Bảo mật hệ thống mạng part 9 docx
... property of Chapter 4: Legal Issues in Information Security 53 Health Information On August 21, 199 6, the Health Insurance Portability and Accountability Act (HIPAA) became law. This law places ... and appropriate measures will be determined by existing standards (such as the proposed ISO 17 799 ) and best business practices (see Chapter 8). Once again, the information security staff of the...
Ngày tải lên: 02/07/2014, 18:20
... POP (see Figure 9- 3). In this case, the second connection can be a redundant connection or it can be up and running continuously. Chapter 9: Internet Architecture 141 Figure 9- 3. Multiple connections ... architecture is recommended only for non-business-critical Internet connections. Chapter 9: Internet Architecture 1 39 Figure 9- 1. Standard single-line access architecture Another is...
Ngày tải lên: 02/07/2014, 18:20
... must be loaded on user computers. If the computers are owned by the organization, this becomes part of the standard software load for the computer. If the organization allows employees to use ... Accept 7 Internal network Any HTTP, HTTPS, FTP, Telnet, SSH Accept 8 Internal DNS Any DNS Accept 9 Any Any Any Drop Table 10-1. Firewall Policy Rules That Include a VPN DMZ VPN should perform NAT...
Ngày tải lên: 02/07/2014, 18:20
Bảo mật hệ thống mạng part 36 docx
... give an idea of how strong the keys are in reality, remember the EFF machine? It cost $250,000 in 199 7 and brute-forced a DES 56-bit key in 4.5 days. In other cases a 40-bit RC5 key was brute-forced ... may work if the remote sites are short distances apart. But what if the remote sites are continents away? The problem gets much harder. There is a partial solution to this problem, however. I...
Ngày tải lên: 02/07/2014, 18:20
Bảo mật hệ thống mạng part 40 docx
... operating systems. For instance, if a system responds on port 1 39 (NetBIOS RPC), it is likely a Windows system (either NT, 2000, 95 , or 98 ). A system that responds on port 111 (Sun RPC/portmapper) ... e-mail that executes and installs itself when the attachment is opened. Programs like this are particu - larly effective if the employee uses a Windows system. Physical Attack Methods The...
Ngày tải lên: 02/07/2014, 18:20
Bảo mật hệ thống mạng part 41 docx
... are two primary types of IDS: host-based (H-IDS) and network-based (N-IDS). An H-IDS resides on a particular host and looks for indications of attacks on that host. An N-IDS resides on a separate ... extended to include the home computers of employees who are allowed to telecommute or a business partner that is allowed to connect to the network. A burglar alarm is designed to detect any attem...
Ngày tải lên: 02/07/2014, 18:20
Bảo mật hệ thống mạng part 43 docx
... PART IV Platform-Specific Implementations 283 Copyright 2001 The McGraw-Hill Companies, Inc. Click ... of activity seen Any Any Table 14-4. An Example IDS Configuration to Collect All Traffic from a Particular Source Address 280 Network Security: A Beginner’s Guide the context of the suspicious ... between two systems. In other words, it is important to understand Chapter 14: Intrusion Dete...
Ngày tải lên: 02/07/2014, 18:20
Bảo mật hệ thống mạng part 45 docx
... *:sunrpc (LISTEN) inetd 4 39 root 5u IPv4 427 TCP *:ftp (LISTEN) inetd 4 39 root 6u IPv4 428 TCP *:telnet (LISTEN) inetd 4 39 root 7u IPv4 4 29 TCP *:shell (LISTEN) inetd 4 39 root 9u IPv4 430 TCP *:login ... 13: 09 ? 00:00:04 init root 2 1 0 13: 09 ? 00:00:00 [kflushd] root 3 1 0 13: 09 ? 00:00:00 [kupdate] root 4 1 0 13: 09 ? 00:00:00 [kpiod] root 5 1 0 13: 09 ? 00:00:00 [kswapd]...
Ngày tải lên: 02/07/2014, 18:20
Bảo mật hệ thống mạng part 46 docx
... authentication is an authentication system that allows Windows NT servers to work with Windows 95 and Windows 98 clients (as well as Windows for Workgroups). LAN Manager authentication schemes are significantly ... Registry key, determine the operating requirements for your network. If you have Windows 95 or Windows 98 clients on your network, you must use levels 0 or 1. Also, Service Pac...
Ngày tải lên: 02/07/2014, 18:20
Bảo mật hệ thống mạng part 48 docx
... authentication is an authentication system that allows Windows 2000 servers to work with Windows 95 and Windows 98 clients (as well as Windows for Workgroups). LAN Manager authentication schemes are significantly ... policy setting, determine the operating requirements for your network. If you have Windows 95 or Windows 98 clients on your network, you must allow LAN Manager responses. Add...
Ngày tải lên: 02/07/2014, 18:20