First page Back Continue Last page Graphics
Part 2 - Securing a network
Essential when connected to the Internet
First steps
- Disable all non required services
- Use TCP wrappers
- Verify if the host requesting the service is “genuine”
- Use a scanner to scan local ports
- Security Administrator's Tool for Analyzing Networks
- Detect port scans from the internet