84-10-15 Securing Tandem Systems

نویسنده

  • Jeffrey L. Ott
چکیده

Tandem computers are employed extensively in heavy volume, OnLine Transaction Processing environments. Tandem systems can be found in 24 of the top 25 US banks; 32 of the top 50 European banks; 250 brokerage and security firms; 60 major insurance companies; and in 40of the world s busiest stock and commodities exchanges. Tandem computers run 75% of all automated teller machine transactions, 66% of all worldwide credit card transactions, and 50% of all public E-mail systems. Despite this large presence in computing environments worldwide, Tandem computers are as yet enigmatic to information security practitioners and information systems auditors. This is primarily because Tandem systems are designed with fault tolerance, low maintenance, and low overhead in mind. In many large financial institutions, only two employees provide Tandem system administration and management (i.e., perform operating system upgrades, capacity planning and tuning, and other related maintenance tasks). Compare this with the number of people generally required to support a large mainframe and it is obvious why the Tandem system is often forgotten until something specific is required of it. Tandem Computers, Inc., which developed its first fault tolerant computer in 1976, is also partially responsible for the lack of security awareness on its systems. Safeguard, the Tandem's security application, is the only security application used with the system. It was not until the company's recent D30 release of the NonStop Kernel—Tandem s operating system—and Safeguard, that Tandem pursued certification of its security environment with the National Computer Security Center (NCSC). Although Tandem's security environment does not provide the controls and granularity of more established and refined security packages, such as CA-ACF2 and RACF, it is possible to secure a Tandem system. This article addresses the various components of Tandem security, focusing on basic NonStop Guardian security, Safeguard security, and the interaction between the two. In addition, the chapter provides suggestions for minimizing risk and improving administration in a Tandem system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SECURING INTERPRETABILITY OF FUZZY MODELS FOR MODELING NONLINEAR MIMO SYSTEMS USING A HYBRID OF EVOLUTIONARY ALGORITHMS

In this study, a Multi-Objective Genetic Algorithm (MOGA) is utilized to extract interpretable and compact fuzzy rule bases for modeling nonlinear Multi-input Multi-output (MIMO) systems. In the process of non- linear system identi cation, structure selection, parameter estimation, model performance and model validation are important objectives. Furthermore, se- curing low-level and high-level ...

متن کامل

O9: Securing Children in Cars from the Trauma Biomechanical Point of View. A Historical and Global Perspective

Since the 1960 Child Safety Systems in cars have been developed. The 3 point safety belt for adults rated as one of the 10 most important inventions for mankind, the seat belt has saved more than 1.5 Million lives. As well children have to be secured in a car but the 3 point belt is designed for adults. A 27 kg child is forced forward with 1.200 kg at 48 kph impact velocity. Here vulnerable bod...

متن کامل

Identifying and Prioritizing Strategies for Improving Financing Systems of Iran's Oil and Gas Industry

The oil and gas industry has huge financial turnover and major projects, especially in the upstream areas, require substantial financing. Hence, securing financing is one of the most important requirements for successful implementation of projects in this industry. In this research, we adopt a descriptive approach and rely on the opinion of experts, to identify and prioritize strategies for imp...

متن کامل

Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining

Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...

متن کامل

Solving the tandem AGV network design problem using tabu search: Cases of maximum workload and workload balance with fixed and non-fixed number of loops

A tandem AGV configuration connects all cells of a manufacturing area by means of non-overlapping, sin-gle-vehicle closed loops. Each loop has at least one additional P/D station, provided as an interface between adjacent loops. This study describes the development of three tabu search algorithms for the design of tandem AGV systems. The first algorithm was developed based on the basic definiti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998