Page 3 - La sécurité de l'information
P. 3

TABLE DES MATIÈRES






                     VLAN : ré séau local virtuél ________________________________________________________________ 10

                  Lés sérvicés ésséntiéls _______________________________________________________________________ 11
                     Sérvéur DHCP ______________________________________________________________________________ 11

                     Sérvéur DNS ________________________________________________________________________________ 11

                     Sérvéur d’authéntification (annuairé) ___________________________________________________ 11

                       Exércicé 5 ________________________________________________________________________________ 11
                  Lés sérvicés annéxés _________________________________________________________________________ 12

                     Sérvéur SGBD ______________________________________________________________________________ 12

                     Sérvéur d’application ______________________________________________________________________ 12
                     Sérvéur Wéb ________________________________________________________________________________ 12

                     Sérvéur dé méssagérié ____________________________________________________________________ 13

                     Sérvéur dé fichiérs _________________________________________________________________________ 13

                       Exércicé 6 ________________________________________________________________________________ 13

                SÉCURITÉ  _______________________________________  14

                  Dé finitions ____________________________________________________________________________________ 14

                  Lés faillés ______________________________________________________________________________________ 14

                  Lés ménacés __________________________________________________________________________________ 15

                     Dé stabilisation _____________________________________________________________________________ 15
                     Espionnagé _________________________________________________________________________________ 15

                     Sabotagé ____________________________________________________________________________________ 15

                     Cybércriminalité  ___________________________________________________________________________ 15
                  Programmés malvéillants ____________________________________________________________________ 15

                  Pratiqués malvéillantés ______________________________________________________________________ 16

                  Lés bonnés pratiqués TECHNIQUES ________________________________________________________ 16

                     Disposér d’un ANTIVIRUS ét autrés logiciéls dé protéction a  jour _____________________ 16

                     Disposér d’un sérvéur PROXY _____________________________________________________________ 16
   1   2   3   4   5   6   7   8