For the restriction of access to the paginas of configuration
of the tool proposal, one becomes necessary the control through key
and password, in which some authorized people will only have access.
This mechanism of authentication through key and password for the
configuration of the tool directly interacts with the system of
security of the machine Unix.
By questions of security guard in the access the information,
all pages HTML that are shown by the tool are stored in another area
of the record, not being part of the structure of directory of the WWW
server. These pages are salutes without the extension standard " html
or htm ", not to be identified. As they do not possess the
characteristic extension of pages HTML nor are part of the structure
standard of directory of the WWW server, he is impossible that they
are had access directly through a Browser WWW, being its possible
access only through a program cgi that mounts these pages knowing in
which archives they is stored and in which directories of the machine
Unix it is possible to find them. An exception for this rule exists,
that is, the first page is only accessible directly through the WWW
server, therefore it will be through it that all the too much
functions are had access. The too much pages of the tool alone will
be had access if the key and the password of the administrator will be
informed.
5. CONCLUSION
No matter how hard tools exist that obtain to block some of
the technologies mentioned in this document, as it is the case of the
Firewalls and some anti-viruses, will always appear a new technology
or the combination of them that they will be used to apply attacks to
the users of the Internet.
So that the results of these attacks were minimized,
therefore an effective control on all the Browsers WWW of an Intranet
is impracticable, appeared the solution displayed in session 4 of this
document, that bar the act of receiving of executable contents in the
entrance of the Intranet, leaving to only pass when the place of
origin of the executable content is known and was configured by the
administrator of the tool so that its act of receiving was accepted.
This is not the best solution for the problem a time that the
improvement of the quality of the documents that use executable
contents is substantial, and the solution proposal in session 4
guarantees the security but it restricts the act of receiving of these
technologies of places only known. No matter how hard an executable
content is trustworthy, if not to be part of the relation of known and
authorized places, its act of receiving is denied.
Some studies exist that include digital signatures in the
executable contents for the same ones can identify the origin, as it
is the case of the ActiveX controls, but exactly thus this do not
decide the problems of security generated by the use of these
technologies, therefore no matter how hard a code has a digital
signature nobody guarantees the result of its execution.
To decide the problems any executable content that was
received by a Browser WWW would have to pass for Models of Security
standard created in the Browser WWW for the execution of the same
ones, as it is shown in figure 5,1. This model of security is that it
would go to allow that an executable content could be processing,
independe of the technology that was used for the creation of exactly.
For this a standardization in the use of the executable
contents is necessary, that is, the executable contents first would be
executed and analyzed for the Model of Security it stops later its
execution being applied to the Browser WWW.
This strap of the languages that develop executable contents
the task to create alternative mechanisms to decide the problems of
security generated by badly projected solutions and many times badly
implemented.
BIBLIOGRAPHY