Page 12 - CPTE_Prep_Guide_Sample
P. 12
• Use an advanced firewall that
obfuscates port scans by indicating that
all ports are open
• Use software that emulates a different
TCP/IP stack in order to give an
attacker a false OS fingerprint
• Use XP SP2, Vista or 7 since they limit
the number of simultaneous open
sockets and hence drastically slow
down a port scan
Countermeasures: Social Engineering
• Standard Framework – Establishing
frameworks of trust on an
employee/personnel level
• Scrutinizing Information – Identifying
which information is sensitive and
evaluating its exposure to social
engineering and breakdowns in
security systems
• Security Protocols – Establishing
security protocols, policies, and
procedures for handling sensitive
information
• Training to Employees – Training
employees in security protocols
relevant to their position
• Event Test Performing – Unannounced,
periodic tests of the security
framework
417