Understanding Mitigation Techniques
To be honest, I’m not going to go into detail about how to mitigate each and every one of the security threats I just talked about, not only because that would be outside the scope of this book, but also because the methods I am going to teach you will truly protect you from being attacked in general. You’ll learn enough tricks to make all but the most determined bad guys give up on you and search for easier prey. Basically, think of this as a section on how to practice “Safe Net.”
Safe networking techniques fall into three major categories: policies and procedures, training, and patches and upgrades. But before we go there, let’s cover some of those general defense techniques I just referred to.
Okay—first know that there are three main ways to detect an intruder and defend yourself against one:
- Active detection, which involves constantly scanning the network for possible break-ins
- Passive detection, which...