Lab 02
Lab 02
• Managing threats
• Managing vulnerabilities
• Managing exploits
• Risk Management strategies
http://fpt.edu.vn 05/20/202 2
4
Understanding and Managing Threats
http://fpt.edu.vn 05/20/202 3
4
Best Practices for Managing
Threats Within Your IT Infrastructure
• Create a security policy
• Insurance
• Use access controls
• Use automation
• Include input validation
• Provide training
• Use antivirus software
• Protect the boundary
http://fpt.edu.vn 05/20/202 4
4
Understanding and Managing
Vulnerabilities
http://fpt.edu.vn 05/20/202 5
4
Mitigation Techniques
http://fpt.edu.vn 05/20/202 6
4
Mitigation Techniques (cont.)
http://fpt.edu.vn 05/20/202 7
4
Best Practices for Managing
Vulnerabilities Within Your IT Infrastructure
• Identify vulnerabilities
• Match the threat/vulnerability pairs
• Use as many of the mitigation techniques as feasible
• Perform vulnerability assessments
http://fpt.edu.vn 05/20/202 8
4
Understanding and Managing Exploits
http://fpt.edu.vn 05/20/202 9
4
Public-Facing Server Exploits
• Perpetrators
– Script kiddies, programmers
• Initiate
– Public server discovery
– Server fingerprinting
– Vulnerability discovery
• Find information about Vulnerabilities and Exploits
– Blogs, forums, security newsletters
– Common Vulnerabilities and Exposures (CVE) list
– Reverse engineering
http://fpt.edu.vn 05/20/202 10
4
Public-Facing Server Mitigation Techniques
http://fpt.edu.vn 05/20/202 11
4
Best Practices for Managing
Exploits Within Your IT Infrastructure
• Harden servers
• Use configuration management
• Perform risk assessments
• Perform vulnerability assessments
http://fpt.edu.vn 05/20/202 12
4