Bảo mật hệ thống mạng part 13 doc

Bảo mật hệ thống mạng part 13 doc

Bảo mật hệ thống mạng part 13 doc

... the creation of the policy. You can show the department man- agers that someone from their part of the organization was involved and voiced that department’s concerns. It also helps if management ... easy part. In order to create it, you only had to get a small number of people involved. To effectively deploy the policy, you need to work with the whole organization. Gaining Buy-In Every de...
Ngày tải lên : 02/07/2014, 18:20
  • 7
  • 254
  • 0
Bảo mật hệ thống mạng part 9 docx

Bảo mật hệ thống mạng part 9 docx

... and so on). Some employees may be sensitive to signing such documents. This activity should be coordinated with the Human Resources Department and with the organization’s gen- eral counsel. Downstream ... responsibility for creating and enforcing the standards for the protection of health information under the Department of Health and Human Services. The act calls for the standardization of p...
Ngày tải lên : 02/07/2014, 18:20
  • 7
  • 307
  • 0
Bảo mật hệ thống mạng part 23 docx

Bảo mật hệ thống mạng part 23 docx

... recommended only for non-business-critical Internet connections. Chapter 9: Internet Architecture 139 Figure 9-1. Standard single-line access architecture Another issue that may impact the choice ... from those that are only accessed by employees. DMZs can also be used when dealing with business partners and other out - side entities. Defining the DMZ The DMZ is created by providing a semi-...
Ngày tải lên : 02/07/2014, 18:20
  • 8
  • 232
  • 0
Bảo mật hệ thống mạng part 28 docx

Bảo mật hệ thống mạng part 28 docx

... must be loaded on user computers. If the computers are owned by the organization, this becomes part of the standard software load for the computer. If the organization allows employees to use ... internal network routers. These routes, along with the management of the addresses scheme should be documented so that routes are not inadvertently deleted during router maintenance. Chapter 10: Vi...
Ngày tải lên : 02/07/2014, 18:20
  • 8
  • 177
  • 0
Bảo mật hệ thống mạng part 31 doc

Bảo mật hệ thống mạng part 31 doc

... the e-commerce server. This part of the system includes the customer’s computer and browser software and the communications link to the server (see Figure 11-1). Within this part of the system, we ... information that is saved to the customer’s system ▲ The protection of the fact that a particular customer made a particular order Communications Security Communications security for e-comme...
Ngày tải lên : 02/07/2014, 18:20
  • 9
  • 136
  • 0
Bảo mật hệ thống mạng part 33 doc

Bảo mật hệ thống mạng part 33 doc

... within a small amount of time. In 1997, the Electronic Frontier Foundation Chapter 12: Encryption 213 Chapter 12: Encryption 215 (EFF) announced a computer system that can find a DES key in four ... primary types of encryption: private key and public key. Private key en - cryption requires all parties who are authorized to read the information to have the same key. This then reduces the ove...
Ngày tải lên : 02/07/2014, 18:20
  • 9
  • 225
  • 0
Bảo mật hệ thống mạng part 36 docx

Bảo mật hệ thống mạng part 36 docx

... may work if the remote sites are short distances apart. But what if the remote sites are continents away? The problem gets much harder. There is a partial solution to this problem, however. It may ... be revoked as well. Revocation of Certificates The revocation of certificates may be the hardest part of a big problem for CAs. As was mentioned before, the notice of a key revocation must be...
Ngày tải lên : 02/07/2014, 18:20
  • 9
  • 194
  • 0
Bảo mật hệ thống mạng part 37 doc

Bảo mật hệ thống mạng part 37 doc

... in - formation on the back end. While this particular vulnerability does not allow a hacker to gain access to the system, it does provide a big a risk to the site. Chapter 13: Hacker Techniques 239 HISTORICAL ... the legitimate owners. Malicious attacks tend to be focused on particular targets. The hacker is actively looking for ways to hurt a particular site or organization. The hacker’s un...
Ngày tải lên : 02/07/2014, 18:20
  • 7
  • 258
  • 1
Bảo mật hệ thống mạng part 40 docx

Bảo mật hệ thống mạng part 40 docx

... Chapter 13: Hacker Techniques 259 The last piece of business reconnaissance against the organization is ... e-mail that executes and installs itself when the attachment is opened. Programs like this are particu - larly effective if the employee uses a Windows system. Physical Attack Methods The easiest ... scan to make educated guesses on the operating systems. For instance, if a system resp...
Ngày tải lên : 02/07/2014, 18:20
  • 7
  • 257
  • 0
Bảo mật hệ thống mạng part 41 docx

Bảo mật hệ thống mạng part 41 docx

... are two primary types of IDS: host-based (H-IDS) and network-based (N-IDS). An H-IDS resides on a particular host and looks for indications of attacks on that host. An N-IDS resides on a separate ... extended to include the home computers of employees who are allowed to telecommute or a business partner that is allowed to connect to the network. A burglar alarm is designed to detect any attem...
Ngày tải lên : 02/07/2014, 18:20
  • 6
  • 257
  • 0