Vulnerability Protection: A Buffer for Patching
The standard doctrine for network security states that the best practice for securing computer networks is a layered approach. Hardening the operating systems and applications on computers by limiting the services offered as well as installing the appropriate patches is the first step. Setting up access control to limit incoming traffic both at the boundary routers as well as through the use of firewalls comes next. The final step involves the use of intrusion detection and prevention systems to identify attackers and prohibit their access to the network.
The link for this article located at ebcvg.com is no longer available.