Chapter 7. Defensive Countermeasures
Up until this chapter, we have covered how to use Kali Linux to compromise targets. Now it is time to switch gears and become the defender with the goal of avoiding being compromised by methods we have demonstrated in this book, as well as other forms of attack. Defending an Internet-facing resource is extremely difficult, based on being exposed to the entire world through public access, mixed with the operations requirement of not being able to impact service to trusted users at a cost of security. It is absolutely critical to include security in the entire lifecycle from conception to termination of anything public facing, rather than considering security as an afterthought. This will not only reduce the risk of threats against the service, but also likely be less expensive to remediate in the event of a cyber incident.
It is common knowledge that there are bad people attacking systems on the Internet, regardless of the nature of the business. As a defensive...