Security+ Guide to Network Security Fundamentals安全指南网络安全基础.ppt_第1页
Security+ Guide to Network Security Fundamentals安全指南网络安全基础.ppt_第2页
Security+ Guide to Network Security Fundamentals安全指南网络安全基础.ppt_第3页
Security+ Guide to Network Security Fundamentals安全指南网络安全基础.ppt_第4页
Security+ Guide to Network Security Fundamentals安全指南网络安全基础.ppt_第5页
已阅读5页,还剩15页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、Security+ Guide to Network Security Fundamentals,Security Overview,Chapter 1,Learning Objectives,Understand network security Understand security threat trends and their ramifications Understand the goals of network security Determine the factors involved in a secure network strategy,Understanding Ne

2、twork Security,Network security Process by which digital information assets are protected Goals Maintain integrity Protect confidentiality Assure availability,Understanding Network Security,Security ensures that users: Perform only tasks they are authorized to do Obtain only information they are aut

3、horized to have Cannot cause damage to data, applications, or operating environment,Security Threats,Identity theft Privacy concerns Wireless access,To Offset Security Threats,Integrity Assurance that data is not altered or destroyed in an unauthorized manner Confidentiality Protection of data from

4、unauthorized disclosure to a third party Availability Continuous operation of computing systems,Security Ramifications:Costs of Intrusion,Causes of network security threats Technology weaknesses Configuration weaknesses Policy weaknesses Human error,Technology Weaknesses,TCP/IP Operating systems Net

5、work equipment,Configuration Weaknesses,Unsecured accounts System accounts with easily guessed passwords Misconfigured Internet services Unsecured default settings Misconfigured network equipment Trojan horse programs Vandals Viruses,Policy Weaknesses,Lack of a written security policy Politics High

6、turnover Concise access controls not applied Software and hardware installation and changes do not follow policy Proper security Nonexistent disaster recovery plan,Human Error,Accident Ignorance Workload Dishonesty Impersonation Disgruntled employees Snoops Denial-of-service attacks,Goals of Network

7、 Security,Achieve the state where any action that is not expressly permitted is prohibited Eliminate theft Determine authentication Identify assumptions Control secrets,Creating a Secure Network Strategy,Address both internal and external threats Define policies and procedures Reduce risk across acr

8、oss perimeter security, the Internet, intranets, and LANs,Creating a Secure Network Strategy,Human factors Know your weaknesses Limit access Achieve security through persistence Develop change management process Remember physical security Perimeter security Control access to critical network applica

9、tions, data, and services,continued,Creating a Secure Network Strategy,Firewalls Prevent unauthorized access to or from private network Create protective layer between network and outside world Replicate network at point of entry in order to receive and transmit authorized data Have built-in filters

10、 Log attempted intrusions and create reports,continued,Creating a Secure Network Strategy,Web and file servers Access control Ensures that only legitimate traffic is allowed into or out of the network Passwords PINs Smartcards,continued,Creating a Secure Network Strategy,Change management Document c

11、hanges to all areas of IT infrastructure Encryption Ensures messages cannot be intercepted or read by anyone other than the intended person(s),continued,Creating a Secure Network Strategy,Intrusion detection system (IDS) Provides 24/7 network surveillance Analyzes packet data streams within the network Searches

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论