Talk With an Expert

Network and System Planning - How to Reduce Risk on a Comprimised System

Network and System Planning - How to Reduce Risk on a Comprimised System (PDF, 1.70MB)Published: 18 Sep, 2001
Created by:
Brent Maley

This paper is going to highlight the Code Red Worm as a specific example of an attack. It will demonstrate how a network can be set up to help limit exposure to it and other similar attacks. It will also look at how a network can be designed to reduce the chance of it being infected, and then go a step further to show how to limit the risk associated when one of the systems has become infected. It will touch briefly on hardening, as well as network and firewall configuration. While it will relate to most any attack, I will look specifically at the Code Red Worm as an example, showing how it infected systems and what could have been done to limit its ability to attack. Lastly, I will show how the systems could be set up to reduce the risk of exposing their data if they have been compromised.