TAILIEUCHUNG - Host Perimeter Defense

Most of us have a problem. We are under attack. At this very moment, our internet-connected computer systems are being subjected to a surprising number of probes, penetration attempts, and other malicious attention. In this talk, we will discuss the types of attacks that are being used against our computers, and how to defend against these attacks. | Host Perimeter Defense Security Essentials The SANS Institute Host Perimeter Defense - SANS 2001 1 Most of us have a problem. We are under attack. At this very moment our internet-connected computer systems are being subjected to a surprising number of probes penetration attempts and other malicious attention. In this talk we will discuss the types of attacks that are being used against our computers and how to defend against these attacks. You will learn about both free and commercial software products that will help you improve the security of your systems. These products present a variety of solutions ranging from easy-to-configure hassle-free products that provide a reasonable level of security to more complex solutions that provide more stringent measures for high-value assets. 6 - 1 Agenda Do we have a problem Who is vulnerable Threats and types of protection Features to look for Summary Host Perimeter Defense - SANS 2001 2 We will begin this talk by examining the scope of the problem and you will learn about the types of systems that are vulnerable and that may require protection. The main portion of this talk will focus on the various threats to your host s security and the types of protection including specific tools that can be used to defend against these threats. Finally we will discuss some features to look for when choosing a host perimeter solution. A summary of important information will round out the talk. At the end of the webcast you will be able to recommend and implement utilities and policies for host perimeter defense. 6 -2 Host Perimeter Defense Defends the borders of your computer Complements network perimeter defense -Additional layer of protection May also be first line of defense Host Perimeter Defense - SANS 2001 3 Host perimeter defense is just what it sounds like Defending the perimeter of the host itself - the borders of your computer. Most security-conscious organizations protect the borders of their network with tools such as .

TỪ KHÓA LIÊN QUAN
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.