A Checklist for Developing Defenses

Step

Description

Develop security zones.

Identify all network elements that a critical system is dependent upon when defining a security zone.

Consider potential weaknesses in DMZ design.

Review Table 6-1 when designing a DMZ (or security zone).

Utilize reverse-proxy systems.

Reverse-proxies are flexible, scalable, economical, and can provide higher security than various DMZ designs when implemented properly.

Recommended Reading

  • SANS Security Policy Project (http://www.sans.org/resources/policies/)

  • Information Assurance Technical Framework (http://www.iatf.net/)

  • Cisco SAFE: Security Blueprint for Enterprise Networks (http://www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safe_wp.pdf)

  • NTLM Authentication (http://davenport. sourceforge .net/ntlm.html)

  • NTLM Authentication with HTTP (http://www.innovation.ch/java/ntlm.html)



Extreme Exploits. Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net