First page Back Continue Last page Summary Graphics
Where is the door?
Protection
- Disable all unneeded network services
- Stop scans at the perimeter
- Use a highly configurable firewall (Proxy-based is best)
- Only allow necessary ports to be accessible from the outside
- Use a DMZ for other services
- Use both Host-based and Network-based intrusion detection
- Security administrator can be alerted when an attack is in progress