Page 12 - CPTE_Prep_Guide_Sample
P. 12

•  Use an advanced firewall that
                          obfuscates port scans by indicating that
                          all ports are open
                       •  Use software that emulates a different
                          TCP/IP stack in order to give an
                          attacker a false OS fingerprint
                       •  Use XP SP2, Vista or 7 since they limit
                          the number of simultaneous open
                          sockets and hence drastically slow
                          down a port scan

                   Countermeasures: Social Engineering

                       •  Standard Framework – Establishing
                          frameworks of trust on an
                          employee/personnel level
                       •  Scrutinizing Information – Identifying
                          which information is sensitive and
                          evaluating its exposure to social
                          engineering and breakdowns in
                          security systems
                       •  Security Protocols – Establishing
                          security protocols, policies, and
                          procedures for handling sensitive
                          information
                       •  Training to Employees – Training
                          employees in security protocols
                          relevant to their position
                       •  Event Test Performing – Unannounced,
                          periodic tests of the security
                          framework




                                                               417
   7   8   9   10   11   12   13   14   15   16   17