Windows Server 2003 Network Security Design Study Guide (Exam 70-298) [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Windows Server 2003 Network Security Design Study Guide (Exam 70-298) [Electronic resources] - نسخه متنی

Brian Reisman, Mitch Ruebush

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید









Summary


In this chapter, you learned the different steps involved in predicting threats to your network. The motivation for an attack can range from curiosity to espionage. We showed you how to predict attacks that may be initiated from within your organization or from outside of it. You learned that threat modeling can greatly increase your ability to make appropriate decisions when doling out resources. Categorizing the threats that your organization faces as well as estimating the impact can better prepare you and your team to respond to an incident.

We later showed you that the creation of an incident response procedure can minimize mistakes and allow you to properly respond. Creating organizationally specific severity levels to qualify the attack and its impact further prepares the team with predefined processes to follow when an attack occurs.

After an incident occurs, you will need to take great care to make sure that the appropriate steps are taken. Failure to follow the predetermined plan can lead to mistakes and lost evidence.

Finally, you saw the different techniques that can be employed in order to secure your internal network. You can use a bastion host, a three-pronged configuration, or a back-to-back configuration to better secure your network and still allow some degree of access to services from the public network.


/ 168