User's Manual
 Solaris 9 Security CX-310-301    5   
General Security Concepts .......................................................................................... 10 
Information Security ................................................................................................................... 10 
The Security Life Cycle .............................................................................................................. 10 
Good Security ............................................................................................................................ 11 
Security Awareness ................................................................................................................... 12 
Security Policies......................................................................................................................... 12 
Policies and Procedures.........................................................................................................12 
Physical Security .................................................................................................................... 13 
Platform Security .................................................................................................................... 13 
Network Security .................................................................................................................... 13 
Application Security................................................................................................................ 14 
Security Operations and Management................................................................................... 14 
Insecure Systems ...................................................................................................................... 14 
User Trust............................................................................................................................... 15 
Threat ..................................................................................................................................... 15 
Risk......................................................................................................................................... 15 
Authentication and Privacy ........................................................................................................ 15 
Accountability ......................................................................................................................... 16 
Authentication......................................................................................................................... 16 
Authorization........................................................................................................................... 16 
Privacy.................................................................................................................................... 16 
Confidentiality......................................................................................................................... 17 
Integrity................................................................................................................................... 17 
Non-repudiation...................................................................................................................... 17 
Attackers .................................................................................................................................... 17 
Classification of Attackers and Motives.................................................................................. 17 
Information Gathering............................................................................................................. 18 
Gathering Techniques ............................................................................................................19 
Steps to Prevent Information Disclosure................................................................................ 21 
Evaluation Standards................................................................................................................. 21 
Invalidating a Certification ...................................................................................................... 22 










