tailieunhanh - Communication Security - available techniques

The ongoing development of the BACnet standard is opening the door for lower cost and more efficient building control systems that provide expanded services. This report seeks to address the security implications within the world of BACnet implementations. The report begins with an overview of BACnet and typical BACnet BCS installations along with a discussion of the security environment and review of threats to that system. The report then goes into detail on the threats, and finally possible countermeasures. . | 4XIS COMMUNICATIONS WHITE PAPER TECHNOLOGY AND APPLICATIONS Communication Security - available techniques Axis Communications WHITE PAPER Communication Security - available techniques TABLE OF CONTENTS 1 2 Communication Security 3 Avoiding Successful 4 Preventing Malicious 5 Discovering any 6 Administrating and Distributing the Public 7 Security over IP-based 8 9 About Axis Communications Rev Last updated 2003-02-24 2 Communication Security - available techniques Axis Communications WHITE PAPER 1 Introduction Today more than ever computer networks are utilized for sharing services and resources. Information travelling across a shared IP-based network such as the Internet could be exposed to many devious acts such as eavesdropping forgery and manipulation. Fortunately there are several mechanisms that can protect any information that needs to be sent over a network. This paper introduces security threats to today s IP-based networks and explains available security mechanisms to effectively prevent such threats from happening. No one wants his or her confidential or classified information revealed. Confidential information that you do not want to share with others is the easiest to protect but ever so often there is a need to share this type of information. Whenever this happens you need to be able to send the information in a secure manner to your trusted receiver. This issue is particularly important when network communication is involved since network communication has become the cornerstone for organizational effectiveness and today s digital communication often includes sensitive information such as control and corporate financial data. Consequently we need security mechanisms whenever sensitive information is to be exchanged over the network. 2 Communication Security Concepts Fundamental to IP-based networks is the function of dividing data into .

TỪ KHÓA LIÊN QUAN