LOT2 Task 2 (2) - DDoS Prevention LOT2 Task 2 Presentation...

This preview shows page 1 - 9 out of 9 pages.

DDoS PreventionLOT2 Task 2 Presentation
Policies and ProceduresAcceptable Use Policy (AUP)Tells user what they are allowed to dowhen using university information systems.Develop Incident Response ProceduresDevelop a policy.Communication, Documentation, Training.Team, Access Control, Tools.
Implementing New DevicesConsiderationDeleting unnecessary software.Encryption for all communications.Scan software for vulnerabilities.Independent review of source code.
Patch Management PlanAll patches must be verified and tested on nonproduction servers and devices.Virtualization is the most efficient way to testpatches in a “sandbox” environment.
Proper System AuditingRoutine audits of the following:Router configurations.
End of preview. Want to read all 9 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
NoProfessor
Tags
Computer Security, Incident Response Procedures, Properly configured IDS, university information systems

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture