亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? site security handbook.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Network Working Group                                        P. HolbrookRequest for Comments:  1244                                       CICNetFYI: 8                                                       J. Reynolds                                                                     ISI                                                                 Editors                                                               July 1991                         Site Security HandbookStatus of this Memo   This handbook is the product of the Site Security Policy Handbook   Working Group (SSPHWG), a combined effort of the Security Area and   User Services Area of the Internet Engineering Task Force (IETF).   This FYI RFC provides information for the Internet community.  It   does not specify an Internet standard.  Distribution of this memo is   unlimited.Contributing Authors   The following are the authors of the Site Security Handbook.  Without   their dedication, this handbook would not have been possible.   Dave Curry (Purdue University), Sean Kirkpatrick (Unisys), Tom   Longstaff (LLNL), Greg Hollingsworth (Johns Hopkins University),   Jeffrey Carpenter (University of Pittsburgh), Barbara Fraser (CERT),   Fred Ostapik (SRI NISC), Allen Sturtevant (LLNL), Dan Long (BBN), Jim   Duncan (Pennsylvania State University), and Frank Byrum (DEC).Editors' Note   This FYI RFC is a first attempt at providing Internet users guidance   on how to deal with security issues in the Internet.  As such, this   document is necessarily incomplete.  There are some clear shortfalls;   for example, this document focuses mostly on resources available in   the United States.  In the spirit of the Internet's "Request for   Comments" series of notes, we encourage feedback from users of this   handbook.  In particular, those who utilize this document to craft   their own policies and procedures.   This handbook is meant to be a starting place for further research   and should be viewed as a useful resource, but not the final   authority.  Different organizations and jurisdictions will have   different resources and rules.  Talk to your local organizations,   consult an informed lawyer, or consult with local and national law   enforcement.  These groups can help fill in the gaps that this   document cannot hope to cover.Site Security Policy Handbook Working Group                     [Page 1]RFC 1244                 Site Security Handbook                July 1991   Finally, we intend for this FYI RFC to grow and evolve.  Please send   comments and suggestions to: ssphwg@cert.sei.cmu.edu.Table of Contents1.  Introduction.....................................................  31.1  Purpose of this Work............................................  31.2  Audience........................................................  31.3  Definitions.....................................................  41.4  Related Work....................................................  41.5  Scope...........................................................  41.6  Why Do We Need Security Policies and Procedures?................  51.7  Basic Approach..................................................  71.8  Organization of this Document...................................  72.  Establishing Official Site Policy on Computer Security...........  92.1  Brief Overview..................................................  92.2  Risk Assessment................................................. 102.3  Policy Issues................................................... 132.4  What Happens When the Policy Is Violated........................ 192.5  Locking In or Out............................................... 212.6  Interpreting the Policy......................................... 232.7  Publicizing the Policy.......................................... 233.  Establishing Procedures to Prevent Security Problems............. 243.1  Security Policy Defines What Needs to be Protected.............. 243.2  Identifing Possible Problems.................................... 243.3  Choose Controls to Protect Assets in a Cost-Effective Way....... 263.4  Use Multiple Strategies to Protect Assets....................... 263.5  Physical Security............................................... 273.6  Procedures to Recognize Unauthorized Activity................... 273.7  Define Actions to Take When Unauthorized Activity is Suspected.. 293.8  Communicating Security Policy................................... 303.9  Resources to Prevent Security Breaches.......................... 344.  Types of Security Procedures..................................... 564.1  System Security Audits.......................................... 564.2  Account Management Procedures................................... 574.3  Password Management Procedures.................................. 574.4  Configuration Management Procedures............................. 605.  Incident Handling................................................ 615.1  Overview........................................................ 615.2  Evaluation...................................................... 655.3  Possible Types of Notification.................................. 675.4  Response........................................................ 715.5  Legal/Investigative............................................. 735.6  Documentation Logs.............................................. 776.  Establishing Post-Incident Procedures............................ 786.1  Overview........................................................ 786.2  Removing Vulnerabilities........................................ 786.3  Capturing Lessons Learned....................................... 80Site Security Policy Handbook Working Group                     [Page 2]RFC 1244                 Site Security Handbook                July 19916.4  Upgrading Policies and Procedures............................... 817.  References....................................................... 818.  Annotated Bibliography........................................... 838.1  Computer Law.................................................... 848.2  Computer Security............................................... 858.3  Ethics.......................................................... 918.4  The Internet Worm............................................... 938.5  National Computer Security Center (NCSC)........................ 958.6  Security Checklists............................................. 998.7  Additional Publications......................................... 999.  Acknlowledgements................................................10110.  Security Considerations.........................................10111.  Authors' Addresses..............................................1011.  Introduction1.1  Purpose of this Work   This handbook is a guide to setting computer security policies and   procedures for sites that have systems on the Internet.  This guide   lists issues and factors that a site must consider when setting their   own policies.  It makes some recommendations and gives discussions of   relevant areas.   This guide is only a framework for setting security policies and   procedures.  In order to have an effective set of policies and   procedures, a site will have to make many decisions, gain agreement,   and then communicate and implement the policies.1.2  Audience   The audience for this work are system administrators and decision   makers (who are more traditionally called "administrators" or "middle   management") at sites.  This document is not directed at programmers   or those trying to create secure programs or systems.  The focus of   this document is on the policies and procedures that need to be in   place to support any technical security features that a site may be   implementing.   The primary audience for this work are sites that are members of the   Internet community.  However, this document should be useful to any   site that allows communication with other sites.  As a general guide   to security policies, this document may also be useful to sites with   isolated systems.Site Security Policy Handbook Working Group                     [Page 3]RFC 1244                 Site Security Handbook                July 19911.3  Definitions   For the purposes of this guide, a "site" is any organization that   owns computers or network-related resources.  These resources may   include host computers that users use, routers, terminal servers,   PC's or other devices that have access to the Internet.  A site may   be a end user of Internet services or a service provider such as a   regional network.  However, most of the focus of this guide is on   those end users of Internet services.   We assume that the site has the ability to set policies and   procedures for itself with the concurrence and support from those who   actually own the resources.   The "Internet" is those set of networks and machines that use the   TCP/IP protocol suite, connected through gateways, and sharing a   common name and address spaces [1].   The term "system administrator" is used to cover all those who are   responsible for the day-to-day operation of resources.  This may be a   number of individuals or an organization.   The term "decision maker" refers to those people at a site who set or   approve policy.  These are often (but not always) the people who own   the resources.1.4  Related Work   The IETF Security Policy Working Group (SPWG) is working on a set of   recommended security policy guidelines for the Internet [23].  These   guidelines may be adopted as policy by regional networks or owners of   other resources.  This handbook should be a useful tool to help sites   implement those policies as desired or required.  However, even   implementing the proposed policies isn't enough to secure a site.   The proposed Internet policies deal only with network access   security.  It says nothing about how sites should deal with local   security issues.1.5  Scope   This document covers issues about what a computer security policy   should contain, what kinds of procedures are need to enforce   security, and some recommendations about how to deal with the   problem.  When developing a security policy, close attention should   be made not only on the security needs and requirements of the local   network, but also the security needs and requirements of the other   interconnected networks.Site Security Policy Handbook Working Group                     [Page 4]RFC 1244                 Site Security Handbook                July 1991   This is not a cookbook for computer security.  Each site has   different needs; the security needs of a corporation might well be   different than the security needs of an academic institution.  Any   security plan has to conform to the needs and culture of the site.   This handbook does not cover details of how to do risk assessment,   contingency planning, or physical security.  These things are   essential in setting and implementing effective security policy, but   this document leaves treatment of those issues to other documents.   We will try to provide some pointers in that direction.   This document also doesn't talk about how to design or implement   secure systems or programs.1.6  Why Do We Need Security Policies and Procedures?   For most sites, the interest in computer security is proportional to   the perception of risk and threats.   The world of computers has changed dramatically over the past   twenty-five years.  Twenty-five years ago, most computers were   centralized and managed by data centers.  Computers were kept in   locked rooms and staffs of people made sure they were carefully   managed and physically secured.  Links outside a site were unusual.   Computer security threats were rare, and were basically concerned   with insiders: authorized users misusing accounts, theft and   vandalism, and so forth.  These threats were well understood and   dealt with using standard techniques: computers behind locked doors,   and accounting for all resources.   Computing in the 1990's is radically different.  Many systems are in   private offices and labs, often managed by individuals or persons   employed outside a computer center.  Many systems are connected into   the Internet, and from there around the world: the United States,   Europe, Asia, and Australia are all connected together.   Security threats are different today.  The time honored advice says   "don't write your password down and put it in your desk" lest someone   find it.  With world-wide Internet connections, someone could get   into your system from the other side of the world and steal your   password in the middle of the night when your building is locked up.   Viruses and worms can be passed from machine to machine.  The   Internet allows the electronic equivalent of the thief who looks for   open windows and doors; now a person can check hundreds of machines   for vulnerabilities in a few hours.   System administrators and decision makers have to understand the   security threats that exist, what the risk and cost of a problemSite Security Policy Handbook Working Group                     [Page 5]RFC 1244                 Site Security Handbook                July 1991   would be, and what kind of action they want to take (if any) to   prevent and respond to security threats.   As an illustration of some of the issues that need to be dealt with   in security problems, consider the following scenarios (thanks to   Russell Brand [2, BRAND] for these):      - A system programmer gets a call reporting that a        major underground cracker newsletter is being        distributed from the administrative machine at his        center to five thousand sites in the US and        Western Europe.

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲精品国产第一综合99久久 | 久久国产婷婷国产香蕉| 在线中文字幕不卡| 亚洲午夜精品在线| 日韩你懂的在线播放| 国内精品在线播放| 国产欧美精品一区二区色综合朱莉| 国内精品在线播放| 国产精品三级电影| 欧美调教femdomvk| 久久精品噜噜噜成人88aⅴ| www国产成人| 成人爱爱电影网址| 午夜视频在线观看一区| 日韩欧美亚洲国产精品字幕久久久 | 色久优优欧美色久优优| 亚洲h在线观看| 久久综合av免费| 日韩欧美精品在线| bt7086福利一区国产| 午夜免费久久看| 久久综合九色综合欧美98| 成人av在线播放网址| 亚洲成人动漫在线观看| 久久久99精品久久| 欧美视频三区在线播放| 国产一二精品视频| 亚洲成av人片在线观看| 国产亚洲精品资源在线26u| 日本精品视频一区二区三区| 喷水一区二区三区| 亚洲欧洲av另类| 日韩欧美国产一区二区在线播放| 91在线视频官网| 九色综合狠狠综合久久| 樱花影视一区二区| 国产亚洲欧美色| 欧美一区二区三区视频免费播放| 成人黄色777网| 久久99久久久久| 亚洲午夜免费视频| 国产精品视频一二三| 欧美成人在线直播| 欧美日韩黄色影视| eeuss鲁片一区二区三区| 久久er精品视频| 亚洲成a人v欧美综合天堂下载 | 亚洲日本在线天堂| 欧美日韩一级黄| 色综合激情五月| 国产日韩欧美综合一区| 色婷婷综合激情| 国产 欧美在线| 免费不卡在线观看| 亚洲与欧洲av电影| 国产精品久久久久久久岛一牛影视| 欧美一二三在线| 欧美日韩精品三区| 色94色欧美sute亚洲线路一久 | 99精品久久99久久久久| 国产大片一区二区| 另类中文字幕网| 日韩激情视频在线观看| 午夜精品免费在线| 亚洲国产精品一区二区www| 亚洲精品你懂的| 国产精品污www在线观看| 国产欧美精品一区二区色综合| 精品三级在线看| 日韩一区二区免费在线电影| 欧美另类高清zo欧美| 色噜噜狠狠成人中文综合| 成人综合婷婷国产精品久久| 国产成人亚洲综合a∨猫咪| 久久99久久久久久久久久久| 久久成人18免费观看| 麻豆久久久久久| 国内成+人亚洲+欧美+综合在线| 九九视频精品免费| 久久99精品一区二区三区三区| 久久精品免费观看| 久99久精品视频免费观看| 精品一区中文字幕| 欧美日韩中文另类| 欧美色区777第一页| 欧美伦理电影网| 日韩一二在线观看| 欧美tickle裸体挠脚心vk| 日韩精品一区二区三区中文不卡| 日韩欧美精品三级| 久久蜜桃av一区精品变态类天堂| 国产欧美一区二区在线| 国产精品色噜噜| 亚洲尤物视频在线| 丝袜诱惑亚洲看片| 国产一区二区精品在线观看| 国产风韵犹存在线视精品| 成人99免费视频| 欧美午夜不卡在线观看免费| 91精品国产入口在线| 久久久亚洲综合| 中文字幕一区二区三区不卡在线| 一区二区三区精品视频| 日韩和欧美的一区| 精品一区二区成人精品| 成人丝袜高跟foot| 欧美日韩国产影片| 亚洲精品一区二区在线观看| 国产精品久久久久久久久免费樱桃| 樱桃视频在线观看一区| 蜜臀av性久久久久蜜臀av麻豆| 国产成人午夜电影网| 欧美性大战久久| 久久综合久久综合亚洲| 亚洲免费资源在线播放| 蜜臀国产一区二区三区在线播放| 成人中文字幕合集| 欧美精品99久久久**| 久久精品亚洲乱码伦伦中文| 亚洲国产你懂的| 国产成人在线免费| 欧美日本不卡视频| 日本一区二区不卡视频| 肉色丝袜一区二区| 成人丝袜视频网| 91麻豆精品国产自产在线观看一区 | 日韩av成人高清| 99r国产精品| 久久久另类综合| 亚洲18色成人| 色域天天综合网| 久久噜噜亚洲综合| 奇米四色…亚洲| 色94色欧美sute亚洲线路一ni | 欧美一区二区网站| 亚洲女人小视频在线观看| 国产在线精品一区二区夜色 | 国产成人aaa| 日韩一区二区精品| 亚洲国产aⅴ成人精品无吗| 粉嫩av亚洲一区二区图片| 3751色影院一区二区三区| 亚洲黄色片在线观看| caoporn国产一区二区| 久久久久久久久久久久电影 | 亚洲一级不卡视频| 成人网在线播放| 婷婷久久综合九色综合伊人色| 91香蕉视频污在线| 日本一区二区免费在线| 老司机一区二区| 欧美日韩亚洲综合一区二区三区| 亚洲视频免费在线| 不卡视频在线观看| 欧美极品美女视频| 风间由美一区二区三区在线观看 | 国产网红主播福利一区二区| 美女性感视频久久| 欧美精品在欧美一区二区少妇| 一区二区三区在线观看网站| 91在线视频观看| 亚洲免费观看高清完整版在线观看| 99热99精品| 最新成人av在线| 色婷婷综合五月| 亚洲黄色av一区| 欧美日韩精品一区二区| 亚洲福利国产精品| 911国产精品| 日韩av电影天堂| 精品入口麻豆88视频| 激情综合一区二区三区| 精品国产一区久久| 国产精品1区2区| 国产精品国产三级国产| 91在线视频网址| 亚洲图片有声小说| 欧美精品久久99| 另类综合日韩欧美亚洲| 精品国产免费人成电影在线观看四季| 美日韩一区二区| 国产三区在线成人av| 成人app下载| 亚洲成av人片在www色猫咪| 91精品午夜视频| 黄页网站大全一区二区| 国产欧美日韩不卡免费| 91免费观看国产| 午夜av区久久| 精品国产一区二区精华| 国产99久久久精品| 亚洲精品视频在线看| 欧美精品国产精品| 国产高清精品久久久久| 国产精品蜜臀av| 欧美色手机在线观看| 国产在线不卡一区| 亚洲素人一区二区| 91精品一区二区三区在线观看| 精品在线一区二区三区|