Privacy Enhanced Mail (PEM) was the ﬁrst serious eﬀort to secure Internet
mail. The Internet Resources Task Force (IRTF) Privacy and Security Research
Group (PSRG) did the initial design. The Internet Engineering Task Force (IETF)
PEM Working Group continued development for three years, resulting in a four-
part Proposed Internet Standard published in early 1993    . PEM
is a broad standard suite, it provides encryption, authentication, message integrity
and key management. PEM supports both symmetric and asymmetric (public-
key) key management schemes.
Default installations of almost any operating system are prime targets for hackers,
and Solaris is no exception.These installations are usually devoid of any vendor
patches, may be running system daemons with more privilege than necessary, and
are likely to use insecure protocols.This chapter is designed to get you to begin
thinking about Solaris in terms of security by examining the shortcomings of the
default Solaris installation, as well as the tools available for monitoring the system.
Most intrusions will result in your Solaris systems displaying uncharacteristic...
Unauthorized access is when an unauthorized entity gains access to an asset and has the
possibility to tamper with that asset. Gaining access is usually the result of intercepting
some information in transit over an insecure channel or exploiting an inherent weakness in
a technology or a product.
Getting access to corporate network resources is usually accomplished by doing some
reconnaissance work. Most likely, the corporate network will be accessed through the
Internet, tapping into the physical wire, remote modem dial-in access, or wireless network
What does a typical BCS network look like? Most installations today have a dedicated
BCS network with centralized control via an operator’s terminal in the facility manager’s
office. There is no Internet (or LAN) connection, and thus no IT threat. However, the
trend today is toward greater connectivity to enable new services, convenience, and
savings on infrastructure costs. Newer buildings have network connections to the Inter-
net. But even so, most BCS networks still have few resources that are of value to the