Scanning for vulnerabilities
Searching for rogue servers
Profiling systems and services
Reducing Denial of Service (DoS) attacks
Securing DNS (Domain Name System)
Limiting the impact of common attacks
Deploying firewalls to control network traffic
Preventing intrusions with filters
Implementing a cyber security policy
Deploying personal firewalls
Protecting web services and applications
Controlling information leakage