Please enable JavaScript.
Coggle requires JavaScript to display documents.
Network Attack Mitigations, image, image, image, image, image, image,…
Network Attack Mitigations
The Defense-in-Depth Approach
VPN: Una red privada virtual es una tecnología de red de ordenadores que permite una extensión segura de la red de área local sobre una red pública o no controlada como Internet.
Firewall: diseñada para bloquear el acceso no autorizado
IPS: intrusion prevention system
ESA/WSA: Esta avanzada tecnología permite a las organizaciones mejorar su seguridad y proteger a los usuarios de forma transparente a partir de las últimas amenazas de Internet.
Keep Backups
Storage: Always validate backups to ensure the integrity of the data and validate the file restoration procedures.
Security: Backups should be transported to an approved offsite storage location on a daily, weekly, or monthly rotation, as required by the security policy.
Validation: Backups should be protected using strong passwords. The password is required to restore the data.
Upgrade, Update, and Patch
Authentication, Authorization, and Accounting
Firewalls
A firewall is one of the most effective security tools available for protecting users from external threats. A firewall protects computers and networks by preventing undesirable traffic from entering internal networks.