Eicon Networks S92 Manuel d'utilisateur Page 138

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 209
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 137
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 138
Overview
“Firewallsaregreatforrestrictingaccesstoyournetwork,butfirewallscannot
preventallproblems.”(fromSecurityspace.com
34
)
AccordingtoSecurityspace.com,themostcommonproblemswithfirewallsare:
n firewallmisconfiguration
n vulnerablenetworkservices
Thegoalofoursecurityarchitectureauditistoverifythatthedefensemechanismwe
designforGIACisfunctioningproperly.Suchacomprehensiveauditshallinclude
thefollowingelementsasdescribedby wemanageservers.com:
FootprintAnalysiswhatoperatingsystemandwhatservicesandapplicationsare
runningonit.
PortScanningwhatportsareopenthatcanallowpotentialconnectiontothe
system?
VulnerabilityAnalysiswhatareasofthesystemcanbeexploitedbyhackers?
PenetrationTesting Attempttoexploitvulnerabilitiesfoundinthevulnerability
analysisphase.”
35
Inafullscaleaudit,eventhehostsbehindthefirewallsaretobetested.Forthescope
ofthisproject,however,oureffortwillbelimitedtotheroutersandthefirewalls.
DepthoftheAudit
Toisolateandclearlyidentifytheweaknessesorflawsofeverysecuritydeviceinthe
network,eachdeviceistestedindependentlyagainstwhataretobeexpectedoutof
eachofthem.Tobeprecise,wewanttofindout:
34
http://www.securityspace.com/smysecure/daudit_faq.html
35
http://www.wemanageservers.com/managed_security/security_audit/security_audit.html
Vue de la page 137
1 2 ... 133 134 135 136 137 138 139 140 141 142 143 ... 208 209

Commentaires sur ces manuels

Pas de commentaire