tailieunhanh - Fundamental Principles of Network Security

The new overwatch security pillar acts as an infection detection, containment, and remediation engine that is automatically triggered when a threat has bypassed detection by the existing "in-line" infrastructure and has infiltrated the enterprise network. The overwatch security layer uses data from a real-time reputation and behavioral correlation database to detect active data-stealing malware and other potential threats. IDC believes that layered, in-line threat detection and threat overwatch architectures provide enterprises with a higher degree of security and are capable of addressing more of their security requirements when compared with legacy security infrastructure architectures. The key benefits are real-time overwatch,. | Fundamental Principles of Network Security By Christopher Leidigh White Paper 101 Legendary Reliability Executive Summary Security incidents are rising at an alarming rate every year. As the complexity of the threats increases so do the security measures required to protect networks. Data center operators network administrators and other data center professionals need to comprehend the basics of security in order to safely deploy and manage networks today. This paper covers the fundamentals of secure networking systems including firewalls network topology and secure protocols. Best practices are also given that introduce the reader to some of the more critical aspects of securing a network. 2005 American Power Conversion. All rights reserved. No part of this publication may be used reproduced photocopied transmitted or stored in any retrieval system of any nature without the written permission of the copyright owner. Rev 2005-0 2 Introduction Securing the modern business network and IT infrastructure demands an end-to-end approach and a firm grasp of vulnerabilities and associated protective measures. While such knowledge cannot thwart all attempts at network incursion or system attack it can empower network engineers to eliminate certain general problems greatly reduce potential damages and quickly detect breaches. With the ever-increasing number and complexity of attacks vigilant approaches to security in both large and small enterprises are a must. Figure 1 illustrates the steep rise in security incidents occurring each year as reported to the CERT Coordination Center a center of Internet security expertise . Figure 1 - Security incidents by year - 100 000 95 000 90 000 85 000 80 000 75 000 70 000 65 000 60 000 55 000 50 000 45 000 40 000 35 000 30 000 25 000 20 000 15 000 10 000 5 000 0 2 340 1995 -2 - 1996 2 573 1 1997 2 134 3 734 9 859 21 756 55 100 82 094 1998 1999 Year 2000 2001 2002 2003 1998-2003 by Carnegie Mellon University This .

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.