TAILIEUCHUNG - Threats in an Enterprise Network

Today, there is an ever-growing dependency on computer networks for business transac- tions. With the free flow of information and the high availability of many resources, managers of enterprise networks have to understand all the possible threats to their networks. These threats take many forms, but all result in loss of privacy to some degree and possibly malicious destruction of information or resources that can lead to large monetary losses. | Cisco Press Presented by C H A P T E R 5 Teel Republic Threats in an Enterprise Network Visit to buy this book and save 10 on your purchase. Register to become a site member and save up to 30 on all purchases everyday. Today there is an ever-growing dependency on computer networks for business transactions. With the free flow of information and the high availability of many resources managers of enterprise networks have to understand all the possible threats to their networks. These threats take many forms but all result in loss of privacy to some degree and possibly malicious destruction of information or resources that can lead to large monetary losses. Knowing which areas of the network are more susceptible to network intruders and who is the common attacker is useful. The common trend in the past has been to trust users internal to the corporate network and to distrust connections originating from the Internet or from remote access networks using virtual private networks VPNs dial-in modems and Integrated Services Digital Network ISDN lines. It is important to place trust in the employees internal to the network and in authorized people trying to use internal network resources from outside the corporation. However trust must also be weighed with reality. According to some sources at least 60 percent or more attacks are perpretrated by corporate insiders and there is an increasing trend not to trust internal users and have stricter security measures in place. Wireless networks are becoming in more wide-spread use and more stringent security considerations are often required in these instances. Restricted use of network infrastructure equipment and critical resources is necessary. Limiting network access to only those who require access is a smart way to deter many threats that breach computer network security. Not all threats are intended to be malicious but they can exhibit the same behavior and can cause as much harm whether intended or not. .

TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
28    158    1    25-12-2024
65    137    1    25-12-2024
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.