CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Chapter 8. Mitigating Rudimentary Network Attacks


    This chapter covers the following topics:

    • Mitigating Reconnaissance Attacks

    • Mitigating Denial of Service Attacks

    • Protecting Against Unauthorized Access

    • Mitigating Application Layer Attacks

    • Guarding Against Trust Exploitation


    Chapters 6 and 7 covered various attacks that may be launched against a network. This chapter covers the mitigation of the attacks described in Chapter 6, "Classifying Rudimentary Network Attacks": reconnaissance, unauthorized access, denial of service (DoS), application layer, and trust exploitation attacks. The mitigation techniques discussed in this chapter are based on network security best common practices (BCPs) and on SAFE concepts.Chapter 9, "Mitigating Sophisticated Network Attacks," cover a fair amount of detail on mitigating attacks, by no means do the chapters present an exhaustive discussion. Each attack is unique and has its own set of requirements for an effective defense. Nevertheless, this chapter provides a starting point for network administrators to understand how to implement the principles in SAFE to better protect their networks.


  • / 290