What makes an effective rule base? List three points to consider.

What will be an ideal response?


It should be based on the organization's security policy.
It should include a firewall policy with rules for how applications can access the Internet.
It should be as simple and short as possible.
It should restrict access to ports and subnets on the internal network from the Internet.
It should control Internet services.

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a category of automatically created data that can be inserted anywhere within a document

Fill in the blank(s) with correct word

Computer Science & Information Technology

An enterprise information security policy (EISP) is also known as a(n) ____.

A. issue-specific security policy B. general security policy C. systems-specific security policy D. strategic planning policy

Computer Science & Information Technology

What does the term wetware refer to?

a. humans operating computers b. evil crackers c. "good" hackers d. a system vulnerability

Computer Science & Information Technology

Buffer overflow provides the ability to overwrite a return address causing ____.

A. heap overruns B. variable overruns C. stack overruns D. variable smashing

Computer Science & Information Technology