User's Manual

Solaris 9 Security CX-310-301 5
General Security Concepts .......................................................................................... 10
Information Security ................................................................................................................... 10
The Security Life Cycle .............................................................................................................. 10
Good Security ............................................................................................................................ 11
Security Awareness ................................................................................................................... 12
Security Policies......................................................................................................................... 12
Policies and Procedures.........................................................................................................12
Physical Security .................................................................................................................... 13
Platform Security .................................................................................................................... 13
Network Security .................................................................................................................... 13
Application Security................................................................................................................ 14
Security Operations and Management................................................................................... 14
Insecure Systems ...................................................................................................................... 14
User Trust............................................................................................................................... 15
Threat ..................................................................................................................................... 15
Risk......................................................................................................................................... 15
Authentication and Privacy ........................................................................................................ 15
Accountability ......................................................................................................................... 16
Authentication......................................................................................................................... 16
Authorization........................................................................................................................... 16
Privacy.................................................................................................................................... 16
Confidentiality......................................................................................................................... 17
Integrity................................................................................................................................... 17
Non-repudiation...................................................................................................................... 17
Attackers .................................................................................................................................... 17
Classification of Attackers and Motives.................................................................................. 17
Information Gathering............................................................................................................. 18
Gathering Techniques ............................................................................................................19
Steps to Prevent Information Disclosure................................................................................ 21
Evaluation Standards................................................................................................................. 21
Invalidating a Certification ...................................................................................................... 22