亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? site security handbook.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁(yè) / 共 5 頁(yè)
字號(hào):
        Eight weeks later, the authorities call to inform        you the information in one of these newsletters        was used to disable "911" in a major city for        five hours.      - A user calls in to report that he can't login to his        account at 3 o'clock in the morning on a Saturday.  The        system staffer can't login either.  After rebooting to        single user mode, he finds that password file is empty.        By Monday morning, your staff determines that a number        of privileged file transfers took place between this        machine and a local university.        Tuesday morning a copy of the deleted password file is        found on the university machine along with password        files for a dozen other machines.        A week later you find that your system initialization        files had been altered in a hostile fashion.      - You receive a call saying that a breakin to a government        lab occurred from one of your center's machines.  You        are requested to provide accounting files to help        trackdown the attacker.        A week later you are given a list of machines at your        site that have been broken into.       - A reporter calls up asking about the breakin at your         center.  You haven't heard of any such breakin.        Three days later, you learn that there was a breakin.        The center director had his wife's name as a password.Site Security Policy Handbook Working Group                     [Page 6]RFC 1244                 Site Security Handbook                July 1991      - A change in system binaries is detected.        The day that it is corrected, they again are changed.        This repeats itself for some weeks.      - If an intruder is found on your system, should you        leave the system open to monitor the situation or should        you close down the holes and open them up again later?      - If an intruder is using your site, should you call law        enforcement?  Who makes that decision?  If law enforcement asks        you to leave your site open, who makes that decision?      - What steps should be taken if another site calls you and says        they see activity coming from an account on your system?  What        if the account is owned by a local manager?1.7  Basic Approach   Setting security policies and procedures really means developing a   plan for how to deal with computer security.  One way to approach   this task is suggested by Fites, et. al. [3, FITES]:      -  Look at what you are trying to protect.      -  Look at what you need to protect it from.      -  Determine how likely the threats are.      -  Implement measures which will protect your assets in a         cost-effective manner.      -  Review the process continuously, and improve things every time         a weakness is found.   This handbook will concentrate mostly on the last two steps, but the   first three are critically important to making effective decisions   about security.  One old truism in security is that the cost of   protecting yourself against a threat should be less than the cost   recovering if the threat were to strike you.  Without reasonable   knowledge of what you are protecting and what the likely threats are,   following this rule could be difficult.1.8  Organization of this Document   This document is organized into seven parts in addition to this   introduction.   The basic form of each section is to discuss issues that a site might   want to consider in creating a computer security policy and setting   procedures to implement that policy.  In some cases, possible options   are discussed along with the some of the ramifications of thoseSite Security Policy Handbook Working Group                     [Page 7]RFC 1244                 Site Security Handbook                July 1991   choices.  As far as possible, this document tries not to dictate the   choices a site should make, since these depend on local   circumstances.  Some of the issues brought up may not apply to all   sites.  Nonetheless, all sites should at least consider the issues   brought up here to ensure that they do not miss some important area.   The overall flow of the document is to discuss policy issues followed   by the issues that come up in creating procedures to implement the   policies.   Section 2 discusses setting official site policies for access to   computing resources.  It also goes into the issue of what happens   when the policy is violated.  The policies will drive the procedures   that need to be created, so decision makers will need to make choices   about policies before many of the procedural issues in following   sections can be dealt with.  A key part of creating policies is doing   some kind of risk assessment to decide what really needs to be   protected and the level of resources that should be applied to   protect them.   Once policies are in place, procedures to prevent future security   problems should be established.  Section 3 defines and suggests   actions to take when unauthorized activity is suspected.  Resources   to prevent secruity breaches are also discussed.   Section 4 discusses types of procedures to prevent security problems.   Prevention is a key to security; as an example, the Computer   Emergency Response Team/Coordination Center (CERT/CC) at Carnegie-   Mellon University (CMU) estimates that 80% or more of the problems   they see have to do with poorly chosen passwords.   Section 5 discusses incident handling: what kinds of issues does a   site face when someone violates the security policy.  Many decisions   will have to made on the spot as the incident occurs, but many of the   options and issues can be discussed in advance.  At very least,   responsibilities and methods of communication can be established   before an incident.  Again, the choices here are influenced by the   policies discussed in section 2.   Section 6 deals with what happens after a security violation has been   dealt with.  Security planning is an on-going cycle; just after an   incident has occurred is an excellent opportunity to improve policies   and procedures.   The rest of the document provides references and an annotated   bibliography.Site Security Policy Handbook Working Group                     [Page 8]RFC 1244                 Site Security Handbook                July 19912.  Establishing Official Site Policy on Computer Security2.1  Brief Overview   2.1.1  Organization Issues      The goal in developing an official site policy on computer      security is to define the organization's expectations of proper      computer and network use and to define procedures to prevent and      respond to security incidents.  In order to do this, aspects of      the particular organization must be considered.      First, the goals and direction of the organization should be      considered.  For example, a military base may have very different      security concerns from a those of a university.      Second, the site security policy developed must conform to      existing policies, rules, regulations and laws that the      organization is subject to.  Therefore it will be necessary to      identify these and take them into consideration while developing      the policy.      Third, unless the local network is completely isolated and      standalone, it is necessary to consider security implications in a      more global context.  The policy should address the issues when      local security problems develop as a result of a remote site as      well as when problems occur on remote systems as a result of a      local host or user.   2.1.2  Who Makes the Policy?      Policy creation must be a joint effort by technical personnel, who      understand the full ramifications of the proposed policy and the      implementation of the policy, and by decision makers who have the      power to enforce the policy.  A policy which is neither      implementable nor enforceable is useless.      Since a computer security policy can affect everyone in an      organization, it is worth taking some care to make sure you have      the right level of authority in on the policy decisions.  Though a      particular group (such as a campus information services group) may      have responsibility for enforcing a policy, an even higher group      may have to support and approve the policy.   2.1.3  Who is Involved?      Establishing a site policy has the potential for involving every      computer user at the site in a variety of ways.  Computer usersSite Security Policy Handbook Working Group                     [Page 9]RFC 1244                 Site Security Handbook                July 1991      may be responsible for personal password administration.  Systems      managers are obligated to fix security holes and to oversee the      system.      It is critical to get the right set of people involved at the      start of the process.  There may already be groups concerned with      security who would consider a computer security policy to be their      area.  Some of the types of groups that might be involved include      auditing/control, organizations that deal with physical security,      campus information systems groups, and so forth.  Asking these      types of groups to "buy in" from the start can help facilitate the      acceptance of the policy.   2.1.4  Responsibilities      A key element of a computer security policy is making sure      everyone knows their own responsibility for maintaining security.      A computer security policy cannot anticipate all possibilities;      however, it can ensure that each kind of problem does have someone      assigned to deal with it.      There may be levels of responsibility associated with a policy on      computer security.  At one level, each user of a computing      resource may have a responsibility to protect his account.  A user      who allows his account to be compromised increases the chances of      compromising other accounts or resources.      System managers may form another responsibility level: they must      help to ensure the security of the computer system.  Network      managers may reside at yet another level.2.2  Risk Assessment   2.2.1  General Discussion      One of the most important reasons for creating a computer security      policy is to ensure that efforts spent on security yield cost      effective benefits.  Although this may seem obvious, it is      possible to be mislead about where the effort is needed.  As an      example, there is a great deal of publicity about intruders on      computers systems; yet most surveys of computer security show that      for most organizations, the actual loss from "insiders" is much      greater.      Risk analysis involves determining what you need to protect, what      you need to protect it from, and how to protect it.  Is is the      process of examining all of your risks, and ranking those risks by      level of severity.  This process involves making cost-effectiveSite Security Policy Handbook Working Group                    [Page 10]RFC 1244                 Site Security Handbook                July 1991      decisions on what you want to protect.  The old security adage      says that you should not spend more to protect something than it      is actually worth.      A full treatment of risk analysis is outside the scope of this      document.  [3, FITES] and [16, PFLEEGER] provide introductions to      this topic.  However, there are two elements of a risk analysis      that will be briefly covered in the next two sections:         1. Identifying the assets         2. Identifying the threats      For each asset, the basic goals of security are availability,      confidentiality, and integrity.  Each threat should be examined      with an eye to how the threat could affect these areas.   2.2.2  Identifying the Assets      One step in a risk analysis is to identify all the things that      need to be protected.  Some things are obvious, like all the      various pieces of hardware, but some are overlooked, such as the      people who actually use the systems. The essential point is to      list all things that could be affected by a security problem.

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91久久免费观看| 亚洲欧美日韩中文播放| 日韩视频一区在线观看| 欧美一区二视频| 欧美一级视频精品观看| 日韩美女主播在线视频一区二区三区| 欧美电影一区二区| 日韩限制级电影在线观看| 欧美成人伊人久久综合网| 精品入口麻豆88视频| 欧美va亚洲va在线观看蝴蝶网| 日韩一区二区三区在线视频| 精品久久久久久久久久久久包黑料| 欧美一级久久久| 久久精品亚洲精品国产欧美kt∨| 欧美国产精品一区二区三区| 亚洲手机成人高清视频| 一区二区三区产品免费精品久久75 | 这里只有精品电影| 欧美一区二视频| 精品国产乱码久久久久久影片| 久久久国产一区二区三区四区小说| 国产精品日韩成人| 一区二区三区欧美在线观看| 日韩av电影免费观看高清完整版 | 丝袜亚洲另类欧美| 日本亚洲三级在线| 国产在线视频一区二区三区| 不卡一区在线观看| 欧美自拍偷拍午夜视频| 日韩一区二区三区免费观看| 国产日韩在线不卡| 亚洲综合激情另类小说区| 日日夜夜一区二区| 国产成人精品亚洲777人妖| 在线一区二区三区四区五区| 欧美妇女性影城| 国产色产综合产在线视频| 亚洲精品中文在线影院| 久久99久久99精品免视看婷婷| 成人手机在线视频| 欧美美女bb生活片| 中文字幕欧美国产| 偷拍自拍另类欧美| 成人黄色国产精品网站大全在线免费观看 | 亚洲一区二区三区小说| 麻豆极品一区二区三区| 91麻豆免费看| 欧美成人精品1314www| 亚洲欧洲制服丝袜| 国产一区二区按摩在线观看| 欧美性生活一区| 国产亚洲1区2区3区| 午夜精品在线看| 成+人+亚洲+综合天堂| 日韩午夜av电影| 一区二区在线观看av| 国内精品免费在线观看| 欧美私人免费视频| 中文一区在线播放| 久久国内精品自在自线400部| 91女人视频在线观看| www欧美成人18+| 日韩国产精品大片| 日本久久精品电影| 国产三级一区二区| 蜜桃av一区二区三区电影| 不卡视频在线观看| www成人在线观看| 调教+趴+乳夹+国产+精品| 99免费精品在线| 国产欧美日韩麻豆91| 免费一级欧美片在线观看| 欧美视频自拍偷拍| 亚洲精品国产一区二区精华液| 国产成人午夜99999| 精品国产免费人成在线观看| 亚洲第一激情av| av电影在线观看一区| 国产欧美精品一区二区色综合朱莉 | 麻豆精品一区二区综合av| 在线精品视频免费观看| 中文字幕日韩av资源站| 国产精品中文欧美| 26uuu国产电影一区二区| 美女视频黄 久久| 91精品国产一区二区三区| 婷婷综合久久一区二区三区| 91激情五月电影| 亚洲嫩草精品久久| eeuss鲁片一区二区三区| 国产欧美精品在线观看| 国产.欧美.日韩| 国产亚洲视频系列| 高清日韩电视剧大全免费| 国产日韩亚洲欧美综合| 国产精品18久久久久久久久| 久久婷婷成人综合色| 狠狠v欧美v日韩v亚洲ⅴ| 精品国产乱码久久| 国产一区二区三区在线观看精品| 日韩欧美国产午夜精品| 久久国产夜色精品鲁鲁99| 精品国产欧美一区二区| 久久99精品国产麻豆不卡| 精品少妇一区二区三区在线视频| 精品中文字幕一区二区| 亚洲精品一区二区三区精华液| 国内国产精品久久| 国产亚洲精品精华液| 成人蜜臀av电影| 亚洲欧美视频一区| 欧美日韩dvd在线观看| 免费人成在线不卡| 2021久久国产精品不只是精品| 激情综合网天天干| 久久久亚洲国产美女国产盗摄| 国产大片一区二区| 亚洲欧洲日韩综合一区二区| 91美女在线观看| 亚洲午夜精品一区二区三区他趣| 欧美精品三级日韩久久| 欧美a一区二区| ww亚洲ww在线观看国产| 成人久久视频在线观看| 亚洲免费看黄网站| 欧美一区二区三区不卡| 国产一本一道久久香蕉| 中文字幕一区二区日韩精品绯色| 欧洲激情一区二区| 久久不见久久见免费视频1| 国产精品全国免费观看高清| 色哟哟国产精品免费观看| 人人精品人人爱| 亚洲va韩国va欧美va| 日韩一区二区中文字幕| 成人性生交大片免费看在线播放| 亚洲精品成人在线| 欧美一级欧美一级在线播放| 国产91对白在线观看九色| 亚洲一区二区三区精品在线| 欧美va亚洲va在线观看蝴蝶网| av在线综合网| 青青草国产成人av片免费| 国产亚洲精品久| 欧美久久久久久蜜桃| 国产精品99久久久久久宅男| 亚洲国产中文字幕在线视频综合 | 亚洲一区中文日韩| 精品日韩在线观看| 91首页免费视频| 久久国产乱子精品免费女| 成人欧美一区二区三区小说| 91精品国产综合久久精品麻豆| 粉嫩高潮美女一区二区三区 | 久久99精品久久久久久| 一区二区在线观看免费| 久久嫩草精品久久久精品| 在线欧美日韩精品| 懂色av一区二区在线播放| 偷偷要91色婷婷| 亚洲免费看黄网站| 欧美极品美女视频| 欧美乱熟臀69xxxxxx| 色综合中文字幕国产 | 亚洲天堂福利av| 欧美变态tickle挠乳网站| 欧美色图一区二区三区| 丁香天五香天堂综合| 日韩高清在线一区| 一区二区三区四区国产精品| 久久久精品免费网站| 91精品国产丝袜白色高跟鞋| 不卡av在线免费观看| 韩国女主播成人在线| 亚洲电影中文字幕在线观看| 成人免费在线视频观看| 久久久久亚洲综合| 在线播放亚洲一区| 欧美在线不卡视频| 99视频精品全部免费在线| 国产高清精品在线| 久久不见久久见中文字幕免费| 亚洲第一综合色| 亚洲手机成人高清视频| 国产精品嫩草影院av蜜臀| 久久综合九色综合97婷婷女人| 欧美日韩二区三区| 欧美日韩在线精品一区二区三区激情 | 日本乱人伦一区| 成人在线视频首页| 国产美女一区二区三区| 精品亚洲成av人在线观看| 蜜臀av一级做a爰片久久| 午夜视频一区二区三区| 亚洲免费av高清| 一区二区三区美女视频| 一区二区三区免费观看| 亚洲免费视频成人| 一二三四社区欧美黄|