- 1、本文档共53页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
-拓展任务4.4-2思科自防御安全解决方案综述
* * * Events are correlated locally on the agent, as well as globally on the Manager. This results in an extraordinary increase in accuracy when compared to signature-based host IDS systems. Global correlation is similar to local correlation, but correlates events received from many different agents. Attackers who send only a few (sometimes only one) packet to each host in the enterprise have traditionally been able to map the entire network while evading detection. If several agents detect a common program trying to propagate via email, the Manager will add the program to the Global Quarantine List. When agents poll, they will receive the updated list. Even if they have not yet been attacked by the worm, the worm’s executable files will be placed “off limits”. 20 This slide is the result of several hundred Cisco “Security Posture Assessments” or consulting engagements. Customers ask us to review their network security from both the outside and the inside. How difficult is it to break through the firewall from the Internet or take advantage of holes in the dial-in environment? How difficult is it to act as a disgruntled or malicious employee to gain control of a critical business system? Cisco Security Engineers, on average, break to the client’s network from the outside, about 75% of the time using direct exploitation techniques. When more advanced, secondary exploitation techniques are used -- this is using several vulnerabilities in combination with one another and is representative of a more advanced, structured threat -- the external penetration rate increases to over 95%. [Build] Approximately 65% of the time, unauthorized access is gained via dial-up means -- either with poor passwords on modems or unauthorized modems with little to no security. [Build] Finally, in the internal assessment phase of the SPA, our engineers have gained unauthorized super-user or root privileges to critical corporate machines 100% of the time. These are not insignifican
文档评论(0)