ABSTRACT

ANY SYSTEM CONNECTED to the internet will be exposed to what to date has been a steadily increasing level of probes and attacks. Any such system must be managed in a manner that protects it from these attacks. This chapter introduces the basic principles necessary to understand the proper use of protective measures, and provides specific recommendations for network and system configuration.