Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)

Step

Description

Develop security zones.

Identify all network elements that a critical system is dependent upon when defining a security zone.

Consider potential weaknesses in DMZ design.

Review Table 6-1 when designing a DMZ (or security zone).

Utilize reverse-proxy systems.

Reverse-proxies are flexible, scalable, economical, and can provide higher security than various DMZ designs when implemented properly.

Recommended Reading

Категории