⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 computer security.txt

📁 1000 HOWTOs for various needs [WINDOWS]
💻 TXT
📖 第 1 页 / 共 5 页
字号:
                                 - 25 -10.  SUMMARY:  WHAT CAN YOU DO?There are many aspects to computer security, none of which are totallywithin your control, but all of which are reasonably within your control. One of the major methods of getting control is to establish anenforceable security policy AND a disaster recovery plan.  However, it'salmost impossible to establish a plan unless you first know what therisks are.WHEN YOU GO BACK TO YOUR OFFICETry putting some staff into two teams: "hackers" and "police" (or callthem Blue Jays and Cardinals if you find that offensive).  The role ofthe hackers is to try to dream up all the things they could get from ordo to the company (or to a department) by breaking computer security. The role of the police is to respond with defenses.    Then switch roles.List all the ideas, no matter how "far out" they seem, then use this forthe basis of risk analysis and disaster recovery planning.  The only ruleto this game is that no idea is initially rejected.Now that you have some idea of the value of your data and the risks it isunder, you can begin to work on a "Computer Security Policy" and a"Disaster Recovery Plan."  While many suggestions have been made on theprevious pages, recognize that not all risks/solutions apply to allorganizations:  you have to make some judgement calls based on yourassessment of the risk.  The judgement is based on how much loss you can comfortably sustain, yet remain in business.  The level of securityprotection you require may not always be the same.  It may vary with thevalue of the hardware, software or data under consideration;  thesecurity level, therefore, might be stated as "minimal," "discretionary,""mandatory," or "verified."  The point is, as long as it's beenconsidered, you're closer to having a good security system than if youhave no policy or a policy that's based on guesswork.You may find, after working on this for a while, that you may wish todevelop a separate policy for the selection or development, change,testing and implementation of software.  This might be stated as simplyas, "No system shall be acquired, developed, changed or implementedwithout the prior approval of the Systems Steering Group."  This mightalso go on to cover documentation; e.g., "Documentation must be completefor all systems prior to implementation, and must include sections onfiles used, access controls, security considerations and controls(etc.)."Some further points for consideration are included in the next section.                                 - 26 -11.  COMPUTER SECURITY POLICY:  POINTS FOR CONSIDERATIONAny policy on computer security must be based on the premise thatinformation is a valuable asset of the company, just like its premises,equipment, raw materials, inventory and so on.  More than one company hasgone under because they lost their accounts receivable data in a fire,flood, or from a simple hard disk failure.  The value of your data shouldbe subjected to a risk analysis, and all identifiable risks assessed.  Itis not until you identify the risks that you can plan for a disasterrecovery.Your policy might include some of the many things addressed previously inthis paper:  e.g., storing data only on removable media (diskettes ortapes), limiting access to bulletin boards, establishing passwordcontrols, rules on physical security, use of immunization software, etc. There are, however, some other specific points not previously discussed:RESPONSIBILITYRecognize that security is a management issue, not a technologicalissue, and that setting policy is the responsibility of seniormanagement.  They must be 'on board' and understand why a security policyis needed to make it sensible and effective, and they must give overtsupport.Someone should be in charge of computer and network security.  Withoutsomeone in charge, important security tasks may not get done.  The dutiesof the security manager would include responsibility for limiting accessto the network, securing the information that passes over it, overseeingpassword systems, and installing security packages that protect computersfrom illegal tampering once a user is on the network.  Other duties mightinclude analyzing the network for security weaknesses and helping usersunderstand the security strengths and weaknesses of the network.The amount of time required of the system security specialist may dependon the size of the organization, and on the number and complexity of thesystems in use or planned.Having one person in charge is probably the ideal security arrangement.The security specialist can become aware of all of the issues affectingcomputer/network security, can schedule and establish priority foractions, and can ensure that the actions are taken.This position in the organization requires some authority and autonomy. For instance, security is compromised if the boss shares his/herpassword.  The  security specialist needs to be able to change the boss'spassword if this happens, and gently but firmly discuss the problemswhich could result. In many organizations, putting two or more people in charge of somethingdiffuses responsibility.  Each can think that some security concern wasthe responsibility of the other.  If two individuals are charged withnetwork security, be certain that they work well together, communicate                                 - 27 -well, and will each put in their fair share of the analysis and work thatis required for security.In some organizations, a "communications manager" is responsible forlimiting access to the network (with dialback modems and encryptiondevices), while the network manager maintains password systems andinstalls security software. If someone is in charge of network security and you don't know about it,then they haven't been very  obvious about it.  They need not be.  But ifit is evident to you that security is lacking, then perhaps the issue ofresponsibility should be examined (or re-examined).BACKUPSThose who are most zealous about backups are those who've been affectedin the past by a loss of data.  If backups are performed every day, yourcomputer or network is probably in good shape when the hard disk or fileserver goes to heaven.  You will want to verify that this is the case,since most organizations (and individuals) put this off... and off...until it's too late.Backing a system up once a week is not enough, unless the system israrely used.  If your last backup was a week ago, and your hard disk orthe hard disk in the file server crashes, all users of the network havelost one week's work.This cost is enormous.  If you have 10 users who have lost 30 hours ofwork each, if each user is paid $20/hour, and overhead is 100%, then youhave just lost 10 x 30 x 20 x 2 = $12,000.  If you assume that backuptakes one $20 hour with a tape drive, you could back the system up 600times for $12,000. That's nearly three years, if backups are done fivetimes a week.  Many hard disks will not run continuously for three years. Even if you're a 'stand alone' computer user, your time is valuable.  Youmight consider a policy that, if recovery covers a period of more than'x' days, it must be done on the employee's own time, and all deadlinesmust be met - tough, but it get's the point across!Irregular backups are a sign that backup is not taken as seriously as itshould be.  It is probably wisest to do the arithmetic, comparing thecosts of backup with the costs of losing work for multiple users.  Thecost comparison in the commentary on the second answer doesn't evenconsider the possibility of losing irreplaceable files, such as thosecontaining new accounts receivable entries or new prospects.Since file backup is a "private" activity, not knowing how often itoccurs  does not mean that it does not occur.  But if you have a securityconcern,  you should find out what the correct answer is.  After all, ifyou use the network, and it is not backed up frequently, it is your workthat is lost when the hard disk in the server crashes.                                 - 28 -BEWARE:  backing up is NOT enough!  You MUST periodically run yourrecovery procedure .... how else will you know it will work when you needit most?PURCHASINGThe policy should state the controls in place for purchase of bothhardware and software, and it should be consistent and centralized. Unless you've seen what some software can do to destroy security, or howdifficult it is to interconnect different equipment, this might seem todestroy some autonomous activities in your organization.  Autonomy bedarned, it's the company that's paying the bill.MAINTENANCE AGREEMENTSAll warranty registrations must be mailed to the manufacturer, andrecords kept of purchase dates, expiry dates and repairs made under thewarranty.  Keeping accurate records has substantiated the completereplacement of more than one machine.SOFTWARE LOADINGThe checking, copying and loading of software should be theresponsibility of one person or department.  The 'penalty' for loadingillegal/unauthorized software can range from a note in the personnel fileto dismissal, depending on the organization.  The opposite, copying theorganization's software for loading in another location, should also becovered in the policy, because the company (as the registered owner)could be party to a lawsuit without the ability to plead ignorance.EMPLOYMENT TERMINATIONIn several organizations, when a person submits their resignation, theiraccess to the computer system is immediately withdrawn.  This, of course,requires a close liaison with the personnel department in largeorganizations.  Many of these companies feel it's worth the salary costto have the person leave the premises immediately (escorted), and simplypay out their notice period.  If your company adopts such a policy, itshould be made very clear that it is not an indication of trust in theperson, but simply a means to reduce risk to the valuable resources ofhardware, software and data.  It must be administered consistently andequitably to avoid problems.    There are problems with such a policy,not the least of which could be someone who gives a very lengthy noticeperiod simply because they're aware of the policy - but you couldtransfer them to a clerical job for the interim (like the mail room) orto maintenance staff (washroom detail).- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -                                    - 29 -12.  TO RUN SCAN (Virus detection software included on this diskette)SCAN looks for 42 viruses in software files, but not in data files.  Iknow it works on Jerusalem-B because I used SCAN to detect that virus ona machine at work.  This is NOT the latest version of SCAN, but thenagain, you're not likely to have the latest viruses (I hope).If you want to print the documentation, type:  COPY A:SCAN.DOC PRNIf you want to run SCAN, just type:     A:SCAN [drive identifier]                                 e.g.,  A:SCAN C:An article from the Washington Post, January 14, 1990, on ComputerViruses was added to the diskette after this paper was written.          To read this article, key  TYPE A:ARTICLE|MORE                To print the article, key  COPY A:ARTICLE PRN- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -If you have found this presentation useful, either by attending or byreading or using the information on this diskette, then I am rewarded. If you found it useful, please feel free to copy this diskette or itscontents and share it with others - I would ask that you don't changeanything, though.  (It was virus free at the time I made the originaldiskette - but if you trust that statement, you might just have made yourfirst mistake.)  If you'd like to make suggestions that would improve the information onthis diskette, I would be very happy to hear from you.  I'd also like tohear from you if you wish to discuss security issues, get a virusinfection or hit by a Trojan Horse, or even just to comment on thecontents of this paper.  My address and phone number are on the firstpage of this document.If you would like to join the National Computer Security Association, a'form' for application is on the next page.  They provide benefits suchas a Virus Self-Defense Kit that's more sophisticated than the softwareon this diskette, newsletters, a virus-free bulletin board with hundredsof security-related programs, discounts on software, books andconferences, and advice if you run into trouble.Happy (and safe) computing!                         E. A. (Liz) BedwellNational Computer AssociationSuite 3094401-A Connecticut Ave. NWWashington, DCUSA   20008              Phone:    (202) 364-8252[ ]  I wish to join NCSA.  Cheque enclosed for $45.00 (US funds)[ ]  I wish to join NCSA.  Please bill me for $45.00 (US funds)Name:          _____________________________________________________Organization:  _____________________________________________________Address:       _____________________________________________________               _____________________________________________________City, Prov.:   ____________________________ Postal Code ____________Phone (with area code):  ___________________________________________Title or Position, or interest in computer security:               _____________________________________________________               _____________________________________________________.Downloaded From P-80 International Information Systems 304-744-2253

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -