First page Back Continue Last page Summary Graphics
Distributed Attack Protective Measures
- Keep your systems and applications updated
- use automated tools to ensure systems and applications are up-to-date enterprise wide
- Protect your networks entry points
- Check for Trojan horse or Zombie code
- Network vulnerability scans
- Host vulnerability scans
- Use ingress and egress filtering
- Use intrusion detection tools to detect specific packet attacks