19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

352<br />

Part VII: The Part of Tens<br />

Stick to the following tenets:<br />

✓ Be realistic.<br />

✓ Use good tools.<br />

✓ Get to know your systems and practice honing your techniques.<br />

I cover each of these in various depths in Chapters 5 through 15.<br />

Assuming That You Can Eliminate<br />

All Security Vulnerabilities<br />

When it comes to computers, 100 percent, ironclad security is not attainable.<br />

You can’t possibly prevent all security vulnerabilities, but you’ll do fine if you<br />

uncover the low-hanging fruit and accomplish these tasks:<br />

✓ Follow solid practices.<br />

✓ Patch and harden your systems.<br />

✓ Apply reasonable (cost-justified) security countermeasures.<br />

Many chapters, such as the operating system chapters in Part IV, cover these<br />

areas. It’s also important to remember that you’ll have unplanned costs.<br />

You may find lots of security problems and will need the budget to plug the<br />

holes. Otherwise, you may have gotten over the due diligence hurdle but now<br />

have a due care problem on your hands. This is why you need to approach<br />

information security from a risk perspective and have all the right people on<br />

board.<br />

Performing Tests Only Once<br />

Ethical hacking is a snapshot of your overall state of security. New threats<br />

and vulnerabilities surface continually, so you must perform these tests<br />

periodically and consistently to make sure you keep up with the latest security<br />

defenses for your systems. Develop both short- and long-term plans for<br />

carrying out your security tests over the next few months and next few years.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!