TAILIEUCHUNG - Australian Communications-Electronic Security Instruction 33 (ACSI 33)

Although it is nearly impossible to assess all of the costs associated with virus attacks, the immediate cost of locating and removing viruses can be easily quantified. Assuming the network engineer’s yearly salary is $75,000 and he spent 75 hours searching for the in- fected workstations, the loaded labor cost of responding to this incident would have been approximately $3,750. Using Locate the network engineer was able to identify the workstations in approximately 10 minutes for a total cost of approximately $. Because the network engineer was able to locate the workstations quickly, further infection was avoided resulting in additional time savings. | Australian Communications-Electronic Security Instruction 33 ACSI 33 Point of Contact Customer Services Team Phone 02 6265 0197 Email assist@ HANDBOOK 8 NETWORK SECURITY Version Objectives 801. Network security involves the protection of an agency or internal network from threats posed by authorised or unauthorised connections. This handbook focuses on those network security issues that are relevant to the protection of Government systems. Reference is made to other DSD documents that detail network security issues and in particular this handbook should be used in conjunction with the Gateway Certification Guide which deals with agency separation and internetwork connectivity using gateways. Interconnection of Networks 802. The interconnection of networks is an increasing trend in government and private industry. It is no longer an easy task to draw a boundary around an organisation and apply controls to the boundary to protect internal assets. 803. Commonly when one owner decides to connect their network to another they do not consult or are even aware of the owners of other networks already connected. Thus a network can rapidly become linked albeit indirectly to an installation with a very different security policy. 804. There is the obvious danger that connections made in such an extended network may increase the risk of a security compromise with the owners unaware of the risk. In some instances Commonwealth agencies have discovered their computing systems have by this method become connected to the Internet. It is therefore a reasonable assumption that the security risks are likely to rise as a result of the interconnection of networks. Page 8-1 805. Network connections should therefore be protected at a level based on the risk. The assumption must be that the connecting parties are to a certain degree hostile and have to be strictly constrained to the access for which the connection was agreed. The connecting parties will after all have their .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.