Threats to Security Modern Networks
The issue of security of computer networks is now the most urgent and important for today's corporate environment. Corporate infrastructure should have a clear security policy, which developed after a risk analysis, identifying critical resources and possible threats of greatest danger. Such threats that we consider in our article:
Masquerade.
When a user impersonating someone else, there is the likelihood of unauthorized access to critical systems. To reduce the likelihood «domino» use the mechanisms of identification and authentication, then decrease the likelihood that a user with whom you are installing communications, is not a front person.
Theft of information in transmission.
The data could be stolen during transmission over unsecured channels. Important information should be cipher - it will reduce the likelihood of theft of confidential information.
Data Manipulation.
Perhaps the data, which are either stored on any media or transferred. Again, can help encrypt data, there are some methods of encryption technology to protect the integrity of the data, which prevents the modification of confidential information.
DoS attacks.
Denial of Service (DoS) a species of hacker attacks, which resulted in important systems are unavailable. This attack is carried out through an overflow of unnecessary traffic, resulting in overload occurs memory and processor. Many systems now have a means of recognition and protection from DoS attacks.
The main elements of security policy are the identification, an active checking and integrity. Identification of the threat of depersonalization and prevents unauthorized access to resources and data. Integrity protects against theft of data transmission and maintains the continuity of the transmitted or stored information. Active checks to monitor the proper implementation of security policy and helps protect against hacker attacks and intrusions into the network.
Статьи по теме:
Optimal cache lifetime for Joomla CMSBlack Banner - Myth or Reality? Ergonomic organization of the workplaceWhat is the standard CompactPCI?Changing the design desktopDownload MozillaFree software for everyone!Classification of computers Google on the Internet malicious softwareSoftware can be downloaded from Vareznyh Sites or whether Buy for sale onlineLock down the personal information on your computerNew CCTV: Monitor Smartec STM-193 with a diagonal 19 " METHODS OF PROTECTION FROM COMPUTER VIRUSESTeam-quality design of computer Odbc Firebird or may be still Ole Db driver?Computer technology and GenealogyTechnology Platform 1C: Enterprise 8 - Areas DevelopmentRun WindowsDevelopment and dissemination of computer virusesTheft of computer dataChecking Software LicensingSplit Access databaseVISA-2000. Virtual seller of computer equipmentMicrosoft Great Plains to customers in Russia: how to find a consultant and the most frequent questionsAnimation on your computer deskMicroprocessors used in CompactPCI-systemsThe physical medium for LANsCorporate Information System (Crm, Erp, mobile commerce)History of Opera browserThree Training from well-known vendors: Especially for «antiviral Decisions»Monitoring computer facts Windows 7 - Window to the FutureGigabit Ethernet TechnologyThe truth of the activation of Windows VistaHow to choose the CRM: Develop a short-list CRM systemsGreedy cabinet creators Spyware is testing! HISTORY OF BUILDERSOpportunities for Windows XPCompleted work on setting up a new product Alee Archive 3 for work with DBMSLearn the truth about your child doing surfing habitsReview of popular programs BackupThe device Netping Cooler Board Received At Warehouse Company Zao «Light Kommunikeyshn»Working in Windows VistaNETGEAR NetworkIntroducing the expense of medical software - to allow for medical centers Tips software and programs connected branch Mobile Trade Optimum - Office Business RepresentativesHow Stress Editor In Word 2007Nosy about the habits of your guy online? Electrostatic Plotters The funds protect your computer and maximum securityMore Software invites you to Docflow 2008!Implementation Crm Systems Sales Expert 2 The Company «Sibaeroinzh»Free Internet Or How to Become a HackerCOMPUTER CRIME PREVENTION