tailieunhanh - Threats in an Enterprise Network

Today, there is an ever-growing dependency on computer networks for business transac- tions. With the free flow of information and the high availability of many resources, managers of enterprise networks have to understand all the possible threats to their networks. These threats take many forms, but all result in loss of privacy to some degree and possibly malicious destruction of information or resources that can lead to large monetary losses. | Cisco Press Presented by C H A P T E R 5 Teel Republic Threats in an Enterprise Network Visit to buy this book and save 10 on your purchase. Register to become a site member and save up to 30 on all purchases everyday. Today there is an ever-growing dependency on computer networks for business transactions. With the free flow of information and the high availability of many resources managers of enterprise networks have to understand all the possible threats to their networks. These threats take many forms but all result in loss of privacy to some degree and possibly malicious destruction of information or resources that can lead to large monetary losses. Knowing which areas of the network are more susceptible to network intruders and who is the common attacker is useful. The common trend in the past has been to trust users internal to the corporate network and to distrust connections originating from the Internet or from remote access networks using virtual private networks VPNs dial-in modems and Integrated Services Digital Network ISDN lines. It is important to place trust in the employees internal to the network and in authorized people trying to use internal network resources from outside the corporation. However trust must also be weighed with reality. According to some sources at least 60 percent or more attacks are perpretrated by corporate insiders and there is an increasing trend not to trust internal users and have stricter security measures in place. Wireless networks are becoming in more wide-spread use and more stringent security considerations are often required in these instances. Restricted use of network infrastructure equipment and critical resources is necessary. Limiting network access to only those who require access is a smart way to deter many threats that breach computer network security. Not all threats are intended to be malicious but they can exhibit the same behavior and can cause as much harm whether intended or not. .

TỪ KHÓA LIÊN QUAN