In the previous six chapters, you've learned many of the concepts behind building a solid defense strategy to protect your networks. You've learned that firewalls, intrusion detection systems, security policies, and a strong disaster plan are essential to ensuring secure continuity of operations. However, even the best-laid plans have weaknesses and, occasionally, a hacker uncovers and exploits these vulnerabilities to the detriment of your systems (and your sanity!).
This chapter focuses on two areas of concern:
The tools and techniques hackers may utilize to either gain unauthorized access to your network or deny that access to legitimate users.
The proper procedures to follow when a computer security incident takes place that affects ...