Defensive Strategy
Search for top 10 security tips on the web, and practically every result will include running antivirus software or will have advice on password choice. Other suggestions will include avoiding opening attachments, browsing shady websites, or installing untrusted software. Signature‐based detection i...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Search for top 10 security tips on the web, and practically every result will include running antivirus software or will have advice on password choice. Other suggestions will include avoiding opening attachments, browsing shady websites, or installing untrusted software. Signature‐based detection is meant to be preventive. There are two common password policies that are widely suggested. Both policies have failed to stem the tide of intrusions. So it is clear that an eight‐character password chosen at random is secure enough. After initial access is achieved, strong passwords have little impact on the Attacker's economy of resources. A perfect whitelisting system forces the Attacker to have a priori awareness of the environment and prevents the installation of backdoors or the deployment of tools. Network segmentation and segregation consists of dividing the network into logical or functional units. Segmentation is also useful to the extent it enables data classification. |
---|---|
DOI: | 10.1002/9781119183440.ch8 |