经典PPT素材库合集.ppt

上传人:小飞机 文档编号:6598598 上传时间:2023-11-16 格式:PPT 页数:73 大小:7.67MB
返回 下载 相关 举报
经典PPT素材库合集.ppt_第1页
第1页 / 共73页
经典PPT素材库合集.ppt_第2页
第2页 / 共73页
经典PPT素材库合集.ppt_第3页
第3页 / 共73页
经典PPT素材库合集.ppt_第4页
第4页 / 共73页
经典PPT素材库合集.ppt_第5页
第5页 / 共73页
点击查看更多>>
资源描述

《经典PPT素材库合集.ppt》由会员分享,可在线阅读,更多相关《经典PPT素材库合集.ppt(73页珍藏版)》请在三一办公上搜索。

1、,第一篇 区块篇,Integrated phone and PDAPrimarily data viewingInteroperability with Outlook and Exchange.NET Compact FrameworkASP.NET mobile controls,Mobile Device Solutions,Complex document authoring,editing and readingKeyboard centric at the deskKeyboard and mouse input methodsFull.NET framework availabl

2、eCentrino Solutions,Windows Mobile,Windows XP,Complex document authoring,editing and active readingNote taking and ink annotating Keyboard centric at the desk,pen and keyboard away from the deskKeyboard,mouse plus pen,ink,and speech input methodsFull.NET framework preinstalledPen,ink,handwriting and

3、 speech recognition APIsCentrino Solutions,View and some data entryIntegrated PDA with phoneInteroperability with Office,Exchange and SQL Server.NET Compact FrameworkASP.NET mobile controlsIntel Xscale Solutions,Windows CE,One-way networkInformation consumption,Smart Personal Objects,Smartphone,Pock

4、et PC and Pocket PC Phone,Notebook PC,Tablet PC,Network Defense,Health checkupIT checks“health”of clientNetwork Access ControlClients who pass get network accessClients who do not pass are fixed or blocked(aka“quarantined”)Health maintenanceQuarantined clients can be given access to resources to get

5、 healthy,From Home(VPN,Dial up),Returning Laptops,ConsultantsGuests,UnhealthyDesktops,Microsoft Business Solutions ERP Positioning,Guiding Principles,Productive,Integrated,Extensible,Capable,Short learning curveMinimal administrative overhead,Tools integrated tightlyAutomates common tasks,Customizab

6、le for your processIntegrates with 3rd party tools,Remotely accessibleRobust,secure,scalable,Staging Architecture,Data entry,Test,Application Center,Commerce Web,Commerce,Commerce Data,Commerce Web,Commerce,Commerce Data,Application,Center,Application,Center,Data,ACS Cluster,ACS Cluster,Cluster cont

7、roller,Cluster controller,Data,Live Communications Client Roadmap,LC 1.2 Client PlatformMultiparty IMP2P Voice and VideoMPOP GroupsRoamingSIP supportGPO policy management,LC 1.5 Client PlatformRoll up of QFEsMPOP AdditionsFederation/Archiving NotificationHA Additions,LC 2.0 Client PlatformNext gener

8、ation of RTC experiencesMore coming!,2003,2H04,Longhorn,Enterprise Deployment Update,Internet,Firewall,Firewall,Firewall,Runtime Servers,Corporate LAN Internal Servers,Crawl/Search,Load Balanced Web,Infrastructure Servers,Development Servers,Test Servers,Business Data Servers,Business Users,Database

9、 and Staging Servers,Staging Servers,Database Servers,Offline Servers,Indicates Staged Data Flow,Communicate and collaborate in a more secure mannerwithout sacrificing information worker productivity,Windows XP SP2Block virus or malicious code at the“point of entry”,At Risk,The SoftUnderbelly,Securi

10、ty Issues Today,1 Source:Forrester Research2 Source:Information Week,26 November 20013 Source:Netcraft summary4 Source:CERT,20035 Source:CSI/FBI Computer Crime and Security Survey6 Source:Computer Security Institute(CSI)Computer Crime and Security Survey 20027 Source:CERT,20028 Source:Gartner Group,

11、14B devices on the Internet by 2010135M remote users by 2005265%increase in dynamic Web sites3From 2000 to 2002 reported incidents rose from 21,756 to 82,0944Nearly 80 percent of 445 respondents surveyed said the Internet has become a frequent point of attack,up from 57 percent just four years ago5,

12、90%detected security breaches685%detected computer viruses695%of all breaches avoidable with an alternative configuration7Approximately 70 percent of all Web attacks occur at the application layer8,Application Layer Attacks,Identity TheftWeb Site DefacementUnauthorized AccessModification of Data,Log

13、s and RecordsTheft of Proprietary InformationService Disruption,Implications,Compliance:Sarbanes OxleyGramm Leach BlilelyUS Patriot ActHIPAAThe Privacy Act(CA)Basel 2(EU)Data Protection Act(EU)Litigation File Sharing Piracy HR Issues Shareholder Suits,Customer Impact,Types Of SRP Rules,Path RuleComp

14、ares path of file being run to an allowed path listUse when you have a folder with many files for the same applicationEssential in when SRPs are strict,Hash RuleCompares the MD5 or SHA1 hash of a file to the one attempted to be runUse when you want to allow/prohibit a certain version of a file from

15、being run,Certificate RuleChecks for digital signature on application(i.e.Authenticode)Use when you want to restrict both win32 applications and ActiveX content,Internet Zone RuleControls how Internet Zones can be accessedUse when in high security environments to control access to web applications,S

16、QL Server 2005 Themes,Supportability&Quality,Enterprise Enhancements,Unified&Flexible Administration,Patch Solutions,Prevention,Readiness,RecoveryEase of use,Patch InstallsPatch in integrated step,Integrated Database Services and Business IntelligenceFlexible install management,Add value to one-step

17、 Failover ClusteringExpanded scripting support,Traditional Firewalls,Wide open to advanced attacks,Performance versussecurity tradeoff,Limited capacityfor growth,Hard to manage,Code Red,NimdaSSL-based attacks,Security is complexIT is already overloaded,Bandwidth too expensiveToo many moving parts,No

18、t easily upgradeableDont scale with business,Choosing the Right Type of Assessment,Vulnerability Scanning Focuses on known weaknesses Of the three,requires the least expertise Generally easy to automate,Penetration TestingFocuses on known and unknown weaknessesRequires advanced technical expertiseCa

19、rries tremendous legal burden in certain countries/organizations,IT Security Audits Focuses on security policies and procedures Of the three,requires the most expertise When done right is the most effective type of assessment,Perimeter Security Evolution,Wide open to advanced attacks,Application-lev

20、el protection,Performance versussecurity tradeoff,Security and performance,Limited capacityfor growth,Extensibility and scalability,Hard to manage,Easier to use,The advanced application layer firewall,VPN and Web cache solution that enables customers to maximize IT investments by improving network s

21、ecurity and performance,Advanced protectionApplication layer security designed to protect Microsoft applications,Fast,secure accessEmpowers you to connect users to relevant information on yournetwork in a cost efficient manner,Ease of useEfficiently deploy,manage,and enable new usage scenarios,Intro

22、ducing:ISA Server 2004,Fast,secure accessEmpowers you to connect users to relevant info.on your network,ISA Server 2004 New FeaturesContinued commitment to integration,Enhancedarchitecture,High speed data transport Utilizes latest Windows and PC hardware SSL bridging unloads downstream servers,Web c

23、ache,Updated policy rules Serve content locally Pre-fetch content during low activity periods,Internet accesscontrol,User-and group-based Web usage policy Extensible by third parties,Comprehensiveauthentication,New support for RADIUS and RSA SecurID User-&group-based access policy Third party extens

24、ibility,System Service Accounts,Local Service and Network ServiceNo password to manageRuns with only slightly more permissions than Authenticated User Local Service cannot authenticate across the network,Network Service authenticates as the computer account,Local System No password to manage Bypasse

25、s security checksUser AccountsRun with less privilege than Local System Stores password as an LSA secretCan be complex to configure,Whats New With IPSec?,Management IP Security Monitor Command-line management with Netsh Logical addresses for local IP configuration,Security Stronger cryptographic mas

26、ter key(Diffie-Hellman)Computer startup security Persistent policy for enhanced security Ability to exclude the name of the CA from certificate requests Better default exemption handling,Interoperability IPSec functionality over network address translation(NAT)Improved IPSec integration with Network

27、 Load Balancing,ISA Server 2004 New FeaturesNew management tools and user interface,Multi-networkarchitecture,Unlimited network definitions and typesFirewall policy applied to all trafficPer network routing relationships,Network templatesand wizards,Wizard automates nwk routing relationshipsSupports

28、 5 common network topologiesEasily customized for sophisticated scenarios,Visual policy editor,Unified firewall/VPN policy w/one rule-baseDrag/drop editing w/scenario-driven wizardsXML-based configuration import-export,Enhancedtrouble-shooting,All new monitoring dashboardReal-time log viewerContent

29、sensitive task panes,Ease of UseEfficiently deploy,manage,and enable new usage scenarios,How To Use Windows Update,To configure Automatic Updates:,Select Keep my computer up to date,Open the System application in Control Panel,1,On the Automatic Updates tab,select theoption you want,3,2,Office Updat

30、e,BenefitsLimitation,Single location for office patches and updatesEasy to useCan be configured to update consumer orenterprise systems,Does not support Automatic Updates;updating must be initiated manually,Office Update Web site:http:/,How To Use Office Update,1,Click Check for Updates,2,Install th

31、e Office Update Installation Engine(if not already installed),3,Select the updates you want to install,4,Click Start Installation,5,How To Use SUS,On the SUS server,Configure the SUS server at http:/SUSAdmin,On each SUS client,Configure Automatic Updates on the client to use the SUS server Use Group

32、 Policy,manually configure each client,oruse scripts,Set the SUS server synchronization schedule,Review,test,and approve updates,1,2,3,How To Use MBSA,Download and install MBSA(once only),1,Launch MBSA,2,Select the computer(s)to scan,3,Select relevant options,4,Click Start scan,5,View the Security R

33、eport,6,Software Update Service Deployment Best Practices(1),Software Update Service Deployment Best Practices(2),How To Use SMS To Deploy Patches,SMS MBSA Integration,MBSA integration included with SMS 2003 and the SUS Feature Pack for SMS 2.0Scans SMS clients for missing security updates using mbs

34、acli.exe/hf,MBSA Benefits,Scans systems forMissing security patchesPotential configuration issuesWorks with a broad range ofMicrosoft softwareAllows an administrator to centrally scan multiple computers simultaneously MBSA is a free tool,and can bedownloaded from,MBSA Considerations,MBSA reports imp

35、ortant vulnerabilities,Password weaknessesGuest account not disabledAuditing not configuredUnnecessary services installedIIS vulnerabilitiesIE zone settingsAutomatic Updates configurationInternet Connection Firewall configuration,MBSA Scan Options,MBSA has three scan optionsMBSA graphical user inter

36、face(GUI)MBSA standard command-lineinterface(mbsacli.exe)HFNetChk scan(mbsacli.exe/hf),Business Case ForPatch Management,When determining the potential financial impact of poor patch management,consider,DowntimeRemediation timeQuestionable data integrityLost credibilityNegative public relationsLegal

37、 defensesStolen intellectual property,“We commend Microsoft for providing enhanced security guidance to its customers as well as for soliciting user input as part of the process of producing that guidance“Clint KreitnerPresident/CEO,“NIST reviewed and provided technical comments&advice,that was inco

38、rporated in this guidance”Timothy GranceManagerSystems and Network Security Group,Comments,You Need To,ISA Delivers,Relational ReportingMultiple fact tablesFull richness the dimensionsattributes Transaction level accessStar,snowflake,3NF Complex relationships:Multi-grains,many-to-many,role playing,i

39、ndirectRecursive self joinsSlowly changing dimensions,The Unified Dimensional Model The Best Of Relational And OLAP,OLAP CubesMultidimensional navigationHierarchical presentationFriendly entity namesPowerful MDX calculationsCentral KPI framework“Actions”Language translations Multiple perspectivesPar

40、titionsAggregations Distributed sources,Visual Studio Team System,Change Management,Work Item Tracking,Reporting,Project Site,Visual StudioTeam Foundation,Integration Services,Project Management,Process and Architecture Guidance,Visual Studio Industry Partners,Dynamic Code Analyzer,Visual StudioTeam

41、 Architect,Static Code Analyzer,Code Profiler,Unit Testing,Code Coverage,Visio and UML Modeling,Team Foundation Client,VS Pro,Class Modeling,Load Testing,Manual Testing,Test Case Management,Application Modeling,Logical Infra.Modeling,Deployment Modeling,Visual StudioTeam Developer,Visual StudioTeam

42、Test,Application Modeling,Logical Infra.Modeling,Deployment Modeling,Class Modeling,SQL Server Catalog,Report Server,XML Web Service Interface,Report Processing,Delivery,Delivery Targets(E-mail,SharePoint,Custom),Rendering,Output Formats(HTML,Excel,PDF,Custom),Data Processing,Data Sources(SQL,OLE DB

43、,XML/A,ODBC,Oracle,Custom),Security,Security Services(NT,Passport,Custom),Office,Custom Application,Browser,SQL Server 2000 Reporting Services Architecture,Internet,RAS Client,RRAS Server,IAS Server,Quarantine,RQC.exe and RQS.exe are in the Windows Server 2003 Resource Kit,Quarantine Architecture,Wh

44、at is VS Team Foundation?,Source Code Control,Work Item Tracking,Build Automation,Project Site,Reporting,Microsoft BI Product Suite,Analysis ServicesOLAP&Data Mining,Data TransformationServices,SQL ServerRelational Engine,Reporting Services,Management Tools,Dev Tools Visual Studio.Net,ExcelOWCVisioM

45、ap PointData Analyzer,SharePoint PortalServerProject Server,Windows Server,MBS BI Applications,Current Architecture,TCP/IP,RTC Client API,User App,Server Architecture,Winsock,Storage,AD,Server,Application Interaction,Application1 CRM,Application2 Billing,Application3 Logging,Request,ModifiedRequest,

46、TITLE,Available,Today,Microsoft Windows Security Resource Kit,Assessing Network Security,June 23,2004,EAP architecture,TLS,GSS_APIKerberos,PEAP,IKE,MD5,EAP,PPP,802.3,802.5,802.11,Anything,methodlayer,EAPlayer,medialayer,MS-CHAPv2,TLS,SecurID,Partner Solutions Offerings,VALUE Proposition:Get more bus

47、iness value from your investment in Office,FinanceSarbanes-OxleyBusiness ScorecardExcel Add-in for SQL Server Analysis Services,OperationsSix Sigma,HRRecruiting,SalesProposals,Solution Accelerators,Microsoft Products,Office Solution Accelerators,VALUE Proposition:Get more business value from your in

48、vestment in Office,Your People,EPM Involves.,Your BusinessProcesses,Your Organization,Your Software Technology&Tools,An orchestration of your people,processes,organization with technology,Your Business Processes,Governance,Prioritization,Budgeting,Human Resources,etc,Initiatives,Implement Microsoft

49、OfficeProject 2003 for the Enterprise,Decisions,-Corporate Goals and Objectives,Executives,Your Organization,Strategic Initiatives,Development Projects,Operational Improvements,On Average 45-50%of all Projects are linked to Strategic Objectives.,Representative Risks And Tactics,Tactical Solutions,En

50、terprise Risks,EmbodyTrustworthyComputing,Secure Environmental Remediation,Unpatched Devices,Network Segmentation Through IPSec,Unmanaged Devices,Secure Remote User,Remote and Mobile Users,Two-Factor for Remote Access and Administrators,Single-Factor Authentication,Managed Source Initiatives,Focus C

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 生活休闲 > 在线阅读


备案号:宁ICP备20000045号-2

经营许可证:宁B2-20210002

宁公网安备 64010402000987号