시작하기. 무료입니다
또는 회원 가입 e메일 주소
System 저자: Mind Map: System

1. Server security

1.1. OS installation

1.1.1. services removal

1.1.2. auth config

1.1.3. resources use

1.1.4. patches

1.1.5. security checks

1.1.6. security apps

1.1.6.1. IDS

1.1.6.1.1. Taffic analysis

1.1.6.1.2. records

1.1.6.1.3. tendences analysis

1.1.6.1.4. TYPES

1.1.6.1.5. THROUGH

1.2. Applications installation

1.2.1. secure installation

1.2.2. access control

1.2.3. resource limitations

1.2.4. security mechanisms

1.3. Keep installations secured

1.3.1. logs

1.3.2. backuo

1.3.3. failures recovery

1.3.4. periodic checks

1.4. PRINCIPLES

1.4.1. simplicity

1.4.2. failures resistance

1.4.3. mediations

1.4.4. open design

1.4.5. isolation

1.4.5.1. privileges

1.4.5.2. prod environments

1.4.6. phycologic acceptance

1.4.7. multiple mechanisms

1.4.8. high cost to break

1.4.9. records

1.4.10. minimal components installed

1.4.11. patches

1.4.12. server redundance

1.4.13. authentication

1.4.14. check default options

1.4.15. responsibilities assignment

1.4.16. traffic control

1.5. PROBLEMS

1.5.1. undue access

1.5.2. DoS

1.5.3. information change

1.5.4. communication interceted

1.5.5. resources attacks

1.6. MEASURES

1.6.1. system characterization

1.6.2. threats

1.6.3. vulnerabilities

1.6.4. control

1.6.5. determination

1.6.6. impact

1.6.7. risk

1.6.8. recommendations

1.6.9. documentation

2. Archives

2.1. 1+ blocks

2.1.1. - fragmentation

2.1.2. request queue

2.1.3. + lift algorithm

2.1.4. multivolume

2.2. Security

2.2.1. Integrity

2.2.1.1. failures

2.2.1.1.1. disc

2.2.1.1.2. transactions

2.2.1.2. concurrent access

2.2.1.2.1. + system

2.2.1.3. malware

2.2.1.3.1. - buffer overflow

2.2.1.3.2. trojan

2.2.1.3.3. virus

2.2.2. Access control

2.2.2.1. authentication

2.2.2.1.1. PIN

2.2.2.1.2. pass

2.2.2.1.3. MAC

2.2.2.1.4. certificates

2.2.2.2. METHODS

2.2.2.2.1. Particular

2.2.2.2.2. Capabilities

2.2.2.2.3. ACL

2.2.3. PROTECTION

2.2.3.1. problem/slave

2.2.3.1.1. no privileged instructions

2.2.3.1.2. user

2.2.3.1.3. need privileged interruptions

2.2.3.2. supervisor/master

2.2.3.2.1. all privileges

2.2.3.2.2. system

2.2.3.2.3. + through OS

2.3. hierarchy

2.3.1. directory

2.3.1.1. 1+ devices

2.3.2. subdirectory

2.3.2.1. FAT - file

2.3.3. descriptors

2.3.3.1. FAT - subdirectory

2.3.3.2. Unix - table

2.3.3.3. In memory

3. table

3.1. partition to use

3.1.1. archive system

4. Virutal Machines

4.1. SGMV

4.1.1. Virtual memory

4.1.2. interpret sensitive instructions

4.2. JVM

4.2.1. Emulation

4.3. direct access

4.4. problem/slave

5. boot

5.1. system startup