What makes an effective rule base? List three points to consider.
What will be an ideal response?
It should be based on the organization's security policy.
It should include a firewall policy with rules for how applications can access the Internet.
It should be as simple and short as possible.
It should restrict access to ports and subnets on the internal network from the Internet.
It should control Internet services.
You might also like to view...
A(n) ________ is a category of automatically created data that can be inserted anywhere within a document
Fill in the blank(s) with correct word
An enterprise information security policy (EISP) is also known as a(n) ____.
A. issue-specific security policy B. general security policy C. systems-specific security policy D. strategic planning policy
What does the term wetware refer to?
a. humans operating computers b. evil crackers c. "good" hackers d. a system vulnerability
Buffer overflow provides the ability to overwrite a return address causing ____.
A. heap overruns B. variable overruns C. stack overruns D. variable smashing