A Checklist for Developing Defenses

Step

Description

Properly register IP prefixes.

Whether handled by the ISP or the organization, care should be taken to provide accurate registration information, in addition to generic, role-based contact information.

Properly register Autonomous System Numbers.

As with IP prefix registration, care should be taken to ensure accurate information and generic, role-based contact information.

Configure DNS service properly.

See Chapter 3 for details on risks and mitigation techniques.

Configure electronic mail or mail exchanger (MX) service.

See Chapter 8 for details on risks and mitigation techniques.

Utilize security questionnaire.

Start with the questionnaire in this chapter and modify to suit your specific needs.

Recommended Reading

  • RFC 2196, Site Security Handbook

  • RFC 2142, Mailbox Names for Common Services, Roles, and Functions

  • Practical BGP by Russ White, Danny McPherson, and Srihari Sangli (Addison-Wesley Professional, 2004)



Extreme Exploits. Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net