1 4 4

:

  1. #1
    Jan 2006
    7,816










    . . ( ) .

    Information Security - .

    1-1

    ( )



    - :-



    CONFIDENTIALITY : .

    INTEGRITY : .

    AVAILABILITY :- .

    Non-repudiation :- .



    1-2

    ( )



    :-



    :- :- . . .



    :- ( ) . ( ) . . . . . . .



    :- . .

    . ( ) .



    1-3

    :-

    :- .

    :- .

    :- . .

    :- .











    :-

    2-1 Information classification :-

    .

    2-2 Documentation :-

    . . .



    2-3 Administration and Personnel Responsibilities :-

    :- .

    ( ) .

    .



    2-4 Identification and Authorization :-

    Identification and Authorization systems. . .

    :-

    1 - .

    2

    3 .

    .

    authentication .

    () Authorization Access Control system . ( 5 )



    2-5 Logging :-

    . ( ) .



    2-6 Back-up :-

    .



    .





    2-7 :-

    . Firewalls cryptography Intrusion Detection Systems (IDS) 1-5 .



    2-8 Incident Handling System :-

    .

    .

    ( ) :- .









    3-1 :-

    .

    .

    ....... .



    Threats : .



    Vulnerabilities : . . Countermeasures : .



    Risks : Risk analysis Process .



    Incident :- .



    Attacks . Breaches .



    ɡ Cyber crime .

    Cyber Terrorism - - . Information warfare ɡ . .





  2. #2
    Jan 2006
    7,816





    3-2



    ( 1-3)

    :-

    1 :-

    . .

    2 :-

    ( 2 ) . . .

    3 :-

    . .

    4 :-

    .



    .



    3-2-1 :-

    . :-



    :- Physical security Breaches of

    - Dumpster diving . .

    - Wiretapping :- .

    - Eavesdropping on Emanations : .

    - Denial or Degradation of Service :- .



    :- Personnel security Breaches of

    .



    - Masquerading :- .

    - Social Engineering .

    - Harassment :- .

    - Software Piracy .



    :-

    Communications and Security Breaches of

    :-

    Data Attacks

    - Unauthorized Copying of Data:- .

    - Traffic Analysis :- .

    - Covert Channels :- .

    Software Attacks

    - Trap Doors :- .



    - ( ) Session Hijacking :- .

    - Tunneling :- ɡ .

    - Timing attacks Race conditions Asynchronous attacks .

    - Malicious Code Viruses Trojan Horses Warms Salamis Logic Bombs :- .

    1988 6000 ( ) ( ) 2.5 .



    :- Breaches of Operations Security :-

    :-



    - ( ) Data Diddling :-



    - IP Spoofing ( ):- Spoofing ( ).

    - ( ) Password Sniffing :- 128 () .

    - Scanning :- (- ware dialer demon dialer processes) ( ) .

    - Excess Privileges :- . . .



    3-2-2



    . / - :-

    - .

    - READ/CREATE/MODIFY/DELETE refers to information (data and software) inside the computer system

    - .

    - TRANSPORT refers to information (data and software) transported via a network or on media

    - .

    - STORE refers to information (data and software) when it is stored on computer media and taken out of the computer system. (I.e. back-up tapes/diskettes).

    ( ) . :- . ( .. .

    ( ).



    3-2-3 :-

    2000 .

    . ( ) .

    :- Errors and Omissions Fraud and Theft Disgruntled Employees Physical and Infrastructure Industrial Espionage Foreign Government Espionage Malicious Code . ( ) .

    .

    :- Unauthorized LAN access Unauthorized access to LAN resources The unauthorized modification of data and software :-



    3-3

    .

    .



    4-1

    .

    .

    :-

    - .

    ɡ .

    1-5 . .

    . - - .


  3. #3
    Jan 2006
    7,816

    - .

    .

    4-2

    .

    :-

    - Identification and authentication .

    - Access control .



    - Data and message confidentiality file and message encryption technology, protection for backup copies on tapes, diskettes, etc, physical protection of physical LAN medium and devices .

    - ( ) Data and message integrity .

    - ( ) Non-repudiation .

    - ( ) Logging and Monitoring .

    - :-



    .

    Firewall virtual private networks .
    . vertual private networks quality of service - - . 1980 LAN . . IP : . ( ) ( ) . . . .

    Bastion Host ( Proxy) Dec Dec . 1991 Dec Proxies Dec seal Gatekeeper .

    :-

    - :- . . Replay Attacks Certificates . .

    - :- firewall - to firewall ans interlock virtual private networks . . . .

    - Content Screening :- .

    - .

    - firewall appliances :- . turnkey .



    ( ) COMPREHENSIVE SECURITY SYSTEM . : . : . : .





    .

    . .







    5-1



    Security Policy



    .



    :-

    .

    .

    .







    .







    :- .

    :- . . .

    .





    5-2

    :-

    .

    1 - CONFIDENTIALITY : .

    2 - INTEGRITY : .

    3 - AVAILABILITY :- .



    1 - :

    2 - : .

    .



    1 - : .

    2- : .

    3 - : .

    4 - - : .



    :

    1 - : . ( ) . .

    2 - : .

    3 - : . .

    4 - : .

    5 - : .

    6 - : .

    7 - :

    .





    :

    1 - ( ) Identification and Authentication .

    2 - ( ) Access Control : .

    3 - ( ) Data and message Confidentiality: .

    4 - ( ) Data and message Integrity: .

    5 - ( ) Non-repudiation: .

    .



    :- . . :-

    ( ( ) :

    -

    -

    -

    -

    - .

    .

    : -

    1 - .

    2 - : .

    3 - : .





    5-3

    .

    :-

    - .

    - .

    - .

    - .

    - .

    - .

    - .

    - .

    - .

    - ǡ .

    - .

    - .

    - .

    - .

    - .

    - .

    - .

    .

  4. #4
    Apr 2015
    179

: 1 (0 1 )

  1. : 4
    : 06-09-2010, 05:41 PM
  2. : 0
    : 16-08-2010, 06:16 PM
  3. *dodo*
    : 8
    : 14-09-2009, 09:24 PM
  4. l@w man
    : 5
    : 13-09-2009, 02:53 AM
  5. immanuel
    : 2
    : 15-08-2009, 08:36 PM