找回密码
 立即注册
Security安全核心数据 | 企业管理 2022-09-16 111 0star收藏 版权: . 保留作者信息 . 禁止商业使用 . 禁止修改作品
数据核心安全最好实践1目录31企业网数据核心的安全威胁41.1未经授权的访问51.2冒充61.3拒绝服务61.4分布式拒绝服务d/dos72在数据核心部署第二层安全72.1MAC泛洪82.2ARP欺骗122.3生成树攻击152.4DHCP故障攻击193数据核心集成安全233.1未经授权的访问243.2拒绝服务攻击253.3网络侦查和病毒、蠕虫273.4IP欺骗283.5Layer2攻击303.6数据核心网络基础设施的安全303.7控制对网络设备的访问303.8路由协议安全认证353.9网络的高可用性364部署状况防火墙384.1概述384.2ServerFarm网络鸿沟上的状况防火墙384.3多层服务器区内部的状况防火墙394.4包过滤394.5防火墙攻击防备404.6ASPF445部署侵/入防护系统(IPS)545.1IPS概述545.2IPS的部署方法565.3软件配置58
数据核心安全最好实践.doc

(Data Core Security Best Practices 1 Contents 31 Security Threats to the Enterprise Network Data Core 41.1 Unauthorized Access 51.2 Impersonation 61.3 Denial of Service 61.4 Distributed Denial of Service d/dos72 Deploying Layer 2 Security in the Data Core 72.1 MAC Flooding 82.2 ARP Spoofing 122.3 Spanning Tree Attacks 152.4 DHCP Failure Attacks 193 Data Core Integration Security 233.1 Unauthorized Access 243.2 Denial of Service Attacks 253.3 Network Reconnaissance and Viruses, Worms 273.4 IP Spoofing 283.5 Layer 2 Attacks 303.6 Data Core Network Infrastructure Security 303.7 Control of Network Devices Access 303.8 Routing Protocol Security Authentication 353.9 High Availability of Networks 364 Deployment Status Firewall 384.1 Overview 384.2 ServerFarm Status on the Network Divide Firewall 384.3 Status Firewall Inside Multilayer Server Zones 394.4 Packet Filtering 394.5 Firewall Attack Prevention 404.6 ASPF445 Deployment of Intrusion/Intrusion Prevention Systems ( IPS) 545.1 IPS Overview 545.2 IPS Deployment Methods 565.3 Software Configuration 58
Data Core Security Best Practices.doc)

[下载]17183171207.rar




上一篇:windows系统进程详解
下一篇:Juniper SRX Branch系列防火墙配置管理手册