Security at Microsoft

Monday, 24 November 2003, 3:05 PM EST

This paper describes what the Microsoft Corporate Security Group does to prevent malicious or unauthorized use of digital assets at Microsoft. This asset protection takes place through a formal risk management framework, risk management processes, and clear organizational roles and responsibilities. The basis of the approach is recognition that risk is an inherent part of any environment and that risk should be proactively managed. The principles and techniques described in this paper can be employed to manage risk at any organization.

The interdependent security initiatives, strategies, and technologies that Microsoft has deployed were implemented in a number of phases. The essential enabling technologies described in this paper run on Microsoft® Windows Server 2003. However, most of the technologies were developed when the infrastructure was based on Microsoft Windows 2000 Server, and can be implemented on Windows 2000 Server. All of the technologies and deployments continue to mature based on evolving security requirements, future strategic plans, and product testing and validation requirements.

[ Read more ]




Spotlight

Android Fake ID bug allows malware to impersonate trusted apps

Posted on 29 July 2014.  |  Bluebox Security researchers unearthed a critical Android vulnerability which can be used by malicious applications to impersonate specially recognized trusted apps - and get all the privileges they have - without the user being none the wiser.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //