Security at Microsoft

Monday, 24 November 2003, 3:05 PM EST

This paper describes what the Microsoft Corporate Security Group does to prevent malicious or unauthorized use of digital assets at Microsoft. This asset protection takes place through a formal risk management framework, risk management processes, and clear organizational roles and responsibilities. The basis of the approach is recognition that risk is an inherent part of any environment and that risk should be proactively managed. The principles and techniques described in this paper can be employed to manage risk at any organization.

The interdependent security initiatives, strategies, and technologies that Microsoft has deployed were implemented in a number of phases. The essential enabling technologies described in this paper run on Microsoft® Windows Server 2003. However, most of the technologies were developed when the infrastructure was based on Microsoft Windows 2000 Server, and can be implemented on Windows 2000 Server. All of the technologies and deployments continue to mature based on evolving security requirements, future strategic plans, and product testing and validation requirements.

[ Read more ]




Spotlight

Cloned, booby-trapped Dark Web sites steal bitcoins, login credentials

Apart from being a way for dissidents and journalists to do their business without being spotted and identified by "the powers that be", the Dark Web is also a place where criminals sell and buy illegal wares and services and, apparently, where they also get robbed by scammers.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Jul 3rd
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //