Reducing the Risk of an Attack

Having the knowledge about how attackers attack and what attack tools they use, the risk and vulnerability assessor is better equipped to defend against such attacks. These attacks can be mitigated and prevented from occurring within your IT infrastructure; however, it requires a thorough understanding of how best to implement security controls and security countermeasures to mitigate the risk caused by these attacks.

The following list presents risk mitigation recommendations that an organization can deploy against the attack methods and attack tools commonly used on IT infrastructures and their assets. Note that these recommendations are not a fail-safe solution for preventing an attack, but will certainly deter ...

Get Inside Network Security Assessment: Guarding Your IT Infrastructure now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.