--- title: "13-pen-testing-2" aliases: tags: - conp210 - lecture --- ## Auditing a thorough prces of investiagtina nd analaysing aa system for vilnerabilities - e.g., pen testing - can also refer to logging (esp. in a databse context) ## Firewalls protect aginst network intrusions - built in or third party - built in - integration quality of control. ofen light convenince features maybe no GUI - black/whitelist - mandatory access control on routers - mandatory access control - e.g., block a netork port - block icmp p - application level filtering for desktop systems - provide altering and logging (avoid crying wolf)