2017ÄêÈ«¹úְҵԺУ¼¼ÄÜ´óÈü¸ßÖ°×é ¡°ÐÅÏ¢°²È«¹ÜÀíÓëÆÀ¹À¡±ÈüÏî¹æ³Ì
Ò»¡¢ÈüÏîÃû³Æ
ÈüÏî±àºÅ£ºGZ-2017028 ÈüÏîÃû³Æ£ºÐÅÏ¢°²È«¹ÜÀíÓëÆÀ¹À
Ó¢Óï·Ò룺Information Security Management and Evaluation
ÈüÏî×é±ð£º¸ßÖ°
ÈüÏî¹éÊô²úÒµ£ºµç×ÓÐÅÏ¢²úÒµ ¶þ¡¢¾ºÈüÄ¿µÄ
ͨ¹ýÈüÏî¼ìÑé²ÎÈüÑ¡ÊÖÍøÂç×齨¡¢°²È«¼Ü¹¹ºÍÍøÂ簲ȫÔËά¹Ü¿ØµÈ·½ÃæµÄ¼¼Êõ¼¼ÄÜ£¬¼ìÑé²ÎÈü¶Ó×éÖ¯ºÍÍŶÓÐ×÷µÈ×ÛºÏÖ°ÒµËØÑø£¬ÅàÑøÑ§Éú´´ÐÂÄÜÁ¦ºÍʵ¼ù¶¯ÊÖÄÜÁ¦£¬ÌáÉýѧÉúÖ°ÒµÄÜÁ¦ºÍ¾ÍÒµ¾ºÕùÁ¦¡£Í¨¹ý´óÈüÒýÁìרҵ½Ìѧ¸Ä¸ï£¬·á¸»ÍêÉÆÑ§Ï°ÁìÓò¿Î³Ì½¨É裬ʹÈ˲ÅÅàÑø¸üÌù½ü¸Úλʵ¼Ê£¬ÊµÏÖÒÔÈü´Ù½Ì¡¢ÒÔÈü´Ùѧ¡¢ÒÔÈü´Ù¸ÄµÄ²ú½Ì½áºÏ¸ñ¾Ö£¬ÌáÉýרҵÅàÑø·þÎñÉç»áºÍÐÐÒµ·¢Õ¹µÄÄÜÁ¦£¬Îª¹ú¼ÒÐÅÏ¢°²È«ÐÐÒµÅàÑøÑ¡°Î¼¼Êõ¼¼ÄÜÐÍÈ˲š£ Èý¡¢¾ºÈüÈÝ
ÖØµã¿¼ºË²ÎÈüÑ¡ÊÖ°²È«ÍøÂç×齨¡¢ÍøÂçϵͳ°²È«²ßÂÔ²¿Êð¡¢ÐÅÏ¢±£»¤¡¢ÍøÂ簲ȫÔËά¹ÜÀíµÄ×ÛºÏʵ¼ùÄÜÁ¦£¬¾ßÌå°üÀ¨£º
1. ²ÎÈüÑ¡ÊÖÄܹ»¸ù¾Ý´óÈüÌṩµÄÈüÏîÒªÇó£¬Éè¼ÆÐÅÏ¢°²È«·À»¤
·½°¸£¬²¢ÇÒÄܹ»ÌṩÏêϸµÄÐÅÏ¢°²È«·À»¤Éè±¸ÍØÆËͼ¡£
2. ²ÎÈüÑ¡ÊÖÄܹ»¸ù¾ÝÒµÎñÐèÇóºÍʵ¼ÊµÄ¹¤³ÌÓ¦Óû·¾³£¬ÊµÏÖÍøÂçÉ豸¡¢°²È«É豸¡¢·þÎñÆ÷µÄÁ¬½Ó£¬Í¨¹ýµ÷ÊÔ£¬ÊµÏÖÉ豸»¥Áª»¥Í¨¡£
3. ²ÎÈüÑ¡ÊÖÄܹ»ÔÚÈüÏîÌṩµÄÍøÂçÉ豸¼°·þÎñÆ÷ÉÏÅäÖø÷ÖÖÐÒéºÍ·þÎñ£¬ÊµÏÖÍøÂçϵͳµÄÔËÐУ¬²¢¸ù¾ÝÍøÂçÒµÎñÐèÇóÅäÖø÷ÖÖ°²È«²ßÂÔ£¬ÒÔÂú×ãÓ¦ÓÃÐèÇó¡£
4. ²ÎÈüÑ¡ÊÖÄܹ»¸ù¾ÝÍøÂçʵ¼ÊÔËÐÐÖÐÃæÁٵݲȫÍþв£¬Ö¸¶¨°²È«²ßÂÔ²¢²¿Êðʵʩ£¬·À²¢½â¾öÍøÂç¶ñÒâÈëÇֺ͹¥»÷ÐÐΪ¡£
5. ²ÎÈüÑ¡ÊÖÄܹ»°´ÕÕÒªÇó׼ȷ׫д¹¤×÷×ܽᡣ
6. ÒÔ²ÎÈü¶ÓΪµ¥Î»½øÐзÖ×é¶Ô¿¹£¬ÔÚ·À»¤±¾²ÎÈü¶Ó·þÎñÆ÷µÄͬʱ£¬ÉøÍ¸ÆäËû²ÎÈü¶ÓµÄ·þÎñÆ÷£¬·þÎñÆ÷±»ÉøÍ¸µÄ²ÎÈü¶ÓÁ¢¼´ÏÂÏߣ¬¸Ã²ÎÈü¶Ó±ÈÈü½áÊø£¬Ñ¡ÊÖ³ö³¡¡£±ÈÈü½á¹ûͨ¹ý´óÆÁÄ»µÈÐÎʽÔÚÐÝÏ¢ÇøÊµÊ±Õ¹Ê¾¡£
7. ¸÷¾ºÈü½×¶ÎÖØµãÈÝÈçÏ£º
ÐòºÅ ÈÝÄ£¿é ÍøÂçÆ½Ì¨´î½¨ ¾ßÌåÈÝ ÍøÂç¹æ»® »ù´¡ÍøÂç ˵Ã÷ VLSM¡¢CIDRµÈ£» VLAN¡¢WLAN¡¢STP¡¢SVI¡¢RIPV2¡¢OSPFµÈ£» ±£»¤ÍøÂçÓ¦Óð²È«£¬ÊµÏÖ·ÀDOS¡¢DDOS¹¥»÷¡¢ÊµÏÖ°ü¹ýÂË¡¢Ó¦Óòã´úÀí¡¢×´Ì¬»¯°ü¹ýÂË¡¢URL¹ýÂË¡¢»ùÓÚIP¡¢ÐÒé¡¢Ó¦Óá¢Óû§½ÇÉ«¡¢×Ô¶¨ÒåÊý¾ÝÁ÷ºÍʱ¼äµÈ·½Ê½µÄ´ø¿í¿ØÖÆ£¬QOS²ßÂԵȣ» µÚÒ»½×¶Î ·ÃÎÊ¿ØÖÆ ÍøÂ簲ȫÉ豸ÅäÖÃÓë·À»¤ ÃÜÂëѧ»ù±¾ÀíÂÛ L2L IPSec VPN ÃÜÂëѧºÍVPN GRE Over IPSec L2TP Over IPSec IKE£ºPSK IKE£ºPKI SSL VPNµÈ£» Êý¾Ý·ÖÎö Äܹ»ÀûÓÃÈÕ־ϵͳ¶ÔÍøÂçµÄÊý¾Ý½øÐÐÈÕÖ¾·ÖÎö£¬°Ñ¿ØÍøÂ簲ȫµÈ£» MACÉøÍ¸²âÊÔ¼°Æä¼Ó¹Ì DHCPÉøÍ¸²âÊÔ¼°Æä¼Ó¹Ì ARPÉøÍ¸²âÊÔ¼°Æä¼Ó¹Ì ÍøÂçÉøÍ¸²âÊÔSTPÉøÍ¸²âÊÔ¼°Æä¼Ó¹Ì ¼°Æä¼Ó¹Ì¼¼Êõ VLANÉøÍ¸²âÊÔ¼°Æä¼Ó¹Ì ·ÓÉÐÒé(RIPV2¡¢OSPF)ÉøÍ¸²âÊÔ¼°Æä¼Ó¹Ì ²Ù×÷ÏµÍ³ÉøÍ¸Windows¡¢Linux²Ù×÷ϵͳ·þÎñ»º³å²âÊÔ¼°Æä¼Ó¹Ì ÇøÒç³öÉøÍ¸²âÊÔ¼°Æä¼Ó¹Ì SQL Injection£¨SQL×¢È룩©¶´ÉøÍ¸²âÊÔ¼°Æä°²È«±à³Ì Command Injection£¨ÃüÁî×¢È룩©¶´ÉøÍ¸²âÊÔ¼°Æä°²È«±à³Ì File Upload£¨ÎļþÉÏ´«£©Â©¶´ÉøÍ¸²âÊÔ¼°Æä°²È«±à³Ì Directory Traversing£¨Ä¿Â¼´©Ô½£©Â©¶´ÉøÍ¸²âÊÔ¼°Æä°²È«±à³Ì XSS£¨Cross Site Script£©Â©¶´ÉøÍ¸²âÊÔ¼°Æä°²È«±à³Ì CSRF£¨Cross Site Request Forgeries£©Â©¶´ÉøÍ¸²âÊÔ¼°Æä°²È«±à³Ì Cookie Stole£¨CookieµÁÓã©Â©¶´ÉøÍ¸²âÊÔ¼°Æä°²È«±à³Ì Session Hijacking£¨»á»°½Ù³Ö£©Â©¶´ÉøÍ¸²âÊÔ¼°Æä°²È«±à³Ì ÅäÖÃWAF£¨WebÓ¦Ó÷À»ðǽ£©¼Ó¹ÌWebÓ¦Óõȣ» ÍøÂçÐÒ鰲ȫ¹¥·À Windows/Linux²Ù×÷ϵͳ°²È«¹¥·À WebÓ¦ÓÃ/Êý¾Ý¿â°²È«¹¥·ÀµÈ£» µÚ¶þ½×¶Î ϵͳ°²È«¹¥·À¼°ÔËά°²È«¹Ü¿Ø WebÓ¦ÓúÍÊý¾Ý¿âÉøÍ¸²âÊÔ¼°Æä¼Ó¹Ì¼¼Êõ µÚÈý½×¶Î ·Ö×é¶Ô¿¹ ²ÎÈü¶ÓÖ®¼ä½øÐжԿ¹ÑÝÁ·
8.¾ºÈü·ÖÖµÈ¨ÖØºÍʱ¼ä·Ö²¼
ÐòºÅ µÚÒ»½×¶Î È¨ÖØ30% µÚ¶þ½×¶Î È¨ÖØ30% µÚÈý½×¶Î È¨ÖØ40% ÍøÂçÆ½Ì¨´î½¨ È¨ÖØ9% ÍøÂ簲ȫÉ豸ÅäÖÃÓë·À»¤ È¨ÖØ21% ϵͳ°²È«¹¥·À¼°ÔËά°²È«¹Ü¿Ø È¨ÖØ30% ·Ö×é¶Ô¿¹ È¨ÖØ40% 60·ÖÖÓ 300·ÖÖÓ ÈÝÄ£¿é ¾ºÈüʱ¼ä ËÄ¡¢¾ºÈü·½Ê½
1.±¾ÈüÏîΪÍÅÌåÈü£¬ÒÔԺУΪµ¥Î»×é¶Ó²ÎÈü£¬²»µÃ¿çУ×é¶Ó£¬Í¬Ò»Ñ§Ð£ÏàͬÏîÄ¿±¨Ãû²ÎÈü¶Ó²»³¬¹ý1Ö§¡£Ã¿Ö§²ÎÈü¶ÓÓÉ3ÃûÑ¡ÊÖ£¨Éè¶Ó³¤1Ãû£©ºÍ²»³¬¹ý2ÃûÖ¸µ¼½Ìʦ×é³É¡£
2.ÈüÏîÄâÑûÇë¡¢°ÄÃÅ¡¢µÈµØÇøºÍ¾³Íâ´ú±í¶Ó²ÎÈü»ò¹ÛĦ½»Á÷£¬µ«²ÎÈü³É¼¨²»¼ÆÈë×ÜÌåÅÅÃû¡£
Îå¡¢¾ºÈüÁ÷³Ì
£¨Ò»£©¾ºÈüÁ÷³Ìͼ
£¨¶þ£©¾ºÈüʱ¼ä±í
±ÈÈüÏÞ¶¨ÔÚ1Ìì½øÐУ¬±ÈÈü³¡´ÎΪ1³¡£¬ÈüÏÈüʱ¼äΪ6Сʱ£¬Ê±¼äΪ9:00-15:00£¬¾ßÌå°²ÅÅÈçÏ£º
ÈÕÆÚ ¾ºÈü20:00ǰ ǰ2ÈÕ ¾ºÈü09:00-12:00 ²ÎÈü¶Ó±¨µ½£¬°²ÅÅסËÞ£¬¹¤×÷ÈËÔ±¡¢²ÎסËÞ¾Æµê ²ÃÅС¢Öٲᢼල±¨µ½ ¹¤×÷ÈËÔ± סË޾Ƶê ʱ¼ä ÊÂÏî ²Î¼ÓÈËÔ± µØµã
Ïà¹ØÍÆ¼ö£º