Additional Considerations


The following considerations can further improve network security:

  • Ensure that clocks are synchronized on all network devices. Set the network time and have all sources synchronized to a known, reliable time source.

  • Use Terminal Access Controller Access Control System (TACACS) or Remote Authentication Dial-In User Service (RADIUS) authentication for highly secure environments as a means of limiting administrative access to the network.

  • Define an IP network that can be easily secured using ACLs at subnets or network boundaries whenever possible.




Improving Web Application Security. Threats and Countermeasures
Improving Web Application Security: Threats and Countermeasures
ISBN: 0735618429
EAN: 2147483647
Year: 2003
Pages: 613

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net