tailieunhanh - Exercise 1 Developing a Security Plan
Use Group Policy to deploy a desktop virus scanner and configure scanning preferences. Virus scanner must scan files being downloaded from the Internet. | Exercise 1 Developing a Security Plan Design Worksheet A Risk Policy Design solution Virus infection from the Internet All incoming files must be scanned by a virus scanner. Use Group Policy to deploy a desktop virus scanner and configure scanning preferences. Virus scanner must scan files being downloaded from the Internet. Loss of internal data from file servers due to accidental deletion of data Cannot tolerate a loss of more than one day s worth of data. Implement a training plan to make sure that all staff members know where to store data and how to save data to file servers. Implement disaster recovery plan and make sure that the backup strategy can recover at least all of the data from the previous day. Information from HR database stolen by internal staff Must make sure that access to HR database is granted on an as-needed basis. Make sure that permissions on the HR database secure the information. Information from HR database stolen by external partners Must make sure that external partners have access only to the information that they need in the HR database. Partition the information available in the HR database so that information that can be accessed externally is in a different section of the database from internal information. Set permissions on the internal information to deny access to external partners. Compromise of data on internal servers due to VPN connection to the Internet Must not allow attacks from the Internet to compromise HR data. Implement certificate-based authentication for partners. Use remote access policies and require strong encryption of data. Grant VPN access on an as-needed basis. Copyright 2002 Microsoft Corporation. All Rights Reserved. Design Worksheet B Design solution Strategy for maintenance Use Group Policy to deploy a desktop virus scanner and configure scanning preferences. The virus scanner must scan e-mail. Monitor virus information sources and make sure that virus scanner files are up-to-date. Monitor audit logs to
đang nạp các trang xem trước