Datasheet

Book IV
Chapter 1
Network Security
Terminology
467
Mitigating Security Threats
✦ Patch systems. Be sure to keep your servers up-to-date with patches.
This includes patching the operating system and all software installed.
✦ Use server-class antivirus software. Ensure that you have
company-approved antivirus software that is designed to run on servers.
✦ Keep virus definitions up-to-date. Make sure that you are keeping the
virus software definitions up-to-date. These definitions allow the
virus-protection software to know what the current viruses are.
✦ Limit administrative accounts. Ensure that you limit how many people
have administrative access to the servers. The more people making
changes to a server, the more chances mistakes will happen.
✦ Configure permissions. Make certain that all the resources are secured
with appropriate permissions.
✦ Place server in a secure room. Be sure that servers are placed in a
locked server room, where access to that room is limited to authorized
personnel.
✦ Install a firewall. Depending on the type of server, you may decide to
limit what traffic can reach the server by installing a software firewall
on the system. For example, if the system is used only as a Web server,
I recommend installing a software firewall that allows only HTTP and
HTTPS traffic to the system.
Network
To help create a more secure network environment, you should consider
following these general steps, at a minimum:
✦ Encrypt traffic. Depending on how sensitive the information is that
travels on your network, you may decide to encrypt all network traffic.
✦ Use firewalls. Use firewalls to control what type of traffic is allowed to
enter and leave different areas of the network.
✦ Use intrusion detection systems. Be sure to configure an IDS or IPS to
monitor network activity and notify you of any suspicious activity.
✦ Place switches and routers in a secure room. Make sure you are
storing switches and routers in a locked server room where you
are limiting access to the room.
✦ Implement device security best practices. Ensure that on your switches
and routers you are following security best practices such as configuring
passwords, encrypting passwords, and using other switch and router
device security concepts mentioned in the next chapter!
22_647486-bk04ch01.indd 46722_647486-bk04ch01.indd 467 10/15/10 11:27 PM10/15/10 11:27 PM