TAILIEUCHUNG - Network security: Protecting our critical infrastructures

Not shown in Fig. 1 are some elements of the network that complicate security efforts. There may be a corporate firewall or network address translation (NAT) features that will require communication between the building services staff and IT staff, but will also provide greater protection against IT threats. There may be other external connections from a trusted network that bypass the SR, . a modem connection. Also not shown are physical security implementation details. Are the controllers in secure locations? Is there a security policy that governs operator access to the system (passwords, keys), mainte- nance procedures, presence of tamper. | Network security Protecting our critical infrastructures This paper was prepared by Professor Seymour E. Goodman Pam Hassebroek and Professor Hans Klein Georgia Institute of Technology United States . Network Security Protecting our critical infrastructures forms part of the Visions of the Information Society project managed by Lara Srivastava Policy Analyst in the Strategy and Policy Unit of the International Telecommunication Union ITU . More information can be found at http visions. The views expressed in this report are those of the authors and do not necessarily reflect the opinion of ITU or its membership. Table of contents 1 Introduction The nature of the Cyberspace is Cyberspace is 2 Strategic defence Preventing an Thwarting an Limiting damage during a successful Reconstituting after an Improving defender 3 Forms of international International The standards development Open source security Incentives to establish security International alliance for security Information International cooperative Clearinghouse Halting cyber attacks in Harmonizing legal Providing assistance to developing 4 Finding a suitable framework for international An ideal Necessary characteristics of an approximate real-world International cooperation Cyberspace Initiative s in other Problems with cooperation initiatives for Problems in a partially private approach .17 5 Concluding .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.