Unformatted text preview: the critical functional areas,it may be feasible to monitor the incidents and contain it in another way.An approach used by organization’s to apply filtering rules dynamically is to limit certain types of network access. Other containment strategies include the following: 1)Disabling compromised user accounts 2)Reconfiguring a firewall to block the problem traffic 3)Temporarily disabling the compromised process or service 4)Taking down the conduit application server ex: e-mail server 5)Stopping all computers and network devices The final strategy is used only when all system control has been lost and the only hope is to preserve the data stored on the computers so that operations can resume normally once the incident is resolved....
View Full Document
This note was uploaded on 09/17/2009 for the course CIS 625 taught by Professor Shannon during the Spring '09 term at Missouri State University-Springfield.
- Spring '09
- Computer Security