Preventing Intrusions
Firewalls/Router Rule sets
At access points
In between organizational boundaries
Improve Security of Host Machines
Use of encryption is a must
Remove unnecessary services
Self Audits
Why wait for ‘El Ninó’?
Previous slide
Next slide
Back to first slide
View graphic version