quartz/content/notes/13-pen-testing-2.md
2022-09-15 21:17:40 +12:00

26 lines
636 B
Markdown

---
title: "13-pen-testing-2"
aliases:
tags:
- conp210
- lecture
---
## Auditing
a thorough prces of investiagtina nd analaysing aa system for vilnerabilities
- e.g., pen testing
-
can also refer to logging (esp. in a databse context)
## Firewalls
protect aginst network intrusions
- built in or third party
- built in - integration quality of control. ofen light convenince features maybe no GUI
- black/whitelist
- mandatory access control on routers
- mandatory access control
- e.g., block a netork port
- block icmp p
- application level filtering for desktop systems
- provide altering and logging (avoid crying wolf)