- 2
- 0
- 约5.38万字
- 约 98页
- 2019-01-07 发布于上海
- 举报
微软ppt演示稿经典剪辑模板全套上197之99页
At RiskSecurity Issues Today14B devices on the Internet by 2010135M remote users by 2005265% increase in dynamic Web sites3From 2000 to 2002 reported incidents rose from 21, 756 to 82,0944Nearly 80 percent of 445 respondents surveyed said the Internet has become a frequent point of attack, up from 57 percent just four years ago5 90% detected security breaches685% detected computer viruses695% of all breaches avoidable with an alternative configuration7Approximately 70 percent of all Web attacks occur at the application layer8The SoftUnderbelly1 Source: Forrester Research2 Source: Information Week, 26 November 20013 Source: Netcraft summary4 Source: CERT, 20035 Source: CSI/FBI Computer Crime and Security Survey6 Source: Computer Security Institute (CSI) Computer Crime and Security Survey 20027 Source: CERT, 20028 Source: Gartner GroupCustomer ImpactApplication Layer AttacksImplicationsCompliance:Sarbanes OxleyGramm Leach BlilelyUS Patriot ActHIPAA The Privacy Act (CA)Basel 2 (EU)Data Protection Act (EU)Litigation File Sharing Piracy HR Issues Shareholder SuitsIdentity TheftWeb Site DefacementUnauthorized AccessModification of Data, Logs and RecordsTheft of Proprietary InformationService DisruptionCertificate RuleChecks for digital signature on application (i.e. Authenticode)Use when you want to restrict both win32 applications and ActiveX contentHash RuleCompares the MD5 or SHA1 hash of a file to the one attempted to be runUse when you want to allow/prohibit a certain version of a file from being runPath RuleCompares path of file being run to an allowed path listUse when you have a folder with many files for the same applicationEssential in when SRPs are strictInternet Zone RuleControls how Internet Zones can be accessedUse when in high security environments to control access to web applicationsTypes Of SRP RulesPrevention, Readiness, RecoveryEase of useIntegrated Database Services and Business IntelligenceFlexible install managementAdd value to one-step Failover
您可能关注的文档
最近下载
- 【基恩士】IG 系列 用户手册 (简体中文).pdf VIP
- 安徽财经大学《数值分析》2019-2020学年期末试卷.pdf VIP
- 《律师事务所退伙协议》.docx VIP
- SHS 01037—2019 球形储罐维护检修规程.docx VIP
- 文本教案半潜平台se23dec2012workshop binder.pdf VIP
- 《碳达峰碳中和政策法规汇编(2024年9月刊)》.pdf VIP
- 探索式软件测试方法在敏捷开发中的应用研究.docx VIP
- 中国行业标准 YY/T 1226-2022人乳头瘤病毒核酸(分型)检测试剂盒.pdf
- 延安市各区县地表水系图.pdf VIP
- 2025-2026学年一年级数学上册乐考非纸笔测试题(一)(人教版·新教材).docx VIP
原创力文档

文档评论(0)