- Effective robust design
- Bandwidth limitations
- Keep systems patched
- Run the least amount of services
- Allow only necessary traffic
- Block IP addresses
The DoS and DDoS attacks in combination with malicious codes implantations are easily launched but difficult to completely stop. With the nature of TCP/IP and programming issues that are often overlooked, the current Internet is still vulnerable to various forms of DoS and DDoS attacks. There is no "silver bullet" solution to this, like many other security issues. |
- Timely application of patches and system updates, especially to potentially exposed machines. For example, update and maintain a current build of BIND on DNS servers.
- Deployment of only strictly necessary network services
- Intrusion detection systems
- Firewalls
- Anti-virus software
- Good password policies
- Use of Tripwire or other similar tools to detect changes in configuration information or other important files
- Paying heed to "Top 20" vulnerability lists provided by the information security community and evaluating these risks against one's environment
- Establishment and maintenance of regular backup schedules and policies
- As a network is only as secure as its weakest link, protection of mobile and remote machines with personal firewall/intrusion detection software
0 comments:
Post a Comment