PPT教学第一篇区块篇.ppt
《PPT教学第一篇区块篇.ppt》由会员分享,可在线阅读,更多相关《PPT教学第一篇区块篇.ppt(51页珍藏版)》请在三一文库上搜索。
1、,第一篇 区块篇,At Risk,The Soft Underbelly,Security Issues Today,1 Source: Forrester Research 2 Source: Information Week, 26 November 2001 3 Source: Netcraft summary 4 Source: CERT, 2003 5 Source: CSI/FBI Computer Crime and Security Survey 6 Source: Computer Security Institute (CSI) Computer Crime and Sec
2、urity Survey 2002 7 Source: CERT, 2002 8 Source: Gartner Group,14B devices on the Internet by 20101 35M remote users by 20052 65% increase in dynamic Web sites3 From 2000 to 2002 reported incidents rose from 21, 756 to 82,0944 Nearly 80 percent of 445 respondents surveyed said the Internet has becom
3、e a frequent point of attack, up from 57 percent just four years ago5,90% detected security breaches6 85% detected computer viruses6 95% of all breaches avoidable with an alternative configuration7 Approximately 70 percent of all Web attacks occur at the application layer8,Application Layer Attacks,
4、Identity Theft Web Site Defacement Unauthorized Access Modification of Data, Logs and Records Theft of Proprietary Information Service Disruption,Implications,Compliance: Sarbanes Oxley Gramm Leach Blilely US Patriot Act HIPAA The Privacy Act (CA) Basel 2 (EU) Data Protection Act (EU) Litigation Fil
5、e Sharing Piracy HR Issues Shareholder Suits,Customer Impact,Types Of SRP Rules,Path Rule Compares path of file being run to an allowed path list Use when you have a folder with many files for the same application Essential in when SRPs are strict,Hash Rule Compares the MD5 or SHA1 hash of a file to
6、 the one attempted to be run Use when you want to allow/prohibit a certain version of a file from being run,Certificate Rule Checks for digital signature on application (i.e. Authenticode) Use when you want to restrict both win32 applications and ActiveX content,Internet Zone Rule Controls how Inter
7、net Zones can be accessed Use when in high security environments to control access to web applications,SQL Server 2005 Themes,Supportability & Quality,Enterprise Enhancements,Unified & Flexible Administration,Patch Solutions,Prevention, Readiness, Recovery Ease of use,Patch Installs Patch in integra
8、ted step,Integrated Database Services and Business Intelligence Flexible install management,Add value to one-step Failover Clustering Expanded scripting support,Live Communications Client Roadmap,LC 1.2 Client Platform Multiparty IM P2P Voice and Video MPOP Groups Roaming SIP support GPO policy mana
9、gement,LC 1.5 Client Platform Roll up of QFEs MPOP Additions Federation/Archiving Notification HA Additions,LC 2.0 Client Platform Next generation of RTC experiences More coming!,2003,2H04,Longhorn,Integrated phone and PDA Primarily data viewing Interoperability with Outlook and Exchange .NET Compac
10、t Framework ASP.NET mobile controls,Mobile Device Solutions,Complex document authoring, editing and reading Keyboard centric at the desk Keyboard and mouse input methods Full .NET framework available Centrino Solutions,Windows Mobile,Windows XP,Complex document authoring, editing and active reading
11、Note taking and ink annotating Keyboard centric at the desk, pen and keyboard away from the desk Keyboard, mouse plus pen, ink, and speech input methods Full .NET framework preinstalled Pen, ink, handwriting and speech recognition APIs Centrino Solutions,View and some data entry Integrated PDA with
12、phone Interoperability with Office, Exchange and SQL Server .NET Compact Framework ASP.NET mobile controls Intel Xscale Solutions,Windows CE,One-way network Information consumption,Smart Personal Objects,Smartphone,Pocket PC and Pocket PC Phone,Notebook PC,Tablet PC,Traditional Firewalls,Wide open t
13、o advanced attacks,Performance versus security tradeoff,Limited capacity for growth,Hard to manage,Code Red, Nimda SSL-based attacks,Security is complex IT is already overloaded,Bandwidth too expensive Too many moving parts,Not easily upgradeable Dont scale with business,Choosing the Right Type of A
14、ssessment,Vulnerability Scanning Focuses on known weaknesses Of the three, requires the least expertise Generally easy to automate,Penetration Testing Focuses on known and unknown weaknesses Requires advanced technical expertise Carries tremendous legal burden in certain countries/organizations,IT S
15、ecurity Audits Focuses on security policies and procedures Of the three, requires the most expertise When done right is the most effective type of assessment,Perimeter Security Evolution,Wide open to advanced attacks,Application-level protection,Performance versus security tradeoff,Security and perf
16、ormance,Limited capacity for growth,Extensibility and scalability,Hard to manage,Easier to use,The advanced application layer firewall, VPN and Web cache solution that enables customers to maximize IT investments by improving network security and performance,Advanced protection Application layer sec
17、urity designed to protect Microsoft applications,Fast, secure access Empowers you to connect users to relevant information on your network in a cost efficient manner,Ease of use Efficiently deploy, manage, and enable new usage scenarios,Introducing: ISA Server 2004,Fast, secure access Empowers you t
18、o connect users to relevant info. on your network,ISA Server 2004 New Features Continued commitment to integration,Enhanced architecture,High speed data transport Utilizes latest Windows and PC hardware SSL bridging unloads downstream servers,Web cache,Updated policy rules Serve content locally Pre-
19、fetch content during low activity periods,Internet access control,User- and group-based Web usage policy Extensible by third parties,Comprehensive authentication,New support for RADIUS and RSA SecurID User- & group-based access policy Third party extensibility,System Service Accounts,Local Service a
20、nd Network Service No password to manage Runs with only slightly more permissions than Authenticated User Local Service cannot authenticate across the network, Network Service authenticates as the computer account,Local System No password to manage Bypasses security checks User Accounts Run with les
21、s privilege than Local System Stores password as an LSA secret Can be complex to configure,Whats New With IPSec?,Management IP Security Monitor Command-line management with Netsh Logical addresses for local IP configuration,Security Stronger cryptographic master key (Diffie-Hellman) Computer startup
22、 security Persistent policy for enhanced security Ability to exclude the name of the CA from certificate requests Better default exemption handling,Interoperability IPSec functionality over network address translation (NAT) Improved IPSec integration with Network Load Balancing,ISA Server 2004 New F
23、eatures New management tools and user interface,Multi-network architecture,Unlimited network definitions and types Firewall policy applied to all traffic Per network routing relationships,Network templates and wizards,Wizard automates nwk routing relationships Supports 5 common network topologies Ea
24、sily customized for sophisticated scenarios,Visual policy editor,Unified firewall/VPN policy w/one rule-base Drag/drop editing w/scenario-driven wizards XML-based configuration import-export,Enhanced trouble-shooting,All new monitoring dashboard Real-time log viewer Content sensitive task panes,Ease
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- PPT 教学 一篇 区块
链接地址:https://www.31doc.com/p-2146900.html