Previous Page | Next Page

  1. Introduction
  2. Your Needs
  3. What to Protect
  4. Security Policies
  5. Security Policy Requirements
  6. Incident Procedures
  7. Security Categories
  8. Software Vulnerability Control
  9. Hostile Software
  10. Network Layout
  11. Traffic Filtering
  12. Mail
  13. Firewall Protection
  14. Network Intrusion Detection
  15. Network Port Scanning
  16. Network Tools
  17. Passwords
  18. Types of Attacks
  19. Protocol Use
  20. Entry Points
  21. Cost
  22. Application Level Protection
  23. System Protection
  24. User Issues
  25. Other Recommendations
  26. Terms
  27. Credits

Security Entry Points

Consider some of the following issues when designing your security and setting up your network, systems, and application programs.

  • How will you deal with a hostile takeover at one of your sites?
    • Do users have limited access to only what they need?
    • Can we disable user access quickly if necessary?
  • Modems
  • Viruses through e-mail attachments
  • Hostile programs installed by your users