How are virus and Trojan Horse attacks mitigated in the SAFE SMR midsize network design corporate Internet module?

How are virus and Trojan Horse attacks mitigated in the SAFE SMR midsize network design corporate Internet module?

How are virus and Trojan Horse attacks mitigated in the SAFE SMR midsize network design corporate Internet module?

A.
Filtering at the ISP, edge router, and corporate firewall.

B.
IDS at the host and networks levels.

C.
E-mail content filtering, HIDS, and host-based virus scanning.

D.
OS and IDS detection.

E.
CAR and the ISP edge and TCP setup controls at the firewall.

F.
RFC 2827 and 1918 filtering at ISP edge and midsize network edge.

Explanation:

Virus and Trojan horse attacks-Mitigated through e-mail content filtering, HIDS, and host-based virus scanning
Reference: SAFE: Extending the Security Blueprint to Small, Midsize, and Remote-User Networks Page 17



Leave a Reply 0

Your email address will not be published. Required fields are marked *