TITLE

IT Security

AUTHOR(S)
Flood, Gary
PUB. DATE
July 2004
SOURCE
IT Training;Jul/Aug2004, p35
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
IT security is one of today's biggest problems for organisations and individuals alike. Email users around the world are regularly swamped with viruses that threaten to nuke their systems, while corporate users worry about compliance and data theft issues. IT security is one of today's biggest problems for organisations and individuals alike. Email users around the world are regularly swamped with viruses that threaten to nuke their systems, while corporate users worry about compliance and data theft issues. Against this background, it's vital for all users to become more computer-security conscious. But most of the onus lies with network managers and system administrators, who need to constantly update their awareness of both their own environment's possible weaknesses, and the threats that lurk beyond the firewall. That will help you design and operate more effective network, internet, software and email security policies, buttressed by the most useful tools on the market. IT Training looks at the best books on the market for anyone who needs to get to grips with this increasingly important subject.
ACCESSION #
13820475

 

Related Articles

  • Arbor Networks tracks worm-like behaviour. Gomm, Karen // Computer Weekly;6/29/2004, p36 

    Security supplier Arbor Networks Inc. has released Peakflow X 3.0, an internal network security system that aims to detect worms and protect systems from them. Rather than check worms and viruses against an existing signature, Arbor Networks said Peakflow X analyses the flows and relationships...

  • Juniper crams security tools into appliances. Lawson, Stephen // Network World;9/4/2006, Vol. 23 Issue 34, p23 

    The article reports on the plan of Juniper Networks Inc. to pack more security features into its firewalls and appliances for midsize businesses and branch offices. Juniper has released their anti-spam capability and their antivirus tool set that battles spyware, adware and phishing into he...

  • Firms failing to protect systems against crime. Goodwin, Bill // Computer Weekly;4/12/2005, p12 

    The article reports that businesses are failing to take adequate steps to secure their IT systems, despite a rise in computer crime over the past 12 months. Computer crime now affects 90% of businesses, costing Great Britain a grand total of 2.4 billion pounds a year, according to the National...

  • Practical firewall policy inspection using anomaly detection and its visualization. Kim, Ui-Hyong; Kang, Jung-Min; Lee, Jae-Sung; Kim, Hyong-Shik; Jung, Soon-Young // Multimedia Tools & Applications;Jul2014, Vol. 71 Issue 2, p627 

    Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to...

  • Don't let security slip.  // Computer Weekly;12/7/2004, p32 

    This article asserts that more and more organizations are waking up to the fact that data security means a lot more than simply sticking a firewall around the network. Creating a security culture involving all employees is essential to protecting vital information and systems. But any period of...

  • Top Layer's IPS plays catch-up. Sturdevant, Cameron // eWeek;2/7/2005, Vol. 22 Issue 6, p41 

    The article reports that intrusion prevention systems have taken significant steps forward in terms of performance, accuracy and ease of management, but not to the point where they can replace firewalls or other security products. They are, however, becoming an important piece of the network...

  • Mediating Cross-domain Network Threat in Cooperative Way. Huayang Cao; Peidong Zhu; Wenqi Bi // Applied Mechanics & Materials;2014, Issue 530-531, p671 

    Network attacks, either in aggressive or silent way, are main threat to network security. Modern network environment normally involves multiple domains, and there are connections between them, so an adversary can impact the important network domain via attacking a normal one. When the threat is...

  • Internet security outside head office.  // Management Services;Jul99, Vol. 43 Issue 7, p32 

    Telecommunication company NTL Inc. has developed a business firewall package for information technology sites. The package consists of leased line Internet access from NTL, fully integrated software and hardware, GNAT Box firewall software from Global Telephony Associates and on-site...

  • INTRUSION DETECTION AND PREVENTION: THE SECOND LINE OF DEFENSE. Ali Pabrai, Uday O. // Certification Magazine;Jun2004, Vol. 6 Issue 6, p36 

    The article discusses the role of intrusion detection systems (IDS) and intrusion prevention systems (IPS) in providing security to computer systems. Firewall systems are the first layer of defense and are typically deployed at the perimeter of the organization. IDS and IPS are the next layers...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics