
- •Contents
- •Preface to second edition
- •1 Introduction
- •1.2 Applying technology in an environment
- •1.3 The human role in systems
- •1.4 Ethical issues
- •1.7 Common practice and good practice
- •1.8 Bugs and emergent phenomena
- •1.10 Knowledge is a jigsaw puzzle
- •1.11 To the student
- •1.12 Some road-maps
- •2 System components
- •2.2 Handling hardware
- •2.3 Operating systems
- •2.4 Filesystems
- •2.5 Processes and job control
- •2.6 Networks
- •2.7 IPv4 networks
- •2.8 Address space in IPv4
- •2.9 IPv6 networks
- •3 Networked communities
- •3.1 Communities and enterprises
- •3.2 Policy blueprints
- •3.4 User behavior: socio-anthropology
- •3.5 Clients, servers and delegation
- •3.6 Host identities and name services
- •3.8 Local network orientation and analysis
- •4 Host management
- •4.1 Global view, local action
- •4.2 Physical considerations of server room
- •4.3 Computer startup and shutdown
- •4.5 Installing a Unix disk
- •4.6 Installation of the operating system
- •4.7 Software installation
- •4.8 Kernel customization
- •5 User management
- •5.1 Issues
- •5.2 User registration
- •5.3 Account policy
- •5.4 Login environment
- •5.5 User support services
- •5.6 Controlling user resources
- •5.7 Online user services
- •5.9 Ethical conduct of administrators and users
- •5.10 Computer usage policy
- •6 Models of network and system administration
- •6.5 Creating infrastructure
- •6.7 Competition, immunity and convergence
- •6.8 Policy and configuration automation
- •7.2 Methods: controlling causes and symptoms
- •7.4 Declarative languages
- •7.6 Common assumptions: clock synchronization
- •7.7 Human–computer job scheduling
- •7.9 Preventative host maintenance
- •7.10 SNMP tools
- •7.11 Cfengine
- •8 Diagnostics, fault and change management
- •8.1 Fault tolerance and propagation
- •8.2 Networks and small worlds
- •8.3 Causality and dependency
- •8.4 Defining the system
- •8.5 Faults
- •8.6 Cause trees
- •8.7 Probabilistic fault trees
- •8.9 Game-theoretical strategy selection
- •8.10 Monitoring
- •8.12 Principles of quality assurance
- •9 Application-level services
- •9.1 Application-level services
- •9.2 Proxies and agents
- •9.3 Installing a new service
- •9.4 Summoning daemons
- •9.5 Setting up the DNS nameservice
- •9.7 E-mail configuration
- •9.8 OpenLDAP directory service
- •9.10 Samba
- •9.11 The printer service
- •9.12 Java web and enterprise services
- •10 Network-level services
- •10.1 The Internet
- •10.2 A recap of networking concepts
- •10.3 Getting traffic to its destination
- •10.4 Alternative network transport technologies
- •10.5 Alternative network connection technologies
- •10.6 IP routing and forwarding
- •10.7 Multi-Protocol Label Switching (MPLS)
- •10.8 Quality of Service
- •10.9 Competition or cooperation for service?
- •10.10 Service Level Agreements
- •11 Principles of security
- •11.1 Four independent issues
- •11.2 Physical security
- •11.3 Trust relationships
- •11.7 Preventing and minimizing failure modes
- •12 Security implementation
- •12.2 The recovery plan
- •12.3 Data integrity and protection
- •12.5 Analyzing network security
- •12.6 VPNs: secure shell and FreeS/WAN
- •12.7 Role-based security and capabilities
- •12.8 WWW security
- •12.9 IPSec – secure IP
- •12.10 Ordered access control and policy conflicts
- •12.11 IP filtering for firewalls
- •12.12 Firewalls
- •12.13 Intrusion detection and forensics
- •13 Analytical system administration
- •13.1 Science vs technology
- •13.2 Studying complex systems
- •13.3 The purpose of observation
- •13.5 Evaluating a hierarchical system
- •13.6 Deterministic and stochastic behavior
- •13.7 Observational errors
- •13.8 Strategic analyses
- •13.9 Summary
- •14 Summary and outlook
- •14.3 Pervasive computing
- •B.1 Make
- •B.2 Perl
- •Bibliography
- •Index
186 |
CHAPTER 5. USER MANAGEMENT |
5.9.9Digital cameras
Face recognition is now possible with a high level of accuracy. If cameras are attached to computers and they can be accessed by anybody, then anybody can watch you.
5.10 Computer usage policy
Let us formulate a generic policy for computer users, the like of which one might expect company employees to agree to. By making this generic, we consider all kinds of issues, not all of which are appropriate for every environment.
A user’s behavior reflects on the organization that houses him or her. Computer systems are uniforms and flags for companies (as well as for public services). It is therefore generally considered an organization’s right to expect its users to comply with certain guidelines of behavior.
Information Technology Policy Documents are becoming more widely used. Their practice has to be recommended, if only to make it clear to everyone involved what is considered acceptable behavior. Such documents could save organizations real money in law-suits. The policy should include:
•What all parties should do in case of dismissal
•What all parties should do in case of security breach
•What are users’ responsibilities to their organization?
•What are the organization’s responsibilities to their users?
The policy has to take special care to address the risks of using insecure operating systems (Windows 95, 98, ME and Macintosh versions prior to MacOSX), since these machines are trivially compromised by careless use.
5.10.1Example IT policy document for a company
1.Why do we need a policy?
As our dependence on technology increases, so do the risks and opportunities for misuse. We are increasingly vulnerable to threats from outside and inside the organization, both due to carelessness and malice.
From our clients’ viewpoint: we need to be perceived as competent and professional in our ability to conduct our business electronically.
From our company’s perspective: we need to maximize the benefits and reduce the risks of using information technology and protect company assets (including reputation).
From your viewpoint: we need to protect your interests as an individual in a community, and reduce the risk of your liability for legal damages.
These policy guidelines must be adhered to at all times to ensure that all users behave in a professional, legal and ethical manner. Failure to
5.10. COMPUTER USAGE POLICY |
187 |
do so may result in disciplinary action, including dismissal and legal action.
2.The network
For the purpose of this policy, we define ‘the network’ to mean the company computer and telephone network, including all of its hardware and software.
The use of the network is not private. The company retains the right to monitor the use of the network by any user, within the boundaries of national law. All users are obliged to use company resources in a professional, ethical and lawful manner.
Material that is fraudulent, harassing or offensive, profane, obscene, intimidating, defamatory, misleading or otherwise unlawful or inappropriate may not be displayed, stored or transmitted using the network, by any means, or in any form (including SMS).
3.Security
Any hardware or software that is deemed a security risk may be disconnected or de-installed at any time, by the system administrator.
User accounts are set up, managed and maintained by the system administrators.
Users accessing the network must have authorization by access-rights, password or by permission of the owner of the information.
Users must take reasonable precautions to prevent unauthorized access to the network. This includes leaving equipment unattended for extended periods while logged on.
Users must not attempt to gain unauthorized access to restricted information.
Passwords are provided to help prevent unauthorized access to restricted areas of the network. Users must not log on to any system using another user’s password or account without their express permission.
Under no circumstances should any user reveal his/her password to anyone else, even by consent.
Users have a responsibility to safeguard passwords. They must not be written down on paper, stored unprotected online, or be located in readable form anywhere near a network terminal.
4.Copyright
Copyright is a statutory property right which protects an author’s interest in his or her work. The right exists as soon as the work is created and continues to exist for the lifetime of the author and beyond, during which time the owner of the copyright may bring actions for infringement.
International copyright law protects a copyright owner’s interest by preventing others from unlawfully exploiting the work that is protected. There are no registration requirements for the legal existence of copyright. Copyright subsists in most materials that are found on the Internet, including imagery and databases.
188 |
CHAPTER 5. USER MANAGEMENT |
Copyright is infringed when a copyright work is copied without the consent of the copyright owner. Downloading information from any source constitutes copying. Unauthorized copy-cut-pasting from any text, graphical or media source may be in breach of copyright, as may copying, distributing or even installing software.
Many information sites express legal terms by which materials may be used. Users should refer to those terms and conditions before downloading any materials.
5.Data protection (e.g. UK)
Any person using a computer may be a data processor. Every individual is responsible for maintaining confidentiality of data by preventing unauthorized disclosure.
Personal data are legally defined as data that relate to a living individual who can be identified from those data, or from those and other data in possession of the data user. The use of personal data is governed by law (e.g. the UK Data Protection Act 1998).
The act lays out the following principles of data protection:
•Personal data shall be processed fairly and lawfully and such processing must comply with at least one of a set of specified conditions.
•Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be processed in any manner incompatible with that purpose or those purposes.
•Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.
•Personal data shall be accurate and, where necessary, up to date.
•Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes.
•Personal data shall be processed in accordance with the rights of data subjects under the Act.
•Appropriate technical and organizational measures shall be taken against unauthorized or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
•Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.
The rules concerning the processing of personal data are complex. If in any doubt as to their interpretation, users should consult legal advice.
6.E-mail and SMS
All electronic messages created and stored on the network are the property of the company and are not private. The company retains the right to access any user’s E-mail if it has reasonable grounds to do so.
5.10. COMPUTER USAGE POLICY |
189 |
The company E-mail system may be used for reasonable personal use, provided it does not interfere with normal business activities or work, and does not breach any company policy.
Users should be aware that:
•E-mail is a popular and successful vehicle for the distribution of computer viruses.
•Normal E-mail carries the same level of privacy as a postcard.
•E-mail is legally recognized as publishing and is easily recirculated.
•Users should take care to ensure that they are not breaching any copyright or compromising confidentiality of either the company or its clients or suppliers by sending, forwarding or copying an E-mail or attachment.
•Nothing libelous, harassing, discriminatory or unlawful should be written as part of any message.
E-mail is often written informally. Users should apply the same care and attention as in writing a conventional business correspondence, including ensuring accurate addressing.
Users must not participate in chain or junk E-mail activities (spam); mass E-mailing should be avoided whenever possible.
E-mail attachments provide a useful means of delivering files to other users. However, careful consideration should be paid to ensure that the recipient can read and make use of the data.
•Not all file types are readable by all computers.
•Many sites have a maximum acceptable file size for E-mail.
•The recipient must have suitable software installed in order to display a file.
In order to prevent the spread of viruses, users should not attempt to open any attachment from an unknown or unexpected source. Certain file types may be blocked by mail-filtering software.
Users must not disguise themselves or falsify their identity in any message.
Where provided, users must ensure that company disclaimers are included when sending E-mail.
7.The World Wide Web
Access to the World Wide Web is provided for business purposes. The World Wide Web may be accessed for limited personal use provided that such use does not interfere with normal business practice or work, and that personal use complies with all aspects of this policy.
The company may monitor individual use, including visits to specific web sites.
190 |
CHAPTER 5. USER MANAGEMENT |
Access may only be sought using an approved browser, which is installed on the user’s computer by the system administrator.
The World Wide Web is uncontrolled and unregulated. Users should therefore be aware that there is no guarantee that any information found there is accurate, legal or factual.
Software may only be downloaded by an authorized system administrator.
8.Transactions
Any commercial transaction made electronically must adhere to standard ordering policy.
The company will not accept liability for any commercial transaction which has not been subject to the appropriate approval.
The company will not accept liability for any personal transaction.
9.Hardware and software
The company provides computer, telecommunications equipment and software for business purposes. It is the responsibility of the system administrator to select, provide and maintain computer equipment in accordance with the work required.
Users must not connect unauthorized equipment to the network, use software that has not been provided or installed by the company, or attempt to alter the settings of any software that compromise security or reliability. No attempt should be made to alter the software or hardware, copy or distribute software, or download software, including screen-savers.
Installations and upgrades may only be performed by an authorized system administrator.
10.Surveillance
Digital cameras or audio input devices must not be connected to any computer that is not specifically authorized to have one. Users must not bring any possible surveillance device into an area where the company’s private assets, intellectual or otherwise, are developed or stored. Employees must not disclose any such information to persons or transmit it to any machine or information storage device not authorized to receive it.
11.Usage
The company reserves the right to view any data stored on the network.
Users may not store personal files on the network. Any personal files can be deleted at any time.
The network is provided to enable
•Authorized users to store and retrieve work
•Authorized users to share/exchange assets
•Backup and recovery
•Security and confidentiality of work.
5.10. COMPUTER USAGE POLICY |
191 |
All users must store files in the appropriate areas of the network. Users who create files on mobile devices should transfer their data to the appropriate area on the network as soon as possible.
12.Management
Managers must ensure that they are fully aware of any potential risks when assessing requests by users for permission to:
•Download files from the Internet
•Access additional areas of the network.
Managers may not request any action by any system administrator which could result in a breach of any of the company policies.
5.10.2Example IT procedure following a breach of policy
IT policy ought to contain instructions as to how users will be dealt with when they breach policy. There are many ways of dealing with users, with varying degrees of tolerance: reprimand, dismissal, loss of privilege etc. Clear guidelines are important for professional conduct, so that all users are treated either equally, or at least predictably.
5.10.3When an employee leaves the company
A fixed policy for dismissing a member of staff can be useful when the employee was harmful to the organization. An organization can avoid harmful lawsuits by users who feel that they have been treated unfairly, by asking them to sign an acceptance of the procedure. The issue of dismissal was discussed in ref. [254].
Users typically have to be granted access to disparate systems with their own authentication mechanisms, e.g. Windows, Unix, key-cards, routers, modems, database passwords. These must all be removed to prevent a user from being able to change data after their dismissal.
A clear procedure is important for both parties:
•To protect an organization from a disgruntled employee’s actions.
•To protect the former employee from accusations about what he or she did after their dismissal that they might not be responsible for.
It is therefore important to have a clear checklist for the sake of security.
•Change combination locks.
•Change door keys.
•Surrender laptops and mobile devices.
•Remove all authentication privileges.
•Remove all pending jobs in at or cron that could be logic bombs.

192 |
CHAPTER 5. USER MANAGEMENT |
Principle 26 (Predictable failure of humans). All systems fail eventually, but they should fail predictably. Where humans are involved, we must have checklists and guidelines that protect the remainder of the system from the failure.
Human failures can be mitigated by adherence to quality assurance schemes, such as ISO 9000 (see section 8.12.1).
Exercises
Self-test objectives
1.List the main issues in user management.
2.Where are passwords stored in Unix-like and Windows computers?
3.What does it mean that passwords are not stored in ‘clear text’?
4.What is meant by a distributed account?
5.What special considerations are required for distributed accounts?
6.What is meant by a user shell?
7.What mechanisms exist for users to share files in Unix? What are the limitations of the Unix model for file sharing between users? What is a potential practical advantage of the Unix model?
8.What mechanisms are available for users to share files on Windows computers?
9.What is meant by an account policy?
10.Explain the justification for the argument ‘simplest is best’.
11.What considerations should be taken into account in designing a login environment for users? Does this list depend on whether the account is a distributed account or not?
12.Why is it not a good idea to log onto a computer with root or Administrator privileges unless absolutely necessary?
13.What is meant by ‘support services’?
14.List the main elements of user support.
15.What is the nine-step approach to user support?
16.What are active and passive users?
17.What is meant by a user quota, and what is it used for?
18.What are the pros and cons of the use of disk quotas?
EXERCISES |
193 |
19.What is meant by garbage collection of user files?
20.Why is it important to be able to identify users by their username? What role does a password play in identifying users?
21.What are the main health risks in the use of computers?
22.List the main areas in which ethics play a role in the management of computers.
23.What is meant by a computer usage policy? Why could such a policy be essential for the security of a company or organization?
24.What kinds of behavior can be regarded as harassment in the context of computer usage?
25.Which routine maintenance activities might be regarded as user-surveillance or breaches of privacy?
Problems
1.What issues are associated with the installation of a new user account? Discuss this with a group of classmates and try to turn your considerations into a policy checklist.
2.Imagine that it is the start of the university semester and a hundred new students require an account. Write an adduser script which uses the filesystem layout that you have planned for your host to install home-directories for the users and to register them in the password database. The script should be able to install the accounts from a list of users provided by the university registration service.
Start either by modifying an existing script (e.g. GNU/Linux has an adduser package) or from scratch. Remember that installing a new user implies the installation of enough configuration to make the account work satisfactorily at once, e.g. Unix dot files.
3.One of the central problems in account management is the distribution of passwords. If we are unable (or unwilling) to use a password distribution system like NIS, passwords have to be copied from host to host. Assume that user home-directories are shared amongst all hosts. Write a script which takes the password file on one host and converts it into all of the different file formats used by different Unix-like OSs, ready for distribution.
4.Consider the example of online services in section 5.7. Adapt this example to create a model for online purchasing of documents or support services. Explain how user security is provided and how system security is assured.
5.Write a script to monitor the amount of disk space used by each user and warn about users that exceed a fixed quota.
194 |
CHAPTER 5. USER MANAGEMENT |
6.Consider the terminal room at your organization. Review its layout critically. Does the lighting cause reflection in the screens, leading to eye strain? How is the seating? Is the room too warm or too cold? How could the room be redesigned to make work conditions better for its users?
7.Describe the available support services for users at your site. Could these be improved? What would it cost to improve support services (can you estimate the number of man-hours, for instance) to achieve the level of support which you would like?
8.Analyze and comment on the example shell configuration in section 5.4.2. Rewrite the shell configuration in bash.
9.Discuss the following: Human beings are not moral creatures, we are creatures of habit. Thus law and policy enforcement is about making ethical choices habitual ones.
10.Discuss the following: Two or three generations of users have now grown up with computers in their homes, but these computers were private machines which were not, until recently, attached to a network. In short, users have grown up thinking that what they do with their computers is nobody’s business but their own. That is not a good attitude in a network community.