ImageVerifierCode 换一换
格式:DOCX , 页数:36 ,大小:66.74KB ,
资源ID:7161454      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/7161454.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(MOF SMFSecurity Administration.docx)为本站会员(b****5)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

MOF SMFSecurity Administration.docx

1、MOF SMF Security AdministrationSecurity AdministrationService Management FunctionPublished: October 2002Reformatted: January 2005For the latest information, please see The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the da

2、te of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.This document is for informational purpose

3、s only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, this document may be reproduced, stored in or introduced into a re

4、trieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), but only for the purposes provided in the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other

5、 intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.Unless otherwis

6、e noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, email address, logo, person, place, or event is intended or should

7、be inferred. 2005 Microsoft Corporation. All rights reserved.Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.The names of actual companies and products mentioned herein may be the trademarks of their respective

8、 owners.ContentsExecutive Summary 1Introduction 3Security Administration Overview 5Goals and Objectives 5Scope 6Key Definitions 6Processes and Activities 9Process Flow Summary 9Identification 10Authentication 11Biometric Authentication Systems 11Smart Card Authentication Systems 11Password Authentic

9、ation Systems 12Web Access Authentication 13Access Control 14Authorized Usage Warning 14Accountability and Shared User IDs 14Account Lockout 15Settings to Limit Unauthorized Session Use and Systems Access 15Setting Privileges and Permission on Objects 15Role-based Access Control and Delegation of Au

10、thority 15Confidentiality 17Private Key Encryption 17Public Key Encryption and PKI 19Virtual Private Networks 21File System Confidentiality 26Integrity 26Nonrepudiation 26Auditing 27Planning Auditing 28Implementing Auditing 28Testing Auditing 28Roles and Responsibilities 29Security Manager 29Personn

11、el Security Technician 30Antivirus Technician 30Application Security Technician 30Database Security Technician 30Messaging Security Technician 30Operating System Security Technician 30Hardware Security Technician 30Network Security Technician 31Facilities Security Technician 31Egress Security Techni

12、cian 31Outsourcing Manager 31Security Compliance Auditor 31Relationship to Other SMFs 33System Administration 33Service Monitoring and Control 33Job Scheduling 34Network Administration 34Directory Services Administration 34Storage Management 34Configuration Management 35Availability Management 35Cap

13、acity Management 35Release Management 35Change Management 35Problem Management 36Service Desk 36IT Service Continuity Management 36Workforce Management 36Financial Management 371Executive SummarySecurity administration is the process of maintaining a safe computing environment. Security is an import

14、ant part of enterprise infrastructure: An information system with a weak security foundation will eventually experience a security breach.Security can be divided into six basic requirements, or tenets, that help ensure data confidentiality, integrity, and availability. The six security tenets are: I

15、dentification. This deals with user names and how users identify themselves to the system. Authentication. This deals with passwords, smart cards, biometrics, and so on. Authentication is how users prove to the system that they are who they claim to be. Access control (also called authorization). Th

16、is deals with access and the privileges granted to users so that they may perform certain functions on the system. Confidentiality. This deals with encryption. Confidentiality mechanisms ensure that only authorized people can see data stored on or traveling across the network. Integrity. This deals

17、with checksums and digital signatures. Integrity mechanisms ensure that data is not garbled, lost, or changed when traveling across the network. Nonrepudiation. This is a means of providing proof of data transmission or receipt so that the occurrence of a transaction cannot later be denied.2Introduc

18、tionThis guide provides detailed information about the Security Administration service management function (SMF) for organizations that have deployed, or are considering deploying, Microsoft technologies in a data center or other type of enterprise computing environment. This is one of the more than

19、 20 SMFs defined and described in Microsoft Operations Framework (MOF). The guide assumes that the reader is familiar with the intent, background, and fundamental concepts of MOF as well as the Microsoft technologies discussed.An overview of MOF and its companion, Microsoft Solutions Framework (MSF)

20、, is available in the MOF Service Management Function Overview guide. This guide also provides abstracts of each of the service management functions defined within MOF. Detailed information about the concepts and principles of each of the frameworks is contained in technical papers available at 3Sec

21、urity Administration OverviewSecurity is an important part of system infrastructure. An information system with a weak security foundation will eventually experience a security breach. Examples of security breaches include data loss, data disclosure, loss of system availability, corruption of data,

22、and so forth. Depending on the information system and the severity of the breach, the results could vary from embarrassment, to loss of revenue, to loss of life.Security can be broken up into six requirements, or tenets. All of the tenets are equally important for helping to ensure the confidentiali

23、ty, integrity, and availability of data. The tenets are listed as follows:Identification. Identification is concerned with user names and how users identify themselves to a computer system.Authentication. Authentication is concerned with passwords, smart cards, biometrics, and so forth. Authenticati

24、on is how users demonstrate to the system that they are who they claim to be.Access control (also called authorization). Access control is concerned with access and privileges granted to users so that they may perform certain functions on a computer system.Confidentiality. Confidentiality is concern

25、ed with encryption. Confidentiality mechanisms help ensure that only authorized people can see data stored on or traveling across the network.Integrity. Integrity is concerned with checksums and digital signatures. Integrity mechanisms help ensure that data is not garbled, lost, or changed when trav

26、eling across the network.Nonrepudiation. Nonrepudiation is a means of providing proof of data transmission or receipt so that the occurrence of a transaction cannot later be denied.Another very important aspect of security is auditing. Audit logs may give the only indication that a security breach h

27、as occurred. Or, if the breach is discovered some other way, proper audit settings generate an audit log that can help administrators pinpoint the location and the perpetrator of the breach.Goals and ObjectivesThe primary goals and objectives of security administration are to ensure: Data confidenti

28、ality. No one should be able to view an organizations data without authorization. Data integrity. All authorized users should feel confident that the data presented to them is accurate and not improperly modified. Data availability. Authorized users should be able to access the data they need, when

29、they need it.ScopeSecurity administration is concerned with those aspects of security necessary for helping to create and maintain a safer computing environment: Personnel security. Determining whether employees are properly cleared to handle the data that they access and that adequate checks have b

30、een completed before employees are granted access to a system. Application security. Determining whether business-critical applications are secure from unauthorized access. This includes a means of identifying and authorizing users of the system. Middleware security. Middleware includes messages tha

31、t pass between parts of a service and data that is stored in databases. These must be secured to ensure that data is not viewed, garbled, or modified in any way. Operating system security. The operating system controls access to hardware and provides access to higher-level services such as databases

32、. If the operating system is not secure, then all the systems and services dependent on the operating system can be compromised. Hardware security. Security of the computing hardware, storage media, and print output must be ensured. More than ever, hardware such as portable computers (for example, laptops or notebooks), backup tapes, and smart cards contain or provide access to busine

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1