TITLE

Learn how to repel the hack attacks

AUTHOR(S)
Bellinger, Alan
PUB. DATE
October 2003
SOURCE
IT Training;Oct2003, p46
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
This article focuses on the organisation's IT security skills. According to Gartner: "Sixty per cent of companies will outsource at least one perimeter security technology." According to Rick Stiffler, Cisco Systems' senior manager for advanced technology training in the U.S.: "Unless the IT security professional has had previous military or governmental security experience, they'll find it really tough to excel in this emerging world of security specialists." In fact, companies are woefully short of security skills among their IT professionals at all levels. INSETS: Cisco Certified Security Professional ratings;Check Point's certification programmes ratings;Comptia's Security+ ratings.
ACCESSION #
11095220

 

Related Articles

  • SECURITY.  // Telecom Asia;Jun2005, Vol. 16 Issue 6, p68 

    Reports on the challenges confronting network security. Potential of a hacker to bring down the entire Internet with 100 lines of code; Impact of the current practice of putting security at the edge of the network on network security; Impossibility of scaling by putting all the security at the...

  • Security Certification--The Big Winner. Tittel, Ed // Certification Magazine;Feb2003, Vol. 5 Issue 2, pSG2 

    Comments on security certifications in the information technology (IT) industry. Features for IT certification; Advantage of security certification choices to IT vendors; Considerations in the selection of security programs.

  • ACTION IDEA.  // Accounting Today;3/14/2005, Vol. 19 Issue 5, p1 

    Provides the main categories of information technology security. Physical security; Data security; Application security and network security.

  • The Security Strategies of Computer Network for E-tax System. Bai Yijun // Applied Mechanics & Materials;2014, Issue 513-517, p2182 

    With the general progress of information technology, the computer & network technology are generally applied in the tax system of which it will make more rooms for the tax administration and services in implementing the electronization, networking, transparency and efficiency developments....

  • The Analysis on the Network Security Situation Assessment and Situational Awareness. abasi // Applied Mechanics & Materials;2014, Issue 513-517, p2752 

    With the development of information era, network security is gradually becoming an outstanding issue of Internet field, and they have an increasingly important impact on people's lives. The event of military leaks due to the break of network security has line up trend annually. How to deal with...

  • Multi-function boxes take off. Greene, Tim // Network World;6/13/2005, Vol. 22 Issue 23, p17 

    This article reports that as the number of security technologies grows--firewall, anti-virus, content filtering, intrusion detection and others--some vendors suggest it makes sense to load all these platforms on a single device to save capital and operational costs, and perhaps even to improve...

  • Taking synergy to a higher level. Gengler, Barbara // SC Magazine: For IT Security Professionals (UK Edition);Apr2004, p36 

    This article focuses on the correlation between physical and information technology security systems. The lack of technical integration between physical and information technology security systems has allegedly resulted in gaps for virtually all companies, often leaving them vulnerable to...

  • Personal firewalls protect vulnerable PCs. Felman, Frederick // Network World;6/21/2004, Vol. 21 Issue 25, p75 

    This article examines how personal firewalls protect vulnerable personal computers (PC). A personal firewall protects PC by blocking inbound and outbound threats. The firewall can operate in stealth mode to make a computer invisible, preventing attackers from realizing that a PC exists at the...

  • How to curb those dispersed users. Savage, Marcia // SC Magazine: For IT Security Professionals (UK Edition);Aug2004, p34 

    This article outlines how companies can control their mobile users and protect their data networks. Many organizations are looking to protect themselves from threats introduced by individual personal computers and other endpoint devices, at the same time as opening up their networks to partners,...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics