Page tree
Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

This article is just being brainstormed by Tin.

This came out of discussions with Dickson.

What are the considerations for securing system and what can help mitigate the threats? Here's a mind dump,

  • Logical Access
  • Password Management
  • Firewalls
  • Scanning
  • Encryption
  • Monitoring for Intrusion Detection
  • System Integrity - Did somebody change something?
  • Denial of Service Prevention
  • Hardening
  • Defensive Coding

Here's what I started writing about,

  • No labels