Bảo mật hệ thống mạng part 28 docx

Bảo mật hệ thống mạng part 28 docx

Bảo mật hệ thống mạng part 28 docx

... must be loaded on user computers. If the computers are owned by the organization, this becomes part of the standard software load for the computer. If the organization allows employees to use ... remote site is weak, the VPN may allow an in- truder to gain access to the central site or other parts of the organization’s internal network. Therefore, strong policies and audit functions are ......

Ngày tải lên: 02/07/2014, 18:20

8 177 0
Bảo mật hệ thống mạng part 9 docx

Bảo mật hệ thống mạng part 9 docx

... responsibility for creating and enforcing the standards for the protection of health information under the Department of Health and Human Services. The act calls for the standardization of patient health information, ... sensitive to signing such documents. This activity should be coordinated with the Human Resources Department and with the organization’s gen- eral counsel. Downstream Liabili...

Ngày tải lên: 02/07/2014, 18:20

7 307 0
Bảo mật hệ thống mạng part 23 docx

Bảo mật hệ thống mạng part 23 docx

... from those that are only accessed by employees. DMZs can also be used when dealing with business partners and other out - side entities. Defining the DMZ The DMZ is created by providing a semi-protected

Ngày tải lên: 02/07/2014, 18:20

8 232 0
Bảo mật hệ thống mạng part 36 docx

Bảo mật hệ thống mạng part 36 docx

... bits 1,024 bits 160 bits 120 bits 2,048 bits 210 bits 128 bits 2,304 bits 256 bits Table 12-1. Relative Strengths of Different Key Lengths 228 Network Security: A Beginner’s Guide Key Distribution Keys ... may work if the remote sites are short distances apart. But what if the remote sites are continents away? The problem gets much harder. There is a partial solution to this problem, howe...

Ngày tải lên: 02/07/2014, 18:20

9 194 0
Bảo mật hệ thống mạng part 40 docx

Bảo mật hệ thống mạng part 40 docx

... e-mail that executes and installs itself when the attachment is opened. Programs like this are particu - larly effective if the employee uses a Windows system. Physical Attack Methods The easiest ... mainframe may then become a primary target for a hacker seeking to cause the target serious harm. Part of the business model for any organization will be the location of employees and how they...

Ngày tải lên: 02/07/2014, 18:20

7 257 0
Bảo mật hệ thống mạng part 41 docx

Bảo mật hệ thống mạng part 41 docx

... are two primary types of IDS: host-based (H-IDS) and network-based (N-IDS). An H-IDS resides on a particular host and looks for indications of attacks on that host. An N-IDS resides on a separate ... extended to include the home computers of employees who are allowed to telecommute or a business partner that is allowed to connect to the network. A burglar alarm is designed to detect any attem...

Ngày tải lên: 02/07/2014, 18:20

6 257 0
Bảo mật hệ thống mạng part 43 docx

Bảo mật hệ thống mạng part 43 docx

... PART IV Platform-Specific Implementations 283 Copyright 2001 The McGraw-Hill Companies, Inc. Click Here for Terms of ... of activity seen Any Any Table 14-4. An Example IDS Configuration to Collect All Traffic from a Particular Source Address 280 Network Security: A Beginner’s Guide the context of the suspicious activity. A ... 80, for example, is likely to be return traffic from a Web...

Ngày tải lên: 02/07/2014, 18:20

9 197 0
Bảo mật hệ thống mạng part 45 docx

Bảo mật hệ thống mạng part 45 docx

... /var/adm/loginlog Make sure that /var has sufficient disk space to capture the log files. If /var is on the same partition with /, the root file system may get filled up if the logs get too big. It is better practice ... does not tell you which process is holding the port open. Finding which process is linked to a particular port can become an arduous task. However, there is a program called...

Ngày tải lên: 02/07/2014, 18:20

10 217 0
Bảo mật hệ thống mạng part 46 docx

Bảo mật hệ thống mạng part 46 docx

... is accessible. Only administrators should have access to this directory. Network The network is a key part of any Windows NT deployment. Generally, domains are better than workgroups as they allow for

Ngày tải lên: 02/07/2014, 18:20

9 211 0
Bảo mật hệ thống mạng part 48 docx

Bảo mật hệ thống mạng part 48 docx

... be decrypted and rewritten to disk. If the destination location for the file is a non-NTFS 5.0 partition or a floppy disk, the file will not be encrypted when writ - ten. Also, if the file is ... appropriate logon message for your organization. Figure 17-1. Local Security Policy Management GUI 328 Network Security: A Beginner’s Guide Network Networking with Windows 2000 has changed signific...

Ngày tải lên: 02/07/2014, 18:20

11 230 0
Từ khóa:
w