Главная | Соглашение | Публикация статей

Threats to Security Modern Networks
Категория: English version

The issue of security of computer networks is now the most urgent and important for today's corporate environment. Corporate infrastructure should have a clear security policy, which developed after a risk analysis, identifying critical resources and possible threats of greatest danger. Such threats that we consider in our article:

Masquerade.

When a user impersonating someone else, there is the likelihood of unauthorized access to critical systems. To reduce the likelihood «domino» use the mechanisms of identification and authentication, then decrease the likelihood that a user with whom you are installing communications, is not a front person.

Theft of information in transmission.

The data could be stolen during transmission over unsecured channels. Important information should be cipher - it will reduce the likelihood of theft of confidential information.

Data Manipulation.

Perhaps the data, which are either stored on any media or transferred. Again, can help encrypt data, there are some methods of encryption technology to protect the integrity of the data, which prevents the modification of confidential information.

DoS attacks.

Denial of Service (DoS) a species of hacker attacks, which resulted in important systems are unavailable. This attack is carried out through an overflow of unnecessary traffic, resulting in overload occurs memory and processor. Many systems now have a means of recognition and protection from DoS attacks.

The main elements of security policy are the identification, an active checking and integrity. Identification of the threat of depersonalization and prevents unauthorized access to resources and data. Integrity protects against theft of data transmission and maintains the continuity of the transmitted or stored information. Active checks to monitor the proper implementation of security policy and helps protect against hacker attacks and intrusions into the network.

Threats to Security Modern Networks

Статьи по теме:

Memory management Freebsd
How to make the right choice? 1C: Enterprise 7.7. or 8.0
Inkjet Plotters (SP, INK-JET PLOTTER)
Network
The history of personal computers
Tame your registration with the Windows software cleaning registry
Microsoft Great Plains to customers in Russia: how to find a consultant and the most frequent questions
Review converters for video
Enabling Windows XP
Requirements for computer technology
Greedy cabinet creators Spyware is testing!
Hide your important documents, a computer in seconds
Free software for everyone!
The company Janet Systems Llc Presented Soa-Platform Ijanet Framework Ultra The exhibition «Kitel 2008»
What brings Sp1 For Windows Vista?
The program 1S Accounting Enterprise 8
Aptitude CompactPCI-products of rapid obsolescence
Mikrokontrolleryne System
Tips software and programs connected branch
Printing without a printing press? It is possible
PC Peripherals
Ms Word Vs Notepad
The choice of antivirus software for home computer
Classification LAN (LCS)
How to Choose a Printer?
Run Windows
With your husband talking about your computer?
TYPES LKS
More Software to create an electronic catalog Szags
Care home PC
Your teenager safely use the Internet?
The structure design and generation of computers
Why is cleaning Windows registry needed
Sugarcrm In Russia
Tray Microsoft Windows XP
The scheme of the free acceleration of Internet
Mobile Trade Optimum - Office Business Representatives
Computer virus
Why work for a computer is harmful to human health
Enabling Windows Vista
Linear Magnetic Recording Dlt (Dlt-V/Sdlt/Dlt-S4)
Gigabit Ethernet Technology
Microprocessors used in CompactPCI-systems
It is fake?
The new search software
Architecture Risc Computational kernels
The destruction of computer data
Components, Modules, mamboty in CMS Joomla
Black Banner - or the threat of new technologies?
Odbc Firebird or may be still Ole Db driver?
Technology Platform 1C: Enterprise 8 - Areas Development
HISTORY OF BUILDERS
Using Protection Agency to maintain the security Professional
Download Free Program is easy, but Nevygodno
At the market goes cheap GSM / GPS signaling