Vulnerability Scanning Defenses
¨
Scan your own network using latest
vulnerability database
–
Do not use dangerous plug-ins against
production servers
¨
Close all unused ports
¨
Apply patches to your systems
¨
Have policy and practices for building and
maintaining secure systems