- Hyper-V Security
- Eric Siron Andy Syrewicze
- 337字
- 2021-08-05 16:48:31
A starting point to security
Now that you have some idea of what you're up against, you can start thinking of how you want to approach the problems. The easiest thing to do is look over the preceding items and identify what your current configuration is weakest against. You'll also want to identify what your organization considers the most important points and data to protect. Once that's done, it's a good idea to perform some sort of an inventory in an attempt to discover sensitive points that may not have made the list for some reason or another. Sometimes, this can be done simply by asking questions such as "What would the impact be if someone saw that file?".
At all times, it's important to remember that there is no way a system can be truly secured without making it completely inaccessible to anyone. If even one person can get into the system, it's also possible for someone else. Computer security is not a one-time event; it is an ongoing process of re-evaluation.
It's also important to remember that computers are just machines. No matter how advanced the hardware and software is, the computer does not think. If an instruction makes it all the way to the CPU, it won't stop to ponder if the user or program that submitted it should be allowed to do so. It won't consider the moral implications of carrying out the instruction. It will simply do as it's told. Security is a human endeavor.
This book advocates both for taking specific steps to secure specific systems and for a defense in depth approach. The defense in depth style recognizes that not all attacks can be known or planned for in advance, so it attempts to mitigate them by using a layered strategy. If the firewall is penetrated, an internal network access control list may halt a break-in. If that doesn't work, intrusion prevention software may stop the attack. If that also fails, a simple password challenge may keep the intruder out.
- Java編程全能詞典
- 三菱FX3U/5U PLC從入門到精通
- Seven NoSQL Databases in a Week
- 基于LabWindows/CVI的虛擬儀器設計與應用
- 3D Printing with RepRap Cookbook
- Moodle Course Design Best Practices
- AI 3.0
- 計算機與信息技術基礎上機指導
- HTML5 Canvas Cookbook
- MCGS嵌入版組態軟件應用教程
- 中國戰略性新興產業研究與發展·增材制造
- 水晶石影視動畫精粹:After Effects & Nuke 影視后期合成
- 電氣控制及Micro800 PLC程序設計
- 樂高創意機器人教程(中級 上冊 10~16歲) (青少年iCAN+創新創意實踐指導叢書)
- 精通ROS機器人編程(原書第2版)