Войти:
Оценок - , средний балл: ( )

Инструкция по эксплуатации HP, модель MPE/iX 6.0 Operating System

Производитель: HP
Размер: 640.76 kb
Название файла:

Язык инструкции:itenesfrdeptro

Документ загружается, подождите пожалуйста
Документ загружается, подождите пожалуйста


К этому устройству также есть другие инструкции:

Фрагмент инструкции


One
t
yp e
of
sab otage
in
v
olv
es
access
to
the
computer
or
system
b
y
Defenses
Against
Data
unauthorized
p ersons.
F
or
the
most
part,
prev
en
tativ e
measures
are
and
P
erformance
Loss
the
same
as
those
describ ed
under
Pr
evention
of
A
c
c
ess,
ab o
v
e.
In
Due
to
Sabotage
particular,
y
ou
should
b e
a
w
are
of
the
fact
that
an
y
one
who
can
access
the
System
Console
can
execute
a
4
54
5,
then
execute
CTRL
A
an
y
command
that
can
b e
in
v
ok
ed
from
the
\="
prompt.
Suc
h
commands
include
=ABORTJOB,
=ABORTIO,
=LOGOFF,
=LOGON,
and
=SHUTDOWN.
Another
t
yp e
of
access
a
v
ailable
from
the
System
Console
is
that
pro
vided
b
y
executing
a
4
54
5.
This
pro
vides
access
to
the
system
CTRL
B
hardw
are
via
the
system
diagnostics.
The
4
54
5
function
can
b e
CTRL
B
ph
ysically
disabled.
Discuss
this
with
y
our
Hewlett-Pac
k
ard
Service
Engineer.
A
t
yp e
of
sab otage
m
uc
h
harder
to
prev
en
t
is
sab otage
from
in
ternal
sources.
Examples
include
disgrun
tled
emplo
y
ees,
and
acciden
tal
sab otage
resulting
from
the
inadv
erten
t
in
tro
duction
of
destructive
softw
are
(T
ro
jan
horses,
viruses)
in
to
the
system.
Sab otage
b
y
users
with
otherwise
legitimate
access
to
the
system
can
b e
minimized
b
y
enforcing
limitations
on
capabilities
and
access.
System
logging
facilities
can
b e
used
to
establish
strict
accoun
tabilit
y
for
all
users.
Suc
h
accoun
tabilit y
cannot
prev
en
t
sab otage,
but
can
aid
in
iden
tifying
the
culprit.
Ev
en
users
at
the
highest
lev
els
can
b e
made
accoun
table
b
y
suc
h
tec
hniques
as
maintaining
a
log
of
all
who
access
or
mo
dify
the
system
conguration.
Due
to
the
p o
w
er
of
the
privileged
mo
de
capabilit y
(PM),
System
Managers
should
allo
cate
it
only
to
accoun
ts,
groups
and
users
with
an
imp erativ
e
need.
As
an
example
of
the
dangers
inheren
t
in
the
PM
capabilit y
,
it
p ermits
the
use
of
DEBUG
on
system
les,
and
lets
p ersons
with
the
capabilit y
place
unauthorized
softw
are
on
the
system.
Prev
en
tion
of
acciden
tal
sab otage
from
destructive
softw
are
can
b e
minimized
or
prev
en
ted
b
y
education,
strict
rules
against
using
unauthorized
softw
are,
and
w
ell
publicized
p enalties
for
doing
so.
Establishment
of
accoun
tability
can,
again,
aid
in
iden
tifying
the
oender
in
suc
h
inciden
ts.
T
otal
prev
en
tion
of
acciden
tal
information
disclosure
is
rarely
Defenses
Against
p ossible.
Employ
ee
education
and
app eals
to
emplo
y
ees'
sense
of
Information
Disclosure
compan
y
or
national
loy
alt
y
can
help
mitigate
the
problem,
but
not
prev
en
t
it.
Another
tec
hnique
is
to
disseminate
vital
information
strictly
on
a
need-to-kno
w
basis.
Delib
erate
theft
of
information
in
ph
ysical
form,
suc
h
as
on
disk,
tap
e,
and
pap er,
can
b e
minimized
using
the
same
tec
hniques
as
those
for
prev
en
ting
theft
of
equipmen
t:
prev
en
tion
of
access.
T
ec
hniques
for
prev
en
ting
access
include
lo
c
king
desks,
cabinets,
and
les.
Store
media
in
lo
c
k
ed
cabinets
rather
than
op en
rac
ks,
and
enforce
strict
con
trol
o
v
er
the
distribution
of
sensitive
do cumen
ts.
Ov
erview
of
Security
on
the
MPE/iX
Computer
System
2-19


...

Эта инструкция также подходит к моделям:
Программное обеспечение - MPE/iX 6.5 Operating System (640.76 kb)
Программное обеспечение - MPE/iX 7.0 Operating System (640.76 kb)
Программное обеспечение - MPE/iX 7.5 Operating System (640.76 kb)

Напишите ваш отзыв об устройстве



Текст отзыва
Ваше имя:
Введите две цифры:
capcha





Категории