TAILIEUCHUNG - HackNotes Windows Security Portable Reference phần 10

Cùng với IP Security, Encrypting File System là một trong các thành phần mạnh nhất và không được tận dụng Windows 2000 trở lên. Như thể hiện trong chương này, EFS là rất đơn giản để sử dụng nhưng một chút khó khăn hơn để sử dụng một cách chính xác. | 212 Part IV Windows Security Tools Figure 13-6. Using the Windows Backup utility to submit an EFS encrypted file to a data recovery agent SUMMARY Along with IP Security the Encrypting File System is among the most powerful and underused components of Windows 2000 and above. As shown in this chapter EFS is very simple to use but a bit more challenging to use correctly. The procedures described in this chapter are complete but every environment has its own set of requirements that may influence how EFS can be deployed. As such the details of the implementation will likely vary for example you may want a different group of data recovery agents to service Executive-level systems than you would the Sales desktops. It is important to note that EFS alone does not a secure system make. EFS compliments other Windows security facilities providing solutions to longstanding system administration issues such as how to keep administrators out of sensitive documents. EFS does not provide networklevel encryption so an EFS-protected file crossing the wire is susceptible to sniffing attacks. Deployed in conjunction with basic IP security as discussed in Chapter 12 however EFS can make sensitive documents very difficult for unauthorized parties to obtain. In the next chapter we ll present our last batch of Windows security tools those tasked with securing Internet Information Services. Chapter 14 Securing IIS IN THIS CHAPTER Simplifying Security Summary 213 214 Part IV Windows Security Tools As we discussed in Chapter 7 the Windows operating system Internet Information Services IIS has historically provided a number of possible avenues for an attacker seeking a point of entry. Numerous buffer overflows in the default ISAPI services have been used in countless attacks some even exploited by autonomous intruders such as the Code Red and Nimda worms. The frequency and severity of these issues affecting the latest and presumably the most secure Windows operating system gave Microsoft

TỪ KHÓA LIÊN QUAN
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.