Студопедия

КАТЕГОРИИ:


Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748)

Intrusion Management




 

Intrusion management is a four-step process. The steps are avoidance, assurance, detection and investigation. Intrusion management has as its objective: limiting the possibility of a successful intrusion through effective preventative, quality management and detective processes, and facilitating successful investigation of an intrusion should one occur. The primary goal of intrusion management is to prevent intrusions entirely. We can address that goal by implementing a program of effective security controls. Those controls should be present at every interface point within an information management system. Effective controls grow out of effective information security policies, standards and practices. Organizations should impose controls aimed at mitigating threats against functional areas of vulnerability at each interface point. There are six such functional areas of vulnerability:

1. Identification and Authentication: functions intended to establish and verify the identity of the user or using process.

2. Access Control: functions intended to control the flow of data between, and the use of resources by users, processes and objects. This includes administration and verification of access rights.

3. Accountability: functions intended to record exercising of rights to perform security-relevant actions.

4. Object Re-use: functions intended to control reuse or scavenging of data objects.

5. Accuracy: functions intended to insure correctness and consistency of security-relevant information.

6. Reliability of Service: functions intended to insure security of data over communication links.

 

Exercise 14. Answer the following questions.

1. Is intrusion management a four-step or five-step process? 2. What are the steps of intrusion management process? 3. Is the primary goal of intrusion management to limit the possibility of a successful intrusion or to prevent intrusions entirely? 4. In which way can we get that goal? 5. What are security controls aimed at? 6. How many functional areas of vulnerability are there? What are they?

 

Exercise 15. Match the names of vulnerability areas in the first column and their functions in the second one.

1. Identification and Authentication 1. to control the flow of data between and the use of resources by users, processes and objects
2. Access Control 2. to record exercising of rights to perform security-relevant actions
3. Accountability 3. to establish and verify the identity of the user or using process
4. Object Re-use 4. to insure security and data over communication links
5. Accuracy 5. to control reuse and scavenging of data objects
6. Reliability of Service 6. to insure correctness and consistency of security-relevant information

 

Exercise 16. Using words and word combinations of Exercise 15 make up six sentences according to the pattern:

… is / are intended to / for …

 




Поделиться с друзьями:


Дата добавления: 2015-01-03; Просмотров: 312; Нарушение авторских прав?; Мы поможем в написании вашей работы!


Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет



studopedia.su - Студопедия (2013 - 2024) год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! Последнее добавление




Генерация страницы за: 0.006 сек.