Eicon Networks S92 Manual do Utilizador Página 138

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 209
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 137
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 138
Overview
“Firewallsaregreatforrestrictingaccesstoyournetwork,butfirewallscannot
preventallproblems.”(fromSecurityspace.com
34
)
AccordingtoSecurityspace.com,themostcommonproblemswithfirewallsare:
n firewallmisconfiguration
n vulnerablenetworkservices
Thegoalofoursecurityarchitectureauditistoverifythatthedefensemechanismwe
designforGIACisfunctioningproperly.Suchacomprehensiveauditshallinclude
thefollowingelementsasdescribedby wemanageservers.com:
FootprintAnalysiswhatoperatingsystemandwhatservicesandapplicationsare
runningonit.
PortScanningwhatportsareopenthatcanallowpotentialconnectiontothe
system?
VulnerabilityAnalysiswhatareasofthesystemcanbeexploitedbyhackers?
PenetrationTesting Attempttoexploitvulnerabilitiesfoundinthevulnerability
analysisphase.”
35
Inafullscaleaudit,eventhehostsbehindthefirewallsaretobetested.Forthescope
ofthisproject,however,oureffortwillbelimitedtotheroutersandthefirewalls.
DepthoftheAudit
Toisolateandclearlyidentifytheweaknessesorflawsofeverysecuritydeviceinthe
network,eachdeviceistestedindependentlyagainstwhataretobeexpectedoutof
eachofthem.Tobeprecise,wewanttofindout:
34
http://www.securityspace.com/smysecure/daudit_faq.html
35
http://www.wemanageservers.com/managed_security/security_audit/security_audit.html
Vista de página 137
1 2 ... 133 134 135 136 137 138 139 140 141 142 143 ... 208 209

Comentários a estes Manuais

Sem comentários