Designing a HIPAA-Compliant Security Operations Center by Eric C. Thompson
Author:Eric C. Thompson
Language: eng
Format: epub
ISBN: 9781484256084
Publisher: Apress
Architecting and Deployment
One way to deploy an IDS is placing it at a network ingress/egress point. This captures north-south traffic. Figure 5-12 represents the use of a mirroring port on a router capturing traffic from an internal/external egress point.
Figure 5-12Deploying an IDS such as Snort to capture ingress/egress traffic
Deployments should also be placed to capture east-west traffic, traffic traversing inside the network not destined for external locations. This is an important piece of visibility. When unauthorized individuals are inside the network, IDS devices can capture traffic indicating lateral movement. Other considerations when deploying an IDS include the data to protect and an understanding of threats and vulnerabilities in the network. This context is necessary to develop rules applicable to the entity.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Blogging & Blogs | eBay |
E-Commerce | Hacking |
Online Searching | Podcasts & Webcasts |
Search Engine Optimization | Social Media |
Social Media for Business | Web Browsers |
Web Marketing |
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7385)
Grails in Action by Glen Smith Peter Ledbrook(7286)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(5933)
Kotlin in Action by Dmitry Jemerov(4617)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(2922)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(2822)
WordPress Plugin Development Cookbook by Yannick Lefebvre(2524)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2498)
The Art Of Deception by Kevin Mitnick(2278)
Drugs Unlimited by Mike Power(2178)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2091)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2064)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2013)
JavaScript by Example by S Dani Akash(1943)
DarkMarket by Misha Glenny(1837)
Wireless Hacking 101 by Karina Astudillo(1834)
Full-Stack React Projects by Shama Hoque(1748)
Social Selling Mastery by Jamie Shanks(1739)
Hack and HHVM by Owen Yamauchi(1667)