资源预览内容
第1页 / 共99页
第2页 / 共99页
第3页 / 共99页
第4页 / 共99页
第5页 / 共99页
第6页 / 共99页
第7页 / 共99页
第8页 / 共99页
第9页 / 共99页
第10页 / 共99页
亲,该文档总共99页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述
,第一篇 区块篇,At Risk,The Soft Underbelly,Security Issues Today,1 Source: Forrester Research 2 Source: Information Week, 26 November 2001 3 Source: Netcraft summary 4 Source: CERT, 2003 5 Source: CSI/FBI Computer Crime and Security Survey 6 Source: Computer Security Institute (CSI) Computer Crime and Security Survey 2002 7 Source: CERT, 2002 8 Source: Gartner Group,14B devices on the Internet by 20101 35M remote users by 20052 65% increase in dynamic Web sites3 From 2000 to 2002 reported incidents rose from 21, 756 to 82,0944 Nearly 80 percent of 445 respondents surveyed said the Internet has become a frequent point of attack, up from 57 percent just four years ago5,90% detected security breaches6 85% detected computer viruses6 95% of all breaches avoidable with an alternative configuration7 Approximately 70 percent of all Web attacks occur at the application layer8,Application Layer Attacks,Identity Theft Web Site Defacement Unauthorized Access Modification of Data, Logs and Records Theft of Proprietary Information Service Disruption,Implications,Compliance: Sarbanes Oxley Gramm Leach Blilely US Patriot Act HIPAA The Privacy Act (CA) Basel 2 (EU) Data Protection Act (EU) Litigation File Sharing Piracy HR Issues Shareholder Suits,Customer Impact,Types Of SRP Rules,Path Rule Compares path of file being run to an allowed path list Use when you have a folder with many files for the same application Essential in when SRPs are strict,Hash Rule Compares the MD5 or SHA1 hash of a file to the one attempted to be run Use when you want to allow/prohibit a certain version of a file from being run,Certificate Rule Checks for digital signature on application (i.e. Authenticode) Use when you want to restrict both win32 applications and ActiveX content,Internet Zone Rule Controls how Internet Zones can be accessed Use when in high security environments to control access to web applications,SQL Server 2005 Themes,Supportability & Quality,Enterprise Enhancements,Unified & Flexible Administration,Patch Solutions,Prevention, Readiness, Recovery Ease of use,Patch Installs Patch in integrated step,Integrated Database Services and Business Intelligence Flexible install management,Add value to one-step Failover Clustering Expanded scripting support,Live Communications Client Roadmap,LC 1.2 Client Platform Multiparty IM P2P Voice and Video MPOP Groups Roaming SIP support GPO policy management,LC 1.5 Client Platform Roll up of QFEs MPOP Additions Federation/Archiving Notification HA Additions,LC 2.0 Client Platform Next generation of RTC experiences More coming!,2003,2H04,Longhorn,Integrated phone and PDA Primarily data viewing Interoperability with Outlook and Exchange .NET Compact Framework ASP.NET mobile controls,Mobile Device Solutions,Complex document authoring, editing and reading Keyboard centric at the desk Keyboard and mouse input methods Full .NET framework available Centrino Solutions,Windows Mobile,Windows XP,Complex document authoring, editing and active reading Note taking and ink annotating Keyboard centric at the desk, pen and keyboard away from the desk Keyboard, mouse plus pen, ink, and speech input methods Full .NET framework preinstalled Pen, ink, handwriting and speech recognition APIs Centrino Solutions,View and some data entry Integrated PDA with phone Interoperability with Office, Exchange and SQL Server .NET Compact Framework ASP.NET mobile controls Intel Xscale Solutions,Windows CE,One-way network Information consumption,Smart Personal Objects,Smartphone,Pocket PC and Pocket PC Phone,Notebook PC,Tablet PC,Traditional Firewalls,Wide open to advanced attacks,Performance versus security tradeoff,Limited capacity for growth,Hard to manage,Code Red, Nimda SSL-based attacks,Security is complex IT is already overloaded,Bandwidth too expensive Too many moving parts,Not easily upgradeable Dont scale with business,Choosing the Right Type of Assessment,Vulnerability Scanning Focuses on known weaknesses Of the three, requires the least expertise Generally easy to automate,Penetration Testing Focuses on known and unknown weaknesses Requires advanced technical expertise Carries tremendous legal burden in certain countries/organizations,IT Security Audits Focuses on security policies and procedures Of the three, requires the most expertise When done right is the most effective type of assessment,Perimeter Security Evolution,Wide open to advanced attacks,Application-level protection,Performance versus security tradeoff,Security and performance,Limited capacity for growth,Extensibility and scalability,Hard to manage,Easier to use,The advanced application layer firewall, VPN and Web cache solution that enables customers to maximize IT investments by improving network security and performance,Advanced protection Application layer security designed to protect Microsoft applications,Fast, secure access Empowers you to connect users to relevant information on your network in a cost efficient manner,Ease of use Efficientl
收藏 下载该资源
网站客服QQ:2055934822
金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号