cold War, the United States wanted to learn more about Soviet 
submarine and missile technology. How fast were the Soviets progressing? What 
were the results from their ICBM tests? Even more important, were the Soviets 
working toward a first strike capability? So in October of 1971, the United 
States sent its most advanced nuclear spy submarine, the USS Halibut, 
deep into Soviet territory in the Sea of Okhotsk. Their mission? Find the 
undersea telephone cable that connected the Soviet submarine base at 
Petropavlovsk to the Soviet Pacific Fleet headquarters on the mainland at 
Vladivostok (figure .1). The mission was a success, and you can imagine the mood 
of the divers as they eavesdropped on the wire with an instrument that measured 
electromagnetic emanations. What they heard was easily understandable Russian 
conversations. No encryption. The following year, the Halibut installed a 
permanent tap on the line to record the conversations, with a plan to return in 
about a month to retrieve the records. Eventually more taps were installed on 
Soviet lines in other parts of the world. The more advanced instruments could 
store a year's worth of data. All in all, the intelligence gathered from these 
exercises helped end the Cold War, as it gave the United States a window 
directly into the Soviet mind[BMB]. 



 

Figure .1: The Sea of Okhotsk 

So what does this story have to do with computer security? It demonstrates 
what can happen when systems are designed without redundant security measures. 
The Soviets assumed that their conversations were secure simply because they 
were being carried on phone lines that were protected by perimeter defenses (the 
entrance to the Sea of Okhotsk is much more narrow than my map might first 
indicate, and could easily be defended by the Soviet navy). 

 

</snip> 

-----------------------------------------------------------

To stop getting this e-mail, or change how often it arrives, go to your E-mail 
Settings.
http://groups.msn.com/BDOTNET/_emailsettings.msnw

Need help? If you've forgotten your password, please go to Passport Member Services.
http://groups.msn.com/_passportredir.msnw?ppmprop=help

For other questions or feedback, go to our Contact Us page.
http://groups.msn.com/contact

If you do not want to receive future e-mail from this MSN group, or if you received 
this message by mistake, please click the "Remove" link below. On the pre-addressed 
e-mail message that opens, simply click "Send". Your e-mail address will be deleted 
from this group's mailing list.
mailto:[EMAIL PROTECTED]

Reply via email to