tailieunhanh - LAYERED NETWORK SECURITY: A best-practices approach

Attackers can infect your computer with malicious software, or malware, in many different ways. They can take advantage of unsafe user practices and flaws in your computer’s programs (flaws including vulnerabilities and unsecured services and features) and use social engineering (in which an attacker convinces someone to perform an action such as opening a malicious email attachment or following a malicious link). Once your computer is infected, intruders can use the malware to access your computer without your knowledge to perform unwanted actions. They can steal your personal information, change computer configurations, cause your computer to perform unreliably, and install. | gStillSecuré Reducing your risk has never been this easy. LAYERED NETWORK SECURITY A best-practices approach Prepared by Mitchell Ashley VP of Engineering CIO Latis Networks Inc. January 2003 White paper 2003 Latis Networks Inc. All rights reserved. iStillSecure Layered Network Security A best-practices approach 1 of 10 Table of Contents Introduction .2 Increasing the hacker s work factor .2 The layered-security model .2 Level 1 Perimeter Pros .3 Considerations .3 Level 2 Network Pros .5 Considerations .5 Level 3 Host Pros .6 Considerations .6 Level 4 Application security .6 Pros .6 Considerations .6 Level 5 Data Pros .7 Considerations .7 StillSecure network security products pillars of the layered Border Guard Protects you from the cost of malicious attacks . .7 VAM Assessment and management that continuously ensures network security .8 Defending against common threats and About the authors Mitchell Ashley is Vice President of Engineering and CIO of Latis Networks Inc. He is responsible for product strategy and development of the StillSecure suite of network security software. Mr. Ashley brings to Latis Networks and its customers more than 20 years of experience in data networking network security and software development. Mr. Ashley is a graduate of the University of Nebraska with a Bachelor of Science degree in Computer Science and Business Administration. Latis Networks Inc. 361 Centennial Parkway Suite 270 Louisville CO 80027 P 303 381 -3800 F 303 381 -3880 2002-2003 Latis Networks Inc. All rights reserved. Latis the Latis logo StillSecure and the StillSecure logo are trademarks of Latis Networks Inc. All other trademarks are the property of their respective owners. The products and services listed may not be available in all regions. iStillSecure Layered Network Security A best-practices approach 2 of 10 INTRODUCTION Network .

TỪ KHÓA LIÊN QUAN