Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
2 семестр / Презентация1.pptx
Скачиваний:
0
Добавлен:
09.04.2023
Размер:
1.16 Mб
Скачать

Way of protection

1.Even at the stage of writing software, you need to think about site security. Carefully check the software for errors.

2.Update the software regularly, and make sure that you can go back to the old version if you encounter problems.

3.Watch for access restrictions. Services related to administration must be completely closed from third-party access. Protect your admin account with complex passwords and change them more often. Delete the accounts of employees who quit in a timely manner.

4.The administrator interface must be accessed exclusively from the internal network or via a VPN.

5.Use the firewall for application of the WAF (Web Application Firewall). It scans the transmitted traffic and monitors the legitimacy of requests.

6.To protect yourself from DNS spoofing, you need to periodically clear the DNS cache.

Way of protection

7.Reverse attack. All malicious traffic is redirected to the attacker. It will help not only to repel the attack, but also to destroy the attacker's server.

8.The allocation of resources to multiple independent servers. If one server fails, the remaining ones will ensure that it works.

9.Use of proven hardware protection against DDoS attacks. For example, Impletec iCore or DefensePro.

10.Choose a hosting provider that works with a reliable cybersecurity provider. Among the reliability criteria, experts highlight: the availability of quality guarantees, protection from the fullest possible range of threats, round-the-clock technical support, transparency (customer access to statistics and Analytics), and the absence of charging malicious traffic.

Thanks for your attention