首页> 外文期刊>NCSL Newsletter >IT PROGRAM HOPES TO FOSTER BETTER SECURITY CHECKLISTS
【24h】

IT PROGRAM HOPES TO FOSTER BETTER SECURITY CHECKLISTS

机译:IT计划希望获得更好的安全检查清单

获取原文
获取原文并翻译 | 示例
       

摘要

Widespread electronic attacks on computer systems have become commonplace with threats ranging from remotely launched attacks on network services to malicious code spread through e-mails. To make matters worse, vulnerabilities in IT products such as operating systems are discovered almost daily. But, securing today's complex systems and products can be very complicated, arduous and time-consuming for even the most experienced system administrator. While the solutions to IT security are complex, one basic, yet effective tool is the security configuration checklist, sometimes called a lockdown or hardening guide. Basically, a checklist is a series of instructions for configuring an information technology (IT) product to a baseline or benchmark level of security.
机译:对计算机系统的广泛电子攻击已变得司空见惯,其威胁范围包括从远程启动的网络服务攻击到通过电子邮件传播的恶意代码。更糟糕的是,几乎每天都会发现IT产品(如操作系统)中的漏洞。但是,即使对于最有经验的系统管理员来说,保护当今复杂的系统和产品也可能非常复杂,艰巨且耗时。尽管IT安全解决方案很复杂,但是安全配置核对表是一种基本而有效的工具,有时也称为锁定或强化指南。基本上,清单是用于将信息技术(IT)产品配置为安全性的基准或基准级别的一系列说明。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号