micro-segmentation security

From christopher, 2 Years ago, written in HTML5, viewed 167 times.
URL https://paste.intergen.online/view/baa6a5ba Embed
Download Paste or View Raw
  1.  
  2. The first step in <a href="https://www.extnoc.com/learn/computer-security/what-is-micro-segmentation">micro-segmentation security </a> is to identify what kind of traffic needs to be protected. For example, if you want to protect web applications from DDoS attacks, you might look at the HTTP headers, URL path, and application code. If you want to protect against malware, you might look at file extensions, user agent strings, and IP addresses. Once you know which types of traffic require protection, you can start looking at the different ways to implement it.
  3.  
  4.  
  5.  

Reply to "micro-segmentation security"

Here you can reply to the paste above