21-2
User Guide for Cisco Security MARS Local Controller
78-17020-01
Chapter 21 Rules
Rules Overview
Figure 21-1
Top Portion of Inspections Rules Page
Prioritizing and Identifying
Your first order of business is to prioritize your network’s assets; in other words, figure out what is going
to cost you the most money if it goes down. Next, identify your networks’ most exploitable weaknesses.
Choose which ones you are willing and able to close, and rank the remaining weaknesses by risk and
exploitability.
Use this ranked list to guide your time and energy expenditures when customizing the CS-MARS rule
set.
Think Like a Black Hat
Ignore for a moment the benign users who do legitimate business on your networks.
Get inside the mind of the black hat that wants to take your network down. The person who should
concern you is the one with a plan.
Good plans have a sequence of steps, contingencies, and metrics to determine success or failure. The
more fully you can anticipate these plans, the fewer attacks will be able to execute unhindered and
unobserved. The black hat is looking for wide-open doors and easy access. Failing that, the black hat is
going to look for specific and obvious exploitable weaknesses.
Planning an Attack
Start to detail your plan. You want to penetrate a network. You’d like to avoid detection and
identification if possible. You want root access on a host.
Содержание CS-MARS-20-K9 - Security MARS 20
Страница 20: ...Contents xx User Guide for Cisco Security MARS Local Controller 78 17020 01 ...
Страница 356: ...17 16 User Guide for Cisco Security MARS Local Controller 78 17020 01 Chapter 17 Network Summary Summary Page ...
Страница 420: ...20 28 User Guide for Cisco Security MARS Local Controller 78 17020 01 Chapter 20 Queries and Reports Reports ...
Страница 580: ...Glossary GL 4 User Guide for Cisco Security MARS Local Controller 78 17020 01 ...