NT Security in an Open Academic Environment
نویسندگان
چکیده
Stanford Linear Accelerator Center (SLAC) was faced with the need to secure its PeopleSoftOracle business system in an academic environment that has no firewall. To provide protected access to the database servers for NT-based users all over the site while not hindering the lab’s open connectivity with the Internet, we implemented a pseudo three-tier architecture for PeopleSoft with Windows Terminal Server and Citrix MetaFrame technology. The client application and Oracle database were placed behind a firewall, and access was granted via an encrypted link to a thin client. Authentication in the future will be through two-factor token cards. NT workstations in the business system unit were further secured through switched network ports and an automated installation process that included SMB signing and disabling LM Authentication in favor of NTLMv2. The hardened workstations then accessed the business system through the Citrix Secure ICA client. How these security measures affected our mixed environment (Windows9x, Samba, Transarc AFS clients, Pathworks, developers, researchers) is discussed. Submitted to 2 Large System Administration of Windows NT Conference Proceedings * Work supported by Department of Energy contract DE–AC03–76SF00515. NT Security in an Open Academic Environment Gregg Daly, Gary Buhrmaster, Matthew Campbell, Andrea Chan, Robert Cowles, Ernest Denys, Patrick Hancox, Bill Johnson, David Leung, Jeff Lwin Stanford Linear Accelerator Center
منابع مشابه
Identifying the effective factors and components in transferring learning to the work environment in in-service training of nurses in hospitals affiliated to the Social Security Organization
Background: The aim of this qualitative study was identifying the effective factors and components in transferring learning to the work environment in in-service training of nurses in hospitals affiliated to the Social Security Organization. Materials and methods: The method was exploratory research and Data analysis was fundamental. The sample includes 35 members of hospital supervisor...
متن کاملReactive Power Pricing in an Open Access Environment Considering Combined Optimum Voltage Profile and Voltage Stability
In a de-regulated open access environment, reactive power is one of the ancillary services which must be provided by an Independent System Operator (ISO). In this paper, a new algorithm is proposed in which reactive power resources are initially so tuned that optimum security in terms of voltage profile and voltage stability are achieved while at the same time, the system losses are minimized. ...
متن کاملReactive Power Pricing in an Open Access Environment Considering Combined Optimum Voltage Profile and Voltage Stability
In a de-regulated open access environment, reactive power is one of the ancillary services which must be provided by an Independent System Operator (ISO). In this paper, a new algorithm is proposed in which reactive power resources are initially so tuned that optimum security in terms of voltage profile and voltage stability are achieved while at the same time, the system losses are minimized. ...
متن کاملTesting for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropriate interactions with the environment, and triggered by user’s malicious perturbation on the environment (which we call an environment fault), we view the security testing problem as the problem of testing for the fault-tol...
متن کاملTesting for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Traditionally, security testing is done using penetration analysis and formal methods. Based on the observation that most security flaws are triggered due to a flawed interaction with the environment, we view the security testing problem as the problem of testing for the fault-tolerance properties of a softwar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999