CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources]

Tebyan

نسخه متنی -صفحه : 290/ 80
نمايش فراداده

  • Chapter 8. Mitigating Rudimentary Network Attacks

    This chapter covers the following topics:

    • Mitigating Reconnaissance Attacks

    • Mitigating Denial of Service Attacks

    • Protecting Against Unauthorized Access

    • Mitigating Application Layer Attacks

    • Guarding Against Trust Exploitation

    Chapters 6 and 7 covered various attacks that may be launched against a network. This chapter covers the mitigation of the attacks described in Chapter 6, "Classifying Rudimentary Network Attacks": reconnaissance, unauthorized access, denial of service (DoS), application layer, and trust exploitation attacks. The mitigation techniques discussed in this chapter are based on network security best common practices (BCPs) and on SAFE concepts.Chapter 9, "Mitigating Sophisticated Network Attacks," cover a fair amount of detail on mitigating attacks, by no means do the chapters present an exhaustive discussion. Each attack is unique and has its own set of requirements for an effective defense. Nevertheless, this chapter provides a starting point for network administrators to understand how to implement the principles in SAFE to better protect their networks.