100%(1)1 out of 1 people found this document helpful
This preview shows page 1 - 9 out of 9 pages.
DDoS PreventionLOT2 Task 2 Presentation
Policies and ProceduresAcceptable Use Policy (AUP)Tells user what they are allowed to dowhen using university information systems.Develop Incident Response ProceduresDevelop a policy.Communication, Documentation, Training.Team, Access Control, Tools.
Implementing New DevicesConsiderationDeleting unnecessary software.Encryption for all communications.Scan software for vulnerabilities.Independent review of source code.
Patch Management PlanAll patches must be verified and tested on nonproduction servers and devices.Virtualization is the most efficient way to testpatches in a “sandbox” environment.
Proper System AuditingRoutine audits of the following:Router configurations.
End of preview. Want to read all 9 pages?
Upload your study docs or become a
Course Hero member to access this document
Computer Security, Incident Response Procedures, Properly configured IDS, university information systems