Securing the Network
Closed Networks
Open Networks
Network General Training - 02 Securing the Network
版主: xyevolve
版面规则
1. 本版是定位于惠普网络产品的技术讨论区。
2. 本版鼓励发帖共同讨论技术问题,不鼓励站内信件私下交流,独知知不如众知知。
3. 本版允许转贴或引用他人的作品,但必须声明原作者信息。
4. 本版禁止发表出售、求购、或其他非技术讨论等帖子。
5. 本版禁止灌水,包括但不限于任何与所讨论主题无关的回复,无意义字符,直接复制其他回复等。
6. 本站附件禁止用于商业目的,请在下载后24小时内删除,本站不对其造成的结果负任何责任。
1. 本版是定位于惠普网络产品的技术讨论区。
2. 本版鼓励发帖共同讨论技术问题,不鼓励站内信件私下交流,独知知不如众知知。
3. 本版允许转贴或引用他人的作品,但必须声明原作者信息。
4. 本版禁止发表出售、求购、或其他非技术讨论等帖子。
5. 本版禁止灌水,包括但不限于任何与所讨论主题无关的回复,无意义字符,直接复制其他回复等。
6. 本站附件禁止用于商业目的,请在下载后24小时内删除,本站不对其造成的结果负任何责任。
-
- 网站编辑
- 帖子: 767
- 注册时间: 2010年 12月 22日 04:06 星期三
Network General Training - 02 Securing the Network
您没有权限查看这个主题的附件。
-
- 网站编辑
- 帖子: 767
- 注册时间: 2010年 12月 22日 04:06 星期三
Re: Network General Training - 02 Securing the Network
Threat Capabilities - More Dangerous and Easier to Use
E-Business Challenge
E-Business Challenge
您没有权限查看这个主题的附件。
-
- 网站编辑
- 帖子: 767
- 注册时间: 2010年 12月 22日 04:06 星期三
Re: Network General Training - 02 Securing the Network
Adversaries, Adversary Motivations, and Classes of Attack
Common Threats
Physical installations
-Hardware threats
-Environmental threats
-Electrical threats
-Maintenance threats
Reconnaissance attacks
Learning information about a target network by using readily available information and applications
Access attacks
Attacks on networks or systems for these reasons:
-Retrieve data
-Gain access
-Escalate their access privileges
Password attacks
Tools used by hackers to compromise passwords
Password Attack Threat Mitigation
Here are password attack threat-mitigation techniques:
-Do not allow users to use the same password on multiple systems.
-Disable accounts after a certain number of unsuccessful login attempts.
-Do not use cleartext passwords.
-Use “strong” passwords; for example, “mY8!Rthd8y” rather than “mybirthday.”
Common Threats
Physical installations
-Hardware threats
-Environmental threats
-Electrical threats
-Maintenance threats
Reconnaissance attacks
Learning information about a target network by using readily available information and applications
Access attacks
Attacks on networks or systems for these reasons:
-Retrieve data
-Gain access
-Escalate their access privileges
Password attacks
Tools used by hackers to compromise passwords
Password Attack Threat Mitigation
Here are password attack threat-mitigation techniques:
-Do not allow users to use the same password on multiple systems.
-Disable accounts after a certain number of unsuccessful login attempts.
-Do not use cleartext passwords.
-Use “strong” passwords; for example, “mY8!Rthd8y” rather than “mybirthday.”
您没有权限查看这个主题的附件。
-
- 网站编辑
- 帖子: 767
- 注册时间: 2010年 12月 22日 04:06 星期三
Re: Network General Training - 02 Securing the Network
Sophisticated attack tools and open networks continue to generate an increased need for network security policies and infrastructure to protect organizations from internally and externally based attacks.
Organizations must balance network security needs against e-business processes, legal issues, and government policies. Establishing a network security policy is the first step in changing a network over to a secure infrastructure.
Network adversaries come in many shapes and sizes and with multiple motivations.
It is very important to provide physical installation security for enterprise network devices.
Password attack threats can be mitigated.
-Restrict password use.
-Disable accounts after unsuccessful logins.
-Do not use cleartext passwords; use strong passwords.
Organizations must balance network security needs against e-business processes, legal issues, and government policies. Establishing a network security policy is the first step in changing a network over to a secure infrastructure.
Network adversaries come in many shapes and sizes and with multiple motivations.
It is very important to provide physical installation security for enterprise network devices.
Password attack threats can be mitigated.
-Restrict password use.
-Disable accounts after unsuccessful logins.
-Do not use cleartext passwords; use strong passwords.