Download presentation
Presentation is loading. Please wait.
Published byLeona Tyler Modified over 9 years ago
1
System Security Basics
2
Information System Security The protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.
5
Fortress Model Watch towers to detect threat Protection by: –Moat –Outer Wall –Inner Wall of Keep Draw bridge and Gate – controlled access
6
Fortress model for defense 1.Critical information 2.Physical protection 3.Operation system hardening 4.Information access 5.External access
7
1. Critical Information Data categorization –Public –Internal –Confidential –Secret Application hardening
8
2. Physical Protection Physical environment –Geographical location –Social environment –Building construction Physical controls Communications Surveillance
9
3. Operation Systems Hardening Security configuration Anti-malware File system –Encrypting File System ADDS security System redundancy
10
4. Information Access User identification Security policies Resources access Role base access control Access auditing Digital rights management
11
5. External Access Perimeter network VPN/ RRAS (Routing and Remote Access) SSTP (Secure Socket Tunneling Protocol) PKI Identity federation NAP (Network Access Protection)
12
Polices, Procedures & Awareness Data Application Host Internal Network Perimeter The Microsoft Model
13
Things to do Identify who enter your system Provide the user with the appropriate access right Identify the person modifying the data is authorized to do so Guarantee the confidentiality of information Guarantee the availability of information
14
Things to do Ensure the integrity of the information Monitor the activities of the system Audit security events Put in administrative procedures to ensure the system is secure
15
System composition File server/ Print server/ Fax server Web server Application server DNS server DHCP server Domain controller Terminal server
16
System composition Email server RADIUS server VPN server Certificate server UDDI server Network policy and access server Gateway/ Firewall/ Switch And users
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.