Computers and Security, Vol. 7, No. 2
solutions like passwords. Others question the cost justification o f implementing stronger security measures for PC-to-mainframe links, lnfo World, November 9, 1987,
Fault tolerant systems are required for applications where a crash must not occur. Included in the article is a list o f major UPS vendors and fault-tolerant computer vendors.
p. 49.
Information WEEK, November 9, 1987, p. 32.
Net Failures Growing Concern in Workplace, Mark Stevens. L A N failures are an increasing concern and new classes o f hardware and software are becoming available purely for the purpose o f making L A N survivable. The easiest solution to losses caused by hard disk failure is performing regular back-ups. Next is track mirroring, where network operating system software writes identical copies o f each file to separate cylinders on the hard disk. A more sophisticated version o f disk monitoring writes files to two independent disk drives. Server mirroring uses not just duplicate hard disk drives but duplicate servers, which not only monitor the network but constantly monitor each other, looking for failures.
InfoWorld, November 9, 1987, p. 19. Crash Course: Lessons in Preventing Computer D o w n time, Lee Greets. Important requirements for system reliability are a power supply o f adequate quality and one that continues if the power company quits. Equipment to "launder" dirty power is available for virtually any size or type o f computer and is relatively inexpensive. Power-line reliability, or uninterruptibility is also available but is more expensive. Even with an ideal source o f power, computer failures do occur; frequent back-ups are a must. There are security systems which make reconstruction o f a damaged or corrupted database much easier.
N e w Wave of LAN Security Products Hailed by Users, Susan Kerr. A growing number o f popular communications vendors are introducing products for LANS that range from password protection up to end-to-end data encryption. The switch inside customer sites to local networks has taken away a security advantage inherent in point-to-point, terminal-tohost networks. The associated overhead and cost have held up some usage and development o f security products. The author discusses specific companies and their products. Datamation, November I,
Federal Computer Conference although the two organizations have been on opposite sides in the controversy over HR 145. A representative o f the National Computer Security Center said security measures are being designed based on an "outer envelope" concept. The security mechanisms take the message segment or an entire message and wrap it in a secure package for storage or transmission. A representative o f NBS described the issues in development o f standards: authentication, access control, confidentiality, integrity and nonrepudiation. The project to develop and certify products was begun because normal development of security products was too costly, too slow and unstandardized. Government Co,,purer News,
Noven, ber II, 1987, pp. 18-19.
1987, pp. 28, 32.
Apollo Skirts Site License Issue,James Connolly. Apollo
Battling Mediocrity. In commenting on software and security concerns, Jon David made the following points: (1) Testing should take up at least one-third o f total development time. (2) Beta sites are a lazy man's way to test. (3) You can do real-world testing in a laboratory environment. Beta testing should be an addition to thorough lab testing, not a substitute for it. (4) Security is becoming a big concern; it's just not becoming a big budget item. (5) Everything that applies to mainframe security should also apply to PC security. Computerworld Focus, NSA, NBS Coming Together on Computer Security.
Computer, Inc. has introduced its Network License Server, (NLS) a means to manage and price application use on a muhivendor network as an alternative to purchasing individual copies o f software or site licensing arrangements. NLS is a combination o f software locks, keys and hooks. Software vendors acquire a logical lock from Apollo and implement that lock on their source code. Users then buy numerical keys from the software vendor at a perkey price. The availability o f keys determines h o w many concurrent users can access the application from the network. Apollo, in turn, sells the NLS software, which includes a set number o f hooks on which the keys are stored.
Representives o f NSA and NBS gave evidence o f cooperation at the
Computerworld, November 9, 1987, p. 67.
November 4, 1987, p. 9.
217