|
|
|
|
|
|
|
To ensure that no malware programs have been installed that attackers can use to launch a DDoS attack. |
|
|
|
|
Filtering based on source IP addresses will prevent SYN flood DDoS attacks |
|
|
|
|
A WAF tool can identify and mitigate application layer attacks |
|
|
detect |
Intrusion detection and prevention systems |
|
IDS/IPS use a signature database to identify any threats which can block the attacker or to alert a system administrator. |
|
|
detect |
Incident response planning: |
|
To be prepared to respond quickly and efficiently to an attack |
|
|
|
|
To ensure that procedures and process are in place to have current updated software installed |
|
|
|