IT Security
Related Articles
- Arbor Networks tracks worm-like behaviour. Gomm, Karen // Computer Weekly;6/29/2004, p36
Security supplier Arbor Networks Inc. has released Peakflow X 3.0, an internal network security system that aims to detect worms and protect systems from them. Rather than check worms and viruses against an existing signature, Arbor Networks said Peakflow X analyses the flows and relationships...
- Juniper crams security tools into appliances. Lawson, Stephen // Network World;9/4/2006, Vol. 23 Issue 34, p23
The article reports on the plan of Juniper Networks Inc. to pack more security features into its firewalls and appliances for midsize businesses and branch offices. Juniper has released their anti-spam capability and their antivirus tool set that battles spyware, adware and phishing into he...
- Firms failing to protect systems against crime. Goodwin, Bill // Computer Weekly;4/12/2005, p12
The article reports that businesses are failing to take adequate steps to secure their IT systems, despite a rise in computer crime over the past 12 months. Computer crime now affects 90% of businesses, costing Great Britain a grand total of 2.4 billion pounds a year, according to the National...
- Practical firewall policy inspection using anomaly detection and its visualization. Kim, Ui-Hyong; Kang, Jung-Min; Lee, Jae-Sung; Kim, Hyong-Shik; Jung, Soon-Young // Multimedia Tools & Applications;Jul2014, Vol. 71 Issue 2, p627
Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to...
- Don't let security slip. // Computer Weekly;12/7/2004, p32
This article asserts that more and more organizations are waking up to the fact that data security means a lot more than simply sticking a firewall around the network. Creating a security culture involving all employees is essential to protecting vital information and systems. But any period of...
- Top Layer's IPS plays catch-up. Sturdevant, Cameron // eWeek;2/7/2005, Vol. 22 Issue 6, p41
The article reports that intrusion prevention systems have taken significant steps forward in terms of performance, accuracy and ease of management, but not to the point where they can replace firewalls or other security products. They are, however, becoming an important piece of the network...
- Mediating Cross-domain Network Threat in Cooperative Way. Huayang Cao; Peidong Zhu; Wenqi Bi // Applied Mechanics & Materials;2014, Issue 530-531, p671
Network attacks, either in aggressive or silent way, are main threat to network security. Modern network environment normally involves multiple domains, and there are connections between them, so an adversary can impact the important network domain via attacking a normal one. When the threat is...
- Internet security outside head office. // Management Services;Jul99, Vol. 43 Issue 7, p32
Telecommunication company NTL Inc. has developed a business firewall package for information technology sites. The package consists of leased line Internet access from NTL, fully integrated software and hardware, GNAT Box firewall software from Global Telephony Associates and on-site...
- INTRUSION DETECTION AND PREVENTION: THE SECOND LINE OF DEFENSE. Ali Pabrai, Uday O. // Certification Magazine;Jun2004, Vol. 6 Issue 6, p36
The article discusses the role of intrusion detection systems (IDS) and intrusion prevention systems (IPS) in providing security to computer systems. Firewall systems are the first layer of defense and are typically deployed at the perimeter of the organization. IDS and IPS are the next layers...