微软ppt演示稿经典剪辑模板全套上》(197之99页)

上传人:tian****1990 文档编号:69569026 上传时间:2019-01-14 格式:PPT 页数:99 大小:8.28MB
返回 下载 相关 举报
微软ppt演示稿经典剪辑模板全套上》(197之99页)_第1页
第1页 / 共99页
微软ppt演示稿经典剪辑模板全套上》(197之99页)_第2页
第2页 / 共99页
微软ppt演示稿经典剪辑模板全套上》(197之99页)_第3页
第3页 / 共99页
微软ppt演示稿经典剪辑模板全套上》(197之99页)_第4页
第4页 / 共99页
微软ppt演示稿经典剪辑模板全套上》(197之99页)_第5页
第5页 / 共99页
点击查看更多>>
资源描述

《微软ppt演示稿经典剪辑模板全套上》(197之99页)》由会员分享,可在线阅读,更多相关《微软ppt演示稿经典剪辑模板全套上》(197之99页)(99页珍藏版)》请在金锄头文库上搜索。

1、,第一篇 区块篇,At Risk,The Soft Underbelly,Security Issues Today,1 Source: Forrester Research 2 Source: Information Week, 26 November 2001 3 Source: Netcraft summary 4 Source: CERT, 2003 5 Source: CSI/FBI Computer Crime and Security Survey 6 Source: Computer Security Institute (CSI) Computer Crime and Sec

2、urity Survey 2002 7 Source: CERT, 2002 8 Source: Gartner Group,14B devices on the Internet by 20101 35M remote users by 20052 65% increase in dynamic Web sites3 From 2000 to 2002 reported incidents rose from 21, 756 to 82,0944 Nearly 80 percent of 445 respondents surveyed said the Internet has becom

3、e a frequent point of attack, up from 57 percent just four years ago5,90% detected security breaches6 85% detected computer viruses6 95% of all breaches avoidable with an alternative configuration7 Approximately 70 percent of all Web attacks occur at the application layer8,Application Layer Attacks,

4、Identity Theft Web Site Defacement Unauthorized Access Modification of Data, Logs and Records Theft of Proprietary Information Service Disruption,Implications,Compliance: Sarbanes Oxley Gramm Leach Blilely US Patriot Act HIPAA The Privacy Act (CA) Basel 2 (EU) Data Protection Act (EU) Litigation Fil

5、e Sharing Piracy HR Issues Shareholder Suits,Customer Impact,Types Of SRP Rules,Path Rule Compares path of file being run to an allowed path list Use when you have a folder with many files for the same application Essential in when SRPs are strict,Hash Rule Compares the MD5 or SHA1 hash of a file to

6、 the one attempted to be run Use when you want to allow/prohibit a certain version of a file from being run,Certificate Rule Checks for digital signature on application (i.e. Authenticode) Use when you want to restrict both win32 applications and ActiveX content,Internet Zone Rule Controls how Inter

7、net Zones can be accessed Use when in high security environments to control access to web applications,SQL Server 2005 Themes,Supportability & Quality,Enterprise Enhancements,Unified & Flexible Administration,Patch Solutions,Prevention, Readiness, Recovery Ease of use,Patch Installs Patch in integra

8、ted step,Integrated Database Services and Business Intelligence Flexible install management,Add value to one-step Failover Clustering Expanded scripting support,Live Communications Client Roadmap,LC 1.2 Client Platform Multiparty IM P2P Voice and Video MPOP Groups Roaming SIP support GPO policy mana

9、gement,LC 1.5 Client Platform Roll up of QFEs MPOP Additions Federation/Archiving Notification HA Additions,LC 2.0 Client Platform Next generation of RTC experiences More coming!,2003,2H04,Longhorn,Integrated phone and PDA Primarily data viewing Interoperability with Outlook and Exchange .NET Compac

10、t Framework ASP.NET mobile controls,Mobile Device Solutions,Complex document authoring, editing and reading Keyboard centric at the desk Keyboard and mouse input methods Full .NET framework available Centrino Solutions,Windows Mobile,Windows XP,Complex document authoring, editing and active reading

11、Note taking and ink annotating Keyboard centric at the desk, pen and keyboard away from the desk Keyboard, mouse plus pen, ink, and speech input methods Full .NET framework preinstalled Pen, ink, handwriting and speech recognition APIs Centrino Solutions,View and some data entry Integrated PDA with

12、phone Interoperability with Office, Exchange and SQL Server .NET Compact Framework ASP.NET mobile controls Intel Xscale Solutions,Windows CE,One-way network Information consumption,Smart Personal Objects,Smartphone,Pocket PC and Pocket PC Phone,Notebook PC,Tablet PC,Traditional Firewalls,Wide open t

13、o advanced attacks,Performance versus security tradeoff,Limited capacity for growth,Hard to manage,Code Red, Nimda SSL-based attacks,Security is complex IT is already overloaded,Bandwidth too expensive Too many moving parts,Not easily upgradeable Dont scale with business,Choosing the Right Type of A

14、ssessment,Vulnerability Scanning Focuses on known weaknesses Of the three, requires the least expertise Generally easy to automate,Penetration Testing Focuses on known and unknown weaknesses Requires advanced technical expertise Carries tremendous legal burden in certain countries/organizations,IT S

15、ecurity Audits Focuses on security policies and procedures Of the three, requires the most expertise When done right is the most effective type of assessment,Perimeter Security Evolution,Wide open to advanced attacks,Application-level protection,Performance versus security tradeoff,Security and perf

16、ormance,Limited capacity for growth,Extensibility and scalability,Hard to manage,Easier to use,The advanced application layer firewall, VPN and Web cache solution that enables customers to maximize IT investments by improving network security and performance,Advanced protection Application layer security designed to protect Microsoft applications,Fast, secure access Empowers you to connect users to relevant information on your network in a cost efficient manner,Ease of use Efficientl

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 高等教育 > 大学课件

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号