已阅读5页,还剩55页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
第三篇第三篇 图例篇图例篇 CorpnetCorpnet InternetInternet RADIUS Authentication Federation through RADIUS proxiesFederation through RADIUS proxies Can be used for centralized authentication servicesCan be used for centralized authentication services Domain membership not requiredDomain membership not required Great for DMZ placementGreat for DMZ placement 1 HTTP/SSL basic auth. 2 RADIUS request RADIUS Server (IAS) Firewall Server 3 HTTP/SSL request, sent to server Back-end Server Web Client (Browser, HTTP client) ISA Server 2000 (Old) Networking Model Fixed zonesFixed zones “IN” = LAT“IN” = LAT “OUT” = DMZ, Internet“OUT” = DMZ, Internet Packet filter only on Packet filter only on external interfacesexternal interfaces Single outbound policySingle outbound policy NAT alwaysNAT always Static filtering from DMZ Static filtering from DMZ to Internetto Internet InternalInternal NetworkNetwork InternetInternet DMZ 1DMZ 1 Static PFStatic PF ISA 2000ISA 2000 ISA Server 2004 Networking Model Any number of networksAny number of networks VPN as networkVPN as network Localhost as networkLocalhost as network Assigned Assigned relationships relationships (NAT/Route)(NAT/Route) Per-Network policyPer-Network policy Packet filtering onPacket filtering on all interfacesall interfaces Support for DoDSupport for DoD Any topology, any policyAny topology, any policy CorpNet_1CorpNet_1 CorpNet_nCorpNet_n Net ANet A Internet VPN ISA 2004 DMZ_nDMZ_n DMZ_1DMZ_1 Local HostLocal Host NetworkNetwork Rule Structure launched; infects infects unprotected or unprotected or unpatched unpatched systemssystems No ExploitNo ExploitExploitExploit MBSA How It Works MSSecure.xml containsMSSecure.xml contains Security bulletin namesSecurity bulletin names Product-specific updatesProduct-specific updates Version and checksum infoVersion and checksum info Registry keys changedRegistry keys changed KB article numbersKB article numbers Etc.Etc. Run MBSA on Admin system, Run MBSA on Admin system, specify targetsspecify targets 1 1 Downloads CAB file with Downloads CAB file with MSSecure.xml and verifies digital MSSecure.xml and verifies digital signaturesignature 2 2 Scans target systems for OS, OS Scans target systems for OS, OS components, and applicationscomponents, and applications 3 3 Parses MSSecure to see Parses MSSecure to see if updates are availableif updates are available 4 4 Checks if required Checks if required updates are missingupdates are missing 5 5 Generates time-stamped Generates time-stamped report of missing updatesreport of missing updates 6 6 Windows Windows Download CenterDownload Center MSSecure.xmlMSSecure.xml MBSAMBSA ComputerComputer Policies, Procedures, run inventory Inventory Tools; run inventory tool installertool installer 1 1 Scan components replicate Scan components replicate to SMS clientsto SMS clients 2 2 Clients scanned; scan Clients scanned; scan results merged into SMS results merged into SMS hardware inventory datahardware inventory data 3 3 Administrator uses Administrator uses Distribute Software Updates Distribute Software Updates Wizard to authorize updatesWizard to authorize updates 4 4 Update files downloaded; Update files downloaded; packages, programs, and packages, programs, and advertisements advertisements created/updated; packages created/updated; packages replicated and programs replicated and programs advertised to SMS clientsadvertised to SMS clients 5 5 Software Update Installation Software Update Installation Agent on clients deploy Agent on clients deploy updatesupdates 6 6 Periodically: Sync component checks for new Periodically: Sync component checks for new updates, scans clients, and deploys necessary updates, scans clients, and deploys necessary updatesupdates 7 7 EnumerationEnumeration “ “OK”OK” ? ? ? ? ? ? ? ? ? ? Record of StateRecord of State “ “Better”Better” ? ? ? ? ? ? ? ? ? ? Well-defined Standard ConfigurationsWell-defined Standard Configurations “ “Best”Best” Security Policy Model OperationsOperations ProcessProcess ImplementationImplementation DocumentationDocumentation PolicyPolicy TechnologyTechnology Start with policyStart with policy Build process Build process Apply technology Apply technology System = Programs + Servers + Solutions + Services Compare to standards and best practicesCompare to standards and best practices Measuring Security Policy Security PolicySecurity Policy Documented Documented ProceduresProcedures OperationsOperations “ “What you What you must do”must do” “ “What you What you say you do”say you do” “ “What you What you reallyreally do” do” Security Operating Security Operating PrinciplesPrinciples Corporate Security Corporate Security Mission and VisionMission and Vision Security Strategy Risk-Based Decision ModelRisk-Based Decision Model Tactical PrioritizationTactical Prioritization Mission Assess RiskAssess Risk Define Define PolicyPolicy MonitorMonitor AuditAudit Operating Principles Mission Mission and Visionand Vision Risk Based Decision Model Tactical Prioritization Prevent malicious or Prevent malicious or unauthorized use that unauthorized use that results in the loss of results in the loss of Microsoft intellectual Microsoft intellectual property or productivity property or productivity by systematically by systematically assessing, assessing, communicating, and communicating, and mitigating risks to mitigating risks to digital assetsdigital assets Enterprise Risk Model HighHigh LowLow HighHigh Impact to BusinessImpact to Business (Defined by Business Owner)(Defined by Business Owner) LowLow Acceptable Risk Unacceptable Risk Operating Principles Mission and Vision Risk Based Decision Risk Based Decision ModelModel Tactical Prioritization Probability of ExploitProbability of Exploit (Defined by Corporate Security)(Defined by Corporate Security) Risk assessment drives to acceptable risk Task begin integrating PM tools and business/IT requirements Improve risk response & managing a “portfolio” of projects 4 4 RiskRisk PM MaturityPM Maturity Project ComplexityProject Complexity PM CapabilityPM Capability EPM ExpectationEPM Expectation Project Management Maturity Model (PMMM) Technology Microsoft Office EPM Architecture Easily Create EnterpriseEasily Create Enterprise Project PlansProject PlansTeam ParticipationTeam Participation Centrally Store Project, Centrally Store Project, Resources, and ReportingResources, and Reporting Project Documents, Issues, Project Documents, Issues, Risks, and TasksRisks, and Tasks LOB SystemsLOB Systems Get More from Your Get More from Your IT InvestmentsIT Investments More More Productive Productive UsersUsers Taking a Staged ApproachTaking a Staged Approach Proof of Concept Limited Production Pilot Multi-department Rollout Enterprise Rollout Deployment Planning Legacy Legacy AppApp Workflow Workflow EngineEngine SiebelSiebelSAPSAPMS-CRMMS-CRM Architecture Overview Information BridgeInformation Bridge Back-end ServicesBack-end Services ClientClient Office Office ApplicationApplication Smart TagSmart Tag Smart DocSmart Doc Task Pane Task Pane ManagerManager Host Host RendererRenderer IBF - UIIBF - UI IBF IBF EngineEngine Metadata Metadata CacheCache Metadata Metadata Design
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- GB 26851-2026火灾声和/或光警报器
- 上海交通职业技术学院《口腔修复学》2025-2026学年期末试卷
- 上海应用技术大学《法学导论》2025-2026学年期末试卷
- 沈阳音乐学院《中级微观经济学》2025-2026学年期末试卷
- 上海电子信息职业技术学院《安全学原理》2025-2026学年期末试卷
- 上海外国语大学《新闻编辑》2025-2026学年期末试卷
- 三江学院《放射治疗学》2025-2026学年期末试卷
- 上海科技大学《初级财务管理》2025-2026学年期末试卷
- 上海对外经贸大学《服务市场营销》2025-2026学年期末试卷
- 唐山幼儿师范高等专科学校《社会调查》2025-2026学年期末试卷
- 行政处罚法专题培训课件
- 统计知识党校培训课件
- 2025年四川省泸州市中考道德与法治真题(附答案解析)
- 传统曲艺进高校活动方案
- 心电图基础知识与识图理论考核试题题库及答案
- 2025年四川省德阳市中考一模化学试题(含答案)
- 智能化弱电培训
- 杭州中好电子有限公司搬迁项目环评报告
- 悦己人生-大学生心理健康知到课后答案智慧树章节测试答案2025年春哈尔滨工业大学
- 学校工程设计任务书
- HAD 103-14-2023 核动力厂修改的管理
评论
0/150
提交评论