tailieunhanh - Open Source Security Tools : Practical Guide to Security Applications part 31

Open Source Security Tools : Practical Guide to Security Applications part 31. Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses. Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction to open source security tools. | Page 279 Thursday June 24 2004 11 12 PM Chapter 9 Encryption Tools So far the tools discussed have been used for protecting your network and the machines that reside within that network. However once that data passes outside the network boundaries it is beyond the protection of the tools discussed thus far and is susceptible to potential capture by hostile entities. Most Internet applications today send their data in the clear also known as plain text. This means that anyone viewing the packet can see your data. When your data crosses the Internet it passes through different systems many of which are out of your direct control and thus should be assumed to be nonfriendly. ISP routers and switches can be co-opted either from the inside or outside and other mail and Web servers regularly handle your private data. There is no way to avoid sending your data outside of your network. The biggest advantage of a global Internet is being able to share information with all of your business partners and customers in the outside world. You can t go back to the days of totally private networks. So how do you protect your important data once it leaves the comfy and safe confines of your home network Encryption is what most businesses rely on to make the Internet safe for their data and it is an important tool you can use too for maintaining the integrity and confidentiality of your data on the Internet. You may also want to protect your data from unauthorized viewers within your network because certain information may not be for all eyes within the company. Finally encrypting your important data can be a final line of defense against hackers. Even if they manage to break into your network and exploit the server they still have to crack the encryption to get at your data. 279 Page 280 Thursday June 24 2004 11 12 PM 280 Chapter 9 Encryption Tools Chapter Overview Concepts you will learn Symmetric and asymmetric encryption Different encryption .

TỪ KHÓA LIÊN QUAN