Care network summary (continually updated)

70th anniversary of National Day, grille more violent than the last year.

The most recent hot topic of security circles than this. Circle of friends all kinds of hiring. Objectively speaking, protect network security market has a big role in promoting safety in all types of businesses to invest in construction will continue to increase. Well there is a consumer in order to promote economic, security practitioners will further broaden the job market. For the circle of people, a lot of advantages. But this time is really hard, formal care network has not yet begun, already tired into a pool of mud. Especially the defensive side. . . .

As a defender, it is the first step in a human wave tactics. I believe many units have begun a 24 * 7. Although 28 to 10 is the network time care, but the early exercise or ultimately, not to mention, the attacker can not attack began on the 10th. Human wave tactics aside, preparatory work for the defense of nature is, write protection scheme. . . And then landing. Including border protection verification, such as combing the firewall policy, which external service and if not included in the scope of monitoring, verification Again hidden assets, and enhance the strength of passwords external services assets (here talkative one, always felt too bad to go from the mailbox the hole protective again excellent, but also afraid of weak passwords, which links people, really is the weakest point), then it is to look online there is no relevant source of leakage. Because he has not thought to form a chain of protection, you can think of much. For further information, you can see the monarch brother of offensive and defensive combat exercise recovery disk summary .

Basic work well, the offensive and defensive nature is to start the simulation.

This one, the defense generally looked staring safety equipment. But to do better defense, personally feel that log processing safety equipment is necessary. Waf such as logs, the log traffic analysis equipment and other related logs, though logs for security equipment has done some processing. But not enough. Here that log processing, referring to the large number of logs to restore the true association of attacks. From the point of view of assets, the assets subject to the same attack packets and the different packet access, linkage need different devices log. To some extent, you can restore the assets undiscovered weak spots.

Always feel that work is a core protection network monitoring - Analysis - disposal, the last to do is. . . Seal IP. As the defending side, in addition to ban what else to do. Worth considering.

The previously mentioned people are the weakest places, have seen the weaknesses of human nature, ah bah art of deception. . Students, social workers would be full of imagination. Always felt that social workers has unlimited possibilities. Natural care network will not be missed this one. Otherwise, in accordance with the situation over the years, 16 years is successful, the other not how I heard. Social workers always feel this, none of the attacking side to achieve the ultimate, just as a possibility to try. Saying, picking up trash also can ah. Haha, I do not know if anyone tried this, general business processing for these files is quite arbitrary, shredders also furnishings. As for the acquisition of defense staff, it is prohibited to be understood, after all, it is to drill, something uncontrollable. In practice, however, the likelihood of these operations is still very large. I do not know how to prevent.

 

Guess you like

Origin www.cnblogs.com/iamver/p/10986302.html