Introduction

In the previous six chapters, you've learned many of the concepts behind building a solid defense strategy to protect your networks. You've learned that firewalls, intrusion detection systems, security policies, and a strong disaster plan are essential to ensuring secure continuity of operations. However, even the best-laid plans have weaknesses and, occasionally, a hacker uncovers and exploits these vulnerabilities to the detriment of your systems (and your sanity!).

This chapter focuses on two areas of concern:

  • The tools and techniques hackers may utilize to either gain unauthorized access to your network or deny that access to legitimate users.

  • The proper procedures to follow when a computer security incident takes place that affects ...

Get TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.