Professional Documents
Culture Documents
Section 2 Vulnerability and Corresponding Control
Section 2 Vulnerability and Corresponding Control
Precursors to
attack Port scan • Firewall
• Intrusion detection system
• Running as few services as possible
• Services that reply with only what is
necessary
• Reconnaissance • Firewall
• "Hardened" (self-defensive) operating system
and applications
• Intrusion detection system
Authentication
failures
• Impersonation • Strong, one-time authentication
• Cookie • Firewall
• Intrusion detection system
• Controlled execution environment
• Personal firewall
• Eavesdropping • Encryption
• Cookie • Firewall
• Intrusion detection system
• Controlled execution environment
• Impersonation • Firewall
• Strong, one-time authentication
• Encryption
• Error detection code
• Audit
• Falsification of • Firewall
message • Encryption
• Strong authentication
• Error detection code
• Audit
• Noise • Error detection code
• Transmission or • Architecture
component failure
• Connection • Firewall
flooding, e.g., • Intrusion detection system
echo-chargen, ping • ACL on border router
of death, smurf, • Honeypot
Availability syn flood