Mission-Critical Security Planner When Hackers Won’t Take No for an Answer phần 3

trong Visual Basic. Dưới đây là các chủ đề chính trong chương này:Để thích ứng với các công cụ nhà nước mới và, đặc biệt, nhà nước gặp phải là diễn ra, tôi đã viết một chương trình con mới được gọi là | 72 Chapter 2 20. Lost or Stolen Items When Important Things Disappear Some of the most effective hacks are launched from stolen or lost laptops enabled for example because many people store default usernames passwords on them. Check yours out now Perhaps your dial-up connection and email are both configured to automatically store and supply username and password. One company specializing in security and secure hosting went out of business because of the the bad press generated by a serious hack made possible via a stolen laptop. This security element is best addressed via policies that clearly set out the reporting procedure employees are to follow when they lose or note something missing laptops desktops handhelds badges tokens smart cards or floppy disks with sensitive information. They should be instructed to report the incident to a designated security officer who must act quickly to disable and reissue authentication and access control configurations. Policies in this category should describe what employees and security officers must respond to how quickly and the procedures for carrying out the appropriate response. 21. Managed Outsourced Security Working with Outside Security Vendors An external organization outsource that manages any of your organization s information or infrastructure elements must be required to adhere strictly to policies you define that meet the minimum requirements of your internal security planning process. These policies should include procedures for reviewing and validating practicing testing adherence to your minimum requirements and include metrics for measuring this adherence. 22. Performance Security Takes Time Because security measures such as firewalls proxy servers directory server lookups logging encryption and real-time intrusion detection and vulnerability analysis all consume resources of one form or another security can slow things down. Therefore your security plan should try to anticipate the performance impact. An .

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.