1-Describe the devices you need to setup a DMZ and what type of services you would likely place in a DMZ. 2-Describe the containment step in the incident response process and explain the communication process among CSIRT members during this step (i.e who decides what action to take and what happens after that?
1-Describe the devices you need to setup a DMZ and what type of services you would likely place in a DMZ.
2-Describe the containment step in the incident response process and explain the communication process among CSIRT members during this step (i.e who decides what action to take and what happens after that?
3-Discuss the importance of code reviews in the software development process as it relates to developing secure software.
4-Describe hardening process.
Then explain what the nmap utility does and how you would use the information it provides in the hardening process.