CEH
Honeypots, IDSs, and Firewalls 379 Keep in mind that system logs need to be checked regularly for unknown or unexplained behavio ...
380 Chapter 16 ■ Evading IDSs, Firewalls, and Honeypots ■ In some cases, a firewall may also act as a form of phone tap, allowin ...
Honeypots, IDSs, and Firewalls 381 are present to allow for further subdividing the systems based on the specific security objec ...
382 Chapter 16 ■ Evading IDSs, Firewalls, and Honeypots For the CEH exam, be sure to know your firewall types and what distingui ...
Honeypots, IDSs, and Firewalls 383 Honeypots One of the more interesting systems you will encounter is a honeypot. A honeypot ma ...
384 Chapter 16 ■ Evading IDSs, Firewalls, and Honeypots IDS. By using enumeration and system hacking methods it is possible for ...
Honeypots, IDSs, and Firewalls 385 Fun with Flags The TCP protocol uses flags on packets to describe the status of the packet. K ...
386 Chapter 16 ■ Evading IDSs, Firewalls, and Honeypots that are protected under normal conditions from the Internet. The attack ...
Honeypots, IDSs, and Firewalls 387 An attacker can leverage this by sending packets with the ACK flag set using a tool such as A ...
388 Chapter 16 ■ Evading IDSs, Firewalls, and Honeypots Perform a DoS. Use code obfuscation. Perform a false positive generatio ...
Review Questions 389 Review Questions An HIDS is used to monitor activity on which of the following? A. Network B. Application ...
390 Chapter 16 ■ Evading IDSs, Firewalls, and Honeypots An attacker can use to find information about a firewall. A. Banner gra ...
Review Questions 391 SMTP is used to perform which function? A. Monitor network equipment B. Transmit status information C. Se ...
...
Physical Security CEH EXAM TOPICS COVERED IN THIS CHAPTER: ✓ III. Security ■ E. Network security ■ F. Physical Security ■ P. Vul ...
Working with all the technical and administrative parts of security, you may easily overlook the physical component. If you get ...
Introducing Physical Security 395 One of the most basic controls that can protect physical interaction with a device, system, or ...
396 Chapter 17 ■ Physical Security Something increasingly observed in the real world is the replacing or supplementing of tradit ...
Introducing Physical Security 397 system and set the stage legally if any sort of action needs to be taken against a user, such ...
398 Chapter 17 ■ Physical Security Securing a portable hard drive or any storage device can be made easier through the applicati ...
«
17
18
19
20
21
22
23
24
25
26
»
Free download pdf