%%! & %% ' % (!! "# $ % $



Similar documents
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Symantec Endpoint Protection

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

VB100 Results Overview: Eset

Barracuda Yosemite Server Backup

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

Parallels Virtualization SDK ReadMe CONTENTS:

Automated Patching. Paul Asadoorian IT Security Specialist Brown University

ZENworks Patch Management. Doc Hodges Opportunity Response Team Novell, Inc.

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

Symantec Protection Suite Small Business Edition

Microsoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support

Symantec Protection Suite Small Business Edition

How To Manage Your Information Systems At Aerosoft.Com

Symantec Protection Suite Small Business Edition

TapeWare THE ONE SOLUTION FOR BACKUP

Setting up an icap Server for ISG- 1000/2000 AV Support

Yale Software Library

ICT HELPDESK PROCEDURES

HULFT7e for i5os(ver.7.3.0) Effective on 3 Apr HULFT7e for UNIX-M(Ver.7.3.0) HULFT7e for UNIX-L(Ver.7.3.0) Effective on 3 Apr.

Managed Backup Service Supported Platforms

Symantec Endpoint Protection

4.1 Introduction 4.2 Explain the purpose of an operating system Describe characteristics of modern operating systems Control Hardware Access

PCI DSS. Get Compliant, Stay Compliant Seminar

Global Knowledge MEA Remote Labs. Remote Lab Access Procedure

Enhancing Your Network Security

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Get Connected! How to Configure Your Computer for MITnet. Red Hat Enterprise Linux Mac OS X Windows XP Professional, Vista

World-class security solutions for your business. Kaspersky. OpenSpaceSecurity

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

TECHNOLOGY BRIEF: CA THREAT MANAGER. Protecting Endpoint Systems Using Threat Management Solutions

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Information Technology Policy

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information

Linux Terminal Serve Project (LTSP) An Emerging Cheapest Open Source Client / Server Architecture for Business

Getting Started with VMware Fusion. VMware Fusion for Mac OS X

World-class security solutions for your business. Business Products. C a t a l o g u e

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

Price List. Phone Number (919) Address Mailing Address PO Box 698 Franklinton NC 27525

Lecture 6: Operating Systems and Utility Programs

Windows and Active Directory The Replacement for Novell Netware

Shipping Products Chart. Contents

Endpoint protection for physical and virtual desktops

Symantec Endpoint Protection Datasheet

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time

Topic 1 Lesson 1: Importance of network security

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.

Parallels Mobile. Usage Guidelines. Copyright Parallels Holdings, Ltd.

User Security Education and System Hardening

Comparing Free Virtualization Products

Yale Software Library

Linux. Prepared for: Professor Maria Damen. Prepared by: Lori Minor. Date: December 6, 2010

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

CA ARCserve Backup r12.5 for Windows Compatibility Matrix

Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions

A progressive and integrated approach to protecting corporate networks

Symantec Client Management Suite 8.0

Mouse and Pointer Settings. Technical Brief

Operating System Compiler Bits Part Number CNL 7.0 AMD Opteron (x86 64) Windows XP/Vista x64 Visual Studio P10488

TECHNOLOGY BRIEF: CA ANTI-VIRUS. Protecting Endpoint Systems Against Viral Malware

Shipping Products Chart. Contents

TIME TO LIVE ON THE NETWORK

STAT Scanner Product Guide

Information Security Recommendation Report

Patch Management Policy

LSGMI REMOTE DESKTOP SERVICES.

REMOTE ACCESS SERVICE SUPPORT. ICR User Support Guide

Boston University Security Awareness. What you need to know to keep information safe and secure

Hope is not a strategy. Jérôme Bei

The Remote Data Backup & Restore Service from

How To Write A Test Drive For Kaspersky Anti Virus 6.0 For Windows Server (For Windows)

Patch Management SoftwareTechnical Specs

Microsoft Technologies

Project to set up Wireless Network for Midwest Home Health Agency

BURNET- ACCESS 2013 ACCESS Primary Health Clinic Network GRHANITE SITE INSTALLATION CHECKLIST

IQware's Approach to Software and IT security Issues

Endpoint protection for physical and virtual desktops

How To Protect Your Computer From A Malicious Virus

Business Products

WINDOWS XP SERVICE PACK 2 & GALILEO PRODUCTS

Kaspersky Security Center Web-Console

Parallels Virtuozzo Containers 4.7 for Linux Readme

Promoting Network Security (A Service Provider Perspective)

How To Manage A Network Safely

Remote Access - Mac OS X

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index

Total Protection for Enterprise-Advanced

Namespaces. The address is the most visible part of the companys namespace Important to work properly

Faronics Products SYSTEM REQUIREMENTS Last modified: October 2014

Student Wireless Network Access Guide (Windows) v2.6 (21/09/2011)

Dialogic Diva V-1PRI, V-2PRI and V-4PRI (PCI/PCIe)

EMC Retrospect 7.5 for Windows. Backup and Recovery Software

ResNet Computer Consultant Job Description

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

PATCH MANAGEMENT POLICY IT-P-016

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Virtualization Journey Stages

Transcription:

%%!&%% '%(!!"#$%$

!&'(! )!"#$%

)* ) General Manager Office Manager Program Secretary Communication Advisor Technical Team Manager Technical Specialist Technical Specialist Technical Specialist Technical Specialist Technical Specialist Technical Specialist Technical Team

+, +-./ +!!.&

#$ 0% 1 23 '!( *4$ ('%2 5!26! " (7$264' (&2

%$&' +() '*+ 8%$&' 8$ $ ) +,( ' $- +./// +% + 00$ 1$&' + (2$ + 3# # )' +(% + )1$ 2.//4

+ &4 54= (( 5%(6 %23 2%& %,1 2! 42 ( ' (',(.<. + 9(! + 0 2(6!26 + 0:; +& +!( + '!(-./ +* 2 + %%!(%! 2&2

$ (%9 >3

'* '2

)5$' Network Anti-Virus IPS PC Firewalls VoIP Anomaly Patching Hacking Detection Developer Policy Viruses Web Svcs Enforcement & Worms WiFi Web Svcs Tools Exploits Attacks Exploits Application Internet Spyware DDOS Hacking VoIP Internet WiFi Identity Theft Hacking DDOS Attacks Info Theft

! ' # + 0+## #$$ 8678 # &*5+*#.//9! + '*#:$$ &## 2$1#) 1%4 3%% $3 22 (

! ' # Average time between attacks: 21 minutes ': $($:

0 $ ++ &# $* # +%$#$* # 8 $##;+$ '** #< 8.//6=>48 # +$ '* 4(?($%!' 02! (?!"5"@5"1"( 21 2? 72A DigiD +2$1.//4 8;'$')$ #)* < 8 $ 3*$##

% ( + '%B +#'!'%4( $B +*2!2!:7

% ( ' + 5$%'%B + 4$ <%4$&7 +*%:7 + 9(?! $>>92 + 64?! $>9 +&!%?!$ <24(

%2 %2 ( ' (' + %26(7$! +&24($ + %'( +! + %264! +!! +2 +(%6

%2 %2 ( ' (',( Soort Software Leverancier Software Versie Service pack Platform Functie Software Workstation Operating System Microsoft MS Windows 95 alle alle x86 OS Workstation Operating System Microsoft MS Windows 98 alle alle x86 OS Workstation Operating System Microsoft MS Windows ME ale alle x86 OS Workstation Operating System Microsoft MS Windows NT 3.5x Workstation alle alle x86 OS Workstation Operating System Microsoft MS Windows NT 3.5x Workstation alle alle RISC OS Workstation Operating System Microsoft MS Windows NT 4.0 Workstation alle alle x86 OS Workstation Operating System Microsoft MS Windows NT 4.0 Workstation alle alle RISC OS Workstation Operating System Microsoft MS Windows 2000 Professional alle alle x86 OS Workstation Operating System Microsoft MS Windows XP Home alle alle x86 OS Workstation Operating System Microsoft MS Windows XP Professional alle alle x86 OS Workstation Operating System Red Hat Linux alle alle alle OS Workstation Operating System Mandrake Linux alle alle alle OS Workstation Operating System SUSE Linux alle alle alle OS W orkstation Operating System Apple MAC OS 9.x or previous alle alle alle OS Workstation Operating System Apple Mac OS X alle alle risc OS Server Operating System Microsoft MS W indows NT 3.5x Server alle alle x86 OS Server Operating System Microsoft MS W indows NT 3.5x Server alle alle RISC OS Server Operating System Microsoft MS W indows NT 4.0 Server alle alle x86 OS Server Operating System Microsoft MS W indows 2000 Server alle alle x86 OS Server Operating System Microsoft MS W indows 2000 Server alle alle Itanium OS Server Operating System Mandrake Linux alle alle alle OS Server Operating System Red Hat Linux alle alle alle OS Server Operating System SUSE Linux alle alle alle OS Server Operating System SUSE SUSE LINUX Standard Server 8 alle alle alle OS Server Operating System Apple Mac OS X alle alle Apple OS Server Operating System Novell Netware alle alle alle OS Desktop Applicaties Microsoft Word 95 alle alle x86 Office applicatie Desktop Applicaties Microsoft Word 97 alle alle x86 Office applicatie Desktop Applicaties Microsoft Word 98 MAC alle alle Apple Office applicatie Desktop Applicaties Microsoft Word 2000 alle alle x86 Office applicatie Desktop Applicaties Microsoft Word X MAC alle alle Apple Office applicatie Desktop Applicaties Microsoft Word XP alle alle x86 Office applicatie Desktop Applicaties Microsoft Excel 95 alle alle x86 Office applicatie Desktop Applicaties Microsoft Excel 97 alle alle x86 Office applicatie Desktop Applicaties Microsoft Excel 98 MAC alle alle Apple Office applicatie +!(%%%:(B + (7$!4&%'(? +!242$<CD* +3&&('% +3&%'6 + 3&!6

%2 %2 ( ' % (' %,(.<. risk x subjective impact +.?64 +.?. E9( +.F?.E& +.-?.FE%< E%('%% risk x objective impact low medium high low mix 1 mix 2 medium mix 1 mix 2 mix 3 high mix 2 mix 3 mix 4

! - Risico: Wat is het risico dat deze kwetsbaarheid kan worden uitgebuit? Schade: Wat is de potentiële schade die er door uitvoer kan worden aangericht?

%2 %2 ( ' (',(.<. + 9(! + 0 2(6!26 + 0:; +& +!( + '!(-./ +* 2 +%%!(%! 2&2

-? #$%$ #$4%$% ( 666% ( 6666!26(