Introduction

In the previous six chapters, you've learned many of the concepts behind building a solid defense strategy to protect your networks. You've learned that firewalls, intrusion detection systems, security policies, and a strong disaster plan are essential to ensuring secure continuity of operations. However, even the best-laid plans have weaknesses and, occasionally, a hacker uncovers and exploits these vulnerabilities to the detriment of your systems (and your sanity!).

This chapter focuses on two areas of concern:

  • The tools and techniques hackers may utilize to either gain unauthorized access to your network or deny that access to legitimate users.

  • The proper procedures to follow when a computer security incident takes place that affects your organization.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset