TAILIEUCHUNG - White Paper - Modern Network Security: The Migration to Deep Packet Inspection

Appendix B describes the current connectivity assumptions of commonly deployed grid software used in LCG. The LCG Security Group considers these assumptions to be inappropriate for deploying a production grid and recommends that developers and designers develop ways to more effectively constrain the required access of future systems. Specifically, whilst application developers MUST NOT rely on the availability of any connectivity not specified in this document, that described in Appendix B should also NOT be read as an agreed minimal set. For instance, by requiring that network communications pass into and out of a site through one or more. | eSoft Simply better network security. CONTENTS Evolution of Network Security and Prevention Techniques Issues with Current Security Solutions Current Network Security Alternatives The eSoft Solution Summary White Paper - Modern Network Security The Migration to Deep Packet Inspection Fwage 2 Part 1 - Evolution of Network Security and Prevention Techniques The past few years have seen a radical evolution in the nature and requirements of network security. There are many factors contributing to these changes the most important of which is the shift in focus from so-called network-level threats such as connection-oriented intrusions and Denial of Service DoS attacks to dynamic content-based threats such as Viruses Worms Trojans Spyware and Phishing that can spread quickly and indiscriminately and require sophisticated levels of intelligence to detect. Where attacks like Smurf Fraggle and the Ping of Death were the key threats in years past now attacks such as Microsoft IIS printer ISAPI extension buffer overflow vulnerability and Unicode directory traversal are more prevalent albeit much less imaginatively named. There are several major drivers that are shaping the new security landscape 1 - Increasing complexity of networks Where a network 10 years ago might have consisted of a LAN connected to the Internet through a WAN connection and maybe a few remote access or site-to-site VPN tunnels the reality today is much more complex. A common environment today will have multiple access mechanisms into the network including wireless LAN with myriad Client devices including portable computers PDAs and Smart Phones web portals for partners and customers FTP servers email servers end-users using new communication platforms such as Instant Messaging and peer-to-peer applications for file-sharing. An example of such a network and the threats that are present is illustrated in Figure 1. In addition the workforce is becoming more mobile. From

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.