Chapter 8. Limiting Access

I l @ ve RuBoard

Halting the hacker before he gains access to your system requires a strong perimeter defense. At every spot where a hacker can gain access, you must put up defenses that require more than modest authentication. These spots should also have a fall-back detection scheme for all access and a notification scheme for those that are out of the ordinary.

A policy of least privileges should be enforced. No user needs more privileges than the privileges needed to do his job. A system need not provide services in excess of what are necessary for the proper function of that system. The key to managing this environment successfully is to keep abreast of what the users need to do their jobs and respond rapidly to supply these needs. This is a very difficult task given the rapidly changing environment in which most companies find themselves .

This is why most nongovernment organizations implement more relaxed policies.

I l @ ve RuBoard


Halting the Hacker. A Practical Guide to Computer Security
Halting the Hacker: A Practical Guide to Computer Security (2nd Edition)
ISBN: 0130464163
EAN: 2147483647
Year: 2002
Pages: 210

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net