« Home « Chủ đề kỹ thuật bảo mật

Chủ đề : kỹ thuật bảo mật


Có 60+ tài liệu thuộc chủ đề "kỹ thuật bảo mật"

Bảo mật hệ thống mạng part 41

tailieu.vn

In reality, as we will see in the following pages, this is not always the case. Some of the earliest forms included night watchmen and guard dogs. Burglar and car alarms are also forms of IDS. The deterrent function is provided by a window sticker or a sign in the front yard of the house. Cars often have a red...

Bảo mật hệ thống mạng part 42

tailieu.vn

monitor traffic to a large number of systems), an H-IDS may be more appropriate for or- ganizations that are more concerned about legitimate users than about external hackers.. SETTING UP AN IDS. The spe- cific steps in creating an IDS policy are. Define the goals of the IDS.. Defining the Goals of the IDS. The goals of the IDS provide...

Bảo mật hệ thống mạng part 43

tailieu.vn

MANAGING AN IDS. The concept of intrusion detection is not new to security. Before the decision is made for an organization to implement an IDS (commercial or not), the organization should understand what the goals of this program are to be. You will notice that IDS is not included in the recommended best practices in Chapter 8. This is not...

Bảo mật hệ thống mạng part 44

tailieu.vn

F or much of the history of the Internet, Unix systems provided most of the services available on the network. When hacking started to become a problem on the Internet, it was Unix systems that received most of the attention. Due to the large number of Unix operating systems available, the exact file locations and commands may not be correct...

Bảo mật hệ thống mạng part 45

tailieu.vn

Unix is no different than Windows NT in the existence of patches to correct bugs and security issues with software. Patches should be applied on a regular basis to remove these vulnerabilities. One item to note when downloading patches for Solaris systems is that Sun places many of the patches in a patch cluster. As with any type of computer...

Bảo mật hệ thống mạng part 46

tailieu.vn

Windows NT Security Issues. M icrosoft Windows NT is one of the most prevalent operating systems within or- ganizations and across the Internet. It is being used in the traditional roles of file and print servers as well as in new roles such as Web server, application server, and database server. Given the sensitivity of information being stored on Windows...

Bảo mật hệ thống mạng part 47

tailieu.vn

The management of users on a Windows NT system is critical to the security of the sys- tem and the NT domain. You should have proper procedures in place within the organi- zation to identify the proper permissions each new user should receive. Adding Users to the System. Add new users to a system or domain through the User Manager....

Bảo mật hệ thống mạng part 48

tailieu.vn

Windows 2000 Security Issues. M icrosoft Windows 2000 is rapidly replacing Windows NT in internal and exter- nal server installations. There is little doubt that Windows 2000 will become one of the most prevalent (if not the most prevalent) operating system across the Internet. It is obvious that Windows 2000 will be found in traditional Windows NT roles such as...

Bảo mật hệ thống mạng part 49

tailieu.vn

The management of users on a Windows 2000 system is critical to the security of the system and the organization. Proper procedures should be in place within the organization to identify the proper permissions each new user should receive. When an employee leaves the organization, procedures should be in place to make sure that the employee loses access rights to...

Bảo mật hệ thống mạng part 50

tailieu.vn

The Process Project Plan. I n Chapter 7, we talked about the information security process. In that chapter, five phases were identified in the process:. The process is a wonderful concept, but I sometimes find that the actual doing of the process is not as obvious as the process itself. We will assume that the organization wishes to improve its...

Bảo mật hệ thống mạng part 51

tailieu.vn

tion that was gathered and to rank the risks to the organization. Finally, the team will put all of the information on risks and recommendations into a report that is provided to the organization. Often the team will provide a draft report to the security officer for an initial review to make sure that details about the organization are correct.....

Bảo mật hệ thống mạng part 52

tailieu.vn

Which Is More Secure?. T he debate about which operating system is more secure has been raging for years. Is Unix more secure than Windows? Is Windows more secure than Unix? Which op- erating system should be used for mission-critical applications? If you ask these questions of ten security professionals, you are likely to get ten different answers and you...

Bảo mật hệ thống mạng part 53

tailieu.vn

This is far from an ex- haustive list but it will provide a pointer to the majority of the large security confer- ences. Computer Security Institute (http://www.gocsi.com) CSI runs the annual Computer Security Conference and Exhibition as well as the NetSec conference.. SANS Institute (http://www.sans.org) SANS runs approximately four major and nine regional conferences each year. MIS Training Institute (http://www.misti.com)...

Bảo mật hệ thống mạng part 54

tailieu.vn

The organization’s Help Desk is getting calls about slow response from the Internet. No alarms have been set off that might indicate the system has been hacked or that the organization might be under some type of denial-of-service attack.. Someone made a mistake on the FTP server configuration. Someone noticed and placed a large amount of illegal copies of software...

Bảo mật hệ thống mạng part 38

tailieu.vn

The cases of the past have been well publicized and there are many re- sources that describe such cases and the individuals involved. This can be done across the Internet just as it can be done across a Local Area Network (LAN).. File sharing via NFS was used by some of the first hackers to gain access to informa- tion....

Google hacking for penetration tester - part 1

tailieu.vn

Exploring Google’s Web-based Interface. Google’s Web interface is unmistakable. What most people fail to realize is that the interface is also extremely powerful.Throughout this book, we will see how you can use Google to uncover truly amazing things. Once we understand how to navigate and interpret the results from the various interfaces, we will explore basic search techniques.. We will...

Google hacking for penetration tester - part 3

tailieu.vn

Figure 1.15 Search Reduction in Action. Notice that the third hit in Figure 1.15 references zebra.conf.sample.These sample files may clutter valid results, so we’ll add to our existing query, reducing hits that contain this phrase.This makes our new query. However, it helps to step into the shoes of the software’s users for just a moment.. Notice that our zebra.conf.sample file...

Google hacking for penetration tester - part 4

tailieu.vn

Table 1.4 continued h1 Language Field Values. The hl value is sticky! This means that if you change this value in your URL, it sticks for future searches. The best way to change it back is through Google preferences or by changing the hl code directly inside the URL.. The restrict variable is easily confused with the lr variable, since...

Google hacking for penetration tester - part 5

tailieu.vn

Exploring Google’s Web-based Interface. Google’s preferences and language tools enable search customization, translation services, language-specific searches, and much more.. www.google.com This is the main Google Web page, the entry point for most searches.. http://groups.google.com The Google Groups Web page.. http://images.google.com/ Search Google for images and graphics.. http://video.google.com Search Google for video files.. www.google.com/language_tools Various language and translation options.. www.google.com/advanced_search The...

Google hacking for penetration tester - part 6

tailieu.vn

Advanced operators are additions to a query designed to narrow down the search results.. The basic syntax of an advanced operator is operator:search_term. There is no space between the operator, the colon, and the search term. In most cases, Google will treat a syntactically bad advanced operator as just another search term. For example, providing the advanced operator intitle without...