Free Essay

Network Security Basics

In:

Submitted By Jahanbani
Words 1242
Pages 5
‫آﻣﻮزش ﻛﻠﻴﺎت اﻣﻨﻴﺖ ﺷﺒﻜﻪ‬
‫وﻗﺘﻲ ﺑﺤﺚ اﻣﻨﻴﺖ ﺷﺒﻜﻪ ﭘﻴﺶ ﻣﻲ اﻳﺪ ، ﻣﺒﺎﺣﺚ زﻳﺎدي ﻗﺎﺑﻞ ﻃﺮح و اراﺋﻪ ﻫﺴﺘﻨﺪ ، ﻣﻮﺿﻮﻋﺎﺗﻲ ﻛﻪ‬ ‫ﻫﺮ ﻛﺪام ﺑﻪ ﺗﻨﻬﺎﻳﻲ ﻣﻲ ﺗﻮاﻧﻨﺪ ﺟﺎﻟﺐ ، ﭘﺮﻣﺤﺘﻮا و ﻗﺎﺑﻞ درك ﺑﺎﺷﻨﺪ ، اﻣﺎ وﻗﺘﻲ ﺻﺤﺒﺖ ﻛﺎر ﻋﻤﻠﻲ ﺑﻪ ﻣﻴﺎن‬ ‫ﻣﻲ اﻳﺪ ، ﻗﻀﻴﻪ ﻳﻚ ﺟﻮراﻳﻲ ﭘﻴﭽﻴﺪه ﻣﻲ ﺷﻮد . ﺗﺮﻛﻴﺐ ﻋﻠﻢ و ﻋﻤﻞ ، اﺣﺘﻴﺎج ﺑﻪ ﺗﺠﺮﺑﻪ دارد و ﻧﻬﺎﻳﺖ ﻫﺪف‬ ‫ﻳﻚ ﻋﻠﻢ ﻫﻢ ، ﺑﻪ ﻛﺎر اﻣﺪن ان ﻫﺴﺖ.‬ ‫وﻗﺘﻲ دوره ﺗﺌﻮري اﻣﻨﻴﺖ ﺷﺒﻜﻪ را ﺑﺎ ﻣﻮﻓﻘﻴﺖ ﭘﺸﺖ ﺳﺮ ﮔﺬاﺷﺘﻴﺪ و وارد ﻣﺤﻴﻂ ﻛﺎر ﺷﺪﻳﺪ ،‬ ‫ﻣﻤﻜﻦ اﺳﺖ اﻳﻦ ﺳﻮال ﺑﺮاﻳﺘﺎن ﻣﻄﺮح ﺷﻮد ﻛﻪ " ﺧﺐ ، ﺣﺎﻻ از ﻛﺠﺎ ﺷﺮوع ﻛﻨﻢ ؟ اول ﻛﺠﺎ را اﻳﻤﻦ ﻛﻨﻢ ؟‬ ‫ﭼﻪ اﺳﺘﺮاﺗﮋي را ﭘﻴﺶ ﺑﮕﻴﺮم و ﻛﺠﺎ ﻛﺎر را ﺗﻤﺎم ﻛﻨﻢ ؟ " اﻧﺒﻮﻫﻲ از اﻳﻦ ﻗﺒﻴﻞ ﺳﻮاﻻت ﻓﻜﺮ ﺷﻤﺎ را ﻣﺸﻐﻮل‬ ‫ﻣﻲ ﻛﻨﺪ و ﻛﻢ ﻛﻢ ﺣﺲ ﻣﻲ ﻛﻨﻴﺪ ﻛﻪ ﺗﺠﺮﺑﻪ ﻛﺎﻓﻲ ﻧﺪارﻳﺪ و اﻳﻦ اﻟﺒﺘﻪ ﺣﺴﻲ ﻃﺒﻴﻌﻲ ﻫﺴﺖ . ﭘﺲ اﮔﺮ اﻳﻦ‬ ‫ﺣﺲ رو دارﻳﺪ و ﻣﻲ ﺧﻮاﻫﻴﺪ ﻳﻚ اﺳﺘﺮاﺗﮋي ﻋﻠﻤﻲ - ﻛﺎرﺑﺮدي داﺷﺘﻪ ﺑﺎﺷﻴﺪ ، ﺗﺎ اﻧﺘﻬﺎي اﻳﻦ ﻣﻘﺎﻟﻪ ﺑﺎ ﻣﻦ‬ ‫ﺑﺎﺷﻴﺪ ﺗﺎ ﻗﺪم ﺑﻪ ﻗﺪم ﺷﻤﺎ رو ﺑﻪ اﻣﻨﻴﺖ ﺑﻴﺸﺘﺮ ﻧﺰدﻳﻚ ﻛﻨﻢ.‬ ‫ﻫﻤﻴﺸﻪ در اﻣﻨﻴﺖ ﺷﺒﻜﻪ ﻣﻮﺿﻮع ﻻﻳﻪ ﻫﺎي دﻓﺎﻋﻲ ، ﻣﻮﺿﻮع داﻏﻲ ﻫﺴﺖ و ﻧﻈﺮات ﻣﺨﺘﻠﻔﻲ وﺟﻮد‬ ‫دارد . ﻋﺪه اي ﻓﺎﻳﺮوال را اوﻟﻴﻦ ﻻﻳﻪ دﻓﺎﻋﻲ ﻣﻲ داﻧﻨﺪ ، ﺑﻌﻀﻲ ﻫﺎ ﻫﻢ ‪ Access List‬رو اوﻟﻴﻦ ﻻﻳﻪ‬ ‫دﻓﺎﻋﻲ ﻣﻲ داﻧﻨﺪ ، اﻣﺎ واﻗﻌﻴﺖ ﭘﻨﻬﺎن اﻳﻦ ﻫﺴﺖ ﻛﻪ ﻫﻴﭽﻜﺪام از اﻳﻨﻬﺎ ، اوﻟﻴﻦ ﻻﻳﻪ دﻓﺎﻋﻲ ﻧﻴﺴﺘﻨﺪ . ﻳﺎدﺗﻮن‬ ‫ﺑﺎﺷﺪ ﻛﻪ اوﻟﻴﻦ ﻻﻳﻪ دﻓﺎﻋﻲ در اﻣﻨﻴﺖ ﺷﺒﻜﻪ و ﺣﺘﻲ اﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ ، ‪Policy‬ﻫﺴﺖ . ﺑﺪون ‪، policy‬‬ ‫ﻟﻴﺴﺖ ﻛﻨﺘﺮل ، ﻓﺎﻳﺮوال و ﻫﺮ ﻻﻳﻪ دﻳﮕﺮ ، ﺑﺪون ﻣﻌﻨﻲ ﻣﻲ ﺷﻮد و اﮔﺮ ﺑﺪون ‪ policy‬ﺷﺮوع ﺑﻪ اﻳﻤﻦ ﻛﺮدن‬ ‫ﺷﺒﻜﻪ ﻛﻨﻴﺪ ، ﻣﺤﺼﻮل ﻳﻚ آﺑﻜﺶ واﻗﻌﻲ از ﻛﺎر در ﻣﻲ اﻳﺪ.‬ ‫ﺑﺎ اﻳﻦ ﻣﻘﺪﻣﻪ ، و ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ اﻳﻦ ﻛﻪ ﺷﻤﺎ ‪ policy‬ﻣﻮرد ﻧﻈﺮﺗﺎن را ﻛﺎﻣﻼ ﺗﺠﺰﻳﻪ و ﺗﺤﻠﻴﻞ ﻛﺮدﻳﺪ‬ ‫و دﻗﻴﻘﺎ ﻣﻲ داﻧﻴﺪ ﻛﻪ ﭼﻪ ﭼﻴﺰي رو ﻣﻲ ﺧﻮاﻫﻴﺪ و ﭼﻲ را اﺣﺘﻴﺎج ﻧﺪارﻳﺪ ، ﻛﺎر را ﺷﺮوع ﻣﻲ ﻛﻨﻴﻢ . ﻣﺎ ﺑﺎﻳﺪ‬ ‫ﭘﻨﺞ ﻣﺮﺣﻠﻪ رو ﭘﺸﺖ ﺳﺮ ﺑﮕﺬارﻳﻢ ﺗﺎ ﻛﺎرﻣﺎن ﺗﻤﺎم ﺑﺸﻮد . اﻳﻦ ﭘﻨﺞ ﻣﺮﺣﻠﻪ ﻋﺒﺎرﺗﻨﺪ از:‬ ‫1- ﺑﺎزرﺳﻲ )‪( Inspection‬‬ ‫2-ﺣﻔﺎﻇﺖ )‪(Protection‬‬ ‫3- ردﻳﺎﺑﻲ )‪(Detection‬‬ ‫4-واﻛﻨﺶ )‪(Reaction‬‬ ‫5-ﺑﺎزﺗﺎب )‪(Reflection‬‬

‫١‬

‫در ﻃﻮل ﻣﺴﻴﺮ ، از اﻳﻦ ﭘﻨﺞ ﻣﺮﺣﻠﻪ ﻋﺒﻮر ﻣﻲ ﻛﻨﻴﻢ ، ﺿﻤﻦ اﻳﻨﻜﻪ اﻳﻤﻦ ﻛﺮدن ﺷﺒﻜﻪ ﺑﻪ اﻳﻦ ﺷﻜﻞ‬ ‫، اﺣﺘﻴﺎج ﺑﻪ ﺗﻴﻢ اﻣﻨﻴﺘﻲ دارد و ﻳﻚ ﻧﻔﺮ ﺑﻪ ﺗﻨﻬﺎﻳﻲ ﻧﻤﻲ ﺗﻮاﻧﺪ اﻳﻦ ﭘﺮوﺳﻪ رو ﻃﻲ ﻛﻨﺪ و اﮔﺮ ﻫﻢ ﺑﺘﻮاﻧﺪ ،‬ ‫ﺧﻴﻠﻲ ﻃﻮﻻﻧﻲ ﻣﻲ ﺷﻮد و ﻗﺎﻧﻮن ﺣﺪاﻗﻞ زﻣﺎن ﻣﻤﻜﻦ را ﻧﻘﺾ ﻣﻲ ﻛﻨﺪ.‬ ‫1-اوﻟﻴﻦ ﺟﺎﻳﻲ ﻛﻪ اﻳﻤﻦ ﻛﺮدن رو ﺷﺮوع ﻣﻲ ﻛﻨﻴﻢ ، اﻳﻤﻦ ﻛﺮدن ﻛﻠﻴﻪ ‪ authentication‬ﻫﺎي ﻣﻮﺟﻮد‬ ‫ﻫﺴﺖ . ﻣﻌﻤﻮﻻ راﻳﺞ ﺗﺮﻳﻦ روش ‪ authentication‬ﻛﻪ ﻣﻮرد اﺳﺘﻔﺎده ﻗﺮار ﻣﻲ ﮔﻴﺮد ، اﺳﺘﻔﺎده از‬ ‫ﺷﻨﺎﺳﻪ ﻛﺎرﺑﺮي و ﻛﻠﻤﻪ رﻣﺰ ﻫﺴﺖ.‬ ‫ﻣﻬﻤﺘﺮﻳﻦ ﺟﺎﻫﺎﻳﻲ ﻛﻪ ﺑﺎﻳﺪ ‪ authentication‬را اﻳﻤﻦ و ﻣﺤﻜﻢ ﻛﺮد ﻋﺒﺎرﺗﻨﺪ از:‬ ‫• ﻛﻠﻤﺎت ﻋﺒﻮر ﻛﺎرﺑﺮان ، ﺑﻪ وﻳﮋه ﻣﺪﻳﺮان ﺳﻴﺴﺘﻢ.‬ ‫• ﻛﻠﻤﺎت ﻋﺒﻮر ﺳﻮﻳﻴﭻ و روﺗﺮ ﻫﺎ ) ﻣﻦ روي ﺳﻮﻳﻴﭻ ﺧﻴﻠﻲ ﺗﺎﻛﻴﺪ ﻣﻴﻜﻨﻢ ، ﭼﻮن اﻳﻦ ‪device‬‬ ‫ﺑﻪ ﺻﻮرت ‪ plug and play‬ﻛﺎر ﻣﻲ ﻛﻨﺪ ، اﻛﺜﺮ ﻣﺪﻳﺮﻫﺎي ﺷﺒﻜﻪ از ‪ config‬ﻛﺮدن ان‬ ‫ﻏﺎﻓﻞ ﻣﻲ ﺷﻮﻧﺪ ، در ﺣﺎﻟﻲ ﻛﻪ ﻣﻲ ﺗﻮاﻧﺪ اﻣﻨﻴﺖ ﺧﻴﻠﻲ ﺧﻮﺑﻲ ﺑﻪ ﺷﺒﻜﻪ ﺑﺪﻫﺪ ، ﺑﻪ ﻣﺪﻳﺮان‬ ‫اﻣﻨﻴﺘﻲ ﺗﻮﺻﻴﻪ ﻣﻴﻜﻨﻢ ﻛﻪ ﺣﺘﻤﺎ اﻳﻦ ‪ device‬رو ﻛﻨﺘﺮل ﻛﻨﻨﺪ (.‬ ‫• ﻛﻠﻤﺎت ﻋﺒﻮر ﻣﺮﺑﻮط ﺑﻪ. ‪SNMP‬‬ ‫• ﻛﻠﻤﺎت ﻋﺒﻮر ﻣﺮﺑﻮط ﺑﻪ ﭘﺮﻳﻨﺖ ﺳﺮور.‬ ‫• ﻛﻠﻤﺎت ﻋﺒﻮر ﻣﺮﺑﻮط ﺑﻪ ﻣﺤﺎﻓﻆ ﺻﻔﺤﻪ ﻧﻤﺎﻳﺶ.‬

‫2-ﻗﺪم دوم ﻧﺼﺐ و ﺑﻪ روز ﻛﺮدن آﻧﺘﻲ وﻳﺮوس ﺑﺮ روي ﻫﻤﻪ دﺳﻜﺘﺎپ ، ﺳﺮور و ﻣﻴﻞ ﺳﺮورﻫﺎ ﻫﺴﺖ .‬ ‫ﺿﻤﻦ اﻳﻨﻜﻪ آﻧﺘﻲ وﻳﺮوس ﻫﺎي ﻣﺮﺑﻮط ﺑﻪ ﻛﺎرﺑﺮان ﺑﺎﻳﺪ ﺑﻪ ﻃﻮر اﺗﻮﻣﺎﺗﻴﻚ ﺑﻪ روز رﺳﺎﻧﻲ ﺑﺸﻮد و آﻣﻮزﺷﻬﺎي‬ ‫ﻻزم در ﻣﻮرد ﻓﺎﻳﻠﻬﺎي ﺿﻤﻴﻤﻪ اﻳﻤﻴﻞ ﻫﺎ و راﻫﻨﻤﺎﻳﻲ ﻻزم ﺟﻬﺖ اﻗﺪام ﺻﺤﻴﺢ در ﺻﻮرت ﻣﺸﺎﻫﺪه ﻣﻮارد‬ ‫ﻣﺸﻜﻮك ﻳﺎ اﺿﻄﺮاري ﺑﻪ ﻛﺎرﺑﺮان ﻫﻢ داده ﺑﺸﻮد.‬ ‫3-ﻣﺮﺣﻠﻪ ﺳﻮم ﺷﺎﻣﻞ ﻧﺼﺐ آﺧﺮﻳﻦ ﺑﻪ روز رﺳﺎﻧﻲ ﻫﺎي اﻣﻨﻴﺘﻲ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ و ﺳﺮوﻳﺴﻬﺎي ﻣﻮﺟﻮد ﻫﺴﺖ‬ ‫. در اﻳﻦ ﻣﺮﺣﻠﻪ ﻋﻼوه ﺑﺮ ﻛﺎرﻫﺎي ذﻛﺮ ﺷﺪه ، ﻛﻠﻴﻪ ﺳﺮورﻫﺎ و ‪ device‬ﻫﺎ و دﺳﻚ ﺗﺎپ ﻫﺎ ﺑﺎ اﺑﺰار ﻫﺎي‬ ‫ﺷﻨﺎﺳﺎﻳﻲ ﺣﻔﺮه ﻫﺎي اﻣﻨﻴﺘﻲ ﺑﺮرﺳﻲ ﻣﻲ ﺷﻮﻧﺪ ﺗﺎ ﻋﻼوه ﺑﺮ ﺷﻨﺎﺳﺎﻳﻲ و رﻓﻊ ﺣﻔﺮه ﻫﺎي اﻣﻨﻴﺘﻲ ، ﺳﺮوﻳﺲ‬ ‫ﻫﺎي ﻏﻴﺮ ﺿﺮوري ﻫﻢ ﺷﻨﺎﺳﺎﻳﻲ و ﻏﻴﺮﻓﻌﺎل ﺑﺸﻮﻧﺪ.‬ ‫4-در اﻳﻦ ﻣﺮﺣﻠﻪ ﻧﻮﺑﺖ ﮔﺮوه ﺑﻨﺪي ﻛﺎرﺑﺮان و اﻋﻄﺎي ﻣﺠﻮزﻫﺎي ﻻزم ﺑﻪ ﻓﺎﻳﻠﻬﺎ و داﻳﺮﻛﺘﻮري ﻫﺎ ﻣﻴﺒﺎﺷﺪ .‬ ‫ﺿﻤﻦ اﻳﻨﻜﻪ ‪ account‬ﻫﺎي ﻗﺪﻳﻤﻲ ﻫﻢ ﺑﺎﻳﺪ ﻏﻴﺮ ﻓﻌﺎل ﺷﻮﻧﺪ . ﮔﺮوه ﺑﻨﺪي و اﻋﻄﺎي ﻣﺠﻮز ﺑﺮ اﺳﺎس‬
‫٢‬

‫ﻳﻜﻲ از ﺳﻪ ﻣﺪل اﺳﺘﺎﻧﺪارد ‪ Access Control Techniques‬ﻳﻌﻨﻲ ‪ MAC , DAC‬ﻳﺎ ‪RBAC‬‬ ‫اﻧﺠﺎم ﻣﻲ ﺷﻮد . ﺑﻌﺪ از ﭘﺎﻳﺎن اﻳﻦ ﻣﺮﺣﻠﻪ ، ﻳﻚ ﺑﺎر دﻳﮕﻪ اﻣﻨﻴﺖ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺑﺎﻳﺪ ﭼﻚ ﺑﺸﻮد ﺗﺎ ﭼﻴﺰي‬ ‫ﻓﺮاﻣﻮش ﻧﺸﺪه ﺑﺎﺷﺪ.‬ ‫5-ﺣﺎﻻ ﻧﻮﺑﺖ ‪ device‬ﻫﺎ ﻫﺴﺖ ﻛﻪ ﻣﻌﻤﻮﻻ ﺷﺎﻣﻞ روﺗﺮ ، ﺳﻮﻳﻴﭻ و ﻓﺎﻳﺮوال ﻣﻲ ﺷﻮد . ﺑﺮ اﺳﺎس ‪policy‬‬ ‫ﻣﻮﺟﻮد و ﺗﻮﭘﻮﻟﻮژي ﺷﺒﻜﻪ ، اﻳﻦ ‪ box‬ﻫﺎ ﺑﺎﻳﺪ ‪ config‬ﺑﺸﻮﻧﺪ . ﺗﻜﻨﻮﻟﻮژي ﻫﺎﻳﻲ ﻣﺜﻞ ‪ NAT , PAT‬و‬ ‫‪filtering‬و ﻏﻴﺮه در اﻳﻦ ﻣﺮﺣﻠﻪ ﻣﻄﺮح ﻣﻲ ﺷﻮد و ﺑﺮ ﻫﻤﻴﻦ اﺳﺎس اﻳﻦ ﻣﺮﺣﻠﻪ ﺧﻴﻠﻲ ﻣﻬﻢ ﻫﺴﺖ. ﺣﺘﻲ‬ ‫ﻣﻮﺿﻮع ﻣﻬﻢ ‪ IP Addressing‬ﻛﻪ از وﻇﺎﻳﻒ ﻣﺪﻳﺮان ﺷﺒﻜﻪ ﻫﺴﺖ ﻣﻲ ﺗﻮاﻧﺪ ﻣﻮرد ﺗﻮﺟﻪ ﻗﺮار ﺑﮕﻴﺮد ﺗﺎ‬ ‫اﻃﻤﻴﻨﺎن ﺣﺎﺻﻞ ﺑﺸﻮد ﻛﻪ از ﺣﺪاﻗﻞ ﻣﻤﻜﻦ ﺑﺮاي ‪ IP Assign‬ﺑﻪ ﺷﺒﻜﻪ ﻫﺎ اﺳﺘﻔﺎده ﺷﺪه اﺳﺖ.‬ ‫6-ﻗﺪم ﺑﻌﺪ ﺗﻌﻴﻴﻦ اﺳﺘﺮاژي ‪ backup‬ﮔﻴﺮي ﻫﺴﺖ . ﻧﻜﺘﻪ ﻣﻬﻢ ﻛﻪ اﻳﻨﺠﺎ وﺟﻮد دارد اﻳﻦ ﻫﺴﺖ ﻛﻪ ﺑﺎﻳﺪ‬ ‫ﻣﻄﻤﺌﻦ ﺑﺸﻮﻳﻢ ﻛﻪ ﺳﻴﺴﺘﻢ ‪ backup‬ﮔﻴﺮي و ﺑﺎزﻳﺎﺑﻲ ﺑﻪ درﺳﺘﻲ ﻛﺎر ﻣﻲ ﻛﻨﺪ و ﺑﻬﺘﺮﻳﻦ ﺣﺎﻟﺖ ﻣﻤﻜﻦ‬ ‫ﺑﺎﺷﺪ.‬ ‫7-اﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ . اول از ﻫﻤﻪ ﺑﻪ ﺳﺮاغ ‪ UPS‬ﻫﺎ ﻣﻲ روﻳﻢ . ﺑﺎﻳﺪ ﭼﻚ ﻛﻨﻴﻢ ﻛﻪ ‪ UPS‬ﻫﺎ ﻗﺪرت ﻻزم‬ ‫رو ﺑﺮاي ﺗﺎﻣﻴﻦ ﻧﻴﺮوي اﻟﻜﺘﺮﻳﻜﻲ ﻻزم ﺟﻬﺖ ﻛﺎر ﻛﺮد ﺻﺤﻴﺢ ﺳﺨﺖ اﻓﺰار ﻫﺎي اﺗﺎق ﺳﺮور در زﻣﺎن‬ ‫اﺿﻄﺮاري رو داﺷﺘﻪ ﺑﺎﺷﻨﺪ . ﻧﻜﺎت ﺑﻌﺪي ﺷﺎﻣﻞ ﻛﻨﺘﺮل درﺟﻪ ﺣﺮارت و ﻣﻴﺰان رﻃﻮﺑﺖ ﻫﺴﺖ. ﻫﻤﻴﻨﻄﻮر‬ ‫اﻳﻤﻨﻲ در ﺑﺮاﺑﺮ ﺳﺮﻗﺖ و آﺗﺶ ﺳﻮزي .ﺳﻴﺴﺘﻢ ﻛﻨﺘﺮل ﺣﺮﻳﻖ ﺑﺎﻳﺪ ﺑﻪ ﺷﻜﻠﻲ ﺑﺎﺷﺪ ﻛﻪ ﺑﻪ ﻧﻴﺮوي اﻧﺴﺎﻧﻲ و‬ ‫ﺳﻴﺴﺘﻢ ﻫﺎي اﻟﻜﺘﺮوﻧﻴﻜﻲ آﺳﻴﺐ وارد ﻧﻜﻨﺪ . ﺑﻪ ﻃﻮر ﻛﻞ آﻧﭽﻪ ﻛﻪ در ﻣﻮرد اﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ ﻳﺎد ﮔﺮﻓﺘﻴﺪ را‬ ‫در اﻳﻦ ﻣﺮﺣﻠﻪ ﺑﻪ ﻛﺎر ﻣﻲ ﺑﺮﻳﺪ.‬ ‫8-اﻣﻨﻴﺖ وب ﺳﺮور ﻳﻜﻲ از ﻣﻮﺿﻮﻋﺎﺗﻲ ﻫﺴﺖ ﻛﻪ روش ﺑﺎﻳﺪ وﺳﻮاس داﺷﺘﻪ ﺑﺎﺷﻴﺪ. ﺑﻪ ﻫﻤﻴﻦ دﻟﻴﻞ در اﻳﻦ‬ ‫ﻗﺴﻤﺖ ﻛﺎر ، ﻣﺠﺪدا و ﺑﺎ دﻗﺖ ﺑﻴﺸﺘﺮ وب ﺳﺮور رو ﭼﻚ و اﻳﻤﻦ ﻣﻲ ﻛﻨﻴﻢ . در ﺣﻘﻴﻘﺖ ، اﻣﻨﻴﺖ وب رو‬ ‫اﻳﻨﺠﺎ ﻟﺤﺎظ ﻣﻲ ﻛﻨﻴﻢ.‬ ‫) اﺳﻜﺮﻳﭙﺖ ﻫﺎي ﺳﻤﺖ ﺳﺮوﻳﺲ دﻫﻨﺪه رو ﻫﻴﺞ وﻗﺖ ﻓﺮاﻣﻮش ﻧﻜﻨﻴﺪ (‬ ‫9-ﺣﺎﻻ ﻧﻮﺑﺖ ﭼﻚ ، ﺗﻨﻈﻴﻢ و ﺗﺴﺖ ﺳﻴﺴﺘﻢ ﻫﺎي ‪ Auditing‬و ‪ Logging‬ﻫﺴﺖ . اﻳﻦ ﺳﻴﺴﺘﻢ ﻫﺎ ﻫﻢ‬ ‫ﻣﻲ ﺗﻮاﻧﺪ ﺑﺮ ﭘﺎﻳﻪ ‪ host‬و ﻫﻢ ﺑﺮ ﭘﺎﻳﻪ ‪ network‬ﺑﺎﺷﺪ . ﺳﻴﺴﺘﻢ ﻫﺎي رد ﮔﻴﺮي و ﺛﺒﺖ ﺣﻤﻼت ﻫﻢ در‬ ‫اﻳﻦ ﻣﺮﺣﻠﻪ ﻧﺼﺐ و ﺗﻨﻈﻴﻢ ﻣﻲ ﺷﻮﻧﺪ. ﺑﺎﻳﺪ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﺗﻤﺎم اﻃﻼﻋﺎت ﻻزم ﺛﺒﺖ و ﺑﻪ ﺧﻮﺑﻲ ﻣﺤﺎﻓﻈﺖ‬ ‫ﻣﻲ ﺷﻮد . در ﺿﻤﻦ ﺳﺎﻋﺖ و ﺗﺎرﻳﺦ ﺳﻴﺴﺘﻢ ﻫﺎ درﺳﺖ ﺑﺎﺷﺪ ، ﻣﺒﺎدا ﻛﻪ اﺷﺘﺒﺎه ﺑﺎﺷﻪ ﻛﻪ ﺗﻤﺎم زﺣﻤﺎﺗﺘﺎن‬ ‫در اﻳﻦ ﻣﺮﺣﻠﻪ ﺑﻪ ﺑﺎد ﻣﻴﺮود . و اﻣﻜﺎن ﭘﻴﮕﻴﺮي ﻫﺎي ﻗﺎﻧﻮﻧﻲ در ﺻﻮرت ﻟﺰوم دﻳﮕﺮ وﺟﻮد ﻧﺪارد.‬

‫٣‬

‫01-اﻳﻤﻦ ﻛﺮدن ‪ Remote Access‬ﺑﺎ ﭘﺮوﺗﻜﻞ ﻫﺎ و ﺗﻜﻨﻮﻟﻮژي ﻫﺎي اﻳﻤﻦ و ‪ Secure‬ﻗﺪم ﺑﻌﺪي رو‬ ‫ﺗﺸﻜﻴﻞ ﻣﻲ دﻫﺪ. در اﻳﻦ زﻣﻴﻨﻪ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺷﺮاﻳﻂ و اﻣﻜﺎﻧﺎت ، اﻳﻤﻦ ﺗﺮﻳﻦ ﭘﺮوﺗﻜﻞ و ﺗﻜﻨﻮﻟﻮژي ﻫﺎ رو ﺑﻪ‬ ‫ﺧﺪﻣﺖ ﺑﮕﻴﺮﻳﺪ.‬ ‫11-ﻧﺼﺐ ﻓﺎﻳﺮوال ﻫﺎي ﺷﺨﺼﻲ در ﺳﻄﺢ ‪ host‬ﻫﺎ ، ﻻﻳﻪ اﻣﻨﻴﺘﻲ ﻣﻀﺎﻋﻔﻲ ﺑﻪ ﺷﺒﻜﻪ ﺷﻤﺎ ﻣﻴﺪﻫﺪ . ﭘﺲ‬ ‫اﻳﻦ ﻣﺮﺣﻠﻪ رو ﻓﺮاﻣﻮش ﻧﻜﻨﻴﺪ.‬ ‫21-ﺷﺮاﻳﻂ ﺑﺎزﻳﺎﺑﻲ در ﺣﺎﻟﺖ ﻫﺎي اﺿﻄﺮاري رو ﺣﺘﻤﺎ ﭼﻚ و ﺑﻬﻴﻨﻪ ﻛﻨﻴﺪ . اﻳﻦ ﺣﺎﻟﺖ ﻫﺎ ﺷﺎﻣﻞ ﺧﺮاﺑﻲ‬ ‫ﻗﻄﻌﺎت ﻛﺎﻣﭙﻴﻮﺗﺮي ، ﺧﺮاﺑﻜﺎري ﻛﺎرﺑﺮان ﻋﺎدي ، ﺧﺮاﺑﻲ ﻧﺎﺷﻲ از ﺑﻼﻳﺎي ﻃﺒﻴﻌﻲ ) زﻟﺰﻟﻪ - آﺗﺶ ﺳﻮزي -‬ ‫اﻓﺘﺎدن - ﺳﺮﻗﺖ - ﺳﻴﻞ و ... ( و ﺧﺮاﺑﻜﺎري ﻧﺎﺷﻲ از ﻧﻔﻮذ ﻫﻜﺮﻫﺎ ، ﻣﻴﺒﺎﺷﺪ . اﺳﺘﺎﻧﺪارد ﻫﺎي ‪warm site‬‬ ‫و ‪ hot site‬را در ﺻﻮرت اﻣﻜﺎن رﻋﺎﻳﺖ ﻛﻨﻴﺪ.‬ ‫ﻳﺎدﺗﻮن ﺑﺎﺷﺪ ﻛﻪ " ﻫﻤﻴﺸﻪ در دﺳﺘﺮس ﺑﻮدن اﻃﻼﻋﺎت " ، ﺟﺰ، ﻗﻮاﻧﻴﻦ اﺻﻠﻲ اﻣﻨﻴﺘﻲ ﻫﺴﺖ.‬ ‫31-و ﻗﺪم آﺧﺮ اﻳﻦ ﭘﺮوﺳﻪ ﻛﻪ در ﺣﻘﻴﻘﺖ ﺷﺮوع ﻳﻚ ﺟﺮﻳﺎن ﻫﻤﻴﺸﮕﻲ ﻫﺴﺖ ، ﻋﻀﻮ ﺷﺪن در ﺳﺎﻳﺘﻬﺎ و‬ ‫ﺑﻮﻟﺘﻦ ﻫﺎي اﻣﻨﻴﺘﻲ و در ﺟﺮﻳﺎن آﺧﺮﻳﻦ اﺧﺒﺎر اﻣﻨﻴﺘﻲ ﻗﺮار ﮔﺮﻓﺘﻦ ﻫﺴﺖ.‬

‫٤‬

Similar Documents

Premium Essay

8 Questions to Ask About Your Intrusion Protection Solution

...ask about your intrusion security solution Why intrusion prevention— not detection—is essential Business white paper Table of contents Introduction ..................................................................................... 3 The fundamental difference................................................................ 3 Eight basic questions ......................................................................... 3 1. Is your intrusion security solution in-band? ...................................... 3 2. Does your intrusion security solution support maximum network and application availability? ........................................................ 4 3. Does your intrusion security solution offer the performance needed to deeply inspect traffic without slowing down your network or business applications? ............................................................... 4 4. Does your intrusion security solution protect not just your network perimeter but also key points in the core of your network? ............... 4 5. Does your intrusion security solution provide attack coverage that is broad and deep? ............................................................. 5 6. How accurate is your attack coverage? Does it block bad traffic without blocking good traffic? ...................................................... 6 7. How timely and up to date is the attack coverage? .......................... 6 8. Can your security vendor refer you to customers...

Words: 2842 - Pages: 12

Premium Essay

Solutions of This Questions

...5: IT Security, crime, Compliance, and Continuity Multiple Choice 1. ______ refers to viruses, Trojan horses, spyware, and other types of disruptive, destructive, or unwanted programs. a) Bad program b) Hacking c) Malware d) Zombie computer 2. Social networks and cloud computing increase vulnerabilities by providing _____. a) a single point of failure b) an easy way to steal data c) an easier way for data to be read over networks d) extra security over a network 3. _______ is a deceptive attempt to steal a person’s confidential information by pretending to be a legitimate organization such as PayPal. a) Inquiry b) Lying c) Phishing d) Polling 4. Some essential defenses against malware and botnet defenses include all of the following except: a) antivirus software b) constant monitoring by a human c) intrusion detection systems d) intrusion prevention systems 5. ______ fraud refers to the deliberate misuse of the assets on one’s employer for personal gain. a) Occupational b) Human c) Malicious d) Accidental 6. One of the worst and most prevalent crimes is/are _____. a) phishing b) viruses c) identity theft d) malware 7. Physical control is an example of what category of control? a) Application b) Basic c) Major d) General 8. Network Security measures involve ___ types of defenses referred to as layers. a) 4 b) 3 c) 10 d) 5 9. _____ is a type of security protocol...

Words: 399 - Pages: 2

Premium Essay

It Security

...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...

Words: 15354 - Pages: 62

Premium Essay

Technology

...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...

Words: 15354 - Pages: 62

Premium Essay

Ananth

...5: IT Security, crime, Compliance, and Continuity Multiple Choice 1. ______ refers to viruses, Trojan horses, spyware, and other types of disruptive, destructive, or unwanted programs. a) Bad program b) Hacking c) Malware d) Zombie computer 2. Social networks and cloud computing increase vulnerabilities by providing _____. a) a single point of failure b) an easy way to steal data c) an easier way for data to be read over networks d) extra security over a network 3. _______ is a deceptive attempt to steal a person’s confidential information by pretending to be a legitimate organization such as PayPal. a) Inquiry b) Lying c) Phishing d) Polling 4. Some essential defenses against malware and botnet defenses include all of the following except: a) antivirus software b) constant monitoring by a human c) intrusion detection systems d) intrusion prevention systems 5. ______ fraud refers to the deliberate misuse of the assets on one’s employer for personal gain. a) Occupational b) Human c) Malicious d) Accidental 6. One of the worst and most prevalent crimes is/are _____. a) phishing b) viruses c) identity theft d) malware 7. Physical control is an example of what category of control? a) Application b) Basic c) Major d) General 8. Network Security measures involve ___ types of defenses referred to as layers. a) 4 b) 3 c) 10 d) 5 9. _____ is a type of security protocol...

Words: 399 - Pages: 2

Premium Essay

Week 3 Chapter 5

...5: IT Security, crime, Compliance, and Continuity Multiple Choice 1. ______ refers to viruses, Trojan horses, spyware, and other types of disruptive, destructive, or unwanted programs. a) Bad program b) Hacking c) Malware d) Zombie computer 2. Social networks and cloud computing increase vulnerabilities by providing _____. a) a single point of failure b) an easy way to steal data c) an easier way for data to be read over networks d) extra security over a network 3. _______ is a deceptive attempt to steal a person’s confidential information by pretending to be a legitimate organization such as PayPal. a) Inquiry b) Lying c) Phishing d) Polling 4. Some essential defenses against malware and botnet defenses include all of the following except: a) antivirus software b) constant monitoring by a human c) intrusion detection systems d) intrusion prevention systems 5. ______ fraud refers to the deliberate misuse of the assets on one’s employer for personal gain. a) Occupational b) Human c) Malicious d) Accidental 6. One of the worst and most prevalent crimes is/are _____. a) phishing b) viruses c) identity theft d) malware 7. Physical control is an example of what category of control? a) Application b) Basic c) Major d) General 8. Network Security measures involve ___ types of defenses referred to as layers. a) 4 b) 3 c) 10 d) 5 9. _____ is a type of security protocol...

Words: 399 - Pages: 2

Free Essay

Payless Casestudy

...the appropriate solutions will help the company from facing these issues again . Issues and causes: 1 Network Problem : On Monday at 9:30am organization was facing the problem of downtime of the network , no one in the organization was able to access the network . IDMS that were implemented last year are not working properly , due to which downtime in network was faced by all the people as they were not able to access the network which ends up in the result of high burden on the help desk as help desk is getting more and more calls of the frantic(panic) and angry users .As due to some extra burden on the ticketing system it got crashed and need to rebooted , as in result some of cases which needs assistance got blocked . Every user related to the Organization was going through same problem .CEO of the organization was also going through same situation , he was also not able to access the network and getting complaints of third party business partners that they are not able get connected as no network was available of payless foods. At early stage it was hard to say what is the actual cause of the problem and after full analysis IDMS was reported to be the cause of the problem of downtime of network . The COO of the company got an urgent call for setting up an important meeting between himself ,operation staff , some members of help desk and head of the network operations .Support team of IDMS is contacted and addressed...

Words: 1563 - Pages: 7

Premium Essay

Risks Associated with Internet Based Transactions

...University of Phoenix by; Kari Sherwood 10/05/2014 Abstract University of Phoenix by; Kari Sherwood 10/05/2014 Network security Hospitality industry Network security Hospitality industry NEN Network security is an important aspect of system administration. The article focuses on the purpose of network security, the kind of threats that it faces and the implementation of a security strategy. The basic idea of networks is allow people remote access to geographically distant resources without having to be physically present. It has also been designed to send data back and forth, to stay connected. There are large networks and small networks, but size is irrelevant in terms of importance of network security. The purpose of network security is to protect the network and its component parts from unauthorized access and misuse. Networks are vulnerable because of their inherent characteristic of facilitating remote access. For example, if a hacker wanted to access a computer not on a network, physical access would be vital. However, with networks in the picture, it is possible to bypass that particular security aspect. Therefore, it is vital for any network administrator, regardless of the size and type of network, to implement stringent security policies to prevent potential losses. There are a number of potential pitfalls that may arise if network security is not implemented properly. Each business will identify with the need to keep certain critical information private...

Words: 683 - Pages: 3

Premium Essay

Integrative Network Design

...Integrative Network Design NTC/362 Integrative Network Design Project Kudler Fine Foods is one of the biggest and fastest growing food companies in the Unites States. Because of this fast expansion there are expected and often increased goals that must be done in order to keep all parts of the company working as they should. One of these areas that must be kept up to date and secured at all times is its integrated network. Again because of the company’s recent growth there will be challenges that will happen especially with the network so a good integrative network design must be developed in order to continue this positive trend both in present and in the future. Kudler Fine Foods is taking the next step to upgrade the existing infrastructure with new wireless technology which will provide a better communication link for not only all of the stores, but for all of the employees as well. Kudler Fine Foods wants to implement a new network design that will connect their three locations that is spreaded out across the U.S. With the new systems and servers the ability to maximize the company’s profits will increase overnight. This new inventory system will allow the stores POS systems to alert the warehouses to ship more products when they are running low automatically. This will eliminate the need of wasted man hours checking the stock. Using a Wide Area Network (WAN) would be the best choice for connecting the three locations together. They also want to implement a...

Words: 3955 - Pages: 16

Premium Essay

Fundamental of Network

...Fundamentals of Networks Alhaji Mansary University of Phoenix Integrative Network Design Project Part 3 Prof, Marjorie Marque 12/12/12. Kudler Fine Foods Network: Final Introduction Kudler Fine Foods is on their way to upgrading their present network infrastructure with better wireless technology that will provide an improved communication medium both for the stores and employees. This will help maximizing the company’s profits with the aid of the new systems and servers performance. The new inventory system will let a store’s POS system to alert the warehouses that they need to ship more products already when the store is running low in stock. This will eliminate or at least make the man-hours needed in checking the stock. VoWLAN (Voice over WLAN) is the one to provide all the communications needed to be done by taking or making calls while providing the services needed by the customers by using the same medium. Other technological Advances will provide real-time network analysis and security monitoring which will bring overall benefits to the Kudler Company. Network Overview Kudler’s network infrastructure is now becoming very old. The stores are on separate networks so the bus network topology that they have does not allow effective communication already. This is a major problem because of the fact of lacking central location for network servers and backups or security set-up. This is the reason an enterprise wireless WAN is being rolled...

Words: 3022 - Pages: 13

Premium Essay

Information and Technology

...marketing; while IT teams can handle any and all aspects of the organizations network. Security is becoming more important to organizations, as various attacks are on a rise. Natural disasters, malicious attacks, internal breach, and loss of team members, are all good cause to maintain strong security monitoring systems. The paper that follows will address security monitoring systems that should be conducted in the Cellular Phone Organization (CPO) with both Internal IT and e-commerce applications. Network Security Systems Organizations must have a secure network, in order to stay in business. There are many types of variations of ways to secure the network of an organization, and each must cater the type of business. The internal network is comprised of all servers, applications, data, and equipment used within the organization. The security of the internal network must consist of a mixture of both hardware and software. The Cellular Phone Organization employs 150 associates in an appropriate sized building. There are three teams: Customer Care; Tech Support: and Sales. There is also a Human Resources Team and Management team, for perspective departments. The company works primarily through a LAN/WAN set up, and work is performed primarily over the web. CPO must keep personal information safe, as they are trusted by each customer. CPO must also keep the information held within the facility and network safe, belonging to their employees. The Human Resource Team and Management...

Words: 1127 - Pages: 5

Premium Essay

Next Generation Firewall

...Final Project Next Generation Firewall By: Edward Caudill Submitted as partial fulfillment of the requirements for the Bachelors of Computer Science Independence University April, 2015 Copyright ( 2015 Edward Caudill This document is copyrighted material. Under copyright law, no parts of this document may be reproduced without the expressed permission of the author. Approval Page INDEPENDENCE UNIVERSITY As members of the Final Project Committee, we certify that we have read the document prepared by __________________ entitled ________________________________________ and recommend that it be accepted as fulfilling the Capstone requirement for the Degree of ________________________________________ ____________________________________________________________Date: _________ Name of Course Instructor ____________________________________________________________Date: _________ Associate Dean Signature ____________________________________________________________Date: _________ Senior Associate Dean Signature I hereby certify that I have read this document prepared under my direction and recommend that it be accepted as fulfilling the dissertation requirement. ____________________________________________________________Date: __________ Course Instructor Abstract Taking advantage of a vulnerability (i.e., an identified weakness), in a...

Words: 3381 - Pages: 14

Premium Essay

How to Plan for Security

...for Security i). Statement of Policy This policy statement seeks to address the optimum and responsible use of the wireless local area network WLAN facility available at the university in relation to specific network security issues. The issue of concern in this policy is the promotion of responsible use of the WLAN facility among the university’s student and workers. The strategy aims at preventing security problems that may arise from the misuse and malicious exploitation of the facility by people granted approval to access the university’s WLAN information systems. a) Scope and Applicability The scope of this policy statement covers the hardware, software and access protocols associated with the WLAN use by students and workers at the university. The policies adopted will seek to regulate access permissions for the users of the WLAN facility and to promote responsible use in line with policies outlined in this policy document and by industry standards and legal requirements of use. b) Definition of Technology Address The WAN is available for use by the students and workers within the university. The WLAN facility provides access to information systems meant to facilitate the learning and worker needs by providing information access and software platforms. c) Responsibilities The administration and management of the WLAN facility is the responsibility of appointed network administrators at the university’s faculty of Information and Communication Technology. The network administrators...

Words: 1907 - Pages: 8

Free Essay

Orascom Case Study

...international telecommunications market. OTH is considered among the largest and most diversified network operators in the Middle East, Africa and Asia, with a mobile telephony penetration of approximately 48% in those regions, and more than 80 million subscribers as of March 31st, 2009. Orascom Telecom Holding operates GSM networks in Algeria (OTA), Egypt (Mobinil), Pakistan (Mobilink), Bangladesh (Banglalink), Tunisia (Tunisiana) and North Korea (Koryolink). OTH has an indirect equity ownership in Globalive Wireless which has been granted a spectrum license in Canada. Through its subsidiary Telecel Globe, OTH also operates in Burundi, the Central African Republic, Namibia and Zimbabwe. At OTH, all the information exchanged between the corporate headquarters and OTH subsidiaries on one side, and external vendors on the other side, is communicated by email. Email is therefore a mission-critical business application on which all corporate employees rely. Unfortunately, with 90% of its 1.5 million daily emails consisting of spam, OTH was rapidly overwhelmed by this type of malware. In order to protect its corporate email servers and users against spam and viruses, the IT security department of OTH had installed a third-party software application on the exchange servers. However, this security solution soon turned out to be ineffective both in terms of robustness and accuracy. Mina Samir, IT security manager at OTH recalls: “Spam was seriously affecting our business. Many relevant emails...

Words: 971 - Pages: 4

Premium Essay

Cmgt

...Individual Assignment: Security Monitoring Activities CMGT/442 Introduction Information Technology (IT) and E-commerce have been on a constant up-rise, over the past couple of decades. Many organizations have found ways to grow and remain profitable, by creating a good mixture of e-commerce and IT. E-commerce can cover a range of areas, but focus mainly on internet sales and product marketing; while IT teams can handle any and all aspects of the organizations network. Security is becoming more important to organizations, as various attacks are on a rise. Natural disasters, malicious attacks, internal breach, and loss of team members, are all good cause to maintain strong security monitoring systems. The paper that follows will address security monitoring systems that should be conducted in the Cellular Phone Organization (CPO) with both Internal IT and e-commerce applications. Network Security Systems Organizations must have a secure network, in order to stay in business. There are many types of variations of ways to secure the network of an organization, and each must cater the type of business. The internal network is comprised of all servers, applications, data, and equipment used within the organization. The security of the internal network must consist of a mixture of both hardware and software. The Cellular Phone Organization employs 150 associates in an appropriate sized building. There are three teams: Customer Care; Tech Support: and Sales. There is also a Human...

Words: 1199 - Pages: 5