Podobne
- Strona startowa
- 0199291454.Oxford.University.Press.USA.Values.and.Virtues.Aristotelianism.in.Contemporary.Ethics.Jan.2007
- Wen Chu Chen, Grace J. Yoo Encyclopedia of Asian American Issues Today (2 volumes) (2009)
- Cisco Press CCDA Study Guide
- Cisco Press CCNP Support Exam
- 0275994317 The 9 11 Encyclopedia
- Encyclopedia of networking
- Flawiusz Wojna Zydowska
- Pullman Philip Mroczne materi Bursztynowa luneta
- Dav
- Kos Kala, Selby John Moc aloha i wiedza huny
- zanotowane.pl
- doc.pisz.pl
- pdf.pisz.pl
- starereklamy.pev.pl
Cytat
Do celu tam się wysiada. Lec Stanisław Jerzy (pierw. de Tusch-Letz, 1909-1966)
A bogowie grają w kości i nie pytają wcale czy chcesz przyłączyć się do gry (. . . ) Bogowie kpią sobie z twojego poukładanego życia (. . . ) nie przejmują się zbytnio ani naszymi planami na przyszłość ani oczekiwaniami. Gdzieś we wszechświecie rzucają kości i przypadkiem wypada twoja kolej. I odtąd zwyciężyć lub przegrać - to tylko kwestia szczęścia. Borys Pasternak
Idąc po kurzych jajach nie podskakuj. Przysłowie szkockie
I Herkules nie poradzi przeciwko wielu.
Dialog półinteligentów równa się monologowi ćwierćinteligenta. Stanisław Jerzy Lec (pierw. de Tusch - Letz, 1909-1966)
[ Pobierz całość w formacie PDF ]
.For example, the ILOVEYOU virus sucýÿnumber between 1 and 100.While normal usersceeded only because unwitting users ran the scriptwill enter numbers within the specified data range,when it arrived in an e-mail message.Anotheran attacker will try to use any data input he or sheemerging class of applications that attackers promptfeels will break the back-end application.a user to install are spyware applications.Onceinstalled, spyware monitors a user s activities on his 5 Weak passwords trump strong security.Even ifcomputer and reports the results to the attacker.a network design is thoroughly secure, if users andadministrators use blank, default, or otherwise simýÿ2 If a bad guy can alter the operating system onple passwords, the security will be rendered ineffecýÿyour computer, it s not your computer anymore.tive once an attacker cracks the password.A securely installed operating system and thesecurely procured hardware that it is installed on 6 A machine is only as secure as the administratorare referred to as a Trusted Computing Base (TCB).is trustworthy.One constant on all networks isIf an attacker can replace or modify any of the operýÿ that you must trust the network administrators.Theating system files or certain components of the sysýÿ more administrative privileges an administratortem s hardware, the TCB can no longer be trusted.account has, the more the administrator must beFor example, an attacker might replace the file trusted.In other words, if you do not trust someone,Passfilt.dll, which is used to enforce password comýÿ do not give him or her administrator privileges.plexity with a version of the file that also records all7 Encrypted data is only as secure as the decryppasswords used on the system.If an operating sysýÿtion key.No encryption algorithm will protect thetem has been compromised or you cannot prove thatciphertext from an attacker if he or she possesses orit has not been compromised, you should no longercan gain possession of the decryption key.Encrypýÿtrust the operating system.tion alone is not a solution to a business problem3 If a bad guy has unrestricted physical access to unless there is a strong component of key manageýÿyour computer, it s not your computer anymore.ment and unless users and administrators are vigiýÿOnce an attacker possesses physical access to a lant in protecting their keys or key material.computer, you can do little to prevent the attacker8 An out-of-date virus scanner is only marginallyfrom gaining administrator privileges on the operatýÿbetter than no virus scanner at all.New comýÿing system.With administrator privileges comproýÿputer viruses, worms, and Trojan horses are alwaysmised, nearly all persistently stored data is at risk ofemerging and existing ones are always evolving.being exposed.Similarly, an attacker with physicalConsequently, antivirus software can become out-access could install hardware or software to moniýÿdated quickly.As new or modified viruses aretor and record keystrokes that is completely trans-released, antivirus software is updated.Antivirusparent to the user.If a computer has been physicallysoftware that is not updated to recognize a givencompromised or you cannot prove otherwise, youvirus will not be able to prevent it.should not trust the computer.391Appendix I Applying Key Principles of Security9 Absolute anonymity isn t practical, in real life or 2 Security works only if the secure way also hap-on the Web.Two issues related to security that are pens to be the easy way.For most users andoften confused are privacy and anonymity.Anoýÿ administrators, the more difficult or invasive a secuýÿnymity means that your identity and details about rity measure is, the more likely they are to ignore it,your identity are completely unknown and untraceýÿ forget it, or subvert it.Ideally, security should beable, while privacy means that your identity and transparent to users and administrators.When thedetails about your identity are not disclosed.Priýÿ security measure requires a user or an administratorvacy is essential, and technology and laws make to change his or her behavior, you should createachieving it possible.On the other hand, anonymity clear and easy-to-follow procedures for completingis not possible or practical when on the Internet, or the task in question and explain your rationale forwhen using computers in general.implementing the security measure.10 Technology is not a panacea.Although technolýÿ 3 If you don t keep up with security fixes, yourogy can secure computers and computer networks, network won t be yours for long.After a securityit is not and will never be a solution in and of update is announced and the vulnerability isitself.You must combine technology with people and explained, a race begins between attackers attemptýÿprocesses to create a secure computing environment.ing to exploit the vulnerability and administratorsattempting to apply the security update.If you doThe 10 Immutable Laws of Securitynot keep up with applying security updates, anAdministrationattacker will exploit one of the known vulnerabiliýÿMicrosoft s Scott Culp wrote The Ten Immutableties on your network.Laws of Security Administration, which you can find4 It doesn t do much good to install security fixesat http://www.microsoft.com/technet/treeviewon a computer that was never secure to begin/default
[ Pobierz całość w formacie PDF ]