Tổng hợp tài liệu, ebook An Ninh - Bảo Mật tham khảo.
Summary • Forensic science is application of science to questions of interest to the legal profession • Several unique opportunities give computer forensics the ability to uncover evidence that would be extremely difficult to find using a manual process • Computer forensics also has a unique set of challenges that are not found in standard e...
27 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 1058 | Lượt tải: 0
Summary • Identity management provides a framework in which a single authenticated ID is shared across multiple networks or online businesses • Privilege management attempts to simplify assigning and revoking access control to users • Change management refers to a methodology for making and keeping track of changes
38 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 1063 | Lượt tải: 0
Summary • The security policy cycle defines the overall process for developing a security policy • There are four steps in risk identification: – Inventory the assets and their attributes – Determine what threats exist against the assets and by which threat agents – Determine whether vulnerabilities exist that can be exploited by surveying ...
43 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 1226 | Lượt tải: 0
Summary • Adequate physical security is one of the first lines of defense against attacks • Physical security involves restricting with access controls, minimizing social engineering attacks, and securing the environment and infrastructure • Business continuity is the process of assessing risks and developing a management strategy to ensure th...
37 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1041 | Lượt tải: 0
Summary • One of the advantages of symmetric cryptography is that encryption and decryption using a private key is usually fast and easy to implement • A digital signature solves the problem of authenticating the sender when using asymmetric cryptography • With the number of different tools required for asymmetric cryptography, an organization ...
34 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1037 | Lượt tải: 0
Summary • Cryptography seeks to fulfill five key security functions: confidentiality, authentication, integrity, nonrepudiation, and access control • Hashing, also called a one-way hash, creates a ciphertext from plaintext • Symmetric encryption algorithms use a single key to encrypt and decrypt a message
46 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1102 | Lượt tải: 0
Summary • The FTP protocol has several security vulnerabilities—it does not natively use encryption and is vulnerable to man-in-the-middle attacks • FTP can be hardened by using secure FTP (which encrypts using SSL) • Protecting remote access transmissions is particularly important in today’s environment as more users turn to the Internet as t...
54 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1101 | Lượt tải: 0
Summary • Protecting basic communication systems is a key to resisting attacks • E-mail attacks can be malware, spam, or hoaxes • Web vulnerabilities can open systems up to a variety of attacks • A Java applet is a separate program stored on the Web server and downloaded onto the user’s computer along with the HTML code
48 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1071 | Lượt tải: 0
Summary • Cable plant: physical infrastructure (wire, connectors, and cables that carry data communication signals between equipment) • Removable media used to store information include: – Magnetic storage (removable disks, hard drives) – Optical storage (CD and DVD) – Electronic storage (USB memory sticks, FlashCards)
56 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1003 | Lượt tải: 0
Summary • Establishing a security baseline creates a basis for information security • Hardening the operating system involves applying the necessary updates to the software • Securing the file system is another step in hardening a system
39 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 1137 | Lượt tải: 0