Xem mẫu

Appendix C: Designing an Operations Framework to Manage Security Contents Overview 1 Lesson: Analyzing Risks to Ongoing Network Operations 2 Lesson: Designing a Framework for Ongoing Network Operations 6 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.  2002 Microsoft Corporation. All rights reserved. Microsoft, MS-DOS, Windows, Windows NT, Active Directory, ActiveX, BizTalk, PowerPoint, Visio, and Windows Media are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Appendix C: Designing an Operations Framework to Manage Security 1 Overview *****************************ILLEGAL FOR NON-TRAINER USE****************************** Introduction Objectives In this appendix, you will learn how to help ensure the management of ongoing security operations. To maintain the security of network operations, you must ensure proper management of the security design and design a change management framework to meet changing security needs and conditions. After completing this appendix, you will be able to: ④ Analyze risks to ongoing network operations. ④ Design a framework for ensuring secure network operations. 2 Appendix C: Designing an Operations Framework to Manage Security Lesson: Analyzing Risks to Ongoing Network Operations *****************************ILLEGAL FOR NON-TRAINER USE****************************** Introduction Lesson objectives Ongoing network operations are the everyday administration and management of your network. The actions performed to maintain the network may conflict with security policy or introduce vulnerabilities that your design did not anticipate. After completing this lesson, you will be able to: ④ Explain the concept of ongoing management of network operations. ④ Explain why securing network operations is important. ④ List common vulnerabilities to network operations. Appendix C: Designing an Operations Framework to Manage Security 3 Management of Ongoing Network Operations *****************************ILLEGAL FOR NON-TRAINER USE****************************** Key points Additional reading The Microsoft Operations Framework (MOF) is a comprehensive suite of operational guidance materials that encompass people, processes, and technologies. MOF provides a framework for effectively managing production systems within information technology (IT) environments, including network security. For more information on MOF, see the white paper, Process Model for Operations, under Additional Reading on the Web page on the Student Materials CD. ... - tailieumienphi.vn
nguon tai.lieu . vn