Tips for Securely Implementing Evasion Prevention

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Tips for Securely Implementing Evasion Prevention-2 Next

AETs consist of any evasive hacking technique that allows an intruder to bypass security detection during a network-based attack. While AETs themselves are not malicious, they are the vehicle through which any number of malicious attacks can be successfully delivered to vulnerable network targets. They are typically successful in their infiltration due to their ability to ensure that traffic looks normal to security devices, which then allows traffic to pass freely. These stealth cyber attack methods bypass network security, are stackable through simultaneous execution on multiple protocol layers and are capable of changing dynamically, even during the attack’s execution.

Advanced Persistent Threats (APTs) generally refer to a group, such as a foreign government or hactivist party, that applies a number of techniques and attacks over a long period of time.

One of the most worrisome and potentially crippling threats to next-generation infrastructures is Advanced Evasion Techniques (AETs), which are being used more and more by cyber criminals because AETs leave no trace to current management and monitoring systems, logs or reports – leaving the devices blind and creating an illusion of continued security. Since their discovery, many companies have not taken the proper security measures to effectively thwart AETs. Still, the threat posed by AETs is real and there are steps that must be taken to protect your environment. This slideshow features nine tips, provided by Stonesoft, to help you secure against AETs.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.