CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Mitigating Threats in Remote-User Networks


    Table 17-4 presents the threats that can be anticipated for the remote-user network design model and summarizes the mitigation techniques for each anticipated threat.

    Table 17-4. Remote-User Network Threats and Threat Mitigation

    Threat

    Threat Mitigation

    IP spoofing

    Mitigated by using RFC 1918 and RFC 2827 filtering at the ISP edge and remote-site connectivity device

    Man-in-the-middle attacks

    Mitigated by encrypting traffic

    Network reconnaissance

    Mitigated by filtering protocols at the remote site

    Unauthorized access

    Mitigated by filtering and stateful inspection of sessions by the fire-wall or router at the remote site or by using the personal firewall on standalone devices

    Virus and Trojan-horse attacks

    Mitigated by using virus-scanning software at the host level

    Figure 17-2 illustrates the remote-user threats and threat mitigations that can be expected within the various options available in the remote-user network design model.

    Figure 17-2. Remote-User Design Model


  • / 290