Martes, Marso 12, 2013

NETWORK SECURITY BEST PRACTICES

Network Security Best Practices


Risk Analysis

You should have some kind of risk analysis done to determine as near as possible the risk you face with the kind of operation you conduct.

Vulnerability Testing

Your security policy should include regular vulnerability testing to  determine system. For known security weaknesses 

Audits

*Audit logs  that can track user authentication attempts.

*Audit record logs that are second common type of security related operating system logs.

Audit logs


Tools of your Trade

Anti spyware

Anti spam

Penetration shielding

Threat signature recognition

Anti spyware

Anti spam


Penetration shielding


Firewalls





Walang komento:

Mag-post ng isang Komento