Get Started. It's Free
or sign up with your email address
System by Mind Map: System

1. Server security

1.1. OS installation

1.1.1. services removal

1.1.2. auth config

1.1.3. resources use

1.1.4. patches

1.1.5. security checks

1.1.6. security apps

1.1.6.1. IDS

1.1.6.1.1. Taffic analysis

1.1.6.1.2. records

1.1.6.1.3. tendences analysis

1.1.6.1.4. TYPES

1.1.6.1.5. THROUGH

1.2. Applications installation

1.2.1. secure installation

1.2.2. access control

1.2.3. resource limitations

1.2.4. security mechanisms

1.3. Keep installations secured

1.3.1. logs

1.3.2. backuo

1.3.3. failures recovery

1.3.4. periodic checks

1.4. PRINCIPLES

1.4.1. simplicity

1.4.2. failures resistance

1.4.3. mediations

1.4.4. open design

1.4.5. isolation

1.4.5.1. privileges

1.4.5.2. prod environments

1.4.6. phycologic acceptance

1.4.7. multiple mechanisms

1.4.8. high cost to break

1.4.9. records

1.4.10. minimal components installed

1.4.11. patches

1.4.12. server redundance

1.4.13. authentication

1.4.14. check default options

1.4.15. responsibilities assignment

1.4.16. traffic control

1.5. PROBLEMS

1.5.1. undue access

1.5.2. DoS

1.5.3. information change

1.5.4. communication interceted

1.5.5. resources attacks

1.6. MEASURES

1.6.1. system characterization

1.6.2. threats

1.6.3. vulnerabilities

1.6.4. control

1.6.5. determination

1.6.6. impact

1.6.7. risk

1.6.8. recommendations

1.6.9. documentation

2. Archives

2.1. 1+ blocks

2.1.1. - fragmentation

2.1.2. request queue

2.1.3. + lift algorithm

2.1.4. multivolume

2.2. Security

2.2.1. Integrity

2.2.1.1. failures

2.2.1.1.1. disc

2.2.1.1.2. transactions

2.2.1.2. concurrent access

2.2.1.2.1. + system

2.2.1.3. malware

2.2.1.3.1. - buffer overflow

2.2.1.3.2. trojan

2.2.1.3.3. virus

2.2.2. Access control

2.2.2.1. authentication

2.2.2.1.1. PIN

2.2.2.1.2. pass

2.2.2.1.3. MAC

2.2.2.1.4. certificates

2.2.2.2. METHODS

2.2.2.2.1. Particular

2.2.2.2.2. Capabilities

2.2.2.2.3. ACL

2.2.3. PROTECTION

2.2.3.1. problem/slave

2.2.3.1.1. no privileged instructions

2.2.3.1.2. user

2.2.3.1.3. need privileged interruptions

2.2.3.2. supervisor/master

2.2.3.2.1. all privileges

2.2.3.2.2. system

2.2.3.2.3. + through OS

2.3. hierarchy

2.3.1. directory

2.3.1.1. 1+ devices

2.3.2. subdirectory

2.3.2.1. FAT - file

2.3.3. descriptors

2.3.3.1. FAT - subdirectory

2.3.3.2. Unix - table

2.3.3.3. In memory

3. table

3.1. partition to use

3.1.1. archive system

4. Virutal Machines

4.1. SGMV

4.1.1. Virtual memory

4.1.2. interpret sensitive instructions

4.2. JVM

4.2.1. Emulation

4.3. direct access

4.4. problem/slave

5. boot

5.1. system startup