This preview shows page 1. Sign up to view the full content.
Unformatted text preview: companys domain names. 2. Detail the countermeasures (and tools) you would put in place. To countermeasure profiling, I would use an intrusion detection system to detect any outside discovery attempts. To countermeasure and thwart dig attempts I would block and restrict the DNS to secure its infrastructure....
View Full Document
This note was uploaded on 11/29/2011 for the course ISSC 363 taught by Professor Kelmaiche during the Spring '11 term at American Public University.
- Spring '11