Here's the recent articles submitted by yang ws
Articles By yang ws
Designing Security For Iis
Submitted as: unknownmem
Many design exercises are paper-based; however, to understand the technical capabilities that a design can incorporate, you should have some hands-on experience with products(read
entire article)
View : 259 Times
Category : Education
Guidelines For Enabling Only Needed Iis Components And Services
Submitted as: unknownmem
Essential to the design of a Web server is determining which services and components are needed for the applications that will be running on the Web server and where these services or components can themselves be restricted.(read
entire article)
View : 287 Times
Category : Education
The Process: Designing Security For Iis
Submitted as: unknownmem
One way to enforce this process is to design a security baseline for IIS that meets business needs and then require that any change to that baseline meet stringent requirements for security and business needs. To design security for IIS that meets business needs, follow these steps:(read
entire article)
View : 269 Times
Category : System/Network Administration
Guidelines For Reviewing Security Policies, Processes, And Procedures
Submitted as: unknownmem
In addition to Web site access logging, changes should be logged. Monitoring changes to ensure only authorized changes have been made and to determine whether the security analysis was correct will help discover potential problems before they become problems and discover potential attacks.(read
entire article)
View : 253 Times
Category : Computers
Guidelines For Controlling Access To Web Servers, Web Sites, Applications, And Server Resources
Submitted as: unknownmem
Wireless users, for example, can be given IP addresses from a range that is blocked from accessing certain internal Web sites. Visitors and intruders might gain access to the network, but access to the internal Web site is prevented.(read
entire article)
View : 231 Times
Category : Computers
How Data In Transit Can Be Protected
Submitted as: unknownmem
For any specific Web site or Web application, running processes require access to Web pages, scripts, and other resources on the Web server and on other servers, such as databases and file servers.(read
entire article)
View : 255 Times
Category : Computers
How Ssl Processing Works
Submitted as: unknownmem
In addition to producing SSL server certificates for Web sites, an organization's CA can be used to produce client certificates and, where highly sensitive information must be accessed or must traverse the network, client certificates can be required by the SSL-protected Web site.(read
entire article)
View : 242 Times
Category : Education
How Ipsec Is Used To Protect Data
Submitted as: unknownmem
In the second figure, data requested from the SQL server is returned. Both the request and response are encrypted. In the remote administration example, the data passes through the firewall because appropriate ports are configured.(read
entire article)
View : 246 Times
Category : Computers
How A Remote Server Is Used To Protect Data
Submitted as: unknownmem
An application pool identity is a user account that is the process identity for the worker processes that service an application pool.
Each application pool can and should have a separate application pool identity.(read
entire article)
View : 237 Times
Category : Computers
Guidelines For Designing Secure Remote Administration
Submitted as: unknownmem
Terminal services sessions are encrypted, and the user using them is authenticated. In addition,unless the IIS computer has the terminal service installed and is configured to allow other users and groups, only Administrators can connect and use the service.(read
entire article)
View : 244 Times
Category : Education