ImageVerifierCode 换一换
格式:DOCX , 页数:14 ,大小:319.01KB ,
资源ID:20797316      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/20797316.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(security planning and policyWord格式文档下载.docx)为本站会员(b****5)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

security planning and policyWord格式文档下载.docx

1、Most security incidents occur because system administrators do not implement available countermeasures, and hackers or disgruntled employees exploit the oversight. Therefore, the issue is not just one of confirming that a technical vulnerability exists and finding a countermeasure that works, it is

2、also critical to verify that the countermeasure is in place and working properly.This is where the Security Wheel, a continuous process, is an effective approach . The Security Wheel promotes retesting and reapplying updated security measures on a continuous basis.To begin the Security Wheel process

3、, first develop a security policy that enables the application of security measures. A security policy needs to accomplish the following tasks: Identify the security objectives of the organization. Document the resources to be protected. Identify the network infrastructure with current maps and inve

4、ntories. Identify the critical resources that need to be protected, such as research and development, finance, and human resources. This is called a risk analysis. After the security policy is developed, make it the hub upon which the four steps of the Security Wheel are based. The steps are secure,

5、 monitor, test, and improve.Secure Secure the network by applying the security policy and implementing the following security solutions : Threat Defense o Stateful Inspection and packet filtering Filter network traffic to allow only valid traffic and services. o Intrusion Prevention Systems Inline i

6、ntrusion detection systems (IDS), which is better termed intrusion prevention systems (IPS), can be deployed at the network and host level to actively stop malicious traffic. o Vulnerability patching Apply fixes or measures to stop the exploitation of known vulnerabilities. This includes turning off

7、 services that are not needed on every system. The fewer services that are enabled, the harder it is for hackers to gain access. Secure Connectivity o Virtual Private Networks (VPNs) Hide traffic content to prevent unwanted disclosure to unauthorized or malicious individuals. Trust and Identity o Au

8、thentication Give access to authorized users only. One example of this is using one-time passwords. o Policy enforcement Assure users and end devices are in compliance with the corporate policy. Monitor Monitoring security involves both active and passive methods of detecting security violations . T

9、he most commonly used active method is to audit host-level log files. Most operating systems include auditing functionality. System administrators for every host on the network must turn these on and take the time to check and interpret the log file entries.Passive methods include using intrusion de

10、tection system (IDS) devices to automatically detect intrusion. This method requires only a small number of network security administrators for monitoring. These systems can detect security violations in real time and can be configured to automatically respond before an intruder does any damage.An a

11、dded benefit of network monitoring is the verification that the security devices implemented in Step 1 of the Security Wheel have been configured and are working properly.Test In the testing phase of the Security Wheel, the security of the network is proactively tested . Specifically, the functional

12、ity of the security solutions implemented in Step 1 and the system auditing and intrusion detection methods implemented in Step 2 must be assured. Vulnerability assessment tools such as SATAN, Nessus, or NMAP are useful for periodically testing the network security measures at the network and host l

13、evel.Improve The improvement phase of the Security Wheel involves analyzing the data collected during the monitoring and testing phases, and developing and implementing improvement mechanisms that feed into the security policy and the securing phase in Step 1 . To keep a network as secure as possibl

14、e, the cycle of the Security Wheel must be continually repeated, because new network vulnerabilities and risks are created every day.With the information collected from the monitoring and testing phases, intrusion detection systems can be used to implement improvements to the security. The security

15、policy should be adjusted as new security vulnerabilities and risks are discoveredNetwork security policySecurity policies are worth the time and effort needed to develop them. A security policy benefits a company in the following way: It provides a process to audit existing network security. It pro

16、vides a general security framework for implementing network security. It defines which behavior is and is not allowed. It often helps determine which tools and procedures are needed for the organization. It helps communicate consensus among a group of key decision makers and defines the responsibili

17、ties of users and administrators. It defines a process for handling network security incidents. It enables global security implementation and enforcement. It creates a basis for legal action if necessary. Computer security is now an enterprise-wide issue and computing sites are expected to conform t

18、o the network security policy.Developing a Security Policy A security policy can be as simple as a brief Acceptable Use Policy for network resources, or can be several hundred pages long and detail every element of connectivity and associated policies. Although somewhat narrow in scope, RFC 2196 sui

19、tably defines a security policy as follows :A security policy is a formal statement of the rules by which people who are given access to an organizations technology and information assets must abide.It is important to understand that network security is an evolutionary process. No single product can

20、 make an organization secure. True network security comes from a combination of products and services, combined with a comprehensive security policy and a commitment to adhere to that policy from the top of the organization down. In fact, a properly implemented security policy without dedicated secu

21、rity hardware can be more effective at mitigating the threat to enterprise resources than a comprehensive security product implementation without an associated policy.In order for a security policy to be appropriate and effective, it needs to have the acceptance and support of all levels of employee

22、s within the organization, including the following: Site security administrator. Information technology technical staff, such as staff from the computing center. Administrators of large user groups within the organization, such as business divisions or a computer science department within a universi

23、ty. Security incident response team. Representatives of the user groups affected by the security policy. Responsible management. Legal counsel, if needed. It is extremely important that management fully support the security policy process. Otherwise, there is little chance that the process will have

24、 the intended impact.An effective security policy works to ensure that the network assets of the organization are protected from sabotage and from inappropriate access, both intentional and accidental. All network security features should be configured in compliance with the organizations security p

25、olicy. If a security policy is not present, or if the policy is out of date, the policy should be created or updated before deciding how to configure security on any devices.Figure illustrates the traits that any security policy should include.Developing Security Procedures Security procedures imple

26、ment security policies. Procedures define configuration, login, audit, and maintenance processes. Security procedures should be written for end users, network administrators, and security administrators. Security procedures should specify how to handle incidents. These procedures should indicate wha

27、t to do and who to contact if an intrusion is detected. Host and server based security components and technologiesIt is critical to protect network hosts, such workstation PCs and servers. These hosts need to be secured as they are added to the network and updated with security patches as they becom

28、e available. Additional steps can be taken to secure these hosts. Anti-virus, firewall, and intrusion detection are valuable tools that can be used to secure network hosts. Because many business resources may be contained on a single file server, it is especially important for servers to be accessible and available. Device Hardening When a new operating system is installed on a computer, the security settings are all set to the default values. In most cases this level of security is inadequate. There are some simple steps that should be taken th

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1