This publication provides guidelines to be used by Federal organizations in structuring physical security programs for their ADP facilities. It treats security analysis, natural disasters, supporting utilities, system reliability, procedural measures and controls, off-site Facilities, contigency plans, security awareness and security audit. It contains statistics and information relevant to physical security of computer data and facilites and references many applicable publications for a more exhaustive treatment of specific subjects.
This paper describes an active attack against the Transport Control Protocol (TCP) which allows a cracker to redirect the TCP stream through his machine thereby permitting him to bypass the protection offered by such a system as a one-time password[SKEY] or by ticketing authentication [Kerberos]. The TCP COnnection is vulnerable to anyone with a TCP packet sniffer and generator locates on the path followed by the connection. Some schemes to detect this attack are presented as well as some methods of prevention and some interesting details of the TCP protocol behaviors.
The Asychronous Transfer Mode (ATM) is the transport mode of choice for B-ISDN. In order for high speed networks to become a reality, a number of performance issues has to be resolved.
Distributed, heterogeneous, and autonomous hardware and software systems are the product of legnthy and diverse computational and information processing requirements. The introduction of harmonious cooperation among such systems carries the potential for great increases in productivity and improvment in applications processing. However, such harmonious cooperation must be supportedby an integrated system that would allow the developement of global applications.