tailieunhanh - PacNOG 6: Nadi, Fiji Security Overview

Typically, vulnerabilities are exploited repeatedly by attackers to attack weaknesses that organizations have not patched or corrected. A report in a SANS Security Alert, dated May 2000, provides a discussion of this issue: “A small number of flaws in software programs are responsible for the vast majority of successful Internet attacks . A few software vulnerabilities account for the majority of successful attacks because attackers don't like to do extra work. They exploit the best-known flaws with the most effective and widely available attack tools. And they count on organizations not fixing the problems.” . | PacNtG Hervey Allen Network Startup Resource Center PacNOG 6 Nadi Fiji Security Overview Security A Massive Topic Security Viewpoints - Server - Client - Network Securing each overlaps the other 2 So what do we talk about. Security Network Network Security Keeping intruders out Resisting Denial of Service attacks Maintaining reliable service see above Assisting with your organization s reputation - You have compromised clients on your network. Don t let this cause problems for others. Authenticate data sources as they enter your .