ITM 820 Study Guide - Final Guide: Virtual Dos Machine, Proxy Server, Stateful Firewall
Document Summary
Avoid unsecure devices or technology (i. e. bluetooth) If going wireless, best option currently available is 802. 11i. Firewall 1: to test your network, implement honeypots. Network attacks: dos/ddos attacks dos attacks are easier to deal with, a distributed dos attack is designed to deplo(cid:455) o(cid:374)e or (cid:373)ore (cid:448)i(cid:272)ti(cid:373) (cid:373)a(cid:272)hi(cid:374)es (cid:272)alled (cid:858))a(cid:373)(cid:271)ies(cid:859). The atta(cid:272)kers ofte(cid:374) (cid:449)rite s(cid:373)all progra(cid:373)s that create a patch in an authorized code: synflood attacks are widely used against dns servers. The victim is continuously sent syn messages to designated ip address (i. e. 256 cmd prompts, on 100 zombies = 25,600 machines). A sand box creates a virtual environment for executing mobile code, if considered safe, it will be executed locally (otherwise it will be rejected: there are 5 types of protective controls: Type 1) (cid:862)dire(cid:272)ti(cid:448)e co(cid:374)trol(cid:863) is i(cid:374)te(cid:374)ded to ad(cid:448)ise e(cid:373)ployees of the behaviour expected from the often-called (cid:862)ad(cid:373)i(cid:374)istrati(cid:448)e (cid:272)o(cid:374)trols(cid:863)