Defensive Strategy

Search for top 10 security tips on the web, and practically every result will include running antivirus software or will have advice on password choice. Other suggestions will include avoiding opening attachments, browsing shady websites, or installing untrusted software. Signature‐based detection i...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Monte, Matthew
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Search for top 10 security tips on the web, and practically every result will include running antivirus software or will have advice on password choice. Other suggestions will include avoiding opening attachments, browsing shady websites, or installing untrusted software. Signature‐based detection is meant to be preventive. There are two common password policies that are widely suggested. Both policies have failed to stem the tide of intrusions. So it is clear that an eight‐character password chosen at random is secure enough. After initial access is achieved, strong passwords have little impact on the Attacker's economy of resources. A perfect whitelisting system forces the Attacker to have a priori awareness of the environment and prevents the installation of backdoors or the deployment of tools. Network segmentation and segregation consists of dividing the network into logical or functional units. Segmentation is also useful to the extent it enables data classification.
DOI:10.1002/9781119183440.ch8