September 2013
Intermediate to advanced
342 pages
7h 54m
English
Up until this chapter, we have covered how to use Kali Linux to compromise targets. Now it is time to switch gears and become the defender with the goal of avoiding being compromised by methods we have demonstrated in this book, as well as other forms of attack. Defending an Internet-facing resource is extremely difficult, based on being exposed to the entire world through public access, mixed with the operations requirement of not being able to impact service to trusted users at a cost of security. It is absolutely critical to include security in the entire lifecycle from conception to termination of anything public facing, rather than considering security as an afterthought. This will not only reduce the ...
Read now
Unlock full access