Penetration Testing mailing list archives
Re: Designing Network Security
From: Joachim Schipper <j.schipper () math uu nl>
Date: Fri, 6 Jan 2006 22:24:47 +0100
On Fri, Jan 06, 2006 at 12:13:58PM +0530, kaushik wrote:
Hello List, May be this is not the right list to post. Since we need to protect ourselves from crackers, malicious traffic am taking the liberty to post here. We need to redesign the network. We need to place a web server, mail server , VOIP server within the DMZ and also put an IDS in place. How should one go about designing the same. Have to concentrate on protecting the Intellectual Property as well since we are a R&D center. Will need some good policies for the same. Can some one direct me to good online resources in the vast sea available.
Webapps tend to be buggy and full of holes. Don't let them any closer to sensitive data than is absolutely necessary. Having a separate machine for the public website would go a long way. VOIP might also cause quite a few problems, but is likely to hold more sensitive data. Requiring some sort of authentication is a very good thing here. Joachim ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
Current thread:
- Designing Network Security kaushik (Jan 06)
- RE: Designing Network Security Erin Carroll (Jan 06)
- Re: Designing Network Security Joachim Schipper (Jan 06)