TAILIEUCHUNG - Course 2830: Designing security for Microsoft networks - Appendix C

Appendix C: Designing an operations framework to manage security. This appendix explains how to create a framework to ensure security of a network as the network changes and as the security requirements of the organization change. | Appendix C: Designing an Operations Framework to Manage Security Overview Analyzing Risks to Ongoing Network Operations Designing a Framework for Ongoing Network Operations Lesson: Analyzing Risks to Ongoing Network Operations Management of Ongoing Network Operations Why Security of Network Operations Is Important Common Vulnerabilities to Network Operations Management of Ongoing Network Operations Operating Supporting Changing Optimizing The MOF Process Model MOF describes stages in the network management cycle MOF provides a framework to manage operational security, including: Changes to security design Daily operation of network security IT support for security issues Optimizing and revising the security design Network Why Security of Network Operations Is Important Attacker Threat Example External No change and configuration management A software company releases a new security hotfix to patch a recently discovered vulnerability. An attacker exploits the vulnerability on the network before administrators apply the patch to all computers. Internal Security procedures not followed An administrator notices a potential security compromise but is unsure how to report it. The administrator decides to remove the corporate network from the Internet. Internal Attacker External Attacker Common Vulnerabilities to Network Operations Vulnerability Example Inadequate plan for change management New security patches are applied irregularly or not at all Administrators and users lack proper training on securing new applications Poor operations plan Users do not follow security policies and procedures Administrators do not regularly test backup media Weak support structure Security incident goes unreported IT support services are not reliable Failure to revise policy New security risks are not added to risk management plan Policies and procedures become outdated Lesson: Designing a Framework for Ongoing Network Operations Steps for Planning a Security Operations Framework .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.