1 / 4
文档名称:

网络安全检测模板.pdf

格式:pdf   页数:4页
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

分享

预览

网络安全检测模板.pdf

上传人:管理资源吧 2011/9/16 文件大小:0 KB

下载得到文件列表

网络安全检测模板.pdf

文档介绍

文档介绍:SECURITY
A Checklist for
Network Security
By J. Craig Lowery, .
working has made the explosive growth puter applications possible,
the security liabilities it introduces are extremely problematic. In fact, a system’work
connection is the primary target of most modern security attacks. This article provides a
checklist of security safeguards for system administrators to implement.
etworking—connecting puter to puters— high-end firewalls have extensive customization features for
improves user productivity and quality of life. It boosts implementing security policies but may unduly restrict users
Nefficiency, provides munication methods, if misapplied.
enhances research capabilities, and merce opportuni- How a firewall provides protection is largely determined by
ties. working also increases puter’s vulnerability to how the work connects to the work, which
threats such as data theft, tampering, and service disruptions. is typically the . Figure 1 shows two connection possibili-
Still, these inherent security problems are more than an equitable ties: a routed connection and a proxied connection.
exchange for the capabilities working provides. The
challenge for system administrators is to minimize security risks Firewall with routed connection
without unnecessarily working benefits. A gateway router simply extends the address space and
The pract