Page 1198 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1198

Remove or disable unneeded services and protocols. If a
               system doesn’t need a service or protocol, it should not be running.

               Attackers cannot exploit a vulnerability in a service or protocol that
               isn’t running on a system. As an extreme contrast, imagine a web
               server is running every available service and protocol. It is vulnerable
               to potential attacks on any of these services and protocols.

               Use intrusion detection and prevention systems. Intrusion
               detection and prevention systems observe activity, attempt to detect

               attacks, and provide alerts. They can often block or stop attacks. These
               systems are described in more depth later in this chapter.

               Use up-to-date anti-malware software. Chapter 21, “Malicious
               Code and Application Attacks,” covers various types of malicious code
               such as viruses and worms. A primary countermeasure is anti-
               malware software, covered later in this chapter.

               Use firewalls. Firewalls can prevent many different types of attacks.
               Network-based firewalls protect entire networks and host-based

               firewalls protect individual systems. Chapter 11, “Secure Network
               Architecture and Securing Network Components,” includes
               information on using firewalls within a network, and this chapter
               includes a section describing how firewalls can prevent attacks.

               Implement configuration and system management
               processes. Configuration and system management processes help
               ensure that systems are deployed in a secure manner and remain in a

               secure state throughout their lifetimes. Chapter 16 covers
               configuration and change management processes.



                             Thwarting an attacker’s attempts to breach your security


                  requires vigilant efforts to keep systems patched and properly
                  configured. Firewalls and intrusion detection and prevention
                  systems often provide the means to detect and gather evidence to
                  prosecute attackers that have breached your security.




               Understanding Attacks
   1193   1194   1195   1196   1197   1198   1199   1200   1201   1202   1203