Eicon Networks S92 Uživatelský manuál Strana 138

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 209
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 137
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 138
Overview
“Firewallsaregreatforrestrictingaccesstoyournetwork,butfirewallscannot
preventallproblems.”(fromSecurityspace.com
34
)
AccordingtoSecurityspace.com,themostcommonproblemswithfirewallsare:
n firewallmisconfiguration
n vulnerablenetworkservices
Thegoalofoursecurityarchitectureauditistoverifythatthedefensemechanismwe
designforGIACisfunctioningproperly.Suchacomprehensiveauditshallinclude
thefollowingelementsasdescribedby wemanageservers.com:
FootprintAnalysiswhatoperatingsystemandwhatservicesandapplicationsare
runningonit.
PortScanningwhatportsareopenthatcanallowpotentialconnectiontothe
system?
VulnerabilityAnalysiswhatareasofthesystemcanbeexploitedbyhackers?
PenetrationTesting Attempttoexploitvulnerabilitiesfoundinthevulnerability
analysisphase.”
35
Inafullscaleaudit,eventhehostsbehindthefirewallsaretobetested.Forthescope
ofthisproject,however,oureffortwillbelimitedtotheroutersandthefirewalls.
DepthoftheAudit
Toisolateandclearlyidentifytheweaknessesorflawsofeverysecuritydeviceinthe
network,eachdeviceistestedindependentlyagainstwhataretobeexpectedoutof
eachofthem.Tobeprecise,wewanttofindout:
34
http://www.securityspace.com/smysecure/daudit_faq.html
35
http://www.wemanageservers.com/managed_security/security_audit/security_audit.html
Zobrazit stránku 137
1 2 ... 133 134 135 136 137 138 139 140 141 142 143 ... 208 209

Komentáře k této Příručce

Žádné komentáře