O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security Perimeter Problems

Many security violations are caused by simple errors of judgment or lack of attention to basic security precepts. In some cases, certain operations are made convenient at the expense of security (such as unauthorized modem dial-ins). This effectively makes all perimeter security measures absolutely inefficient. Other types of infractions are described in the following sections.

Incorrectly Configured Access Lists

An incorrectly configured access list on a firewall or a router might allow inbound or outbound traffic that can be used to gain unauthorized access to network resources and/or used to exploit design or implementation weaknesses. Therefore, it is crucial to check and double-check all ACLs on the entire perimeter ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required