Securing Infrastructure
1
Securing Infrastructure By design Code auditing Safe languages Shared libraries Secure functionality Risk analysis Cryptography By isolating Compliant architecture Filtering Authorisation Authentication By reacting Antivirus IDS/IPS Patching Hardening Anti exploitation Monitoring By controlling Audits Penetration testing Vulnerability scanning Awareness Compliance enforcement Lifecycle management
-
Upload
keith-batterham -
Category
Documents
-
view
26 -
download
1
Transcript of Securing Infrastructure
![Page 1: Securing Infrastructure](https://reader035.fdocuments.net/reader035/viewer/2022071723/55c73308bb61eb93268b4576/html5/thumbnails/1.jpg)
Securing Infrastructure
By design
Code auditing
Safe languages
Shared libraries
Secure functionality
Risk analysisCryptography
By isolatingCompliant architecture
FilteringAuthorisation
Authentication
By reacting
Antivirus
IDS/IPS
Patching
Hardening
Anti exploitation
Monitoring
By controllingAudits
Penetration testing
Vulnerability scanning
Awareness
Complianceenforcement
Lifecycle management