NT Security in an Open Academic Environment

نویسندگان

  • Matthew Campbell
  • Andrea Chan
  • Robert Cowles
  • Gregg Daly
  • Ernest Denys
  • Patrick Hancox
  • William Johnson
  • David Leung
  • Jeff Lwin
چکیده

Stanford Linear Accelerator Center (SLAC) was faced with the need to secure its PeopleSoftOracle business system in an academic environment that has no firewall. To provide protected access to the database servers for NT-based users all over the site while not hindering the lab’s open connectivity with the Internet, we implemented a pseudo three-tier architecture for PeopleSoft with Windows Terminal Server and Citrix MetaFrame technology. The client application and Oracle database were placed behind a firewall, and access was granted via an encrypted link to a thin client. Authentication in the future will be through two-factor token cards. NT workstations in the business system unit were further secured through switched network ports and an automated installation process that included SMB signing and disabling LM Authentication in favor of NTLMv2. The hardened workstations then accessed the business system through the Citrix Secure ICA client. How these security measures affected our mixed environment (Windows9x, Samba, Transarc AFS clients, Pathworks, developers, researchers) is discussed. Submitted to 2 Large System Administration of Windows NT Conference Proceedings * Work supported by Department of Energy contract DE–AC03–76SF00515. NT Security in an Open Academic Environment Gregg Daly, Gary Buhrmaster, Matthew Campbell, Andrea Chan, Robert Cowles, Ernest Denys, Patrick Hancox, Bill Johnson, David Leung, Jeff Lwin Stanford Linear Accelerator Center

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identifying the effective factors and components in transferring learning to the work environment in in-service training of nurses in hospitals affiliated to the Social Security Organization

Background: The aim of this qualitative study was identifying the effective factors and components in transferring learning to the work environment in in-service training of nurses in hospitals affiliated to the Social Security Organization. Materials and methods: The  method was exploratory research and Data analysis was fundamental.  The sample includes 35 members of hospital supervisor...

متن کامل

Reactive Power Pricing in an Open Access Environment Considering Combined Optimum Voltage Profile and Voltage Stability

In a de-regulated open access environment, reactive power is one of the ancillary services which must be provided by an Independent System Operator (ISO). In this paper, a new algorithm is proposed in which reactive power resources are initially so tuned that optimum security in terms of voltage profile and voltage stability are achieved while at the same time, the system losses are minimized. ...

متن کامل

Reactive Power Pricing in an Open Access Environment Considering Combined Optimum Voltage Profile and Voltage Stability

In a de-regulated open access environment, reactive power is one of the ancillary services which must be provided by an Independent System Operator (ISO). In this paper, a new algorithm is proposed in which reactive power resources are initially so tuned that optimum security in terms of voltage profile and voltage stability are achieved while at the same time, the system losses are minimized. ...

متن کامل

Testing for Software Vulnerability Using Environment Perturbation

We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropriate interactions with the environment, and triggered by user’s malicious perturbation on the environment (which we call an environment fault), we view the security testing problem as the problem of testing for the fault-tol...

متن کامل

Testing for Software Vulnerability Using Environment Perturbation

We describe an methodology for testing a software system for possible security flaws. Traditionally, security testing is done using penetration analysis and formal methods. Based on the observation that most security flaws are triggered due to a flawed interaction with the environment, we view the security testing problem as the problem of testing for the fault-tolerance properties of a softwar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999