科技报告详细信息
Using Fport on Windows NT to Map Applications to Open Ports
Henson, T J
Lawrence Livermore National Laboratory
关键词: Intrusion Detection Systems;    99 General And Miscellaneous//Mathematics, Computing, And Information Science;    Computers;    Internet;    Risk Assessment;   
DOI  :  10.2172/15005330
RP-ID  :  UCRL-ID-143357
RP-ID  :  W-7405-ENG-48
RP-ID  :  15005330
美国|英语
来源: UNT Digital Library
PDF
【 摘 要 】

To develop defense-in-depth computer security, an understanding of various vulnerabilities must be realized before a protection strategy is developed. One element to minimize vulnerabilities is to develop computer security policies, and these policies must be in practice. In addition, risk assessments should be performed, and the highest risk-factor vulnerabilities must be eliminated promptly. A commonly accepted computer security policy usually starts with a firewall being established at the company's Internet connection. A next step could be host scanning or network intrusion detection systems within the organization. Also for consideration is ''backdoor'' access to the network via modem connections from other networks. Policies should extend to routine backups for critical data. Additional protection can be installed with host-based intrusion detection systems to protect against the ''insider threat'' or access through the firewall. However, to establish an effective host-based intrusion detection system, knowledge of the services and applications that open ports on the system is a necessity.

【 预 览 】
附件列表
Files Size Format View
15005330.pdf 208KB PDF download
  文献评价指标  
  下载次数:33次 浏览次数:82次