tailieunhanh - Course 2830: Designing security for Microsoft networks - Appendix B

Appendix B - Designing policies for managing networks. This appendix offers guidelines for ensuring that network administrators manage networks in a secure manner. The following topics are covered in this module: Analyzing risks to managing networks, designing security for managing networks. | Appendix B: Designing Policies for Managing Networks Overview Analyzing Risks to Managing Networks Designing Security for Managing Networks Lesson: Analyzing Risks to Managing Networks What Is a Network Management Policy? Why Network Administration Policies Are Important Common Threats to Network Administration What Is a Network Management Policy? Network Management Policy Management Tools Administrator Procedures Network A network management policy defines: Tools for managing the network Users who can manage a network Procedures for managing the network Why Network Management Policies Are Important Internal Attacker Attacker Threat Example External Social engineering An attacker calls a company’s help desk, posing as a newly hired network administrator who needs to reset the password of a company official. The attacker uses the official’s account to steal company secrets. Internal Unlocked workstation An administrator logs on to a computer by using his administrator account, then leaves the computer unlocked before going to a meeting. An attacker uses the administrator’s computer to attack the network. External Attacker Common Threats to Network Management Area Threats Network management model Poor decisions about security Accounts that have excessive administrative rights Incomplete background checks of a prospective administrator Access to information Social engineering attacks that manipulate administrators Sensitive information found by sifting through garbage Diligence Failure to lock unattended workstations and servers Critical resources in unsecured physical locations Failure to perform security tasks in a timely manner Tools Use of unapproved tools to manage a network Failure to secure communication channels that are used to manage a network Lesson: Designing Security for Managing Networks Steps for Designing Secure Management of Networks Common Network Management Models Guidelines for Delegating Administrative Control Guidelines for Acceptable Use of . | Appendix B: Designing Policies for Managing Networks Overview Analyzing Risks to Managing Networks Designing Security for Managing Networks Lesson: Analyzing Risks to Managing Networks What Is a Network Management Policy? Why Network Administration Policies Are Important Common Threats to Network Administration What Is a Network Management Policy? Network Management Policy Management Tools Administrator Procedures Network A network management policy defines: Tools for managing the network Users who can manage a network Procedures for managing the network Why Network Management Policies Are Important Internal Attacker Attacker Threat Example External Social engineering An attacker calls a company’s help desk, posing as a newly hired network administrator who needs to reset the password of a company official. The attacker uses the official’s account to steal company secrets. Internal Unlocked workstation An administrator logs on to a computer by using his administrator account, then .