security planning and policyWord格式文档下载.docx

上传人:b****5 文档编号:20797316 上传时间:2023-01-25 格式:DOCX 页数:14 大小:319.01KB
下载 相关 举报
security planning and policyWord格式文档下载.docx_第1页
第1页 / 共14页
security planning and policyWord格式文档下载.docx_第2页
第2页 / 共14页
security planning and policyWord格式文档下载.docx_第3页
第3页 / 共14页
security planning and policyWord格式文档下载.docx_第4页
第4页 / 共14页
security planning and policyWord格式文档下载.docx_第5页
第5页 / 共14页
点击查看更多>>
下载资源
资源描述

security planning and policyWord格式文档下载.docx

《security planning and policyWord格式文档下载.docx》由会员分享,可在线阅读,更多相关《security planning and policyWord格式文档下载.docx(14页珍藏版)》请在冰豆网上搜索。

security planning and policyWord格式文档下载.docx

Mostsecurityincidentsoccurbecausesystemadministratorsdonotimplementavailablecountermeasures,andhackersordisgruntledemployeesexploittheoversight.Therefore,theissueisnotjustoneofconfirmingthatatechnicalvulnerabilityexistsandfindingacountermeasurethatworks,itisalsocriticaltoverifythatthecountermeasureisinplaceandworkingproperly.ThisiswheretheSecurityWheel,acontinuousprocess,isaneffectiveapproach.

 

TheSecurityWheelpromotesretestingandreapplyingupdatedsecuritymeasuresonacontinuousbasis.

TobegintheSecurityWheelprocess,firstdevelopasecuritypolicythatenablestheapplicationofsecuritymeasures.Asecuritypolicyneedstoaccomplishthefollowingtasks:

∙Identifythesecurityobjectivesoftheorganization.

∙Documenttheresourcestobeprotected.

∙Identifythenetworkinfrastructurewithcurrentmapsandinventories.

∙Identifythecriticalresourcesthatneedtobeprotected,suchasresearchanddevelopment,finance,andhumanresources.Thisiscalledariskanalysis.

Afterthesecuritypolicyisdeveloped,makeitthehubuponwhichthefourstepsoftheSecurityWheelarebased.Thestepsaresecure,monitor,test,andimprove.

Secure

Securethenetworkbyapplyingthesecuritypolicyandimplementingthefollowingsecuritysolutions:

∙ThreatDefense

oStatefulInspectionandpacketfiltering–Filternetworktraffictoallowonlyvalidtrafficandservices.

oIntrusionPreventionSystems–Inlineintrusiondetectionsystems(IDS),whichisbettertermedintrusionpreventionsystems(IPS),canbedeployedatthenetworkandhostleveltoactivelystopmalicioustraffic.

oVulnerabilitypatching–Applyfixesormeasurestostoptheexploitationofknownvulnerabilities.Thisincludesturningoffservicesthatarenotneededoneverysystem.Thefewerservicesthatareenabled,theharderitisforhackerstogainaccess.

∙SecureConnectivity

oVirtualPrivateNetworks(VPNs)–Hidetrafficcontenttopreventunwanteddisclosuretounauthorizedormaliciousindividuals.

∙TrustandIdentity

oAuthentication–Giveaccesstoauthorizedusersonly.Oneexampleofthisisusingone-timepasswords.

oPolicyenforcement–Assureusersandenddevicesareincompliancewiththecorporatepolicy.

Monitor

Monitoringsecurityinvolvesbothactiveandpassivemethodsofdetectingsecurityviolations.Themostcommonlyusedactivemethodistoaudithost-levellogfiles.Mostoperatingsystemsincludeauditingfunctionality.Systemadministratorsforeveryhostonthenetworkmustturntheseonandtakethetimetocheckandinterpretthelogfileentries.

Passivemethodsincludeusingintrusiondetectionsystem(IDS)devicestoautomaticallydetectintrusion.Thismethodrequiresonlyasmallnumberofnetworksecurityadministratorsformonitoring.Thesesystemscandetectsecurityviolationsinrealtimeandcanbeconfiguredtoautomaticallyrespondbeforeanintruderdoesanydamage.

AnaddedbenefitofnetworkmonitoringistheverificationthatthesecuritydevicesimplementedinStep1oftheSecurityWheelhavebeenconfiguredandareworkingproperly.

Test

InthetestingphaseoftheSecurityWheel,thesecurityofthenetworkisproactivelytested.Specifically,thefunctionalityofthesecuritysolutionsimplementedinStep1andthesystemauditingandintrusiondetectionmethodsimplementedinStep2mustbeassured.VulnerabilityassessmenttoolssuchasSATAN,Nessus,orNMAPareusefulforperiodicallytestingthenetworksecuritymeasuresatthenetworkandhostlevel.

Improve

TheimprovementphaseoftheSecurityWheelinvolvesanalyzingthedatacollectedduringthemonitoringandtestingphases,anddevelopingandimplementingimprovementmechanismsthatfeedintothesecuritypolicyandthesecuringphaseinStep1.Tokeepanetworkassecureaspossible,thecycleoftheSecurityWheelmustbecontinuallyrepeated,becausenewnetworkvulnerabilitiesandrisksarecreatedeveryday.

Withtheinformationcollectedfromthemonitoringandtestingphases,intrusiondetectionsystemscanbeusedtoimplementimprovementstothesecurity.Thesecuritypolicyshouldbeadjustedasnewsecurityvulnerabilitiesandrisksarediscovered

Networksecuritypolicy

Securitypoliciesareworththetimeandeffortneededtodevelopthem.Asecuritypolicybenefitsacompanyinthefollowingway:

∙Itprovidesaprocesstoauditexistingnetworksecurity.

∙Itprovidesageneralsecurityframeworkforimplementingnetworksecurity.

∙Itdefineswhichbehaviorisandisnotallowed.

∙Itoftenhelpsdeterminewhichtoolsandproceduresareneededfortheorganization.

∙Ithelpscommunicateconsensusamongagroupofkeydecisionmakersanddefinestheresponsibilitiesofusersandadministrators.

∙Itdefinesaprocessforhandlingnetworksecurityincidents.

∙Itenablesglobalsecurityimplementationandenforcement.

∙Itcreatesabasisforlegalactionifnecessary.

Computersecurityisnowanenterprise-wideissueandcomputingsitesareexpectedtoconformtothenetworksecuritypolicy.

DevelopingaSecurityPolicy

AsecuritypolicycanbeassimpleasabriefAcceptableUsePolicyfornetworkresources,orcanbeseveralhundredpageslonganddetaileveryelementofconnectivityandassociatedpolicies.Althoughsomewhatnarrowinscope,RFC2196suitablydefinesasecuritypolicyasfollows:

"

Asecuritypolicyisaformalstatementoftherulesbywhichpeoplewhoaregivenaccesstoanorganization'

stechnologyandinformationassetsmustabide."

Itisimportanttounderstandthatnetworksecurityisanevolutionaryprocess.Nosingleproductcanmakeanorganizationsecure.Truenetworksecuritycomesfromacombinationofproductsandservices,combinedwithacomprehensivesecuritypolicyandacommitmenttoadheretothatpolicyfromthetopoftheorganizationdown.Infact,aproperlyimplementedsecuritypolicywithoutdedicatedsecurityhardwarecanbemoreeffectiveatmitigatingthethreattoenterpriseresourcesthanacomprehensivesecurityproductimplementationwithoutanassociatedpolicy.

Inorderforasecuritypolicytobeappropriateandeffective,itneedstohavetheacceptanceandsupportofalllevelsofemployeeswithintheorganization,includingthefollowing:

∙Sitesecurityadministrator.

∙Informationtechnologytechnicalstaff,suchasstafffromthecomputingcenter.

∙Administratorsoflargeusergroupswithintheorganization,suchasbusinessdivisionsoracomputersciencedepartmentwithinauniversity.

∙Securityincidentresponseteam.

∙Representativesoftheusergroupsaffectedbythesecuritypolicy.

∙Responsiblemanagement.

∙Legalcounsel,ifneeded.

Itisextremelyimportantthatmanagementfullysupportthesecuritypolicyprocess.Otherwise,thereislittlechancethattheprocesswillhavetheintendedimpact.

Aneffectivesecuritypolicyworkstoensurethatthenetworkassetsoftheorganizationareprotectedfromsabotageandfrominappropriateaccess,bothintentionalandaccidental.Allnetworksecurityfeaturesshouldbeconfiguredincompliancewiththeorganization'

ssecuritypolicy.Ifasecuritypolicyisnotpresent,orifthepolicyisoutofdate,thepolicyshouldbecreatedorupdatedbeforedecidinghowtoconfiguresecurityonanydevices.

Figureillustratesthetraitsthatanysecuritypolicyshouldinclude.

DevelopingSecurityProcedures

Securityproceduresimplementsecuritypolicies.Proceduresdefineconfiguration,login,audit,andmaintenanceprocesses.Securityproceduresshouldbewrittenforendusers,networkadministrators,andsecurityadministrators.Securityproceduresshouldspecifyhowtohandleincidents.Theseproceduresshouldindicatewhattodoandwhotocontactifanintrusionisdetected.

Hostandserverbasedsecuritycomponentsandtechnologies

Itiscriticaltoprotectnetworkhosts,suchworkstationPCsandservers.Thesehostsneedtobesecuredastheyareaddedtothenetworkandupdatedwithsecuritypatchesastheybecomeavailable.Additionalstepscanbetakentosecurethesehosts.Anti-virus,firewall,andintrusiondetectionarevaluabletoolsthatcanbeusedtosecurenetworkhosts.Becausemanybusinessresourcesmaybecontainedonasinglefileserver,itisespeciallyimportantforserverstobeaccessibleandavailable.

DeviceHardening

Whenanewoperatingsystemisinstalledonacomputer,thesecuritysettingsareallsettothedefaultvalues.Inmostcasesthislevelofsecurityisinadequate.Therearesomesimplestepsthatshouldbetakenth

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > PPT模板 > 中国风

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1