
Các tài liệu hướng dẫn bảo mật hệ thống
mạng máy tính

Ngày nay vấn đề bảo mật đã trở thành những chủ đề nóng nhất trên
Internet. Với tốc độ phát triển cực nhanh của mạng toàn cầu đã đem lại
những lợi ích về mặt kinh tế và xã hội không thể phủ nhận. Chính những
lợi thế đó đã là nơi lý tưởng để tội phạm, hacker sử dụng khai thác với
nhiều mục đích khác nhau.
Để giúp các bạn có thêm thông tin và kiến thức Quản Trị Mạng xin trân trọng
giới thiệu các giải pháp, hướng dẫn bảo mật của Trung tâm bảo mật và cứu
hộ toàn cầu - Cert.org. Bài viết gồm rất nhiều nội dung do đó chúng tôi
không thể tiến hành biên dịch ra tiếng Việt được mong các bạn thông cảm
CERT® Security Improvement Modules
Each CERT Security Improvement module addresses an important but
narrowly defined problem in network security. It provides guidance to help
organizations improve the security of their networked computer systems.
The CERT security practices have been compiled in The CERT® Guide to
System and Network Security Practices, published by Addison-Wesley and
available at walk-in and online bookstores. Using a practical, phased
approach, the book shows administrators how to protect systems and

networks against malicious and inadvertent compromise based on security
incidents reported to the CERT/CC.
Each module page links to a series of practices and implementations.
Practices describe the choices and issues that must be addressed to solve a
network security problem. Implementations describe tasks that implement
recommendations described in the practices. Please note that these
implementations should be considered examples; they have not been updated
to reflect current versions of operating systems or current vulnerabilities. For
more information about modules, read the section about module structure.
List of modules
List of practices
List of implementations
o General
o UNIX
o NT
o Other technologies
Intended audience
Description of module structure

Available formats
Modules
1. Outsourcing Managed Security Services
2. Securing Desktop Workstations
3. Responding to Intrusions
4. Securing Network Servers
5. Deploying Firewalls
6. Securing Public Web Servers
7. Detecting Signs of Intrusion
HTML versions of the modules are available from the CERT web site. PDF
and Postscript versions of the modules are available from the SEI web site.
For the PDF and Postscript versions, click on the icons next to the module
names. The currently available modules are:
Practices
1. Harden and secure your systems by establishing secure
configurations Considerations for Vulnerability Assessment as a
Managed Security Service

2. Prepare for intrusions by getting ready for detection and response
3. Detect intrusions quickly
4. Respond to intrusions to minimize damage
5. Improve your security to help protect against future attacks
We also have practices relating to outsourcing managed security
services. They are listed under the heading
Practices related to outsourcing managed security services
Practices about hardening and securing systems
1. Develop a computer deployment plan that includes security issues
2. Include explicit security requirements when selecting servers
3. Keep operating systems and applications software up to date
4. Offer only essential network services and operating system services
on the server host machine
5. Configure computers for user authentication
6. Configure computer operating systems with appropriate object,
device, and file access controls
7. Configure computers for file backups

