1.1 What Is Computer Security?
Terms like security,
protection, and privacy
often have more than one meaning. Even professionals who work in
information security do not agree on exactly what these terms mean.
The focus of this book is not on formal definitions and theoretical
models so much as it is on practical, useful information. Therefore,
we'll use an operational definition of security and
go from there.
COMPUTER
SECURITY. A computer is
secure if you can depend on it and its software to behave as you
expect.
If you expect the data entered into your machine today to be there in
a few weeks, and to remain unread by anyone who is not supposed to
read it, then the machine is secure. This concept is often called
trust:
you trust the system to preserve and protect your data.
By this definition, natural disasters and
buggy software are as
much threats to security as unauthorized users are. This definition
is obviously true from a practical standpoint. Whether your data is
erased by a vengeful employee, a random virus, an unexpected bug, or
a lightning strike—the data is still gone.
That's why the word
"practical" is in the title of this
book—and why we won't try to be more specific
about defining what "security" is,
exactly. A formal definition wouldn't necessarily
help you any more than our working definition, and would require
detailed explanations of risk assessment, asset valuation, policy
formation, and a number of other topics beyond what we are able to
present here.
Our practical definition also implies that security is also concerned
with issues of testing, quality assurance, hardware reliability, and
even human factors. And in fact, these issues are increasingly of
interest to security professionals. This book, however, does not
address these topics in detail, as there are other books that cover
these topics better than we could given the amount of space that we
have available.
Instead, this book emphasizes techniques to help keep your system
safe from other people—including both insiders and outsiders,
those bent on destruction, and those who are simply ignorant or
untrained. The text does not detail every specific security-related
feature that is available only on certain versions of Unix from
specific manufacturers: such information changes quite quickly, and
reading a compilation of bugs, patches, and workarounds does not
noticeably improve one's understanding of this
field. Instead, this text attempts to teach the principles necessary
to evaluate the data that you will get from more technical sources.
Throughout this book, we will be presenting mechanisms and methods of
using them. To decide which mechanisms are right for you, take a look
at Chapter 3. Remember: each organization must
develop its own enforceable overall security policies, and those
policies will determine which mechanisms are appropriate to use. End
users should also read Chapter 3—users
should be aware of policy considerations, too.
Years ago, Unix was generally regarded as an operating system that
was difficult to secure. This is no longer the case. Today, Unix is
widely regarded as the most secure operating system that is generally
available. But despite the increasing awareness and the improvements
in defenses, the typical Unix system is still exposed to many
dangers. The purpose of this book is to give readers a fundamental
understanding of the principles of computer security and to show how
they apply to the Unix operating system. We hope to show you
practical techniques and tools for making your system as secure as
possible, especially if it is running some version of Unix. Whether
you are a user or an administrator, we hope that you will find value
in these pages.
|