Home » CEH v7.0, Hacking & Cybercrime, Malware, Security, Technology

Stopping Hackers Requires Training

Author: Michael Gregg 10 December 2012 2,066 views No Comments

Identifying areas of security within a network requires a 24/7 strategy to keep botnets and cyber criminals out of your network. Ultimately, cyber attacks can bring businesses to a grinding halt, creating untold damage to network architecture, operational efficiencies, and the all-important, bottom line. The best way to deal with these threats is to maintain a trained, knowledgeable staff that understands security risks and vulnerabilities. This trained staff should be looking at several areas of the infrastructure.

Externally — From the outside of a network, the security team should ask, “What can the attacker see?” Ethical hacking and penetration testing is one approach.

Internally — From the inside of a network, there also needs to be a layered defense. There are huge risks coming from malicious websites, tainted e-mails, and viruses.

Operationally — From the operation side of a network, one should never forget the importance of training staff on good security practices. Many highly technical attacks make use of social engineering.

DMZ — The DMZ is the no man’s land between the internal and external network. This environment needs more than basic firewalls. It needs web application filtering and deployment of current security appliances to protect web and application servers.

Having a trained security team that understands how hackers think can help counter their attacks at each of these infrastructure areas.

Related Posts
Can Thinking Like a Hacker Help You Be More Secure?
What is Ethical Hacking?

Related Courses
Certified Ethical Hacker v7
Cybersecurity Foundations
Foundstone Ultimate Hacking

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...

Leave your response!

Add your comment below, or trackback from your own site. You can also subscribe to these comments via RSS.

Be nice. Keep it clean. Stay on topic. No spam.

You can use these tags:
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

This is a Gravatar-enabled weblog. To get your own globally-recognized-avatar, please register at Gravatar.