PDF4PRO ⚡AMP

Modern search engine that looking for books and documents around the web

Example: dental hygienist

Six Strategies for Defense-in-Depth

Back to document page

INTRODUCTIONThe idea of perimeter defense when referring to a corporate network ignores com-mon knowledge: that most successful and significant security breaches don t come from the outside. Serious issues often originate inside the network: everything from worms, viruses, and Trojan horses to unsecured wireless networks, peer-to-peer mobile communications and guest users can compromise the security of corporate networks. To address these threats, the corporate network should no longer be a single homo-geneous zone in which users connect from anywhere in the network and receive the same levels of access . Instead, the network requires internal perimeterization and defenses. Regulatory requirements also demand stringent controls on data flow within the corporate network. Logging and auditing requirements put pressure at one end of the spectrum, while rules regarding disclosure and information sharing are pushing against the other side.

2 Finally, mobility itself brings chaos to any network manager’s attempt to segregate and segment traffic. Contractors and visitors require access to …

  Strategies, Defense, Access, Depth, Six strategies for defense in depth

Download Six Strategies for Defense-in-Depth


Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Spam in document Broken preview Other abuse

Related search queries