TAILIEUCHUNG - Router Security

By hardening a router,we make it difficult to penetrate and unyielding under the pressure of attacks. This chapter discusses why hardening network routers is one of the most important and overlooked aspects of Information Security. It will talk about what can go wrong when routers are left insecure and identify which routers are at the most risk from attack. | Page 1 Friday February 15 2002 2 52 PM CHAPTER 1 Router Security In Webster s dictionary the definition of hard is particularly relevant to the field of information security Not easily penetrated or separated into parts not yielding to pressure. By hardening a router we make it difficult to penetrate and unyielding under the pressure of attacks. This chapter discusses why hardening network routers is one of the most important and overlooked aspects of Information Security. It will talk about what can go wrong when routers are left insecure and identify which routers are at the most risk from attack. Router Security When asking about Information Security InfoSec mott people immedrately think about stolen credit cards defaced web sites and teenage hackers with names like B@D@pple. An InfoSec professional might extend the list to items like firewalls Vn -tual Private Networks VPN s penetration testing nml risk nnalysis. What is almost never listed is router security network security y Ihh neres spedl icaUf couter security. The distinction is important. Network security is most often thought of as something that protects machines on a network. To do this compames put up flteerallSi configure YPNa and n uiU muru-sion detection systems. Router security howeerc Howeves ci iecilng en netwkrk itself by hardening or securing the routers. Specifically it addresses preventing attackers from Using routers to gain information about your network for use in an attack information leakage Disabling your routers and therefore your network Reconfiguring your routers Using your routers to launch further internal attacks Using your routers to launch further external attacks 1 Page 2 Friday February 15 2002 2 52 PM Organizations spend hundreds of thousands of dollars on firewalls VPNs intrusion detection and other security measuees nnd yet they rnn ormers with utmof-tei -oox configurations. From personal eoperience at least eight or nme out iff eveey ten networks .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.