Bảo mật hệ thống mạng part 23 docx

Bảo mật hệ thống mạng part 23 docx

Bảo mật hệ thống mạng part 23 docx

... from those that are only accessed by employees. DMZs can also be used when dealing with business partners and other out - side entities. Defining the DMZ The DMZ is created by providing a semi-protected

Ngày tải lên: 02/07/2014, 18:20

8 232 0
Bảo mật hệ thống mạng part 9 docx

Bảo mật hệ thống mạng part 9 docx

... responsibility for creating and enforcing the standards for the protection of health information under the Department of Health and Human Services. The act calls for the standardization of patient health information, ... sensitive to signing such documents. This activity should be coordinated with the Human Resources Department and with the organization’s gen- eral counsel. Downstream Liabili...

Ngày tải lên: 02/07/2014, 18:20

7 307 0
Bảo mật hệ thống mạng part 28 docx

Bảo mật hệ thống mạng part 28 docx

... must be loaded on user computers. If the computers are owned by the organization, this becomes part of the standard software load for the computer. If the organization allows employees to use ... remote site is weak, the VPN may allow an in- truder to gain access to the central site or other parts of the organization’s internal network. Therefore, strong policies and audit functions are ......

Ngày tải lên: 02/07/2014, 18:20

8 177 0
Bảo mật hệ thống mạng part 36 docx

Bảo mật hệ thống mạng part 36 docx

... may work if the remote sites are short distances apart. But what if the remote sites are continents away? The problem gets much harder. There is a partial solution to this problem, however. It may ... be revoked as well. Revocation of Certificates The revocation of certificates may be the hardest part of a big problem for CAs. As was mentioned before, the notice of a key revocation must be...

Ngày tải lên: 02/07/2014, 18:20

9 194 0
Bảo mật hệ thống mạng part 40 docx

Bảo mật hệ thống mạng part 40 docx

... e-mail that executes and installs itself when the attachment is opened. Programs like this are particu - larly effective if the employee uses a Windows system. Physical Attack Methods The easiest ... mainframe may then become a primary target for a hacker seeking to cause the target serious harm. Part of the business model for any organization will be the location of employees and how they...

Ngày tải lên: 02/07/2014, 18:20

7 257 0
Bảo mật hệ thống mạng part 41 docx

Bảo mật hệ thống mạng part 41 docx

... are two primary types of IDS: host-based (H-IDS) and network-based (N-IDS). An H-IDS resides on a particular host and looks for indications of attacks on that host. An N-IDS resides on a separate ... extended to include the home computers of employees who are allowed to telecommute or a business partner that is allowed to connect to the network. A burglar alarm is designed to detect any attem...

Ngày tải lên: 02/07/2014, 18:20

6 257 0
Bảo mật hệ thống mạng part 43 docx

Bảo mật hệ thống mạng part 43 docx

... PART IV Platform-Specific Implementations 283 Copyright 2001 The McGraw-Hill Companies, Inc. Click ... of activity seen Any Any Table 14-4. An Example IDS Configuration to Collect All Traffic from a Particular Source Address 280 Network Security: A Beginner’s Guide the context of the suspicious

Ngày tải lên: 02/07/2014, 18:20

9 197 0
Bảo mật hệ thống mạng part 45 docx

Bảo mật hệ thống mạng part 45 docx

... example, if the local port number is 23, this is an inbound connection to the telnet daemon. If the local port number is 1035 and the foreign port number is 23, you have an outbound telnet connection. Lsof One ... /var/adm/loginlog Make sure that /var has sufficient disk space to capture the log files. If /var is on the same partition with /, the root file system may get filled up if the lo...

Ngày tải lên: 02/07/2014, 18:20

10 217 0
Bảo mật hệ thống mạng part 46 docx

Bảo mật hệ thống mạng part 46 docx

... is accessible. Only administrators should have access to this directory. Network The network is a key part of any Windows NT deployment. Generally, domains are better than workgroups as they allow for

Ngày tải lên: 02/07/2014, 18:20

9 211 0
Bảo mật hệ thống mạng part 48 docx

Bảo mật hệ thống mạng part 48 docx

... be decrypted and rewritten to disk. If the destination location for the file is a non-NTFS 5.0 partition or a floppy disk, the file will not be encrypted when writ - ten. Also, if the file is ... settings Chapter 17: Windows 2000 Security Issues 325 Chapter 17: Windows 2000 Security Issues 323 Figure 17-2 shows the policy items that are configurable through the Local Security Policy GUI. .....

Ngày tải lên: 02/07/2014, 18:20

11 230 0
Từ khóa:
w