亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 292-295.html

?? 入侵檢測的相關(guān)教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			</SELECT>
			</font></td>
	</tr>
	</table>
	</form>
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=10//-->
<!--PAGES=292-295//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="290-292.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="296-298.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H4 ALIGN="LEFT"><A NAME="Heading10"></A><FONT COLOR="#000077">Local Vulnerabilities</FONT></H4>
<P>A number of security policy settings can compromise a system. A vulnerability checker, such as SAFESuite, eNTrax, or KSA, needs to plow through the system and find any weaknesses. A vulnerability is not necessarily a hack. For example, if the Administrator password is blank, this is not exactly what you would call a well-known and carefully orchestrated hack. A configuration error such as this is simply poor administration, unless you had set the password yesterday, and today you find that it has been cleared.
</P>
<P>NT vulnerability checkers look for NT configuration problems such as the following:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Guest account enabled, which allows remote users without an account to be able to access some of the resources on your system.
<DD><B>&#149;</B>&nbsp;&nbsp;Guest account has no password, allowing remote users access <I>without requiring a password</I> (at one time this was a default setting on NT).
<DD><B>&#149;</B>&nbsp;&nbsp;Password composition and aging rules.
<DD><B>&#149;</B>&nbsp;&nbsp;Weak passwords that can be broken with a cracker.
<DD><B>&#149;</B>&nbsp;&nbsp;Failed login thresholds.
<DD><B>&#149;</B>&nbsp;&nbsp;Permissions on registry entries (numerous hacks have occurred because registry entries were not adequately controlled with DAC, including the famous HKEY-CLASSES_ROOT key whose lack of protection in NT 3.51 allowed arbitrary users to control which programs were launched for given file extensions).
<DD><B>&#149;</B>&nbsp;&nbsp;Remote registry access enabled, allowing remote administrators the opportunity to change critical system settings.
<DD><B>&#149;</B>&nbsp;&nbsp;Individual registry settings.
<DD><B>&#149;</B>&nbsp;&nbsp;Improper permissions on system files and directories, such as the NT perfmon utility that can be used to sniff network packets.
<DD><B>&#149;</B>&nbsp;&nbsp;Unknown services that do not ship by default with NT.
<DD><B>&#149;</B>&nbsp;&nbsp;Running services that are vulnerable to attack, such as SMB running on a Web server, which gives remote probers plenty of information useful for cracking attempts (or the Alerter, which might be used by internal hackers to display Trojan Horse screens asking other users for passwords).
<DD><B>&#149;</B>&nbsp;&nbsp;Shares with permission access control settings, giving full access to remote users.
<DD><B>&#149;</B>&nbsp;&nbsp;Whether IP forwarding is enabled, which can be used to facilitate network attacks.
</DL>
<P>For each of the problems listed, many scenarios exist. David LeBlanc of ISS identified registry key permissions for the Winlogon entry, which allowed Server Operator users to set the initial program for other users. The same flaw allowed operators to change the initial program run when the NT operating system booted. Thus, one easily could get a copy of files from another user even though under normal conditions one would not have read permission to those files. Also, Server Operator users could exploit this hole to easily gain Administrator rights. Plenty of other examples demonstrate vulnerabilities ranging from mild to severe.
</P>
<P>This list represents only a subset of the suite of vulnerabilities a local system can face. Because tracking the security state of these items is nearly impossible with automation, you should invest in one of the NT scanners described in this chapter.</P>
<H3><A NAME="Heading11"></A><FONT COLOR="#000077">Intrusion Detection Products for NT</FONT></H3>
<P>In this section are descriptions of some of the leading NT IDSs. Unfortunately, it is impossible to describe all of the IDS offerings for NT today. The selections here were chosen because in many ways they are complementary rather than competitive.
</P>
<H4 ALIGN="LEFT"><A NAME="Heading12"></A><FONT COLOR="#000077">Look for These Features</FONT></H4>
<P>As in your examination of UNIX IDSs, you need to consider both the features provided by the tools that are important for managing the IDS <I>and</I> the list of attacks detected. You should consider the following systems management factors:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Is the product client-server? If so, is it heterogeneous so that it works across UNIX and NT systems?
<DD><B>&#149;</B>&nbsp;&nbsp;Does the product provide distributed systems management? For example, if the event log is used, can you configure event logs on all of the target machines from the central console?
<DD><B>&#149;</B>&nbsp;&nbsp;How useful are the reports? Can you create your own reports from the data?
<DD><B>&#149;</B>&nbsp;&nbsp;What is the scalability of the tool? How many target nodes can the tool concurrently analyze?
<DD><B>&#149;</B>&nbsp;&nbsp;What kinds of alerts and countermeasures are possible? Can the IDS disable network connections, kill logins, disable logins, or execute administrator defined programs or scripts?
</DL>
<P>Because new product releases appear at least every quarter, you should contact the IDS vendors directly for the latest information on tools you are interested in deploying. Naturally, only by running the products in pilot projects will you be able to properly evaluate them.
</P>
<H4 ALIGN="LEFT"><A NAME="Heading13"></A><FONT COLOR="#000077">Centrax</FONT></H4>
<P>Slightly more than a year old, Centrax (<A HREF="www.centraxcorp.com">www.centraxcorp.com</A>) is a company formed primarily by experts from the CMDS team formerly with SAIC. Many skilled IDS programmers also have joined the Centrax team. The chief product developed by Centrax is called eNTrax.</P>
<P>eNTrax provides key benefits to an organization including the following:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Detection and response of information threats and misuse
<DD><B>&#149;</B>&nbsp;&nbsp;Deterrence of further misuse
<DD><B>&#149;</B>&nbsp;&nbsp;Damage assessment
<DD><B>&#149;</B>&nbsp;&nbsp;Possible prosecution support
</DL>
<P>eNTrax is comprised of two main components: a Command Console and a Target Service. The Command Console provides centralized management of the network. Figure 10.1 shows the main eNTrax console. From the console, you can monitor, detect, and respond to security problems on remote systems. At the console an administrator is alerted to potential misuses and attacks. Responses to attacks can be configured in advance, or an administrator can choose a security alert and interactively respond. Today, eNTrax supports remote system shutdown, remotely killing the login session of the offending user, and disabling the login capabilities of a user. The Command Console manages configuration and collection of audit data from target computers. This feature is valuable because it consolidates log files from NT targets onto a common server. You can keep the raw audit data as NT records it or rely on the event database that eNTrax constructs from the data.
</P>
<P><A NAME="Fig1"></A><A HREF="javascript:displayWindow('images/10-01.jpg',1024,768 )"><IMG SRC="images/10-01t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/10-01.jpg',1024,768)"><FONT COLOR="#000077"><B>Figure 10.1</B></FONT></A>&nbsp;&nbsp;Command Console for eNTrax.</P>
<P>A target computer is any workstation or server on the network. Each target computer creates audit data as a user performs work such as opening files, copying files, or deleting files. The Target Service, installed on each workstation and server in the network, enables a communications channel between the Command Console and the target.
</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="290-292.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="296-298.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美在线观看视频一区二区三区| 日韩av电影天堂| 精品国产髙清在线看国产毛片| 99久久国产综合精品女不卡| 国产乱理伦片在线观看夜一区| 日韩欧美电影一二三| 成人免费视频一区| 久久黄色级2电影| 日韩美女视频一区二区在线观看| 国产一区二区h| 欧美国产欧美综合| 激情综合一区二区三区| 成人免费视频视频在线观看免费| 一区二区三区视频在线看| av不卡一区二区三区| 久久99久久精品| 色一情一伦一子一伦一区| 日韩欧美一区二区久久婷婷| 亚洲成人激情自拍| 欧美最猛性xxxxx直播| 激情六月婷婷综合| 93久久精品日日躁夜夜躁欧美| 国产精品视频在线看| 久久99九九99精品| 欧美一级免费观看| 看片网站欧美日韩| 综合网在线视频| 精品伊人久久久久7777人| 91网站在线观看视频| 青草国产精品久久久久久| 日韩精品一区二区在线观看| 国产suv精品一区二区883| 欧美一区二区三区视频| 欧美v日韩v国产v| 欧美激情一区二区三区不卡| 亚洲免费在线电影| 亚洲福利电影网| 在线不卡一区二区| 亚洲一区电影777| 色婷婷综合久色| 欧美日韩一区二区三区高清| 一本久久综合亚洲鲁鲁五月天 | 91丨porny丨首页| 一本久道久久综合中文字幕| 国产黄色精品网站| 亚洲精品大片www| 99久久精品费精品国产一区二区| 在线观看亚洲成人| 青青草原综合久久大伊人精品| 欧美日韩国产高清一区二区三区| 欧美美女一区二区| 国产真实乱偷精品视频免| 久久九九久久九九| 国产精品美日韩| 亚洲欧洲成人自拍| 欧美aaaaaa午夜精品| 丁香婷婷深情五月亚洲| 亚洲精品高清视频在线观看| 91久久久免费一区二区| 国产中文一区二区三区| 99久久精品久久久久久清纯| 中文字幕+乱码+中文字幕一区| 91精品国产综合久久精品麻豆 | 久久久噜噜噜久久中文字幕色伊伊 | 国产精品系列在线| 欧美性大战久久久久久久| 欧美大肚乱孕交hd孕妇| 国产精品国产三级国产aⅴ入口| 欧美国产成人精品| 国产乱人伦精品一区二区在线观看| 99久免费精品视频在线观看| 国产亚洲自拍一区| 日韩国产欧美在线视频| 欧美卡1卡2卡| 亚洲一区av在线| 一本大道久久a久久精二百| 久久久久久97三级| 肉丝袜脚交视频一区二区| 欧美亚洲禁片免费| 中文字幕国产一区二区| 波多野洁衣一区| 国产精品理伦片| 精品一区二区免费视频| 欧美精品一区二区蜜臀亚洲| 看片网站欧美日韩| www激情久久| 丰满放荡岳乱妇91ww| 中文字幕不卡在线| 色综合久久九月婷婷色综合| 亚洲激情在线播放| 欧美日韩精品三区| 另类调教123区| 欧美韩国一区二区| 91啪九色porn原创视频在线观看| 一区二区三区四区乱视频| 欧美在线你懂得| 日韩福利电影在线| 国产日韩v精品一区二区| 99精品1区2区| 丝袜诱惑制服诱惑色一区在线观看| 欧美另类z0zxhd电影| 韩国一区二区三区| 中文字幕制服丝袜成人av| 91国产免费看| 极品瑜伽女神91| 国产精品久久久久久久蜜臀| 欧美四级电影网| 六月丁香婷婷色狠狠久久| 国产精品入口麻豆九色| 欧美色偷偷大香| 国产成人综合在线播放| 亚洲一区二区三区小说| 欧美videossexotv100| 91亚洲资源网| 久久91精品国产91久久小草| 国产精品免费人成网站| 91精品国产91久久综合桃花| av亚洲精华国产精华精| 午夜精品久久久久久久蜜桃app| 久久久午夜精品理论片中文字幕| 日本丶国产丶欧美色综合| 国产一区二区三区在线观看免费视频| 中文字幕日本乱码精品影院| 精品国产伦一区二区三区观看方式| 波多野结衣中文字幕一区二区三区| 亚洲成av人影院在线观看网| 亚洲国产激情av| 日韩精品一区二区在线观看| 欧美性一二三区| 99久久免费视频.com| 国产一区二区三区精品视频 | 色综合久久天天| 国产福利视频一区二区三区| 日本中文字幕不卡| 午夜精品久久久久久久久久久 | www国产成人免费观看视频 深夜成人网| 国产高清一区日本| 2023国产精品| 久久aⅴ国产欧美74aaa| 色婷婷精品久久二区二区蜜臂av| 水蜜桃久久夜色精品一区的特点| 亚洲免费观看高清完整版在线| 国产精品精品国产色婷婷| 久久夜色精品国产欧美乱极品| 欧美tickling挠脚心丨vk| 欧美电影免费观看完整版| 91麻豆精品国产综合久久久久久| 91精品国产综合久久小美女| 精品国产免费视频| 亚洲制服欧美中文字幕中文字幕| 日韩午夜精品视频| 久久美女高清视频| 亚洲欧美激情在线| 蜜臀av性久久久久蜜臀aⅴ四虎 | 精品对白一区国产伦| 日韩精品中文字幕一区二区三区| 日韩欧美一级特黄在线播放| 欧美日韩国产首页| 成人激情综合网站| 国产一区不卡在线| av午夜精品一区二区三区| 欧美亚洲自拍偷拍| 日韩亚洲欧美一区| 国产精品福利一区| 伊人色综合久久天天人手人婷| 亚洲综合色视频| 国产麻豆9l精品三级站| 色域天天综合网| 国产精品理论在线观看| 免费看日韩精品| 精品动漫一区二区三区在线观看| 欧美男人的天堂一二区| 中文字幕亚洲在| 久久国产精品99久久久久久老狼| 国内精品写真在线观看| 日本高清不卡aⅴ免费网站| 欧美一级日韩免费不卡| 国产日产欧美一区| 激情综合色播激情啊| 在线日韩国产精品| 亚洲欧洲一区二区在线播放| 视频一区国产视频| 欧美午夜电影在线播放| 中文在线一区二区| 国产成人精品网址| 国产亲近乱来精品视频| 国产一区在线视频| 国产日韩欧美电影| 另类小说视频一区二区| 国产真实精品久久二三区| 欧美私模裸体表演在线观看| 日本一区二区三区四区在线视频| 自拍偷拍国产亚洲| 国产精品白丝jk黑袜喷水| 欧美无砖砖区免费| 亚洲综合久久av| 在线日韩av片| 久久精品欧美一区二区三区不卡| 亚洲综合一二区| 欧美精品成人一区二区三区四区|