From Newbie to Power User
So far, we’ve learned about the most common methods of attack and the system weaknesses most often exploited, and we’ve taken steps to improve security: installing Mozilla on Windows, disabling unnecessary services, removing or replacing insecure clients, and setting up a multiuser system with sensible permissions. These steps are meant to simplify our systems so that during an attack or under the influence of malware, fewer things can be made to go wrong. We’ve been relying on passive defense: narrowing our target profile and removing unnecessary features that attackers and malware can leverage against us. But there is more to security than denying assistance to attackers; there are, in fact, a number of deliberate steps we can take to monitor our systems, investigate suspicious behavior, and take action. In this chapter, we’ll learn about tools of active defense that we can use to enhance security and thwart attacks.
KeywordsEntropy Agate Europe Assure Expense
Unable to display preview. Download preview PDF.