Network Security Foundations phần 7 pptx
... file open. File sharing 4 374 Book.fm Page 200 Tuesday, August 10, 2004 10:46 AM Unix Network Security 193 Remote Logon Security local area network (LAN) A network in which all participants ... their security was weak and is now considered compromised. This chapter provides an overview of the basic network security mech- anisms available to Unix, including their relat...
Ngày tải lên: 13/08/2014, 15:21
Network Security Foundations phần 4 pptx
... attached to your network, a weakness in their home computer security is a weakness in your network security. Be especially vigilant about laptops—they travel from network to network and easily ... transparent firewalls tunneling Network Address Translation virtual private networking packet filters virus scanning 4 374 Book.fm Page 85 Tuesday, August 10, 2004 10:46 AM Virtu...
Ngày tải lên: 13/08/2014, 15:21
Network Security Foundations phần 1 pps
... particular platform. Who Should Read This Book? Network Security Foundations is designed to teach the fundamentals of computer and network security to people who are fairly new to the topic: ... . . . . . . . . . . . . . . . . . . . . . . . 268 4 374 FM.fm Page xii Tuesday, August 10, 2004 8:16 PM Foundations Network Security 4 374 FM.fm Page i Tuesday, August 10,...
Ngày tải lên: 13/08/2014, 15:21
Network Security Foundations phần 2 docx
... Gathering Simple Network Management Protocol (SNMP) A protocol with no inherent security used to query equipment status and modify the configuration of network devices. The Simple Network Management ... key to decide whether to accept the logon. The PIN is 78 34. 78 34/64 should leave 26. I know that the PIN is 78 34 I know that the PIN is 78 34 I want to communica...
Ngày tải lên: 13/08/2014, 15:21
Network Security Foundations phần 3 pps
... 4 374 Book.fm Page 77 Tuesday, August 10, 2004 10:46 AM 74 Chapter 5 Understanding Firewalls firewall A gateway that connects a private network to a public network and enforces a security ... integrate a new device into your network, you need to con- sider its security ramifications and update your security policy. In short, you’re never done. The Security Cycle S...
Ngày tải lên: 13/08/2014, 15:21
Network Security Foundations phần 5 ppsx
... staff. Physical Security Physical security is the set of security measures that don’t apply to computers specifically, like locks on doors, security guards, and video surveillance. Without physical security ... is no security. This simply means that network security and software constructs can’t keep your data secure if your server is stolen. Centralization is axiomatic to se...
Ngày tải lên: 13/08/2014, 15:21
Network Security Foundations phần 6 potx
... your system. Windows Network Security Windows network security is based on a few principle services: ◆ Active Directory ◆ Kerberos ◆ Group Policy ◆ Share security ◆ IPSec All of ... small network with shares, share security techniques don’t really scale well for larger networks and environments where security is required because a new share must be created when...
Ngày tải lên: 13/08/2014, 15:21
Network Security Foundations phần 8 doc
... IIS, use a security proxy to shore up security. Microsoft’s Internet Security and Acceleration Server is a good and relatively inexpensive choice that provides an astounding array of security ... different website. Use Virtual Directories to Customize Security Virtual directories have their own IIS security settings and can be used to modify security settings within a website....
Ngày tải lên: 13/08/2014, 15:21
Network Security Foundations phần 9 docx
... 4 374 Book.fm Page 2 87 Tuesday, August 10, 2004 10:46 AM E-mail Security 2 57 Review Questions 1. What problems can e-mail encryption cause? 2. What feature of e-mail causes the majority of security ... blocking lists? 17. How do ISPs prevent their clients from sending spam? 4 374 Book.fm Page 2 57 Tuesday, August 10, 2004 10:46 AM 272 Appendix A 6. What long-standing sec...
Ngày tải lên: 13/08/2014, 15:21
Network Security Foundations phần 10 pdf
... 12, 25, 56, 71 , 74 –85, 273 , 289 automated security policy, 64 content blocking, 83–84 fundamental functions, 74 –82 Network Address Translation (NAT), 77 79 packet filtering, 75 77 proxy services, ... Title 18, 20 Unix development, 7 FTP server, 201–202 as hacker focus, 12 history, 174 – 177 vs. UNIX, 174 virus scanning, 243 Unix security, 3, 177 –184, 180–184, 279 , 2 97...
Ngày tải lên: 13/08/2014, 15:21