亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ch12.htm

?? this explains the working of intranets.
?? HTM
字號:
<HTML><HEAD><TITLE>Chapter 12 -- Overview of an Intranet Security System</TITLE><META></HEAD><BODY TEXT="#000000" BGCOLOR="#FFFFFF" LINK="#0000EE" VLINK="#551A8B" ALINK="#CE2910"><H1><FONT SIZE=6 COLOR=#FF0000>Chapter&nbsp;12</FONT></H1><H1><FONT SIZE=6 COLOR=#FF0000>Overview of an Intranet SecuritySystem</FONT></H1><HR><P><CENTER><B><FONT SIZE=5><A NAME="CONTENTS">CONTENTS</A></FONT></B></CENTER><UL><LI><A HREF="#OverviewofanIntranetSecuritySystem">Overview of an Intranet Security System</A></UL><HR><P>If you think that you're completely safe from external threats,think again. Consider this: A government study found that theUnited States Pentagon's computers are attacked by hackers some250,000 times a year-and that about 160,000 of those times theattacks are successful. In the successful attacks, data and softwareare read, stolen, modified, or destroyed. The attacks have costthe government hundreds of millions of dollars.<P>If the Pentagon can be broken into, so can you. Intranets arevulnerable because of the openness of Internet technology. Lookat it this way: There's a door between your intranet and the Internetthat lets people inside an intranet go out onto the Internet toget information. That same door can let intruders from the Internetinto your intranet.<P>In addition to unauthorized external access that leads to attacksand theft, there are other security issues to worry about. It'snot just people from outside the intranet who can pose securityrisks. People within the corporation on the intranet can poseproblems as well. There is data within a company that requiresrestricted access, such as personnel records. Malicious mischiefis not restricted only to people outside a company.<P>Computer viruses can be brought in to the intranet with an innocentlooking program picked up on the Internet. It can then infectthe other computers on the intranet, damaging millions of dollarsworth of hardware and software.<P>There are ways to combat these problems. Any intranet needs tohave a comprehensive security system in place. In addition toconsidering the nature of the threats that require defensive measures,you must evaluate factors such as the size of the intranet and/orcompany, the value or confidentiality of the data, and how importantan uninterrupted, operational intranet is to the company. Technologychanges all the time, so the system needs to be constantly monitoredand updated.<P>Security systems are generically referred to as <I>firewalls</I>.Firewalls are hardware/software combinations that allow peoplefrom inside an intranet to access data on the Internet, but keepintruders from getting onto the intranet. In fact, firewalls areonly one part of a comprehensive intranet security system.<P>Routers play a major role in firewalls-and are important in anysecurity system. Routers are the technology that lets people onthe intranet connect to the Internet, and allows data from theInternet to get to users on the intranet. Because all data goingto and from the Internet passes through routers, they're a logicalplace to put security measures. A variety of security measurescan be used in concert with routers. The primary one is called<I>filtering</I> and is accomplished by <I>filtering routers</I>.What filtering routers do is quite simple. They examine everypacket coming into and going out of an intranet. Based on a setof rules that a system administrator has established, the routerwill let some packets in (pass) and will keep other packets out(drop). For example, packets coming from specific users or specificnetworks can be blocked. Access to entire Internet resources,such as FTP, can be blocked if, for example, a system administratorfears a virus infection if file transfers were allowed.<P>Proxy servers are another important tool in the fight for intranetsecurity. They allow people on an intranet to get to Internetresources, but the proxy servers act as a kind of go-between.In a system set up with a proxy server, this process can be invisibleto the user making the request. The proxy server evaluates therequest against an authorization database, and if the requestis acceptable, the proxy contacts the Internet. The returningpage also passes through the proxy server from the Internet andpasses it to the person who requested it. In this way, the proxyserver can keep a record of all transactions, and provides a trailto track any kind of attacks. Additionally, the proxy server canbe used as a way to keep the intranet shielded from the Internet,because the only IP address going out to the Internet is thatof the proxy server, so anyone trying to capture IP addressesfor a spoofing attack (pretending to be a legitimate client) can't&quot;see&quot; the originating IP addresses.<P>Another kind of server important for intranet security is a <I>bastionserver</I>. A bastion server is configured especially to resistattacks. Frequently, it is put on its own subnetwork, known asa perimeter network. That way, if the bastion server is attackedand broken into, the intranet is still shielded-the only partcompromised is the bastion server.<P>Encryption and authentication systems are used to prevent unauthorizedaccess to an intranet. Encryption can be used to protect dataand passwords. Encryption depends on the use of secret and/orpublic keys. User names and passwords can be compromised fairlyeasily, allowing someone to masquerade as a legitimate user. Authenticationsystems expand on the basic &quot;something you know&quot; securityprovided by passwords to one that checks that there is &quot;somethingyou have&quot; that is uniquely in your possession, a token ofsome sort. Encrypted digital signatures are created with keysthat also are uniquely in your possession so they can't be alteredwithout such tampering being discovered. Encrypted digital signatureshelp authenticate the sender of a message and protect againstmessage tampering.<P>Viruses are a major concern to anyone running an intranet. Whilethe threat of viruses is undoubtedly overblown by the news media,the truth is that viruses are a problem and a potential danger.One way to solve the problem is to use traditional virus scanningand eradication software. This software runs on each user's computer,and allows people to check their computers for viruses, and tokill the virus if at all possible. But doing things that way dependson each user actually running the most up-to-date virus checkers,which doesn't always happen. A better solution is to run virus-checkingsoftware specifically designed for intranets. It runs on a server,and as files are sent to the intranet it checks them for viruses.If they're virus-free, it lets them through. If they appear tocontain viruses, it blocks them.<P>There is software that can block users from accessing objectionablesites, such as sites with violent or sexual content. On an intraneta server-based software that does this examines outgoing requests,such as the URL name and words contained in the header of thefile. The software has a database of objectionable URLs and objectionablewords. When it comes across a site that has an objectionable URLor objectionable word, it won't allow that request to be sent.It will also inform the user that the site is blocked. Since thereare so many sites on the Internet, and so many more new ones beingcreated each day, the database can be updated monthly. That way,even new sites will be blocked.<P>Traffic monitoring is another method to maintain a secure intranet.This is software that sits on a server, and monitors all trafficbetween the Internet and the intranet. It can also monitor alltraffic on the intranet itself. The intranet administrator canset rules and decide what kind of traffic to track. The natureof the traffic is the area of concern when trying to assure yourselfthat only authorized users and services are involved.<H2><A NAME="OverviewofanIntranetSecuritySystem"><FONT SIZE=5 COLOR=#FF0000>Overview of an Intranet Security System</FONT></A></H2><P>Any intranet is vulnerable to attack by people intent on destructionor on stealing corporate data. The open nature of the Internetand TCP/IP protocols expose a corporation to attack. Intranetsrequire a variety of security measures, including hardware andsoftware combinations that provide control of traffic; encryptionand passwords to validate users; and software tools to preventand cure viruses, block objectionable sites, and monitor traffic.<UL><LI>The generic term for a line of defense against intruders isa <I>firewall</I>. A firewall is a hardware/software combinationthat controls the type of services allowed to or from the intranet.<LI>Proxy servers are another common tool used in building a firewall.A proxy server allows system administrators to track all trafficcoming in and out of an intranet.<LI>A <I>bastion server</I> firewall is configured to withstandand prevent unauthorized access or services. It is typically segmentedfrom the rest of the intranet in its own subnet or <I>perimeternetwork</I>. In this way, if the server is broken into, the restof the intranet won't be compromised.<LI>Server-based virus-checking software can check every filecoming into the intranet to make sure that it's virus-free.<LI>Authentication systems are an important part of any intranetsecurity scheme. Authentication systems are used to ensure thatanyone trying to log into the intranet or any of its resourcesis the person they claim to be. Authentication systems typicallyuse user names, passwords, and encryption systems.<LI>Server-based site-blocking software can bar people on an intranetfrom getting objectionable material. Monitoring software trackswhere people have gone and what services they have used, suchas HTTP for Web access.<LI>One way of ensuring that the wrong people or erroneous datacan't get into the intranet is to use a <I>filtering</I> <I>router</I>.This is a special kind of router that examines the IP addressand header information in every packet coming into the network,and allows in only those packets that have addresses or otherdata, like e-mail, that the system administrator has decided shouldbe allowed into the intranet.</UL><HR><CENTER><P><A HREF="ch11.htm"><IMG SRC="PC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><A HREF="#CONTENTS"><IMG SRC="CC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><A HREF="contents.htm"><IMG SRC="HB.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><A HREF="ch13.htm"><IMG SRC="NC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><HR WIDTH="100%"></P></CENTER></BODY></HTML>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
一区二区在线观看免费视频播放| 蜜臀av一区二区在线观看| 亚洲成人激情自拍| 国产伦精品一区二区三区视频青涩| 成人a区在线观看| 日韩欧美国产成人一区二区| 亚洲精品视频在线观看免费| 国产一区二区福利| 欧美美女网站色| 亚洲精品视频在线观看网站| 国产精品亚洲一区二区三区妖精| 欧美日本在线一区| 亚洲欧洲另类国产综合| 国产精品亚洲一区二区三区妖精 | 亚洲天堂2016| 粉嫩在线一区二区三区视频| 欧美一区二视频| 亚洲国产人成综合网站| 91小视频免费观看| 中文字幕不卡的av| 激情成人综合网| 日韩欧美中文字幕公布| 日韩精品乱码av一区二区| 欧美网站大全在线观看| 亚洲资源在线观看| 一本色道久久加勒比精品| 午夜久久电影网| 欧美亚男人的天堂| 亚洲另类在线制服丝袜| 91麻豆精东视频| 亚洲男同1069视频| 一本到高清视频免费精品| 亚洲人妖av一区二区| 99精品视频在线免费观看| 国产精品久久久久久久久图文区| av资源网一区| 亚洲日本va在线观看| 在线观看国产91| 亚洲一区在线播放| 欧美日韩一区二区在线观看视频 | 欧美一区二区三区喷汁尤物| 亚洲成人www| 3d成人h动漫网站入口| 日欧美一区二区| 欧美成人aa大片| 国产精品一区二区无线| 国产精品麻豆久久久| 一本色道久久综合亚洲aⅴ蜜桃 | 午夜精品福利一区二区三区蜜桃| 欧美性大战久久| 日韩va亚洲va欧美va久久| 91精品国产欧美一区二区成人 | 亚洲成人激情av| 日韩精品一区二区三区中文精品 | 天天影视涩香欲综合网| 日韩三级在线免费观看| 国产精品系列在线播放| 国产精品护士白丝一区av| 欧美在线制服丝袜| 老汉av免费一区二区三区| 国产欧美日韩综合| 色猫猫国产区一区二在线视频| 日韩激情一区二区| 国产日韩av一区二区| 日本乱人伦一区| 蜜桃传媒麻豆第一区在线观看| 国产午夜一区二区三区| 欧美午夜寂寞影院| 国内精品视频一区二区三区八戒| 国产精品久久久久久久久免费丝袜 | 亚洲欧美自拍偷拍色图| 91精品国产综合久久久蜜臀粉嫩| 国产福利精品一区二区| 亚洲一区二区三区中文字幕在线| 精品久久一区二区三区| 欧美亚洲国产一区二区三区| 国产精品一区二区果冻传媒| 亚洲一二三级电影| 国产女人aaa级久久久级| 欧美日韩国产经典色站一区二区三区| 国产综合色在线视频区| 亚洲午夜免费电影| 中文字幕不卡三区| 亚洲人被黑人高潮完整版| 欧美一区二区三区在线看| 99re66热这里只有精品3直播| 久久国产免费看| 亚洲国产美女搞黄色| 国产精品视频线看| 欧美v日韩v国产v| 欧美日本一区二区三区四区| 成人a免费在线看| 国产精品一区久久久久| 老汉av免费一区二区三区| 亚洲成在人线免费| 亚洲少妇最新在线视频| 国产亚洲欧美日韩日本| 欧美一区二区二区| 欧美日韩一二三区| 色呦呦一区二区三区| 成人一区二区三区视频在线观看 | 99精品国产热久久91蜜凸| 国产精品一区二区久激情瑜伽 | 国产目拍亚洲精品99久久精品| 欧美一级理论性理论a| 欧美军同video69gay| 欧美羞羞免费网站| 欧美亚洲国产一区二区三区va| 色综合激情五月| 91久久国产最好的精华液| 93久久精品日日躁夜夜躁欧美| 成+人+亚洲+综合天堂| 成人中文字幕在线| 福利电影一区二区| 成人av一区二区三区| 成人av在线观| 91麻豆国产在线观看| av中文字幕亚洲| 色综合天天综合网天天看片| 91免费版在线| 在线观看日韩电影| 欧美色视频一区| 这里只有精品免费| 日韩一区二区三区视频在线| 日韩亚洲欧美中文三级| 久久亚洲精品国产精品紫薇| 国产视频一区在线观看| ●精品国产综合乱码久久久久 | 国产一区啦啦啦在线观看| 国产很黄免费观看久久| 成人黄色免费短视频| 色婷婷综合久久| 欧美精品高清视频| 欧美一级二级三级蜜桃| 久久久国产一区二区三区四区小说| 久久久久久久电影| 亚洲精品水蜜桃| 日本成人在线网站| 国产精品综合在线视频| 99精品视频在线免费观看| 欧美日韩精品免费观看视频 | 一区二区三区波多野结衣在线观看| 一区二区在线免费观看| 日韩av电影一区| 国产盗摄精品一区二区三区在线| 日本高清不卡在线观看| 欧美电影免费观看高清完整版在线观看| 国产三级精品在线| 国产精品正在播放| 91麻豆精品在线观看| 欧美一级午夜免费电影| 国产精品麻豆一区二区 | 欧美一区二区美女| 欧美激情综合五月色丁香小说| 亚洲愉拍自拍另类高清精品| 久久不见久久见免费视频1| www.亚洲人| 欧美一二三在线| 亚洲精品国产一区二区精华液| 蜜臀久久久久久久| 91原创在线视频| 精品国产一区二区精华| 亚洲精品乱码久久久久久黑人| 久久不见久久见免费视频1| 色婷婷综合久久久中文字幕| 国产日韩欧美高清| 日本不卡视频在线| 91麻豆精东视频| 中文成人av在线| 精品一区二区影视| 欧美揉bbbbb揉bbbbb| 国产精品国产a级| 麻豆国产精品777777在线| 欧美优质美女网站| 欧美国产成人精品| 精品在线免费视频| 欧美浪妇xxxx高跟鞋交| 亚洲欧洲制服丝袜| 国产高清在线精品| 欧美变态口味重另类| 婷婷综合五月天| 欧美综合视频在线观看| 1000精品久久久久久久久| 国产成人免费av在线| 精品盗摄一区二区三区| 婷婷成人综合网| 欧美午夜精品久久久| 一区二区三区免费| 91捆绑美女网站| 亚洲欧美一区二区三区孕妇| 成人av午夜电影| 亚洲国产精品成人综合| 激情文学综合插| 久久奇米777| 国产精品一二三在| 国产午夜精品久久久久久免费视| 国产乱对白刺激视频不卡| 久久精品欧美日韩| 精品亚洲欧美一区| 精品福利一二区|