Monday, January 3, 2011

【 Weak current College 】 hackers attacking with detailed solution (1)


Network managers should carefully analyse the possible intrusion and attack form, developed in line with the actual needs of network security policies, prevent possible from the networks and systems of internal or external attacks, focus on preventing those from hostile countries, enterprises, individuals and internal malicious attacks.

Prevent intrusion and attack the main technical measures include access control, firewall technology, intrusion detection, security scans, security audits and security management.

1. access control technology

Access control, network security protection and prevention of one of the core strategies. Access the control's primary purpose is to ensure that network resources from unauthorized access and unauthorized use. Access control technology is more widely involved in the content, including network logon control, network access control, catalog-level security controls, as well as the properties and methods of security control.

1. the network logon control

Network login control is a network access control in the first line of Defense. Through the network logon control you can restrict user access to the network server, or not allow users to log in, or limit the user can specify workstation, log in, or limit the user to log on to the specified server, or restrict users in the specified time logging on to the network, etc.

Network logon control typically need three links, one is authenticating users to identify the user name; the second is to verify the user's password, confirm the identity of users; the third is the verification that the user account's default permissions. In these three links, as long as one of the links the user to an exception, you cannot log on to the network. Of these, the first two links is the user's authentication process is the more important link, the user should strengthen this process of security confidentiality, in particular the enhanced user password confidentiality. Users can use one-time passwords, or use the IC card and secure way to prove their identity.

Network logon control is determined by the network administrator by network security policy enforcement. Network administrators can create or delete a regular user account, you can control and restrict the activities of the general user account access to the network of the scope, time and access methods and login process to carry out the necessary audits. For attempting to illegally log on to the network users, once discovered the police immediately.

2. network access control

When a user successfully logged on to the network, you can use its own permissions on network resources (such as directories, files, and the appropriate equipment, etc.). If you use the Internet to the user's permissions cannot be effective control, it may cause the user's illegal actions or misoperation. Network access control is possible illegal operation or misuse by a security protection measures. Control over network access and restrict user can regulate access to network resources, allowing users to access resources open to the user, do not allow users to access resources are controlled and protected.

Network access control through access control lists. In the access control list that defines the users can access network resources, as well as to the operation of these resources. Depending on network usage rights, you can add the network users divided into three categories: first, the system administrator, responsible for network system configuration and management; second auditing user, responsible for network-based system control and audit of the use of resources; third, the average user, this is determined by the system administrator has created users, its network usage rights are determined by your system administrator according to their actual needs. System administrators may make changes to a normal user permissions, or delete it.

3. directory-level security controls

User access to the network, you can use permissions on the directory, file or device to provide access. System administrator for the user in the directory level specified permission on the directory all files, all subdirectories and its subdirectories for all file are valid. If a user is abusing the privileges, the directory, file or device-to-peer network resources pose a serious threat. This directory-level security controls and property security controls to prevent users from abusing the privileges.

In General, on the directory and file access permissions, including the system administrator permissions, read permissions, and write permissions, create permissions, delete permissions, modify permissions, file search permissions and access control permissions. Directory-level security controls to restrict the user's directory and file access permissions, and protect directories and files, preventing the abuse of rights.

4. property security control

Property security control is passed to the network resource to set security properties for markers. When the system administrator to files, directories, and network equipment and other resources to set up

Ask properties, user access to these resources will be subject to certain restrictions.

Typically, the property security control you can restrict the user to specify a file for read, write, delete, and execute, and so on, you can restrict a user to view directory or file, you can hide the directory or file, share, and is set to system properties, and so on.

5. Server security control

Network allowed on the server console to perform a series of actions. The user uses consoles can load and unload the module, you can install and remove software, etc. Network server security control including setting the password lock server console to prevent unauthorized user to modify, delete, or destroy data, important information; set server logon time restrictions, illegal access to testing and close intervals.


No comments:

Post a Comment