TAILIEUCHUNG - The Essentials of Network Security

Apply Configuration Management and automate wherever possible. There are many interdependencies between the configuration of grid services, the operating environment and other peer services. The secure deployment of user-level application software must also be taken into account. Whilst, given sufficient familiarity with the software, manual configuration of a resource is possible, to assist in the generation of a reproducible service interface, it is recommended that administrators make use of a configuration management tool and automate as much of the installation and configuration as possible. . | Cisco Systems White Paper The Essentials of Network Security Introduction With the current growth of the Internet and e-commerce networks are becoming increasingly vulnerable to damaging attacks. At the same time downtime from networks that carry critical business applications can result in production losses and directly affect a company s bottom line. Computer viruses denial- of-service DoS attacks vindictive employees and human error all present dangers to networks. No individual-whether a noncomputer user a casual Internet surfer or even a large enterprise-is immune to network-security breaches. With proper planning however network security breaches can often be prevented. This paper provides a general overview of the most common network security threats and recommends steps you can take to decrease these threats and to mitigate exposure to risks through active design and prevention. The Importance of Security In 1999 the . Federal Bureau of Investigation FBI reported . 265 million in verifiable losses due to computer security breaches in . companies. more than double the losses in 1998. The following survey from the Computer Security Institute CSI documents the scope of the problem. The CSI team surveyed 538 computer security practitioners in . corporations government agencies financial institutions medical institutions and universities and reported its results in the 20011 Computer Crime and Security Survey. The goal of this effort is to raise the level of computer security awareness and to help determine the scope of computer crime in the United States. The following statistics demonstrate that the threat from computer crime and other information security breaches continues unabated and that the financial toll is mounting. Thirty-five percent of respondents quantified their financial losses. Respondents reported a total of . 377 828 700 in financial losses. In contrast the losses from the 249 respondents in the 2000 survey totaled only . 265

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.