From the course: Ethical Hacking: Introduction to Ethical Hacking
Unlock the full course today
Join today to access over 23,200 courses taught by industry experts.
Defending in depth
From the course: Ethical Hacking: Introduction to Ethical Hacking
Defending in depth
- [Instructor] A layered approach at multiple locations can help repel most classes of attacks. In this segment, we'll outline how a layered approach uses three basic elements, technical controls, administrative policies, and the people. In order to breach a system, it's not always necessary to use advanced or specialized techniques. Many times, someone is able to penetrate network defenses by simply taking advantage of common mistakes, such as failure to update virus signatures or sloppy patch and configuration management. In addition, an attack can occur from outsiders or insiders. As a result, the best tactic is to use a layered approach. Let's start by outlining how technical controls can help defend the network. Technical controls are put in place to detect threats and protect the infrastructure. Components should provide centralized correlation and be tuned to provide early notification of potential attacks. Some of…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.