HostedDB - Dedicated UNIX Servers

-->
Internet Security Professional Reference:SATAN and the Internet
Previous Table of Contents Next


Long-Term Benefits of Using SATAN

SATAN can be a worthwhile tool for security administrators in managing the security of a network of systems that are maintained by a distributed group of owners. SATAN can be used to assist security administrators in enforcing company policies, such as preventing unrestricted NFS exports or X server access. The reality of most organizations involves the fact that it is difficult to enforce such software policies without regular auditing. SATAN can be used to do such auditing remotely. SATAN also provides a convenient framework for the addition of new network vulnerability scans.

Works Cited

Alighieri, Dante. Inferno. Norton Anthology of World Masterpieces, Volume 1, 4th Edition. W.W. Norton & Company, New York, 1979.

Belgers, Walter. “Unix Password Security,” available from ftp://ftp.win.tue.nl/pub/security/UNIX-password-security.txt.Z ; INTERNET.

Bellovin, Steven M. “Security Problems in the TCP/IP Protocol Suite,” 1993, available from ftp://ftp.research.att.com/dist/internet_security/ipext.ps.Z ; INTERNET.

Farmer, Dan and Wietse Venema. “Improving the Security of Your Site by Breaking Into It,” 1993, available from ftp://ftp.win.tue.nl/pub/security/admin-guide-to-cracking.101.Z ; INTERNET.

Fisher, John. “CIAC Bulletin G-4: X Authentication Vulnerability,” 1995, available from ftp://ciac.llnl.gov/pub/ciac/bulletin/q-fy96/g-04.XAuth.vulnerablility.asc ; INTERNET.

Carl Landwehr et al., “A Taxonomy of Computer Program Security Flaws, with Examples,” Naval Research Laboratory, NRL/FR/5542—93-9591, 1993, available from http://www.itol.nrl.navy.mil/ITD/5540/publications/CHACS/1993/1993 Landwehr-NRLFR9591.html.

Leopold, George. “Infowar: Can bits really replace bullets?” EE Times, Nov 6, 1995.

Schuba, Christopher and Eugene Spafford. “Addressing Weaknesses in the Domain Name System Protocol,” 1993, available from ftp://coast.cs.purdue.edu/pub/purdue/papers/schuba/ ; INTERNET.

U.S. Department of Defense, Trusted Computer System Evaluation Criteria, 1985a, available from http://www.radium.ncsc.mil/tpep/library/rainbow/5200.28-STD.html INTERNET.


Previous Table of Contents Next