Reducing the Risk of an Attack
Having the knowledge about how attackers attack and what attack tools they use, the risk and vulnerability assessor is better equipped to defend against such attacks. These attacks can be mitigated and prevented from occurring within your IT infrastructure; however, it requires a thorough understanding of how best to implement security controls and security countermeasures to mitigate the risk caused by these attacks.
The following list presents risk mitigation recommendations that an organization can deploy against the attack methods and attack tools commonly used on IT infrastructures and their assets. Note that these recommendations are not a fail-safe solution for preventing an attack, but will certainly deter ...
Get Inside Network Security Assessment: Guarding Your IT Infrastructure now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.