quartz/content/notes/13-pen-testing-2.md
2022-09-15 21:17:40 +12:00

636 B

title aliases tags
13-pen-testing-2
conp210
lecture

Auditing

a thorough prces of investiagtina nd analaysing aa system for vilnerabilities

  • e.g., pen testing

can also refer to logging (esp. in a databse context)

Firewalls

protect aginst network intrusions

  • built in or third party
    • built in - integration quality of control. ofen light convenince features maybe no GUI
  • black/whitelist
  • mandatory access control on routers
    • mandatory access control
      • e.g., block a netork port
      • block icmp p
  • application level filtering for desktop systems
  • provide altering and logging (avoid crying wolf)