已阅读5页,还剩55页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
第三篇第三篇 图例篇图例篇 CorpnetCorpnet InternetInternet RADIUS Authentication Federation through RADIUS proxiesFederation through RADIUS proxies Can be used for centralized authentication servicesCan be used for centralized authentication services Domain membership not requiredDomain membership not required Great for DMZ placementGreat for DMZ placement 1 HTTP/SSL basic auth. 2 RADIUS request RADIUS Server (IAS) Firewall Server 3 HTTP/SSL request, sent to server Back-end Server Web Client (Browser, HTTP client) ISA Server 2000 (Old) Networking Model Fixed zonesFixed zones “IN” = LAT“IN” = LAT “OUT” = DMZ, Internet“OUT” = DMZ, Internet Packet filter only on Packet filter only on external interfacesexternal interfaces Single outbound policySingle outbound policy NAT alwaysNAT always Static filtering from DMZ Static filtering from DMZ to Internetto Internet InternalInternal NetworkNetwork InternetInternet DMZ 1DMZ 1 Static PFStatic PF ISA 2000ISA 2000 ISA Server 2004 Networking Model Any number of networksAny number of networks VPN as networkVPN as network Localhost as networkLocalhost as network Assigned Assigned relationships relationships (NAT/Route)(NAT/Route) Per-Network policyPer-Network policy Packet filtering onPacket filtering on all interfacesall interfaces Support for DoDSupport for DoD Any topology, any policyAny topology, any policy CorpNet_1CorpNet_1 CorpNet_nCorpNet_n Net ANet A Internet VPN ISA 2004 DMZ_nDMZ_n DMZ_1DMZ_1 Local HostLocal Host NetworkNetwork Rule Structure launched; infects infects unprotected or unprotected or unpatched unpatched systemssystems No ExploitNo ExploitExploitExploit MBSA How It Works MSSecure.xml containsMSSecure.xml contains Security bulletin namesSecurity bulletin names Product-specific updatesProduct-specific updates Version and checksum infoVersion and checksum info Registry keys changedRegistry keys changed KB article numbersKB article numbers Etc.Etc. Run MBSA on Admin system, Run MBSA on Admin system, specify targetsspecify targets 1 1 Downloads CAB file with Downloads CAB file with MSSecure.xml and verifies digital MSSecure.xml and verifies digital signaturesignature 2 2 Scans target systems for OS, OS Scans target systems for OS, OS components, and applicationscomponents, and applications 3 3 Parses MSSecure to see Parses MSSecure to see if updates are availableif updates are available 4 4 Checks if required Checks if required updates are missingupdates are missing 5 5 Generates time-stamped Generates time-stamped report of missing updatesreport of missing updates 6 6 Windows Windows Download CenterDownload Center MSSecure.xmlMSSecure.xml MBSAMBSA ComputerComputer Policies, Procedures, run inventory Inventory Tools; run inventory tool installertool installer 1 1 Scan components replicate Scan components replicate to SMS clientsto SMS clients 2 2 Clients scanned; scan Clients scanned; scan results merged into SMS results merged into SMS hardware inventory datahardware inventory data 3 3 Administrator uses Administrator uses Distribute Software Updates Distribute Software Updates Wizard to authorize updatesWizard to authorize updates 4 4 Update files downloaded; Update files downloaded; packages, programs, and packages, programs, and advertisements advertisements created/updated; packages created/updated; packages replicated and programs replicated and programs advertised to SMS clientsadvertised to SMS clients 5 5 Software Update Installation Software Update Installation Agent on clients deploy Agent on clients deploy updatesupdates 6 6 Periodically: Sync component checks for new Periodically: Sync component checks for new updates, scans clients, and deploys necessary updates, scans clients, and deploys necessary updatesupdates 7 7 EnumerationEnumeration “ “OK”OK” ? ? ? ? ? ? ? ? ? ? Record of StateRecord of State “ “Better”Better” ? ? ? ? ? ? ? ? ? ? Well-defined Standard ConfigurationsWell-defined Standard Configurations “ “Best”Best” Security Policy Model OperationsOperations ProcessProcess ImplementationImplementation DocumentationDocumentation PolicyPolicy TechnologyTechnology Start with policyStart with policy Build process Build process Apply technology Apply technology System = Programs + Servers + Solutions + Services Compare to standards and best practicesCompare to standards and best practices Measuring Security Policy Security PolicySecurity Policy Documented Documented ProceduresProcedures OperationsOperations “ “What you What you must do”must do” “ “What you What you say you do”say you do” “ “What you What you reallyreally do” do” Security Operating Security Operating PrinciplesPrinciples Corporate Security Corporate Security Mission and VisionMission and Vision Security Strategy Risk-Based Decision ModelRisk-Based Decision Model Tactical PrioritizationTactical Prioritization Mission Assess RiskAssess Risk Define Define PolicyPolicy MonitorMonitor AuditAudit Operating Principles Mission Mission and Visionand Vision Risk Based Decision Model Tactical Prioritization Prevent malicious or Prevent malicious or unauthorized use that unauthorized use that results in the loss of results in the loss of Microsoft intellectual Microsoft intellectual property or productivity property or productivity by systematically by systematically assessing, assessing, communicating, and communicating, and mitigating risks to mitigating risks to digital assetsdigital assets Enterprise Risk Model HighHigh LowLow HighHigh Impact to BusinessImpact to Business (Defined by Business Owner)(Defined by Business Owner) LowLow Acceptable Risk Unacceptable Risk Operating Principles Mission and Vision Risk Based Decision Risk Based Decision ModelModel Tactical Prioritization Probability of ExploitProbability of Exploit (Defined by Corporate Security)(Defined by Corporate Security) Risk assessment drives to acceptable risk Task begin integrating PM tools and business/IT requirements Improve risk response & managing a “portfolio” of projects 4 4 RiskRisk PM MaturityPM Maturity Project ComplexityProject Complexity PM CapabilityPM Capability EPM ExpectationEPM Expectation Project Management Maturity Model (PMMM) Technology Microsoft Office EPM Architecture Easily Create EnterpriseEasily Create Enterprise Project PlansProject PlansTeam ParticipationTeam Participation Centrally Store Project, Centrally Store Project, Resources, and ReportingResources, and Reporting Project Documents, Issues, Project Documents, Issues, Risks, and TasksRisks, and Tasks LOB SystemsLOB Systems Get More from Your Get More from Your IT InvestmentsIT Investments More More Productive Productive UsersUsers Taking a Staged ApproachTaking a Staged Approach Proof of Concept Limited Production Pilot Multi-department Rollout Enterprise Rollout Deployment Planning Legacy Legacy AppApp Workflow Workflow EngineEngine SiebelSiebelSAPSAPMS-CRMMS-CRM Architecture Overview Information BridgeInformation Bridge Back-end ServicesBack-end Services ClientClient Office Office ApplicationApplication Smart TagSmart Tag Smart DocSmart Doc Task Pane Task Pane ManagerManager Host Host RendererRenderer IBF - UIIBF - UI IBF IBF EngineEngine Metadata Metadata CacheCache Metadata Metadata Design
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 大豆玉米购销合同模板
- 广告承揽服务合同模板
- 临汾购房合同模板
- 成都二手房转让合同范例
- 劳务合同模板个人
- 大专生外包合同范例
- 大门新建合同模板
- 个人物品合同范例
- 外卖车辆租赁合同范例
- 室外附属劳务合同范例
- DL∕T 1764-2017 电力用户有序用电价值评估技术导则
- 四年级上册英语教案-UNIT FOUR REVISION lesson 14 北京版
- 公务员职业道德建设和素质能力提升培训课件(共37张)
- YDT 4565-2023物联网安全态势感知技术要求
- 营养风险筛查与评估课件(完整版)
- 幼儿园故事绘本《卖火柴的小女孩儿》课件
- 【工商企业管理专业实操实训报告2600字(论文)】
- HJ 636-2012 水质 总氮的测定 碱性过硫酸钾消解紫外分光光度法
- 主播薪资核算方案
- 机电仪运维中心巡检工作提升方案
- 大学生职业生涯规划与就业指导(高校学生学习职业生涯规划与就业指导课程)全套教学课件
评论
0/150
提交评论