Introduction to Web Graphics Understanding the Basics of Web Graphics


Building a Security Policy Network Security



Download 273,5 Kb.
bet4/4
Sana05.07.2022
Hajmi273,5 Kb.
#739704
1   2   3   4

Building a Security Policy Network Security

  • Specific timeframes for changing passwords on the network devices
  • Use of secure network protocols
  • Firewalls at specific chokepoints in a network architecture
  • Use of authentication servers to access network devices

Building a Security Policy System Security

  • The systems section is used to outline the specific settings required to secure a particular operating system or application
    • For example, for Windows NT 4.0, it may be a requirement that every logical drive be installed with NTFS
    • For a particular UNIX flavor, shadow password files may be required to hide user IDs and passwords from general users

Building a Security Policy Testing and Auditing

  • Specify requirements for vulnerability scanners, compliance checking tools, and other security tools run within the environment
  • Require auditing logs on specific devices, periodic self-audits performed by the system administrators, and the use of security compliance checking tools
  • Specify corporate auditing requirements, frequencies, and organizations

Security Resources Security Certifications

Security Resources Web Resources

Summary

  • The CIA triad categorizes aspects of information that must be protected from attacks: confidentiality, integrity, and availability.
  • The PPP triad depicts security, privacy, and marketplace perception as three additional abstract concepts that should drive security efforts.

Summary Cont.

  • The first step in creating an effective security policy is to perform a risk assessment within the environment. A risk assessment consists of five steps:
    • Check for existing security policies and processes
    • Analyze, prioritize, and categorize resources
    • Consider business concerns
    • Evaluate existing security controls
    • Leverage existing management and control architecture
  • To estimate potential financial loss from security threats, the following formula works well by accounting for the most important cost factors associated with security: ALE = SLE * ARO.
  • A security policy has three major benefits. It:
    • Communicates a common vision for security throughout a company
    • Represents a single easy-to-use source of security requirements
    • Exists as a flexible document that should be updated at least annually to address new security threats

Summary Cont.

  • An effective security policy includes security requirements in the following areas:
  • There are a number of security-related certifications to help security professionals quantify their knowledge on a resume.
  • Every security professional must stay current about the latest threats through Web resources, mailing lists, and printed materials.

Download 273,5 Kb.

Do'stlaringiz bilan baham:
1   2   3   4




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish