Đang chuẩn bị liên kết để tải về tài liệu:
The 60 Minute Network Security Guide (First Steps Towards a Secure Network Environment)

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

The Internet consists of loosely interconnected networks of computers located around the world. Computers communicate with each other by exchanging packets according to various protocols. Computers wishing to participate on the Internet need to follow the protocols used by other members of the Internet. The lowest level common protocol used on the Internet is named “Internet Protocol”, often refered to as IP [82]. The addressing mechanism used by IP is similar to phone numbers. All entities that communicate on the Internet must have an IP address | UNCLASSIFIED I33-011R-2006 The 60 Minute Network Security Guide First Steps Towards a Secure Network Environment Systems and Network Attack Center SNAC Updated May 15 2006 Version 2.1 National Security Agency 9800 Savage Rd. Suite 6704 Ft. Meade MD 20755-6704 SNAC.Guides@nsa.gov Some parts of this document were drawn from Microsoft and The SANS Institute copyright materials with their permission. UNCLASSIFIED UNCLASSIFIED Change Control Version Date Details 1.1 18 February 2002 Updated UNIX Section which starts on page 35. These updates where to fixes grammar and syntax 1.2 12 July 2002 Clarify reference of shareware product Tripwire ASR page 40 2.0 29 March 2006 Nearly all sections of the document were updated to reflect new releases and to remove references to deprecated versions. 2.1 15 May 2006 Format grammatical changes. 2 UNCLASSIFIED UNCLASSIFIED Table of Contents INTRODUCTION.5 GENERAL GUIDANCE.6 Security Policy.6 operating Systems and Applications Versions and updates.6 Know your network.7 TCP UDP Servers and Services on the network.7 Passwords.7 Do not run code From Non-Trusted Sources.9 read E-mail as Plain Text.9 other malicious code countermeasures.10 Follow The Concept Of least Privilege.10 Application Auditing.10 Network Printers.11 Simple Network Management Protocol SNMP .11 Network Security Testing. 11 PERIMETER ROUTERS AND FIREWALLS.12 host Security.12 tcp ip filters.14 logging and debugging.22 general recommendations.24 WINDOWS 2000 AND ABOVE OPERATING SYSTEMS.25 Service Packs And Security Patches.25 Active directory and group Policy.26 Windows Configuration recommendations.26 Auditing.30 Additional Windows 2000 Security Measures.31 data Execution Prevention dep .31 MICROSOFT WEB SERVER.33 internet information Server IIS .33 UNIX SYSTEMS AND NETWORKS.35 Startup and login Scripts.35 Services and Ports.35 System Trust.35 Network Communication.36 Network Configurations.36 Patches.36 user Accounts.36 Permissions.36 Cron and At Jobs.37 Core dumps.37 3